crypt
crypt
One-way string hashing
string **crypt** string $string string $salt
will return a hashed string using the
standard Unix -based algorithm or
alternative algorithms. is
compatible with . Therefore, password
hashes created by can be used with
.
crypt``password_verify``crypt``crypt``password_verify
Prior to PHP 8.0.0, the parameter was optional. However, creates a weak hash without the , and raises an error without it. Make sure to specify a strong enough salt for better security.
salt``crypt``salt``E_NOTICE
uses a strong hash, generates a strong salt, and applies proper rounds automatically. is a simple wrapper and compatible with existing password hashes. Use of is encouraged.
password_hash``password_hash``crypt``password_hash
The hash type is triggered by the salt argument.
If no salt is provided, PHP will
auto-generate either a standard two character (DES) salt, or a twelve
character (MD5), depending on the availability of MD5 crypt(). PHP sets a
constant named which indicates the
longest valid salt allowed by the available hashes.
CRYPT_SALT_LENGTH
The standard DES-based returns the
salt as the first two characters of the output. It also only uses the
first eight characters of , so longer strings
that start with the same eight characters will generate the same result
(when the same salt is used).
crypt``string
The following hash types are supported:
-
- Standard DES-based hash with a two character salt from the alphabet "./0-9A-Za-z". Using invalid characters in the salt will cause crypt() to fail.
CRYPT_STD_DES
- Standard DES-based hash with a two character salt from the alphabet "./0-9A-Za-z". Using invalid characters in the salt will cause crypt() to fail.
-
- Extended DES-based hash. The "salt" is a 9-character string consisting of an underscore followed by 4 characters of iteration count and 4 characters of salt. Each of these 4-character strings encode 24 bits, least significant character first. The values to are encoded as . Using invalid characters in the salt will cause crypt() to fail.
CRYPT_EXT_DES``0``63``./0-9A-Za-z
- Extended DES-based hash. The "salt" is a 9-character string consisting of an underscore followed by 4 characters of iteration count and 4 characters of salt. Each of these 4-character strings encode 24 bits, least significant character first. The values to are encoded as . Using invalid characters in the salt will cause crypt() to fail.
-
- MD5 hashing with a twelve character salt starting with $1$
CRYPT_MD5
- MD5 hashing with a twelve character salt starting with $1$
-
- Blowfish hashing with a salt as follows: "$2a$", "$2x$" or "$2y$", a two digit cost parameter, "$", and 22 characters from the alphabet "./0-9A-Za-z". Using characters outside of this range in the salt will cause crypt() to return a zero-length string. The two digit cost parameter is the base-2 logarithm of the iteration count for the underlying Blowfish-based hashing algorithm and must be in range 04-31, values outside this range will cause crypt() to fail. "$2x$" hashes are potentially weak; "$2a$" hashes are compatible and mitigate this weakness. For new hashes, "$2y$" should be used.
CRYPT_BLOWFISH
- Blowfish hashing with a salt as follows: "$2a$", "$2x$" or "$2y$", a two digit cost parameter, "$", and 22 characters from the alphabet "./0-9A-Za-z". Using characters outside of this range in the salt will cause crypt() to return a zero-length string. The two digit cost parameter is the base-2 logarithm of the iteration count for the underlying Blowfish-based hashing algorithm and must be in range 04-31, values outside this range will cause crypt() to fail. "$2x$" hashes are potentially weak; "$2a$" hashes are compatible and mitigate this weakness. For new hashes, "$2y$" should be used.
-
- SHA-256 hash with a sixteen character salt prefixed with $5$. If the salt string starts with 'rounds=<N>$', the numeric value of N is used to indicate how many times the hashing loop should be executed, much like the cost parameter on Blowfish. The default number of rounds is 5000, there is a minimum of 1000 and a maximum of 999,999,999. Any selection of N outside this range will be truncated to the nearest limit.
CRYPT_SHA256
- SHA-256 hash with a sixteen character salt prefixed with $5$. If the salt string starts with 'rounds=<N>$', the numeric value of N is used to indicate how many times the hashing loop should be executed, much like the cost parameter on Blowfish. The default number of rounds is 5000, there is a minimum of 1000 and a maximum of 999,999,999. Any selection of N outside this range will be truncated to the nearest limit.
-
- SHA-512 hash with a sixteen character salt prefixed with $6$. If the salt string starts with 'rounds=<N>$', the numeric value of N is used to indicate how many times the hashing loop should be executed, much like the cost parameter on Blowfish. The default number of rounds is 5000, there is a minimum of 1000 and a maximum of 999,999,999. Any selection of N outside this range will be truncated to the nearest limit.
CRYPT_SHA512
stringThe string to be hashed. - SHA-512 hash with a sixteen character salt prefixed with $6$. If the salt string starts with 'rounds=<N>$', the numeric value of N is used to indicate how many times the hashing loop should be executed, much like the cost parameter on Blowfish. The default number of rounds is 5000, there is a minimum of 1000 and a maximum of 999,999,999. Any selection of N outside this range will be truncated to the nearest limit.
Let op: > Using the algorithm, will result in the parameter being truncated to a maximum length of 72 bytes.
CRYPT_BLOWFISH``string
saltA salt string to base the hashing on. If not provided, the
behaviour is defined by the algorithm implementation and can lead to
unexpected results.
Returns the hashed string or a string that is shorter than 13 characters and is guaranteed to differ from the salt on failure.
Waarschuwing: > When validating passwords, a string comparison function that isn't vulnerable to timing attacks should be used to compare the output of to the previously known hash. PHP provides for this purpose.
crypt``hash_equals
Voorbeeld: examples
<?php
$user_input = 'rasmuslerdorf';
$hashed_password = '$6$rounds=1000000$NJy4rIPjpOaU$0ACEYGg/aKCY3v8O8AfyiO7CTfZQ8/W231Qfh2tRLmfdvFD6XfHk12u6hMr9cYIA4hnpjLNSTRtUwYr9km9Ij/';
// Validate an existing crypt() hash in a way that is compatible with non-PHP software.
if (hash_equals($hashed_password, crypt($user_input, $hashed_password))) {
echo "Password verified!";
}
?>
Opmerking: > There is no decrypt function, since uses a one-way algorithm.
crypt
hash_equals``password_hash