Lines Matching refs:pass
287 * @param string $pass Cleartext Password
295 function auth_login($user, $pass, $sticky = false, $silent = false) argument
309 …if (!empty($pass)) usleep(random_int(0, 250)); // add a random delay to prevent timing attacks #44…
310 if (!empty($pass) && $auth->checkPass($user, $pass)) {
314 auth_setCookie($user, auth_encrypt($pass, $secret), $sticky);
327 [$user, $sticky, $pass] = auth_getCookie();
328 if ($user && $pass) {
339 ($session['pass'] == sha1($pass)) && //still crypted
350 $pass = auth_decrypt($pass, $secret);
351 return auth_login($user, $pass, $sticky, true);
1008 $pass = $INPUT->post->str('pass');
1017 $pass = auth_pwgen($login); // automatically generate password
1018 } elseif (empty($pass) || empty($passchk)) {
1021 } elseif ($pass != $passchk) {
1033 if (!$auth->triggerUserMod('create', [$login, $pass, $fullname, $email])) {
1049 if (auth_sendPassword($login, $pass)) {
1138 $pass = auth_encrypt($changes['pass'], auth_cookiesalt(!$sticky, true));
1139 auth_setCookie($INPUT->server->str('REMOTE_USER'), $pass, (bool) $sticky);
1253 $pass = $INPUT->str('pass');
1256 if (!$pass) return false;
1257 if ($pass != $INPUT->str('passchk')) {
1263 if (!$auth->triggerUserMod('modify', [$user, ['pass' => $pass]])) {
1268 $pass = auth_pwgen($user);
1269 if (!$auth->triggerUserMod('modify', [$user, ['pass' => $pass]])) {
1274 if (auth_sendPassword($user, $pass)) {
1350 $pass = new PassHash();
1353 if (!method_exists($pass, $call)) {
1358 return $pass->$call($clear, $salt);
1377 $pass = new PassHash();
1378 return $pass->verify_hash($clear, $crypt);
1385 * @param string $pass encrypted password
1389 function auth_setCookie($user, $pass, $sticky) argument
1400 $cookie = base64_encode($user) . '|' . ((int) $sticky) . '|' . base64_encode($pass);
1413 $_SESSION[DOKU_COOKIE]['auth']['pass'] = sha1($pass);
1431 [$user, $sticky, $pass] = sexplode('|', $_COOKIE[DOKU_COOKIE], 3, '');
1433 $pass = base64_decode($pass);
1435 return [$user, $sticky, $pass];