I inherited a legacy system that appears to have at least two different ways that passwords were hashed into the database.
I am seeing these two patterns at the start