salt_len 615 ext/hash/hash.c size_t algo_len, pass_len, salt_len = 0; salt_len 620 ext/hash/hash.c if (zend_parse_parameters(ZEND_NUM_ARGS(), "sssl|lb", &algo, &algo_len, &pass, &pass_len, &salt, &salt_len, &iterations, &length, &raw_output) == FAILURE) { salt_len 640 ext/hash/hash.c if (salt_len > INT_MAX - 4) { salt_len 641 ext/hash/hash.c php_error_docref(NULL, E_WARNING, "Supplied salt is too long, max of INT_MAX - 4 bytes: %zd supplied", salt_len); salt_len 674 ext/hash/hash.c computed_salt = safe_emalloc(salt_len, 1, 4); salt_len 675 ext/hash/hash.c memcpy(computed_salt, (unsigned char *) salt, salt_len); salt_len 681 ext/hash/hash.c computed_salt[salt_len] = (unsigned char) (i >> 24); salt_len 682 ext/hash/hash.c computed_salt[salt_len + 1] = (unsigned char) ((i & 0xFF0000) >> 16); salt_len 683 ext/hash/hash.c computed_salt[salt_len + 2] = (unsigned char) ((i & 0xFF00) >> 8); salt_len 684 ext/hash/hash.c computed_salt[salt_len + 3] = (unsigned char) (i & 0xFF); salt_len 686 ext/hash/hash.c php_hash_hmac_round(digest, ops, context, K1, computed_salt, (zend_long) salt_len + 4); salt_len 711 ext/hash/hash.c ZEND_SECURE_ZERO(computed_salt, salt_len + 4); salt_len 935 ext/hash/hash.c size_t password_len, salt_len; salt_len 938 ext/hash/hash.c if (zend_parse_parameters(ZEND_NUM_ARGS(), "lssl", &algorithm, &password, &password_len, &salt, &salt_len, &l_bytes) == FAILURE) { salt_len 948 ext/hash/hash.c salt_len = MIN(salt_len, SALT_SIZE); salt_len 950 ext/hash/hash.c memcpy(padded_salt, salt, salt_len); salt_len 951 ext/hash/hash.c if (salt_len < SALT_SIZE) { salt_len 952 ext/hash/hash.c memset(padded_salt + salt_len, 0, SALT_SIZE - salt_len); salt_len 954 ext/hash/hash.c salt_len = SALT_SIZE; salt_len 982 ext/hash/hash.c ops->hash_update(context, (unsigned char *)padded_salt, salt_len); salt_len 4026 ext/openssl/openssl.c size_t salt_len; salt_len 4035 ext/openssl/openssl.c &salt, &salt_len, salt_len 4059 ext/openssl/openssl.c PHP_OPENSSL_CHECK_SIZE_T_TO_INT(salt_len, salt); salt_len 4063 ext/openssl/openssl.c if (PKCS5_PBKDF2_HMAC(password, (int)password_len, (unsigned char *)salt, (int)salt_len, (int)iterations, digest, (int)key_length, (unsigned char*)ZSTR_VAL(out_buffer)) == 1) { salt_len 154 ext/standard/crypt.c PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, zend_bool quiet) salt_len 353 ext/standard/crypt_sha256.c size_t salt_len; salt_len 383 ext/standard/crypt_sha256.c salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); salt_len 392 ext/standard/crypt_sha256.c char *tmp = (char *) alloca(salt_len + 1 + __alignof__(uint32_t)); salt_len 394 ext/standard/crypt_sha256.c memcpy(tmp + __alignof__(uint32_t) - (tmp - (char *) 0) % __alignof__ (uint32_t), salt, salt_len); salt_len 395 ext/standard/crypt_sha256.c copied_salt[salt_len] = 0; salt_len 407 ext/standard/crypt_sha256.c sha256_process_bytes(salt, salt_len, &ctx); salt_len 418 ext/standard/crypt_sha256.c sha256_process_bytes(salt, salt_len, &alt_ctx); salt_len 469 ext/standard/crypt_sha256.c sha256_process_bytes(salt, salt_len, &alt_ctx); salt_len 476 ext/standard/crypt_sha256.c cp = s_bytes = alloca(salt_len); salt_len 477 ext/standard/crypt_sha256.c for (cnt = salt_len; cnt >= 32; cnt -= 32) { salt_len 497 ext/standard/crypt_sha256.c sha256_process_bytes(s_bytes, salt_len, &ctx); salt_len 531 ext/standard/crypt_sha256.c cp = __php_stpncpy(cp, salt, MIN ((size_t) MAX (0, buflen), salt_len)); salt_len 532 ext/standard/crypt_sha256.c buflen -= MIN(MAX (0, buflen), (int)salt_len); salt_len 576 ext/standard/crypt_sha256.c ZEND_SECURE_ZERO(s_bytes, salt_len); salt_len 584 ext/standard/crypt_sha256.c ZEND_SECURE_ZERO(copied_salt, salt_len); salt_len 386 ext/standard/crypt_sha512.c size_t salt_len; salt_len 417 ext/standard/crypt_sha512.c salt_len = MIN(strcspn(salt, "$"), SALT_LEN_MAX); salt_len 427 ext/standard/crypt_sha512.c char *tmp = (char *) alloca(salt_len + 1 + __alignof__(uint64_t)); salt_len 428 ext/standard/crypt_sha512.c salt = copied_salt = memcpy(tmp + __alignof__(uint64_t) - (tmp - (char *) 0) % __alignof__(uint64_t), salt, salt_len); salt_len 429 ext/standard/crypt_sha512.c copied_salt[salt_len] = 0; salt_len 441 ext/standard/crypt_sha512.c sha512_process_bytes(salt, salt_len, &ctx); salt_len 452 ext/standard/crypt_sha512.c sha512_process_bytes(salt, salt_len, &alt_ctx); salt_len 504 ext/standard/crypt_sha512.c sha512_process_bytes(salt, salt_len, &alt_ctx); salt_len 511 ext/standard/crypt_sha512.c cp = s_bytes = alloca(salt_len); salt_len 512 ext/standard/crypt_sha512.c for (cnt = salt_len; cnt >= 64; cnt -= 64) { salt_len 532 ext/standard/crypt_sha512.c sha512_process_bytes(s_bytes, salt_len, &ctx); salt_len 566 ext/standard/crypt_sha512.c cp = __php_stpncpy(cp, salt, MIN((size_t) MAX(0, buflen), salt_len)); salt_len 567 ext/standard/crypt_sha512.c buflen -= (int) MIN((size_t) MAX(0, buflen), salt_len); salt_len 624 ext/standard/crypt_sha512.c ZEND_SECURE_ZERO(s_bytes, salt_len); salt_len 631 ext/standard/crypt_sha512.c ZEND_SECURE_ZERO(copied_salt, salt_len); salt_len 268 ext/standard/password.c size_t salt_len = 0, required_salt_len = 0, hash_format_len; salt_len 344 ext/standard/password.c salt_len = required_salt_len; salt_len 348 ext/standard/password.c salt_len = required_salt_len; salt_len 357 ext/standard/password.c salt_len = required_salt_len; salt_len 360 ext/standard/password.c salt[salt_len] = 0; salt_len 362 ext/standard/password.c hash = safe_emalloc(salt_len + hash_format_len, 1, 1); salt_len 364 ext/standard/password.c hash[hash_format_len + salt_len] = 0; salt_len 369 ext/standard/password.c hash_len = (int) (hash_format_len + salt_len); salt_len 26 ext/standard/php_crypt.h PHPAPI zend_string *php_crypt(const char *password, const int pass_len, const char *salt, int salt_len, zend_bool quiet);