required_salt_len  313 ext/standard/password.c 	size_t salt_len = 0, required_salt_len = 0, hash_format_len;
required_salt_len  343 ext/standard/password.c 			required_salt_len = 22;
required_salt_len  393 ext/standard/password.c 		if (buffer_len < required_salt_len) {
required_salt_len  394 ext/standard/password.c 			php_error_docref(NULL TSRMLS_CC, E_WARNING, "Provided salt is too short: %lu expecting %lu", (unsigned long) buffer_len, (unsigned long) required_salt_len);
required_salt_len  400 ext/standard/password.c 			salt = safe_emalloc(required_salt_len, 1, 1);
required_salt_len  401 ext/standard/password.c 			if (php_password_salt_to64(buffer, buffer_len, required_salt_len, salt) == FAILURE) {
required_salt_len  409 ext/standard/password.c 			salt_len = required_salt_len;
required_salt_len  411 ext/standard/password.c 			salt = safe_emalloc(required_salt_len, 1, 1);
required_salt_len  412 ext/standard/password.c 			memcpy(salt, buffer, (int) required_salt_len);
required_salt_len  413 ext/standard/password.c 			salt_len = required_salt_len;
required_salt_len  419 ext/standard/password.c 		salt = safe_emalloc(required_salt_len, 1, 1);
required_salt_len  420 ext/standard/password.c 		if (php_password_make_salt(required_salt_len, salt TSRMLS_CC) == FAILURE) {
required_salt_len  424 ext/standard/password.c 		salt_len = required_salt_len;