国产av日韩一区二区三区精品,成人性爱视频在线观看,国产,欧美,日韩,一区,www.成色av久久成人,2222eeee成人天堂

? ??? ?? PHP ???? WordPress ???? ?? ? ??? ???? ??

WordPress ???? ?? ? ??? ???? ??

Jul 28, 2016 am 08:28 AM
count gt output this

一。研究wordpress時wordpess的密碼密碼生成與登錄密碼驗證方式很重要

WordPress密碼已成為整合的首要目標(biāo),如何征服整合,就得了解WordPress密碼算法。

WordPress系統(tǒng)的用戶密碼是保存在wp_users數(shù)據(jù)表的user_pass字段,密碼是通過Portable PHP password hashing framework類產(chǎn)生的,密碼的形式是隨機(jī)且不可逆,同一個明文的密碼在不同時間,產(chǎn)生的密文也不一樣,相對來說較為安全。

二。密碼生成方式

> 隨機(jī)產(chǎn)生一個salt 并將salt和password相加
> 進(jìn)行了count次md5 然后和encode64的hash數(shù)值累加
> 最后得到一個以$P$開頭的密碼,這個密碼每次產(chǎn)生的結(jié)果都不一樣

以下為在wordpress中調(diào)用密碼生成的代碼

<?php
 $password = &#39;abc&#39;;
 global $wp_hasher;
 if ( empty($wp_hasher) ) {
  require_once( &#39;./wp-includes/class-phpass.php&#39;);
  $wp_hasher = new PasswordHash(8, TRUE);
 }
 echo $wp_hasher->HashPassword($password);
?>

三。wordpress密碼生成與登錄驗證

wordpress中位置為\wp-includes\class-phpass.php

以下是wordpress中生成密碼的代碼直接運行可查看密碼的生成以及驗證過程

<?php

class PasswordHash {
	var $itoa64;
	var $iteration_count_log2;
	var $portable_hashes;
	var $random_state;

	function PasswordHash($iteration_count_log2, $portable_hashes)
	{
		$this->itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz';

		if ($iteration_count_log2 < 4 || $iteration_count_log2 > 31)
			$iteration_count_log2 = 8;
		$this->iteration_count_log2 = $iteration_count_log2;

		$this->portable_hashes = $portable_hashes;

		$this->random_state = microtime() . uniqid(rand(), TRUE); // removed getmypid() for compability reasons
	}

	function get_random_bytes($count)
	{
		$output = '';
		if ( @is_readable('/dev/urandom') &&
		    ($fh = @fopen('/dev/urandom', 'rb'))) {
			$output = fread($fh, $count);
			fclose($fh);
		}

		if (strlen($output) < $count) {
			$output = &#39;&#39;;
			for ($i = 0; $i < $count; $i += 16) {
				$this->random_state =
				    md5(microtime() . $this->random_state);
				$output .=
				    pack('H*', md5($this->random_state));
			}
			$output = substr($output, 0, $count);
		}

		return $output;
	}

	function encode64($input, $count)
	{
		$output = '';
		$i = 0;
		do {
			$value = ord($input[$i++]);
			$output .= $this->itoa64[$value & 0x3f];
			if ($i < $count)
				$value |= ord($input[$i]) << 8;
			$output .= $this->itoa64[($value >> 6) & 0x3f];
			if ($i++ >= $count)
				break;
			if ($i < $count)
				$value |= ord($input[$i]) << 16;
			$output .= $this->itoa64[($value >> 12) & 0x3f];
			if ($i++ >= $count)
				break;
			$output .= $this->itoa64[($value >> 18) & 0x3f];
		} while ($i < $count);

		return $output;
	}

	function gensalt_private($input)
	{
		$output = &#39;$PXXXXX;
		$output .= $this->itoa64[min($this->iteration_count_log2 +
			((PHP_VERSION >= '5') ? 5 : 3), 30)];
		$output .= $this->encode64($input, 6);

		return $output;
	}

	function crypt_private($password, $setting)
	{
		$output = '*0';
		if (substr($setting, 0, 2) == $output)
			$output = '*1';

		$id = substr($setting, 0, 3);
		# We use "$P{1}quot;, phpBB3 uses "$H{1}quot; for the same thing
		if ($id != '$PXXXXX && $id != '$HXXXXX)
			return $output;

		$count_log2 = strpos($this->itoa64, $setting[3]);
		if ($count_log2 < 7 || $count_log2 > 30)
			return $output;

		$count = 1 << $count_log2;

		$salt = substr($setting, 4, 8);
		if (strlen($salt) != 8)
			return $output;

		# We&#39;re kind of forced to use MD5 here since it&#39;s the only
		# cryptographic primitive available in all versions of PHP
		# currently in use.  To implement our own low-level crypto
		# in PHP would result in much worse performance and
		# consequently in lower iteration counts and hashes that are
		# quicker to crack (by non-PHP code).
		if (PHP_VERSION >= '5') {
			$hash = md5($salt . $password, TRUE);
			do {
				$hash = md5($hash . $password, TRUE);
			} while (--$count);
		} else {
			$hash = pack('H*', md5($salt . $password));
			do {
				$hash = pack('H*', md5($hash . $password));
			} while (--$count);
		}

		$output = substr($setting, 0, 12);
		$output .= $this->encode64($hash, 16);

		return $output;
	}

	function gensalt_extended($input)
	{
		$count_log2 = min($this->iteration_count_log2 + 8, 24);
		# This should be odd to not reveal weak DES keys, and the
		# maximum valid value is (2**24 - 1) which is odd anyway.
		$count = (1 << $count_log2) - 1;

		$output = &#39;_&#39;;
		$output .= $this->itoa64[$count & 0x3f];
		$output .= $this->itoa64[($count >> 6) & 0x3f];
		$output .= $this->itoa64[($count >> 12) & 0x3f];
		$output .= $this->itoa64[($count >> 18) & 0x3f];

		$output .= $this->encode64($input, 3);

		return $output;
	}

	function gensalt_blowfish($input)
	{
		# This one needs to use a different order of characters and a
		# different encoding scheme from the one in encode64() above.
		# We care because the last character in our encoded string will
		# only represent 2 bits.  While two known implementations of
		# bcrypt will happily accept and correct a salt string which
		# has the 4 unused bits set to non-zero, we do not want to take
		# chances and we also do not want to waste an additional byte
		# of entropy.
		$itoa64 = './ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789';

		$output = '$2aXXXXX;
		$output .= chr(ord('0') + $this->iteration_count_log2 / 10);
		$output .= chr(ord('0') + $this->iteration_count_log2 % 10);
		$output .= 'XXXXX;

		$i = 0;
		do {
			$c1 = ord($input[$i++]);
			$output .= $itoa64[$c1 >> 2];
			$c1 = ($c1 & 0x03) << 4;
			if ($i >= 16) {
				$output .= $itoa64[$c1];
				break;
			}

			$c2 = ord($input[$i++]);
			$c1 |= $c2 >> 4;
			$output .= $itoa64[$c1];
			$c1 = ($c2 & 0x0f) << 2;

			$c2 = ord($input[$i++]);
			$c1 |= $c2 >> 6;
			$output .= $itoa64[$c1];
			$output .= $itoa64[$c2 & 0x3f];
		} while (1);

		return $output;
	}

	function HashPassword($password)
	{
		$random = '';

		if (CRYPT_BLOWFISH == 1 && !$this->portable_hashes) {
			$random = $this->get_random_bytes(16);
			$hash =
			    crypt($password, $this->gensalt_blowfish($random));
			if (strlen($hash) == 60)
				return $hash;
		}

		if (CRYPT_EXT_DES == 1 && !$this->portable_hashes) {
			if (strlen($random) < 3)
				$random = $this->get_random_bytes(3);
			$hash =
			    crypt($password, $this->gensalt_extended($random));
			if (strlen($hash) == 20)
				return $hash;
		}

		if (strlen($random) < 6)
			$random = $this->get_random_bytes(6);
		$hash =
		    $this->crypt_private($password,
		    $this->gensalt_private($random));
		if (strlen($hash) == 34)
			return $hash;

		# Returning '*' on error is safe here, but would _not_ be safe
		# in a crypt(3)-like function used _both_ for generating new
		# hashes and for validating passwords against existing hashes.
		return '*';
	}

	function CheckPassword($password, $stored_hash)
	{
		$hash = $this->crypt_private($password, $stored_hash);
		if ($hash[0] == '*')
			$hash = crypt($password, $stored_hash);

		return $hash == $stored_hash;
	}
}

//原始密碼
$passwordValue = "123456";

//生成密碼
$wp_hasher = new PasswordHash(8, TRUE);
$sigPassword = $wp_hasher->HashPassword($passwordValue);
echo "生成的密碼為:".$sigPassword;
echo "\n";

//驗證密碼
$data = $wp_hasher->CheckPassword($passwordValue,$sigPassword);
if($data){
    echo '密碼正確';
}else{
	echo '密碼錯誤';
}

?>
此為一個wordpres密碼生成與登錄驗證實例,其中HashPassword為生成密碼,CheckPassword為驗證密碼

itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'; 為以上提到的生成salt的基礎(chǔ)字符串。?

備注:由于csdn代碼顯示插件對特殊字符的限制。 請將以上代碼中 XXXXX替換為?$' ?注意有單引號,代碼中一共有5處

原博客鏈接:http://blog.csdn.net/chengfei112233/article/details/6939144/

以上就介紹了 wordpress密碼生成與登錄密碼驗證,包括了方面的內(nèi)容,希望對PHP教程有興趣的朋友有所幫助。

? ????? ??
? ?? ??? ????? ???? ??? ??????, ???? ?????? ????. ? ???? ?? ???? ?? ??? ?? ????. ???? ??? ???? ???? ??? ?? admin@php.cn?? ?????.

? AI ??

Undresser.AI Undress

Undresser.AI Undress

???? ?? ??? ??? ?? AI ?? ?

AI Clothes Remover

AI Clothes Remover

???? ?? ???? ??? AI ?????.

Video Face Swap

Video Face Swap

??? ??? AI ?? ?? ??? ???? ?? ???? ??? ?? ????!

???

??? ??

???++7.3.1

???++7.3.1

???? ?? ?? ?? ???

SublimeText3 ??? ??

SublimeText3 ??? ??

??? ??, ???? ?? ????.

???? 13.0.1 ???

???? 13.0.1 ???

??? PHP ?? ?? ??

???? CS6

???? CS6

??? ? ?? ??

SublimeText3 Mac ??

SublimeText3 Mac ??

? ??? ?? ?? ?????(SublimeText3)

???

??? ??

?? ????
1783
16
Cakephp ????
1727
56
??? ????
1577
28
PHP ????
1442
31
???
??? GT3 Pro? GT4? ???? ?????? ??? GT3 Pro? GT4? ???? ?????? Dec 29, 2023 pm 02:27 PM

?? ????? ??? ??? ??? ? Huawei ???? ???? ???. ? ? Huawei GT3pro? GT4? ?? ?? ?? ?????. ? ??? ???? ????? ???? ????. Huawei GT3pro? GT4? ???? ?????? 1. ?? GT4: 46mm? 41mm, ??? ?? ?? + ????? ?? ?? + ???? ?? ?? ????. GT3pro: 46.6mm ? 42.9mm, ??? ???? ?? + ??? ??/??? ?? + ??? ? ????. 2. ??? GT4: ?? Huawei Truseen5.5+ ????? ???? ??? ? ??????. GT3pro: ECG ???, ?? ? ??? ??

??: Windows 11?? ?? ??? ???? ?? ??: Windows 11?? ?? ??? ???? ?? Aug 24, 2023 am 09:48 AM

Windows 11?? ?? ??? ???? ?? ?? ??? ?? ??? ???? ??? ???? ?? ? ??? ? ? ????. ?? ??? ??? ???? ?? ?? ??? ??? ????. ?? ???? ?? ????. ??? ?? ?? ??? ??? ????. ??? ?? ????: ?? ??? ?? ? ???? ?? ?? ????? ????? ? ????. ??? ??? ????: ???? ?? ????? ?? ??? ??? ? ????. ?? ?? ????? ??: ?? ?? ?? ?? ????? ?? ??? ??? ? ????. ???? ???????. ????? ???? ? ??? ?? ? ??? ??? ? ????. ? ??? ???? ????? ???? ??? ?? ??? ???? ????. 1. Windows ? Microsoft Store ? ????

???? ???? ??? ???? ???? ??? Nov 20, 2023 am 10:01 AM

Count ??? ??? ?? ?? ?? ?? ???? ? ?????. ???, ??? ? Null ?? ????? ? ?? ??? ?????. Count ??? ?? ??? ??? ?? ??? ?????. CountA ??? ??? ???? ?? ?? ?? ?? ?? ???? ? ?????. ?? ??? ??? ?? ???? ??? ???, ??? ? ??? ??? ?? ?? ?? ?? ??? ?????.

iPhone?? App Store ??? ??? ? ?? ??? ???? ?? iPhone?? App Store ??? ??? ? ?? ??? ???? ?? Jul 29, 2023 am 08:22 AM

1?: ?? ?? ?? ?? Apple ??? ?? ??: ??? ???? ???? ?? ?? ???? ??? ?????. ??? ??? ??? ?? ?? ?? ?? ????. Apple ??? ????? ?? ????. Apple? ??? ?? ???? ???? AppStore? ??? ????? ?????. ??? ?? ?? Apple? ??? ????? ???? ?????. ??? ?? ??: "AppStore? ??? ? ??" ??? ??? ?? ???? ?? ??? ? ???? ??? ??? ????? ??????. Wi-Fi? ??? ??? ?? ????? ???? ??? ???? ???(?? > ??? > ???? ?? ??? > ??). iOS ??? ???????.

php提交表單通過后,彈出的對話框怎樣在當(dāng)前頁彈出,該如何解決 php提交表單通過后,彈出的對話框怎樣在當(dāng)前頁彈出,該如何解決 Jun 13, 2016 am 10:23 AM

php提交表單通過后,彈出的對話框怎樣在當(dāng)前頁彈出php提交表單通過后,彈出的對話框怎樣在當(dāng)前頁彈出而不是在空白頁彈出?想實現(xiàn)這樣的效果:而不是空白頁彈出:------解決方案--------------------如果你的驗證用PHP在后端,那么就用Ajax;僅供參考:HTML code

Vue2? ?? ?? ??? ??? ??? ??? ? ?? ??? ?? ?????????. Vue2? ?? ?? ??? ??? ??? ??? ? ?? ??? ?? ?????????. Dec 08, 2022 pm 08:22 PM

? ?? Vue ?? ??? ???? ? ??? ? ??? ?? ???? Vue2? ??? ???? ??? ???? ? ?? ??? ???? ?? ?? ???? ??? ??? ????!

watch4pro? ? ????, ??? gt???? watch4pro? ? ????, ??? gt???? Sep 26, 2023 pm 02:45 PM

Watch4pro? gt? ?? ?? ?? ??? ?? ??? ????? ??? ????. ???? ??, ???, ??? ??? ??? ?? ? ?? ??? ??? ??? ??? Watch 4 Pro? ? ??? ? ????. ?? ?? ?? ??? ?? ??? ??? ???? ??? ? ?? ??? ???? ?? GT ???? ? ??? ? ????. ?? ??? ??? ??? ??, ???? ?? ????? ???. ??? ??? ? ??? ? ????, ??? ??? ?? ??? ??? ???? ?? ??? ??? ?? ?? ????.

PHP? GD ???? ????? ??? ?????. PHP? GD ???? ????? ??? ?????. Mar 21, 2024 am 10:41 AM

? ???? PHP? GD ???? ????? ??? ???? ??? ?? ??? ??? ????. ? ?????? ????? ? ?? ??? ? ???? ? ??? ????. PHP? GD ???? ????? ??? ?????. ?? phpGD ?????? ??? ??? ?? ??? ??? ????? ???? ??, ?? ? ??? ? ????. ?? ?? ?? ??? ?? ???? ????? ??? ??? ? ????. ????? ?? ???? ????? ????? ?? ??? ?????. ??? ??? ??: imagecreate() ??? ???? ??? ???? ?????. ??? ??? ??: imagepng(), imagejpeg() ?? imagegif() ??

See all articles