Lines Matching refs:pass
286 * @param string $pass Cleartext Password
294 function auth_login($user, $pass, $sticky = false, $silent = false) argument
308 …if (!empty($pass)) usleep(random_int(0, 250)); // add a random delay to prevent timing attacks #44…
309 if (!empty($pass) && $auth->checkPass($user, $pass)) {
313 auth_setCookie($user, auth_encrypt($pass, $secret), $sticky);
326 [$user, $sticky, $pass] = auth_getCookie();
327 if ($user && $pass) {
338 ($session['pass'] == sha1($pass)) && //still crypted
349 $pass = auth_decrypt($pass, $secret);
350 return auth_login($user, $pass, $sticky, true);
1007 $pass = $INPUT->post->str('pass');
1016 $pass = auth_pwgen($login); // automatically generate password
1017 } elseif (empty($pass) || empty($passchk)) {
1020 } elseif ($pass != $passchk) {
1032 if (!$auth->triggerUserMod('create', [$login, $pass, $fullname, $email])) {
1048 if (auth_sendPassword($login, $pass)) {
1137 $pass = auth_encrypt($changes['pass'], auth_cookiesalt(!$sticky, true));
1138 auth_setCookie($INPUT->server->str('REMOTE_USER'), $pass, (bool) $sticky);
1252 $pass = $INPUT->str('pass');
1255 if (!$pass) return false;
1256 if ($pass != $INPUT->str('passchk')) {
1262 if (!$auth->triggerUserMod('modify', [$user, ['pass' => $pass]])) {
1267 $pass = auth_pwgen($user);
1268 if (!$auth->triggerUserMod('modify', [$user, ['pass' => $pass]])) {
1273 if (auth_sendPassword($user, $pass)) {
1349 $pass = new PassHash();
1352 if (!method_exists($pass, $call)) {
1357 return $pass->$call($clear, $salt);
1376 $pass = new PassHash();
1377 return $pass->verify_hash($clear, $crypt);
1384 * @param string $pass encrypted password
1388 function auth_setCookie($user, $pass, $sticky) argument
1399 $cookie = base64_encode($user) . '|' . ((int) $sticky) . '|' . base64_encode($pass);
1412 $_SESSION[DOKU_COOKIE]['auth']['pass'] = sha1($pass);
1430 [$user, $sticky, $pass] = sexplode('|', $_COOKIE[DOKU_COOKIE], 3, '');
1432 $pass = base64_decode($pass);
1434 return [$user, $sticky, $pass];