Lines Matching refs:pass
288 * @param string $pass Cleartext Password
296 function auth_login($user, $pass, $sticky = false, $silent = false) argument
310 …if (!empty($pass)) usleep(random_int(0, 250)); // add a random delay to prevent timing attacks #44…
311 if (!empty($pass) && $auth->checkPass($user, $pass)) {
315 auth_setCookie($user, auth_encrypt($pass, $secret), $sticky);
328 [$user, $sticky, $pass] = auth_getCookie();
329 if ($user && $pass) {
341 ($session['pass'] == sha1($pass)) && //still crypted
352 $pass = auth_decrypt($pass, $secret);
353 return auth_login($user, $pass, $sticky, true);
1010 $pass = $INPUT->post->str('pass');
1019 $pass = auth_pwgen($login); // automatically generate password
1020 } elseif (empty($pass) || empty($passchk)) {
1023 } elseif ($pass != $passchk) {
1035 if (!$auth->triggerUserMod('create', [$login, $pass, $fullname, $email])) {
1051 if (auth_sendPassword($login, $pass)) {
1140 $pass = auth_encrypt($changes['pass'], auth_cookiesalt(!$sticky, true));
1141 auth_setCookie($INPUT->server->str('REMOTE_USER'), $pass, (bool) $sticky);
1255 $pass = $INPUT->str('pass');
1258 if (!$pass) return false;
1259 if ($pass != $INPUT->str('passchk')) {
1265 if (!$auth->triggerUserMod('modify', [$user, ['pass' => $pass]])) {
1270 $pass = auth_pwgen($user);
1271 if (!$auth->triggerUserMod('modify', [$user, ['pass' => $pass]])) {
1276 if (auth_sendPassword($user, $pass)) {
1352 $pass = new PassHash();
1355 if (!method_exists($pass, $call)) {
1360 return $pass->$call($clear, $salt);
1379 $pass = new PassHash();
1380 return $pass->verify_hash($clear, $crypt);
1387 * @param string $pass encrypted password
1391 function auth_setCookie($user, $pass, $sticky) argument
1402 $cookie = base64_encode($user) . '|' . ((int) $sticky) . '|' . base64_encode($pass);
1415 $_SESSION[DOKU_COOKIE]['auth']['pass'] = sha1($pass);
1433 [$user, $sticky, $pass] = sexplode('|', $_COOKIE[DOKU_COOKIE], 3, '');
1435 $pass = base64_decode($pass);
1437 return [$user, $sticky, $pass];