YII2用户登录系统(会员中心)源码解析

在Yii2的basic版本中默认是从一个数组验证用户名和密码,如何改为从数据表中查询验证呢?且数据库的密码要为哈希加密密码验证?

下面我们就一步一步解析Yii2的登录过程。

一. 创建user表模型

表结构如下:

CREATE TABLE `user` (
  `id` int(11) NOT NULL AUTO_INCREMENT,
  `pid` int(11) NOT NULL DEFAULT '0' COMMENT '父id',
  `username` char(70) NOT NULL COMMENT '用户名',
  `password` char(70) NOT NULL COMMENT '密码',
  `type` tinyint(4) NOT NULL DEFAULT '4' COMMENT '类型(1:总店,2:门店,3:管理员)',
  `created_time` int(11) NOT NULL COMMENT '注册时间',
  `updated_time` int(11) NOT NULL COMMENT '修改时间',
  `status` tinyint(4) NOT NULL DEFAULT '1' COMMENT '封禁状态,0禁止1正常',
  `login_ip` char(20) NOT NULL COMMENT '登录ip',
  `login_time` int(11) NOT NULL COMMENT '上一次登录时间',
  `login_count` int(10) NOT NULL DEFAULT '0' COMMENT '登陆次数',
  `update_password` int(10) NOT NULL DEFAULT '0' COMMENT '修改密码次数',
  PRIMARY KEY (`id`),
  KEY `pid` (`pid`),
  KEY `username` (`username`),
  KEY `type` (`type`),
  KEY `status` (`status`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='登录管理表';

使用Gii创建user模型

将Yii2 basic之前user模型代码导入现在user中(先备份之前basic中的user模型)

  1 namespace app\models;
  2 
  3 use Yii;
  4 
  5 /**
  6  * This is the model class for table "user".
  7  *
  8  * @property integer $id
  9  * @property integer $pid
 10  * @property string $username
 11  * @property string $password
 12  * @property integer $type
 13  * @property integer $created_time
 14  * @property integer $updated_time
 15  * @property integer $status
 16  * @property string $login_ip
 17  * @property integer $login_time
 18  * @property integer $login_count
 19  * @property integer $update_password
 20  */
 21 class User extends \yii\db\ActiveRecord  implements \yii\web\IdentityInterface 
 22 {   public $authKey;
 23    /*public $id;
 24     public $username;
 25     public $password;
 26     public $authKey;
 27     public $accessToken;
 28 
 29     private static $users = [
 30         '100' => [
 31             'id' => '100',
 32             'username' => 'admin',
 33             'password' => 'admin',
 34             'authKey' => 'test100key',
 35             'accessToken' => '100-token',
 36         ],
 37         '101' => [
 38             'id' => '101',
 39             'username' => 'demo',
 40             'password' => 'demo',
 41             'authKey' => 'test101key',
 42             'accessToken' => '101-token',
 43         ],
 44     ];
 45 */
 46 
 47     /**
 48      * @inheritdoc
 49      */
 50     public static function tableName()
 51     {
 52         return 'user';
 53     }
 54 
 55     /**
 56      * @inheritdoc
 57      */
 58     public function rules()
 59     {
 60         return [
 61             [['pid', 'type', 'created_time', 'updated_time', 'status', 'login_time', 'login_count', 'update_password'], 'integer'],
 62             [['username', 'password', 'created_time', 'updated_time', 'login_ip', 'login_time'], 'required'],
 63             [['username', 'password'], 'string', 'max' => 70],
 64             [['login_ip'], 'string', 'max' => 20]
 65         ];
 66     }
 67 
 68     /**
 69      * @inheritdoc
 70      */
 71     public function attributeLabels()
 72     {
 73         return [
 74             'id' => 'ID',
 75             'pid' => 'Pid',
 76             'username' => 'Username',
 77             'password' => 'Password',
 78             'type' => 'Type',
 79             'created_time' => 'Created Time',
 80             'updated_time' => 'Updated Time',
 81             'status' => 'Status',
 82             'login_ip' => 'Login Ip',
 83             'login_time' => 'Login Time',
 84             'login_count' => 'Login Count',
 85             'update_password' => 'Update Password',
 86         ];
 87     }
 88 
 89     /**
 90      * @inheritdoc
 91      */
 92     public static function findIdentity($id)
 93     {
 94         return static::findOne($id);
 95         //return isset(self::$users[$id]) ? new static(self::$users[$id]) : null;
 96     }
 97 
 98     /**
 99      * @inheritdoc
100      */
101     public static function findIdentityByAccessToken($token, $type = null)
102     {
103         return static::findOne(['access_token' => $token]);
104         /*foreach (self::$users as $user) {
105             if ($user['accessToken'] === $token) {
106                 return new static($user);
107             }
108         }
109 
110         return null;*/
111     }
112 
113     /**
114      * Finds user by username
115      *
116      * @param  string      $username
117      * @return static|null
118      */
119     public static function findByUsername($username)
120     {
121           $user = User::find()
122             ->where(['username' => $username])
123             ->asArray()
124             ->one();
125 
126             if($user){
127             return new static($user);
128         }
129 
130         return null;
131         /*foreach (self::$users as $user) {
132             if (strcasecmp($user['username'], $username) === 0) {
133                 return new static($user);
134             }
135         }
136 
137         return null;*/
138     }
139 
140     /**
141      * @inheritdoc
142      */
143     public function getId()
144     {
145         return $this->id;
146     }
147 
148     /**
149      * @inheritdoc
150      */
151     public function getAuthKey()
152     {
153         return $this->authKey;
154     }
155 
156     /**
157      * @inheritdoc
158      */
159     public function validateAuthKey($authKey)
160     {
161         return $this->authKey === $authKey;
162     }
163 
164     /**
165      * Validates password
166      *
167      * @param  string  $password password to validate
168      * @return boolean if password provided is valid for current user
169      */
170     public function validatePassword($password)
171     {
172         return $this->password === $password;
173     }
174 }

之前的basic中User模型是继承了\yii\base\Object,为什么要继承这个类,那是因为

 1 #在\yii\base\Object中,有构造方法
 2  public function __construct($config = [])
 3     {
 4         if (!empty($config)) {
 5             Yii::configure($this, $config);
 6         }
 7         $this->init();
 8     }   
 9 #继续追踪Yii::configure($this, $config)代码如下 
10 public static function configure($object, $properties)
11     {
12         foreach ($properties as $name => $value) {
13             $object->$name = $value;
14         }
15 
16         return $object;
17     }
18 #正是因为有这两个方法,所以在User.php中
19 public static function findByUsername($username)
20     {
21         foreach (self::$users as $user) {
22             if (strcasecmp($user['username'], $username) === 0) {
23                 return new static($user);
24             }
25         }
26 
27         return null;
28     }
29 #将$user传递过来,通过static,返回一个User的实例。

当通过数据表查询时候没有必要再继承\yii\base\Object,因为不必为类似原来类变量赋值了。这个时候需要User模型继承\yii\db\ActiveRecord,因为要查询用。

findIdentity是根据传递的id返回对应的用户信息,getId返回用户id,getAuthKey和validateAuthKey是作用于登陆中的–记住我。这个authKey是唯一的,当再次登陆时,从cookie中获取authKey传递给validateAuthKey,验证通过,就登陆成功。

 

 二. 模拟用户数据登录

插入一条用户模拟数据

1
INSERT INTO `user` (`username`, `password`) VALUES ('admin', '123')

 

控制器Controller

 1     /**
 2      * 登录
 3      */
 4     public function actionLogin() {
 5          if (!\Yii::$app->user->isGuest) {
 6             return $this->goHome();
 7         }
 8 
 9         $model = new LoginForm(); 
10         if ($model->load(Yii::$app->request->post()) && $model->login()) {
11             
12           
13             $this->redirect(array('charisma/index'));
14         } else {
15             return $this->render('login', [
16                         'model' => $model,
17             ]);
18         }
19     }

veiws中的login.php

 1 <div class="well col-md-5 center login-box">
 2                         <div class="alert alert-info">
 3                             请填写您的用户名和密码
 4                         </div>
 5                         
 6                         <?php $form = ActiveForm::begin([
 7                               'id' => 'login-form',
 8                         ]); ?>
 9 
10                             <fieldset>
11                                 <div class="input-group input-group-lg">
12                                     <span class="input-group-addon"><i class="glyphicon glyphicon-user red"></i></span>
13                                      <?php echo Html::input('type','LoginForm[username]', $model->username, ['class'=>'form-control','placeholder'=>'Username']); ?>
14                                 </div>
15                                 <div class="clearfix"></div><br>
16                                 <div class="input-group input-group-lg">
17                                     <span class="input-group-addon"><i class="glyphicon glyphicon-lock red"></i></span>
18                                      <?php echo Html::input('password','LoginForm[password]', $model->password, ['class'=>'form-control','placeholder'=>'Password']); ?>
19                                 </div>
20                                 <div class="clearfix"></div>
21                                
22                                 <div class="clearfix"></div>
23                                 <p class="center col-md-5"> 
24                                     <input type="submit" class="btn btn-primary" value="Login"> 
25                                 </p>
26                             </fieldset>
27                         <?php ActiveForm::end();?>
28                         
29                         <?php
30                         if($model->errors){
31                             echo '用户名或密码错误';
32                             print_r($model->errors);
33                         }
34                         
35 
36                         
37                         ?>
38                         
39                     </div>

 

用户名admin, 密码123, 登录ok!

问题来了,我们使用的是明文保存的密码,这样很不安全,所以我们必须要把用户注册时的密码哈希加密后再保存到数据库。

 

注*

如若修改登录的表要修改main.php 配置:

'components' => [
       
        'user' => [
            'identityClass' => 'app\models\Customer',
            'enableAutoLogin' => true,
        ],

将identityClass中common\models\User 改为app\models\Customer, 此时Customer表便可为定了表

 

三. Yii的密码加密

YII2对密码加密生成的结果是不同的,即用相同的初始密码在不同时间得到的加密结果不同,所以我们不能用常用的方法去验证密码是否正确(将密码加密后与数据库中的密码相比较)。YII2有自己的加密以及密码验证流程。

加密

$hash = Yii::$app->getSecurity()->generatePasswordHash('123456');

 

验证

Yii::$app->getSecurity()->validatePassword('123456', $hash) ; #,返回true或false

 

我们先通过Yii的加密机制加密 “123” 获取哈希密码为:  $2y$13$eXQl9YCo5XcKqqy9ymd2t.SuOvpXYERidceXoT/bPt4iwmOW3GiBy

修改模拟数据admin的密码:

UPDATE `user` SET `password`='$2y$13$eXQl9YCo5XcKqqy9ymd2t.SuOvpXYERidceXoT/bPt4iwmOW3GiBy' WHERE (`username`='admin')

 

四.密码验证过程

在控制器中我们通过 实例化LoginForm,

Yii::$app->request->post()来获取post提交的值,通过$model->load()加载post数据

然后$model->login() 就是验证登录

$model = new LoginForm(); 
        if ($model->load(Yii::$app->request->post()) && $model->login()) { 
            $this->redirect(array('charisma/index'));
        }

我们跳转到app\models\LoginForm的login方法

复制代码
 public function login()
    { 

        if ($this->validate()) {

            return Yii::$app->user->login($this->getUser(), $this->rememberMe ? 3600*24*30 : 0);
        } else {
            return false;
        }
    }

login方法又是通过一个validate验证方法 继承vendor/yiisoft/yii2/base/Model.php

该验证方法描述是这样的:Performs the data validation.  This method executes the validation rules applicable to the current [[scenario]]. The following criteria are used to determine whether a rule is currently applicable:  – the rule must be associated with the attributes relevant to the current scenario;     – the rules must be effective for the current scenario.  This method will call [[beforeValidate()]] and [[afterValidate()]] before and after the actual validation, respectively. If [[beforeValidate()]] returns false, the validation will be cancelled and [[afterValidate()]] will not be called.  Errors found during the validation can be retrieved via [[getErrors()]], [[getFirstErrors()]] and [[getFirstError()]].

我们打开model类的validate()

 public function validate($attributeNames = null, $clearErrors = true)
    {
        if ($clearErrors) {
            $this->clearErrors();
        }

        if (!$this->beforeValidate()) {
            return false;
        }

        $scenarios = $this->scenarios();
        $scenario = $this->getScenario();
        if (!isset($scenarios[$scenario])) {
            throw new InvalidParamException("Unknown scenario: $scenario");
        }

        if ($attributeNames === null) {
            $attributeNames = $this->activeAttributes();
        }

        foreach ($this->getActiveValidators() as $validator) {
            $validator->validateAttributes($this, $attributeNames);
        }
        $this->afterValidate();

        return !$this->hasErrors();
    }

也就是说获取到场景且没有错误的话,将场景yii\validators\RequiredValidator Object的每一个属性实例化为对应Form规则(rules)实例

 foreach ($this->getActiveValidators() as $validator) {
            $validator->validateAttributes($this, $attributeNames);
        }

现在找到LoginForm的验证规则

    /**
     * @return array the validation rules.
     */
    public function rules()
    {
        return [
            // username and password are both required
            [['username', 'password'], 'required'],
            // rememberMe must be a boolean value
            ['rememberMe', 'boolean'],
            // password is validated by validatePassword()
            ['password', 'validatePassword'],
        ];
    }

其中username,password 必填, rememberMe为波尔类型, password通过ValidatePassword方法来验证

查看validatePassword方法

   /**
     * Validates the password.
     * This method serves as the inline validation for password.
     *
     * @param string $attribute the attribute currently being validated
     * @param array $params the additional name-value pairs given in the rule
     */
    public function validatePassword($attribute, $params)
    {
        if (!$this->hasErrors()) {
            $user = $this->getUser();

            if (!$user || !$user->validatePassword($this->password)) {
                $this->addError($attribute, 'Incorrect username or password.');
            }
        }
    }

首先$this->getUser()会判断在user表中是否有username=“admin”,如果存在就返回一个user的实例

 public static function findByUsername($username) {
      $user = User::find()
                ->where(['username' => $username])
                ->asArray()
                ->one();
        if ($user) {
            return new static($user);
        }

        return null;

    }

通过$user->validatePassword($this->password) 判断验证密码,这个是最关键的一步

因为之前通过$this->getUser 已经实例化了user表,所以validatePassword在User模型的原始代码是这样的

    /**
     * Validates password
     *
     * @param  string  $password password to validate
     * @return boolean if password provided is valid for current user
     */
    public function validatePassword($password) {

        return $this->password === $password;
    }

获取用户输入的密码, 再和数据库中的密码做对比,如果密码相同就通过验证。

现在我们已经把密码123改为哈希密码:$2y$13$eXQl9YCo5XcKqqy9ymd2t.SuOvpXYERidceXoT/bPt4iwmOW3GiBy

所以要通过Yii2 自带的验证 Yii::$app->getSecurity()->validatePassword(‘123456’, $hash) ; 进行验证

所以validatePassword方法的代码应该修改如下:

  /**
     * Validates password
     *
     * @param  string  $password password to validate
     * @return boolean if password provided is valid for current user
     */
    public function validatePassword($password) {

        return  Yii::$app->getSecurity()->validatePassword($password, $this->password);   
    }

完整的LoginForm模型和User模型代码如下:

 1 <?php
 2 
 3 namespace app\models;
 4 
 5 use Yii;
 6 use yii\base\Model;
 7 
 8 /**
 9  * LoginForm is the model behind the login form.
10  */
11 class LoginForm extends Model
12 {
13     public $username;
14     public $password;
15     public $rememberMe = true;
16 
17     private $_user = false;
18 
19 
20     /**
21      * @return array the validation rules.
22      */
23     public function rules()
24     {
25         return [
26             // username and password are both required
27             [['username', 'password'], 'required'],
28             // rememberMe must be a boolean value
29             ['rememberMe', 'boolean'],
30             // password is validated by validatePassword()
31             ['password', 'validatePassword'],
32         ];
33     }
34 
35     /**
36      * Validates the password.
37      * This method serves as the inline validation for password.
38      *
39      * @param string $attribute the attribute currently being validated
40      * @param array $params the additional name-value pairs given in the rule
41      */
42     public function validatePassword($attribute, $params)
43     {
44         if (!$this->hasErrors()) {
45             $user = $this->getUser();
46 
47             if (!$user || !$user->validatePassword($this->password)) {
48                 $this->addError($attribute, 'Incorrect username or password.');
49             }
50         }
51     }
52 
53     /**
54      * Logs in a user using the provided username and password.
55      * @return boolean whether the user is logged in successfully
56      */
57     public function login()
58     { 
59         if ($this->validate()) {
60             return Yii::$app->user->login($this->getUser(), $this->rememberMe ? 3600*24*30 : 0);
61         } else {
62             return false;
63         }
64     }
65 
66     /**
67      * Finds user by [[username]]
68      *
69      * @return User|null
70      */
71     public function getUser()
72     {
73         if ($this->_user === false) {
74             $this->_user = User::findByUsername($this->username);
75         }
76 
77         return $this->_user;
78     }
79 }
<?php

namespace app\models;

use Yii;

/**
 * This is the model class for table "user".
 *
 * @property integer $id
 * @property integer $pid
 * @property string $username
 * @property string $password
 * @property integer $type
 * @property integer $created_time
 * @property integer $updated_time
 * @property integer $status
 * @property string $login_ip
 * @property integer $login_time
 * @property integer $login_count
 * @property integer $update_password
 */
class User extends \yii\db\ActiveRecord  implements \yii\web\IdentityInterface 
{
    public $authKey;
    /**
     * @inheritdoc
     */
    public static function tableName()
    {
        return 'user';
    }

    /**
     * @inheritdoc
     */
    public function rules()
    {
        return [
            [['pid', 'type', 'created_time', 'updated_time', 'status', 'login_time', 'login_count', 'update_password'], 'integer'],
            [['username', 'password', 'created_time', 'updated_time', 'login_ip', 'login_time'], 'required'],
            [['username', 'password'], 'string', 'max' => 70],
            [['login_ip'], 'string', 'max' => 20]
        ];
    }

    /**
     * @inheritdoc
     */
    public function attributeLabels()
    {
        return [
            'id' => 'ID',
            'pid' => 'Pid',
            'username' => 'Username',
            'password' => 'Password',
            'type' => 'Type',
            'created_time' => 'Created Time',
            'updated_time' => 'Updated Time',
            'status' => 'Status',
            'login_ip' => 'Login Ip',
            'login_time' => 'Login Time',
            'login_count' => 'Login Count',
            'update_password' => 'Update Password',
        ];
    }
    
     /**
     * @inheritdoc
     */
    public static function findIdentity($id) {
        return static::findOne($id);
    }

    /**
     * @inheritdoc
     */
    public static function findIdentityByAccessToken($token, $type = null) {
        return null;
    }

    /**
     * Finds user by username
     *
     * @param  string      $username
     * @return static|null
     */
    public static function findByUsername($username) {
        $user = User::find()
                ->where(['username' => $username])
                ->asArray()
                ->one();
        if ($user) {
            return new static($user);
        }

        return null;
    }

    /**
     * @inheritdoc
     */
    public function getId() {
        return $this->id;
    }

    /**
     * @inheritdoc
     */
    public function getAuthKey() {
        return $this->authKey;
    }

    /**
     * @inheritdoc
     */
    public function validateAuthKey($authKey) {
        return $this->authKey === $authKey;
    }

    /**
     * Validates password
     *
     * @param  string  $password password to validate
     * @return boolean if password provided is valid for current user
     */
    public function validatePassword($password) {

        return  Yii::$app->getSecurity()->validatePassword($password, $this->password);   #,返回true或false
    }

    
    
    #-------------------------------------辅助验证-----------------------------------------------------------
    
    
    public function createhashpasswd(){
     echo   Yii::$app->getSecurity()->generatePasswordHash('123');
    }

}

ok,这样就实现了哈希加密的用户登录了。

 


 

 Yii的 密码验证

 

crypt() 函数

crypt() 函数返回使用 DES、Blowfish 或 MD5 算法加密的字符串。

在不同的操作系统上,该函数的行为不同,某些操作系统支持一种以上的算法类型。在安装时,PHP 会检查什么算法可用以及使用什么算法。

具体的算法依赖于 salt 参数的格式和长度。通过增加由使用特定加密方法的特定字符串所生成的字符串数量,salt 可以使加密更安全。

这里有一些和 crypt() 函数一起使用的常量。这些常量值是在安装时由 PHP 设置的。

常量:

[CRYPT_SALT_LENGTH] 默认的加密长度。使用标准的 DES 加密,长度为 2
[CRYPT_STD_DES] 基于标准 DES 算法的散列使用 “./0-9A-Za-z” 字符中的两个字符作为盐值。在盐值中使用非法的字符将导致 crypt() 失败。
[CRYPT_EXT_DES] 扩展的基于 DES 算法的散列。其盐值为 9 个字符的字符串,由 1 个下划线后面跟着 4 字节循环次数和 4 字节盐值组成。它们被编码成可打印字符,每个字符 6 位,有效位最少的优先。0 到 63 被编码为 “./0-9A-Za-z”。在盐值中使用非法的字符将导致 crypt() 失败。
[CRYPT_MD5] MD5 散列使用一个以 $1$ 开始的 12 字符的字符串盐值。
[CRYPT_BLOWFISH] Blowfish 算法使用如下盐值:“$2a$”,一个两位 cost 参数,“$” 以及 64 位由 “./0-9A-Za-z” 中的字符组合而成的字符串。在盐值中使用此范围之外的字符将导致 crypt() 返回一个空字符串。两位 cost 参数是循环次数以 2 为底的对数,它的范围是 04-31,超出这个范围将导致 crypt() 失败。
CRYPT_SHA256 SHA-256 算法使用一个以 $5$ 开头的 16 字符字符串盐值进行散列。如果盐值字符串以 “rounds=<N>$” 开头,N 的数字值将被用来指定散列循环的执行次数,这点很像 Blowfish 算法的 cost 参数。默认的循环次数是 5000,最小是 1000,最大是 999,999,999。超出这个范围的 N 将会被转换为最接近的值。
CRYPT_SHA512 SHA-512 算法使用一个以 $6$ 开头的 16 字符字符串盐值进行散列。如果盐值字符串以 “rounds=<N>$” 开头,N 的数字值将被用来指定散列循环的执行次数,这点很像 Blowfish 算法的 cost 参数。默认的循环次数是 5000,最小是 1000,最大是 999,999,999。超出这个范围的 N 将会被转换为最接近的值。

在该函数支持多种算法的系统上,如果支持上述常量则设置为 “1”,否则设置为 “0”。

注释:没有相应的解密函数。crypt() 函数使用一种单向算法。

测试不同的算法

// 两字符 salt
if (CRYPT_STD_DES == 1)
{
echo "Standard DES: ".crypt('something','st')."\n<br>";
}
else
{
echo "Standard DES not supported.\n<br>";
}

// 4 字符 salt
if (CRYPT_EXT_DES == 1)
{
echo "Extended DES: ".crypt('something','_S4..some')."\n<br>";
}
else
{
echo "Extended DES not supported.\n<br>";
}

//以 $1$ 开始的 12 字符
if (CRYPT_MD5 == 1)
{
echo "MD5: ".crypt('something','$1$somethin$')."\n<br>";
}
else
{
echo "MD5 not supported.\n<br>";
}

// 以 $2a$ 开始的 Salt。双数字的 cost 参数:09. 22 字符
if (CRYPT_BLOWFISH == 1)
{
echo "Blowfish: ".crypt('something','$2a$09$anexamplestringforsalt$')."\n<br>";
}
else
{
echo "Blowfish DES not supported.\n<br>";
}

// 以 $5$ 开始的 16 字符 salt。周长的默认数是 5000。
if (CRYPT_SHA256 == 1)
{
echo "SHA-256: ".crypt('something','$5$rounds=5000$anexamplestringforsalt$')."\n<br>"; }
else
{
echo "SHA-256 not supported.\n<br>";
}

// 以 $5$ 开始的 16 字符 salt。周长的默认数是 5000。
if (CRYPT_SHA512 == 1)
{
echo "SHA-512: ".crypt('something','$6$rounds=5000$anexamplestringforsalt$');
}
else
{
echo "SHA-512 not supported.";
}

 

代码的输出

Standard DES: stqAdD7zlbByI
Extended DES: _S4..someQXidlBpTUu6
MD5: $1$somethin$4NZKrUlY6r7K7.rdEOZ0w.
Blowfish: $2a$09$anexamplestringforsaleLouKejcjRlExmf1671qw3Khl49R3dfu
SHA-256: $5$rounds=5000$anexamplestringf$KIrctqsxo2wrPg5Ag/hs4jTi4PmoNKQUGWFXlVy9vu9
SHA-512: $6$rounds=5000$anexamplestringf$Oo0skOAdUFXkQxJpwzO05wgRHG0dhuaPBaOU/
oNbGpCEKlf/7oVM5wn6AN0w2vwUgA0O24oLzGQpp1XKI6LLQ0.

yii 密码匹配实现过程

// 简单的crypt验证
$sa='$2y$05$'.substr(base64_encode(md5(rand(100000, 999999999))), 0, 22);  // salt
$sa2=  generateSalt(5);  // salt2
$hash = crypt('123456', $sa);
print_r($hash);
echo '<p>';
$validpwd=  crypt('123456', $hash);
print_r($validpwd);
echo '<p>';

输出结果:

$2y$05$Y2NjNzBjNDA3OThmM2FkNubFNy9pV695W//LpeFEN6eBizIQBtMxO
$2y$05$Y2NjNzBjNDA3OThmM2FkNubFNy9pV695W//LpeFEN6eBizIQBtMxO

true

 

 

yii 密码匹配代码精简版

<?php
$hash = generatePasswordHash('123456');
$validpwd = validatePassword('123456', '$2y$13$RtC1BSDoTVbWtckxKJO5Ge9ikm8LFAEsYX97JeJ72mHHbFgzRdw7.'); #, 参数2 =$hash
if($validpwd){
    echo 'true';
}else{
    echo 'false';
}


function generatePasswordHash($password, $cost = 13) {
    $salt = generateSalt($cost);
   
    $hash = crypt($password, $salt);
    // strlen() is safe since crypt() returns only ascii
    if (!is_string($hash) || strlen($hash) !== 60) {
        throw new Exception('Unknown error occurred while generating hash.');
    }
    return $hash;
}

function generateSalt($cost = 13) {
    $cost = (int) $cost;
    if ($cost < 4 || $cost > 31) {
        throw new InvalidParamException('Cost must be between 4 and 31.');
    }

    // Get a 20-byte random string
    $rand = generateRandomKey(20);
    
    // Form the prefix that specifies Blowfish (bcrypt) algorithm and cost parameter.
    $salt = sprintf("$2y$%02d$", $cost);
    // Append the random salt data in the required base64 format.
    $salt .= str_replace('+', '.', substr(base64_encode($rand), 0, 22));

    return $salt;
}

function generateRandomKey($length = 32) {
    /*
     * Strategy
     *
     * The most common platform is Linux, on which /dev/urandom is the best choice. Many other OSs
     * implement a device called /dev/urandom for Linux compat and it is good too. So if there is
     * a /dev/urandom then it is our first choice regardless of OS.
     *
     * Nearly all other modern Unix-like systems (the BSDs, Unixes and OS X) have a /dev/random
     * that is a good choice. If we didn't get bytes from /dev/urandom then we try this next but
     * only if the system is not Linux. Do not try to read /dev/random on Linux.
     *
     * Finally, OpenSSL can supply CSPR bytes. It is our last resort. On Windows this reads from
     * CryptGenRandom, which is the right thing to do. On other systems that don't have a Unix-like
     * /dev/urandom, it will deliver bytes from its own CSPRNG that is seeded from kernel sources
     * of randomness. Even though it is fast, we don't generally prefer OpenSSL over /dev/urandom
     * because an RNG in user space memory is undesirable.
     *
     * For background, see http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/
     */
    $bytes = '';

  



   


    if (!extension_loaded('openssl')) {
        throw new InvalidConfigException('The OpenSSL PHP extension is not installed.');
    }
    
//   die($cryptoStrong);

    $bytes .= openssl_random_pseudo_bytes($length,$cryptoStrong);   #create rand   # &$cryptoStrong=1
    

//echo $length;
    if(byteLength($bytes) > $length){
        echo 'aaa';
    }
    
//exit( byteSubstr($bytes, 0, $length));
    if (byteLength($bytes) < $length || !$cryptoStrong) {
        echo 'sdf';
        throw new Exception('Unable to generate random bytes.');
    }

    return byteSubstr($bytes, 0, $length);
}


function byteLength($string) {
    return mb_strlen($string, '8bit');
}

function byteSubstr($string, $start, $length = null) {
    return mb_substr($string, $start, $length === null ? mb_strlen($string, '8bit') : $length, '8bit');
}

function validatePassword($password, $hash) {
    if (!is_string($password) || $password === '') {
        throw new InvalidParamException('Password must be a string and cannot be empty.');
    }

    if (!preg_match('/^\$2[axy]\$(\d\d)\$[\.\/0-9A-Za-z]{22}/', $hash, $matches) || $matches[1] < 4 || $matches[1] > 30) {
        throw new InvalidParamException('Hash is invalid.');
    }

    $test = crypt($password, $hash);
    $n = strlen($test);
    if ($n !== 60) {
        return false;
    }
    return compareString($test, $hash);
}

function compareString($expected, $actual) {
 
    
    $expected .= "\0";
    $actual .= "\0";
    $expectedLength = byteLength($expected);
    $actualLength = byteLength($actual);
    $diff = $expectedLength - $actualLength;
    for ($i = 0; $i < $actualLength; $i++) {
        $diff |= (ord($actual[$i]) ^ ord($expected[$i % $expectedLength]));
    }
    return $diff === 0;
}

 

 

发表回复

您的电子邮箱地址不会被公开。 必填项已用*标注