Searched defs:salt (Results 1 - 3 of 3) sorted by relevance

/httpd/modules/lua/
H A Dlua_passwd.c90 char salt[16]; local
105 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
120 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
123 cbuf = crypt(pw, salt);
135 if (!strcmp(ctx->out, crypt(truncpw, salt))) {
147 rv = apr_generate_random_bytes((unsigned char*)salt, 16);
157 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
/httpd/support/
H A Dpasswd_common.c182 char salt[16]; local
207 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
210 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
225 ret = generate_salt(salt, 8, &ctx->errstr, ctx->pool);
228 cbuf = crypt(pw, salt);
240 if (!strcmp(ctx->out, crypt(truncpw, salt))) {
251 rv = apr_generate_random_bytes((unsigned char*)salt, 16);
261 rv = apr_bcrypt_encode(pw, ctx->cost, (unsigned char*)salt, 16,
/httpd/modules/session/
H A Dmod_session_crypto.c135 apr_uuid_t salt; local
147 /* use a uuid as a salt value, and prepend it to our result */
148 apr_uuid_get(&salt);
158 (unsigned char *) (&salt), sizeof(apr_uuid_t),
201 /* prepend the salt and the iv to the result */
203 memcpy(combined, &salt, sizeof(apr_uuid_t));
289 /* bypass the salt at the start of the decoded block */

Completed in 12 milliseconds