• 首页
  • vue
  • TypeScript
  • JavaScript
  • scss
  • css3
  • html5
  • php
  • MySQL
  • redis
  • jQuery
  • password_needs_rehash()

    (PHP 5 >= 5.5.0, PHP 7)

    检测散列值是否匹配指定的选项

    说明

    password_needs_rehash(string $hash,int $algo[,array $options]): bool

    此函数检测指定的散列值是否实现了提供的算法和选项。如果没有,需要重新生成散列值。

    参数

    $hash

    一个由password_hash()创建的散列值。

    $algo

    一个用来在散列密码时指示算法的密码算法常量。

    $options

    一个包含有选项的关联数组。目前支持两个选项:salt,在散列密码时加的盐(干扰字符串),以及cost,用来指明算法递归的层数。这两个值的例子可在crypt()页面找到。

    范例

    Example #1password_needs_rehash()用法

    <?php
    $password = 'rasmuslerdorf';
    $hash = '$2y$10$YCFsG6elYca568hBi2pZ0.3LDL5wjgxct1N8w/oLR/jfHsiQwCqTS';
    // 当硬件性能得到改善时,cost 参数可以再修改
    $options = array('cost' => 11);
    // 根据明文密码验证储存的散列
    if (password_verify($password, $hash)) {
        // 检测是否有更新的可用散列算法
        // 或者 cost 发生变化
        if (password_needs_rehash($hash, PASSWORD_DEFAULT, $options)) {
            // 如果是这样,则创建新散列,替换旧散列
            $newHash = password_hash($password, PASSWORD_DEFAULT, $options);
        }
        // 使用户登录
    }
    ?>
    

    返回值

    如果散列需要重新生成才能匹配指定的$algo$options,则返回TRUE,否则返回FALSE

    nick, this function cannot check if a string is a MD5 or SHA1 hash. It can only tell you if a password, hashed using the password_hash function, needs to be put through the hashing function again to keep up to date with the new defaults.
    The only time you can use this function is when your user logs in and you have already checked by means of password_verify that the password entered is actually correct. At that point, if password_needs_rehash returns true, you can put the plain text password through the password_hash function.
    ydroneaud this would be used on a login page, not at any other time.
    So if you have a site with MD5 passwords for example, and wish to upgrade to SHA256 for additional security you would put this check in the login script.
    This function will take a user's hash and say if it is SHA256, if it isn't then you can take the user's password which you still have as plaintext and rehash it as SHA256.
    This lets you gradually update the hashes in your database without disrupting any features or resetting passwords.
    This function can indeed be used to assist in transparently updating legacy passwords (those not using the password_hash() function - eg: perhaps something using MD5 or SHA1)
    In legacy sites, when authenticating a user (during login) first check the password using password_verify(). If that fails it may simply be because the user's password hash was created long ago by a legacy or home-brew password algorithm.
    You can then re-check the password against the site's legacy password algorithm. If that fails too, then the login fails, since the supplied password did not authenticate against either the new, or the old password tests.
    If any one of those two test was successfull, you know that the password is good so you would then call password_needs_rehash() on the stored hash, and it will properly indicate if the password hash needs to be re-computed, either because it's an unrecognised (legacy) hash or it's a modern hash created by password_hash(), which may just need its cost index updated.
    Simply store the recomputed hash in the database and you now have a password_verify() compatible password for that user and the second test can be skipped in future logins (but still check if it needs rehashing).
    Some other use-cases for the password_needs_rehash function is when you have specified using the PASSWORD_DEFAULT algorithm for password_hash.
    As mentioned on the Password Hashing Predefined Constants and password_hash pages, the algorithm used by PASSWORD_DEFAULT is subject to change as different versions of PHP are released.
    Additionally password_needs_rehash would be used if you have changed the optional cost or static salt (DO NOT USE A STATIC SALT) requirements of your password_hash options.
    Full example:
    <?php
    $new = [
      'options' => ['cost' => 11],
      'algo' => PASSWORD_DEFAULT,
      'hash' => null
    ];
    $password = 'rasmuslerdorf';
    //stored hash of password
    $oldHash = '$2y$07$BCryptRequires22Chrcte/VlQH0piJtjXl.0t1XkA8pw9dMXTpOq';
    //verify stored hash against plain-text password
    if (true === password_verify($password, $oldHash)) {
      //verify legacy password to new password_hash options
      if (true === password_needs_rehash($oldHash, $new['algo'], $new['options'])) {
        //rehash/store plain-text password using new hash
        $newHash = password_hash($password, $new['algo'], $new['options']);
        echo $newHash;
      }
    }
    ?>
    The above example will output something similar to:
    $2y$11$Wu5rN3u38.g/XWdUeA6Wj.PD.F0fLXXmZrMNFyzzg2UxkVmxlk41W