473,581 Members | 2,295 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Can PHP use a 41 bit hash to authenticate with MySQL?

I'm trying to develop under the newest MySQL using PHP. Problem is that
the newer versions of MySQL use a beafier hashing algorithm. I can
reverse the hash to a 16 bit one within MySQL, but I don't want to do
this because I would then only be able to access it with older
applications. (MySQL querybrowser will not work correctly in this case)
Is it possible to get PHP to use the newer 41 bit hash when
authenticating with MySQL?? Thanks

Matt

Jul 17 '05 #1
1 2035
Matt wrote:
I'm trying to develop under the newest MySQL using PHP. Problem is that
the newer versions of MySQL use a beafier hashing algorithm. I can
reverse the hash to a 16 bit one within MySQL, but I don't want to do
this because I would then only be able to access it with older
applications. (MySQL querybrowser will not work correctly in this case)
Is it possible to get PHP to use the newer 41 bit hash when
authenticating with MySQL?? Thanks

Matt


Sounds like you've been smoking hash... I think you meant "byte", not
"bit" above. I'm using MySQL 4.1.7 and PHP 5.0.3 and the longer
passwords in mysql.user work fine without me having to change a thing,
PHP or MySQL.

NM
Jul 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
2678
by: deko | last post by:
Can I use PHP and htaccess to authenticate users? My service provider lets me password protect directories on my web site - using htaccess. If a user tries to access a page within a password protected directory, a dialog is received requesting username and password. But I want to provide a login page that users go to first, and then are...
15
12645
by: Bonegavel | last post by:
Going to sound strange, but here i go. We use Windows 2000 AD for everything. However, we are also running XAMPP (basically Apache, MySQL, PHP for windows) on a Windows box for our Intranet. I have a few applications that need to authenticate via AD from PHP and every example I see uses the LDAP functions built into PHP. I cannot query...
4
1965
by: MARTIN DAVIES | last post by:
I hope you can help. My Linux MYSQL 3.23.52 database server is working OK generally. However, in a database I have a field name that ends with a # (hash UK as opposed to £ which is a pound UK) i.e. If I "select * from emptable" it works fine and the empnumber# field is listed correctly with all the other fields.
12
10771
by: Ian | last post by:
I'm hoping someome more knowledgeable than I can help me with a problem I'm having. I have been writing a system using PHP and MySQL and had it running for testing purposes on my own pc which is running Abyss web server software. Access to some of the website functionality is protected using the following kind of call: <?php if...
10
2435
by: Qiangning Hong | last post by:
I'm writing a spider. I have millions of urls in a table (mysql) to check if a url has already been fetched. To check fast, I am considering to add a "hash" column in the table, make it a unique key, and use the following sql statement: insert ignore into urls (url, hash) values (newurl, hash_of_newurl) to add new url. I believe this will...
9
1836
by: IamIan | last post by:
I'm using an array to store map features (name, lat, lon, caption, etc), from which the user can then select an individual feature. The problem is that when thousands of features are stored in the array, looping over the entire array looking for a match is SLOW. So I'm running a hash in parallel, where every time a feature is pushed onto...
5
3573
by: muralihkrishna | last post by:
hi friends, i m involved in a project in which the password is encrypted using md5 algorithm(password()) in mysql database. to authenticate whether the user is authorized or not, i have to encrypt his entered password and check with the database. can anyone help me how to encrypt the password in java and compare it with...
4
3399
by: MS | last post by:
Hi, I'm writing a PHP login script for a web site. I've looked at several examples on the web and some of them use MD5 hashes for the password. They do this in various ways. EG. a) Storing a MD5 hash of the original password in the database (in the password field), and then comparing the MD5 hash of the user entered
4
8008
by: poolboi | last post by:
hey guys, i'm not sure if u all know what hash algorithm is? it's supposed to make retrieval of data much faster i was wondering if there's such stuff in MySQL?
0
7862
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main...
0
7789
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language...
1
7894
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
0
8169
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
1
5670
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
5361
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3803
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
1
2300
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
1400
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.