Lines Matching refs:a
29 // The expected (and maximum) number of characters in a hashed password.
32 // Returns a string for mapping an int to the corresponding base 64 character.
75 * Generates a random base 64-encoded salt prefixed with settings for the hash.
77 * Proper use of salts may defeat a number of attacks, including:
88 * A 12 character string containing the iteration count and a random salt.
97 // 6 bytes is the standard salt for a portable phpass hash.
123 * Hash a password using a secure stretched hash.
125 * By using a salt and repeated hashing the password is "stretched". Its
128 * hashes of a large number of plain-text words or strings to find a match.
131 * The string name of a hashing algorithm usable by hash(), like 'sha256'.
179 // _password_base64_encode() of a 16 byte MD5 will always be 22 characters.
180 // _password_base64_encode() of a 64 byte sha512 will always be 86 characters.
185 // Parse the log2 iteration count from a stored hash or setting string.
192 * Hash a password using a secure hash.
198 * mass operations where a value less than the default is needed for speed.
201 * A string containing the hashed password (and a salt), or FALSE on failure.
212 * Check whether a plain text password matches a stored hashed password.
215 * $account object, for example the uid to look up the hash in a custom table
257 * Check whether a user's hashed password needs to be replaced with a new hash.
261 * has changed through a change in the variable password_count_log2 or