/plugin/encryptedpasswords/script/ |
H A D | SubtleAES.js | 19 const salt = this.randomSalt(); 20 const {hash, iv} = await this.derivePkdf2(password, salt, 'SHA-256', this.iterations); 27 return this.createOpenSSLCryptString(salt, new Uint8Array(cipher)); 39 const {salt, cipher} = this.parseOpenSSLCryptString(ciphertext); 43 ({hash, iv} = this.deriveMd5(password, salt)); 45 ({hash, iv} = await this.derivePkdf2(password, salt, 'SHA-256', this.iterations)); 76 * Generate a random salt 88 * @return {{cipher: Uint8Array, salt: Uint8Array}} 98 salt: new Uint8Array(Array.from(ostring.slice(8, 16)).map(ch => ch.charCodeAt(0))), 106 * @param {Uint8Array} salt 110 createOpenSSLCryptString(salt, cipher) global() argument 131 derivePkdf2(strPassword, salt, hash, iterations) global() argument 161 deriveMd5(strPassword, salt) global() argument [all...] |
/plugin/authgooglesheets/vendor/google/apiclient-services/src/RemoteBuildExecution/ |
H A D | BuildBazelRemoteExecutionV2Action.php | 29 public $salt; variable in Google\\Service\\RemoteBuildExecution\\BuildBazelRemoteExecutionV2Action 82 public function setSalt($salt) argument 84 $this->salt = $salt; 88 return $this->salt;
|
/plugin/authgooglesheets/vendor/google/apiclient-services/src/IdentityToolkit/ |
H A D | UserInfo.php | 81 public $salt; variable in Google\\Service\\IdentityToolkit\\UserInfo 302 public function setSalt($salt) argument 304 $this->salt = $salt; 311 return $this->salt;
|
/plugin/openid/Auth/OpenID/ |
H A D | PredisStore.php | 151 function useNonce($server_url, $timestamp, $salt) argument 161 $nonceKey = $this->nonceKey($server_url, $salt); 175 private function nonceKey($server_url, $salt) argument 179 sha1($server_url) . '_' . sha1($salt);
|
H A D | SQLiteStore.php | 58 function _add_nonce($server_url, $timestamp, $salt) argument 67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
|
H A D | DumbStore.php | 100 * @param string $salt 103 function useNonce($server_url, $timestamp, $salt) argument
|
H A D | Interface.php | 179 * @param string $salt 182 function useNonce($server_url, $timestamp, $salt) argument
|
H A D | MemcachedStore.php | 184 * @param string $salt 187 function useNonce($server_url, $timestamp, $salt) argument 199 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
|
H A D | Nonce.php | 96 $salt = Auth_OpenID_CryptUtil::randomString( 106 return $time_str . $salt;
|
H A D | SQLStore.php | 484 * @param string $salt 487 function _add_nonce($server_url, $timestamp, $salt) argument 493 $salt, 503 function useNonce($server_url, $timestamp, $salt) argument 511 return $this->_add_nonce($server_url, $timestamp, $salt);
|
H A D | MDB2Store.php | 370 function useNonce($server_url, $timestamp, $salt) argument 380 "salt" => $salt,
|
/plugin/authgooglesheets/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/ |
H A D | PuTTY.php | 105 * @param string $salt 108 private static function generateV3Key($password, $flavour, $memory, $passes, $salt) argument 126 $temp = sodium_crypto_pwhash($length, $password, $salt, $passes, $memory << 10, $flavour); 241 … $salt = Hex::decode(trim(preg_replace('#Argon2-Salt: ([0-9a-f]+)#', '$1', $key[$offset++]))); 243 extract(self::generateV3Key($password, $flavour, $memory, $passes, $salt)); 334 $salt = Random::string(16); 339 $key .= "Argon2-Salt: " . Hex::encode($salt) . "\r\n"; 340 extract(self::generateV3Key($password, 'Argon2id', 8192, 13, $salt));
|
H A D | PKCS8.php | 368 $cipher->setPassword($password, $kdf, $hash, $salt, $iterationCount); 425 $salt, 541 $salt = Random::string(8); 555 'salt' => $salt, 591 'salt' => $salt, 596 $crypto->setPassword($password, $kdf, $hash, $salt, $iterationCount);
|
/plugin/fedauth/Auth/OpenID/ |
H A D | SQLiteStore.php | 58 function _add_nonce($server_url, $timestamp, $salt) argument 67 return parent::_add_nonce('x' . $server_url, $timestamp, $salt);
|
H A D | Nonce.php | 96 $salt = Auth_OpenID_CryptUtil::randomString( 106 return $time_str . $salt;
|
H A D | MemcachedStore.php | 165 function useNonce($server_url, $timestamp, $salt) argument 177 'openid_nonce_' . sha1($server_url) . '_' . sha1($salt),
|
H A D | SQLStore.php | 454 function _add_nonce($server_url, $timestamp, $salt) argument 459 $salt)); 468 function useNonce($server_url, $timestamp, $salt) argument 476 return $this->_add_nonce($server_url, $timestamp, $salt);
|
H A D | DumbStore.php | 86 function useNonce($server_url, $timestamp, $salt) argument
|
H A D | Interface.php | 183 function useNonce($server_url, $timestamp, $salt) argument
|
H A D | MDB2Store.php | 370 function useNonce($server_url, $timestamp, $salt) argument 380 "salt" => $salt
|
/plugin/authdrupal8/ |
H A D | password.inc | 75 * Generates a random base 64-encoded salt prefixed with settings for the hash. 88 * A 12 character string containing the iteration count and a random salt. 97 // 6 bytes is the standard salt for a portable phpass hash. 125 * By using a salt and repeated hashing the password is "stretched". Its 136 * at least 12 characters (the settings and salt). 139 * A string containing the hashed password (and salt) or FALSE on failure. 165 $salt = substr($setting, 4, 8); 166 // Hashes must have an 8 character salt. 167 if (strlen($salt) != 8) { 173 $hash = hash($algo, $salt [all...] |
/plugin/authwordpress/ |
H A D | class-phpass.php | 138 $salt = substr($setting, 4, 8); 139 if (strlen($salt) != 8) 149 $hash = md5($salt . $password, TRUE); 154 $hash = pack('H*', md5($salt . $password)); 190 # bcrypt will happily accept and correct a salt string which
|
/plugin/jplayer/vendor/kriswallsmith/assetic/src/Assetic/Asset/ |
H A D | AssetCache.php | 143 * @param string $salt Salt for the key 147 …c function getCacheKey(AssetInterface $asset, FilterInterface $additionalFilter = null, $salt = '') argument 172 return md5($cacheKey.$salt);
|
/plugin/database2/ |
H A D | media.php | 124 $salt = $_SESSION['database2'][$pageID]['tables'][$ioIndex]['linkedMediaSalts'][$t]; variable 126 if ( !is_string( $salt ) || ( trim( $salt ) === '' ) ) 213 if ( Database2::ssha( $source, $salt ) !== $providedHash )
|
/plugin/authucenter/lib/uc_client/model/ |
H A D | user.php | 131 $salt = substr(uniqid(rand()), -6); 132 $password = md5(md5($password).$salt); 135 …sword='$password', email='$email', regip='$regip', regdate='".$this->base->time."', salt='$salt'");
|