Skip to content

Instantly share code, notes, and snippets.

@Whateverable
Created May 24, 2017 15:41
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Whateverable/462a7280c6d48f00b125dfa5ce1756b8 to your computer and use it in GitHub Desktop.
Save Whateverable/462a7280c6d48f00b125dfa5ce1756b8 to your computer and use it in GitHub Desktop.
greppable6
pa..word

7ojo/perl6-platform:4: ​ - LDAP_ADMIN_​​PASSWORD​​="aiquoD1F"​
7ojo/perl6-platform:32: ​ user​​Password​​: {crypt}x​
7ojo/perl6-platform:55: ​ @cmd.push: '-D' if not %params<​​password​​>;​
7ojo/perl6-platform:63: ​ @cmd.push: '--disabled-​​password​​' if not %params<​​password​​>;​
Altai-man/perl6-Config-Netrc:24: ​​​password​​ => {value => val, comment => my-comment}​
Altai-man/perl6-Config-Netrc:26: ​Of course, login or ​​password​​ lines are optional and comment entry for lines like following:​
Altai-man/perl6-Config-Netrc:16: ​ <​​password​​>? \n? }​
Altai-man/perl6-Config-Netrc:20: ​ token ​​password​​ { \h*? '​​password​​' \h+? (\w+) (<comment>?) <eol> }​
Altai-man/perl6-Config-Netrc:27: ​ ​​password​​ => $<​​password​​>.made}​
Altai-man/perl6-Config-Netrc:31: ​ ​​password​​ => $<​​password​​>.made}​
Altai-man/perl6-Config-Netrc:62: ​ method ​​password​​ ($/) { $/.make: comment-layering($/); }​
Altai-man/perl6-Config-Netrc:94: ​# ​​password​​ p​
Altai-man/perl6-Config-Netrc:98: ​# ​​password​​ default_​​password​​​
Altai-man/perl6-Config-Netrc:103: ​# ​​password​​ => {value => p}}​
Altai-man/perl6-Config-Netrc:107: ​# ​​password​​ => {value => default_​​password​​}}]}​
Altai-man/perl6-Config-Netrc:28: ​ if $entry<​​password​​> {​
Altai-man/perl6-Config-Netrc:29: ​ $output ~= " ​​password​​ " ~​
Altai-man/perl6-Config-Netrc:30: ​ $entry<​​password​​><value> ~ ' ' ~​
Altai-man/perl6-Config-Netrc:31: ​ ($entry<​​password​​><comment>.defined ??​
Altai-man/perl6-Config-Netrc:32: ​ $entry<​​password​​><comment>​
Altai-man/perl6-Config-Netrc:12: ​​​password​​ p # cool ​​password​​​
Altai-man/perl6-Config-Netrc:16: ​​​password​​ default_​​password​​​
Altai-man/perl6-Config-Netrc:25: ​​​password​​ pd​
Altai-man/perl6-Config-Netrc:41: ​​​password​​ p # easy case​
Altai-man/perl6-Config-Netrc:48: ​​​password​​ p # with only ​​password​​​
CIAvash/App-Football:340: ​source code form), and must require no special ​​password​​ or key for​
CIAvash/WebService-FootballData:340: ​source code form), and must require no special ​​password​​ or key for​
Cofyc/perl6-redis:217: ​method auth(Str $​​password​​) returns Bool {​
Cofyc/perl6-redis:218: ​ return self.exec_command("AUTH", $​​password​​);​
Cofyc/perl6-redis:12: ​#dies-ok { $r.auth("WRONG ​​PASSWORD​​"); }​
CurtTilmes/perl6-libcurl:25: ​ proxies, cookies, user+​​password​​ authentication (Basic, Digest,​
CurtTilmes/perl6-libcurl:210: ​[​​password​​](https://curl.haxx.se/libcurl/c/CURLOPT_​​PASSWORD​​.html)​
CurtTilmes/perl6-libcurl:459: ​embedded user + ​​password​​.​
CurtTilmes/perl6-libcurl:197: ​ ​​password​​ => (CURLOPT_​​PASSWORD​​, CURLOPT_STR ),​
CurtTilmes/perl6-libcurl:409: ​constant CURLOPT_​​PASSWORD​​ = CURLOPTTYPE_OBJECTPOINT + 174;​
CurtTilmes/perl6-libcurl:411: ​constant CURLOPT_PROXY​​PASSWORD​​ = CURLOPTTYPE_OBJECTPOINT + 176;​
CurtTilmes/perl6-libcurl:440: ​constant CURLOPT_TLSAUTH_​​PASSWORD​​ = CURLOPTTYPE_OBJECTPOINT + 205;​
CurtTilmes/perl6-libcurl:21: ​is $curl.statusline, 'HTTP/1.1 401 You give me wrong ​​password​​',​
CurtTilmes/perl6-libcurl:24: ​is $curl.content, "Wrong ​​password​​ dude. Get it fixed and return.\n", 'content';​
Emeric54/p6-text-caesar:13: ​ "tags" : [ "crypt", "​​password​​" ],​
JJ/p6-math-constants:340: ​source code form), and must require no special ​​password​​ or key for​
Juerd/p6-mqtt:250: ​No username and ​​password​​ are sent to the server.​
LLFourn/p6-AttrX-InitArg:13: ​ method get-message($​​password​​){​
LLFourn/p6-AttrX-InitArg:14: ​ $​​password​​ eq 'opensesame' ?? $!message !! Nil;​
LLFourn/p6-AttrX-InitArg:10: ​ method get-secret-message($​​password​​){​
LLFourn/p6-AttrX-InitArg:11: ​ $​​password​​ eq 'opensesame' ?? $!message !! Str;​
LLFourn/p6-AttrX-InitArg:11: ​ method get-message($​​password​​){​
LLFourn/p6-AttrX-InitArg:12: ​ $​​password​​ eq 'opensesame' ?? $!message !! Nil;​
LLFourn/p6-AttrX-InitArg:8: ​ method get-secret-message($​​password​​){​
LLFourn/p6-AttrX-InitArg:9: ​ $​​password​​ eq 'opensesame' ?? $!message !! Str;​
MARTIMM/Auth-SCRAM:46: ​ :​​password​​<pencil>,​
MARTIMM/Auth-SCRAM:40: ​ * mangle-​​password​​ and clean-up in user objects are made optional. Called when defined.​
MARTIMM/Auth-SCRAM:7: ​* Keep information when calculated. User request boolean and username/​​password​​/authzid tuple must be kept the same. This saves time.​
MARTIMM/Auth-SCRAM:15: ​# and username/​​password​​/authzid must be kept the same. This saves time.​
MARTIMM/Auth-SCRAM:30: ​ Str :$​​password​​,​
MARTIMM/Auth-SCRAM:45: ​ die 'No username and/or ​​password​​ provided'​
MARTIMM/Auth-SCRAM:46: ​ unless ? $username and ? $​​password​​;​
MARTIMM/Auth-SCRAM:54: ​ self.init( :$username, :$​​password​​, :$authzid, :client-object($helper-object));​
MARTIMM/Auth-SCRAM:75: ​ Str :$​​password​​!,​
MARTIMM/Auth-SCRAM:95: ​ :$username, :$​​password​​, :$authzid, :$client-object​
MARTIMM/Auth-SCRAM:124: ​ Str:D :$username is copy, Str:D :$​​password​​ is copy,​
MARTIMM/Auth-SCRAM:133: ​ $​​password​​ = self.normalize( $​​password​​, :!prep-username, :$enforce);​
MARTIMM/Auth-SCRAM:137: ​ my Buf $mangled-​​password​​;​
MARTIMM/Auth-SCRAM:138: ​ if $helper-object.^can('mangle-​​password​​') {​
MARTIMM/Auth-SCRAM:139: ​ $mangled-​​password​​ = $helper-object.mangle-​​password​​(​
MARTIMM/Auth-SCRAM:140: ​ :$username, :$​​password​​, :$authzid​
MARTIMM/Auth-SCRAM:145: ​ $mangled-​​password​​ = Buf.new($​​password​​.encode);​
MARTIMM/Auth-SCRAM:148: ​ $!pbkdf2.derive( $mangled-​​password​​, $salt, $iter);​
MARTIMM/Auth-SCRAM:152: ​ method client-key ( Buf $salted-​​password​​ --> Buf ) {​
MARTIMM/Auth-SCRAM:154: ​ hmac( $salted-​​password​​, 'Client Key', &$!CGH);​
MARTIMM/Auth-SCRAM:170: ​ method server-key ( Buf $salted-​​password​​ --> Buf ) {​
MARTIMM/Auth-SCRAM:172: ​ hmac( $salted-​​password​​, 'Server Key', &$!CGH);​
MARTIMM/Auth-SCRAM:222: ​ # Normalize ​​password​​​
MARTIMM/Auth-SCRAM:226: ​ die "​​Password​​ not accepted" if $prepped-text ~~ Bool;​
MARTIMM/Auth-SCRAM:28: ​ Str :$​​password​​!,​
MARTIMM/Auth-SCRAM:43: ​Usernames and ​​password​​ (and maybe the authorization id) must be normalized.​
MARTIMM/Auth-SCRAM:49: ​set to True. There is only one type of profile for ​​password​​s so no control​
MARTIMM/Auth-SCRAM:63: ​Username, ​​password​​ and authorization id are not needed when a server side object​
MARTIMM/Auth-SCRAM:82: ​ Str:D :$username is copy, Str:D :$​​password​​ is copy,​
MARTIMM/Auth-SCRAM:89: ​Calculate the derived key from the ​​password​​, salt and number of iterations. The​
MARTIMM/Auth-SCRAM:92: ​The username and ​​password​​ are normalized using the PRECIS framework described​
MARTIMM/Auth-SCRAM:99: ​When the method C<mangle-​​password​​> is defined in the user provided helper​
MARTIMM/Auth-SCRAM:103: ​ method mangle-​​password​​ (​
MARTIMM/Auth-SCRAM:105: ​ Str :$​​password​​,​
MARTIMM/Auth-SCRAM:112: ​ my Buf $mangled-​​password​​ .= new($​​password​​.encode);​
MARTIMM/Auth-SCRAM:117: ​ method client-key ( Buf $salted-​​password​​ --> Buf ) {​
MARTIMM/Auth-SCRAM:159: ​username or ​​password​​ profile is choosen. C<$case-preserved-profile> selects​
MARTIMM/Auth-SCRAM:10: ​# and username/​​password​​/authzid must be kept the same. This saves time.​
MARTIMM/Auth-SCRAM:16: ​ has Str $!​​password​​;​
MARTIMM/Auth-SCRAM:41: ​ has Buf $!salted-​​password​​;​
MARTIMM/Auth-SCRAM:60: ​ Str :$username, Str :$​​password​​, Str :$authzid,​
MARTIMM/Auth-SCRAM:68: ​ Str:D :$​​password​​!,​
MARTIMM/Auth-SCRAM:74: ​ $!​​password​​ = $​​password​​;​
MARTIMM/Auth-SCRAM:168: ​ $!salted-​​password​​ = self.derive-key(​
MARTIMM/Auth-SCRAM:169: ​ :$!username, :$!​​password​​, :$!authzid, :!enforce​
MARTIMM/Auth-SCRAM:174: ​ $!client-key = self.client-key($!salted-​​password​​);​
MARTIMM/Auth-SCRAM:241: ​ $!server-key = self.server-key($!salted-​​password​​);​
MARTIMM/Auth-SCRAM:43: ​ :​​password​​<pencil>,​
MARTIMM/Auth-SCRAM:88: ​ Str:D :$username!, Str:D :$​​password​​!, Str :$authzid,​
MARTIMM/Auth-SCRAM:116: ​=item1 B<mangle-​​password​​>. This method is optional. Some servers, like mongod,​
MARTIMM/Auth-SCRAM:117: ​need extra manipulations to mangle the data. The username and ​​password​​ are​
MARTIMM/Auth-SCRAM:120: ​ method mangle-​​password​​ (​
MARTIMM/Auth-SCRAM:121: ​ Str :$username, Str :$​​password​​, Str :$authzid ​
MARTIMM/Auth-SCRAM:127: ​ my Buf $mangled-​​password​​ = Buf.new($​​password​​.encode);​
MARTIMM/Auth-SCRAM:10: ​# and username/​​password​​/authzid must be kept the same. This saves time.​
MARTIMM/Auth-SCRAM:16: ​ has Str $!​​password​​;​
MARTIMM/Auth-SCRAM:41: ​ has Buf $!salted-​​password​​;​
MARTIMM/Auth-SCRAM:82: ​ Str :$username, Str :$​​password​​,​
MARTIMM/Auth-SCRAM:89: ​ my Buf $salted-​​password​​ = self.derive-key(​
MARTIMM/Auth-SCRAM:90: ​ :$username, :$​​password​​, :enforce,​
MARTIMM/Auth-SCRAM:95: ​ my Buf $client-key = self.client-key($salted-​​password​​);​
MARTIMM/Auth-SCRAM:97: ​ my Buf $server-key = self.server-key($salted-​​password​​);​
MARTIMM/Auth-SCRAM:16: ​risk that ​​password​​s are stolen. The server role helps to convert the username​
MARTIMM/Auth-SCRAM:17: ​and ​​password​​ into a credential tupple which can be stored without the risk that​
MARTIMM/Auth-SCRAM:18: ​the ​​password​​ can be retrieved from this data. Below is a simple implementation​
MARTIMM/Auth-SCRAM:49: ​ method add-user ( $username is copy, $​​password​​ is copy ) {​
MARTIMM/Auth-SCRAM:53: ​ :$username, :$​​password​​, :$salt, :iter(4096), :server-object(self)​
MARTIMM/Auth-SCRAM:117: ​# receive the ​​password​​ and ​​password​​ preferable over a secure connection​
MARTIMM/Auth-SCRAM:119: ​my Str $​​password​​ = '...'​
MARTIMM/Auth-SCRAM:120: ​$crd.add-user( $user, $​​password​​);​
MARTIMM/Auth-SCRAM:179: ​ Str :$username, Str :$​​password​​,​
MARTIMM/Auth-SCRAM:196: ​When the method C<mangle-​​password​​> is defined, that method will be called for​
MARTIMM/Auth-SCRAM:23: ​ Str :$username, Str:D :$​​password​​, Str :$authzid,​
MARTIMM/Auth-SCRAM:31: ​ my Buf $mangled-​​password​​;​
MARTIMM/Auth-SCRAM:32: ​ if $helper-object.^can('mangle-​​password​​') {​
MARTIMM/Auth-SCRAM:33: ​ $mangled-​​password​​ = $helper-object.mangle-​​password​​(​
MARTIMM/Auth-SCRAM:34: ​ :$username, :$​​password​​, :$authzid​
MARTIMM/Auth-SCRAM:39: ​ $mangled-​​password​​ = Buf.new($​​password​​.encode);​
MARTIMM/Auth-SCRAM:42: ​ $!pbkdf2.derive( $mangled-​​password​​, $salt, $iter);​
MARTIMM/Auth-SCRAM:14: ​# and username/​​password​​/authzid must be kept the same. This saves time.​
MARTIMM/Auth-SCRAM:20: ​ has Str $!​​password​​;​
MARTIMM/Auth-SCRAM:32: ​ # Normalization of username and ​​password​​ can be skipped if normal​
MARTIMM/Auth-SCRAM:56: ​ has Buf $!salted-​​password​​;​
MARTIMM/Auth-SCRAM:74: ​ Str:D :$​​password​​!,​
MARTIMM/Auth-SCRAM:83: ​ $!​​password​​ = $​​password​​;​
MARTIMM/Auth-SCRAM:188: ​# $!​​password​​ = self!saslPrep($!​​password​​);​
MARTIMM/Auth-SCRAM:248: ​ my Buf $mangled-​​password​​;​
MARTIMM/Auth-SCRAM:249: ​ if $!client-side.^can('mangle-​​password​​') {​
MARTIMM/Auth-SCRAM:250: ​ $mangled-​​password​​ = $!client-side.mangle-​​password​​(​
MARTIMM/Auth-SCRAM:251: ​ :$!username, :$!​​password​​, :$!authzid​
MARTIMM/Auth-SCRAM:256: ​ $mangled-​​password​​ = self.mangle-​​password​​($​​password​​);​
MARTIMM/Auth-SCRAM:259: ​ $!salted-​​password​​ = $!pbkdf2.derive( $mangled-​​password​​, $!s-salt, $!s-iter);​
MARTIMM/Auth-SCRAM:261: ​ $!client-key = hmac( $!salted-​​password​​, 'Client Key', &$!CGH);​
MARTIMM/Auth-SCRAM:332: ​ $!server-key = hmac( $!salted-​​password​​, 'Server Key', &$!CGH);​
MARTIMM/Auth-SCRAM:497: ​ my Buf $mangled-​​password​​;​
MARTIMM/Auth-SCRAM:498: ​ if $!client-side.^can('mangle-​​password​​') {​
MARTIMM/Auth-SCRAM:499: ​ $mangled-​​password​​ = $!client-side.mangle-​​password​​(​
MARTIMM/Auth-SCRAM:500: ​ :$!username, :$!​​password​​, :$!authzid​
MARTIMM/Auth-SCRAM:505: ​ $mangled-​​password​​ = self.mangle-​​password​​($​​password​​);​
MARTIMM/Auth-SCRAM:508: ​ $!salted-​​password​​ = $!pbkdf2.derive( $mangled-​​password​​, $!s-salt, $!s-iter);​
MARTIMM/Auth-SCRAM:510: ​ $!client-key = hmac( $!salted-​​password​​, 'Client Key', &$!CGH);​
MARTIMM/Auth-SCRAM:541: ​ method mangle-​​password​​ ( Str:D $​​password​​ --> Buf ) {​
MARTIMM/Auth-SCRAM:543: ​ Buf.new($!​​password​​.encode);​
MARTIMM/Auth-SCRAM:41: ​ # method mangle-​​password​​() is optional​
MARTIMM/Auth-SCRAM:55: ​ :​​password​​<pencil>,​
MARTIMM/Auth-SCRAM:32: ​ method add-user ( $username is copy, $​​password​​ is copy ) {​
MARTIMM/Auth-SCRAM:35: ​ :$username, :$​​password​​,​
MARTIMM/Auth-SCRAM:80: ​ # method mangle-​​password​​() is optional​
MARTIMM/Auth-SCRAM:30: ​ method add-user ( $username is copy, $​​password​​ is copy ) {​
MARTIMM/Auth-SCRAM:33: ​ :$username, :$​​password​​,​
MARTIMM/Auth-SCRAM:84: ​ # method mangle-​​password​​() is optional​
MARTIMM/PKCS5:7: ​This package implements part of PKCS 5 which is, according to the [wikipedia](https://en.wikipedia.org/wiki/PKCS), a ​​Password​​-based Encryption Standard. The derivation algorithm PBKDF2 is implemented as a class in this package.​
MARTIMM/PKCS5:26: ​# Input: P ​​password​​, an octet string​
MARTIMM/PKCS5:47: ​Calculate the derived key given the ​​password​​ C<$pw> and a salt C<$salt>. It​
MARTIMM/PKCS5:16: ​ Buf.new('​​password​​'.encode),​
MARTIMM/PKCS5:21: ​ is $spw, '0c60c80f961f0e71f3a9b524af6012062fe037a6', "Test '​​password​​' and 1 iteration";​
MARTIMM/PKCS5:24: ​ Buf.new('​​password​​'.encode),​
MARTIMM/PKCS5:29: ​ is $spw, 'ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957', "Test '​​password​​' and 2 iterations";​
MARTIMM/PKCS5:32: ​ Buf.new('​​password​​'.encode),​
MARTIMM/PKCS5:37: ​ is $spw, '4b007901b765489abead49d926f721d065a429c1', "Test '​​password​​' and 4096 iterations";​
MARTIMM/PKCS5:42: ​ Buf.new('​​password​​'.encode),​
MARTIMM/PKCS5:47: ​ is $spw, 'eefe3d61cd4da4e4e9945b3d6ba2158c2634e984', "Test '​​password​​' and 16777216 iterations";​
MARTIMM/PKCS5:55: ​ Buf.new('​​password​​​​PASSWORD​​​​password​​'.encode),​
MARTIMM/mongo-perl6-driver:176: ​* In the future, host/port arguments to Client must be replaced by using a URI in the format ```mongodb://[username:​​password​​@]host1[:port1]…​
MARTIMM/mongo-perl6-driver:178: ​This is done now. The Client.instance method will only accept uri which will be processed by the Uri class. The default uri will be ```mongodb://``` …​
MARTIMM/mongo-perl6-driver:42: ​ * Added normalization for username and ​​password​​s using Unicode::Precis. At the moment the UsernameCasePreserved profile is used until there is some consensus about it.​
MARTIMM/mongo-perl6-driver:44: ​ Auth::SCRAM implemented. No username/​​password​​ normalization yet.​
MARTIMM/mongo-perl6-driver:53: ​ * Refactored MongoDB::Users to MongoDB::HL::Users because it can all be done using the lower level run-command(). This adds some control and tests on ​​password​​ length and use of characters. Therefore this makes it a higher level implementation.​
MARTIMM/mongo-perl6-driver:59: ​ * URI handling of username/​​password​​. Used uri-unescape() from URI::Escape module on usernames and ​​password​​s. Not sure if needed on fqdn.​
MARTIMM/mongo-perl6-driver:64: ​ * Took a long time to implement authentication and had to write a pbkdf2 and scram sha1 implementations first. Then find out what exactly mongodb n…​
MARTIMM/mongo-perl6-driver:96: ​run-command. This module adds facilities like checking ​​password​​ length etc.​
MARTIMM/mongo-perl6-driver:12: ​ has Str $.​​password​​;​
MARTIMM/mongo-perl6-driver:21: ​ Str :$username = '', Str :$​​password​​ = '',​
MARTIMM/mongo-perl6-driver:27: ​ $!​​password​​ = $​​password​​;​
MARTIMM/mongo-perl6-driver:60: ​ fatal-message("$e0 ​​password​​ must $e1") unless ? $!​​password​​;​
MARTIMM/mongo-perl6-driver:70: ​ fatal-message("$e0 ​​password​​ must not $e1") if ? $!​​password​​;​
MARTIMM/mongo-perl6-driver:79: ​ # ​​password​​ is optional​
MARTIMM/mongo-perl6-driver:93: ​ fatal-message("$e0 ​​password​​ must $e1") unless ? $!​​password​​;​
MARTIMM/mongo-perl6-driver:102: ​ fatal-message("$e0 ​​password​​ must $e1") unless ? $!​​password​​;​
MARTIMM/mongo-perl6-driver:78: ​ method mangle-​​password​​ ( Str:D :$username, Str:D :$​​password​​ --> Buf ) {​
MARTIMM/mongo-perl6-driver:86: ​ my TestValue $tv-pw = $upf-os.enforce($​​password​​);​
MARTIMM/mongo-perl6-driver:87: ​ fatal-message("​​Password​​ not accepted") if $tv-un ~~ Bool;​
MARTIMM/mongo-perl6-driver:88: ​ info-message("​​Password​​ accepted");​
MARTIMM/mongo-perl6-driver:94: ​ my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $​​password​​).encode;​
MARTIMM/mongo-perl6-driver:110: ​ # ​​password​​, servers, database and options.​
MARTIMM/mongo-perl6-driver:115: ​ my @item-list = <username ​​password​​ database options>;​
MARTIMM/mongo-perl6-driver:137: ​ $set( '​​password​​', '​​password​​');​
MARTIMM/mongo-perl6-driver:102: ​ mongodb://u1:pw1@nsa.us:666,my.datacenter.gov/nsa/?replicaSet=foryoureyesonly | User u1 with ​​password​​ pw1 logging in on database nsa on server nsa.us:666 and my.datacenter.gov:27017 which must both be member of a replica set named foryoureyesonly.​
MARTIMM/mongo-perl6-driver:74: ​ Str:D $user, Str:D $​​password​​,​
MARTIMM/mongo-perl6-driver:89: ​ # Check if ​​password​​ is too short​
MARTIMM/mongo-perl6-driver:91: ​ elsif $​​password​​.chars < $!min-pw-length {​
MARTIMM/mongo-perl6-driver:93: ​ "​​Password​​ too short, must be >= $!min-pw-length",​
MARTIMM/mongo-perl6-driver:94: ​ oper-data => $​​password​​,​
MARTIMM/mongo-perl6-driver:99: ​ # Check if ​​password​​ answers to rule given by attribute code​
MARTIMM/mongo-perl6-driver:105: ​ $pw-ok = ($​​password​​ ~~ m/ <[a..z]> /).Bool;​
MARTIMM/mongo-perl6-driver:110: ​ $​​password​​ ~~ m/ <[a..z]> / and​
MARTIMM/mongo-perl6-driver:111: ​ $​​password​​ ~~ m/ <[A..Z]> /​
MARTIMM/mongo-perl6-driver:117: ​ $​​password​​ ~~ m/ <[a..z]> / and​
MARTIMM/mongo-perl6-driver:118: ​ $​​password​​ ~~ m/ <[A..Z]> / and​
MARTIMM/mongo-perl6-driver:119: ​ $​​password​​ ~~ m/ \d /​
MARTIMM/mongo-perl6-driver:125: ​ $​​password​​ ~~ m/ <[a..z]> / and​
MARTIMM/mongo-perl6-driver:126: ​ $​​password​​ ~~ m/ <[A..Z]> / and​
MARTIMM/mongo-perl6-driver:127: ​ $​​password​​ ~~ m/ \d / and​
MARTIMM/mongo-perl6-driver:128: ​ $​​password​​ ~~ m/ <[`~!@\#\$%^&*()\-_=+[{\]};:\'\"\\\|,<.>\/\?]> /​
MARTIMM/mongo-perl6-driver:134: ​ "​​Password​​ does not have the right properties",​
MARTIMM/mongo-perl6-driver:135: ​ oper-data => $​​password​​,​
MARTIMM/mongo-perl6-driver:142: ​ # Normalize username and ​​password​​​
MARTIMM/mongo-perl6-driver:149: ​ my TestValue $tv-pw = $upf-os.prepare($​​password​​);​
MARTIMM/mongo-perl6-driver:150: ​ fatal-message("​​Password​​ not accepted") if $tv-un ~~ Bool;​
MARTIMM/mongo-perl6-driver:151: ​ info-message("​​Password​​ accepted");​
MARTIMM/mongo-perl6-driver:153: ​ # Create user where digest​​Password​​ is set false​
MARTIMM/mongo-perl6-driver:157: ​ digest​​Password​​ => False​
MARTIMM/mongo-perl6-driver:161: ​ # Create user where digest​​Password​​ is set false​
MARTIMM/mongo-perl6-driver:164: ​ pwd => (Digest::MD5.md5_hex( [~] $user, ':mongo:', $​​password​​)),​
MARTIMM/mongo-perl6-driver:165: ​ digest​​Password​​ => False​
MARTIMM/mongo-perl6-driver:177: ​ Str:D $user, Str :$​​password​​,​
MARTIMM/mongo-perl6-driver:185: ​ digest​​Password​​ => True​
MARTIMM/mongo-perl6-driver:188: ​ if ?$​​password​​ {​
MARTIMM/mongo-perl6-driver:189: ​ if $​​password​​.chars < $!min-pw-length {​
MARTIMM/mongo-perl6-driver:191: ​ "​​Password​​ too short, must be >= $!min-pw-length",​
MARTIMM/mongo-perl6-driver:192: ​ oper-data => $​​password​​,​
MARTIMM/mongo-perl6-driver:200: ​ $pw-ok = ($​​password​​ ~~ m/ <[a..z]> /).Bool;​
MARTIMM/mongo-perl6-driver:205: ​ $​​password​​ ~~ m/ <[a..z]> / and​
MARTIMM/mongo-perl6-driver:206: ​ $​​password​​ ~~ m/ <[A..Z]> /​
MARTIMM/mongo-perl6-driver:212: ​ $​​password​​ ~~ m/ <[a..z]> / and​
MARTIMM/mongo-perl6-driver:213: ​ $​​password​​ ~~ m/ <[A..Z]> / and​
MARTIMM/mongo-perl6-driver:214: ​ $​​password​​ ~~ m/ \d /​
MARTIMM/mongo-perl6-driver:220: ​ $​​password​​ ~~ m/ <[a..z]> / and​
MARTIMM/mongo-perl6-driver:221: ​ $​​password​​ ~~ m/ <[A..Z]> / and​
MARTIMM/mongo-perl6-driver:222: ​ $​​password​​ ~~ m/ \d / and​
MARTIMM/mongo-perl6-driver:223: ​ $​​password​​ ~~ m/ <[`~!@\#\$%^&*()\-_=+[{\]};:\'\"\\\|,<.>\/\?]> /​
MARTIMM/mongo-perl6-driver:232: ​ # Normalize username and ​​password​​​
MARTIMM/mongo-perl6-driver:239: ​ my TestValue $tv-pw = $upf-os.prepare($​​password​​);​
MARTIMM/mongo-perl6-driver:240: ​ fatal-message("​​Password​​ not accepted") if $tv-un ~~ Bool;​
MARTIMM/mongo-perl6-driver:241: ​ info-message("​​Password​​ accepted");​
MARTIMM/mongo-perl6-driver:245: ​ $req<pwd> = (Digest::MD5.md5_hex([~] $user, ':mongo:', $​​password​​));​
MARTIMM/mongo-perl6-driver:250: ​ "​​Password​​ does not have the proper elements",​
MARTIMM/mongo-perl6-driver:251: ​ oper-data => $​​password​​,​
MARTIMM/mongo-perl6-driver:39: ​ :​​password​​('mt+++'),​
MARTIMM/mongo-perl6-driver:68: ​Minimum ​​password​​ length.​
MARTIMM/mongo-perl6-driver:75: ​​​Password​​ checking attribute. See set-pw-security() below.​
MARTIMM/mongo-perl6-driver:88: ​Method to specify checks upon usernames and ​​password​​s. Default values for​
MARTIMM/mongo-perl6-driver:89: ​the username minimal length is 2. For ​​password​​s idem depending on the ​​password​​​
MARTIMM/mongo-perl6-driver:90: ​attribute code. $pw-attribs specifies how ​​password​​s are to be checked. There are​
MARTIMM/mongo-perl6-driver:109: ​using a ​​password​​ of less the 4 characters the call is bound to fail.​
MARTIMM/mongo-perl6-driver:115: ​ Str:D $user, Str:D $​​password​​,​
MARTIMM/mongo-perl6-driver:141: ​ Str:D $user, Str :$​​password​​,​
MARTIMM/mongo-perl6-driver:27: ​ # database, username, ​​password​​ and options​
MARTIMM/mongo-perl6-driver:258: ​ # By default authentiction is needed when user/​​password​​ info is found in the​
MARTIMM/mongo-perl6-driver:323: ​ and (? $!uri-data<username> or ? $!uri-data<​​password​​>) {​
MARTIMM/mongo-perl6-driver:349: ​ :​​password​​($!uri-data<​​password​​>),​
MARTIMM/mongo-perl6-driver:19: ​ token server-section { <username-​​password​​>? <server-list>? }​
MARTIMM/mongo-perl6-driver:21: ​ token username-​​password​​ {​
MARTIMM/mongo-perl6-driver:22: ​ $<username>=<[\w\d%-]>+ ':' $<​​password​​>=<[\w\d%-]>+ '@'​
MARTIMM/mongo-perl6-driver:59: ​ method username-​​password​​ (Match $m) {​
MARTIMM/mongo-perl6-driver:61: ​ $!pword = uri-unescape(~$m<​​password​​>);​
MARTIMM/mongo-perl6-driver:103: ​ $!server-data<​​password​​> = $actions.pword;​
MARTIMM/mongo-perl6-driver:74: ​subtest "mongodb url with username and ​​password​​ SCRAM-SHA-1", {​
MARTIMM/mongo-perl6-driver:85: ​ ok .message ~~ m:s/​​Password​​ too 'short,' must be '>= 6'/,​
MARTIMM/mongo-perl6-driver:86: ​ '​​Password​​ too short';​
MARTIMM/mongo-perl6-driver:100: ​ ok .message ~~ m:s/​​Password​​ does not have the right properties/,​
MARTIMM/mongo-perl6-driver:101: ​ '​​Password​​ does not have the right properties';​
MARTIMM/mongo-perl6-driver:117: ​}, "Test username and ​​password​​ checks";​
MARTIMM/mongo-perl6-driver:138: ​ :​​password​​<mt+++>,​
MARTIMM/mongo-perl6-driver:50: ​ method mangle-​​password​​ ( Str:D :$username, Str:D :$​​password​​ --> Buf ) {​
MARTIMM/mongo-perl6-driver:52: ​ my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $​​password​​).encode;​
MARTIMM/mongo-perl6-driver:67: ​ :​​password​​<pencil>,​
MARTIMM/mongo-perl6-driver:199: ​ method mangle-​​password​​ ( Str:D :$username, Str:D :$​​password​​ --> Buf ) {​
MARTIMM/mongo-perl6-driver:201: ​ my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $​​password​​).encode;​
MARTIMM/mongo-perl6-driver:244: ​ :​​password​​<w@tD8jeDan>,​
MARTIMM/mongo-perl6-driver:21: ​ is $uri.server-data<​​password​​>, '', 'mongodb:// --> no ​​password​​';​
MARTIMM/mongo-perl6-driver:87: ​ is $uri.server-data<​​password​​>, 'pw', 'mongodb://mt:pw@ --> ​​password​​ = pw';​
MARTIMM/mongo-perl6-driver:94: ​ is $uri.server-data<​​password​​>, 'pw', 'mongodb://mt:pw@h2:9876/users --> ​​password​​ = pw';​
MARTIMM/mongo-perl6-driver:99: ​ is $uri.server-data<​​password​​>, 'w@tD8jeDan', 'mongodb://Dondersteen:w%40tD8jeDan@h2:9876/users --> ​​password​​ = w@tD8jeDan';​
MARTIMM/mongo-perl6-driver:19: ​ mongodb://[username:​​password​​@]host1[:port1][,host2[:port2],...[,hostN[:portN]]][/[database][?options]]​
MARTIMM/mongo-perl6-driver:50: ​ mongodb://[username:​​password​​@][host1][:port1],...[,[hostN][:portN]][/[database][?options]]​
MARTIMM/mongo-perl6-driver:75: ​ $|h2 [ Username and ​​password​​ ]​
MARTIMM/mongo-perl6-driver:85: ​ $!test.add t='is $uri-obj.server-data<​​password​​>, "pencil"' [​
MARTIMM/mongo-perl6-driver:86: ​ ​​Password​​ found in uri is $*|code[pencil].​
MARTIMM/mongo-perl6-driver:90: ​ It is not correct to specify the username without its ​​password​​.​
MARTIMM/mongo-perl6-driver:29: ​is $uri-obj.server-data<​​password​​>, "pencil", 'T7';​
MARTIMM/mongo-perl6-driver:44: ​ :username<user>, :​​password​​<pencil>,​
MARTIMM/mongo-perl6-driver:55: ​ $!test.add t='is $cred.​​password​​, "pencil"' [​
MARTIMM/mongo-perl6-driver:67: ​ :username<user>, :​​password​​<pencil>, :auth-mechanism<MONGODB-X509>​
MARTIMM/mongo-perl6-driver:72: ​ Mechanism $**code[MONGODB-X509] does not expect a ​​password​​​
MARTIMM/mongo-perl6-driver:76: ​ $cred .= new( :​​password​​<pencil>, :auth-mechanism<MONGODB-CR>);​
MARTIMM/mongo-perl6-driver:95: ​ The driver will not show much if no user or ​​password​​ is given. So, in order​
MARTIMM/mongo-perl6-driver:17: ​ :username<user>, :​​password​​<pencil>,​
MARTIMM/mongo-perl6-driver:21: ​is $cred.​​password​​, "pencil", 'T1';​
MARTIMM/mongo-perl6-driver:24: ​ :username<user>, :​​password​​<pencil>, :auth-mechanism<MONGODB-X509>​
MARTIMM/mongo-perl6-driver:29: ​ $cred .= new( :​​password​​<pencil>, :auth-mechanism<MONGODB-CR>);​
MARTIMM/unicode-precis:42: ​* rfc4013 - SASLprep: Stringprep Profile for User Names and ​​Password​​s​
MARTIMM/unicode-precis:43: ​* [rfc7613 - Preparation, Enforcement, and Comparison of Internationalized Strings Representing Usernames and ​​Password​​s](https://tools.ietf.org/html/rfc7613#section-3.1) Obsoletes rfc4013.​
MARTIMM/unicode-precis:71: ​First the basis of the PRECIS framework will be build. As soon as possible a profile for usernames and ​​password​​s follows. This is my first need. When this functions well enough, other profiles can be inserted. Much of it is now Implemented.​
MARTIMM/unicode-precis:8: ​# characters that is used for free-form strings, including ​​password​​s as well​
MARTIMM/unicode-precis:14: ​# Applicability: ​​Password​​s and other opaque strings in security and​
MARTIMM/unicode-precis:274: ​ my Str $​​password​​ = 'correct horse battery staple';​
MARTIMM/unicode-precis:275: ​ my TestValue $tv = $psff.prepare($​​password​​);​
MARTIMM/unicode-precis:276: ​ ok (($tv ~~ Str) and ($tv eq $​​password​​)), "test ​​password​​ '$tv'";​
MARTIMM/unicode-precis:279: ​ $​​password​​ = 'Correct Horse Battery Staple';​
MARTIMM/unicode-precis:280: ​ $tv = $psff.prepare($​​password​​);​
MARTIMM/unicode-precis:281: ​ ok (($tv ~~ Str) and ($tv eq $​​password​​)), "test ​​password​​ '$tv'";​
MARTIMM/unicode-precis:284: ​ $​​password​​ = "\x03C0\x00DF\x00E5";​
MARTIMM/unicode-precis:285: ​ $tv = $psff.prepare($​​password​​);​
MARTIMM/unicode-precis:286: ​ ok (($tv ~~ Str) and ($tv eq $​​password​​)), "test ​​password​​ '$tv'";​
MARTIMM/unicode-precis:289: ​ $​​password​​ = "Jack of \x2666";​
MARTIMM/unicode-precis:290: ​ $tv = $psff.prepare($​​password​​);​
MARTIMM/unicode-precis:291: ​ ok (($tv ~~ Str) and ($tv eq $​​password​​)), "test ​​password​​ '$tv'";​
MARTIMM/unicode-precis:294: ​ $​​password​​ = "Foo\x[1680]Bar";​
MARTIMM/unicode-precis:295: ​ my Str $​​password​​2 = "Foo Bar";​
MARTIMM/unicode-precis:296: ​ $tv = $psff.enforce($​​password​​);​
MARTIMM/unicode-precis:297: ​ ok (($tv ~~ Str) and ($tv eq $​​password​​2)), "test ​​password​​ '$tv'";​
MARTIMM/unicode-precis:300: ​ $​​password​​ = "my cat is a \x[0009]by";​
MARTIMM/unicode-precis:301: ​ $tv = $psff.enforce($​​password​​);​
MARTIMM/unicode-precis:302: ​ ok (($tv ~~ Bool) and not $tv), "test ​​password​​ '$​​password​​' fails";​
MARTIMM/unicode-precis:304: ​ $​​password​​ = 'Upper Case';​
MARTIMM/unicode-precis:305: ​ $tv = $psff.compare( $​​password​​, lc($​​password​​));​
MARTIMM/unicode-precis:306: ​ ok !$tv, '​​Password​​s not equal';​
MattOates/Text--Emotion:377: ​ ​​password​​, or within a similar access control scheme provided that You​
Perl6-Noise-Gang/Audio-PortAudio:15: ​stream-source --​​password​​=<source pw> ​
Perl6-Noise-Gang/Audio-PortAudio:31: ​specify the icecast ​​password​​ (you did actually change that right?) You​
Perl6-Noise-Gang/Audio-PortAudio:58: ​sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$​​password​​!, Int :$bitrate = 128, Int :$quality = 5, Str :$mount = '/stream', Str :$source, Int :$buffer = 256, *%extra) {​
Perl6-Noise-Gang/Audio-PortAudio:92: ​ my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$​​password​​, :$mount, :$format, |%extra);​
PostCocoon/P6-Url:120: ​ <username> [ ':' <​​password​​> ]?​
PostCocoon/P6-Url:135: ​ token ​​password​​ {​
PostCocoon/P6-Url:181: ​ $result<​​password​​> [R//]= ~$grammar<auth><​​password​​>;​
PostCocoon/P6-Url:200: ​ if defined $hash<​​password​​> {​
PostCocoon/P6-Url:201: ​ $url ~= ":" ~ $hash<​​password​​>​
ShaneKilkelly/perl6-config-clever:31: ​ "​​password​​": null,​
ShaneKilkelly/perl6-config-clever:41: ​ "​​password​​": "a_terrible_​​password​​",​
ShaneKilkelly/perl6-config-clever:63: ​# "​​password​​": "a_terrible_​​password​​",​
ShaneKilkelly/perl6-config-clever:10: ​ "​​password​​": "​​password​​"​
ShaneKilkelly/perl6-config-clever:38: ​ ​​password​​ => "​​password​​"​
Skarsnik/perl6-discord:50: ​ method login(Str $mail, Str $​​password​​) returns Bool {​
Skarsnik/perl6-discord:51: ​ my $rep = self.post(%api-url<login>, email => $mail, ​​password​​ => $​​password​​);​
TiMBuS/Net--IRC:35: ​ Autoident.new(​​password​​ => 'nspassw0rd')​
TiMBuS/Net--IRC:64: ​ $​​password​​;​
TiMBuS/Net--IRC:19: ​ has $.​​password​​;​
TiMBuS/Net--IRC:65: ​ $.conn.sendln("PASS $.​​password​​", scrubbed => 'PASS ...')​
TiMBuS/Net--IRC:66: ​ if $.​​password​​;​
TiMBuS/Net--IRC:6: ​ has $.​​password​​ = die "Need to tell Autoident your ​​password​​ if you want it to work!";​
TiMBuS/Net--IRC:9: ​ $ev.conn.sendln("NS IDENTIFY $.​​password​​", scrubbed => 'NS IDENTIFY ...');​
adaptiveoptics/HTML-Tag:163: ​ {​​password​​ => { type => '​​password​​' }},​
adaptiveoptics/HTML-Tag:163: ​ {​​password​​ => { type => '​​password​​' }},​
adaptiveoptics/HTML-Tag:38: ​ unless %tagdef<type> eq '​​password​​' {​
adaptiveoptics/HTML-Tag:43: ​ unless %tagdef<type>:exists and (%tagdef<type> eq '​​password​​') {​
adaptiveoptics/HTML-Tag:94: ​ {​​password​​ => { type => '​​password​​' }},​
adaptiveoptics/HTML-Tag:217: ​the type is "​​password​​" no value attribute will ever be printed for the​
adaptiveoptics/HTML-Tag:15: ​ { ​​password​​ => { }},​
adaptiveoptics/HTML-Tag:22: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="​​password​​" i…​
adaptiveoptics/HTML-Tag:25: ​ { ​​password​​ => { }},​
adaptiveoptics/HTML-Tag:32: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" autofocus><input name="​​pass…​​​
adaptiveoptics/HTML-Tag:36: ​is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ…​
adaptiveoptics/HTML-Tag:39: ​ { ​​password​​ => { }},​
adaptiveoptics/HTML-Tag:47: ​is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ…​
adaptiveoptics/HTML-Tag:54: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" value="mark"><input name="​​p…​​​
adaptiveoptics/HTML-Tag:57: ​ { ​​password​​ => { type => '​​password​​' }},​
adaptiveoptics/HTML-Tag:64: ​%input<​​password​​> = 'supersecret';​
adaptiveoptics/HTML-Tag:68: ​is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ…​
adaptiveoptics/HTML-Tag:74: ​ { ​​password​​ => { type => '​​password​​' }},​
adaptiveoptics/HTML-Tag:83: ​is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ…​
adaptiveoptics/HTML-Tag:86: ​ { ​​password​​ => { type => '​​password​​' }},​
adaptiveoptics/HTML-Tag:94: ​is $form.render, '<form method="POST" name="form" action="/"><span>oofie<label for="form-username">Username</label><input name="username" id="form-us…​
adaptiveoptics/HTML-Tag:100: ​ { ​​password​​ => { }},​
adaptiveoptics/HTML-Tag:107: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" required><input name="​​passw…​​​
adaptiveoptics/HTML-Tag:112: ​ { ​​password​​ => { attrs => {:id('blue')} }},​
adaptiveoptics/HTML-Tag:119: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" class="pink" type="text"><input name="​​p…​​​
adaptiveoptics/HTML-Tag:124: ​ { ​​password​​ => { }},​
adaptiveoptics/HTML-Tag:132: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="​​password​​" i…​
adaptiveoptics/HTML-Tag:137: ​ { ​​password​​ => { }},​
adaptiveoptics/HTML-Tag:146: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="​​password​​" i…​
adaptiveoptics/HTML-Tag:153: ​ { ​​password​​ => { }},​
adaptiveoptics/HTML-Tag:162: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="​​password​​" i…​
adaptiveoptics/HTML-Tag:169: ​ { ​​password​​ => { }},​
adaptiveoptics/HTML-Tag:177: ​is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="​​password​​" i…​
afiskon/p6-sitemap-xml-parser:69: ​ <loc>http://username:​​password​​@xn--d1abbgf6aiiy.xn--p1ai:8080/</loc>​
afiskon/p6-sitemap-xml-parser:84: ​ loc => 'http://username:​​password​​@xn--d1abbgf6aiiy.xn--p1ai:8080/',​
araraloren/Net-FTP:541: ​ Ftp user's ​​password​​. If ​​password​​ is not given or a empty string, and the user is anonymous, anonymous@ will be​
araraloren/Net-FTP:542: ​ the ​​password​​ of user.​
azawawi/farabi6:168: ​ type: ["hidden", "text", "search", "tel", "url", "email", "​​password​​", "datetime", "date", "month",​
azawawi/farabi6:296: ​ keywords: set(sqlKeywords + "accessible action add after algorithm all analyze asensitive at authors auto_increment autocommit avg avg_row_length…​
azawawi/farabi6:312: ​ keywords: set(sqlKeywords + "accessible action add after algorithm all always analyze asensitive at authors auto_increment autocommit avg avg_row…​
azawawi/farabi6:2: ​!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error(…​
azawawi/farabi6:4: ​},removeAttr:function(a,b){var c,d,e=0,f=b&&b.match(E);if(f&&1===a.nodeType)while(c=f[e++])d=n.propFix[c]||c,n.expr.match.bool.test(c)&&(a[d]=!1),a.r…​
azawawi/farabi6:10: ​ */.ui.form{position:relative;max-width:100%}.ui.form>p{margin:1em 0}.ui.form .field,.ui.form .fields .field{clear:both;margin:0 0 1em}.ui.form .fiel…​
azawawi/farabi6:10: ​ */*,:after,:before{box-sizing:inherit}html{box-sizing:border-box}input[type=text],input[type=email],input[type=search],input[type=​​password​​…​
azawawi/farabi6:11: ​@import 'https://fonts.googleapis.com/css?family=Lato:400,700,400italic,700italic&subset=latin';*,:after,:before{box-sizing:inherit}html{box-sizing:b…​
azawawi/perl6-electron:23: ​ * hash: string user ​​password​​​
azawawi/perl6-electron:15: ​ * hash: string rpc ​​password​​ (hash), default null​
azawawi/perl6-electron:136: ​ * hash: string user ​​password​​, default null​
azawawi/perl6-electron:10: ​ // string rpc ​​password​​ (hash), default null​
azawawi/perl6-gtk-scintilla:6774: ​<span class="S0"> </s​​pan>Word​​ListSet<span class="S10">(</span><span class="S5">int</span><span class="S0"> </span>n<span class="S10">,</spa…​
azawawi/perl6-gtk-scintilla:8077: ​EM_GET​​PASSWORD​​CHAR EM_SET​​PASSWORD​​CHAR​
azawawi/perl6-gtk-scintilla:1431: ​#define SCE_​​PAS_WORD​​ 9​
azawawi/perl6-gtk-scintilla:4367: ​val SCE_​​PAS_WORD​​=9​
azawawi/perl6-gtk-scintilla:181: ​ sc.ChangeState(SCE_​​PAS_WORD​​);​
azawawi/perl6-gtk-scintilla:208: ​ sc.ChangeState(SCE_​​PAS_WORD​​);​
azawawi/perl6-gtk-scintilla:571: ​ if (stylePrev != SCE_​​PAS_WORD​​ && style == SCE_​​PAS_WORD​​)​
azawawi/perl6-gtk-scintilla:576: ​ if (stylePrev == SCE_​​PAS_WORD​​ && !(lineFoldStateCurrent & stateFoldInPreprocessor)) {​
azawawi/perl6-libzip:108: ​# N No ​​password​​ provided ​
azawawi/perl6-libzip:110: ​# N Wrong ​​password​​ provided ​
azawawi/perl6-libzip:440: ​#ZIP_EXTERN int zip_set_default_​​password​​(struct zip *, const char *);​
azawawi/perl6-libzip:441: ​sub zip_set_default_​​password​​(Pointer[zip] # zip*​
azawawi/perl6-net-curl:13: ​user+​​password​​ authentication (Basic, Digest, NTLM, Negotiate, Kerberos), ​
azawawi/perl6-net-curl:160: ​ /* set user name and ​​password​​ for the authentication */​
azawawi/perl6-net-curl:161: ​ curl_easy_setopt(curl, CURLOPT_USERPWD, "user:​​password​​");​
azawawi/perl6-net-curl:101: ​ " -envpass arg - environement variable which content the tia private key ​​password​​",​
azawawi/perl6-net-curl:32: ​ /* Set username and ​​password​​ */​
azawawi/perl6-net-curl:33: ​ curl_easy_setopt(curl, CURLOPT_USERPWD, "user:​​password​​");​
azawawi/perl6-net-curl:32: ​ /* Set username and ​​password​​ */​
azawawi/perl6-net-curl:33: ​ curl_easy_setopt(curl, CURLOPT_USERPWD, "user:​​password​​");​
azawawi/perl6-net-curl:32: ​ /* Set username and ​​password​​ */​
azawawi/perl6-net-curl:33: ​ curl_easy_setopt(curl, CURLOPT_USERPWD, "user:​​password​​");​
azawawi/perl6-net-curl:33: ​#define ​​PASSWORD​​ "123qwerty"​
azawawi/perl6-net-curl:121: ​ curl_easy_setopt(curl, CURLOPT_​​PASSWORD​​, ​​PASSWORD​​);​
azawawi/perl6-net-curl:114: ​ * authentication details (user names and ​​password​​s) from being "snooped"​
azawawi/perl6-net-curl:115: ​ * on the network. Here is how the user name and ​​password​​ are provided: */​
azawawi/perl6-net-curl:117: ​ curl_easy_setopt(curl, CURLOPT_​​PASSWORD​​, "P@ssw0rd");​
azawawi/perl6-net-curl:181: ​ char *proxy_user_​​password​​)​
azawawi/perl6-net-curl:186: ​ if (strlen(proxy_user_​​password​​) > 0)​
azawawi/perl6-net-curl:187: ​ curl_easy_setopt(curl, CURLOPT_PROXYUSERPWD, proxy_user_​​password​​);​
azawawi/perl6-net-curl:229: ​ " ​​password​​.\n");​
azawawi/perl6-net-curl:243: ​ conf->proxy_user[i] = 0; /* Clean up ​​password​​ from memory */​
azawawi/perl6-net-curl:170: ​constant CURLOPT_​​PASSWORD​​ is export = 10174;​
azawawi/perl6-net-curl:172: ​constant CURLOPT_PROXY​​PASSWORD​​ is export = 10176;​
azawawi/perl6-net-curl:201: ​constant CURLOPT_TLSAUTH_​​PASSWORD​​ is export = 10205;​
azawawi/perl6-net-curl:406: ​ CURLOPT_​​PASSWORD​​ => 10174,​
azawawi/perl6-net-curl:408: ​ CURLOPT_PROXY​​PASSWORD​​ => 10176,​
azawawi/perl6-net-curl:437: ​ CURLOPT_TLSAUTH_​​PASSWORD​​ => 10205,​
azawawi/perl6-odoo-client:19: ​ ​​password​​ => "<​​password​​>"​
azawawi/perl6-odoo-client:20: ​ ​​password​​ => "<​​password​​>"​
azawawi/perl6-odoo-client:47: ​### login(Str :$database, Str :$username, Str :$​​password​​) {​
azawawi/perl6-odoo-client:18: ​ ​​password​​ => "123"​
azawawi/perl6-odoo-client:18: ​ ​​password​​ => "123"​
azawawi/perl6-odoo-client:26: ​ ​​password​​ => "<​​password​​>"​
azawawi/perl6-odoo-client:44: ​has Str $!​​password​​;​
azawawi/perl6-odoo-client:76: ​=head3 login(Str :$database, Str :$username, Str :$​​password​​) {​
azawawi/perl6-odoo-client:80: ​method login(Str :$database, Str :$username, Str :$​​password​​) {​
azawawi/perl6-odoo-client:84: ​ args => [$database, $username, $​​password​​]​
azawawi/perl6-odoo-client:89: ​ $!​​password​​ = $​​password​​;​
azawawi/perl6-odoo-client:101: ​ my @args = [$!database, $!uid, $!​​password​​, $model, $method, $method-args];​
azawawi/perl6-parse-selenese:36: ​ <td>name=​​password​​</td>​
azawawi/perl6-parse-selenese:26: ​ <td>name=​​password​​</td>​
azawawi/perl6-parse-selenese:35: ​ <td>name=​​password​​</td>​
bbkr/jsonrpc:116: ​ return 'username', '​​password​​';​
cbk/WebService-GoogleDyDNS:27: ​multi sub MAIN( :$domain, :$login, :$​​password​​ ) {​
cbk/WebService-GoogleDyDNS:29: ​ my $updater = WebService::GoogleDyDNS.new(domainName => $domain, login => $login , ​​password​​ => $​​password​​ );​
cbk/WebService-GoogleDyDNS:37: ​multi sub MAIN( :$domain, :$login, :$​​password​​ ) {​
cbk/WebService-GoogleDyDNS:39: ​ my $updater = WebService::GoogleDyDNS.new(domainName => $domain, login => $login , ​​password​​ => $​​password​​ );​
cbk/WebService-GoogleDyDNS:19: ​ has %.​​password​​ is rw;​
cbk/WebService-GoogleDyDNS:27: ​ token line { <domainKey> \t <lastipKey> \t <loginKey> \t <​​password​​Key> };​
cbk/WebService-GoogleDyDNS:31: ​ token ​​password​​Key { '​​password​​' \t <​​PASSWORD​​> };​
cbk/WebService-GoogleDyDNS:35: ​ token ​​PASSWORD​​ { \w+ };​
cbk/WebService-GoogleDyDNS:50: ​ %.​​password​​ = '​​password​​' => $match<line><​​password​​Key><​​PASSWORD​​>;​
cbk/WebService-GoogleDyDNS:51: ​ @dataSet[$elemNum] = ( %.domainName ~ "\t" ~ %.lastIP ~ "\t" ~ %.login ~ "\t" ~ %.​​password​​);​
cbk/WebService-GoogleDyDNS:88: ​ $webAgent.auth(self.login.values(), self.​​password​​.values() );​
cbk/WebService-GoogleDyDNS:101: ​ $fh.say( self.​​password​​.values() );​
cspencer/perl6-posix:19: ​ * getpwnam(Str $username) - Returns an anonymous class containing the broken-out fields of the record in the ​​password​​ database (e.g., th…​
cspencer/perl6-posix:21: ​ * getgrnam(Str $group) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group name. The class has the following accessor methods: name, ​​password​​, gid, and members.​
cspencer/perl6-posix:23: ​ * getgrgid(gid_t $gid) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group id. The class has the following accessor methods: name, ​​password​​, gid, and members.​
cspencer/perl6-posix:11: ​ has Str $.​​password​​;​
cspencer/perl6-posix:21: ​ has Str $.​​password​​;​
cspencer/perl6-posix:36: ​ has Str $.​​password​​;​
cspencer/perl6-posix:18: ​ ok($pwnam.​​password​​.isa(Str), ".​​password​​ isa Str");​
cspencer/perl6-posix:15: ​ ok($group.​​password​​.isa(Str), ".​​password​​ isa Str");​
cygx/p6-tinycc-resources-win64:2610: ​ WINADVAPI WINBOOL WINAPI LogonUserA(LPCSTR lpszUsername,LPCSTR lpszDomain,LPCSTR lpsz​​Password​​,DWORD dwLogonType,DWORD dwLogonProvider,PHANDLE phToken);​
cygx/p6-tinycc-resources-win64:2611: ​ WINADVAPI WINBOOL WINAPI LogonUserW(LPCWSTR lpszUsername,LPCWSTR lpszDomain,LPCWSTR lpsz​​Password​​,DWORD dwLogonType,DWORD dwLogonProvider,PHANDLE phToken);​
cygx/p6-tinycc-resources-win64:2612: ​ WINADVAPI WINBOOL WINAPI LogonUserExA(LPCSTR lpszUsername,LPCSTR lpszDomain,LPCSTR lpsz​​Password​​,DWORD dwLogonType,DWORD dwLogonProvider,PHANDLE phToken,PSID *ppLogonSid,PVOID *ppProfileBuffer,LPDWORD pdwProfileLength,PQUOTA_LIMITS pQuotaLimits);​
cygx/p6-tinycc-resources-win64:2613: ​ WINADVAPI WINBOOL WINAPI LogonUserExW(LPCWSTR lpszUsername,LPCWSTR lpszDomain,LPCWSTR lpsz​​Password​​,DWORD dwLogonType,DWORD dwLogonProvider,PHANDLE phToken,PSID *ppLogonSid,PVOID *ppProfileBuffer,LPDWORD pdwProfileLength,PQUOTA_LIMITS pQuotaLimits);​
cygx/p6-tinycc-resources-win64:2620: ​#define LOGON_ZERO_​​PASSWORD​​_BUFFER 0x80000000​
cygx/p6-tinycc-resources-win64:2622: ​ WINADVAPI WINBOOL WINAPI CreateProcessWithLogonW(LPCWSTR lpUsername,LPCWSTR lpDomain,LPCWSTR lp​​Password​​,DWORD dwLogonFlags,LPCWSTR lpAppl…​
cygx/p6-tinycc-resources-win64:108: ​#define ERROR_INVALID_​​PASSWORD​​ 86L​
cygx/p6-tinycc-resources-win64:386: ​#define ERROR_INVALID_​​PASSWORD​​NAME 1216L​
cygx/p6-tinycc-resources-win64:456: ​#define ERROR_NULL_LM_​​PASSWORD​​ 1304L​
cygx/p6-tinycc-resources-win64:475: ​#define ERROR_WRONG_​​PASSWORD​​ 1323L​
cygx/p6-tinycc-resources-win64:476: ​#define ERROR_ILL_FORMED_​​PASSWORD​​ 1324L​
cygx/p6-tinycc-resources-win64:477: ​#define ERROR_​​PASSWORD​​_RESTRICTION 1325L​
cygx/p6-tinycc-resources-win64:482: ​#define ERROR_​​PASSWORD​​_EXPIRED 1330L​
cygx/p6-tinycc-resources-win64:801: ​#define ERROR_​​PASSWORD​​_MUST_CHANGE 1907L​
cygx/p6-tinycc-resources-win64:850: ​#define ERROR_CONNECTED_OTHER_​​PASSWORD​​ 2108L​
cygx/p6-tinycc-resources-win64:851: ​#define ERROR_CONNECTED_OTHER_​​PASSWORD​​_DEFAULT 2109L​
cygx/p6-tinycc-resources-win64:1416: ​#define ERROR_DS_SAM_NEED_BOOTKEY_​​PASSWORD​​ 8529L​
cygx/p6-tinycc-resources-win64:3843: ​#define ES_​​PASSWORD​​ 0x0020L​
cygx/p6-tinycc-resources-win64:3900: ​#define EM_SET​​PASSWORD​​CHAR 0x00CC​
cygx/p6-tinycc-resources-win64:3906: ​#define EM_GET​​PASSWORD​​CHAR 0x00D2​
dnmfarrell/System-Passwd:23: ​ my $​​password​​_file = open '/etc/passwd', :r;​
dnmfarrell/System-Passwd:25: ​ for $​​password​​_file.lines​
dnmfarrell/System-Passwd:4: ​ has $.​​password​​;​
dnmfarrell/System-Passwd:15: ​ my $​​password​​ = @line[1];​
dnmfarrell/System-Passwd:22: ​ return self.bless(:$username, :$​​password​​, :$uid, :$gid, :$fullname, :$home_directory, :$login_shell);​
dnmfarrell/System-Passwd:17: ​ is $user.​​password​​, @line[2], "​​password​​ is {@line[2]}";​
fayland/perl6-WebService-GitHub:39: ​ * `auth_login` & `auth_​​password​​`​
fayland/perl6-WebService-GitHub:123: ​ auth_​​password​​ => '​​password​​'​
fayland/perl6-WebService-GitHub:9: ​ auth_​​password​​ => %*ENV<GITHUB_PASS>​
fayland/perl6-WebService-GitHub:24: ​ has $.auth_​​password​​;​
fayland/perl6-WebService-GitHub:80: ​ if $.auth_login.defined && $.auth_​​password​​.defined {​
fayland/perl6-WebService-GitHub:82: ​ Authorization => "Basic " ~ MIME::Base64.encode-str("{$.auth_login}:{$.auth_​​password​​}")​
finanalyst/p6-inform:85: ​ An entry widget can mask input, as in ​​password​​ requests, by adding _pw or -pw onto the​
finanalyst/p6-inform:88: ​my $login = inform('Please supply your username and ​​password​​', ​
finanalyst/p6-inform:89: ​ :entries(un => 'User name', pw_pw => '​​Password​​')​
finanalyst/p6-inform:92: ​if $login.response eq 'OK' { say "user name is \<{$login.data<un>}> and ​​password​​ is \<{$login.data<pw_pw>}>" };​
finanalyst/p6-inform:77: ​ An entry widget can mask input, as in ​​password​​ requests, by adding _pw or -pw onto the​
finanalyst/p6-inform:80: ​my $login = inform('Please supply your username and ​​password​​', ​
finanalyst/p6-inform:81: ​ :entries(un => 'User name', pw_pw => '​​Password​​')​
finanalyst/p6-inform:84: ​if $login.response eq 'OK' { say "user name is \<{$login.data<un>}> and ​​password​​ is \<{$login.data<pw_pw>}>" };​
finanalyst/p6-inform:90: ​ # treat ​​password​​s differently​
gfldex/perl6-meta6-bin:100: ​instead of a ​​password​​.​
gfldex/perl6-pod-to-bigpage:10054: ​ [​​password​​s]​
gfldex/perl6-pod-to-bigpage:10055: ​ jack=​​password​​1​
gfldex/perl6-pod-to-bigpage:10074: ​# ("​​password​​s" =&gt; {"jack" =&gt; "​​password​​1", "joy" =&gt; "muchmoresecure123"},​
gfldex/perl6-pod-to-bigpage:10361: ​ [​​password​​s]​
gfldex/perl6-pod-to-bigpage:10362: ​ jack = ​​password​​1​
gfldex/perl6-typesafe-xhtml-writer:1672: ​ <xs:enumeration value="​​password​​"/>​
gfldex/perl6-xhtml-writer:1672: ​ <xs:enumeration value="​​password​​"/>​
goneri/p6-Email-Notmuch:340: ​source code form), and must require no special ​​password​​ or key for​
jnthn/p6-docker-file:38: ​ # Setup a ​​password​​​
jnthn/p6-http-hpack:21: ​ name => '​​password​​',​
jnthn/p6-http-hpack:67: ​ [ header('​​password​​', 'secret', HTTP::HPACK::Indexing::NeverIndexed) ],​
jnthn/p6-http-hpack:68: ​ 'decode ​​password​​: secret';​
jnthn/p6-http-hpack:70: ​ [ header('​​password​​', 'secret', HTTP::HPACK::Indexing::NeverIndexed) ]),​
jnthn/p6-http-hpack:73: ​ 'encode ​​password​​: secret (never indexed)';​
jnthn/p6-ssh-libssh:8: ​ private key; you can also provide a private key file or a ​​password​​)​
jnthn/p6-ssh-libssh:10: ​ Int :$port = 22, Str :$​​password​​, Str :$private-key-file) {​
jnthn/p6-ssh-libssh:11: ​ my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$​​password​​);​
jnthn/p6-ssh-libssh:11: ​ Int :$port = 22, Str :$​​password​​, Str :$private-key-file) {​
jnthn/p6-ssh-libssh:12: ​ my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$​​password​​);​
jnthn/p6-ssh-libssh:3: ​sub MAIN(Str $host, Str $user, Int :$port = 22, Str :$​​password​​, Str :$private-key-file, *@command) {​
jnthn/p6-ssh-libssh:4: ​ my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$​​password​​);​
jnthn/p6-ssh-libssh:3: ​sub MAIN($host, $user, $remote, $local, Int :$port, Str :$​​password​​) {​
jnthn/p6-ssh-libssh:4: ​ my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$​​password​​);​
jnthn/p6-ssh-libssh:3: ​sub MAIN($host, $user, $local, $remote, Int :$port, Str :$​​password​​) {​
jnthn/p6-ssh-libssh:4: ​ my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$​​password​​);​
jnthn/p6-ssh-libssh:191: ​ has Str $!​​password​​;​
jnthn/p6-ssh-libssh:201: ​ Str :$!private-key-file = Str, Str :$!​​password​​ = Str,​
jnthn/p6-ssh-libssh:420: ​ if $method eq "key" and defined $!​​password​​ {​
jnthn/p6-ssh-libssh:421: ​ # Public Key authentication failed. We'll try using a ​​password​​ now.​
jnthn/p6-ssh-libssh:422: ​ self!connect-auth-user-​​password​​($v);​
jnthn/p6-ssh-libssh:430: ​ method !connect-auth-user-​​password​​($v) {​
jnthn/p6-ssh-libssh:432: ​ my &auth-function = { ssh_userauth_​​password​​($s, Str, $!​​password​​) }​
jnthn/p6-ssh-libssh:435: ​ self!process-auth-outcome($auth-outcome, $v, :method<​​password​​>);​
jnthn/p6-ssh-libssh:442: ​ self!process-auth-outcome($auth-outcome, $v, :method<​​password​​>);​
jnthn/p6-ssh-libssh:115: ​sub ssh_userauth_​​password​​(SSHSession, Str, Str) returns int32​
jonathanstowe/Audio-Icecast:43: ​ method new(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$​​password​​ = 'hackme')​
jonathanstowe/Audio-Icecast:45: ​The constructor for the class supplies defaults that will work with a stock configuration on the local machine, this probably isn't what you want, be…​
jonathanstowe/Audio-Icecast:7: ​sub MAIN(Str :$mount!, Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'admin', Str :$​​password​​ = 'hackme') {​
jonathanstowe/Audio-Icecast:8: ​ my $ai = Audio::Icecast.new(:$host, :$port, :$user, :$​​password​​);​
jonathanstowe/Audio-Icecast:7: ​sub MAIN(Str :$mount!, Str :$title!, Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'admin', Str :$​​password​​ = 'hackme') {​
jonathanstowe/Audio-Icecast:8: ​ my $ai = Audio::Icecast.new(:$host, :$port, :$user, :$​​password​​);​
jonathanstowe/Audio-Icecast:57: ​ method new(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$​​password​​ = 'hackme')​
jonathanstowe/Audio-Icecast:61: ​want, because at the very least you changed the ​​password​​ right? If you​
jonathanstowe/Audio-Icecast:386: ​ submethod BUILD(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$​​password​​ = 'hackme') {​
jonathanstowe/Audio-Icecast:388: ​ $!ua.auth($user, $​​password​​);​
jonathanstowe/Audio-Icecast:12: ​my $​​password​​ = %*ENV<ICECAST_TEST_PASS> // 'hackme';​
jonathanstowe/Audio-Icecast:17: ​ lives-ok { $obj = Audio::Icecast.new(:$host, :$port, :$user, :$​​password​​) }, "get object with full credentials";​
jonathanstowe/Audio-Libshout:11: ​ my $shout = Audio::Libshout.new(​​password​​ => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3);​
jonathanstowe/Audio-Libshout:60: ​If the stream is not already connected this will open the stream so that data can be sent. The `host`, `port`, `user` and `​​password​​` and ot…​
jonathanstowe/Audio-Libshout:157: ​​​password​​ ​
jonathanstowe/Audio-Libshout:160: ​The ​​password​​ that is used to authenticate with the server. There is no default and this must be provided before connecting.​
jonathanstowe/Audio-Libshout:60: ​ * SHOUT_TEST_PASS - the ​​password​​ to authenticate with. The default is 'hackme' but you changed that right?​
jonathanstowe/Audio-Libshout:7: ​multi sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$​​password​​!, Str :$mount = '/stream', Str :$file!, *%extra) {​
jonathanstowe/Audio-Libshout:25: ​ my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$​​password​​, :$mount, :$format, |%extra);​
jonathanstowe/Audio-Libshout:10: ​multi sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$​​password​​!, Int :$bitrate = 128, Int :$quality = 5, Int :$bufsize = 512, Str :$mount = '/stream', Str :$file!, *%extra) {​
jonathanstowe/Audio-Libshout:30: ​ my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$​​password​​, :$mount, :$format, |%extra);​
jonathanstowe/Audio-Libshout:3: ​my $shout = Audio::Libshout.new(​​password​​ => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3);​
jonathanstowe/Audio-Libshout:15: ​ my $shout = Audio::Libshout.new(​​password​​ => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3);​
jonathanstowe/Audio-Libshout:81: ​that data can be sent. The C<host>, C<port>, C<user> and C<​​password​​>​
jonathanstowe/Audio-Libshout:228: ​=head2 ​​password​​ ​
jonathanstowe/Audio-Libshout:230: ​The ​​password​​ that is used to authenticate with the server. There is no default and this​
jonathanstowe/Audio-Libshout:476: ​ sub shout_set_​​password​​(Shout, Str) returns int32 is native('shout',v3) { * }​
jonathanstowe/Audio-Libshout:477: ​ sub shout_get_​​password​​(Shout) returns Str is native('shout',v3) { * }​
jonathanstowe/Audio-Libshout:479: ​ method ​​password​​() returns Str is rw is accessor-facade(&shout_get_​​password​​, &shout_set_​​password​​, &manage, &check) { }​
jonathanstowe/Audio-Libshout:584: ​ has Shout $!shout handles <host port user ​​password​​ protocol format mount dumpfile agent public name url genre description>;​
jonathanstowe/Audio-Libshout:14: ​ { name => "​​password​​", value => 'hackme' }, ​
jonathanstowe/Audio-Libshout:35: ​throws-like { $obj.open }, X::ShoutError, "open without ​​password​​ should fail";​
jonathanstowe/Audio-Libshout:37: ​$obj.​​password​​ = 'S0me8oGusP455w0RD!%';​
jonathanstowe/Audio-Libshout:39: ​throws-like { $obj.open }, rx/"The server refused login, probably because authentication failed"/, "open with wrong ​​password​​ should fail";​
jonathanstowe/Audio-Libshout:41: ​$obj.​​password​​ = $pass;​
jonathanstowe/Audio-Libshout:43: ​lives-ok { $obj.open }, "open with good ​​password​​";​
jonathanstowe/Audio-Libshout:55: ​ lives-ok { $obj = Audio::Libshout.new(user => $user, ​​password​​ => $pass, host => $host, port => $port, mount => $mount) }, "new to test sending " ~ $test<file>;​
jonathanstowe/Audio-Libshout:81: ​ lives-ok { $obj = Audio::Libshout.new(user => $user, ​​password​​ => $pass, host => $host, port => $port, mount => $mount) }, "new to test sending " ~ $test<file>;​
jonathanstowe/Audio-Liquidsoap:22: ​ output.icecast(%mp3,host="localhost",port=8000,​​password​​="hackme",mount="radio", radio)​
jonathanstowe/Audio-Liquidsoap:11: ​output.icecast(%mp3, host="localhost",port=8000,​​password​​="hackme",mount="radio", radio)​
jonathanstowe/Audio-Liquidsoap:15: ​output.icecast(%mp3, host="localhost",port=8000,​​password​​="hackme",mount="radio", radio)​
jonathanstowe/Crypt-Libcrypt:21: ​ "​​password​​"​
jonathanstowe/Crypt-Libcrypt:15: ​​​password​​s on a Unix system.​
jonathanstowe/Crypt-Libcrypt:17: ​Because this is intended primarily for the encryption of ​​password​​s and is​
jonathanstowe/Crypt-Libcrypt:21: ​In order to check whether a ​​password​​ entered by a user is correct it should​
jonathanstowe/Crypt-Libcrypt:22: ​be encrypted using the stored encrypted ​​password​​ as the "salt" - the result​
jonathanstowe/Crypt-Libcrypt:23: ​will be the same as the stored crypt text if the ​​password​​ is the same.​
jonathanstowe/Crypt-Libcrypt:19: ​ my $crypted = crypt($​​password​​, $salt );​
jonathanstowe/Crypt-Libcrypt:35: ​used to encrypt ​​password​​s on a Unix system.​
jonathanstowe/Crypt-Libcrypt:37: ​Because this is intended primarily for the encryption of ​​password​​s and​
jonathanstowe/Crypt-Libcrypt:41: ​In order to check whether a ​​password​​ entered by a user is correct it​
jonathanstowe/Crypt-Libcrypt:42: ​should be encrypted using the stored encrypted ​​password​​ as the "salt"​
jonathanstowe/Crypt-Libcrypt:43: ​- the result will be the same as the stored crypt text if the ​​password​​​
jonathanstowe/Lumberjack-Application:34: ​ method new(:$url!, :$username, :$​​password​​)​
jonathanstowe/Lumberjack-Application:40: ​Additionally if the C<username> and C<​​password​​> parameters​
jonathanstowe/Lumberjack-Application:60: ​ has Str $.​​password​​;​
jonathanstowe/Lumberjack-Application:68: ​ if $!username.defined && $!​​password​​.defined {​
jonathanstowe/Lumberjack-Application:69: ​ $!ua.auth($!username, $!​​password​​);​
jonathanstowe/META6:4047: ​ "description" : "Easy bcrypt ​​password​​ hashing",​
jonathanstowe/META6:5340: ​ "​​password​​"​
jonathanstowe/META6:11343: ​ "description" : "Easy Argon2i ​​password​​ hashing",​
jonathanstowe/Monitor-Monit:48: ​ * ```MONIT_TEST_PASS``` - the ​​password​​ to authenticate (default ```monit```)​
jonathanstowe/Monitor-Monit:36: ​ method new(Str :$host = 'localhost', Int :$port = 2812, Str :$username = 'admin', Str :$​​password​​ = 'monit', Bool :$secure = False);​
jonathanstowe/Monitor-Monit:300: ​ has Str $.​​password​​ = 'monit';​
jonathanstowe/Monitor-Monit:313: ​ has Str $.​​password​​ = 'monit';​
jonathanstowe/Monitor-Monit:362: ​ $!ua = UserAgent.new(:$!host, :$!port, :$!secure, :$!username, :$!​​password​​);​
jonathanstowe/Monitor-Monit:363: ​ $!ua.auth($!username, $!​​password​​);​
jonathanstowe/Monitor-Monit:12: ​my $​​password​​ = %*ENV<MONIT_TEST_PASS> // 'monit';​
jonathanstowe/Monitor-Monit:17: ​ lives-ok { $mon = Monitor::Monit.new(:$host, :$port, :$username, :$​​password​​) }, "new with credentials";​
jonathanstowe/Pg-Notify:51: ​* $PG_NOTIFY_PASS - the ​​password​​ to be used, (otherwise no ​​password​​ will be used.)​
jonathanstowe/Pg-Notify:19: ​ %args<​​password​​> = $pw;​
jonathanstowe/Unix-Groups:79: ​=head2 ​​password​​​
jonathanstowe/Unix-Groups:81: ​The ​​password​​ for the group if set, most modern systems place this in a​
jonathanstowe/Unix-Groups:97: ​ has Str $.​​password​​;​
jonathanstowe/Unix-Groups:104: ​ $!​​password​​ = $pass;​
jonathanstowe/WebService-Soundcloud:54: ​ my $sc = WebService::Soundcloud.new(:$client-id,:$client-secret,:$username,:$​​password​​);​
jonathanstowe/WebService-Soundcloud:55: ​ my $sc = WebService::Soundcloud.new(:$client-id,:$client-secret,:$username,:$​​password​​);​
jonathanstowe/WebService-Soundcloud:84: ​ method new(Str :$!client-id!, Str :$!client-secret!, Str :$!redirect-uri, Str :$!scope, Str :$!username, Str :$!​​password​​, HTTP::UserAgent :$!ua )​
jonathanstowe/WebService-Soundcloud:89: ​application with Soundcloud. If C<username> and C<​​password​​> are provided then​
jonathanstowe/WebService-Soundcloud:326: ​ has Str $.​​password​​ is rw;​
jonathanstowe/WebService-Soundcloud:332: ​ submethod BUILD(Str :$!client-id!, Str :$!client-secret!, Str :$!redirect-uri, Str :$!scope, Str :$!username, Str :$!​​password​​, HTTP::UserAgent :$!ua, *%opts) {​
jonathanstowe/WebService-Soundcloud:382: ​ if $!username && $!​​password​​ {​
jonathanstowe/WebService-Soundcloud:384: ​ %params<​​password​​> = $!​​password​​;​
jonathanstowe/WebService-Soundcloud:385: ​ %params<grant_type> = '​​password​​';​
jonathanstowe/WebService-Soundcloud:12: ​my $​​password​​ = %*ENV{'SC_​​PASSWORD​​'};​
jonathanstowe/WebService-Soundcloud:14: ​if (defined $username && defined $​​password​​)​
jonathanstowe/WebService-Soundcloud:21: ​ skip-rest 'No $SC_USERNAME or $SC_​​PASSWORD​​ defined';​
jonathanstowe/WebService-Soundcloud:33: ​ ​​password​​ => $​​password​​​
jonathanstowe/p6-unix-privileges:30: ​ # once in the chroot access to the system ​​password​​ file is lost​
kalkin/License-Software:333: ​source code form), and must require no special ​​password​​ or key for​
kalkin/License-Software:349: ​source code form), and must require no special ​​password​​ or key for​
kalkin/Net-XMPP:19: ​method new(:$jid!, :$login, :$​​password​​, :$server, :$port = 5222, :$socket) {​
kalkin/Net-XMPP:20: ​ self.bless(:$jid, :$login, :$​​password​​, :$server, :$port, :$socket);​
kalkin/Net-XMPP:54: ​submethod BUILD(:$!jid, :$login is copy, :$​​password​​, :$server, :$port, :$!socket){​
kalkin/Net-XMPP:72: ​ self!do-negotiation($login, $​​password​​);​
kalkin/Net-XMPP:75: ​method !auth($login, $​​password​​) {​
kalkin/Net-XMPP:86: ​ my $encoded = MIME::Base64.encode-str("\0$login\0$​​password​​");​
kalkin/Net-XMPP:121: ​method !do-negotiation($login, $​​password​​) {​
kalkin/Net-XMPP:122: ​ self!auth($login, $​​password​​);​
matiaslina/perl6-matrix-client:17: ​ submethod BUILD(:$username!, :$​​password​​!, :$home-server!, :@room-ids!, :$on-event!) {​
matiaslina/perl6-matrix-client:23: ​ $!client.login($!username, $​​password​​);​
matiaslina/perl6-matrix-client:67: ​sub MAIN(Str:D $username, Str:D $​​password​​, :$home-server = "https://matrix.deprecated.org") {​
matiaslina/perl6-matrix-client:71: ​ ​​password​​ => $​​password​​,​
matiaslina/perl6-matrix-client:41: ​ type => "m.login.​​password​​",​
matiaslina/perl6-matrix-client:43: ​ ​​password​​ => $pass​
matiaslina/perl6-matrix-client:74: ​method register($username, $​​password​​, Bool :$bind-email? = False) {​
matiaslina/perl6-matrix-client:76: ​ username => $username, ​​password​​ => $​​password​​,​
melezhik/remote-file:34: ​## ​​password​​​
melezhik/remote-file:36: ​Sets ​​password​​ for resources with access restricted by http basic authentication. Optional,​
melezhik/remote-file:25: ​ $cmd ~= ':' ~ %args<​​password​​> if %args<​​password​​>.defined;​
melezhik/sparrowdo-chef-manager:34: ​ ​​password​​ => '123456',​
melezhik/sparrowdo-chef-manager:56: ​## ​​password​​​
melezhik/sparrowdo-chef-manager:58: ​A chef user ​​password​​.​
melezhik/sparrowdo-chef-manager:17: ​ for 'user-id', 'name', 'email', '​​password​​' -> $p {​
melezhik/sparrowdo-chef-manager:27: ​ @params.push: %args<​​password​​>;​
melezhik/sparrowdo-chef-manager:12: ​ ​​password​​ => '123456',​
melezhik/sparrowdo:169: ​* ssh ​​password​​less access to remote hosts​
melezhik/sparrowdo:170: ​* sudo (​​password​​less?) rights on remote host​
nkh/P6-Data-Dump-Tree:19: ​ [​​password​​s]​
nkh/P6-Data-Dump-Tree:20: ​ jack=​​password​​1​
nkh/P6-Data-Dump-Tree:9: ​ [​​password​​s]​
nkh/P6-Data-Dump-Tree:10: ​ jack=​​password​​1​
nkh/P6-Data-Dump-Tree:30: ​ [​​password​​s]​
nkh/P6-Data-Dump-Tree:31: ​ jack=​​password​​1​
nkh/P6-Data-Dump-Tree:638: ​ 1 = [​​password​​s]\n jack=​​password​​1\n (+74)[0..113] ​
nkh/P6-Data-Dump-Tree:639: ​ <section> [​​password​​s]\n jack=​​password​​1\n (+29)[0..68] ​
nkh/P6-Data-Dump-Tree:640: ​ <header> [​​password​​s]\n[0..15] ​
nkh/P6-Data-Dump-Tree:641: ​ <0> ​​password​​s[5..13] ​
nkh/P6-Data-Dump-Tree:642: ​ <kvpair> jack=​​password​​1\n[16..38] ​
nkh/P6-Data-Dump-Tree:645: ​ <identifier> ​​password​​1[29..37] ​
nkh/P6-Data-Dump-Tree:646: ​ <value> ​​password​​1[29..37] ​
nkh/P6-Data-Dump-Tree:19: ​ [​​password​​s]​
nkh/P6-Data-Dump-Tree:20: ​ jack=​​password​​1​
nobodyinperson/perl6-fortran-grammar:340: ​source code form), and must require no special ​​password​​ or key for​
p6-pdf/PDF-p6:325: ​- `pdf-rewriter.pl [--repair] [--rebuild] [--[un]compress] [--​​password​​=Xxx] <pdf-or-json-file-in> [<pdf-or-json-file-out>]`​
p6-pdf/PDF-p6:362: ​To open an encrypted PDF document, specify either the user or owner ​​password​​: `PDF.open( "enc.pdf", :​​password​​<ssh!>)`​
p6-pdf/PDF-p6:367: ​Note that it's quite common to leave the user-​​password​​ blank. This indicates that the document is readable by anyone, but may have​
p6-pdf/PDF-p6:371: ​​​password​​s may be required, to reopen it.​
p6-pdf/PDF-p6:10: ​ Str :$​​password​​ = ''; #| ​​password​​ for encrypted documents​
p6-pdf/PDF-p6:29: ​ $reader.open( $file-in, :$repair, :$​​password​​ );​
p6-pdf/PDF-p6:15: ​ #| 'Standard' is the name of the built-in ​​password​​-based security handler.​
p6-pdf/PDF-p6:49: ​ has Str $.O is entry; #| (Required) A 32-byte string, based on both the owner and user ​​password​​s, that is used in computing the encryption key and in determining whether a valid owner ​​password​​ was entered.​
p6-pdf/PDF-p6:51: ​ has Str $.U is entry; #| (Required) A 32-byte string, based on the user ​​password​​, that is used in determining whether to prompt the user for a ​​password​​ and, if so, whether a valid user or owner ​​password​​ was entered.​
p6-pdf/PDF-p6:14: ​ has uint8 @!O; #| computed owner ​​password​​​
p6-pdf/PDF-p6:17: ​ has uint8 @!U; #| computed user ​​password​​​
p6-pdf/PDF-p6:281: ​ or die "unable to decrypt this PDF with the given ​​password​​";​
p6-pdf/PDF-p6:106: ​ method !setup-crypt( Str :$​​password​​ = '') {​
p6-pdf/PDF-p6:111: ​ $!crypt.authenticate( $​​password​​ );​
p6-pdf/PDF-p6:93: ​ dies-ok { $crypt.authenticate( 'blah' ) }, "$case - bad ​​password​​" unless $case eq 'Identity';​
p6-pdf/PDF-p6:94: ​ lives-ok { $crypt.authenticate( $user-pass ) }, "$case - user ​​password​​";​
p6-pdf/PDF-p6:96: ​ lives-ok { $crypt.authenticate( $owner-pass, :owner); }, "$case - owner ​​password​​";​
p6-pdf/PDF-p6:20: ​dies-ok { $pdf = PDF.open: "t/pdf-crypt-aes.pdf", :​​password​​<dunno> }, "open encrypted with incorrect ​​password​​ - dies";​
p6-pdf/PDF-p6:22: ​lives-ok { $pdf = PDF.open("t/pdf-crypt-aes.pdf", :​​password​​($user-pass)) }, 'open with user ​​password​​ - lives';​
p6-pdf/PDF-p6:23: ​is $pdf.crypt.is-owner, False, 'open with user ​​password​​ - not is-owner';​
p6-pdf/PDF-p6:24: ​is $pdf<Info><Author>, $expected-author, 'open with user ​​password​​ - .Info.Author';​
p6-pdf/PDF-p6:25: ​is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with user ​​password​​ - contents';​
p6-pdf/PDF-p6:21: ​dies-ok { $pdf = PDF.open: "t/encrypt.pdf", :​​password​​<dunno> }, "open encrypted with incorrect ​​password​​ - dies";​
p6-pdf/PDF-p6:23: ​lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.pdf", :​​password​​($user-pass)) }, 'open with user ​​password​​ - lives';​
p6-pdf/PDF-p6:24: ​is $pdf.crypt.is-owner, False, 'open with user ​​password​​ - not is-owner';​
p6-pdf/PDF-p6:25: ​is $pdf<Info><Author>, $expected-author, 'open with user ​​password​​ - .Info.Author';​
p6-pdf/PDF-p6:26: ​is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with user ​​password​​ - contents';​
p6-pdf/PDF-p6:28: ​lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.pdf", :​​password​​($owner-pass)) }, 'open with owner ​​password​​ - lives';​
p6-pdf/PDF-p6:29: ​is $pdf.crypt.is-owner, True, 'open with owner ​​password​​ - is-owner';​
p6-pdf/PDF-p6:30: ​is $pdf<Info><Author>, $expected-author, 'open with owner ​​password​​ - .Info.Author';​
p6-pdf/PDF-p6:31: ​is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with owner ​​password​​ - contents';​
p6-pdf/PDF-p6:33: ​dies-ok { $pdf = PDF.open: "t/pdf-crypt-rc4.json", :​​password​​<dunno> }, "open encrypted json with incorrect ​​password​​ - dies";​
p6-pdf/PDF-p6:35: ​lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.json", :​​password​​($user-pass)) }, 'open json user ​​password​​ - lives';​
perl6-community-modules/uri:55: ​# the rfc refers to username:​​password​​ as deprecated​
perl6-posix/README.md ​ * getpwnam(Str $username) - Returns an anonymous class containing the broken-out fields of the record in the ​​password​​ database (e.g., th…​
perl6-posix/README.md ​ * getgrnam(Str $group) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group name. The class has the following accessor methods: name, ​​password​​, gid, and members.​
perl6-posix/README.md ​ * getgrgid(gid_t $gid) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group id. The class has the following accessor methods: name, ​​password​​, gid, and members.​
perl6/DBIish:74: ​C<database>, C<user> and C<​​password​​>.​
perl6/DBIish:81: ​and using the function C<get-secret> to obtain you ​​password​​, you can:​
perl6/DBIish:83: ​ my $dbh = DBIish.connect('Pg', :database<hierarchy>, :$user, ​​password​​ => get-secret());​
perl6/DBIish:135: ​ :database<blerg>, :user<myuser>, :$​​password​​);​
perl6/DBIish:138: ​C<host>, C<hostaddr>, C<port>, C<database> (or its alias C<dbname>), C<user>, C<​​password​​>,​
perl6/DBIish:209: ​ :database<blerg>, :user<myuser>, :$​​password​​);​
perl6/DBIish:212: ​ :database<blerg>, :user<myuser>, :$​​password​​);​
perl6/DBIish:218: ​ my $dbh = DBIish.connect('Oracle', database => 'XE', :user<sysadm>, :​​password​​('secret'));​
perl6/DBIish:13: ​my $dbh = DBIish.connect("mysql", :database<test>, :user<root>, :​​password​​<sa>, :RaiseError);​
perl6/DBIish:21: ​my $dbh = DBIish.connect("Pg", :database<postgres>, :user<postgres>, :​​password​​<sa>, :RaiseError);​
perl6/DBIish:25: ​ :​​password​​<sa>, :RaiseError​
perl6/DBIish:83: ​method connect(:database(:$dbname), :user(:$username), :$​​password​​, *%params) {​
perl6/DBIish:100: ​ :$​​password​​,​
perl6/DBIish:335: ​ utf8 $​​password​​,​
perl6/DBIish:342: ​ method Logon(OCIError :$errh, Int :$mode, :$dbname, :$username, :$​​password​​) {​
perl6/DBIish:344: ​ OCILogon2(self, $errh, $svch, |buf-sized($username), |buf-sized($​​password​​),​
perl6/DBIish:70: ​ host hostaddr port dbname user ​​password​​ connect-timeout​
perl6/DBIish:23: ​ |%params<host user ​​password​​ database port socket>, 0​
perl6/DBIish:185: ​ Str $host, Str $user, Str $​​password​​,​
perl6/DBIish:47: ​my $test_​​password​​ = 'testpass';​
perl6/DBIish:76: ​#EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:89: ​ DBIish.connect($mdriver, :user($test_user), :​​password​​($test_​​password​​),​
perl6/DBIish:110: ​ $dbh = DBIish.connect( $mdriver, :user($test_user), :​​password​​($test_​​password​​),​
perl6/DBIish:179: ​# $dbh = DBIish.connect( $test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:255: ​ $dbh = DBIish.connect( $mdriver, :user($test_user), :​​password​​($test_​​password​​),​
perl6/DBIish:542: ​#EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:636: ​#EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:914: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:916: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:972: ​use vars qw($test_dsn $test_user $test_​​password​​);​
perl6/DBIish:978: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1074: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:1079: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1127: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:1132: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1220: ​use vars qw($test_dsn $test_user $test_​​password​​);​
perl6/DBIish:1224: ​EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1262: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:1269: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1337: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:1340: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1408: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:1413: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1463: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:1468: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1555: ​use vars qw($table $test_dsn $test_user $test_​​password​​ $mdriver);​
perl6/DBIish:1563: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1616: ​use vars qw($test_dsn $test_user $test_​​password​​ $table);​
perl6/DBIish:1619: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1691: ​use vars qw($got_warning $test_dsn $test_user $test_​​password​​ $table);​
perl6/DBIish:1694: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1779: ​ ok ($dbh = DBI->connect($test_dsn, $test_user, $test_​​password​​));​
perl6/DBIish:1811: ​ ok ($dbh = DBI->connect($test_dsn, $test_user, $test_​​password​​));​
perl6/DBIish:1859: ​use vars qw($test_dsn $test_user $test_​​password​​ $table);​
perl6/DBIish:1862: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:1945: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:1951: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2041: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2063: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2103: ​ EVAL {$dbh2 = DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2248: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2256: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2329: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2339: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2392: ​my $dbh2 = DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2450: ​use vars qw($test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2453: ​EVAL {$dbh= DBI->connect( $test_dsn, $test_user, $test_​​password​​);};​
perl6/DBIish:2482: ​$dbh = DBI->connect( $test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2495: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2505: ​EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2556: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2559: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2629: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2632: ​EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2652: ​ok ($dbh = DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2758: ​use vars qw($table $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2763: ​EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_​​password​​,​
perl6/DBIish:2794: ​use vars qw($table $mdriver $dbdriver $childPid $test_dsn $test_user $test_​​password​​);​
perl6/DBIish:2831: ​ $::test_​​password​​ = $::test_​​password​​ || $ENV{'DBI_PASS'} || '';​
perl6/DBIish:3145: ​ 'test​​password​​' => '',​
perl6/DBIish:3152: ​$::test_​​password​​ = $opt->{'test​​password​​'};​
perl6/DBIish:10: ​ :​​password​​<testpass>,​
perl6/DBIish:21: ​​​password​​ 'testpass', all this can be create with:​
perl6/DBIish:7: ​my %con-parms = :database<dbdishtest>, :user<testuser>, :​​password​​<testpass>;​
perl6/DBIish:7: ​my %con-parms = :database<dbdishtest>, :user<testuser>, :​​password​​<testpass>;​
perl6/DBIish:10: ​ ​​password​​ => 'Testpass',​
perl6/DBIish:8: ​%con-parms = :database<XE>, :username<TESTUSER>, :​​password​​<Testpass>;​
perl6/DBIish:7: ​my %con-parms = :database<XE>, :username<TESTUSER>, :​​password​​<Testpass>;​
perl6/Perl6-MIME-Base64:37: ​is $mime.encode_base64("username:thisisnotmy​​password​​"), 'dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==', 'Encoding "username:thisisnotmy​​password​​"';​
perl6/Perl6-MIME-Base64:38: ​is $mime.decode_base64("dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA=="), 'username:thisisnotmy​​password​​', 'Decoding "username:thisisnotmy​​password​​"';​
perl6/doc:532: ​ UPDATE mysql.user SET ​​password​​=​​password​​('sa') WHERE user = 'root';​
perl6/doc:980: ​ [​​password​​s]​
perl6/doc:981: ​ jack=​​password​​1​
perl6/doc:1000: ​ # OUTPUT: «("​​password​​s" => {"jack" => "​​password​​1", "joy" => "muchmoresecure123"},␤​
perl6/doc:1548: ​ [​​password​​s]​
perl6/doc:1549: ​ jack = ​​password​​1​
perl6/doc:2: ​!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)thr…​
perl6/doc:4: ​void 0!==c?null===c?void r.removeAttr(a,b):e&&"set"in e&&void 0!==(d=e.set(a,c,b))?d:(a.setAttribute(b,c+""),c):e&&"get"in e&&null!==(d=e.get(a,b))?d…​
perl6/perl6-lwp-simple:69: ​ my $pass = $auth<​​password​​>;​
perl6/perl6-lwp-simple:376: ​ ​​password​​ => uri_unescape($user_info.split(':')[1] || '')​
perl6/perl6-lwp-simple:27: ​is(@url[4]<​​password​​>, 'Camelia', 'Basic auth info extracted correctly: pass');​
ppentchev/perl6-Test-Deeply-Relaxed:22: ​is-deeply-relaxed {:a(42), :​​password​​('mellon')}, {​​password​​ => 'mellon', a => 42}, 'non-empty hash - same';​
ppentchev/perl6-Test-Deeply-Relaxed:23: ​isnt-deeply-relaxed {}, {:​​password​​('mellon')}, 'empty and non-empty hash - different';​
retupmoca/P6-Net-AMQP:12: ​has $.​​password​​ = 'guest';​
retupmoca/P6-Net-AMQP:61: ​ "\0"~$.login~"\0"~$.​​password​​,​
retupmoca/P6-Net-POP3:14: ​ $pop.apop-login("username", "​​password​​");​
retupmoca/P6-Net-POP3:17: ​ $pop.pass("​​password​​");​
retupmoca/P6-Net-POP3:28: ​ $pop.auth("username", "​​password​​"); # tries apop, then falls back to user/pass​
retupmoca/P6-Net-POP3:57: ​ - `auth($username, $​​password​​)`​
retupmoca/P6-Net-POP3:50: ​method auth($username, $​​password​​) {​
retupmoca/P6-Net-POP3:53: ​ $response = $.raw.apop-login($username, $​​password​​);​
retupmoca/P6-Net-POP3:60: ​ $response = $.raw.pass($​​password​​);​
retupmoca/P6-Net-SMTP:23: ​ $client.auth($username, $​​password​​);​
retupmoca/P6-Net-SMTP:68: ​ - `auth($username, $​​password​​, :@methods, :@disallow, :$force)`​
retupmoca/P6-Net-SMTP:70: ​ Authenticates with the SMTP server with the given $username and $​​password​​.​
retupmoca/P6-Net-SMTP:131: ​ - `auth-login($username, $​​password​​)`​
retupmoca/P6-Net-SMTP:132: ​ - `auth-plain($username, $​​password​​)`​
retupmoca/P6-Net-SMTP:80: ​method auth-login($username, $​​password​​) {​
retupmoca/P6-Net-SMTP:84: ​ my $encoded = MIME::Base64.encode-str($​​password​​);​
retupmoca/P6-Net-SMTP:91: ​method auth-plain($username, $​​password​​) {​
retupmoca/P6-Net-SMTP:92: ​ my $encoded = MIME::Base64.encode-str("$username\0$username\0$​​password​​");​
retupmoca/P6-Net-SMTP:96: ​method auth-cram-md5($username, $​​password​​) {​
retupmoca/P6-Net-SMTP:104: ​ my $encoded = MIME::Base64.encode-str($username ~ " " ~ hmac-hex($​​password​​, $data, &md5));​
retupmoca/P6-Net-SMTP:106: ​method auth($username, $​​password​​, :$methods is copy, :$disallow, :$force) {​
retupmoca/P6-Net-SMTP:122: ​ when "CRAM-MD5" { $response = $.smtp-raw.auth-cram-md5($username, $​​password​​); }​
retupmoca/P6-Net-SMTP:123: ​ when "PLAIN" { $response = $.smtp-raw.auth-plain($username, $​​password​​); }​
retupmoca/P6-Net-SMTP:124: ​ when "LOGIN" { $response = $.smtp-raw.auth-login($username, $​​password​​); }​
retupmoca/P6-Net-SMTP:50: ​ok $client.auth('user@example.com', '​​password​​', :methods("CRAM-MD5")), 'CRAM-MD5 auth';​
salortiz/DBDish-ODBC:8: ​ MySQL => { :uid<testuser>, :​​password​​<testpass> },​
samcns/uzu:19: ​ <input type="​​password​​" placeholder="​​Password​​" class="form-control">​
samcns/uzu:35: ​ <input type="​​password​​" placeholder="​​Password​​" class="form-control">​
scovit/perl6-IRC-Async:79: ​ ​​password​​ => (Str),​
scovit/perl6-IRC-Async:10: ​has Str $.​​password​​;​
scovit/perl6-IRC-Async:44: ​ push @connect-messages, $.print("PASS $!​​password​​\n") if $!​​password​​.defined;​
scriptkitties/p6-mpd-client:25: ​sub mpd-​​password​​ (​
scriptkitties/p6-mpd-client:26: ​ Str $​​password​​,​
scriptkitties/p6-mpd-client:30: ​ mpd-response-ok(mpd-send("​​password​​", $​​password​​, $socket));​
sergot/http-useragent:67: ​has $.auth_​​password​​;​
sergot/http-useragent:120: ​method auth(Str $login, Str $​​password​​) {​
sergot/http-useragent:122: ​ $!auth_​​password​​ = $​​password​​;​
sergot/http-useragent:423: ​ $request.field(Authorization => basic-auth-token($!auth_login,$!auth_​​password​​));​
sergot/http-useragent:428: ​ $!auth_login.defined && $!auth_​​password​​.defined;​
sergot/http-useragent:526: ​ method auth(HTTP::UserAgent:, Str $login, Str $​​password​​)​
sergot/http-useragent:528: ​Sets username and ​​password​​ needed to HTTP Auth.​
sergot/http-useragent:14: ​is $ua.auth_​​password​​, 'TEST', "​​password​​ got set okay";​
sillymoose/Software-License:355: ​source code form), and must require no special ​​password​​ or key for​
skaji/perl6-CPAN-Uploader-Tiny:9: ​has $.​​password​​;​
skaji/perl6-CPAN-Uploader-Tiny:12: ​submethod BUILD(:$!url, :$!user, :$!​​password​​, :$!agent) {​
skaji/perl6-CPAN-Uploader-Tiny:23: ​ self.new(user => %config<user>, ​​password​​ => %config<​​password​​>);​
skaji/perl6-CPAN-Uploader-Tiny:47: ​ %config<​​password​​> or die "missing ​​password​​ in $file";​
skaji/perl6-CPAN-Uploader-Tiny:63: ​ my $url = $!url.subst('//', "//{$.user}:{$.​​password​​}@");​
skinkade/p6-Crypt-Bcrypt:7: ​ "description" : "Easy bcrypt ​​password​​ hashing",​
skinkade/p6-Crypt-Bcrypt:4: ​Easy `bcrypt` ​​password​​ hashing in Perl6.​
skinkade/p6-Crypt-Bcrypt:9: ​​​Password​​ hashing and verification are one function each, and utilize a​
skinkade/p6-Crypt-Bcrypt:14: ​> my $hash = bcrypt-hash("​​password​​")​
skinkade/p6-Crypt-Bcrypt:17: ​> bcrypt-match("​​password​​", $hash)​
skinkade/p6-Crypt-Bcrypt:23: ​> bcrypt-hash("​​password​​", :rounds(15))​
skinkade/p6-Crypt-Bcrypt:9: ​Unix Seventh Edition Manual, Volume 2: the ​​password​​ scheme (1978):​
skinkade/p6-Crypt-Bcrypt:11: ​ http://plan9.bell-labs.com/7thEdMan/vol2/​​password​​​
skinkade/p6-Crypt-Bcrypt:14: ​​​password​​ shadowing scheme. This includes a PAM module which​
skinkade/p6-Crypt-Bcrypt:15: ​supersedes pam_unix and uses the ​​password​​ hashing framework provided​
skinkade/p6-Crypt-Bcrypt:16: ​with crypt_blowfish when setting new ​​password​​s.​
skinkade/p6-Crypt-Bcrypt:20: ​pam_passwdqc, a ​​password​​ strength checking and policy enforcement​
skinkade/p6-Crypt-Bcrypt:21: ​module for PAM-aware ​​password​​ changing programs:​
skinkade/p6-Crypt-Bcrypt:25: ​John the Ripper ​​password​​ cracker:​
skinkade/p6-Crypt-Bcrypt:21: ​The numbers for ​​password​​ cracking are 2 to 10% higher than those for​
skinkade/p6-Crypt-Bcrypt:1: ​This is an implementation of a ​​password​​ hashing method, provided via the​
skinkade/p6-Crypt-Bcrypt:15: ​make your system use the new ​​password​​ hashing algorithm. Changes to​
skinkade/p6-Crypt-Bcrypt:22: ​\- ​​password​​ hashing​
skinkade/p6-Crypt-Bcrypt:204: ​can't fail, when both setting new ​​password​​s and authenticating against​
skinkade/p6-Crypt-Bcrypt:205: ​existing ​​password​​ hashes.​
skinkade/p6-Crypt-Bcrypt:291: ​user ​​password​​s for storage and authentication;​
skinkade/p6-Crypt-Bcrypt:294: ​It is important to understand that ​​password​​ hashing is not a replacement​
skinkade/p6-Crypt-Bcrypt:295: ​for strong ​​password​​s.​
skinkade/p6-Crypt-Bcrypt:296: ​It is always possible for an attacker with access to ​​password​​ hashes​
skinkade/p6-Crypt-Bcrypt:297: ​to try guessing candidate ​​password​​s against the hashes.​
skinkade/p6-Crypt-Bcrypt:298: ​There are, however, certain properties a ​​password​​ hashing method may have​
skinkade/p6-Crypt-Bcrypt:307: ​The ability to try candidate ​​password​​s against multiple hashes at the​
skinkade/p6-Crypt-Bcrypt:311: ​The use of pre-hashed lists of candidate ​​password​​s.​
skinkade/p6-Crypt-Bcrypt:315: ​have the same or different ​​password​​s without actually having to guess​
skinkade/p6-Crypt-Bcrypt:316: ​one of the ​​password​​s.​
skinkade/p6-Crypt-Bcrypt:319: ​candidate ​​password​​s.​
skinkade/p6-Crypt-Bcrypt:320: ​Thus, the computational cost of a good ​​password​​ hashing method must be​
skinkade/p6-Crypt-Bcrypt:327: ​candidate ​​password​​.​
skinkade/p6-Crypt-Bcrypt:331: ​In addition to salts, modern ​​password​​ hashing methods accept a variable​
skinkade/p6-Crypt-Bcrypt:355: ​.B Maximum ​​password​​ length​
skinkade/p6-Crypt-Bcrypt:379: ​Thus, it should not be used for new ​​password​​s unless you absolutely have​
skinkade/p6-Crypt-Bcrypt:380: ​to be able to migrate the ​​password​​ hashes to other systems.​
skinkade/p6-Crypt-Bcrypt:393: ​This is Poul-Henning Kamp's MD5-based ​​password​​ hashing method originally​
skinkade/p6-Crypt-Bcrypt:415: ​specific to ​​password​​ cracking only, doesn't have the effective key size​
skinkade/p6-Crypt-Bcrypt:416: ​limitation, and uses 8-bit characters in ​​password​​s.​
skinkade/p6-Crypt-Bcrypt:430: ​(versions up to 1.0.4 inclusive) affecting handling of ​​password​​ characters with​
skinkade/p6-Crypt-Bcrypt:438: ​Unfortunately, the behavior of "$2a$" on ​​password​​ characters with the 8th bit​
skinkade/p6-Crypt-Bcrypt:440: ​When generating new ​​password​​ hashes, the "$2b$" or "$2y$" prefix should be used.​
skinkade/p6-Crypt-Bcrypt:567: ​Niels Provos and David Mazieres. A Future-Adaptable ​​Password​​ Scheme.​
skinkade/p6-Crypt-Bcrypt:572: ​Robert Morris and Ken Thompson. ​​Password​​ Security: A Case History.​
skinkade/p6-Crypt-Bcrypt:575: ​http://plan9.bell-labs.com/7thEdMan/vol2/​​password​​​
skinkade/p6-Crypt-Bcrypt:6: ​ * This code comes from John the Ripper ​​password​​ cracker, with reentrant​
skinkade/p6-Crypt-Bcrypt:7: ​ * and crypt(3) interfaces added, but optimizations specific to ​​password​​​
skinkade/p6-Crypt-Bcrypt:32: ​ * some of his ideas. The ​​password​​ hashing algorithm was designed by David​
skinkade/p6-Crypt-Bcrypt:558: ​ * While the bug itself affected the majority of ​​password​​s containing​
skinkade/p6-Crypt-Bcrypt:561: ​ * only a subset of ​​password​​s containing the '\xff' character (not even all of​
skinkade/p6-Crypt-Bcrypt:562: ​ * those ​​password​​s, just some of them). This character is not found in valid​
skinkade/p6-Crypt-Bcrypt:568: ​ * We use an approach that tries to minimize side-channel leaks of ​​password​​​
skinkade/p6-Crypt-Bcrypt:570: ​ * of branches or table lookups. (One conditional branch based on ​​password​​​
skinkade/p6-Crypt-Bcrypt:620: ​ * collision between the correctly computed hash for this ​​password​​ and a set of​
skinkade/p6-Crypt-Bcrypt:621: ​ * ​​password​​s that could be supplied to the buggy algorithm. Our safety measure​
skinkade/p6-Crypt-Bcrypt:639: ​ * state that could be directly specified by a ​​password​​ to the buggy algorithm​
skinkade/p6-Crypt-Bcrypt:808: ​ * 2. We don't want to leave sensitive data from our actual ​​password​​ hash​
skinkade/p6-Crypt-Bcrypt:833: ​/* Hash the supplied ​​password​​ */​
skinkade/p6-Crypt-Bcrypt:45: ​sub bcrypt-hash(Str $​​password​​, int :$rounds = 12) returns Str is export {​
skinkade/p6-Crypt-Bcrypt:46: ​ crypt($​​password​​, gensalt($rounds));​
skinkade/p6-Crypt-Bcrypt:49: ​sub bcrypt-match(Str $​​password​​, Str $hash) returns Bool is export {​
skinkade/p6-Crypt-Bcrypt:50: ​ crypt($​​password​​, $hash) eq $hash;​
skinkade/p6-Crypt-Bcrypt:13: ​ok bcrypt-match("​​password​​", $hash-old), "2a positive check";​
skinkade/p6-Crypt-Bcrypt:14: ​nok bcrypt-match("​​password​​1", $hash-old), "2a negative check";​
skinkade/p6-Crypt-Bcrypt:16: ​ok bcrypt-match("​​password​​", $hash-new), "2b positive check";​
skinkade/p6-Crypt-Bcrypt:17: ​nok bcrypt-match("​​password​​1", $hash-new), "2b negative check";​
skinkade/p6-crypt-argon2:6: ​ "description" : "Easy Argon2i ​​password​​ hashing",​
skinkade/p6-crypt-argon2:5: ​​​Password​​ Hashing Competition. It is both memory- and compute-hard. This module​
skinkade/p6-crypt-argon2:12: ​​​Password​​ hashing and verification are one function each, and utilze a​
skinkade/p6-crypt-argon2:17: ​> my $hash = argon2-hash("​​password​​")​
skinkade/p6-crypt-argon2:20: ​> argon2-verify($hash, "​​password​​")​
skinkade/p6-crypt-argon2:26: ​> argon2-hash("​​password​​", :t_cost(4), :m_cost(2**18), :parallelism(4), :hashlen(24))​
skinkade/p6-crypt-argon2:36: ​> my ($key, $meta) = argon2-derive-key("​​password​​", :hashlen(16))​
skinkade/p6-crypt-argon2:39: ​> argon2-derive-key("​​password​​", $meta)​
skinkade/p6-crypt-argon2:47: ​in KiB, and parallelism in thread count. By default, ​​password​​ hashing uses two​
skinkade/p6-crypt-argon2:15: ​* ​​Password​​ read from stdin, instead of being an argument​
skinkade/p6-crypt-argon2:64: ​/* Minimum and maximum ​​password​​ length in bytes */​
skinkade/p6-crypt-argon2:80: ​#define ARGON2_FLAG_CLEAR_​​PASSWORD​​ (UINT32_C(1) << 0)​
skinkade/p6-crypt-argon2:156: ​ * ​​password​​ and its length,​
skinkade/p6-crypt-argon2:165: ​ * Also, three flags indicate whether to erase ​​password​​, secret as soon as they​
skinkade/p6-crypt-argon2:168: ​ * Simplest situation: you have output array out[8], ​​password​​ is stored in​
skinkade/p6-crypt-argon2:172: ​ * You want to erase the ​​password​​, but you're OK with last pass not being​
skinkade/p6-crypt-argon2:181: ​ uint8_t *pwd; /* ​​password​​ array */​
skinkade/p6-crypt-argon2:182: ​ uint32_t pwdlen; /* ​​password​​ length */​
skinkade/p6-crypt-argon2:224: ​ * Hashes a ​​password​​ with Argon2i, producing an encoded hash​
skinkade/p6-crypt-argon2:228: ​ * @param pwd Pointer to ​​password​​​
skinkade/p6-crypt-argon2:229: ​ * @param pwdlen ​​Password​​ size in bytes​
skinkade/p6-crypt-argon2:247: ​ * Hashes a ​​password​​ with Argon2i, producing a raw hash by allocating memory at​
skinkade/p6-crypt-argon2:252: ​ * @param pwd Pointer to ​​password​​​
skinkade/p6-crypt-argon2:253: ​ * @param pwdlen ​​Password​​ size in bytes​
skinkade/p6-crypt-argon2:291: ​ * Verifies a ​​password​​ against an encoded string​
skinkade/p6-crypt-argon2:294: ​ * @param pwd Pointer to ​​password​​​
skinkade/p6-crypt-argon2:309: ​ * on the ​​password​​ and salt. Only for side-channel-free​
skinkade/p6-crypt-argon2:319: ​ * independent on the ​​password​​ and salt. Good for side-channels,​
skinkade/p6-crypt-argon2:328: ​ * Verify if a given ​​password​​ is correct for Argon2d hashing​
skinkade/p6-crypt-argon2:330: ​ * @param hash The ​​password​​ hash to verify. The length of the hash is​
skinkade/p6-crypt-argon2:337: ​ * Verify if a given ​​password​​ is correct for Argon2i hashing​
skinkade/p6-crypt-argon2:339: ​ * @param hash The ​​password​​ hash to verify. The length of the hash is​
skinkade/p6-crypt-argon2:323: ​ return "​​Password​​ is too short";​
skinkade/p6-crypt-argon2:325: ​ return "​​Password​​ is too long";​
skinkade/p6-crypt-argon2:351: ​ return "​​Password​​ pointer is NULL, but ​​password​​ length is not 0";​
skinkade/p6-crypt-argon2:385: ​ return "The ​​password​​ does not match the supplied hash";​
skinkade/p6-crypt-argon2:31: ​ * Benchmarks Argon2 with salt length 16, ​​password​​ length 16, t_cost 1,​
skinkade/p6-crypt-argon2:157: ​ clear_memory(instance, context->flags & ARGON2_FLAG_CLEAR_​​PASSWORD​​);​
skinkade/p6-crypt-argon2:354: ​ /* Validate ​​password​​ length */​
skinkade/p6-crypt-argon2:524: ​ if (context->flags & ARGON2_FLAG_CLEAR_​​PASSWORD​​) {​
skinkade/p6-crypt-argon2:157: ​ * ​​password​​ and secret if needed​
skinkade/p6-crypt-argon2:49: ​ printf("​​Password​​[%u]: ", context->pwdlen);​
skinkade/p6-crypt-argon2:51: ​ if (context->flags & ARGON2_FLAG_CLEAR_​​PASSWORD​​) {​
skinkade/p6-crypt-argon2:39: ​ printf("\t​​Password​​ is read from stdin\n");​
skinkade/p6-crypt-argon2:92: ​ fatal("​​password​​ missing");​
skinkade/p6-crypt-argon2:172: ​ /* get ​​password​​ from stdin */​
skinkade/p6-crypt-argon2:175: ​ fatal("no ​​password​​ read");​
skinkade/p6-crypt-argon2:178: ​ fatal("Provided ​​password​​ longer than supported in command line utility");​
skinkade/p6-crypt-argon2:62: ​ hashtest(version, 2, 16, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:67: ​ hashtest(version, 2, 20, 1, "​​password​​", "somesalt", ​
skinkade/p6-crypt-argon2:72: ​ hashtest(version, 2, 18, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:76: ​ hashtest(version, 2, 8, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:80: ​ hashtest(version, 2, 8, 2, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:84: ​ hashtest(version, 1, 16, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:88: ​ hashtest(version, 4, 16, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:92: ​ hashtest(version, 2, 16, 1, "different​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:96: ​ hashtest(version, 2, 16, 1, "​​password​​", "diffsalt",​
skinkade/p6-crypt-argon2:106: ​ "​​password​​", strlen("​​password​​"), Argon2_i);​
skinkade/p6-crypt-argon2:113: ​ "​​password​​", strlen("​​password​​"), Argon2_i);​
skinkade/p6-crypt-argon2:117: ​ /* Handle an mismatching hash (the encoded ​​password​​ is "passwore") */​
skinkade/p6-crypt-argon2:120: ​ "​​password​​", strlen("​​password​​"), Argon2_i);​
skinkade/p6-crypt-argon2:122: ​ printf("Verify with mismatched ​​password​​: PASS\n");​
skinkade/p6-crypt-argon2:134: ​ hashtest(version, 2, 16, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:139: ​ hashtest(version, 2, 20, 1, "​​password​​", "somesalt", ​
skinkade/p6-crypt-argon2:144: ​ hashtest(version, 2, 18, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:148: ​ hashtest(version, 2, 8, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:152: ​ hashtest(version, 2, 8, 2, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:156: ​ hashtest(version, 1, 16, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:160: ​ hashtest(version, 4, 16, 1, "​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:164: ​ hashtest(version, 2, 16, 1, "different​​password​​", "somesalt",​
skinkade/p6-crypt-argon2:168: ​ hashtest(version, 2, 16, 1, "​​password​​", "diffsalt",​
skinkade/p6-crypt-argon2:178: ​ "​​password​​", strlen("​​password​​"), Argon2_i);​
skinkade/p6-crypt-argon2:185: ​ "​​password​​", strlen("​​password​​"), Argon2_i);​
skinkade/p6-crypt-argon2:189: ​ /* Handle an mismatching hash (the encoded ​​password​​ is "passwore") */​
skinkade/p6-crypt-argon2:192: ​ "​​password​​", strlen("​​password​​"), Argon2_i);​
skinkade/p6-crypt-argon2:194: ​ printf("Verify with mismatched ​​password​​: PASS\n");​
skinkade/p6-crypt-argon2:205: ​ ret = argon2_hash(2, 1, 1, "​​password​​", strlen("​​password​​"),​
skinkade/p6-crypt-argon2:211: ​ ret = argon2_hash(2, 1 << 12, 1, NULL, strlen("​​password​​"),​
skinkade/p6-crypt-argon2:217: ​ ret = argon2_hash(2, 1 << 12, 1, "​​password​​", strlen("​​password​​"), "s", 1,​
skinkade/p6-crypt-argon2:8: ​my $hash = argon2-hash("​​password​​");​
skinkade/p6-crypt-argon2:11: ​ok argon2-verify($hash, "​​password​​"), "Verify true new hash";​
skinkade/p6-crypt-argon2:12: ​ok argon2-verify($hash-reference, "​​password​​"), "Verify true reference hash";​
skinkade/p6-crypt-argon2:14: ​nok argon2-verify($hash, "​​password​​1"), "False-check on new hash";​
skinkade/p6-crypt-argon2:15: ​nok argon2-verify($hash-reference, "​​password​​1"), "False-check on reference hash";​
skinkade/p6-crypt-argon2:9: ​my ($key, $meta) = argon2-derive-key("​​password​​");​
skinkade/p6-crypt-argon2:11: ​my $test = argon2-derive-key("​​password​​", $meta);​
spebern/Parser-FreeXL-Native:25: ​BIFF ​​Password​​/Crypted: NO, clear data​
spebern/Parser-FreeXL-Native:57: ​BIFF ​​Password​​/Crypted: NO, clear data​
spebern/Parser-FreeXL-Native:220: ​ ret = freexl_get_info (handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:223: ​ fprintf (stderr, "GET-INFO [FREEXL_BIFF_​​PASSWORD​​] Error: %d\n", ret);​
spebern/Parser-FreeXL-Native:229: ​ printf ("BIFF ​​Password​​/Crypted: YES, obfuscated (not accessible)\n");​
spebern/Parser-FreeXL-Native:232: ​ printf ("BIFF ​​Password​​/Crypted: NO, clear data\n");​
spebern/Parser-FreeXL-Native:235: ​ printf ("BIFF ​​Password​​/Crypted: UNKNOWN\n");​
spebern/Parser-FreeXL-Native:128: ​/* checking for ​​Password​​ (obfuscated/encrypted) */​
spebern/Parser-FreeXL-Native:129: ​ ret = freexl_get_info (handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:132: ​ fprintf (stderr, "GET-INFO [FREEXL_BIFF_​​PASSWORD​​] Error: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf (stderr, "​​Password​​ protected: (not accessible)\n");​
spebern/Parser-FreeXL-Native:111: ​/** BIFF file is ​​password​​ protected */​
spebern/Parser-FreeXL-Native:113: ​/** BIFF file is not ​​password​​ protected */​
spebern/Parser-FreeXL-Native:219: ​/** Information query for BIFF ​​password​​ protection state */​
spebern/Parser-FreeXL-Native:220: ​#define FREEXL_BIFF_​​PASSWORD​​ 32008​
spebern/Parser-FreeXL-Native:448: ​ - FREEXL_BIFF_​​PASSWORD​​ (returning FREEXL_BIFF_OBFUSCATED or​
spebern/Parser-FreeXL-Native:315: ​ as author, ​​password​​ protection, styles, formats, window settings and so on​
spebern/Parser-FreeXL-Native:2310: ​ /* ​​PASSWORD​​ marker found */​
spebern/Parser-FreeXL-Native:3008: ​ /* ​​PASSWORD​​ marker found */​
spebern/Parser-FreeXL-Native:4406: ​ case FREEXL_BIFF_​​PASSWORD​​:​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
spebern/Parser-FreeXL-Native:135: ​ ret = freexl_get_info(handle, FREEXL_BIFF_​​PASSWORD​​, &info);​
spebern/Parser-FreeXL-Native:137: ​ fprintf(stderr, "GET_INFO ERROR for BIFF ​​password​​ mode: %d\n", ret);​
spebern/Parser-FreeXL-Native:141: ​ fprintf(stderr, "Unexpected BIFF ​​password​​ mode: %d\n", info);​
sufrostico/perl6-snowball:340: ​source code form), and must require no special ​​password​​ or key for​
supernovus/perl6-http-client:24: ​has $!pass; ## ​​Password​​, if needed, for Authentication.​
supernovus/perl6-http-client:52: ​ token pass { [\w|'-'|'+'|'%']+ } ## Fairly simple ​​password​​s only too.​
supernovus/perl6-http-client:59: ​## Encode a username and ​​password​​ into Base64 for Basic Auth.​
supernovus/perl6-web-app-mvc:66: ​ "​​password​​" : "myapppass"​
szabgab/Perl6-Maven:777: ​input[type="​​password​​"],​
szabgab/Perl6-Maven:811: ​input[type="​​password​​"],​
szabgab/Perl6-Maven:842: ​input[type="​​password​​"]:focus,​
szabgab/Perl6-Maven:9: ​ */article,aside,details,figcaption,figure,footer,header,hgroup,nav,section{display:block}audio,canvas,video{display:inline-block;*display:inline;*zo…​
szabgab/Perl6-Maven:3: ​a){var b=F.exec(a);b&&(b[1]=(b[1]||"").toLowerCase(),b[3]=b[3]&&new RegExp("(?:^|\\s)"+b[3]+"(?:\\s|$)"));return b},H=function(a,b){var c=a.attribute…​
szabgab/Perl6-Maven:4: ​.clean(arguments);a.push.apply(a,this.toArray());return this.pushStack(a,"before",arguments)}},after:function(){if(this[0]&&this[0].parentNode)return…​
tadzik/Grammar-BNF:223: ​login = "LOGIN" SP userid SP ​​password​​​
tadzik/Grammar-BNF:243: ​​​password​​ = astring​
tadzik/Grammar-BNF:317: ​throws-like { $rfc4466g.parse('LOGIN MyUsername My​​Password​​', :rule<login>) },​
titsuki/p6-App-AizuOnlineJudge:29: ​ ​​password​​ => self.get-​​password​​,​
titsuki/p6-App-AizuOnlineJudge:30: ​ ​​password​​ => self.get-​​password​​,​
titsuki/p6-App-AizuOnlineJudge:4: ​method get-​​password​​() returns Str {​
titsuki/p6-App-AizuOnlineJudge:5: ​ shell "stty -echo"; my $​​password​​ = prompt("​​password​​: "); "".say; shell "stty echo";​
titsuki/p6-App-AizuOnlineJudge:6: ​ return $​​password​​;​
titsuki/p6-App-AizuOnlineJudge:15: ​ $*IN = class { method get() { "fake​​password​​" }; }​
titsuki/p6-App-AizuOnlineJudge:22: ​ $*IN = class { method get() { "fake​​password​​" }; }​
titsuki/p6-App-AizuOnlineJudge:40: ​ method content() { "<font color=#ff000F><b>\nUserID or ​​Password​​ is Wrong.\n</b></font>\n<result><succeeded>false</succeeded><message>Invalid user</message></result>\n" }​
titsuki/p6-App-AizuOnlineJudge:61: ​ $*IN = class { method get() { "fake​​password​​" }; }​
titsuki/p6-App-AizuOnlineJudge:74: ​ $*IN = class { method get() { "fake​​password​​" }; }​
titsuki/p6-Terminal-Readsecret:9: ​ "description" : "A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or ​​password​​s from a command line secretly (not being displayed)",​
titsuki/p6-Terminal-Readsecret:6: ​Terminal::Readsecret - A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or ​​password​​s from a command line secretly (not being displayed)​
titsuki/p6-Terminal-Readsecret:15: ​ my $​​password​​ = getsecret("​​password​​:" );​
titsuki/p6-Terminal-Readsecret:16: ​ say "your ​​password​​ is: " ~ $​​password​​;​
titsuki/p6-Terminal-Readsecret:23: ​ my $​​password​​ = getsecret("​​password​​:", $timeout);​
titsuki/p6-Terminal-Readsecret:24: ​ say "your ​​password​​ is: " ~ $​​password​​;​
titsuki/p6-Terminal-Readsecret:29: ​Terminal::Readsecret is a perl6 binding of readsecret ( [https://github.com/dmeranda/readsecret](https://github.com/dmeranda/readsecret) ). Readsecre…​
titsuki/p6-Terminal-Readsecret:40: ​Reads secrets or ​​password​​s from a command line and returns its input.​
titsuki/p6-Terminal-Readsecret:5: ​my $​​password​​ = getsecret("​​password​​:" );​
titsuki/p6-Terminal-Readsecret:6: ​say "your ​​password​​ is: " ~ $​​password​​;​
titsuki/p6-Terminal-Readsecret:6: ​my $​​password​​ = getsecret("​​password​​:", $timeout);​
titsuki/p6-Terminal-Readsecret:7: ​say "your ​​password​​ is: " ~ $​​password​​;​
titsuki/p6-Terminal-Readsecret:78: ​Terminal::Readsecret - A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or ​​password​​s from a command line secretly (not being displayed)​
titsuki/p6-Terminal-Readsecret:85: ​ my $​​password​​ = getsecret("​​password​​:" );​
titsuki/p6-Terminal-Readsecret:86: ​ say "your ​​password​​ is: " ~ $​​password​​;​
titsuki/p6-Terminal-Readsecret:92: ​ my $​​password​​ = getsecret("​​password​​:", $timeout);​
titsuki/p6-Terminal-Readsecret:93: ​ say "your ​​password​​ is: " ~ $​​password​​;​
titsuki/p6-Terminal-Readsecret:98: ​Readsecret is a simple self-contained C (or C++) library intended to be used on Unix and Unix-like operating systems that need to read a ​​password​​ or other textual secret typed in by the user while in a text-mode environment, such as from a console or shell.​
titsuki/p6-Terminal-Readsecret:108: ​Reads secrets or ​​password​​s from a command line and returns its input.​
titsuki/p6-Terminal-Readsecret:3: ​** Securely read a ​​password​​ or text secret from a command line (tty device).​
titsuki/p6-Terminal-Readsecret:3: ​** Securely read a ​​password​​ or text secret from a command line (tty device).​
titsuki/p6-Terminal-Readsecret:70: ​/* rsecret_overwrite_buffer() - securely overwrite a ​​password​​ or other​
titsuki/p6-Terminal-Readsecret:7: ​ throws-like { getsecret("​​password​​", $timeout) }, Exception, message => 'timeout waiting for user';​
tokuhirom/p6-Crust:79: ​ my sub authen_cb($username, $​​password​​, %env) {​
tokuhirom/p6-Crust:80: ​ return $username eq 'admin' && $​​password​​ eq 's3cr3t';​
tokuhirom/p6-Crust:98: ​A callback function that takes username, ​​password​​ and PSGI environment​
tokuhirom/p6-Crust:102: ​method that takes username and ​​password​​ and returns boolean.​
tony-o/perl6-db-orm-quicky:41: ​ ​​password​​ => 'top secret',​
tony-o/perl6-db-orm-quicky:118: ​$user.set('​​password​​', 'user1-pass!');​
tony-o/perl6-db-orm-quicky:16: ​ ​​password​​ => '', ​
tony-o/perl6-db-orm-quicky:28: ​$newrow.set('​​password​​' => 'tony');​
tony-o/perl6-db-orm-quicky:16: ​ ​​password​​ => '', ​
tony-o/perl6-db-orm-quicky:28: ​$newrow.set('​​password​​' => 'tony');​
tony-o/perl6-db-orm-quicky:24: ​$newrow.set('​​password​​' => 'tony');​
tony-o/perl6-db-orm-quicky:38: ​$newrow.set('​​password​​' => 'tony');​
tony-o/perl6-db-orm-quicky:48: ​ ​​password​​ => ( '-like' => '%on%' ),​
tony-o/perl6-db-orm-quicky:28: ​my @expected = |qw<DBORMID joined uid username ​​password​​>, 'full name'; ​
tony-o/perl6-db-orm-quicky:31: ​ ​​password​​ => 'tony',​
tony-o/perl6-db-orm-quicky:45: ​$newrow.set('​​password​​' => 'tony');​
ugexe/Perl6-Base64:15: ​ is encode-base64("username:thisisnotmy​​password​​", :str), 'dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==', 'Encoding "username:thisisnotmy​​password​​"';​
ugexe/Perl6-Base64:36: ​ is decode-base64("dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==", :bin).decode, "username:thisisnotmy​​password​​", 'decoding "username:thisisnotmy​​password​​"';​
viklund/november:1: ​# ​​Password​​ generation is a manual process right now; run bin/generate-​​password​​.pl USER PASS​
viklund/november:5: ​ '​​password​​' => '47c96e61cbcb31e648b1987107117ca4f524658460b955e290675789466fcd1a',​
viklund/november:210: ​ my $​​password​​ = $.cgi.params<​​password​​>;​
viklund/november:215: ​ if !defined $​​password​​ || $​​password​​ eq '' {​
viklund/november:216: ​ push @errors, 'Please provide a ​​password​​.';​
viklund/november:219: ​ if $​​password​​ && $​​password​​.chars < 6 {​
viklund/november:221: ​ ~ 'your ​​password​​.';​
viklund/november:224: ​ if $​​password​​ & $passagain && $​​password​​ ne $passagain {​
viklund/november:225: ​ push @errors, 'The ​​password​​ and confirmation must match.';​
viklund/november:237: ​ my $phash = sha256((sha256($user_name.encode).list».fmt("%02x") ~ $​​password​​).encode).list».fmt("%02x");​
viklund/november:245: ​ my $​​password​​ = $.cgi.params<​​password​​>;​
viklund/november:250: ​ my $hashed = sha256((sha256($user_name.encode).list».fmt("%02x") ~ $​​password​​).encode).list».fmt("%02x");​
viklund/november:252: ​ and $hashed eq %users{$user_name}<​​password​​> {​
viklund/november:687: ​ my $​​password​​ = $cgi->param('​​password​​');​
viklund/november:691: ​ if ( md5_base64(md5_base64($user_name).$​​password​​)​
viklund/november:692: ​ eq $users{$user_name}->{​​password​​} ) {​
viklund/november:3: ​ '​​password​​' => 'hdm24HFlfrBgIX3bTsVLIQ'​
viklund/november:6: ​ '​​password​​' => '3l9drfMnROgPQTNicdGFQg'​
viklund/november:9: ​ '​​password​​' => 'yG7xslKNZt59hpwVBkWrFQ',​
viklund/november:21: ​ <p>​​Password​​: <input name="​​password​​" type="​​password​​" /></p>​
viklund/november:17: ​ <p>​​Password​​: <input name="​​password​​" type="​​password​​" /></p>​
viklund/november:17: ​ <p>​​Password​​: <input name="​​password​​" type="​​password​​" /></p>​
viklund/november:15: ​ <p>​​Password​​: <input name="​​password​​" type="​​password​​" /></p>​
viklund/november:18: ​ <p>​​Password​​: <input name="​​password​​" type="​​password​​" /></p>​
viklund/november:18: ​ <p>​​Password​​: <input name="​​password​​" type="​​password​​" /></p>​
viklund/november:19: ​ <p>​​Password​​ again: <input name="passagain" type="passagain" /></p>​
viklund/november:431: ​\f0\fs24\lang1033\langfe1033\langnp1033\insrsid4985751\charrsid4985751 :\line }{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\lang1033\langfe1033\langnp1033\insrsid4985751\charrsid4985751 if (defined %users\{$user_name\} \line and $​​password​​ eq %users\{​
viklund/november:444: ​\f2\fs24\lang1033\langfe1033\langnp1033\insrsid9450395\charrsid9450395 ​​password​​}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\insrsid9450395\charrsid9450395 ' => '}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 ​
viklund/november:452: ​\f2\fs24\lang1033\langfe1033\langnp1033\insrsid9450395\charrsid9450395 ​​password​​}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\insrsid9450395\charrsid9450395 ' => '3}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 ​
zoffixznet/perl6-Config-From:29: ​say "$user\'s ​​password​​ is $pass and they belong to @groups[]";​
zoffixznet/perl6-Config-From:30: ​# Prints: zoffix's ​​password​​ is s3cret and they belong to foo, bar, ber​
zoffixznet/perl6-Config-From:7: ​say "$user\'s ​​password​​ is $pass and they belong to @groups[]";​
zoffixznet/perl6-IRC-Client-Plugin-HNY:12: ​ :​​password​​('secret.txt'.IO.slurp.trim)​
zoffixznet/perl6-IRC-Client:23: ​ - Add support for channel ​​password​​s (#18)​
zoffixznet/perl6-IRC-Client:67: ​ - [`.​​password​​`](#​​password​​)​
zoffixznet/perl6-IRC-Client:87: ​ - [`:​​password​​`](#​​password​​-1)​
zoffixznet/perl6-IRC-Client:448: ​server. Pairs represent channels with channel ​​password​​s, where the key is​
zoffixznet/perl6-IRC-Client:449: ​the channel and the value is its ​​password​​.​
zoffixznet/perl6-IRC-Client:468: ​#### `.​​password​​`​
zoffixznet/perl6-IRC-Client:470: ​The ​​password​​ of the server.​
zoffixznet/perl6-IRC-Client:548: ​ :​​password​​<s3cret>​
zoffixznet/perl6-IRC-Client:576: ​Pairs represent channels with channel ​​password​​s, where the key is​
zoffixznet/perl6-IRC-Client:577: ​the channel and the value is its ​​password​​.​
zoffixznet/perl6-IRC-Client:638: ​##### `:​​password​​`​
zoffixznet/perl6-IRC-Client:640: ​The server ​​password​​ to use. On some networks (like Freenode), the server​
zoffixznet/perl6-IRC-Client:641: ​​​password​​ also functions as NickServ's ​​password​​.​
zoffixznet/perl6-IRC-Client:662: ​`:host`, `:port`, `:​​password​​`, `:channels`, `:nick`, `:username`,​
zoffixznet/perl6-IRC-Client:41: ​ Str :$​​password​​,​
zoffixznet/perl6-IRC-Client:54: ​ my %all-conf = :$port, :$​​password​​, :$host, :$nick, :$alias,​
zoffixznet/perl6-IRC-Client:67: ​ <host ​​password​​ port username userhost userreal>​
zoffixznet/perl6-IRC-Client:190: ​ self!ssay: "PASS $server.​​password​​()", :$server​
zoffixznet/perl6-IRC-Client:191: ​ if $server.​​password​​.defined;​
zoffixznet/perl6-IRC-Client:9: ​has Str $.​​password​​;​
zoffixznet/perl6-IRC-Client:36: ​ ​​password​​ => 'fishdont',​
zoffixznet/perl6-RT-REST-Client:50: ​You need to go to user preferences and set up your CLI ​​password​​ for your​
zoffixznet/perl6-RT-REST-Client:53: ​and the CLI ​​Password​​ section should be on the right side of the page.​
zoffixznet/perl6-RT-REST-Client:75: ​**Mandatory.** Your RT ​​password​​. Note that your regular web login likely won't​
zoffixznet/perl6-RT-REST-Client:76: ​work. You need to set up the CLI ​​password​​. See [LOGIN CREDENTIALs​

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment