/dports/audio/ampache/ampache-php74-5.0.0/src/Module/Authentication/Authenticator/ |
H A D | DatabaseAuthenticator.php | 44 $hashed_password = []; 45 $hashed_password[] = hash('sha256', $password); 46 …$hashed_password[] = hash('sha256', Dba::escape(stripslashes(htmlspecialchars(strip_tags($password… 49 … if ($row['password'] == $hashed_password[1] && $hashed_password[0] != $hashed_password[1]) { 54 if (in_array($row['password'], $hashed_password)) {
|
/dports/security/p5-Authen-Htpasswd/Authen-Htpasswd-0.171/lib/Authen/Htpasswd/ |
H A D | User.pm | 68 $self->{hashed_password} ||= htpasswd_encrypt($self->{encrypt_hash}, $_[1]) if defined $_[1]; 86 … return 1 if $self->hashed_password eq htpasswd_encrypt($hash, $password, $self->hashed_password); 113 sub hashed_password { subroutine 116 $self->{hashed_password} = shift; 119 return $self->{hashed_password}; 142 $self->hashed_password( htpasswd_encrypt($self->encrypt_hash, $password) ); 174 return join(':', $self->username, $self->hashed_password,
|
H A D | Util.pm | 32 my ($hash,$password,$hashed_password) = @_; 35 return &$meth($password,$hashed_password);
|
/dports/databases/pecl-mongodb/mongodb-1.9.1/src/libmongoc/src/libmongoc/src/mongoc/ |
H A D | mongoc-scram.c | 70 ret->hashed_password = bson_strdup (cache->hashed_password); in _mongoc_scram_cache_copy() 96 bson_zero_free (cache->hashed_password, strlen (cache->hashed_password)); in _mongoc_scram_cache_destroy() 111 return cache->hashed_password && scram->hashed_password && in _mongoc_scram_cache_has_presecrets() 112 !strcmp (cache->hashed_password, scram->hashed_password) && in _mongoc_scram_cache_has_presecrets() 188 bson_zero_free (scram->hashed_password, strlen (scram->hashed_password)); in _mongoc_scram_destroy() 214 cache->hashed_password = bson_strdup (scram->hashed_password); in _mongoc_scram_update_cache() 536 char *hashed_password; in _mongoc_scram_step2() local 563 hashed_password = in _mongoc_scram_step2() 759 scram->hashed_password = bson_strdup (hashed_password); in _mongoc_scram_step2() 806 if (hashed_password) { in _mongoc_scram_step2() [all …]
|
/dports/www/py-fastapi/fastapi-0.70.0/docs/zh/docs/tutorial/ |
H A D | extra-models.md | 116 然后添加额外的关键字参数 `hashed_password=hashed_password`,例如: 119 UserInDB(**user_in.dict(), hashed_password=hashed_password) 130 hashed_password = hashed_password, 151 这样,我们可以仅声明模型之间的差异部分(具有明文的 `password`、具有 `hashed_password` 以及不包括密码)。
|
/dports/sysutils/py-glances/glances-3.1.4/glances/ |
H A D | password.py | 59 def check_password(self, hashed_password, plain_password): argument 64 salt, encrypted_password = hashed_password.split('$') 112 def save_password(self, hashed_password): argument 119 file_pwd.write(b(hashed_password)) 125 hashed_password = file_pwd.read() 127 return hashed_password
|
/dports/security/py-bcrypt/bcrypt-3.2.0/src/bcrypt/ |
H A D | __init__.py | 116 def checkpw(password: bytes, hashed_password: bytes) -> bool: 118 hashed_password, six.text_type 122 if b"\x00" in password or b"\x00" in hashed_password: 127 ret = hashpw(password, hashed_password) 129 if len(ret) != len(hashed_password): 132 return _bcrypt.lib.timingsafe_bcmp(ret, hashed_password, len(ret)) == 0
|
/dports/www/py-fastapi/fastapi-0.70.0/docs_src/extra_models/ |
H A D | tutorial002.py | 24 hashed_password: str 32 hashed_password = fake_password_hasher(user_in.password) 33 user_in_db = UserInDB(**user_in.dict(), hashed_password=hashed_password)
|
H A D | tutorial001.py | 24 hashed_password: str 34 hashed_password = fake_password_hasher(user_in.password) 35 user_in_db = UserInDB(**user_in.dict(), hashed_password=hashed_password)
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/router/src/mock_server/src/ |
H A D | authentication.cc | 70 std::vector<uint8_t> hashed_password(digest_size); in scramble() local 77 ok &= EVP_DigestFinal_ex(digest_ctx.get(), hashed_password.data(), nullptr); in scramble() 80 ok &= EVP_DigestUpdate(digest_ctx.get(), hashed_password.data(), in scramble() 81 hashed_password.size()); in scramble() 105 hashed_password[i] ^= double_hashed_password[i]; in scramble() 108 return hashed_password; in scramble()
|
/dports/www/p5-Catalyst-Plugin-Authentication/Catalyst-Plugin-Authentication-0.10023/t/lib/ |
H A D | AuthTestApp.pm | 22 hashed_password => md5("s3cr3t"), 26 hashed_password => sha1_base64("s3cr3t"), 30 hashed_password => sha1_base64("s3cr3t").'=',
|
/dports/security/p5-Authen-Htpasswd/Authen-Htpasswd-0.171/lib/Authen/ |
H A D | Htpasswd.pm | 118 my ($username,$hashed_password,@extra_info) = split /:/, $line; 123 hashed_password => $hashed_password, 146 my ($username,$hashed_password,@extra_info) = split /:/, $line; 149 hashed_password => $hashed_password,
|
/dports/www/py-fastapi/fastapi-0.70.0/docs_src/security/ |
H A D | tutorial003.py | 42 hashed_password: str 81 hashed_password = fake_hash_password(form_data.password) 82 if not hashed_password == user.hashed_password:
|
H A D | tutorial004.py | 45 hashed_password: str 55 def verify_password(plain_password, hashed_password): argument 56 return pwd_context.verify(plain_password, hashed_password) 73 if not verify_password(password, user.hashed_password):
|
H A D | tutorial005.py | 57 hashed_password: str 70 def verify_password(plain_password, hashed_password): argument 71 return pwd_context.verify(plain_password, hashed_password) 88 if not verify_password(password, user.hashed_password):
|
/dports/www/py-tornado5/tornado-5.1.1/demos/blog/ |
H A D | blog.py | 220 hashed_password = await tornado.ioloop.IOLoop.current().run_in_executor( 227 tornado.escape.to_unicode(hashed_password)) 247 hashed_password = await tornado.ioloop.IOLoop.current().run_in_executor( 249 tornado.escape.utf8(author.hashed_password)) 250 hashed_password = tornado.escape.to_unicode(hashed_password) 251 if hashed_password == author.hashed_password:
|
/dports/www/py-tornado4/tornado-4.5.3/demos/blog/ |
H A D | blog.py | 181 hashed_password = yield executor.submit( 188 hashed_password) 208 hashed_password = yield executor.submit( 210 tornado.escape.utf8(author.hashed_password)) 211 if hashed_password == author.hashed_password:
|
/dports/www/ilias/ILIAS-5.4.25/Services/Password/classes/encoders/ |
H A D | class.ilBcryptPasswordEncoder.php | 215 …$hashed_password = hash_hmac('whirlpool', str_pad($raw, strlen($raw) * 4, sha1($user_secret), STR_… 237 $salted_password = crypt($hashed_password, $prefix . $this->getCosts() . '$' . $salt); 255 …$hashed_password = hash_hmac('whirlpool', str_pad($raw, strlen($raw) * 4, sha1($salt), STR_PAD_BOT… 256 return crypt($hashed_password, substr($encoded, 0, 30)) == $encoded;
|
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/subliminal_patch/providers/ |
H A D | ktuvit.py | 123 def __init__(self, email=None, hashed_password=None): argument 124 if any((email, hashed_password)) and not all((email, hashed_password)): 128 self.hashed_password = hashed_password 137 if self.email and self.hashed_password: 140 data = {"request": {"Email": self.email, "Password": self.hashed_password}}
|
/dports/www/drupal8/drupal-8.9.20/core/tests/Drupal/Tests/Core/Password/ |
H A D | PasswordHashingTest.php | 139 $hashed_password = $this->passwordHasher->hash($password); 142 $this->assertNotFalse($hashed_password); 145 $this->assertFalse($hashed_password);
|
/dports/www/drupal9/drupal-9.2.10/core/tests/Drupal/Tests/Core/Password/ |
H A D | PasswordHashingTest.php | 139 $hashed_password = $this->passwordHasher->hash($password); 142 $this->assertNotFalse($hashed_password); 145 $this->assertFalse($hashed_password);
|
/dports/benchmarks/phoronix-test-suite/phoronix-test-suite-10.6.1/pts-core/phoromatic/pages/ |
H A D | phoromatic_password.php | 46 $hashed_password = $matching_user['Password']; 49 …account_salt != null && hash('sha256', $account_salt . $_POST['old_password']) == $hashed_password)
|
/dports/multimedia/gstreamer1-plugins-rust/gst-plugins-rs-d0466b3eee114207f851b37cae0015c0e718f021/cargo-crates/libsodium-sys-0.2.7/tests/crypto/ |
H A D | crypto_pwhash_scryptsalsa208sha256.rs | 68 let mut hashed_password = [0; crypto_pwhash_scryptsalsa208sha256_STRBYTES as usize]; in test_crypto_pwhash_scryptsalsa208sha256_str() localVariable 71 hashed_password.as_mut_ptr(), in test_crypto_pwhash_scryptsalsa208sha256_str() 81 hashed_password.as_ptr(), in test_crypto_pwhash_scryptsalsa208sha256_str()
|
/dports/dns/encrypted-dns-server/encrypted-dns-server-0.9.1/cargo-crates/libsodium-sys-stable-1.19.19/tests/crypto/ |
H A D | crypto_pwhash_scryptsalsa208sha256.rs | 68 let mut hashed_password = [0; crypto_pwhash_scryptsalsa208sha256_STRBYTES as usize]; in test_crypto_pwhash_scryptsalsa208sha256_str() localVariable 71 hashed_password.as_mut_ptr(), in test_crypto_pwhash_scryptsalsa208sha256_str() 81 hashed_password.as_ptr(), in test_crypto_pwhash_scryptsalsa208sha256_str()
|
/dports/devel/pijul/pijul-1.0.0.a55/cargo-crates/libsodium-sys-0.2.7/tests/crypto/ |
H A D | crypto_pwhash_scryptsalsa208sha256.rs | 68 let mut hashed_password = [0; crypto_pwhash_scryptsalsa208sha256_STRBYTES as usize]; in test_crypto_pwhash_scryptsalsa208sha256_str() localVariable 71 hashed_password.as_mut_ptr(), in test_crypto_pwhash_scryptsalsa208sha256_str() 81 hashed_password.as_ptr(), in test_crypto_pwhash_scryptsalsa208sha256_str()
|