/dports/security/hashcat/hashcat-6.2.5/src/modules/ |
H A D | module_07100.c | 46 typedef struct pbkdf2_sha512 struct 176 salt->salt_buf[0] = pbkdf2_sha512->salt_buf[0]; in module_hash_decode() 177 salt->salt_buf[1] = pbkdf2_sha512->salt_buf[1]; in module_hash_decode() 178 salt->salt_buf[2] = pbkdf2_sha512->salt_buf[2]; in module_hash_decode() 179 salt->salt_buf[3] = pbkdf2_sha512->salt_buf[3]; in module_hash_decode() 180 salt->salt_buf[4] = pbkdf2_sha512->salt_buf[4]; in module_hash_decode() 181 salt->salt_buf[5] = pbkdf2_sha512->salt_buf[5]; in module_hash_decode() 182 salt->salt_buf[6] = pbkdf2_sha512->salt_buf[6]; in module_hash_decode() 183 salt->salt_buf[7] = pbkdf2_sha512->salt_buf[7]; in module_hash_decode() 278 salt->salt_buf[0] = pbkdf2_sha512->salt_buf[0]; in module_hash_decode() [all …]
|
H A D | module_07200.c | 45 typedef struct pbkdf2_sha512 struct 91 pbkdf2_sha512_t *pbkdf2_sha512 = (pbkdf2_sha512_t *) esalt_buf; in module_hash_decode() local 148 u8 *salt_buf_ptr = (u8 *) pbkdf2_sha512->salt_buf; in module_hash_decode() 158 salt->salt_buf[0] = pbkdf2_sha512->salt_buf[0]; in module_hash_decode() 159 salt->salt_buf[1] = pbkdf2_sha512->salt_buf[1]; in module_hash_decode() 160 salt->salt_buf[2] = pbkdf2_sha512->salt_buf[2]; in module_hash_decode() 161 salt->salt_buf[3] = pbkdf2_sha512->salt_buf[3]; in module_hash_decode() 162 salt->salt_buf[4] = pbkdf2_sha512->salt_buf[4]; in module_hash_decode() 163 salt->salt_buf[5] = pbkdf2_sha512->salt_buf[5]; in module_hash_decode() 164 salt->salt_buf[6] = pbkdf2_sha512->salt_buf[6]; in module_hash_decode() [all …]
|
H A D | module_12100.c | 47 typedef struct pbkdf2_sha512 struct 93 pbkdf2_sha512_t *pbkdf2_sha512 = (pbkdf2_sha512_t *) esalt_buf; in module_hash_decode() local 152 memcpy (pbkdf2_sha512->salt_buf, tmp_buf, tmp_len); in module_hash_decode() 156 salt->salt_buf[0] = pbkdf2_sha512->salt_buf[0]; in module_hash_decode() 157 salt->salt_buf[1] = pbkdf2_sha512->salt_buf[1]; in module_hash_decode() 158 salt->salt_buf[2] = pbkdf2_sha512->salt_buf[2]; in module_hash_decode() 159 salt->salt_buf[3] = pbkdf2_sha512->salt_buf[3]; in module_hash_decode()
|
H A D | module_20200.c | 48 typedef struct pbkdf2_sha512 struct 91 pbkdf2_sha512_t *pbkdf2_sha512 = (pbkdf2_sha512_t *) esalt_buf; in module_hash_decode() local 150 u8 *salt_buf_ptr = (u8 *) pbkdf2_sha512->salt_buf; in module_hash_decode() 180 const pbkdf2_sha512_t *pbkdf2_sha512 = (const pbkdf2_sha512_t *) esalt_buf; in module_hash_encode() local 198 …const size_t salt_len_enc = base64_encode (int_to_ab64, (const u8 *) pbkdf2_sha512->salt_buf, salt… in module_hash_encode()
|
/dports/security/py-passlib/passlib-1.7.4/docs/lib/ |
H A D | passlib.hash.grub_pbkdf2_sha512.rst | 54 :class:`pbkdf2_sha512` and :class:`!grub_pbkdf2_sha512` share an identical algorithm, 57 >>> from passlib.hash import pbkdf2_sha512, grub_pbkdf2_sha512 59 >>> # given a pbkdf2_sha512 hash... 60 >>> h = pbkdf2_sha512.hash("password") 65 >>> hobj = pbkdf2_sha512.from_string(h)
|
H A D | passlib.hash.pbkdf2_digest.rst | 14 * :class:`pbkdf2_sha512` 55 .. class:: pbkdf2_sha512()
|
H A D | passlib.hash.ldap_pbkdf2_digest.rst | 32 this is the same as :class:`pbkdf2_sha512`, except that it
|
/dports/databases/py-sqlalchemy-utils/SQLAlchemy-Utils-0.37.9/tests/types/ |
H A D | test_password.py | 121 from passlib.hash import pbkdf2_sha512 126 expected_length = len(pbkdf2_sha512.name) 127 expected_length += len(str(pbkdf2_sha512.max_rounds)) 128 expected_length += pbkdf2_sha512.max_salt_size 129 expected_length += pbkdf2_sha512.encoded_checksum_size
|
/dports/devel/php-ice37/ice-3.7.2/cpp/test/Glacier2/hashpassword/ |
H A D | test.py | 35 test(passlib.hash.pbkdf2_sha512.verify("abc123", hashPasswords("abc123", "-d sha512"))) 36 test(not passlib.hash.pbkdf2_sha512.verify("abc123", hashPasswords("abc", "-d sha512"))) 54 test(passlib.hash.pbkdf2_sha512.verify("abc123", hash))
|
/dports/devel/ice37/ice-3.7.2/cpp/test/Glacier2/hashpassword/ |
H A D | test.py | 35 test(passlib.hash.pbkdf2_sha512.verify("abc123", hashPasswords("abc123", "-d sha512"))) 36 test(not passlib.hash.pbkdf2_sha512.verify("abc123", hashPasswords("abc", "-d sha512"))) 54 test(passlib.hash.pbkdf2_sha512.verify("abc123", hash))
|
/dports/devel/py-ice37/ice-3.7.2/cpp/test/Glacier2/hashpassword/ |
H A D | test.py | 35 test(passlib.hash.pbkdf2_sha512.verify("abc123", hashPasswords("abc123", "-d sha512"))) 36 test(not passlib.hash.pbkdf2_sha512.verify("abc123", hashPasswords("abc", "-d sha512"))) 54 test(passlib.hash.pbkdf2_sha512.verify("abc123", hash))
|
/dports/devel/elixir-hex/hex-1.0.1/test/hex/crypto/ |
H A D | pkcs5_test.exs | 65 test "base pbkdf2_sha512" do 87 test "python passlib pbkdf2_sha512" do
|
/dports/security/elixir-comeonin/comeonin-3.2/ |
H A D | CHANGELOG.md | 58 * Increased the default number of rounds for pbkdf2_sha512 to 100_000. 171 * Updated pbkdf2_sha512 to prevent users from calling `hashpass` without a salt. 187 * Increased default number of rounds for pbkdf2_sha512 from 40000 to 60000. 196 * Added support for pbkdf2_sha512.
|
H A D | mix.exs | 7 Password hashing (bcrypt, pbkdf2_sha512) library for Elixir.
|
H A D | README.md | 3 Password hashing (bcrypt, pbkdf2_sha512 and one-time passwords) library for Elixir. 8 Comeonin supports `bcrypt` and `pbkdf2_sha512`.
|
/dports/security/py-passlib/passlib-1.7.4/passlib/handlers/ |
H A D | pbkdf2.py | 133 pbkdf2_sha512 = create_pbkdf2_hash("sha512", 64, 25000) variable 137 ldap_pbkdf2_sha512 = uh.PrefixWrapper("ldap_pbkdf2_sha512", pbkdf2_sha512, "{PBKDF2-SHA512}", "$pbk… 449 default_rounds = pbkdf2_sha512.default_rounds
|
/dports/www/moinmoin/moin-1.9.11/MoinMoin/support/passlib/handlers/ |
H A D | pbkdf2.py | 133 pbkdf2_sha512 = create_pbkdf2_hash("sha512", 64, 25000) variable 137 ldap_pbkdf2_sha512 = uh.PrefixWrapper("ldap_pbkdf2_sha512", pbkdf2_sha512, "{PBKDF2-SHA512}", "$pbk… 449 default_rounds = pbkdf2_sha512.default_rounds
|
/dports/security/elixir-comeonin/comeonin-3.2/lib/ |
H A D | comeonin.ex | 9 Comeonin supports bcrypt and pbkdf2_sha512. 44 Bcrypt and pbkdf2_sha512 are both highly secure password hashing functions. 52 use pbkdf2_sha512, which has been recommended by NIST.
|
/dports/security/elixir-comeonin/comeonin-3.2/test/ |
H A D | pbkdf2_test.exs | 20 test "base pbkdf2_sha512 tests" do 37 test "Python passlib pbkdf2_sha512 tests" do
|
/dports/security/elixir-comeonin/comeonin-3.2/lib/comeonin/ |
H A D | pbkdf2.ex | 3 Module to handle pbkdf2_sha512 authentication. 51 Hash the password using pbkdf2_sha512.
|
/dports/devel/ice37/ice-3.7.2/scripts/ |
H A D | icehashpassword.py | 93 passScheme = passlib.hash.pbkdf2_sha512
|
/dports/security/py-passlib/passlib-1.7.4/passlib/ |
H A D | hash.py | 52 …ldap_pbkdf2_sha1, ldap_pbkdf2_sha256, ldap_pbkdf2_sha512, pbkdf2_sha1, pbkdf2_sha256, pbkdf2_sha512
|
/dports/devel/php-ice37/ice-3.7.2/scripts/ |
H A D | icehashpassword.py | 93 passScheme = passlib.hash.pbkdf2_sha512
|
/dports/www/moinmoin/moin-1.9.11/MoinMoin/support/passlib/ |
H A D | hash.py | 52 …ldap_pbkdf2_sha1, ldap_pbkdf2_sha256, ldap_pbkdf2_sha512, pbkdf2_sha1, pbkdf2_sha256, pbkdf2_sha512
|
/dports/devel/py-ice37/ice-3.7.2/scripts/ |
H A D | icehashpassword.py | 93 passScheme = passlib.hash.pbkdf2_sha512
|