Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.112
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
src /
php-7.4.33 /
ext /
standard /
tests /
password /
Delete
Unzip
Name
Size
Permission
Date
Action
bug75221.phpt
390
B
-rw-rw-r--
2022-10-31 11:36
password_bcrypt_errors.phpt
1.39
KB
-rw-rw-r--
2022-10-31 11:36
password_default.phpt
164
B
-rw-rw-r--
2022-10-31 11:36
password_deprecated_salts.phpt
686
B
-rw-rw-r--
2022-10-31 11:36
password_get_info.phpt
1.01
KB
-rw-rw-r--
2022-10-31 11:36
password_get_info_argon2.phpt
1014
B
-rw-rw-r--
2022-10-31 11:36
password_hash.phpt
365
B
-rw-rw-r--
2022-10-31 11:36
password_hash_argon2.phpt
796
B
-rw-rw-r--
2022-10-31 11:36
password_hash_error.phpt
1.49
KB
-rw-rw-r--
2022-10-31 11:36
password_hash_error_argon2.phpt
1.15
KB
-rw-rw-r--
2022-10-31 11:36
password_needs_rehash.phpt
1.9
KB
-rw-rw-r--
2022-10-31 11:36
password_needs_rehash_argon2.phpt
1.05
KB
-rw-rw-r--
2022-10-31 11:36
password_needs_rehash_error.phpt
756
B
-rw-rw-r--
2022-10-31 11:36
password_verify.phpt
657
B
-rw-rw-r--
2022-10-31 11:36
password_verify_argon2.phpt
907
B
-rw-rw-r--
2022-10-31 11:36
password_verify_error.phpt
346
B
-rw-rw-r--
2022-10-31 11:36
Save
Rename
--TEST-- Test normal operation of password_needs_rehash() --FILE-- <?php //-=-=-=- // Invalid Hash, always rehash var_dump(password_needs_rehash('', PASSWORD_BCRYPT)); var_dump(password_needs_rehash('', 1)); var_dump(password_needs_rehash('', '2y')); // Valid, as it's an unknown algorithm var_dump(password_needs_rehash('', PASSWORD_DEFAULT)); var_dump(password_needs_rehash('', 0)); var_dump(password_needs_rehash('', NULL)); // Valid with cost the same var_dump(password_needs_rehash('$2y$10$MTIzNDU2Nzg5MDEyMzQ1Nej0NmcAWSLR.oP7XOR9HD/vjUuOj100y', PASSWORD_BCRYPT, array('cost' => 10))); // Valid with cost the same, additional params var_dump(password_needs_rehash('$2y$10$MTIzNDU2Nzg5MDEyMzQ1Nej0NmcAWSLR.oP7XOR9HD/vjUuOj100y', PASSWORD_BCRYPT, array('cost' => 10, 'foo' => 3))); // Invalid, different (lower) cost var_dump(password_needs_rehash('$2y$10$MTIzNDU2Nzg5MDEyMzQ1Nej0NmcAWSLR.oP7XOR9HD/vjUuOj100y', PASSWORD_BCRYPT, array('cost' => 0))); // Invalid, different (higher) cost var_dump(password_needs_rehash('$2y$10$MTIzNDU2Nzg5MDEyMzQ1Nej0NmcAWSLR.oP7XOR9HD/vjUuOj100y', PASSWORD_BCRYPT, array('cost' => 11))); // Valid with cost the default $cost = str_pad(PASSWORD_BCRYPT_DEFAULT_COST, 2, '0', STR_PAD_LEFT); var_dump(password_needs_rehash('$2y$'.$cost.'$MTIzNDU2Nzg5MDEyMzQ1Nej0NmcAWSLR.oP7XOR9HD/vjUuOj100y', PASSWORD_BCRYPT)); // Should Issue Needs Rehash, Since Foo is cast to 0... var_dump(password_needs_rehash('$2y$10$MTIzNDU2Nzg5MDEyMzQ1Nej0NmcAWSLR.oP7XOR9HD/vjUuOj100y', PASSWORD_BCRYPT, array('cost' => 'foo'))); // CRYPT_MD5 var_dump(password_needs_rehash(crypt('Example', '$1$'), PASSWORD_DEFAULT)); // CRYPT_SHA512 with 5000 var_dump(password_needs_rehash(crypt('Example', '$6$rounds=5000$aa$'), PASSWORD_DEFAULT)); echo "OK!"; ?> --EXPECT-- bool(true) bool(true) bool(true) bool(true) bool(true) bool(true) bool(false) bool(false) bool(true) bool(true) bool(false) bool(true) bool(true) bool(true) OK!