diff options
author | David Sommerseth <dazo@users.sourceforge.net> | 2009-03-21 23:59:40 +0100 |
---|---|---|
committer | David Sommerseth <dazo@users.sourceforge.net> | 2009-03-21 23:59:40 +0100 |
commit | 4327f9c0ee5f863b4e1552125338230f03768284 (patch) | |
tree | 6aad6d1435ef573c2021888cb827bd148b020895 /plugin | |
parent | 062a3c92343a5fa371f8637f8bca88aacca14cc4 (diff) | |
download | eurephia-4327f9c0ee5f863b4e1552125338230f03768284.tar.gz eurephia-4327f9c0ee5f863b4e1552125338230f03768284.tar.xz eurephia-4327f9c0ee5f863b4e1552125338230f03768284.zip |
Renamed passwdhash(...) function to eurephia_quick_hash(...)
This to make it clearer that passwdhash(...) is not good for password
hashing, but suitable when you need a quick hashing algorithm.
The eurephia_quick_hash(...) are now used for password caching hashing,
and is still suitable here since the salt used for the passwords are in
memory only and never written to disk, as they are supposed to be
temporary hashes.
Diffstat (limited to 'plugin')
-rw-r--r-- | plugin/eurephia.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/plugin/eurephia.c b/plugin/eurephia.c index cf0fce9..e52ca19 100644 --- a/plugin/eurephia.c +++ b/plugin/eurephia.c @@ -386,7 +386,7 @@ int eurephia_userauth(eurephiaCTX *ctx, const char **env) } // Check if we have a valid password cached - chkpwd = passwdhash(pwdSHA512, ctx->server_salt, passwd); + chkpwd = eurephia_quick_hash(ctx->server_salt, passwd); // Get an authentication session, which is not a real session ticket // but it uses almost the same system |