Skip to content
This repository was archived by the owner on May 13, 2025. It is now read-only.

Commit c841a23

Browse files
authored
Merge pull request #14 from T34256/experimental
Experimental to main v0.0.5 pull
2 parents 1ab7b23 + 0cb0d75 commit c841a23

File tree

3 files changed

+68
-16
lines changed

3 files changed

+68
-16
lines changed

VAIIYA terminal.py

Lines changed: 50 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,8 @@ def main_menu():
7777
def open_terminal():
7878

7979
while True:
80-
text = prompt('awaiting commands>>>> ')
80+
print(" for a list of commands, please type 'commands' ")
81+
text = prompt('awaiting command(s)>>> ')
8182
#put all the usercommands under here please!
8283
if text == 'CNS':
8384
print("running secondary program...")
@@ -89,13 +90,18 @@ def open_terminal():
8990
continue
9091

9192

93+
if text == 'walker':
94+
print("welcome walker to your login! please wait while your coffee brews.......")
95+
time.sleep(3)
96+
walker_login()
9297

9398
#BUG: the error "no command" will reply when exiting the FROST EE!
9499
# FROST EE WIP!!
95100
if text == 'frostbyte':
96-
print("loading frostbyte EE...")
101+
print("welcome frostbyte to your login! please wait while i startup the supercomputer and freeze these bytes!....")
102+
time.sleep(3)
97103
#enters the frostbyte EE
98-
frostbyte_EE()
104+
frostbyte_login()
99105

100106

101107
#below are all the non-user commands, DO NOT REMOVE!
@@ -124,31 +130,59 @@ def open_terminal():
124130
# the CNS EE below this messange
125131
def CNS_EE_HAKED():
126132
result = yes_no_dialog(
127-
title='Do you want, the TrUtH?',
128-
text='Do you want to confirm? dO yOU wAnT ThE tRUTh? Do YoU WaNt tHe tRUTh? Do YoU WaNt tHe tRUTh?').run()
133+
title='CNS.02.06.01',
134+
text='dO yOU wAnT ThE tRUTh?').run()
129135
if result == True:
130136
message_dialog(
131-
title='CNS CNS CNS CNS CNS CNS SeeK tHe TrutH',
137+
title='CNS.02.06.01',
132138
text='very well then, we will see you soon enough').run()
133139

134140
print(" FATAL ERROR!: VAIIYA defenter has encountered an error! please restart the program to continue!")
135141
time.sleep(4)
136142
exit()
137143
if result == False:
138144
message_dialog(
139-
title='CNS CNS CNS CNS CNS CNS SeeK tHe TrutH',
145+
title='CNS.02.06.01',
140146
text='how dissapointing, that you dont want tHe TrutH. we will see you soon enough').run()
141147

142148
print(" FATAL ERROR!: VAIIYA defenter has encountered an error! please restart the program to continue!")
143149
time.sleep(4)
144150
exit()
145151

146-
147-
#hehe youll never get de password now! ahahahah AHAHAHAHA
152+
#add passwords here for the logins and name the vars respectivly
153+
#hehe youll never get the passwords now! AHAHAHAHAHA!
154+
#walkerpasswrd1
155+
walkerhash = b'$2b$12$M7LXCClyfsnN9SjibtnEmuLEOlR68H2ovjCBA0zcAIBs2RHBzOnFy'
148156
#frostEEpswrd1
149-
hash = b'$2b$12$AUur7AKX1aGQurOlmM46Pu0OX9HXqx6UHH9SHiEvrCJM56JvUjYfu'
157+
frosthash = b'$2b$12$AUur7AKX1aGQurOlmM46Pu0OX9HXqx6UHH9SHiEvrCJM56JvUjYfu'
158+
159+
160+
#walker login here
161+
def walker_login():
162+
print("Welcome walker! please put in your password that i gave you!")
163+
print("To exit, please type 'EXIT' in the password prompt!")
164+
#password prompt;
165+
userpassword = text = prompt('walkers password: ', is_password=True)
166+
#encodes the given password for comapare
167+
userpassword = userpassword.encode('utf-8')
168+
169+
#comapre password hashes, if identical then "result" == True, then it will move onto walker_entered
170+
result = bcrypt.checkpw(userpassword, walkerhash)
171+
if result:
172+
walker_entered()
173+
if text == 'exit':
174+
return
175+
#end of walker password varifi
176+
def walker_entered():
177+
print("welcome walker! here currnently there is nothing, i have no idea what to put here for you guys.")
178+
print("but id assume you are familiar with github so if you have an idea i would more than glad take a look and try to implement it! ")
179+
text = prompt("type EXIT to exit this page; ")
180+
if text == 'exit':
181+
return
182+
#end of walker login/EE
183+
150184
# FROST EE STUFF OVER HERE!
151-
def frostbyte_EE():
185+
def frostbyte_login():
152186

153187

154188
print("to exit, type EXIT in the password!")
@@ -157,17 +191,17 @@ def frostbyte_EE():
157191
userpassword = userpassword.encode('utf-8')
158192

159193
#comapre password hashes
160-
result = bcrypt.checkpw(userpassword, hash)
194+
result = bcrypt.checkpw(userpassword, frosthash)
161195
if result:
162196
frostbytes_EE_entered()
163197
if text == 'exit':
164198
return
165199
# 2nd part to the FROST EE
166200
def frostbytes_EE_entered():
167-
print(f"""welcome frostbyte! to your ee! dont worry, no one will find your password ^_+ """)
168-
text = prompt('type EXIT to exit this page; ')
169-
if text == 'exit':
170-
return
201+
print(f"""welcome frostbyte! to your ee/login! dont worry, no one will find your password ^_+ """)
202+
text = prompt("type EXIT to exit this page;")
203+
if text == 'exit':
204+
return
171205
#END OF FROST EE CODE,
172206

173207

VAIIYA-terminal.ico

167 KB
Binary file not shown.

bcrypt_hashgen.py

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
2+
import bcrypt
3+
#no password 4 u
4+
# example password
5+
password = ' '
6+
7+
# converting password to array of bytes
8+
bytes = password.encode('utf-8')
9+
10+
# generating the salt
11+
salt = bcrypt.gensalt()
12+
13+
# Hashing the password
14+
hash = bcrypt.hashpw(bytes, salt)
15+
16+
print(hash)
17+
18+
#this is the bcrypt hash genorator, where i get the hashes for the passwords.

0 commit comments

Comments
 (0)