@@ -290,7 +290,7 @@ discard block |
||
| 290 | 290 | * |
| 291 | 291 | * @param string $uid |
| 292 | 292 | * @param string $password |
| 293 | - * @return boolean|null |
|
| 293 | + * @return boolean |
|
| 294 | 294 | * @throws LoginException |
| 295 | 295 | */ |
| 296 | 296 | public function login($uid, $password) { |
@@ -362,6 +362,9 @@ discard block |
||
| 362 | 362 | return $this->config->getSystemValue('token_auth_enforced', true); |
| 363 | 363 | } |
| 364 | 364 | |
| 365 | + /** |
|
| 366 | + * @param string $username |
|
| 367 | + */ |
|
| 365 | 368 | private function isTwoFactorEnforced($username) { |
| 366 | 369 | \OCP\Util::emitHook( |
| 367 | 370 | '\OCA\Files_Sharing\API\Server2Server', |
@@ -376,7 +379,7 @@ discard block |
||
| 376 | 379 | /** |
| 377 | 380 | * Check if the given 'password' is actually a device token |
| 378 | 381 | * |
| 379 | - * @param type $password |
|
| 382 | + * @param string $password |
|
| 380 | 383 | * @return boolean |
| 381 | 384 | */ |
| 382 | 385 | public function isTokenPassword($password) { |
@@ -426,6 +429,9 @@ discard block |
||
| 426 | 429 | return false; |
| 427 | 430 | } |
| 428 | 431 | |
| 432 | + /** |
|
| 433 | + * @param string $uid |
|
| 434 | + */ |
|
| 429 | 435 | private function loginWithToken($uid) { |
| 430 | 436 | // TODO: $this->manager->emit('\OC\User', 'preTokenLogin', array($uid)); |
| 431 | 437 | $user = $this->manager->get($uid); |