/dports/ftp/sftpgo/sftpgo-2.2.0/vendor/github.com/wagslane/go-password-validator/ |
H A D | length.go | 82 password = removeMoreThanTwoRepeatingChars(password) 83 password = removeMoreThanTwoFromSequence(password, seqNums) 84 password = removeMoreThanTwoFromSequence(password, seqKeyboard0) 85 password = removeMoreThanTwoFromSequence(password, seqKeyboard1) 86 password = removeMoreThanTwoFromSequence(password, seqKeyboard2) 87 password = removeMoreThanTwoFromSequence(password, seqAlphabet) 88 password = removeMoreThanTwoFromSequence(password, getReversedString(seqNums)) 89 password = removeMoreThanTwoFromSequence(password, getReversedString(seqKeyboard0)) 90 password = removeMoreThanTwoFromSequence(password, getReversedString(seqKeyboard1)) 92 password = removeMoreThanTwoFromSequence(password, getReversedString(seqAlphabet)) [all …]
|
/dports/net-im/prosody/prosody-0.11.13/plugins/ |
H A D | mod_auth_internal_plain.lua | 25 password = saslprep(password); 26 if not password then 30 if secure_equals(password, saslprep(credentials.password)) then 44 password = saslprep(password); 45 if not password then 50 account.password = password; 70 password = saslprep(password); 71 if not password then 74 return accounts:set(username, {password = password}); 85 if not password then [all …]
|
/dports/databases/percona56-server/percona-server-5.6.51-91.0/mysql-test/suite/auth_sec/r/ |
H A D | mysql_old_plugin.result | 25 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 26 …e-auth mode, but 'Tanjotuser2'@'localhost' has a password in the old format; please change the pas… 30 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 33 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 70 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 110 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 113 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 155 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 158 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 235 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … [all …]
|
/dports/databases/percona56-client/percona-server-5.6.51-91.0/mysql-test/suite/auth_sec/r/ |
H A D | mysql_old_plugin.result | 25 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 26 …e-auth mode, but 'Tanjotuser2'@'localhost' has a password in the old format; please change the pas… 30 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 33 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 70 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 110 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 113 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 155 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 158 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 235 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … [all …]
|
/dports/databases/percona-pam-for-mysql/percona-server-5.6.51-91.0/mysql-test/suite/auth_sec/r/ |
H A D | mysql_old_plugin.result | 25 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 26 …e-auth mode, but 'Tanjotuser2'@'localhost' has a password in the old format; please change the pas… 30 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 33 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 70 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 110 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 113 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 155 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 158 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 235 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … [all …]
|
/dports/databases/mysqlwsrep56-server/mysql-wsrep-wsrep_5.6.51-25.33/mysql-test/suite/auth_sec/r/ |
H A D | mysql_old_plugin.result | 25 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 26 …e-auth mode, but 'Tanjotuser2'@'localhost' has a password in the old format; please change the pas… 30 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 33 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 70 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 110 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 113 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 155 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 158 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 235 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … [all …]
|
/dports/databases/mysql56-client/mysql-5.6.51/mysql-test/suite/auth_sec/r/ |
H A D | mysql_old_plugin.result | 25 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 26 …e-auth mode, but 'Tanjotuser2'@'localhost' has a password in the old format; please change the pas… 30 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 33 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 70 …e-auth mode, but 'Tanjotuser1'@'localhost' has a password in the old format; please change the pas… 110 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 113 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 155 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 158 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … 235 Warning 1287 'pre-4.1 password hash' is deprecated and will be removed in a future release. Please … [all …]
|
/dports/security/cracklib/cracklib-2.9.7/lib/ |
H A D | fascist.c | 435 GTry(rawtext, password) in GTry() argument 437 char *password; 636 char *password; in FascistGecos() 705 char *password; in FascistLookUser() local 743 strcpy(password, (char *)Lowercase(password)); in FascistLookUser() 745 Trim(password); in FascistLookUser() 747 while (*password && isspace(*password)) in FascistLookUser() 749 password++; in FascistLookUser() 752 if (!*password) in FascistLookUser() 758 ptr = password; in FascistLookUser() [all …]
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/mysql-test/suite/auth_sec/r/ |
H A D | mysql_native_plugin.result | 17 ERROR 28000: Access denied for user 'Tanjotuser1'@'localhost' (using password: ) 18 ERROR 28000: Access denied for user 'Tanjotuser2'@'localhost' (using password: ) 21 ERROR 28000: Access denied for user 'Tanjotuser1'@'localhost' (using password: ) 22 ERROR 28000: Access denied for user 'Tanjotuser2'@'localhost' (using password: ) 23 ERROR 28000: Access denied for user 'Tanjotuser1'@'localhost' (using password: ) 24 ERROR 28000: Access denied for user 'Tanjotuser2'@'localhost' (using password: ) 25 ERROR 28000: Access denied for user 'Tanjotuser1'@'localhost' (using password: ) 26 ERROR 28000: Access denied for user 'Tanjotuser2'@'localhost' (using password: ) 27 ERROR 28000: Access denied for user 'Tanjotuser1'@'localhost' (using password: ) 28 ERROR 28000: Access denied for user 'Tanjotuser2'@'localhost' (using password: ) [all …]
|
/dports/lang/mono/mono-5.10.1.57/mcs/class/corlib/System.Security.Cryptography.X509Certificates/ |
H A D | X509Certificate20.cs | 55 public X509Certificate (byte[] rawData, string password) in X509Certificate() argument 68 Import (rawData, password, keyStorageFlags); in X509Certificate() 74 Import (rawData, password, keyStorageFlags); in X509Certificate() 95 Import (fileName, password, keyStorageFlags); in X509Certificate() 101 Import (fileName, password, keyStorageFlags); in X509Certificate() 161 byte[] pwd = (password == null) ? null : Encoding.UTF8.GetBytes (password); in Export() 168 byte[] pwd = (password == null) ? null : password.GetBuffer (); in Export() 176 return impl.Export (contentType, password); in Export() 179 if (password != null) in Export() 180 Array.Clear (password, 0, password.Length); in Export() [all …]
|
/dports/sysutils/py-ansible-core/ansible-core-2.11.6/test/integration/targets/lookup_password/tasks/ |
H A D | main.yml | 1 - name: create a password file 3 newpass: "{{ lookup('password', output_dir + '/lookup/password length=8') }}" 14 - name: stat the password file 23 - name: get password length 29 - name: read password 35 - name: verify password 44 pass2: "{{ lookup('password', output_dir + '/lookup/password length=8') }}" 46 - name: read password (again) 52 - name: verify password (again) 63 - name: read password and salt [all …]
|
/dports/sysutils/py-ansible-base/ansible-base-2.10.15/test/integration/targets/lookup_password/tasks/ |
H A D | main.yml | 1 - name: create a password file 3 newpass: "{{ lookup('password', output_dir + '/lookup/password length=8') }}" 14 - name: stat the password file 23 - name: get password length 29 - name: read password 35 - name: verify password 44 pass2: "{{ lookup('password', output_dir + '/lookup/password length=8') }}" 46 - name: read password (again) 52 - name: verify password (again) 63 - name: read password and salt [all …]
|
/dports/databases/mysql55-client/mysql-5.5.62/mysql-test/r/ |
H A D | func_crypt.result | 15 password('abc') 17 select password(''); 18 password('') 45 password(NULL) 49 password('') 55 password('idkfa') 62 password('idkfa') 69 password('idkfa') 76 password('idkfa ') 79 password('idkfa') [all …]
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/infinidat/infinibox/playbooks/ |
H A D | test_remove_resources.yml | 10 password: "{{ password }}" 18 password: "{{ password }}" 27 password: "{{ password }}" 36 password: "{{ password }}" 44 password: "{{ password }}" 52 password: "{{ password }}" 60 password: "{{ password }}" 70 password: "{{ password }}" 80 password: "{{ password }}" 89 password: "{{ password }}" [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/lib/gitlab/api_authentication/ |
H A D | token_locator.rb | 60 return unless password.present? 62 UsernameAndPassword.new(nil, password) 67 return unless password.present? 74 return unless password.present? 76 UsernameAndPassword.new(nil, password) 81 return unless password.present? 83 UsernameAndPassword.new(nil, password) 88 return unless password.present? 90 UsernameAndPassword.new(nil, password) 95 return unless password.present? [all …]
|
/dports/www/p5-WordPress-XMLRPC/WordPress-XMLRPC-2.12/lib/WordPress/ |
H A D | XMLRPC.pm | 461 my $password = $self->password; 878 my $password = $self->password; 898 my $password = $self->password; 923 my $password = $self->password; 943 my $password = $self->password; 964 my $password = $self->password; 982 my $password = $self->password; 1003 my $password = $self->password; 1081 my $password = $self->password; 1126 my $password = $self->password; [all …]
|
/dports/comms/deforaos-phone/Phone-0.5.1/src/plugins/gprs/ |
H A D | gprs.conf | 7 password=mnet 15 password=1111 47 password=adgj 52 password=mms 62 password=wap 67 password=ppp 72 password=ppp 77 password=ppp 85 password=tm 90 password=web [all …]
|
/dports/databases/py-sqlalchemy-utils/SQLAlchemy-Utils-0.37.9/tests/types/ |
H A D | test_password.py | 78 obj.password = b'b' 89 obj.password = 'b' 91 assert obj.password == 'b' 92 assert obj.password != 'a' 147 assert obj.password != other.password 152 obj.password = None 170 obj.password = None 176 obj.password = 'b' 186 obj.password = None 191 obj.password = 'b' [all …]
|
/dports/multimedia/gstreamer1-plugins-rust/gst-plugins-rs-d0466b3eee114207f851b37cae0015c0e718f021/cargo-crates/sodiumoxide-0.2.7/src/crypto/pwhash/ |
H A D | argon2i13.rs | 49 password: &[u8], in run_derive_key_test() 59 password, 124 let password = [ in test_derive_01() localVariable 160 let password = [ in test_derive_02() localVariable 199 let password = [ in test_derive_03() localVariable 245 let password = [ in test_derive_04() localVariable 269 let password = [ in test_derive_05() localVariable 303 let password = [ in test_derive_06() localVariable 342 let password = [ in test_derive_07() localVariable 361 let password = [ in test_derive_08() localVariable [all …]
|
/dports/security/p5-Authen-Simple/Authen-Simple-0.5/lib/Authen/Simple/ |
H A D | Password.pm | 12 my ( $class, $password, $encrypted ) = @_; 15 return 1 if $password eq $encrypted; 25 return 1 if crypt( $password, $encrypted ) eq $encrypted; 39 return 1 if Digest::MD5::md5($password) eq $encrypted; 52 return 1 if Digest::SHA::sha1($password) eq $encrypted; 80 my ( $class, $password, $encrypted, $scheme ) = @_; 84 return 1 if $password eq $hash; 89 return 1 if crypt( $password, $hash ) eq $hash; 94 return 1 if Digest::MD5::md5($password) eq $hash; 105 return 1 if Digest::SHA::sha1($password) eq $hash; [all …]
|
/dports/sysutils/py-salt/salt-3004.1/salt/modules/ |
H A D | postgres.py | 291 password=password, 316 password=password, 462 password=password, 522 password=password, 556 password=password, 633 password=password, 763 password=password, 799 password=password, 848 password=password, 943 password=password, [all …]
|
/dports/java/bouncycastle15/crypto-169/core/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 10 protected byte[] password; field in PBEParametersGenerator 30 byte[] password, in init() argument 34 this.password = password; in init() 46 return password; in getPassword() 104 char[] password) in PKCS5PasswordToBytes() argument 106 if (password != null) in PKCS5PasswordToBytes() 112 bytes[i] = (byte)password[i]; in PKCS5PasswordToBytes() 131 char[] password) in PKCS5PasswordToUTF8Bytes() argument 133 if (password != null) in PKCS5PasswordToUTF8Bytes() 151 char[] password) in PKCS12PasswordToBytes() argument [all …]
|
/dports/japanese/mozc-el/mozc-2.23.2815.102.01/src/base/ |
H A D | password_manager.cc | 124 ofs.write(password.data(), password.size()); in SavePassword() 130 bool LoadPassword(string *password) { in LoadPassword() argument 174 if (!SavePassword(password)) { in SetPassword() 183 if (password == NULL) { in GetPassword() 188 password->clear(); in GetPassword() 190 if (!LoadPassword(password)) { in GetPassword() 234 if (password == NULL) { in GetPassword() 245 password->clear(); in GetPassword() 285 string password; in InitPassword() local 289 password = CreateRandomPassword(); in InitPassword() [all …]
|
/dports/www/drupal7/drupal-7.82/modules/simpletest/tests/ |
H A D | password.test | 5 * Provides unit tests for password.inc. 9 * Unit tests for password hashing API. 28 * Test password hashing. 35 $password = 'baz'; 39 // Re-hash the password. 51 // Re-hash the password. 65 $password = str_repeat('x', 512); 68 $password = str_repeat('x', 513); 72 $password = str_repeat('€', 170); 75 $password .= 'xx'; [all …]
|
/dports/japanese/uim-mozc/mozc-2.23.2815.102.01/src/base/ |
H A D | password_manager.cc | 124 ofs.write(password.data(), password.size()); in SavePassword() 130 bool LoadPassword(string *password) { in LoadPassword() argument 174 if (!SavePassword(password)) { in SetPassword() 183 if (password == NULL) { in GetPassword() 188 password->clear(); in GetPassword() 190 if (!LoadPassword(password)) { in GetPassword() 234 if (password == NULL) { in GetPassword() 245 password->clear(); in GetPassword() 285 string password; in InitPassword() local 289 password = CreateRandomPassword(); in InitPassword() [all …]
|