100+ results results for 'password strength' (609 ms)
494 495.password-strength { /* System gap */ 496 margin-left: 10px;EnrichIntegrationFromRemoteConfigStrategy.js https://gitlab.com/DamZou/myMeteoApp | JavaScript | 245 lines
174 // Enrich config with with directory policies. 175 client.getDirectory(directoryHref, { expand: 'passwordPolicy,accountCreationPolicy' }, stopIfError(function (directory) { 176 var resetEmailStatusEnabled = isEnabled(directory.passwordPolicy.resetEmailStatus); 180 web: { 181 forgotPassword: { 182 enabled: resetEmailStatusEnabled 183 }, 184 changePassword: { 185 enabled: resetEmailStatusEnabled 199 directory.getPasswordPolicy(stopIfError(function (policy) { 200 policy.getStrength(stopIfError(function (strength) { 201 // Remove the href property from the Strength Resource, we don't want 205 206 config.passwordPolicy = strength; 207landing.html https://bitbucket.org/liutaihua/yyu.git | HTML | 182 lines
4$# note var cssfiles: /static/public/css/landing.css /static/public/css/jquery.motionCaptcha.0.2.css 5$# note var jsfiles: /static/public/js/Validform_v5.1.js /static/public/js/landing.js /static/public/js/passwordStrength-min.js /static/public/js/jquery.motionCaptcha.0.2.js 6 83 <div class="controls"> 84 <input type="password" name="regUserPassword" placeholder="密码" datatype="*6-16" errormsg="密码范围在6~16位之间" plugin="passwordStrength" class="span3"/> 85 <span class="Validform_checktip">6-16个字符</span> 85 <span class="Validform_checktip">6-16个字符</span> 86 <div class="passwordStrength" style="display:none;"><b>密码强度:</b> <span>弱</span><span>中</span><span class="last">强</span></div> 87 </div> 89 <div class="controls"> 90 <input type="password" name="regUserPassword2" placeholder="确认密码" datatype="*6-16" class="span3" datatype="*" recheck="regUserPassword" nullmsg="请再输入一次密码!" errormsg="您两次输入的账号密码不一致!" /> 91 <span class="Validform_checktip"></span> 113 <span class="add-on"><i class="icon-lock"></i></span> 114 <input name="loginPassword" type="password" placeholder="密码" class="span3"/> 115 <a id="forgotButton" href="javascript:void(0)">忘记密码?</a>user.js https://gitlab.com/mohamed_hussein/prodt | JavaScript | 229 lines
45 var $confirmInputParent = $confirmInput.parent().addClass('confirm-parent').append($passwordConfirmMessage); 46 var passwordStrengthBarClassesToRemove = [cssClasses.passwordWeak || '', cssClasses.passwordFair || '', cssClasses.passwordGood || '', cssClasses.passwordStrong || ''].join(' ').trim(); 47 var confirmTextWrapperClassesToRemove = [cssClasses.passwordsMatch || '', cssClasses.passwordsNotMatch || ''].join(' ').trim(); 52 var $passwordStrength = $(Drupal.theme('passwordStrength', settings.password)); 53 password.$strengthBar = $passwordStrength.find('[data-drupal-selector="password-strength-indicator"]').first(); 54 55 if (password.$strengthBar.length === 0) { 56 password.$strengthBar = $passwordStrength.find('.js-password-strength__indicator').first(); 57 Drupal.deprecationError({ 57 Drupal.deprecationError({ 58 message: 'The js-password-strength__indicator class is deprecated in drupal:9.1.0 and is removed from drupal:10.0.0. Replace js-password-strength__indicator with a data-drupal-selector="password-strength-indicator" attribute. See https://www.drupal.org/node/3152101' 59 }); 66 Drupal.deprecationError({ 67 message: 'The js-password-strength__text class is deprecated in drupal:9.1.0 and is removed from drupal:10.0.0. Replace js-password-strength__text with a data-drupal-selector="password-strength-text" attribute. See https://www.drupal.org/node/3152101' 68 });PasswordStrength.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 467 lines
339 { 340 sb.Append(GetString("passwordstrength.notacceptable"), ";", GetString("passwordstrength.weak")); 341 tooltipMessage = string.Format(GetString("passwordstrength.hint"), MinLength, MinNonAlphaNumChars, PreferedLength, PreferedNonAlphaNumChars); 344 { 345 sb.Append(GetString("passwordstrength.weak"), ";", GetString("passwordstrength.weak")); 346 tooltipMessage = string.Format(GetString("passwordstrength.recommend"), PreferedLength, PreferedNonAlphaNumChars); 348 349 // Register jQuery and registration of script which shows password strength 350 ScriptHelper.RegisterJQuery(this.Page); 352 353 sb.Append(";", GetString("passwordstrength.acceptable"), ";", GetString("passwordstrength.average"), ";", GetString("passwordstrength.strong"), ";", GetString("passwordstrength.excellent")); 354 371 372 ScriptHelper.RegisterStartupScript(this, typeof(string), "PasswordStrength_" + txtPassword.ClientID, ScriptHelper.GetScript(script)); 373user_info.py https://gitlab.com/EntityOS/Cnchi | Python | 335 lines
54 self.image_is_ok['username'] = self.ui.get_object('username_ok') 55 self.image_is_ok['password'] = self.ui.get_object('password_ok') 56 59 self.error_label['username'] = self.ui.get_object('username_error_label') 60 self.error_label['password'] = self.ui.get_object('password_error_label') 61 61 62 self.password_strength = self.ui.get_object('password_strength') 63 67 self.entry['username'] = self.ui.get_object('username') 68 self.entry['password'] = self.ui.get_object('password') 69 self.entry['verified_password'] = self.ui.get_object('verified_password') 317 self.error_label['password'], 318 self.password_strength) 319users.php https://github.com/reverseproductions/socialigniter.git | PHP | 449 lines
60 $this->form_validation->set_rules('email', 'Email Address', 'required|valid_email'); 61 $this->form_validation->set_rules('password', 'Password', 'required|min_length['.config_item('min_password_length').']|max_length['.$this->config->item('max_password_length').']|strong_pass['.config_item('password_strength').']|matches[password_confirm]'); 62 $this->form_validation->set_rules('password_confirm', 'Password Confirmation', 'required'); 67 $email = $this->input->post('email'); 68 $password = $this->input->post('password'); 69 $additional_data = array( 94 $this->form_validation->set_rules('email', 'Email Address', 'required|valid_email'); 95 $this->form_validation->set_rules('password', 'Password', 'required'); 96 294 $this->form_validation->set_rules('old_password', 'Old password', 'required'); 295 $this->form_validation->set_rules('new_password', 'New Password', 'required|min_length['.config_item('min_password_length').']|max_length['.config_item('max_password_length').']|matches[new_password_confirm]'); 296 $this->form_validation->set_rules('new_password_confirm', 'Confirm New Password', 'required'); 299 { 300 if ($change = $this->social_auth->change_password($this->oauth_user_id, $this->input->post('old_password'), $this->input->post('new_password'))) 301 {ezsig.rb https://github.com/flooose/adva_cms.git | Ruby | 535 lines
42=end 43 def self.generate(strength=2048,type=:rsa) 44 key_class=case type 49 end 50 EzCrypto::Signer.new(key_class.generate(strength)) 51 end 53=begin rdoc 54 Decode a PEM encoded Private Key and return a signer. Takes an optional password 55=end 55=end 56 def self.decode(encoded,password=nil) 57 begin 57 begin 58 EzCrypto::Signer.new(OpenSSL::PKey::RSA.new( encoded,password)) 59 rescuesecurity.dev.js https://gitlab.com/Mirros/cdnjs | JavaScript | 348 lines
54 /* 55 * Validate password strength 56 */ 63 64 return $.formUtils.validators.validate_strength.calculatePasswordStrength(val) >= requiredStrength; 65 }, 69 /** 70 * Code more or less borrowed from jQuery plugin "Password Strength Meter" 71 * written by Darren Mason (djmason9@gmail.com), myPocket technologies (www.mypocket-technologies.com) 74 */ 75 calculatePasswordStrength : function(password) { 76 199 200 var strength = $.formUtils.validators.validate_strength.calculatePasswordStrength(val); 201 var css = {PolicySetupActivity.java https://gitlab.com/brian0218/rk3288_r-box_android4.4.2_sdk | Java | 275 lines
38 * for viewing configured policy. When it is detected that the screen-lock password satisfies 39 * the password strength required by the policy, the user is sent to an Activity containing 40 * protected content. 120 mPasswordQualityInputField = (Spinner) findViewById(R.id.policy_password_quality); 121 mPasswordLengthInputField = (EditText) findViewById(R.id.policy_password_length); 122 mPasswordMinUppercaseInputField = (EditText) findViewById(R.id.policy_password_uppercase); 258 private void writePolicy() { 259 int passwordQuality = (int) mPasswordQualityInputField.getSelectedItemId(); 260 262 try { 263 passwordLength = Integer.valueOf(mPasswordLengthInputField.getText().toString()); 264 } catch (NumberFormatException nfe) {} // Defaults to 0. 271 272 mPolicy.saveToLocal(passwordQuality, passwordLength, passwordMinUppercase); 273 }lang_sql.php https://gitlab.com/phamngsinh/baitaplon_sinhvien | PHP | 185 lines
3$lang['L_IMPORT_NOTABLE']="Ingen tabell har valts för importen!"; 4$lang['L_PASSWORD_STRENGTH']="Lösenordets säkerhet"; 5$lang['L_SQL_WARNING']="Utförs SQL-kommandon kan detta förändra data! Autorn ansvarar ej för förlust av data."; 180$lang['L_USERNAME']="Användarnamn"; 181$lang['L_PASSWORD']="Lösenord"; 182$lang['L_PASSWORD_REPEAT']="Upprepa lösenord";register.html https://gitlab.com/pidlisnyi/spring-angular | HTML | 123 lines
76 <label class="control-label" for="password" translate="global.form.newpassword">New password</label> 77 <input type="password" class="form-control" id="password" name="password" placeholder="{{'global.form.newpassword.placeholder' | translate}}" 78 ng-model="vm.registerAccount.password" ng-minlength=4 ng-maxlength=50 required> 92 </div> 93 <password-strength-bar password-to-check="vm.registerAccount.password"></password-strength-bar> 94 </div> 96 <label class="control-label" for="confirmPassword" translate="global.form.confirmpassword">New password confirmation</label> 97 <input type="password" class="form-control" id="confirmPassword" name="confirmPassword" placeholder="{{'global.form.confirmpassword.placeholder' | translate}}" 98 ng-model="vm.confirmPassword" ng-minlength=4 ng-maxlength=50 required> 98 ng-model="vm.confirmPassword" ng-minlength=4 ng-maxlength=50 required> 99 <div ng-show="form.confirmPassword.$dirty && form.confirmPassword.$invalid"> 100 <p class="help-block" 100 <p class="help-block" 101 ng-show="form.confirmPassword.$error.required" translate="global.messages.validate.confirmpassword.required"> 102 Your confirmation password is required.form-test.html https://gitlab.com/Blueprint-Marketing/cdnjs | HTML | 346 lines
31 32 /* modify inputs for password strength */ 33 .password-strength input.form-control { 38 39 .password-strength label { 40 display: block; 107 108 <div class="form-group password-strength"> 109 <label class="control-label" for="password">Display password strength (only strong)</label> 109 <label class="control-label" for="password">Display password strength (only strong)</label> 110 <input name="password" type="password" id="password" class="form-control" data-validation="strength" data-validation-strength="3" /> 111 </div> 291 $('#swedish-county-suggestions').suggestSwedishCounty(); 292 $('#password').displayPasswordStrength(); 293 },wifi.scm https://gitlab.com/Efraim/guix | Scheme | 246 lines
45 46(define (strength->string strength) 47 "Convert STRENGTH as an integer percentage into a text printable strength 63 (string quarter half #\_ #\_)) 64 ((> strength 5) 65 ;; ▂___ 95(define (run-wrong-password-page service-name) 96 "Run a page to inform user of a wrong password input." 97 (run-error-page 97 (run-error-page 98 (format #f (G_ "The password you entered for ~a is incorrect.") 99 service-name) 180 (strength (service-strength service)) 181 (strength-string (strength->string strength)) 182 (state (service-state service))IAuthenticator.cs http://owasp-esapi-classicasp.googlecode.com/svn/trunk/ | C# | 198 lines
39 /// current request and the name of the parameters containing the username and 40 /// password. The implementation should verify the password if necessary, create 41 /// a session if necessary, and set the user as the current user. 79 /// </param> 80 /// <param name="password1">The password for the user. 81 /// </param> 81 /// </param> 82 /// <param name="password2">A confirmation of the password for the user. 83 /// 87 /// </returns> 88 IUser CreateUser(string accountName, string password1, string password2); 89 177 /// </returns> 178 void VerifyPasswordStrength(string oldPassword, string newPassword); 179remember_me.rst https://github.com/pedrobc/symfony-docs.git | ReStructuredText | 207 lines
74 <label for="password">Password:</label> 75 <input type="password" id="password" name="_password" /> 76 95 <label for="password">Password:</label> 96 <input type="password" id="password" name="_password" /> 97 140 role, then you also have the other two roles. In other words, these roles 141 represent three levels of increasing "strength" of authentication. 142 192 193 * Once the user has entered his username and password, assuming the 194 user receives the ``ROLE_USER`` role per your configuration, the usersetup.blade.php https://gitlab.com/billyprice1/Cachet | PHP | 222 lines
93 <label>{{ trans('forms.setup.mail_password') }}</label> 94 <input type="text" class="form-control" name="env[mail_password]" value="{{ Binput::old('env.mail_password') }}" autocomplete="off"> 95 @if($errors->has('env.mail_password')) 95 @if($errors->has('env.mail_password')) 96 <span class="text-danger">{{ $errors->first('env.mail_password') }}</span> 97 @endif 189 <label>{{ trans("forms.setup.password") }}</label> 190 <input type="password" name="user[password]" class="form-control password-strength" placeholder="{{ trans('forms.setup.password') }}" value="{{ Binput::old('user.password', '') }}" required> 191 <div class="strengthify-wrapper"></div> 191 <div class="strengthify-wrapper"></div> 192 @if($errors->has('user.password')) 193 <span class="text-danger">{{ $errors->first('user.password') }}</span>FormValidationTag.java https://gitlab.com/spiderworts/ab_weixin_cms | Java | 254 lines
99 if (usePlugin.indexOf("password") >= 0) { 100 sb.append("<SCRIPT type=\"text/javascript\" src=\"plug-in/Validform/plugin/passwordStrength/passwordStrength-min.js\"></SCRIPT>"); 101 } 146 if (usePlugin.indexOf("password") >= 0) { 147 passsb.append("passwordstrength:{"); 148 passsb.append("minLen:6,"); 154 passsb.append("obj.parent().next().find(\".Validform_checktip\").show();"); 155 passsb.append("obj.find(\".passwordStrength\").hide();"); 156 passsb.append("}"); 158 passsb.append("{"); 159 passsb.append("$(\".passwordStrength\").show();"); 160 passsb.append("obj.parent().next().find(\".Validform_checktip\").hide();"); 162 passsb.append("}");// trigger结尾 163 passsb.append("}");// passwordstrength结尾 164 }tls_srp.c https://gitlab.com/srbhgupta/open | C | 471 lines
108 s->srp_ctx.info = ctx->srp_ctx.info; 109 s->srp_ctx.strength = ctx->srp_ctx.strength; 110 433 434int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password) 435{ 435{ 436 return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD, 0, password); 437} 438 439int SSL_CTX_set_srp_strength(SSL_CTX *ctx, int strength) 440{ 440{ 441 return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH, strength, 442 NULL);tank_auth.php https://bitbucket.org/matyhaty/senses-thwaites.git | PHP | 568 lines
248 $plainpassword = $new_password; 249 $hashed_password = getCryptedPassword($plainpassword , $salt); 250 309 $this->error = array('old_password' => 'auth_incorrect_password'); 310 log_message('error', 'Changing Password - old_password - auth_incorrect_password'); 311 } 334 $this->ci->config->item('phpass_hash_portable', 'tank_auth')); 335 if ($hasher->CheckPassword($password, $user->password)) { // success 336 358 } else { // fail 359 $this->error = array('password' => 'auth_incorrect_password'); 360 } 397 $this->ci->config->item('phpass_hash_portable', 'tank_auth')); 398 if ($hasher->CheckPassword($password, $user->password)) { // success 399schannel.h https://gitlab.com/ubuntu-trusty/mingw-w64 | C Header | 376 lines
45#define SECPKG_ATTR_SUPPORTED_ALGS 0x56 46#define SECPKG_ATTR_CIPHER_STRENGTHS 0x57 47#define SECPKG_ATTR_SUPPORTED_PROTOCOLS 0x58 93typedef struct _SecPkgCred_CipherStrengths { 94 DWORD dwMinimumCipherStrength; 95 DWORD dwMaximumCipherStrength; 95 DWORD dwMaximumCipherStrength; 96} SecPkgCred_CipherStrengths,*PSecPkgCred_CipherStrengths; 97 109 ALG_ID aiCipher; 110 DWORD dwCipherStrength; 111 ALG_ID aiHash; 111 ALG_ID aiHash; 112 DWORD dwHashStrength; 113 ALG_ID aiExch;components-form-tools.js https://gitlab.com/worksmit/demo | JavaScript | 202 lines
34 35 var handlePasswordStrengthChecker = function () { 36 var initialized = false; 36 var initialized = false; 37 var input = $("#password_strength"); 38 41 // set base options 42 input.pwstrength({ 43 raisePower: 1.4, 48 49 // add your own rule to calculate the password strength 50 input.pwstrength("addRule", "demoRule", function (options, word, score) { 189 handleBootstrapMaxlength(); 190 handlePasswordStrengthChecker(); 191 handleUsernameAvailabilityChecker1();ril_commands.h https://gitlab.com/lindwurm/rr_device_oneplus_oneplus3 | C Header | 175 lines
35 {RIL_REQUEST_LAST_CALL_FAIL_CAUSE, dispatchVoid, responseFailCause}, 36 {RIL_REQUEST_SIGNAL_STRENGTH, dispatchVoid, responseRilSignalStrength}, 37 {RIL_REQUEST_VOICE_REGISTRATION_STATE, dispatchVoid, responseStrings}, 60 {RIL_REQUEST_SET_FACILITY_LOCK, dispatchStrings, responseInts}, 61 {RIL_REQUEST_CHANGE_BARRING_PASSWORD, dispatchStrings, responseVoid}, 62 {RIL_REQUEST_QUERY_NETWORK_SELECTION_MODE, dispatchVoid, responseInts},install.php http://cartonbank.googlecode.com/svn/trunk/ | PHP | 268 lines
89 $user_name = isset($_POST['user_name']) ? trim( stripslashes( $_POST['user_name'] ) ) : 'admin'; 90 $admin_password = isset($_POST['admin_password']) ? trim( stripslashes( $_POST['admin_password'] ) ) : ''; 91 $admin_email = isset( $_POST['admin_email'] ) ? trim( stripslashes( $_POST['admin_email'] ) ) : ''; 123 <input name="admin_password" type="password" id="pass1" size="25" value="" /> 124 <p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p> 125 <div id="pass-strength-result"><?php _e('Strength indicator'); ?></div> 189 $admin_password = isset($_POST['admin_password']) ? $_POST['admin_password'] : ''; 190 $admin_password_check = isset($_POST['admin_password2']) ? $_POST['admin_password2'] : ''; 191 $admin_email = isset( $_POST['admin_email'] ) ?trim( stripslashes( $_POST['admin_email'] ) ) : ''; 233 <td><?php 234 if ( ! empty( $password ) && empty($admin_password_check) ) 235 echo '<code>'. esc_html($password) .'</code><br />'; 249<script type="text/javascript" src="../wp-includes/js/jquery/jquery.js"></script> 250<script type="text/javascript" src="js/password-strength-meter.js"></script> 251<script type="text/javascript" src="js/user-profile.js"></script>eaptypes.rs https://github.com/chromium/chromium.git | Rust | 403 lines
84 eatUserName = 1, 85 eatUserPassword = 2, 86 eatMD5CHAPPassword = 3, 226 EapConfigInputUsername = 0, 227 EapConfigInputPassword = 1, 228 EapConfigInputNetworkUsername = 2, 228 EapConfigInputNetworkUsername = 2, 229 EapConfigInputNetworkPassword = 3, 230 EapConfigInputPin = 4, 296 emptPropKeyStrength64 = 6, 297 emptPropKeyStrength128 = 7, 298 emptPropKeyStrength256 = 8, 395 [u32; 6] [u64; 4], 396 username_password username_password_mut: EapUsernamePasswordCredential, 397 certificate certificate_mut: EapCertificateCredential,edit.php https://github.com/lowiebenoot/forkcms.git | PHP | 354 lines
157 158 // check if we need to show the password strength and parse the label 159 $this->tpl->assign('showPasswordStrength', ($this->record['settings']['password_strength'] !== 'strong')); 159 $this->tpl->assign('showPasswordStrength', ($this->record['settings']['password_strength'] !== 'strong')); 160 $this->tpl->assign('passwordStrengthLabel', BL::lbl($this->record['settings']['password_strength'])); 161 } 210 { 211 if($fields['new_password']->getValue() !== $fields['confirm_password']->getValue()) $fields['confirm_password']->addError(BL::err('ValuesDontMatch')); 212 } 257 $settings['current_password_change'] = time(); 258 if($lastPasswordChange) $settings['last_password_change'] = $lastPasswordChange; 259 260 // save the password strength 261 $passwordStrength = BackendAuthentication::checkPassword($fields['new_password']->getValue()); 262 $settings['password_strength'] = $passwordStrength;form_controls_extended.js https://gitlab.com/Mustafiz.it12/Trainer_Registration | JavaScript | 489 lines
104 105 // Passy - password generator 106 // ------------------------------ 122 123 // Strength meter 124 var feedback = [ 138 $outputLabel.text(feedback[strength].text); 139 $outputLabel.css('background-color', feedback[strength].color).css('color', feedback[strength].textColor); 140 }); 144 $outputLabelAbsolute.text(feedback[strength].text); 145 $outputLabelAbsolute.css('background-color', feedback[strength].color).css('color', feedback[strength].textColor); 146 }); 150 $outputGroup.text(feedback[strength].text); 151 $outputGroup.css('background-color', feedback[strength].color).css('border-color', feedback[strength].color).css('color', feedback[strength].textColor); 152 });install.php https://gitlab.com/darmawan.fatria/df-skp-2014 | PHP | 307 lines
128 <th scope="row"> 129 <label for="pass1"><?php _e('Password, twice'); ?></label> 130 <p><?php _e('A password will be automatically generated for you if you leave this blank.'); ?></p> 133 <input name="admin_password" type="password" id="pass1" size="25" value="" /> 134 <p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p> 135 <div id="pass-strength-result"><?php _e('Strength indicator'); ?></div> 240 $user_name = isset($_POST['user_name']) ? trim( wp_unslash( $_POST['user_name'] ) ) : ''; 241 $admin_password = isset($_POST['admin_password']) ? wp_unslash( $_POST['admin_password'] ) : ''; 242 $admin_password_check = isset($_POST['admin_password2']) ? wp_unslash( $_POST['admin_password2'] ) : ''; 254 $error = true; 255 } elseif ( $admin_password != $admin_password_check ) { 256 // TODO: poka-yoke 285 <td><?php 286 if ( ! empty( $result['password'] ) && empty( $admin_password_check ) ): ?> 287 <code><?php echo esc_html( $result['password'] ) ?></code><br />release-info.html https://github.com/alexandraleahu/insubstantial.git | HTML | 350 lines
65 <td width="20%" valign="top" align="left"> 66 <p align="right"><b>Strength checking on passwords</b></td> 67 <td width="80%" valign="top">Password fields can provide visual feedback 67 <td width="80%" valign="top">Password fields can provide visual feedback 68 on the strength of the currently set contents (password). See <a 69 href="http://weblogs.java.net/blog/kirillcool/archive/2005/12/visual_feedback.html">this blog entry</a> 69 href="http://weblogs.java.net/blog/kirillcool/archive/2005/12/visual_feedback.html">this blog entry</a> 70 for the description on how to use this feature. See <a href="password-strength.avi">22-second</a> AVI 71 movie (412 KB) illustrating the technique. 72 <br><br> 73 <img src="password-strength-weak.png" width="250" height="48"><br><br> 74 <img src="password-strength-medium.png" width="250" height="59"><br><br> 74 <img src="password-strength-medium.png" width="250" height="59"><br><br> 75 <img src="password-strength-strong.png" width="250" height="51"> 76 </td>user-profile.js https://gitlab.com/campus-academy/krowkaramel | JavaScript | 478 lines
43 44 // Once zxcvbn loads, passwords strength is known. 45 $( '#pw-weak-text-label' ).text( __( 'Confirm use of weak password' ) ); 64 65 // Refresh password strength area. 66 $pass1.removeClass( 'short bad good strong' ); 279 280 strength = wp.passwordStrength.meter( pass1, wp.passwordStrength.userInputDisallowedList(), pass1 ); 281 457 458 window.generatePassword = generatePassword; 459 467 /* 468 * We need to generate a password as soon as the Reset Password page is loaded, 469 * to avoid double clicking the button to retrieve the first generated password.themed-profiles.php https://gitlab.com/Gashler/sg | PHP | 331 lines
212 213 wp_enqueue_style( 'password-strength', plugins_url( 'theme-my-login/modules/themed-profiles/themed-profiles.css' ) ); 214Register.aspx https://github.com/alanning/MongoWSAT.git | ASP.NET | 167 lines
60 <asp:TextBox ID="Password" runat="server" TextMode="Password"></asp:TextBox> 61 <cc1:PasswordStrength ID="Password_PasswordStrength" runat="server" 62 TargetControlID="Password" MinimumNumericCharacters="1" 62 TargetControlID="Password" MinimumNumericCharacters="1" 63 PreferredPasswordLength="7" TextCssClass="passwordStrengthIndicator" 64 TextStrengthDescriptions="Very Poor;Weak;Average;Strong;Excellent" 67 <asp:RequiredFieldValidator ID="PasswordRequired" runat="server" 68 ControlToValidate="Password" ErrorMessage="Password is required." 69 ToolTip="Password is required." ValidationGroup="CreateUserWizard1"> 139 <asp:CompareValidator ID="PasswordCompare" runat="server" 140 ControlToCompare="Password" ControlToValidate="ConfirmPassword" 141 Display="Dynamic" 141 Display="Dynamic" 142 ErrorMessage="The Password and Confirmation Password must match." 143 ValidationGroup="CreateUserWizard1">Web.config http://enhancedpodcaster.googlecode.com/svn/trunk/ | ASP.NET | 153 lines
57 <clear/> 58 <add name="AspNetSqlMembershipProvider" type="System.Web.Security.SqlMembershipProvider, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" connectionStringName="ApplicationServices" enablePasswordRetrieval="false" enablePasswordReset="true" requiresQuestionAndAnswer="false" requiresUniqueEmail="false" passwordFormat="Hashed" maxInvalidPasswordAttempts="5" minRequiredPasswordLength="6" minRequiredNonalphanumericCharacters="0" passwordAttemptWindow="10" passwordStrengthRegularExpression="" applicationName="/"/> 59 </providers>forms.py https://gitlab.com/unofficial-mirrors/edx-platform | Python | 330 lines
22from student.models import CourseEnrollmentAllowed 23from util.password_policy_validators import validate_password_strength 24 25 26class PasswordResetFormNoActive(PasswordResetForm): 27 error_messages = { 166 _EMAIL_INVALID_MSG = _("A properly formatted e-mail is required") 167 _PASSWORD_INVALID_MSG = _("A valid password is required") 168 _NAME_TOO_SHORT_MSG = _("Your legal name must be a minimum of two characters long") 258 """Enforce password policies (if applicable)""" 259 password = self.cleaned_data["password"] 260 if ( 267 try: 268 validate_password_strength(password) 269 except ValidationError, err:reset.html https://gitlab.com/kaouech/theme | HTML | 207 lines
79 80 <script src="js/plugins/showpassword.1.0.min.js"></script> 81 <script src="js/plugins/nanogress.1.0.min.js"></script> 85 86 <script src="js/plugins/jquery.pwstrength.min.js"></script> 87 147 <div class="col-lg-12"> 148 <input class="form-control" type="password" placeholder="Your old password" id="fc-id-1" tabindex="1" /> 149 </div> 158 <div class="col-lg-12"> 159 <input class="form-control password" type="password" placeholder="Minium of 6 characters" id="fc-id-2-a" tabindex="2" data-indicator="pwindicator" /> 160 </div> 173 <label for="fc-id-3">Confirm:</label> 174 <a href="reset.html#" id="showpassword-trigger" class="underline">Show password</a> 175 </div>StrengthValidator.php https://gitlab.com/I-NOZex/quiz | PHP | 388 lines
1<?php 2namespace nenad\passwordStrength; 3 10 * StrengthValidator validates if the attribute value matches a specified 11 * set of password strength rules. It builds over the Yii StringValidator. 12 */ 21 const STRONG = 'strong'; 22 const RESET = 'reset'; // used for password reset 23 150 * @var array the target strength rule requirements that will 151 * be evaluated for displaying the strength meter 152 */ 236 'class' => 'yii\i18n\PhpMessageSource', 237 'basePath' => '@pwdstrength/messages' 238 ];theme.js.coffee https://gitlab.com/Petrohub/Petrohub_main | CoffeeScript | 231 lines
37 # -------------------------------------------------------------------------------------------------------------------- 38 # setting up naked password for password strength 39 $("input.nakedpassword").nakedPassword 39 $("input.nakedpassword").nakedPassword 40 path: "assets/images/plugins/naked_password/" 41 # --------------------------------------------------------------------------------------------------------------------Customer_New.aspx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 263 lines
39 lblUserName.Text = GetString("Customers_Edit.UserName"); 40 lblPassword1.Text = GetString("Customer_Edit_Login_Edit.lblPassword1"); 41 lblPassword2.Text = GetString("Customer_Edit_Login_Edit.lblPassword2"); 42 rqvUserName.ErrorMessage = GetString("Customer_Edit_Login_Edit.rqvUserName"); 43 rqvPassword2.ErrorMessage = GetString("Customer_Edit_Login_Edit.rqvPassword2"); 44 btnOk.Text = GetString("General.OK"); 148 errorMessage = new Validator().NotEmpty(txtUserName.Text.Trim(), GetString("Customer_Edit_Login_Edit.rqvUserName")) 149 .NotEmpty(passStrength.Text.Trim(), GetString("Customer_Edit_Login_Edit.rqvPassword1")) 150 .NotEmpty(txtPassword2.Text.Trim(), GetString("Customer_Edit_Login_Edit.rqvPassword2")).Result; 158 // Compare passwords 159 if ((errorMessage == "") && (passStrength.Text != txtPassword2.Text)) 160 { 209 ui.SetValue("UserEnabled", true); 210 UserInfoProvider.SetPassword(ui, passStrength.Text); 211DigestMembershipProvider.cs https://github.com/mbmccormick/Ximura.git | C# | 226 lines
65 66 public override bool ChangePassword(string username, string oldPassword, string newPassword) 67 { 70 71 public override bool ChangePasswordQuestionAndAnswer(string username, string password, string newPasswordQuestion, string newPasswordAnswer) 72 { 76 public override MembershipUser CreateUser(string username, string password, 77 string email, string passwordQuestion, string passwordAnswer, 78 bool isApproved, object providerUserKey, out MembershipCreateStatus status) 183 /// </summary> 184 public override MembershipPasswordFormat PasswordFormat 185 { 190 191 public override string PasswordStrengthRegularExpression 192 {install.php https://bitbucket.org/jstroschein/wordpress-3.5.1-clean.git | PHP | 256 lines
88 $user_name = isset($_POST['user_name']) ? trim( stripslashes( $_POST['user_name'] ) ) : 'admin'; 89 $admin_password = isset($_POST['admin_password']) ? trim( stripslashes( $_POST['admin_password'] ) ) : ''; 90 $admin_email = isset( $_POST['admin_email'] ) ? trim( stripslashes( $_POST['admin_email'] ) ) : ''; 117 <th scope="row"> 118 <label for="admin_password"><?php _e('Password, twice'); ?></label> 119 <p><?php _e('A password will be automatically generated for you if you leave this blank.'); ?></p> 122 <input name="admin_password" type="password" id="pass1" size="25" value="" /> 123 <p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p> 124 <div id="pass-strength-result"><?php _e('Strength indicator'); ?></div> 194 $admin_password = isset($_POST['admin_password']) ? $_POST['admin_password'] : ''; 195 $admin_password_check = isset($_POST['admin_password2']) ? $_POST['admin_password2'] : ''; 196 $admin_email = isset( $_POST['admin_email'] ) ?trim( stripslashes( $_POST['admin_email'] ) ) : ''; 206 $error = true; 207 } elseif ( $admin_password != $admin_password_check ) { 208 // TODO: poka-yoketest_forms.py https://gitlab.com/eVotUM/webapp | Python | 229 lines
44 'username': 'member', 45 'password': 'password' 46 } 48 'username': 'responsible', 49 'password': 'password' 50 } 89 num_members = 10 90 strength = ElectoralAction.Strength.SIMPLE 91 form = SecureActionKeysForm( 91 form = SecureActionKeysForm( 92 num_members=num_members, strength=strength, 93 elec_proc_id=1 99 num_members = 10 100 strength = ElectoralAction.Strength.STRONG 101 form = SecureActionKeysForm(reset.finish.html https://gitlab.com/pascalgrimaud/jhipster-test-gitlabci | HTML | 74 lines
29 <label class="control-label" for="password" data-translate="global.form.newpassword">New password</label> 30 <input type="password" class="form-control" id="password" name="password" placeholder="{{'global.form.newpassword.placeholder' | translate}}" 31 ng-model="vm.resetAccount.password" ng-minlength=4 ng-maxlength=50 required> 41 <p class="help-block" 42 ng-show="form.password.$error.maxlength" data-translate="global.messages.validate.newpassword.maxlength"> 43 Your password cannot be longer than 50 characters. 45 </div> 46 <password-strength-bar password-to-check="vm.resetAccount.password"></password-strength-bar> 47 </div> 50 <label class="control-label" for="confirmPassword" data-translate="global.form.confirmpassword">New password confirmation</label> 51 <input type="password" class="form-control" id="confirmPassword" name="confirmPassword" placeholder="{{'global.form.confirmpassword.placeholder' | translate}}" 52 ng-model="vm.confirmPassword" ng-minlength=4 ng-maxlength=50 required> 54 <p class="help-block" 55 ng-show="form.confirmPassword.$error.required" data-translate="global.messages.validate.confirmpassword.required"> 56 Your password confirmation is required.network_properties.cc https://github.com/chromium/chromium.git | C++ | 140 lines
19 security(onc::wifi::kSecurityNone), 20 signal_strength(0), 21 auto_connect(false), 43 wifi.Set(onc::wifi::kSecurity, security); 44 wifi.Set(onc::wifi::kSignalStrength, static_cast<int>(signal_strength)); 45 97 ssid = *ssid_ptr; 98 const std::string* password_ptr = wifi->FindString(onc::wifi::kPassphrase); 99 if (password_ptr) 99 if (password_ptr) 100 password = *password_ptr; 101YAFMembershipPassThru.cs https://github.com/vzrus/YetAnotherForumExtraDataLayers.git | C# | 494 lines
210 /// </returns> 211 public override bool ChangePassword(string username, string oldPassword, string newPassword) 212 { 212 { 213 return this._realProvider.ChangePassword(username, oldPassword, newPassword); 214 } 233 /// </returns> 234 public override bool ChangePasswordQuestionAndAnswer(string username, string password, string newPasswordQuestion, string newPasswordAnswer) 235 { 235 { 236 return this._realProvider.ChangePasswordQuestionAndAnswer(username, password, newPasswordQuestion, newPasswordAnswer); 237 } 277 { 278 return this._realProvider.CreateUser(username, password, email, passwordQuestion, passwordAnswer, isApproved, providerUserKey, out status); 279 }install.php https://github.com/chopsuei3/oscc.git | PHP | 256 lines
88 $user_name = isset($_POST['user_name']) ? trim( wp_unslash( $_POST['user_name'] ) ) : ''; 89 $admin_password = isset($_POST['admin_password']) ? trim( wp_unslash( $_POST['admin_password'] ) ) : ''; 90 $admin_email = isset( $_POST['admin_email'] ) ? trim( wp_unslash( $_POST['admin_email'] ) ) : ''; 117 <th scope="row"> 118 <label for="admin_password"><?php _e('Password, twice'); ?></label> 119 <p><?php _e('A password will be automatically generated for you if you leave this blank.'); ?></p> 122 <input name="admin_password" type="password" id="pass1" size="25" value="" /> 123 <p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p> 124 <div id="pass-strength-result"><?php _e('Strength indicator'); ?></div> 194 $admin_password = isset($_POST['admin_password']) ? wp_unslash( $_POST['admin_password'] ) : ''; 195 $admin_password_check = isset($_POST['admin_password2']) ? wp_unslash( $_POST['admin_password2'] ) : ''; 196 $admin_email = isset( $_POST['admin_email'] ) ?trim( wp_unslash( $_POST['admin_email'] ) ) : ''; 206 $error = true; 207 } elseif ( $admin_password != $admin_password_check ) { 208 // TODO: poka-yokeSipCommandInterface.java https://github.com/semiecho/android_frameworks_base.git | Java | 403 lines
60 61 public void changeBarringPassword(String facility, String oldPwd, 62 String newPwd, Message result) { 143 144 public void getSignalStrength (Message result) { 145 } 195 196 public void setupDefaultPDP(String apn, String user, String password, 197 Message result) { 203 public void setupDataCall(String radioTechnology, String profile, 204 String apn, String user, String password, String authType, 205 String ipVersion, 270 271 public void queryFacilityLock (int slot, String aid, String facility, String password, int serviceClass, 272 Message response) {0001_initial.py https://github.com/philippWassibauer/Maptales.git | Python | 173 lines
102 'last_name': ('django.db.models.fields.CharField', [], {'max_length': '30', 'blank': 'True'}), 103 'password': ('django.db.models.fields.CharField', [], {'max_length': '128'}), 104 'user_permissions': ('django.db.models.fields.related.ManyToManyField', [], {'to': "orm['auth.Permission']", 'blank': 'True'}), 135 'reflection_size': ('django.db.models.fields.FloatField', [], {'default': '0'}), 136 'reflection_strength': ('django.db.models.fields.FloatField', [], {'default': '0.59999999999999998'}), 137 'sharpness': ('django.db.models.fields.FloatField', [], {'default': '1.0'}),tls_srp.c https://bitbucket.org/freebsd/freebsd-base.git | C | 456 lines
79 80 s->srp_ctx.strength = ctx->srp_ctx.strength; 81 418 419int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password) 420{ 420{ 421 return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD, 0, password); 422} 423 424int SSL_CTX_set_srp_strength(SSL_CTX *ctx, int strength) 425{ 425{ 426 return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH, strength, 427 NULL);cryptLib.cfc https://bitbucket.org/farcry/core.git | ColdFusion CFScript | 95 lines
32 33 <cfreturn findHash(hashedPassword=arguments.hashedPassword).passwordMatch(password=arguments.password,hashedPassword=arguments.hashedPassword) /> 34 </cffunction> 42 43 <cfreturn not oHash.matchesHashFormat(arguments.hashedPassword) or not oHash.passwordMatch(password=arguments.password,hashedPassword=arguments.hashedPassword,bCheckHashStrength=true) /> 44 </cffunction> 45 46 <cffunction name="getDefaultHashName" access="public" returntype="PasswordHash" output="false" hint="Return the alias of the default algorithm used to encoded passwords"> 47 78 79 <cffunction name="findHash" access="public" output="false" returntype="PasswordHash" hint="Returns a PasswordHash component that can verify this hashed password"> 80 <cfargument name="hashedPassword" type="string" hint="Hashed password string" required="true" /> 90 </cfloop> 91 <cfthrow message="Password hash does not match any available hash formats" detail="Hashed password did not match any available PasswordHash objects. Did you override or delete NullHash.cfc?" /> 92 </cffunction>UserEditTest.php https://gitlab.com/reasonat/test8 | PHP | 140 lines
32 $this->drupalPostForm("user/" . $user1->id() . "/edit", $edit, t('Save')); 33 $this->assertText(t("The specified passwords do not match."), 'Typing mismatched passwords displays an error message.'); 34 37 $this->drupalPostForm("user/" . $user1->id() . "/edit", $edit, t('Save')); 38 $this->assertText(t("The specified passwords do not match."), 'Typing mismatched passwords displays an error message.'); 39 71 72 // Test that the password strength indicator displays. 73 $config = $this->config('user.settings'); 77 $this->drupalPostForm("user/" . $user1->id() . "/edit", $edit, t('Save')); 78 $this->assertRaw(t('Password strength:'), 'The password strength indicator is displayed.'); 79 81 $this->drupalPostForm("user/" . $user1->id() . "/edit", $edit, t('Save')); 82 $this->assertNoRaw(t('Password strength:'), 'The password strength indicator is not displayed.'); 83lang_sql.php https://gitlab.com/phamngsinh/baitaplon_sinhvien | PHP | 185 lines
3$lang['L_IMPORT_NOTABLE']="Es isch kei Tabälle für de Import ausgwählt!"; 4$lang['L_PASSWORD_STRENGTH']="Password strength"; 5$lang['L_SQL_WARNING']="D Uusfüerig vo SQL-Befähl cha Date manipuliere! Dr Autor übernimmt kei Haftig bi Dateverlüscht."; 180$lang['L_USERNAME']="Username"; 181$lang['L_PASSWORD']="Password"; 182$lang['L_PASSWORD_REPEAT']="Password (repeat)";Attachments.java https://gitlab.com/g5863/che-banca-proposta | Java | 403 lines
132 * Password is optional. <br> 133 * If password is not null it will create a zip attachment with password. 134 * 135 * @param zipName 136 * @param password 137 * @param attachments 149 * @param attachments 150 * @param password 151 * @return 205 parameters.setCompressionLevel(Zip4jConstants.DEFLATE_LEVEL_NORMAL); 206 if (password != null && !password.isEmpty()) { 207 parameters.setEncryptFiles(true); 209 parameters.setAesKeyStrength(Zip4jConstants.AES_STRENGTH_256); 210 parameters.setPassword(password); 211 }core.css https://github.com/claudinec/drupalmel.git | CSS | 655 lines
221.page-content .password-description, 222.page-content .password-strength, 223.page-content div.description,utils.py https://github.com/dolph/keystone.git | Python | 270 lines
158 """Hash a password. Hard.""" 159 password_utf8 = trunc_password(password).encode('utf-8') 160 if passlib.hash.sha512_crypt.identify(password_utf8): 166 167def ldap_hash_password(password): 168 """Hash a password. Hard.""" 168 """Hash a password. Hard.""" 169 password_utf8 = trunc_password(password).encode('utf-8') 170 h = passlib.hash.ldap_salted_sha1.encrypt(password_utf8) 176 return False 177 password_utf8 = trunc_password(password).encode('utf-8') 178 return passlib.hash.ldap_salted_sha1.verify(password_utf8, hashed) 189 return False 190 password_utf8 = trunc_password(password).encode('utf-8') 191 return passlib.hash.sha512_crypt.verify(password_utf8, hashed)install.php https://github.com/muskmelon/Greemo.git | PHP | 264 lines
86 $user_name = isset($_POST['user_name']) ? trim( stripslashes( $_POST['user_name'] ) ) : 'admin'; 87 $admin_password = isset($_POST['admin_password']) ? trim( stripslashes( $_POST['admin_password'] ) ) : ''; 88 $admin_email = isset( $_POST['admin_email'] ) ? trim( stripslashes( $_POST['admin_email'] ) ) : ''; 115 <th scope="row"> 116 <label for="admin_password"><?php _e('Password, twice'); ?></label> 117 <p><?php _e('A password will be automatically generated for you if you leave this blank.'); ?></p> 120 <input name="admin_password" type="password" id="pass1" size="25" value="" /> 121 <p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p> 122 <div id="pass-strength-result"><?php _e('Strength indicator'); ?></div> 186 $admin_password = isset($_POST['admin_password']) ? $_POST['admin_password'] : ''; 187 $admin_password_check = isset($_POST['admin_password2']) ? $_POST['admin_password2'] : ''; 188 $admin_email = isset( $_POST['admin_email'] ) ?trim( stripslashes( $_POST['admin_email'] ) ) : ''; 255 bad: "<?php echo esc_js( __( 'Weak' ) ); ?>", 256 good: "<?php echo esc_js( _x( 'Medium', 'password strength' ) ); ?>", 257 strong: "<?php echo esc_js( __( 'Strong' ) ); ?>",SecretKeyFactoryTest.java https://github.com/MIPS/libcore.git | Java | 170 lines
49 50 // PBEKeySpecs password only constructor 51 try { 63 try { 64 KeySpec ks = new PBEKeySpec(PASSWORD); 65 factory.generateSecret(ks); 84 try { 85 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS); 86 factory.generateSecret(ks); 109 public void test_PBKDF2_b3059950() throws Exception { 110 test_PBKDF2(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, 111 new byte[] { 124 public void test_PBKDF2_rfc3211_64() throws Exception { 125 char[] password = "password".toCharArray(); 126 byte[] salt = new byte[] {aes-crypto-stream.js https://github.com/gildas-lormeau/zip.js.git | JavaScript | 278 lines
69 signed, 70 strength: strength - 1, 71 pending: new Uint8Array(0) 77 if (aesCrypto.password) { 78 const password = aesCrypto.password; 79 aesCrypto.password = null; 202 const passwordVerificationKey = decrypt.keys.passwordVerification; 203 if (passwordVerificationKey[0] != passwordVerification[0] || passwordVerificationKey[1] != passwordVerification[1]) { 204 throw new Error(ERR_INVALID_PASSWORD); 214async function createKeys(target, password, salt) { 215 const encodedPassword = encodeText(password); 216 const basekey = await importKey(RAW_FORMAT, encodedPassword, BASE_KEY_ALGORITHM, false, DERIVED_BITS_USAGE); 221 authentication: toBits(codecBytes, subarray(compositeKey, KEY_LENGTH[target.strength], KEY_LENGTH[target.strength] * 2)), 222 passwordVerification: subarray(compositeKey, KEY_LENGTH[target.strength] * 2) 223 };util.py https://github.com/VUIIS/pyxnat_notes.git | Python | 391 lines
37 'dcmPatientName', 'session_type', 'modality', 38 'UID', 'coil', 'fieldStrength', 'marker', 39 'stabilization', 'studyType', 'patientID', 49 'validation_status', 'validation_date', 50 'validation_notes', 'coil', 'fieldStrength', 'marker', 51 'stabilization', 'orientation', 'scanTime', 64def xnat(cfg=os.path.join(os.path.expanduser('~'), '.xnat.cfg'), server_url=None, 65 username=None, password=None, cache=os.path.join(os.path.expanduser('~'), '.xnat.cache')): 66 """Initialize and test xnat connection from a previously-stored cfg file 75 user: [your user name] 76 password: [your password] 77 server: [your xnat server] 82 user name 83 password: str 84 user passwordsettings-page.php https://gitlab.com/najomie/fit-hippie | PHP | 162 lines
15?> 16 <p><?php esc_html_e( 'These are advanced settings that may be utilized to further strengthen the security of your WordPress site.', 'better-wp-security' ); ?></p> 17<?php 102 <td> 103 <p><?php esc_html_e( 'WordPress\' XML-RPC feature allows hundreds of username and password guesses per request. Use the recommended "Block" setting below to prevent attackers from exploiting this feature.', 'better-wp-security' ); ?></p> 104 <?php $form->add_select( 'allow_xmlrpc_multiauth', $allow_xmlrpc_multiauth_options ); ?>pwstrength.js https://gitlab.com/muhsen92/Mobile-Apps-Generator | JavaScript | 315 lines
4/* 5* jQuery Password Strength plugin for Twitter Bootstrap 6* 20 errorMessages: { 21 password_to_short: "The Password is too short", 22 same_as_username: "Your password cannot be the same as your username" 73 lenScore = (lenScore + score); 74 options.errors.push(options.errorMessages.password_to_short); 75 } 116 setProgressBar = function ($el, score) { 117 var options = $el.data("pwstrength"), 118 progressbar = options.progressbar, 122 if (options.viewports.verdict) { 123 $verdict = $(options.viewports.verdict).find(".password-verdict"); 124 } else {SipCommandInterface.java https://gitlab.com/brian0218/rk3066_r-box_android4.2.2_sdk | Java | 424 lines
60 61 public void changeBarringPassword(String facility, String oldPwd, 62 String newPwd, Message result) { 146 147 public void getSignalStrength (Message result) { 148 } 190 public void setupDataCall(String radioTechnology, String profile, 191 String apn, String user, String password, String authType, 192 String protocol, Message result) { 263 @Override 264 public void queryFacilityLock(String facility, String password, 265 int serviceClass, Message response) { 268 @Override 269 public void queryFacilityLockForApp(String facility, String password, 270 int serviceClass, String appId, Message response) {es.js https://gitlab.com/t3rr0rz0n3/translations | JavaScript | 310 lines
31 "Cancel": "", 32 "Change password": "", 33 "Clear all current filters (show all notes in the board)": "", 74 "Enable sharing": "", 75 "Enter a new password": "", 76 "Enter a passphrase": "", 156 "Passphrase": "", 157 "Passphrase strength: ": "", 158 "Password": "", 158 "Password": "", 159 "Passwords": "", 160 "Paste this into another note to link to this one": "", 225 "That passphrase is making me cringe.": "", 226 "The current username/password you entered do not match the currently logged in user's": "", 227 "There was a problem accepting that invite. Please try again.": "",OpenIDUserRequiredData.ascx https://bitbucket.org/kudutest2/kenticogit.git | ASP.NET | 111 lines
2 Inherits="CMSWebParts_Membership_OpenID_OpenIDUserRequiredData" CodeFile="~/CMSWebParts/Membership/OpenID/OpenIDUserRequiredData.ascx.cs" %> 3<%@ Register Src="~/CMSModules/Membership/FormControls/Passwords/PasswordStrength.ascx" TagName="PasswordStrength" 4 TagPrefix="cms" %> 33 <td> 34 <cms:LocalizedLabel ID="lblPassword" AssociatedControlID="txtPassword" ResourceString="general.password" 35 DisplayColon="true" EnableViewState="false" runat="server" /> 37 <td> 38 <cms:CMSTextBox ID="txtPassword" TextMode="Password" runat="server" /> 39 </td> 78 <td class="FieldLabel FieldLabelTop"> 79 <cms:LocalizedLabel ID="lblPasswordNew" AssociatedControlID="passStrength" ResourceString="general.password" 80 DisplayColon="true" EnableViewState="false" runat="server" /> 82 <td> 83 <cms:PasswordStrength runat="server" ID="passStrength" TextBoxClass="" ValidationGroup="OpenIDNewUser" /> 84 </td>FacebookUsersRequiredData.ascx https://bitbucket.org/kudutest2/kenticogit.git | ASP.NET | 111 lines
2 Inherits="CMSWebParts_Membership_FacebookConnect_FacebookUsersRequiredData" CodeFile="~/CMSWebParts/Membership/FacebookConnect/FacebookUsersRequiredData.ascx.cs" %> 3<%@ Register Src="~/CMSModules/Membership/FormControls/Passwords/PasswordStrength.ascx" TagName="PasswordStrength" 4 TagPrefix="cms" %> 33 <td> 34 <cms:LocalizedLabel ID="lblPassword" AssociatedControlID="txtPassword" ResourceString="general.password" 35 DisplayColon="true" EnableViewState="false" runat="server" /> 37 <td> 38 <cms:CMSTextBox ID="txtPassword" TextMode="Password" runat="server" /> 39 </td> 78 <td> 79 <cms:LocalizedLabel ID="lblPasswordNew" AssociatedControlID="passStrength" ResourceString="general.password" 80 DisplayColon="true" EnableViewState="false" runat="server" /> 82 <td> 83 <cms:PasswordStrength runat="server" ID="passStrength" TextBoxClass="" ValidationGroup="NewFacebookUser"/> 84 </td>Customer_Edit_General.aspx https://bitbucket.org/kudutest2/kenticogit.git | ASP.NET | 283 lines
14 TagName="DiscountLevelSelector" TagPrefix="cms" %> 15<%@ Register Src="~/CMSModules/Membership/FormControls/Passwords/PasswordStrength.ascx" TagName="PasswordStrength" 16 TagPrefix="cms" %> 153 <td class="FieldLabel FieldLabelTop"> 154 <asp:Label runat="server" ID="lblPassword1" EnableViewState="false" /> 155 </td> 156 <td> 157 <cms:PasswordStrength runat="server" ID="passStrength" AllowEmpty="true"/> 158 </td> 166 <td> 167 <cms:CMSTextBox ID="txtPassword2" runat="server" CssClass="TextBoxField" TextMode="Password" 168 MaxLength="100" EnableViewState="false" /> 170 <td> 171 <cms:CMSRequiredFieldValidator ID="rqvPassword2" runat="server" ControlToValidate="txtPassword2" 172 ValidationGroup="Login" EnableViewState="false" />user.php https://github.com/IlchCMS/Ilch-1.1.git | PHP | 374 lines
81 } 82 return md5($plainPassword); 83} 84 85function user_pw_check($plainPassword, &$passwordHash, $userId = false) { 86 if (version_compare(PHP_VERSION, '5.0') !== -1) { 88 $correct = $pwCrypt->checkPasswd($plainPassword, $passwordHash); 89 if ($correct && $userId !== false && $pwCrypt->checkHashStrength($passwordHash)) { 90 $passwordHash = $pwCrypt->cryptPasswd($plainPassword); 91 if ($passwordHash) { 92 db_query('UPDATE `prefix_user` SET `pass` = "' . $passwordHash . '" WHERE `id` = ' . $userId); 93 } 96 } 97 return md5($plainPassword) === $passwordHash; 98}lang_sql.php https://gitlab.com/phamngsinh/baitaplon_sinhvien | PHP | 188 lines
3$lang['L_IMPORT_NOTABLE']="Không có bảng được lựa chọn nhập vào (import)!"; 4$lang['L_PASSWORD_STRENGTH']="Password strength"; 5$lang['L_SQL_WARNING']="Sự thực hiện những câu lệnh SQL có thể thao tác vào dữ liệu. Cẩn thận! Tác giả không chấp nhận đền bù bất kỳ thiệt hại nào nếu dữ liệu bị hư hại hay bị mất."; 183$lang['L_USERNAME']="Username"; 184$lang['L_PASSWORD']="Password"; 185$lang['L_PASSWORD_REPEAT']="Password (repeat)";SimplePasswordStrengthChecker.java https://bitbucket.org/cprenzberg/wildfly.git | Java | 384 lines
37import org.jboss.as.domain.management.security.password.PasswordStrengthCheckResult; 38import org.jboss.as.domain.management.security.password.PasswordStrengthChecker; 39import org.jboss.as.domain.management.security.password.RegexRestriction; 44 */ 45public class SimplePasswordStrengthChecker implements PasswordStrengthChecker { 46 100 101 public SimplePasswordStrengthChecker(final List<PasswordRestriction> initRestrictions, final Dictionary dictionary, 102 final Keyboard keyboard) { 113 * 114 * @see org.jboss.as.domain.management.security.password.PasswordStrengthChecker#check(java.lang.String, java.util.List) 115 */ 116 @Override 117 public PasswordStrengthCheckResult check(String password, List<PasswordRestriction> restictions) { 118 try {PdfCopyFields.java https://gitlab.com/essere.lab.public/qualitas.class-corpus | Java | 237 lines
126 * @param userPassword the user password. Can be null or empty 127 * @param ownerPassword the owner password. Can be null or empty 128 * @param permissions the user permissions 131 */ 132 public void setEncryption(byte userPassword[], byte ownerPassword[], int permissions, boolean strength128Bits) throws DocumentException { 133 fc.setEncryption(userPassword, ownerPassword, permissions, strength128Bits ? PdfWriter.STANDARD_ENCRYPTION_128 : PdfWriter.STANDARD_ENCRYPTION_40); 137 * Sets the encryption options for this document. The userPassword and the 138 * ownerPassword can be null or have zero length. In this case the ownerPassword 139 * is replaced by a random string. The open permissions for the document can be 143 * @param strength true for 128 bit key length. false for 40 bit key length 144 * @param userPassword the user password. Can be null or empty 145 * @param ownerPassword the owner password. Can be null or empty 149 public void setEncryption(boolean strength, String userPassword, String ownerPassword, int permissions) throws DocumentException { 150 setEncryption(DocWriter.getISOBytes(userPassword), DocWriter.getISOBytes(ownerPassword), permissions, strength); 151 }scripts.php https://github.com/strangerstudios/paid-memberships-pro.git | PHP | 145 lines
67 plugins_url( 'js/pmpro-login.js', dirname(__FILE__) ), 68 array( 'jquery', 'password-strength-meter' ), 69 PMPRO_VERSION ); 72 * Filter to allow weak passwords on the 73 * change password and reset password forms. 74 * At this time, this only disables the JS check on the frontend. 78 * 79 * @param bool $allow_weak_passwords Whether to allow weak passwords. 80 */ 80 */ 81 $allow_weak_passwords = apply_filters( 'pmpro_allow_weak_passwords', false ); 82 84 'pmpro_login_page' => 'changepassword', 85 'strength_indicator_text' => __( 'Strength Indicator', 'paid-memberships-pro' ), 86 'allow_weak_passwords' => $allow_weak_passwords ) );register.component.html https://gitlab.com/bourd0n/zakupki | HTML | 131 lines
76 <label class="form-control-label" for="password" jhiTranslate="global.form.newpassword">New password</label> 77 <input type="password" class="form-control" id="password" name="password" #password="ngModel" placeholder="{{'global.form.newpassword.placeholder' | translate}}" 78 [(ngModel)]="registerAccount.password" minlength=4 maxlength=50 required> 78 [(ngModel)]="registerAccount.password" minlength=4 maxlength=50 required> 79 <div *ngIf="password.dirty && password.invalid"> 80 <small class="form-text text-danger" *ngIf="password.errors.required" 92 </div> 93 <jhi-password-strength-bar [passwordToCheck]="registerAccount.password"></jhi-password-strength-bar> 94 </div> 96 <label class="form-control-label" for="confirmPassword" jhiTranslate="global.form.confirmpassword">New password confirmation</label> 97 <input type="password" class="form-control" id="confirmPassword" name="confirmPassword" #confirmPasswordInput="ngModel" placeholder="{{'global.form.confirmpassword.placeholder' | translate}}" 98 [(ngModel)]="confirmPassword" minlength=4 maxlength=50 required> 119 <span jhiTranslate="global.messages.info.authenticated.prefix">If you want to </span> 120 <a class="alert-link" (click)="openLogin()" jhiTranslate="global.messages.info.authenticated.link">sign in</a><span jhiTranslate="global.messages.info.authenticated.suffix">, you can try the default accounts:<br/>- Administrator (login="admin" and password="admin") <br/>- User (login="user" and password="user").</span> 121 </div>encryptalltest.php https://gitlab.com/wuhang2003/core | PHP | 335 lines
220 $encryptAll->expects($this->once())->method('setupUserFS')->with('user1'); 221 $encryptAll->expects($this->once())->method('generateOneTimePassword')->with('user1')->willReturn('password'); 222 $this->setupUser->expects($this->once())->method('setupUser')->with('user1', 'password'); 225 226 $userPasswords = $this->invokePrivate($encryptAll, 'userPasswords'); 227 325 public function testGenerateOneTimePassword() { 326 $password = $this->invokePrivate($this->encryptAll, 'generateOneTimePassword', ['user1']); 327 $this->assertTrue(is_string($password)); 329 330 $userPasswords = $this->invokePrivate($this->encryptAll, 'userPasswords'); 331 $this->assertSame(1, count($userPasswords)); 331 $this->assertSame(1, count($userPasswords)); 332 $this->assertSame($password, $userPasswords['user1']); 333 }main.css https://gitlab.com/atomfrede/jhipster-ci-example-gradle | CSS | 334 lines
184/* ========================================================================== 185start Password strength bar style 186========================================================================== */ 186========================================================================== */ 187ul#strengthBar { 188 display:inline;wifi_utils_test.js https://gitlab.com/lcuguen/gaia | JavaScript | 439 lines
154 identity = dialog.querySelector('input[name=identity]'); 155 password = dialog.querySelector('input[name=password]'); 156 authPhase2 = dialog.querySelector('li.auth-phase2 select'); 176 assert.equal(identity.parentNode.style.display, 'none'); 177 assert.equal(password.parentNode.style.display, 'block'); 178 assert.equal(authPhase2.parentNode.parentNode.style.display, 'none'); 186 assert.equal(identity.parentNode.style.display, 'none'); 187 assert.equal(password.parentNode.style.display, 'none'); 188 assert.equal(authPhase2.parentNode.parentNode.style.display, 'none'); 216 assert.equal(identity.parentNode.style.display, 'block'); 217 assert.equal(password.parentNode.style.display, 'block'); 218 assert.equal(authPhase2.parentNode.parentNode.style.display, 'block'); 225 assert.equal(identity.parentNode.style.display, 'none'); 226 assert.equal(password.parentNode.style.display, 'none'); 227 });gebo_forms.js https://gitlab.com/ergouge/tea | JavaScript | 470 lines
45 46 //* password strength checker 47 gebo_pass_check.init(); 454 455 //* password strength checker 456 gebo_pass_check = { 459 minimumChars: '6', 460 strengthScaleFactor: '0.8' 461 }, function (valid, complexity) {register.php https://gitlab.com/thongta/fituet | PHP | 430 lines
93 <label 94 for="signup_password"><?php _e( 'Choose a Password', 'buddypress' ); ?><?php _e( '(required)', 'buddypress' ); ?></label> 95 <?php 97 /** 98 * Fires and displays any member registration password errors. 99 * 102 do_action( 'bp_signup_password_errors' ); ?> 103 <input type="password" name="signup_password" id="signup_password" value="" 104 class="password-entry" <?php bp_form_field_attributes( 'password' ); ?>/> 108 <label 109 for="signup_password_confirm"><?php _e( 'Confirm Password', 'buddypress' ); ?><?php _e( '(required)', 'buddypress' ); ?></label> 110 <?php 117 do_action( 'bp_signup_password_confirm_errors' ); ?> 118 <input type="password" name="signup_password_confirm" id="signup_password_confirm" value="" 119 class="password-entry-confirm" <?php bp_form_field_attributes( 'password' ); ?>/>index.html.md https://gitlab.com/nick.volynkin/www-gitlab-com | Markdown | 139 lines
16in this list experience longer delays in receiving responses. We are actively [hiring](/jobs/) 17more Support Engineers to strengthen the team and provide support to the community. 18 76 77The key used to encode/decode PGP messages is stored in our Support Vault on 1Password. 78We only provide our public PGP key upon request because it makes collaborating muchpeloton.py https://gitlab.com/vitalii.dr/yt-dlp | Python | 221 lines
28 'id': '0e9653eb53544eeb881298c8d7a87b86', 29 'title': '20 min Chest & Back Strength', 30 'ext': 'mp4', 37 'duration': 1389, 38 'categories': ['Strength'], 39 'tags': ['Workout Mat', 'Light Weights', 'Medium Weights'], 77 def _login(self, video_id): 78 username, password = self._get_login_info() 79 if not (username and password): 85 'username_or_email': username, 86 'password': password, 87 'with_pubsub': Falsemail.py https://github.com/raminel/geraldo.git | Python | 371 lines
113 self.username = username or settings.EMAIL_HOST_USER 114 self.password = password or settings.EMAIL_HOST_PASSWORD 115 self.use_tls = (use_tls is not None) and use_tls or settings.EMAIL_USE_TLS 330 If auth_user is None, the EMAIL_HOST_USER setting is used. 331 If auth_password is None, the EMAIL_HOST_PASSWORD setting is used. 332 335 """ 336 connection = SMTPConnection(username=auth_user, password=auth_password, 337 fail_silently=fail_silently) 349 If auth_user is None, the EMAIL_HOST_USER setting is used. 350 If auth_password is None, the EMAIL_HOST_PASSWORD setting is used. 351 354 """ 355 connection = SMTPConnection(username=auth_user, password=auth_password, 356 fail_silently=fail_silently)RegistrationForm.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 1053 lines
103 { 104 return DataHelper.GetNotEmpty(this.GetValue("PasswordText"), ResHelper.LocalizeString("{$Webparts_Membership_RegistrationForm.Password$}")); 105 } 465 lblEmail.Text = this.EmailText; 466 lblPassword.Text = this.PasswordText; 467 lblConfirmPassword.Text = this.ConfirmPasswordText; 494 // WAI validation 495 lblPassword.AssociatedControlClientID = passStrength.InputClientID; 496 } 562 // Check whether password is same 563 if (passStrength.Text != txtConfirmPassword.Text) 564 { 569 570 if ((this.PasswordMinLength > 0) && (passStrength.Text.Length < this.PasswordMinLength)) 571 {LiveIDUsersRequiredData.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 546 lines
281 // WAI validation 282 lblPasswordNew.AssociatedControlClientID = passStrength.InputClientID; 283 } 368 369 string password = passStrength.Text.Trim(); 370 370 371 // If password is enabled to set, check it 372 if (plcPasswordNew.Visible && (errorMessage == String.Empty)) 377 } 378 else if (password != txtConfirmPassword.Text.Trim()) 379 { 439 { 440 UserInfoProvider.SetPassword(ui, password); 441OpenIDUserRequiredData.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 654 lines
140 /// <summary> 141 /// Gets or sets the value which enables abitity of new user to set password. 142 /// </summary> 151 SetValue("AllowFormsAuthentication", value); 152 plcPasswordNew.Visible = value; 153 } 168 SetValue("AllowExistingUser", value); 169 plcPasswordNew.Visible = value; 170 } 442 string siteName = CMSContext.CurrentSiteName; 443 string password = passStrength.Text; 444 451 } 452 else if (password != txtConfirmPassword.Text.Trim()) 453 {LinkedInUsersRequiredData.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 594 lines
353 // Try to authenticate user 354 UserInfo ui = UserInfoProvider.AuthenticateUser(txtUserName.Text, txtPassword.Text, CMSContext.CurrentSiteName); 355 395 396 string password = passStrength.Text; 397 400 { 401 if (String.IsNullOrEmpty(password)) 402 { 404 } 405 else if (password != txtConfirmPassword.Text.Trim()) 406 { 460 { 461 UserInfoProvider.SetPassword(ui, password); 462FacebookUsersRequiredData.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 553 lines
379 { 380 string password = passStrength.Text; 381 string currentSiteName = CMSContext.CurrentSiteName; 389 { 390 if (String.IsNullOrEmpty(password)) 391 { 393 } 394 else if (password != txtConfirmPassword.Text.Trim()) 395 { 395 { 396 errorMessage = GetString("webparts_membership_registrationform.passwordonotmatch"); 397 } 444 { 445 UserInfoProvider.SetPassword(ui, password); 446User_Edit_Password.aspx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 462 lines
54 { 55 ButtonSetPassword.Text = GetString("Administration-User_Edit_Password.SetPassword"); 56 LabelPassword.Text = GetString("Administration-User_Edit_Password.NewPassword"); 56 LabelPassword.Text = GetString("Administration-User_Edit_Password.NewPassword"); 57 LabelConfirmPassword.Text = GetString("Administration-User_Edit_Password.ConfirmPassword"); 58 this.chkSendEmail.Text = GetString("Administration-User_Edit_Password.SendEmail"); 87 { 88 passStrength.TextBoxAttributes.Add("value", hiddenPassword); 89 TextBoxConfirmPassword.Attributes.Add("value", hiddenPassword); 219 { 220 if (passStrength.Text != hiddenPassword) //password has been changed 221 { 281 this.passStrength.TextBoxAttributes.Add("value", hiddenPassword); 282 this.TextBoxConfirmPassword.Attributes.Add("value", hiddenPassword); 283 }ShoppingCartCheckRegistration.ascx https://bitbucket.org/kudutest2/kenticogit.git | ASP.NET | 393 lines
2 CodeFile="ShoppingCartCheckRegistration.ascx.cs" %> 3<%@ Register Src="~/CMSModules/Membership/FormControls/Passwords/PasswordStrength.ascx" 4 TagName="PasswordStrength" TagPrefix="cms" %> 36 <td> 37 <cms:CMSTextBox ID="txtPsswd1" runat="server" TextMode="password" CssClass="TextBoxField" 38 MaxLength="100" EnableViewState="false" /> 48 <td colspan="2"> 49 <asp:Panel ID="pnlPasswdRetrieval" runat="server" CssClass="LoginPanelPasswordRetrieval"> 50 <table cellpadding="0" cellspacing="0"> 52 <td> 53 <asp:Label ID="lblPasswdRetrieval" AssociatedControlID="txtPasswordRetrieval" runat="server" 54 EnableViewState="false" /> 195 <td> 196 <cms:PasswordStrength runat="server" ID="passStrength" /> 197 <div>CMS_AlternativeForm.sql https://bitbucket.org/kudutest2/kenticogit.git | SQL | 353 lines
1SET IDENTITY_INSERT [CMS_AlternativeForm] ON 2INSERT INTO [CMS_AlternativeForm] ([FormID], [FormDisplayName], [FormName], [FormClassID], [FormDefinition], [FormLayout], [FormGUID], [FormLastModified], [FormCoupledClassID]) VALUES (124, N'Registration form', N'RegistrationForm', 59, N'<form><field column="UserID" visible="false" /><field column="UserName" fieldcaption="User name"><settings><controlname>username</controlname></settings></field><field column="FirstName" fieldcaption="First name" minstringlength="1" validationerrormessage="Please enter some first name." /><field column="MiddleName" visible="false" /><field column="LastName" fieldcaption="Last name" minstringlength="1" validationerrormessage="Please enter some last name." /><field column="FullName" fieldcaption="Full name" visible="false" allowempty="false" /><field column="Email" minstringlength="5" validationerrormessage="Please enter some email."><settings><controlname>emailinput</controlname></settings></field><field column="UserPassword" fieldcaption="Password" minstringlength="2"><settings><controlname>passwordconfirmator</controlname><showstrength>True</showstrength></settings></field><field column="PreferredCultureCode" visible="false" /><field column="PreferredUICultureCode" visible="false" /><field column="UserEnabled" visible="false" defaultvalue="false" /><field column="UserIsEditor" visible="false" defaultvalue="false" /><field column="UserIsGlobalAdministrator" visible="false" defaultvalue="false" /><field column="UserIsExternal" visible="false" defaultvalue="false" /><field column="UserPasswordFormat" visible="false" /><field column="UserCreated" visible="false"><settings><editTime>false</editTime></settings></field><field column="LastLogon" visible="false"><settings><editTime>false</editTime></settings></field><field column="UserStartingAliasPath" visible="false" /><field column="UserGUID" visible="false" /><field column="UserLastModified" visible="false"><settings><editTime>false</editTime></settings></field><field column="UserLastLogonInfo" visible="false" /><field column="UserIsHidden" visible="false" defaultvalue="false" /><field column="UserVisibility" visible="false" /><field column="UserSettingsID" visible="false" /><field column="UserNickName" visible="false" /><field column="UserPicture" visible="false" /><field column="UserSignature" visible="false" /><field column="UserURLReferrer" visible="false" /><field column="UserCampaign" visible="false" /><field column="UserMessagingNotificationEmail" visible="false" /><field column="UserCustomData" visible="false" /><field column="UserRegistrationInfo" visible="false" /><field column="UserPreferences" visible="false" /><field column="UserActivationDate" visible="false" /><field column="UserActivatedByUserID" visible="false" /><field column="UserTimeZoneID" fieldcaption="Time zone" visible="false"><settings><controlname>timezoneselector</controlname></settings></field><field column="UserAvatarID" fieldcaption="Avatar" visible="false"><settings><controlname>useravatarselector</controlname></settings></field><field column="UserBadgeID" visible="false" /><field column="UserShowSplashScreen" visible="false" /><field column="UserActivityPoints" visible="false" /><field column="UserForumPosts" visible="false" /><field column="UserBlogComments" visible="false" /><field column="UserGender" fieldcaption="Gender"><settings><controlname>radiobuttonscontrol</controlname><repeatdirection>horizontal</repeatdirection><options><item value="1" text="{$general.male$}" /><item value="2" text="{$general.female$}" /></options></settings></field><field column="UserDateOfBirth" fieldcaption="Date of birth" visible="false"><settings><EditTime>false</EditTime></settings></field><field column="UserMessageBoardPosts" visible="false" /><field column="UserSettingsUserGUID" visible="false" /><field column="UserSettingsUserID" visible="false" /><field column="UserBlogPosts" visible="false" /></form>', N'<table class="CustomRegistrationForm"> 3 <tbody> 29 <td style="vertical-align: top; padding-top: 6px;" valign="top"> 30 <span class="EditingFormLabel">$$label:UserPassword$$</span> 31 <div style="margin-top: 44px;"> 31 <div style="margin-top: 44px;"> 32 <span class="EditingFormLabel">Confirm password:</span></div> 33 </td> 34 <td> 35 $$input:UserPassword$$$$validation:UserPassword$$</td> 36 </tr> 44</table>', '005a6c1c-a442-4229-ba5c-80f423dea704', '20111021 17:17:12', 1768) 45INSERT INTO [CMS_AlternativeForm] ([FormID], [FormDisplayName], [FormName], [FormClassID], [FormDefinition], [FormLayout], [FormGUID], [FormLastModified], [FormCoupledClassID]) VALUES (125, N'Display profile', N'DisplayProfile', 59, N'<form><field column="UserID" visible="false" dependsonanotherfield="false" /><field column="UserName" fieldcaption="Name" dependsonanotherfield="false"><settings><controlname>viewsecuretext</controlname></settings></field><field column="FirstName" visible="false" dependsonanotherfield="false" /><field column="MiddleName" visible="false" dependsonanotherfield="false" /><field column="LastName" visible="false" dependsonanotherfield="false" /><field column="FullName" fieldcaption="Full name" dependsonanotherfield="false"><settings><controlname>viewsecuretext</controlname></settings></field><field column="Email" visibility="authenticated" dependsonanotherfield="false"><settings><controlname>labelcontrol</controlname><FilterMode /><FilterEnabled /></settings></field><field column="UserPassword" visible="false" dependsonanotherfield="false" /><field column="PreferredCultureCode" visible="false" dependsonanotherfield="false" /><field column="PreferredUICultureCode" visible="false" dependsonanotherfield="false" /><field column="UserEnabled" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserIsEditor" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserIsGlobalAdministrator" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserIsExternal" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserPasswordFormat" visible="false" dependsonanotherfield="false" /><field column="UserCreated" fieldcaption="Created" dependsonanotherfield="false"><settings><controlname>viewdate</controlname></settings></field><field column="LastLogon" visible="false" dependsonanotherfield="false"><settings><editTime>false</editTime></settings></field><field column="UserStartingAliasPath" visible="false" dependsonanotherfield="false" /><field column="UserGUID" visible="false" dependsonanotherfield="false" /><field column="UserLastModified" visible="false" dependsonanotherfield="false"><settings><editTime>false</editTime></settings></field><field column="UserLastLogonInfo" visible="false" dependsonanotherfield="false" /><field column="UserIsHidden" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserVisibility" visible="false" dependsonanotherfield="false" /><field column="UserIsDomain" dependsonanotherfield="false" /><field column="UserHasAllowedCultures" dependsonanotherfield="false" /><field column="UserSiteManagerDisabled" dependsonanotherfield="false" /><field column="UserSettingsID" visible="false" dependsonanotherfield="false" /><field column="UserNickName" dependsonanotherfield="false" /><field column="UserPicture" visible="false" dependsonanotherfield="false" /><field column="UserSignature" visible="false" dependsonanotherfield="false" /><field column="UserURLReferrer" visible="false" dependsonanotherfield="false" /><field column="UserCampaign" visible="false" dependsonanotherfield="false" /><field column="UserMessagingNotificationEmail" visible="false" dependsonanotherfield="false" /><field column="UserCustomData" visible="false" dependsonanotherfield="false" /><field column="UserRegistrationInfo" visible="false" dependsonanotherfield="false" /><field column="UserPreferences" visible="false" dependsonanotherfield="false" /><field column="UserActivationDate" visible="false" dependsonanotherfield="false"><settings><controlname>viewdate</controlname></settings></field><field column="UserActivatedByUserID" visible="false" dependsonanotherfield="false" /><field column="UserTimeZoneID" visible="false" dependsonanotherfield="false" /><field column="UserAvatarID" dependsonanotherfield="false"><settings><controlname>viewuseravatar</controlname></settings></field><field column="UserBadgeID" fieldcaption="Badge" dependsonanotherfield="false"><settings><controlname>viewbadgeimage</controlname></settings></field><field column="UserShowSplashScreen" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserActivityPoints" fieldcaption="Community points" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserForumPosts" fieldcaption="Forum posts" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserBlogComments" fieldcaption="Blog comments" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserGender" fieldcaption="Gender" dependsonanotherfield="false"><settings><controlname>viewusergender</controlname></settings></field><field column="UserDateOfBirth" fieldcaption="Date of birth" dependsonanotherfield="false" visibility=""><settings><controlname>viewdate</controlname><DisplayNow /><TimeZoneType /><EditTime /></settings></field><field column="UserMessageBoardPosts" fieldcaption="Message board posts" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserSettingsUserGUID" visible="false" dependsonanotherfield="false" /><field column="UserSettingsUserID" visible="false" dependsonanotherfield="false" /><field column="WindowsLiveID" dependsonanotherfield="false" /><field column="UserBlogPosts" fieldcaption="Blog posts" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserWaitingForApproval" dependsonanotherfield="false" /><field column="UserDialogsConfiguration" dependsonanotherfield="false" /><field column="UserDescription" dependsonanotherfield="false" /><field column="UserUsedWebParts" dependsonanotherfield="false" /><field column="UserUsedWidgets" dependsonanotherfield="false" /><field column="UserFacebookID" dependsonanotherfield="false" /><field column="UserAuthenticationGUID" dependsonanotherfield="false" /><field column="UserSkype" dependsonanotherfield="false" /><field column="UserIM" dependsonanotherfield="false" /><field column="UserPhone" dependsonanotherfield="false" /><field column="UserPosition" dependsonanotherfield="false" /><field column="UserBounces" dependsonanotherfield="false" /></form>', N'<table cellpadding="2"> 46 <tbody>LdapUtils.java https://github.com/frett/cas.git | Java | 1040 lines
87import org.ldaptive.sasl.SaslConfig; 88import org.ldaptive.sasl.SecurityStrength; 89import org.ldaptive.ssl.KeyStoreCredentialConfig; 306 * @param connectionFactory the connection factory 307 * @param oldPassword the old password 308 * @param newPassword the new password 313 final ConnectionFactory connectionFactory, 314 final String oldPassword, 315 final String newPassword, 319 && !modifyConnection.getConnectionConfig().getUseStartTLS()) { 320 LOGGER.warn("Executing password modification op under a non-secure LDAP connection; " 321 + "To modify password attributes, the connection to the LDAP server SHOULD be secured and/or encrypted."); 334 val response = operation.execute(new PasswordModifyRequest(currentDn, 335 StringUtils.isNotBlank(oldPassword) ? new Credential(oldPassword) : null, 336 new Credential(newPassword)));CAS-Protocol-Specification.md https://github.com/frett/cas.git | Markdown | 1299 lines
43It permits a user to access multiple applications while providing their 44credentials (such as userid and password) only once to a central CAS Server 45application. 146 > only secure protocols such as `https` be allowed for client applications 147 > for further strengthen the authenticating client. 148 191 192Don't prompt for username/password: 193 195 196Always prompt for username/password: 197 299 300- `password` [REQUIRED] - the password of the client that is trying to log in 301Configuration-Properties-Common.md https://github.com/frett/cas.git | Markdown | 1112 lines
99Certain aspects of CAS such as authentication handling support configuration of 100password encoding. Most options are based on Spring Security's [support for password encoding](http://docs.spring.io/spring-security/site/docs/current/apidocs/org/springframework/security/crypto/password/PasswordEncoder.html). 101 108# ${configurationKey}.passwordEncoder.secret= 109# ${configurationKey}.passwordEncoder.strength=16 110``` 117| `DEFAULT` | Use the `DefaultPasswordEncoder` of CAS. For message-digest algorithms via `characterEncoding` and `encodingAlgorithm`. 118| `BCRYPT` | Use the `BCryptPasswordEncoder` based on the `strength` provided and an optional `secret`. 119| `SCRYPT` | Use the `SCryptPasswordEncoder`. 119| `SCRYPT` | Use the `SCryptPasswordEncoder`. 120| `PBKDF2` | Use the `Pbkdf2PasswordEncoder` based on the `strength` provided and an optional `secret`. 121| `STANDARD` | Use the `StandardPasswordEncoder` based on the `secret` provided. 121| `STANDARD` | Use the `StandardPasswordEncoder` based on the `secret` provided. 122| `org.example.MyEncoder` | An implementation of `PasswordEncoder` of your own choosing. 123| `file:///path/to/script.groovy` | Path to a Groovy script charged with handling password encoding operations.wp-admin-rtl.css https://bitbucket.org/jstroschein/wordpress-3.5.1-clean.git | CSS | 2633 lines
107 108#pass-strength-result { 109 float: right; 124 125input[type=password] { 126 direction: ltr;R.java https://bitbucket.org/cynogn/owler.git | Java | 350 lines
117 public static final int helpRevenueButton=0x7f090016; 118 public static final int helpStrengthButton=0x7f09001d; 119 public static final int image=0x7f090006; 122 public static final int logout=0x7f09000b; 123 public static final int password=0x7f090014; 124 public static final int reveneue_hight=0x7f09001b; 129 public static final int spinnerTarget=0x7f09001c; 130 public static final int strengthCloseButton=0x7f09001e; 131 public static final int strength_high=0x7f090021; 131 public static final int strength_high=0x7f090021; 132 public static final int strength_low=0x7f09001f; 133 public static final int strength_medium=0x7f090020; 149 public static final int spinner_textview=0x7f030005; 150 public static final int strength_layout=0x7f030006; 151 }wp-admin.dev.css https://github.com/muskmelon/Greemo.git | CSS | 2804 lines
119input[type="text"], 120input[type="password"], 121input[type="file"], 247 248#pass-strength-result { 249 border-style: solid;SipCommandInterface.java https://gitlab.com/Atomic-ROM/frameworks_opt_telephony | Java | 613 lines
70 @Override 71 public void changeBarringPassword(String facility, String oldPwd, 72 String newPwd, Message result) { 183 @Override 184 public void getSignalStrength (Message result) { 185 } 259 public void setupDataCall(String radioTechnology, String profile, 260 String apn, String user, String password, String authType, 261 String protocol, Message result) { 352 @Override 353 public void queryFacilityLock(String facility, String password, 354 int serviceClass, Message response) { 357 @Override 358 public void queryFacilityLockForApp(String facility, String password, 359 int serviceClass, String appId, Message response) {step_1.tpl https://gitlab.com/leon0399/damnit-engine | Smarty Template | 100 lines
66 <span class="input-group-addon"><i class="fa fa-lock fa-fw"></i></span> 67 <input id="reg-password" name="password" type="password" placeholder="Пароль" class=" form-control" required> 68 </div> 76 <span class="input-group-addon"><i class="fa fa-lock fa-fw"></i></span> 77 <input id="reg-password-repeat" name="password-repeat" type="password" placeholder="Пароль (ещё раз)" class=" form-control" required> 78 </div> 85 <div class="progress"> 86 <div id="passStrengthBar" class="progress-bar progress-bar-success" role="progressbar" aria-valuenow="0" aria-valuemin="0" aria-valuemax="100" > 87PdfStamper.java https://github.com/RoDaniel/featurehouse.git | Java | 325 lines
124 125 public void setEncryption(byte userPassword[], byte ownerPassword[], int permissions, boolean strength128Bits) throws DocumentException { 126 if (stamper.isAppend()) 129 throw new DocumentException("Content was already written to the output."); 130 stamper.setEncryption(userPassword, ownerPassword, permissions, strength128Bits ? PdfWriter.STANDARD_ENCRYPTION_128 : PdfWriter.STANDARD_ENCRYPTION_40); 131 } 133 134 public void setEncryption(byte userPassword[], byte ownerPassword[], int permissions, int encryptionType) throws DocumentException { 135 if (stamper.isAppend()) 138 throw new DocumentException("Content was already written to the output."); 139 stamper.setEncryption(userPassword, ownerPassword, permissions, encryptionType); 140 } 142 143 public void setEncryption(boolean strength, String userPassword, String ownerPassword, int permissions) throws DocumentException { 144 setEncryption(DocWriter.getISOBytes(userPassword), DocWriter.getISOBytes(ownerPassword), permissions, strength);user.php https://bitbucket.org/afriyandi/reporting.git | PHP | 187 lines
9 10 public $password; 11 public $user; 100 101 function check_password($user, $pwd, $comp) { 102 parent::getLogin($user, $pwd, $comp); 113 $this->combine($new1, $new2); 114 if ($this->compare($this->password, $_POST["lpass"])) 115 return FALSE; 115 return FALSE; 116 if (!$this->check_strength($this->password)) { 117 return FALSE; 137 foreach ($string as $index) { 138 $this->password = $this->password . $index; 139 }_module.less https://gitlab.com/crazybutterfly815/magento2 | LESS | 545 lines
17@_password-strong: #c5eeac; 18@_password-very-strong: #81b562; 19 220 // 221 // Password Strength Meter 222 // --------------------------------------------- 239 240 .password-strength-meter { 241 background-color: @_password-default; 256 257 .password-none & { 258 &:before { 258 &:before { 259 background-color: @_password-default; 260 width: 100%;PasswordEncoderUtils.java https://github.com/frett/cas.git | Java | 90 lines
27 /** 28 * New password encoder password encoder. 29 * 32 */ 33 public static PasswordEncoder newPasswordEncoder(final PasswordEncoderProperties properties) { 34 val type = properties.getType(); 70 LOGGER.debug("Creating BCRYPT encoder without secret"); 71 return new BCryptPasswordEncoder(properties.getStrength()); 72 } 73 LOGGER.debug("Creating BCRYPT encoder with secret"); 74 return new BCryptPasswordEncoder(properties.getStrength(), RandomUtils.getNativeInstance()); 75 case SCRYPT: 82 } 83 return new Pbkdf2PasswordEncoder(properties.getSecret(), properties.getStrength(), HASH_WIDTH); 84 case NONE:main.css https://gitlab.com/augurpl/gitlab-ci-hipster-image | CSS | 246 lines
173 174/* start Password strength bar style */ 175ul#strengthBar { 194} 195/* end Password strength bar style */ 196changelog.md https://bitbucket.org/akindziora/websocketserver.git | Markdown | 302 lines
23* Add experimental `.unref()` method to RedisClient (Bryce Baril / Olivier Lalonde) 24* Strengthen checking of reply to prevent conflating "message" or "pmessage" fields with pub_sub replies. (Bryce Baril) 25 32Many contributed features and fixes, including: 33* Ignore password set if not needed. (jbergknoff) 34* Improved compatibility with 0.10.X for tests and client.end() (Bryce Baril)style-rtl.css https://github.com/nicolasnm/divingbook.git | CSS | 271 lines
129 130/* -------------- Password Meter ------------- */ 131 131 132#password-strength { 133 left: auto; 136} 137#password-strength-text { 138 margin-top: 0; 215} 216.password-suggestions ul li { 217 margin-right: 1.2em;user.jsp https://gitlab.com/spiderworts/ab_weixin_cms | JavaServer Pages | 66 lines
9<body style="overflow-y: hidden" scroll="no"> 10<t:formvalid formid="formobj" dialog="true" usePlugin="password" layout="table" action="userController.do?saveUser"> 11 <input id="id" name="id" type="hidden" value="${user.id }"> 28 <td align="right"><label class="Validform_label"> 密码: </label></td> 29 <td class="value"><input type="password" class="inputxt" value="" name="password" plugin="passwordStrength" datatype="*6-18" errormsg="" /> <span class="passwordStrength" 30 style="display: none;"><span>弱</span><span>中</span><span class="last">强</span> </span> <span class="Validform_checktip">密码至少6个字符,最多18个字符</span></td> 33 <td align="right"><label class="Validform_label"> 重复密码: </label></td> 34 <td class="value"><input id="repassword" class="inputxt" type="password" value="${user.password}" recheck="password" datatype="*6-18" errormsg="两次输入的密码不一致!"> <span 35 class="Validform_checktip">重复个人密码</span></td>postgresql.conf.erb https://gitlab.com/jbyrd/omnibus-gitlab | Ruby HTML | 560 lines
84#ssl = off # (change requires restart) 85#ssl_ciphers = 'ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH' # allowed SSL ciphers 86 # (change requires restart) 87#ssl_renegotiation_limit = 512MB # amount of data between renegotiations 88#password_encryption = on 89#db_user_namespace = off