diff options
author | Anthony Ferrara <ircmaxell@gmail.com> | 2017-03-20 17:17:32 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-03-20 17:17:32 -0400 |
commit | dfdbc467fba0d1db4c2f51fda58e1717046f3284 (patch) | |
tree | 17809b925d41a9f6c781db006d358c61ffa6c26d | |
parent | 1ecb013b51756effed3a3c446a314084b54c9916 (diff) | |
parent | 27f3ae5be29e00dbb98d23a04929cfbb85dfc202 (diff) | |
download | password_compat-master.zip password_compat-master.tar.gz password_compat-master.tar.bz2 |
Merge pull request #100 from borg4242/patch-1HEADorigin/masterorigin/HEADmaster
Document erroneous return value more precisely
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -49,7 +49,7 @@ Another algorithm name is supported: ```` This will use the strongest algorithm available to PHP at the current time. Presently, this is the same as specifying `PASSWORD_BCRYPT`. But in future versions of PHP, it may be updated to use a stronger algorithm if one is introduced. It can also be changed if a problem is identified with the BCRYPT algorithm. Note that if you use this option, you are **strongly** encouraged to store it in a `VARCHAR(255)` column to avoid truncation issues if a future algorithm increases the length of the generated hash. -It is very important that you should check the return value of `password_hash` prior to storing it, because a `false` may be returned if it encountered an error. +It is very important that you should check the return value of `password_hash` prior to storing it, because `false` or `null` may be returned if it encountered an error. **Verifying Password Hashes** |