/dports/mail/p5-qpsmtpd/qpsmtpd-0.93/lib/Qpsmtpd/ |
H A D | Auth.pm | 24 my ($user, $passClear, $passHash, $ticket, $loginas); 36 ($ticket, $user, $passHash) = get_auth_details_cram_md5($session); 37 return DECLINED if !$user || !$passHash; 48 $passHash, $ticket); 54 $passClear, $passHash, $ticket); 153 my ($user, $passHash) = split(/ /, decode_base64($line)); 154 unless ($user && $passHash) { 160 return ($ticket, $user, $passHash);
|
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/cpp-ethereum/libethcore/ |
H A D | KeyManager.cpp | 53 m_keyInfo[_address].passHash = hashPassword(_newPass); in recode() 137 ph = kit->second.passHash; in getPassword() 180 auto passHash = hashPassword(_pass); in import() local 182 m_passwordHint[passHash] = _passwordHint; in import() 184 m_keyInfo[addr] = KeyInfo{passHash, _accountName, ""}; in import() 197 auto passHash = hashPassword(_pass); in importExisting() local 198 if (!m_cachedPasswords.count(passHash)) in importExisting() 200 importExisting(_uuid, _info, a, passHash, _passwordHint); in importExisting() 209 m_keyInfo[_address].passHash = _passHash; in importExisting() 296 return m_passwordHint.at(info.passHash); in passwordHint() [all …]
|
/dports/mail/p5-qpsmtpd/qpsmtpd-0.93/plugins/auth/ |
H A D | auth_flat_file | 48 my ($self, $transaction, $method, $user, $passClear, $passHash, $ticket) = 51 if (!defined $passClear && !defined $passHash) { 80 attempt_hash => $passHash,
|
H A D | auth_vpopmail | 61 my ($self, $transaction, $method, $user, $passClear, $passHash, $ticket) = 81 attempt_hash => $passHash,
|
/dports/security/xca/xca-2.4.0/lib/ |
H A D | database_model.cpp | 151 Settings["pwhash"] = pki_evp::passHash; in importOldDatabase() 607 if (pki_evp::passHash.startsWith("T")) { in pwhash_upgrade() 612 pki_evp::passHash) == pki_evp::passHash || in pwhash_upgrade() 613 pki_evp::md5passwd(pki_evp::passwd) == pki_evp::passHash) in pwhash_upgrade() 616 pki_evp::passHash = pki_evp::sha512passwT( in pwhash_upgrade() 631 pki_evp::passHash = passhash; in initPass() 632 if (pki_evp::passHash.isEmpty()) { in initPass() 637 pki_evp::passHash =pki_evp::sha512passwT(pki_evp::passwd,salt); in initPass() 638 Settings["pwhash"] = pki_evp::passHash; in initPass() 641 while (pki_evp::sha512passwT(pki_evp::passwd, pki_evp::passHash) in initPass() [all …]
|
H A D | pki_evp.cpp | 30 QString pki_evp::passHash = QString(); member in pki_evp 550 while (passHash.isEmpty() || in decryptKey() 551 (sha512passwT(ownPassBuf, passHash) != passHash && in decryptKey() 552 sha512passwd(ownPassBuf, passHash) != passHash)) in decryptKey() 556 passHash.isEmpty()); in decryptKey() 678 while (passHash.isEmpty() || in encryptKey() 679 (sha512passwT(ownPassBuf, passHash) != passHash && in encryptKey() 680 sha512passwd(ownPassBuf, passHash) != passHash)) in encryptKey() 683 passHash.isEmpty()); in encryptKey()
|
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/cpp-ethereum/test/unittests/libethcore/ |
H A D | KeyManager.cpp | 19 EXPECT_EQ(kiDefault.passHash, h256()); in TEST() 24 h256 passHash("0x2a"); in TEST() local 26 KeyInfo ki(passHash, accountName); in TEST() 28 EXPECT_EQ(ki.passHash, h256("0x2a")); in TEST()
|
/dports/devel/stack/stack-2.7.3/_cabal_deps/cryptonite-0.29/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/lang/purescript/purescript-0.14.5/_cabal_deps/cryptonite-0.27/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/net-im/matterhorn/matterhorn-50200.13.0/_cabal_deps/cryptonite-0.27/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/finance/hs-hledger-web/hledger-web-1.19/_cabal_deps/cryptonite-0.27/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/devel/hs-spago/spago-0.20.3/_cabal_deps/cryptonite-0.28/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/devel/hs-hpack/hpack-0.34.4/_cabal_deps/cryptonite-0.26/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/devel/hs-hoogle/hoogle-5.0.18.2/_cabal_deps/cryptonite-0.26/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/lang/elm/compiler-0.19.1/_cabal_deps/cryptonite-0.26/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/www/hs-postgrest/postgrest-8.0.0/_cabal_deps/cryptonite-0.29/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/www/hs-yesod-bin/yesod-bin-1.6.1/_cabal_deps/cryptonite-0.28/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/www/hs-wai-app-static/wai-app-static-3.1.7.2/_cabal_deps/cryptonite-0.28/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/devel/hs-git-annex/git-annex-8.20210903/_cabal_deps/cryptonite-0.27/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/devel/hs-darcs/darcs-2.16.4/_cabal_deps/cryptonite-0.27/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/x11/hs-xmobar/xmobar-0.39/_cabal_deps/cryptonite-0.27/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/textproc/hs-pandoc/pandoc-2.14.2/_cabal_deps/cryptonite-0.29/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/textproc/hs-pandoc-crossref/pandoc-crossref-0.3.12.0/_cabal_deps/cryptonite-0.28/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/www/hs-DAV/DAV-1.3.4/_cabal_deps/cryptonite-0.27/Crypto/KDF/ |
H A D | BCryptPBKDF.hs | 143 hashInternal passHash saltHash 144 | B.length passHash /= 64 = error "passHash must be 512 bits" 149 hashInternalMutable ks0 passHash saltHash outMBlock 158 hashInternalMutable bfks passHash saltHash outMBlock = do 159 Blowfish.expandKeyWithSalt bfks passHash saltHash 162 Blowfish.expandKey bfks passHash
|
/dports/devel/stack/stack-2.7.3/_cabal_deps/cryptonite-0.29/tests/ |
H A D | BCryptPBKDF.hs | 66 hashInternal1 = expected @=? hashInternal passHash saltHash 68 passHash = B.pack [ 0 .. 63 ] :: B.ByteString function
|