diff options
author | Melanie Thielker | 2017-01-05 19:07:37 +0000 |
---|---|---|
committer | Melanie Thielker | 2017-01-05 19:07:37 +0000 |
commit | b16abc8166c29585cb76cc55c3bdd76e5833cb4f (patch) | |
tree | 6a34f465a74b7a3a6dc00a3d7aa8dcc25ac3e3a5 /OpenSim/Server/Handlers/Authentication/AuthenticationServerPostHandler.cs | |
parent | Make it possible to disable the bakes module in the way it is described in co... (diff) | |
download | opensim-SC-b16abc8166c29585cb76cc55c3bdd76e5833cb4f.zip opensim-SC-b16abc8166c29585cb76cc55c3bdd76e5833cb4f.tar.gz opensim-SC-b16abc8166c29585cb76cc55c3bdd76e5833cb4f.tar.bz2 opensim-SC-b16abc8166c29585cb76cc55c3bdd76e5833cb4f.tar.xz |
Massive tab and trailing space cleanup
Diffstat (limited to '')
-rw-r--r-- | OpenSim/Server/Handlers/Authentication/AuthenticationServerPostHandler.cs | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/OpenSim/Server/Handlers/Authentication/AuthenticationServerPostHandler.cs b/OpenSim/Server/Handlers/Authentication/AuthenticationServerPostHandler.cs index 6ee98b3..d3ea7e2 100644 --- a/OpenSim/Server/Handlers/Authentication/AuthenticationServerPostHandler.cs +++ b/OpenSim/Server/Handlers/Authentication/AuthenticationServerPostHandler.cs | |||
@@ -132,41 +132,41 @@ namespace OpenSim.Server.Handlers.Authentication | |||
132 | case "authenticate": | 132 | case "authenticate": |
133 | if (!request.ContainsKey("PASSWORD")) | 133 | if (!request.ContainsKey("PASSWORD")) |
134 | return FailureResult(); | 134 | return FailureResult(); |
135 | 135 | ||
136 | token = m_AuthenticationService.Authenticate(principalID, request["PASSWORD"].ToString(), lifetime); | 136 | token = m_AuthenticationService.Authenticate(principalID, request["PASSWORD"].ToString(), lifetime); |
137 | 137 | ||
138 | if (token != String.Empty) | 138 | if (token != String.Empty) |
139 | return SuccessResult(token); | 139 | return SuccessResult(token); |
140 | return FailureResult(); | 140 | return FailureResult(); |
141 | 141 | ||
142 | case "setpassword": | 142 | case "setpassword": |
143 | if (!m_AllowSetPassword) | 143 | if (!m_AllowSetPassword) |
144 | return FailureResult(); | 144 | return FailureResult(); |
145 | 145 | ||
146 | if (!request.ContainsKey("PASSWORD")) | 146 | if (!request.ContainsKey("PASSWORD")) |
147 | return FailureResult(); | 147 | return FailureResult(); |
148 | 148 | ||
149 | if (m_AuthenticationService.SetPassword(principalID, request["PASSWORD"].ToString())) | 149 | if (m_AuthenticationService.SetPassword(principalID, request["PASSWORD"].ToString())) |
150 | return SuccessResult(); | 150 | return SuccessResult(); |
151 | else | 151 | else |
152 | return FailureResult(); | 152 | return FailureResult(); |
153 | 153 | ||
154 | case "verify": | 154 | case "verify": |
155 | if (!request.ContainsKey("TOKEN")) | 155 | if (!request.ContainsKey("TOKEN")) |
156 | return FailureResult(); | 156 | return FailureResult(); |
157 | 157 | ||
158 | if (m_AuthenticationService.Verify(principalID, request["TOKEN"].ToString(), lifetime)) | 158 | if (m_AuthenticationService.Verify(principalID, request["TOKEN"].ToString(), lifetime)) |
159 | return SuccessResult(); | 159 | return SuccessResult(); |
160 | 160 | ||
161 | return FailureResult(); | 161 | return FailureResult(); |
162 | 162 | ||
163 | case "release": | 163 | case "release": |
164 | if (!request.ContainsKey("TOKEN")) | 164 | if (!request.ContainsKey("TOKEN")) |
165 | return FailureResult(); | 165 | return FailureResult(); |
166 | 166 | ||
167 | if (m_AuthenticationService.Release(principalID, request["TOKEN"].ToString())) | 167 | if (m_AuthenticationService.Release(principalID, request["TOKEN"].ToString())) |
168 | return SuccessResult(); | 168 | return SuccessResult(); |
169 | 169 | ||
170 | return FailureResult(); | 170 | return FailureResult(); |
171 | 171 | ||
172 | case "getauthinfo": | 172 | case "getauthinfo": |