Searched refs:salt (Results 1 - 4 of 4) sorted by relevance

/httpd/modules/lua/
H A Dlua_passwd.c90 char salt[16]; local
105 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
120 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
123 cbuf = crypt(pw, salt);
135 if (!strcmp(ctx->out, crypt(truncpw, salt))) {
147 rv = apr_generate_random_bytes((unsigned char*)salt, 16);
157 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
/httpd/support/
H A Dpasswd_common.c182 char salt[16]; local
207 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
210 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
225 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
228 cbuf = crypt(pw, salt);
240 if (!strcmp(ctx->out, crypt(truncpw, salt))) {
251 rv = apr_generate_random_bytes((unsigned char*)salt, 16);
261 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
H A Ddbmmanage.in80 # if your osname is in $newstyle_salt, then use new style salt (starts with '_' and contains
81 # four bytes of iteration count and four bytes of salt). Otherwise, just use
82 # the traditional two-byte salt.
192 my ($pw, $salt) = @_;
193 $salt = saltpw_crypt unless $salt;
194 crypt $pw, $salt;
203 my($pw, $salt) = @_;
204 $salt = saltpw_md5 unless $salt;
[all...]
/httpd/modules/session/
H A Dmod_session_crypto.c135 apr_uuid_t salt; local
147 /* use a uuid as a salt value, and prepend it to our result */
148 apr_uuid_get(&salt);
158 (unsigned char *) (&salt), sizeof(apr_uuid_t),
201 /* prepend the salt and the iv to the result */
203 memcpy(combined, &salt, sizeof(apr_uuid_t));
289 /* bypass the salt at the start of the decoded block */

Completed in 826 milliseconds