Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 65) sorted by relevance

123

/plugin/encryptedpasswords/script/
H A DSubtleAES.js19 const salt = this.randomSalt();
27 return this.createOpenSSLCryptString(salt, new Uint8Array(cipher));
39 const {salt, cipher} = this.parseOpenSSLCryptString(ciphertext);
43 ({hash, iv} = this.deriveMd5(password, salt));
110 createOpenSSLCryptString(salt, cipher) { argument
113 ...salt,
131 async derivePkdf2(strPassword, salt, hash, iterations) { argument
139 salt: salt,
161 deriveMd5(strPassword, salt) { argument
164 const D1 = md5.array(new Uint8Array([...password, ...salt]));
[all …]
/plugin/authgooglesheets/vendor/google/apiclient-services/src/RemoteBuildExecution/
H A DBuildBazelRemoteExecutionV2Action.php29 public $salt; variable in Google\\Service\\RemoteBuildExecution\\BuildBazelRemoteExecutionV2Action
82 public function setSalt($salt) argument
84 $this->salt = $salt;
88 return $this->salt;
/plugin/authgooglesheets/vendor/google/apiclient-services/src/IdentityToolkit/
H A DUserInfo.php81 public $salt; variable in Google\\Service\\IdentityToolkit\\UserInfo
302 public function setSalt($salt) argument
304 $this->salt = $salt;
311 return $this->salt;
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/
H A DPuTTY.php105 * @param string $salt
108 private static function generateV3Key($password, $flavour, $memory, $passes, $salt) argument
126 $temp = sodium_crypto_pwhash($length, $password, $salt, $passes, $memory << 10, $flavour);
241 … $salt = Hex::decode(trim(preg_replace('#Argon2-Salt: ([0-9a-f]+)#', '$1', $key[$offset++])));
243 extract(self::generateV3Key($password, $flavour, $memory, $passes, $salt));
334 $salt = Random::string(16);
339 $key .= "Argon2-Salt: " . Hex::encode($salt) . "\r\n";
340 extract(self::generateV3Key($password, 'Argon2id', 8192, 13, $salt));
H A DPKCS8.php368 $cipher->setPassword($password, $kdf, $hash, $salt, $iterationCount);
425 $salt,
541 $salt = Random::string(8);
555 'salt' => $salt,
591 'salt' => $salt,
596 $crypto->setPassword($password, $kdf, $hash, $salt, $iterationCount);
/plugin/fedauth/Auth/OpenID/
H A DSQLiteStore.php58 function _add_nonce($server_url, $timestamp, $salt) argument
67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
H A DNonce.php96 $salt = Auth_OpenID_CryptUtil::randomString(
106 return $time_str . $salt;
H A DMemcachedStore.php165 function useNonce($server_url, $timestamp, $salt) argument
177 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
H A DSQLStore.php454 function _add_nonce($server_url, $timestamp, $salt) argument
459 $salt));
468 function useNonce($server_url, $timestamp, $salt) argument
476 return $this->_add_nonce($server_url, $timestamp, $salt);
H A DDumbStore.php86 function useNonce($server_url, $timestamp, $salt) argument
H A DInterface.php183 function useNonce($server_url, $timestamp, $salt) argument
H A DMDB2Store.php370 function useNonce($server_url, $timestamp, $salt) argument
380 "salt" => $salt
/plugin/openid/Auth/OpenID/
H A DSQLiteStore.php58 function _add_nonce($server_url, $timestamp, $salt) argument
67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
H A DNonce.php96 $salt = Auth_OpenID_CryptUtil::randomString(
106 return $time_str . $salt;
H A DMemcachedStore.php165 function useNonce($server_url, $timestamp, $salt) argument
177 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
H A DSQLStore.php454 function _add_nonce($server_url, $timestamp, $salt) argument
459 $salt));
468 function useNonce($server_url, $timestamp, $salt) argument
476 return $this->_add_nonce($server_url, $timestamp, $salt);
H A DDumbStore.php86 function useNonce($server_url, $timestamp, $salt) argument
H A DInterface.php183 function useNonce($server_url, $timestamp, $salt) argument
H A DMDB2Store.php370 function useNonce($server_url, $timestamp, $salt) argument
380 "salt" => $salt
/plugin/authdrupal8/
H A Dpassword.inc84 * Generates a random base 64-encoded salt prefixed with settings for the hash.
97 * A 12 character string containing the iteration count and a random salt.
106 // 6 bytes is the standard salt for a portable phpass hash.
135 * By using a salt and repeated hashing the password is "stretched". Its
146 * at least 12 characters (the settings and salt).
149 * A string containing the hashed password (and salt) or FALSE on failure.
168 $salt = substr($setting, 4, 8);
169 // Hashes must have an 8 character salt.
170 if (strlen($salt) != 8) {
178 $hash = hash($algo, $salt . $password, TRUE);
[all …]
/plugin/authwordpress/
H A Dclass-phpass.php138 $salt = substr($setting, 4, 8);
139 if (strlen($salt) != 8)
149 $hash = md5($salt . $password, TRUE);
154 $hash = pack('H*', md5($salt . $password));
/plugin/jplayer/vendor/kriswallsmith/assetic/src/Assetic/Asset/
H A DAssetCache.php143 * @param string $salt Salt for the key
147 …c function getCacheKey(AssetInterface $asset, FilterInterface $additionalFilter = null, $salt = '') argument
172 return md5($cacheKey.$salt);
/plugin/database2/
H A Dmedia.php124 $salt = $_SESSION['database2'][$pageID]['tables'][$ioIndex]['linkedMediaSalts'][$t]; variable
126 if ( !is_string( $salt ) || ( trim( $salt ) === '' ) )
213 if ( Database2::ssha( $source, $salt ) !== $providedHash )
/plugin/authucenter/lib/uc_client/model/
H A Duser.php131 $salt = substr(uniqid(rand()), -6);
132 $password = md5(md5($password).$salt);
135 …sword='$password', email='$email', regip='$regip', regdate='".$this->base->time."', salt='$salt'");
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/
H A DPrivateKey.php226 $salt = Random::string($sLen);
227 $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
230 $db = $ps . chr(1) . $salt;

123