setting 641 ext/standard/basic_functions.c ZEND_ARG_INFO(0, setting) setting 4079 ext/standard/basic_functions.c char *setting; setting 4089 ext/standard/basic_functions.c if (zend_parse_parameters(ZEND_NUM_ARGS(), "s", &setting, &setting_len) == FAILURE) { setting 4093 ext/standard/basic_functions.c if(setting_len == 0 || setting[0] == '=') { setting 4098 ext/standard/basic_functions.c pe.putenv_string = estrndup(setting, setting_len); setting 4099 ext/standard/basic_functions.c pe.key = estrndup(setting, setting_len); setting 654 ext/standard/crypt_blowfish.c static char *BF_crypt(const char *key, const char *setting, setting 680 ext/standard/crypt_blowfish.c if (setting[0] != '$' || setting 681 ext/standard/crypt_blowfish.c setting[1] != '2' || setting 682 ext/standard/crypt_blowfish.c setting[2] < 'a' || setting[2] > 'z' || setting 683 ext/standard/crypt_blowfish.c !flags_by_subtype[(unsigned int)(unsigned char)setting[2] - 'a'] || setting 684 ext/standard/crypt_blowfish.c setting[3] != '$' || setting 685 ext/standard/crypt_blowfish.c setting[4] < '0' || setting[4] > '3' || setting 686 ext/standard/crypt_blowfish.c setting[5] < '0' || setting[5] > '9' || setting 687 ext/standard/crypt_blowfish.c (setting[4] == '3' && setting[5] > '1') || setting 688 ext/standard/crypt_blowfish.c setting[6] != '$') { setting 693 ext/standard/crypt_blowfish.c count = (BF_word)1 << ((setting[4] - '0') * 10 + (setting[5] - '0')); setting 694 ext/standard/crypt_blowfish.c if (count < min || BF_decode(data.binary.salt, &setting[7], 16)) { setting 701 ext/standard/crypt_blowfish.c flags_by_subtype[(unsigned int)(unsigned char)setting[2] - 'a']); setting 773 ext/standard/crypt_blowfish.c memcpy(output, setting, 7 + 22 - 1); setting 775 ext/standard/crypt_blowfish.c BF_atoi64[(int)setting[7 + 22 - 1] - 0x20] & 0x30]; setting 786 ext/standard/crypt_blowfish.c static int _crypt_output_magic(const char *setting, char *output, int size) setting 795 ext/standard/crypt_blowfish.c if (setting[0] == '*' && setting[1] == '0') setting 821 ext/standard/crypt_blowfish.c char *php_crypt_blowfish_rn(const char *key, const char *setting, setting 839 ext/standard/crypt_blowfish.c _crypt_output_magic(setting, output, size); setting 840 ext/standard/crypt_blowfish.c retval = BF_crypt(key, setting, output, size, 16); setting 853 ext/standard/crypt_blowfish.c (unsigned int)(unsigned char)setting[2] - 'a']; setting 855 ext/standard/crypt_blowfish.c buf.s[2] = setting[2]; setting 881 ext/standard/crypt_blowfish.c _crypt_output_magic(setting, output, size); setting 22 ext/standard/crypt_blowfish.h extern int _crypt_output_magic(const char *setting, char *output, int size); setting 24 ext/standard/crypt_blowfish.h extern char *php_crypt_blowfish_rn(const char *key, const char *setting, setting 614 ext/standard/crypt_freesec.c _crypt_extended_r(const char *key, const char *setting, setting 637 ext/standard/crypt_freesec.c if (*setting == _PASSWORD_EFMT1) { setting 644 ext/standard/crypt_freesec.c int value = ascii_to_bin(setting[i]); setting 645 ext/standard/crypt_freesec.c if (ascii64[value] != setting[i]) setting 653 ext/standard/crypt_freesec.c int value = ascii_to_bin(setting[i]); setting 654 ext/standard/crypt_freesec.c if (ascii64[value] != setting[i]) setting 676 ext/standard/crypt_freesec.c memcpy(data->output, setting, 9); setting 687 ext/standard/crypt_freesec.c if (ascii_is_unsafe(setting[0]) || ascii_is_unsafe(setting[1])) setting 690 ext/standard/crypt_freesec.c salt = (ascii_to_bin(setting[1]) << 6) setting 691 ext/standard/crypt_freesec.c | ascii_to_bin(setting[0]); setting 693 ext/standard/crypt_freesec.c data->output[0] = setting[0]; setting 694 ext/standard/crypt_freesec.c data->output[1] = setting[1]; setting 729 ext/standard/crypt_freesec.c _crypt_extended(const char *key, const char *setting) setting 739 ext/standard/crypt_freesec.c return _crypt_extended_r(key, setting, &data); setting 33 ext/standard/crypt_freesec.h char *_crypt_extended_r(const char *key, const char *setting,