Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.119
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
src /
php-7.4.33 /
ext /
hash /
tests /
Delete
Unzip
Name
Size
Permission
Date
Action
adler32.phpt
535
B
-rw-rw-r--
2022-10-31 11:36
bug52240.phpt
435
B
-rw-rw-r--
2022-10-31 11:36
bug64745.phpt
396
B
-rw-rw-r--
2022-10-31 11:36
bug70312.phpt
894
B
-rw-rw-r--
2022-10-31 11:36
bug73127.phpt
812
B
-rw-rw-r--
2022-10-31 11:36
crc32.phpt
4.73
KB
-rw-rw-r--
2022-10-31 11:36
fnv132.phpt
8.14
KB
-rw-rw-r--
2022-10-31 11:36
fnv164.phpt
9.44
KB
-rw-rw-r--
2022-10-31 11:36
fnv1a32.phpt
17.1
KB
-rw-rw-r--
2022-10-31 11:36
fnv1a64.phpt
19.46
KB
-rw-rw-r--
2022-10-31 11:36
gost.phpt
1.47
KB
-rw-rw-r--
2022-10-31 11:36
hash-clone.phpt
15.82
KB
-rw-rw-r--
2022-10-31 11:36
hash_algos.phpt
2.1
KB
-rw-rw-r--
2022-10-31 11:36
hash_copy_001.phpt
15.83
KB
-rw-rw-r--
2022-10-31 11:36
hash_equals.phpt
1.21
KB
-rw-rw-r--
2022-10-31 11:36
hash_error.phpt
1.26
KB
-rw-rw-r--
2022-10-31 11:36
hash_file_basic.phpt
1.28
KB
-rw-rw-r--
2022-10-31 11:36
hash_file_basic1.phpt
3.31
KB
-rw-rw-r--
2022-10-31 11:36
hash_file_error.phpt
1.84
KB
-rw-rw-r--
2022-10-31 11:36
hash_hkdf_basic.phpt
5.07
KB
-rw-rw-r--
2022-10-31 11:36
hash_hkdf_edges.phpt
1
KB
-rw-rw-r--
2022-10-31 11:36
hash_hkdf_error.phpt
3.15
KB
-rw-rw-r--
2022-10-31 11:36
hash_hkdf_rfc5869.phpt
4.69
KB
-rw-rw-r--
2022-10-31 11:36
hash_hmac_algos.phpt
1.05
KB
-rw-rw-r--
2022-10-31 11:36
hash_hmac_basic.phpt
2.93
KB
-rw-rw-r--
2022-10-31 11:36
hash_hmac_error.phpt
1.82
KB
-rw-rw-r--
2022-10-31 11:36
hash_hmac_file_basic.phpt
3.74
KB
-rw-rw-r--
2022-10-31 11:36
hash_hmac_file_error.phpt
2.15
KB
-rw-rw-r--
2022-10-31 11:36
hash_init_error.phpt
1.33
KB
-rw-rw-r--
2022-10-31 11:36
hash_pbkdf2_basic.phpt
2.04
KB
-rw-rw-r--
2022-10-31 11:36
hash_pbkdf2_error.phpt
2.72
KB
-rw-rw-r--
2022-10-31 11:36
hash_update_file.phpt
515
B
-rw-rw-r--
2022-10-31 11:36
hash_update_stream.phpt
350
B
-rw-rw-r--
2022-10-31 11:36
haval.phpt
3.89
KB
-rw-rw-r--
2022-10-31 11:36
hmac-md5.phpt
523
B
-rw-rw-r--
2022-10-31 11:36
joaat.phpt
510
B
-rw-rw-r--
2022-10-31 11:36
md2.phpt
675
B
-rw-rw-r--
2022-10-31 11:36
md4.phpt
698
B
-rw-rw-r--
2022-10-31 11:36
md5.phpt
386
B
-rw-rw-r--
2022-10-31 11:36
mhash_001.phpt
1.39
KB
-rw-rw-r--
2022-10-31 11:36
mhash_002.phpt
1.15
KB
-rw-rw-r--
2022-10-31 11:36
mhash_003.phpt
3.17
KB
-rw-rw-r--
2022-10-31 11:36
mhash_004.phpt
346
B
-rw-rw-r--
2022-10-31 11:36
new-context.phpt
253
B
-rw-rw-r--
2022-10-31 11:36
reuse.phpt
270
B
-rw-rw-r--
2022-10-31 11:36
ripemd128.phpt
937
B
-rw-rw-r--
2022-10-31 11:36
ripemd160.phpt
1009
B
-rw-rw-r--
2022-10-31 11:36
ripemd256.phpt
1.2
KB
-rw-rw-r--
2022-10-31 11:36
ripemd320.phpt
1.34
KB
-rw-rw-r--
2022-10-31 11:36
serialize-context.phpt
246
B
-rw-rw-r--
2022-10-31 11:36
sha1.phpt
648
B
-rw-rw-r--
2022-10-31 11:36
sha224.phpt
758
B
-rw-rw-r--
2022-10-31 11:36
sha256.phpt
806
B
-rw-rw-r--
2022-10-31 11:36
sha3.phpt
3.67
KB
-rw-rw-r--
2022-10-31 11:36
sha384.phpt
1.03
KB
-rw-rw-r--
2022-10-31 11:36
sha512-224.phpt
456
B
-rw-rw-r--
2022-10-31 11:36
sha512-256.phpt
480
B
-rw-rw-r--
2022-10-31 11:36
sha512.phpt
1.22
KB
-rw-rw-r--
2022-10-31 11:36
snefru.phpt
773
B
-rw-rw-r--
2022-10-31 11:36
tiger.phpt
533
B
-rw-rw-r--
2022-10-31 11:36
whirlpool.phpt
642
B
-rw-rw-r--
2022-10-31 11:36
Save
Rename
--TEST-- Hash: Test hash_pbkdf2() function : error functionality --FILE-- <?php /* {{{ proto string hash_pbkdf2(string algo, string password, string salt, int iterations [, int length = 0, bool raw_output = false]) Generate a PBKDF2 hash of the given password and salt Returns lowercase hexbits by default */ echo "*** Testing hash_pbkdf2() : error conditions ***\n"; $password = 'password'; $salt = 'salt'; echo "\n-- Testing hash_pbkdf2() function with less than expected no. of arguments --\n"; var_dump(hash_pbkdf2()); var_dump(hash_pbkdf2('md5')); var_dump(hash_pbkdf2('md5', $password)); var_dump(hash_pbkdf2('md5', $password, $salt)); echo "\n-- Testing hash_pbkdf2() function with more than expected no. of arguments --\n"; var_dump(hash_pbkdf2('md5', $password, $salt, 10, 10, true, 'extra arg')); echo "\n-- Testing hash_pbkdf2() function with invalid hash algorithm --\n"; var_dump(hash_pbkdf2('foo', $password, $salt, 1)); echo "\n-- Testing hash_pbkdf2() function with non-cryptographic hash algorithm --\n"; var_dump(hash_pbkdf2('crc32', $password, $salt, 1)); echo "\n-- Testing hash_pbkdf2() function with invalid iterations --\n"; var_dump(hash_pbkdf2('md5', $password, $salt, 0)); var_dump(hash_pbkdf2('md5', $password, $salt, -1)); echo "\n-- Testing hash_pbkdf2() function with invalid length --\n"; var_dump(hash_pbkdf2('md5', $password, $salt, 1, -1)); ?> ===Done=== --EXPECTF-- *** Testing hash_pbkdf2() : error conditions *** -- Testing hash_pbkdf2() function with less than expected no. of arguments -- Warning: hash_pbkdf2() expects at least 4 parameters, 0 given in %s on line %d NULL Warning: hash_pbkdf2() expects at least 4 parameters, 1 given in %s on line %d NULL Warning: hash_pbkdf2() expects at least 4 parameters, 2 given in %s on line %d NULL Warning: hash_pbkdf2() expects at least 4 parameters, 3 given in %s on line %d NULL -- Testing hash_pbkdf2() function with more than expected no. of arguments -- Warning: hash_pbkdf2() expects at most 6 parameters, 7 given in %s on line %d NULL -- Testing hash_pbkdf2() function with invalid hash algorithm -- Warning: hash_pbkdf2(): Unknown hashing algorithm: foo in %s on line %d bool(false) -- Testing hash_pbkdf2() function with non-cryptographic hash algorithm -- Warning: hash_pbkdf2(): Non-cryptographic hashing algorithm: crc32 in %s on line %d bool(false) -- Testing hash_pbkdf2() function with invalid iterations -- Warning: hash_pbkdf2(): Iterations must be a positive integer: 0 in %s on line %d bool(false) Warning: hash_pbkdf2(): Iterations must be a positive integer: -1 in %s on line %d bool(false) -- Testing hash_pbkdf2() function with invalid length -- Warning: hash_pbkdf2(): Length must be greater than or equal to 0: -1 in %s on line %d bool(false) ===Done===