-
-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[NFR] Phalcon\Security to support $2y$ bcrypt hashes #1971
Comments
|
@phalcon Basing on http://www.php.net/security/crypt_blowfish.php maybe we should drop official support for PHP up to 5.3.7 exclusively? PHP up to 5.3.10 have a lot of security vulnerabilities and I doubt that they are used in production. |
I'm not an expert, but as far as I understand according to this: |
Interesting because the code is absolutely the same :-) My tests:
http://lxr.php.net/xref/PHP_5_5/ext/standard/crypt_blowfish.c#548 The bug affected the possibility of collisions, not the number of iterations so it is expected that the has generation time will be nearly the same. |
I have no other explanation other than there was an error in my tests. There is still difference about 4 times between Phalcon\Security and password_hash generated hashes, but I presume this is due to different ways of salt generating. |
You closed this too early :-) I was adding support for additional hash types :-) |
Oh, sorry :) |
Fix submitted. See https://github.com/sjinks/cphalcon/blob/issue-1971/ext/tests/issue-1971.phpt for usage example |
Impressive! |
Currently only$2a$ bcrypt hash is available. An option to choose $2y$ would be very nice, so that it is compatible with PHP 5.5+ function password_hash();
The text was updated successfully, but these errors were encountered: