Linux crypt function 1. Crypt definition
#define _XOPEN_SOURCE/* See Feature_test_macros (7) */#include Char *crypt (const char *key, const char *salt);
Above is the definition of crypt function seen by Man 3 crypt.See from the
There are many encryption functions in php functions, one of which can implement data encryption functions is called the crypt () function. The crypt () function uses a one-way algorithm without corresponding decryption functions. It returns a
Use crypt () in PHP to implement user authentication. read the instructions in PHP to use crypt () for user authentication. if you do not want to develop new encryption algorithms in PHP applications, you can also use the crypt () function provided
Use crypt () in PHP for user authentication. The crypt () function returns a string encrypted with DES, Blowfish, or MD5. In different operating systems, the behavior of this function is different. some operating systems support more than one
"Summary" as long as a bit of the experience of using a non-Windows platform may be familiar to crypt (), this function is called one-way encryption function, it can encrypt some of the code, but can not in turn to convert the password to the
Functions of the PHP function crypt. We know that the data encryption function is available. today we will introduce one of the functions that can implement data encryption: the PHP function crypt (). As the PHP function crypt (), we know that there
Learn crypt ()
As long as there is a bit of experience with non-Windows platform readers can be quite familiar with crypt (), this function is called one-way encryption function, it can encrypt some plaintext, but not in turn, the password is
In the development of PHP applications, if you do not want to develop new encryption algorithms, you can also use the crypt () function of PHP to complete the one-way encryption function.
Understanding Crypt ()
As long as you have a bit of
Data encryptionData encryption uses cryptography technology to encrypt information, realize the concealment of information, and thus play a role in protecting information security. It uses the encryption algorithm and the encryption key to process
The crypt () function returns a string encrypted with DES, Blowfish, or MD5. In different operating systems, the behavior of this function is different. Some operating systems support more than one algorithm type. During installation, PHP checks
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.