| /plugin/watchcycle/ |
| D | helper.php | 27 global $auth; 28 if ($auth === null) return ''; 90 global $auth; 91 if ($auth === null) return false; // no valid auth setup 98 if (empty($auth->retrieveUsers(0, 1, ['grps' => ltrim($item, '@')]))) { 101 } elseif ($auth->getUserData($item) === false) { 123 global $auth; 126 if ($auth === null) return $found; 134 $found[$item] = $auth->getUserData($item); 148 global $auth; [all …]
|
| /plugin/davcal/vendor/sabre/http/tests/HTTP/Auth/ |
| H A D | AWSTest.php | 23 private $auth; variable in Sabre\\HTTP\\Auth\\AWSTest 31 $this->auth = new AWS(self::REALM, $this->request, $this->response); 38 $result = $this->auth->init(); 41 $this->assertEquals(AWS::ERR_NOAWSHEADER, $this->auth->errorCode); 57 $this->auth->init(); 58 $result = $this->auth->validate($secretKey); 61 $this->assertEquals(AWS::ERR_MD5CHECKSUMWRONG, $this->auth->errorCode); 80 $this->auth->init(); 81 $result = $this->auth->validate($secretKey); 84 $this->assertEquals(AWS::ERR_INVALIDDATEFORMAT, $this->auth->errorCode); [all …]
|
| H A D | DigestTest.php | 25 private $auth; variable in Sabre\\HTTP\\Auth\\DigestTest 33 $this->auth = new Digest(self::REALM, $this->request, $this->response); 59 $this->auth->init(); 61 $this->assertEquals($username, $this->auth->getUserName()); 62 $this->assertEquals(self::REALM, $this->auth->getRealm()); 63 …$this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)), '… 64 …$this->assertTrue($this->auth->validatePassword($password), 'Authentication is deemed invalid thro… 89 $this->auth->init(); 91 …$this->assertFalse($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . ($password . … 100 $this->auth->init(); [all …]
|
| /plugin/pureldap/_test/ |
| H A D | AuthTest.php | 28 $auth = new \auth_plugin_pureldap(); 29 $this->assertTrue($auth->checkPass('a.legrand', 'Foo_b_ar123!')); 30 $this->assertFalse($auth->checkPass('a.legrand', 'wrong password')); 35 $auth = new \auth_plugin_pureldap(); 38 $this->assertTrue($auth->checkPass('longlong', 'Foo_b_ar123!')); 39 $this->assertFalse($auth->checkPass('longlong', 'wrong password')); 41 $this->assertTrue($auth->checkPass('averylongusernamethatisverylong', 'Foo_b_ar123!')); 42 $this->assertFalse($auth->checkPass('averylongusernamethatisverylong', 'wrong password')); 51 $auth = new \auth_plugin_pureldap(); 52 $this->assertTrue($auth->checkPass('a.legrand', 'sso-only'));
|
| /plugin/authgooglesheets/vendor/google/auth/src/Credentials/ |
| D | ServiceAccountCredentials.php | 73 protected $auth; variable in Google\\Auth\\Credentials\\ServiceAccountCredentials 150 $this->auth = new OAuth2([ 205 return $this->auth->fetchAuthToken($httpHandler); 213 $key = $this->auth->getIssuer() . ':' . $this->auth->getCacheKey(); 214 if ($sub = $this->auth->getSub()) { 230 : $this->auth->getLastReceivedToken(); 265 if ($this->auth->getScope()) { 288 'private_key' => $this->auth->getSigningKey(), 289 'client_email' => $this->auth->getIssuer(), 293 $this->auth->getScope() [all …]
|
| D | ServiceAccountJwtAccessCredentials.php | 48 protected $auth; variable in Google\\Auth\\Credentials\\ServiceAccountJwtAccessCredentials 94 $this->auth = new OAuth2([ 120 $scope = $this->auth->getScope(); 125 $this->auth->setAudience($authUri); 139 $audience = $this->auth->getAudience(); 140 $scope = $this->auth->getScope(); 151 $access_token = $this->auth->toJwt(); 154 $this->auth->setAccessToken($access_token); 164 return $this->auth->getCacheKey(); 172 return $this->auth->getLastReceivedToken(); [all …]
|
| D | UserRefreshCredentials.php | 42 protected $auth; variable in Google\\Auth\\Credentials\\UserRefreshCredentials 87 $this->auth = new OAuth2([ 114 return $this->auth->fetchAuthToken($httpHandler); 122 return $this->auth->getClientId() . ':' . $this->auth->getCacheKey(); 130 return $this->auth->getLastReceivedToken();
|
| /plugin/autogroup/ |
| D | action.php | 83 global $auth; 84 if (!$auth || !$auth->canDo('getUsers') || !$auth->canDo('modGroups')) { 101 global $auth; 107 $oldinfo = $auth->getUserData($user); 143 if ($auth->triggerUserMod('modify', array($user, $changes))) { 162 global $auth; 163 if (!$auth || !$auth->canDo('getUsers') || !$auth->canDo('modGroups')) { 170 $userCount = $auth->getUserCount(); 171 $userData = $auth->retrieveUsers(0, $userCount, array());
|
| /plugin/virtualgroup/ |
| D | admin.php | 28 global $auth; 52 $INPUT->set('user', $auth->cleanUser($INPUT->str('loaduser'))); 55 $this->virtualGroups->getUserGroups($auth->cleanUser($INPUT->str('loaduser'))) 61 $INPUT->set('group', $auth->cleanGroup($INPUT->str('loadgroup'))); 64 $this->virtualGroups->getGroupUsers($auth->cleanGroup($INPUT->str('loadgroup'))) 78 global $auth; 81 $user = $auth->cleanUser($user); 83 static fn($group) => $auth->cleanGroup($group), 101 global $auth; 104 $group = $auth->cleanGroup($group); [all …]
|
| /plugin/authsplit/ |
| D | README | 7 NOTE: This auth plugin requires DokuWiki WeatherWax (2013-05-10a) or later! 12 authsplit, while technically being an auth plugin, does NOT do any 14 method calls among TWO other auth plugins that will do the actual work: 15 - a PRIMARY auth plugin that will be used for VALIDATION of login names and 19 - a SECONDARY auth plugin that supplies ADDITIONAL user information such as 24 particularly useful auth plugin with an auth plugin that is more powerful, yet 27 The example that comes to mind is to use authhttp as PRIMARY auth plugin and 28 authplain as SECONDARY auth plugin, thereby combining the advantages of reusing 29 HTTP authentication information with an auth plugin that supplements everything 31 authsplit has been tested with, but in theory it should work with other auth [all …]
|
| /plugin/davcal/vendor/sabre/dav/tests/Sabre/DAVACL/ |
| H A D | SimplePluginTest.php | 156 $auth = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV'); 157 $server->addPlugin($auth); 160 $auth->beforeMethod(new HTTP\Request(), new HTTP\Response()); 183 $auth = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV'); 184 $server->addPlugin($auth); 187 $auth->beforeMethod(new HTTP\Request(), new HTTP\Response()); 260 $auth = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV'); 261 $server->addPlugin($auth); 264 $auth->beforeMethod(new HTTP\Request(), new HTTP\Response()); 314 $auth = new DAV\Auth\Plugin(new DAV\Auth\Backend\Mock(),'SabreDAV'); [all …]
|
| /plugin/recommend/helper/ |
| D | mail.php | 76 global $auth; 77 if (!$auth->canDo('getUsers')) { 81 $users = $auth->retrieveUsers(0, 0, ['grps' => substr($recipient, 1)]); 95 global $auth; 96 $user = $auth->getUserData($recipient); 113 global $auth; 114 if (!$auth->canDo('getUsers')) { 118 $user = $auth->retrieveUsers(0, 1, ['mail' => $mail]);
|
| /plugin/authplaincas/ |
| D | action.php | 50 global $auth; 79 if ($auth && $auth->canDo('modPass') && actionOK('resendpwd')) { 88 global $auth; 89 $auth->logIn(); 107 global $ACT, $auth, $USERINFO, $MSG; 112 !($auth && $auth->canDo('modPass') && actionOK('resendpwd'))
|
| /plugin/pureldap/vendor/freedsx/ldap/src/FreeDSx/Ldap/Operation/Request/ |
| H A D | BindRequest.php | 108 $auth = $type->getChild(2); 110 if ($version === null || $name === null || $auth === null) { 119 if ($auth->getTagNumber() !== 0) { 122 $auth->getTagNumber() 125 $auth = (string) $auth->getValue(); 127 if ($auth === '') { 130 return new SimpleBindRequest($name, $auth, $version);
|
| /plugin/ckgdoku/scripts/ |
| D | add_v_animal.sh | 22 touch ${ANIMAL}/conf/{local.php,local.protected.php,acl.auth.php,users.auth.php,plugins.local.php} 23 chmod 666 ${ANIMAL}/conf/{local.php,acl.auth.php,users.auth.php,plugins.local.php} 42 * @ALL 1" > ${ANIMAL}/conf/acl.auth.php 46 …$1$cce258b2$U9o5nK0z4MhTfB5QlKF23/:admin:admin@mail.org:admin,user' > ${ANIMAL}/conf/users.auth.php
|
| D | addanimal.sh | 28 touch ${ANIMAL}/conf/{local.php,local.protected.php,acl.auth.php,users.auth.php,plugins.local.php} 29 chmod 666 ${ANIMAL}/conf/{local.php,acl.auth.php,users.auth.php,plugins.local.php} 49 * @ALL 1" > ${ANIMAL}/conf/acl.auth.php 53 …$1$cce258b2$U9o5nK0z4MhTfB5QlKF23/:admin:admin@mail.org:admin,user' > ${ANIMAL}/conf/users.auth.php
|
| /plugin/ckgedit/scripts/ |
| D | add_v_animal.sh | 22 touch ${ANIMAL}/conf/{local.php,local.protected.php,acl.auth.php,users.auth.php,plugins.local.php} 23 chmod 666 ${ANIMAL}/conf/{local.php,acl.auth.php,users.auth.php,plugins.local.php} 42 * @ALL 1" > ${ANIMAL}/conf/acl.auth.php 46 …$1$cce258b2$U9o5nK0z4MhTfB5QlKF23/:admin:admin@mail.org:admin,user' > ${ANIMAL}/conf/users.auth.php
|
| D | addanimal.sh | 28 touch ${ANIMAL}/conf/{local.php,local.protected.php,acl.auth.php,users.auth.php,plugins.local.php} 29 chmod 666 ${ANIMAL}/conf/{local.php,acl.auth.php,users.auth.php,plugins.local.php} 49 * @ALL 1" > ${ANIMAL}/conf/acl.auth.php 53 …$1$cce258b2$U9o5nK0z4MhTfB5QlKF23/:admin:admin@mail.org:admin,user' > ${ANIMAL}/conf/users.auth.php
|
| /plugin/farm/install/animaltemplate/conf/ |
| D | mysql.conf.php.example | 3 * This is an example configuration for the mysql auth module. 26 $conf['auth']['mysql']['server'] = ''; 27 $conf['auth']['mysql']['user'] = ''; 28 $conf['auth']['mysql']['password'] = ''; 29 $conf['auth']['mysql']['database'] = ''; 34 $conf['auth']['mysql']['debug'] = 0; 41 $conf['auth']['mysql']['forwardClearPass'] = 0; 48 $conf['auth']['mysql']['TablesToLock']= array("users", "users AS u","groups", "groups AS g", "userg… 66 $conf['auth']['mysql']['checkPass'] = "SELECT pass 85 $conf['auth']['mysql']['getUserInfo'] = "SELECT pass, CONCAT(firstname,' ',lastname) AS name, email… [all …]
|
| /plugin/approve/ |
| H A D | admin.php | 56 global $auth; 94 $user = $auth->getUserData($approver); 108 if ($auth->canDo('getUsers')) { 111 if ($auth->canDo('getGroups')) { 112 foreach($auth->retrieveGroups() as $group) { 116 foreach($auth->retrieveUsers() as $login => $data) { 122 if (!$auth->canDo('getGroups')) {
|
| /plugin/oauth/ |
| H A D | OAuthManager.php | 185 global $auth; 204 $userdata['user'] = $auth->cleanUser((string)$userdata['user']); 216 $userdata['grps'] = array_map([$auth, 'cleanGroup'], (array)$userdata['grps']); 234 global $auth; 237 $localUser = $auth->getUserByEmail($userdata['mail']); 239 $localUserInfo = $auth->getUserData($localUser); 244 if (!in_array($auth->cleanGroup($servicename), $localUserInfo['grps'])) { 256 $auth->getConf('overwrite-groups') 263 $auth->modifyUser($localUser, $userdata); 265 } elseif (actionOK('register') || $auth->getConf('register-on-auth')) { [all …]
|
| /plugin/forceuserchange/ |
| D | action.php | 80 global $USERINFO, $auth, $INPUT; 84 $uinfo = $auth->getUserData($user); 105 global $auth; 117 $auth->triggerUserMod('modify', array($user, array('grps'=>$grps))); 122 $auth->triggerUserMod('modify', array($user, array('grps'=>$grps))); 130 global $auth, $INPUT; 140 if (!$auth->canDo('external') && $auth->checkPass($user, $pass)){
|
| /plugin/sneakyindexfix/ |
| D | action.php | 44 global $auth; 52 if(!$auth) return AUTH_NONE; 57 if(!$auth->isCaseSensitive()) { 61 $user = auth_nameencode($auth->cleanUser($user)); 62 $groups = array_map(array($auth, 'cleanGroup'), (array) $groups); 86 if(!$auth->isCaseSensitive() && $acl[1] !== '@ALL') {
|
| /plugin/authsaml/ |
| D | saml.php | 38 global $auth, $conf; 80 global $auth; 81 return $auth->getUserData($user); 201 global $auth; 208 global $auth; 209 if ($auth->canDo('addUser')) { 213 … return $auth->createUser($user, $pass, $userData['name'], $userData['mail'], $userData['grps']); 225 global $auth, $conf; 230 if ($auth->canDo('modName')) { 235 if ($auth->canDo('modMail')) { [all …]
|
| /plugin/preservefilenames/ |
| D | action_angua.php | 287 function _mod_media_tab_files($ns,$auth=null,$jump='') { argument 289 if(is_null($auth)) $auth = auth_quickaclcheck("$ns:*"); 291 if($auth < AUTH_READ){ 294 $this->_mod_media_filelist($ns,$auth,$jump,true,_media_get_sort_type()); 303 function _mod_media_filelist($ns,$auth=null,$jump='',$fullscreenview=false,$sort=false){ argument 309 if(is_null($auth)) $auth = auth_quickaclcheck("$ns:*"); 313 if($auth < AUTH_READ){ 317 if (!$fullscreenview) media_uploadform($ns, $auth); 332 $this->_mod_media_printfile($item,$auth,$jump); 334 $this->_mod_media_printfile_thumbs($item,$auth,$jump); [all …]
|