<?php
$password = crypt("My1sTpassword"); // let salt be generated
/* Si dovrebbe passare l'intero risultato di crypt() come chiave di confronto
della password per evitare problemi con differenti algoritmi di hash. (Come detto prima
lo standard basato su DES usa chiavi di 2 caratteri,
mentre lo standard basato su MD5 ne usa 12). */
if (crypt($user_input, $password) == $password) {
echo "Password verified!";
}
?>
Fatal error: Uncaught ArgumentCountError: crypt() expects exactly 2 arguments, 1 given in /in/iBVWf:3
Stack trace:
#0 /in/iBVWf(3): crypt(Object(SensitiveParameterValue))
#1 {main}
thrown in /in/iBVWf on line 3
Process exited with code 255.
Output for 8.0.0 - 8.0.30, 8.1.0 - 8.1.27
Fatal error: Uncaught ArgumentCountError: crypt() expects exactly 2 arguments, 1 given in /in/iBVWf:3
Stack trace:
#0 /in/iBVWf(3): crypt('My1sTpassword')
#1 {main}
thrown in /in/iBVWf on line 3
Process exited with code 255.
Notice: crypt(): No salt parameter was specified. You must use a randomly generated salt and a strong hash function to produce a secure hash. in /in/iBVWf on line 3
Notice: Undefined variable: user_input in /in/iBVWf on line 9