PHP hash function [duplicate] - php

This question already has answers here:
Is SHA-256 Case Insensitive?
(4 answers)
Closed 5 years ago.
Recently I started to make an UCP for a game server but I come to a problem. The game server hash passwords with sha256 and salt. The hashed password look like this 399B77A0AD470496AE09579C2CA3FAF2F01E8A63D9F4ECFA6F60E32CE2E7E5E9
but the php hash function for sha256 give this hash 399b77a0ad470496ae09579c2ca3faf2f01e8a63d9f4ecfa6f60e32ce2e7e5e9.
When the user input and the password from database it's compared, they are not the same and user can't login.
How to ignore uppercase/lowercase or how to make the hash function to hash the input in uppercase?

Just do:
strtoupper($your-lower-case-hash)

Another option to Matias solution would be
if (0 === strcasecmp($phpHash, $mysqlHash)) {}
see http://php.net/manual/en/function.strcasecmp.php

Related

Neccesary to fetch hash from database ? password_hash bcrypt [duplicate]

This question already has an answer here:
Trying to understand password_verify PHP
(1 answer)
Closed 5 years ago.
I use PHP's password_hash and bcrypt algorithm to hash my passwords. They are in MySQL database.
password_hash($password, PASSWORD_BCRYPT);
As obvious every hash generated by this function is different. But is it really necessary, to identify user by email/login or something to grab his hash from database and then verify it with PHP's password_verify()?
Is it really necessary to make this query and then check?
I mean, is it possible to check hash before, and after only do query to check if it matches this one in MySQL?
Or something else maybe? I remember years ago I used something like checking inside query, like
WHERE login = $login and pass = PASSWORD($password)
Especially I mean this PASSWORD($password)?
Is there other option than fetch user's hash from Database and then verify this hash with password_verify()?
Yes, it's necessary. You need the unique salt generated during hashing, encoded as part of the hash, to do the comparison. That's also exactly why this algorithm is so strong for password storage.

Best way encrypt password php (in 2017) [duplicate]

This question already has answers here:
Secure hash and salt for PHP passwords
(14 answers)
Closed 5 years ago.
In my website I use md5 to crypt password user in my database (and store session user)
$pswUser = md5($_POST["password"]);
But I have just been told that this way of encrypting has become obsolete
I did some research to find out how to do it but most of the posts dates from two or three years ago
So what is the best way to encrypt password in 2017 ?
Thank you
Isn't duplicate discussion ...
Secure hash and salt for PHP passwords => 2009 ...
The password hash function in combination with password verify
https://secure.php.net/manual/en/function.password-hash.php
https://secure.php.net/manual/en/function.password-verify.php

Comparing two encrypted string with blowfish - php [duplicate]

This question already has answers here:
PHP Crypt() Compare two crypted strings
(5 answers)
Closed 8 years ago.
I generated an encrypted string with using blowfish encryption function (crypt()) in php and stored it in database. How can I check correctness of submitted password then?
For eg. during registration, I defined my pass as "1234" and then generated a random key and then my blowfish encrypted password something like "$2a$08$xPIviMLmVMHLQdzb$$$$$.OdQVKDPJeK4KIcdqnngIgv41lILjKR." So, when user comes back, how can I check correctness of his/her password? Is there any comparing function of two encrypted string from the same base password or another efficient way? Thanks in advance.
Simply pass the user input from the form into the crypt function, with the hash in the database.
For example:
<?php
if (crypt($passwordFromPost, $hashedPasswordInDb) == $hashedPasswordInDb)
{
// User has been authenticated
}
Passwords are usually not encrypted but hashed. It is not possible to regenerate the original password from a hash.
To find out more about password hashing in PHP the manual is a good starting point PHP manual

Convert md5 encrypted password to decrypted password wordpress [duplicate]

This question already has answers here:
Is it possible to decrypt MD5 hashes?
(24 answers)
Closed 8 years ago.
I want to get real password which is converted by wordpress into md5 format.
For example,
my md5 password is - 62cc2d8b4bf2d8728120d052163a77df
Real password - demo123.
I want to get real password from md5 version.
I tried this but didn't give me what I want -http://md5encryption.com/
You cannot unhash a password. That is the whole reason you hash a password in the first place.
It is possible to 'brute' force a password, or use a rainbow table to lookup the password - but that is why you (hopefully) used a salt on the password to ensure the hash is unique.

MD5 password decryption [duplicate]

This question already has answers here:
Closed 12 years ago.
Possible Duplicate:
Is it possible to decrypt md5 hashes?
Reversing an MD5 Hash
hi there is any way to decrypt md5 password field to allow user to edit password in form using javascript. or php.
MD5 is one way hashing algorithm - not a means of encrypting. As such, there's no means of decrypting it - only checking to see if another source input has the same hash.
No, there is no way, since hashing is not a reversible operation.
Your question is not very clear, but recovery of the origional string for hashes can be done with rainbowtables: http://en.wikipedia.org/wiki/Rainbow_table
(if the hash was salted, this will become troublesome ofcourse)
I wrote an app a few years back that brute-forces MD5 hashes against wordlists and previously-cracked MD5 hashes it finds via search engines, see if it comes up with anything for you:
http://bigtrapeze.com/md5/

Categories