PageRenderTime 40ms queryTime 50ms sortTime 14ms getByIdsTime 150ms findMatchingLines 141ms

100+ results results for 'password 1234' (40 ms)

Not the results you expected?
dbconsole_test.rb https://github.com/Tho85/rails.git | Ruby | 249 lines
                    
65        "username" => "foo",
                    
66        "password" => "bar",
                    
67        "pool"     => "5",
                    
112    dbconsole.expects(:find_cmd_and_exec).with(%w[mysql mysql5], '--host=locahost', '--port=1234', '--socket=socket', '--user=user', '--default-character-set=UTF-8', '-p', 'db')
                    
113    start(adapter: 'mysql', database: 'db', host: 'locahost', port: 1234, socket: 'socket', username: 'user', password: 'qwerty', encoding: 'UTF-8')
                    
114    assert !aborted
                    
116
                    
117  def test_mysql_include_password
                    
118    dbconsole.expects(:find_cmd_and_exec).with(%w[mysql mysql5], '--user=user', '--password=qwerty', 'db')
                    
118    dbconsole.expects(:find_cmd_and_exec).with(%w[mysql mysql5], '--user=user', '--password=qwerty', 'db')
                    
119    start({adapter: 'mysql', database: 'db', username: 'user', password: 'qwerty'}, ['-p'])
                    
120    assert !aborted
                    
130    dbconsole.expects(:find_cmd_and_exec).with('psql', 'db')
                    
131    start(adapter: 'postgresql', database: 'db', username: 'user', password: 'q1w2e3', host: 'host', port: 5432)
                    
132    assert !aborted
                    
                
konica_minolta_pwd_extract.rb https://gitlab.com/alx741/metasploit-framework | Ruby | 259 lines
                    
33        OptString.new('USER', [false, 'The default Admin user', 'Admin']),
                    
34        OptString.new('PASSWD', [true, 'The default Admin password', '12345678']),
                    
35        OptInt.new('TIMEOUT', [true, 'Timeout for printer probe', 20])
                    
53            xml.send('UserName', 'xmlns' => '') { xml.text '' }
                    
54            xml.send('Password', 'xmlns' => '') { xml.text '' }
                    
55            xml.send('Version', 'xmlns' => ''){
                    
65              xml.send('UserType') { xml.text "#{user}" }
                    
66              xml.send('Password') { xml.text "#{passwd}" }
                    
67            }
                    
110              xml.send('BackUp') { xml.text 'true' }
                    
111              xml.send('BackUpPassword') { xml.text 'MYSKIMGS' }
                    
112            }
                    
120  def run_host(ip)
                    
121    print_status("Attempting to extract username and password from the host at #{peer}")
                    
122    version
                    
                
TelaLogin.java https://gitlab.com/Zero101010/EP2 | Java | 189 lines
                    
38        jLabel3 = new javax.swing.JLabel();
                    
39        tfSenha = new javax.swing.JPasswordField();
                    
40
                    
130    private void btEntrarActionPerformed(java.awt.event.ActionEvent evt) {//GEN-FIRST:event_btEntrarActionPerformed
                    
131   if(tfLogin.getText().equals("Funcionario")&& tfSenha.getText().equals("1234")){
                    
132         // JOptionPane.showMessageDialog(null,"Acesso permitido");
                    
186    private javax.swing.JTextField tfLogin;
                    
187    private javax.swing.JPasswordField tfSenha;
                    
188    // End of variables declaration//GEN-END:variables
                    
                
saas_user_registration_spec.rb https://gitlab.com/zillemarco/gitlab | Ruby | 288 lines
                    
44    fill_in 'Email', with: user.email
                    
45    fill_in 'Password', with: user.password
                    
46  end
                    
60    select 'Florida', from: 'state'
                    
61    fill_in 'phone_number', with: '+1234567890'
                    
62    fill_in 'website_url', with: 'https://gitlab.com'
                    
214                company_size: '1-99',
                    
215                phone_number: '+1234567890',
                    
216                country: 'US',
                    
                
MongoUserRepositoryTest.scala https://github.com/cyrusinnovation/inquisition.git | Scala | 181 lines
                    
17  val TestUser = User("testy@example.com", "Tester", "Testy", "McTesterton", "4879b790020a04377613fd860a4e754add628f6bfdd5c1e675a28c286d379ebd", "cc11ce5ba1cd05411aa492b1a2f6bd78")
                    
18  val AnotherUser = User("another@example.com", "anoTher", "Another", "User", "password", "salt")
                    
19
                    
136  def testCanSaveAndRetrieveUserWithFriends() {
                    
137    val facebookFriend = Friend(None, Some("12345"))
                    
138    val localFriend = Friend(Some("another"), None)
                    
155
                    
156    val updatedUser = repository.save(SavedUser(savedUser.id, savedUser.user.copy(facebookId = Some("1234"))))
                    
157
                    
157
                    
158    assertEquals(Some("1234"), updatedUser.facebookId)
                    
159    assertEquals(Some("1234"), repository.findById(savedUser.id).get.facebookId)
                    
163  def testCanFindByFacebookId() {
                    
164    val savedUser = repository.save(TestUser.copy(facebookId = Some("1234")))
                    
165    val results = repository.findWithFacebookIds(Set("1234"))
                    
                
ForceBuildPublisher.html https://github.com/aravindmc/CruiseControl.NET.git | HTML | 169 lines
                    
37  <span class="code-tag">&lt;project&gt;</span>AcceptanceTestProject<span class="code-tag">&lt;/project&gt;</span>
                    
38  <span class="code-tag">&lt;serverUri&gt;</span>tcp://buildserver2:21234/CruiseManager.rem<span class="code-tag">&lt;/serverUri&gt;</span>
                    
39  <span class="code-tag">&lt;integrationStatus&gt;</span>Success<span class="code-tag">&lt;/integrationStatus&gt;</span>
                    
45  <span class="code-tag">&lt;project&gt;</span>AcceptanceTestProject<span class="code-tag">&lt;/project&gt;</span>
                    
46  <span class="code-tag">&lt;serverUri&gt;</span>tcp://buildserver2:21234/CruiseManager.rem<span class="code-tag">&lt;/serverUri&gt;</span>
                    
47  <span class="code-tag">&lt;integrationStatus&gt;</span>Success<span class="code-tag">&lt;/integrationStatus&gt;</span>
                    
49    <span class="code-tag">&lt;namedValue name=<span class="code-quote">"username"</span> value=<span class="code-quote">"autobuild"</span> /&gt;</span>
                    
50    <span class="code-tag">&lt;namedValue name=<span class="code-quote">"password"</span> value=<span class="code-quote">"autobuild"</span> /&gt;</span>
                    
51  <span class="code-tag">&lt;/security&gt;</span>
                    
135<td class='confluenceTd'> security </td>
                    
136<td class='confluenceTd'> The security credentials to pass through to the remote server.  <br clear="all" />These are only needed if the remote project has security applied. If credentials are passed to the remote server, then the enforcerName will be ignored. Valid security tokens are: "username" and "password" (this list may be expanded in future).   </td>
                    
137<td class='confluenceTd'> <a href="Named Value.html" title="Named Value">Named Value</a> array </td>
                    
146<td class='confluenceTd'> No </td>
                    
147<td class='confluenceTd'> tcp://localhost:21234/CruiseManager.rem </td>
                    
148<td class='confluenceTd'> 1.0 </td>
                    
                
smtp_spec.rb https://github.com/okkez/mail.git | Ruby | 207 lines
                    
12                               :user_name            => nil,
                    
13                               :password             => nil,
                    
14                               :authentication       => nil,
                    
161        from "from@someemail.com"
                    
162        message_id "<1234@someemail.com>"
                    
163        body "body"
                    
175        from "from@someemail.com"
                    
176        message_id "<1234@someemail.com>"
                    
177        body "body"
                    
                
options_test.rb https://github.com/bublanina/masterlanguage.git | Ruby | 329 lines
                    
77  def test_parse_options_with_p_should_prompt_for_password
                    
78    MockCLI.expects(:password_prompt).returns(:the_password)
                    
79    @cli.args << "-p"
                    
80    @cli.parse_options!
                    
81    assert_equal :the_password, @cli.options[:password]
                    
82  end
                    
83
                    
84  def test_parse_options_without_p_should_set_proc_for_password
                    
85    @cli.args << "-e" << "sample"
                    
86    @cli.parse_options!
                    
87    assert_instance_of Proc, @cli.options[:password]
                    
88  end
                    
116    @cli.parse_options!
                    
117    assert_equal 1234, @cli.options[:pre_vars][:foo]
                    
118  end
                    
                
tuangou-api.md https://github.com/yzpower/zhejie.github.com.git | Markdown | 317 lines
                    
14	username hidden
                    
15	password ******
                    
16
                    
22
                    
23	{"user":{"id":123456,"username":"jack","email":"jack@test.com","mobile":1871234567}}
                    
24
                    
183					"dpShopId": "4562008",
                    
184					"phoneNumber": "010-12345678,13912345678" 
                    
185				},
                    
191					"dpShopId": "3632377",
                    
192					"phoneNumber": "010-12345678"
                    
193				}
                    
                
user_details_test.rb https://github.com/465858/Proman2.git | Ruby | 205 lines
                    
41  		#:staff_or_student_number => "777777",
                    
42  		:password => "test",
                    
43  		:password_confirmation => "test")
                    
47
                    
48  test "test invalid password has less than 6 characters" do
                    
49    ["a", "ab", "abc", "abcd", "abcde", "abcdef"].each do |password|
                    
53        #:staff_or_student_number => "777777",
                    
54        :password => "test",
                    
55        :password_confirmation => "test")
                    
76      #:staff_or_student_number => "777777",
                    
77      :password => "0123456789112345678921234567893123456789",
                    
78      :password_confirmation => "0123456789112345678921234567893123456789")
                    
86      :password => "01234567891123456789212345678931234567894",
                    
87      :password_confirmation => "01234567891123456789212345678931234567894")
                    
88
                    
                
Home.php https://gitlab.com/narugamy/corazon | PHP | 195 lines
                    
16	function GeneraPass(){
                    
17		$cadena = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890";
                    
18		$longitudCadena=strlen($cadena);
                    
41					$pw=$this->GeneraPass();
                    
42					$user['password']=md5($pw);
                    
43					$this->Modeluser->update($user,$dato->id);
                    
112			$this->Validar('');
                    
113			$er=['email'=>'','password'=>''];
                    
114			$error=['exito'=>false];
                    
116				$er['email']=form_error('email');
                    
117				$er['password']=form_error('password');
                    
118			}else{
                    
170	private function Validar($dato=null){
                    
171		$this->form_validation->set_rules('password', 'password', 'trim|min_length[6]|max_length[15]|required');
                    
172		if(!empty($dato)){
                    
                
api_steps.rb https://github.com/coggy/RapidFTR.git | Ruby | 173 lines
                    
86When /^I login with user (.+):(.+) for device with imei (.+)$/ do |user, password, imei|
                    
87  post(sessions_path, {:imei => imei, :user_name => user, :password => password, :mobile_number => "123456", :format => 'json'})
                    
88end
                    
                
README.md https://gitlab.com/GZGavinZhao/cf-tool | Markdown | 277 lines
                    
106| username | varchar(10)  | NO   |     | NULL    |                |
                    
107| password | varchar(100) | NO   |     | NULL    |                |
                    
108+----------+--------------+------+-----+---------+----------------+
                    
167data := [][]string{
                    
168  []string{"1/1/2014", "Domain name", "1234", "$10.98"},
                    
169  []string{"1/1/2014", "January Hosting", "2345", "$54.95"},
                    
187+----------+--------------------------+-------+---------+
                    
188| 1/1/2014 | Domain name              |  1234 | $10.98  |
                    
189+          +--------------------------+-------+---------+
                    
                
RequestTest.php https://gitlab.com/Blueprint-Marketing/solr-power | PHP | 534 lines
                    
63                'username' => 'testuser',
                    
64                'password' => 'testpass',
                    
65            ),
                    
100                'username' => $options['authentication']['username'],
                    
101                'password' => $options['authentication']['password'],
                    
102            ),
                    
351    {
                    
352        $data = '1234567890';
                    
353        $this->request->setRawData($data);
                    
475                'username' => 'testuser',
                    
476                'password' => 'testpass',
                    
477            ),
                    
492    [username] => testuser
                    
493    [password] => testpass
                    
494)
                    
                
JsonDataProviderImpl.java https://gitlab.com/CORP-RESELLER/SeLion | Java | 326 lines
                    
64     *  "name":"Optimus Prime",
                    
65     *  "password":123456,
                    
66     *  "accountNumber":999999999,
                    
73     *         "address" : {
                    
74     *                     "street":"1234 Some St"
                    
75     *                 }
                    
81     *  "name":"Megatron",
                    
82     *  "password":123456,
                    
83     *  "accountNumber":999999999,
                    
90     *         "address" : {
                    
91     *                     "street":"1234 any St"
                    
92     *                 }
                    
210     *  <b>"id":</b>"test1",
                    
211     *  "password":123456,
                    
212     *  "accountNumber":9999999999,
                    
                
services.md https://gitlab.com/haltaction/gitlab-ce | Markdown | 696 lines
                    
10
                    
11> This service adds commit messages as comments to Asana tasks. Once enabled, commit messages are checked for Asana task URLs (for example, `https://app.asana.com/0/123456/987654`) or task IDs starting with # (for example, `#987654`). Every task ID found will get the commit comment added to it.  You can also close a task with a message containing: `fix #123456`.  You can find your Api Keys here: http://developer.asana.com/documentation/#api_keys
                    
12
                    
89- `username` (**required**) - A user with API access, if applicable
                    
90- `password` (**required**)
                    
91
                    
678- `username` (**required**) - A user with permissions to trigger a manual build
                    
679- `password` (**required**)
                    
680
                    
                
password.php https://gitlab.com/xolotsoft/pumasruiz | PHP | 314 lines
                    
19        define('PASSWORD_BCRYPT', 1);
                    
20        define('PASSWORD_DEFAULT', PASSWORD_BCRYPT);
                    
21        define('PASSWORD_BCRYPT_DEFAULT_COST', 10);
                    
185            );
                    
186            if (PasswordCompat\binary\_substr($hash, 0, 4) == '$2y$' && PasswordCompat\binary\_strlen($hash) == 60) {
                    
187                $return['algo'] = PASSWORD_BCRYPT;
                    
224         *
                    
225         * @param string $password The password to verify
                    
226         * @param string $hash     The hash to verify against
                    
229         */
                    
230        function password_verify($password, $hash) {
                    
231            if (!function_exists('crypt')) {
                    
235            $ret = crypt($password, $hash);
                    
236            if (!is_string($ret) || PasswordCompat\binary\_strlen($ret) != PasswordCompat\binary\_strlen($hash) || PasswordCompat\binary\_strlen($ret) <= 13) {
                    
237                return false;
                    
                
elan_i2c_smbus.c https://github.com/tklauser/linux-nios2.git | C | 527 lines
                    
29#define ETP_SMBUS_SLEEP_CMD		0x21
                    
30#define ETP_SMBUS_IAP_PASSWORD_WRITE	0x29
                    
31#define ETP_SMBUS_IAP_PASSWORD_READ	0x80
                    
52#define ETP_SMBUS_HELLOPACKET_LEN	5
                    
53#define ETP_SMBUS_IAP_PASSWORD		0x1234
                    
54#define ETP_SMBUS_IAP_MODE_ON		(1 << 6)
                    
361
                    
362		/* write iap password */
                    
363		if (i2c_smbus_write_byte(client,
                    
364					 ETP_SMBUS_IAP_PASSWORD_WRITE) < 0) {
                    
365			dev_err(dev, "cannot write iap password\n");
                    
366			return -EIO;
                    
391		password = be16_to_cpup((__be16 *)val);
                    
392		if (password != ETP_SMBUS_IAP_PASSWORD) {
                    
393			dev_err(dev, "wrong iap password = 0x%X\n", password);
                    
                
demoSilent.html https://gitlab.com/jjgomez/Navicu | HTML | 393 lines
                    
102				<span>Password : </span>
                    
103				<input value="karnius" class="validate[required] text-input" type="password" name="password" id="password" />
                    
104			</label>
                    
106				<span>Confirm password : </span>
                    
107				<input value="kaniusBAD" class="validate[required,equals[password]] text-input" type="password" name="password2" id="password2" />
                    
108				<br/>
                    
108				<br/>
                    
109				validate[required,equals[password]]
                    
110			</label>
                    
179				<br/>
                    
180				<input value="0123456789" class="validate[optional,maxSize[6]] text-input" type="text" name="maxsize" id="maxsize" />
                    
181				<br/>
                    
                
deploy.rb https://github.com/evanphx/chef.git | Ruby | 403 lines
                    
22#   repo "git@github.com/whoami/project"
                    
23#   revision "abc123" # or "HEAD" or "TAG_for_1.0" or (subversion) "1234"
                    
24#   user "deploy_ninja"
                    
34#   svn_username "whoami"
                    
35#   svn_password "supersecret"
                    
36# end
                    
246
                    
247      def svn_password(arg=nil)
                    
248        set_or_return(
                    
248        set_or_return(
                    
249          :svn_password,
                    
250          arg,
                    
358      # For a rails/merb app, this is used to link in a known good database.yml
                    
359      # (with the production db password) before running migrate.
                    
360      # Default {"config/database.yml" => "config/database.yml"}
                    
                
03_Environment_Management.md git://github.com/silverstripe/sapphire.git | Markdown | 122 lines
                    
52use SilverStripe\Core\Environment;
                    
53Environment::setEnv('API_KEY', 'AABBCCDDEEFF012345');
                    
54```
                    
95| `SS_DATABASE_USERNAME`| The database username (mandatory).|
                    
96| `SS_DATABASE_PASSWORD`| The database password (mandatory).|
                    
97| `SS_DATABASE_PORT`|     The database port.|
                    
105| `SS_DEFAULT_ADMIN_USERNAME`| The username of the default admin. This is a user with administrative privileges.|
                    
106| `SS_DEFAULT_ADMIN_PASSWORD`| The password of the default admin. This will not be stored in the database.|
                    
107| `SS_USE_BASIC_AUTH`| Baseline protection for requests handled by SilverStripe. Usually requires additional security measures for comprehensive protection. See [Environment Types](/developer_guides/debugging/environment_types) for caveats.|
                    
                
test.scm git://git.savannah.gnu.org/liquidwar6.git | Scheme | 208 lines
                    
81	(c-lw6pil-execute-command game-state "123123123123 1234123412341234 REGISTER" 123123123123)
                    
82	(c-lw6pil-execute-command game-state "123123123123 1234123412341234 ADD 1234 RED" 123123123123)
                    
83	(c-lw6pil-execute-command game-state "123123123123 1234123412341234 ADD 2345 GREEN" 123123123123)
                    
84	(let (
                    
85	      (bot1 (c-lw6bot-new "idiot" game-state pilot 2 "1234" 1.0 100))
                    
86	      (bot2 (c-lw6bot-new "random" game-state pilot 2 "2345" 1.0 100))
                    
164					       (cons "public-url" "http://localhost/")
                    
165					       (cons "password" "")
                    
166					       (cons "title" "")
                    
                
configuration.rst https://github.com/nattaphat/hgis.git | ReStructuredText | 337 lines
                    
18                        host:                 localhost
                    
19                        port:                 1234
                    
20                        user:                 user
                    
20                        user:                 user
                    
21                        password:             secret
                    
22                        driver:               pdo_mysql
                    
86                        host="localhost"
                    
87                        port="1234"
                    
88                        user="user"
                    
88                        user="user"
                    
89                        password="secret"
                    
90                        driver="pdo_mysql"
                    
259                host:                 localhost
                    
260                port:                 1234
                    
261                user:                 user
                    
                
cookie_store_test.rb https://bitbucket.org/javierbuilder/uncontabilidad.git | Ruby | 310 lines
                    
69  def test_raises_argument_error_if_secret_is_probably_insecure
                    
70    ["password", "secret", "12345678901234567890123456789"].each do |blank|
                    
71      assert_raise(ArgumentError, blank.inspect) { new_session 'secret' => blank }
                    
                
test-crypto-pbkdf.c https://github.com/mstsirkin/qemu.git | C | 445 lines
                    
57        .iterations = 1,
                    
58        .key = "password",
                    
59        .nkey = 8,
                    
71        .iterations = 2,
                    
72        .key = "password",
                    
73        .nkey = 8,
                    
85        .iterations = 1200,
                    
86        .key = "password",
                    
87        .nkey = 8,
                    
99        .iterations = 5,
                    
100        .key = "password",
                    
101        .nkey = 8,
                    
208        .iterations = 4096,
                    
209        .key = "passwordPASSWORDpassword",
                    
210        .nkey = 24,
                    
                
registerable_test.rb https://github.com/FundingCircle/devise.git | Ruby | 268 lines
                    
93    fill_in 'email', :with => 'user@test.com'
                    
94    fill_in 'password', :with => '123456'
                    
95    fill_in 'password confirmation', :with => '123456'
                    
224  test 'an admin sign up with valid information in XML format should return valid response' do
                    
225    post admin_registration_path(:format => 'xml'), :admin => { :email => 'new_user@test.com', :password => 'new_user123', :password_confirmation => 'new_user123' }
                    
226    assert_response :success
                    
233  test 'a user sign up with valid information in XML format should return valid response' do
                    
234    post user_registration_path(:format => 'xml'), :user => { :email => 'new_user@test.com', :password => 'new_user123', :password_confirmation => 'new_user123' }
                    
235    assert_response :success
                    
242  test 'a user sign up with invalid information in XML format should return invalid response' do
                    
243    post user_registration_path(:format => 'xml'), :user => { :email => 'new_user@test.com', :password => 'new_user123', :password_confirmation => 'invalid' }
                    
244    assert_response :unprocessable_entity
                    
249    user = sign_in_as_user
                    
250    put user_registration_path(:format => 'xml'), :user => { :current_password => '123456', :email => 'user.new@test.com' }
                    
251    assert_response :success
                    
                
MVChatConnectionAdditions.m https://github.com/HHRy/Colloquy.git | Objective C | 298 lines
                    
19	if (!generatedNickname) {
                    
20		NSCharacterSet *badCharacters = [[NSCharacterSet characterSetWithCharactersInString:@"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz1234567890"] invertedSet];
                    
21		NSArray *components = [[UIDevice currentDevice].name componentsSeparatedByCharactersInSet:[NSCharacterSet whitespaceCharacterSet]];
                    
108	room = [self properNameForChatRoomNamed:room];
                    
109	NSString *password = [[CQKeychain standardKeychain] passwordForServer:self.uniqueIdentifier area:room];
                    
110	[self joinChatRoomNamed:room withPassphrase:password];
                    
152- (void) savePasswordsToKeychain {
                    
153	[[CQKeychain standardKeychain] setPassword:self.nicknamePassword forServer:self.uniqueIdentifier area:[NSString stringWithFormat:@"Nickname %@", self.preferredNickname]];
                    
154	[[CQKeychain standardKeychain] setPassword:self.password forServer:self.uniqueIdentifier area:@"Server"];
                    
159
                    
160	if ((password = [[CQKeychain standardKeychain] passwordForServer:self.uniqueIdentifier area:[NSString stringWithFormat:@"Nickname %@", self.preferredNickname]]) && password.length)
                    
161		self.nicknamePassword = password;
                    
162
                    
163	if ((password = [[CQKeychain standardKeychain] passwordForServer:self.uniqueIdentifier area:@"Server"]) && password.length)
                    
164		self.password = password;
                    
                
pseudonyms_controller_spec.rb https://github.com/kidakaka/canvas-lms.git | Ruby | 248 lines
                    
98      code = @cc.confirmation_code
                    
99      post 'change_password', :pseudonym_id => @pseudonym.id, :nonce => @cc.confirmation_code, :pseudonym => {:password => '12341234', :password_confirmation => '12341234'}
                    
100      response.should be_redirect
                    
111      code = @cc.confirmation_code
                    
112      post 'change_password', :pseudonym_id => @pseudonym.id, :nonce => @cc.confirmation_code + 'a', :pseudonym => {:password => '12341234', :password_confirmation => '12341234'}
                    
113      response.should be_redirect
                    
210      user_session(@user, @pseudonym)
                    
211      @p2 = @user.pseudonyms.create!(:unique_id => "another_one@test.com",:password => 'password', :password_confirmation => 'password')
                    
212      delete 'destroy', :user_id => @user.id, :id => @p2.id
                    
221      user_session(@user, @pseudonym)
                    
222      @p2 = @user.pseudonyms.create!(:unique_id => "another_one@test.com",:password => 'password', :password_confirmation => 'password')
                    
223      @p2.sis_source_id = 'test'
                    
236      user_session(@user, @pseudonym)
                    
237      @p2 = @user.pseudonyms.build(:unique_id => "another_one@test.com",:password => 'password', :password_confirmation => 'password')
                    
238      @p2.sis_source_id = 'test'
                    
                
class.LibWebta.js http://scalr.googlecode.com/svn/ | JavaScript | 216 lines
                    
94
                    
95	generatePass: function(element, passwordlength, isdigits) {
                    
96	    var pwchars = isdigits ? "0123456789" : "abcdefhjmnpqrstuvwxyz23456789ABCDEFGHJKLMNPQRSTUVWYXZ";
                    
96	    var pwchars = isdigits ? "0123456789" : "abcdefhjmnpqrstuvwxyz23456789ABCDEFGHJKLMNPQRSTUVWYXZ";
                    
97	    var passwordlength = (passwordlength > 0) ? passwordlength : 16;
                    
98	    var passwd = '';
                    
99	
                    
100	    for (var i = 0; i < passwordlength; i++ ) {
                    
101	        passwd += pwchars.charAt( Math.floor( Math.random() * pwchars.length ) );
                    
                
admin_users_spec.rb https://gitlab.com/beverett/gitlab-ce | Ruby | 412 lines
                    
4  let!(:user) do
                    
5    create(:omniauth_user, provider: 'twitter', extern_uid: '123456')
                    
6  end
                    
103
                    
104    it "sends valid email to user with email & password" do
                    
105      perform_enqueued_jobs do
                    
112      expect(email.text_part.body).to have_content(user.email)
                    
113      expect(email.text_part.body).to have_content('password')
                    
114    end
                    
185
                    
186      context 'when impersonating a user with an expired password' do
                    
187        before do
                    
241        fill_in "user_email", with: "bigbang@mail.com"
                    
242        fill_in "user_password", with: "AValidPassword1"
                    
243        fill_in "user_password_confirmation", with: "AValidPassword1"
                    
                
Abstract.php https://github.com/corneliusweiss/Tine-2.0-Open-Source-Groupware-and-CRM.git | PHP | 237 lines
                    
78    /**
                    
79     * update/set email user password
                    
80     *
                    
81     * @param  string  $_userId
                    
82     * @param  string  $_password
                    
83     * @param  bool    $_encrypt encrypt password
                    
84     */
                    
85    public function inspectSetPassword($_userId, $_password, $_encrypt = TRUE)
                    
86    {
                    
147        } else {
                    
148            $dbConfig = array_intersect_key($mailDbConfig, array_flip(array('adapter', 'host', 'dbname', 'username', 'password', 'port')));
                    
149            $this->_db = Tinebase_Core::createAndConfigureDbAdapter($dbConfig);
                    
188    /**
                    
189     * generate salt for password scheme
                    
190     * 
                    
                
Password.php https://bitbucket.org/blackriver/openx.git | PHP | 536 lines
                    
77     * @param  string  Character which could be use in the
                    
78     *                 unpronounceable password ex : 'A,B,C,D,E,F,G'
                    
79     *                 or numeric, alphabetical or alphanumeric.
                    
87            while (true) {
                    
88                $password = Text_Password::create($length, $type, $chars);
                    
89                if (!in_array($password, $passwords)) {
                    
89                if (!in_array($password, $passwords)) {
                    
90                    $passwords[] = $password;
                    
91                    break;
                    
163            while (true) {
                    
164                $password = Text_Password::createFromLogin($login[$save - $number], $type, $key);
                    
165                if (!in_array($password, $passwords)) {
                    
165                if (!in_array($password, $passwords)) {
                    
166                    $passwords[] = $password;
                    
167                    break;
                    
                
SecurityTest.php https://bitbucket.org/LeThanhDat/firstdummyapp.git | PHP | 304 lines
                    
159		Security::setCost(10);
                    
160		$test = Security::hash('password', 'blowfish');
                    
161		$this->skipIf(strpos($test, '$2a$') === false, 'Blowfish hashes are incorrect.');
                    
171
                    
172		$password = $submittedPassword = $key;
                    
173		$storedPassword = Security::hash($password);
                    
174
                    
175		$hashedPassword = Security::hash($submittedPassword, null, $storedPassword);
                    
176		$this->assertSame($storedPassword, $hashedPassword);
                    
178		$submittedPassword = 'someOtherKey';
                    
179		$hashedPassword = Security::hash($submittedPassword, null, $storedPassword);
                    
180		$this->assertNotSame($storedPassword, $hashedPassword);
                    
216
                    
217		$txt = 123456;
                    
218		$key = 'my_key';
                    
                
im_funcs.rb https://github.com/apirogov/Aphorism.git | Ruby | 305 lines
                    
46  if cmd == 'delete_account'  #can also happen :(
                    
47    return delete_account(ownnick, params[:password]) #huge cleanup function
                    
48  end
                    
74  #check that its just numbers and + - * / and () -> no XSS xD
                    
75  return {'response'=>'error'} if expr.match(/[^0123456789\+\-\*\/\(\)]/) != nil
                    
76  #calculate
                    
286
                    
287def delete_account(nick, password)
                    
288  #check whether logged in and correct password hash supplied
                    
291
                    
292  return ret_fail('password incorrect!') if password==usr.pwdhash #not matching
                    
293
                    
                
class-install.php https://bitbucket.org/cesarmedrano/cesarmedrano.git | PHP | 310 lines
                    
93			//detect if option already exists
                    
94			$test_option_exists = get_site_option( 'backwpup_cfg_' . $cfg, 'TEST12345TEST' );
                    
95			//add option if not exists
                    
95			//add option if not exists
                    
96			if ( $test_option_exists == 'TEST12345TEST') 
                    
97				add_site_option( 'backwpup_cfg_' . $cfg, $option );
                    
159			$cfg[ 'logfolder' ] = $cfg[ 'dirlogs' ];
                    
160		if ( ! empty( $cfg[ 'httpauthpassword' ] ) ) {
                    
161			if ( preg_match('%^[a-zA-Z0-9/+]*={0,2}$%', $cfg[ 'httpauthpassword' ] ) )
                    
161			if ( preg_match('%^[a-zA-Z0-9/+]*={0,2}$%', $cfg[ 'httpauthpassword' ] ) )
                    
162				$cfg[ 'httpauthpassword' ] = base64_decode( $cfg[ 'httpauthpassword' ] );
                    
163			$cfg[ 'httpauthpassword' ] = BackWPup_Encryption::encrypt( $cfg[ 'httpauthpassword' ] );
                    
                
1.08-remove-failing-tests.patch https://gitlab.com/redcore/portage | Patch | 301 lines
                    
21-
                    
22-    response = "123456";
                    
23-
                    
56-    assert(pam_sm_authenticate(NULL, 0, targc, targv) == PAM_AUTH_ERR);
                    
57-    verify_prompts_shown(password_is_provided_from_external ? 0 : expected_bad_prompts_shown);
                    
58-    targv[targc++] = "nullok";
                    
226-    puts("Testing scratch codes");
                    
227-    response = "12345678";
                    
228-    assert(pam_sm_authenticate(NULL, 0, targc, targv) == PAM_AUTH_ERR);
                    
231-    assert((fd = open(fn, O_APPEND | O_WRONLY)) >= 0);
                    
232-    assert(write(fd, "12345678\n", 9) == 9);
                    
233-    close(fd);
                    
                
Users.router.ts https://gitlab.com/dreamteam109/stuckwithticketsfinal | TypeScript | 352 lines
                    
67*         email: "IsraelIsraeli@gmail.com"
                    
68*         password: "123456"
                    
69*         firstName: "Israel"
                    
81*           type: string
                    
82*           description: The user's password
                    
83*       example:
                    
84*         email: "IsraelIsraeli@gmail.com"
                    
85*         password: "123456"
                    
86*     AccessAndRefreshTokens:
                    
120*         lastName: "Israeli"
                    
121*         phoneNumber: "050-1234567"
                    
122*         imageId: "e49bb982bd2e419682565e285a899a2f"
                    
157*         email: "IsraelIsraeli@gmail.com"
                    
158*         password: "123456"
                    
159*         phoneNumber: "050-1234567"
                    
                
auth.m https://gitlab.com/longkas/Potatso-iOS | Objective C | 578 lines
                    
52static BOOL
                    
53auth_getPasswordByUsername (config_t * conf, const char *username,
                    
54							char **passwd)
                    
61static const char lets[] =
                    
62	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwyxz0123456789+/";
                    
63
                    
205
                    
206				if (!auth_getPasswordByUsername
                    
207					(conn->conf, username, &passwd)) {
                    
344	realpasswd = NULL;
                    
345#ifdef HAVE_GETSPNAM			/* The system supports shadow password */
                    
346#ifndef HAVE_GETSPNAM_R			/* System has no reentrant shadow functions */
                    
494static BOOL
                    
495auth_authUsernamePassword (conn_t * conn, const char *username,
                    
496						   const char *passwd)
                    
                
test_phonebook_plugin.py https://gitlab.com/xivo.solutions/xivo-dird | Python | 348 lines
                    
62    def test_first_match(self):
                    
63        exten = '123456'
                    
64        self.pbook_client.first_match.return_value = sentinel.first_match_result
                    
162
                    
163    def test_phonebook_password(self):
                    
164        value = 'foobar'
                    
165
                    
166        phonebook_config = _PhonebookConfig({'phonebook_password': value})
                    
167
                    
167
                    
168        self.assertEqual(value, phonebook_config.phonebook_password())
                    
169
                    
188        self.pbook_config.phonebook_username.return_value = self.username
                    
189        self.pbook_config.phonebook_password.return_value = self.password
                    
190        self.pbook_config.phonebook_timeout.return_value = self.timeout
                    
                
cloud-user.php https://github.com/qyjohn/openqrm.git | PHP | 428 lines
                    
8function getRandomChar(number, lower, upper, other, extra) {
                    
9	var numberChars = "0123456789";
                    
10	var lowerChars = "abcdefghijklmnopqrstuvwxyz";
                    
23}
                    
24function getPassword(length, extraChars, firstNumber, firstLower, firstUpper, firstOther, latterNumber, latterLower, latterUpper, latterOther) {
                    
25	var rc = "";
                    
234		$tclu->get_instance_by_id($cu_id);
                    
235		$user_auth_str = "://".$tclu->name.":".$tclu->password."@";
                    
236		$external_portal_user_auth = str_replace("://", $user_auth_str, $external_portal_name);
                    
310	// root password input plus generate password button
                    
311	$generate_pass = "Password&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input name=\"cu_password\" type=\"password\" id=\"cu_password\" value=\"\" size=\"10\" maxlength=\"10\">";
                    
312	$generate_pass .= "<input type=\"button\" name=\"gen\" value=\"generate\" onclick=\"this.form.cu_password.value=getPassword(10, false, true, true, true, false, true, true, true, false);\"><br>";
                    
                
spawner_spec.rb https://github.com/caroo/passenger.git | Ruby | 273 lines
                    
7shared_examples_for "a spawner" do
                    
8	def ping_app(app, connect_password)
                    
9		if app.server_sockets[:main][1] == "unix"
                    
16			channel = MessageChannel.new(client)
                    
17			channel.write_scalar("REQUEST_METHOD\0PING\0PASSENGER_CONNECT_PASSWORD\0#{connect_password}\0")
                    
18			return client.read
                    
118	it "does not cache things like the connect password" do
                    
119		app1 = spawn_some_application("connect_password" => "1234")
                    
120		app2 = spawn_some_application("connect_password" => "5678")
                    
120		app2 = spawn_some_application("connect_password" => "5678")
                    
121		ping_app(app1, "1234").should == "pong"
                    
122		ping_app(app2, "5678").should == "pong"
                    
                
urlparse.py https://github.com/chrishaukap/GameDev.git | Python | 423 lines
                    
31                'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
                    
32                '0123456789'
                    
33                '+-.')
                    
56    @property
                    
57    def password(self):
                    
58        netloc = self.netloc
                    
                
services.md https://gitlab.com/effigies/gitlab-ce | Markdown | 664 lines
                    
10
                    
11> This service adds commit messages as comments to Asana tasks. Once enabled, commit messages are checked for Asana task URLs (for example, `https://app.asana.com/0/123456/987654`) or task IDs starting with # (for example, `#987654`). Every task ID found will get the commit comment added to it.  You can also close a task with a message containing: `fix #123456`.  You can find your Api Keys here: https://asana.com/developers/documentation/getting-started/auth#api-key
                    
12
                    
89- `username` (**required**) - A user with API access, if applicable
                    
90- `password` (**required**)
                    
91
                    
472- `username` (optional) - Jira username
                    
473- `password` (optional) - Jira password
                    
474
                    
646- `username` (**required**) - A user with permissions to trigger a manual build
                    
647- `password` (**required**)
                    
648
                    
                
view.py https://github.com/cbmi/serrano.git | Python | 323 lines
                    
159
                    
160        user2 = User.objects.create_user(username='FAKE', password='ALSO_FAKE')
                    
161        view2 = DataView(user=user2)
                    
307        url = '/api/views/{0}/revisions/{1}/'.format(
                    
308            123456789, target_revision_id)
                    
309
                    
319
                    
320        url = '/api/views/{0}/revisions/{1}/'.format(view.id, 123456789)
                    
321
                    
                
utils_test.go https://gitlab.com/billyprice1/boulder | Go | 346 lines
                    
25	{"username:password@protocol(address)/dbname?param=value", "&{user:username passwd:password net:protocol addr:address dbname:dbname params:map[param:value] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
26	{"username:password@protocol(address)/dbname?param=value&columnsWithAlias=true", "&{user:username passwd:password net:protocol addr:address dbname:dbname params:map[param:value] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:true interpolateParams:false}", time.UTC},
                    
27	{"user@unix(/path/to/socket)/dbname?charset=utf8", "&{user:user passwd: net:unix addr:/path/to/socket dbname:dbname params:map[charset:utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
27	{"user@unix(/path/to/socket)/dbname?charset=utf8", "&{user:user passwd: net:unix addr:/path/to/socket dbname:dbname params:map[charset:utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
28	{"user:password@tcp(localhost:5555)/dbname?charset=utf8&tls=true", "&{user:user passwd:password net:tcp addr:localhost:5555 dbname:dbname params:map[charset:utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
29	{"user:password@tcp(localhost:5555)/dbname?charset=utf8mb4,utf8&tls=skip-verify", "&{user:user passwd:password net:tcp addr:localhost:5555 dbname:dbname params:map[charset:utf8mb4,utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
29	{"user:password@tcp(localhost:5555)/dbname?charset=utf8mb4,utf8&tls=skip-verify", "&{user:user passwd:password net:tcp addr:localhost:5555 dbname:dbname params:map[charset:utf8mb4,utf8] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
30	{"user:password@/dbname?loc=UTC&timeout=30s&allowAllFiles=1&clientFoundRows=true&allowOldPasswords=TRUE&collation=utf8mb4_unicode_ci", "&{user:user passwd:password net:tcp addr:127.0.0.1:3306 dbname:dbname params:map[] loc:%p tls:<nil> timeout:30000000000 collation:224 allowAllFiles:true allowOldPasswords:true clientFoundRows:true columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
31	{"user:p@ss(word)@tcp([de:ad:be:ef::ca:fe]:80)/dbname?loc=Local", "&{user:user passwd:p@ss(word) net:tcp addr:[de:ad:be:ef::ca:fe]:80 dbname:dbname params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.Local},
                    
34	{"/", "&{user: passwd: net:tcp addr:127.0.0.1:3306 dbname: params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
35	{"", "&{user: passwd: net:tcp addr:127.0.0.1:3306 dbname: params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
36	{"user:p@/ssword@/", "&{user:user passwd:p@/ssword net:tcp addr:127.0.0.1:3306 dbname: params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
36	{"user:p@/ssword@/", "&{user:user passwd:p@/ssword net:tcp addr:127.0.0.1:3306 dbname: params:map[] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
37	{"unix/?arg=%2Fsome%2Fpath.ext", "&{user: passwd: net:unix addr:/tmp/mysql.sock dbname: params:map[arg:/some/path.ext] loc:%p tls:<nil> timeout:0 collation:33 allowAllFiles:false allowOldPasswords:false clientFoundRows:false columnsWithAlias:false interpolateParams:false}", time.UTC},
                    
38}
                    
                
JsonResourcePasswordManagementServiceTests.java https://github.com/frett/cas.git | Java | 118 lines
                    
73    @Qualifier("passwordChangeService")
                    
74    private PasswordManagementService passwordChangeService;
                    
75
                    
100    public void verifyUserPasswordChange() {
                    
101        val c = new UsernamePasswordCredential("casuser", "password");
                    
102        val bean = new PasswordChangeBean();
                    
103        bean.setConfirmedPassword("newPassword");
                    
104        bean.setPassword("newPassword");
                    
105        val res = passwordChangeService.change(c, bean);
                    
110    public void verifyPasswordValidationService() {
                    
111        val c = new UsernamePasswordCredential("casuser", "password");
                    
112        val bean = new PasswordChangeBean();
                    
113        bean.setConfirmedPassword("Test@1234");
                    
114        bean.setPassword("Test@1234");
                    
115        val isValid = passwordValidationService.isValid(c, bean);
                    
                
config.tinymce.php https://gitlab.com/ptisky/API_prestashop | PHP | 152 lines
                    
43	define("CONFIG_LOGIN_USERNAME", 'ajax');

                    
44	define('CONFIG_LOGIN_PASSWORD', '123456');

                    
45	define('CONFIG_LOGIN_PAGE', 'ajax_login.php'); //the url to the login page

                    
                
ApiController.php https://gitlab.com/Ankit77/motiv8 | PHP | 351 lines
                    
91	$email = !empty($_REQUEST['email']) ? $_REQUEST['email'] : "";
                    
92	$pass = !empty($_REQUEST['password']) ? $_REQUEST['password'] : "";
                    
93	$access_token = Request::header('accesstoken');
                    
163	$email = !empty($_REQUEST['email']) ? $_REQUEST['email'] : "";
                    
164	$password = !empty($_REQUEST['password']) ? $_REQUEST['password'] : "";
                    
165	$name = !empty($_REQUEST['name']) ? $_REQUEST['name'] : "";
                    
168	$image = !empty($_REQUEST['image']) ? $_REQUEST['image'] : "";
                    
169	if(isset($email) && !empty($email) && isset($password) && !empty($password) &&  isset($name) && !empty($name) &&  isset($phone) && !empty($phone)){
                    
170	
                    
191												'phone' =>$phone,
                    
192												'password' => Hash::make($password),
                    
193												'confirmed' =>  1 ,
                    
203						'phone' =>$phone,
                    
204						'password' => Hash::make($password),
                    
205						'confirmed' =>  1 ,
                    
                
demoValidators.html https://bitbucket.org/royrutto/climatepal.git | HTML | 214 lines
                    
100                    <span>Password : </span>
                    
101                    <input value="karnius" class="validate[required] text-input" type="password" name="password" id="password" />
                    
102                </label>
                    
104                    <span>Confirm password : </span>
                    
105                    <input value="kaniusBAD" class="validate[required,equals[password]] text-input" type="password" name="password2" id="password2" />
                    
106                    <br/>
                    
106                    <br/>
                    
107                    validate[required,equals[password]]
                    
108                </label>
                    
139                    <br/>
                    
140                    <input value="0123456789" class="validate[optional,maxSize[6]] text-input" type="text" name="maxsize" id="maxsize" />
                    
141                    <br/>
                    
                
SOAP.php https://gitlab.com/panace/public | PHP | 512 lines
                    
152     * <?php
                    
153     * $I->haveSoapHeader('AuthHeader', array('username' => 'davert', 'password' => '123345'));
                    
154     * ```
                    
162     *          <username>davert</username>
                    
163     *          <password>12345</password>
                    
164     *      </AuthHeader>
                    
                
grid.py https://github.com/valeriewang/pyraos.git | Python | 389 lines
                    
33        print self.serverlist
                    
34        mydb=DataBase(dblist=self.serverlist,host="localhost",username="opensim",password="1234")
                    
35        mydb.StartUp()
                    
169        for user in self.userlist:
                    
170            cmd="create user "+user.firstname+" "+user.lastname+" "+user.password+" "+user.email
                    
171            print "[create user]cmd="+cmd
                    
291    user="opensim"
                    
292    psw="1234"
                    
293    dbList=[]
                    
295    state=False
                    
296    def __init__(self,host="localhost",username="opensim",password="1234",dblist=["robust","opensim0,opensim1,opensim2"],path="C:/wamp",app="/wampmanager.exe"):
                    
297        self.host=host
                    
350           'USER': 'User',         # REST username
                    
351           'PASS': '1234'        # REST password
                    
352       })
                    
                
README.md https://gitlab.com/tpayseno/spring-integration-samples | Markdown | 251 lines
                    
74	   <property name="URL" value="jdbc:oracle:thin:@//localhost:1521/XE" />
                    
75	   <property name="password" value="storedproc" />
                    
76	   <property name="user"     value="storedproc" />
                    
108BEGIN
                    
109   cool_number := 12345;
                    
110   RETURN cool_number;
                    
147	Retrieving Numeric value via Sql Function...
                    
148	Converted 'hello world' - End Result: 'HELLO WORLD_12345'.
                    
149
                    
                
SendMailUtil.java https://gitlab.com/MetadataDev/cpom | Java | 294 lines
                    
28	private static final String username = "thinkgem@163.com";
                    
29	private static final String password = "123456";
                    
30
                    
111			hemail.setFrom(from, fromName);
                    
112			hemail.setAuthentication(username, password);
                    
113			hemail.setSubject(subject);
                    
151			hemail.setFrom(from, fromName);
                    
152			hemail.setAuthentication(username, password);
                    
153			hemail.setSubject(subject);
                    
                
lesson_group_override.feature https://github.com/pauln/moodle.git | Gherkin Specification | 340 lines
                    
147      | Override group            | Group 1 |
                    
148      | Password protected lesson | 12345 |
                    
149    And I press "Save"
                    
149    And I press "Save"
                    
150    And I should see "Password protected lesson"
                    
151    And I log out
                    
156    And I should not see "Cat is an amphibian"
                    
157    And I set the field "userpassword" to "moodle_rules"
                    
158    And I press "Continue"
                    
160    And I should see "Test lesson name is a password protected lesson"
                    
161    And I set the field "userpassword" to "12345"
                    
162    And I press "Continue"
                    
174    And I should not see "Cat is an amphibian"
                    
175    And I set the field "userpassword" to "12345"
                    
176    And I press "Continue"
                    
                
productivity.py https://gitlab.com/tsltd/django-timepiece | Python | 212 lines
                    
17        self.username = 'test_user'
                    
18        self.password = 'password'
                    
19        self.user = self.create_user(username=self.username,
                    
19        self.user = self.create_user(username=self.username,
                    
20                password=self.password)
                    
21        self.permission = Permission.objects.get(codename='view_entry_summary')
                    
22        self.user.user_permissions.add(self.permission)
                    
23        self.client.login(username=self.username, password=self.password)
                    
24
                    
113        """Form requires specification of valid project."""
                    
114        data = {'organize_by': 'week', 'project_1': 12345}
                    
115        response = self._get(data=data)
                    
                
test_driver.py https://github.com/comstud/nova.git | Python | 329 lines
                    
115        result['spawn_params'] = dict(
                    
116                admin_password='test_pass',
                    
117                block_device_info=None,
                    
183        db.bm_node_update(self.context, node['node']['id'],
                    
184                {'instance_uuid': '1234-5678'})
                    
185
                    
                
ipa_user.py https://gitlab.com/cfernand/acm-aap-demo | Python | 397 lines
                    
208    if krbpasswordexpiration is not None:
                    
209        user['krbpasswordexpiration'] = krbpasswordexpiration + "Z"
                    
210    if givenname is not None:
                    
225    if userpassword is not None:
                    
226        user['userpassword'] = userpassword
                    
227    if gidnumber is not None:
                    
310    module_user = get_user_dict(displayname=module.params.get('displayname'),
                    
311                                krbpasswordexpiration=module.params.get('krbpasswordexpiration'),
                    
312                                givenname=module.params.get('givenname'),
                    
316                                telephonenumber=module.params['telephonenumber'], title=module.params['title'],
                    
317                                userpassword=module.params['password'],
                    
318                                gidnumber=module.params.get('gidnumber'), uidnumber=module.params.get('uidnumber'),
                    
321
                    
322    update_password = module.params.get('update_password')
                    
323    ipa_user = client.user_find(name=name)
                    
                
Registration.php https://gitlab.com/gideonmarked/wellmarketing | PHP | 224 lines
                    
112        $user->email = $data['email'];
                    
113        $user->password = $data['password'];
                    
114        $user->password_confirmation = $data['password_confirmation'];
                    
200    {
                    
201        $characters = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789';
                    
202        $string = '';
                    
                
WriteWifiConfigToNfcDialog.java https://gitlab.com/freedmpure/platform_packages_apps_settings | Java | 283 lines
                    
101
                    
102        mPasswordView = (TextView) mView.findViewById(R.id.password);
                    
103        mLabelView = (TextView) mView.findViewById(R.id.password_label);
                    
104        mPasswordView.addTextChangedListener(this);
                    
105        mPasswordCheckBox = (CheckBox) mView.findViewById(R.id.show_password);
                    
106        mPasswordCheckBox.setOnCheckedChangeListener(this);
                    
124                = mWifiManager.getWpsNfcConfigurationToken(mAccessPoint.networkId);
                    
125        String passwordHex = byteArrayToHexString(password.getBytes());
                    
126
                    
126
                    
127        String passwordLength = password.length() >= HEX_RADIX
                    
128                ? Integer.toString(password.length(), HEX_RADIX)
                    
130
                    
131        passwordHex = String.format(PASSWORD_FORMAT, passwordLength, passwordHex).toUpperCase();
                    
132
                    
                
PacienteControllerTestes.java https://gitlab.com/lfelipelizeu/desafio-tecnico-backend-conexa | Java | 202 lines
                    
22import org.springframework.http.MediaType;
                    
23import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
                    
24import org.springframework.test.context.junit4.SpringRunner;
                    
47        medico.setEmail("luis@email.com");
                    
48        BCryptPasswordEncoder encoder = new BCryptPasswordEncoder();
                    
49        medico.setSenha(encoder.encode("12345"));
                    
                
DatabaseTest.cs https://gitlab.com/jslee1/azure-powershell | C# | 213 lines
                    
65        /// </summary>
                    
66        private const string LocalRdfeEndpoint = @"https://management.dev.mscds.com:12346/";
                    
67
                    
76                CultureInfo.InvariantCulture,
                    
77                "-ManageUrl \"{0}\" -UserName \"{1}\" -Password \"{2}\" "
                    
78                + "-SubscriptionId \"{3}\" -SerializedCert \"{4}\" ",
                    
80                SqlDatabaseTestSettings.Instance.UserName,
                    
81                SqlDatabaseTestSettings.Instance.Password,
                    
82                SqlDatabaseTestSettings.Instance.SubscriptionId,
                    
98                CultureInfo.InvariantCulture,
                    
99                "-Name \"{0}\" -ManageUrl \"{1}\" -UserName \"{2}\" -Password \"{3}\" "
                    
100                + "-ServerName \"{4}\" -SubscriptionID \"{5}\" -SerializedCert \"{6}\" "
                    
104                SqlDatabaseTestSettings.Instance.UserName,
                    
105                SqlDatabaseTestSettings.Instance.Password,
                    
106                SqlDatabaseTestSettings.Instance.ServerName,
                    
                
marshal.R https://gitlab.com/proteomics-bioinformatics-lnbio/galaxy_proteomics | R | 202 lines
                    
30#Database connections and queries
                    
31db.connection <- dbConnect(RMySQL::MySQL(), user='galaxy', host='localhost', dbname='conversionMarcelo', password='123456', unix.sock=db.socket);
                    
32
                    
                
CoreApplicationPrototypeTests.swift https://gitlab.com/InboundRX-Capstone/Paulsens-iOS-App | Swift | 193 lines
                    
133        
                    
134        var result = user.loginUser(emailField: "edittest@edit.com", passwordField: "password123")
                    
135        XCTAssert(result.0)
                    
151        
                    
152        result = user.editPassword(currentPassword: "password123", password: "password321", repeatPassword:"password321")
                    
153        XCTAssert(result.0)
                    
155        
                    
156        result = user.editPassword(currentPassword: "password321", password: "password123", repeatPassword:"password123")
                    
157        XCTAssert(result.0)
                    
171        
                    
172        result = user.editPhone(phone: "1234567890", currentPassword: "password123")
                    
173        XCTAssert(result.0)
                    
186        
                    
187        result = user.editAddress(address: "12345 NorthPole Ave., North Pole, North 00000", currentPassword: "password123")
                    
188        XCTAssert(result.0)
                    
                
LoginDialogFragment.java https://gitlab.com/khoa-io/slp | Java | 168 lines
                    
32    private EditText usernameEdit;
                    
33    private EditText passwordEdit;
                    
34    private CheckBox checkRememberLogin;
                    
70        usernameEdit = (EditText) view.findViewById(R.id.edit_username);
                    
71        passwordEdit = (EditText) view.findViewById(R.id.edit_password);
                    
72        checkRememberLogin = (CheckBox) view.findViewById(R.id.check_remember_login);
                    
75        usernameEdit.setText(prefs.getString(getActivity().getString(R.string.username), ""));
                    
76        passwordEdit.setText(prefs.getString(getActivity().getString(R.string.password), ""));
                    
77
                    
79            usernameEdit.setText("dungpqshipper");
                    
80            passwordEdit.setText("12345678");
                    
81        }
                    
147            String username = usernameEdit.getText().toString();
                    
148            String password = passwordEdit.getText().toString();
                    
149            boolean rememberLogin = checkRememberLogin.isChecked();
                    
                
DavResourceFinderTest.java https://gitlab.com/Tveiker/davdroid | Java | 192 lines
                    
55
                    
56        credentials = new LoginCredentials(URI.create("/"), "mock", "12345");
                    
57        finder = new DavResourceFinder(getInstrumentation().getContext(), credentials);
                    
59        client = HttpClient.create();
                    
60        client = HttpClient.addAuthentication(client, credentials.userName, credentials.password);
                    
61    }
                    
                
ezsig.rb https://github.com/bblimke/adva_cms.git | Ruby | 535 lines
                    
53=begin rdoc
                    
54  Decode a PEM encoded Private Key  and return a signer. Takes an optional password
                    
55=end  
                    
55=end  
                    
56    def self.decode(encoded,password=nil)
                    
57      begin
                    
57      begin
                    
58        EzCrypto::Signer.new(OpenSSL::PKey::RSA.new( encoded,password))
                    
59      rescue
                    
59      rescue
                    
60        EzCrypto::Signer.new(OpenSSL::PKey::DSA.new( encoded,password))
                    
61      end
                    
64=begin rdoc
                    
65  Decode a PEM encoded Private Key file and return a signer. Takes an optional password
                    
66=end  
                    
                
recoverable_test.rb https://github.com/gguerragui/devise.git | Ruby | 138 lines
                    
40  test 'should reset password and save the record' do
                    
41    assert create_user.reset_password!('123456789', '123456789')
                    
42  end
                    
49    assert_present user.reset_password_token
                    
50    assert user.reset_password!('123456789', '123456789')
                    
51    assert_nil user.reset_password_token
                    
106
                    
107    reset_password_user = User.reset_password_by_token(:reset_password_token => user.reset_password_token)
                    
108    assert_equal reset_password_user, user
                    
111  test 'should a new record with errors if no reset_password_token is found' do
                    
112    reset_password_user = User.reset_password_by_token(:reset_password_token => 'invalid_token')
                    
113    assert_not reset_password_user.persisted?
                    
117  test 'should a new record with errors if reset_password_token is blank' do
                    
118    reset_password_user = User.reset_password_by_token(:reset_password_token => '')
                    
119    assert_not reset_password_user.persisted?
                    
                
test_issues.py https://gitlab.com/sunkistm/gitlab-web2py | Python | 278 lines
                    
147        c = conn.cursor()
                    
148        # grant access to a table to a user with a password
                    
149        try:
                    
151            c.execute("insert into issue17 (x) values ('hello, world!')")
                    
152            c.execute("grant all privileges on %s.issue17 to 'issue17user'@'%%' identified by '1234'" % db)
                    
153            conn.commit()
                    
154            
                    
155            conn2 = pymysql.connect(host=host, user="issue17user", passwd="1234", db=db)
                    
156            c2 = conn2.cursor()
                    
                
xml.php https://github.com/RosYama/rosyama.ru.git | PHP | 136 lines
                    
4
                    
5class C1234HoleApiXML
                    
6{
                    
88		$res = CIBlockElement::GetList(array(), array('IBLOCK_CODE' => 'GIBDD_HEADS', 'PROPERTY_SUBJECT_ID' => $id), array('PROPERTY_FIO', 'PROPERTY_POST', 'PROPERTY_POST_DATIVE', 'PROPERTY_ADDRESS', 'PROPERTY_TEL_DEGURN', 'PROPERTY_GIBDD_NAME'));
                    
89		if (!$res) echo C1234HoleApiXML::Error('INTERNAL');
                    
90		$arElement = $res->Fetch();
                    
113		global $USER;
                    
114		$hash = str_replace('<', '&lt;', $USER->GetParam('PASSWORD_HASH'));
                    
115		$hash = str_replace('>', '&gt;', $hash);
                    
122		</username>
                    
123		<passwordhash><?= $hash ?></passwordhash>
                    
124	</user><? echo "\n";
                    
                
EmailSender.cpp https://github.com/BlitzMaxModules/bah.mod.git | C++ | 425 lines
                    
19
                    
20static const char base64Map[]="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
                    
21
                    
21
                    
22const char *EmailSender::Send(const char *hostAddress, unsigned short hostPort, const char *sender, const char *recipient, const char *senderName, const char *recipientName, const char *subject, const char *body, FileList *attachedFiles, bool doPrintf, const char *password)
                    
23{
                    
84			return response;
                    
85		if (password==0)
                    
86			return "Password needed";
                    
93		bs.Write(&zero,1);
                    
94		bs.Write(password,(const unsigned int)strlen(password));
                    
95		bs.Write(&zero,1);
                    
95		bs.Write(&zero,1);
                    
96		//bs.Write("not.my.real.password",(const unsigned int)strlen("not.my.real.password"));
                    
97		Base64Encoding((const char*)bs.GetData(), bs.GetNumberOfBytesUsed(), outputData, base64Map);
                    
                
string_helper.php https://gitlab.com/ricoru21/py_incidencia | PHP | 307 lines
                    
186 *
                    
187 * Useful for generating passwords or hashes.
                    
188 *
                    
210							break;
                    
211						case 'alnum'	:	$pool = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ';
                    
212							break;
                    
212							break;
                    
213						case 'numeric'	:	$pool = '0123456789';
                    
214							break;
                    
214							break;
                    
215						case 'nozero'	:	$pool = '123456789';
                    
216							break;
                    
                
GUIDialogGamepad.cpp https://gitlab.com/sandihidayat/kodi | C++ | 315 lines
                    
191// \return true if successful display and user input entry/re-entry. false if unsuccessful display, no user input, or canceled editing.
                    
192bool CGUIDialogGamepad::ShowAndVerifyNewPassword(std::string& strNewPassword)
                    
193{
                    
206
                    
207  // Prompt again for password input, this time sending previous input as the password to verify
                    
208  if (!ShowAndVerifyInput(strUserInput, "12341", "12330", "12331", "", false, true))
                    
210    // TODO: Show error to user saying the password re-entry failed
                    
211    CGUIDialogOK::ShowAndGetInput(12357, 12344); // Password do not match
                    
212    return false;
                    
224// \return 0 if successful display and user input. 1 if unsuccessful input. -1 if no user input or canceled editing.
                    
225int CGUIDialogGamepad::ShowAndVerifyPassword(std::string& strPassword, const std::string& dlgHeading, int iRetries)
                    
226{
                    
230    // Show a string telling user they have iRetries retries left
                    
231    strLine2 = StringUtils::Format("%s %i %s", g_localizeStrings.Get(12342).c_str(), iRetries, g_localizeStrings.Get(12343).c_str());
                    
232  }
                    
                
md5-crypt.c git://pkgs.fedoraproject.org/tcl-trf | C | 251 lines
                    
59static const char b64t[64] =
                    
60"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
                    
61
                    
147
                    
148  /* Now comes another weirdness.  In fear of password crackers here
                    
149     comes a quite long loop which just processes the output of the
                    
235  /* We don't want to have an arbitrary limit in the size of the
                    
236     password.  We can compute the size of the result in advance and
                    
237     so we can prepare the buffer we pass to `md5_crypt_r'.  */
                    
                
nl.inc.php https://gitlab.com/sylver.gocloud/gocloudasia-college-system-framework | PHP | 269 lines
                    
7	'Username' => 'Gebruikersnaam',
                    
8	'Password' => 'Wachtwoord',
                    
9	'Select database' => 'Database selecteren',
                    
181	',' => '.',
                    
182	'0123456789' => '0123456789',
                    
183	'Analyze' => 'Analyseer',
                    
                
UserServiceTests.groovy https://bitbucket.org/stefanjummp/jummp.git | Groovy | 374 lines
                    
31    @Test
                    
32    void testChangePassword() {
                    
33        authenticateAsTestUser()
                    
34        shouldFail(BadCredentialsException) {
                    
35            userService.changePassword("wrong", "secure")
                    
36        }
                    
36        }
                    
37        userService.changePassword("secret", "secure")
                    
38        shouldFail(BadCredentialsException) {
                    
82        assertEquals("username", user.username)
                    
83        assertNull(user.password)
                    
84        assertNull(user.enabled)
                    
86        assertNull(user.accountLocked)
                    
87        assertNull(user.passwordExpired)
                    
88        authenticateAsAdmin()
                    
                
v1_registration_login.rst https://gitlab.com/sim6/matrix-doc | ReStructuredText | 343 lines
                    
9account. The homeserver may provide many different ways of logging in, such as
                    
10user/password auth, login via a social network (OAuth2), login by confirming a
                    
11token sent to their email address, etc. This specification does not define how
                    
63    "user_id": "@user:matrix.org",
                    
64    "access_token": "abcdef0123456789"
                    
65  }
                    
80This specification defines the following login types:
                    
81 - ``m.login.password``
                    
82 - ``m.login.oauth2``
                    
86
                    
87Password-based
                    
88~~~~~~~~~~~~~~
                    
98    "user": "<user_id or user localpart>",
                    
99    "password": "<password>"
                    
100  }
                    
                
admin.php https://github.com/gustavosf/semac.git | PHP | 202 lines
                    
55			$auth = Auth::instance();
                    
56			if ($auth->login(Input::post('username'), Input::post('password')))
                    
57			{
                    
108			{
                    
109				$pass = substr(str_shuffle('abcdefghijklmnopqrstuvxyzABCDEFGHIJKLMNOPQRSTUVXYZ0123456789'),0,6);
                    
110				$pass = $user->resetar_senha(); // já efetua o salvamento do registro
                    
163				{
                    
164					if ( ! $user->change_password(Input::post('senha_atual'), Input::post('nova_senha')))
                    
165					{
                    
                
utils.php https://github.com/andreassolberg/DiscoJuice.git | PHP | 343 lines
                    
108	 * 
                    
109	 * Generate random password.
                    
110	 * Borrowed from here: http://www.codemiles.com/php-tutorials/generate-password-using-php-t3120.html
                    
112	 */
                    
113	public static function  generateRandpassword($size=12, $power=7) {
                    
114		$vowels = 'aeuy';
                    
128
                    
129		$Randpassword = '';
                    
130		$alt = time() % 2;
                    
132			if ($alt == 1) {
                    
133				$Randpassword .= $randconstant[(rand() % strlen($randconstant))];
                    
134				$alt = 0;
                    
324	/**
                    
325	 * Encode username and password for use in .htpassword file.
                    
326	 * The latest version is prepared to be supported with the HTTP Digest
                    
                
id.inc.php https://gitlab.com/sylver.gocloud/gocloudasia-college-system-framework | PHP | 317 lines
                    
6	'Username' => 'Pengguna',
                    
7	'Password' => 'Sandi',
                    
8	'Permanent login' => 'Masuk permanen',
                    
94	',' => '.',
                    
95	'0123456789' => '0123456789',
                    
96	'Engine' => 'Mesin',
                    
                
engine.rb https://github.com/deviantech/gattica.git | Ruby | 283 lines
                    
6
                    
7    # Initialize Gattica using username/password or token.
                    
8    #
                    
14    # +:logger+::       Logger to use (default is STDOUT)
                    
15    # +:password+::     Your password for Google Analytics
                    
16    # +:profile_id+::   Use this Google Analytics profile_id (default is nil)
                    
33    #
                    
34    #   ga = Gattica.new({:email => 'johndoe@google.com', :password => 'password'})
                    
35    #   ga.accounts
                    
57    # == Usage
                    
58    #   ga = Gattica.new({:email => 'johndoe@google.com', :password => 'password'})
                    
59    #   ga.segments                       # Look up segment id
                    
81    #
                    
82    #   gs = Gattica.new({:email => 'johndoe@google.com', :password => 'password', :profile_id => 123456})
                    
83    #   gs.get({ :start_date => '2008-01-01',
                    
                
SFTPUserStoryTest.php https://gitlab.com/xolotsoft/pumasruiz | PHP | 478 lines
                    
20
                    
21        self::$exampleData = str_repeat('abcde12345', 1000);
                    
22        self::$exampleDataLength = 10000;
                    
39    */
                    
40    public function testPasswordLogin($sftp)
                    
41    {
                    
42        $username = $this->getEnv('SSH_USERNAME');
                    
43        $password = $this->getEnv('SSH_PASSWORD');
                    
44        $this->assertTrue(
                    
44        $this->assertTrue(
                    
45            $sftp->login($username, $password),
                    
46            'SSH2/SFTP login using password failed.'
                    
52    /**
                    
53    * @depends testPasswordLogin
                    
54    */
                    
                
final_project_beg.sql https://gitlab.com/sdlion/project_the_beginner_b35 | SQL | 150 lines
                    
31  `email` varchar(111) NOT NULL,
                    
32  `password` varchar(111) NOT NULL,
                    
33  PRIMARY KEY (`id`)
                    
39
                    
40INSERT INTO `admin` (`id`, `email`, `password`) VALUES
                    
41(1, 'jerinisrat@gmail.com', '1234'),
                    
41(1, 'jerinisrat@gmail.com', '1234'),
                    
42(2, 'israt@gmail.com', '12345');
                    
43
                    
128  `email` varchar(111) NOT NULL,
                    
129  `password` varchar(111) NOT NULL,
                    
130  `phone` varchar(111) NOT NULL,
                    
139
                    
140INSERT INTO `users` (`id`, `first_name`, `last_name`, `email`, `password`, `phone`, `address`, `email_verified`) VALUES
                    
141(1, 'Israt', 'ema', 'israt.ctg75@gmail.com', '182be0c5cdcd5072bb1864cdee4d3d6e', '33', 'cc', 'd87391f56ebb944ce0d45cd13b7aec96'),
                    
                
utils_test.go https://gitlab.com/auchalet/mattermost | Go | 197 lines
                    
37		{"", true, false, tDate0},
                    
38		{"1234", true, false, tDate0},
                    
39		{0, true, false, tDate0},
                    
67		{0x0000000000000100, []byte{0xfc, 0x00, 0x01}},
                    
68		{0x0000000000001234, []byte{0xfc, 0x34, 0x12}},
                    
69		{0x000000000000ffff, []byte{0xfc, 0xff, 0xff}},
                    
70		{0x0000000000010000, []byte{0xfd, 0x00, 0x00, 0x01}},
                    
71		{0x0000000000123456, []byte{0xfd, 0x56, 0x34, 0x12}},
                    
72		{0x0000000000ffffff, []byte{0xfd, 0xff, 0xff, 0xff}},
                    
73		{0x0000000001000000, []byte{0xfe, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00}},
                    
74		{0x123456789abcdef0, []byte{0xfe, 0xf0, 0xde, 0xbc, 0x9a, 0x78, 0x56, 0x34, 0x12}},
                    
75		{0xffffffffffffffff, []byte{0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}},
                    
107	for _, tuple := range vectors {
                    
108		ours := scrambleOldPassword(scramble, []byte(tuple.pass))
                    
109		if tuple.out != fmt.Sprintf("%x", ours) {
                    
                
subversion_spec.rb https://github.com/pcross616/chef.git | Ruby | 230 lines
                    
27    @resource.destination "/my/deploy/dir"
                    
28    @resource.revision "12345"
                    
29    @node = Chef::Node.new
                    
104    it "returns the revision number as is if it's already an integer" do
                    
105      @provider.revision_int.should eql("12345")
                    
106    end
                    
147  it "generates a checkout command with default options" do
                    
148    @provider.checkout_command.should eql("svn checkout -q  -r12345 http://svn.example.org/trunk/ /my/deploy/dir")
                    
149  end
                    
152    @resource.svn_username "deployNinja"
                    
153    @resource.svn_password "vanish!"
                    
154    @provider.checkout_command.should eql("svn checkout -q --username deployNinja --password vanish!  " +
                    
154    @provider.checkout_command.should eql("svn checkout -q --username deployNinja --password vanish!  " +
                    
155                                          "-r12345 http://svn.example.org/trunk/ /my/deploy/dir")
                    
156  end
                    
                
fixtures.yml https://github.com/bennett/xlsuite.git | YAML | 301 lines
                    
28  login: demo
                    
29  password: password
                    
30  
                    
113  login: LOGIN
                    
114  password: PASSWORD
                    
115  signature: SIGNATURE
                    
118  login: LOGIN
                    
119  password: PASSWORD
                    
120    
                    
258  login: LOGIN
                    
259  password: PASSWORD
                    
260
                    
293  login: LOGIN
                    
294  password: PASSWORD
                    
295  user: USER
                    
                
mobile-checkout.php https://github.com/MIT-EPROM/EPROM.git | PHP | 161 lines
                    
21step 1 - configure your account for mobile checkout - paypal > profile > api access > edit / create > tick SetMobileCheckout and DoMobileCheckoutPayment
                    
22step 2 - configure your api username, password and signature in constants.php
                    
23step 3 - upload, test and integrate with your mobile site - when you want to go live comment out the sandbox value below
                    
60  $submit_string .= '&DESC=Product+Description'; // REQUIRED - the name of the item being offered <127 characters
                    
61  $submit_string .= '&RETURNURL='.urlencode('http://'.$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']); // REQUIRED - urlencoded value - where the customer is directed to post paypal - ?token=123456789 will be added - it's suggested to make it the final review page prior to ordering
                    
62  $submit_string .= '&CANCELURL='.urlencode('http://'.$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']); // REQUIRED - urlencoded value - where the customer is directed to if they click the cancel or return to merchant links at paypal
                    
                
php_crypt_r.c https://bitbucket.org/luobailiang/php-src.git | C | 428 lines
                    
114static unsigned char itoa64[] =		/* 0 ... 63 => ascii - 64 */
                    
115	"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
                    
116
                    
169
                    
170	/* The password first, since that is what is most unknown */
                    
171	if(!CryptHashData(ctx, (BYTE *)pw, pwl, 0)) {
                    
316/*
                    
317 * MD5 password encryption.
                    
318 */
                    
346
                    
347	/* The password first, since that is what is most unknown */
                    
348	PHP_MD5Update(&ctx, (const unsigned char *)pw, pwl);
                    
                
vm_vdi_cleaner.py https://github.com/blamarvt/nova.git | Python | 385 lines
                    
35flags.DECLARE("xenapi_connection_username", "nova.virt.xenapi_conn")
                    
36flags.DECLARE("xenapi_connection_password", "nova.virt.xenapi_conn")
                    
37
                    
100    # then fall back to hex.
                    
101    fake_instance_id = 123456789
                    
102    result = template % fake_instance_id
                    
356    session = XenAPI.Session(FLAGS.xenapi_connection_url)
                    
357    session.xenapi.login_with_password(FLAGS.xenapi_connection_username,
                    
358            FLAGS.xenapi_connection_password)
                    
                
db_pos_7_27_2016.sql https://gitlab.com/MohammadShakil/POS_Management_System | SQL | 355 lines
                    
65  `email` varchar(50) NOT NULL,
                    
66  `password` varchar(50) NOT NULL,
                    
67  PRIMARY KEY (`id`)
                    
73
                    
74INSERT INTO `login` (`id`, `first_name`, `last_name`, `email`, `password`) VALUES
                    
75(1, 'mamun', 'rahaman', 'mamunur@gmail.com', '123456'),
                    
280INSERT INTO `users` (`user_id`, `user_type_id`, `user_name`, `user_email`, `user_pass`) VALUES
                    
281(1, 1, 'smartrashed', 'smartrashed@gmail.com', '123456');
                    
282
                    
                
login_controller_spec.rb https://github.com/liquid/taskboard.git | Ruby | 124 lines
                    
61  it "should show message when login is not correct" do
                    
62    post :login, {:login => 'cognifide', :password => 'qwe1234'}
                    
63    response.should_not be_redirect
                    
95  it "should allow adding new viewer user" do
                    
96    user_data = {:username => "newuser", :password => "password", :password_confirmation => "password"}
                    
97    user = User.new(user_data)
                    
97    user = User.new(user_data)
                    
98    User.should_receive(:new).with({"username" => "newuser", "password" => "password", "password_confirmation" => "password"}).and_return(user)
                    
99    user.should_receive(:save).and_return(true)
                    
107  it "should allow adding new editor user" do
                    
108    user_data = {:username => "newuser", :password => "password", :password_confirmation => "password", :editor => true}
                    
109    user = User.new(user_data)
                    
110    user.editor?.should be_true
                    
111    User.should_receive(:new).with({"username" => "newuser", "password" => "password", "password_confirmation" => "password", "editor" => true}).and_return(user)
                    
112    user.should_receive(:save).and_return(true)
                    
                
chapter_03.scm https://gitlab.com/o1s2/selflrrn | Scheme | 218 lines
                    
37    (define (incorrect-password ignored-amount)
                    
38      (set! incorrect-password-attempts (inc incorrect-password-attempts))
                    
39      (if (>= incorrect-password-attempts %allowed-attempts)
                    
89(define (make-account acc-password balance)
                    
90  (let ((incorrect-password-attempts 0) (passwords (list acc-password)))
                    
91    (define %allowed-attempts 3)
                    
107    (define (dispatch password message)
                    
108      (if (member? password passwords)
                    
109          (begin
                    
112                  ((eq? message 'deposit) deposit)
                    
113                  ((eq? message 'add-password) add-password)
                    
114                  (else (error "Unknown request -- MAKE-ACCOUNT" m))))
                    
118(define (make-joint account acc-password extra-password)
                    
119  ((account acc-password 'add-password) extra-password)
                    
120  account)
                    
                
registrations_controller_spec.rb https://gitlab.com/tbeadle/gitlab-ce | Ruby | 165 lines
                    
6  describe '#create' do
                    
7    let(:user_params) { { user: { name: 'new_user', username: 'new_username', email: 'new@user.com', password: 'Any_password' } } }
                    
8
                    
120    context 'user requires password confirmation' do
                    
121      it 'fails if password confirmation is not provided' do
                    
122        post :destroy
                    
123
                    
124        expect_password_failure
                    
125      end
                    
127      it 'fails if password confirmation is wrong' do
                    
128        post :destroy, password: 'wrong password'
                    
129
                    
133      it 'succeeds if password is confirmed' do
                    
134        post :destroy, password: '12345678'
                    
135
                    
                
ecommerce.sql https://gitlab.com/thoussem/Tunisie-Shop | SQL | 147 lines
                    
101  `email` varchar(50) NOT NULL,
                    
102  `password` varchar(30) NOT NULL,
                    
103  `tel` int(8) NOT NULL,
                    
118  UNIQUE KEY `email_7` (`email`),
                    
119  FULLTEXT KEY `password` (`password`)
                    
120) ENGINE=InnoDB  DEFAULT CHARSET=latin1 AUTO_INCREMENT=38 ;
                    
125
                    
126INSERT INTO `utilisateurs` (`id`, `username`, `nom`, `prenom`, `titre`, `email`, `password`, `tel`, `ville`, `codpost`, `codtel`, `adresse1`, `adresse2`) VALUES
                    
127(37, 't.houssem', 'Trabelsi', 'Houssem', 'mr', 't.houssemg@gmail.com', '123456', 0, '', 0, 0, '', '');
                    
                
test_read_format_7zip_encryption_partially.c https://bitbucket.org/freebsd/freebsd-base.git | C | 82 lines
                    
30	/* This file is password protected (encrypted) with AES-256. The headers
                    
31	   are NOT encrypted. Password is "12345678". It contains one encrypted
                    
32	   and one unencrypted file. */
                    
                
calendarscript.js https://gitlab.com/sylver.gocloud/demo-sw-k12-enrollment | JavaScript | 207 lines
                    
118	//for username generation in hrd or admin (employee_settings/change_settings)
                    
119	var charArray = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890";
                    
120	$('#gen_uname').click(function(){
                    
139	
                    
140	//for password generation in hrd or admin (employee_settings/change_settings)
                    
141	$('#gen_pword').click(function(){
                    
146		}
                    
147		$("<div title='Generated Password'>Use " + rand_pword + " as password?</div>").dialog({
                    
148			resizable: false,
                    
150				"OK" : function(){
                    
151					$('#password').val(rand_pword);
                    
152					$(this).dialog("close");
                    
161	$('#submit_changes').click(function(){
                    
162		if($('#username').val() == '' && $('#password').val() == ''){
                    
163			$("<div title='No entry found'>Please enter at least one entry</div>").dialog({
                    
                
cmd.py https://github.com/kumar303/funfactory.git | Python | 320 lines
                    
87
                    
88def create_settings(pkg, repo_dest, db_user, db_name, db_password, db_host,
                    
89                    db_port):
                    
95    sk = ''.join([
                    
96        random.choice('abcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*(-_=+)')
                    
97        for i in range(50)])
                    
100            'db_name': db_name,
                    
101            'db_password': db_password or '',
                    
102            'db_host': db_host or '',
                    
116            -        'USER': 'root',
                    
117            -        'PASSWORD': '',
                    
118            -        'HOST': '',
                    
121            +        'USER': '%(db_user)s',
                    
122            +        'PASSWORD': '%(db_password)s',
                    
123            +        'HOST': '%(db_host)s',
                    
                
api.html.erb https://github.com/jlneto/myraces.git | Ruby HTML | 44 lines
                    
19
                    
20    <p class="mb-4">If you'd like to authenticate users through the API using their email and password to retrieve an API token, you can make a POST request to the auth endpoint with the user's email and password. This is handy for authenticating from a mobile app, etc.</p>
                    
21
                    
22    <pre><code>POST /api/v1/auth.json
                    
23Params: { email: "steve@apple.com", password: "hunter2" }</code></pre>
                    
24
                    
25    <p>This will return a JSON response with a token you can use to access the API.</p>
                    
26    <pre><code>{ token: "abcd1234" }</code></pre>
                    
27
                    
                
launch.rst https://github.com/fcr/StarCluster.git | ReStructuredText | 167 lines
                    
26        >>> Creating security group @sc-physicscluster...
                    
27        RESERVATION r-d71f20be 123456789012 default
                    
28        INSTANCE i-10e91578 ami-17b15e7e pending gsg-keypair 0 m1.small ...
                    
30        >>> Node AMI: ami-17b15e7e
                    
31        RESERVATION r-ab1f20c2 123456789012 default
                    
32        INSTANCE i-14e9157c ami-17b15e7e pending gsg-keypair 0 m1.small ...
                    
43        >>> Configuring NFS...
                    
44        >>> Configuring passwordless ssh for root
                    
45        >>> Configuring passwordless ssh for user: myuser
                    
                
metadata_test.go https://gitlab.com/CORP-RESELLER/cf-distribution | Go | 182 lines
                    
16	}
                    
17	Password      string
                    
18	secret        string
                    
63			},
                    
64			"Password": "",
                    
65			"email":    "",
                    
124			"string":   "string",
                    
125			"password": "secret",
                    
126			"array": []hash{{
                    
126			"array": []hash{{
                    
127				"creditcard": "1234567812345678",
                    
128				"broken":     broken,
                    
134
                    
135	n := m.sanitize([]string{"password", "creditcard"})
                    
136
                    
                
mail_owner.php https://gitlab.com/shaon2016/bidwarbd | PHP | 110 lines
                    
76//Password to use for SMTP authentication
                    
77$mail->Password = "php12345";
                    
78//Set who the message is to be sent from
                    
                
test_delchal.py https://gitlab.com/bbhavesh07/gkcore | Python | 194 lines
                    
29	def setup_class(self):
                    
30		orgdata = {"orgdetails":{'orgname': 'Test Organisation', 'yearend': '2016-03-31', 'yearstart': '2015-04-01', 'orgtype': 'Profit Making', 'invflag': 1}, "userdetails":{"username":"admin", "userpassword":"admin","userquestion":"who am i?", "useranswer":"hacker"}}
                    
31		result = requests.post("http://127.0.0.1:6543/organisations",data=json.dumps(orgdata))
                    
36		""" Check and delete the user creation if it's not being used! """
                    
37		userdata = {"username":"user","userpassword":"passwd","userrole":0,"userquestion":"what is my pet name?","useranswer":"cat"}
                    
38		result = requests.post("http://127.0.0.1:6543/users", data=json.dumps(userdata), headers=self.header)
                    
46		""" Doubt: This should be a customer or supplier? I have created both!"""
                    
47		custdata = {"custname":"customer","custaddr":"goregaon","custphone":"22432123","custemail":"customer@gmail.com","custfax":"FAXCUST212345","state":"Maharashtra","custpan":"CUSTPAN1234","custtan":"CUSTTAN1234","csflag":3}
                    
48		result = requests.post("http://127.0.0.1:6543/customersupplier",data=json.dumps(custdata),headers=self.header)
                    
55		""" supid is used to store custid attribute """
                    
56		custdata = {"custname":"supplier","custaddr":"borivali","custphone":"44432123","custemail":"supplier@gmail.com","custfax":"FAXSUP212345","state":"Maharashtra","custpan":"SUPPAN1234","custtan":"SUPTAN1234","csflag":19}
                    
57		result = requests.post("http://127.0.0.1:6543/customersupplier",data=json.dumps(custdata),headers=self.header)
                    
                
TokenBasedRememberMeServicesTest.php https://gitlab.com/Isaki/le331.fr | PHP | 285 lines
                    
62        $request = new Request();
                    
63        $request->cookies->set('foo', base64_encode('class:'.base64_encode('foouser').':123456789:fooHash'));
                    
64
                    
67            ->expects($this->once())
                    
68            ->method('getPassword')
                    
69            ->will($this->returnValue('foopass'))
                    
92            ->expects($this->once())
                    
93            ->method('getPassword')
                    
94            ->will($this->returnValue('foopass'))
                    
122            ->expects($this->once())
                    
123            ->method('getPassword')
                    
124            ->will($this->returnValue('foopass'))
                    
215            ->expects($this->once())
                    
216            ->method('getPassword')
                    
217            ->will($this->returnValue('foopass'))
                    
                
apps.amine.bou.readerforselfoss.yml https://gitlab.com/revuwa/fdroiddata | YAML | 419 lines
                    
29      - appLoginUsername="LOGIN"
                    
30      - appLoginPassword="PASS"
                    
31
                    
40      - appLoginUsername="LOGIN"
                    
41      - appLoginPassword="PASS"
                    
42
                    
51      - appLoginUsername="LOGIN"
                    
52      - appLoginPassword="PASS"
                    
53
                    
62      - appLoginUsername="LOGIN"
                    
63      - appLoginPassword="PASS"
                    
64
                    
73      - appLoginUsername="LOGIN"
                    
74      - appLoginPassword="PASS"
                    
75
                    
                
checksession.php https://bitbucket.org/frchico/chamilo_openshift.git | PHP | 99 lines
                    
27
                    
28//$confkey = "0123456789abcdef0123456789abcdef";
                    
29$confkey = api_get_setting('service_visio','visio_pass');
                    
29$confkey = api_get_setting('service_visio','visio_pass');
                    
30$challenge = api_generate_password(32); //generate a 32 characters-long challenge key
                    
31
                    
                
_NAMES4EVER.php https://github.com/axxtel/agilebill.git | PHP | 172 lines
                    
29	user
                    
30	password
                    
31	plan_id
                    
97		# generate the xml string 
                    
98		$xml_request = '?<?xml version="1.0" ?><request version="1.0" id="REQUEST-123456">'.
                    
99		  '<reseller id="'. 		$this->registrar['user'] .'">'.
                    
99		  '<reseller id="'. 		$this->registrar['user'] .'">'.
                    
100			'<password>secret'. 	$this->registrar['password'] .'</password>'.
                    
101			'<plan-id>'. 			$this->registrar['plan_id'] .'</plan-id>'.
                    
103		  '<add-domain fqdn="'. 	$this->domain_name .'">'.
                    
104			'<password>'. 			$this->account['password'] .'</password>'.
                    
105			'<organization>'. 		$this->account['company'] .'</organization>'.
                    
                
Program.cs https://github.com/thunderstumpges/EnyimMemcached.git | C# | 123 lines
                    
32			config.Authentication.Parameters["userName"] = "demo";
                    
33			config.Authentication.Parameters["password"] = "demo";
                    
34
                    
73			//// store some other items
                    
74			//mc.Store(StoreMode.Set, "D1", 1234L);
                    
75			//mc.Store(StoreMode.Set, "D2", DateTime.Now);
                    
81
                    
82			////mc2.Store(StoreMode.Set, "D1", 1234L);
                    
83			////mc2.Store(StoreMode.Set, "D2", DateTime.Now);
                    
                
GivenEmbeddedViewerAndPersistentDomainObject.java https://gitlab.com/essere.lab.public/qualitas.class-corpus | Java | 157 lines
                    
141		
                    
142		employeeVO.setPassword("12345678");
                    
143	}
                    
152		
                    
153		employeeVO.setPassword("12345678");
                    
154		
                    
                
reset.tests.js https://gitlab.com/nioto/michel-app | JavaScript | 378 lines
                    
127        $('#a0-reset_easy_password').val(password);
                    
128        $('#a0-reset_easy_repeat_password').val(password);
                    
129
                    
140      var username = '1.1.1.1';
                    
141      var password = '12345';
                    
142
                    
145        $('#a0-reset_easy_email').val(username);
                    
146        $('#a0-reset_easy_password').val(password);
                    
147        $('#a0-reset_easy_repeat_password').val(password);
                    
216        $('#a0-reset_easy_email').val(email);
                    
217        $('#a0-reset_easy_password').val(password);
                    
218        $('#a0-reset_easy_repeat_password').val(password);
                    
325          $('#a0-reset_easy_password').val(password);
                    
326          $('#a0-reset_easy_repeat_password').val(password);
                    
327
                    
                
postgresql.php https://github.com/Hackwar/joomla-platform.git | PHP | 141 lines
                    
37	 *
                    
38	 * An example DSN would be: host=localhost;port=5432;dbname=joomla_ut;user=utuser;pass=ut1234
                    
39	 *
                    
84				case 'pass':
                    
85					self::$_options['password'] = $v;
                    
86					break;
                    
136		// Create the PDO object from the DSN and options.
                    
137		$pdo = new PDO($dsn, self::$_options['user'], self::$_options['password']);
                    
138
                    
                
http_auth_handler_digest.cc https://gitlab.com/jonnialva90/iridium-browser | C++ | 383 lines
                    
39//==========+==========+==========================================+
                    
40//          | ?, md5   | user:realm:password                      |
                    
41//----------+----------+------------------------------------------+
                    
41//----------+----------+------------------------------------------+
                    
42//          | md5-sess | MD5(user:realm:password):nonce:cnonce    |
                    
43//==========+==========+==========================================+
                    
62  // This is how mozilla generates their cnonce -- a 16 digit hex string.
                    
63  static const char domain[] = "0123456789abcdef";
                    
64  std::string cnonce;
                    
327                                    ":" + original_realm_ + ":" +
                    
328                                    base::UTF16ToUTF8(credentials.password()));
                    
329  if (algorithm_ == HttpAuthHandlerDigest::ALGORITHM_MD5_SESS)
                    
                
AuthTest.java https://bitbucket.org/robeden/intrepid.git | Java | 129 lines
                    
87	@Test( expected = ConnectionFailureException.class )
                    
88	public void testUserAuth_badPassword() throws Exception {
                    
89		client_instance.connect( InetAddress.getLoopbackAddress(),
                    
97			InetAddress.getLoopbackAddress(), server_instance.getServerPort(),
                    
98			new UserCredentialsConnectionArgs( "reden", "12345".toCharArray() ),
                    
99			null );
                    
121
                    
122			if ( !"12345".equals( new String( credentials.getPassword() ) ) ) {
                    
123				throw new ConnectionAuthFailureException( "Bad password" );
                    
                
basicauthentication.c https://github.com/MaDDoGo/xbmc.git | C | 182 lines
                    
8#define USER      "a legitimate user"
                    
9#define PASSWORD  "and his password"
                    
10
                    
50is_authenticated (struct MHD_Connection *connection,
                    
51                  const char *username, const char *password)
                    
52{
                    
65
                    
66  expected = malloc (strlen (username) + 1 + strlen (password) + 1);
                    
67  if (NULL == expected)
                    
71  strcat (expected, ":");
                    
72  strcat (expected, password);
                    
73
                    
121
                    
122  if (!is_authenticated (connection, USER, PASSWORD))
                    
123    return ask_for_authentication (connection, REALM);
                    
                
test_webrick_server.rb https://gitlab.com/MichelZuniga/ruby | Ruby | 137 lines
                    
73        @s.user = 'admin'
                    
74        @s.password = 'admin'
                    
75        silent do
                    
79        @s = XMLRPC::Client.new3(:host => addr.ip_address, :port => addr.ip_port, :use_ssl => use_ssl)
                    
80        @s.user = '01234567890123456789012345678901234567890123456789012345678901234567890123456789'
                    
81        @s.password = 'guest'
                    
                
email.php https://gitlab.com/nz_moon/Nazmun_nahar_SEIP_ID_142969_B35_Atomic_Project | PHP | 231 lines
                    
5$yourGmailAddress = "nazmun.bitm@gmail.com"; #<<<<<<<<<<<<<< Set Your Email Address
                    
6$gmailPassword = "12345678912345";   #<<<<<<<<<<<<<< Set Your Gmail Password
                    
7####################################################################################
                    
125    //Password to use for SMTP authentication
                    
126    $mail->Password =$gmailPassword;
                    
127    //Set who the message is to be sent from
                    
                
Signing_Process.md https://gitlab.com/AntoninCurtit/fdroid-website | Markdown | 116 lines
                    
43to be created, and ’repokey’ with a name to identify the repo index
                    
44key by.  You’ll be asked for a password for the keystore, AND a
                    
45password for the key. They shouldn’t be the same. In between, you’ll
                    
48
                    
49The two passwords entered go into _config.yml_, as `keystorepass` and
                    
50`keypass` respectively. The path to the keystore file is set in
                    
81$ mkdir unsigned
                    
82$ cp /path/to/app-release-unsigned.apk unsigned/com.example.app_1234.apk
                    
83$ fdroid publish --verbose
                    
                
DigestAuthenticateTest.php https://github.com/gustavor/lore.git | PHP | 303 lines
                    
42		$this->auth = new DigestAuthenticate($this->Collection, array(
                    
43			'fields' => array('username' => 'user', 'password' => 'password'),
                    
44			'userModel' => 'User',
                    
49
                    
50		$password = DigestAuthenticate::password('mariano', 'cake', 'localhost');
                    
51		$User = ClassRegistry::init('User');
                    
51		$User = ClassRegistry::init('User');
                    
52		$User->updateAll(array('password' => $User->getDataSource()->value($password)));
                    
53
                    
75			'userModel' => 'AuthUser',
                    
76			'fields' => array('username' => 'user', 'password' => 'password'),
                    
77			'nonce' => 123456
                    
79		$this->assertEquals('AuthUser', $object->settings['userModel']);
                    
80		$this->assertEquals(array('username' => 'user', 'password' => 'password'), $object->settings['fields']);
                    
81		$this->assertEquals(123456, $object->settings['nonce']);
                    
                
 

Source

Language