77d583bbc2823975cfb1ec68ba6fb7a
Что бы сравнивать со значением в базе и не мучиться с плагинами в MySQL есть функция MD5().
|
$hash = md5( md5( $salt ) . md5( $password ) );
Passing query SELECT `member_id` FROM `core_members` WHERE `name` = 'Admin' AND `members_pass_hash` = MD5(MD5('0JTU7XJyyf56U2Rk8UcA8J').MD5('vfsdfgd1337')) | dd
[04:34:13] CMySQLHandler::ProcessQueryThread() - Error will be triggered to OnQueryError()
format(string, sizeof(string), "SELECT member_id FROM core_members WHERE name= '%s' AND members_pass_hash=MD5(CONCAT(MD5('%s'),MD5('%s')))", name, salt, password);
format(query, sizeof(query), "SELECT `member_id` FROM `core_members` WHERE `name` = '%s' AND `members_pass_hash` = MD5(CONCAT(MD5('%s'), '.', MD5('%s')))", GetPlayerNameEx(playerid), PlayerData[playerid][pPassSalt], password);
mysql_function_query(connectionHandle, query, true, "OnQueryFinished", "dd", playerid, THREAD_LOGIN);
case THREAD_LOGIN:
{
cache_get_data(rows, fields, connectionHandle);
if (!rows)
{
print("Пароль не верный");
}
else
{
print("Пароль верный");
}
}
$2a$13$0JTU7XJyyf56U2Rk8UcA8.6/HnivemOUSjgfi2LX3hZ.c3prn0wFS
ProcessQueryThread(OnQueryFinished) - Query was successful. (SELECT `member_id` FROM `core_members` WHERE `name` = 'Admin' AND `members_pass_hash` = MD5(CONCAT(MD5('0JTU7XJyyf56U2Rk8UcA8J'), '.', MD5('vfrfhjd1337'))))
$2a$13$0JTU7XJyyf56U2Rk8UcA8.6/HnivemOUSjgfi2LX3hZ.c3prn0wFS
У тебя неверный код создания паролей, потому что это
Код:
$2a$13$0JTU7XJyyf56U2Rk8UcA8.6/HnivemOUSjgfi2LX3hZ.c3prn0wFS |
IP.Board stores members' passwords as a salted hash. Both the hash and the salt are stored in the database in the members table as members_pass_hash and members_pass_salt, respectively.
The hash is the md5 sum of the md5 sum of the salt concatenated to the md5 sum of the plaintext password. Expressed in PHP code, this is as follows:
$hash = md5( md5( $salt ) . md5( $password ) );
Where:
$hash is the value stored in the database column members_pass_hash.
$salt is the value stored in the database column members_pass_salt.
$password is the plaintext password.
The salt, is a string of 5 random characters including letters, numbers and symbols (specifically, ASCII characters 33-126, excluding 92). You can easily generate a salt using the IPSMember::generatePasswordSalt() method.