Advertisement
Guest User

Untitled

a guest
Feb 4th, 2012
266
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.94 KB | None | 0 0
  1. callum-imac:phpBB callumacrae$ ack md5
  2. develop/benchmark.php
  3. 70: $name = "testuser_" . substr(md5(uniqid(rand())), 0, 10);
  4. 367: $password = md5("benchpass");
  5.  
  6. develop/imageset_to_css.php
  7. 65: $hash = md5($data);
  8. 75: if(md5($data) == $hash)
  9. 238: $hash = md5($code);
  10.  
  11. includes/auth/auth_db.php
  12. 188: // plain md5 support left in for conversions from other systems.
  13. 189: if ((strlen($row['user_password']) == 34 && (phpbb_check_hash(md5($password_old_format), $row['user_password']) || phpbb_check_hash(md5(utf8_to_cp1252($password_old_format)), $row['user_password'])))
  14. 190: || (strlen($row['user_password']) == 32 && (md5($password_old_format) == $row['user_password'] || md5(utf8_to_cp1252($password_old_format)) == $row['user_password'])))
  15.  
  16. includes/cache/driver/file.php
  17. 352: if (($rowset = $this->_read('sql_' . md5($query))) === false)
  18. 384: if ($this->_write('sql_' . md5($query), $this->sql_rowset[$query_id], $ttl + time(), $query))
  19.  
  20. includes/cache/driver/memory.php
  21. 41: $this->key_prefix = substr(md5($dbname . $table_prefix), 0, 8) . '_';
  22. 200: // gives us the md5s that we want
  23. 209: foreach ($temp as $md5_id => $void)
  24. 211: $this->_delete('sql_' . $md5_id);
  25. 269: if (($result = $this->_read('sql_' . md5($query))) === false)
  26. 289: $hash = md5($query);
  27.  
  28. includes/captcha/plugins/captcha_abstract.php
  29. 237: $this->confirm_id = md5(unique_id($user->ip));
  30.  
  31. includes/captcha/plugins/phpbb_captcha_qa_plugin.php
  32. 414: $this->confirm_id = md5(unique_id($user->ip));
  33.  
  34. includes/db/oracle.php
  35. 699: $statement_id = substr(md5($query), 0, 30);
  36.  
  37. includes/extension/finder.php
  38. 45: * A map from md5 hashes of serialized queries to their previously retrieved
  39. 323: $query = md5(serialize($this->query));
  40.  
  41. includes/functions.php
  42. 179: $val = md5($val);
  43. 180: $config['rand_seed'] = md5($config['rand_seed'] . $val . $extra);
  44. 393: $random_state = md5(unique_id() . $random_state);
  45. 394: $random .= pack('H*', md5($random_state));
  46. 406: return md5($password);
  47. 425: return (md5($password) === $hash) ? true : false;
  48. 525: $hash = md5($salt . $password, true);
  49. 528: $hash = md5($hash . $password, true);
  50. 2871: $credential = ($admin) ? md5(unique_id()) : false;
  51.  
  52. includes/functions_convert.php
  53. 1083: $filename = md5(unique_id()) . '.dat';
  54. 1087: $filename = md5(unique_id()) . $filename;
  55. 1091: $filename = preg_replace('/\.([a-z]+)$/i', '_' . md5(unique_id()) . '.\1', $filename);
  56. 1095: $filename .= '_' . md5(unique_id()) . '.dat';
  57.  
  58. includes/functions_jabber.php
  59. 517: $decoded['cnonce'] = base64_encode(md5(uniqid(mt_rand(), true)));
  60. 712: $pack = md5($this->username . ':' . $data['realm'] . ':' . $this->password);
  61. 726: return md5(sprintf('%s:%s:%s:%s:%s:%s', md5($a1), $data['nonce'], $data['nc'], $data['cnonce'], $data['qop'], md5($a2)));
  62.  
  63. includes/functions_messenger.php
  64. 419: $headers[] = 'Message-ID: <' . md5(unique_id(time())) . '@' . $config['server_name'] . '>';
  65. 1441: * cram_md5 authentication method
  66. 1443: function cram_md5($username, $password)
  67. 1451: $md5_challenge = base64_decode($this->responses[0]);
  68. 1452: $password = (strlen($password) > 64) ? pack('H32', md5($password)) : ((strlen($password) < 64) ? str_pad($password, 64, chr(0)) : $password);
  69. 1453: $md5_digest = md5((substr($password, 0, 64) ^ str_repeat(chr(0x5C), 64)) . (pack('H32', md5((substr($password, 0, 64) ^ str_repeat(chr(0x36), 64)) . $md5_challenge))));
  70. 1455: $base64_method_cram_md5 = base64_encode($username . ' ' . $md5_digest);
  71. 1457: $this->server_send($base64_method_cram_md5, true);
  72. 1467: * digest_md5 authentication method
  73. 1470: function digest_md5($username, $password)
  74. 1480: $md5_challenge = base64_decode($this->responses[0]);
  75. 1482: // Parse the md5 challenge - from AUTH_SASL (PEAR)
  76. 1484: while (preg_match('/^([a-z-]+)=("[^"]+(?<!\\\)"|[^,]+)/i', $md5_challenge, $matches))
  77. 1489: $md5_challenge = substr($md5_challenge, strlen($matches[0]) + 1);
  78. 1516: $md5_challenge = substr($md5_challenge, strlen($matches[0]) + 1);
  79. 1536: $md5_challenge = $tokens;
  80. 1538: if (!empty($md5_challenge))
  81. 1549: $auth_1 = sprintf('%s:%s:%s', pack('H32', md5(sprintf('%s:%s:%s', $username, $md5_challenge['realm'], $password))), $md5_challenge['nonce'], $cnonce);
  82. 1551: $response_value = md5(sprintf('%s:%s:00000001:%s:auth:%s', md5($auth_1), $md5_challenge['nonce'], $cnonce, md5($auth_2)));
  83. 1553: $input_string = sprintf('username="%s",realm="%s",nonce="%s",cnonce="%s",nc="00000001",qop=auth,digest-uri="%s",response=%s,%d', $username, $md5_challenge['realm'], $md5_challenge['nonce'], $cnonce, $digest_uri, $response_value, $md5_challenge['maxbuf']);
  84. 1560: $base64_method_digest_md5 = base64_encode($input_string);
  85. 1561: $this->server_send($base64_method_digest_md5, true);
  86.  
  87. includes/functions_posting.php
  88. 1706: 'post_checksum' => $data['message_md5']
  89. 1771: 'post_checksum' => $data['message_md5']
  90.  
  91. includes/functions_upload.php
  92. 118: $this->realname = $prefix . md5(unique_id());
  93. 129: $this->realname = $prefix . md5(unique_id()) . '.' . $this->extension;
  94.  
  95. includes/search/fulltext_mysql.php
  96. 357: $search_key = md5(implode('#', array(
  97. 541: $search_key = md5(implode('#', array(
  98.  
  99. includes/search/fulltext_native.php
  100. 441: $search_key = md5(implode('#', array(
  101. 831: $search_key = md5(implode('#', array(
  102.  
  103. includes/session.php
  104. 586: AND k.key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'";
  105. 802: $this->session_id = $this->data['session_id'] = md5(unique_id());
  106. 913: AND key_id = '" . $db->sql_escape(md5($this->cookie_data['k'])) . "'";
  107. 1366: 'key_id' => (string) md5($key_id),
  108. 1383: AND key_id = '" . $db->sql_escape(md5($key)) . "'";
  109.  
  110. install/install_install.php
  111. 1313: SET config_value = '" . md5(mt_rand()) . "'
  112. 1317: SET username = '" . $db->sql_escape($data['admin_name']) . "', user_password='" . $db->sql_escape(md5($data['admin_pass1'])) . "', user_ip = '" . $db->sql_escape($user_ip) . "', user_lang = '" . $db->sql_escape($data['default_lang']) . "', user_email='" . $db->sql_escape($data['board_email1']) . "', user_dateformat='" . $db->sql_escape($lang['default_dateformat']) . "', user_email_hash = " . $db->sql_escape(phpbb_email_hash($data['board_email1'])) . ", username_clean = '" . $db->sql_escape(utf8_clean_string($data['admin_name'])) . "'
  113. 1372: $rand_str = md5(mt_rand());
  114.  
  115. install/install_update.php
  116. 727: if (isset($expected_files[$file_struct['filename']]) && md5($contents) == $expected_files[$file_struct['filename']])
  117. 759: $expected_files[$file_struct['filename']] = md5($contents);
  118. 760: $file_list[$file_struct['filename']] = '_file_' . md5($file_struct['filename']);
  119. 805: $expected_files[$file_struct['filename']] = md5($contents);
  120. 806: $file_list[$file_struct['filename']] = '_file_' . md5($file_struct['filename']);
  121. 1421: $expected_files[$file] === md5($content)))
  122.  
  123. posting.php
  124. 350:$post_data['post_subject_md5'] = (isset($post_data['post_subject']) && $mode == 'edit') ? md5($post_data['post_subject']) : '';
  125. 736: // Grab md5 'checksum' of new message
  126. 737: $message_md5 = md5($message_parser->message);
  127. 747: // $message_md5 is the checksum of the post we're about to submit
  128. 752: // we're about to submit by also checking $message_md5 != $post_data['post_checksum']
  129. 753: if (($edit_post_message_checksum !== '' && $edit_post_message_checksum != $post_data['post_checksum'] && $message_md5 != $post_data['post_checksum'])
  130. 754: || ($edit_post_subject_checksum !== '' && $edit_post_subject_checksum != $post_data['post_subject_md5'] && md5($post_data['post_subject']) != $post_data['post_subject_md5']))
  131. 772: $update_message = ($mode != 'edit' || $message_md5 != $post_data['post_checksum'] || $status_switch || strlen($post_data['bbcode_uid']) < BBCODE_UID_LEN) ? true : false;
  132. 775: $update_subject = $mode != 'edit' || ($post_data['post_subject_md5'] && $post_data['post_subject_md5'] != md5($post_data['post_subject']));
  133. 1049: 'message_md5' => (string) $message_md5,
  134. 1342: 'edit_post_subject_checksum' => $post_data['post_subject_md5'],
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement