2011-06-02 00:48:29 +02:00
< ? php
// Testet ob ein User eingeloggt ist und lädt die entsprechenden Privilegien
function load_auth () {
2013-10-13 00:52:44 +02:00
global $user , $privileges ;
$user = null ;
if ( isset ( $_SESSION [ 'uid' ])) {
2014-12-28 13:44:56 +01:00
$user = sql_select ( " SELECT * FROM `User` WHERE `UID`=' " . sql_escape ( $_SESSION [ 'uid' ]) . " ' LIMIT 1 " );
2013-10-13 00:52:44 +02:00
if ( count ( $user ) > 0 ) {
// User ist eingeloggt, Datensatz zur Verfügung stellen und Timestamp updaten
list ( $user ) = $user ;
sql_query ( " UPDATE `User` SET " . " `lastLogIn` = ' " . time () . " ' " . " WHERE `UID` = ' " . sql_escape ( $_SESSION [ 'uid' ]) . " ' LIMIT 1; " );
} else
unset ( $_SESSION [ 'uid' ]);
}
$privileges = isset ( $user ) ? privileges_for_user ( $user [ 'UID' ]) : privileges_for_group ( - 1 );
2011-06-02 00:48:29 +02:00
}
2012-12-12 02:31:54 +01:00
// generate a salt (random string) of arbitrary length suitable for the use with crypt()
function generate_salt ( $length = 16 ) {
2013-10-13 00:52:44 +02:00
$alphabet = " ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ " ;
$salt = " " ;
for ( $i = 0 ; $i < $length ; $i ++ ) {
$salt .= $alphabet [ rand ( 0 , strlen ( $alphabet ) - 1 )];
}
return $salt ;
2012-12-12 02:31:54 +01:00
}
// set the password of a user
function set_password ( $uid , $password ) {
2013-12-26 13:34:48 +01:00
return sql_query ( " UPDATE `User` SET `Passwort` = ' " . sql_escape ( crypt ( $password , CRYPT_ALG . '$' . generate_salt ( 16 ) . '$' )) . " ', `password_recovery_token`=NULL WHERE `UID` = " . intval ( $uid ) . " LIMIT 1 " );
2012-12-12 02:31:54 +01:00
}
// verify a password given a precomputed salt.
// if $uid is given and $salt is an old-style salt (plain md5), we convert it automatically
function verify_password ( $password , $salt , $uid = false ) {
2013-10-13 00:52:44 +02:00
$correct = false ;
if ( substr ( $salt , 0 , 1 ) == '$' ) // new-style crypt()
$correct = crypt ( $password , $salt ) == $salt ;
elseif ( substr ( $salt , 0 , 7 ) == '{crypt}' ) // old-style crypt() with DES and static salt - not used anymore
$correct = crypt ( $password , '77' ) == $salt ;
elseif ( strlen ( $salt ) == 32 ) // old-style md5 without salt - not used anymore
$correct = md5 ( $password ) == $salt ;
if ( $correct && substr ( $salt , 0 , strlen ( CRYPT_ALG )) != CRYPT_ALG && $uid ) {
// this password is stored in another format than we want it to be.
// let's update it!
// we duplicate the query from the above set_password() function to have the extra safety of checking the old hash
sql_query ( " UPDATE `User` SET `Passwort` = ' " . sql_escape ( crypt ( $password , CRYPT_ALG . '$' . generate_salt () . '$' )) . " ' WHERE `UID` = " . intval ( $uid ) . " AND `Passwort` = ' " . sql_escape ( $salt ) . " ' LIMIT 1 " );
}
return $correct ;
2011-06-02 00:48:29 +02:00
}
2011-06-03 15:30:17 +02:00
function privileges_for_user ( $user_id ) {
2013-10-13 00:52:44 +02:00
$privileges = array ();
2014-12-28 13:44:56 +01:00
$user_privs = sql_select ( " SELECT `Privileges`.`name` FROM `User` JOIN `UserGroups` ON (`User`.`UID` = `UserGroups`.`uid`) JOIN `GroupPrivileges` ON (`UserGroups`.`group_id` = `GroupPrivileges`.`group_id`) JOIN `Privileges` ON (`GroupPrivileges`.`privilege_id` = `Privileges`.`id`) WHERE `User`.`UID`=' " . sql_escape ( $user_id ) . " ' " );
2013-10-13 00:52:44 +02:00
foreach ( $user_privs as $user_priv )
$privileges [] = $user_priv [ 'name' ];
return $privileges ;
2011-06-03 15:30:17 +02:00
}
function privileges_for_group ( $group_id ) {
2013-10-13 00:52:44 +02:00
$privileges = array ();
2014-12-28 13:44:56 +01:00
$groups_privs = sql_select ( " SELECT * FROM `GroupPrivileges` JOIN `Privileges` ON (`GroupPrivileges`.`privilege_id` = `Privileges`.`id`) WHERE `group_id`=' " . sql_escape ( $group_id ) . " ' " );
2013-10-13 00:52:44 +02:00
foreach ( $groups_privs as $guest_priv )
$privileges [] = $guest_priv [ 'name' ];
return $privileges ;
2011-06-03 15:30:17 +02:00
}
2011-06-03 11:24:22 +02:00
?>