100+ results results for 'password 1234' (40 ms)
65 "username" => "foo", 66 "password" => "bar", 67 "pool" => "5", 112 dbconsole.expects(:find_cmd_and_exec).with(%w[mysql mysql5], '--host=locahost', '--port=1234', '--socket=socket', '--user=user', '--default-character-set=UTF-8', '-p', 'db') 113 start(adapter: 'mysql', database: 'db', host: 'locahost', port: 1234, socket: 'socket', username: 'user', password: 'qwerty', encoding: 'UTF-8') 114 assert !aborted 116 117 def test_mysql_include_password 118 dbconsole.expects(:find_cmd_and_exec).with(%w[mysql mysql5], '--user=user', '--password=qwerty', 'db') 118 dbconsole.expects(:find_cmd_and_exec).with(%w[mysql mysql5], '--user=user', '--password=qwerty', 'db') 119 start({adapter: 'mysql', database: 'db', username: 'user', password: 'qwerty'}, ['-p']) 120 assert !aborted 130 dbconsole.expects(:find_cmd_and_exec).with('psql', 'db') 131 start(adapter: 'postgresql', database: 'db', username: 'user', password: 'q1w2e3', host: 'host', port: 5432) 132 assert !abortedkonica_minolta_pwd_extract.rb https://gitlab.com/alx741/metasploit-framework | Ruby | 259 lines
33 OptString.new('USER', [false, 'The default Admin user', 'Admin']), 34 OptString.new('PASSWD', [true, 'The default Admin password', '12345678']), 35 OptInt.new('TIMEOUT', [true, 'Timeout for printer probe', 20]) 53 xml.send('UserName', 'xmlns' => '') { xml.text '' } 54 xml.send('Password', 'xmlns' => '') { xml.text '' } 55 xml.send('Version', 'xmlns' => ''){ 65 xml.send('UserType') { xml.text "#{user}" } 66 xml.send('Password') { xml.text "#{passwd}" } 67 } 110 xml.send('BackUp') { xml.text 'true' } 111 xml.send('BackUpPassword') { xml.text 'MYSKIMGS' } 112 } 120 def run_host(ip) 121 print_status("Attempting to extract username and password from the host at #{peer}") 122 versionTelaLogin.java https://gitlab.com/Zero101010/EP2 | Java | 189 lines
38 jLabel3 = new javax.swing.JLabel(); 39 tfSenha = new javax.swing.JPasswordField(); 40 130 private void btEntrarActionPerformed(java.awt.event.ActionEvent evt) {//GEN-FIRST:event_btEntrarActionPerformed 131 if(tfLogin.getText().equals("Funcionario")&& tfSenha.getText().equals("1234")){ 132 // JOptionPane.showMessageDialog(null,"Acesso permitido"); 186 private javax.swing.JTextField tfLogin; 187 private javax.swing.JPasswordField tfSenha; 188 // End of variables declaration//GEN-END:variablessaas_user_registration_spec.rb https://gitlab.com/zillemarco/gitlab | Ruby | 288 lines
44 fill_in 'Email', with: user.email 45 fill_in 'Password', with: user.password 46 end 60 select 'Florida', from: 'state' 61 fill_in 'phone_number', with: '+1234567890' 62 fill_in 'website_url', with: 'https://gitlab.com' 214 company_size: '1-99', 215 phone_number: '+1234567890', 216 country: 'US',MongoUserRepositoryTest.scala https://github.com/cyrusinnovation/inquisition.git | Scala | 181 lines
17 val TestUser = User("testy@example.com", "Tester", "Testy", "McTesterton", "4879b790020a04377613fd860a4e754add628f6bfdd5c1e675a28c286d379ebd", "cc11ce5ba1cd05411aa492b1a2f6bd78") 18 val AnotherUser = User("another@example.com", "anoTher", "Another", "User", "password", "salt") 19 136 def testCanSaveAndRetrieveUserWithFriends() { 137 val facebookFriend = Friend(None, Some("12345")) 138 val localFriend = Friend(Some("another"), None) 155 156 val updatedUser = repository.save(SavedUser(savedUser.id, savedUser.user.copy(facebookId = Some("1234")))) 157 157 158 assertEquals(Some("1234"), updatedUser.facebookId) 159 assertEquals(Some("1234"), repository.findById(savedUser.id).get.facebookId) 163 def testCanFindByFacebookId() { 164 val savedUser = repository.save(TestUser.copy(facebookId = Some("1234"))) 165 val results = repository.findWithFacebookIds(Set("1234"))ForceBuildPublisher.html https://github.com/aravindmc/CruiseControl.NET.git | HTML | 169 lines
37 <span class="code-tag"><project></span>AcceptanceTestProject<span class="code-tag"></project></span> 38 <span class="code-tag"><serverUri></span>tcp://buildserver2:21234/CruiseManager.rem<span class="code-tag"></serverUri></span> 39 <span class="code-tag"><integrationStatus></span>Success<span class="code-tag"></integrationStatus></span> 45 <span class="code-tag"><project></span>AcceptanceTestProject<span class="code-tag"></project></span> 46 <span class="code-tag"><serverUri></span>tcp://buildserver2:21234/CruiseManager.rem<span class="code-tag"></serverUri></span> 47 <span class="code-tag"><integrationStatus></span>Success<span class="code-tag"></integrationStatus></span> 49 <span class="code-tag"><namedValue name=<span class="code-quote">"username"</span> value=<span class="code-quote">"autobuild"</span> /></span> 50 <span class="code-tag"><namedValue name=<span class="code-quote">"password"</span> value=<span class="code-quote">"autobuild"</span> /></span> 51 <span class="code-tag"></security></span> 135<td class='confluenceTd'> security </td> 136<td class='confluenceTd'> The security credentials to pass through to the remote server. <br clear="all" />These are only needed if the remote project has security applied. If credentials are passed to the remote server, then the enforcerName will be ignored. Valid security tokens are: "username" and "password" (this list may be expanded in future). </td> 137<td class='confluenceTd'> <a href="Named Value.html" title="Named Value">Named Value</a> array </td> 146<td class='confluenceTd'> No </td> 147<td class='confluenceTd'> tcp://localhost:21234/CruiseManager.rem </td> 148<td class='confluenceTd'> 1.0 </td>smtp_spec.rb https://github.com/okkez/mail.git | Ruby | 207 lines
12 :user_name => nil, 13 :password => nil, 14 :authentication => nil, 161 from "from@someemail.com" 162 message_id "<1234@someemail.com>" 163 body "body" 175 from "from@someemail.com" 176 message_id "<1234@someemail.com>" 177 body "body"options_test.rb https://github.com/bublanina/masterlanguage.git | Ruby | 329 lines
77 def test_parse_options_with_p_should_prompt_for_password 78 MockCLI.expects(:password_prompt).returns(:the_password) 79 @cli.args << "-p" 80 @cli.parse_options! 81 assert_equal :the_password, @cli.options[:password] 82 end 83 84 def test_parse_options_without_p_should_set_proc_for_password 85 @cli.args << "-e" << "sample" 86 @cli.parse_options! 87 assert_instance_of Proc, @cli.options[:password] 88 end 116 @cli.parse_options! 117 assert_equal 1234, @cli.options[:pre_vars][:foo] 118 endtuangou-api.md https://github.com/yzpower/zhejie.github.com.git | Markdown | 317 lines
14 username hidden 15 password ****** 16 22 23 {"user":{"id":123456,"username":"jack","email":"jack@test.com","mobile":1871234567}} 24 183 "dpShopId": "4562008", 184 "phoneNumber": "010-12345678,13912345678" 185 }, 191 "dpShopId": "3632377", 192 "phoneNumber": "010-12345678" 193 }user_details_test.rb https://github.com/465858/Proman2.git | Ruby | 205 lines
41 #:staff_or_student_number => "777777", 42 :password => "test", 43 :password_confirmation => "test") 47 48 test "test invalid password has less than 6 characters" do 49 ["a", "ab", "abc", "abcd", "abcde", "abcdef"].each do |password| 53 #:staff_or_student_number => "777777", 54 :password => "test", 55 :password_confirmation => "test") 76 #:staff_or_student_number => "777777", 77 :password => "0123456789112345678921234567893123456789", 78 :password_confirmation => "0123456789112345678921234567893123456789") 86 :password => "01234567891123456789212345678931234567894", 87 :password_confirmation => "01234567891123456789212345678931234567894") 88Home.php https://gitlab.com/narugamy/corazon | PHP | 195 lines
16 function GeneraPass(){ 17 $cadena = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890"; 18 $longitudCadena=strlen($cadena); 41 $pw=$this->GeneraPass(); 42 $user['password']=md5($pw); 43 $this->Modeluser->update($user,$dato->id); 112 $this->Validar(''); 113 $er=['email'=>'','password'=>'']; 114 $error=['exito'=>false]; 116 $er['email']=form_error('email'); 117 $er['password']=form_error('password'); 118 }else{ 170 private function Validar($dato=null){ 171 $this->form_validation->set_rules('password', 'password', 'trim|min_length[6]|max_length[15]|required'); 172 if(!empty($dato)){api_steps.rb https://github.com/coggy/RapidFTR.git | Ruby | 173 lines
86When /^I login with user (.+):(.+) for device with imei (.+)$/ do |user, password, imei| 87 post(sessions_path, {:imei => imei, :user_name => user, :password => password, :mobile_number => "123456", :format => 'json'}) 88endREADME.md https://gitlab.com/GZGavinZhao/cf-tool | Markdown | 277 lines
106| username | varchar(10) | NO | | NULL | | 107| password | varchar(100) | NO | | NULL | | 108+----------+--------------+------+-----+---------+----------------+ 167data := [][]string{ 168 []string{"1/1/2014", "Domain name", "1234", "$10.98"}, 169 []string{"1/1/2014", "January Hosting", "2345", "$54.95"}, 187+----------+--------------------------+-------+---------+ 188| 1/1/2014 | Domain name | 1234 | $10.98 | 189+ +--------------------------+-------+---------+RequestTest.php https://gitlab.com/Blueprint-Marketing/solr-power | PHP | 534 lines
63 'username' => 'testuser', 64 'password' => 'testpass', 65 ), 100 'username' => $options['authentication']['username'], 101 'password' => $options['authentication']['password'], 102 ), 351 { 352 $data = '1234567890'; 353 $this->request->setRawData($data); 475 'username' => 'testuser', 476 'password' => 'testpass', 477 ), 492 [username] => testuser 493 [password] => testpass 494)JsonDataProviderImpl.java https://gitlab.com/CORP-RESELLER/SeLion | Java | 326 lines
64 * "name":"Optimus Prime", 65 * "password":123456, 66 * "accountNumber":999999999, 73 * "address" : { 74 * "street":"1234 Some St" 75 * } 81 * "name":"Megatron", 82 * "password":123456, 83 * "accountNumber":999999999, 90 * "address" : { 91 * "street":"1234 any St" 92 * } 210 * <b>"id":</b>"test1", 211 * "password":123456, 212 * "accountNumber":9999999999,services.md https://gitlab.com/haltaction/gitlab-ce | Markdown | 696 lines
10 11> This service adds commit messages as comments to Asana tasks. Once enabled, commit messages are checked for Asana task URLs (for example, `https://app.asana.com/0/123456/987654`) or task IDs starting with # (for example, `#987654`). Every task ID found will get the commit comment added to it. You can also close a task with a message containing: `fix #123456`. You can find your Api Keys here: http://developer.asana.com/documentation/#api_keys 12 89- `username` (**required**) - A user with API access, if applicable 90- `password` (**required**) 91 678- `username` (**required**) - A user with permissions to trigger a manual build 679- `password` (**required**) 680password.php https://gitlab.com/xolotsoft/pumasruiz | PHP | 314 lines
19 define('PASSWORD_BCRYPT', 1); 20 define('PASSWORD_DEFAULT', PASSWORD_BCRYPT); 21 define('PASSWORD_BCRYPT_DEFAULT_COST', 10); 185 ); 186 if (PasswordCompat\binary\_substr($hash, 0, 4) == '$2y$' && PasswordCompat\binary\_strlen($hash) == 60) { 187 $return['algo'] = PASSWORD_BCRYPT; 224 * 225 * @param string $password The password to verify 226 * @param string $hash The hash to verify against 229 */ 230 function password_verify($password, $hash) { 231 if (!function_exists('crypt')) { 235 $ret = crypt($password, $hash); 236 if (!is_string($ret) || PasswordCompat\binary\_strlen($ret) != PasswordCompat\binary\_strlen($hash) || PasswordCompat\binary\_strlen($ret) <= 13) { 237 return false;elan_i2c_smbus.c https://github.com/tklauser/linux-nios2.git | C | 527 lines
29#define ETP_SMBUS_SLEEP_CMD 0x21 30#define ETP_SMBUS_IAP_PASSWORD_WRITE 0x29 31#define ETP_SMBUS_IAP_PASSWORD_READ 0x80 52#define ETP_SMBUS_HELLOPACKET_LEN 5 53#define ETP_SMBUS_IAP_PASSWORD 0x1234 54#define ETP_SMBUS_IAP_MODE_ON (1 << 6) 361 362 /* write iap password */ 363 if (i2c_smbus_write_byte(client, 364 ETP_SMBUS_IAP_PASSWORD_WRITE) < 0) { 365 dev_err(dev, "cannot write iap password\n"); 366 return -EIO; 391 password = be16_to_cpup((__be16 *)val); 392 if (password != ETP_SMBUS_IAP_PASSWORD) { 393 dev_err(dev, "wrong iap password = 0x%X\n", password);demoSilent.html https://gitlab.com/jjgomez/Navicu | HTML | 393 lines
102 <span>Password : </span> 103 <input value="karnius" class="validate[required] text-input" type="password" name="password" id="password" /> 104 </label> 106 <span>Confirm password : </span> 107 <input value="kaniusBAD" class="validate[required,equals[password]] text-input" type="password" name="password2" id="password2" /> 108 <br/> 108 <br/> 109 validate[required,equals[password]] 110 </label> 179 <br/> 180 <input value="0123456789" class="validate[optional,maxSize[6]] text-input" type="text" name="maxsize" id="maxsize" /> 181 <br/>deploy.rb https://github.com/evanphx/chef.git | Ruby | 403 lines
22# repo "git@github.com/whoami/project" 23# revision "abc123" # or "HEAD" or "TAG_for_1.0" or (subversion) "1234" 24# user "deploy_ninja" 34# svn_username "whoami" 35# svn_password "supersecret" 36# end 246 247 def svn_password(arg=nil) 248 set_or_return( 248 set_or_return( 249 :svn_password, 250 arg, 358 # For a rails/merb app, this is used to link in a known good database.yml 359 # (with the production db password) before running migrate. 360 # Default {"config/database.yml" => "config/database.yml"}03_Environment_Management.md git://github.com/silverstripe/sapphire.git | Markdown | 122 lines
52use SilverStripe\Core\Environment; 53Environment::setEnv('API_KEY', 'AABBCCDDEEFF012345'); 54``` 95| `SS_DATABASE_USERNAME`| The database username (mandatory).| 96| `SS_DATABASE_PASSWORD`| The database password (mandatory).| 97| `SS_DATABASE_PORT`| The database port.| 105| `SS_DEFAULT_ADMIN_USERNAME`| The username of the default admin. This is a user with administrative privileges.| 106| `SS_DEFAULT_ADMIN_PASSWORD`| The password of the default admin. This will not be stored in the database.| 107| `SS_USE_BASIC_AUTH`| Baseline protection for requests handled by SilverStripe. Usually requires additional security measures for comprehensive protection. See [Environment Types](/developer_guides/debugging/environment_types) for caveats.|test.scm git://git.savannah.gnu.org/liquidwar6.git | Scheme | 208 lines
81 (c-lw6pil-execute-command game-state "123123123123 1234123412341234 REGISTER" 123123123123) 82 (c-lw6pil-execute-command game-state "123123123123 1234123412341234 ADD 1234 RED" 123123123123) 83 (c-lw6pil-execute-command game-state "123123123123 1234123412341234 ADD 2345 GREEN" 123123123123) 84 (let ( 85 (bot1 (c-lw6bot-new "idiot" game-state pilot 2 "1234" 1.0 100)) 86 (bot2 (c-lw6bot-new "random" game-state pilot 2 "2345" 1.0 100)) 164 (cons "public-url" "http://localhost/") 165 (cons "password" "") 166 (cons "title" "")configuration.rst https://github.com/nattaphat/hgis.git | ReStructuredText | 337 lines
18 host: localhost 19 port: 1234 20 user: user 20 user: user 21 password: secret 22 driver: pdo_mysql 86 host="localhost" 87 port="1234" 88 user="user" 88 user="user" 89 password="secret" 90 driver="pdo_mysql" 259 host: localhost 260 port: 1234 261 user: usercookie_store_test.rb https://bitbucket.org/javierbuilder/uncontabilidad.git | Ruby | 310 lines
69 def test_raises_argument_error_if_secret_is_probably_insecure 70 ["password", "secret", "12345678901234567890123456789"].each do |blank| 71 assert_raise(ArgumentError, blank.inspect) { new_session 'secret' => blank }test-crypto-pbkdf.c https://github.com/mstsirkin/qemu.git | C | 445 lines
57 .iterations = 1, 58 .key = "password", 59 .nkey = 8, 71 .iterations = 2, 72 .key = "password", 73 .nkey = 8, 85 .iterations = 1200, 86 .key = "password", 87 .nkey = 8, 99 .iterations = 5, 100 .key = "password", 101 .nkey = 8, 208 .iterations = 4096, 209 .key = "passwordPASSWORDpassword", 210 .nkey = 24,registerable_test.rb https://github.com/FundingCircle/devise.git | Ruby | 268 lines
93 fill_in 'email', :with => 'user@test.com' 94 fill_in 'password', :with => '123456' 95 fill_in 'password confirmation', :with => '123456' 224 test 'an admin sign up with valid information in XML format should return valid response' do 225 post admin_registration_path(:format => 'xml'), :admin => { :email => 'new_user@test.com', :password => 'new_user123', :password_confirmation => 'new_user123' } 226 assert_response :success 233 test 'a user sign up with valid information in XML format should return valid response' do 234 post user_registration_path(:format => 'xml'), :user => { :email => 'new_user@test.com', :password => 'new_user123', :password_confirmation => 'new_user123' } 235 assert_response :success 242 test 'a user sign up with invalid information in XML format should return invalid response' do 243 post user_registration_path(:format => 'xml'), :user => { :email => 'new_user@test.com', :password => 'new_user123', :password_confirmation => 'invalid' } 244 assert_response :unprocessable_entity 249 user = sign_in_as_user 250 put user_registration_path(:format => 'xml'), :user => { :current_password => '123456', :email => 'user.new@test.com' } 251 assert_response :successMVChatConnectionAdditions.m https://github.com/HHRy/Colloquy.git | Objective C | 298 lines
19 if (!generatedNickname) { 20 NSCharacterSet *badCharacters = [[NSCharacterSet characterSetWithCharactersInString:@"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890"] invertedSet]; 21 NSArray *components = [[UIDevice currentDevice].name componentsSeparatedByCharactersInSet:[NSCharacterSet whitespaceCharacterSet]]; 108 room = [self properNameForChatRoomNamed:room]; 109 NSString *password = [[CQKeychain standardKeychain] passwordForServer:self.uniqueIdentifier area:room]; 110 [self joinChatRoomNamed:room withPassphrase:password]; 152- (void) savePasswordsToKeychain { 153 [[CQKeychain standardKeychain] setPassword:self.nicknamePassword forServer:self.uniqueIdentifier area:[NSString stringWithFormat:@"Nickname %@", self.preferredNickname]]; 154 [[CQKeychain standardKeychain] setPassword:self.password forServer:self.uniqueIdentifier area:@"Server"]; 159 160 if ((password = [[CQKeychain standardKeychain] passwordForServer:self.uniqueIdentifier area:[NSString stringWithFormat:@"Nickname %@", self.preferredNickname]]) && password.length) 161 self.nicknamePassword = password; 162 163 if ((password = [[CQKeychain standardKeychain] passwordForServer:self.uniqueIdentifier area:@"Server"]) && password.length) 164 self.password = password;pseudonyms_controller_spec.rb https://github.com/kidakaka/canvas-lms.git | Ruby | 248 lines
98 code = @cc.confirmation_code 99 post 'change_password', :pseudonym_id => @pseudonym.id, :nonce => @cc.confirmation_code, :pseudonym => {:password => '12341234', :password_confirmation => '12341234'} 100 response.should be_redirect 111 code = @cc.confirmation_code 112 post 'change_password', :pseudonym_id => @pseudonym.id, :nonce => @cc.confirmation_code + 'a', :pseudonym => {:password => '12341234', :password_confirmation => '12341234'} 113 response.should be_redirect 210 user_session(@user, @pseudonym) 211 @p2 = @user.pseudonyms.create!(:unique_id => "another_one@test.com",:password => 'password', :password_confirmation => 'password') 212 delete 'destroy', :user_id => @user.id, :id => @p2.id 221 user_session(@user, @pseudonym) 222 @p2 = @user.pseudonyms.create!(:unique_id => "another_one@test.com",:password => 'password', :password_confirmation => 'password') 223 @p2.sis_source_id = 'test' 236 user_session(@user, @pseudonym) 237 @p2 = @user.pseudonyms.build(:unique_id => "another_one@test.com",:password => 'password', :password_confirmation => 'password') 238 @p2.sis_source_id = 'test'class.LibWebta.js http://scalr.googlecode.com/svn/ | JavaScript | 216 lines
94 95 generatePass: function(element, passwordlength, isdigits) { 96 var pwchars = isdigits ? "0123456789" : "abcdefhjmnpqrstuvwxyz23456789ABCDEFGHJKLMNPQRSTUVWYXZ"; 96 var pwchars = isdigits ? "0123456789" : "abcdefhjmnpqrstuvwxyz23456789ABCDEFGHJKLMNPQRSTUVWYXZ"; 97 var passwordlength = (passwordlength > 0) ? passwordlength : 16; 98 var passwd = ''; 99 100 for (var i = 0; i < passwordlength; i++ ) { 101 passwd += pwchars.charAt( Math.floor( Math.random() * pwchars.length ) );admin_users_spec.rb https://gitlab.com/beverett/gitlab-ce | Ruby | 412 lines
4 let!(:user) do 5 create(:omniauth_user, provider: 'twitter', extern_uid: '123456') 6 end 103 104 it "sends valid email to user with email & password" do 105 perform_enqueued_jobs do 112 expect(email.text_part.body).to have_content(user.email) 113 expect(email.text_part.body).to have_content('password') 114 end 185 186 context 'when impersonating a user with an expired password' do 187 before do 241 fill_in "user_email", with: "bigbang@mail.com" 242 fill_in "user_password", with: "AValidPassword1" 243 fill_in "user_password_confirmation", with: "AValidPassword1"Abstract.php https://github.com/corneliusweiss/Tine-2.0-Open-Source-Groupware-and-CRM.git | PHP | 237 lines
78 /** 79 * update/set email user password 80 * 81 * @param string $_userId 82 * @param string $_password 83 * @param bool $_encrypt encrypt password 84 */ 85 public function inspectSetPassword($_userId, $_password, $_encrypt = TRUE) 86 { 147 } else { 148 $dbConfig = array_intersect_key($mailDbConfig, array_flip(array('adapter', 'host', 'dbname', 'username', 'password', 'port'))); 149 $this->_db = Tinebase_Core::createAndConfigureDbAdapter($dbConfig); 188 /** 189 * generate salt for password scheme 190 *Password.php https://bitbucket.org/blackriver/openx.git | PHP | 536 lines
77 * @param string Character which could be use in the 78 * unpronounceable password ex : 'A,B,C,D,E,F,G' 79 * or numeric, alphabetical or alphanumeric. 87 while (true) { 88 $password = Text_Password::create($length, $type, $chars); 89 if (!in_array($password, $passwords)) { 89 if (!in_array($password, $passwords)) { 90 $passwords[] = $password; 91 break; 163 while (true) { 164 $password = Text_Password::createFromLogin($login[$save - $number], $type, $key); 165 if (!in_array($password, $passwords)) { 165 if (!in_array($password, $passwords)) { 166 $passwords[] = $password; 167 break;SecurityTest.php https://bitbucket.org/LeThanhDat/firstdummyapp.git | PHP | 304 lines
159 Security::setCost(10); 160 $test = Security::hash('password', 'blowfish'); 161 $this->skipIf(strpos($test, '$2a$') === false, 'Blowfish hashes are incorrect.'); 171 172 $password = $submittedPassword = $key; 173 $storedPassword = Security::hash($password); 174 175 $hashedPassword = Security::hash($submittedPassword, null, $storedPassword); 176 $this->assertSame($storedPassword, $hashedPassword); 178 $submittedPassword = 'someOtherKey'; 179 $hashedPassword = Security::hash($submittedPassword, null, $storedPassword); 180 $this->assertNotSame($storedPassword, $hashedPassword); 216 217 $txt = 123456; 218 $key = 'my_key';im_funcs.rb https://github.com/apirogov/Aphorism.git | Ruby | 305 lines
46 if cmd == 'delete_account' #can also happen :( 47 return delete_account(ownnick, params[:password]) #huge cleanup function 48 end 74 #check that its just numbers and + - * / and () -> no XSS xD 75 return {'response'=>'error'} if expr.match(/[^0123456789\+\-\*\/\(\)]/) != nil 76 #calculate 286 287def delete_account(nick, password) 288 #check whether logged in and correct password hash supplied 291 292 return ret_fail('password incorrect!') if password==usr.pwdhash #not matching 293class-install.php https://bitbucket.org/cesarmedrano/cesarmedrano.git | PHP | 310 lines
93 //detect if option already exists 94 $test_option_exists = get_site_option( 'backwpup_cfg_' . $cfg, 'TEST12345TEST' ); 95 //add option if not exists 95 //add option if not exists 96 if ( $test_option_exists == 'TEST12345TEST') 97 add_site_option( 'backwpup_cfg_' . $cfg, $option ); 159 $cfg[ 'logfolder' ] = $cfg[ 'dirlogs' ]; 160 if ( ! empty( $cfg[ 'httpauthpassword' ] ) ) { 161 if ( preg_match('%^[a-zA-Z0-9/+]*={0,2}$%', $cfg[ 'httpauthpassword' ] ) ) 161 if ( preg_match('%^[a-zA-Z0-9/+]*={0,2}$%', $cfg[ 'httpauthpassword' ] ) ) 162 $cfg[ 'httpauthpassword' ] = base64_decode( $cfg[ 'httpauthpassword' ] ); 163 $cfg[ 'httpauthpassword' ] = BackWPup_Encryption::encrypt( $cfg[ 'httpauthpassword' ] );1.08-remove-failing-tests.patch https://gitlab.com/redcore/portage | Patch | 301 lines
21- 22- response = "123456"; 23- 56- assert(pam_sm_authenticate(NULL, 0, targc, targv) == PAM_AUTH_ERR); 57- verify_prompts_shown(password_is_provided_from_external ? 0 : expected_bad_prompts_shown); 58- targv[targc++] = "nullok"; 226- puts("Testing scratch codes"); 227- response = "12345678"; 228- assert(pam_sm_authenticate(NULL, 0, targc, targv) == PAM_AUTH_ERR); 231- assert((fd = open(fn, O_APPEND | O_WRONLY)) >= 0); 232- assert(write(fd, "12345678\n", 9) == 9); 233- close(fd);Users.router.ts https://gitlab.com/dreamteam109/stuckwithticketsfinal | TypeScript | 352 lines
67* email: "IsraelIsraeli@gmail.com" 68* password: "123456" 69* firstName: "Israel" 81* type: string 82* description: The user's password 83* example: 84* email: "IsraelIsraeli@gmail.com" 85* password: "123456" 86* AccessAndRefreshTokens: 120* lastName: "Israeli" 121* phoneNumber: "050-1234567" 122* imageId: "e49bb982bd2e419682565e285a899a2f" 157* email: "IsraelIsraeli@gmail.com" 158* password: "123456" 159* phoneNumber: "050-1234567"auth.m https://gitlab.com/longkas/Potatso-iOS | Objective C | 578 lines
52static BOOL 53auth_getPasswordByUsername (config_t * conf, const char *username, 54 char **passwd) 61static const char lets[] = 62 "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwyxz0123456789+/"; 63 205 206 if (!auth_getPasswordByUsername 207 (conn->conf, username, &passwd)) { 344 realpasswd = NULL; 345#ifdef HAVE_GETSPNAM /* The system supports shadow password */ 346#ifndef HAVE_GETSPNAM_R /* System has no reentrant shadow functions */ 494static BOOL 495auth_authUsernamePassword (conn_t * conn, const char *username, 496 const char *passwd)test_phonebook_plugin.py https://gitlab.com/xivo.solutions/xivo-dird | Python | 348 lines
62 def test_first_match(self): 63 exten = '123456' 64 self.pbook_client.first_match.return_value = sentinel.first_match_result 162 163 def test_phonebook_password(self): 164 value = 'foobar' 165 166 phonebook_config = _PhonebookConfig({'phonebook_password': value}) 167 167 168 self.assertEqual(value, phonebook_config.phonebook_password()) 169 188 self.pbook_config.phonebook_username.return_value = self.username 189 self.pbook_config.phonebook_password.return_value = self.password 190 self.pbook_config.phonebook_timeout.return_value = self.timeoutcloud-user.php https://github.com/qyjohn/openqrm.git | PHP | 428 lines
8function getRandomChar(number, lower, upper, other, extra) { 9 var numberChars = "0123456789"; 10 var lowerChars = "abcdefghijklmnopqrstuvwxyz"; 23} 24function getPassword(length, extraChars, firstNumber, firstLower, firstUpper, firstOther, latterNumber, latterLower, latterUpper, latterOther) { 25 var rc = ""; 234 $tclu->get_instance_by_id($cu_id); 235 $user_auth_str = "://".$tclu->name.":".$tclu->password."@"; 236 $external_portal_user_auth = str_replace("://", $user_auth_str, $external_portal_name); 310 // root password input plus generate password button 311 $generate_pass = "Password <input name=\"cu_password\" type=\"password\" id=\"cu_password\" value=\"\" size=\"10\" maxlength=\"10\">"; 312 $generate_pass .= "<input type=\"button\" name=\"gen\" value=\"generate\" onclick=\"this.form.cu_password.value=getPassword(10, false, true, true, true, false, true, true, true, false);\"><br>";spawner_spec.rb https://github.com/caroo/passenger.git | Ruby | 273 lines
7shared_examples_for "a spawner" do 8 def ping_app(app, connect_password) 9 if app.server_sockets[:main][1] == "unix" 16 channel = MessageChannel.new(client) 17 channel.write_scalar("REQUEST_METHOD\0PING\0PASSENGER_CONNECT_PASSWORD\0#{connect_password}\0") 18 return client.read 118 it "does not cache things like the connect password" do 119 app1 = spawn_some_application("connect_password" => "1234") 120 app2 = spawn_some_application("connect_password" => "5678") 120 app2 = spawn_some_application("connect_password" => "5678") 121 ping_app(app1, "1234").should == "pong" 122 ping_app(app2, "5678").should == "pong"urlparse.py https://github.com/chrishaukap/GameDev.git | Python | 423 lines
31 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' 32 '0123456789' 33 '+-.') 56 @property 57 def password(self): 58 netloc = self.netlocservices.md https://gitlab.com/effigies/gitlab-ce | Markdown | 664 lines
10 11> This service adds commit messages as comments to Asana tasks. Once enabled, commit messages are checked for Asana task URLs (for example, `https://app.asana.com/0/123456/987654`) or task IDs starting with # (for example, `#987654`). Every task ID found will get the commit comment added to it. You can also close a task with a message containing: `fix #123456`. You can find your Api Keys here: https://asana.com/developers/documentation/getting-started/auth#api-key 12 89- `username` (**required**) - A user with API access, if applicable 90- `password` (**required**) 91 472- `username` (optional) - Jira username 473- `password` (optional) - Jira password 474 646- `username` (**required**) - A user with permissions to trigger a manual build 647- `password` (**required**) 648view.py https://github.com/cbmi/serrano.git | Python | 323 lines
159 160 user2 = User.objects.create_user(username='FAKE', password='ALSO_FAKE') 161 view2 = DataView(user=user2) 307 url = '/api/views/{0}/revisions/{1}/'.format( 308 123456789, target_revision_id) 309 319 320 url = '/api/views/{0}/revisions/{1}/'.format(view.id, 123456789) 321utils_test.go https://gitlab.com/billyprice1/boulder | Go | 346 lines
25 {"username:password@protocol(address)/dbname?param=value", "&{user:username passwd:password net:protocol addr:address dbname:dbname params:map[param:value] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 26 {"username:password@protocol(address)/dbname?param=value&columnsWithAlias=true", "&{user:username passwd:password net:protocol addr:address dbname:dbname params:map[param:value] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:true interpolateParams:false}", time.UTC}, 27 {"user@unix(/path/to/socket)/dbname?charset=utf8", "&{user:user passwd: net:unix addr:/path/to/socket dbname:dbname params:map[charset:utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 27 {"user@unix(/path/to/socket)/dbname?charset=utf8", "&{user:user passwd: net:unix addr:/path/to/socket dbname:dbname params:map[charset:utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 28 {"user:password@tcp(localhost:5555)/dbname?charset=utf8&tls=true", "&{user:user passwd:password net:tcp addr:localhost:5555 dbname:dbname params:map[charset:utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 29 {"user:password@tcp(localhost:5555)/dbname?charset=utf8mb4,utf8&tls=skip-verify", "&{user:user passwd:password net:tcp addr:localhost:5555 dbname:dbname params:map[charset:utf8mb4,utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 29 {"user:password@tcp(localhost:5555)/dbname?charset=utf8mb4,utf8&tls=skip-verify", "&{user:user passwd:password net:tcp addr:localhost:5555 dbname:dbname params:map[charset:utf8mb4,utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 30 {"user:password@/dbname?loc=UTC&timeout=30s&allowAllFiles=1&clientFoundRows=true&allowOldPasswords=TRUE&collation=utf8mb4_unicode_ci", "&{user:user passwd:password net:tcp addr:127.0.0.1:3306 dbname:dbname params:map[] loc:%p tls:<nil> timeout:30000000000 collation:224 allowAllFiles:true allowOldPasswords:true clientFoundRows:true columnsWithAlias:false interpolateParams:false}", time.UTC}, 31 {"user:p@ss(word)@tcp([de:ad:be:ef::ca:fe]:80)/dbname?loc=Local", "&{user:user passwd:p@ss(word) net:tcp addr:[de:ad:be:ef::ca:fe]:80 dbname:dbname params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.Local}, 34 {"/", "&{user: passwd: net:tcp addr:127.0.0.1:3306 dbname: params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 35 {"", "&{user: passwd: net:tcp addr:127.0.0.1:3306 dbname: params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 36 {"user:p@/ssword@/", "&{user:user passwd:p@/ssword net:tcp addr:127.0.0.1:3306 dbname: params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 36 {"user:p@/ssword@/", "&{user:user passwd:p@/ssword net:tcp addr:127.0.0.1:3306 dbname: params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 37 {"unix/?arg=%2Fsome%2Fpath.ext", "&{user: passwd: net:unix addr:/tmp/mysql.sock dbname: params:map[arg:/some/path.ext] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC}, 38}JsonResourcePasswordManagementServiceTests.java https://github.com/frett/cas.git | Java | 118 lines
73 @Qualifier("passwordChangeService") 74 private PasswordManagementService passwordChangeService; 75 100 public void verifyUserPasswordChange() { 101 val c = new UsernamePasswordCredential("casuser", "password"); 102 val bean = new PasswordChangeBean(); 103 bean.setConfirmedPassword("newPassword"); 104 bean.setPassword("newPassword"); 105 val res = passwordChangeService.change(c, bean); 110 public void verifyPasswordValidationService() { 111 val c = new UsernamePasswordCredential("casuser", "password"); 112 val bean = new PasswordChangeBean(); 113 bean.setConfirmedPassword("Test@1234"); 114 bean.setPassword("Test@1234"); 115 val isValid = passwordValidationService.isValid(c, bean);config.tinymce.php https://gitlab.com/ptisky/API_prestashop | PHP | 152 lines
43 define("CONFIG_LOGIN_USERNAME", 'ajax'); 44 define('CONFIG_LOGIN_PASSWORD', '123456'); 45 define('CONFIG_LOGIN_PAGE', 'ajax_login.php'); //the url to the login pageApiController.php https://gitlab.com/Ankit77/motiv8 | PHP | 351 lines
91 $email = !empty($_REQUEST['email']) ? $_REQUEST['email'] : ""; 92 $pass = !empty($_REQUEST['password']) ? $_REQUEST['password'] : ""; 93 $access_token = Request::header('accesstoken'); 163 $email = !empty($_REQUEST['email']) ? $_REQUEST['email'] : ""; 164 $password = !empty($_REQUEST['password']) ? $_REQUEST['password'] : ""; 165 $name = !empty($_REQUEST['name']) ? $_REQUEST['name'] : ""; 168 $image = !empty($_REQUEST['image']) ? $_REQUEST['image'] : ""; 169 if(isset($email) && !empty($email) && isset($password) && !empty($password) && isset($name) && !empty($name) && isset($phone) && !empty($phone)){ 170 191 'phone' =>$phone, 192 'password' => Hash::make($password), 193 'confirmed' => 1 , 203 'phone' =>$phone, 204 'password' => Hash::make($password), 205 'confirmed' => 1 ,demoValidators.html https://bitbucket.org/royrutto/climatepal.git | HTML | 214 lines
100 <span>Password : </span> 101 <input value="karnius" class="validate[required] text-input" type="password" name="password" id="password" /> 102 </label> 104 <span>Confirm password : </span> 105 <input value="kaniusBAD" class="validate[required,equals[password]] text-input" type="password" name="password2" id="password2" /> 106 <br/> 106 <br/> 107 validate[required,equals[password]] 108 </label> 139 <br/> 140 <input value="0123456789" class="validate[optional,maxSize[6]] text-input" type="text" name="maxsize" id="maxsize" /> 141 <br/>SOAP.php https://gitlab.com/panace/public | PHP | 512 lines
152 * <?php 153 * $I->haveSoapHeader('AuthHeader', array('username' => 'davert', 'password' => '123345')); 154 * ``` 162 * <username>davert</username> 163 * <password>12345</password> 164 * </AuthHeader>grid.py https://github.com/valeriewang/pyraos.git | Python | 389 lines
33 print self.serverlist 34 mydb=DataBase(dblist=self.serverlist,host="localhost",username="opensim",password="1234") 35 mydb.StartUp() 169 for user in self.userlist: 170 cmd="create user "+user.firstname+" "+user.lastname+" "+user.password+" "+user.email 171 print "[create user]cmd="+cmd 291 user="opensim" 292 psw="1234" 293 dbList=[] 295 state=False 296 def __init__(self,host="localhost",username="opensim",password="1234",dblist=["robust","opensim0,opensim1,opensim2"],path="C:/wamp",app="/wampmanager.exe"): 297 self.host=host 350 'USER': 'User', # REST username 351 'PASS': '1234' # REST password 352 })README.md https://gitlab.com/tpayseno/spring-integration-samples | Markdown | 251 lines
74 <property name="URL" value="jdbc:oracle:thin:@//localhost:1521/XE" /> 75 <property name="password" value="storedproc" /> 76 <property name="user" value="storedproc" /> 108BEGIN 109 cool_number := 12345; 110 RETURN cool_number; 147 Retrieving Numeric value via Sql Function... 148 Converted 'hello world' - End Result: 'HELLO WORLD_12345'. 149SendMailUtil.java https://gitlab.com/MetadataDev/cpom | Java | 294 lines
28 private static final String username = "thinkgem@163.com"; 29 private static final String password = "123456"; 30 111 hemail.setFrom(from, fromName); 112 hemail.setAuthentication(username, password); 113 hemail.setSubject(subject); 151 hemail.setFrom(from, fromName); 152 hemail.setAuthentication(username, password); 153 hemail.setSubject(subject);lesson_group_override.feature https://github.com/pauln/moodle.git | Gherkin Specification | 340 lines
147 | Override group | Group 1 | 148 | Password protected lesson | 12345 | 149 And I press "Save" 149 And I press "Save" 150 And I should see "Password protected lesson" 151 And I log out 156 And I should not see "Cat is an amphibian" 157 And I set the field "userpassword" to "moodle_rules" 158 And I press "Continue" 160 And I should see "Test lesson name is a password protected lesson" 161 And I set the field "userpassword" to "12345" 162 And I press "Continue" 174 And I should not see "Cat is an amphibian" 175 And I set the field "userpassword" to "12345" 176 And I press "Continue"productivity.py https://gitlab.com/tsltd/django-timepiece | Python | 212 lines
17 self.username = 'test_user' 18 self.password = 'password' 19 self.user = self.create_user(username=self.username, 19 self.user = self.create_user(username=self.username, 20 password=self.password) 21 self.permission = Permission.objects.get(codename='view_entry_summary') 22 self.user.user_permissions.add(self.permission) 23 self.client.login(username=self.username, password=self.password) 24 113 """Form requires specification of valid project.""" 114 data = {'organize_by': 'week', 'project_1': 12345} 115 response = self._get(data=data)test_driver.py https://github.com/comstud/nova.git | Python | 329 lines
115 result['spawn_params'] = dict( 116 admin_password='test_pass', 117 block_device_info=None, 183 db.bm_node_update(self.context, node['node']['id'], 184 {'instance_uuid': '1234-5678'}) 185ipa_user.py https://gitlab.com/cfernand/acm-aap-demo | Python | 397 lines
208 if krbpasswordexpiration is not None: 209 user['krbpasswordexpiration'] = krbpasswordexpiration + "Z" 210 if givenname is not None: 225 if userpassword is not None: 226 user['userpassword'] = userpassword 227 if gidnumber is not None: 310 module_user = get_user_dict(displayname=module.params.get('displayname'), 311 krbpasswordexpiration=module.params.get('krbpasswordexpiration'), 312 givenname=module.params.get('givenname'), 316 telephonenumber=module.params['telephonenumber'], title=module.params['title'], 317 userpassword=module.params['password'], 318 gidnumber=module.params.get('gidnumber'), uidnumber=module.params.get('uidnumber'), 321 322 update_password = module.params.get('update_password') 323 ipa_user = client.user_find(name=name)Registration.php https://gitlab.com/gideonmarked/wellmarketing | PHP | 224 lines
112 $user->email = $data['email']; 113 $user->password = $data['password']; 114 $user->password_confirmation = $data['password_confirmation']; 200 { 201 $characters = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'; 202 $string = '';WriteWifiConfigToNfcDialog.java https://gitlab.com/freedmpure/platform_packages_apps_settings | Java | 283 lines
101 102 mPasswordView = (TextView) mView.findViewById(R.id.password); 103 mLabelView = (TextView) mView.findViewById(R.id.password_label); 104 mPasswordView.addTextChangedListener(this); 105 mPasswordCheckBox = (CheckBox) mView.findViewById(R.id.show_password); 106 mPasswordCheckBox.setOnCheckedChangeListener(this); 124 = mWifiManager.getWpsNfcConfigurationToken(mAccessPoint.networkId); 125 String passwordHex = byteArrayToHexString(password.getBytes()); 126 126 127 String passwordLength = password.length() >= HEX_RADIX 128 ? Integer.toString(password.length(), HEX_RADIX) 130 131 passwordHex = String.format(PASSWORD_FORMAT, passwordLength, passwordHex).toUpperCase(); 132PacienteControllerTestes.java https://gitlab.com/lfelipelizeu/desafio-tecnico-backend-conexa | Java | 202 lines
22import org.springframework.http.MediaType; 23import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder; 24import org.springframework.test.context.junit4.SpringRunner; 47 medico.setEmail("luis@email.com"); 48 BCryptPasswordEncoder encoder = new BCryptPasswordEncoder(); 49 medico.setSenha(encoder.encode("12345"));DatabaseTest.cs https://gitlab.com/jslee1/azure-powershell | C# | 213 lines
65 /// </summary> 66 private const string LocalRdfeEndpoint = @"https://management.dev.mscds.com:12346/"; 67 76 CultureInfo.InvariantCulture, 77 "-ManageUrl \"{0}\" -UserName \"{1}\" -Password \"{2}\" " 78 + "-SubscriptionId \"{3}\" -SerializedCert \"{4}\" ", 80 SqlDatabaseTestSettings.Instance.UserName, 81 SqlDatabaseTestSettings.Instance.Password, 82 SqlDatabaseTestSettings.Instance.SubscriptionId, 98 CultureInfo.InvariantCulture, 99 "-Name \"{0}\" -ManageUrl \"{1}\" -UserName \"{2}\" -Password \"{3}\" " 100 + "-ServerName \"{4}\" -SubscriptionID \"{5}\" -SerializedCert \"{6}\" " 104 SqlDatabaseTestSettings.Instance.UserName, 105 SqlDatabaseTestSettings.Instance.Password, 106 SqlDatabaseTestSettings.Instance.ServerName,marshal.R https://gitlab.com/proteomics-bioinformatics-lnbio/galaxy_proteomics | R | 202 lines
30#Database connections and queries 31db.connection <- dbConnect(RMySQL::MySQL(), user='galaxy', host='localhost', dbname='conversionMarcelo', password='123456', unix.sock=db.socket); 32CoreApplicationPrototypeTests.swift https://gitlab.com/InboundRX-Capstone/Paulsens-iOS-App | Swift | 193 lines
133 134 var result = user.loginUser(emailField: "edittest@edit.com", passwordField: "password123") 135 XCTAssert(result.0) 151 152 result = user.editPassword(currentPassword: "password123", password: "password321", repeatPassword:"password321") 153 XCTAssert(result.0) 155 156 result = user.editPassword(currentPassword: "password321", password: "password123", repeatPassword:"password123") 157 XCTAssert(result.0) 171 172 result = user.editPhone(phone: "1234567890", currentPassword: "password123") 173 XCTAssert(result.0) 186 187 result = user.editAddress(address: "12345 NorthPole Ave., North Pole, North 00000", currentPassword: "password123") 188 XCTAssert(result.0)LoginDialogFragment.java https://gitlab.com/khoa-io/slp | Java | 168 lines
32 private EditText usernameEdit; 33 private EditText passwordEdit; 34 private CheckBox checkRememberLogin; 70 usernameEdit = (EditText) view.findViewById(R.id.edit_username); 71 passwordEdit = (EditText) view.findViewById(R.id.edit_password); 72 checkRememberLogin = (CheckBox) view.findViewById(R.id.check_remember_login); 75 usernameEdit.setText(prefs.getString(getActivity().getString(R.string.username), "")); 76 passwordEdit.setText(prefs.getString(getActivity().getString(R.string.password), "")); 77 79 usernameEdit.setText("dungpqshipper"); 80 passwordEdit.setText("12345678"); 81 } 147 String username = usernameEdit.getText().toString(); 148 String password = passwordEdit.getText().toString(); 149 boolean rememberLogin = checkRememberLogin.isChecked();DavResourceFinderTest.java https://gitlab.com/Tveiker/davdroid | Java | 192 lines
55 56 credentials = new LoginCredentials(URI.create("/"), "mock", "12345"); 57 finder = new DavResourceFinder(getInstrumentation().getContext(), credentials); 59 client = HttpClient.create(); 60 client = HttpClient.addAuthentication(client, credentials.userName, credentials.password); 61 }ezsig.rb https://github.com/bblimke/adva_cms.git | Ruby | 535 lines
53=begin rdoc 54 Decode a PEM encoded Private Key and return a signer. Takes an optional password 55=end 55=end 56 def self.decode(encoded,password=nil) 57 begin 57 begin 58 EzCrypto::Signer.new(OpenSSL::PKey::RSA.new( encoded,password)) 59 rescue 59 rescue 60 EzCrypto::Signer.new(OpenSSL::PKey::DSA.new( encoded,password)) 61 end 64=begin rdoc 65 Decode a PEM encoded Private Key file and return a signer. Takes an optional password 66=endrecoverable_test.rb https://github.com/gguerragui/devise.git | Ruby | 138 lines
40 test 'should reset password and save the record' do 41 assert create_user.reset_password!('123456789', '123456789') 42 end 49 assert_present user.reset_password_token 50 assert user.reset_password!('123456789', '123456789') 51 assert_nil user.reset_password_token 106 107 reset_password_user = User.reset_password_by_token(:reset_password_token => user.reset_password_token) 108 assert_equal reset_password_user, user 111 test 'should a new record with errors if no reset_password_token is found' do 112 reset_password_user = User.reset_password_by_token(:reset_password_token => 'invalid_token') 113 assert_not reset_password_user.persisted? 117 test 'should a new record with errors if reset_password_token is blank' do 118 reset_password_user = User.reset_password_by_token(:reset_password_token => '') 119 assert_not reset_password_user.persisted?test_issues.py https://gitlab.com/sunkistm/gitlab-web2py | Python | 278 lines
147 c = conn.cursor() 148 # grant access to a table to a user with a password 149 try: 151 c.execute("insert into issue17 (x) values ('hello, world!')") 152 c.execute("grant all privileges on %s.issue17 to 'issue17user'@'%%' identified by '1234'" % db) 153 conn.commit() 154 155 conn2 = pymysql.connect(host=host, user="issue17user", passwd="1234", db=db) 156 c2 = conn2.cursor()xml.php https://github.com/RosYama/rosyama.ru.git | PHP | 136 lines
4 5class C1234HoleApiXML 6{ 88 $res = CIBlockElement::GetList(array(), array('IBLOCK_CODE' => 'GIBDD_HEADS', 'PROPERTY_SUBJECT_ID' => $id), array('PROPERTY_FIO', 'PROPERTY_POST', 'PROPERTY_POST_DATIVE', 'PROPERTY_ADDRESS', 'PROPERTY_TEL_DEGURN', 'PROPERTY_GIBDD_NAME')); 89 if (!$res) echo C1234HoleApiXML::Error('INTERNAL'); 90 $arElement = $res->Fetch(); 113 global $USER; 114 $hash = str_replace('<', '<', $USER->GetParam('PASSWORD_HASH')); 115 $hash = str_replace('>', '>', $hash); 122 </username> 123 <passwordhash><?= $hash ?></passwordhash> 124 </user><? echo "\n";EmailSender.cpp https://github.com/BlitzMaxModules/bah.mod.git | C++ | 425 lines
19 20static const char base64Map[]="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; 21 21 22const char *EmailSender::Send(const char *hostAddress, unsigned short hostPort, const char *sender, const char *recipient, const char *senderName, const char *recipientName, const char *subject, const char *body, FileList *attachedFiles, bool doPrintf, const char *password) 23{ 84 return response; 85 if (password==0) 86 return "Password needed"; 93 bs.Write(&zero,1); 94 bs.Write(password,(const unsigned int)strlen(password)); 95 bs.Write(&zero,1); 95 bs.Write(&zero,1); 96 //bs.Write("not.my.real.password",(const unsigned int)strlen("not.my.real.password")); 97 Base64Encoding((const char*)bs.GetData(), bs.GetNumberOfBytesUsed(), outputData, base64Map);string_helper.php https://gitlab.com/ricoru21/py_incidencia | PHP | 307 lines
186 * 187 * Useful for generating passwords or hashes. 188 * 210 break; 211 case 'alnum' : $pool = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ'; 212 break; 212 break; 213 case 'numeric' : $pool = '0123456789'; 214 break; 214 break; 215 case 'nozero' : $pool = '123456789'; 216 break;GUIDialogGamepad.cpp https://gitlab.com/sandihidayat/kodi | C++ | 315 lines
191// \return true if successful display and user input entry/re-entry. false if unsuccessful display, no user input, or canceled editing. 192bool CGUIDialogGamepad::ShowAndVerifyNewPassword(std::string& strNewPassword) 193{ 206 207 // Prompt again for password input, this time sending previous input as the password to verify 208 if (!ShowAndVerifyInput(strUserInput, "12341", "12330", "12331", "", false, true)) 210 // TODO: Show error to user saying the password re-entry failed 211 CGUIDialogOK::ShowAndGetInput(12357, 12344); // Password do not match 212 return false; 224// \return 0 if successful display and user input. 1 if unsuccessful input. -1 if no user input or canceled editing. 225int CGUIDialogGamepad::ShowAndVerifyPassword(std::string& strPassword, const std::string& dlgHeading, int iRetries) 226{ 230 // Show a string telling user they have iRetries retries left 231 strLine2 = StringUtils::Format("%s %i %s", g_localizeStrings.Get(12342).c_str(), iRetries, g_localizeStrings.Get(12343).c_str()); 232 }md5-crypt.c git://pkgs.fedoraproject.org/tcl-trf | C | 251 lines
59static const char b64t[64] = 60"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; 61 147 148 /* Now comes another weirdness. In fear of password crackers here 149 comes a quite long loop which just processes the output of the 235 /* We don't want to have an arbitrary limit in the size of the 236 password. We can compute the size of the result in advance and 237 so we can prepare the buffer we pass to `md5_crypt_r'. */nl.inc.php https://gitlab.com/sylver.gocloud/gocloudasia-college-system-framework | PHP | 269 lines
7 'Username' => 'Gebruikersnaam', 8 'Password' => 'Wachtwoord', 9 'Select database' => 'Database selecteren', 181 ',' => '.', 182 '0123456789' => '0123456789', 183 'Analyze' => 'Analyseer',UserServiceTests.groovy https://bitbucket.org/stefanjummp/jummp.git | Groovy | 374 lines
31 @Test 32 void testChangePassword() { 33 authenticateAsTestUser() 34 shouldFail(BadCredentialsException) { 35 userService.changePassword("wrong", "secure") 36 } 36 } 37 userService.changePassword("secret", "secure") 38 shouldFail(BadCredentialsException) { 82 assertEquals("username", user.username) 83 assertNull(user.password) 84 assertNull(user.enabled) 86 assertNull(user.accountLocked) 87 assertNull(user.passwordExpired) 88 authenticateAsAdmin()v1_registration_login.rst https://gitlab.com/sim6/matrix-doc | ReStructuredText | 343 lines
9account. The homeserver may provide many different ways of logging in, such as 10user/password auth, login via a social network (OAuth2), login by confirming a 11token sent to their email address, etc. This specification does not define how 63 "user_id": "@user:matrix.org", 64 "access_token": "abcdef0123456789" 65 } 80This specification defines the following login types: 81 - ``m.login.password`` 82 - ``m.login.oauth2`` 86 87Password-based 88~~~~~~~~~~~~~~ 98 "user": "<user_id or user localpart>", 99 "password": "<password>" 100 }admin.php https://github.com/gustavosf/semac.git | PHP | 202 lines
55 $auth = Auth::instance(); 56 if ($auth->login(Input::post('username'), Input::post('password'))) 57 { 108 { 109 $pass = substr(str_shuffle('abcdefghijklmnopqrstuvxyzABCDEFGHIJKLMNOPQRSTUVXYZ0123456789'),0,6); 110 $pass = $user->resetar_senha(); // já efetua o salvamento do registro 163 { 164 if ( ! $user->change_password(Input::post('senha_atual'), Input::post('nova_senha'))) 165 {utils.php https://github.com/andreassolberg/DiscoJuice.git | PHP | 343 lines
108 * 109 * Generate random password. 110 * Borrowed from here: http://www.codemiles.com/php-tutorials/generate-password-using-php-t3120.html 112 */ 113 public static function generateRandpassword($size=12, $power=7) { 114 $vowels = 'aeuy'; 128 129 $Randpassword = ''; 130 $alt = time() % 2; 132 if ($alt == 1) { 133 $Randpassword .= $randconstant[(rand() % strlen($randconstant))]; 134 $alt = 0; 324 /** 325 * Encode username and password for use in .htpassword file. 326 * The latest version is prepared to be supported with the HTTP Digestid.inc.php https://gitlab.com/sylver.gocloud/gocloudasia-college-system-framework | PHP | 317 lines
6 'Username' => 'Pengguna', 7 'Password' => 'Sandi', 8 'Permanent login' => 'Masuk permanen', 94 ',' => '.', 95 '0123456789' => '0123456789', 96 'Engine' => 'Mesin',engine.rb https://github.com/deviantech/gattica.git | Ruby | 283 lines
6 7 # Initialize Gattica using username/password or token. 8 # 14 # +:logger+:: Logger to use (default is STDOUT) 15 # +:password+:: Your password for Google Analytics 16 # +:profile_id+:: Use this Google Analytics profile_id (default is nil) 33 # 34 # ga = Gattica.new({:email => 'johndoe@google.com', :password => 'password'}) 35 # ga.accounts 57 # == Usage 58 # ga = Gattica.new({:email => 'johndoe@google.com', :password => 'password'}) 59 # ga.segments # Look up segment id 81 # 82 # gs = Gattica.new({:email => 'johndoe@google.com', :password => 'password', :profile_id => 123456}) 83 # gs.get({ :start_date => '2008-01-01',SFTPUserStoryTest.php https://gitlab.com/xolotsoft/pumasruiz | PHP | 478 lines
20 21 self::$exampleData = str_repeat('abcde12345', 1000); 22 self::$exampleDataLength = 10000; 39 */ 40 public function testPasswordLogin($sftp) 41 { 42 $username = $this->getEnv('SSH_USERNAME'); 43 $password = $this->getEnv('SSH_PASSWORD'); 44 $this->assertTrue( 44 $this->assertTrue( 45 $sftp->login($username, $password), 46 'SSH2/SFTP login using password failed.' 52 /** 53 * @depends testPasswordLogin 54 */final_project_beg.sql https://gitlab.com/sdlion/project_the_beginner_b35 | SQL | 150 lines
31 `email` varchar(111) NOT NULL, 32 `password` varchar(111) NOT NULL, 33 PRIMARY KEY (`id`) 39 40INSERT INTO `admin` (`id`, `email`, `password`) VALUES 41(1, 'jerinisrat@gmail.com', '1234'), 41(1, 'jerinisrat@gmail.com', '1234'), 42(2, 'israt@gmail.com', '12345'); 43 128 `email` varchar(111) NOT NULL, 129 `password` varchar(111) NOT NULL, 130 `phone` varchar(111) NOT NULL, 139 140INSERT INTO `users` (`id`, `first_name`, `last_name`, `email`, `password`, `phone`, `address`, `email_verified`) VALUES 141(1, 'Israt', 'ema', 'israt.ctg75@gmail.com', '182be0c5cdcd5072bb1864cdee4d3d6e', '33', 'cc', 'd87391f56ebb944ce0d45cd13b7aec96'),utils_test.go https://gitlab.com/auchalet/mattermost | Go | 197 lines
37 {"", true, false, tDate0}, 38 {"1234", true, false, tDate0}, 39 {0, true, false, tDate0}, 67 {0x0000000000000100, []byte{0xfc, 0x00, 0x01}}, 68 {0x0000000000001234, []byte{0xfc, 0x34, 0x12}}, 69 {0x000000000000ffff, []byte{0xfc, 0xff, 0xff}}, 70 {0x0000000000010000, []byte{0xfd, 0x00, 0x00, 0x01}}, 71 {0x0000000000123456, []byte{0xfd, 0x56, 0x34, 0x12}}, 72 {0x0000000000ffffff, []byte{0xfd, 0xff, 0xff, 0xff}}, 73 {0x0000000001000000, []byte{0xfe, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00}}, 74 {0x123456789abcdef0, []byte{0xfe, 0xf0, 0xde, 0xbc, 0x9a, 0x78, 0x56, 0x34, 0x12}}, 75 {0xffffffffffffffff, []byte{0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}}, 107 for _, tuple := range vectors { 108 ours := scrambleOldPassword(scramble, []byte(tuple.pass)) 109 if tuple.out != fmt.Sprintf("%x", ours) {subversion_spec.rb https://github.com/pcross616/chef.git | Ruby | 230 lines
27 @resource.destination "/my/deploy/dir" 28 @resource.revision "12345" 29 @node = Chef::Node.new 104 it "returns the revision number as is if it's already an integer" do 105 @provider.revision_int.should eql("12345") 106 end 147 it "generates a checkout command with default options" do 148 @provider.checkout_command.should eql("svn checkout -q -r12345 http://svn.example.org/trunk/ /my/deploy/dir") 149 end 152 @resource.svn_username "deployNinja" 153 @resource.svn_password "vanish!" 154 @provider.checkout_command.should eql("svn checkout -q --username deployNinja --password vanish! " + 154 @provider.checkout_command.should eql("svn checkout -q --username deployNinja --password vanish! " + 155 "-r12345 http://svn.example.org/trunk/ /my/deploy/dir") 156 endfixtures.yml https://github.com/bennett/xlsuite.git | YAML | 301 lines
28 login: demo 29 password: password 30 113 login: LOGIN 114 password: PASSWORD 115 signature: SIGNATURE 118 login: LOGIN 119 password: PASSWORD 120 258 login: LOGIN 259 password: PASSWORD 260 293 login: LOGIN 294 password: PASSWORD 295 user: USERmobile-checkout.php https://github.com/MIT-EPROM/EPROM.git | PHP | 161 lines
21step 1 - configure your account for mobile checkout - paypal > profile > api access > edit / create > tick SetMobileCheckout and DoMobileCheckoutPayment 22step 2 - configure your api username, password and signature in constants.php 23step 3 - upload, test and integrate with your mobile site - when you want to go live comment out the sandbox value below 60 $submit_string .= '&DESC=Product+Description'; // REQUIRED - the name of the item being offered <127 characters 61 $submit_string .= '&RETURNURL='.urlencode('http://'.$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']); // REQUIRED - urlencoded value - where the customer is directed to post paypal - ?token=123456789 will be added - it's suggested to make it the final review page prior to ordering 62 $submit_string .= '&CANCELURL='.urlencode('http://'.$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']); // REQUIRED - urlencoded value - where the customer is directed to if they click the cancel or return to merchant links at paypalphp_crypt_r.c https://bitbucket.org/luobailiang/php-src.git | C | 428 lines
114static unsigned char itoa64[] = /* 0 ... 63 => ascii - 64 */ 115 "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; 116 169 170 /* The password first, since that is what is most unknown */ 171 if(!CryptHashData(ctx, (BYTE *)pw, pwl, 0)) { 316/* 317 * MD5 password encryption. 318 */ 346 347 /* The password first, since that is what is most unknown */ 348 PHP_MD5Update(&ctx, (const unsigned char *)pw, pwl);vm_vdi_cleaner.py https://github.com/blamarvt/nova.git | Python | 385 lines
35flags.DECLARE("xenapi_connection_username", "nova.virt.xenapi_conn") 36flags.DECLARE("xenapi_connection_password", "nova.virt.xenapi_conn") 37 100 # then fall back to hex. 101 fake_instance_id = 123456789 102 result = template % fake_instance_id 356 session = XenAPI.Session(FLAGS.xenapi_connection_url) 357 session.xenapi.login_with_password(FLAGS.xenapi_connection_username, 358 FLAGS.xenapi_connection_password)db_pos_7_27_2016.sql https://gitlab.com/MohammadShakil/POS_Management_System | SQL | 355 lines
65 `email` varchar(50) NOT NULL, 66 `password` varchar(50) NOT NULL, 67 PRIMARY KEY (`id`) 73 74INSERT INTO `login` (`id`, `first_name`, `last_name`, `email`, `password`) VALUES 75(1, 'mamun', 'rahaman', 'mamunur@gmail.com', '123456'), 280INSERT INTO `users` (`user_id`, `user_type_id`, `user_name`, `user_email`, `user_pass`) VALUES 281(1, 1, 'smartrashed', 'smartrashed@gmail.com', '123456'); 282login_controller_spec.rb https://github.com/liquid/taskboard.git | Ruby | 124 lines
61 it "should show message when login is not correct" do 62 post :login, {:login => 'cognifide', :password => 'qwe1234'} 63 response.should_not be_redirect 95 it "should allow adding new viewer user" do 96 user_data = {:username => "newuser", :password => "password", :password_confirmation => "password"} 97 user = User.new(user_data) 97 user = User.new(user_data) 98 User.should_receive(:new).with({"username" => "newuser", "password" => "password", "password_confirmation" => "password"}).and_return(user) 99 user.should_receive(:save).and_return(true) 107 it "should allow adding new editor user" do 108 user_data = {:username => "newuser", :password => "password", :password_confirmation => "password", :editor => true} 109 user = User.new(user_data) 110 user.editor?.should be_true 111 User.should_receive(:new).with({"username" => "newuser", "password" => "password", "password_confirmation" => "password", "editor" => true}).and_return(user) 112 user.should_receive(:save).and_return(true)chapter_03.scm https://gitlab.com/o1s2/selflrrn | Scheme | 218 lines
37 (define (incorrect-password ignored-amount) 38 (set! incorrect-password-attempts (inc incorrect-password-attempts)) 39 (if (>= incorrect-password-attempts %allowed-attempts) 89(define (make-account acc-password balance) 90 (let ((incorrect-password-attempts 0) (passwords (list acc-password))) 91 (define %allowed-attempts 3) 107 (define (dispatch password message) 108 (if (member? password passwords) 109 (begin 112 ((eq? message 'deposit) deposit) 113 ((eq? message 'add-password) add-password) 114 (else (error "Unknown request -- MAKE-ACCOUNT" m)))) 118(define (make-joint account acc-password extra-password) 119 ((account acc-password 'add-password) extra-password) 120 account)registrations_controller_spec.rb https://gitlab.com/tbeadle/gitlab-ce | Ruby | 165 lines
6 describe '#create' do 7 let(:user_params) { { user: { name: 'new_user', username: 'new_username', email: 'new@user.com', password: 'Any_password' } } } 8 120 context 'user requires password confirmation' do 121 it 'fails if password confirmation is not provided' do 122 post :destroy 123 124 expect_password_failure 125 end 127 it 'fails if password confirmation is wrong' do 128 post :destroy, password: 'wrong password' 129 133 it 'succeeds if password is confirmed' do 134 post :destroy, password: '12345678' 135ecommerce.sql https://gitlab.com/thoussem/Tunisie-Shop | SQL | 147 lines
101 `email` varchar(50) NOT NULL, 102 `password` varchar(30) NOT NULL, 103 `tel` int(8) NOT NULL, 118 UNIQUE KEY `email_7` (`email`), 119 FULLTEXT KEY `password` (`password`) 120) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=38 ; 125 126INSERT INTO `utilisateurs` (`id`, `username`, `nom`, `prenom`, `titre`, `email`, `password`, `tel`, `ville`, `codpost`, `codtel`, `adresse1`, `adresse2`) VALUES 127(37, 't.houssem', 'Trabelsi', 'Houssem', 'mr', 't.houssemg@gmail.com', '123456', 0, '', 0, 0, '', '');test_read_format_7zip_encryption_partially.c https://bitbucket.org/freebsd/freebsd-base.git | C | 82 lines
30 /* This file is password protected (encrypted) with AES-256. The headers 31 are NOT encrypted. Password is "12345678". It contains one encrypted 32 and one unencrypted file. */calendarscript.js https://gitlab.com/sylver.gocloud/demo-sw-k12-enrollment | JavaScript | 207 lines
118 //for username generation in hrd or admin (employee_settings/change_settings) 119 var charArray = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890"; 120 $('#gen_uname').click(function(){ 139 140 //for password generation in hrd or admin (employee_settings/change_settings) 141 $('#gen_pword').click(function(){ 146 } 147 $("<div title='Generated Password'>Use " + rand_pword + " as password?</div>").dialog({ 148 resizable: false, 150 "OK" : function(){ 151 $('#password').val(rand_pword); 152 $(this).dialog("close"); 161 $('#submit_changes').click(function(){ 162 if($('#username').val() == '' && $('#password').val() == ''){ 163 $("<div title='No entry found'>Please enter at least one entry</div>").dialog({cmd.py https://github.com/kumar303/funfactory.git | Python | 320 lines
87 88def create_settings(pkg, repo_dest, db_user, db_name, db_password, db_host, 89 db_port): 95 sk = ''.join([ 96 random.choice('abcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*(-_=+)') 97 for i in range(50)]) 100 'db_name': db_name, 101 'db_password': db_password or '', 102 'db_host': db_host or '', 116 - 'USER': 'root', 117 - 'PASSWORD': '', 118 - 'HOST': '', 121 + 'USER': '%(db_user)s', 122 + 'PASSWORD': '%(db_password)s', 123 + 'HOST': '%(db_host)s',api.html.erb https://github.com/jlneto/myraces.git | Ruby HTML | 44 lines
19 20 <p class="mb-4">If you'd like to authenticate users through the API using their email and password to retrieve an API token, you can make a POST request to the auth endpoint with the user's email and password. This is handy for authenticating from a mobile app, etc.</p> 21 22 <pre><code>POST /api/v1/auth.json 23Params: { email: "steve@apple.com", password: "hunter2" }</code></pre> 24 25 <p>This will return a JSON response with a token you can use to access the API.</p> 26 <pre><code>{ token: "abcd1234" }</code></pre> 27launch.rst https://github.com/fcr/StarCluster.git | ReStructuredText | 167 lines
26 >>> Creating security group @sc-physicscluster... 27 RESERVATION r-d71f20be 123456789012 default 28 INSTANCE i-10e91578 ami-17b15e7e pending gsg-keypair 0 m1.small ... 30 >>> Node AMI: ami-17b15e7e 31 RESERVATION r-ab1f20c2 123456789012 default 32 INSTANCE i-14e9157c ami-17b15e7e pending gsg-keypair 0 m1.small ... 43 >>> Configuring NFS... 44 >>> Configuring passwordless ssh for root 45 >>> Configuring passwordless ssh for user: myusermetadata_test.go https://gitlab.com/CORP-RESELLER/cf-distribution | Go | 182 lines
16 } 17 Password string 18 secret string 63 }, 64 "Password": "", 65 "email": "", 124 "string": "string", 125 "password": "secret", 126 "array": []hash{{ 126 "array": []hash{{ 127 "creditcard": "1234567812345678", 128 "broken": broken, 134 135 n := m.sanitize([]string{"password", "creditcard"}) 136mail_owner.php https://gitlab.com/shaon2016/bidwarbd | PHP | 110 lines
76//Password to use for SMTP authentication 77$mail->Password = "php12345"; 78//Set who the message is to be sent fromtest_delchal.py https://gitlab.com/bbhavesh07/gkcore | Python | 194 lines
29 def setup_class(self): 30 orgdata = {"orgdetails":{'orgname': 'Test Organisation', 'yearend': '2016-03-31', 'yearstart': '2015-04-01', 'orgtype': 'Profit Making', 'invflag': 1}, "userdetails":{"username":"admin", "userpassword":"admin","userquestion":"who am i?", "useranswer":"hacker"}} 31 result = requests.post("http://127.0.0.1:6543/organisations",data=json.dumps(orgdata)) 36 """ Check and delete the user creation if it's not being used! """ 37 userdata = {"username":"user","userpassword":"passwd","userrole":0,"userquestion":"what is my pet name?","useranswer":"cat"} 38 result = requests.post("http://127.0.0.1:6543/users", data=json.dumps(userdata), headers=self.header) 46 """ Doubt: This should be a customer or supplier? I have created both!""" 47 custdata = {"custname":"customer","custaddr":"goregaon","custphone":"22432123","custemail":"customer@gmail.com","custfax":"FAXCUST212345","state":"Maharashtra","custpan":"CUSTPAN1234","custtan":"CUSTTAN1234","csflag":3} 48 result = requests.post("http://127.0.0.1:6543/customersupplier",data=json.dumps(custdata),headers=self.header) 55 """ supid is used to store custid attribute """ 56 custdata = {"custname":"supplier","custaddr":"borivali","custphone":"44432123","custemail":"supplier@gmail.com","custfax":"FAXSUP212345","state":"Maharashtra","custpan":"SUPPAN1234","custtan":"SUPTAN1234","csflag":19} 57 result = requests.post("http://127.0.0.1:6543/customersupplier",data=json.dumps(custdata),headers=self.header)TokenBasedRememberMeServicesTest.php https://gitlab.com/Isaki/le331.fr | PHP | 285 lines
62 $request = new Request(); 63 $request->cookies->set('foo', base64_encode('class:'.base64_encode('foouser').':123456789:fooHash')); 64 67 ->expects($this->once()) 68 ->method('getPassword') 69 ->will($this->returnValue('foopass')) 92 ->expects($this->once()) 93 ->method('getPassword') 94 ->will($this->returnValue('foopass')) 122 ->expects($this->once()) 123 ->method('getPassword') 124 ->will($this->returnValue('foopass')) 215 ->expects($this->once()) 216 ->method('getPassword') 217 ->will($this->returnValue('foopass'))apps.amine.bou.readerforselfoss.yml https://gitlab.com/revuwa/fdroiddata | YAML | 419 lines
29 - appLoginUsername="LOGIN" 30 - appLoginPassword="PASS" 31 40 - appLoginUsername="LOGIN" 41 - appLoginPassword="PASS" 42 51 - appLoginUsername="LOGIN" 52 - appLoginPassword="PASS" 53 62 - appLoginUsername="LOGIN" 63 - appLoginPassword="PASS" 64 73 - appLoginUsername="LOGIN" 74 - appLoginPassword="PASS" 75checksession.php https://bitbucket.org/frchico/chamilo_openshift.git | PHP | 99 lines
27 28//$confkey = "0123456789abcdef0123456789abcdef"; 29$confkey = api_get_setting('service_visio','visio_pass'); 29$confkey = api_get_setting('service_visio','visio_pass'); 30$challenge = api_generate_password(32); //generate a 32 characters-long challenge key 31_NAMES4EVER.php https://github.com/axxtel/agilebill.git | PHP | 172 lines
29 user 30 password 31 plan_id 97 # generate the xml string 98 $xml_request = '?<?xml version="1.0" ?><request version="1.0" id="REQUEST-123456">'. 99 '<reseller id="'. $this->registrar['user'] .'">'. 99 '<reseller id="'. $this->registrar['user'] .'">'. 100 '<password>secret'. $this->registrar['password'] .'</password>'. 101 '<plan-id>'. $this->registrar['plan_id'] .'</plan-id>'. 103 '<add-domain fqdn="'. $this->domain_name .'">'. 104 '<password>'. $this->account['password'] .'</password>'. 105 '<organization>'. $this->account['company'] .'</organization>'.Program.cs https://github.com/thunderstumpges/EnyimMemcached.git | C# | 123 lines
32 config.Authentication.Parameters["userName"] = "demo"; 33 config.Authentication.Parameters["password"] = "demo"; 34 73 //// store some other items 74 //mc.Store(StoreMode.Set, "D1", 1234L); 75 //mc.Store(StoreMode.Set, "D2", DateTime.Now); 81 82 ////mc2.Store(StoreMode.Set, "D1", 1234L); 83 ////mc2.Store(StoreMode.Set, "D2", DateTime.Now);GivenEmbeddedViewerAndPersistentDomainObject.java https://gitlab.com/essere.lab.public/qualitas.class-corpus | Java | 157 lines
141 142 employeeVO.setPassword("12345678"); 143 } 152 153 employeeVO.setPassword("12345678"); 154reset.tests.js https://gitlab.com/nioto/michel-app | JavaScript | 378 lines
127 $('#a0-reset_easy_password').val(password); 128 $('#a0-reset_easy_repeat_password').val(password); 129 140 var username = '1.1.1.1'; 141 var password = '12345'; 142 145 $('#a0-reset_easy_email').val(username); 146 $('#a0-reset_easy_password').val(password); 147 $('#a0-reset_easy_repeat_password').val(password); 216 $('#a0-reset_easy_email').val(email); 217 $('#a0-reset_easy_password').val(password); 218 $('#a0-reset_easy_repeat_password').val(password); 325 $('#a0-reset_easy_password').val(password); 326 $('#a0-reset_easy_repeat_password').val(password); 327postgresql.php https://github.com/Hackwar/joomla-platform.git | PHP | 141 lines
37 * 38 * An example DSN would be: host=localhost;port=5432;dbname=joomla_ut;user=utuser;pass=ut1234 39 * 84 case 'pass': 85 self::$_options['password'] = $v; 86 break; 136 // Create the PDO object from the DSN and options. 137 $pdo = new PDO($dsn, self::$_options['user'], self::$_options['password']); 138http_auth_handler_digest.cc https://gitlab.com/jonnialva90/iridium-browser | C++ | 383 lines
39//==========+==========+==========================================+ 40// | ?, md5 | user:realm:password | 41//----------+----------+------------------------------------------+ 41//----------+----------+------------------------------------------+ 42// | md5-sess | MD5(user:realm:password):nonce:cnonce | 43//==========+==========+==========================================+ 62 // This is how mozilla generates their cnonce -- a 16 digit hex string. 63 static const char domain[] = "0123456789abcdef"; 64 std::string cnonce; 327 ":" + original_realm_ + ":" + 328 base::UTF16ToUTF8(credentials.password())); 329 if (algorithm_ == HttpAuthHandlerDigest::ALGORITHM_MD5_SESS)AuthTest.java https://bitbucket.org/robeden/intrepid.git | Java | 129 lines
87 @Test( expected = ConnectionFailureException.class ) 88 public void testUserAuth_badPassword() throws Exception { 89 client_instance.connect( InetAddress.getLoopbackAddress(), 97 InetAddress.getLoopbackAddress(), server_instance.getServerPort(), 98 new UserCredentialsConnectionArgs( "reden", "12345".toCharArray() ), 99 null ); 121 122 if ( !"12345".equals( new String( credentials.getPassword() ) ) ) { 123 throw new ConnectionAuthFailureException( "Bad password" );basicauthentication.c https://github.com/MaDDoGo/xbmc.git | C | 182 lines
8#define USER "a legitimate user" 9#define PASSWORD "and his password" 10 50is_authenticated (struct MHD_Connection *connection, 51 const char *username, const char *password) 52{ 65 66 expected = malloc (strlen (username) + 1 + strlen (password) + 1); 67 if (NULL == expected) 71 strcat (expected, ":"); 72 strcat (expected, password); 73 121 122 if (!is_authenticated (connection, USER, PASSWORD)) 123 return ask_for_authentication (connection, REALM);test_webrick_server.rb https://gitlab.com/MichelZuniga/ruby | Ruby | 137 lines
73 @s.user = 'admin' 74 @s.password = 'admin' 75 silent do 79 @s = XMLRPC::Client.new3(:host => addr.ip_address, :port => addr.ip_port, :use_ssl => use_ssl) 80 @s.user = '01234567890123456789012345678901234567890123456789012345678901234567890123456789' 81 @s.password = 'guest'email.php https://gitlab.com/nz_moon/Nazmun_nahar_SEIP_ID_142969_B35_Atomic_Project | PHP | 231 lines
5$yourGmailAddress = "nazmun.bitm@gmail.com"; #<<<<<<<<<<<<<< Set Your Email Address 6$gmailPassword = "12345678912345"; #<<<<<<<<<<<<<< Set Your Gmail Password 7#################################################################################### 125 //Password to use for SMTP authentication 126 $mail->Password =$gmailPassword; 127 //Set who the message is to be sent fromSigning_Process.md https://gitlab.com/AntoninCurtit/fdroid-website | Markdown | 116 lines
43to be created, and ’repokey’ with a name to identify the repo index 44key by. You’ll be asked for a password for the keystore, AND a 45password for the key. They shouldn’t be the same. In between, you’ll 48 49The two passwords entered go into _config.yml_, as `keystorepass` and 50`keypass` respectively. The path to the keystore file is set in 81$ mkdir unsigned 82$ cp /path/to/app-release-unsigned.apk unsigned/com.example.app_1234.apk 83$ fdroid publish --verboseDigestAuthenticateTest.php https://github.com/gustavor/lore.git | PHP | 303 lines
42 $this->auth = new DigestAuthenticate($this->Collection, array( 43 'fields' => array('username' => 'user', 'password' => 'password'), 44 'userModel' => 'User', 49 50 $password = DigestAuthenticate::password('mariano', 'cake', 'localhost'); 51 $User = ClassRegistry::init('User'); 51 $User = ClassRegistry::init('User'); 52 $User->updateAll(array('password' => $User->getDataSource()->value($password))); 53 75 'userModel' => 'AuthUser', 76 'fields' => array('username' => 'user', 'password' => 'password'), 77 'nonce' => 123456 79 $this->assertEquals('AuthUser', $object->settings['userModel']); 80 $this->assertEquals(array('username' => 'user', 'password' => 'password'), $object->settings['fields']); 81 $this->assertEquals(123456, $object->settings['nonce']);