Hi Anthony,

I'm using this python module which claims to mimic the encyption used
in phpBB:
https://github.com/exavolt/python-phpass
It seems to be working fine so far.

Here are some examples:

In [11]: import phpass

In [12]: from phpass import PasswordHash

In [13]: p = PasswordHash()

In [14]: password = 'mypassword'

In [15]: hash1 = p.hash_password(password)

In [16]: hash2 = p.hash_password(password)

In [17]: hash3 = p.hash_password(password)

In [18]: hash1 == hash2
Out[18]: False

In [19]: hash1 == hash3
Out[19]: False

In [20]: hash2 == hash3
Out[20]: False

In [22]: p.check_password(password, hash1)
Out[22]: True

In [23]: p.check_password(password, hash2)
Out[23]: True

In [24]: p.check_password(password, hash3)
Out[24]: True

In [25]: wrongHash = p.hash_password('notmypassword')

In [26]: p.check_password(password, wrongHash)
Out[26]: False


With regard to the issue of the hash being different every time, I
reckon it is because this algorithm uses a salt (http://
en.wikipedia.org/wiki/Salt_%28cryptography%29). Apparently it is more
secure...

Regards,

John

On Dec 16, 4:07 pm, Anthony <abasta...@gmail.com> wrote:
> > Unfortunately this solution will not work for me as I get a different
> > hash every time I call the hash password function for the same
> > plaintext password.
>
> What hash function are you using. If you use the same key, it should always
> return the same output for a given input.

Reply via email to