Changeset 3036:7ed4286c8013
- Timestamp:
- 07/03/15 17:03:26 (10 years ago)
- Branch:
- default
- Files:
-
- 12 edited
-
admin/auth.php (modified) (1 diff)
-
admin/blog_del.php (modified) (1 diff)
-
admin/install/index.php (modified) (1 diff)
-
admin/langs.php (modified) (2 diffs)
-
admin/preferences.php (modified) (1 diff)
-
admin/user.php (modified) (1 diff)
-
admin/users_actions.php (modified) (1 diff)
-
inc/admin/lib.moduleslist.php (modified) (2 diffs)
-
inc/core/class.dc.auth.php (modified) (5 diffs)
-
inc/core/class.dc.core.php (modified) (3 diffs)
-
plugins/antispam/inc/lib.dc.antispam.php (modified) (2 diffs)
-
plugins/importExport/inc/class.dc.import.flat.php (modified) (1 diff)
Legend:
- Unmodified
- Added
- Removed
-
admin/auth.php
r2852 r3036 204 204 205 205 $cookie_admin = http::browserUID(DC_MASTER_KEY.$user_id. 206 crypt::hmac(DC_MASTER_KEY,$user_pwd)).bin2hex(pack('a32',$user_id));206 $core->auth->crypt($user_pwd)).bin2hex(pack('a32',$user_id)); 207 207 208 208 if ($check_perms && $core->auth->mustChangePassword()) -
admin/blog_del.php
r2852 r3036 37 37 if (!$core->error->flag() && $blog_id && !empty($_POST['del'])) 38 38 { 39 if (!$core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['pwd']))) {39 if (!$core->auth->checkPassword($core->auth->crypt($_POST['pwd']))) { 40 40 $core->error->add(__('Password verification failed')); 41 41 } else { -
admin/install/index.php
r2792 r3036 119 119 $cur->user_id = $u_login; 120 120 $cur->user_super = 1; 121 $cur->user_pwd = crypt::hmac(DC_MASTER_KEY,$u_pwd);121 $cur->user_pwd = $core->auth->crypt($u_pwd); 122 122 $cur->user_name = (string) $u_name; 123 123 $cur->user_firstname = (string) $u_firstname; -
admin/langs.php
r2852 r3036 63 63 try 64 64 { 65 if (empty($_POST['your_pwd']) || !$core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['your_pwd']))) {65 if (empty($_POST['your_pwd']) || !$core->auth->checkPassword($core->auth->crypt($_POST['your_pwd']))) { 66 66 throw new Exception(__('Password verification failed')); 67 67 } … … 106 106 try 107 107 { 108 if (empty($_POST['your_pwd']) || !$core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['your_pwd']))) {108 if (empty($_POST['your_pwd']) || !$core->auth->checkPassword($core->auth->crypt($_POST['your_pwd']))) { 109 109 throw new Exception(__('Password verification failed')); 110 110 } -
admin/preferences.php
r3003 r3036 102 102 try 103 103 { 104 $pwd_check = !empty($_POST['cur_pwd']) && $core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['cur_pwd']));104 $pwd_check = !empty($_POST['cur_pwd']) && $core->auth->checkPassword($core->auth->crypt($_POST['cur_pwd'])); 105 105 106 106 if ($core->auth->allowPassChange() && !$pwd_check && $user_email != $_POST['user_email']) { -
admin/user.php
r2852 r3036 72 72 try 73 73 { 74 if (empty($_POST['your_pwd']) || !$core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['your_pwd']))) {74 if (empty($_POST['your_pwd']) || !$core->auth->checkPassword($core->auth->crypt($_POST['your_pwd']))) { 75 75 throw new Exception(__('Password verification failed')); 76 76 } -
admin/users_actions.php
r2720 r3036 97 97 try 98 98 { 99 if (empty($_POST['your_pwd']) || !$core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['your_pwd']))) {99 if (empty($_POST['your_pwd']) || !$core->auth->checkPassword($core->auth->crypt($_POST['your_pwd']))) { 100 100 throw new Exception(__('Password verification failed')); 101 101 } -
inc/admin/lib.moduleslist.php
r3007 r3036 1172 1172 || !empty($_POST['fetch_pkg']) && !empty($_POST['pkg_url'])) 1173 1173 { 1174 if (empty($_POST['your_pwd']) || !$this->core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['your_pwd']))) {1174 if (empty($_POST['your_pwd']) || !$this->core->auth->checkPassword($this->core->auth->crypt($_POST['your_pwd']))) { 1175 1175 throw new Exception(__('Password verification failed')); 1176 1176 } … … 1947 1947 || !empty($_POST['fetch_pkg']) && !empty($_POST['pkg_url'])) 1948 1948 { 1949 if (empty($_POST['your_pwd']) || !$this->core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['your_pwd']))) {1949 if (empty($_POST['your_pwd']) || !$this->core->auth->checkPassword($this->core->auth->crypt($_POST['your_pwd']))) { 1950 1950 throw new Exception(__('Password verification failed')); 1951 1951 } -
inc/core/class.dc.auth.php
r2566 r3036 121 121 if ($pwd != '') 122 122 { 123 if ( crypt::hmac(DC_MASTER_KEY,$pwd) != $rs->user_pwd) {123 if ($this->crypt($pwd) != $rs->user_pwd) { 124 124 sleep(rand(2,5)); 125 125 return false; … … 165 165 166 166 /** 167 * This method crypt given string (password, session_id, …). 168 * 169 * @param string $pwd string to be crypted 170 * @return string crypted value 171 */ 172 public function crypt($pwd) 173 { 174 return crypt::hmac(DC_MASTER_KEY,$pwd); 175 } 176 177 /** 167 178 * This method only check current user password. 168 179 * … … 290 301 $code = 291 302 pack('a32',$this->userID()). 292 pack('H*', crypt::hmac(DC_MASTER_KEY,$this->getInfo('user_pwd')));303 pack('H*',$this->crypt($this->getInfo('user_pwd'))); 293 304 return bin2hex($code); 294 305 } … … 317 328 } 318 329 319 if ( crypt::hmac(DC_MASTER_KEY,$rs->user_pwd) != $pwd) {330 if ($this->crypt($rs->user_pwd) != $pwd) { 320 331 return false; 321 332 } … … 594 605 595 606 $cur = $this->con->openCursor($this->user_table); 596 $cur->user_pwd = crypt::hmac(DC_MASTER_KEY,$new_pass);607 $cur->user_pwd = $this->crypt($new_pass); 597 608 $cur->user_recover_key = null; 598 609 -
inc/core/class.dc.core.php
r3030 r3036 186 186 public function getNonce() 187 187 { 188 return crypt::hmac(DC_MASTER_KEY,session_id());188 return $this->auth->crypt(session_id()); 189 189 } 190 190 … … 195 195 } 196 196 197 return $secret == crypt::hmac(DC_MASTER_KEY,session_id());197 return $secret == $this->auth->crypt(session_id()); 198 198 } 199 199 … … 847 847 throw new Exception(__('Password must contain at least 6 characters.')); 848 848 } 849 $cur->user_pwd = crypt::hmac(DC_MASTER_KEY,$cur->user_pwd);849 $cur->user_pwd = $this->auth->crypt($cur->user_pwd); 850 850 } 851 851 -
plugins/antispam/inc/lib.dc.antispam.php
r2823 r3036 134 134 $code = 135 135 pack('a32',$core->auth->userID()). 136 pack('H*', crypt::hmac(DC_MASTER_KEY,$core->auth->getInfo('user_pwd')));136 pack('H*',$core->auth->crypt($core->auth->getInfo('user_pwd'))); 137 137 return bin2hex($code); 138 138 } … … 161 161 } 162 162 163 if ( crypt::hmac(DC_MASTER_KEY,$rs->user_pwd) != $pwd) {163 if ($core->auth->crypt($rs->user_pwd) != $pwd) { 164 164 return false; 165 165 } -
plugins/importExport/inc/class.dc.import.flat.php
r2485 r3036 90 90 if ($full_upl !== null && $this->core->auth->isSuperAdmin()) 91 91 { 92 if (empty($_POST['your_pwd']) || !$this->core->auth->checkPassword( crypt::hmac(DC_MASTER_KEY,$_POST['your_pwd']))) {92 if (empty($_POST['your_pwd']) || !$this->core->auth->checkPassword($this->core->auth->crypt($_POST['your_pwd']))) { 93 93 throw new Exception(__('Password verification failed')); 94 94 }
Note: See TracChangeset
for help on using the changeset viewer.
