/plugin/encryptedpasswords/script/ |
H A D | SubtleAES.js | 19 const salt = this.randomSalt(); 20 const {hash, iv} = await this.derivePkdf2(password, salt, 'SHA-256', this.iterations); 27 return this.createOpenSSLCryptString(salt, new Uint8Array(cipher)); 39 const {salt, cipher} = this.parseOpenSSLCryptString(ciphertext); 43 ({hash, iv} = this.deriveMd5(password, salt)); 45 ({hash, iv} = await this.derivePkdf2(password, salt, 'SHA-256', this.iterations)); 76 * Generate a random salt 88 * @return {{cipher: Uint8Array, salt: Uint8Array}} 98 salt: new Uint8Array(Array.from(ostring.slice(8, 16)).map(ch => ch.charCodeAt(0))), 106 * @param {Uint8Array} salt 110 createOpenSSLCryptString(salt, cipher) global() argument 131 derivePkdf2(strPassword, salt, hash, iterations) global() argument 161 deriveMd5(strPassword, salt) global() argument [all...] |
/plugin/xlsx2dw/packages/exceljs/ |
H A D | exceljs.js | 49086 if (salt) { 49087 if (!Buffer.isBuffer(salt)) salt = Buffer.from(salt, 'binary'); 49100 if (salt) hash.update(salt); 70218 var salt = data.algorithm.decrypt.kde.kdeparams.salt; 70296 salt: salt, 70344 salt = toBuffer(salt, defaultEncoding, 'Salt'); 70480 salt = toBuffer(salt, defaultEncoding, 'Salt'); 70482 var hmac = new Hmac(digest, password, salt.length); 70484 var block1 = Buffer.allocUnsafe(salt.length + 4); 70485 salt.copy(block1, 0, 0, salt.length); [all …]
|
/plugin/authwordpress/ |
H A D | class-phpass.php | 138 $salt = substr($setting, 4, 8); 139 if (strlen($salt) != 8) 149 $hash = md5($salt . $password, TRUE); 154 $hash = pack('H*', md5($salt . $password)); 190 # bcrypt will happily accept and correct a salt string which
|
/plugin/openid/Auth/OpenID/ |
H A D | Consumer.php | 1347 list($timestamp, $salt) = $parts; 1349 if (!$this->store->useNonce($server_url, $timestamp, $salt)) {
|
H A D | MDB2Store.php | 370 function useNonce($server_url, $timestamp, $salt) argument 380 "salt" => $salt,
|
H A D | DumbStore.php | 100 * @param string $salt 103 function useNonce($server_url, $timestamp, $salt) argument
|
H A D | FileStore.php | 391 * @param string $salt 394 function useNonce($server_url, $timestamp, $salt) argument 417 $salt_hash = $this->_safe64($salt);
|
H A D | MemcachedStore.php | 184 * @param string $salt 187 function useNonce($server_url, $timestamp, $salt) argument 199 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
|
H A D | Nonce.php | 96 $salt = Auth_OpenID_CryptUtil::randomString( 106 return $time_str . $salt;
|
H A D | PredisStore.php | 151 function useNonce($server_url, $timestamp, $salt) argument 161 $nonceKey = $this->nonceKey($server_url, $salt); 175 private function nonceKey($server_url, $salt) argument 179 sha1($server_url) . '_' . sha1($salt);
|
H A D | SQLStore.php | 484 * @param string $salt 487 function _add_nonce($server_url, $timestamp, $salt) argument 493 $salt, 503 function useNonce($server_url, $timestamp, $salt) argument 511 return $this->_add_nonce($server_url, $timestamp, $salt);
|
H A D | SQLiteStore.php | 58 function _add_nonce($server_url, $timestamp, $salt) argument 67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
|
H A D | Interface.php | 179 * @param string $salt 182 function useNonce($server_url, $timestamp, $salt) argument
|
/plugin/authdrupal8/ |
H A D | password.inc | 75 * Generates a random base 64-encoded salt prefixed with settings for the hash. 88 * A 12 character string containing the iteration count and a random salt. 97 // 6 bytes is the standard salt for a portable phpass hash. 125 * By using a salt and repeated hashing the password is "stretched". Its 136 * at least 12 characters (the settings and salt). 139 * A string containing the hashed password (and salt) or FALSE on failure. 165 $salt = substr($setting, 4, 8); 166 // Hashes must have an 8 character salt. 167 if (strlen($salt) != 8) { 173 $hash = hash($algo, $salt [all...] |
/plugin/captcha/ |
H A D | helper.php | 178 $salt = auth_cookiesalt(); 180 return sha1(implode("\n", [$ID, $lm, $td, $ip, $salt])); 456 * Encrypt the given string with the cookie salt 468 * Decrypt the given string with the cookie salt
|
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/ |
H A D | PKCS8.php | 368 $cipher->setPassword($password, $kdf, $hash, $salt, $iterationCount); 425 $salt, 541 $salt = Random::string(8); 555 'salt' => $salt, 591 'salt' => $salt, 596 $crypto->setPassword($password, $kdf, $hash, $salt, $iterationCount);
|
H A D | PuTTY.php | 105 * @param string $salt 108 private static function generateV3Key($password, $flavour, $memory, $passes, $salt) argument 126 $temp = sodium_crypto_pwhash($length, $password, $salt, $passes, $memory << 10, $flavour); 241 … $salt = Hex::decode(trim(preg_replace('#Argon2-Salt: ([0-9a-f]+)#', '$1', $key[$offset++]))); 243 extract(self::generateV3Key($password, $flavour, $memory, $passes, $salt)); 334 $salt = Random::string(16); 339 $key .= "Argon2-Salt: " . Hex::encode($salt) . "\r\n"; 340 extract(self::generateV3Key($password, 'Argon2id', 8192, 13, $salt));
|
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/ |
H A D | SymmetricKey.php | 954 $salt = isset($func_args[1]) ? $func_args[1] : $this->password_default_salt; 1004 if (strlen($salt)) { 1006 $s .= $salt; 1031 $t = $password . $salt; 1047 $f = $u = $hashObj->hash($salt . pack('N', $i++)); 1057 $key = hash_pbkdf2($hash, $password, $salt, $count, $dkLen, true);
|
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/ |
H A D | PublicKey.php | 263 $salt = substr($db, $temp + 1); // should be $sLen long 264 $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
|
H A D | PrivateKey.php | 226 $salt = Random::string($sLen); 227 $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt; 230 $db = $ps . chr(1) . $salt;
|
/plugin/authgooglesheets/vendor/google/apiclient-services/src/RemoteBuildExecution/ |
H A D | BuildBazelRemoteExecutionV2Action.php | 29 public $salt; variable in Google\\Service\\RemoteBuildExecution\\BuildBazelRemoteExecutionV2Action 82 public function setSalt($salt) argument 84 $this->salt = $salt; 88 return $this->salt;
|
/plugin/authgooglesheets/vendor/google/apiclient-services/src/IdentityToolkit/ |
H A D | UserInfo.php | 81 public $salt; variable in Google\\Service\\IdentityToolkit\\UserInfo 302 public function setSalt($salt) argument 304 $this->salt = $salt; 311 return $this->salt;
|
/plugin/passpolicy/ |
H A D | words.txt | 3060 salt
|
/plugin/preregister/ |
H A D | action.php | 104 $salt = auth_cookiesalt(); 105 $index = md5(microtime() . $salt);
|
/plugin/diagramsnet/lib/js/cryptojs/ |
H A D | aes.min.js | 28 …}}),b=(p.format={}).OpenSSL={stringify:function(a){var b=a.ciphertext;a=a.salt;return(a?s.create([… 29 …(b.slice(2,4));b.splice(0,4);a.sigBytes-=16}return n.create({ciphertext:a,salt:c})}},a=d.Serializa… 30 …s.create(a.words.slice(b),4*c);a.sigBytes=4*b;return n.create({key:a,iv:c,salt:d})}},c=d.PasswordB… 31 …xtend(l);c=this._parse(c,l.format);d=l.kdf.execute(d,b.keySize,b.ivSize,c.salt);l.iv=d.iv;return a…
|