From 0e4171332c698ee588666f79d15f25a097051caa Mon Sep 17 00:00:00 2001 From: Dennis Bartlett Date: Tue, 8 Jan 2013 03:15:19 -0600 Subject: [PATCH] Update _posts/07-03-01-Password-Hashing.md MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Typo Found on line 13:  It will updated -> It will be updated  --- _posts/07-03-01-Password-Hashing.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_posts/07-03-01-Password-Hashing.md b/_posts/07-03-01-Password-Hashing.md index 1047368..3640e48 100644 --- a/_posts/07-03-01-Password-Hashing.md +++ b/_posts/07-03-01-Password-Hashing.md @@ -10,7 +10,7 @@ It is important that you properly [_hash_][3] passwords before storing them. Pas **Hashing passwords with `password_hash`** -In PHP 5.5 `password_hash` will be introduced. At this time it is using BCrypt, the strongest algorithm currently supported by PHP. It will updated in the future to support more algorithms as needed though. The `password_compat` library was created to provide forward compatibility for PHP >= 5.3.7. +In PHP 5.5 `password_hash` will be introduced. At this time it is using BCrypt, the strongest algorithm currently supported by PHP. It will be updated in the future to support more algorithms as needed though. The `password_compat` library was created to provide forward compatibility for PHP >= 5.3.7. Below we hash a string, we then check the hash against a new string. Because our two source strings are different ('secret-password' vs. 'bad-password') this login will fail.