0
|
1 <?php
|
|
2
|
|
3 /**
|
|
4 * SQL Password Driver
|
|
5 *
|
|
6 * Driver for passwords stored in SQL database
|
|
7 *
|
|
8 * @version 2.0
|
|
9 * @author Aleksander 'A.L.E.C' Machniak <alec@alec.pl>
|
|
10 *
|
|
11 * Copyright (C) 2005-2013, The Roundcube Dev Team
|
|
12 *
|
|
13 * This program is free software: you can redistribute it and/or modify
|
|
14 * it under the terms of the GNU General Public License as published by
|
|
15 * the Free Software Foundation, either version 3 of the License, or
|
|
16 * (at your option) any later version.
|
|
17 *
|
|
18 * This program is distributed in the hope that it will be useful,
|
|
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
21 * GNU General Public License for more details.
|
|
22 *
|
|
23 * You should have received a copy of the GNU General Public License
|
|
24 * along with this program. If not, see http://www.gnu.org/licenses/.
|
|
25 */
|
|
26
|
|
27 class rcube_sql_password
|
|
28 {
|
|
29 function save($curpass, $passwd)
|
|
30 {
|
|
31 $rcmail = rcmail::get_instance();
|
|
32
|
|
33 if (!($sql = $rcmail->config->get('password_query'))) {
|
|
34 $sql = 'SELECT update_passwd(%c, %u)';
|
|
35 }
|
|
36
|
|
37 if ($dsn = $rcmail->config->get('password_db_dsn')) {
|
|
38 $db = rcube_db::factory($dsn, '', false);
|
|
39 $db->set_debug((bool)$rcmail->config->get('sql_debug'));
|
|
40 }
|
|
41 else {
|
|
42 $db = $rcmail->get_dbh();
|
|
43 }
|
|
44
|
|
45 if ($db->is_error()) {
|
|
46 return PASSWORD_ERROR;
|
|
47 }
|
|
48
|
|
49 // new password - default hash method
|
|
50 if (strpos($sql, '%P') !== false) {
|
|
51 $password = password::hash_password($passwd);
|
|
52
|
|
53 if ($password === false) {
|
|
54 return PASSWORD_CRYPT_ERROR;
|
|
55 }
|
|
56
|
|
57 $sql = str_replace('%P', $db->quote($password), $sql);
|
|
58 }
|
|
59
|
|
60 // old password - default hash method
|
|
61 if (strpos($sql, '%O') !== false) {
|
|
62 $password = password::hash_password($curpass);
|
|
63
|
|
64 if ($password === false) {
|
|
65 return PASSWORD_CRYPT_ERROR;
|
|
66 }
|
|
67
|
|
68 $sql = str_replace('%O', $db->quote($password), $sql);
|
|
69 }
|
|
70
|
|
71 // crypted password (deprecated, use %P)
|
|
72 if (strpos($sql, '%c') !== false) {
|
|
73 $password = password::hash_password($passwd, 'crypt', false);
|
|
74
|
|
75 if ($password === false) {
|
|
76 return PASSWORD_CRYPT_ERROR;
|
|
77 }
|
|
78
|
|
79 $sql = str_replace('%c', $db->quote($password), $sql);
|
|
80 }
|
|
81
|
|
82 // dovecotpw (deprecated, use %P)
|
|
83 if (strpos($sql, '%D') !== false) {
|
|
84 $password = password::hash_password($passwd, 'dovecot', false);
|
|
85
|
|
86 if ($password === false) {
|
|
87 return PASSWORD_CRYPT_ERROR;
|
|
88 }
|
|
89
|
|
90 $sql = str_replace('%D', $db->quote($password), $sql);
|
|
91 }
|
|
92
|
|
93 // hashed passwords (deprecated, use %P)
|
|
94 if (strpos($sql, '%n') !== false) {
|
|
95 $password = password::hash_password($passwd, 'hash', false);
|
|
96
|
|
97 if ($password === false) {
|
|
98 return PASSWORD_CRYPT_ERROR;
|
|
99 }
|
|
100
|
|
101 $sql = str_replace('%n', $db->quote($password, 'text'), $sql);
|
|
102 }
|
|
103
|
|
104 // hashed passwords (deprecated, use %P)
|
|
105 if (strpos($sql, '%q') !== false) {
|
|
106 $password = password::hash_password($curpass, 'hash', false);
|
|
107
|
|
108 if ($password === false) {
|
|
109 return PASSWORD_CRYPT_ERROR;
|
|
110 }
|
|
111
|
|
112 $sql = str_replace('%q', $db->quote($password, 'text'), $sql);
|
|
113 }
|
|
114
|
|
115 // Handle clear text passwords securely (#1487034)
|
|
116 $sql_vars = array();
|
|
117 if (preg_match_all('/%[p|o]/', $sql, $m)) {
|
|
118 foreach ($m[0] as $var) {
|
|
119 if ($var == '%p') {
|
|
120 $sql = preg_replace('/%p/', '?', $sql, 1);
|
|
121 $sql_vars[] = (string) $passwd;
|
|
122 }
|
|
123 else { // %o
|
|
124 $sql = preg_replace('/%o/', '?', $sql, 1);
|
|
125 $sql_vars[] = (string) $curpass;
|
|
126 }
|
|
127 }
|
|
128 }
|
|
129
|
|
130 $local_part = $rcmail->user->get_username('local');
|
|
131 $domain_part = $rcmail->user->get_username('domain');
|
|
132 $username = $_SESSION['username'];
|
|
133 $host = $_SESSION['imap_host'];
|
|
134
|
|
135 // convert domains to/from punnycode
|
|
136 if ($rcmail->config->get('password_idn_ascii')) {
|
|
137 $domain_part = rcube_utils::idn_to_ascii($domain_part);
|
|
138 $username = rcube_utils::idn_to_ascii($username);
|
|
139 $host = rcube_utils::idn_to_ascii($host);
|
|
140 }
|
|
141 else {
|
|
142 $domain_part = rcube_utils::idn_to_utf8($domain_part);
|
|
143 $username = rcube_utils::idn_to_utf8($username);
|
|
144 $host = rcube_utils::idn_to_utf8($host);
|
|
145 }
|
|
146
|
|
147 // at least we should always have the local part
|
|
148 $sql = str_replace('%l', $db->quote($local_part, 'text'), $sql);
|
|
149 $sql = str_replace('%d', $db->quote($domain_part, 'text'), $sql);
|
|
150 $sql = str_replace('%u', $db->quote($username, 'text'), $sql);
|
|
151 $sql = str_replace('%h', $db->quote($host, 'text'), $sql);
|
|
152
|
|
153 $res = $db->query($sql, $sql_vars);
|
|
154
|
|
155 if (!$db->is_error()) {
|
|
156 if (strtolower(substr(trim($sql),0,6)) == 'select') {
|
|
157 if ($db->fetch_array($res)) {
|
|
158 return PASSWORD_SUCCESS;
|
|
159 }
|
|
160 }
|
|
161 else {
|
|
162 // This is the good case: 1 row updated
|
|
163 if ($db->affected_rows($res) == 1)
|
|
164 return PASSWORD_SUCCESS;
|
|
165 // @TODO: Some queries don't affect any rows
|
|
166 // Should we assume a success if there was no error?
|
|
167 }
|
|
168 }
|
|
169
|
|
170 return PASSWORD_ERROR;
|
|
171 }
|
|
172 }
|