03-04-2025, 08:41 AM
(This post was last modified: 03-04-2025, 08:54 AM by shearunnatrckstr.)
its 10 round bcrypt 2y version.
$2x$, $2y$ (June 2011)
In June 2011, a bug was discovered in crypt_blowfish, a PHP implementation of bcrypt. It was mis-handling characters with the 8th bit set.[14] They suggested that system administrators update their existing password database, replacing $2a$ with $2x$, to indicate that those hashes are bad (and need to use the old broken algorithm). They also suggested the idea of having crypt_blowfish emit $2y$ for hashes generated by the fixed algorithm.
good luck!
________________________________________________