summaryrefslogtreecommitdiffstats
path: root/include/preferences.php
diff options
context:
space:
mode:
authorArun Persaud <arun@nubati.net>2012-09-22 12:38:58 -0700
committerArun Persaud <arun@nubati.net>2012-09-22 12:46:27 -0700
commit14f6017a5b84d70320bde9d6e074ea8ac948a85e (patch)
tree6ad038518dff9737042501929a8919f622652c8d /include/preferences.php
parent90e831805a19358ab5a76c569181f72bc3534cb8 (diff)
downloade-DoKo-14f6017a5b84d70320bde9d6e074ea8ac948a85e.tar.gz
e-DoKo-14f6017a5b84d70320bde9d6e074ea8ac948a85e.tar.bz2
e-DoKo-14f6017a5b84d70320bde9d6e074ea8ac948a85e.zip
updated to better password hash: use crypt instead of md5
the upgrade will be done automatically when a user logs in, password recovery is still based on md5, but that should be OK, since it's a random generated password anyway
Diffstat (limited to 'include/preferences.php')
-rw-r--r--include/preferences.php19
1 files changed, 15 insertions, 4 deletions
diff --git a/include/preferences.php b/include/preferences.php
index 57c025f..a20913a 100644
--- a/include/preferences.php
+++ b/include/preferences.php
@@ -273,9 +273,9 @@ if(myisset("password0","password1","password2") && $_REQUEST["password0"]!="" &
$changed_password = 1;
/* check if old password matches */
- $oldpasswd = md5($_REQUEST["password0"]);
- $password = DB_get_passwd_by_userid($myid);
- if(!( ($password == $oldpasswd) || DB_check_recovery_passwords($oldpasswd,$email) ))
+ $result = verify_password($email, $_REQUEST["password0"]);
+
+ if( $result!=0 )
$changed_password = -1;
/* check if new password has been typed in correctly */
@@ -288,8 +288,19 @@ if(myisset("password0","password1","password2") && $_REQUEST["password0"]!="" &
if($changed_password==1)
{
- DB_query("UPDATE User SET password='".md5($_REQUEST["password1"]).
+ // create a password hash using the crypt function, need php 5.3 for this
+ // create and random salt
+ $salt = substr(str_replace('+', '.', base64_encode(sha1(microtime(true), true))), 0, 22);
+ // hash incoming password using 12 rounds of blowfish
+ $hash = crypt($_REQUEST["password1"], '$2y$12$' . $salt);
+
+ DB_query("UPDATE User SET password='".$hash.
"' WHERE id=".DB_quote_smart($myid));
+
+ /* in case this was done using a recovery password delete that password */
+ $tmppasswd = md5($_REQUEST["password0"]);
+ if(DB_check_recovery_passwords($tmppasswd,$email))
+ DB_delete_recovery_passwords($myid);
}
/* error output below */
}