Lines Matching +full:pass -(+path:inc +path:lang) -(+path:lib +path:plugins +path:lang) -(+path:lib +path:tpl +path:dokuwiki +path:lang)
242 $_SESSION[DOKU_COOKIE]['auth']['pass'] = 'nope';
288 * @param string $pass Cleartext Password
296 function auth_login($user, $pass, $sticky = false, $silent = false) argument
310 …if (!empty($pass)) usleep(random_int(0, 250)); // add a random delay to prevent timing attacks #44…
311 if (!empty($pass) && $auth->checkPass($user, $pass)) {
315 auth_setCookie($user, auth_encrypt($pass, $secret), $sticky);
328 [$user, $sticky, $pass] = auth_getCookie();
329 if ($user && $pass) {
337 isset($session['pass']) &&
341 ($session['pass'] === sha1($pass)) && //still crypted
350 // no we don't trust it yet - recheck pass but silent
352 $pass = auth_decrypt($pass, $secret);
353 return auth_login($user, $pass, $sticky, true);
529 if (isset($_SESSION[DOKU_COOKIE]['auth']['pass']))
530 unset($_SESSION[DOKU_COOKIE]['auth']['pass']);
1010 $pass = $INPUT->post->str('pass');
1019 $pass = auth_pwgen($login); // automatically generate password
1020 } elseif (empty($pass) || empty($passchk)) {
1023 } elseif ($pass != $passchk) {
1035 if (!$auth->triggerUserMod('create', [$login, $pass, $fullname, $email])) {
1051 if (auth_sendPassword($login, $pass)) {
1085 $changes['pass'] = $INPUT->post->str('newpass');
1090 if ($changes['pass'] != $INPUT->post->str('passchk')) {
1117 if (!$auth->canDo('modPass')) unset($changes['pass']);
1137 if (array_key_exists('pass', $changes) && $changes['pass']) {
1139 [/* user */, $sticky, /* pass */] = auth_getCookie();
1140 $pass = auth_encrypt($changes['pass'], auth_cookiesalt(!$sticky, true));
1141 auth_setCookie($INPUT->server->str('REMOTE_USER'), $pass, (bool) $sticky);
1255 $pass = $INPUT->str('pass');
1258 if (!$pass) return false;
1259 if ($pass != $INPUT->str('passchk')) {
1265 if (!$auth->triggerUserMod('modify', [$user, ['pass' => $pass]])) {
1270 $pass = auth_pwgen($user);
1271 if (!$auth->triggerUserMod('modify', [$user, ['pass' => $pass]])) {
1276 if (auth_sendPassword($user, $pass)) {
1333 * You can pass null as the password to create an unusable hash.
1352 $pass = new PassHash();
1355 if (!method_exists($pass, $call)) {
1360 return $pass->$call($clear, $salt);
1379 $pass = new PassHash();
1380 return $pass->verify_hash($clear, $crypt);
1387 * @param string $pass encrypted password
1391 function auth_setCookie($user, $pass, $sticky) argument
1402 $cookie = base64_encode($user) . '|' . ((int) $sticky) . '|' . base64_encode($pass);
1415 $_SESSION[DOKU_COOKIE]['auth']['pass'] = sha1($pass);
1433 [$user, $sticky, $pass] = sexplode('|', $_COOKIE[DOKU_COOKIE], 3, '');
1435 $pass = base64_decode($pass);
1437 return [$user, $sticky, $pass];