2001-02-06 21:13:06 +01:00
|
|
|
<?php
|
2004-01-18 22:12:53 +01:00
|
|
|
/**************************************************************************\
|
|
|
|
* eGroupWare API - Password auth and crypt functions *
|
|
|
|
* This file written by Miles Lott <milos@groupwhere.org> *
|
|
|
|
* Copyright (C) 2004 Miles Lott *
|
|
|
|
* Most functions based on code from http://www.thomas-alfeld.de/frank/ *
|
|
|
|
* Other code taken from class.common.inc.php originally from phpGroupWare *
|
|
|
|
* ------------------------------------------------------------------------ *
|
|
|
|
* This library is free software; you can redistribute it and/or modify it *
|
|
|
|
* under the terms of the GNU Lesser General Public License as published by *
|
|
|
|
* the Free Software Foundation; either version 2.1 of the License, *
|
|
|
|
* or any later version. *
|
|
|
|
* This library is distributed in the hope that it will be useful, but *
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. *
|
|
|
|
* See the GNU Lesser General Public License for more details. *
|
|
|
|
* You should have received a copy of the GNU Lesser General Public License *
|
|
|
|
* along with this library; if not, write to the Free Software Foundation, *
|
|
|
|
* Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA *
|
|
|
|
\**************************************************************************/
|
|
|
|
|
|
|
|
/* $Id$ */
|
|
|
|
|
|
|
|
if(empty($GLOBALS['phpgw_info']['server']['auth_type']))
|
2001-08-30 21:40:44 +02:00
|
|
|
{
|
|
|
|
$GLOBALS['phpgw_info']['server']['auth_type'] = 'sql';
|
|
|
|
}
|
|
|
|
include(PHPGW_API_INC.'/class.auth_'.$GLOBALS['phpgw_info']['server']['auth_type'].'.inc.php');
|
2004-01-18 22:12:53 +01:00
|
|
|
|
|
|
|
class auth extends auth_
|
|
|
|
{
|
|
|
|
var $seeded = False;
|
|
|
|
var $error = '';
|
|
|
|
|
|
|
|
/*!
|
|
|
|
@function randomstring
|
|
|
|
@abstract return a random string of size $size
|
|
|
|
@param $size int-size of random string to return
|
|
|
|
*/
|
|
|
|
function randomstring($size)
|
|
|
|
{
|
|
|
|
$s = '';
|
|
|
|
$random_char = array(
|
|
|
|
'0','1','2','3','4','5','6','7','8','9','a','b','c','d','e','f',
|
|
|
|
'g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v',
|
|
|
|
'w','x','y','z','A','B','C','D','E','F','G','H','I','J','K','L',
|
|
|
|
'M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z'
|
|
|
|
);
|
|
|
|
|
|
|
|
if(!$this->seeded && phpversion() < '4.2.0')
|
|
|
|
{
|
|
|
|
list($usec, $sec) = explode(' ', microtime());
|
|
|
|
mt_srand((float)$sec + ((float)$usec * 100000));
|
|
|
|
$this->seeded = True;
|
|
|
|
}
|
|
|
|
|
|
|
|
for ($i=0; $i<$size; $i++)
|
|
|
|
{
|
|
|
|
$s .= $random_char[mt_rand(1,61)];
|
|
|
|
}
|
|
|
|
return $s;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*!
|
|
|
|
@function encrypt_password
|
|
|
|
@abstract encrypt password
|
|
|
|
@abstract uses the encryption type set in setup and calls the appropriate encryption functions
|
|
|
|
@param $password password to encrypt
|
|
|
|
*/
|
|
|
|
function encrypt_password($password,$sql=False)
|
|
|
|
{
|
|
|
|
if($sql)
|
|
|
|
{
|
|
|
|
return $this->encrypt_sql($password);
|
|
|
|
}
|
|
|
|
return $this->encrypt_ldap($password);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*!
|
|
|
|
@function encrypt_ldap
|
|
|
|
@abstract encrypt password for ldap
|
|
|
|
@abstract uses the encryption type set in setup and calls the appropriate encryption functions
|
|
|
|
@param $password password to encrypt
|
|
|
|
*/
|
|
|
|
function encrypt_ldap($password)
|
|
|
|
{
|
|
|
|
$type = strtolower($GLOBALS['phpgw_info']['server']['ldap_encryption_type']);
|
|
|
|
$salt = '';
|
|
|
|
switch($type)
|
|
|
|
{
|
|
|
|
case 'des':
|
|
|
|
$salt = $this->randomstring(2);
|
|
|
|
$_password = crypt($password, $salt);
|
|
|
|
$e_password = sprintf('%s%s', '{crypt}', $_password);
|
|
|
|
break;
|
|
|
|
case 'md5':
|
|
|
|
/* New method taken from the openldap-software list as recommended by
|
|
|
|
* Kervin L. Pierre" <kervin@blueprint-tech.com>
|
|
|
|
*/
|
|
|
|
$e_password = '{md5}' . base64_encode(pack("H*",md5($password)));
|
|
|
|
break;
|
|
|
|
case 'sha':
|
|
|
|
if(!function_exists('mhash'))
|
|
|
|
{
|
|
|
|
return False;
|
|
|
|
}
|
|
|
|
$e_password = '{SHA}' . base64_encode(mhash(MHASH_SHA1, $userpass));
|
|
|
|
break;
|
|
|
|
case 'ssha':
|
|
|
|
if(!function_exists('mhash'))
|
|
|
|
{
|
|
|
|
return False;
|
|
|
|
}
|
|
|
|
$salt = $this->randomstring(8);
|
|
|
|
$hash = mhash(MHASH_SHA1, $password . $salt);
|
|
|
|
$e_password = '{SSHA}' . base64_encode($hash . $salt);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return False;
|
|
|
|
}
|
|
|
|
return $e_password;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create a password for storage in the phpgw_accounts table */
|
|
|
|
function encrypt_sql($password)
|
|
|
|
{
|
|
|
|
$type = @$GLOBALS['phpgw_info']['server']['sql_encryption_type']
|
|
|
|
? strtolower($GLOBALS['phpgw_info']['server']['sql_encryption_type'])
|
|
|
|
: 'md5';
|
|
|
|
switch($type)
|
|
|
|
{
|
|
|
|
case 'crypt':
|
|
|
|
if(@defined('CRYPT_STD_DES') && CRYPT_STD_DES == 1)
|
|
|
|
{
|
|
|
|
$salt = $this->randomstring(2);
|
|
|
|
return crypt($password,$salt);
|
|
|
|
}
|
|
|
|
$this->error = 'no std crypt';
|
|
|
|
break;
|
|
|
|
case 'blowfish_crypt':
|
|
|
|
if(@defined('CRYPT_BLOWFISH') && CRYPT_BLOWFISH == 1)
|
|
|
|
{
|
|
|
|
$salt = '$2$' . $this->randomstring(13);
|
|
|
|
return crypt($password,$salt);
|
|
|
|
}
|
|
|
|
$this->error = 'no blowfish crypt';
|
|
|
|
break;
|
|
|
|
case 'md5_crypt':
|
|
|
|
if(@defined('CRYPT_MD5') && CRYPT_MD5 == 1)
|
|
|
|
{
|
|
|
|
$salt = '$1$' . $this->randomstring(9);
|
|
|
|
return crypt($password,$salt);
|
|
|
|
}
|
|
|
|
$this->error = 'no md5 crypt';
|
|
|
|
break;
|
|
|
|
case 'ext_crypt':
|
|
|
|
if(@defined('CRYPT_EXT_DES') && CRYPT_EXT_DES == 1)
|
|
|
|
{
|
|
|
|
$salt = $this->randomstring(9);
|
|
|
|
return crypt($password,$salt);
|
|
|
|
}
|
|
|
|
$this->error = 'no ext crypt';
|
|
|
|
break;
|
|
|
|
case 'sha':
|
|
|
|
if(!function_exists('mhash'))
|
|
|
|
{
|
|
|
|
$this->error = 'no sha';
|
|
|
|
return False;
|
|
|
|
}
|
|
|
|
return '{SHA}' . base64_encode(mhash(MHASH_SHA1,$passwd));
|
|
|
|
case 'ssha':
|
|
|
|
if(!function_exists('mhash'))
|
|
|
|
{
|
|
|
|
$this->error = 'no ssha';
|
|
|
|
return False;
|
|
|
|
}
|
|
|
|
$salt = $this->randomstring(8);
|
|
|
|
$hash = mhash(MHASH_SHA1, $password . $salt);
|
|
|
|
return '{SSHA}' . base64_encode($hash . $salt);
|
|
|
|
case 'md5':
|
|
|
|
default:
|
|
|
|
/* This is the old standard for password storage in SQL */
|
|
|
|
return md5($password);
|
|
|
|
}
|
|
|
|
$this->error = $this->error ? $this->error : 'no valid encryption available';
|
|
|
|
return False;
|
|
|
|
}
|
|
|
|
}
|
2001-02-11 21:03:35 +01:00
|
|
|
?>
|