Searched refs:salt (Results 1 - 4 of 4) sorted by relevance
/httpd/modules/lua/ |
H A D | lua_passwd.c | 90 char salt[16]; local 105 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool); 110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len); 120 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool); 123 cbuf = crypt(pw, salt); 135 if (!strcmp(ctx->out, crypt(truncpw, salt))) { 147 rv = apr_generate_random_bytes((unsigned char*)salt, 16); 157 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
|
/httpd/support/ |
H A D | passwd_common.c | 182 char salt[16]; local 207 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool); 210 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len); 225 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool); 228 cbuf = crypt(pw, salt); 240 if (!strcmp(ctx->out, crypt(truncpw, salt))) { 251 rv = apr_generate_random_bytes((unsigned char*)salt, 16); 261 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
|
H A D | dbmmanage.in | 80 # if your osname is in $newstyle_salt, then use new style salt (starts with '_' and contains 81 # four bytes of iteration count and four bytes of salt). Otherwise, just use 82 # the traditional two-byte salt. 192 my ($pw, $salt) = @_; 193 $salt = saltpw_crypt unless $salt; 194 crypt $pw, $salt; 203 my($pw, $salt) = @_; 204 $salt = saltpw_md5 unless $salt; [all...] |
/httpd/modules/session/ |
H A D | mod_session_crypto.c | 135 apr_uuid_t salt; local 147 /* use a uuid as a salt value, and prepend it to our result */ 148 apr_uuid_get(&salt); 158 (unsigned char *) (&salt), sizeof(apr_uuid_t), 201 /* prepend the salt and the iv to the result */ 203 memcpy(combined, &salt, sizeof(apr_uuid_t)); 289 /* bypass the salt at the start of the decoded block */
|
Completed in 826 milliseconds