Linux crypt function 1. Crypt definition
#define _XOPEN_SOURCE/* See Feature_test_macros (7) */#include Char *crypt (const char *key, const char *salt);
Above is the definition of crypt function seen by Man 3 crypt.See from the
Use crypt () in PHP for user authentication. The crypt () function returns a string encrypted with DES, Blowfish, or MD5. In different operating systems, the behavior of this function is different. some operating systems support more than one
There are many encryption functions in php functions, one of which can implement data encryption functions is called the crypt () function. The crypt () function uses a one-way algorithm without corresponding decryption functions. It returns a
The crypt () function returns a string encrypted with DES, Blowfish, or MD5. In different operating systems, the behavior of this function is different. Some operating systems support more than one algorithm type. During installation, PHP checks
Data encryptionData encryption uses cryptography technology to encrypt information, realize the concealment of information, and thus play a role in protecting information security. It uses the encryption algorithm and the encryption key to process
The back-end password store is via
crypt function +
salt , as follows:
pwd = crypt(value ,salt)
The salt format is $2a$08$aabbccddee , so the encryption algorithm should be blowfish , then the problem comes, how to implement the crypt function
Basic knowledgeThe password for the Linux user is implemented by the function crypt (). Crypt () is a cryptographic function (password encryption, plaintext into ciphertext), the function is based on the Data Encryption Standard (DES,DATA encryption)
Recently, some development programs are closely related to Linux users. I have never done any relevant learning before. I just stayed at useradd under shell,Passwd command, but has little knowledge about user authentication and password management.
The crypt () function returns a string that is encrypted using the DES, Blowfish, or MD5 algorithms.
On different operating systems, the function behaves differently, and some operating systems support more than one type of algorithm. At
This article mainly introduces several PHP encryption methods, which are very comprehensive and practical. they are often used in projects. if you need them, you can refer to the following PHP encryption methods:
1. MD5 encryption
String md5
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.