Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 54) sorted by relevance

123

/plugin/fedauth/Auth/OpenID/
H A DSQLiteStore.php58 function _add_nonce($server_url, $timestamp, $salt) argument
67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
H A DNonce.php96 $salt = Auth_OpenID_CryptUtil::randomString(
106 return $time_str . $salt;
H A DSQLStore.php454 function _add_nonce($server_url, $timestamp, $salt) argument
459 $salt));
468 function useNonce($server_url, $timestamp, $salt) argument
476 return $this->_add_nonce($server_url, $timestamp, $salt);
H A DMemcachedStore.php165 function useNonce($server_url, $timestamp, $salt) argument
177 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
H A DDumbStore.php86 function useNonce($server_url, $timestamp, $salt) argument
H A DInterface.php183 function useNonce($server_url, $timestamp, $salt) argument
H A DMDB2Store.php370 function useNonce($server_url, $timestamp, $salt) argument
380 "salt" => $salt
H A DFileStore.php360 function useNonce($server_url, $timestamp, $salt) argument
383 $salt_hash = $this->_safe64($salt);
/plugin/openid/Auth/OpenID/
H A DSQLiteStore.php58 function _add_nonce($server_url, $timestamp, $salt) argument
67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
H A DNonce.php96 $salt = Auth_OpenID_CryptUtil::randomString(
106 return $time_str . $salt;
H A DSQLStore.php454 function _add_nonce($server_url, $timestamp, $salt) argument
459 $salt));
468 function useNonce($server_url, $timestamp, $salt) argument
476 return $this->_add_nonce($server_url, $timestamp, $salt);
H A DMemcachedStore.php165 function useNonce($server_url, $timestamp, $salt) argument
177 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
H A DDumbStore.php86 function useNonce($server_url, $timestamp, $salt) argument
H A DInterface.php183 function useNonce($server_url, $timestamp, $salt) argument
H A DMDB2Store.php370 function useNonce($server_url, $timestamp, $salt) argument
380 "salt" => $salt
H A DFileStore.php360 function useNonce($server_url, $timestamp, $salt) argument
383 $salt_hash = $this->_safe64($salt);
/plugin/authdrupal8/
H A Dpassword.inc84 * Generates a random base 64-encoded salt prefixed with settings for the hash.
97 * A 12 character string containing the iteration count and a random salt.
106 // 6 bytes is the standard salt for a portable phpass hash.
135 * By using a salt and repeated hashing the password is "stretched". Its
146 * at least 12 characters (the settings and salt).
149 * A string containing the hashed password (and salt) or FALSE on failure.
168 $salt = substr($setting, 4, 8);
169 // Hashes must have an 8 character salt.
170 if (strlen($salt) != 8) {
178 $hash = hash($algo, $salt . $password, TRUE);
[all …]
/plugin/authwordpress/
H A Dclass-phpass.php138 $salt = substr($setting, 4, 8);
139 if (strlen($salt) != 8)
149 $hash = md5($salt . $password, TRUE);
154 $hash = pack('H*', md5($salt . $password));
/plugin/jplayer/vendor/kriswallsmith/assetic/src/Assetic/Asset/
H A DAssetCache.php143 * @param string $salt Salt for the key
147 …c function getCacheKey(AssetInterface $asset, FilterInterface $additionalFilter = null, $salt = '') argument
172 return md5($cacheKey.$salt);
/plugin/database2/
H A Dmedia.php124 $salt = $_SESSION['database2'][$pageID]['tables'][$ioIndex]['linkedMediaSalts'][$t]; variable
126 if ( !is_string( $salt ) || ( trim( $salt ) === '' ) )
213 if ( Database2::ssha( $source, $salt ) !== $providedHash )
/plugin/authucenter/lib/uc_client/model/
H A Duser.php131 $salt = substr(uniqid(rand()), -6);
132 $password = md5(md5($password).$salt);
135 …sword='$password', email='$email', regip='$regip', regdate='".$this->base->time."', salt='$salt'");
/plugin/preregister/
H A Daction.php103 $salt = auth_cookiesalt();
104 $index = md5(microtime() . $salt);
/plugin/securelogin/
H A DREADME.md5 …pted. Man-in-the-middle attacks are prevented by adding a variable token (salt) to the password be…
95 …m's password variable `p=MySecretPa$$word`, encrypts it with the provided salt (that changes on ea…
97 …pted. It will decrypt the `securelogin` variable and separate it from the salt value. From this it…
/plugin/encryptedpasswords/
H A Dgibberish-aes.js625 var salt = randArr(8),
626 pbe = openSSLKey(s2a(pass, binary), salt),
630 saltBlock = [[83, 97, 108, 116, 101, 100, 95, 95].concat(salt)];
641 salt = cryptArr.slice(8, 16),
642 pbe = openSSLKey(s2a(pass, binary), salt),
/plugin/findologicxmlexport/vendor/doctrine/annotations/
H A DCHANGELOG.md109 - [65: Remove cache salt making key unnecessarily long](https://github.com/doctrine/annotations/pul…
118 - [98: Enhancement/#65 remove cache salt from cached reader](https://github.com/doctrine/annotation…

123