PageRenderTime 609ms queryTime 65ms sortTime 12ms getByIdsTime 394ms findMatchingLines 79ms

100+ results results for 'password strength' (609 ms)

Not the results you expected?
defaults-rtl.css https://github.com/rtdean93/tbytam.git | CSS | 560 lines
                    
494
                    
495.password-strength { /* System gap */
                    
496  margin-left: 10px;
                    
                
EnrichIntegrationFromRemoteConfigStrategy.js https://gitlab.com/DamZou/myMeteoApp | JavaScript | 245 lines
                    
174  // Enrich config with with directory policies.
                    
175  client.getDirectory(directoryHref, { expand: 'passwordPolicy,accountCreationPolicy' }, stopIfError(function (directory) {
                    
176    var resetEmailStatusEnabled = isEnabled(directory.passwordPolicy.resetEmailStatus);
                    
180      web: {
                    
181        forgotPassword: {
                    
182          enabled: resetEmailStatusEnabled
                    
183        },
                    
184        changePassword: {
                    
185          enabled: resetEmailStatusEnabled
                    
199    directory.getPasswordPolicy(stopIfError(function (policy) {
                    
200      policy.getStrength(stopIfError(function (strength) {
                    
201        // Remove the href property from the Strength Resource, we don't want
                    
205
                    
206        config.passwordPolicy = strength;
                    
207
                    
                
landing.html https://bitbucket.org/liutaihua/yyu.git | HTML | 182 lines
                    
4$# note var cssfiles: /static/public/css/landing.css /static/public/css/jquery.motionCaptcha.0.2.css
                    
5$# note var jsfiles: /static/public/js/Validform_v5.1.js /static/public/js/landing.js /static/public/js/passwordStrength-min.js /static/public/js/jquery.motionCaptcha.0.2.js
                    
6
                    
83                        <div class="controls">
                    
84                            <input type="password" name="regUserPassword" placeholder="密码" datatype="*6-16" errormsg="密码范围在6~16位之间" plugin="passwordStrength" class="span3"/>
                    
85                            <span class="Validform_checktip">6-16个字符</span>
                    
85                            <span class="Validform_checktip">6-16个字符</span>
                    
86                            <div class="passwordStrength" style="display:none;"><b>密码强度:</b> <span>弱</span><span>中</span><span class="last">强</span></div>
                    
87                        </div>
                    
89                        <div class="controls">
                    
90                            <input type="password" name="regUserPassword2" placeholder="确认密码" datatype="*6-16" class="span3" datatype="*" recheck="regUserPassword" nullmsg="请再输入一次密码!" errormsg="您两次输入的账号密码不一致!" />
                    
91                            <span class="Validform_checktip"></span>
                    
113                            <span class="add-on"><i class="icon-lock"></i></span>
                    
114                            <input name="loginPassword" type="password" placeholder="密码" class="span3"/>
                    
115                            <a id="forgotButton" href="javascript:void(0)">忘记密码?</a>
                    
                
user.js https://gitlab.com/mohamed_hussein/prodt | JavaScript | 229 lines
                    
45        var $confirmInputParent = $confirmInput.parent().addClass('confirm-parent').append($passwordConfirmMessage);
                    
46        var passwordStrengthBarClassesToRemove = [cssClasses.passwordWeak || '', cssClasses.passwordFair || '', cssClasses.passwordGood || '', cssClasses.passwordStrong || ''].join(' ').trim();
                    
47        var confirmTextWrapperClassesToRemove = [cssClasses.passwordsMatch || '', cssClasses.passwordsNotMatch || ''].join(' ').trim();
                    
52          var $passwordStrength = $(Drupal.theme('passwordStrength', settings.password));
                    
53          password.$strengthBar = $passwordStrength.find('[data-drupal-selector="password-strength-indicator"]').first();
                    
54
                    
55          if (password.$strengthBar.length === 0) {
                    
56            password.$strengthBar = $passwordStrength.find('.js-password-strength__indicator').first();
                    
57            Drupal.deprecationError({
                    
57            Drupal.deprecationError({
                    
58              message: 'The js-password-strength__indicator class is deprecated in drupal:9.1.0 and is removed from drupal:10.0.0. Replace js-password-strength__indicator with a data-drupal-selector="password-strength-indicator" attribute. See https://www.drupal.org/node/3152101'
                    
59            });
                    
66            Drupal.deprecationError({
                    
67              message: 'The js-password-strength__text class is deprecated in drupal:9.1.0 and is removed from drupal:10.0.0. Replace js-password-strength__text with a data-drupal-selector="password-strength-text" attribute. See https://www.drupal.org/node/3152101'
                    
68            });
                    
                
PasswordStrength.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 467 lines
                    
339            {
                    
340                sb.Append(GetString("passwordstrength.notacceptable"), ";", GetString("passwordstrength.weak"));
                    
341                tooltipMessage = string.Format(GetString("passwordstrength.hint"), MinLength, MinNonAlphaNumChars, PreferedLength, PreferedNonAlphaNumChars);
                    
344            {
                    
345                sb.Append(GetString("passwordstrength.weak"), ";", GetString("passwordstrength.weak"));
                    
346                tooltipMessage = string.Format(GetString("passwordstrength.recommend"), PreferedLength, PreferedNonAlphaNumChars);
                    
348
                    
349            // Register jQuery and registration of script which shows password strength        
                    
350            ScriptHelper.RegisterJQuery(this.Page);
                    
352
                    
353            sb.Append(";", GetString("passwordstrength.acceptable"), ";", GetString("passwordstrength.average"), ";", GetString("passwordstrength.strong"), ";", GetString("passwordstrength.excellent"));
                    
354
                    
371
                    
372            ScriptHelper.RegisterStartupScript(this, typeof(string), "PasswordStrength_" + txtPassword.ClientID, ScriptHelper.GetScript(script));
                    
373
                    
                
user_info.py https://gitlab.com/EntityOS/Cnchi | Python | 335 lines
                    
54        self.image_is_ok['username'] = self.ui.get_object('username_ok')
                    
55        self.image_is_ok['password'] = self.ui.get_object('password_ok')
                    
56
                    
59        self.error_label['username'] = self.ui.get_object('username_error_label')
                    
60        self.error_label['password'] = self.ui.get_object('password_error_label')
                    
61
                    
61
                    
62        self.password_strength = self.ui.get_object('password_strength')
                    
63
                    
67        self.entry['username'] = self.ui.get_object('username')
                    
68        self.entry['password'] = self.ui.get_object('password')
                    
69        self.entry['verified_password'] = self.ui.get_object('verified_password')
                    
317                self.error_label['password'],
                    
318                self.password_strength)
                    
319
                    
                
users.php https://github.com/reverseproductions/socialigniter.git | PHP | 449 lines
                    
60    	$this->form_validation->set_rules('email', 'Email Address', 'required|valid_email');
                    
61    	$this->form_validation->set_rules('password', 'Password', 'required|min_length['.config_item('min_password_length').']|max_length['.$this->config->item('max_password_length').']|strong_pass['.config_item('password_strength').']|matches[password_confirm]');
                    
62    	$this->form_validation->set_rules('password_confirm', 'Password Confirmation', 'required');
                    
67	    	$email				= $this->input->post('email');
                    
68	    	$password			= $this->input->post('password');
                    
69	    	$additional_data 	= array(
                    
94    	$this->form_validation->set_rules('email', 'Email Address', 'required|valid_email');
                    
95	    $this->form_validation->set_rules('password', 'Password', 'required');
                    
96
                    
294	    $this->form_validation->set_rules('old_password', 'Old password', 'required');
                    
295	    $this->form_validation->set_rules('new_password', 'New Password', 'required|min_length['.config_item('min_password_length').']|max_length['.config_item('max_password_length').']|matches[new_password_confirm]');
                    
296	    $this->form_validation->set_rules('new_password_confirm', 'Confirm New Password', 'required');
                    
299	    {
                    
300    		if ($change = $this->social_auth->change_password($this->oauth_user_id, $this->input->post('old_password'), $this->input->post('new_password')))
                    
301    		{
                    
                
ezsig.rb https://github.com/flooose/adva_cms.git | Ruby | 535 lines
                    
42=end
                    
43    def self.generate(strength=2048,type=:rsa)
                    
44      key_class=case type
                    
49      end
                    
50      EzCrypto::Signer.new(key_class.generate(strength))
                    
51    end
                    
53=begin rdoc
                    
54  Decode a PEM encoded Private Key  and return a signer. Takes an optional password
                    
55=end  
                    
55=end  
                    
56    def self.decode(encoded,password=nil)
                    
57      begin
                    
57      begin
                    
58        EzCrypto::Signer.new(OpenSSL::PKey::RSA.new( encoded,password))
                    
59      rescue
                    
                
security.dev.js https://gitlab.com/Mirros/cdnjs | JavaScript | 348 lines
                    
54    /*
                    
55     * Validate password strength
                    
56     */
                    
63
                    
64            return $.formUtils.validators.validate_strength.calculatePasswordStrength(val) >= requiredStrength;
                    
65        },
                    
69        /**
                    
70         * Code more or less borrowed from jQuery plugin "Password Strength Meter"
                    
71         * written by Darren Mason (djmason9@gmail.com), myPocket technologies (www.mypocket-technologies.com)
                    
74         */
                    
75        calculatePasswordStrength : function(password) {
                    
76
                    
199
                    
200                var strength = $.formUtils.validators.validate_strength.calculatePasswordStrength(val);
                    
201                var css = {
                    
                
PolicySetupActivity.java https://gitlab.com/brian0218/rk3288_r-box_android4.4.2_sdk | Java | 275 lines
                    
38 * for viewing configured policy.  When it is detected that the screen-lock password satisfies
                    
39 * the password strength required by the policy, the user is sent to an Activity containing
                    
40 * protected content.
                    
120        mPasswordQualityInputField = (Spinner) findViewById(R.id.policy_password_quality);
                    
121        mPasswordLengthInputField = (EditText) findViewById(R.id.policy_password_length);
                    
122        mPasswordMinUppercaseInputField = (EditText) findViewById(R.id.policy_password_uppercase);
                    
258    private void writePolicy() {
                    
259        int passwordQuality = (int) mPasswordQualityInputField.getSelectedItemId();
                    
260
                    
262        try {
                    
263            passwordLength = Integer.valueOf(mPasswordLengthInputField.getText().toString());
                    
264        } catch (NumberFormatException nfe) {}  // Defaults to 0.
                    
271
                    
272        mPolicy.saveToLocal(passwordQuality, passwordLength, passwordMinUppercase);
                    
273    }
                    
                
lang_sql.php https://gitlab.com/phamngsinh/baitaplon_sinhvien | PHP | 185 lines
                    
3$lang['L_IMPORT_NOTABLE']="Ingen tabell har valts för importen!";
                    
4$lang['L_PASSWORD_STRENGTH']="Lösenordets säkerhet";
                    
5$lang['L_SQL_WARNING']="Utförs SQL-kommandon kan detta förändra data! Autorn ansvarar ej för förlust av data.";
                    
180$lang['L_USERNAME']="Användarnamn";
                    
181$lang['L_PASSWORD']="Lösenord";
                    
182$lang['L_PASSWORD_REPEAT']="Upprepa lösenord";
                    
                
register.html https://gitlab.com/pidlisnyi/spring-angular | HTML | 123 lines
                    
76                    <label class="control-label" for="password" translate="global.form.newpassword">New password</label>
                    
77                    <input type="password" class="form-control" id="password" name="password" placeholder="{{'global.form.newpassword.placeholder' | translate}}"
                    
78                           ng-model="vm.registerAccount.password" ng-minlength=4 ng-maxlength=50 required>
                    
92                    </div>
                    
93                    <password-strength-bar password-to-check="vm.registerAccount.password"></password-strength-bar>
                    
94                </div>
                    
96                    <label class="control-label" for="confirmPassword" translate="global.form.confirmpassword">New password confirmation</label>
                    
97                    <input type="password" class="form-control" id="confirmPassword" name="confirmPassword" placeholder="{{'global.form.confirmpassword.placeholder' | translate}}"
                    
98                           ng-model="vm.confirmPassword" ng-minlength=4 ng-maxlength=50 required>
                    
98                           ng-model="vm.confirmPassword" ng-minlength=4 ng-maxlength=50 required>
                    
99                    <div ng-show="form.confirmPassword.$dirty && form.confirmPassword.$invalid">
                    
100                        <p class="help-block"
                    
100                        <p class="help-block"
                    
101                               ng-show="form.confirmPassword.$error.required" translate="global.messages.validate.confirmpassword.required">
                    
102                            Your confirmation password is required.
                    
                
form-test.html https://gitlab.com/Blueprint-Marketing/cdnjs | HTML | 346 lines
                    
31
                    
32        /* modify inputs for password strength */
                    
33        .password-strength input.form-control {
                    
38
                    
39        .password-strength label {
                    
40            display: block;
                    
107
                    
108        <div class="form-group password-strength">
                    
109            <label class="control-label" for="password">Display password strength (only strong)</label>
                    
109            <label class="control-label" for="password">Display password strength (only strong)</label>
                    
110            <input name="password" type="password" id="password" class="form-control" data-validation="strength" data-validation-strength="3" />
                    
111        </div>
                    
291                $('#swedish-county-suggestions').suggestSwedishCounty();
                    
292                $('#password').displayPasswordStrength();
                    
293            },
                    
                
wifi.scm https://gitlab.com/Efraim/guix | Scheme | 246 lines
                    
45
                    
46(define (strength->string strength)
                    
47  "Convert STRENGTH as an integer percentage into a text printable strength
                    
63      (string quarter half #\_ #\_))
                    
64     ((> strength 5)
                    
65      ;; ▂___
                    
95(define (run-wrong-password-page service-name)
                    
96  "Run a page to inform user of a wrong password input."
                    
97  (run-error-page
                    
97  (run-error-page
                    
98   (format #f (G_ "The password you entered for ~a is incorrect.")
                    
99           service-name)
                    
180         (strength (service-strength service))
                    
181         (strength-string (strength->string strength))
                    
182         (state (service-state service))
                    
                
IAuthenticator.cs http://owasp-esapi-classicasp.googlecode.com/svn/trunk/ | C# | 198 lines
                    
39    /// current request and the name of the parameters containing the username and
                    
40    /// password. The implementation should verify the password if necessary, create
                    
41    /// a session if necessary, and set the user as the current user.
                    
79        /// </param>
                    
80        /// <param name="password1">The password for the user.
                    
81        /// </param>
                    
81        /// </param>
                    
82        /// <param name="password2">A confirmation of the password for the user.
                    
83        /// 
                    
87        /// </returns>
                    
88        IUser CreateUser(string accountName, string password1, string password2);
                    
89
                    
177        /// </returns>
                    
178        void VerifyPasswordStrength(string oldPassword, string newPassword);
                    
179
                    
                
remember_me.rst https://github.com/pedrobc/symfony-docs.git | ReStructuredText | 207 lines
                    
74            <label for="password">Password:</label>
                    
75            <input type="password" id="password" name="_password" />
                    
76
                    
95            <label for="password">Password:</label>
                    
96            <input type="password" id="password" name="_password" />
                    
97
                    
140    role, then you also have the other two roles. In other words, these roles
                    
141    represent three levels of increasing "strength" of authentication.
                    
142
                    
192    
                    
193    * Once the user has entered his username and password, assuming the
                    
194      user receives the ``ROLE_USER`` role per your configuration, the user
                    
                
setup.blade.php https://gitlab.com/billyprice1/Cachet | PHP | 222 lines
                    
93                        <label>{{ trans('forms.setup.mail_password') }}</label>
                    
94                        <input type="text" class="form-control" name="env[mail_password]" value="{{ Binput::old('env.mail_password') }}" autocomplete="off">
                    
95                        @if($errors->has('env.mail_password'))
                    
95                        @if($errors->has('env.mail_password'))
                    
96                        <span class="text-danger">{{ $errors->first('env.mail_password') }}</span>
                    
97                        @endif
                    
189                        <label>{{ trans("forms.setup.password") }}</label>
                    
190                        <input type="password" name="user[password]" class="form-control password-strength" placeholder="{{ trans('forms.setup.password') }}" value="{{ Binput::old('user.password', '') }}" required>
                    
191                        <div class="strengthify-wrapper"></div>
                    
191                        <div class="strengthify-wrapper"></div>
                    
192                        @if($errors->has('user.password'))
                    
193                        <span class="text-danger">{{ $errors->first('user.password') }}</span>
                    
                
FormValidationTag.java https://gitlab.com/spiderworts/ab_weixin_cms | Java | 254 lines
                    
99				if (usePlugin.indexOf("password") >= 0) {
                    
100					sb.append("<SCRIPT type=\"text/javascript\" src=\"plug-in/Validform/plugin/passwordStrength/passwordStrength-min.js\"></SCRIPT>");
                    
101				}
                    
146				if (usePlugin.indexOf("password") >= 0) {
                    
147					passsb.append("passwordstrength:{");
                    
148					passsb.append("minLen:6,");
                    
154					passsb.append("obj.parent().next().find(\".Validform_checktip\").show();");
                    
155					passsb.append("obj.find(\".passwordStrength\").hide();");
                    
156					passsb.append("}");
                    
158					passsb.append("{");
                    
159					passsb.append("$(\".passwordStrength\").show();");
                    
160					passsb.append("obj.parent().next().find(\".Validform_checktip\").hide();");
                    
162					passsb.append("}");// trigger结尾
                    
163					passsb.append("}");// passwordstrength结尾
                    
164				}
                    
                
tls_srp.c https://gitlab.com/srbhgupta/open | C | 471 lines
                    
108    s->srp_ctx.info = ctx->srp_ctx.info;
                    
109    s->srp_ctx.strength = ctx->srp_ctx.strength;
                    
110
                    
433
                    
434int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password)
                    
435{
                    
435{
                    
436    return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD, 0, password);
                    
437}
                    
438
                    
439int SSL_CTX_set_srp_strength(SSL_CTX *ctx, int strength)
                    
440{
                    
440{
                    
441    return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH, strength,
                    
442                         NULL);
                    
                
tank_auth.php https://bitbucket.org/matyhaty/senses-thwaites.git | PHP | 568 lines
                    
248				$plainpassword			= $new_password;
                    
249				$hashed_password 		= getCryptedPassword($plainpassword , $salt);
                    
250				
                    
309				$this->error = array('old_password' => 'auth_incorrect_password');
                    
310				log_message('error', 'Changing Password - old_password - auth_incorrect_password');
                    
311			}
                    
334					$this->ci->config->item('phpass_hash_portable', 'tank_auth'));
                    
335			if ($hasher->CheckPassword($password, $user->password)) {			// success
                    
336
                    
358			} else {															// fail
                    
359				$this->error = array('password' => 'auth_incorrect_password');
                    
360			}
                    
397					$this->ci->config->item('phpass_hash_portable', 'tank_auth'));
                    
398			if ($hasher->CheckPassword($password, $user->password)) {			// success
                    
399
                    
                
schannel.h https://gitlab.com/ubuntu-trusty/mingw-w64 | C Header | 376 lines
                    
45#define SECPKG_ATTR_SUPPORTED_ALGS 0x56
                    
46#define SECPKG_ATTR_CIPHER_STRENGTHS 0x57
                    
47#define SECPKG_ATTR_SUPPORTED_PROTOCOLS 0x58
                    
93typedef struct _SecPkgCred_CipherStrengths {
                    
94  DWORD dwMinimumCipherStrength;
                    
95  DWORD dwMaximumCipherStrength;
                    
95  DWORD dwMaximumCipherStrength;
                    
96} SecPkgCred_CipherStrengths,*PSecPkgCred_CipherStrengths;
                    
97
                    
109  ALG_ID aiCipher;
                    
110  DWORD dwCipherStrength;
                    
111  ALG_ID aiHash;
                    
111  ALG_ID aiHash;
                    
112  DWORD dwHashStrength;
                    
113  ALG_ID aiExch;
                    
                
components-form-tools.js https://gitlab.com/worksmit/demo | JavaScript | 202 lines
                    
34    
                    
35    var handlePasswordStrengthChecker = function () {
                    
36        var initialized = false;
                    
36        var initialized = false;
                    
37        var input = $("#password_strength");
                    
38
                    
41                // set base options
                    
42                input.pwstrength({
                    
43                    raisePower: 1.4,
                    
48
                    
49                // add your own rule to calculate the password strength
                    
50                input.pwstrength("addRule", "demoRule", function (options, word, score) {
                    
189            handleBootstrapMaxlength();
                    
190            handlePasswordStrengthChecker();
                    
191            handleUsernameAvailabilityChecker1();
                    
                
ril_commands.h https://gitlab.com/lindwurm/rr_device_oneplus_oneplus3 | C Header | 175 lines
                    
35    {RIL_REQUEST_LAST_CALL_FAIL_CAUSE, dispatchVoid, responseFailCause},
                    
36    {RIL_REQUEST_SIGNAL_STRENGTH, dispatchVoid, responseRilSignalStrength},
                    
37    {RIL_REQUEST_VOICE_REGISTRATION_STATE, dispatchVoid, responseStrings},
                    
60    {RIL_REQUEST_SET_FACILITY_LOCK, dispatchStrings, responseInts},
                    
61    {RIL_REQUEST_CHANGE_BARRING_PASSWORD, dispatchStrings, responseVoid},
                    
62    {RIL_REQUEST_QUERY_NETWORK_SELECTION_MODE, dispatchVoid, responseInts},
                    
                
install.php http://cartonbank.googlecode.com/svn/trunk/ | PHP | 268 lines
                    
89	$user_name = isset($_POST['user_name']) ? trim( stripslashes( $_POST['user_name'] ) ) : 'admin';
                    
90	$admin_password = isset($_POST['admin_password']) ? trim( stripslashes( $_POST['admin_password'] ) ) : '';
                    
91	$admin_email  = isset( $_POST['admin_email']  ) ? trim( stripslashes( $_POST['admin_email'] ) ) : '';
                    
123				<input name="admin_password" type="password" id="pass1" size="25" value="" />
                    
124				<p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p>
                    
125				<div id="pass-strength-result"><?php _e('Strength indicator'); ?></div>
                    
189		$admin_password = isset($_POST['admin_password']) ? $_POST['admin_password'] : '';
                    
190		$admin_password_check = isset($_POST['admin_password2']) ? $_POST['admin_password2'] : '';
                    
191		$admin_email  = isset( $_POST['admin_email']  ) ?trim( stripslashes( $_POST['admin_email'] ) ) : '';
                    
233		<td><?php
                    
234		if ( ! empty( $password ) && empty($admin_password_check) )
                    
235			echo '<code>'. esc_html($password) .'</code><br />';
                    
249<script type="text/javascript" src="../wp-includes/js/jquery/jquery.js"></script>
                    
250<script type="text/javascript" src="js/password-strength-meter.js"></script>
                    
251<script type="text/javascript" src="js/user-profile.js"></script>
                    
                
eaptypes.rs https://github.com/chromium/chromium.git | Rust | 403 lines
                    
84    eatUserName = 1,
                    
85    eatUserPassword = 2,
                    
86    eatMD5CHAPPassword = 3,
                    
226    EapConfigInputUsername = 0,
                    
227    EapConfigInputPassword = 1,
                    
228    EapConfigInputNetworkUsername = 2,
                    
228    EapConfigInputNetworkUsername = 2,
                    
229    EapConfigInputNetworkPassword = 3,
                    
230    EapConfigInputPin = 4,
                    
296    emptPropKeyStrength64 = 6,
                    
297    emptPropKeyStrength128 = 7,
                    
298    emptPropKeyStrength256 = 8,
                    
395    [u32; 6] [u64; 4],
                    
396    username_password username_password_mut: EapUsernamePasswordCredential,
                    
397    certificate certificate_mut: EapCertificateCredential,
                    
                
edit.php https://github.com/lowiebenoot/forkcms.git | PHP | 354 lines
                    
157
                    
158		// check if we need to show the password strength and parse the label
                    
159		$this->tpl->assign('showPasswordStrength', ($this->record['settings']['password_strength'] !== 'strong'));
                    
159		$this->tpl->assign('showPasswordStrength', ($this->record['settings']['password_strength'] !== 'strong'));
                    
160		$this->tpl->assign('passwordStrengthLabel', BL::lbl($this->record['settings']['password_strength']));
                    
161	}
                    
210			{
                    
211				if($fields['new_password']->getValue() !== $fields['confirm_password']->getValue()) $fields['confirm_password']->addError(BL::err('ValuesDontMatch'));
                    
212			}
                    
257						$settings['current_password_change'] = time();
                    
258						if($lastPasswordChange) $settings['last_password_change'] = $lastPasswordChange;
                    
259
                    
260						// save the password strength
                    
261						$passwordStrength = BackendAuthentication::checkPassword($fields['new_password']->getValue());
                    
262						$settings['password_strength'] = $passwordStrength;
                    
                
form_controls_extended.js https://gitlab.com/Mustafiz.it12/Trainer_Registration | JavaScript | 489 lines
                    
104
                    
105    // Passy - password generator
                    
106    // ------------------------------
                    
122
                    
123    // Strength meter
                    
124    var feedback = [
                    
138        $outputLabel.text(feedback[strength].text);
                    
139        $outputLabel.css('background-color', feedback[strength].color).css('color', feedback[strength].textColor);
                    
140    });
                    
144        $outputLabelAbsolute.text(feedback[strength].text);
                    
145        $outputLabelAbsolute.css('background-color', feedback[strength].color).css('color', feedback[strength].textColor);
                    
146    });
                    
150        $outputGroup.text(feedback[strength].text);
                    
151        $outputGroup.css('background-color', feedback[strength].color).css('border-color', feedback[strength].color).css('color', feedback[strength].textColor);
                    
152    });
                    
                
install.php https://gitlab.com/darmawan.fatria/df-skp-2014 | PHP | 307 lines
                    
128			<th scope="row">
                    
129				<label for="pass1"><?php _e('Password, twice'); ?></label>
                    
130				<p><?php _e('A password will be automatically generated for you if you leave this blank.'); ?></p>
                    
133				<input name="admin_password" type="password" id="pass1" size="25" value="" />
                    
134				<p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p>
                    
135				<div id="pass-strength-result"><?php _e('Strength indicator'); ?></div>
                    
240		$user_name = isset($_POST['user_name']) ? trim( wp_unslash( $_POST['user_name'] ) ) : '';
                    
241		$admin_password = isset($_POST['admin_password']) ? wp_unslash( $_POST['admin_password'] ) : '';
                    
242		$admin_password_check = isset($_POST['admin_password2']) ? wp_unslash( $_POST['admin_password2'] ) : '';
                    
254			$error = true;
                    
255		} elseif ( $admin_password != $admin_password_check ) {
                    
256			// TODO: poka-yoke
                    
285		<td><?php
                    
286		if ( ! empty( $result['password'] ) && empty( $admin_password_check ) ): ?>
                    
287			<code><?php echo esc_html( $result['password'] ) ?></code><br />
                    
                
release-info.html https://github.com/alexandraleahu/insubstantial.git | HTML | 350 lines
                    
65    <td width="20%" valign="top" align="left">
                    
66      <p align="right"><b>Strength checking on passwords</b></td>
                    
67    <td width="80%" valign="top">Password fields can provide visual feedback
                    
67    <td width="80%" valign="top">Password fields can provide visual feedback
                    
68    on the strength of the currently set contents (password). See <a
                    
69    href="http://weblogs.java.net/blog/kirillcool/archive/2005/12/visual_feedback.html">this blog entry</a>
                    
69    href="http://weblogs.java.net/blog/kirillcool/archive/2005/12/visual_feedback.html">this blog entry</a>
                    
70    for the description on how to use this feature. See <a href="password-strength.avi">22-second</a> AVI 
                    
71    movie (412 KB) illustrating the technique.
                    
72    <br><br>
                    
73    <img src="password-strength-weak.png" width="250" height="48"><br><br>
                    
74    <img src="password-strength-medium.png" width="250" height="59"><br><br>
                    
74    <img src="password-strength-medium.png" width="250" height="59"><br><br>
                    
75    <img src="password-strength-strong.png" width="250" height="51">
                    
76    </td>
                    
                
user-profile.js https://gitlab.com/campus-academy/krowkaramel | JavaScript | 478 lines
                    
43
                    
44		// Once zxcvbn loads, passwords strength is known.
                    
45		$( '#pw-weak-text-label' ).text( __( 'Confirm use of weak password' ) );
                    
64
                    
65			// Refresh password strength area.
                    
66			$pass1.removeClass( 'short bad good strong' );
                    
279
                    
280		strength = wp.passwordStrength.meter( pass1, wp.passwordStrength.userInputDisallowedList(), pass1 );
                    
281
                    
457
                    
458	window.generatePassword = generatePassword;
                    
459
                    
467	/*
                    
468	 * We need to generate a password as soon as the Reset Password page is loaded,
                    
469	 * to avoid double clicking the button to retrieve the first generated password.
                    
                
themed-profiles.php https://gitlab.com/Gashler/sg | PHP | 331 lines
                    
212
                    
213		wp_enqueue_style( 'password-strength', plugins_url( 'theme-my-login/modules/themed-profiles/themed-profiles.css' ) );
                    
214
                    
                
Register.aspx https://github.com/alanning/MongoWSAT.git | ASP.NET | 167 lines
                    
60                                <asp:TextBox ID="Password" runat="server" TextMode="Password"></asp:TextBox>
                    
61                                <cc1:PasswordStrength ID="Password_PasswordStrength" runat="server" 
                    
62                                    TargetControlID="Password" MinimumNumericCharacters="1" 
                    
62                                    TargetControlID="Password" MinimumNumericCharacters="1" 
                    
63                                    PreferredPasswordLength="7" TextCssClass="passwordStrengthIndicator" 
                    
64                                    TextStrengthDescriptions="Very Poor;Weak;Average;Strong;Excellent" 
                    
67                                <asp:RequiredFieldValidator ID="PasswordRequired" runat="server" 
                    
68                                    ControlToValidate="Password" ErrorMessage="Password is required." 
                    
69                                    ToolTip="Password is required." ValidationGroup="CreateUserWizard1">
                    
139                                <asp:CompareValidator ID="PasswordCompare" runat="server" 
                    
140                                    ControlToCompare="Password" ControlToValidate="ConfirmPassword" 
                    
141                                    Display="Dynamic" 
                    
141                                    Display="Dynamic" 
                    
142                                    ErrorMessage="The Password and Confirmation Password must match." 
                    
143                                    ValidationGroup="CreateUserWizard1">
                    
                
Web.config http://enhancedpodcaster.googlecode.com/svn/trunk/ | ASP.NET | 153 lines
                    
57				<clear/>
                    
58				<add name="AspNetSqlMembershipProvider" type="System.Web.Security.SqlMembershipProvider, System.Web, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" connectionStringName="ApplicationServices" enablePasswordRetrieval="false" enablePasswordReset="true" requiresQuestionAndAnswer="false" requiresUniqueEmail="false" passwordFormat="Hashed" maxInvalidPasswordAttempts="5" minRequiredPasswordLength="6" minRequiredNonalphanumericCharacters="0" passwordAttemptWindow="10" passwordStrengthRegularExpression="" applicationName="/"/>
                    
59			</providers>
                    
                
forms.py https://gitlab.com/unofficial-mirrors/edx-platform | Python | 330 lines
                    
22from student.models import CourseEnrollmentAllowed
                    
23from util.password_policy_validators import validate_password_strength
                    
24
                    
25
                    
26class PasswordResetFormNoActive(PasswordResetForm):
                    
27    error_messages = {
                    
166    _EMAIL_INVALID_MSG = _("A properly formatted e-mail is required")
                    
167    _PASSWORD_INVALID_MSG = _("A valid password is required")
                    
168    _NAME_TOO_SHORT_MSG = _("Your legal name must be a minimum of two characters long")
                    
258        """Enforce password policies (if applicable)"""
                    
259        password = self.cleaned_data["password"]
                    
260        if (
                    
267            try:
                    
268                validate_password_strength(password)
                    
269            except ValidationError, err:
                    
                
reset.html https://gitlab.com/kaouech/theme | HTML | 207 lines
                    
79
                    
80    <script src="js/plugins/showpassword.1.0.min.js"></script>
                    
81    <script src="js/plugins/nanogress.1.0.min.js"></script>
                    
85    
                    
86    <script src="js/plugins/jquery.pwstrength.min.js"></script>
                    
87
                    
147                        <div class="col-lg-12">	
                    
148                    		<input class="form-control" type="password" placeholder="Your old password" id="fc-id-1" tabindex="1" />
                    
149                        </div>
                    
158                        <div class="col-lg-12">	
                    
159                    		<input class="form-control password" type="password" placeholder="Minium of 6 characters" id="fc-id-2-a" tabindex="2" data-indicator="pwindicator" />
                    
160                        </div>
                    
173                        	<label for="fc-id-3">Confirm:</label>
                    
174                            <a href="reset.html#" id="showpassword-trigger" class="underline">Show password</a>
                    
175                        </div>
                    
                
StrengthValidator.php https://gitlab.com/I-NOZex/quiz | PHP | 388 lines
                    
1<?php
                    
2namespace nenad\passwordStrength;
                    
3
                    
10 * StrengthValidator validates if the attribute value matches a specified
                    
11 * set of password strength rules. It builds over the Yii StringValidator.
                    
12 */
                    
21    const STRONG = 'strong';
                    
22    const RESET  = 'reset'; // used for password reset
                    
23
                    
150     * @var array the target strength rule requirements that will
                    
151     * be evaluated for displaying the strength meter
                    
152     */
                    
236                'class' => 'yii\i18n\PhpMessageSource',
                    
237                'basePath' => '@pwdstrength/messages'
                    
238            ];
                    
                
theme.js.coffee https://gitlab.com/Petrohub/Petrohub_main | CoffeeScript | 231 lines
                    
37  # --------------------------------------------------------------------------------------------------------------------
                    
38  # setting up naked password for password strength
                    
39  $("input.nakedpassword").nakedPassword
                    
39  $("input.nakedpassword").nakedPassword
                    
40    path: "assets/images/plugins/naked_password/"
                    
41  # --------------------------------------------------------------------------------------------------------------------
                    
                
Customer_New.aspx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 263 lines
                    
39        lblUserName.Text = GetString("Customers_Edit.UserName");
                    
40        lblPassword1.Text = GetString("Customer_Edit_Login_Edit.lblPassword1");
                    
41        lblPassword2.Text = GetString("Customer_Edit_Login_Edit.lblPassword2");
                    
42        rqvUserName.ErrorMessage = GetString("Customer_Edit_Login_Edit.rqvUserName");
                    
43        rqvPassword2.ErrorMessage = GetString("Customer_Edit_Login_Edit.rqvPassword2");
                    
44        btnOk.Text = GetString("General.OK");
                    
148                errorMessage = new Validator().NotEmpty(txtUserName.Text.Trim(), GetString("Customer_Edit_Login_Edit.rqvUserName"))
                    
149                                              .NotEmpty(passStrength.Text.Trim(), GetString("Customer_Edit_Login_Edit.rqvPassword1"))
                    
150                                              .NotEmpty(txtPassword2.Text.Trim(), GetString("Customer_Edit_Login_Edit.rqvPassword2")).Result;
                    
158                // Compare passwords
                    
159                if ((errorMessage == "") && (passStrength.Text != txtPassword2.Text))
                    
160                {
                    
209                    ui.SetValue("UserEnabled", true);
                    
210                    UserInfoProvider.SetPassword(ui, passStrength.Text);
                    
211
                    
                
DigestMembershipProvider.cs https://github.com/mbmccormick/Ximura.git | C# | 226 lines
                    
65
                    
66        public override bool ChangePassword(string username, string oldPassword, string newPassword)
                    
67        {
                    
70
                    
71        public override bool ChangePasswordQuestionAndAnswer(string username, string password, string newPasswordQuestion, string newPasswordAnswer)
                    
72        {
                    
76        public override MembershipUser CreateUser(string username, string password, 
                    
77            string email, string passwordQuestion, string passwordAnswer, 
                    
78            bool isApproved, object providerUserKey, out MembershipCreateStatus status)
                    
183        /// </summary>
                    
184        public override MembershipPasswordFormat PasswordFormat
                    
185        {
                    
190
                    
191        public override string PasswordStrengthRegularExpression
                    
192        {
                    
                
install.php https://bitbucket.org/jstroschein/wordpress-3.5.1-clean.git | PHP | 256 lines
                    
88	$user_name = isset($_POST['user_name']) ? trim( stripslashes( $_POST['user_name'] ) ) : 'admin';
                    
89	$admin_password = isset($_POST['admin_password']) ? trim( stripslashes( $_POST['admin_password'] ) ) : '';
                    
90	$admin_email  = isset( $_POST['admin_email']  ) ? trim( stripslashes( $_POST['admin_email'] ) ) : '';
                    
117			<th scope="row">
                    
118				<label for="admin_password"><?php _e('Password, twice'); ?></label>
                    
119				<p><?php _e('A password will be automatically generated for you if you leave this blank.'); ?></p>
                    
122				<input name="admin_password" type="password" id="pass1" size="25" value="" />
                    
123				<p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p>
                    
124				<div id="pass-strength-result"><?php _e('Strength indicator'); ?></div>
                    
194		$admin_password = isset($_POST['admin_password']) ? $_POST['admin_password'] : '';
                    
195		$admin_password_check = isset($_POST['admin_password2']) ? $_POST['admin_password2'] : '';
                    
196		$admin_email  = isset( $_POST['admin_email']  ) ?trim( stripslashes( $_POST['admin_email'] ) ) : '';
                    
206			$error = true;
                    
207		} elseif ( $admin_password != $admin_password_check ) {
                    
208			// TODO: poka-yoke
                    
                
test_forms.py https://gitlab.com/eVotUM/webapp | Python | 229 lines
                    
44            'username': 'member',
                    
45            'password': 'password'
                    
46        }
                    
48            'username': 'responsible',
                    
49            'password': 'password'
                    
50        }
                    
89        num_members = 10
                    
90        strength = ElectoralAction.Strength.SIMPLE
                    
91        form = SecureActionKeysForm(
                    
91        form = SecureActionKeysForm(
                    
92            num_members=num_members, strength=strength,
                    
93            elec_proc_id=1
                    
99        num_members = 10
                    
100        strength = ElectoralAction.Strength.STRONG
                    
101        form = SecureActionKeysForm(
                    
                
reset.finish.html https://gitlab.com/pascalgrimaud/jhipster-test-gitlabci | HTML | 74 lines
                    
29                        <label class="control-label" for="password" data-translate="global.form.newpassword">New password</label>
                    
30                        <input type="password" class="form-control" id="password" name="password" placeholder="{{'global.form.newpassword.placeholder' | translate}}"
                    
31                               ng-model="vm.resetAccount.password" ng-minlength=4 ng-maxlength=50 required>
                    
41                            <p class="help-block"
                    
42                               ng-show="form.password.$error.maxlength" data-translate="global.messages.validate.newpassword.maxlength">
                    
43                                Your password cannot be longer than 50 characters.
                    
45                        </div>
                    
46                        <password-strength-bar password-to-check="vm.resetAccount.password"></password-strength-bar>
                    
47                    </div>
                    
50                        <label class="control-label" for="confirmPassword" data-translate="global.form.confirmpassword">New password confirmation</label>
                    
51                        <input type="password" class="form-control" id="confirmPassword" name="confirmPassword" placeholder="{{'global.form.confirmpassword.placeholder' | translate}}"
                    
52                               ng-model="vm.confirmPassword" ng-minlength=4 ng-maxlength=50 required>
                    
54                            <p class="help-block"
                    
55                               ng-show="form.confirmPassword.$error.required" data-translate="global.messages.validate.confirmpassword.required">
                    
56                                Your password confirmation is required.
                    
                
network_properties.cc https://github.com/chromium/chromium.git | C++ | 140 lines
                    
19      security(onc::wifi::kSecurityNone),
                    
20      signal_strength(0),
                    
21      auto_connect(false),
                    
43  wifi.Set(onc::wifi::kSecurity, security);
                    
44  wifi.Set(onc::wifi::kSignalStrength, static_cast<int>(signal_strength));
                    
45
                    
97      ssid = *ssid_ptr;
                    
98    const std::string* password_ptr = wifi->FindString(onc::wifi::kPassphrase);
                    
99    if (password_ptr)
                    
99    if (password_ptr)
                    
100      password = *password_ptr;
                    
101
                    
                
YAFMembershipPassThru.cs https://github.com/vzrus/YetAnotherForumExtraDataLayers.git | C# | 494 lines
                    
210    /// </returns>
                    
211    public override bool ChangePassword(string username, string oldPassword, string newPassword)
                    
212    {
                    
212    {
                    
213      return this._realProvider.ChangePassword(username, oldPassword, newPassword);
                    
214    }
                    
233    /// </returns>
                    
234    public override bool ChangePasswordQuestionAndAnswer(string username, string password, string newPasswordQuestion, string newPasswordAnswer)
                    
235    {
                    
235    {
                    
236      return this._realProvider.ChangePasswordQuestionAndAnswer(username, password, newPasswordQuestion, newPasswordAnswer);
                    
237    }
                    
277    {
                    
278      return this._realProvider.CreateUser(username, password, email, passwordQuestion, passwordAnswer, isApproved, providerUserKey, out status);
                    
279    }
                    
                
install.php https://github.com/chopsuei3/oscc.git | PHP | 256 lines
                    
88	$user_name = isset($_POST['user_name']) ? trim( wp_unslash( $_POST['user_name'] ) ) : '';
                    
89	$admin_password = isset($_POST['admin_password']) ? trim( wp_unslash( $_POST['admin_password'] ) ) : '';
                    
90	$admin_email  = isset( $_POST['admin_email']  ) ? trim( wp_unslash( $_POST['admin_email'] ) ) : '';
                    
117			<th scope="row">
                    
118				<label for="admin_password"><?php _e('Password, twice'); ?></label>
                    
119				<p><?php _e('A password will be automatically generated for you if you leave this blank.'); ?></p>
                    
122				<input name="admin_password" type="password" id="pass1" size="25" value="" />
                    
123				<p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p>
                    
124				<div id="pass-strength-result"><?php _e('Strength indicator'); ?></div>
                    
194		$admin_password = isset($_POST['admin_password']) ? wp_unslash( $_POST['admin_password'] ) : '';
                    
195		$admin_password_check = isset($_POST['admin_password2']) ? wp_unslash( $_POST['admin_password2'] ) : '';
                    
196		$admin_email  = isset( $_POST['admin_email']  ) ?trim( wp_unslash( $_POST['admin_email'] ) ) : '';
                    
206			$error = true;
                    
207		} elseif ( $admin_password != $admin_password_check ) {
                    
208			// TODO: poka-yoke
                    
                
SipCommandInterface.java https://github.com/semiecho/android_frameworks_base.git | Java | 403 lines
                    
60
                    
61    public void changeBarringPassword(String facility, String oldPwd,
                    
62            String newPwd, Message result) {
                    
143
                    
144    public void getSignalStrength (Message result) {
                    
145    }
                    
195
                    
196    public void setupDefaultPDP(String apn, String user, String password,
                    
197            Message result) {
                    
203    public void setupDataCall(String radioTechnology, String profile,
                    
204            String apn, String user, String password, String authType,
                    
205            String ipVersion,
                    
270
                    
271    public void queryFacilityLock (int slot, String aid, String facility, String password, int serviceClass,
                    
272        Message response) {
                    
                
0001_initial.py https://github.com/philippWassibauer/Maptales.git | Python | 173 lines
                    
102            'last_name': ('django.db.models.fields.CharField', [], {'max_length': '30', 'blank': 'True'}),
                    
103            'password': ('django.db.models.fields.CharField', [], {'max_length': '128'}),
                    
104            'user_permissions': ('django.db.models.fields.related.ManyToManyField', [], {'to': "orm['auth.Permission']", 'blank': 'True'}),
                    
135            'reflection_size': ('django.db.models.fields.FloatField', [], {'default': '0'}),
                    
136            'reflection_strength': ('django.db.models.fields.FloatField', [], {'default': '0.59999999999999998'}),
                    
137            'sharpness': ('django.db.models.fields.FloatField', [], {'default': '1.0'}),
                    
                
tls_srp.c https://bitbucket.org/freebsd/freebsd-base.git | C | 456 lines
                    
79
                    
80    s->srp_ctx.strength = ctx->srp_ctx.strength;
                    
81
                    
418
                    
419int SSL_CTX_set_srp_password(SSL_CTX *ctx, char *password)
                    
420{
                    
420{
                    
421    return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD, 0, password);
                    
422}
                    
423
                    
424int SSL_CTX_set_srp_strength(SSL_CTX *ctx, int strength)
                    
425{
                    
425{
                    
426    return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH, strength,
                    
427                         NULL);
                    
                
cryptLib.cfc https://bitbucket.org/farcry/core.git | ColdFusion CFScript | 95 lines
                    
32		
                    
33		<cfreturn findHash(hashedPassword=arguments.hashedPassword).passwordMatch(password=arguments.password,hashedPassword=arguments.hashedPassword) />
                    
34	</cffunction>
                    
42		
                    
43		<cfreturn not oHash.matchesHashFormat(arguments.hashedPassword) or not oHash.passwordMatch(password=arguments.password,hashedPassword=arguments.hashedPassword,bCheckHashStrength=true) />
                    
44	</cffunction>
                    
45
                    
46	<cffunction name="getDefaultHashName" access="public" returntype="PasswordHash" output="false" hint="Return the alias of the default algorithm used to encoded passwords">
                    
47
                    
78
                    
79	<cffunction name="findHash" access="public" output="false" returntype="PasswordHash" hint="Returns a PasswordHash component that can verify this hashed password">
                    
80		<cfargument name="hashedPassword" type="string" hint="Hashed password string" required="true" />
                    
90		</cfloop>
                    
91		<cfthrow message="Password hash does not match any available hash formats" detail="Hashed password did not match any available PasswordHash objects. Did you override or delete NullHash.cfc?" />
                    
92	</cffunction>
                    
                
UserEditTest.php https://gitlab.com/reasonat/test8 | PHP | 140 lines
                    
32    $this->drupalPostForm("user/" . $user1->id() . "/edit", $edit, t('Save'));
                    
33    $this->assertText(t("The specified passwords do not match."), 'Typing mismatched passwords displays an error message.');
                    
34
                    
37    $this->drupalPostForm("user/" . $user1->id() . "/edit", $edit, t('Save'));
                    
38    $this->assertText(t("The specified passwords do not match."), 'Typing mismatched passwords displays an error message.');
                    
39
                    
71
                    
72    // Test that the password strength indicator displays.
                    
73    $config = $this->config('user.settings');
                    
77    $this->drupalPostForm("user/" . $user1->id() . "/edit", $edit, t('Save'));
                    
78    $this->assertRaw(t('Password strength:'), 'The password strength indicator is displayed.');
                    
79
                    
81    $this->drupalPostForm("user/" . $user1->id() . "/edit", $edit, t('Save'));
                    
82    $this->assertNoRaw(t('Password strength:'), 'The password strength indicator is not displayed.');
                    
83
                    
                
lang_sql.php https://gitlab.com/phamngsinh/baitaplon_sinhvien | PHP | 185 lines
                    
3$lang['L_IMPORT_NOTABLE']="Es isch kei Tabälle für de Import ausgwählt!";
                    
4$lang['L_PASSWORD_STRENGTH']="Password strength";
                    
5$lang['L_SQL_WARNING']="D Uusfüerig vo SQL-Befähl cha Date manipuliere! Dr Autor übernimmt kei Haftig bi Dateverlüscht.";
                    
180$lang['L_USERNAME']="Username";
                    
181$lang['L_PASSWORD']="Password";
                    
182$lang['L_PASSWORD_REPEAT']="Password (repeat)";
                    
                
Attachments.java https://gitlab.com/g5863/che-banca-proposta | Java | 403 lines
                    
132	 * Password is optional. <br>
                    
133	 * If password is not null it will create a zip attachment with password.
                    
134	 * 
                    
135	 * @param zipName
                    
136	 * @param password
                    
137	 * @param attachments
                    
149	 * @param attachments
                    
150	 * @param password
                    
151	 * @return
                    
205		parameters.setCompressionLevel(Zip4jConstants.DEFLATE_LEVEL_NORMAL);
                    
206		if (password != null && !password.isEmpty()) {
                    
207			parameters.setEncryptFiles(true);
                    
209			parameters.setAesKeyStrength(Zip4jConstants.AES_STRENGTH_256);
                    
210			parameters.setPassword(password);
                    
211		}
                    
                
core.css https://github.com/claudinec/drupalmel.git | CSS | 655 lines
                    
221.page-content .password-description,
                    
222.page-content .password-strength,
                    
223.page-content div.description,
                    
                
utils.py https://github.com/dolph/keystone.git | Python | 270 lines
                    
158    """Hash a password. Hard."""
                    
159    password_utf8 = trunc_password(password).encode('utf-8')
                    
160    if passlib.hash.sha512_crypt.identify(password_utf8):
                    
166
                    
167def ldap_hash_password(password):
                    
168    """Hash a password. Hard."""
                    
168    """Hash a password. Hard."""
                    
169    password_utf8 = trunc_password(password).encode('utf-8')
                    
170    h = passlib.hash.ldap_salted_sha1.encrypt(password_utf8)
                    
176        return False
                    
177    password_utf8 = trunc_password(password).encode('utf-8')
                    
178    return passlib.hash.ldap_salted_sha1.verify(password_utf8, hashed)
                    
189        return False
                    
190    password_utf8 = trunc_password(password).encode('utf-8')
                    
191    return passlib.hash.sha512_crypt.verify(password_utf8, hashed)
                    
                
install.php https://github.com/muskmelon/Greemo.git | PHP | 264 lines
                    
86	$user_name = isset($_POST['user_name']) ? trim( stripslashes( $_POST['user_name'] ) ) : 'admin';
                    
87	$admin_password = isset($_POST['admin_password']) ? trim( stripslashes( $_POST['admin_password'] ) ) : '';
                    
88	$admin_email  = isset( $_POST['admin_email']  ) ? trim( stripslashes( $_POST['admin_email'] ) ) : '';
                    
115			<th scope="row">
                    
116				<label for="admin_password"><?php _e('Password, twice'); ?></label>
                    
117				<p><?php _e('A password will be automatically generated for you if you leave this blank.'); ?></p>
                    
120				<input name="admin_password" type="password" id="pass1" size="25" value="" />
                    
121				<p><input name="admin_password2" type="password" id="pass2" size="25" value="" /></p>
                    
122				<div id="pass-strength-result"><?php _e('Strength indicator'); ?></div>
                    
186		$admin_password = isset($_POST['admin_password']) ? $_POST['admin_password'] : '';
                    
187		$admin_password_check = isset($_POST['admin_password2']) ? $_POST['admin_password2'] : '';
                    
188		$admin_email  = isset( $_POST['admin_email']  ) ?trim( stripslashes( $_POST['admin_email'] ) ) : '';
                    
255 bad: "<?php echo esc_js( __( 'Weak' ) ); ?>",
                    
256 good: "<?php echo esc_js( _x( 'Medium', 'password strength' ) ); ?>",
                    
257 strong: "<?php echo esc_js( __( 'Strong' ) ); ?>",
                    
                
SecretKeyFactoryTest.java https://github.com/MIPS/libcore.git | Java | 170 lines
                    
49
                    
50        // PBEKeySpecs password only constructor
                    
51        try {
                    
63        try {
                    
64            KeySpec ks = new PBEKeySpec(PASSWORD);
                    
65            factory.generateSecret(ks);
                    
84        try {
                    
85            KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS);
                    
86            factory.generateSecret(ks);
                    
109    public void test_PBKDF2_b3059950() throws Exception {
                    
110        test_PBKDF2(PASSWORD, SALT, ITERATIONS, KEY_LENGTH,
                    
111                    new byte[] {
                    
124    public void test_PBKDF2_rfc3211_64() throws Exception {
                    
125        char[] password = "password".toCharArray();
                    
126        byte[] salt = new byte[] {
                    
                
aes-crypto-stream.js https://github.com/gildas-lormeau/zip.js.git | JavaScript | 278 lines
                    
69					signed,
                    
70					strength: strength - 1,
                    
71					pending: new Uint8Array(0)
                    
77					if (aesCrypto.password) {
                    
78						const password = aesCrypto.password;
                    
79						aesCrypto.password = null;
                    
202	const passwordVerificationKey = decrypt.keys.passwordVerification;
                    
203	if (passwordVerificationKey[0] != passwordVerification[0] || passwordVerificationKey[1] != passwordVerification[1]) {
                    
204		throw new Error(ERR_INVALID_PASSWORD);
                    
214async function createKeys(target, password, salt) {
                    
215	const encodedPassword = encodeText(password);
                    
216	const basekey = await importKey(RAW_FORMAT, encodedPassword, BASE_KEY_ALGORITHM, false, DERIVED_BITS_USAGE);
                    
221		authentication: toBits(codecBytes, subarray(compositeKey, KEY_LENGTH[target.strength], KEY_LENGTH[target.strength] * 2)),
                    
222		passwordVerification: subarray(compositeKey, KEY_LENGTH[target.strength] * 2)
                    
223	};
                    
                
util.py https://github.com/VUIIS/pyxnat_notes.git | Python | 391 lines
                    
37                    'dcmPatientName', 'session_type', 'modality',
                    
38                    'UID', 'coil', 'fieldStrength', 'marker',
                    
39                    'stabilization', 'studyType', 'patientID',
                    
49                    'validation_status', 'validation_date',
                    
50                    'validation_notes', 'coil', 'fieldStrength', 'marker',
                    
51                    'stabilization', 'orientation', 'scanTime',
                    
64def xnat(cfg=os.path.join(os.path.expanduser('~'), '.xnat.cfg'), server_url=None,
                    
65            username=None, password=None, cache=os.path.join(os.path.expanduser('~'), '.xnat.cache')):
                    
66    """Initialize and test xnat connection from a previously-stored cfg file
                    
75        user: [your user name]
                    
76        password: [your password]
                    
77        server: [your xnat server]
                    
82        user name
                    
83    password: str
                    
84        user password
                    
                
settings-page.php https://gitlab.com/najomie/fit-hippie | PHP | 162 lines
                    
15?>
                    
16	<p><?php esc_html_e( 'These are advanced settings that may be utilized to further strengthen the security of your WordPress site.', 'better-wp-security' ); ?></p>
                    
17<?php
                    
102			<td>
                    
103				<p><?php esc_html_e( 'WordPress\' XML-RPC feature allows hundreds of username and password guesses per request. Use the recommended "Block" setting below to prevent attackers from exploiting this feature.', 'better-wp-security' ); ?></p>
                    
104				<?php $form->add_select( 'allow_xmlrpc_multiauth', $allow_xmlrpc_multiauth_options ); ?>
                    
                
pwstrength.js https://gitlab.com/muhsen92/Mobile-Apps-Generator | JavaScript | 315 lines
                    
4/*
                    
5* jQuery Password Strength plugin for Twitter Bootstrap
                    
6*
                    
20            errorMessages: {
                    
21                password_to_short: "The Password is too short",
                    
22                same_as_username: "Your password cannot be the same as your username"
                    
73                        lenScore = (lenScore + score);
                    
74                        options.errors.push(options.errorMessages.password_to_short);
                    
75                    }
                    
116        setProgressBar = function ($el, score) {
                    
117            var options = $el.data("pwstrength"),
                    
118                progressbar = options.progressbar,
                    
122                if (options.viewports.verdict) {
                    
123                    $verdict = $(options.viewports.verdict).find(".password-verdict");
                    
124                } else {
                    
                
SipCommandInterface.java https://gitlab.com/brian0218/rk3066_r-box_android4.2.2_sdk | Java | 424 lines
                    
60
                    
61    public void changeBarringPassword(String facility, String oldPwd,
                    
62            String newPwd, Message result) {
                    
146
                    
147    public void getSignalStrength (Message result) {
                    
148    }
                    
190    public void setupDataCall(String radioTechnology, String profile,
                    
191            String apn, String user, String password, String authType,
                    
192            String protocol, Message result) {
                    
263    @Override
                    
264    public void queryFacilityLock(String facility, String password,
                    
265            int serviceClass, Message response) {
                    
268    @Override
                    
269    public void queryFacilityLockForApp(String facility, String password,
                    
270            int serviceClass, String appId, Message response) {
                    
                
es.js https://gitlab.com/t3rr0rz0n3/translations | JavaScript | 310 lines
                    
31    "Cancel": "",
                    
32    "Change password": "",
                    
33    "Clear all current filters (show all notes in the board)": "",
                    
74    "Enable sharing": "",
                    
75    "Enter a new password": "",
                    
76    "Enter a passphrase": "",
                    
156    "Passphrase": "",
                    
157    "Passphrase strength: ": "",
                    
158    "Password": "",
                    
158    "Password": "",
                    
159    "Passwords": "",
                    
160    "Paste this into another note to link to this one": "",
                    
225    "That passphrase is making me cringe.": "",
                    
226    "The current username/password you entered do not match the currently logged in user's": "",
                    
227    "There was a problem accepting that invite. Please try again.": "",
                    
                
OpenIDUserRequiredData.ascx https://bitbucket.org/kudutest2/kenticogit.git | ASP.NET | 111 lines
                    
2    Inherits="CMSWebParts_Membership_OpenID_OpenIDUserRequiredData" CodeFile="~/CMSWebParts/Membership/OpenID/OpenIDUserRequiredData.ascx.cs" %>
                    
3<%@ Register Src="~/CMSModules/Membership/FormControls/Passwords/PasswordStrength.ascx" TagName="PasswordStrength"
                    
4    TagPrefix="cms" %>
                    
33                                <td>
                    
34                                    <cms:LocalizedLabel ID="lblPassword" AssociatedControlID="txtPassword" ResourceString="general.password"
                    
35                                        DisplayColon="true" EnableViewState="false" runat="server" />
                    
37                                <td>
                    
38                                    <cms:CMSTextBox ID="txtPassword" TextMode="Password" runat="server" />
                    
39                                </td>
                    
78                                    <td class="FieldLabel FieldLabelTop">
                    
79                                        <cms:LocalizedLabel ID="lblPasswordNew" AssociatedControlID="passStrength" ResourceString="general.password"
                    
80                                            DisplayColon="true" EnableViewState="false" runat="server" />
                    
82                                    <td>
                    
83                                        <cms:PasswordStrength runat="server" ID="passStrength" TextBoxClass="" ValidationGroup="OpenIDNewUser" /> 
                    
84                                    </td>
                    
                
FacebookUsersRequiredData.ascx https://bitbucket.org/kudutest2/kenticogit.git | ASP.NET | 111 lines
                    
2    Inherits="CMSWebParts_Membership_FacebookConnect_FacebookUsersRequiredData" CodeFile="~/CMSWebParts/Membership/FacebookConnect/FacebookUsersRequiredData.ascx.cs" %>
                    
3<%@ Register Src="~/CMSModules/Membership/FormControls/Passwords/PasswordStrength.ascx" TagName="PasswordStrength"
                    
4    TagPrefix="cms" %>
                    
33                                <td>
                    
34                                    <cms:LocalizedLabel ID="lblPassword" AssociatedControlID="txtPassword" ResourceString="general.password"
                    
35                                        DisplayColon="true" EnableViewState="false" runat="server" />
                    
37                                <td>
                    
38                                    <cms:CMSTextBox ID="txtPassword" TextMode="Password" runat="server" />
                    
39                                </td>
                    
78                                    <td>
                    
79                                        <cms:LocalizedLabel ID="lblPasswordNew" AssociatedControlID="passStrength" ResourceString="general.password"
                    
80                                            DisplayColon="true" EnableViewState="false" runat="server" />
                    
82                                    <td>
                    
83                                        <cms:PasswordStrength runat="server" ID="passStrength" TextBoxClass=""  ValidationGroup="NewFacebookUser"/> 
                    
84                                    </td>
                    
                
Customer_Edit_General.aspx https://bitbucket.org/kudutest2/kenticogit.git | ASP.NET | 283 lines
                    
14    TagName="DiscountLevelSelector" TagPrefix="cms" %>
                    
15<%@ Register Src="~/CMSModules/Membership/FormControls/Passwords/PasswordStrength.ascx" TagName="PasswordStrength"
                    
16    TagPrefix="cms" %>
                    
153                        <td class="FieldLabel FieldLabelTop">
                    
154                            <asp:Label runat="server" ID="lblPassword1" EnableViewState="false" />
                    
155                        </td>
                    
156                        <td>
                    
157                            <cms:PasswordStrength runat="server" ID="passStrength" AllowEmpty="true"/> 
                    
158                        </td>
                    
166                        <td>
                    
167                            <cms:CMSTextBox ID="txtPassword2" runat="server" CssClass="TextBoxField" TextMode="Password"
                    
168                                MaxLength="100" EnableViewState="false" />
                    
170                        <td>
                    
171                            <cms:CMSRequiredFieldValidator ID="rqvPassword2" runat="server" ControlToValidate="txtPassword2"
                    
172                                ValidationGroup="Login" EnableViewState="false" />
                    
                
user.php https://github.com/IlchCMS/Ilch-1.1.git | PHP | 374 lines
                    
81    }
                    
82    return md5($plainPassword);
                    
83}
                    
84
                    
85function user_pw_check($plainPassword, &$passwordHash, $userId = false) {
                    
86    if (version_compare(PHP_VERSION, '5.0') !== -1) {
                    
88        $correct = $pwCrypt->checkPasswd($plainPassword, $passwordHash);
                    
89        if ($correct && $userId !== false && $pwCrypt->checkHashStrength($passwordHash)) {
                    
90            $passwordHash = $pwCrypt->cryptPasswd($plainPassword);
                    
91            if ($passwordHash) {
                    
92                db_query('UPDATE `prefix_user` SET `pass` = "' . $passwordHash . '" WHERE `id` = ' . $userId);
                    
93            }
                    
96    }
                    
97    return md5($plainPassword) === $passwordHash;
                    
98}
                    
                
lang_sql.php https://gitlab.com/phamngsinh/baitaplon_sinhvien | PHP | 188 lines
                    
3$lang['L_IMPORT_NOTABLE']="Không có bảng được lựa chọn nhập vào (import)!";
                    
4$lang['L_PASSWORD_STRENGTH']="Password strength";
                    
5$lang['L_SQL_WARNING']="Sự thực hiện những câu lệnh SQL có thể thao tác vào dữ liệu. Cẩn thận! Tác giả không chấp nhận đền bù bất kỳ thiệt hại nào nếu dữ liệu bị hư hại hay bị mất.";
                    
183$lang['L_USERNAME']="Username";
                    
184$lang['L_PASSWORD']="Password";
                    
185$lang['L_PASSWORD_REPEAT']="Password (repeat)";
                    
                
SimplePasswordStrengthChecker.java https://bitbucket.org/cprenzberg/wildfly.git | Java | 384 lines
                    
37import org.jboss.as.domain.management.security.password.PasswordStrengthCheckResult;
                    
38import org.jboss.as.domain.management.security.password.PasswordStrengthChecker;
                    
39import org.jboss.as.domain.management.security.password.RegexRestriction;
                    
44 */
                    
45public class SimplePasswordStrengthChecker implements PasswordStrengthChecker {
                    
46
                    
100
                    
101    public SimplePasswordStrengthChecker(final List<PasswordRestriction> initRestrictions, final Dictionary dictionary,
                    
102            final Keyboard keyboard) {
                    
113     *
                    
114     * @see org.jboss.as.domain.management.security.password.PasswordStrengthChecker#check(java.lang.String, java.util.List)
                    
115     */
                    
116    @Override
                    
117    public PasswordStrengthCheckResult check(String password, List<PasswordRestriction> restictions) {
                    
118        try {
                    
                
PdfCopyFields.java https://gitlab.com/essere.lab.public/qualitas.class-corpus | Java | 237 lines
                    
126     * @param userPassword the user password. Can be null or empty
                    
127     * @param ownerPassword the owner password. Can be null or empty
                    
128     * @param permissions the user permissions
                    
131     */
                    
132    public void setEncryption(byte userPassword[], byte ownerPassword[], int permissions, boolean strength128Bits) throws DocumentException {
                    
133    	fc.setEncryption(userPassword, ownerPassword, permissions, strength128Bits ? PdfWriter.STANDARD_ENCRYPTION_128 : PdfWriter.STANDARD_ENCRYPTION_40);
                    
137     * Sets the encryption options for this document. The userPassword and the
                    
138     *  ownerPassword can be null or have zero length. In this case the ownerPassword
                    
139     *  is replaced by a random string. The open permissions for the document can be
                    
143     * @param strength true for 128 bit key length. false for 40 bit key length
                    
144     * @param userPassword the user password. Can be null or empty
                    
145     * @param ownerPassword the owner password. Can be null or empty
                    
149    public void setEncryption(boolean strength, String userPassword, String ownerPassword, int permissions) throws DocumentException {
                    
150        setEncryption(DocWriter.getISOBytes(userPassword), DocWriter.getISOBytes(ownerPassword), permissions, strength);
                    
151    }
                    
                
scripts.php https://github.com/strangerstudios/paid-memberships-pro.git | PHP | 145 lines
                    
67                            plugins_url( 'js/pmpro-login.js', dirname(__FILE__) ),
                    
68                            array( 'jquery', 'password-strength-meter' ),
                    
69                            PMPRO_VERSION );
                    
72         * Filter to allow weak passwords on the 
                    
73         * change password and reset password forms.
                    
74         * At this time, this only disables the JS check on the frontend.
                    
78         *
                    
79         * @param bool $allow_weak_passwords    Whether to allow weak passwords.
                    
80         */
                    
80         */
                    
81        $allow_weak_passwords = apply_filters( 'pmpro_allow_weak_passwords', false );
                    
82
                    
84            'pmpro_login_page' => 'changepassword',
                    
85			'strength_indicator_text' => __( 'Strength Indicator', 'paid-memberships-pro' ),
                    
86            'allow_weak_passwords' => $allow_weak_passwords ) );
                    
                
register.component.html https://gitlab.com/bourd0n/zakupki | HTML | 131 lines
                    
76                    <label class="form-control-label" for="password" jhiTranslate="global.form.newpassword">New password</label>
                    
77                    <input type="password" class="form-control" id="password" name="password" #password="ngModel" placeholder="{{'global.form.newpassword.placeholder' | translate}}"
                    
78                            [(ngModel)]="registerAccount.password" minlength=4 maxlength=50 required>
                    
78                            [(ngModel)]="registerAccount.password" minlength=4 maxlength=50 required>
                    
79                    <div *ngIf="password.dirty && password.invalid">
                    
80                        <small class="form-text text-danger" *ngIf="password.errors.required"
                    
92                    </div>
                    
93                    <jhi-password-strength-bar [passwordToCheck]="registerAccount.password"></jhi-password-strength-bar>
                    
94                </div>
                    
96                    <label class="form-control-label" for="confirmPassword" jhiTranslate="global.form.confirmpassword">New password confirmation</label>
                    
97                    <input type="password" class="form-control" id="confirmPassword" name="confirmPassword" #confirmPasswordInput="ngModel" placeholder="{{'global.form.confirmpassword.placeholder' | translate}}"
                    
98                            [(ngModel)]="confirmPassword" minlength=4 maxlength=50 required>
                    
119                <span jhiTranslate="global.messages.info.authenticated.prefix">If you want to </span>
                    
120                <a class="alert-link" (click)="openLogin()" jhiTranslate="global.messages.info.authenticated.link">sign in</a><span jhiTranslate="global.messages.info.authenticated.suffix">, you can try the default accounts:<br/>- Administrator (login="admin" and password="admin") <br/>- User (login="user" and password="user").</span>
                    
121            </div>
                    
                
encryptalltest.php https://gitlab.com/wuhang2003/core | PHP | 335 lines
                    
220		$encryptAll->expects($this->once())->method('setupUserFS')->with('user1');
                    
221		$encryptAll->expects($this->once())->method('generateOneTimePassword')->with('user1')->willReturn('password');
                    
222		$this->setupUser->expects($this->once())->method('setupUser')->with('user1', 'password');
                    
225
                    
226		$userPasswords = $this->invokePrivate($encryptAll, 'userPasswords');
                    
227
                    
325	public function testGenerateOneTimePassword() {
                    
326		$password = $this->invokePrivate($this->encryptAll, 'generateOneTimePassword', ['user1']);
                    
327		$this->assertTrue(is_string($password));
                    
329
                    
330		$userPasswords = $this->invokePrivate($this->encryptAll, 'userPasswords');
                    
331		$this->assertSame(1, count($userPasswords));
                    
331		$this->assertSame(1, count($userPasswords));
                    
332		$this->assertSame($password, $userPasswords['user1']);
                    
333	}
                    
                
main.css https://gitlab.com/atomfrede/jhipster-ci-example-gradle | CSS | 334 lines
                    
184/* ==========================================================================
                    
185start Password strength bar style
                    
186========================================================================== */
                    
186========================================================================== */
                    
187ul#strengthBar {
                    
188    display:inline;
                    
                
wifi_utils_test.js https://gitlab.com/lcuguen/gaia | JavaScript | 439 lines
                    
154      identity = dialog.querySelector('input[name=identity]');
                    
155      password = dialog.querySelector('input[name=password]');
                    
156      authPhase2 = dialog.querySelector('li.auth-phase2 select');
                    
176      assert.equal(identity.parentNode.style.display, 'none');
                    
177      assert.equal(password.parentNode.style.display, 'block');
                    
178      assert.equal(authPhase2.parentNode.parentNode.style.display, 'none');
                    
186      assert.equal(identity.parentNode.style.display, 'none');
                    
187      assert.equal(password.parentNode.style.display, 'none');
                    
188      assert.equal(authPhase2.parentNode.parentNode.style.display, 'none');
                    
216      assert.equal(identity.parentNode.style.display, 'block');
                    
217      assert.equal(password.parentNode.style.display, 'block');
                    
218      assert.equal(authPhase2.parentNode.parentNode.style.display, 'block');
                    
225      assert.equal(identity.parentNode.style.display, 'none');
                    
226      assert.equal(password.parentNode.style.display, 'none');
                    
227    });
                    
                
gebo_forms.js https://gitlab.com/ergouge/tea | JavaScript | 470 lines
                    
45		
                    
46		//* password strength checker
                    
47		gebo_pass_check.init();
                    
454	
                    
455	//* password strength checker
                    
456	gebo_pass_check = {
                    
459					minimumChars: '6',
                    
460					strengthScaleFactor: '0.8'
                    
461				}, function (valid, complexity) {
                    
                
register.php https://gitlab.com/thongta/fituet | PHP | 430 lines
                    
93					<label
                    
94						for="signup_password"><?php _e( 'Choose a Password', 'buddypress' ); ?><?php _e( '(required)', 'buddypress' ); ?></label>
                    
95					<?php
                    
97					/**
                    
98					 * Fires and displays any member registration password errors.
                    
99					 *
                    
102					do_action( 'bp_signup_password_errors' ); ?>
                    
103					<input type="password" name="signup_password" id="signup_password" value=""
                    
104						   class="password-entry" <?php bp_form_field_attributes( 'password' ); ?>/>
                    
108					<label
                    
109						for="signup_password_confirm"><?php _e( 'Confirm Password', 'buddypress' ); ?><?php _e( '(required)', 'buddypress' ); ?></label>
                    
110					<?php
                    
117					do_action( 'bp_signup_password_confirm_errors' ); ?>
                    
118					<input type="password" name="signup_password_confirm" id="signup_password_confirm" value=""
                    
119						   class="password-entry-confirm" <?php bp_form_field_attributes( 'password' ); ?>/>
                    
                
index.html.md https://gitlab.com/nick.volynkin/www-gitlab-com | Markdown | 139 lines
                    
16in this list experience longer delays in receiving responses. We are actively [hiring](/jobs/)
                    
17more Support Engineers to strengthen the team and provide support to the community.
                    
18
                    
76
                    
77The key used to encode/decode PGP messages is stored in our Support Vault on 1Password.
                    
78We only provide our public PGP key upon request because it makes collaborating much
                    
                
peloton.py https://gitlab.com/vitalii.dr/yt-dlp | Python | 221 lines
                    
28            'id': '0e9653eb53544eeb881298c8d7a87b86',
                    
29            'title': '20 min Chest & Back Strength',
                    
30            'ext': 'mp4',
                    
37            'duration': 1389,
                    
38            'categories': ['Strength'],
                    
39            'tags': ['Workout Mat', 'Light Weights', 'Medium Weights'],
                    
77    def _login(self, video_id):
                    
78        username, password = self._get_login_info()
                    
79        if not (username and password):
                    
85                    'username_or_email': username,
                    
86                    'password': password,
                    
87                    'with_pubsub': False
                    
                
mail.py https://github.com/raminel/geraldo.git | Python | 371 lines
                    
113        self.username = username or settings.EMAIL_HOST_USER
                    
114        self.password = password or settings.EMAIL_HOST_PASSWORD
                    
115        self.use_tls = (use_tls is not None) and use_tls or settings.EMAIL_USE_TLS
                    
330    If auth_user is None, the EMAIL_HOST_USER setting is used.
                    
331    If auth_password is None, the EMAIL_HOST_PASSWORD setting is used.
                    
332
                    
335    """
                    
336    connection = SMTPConnection(username=auth_user, password=auth_password,
                    
337                                fail_silently=fail_silently)
                    
349    If auth_user is None, the EMAIL_HOST_USER setting is used.
                    
350    If auth_password is None, the EMAIL_HOST_PASSWORD setting is used.
                    
351
                    
354    """
                    
355    connection = SMTPConnection(username=auth_user, password=auth_password,
                    
356                                fail_silently=fail_silently)
                    
                
RegistrationForm.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 1053 lines
                    
103        {
                    
104            return DataHelper.GetNotEmpty(this.GetValue("PasswordText"), ResHelper.LocalizeString("{$Webparts_Membership_RegistrationForm.Password$}"));
                    
105        }
                    
465            lblEmail.Text = this.EmailText;
                    
466            lblPassword.Text = this.PasswordText;
                    
467            lblConfirmPassword.Text = this.ConfirmPasswordText;
                    
494            // WAI validation
                    
495            lblPassword.AssociatedControlClientID = passStrength.InputClientID;
                    
496        }
                    
562            // Check whether password is same
                    
563            if (passStrength.Text != txtConfirmPassword.Text)
                    
564            {
                    
569
                    
570            if ((this.PasswordMinLength > 0) && (passStrength.Text.Length < this.PasswordMinLength))
                    
571            {
                    
                
LiveIDUsersRequiredData.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 546 lines
                    
281                // WAI validation
                    
282                lblPasswordNew.AssociatedControlClientID = passStrength.InputClientID;
                    
283            }
                    
368
                    
369            string password = passStrength.Text.Trim();
                    
370
                    
370
                    
371            // If password is enabled to set, check it
                    
372            if (plcPasswordNew.Visible && (errorMessage == String.Empty))
                    
377                }
                    
378                else if (password != txtConfirmPassword.Text.Trim())
                    
379                {
                    
439                        {
                    
440                            UserInfoProvider.SetPassword(ui, password);
                    
441
                    
                
OpenIDUserRequiredData.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 654 lines
                    
140    /// <summary>
                    
141    /// Gets or sets the value which enables abitity of new user to set password.
                    
142    /// </summary>
                    
151            SetValue("AllowFormsAuthentication", value);
                    
152            plcPasswordNew.Visible = value;
                    
153        }
                    
168            SetValue("AllowExistingUser", value);
                    
169            plcPasswordNew.Visible = value;
                    
170        }
                    
442            string siteName = CMSContext.CurrentSiteName;
                    
443            string password = passStrength.Text;
                    
444
                    
451                }
                    
452                else if (password != txtConfirmPassword.Text.Trim())
                    
453                {
                    
                
LinkedInUsersRequiredData.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 594 lines
                    
353                // Try to authenticate user
                    
354                UserInfo ui = UserInfoProvider.AuthenticateUser(txtUserName.Text, txtPassword.Text, CMSContext.CurrentSiteName);
                    
355
                    
395
                    
396            string password = passStrength.Text;
                    
397
                    
400            {
                    
401                if (String.IsNullOrEmpty(password))
                    
402                {
                    
404                }
                    
405                else if (password != txtConfirmPassword.Text.Trim())
                    
406                {
                    
460                        {
                    
461                            UserInfoProvider.SetPassword(ui, password);
                    
462
                    
                
FacebookUsersRequiredData.ascx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 553 lines
                    
379        {
                    
380            string password = passStrength.Text;
                    
381            string currentSiteName = CMSContext.CurrentSiteName;
                    
389            {
                    
390                if (String.IsNullOrEmpty(password))
                    
391                {
                    
393                }
                    
394                else if (password != txtConfirmPassword.Text.Trim())
                    
395                {
                    
395                {
                    
396                    errorMessage = GetString("webparts_membership_registrationform.passwordonotmatch");
                    
397                }
                    
444                        {
                    
445                            UserInfoProvider.SetPassword(ui, password);
                    
446
                    
                
User_Edit_Password.aspx.cs https://bitbucket.org/kudutest2/kenticogit.git | C# | 462 lines
                    
54    {
                    
55        ButtonSetPassword.Text = GetString("Administration-User_Edit_Password.SetPassword");
                    
56        LabelPassword.Text = GetString("Administration-User_Edit_Password.NewPassword");
                    
56        LabelPassword.Text = GetString("Administration-User_Edit_Password.NewPassword");
                    
57        LabelConfirmPassword.Text = GetString("Administration-User_Edit_Password.ConfirmPassword");
                    
58        this.chkSendEmail.Text = GetString("Administration-User_Edit_Password.SendEmail");
                    
87                        {
                    
88                            passStrength.TextBoxAttributes.Add("value", hiddenPassword);
                    
89                            TextBoxConfirmPassword.Attributes.Add("value", hiddenPassword);
                    
219                {
                    
220                    if (passStrength.Text != hiddenPassword) //password has been changed
                    
221                    {
                    
281                this.passStrength.TextBoxAttributes.Add("value", hiddenPassword);
                    
282                this.TextBoxConfirmPassword.Attributes.Add("value", hiddenPassword);
                    
283            }
                    
                
ShoppingCartCheckRegistration.ascx https://bitbucket.org/kudutest2/kenticogit.git | ASP.NET | 393 lines
                    
2    CodeFile="ShoppingCartCheckRegistration.ascx.cs" %>
                    
3<%@ Register Src="~/CMSModules/Membership/FormControls/Passwords/PasswordStrength.ascx"
                    
4    TagName="PasswordStrength" TagPrefix="cms" %>
                    
36                            <td>
                    
37                                <cms:CMSTextBox ID="txtPsswd1" runat="server" TextMode="password" CssClass="TextBoxField"
                    
38                                    MaxLength="100" EnableViewState="false" />
                    
48                            <td colspan="2">
                    
49                                <asp:Panel ID="pnlPasswdRetrieval" runat="server" CssClass="LoginPanelPasswordRetrieval">
                    
50                                    <table cellpadding="0" cellspacing="0">
                    
52                                            <td>
                    
53                                                <asp:Label ID="lblPasswdRetrieval" AssociatedControlID="txtPasswordRetrieval" runat="server"
                    
54                                                    EnableViewState="false" />
                    
195                            <td>
                    
196                                <cms:PasswordStrength runat="server" ID="passStrength" />
                    
197                                <div>
                    
                
CMS_AlternativeForm.sql https://bitbucket.org/kudutest2/kenticogit.git | SQL | 353 lines
                    
1SET IDENTITY_INSERT [CMS_AlternativeForm] ON
                    
2INSERT INTO [CMS_AlternativeForm] ([FormID], [FormDisplayName], [FormName], [FormClassID], [FormDefinition], [FormLayout], [FormGUID], [FormLastModified], [FormCoupledClassID]) VALUES (124, N'Registration form', N'RegistrationForm', 59, N'<form><field column="UserID" visible="false" /><field column="UserName" fieldcaption="User name"><settings><controlname>username</controlname></settings></field><field column="FirstName" fieldcaption="First name" minstringlength="1" validationerrormessage="Please enter some first name." /><field column="MiddleName" visible="false" /><field column="LastName" fieldcaption="Last name" minstringlength="1" validationerrormessage="Please enter some last name." /><field column="FullName" fieldcaption="Full name" visible="false" allowempty="false" /><field column="Email" minstringlength="5" validationerrormessage="Please enter some email."><settings><controlname>emailinput</controlname></settings></field><field column="UserPassword" fieldcaption="Password" minstringlength="2"><settings><controlname>passwordconfirmator</controlname><showstrength>True</showstrength></settings></field><field column="PreferredCultureCode" visible="false" /><field column="PreferredUICultureCode" visible="false" /><field column="UserEnabled" visible="false" defaultvalue="false" /><field column="UserIsEditor" visible="false" defaultvalue="false" /><field column="UserIsGlobalAdministrator" visible="false" defaultvalue="false" /><field column="UserIsExternal" visible="false" defaultvalue="false" /><field column="UserPasswordFormat" visible="false" /><field column="UserCreated" visible="false"><settings><editTime>false</editTime></settings></field><field column="LastLogon" visible="false"><settings><editTime>false</editTime></settings></field><field column="UserStartingAliasPath" visible="false" /><field column="UserGUID" visible="false" /><field column="UserLastModified" visible="false"><settings><editTime>false</editTime></settings></field><field column="UserLastLogonInfo" visible="false" /><field column="UserIsHidden" visible="false" defaultvalue="false" /><field column="UserVisibility" visible="false" /><field column="UserSettingsID" visible="false" /><field column="UserNickName" visible="false" /><field column="UserPicture" visible="false" /><field column="UserSignature" visible="false" /><field column="UserURLReferrer" visible="false" /><field column="UserCampaign" visible="false" /><field column="UserMessagingNotificationEmail" visible="false" /><field column="UserCustomData" visible="false" /><field column="UserRegistrationInfo" visible="false" /><field column="UserPreferences" visible="false" /><field column="UserActivationDate" visible="false" /><field column="UserActivatedByUserID" visible="false" /><field column="UserTimeZoneID" fieldcaption="Time zone" visible="false"><settings><controlname>timezoneselector</controlname></settings></field><field column="UserAvatarID" fieldcaption="Avatar" visible="false"><settings><controlname>useravatarselector</controlname></settings></field><field column="UserBadgeID" visible="false" /><field column="UserShowSplashScreen" visible="false" /><field column="UserActivityPoints" visible="false" /><field column="UserForumPosts" visible="false" /><field column="UserBlogComments" visible="false" /><field column="UserGender" fieldcaption="Gender"><settings><controlname>radiobuttonscontrol</controlname><repeatdirection>horizontal</repeatdirection><options>&lt;item value="1" text="{$general.male$}" /&gt;&lt;item value="2" text="{$general.female$}" /&gt;</options></settings></field><field column="UserDateOfBirth" fieldcaption="Date of birth" visible="false"><settings><EditTime>false</EditTime></settings></field><field column="UserMessageBoardPosts" visible="false" /><field column="UserSettingsUserGUID" visible="false" /><field column="UserSettingsUserID" visible="false" /><field column="UserBlogPosts" visible="false" /></form>', N'<table class="CustomRegistrationForm">
                    
3	<tbody>
                    
29			<td style="vertical-align: top; padding-top: 6px;" valign="top">
                    
30				<span class="EditingFormLabel">$$label:UserPassword$$</span>
                    
31				<div style="margin-top: 44px;">
                    
31				<div style="margin-top: 44px;">
                    
32					<span class="EditingFormLabel">Confirm password:</span></div>
                    
33			</td>
                    
34			<td>
                    
35				$$input:UserPassword$$$$validation:UserPassword$$</td>
                    
36		</tr>
                    
44</table>', '005a6c1c-a442-4229-ba5c-80f423dea704', '20111021 17:17:12', 1768)
                    
45INSERT INTO [CMS_AlternativeForm] ([FormID], [FormDisplayName], [FormName], [FormClassID], [FormDefinition], [FormLayout], [FormGUID], [FormLastModified], [FormCoupledClassID]) VALUES (125, N'Display profile', N'DisplayProfile', 59, N'<form><field column="UserID" visible="false" dependsonanotherfield="false" /><field column="UserName" fieldcaption="Name" dependsonanotherfield="false"><settings><controlname>viewsecuretext</controlname></settings></field><field column="FirstName" visible="false" dependsonanotherfield="false" /><field column="MiddleName" visible="false" dependsonanotherfield="false" /><field column="LastName" visible="false" dependsonanotherfield="false" /><field column="FullName" fieldcaption="Full name" dependsonanotherfield="false"><settings><controlname>viewsecuretext</controlname></settings></field><field column="Email" visibility="authenticated" dependsonanotherfield="false"><settings><controlname>labelcontrol</controlname><FilterMode /><FilterEnabled /></settings></field><field column="UserPassword" visible="false" dependsonanotherfield="false" /><field column="PreferredCultureCode" visible="false" dependsonanotherfield="false" /><field column="PreferredUICultureCode" visible="false" dependsonanotherfield="false" /><field column="UserEnabled" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserIsEditor" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserIsGlobalAdministrator" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserIsExternal" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserPasswordFormat" visible="false" dependsonanotherfield="false" /><field column="UserCreated" fieldcaption="Created" dependsonanotherfield="false"><settings><controlname>viewdate</controlname></settings></field><field column="LastLogon" visible="false" dependsonanotherfield="false"><settings><editTime>false</editTime></settings></field><field column="UserStartingAliasPath" visible="false" dependsonanotherfield="false" /><field column="UserGUID" visible="false" dependsonanotherfield="false" /><field column="UserLastModified" visible="false" dependsonanotherfield="false"><settings><editTime>false</editTime></settings></field><field column="UserLastLogonInfo" visible="false" dependsonanotherfield="false" /><field column="UserIsHidden" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserVisibility" visible="false" dependsonanotherfield="false" /><field column="UserIsDomain" dependsonanotherfield="false" /><field column="UserHasAllowedCultures" dependsonanotherfield="false" /><field column="UserSiteManagerDisabled" dependsonanotherfield="false" /><field column="UserSettingsID" visible="false" dependsonanotherfield="false" /><field column="UserNickName" dependsonanotherfield="false" /><field column="UserPicture" visible="false" dependsonanotherfield="false" /><field column="UserSignature" visible="false" dependsonanotherfield="false" /><field column="UserURLReferrer" visible="false" dependsonanotherfield="false" /><field column="UserCampaign" visible="false" dependsonanotherfield="false" /><field column="UserMessagingNotificationEmail" visible="false" dependsonanotherfield="false" /><field column="UserCustomData" visible="false" dependsonanotherfield="false" /><field column="UserRegistrationInfo" visible="false" dependsonanotherfield="false" /><field column="UserPreferences" visible="false" dependsonanotherfield="false" /><field column="UserActivationDate" visible="false" dependsonanotherfield="false"><settings><controlname>viewdate</controlname></settings></field><field column="UserActivatedByUserID" visible="false" dependsonanotherfield="false" /><field column="UserTimeZoneID" visible="false" dependsonanotherfield="false" /><field column="UserAvatarID" dependsonanotherfield="false"><settings><controlname>viewuseravatar</controlname></settings></field><field column="UserBadgeID" fieldcaption="Badge" dependsonanotherfield="false"><settings><controlname>viewbadgeimage</controlname></settings></field><field column="UserShowSplashScreen" visible="false" defaultvalue="false" dependsonanotherfield="false" /><field column="UserActivityPoints" fieldcaption="Community points" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserForumPosts" fieldcaption="Forum posts" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserBlogComments" fieldcaption="Blog comments" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserGender" fieldcaption="Gender" dependsonanotherfield="false"><settings><controlname>viewusergender</controlname></settings></field><field column="UserDateOfBirth" fieldcaption="Date of birth" dependsonanotherfield="false" visibility=""><settings><controlname>viewdate</controlname><DisplayNow /><TimeZoneType /><EditTime /></settings></field><field column="UserMessageBoardPosts" fieldcaption="Message board posts" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserSettingsUserGUID" visible="false" dependsonanotherfield="false" /><field column="UserSettingsUserID" visible="false" dependsonanotherfield="false" /><field column="WindowsLiveID" dependsonanotherfield="false" /><field column="UserBlogPosts" fieldcaption="Blog posts" dependsonanotherfield="false"><settings><controlname>viewintegernumber</controlname></settings></field><field column="UserWaitingForApproval" dependsonanotherfield="false" /><field column="UserDialogsConfiguration" dependsonanotherfield="false" /><field column="UserDescription" dependsonanotherfield="false" /><field column="UserUsedWebParts" dependsonanotherfield="false" /><field column="UserUsedWidgets" dependsonanotherfield="false" /><field column="UserFacebookID" dependsonanotherfield="false" /><field column="UserAuthenticationGUID" dependsonanotherfield="false" /><field column="UserSkype" dependsonanotherfield="false" /><field column="UserIM" dependsonanotherfield="false" /><field column="UserPhone" dependsonanotherfield="false" /><field column="UserPosition" dependsonanotherfield="false" /><field column="UserBounces" dependsonanotherfield="false" /></form>', N'<table cellpadding="2">
                    
46    <tbody>
                    
                
LdapUtils.java https://github.com/frett/cas.git | Java | 1040 lines
                    
87import org.ldaptive.sasl.SaslConfig;
                    
88import org.ldaptive.sasl.SecurityStrength;
                    
89import org.ldaptive.ssl.KeyStoreCredentialConfig;
                    
306     * @param connectionFactory the connection factory
                    
307     * @param oldPassword       the old password
                    
308     * @param newPassword       the new password
                    
313                                                         final ConnectionFactory connectionFactory,
                    
314                                                         final String oldPassword,
                    
315                                                         final String newPassword,
                    
319                && !modifyConnection.getConnectionConfig().getUseStartTLS()) {
                    
320                LOGGER.warn("Executing password modification op under a non-secure LDAP connection; "
                    
321                    + "To modify password attributes, the connection to the LDAP server SHOULD be secured and/or encrypted.");
                    
334            val response = operation.execute(new PasswordModifyRequest(currentDn,
                    
335                StringUtils.isNotBlank(oldPassword) ? new Credential(oldPassword) : null,
                    
336                new Credential(newPassword)));
                    
                
CAS-Protocol-Specification.md https://github.com/frett/cas.git | Markdown | 1299 lines
                    
43It permits a user to access multiple applications while providing their
                    
44credentials (such as userid and password) only once to a central CAS Server
                    
45application.
                    
146    > only secure protocols such as `https` be allowed for client applications
                    
147    > for further strengthen the authenticating client.
                    
148
                    
191
                    
192Don't prompt for username/password:
                    
193
                    
195
                    
196Always prompt for username/password:
                    
197
                    
299
                    
300-   `password` [REQUIRED] - the password of the client that is trying to log in
                    
301
                    
                
Configuration-Properties-Common.md https://github.com/frett/cas.git | Markdown | 1112 lines
                    
99Certain aspects of CAS such as authentication handling support configuration of
                    
100password encoding. Most options are based on Spring Security's [support for password encoding](http://docs.spring.io/spring-security/site/docs/current/apidocs/org/springframework/security/crypto/password/PasswordEncoder.html).
                    
101
                    
108# ${configurationKey}.passwordEncoder.secret=
                    
109# ${configurationKey}.passwordEncoder.strength=16
                    
110```
                    
117| `DEFAULT`               | Use the `DefaultPasswordEncoder` of CAS. For message-digest algorithms via `characterEncoding` and `encodingAlgorithm`.
                    
118| `BCRYPT`                | Use the `BCryptPasswordEncoder` based on the `strength` provided and an optional `secret`.     
                    
119| `SCRYPT`                | Use the `SCryptPasswordEncoder`.
                    
119| `SCRYPT`                | Use the `SCryptPasswordEncoder`.
                    
120| `PBKDF2`                | Use the `Pbkdf2PasswordEncoder` based on the `strength` provided and an optional `secret`.  
                    
121| `STANDARD`              | Use the `StandardPasswordEncoder` based on the `secret` provided.  
                    
121| `STANDARD`              | Use the `StandardPasswordEncoder` based on the `secret` provided.  
                    
122| `org.example.MyEncoder` | An implementation of `PasswordEncoder` of your own choosing.
                    
123| `file:///path/to/script.groovy` | Path to a Groovy script charged with handling password encoding operations.
                    
                
wp-admin-rtl.css https://bitbucket.org/jstroschein/wordpress-3.5.1-clean.git | CSS | 2633 lines
                    
107
                    
108#pass-strength-result {
                    
109	float: right;
                    
124
                    
125input[type=password] {
                    
126	direction: ltr;
                    
                
R.java https://bitbucket.org/cynogn/owler.git | Java | 350 lines
                    
117        public static final int helpRevenueButton=0x7f090016;
                    
118        public static final int helpStrengthButton=0x7f09001d;
                    
119        public static final int image=0x7f090006;
                    
122        public static final int logout=0x7f09000b;
                    
123        public static final int password=0x7f090014;
                    
124        public static final int reveneue_hight=0x7f09001b;
                    
129        public static final int spinnerTarget=0x7f09001c;
                    
130        public static final int strengthCloseButton=0x7f09001e;
                    
131        public static final int strength_high=0x7f090021;
                    
131        public static final int strength_high=0x7f090021;
                    
132        public static final int strength_low=0x7f09001f;
                    
133        public static final int strength_medium=0x7f090020;
                    
149        public static final int spinner_textview=0x7f030005;
                    
150        public static final int strength_layout=0x7f030006;
                    
151    }
                    
                
wp-admin.dev.css https://github.com/muskmelon/Greemo.git | CSS | 2804 lines
                    
119input[type="text"],
                    
120input[type="password"],
                    
121input[type="file"],
                    
247
                    
248#pass-strength-result {
                    
249	border-style: solid;
                    
                
SipCommandInterface.java https://gitlab.com/Atomic-ROM/frameworks_opt_telephony | Java | 613 lines
                    
70    @Override
                    
71    public void changeBarringPassword(String facility, String oldPwd,
                    
72            String newPwd, Message result) {
                    
183    @Override
                    
184    public void getSignalStrength (Message result) {
                    
185    }
                    
259    public void setupDataCall(String radioTechnology, String profile,
                    
260            String apn, String user, String password, String authType,
                    
261            String protocol, Message result) {
                    
352    @Override
                    
353    public void queryFacilityLock(String facility, String password,
                    
354            int serviceClass, Message response) {
                    
357    @Override
                    
358    public void queryFacilityLockForApp(String facility, String password,
                    
359            int serviceClass, String appId, Message response) {
                    
                
step_1.tpl https://gitlab.com/leon0399/damnit-engine | Smarty Template | 100 lines
                    
66                                <span class="input-group-addon"><i class="fa fa-lock fa-fw"></i></span>
                    
67                                <input id="reg-password" name="password" type="password" placeholder="Пароль" class=" form-control" required>
                    
68                            </div>
                    
76                                <span class="input-group-addon"><i class="fa fa-lock fa-fw"></i></span>
                    
77                                <input id="reg-password-repeat" name="password-repeat" type="password" placeholder="Пароль (ещё раз)" class=" form-control" required>
                    
78                            </div>
                    
85                    <div class="progress">
                    
86                        <div id="passStrengthBar" class="progress-bar progress-bar-success" role="progressbar" aria-valuenow="0" aria-valuemin="0" aria-valuemax="100" >
                    
87
                    
                
PdfStamper.java https://github.com/RoDaniel/featurehouse.git | Java | 325 lines
                    
124    
                    
125    public void setEncryption(byte userPassword[], byte ownerPassword[], int permissions, boolean strength128Bits) throws DocumentException {
                    
126        if (stamper.isAppend())
                    
129            throw new DocumentException("Content was already written to the output.");
                    
130        stamper.setEncryption(userPassword, ownerPassword, permissions, strength128Bits ? PdfWriter.STANDARD_ENCRYPTION_128 : PdfWriter.STANDARD_ENCRYPTION_40);
                    
131    }
                    
133    
                    
134    public void setEncryption(byte userPassword[], byte ownerPassword[], int permissions, int encryptionType) throws DocumentException {
                    
135        if (stamper.isAppend())
                    
138            throw new DocumentException("Content was already written to the output.");
                    
139        stamper.setEncryption(userPassword, ownerPassword, permissions, encryptionType);
                    
140    }
                    
142    
                    
143    public void setEncryption(boolean strength, String userPassword, String ownerPassword, int permissions) throws DocumentException {
                    
144        setEncryption(DocWriter.getISOBytes(userPassword), DocWriter.getISOBytes(ownerPassword), permissions, strength);
                    
                
user.php https://bitbucket.org/afriyandi/reporting.git | PHP | 187 lines
                    
9
                    
10    public $password;
                    
11    public $user;
                    
100
                    
101    function check_password($user, $pwd, $comp) {
                    
102        parent::getLogin($user, $pwd, $comp);
                    
113            $this->combine($new1, $new2);
                    
114            if ($this->compare($this->password, $_POST["lpass"]))
                    
115                return FALSE;
                    
115                return FALSE;
                    
116            if (!$this->check_strength($this->password)) {
                    
117                return FALSE;
                    
137        foreach ($string as $index) {
                    
138            $this->password = $this->password . $index;
                    
139        }
                    
                
_module.less https://gitlab.com/crazybutterfly815/magento2 | LESS | 545 lines
                    
17@_password-strong: #c5eeac;
                    
18@_password-very-strong: #81b562;
                    
19
                    
220    //
                    
221    //  Password Strength Meter
                    
222    //  ---------------------------------------------
                    
239
                    
240    .password-strength-meter {
                    
241        background-color: @_password-default;
                    
256
                    
257        .password-none & {
                    
258            &:before {
                    
258            &:before {
                    
259                background-color: @_password-default;
                    
260                width: 100%;
                    
                
PasswordEncoderUtils.java https://github.com/frett/cas.git | Java | 90 lines
                    
27    /**
                    
28     * New password encoder password encoder.
                    
29     *
                    
32     */
                    
33    public static PasswordEncoder newPasswordEncoder(final PasswordEncoderProperties properties) {
                    
34        val type = properties.getType();
                    
70                    LOGGER.debug("Creating BCRYPT encoder without secret");
                    
71                    return new BCryptPasswordEncoder(properties.getStrength());
                    
72                }
                    
73                LOGGER.debug("Creating BCRYPT encoder with secret");
                    
74                return new BCryptPasswordEncoder(properties.getStrength(), RandomUtils.getNativeInstance());
                    
75            case SCRYPT:
                    
82                }
                    
83                return new Pbkdf2PasswordEncoder(properties.getSecret(), properties.getStrength(), HASH_WIDTH);
                    
84            case NONE:
                    
                
main.css https://gitlab.com/augurpl/gitlab-ci-hipster-image | CSS | 246 lines
                    
173
                    
174/* start Password strength bar style */
                    
175ul#strengthBar {
                    
194}
                    
195/* end Password strength bar style */
                    
196
                    
                
changelog.md https://bitbucket.org/akindziora/websocketserver.git | Markdown | 302 lines
                    
23* Add experimental `.unref()` method to RedisClient (Bryce Baril / Olivier Lalonde)
                    
24* Strengthen checking of reply to prevent conflating "message" or "pmessage" fields with pub_sub replies. (Bryce Baril)
                    
25
                    
32Many contributed features and fixes, including:
                    
33* Ignore password set if not needed. (jbergknoff)
                    
34* Improved compatibility with 0.10.X for tests and client.end() (Bryce Baril)
                    
                
style-rtl.css https://github.com/nicolasnm/divingbook.git | CSS | 271 lines
                    
129
                    
130/* -------------- Password Meter  ------------- */
                    
131
                    
131
                    
132#password-strength {
                    
133  left: auto;
                    
136}
                    
137#password-strength-text {
                    
138  margin-top: 0;
                    
215}
                    
216.password-suggestions ul li {
                    
217  margin-right: 1.2em;
                    
                
user.jsp https://gitlab.com/spiderworts/ab_weixin_cms | JavaServer Pages | 66 lines
                    
9<body style="overflow-y: hidden" scroll="no">
                    
10<t:formvalid formid="formobj" dialog="true" usePlugin="password" layout="table" action="userController.do?saveUser">
                    
11	<input id="id" name="id" type="hidden" value="${user.id }">
                    
28				<td align="right"><label class="Validform_label"> 密码: </label></td>
                    
29				<td class="value"><input type="password" class="inputxt" value="" name="password" plugin="passwordStrength" datatype="*6-18" errormsg="" /> <span class="passwordStrength"
                    
30					style="display: none;"><span>弱</span><span>中</span><span class="last">强</span> </span> <span class="Validform_checktip">密码至少6个字符,最多18个字符</span></td>
                    
33				<td align="right"><label class="Validform_label"> 重复密码: </label></td>
                    
34				<td class="value"><input id="repassword" class="inputxt" type="password" value="${user.password}" recheck="password" datatype="*6-18" errormsg="两次输入的密码不一致!"> <span
                    
35					class="Validform_checktip">重复个人密码</span></td>
                    
                
postgresql.conf.erb https://gitlab.com/jbyrd/omnibus-gitlab | Ruby HTML | 560 lines
                    
84#ssl = off        # (change requires restart)
                    
85#ssl_ciphers = 'ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH'  # allowed SSL ciphers
                    
86          # (change requires restart)
                    
87#ssl_renegotiation_limit = 512MB  # amount of data between renegotiations
                    
88#password_encryption = on
                    
89#db_user_namespace = off
                    
                
 

Source

Language