This method actually generates an Apache MD5 compatible md5-encoded password hash from a plaintext password and a salt.
This method actually generates an Apache MD5 compatible md5-encoded password hash from a plaintext password and a salt.
The resulting string will be in the form '$apr1$<salt>$<hashed mess>'
param password Plaintext password param salt A short string to use to randomize md5. May start with $apr1$, which will be ignored. It is explicitly permitted to pass a pre-existing MD5Crypt'ed password entry as the salt. crypt() will strip the salt chars out properly.
An Apache-compatible md5-hashed password string.
This method generates an Apache MD5 compatible md5-encoded password hash from a plaintext password and a salt.
This method generates an Apache MD5 compatible md5-encoded password hash from a plaintext password and a salt.
The resulting string will be in the form '$apr1$<salt>$<hashed mess>'
Plaintext password
An Apache-compatible md5-hashed password string.
convert an encoded unsigned byte value into a int with the unsigned value.
This method actually generates md5-encoded password hash from a plaintext password, a salt, and a magic string.
This method actually generates md5-encoded password hash from a plaintext password, a salt, and a magic string.
There are two magic strings that make sense to use here.. '$1$' is the magic string used by the FreeBSD/Linux/OpenBSD MD5Crypt algorithm, and '$apr1$' is the magic string used by the Apache MD5Crypt algorithm.
The resulting string will be in the form '<magic><salt>$<hashed mess>
param password Plaintext password param salt A short string to use to randomize md5. May start with the magic string, which will be ignored. It is explicitly permitted to pass a pre-existing MD5Crypt'ed password entry as the salt. crypt() will strip the salt chars out properly. param magic Either "$apr1$" or "$1$", which controls whether we are doing Apache-style or FreeBSD-style md5Crypt.
An md5-hashed password string.
This method actually generates a OpenBSD/FreeBSD/Linux PAM compatible md5-encoded password hash from a plaintext password and a salt.
This method actually generates a OpenBSD/FreeBSD/Linux PAM compatible md5-encoded password hash from a plaintext password and a salt.
The resulting string will be in the form '$1$<salt>$<hashed mess>'
Plaintext password
A short string to use to randomize md5. May start with $1$, which will be ignored. It is explicitly permitted to pass a pre-existing MD5Crypt'ed password entry as the salt. crypt() will strip the salt chars out properly.
An OpenBSD/FreeBSD/Linux-compatible md5-hashed password field.
This method actually generates a OpenBSD/FreeBSD/Linux PAM compatible md5-encoded password hash from a plaintext password and a salt.
This method actually generates a OpenBSD/FreeBSD/Linux PAM compatible md5-encoded password hash from a plaintext password and a salt.
The resulting string will be in the form '$1$<salt>$<hashed mess>'
Plaintext password
An OpenBSD/FreeBSD/Linux-compatible md5-hashed password field.
This method tests a plaintext password against a md5Crypt'ed hash and returns true if the password matches the hash.
This method tests a plaintext password against a md5Crypt'ed hash and returns true if the password matches the hash.
This method will work properly whether the hashtext was crypted using the default FreeBSD md5Crypt algorithm or the Apache md5Crypt variant.
The plaintext password text to test.
The Apache or FreeBSD-md5Crypted hash used to authenticate the plaintextPass.