There's no salt present
The most accurate technical documentation is the code:function local_user_set_password(&$user, $password = null){ $cost = 10; if ($password == null) { /* generate a random password */ $bytes = openssl_random_pseudo_bytes(50); $password = pack('H*', bin2hex($bytes)); } $hash = password_hash($password, PASSWORD_BCRYPT, [ 'cost' => $cost ]); if ($hash !== false) { $user['password'] = $hash; }}If i understand that right all loval users use bcrypt2 with 2^10 rounds and 50 bytes salt.
Can you please ping me the link where is the source code documentation?
Yes sorry, the 50 bytes are when generating a random password.The salt should be 128bit but I found no definitive source for this.