required_salt_len 313 ext/standard/password.c size_t salt_len = 0, required_salt_len = 0, hash_format_len; required_salt_len 343 ext/standard/password.c required_salt_len = 22; required_salt_len 393 ext/standard/password.c if (buffer_len < required_salt_len) { required_salt_len 394 ext/standard/password.c php_error_docref(NULL TSRMLS_CC, E_WARNING, "Provided salt is too short: %lu expecting %lu", (unsigned long) buffer_len, (unsigned long) required_salt_len); required_salt_len 400 ext/standard/password.c salt = safe_emalloc(required_salt_len, 1, 1); required_salt_len 401 ext/standard/password.c if (php_password_salt_to64(buffer, buffer_len, required_salt_len, salt) == FAILURE) { required_salt_len 409 ext/standard/password.c salt_len = required_salt_len; required_salt_len 411 ext/standard/password.c salt = safe_emalloc(required_salt_len, 1, 1); required_salt_len 412 ext/standard/password.c memcpy(salt, buffer, (int) required_salt_len); required_salt_len 413 ext/standard/password.c salt_len = required_salt_len; required_salt_len 419 ext/standard/password.c salt = safe_emalloc(required_salt_len, 1, 1); required_salt_len 420 ext/standard/password.c if (php_password_make_salt(required_salt_len, salt TSRMLS_CC) == FAILURE) { required_salt_len 424 ext/standard/password.c salt_len = required_salt_len;