| /plugin/encryptedpasswords/script/ |
| D | SubtleAES.js | 19 const salt = this.randomSalt(); 20 const {hash, iv} = await this.derivePkdf2(password, salt, 'SHA-256', this.iterations); 27 return this.createOpenSSLCryptString(salt, new Uint8Array(cipher)); 39 const {salt, cipher} = this.parseOpenSSLCryptString(ciphertext); 43 ({hash, iv} = this.deriveMd5(password, salt)); 45 ({hash, iv} = await this.derivePkdf2(password, salt, 'SHA-256', this.iterations)); 98 salt: new Uint8Array(Array.from(ostring.slice(8, 16)).map(ch => ch.charCodeAt(0))), 110 createOpenSSLCryptString(salt, cipher) { argument 113 ...salt, 131 async derivePkdf2(strPassword, salt, hash, iterations) { argument [all …]
|
| /plugin/authgooglesheets/vendor/google/apiclient-services/src/RemoteBuildExecution/ |
| D | BuildBazelRemoteExecutionV2Action.php | 29 public $salt; variable in Google\\Service\\RemoteBuildExecution\\BuildBazelRemoteExecutionV2Action 82 public function setSalt($salt) argument 84 $this->salt = $salt; 88 return $this->salt;
|
| /plugin/authgooglesheets/vendor/google/apiclient-services/src/IdentityToolkit/ |
| D | UserInfo.php | 81 public $salt; variable in Google\\Service\\IdentityToolkit\\UserInfo 302 public function setSalt($salt) argument 304 $this->salt = $salt; 311 return $this->salt;
|
| /plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/ |
| D | PuTTY.php | 105 * @param string $salt 108 private static function generateV3Key($password, $flavour, $memory, $passes, $salt) argument 126 $temp = sodium_crypto_pwhash($length, $password, $salt, $passes, $memory << 10, $flavour); 241 … $salt = Hex::decode(trim(preg_replace('#Argon2-Salt: ([0-9a-f]+)#', '$1', $key[$offset++]))); 243 extract(self::generateV3Key($password, $flavour, $memory, $passes, $salt)); 334 $salt = Random::string(16); 339 $key .= "Argon2-Salt: " . Hex::encode($salt) . "\r\n"; 340 extract(self::generateV3Key($password, 'Argon2id', 8192, 13, $salt));
|
| D | PKCS8.php | 368 $cipher->setPassword($password, $kdf, $hash, $salt, $iterationCount); 425 $salt, 541 $salt = Random::string(8); 555 'salt' => $salt, 591 'salt' => $salt, 596 $crypto->setPassword($password, $kdf, $hash, $salt, $iterationCount);
|
| /plugin/openid/Auth/OpenID/ |
| D | PredisStore.php | 151 function useNonce($server_url, $timestamp, $salt) argument 161 $nonceKey = $this->nonceKey($server_url, $salt); 175 private function nonceKey($server_url, $salt) argument 179 sha1($server_url) . '_' . sha1($salt);
|
| D | SQLiteStore.php | 58 function _add_nonce($server_url, $timestamp, $salt) argument 67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
|
| D | DumbStore.php | 100 * @param string $salt 103 function useNonce($server_url, $timestamp, $salt) argument
|
| D | Interface.php | 179 * @param string $salt 182 function useNonce($server_url, $timestamp, $salt) argument
|
| D | MemcachedStore.php | 184 * @param string $salt 187 function useNonce($server_url, $timestamp, $salt) argument 199 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
|
| D | Nonce.php | 96 $salt = Auth_OpenID_CryptUtil::randomString( 106 return $time_str . $salt;
|
| D | SQLStore.php | 484 * @param string $salt 487 function _add_nonce($server_url, $timestamp, $salt) argument 493 $salt, 503 function useNonce($server_url, $timestamp, $salt) argument 511 return $this->_add_nonce($server_url, $timestamp, $salt);
|
| /plugin/fedauth/Auth/OpenID/ |
| D | SQLiteStore.php | 58 function _add_nonce($server_url, $timestamp, $salt) argument 67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
|
| D | Nonce.php | 96 $salt = Auth_OpenID_CryptUtil::randomString( 106 return $time_str . $salt;
|
| D | SQLStore.php | 454 function _add_nonce($server_url, $timestamp, $salt) argument 459 $salt)); 468 function useNonce($server_url, $timestamp, $salt) argument 476 return $this->_add_nonce($server_url, $timestamp, $salt);
|
| D | MemcachedStore.php | 165 function useNonce($server_url, $timestamp, $salt) argument 177 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
|
| D | DumbStore.php | 86 function useNonce($server_url, $timestamp, $salt) argument
|
| D | Interface.php | 183 function useNonce($server_url, $timestamp, $salt) argument
|
| D | MDB2Store.php | 370 function useNonce($server_url, $timestamp, $salt) argument 380 "salt" => $salt
|
| /plugin/authdrupal8/ |
| D | password.inc | 75 * Generates a random base 64-encoded salt prefixed with settings for the hash. 88 * A 12 character string containing the iteration count and a random salt. 97 // 6 bytes is the standard salt for a portable phpass hash. 125 * By using a salt and repeated hashing the password is "stretched". Its 136 * at least 12 characters (the settings and salt). 139 * A string containing the hashed password (and salt) or FALSE on failure. 165 $salt = substr($setting, 4, 8); 166 // Hashes must have an 8 character salt. 167 if (strlen($salt) != 8) { 173 $hash = hash($algo, $salt . $password, TRUE); [all …]
|
| /plugin/jplayer/vendor/kriswallsmith/assetic/src/Assetic/Asset/ |
| D | AssetCache.php | 143 * @param string $salt Salt for the key 147 …c function getCacheKey(AssetInterface $asset, FilterInterface $additionalFilter = null, $salt = '') argument 172 return md5($cacheKey.$salt);
|
| /plugin/authwordpress/ |
| H A D | class-phpass.php | 151 $salt = substr($setting, 4, 8); 152 if (strlen($salt) !== 8) { 162 $hash = md5($salt . $password, TRUE);
|
| /plugin/database2/ |
| D | media.php | 124 $salt = $_SESSION['database2'][$pageID]['tables'][$ioIndex]['linkedMediaSalts'][$t]; variable 126 if ( !is_string( $salt ) || ( trim( $salt ) === '' ) ) 213 if ( Database2::ssha( $source, $salt ) !== $providedHash )
|
| /plugin/autham/ |
| D | auth.php | 88 $salt = $password[2]; 90 if($pass_md5 == hash("sha256", hash("sha256", $pass).$salt)) {
|
| /plugin/authucenter/lib/uc_client/model/ |
| D | user.php | 131 $salt = substr(uniqid(rand()), -6); 132 $password = md5(md5($password).$salt); 135 …sword='$password', email='$email', regip='$regip', regdate='".$this->base->time."', salt='$salt'");
|