File | Code |
---|---|
7ojo/perl6-platform…/Container.pm6 :55: |
@cmd.push: '-D' if not %params<password>; |
7ojo/perl6-platform…/Container.pm6 :63: |
@cmd.push: '--disabled-password' if not %params<password>; |
Altai-man/Slang-Kazu…/COPYING :343: |
source code form), and must require no special password or key for |
Altai-man/perl6-Config-Netrc…/README.md :24: |
password => {value => val, comment => my-comment} |
Altai-man/perl6-Config-Netrc…/README.md :26: |
Of course, login or password lines are optional and comment entry for lines like following: |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :16: |
<password>? \n? } |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :20: |
token password { \h*? 'password' \h+? (\w+) (<comment>?) <eol> } |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :27: |
password => $<password>.made} |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :31: |
password => $<password>.made} |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :62: |
method password ($/) { $/.make: comment-layering($/); } |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :94: |
# password p |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :98: |
# password default_password |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :103: |
# password => {value => p}} |
Altai-man/perl6-Config-Netrc…/Netrc.pm6 :107: |
# password => {value => default_password}}]} |
Altai-man/perl6-Config-Netrc…/Writer.pm6 :28: |
if $entry<password> { |
Altai-man/perl6-Config-Netrc…/Writer.pm6 :29: |
$output ~= " password " ~ |
Altai-man/perl6-Config-Netrc…/Writer.pm6 :30: |
$entry<password><value> ~ ' ' ~ |
Altai-man/perl6-Config-Netrc…/Writer.pm6 :31: |
($entry<password><comment>.defined ?? |
Altai-man/perl6-Config-Netrc…/Writer.pm6 :32: |
$entry<password><comment> |
Altai-man/perl6-Config-Netrc…/10-testing.t :12: |
password p # cool password |
Altai-man/perl6-Config-Netrc…/10-testing.t :16: |
password default_password |
Altai-man/perl6-Config-Netrc…/10-testing.t :25: |
password pd |
Altai-man/perl6-Config-Netrc…/10-testing.t :41: |
password p # easy case |
Altai-man/perl6-Config-Netrc…/10-testing.t :48: |
password p # with only password |
Bailador/Bailador…/README.md :405: |
config.set('database-password', 'xxxxxx') |
CIAvash/App-Football…/COPYING :340: |
source code form), and must require no special password or key for |
CIAvash/WebService-FootballData…/COPYING :340: |
source code form), and must require no special password or key for |
Cofyc/perl6-redis…/Redis.pm :217: |
method auth(Str $password) returns Bool { |
Cofyc/perl6-redis…/Redis.pm :218: |
return self.exec_command("AUTH", $password); |
CurtTilmes/perl6-libcurl…/README.md :25: |
proxies, cookies, user+password authentication (Basic, Digest, |
CurtTilmes/perl6-libcurl…/README.md :211: |
password |
CurtTilmes/perl6-libcurl…/README.md :464: |
embedded user + password. |
CurtTilmes/perl6-libcurl…/Easy.pm6 :197: |
password => (CURLOPT_PASSWORD, CURLOPT_STR ), |
CurtTilmes/perl6-libcurl…/test0068.t :21: |
is $curl.statusline, 'HTTP/1.1 401 You give me wrong password', |
CurtTilmes/perl6-libcurl…/test0068.t :24: |
is $curl.content, "Wrong password dude. Get it fixed and return.\n", 'content'; |
Emeric54/p6-text-caesar…/META6.json :13: |
"tags" : [ "crypt", "password" ], |
JJ/p6-math-constants…/LICENSE :340: |
source code form), and must require no special password or key for |
Juerd/p6-mqtt…/Client.pm :250: |
No username and password are sent to the server. |
LLFourn/p6-AttrX-InitArg…/README.md :13: |
method get-message($password){ |
LLFourn/p6-AttrX-InitArg…/README.md :14: |
$password eq 'opensesame' ?? $!message !! Nil; |
LLFourn/p6-AttrX-InitArg…/class.t :10: |
method get-secret-message($password){ |
LLFourn/p6-AttrX-InitArg…/class.t :11: |
$password eq 'opensesame' ?? $!message !! Str; |
LLFourn/p6-AttrX-InitArg…/example0.t :11: |
method get-message($password){ |
LLFourn/p6-AttrX-InitArg…/example0.t :12: |
$password eq 'opensesame' ?? $!message !! Nil; |
LLFourn/p6-AttrX-InitArg…/role.t :8: |
method get-secret-message($password){ |
LLFourn/p6-AttrX-InitArg…/role.t :9: |
$password eq 'opensesame' ?? $!message !! Str; |
MARTIMM/Auth-SCRAM…/README.md :46: |
:password<pencil>, |
MARTIMM/Auth-SCRAM…/CHANGES.md :40: |
* mangle-password and clean-up in user objects are made optional. Called when defined. |
MARTIMM/Auth-SCRAM…/TODO.md :7: |
* Keep information when calculated. User request boolean and username/password/authzid tuple must be kept the same. This saves time. |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :15: |
# and username/password/authzid must be kept the same. This saves time. |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :30: |
Str :$password, |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :45: |
die 'No username and/or password provided' |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :46: |
unless ? $username and ? $password; |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :54: |
self.init( :$username, :$password, :$authzid, :client-object($helper-object)); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :75: |
Str :$password!, |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :95: |
:$username, :$password, :$authzid, :$client-object |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :124: |
Str:D :$username is copy, Str:D :$password is copy, |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :133: |
$password = self.normalize( $password, :!prep-username, :$enforce); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :137: |
my Buf $mangled-password; |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :138: |
if $helper-object.^can('mangle-password') { |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :139: |
$mangled-password = $helper-object.mangle-password( |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :140: |
:$username, :$password, :$authzid |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :145: |
$mangled-password = Buf.new($password.encode); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :148: |
$!pbkdf2.derive( $mangled-password, $salt, $iter); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :152: |
method client-key ( Buf $salted-password --> Buf ) { |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :154: |
hmac( $salted-password, 'Client Key', &$!CGH); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :170: |
method server-key ( Buf $salted-password --> Buf ) { |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :172: |
hmac( $salted-password, 'Server Key', &$!CGH); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :222: |
# Normalize password |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :28: |
Str :$password!, |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :43: |
Usernames and password (and maybe the authorization id) must be normalized. |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :49: |
set to True. There is only one type of profile for passwords so no control |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :63: |
Username, password and authorization id are not needed when a server side object |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :82: |
Str:D :$username is copy, Str:D :$password is copy, |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :89: |
Calculate the derived key from the password, salt and number of iterations. The |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :92: |
The username and password are normalized using the PRECIS framework described |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :99: |
When the method C<mangle-password> is defined in the user provided helper |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :103: |
method mangle-password ( |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :105: |
Str :$password, |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :112: |
my Buf $mangled-password .= new($password.encode); |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :117: |
method client-key ( Buf $salted-password --> Buf ) { |
MARTIMM/Auth-SCRAM…/SCRAM.pod6 :159: |
username or password profile is choosen. C<$case-preserved-profile> selects |
MARTIMM/Auth-SCRAM…/Client.pm6 :10: |
# and username/password/authzid must be kept the same. This saves time. |
MARTIMM/Auth-SCRAM…/Client.pm6 :16: |
has Str $!password; |
MARTIMM/Auth-SCRAM…/Client.pm6 :41: |
has Buf $!salted-password; |
MARTIMM/Auth-SCRAM…/Client.pm6 :60: |
Str :$username, Str :$password, Str :$authzid, |
MARTIMM/Auth-SCRAM…/Client.pm6 :68: |
Str:D :$password!, |
MARTIMM/Auth-SCRAM…/Client.pm6 :74: |
$!password = $password; |
MARTIMM/Auth-SCRAM…/Client.pm6 :168: |
$!salted-password = self.derive-key( |
MARTIMM/Auth-SCRAM…/Client.pm6 :169: |
:$!username, :$!password, :$!authzid, :!enforce |
MARTIMM/Auth-SCRAM…/Client.pm6 :174: |
$!client-key = self.client-key($!salted-password); |
MARTIMM/Auth-SCRAM…/Client.pm6 :241: |
$!server-key = self.server-key($!salted-password); |
MARTIMM/Auth-SCRAM…/Client.pod6 :43: |
:password<pencil>, |
MARTIMM/Auth-SCRAM…/Client.pod6 :88: |
Str:D :$username!, Str:D :$password!, Str :$authzid, |
MARTIMM/Auth-SCRAM…/Client.pod6 :116: |
=item1 B<mangle-password>. This method is optional. Some servers, like mongod, |
MARTIMM/Auth-SCRAM…/Client.pod6 :117: |
need extra manipulations to mangle the data. The username and password are |
MARTIMM/Auth-SCRAM…/Client.pod6 :120: |
method mangle-password ( |
MARTIMM/Auth-SCRAM…/Client.pod6 :121: |
Str :$username, Str :$password, Str :$authzid |
MARTIMM/Auth-SCRAM…/Client.pod6 :127: |
my Buf $mangled-password = Buf.new($password.encode); |
MARTIMM/Auth-SCRAM…/Server.pm6 :10: |
# and username/password/authzid must be kept the same. This saves time. |
MARTIMM/Auth-SCRAM…/Server.pm6 :16: |
has Str $!password; |
MARTIMM/Auth-SCRAM…/Server.pm6 :41: |
has Buf $!salted-password; |
MARTIMM/Auth-SCRAM…/Server.pm6 :82: |
Str :$username, Str :$password, |
MARTIMM/Auth-SCRAM…/Server.pm6 :89: |
my Buf $salted-password = self.derive-key( |
MARTIMM/Auth-SCRAM…/Server.pm6 :90: |
:$username, :$password, :enforce, |
MARTIMM/Auth-SCRAM…/Server.pm6 :95: |
my Buf $client-key = self.client-key($salted-password); |
MARTIMM/Auth-SCRAM…/Server.pm6 :97: |
my Buf $server-key = self.server-key($salted-password); |
MARTIMM/Auth-SCRAM…/Server.pod6 :16: |
risk that passwords are stolen. The server role helps to convert the username |
MARTIMM/Auth-SCRAM…/Server.pod6 :17: |
and password into a credential tupple which can be stored without the risk that |
MARTIMM/Auth-SCRAM…/Server.pod6 :18: |
the password can be retrieved from this data. Below is a simple implementation |
MARTIMM/Auth-SCRAM…/Server.pod6 :49: |
method add-user ( $username is copy, $password is copy ) { |
MARTIMM/Auth-SCRAM…/Server.pod6 :53: |
:$username, :$password, :$salt, :iter(4096), :server-object(self) |
MARTIMM/Auth-SCRAM…/Server.pod6 :117: |
# receive the password and password preferable over a secure connection |
MARTIMM/Auth-SCRAM…/Server.pod6 :119: |
my Str $password = '...' |
MARTIMM/Auth-SCRAM…/Server.pod6 :120: |
$crd.add-user( $user, $password); |
MARTIMM/Auth-SCRAM…/Server.pod6 :179: |
Str :$username, Str :$password, |
MARTIMM/Auth-SCRAM…/Server.pod6 :196: |
When the method C<mangle-password> is defined, that method will be called for |
MARTIMM/Auth-SCRAM…/Common.pm6 :23: |
Str :$username, Str:D :$password, Str :$authzid, |
MARTIMM/Auth-SCRAM…/Common.pm6 :31: |
my Buf $mangled-password; |
MARTIMM/Auth-SCRAM…/Common.pm6 :32: |
if $helper-object.^can('mangle-password') { |
MARTIMM/Auth-SCRAM…/Common.pm6 :33: |
$mangled-password = $helper-object.mangle-password( |
MARTIMM/Auth-SCRAM…/Common.pm6 :34: |
:$username, :$password, :$authzid |
MARTIMM/Auth-SCRAM…/Common.pm6 :39: |
$mangled-password = Buf.new($password.encode); |
MARTIMM/Auth-SCRAM…/Common.pm6 :42: |
$!pbkdf2.derive( $mangled-password, $salt, $iter); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :14: |
# and username/password/authzid must be kept the same. This saves time. |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :20: |
has Str $!password; |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :32: |
# Normalization of username and password can be skipped if normal |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :56: |
has Buf $!salted-password; |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :74: |
Str:D :$password!, |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :83: |
$!password = $password; |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :188: |
# $!password = self!saslPrep($!password); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :248: |
my Buf $mangled-password; |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :249: |
if $!client-side.^can('mangle-password') { |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :250: |
$mangled-password = $!client-side.mangle-password( |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :251: |
:$!username, :$!password, :$!authzid |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :256: |
$mangled-password = self.mangle-password($password); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :259: |
$!salted-password = $!pbkdf2.derive( $mangled-password, $!s-salt, $!s-iter); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :261: |
$!client-key = hmac( $!salted-password, 'Client Key', &$!CGH); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :332: |
$!server-key = hmac( $!salted-password, 'Server Key', &$!CGH); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :497: |
my Buf $mangled-password; |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :498: |
if $!client-side.^can('mangle-password') { |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :499: |
$mangled-password = $!client-side.mangle-password( |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :500: |
:$!username, :$!password, :$!authzid |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :505: |
$mangled-password = self.mangle-password($password); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :508: |
$!salted-password = $!pbkdf2.derive( $mangled-password, $!s-salt, $!s-iter); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :510: |
$!client-key = hmac( $!salted-password, 'Client Key', &$!CGH); |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :541: |
method mangle-password ( Str:D $password --> Buf ) { |
MARTIMM/Auth-SCRAM…/SCRAM.pm6 :543: |
Buf.new($!password.encode); |
MARTIMM/Auth-SCRAM…/100-SCRAM.t :41: |
# method mangle-password() is optional |
MARTIMM/Auth-SCRAM…/100-SCRAM.t :55: |
:password<pencil>, |
MARTIMM/Auth-SCRAM…/200-SCRAM.t :32: |
method add-user ( $username is copy, $password is copy ) { |
MARTIMM/Auth-SCRAM…/200-SCRAM.t :35: |
:$username, :$password, |
MARTIMM/Auth-SCRAM…/200-SCRAM.t :80: |
# method mangle-password() is optional |
MARTIMM/Auth-SCRAM…/201-SCRAM.t :30: |
method add-user ( $username is copy, $password is copy ) { |
MARTIMM/Auth-SCRAM…/201-SCRAM.t :33: |
:$username, :$password, |
MARTIMM/Auth-SCRAM…/201-SCRAM.t :84: |
# method mangle-password() is optional |
MARTIMM/PKCS5…/PBKDF2.pm6 :26: |
# Input: P password, an octet string |
MARTIMM/PKCS5…/PBKDF2.pod :47: |
Calculate the derived key given the password C<$pw> and a salt C<$salt>. It |
MARTIMM/PKCS5…/100-pbkdf2.t :16: |
Buf.new('password'.encode), |
MARTIMM/PKCS5…/100-pbkdf2.t :21: |
is $spw, '0c60c80f961f0e71f3a9b524af6012062fe037a6', "Test 'password' and 1 iteration"; |
MARTIMM/PKCS5…/100-pbkdf2.t :24: |
Buf.new('password'.encode), |
MARTIMM/PKCS5…/100-pbkdf2.t :29: |
is $spw, 'ea6c014dc72d6f8ccd1ed92ace1d41f0d8de8957', "Test 'password' and 2 iterations"; |
MARTIMM/PKCS5…/100-pbkdf2.t :32: |
Buf.new('password'.encode), |
MARTIMM/PKCS5…/100-pbkdf2.t :37: |
is $spw, '4b007901b765489abead49d926f721d065a429c1', "Test 'password' and 4096 iterations"; |
MARTIMM/PKCS5…/100-pbkdf2.t :42: |
Buf.new('password'.encode), |
MARTIMM/PKCS5…/100-pbkdf2.t :47: |
is $spw, 'eefe3d61cd4da4e4e9945b3d6ba2158c2634e984', "Test 'password' and 16777216 iterations"; |
MARTIMM/PKCS5…/100-pbkdf2.t :55: |
Buf.new('passwordPASSWORDpassword'.encode), |
MARTIMM/mongo-perl6-driver…/README.md :202: |
* In the future, host/port arguments to Client must be replaced by using a URI in the format ```mongodb://[username:password@]host1[:port1]… |
MARTIMM/mongo-perl6-driver…/README.md :204: |
*This is done now. The Client.instance method will only accept uri which will be processed by the Uri class. The default uri will be ```mongodb://```… |
MARTIMM/mongo-perl6-driver…/CHANGES.md :67: |
* Added normalization for username and passwords using Unicode::Precis. At the moment the UsernameCasePreserved profile is used until there is some consensus about it. |
MARTIMM/mongo-perl6-driver…/CHANGES.md :69: |
Auth::SCRAM implemented. No username/password normalization yet. |
MARTIMM/mongo-perl6-driver…/CHANGES.md :78: |
* Refactored MongoDB::Users to MongoDB::HL::Users because it can all be done using the lower level run-command(). This adds some control and tests on password length and use of characters. Therefore this makes it a higher level implementation. |
MARTIMM/mongo-perl6-driver…/CHANGES.md :84: |
* URI handling of username/password. Used uri-unescape() from URI::Escape module on usernames and passwords. Not sure if needed on fqdn. |
MARTIMM/mongo-perl6-driver…/CHANGES.md :89: |
* Took a long time to implement authentication and had to write a pbkdf2 and scram sha1 implementations first. Then find out what exactly mongodb n… |
MARTIMM/mongo-perl6-driver…/Design-tests.md :91: |
* [x] Username and password |
MARTIMM/mongo-perl6-driver…/MongoDB.pod6 :96: |
run-command. This module adds facilities like checking password length etc. |
MARTIMM/mongo-perl6-driver…/Credential.pm6 :12: |
has Str $.password; |
MARTIMM/mongo-perl6-driver…/Credential.pm6 :21: |
Str :$username = '', Str :$password = '', |
MARTIMM/mongo-perl6-driver…/Credential.pm6 :27: |
$!password = $password; |
MARTIMM/mongo-perl6-driver…/Credential.pm6 :60: |
fatal-message("$e0 password must $e1") unless ? $!password; |
MARTIMM/mongo-perl6-driver…/Credential.pm6 :70: |
fatal-message("$e0 password must not $e1") if ? $!password; |
MARTIMM/mongo-perl6-driver…/Credential.pm6 :79: |
# password is optional |
MARTIMM/mongo-perl6-driver…/Credential.pm6 :93: |
fatal-message("$e0 password must $e1") unless ? $!password; |
MARTIMM/mongo-perl6-driver…/Credential.pm6 :102: |
fatal-message("$e0 password must $e1") unless ? $!password; |
MARTIMM/mongo-perl6-driver…/Scram.pm6 :78: |
method mangle-password ( Str:D :$username, Str:D :$password --> Buf ) { |
MARTIMM/mongo-perl6-driver…/Scram.pm6 :86: |
my TestValue $tv-pw = $upf-os.enforce($password); |
MARTIMM/mongo-perl6-driver…/Scram.pm6 :94: |
my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $password).encode; |
MARTIMM/mongo-perl6-driver…/Client.pm6 :101: |
# password, servers, database and options. |
MARTIMM/mongo-perl6-driver…/Client.pod6 :102: |
mongodb://u1:pw1@nsa.us:666,my.datacenter.gov/nsa/?replicaSet=foryoureyesonly |
MARTIMM/mongo-perl6-driver…/Users.pm6 :73: |
Str:D $user, Str:D $password, |
MARTIMM/mongo-perl6-driver…/Users.pm6 :88: |
# Check if password is too short |
MARTIMM/mongo-perl6-driver…/Users.pm6 :90: |
elsif $password.chars < $!min-pw-length { |
MARTIMM/mongo-perl6-driver…/Users.pm6 :93: |
oper-data => $password, |
MARTIMM/mongo-perl6-driver…/Users.pm6 :98: |
# Check if password answers to rule given by attribute code |
MARTIMM/mongo-perl6-driver…/Users.pm6 :104: |
$pw-ok = ($password ~~ m/ <[a..z]> /).Bool; |
MARTIMM/mongo-perl6-driver…/Users.pm6 :109: |
$password ~~ m/ <[a..z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :110: |
$password ~~ m/ <[A..Z]> / |
MARTIMM/mongo-perl6-driver…/Users.pm6 :116: |
$password ~~ m/ <[a..z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :117: |
$password ~~ m/ <[A..Z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :118: |
$password ~~ m/ \d / |
MARTIMM/mongo-perl6-driver…/Users.pm6 :124: |
$password ~~ m/ <[a..z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :125: |
$password ~~ m/ <[A..Z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :126: |
$password ~~ m/ \d / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :127: |
$password ~~ m/ <[`~!@\#\$%^&*()\-_=+[{\]};:\'\"\\|,<.>\/\?]> / |
MARTIMM/mongo-perl6-driver…/Users.pm6 :134: |
oper-data => $password, |
MARTIMM/mongo-perl6-driver…/Users.pm6 :141: |
# Normalize username and password |
MARTIMM/mongo-perl6-driver…/Users.pm6 :148: |
my TestValue $tv-pw = $upf-os.prepare($password); |
MARTIMM/mongo-perl6-driver…/Users.pm6 :163: |
pwd => (Digest::MD5.md5_hex( [~] $user, ':mongo:', $password)), |
MARTIMM/mongo-perl6-driver…/Users.pm6 :176: |
Str:D $user, Str :$password, |
MARTIMM/mongo-perl6-driver…/Users.pm6 :187: |
if ?$password { |
MARTIMM/mongo-perl6-driver…/Users.pm6 :188: |
if $password.chars < $!min-pw-length { |
MARTIMM/mongo-perl6-driver…/Users.pm6 :191: |
oper-data => $password, |
MARTIMM/mongo-perl6-driver…/Users.pm6 :199: |
$pw-ok = ($password ~~ m/ <[a..z]> /).Bool; |
MARTIMM/mongo-perl6-driver…/Users.pm6 :204: |
$password ~~ m/ <[a..z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :205: |
$password ~~ m/ <[A..Z]> / |
MARTIMM/mongo-perl6-driver…/Users.pm6 :211: |
$password ~~ m/ <[a..z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :212: |
$password ~~ m/ <[A..Z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :213: |
$password ~~ m/ \d / |
MARTIMM/mongo-perl6-driver…/Users.pm6 :219: |
$password ~~ m/ <[a..z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :220: |
$password ~~ m/ <[A..Z]> / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :221: |
$password ~~ m/ \d / and |
MARTIMM/mongo-perl6-driver…/Users.pm6 :222: |
$password ~~ m/ <[`~!@\#\$%^&*()\-_=+[{\]};:\'\"\\|,<.>\/\?]> / |
MARTIMM/mongo-perl6-driver…/Users.pm6 :231: |
# Normalize username and password |
MARTIMM/mongo-perl6-driver…/Users.pm6 :238: |
my TestValue $tv-pw = $upf-os.prepare($password); |
MARTIMM/mongo-perl6-driver…/Users.pm6 :244: |
$req<pwd> = (Digest::MD5.md5_hex([~] $user, ':mongo:', $password)); |
MARTIMM/mongo-perl6-driver…/Users.pm6 :250: |
oper-data => $password, |
MARTIMM/mongo-perl6-driver…/Users.pod6 :39: |
:password('mt+++'), |
MARTIMM/mongo-perl6-driver…/Users.pod6 :68: |
Minimum password length. |
MARTIMM/mongo-perl6-driver…/Users.pod6 :88: |
Method to specify checks upon usernames and passwords. Default values for |
MARTIMM/mongo-perl6-driver…/Users.pod6 :89: |
the username minimal length is 2. For passwords idem depending on the password |
MARTIMM/mongo-perl6-driver…/Users.pod6 :90: |
attribute code. $pw-attribs specifies how passwords are to be checked. There are |
MARTIMM/mongo-perl6-driver…/Users.pod6 :109: |
using a password of less the 4 characters the call is bound to fail. |
MARTIMM/mongo-perl6-driver…/Users.pod6 :115: |
Str:D $user, Str:D $password, |
MARTIMM/mongo-perl6-driver…/Users.pod6 :141: |
Str:D $user, Str :$password, |
MARTIMM/mongo-perl6-driver…/Server.pm6 :241: |
# By default authentiction is needed when user/password info is found in the |
MARTIMM/mongo-perl6-driver…/Server.pm6 :329: |
if ?$credential.username and ?$credential.password { |
MARTIMM/mongo-perl6-driver…/Server.pm6 :355: |
:password($credential.password), |
MARTIMM/mongo-perl6-driver…/Server.pm6 :389: |
} # if ?$credential.username and ?$credential.password |
MARTIMM/mongo-perl6-driver…/Uri.pm6 :13: |
username password auth-source auth-mechanism auth-mechanism-properties |
MARTIMM/mongo-perl6-driver…/Uri.pm6 :24: |
token server-section { <username-password>? <server-list>? } |
MARTIMM/mongo-perl6-driver…/Uri.pm6 :26: |
token username-password { |
MARTIMM/mongo-perl6-driver…/Uri.pm6 :27: |
$<username>=<[\w\d%-]>+ ':' $<password>=<[\w\d%-]>+ '@' |
MARTIMM/mongo-perl6-driver…/Uri.pm6 :64: |
method username-password (Match $m) { |
MARTIMM/mongo-perl6-driver…/Uri.pm6 :66: |
$!pword = uri-unescape(~$m<password>); |
MARTIMM/mongo-perl6-driver…/Uri.pm6 :137: |
# get username and password, database and some of |
MARTIMM/mongo-perl6-driver…/Uri.pm6 :140: |
:username($actions.uname), :password($actions.pword), |
MARTIMM/mongo-perl6-driver…/500-Users.t :117: |
}, "Test username and password checks"; |
MARTIMM/mongo-perl6-driver…/500-Users.t :138: |
:password<mt+++>, |
MARTIMM/mongo-perl6-driver…/504-scram-login.t :50: |
method mangle-password ( Str:D :$username, Str:D :$password --> Buf ) { |
MARTIMM/mongo-perl6-driver…/504-scram-login.t :52: |
my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $password).encode; |
MARTIMM/mongo-perl6-driver…/504-scram-login.t :67: |
:password<pencil>, |
MARTIMM/mongo-perl6-driver…/504-scram-login.t :199: |
method mangle-password ( Str:D :$username, Str:D :$password --> Buf ) { |
MARTIMM/mongo-perl6-driver…/504-scram-login.t :201: |
my utf8 $mdb-hashed-pw = ($username ~ ':mongo:' ~ $password).encode; |
MARTIMM/mongo-perl6-driver…/504-scram-login.t :244: |
:password<w@tD8jeDan>, |
MARTIMM/mongo-perl6-driver…/070-uri.t :24: |
is $uri.password, '', 'mongodb:// --> no password'; |
MARTIMM/mongo-perl6-driver…/070-uri.t :92: |
is $uri.password, 'pw', 'mongodb://mt:pw@ --> password = pw'; |
MARTIMM/mongo-perl6-driver…/070-uri.t :99: |
is $uri.password, 'pw', 'mongodb://mt:pw@h2:9876/users --> password = pw'; |
MARTIMM/mongo-perl6-driver…/070-uri.t :104: |
is $uri.password, 'w@tD8jeDan', 'mongodb://Dondersteen:w%40tD8jeDan@h2:9876/users --> password = w@tD8jeDan'; |
MARTIMM/mongo-perl6-driver…/112-Client.t :78: |
subtest "mongodb url with username and password SCRAM-SHA-1", { |
MARTIMM/mongo-perl6-driver…/connection-string-uri-format.sxml :19: |
mongodb://[username:password@]host1[:port1][,host2[:port2],...[,hostN[:portN]]][/[database][?options]] |
MARTIMM/mongo-perl6-driver…/connection-string-uri-format.sxml :50: |
mongodb://[username:password@][host1][:port1],...[,[hostN][:portN]][/[database][?options]] |
MARTIMM/mongo-perl6-driver…/connection-string-uri-format.sxml :75: |
$ |
MARTIMM/mongo-perl6-driver…/connection-string-uri-format.sxml :85: |
$!test.add t='is $uri-obj.server-data<password>, "pencil"' [ |
MARTIMM/mongo-perl6-driver…/connection-string-uri-format.sxml :90: |
It is not correct to specify the username without its password. |
MARTIMM/mongo-perl6-driver…/connection-string-uri-format.t :29: |
is $uri-obj.server-data<password>, "pencil", 'T7'; |
MARTIMM/mongo-perl6-driver…/driver-authentication.sxml :44: |
:username<user>, :password<pencil>, |
MARTIMM/mongo-perl6-driver…/driver-authentication.sxml :55: |
$!test.add t='is $cred.password, "pencil"' [ |
MARTIMM/mongo-perl6-driver…/driver-authentication.sxml :67: |
:username<user>, :password<pencil>, :auth-mechanism<MONGODB-X509> |
MARTIMM/mongo-perl6-driver…/driver-authentication.sxml :72: |
Mechanism $**code[MONGODB-X509] does not expect a password |
MARTIMM/mongo-perl6-driver…/driver-authentication.sxml :76: |
$cred .= new( :password<pencil>, :auth-mechanism<MONGODB-CR>); |
MARTIMM/mongo-perl6-driver…/driver-authentication.sxml :95: |
The driver will not show much if no user or password is given. So, in order |
MARTIMM/mongo-perl6-driver…/driver-authentication.t :17: |
:username<user>, :password<pencil>, |
MARTIMM/mongo-perl6-driver…/driver-authentication.t :21: |
is $cred.password, "pencil", 'T1'; |
MARTIMM/mongo-perl6-driver…/driver-authentication.t :24: |
:username<user>, :password<pencil>, :auth-mechanism<MONGODB-X509> |
MARTIMM/mongo-perl6-driver…/driver-authentication.t :29: |
$cred .= new( :password<pencil>, :auth-mechanism<MONGODB-CR>); |
MARTIMM/unicode-precis…/README.md :71: |
First the basis of the PRECIS framework will be build. As soon as possible a profile for usernames and passwords follows. This is my first need. When this functions well enough, other profiles can be inserted. Much of it is now Implemented. |
MARTIMM/unicode-precis…/FreeForm.pm6 :8: |
# characters that is used for free-form strings, including passwords as well |
MARTIMM/unicode-precis…/100-precis.t :274: |
my Str $password = 'correct horse battery staple'; |
MARTIMM/unicode-precis…/100-precis.t :275: |
my TestValue $tv = $psff.prepare($password); |
MARTIMM/unicode-precis…/100-precis.t :276: |
ok (($tv ~~ Str) and ($tv eq $password)), "test password '$tv'"; |
MARTIMM/unicode-precis…/100-precis.t :279: |
$password = 'Correct Horse Battery Staple'; |
MARTIMM/unicode-precis…/100-precis.t :280: |
$tv = $psff.prepare($password); |
MARTIMM/unicode-precis…/100-precis.t :281: |
ok (($tv ~~ Str) and ($tv eq $password)), "test password '$tv'"; |
MARTIMM/unicode-precis…/100-precis.t :284: |
$password = "\x03C0\x00DF\x00E5"; |
MARTIMM/unicode-precis…/100-precis.t :285: |
$tv = $psff.prepare($password); |
MARTIMM/unicode-precis…/100-precis.t :286: |
ok (($tv ~~ Str) and ($tv eq $password)), "test password '$tv'"; |
MARTIMM/unicode-precis…/100-precis.t :289: |
$password = "Jack of \x2666"; |
MARTIMM/unicode-precis…/100-precis.t :290: |
$tv = $psff.prepare($password); |
MARTIMM/unicode-precis…/100-precis.t :291: |
ok (($tv ~~ Str) and ($tv eq $password)), "test password '$tv'"; |
MARTIMM/unicode-precis…/100-precis.t :294: |
$password = "Foo\x[1680]Bar"; |
MARTIMM/unicode-precis…/100-precis.t :295: |
my Str $password2 = "Foo Bar"; |
MARTIMM/unicode-precis…/100-precis.t :296: |
$tv = $psff.enforce($password); |
MARTIMM/unicode-precis…/100-precis.t :297: |
ok (($tv ~~ Str) and ($tv eq $password2)), "test password '$tv'"; |
MARTIMM/unicode-precis…/100-precis.t :300: |
$password = "my cat is a \x[0009]by"; |
MARTIMM/unicode-precis…/100-precis.t :301: |
$tv = $psff.enforce($password); |
MARTIMM/unicode-precis…/100-precis.t :302: |
ok (($tv ~~ Bool) and not $tv), "test password '$password' fails"; |
MARTIMM/unicode-precis…/100-precis.t :304: |
$password = 'Upper Case'; |
MARTIMM/unicode-precis…/100-precis.t :305: |
$tv = $psff.compare( $password, lc($password)); |
MattOates/Text--Emotion…/ODBL1.0-LICENSE.txt :377: |
password, or within a similar access control scheme provided that You |
Perl6-Noise-Gang/Audio-PortAudio…/stream-source :15: |
stream-source --password=<source pw> |
Perl6-Noise-Gang/Audio-PortAudio…/stream-source :31: |
specify the icecast password (you did actually change that right?) You |
Perl6-Noise-Gang/Audio-PortAudio…/stream-source :58: |
sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$password!, Int :$bitrate = 128, Int :$quality = 5, Str :$mount = '/stream', Str :$source, Int :$buffer = 256, *%extra) { |
Perl6-Noise-Gang/Audio-PortAudio…/stream-source :92: |
my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$password, :$mount, :$format, |
PostCocoon/P6-Url…/Url.pm6 :120: |
<username> [ ':' <password> ]? |
PostCocoon/P6-Url…/Url.pm6 :135: |
token password { |
PostCocoon/P6-Url…/Url.pm6 :181: |
$result<password> [R//]= ~$grammar<auth><password>; |
PostCocoon/P6-Url…/Url.pm6 :200: |
if defined $hash<password> { |
PostCocoon/P6-Url…/Url.pm6 :201: |
$url ~= ":" ~ $hash<password> |
ShaneKilkelly/perl6-config-clever…/README.md :31: |
"password": null, |
ShaneKilkelly/perl6-config-clever…/README.md :41: |
"password": "a_terrible_password", |
ShaneKilkelly/perl6-config-clever…/README.md :63: |
# "password": "a_terrible_password", |
ShaneKilkelly/perl6-config-clever…/production.json :10: |
"password": "password" |
ShaneKilkelly/perl6-config-clever…/basic.t :38: |
password => "password" |
Skarsnik/perl6-discord…/Discord.pm6 :50: |
method login(Str $mail, Str $password) returns Bool { |
Skarsnik/perl6-discord…/Discord.pm6 :51: |
my $rep = self.post(%api-url<login>, email => $mail, password => $password); |
TiMBuS/Net--IRC…/README.pod :35: |
Autoident.new(password => 'nspassw0rd') |
TiMBuS/Net--IRC…/README.pod :64: |
$password; |
TiMBuS/Net--IRC…/Bot.pm :19: |
has $.password; |
TiMBuS/Net--IRC…/Bot.pm :65: |
$.conn.sendln("PASS $.password", scrubbed => 'PASS ...') |
TiMBuS/Net--IRC…/Bot.pm :66: |
if $.password; |
TiMBuS/Net--IRC…/Autoident.pm :6: |
has $.password = die "Need to tell Autoident your password if you want it to work!"; |
TiMBuS/Net--IRC…/Autoident.pm :9: |
$ev.conn.sendln("NS IDENTIFY $.password", scrubbed => 'NS IDENTIFY ...'); |
adaptiveoptics/HTML-Tag…/README.md :163: |
{password => { type => 'password' }}, |
adaptiveoptics/HTML-Tag…/Tag.pod6 :163: |
{password => { type => 'password' }}, |
adaptiveoptics/HTML-Tag…/Form.pm6 :38: |
unless %tagdef<type> eq 'password' { |
adaptiveoptics/HTML-Tag…/Form.pm6 :43: |
unless %tagdef<type>:exists and (%tagdef<type> eq 'password') { |
adaptiveoptics/HTML-Tag…/Form.pm6 :94: |
{password => { type => 'password' }}, |
adaptiveoptics/HTML-Tag…/Form.pm6 :217: |
the type is "password" no value attribute will ever be printed for the |
adaptiveoptics/HTML-Tag…/0020-form.t :15: |
{ password => { }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :22: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i… |
adaptiveoptics/HTML-Tag…/0020-form.t :25: |
{ password => { }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :32: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" autofocus><input name="pass… |
adaptiveoptics/HTML-Tag…/0020-form.t :36: |
is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ… |
adaptiveoptics/HTML-Tag…/0020-form.t :39: |
{ password => { }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :47: |
is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ… |
adaptiveoptics/HTML-Tag…/0020-form.t :54: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" value="mark"><input name="p… |
adaptiveoptics/HTML-Tag…/0020-form.t :57: |
{ password => { type => 'password' }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :64: |
%input<password> = 'supersecret'; |
adaptiveoptics/HTML-Tag…/0020-form.t :68: |
is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ… |
adaptiveoptics/HTML-Tag…/0020-form.t :74: |
{ password => { type => 'password' }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :83: |
is $form.render, '<form method="POST" name="form" action="/"><label for="form-username">Username</label><input name="username" id="form-username" typ… |
adaptiveoptics/HTML-Tag…/0020-form.t :86: |
{ password => { type => 'password' }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :94: |
is $form.render, '<form method="POST" name="form" action="/"><span>oofie<label for="form-username">Username</label><input name="username" id="form-us… |
adaptiveoptics/HTML-Tag…/0020-form.t :100: |
{ password => { }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :107: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text" required><input name="passw… |
adaptiveoptics/HTML-Tag…/0020-form.t :112: |
{ password => { attrs => {:id('blue')} }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :119: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" class="pink" type="text"><input name="p… |
adaptiveoptics/HTML-Tag…/0020-form.t :124: |
{ password => { }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :132: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i… |
adaptiveoptics/HTML-Tag…/0020-form.t :137: |
{ password => { }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :146: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i… |
adaptiveoptics/HTML-Tag…/0020-form.t :153: |
{ password => { }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :162: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i… |
adaptiveoptics/HTML-Tag…/0020-form.t :169: |
{ password => { }}, |
adaptiveoptics/HTML-Tag…/0020-form.t :177: |
is $form.render, '<form method="POST" name="form" action="/"><input name="username" id="form-username" type="text"><input name="password" i… |
afiskon/p6-sitemap-xml-parser…/01-parse.t :69: |
<loc>http://username:password@xn--d1abbgf6aiiy.xn--p1ai:8080/</loc> |
afiskon/p6-sitemap-xml-parser…/01-parse.t :84: |
loc => 'http://username:password@xn--d1abbgf6aiiy.xn--p1ai:8080/', |
araraloren/Net-FTP…/FTP.pm6 :541: |
Ftp user's password. If password is not given or a empty string, and the user is anonymous, anonymous@ will be |
araraloren/Net-FTP…/FTP.pm6 :542: |
the password of user. |
araraloren/perl6-app-snippet…/LICENSE :340: |
source code form), and must require no special password or key for |
azawawi/farabi6…/html-hint.js :168: |
type: ["hidden", "text", "search", "tel", "url", "email", "password", "datetime", "date", "month", |
azawawi/farabi6…/sql.js :296: |
keywords: set(sqlKeywords + "accessible action add after algorithm all analyze asensitive at authors auto_increment autocommit avg avg_row_length… |
azawawi/farabi6…/sql.js :312: |
keywords: set(sqlKeywords + "accessible action add after algorithm all always analyze asensitive at authors auto_increment autocommit avg avg_row… |
azawawi/farabi6…/jquery.min.js :2: |
!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error(… |
azawawi/farabi6…/jquery.min.js :4: |
},removeAttr:function(a,b){var c,d,e=0,f=b&&b.match(E);if(f&&1===a.nodeType)while(c=f[e++])d=n.propFix[c] |
azawawi/farabi6…/form.min.css :10: |
*/.ui.form{position:relative;max-width:100%}.ui.form>p{margin:1em 0}.ui.form .field,.ui.form .fields .field{clear:both;margin:0 0 1em}.ui.form .fiel… |
azawawi/farabi6…/reset.min.css :10: |
*/*,:after,:before{box-sizing:inherit}html{box-sizing:border-box}input[type=text],input[type=email],input[type=search],input[type=password… |
azawawi/farabi6…/semantic.min.css :11: |
@import 'https://fonts.googleapis.com/css?family=Lato:400,700,400italic,700italic\&subset=latin';\*,:after,:before{box-sizing:inherit}html{box-sizing:b… |
azawawi/perl6-electron…/rpcauth.js :23: |
* hash: string user password |
azawawi/perl6-electron…/rpcclient.js :15: |
* hash: string rpc password (hash), default null |
azawawi/perl6-electron…/rpcclient.js :136: |
* hash: string user password, default null |
azawawi/perl6-electron…/optsclient.js :10: |
// string rpc password (hash), default null |
azawawi/perl6-libzip…/NativeCall.pm6 :108: |
# N No password provided |
azawawi/perl6-libzip…/NativeCall.pm6 :110: |
# N Wrong password provided |
azawawi/perl6-libzip…/NativeCall.pm6 :440: |
#ZIP_EXTERN int zip_set_default_password(struct zip *, const char *); |
azawawi/perl6-libzip…/NativeCall.pm6 :441: |
sub zip_set_default_password(Pointer[zip] # zip* |
azawawi/perl6-net-curl…/README.md :13: |
user+password authentication (Basic, Digest, NTLM, Negotiate, Kerberos), |
azawawi/perl6-net-curl…/anyauthput.c :160: |
/* set user name and password for the authentication */ |
azawawi/perl6-net-curl…/anyauthput.c :161: |
curl_easy_setopt(curl, CURLOPT_USERPWD, "user:password"); |
azawawi/perl6-net-curl…/curlx.c :101: |
" -envpass arg - environement variable which content the tia private key password", |
azawawi/perl6-net-curl…/imap.c :32: |
/* Set username and password */ |
azawawi/perl6-net-curl…/imap.c :33: |
curl_easy_setopt(curl, CURLOPT_USERPWD, "user:password"); |
azawawi/perl6-net-curl…/pop3s.c :32: |
/* Set username and password */ |
azawawi/perl6-net-curl…/pop3s.c :33: |
curl_easy_setopt(curl, CURLOPT_USERPWD, "user:password"); |
azawawi/perl6-net-curl…/pop3slist.c :32: |
/* Set username and password */ |
azawawi/perl6-net-curl…/pop3slist.c :33: |
curl_easy_setopt(curl, CURLOPT_USERPWD, "user:password"); |
azawawi/perl6-net-curl…/smtp-tls.c :114: |
* authentication details (user names and passwords) from being "snooped" |
azawawi/perl6-net-curl…/smtp-tls.c :115: |
* on the network. Here is how the user name and password are provided: */ |
azawawi/perl6-net-curl…/synctime.c :181: |
char *proxy_user_password) |
azawawi/perl6-net-curl…/synctime.c :186: |
if (strlen(proxy_user_password) > 0) |
azawawi/perl6-net-curl…/synctime.c :187: |
curl_easy_setopt(curl, CURLOPT_PROXYUSERPWD, proxy_user_password); |
azawawi/perl6-net-curl…/synctime.c :229: |
" password.\n"); |
azawawi/perl6-net-curl…/synctime.c :243: |
conf->proxy_user[i] = 0; /* Clean up password from memory */ |
azawawi/perl6-odoo-client…/README.md :19: |
password => "<password>" |
azawawi/perl6-odoo-client…/Odoo-Client.md :20: |
password => "<password>" |
azawawi/perl6-odoo-client…/Odoo-Client.md :47: |
### login(Str :$database, Str :$username, Str :$password) { |
azawawi/perl6-odoo-client…/01-login.pl6 :18: |
password => "123" |
azawawi/perl6-odoo-client…/02-module.pl6 :18: |
password => "123" |
azawawi/perl6-odoo-client…/Client.pm6 :26: |
password => "<password>" |
azawawi/perl6-odoo-client…/Client.pm6 :44: |
has Str $!password; |
azawawi/perl6-odoo-client…/Client.pm6 :76: |
=head3 login(Str :$database, Str :$username, Str :$password) { |
azawawi/perl6-odoo-client…/Client.pm6 :80: |
method login(Str :$database, Str :$username, Str :$password) { |
azawawi/perl6-odoo-client…/Client.pm6 :84: |
args => [$database, $username, $password] |
azawawi/perl6-odoo-client…/Client.pm6 :89: |
$!password = $password; |
azawawi/perl6-odoo-client…/Client.pm6 :101: |
my @args = [$!database, $!uid, $!password, $model, $method, $method-args]; |
azawawi/perl6-parse-selenese…/README.md :36: |
<td>name=password</td> |
azawawi/perl6-parse-selenese…/login.html :26: |
<td>name=password</td> |
azawawi/perl6-parse-selenese…/02-test-case.t :35: |
<td>name=password</td> |
bbkr/jsonrpc…/README.md :116: |
return 'username', 'password'; |
bduggan/aws-s3-perl6…/README.md :13: |
my $access-key-id = 'password1'; |
bioduds/EC-Grammars-DIG…/LICENSE :341: |
source code form), and must require no special password or key for |
bioduds/EC-Grammars-DIG…/DIG.pm6 :411: |
source code form), and must require no special password or key for |
cbk/WebService-GoogleDyDNS…/README.md :27: |
multi sub MAIN( :$domain, :$login, :$password ) { |
cbk/WebService-GoogleDyDNS…/README.md :29: |
my $updater = WebService::GoogleDyDNS.new(domainName => $domain, login => $login , password => $password ); |
cbk/WebService-GoogleDyDNS…/ipUpdater.p6 :37: |
multi sub MAIN( :$domain, :$login, :$password ) { |
cbk/WebService-GoogleDyDNS…/ipUpdater.p6 :39: |
my $updater = WebService::GoogleDyDNS.new(domainName => $domain, login => $login , password => $password ); |
cbk/WebService-GoogleDyDNS…/GoogleDyDNS.pm6 :19: |
has %.password is rw; |
cbk/WebService-GoogleDyDNS…/GoogleDyDNS.pm6 :27: |
token line { <domainKey> \t <lastipKey> \t <loginKey> \t <passwordKey> }; |
cbk/WebService-GoogleDyDNS…/GoogleDyDNS.pm6 :31: |
token passwordKey { 'password' \t <PASSWORD> }; |
cbk/WebService-GoogleDyDNS…/GoogleDyDNS.pm6 :50: |
%.password = 'password' => $match<line><passwordKey><PASSWORD>; |
cbk/WebService-GoogleDyDNS…/GoogleDyDNS.pm6 :51: |
@dataSet[$elemNum] = ( %.domainName ~ "\t" ~ %.lastIP ~ "\t" ~ %.login ~ "\t" ~ %.password); |
cbk/WebService-GoogleDyDNS…/GoogleDyDNS.pm6 :88: |
$webAgent.auth(self.login.values(), self.password.values() ); |
cbk/WebService-GoogleDyDNS…/GoogleDyDNS.pm6 :101: |
$fh.say( self.password.values() ); |
croservices/cro-core…/Uri.pm6 :255: |
method password(--> Str) { |
croservices/cro-core…/uri.t :32: |
my $long-name = 'abc://username:password@example.com:123/path/data?key=value&key2=value2#fragid1'; |
croservices/cro-core…/uri.t :269: |
!*.password.defined; |
croservices/cro-core…/uri.t :280: |
!*.password.defined; |
croservices/cro-core…/uri.t :291: |
*.password eq 's3cr3t'; |
croservices/cro-core…/uri.t :302: |
*.password eq Q{()*+,;=~}; |
croservices/cro-core…/uri.t :317: |
*.password eq "\c[KATAKANA LETTER A]\c[KATAKANA LETTER A]"; |
croservices/cro-http…/Client.pm6 :238: |
if (%!auth<username>:exists) && (%!auth<password>:exists) { |
croservices/cro-http…/Client.pm6 :526: |
my $hash = encode-base64("{%data<username>}:{%data<password>}", :str); |
croservices/cro-http…/http-client.t :401: |
password => "Password", |
croservices/cro-http…/http-client.t :408: |
password => 'Password'}); |
croservices/cro-http…/http-client.t :416: |
password => 'Password'}) -> $resp { |
croservices/cro…/cro-http-client.md :295: |
username and a password. |
croservices/cro…/cro-http-client.md :299: |
password => $password |
croservices/cro…/cro-http-client.md :307: |
Failing to pass precisely either `username` and `password` *or* `bearer` will |
croservices/cro…/cro-http-client.md :316: |
password => $password, |
croservices/cro…/cro-uri.md :34: |
## password |
croservices/cro…/cro-uri.md :36: |
Method retrieves value of `password` part of Uri. In case if name was |
croservices/cro…/app.js :36656: |
password: true, |
cspencer/perl6-posix…/README.md :19: |
* getpwnam(Str $username) - Returns an anonymous class containing the broken-out fields of the record in the password database (e.g., th… |
cspencer/perl6-posix…/README.md :21: |
* getgrnam(Str $group) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group name. The class has the following accessor methods: name, password, gid, and members. |
cspencer/perl6-posix…/README.md :23: |
* getgrgid(gid_t $gid) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group id. The class has the following accessor methods: name, password, gid, and members. |
cspencer/perl6-posix…/POSIX.pm6 :11: |
has Str $.password; |
cspencer/perl6-posix…/POSIX.pm6 :21: |
has Str $.password; |
cspencer/perl6-posix…/POSIX.pm6 :36: |
has Str $.password; |
cspencer/perl6-posix…/09-getpwnam.t :18: |
ok($pwnam.password.isa(Str), ".password isa Str"); |
cspencer/perl6-posix…/11-getgrnam.t :15: |
ok($group.password.isa(Str), ".password isa Str"); |
fayland/perl6-WebService-GitHub…/README.md :39: |
* `auth_login` & `auth_password` |
fayland/perl6-WebService-GitHub…/README.md :123: |
auth_password => 'password' |
fayland/perl6-WebService-GitHub…/create_access_token.pl :9: |
auth_password => %*ENV<GITHUB_PASS> |
fayland/perl6-WebService-GitHub…/Role.pm :24: |
has $.auth_password; |
fayland/perl6-WebService-GitHub…/Role.pm :80: |
if $.auth_login.defined && $.auth_password.defined { |
fayland/perl6-WebService-GitHub…/Role.pm :82: |
Authorization => "Basic " ~ MIME::Base64.encode-str("{$.auth_login}:{$.auth_password}") |
finanalyst/p6-inform…/README.md :85: |
An entry widget can mask input, as in password requests, by adding _pw or -pw onto the |
finanalyst/p6-inform…/README.md :88: |
my $login = inform('Please supply your username and password', |
finanalyst/p6-inform…/README.md :92: |
if $login.response eq 'OK' { say "user name is \<{$login.data<un>}> and password is \<{$login.data<pw_pw>}>" }; |
finanalyst/p6-inform…/example.p6 :77: |
An entry widget can mask input, as in password requests, by adding _pw or -pw onto the |
finanalyst/p6-inform…/example.p6 :80: |
my $login = inform('Please supply your username and password', |
finanalyst/p6-inform…/example.p6 :84: |
if $login.response eq 'OK' { say "user name is \<{$login.data<un>}> and password is \<{$login.data<pw_pw>}>" }; |
finanalyst/p6-inform…/Informative.pm6 :90: |
# treat passwords differently |
gabrielash/perl6-zmq…/SocketOptions.pm :46: |
, plain-password => %(code => ZMQ_PLAIN_PASSWORD, get => True, set => True, type => Str, size => 255) |
gfldex/perl6-meta6-bin…/README.md :101: |
instead of a password. |
gfldex/perl6-pod-to-bigpage…/html.xhtml :10054: |
[passwords] |
gfldex/perl6-pod-to-bigpage…/html.xhtml :10055: |
jack=password1 |
gfldex/perl6-pod-to-bigpage…/html.xhtml :10074: |
# ("passwords" => {"jack" => "password1", "joy" => "muchmoresecure123"}, |
gfldex/perl6-pod-to-bigpage…/html.xhtml :10361: |
[passwords] |
gfldex/perl6-pod-to-bigpage…/html.xhtml :10362: |
jack = password1 |
gfldex/perl6-typesafe-xhtml-writer…/xhtml1-strict.xsd :1672: |
<xs:enumeration value="password"/> |
gfldex/perl6-xhtml-writer…/xhtml1-strict.xsd :1672: |
<xs:enumeration value="password"/> |
goneri/p6-Email-Notmuch…/LICENSE :340: |
source code form), and must require no special password or key for |
jnthn/p6-docker-file…/parse-complex.t :38: |
# Setup a password |
jnthn/p6-http-hpack…/README.md :21: |
name => 'password', |
jnthn/p6-http-hpack…/examples.t :67: |
[ header('password', 'secret', HTTP::HPACK::Indexing::NeverIndexed) ], |
jnthn/p6-http-hpack…/examples.t :68: |
'decode password: secret'; |
jnthn/p6-http-hpack…/examples.t :70: |
[ header('password', 'secret', HTTP::HPACK::Indexing::NeverIndexed) ]), |
jnthn/p6-http-hpack…/examples.t :73: |
'encode password: secret (never indexed)'; |
jnthn/p6-ssh-libssh…/README.md :8: |
private key; you can also provide a private key file or a password) |
jnthn/p6-ssh-libssh…/forward.p6 :10: |
Int :$port = 22, Str :$password, Str :$private-key-file) { |
jnthn/p6-ssh-libssh…/forward.p6 :11: |
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$password); |
jnthn/p6-ssh-libssh…/reverse-forward.p6 :11: |
Int :$port = 22, Str :$password, Str :$private-key-file) { |
jnthn/p6-ssh-libssh…/reverse-forward.p6 :12: |
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$password); |
jnthn/p6-ssh-libssh…/run-command.p6 :3: |
sub MAIN(Str $host, Str $user, Int :$port = 22, Str :$password, Str :$private-key-file, *@command) { |
jnthn/p6-ssh-libssh…/run-command.p6 :4: |
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$private-key-file, :$password); |
jnthn/p6-ssh-libssh…/scp-download.p6 :3: |
sub MAIN($host, $user, $remote, $local, Int :$port, Str :$password) { |
jnthn/p6-ssh-libssh…/scp-download.p6 :4: |
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$password); |
jnthn/p6-ssh-libssh…/scp-upload.p6 :3: |
sub MAIN($host, $user, $local, $remote, Int :$port, Str :$password) { |
jnthn/p6-ssh-libssh…/scp-upload.p6 :4: |
my $session = await SSH::LibSSH.connect(:$host, :$user, :$port, :$password); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :191: |
has Str $!password; |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :201: |
Str :$!private-key-file = Str, Str :$!password = Str, |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :420: |
if $method eq "key" and defined $!password { |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :421: |
# Public Key authentication failed. We'll try using a password now. |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :422: |
self!connect-auth-user-password($v); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :430: |
method !connect-auth-user-password($v) { |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :432: |
my &auth-function = { ssh_userauth_password($s, Str, $!password) } |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :435: |
self!process-auth-outcome($auth-outcome, $v, :method<password>); |
jnthn/p6-ssh-libssh…/LibSSH.pm6 :442: |
self!process-auth-outcome($auth-outcome, $v, :method<password>); |
jnthn/p6-ssh-libssh…/Raw.pm6 :115: |
sub ssh_userauth_password(SSHSession, Str, Str) returns int32 |
jonathanstowe/Audio-Icecast…/Documentation.md :43: |
method new(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$password = 'hackme') |
jonathanstowe/Audio-Icecast…/Documentation.md :45: |
The constructor for the class supplies defaults that will work with a stock configuration on the local machine, this probably isn't what you want, be… |
jonathanstowe/Audio-Icecast…/list-clients :7: |
sub MAIN(Str :$mount!, Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'admin', Str :$password = 'hackme') { |
jonathanstowe/Audio-Icecast…/list-clients :8: |
my $ai = Audio::Icecast.new(:$host, :$port, :$user, :$password); |
jonathanstowe/Audio-Icecast…/update-metadata :7: |
sub MAIN(Str :$mount!, Str :$title!, Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'admin', Str :$password = 'hackme') { |
jonathanstowe/Audio-Icecast…/update-metadata :8: |
my $ai = Audio::Icecast.new(:$host, :$port, :$user, :$password); |
jonathanstowe/Audio-Icecast…/Icecast.pm :57: |
method new(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$password = 'hackme') |
jonathanstowe/Audio-Icecast…/Icecast.pm :61: |
want, because at the very least you changed the password right? If you |
jonathanstowe/Audio-Icecast…/Icecast.pm :386: |
submethod BUILD(Str :$host = 'localhost', Int :$port = 8000, Bool :$secure = False, Str :$user = 'admin', Str :$password = 'hackme') { |
jonathanstowe/Audio-Icecast…/Icecast.pm :388: |
$!ua.auth($user, $password); |
jonathanstowe/Audio-Icecast…/025-status-online.t :12: |
my $password = %*ENV<ICECAST_TEST_PASS> // 'hackme'; |
jonathanstowe/Audio-Icecast…/025-status-online.t :17: |
lives-ok { $obj = Audio::Icecast.new(:$host, :$port, :$user, :$password) }, "get object with full credentials"; |
jonathanstowe/Audio-Libshout…/Documentation.md :11: |
my $shout = Audio::Libshout.new(password => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3); |
jonathanstowe/Audio-Libshout…/Documentation.md :60: |
If the stream is not already connected this will open the stream so that data can be sent. The `host`, `port`, `user` and `password` and ot… |
jonathanstowe/Audio-Libshout…/Documentation.md :157: |
password |
jonathanstowe/Audio-Libshout…/Documentation.md :160: |
The password that is used to authenticate with the server. There is no default and this must be provided before connecting. |
jonathanstowe/Audio-Libshout…/README.md :60: |
* SHOUT_TEST_PASS - the password to authenticate with. The default is 'hackme' but you changed that right? |
jonathanstowe/Audio-Libshout…/streamfile :7: |
multi sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$password!, Str :$mount = '/stream', Str :$file!, *%extra) { |
jonathanstowe/Audio-Libshout…/streamfile :25: |
my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$password, :$mount, :$format, |
jonathanstowe/Audio-Libshout…/streamfile-encode :10: |
multi sub MAIN(Str :$host = 'localhost', Int :$port = 8000, Str :$user = 'source', Str :$password!, Int :$bitrate = 128, Int :$quality = 5, Int :$bufsize = 512, Str :$mount = '/stream', Str :$file!, *%extra) { |
jonathanstowe/Audio-Libshout…/streamfile-encode :30: |
my $shout = Audio::Libshout.new(:$host, :$port, :$user, :$password, :$mount, :$format, |
jonathanstowe/Audio-Libshout…/synopsis :3: |
my $shout = Audio::Libshout.new(password => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3); |
jonathanstowe/Audio-Libshout…/Libshout.pm :15: |
my $shout = Audio::Libshout.new(password => 'hackme', mount => '/foo', format => Audio::Libshout::Format::MP3); |
jonathanstowe/Audio-Libshout…/Libshout.pm :81: |
that data can be sent. The C<host>, C<port>, C<user> and C<password> |
jonathanstowe/Audio-Libshout…/Libshout.pm :228: |
=head2 password |
jonathanstowe/Audio-Libshout…/Libshout.pm :230: |
The password that is used to authenticate with the server. There is no default and this |
jonathanstowe/Audio-Libshout…/Libshout.pm :476: |
sub shout_set_password(Shout, Str) returns int32 is native('shout',v3) { * } |
jonathanstowe/Audio-Libshout…/Libshout.pm :477: |
sub shout_get_password(Shout) returns Str is native('shout',v3) { * } |
jonathanstowe/Audio-Libshout…/Libshout.pm :479: |
method password() returns Str is rw is accessor-facade(&shout_get_password, &shout_set_password, &manage, &check) { } |
jonathanstowe/Audio-Libshout…/Libshout.pm :584: |
has Shout $!shout handles <host port user password protocol format mount dumpfile agent public name url genre description>; |
jonathanstowe/Audio-Libshout…/010-parameters.t :14: |
{ name => "password", value => 'hackme' }, |
jonathanstowe/Audio-Libshout…/020-open.t :35: |
throws-like { $obj.open }, X::ShoutError, "open without password should fail"; |
jonathanstowe/Audio-Libshout…/020-open.t :37: |
$obj.password = 'S0me8oGusP455w0RD!%'; |
jonathanstowe/Audio-Libshout…/020-open.t :39: |
throws-like { $obj.open }, rx/"The server refused login, probably because authentication failed"/, "open with wrong password should fail"; |
jonathanstowe/Audio-Libshout…/020-open.t :41: |
$obj.password = $pass; |
jonathanstowe/Audio-Libshout…/020-open.t :43: |
lives-ok { $obj.open }, "open with good password"; |
jonathanstowe/Audio-Libshout…/020-open.t :55: |
lives-ok { $obj = Audio::Libshout.new(user => $user, password => $pass, host => $host, port => $port, mount => $mount) }, "new to test sending " ~ $test<file>; |
jonathanstowe/Audio-Libshout…/020-open.t :81: |
lives-ok { $obj = Audio::Libshout.new(user => $user, password => $pass, host => $host, port => $port, mount => $mount) }, "new to test sending " ~ $test<file>; |
jonathanstowe/Audio-Liquidsoap…/README.md :22: |
output.icecast(%mp3,host="localhost",port=8000,password="hackme",mount="radio", radio) |
jonathanstowe/Audio-Liquidsoap…/request.liq :11: |
output.icecast(%mp3, host="localhost",port=8000,password="hackme",mount="radio", radio) |
jonathanstowe/Audio-Liquidsoap…/simple.liq :15: |
output.icecast(%mp3, host="localhost",port=8000,password="hackme",mount="radio", radio) |
jonathanstowe/Crypt-Libcrypt…/META6.json :21: |
"password" |
jonathanstowe/Crypt-Libcrypt…/README.md :15: |
passwords on a Unix system. |
jonathanstowe/Crypt-Libcrypt…/README.md :17: |
Because this is intended primarily for the encryption of passwords and is |
jonathanstowe/Crypt-Libcrypt…/README.md :21: |
In order to check whether a password entered by a user is correct it should |
jonathanstowe/Crypt-Libcrypt…/README.md :22: |
be encrypted using the stored encrypted password as the "salt" - the result |
jonathanstowe/Crypt-Libcrypt…/README.md :23: |
will be the same as the stored crypt text if the password is the same. |
jonathanstowe/Crypt-Libcrypt…/Libcrypt.pm :19: |
my $crypted = crypt($password, $salt ); |
jonathanstowe/Crypt-Libcrypt…/Libcrypt.pm :35: |
used to encrypt passwords on a Unix system. |
jonathanstowe/Crypt-Libcrypt…/Libcrypt.pm :37: |
Because this is intended primarily for the encryption of passwords and |
jonathanstowe/Crypt-Libcrypt…/Libcrypt.pm :41: |
In order to check whether a password entered by a user is correct it |
jonathanstowe/Crypt-Libcrypt…/Libcrypt.pm :42: |
should be encrypted using the stored encrypted password as the "salt" |
jonathanstowe/Crypt-Libcrypt…/Libcrypt.pm :43: |
- the result will be the same as the stored crypt text if the password |
jonathanstowe/Lumberjack-Application…/Proxy.pm :34: |
method new(:$url!, :$username, :$password) |
jonathanstowe/Lumberjack-Application…/Proxy.pm :40: |
Additionally if the C<username> and C<password> parameters |
jonathanstowe/Lumberjack-Application…/Proxy.pm :60: |
has Str $.password; |
jonathanstowe/Lumberjack-Application…/Proxy.pm :68: |
if $!username.defined && $!password.defined { |
jonathanstowe/Lumberjack-Application…/Proxy.pm :69: |
$!ua.auth($!username, $!password); |
jonathanstowe/META6…/projects.json :4047: |
"description" : "Easy bcrypt password hashing", |
jonathanstowe/META6…/projects.json :5340: |
"password" |
jonathanstowe/META6…/projects.json :11343: |
"description" : "Easy Argon2i password hashing", |
jonathanstowe/Monitor-Monit…/README.md :48: |
* ```MONIT_TEST_PASS``` - the password to authenticate (default ```monit```) |
jonathanstowe/Monitor-Monit…/Monit.pm :36: |
method new(Str :$host = 'localhost', Int :$port = 2812, Str :$username = 'admin', Str :$password = 'monit', Bool :$secure = False); |
jonathanstowe/Monitor-Monit…/Monit.pm :300: |
has Str $.password = 'monit'; |
jonathanstowe/Monitor-Monit…/Monit.pm :313: |
has Str $.password = 'monit'; |
jonathanstowe/Monitor-Monit…/Monit.pm :362: |
$!ua = UserAgent.new(:$!host, :$!port, :$!secure, :$!username, :$!password); |
jonathanstowe/Monitor-Monit…/Monit.pm :363: |
$!ua.auth($!username, $!password); |
jonathanstowe/Monitor-Monit…/040-live.t :12: |
my $password = %*ENV<MONIT_TEST_PASS> // 'monit'; |
jonathanstowe/Monitor-Monit…/040-live.t :17: |
lives-ok { $mon = Monitor::Monit.new(:$host, :$port, :$username, :$password) }, "new with credentials"; |
jonathanstowe/Pg-Notify…/README.md :51: |
* $PG_NOTIFY_PASS - the password to be used, (otherwise no password will be used.) |
jonathanstowe/Pg-Notify…/010-notify.t :19: |
%args<password> = $pw; |
jonathanstowe/Unix-Groups…/Groups.pm :79: |
=head2 password |
jonathanstowe/Unix-Groups…/Groups.pm :81: |
The password for the group if set, most modern systems place this in a |
jonathanstowe/Unix-Groups…/Groups.pm :97: |
has Str $.password; |
jonathanstowe/Unix-Groups…/Groups.pm :104: |
$!password = $pass; |
jonathanstowe/WebService-Soundcloud…/README.md :54: |
my $sc = WebService::Soundcloud.new(:$client-id,:$client-secret,:$username,:$password); |
jonathanstowe/WebService-Soundcloud…/Soundcloud.pm :55: |
my $sc = WebService::Soundcloud.new(:$client-id,:$client-secret,:$username,:$password); |
jonathanstowe/WebService-Soundcloud…/Soundcloud.pm :84: |
method new(Str :$!client-id!, Str :$!client-secret!, Str :$!redirect-uri, Str :$!scope, Str :$!username, Str :$!password, HTTP::UserAgent :$!ua ) |
jonathanstowe/WebService-Soundcloud…/Soundcloud.pm :89: |
application with Soundcloud. If C<username> and C<password> are provided then |
jonathanstowe/WebService-Soundcloud…/Soundcloud.pm :326: |
has Str $.password is rw; |
jonathanstowe/WebService-Soundcloud…/Soundcloud.pm :332: |
submethod BUILD(Str :$!client-id!, Str :$!client-secret!, Str :$!redirect-uri, Str :$!scope, Str :$!username, Str :$!password, HTTP::UserAgent :$!ua, *%opts) { |
jonathanstowe/WebService-Soundcloud…/Soundcloud.pm :382: |
if $!username && $!password { |
jonathanstowe/WebService-Soundcloud…/Soundcloud.pm :384: |
%params<password> = $!password; |
jonathanstowe/WebService-Soundcloud…/Soundcloud.pm :385: |
%params<grant_type> = 'password'; |
jonathanstowe/WebService-Soundcloud…/080-credentials.t :12: |
my $password = %*ENV{'SC_PASSWORD'}; |
jonathanstowe/WebService-Soundcloud…/080-credentials.t :14: |
if (defined $username && defined $password) |
jonathanstowe/WebService-Soundcloud…/080-credentials.t :33: |
password => $password |
jonathanstowe/p6-unix-privileges…/README.md :30: |
# once in the chroot access to the system password file is lost |
kalkin/License-Software…/AGPLv3.pm6 :333: |
source code form), and must require no special password or key for |
kalkin/License-Software…/GPLv3.pm6 :349: |
source code form), and must require no special password or key for |
kalkin/Net-XMPP…/XMPP.pm6 :19: |
method new(:$jid!, :$login, :$password, :$server, :$port = 5222, :$socket) { |
kalkin/Net-XMPP…/XMPP.pm6 :20: |
self.bless(:$jid, :$login, :$password, :$server, :$port, :$socket); |
kalkin/Net-XMPP…/XMPP.pm6 :54: |
submethod BUILD(:$!jid, :$login is copy, :$password, :$server, :$port, :$!socket){ |
kalkin/Net-XMPP…/XMPP.pm6 :72: |
self!do-negotiation($login, $password); |
kalkin/Net-XMPP…/XMPP.pm6 :75: |
method !auth($login, $password) { |
kalkin/Net-XMPP…/XMPP.pm6 :86: |
my $encoded = MIME::Base64.encode-str("\0$login\0$password"); |
kalkin/Net-XMPP…/XMPP.pm6 :121: |
method !do-negotiation($login, $password) { |
kalkin/Net-XMPP…/XMPP.pm6 :122: |
self!auth($login, $password); |
matiaslina/perl6-matrix-client…/bot.p6 :17: |
submethod BUILD(:$username!, :$password!, :$home-server!, :@room-ids!, :$on-event!) { |
matiaslina/perl6-matrix-client…/bot.p6 :23: |
$!client.login($!username, $password); |
matiaslina/perl6-matrix-client…/bot.p6 :67: |
sub MAIN(Str:D $username, Str:D $password, :$home-server = "https://matrix.deprecated.org") { |
matiaslina/perl6-matrix-client…/bot.p6 :71: |
password => $password, |
matiaslina/perl6-matrix-client…/Client.pm6 :41: |
type => "m.login.password", |
matiaslina/perl6-matrix-client…/Client.pm6 :43: |
password => $pass |
matiaslina/perl6-matrix-client…/Client.pm6 :74: |
method register($username, $password, Bool :$bind-email? = False) { |
matiaslina/perl6-matrix-client…/Client.pm6 :76: |
username => $username, password => $password, |
melezhik/remote-file…/README.md :34: |
## password |
melezhik/remote-file…/README.md :36: |
Sets password for resources with access restricted by http basic authentication. Optional, |
melezhik/remote-file…/RemoteFile.pm6 :25: |
$cmd ~= ':' ~ %args<password> if %args<password>.defined; |
melezhik/sparky…/README.md :247: |
pass: $dbpassword |
melezhik/sparky…/README.md :265: |
## Creating database user, password and schema |
melezhik/sparky…/sparky-runner.pl6 :222: |
password => %conf<database><pass>, |
melezhik/sparky…/sparky-web.pl6 :98: |
password => %conf<database><pass>, |
melezhik/sparky…/db-init.pl6 :33: |
password => %conf<database><pass>, |
melezhik/sparrowdo-chef-manager…/README.md :34: |
password => '123456', |
melezhik/sparrowdo-chef-manager…/README.md :56: |
## password |
melezhik/sparrowdo-chef-manager…/README.md :58: |
A chef user password. |
melezhik/sparrowdo-chef-manager…/Manager.pm6 :17: |
for 'user-id', 'name', 'email', 'password' -> $p { |
melezhik/sparrowdo-chef-manager…/Manager.pm6 :27: |
@params.push: %args<password>; |
melezhik/sparrowdo-chef-manager…/sparrowfile :12: |
password => '123456', |
melezhik/sparrowdo…/README.md :168: |
* ssh passwordless access on the remote host |
melezhik/sparrowdo…/README.md :169: |
* sudo (passwordless?) rights on remote host |
moritz/Grammar-ErrorReporting…/COPYING :343: |
source code form), and must require no special password or key for |
nkh/P6-Data-Dump-Tree…/README.md :737: |
1 = [passwords]\n jack=password1\n (+74)[0..113] |
nkh/P6-Data-Dump-Tree…/README.md :738: |
<section> [passwords]\n jack=password1\n (+29)[0..68] |
nkh/P6-Data-Dump-Tree…/README.md :739: |
<header> [passwords]\n[0..15] |
nkh/P6-Data-Dump-Tree…/README.md :740: |
<0> passwords[5..13] |
nkh/P6-Data-Dump-Tree…/README.md :741: |
<kvpair> jack=password1\n[16..38] |
nkh/P6-Data-Dump-Tree…/README.md :744: |
<identifier> password1[29..37] |
nkh/P6-Data-Dump-Tree…/README.md :745: |
<value> password1[29..37] |
nkh/P6-Data-Dump-Tree…/dhtml.pl :19: |
[passwords] |
nkh/P6-Data-Dump-Tree…/dhtml.pl :20: |
jack=password1 |
nkh/P6-Data-Dump-Tree…/match.pl :9: |
[passwords] |
nkh/P6-Data-Dump-Tree…/match.pl :10: |
jack=password1 |
nkh/P6-Data-Dump-Tree…/named_captures.pl :30: |
[passwords] |
nkh/P6-Data-Dump-Tree…/named_captures.pl :31: |
jack=password1 |
nkh/P6-Data-Dump-Tree…/Tree.pod :786: |
1 = [passwords]\n jack=password1\n (+74)[0..113] |
nkh/P6-Data-Dump-Tree…/Tree.pod :787: |
<section> [passwords]\n jack=password1\n (+29)[0..68] |
nkh/P6-Data-Dump-Tree…/Tree.pod :788: |
<header> [passwords]\n[0..15] |
nkh/P6-Data-Dump-Tree…/Tree.pod :789: |
<0> passwords[5..13] |
nkh/P6-Data-Dump-Tree…/Tree.pod :790: |
<kvpair> jack=password1\n[16..38] |
nkh/P6-Data-Dump-Tree…/Tree.pod :793: |
<identifier> password1[29..37] |
nkh/P6-Data-Dump-Tree…/Tree.pod :794: |
<value> password1[29..37] |
nkh/P6-Data-Dump-Tree…/13_named_captures.t :19: |
[passwords] |
nkh/P6-Data-Dump-Tree…/13_named_captures.t :20: |
jack=password1 |
nobodyinperson/perl6-fortran-grammar…/LICENSE :340: |
source code form), and must require no special password or key for |
p6-pdf/PDF-API6…/README.md :220: |
PDF::API6.open( "enc.pdf", :password<shh1> ); |
p6-pdf/PDF-API6…/pdf-burst.p6 :18: |
Str :$password = '', # |
p6-pdf/PDF-API6…/pdf-burst.p6 :28: |
my $doc = PDF::API6.open( $input, :$password); |
p6-pdf/PDF-API6…/pdf-burst.p6 :64: |
--pasword=str # provide a password for an encrypted PDF |
p6-pdf/PDF-API6…/pdf-revert.p6 :7: |
Str :$password = '', # |
p6-pdf/PDF-API6…/pdf-revert.p6 :16: |
my PDF::Reader $reader = PDF::API6.open( $input, :$password).reader; |
p6-pdf/PDF-p6…/README.md :320: |
- `pdf-rewriter.pl [--repair] [--rebuild] [--[un]compress] [--password=Xxx] <pdf-or-json-file-in> [<pdf-or-json-file-out>]` |
p6-pdf/PDF-p6…/README.md :357: |
To open an encrypted PDF document, specify either the user or owner password: `PDF.open( "enc.pdf", :password<ssh!>)` |
p6-pdf/PDF-p6…/README.md :362: |
Note that it's quite common to leave the user-password blank. This indicates that the document is readable by anyone, but may have restrictions on update, printing or copying of the PDF. |
p6-pdf/PDF-p6…/README.md :364: |
An encrypted PDF can be saved as JSON. It will remain encrypted and passwords may be required, to reopen it. |
p6-pdf/PDF-p6…/pdf-rewriter.pl :10: |
Str :$password = ''; # |
p6-pdf/PDF-p6…/pdf-rewriter.pl :29: |
$reader.open( $file-in, :$repair, :$password ); |
p6-pdf/PDF-p6…/Encrypt.pm :15: |
# |
p6-pdf/PDF-p6…/Encrypt.pm :49: |
has Str $.O is entry; # |
p6-pdf/PDF-p6…/Encrypt.pm :51: |
has Str $.U is entry; # |
p6-pdf/PDF-p6…/Crypt.pm :14: |
has uint8 @!O; # |
p6-pdf/PDF-p6…/Crypt.pm :17: |
has uint8 @!U; # |
p6-pdf/PDF-p6…/Crypt.pm :281: |
or die "unable to decrypt this PDF with the given password"; |
p6-pdf/PDF-p6…/Reader.pm :106: |
method !setup-crypt( Str :$password = '') { |
p6-pdf/PDF-p6…/Reader.pm :111: |
$!crypt.authenticate( $password ); |
p6-pdf/PDF-p6…/io-crypt.t :93: |
dies-ok { $crypt.authenticate( 'blah' ) }, "$case - bad password" unless $case eq 'Identity'; |
p6-pdf/PDF-p6…/io-crypt.t :94: |
lives-ok { $crypt.authenticate( $user-pass ) }, "$case - user password"; |
p6-pdf/PDF-p6…/io-crypt.t :96: |
lives-ok { $crypt.authenticate( $owner-pass, :owner); }, "$case - owner password"; |
p6-pdf/PDF-p6…/pdf-crypt-aes.t :20: |
dies-ok { $pdf = PDF.open: "t/pdf-crypt-aes.pdf", :password<dunno> }, "open encrypted with incorrect password - dies"; |
p6-pdf/PDF-p6…/pdf-crypt-aes.t :22: |
lives-ok { $pdf = PDF.open("t/pdf-crypt-aes.pdf", :password($user-pass)) }, 'open with user password - lives'; |
p6-pdf/PDF-p6…/pdf-crypt-aes.t :23: |
is $pdf.crypt.is-owner, False, 'open with user password - not is-owner'; |
p6-pdf/PDF-p6…/pdf-crypt-aes.t :24: |
is $pdf<Info><Author>, $expected-author, 'open with user password - .Info.Author'; |
p6-pdf/PDF-p6…/pdf-crypt-aes.t :25: |
is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with user password - contents'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :21: |
dies-ok { $pdf = PDF.open: "t/encrypt.pdf", :password<dunno> }, "open encrypted with incorrect password - dies"; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :23: |
lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.pdf", :password($user-pass)) }, 'open with user password - lives'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :24: |
is $pdf.crypt.is-owner, False, 'open with user password - not is-owner'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :25: |
is $pdf<Info><Author>, $expected-author, 'open with user password - .Info.Author'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :26: |
is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with user password - contents'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :28: |
lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.pdf", :password($owner-pass)) }, 'open with owner password - lives'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :29: |
is $pdf.crypt.is-owner, True, 'open with owner password - is-owner'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :30: |
is $pdf<Info><Author>, $expected-author, 'open with owner password - .Info.Author'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :31: |
is $pdf<Root><Pages><Kids>[0]<Contents>.decoded, $expected-contents, 'open with owner password - contents'; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :33: |
dies-ok { $pdf = PDF.open: "t/pdf-crypt-rc4.json", :password<dunno> }, "open encrypted json with incorrect password - dies"; |
p6-pdf/PDF-p6…/pdf-crypt-rc4.t :35: |
lives-ok { $pdf = PDF.open("t/pdf-crypt-rc4.json", :password($user-pass)) }, 'open json user password - lives'; |
perl6-community-modules/System-Passwd…/Passwd.pm6 :23: |
my $password_file = open '/etc/passwd', :r; |
perl6-community-modules/System-Passwd…/Passwd.pm6 :25: |
for $password_file.lines |
perl6-community-modules/System-Passwd…/User.pm6 :4: |
has $.password; |
perl6-community-modules/System-Passwd…/User.pm6 :15: |
my $password = @line[1]; |
perl6-community-modules/System-Passwd…/User.pm6 :22: |
return self.bless(:$username, :$password, :$uid, :$gid, :$fullname, :$home_directory, :$login_shell); |
perl6-community-modules/System-Passwd…/User.t :17: |
is $user.password, @line[2], "password is {@line[2]}"; |
perl6-community-modules/uri…/URI.pm :55: |
# the rfc refers to username:password as deprecated |
perl6-posix/README.md | * getpwnam(Str $username) - Returns an anonymous class containing the broken-out fields of the record in the password database (e.g., th… |
perl6-posix/README.md | * getgrnam(Str $group) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group name. The class has the following accessor methods: name, password, gid, and members. |
perl6-posix/README.md | * getgrgid(gid_t $gid) - Returns an anonymous class containing the broken-out fields of the record in the group database that matches the provided group id. The class has the following accessor methods: name, password, gid, and members. |
perl6/DBIish…/README.pod :74: |
C<database>, C<user> and C<password>. |
perl6/DBIish…/README.pod :81: |
and using the function C<get-secret> to obtain you password, you can: |
perl6/DBIish…/README.pod :83: |
my $dbh = DBIish.connect('Pg', :database<hierarchy>, :$user, password => get-secret()); |
perl6/DBIish…/README.pod :135: |
:database<blerg>, :user<myuser>, :$password); |
perl6/DBIish…/README.pod :138: |
C<host>, C<hostaddr>, C<port>, C<database> (or its alias C<dbname>), C<user>, C<password>, |
perl6/DBIish…/README.pod :213: |
:database<blerg>, :user<myuser>, :$password); |
perl6/DBIish…/README.pod :216: |
:database<blerg>, :user<myuser>, :$password); |
perl6/DBIish…/README.pod :222: |
my $dbh = DBIish.connect('Oracle', database => 'XE', :user<sysadm>, :password('secret')); |
perl6/DBIish…/mysql.p6 :13: |
my $dbh = DBIish.connect("mysql", :database<test>, :user<root>, :password<sa>, :RaiseError); |
perl6/DBIish…/pg.p6 :21: |
my $dbh = DBIish.connect("Pg", :database<postgres>, :user<postgres>, :password<sa>, :RaiseError); |
perl6/DBIish…/pg_arrays.p6 :25: |
:password<sa>, :RaiseError |
perl6/DBIish…/Oracle.pm6 :83: |
method connect(:database(:$dbname), :user(:$username), :$password, *%params) { |
perl6/DBIish…/Oracle.pm6 :100: |
:$password, |
perl6/DBIish…/Native.pm6 :335: |
utf8 $password, |
perl6/DBIish…/Native.pm6 :342: |
method Logon(OCIError :$errh, Int :$mode, :$dbname, :$username, :$password) { |
perl6/DBIish…/Native.pm6 :344: |
OCILogon2(self, $errh, $svch, |
perl6/DBIish…/Pg.pm6 :70: |
host hostaddr port dbname user password connect-timeout |
perl6/DBIish…/mysql.pm6 :23: |
|
perl6/DBIish…/Native.pm6 :185: |
Str $host, Str $user, Str $password, |
perl6/DBIish…/10-mysql.t :47: |
my $test_password = 'testpass'; |
perl6/DBIish…/10-mysql.t :76: |
#EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :89: |
DBIish.connect($mdriver, :user($test_user), :password($test_password), |
perl6/DBIish…/10-mysql.t :110: |
$dbh = DBIish.connect( $mdriver, :user($test_user), :password($test_password), |
perl6/DBIish…/10-mysql.t :179: |
# $dbh = DBIish.connect( $test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :255: |
$dbh = DBIish.connect( $mdriver, :user($test_user), :password($test_password), |
perl6/DBIish…/10-mysql.t :542: |
#EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :636: |
#EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :914: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :916: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :972: |
use vars qw($test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :978: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1074: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :1079: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1127: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :1132: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1220: |
use vars qw($test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :1224: |
EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1262: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :1269: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1337: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :1340: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1408: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :1413: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1463: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :1468: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1555: |
use vars qw($table $test_dsn $test_user $test_password $mdriver); |
perl6/DBIish…/10-mysql.t :1563: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1616: |
use vars qw($test_dsn $test_user $test_password $table); |
perl6/DBIish…/10-mysql.t :1619: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1691: |
use vars qw($got_warning $test_dsn $test_user $test_password $table); |
perl6/DBIish…/10-mysql.t :1694: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1779: |
ok ($dbh = DBI->connect($test_dsn, $test_user, $test_password)); |
perl6/DBIish…/10-mysql.t :1811: |
ok ($dbh = DBI->connect($test_dsn, $test_user, $test_password)); |
perl6/DBIish…/10-mysql.t :1859: |
use vars qw($test_dsn $test_user $test_password $table); |
perl6/DBIish…/10-mysql.t :1862: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :1945: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :1951: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2041: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2063: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2103: |
EVAL {$dbh2 = DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2248: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2256: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2329: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2339: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2392: |
my $dbh2 = DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2450: |
use vars qw($test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2453: |
EVAL {$dbh= DBI->connect( $test_dsn, $test_user, $test_password);}; |
perl6/DBIish…/10-mysql.t :2482: |
$dbh = DBI->connect( $test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2495: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2505: |
EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2556: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2559: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2629: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2632: |
EVAL {$dbh = DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2652: |
ok ($dbh = DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2758: |
use vars qw($table $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2763: |
EVAL {$dbh= DBI->connect($test_dsn, $test_user, $test_password, |
perl6/DBIish…/10-mysql.t :2794: |
use vars qw($table $mdriver $dbdriver $childPid $test_dsn $test_user $test_password); |
perl6/DBIish…/10-mysql.t :2831: |
$::test_password = $::test_password |
perl6/DBIish…/10-mysql.t :3145: |
'testpassword' => '', |
perl6/DBIish…/10-mysql.t :3152: |
$::test_password = $opt->{'testpassword'}; |
perl6/DBIish…/25-mysql-common.t :10: |
:password<testpass>, |
perl6/DBIish…/25-mysql-common.t :21: |
password 'testpass', all this can be create with: |
perl6/DBIish…/26-mysql-blob.t :7: |
my %con-parms = :database<dbdishtest>, :user<testuser>, :password<testpass>; |
perl6/DBIish…/27-mysql-datetime.t :7: |
my %con-parms = :database<dbdishtest>, :user<testuser>, :password<testpass>; |
perl6/DBIish…/45-oracle-common.t :10: |
password => 'Testpass', |
perl6/DBIish…/46-oracle-blob.t :8: |
%con-parms = :database<XE>, :username<TESTUSER>, :password<Testpass>; |
perl6/DBIish…/47-oracle-datetime.t :7: |
my %con-parms = :database<XE>, :username<TESTUSER>, :password<Testpass>; |
perl6/Perl6-MIME-Base64…/basic.t :37: |
is $mime.encode_base64("username:thisisnotmypassword"), 'dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==', 'Encoding "username:thisisnotmypassword"'; |
perl6/Perl6-MIME-Base64…/basic.t :38: |
is $mime.decode_base64("dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA=="), 'username:thisisnotmypassword', 'Decoding "username:thisisnotmypassword"'; |
perl6/doc…/nativecall.pod6 :574: |
UPDATE mysql.user SET password=password('sa') WHERE user = 'root'; |
perl6/doc…/regexes.pod6 :1033: |
[passwords] |
perl6/doc…/regexes.pod6 :1034: |
jack=password1 |
perl6/doc…/regexes.pod6 :1053: |
# OUTPUT: «("passwords" => {"jack" => "password1", "joy" => "muchmoresecure123"}, |
perl6/doc…/regexes.pod6 :1601: |
[passwords] |
perl6/doc…/regexes.pod6 :1602: |
jack = password1 |
perl6/doc…/jquery-3.1.1.min.js :2: |
!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)thr… |
perl6/doc…/jquery-3.1.1.min.js :4: |
void 0!==c?null===c?void r.removeAttr(a,b):e&&"set"in e&&void 0!==(d=e.set(a,c,b))?d:(a.setAttribute(b,c+""),c):e&&"get"in e&&null!==(d=e.get(a,b))?d… |
perl6/perl6-lwp-simple…/Simple.pm :69: |
my $pass = $auth<password>; |
perl6/perl6-lwp-simple…/Simple.pm :362: |
password => uri_unescape($user_info.split(':')[1] |
perl6/perl6-lwp-simple…/basic-auth.t :27: |
is(@url[4]<password>, 'Camelia', 'Basic auth info extracted correctly: pass'); |
ppentchev/perl6-Test-Deeply-Relaxed…/02-basic-data.t :22: |
is-deeply-relaxed {:a(42), :password('mellon')}, {password => 'mellon', a => 42}, 'non-empty hash - same'; |
ppentchev/perl6-Test-Deeply-Relaxed…/02-basic-data.t :23: |
isnt-deeply-relaxed {}, {:password('mellon')}, 'empty and non-empty hash - different'; |
retupmoca/P6-Net-AMQP…/AMQP.pm6 :12: |
has $.password = 'guest'; |
retupmoca/P6-Net-AMQP…/AMQP.pm6 :61: |
"\0"~$.login~"\0"~$.password, |
retupmoca/P6-Net-POP3…/README.md :14: |
$pop.apop-login("username", "password"); |
retupmoca/P6-Net-POP3…/README.md :17: |
$pop.pass("password"); |
retupmoca/P6-Net-POP3…/README.md :28: |
$pop.auth("username", "password"); # tries apop, then falls back to user/pass |
retupmoca/P6-Net-POP3…/README.md :57: |
- `auth($username, $password)` |
retupmoca/P6-Net-POP3…/Simple.pm6 :50: |
method auth($username, $password) { |
retupmoca/P6-Net-POP3…/Simple.pm6 :53: |
$response = $.raw.apop-login($username, $password); |
retupmoca/P6-Net-POP3…/Simple.pm6 :60: |
$response = $.raw.pass($password); |
retupmoca/P6-Net-SMTP…/README.md :23: |
$client.auth($username, $password); |
retupmoca/P6-Net-SMTP…/README.md :68: |
- `auth($username, $password, :@methods, :@disallow, :$force)` |
retupmoca/P6-Net-SMTP…/README.md :70: |
Authenticates with the SMTP server with the given $username and $password. |
retupmoca/P6-Net-SMTP…/README.md :131: |
- `auth-login($username, $password)` |
retupmoca/P6-Net-SMTP…/README.md :132: |
- `auth-plain($username, $password)` |
retupmoca/P6-Net-SMTP…/Raw.pm6 :80: |
method auth-login($username, $password) { |
retupmoca/P6-Net-SMTP…/Raw.pm6 :84: |
my $encoded = MIME::Base64.encode-str($password); |
retupmoca/P6-Net-SMTP…/Raw.pm6 :91: |
method auth-plain($username, $password) { |
retupmoca/P6-Net-SMTP…/Raw.pm6 :92: |
my $encoded = MIME::Base64.encode-str("$username\0$username\0$password"); |
retupmoca/P6-Net-SMTP…/Raw.pm6 :96: |
method auth-cram-md5($username, $password) { |
retupmoca/P6-Net-SMTP…/Raw.pm6 :104: |
my $encoded = MIME::Base64.encode-str($username ~ " " ~ hmac-hex($password, $data, &md5)); |
retupmoca/P6-Net-SMTP…/Simple.pm6 :106: |
method auth($username, $password, :$methods is copy, :$disallow, :$force) { |
retupmoca/P6-Net-SMTP…/Simple.pm6 :122: |
when "CRAM-MD5" { $response = $.smtp-raw.auth-cram-md5($username, $password); } |
retupmoca/P6-Net-SMTP…/Simple.pm6 :123: |
when "PLAIN" { $response = $.smtp-raw.auth-plain($username, $password); } |
retupmoca/P6-Net-SMTP…/Simple.pm6 :124: |
when "LOGIN" { $response = $.smtp-raw.auth-login($username, $password); } |
retupmoca/P6-Net-SMTP…/03-auth.t :50: |
ok $client.auth('user@example.com', 'password', :methods("CRAM-MD5")), 'CRAM-MD5 auth'; |
salortiz/DBDish-ODBC…/01-basic.t :8: |
MySQL => { :uid<testuser>, :password<testpass> }, |
scmorrison/uzu…/navigation.mustache :19: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/navigation.tt :19: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/about-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/about.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/fiji-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/fiji.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/index-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/index.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/index-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/index.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/related-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/related.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/themepartial-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/themepartial.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/about-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/about.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/fiji-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/fiji.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/index-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/index.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/index-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/index.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/related-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/related.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/themepartial-ja.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scmorrison/uzu…/themepartial.html :36: |
<input type="password" placeholder="Password" class="form-control"> |
scovit/perl6-IRC-Async…/README.md :79: |
password => (Str), |
scovit/perl6-IRC-Async…/Async.pm6 :10: |
has Str $.password; |
scovit/perl6-IRC-Async…/Async.pm6 :44: |
push @connect-messages, $.print("PASS $!password\n") if $!password.defined; |
scriptkitties/p6-mpd-client…/Connection.pm6 :25: |
sub mpd-password ( |
scriptkitties/p6-mpd-client…/Connection.pm6 :26: |
Str $password, |
scriptkitties/p6-mpd-client…/Connection.pm6 :30: |
mpd-response-ok(mpd-send("password", $password, $socket)); |
sergot/http-useragent…/UserAgent.pm6 :40: |
has $.auth_password; |
sergot/http-useragent…/UserAgent.pm6 :93: |
method auth(Str $login, Str $password) { |
sergot/http-useragent…/UserAgent.pm6 :95: |
$!auth_password = $password; |
sergot/http-useragent…/UserAgent.pm6 :403: |
$request.field(Authorization => basic-auth-token($!auth_login,$!auth_password)); |
sergot/http-useragent…/UserAgent.pm6 :408: |
$!auth_login.defined && $!auth_password.defined; |
sergot/http-useragent…/UserAgent.pm6 :506: |
method auth(HTTP::UserAgent:, Str $login, Str $password) |
sergot/http-useragent…/UserAgent.pm6 :508: |
Sets username and password needed to HTTP Auth. |
sergot/http-useragent…/085-auth.t :14: |
is $ua.auth_password, 'TEST', "password got set okay"; |
skaji/perl6-CPAN-Uploader-Tiny…/Tiny.pm6 :9: |
has $.password; |
skaji/perl6-CPAN-Uploader-Tiny…/Tiny.pm6 :12: |
submethod BUILD(:$!url, :$!user, :$!password, :$!agent) { |
skaji/perl6-CPAN-Uploader-Tiny…/Tiny.pm6 :23: |
self.new(user => %config<user>, password => %config<password>); |
skaji/perl6-CPAN-Uploader-Tiny…/Tiny.pm6 :47: |
%config<password> or die "missing password in $file"; |
skaji/perl6-CPAN-Uploader-Tiny…/Tiny.pm6 :63: |
my $url = $!url.subst('//', "//{$.user}:{$.password}@"); |
skinkade/p6-Crypt-Bcrypt…/META6.json :7: |
"description" : "Easy bcrypt password hashing", |
skinkade/p6-Crypt-Bcrypt…/README.md :4: |
Easy `bcrypt` password hashing in Perl6. |
skinkade/p6-Crypt-Bcrypt…/README.md :14: |
> my $hash = bcrypt-hash("password") |
skinkade/p6-Crypt-Bcrypt…/README.md :17: |
> bcrypt-match("password", $hash) |
skinkade/p6-Crypt-Bcrypt…/README.md :23: |
> bcrypt-hash("password", :rounds(15)) |
skinkade/p6-Crypt-Bcrypt…/LINKS :9: |
Unix Seventh Edition Manual, Volume 2: the password scheme (1978): |
skinkade/p6-Crypt-Bcrypt…/LINKS :11: |
http://plan9.bell-labs.com/7thEdMan/vol2/password |
skinkade/p6-Crypt-Bcrypt…/LINKS :14: |
password shadowing scheme. This includes a PAM module which |
skinkade/p6-Crypt-Bcrypt…/LINKS :15: |
supersedes pam_unix and uses the password hashing framework provided |
skinkade/p6-Crypt-Bcrypt…/LINKS :16: |
with crypt_blowfish when setting new passwords. |
skinkade/p6-Crypt-Bcrypt…/LINKS :20: |
pam_passwdqc, a password strength checking and policy enforcement |
skinkade/p6-Crypt-Bcrypt…/LINKS :21: |
module for PAM-aware password changing programs: |
skinkade/p6-Crypt-Bcrypt…/LINKS :25: |
John the Ripper password cracker: |
skinkade/p6-Crypt-Bcrypt…/PERFORMANCE :21: |
The numbers for password cracking are 2 to 10% higher than those for |
skinkade/p6-Crypt-Bcrypt…/README :1: |
This is an implementation of a password hashing method, provided via the |
skinkade/p6-Crypt-Bcrypt…/README :15: |
make your system use the new password hashing algorithm. Changes to |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :22: |
\- password hashing |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :204: |
can't fail, when both setting new passwords and authenticating against |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :205: |
existing password hashes. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :291: |
user passwords for storage and authentication; |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :294: |
It is important to understand that password hashing is not a replacement |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :295: |
for strong passwords. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :296: |
It is always possible for an attacker with access to password hashes |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :297: |
to try guessing candidate passwords against the hashes. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :298: |
There are, however, certain properties a password hashing method may have |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :307: |
The ability to try candidate passwords against multiple hashes at the |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :311: |
The use of pre-hashed lists of candidate passwords. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :315: |
have the same or different passwords without actually having to guess |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :316: |
one of the passwords. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :319: |
candidate passwords. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :320: |
Thus, the computational cost of a good password hashing method must be |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :327: |
candidate password. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :331: |
In addition to salts, modern password hashing methods accept a variable |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :355: |
.B Maximum password length |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :379: |
Thus, it should not be used for new passwords unless you absolutely have |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :380: |
to be able to migrate the password hashes to other systems. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :393: |
This is Poul-Henning Kamp's MD5-based password hashing method originally |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :415: |
specific to password cracking only, doesn't have the effective key size |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :416: |
limitation, and uses 8-bit characters in passwords. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :430: |
(versions up to 1.0.4 inclusive) affecting handling of password characters with |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :438: |
Unfortunately, the behavior of "$2a$" on password characters with the 8th bit |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :440: |
When generating new password hashes, the "$2b$" or "$2y$" prefix should be used. |
skinkade/p6-Crypt-Bcrypt…/crypt.3 :575: |
http://plan9.bell-labs.com/7thEdMan/vol2/password |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :6: |
* This code comes from John the Ripper password cracker, with reentrant |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :7: |
* and crypt(3) interfaces added, but optimizations specific to password |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :32: |
* some of his ideas. The password hashing algorithm was designed by David |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :558: |
* While the bug itself affected the majority of passwords containing |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :561: |
* only a subset of passwords containing the '\xff' character (not even all of |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :562: |
* those passwords, just some of them). This character is not found in valid |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :568: |
* We use an approach that tries to minimize side-channel leaks of password |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :570: |
* of branches or table lookups. (One conditional branch based on password |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :620: |
* collision between the correctly computed hash for this password and a set of |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :621: |
* passwords that could be supplied to the buggy algorithm. Our safety measure |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :639: |
* state that could be directly specified by a password to the buggy algorithm |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :808: |
* 2. We don't want to leave sensitive data from our actual password hash |
skinkade/p6-Crypt-Bcrypt…/crypt_blowfish.c :833: |
/* Hash the supplied password */ |
skinkade/p6-Crypt-Bcrypt…/Bcrypt.pm6 :45: |
sub bcrypt-hash(Str $password, int :$rounds = 12) returns Str is export { |
skinkade/p6-Crypt-Bcrypt…/Bcrypt.pm6 :46: |
crypt($password, gensalt($rounds)); |
skinkade/p6-Crypt-Bcrypt…/Bcrypt.pm6 :49: |
sub bcrypt-match(Str $password, Str $hash) returns Bool is export { |
skinkade/p6-Crypt-Bcrypt…/Bcrypt.pm6 :50: |
crypt($password, $hash) eq $hash; |
skinkade/p6-Crypt-Bcrypt…/01-compare.t :13: |
ok bcrypt-match("password", $hash-old), "2a positive check"; |
skinkade/p6-Crypt-Bcrypt…/01-compare.t :14: |
nok bcrypt-match("password1", $hash-old), "2a negative check"; |
skinkade/p6-Crypt-Bcrypt…/01-compare.t :16: |
ok bcrypt-match("password", $hash-new), "2b positive check"; |
skinkade/p6-Crypt-Bcrypt…/01-compare.t :17: |
nok bcrypt-match("password1", $hash-new), "2b negative check"; |
skinkade/p6-crypt-argon2…/META6.json :6: |
"description" : "Easy Argon2i password hashing", |
skinkade/p6-crypt-argon2…/README.md :17: |
> my $hash = argon2-hash("password") |
skinkade/p6-crypt-argon2…/README.md :20: |
> argon2-verify($hash, "password") |
skinkade/p6-crypt-argon2…/README.md :26: |
> argon2-hash("password", :t_cost(4), :m_cost(2**18), :parallelism(4), :hashlen(24)) |
skinkade/p6-crypt-argon2…/README.md :36: |
> my ($key, $meta) = argon2-derive-key("password", :hashlen(16)) |
skinkade/p6-crypt-argon2…/README.md :39: |
> argon2-derive-key("password", $meta) |
skinkade/p6-crypt-argon2…/README.md :47: |
in KiB, and parallelism in thread count. By default, password hashing uses two |
skinkade/p6-crypt-argon2…/argon2.h :64: |
/* Minimum and maximum password length in bytes */ |
skinkade/p6-crypt-argon2…/argon2.h :156: |
* password and its length, |
skinkade/p6-crypt-argon2…/argon2.h :165: |
* Also, three flags indicate whether to erase password, secret as soon as they |
skinkade/p6-crypt-argon2…/argon2.h :168: |
* Simplest situation: you have output array out[8], password is stored in |
skinkade/p6-crypt-argon2…/argon2.h :172: |
* You want to erase the password, but you're OK with last pass not being |
skinkade/p6-crypt-argon2…/argon2.h :181: |
uint8_t *pwd; /* password array */ |
skinkade/p6-crypt-argon2…/argon2.h :182: |
uint32_t pwdlen; /* password length */ |
skinkade/p6-crypt-argon2…/argon2.h :224: |
* Hashes a password with Argon2i, producing an encoded hash |
skinkade/p6-crypt-argon2…/argon2.h :228: |
* @param pwd Pointer to password |
skinkade/p6-crypt-argon2…/argon2.h :247: |
* Hashes a password with Argon2i, producing a raw hash by allocating memory at |
skinkade/p6-crypt-argon2…/argon2.h :252: |
* @param pwd Pointer to password |
skinkade/p6-crypt-argon2…/argon2.h :291: |
* Verifies a password against an encoded string |
skinkade/p6-crypt-argon2…/argon2.h :294: |
* @param pwd Pointer to password |
skinkade/p6-crypt-argon2…/argon2.h :309: |
* on the password and salt. Only for side-channel-free |
skinkade/p6-crypt-argon2…/argon2.h :319: |
* independent on the password and salt. Good for side-channels, |
skinkade/p6-crypt-argon2…/argon2.h :328: |
* Verify if a given password is correct for Argon2d hashing |
skinkade/p6-crypt-argon2…/argon2.h :330: |
* @param hash The password hash to verify. The length of the hash is |
skinkade/p6-crypt-argon2…/argon2.h :337: |
* Verify if a given password is correct for Argon2i hashing |
skinkade/p6-crypt-argon2…/argon2.h :339: |
* @param hash The password hash to verify. The length of the hash is |
skinkade/p6-crypt-argon2…/argon2.c :351: |
return "Password pointer is NULL, but password length is not 0"; |
skinkade/p6-crypt-argon2…/argon2.c :385: |
return "The password does not match the supplied hash"; |
skinkade/p6-crypt-argon2…/bench.c :31: |
* Benchmarks Argon2 with salt length 16, password length 16, t_cost 1, |
skinkade/p6-crypt-argon2…/core.c :354: |
/* Validate password length */ |
skinkade/p6-crypt-argon2…/core.h :157: |
* password and secret if needed |
skinkade/p6-crypt-argon2…/run.c :92: |
fatal("password missing"); |
skinkade/p6-crypt-argon2…/run.c :172: |
/* get password from stdin */ |
skinkade/p6-crypt-argon2…/run.c :175: |
fatal("no password read"); |
skinkade/p6-crypt-argon2…/run.c :178: |
fatal("Provided password longer than supported in command line utility"); |
skinkade/p6-crypt-argon2…/test.c :62: |
hashtest(version, 2, 16, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :67: |
hashtest(version, 2, 20, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :72: |
hashtest(version, 2, 18, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :76: |
hashtest(version, 2, 8, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :80: |
hashtest(version, 2, 8, 2, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :84: |
hashtest(version, 1, 16, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :88: |
hashtest(version, 4, 16, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :92: |
hashtest(version, 2, 16, 1, "differentpassword", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :96: |
hashtest(version, 2, 16, 1, "password", "diffsalt", |
skinkade/p6-crypt-argon2…/test.c :106: |
"password", strlen("password"), Argon2_i); |
skinkade/p6-crypt-argon2…/test.c :113: |
"password", strlen("password"), Argon2_i); |
skinkade/p6-crypt-argon2…/test.c :117: |
/* Handle an mismatching hash (the encoded password is "passwore") */ |
skinkade/p6-crypt-argon2…/test.c :120: |
"password", strlen("password"), Argon2_i); |
skinkade/p6-crypt-argon2…/test.c :122: |
printf("Verify with mismatched password: PASS\n"); |
skinkade/p6-crypt-argon2…/test.c :134: |
hashtest(version, 2, 16, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :139: |
hashtest(version, 2, 20, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :144: |
hashtest(version, 2, 18, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :148: |
hashtest(version, 2, 8, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :152: |
hashtest(version, 2, 8, 2, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :156: |
hashtest(version, 1, 16, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :160: |
hashtest(version, 4, 16, 1, "password", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :164: |
hashtest(version, 2, 16, 1, "differentpassword", "somesalt", |
skinkade/p6-crypt-argon2…/test.c :168: |
hashtest(version, 2, 16, 1, "password", "diffsalt", |
skinkade/p6-crypt-argon2…/test.c :178: |
"password", strlen("password"), Argon2_i); |
skinkade/p6-crypt-argon2…/test.c :185: |
"password", strlen("password"), Argon2_i); |
skinkade/p6-crypt-argon2…/test.c :189: |
/* Handle an mismatching hash (the encoded password is "passwore") */ |
skinkade/p6-crypt-argon2…/test.c :192: |
"password", strlen("password"), Argon2_i); |
skinkade/p6-crypt-argon2…/test.c :194: |
printf("Verify with mismatched password: PASS\n"); |
skinkade/p6-crypt-argon2…/test.c :205: |
ret = argon2_hash(2, 1, 1, "password", strlen("password"), |
skinkade/p6-crypt-argon2…/test.c :211: |
ret = argon2_hash(2, 1 << 12, 1, NULL, strlen("password"), |
skinkade/p6-crypt-argon2…/test.c :217: |
ret = argon2_hash(2, 1 << 12, 1, "password", strlen("password"), "s", 1, |
skinkade/p6-crypt-argon2…/01-compare.t :8: |
my $hash = argon2-hash("password"); |
skinkade/p6-crypt-argon2…/01-compare.t :11: |
ok argon2-verify($hash, "password"), "Verify true new hash"; |
skinkade/p6-crypt-argon2…/01-compare.t :12: |
ok argon2-verify($hash-reference, "password"), "Verify true reference hash"; |
skinkade/p6-crypt-argon2…/01-compare.t :14: |
nok argon2-verify($hash, "password1"), "False-check on new hash"; |
skinkade/p6-crypt-argon2…/01-compare.t :15: |
nok argon2-verify($hash-reference, "password1"), "False-check on reference hash"; |
skinkade/p6-crypt-argon2…/02-derive-key.t :9: |
my ($key, $meta) = argon2-derive-key("password"); |
skinkade/p6-crypt-argon2…/02-derive-key.t :11: |
my $test = argon2-derive-key("password", $meta); |
spebern/Parser-FreeXL-Native…/freexl.h :111: |
/** BIFF file is password protected */ |
spebern/Parser-FreeXL-Native…/freexl.h :113: |
/** BIFF file is not password protected */ |
spebern/Parser-FreeXL-Native…/freexl.h :219: |
/** Information query for BIFF password protection state */ |
spebern/Parser-FreeXL-Native…/mainpage.doxy :315: |
as author, password protection, styles, formats, window settings and so on |
spebern/Parser-FreeXL-Native…/check_excel2003_biff2.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff2.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff3.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff3.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff3_info.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff3_info.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff4.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff4.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff4_1904.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff4_1904.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff8.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_excel2003_biff8.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spebern/Parser-FreeXL-Native…/check_oocalc95.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_oocalc95.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spebern/Parser-FreeXL-Native…/check_oocalc97.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_oocalc97.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spebern/Parser-FreeXL-Native…/check_oocalc97_intvalue.c :137: |
fprintf(stderr, "GET_INFO ERROR for BIFF password mode: %d\n", ret); |
spebern/Parser-FreeXL-Native…/check_oocalc97_intvalue.c :141: |
fprintf(stderr, "Unexpected BIFF password mode: %d\n", info); |
spitsh/spitsh…/reserved.txt :609: |
systemd-ask-password |
spitsh/spitsh…/reserved.txt :628: |
systemd-tty-ask-password-agent |
sufrostico/perl6-snowball…/LICENSE :340: |
source code form), and must require no special password or key for |
supernovus/perl6-http-client…/Request.pm6 :52: |
token pass { [\w |
supernovus/perl6-http-client…/Request.pm6 :59: |
## Encode a username and password into Base64 for Basic Auth. |
supernovus/perl6-web-app-mvc…/README.md :66: |
"password" : "myapppass" |
szabgab/Perl6-Maven…/bootstrap.css :777: |
input[type="password"], |
szabgab/Perl6-Maven…/bootstrap.css :811: |
input[type="password"], |
szabgab/Perl6-Maven…/bootstrap.css :842: |
input[type="password"]:focus, |
szabgab/Perl6-Maven…/bootstrap.min.css :9: |
*/article,aside,details,figcaption,figure,footer,header,hgroup,nav,section{display:block}audio,canvas,video{display:inline-block;*display:inline;*zo… |
szabgab/Perl6-Maven…/jquery-1.7.2.min.js :3: |
a){var b=F.exec(a);b&&(b[1]=(b[1] |
szabgab/Perl6-Maven…/jquery-1.7.2.min.js :4: |
.clean(arguments);a.push.apply(a,this.toArray());return this.pushStack(a,"before",arguments)}},after:function(){if(this[0]&&this[0].parentNode)return… |
tadzik/Grammar-BNF…/abnf.t :223: |
login = "LOGIN" SP userid SP password |
tadzik/Grammar-BNF…/abnf.t :243: |
password = astring |
titsuki/p6-App-AizuOnlineJudge…/BasicCourse.pm6 :29: |
password => self.get-password, |
titsuki/p6-App-AizuOnlineJudge…/IntroductionCourse.pm6 :30: |
password => self.get-password, |
titsuki/p6-App-AizuOnlineJudge…/Submittable.pm6 :4: |
method get-password() returns Str { |
titsuki/p6-App-AizuOnlineJudge…/Submittable.pm6 :5: |
shell "stty -echo"; my $password = prompt("password: "); "".say; shell "stty echo"; |
titsuki/p6-App-AizuOnlineJudge…/Submittable.pm6 :6: |
return $password; |
titsuki/p6-App-AizuOnlineJudge…/01-basic.t :15: |
$*IN = class { method get() { "fakepassword" }; } |
titsuki/p6-App-AizuOnlineJudge…/01-basic.t :22: |
$*IN = class { method get() { "fakepassword" }; } |
titsuki/p6-App-AizuOnlineJudge…/01-basic.t :61: |
$*IN = class { method get() { "fakepassword" }; } |
titsuki/p6-App-AizuOnlineJudge…/01-basic.t :74: |
$*IN = class { method get() { "fakepassword" }; } |
titsuki/p6-Terminal-Readsecret…/META6.json :9: |
"description" : "A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or passwords from a command line secretly (not being displayed)", |
titsuki/p6-Terminal-Readsecret…/README.md :6: |
Terminal::Readsecret - A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or passwords from a command line secretly (not being displayed) |
titsuki/p6-Terminal-Readsecret…/README.md :15: |
my $password = getsecret("password:" ); |
titsuki/p6-Terminal-Readsecret…/README.md :16: |
say "your password is: " ~ $password; |
titsuki/p6-Terminal-Readsecret…/README.md :23: |
my $password = getsecret("password:", $timeout); |
titsuki/p6-Terminal-Readsecret…/README.md :24: |
say "your password is: " ~ $password; |
titsuki/p6-Terminal-Readsecret…/README.md :29: |
Terminal::Readsecret is a perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ). Readsecre… |
titsuki/p6-Terminal-Readsecret…/README.md :40: |
Reads secrets or passwords from a command line and returns its input. |
titsuki/p6-Terminal-Readsecret…/getpass.p6 :5: |
my $password = getsecret("password:" ); |
titsuki/p6-Terminal-Readsecret…/getpass.p6 :6: |
say "your password is: " ~ $password; |
titsuki/p6-Terminal-Readsecret…/timeout_getpass.p6 :6: |
my $password = getsecret("password:", $timeout); |
titsuki/p6-Terminal-Readsecret…/timeout_getpass.p6 :7: |
say "your password is: " ~ $password; |
titsuki/p6-Terminal-Readsecret…/Readsecret.pm6 :78: |
Terminal::Readsecret - A perl6 binding of readsecret ( https://github.com/dmeranda/readsecret ) for reading secrets or passwords from a command line secretly (not being displayed) |
titsuki/p6-Terminal-Readsecret…/Readsecret.pm6 :85: |
my $password = getsecret("password:" ); |
titsuki/p6-Terminal-Readsecret…/Readsecret.pm6 :86: |
say "your password is: " ~ $password; |
titsuki/p6-Terminal-Readsecret…/Readsecret.pm6 :92: |
my $password = getsecret("password:", $timeout); |
titsuki/p6-Terminal-Readsecret…/Readsecret.pm6 :93: |
say "your password is: " ~ $password; |
titsuki/p6-Terminal-Readsecret…/Readsecret.pm6 :98: |
Readsecret is a simple self-contained C (or C++) library intended to be used on Unix and Unix-like operating systems that need to read a password or other textual secret typed in by the user while in a text-mode environment, such as from a console or shell. |
titsuki/p6-Terminal-Readsecret…/Readsecret.pm6 :108: |
Reads secrets or passwords from a command line and returns its input. |
titsuki/p6-Terminal-Readsecret…/readsecret.c :3: |
** Securely read a password or text secret from a command line (tty device). |
titsuki/p6-Terminal-Readsecret…/readsecret.h :3: |
** Securely read a password or text secret from a command line (tty device). |
titsuki/p6-Terminal-Readsecret…/readsecret.h :70: |
/* rsecret_overwrite_buffer() - securely overwrite a password or other |
titsuki/p6-Terminal-Readsecret…/02-password.t :7: |
throws-like { getsecret("password", $timeout) }, Exception, message => 'timeout waiting for user'; |
tokuhirom/p6-Crust…/Basic.pm6 :79: |
my sub authen_cb($username, $password, %env) { |
tokuhirom/p6-Crust…/Basic.pm6 :80: |
return $username eq 'admin' && $password eq 's3cr3t'; |
tokuhirom/p6-Crust…/Basic.pm6 :98: |
A callback function that takes username, password and P6W environment |
tokuhirom/p6-Crust…/Basic.pm6 :102: |
method that takes username and password and returns boolean. |
tony-o/perl6-db-orm-quicky…/README.md :41: |
password => 'top secret', |
tony-o/perl6-db-orm-quicky…/README.md :118: |
$user.set('password', 'user1-pass!'); |
tony-o/perl6-db-orm-quicky…/mysql_test.pl6 :16: |
password => '', |
tony-o/perl6-db-orm-quicky…/mysql_test.pl6 :28: |
$newrow.set('password' => 'tony'); |
tony-o/perl6-db-orm-quicky…/pgsql_test.pl6 :16: |
password => '', |
tony-o/perl6-db-orm-quicky…/pgsql_test.pl6 :28: |
$newrow.set('password' => 'tony'); |
tony-o/perl6-db-orm-quicky…/sqlite.test.pl6 :24: |
$newrow.set('password' => 'tony'); |
tony-o/perl6-db-orm-quicky…/01_sqlite.t :39: |
$newrow.set('password' => 'tony'); |
tony-o/perl6-db-orm-quicky…/01_sqlite.t :49: |
password => ( '-like' => '%on%' ), |
tony-o/perl6-db-orm-quicky…/02_joins.t :28: |
my @expected = |
tony-o/perl6-db-orm-quicky…/02_joins.t :31: |
password => 'tony', |
tony-o/perl6-db-orm-quicky…/02_joins.t :45: |
$newrow.set('password' => 'tony'); |
tony-o/perl6-db-orm-quicky…/03_sqlite_no_quotes.t :39: |
$newrow.set('password' => 'tony'); |
tony-o/perl6-db-orm-quicky…/03_sqlite_no_quotes.t :49: |
password => ( '-like' => '%on%' ), |
ugexe/Perl6-Base64…/01-basic.t :15: |
is encode-base64("username:thisisnotmypassword", :str), 'dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==', 'Encoding "username:thisisnotmypassword"'; |
ugexe/Perl6-Base64…/01-basic.t :36: |
is decode-base64("dXNlcm5hbWU6dGhpc2lzbm90bXlwYXNzd29yZA==", :bin).decode, "username:thisisnotmypassword", 'decoding "username:thisisnotmypassword"'; |
viklund/november…/users :1: |
# Password generation is a manual process right now; run bin/generate-password.pl USER PASS |
viklund/november…/users :5: |
'password' => '47c96e61cbcb31e648b1987107117ca4f524658460b955e290675789466fcd1a', |
viklund/november…/November.pm :210: |
my $password = $.cgi.params<password>; |
viklund/november…/November.pm :215: |
if !defined $password |
viklund/november…/November.pm :216: |
push @errors, 'Please provide a password.'; |
viklund/november…/November.pm :219: |
if $password && $password.chars < 6 { |
viklund/november…/November.pm :221: |
~ 'your password.'; |
viklund/november…/November.pm :224: |
if $password & $passagain && $password ne $passagain { |
viklund/november…/November.pm :225: |
push @errors, 'The password and confirmation must match.'; |
viklund/november…/November.pm :237: |
my $phash = sha256((sha256($user_name.encode).list».fmt("%02x") ~ $password).encode).list».fmt("%02x"); |
viklund/november…/November.pm :245: |
my $password = $.cgi.params<password>; |
viklund/november…/November.pm :250: |
my $hashed = sha256((sha256($user_name.encode).list».fmt("%02x") ~ $password).encode).list».fmt("%02x"); |
viklund/november…/November.pm :252: |
and $hashed eq %users{$user_name}<password> { |
viklund/november…/November.pm :687: |
my $password = $cgi->param('password'); |
viklund/november…/November.pm :691: |
if ( md5_base64(md5_base64($user_name).$password) |
viklund/november…/November.pm :692: |
eq $users{$user_name}->{password} ) { |
viklund/november…/users :3: |
'password' => 'hdm24HFlfrBgIX3bTsVLIQ' |
viklund/november…/users :6: |
'password' => '3l9drfMnROgPQTNicdGFQg' |
viklund/november…/users :9: |
'password' => 'yG7xslKNZt59hpwVBkWrFQ', |
viklund/november…/log_in.tmpl :21: |
<p>Password: <input name="password" type="password" /></p> |
viklund/november…/log_in.tmpl :17: |
<p>Password: <input name="password" type="password" /></p> |
viklund/november…/log_in.tmpl :17: |
<p>Password: <input name="password" type="password" /></p> |
viklund/november…/log_in.tmpl :15: |
<p>Password: <input name="password" type="password" /></p> |
viklund/november…/log_in.tmpl :18: |
<p>Password: <input name="password" type="password" /></p> |
viklund/november…/register.tmpl :18: |
<p>Password: <input name="password" type="password" /></p> |
viklund/november…/article.rtf :431: |
\f0\fs24\lang1033\langfe1033\langnp1033\insrsid4985751\charrsid4985751 :\line }{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\lang1033\langfe1033\langnp1033\insrsid4985751\charrsid4985751 if (defined %users\{$user_name\} \line and $password eq %users\{ |
viklund/november…/article.rtf :444: |
\f2\fs24\lang1033\langfe1033\langnp1033\insrsid9450395\charrsid9450395 password}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\insrsid9450395\charrsid9450395 ' => '}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 |
viklund/november…/article.rtf :452: |
\f2\fs24\lang1033\langfe1033\langnp1033\insrsid9450395\charrsid9450395 password}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 \f2\fs24\insrsid9450395\charrsid9450395 ' => '3}{\rtlch\fcs1 \af2\afs24 \ltrch\fcs0 |
zoffixznet/perl6-IRC-Client…/Changes :23: |
- Add support for channel passwords (#18) |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :67: |
- `.password` |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :87: |
- `:password` |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :448: |
server. Pairs represent channels with channel passwords, where the key is |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :449: |
the channel and the value is its password. |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :468: |
#### `.password` |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :470: |
The password of the server. |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :548: |
:password<s3cret> |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :576: |
Pairs represent channels with channel passwords, where the key is |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :577: |
the channel and the value is its password. |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :638: |
##### `:password` |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :640: |
The server password to use. On some networks (like Freenode), the server |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :641: |
password also functions as NickServ's password. |
zoffixznet/perl6-IRC-Client…/03-method-reference.md :662: |
`:host`, `:port`, `:password`, `:channels`, `:nick`, `:username`, |
zoffixznet/perl6-IRC-Client…/Client.pm6 :35: |
Str :$password, |
zoffixznet/perl6-IRC-Client…/Client.pm6 :50: |
my %all-conf = :$port, :$password, :$host, :$nick, :$alias, |
zoffixznet/perl6-IRC-Client…/Client.pm6 :63: |
<host password port username userhost userreal ssl ca-file> |
zoffixznet/perl6-IRC-Client…/Client.pm6 :195: |
self!ssay: "PASS $server.password()", :$server |
zoffixznet/perl6-IRC-Client…/Client.pm6 :196: |
if $server.password.defined; |
zoffixznet/perl6-IRC-Client…/Server.pm6 :11: |
has Str $.password; |
zoffixznet/perl6-IRC-Client…/01-basic.pl :36: |
password => 'fishdont', |
zoffixznet/perl6-RT-REST-Client…/README.md :50: |
You need to go to user preferences and set up your CLI password for your |
zoffixznet/perl6-RT-REST-Client…/README.md :75: |
**Mandatory.** Your RT password. Note that your regular web login likely won't |
zoffixznet/perl6-RT-REST-Client…/README.md :76: |
work. You need to set up the CLI password. See [LOGIN CREDENTIALs |
Created
September 18, 2017 23:09
-
-
Save Whateverable/ea12f53147bae44a265d85e65ad3fdd9 to your computer and use it in GitHub Desktop.
greppable6
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
password |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment