Home
last modified time | relevance | path

Searched refs:passHash (Results 1 – 25 of 56) sorted by relevance

123

/dports/mail/p5-qpsmtpd/qpsmtpd-0.93/lib/Qpsmtpd/
H A DAuth.pm24 my ($user, $passClear, $passHash, $ticket, $loginas);
36 ($ticket, $user, $passHash) = get_auth_details_cram_md5($session);
37 return DECLINED if !$user || !$passHash;
48 $passHash, $ticket);
54 $passClear, $passHash, $ticket);
153 my ($user, $passHash) = split(/ /, decode_base64($line));
154 unless ($user && $passHash) {
160 return ($ticket, $user, $passHash);
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/cpp-ethereum/libethcore/
H A DKeyManager.cpp53 m_keyInfo[_address].passHash = hashPassword(_newPass); in recode()
137 ph = kit->second.passHash; in getPassword()
180 auto passHash = hashPassword(_pass); in import() local
182 m_passwordHint[passHash] = _passwordHint; in import()
184 m_keyInfo[addr] = KeyInfo{passHash, _accountName, ""}; in import()
197 auto passHash = hashPassword(_pass); in importExisting() local
198 if (!m_cachedPasswords.count(passHash)) in importExisting()
200 importExisting(_uuid, _info, a, passHash, _passwordHint); in importExisting()
209 m_keyInfo[_address].passHash = _passHash; in importExisting()
296 return m_passwordHint.at(info.passHash); in passwordHint()
[all …]
/dports/mail/p5-qpsmtpd/qpsmtpd-0.93/plugins/auth/
H A Dauth_flat_file48 my ($self, $transaction, $method, $user, $passClear, $passHash, $ticket) =
51 if (!defined $passClear && !defined $passHash) {
80 attempt_hash => $passHash,
H A Dauth_vpopmail61 my ($self, $transaction, $method, $user, $passClear, $passHash, $ticket) =
81 attempt_hash => $passHash,
/dports/security/xca/xca-2.4.0/lib/
H A Ddatabase_model.cpp151 Settings["pwhash"] = pki_evp::passHash; in importOldDatabase()
607 if (pki_evp::passHash.startsWith("T")) { in pwhash_upgrade()
612 pki_evp::passHash) == pki_evp::passHash || in pwhash_upgrade()
613 pki_evp::md5passwd(pki_evp::passwd) == pki_evp::passHash) in pwhash_upgrade()
616 pki_evp::passHash = pki_evp::sha512passwT( in pwhash_upgrade()
631 pki_evp::passHash = passhash; in initPass()
632 if (pki_evp::passHash.isEmpty()) { in initPass()
637 pki_evp::passHash =pki_evp::sha512passwT(pki_evp::passwd,salt); in initPass()
638 Settings["pwhash"] = pki_evp::passHash; in initPass()
641 while (pki_evp::sha512passwT(pki_evp::passwd, pki_evp::passHash) in initPass()
[all …]
H A Dpki_evp.cpp30 QString pki_evp::passHash = QString(); member in pki_evp
550 while (passHash.isEmpty() || in decryptKey()
551 (sha512passwT(ownPassBuf, passHash) != passHash && in decryptKey()
552 sha512passwd(ownPassBuf, passHash) != passHash)) in decryptKey()
556 passHash.isEmpty()); in decryptKey()
678 while (passHash.isEmpty() || in encryptKey()
679 (sha512passwT(ownPassBuf, passHash) != passHash && in encryptKey()
680 sha512passwd(ownPassBuf, passHash) != passHash)) in encryptKey()
683 passHash.isEmpty()); in encryptKey()
/dports/net-p2p/qtum/qtum-mainnet-fastlane-v0.20.3/src/cpp-ethereum/test/unittests/libethcore/
H A DKeyManager.cpp19 EXPECT_EQ(kiDefault.passHash, h256()); in TEST()
24 h256 passHash("0x2a"); in TEST() local
26 KeyInfo ki(passHash, accountName); in TEST()
28 EXPECT_EQ(ki.passHash, h256("0x2a")); in TEST()
/dports/devel/stack/stack-2.7.3/_cabal_deps/cryptonite-0.29/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/lang/purescript/purescript-0.14.5/_cabal_deps/cryptonite-0.27/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/net-im/matterhorn/matterhorn-50200.13.0/_cabal_deps/cryptonite-0.27/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/finance/hs-hledger-web/hledger-web-1.19/_cabal_deps/cryptonite-0.27/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/devel/hs-spago/spago-0.20.3/_cabal_deps/cryptonite-0.28/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/devel/hs-hpack/hpack-0.34.4/_cabal_deps/cryptonite-0.26/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/devel/hs-hoogle/hoogle-5.0.18.2/_cabal_deps/cryptonite-0.26/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/lang/elm/compiler-0.19.1/_cabal_deps/cryptonite-0.26/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/www/hs-postgrest/postgrest-8.0.0/_cabal_deps/cryptonite-0.29/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/www/hs-yesod-bin/yesod-bin-1.6.1/_cabal_deps/cryptonite-0.28/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/www/hs-wai-app-static/wai-app-static-3.1.7.2/_cabal_deps/cryptonite-0.28/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/devel/hs-git-annex/git-annex-8.20210903/_cabal_deps/cryptonite-0.27/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/devel/hs-darcs/darcs-2.16.4/_cabal_deps/cryptonite-0.27/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/x11/hs-xmobar/xmobar-0.39/_cabal_deps/cryptonite-0.27/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/textproc/hs-pandoc/pandoc-2.14.2/_cabal_deps/cryptonite-0.29/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/textproc/hs-pandoc-crossref/pandoc-crossref-0.3.12.0/_cabal_deps/cryptonite-0.28/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/www/hs-DAV/DAV-1.3.4/_cabal_deps/cryptonite-0.27/Crypto/KDF/
H A DBCryptPBKDF.hs143 hashInternal passHash saltHash
144 | B.length passHash /= 64 = error "passHash must be 512 bits"
149 hashInternalMutable ks0 passHash saltHash outMBlock
158 hashInternalMutable bfks passHash saltHash outMBlock = do
159 Blowfish.expandKeyWithSalt bfks passHash saltHash
162 Blowfish.expandKey bfks passHash
/dports/devel/stack/stack-2.7.3/_cabal_deps/cryptonite-0.29/tests/
H A DBCryptPBKDF.hs66 hashInternal1 = expected @=? hashInternal passHash saltHash
68 passHash = B.pack [ 0 .. 63 ] :: B.ByteString function

123