/dports/lang/php73/php-7.3.33/ext/standard/tests/password/ |
H A D | password_hash_error.phpt | 2 Test error operation of password_hash() 7 var_dump(password_hash()); 9 var_dump(password_hash("foo")); 11 var_dump(password_hash("foo", array())); 13 var_dump(password_hash("foo", 19, new StdClass)); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, "baz")); 17 var_dump(password_hash(array(), PASSWORD_BCRYPT)); 19 var_dump(password_hash("123", PASSWORD_BCRYPT, array("salt" => array()))); 22 var_dump(password_hash('123', PASSWORD_BCRYPT, array('salt' => 1234))); 44 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … [all …]
|
H A D | password_bcrypt_errors.phpt | 2 Test error operation of password_hash() with bcrypt hashing 7 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => 3))); 9 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => 32))); 11 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => "foo"))); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => 123))); 17 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => "foo"))); 21 Warning: password_hash(): Invalid bcrypt cost parameter specified: 3 in %s on line %d 27 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 29 Warning: password_hash(): Provided salt is too short: 3 expecting 22 in %s on line %d 32 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … [all …]
|
H A D | password_hash_error_argon2.phpt | 2 Test error operation of password_hash() with Argon2i and Argon2id 5 if (!defined('PASSWORD_ARGON2I')) die('skip password_hash not built with Argon2'); 6 if (!defined('PASSWORD_ARGON2ID')) die('skip password_hash not built with Argon2'); 10 var_dump(password_hash('test', PASSWORD_ARGON2I, ['memory_cost' => 0])); 11 var_dump(password_hash('test', PASSWORD_ARGON2I, ['time_cost' => 0])); 12 var_dump(password_hash('test', PASSWORD_ARGON2I, ['threads' => 0])); 13 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['memory_cost' => 0])); 14 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['time_cost' => 0])); 15 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['threads' => 0])); 24 Warning: password_hash(): Invalid number of threads in %s on line %d [all …]
|
/dports/www/mod_php73/php-7.3.33/ext/standard/tests/password/ |
H A D | password_hash_error.phpt | 2 Test error operation of password_hash() 7 var_dump(password_hash()); 9 var_dump(password_hash("foo")); 11 var_dump(password_hash("foo", array())); 13 var_dump(password_hash("foo", 19, new StdClass)); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, "baz")); 17 var_dump(password_hash(array(), PASSWORD_BCRYPT)); 19 var_dump(password_hash("123", PASSWORD_BCRYPT, array("salt" => array()))); 22 var_dump(password_hash('123', PASSWORD_BCRYPT, array('salt' => 1234))); 44 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … [all …]
|
H A D | password_bcrypt_errors.phpt | 2 Test error operation of password_hash() with bcrypt hashing 7 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => 3))); 9 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => 32))); 11 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => "foo"))); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => 123))); 17 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => "foo"))); 21 Warning: password_hash(): Invalid bcrypt cost parameter specified: 3 in %s on line %d 27 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 29 Warning: password_hash(): Provided salt is too short: 3 expecting 22 in %s on line %d 32 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … [all …]
|
H A D | password_hash_error_argon2.phpt | 2 Test error operation of password_hash() with Argon2i and Argon2id 5 if (!defined('PASSWORD_ARGON2I')) die('skip password_hash not built with Argon2'); 6 if (!defined('PASSWORD_ARGON2ID')) die('skip password_hash not built with Argon2'); 10 var_dump(password_hash('test', PASSWORD_ARGON2I, ['memory_cost' => 0])); 11 var_dump(password_hash('test', PASSWORD_ARGON2I, ['time_cost' => 0])); 12 var_dump(password_hash('test', PASSWORD_ARGON2I, ['threads' => 0])); 13 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['memory_cost' => 0])); 14 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['time_cost' => 0])); 15 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['threads' => 0])); 24 Warning: password_hash(): Invalid number of threads in %s on line %d [all …]
|
/dports/lang/php74/php-7.4.27/ext/standard/tests/password/ |
H A D | password_hash_error.phpt | 2 Test error operation of password_hash() 7 var_dump(password_hash()); 9 var_dump(password_hash("foo")); 11 var_dump(password_hash("foo", array())); 13 var_dump(password_hash("foo", 19, new StdClass)); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, "baz")); 17 var_dump(password_hash(array(), PASSWORD_BCRYPT)); 19 var_dump(password_hash("123", PASSWORD_BCRYPT, array("salt" => array()))); 22 var_dump(password_hash('123', PASSWORD_BCRYPT, array('salt' => 1234))); 46 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … [all …]
|
H A D | password_bcrypt_errors.phpt | 2 Test error operation of password_hash() with bcrypt hashing 7 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => 3))); 9 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => 32))); 11 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => "foo"))); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => 123))); 17 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => "foo"))); 21 Warning: password_hash(): Invalid bcrypt cost parameter specified: 3 in %s on line %d 27 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 29 Warning: password_hash(): Provided salt is too short: 3 expecting 22 in %s on line %d 32 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … [all …]
|
H A D | password_hash_error_argon2.phpt | 2 Test error operation of password_hash() with Argon2i and Argon2id 5 if (!defined('PASSWORD_ARGON2I')) die('skip password_hash not built with Argon2'); 6 if (!defined('PASSWORD_ARGON2ID')) die('skip password_hash not built with Argon2'); 10 var_dump(password_hash('test', PASSWORD_ARGON2I, ['memory_cost' => 0])); 11 var_dump(password_hash('test', PASSWORD_ARGON2I, ['time_cost' => 0])); 12 var_dump(password_hash('test', PASSWORD_ARGON2I, ['threads' => 0])); 13 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['memory_cost' => 0])); 14 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['time_cost' => 0])); 15 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['threads' => 0])); 24 Warning: password_hash(): %sthread%s [all …]
|
/dports/www/mod_php74/php-7.4.27/ext/standard/tests/password/ |
H A D | password_hash_error.phpt | 2 Test error operation of password_hash() 7 var_dump(password_hash()); 9 var_dump(password_hash("foo")); 11 var_dump(password_hash("foo", array())); 13 var_dump(password_hash("foo", 19, new StdClass)); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, "baz")); 17 var_dump(password_hash(array(), PASSWORD_BCRYPT)); 19 var_dump(password_hash("123", PASSWORD_BCRYPT, array("salt" => array()))); 22 var_dump(password_hash('123', PASSWORD_BCRYPT, array('salt' => 1234))); 46 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … [all …]
|
H A D | password_bcrypt_errors.phpt | 2 Test error operation of password_hash() with bcrypt hashing 7 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => 3))); 9 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => 32))); 11 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => "foo"))); 15 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("salt" => 123))); 17 var_dump(password_hash("foo", PASSWORD_BCRYPT, array("cost" => "foo"))); 21 Warning: password_hash(): Invalid bcrypt cost parameter specified: 3 in %s on line %d 27 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … 29 Warning: password_hash(): Provided salt is too short: 3 expecting 22 in %s on line %d 32 Deprecated: password_hash(): Use of the 'salt' option to password_hash is deprecated in %s on line … [all …]
|
H A D | password_hash_error_argon2.phpt | 2 Test error operation of password_hash() with Argon2i and Argon2id 5 if (!defined('PASSWORD_ARGON2I')) die('skip password_hash not built with Argon2'); 6 if (!defined('PASSWORD_ARGON2ID')) die('skip password_hash not built with Argon2'); 10 var_dump(password_hash('test', PASSWORD_ARGON2I, ['memory_cost' => 0])); 11 var_dump(password_hash('test', PASSWORD_ARGON2I, ['time_cost' => 0])); 12 var_dump(password_hash('test', PASSWORD_ARGON2I, ['threads' => 0])); 13 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['memory_cost' => 0])); 14 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['time_cost' => 0])); 15 var_dump(password_hash('test', PASSWORD_ARGON2ID, ['threads' => 0])); 24 Warning: password_hash(): %sthread%s [all …]
|
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/crypto/ |
H A D | ms_funcs.c | 62 u8 *password_hash) in nt_password_hash() argument 107 zpwd[0] = password_hash[14]; in challenge_response() 108 zpwd[1] = password_hash[15]; in challenge_response() 131 u8 password_hash[16]; in generate_nt_response() local 155 const u8 *password_hash, in generate_nt_response_pwhash() argument 182 const u8 *password_hash, in generate_authenticator_response_pwhash() argument 245 u8 password_hash[16]; in generate_authenticator_response() local 265 u8 password_hash[16]; in nt_challenge_response() local 386 const u8 *password_hash, u8 *pw_block) in encrypt_pw_block_with_password_hash() argument 425 u8 password_hash[16]; in new_password_encrypted_with_old_nt_password_hash() local [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/crypto/ |
H A D | ms_funcs.c | 110 u8 *password_hash) in nt_password_hash() argument 153 zpwd[0] = password_hash[14]; in challenge_response() 154 zpwd[1] = password_hash[15]; in challenge_response() 177 u8 password_hash[16]; in generate_nt_response() local 201 const u8 *password_hash, in generate_nt_response_pwhash() argument 228 const u8 *password_hash, in generate_authenticator_response_pwhash() argument 289 u8 password_hash[16]; in generate_authenticator_response() local 309 u8 password_hash[16]; in nt_challenge_response() local 433 const u8 *password_hash, u8 *pw_block) in encrypt_pw_block_with_password_hash() argument 475 u8 password_hash[16]; in new_password_encrypted_with_old_nt_password_hash() local [all …]
|
/dports/net/hostapd/hostapd-2.9/src/crypto/ |
H A D | ms_funcs.c | 110 u8 *password_hash) in nt_password_hash() argument 153 zpwd[0] = password_hash[14]; in challenge_response() 154 zpwd[1] = password_hash[15]; in challenge_response() 177 u8 password_hash[16]; in generate_nt_response() local 201 const u8 *password_hash, in generate_nt_response_pwhash() argument 228 const u8 *password_hash, in generate_authenticator_response_pwhash() argument 289 u8 password_hash[16]; in generate_authenticator_response() local 309 u8 password_hash[16]; in nt_challenge_response() local 433 const u8 *password_hash, u8 *pw_block) in encrypt_pw_block_with_password_hash() argument 475 u8 password_hash[16]; in new_password_encrypted_with_old_nt_password_hash() local [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.c | 110 u8 *password_hash) in nt_password_hash() argument 153 zpwd[0] = password_hash[14]; in challenge_response() 154 zpwd[1] = password_hash[15]; in challenge_response() 177 u8 password_hash[16]; in generate_nt_response() local 201 const u8 *password_hash, in generate_nt_response_pwhash() argument 228 const u8 *password_hash, in generate_authenticator_response_pwhash() argument 289 u8 password_hash[16]; in generate_authenticator_response() local 309 u8 password_hash[16]; in nt_challenge_response() local 433 const u8 *password_hash, u8 *pw_block) in encrypt_pw_block_with_password_hash() argument 475 u8 password_hash[16]; in new_password_encrypted_with_old_nt_password_hash() local [all …]
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | ms_funcs.c | 110 u8 *password_hash) in nt_password_hash() argument 153 zpwd[0] = password_hash[14]; in challenge_response() 154 zpwd[1] = password_hash[15]; in challenge_response() 177 u8 password_hash[16]; in generate_nt_response() local 201 const u8 *password_hash, in generate_nt_response_pwhash() argument 228 const u8 *password_hash, in generate_authenticator_response_pwhash() argument 289 u8 password_hash[16]; in generate_authenticator_response() local 309 u8 password_hash[16]; in nt_challenge_response() local 433 const u8 *password_hash, u8 *pw_block) in encrypt_pw_block_with_password_hash() argument 475 u8 password_hash[16]; in new_password_encrypted_with_old_nt_password_hash() local [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/crypto/ |
H A D | ms_funcs.c | 110 u8 *password_hash) in nt_password_hash() argument 153 zpwd[0] = password_hash[14]; in challenge_response() 154 zpwd[1] = password_hash[15]; in challenge_response() 177 u8 password_hash[16]; in generate_nt_response() local 201 const u8 *password_hash, in generate_nt_response_pwhash() argument 228 const u8 *password_hash, in generate_authenticator_response_pwhash() argument 289 u8 password_hash[16]; in generate_authenticator_response() local 309 u8 password_hash[16]; in nt_challenge_response() local 433 const u8 *password_hash, u8 *pw_block) in encrypt_pw_block_with_password_hash() argument 475 u8 password_hash[16]; in new_password_encrypted_with_old_nt_password_hash() local [all …]
|
/dports/sysutils/accountsservice/accountsservice-0.6.55/src/ |
H A D | user-classify.c | 84 const gchar *password_hash) in user_classify_is_excluded_by_heuristics() argument 88 if (password_hash != NULL) { in user_classify_is_excluded_by_heuristics() 90 if (password_hash[0] == '!') in user_classify_is_excluded_by_heuristics() 91 password_hash++; in user_classify_is_excluded_by_heuristics() 93 if (password_hash[0] != '\0') { in user_classify_is_excluded_by_heuristics() 95 if (password_hash[0] == '$') { in user_classify_is_excluded_by_heuristics() 96 if (strlen (password_hash) < 4) in user_classify_is_excluded_by_heuristics() 101 } else if (!g_ascii_isalnum (password_hash[0]) && in user_classify_is_excluded_by_heuristics() 102 password_hash[0] != '.' && in user_classify_is_excluded_by_heuristics() 103 password_hash[0] != '/') { in user_classify_is_excluded_by_heuristics() [all …]
|
/dports/lang/php80/php-8.0.15/ext/standard/tests/password/ |
H A D | password_hash_error.phpt | 2 Test error operation of password_hash() 8 var_dump(password_hash("foo")); 14 password_hash("foo", array()); 20 var_dump(password_hash("foo", 19, new StdClass)); 26 var_dump(password_hash("foo", PASSWORD_BCRYPT, "baz")); 32 var_dump(password_hash(array(), PASSWORD_BCRYPT)); 39 password_hash() expects at least 2 arguments, 1 given 40 password_hash(): Argument #2 ($algo) must be of type string|int|null, array given 41 password_hash(): Argument #3 ($options) must be of type array, stdClass given 42 password_hash(): Argument #3 ($options) must be of type array, string given [all …]
|
/dports/lang/php81/php-8.1.1/ext/standard/tests/password/ |
H A D | password_hash_error.phpt | 2 Test error operation of password_hash() 8 var_dump(password_hash("foo")); 14 password_hash("foo", array()); 20 var_dump(password_hash("foo", 19, new StdClass)); 26 var_dump(password_hash("foo", PASSWORD_BCRYPT, "baz")); 32 var_dump(password_hash(array(), PASSWORD_BCRYPT)); 39 password_hash() expects at least 2 arguments, 1 given 40 password_hash(): Argument #2 ($algo) must be of type string|int|null, array given 41 password_hash(): Argument #3 ($options) must be of type array, stdClass given 42 password_hash(): Argument #3 ($options) must be of type array, string given [all …]
|
/dports/www/mod_php81/php-8.1.1/ext/standard/tests/password/ |
H A D | password_hash_error.phpt | 2 Test error operation of password_hash() 8 var_dump(password_hash("foo")); 14 password_hash("foo", array()); 20 var_dump(password_hash("foo", 19, new StdClass)); 26 var_dump(password_hash("foo", PASSWORD_BCRYPT, "baz")); 32 var_dump(password_hash(array(), PASSWORD_BCRYPT)); 39 password_hash() expects at least 2 arguments, 1 given 40 password_hash(): Argument #2 ($algo) must be of type string|int|null, array given 41 password_hash(): Argument #3 ($options) must be of type array, stdClass given 42 password_hash(): Argument #3 ($options) must be of type array, string given [all …]
|
/dports/www/mod_php80/php-8.0.15/ext/standard/tests/password/ |
H A D | password_hash_error.phpt | 2 Test error operation of password_hash() 8 var_dump(password_hash("foo")); 14 password_hash("foo", array()); 20 var_dump(password_hash("foo", 19, new StdClass)); 26 var_dump(password_hash("foo", PASSWORD_BCRYPT, "baz")); 32 var_dump(password_hash(array(), PASSWORD_BCRYPT)); 39 password_hash() expects at least 2 arguments, 1 given 40 password_hash(): Argument #2 ($algo) must be of type string|int|null, array given 41 password_hash(): Argument #3 ($options) must be of type array, stdClass given 42 password_hash(): Argument #3 ($options) must be of type array, string given [all …]
|
/dports/net/rabbitmq/rabbitmq-server-3.9.11/deps/rabbit/src/ |
H A D | internal_user_v1.erl | 37 password_hash :: internal_user:password_hash() | '_', 48 password_hash :: internal_user:password_hash(), 56 password_hash :: '_', 74 password_hash = <<"">>, 82 password_hash = <<"">>, 89 password_hash = <<"">>, 112 -spec get_password_hash(internal_user()) -> internal_user:password_hash(). 113 get_password_hash(#internal_user{password_hash = Value}) -> Value. 128 password_hash = PasswordHash, 134 internal_user:password_hash(), atom()) -> internal_user(). [all …]
|
/dports/devel/libbde/libbde-20210605/tests/ |
H A D | bde_test_password.c | 53 uint8_t password_hash[ 32 ] = { in bde_test_utf8_password_calculate_hash() local 65 password_hash, in bde_test_utf8_password_calculate_hash() 80 password_hash, in bde_test_utf8_password_calculate_hash() 93 password_hash, in bde_test_utf8_password_calculate_hash() 112 password_hash, in bde_test_utf8_password_calculate_hash() 150 password_hash, in bde_test_utf8_password_calculate_hash() 202 password_hash, in bde_test_utf16_password_calculate_hash() 217 password_hash, in bde_test_utf16_password_calculate_hash() 230 password_hash, in bde_test_utf16_password_calculate_hash() 249 password_hash, in bde_test_utf16_password_calculate_hash() [all …]
|