Lines Matching refs:ctx
85 * indicates success; on failure, ctx->errstr points to the error message.
87 int mk_password_hash(passwd_ctx *ctx)
97 pw = ctx->passwd;
98 switch (ctx->alg) {
101 apr_sha1_base64(pw, strlen(pw), ctx->out);
105 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
112 ctx->errstr = apr_psprintf(ctx->pool,
120 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
126 ctx->errstr = apr_psprintf(ctx->pool, "crypt() failed: %pm", &rv);
131 apr_cpystrn(ctx->out, cbuf, ctx->out_len - 1);
133 char *truncpw = apr_pstrdup(ctx->pool, pw);
135 if (!strcmp(ctx->out, crypt(truncpw, salt))) {
136 ctx->errstr = apr_psprintf(ctx->pool,
149 ctx->errstr = apr_psprintf(ctx->pool, "Unable to generate random "
155 if (ctx->cost == 0)
156 ctx->cost = BCRYPT_DEFAULT_COST;
157 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
158 ctx->out, ctx->out_len);
160 ctx->errstr = apr_psprintf(ctx->pool, "Unable to encode with "
169 ctx->errstr = apr_psprintf(ctx->pool,
171 ctx->alg);