[int$length = 0],
[bool$binary = false]
Name of selected hashing algorithm (i.e. md5, sha256, haval160,4, etc..) See hash_algos for a list of supported algorithms.
The password to use for the derivation.
The salt to use for the derivation. This value should be generated randomly.
The number of internal iterations to perform for the derivation.
The length of the output string. If binary is true this corresponds to the byte-length of the derived key, if binary is false this corresponds to twice the byte-length of the derived key (as every byte of the key is returned as two hexits).
If 0 is passed, the entire output of the supplied algorithm is used.
When set to true, outputs raw binary data. false outputs lowercase hexits.
Returns a string containing the derived key as lowercase hexits unless binary is set to true in which case the raw binary representation of the derived key is returned.
Exceptions and Errors
An E_WARNING will be raised if the algorithm is unknown, the iterations parameter is less than or equal to 0, the length is less than 0 or the salt is too long (greater than INT_MAX - 4).
The PBKDF2 method can be used for hashing passwords for storage. However, it should be noted that password_hash or crypt with CRYPT_BLOWFISH are better suited for password storage.
|7.2.0||Usage of non-cryptographic hash functions (adler32, crc32, crc32b, fnv132, fnv1a32, fnv164, fnv1a64, joaat) was disabled.|