def testSetHashedPassword(self): clear_pw = TEST_PW.encode('utf-8') u1 = User() p1 = Password(clear_pw) u1.set_password(p1) self.assertEquals(p1, u1.pw)
def __init__(self, master): self.master = master self.colour_bg = "Grey" self.colour_err = "Red" self.draw_widgets() self.random_password_size = 15 self.dbcon = sql.SQLCon() self.password = p.Password()
def get_password_hashes(*inputs): """Returns password hashes for all inputs (calculated using the same salt)""" all_hashes = [] salt = bcrypt.gensalt() for ip in inputs: p = Password(TEST_PW.encode('utf-8')) # use complex password to not fail here p.salt = salt p.hashed_password = p.hash_password(ip.encode('utf-8')) hash_ = p.hashed_password all_hashes.append(hash_) return all_hashes
def NewPasswordGenerator(numOfPasswords=1): U1 = UserInput('What\'s the minimum length?', string.ascii_letters) U2 = UserInput('How many special characters?', '!@#$%^&*)-') U3 = UserInput('How many numbers?', '0123456789') User_Input_List = [U1, U2, U3] for x in User_Input_List: x.poll_user_input() for y in range(numOfPasswords): password_final = Password() for x in User_Input_List: x.generate_random_string() password_final.generate_simple_password(x) print(password_final.generate_random_password()) return
def setUp(self): self.pw_hasher = Password.Password()
def testHashCheck(self): pwd = TEST_PW.encode('utf-8') p = Password(pwd) self.assertTrue(p.hash_check(pwd))
sleep(5) def likeTweet(self, searchfor): driver = self.driver search_box = driver.find_element_by_xpath( '//*[@id="react-root"]/div/div/div[2]/main/div/div/div/div[2]/div/div[2]/div/div/div/div[1]/div/div/div/form/div[1]/div/div/div[2]/input' ) search_box.send_keys(searchfor) search_box.send_keys(Keys.RETURN) sleep(8) for i in range(1, 3): #try: driver.find_element_by_xpath("//div[@data-testid='like']").click() """#except exceptions.NoSuchElementException: sleep(3) driver.execute_script('window.scrollTo(0,document.body.scrollHeight/2)') sleep(3) driver.find_element_by_xpath("//div[@data-testid='like']").click() sleep(1) driver.execute_script('window.scrollTo(0,document.body.scrollHeight/2)')""" sleep(5) pass_word = Password.Password() username = Password.user_name() find = twitter_bot(username, pass_word) find.login() find.likeTweet("selenium")
from User import User from Password import * #Example to trigger a sonar vulnerability #import socket #ip = '127.0.0.1' #sock = socket.socket() #sock.bind((ip, 9090)) #typical bandit findings #>>> bandit -r <folder> #deprecated md5 will not be found by sonar... password = input("Please provide a password:"******"Bert") p = Password() if p.pwd_complex(password) == True: hashed_password = p.hash_password(password.encode()) user1.set_password(hashed_password) hashed_password = user1.get_password() p.hash_check(password.encode(), hashed_password) else: print("Doesn't make complexity requirements")
# ---------------------- Database Call ---------------------------------- try: conn = pyodbc.connect('Driver={SQL Server Native Client 11.0};' 'Server=174.101.154.93;' 'Database=PasswordManager;' 'uid=bruceba;' 'pwd=password') # Store return value of a database query in a Panda Data Frame value = pd.read_sql_query('select * from tEntries', conn) print(value.count()) # Foreach row value, create a Password Class and store it in a list of Password Classes DatabasePasswords = [ (Password.Password(row.EntryID, row.UserID, row.WebsiteDomainID, row.WebsitePasswordID, row.CategoryID)) for index, row in value.iterrows() ] # Foreach Password Class in list of Passwords, print out the EntryID an int for x in DatabasePasswords: print(int(x.EntryID)) # print out the length of the array not the count in this instance print('Count of Database Passwords: ' + str(len(DatabasePasswords))) except Exception: print('Database Error!!!') # ------------------------ API Post Call ---------------------------------------
def test_password(): pwd = Password(context.hash("test_password"), context) assert pwd == "test_password", "Comparing against plaintext should work" assert pwd != "wrong_password", "not equals should work"