Testing with many parallel SIP clients using the same login credentials
showed that it's possible to have a hash collision when two logins occur
with the same second and using the same username when the same backend
auth_internal process handles the request. This just adds more
randomness to the hash generation.