Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 67) sorted by last modified time

123

/plugin/encryptedpasswords/script/
H A DSubtleAES.js19 const salt = this.randomSalt();
20 const {hash, iv} = await this.derivePkdf2(password, salt, 'SHA-256', this.iterations);
27 return this.createOpenSSLCryptString(salt, new Uint8Array(cipher));
39 const {salt, cipher} = this.parseOpenSSLCryptString(ciphertext);
43 ({hash, iv} = this.deriveMd5(password, salt));
45 ({hash, iv} = await this.derivePkdf2(password, salt, 'SHA-256', this.iterations));
76 * Generate a random salt
88 * @return {{cipher: Uint8Array, salt: Uint8Array}}
98 salt: new Uint8Array(Array.from(ostring.slice(8, 16)).map(ch => ch.charCodeAt(0))),
106 * @param {Uint8Array} salt
110 createOpenSSLCryptString(salt, cipher) global() argument
131 derivePkdf2(strPassword, salt, hash, iterations) global() argument
161 deriveMd5(strPassword, salt) global() argument
[all...]
/plugin/xlsx2dw/packages/exceljs/
H A Dexceljs.js49086 if (salt) {
49087 if (!Buffer.isBuffer(salt)) salt = Buffer.from(salt, 'binary');
49100 if (salt) hash.update(salt);
70218 var salt = data.algorithm.decrypt.kde.kdeparams.salt;
70296 salt: salt,
70344 salt = toBuffer(salt, defaultEncoding, 'Salt');
70480 salt = toBuffer(salt, defaultEncoding, 'Salt');
70482 var hmac = new Hmac(digest, password, salt.length);
70484 var block1 = Buffer.allocUnsafe(salt.length + 4);
70485 salt.copy(block1, 0, 0, salt.length);
[all …]
/plugin/authwordpress/
H A Dclass-phpass.php138 $salt = substr($setting, 4, 8);
139 if (strlen($salt) != 8)
149 $hash = md5($salt . $password, TRUE);
154 $hash = pack('H*', md5($salt . $password));
190 # bcrypt will happily accept and correct a salt string which
/plugin/openid/Auth/OpenID/
H A DConsumer.php1347 list($timestamp, $salt) = $parts;
1349 if (!$this->store->useNonce($server_url, $timestamp, $salt)) {
H A DMDB2Store.php370 function useNonce($server_url, $timestamp, $salt) argument
380 "salt" => $salt,
H A DDumbStore.php100 * @param string $salt
103 function useNonce($server_url, $timestamp, $salt) argument
H A DFileStore.php391 * @param string $salt
394 function useNonce($server_url, $timestamp, $salt) argument
417 $salt_hash = $this->_safe64($salt);
H A DMemcachedStore.php184 * @param string $salt
187 function useNonce($server_url, $timestamp, $salt) argument
199 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
H A DNonce.php96 $salt = Auth_OpenID_CryptUtil::randomString(
106 return $time_str . $salt;
H A DPredisStore.php151 function useNonce($server_url, $timestamp, $salt) argument
161 $nonceKey = $this->nonceKey($server_url, $salt);
175 private function nonceKey($server_url, $salt) argument
179 sha1($server_url) . '_' . sha1($salt);
H A DSQLStore.php484 * @param string $salt
487 function _add_nonce($server_url, $timestamp, $salt) argument
493 $salt,
503 function useNonce($server_url, $timestamp, $salt) argument
511 return $this->_add_nonce($server_url, $timestamp, $salt);
H A DSQLiteStore.php58 function _add_nonce($server_url, $timestamp, $salt) argument
67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
H A DInterface.php179 * @param string $salt
182 function useNonce($server_url, $timestamp, $salt) argument
/plugin/authdrupal8/
H A Dpassword.inc75 * Generates a random base 64-encoded salt prefixed with settings for the hash.
88 * A 12 character string containing the iteration count and a random salt.
97 // 6 bytes is the standard salt for a portable phpass hash.
125 * By using a salt and repeated hashing the password is "stretched". Its
136 * at least 12 characters (the settings and salt).
139 * A string containing the hashed password (and salt) or FALSE on failure.
165 $salt = substr($setting, 4, 8);
166 // Hashes must have an 8 character salt.
167 if (strlen($salt) != 8) {
173 $hash = hash($algo, $salt
[all...]
/plugin/captcha/
H A Dhelper.php178 $salt = auth_cookiesalt();
180 return sha1(implode("\n", [$ID, $lm, $td, $ip, $salt]));
456 * Encrypt the given string with the cookie salt
468 * Decrypt the given string with the cookie salt
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/
H A DPKCS8.php368 $cipher->setPassword($password, $kdf, $hash, $salt, $iterationCount);
425 $salt,
541 $salt = Random::string(8);
555 'salt' => $salt,
591 'salt' => $salt,
596 $crypto->setPassword($password, $kdf, $hash, $salt, $iterationCount);
H A DPuTTY.php105 * @param string $salt
108 private static function generateV3Key($password, $flavour, $memory, $passes, $salt) argument
126 $temp = sodium_crypto_pwhash($length, $password, $salt, $passes, $memory << 10, $flavour);
241 … $salt = Hex::decode(trim(preg_replace('#Argon2-Salt: ([0-9a-f]+)#', '$1', $key[$offset++])));
243 extract(self::generateV3Key($password, $flavour, $memory, $passes, $salt));
334 $salt = Random::string(16);
339 $key .= "Argon2-Salt: " . Hex::encode($salt) . "\r\n";
340 extract(self::generateV3Key($password, 'Argon2id', 8192, 13, $salt));
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/
H A DSymmetricKey.php954 $salt = isset($func_args[1]) ? $func_args[1] : $this->password_default_salt;
1004 if (strlen($salt)) {
1006 $s .= $salt;
1031 $t = $password . $salt;
1047 $f = $u = $hashObj->hash($salt . pack('N', $i++));
1057 $key = hash_pbkdf2($hash, $password, $salt, $count, $dkLen, true);
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/
H A DPublicKey.php263 $salt = substr($db, $temp + 1); // should be $sLen long
264 $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
H A DPrivateKey.php226 $salt = Random::string($sLen);
227 $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
230 $db = $ps . chr(1) . $salt;
/plugin/authgooglesheets/vendor/google/apiclient-services/src/RemoteBuildExecution/
H A DBuildBazelRemoteExecutionV2Action.php29 public $salt; variable in Google\\Service\\RemoteBuildExecution\\BuildBazelRemoteExecutionV2Action
82 public function setSalt($salt) argument
84 $this->salt = $salt;
88 return $this->salt;
/plugin/authgooglesheets/vendor/google/apiclient-services/src/IdentityToolkit/
H A DUserInfo.php81 public $salt; variable in Google\\Service\\IdentityToolkit\\UserInfo
302 public function setSalt($salt) argument
304 $this->salt = $salt;
311 return $this->salt;
/plugin/passpolicy/
H A Dwords.txt3060 salt
/plugin/preregister/
H A Daction.php104 $salt = auth_cookiesalt();
105 $index = md5(microtime() . $salt);
/plugin/diagramsnet/lib/js/cryptojs/
H A Daes.min.js28 …}}),b=(p.format={}).OpenSSL={stringify:function(a){var b=a.ciphertext;a=a.salt;return(a?s.create([…
29 …(b.slice(2,4));b.splice(0,4);a.sigBytes-=16}return n.create({ciphertext:a,salt:c})}},a=d.Serializa…
30 …s.create(a.words.slice(b),4*c);a.sigBytes=4*b;return n.create({key:a,iv:c,salt:d})}},c=d.PasswordB…
31 …xtend(l);c=this._parse(c,l.format);d=l.kdf.execute(d,b.keySize,b.ivSize,c.salt);l.iv=d.iv;return a…

123