| @@ 260-272 (lines=13) @@ | ||
| 257 | * Generate a hash for user login |
|
| 258 | * @param string $password |
|
| 259 | */ |
|
| 260 | function bCrypt($password, $cost) |
|
| 261 | { |
|
| 262 | $salt = sprintf('$2y$%02d$', $cost); |
|
| 263 | if (function_exists('openssl_random_pseudo_bytes')) { |
|
| 264 | $salt .= bin2hex(openssl_random_pseudo_bytes(11)); |
|
| 265 | } else { |
|
| 266 | $chars = './ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; |
|
| 267 | for ($i = 0; $i < 22; $i++) { |
|
| 268 | $salt .= $chars[mt_rand(0, 63)]; |
|
| 269 | } |
|
| 270 | } |
|
| 271 | return crypt($password, $salt); |
|
| 272 | } |
|
| 273 | ||
| 274 | function cryption_before_defuse($message, $saltkey, $init_vect, $type = null, $scope = "public") |
|
| 275 | { |
|
| @@ 57-69 (lines=13) @@ | ||
| 54 | * Generate a hash for user login |
|
| 55 | * @param string $password |
|
| 56 | */ |
|
| 57 | function bCrypt($password, $cost) |
|
| 58 | { |
|
| 59 | $salt = sprintf('$2y$%02d$', $cost); |
|
| 60 | if (function_exists('openssl_random_pseudo_bytes')) { |
|
| 61 | $salt .= bin2hex(openssl_random_pseudo_bytes(11)); |
|
| 62 | } else { |
|
| 63 | $chars = './ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; |
|
| 64 | for ($i = 0; $i < 22; $i++) { |
|
| 65 | $salt .= $chars[mt_rand(0, 63)]; |
|
| 66 | } |
|
| 67 | } |
|
| 68 | return crypt($password, $salt); |
|
| 69 | } |
|
| 70 | ||
| 71 | /** |
|
| 72 | * Permits to encrypt a message using Defuse |
|