Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
opt /
lampp /
htdocs /
phpMyAdmin /
libraries /
plugins /
[ HOME SHELL ]
Name
Size
Permission
Action
auth
[ DIR ]
drwxrwxr-x
export
[ DIR ]
drwxrwxr-x
import
[ DIR ]
drwxrwxr-x
schema
[ DIR ]
drwxrwxr-x
transformations
[ DIR ]
drwxrwxr-x
AuthenticationPlugin.php
5.07
KB
-rwxrwxr-x
ExportPlugin.php
10.51
KB
-rwxrwxr-x
ImportPlugin.php
1.68
KB
-rwxrwxr-x
IOTransformationsPlugin.php
2.31
KB
-rwxrwxr-x
SchemaPlugin.php
2.3
KB
-rwxrwxr-x
TransformationsInterface.php
862
B
-rwxrwxr-x
TransformationsPlugin.php
1.67
KB
-rwxrwxr-x
UploadInterface.php
627
B
-rwxrwxr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : AuthenticationPlugin.php
<?php /* vim: set expandtab sw=4 ts=4 sts=4: */ /** * Abstract class for the authentication plugins * * @package PhpMyAdmin */ namespace PMA\libraries\plugins; use PMA\libraries\Sanitize; use PMA\libraries\URL; /** * Provides a common interface that will have to be implemented by all of the * authentication plugins. * * @package PhpMyAdmin */ abstract class AuthenticationPlugin { /** * Displays authentication form * * @return boolean */ abstract public function auth(); /** * Gets advanced authentication settings * * @return boolean */ abstract public function authCheck(); /** * Set the user and password after last checkings if required * * @return boolean */ abstract public function authSetUser(); /** * Stores user credentials after successful login. * * @return void */ public function storeUserCredentials() { } /** * User is not allowed to login to MySQL -> authentication failed * * @return boolean */ abstract public function authFails(); /** * Perform logout * * @return void */ public function logOut() { global $PHP_AUTH_USER, $PHP_AUTH_PW; /* Obtain redirect URL (before doing logout) */ if (! empty($GLOBALS['cfg']['Server']['LogoutURL'])) { $redirect_url = $GLOBALS['cfg']['Server']['LogoutURL']; } else { $redirect_url = $this->getLoginFormURL(); } /* Clear credentials */ $PHP_AUTH_USER = ''; $PHP_AUTH_PW = ''; /* * Get a logged-in server count in case of LoginCookieDeleteAll is disabled. */ $server = 0; if ($GLOBALS['cfg']['LoginCookieDeleteAll'] === false && $GLOBALS['cfg']['Server']['auth_type'] == 'cookie' ) { foreach ($GLOBALS['cfg']['Servers'] as $key => $val) { if (isset($_COOKIE['pmaAuth-' . $key])) { $server = $key; } } } if ($server === 0) { /* delete user's choices that were stored in session */ if (! defined('TESTSUITE')) { $_SESSION = array(); session_destroy(); } /* Redirect to login form (or configured URL) */ PMA_sendHeaderLocation($redirect_url); } else { /* Redirect to other autenticated server */ $_SESSION['partial_logout'] = true; PMA_sendHeaderLocation( './index.php' . URL::getCommonRaw(array('server' => $server)) ); } } /** * Returns URL for login form. * * @return string */ public function getLoginFormURL() { return './index.php'; } /** * Returns error message for failed authentication. * * @return string */ public function getErrorMessage() { if (!empty($GLOBALS['login_without_password_is_forbidden'])) { return __( 'Login without a password is forbidden by configuration' . ' (see AllowNoPassword)' ); } elseif (!empty($GLOBALS['allowDeny_forbidden'])) { return __('Access denied!'); } elseif (!empty($GLOBALS['no_activity'])) { return sprintf( __('No activity within %s seconds; please log in again.'), intval($GLOBALS['cfg']['LoginCookieValidity']) ); } else { $dbi_error = $GLOBALS['dbi']->getError(); if (!empty($dbi_error)) { return htmlspecialchars($dbi_error); } elseif (isset($GLOBALS['errno'])) { return '#' . $GLOBALS['errno'] . ' ' . __('Cannot log in to the MySQL server'); } else { return __('Cannot log in to the MySQL server'); } } } /** * Callback when user changes password. * * @param string $password New password to set * * @return void */ public function handlePasswordChange($password) { } /** * Store session access time in session. * * Tries to workaround PHP 5 session garbage collection which * looks at the session file's last modified time * * @return void */ public function setSessionAccessTime() { if (isset($_REQUEST['guid'])) { $guid = (string)$_REQUEST['guid']; } else { $guid = 'default'; } if (isset($_REQUEST['access_time'])) { // Ensure access_time is in range <0, LoginCookieValidity + 1> // to avoid excessive extension of validity. // // Negative values can cause session expiry extension // Too big values can cause overflow and lead to same $time = time() - min(max(0, intval($_REQUEST['access_time'])), $GLOBALS['cfg']['LoginCookieValidity'] + 1); } else { $time = time(); } $_SESSION['browser_access_time'][$guid] = $time; } }
Close