Home
last modified time | relevance | path

Searched refs:PASSWORD_SALT_LENGTH (Results 1 – 9 of 9) sorted by relevance

/dports/devel/bugzilla50/bugzilla-5.0.4/Bugzilla/Auth/Verify/
H A DDB.pm90 $update_password = 1 if (length($1) != PASSWORD_SALT_LENGTH);
/dports/devel/bugzilla44/bugzilla-4.4.13/Bugzilla/
H A DConstants.pm572 use constant PASSWORD_SALT_LENGTH => 8; constant
H A DUtil.pm622 $salt = generate_random_password(PASSWORD_SALT_LENGTH);
655 $salt = substr($salt, 0, PASSWORD_SALT_LENGTH);
/dports/devel/bugzilla50/bugzilla-5.0.4/Bugzilla/
H A DConstants.pm612 use constant PASSWORD_SALT_LENGTH => 8; constant
H A DUtil.pm649 $salt = generate_random_password(PASSWORD_SALT_LENGTH);
/dports/devel/opendht/opendht-1.10.1/src/
H A Dcrypto.cpp59 static constexpr size_t PASSWORD_SALT_LENGTH {16}; variable
161 if (data.size() <= PASSWORD_SALT_LENGTH) in aesDecrypt()
163 Blob salt {data.begin(), data.begin()+PASSWORD_SALT_LENGTH}; in aesDecrypt()
165 Blob encrypted {data.begin()+PASSWORD_SALT_LENGTH, data.end()}; in aesDecrypt()
172 salt.resize(PASSWORD_SALT_LENGTH); in stretchKey()
/dports/devel/py-opendht/opendht-1.10.1/src/
H A Dcrypto.cpp59 static constexpr size_t PASSWORD_SALT_LENGTH {16}; variable
161 if (data.size() <= PASSWORD_SALT_LENGTH) in aesDecrypt()
163 Blob salt {data.begin(), data.begin()+PASSWORD_SALT_LENGTH}; in aesDecrypt()
165 Blob encrypted {data.begin()+PASSWORD_SALT_LENGTH, data.end()}; in aesDecrypt()
172 salt.resize(PASSWORD_SALT_LENGTH); in stretchKey()
/dports/japanese/bugzilla50/ja-bugzilla50-5.0.2/default/pages/
H A Drelease-notes.html.tmpl334 <kbd>PASSWORD_SALT_LENGTH</kbd> を増やすことができるようになりました。</li>
/dports/devel/bugzilla50/bugzilla-5.0.4/template/en/default/pages/
H A Drelease-notes.html.tmpl400 <kbd>PASSWORD_SALT_LENGTH</kbd> without breaking compatibility with old