Skip to content

Instantly share code, notes, and snippets.

@Whateverable
Created September 18, 2017 23:09
Show Gist options
  • Save Whateverable/ea12f53147bae44a265d85e65ad3fdd9 to your computer and use it in GitHub Desktop.
Save Whateverable/ea12f53147bae44a265d85e65ad3fdd9 to your computer and use it in GitHub Desktop.
greppable6
password
File Code
7ojo/perl6-platform
…/Container.pm6 :55:
@cmd.push: '-D' if not %params<password>;
7ojo/perl6-platform
…/Container.pm6 :63:
@cmd.push: '--disabled-password' if not %params<password>;
Altai-man/Slang-Kazu
…/COPYING :343:
source code form), and must require no special password or key for
Altai-man/perl6-Config-Netrc
…/README.md :24:
password => {value => val, comment => my-comment}
Altai-man/perl6-Config-Netrc
…/README.md :26:
Of course, login or password lines are optional and comment entry for lines like following:
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :16:
<password>? \n? }
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :20:
token password { \h*? 'password' \h+? (\w+) (<comment>?) <eol> }
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :27:
password => $<password>.made}
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :31:
password => $<password>.made}
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :62:
method password ($/) { $/.make: comment-layering($/); }
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :94:
# password p
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :98:
# password default_password
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :103:
# password => {value => p}}
Altai-man/perl6-Config-Netrc
…/Netrc.pm6 :107:
# password => {value => default_password}}]}
Altai-man/perl6-Config-Netrc
…/Writer.pm6 :28:
if $entry<password> {
Altai-man/perl6-Config-Netrc
…/Writer.pm6 :29:
$output ~= " password " ~
Altai-man/perl6-Config-Netrc
…/Writer.pm6 :30:
$entry<password><value> ~ ' ' ~
Altai-man/perl6-Config-Netrc
…/Writer.pm6 :31:
($entry<password><comment>.defined ??
Altai-man/perl6-Config-Netrc
…/Writer.pm6 :32:
$entry<password><comment>
Altai-man/perl6-Config-Netrc
…/10-testing.t :12:
password p # cool password
Altai-man/perl6-Config-Netrc
…/10-testing.t :16:
password default_password
Altai-man/perl6-Config-Netrc
…/10-testing.t :25:
password pd
Altai-man/perl6-Config-Netrc
…/10-testing.t :41:
password p # easy case
Altai-man/perl6-Config-Netrc
…/10-testing.t :48:
password p # with only password
Bailador/Bailador
…/README.md :405:
config.set('database-password', 'xxxxxx')
CIAvash/App-Football
…/COPYING :340:
source code form), and must require no special password or key for
CIAvash/WebService-FootballData
…/COPYING :340:
source code form), and must require no special password or key for
Cofyc/perl6-redis
…/Redis.pm :217:
method auth(Str $password) returns Bool {
Cofyc/perl6-redis
…/Redis.pm :218:
return self.exec_command("AUTH", $password);
CurtTilmes/perl6-libcurl
…/README.md :25:
proxies, cookies, user+password authentication (Basic, Digest,
CurtTilmes/perl6-libcurl
…/README.md :211:
password
CurtTilmes/perl6-libcurl
…/README.md :464:
embedded user + password.
CurtTilmes/perl6-libcurl
…/Easy.pm6 :197:
password => (CURLOPT_PASSWORD, CURLOPT_STR ),
CurtTilmes/perl6-libcurl
…/test0068.t :21:
is $curl.statusline, 'HTTP/1.1 401 You give me wrong password',
CurtTilmes/perl6-libcurl
…/test0068.t :24:
is $curl.content, "Wrong password dude. Get it fixed and return.\n", 'content';
Emeric54/p6-text-caesar
…/META6.json :13:
"tags" : [ "crypt", "password" ],
JJ/p6-math-constants
…/LICENSE :340:
source code form), and must require no special password or key for
Juerd/p6-mqtt
…/Client.pm :250:
No username and password are sent to the server.
LLFourn/p6-AttrX-InitArg
…/README.md :13:
method get-message($password){
LLFourn/p6-AttrX-InitArg
…/README.md :14:
$password eq 'opensesame' ?? $!message !! Nil;
LLFourn/p6-AttrX-InitArg
…/class.t :10:
method get-secret-message($password){
LLFourn/p6-AttrX-InitArg
…/class.t :11:
$password eq 'opensesame' ?? $!message !! Str;
LLFourn/p6-AttrX-InitArg
…/example0.t :11:
method get-message($password){
LLFourn/p6-AttrX-InitArg
…/example0.t :12:
$password eq 'opensesame' ?? $!message !! Nil;
LLFourn/p6-AttrX-InitArg
…/role.t :8:
method get-secret-message($password){
LLFourn/p6-AttrX-InitArg
…/role.t :9:
$password eq 'opensesame' ?? $!message !! Str;
MARTIMM/Auth-SCRAM
…/README.md :46:
:password<pencil>,
MARTIMM/Auth-SCRAM
…/CHANGES.md :40:
* mangle-password and clean-up in user objects are made optional. Called when defined.
MARTIMM/Auth-SCRAM
…/TODO.md :7:
* Keep information when calculated. User request boolean and username/password/authzid tuple must be kept the same. This saves time.
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :15:
# and username/password/authzid must be kept the same. This saves time.
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :30:
Str :$password,
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :45:
die 'No username and/or password provided'
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :46:
unless ? $username and ? $password;
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :54:
self.init( :$username, :$password, :$authzid, :client-object($helper-object));
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :75:
Str :$password!,
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :95:
:$username, :$password, :$authzid, :$client-object
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :124:
Str:D :$username is copy, Str:D :$password is copy,
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :133:
$password = self.normalize( $password, :!prep-username, :$enforce);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :137:
my Buf $mangled-password;
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :138:
if $helper-object.^can('mangle-password') {
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :139:
$mangled-password = $helper-object.mangle-password(
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :140:
:$username, :$password, :$authzid
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :145:
$mangled-password = Buf.new($password.encode);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :148:
$!pbkdf2.derive( $mangled-password, $salt, $iter);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :152:
method client-key ( Buf $salted-password --> Buf ) {
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :154:
hmac( $salted-password, 'Client Key', &$!CGH);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :170:
method server-key ( Buf $salted-password --> Buf ) {
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :172:
hmac( $salted-password, 'Server Key', &$!CGH);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :222:
# Normalize password
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :28:
Str :$password!,
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :43:
Usernames and password (and maybe the authorization id) must be normalized.
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :49:
set to True. There is only one type of profile for passwords so no control
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :63:
Username, password and authorization id are not needed when a server side object
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :82:
Str:D :$username is copy, Str:D :$password is copy,
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :89:
Calculate the derived key from the password, salt and number of iterations. The
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :92:
The username and password are normalized using the PRECIS framework described
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :99:
When the method C<mangle-password> is defined in the user provided helper
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :103:
method mangle-password (
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :105:
Str :$password,
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :112:
my Buf $mangled-password .= new($password.encode);
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :117:
method client-key ( Buf $salted-password --> Buf ) {
MARTIMM/Auth-SCRAM
…/SCRAM.pod6 :159:
username or password profile is choosen. C<$case-preserved-profile> selects
MARTIMM/Auth-SCRAM
…/Client.pm6 :10:
# and username/password/authzid must be kept the same. This saves time.
MARTIMM/Auth-SCRAM
…/Client.pm6 :16:
has Str $!password;
MARTIMM/Auth-SCRAM
…/Client.pm6 :41:
has Buf $!salted-password;
MARTIMM/Auth-SCRAM
…/Client.pm6 :60:
Str :$username, Str :$password, Str :$authzid,
MARTIMM/Auth-SCRAM
…/Client.pm6 :68:
Str:D :$password!,
MARTIMM/Auth-SCRAM
…/Client.pm6 :74:
$!password = $password;
MARTIMM/Auth-SCRAM
…/Client.pm6 :168:
$!salted-password = self.derive-key(
MARTIMM/Auth-SCRAM
…/Client.pm6 :169:
:$!username, :$!password, :$!authzid, :!enforce
MARTIMM/Auth-SCRAM
…/Client.pm6 :174:
$!client-key = self.client-key($!salted-password);
MARTIMM/Auth-SCRAM
…/Client.pm6 :241:
$!server-key = self.server-key($!salted-password);
MARTIMM/Auth-SCRAM
…/Client.pod6 :43:
:password<pencil>,
MARTIMM/Auth-SCRAM
…/Client.pod6 :88:
Str:D :$username!, Str:D :$password!, Str :$authzid,
MARTIMM/Auth-SCRAM
…/Client.pod6 :116:
=item1 B<mangle-password>. This method is optional. Some servers, like mongod,
MARTIMM/Auth-SCRAM
…/Client.pod6 :117:
need extra manipulations to mangle the data. The username and password are
MARTIMM/Auth-SCRAM
…/Client.pod6 :120:
method mangle-password (
MARTIMM/Auth-SCRAM
…/Client.pod6 :121:
Str :$username, Str :$password, Str :$authzid
MARTIMM/Auth-SCRAM
…/Client.pod6 :127:
my Buf $mangled-password = Buf.new($password.encode);
MARTIMM/Auth-SCRAM
…/Server.pm6 :10:
# and username/password/authzid must be kept the same. This saves time.
MARTIMM/Auth-SCRAM
…/Server.pm6 :16:
has Str $!password;
MARTIMM/Auth-SCRAM
…/Server.pm6 :41:
has Buf $!salted-password;
MARTIMM/Auth-SCRAM
…/Server.pm6 :82:
Str :$username, Str :$password,
MARTIMM/Auth-SCRAM
…/Server.pm6 :89:
my Buf $salted-password = self.derive-key(
MARTIMM/Auth-SCRAM
…/Server.pm6 :90:
:$username, :$password, :enforce,
MARTIMM/Auth-SCRAM
…/Server.pm6 :95:
my Buf $client-key = self.client-key($salted-password);
MARTIMM/Auth-SCRAM
…/Server.pm6 :97:
my Buf $server-key = self.server-key($salted-password);
MARTIMM/Auth-SCRAM
…/Server.pod6 :16:
risk that passwords are stolen. The server role helps to convert the username
MARTIMM/Auth-SCRAM
…/Server.pod6 :17:
and password into a credential tupple which can be stored without the risk that
MARTIMM/Auth-SCRAM
…/Server.pod6 :18:
the password can be retrieved from this data. Below is a simple implementation
MARTIMM/Auth-SCRAM
…/Server.pod6 :49:
method add-user ( $username is copy, $password is copy ) {
MARTIMM/Auth-SCRAM
…/Server.pod6 :53:
:$username, :$password, :$salt, :iter(4096), :server-object(self)
MARTIMM/Auth-SCRAM
…/Server.pod6 :117:
# receive the password and password preferable over a secure connection
MARTIMM/Auth-SCRAM
…/Server.pod6 :119:
my Str $password = '...'
MARTIMM/Auth-SCRAM
…/Server.pod6 :120:
$crd.add-user( $user, $password);
MARTIMM/Auth-SCRAM
…/Server.pod6 :179:
Str :$username, Str :$password,
MARTIMM/Auth-SCRAM
…/Server.pod6 :196:
When the method C<mangle-password> is defined, that method will be called for
MARTIMM/Auth-SCRAM
…/Common.pm6 :23:
Str :$username, Str:D :$password, Str :$authzid,
MARTIMM/Auth-SCRAM
…/Common.pm6 :31:
my Buf $mangled-password;
MARTIMM/Auth-SCRAM
…/Common.pm6 :32:
if $helper-object.^can('mangle-password') {
MARTIMM/Auth-SCRAM
…/Common.pm6 :33:
$mangled-password = $helper-object.mangle-password(
MARTIMM/Auth-SCRAM
…/Common.pm6 :34:
:$username, :$password, :$authzid
MARTIMM/Auth-SCRAM
…/Common.pm6 :39:
$mangled-password = Buf.new($password.encode);
MARTIMM/Auth-SCRAM
…/Common.pm6 :42:
$!pbkdf2.derive( $mangled-password, $salt, $iter);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :14:
# and username/password/authzid must be kept the same. This saves time.
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :20:
has Str $!password;
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :32:
# Normalization of username and password can be skipped if normal
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :56:
has Buf $!salted-password;
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :74:
Str:D :$password!,
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :83:
$!password = $password;
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :188:
# $!password = self!saslPrep($!password);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :248:
my Buf $mangled-password;
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :249:
if $!client-side.^can('mangle-password') {
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :250:
$mangled-password = $!client-side.mangle-password(
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :251:
:$!username, :$!password, :$!authzid
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :256:
$mangled-password = self.mangle-password($password);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :259:
$!salted-password = $!pbkdf2.derive( $mangled-password, $!s-salt, $!s-iter);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :261:
$!client-key = hmac( $!salted-password, 'Client Key', &$!CGH);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :332:
$!server-key = hmac( $!salted-password, 'Server Key', &$!CGH);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :497:
my Buf $mangled-password;
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :498:
if $!client-side.^can('mangle-password') {
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :499:
$mangled-password = $!client-side.mangle-password(
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :500:
:$!username, :$!password, :$!authzid
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :505:
$mangled-password = self.mangle-password($password);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :508:
$!salted-password = $!pbkdf2.derive( $mangled-password, $!s-salt, $!s-iter);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :510:
$!client-key = hmac( $!salted-password, 'Client Key', &$!CGH);
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :541:
method mangle-password ( Str:D $password --> Buf ) {
MARTIMM/Auth-SCRAM
…/SCRAM.pm6 :543:
Buf.new($!password.encode);
MARTIMM/Auth-SCRAM
…/100-SCRAM.t :41:
# method mangle-password() is optional
MARTIMM/Auth-SCRAM
…/100-SCRAM.t :55:
:password<pencil>,
MARTIMM/Auth-SCRAM
…/200-SCRAM.t :32:
method add-user ( $username is copy, $password is copy ) {
MARTIMM/Auth-SCRAM
…/200-SCRAM.t :35:
:$username, :$password,
MARTIMM/Auth-SCRAM
…/200-SCRAM.t :80:
# method mangle-password() is optional
MARTIMM/Auth-SCRAM
…/201-SCRAM.t :30:
method add-user ( $username is copy, $password is copy ) {
MARTIMM/Auth-SCRAM
…/201-SCRAM.t :33:
:$username, :$password,
MARTIMM/Auth-SCRAM
…/201-SCRAM.t :84:
# method mangle-password() is optional
MARTIMM/PKCS5
…/PBKDF2.pm6 :26:
# Input: P password, an octet string
MARTIMM/PKCS5
…/PBKDF2.pod :47:
Calculate the derived key given the password C<$pw> and a salt C<$salt>. It
MARTIMM/PKCS5
…/100-pbkdf2.t :16:
Buf.new('password'.encode),
MARTIMM/PKCS5
…/100-pbkdf2.t :21:
is $spw, '0c60c80f961f0e71f3a9b524af6012062fe037a6', "Test 'password' and 1 iteration";
MARTIMM/PKCS5
…/100-pbkdf2.t :24:
Buf.new('password'.encode),
MARTIMM/PKCS5
…/100-pbkdf2.t :29:
is $spw, 'ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957', "Test 'password' and 2 iterations";
MARTIMM/PKCS5
…/100-pbkdf2.t :32:
Buf.new('password'.encode),
MARTIMM/PKCS5
…/100-pbkdf2.t :37:
is $spw, '4b007901b765489abead49d926f721d065a429c1', "Test 'password' and 4096 iterations";
MARTIMM/PKCS5
…/100-pbkdf2.t :42:
Buf.new('password'.encode),
MARTIMM/PKCS5
…/100-pbkdf2.t :47:
is $spw, 'eefe3d61cd4da4e4e9945b3d6ba2158c2634e984', "Test 'password' and 16777216 iterations";
MARTIMM/PKCS5
…/100-pbkdf2.t :55:
Buf.new('passwordPASSWORDpassword'.encode),
MARTIMM/mongo-perl6-driver
…/README.md :202:
* In the future, host/port arguments to Client must be replaced by using a URI in the format ```mongodb://[username:password@]host1[:port1]…
MARTIMM/mongo-perl6-driver
…/README.md :204:
*This is done now. The Client.instance method will only accept uri which will be processed by the Uri class. The default uri will be ```mongodb://```…
MARTIMM/mongo-perl6-driver
…/CHANGES.md :67:
* Added normalization for username and passwords using Unicode::Precis. At the moment the UsernameCasePreserved profile is used until there is some consensus about it.
MARTIMM/mongo-perl6-driver
…/CHANGES.md :69:
Auth::SCRAM implemented. No username/password normalization yet.
MARTIMM/mongo-perl6-driver
…/CHANGES.md :78:
* Refactored MongoDB::Users to MongoDB::HL::Users because it can all be done using the lower level run-command(). This adds some control and tests on password length and use of characters. Therefore this makes it a higher level implementation.
MARTIMM/mongo-perl6-driver
…/CHANGES.md :84:
* URI handling of username/password. Used uri-unescape() from URI::Escape module on usernames and passwords. Not sure if needed on fqdn.
MARTIMM/mongo-perl6-driver
…/CHANGES.md :89:
* Took a long time to implement authentication and had to write a pbkdf2 and scram sha1 implementations first. Then find out what exactly mongodb n…
MARTIMM/mongo-perl6-driver
…/Design-tests.md :91:
* [x] Username and password
MARTIMM/mongo-perl6-driver
…/MongoDB.pod6 :96:
run-command. This module adds facilities like checking password length etc.
MARTIMM/mongo-perl6-driver
…/Credential.pm6 :12:
has Str $.password;
MARTIMM/mongo-perl6-driver
…/Credential.pm6 :21:
Str :$username = '', Str :$password = '',
MARTIMM/mongo-perl6-driver
…/Credential.pm6 :27:
$!password = $password;
MARTIMM/mongo-perl6-driver
…/Credential.pm6 :60:
fatal-message("$e0 password must $e1") unless ? $!password;
MARTIMM/mongo-perl6-driver
…/Credential.pm6 :70:
fatal-message("$e0 password must not $e1") if ? $!password;
MARTIMM/mongo-perl6-driver
…/Credential.pm6 :79:
# password is optional
MARTIMM/mongo-perl6-driver
…/Credential.pm6 :93:
fatal-message("$e0 password must $e1") unless ? $!password;
MARTIMM/mongo-perl6-driver
…/Credential.pm6 :102:
fatal-message("$e0 password must $e1") unless ? $!password;
MARTIMM/mongo-perl6-driver
…/Scram.pm6 :78:
method mangle-password ( Str:D :$username, Str:D :$password --> Buf ) {
MARTIMM/mongo-perl6-driver
…/Scram.pm6 :86:
my TestValue $tv-pw = $upf-os.enforce($password);
MARTIMM/mongo-perl6-driver
…/Scram.pm6 :94:
my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $password).encode;
MARTIMM/mongo-perl6-driver
…/Client.pm6 :101:
# password, servers, database and options.
MARTIMM/mongo-perl6-driver
…/Client.pod6 :102:
mongodb://u1:pw1@nsa.us:666,my.datacenter.gov/nsa/?replicaSet=foryoureyesonly
MARTIMM/mongo-perl6-driver
…/Users.pm6 :73:
Str:D $user, Str:D $password,
MARTIMM/mongo-perl6-driver
…/Users.pm6 :88:
# Check if password is too short
MARTIMM/mongo-perl6-driver
…/Users.pm6 :90:
elsif $password.chars < $!min-pw-length {
MARTIMM/mongo-perl6-driver
…/Users.pm6 :93:
oper-data => $password,
MARTIMM/mongo-perl6-driver
…/Users.pm6 :98:
# Check if password answers to rule given by attribute code
MARTIMM/mongo-perl6-driver
…/Users.pm6 :104:
$pw-ok = ($password ~~ m/ <[a..z]> /).Bool;
MARTIMM/mongo-perl6-driver
…/Users.pm6 :109:
$password ~~ m/ <[a..z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :110:
$password ~~ m/ <[A..Z]> /
MARTIMM/mongo-perl6-driver
…/Users.pm6 :116:
$password ~~ m/ <[a..z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :117:
$password ~~ m/ <[A..Z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :118:
$password ~~ m/ \d /
MARTIMM/mongo-perl6-driver
…/Users.pm6 :124:
$password ~~ m/ <[a..z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :125:
$password ~~ m/ <[A..Z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :126:
$password ~~ m/ \d / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :127:
$password ~~ m/ <[`~!@\#\$%^&*()\-_=+[{\]};:\'\"\\|,<.>\/\?]> /
MARTIMM/mongo-perl6-driver
…/Users.pm6 :134:
oper-data => $password,
MARTIMM/mongo-perl6-driver
…/Users.pm6 :141:
# Normalize username and password
MARTIMM/mongo-perl6-driver
…/Users.pm6 :148:
my TestValue $tv-pw = $upf-os.prepare($password);
MARTIMM/mongo-perl6-driver
…/Users.pm6 :163:
pwd => (Digest::MD5.md5_hex( [~] $user, ':mongo:', $password)),
MARTIMM/mongo-perl6-driver
…/Users.pm6 :176:
Str:D $user, Str :$password,
MARTIMM/mongo-perl6-driver
…/Users.pm6 :187:
if ?$password {
MARTIMM/mongo-perl6-driver
…/Users.pm6 :188:
if $password.chars < $!min-pw-length {
MARTIMM/mongo-perl6-driver
…/Users.pm6 :191:
oper-data => $password,
MARTIMM/mongo-perl6-driver
…/Users.pm6 :199:
$pw-ok = ($password ~~ m/ <[a..z]> /).Bool;
MARTIMM/mongo-perl6-driver
…/Users.pm6 :204:
$password ~~ m/ <[a..z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :205:
$password ~~ m/ <[A..Z]> /
MARTIMM/mongo-perl6-driver
…/Users.pm6 :211:
$password ~~ m/ <[a..z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :212:
$password ~~ m/ <[A..Z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :213:
$password ~~ m/ \d /
MARTIMM/mongo-perl6-driver
…/Users.pm6 :219:
$password ~~ m/ <[a..z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :220:
$password ~~ m/ <[A..Z]> / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :221:
$password ~~ m/ \d / and
MARTIMM/mongo-perl6-driver
…/Users.pm6 :222:
$password ~~ m/ <[`~!@\#\$%^&*()\-_=+[{\]};:\'\"\\|,<.>\/\?]> /
MARTIMM/mongo-perl6-driver
…/Users.pm6 :231:
# Normalize username and password
MARTIMM/mongo-perl6-driver
…/Users.pm6 :238:
my TestValue $tv-pw = $upf-os.prepare($password);
MARTIMM/mongo-perl6-driver
…/Users.pm6 :244:
$req<pwd> = (Digest::MD5.md5_hex([~] $user, ':mongo:', $password));
MARTIMM/mongo-perl6-driver
…/Users.pm6 :250:
oper-data => $password,
MARTIMM/mongo-perl6-driver
…/Users.pod6 :39:
:password('mt+++'),
MARTIMM/mongo-perl6-driver
…/Users.pod6 :68:
Minimum password length.
MARTIMM/mongo-perl6-driver
…/Users.pod6 :88:
Method to specify checks upon usernames and passwords. Default values for
MARTIMM/mongo-perl6-driver
…/Users.pod6 :89:
the username minimal length is 2. For passwords idem depending on the password
MARTIMM/mongo-perl6-driver
…/Users.pod6 :90:
attribute code. $pw-attribs specifies how passwords are to be checked. There are
MARTIMM/mongo-perl6-driver
…/Users.pod6 :109:
using a password of less the 4 characters the call is bound to fail.
MARTIMM/mongo-perl6-driver
…/Users.pod6 :115:
Str:D $user, Str:D $password,
MARTIMM/mongo-perl6-driver
…/Users.pod6 :141:
Str:D $user, Str :$password,
MARTIMM/mongo-perl6-driver
…/Server.pm6 :241:
# By default authentiction is needed when user/password info is found in the
MARTIMM/mongo-perl6-driver
…/Server.pm6 :329:
if ?$credential.username and ?$credential.password {
MARTIMM/mongo-perl6-driver
…/Server.pm6 :355:
:password($credential.password),
MARTIMM/mongo-perl6-driver
…/Server.pm6 :389:
} # if ?$credential.username and ?$credential.password
MARTIMM/mongo-perl6-driver
…/Uri.pm6 :13:
username password auth-source auth-mechanism auth-mechanism-properties
MARTIMM/mongo-perl6-driver
…/Uri.pm6 :24:
token server-section { <username-password>? <server-list>? }
MARTIMM/mongo-perl6-driver
…/Uri.pm6 :26:
token username-password {
MARTIMM/mongo-perl6-driver
…/Uri.pm6 :27:
$<username>=<[\w\d%-]>+ ':' $<password>=<[\w\d%-]>+ '@'
MARTIMM/mongo-perl6-driver
…/Uri.pm6 :64:
method username-password (Match $m) {
MARTIMM/mongo-perl6-driver
…/Uri.pm6 :66:
$!pword = uri-unescape(~$m<password>);
MARTIMM/mongo-perl6-driver
…/Uri.pm6 :137:
# get username and password, database and some of
MARTIMM/mongo-perl6-driver
…/Uri.pm6 :140:
:username($actions.uname), :password($actions.pword),
MARTIMM/mongo-perl6-driver
…/500-Users.t :117:
}, "Test username and password checks";
MARTIMM/mongo-perl6-driver
…/500-Users.t :138:
:password<mt+++>,
MARTIMM/mongo-perl6-driver
…/504-scram-login.t :50:
method mangle-password ( Str:D :$username, Str:D :$password --> Buf ) {
MARTIMM/mongo-perl6-driver
…/504-scram-login.t :52:
my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $password).encode;
MARTIMM/mongo-perl6-driver
…/504-scram-login.t :67:
:password<pencil>,
MARTIMM/mongo-perl6-driver
…/504-scram-login.t :199:
method mangle-password ( Str:D :$username, Str:D :$password --> Buf ) {
MARTIMM/mongo-perl6-driver
…/504-scram-login.t :201:
my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $password).encode;
MARTIMM/mongo-perl6-driver
…/504-scram-login.t :244:
:password<w@tD8jeDan>,
MARTIMM/mongo-perl6-driver
…/070-uri.t :24:
is $uri.password, '', 'mongodb:// --> no password';
MARTIMM/mongo-perl6-driver
…/070-uri.t :92:
is $uri.password, 'pw', 'mongodb://mt:pw@ --> password = pw';
MARTIMM/mongo-perl6-driver
…/070-uri.t :99:
is $uri.password, 'pw', 'mongodb://mt:pw@h2:9876/users --> password = pw';
MARTIMM/mongo-perl6-driver
…/070-uri.t :104:
is $uri.password, 'w@tD8jeDan', 'mongodb://Dondersteen:w%40tD8jeDan@h2:9876/users --> password = w@tD8jeDan';
MARTIMM/mongo-perl6-driver
…/112-Client.t :78:
subtest "mongodb url with username and password SCRAM-SHA-1", {
MARTIMM/mongo-perl6-driver
…/connection-string-uri-format.sxml :19:
mongodb://[username:password@]host1[:port1][,host2[:port2],...[,hostN[:portN]]][/[database][?options]]
MARTIMM/mongo-perl6-driver
…/connection-string-uri-format.sxml :50:
mongodb://[username:password@][host1][:port1],...[,[hostN][:portN]][/[database][?options]]
MARTIMM/mongo-perl6-driver
…/connection-string-uri-format.sxml :75:
$
MARTIMM/mongo-perl6-driver
…/connection-string-uri-format.sxml :85:
$!test.add t='is $uri-obj.server-data<password>, "pencil"' [
MARTIMM/mongo-perl6-driver
…/connection-string-uri-format.sxml :90:
It is not correct to specify the username without its password.
MARTIMM/mongo-perl6-driver
…/connection-string-uri-format.t :29:
is $uri-obj.server-data<password>, "pencil", 'T7';
MARTIMM/mongo-perl6-driver
…/driver-authentication.sxml :44:
:username<user>, :password<pencil>,
MARTIMM/mongo-perl6-driver
…/driver-authentication.sxml :55:
$!test.add t='is $cred.password, "pencil"' [
MARTIMM/mongo-perl6-driver
…/driver-authentication.sxml :67:
:username<user>, :password<pencil>, :auth-mechanism<MONGODB-X509>
MARTIMM/mongo-perl6-driver
…/driver-authentication.sxml :72:
Mechanism $**code[MONGODB-X509] does not expect a password
MARTIMM/mongo-perl6-driver
…/driver-authentication.sxml :76:
$cred .= new( :password<pencil>, :auth-mechanism<MONGODB-CR>);
MARTIMM/mongo-perl6-driver
…/driver-authentication.sxml :95:
The driver will not show much if no user or password is given. So, in order
MARTIMM/mongo-perl6-driver
…/driver-authentication.t :17:
:username<user>, :password<pencil>,
MARTIMM/mongo-perl6-driver
…/driver-authentication.t :21:
is $cred.password, "pencil", 'T1';
MARTIMM/mongo-perl6-driver
…/driver-authentication.t :24:
:username<user>, :password<pencil>, :auth-mechanism<MONGODB-X509>
MARTIMM/mongo-perl6-driver
…/driver-authentication.t :29:
$cred .= new( :password<pencil>, :auth-mechanism<MONGODB-CR>);
MARTIMM/unicode-precis
…/README.md :71:
First the basis of the PRECIS framework will be build. As soon as possible a profile for usernames and passwords follows. This is my first need. When this functions well enough, other profiles can be inserted. Much of it is now Implemented.
MARTIMM/unicode-precis
…/FreeForm.pm6 :8:
# characters that is used for free-form strings, including passwords as well
MARTIMM/unicode-precis
…/100-precis.t :274:
my Str $password = 'correct horse battery staple';
MARTIMM/unicode-precis
…/100-precis.t :275:
my TestValue $tv = $psff.prepare($password);
MARTIMM/unicode-precis
…/100-precis.t :276:
ok (($tv ~~ Str) and ($tv eq $password)), "test password '$tv'";
MARTIMM/unicode-precis
…/100-precis.t :279:
$password = 'Correct Horse Battery Staple';
MARTIMM/unicode-precis
…/100-precis.t :280:
$tv = $psff.prepare($password);
MARTIMM/unicode-precis
…/100-precis.t :281:
ok (($tv ~~ Str) and ($tv eq $password)), "test password '$tv'";
MARTIMM/unicode-precis
…/100-precis.t :284:
$password = "\x03C0\x00DF\x00E5";
MARTIMM/unicode-precis
…/100-precis.t :285:
$tv = $psff.prepare($password);
MARTIMM/unicode-precis
…/100-precis.t :286:
ok (($tv ~~ Str) and ($tv eq $password)), "test password '$tv'";
MARTIMM/unicode-precis
…/100-precis.t :289:
$password = "Jack of \x2666";
MARTIMM/unicode-precis
…/100-precis.t :290:
$tv = $psff.prepare($password);
MARTIMM/unicode-precis
…/100-precis.t :291:
ok (($tv ~~ Str) and ($tv eq $password)), "test password '$tv'";
MARTIMM/unicode-precis
…/100-precis.t :294:
$password = "Foo\x[1680]Bar";
MARTIMM/unicode-precis
…/100-precis.t :295:
my Str $password2 = "Foo Bar";
MARTIMM/unicode-precis
…/100-precis.t :296:
$tv = $psff.enforce($password);
MARTIMM/unicode-precis
…/100-precis.t :297:
ok (($tv ~~ Str) and ($tv eq $password2)), "test password '$tv'";
MARTIMM/unicode-precis
…/100-precis.t :300:
$password = "my cat is a \x[0009]by";
MARTIMM/unicode-precis
…/100-precis.t :301:
$tv = $psff.enforce($password);
MARTIMM/unicode-precis
…/100-precis.t :302:
ok (($tv ~~ Bool) and not $tv), "test password '$password' fails";
MARTIMM/unicode-precis
…/100-precis.t :304:
$password = 'Upper Case';
MARTIMM/unicode-precis
…/100-precis.t :305:
$tv = $psff.compare( $password, lc($password));
MattOates/Text--Emotion
…/ODBL1.0-LICENSE.txt :377:
password, or within a similar access control scheme provided that You
Perl6-Noise-Gang/Audio-PortAudio
…/stream-source :15:
stream-source --password=<source pw>
Perl6-Noise-Gang/Audio-PortAudio
…/stream-source :31:
specify the icecast password (you did actually change that right?) You
Perl6-Noise-Gang/Audio-PortAudio
…/stream-source :58:
sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$password!, Int :$bitrate = 128, Int :$quality = 5, Str :$mount = '/stream', Str :$source, Int :$buffer = 256, *%extra) {
Perl6-Noise-Gang/Audio-PortAudio
…/stream-source :92:
my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$password, :$mount, :$format,
PostCocoon/P6-Url
…/Url.pm6 :120:
<username> [ ':' <password> ]?
PostCocoon/P6-Url
…/Url.pm6 :135:
token password {
PostCocoon/P6-Url
…/Url.pm6 :181:
$result<password> [R//]= ~$grammar<auth><password>;
PostCocoon/P6-Url
…/Url.pm6 :200:
if defined $hash<password> {
PostCocoon/P6-Url
…/Url.pm6 :201:
$url ~= ":" ~ $hash<password>
ShaneKilkelly/perl6-config-clever
…/README.md :31:
"password": null,
ShaneKilkelly/perl6-config-clever
…/README.md :41:
"password": "a_terrible_password",
ShaneKilkelly/perl6-config-clever
…/README.md :63:
# "password": "a_terrible_password",
ShaneKilkelly/perl6-config-clever
…/production.json :10:
"password": "password"
ShaneKilkelly/perl6-config-clever
…/basic.t :38:
password => "password"
Skarsnik/perl6-discord
…/Discord.pm6 :50:
method login(Str $mail, Str $password) returns Bool {
Skarsnik/perl6-discord
…/Discord.pm6 :51:
my $rep = self.post(%api-url<login>, email => $mail, password => $password);
TiMBuS/Net--IRC
…/README.pod :35:
Autoident.new(password => 'nspassw0rd')
TiMBuS/Net--IRC
…/README.pod :64:
$password;
TiMBuS/Net--IRC
…/Bot.pm :19:
has $.password;
TiMBuS/Net--IRC
…/Bot.pm :65:
$.conn.sendln("PASS $.password", scrubbed => 'PASS ...')
TiMBuS/Net--IRC
…/Bot.pm :66:
if $.password;
TiMBuS/Net--IRC
…/Autoident.pm :6:
has $.password = die "Need to tell Autoident your password if you want it to work!";
TiMBuS/Net--IRC
…/Autoident.pm :9:
$ev.conn.sendln("NS IDENTIFY $.password", scrubbed => 'NS IDENTIFY ...');
adaptiveoptics/HTML-Tag
…/README.md :163:
{password => { type => 'password' }},
adaptiveoptics/HTML-Tag
…/Tag.pod6 :163:
{password => { type => 'password' }},
adaptiveoptics/HTML-Tag
…/Form.pm6 :38:
unless %tagdef<type> eq 'password' {
adaptiveoptics/HTML-Tag
…/Form.pm6 :43:
unless %tagdef<type>:exists and (%tagdef<type> eq 'password') {
adaptiveoptics/HTML-Tag
…/Form.pm6 :94:
{password => { type => 'password' }},
adaptiveoptics/HTML-Tag
…/Form.pm6 :217:
the type is "password" no value attribute will ever be printed for the
adaptiveoptics/HTML-Tag
…/0020-form.t :15:
{ password => { }},
adaptiveoptics/HTML-Tag
…/0020-form.t :22:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i…
adaptiveoptics/HTML-Tag
…/0020-form.t :25:
{ password => { }},
adaptiveoptics/HTML-Tag
…/0020-form.t :32:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" autofocus><input name="pass…
adaptiveoptics/HTML-Tag
…/0020-form.t :36:
is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ…
adaptiveoptics/HTML-Tag
…/0020-form.t :39:
{ password => { }},
adaptiveoptics/HTML-Tag
…/0020-form.t :47:
is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ…
adaptiveoptics/HTML-Tag
…/0020-form.t :54:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" value="mark"><input name="p…
adaptiveoptics/HTML-Tag
…/0020-form.t :57:
{ password => { type => 'password' }},
adaptiveoptics/HTML-Tag
…/0020-form.t :64:
%input<password> = 'supersecret';
adaptiveoptics/HTML-Tag
…/0020-form.t :68:
is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ…
adaptiveoptics/HTML-Tag
…/0020-form.t :74:
{ password => { type => 'password' }},
adaptiveoptics/HTML-Tag
…/0020-form.t :83:
is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ…
adaptiveoptics/HTML-Tag
…/0020-form.t :86:
{ password => { type => 'password' }},
adaptiveoptics/HTML-Tag
…/0020-form.t :94:
is $form.render, '<form method="POST" name="form" action="/"><span>oofie<label for="form-username">Username</label><input name="username" id="form-us…
adaptiveoptics/HTML-Tag
…/0020-form.t :100:
{ password => { }},
adaptiveoptics/HTML-Tag
…/0020-form.t :107:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" required><input name="passw…
adaptiveoptics/HTML-Tag
…/0020-form.t :112:
{ password => { attrs => {:id('blue')} }},
adaptiveoptics/HTML-Tag
…/0020-form.t :119:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" class="pink" type="text"><input name="p…
adaptiveoptics/HTML-Tag
…/0020-form.t :124:
{ password => { }},
adaptiveoptics/HTML-Tag
…/0020-form.t :132:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i…
adaptiveoptics/HTML-Tag
…/0020-form.t :137:
{ password => { }},
adaptiveoptics/HTML-Tag
…/0020-form.t :146:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i…
adaptiveoptics/HTML-Tag
…/0020-form.t :153:
{ password => { }},
adaptiveoptics/HTML-Tag
…/0020-form.t :162:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i…
adaptiveoptics/HTML-Tag
…/0020-form.t :169:
{ password => { }},
adaptiveoptics/HTML-Tag
…/0020-form.t :177:
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i…
afiskon/p6-sitemap-xml-parser
…/01-parse.t :69:
<loc>http://username:password@xn--d1abbgf6aiiy.xn--p1ai:8080/</loc>
afiskon/p6-sitemap-xml-parser
…/01-parse.t :84:
loc => 'http://username:password@xn--d1abbgf6aiiy.xn--p1ai:8080/',
araraloren/Net-FTP
…/FTP.pm6 :541:
Ftp user's password. If password is not given or a empty string, and the user is anonymous, anonymous@ will be
araraloren/Net-FTP
…/FTP.pm6 :542:
the password of user.
araraloren/perl6-app-snippet
…/LICENSE :340:
source code form), and must require no special password or key for
azawawi/farabi6
…/html-hint.js :168:
type: ["hidden", "text", "search", "tel", "url", "email", "password", "datetime", "date", "month",
azawawi/farabi6
…/sql.js :296:
keywords: set(sqlKeywords + "accessible action add after algorithm all analyze asensitive at authors auto_increment autocommit avg avg_row_length…
azawawi/farabi6
…/sql.js :312:
keywords: set(sqlKeywords + "accessible action add after algorithm all always analyze asensitive at authors auto_increment autocommit avg avg_row…
azawawi/farabi6
…/jquery.min.js :2:
!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error(…
azawawi/farabi6
…/jquery.min.js :4:
},removeAttr:function(a,b){var c,d,e=0,f=b&&b.match(E);if(f&&1===a.nodeType)while(c=f[e++])d=n.propFix[c]
azawawi/farabi6
…/form.min.css :10:
*/.ui.form{position:relative;max-width:100%}.ui.form>p{margin:1em 0}.ui.form .field,.ui.form .fields .field{clear:both;margin:0 0 1em}.ui.form .fiel…
azawawi/farabi6
…/reset.min.css :10:
*/*,:after,:before{box-sizing:inherit}html{box-sizing:border-box}input[type=text],input[type=email],input[type=search],input[type=password
azawawi/farabi6
…/semantic.min.css :11:
@import 'https://fonts.googleapis.com/css?family=Lato:400,700,400italic,700italic\&subset=latin';\*,:after,:before{box-sizing:inherit}html{box-sizing:b…
azawawi/perl6-electron
…/rpcauth.js :23:
* hash: string user password
azawawi/perl6-electron
…/rpcclient.js :15:
* hash: string rpc password (hash), default null
azawawi/perl6-electron
…/rpcclient.js :136:
* hash: string user password, default null
azawawi/perl6-electron
…/optsclient.js :10:
// string rpc password (hash), default null
azawawi/perl6-libzip
…/NativeCall.pm6 :108:
# N No password provided
azawawi/perl6-libzip
…/NativeCall.pm6 :110:
# N Wrong password provided
azawawi/perl6-libzip
…/NativeCall.pm6 :440:
#ZIP_EXTERN int zip_set_default_password(struct zip *, const char *);
azawawi/perl6-libzip
…/NativeCall.pm6 :441:
sub zip_set_default_password(Pointer[zip] # zip*
azawawi/perl6-net-curl
…/README.md :13:
user+password authentication (Basic, Digest, NTLM, Negotiate, Kerberos),
azawawi/perl6-net-curl
…/anyauthput.c :160:
/* set user name and password for the authentication */
azawawi/perl6-net-curl
…/anyauthput.c :161:
curl_easy_setopt(curl, CURLOPT_USERPWD, "user:password");
azawawi/perl6-net-curl
…/curlx.c :101:
" -envpass arg - environement variable which content the tia private key password",
azawawi/perl6-net-curl
…/imap.c :32:
/* Set username and password */
azawawi/perl6-net-curl
…/imap.c :33:
curl_easy_setopt(curl, CURLOPT_USERPWD, "user:password");
azawawi/perl6-net-curl
…/pop3s.c :32:
/* Set username and password */
azawawi/perl6-net-curl
…/pop3s.c :33:
curl_easy_setopt(curl, CURLOPT_USERPWD, "user:password");
azawawi/perl6-net-curl
…/pop3slist.c :32:
/* Set username and password */
azawawi/perl6-net-curl
…/pop3slist.c :33:
curl_easy_setopt(curl, CURLOPT_USERPWD, "user:password");
azawawi/perl6-net-curl
…/smtp-tls.c :114:
* authentication details (user names and passwords) from being "snooped"
azawawi/perl6-net-curl
…/smtp-tls.c :115:
* on the network. Here is how the user name and password are provided: */
azawawi/perl6-net-curl
…/synctime.c :181:
char *proxy_user_password)
azawawi/perl6-net-curl
…/synctime.c :186:
if (strlen(proxy_user_password) > 0)
azawawi/perl6-net-curl
…/synctime.c :187:
curl_easy_setopt(curl, CURLOPT_PROXYUSERPWD, proxy_user_password);
azawawi/perl6-net-curl
…/synctime.c :229:
" password.\n");
azawawi/perl6-net-curl
…/synctime.c :243:
conf->proxy_user[i] = 0; /* Clean up password from memory */
azawawi/perl6-odoo-client
…/README.md :19:
password => "<password>"
azawawi/perl6-odoo-client
…/Odoo-Client.md :20:
password => "<password>"
azawawi/perl6-odoo-client
…/Odoo-Client.md :47:
### login(Str :$database, Str :$username, Str :$password) {
azawawi/perl6-odoo-client
…/01-login.pl6 :18:
password => "123"
azawawi/perl6-odoo-client
…/02-module.pl6 :18:
password => "123"
azawawi/perl6-odoo-client
…/Client.pm6 :26:
password => "<password>"
azawawi/perl6-odoo-client
…/Client.pm6 :44:
has Str $!password;
azawawi/perl6-odoo-client
…/Client.pm6 :76:
=head3 login(Str :$database, Str :$username, Str :$password) {
azawawi/perl6-odoo-client
…/Client.pm6 :80:
method login(Str :$database, Str :$username, Str :$password) {
azawawi/perl6-odoo-client
…/Client.pm6 :84:
args => [$database, $username, $password]
azawawi/perl6-odoo-client
…/Client.pm6 :89:
$!password = $password;
azawawi/perl6-odoo-client
…/Client.pm6 :101:
my @args = [$!database, $!uid, $!password, $model, $method, $method-args];
azawawi/perl6-parse-selenese
…/README.md :36:
<td>name=password</td>
azawawi/perl6-parse-selenese
…/login.html :26:
<td>name=password</td>
azawawi/perl6-parse-selenese
…/02-test-case.t :35:
<td>name=password</td>
bbkr/jsonrpc
…/README.md :116:
return 'username', 'password';
bduggan/aws-s3-perl6
…/README.md :13:
my $access-key-id = 'password1';
bioduds/EC-Grammars-DIG
…/LICENSE :341:
source code form), and must require no special password or key for
bioduds/EC-Grammars-DIG
…/DIG.pm6 :411:
source code form), and must require no special password or key for
cbk/WebService-GoogleDyDNS
…/README.md :27:
multi sub MAIN( :$domain, :$login, :$password ) {
cbk/WebService-GoogleDyDNS
…/README.md :29:
my $updater = WebService::GoogleDyDNS.new(domainName => $domain, login => $login , password => $password );
cbk/WebService-GoogleDyDNS
…/ipUpdater.p6 :37:
multi sub MAIN( :$domain, :$login, :$password ) {
cbk/WebService-GoogleDyDNS
…/ipUpdater.p6 :39:
my $updater = WebService::GoogleDyDNS.new(domainName => $domain, login => $login , password => $password );
cbk/WebService-GoogleDyDNS
…/GoogleDyDNS.pm6 :19:
has %.password is rw;
cbk/WebService-GoogleDyDNS
…/GoogleDyDNS.pm6 :27:
token line { <domainKey> \t <lastipKey> \t <loginKey> \t <passwordKey> };
cbk/WebService-GoogleDyDNS
…/GoogleDyDNS.pm6 :31:
token passwordKey { 'password' \t <PASSWORD> };
cbk/WebService-GoogleDyDNS
…/GoogleDyDNS.pm6 :50:
%.password = 'password' => $match<line><passwordKey><PASSWORD>;
cbk/WebService-GoogleDyDNS
…/GoogleDyDNS.pm6 :51:
@dataSet[$elemNum] = ( %.domainName ~ "\t" ~ %.lastIP ~ "\t" ~ %.login ~ "\t" ~ %.password);
cbk/WebService-GoogleDyDNS
…/GoogleDyDNS.pm6 :88:
$webAgent.auth(self.login.values(), self.password.values() );
cbk/WebService-GoogleDyDNS
…/GoogleDyDNS.pm6 :101:
$fh.say( self.password.values() );
croservices/cro-core
…/Uri.pm6 :255:
method password(--> Str) {
croservices/cro-core
…/uri.t :32:
my $long-name = 'abc://username:password@example.com:123/path/data?key=value&key2=value2#fragid1';
croservices/cro-core
…/uri.t :269:
!*.password.defined;
croservices/cro-core
…/uri.t :280:
!*.password.defined;
croservices/cro-core
…/uri.t :291:
*.password eq 's3cr3t';
croservices/cro-core
…/uri.t :302:
*.password eq Q{()*+,;=~};
croservices/cro-core
…/uri.t :317:
*.password eq "\c[KATAKANA LETTER A]\c[KATAKANA LETTER A]";
croservices/cro-http
…/Client.pm6 :238:
if (%!auth<username>:exists) && (%!auth<password>:exists) {
croservices/cro-http
…/Client.pm6 :526:
my $hash = encode-base64("{%data<username>}:{%data<password>}", :str);
croservices/cro-http
…/http-client.t :401:
password => "Password",
croservices/cro-http
…/http-client.t :408:
password => 'Password'});
croservices/cro-http
…/http-client.t :416:
password => 'Password'}) -> $resp {
croservices/cro
…/cro-http-client.md :295:
username and a password.
croservices/cro
…/cro-http-client.md :299:
password => $password
croservices/cro
…/cro-http-client.md :307:
Failing to pass precisely either `username` and `password` *or* `bearer` will
croservices/cro
…/cro-http-client.md :316:
password => $password,
croservices/cro
…/cro-uri.md :34:
## password
croservices/cro
…/cro-uri.md :36:
Method retrieves value of `password` part of Uri. In case if name was
croservices/cro
…/app.js :36656:
password: true,
cspencer/perl6-posix
…/README.md :19:
* getpwnam(Str $username) - Returns an anonymous class containing the broken-out fields of the record in the password database (e.g., th…
cspencer/perl6-posix
…/README.md :21:
* getgrnam(Str $group) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group name. The class has the following accessor methods: name, password, gid, and members.
cspencer/perl6-posix
…/README.md :23:
* getgrgid(gid_t $gid) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group id. The class has the following accessor methods: name, password, gid, and members.
cspencer/perl6-posix
…/POSIX.pm6 :11:
has Str $.password;
cspencer/perl6-posix
…/POSIX.pm6 :21:
has Str $.password;
cspencer/perl6-posix
…/POSIX.pm6 :36:
has Str $.password;
cspencer/perl6-posix
…/09-getpwnam.t :18:
ok($pwnam.password.isa(Str), ".password isa Str");
cspencer/perl6-posix
…/11-getgrnam.t :15:
ok($group.password.isa(Str), ".password isa Str");
fayland/perl6-WebService-GitHub
…/README.md :39:
* `auth_login` & `auth_password`
fayland/perl6-WebService-GitHub
…/README.md :123:
auth_password => 'password'
fayland/perl6-WebService-GitHub
…/create_access_token.pl :9:
auth_password => %*ENV<GITHUB_PASS>
fayland/perl6-WebService-GitHub
…/Role.pm :24:
has $.auth_password;
fayland/perl6-WebService-GitHub
…/Role.pm :80:
if $.auth_login.defined && $.auth_password.defined {
fayland/perl6-WebService-GitHub
…/Role.pm :82:
Authorization => "Basic " ~ MIME::Base64.encode-str("{$.auth_login}:{$.auth_password}")
finanalyst/p6-inform
…/README.md :85:
An entry widget can mask input, as in password requests, by adding _pw or -pw onto the
finanalyst/p6-inform
…/README.md :88:
my $login = inform('Please supply your username and password',
finanalyst/p6-inform
…/README.md :92:
if $login.response eq 'OK' { say "user name is \<{$login.data<un>}> and password is \<{$login.data<pw_pw>}>" };
finanalyst/p6-inform
…/example.p6 :77:
An entry widget can mask input, as in password requests, by adding _pw or -pw onto the
finanalyst/p6-inform
…/example.p6 :80:
my $login = inform('Please supply your username and password',
finanalyst/p6-inform
…/example.p6 :84:
if $login.response eq 'OK' { say "user name is \<{$login.data<un>}> and password is \<{$login.data<pw_pw>}>" };
finanalyst/p6-inform
…/Informative.pm6 :90:
# treat passwords differently
gabrielash/perl6-zmq
…/SocketOptions.pm :46:
, plain-password => %(code => ZMQ_PLAIN_PASSWORD, get => True, set => True, type => Str, size => 255)
gfldex/perl6-meta6-bin
…/README.md :101:
instead of a password.
gfldex/perl6-pod-to-bigpage
…/html.xhtml :10054:
[passwords]
gfldex/perl6-pod-to-bigpage
…/html.xhtml :10055:
jack=password1
gfldex/perl6-pod-to-bigpage
…/html.xhtml :10074:
# ("passwords" =&gt; {"jack" =&gt; "password1", "joy" =&gt; "muchmoresecure123"},
gfldex/perl6-pod-to-bigpage
…/html.xhtml :10361:
[passwords]
gfldex/perl6-pod-to-bigpage
…/html.xhtml :10362:
jack = password1
gfldex/perl6-typesafe-xhtml-writer
…/xhtml1-strict.xsd :1672:
<xs:enumeration value="password"/>
gfldex/perl6-xhtml-writer
…/xhtml1-strict.xsd :1672:
<xs:enumeration value="password"/>
goneri/p6-Email-Notmuch
…/LICENSE :340:
source code form), and must require no special password or key for
jnthn/p6-docker-file
…/parse-complex.t :38:
# Setup a password
jnthn/p6-http-hpack
…/README.md :21:
name => 'password',
jnthn/p6-http-hpack
…/examples.t :67:
[ header('password', 'secret', HTTP::HPACK::Indexing::NeverIndexed) ],
jnthn/p6-http-hpack
…/examples.t :68:
'decode password: secret';
jnthn/p6-http-hpack
…/examples.t :70:
[ header('password', 'secret', HTTP::HPACK::Indexing::NeverIndexed) ]),
jnthn/p6-http-hpack
…/examples.t :73:
'encode password: secret (never indexed)';
jnthn/p6-ssh-libssh
…/README.md :8:
private key; you can also provide a private key file or a password)
jnthn/p6-ssh-libssh
…/forward.p6 :10:
Int :$port = 22, Str :$password, Str :$private-key-file) {
jnthn/p6-ssh-libssh
…/forward.p6 :11:
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$password);
jnthn/p6-ssh-libssh
…/reverse-forward.p6 :11:
Int :$port = 22, Str :$password, Str :$private-key-file) {
jnthn/p6-ssh-libssh
…/reverse-forward.p6 :12:
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$password);
jnthn/p6-ssh-libssh
…/run-command.p6 :3:
sub MAIN(Str $host, Str $user, Int :$port = 22, Str :$password, Str :$private-key-file, *@command) {
jnthn/p6-ssh-libssh
…/run-command.p6 :4:
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$password);
jnthn/p6-ssh-libssh
…/scp-download.p6 :3:
sub MAIN($host, $user, $remote, $local, Int :$port, Str :$password) {
jnthn/p6-ssh-libssh
…/scp-download.p6 :4:
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$password);
jnthn/p6-ssh-libssh
…/scp-upload.p6 :3:
sub MAIN($host, $user, $local, $remote, Int :$port, Str :$password) {
jnthn/p6-ssh-libssh
…/scp-upload.p6 :4:
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$password);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :191:
has Str $!password;
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :201:
Str :$!private-key-file = Str, Str :$!password = Str,
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :420:
if $method eq "key" and defined $!password {
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :421:
# Public Key authentication failed. We'll try using a password now.
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :422:
self!connect-auth-user-password($v);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :430:
method !connect-auth-user-password($v) {
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :432:
my &auth-function = { ssh_userauth_password($s, Str, $!password) }
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :435:
self!process-auth-outcome($auth-outcome, $v, :method<password>);
jnthn/p6-ssh-libssh
…/LibSSH.pm6 :442:
self!process-auth-outcome($auth-outcome, $v, :method<password>);
jnthn/p6-ssh-libssh
…/Raw.pm6 :115:
sub ssh_userauth_password(SSHSession, Str, Str) returns int32
jonathanstowe/Audio-Icecast
…/Documentation.md :43:
method new(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$password = 'hackme')
jonathanstowe/Audio-Icecast
…/Documentation.md :45:
The constructor for the class supplies defaults that will work with a stock configuration on the local machine, this probably isn't what you want, be…
jonathanstowe/Audio-Icecast
…/list-clients :7:
sub MAIN(Str :$mount!, Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'admin', Str :$password = 'hackme') {
jonathanstowe/Audio-Icecast
…/list-clients :8:
my $ai = Audio::Icecast.new(:$host, :$port, :$user, :$password);
jonathanstowe/Audio-Icecast
…/update-metadata :7:
sub MAIN(Str :$mount!, Str :$title!, Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'admin', Str :$password = 'hackme') {
jonathanstowe/Audio-Icecast
…/update-metadata :8:
my $ai = Audio::Icecast.new(:$host, :$port, :$user, :$password);
jonathanstowe/Audio-Icecast
…/Icecast.pm :57:
method new(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$password = 'hackme')
jonathanstowe/Audio-Icecast
…/Icecast.pm :61:
want, because at the very least you changed the password right? If you
jonathanstowe/Audio-Icecast
…/Icecast.pm :386:
submethod BUILD(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$password = 'hackme') {
jonathanstowe/Audio-Icecast
…/Icecast.pm :388:
$!ua.auth($user, $password);
jonathanstowe/Audio-Icecast
…/025-status-online.t :12:
my $password = %*ENV<ICECAST_TEST_PASS> // 'hackme';
jonathanstowe/Audio-Icecast
…/025-status-online.t :17:
lives-ok { $obj = Audio::Icecast.new(:$host, :$port, :$user, :$password) }, "get object with full credentials";
jonathanstowe/Audio-Libshout
…/Documentation.md :11:
my $shout = Audio::Libshout.new(password => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3);
jonathanstowe/Audio-Libshout
…/Documentation.md :60:
If the stream is not already connected this will open the stream so that data can be sent. The `host`, `port`, `user` and `password` and ot…
jonathanstowe/Audio-Libshout
…/Documentation.md :157:
password
jonathanstowe/Audio-Libshout
…/Documentation.md :160:
The password that is used to authenticate with the server. There is no default and this must be provided before connecting.
jonathanstowe/Audio-Libshout
…/README.md :60:
* SHOUT_TEST_PASS - the password to authenticate with. The default is 'hackme' but you changed that right?
jonathanstowe/Audio-Libshout
…/streamfile :7:
multi sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$password!, Str :$mount = '/stream', Str :$file!, *%extra) {
jonathanstowe/Audio-Libshout
…/streamfile :25:
my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$password, :$mount, :$format,
jonathanstowe/Audio-Libshout
…/streamfile-encode :10:
multi sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$password!, Int :$bitrate = 128, Int :$quality = 5, Int :$bufsize = 512, Str :$mount = '/stream', Str :$file!, *%extra) {
jonathanstowe/Audio-Libshout
…/streamfile-encode :30:
my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$password, :$mount, :$format,
jonathanstowe/Audio-Libshout
…/synopsis :3:
my $shout = Audio::Libshout.new(password => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3);
jonathanstowe/Audio-Libshout
…/Libshout.pm :15:
my $shout = Audio::Libshout.new(password => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3);
jonathanstowe/Audio-Libshout
…/Libshout.pm :81:
that data can be sent. The C<host>, C<port>, C<user> and C<password>
jonathanstowe/Audio-Libshout
…/Libshout.pm :228:
=head2 password
jonathanstowe/Audio-Libshout
…/Libshout.pm :230:
The password that is used to authenticate with the server. There is no default and this
jonathanstowe/Audio-Libshout
…/Libshout.pm :476:
sub shout_set_password(Shout, Str) returns int32 is native('shout',v3) { * }
jonathanstowe/Audio-Libshout
…/Libshout.pm :477:
sub shout_get_password(Shout) returns Str is native('shout',v3) { * }
jonathanstowe/Audio-Libshout
…/Libshout.pm :479:
method password() returns Str is rw is accessor-facade(&shout_get_password, &shout_set_password, &manage, &check) { }
jonathanstowe/Audio-Libshout
…/Libshout.pm :584:
has Shout $!shout handles <host port user password protocol format mount dumpfile agent public name url genre description>;
jonathanstowe/Audio-Libshout
…/010-parameters.t :14:
{ name => "password", value => 'hackme' },
jonathanstowe/Audio-Libshout
…/020-open.t :35:
throws-like { $obj.open }, X::ShoutError, "open without password should fail";
jonathanstowe/Audio-Libshout
…/020-open.t :37:
$obj.password = 'S0me8oGusP455w0RD!%';
jonathanstowe/Audio-Libshout
…/020-open.t :39:
throws-like { $obj.open }, rx/"The server refused login, probably because authentication failed"/, "open with wrong password should fail";
jonathanstowe/Audio-Libshout
…/020-open.t :41:
$obj.password = $pass;
jonathanstowe/Audio-Libshout
…/020-open.t :43:
lives-ok { $obj.open }, "open with good password";
jonathanstowe/Audio-Libshout
…/020-open.t :55:
lives-ok { $obj = Audio::Libshout.new(user => $user, password => $pass, host => $host, port => $port, mount => $mount) }, "new to test sending " ~ $test<file>;
jonathanstowe/Audio-Libshout
…/020-open.t :81:
lives-ok { $obj = Audio::Libshout.new(user => $user, password => $pass, host => $host, port => $port, mount => $mount) }, "new to test sending " ~ $test<file>;
jonathanstowe/Audio-Liquidsoap
…/README.md :22:
output.icecast(%mp3,host="localhost",port=8000,password="hackme",mount="radio", radio)
jonathanstowe/Audio-Liquidsoap
…/request.liq :11:
output.icecast(%mp3, host="localhost",port=8000,password="hackme",mount="radio", radio)
jonathanstowe/Audio-Liquidsoap
…/simple.liq :15:
output.icecast(%mp3, host="localhost",port=8000,password="hackme",mount="radio", radio)
jonathanstowe/Crypt-Libcrypt
…/META6.json :21:
"password"
jonathanstowe/Crypt-Libcrypt
…/README.md :15:
passwords on a Unix system.
jonathanstowe/Crypt-Libcrypt
…/README.md :17:
Because this is intended primarily for the encryption of passwords and is
jonathanstowe/Crypt-Libcrypt
…/README.md :21:
In order to check whether a password entered by a user is correct it should
jonathanstowe/Crypt-Libcrypt
…/README.md :22:
be encrypted using the stored encrypted password as the "salt" - the result
jonathanstowe/Crypt-Libcrypt
…/README.md :23:
will be the same as the stored crypt text if the password is the same.
jonathanstowe/Crypt-Libcrypt
…/Libcrypt.pm :19:
my $crypted = crypt($password, $salt );
jonathanstowe/Crypt-Libcrypt
…/Libcrypt.pm :35:
used to encrypt passwords on a Unix system.
jonathanstowe/Crypt-Libcrypt
…/Libcrypt.pm :37:
Because this is intended primarily for the encryption of passwords and
jonathanstowe/Crypt-Libcrypt
…/Libcrypt.pm :41:
In order to check whether a password entered by a user is correct it
jonathanstowe/Crypt-Libcrypt
…/Libcrypt.pm :42:
should be encrypted using the stored encrypted password as the "salt"
jonathanstowe/Crypt-Libcrypt
…/Libcrypt.pm :43:
- the result will be the same as the stored crypt text if the password
jonathanstowe/Lumberjack-Application
…/Proxy.pm :34:
method new(:$url!, :$username, :$password)
jonathanstowe/Lumberjack-Application
…/Proxy.pm :40:
Additionally if the C<username> and C<password> parameters
jonathanstowe/Lumberjack-Application
…/Proxy.pm :60:
has Str $.password;
jonathanstowe/Lumberjack-Application
…/Proxy.pm :68:
if $!username.defined && $!password.defined {
jonathanstowe/Lumberjack-Application
…/Proxy.pm :69:
$!ua.auth($!username, $!password);
jonathanstowe/META6
…/projects.json :4047:
"description" : "Easy bcrypt password hashing",
jonathanstowe/META6
…/projects.json :5340:
"password"
jonathanstowe/META6
…/projects.json :11343:
"description" : "Easy Argon2i password hashing",
jonathanstowe/Monitor-Monit
…/README.md :48:
* ```MONIT_TEST_PASS``` - the password to authenticate (default ```monit```)
jonathanstowe/Monitor-Monit
…/Monit.pm :36:
method new(Str :$host = 'localhost', Int :$port = 2812, Str :$username = 'admin', Str :$password = 'monit', Bool :$secure = False);
jonathanstowe/Monitor-Monit
…/Monit.pm :300:
has Str $.password = 'monit';
jonathanstowe/Monitor-Monit
…/Monit.pm :313:
has Str $.password = 'monit';
jonathanstowe/Monitor-Monit
…/Monit.pm :362:
$!ua = UserAgent.new(:$!host, :$!port, :$!secure, :$!username, :$!password);
jonathanstowe/Monitor-Monit
…/Monit.pm :363:
$!ua.auth($!username, $!password);
jonathanstowe/Monitor-Monit
…/040-live.t :12:
my $password = %*ENV<MONIT_TEST_PASS> // 'monit';
jonathanstowe/Monitor-Monit
…/040-live.t :17:
lives-ok { $mon = Monitor::Monit.new(:$host, :$port, :$username, :$password) }, "new with credentials";
jonathanstowe/Pg-Notify
…/README.md :51:
* $PG_NOTIFY_PASS - the password to be used, (otherwise no password will be used.)
jonathanstowe/Pg-Notify
…/010-notify.t :19:
%args<password> = $pw;
jonathanstowe/Unix-Groups
…/Groups.pm :79:
=head2 password
jonathanstowe/Unix-Groups
…/Groups.pm :81:
The password for the group if set, most modern systems place this in a
jonathanstowe/Unix-Groups
…/Groups.pm :97:
has Str $.password;
jonathanstowe/Unix-Groups
…/Groups.pm :104:
$!password = $pass;
jonathanstowe/WebService-Soundcloud
…/README.md :54:
my $sc = WebService::Soundcloud.new(:$client-id,:$client-secret,:$username,:$password);
jonathanstowe/WebService-Soundcloud
…/Soundcloud.pm :55:
my $sc = WebService::Soundcloud.new(:$client-id,:$client-secret,:$username,:$password);
jonathanstowe/WebService-Soundcloud
…/Soundcloud.pm :84:
method new(Str :$!client-id!, Str :$!client-secret!, Str :$!redirect-uri, Str :$!scope, Str :$!username, Str :$!password, HTTP::UserAgent :$!ua )
jonathanstowe/WebService-Soundcloud
…/Soundcloud.pm :89:
application with Soundcloud. If C<username> and C<password> are provided then
jonathanstowe/WebService-Soundcloud
…/Soundcloud.pm :326:
has Str $.password is rw;
jonathanstowe/WebService-Soundcloud
…/Soundcloud.pm :332:
submethod BUILD(Str :$!client-id!, Str :$!client-secret!, Str :$!redirect-uri, Str :$!scope, Str :$!username, Str :$!password, HTTP::UserAgent :$!ua, *%opts) {
jonathanstowe/WebService-Soundcloud
…/Soundcloud.pm :382:
if $!username && $!password {
jonathanstowe/WebService-Soundcloud
…/Soundcloud.pm :384:
%params<password> = $!password;
jonathanstowe/WebService-Soundcloud
…/Soundcloud.pm :385:
%params<grant_type> = 'password';
jonathanstowe/WebService-Soundcloud
…/080-credentials.t :12:
my $password = %*ENV{'SC_PASSWORD'};
jonathanstowe/WebService-Soundcloud
…/080-credentials.t :14:
if (defined $username && defined $password)
jonathanstowe/WebService-Soundcloud
…/080-credentials.t :33:
password => $password
jonathanstowe/p6-unix-privileges
…/README.md :30:
# once in the chroot access to the system password file is lost
kalkin/License-Software
…/AGPLv3.pm6 :333:
source code form), and must require no special password or key for
kalkin/License-Software
…/GPLv3.pm6 :349:
source code form), and must require no special password or key for
kalkin/Net-XMPP
…/XMPP.pm6 :19:
method new(:$jid!, :$login, :$password, :$server, :$port = 5222, :$socket) {
kalkin/Net-XMPP
…/XMPP.pm6 :20:
self.bless(:$jid, :$login, :$password, :$server, :$port, :$socket);
kalkin/Net-XMPP
…/XMPP.pm6 :54:
submethod BUILD(:$!jid, :$login is copy, :$password, :$server, :$port, :$!socket){
kalkin/Net-XMPP
…/XMPP.pm6 :72:
self!do-negotiation($login, $password);
kalkin/Net-XMPP
…/XMPP.pm6 :75:
method !auth($login, $password) {
kalkin/Net-XMPP
…/XMPP.pm6 :86:
my $encoded = MIME::Base64.encode-str("\0$login\0$password");
kalkin/Net-XMPP
…/XMPP.pm6 :121:
method !do-negotiation($login, $password) {
kalkin/Net-XMPP
…/XMPP.pm6 :122:
self!auth($login, $password);
matiaslina/perl6-matrix-client
…/bot.p6 :17:
submethod BUILD(:$username!, :$password!, :$home-server!, :@room-ids!, :$on-event!) {
matiaslina/perl6-matrix-client
…/bot.p6 :23:
$!client.login($!username, $password);
matiaslina/perl6-matrix-client
…/bot.p6 :67:
sub MAIN(Str:D $username, Str:D $password, :$home-server = "https://matrix.deprecated.org") {
matiaslina/perl6-matrix-client
…/bot.p6 :71:
password => $password,
matiaslina/perl6-matrix-client
…/Client.pm6 :41:
type => "m.login.password",
matiaslina/perl6-matrix-client
…/Client.pm6 :43:
password => $pass
matiaslina/perl6-matrix-client
…/Client.pm6 :74:
method register($username, $password, Bool :$bind-email? = False) {
matiaslina/perl6-matrix-client
…/Client.pm6 :76:
username => $username, password => $password,
melezhik/remote-file
…/README.md :34:
## password
melezhik/remote-file
…/README.md :36:
Sets password for resources with access restricted by http basic authentication. Optional,
melezhik/remote-file
…/RemoteFile.pm6 :25:
$cmd ~= ':' ~ %args<password> if %args<password>.defined;
melezhik/sparky
…/README.md :247:
pass: $dbpassword
melezhik/sparky
…/README.md :265:
## Creating database user, password and schema
melezhik/sparky
…/sparky-runner.pl6 :222:
password => %conf<database><pass>,
melezhik/sparky
…/sparky-web.pl6 :98:
password => %conf<database><pass>,
melezhik/sparky
…/db-init.pl6 :33:
password => %conf<database><pass>,
melezhik/sparrowdo-chef-manager
…/README.md :34:
password => '123456',
melezhik/sparrowdo-chef-manager
…/README.md :56:
## password
melezhik/sparrowdo-chef-manager
…/README.md :58:
A chef user password.
melezhik/sparrowdo-chef-manager
…/Manager.pm6 :17:
for 'user-id', 'name', 'email', 'password' -> $p {
melezhik/sparrowdo-chef-manager
…/Manager.pm6 :27:
@params.push: %args<password>;
melezhik/sparrowdo-chef-manager
…/sparrowfile :12:
password => '123456',
melezhik/sparrowdo
…/README.md :168:
* ssh passwordless access on the remote host
melezhik/sparrowdo
…/README.md :169:
* sudo (passwordless?) rights on remote host
moritz/Grammar-ErrorReporting
…/COPYING :343:
source code form), and must require no special password or key for
nkh/P6-Data-Dump-Tree
…/README.md :737:
1 = [passwords]\n jack=password1\n (+74)[0..113]
nkh/P6-Data-Dump-Tree
…/README.md :738:
<section> [passwords]\n jack=password1\n (+29)[0..68]
nkh/P6-Data-Dump-Tree
…/README.md :739:
<header> [passwords]\n[0..15]
nkh/P6-Data-Dump-Tree
…/README.md :740:
<0> passwords[5..13]
nkh/P6-Data-Dump-Tree
…/README.md :741:
<kvpair> jack=password1\n[16..38]
nkh/P6-Data-Dump-Tree
…/README.md :744:
<identifier> password1[29..37]
nkh/P6-Data-Dump-Tree
…/README.md :745:
<value> password1[29..37]
nkh/P6-Data-Dump-Tree
…/dhtml.pl :19:
[passwords]
nkh/P6-Data-Dump-Tree
…/dhtml.pl :20:
jack=password1
nkh/P6-Data-Dump-Tree
…/match.pl :9:
[passwords]
nkh/P6-Data-Dump-Tree
…/match.pl :10:
jack=password1
nkh/P6-Data-Dump-Tree
…/named_captures.pl :30:
[passwords]
nkh/P6-Data-Dump-Tree
…/named_captures.pl :31:
jack=password1
nkh/P6-Data-Dump-Tree
…/Tree.pod :786:
1 = [passwords]\n jack=password1\n (+74)[0..113]
nkh/P6-Data-Dump-Tree
…/Tree.pod :787:
<section> [passwords]\n jack=password1\n (+29)[0..68]
nkh/P6-Data-Dump-Tree
…/Tree.pod :788:
<header> [passwords]\n[0..15]
nkh/P6-Data-Dump-Tree
…/Tree.pod :789:
<0> passwords[5..13]
nkh/P6-Data-Dump-Tree
…/Tree.pod :790:
<kvpair> jack=password1\n[16..38]
nkh/P6-Data-Dump-Tree
…/Tree.pod :793:
<identifier> password1[29..37]
nkh/P6-Data-Dump-Tree
…/Tree.pod :794:
<value> password1[29..37]
nkh/P6-Data-Dump-Tree
…/13_named_captures.t :19:
[passwords]
nkh/P6-Data-Dump-Tree
…/13_named_captures.t :20:
jack=password1
nobodyinperson/perl6-fortran-grammar
…/LICENSE :340:
source code form), and must require no special password or key for
p6-pdf/PDF-API6
…/README.md :220:
PDF::API6.open( "enc.pdf", :password<shh1> );
p6-pdf/PDF-API6
…/pdf-burst.p6 :18:
Str :$password = '', #
p6-pdf/PDF-API6
…/pdf-burst.p6 :28:
my $doc = PDF::API6.open( $input, :$password);
p6-pdf/PDF-API6
…/pdf-burst.p6 :64:
--pasword=str # provide a password for an encrypted PDF
p6-pdf/PDF-API6
…/pdf-revert.p6 :7:
Str :$password = '', #
p6-pdf/PDF-API6
…/pdf-revert.p6 :16:
my PDF::Reader $reader = PDF::API6.open( $input, :$password).reader;
p6-pdf/PDF-p6
…/README.md :320:
- `pdf-rewriter.pl [--repair] [--rebuild] [--[un]compress] [--password=Xxx] <pdf-or-json-file-in> [<pdf-or-json-file-out>]`
p6-pdf/PDF-p6
…/README.md :357:
To open an encrypted PDF document, specify either the user or owner password: `PDF.open( "enc.pdf", :password<ssh!>)`
p6-pdf/PDF-p6
…/README.md :362:
Note that it's quite common to leave the user-password blank. This indicates that the document is readable by anyone, but may have restrictions on update, printing or copying of the PDF.
p6-pdf/PDF-p6
…/README.md :364:
An encrypted PDF can be saved as JSON. It will remain encrypted and passwords may be required, to reopen it.
p6-pdf/PDF-p6
…/pdf-rewriter.pl :10:
Str :$password = ''; #
p6-pdf/PDF-p6
…/pdf-rewriter.pl :29:
$reader.open( $file-in, :$repair, :$password );
p6-pdf/PDF-p6
…/Encrypt.pm :15:
#
p6-pdf/PDF-p6
…/Encrypt.pm :49:
has Str $.O is entry; #
p6-pdf/PDF-p6
…/Encrypt.pm :51:
has Str $.U is entry; #
p6-pdf/PDF-p6
…/Crypt.pm :14:
has uint8 @!O; #
p6-pdf/PDF-p6
…/Crypt.pm :17:
has uint8 @!U; #
p6-pdf/PDF-p6
…/Crypt.pm :281:
or die "unable to decrypt this PDF with the given password";
p6-pdf/PDF-p6
…/Reader.pm :106:
method !setup-crypt( Str :$password = '') {
p6-pdf/PDF-p6
…/Reader.pm :111:
$!crypt.authenticate( $password );
p6-pdf/PDF-p6
…/io-crypt.t :93:
dies-ok { $crypt.authenticate( 'blah' ) }, "$case - bad password" unless $case eq 'Identity';
p6-pdf/PDF-p6
…/io-crypt.t :94:
lives-ok { $crypt.authenticate( $user-pass ) }, "$case - user password";
p6-pdf/PDF-p6
…/io-crypt.t :96:
lives-ok { $crypt.authenticate( $owner-pass, :owner); }, "$case - owner password";
p6-pdf/PDF-p6
…/pdf-crypt-aes.t :20:
dies-ok { $pdf = PDF.open: "t/pdf-crypt-aes.pdf", :password<dunno> }, "open encrypted with incorrect password - dies";
p6-pdf/PDF-p6
…/pdf-crypt-aes.t :22:
lives-ok { $pdf = PDF.open("t/pdf-crypt-aes.pdf", :password($user-pass)) }, 'open with user password - lives';
p6-pdf/PDF-p6
…/pdf-crypt-aes.t :23:
is $pdf.crypt.is-owner, False, 'open with user password - not is-owner';
p6-pdf/PDF-p6
…/pdf-crypt-aes.t :24:
is $pdf<Info><Author>, $expected-author, 'open with user password - .Info.Author';
p6-pdf/PDF-p6
…/pdf-crypt-aes.t :25:
is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with user password - contents';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :21:
dies-ok { $pdf = PDF.open: "t/encrypt.pdf", :password<dunno> }, "open encrypted with incorrect password - dies";
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :23:
lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.pdf", :password($user-pass)) }, 'open with user password - lives';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :24:
is $pdf.crypt.is-owner, False, 'open with user password - not is-owner';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :25:
is $pdf<Info><Author>, $expected-author, 'open with user password - .Info.Author';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :26:
is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with user password - contents';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :28:
lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.pdf", :password($owner-pass)) }, 'open with owner password - lives';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :29:
is $pdf.crypt.is-owner, True, 'open with owner password - is-owner';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :30:
is $pdf<Info><Author>, $expected-author, 'open with owner password - .Info.Author';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :31:
is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with owner password - contents';
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :33:
dies-ok { $pdf = PDF.open: "t/pdf-crypt-rc4.json", :password<dunno> }, "open encrypted json with incorrect password - dies";
p6-pdf/PDF-p6
…/pdf-crypt-rc4.t :35:
lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.json", :password($user-pass)) }, 'open json user password - lives';
perl6-community-modules/System-Passwd
…/Passwd.pm6 :23:
my $password_file = open '/etc/passwd', :r;
perl6-community-modules/System-Passwd
…/Passwd.pm6 :25:
for $password_file.lines
perl6-community-modules/System-Passwd
…/User.pm6 :4:
has $.password;
perl6-community-modules/System-Passwd
…/User.pm6 :15:
my $password = @line[1];
perl6-community-modules/System-Passwd
…/User.pm6 :22:
return self.bless(:$username, :$password, :$uid, :$gid, :$fullname, :$home_directory, :$login_shell);
perl6-community-modules/System-Passwd
…/User.t :17:
is $user.password, @line[2], "password is {@line[2]}";
perl6-community-modules/uri
…/URI.pm :55:
# the rfc refers to username:password as deprecated
perl6-posix/README.md * getpwnam(Str $username) - Returns an anonymous class containing the broken-out fields of the record in the password database (e.g., th…
perl6-posix/README.md * getgrnam(Str $group) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group name. The class has the following accessor methods: name, password, gid, and members.
perl6-posix/README.md * getgrgid(gid_t $gid) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group id. The class has the following accessor methods: name, password, gid, and members.
perl6/DBIish
…/README.pod :74:
C<database>, C<user> and C<password>.
perl6/DBIish
…/README.pod :81:
and using the function C<get-secret> to obtain you password, you can:
perl6/DBIish
…/README.pod :83:
my $dbh = DBIish.connect('Pg', :database<hierarchy>, :$user, password => get-secret());
perl6/DBIish
…/README.pod :135:
:database<blerg>, :user<myuser>, :$password);
perl6/DBIish
…/README.pod :138:
C<host>, C<hostaddr>, C<port>, C<database> (or its alias C<dbname>), C<user>, C<password>,
perl6/DBIish
…/README.pod :213:
:database<blerg>, :user<myuser>, :$password);
perl6/DBIish
…/README.pod :216:
:database<blerg>, :user<myuser>, :$password);
perl6/DBIish
…/README.pod :222:
my $dbh = DBIish.connect('Oracle', database => 'XE', :user<sysadm>, :password('secret'));
perl6/DBIish
…/mysql.p6 :13:
my $dbh = DBIish.connect("mysql", :database<test>, :user<root>, :password<sa>, :RaiseError);
perl6/DBIish
…/pg.p6 :21:
my $dbh = DBIish.connect("Pg", :database<postgres>, :user<postgres>, :password<sa>, :RaiseError);
perl6/DBIish
…/pg_arrays.p6 :25:
:password<sa>, :RaiseError
perl6/DBIish
…/Oracle.pm6 :83:
method connect(:database(:$dbname), :user(:$username), :$password, *%params) {
perl6/DBIish
…/Oracle.pm6 :100:
:$password,
perl6/DBIish
…/Native.pm6 :335:
utf8 $password,
perl6/DBIish
…/Native.pm6 :342:
method Logon(OCIError :$errh, Int :$mode, :$dbname, :$username, :$password) {
perl6/DBIish
…/Native.pm6 :344:
OCILogon2(self, $errh, $svch,
perl6/DBIish
…/Pg.pm6 :70:
host hostaddr port dbname user password connect-timeout
perl6/DBIish
…/mysql.pm6 :23:
perl6/DBIish
…/Native.pm6 :185:
Str $host, Str $user, Str $password,
perl6/DBIish
…/10-mysql.t :47:
my $test_password = 'testpass';
perl6/DBIish
…/10-mysql.t :76:
#EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :89:
DBIish.connect($mdriver, :user($test_user), :password($test_password),
perl6/DBIish
…/10-mysql.t :110:
$dbh = DBIish.connect( $mdriver, :user($test_user), :password($test_password),
perl6/DBIish
…/10-mysql.t :179:
# $dbh = DBIish.connect( $test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :255:
$dbh = DBIish.connect( $mdriver, :user($test_user), :password($test_password),
perl6/DBIish
…/10-mysql.t :542:
#EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :636:
#EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :914:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :916:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :972:
use vars qw($test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :978:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1074:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :1079:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1127:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :1132:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1220:
use vars qw($test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :1224:
EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1262:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :1269:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1337:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :1340:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1408:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :1413:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1463:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :1468:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1555:
use vars qw($table $test_dsn $test_user $test_password $mdriver);
perl6/DBIish
…/10-mysql.t :1563:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1616:
use vars qw($test_dsn $test_user $test_password $table);
perl6/DBIish
…/10-mysql.t :1619:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1691:
use vars qw($got_warning $test_dsn $test_user $test_password $table);
perl6/DBIish
…/10-mysql.t :1694:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1779:
ok ($dbh = DBI->connect($test_dsn, $test_user, $test_password));
perl6/DBIish
…/10-mysql.t :1811:
ok ($dbh = DBI->connect($test_dsn, $test_user, $test_password));
perl6/DBIish
…/10-mysql.t :1859:
use vars qw($test_dsn $test_user $test_password $table);
perl6/DBIish
…/10-mysql.t :1862:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :1945:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :1951:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2041:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2063:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2103:
EVAL {$dbh2 = DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2248:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2256:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2329:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2339:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2392:
my $dbh2 = DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2450:
use vars qw($test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2453:
EVAL {$dbh= DBI->connect( $test_dsn, $test_user, $test_password);};
perl6/DBIish
…/10-mysql.t :2482:
$dbh = DBI->connect( $test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2495:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2505:
EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2556:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2559:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2629:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2632:
EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2652:
ok ($dbh = DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2758:
use vars qw($table $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2763:
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password,
perl6/DBIish
…/10-mysql.t :2794:
use vars qw($table $mdriver $dbdriver $childPid $test_dsn $test_user $test_password);
perl6/DBIish
…/10-mysql.t :2831:
$::test_password = $::test_password
perl6/DBIish
…/10-mysql.t :3145:
'testpassword' => '',
perl6/DBIish
…/10-mysql.t :3152:
$::test_password = $opt->{'testpassword'};
perl6/DBIish
…/25-mysql-common.t :10:
:password<testpass>,
perl6/DBIish
…/25-mysql-common.t :21:
password 'testpass', all this can be create with:
perl6/DBIish
…/26-mysql-blob.t :7:
my %con-parms = :database<dbdishtest>, :user<testuser>, :password<testpass>;
perl6/DBIish
…/27-mysql-datetime.t :7:
my %con-parms = :database<dbdishtest>, :user<testuser>, :password<testpass>;
perl6/DBIish
…/45-oracle-common.t :10:
password => 'Testpass',
perl6/DBIish
…/46-oracle-blob.t :8:
%con-parms = :database<XE>, :username<TESTUSER>, :password<Testpass>;
perl6/DBIish
…/47-oracle-datetime.t :7:
my %con-parms = :database<XE>, :username<TESTUSER>, :password<Testpass>;
perl6/Perl6-MIME-Base64
…/basic.t :37:
is $mime.encode_base64("username:thisisnotmypassword"), 'dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==', 'Encoding "username:thisisnotmypassword"';
perl6/Perl6-MIME-Base64
…/basic.t :38:
is $mime.decode_base64("dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA=="), 'username:thisisnotmypassword', 'Decoding "username:thisisnotmypassword"';
perl6/doc
…/nativecall.pod6 :574:
UPDATE mysql.user SET password=password('sa') WHERE user = 'root';
perl6/doc
…/regexes.pod6 :1033:
[passwords]
perl6/doc
…/regexes.pod6 :1034:
jack=password1
perl6/doc
…/regexes.pod6 :1053:
# OUTPUT: «("passwords" => {"jack" => "password1", "joy" => "muchmoresecure123"},␤
perl6/doc
…/regexes.pod6 :1601:
[passwords]
perl6/doc
…/regexes.pod6 :1602:
jack = password1
perl6/doc
…/jquery-3.1.1.min.js :2:
!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)thr…
perl6/doc
…/jquery-3.1.1.min.js :4:
void 0!==c?null===c?void r.removeAttr(a,b):e&&"set"in e&&void 0!==(d=e.set(a,c,b))?d:(a.setAttribute(b,c+""),c):e&&"get"in e&&null!==(d=e.get(a,b))?d…
perl6/perl6-lwp-simple
…/Simple.pm :69:
my $pass = $auth<password>;
perl6/perl6-lwp-simple
…/Simple.pm :362:
password => uri_unescape($user_info.split(':')[1]
perl6/perl6-lwp-simple
…/basic-auth.t :27:
is(@url[4]<password>, 'Camelia', 'Basic auth info extracted correctly: pass');
ppentchev/perl6-Test-Deeply-Relaxed
…/02-basic-data.t :22:
is-deeply-relaxed {:a(42), :password('mellon')}, {password => 'mellon', a => 42}, 'non-empty hash - same';
ppentchev/perl6-Test-Deeply-Relaxed
…/02-basic-data.t :23:
isnt-deeply-relaxed {}, {:password('mellon')}, 'empty and non-empty hash - different';
retupmoca/P6-Net-AMQP
…/AMQP.pm6 :12:
has $.password = 'guest';
retupmoca/P6-Net-AMQP
…/AMQP.pm6 :61:
"\0"~$.login~"\0"~$.password,
retupmoca/P6-Net-POP3
…/README.md :14:
$pop.apop-login("username", "password");
retupmoca/P6-Net-POP3
…/README.md :17:
$pop.pass("password");
retupmoca/P6-Net-POP3
…/README.md :28:
$pop.auth("username", "password"); # tries apop, then falls back to user/pass
retupmoca/P6-Net-POP3
…/README.md :57:
- `auth($username, $password)`
retupmoca/P6-Net-POP3
…/Simple.pm6 :50:
method auth($username, $password) {
retupmoca/P6-Net-POP3
…/Simple.pm6 :53:
$response = $.raw.apop-login($username, $password);
retupmoca/P6-Net-POP3
…/Simple.pm6 :60:
$response = $.raw.pass($password);
retupmoca/P6-Net-SMTP
…/README.md :23:
$client.auth($username, $password);
retupmoca/P6-Net-SMTP
…/README.md :68:
- `auth($username, $password, :@methods, :@disallow, :$force)`
retupmoca/P6-Net-SMTP
…/README.md :70:
Authenticates with the SMTP server with the given $username and $password.
retupmoca/P6-Net-SMTP
…/README.md :131:
- `auth-login($username, $password)`
retupmoca/P6-Net-SMTP
…/README.md :132:
- `auth-plain($username, $password)`
retupmoca/P6-Net-SMTP
…/Raw.pm6 :80:
method auth-login($username, $password) {
retupmoca/P6-Net-SMTP
…/Raw.pm6 :84:
my $encoded = MIME::Base64.encode-str($password);
retupmoca/P6-Net-SMTP
…/Raw.pm6 :91:
method auth-plain($username, $password) {
retupmoca/P6-Net-SMTP
…/Raw.pm6 :92:
my $encoded = MIME::Base64.encode-str("$username\0$username\0$password");
retupmoca/P6-Net-SMTP
…/Raw.pm6 :96:
method auth-cram-md5($username, $password) {
retupmoca/P6-Net-SMTP
…/Raw.pm6 :104:
my $encoded = MIME::Base64.encode-str($username ~ " " ~ hmac-hex($password, $data, &md5));
retupmoca/P6-Net-SMTP
…/Simple.pm6 :106:
method auth($username, $password, :$methods is copy, :$disallow, :$force) {
retupmoca/P6-Net-SMTP
…/Simple.pm6 :122:
when "CRAM-MD5" { $response = $.smtp-raw.auth-cram-md5($username, $password); }
retupmoca/P6-Net-SMTP
…/Simple.pm6 :123:
when "PLAIN" { $response = $.smtp-raw.auth-plain($username, $password); }
retupmoca/P6-Net-SMTP
…/Simple.pm6 :124:
when "LOGIN" { $response = $.smtp-raw.auth-login($username, $password); }
retupmoca/P6-Net-SMTP
…/03-auth.t :50:
ok $client.auth('user@example.com', 'password', :methods("CRAM-MD5")), 'CRAM-MD5 auth';
salortiz/DBDish-ODBC
…/01-basic.t :8:
MySQL => { :uid<testuser>, :password<testpass> },
scmorrison/uzu
…/navigation.mustache :19:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/navigation.tt :19:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/about-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/about.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/fiji-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/fiji.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/index-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/index.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/index-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/index.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/related-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/related.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/themepartial-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/themepartial.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/about-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/about.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/fiji-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/fiji.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/index-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/index.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/index-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/index.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/related-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/related.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/themepartial-ja.html :36:
<input type="password" placeholder="Password" class="form-control">
scmorrison/uzu
…/themepartial.html :36:
<input type="password" placeholder="Password" class="form-control">
scovit/perl6-IRC-Async
…/README.md :79:
password => (Str),
scovit/perl6-IRC-Async
…/Async.pm6 :10:
has Str $.password;
scovit/perl6-IRC-Async
…/Async.pm6 :44:
push @connect-messages, $.print("PASS $!password\n") if $!password.defined;
scriptkitties/p6-mpd-client
…/Connection.pm6 :25:
sub mpd-password (
scriptkitties/p6-mpd-client
…/Connection.pm6 :26:
Str $password,
scriptkitties/p6-mpd-client
…/Connection.pm6 :30:
mpd-response-ok(mpd-send("password", $password, $socket));
sergot/http-useragent
…/UserAgent.pm6 :40:
has $.auth_password;
sergot/http-useragent
…/UserAgent.pm6 :93:
method auth(Str $login, Str $password) {
sergot/http-useragent
…/UserAgent.pm6 :95:
$!auth_password = $password;
sergot/http-useragent
…/UserAgent.pm6 :403:
$request.field(Authorization => basic-auth-token($!auth_login,$!auth_password));
sergot/http-useragent
…/UserAgent.pm6 :408:
$!auth_login.defined && $!auth_password.defined;
sergot/http-useragent
…/UserAgent.pm6 :506:
method auth(HTTP::UserAgent:, Str $login, Str $password)
sergot/http-useragent
…/UserAgent.pm6 :508:
Sets username and password needed to HTTP Auth.
sergot/http-useragent
…/085-auth.t :14:
is $ua.auth_password, 'TEST', "password got set okay";
skaji/perl6-CPAN-Uploader-Tiny
…/Tiny.pm6 :9:
has $.password;
skaji/perl6-CPAN-Uploader-Tiny
…/Tiny.pm6 :12:
submethod BUILD(:$!url, :$!user, :$!password, :$!agent) {
skaji/perl6-CPAN-Uploader-Tiny
…/Tiny.pm6 :23:
self.new(user => %config<user>, password => %config<password>);
skaji/perl6-CPAN-Uploader-Tiny
…/Tiny.pm6 :47:
%config<password> or die "missing password in $file";
skaji/perl6-CPAN-Uploader-Tiny
…/Tiny.pm6 :63:
my $url = $!url.subst('//', "//{$.user}:{$.password}@");
skinkade/p6-Crypt-Bcrypt
…/META6.json :7:
"description" : "Easy bcrypt password hashing",
skinkade/p6-Crypt-Bcrypt
…/README.md :4:
Easy `bcrypt` password hashing in Perl6.
skinkade/p6-Crypt-Bcrypt
…/README.md :14:
> my $hash = bcrypt-hash("password")
skinkade/p6-Crypt-Bcrypt
…/README.md :17:
> bcrypt-match("password", $hash)
skinkade/p6-Crypt-Bcrypt
…/README.md :23:
> bcrypt-hash("password", :rounds(15))
skinkade/p6-Crypt-Bcrypt
…/LINKS :9:
Unix Seventh Edition Manual, Volume 2: the password scheme (1978):
skinkade/p6-Crypt-Bcrypt
…/LINKS :11:
http://plan9.bell-labs.com/7thEdMan/vol2/password
skinkade/p6-Crypt-Bcrypt
…/LINKS :14:
password shadowing scheme. This includes a PAM module which
skinkade/p6-Crypt-Bcrypt
…/LINKS :15:
supersedes pam_unix and uses the password hashing framework provided
skinkade/p6-Crypt-Bcrypt
…/LINKS :16:
with crypt_blowfish when setting new passwords.
skinkade/p6-Crypt-Bcrypt
…/LINKS :20:
pam_passwdqc, a password strength checking and policy enforcement
skinkade/p6-Crypt-Bcrypt
…/LINKS :21:
module for PAM-aware password changing programs:
skinkade/p6-Crypt-Bcrypt
…/LINKS :25:
John the Ripper password cracker:
skinkade/p6-Crypt-Bcrypt
…/PERFORMANCE :21:
The numbers for password cracking are 2 to 10% higher than those for
skinkade/p6-Crypt-Bcrypt
…/README :1:
This is an implementation of a password hashing method, provided via the
skinkade/p6-Crypt-Bcrypt
…/README :15:
make your system use the new password hashing algorithm. Changes to
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :22:
\- password hashing
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :204:
can't fail, when both setting new passwords and authenticating against
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :205:
existing password hashes.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :291:
user passwords for storage and authentication;
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :294:
It is important to understand that password hashing is not a replacement
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :295:
for strong passwords.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :296:
It is always possible for an attacker with access to password hashes
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :297:
to try guessing candidate passwords against the hashes.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :298:
There are, however, certain properties a password hashing method may have
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :307:
The ability to try candidate passwords against multiple hashes at the
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :311:
The use of pre-hashed lists of candidate passwords.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :315:
have the same or different passwords without actually having to guess
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :316:
one of the passwords.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :319:
candidate passwords.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :320:
Thus, the computational cost of a good password hashing method must be
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :327:
candidate password.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :331:
In addition to salts, modern password hashing methods accept a variable
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :355:
.B Maximum password length
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :379:
Thus, it should not be used for new passwords unless you absolutely have
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :380:
to be able to migrate the password hashes to other systems.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :393:
This is Poul-Henning Kamp's MD5-based password hashing method originally
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :415:
specific to password cracking only, doesn't have the effective key size
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :416:
limitation, and uses 8-bit characters in passwords.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :430:
(versions up to 1.0.4 inclusive) affecting handling of password characters with
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :438:
Unfortunately, the behavior of "$2a$" on password characters with the 8th bit
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :440:
When generating new password hashes, the "$2b$" or "$2y$" prefix should be used.
skinkade/p6-Crypt-Bcrypt
…/crypt.3 :575:
http://plan9.bell-labs.com/7thEdMan/vol2/password
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :6:
* This code comes from John the Ripper password cracker, with reentrant
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :7:
* and crypt(3) interfaces added, but optimizations specific to password
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :32:
* some of his ideas. The password hashing algorithm was designed by David
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :558:
* While the bug itself affected the majority of passwords containing
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :561:
* only a subset of passwords containing the '\xff' character (not even all of
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :562:
* those passwords, just some of them). This character is not found in valid
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :568:
* We use an approach that tries to minimize side-channel leaks of password
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :570:
* of branches or table lookups. (One conditional branch based on password
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :620:
* collision between the correctly computed hash for this password and a set of
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :621:
* passwords that could be supplied to the buggy algorithm. Our safety measure
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :639:
* state that could be directly specified by a password to the buggy algorithm
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :808:
* 2. We don't want to leave sensitive data from our actual password hash
skinkade/p6-Crypt-Bcrypt
…/crypt_blowfish.c :833:
/* Hash the supplied password */
skinkade/p6-Crypt-Bcrypt
…/Bcrypt.pm6 :45:
sub bcrypt-hash(Str $password, int :$rounds = 12) returns Str is export {
skinkade/p6-Crypt-Bcrypt
…/Bcrypt.pm6 :46:
crypt($password, gensalt($rounds));
skinkade/p6-Crypt-Bcrypt
…/Bcrypt.pm6 :49:
sub bcrypt-match(Str $password, Str $hash) returns Bool is export {
skinkade/p6-Crypt-Bcrypt
…/Bcrypt.pm6 :50:
crypt($password, $hash) eq $hash;
skinkade/p6-Crypt-Bcrypt
…/01-compare.t :13:
ok bcrypt-match("password", $hash-old), "2a positive check";
skinkade/p6-Crypt-Bcrypt
…/01-compare.t :14:
nok bcrypt-match("password1", $hash-old), "2a negative check";
skinkade/p6-Crypt-Bcrypt
…/01-compare.t :16:
ok bcrypt-match("password", $hash-new), "2b positive check";
skinkade/p6-Crypt-Bcrypt
…/01-compare.t :17:
nok bcrypt-match("password1", $hash-new), "2b negative check";
skinkade/p6-crypt-argon2
…/META6.json :6:
"description" : "Easy Argon2i password hashing",
skinkade/p6-crypt-argon2
…/README.md :17:
> my $hash = argon2-hash("password")
skinkade/p6-crypt-argon2
…/README.md :20:
> argon2-verify($hash, "password")
skinkade/p6-crypt-argon2
…/README.md :26:
> argon2-hash("password", :t_cost(4), :m_cost(2**18), :parallelism(4), :hashlen(24))
skinkade/p6-crypt-argon2
…/README.md :36:
> my ($key, $meta) = argon2-derive-key("password", :hashlen(16))
skinkade/p6-crypt-argon2
…/README.md :39:
> argon2-derive-key("password", $meta)
skinkade/p6-crypt-argon2
…/README.md :47:
in KiB, and parallelism in thread count. By default, password hashing uses two
skinkade/p6-crypt-argon2
…/argon2.h :64:
/* Minimum and maximum password length in bytes */
skinkade/p6-crypt-argon2
…/argon2.h :156:
* password and its length,
skinkade/p6-crypt-argon2
…/argon2.h :165:
* Also, three flags indicate whether to erase password, secret as soon as they
skinkade/p6-crypt-argon2
…/argon2.h :168:
* Simplest situation: you have output array out[8], password is stored in
skinkade/p6-crypt-argon2
…/argon2.h :172:
* You want to erase the password, but you're OK with last pass not being
skinkade/p6-crypt-argon2
…/argon2.h :181:
uint8_t *pwd; /* password array */
skinkade/p6-crypt-argon2
…/argon2.h :182:
uint32_t pwdlen; /* password length */
skinkade/p6-crypt-argon2
…/argon2.h :224:
* Hashes a password with Argon2i, producing an encoded hash
skinkade/p6-crypt-argon2
…/argon2.h :228:
* @param pwd Pointer to password
skinkade/p6-crypt-argon2
…/argon2.h :247:
* Hashes a password with Argon2i, producing a raw hash by allocating memory at
skinkade/p6-crypt-argon2
…/argon2.h :252:
* @param pwd Pointer to password
skinkade/p6-crypt-argon2
…/argon2.h :291:
* Verifies a password against an encoded string
skinkade/p6-crypt-argon2
…/argon2.h :294:
* @param pwd Pointer to password
skinkade/p6-crypt-argon2
…/argon2.h :309:
* on the password and salt. Only for side-channel-free
skinkade/p6-crypt-argon2
…/argon2.h :319:
* independent on the password and salt. Good for side-channels,
skinkade/p6-crypt-argon2
…/argon2.h :328:
* Verify if a given password is correct for Argon2d hashing
skinkade/p6-crypt-argon2
…/argon2.h :330:
* @param hash The password hash to verify. The length of the hash is
skinkade/p6-crypt-argon2
…/argon2.h :337:
* Verify if a given password is correct for Argon2i hashing
skinkade/p6-crypt-argon2
…/argon2.h :339:
* @param hash The password hash to verify. The length of the hash is
skinkade/p6-crypt-argon2
…/argon2.c :351:
return "Password pointer is NULL, but password length is not 0";
skinkade/p6-crypt-argon2
…/argon2.c :385:
return "The password does not match the supplied hash";
skinkade/p6-crypt-argon2
…/bench.c :31:
* Benchmarks Argon2 with salt length 16, password length 16, t_cost 1,
skinkade/p6-crypt-argon2
…/core.c :354:
/* Validate password length */
skinkade/p6-crypt-argon2
…/core.h :157:
* password and secret if needed
skinkade/p6-crypt-argon2
…/run.c :92:
fatal("password missing");
skinkade/p6-crypt-argon2
…/run.c :172:
/* get password from stdin */
skinkade/p6-crypt-argon2
…/run.c :175:
fatal("no password read");
skinkade/p6-crypt-argon2
…/run.c :178:
fatal("Provided password longer than supported in command line utility");
skinkade/p6-crypt-argon2
…/test.c :62:
hashtest(version, 2, 16, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :67:
hashtest(version, 2, 20, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :72:
hashtest(version, 2, 18, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :76:
hashtest(version, 2, 8, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :80:
hashtest(version, 2, 8, 2, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :84:
hashtest(version, 1, 16, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :88:
hashtest(version, 4, 16, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :92:
hashtest(version, 2, 16, 1, "differentpassword", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :96:
hashtest(version, 2, 16, 1, "password", "diffsalt",
skinkade/p6-crypt-argon2
…/test.c :106:
"password", strlen("password"), Argon2_i);
skinkade/p6-crypt-argon2
…/test.c :113:
"password", strlen("password"), Argon2_i);
skinkade/p6-crypt-argon2
…/test.c :117:
/* Handle an mismatching hash (the encoded password is "passwore") */
skinkade/p6-crypt-argon2
…/test.c :120:
"password", strlen("password"), Argon2_i);
skinkade/p6-crypt-argon2
…/test.c :122:
printf("Verify with mismatched password: PASS\n");
skinkade/p6-crypt-argon2
…/test.c :134:
hashtest(version, 2, 16, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :139:
hashtest(version, 2, 20, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :144:
hashtest(version, 2, 18, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :148:
hashtest(version, 2, 8, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :152:
hashtest(version, 2, 8, 2, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :156:
hashtest(version, 1, 16, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :160:
hashtest(version, 4, 16, 1, "password", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :164:
hashtest(version, 2, 16, 1, "differentpassword", "somesalt",
skinkade/p6-crypt-argon2
…/test.c :168:
hashtest(version, 2, 16, 1, "password", "diffsalt",
skinkade/p6-crypt-argon2
…/test.c :178:
"password", strlen("password"), Argon2_i);
skinkade/p6-crypt-argon2
…/test.c :185:
"password", strlen("password"), Argon2_i);
skinkade/p6-crypt-argon2
…/test.c :189:
/* Handle an mismatching hash (the encoded password is "passwore") */
skinkade/p6-crypt-argon2
…/test.c :192:
"password", strlen("password"), Argon2_i);
skinkade/p6-crypt-argon2
…/test.c :194:
printf("Verify with mismatched password: PASS\n");
skinkade/p6-crypt-argon2
…/test.c :205:
ret = argon2_hash(2, 1, 1, "password", strlen("password"),
skinkade/p6-crypt-argon2
…/test.c :211:
ret = argon2_hash(2, 1 << 12, 1, NULL, strlen("password"),
skinkade/p6-crypt-argon2
…/test.c :217:
ret = argon2_hash(2, 1 << 12, 1, "password", strlen("password"), "s", 1,
skinkade/p6-crypt-argon2
…/01-compare.t :8:
my $hash = argon2-hash("password");
skinkade/p6-crypt-argon2
…/01-compare.t :11:
ok argon2-verify($hash, "password"), "Verify true new hash";
skinkade/p6-crypt-argon2
…/01-compare.t :12:
ok argon2-verify($hash-reference, "password"), "Verify true reference hash";
skinkade/p6-crypt-argon2
…/01-compare.t :14:
nok argon2-verify($hash, "password1"), "False-check on new hash";
skinkade/p6-crypt-argon2
…/01-compare.t :15:
nok argon2-verify($hash-reference, "password1"), "False-check on reference hash";
skinkade/p6-crypt-argon2
…/02-derive-key.t :9:
my ($key, $meta) = argon2-derive-key("password");
skinkade/p6-crypt-argon2
…/02-derive-key.t :11:
my $test = argon2-derive-key("password", $meta);
spebern/Parser-FreeXL-Native
…/freexl.h :111:
/** BIFF file is password protected */
spebern/Parser-FreeXL-Native
…/freexl.h :113:
/** BIFF file is not password protected */
spebern/Parser-FreeXL-Native
…/freexl.h :219:
/** Information query for BIFF password protection state */
spebern/Parser-FreeXL-Native
…/mainpage.doxy :315:
as author, password protection, styles, formats, window settings and so on
spebern/Parser-FreeXL-Native
…/check_excel2003_biff2.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff2.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff3.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff3.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff3_info.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff3_info.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff4.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff4.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff4_1904.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff4_1904.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff8.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_excel2003_biff8.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spebern/Parser-FreeXL-Native
…/check_oocalc95.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_oocalc95.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spebern/Parser-FreeXL-Native
…/check_oocalc97.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_oocalc97.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spebern/Parser-FreeXL-Native
…/check_oocalc97_intvalue.c :137:
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret);
spebern/Parser-FreeXL-Native
…/check_oocalc97_intvalue.c :141:
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info);
spitsh/spitsh
…/reserved.txt :609:
systemd-ask-password
spitsh/spitsh
…/reserved.txt :628:
systemd-tty-ask-password-agent
sufrostico/perl6-snowball
…/LICENSE :340:
source code form), and must require no special password or key for
supernovus/perl6-http-client
…/Request.pm6 :52:
token pass { [\w
supernovus/perl6-http-client
…/Request.pm6 :59:
## Encode a username and password into Base64 for Basic Auth.
supernovus/perl6-web-app-mvc
…/README.md :66:
"password" : "myapppass"
szabgab/Perl6-Maven
…/bootstrap.css :777:
input[type="password"],
szabgab/Perl6-Maven
…/bootstrap.css :811:
input[type="password"],
szabgab/Perl6-Maven
…/bootstrap.css :842:
input[type="password"]:focus,
szabgab/Perl6-Maven
…/bootstrap.min.css :9:
*/article,aside,details,figcaption,figure,footer,header,hgroup,nav,section{display:block}audio,canvas,video{display:inline-block;*display:inline;*zo…
szabgab/Perl6-Maven
…/jquery-1.7.2.min.js :3:
a){var b=F.exec(a);b&&(b[1]=(b[1]
szabgab/Perl6-Maven
…/jquery-1.7.2.min.js :4:
.clean(arguments);a.push.apply(a,this.toArray());return this.pushStack(a,"before",arguments)}},after:function(){if(this[0]&&this[0].parentNode)return…
tadzik/Grammar-BNF
…/abnf.t :223:
login = "LOGIN" SP userid SP password
tadzik/Grammar-BNF
…/abnf.t :243:
password = astring
titsuki/p6-App-AizuOnlineJudge
…/BasicCourse.pm6 :29:
password => self.get-password,
titsuki/p6-App-AizuOnlineJudge
…/IntroductionCourse.pm6 :30:
password => self.get-password,
titsuki/p6-App-AizuOnlineJudge
…/Submittable.pm6 :4:
method get-password() returns Str {
titsuki/p6-App-AizuOnlineJudge
…/Submittable.pm6 :5:
shell "stty -echo"; my $password = prompt("password: "); "".say; shell "stty echo";
titsuki/p6-App-AizuOnlineJudge
…/Submittable.pm6 :6:
return $password;
titsuki/p6-App-AizuOnlineJudge
…/01-basic.t :15:
$*IN = class { method get() { "fakepassword" }; }
titsuki/p6-App-AizuOnlineJudge
…/01-basic.t :22:
$*IN = class { method get() { "fakepassword" }; }
titsuki/p6-App-AizuOnlineJudge
…/01-basic.t :61:
$*IN = class { method get() { "fakepassword" }; }
titsuki/p6-App-AizuOnlineJudge
…/01-basic.t :74:
$*IN = class { method get() { "fakepassword" }; }
titsuki/p6-Terminal-Readsecret
…/META6.json :9:
"description" : "A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or passwords from a command line secretly (not being displayed)",
titsuki/p6-Terminal-Readsecret
…/README.md :6:
Terminal::Readsecret - A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or passwords from a command line secretly (not being displayed)
titsuki/p6-Terminal-Readsecret
…/README.md :15:
my $password = getsecret("password:" );
titsuki/p6-Terminal-Readsecret
…/README.md :16:
say "your password is: " ~ $password;
titsuki/p6-Terminal-Readsecret
…/README.md :23:
my $password = getsecret("password:", $timeout);
titsuki/p6-Terminal-Readsecret
…/README.md :24:
say "your password is: " ~ $password;
titsuki/p6-Terminal-Readsecret
…/README.md :29:
Terminal::Readsecret is a perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ). Readsecre…
titsuki/p6-Terminal-Readsecret
…/README.md :40:
Reads secrets or passwords from a command line and returns its input.
titsuki/p6-Terminal-Readsecret
…/getpass.p6 :5:
my $password = getsecret("password:" );
titsuki/p6-Terminal-Readsecret
…/getpass.p6 :6:
say "your password is: " ~ $password;
titsuki/p6-Terminal-Readsecret
…/timeout_getpass.p6 :6:
my $password = getsecret("password:", $timeout);
titsuki/p6-Terminal-Readsecret
…/timeout_getpass.p6 :7:
say "your password is: " ~ $password;
titsuki/p6-Terminal-Readsecret
…/Readsecret.pm6 :78:
Terminal::Readsecret - A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or passwords from a command line secretly (not being displayed)
titsuki/p6-Terminal-Readsecret
…/Readsecret.pm6 :85:
my $password = getsecret("password:" );
titsuki/p6-Terminal-Readsecret
…/Readsecret.pm6 :86:
say "your password is: " ~ $password;
titsuki/p6-Terminal-Readsecret
…/Readsecret.pm6 :92:
my $password = getsecret("password:", $timeout);
titsuki/p6-Terminal-Readsecret
…/Readsecret.pm6 :93:
say "your password is: " ~ $password;
titsuki/p6-Terminal-Readsecret
…/Readsecret.pm6 :98:
Readsecret is a simple self-contained C (or C++) library intended to be used on Unix and Unix-like operating systems that need to read a password or other textual secret typed in by the user while in a text-mode environment, such as from a console or shell.
titsuki/p6-Terminal-Readsecret
…/Readsecret.pm6 :108:
Reads secrets or passwords from a command line and returns its input.
titsuki/p6-Terminal-Readsecret
…/readsecret.c :3:
** Securely read a password or text secret from a command line (tty device).
titsuki/p6-Terminal-Readsecret
…/readsecret.h :3:
** Securely read a password or text secret from a command line (tty device).
titsuki/p6-Terminal-Readsecret
…/readsecret.h :70:
/* rsecret_overwrite_buffer() - securely overwrite a password or other
titsuki/p6-Terminal-Readsecret
…/02-password.t :7:
throws-like { getsecret("password", $timeout) }, Exception, message => 'timeout waiting for user';
tokuhirom/p6-Crust
…/Basic.pm6 :79:
my sub authen_cb($username, $password, %env) {
tokuhirom/p6-Crust
…/Basic.pm6 :80:
return $username eq 'admin' && $password eq 's3cr3t';
tokuhirom/p6-Crust
…/Basic.pm6 :98:
A callback function that takes username, password and P6W environment
tokuhirom/p6-Crust
…/Basic.pm6 :102:
method that takes username and password and returns boolean.
tony-o/perl6-db-orm-quicky
…/README.md :41:
password => 'top secret',
tony-o/perl6-db-orm-quicky
…/README.md :118:
$user.set('password', 'user1-pass!');
tony-o/perl6-db-orm-quicky
…/mysql_test.pl6 :16:
password => '',
tony-o/perl6-db-orm-quicky
…/mysql_test.pl6 :28:
$newrow.set('password' => 'tony');
tony-o/perl6-db-orm-quicky
…/pgsql_test.pl6 :16:
password => '',
tony-o/perl6-db-orm-quicky
…/pgsql_test.pl6 :28:
$newrow.set('password' => 'tony');
tony-o/perl6-db-orm-quicky
…/sqlite.test.pl6 :24:
$newrow.set('password' => 'tony');
tony-o/perl6-db-orm-quicky
…/01_sqlite.t :39:
$newrow.set('password' => 'tony');
tony-o/perl6-db-orm-quicky
…/01_sqlite.t :49:
password => ( '-like' => '%on%' ),
tony-o/perl6-db-orm-quicky
…/02_joins.t :28:
my @expected =
tony-o/perl6-db-orm-quicky
…/02_joins.t :31:
password => 'tony',
tony-o/perl6-db-orm-quicky
…/02_joins.t :45:
$newrow.set('password' => 'tony');
tony-o/perl6-db-orm-quicky
…/03_sqlite_no_quotes.t :39:
$newrow.set('password' => 'tony');
tony-o/perl6-db-orm-quicky
…/03_sqlite_no_quotes.t :49:
password => ( '-like' => '%on%' ),
ugexe/Perl6-Base64
…/01-basic.t :15:
is encode-base64("username:thisisnotmypassword", :str), 'dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==', 'Encoding "username:thisisnotmypassword"';
ugexe/Perl6-Base64
…/01-basic.t :36:
is decode-base64("dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==", :bin).decode, "username:thisisnotmypassword", 'decoding "username:thisisnotmypassword"';
viklund/november
…/users :1:
# Password generation is a manual process right now; run bin/generate-password.pl USER PASS
viklund/november
…/users :5:
'password' => '47c96e61cbcb31e648b1987107117ca4f524658460b955e290675789466fcd1a',
viklund/november
…/November.pm :210:
my $password = $.cgi.params<password>;
viklund/november
…/November.pm :215:
if !defined $password
viklund/november
…/November.pm :216:
push @errors, 'Please provide a password.';
viklund/november
…/November.pm :219:
if $password && $password.chars < 6 {
viklund/november
…/November.pm :221:
~ 'your password.';
viklund/november
…/November.pm :224:
if $password & $passagain && $password ne $passagain {
viklund/november
…/November.pm :225:
push @errors, 'The password and confirmation must match.';
viklund/november
…/November.pm :237:
my $phash = sha256((sha256($user_name.encode).list».fmt("%02x") ~ $password).encode).list».fmt("%02x");
viklund/november
…/November.pm :245:
my $password = $.cgi.params<password>;
viklund/november
…/November.pm :250:
my $hashed = sha256((sha256($user_name.encode).list».fmt("%02x") ~ $password).encode).list».fmt("%02x");
viklund/november
…/November.pm :252:
and $hashed eq %users{$user_name}<password> {
viklund/november
…/November.pm :687:
my $password = $cgi->param('password');
viklund/november
…/November.pm :691:
if ( md5_base64(md5_base64($user_name).$password)
viklund/november
…/November.pm :692:
eq $users{$user_name}->{password} ) {
viklund/november
…/users :3:
'password' => 'hdm24HFlfrBgIX3bTsVLIQ'
viklund/november
…/users :6:
'password' => '3l9drfMnROgPQTNicdGFQg'
viklund/november
…/users :9:
'password' => 'yG7xslKNZt59hpwVBkWrFQ',
viklund/november
…/log_in.tmpl :21:
<p>Password: <input name="password" type="password" /></p>
viklund/november
…/log_in.tmpl :17:
<p>Password: <input name="password" type="password" /></p>
viklund/november
…/log_in.tmpl :17:
<p>Password: <input name="password" type="password" /></p>
viklund/november
…/log_in.tmpl :15:
<p>Password: <input name="password" type="password" /></p>
viklund/november
…/log_in.tmpl :18:
<p>Password: <input name="password" type="password" /></p>
viklund/november
…/register.tmpl :18:
<p>Password: <input name="password" type="password" /></p>
viklund/november
…/article.rtf :431:
\f0\fs24\lang1033\langfe1033\langnp1033\insrsid4985751\charrsid4985751 :\line }{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\lang1033\langfe1033\langnp1033\insrsid4985751\charrsid4985751 if (defined %users\{$user_name\} \line and $password eq %users\{
viklund/november
…/article.rtf :444:
\f2\fs24\lang1033\langfe1033\langnp1033\insrsid9450395\charrsid9450395 password}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\insrsid9450395\charrsid9450395 ' => '}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0
viklund/november
…/article.rtf :452:
\f2\fs24\lang1033\langfe1033\langnp1033\insrsid9450395\charrsid9450395 password}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\insrsid9450395\charrsid9450395 ' => '3}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0
zoffixznet/perl6-IRC-Client
…/Changes :23:
- Add support for channel passwords (#18)
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :67:
- `.password`
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :87:
- `:password`
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :448:
server. Pairs represent channels with channel passwords, where the key is
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :449:
the channel and the value is its password.
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :468:
#### `.password`
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :470:
The password of the server.
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :548:
:password<s3cret>
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :576:
Pairs represent channels with channel passwords, where the key is
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :577:
the channel and the value is its password.
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :638:
##### `:password`
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :640:
The server password to use. On some networks (like Freenode), the server
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :641:
password also functions as NickServ's password.
zoffixznet/perl6-IRC-Client
…/03-method-reference.md :662:
`:host`, `:port`, `:password`, `:channels`, `:nick`, `:username`,
zoffixznet/perl6-IRC-Client
…/Client.pm6 :35:
Str :$password,
zoffixznet/perl6-IRC-Client
…/Client.pm6 :50:
my %all-conf = :$port, :$password, :$host, :$nick, :$alias,
zoffixznet/perl6-IRC-Client
…/Client.pm6 :63:
<host password port username userhost userreal ssl ca-file>
zoffixznet/perl6-IRC-Client
…/Client.pm6 :195:
self!ssay: "PASS $server.password()", :$server
zoffixznet/perl6-IRC-Client
…/Client.pm6 :196:
if $server.password.defined;
zoffixznet/perl6-IRC-Client
…/Server.pm6 :11:
has Str $.password;
zoffixznet/perl6-IRC-Client
…/01-basic.pl :36:
password => 'fishdont',
zoffixznet/perl6-RT-REST-Client
…/README.md :50:
You need to go to user preferences and set up your CLI password for your
zoffixznet/perl6-RT-REST-Client
…/README.md :75:
**Mandatory.** Your RT password. Note that your regular web login likely won't
zoffixznet/perl6-RT-REST-Client
…/README.md :76:
work. You need to set up the CLI password. See [LOGIN CREDENTIALs
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment