php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay
files >> /opt/php-7.0.1/ext/hash/tests/ |
files >> //opt/php-7.0.1/ext/hash/tests/hash_pbkdf2_error.phpt |
--TEST-- Test hash_pbkdf2() function : error functionality --SKIPIF-- <?php extension_loaded('hash') or die('skip: hash extension not loaded.'); ?> --FILE-- <?php /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int length = 0, bool raw_output = false]) Generate a PBKDF2 hash of the given password and salt Returns lowercase hexbits by default */ echo "*** Testing hash_pbkdf2() : error conditions ***\n"; $password = 'password'; $salt = 'salt'; echo "\n-- Testing hash_pbkdf2() function with less than expected no. of arguments --\n"; var_dump(@hash_pbkdf2()); echo $php_errormsg . "\n"; var_dump(@hash_pbkdf2('crc32')); echo $php_errormsg . "\n"; var_dump(@hash_pbkdf2('crc32', $password)); echo $php_errormsg . "\n"; var_dump(@hash_pbkdf2('crc32', $password, $salt)); echo $php_errormsg . "\n"; echo "\n-- Testing hash_pbkdf2() function with more than expected no. of arguments --\n"; var_dump(@hash_pbkdf2('crc32', $password, $salt, 10, 10, true, 'extra arg')); echo $php_errormsg . "\n"; echo "\n-- Testing hash_pbkdf2() function with invalid hash algorithm --\n"; var_dump(@hash_pbkdf2('foo', $password, $salt, 1)); echo $php_errormsg . "\n"; echo "\n-- Testing hash_pbkdf2() function with invalid iterations --\n"; var_dump(@hash_pbkdf2('md5', $password, $salt, 0)); echo $php_errormsg . "\n"; var_dump(@hash_pbkdf2('md5', $password, $salt, -1)); echo $php_errormsg . "\n"; echo "\n-- Testing hash_pbkdf2() function with invalid length --\n"; var_dump(@hash_pbkdf2('md5', $password, $salt, 1, -1)); echo $php_errormsg . "\n\n"; ?> ===Done=== --EXPECT-- *** Testing hash_pbkdf2() : error conditions *** -- Testing hash_pbkdf2() function with less than expected no. of arguments -- NULL hash_pbkdf2() expects at least 4 parameters, 0 given NULL hash_pbkdf2() expects at least 4 parameters, 1 given NULL hash_pbkdf2() expects at least 4 parameters, 2 given NULL hash_pbkdf2() expects at least 4 parameters, 3 given -- Testing hash_pbkdf2() function with more than expected no. of arguments -- NULL hash_pbkdf2() expects at most 6 parameters, 7 given -- Testing hash_pbkdf2() function with invalid hash algorithm -- bool(false) hash_pbkdf2(): Unknown hashing algorithm: foo -- Testing hash_pbkdf2() function with invalid iterations -- bool(false) hash_pbkdf2(): Iterations must be a positive integer: 0 bool(false) hash_pbkdf2(): Iterations must be a positive integer: -1 -- Testing hash_pbkdf2() function with invalid length -- bool(false) hash_pbkdf2(): Length must be greater than or equal to 0: -1 ===Done===y~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`