????JFIF??x?x????'
| Server IP : 79.136.114.73 / Your IP : 216.73.216.55 Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64 User : www-data ( 33) PHP Version : 5.5.9-1ubuntu4.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /proc/self/root/home/b8009/php-5.6.22/ext/hash/tests/ |
Upload File : |
--TEST--
Test hash_pbkdf2() function : error functionality
--SKIPIF--
<?php extension_loaded('hash') or die('skip: hash extension not loaded.'); ?>
--FILE--
<?php
/* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int length = 0, bool raw_output = false])
Generate a PBKDF2 hash of the given password and salt
Returns lowercase hexbits by default */
echo "*** Testing hash_pbkdf2() : error conditions ***\n";
$password = 'password';
$salt = 'salt';
echo "\n-- Testing hash_pbkdf2() function with less than expected no. of arguments --\n";
var_dump(@hash_pbkdf2());
echo $php_errormsg . "\n";
var_dump(@hash_pbkdf2('crc32'));
echo $php_errormsg . "\n";
var_dump(@hash_pbkdf2('crc32', $password));
echo $php_errormsg . "\n";
var_dump(@hash_pbkdf2('crc32', $password, $salt));
echo $php_errormsg . "\n";
echo "\n-- Testing hash_pbkdf2() function with more than expected no. of arguments --\n";
var_dump(@hash_pbkdf2('crc32', $password, $salt, 10, 10, true, 'extra arg'));
echo $php_errormsg . "\n";
echo "\n-- Testing hash_pbkdf2() function with invalid hash algorithm --\n";
var_dump(@hash_pbkdf2('foo', $password, $salt, 1));
echo $php_errormsg . "\n";
echo "\n-- Testing hash_pbkdf2() function with invalid iterations --\n";
var_dump(@hash_pbkdf2('md5', $password, $salt, 0));
echo $php_errormsg . "\n";
var_dump(@hash_pbkdf2('md5', $password, $salt, -1));
echo $php_errormsg . "\n";
echo "\n-- Testing hash_pbkdf2() function with invalid length --\n";
var_dump(@hash_pbkdf2('md5', $password, $salt, 1, -1));
echo $php_errormsg . "\n\n";
?>
===Done===
--EXPECT--
*** Testing hash_pbkdf2() : error conditions ***
-- Testing hash_pbkdf2() function with less than expected no. of arguments --
NULL
hash_pbkdf2() expects at least 4 parameters, 0 given
NULL
hash_pbkdf2() expects at least 4 parameters, 1 given
NULL
hash_pbkdf2() expects at least 4 parameters, 2 given
NULL
hash_pbkdf2() expects at least 4 parameters, 3 given
-- Testing hash_pbkdf2() function with more than expected no. of arguments --
NULL
hash_pbkdf2() expects at most 6 parameters, 7 given
-- Testing hash_pbkdf2() function with invalid hash algorithm --
bool(false)
hash_pbkdf2(): Unknown hashing algorithm: foo
-- Testing hash_pbkdf2() function with invalid iterations --
bool(false)
hash_pbkdf2(): Iterations must be a positive integer: 0
bool(false)
hash_pbkdf2(): Iterations must be a positive integer: -1
-- Testing hash_pbkdf2() function with invalid length --
bool(false)
hash_pbkdf2(): Length must be greater than or equal to 0: -1
===Done===