Änderungen https Andy Müller rückgängig gemacht

This commit is contained in:
aschwarz
2023-04-26 13:59:36 +02:00
parent 55f1b9a7a9
commit 09fea7ec1a
497 changed files with 999 additions and 999 deletions

View File

@ -7,7 +7,7 @@
*
* Written by Scott Barnett, Richard Hyland
* email: scott@wiggumworld.com, adldap@richardhyland.com
* https://adldap.sourceforge.net/
* http://adldap.sourceforge.net/
*
* Copyright (c) 2006-2010 Scott Barnett, Richard Hyland
*
@ -28,10 +28,10 @@
* @package adLDAP
* @author Scott Barnett, Richard Hyland
* @copyright (c) 2006-2010 Scott Barnett, Richard Hyland
* @license https://www.gnu.org/licenses/old-licenses/lgpl-2.1.html LGPLv2.1
* @license http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html LGPLv2.1
* @revision $Revision: 91 $
* @version 3.3.2
* @link https://adldap.sourceforge.net/
* @link http://adldap.sourceforge.net/
*/
/**
@ -57,7 +57,7 @@ define ('ADLDAP_CONTAINER', 'CN');
* much information on other users as you could as a domain admin.
*
* Before asking questions, please read the Documentation at
* https://adldap.sourceforge.net/wiki/doku.php?id=api
* http://adldap.sourceforge.net/wiki/doku.php?id=api
*/
class adLDAP {
/**
@ -101,7 +101,7 @@ class adLDAP {
protected $_ad_password="ldHS332";
/**
* AD does not return the primary group. https://support.microsoft.com/?kbid=321360
* AD does not return the primary group. http://support.microsoft.com/?kbid=321360
* This tweak will resolve the real primary group.
* Setting to false will fudge "Domain Users" and is much faster. Keep in mind though that if
* someone's primary group is NOT domain users, this is obviously going to mess up the results
@ -112,7 +112,7 @@ class adLDAP {
/**
* Use SSL (LDAPS), your server needs to be setup, please see
* https://adldap.sourceforge.net/wiki/doku.php?id=ldap_over_ssl
* http://adldap.sourceforge.net/wiki/doku.php?id=ldap_over_ssl
*
* @var bool
*/
@ -343,7 +343,7 @@ class adLDAP {
}
if ($this->ldap_supported() === false) {
throw new adLDAPException('No LDAP support for PHP. See: https://www.php.net/ldap');
throw new adLDAPException('No LDAP support for PHP. See: http://www.php.net/ldap');
}
return $this->connect();
@ -1033,13 +1033,13 @@ class adLDAP {
*
* @param string $username The username to query
* @param book $isGUID Is the username passed a GUID or a samAccountName
* @requires bcmath https://www.php.net/manual/en/book.bc.php
* @requires bcmath http://www.php.net/manual/en/book.bc.php
* @return array
*/
public function user_password_expiry($username,$isGUID=false) {
if ($username===NULL){ return ("Missing compulsory field [username]"); }
if (!$this->_bind){ return (false); }
if (!function_exists('bcmod')) { return ("Missing function support [bcmod] https://www.php.net/manual/en/book.bc.php"); };
if (!function_exists('bcmod')) { return ("Missing function support [bcmod] http://www.php.net/manual/en/book.bc.php"); };
$userinfo = $this->user_info($username, array("pwdlastset", "useraccountcontrol"), $isGUID);
$pwdlastset = $userinfo[0]['pwdlastset'][0];
@ -1068,7 +1068,7 @@ class adLDAP {
$maxpwdage = $info[0]['maxpwdage'][0];
// See MSDN: https://msdn.microsoft.com/en-us/library/ms974598.aspx
// See MSDN: http://msdn.microsoft.com/en-us/library/ms974598.aspx
//
// pwdLastSet contains the number of 100 nanosecond intervals since January 1, 1601 (UTC),
// stored in a 64 bit integer.
@ -1471,7 +1471,7 @@ class adLDAP {
/**
* Returns a folder listing for a specific OU
* See https://adldap.sourceforge.net/wiki/doku.php?id=api_folder_functions
* See http://adldap.sourceforge.net/wiki/doku.php?id=api_folder_functions
*
* @param array $folder_name An array to the OU you wish to list.
* If set to NULL will list the root, strongly recommended to set
@ -1685,7 +1685,7 @@ class adLDAP {
/**
* Add an X400 address to Exchange
* See https://tools.ietf.org/html/rfc1685 for more information.
* See http://tools.ietf.org/html/rfc1685 for more information.
* An X400 Address looks similar to this X400:c=US;a= ;p=Domain;o=Organization;s=Doe;g=John;
*
* @param string $username The username of the user to add the X400 to to
@ -2094,7 +2094,7 @@ class adLDAP {
/**
* Coping with AD not returning the primary group
* https://support.microsoft.com/?kbid=321360
* http://support.microsoft.com/?kbid=321360
*
* For some reason it's not possible to search on primarygrouptoken=XXX
* If someone can show otherwise, I'd like to know about it :)
@ -2125,7 +2125,7 @@ class adLDAP {
/**
* Coping with AD not returning the primary group
* https://support.microsoft.com/?kbid=321360
* http://support.microsoft.com/?kbid=321360
*
* This is a re-write based on code submitted by Bruce which prevents the
* need to search each security group to find the true primary group