| /dokuwiki/inc/ |
| H A D | PassHash.php | 35 $salt = ''; 48 $salt = $m[1]; 52 $salt = $m[1]; 56 $salt = $m[1]; 60 $salt = $m[1]; 64 $salt = $m[1]; 69 $salt = $m[3]; 73 $salt = $m[3]; 76 $salt = $m[1]; 79 $salt = $m[1]; [all …]
|
| H A D | auth.php | 412 $salt = io_readFile($file); 413 if (empty($salt)) { 414 $salt = bin2hex(auth_randombytes(64)); 415 io_saveFile($file, $salt); 418 $salt .= session_id(); 420 return $salt; 1337 * @param string $salt A salt, null for random 1340 function auth_cryptPassword($clear, $method = '', $salt = null) argument 1358 return $pass->$call($clear, $salt);
|
| /dokuwiki/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/ |
| H A D | OpenSSH.php | 93 list($salt, $rounds) = Strings::unpackSSH2('sN', $kdfoptions); 97 $crypto->setPassword($password, 'bcrypt', $salt, $rounds, 32); 211 $salt = Random::string(16); 212 $kdfoptions = Strings::packSSH2('sN', $salt, $rounds); 214 $crypto->setPassword($password, 'bcrypt', $salt, $rounds, 32);
|
| H A D | PuTTY.php | 93 * @param string $salt 96 private static function generateV3Key($password, $flavour, $memory, $passes, $salt) argument 114 $temp = sodium_crypto_pwhash($length, $password, $salt, $passes, $memory << 10, $flavour); 228 … $salt = Strings::hex2bin(trim(preg_replace('#Argon2-Salt: ([0-9a-f]+)#', '$1', $key[$offset++]))); 230 extract(self::generateV3Key($password, $flavour, $memory, $passes, $salt)); 320 $salt = Random::string(16); 325 $key .= "Argon2-Salt: " . Strings::bin2hex($salt) . "\r\n"; 326 extract(self::generateV3Key($password, 'Argon2id', 8192, 13, $salt));
|
| H A D | PKCS8.php | 366 $cipher->setPassword($password, $kdf, $hash, $salt, $iterationCount); 435 $salt, 570 $salt = Random::string(8); 584 'salt' => $salt, 620 'salt' => $salt, 625 $crypto->setPassword($password, $kdf, $hash, $salt, $iterationCount);
|
| /dokuwiki/inc/lang/tr/ |
| H A D | read.txt | 1 Bu sayfa salt okunur. Kaynağı görebilirsiniz ama değiştiremezsiniz. Bunun yanlış olduğunu düşünüyor…
|
| /dokuwiki/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/ |
| H A D | PrivateKey.php | 212 $salt = Random::string($sLen); 213 $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt; 216 $db = $ps . chr(1) . $salt;
|
| H A D | PublicKey.php | 255 $salt = substr($db, $temp + 1); // should be $sLen long 256 $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
|
| /dokuwiki/lib/plugins/authpdo/_test/mysql/ |
| H A D | mybb.sql | 188 `salt` varchar(10) NOT NULL DEFAULT '', 275 INSERT INTO `mybb_users` (`uid`, `username`, `password`, `salt`, `loginkey`, `email`, `postnum`, `t…
|
| /dokuwiki/vendor/phpseclib/phpseclib/phpseclib/Crypt/ |
| H A D | Blowfish.php | 494 * @param string $salt 500 public static function bcrypt_pbkdf($pass, $salt, $keylen, $rounds) argument 512 $countsalt = $salt . pack('N', $count++);
|
| /dokuwiki/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/ |
| H A D | SymmetricKey.php | 938 $salt = $func_args[0]; 943 … $key = Blowfish::bcrypt_pbkdf($password, $salt, $keylen + $this->block_size, $rounds); 958 $salt = isset($func_args[1]) ? $func_args[1] : $this->password_default_salt; 1008 if (strlen($salt)) { 1010 $s .= $salt; 1035 $t = $password . $salt; 1051 $f = $u = $hashObj->hash($salt . pack('N', $i++)); 1061 $key = hash_pbkdf2($hash, $password, $salt, $count, $dkLen, true);
|