$password = crypt('mypassword'); // let the salt be automatically generated
echo $password.'
and count is'.strlen($password).'
';
/* You should pass the entire results of crypt() as the salt for comparing a
password, to avoid problems when different hashing algorithms are used. (As
it says above, standard DES-based password hashing uses a 2-character salt,
but MD5-based hashing uses 12.) */
$user_input = 'mypassword';
if (crypt($user_input,'$6$rounds=5000$usesomesillystringforsalt$') == $password) {
echo "Password verified!";
}
else
echo 'Password not verified';
In other way, you can define the key to open
$password = crypt('mypassword','$6$rounds=5000$usesomesillystringforsalt$'); // Hash with sha 256
echo $password.'
and count is'.strlen($password).'
';
/* You should pass the entire results of crypt() as the salt for comparing a
password, to avoid problems when different hashing algorithms are used. (As
it says above, standard DES-based password hashing uses a 2-character salt,
but MD5-based hashing uses 12.) */
$user_input = 'mypassword';
if (crypt($user_input,'$6$rounds=5000$usesomesillystringforsalt$') == $password) {
echo "Password verified!";
}
else
echo 'Password not verified';
Also have some algorith available
if (CRYPT_STD_DES == 1) {
echo 'Standard DES: ' . crypt('rasmuslerdorf', 'rl') . "\n";
}
if (CRYPT_EXT_DES == 1) {
echo 'Extended DES: ' . crypt('rasmuslerdorf', '_J9..rasm') . "\n";
}
if (CRYPT_MD5 == 1) {
echo 'MD5: ' . crypt('rasmuslerdorf', '$1$rasmusle$') . "\n";
}
if (CRYPT_BLOWFISH == 1) {
echo 'Blowfish: ' . crypt('rasmuslerdorf', '$2a$07$usesomesillystringforsalt$') . "\n";
}
if (CRYPT_SHA256 == 1) {
echo 'SHA-256: ' . crypt('rasmuslerdorf', '$5$rounds=5000$usesomesillystringforsalt$') . "\n";
}
if (CRYPT_SHA512 == 1) {
echo 'SHA-512: ' . crypt('rasmuslerdorf', '$6$rounds=5000$usesomesillystringforsalt$') . "\n";
}