]> CyberLeo.Net >> Repos - Github/YOURLS.git/blob - includes/functions-auth.php
Replace deprecated function split()
[Github/YOURLS.git] / includes / functions-auth.php
1 <?php\r
2 // Check for valid user. Returns true or an error message\r
3 function yourls_is_valid_user() {\r
4         static $valid = false;\r
5         \r
6         if( $valid )\r
7                 return true;\r
8                 \r
9         $unfiltered_valid = false;\r
10 \r
11         // Logout request\r
12         if( isset( $_GET['action'] ) && $_GET['action'] == 'logout' ) {\r
13                 yourls_do_action( 'logout' );\r
14                 yourls_store_cookie( null );\r
15                 return 'Logged out successfully';\r
16         }\r
17         \r
18         // Check cookies or login request. Login form has precedence.\r
19         global $yourls_user_passwords;\r
20         \r
21         yourls_do_action( 'pre_login' );\r
22 \r
23         // Determine auth method and check credentials\r
24         if\r
25                 // API only: Secure (no login or pwd) and time limited token\r
26                 // ?timestamp=12345678&signature=md5(totoblah12345678)\r
27                 ( yourls_is_API() &&\r
28                   isset( $_REQUEST['timestamp'] ) && !empty($_REQUEST['timestamp'] ) &&\r
29                   isset( $_REQUEST['signature'] ) && !empty($_REQUEST['signature'] )\r
30                 )\r
31                 {\r
32                         yourls_do_action( 'pre_login_signature_timestamp' );\r
33                         $unfiltered_valid = yourls_check_signature_timestamp();\r
34                 }\r
35                 \r
36         elseif\r
37                 // API only: Secure (no login or pwd)\r
38                 // ?signature=md5(totoblah)\r
39                 ( yourls_is_API() &&\r
40                   !isset( $_REQUEST['timestamp'] ) &&\r
41                   isset( $_REQUEST['signature'] ) && !empty( $_REQUEST['signature'] )\r
42                 )\r
43                 {\r
44                         yourls_do_action( 'pre_login_signature' );\r
45                         $unfiltered_valid = yourls_check_signature();\r
46                 }\r
47         \r
48         elseif\r
49                 // API or normal: login with username & pwd\r
50                 ( isset( $_REQUEST['username'] ) && isset( $_REQUEST['password'] )\r
51                   && !empty( $_REQUEST['username'] ) && !empty( $_REQUEST['password']  ) )\r
52                 {\r
53                         yourls_do_action( 'pre_login_username_password' );\r
54                         $unfiltered_valid = yourls_check_username_password();\r
55                 }\r
56         \r
57         elseif\r
58                 // Normal only: cookies\r
59                 ( !yourls_is_API() && \r
60                   isset( $_COOKIE['yourls_username'] ) && isset( $_COOKIE['yourls_password'] ) )\r
61                 {\r
62                         yourls_do_action( 'pre_login_cookie' );\r
63                         $unfiltered_valid = yourls_check_auth_cookie();\r
64                 }\r
65 \r
66         $valid = yourls_apply_filter( 'is_valid_user', $unfiltered_valid );\r
67 \r
68         // Login for the win!\r
69         if ( $valid ) {\r
70                 yourls_do_action( 'login' );\r
71                 // (Re)store encrypted cookie if needed and tell it's ok\r
72                 if ( !yourls_is_API() && $unfiltered_valid ) \r
73                         yourls_store_cookie( YOURLS_USER );\r
74                 return true;\r
75         }\r
76         \r
77         // Login failed\r
78         yourls_do_action( 'login_failed' );\r
79 \r
80         if ( isset( $_REQUEST['username'] ) || isset( $_REQUEST['password'] ) ) {\r
81                 return 'Invalid username or password';\r
82         } else {\r
83                 return 'Please log in';\r
84         }\r
85 }\r
86 \r
87 // Check auth against list of login=>pwd. Sets user if applicable, returns bool\r
88 function yourls_check_username_password() {\r
89         global $yourls_user_passwords;\r
90         if( isset( $yourls_user_passwords[ $_REQUEST['username'] ] ) && yourls_check_password_hash( $yourls_user_passwords[ $_REQUEST['username'] ], $_REQUEST['password'] ) ) {\r
91                 yourls_set_user( $_REQUEST['username'] );\r
92                 return true;\r
93         }\r
94         return false;\r
95 }\r
96 \r
97 // Check a REQUEST password sent in plain text against stored password which can be a salted hash\r
98 function yourls_check_password_hash( $stored, $plaintext ) {\r
99         if ( substr( $stored, 0, 4 ) == 'md5:' and strlen( $stored ) == 42 ) {\r
100                 // Stored password is a salted hash: "md5:<$r = rand(10000,99999)>:<md5($r.'thepassword')>"\r
101                 // And 42. Of course. http://www.google.com/search?q=the+answer+to+life+the+universe+and+everything\r
102                 list( $temp, $salt, $md5 ) = explode( ':', $stored );\r
103                 return( $stored == 'md5:'.$salt.':'.md5( $salt.$plaintext ) );\r
104         } else {\r
105                 // Password was sent in clear\r
106                 yourls_add_notice( '<strong>Notice</strong>: your password is stored as clear text in your <tt>config.php</tt>.\r
107                 Did you know you can easily improve the security of your YOURLS install by <strong>encrypting</strong> your password?\r
108                 See <a href="http://yourls.org/userpassword">UsernamePassword</a> for details', 'notice' );\r
109                 return( $stored == $plaintext );\r
110         }\r
111 }\r
112 \r
113 \r
114 // Check auth against encrypted COOKIE data. Sets user if applicable, returns bool\r
115 function yourls_check_auth_cookie() {\r
116         global $yourls_user_passwords;\r
117         foreach( $yourls_user_passwords as $valid_user => $valid_password ) {\r
118                 if( \r
119                         yourls_salt( $valid_user ) == $_COOKIE['yourls_username']\r
120                         && yourls_salt( $valid_password ) == $_COOKIE['yourls_password'] \r
121                 ) {\r
122                         yourls_set_user( $valid_user );\r
123                         return true;\r
124                 }\r
125         }\r
126         return false;\r
127 }\r
128 \r
129 // Check auth against signature and timestamp. Sets user if applicable, returns bool\r
130 function yourls_check_signature_timestamp() {\r
131         // Timestamp in PHP : time()\r
132         // Timestamp in JS: parseInt(new Date().getTime() / 1000)\r
133         global $yourls_user_passwords;\r
134         foreach( $yourls_user_passwords as $valid_user => $valid_password ) {\r
135                 if (\r
136                         (\r
137                                 md5( $_REQUEST['timestamp'].yourls_auth_signature( $valid_user ) ) == $_REQUEST['signature']\r
138                                 or\r
139                                 md5( yourls_auth_signature( $valid_user ).$_REQUEST['timestamp'] ) == $_REQUEST['signature']\r
140                         )\r
141                         &&\r
142                         yourls_check_timestamp( $_REQUEST['timestamp'] )\r
143                         ) {\r
144                         yourls_set_user( $valid_user );\r
145                         return true;\r
146                 }\r
147         }\r
148         return false;\r
149 }\r
150 \r
151 // Check auth against signature. Sets user if applicable, returns bool\r
152 function yourls_check_signature() {\r
153         global $yourls_user_passwords;\r
154         foreach( $yourls_user_passwords as $valid_user => $valid_password ) {\r
155                 if ( yourls_auth_signature( $valid_user ) == $_REQUEST['signature'] ) {\r
156                         yourls_set_user( $valid_user );\r
157                         return true;\r
158                 }\r
159         }\r
160         return false;\r
161 }\r
162 \r
163 // Generate secret signature hash\r
164 function yourls_auth_signature( $username = false ) {\r
165         if( !$username && defined('YOURLS_USER') ) {\r
166                 $username = YOURLS_USER;\r
167         }\r
168         return ( $username ? substr( yourls_salt( $username ), 0, 10 ) : 'Cannot generate auth signature: no username' );\r
169 }\r
170 \r
171 // Check if timestamp is not too old\r
172 function yourls_check_timestamp( $time ) {\r
173         $now = time();\r
174         // Allow timestamp to be a little in the future or the past -- see Issue 766\r
175         return yourls_apply_filter( 'check_timestamp', abs( $now - $time ) < YOURLS_NONCE_LIFE, $time );\r
176 }\r
177 \r
178 // Store new cookie. No $user will delete the cookie.\r
179 function yourls_store_cookie( $user = null ) {\r
180         if( !$user ) {\r
181                 $pass = null;\r
182                 $time = time() - 3600;\r
183         } else {\r
184                 global $yourls_user_passwords;\r
185                 if( isset($yourls_user_passwords[$user]) ) {\r
186                         $pass = $yourls_user_passwords[$user];\r
187                 } else {\r
188                         die( 'Stealing cookies?' ); // This should never happen\r
189                 }\r
190                 $time = time() + YOURLS_COOKIE_LIFE;\r
191         }\r
192         \r
193         $domain   = yourls_apply_filter( 'setcookie_domain',   parse_url( YOURLS_SITE, 1 ) );\r
194         $secure   = yourls_apply_filter( 'setcookie_secure',   yourls_is_ssl() );\r
195         $httponly = yourls_apply_filter( 'setcookie_httponly', true );\r
196                 \r
197         if ( !headers_sent() ) {\r
198                 // Set httponly if the php version is >= 5.2.0\r
199                 if( version_compare( phpversion(), '5.2.0', 'ge' ) ) {\r
200                         setcookie('yourls_username', yourls_salt( $user ), $time, '/', $domain, $secure, $httponly );\r
201                         setcookie('yourls_password', yourls_salt( $pass ), $time, '/', $domain, $secure, $httponly );\r
202                 } else {\r
203                         setcookie('yourls_username', yourls_salt( $user ), $time, '/', $domain, $secure );\r
204                         setcookie('yourls_password', yourls_salt( $pass ), $time, '/', $domain, $secure );\r
205                 }\r
206         }\r
207 }\r
208 \r
209 // Set user name\r
210 function yourls_set_user( $user ) {\r
211         if( !defined( 'YOURLS_USER' ) )\r
212                 define( 'YOURLS_USER', $user );\r
213 }\r