acctfuncs.inc.php 18.6 KB
Newer Older
1
<?php
2

Dan McGee's avatar
Dan McGee committed
3
4
5
6
7
8
9
10
# Helper function- retrieve request param if available, "" otherwise
function in_request($name) {
	if (isset($_REQUEST[$name])) {
		return $_REQUEST[$name];
	}
	return "";
}

11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
# Format PGP key fingerprint
function html_format_pgp_fingerprint($fingerprint) {
	if (strlen($fingerprint) != 40 || !ctype_xdigit($fingerprint)) {
		return $fingerprint;
	}

	return htmlspecialchars(substr($fingerprint, 0, 4) . " " .
		substr($fingerprint, 4, 4) . " " .
		substr($fingerprint, 8, 4) . " " .
		substr($fingerprint, 12, 4) . " " .
		substr($fingerprint, 16, 4) . "  " .
		substr($fingerprint, 20, 4) . " " .
		substr($fingerprint, 24, 4) . " " .
		substr($fingerprint, 28, 4) . " " .
		substr($fingerprint, 32, 4) . " " .
		substr($fingerprint, 36, 4) . " ", ENT_QUOTES);
}

29
# Display the standard Account form, pass in default values if any
30

eric's avatar
eric committed
31
function display_account_form($UTYPE,$A,$U="",$T="",$S="",
32
			$E="",$P="",$C="",$R="",$L="",$I="",$K="",$UID=0) {
eric's avatar
eric committed
33
	# UTYPE: what user type the form is being displayed for
34
35
36
37
38
39
40
41
42
43
44
	# A: what "form" name to use
	# U: value to display for username
	# T: value to display for account type
	# S: value to display for account suspended
	# E: value to display for email address
	# P: password value
	# C: confirm password value
	# R: value to display for RealName
	# L: value to display for Language preference
	# I: value to display for IRC nick
	# N: new package notify value
eric's avatar
eric committed
45
	# UID: Users.ID value in case form is used for editing
46
47
48

	global $SUPPORTED_LANGS;

49
	include("account_edit_form.php");
50
51
52
53
54
55
	return;
} # function display_account_form()


# process form input from a new/edit account form
#
eric's avatar
eric committed
56
function process_account_form($UTYPE,$TYPE,$A,$U="",$T="",$S="",$E="",
57
			$P="",$C="",$R="",$L="",$I="",$K="",$UID=0) {
eric's avatar
eric committed
58
	# UTYPE: The user's account type
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
	# TYPE: either "edit" or "new"
	# A: what parent "form" name to use
	# U: value to display for username
	# T: value to display for account type
	# S: value to display for account suspended
	# E: value to display for email address
	# P: password value
	# C: confirm password value
	# R: value to display for RealName
	# L: value to display for Language preference
	# I: value to display for IRC nick
	# N: new package notify value
	# UID: database Users.ID value

	# error check and process request for a new/modified account
	global $SUPPORTED_LANGS;

76
77
	$dbh = db_connect();

78
	if(isset($_COOKIE['AURSID'])) {
79
		$editor_user = uid_from_sid($_COOKIE['AURSID'], $dbh);
80
81
	}
	else {
82
		$editor_user = null;
83
	}
84

85
	$error = "";
86
	if (empty($E) || empty($U)) {
87
88
		$error = __("Missing a required field.");
	}
89

90
91
92
	if ($TYPE == "new") {
		# they need password fields for this type of action
		#
93
		if (empty($P) || empty($C)) {
94
95
96
97
98
99
100
			$error = __("Missing a required field.");
		}
	} else {
		if (!$UID) {
			$error = __("Missing User ID");
		}
	}
101

102
  if (!$error && !valid_username($U) && !user_is_privileged($editor_user, $dbh))
103
	$error = __("The username is invalid.") . "<ul>\n"
104
			."<li>" . __("It must be between %s and %s characters long",
105
106
			USERNAME_MIN_LEN,  USERNAME_MAX_LEN )
			. "</li>"
107
			. "<li>" . __("Start and end with a letter or number") . "</li>"
108
			. "<li>" . __("Can contain only one period, underscore or hyphen.")
109
110
			. "</li>\n</ul>";

111
112
113
	if (!$error && $P && $C && ($P != $C)) {
		$error = __("Password fields do not match.");
	}
114
	if (!$error && $P != '' && !good_passwd($P))
115
		$error = __("Your password must be at least %s characters.",PASSWD_MIN_LEN);
116

117
118
119
	if (!$error && !valid_email($E)) {
		$error = __("The email address is invalid.");
	}
120
121
122
123
124

	if (!$error && $K != '' && !valid_pgp_fingerprint($K)) {
		$error = __("The PGP key fingerprint is invalid.");
	}

eric's avatar
eric committed
125
126
127
	if ($UTYPE == "Trusted User" && $T == 3) {
		$error = __("A Trusted User cannot assign Developer status.");
	}
128
129
130
131
132
133
134
135
	if (!$error && !array_key_exists($L, $SUPPORTED_LANGS)) {
		$error = __("Language is not currently supported.");
	}
	if (!$error) {
		# check to see if this username is available
		# NOTE: a race condition exists here if we care...
		#
		$q = "SELECT COUNT(*) AS CNT FROM Users ";
136
		$q.= "WHERE Username = '".db_escape_string($U)."'";
eric's avatar
eric committed
137
138
139
		if ($TYPE == "edit") {
			$q.= " AND ID != ".intval($UID);
		}
140
141
142
143
		$result = db_query($q, $dbh);
		if ($result) {
			$row = mysql_fetch_array($result);
			if ($row[0]) {
144
				$error = __("The username, %s%s%s, is already in use.",
Viktor Leonhardt's avatar
Viktor Leonhardt committed
145
					"<b>", htmlspecialchars($U,ENT_QUOTES), "</b>");
146
147
148
149
150
151
152
153
			}
		}
	}
	if (!$error) {
		# check to see if this email address is available
		# NOTE: a race condition exists here if we care...
		#
		$q = "SELECT COUNT(*) AS CNT FROM Users ";
154
		$q.= "WHERE Email = '".db_escape_string($E)."'";
eric's avatar
eric committed
155
156
157
		if ($TYPE == "edit") {
			$q.= " AND ID != ".intval($UID);
		}
158
159
160
161
		$result = db_query($q, $dbh);
		if ($result) {
			$row = mysql_fetch_array($result);
			if ($row[0]) {
162
				$error = __("The address, %s%s%s, is already in use.",
Viktor Leonhardt's avatar
Viktor Leonhardt committed
163
						"<b>", htmlspecialchars($E,ENT_QUOTES), "</b>");
164
165
166
167
168
			}
		}
	}
	if ($error) {
		print "<span class='error'>".$error."</span><br/>\n";
eric's avatar
eric committed
169
		display_account_form($UTYPE, $A, $U, $T, $S, $E, "", "",
170
				$R, $L, $I, $K, $UID);
171
172
173
	} else {
		if ($TYPE == "new") {
			# no errors, go ahead and create the unprivileged user
Denis's avatar
Denis committed
174
175
			$salt = generate_salt();
			$P = salted_hash($P, $salt);
176
			$escaped = array_map('db_escape_string',
177
				array($U, $E, $P, $salt, $R, $L, $I, str_replace(" ", "", $K)));
Denis's avatar
Denis committed
178
179
			$q = "INSERT INTO Users (" .
				"AccountTypeID, Suspended, Username, Email, Passwd, Salt" .
180
				", RealName, LangPreference, IRCNick, PGPKey) " .
181
				"VALUES (1, 0, '" . implode("', '", $escaped) . "')";
182
183
			$result = db_query($q, $dbh);
			if (!$result) {
184
				print __("Error trying to create account, %s%s%s: %s.",
Viktor Leonhardt's avatar
Viktor Leonhardt committed
185
						"<b>", htmlspecialchars($U,ENT_QUOTES), "</b>", mysql_error($dbh));
186
			} else {
187
188
				# account created/modified, tell them so.
				#
189
				print __("The account, %s%s%s, has been successfully created.",
Viktor Leonhardt's avatar
Viktor Leonhardt committed
190
						"<b>", htmlspecialchars($U,ENT_QUOTES), "</b>");
191
192
193
194
195
196
197
				print "<p>\n";
				print __("Click on the Home link above to login.");
				print "</p>\n";
			}

		} else {
			# no errors, go ahead and modify the user account
jchu's avatar
jchu committed
198

199
			$q = "UPDATE Users SET ";
200
			$q.= "Username = '".db_escape_string($U)."'";
eric's avatar
eric committed
201
202
203
204
205
206
207
208
			if ($T) {
				$q.= ", AccountTypeID = ".intval($T);
			}
			if ($S) {
				$q.= ", Suspended = 1";
			} else {
				$q.= ", Suspended = 0";
			}
209
			$q.= ", Email = '".db_escape_string($E)."'";
eric's avatar
eric committed
210
			if ($P) {
Denis's avatar
Denis committed
211
212
213
				$salt = generate_salt();
				$hash = salted_hash($P, $salt);
				$q .= ", Passwd = '$hash', Salt = '$salt'";
eric's avatar
eric committed
214
			}
215
216
217
			$q.= ", RealName = '".db_escape_string($R)."'";
			$q.= ", LangPreference = '".db_escape_string($L)."'";
			$q.= ", IRCNick = '".db_escape_string($I)."'";
218
			$q.= ", PGPKey = '".db_escape_string(str_replace(" ", "", $K))."'";
219
			$q.= " WHERE ID = ".intval($UID);
220
221
			$result = db_query($q, $dbh);
			if (!$result) {
222
				print __("Error trying to modify account, %s%s%s: %s.",
Viktor Leonhardt's avatar
Viktor Leonhardt committed
223
						"<b>", htmlspecialchars($U,ENT_QUOTES), "</b>", mysql_error($dbh));
224
			} else {
225
				print __("The account, %s%s%s, has been successfully modified.",
Viktor Leonhardt's avatar
Viktor Leonhardt committed
226
						"<b>", htmlspecialchars($U,ENT_QUOTES), "</b>");
227
228
229
230
231
232
233
234
235
			}
		}
	}
	return;
}

# search existing accounts
#
function search_accounts_form() {
236
	include("search_accounts_form.php");
237
238
239
240
241
242
	return;
}


# search results page
#
eric's avatar
eric committed
243
function search_results_page($UTYPE,$O=0,$SB="",$U="",$T="",
244
		$S="",$E="",$R="",$I="",$K="") {
eric's avatar
eric committed
245
	# UTYPE: what account type the user belongs to
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
	# O: what row offset we're at
	# SB: how to sort the results
	# U: value to display for username
	# T: value to display for account type
	# S: value to display for account suspended
	# E: value to display for email address
	# R: value to display for RealName
	# I: value to display for IRC nick

	$HITS_PER_PAGE = 50;
	if ($O) {
		$OFFSET = intval($O);
	} else {
		$OFFSET = 0;
	}
	if ($OFFSET < 0) {
		$OFFSET = 0;
	}
	$search_vars = array();

	$q = "SELECT Users.*, AccountTypes.AccountType ";
	$q.= "FROM Users, AccountTypes ";
	$q.= "WHERE AccountTypes.ID = Users.AccountTypeID ";
	if ($T == "u") {
		$q.= "AND AccountTypes.ID = 1 ";
		$search_vars[] = "T";
	} elseif ($T == "t") {
		$q.= "AND AccountTypes.ID = 2 ";
		$search_vars[] = "T";
	} elseif ($T == "d") {
		$q.= "AND AccountTypes.ID = 3 ";
		$search_vars[] = "T";
	}
	if ($S) {
		$q.= "AND Users.Suspended = 1 ";
		$search_vars[] = "S";
	}
	if ($U) {
284
		$q.= "AND Username LIKE '%".db_escape_like($U)."%' ";
285
286
287
		$search_vars[] = "U";
	}
	if ($E) {
288
		$q.= "AND Email LIKE '%".db_escape_like($E)."%' ";
289
290
291
		$search_vars[] = "E";
	}
	if ($R) {
292
		$q.= "AND RealName LIKE '%".db_escape_like($R)."%' ";
293
294
295
		$search_vars[] = "R";
	}
	if ($I) {
296
		$q.= "AND IRCNick LIKE '%".db_escape_like($I)."%' ";
297
298
		$search_vars[] = "I";
	}
299
300
301
302
	if ($K) {
		$q.= "AND PGPKey LIKE '%".db_escape_like(str_replace(" ", "", $K))."%' ";
		$search_vars[] = "K";
	}
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
	switch ($SB) {
		case 't':
			$q.= "ORDER BY AccountTypeID, Username ";
			break;
		case 'r':
			$q.= "ORDER BY RealName, AccountTypeID ";
			break;
		case 'i':
			$q.= "ORDER BY IRCNick, AccountTypeID ";
			break;
		case 'v':
			$q.= "ORDER BY LastVoted, Username ";
			break;
		default:
			$q.= "ORDER BY Username, AccountTypeID ";
			break;
	}
	$search_vars[] = "SB";
321
	$q.= "LIMIT " . $HITS_PER_PAGE . " OFFSET " . $OFFSET;
322

323
324
	$dbh = db_connect();

325
	$result = db_query($q, $dbh);
326
327
328
329
330
331
	$num_rows = mysql_num_rows($result);

	while ($row = mysql_fetch_assoc($result)) {
		$userinfo[] = $row;
	}

332
	include("account_search_results.php");
333
334
335
	return;
}

336
337
# Display non-editable account info
#
338
function display_account_info($U="", $T="", $E="", $R="", $I="", $K="", $LV="") {
339
340
341
342
343
	# U: value to display for username
	# T: value to display for account type
	# E: value to display for email address
	# R: value to display for RealName
	# I: value to display for IRC nick
344
	# LV: value to display for last voted
345
346
347

	global $SUPPORTED_LANGS;

348
	print "<table>\n";
349
350
351
352
353
354
355
356
	print "  <tr>\n";
	print "    <td colspan='2'>&nbsp;</td>\n";
	print "  </tr>\n";

	print "  <tr>\n";
	print "    <td align='left'>".__("Username").":</td>\n";
	print "    <td align='left'>".$U."</td>\n";
	print "  </tr>\n";
357

358
359
360
361
362
363
364
	print "  <tr>\n";
	print "    <td align='left'>".__("Account Type").":</td>\n";
	print "    <td align='left'>";
	if ($T == "User") {
		print __("User");
	} elseif ($T == "Trusted User") {
		print __("Trusted User");
365
	} elseif ($T == "Developer") {
366
367
		print __("Developer");
	}
Lukas Fleischer's avatar
Lukas Fleischer committed
368
369
	print "    </td>\n";
	print "  </tr>\n";
370

371
372
	print "  <tr>\n";
	print "    <td align='left'>".__("Email Address").":</td>\n";
Viktor Leonhardt's avatar
Viktor Leonhardt committed
373
	print "    <td align='left'><a href='mailto:".htmlspecialchars($E,ENT_QUOTES)."'>".htmlspecialchars($E,ENT_QUOTES)."</a></td>\n";
374
375
376
377
	print "  </tr>\n";

	print "  <tr>\n";
	print "    <td align='left'>".__("Real Name").":</td>\n";
Viktor Leonhardt's avatar
Viktor Leonhardt committed
378
	print "    <td align='left'>".htmlspecialchars($R,ENT_QUOTES)."</td>\n";
379
380
381
382
	print "  </tr>\n";

	print "  <tr>\n";
	print "    <td align='left'>".__("IRC Nick").":</td>\n";
Viktor Leonhardt's avatar
Viktor Leonhardt committed
383
	print "    <td align='left'>".htmlspecialchars($I,ENT_QUOTES)."</td>\n";
384
385
	print "  </tr>\n";

386
387
388
389
390
	print "  <tr>\n";
	print "    <td align='left'>".__("PGP Key Fingerprint").":</td>\n";
	print "    <td align='left'>".html_format_pgp_fingerprint($K)."</td>\n";
	print "  </tr>\n";

391
392
393
394
395
396
397
	print "  <tr>\n";
	print "    <td align='left'>".__("Last Voted").":</td>\n";
	print "    <td align='left'>";
	print $LV ? date("Y-m-d", $LV) : __("Never");
	print "</td>\n";
	print "  </tr>\n";

398
	print "  <tr>\n";
Lukas Fleischer's avatar
Lukas Fleischer committed
399
	print "    <td colspan='2'><a href='packages.php?K=".$U."&amp;SeB=m'>".__("View this user's packages")."</a></td>\n";
400
401
	print "  </tr>\n";

402
403
404
405
	print "</table>\n";
	return;
}

406
407
408
409
410
/*
 * Returns SID (Session ID) and error (error message) in an array
 * SID of 0 means login failed.
 */
function try_login() {
411
	global $MAX_SESSIONS_PER_USER, $PERSISTENT_COOKIE_TIMEOUT;
412

Loui Chang's avatar
Loui Chang committed
413
	$login_error = "";
414
415
416
417
	$new_sid = "";
	$userID = null;

	if ( isset($_REQUEST['user']) || isset($_REQUEST['passwd']) ) {
418
419
		$dbh = db_connect();
		$userID = valid_user($_REQUEST['user'], $dbh);
420

421
		if ( user_suspended($userID, $dbh) ) {
422
423
424
			$login_error = "Account Suspended.";
		}
		elseif ( $userID && isset($_REQUEST['passwd'])
425
		  && valid_passwd($userID, $_REQUEST['passwd'], $dbh) ) {
426
427
428
429
430
431
432

			$logged_in = 0;
			$num_tries = 0;

			# Account looks good.  Generate a SID and store it.

			while (!$logged_in && $num_tries < 5) {
433
434
435
436
437
				if ($MAX_SESSIONS_PER_USER) {
					# Delete all user sessions except the
					# last ($MAX_SESSIONS_PER_USER - 1).
					$q = "DELETE s.* FROM Sessions s ";
					$q.= "LEFT JOIN (SELECT SessionID FROM Sessions ";
438
					$q.= "WHERE UsersId = " . $userID . " ";
439
440
441
					$q.= "ORDER BY LastUpdateTS DESC ";
					$q.= "LIMIT " . ($MAX_SESSIONS_PER_USER - 1) . ") q ";
					$q.= "ON s.SessionID = q.SessionID ";
442
					$q.= "WHERE s.UsersId = " . $userID . " ";
443
444
445
446
					$q.= "AND q.SessionID IS NULL;";
					db_query($q, $dbh);
				}

447
448
				$new_sid = new_sid();
				$q = "INSERT INTO Sessions (UsersID, SessionID, LastUpdateTS)"
449
				  ." VALUES (" . $userID . ", '" . $new_sid . "', UNIX_TIMESTAMP())";
450
				$result = db_query($q, $dbh);
451

452
453
454
455
456
				# Query will fail if $new_sid is not unique
				if ($result) {
					$logged_in = 1;
					break;
				}
457

458
				$num_tries++;
459
			}
460

461
			if ($logged_in) {
462
463
464
				$q = "UPDATE Users SET LastLogin = UNIX_TIMESTAMP() ";
				$q.= "WHERE ID = '$userID'";
				db_query($q, $dbh);
465

466
				# set our SID cookie
Dan McGee's avatar
Dan McGee committed
467
468
				if (isset($_POST['remember_me']) &&
					$_POST['remember_me'] == "on") {
469
					# Set cookies for 30 days.
470
					$cookie_time = time() + $PERSISTENT_COOKIE_TIMEOUT;
471
472
473
474
475
476

					# Set session for 30 days.
					$q = "UPDATE Sessions SET LastUpdateTS = $cookie_time ";
					$q.= "WHERE SessionID = '$new_sid'";
					db_query($q, $dbh);
				}
477
478
				else
					$cookie_time = 0;
479

480
				setcookie("AURSID", $new_sid, $cookie_time, "/", null, !empty($_SERVER['HTTPS']), true);
481
				header("Location: " . $_SERVER['PHP_SELF'].'?'.$_SERVER['QUERY_STRING']);
482
483
484
485
486
487
488
489
				$login_error = "";

			}
			else {
				$login_error = "Error trying to generate session id.";
			}
		}
		else {
490
			$login_error = __("Bad username or password.");
491
492
493
494
495
496
497
498
499
500
501
502
503
504
		}
	}
	return array('SID' => $new_sid, 'error' => $login_error);
}

/*
 * Only checks if the name itself is valid
 * Longer or equal to USERNAME_MIN_LEN
 * Shorter or equal to USERNAME_MAX_LEN
 * Starts and ends with a letter or number
 * Contains at most ONE dot, hyphen, or underscore
 * Returns the username if it is valid
 * Returns nothing if it isn't valid
 */
505
function valid_username($user) {
506
	if (!empty($user)) {
507

508
509
510
		#Is username at not too short or too long?
		if ( strlen($user) >= USERNAME_MIN_LEN &&
		  strlen($user) <= USERNAME_MAX_LEN ) {
511

512
			$user = strtolower($user);
513
			# Does username:
514
515
516
517
518
519
520
521
522
			# start and end with a letter or number
			# contain only letters and numbers,
			#  and at most has one dash, period, or underscore
			if ( preg_match("/^[a-z0-9]+[.\-_]?[a-z0-9]+$/", $user) ) {
				#All is good return the username
				return $user;
			}
		}
	}
523

524
525
526
527
528
529
530
	return;
}

/*
 * Checks if the username is valid and if it exists in the database
 * Returns the username ID or nothing
 */
canyonknight's avatar
canyonknight committed
531
function valid_user($user, $dbh=NULL) {
532
	/*	if ( $user = valid_username($user) ) { */
canyonknight's avatar
canyonknight committed
533
534
535
536
537

	if(!$dbh) {
		$dbh = db_connect();
	}

538
539
	if ( $user ) {
		$q = "SELECT ID FROM Users WHERE Username = '"
540
			. db_escape_string($user). "'";
541

542
		$result = db_query($q, $dbh);
543
		# Is the username in the database?
544
545
546
		if ($result) {
			$row = mysql_fetch_row($result);
			return $row[0];
547
548
549
550
551
		}
	}
	return;
}

canyonknight's avatar
canyonknight committed
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
# Check for any open proposals about a user. Used to prevent multiple proposals.
function open_user_proposals($user, $dbh=NULL) {
	if(!$dbh) {
		$dbh = db_connect();
	}
	$q = "SELECT * FROM TU_VoteInfo WHERE User = '" . db_escape_string($user) . "'";
	$q.= " AND End > UNIX_TIMESTAMP()";
	$result = db_query($q, $dbh);
	if (mysql_num_rows($result)) {
		return true;
	}
	else {
		return false;
	}
}

# Creates a new trusted user proposal from entered agenda.
# Optionally takes proposal about specific user. Length of vote set by submitter.
function add_tu_proposal($agenda, $user, $votelength, $submitteruid, $dbh=NULL) {
	if(!$dbh) {
		$dbh = db_connect();
	}
	$q = "INSERT INTO TU_VoteInfo (Agenda, User, Submitted, End, SubmitterID) VALUES ";
	$q.= "('" . db_escape_string($agenda) . "', ";
	$q.= "'" . db_escape_string($user) . "', ";
	$q.= "UNIX_TIMESTAMP(), UNIX_TIMESTAMP() + " . db_escape_string($votelength);
	$q.= ", " . $submitteruid . ")";
	db_query($q, $dbh);

}

583
function good_passwd($passwd) {
584
585
586
587
588
589
590
591
592
	if ( strlen($passwd) >= PASSWD_MIN_LEN ) {
		return true;
	}
	return false;
}

/* Verifies that the password is correct for the userID specified.
 * Returns true or false
 */
593
function valid_passwd($userID, $passwd, $dbh) {
594
	if ( strlen($passwd) > 0 ) {
Denis's avatar
Denis committed
595
596
597
598
599
		# get salt for this user
		$salt = get_salt($userID);
		if ($salt) {
			# use salt
			$passwd_q = "SELECT ID FROM Users" .
600
				" WHERE ID = " . $userID  . " AND Passwd = '" .
Denis's avatar
Denis committed
601
				salted_hash($passwd, $salt) . "'";
602
603
604
605
606
607
			$result = db_query($passwd_q, $dbh);
			if ($result) {
				$passwd_result = mysql_fetch_row($result);
				if ($passwd_result[0]) {
					return true;
				}
Denis's avatar
Denis committed
608
609
610
611
			}
		} else {
			# check without salt
			$nosalt_q = "SELECT ID FROM Users".
612
				" WHERE ID = " . $userID .
Denis's avatar
Denis committed
613
				" AND Passwd = '" . md5($passwd) . "'";
614
615
616
617
618
619
620
621
622
623
624
			$result = db_query($nosalt_q, $dbh);
			if ($result) {
				$nosalt_row = mysql_fetch_row($result);
				if ($nosalt_row[0]) {
					# password correct, but salt it first
					if (!save_salt($userID, $passwd)) {
						trigger_error("Unable to salt user's password;" .
							" ID " . $userID, E_USER_WARNING);
						return false;
					}
					return true;
Denis's avatar
Denis committed
625
626
				}
			}
627
628
629
630
631
		}
	}
	return false;
}

632
633
634
/*
 * Checks if the PGP key fingerprint is valid (must be 40 hexadecimal digits).
 */
635
function valid_pgp_fingerprint($fingerprint) {
636
637
638
639
	$fingerprint = str_replace(" ", "", $fingerprint);
	return (strlen($fingerprint) == 40 && ctype_xdigit($fingerprint));
}

640
641
642
/*
 * Is the user account suspended?
 */
643
function user_suspended($id, $dbh) {
elij's avatar
elij committed
644
645
646
	if (!$id) {
		return false;
	}
647
	$q = "SELECT Suspended FROM Users WHERE ID = " . $id;
648
649
650
651
652
653
	$result = db_query($q, $dbh);
	if ($result) {
		$row = mysql_fetch_row($result);
		if ($result[0] == 1 ) {
			return true;
		}
654
655
656
657
658
659
660
	}
	return false;
}

/*
 * This should be expanded to return something
 */
661
function user_delete($id, $dbh) {
662
	$q = "DELETE FROM Users WHERE ID = " . $id;
663
	db_query($q, $dbh);
664
665
666
667
668
669
670
	return;
}

/*
 * A different way of determining a user's privileges
 * rather than account_from_sid()
 */
671
function user_is_privileged($id, $dbh) {
672
	$q = "SELECT AccountTypeID FROM Users WHERE ID = " . $id;
673
674
675
676
677
678
	$result = db_query($q, $dbh);
	if ($result) {
		$row = mysql_fetch_row($result);
		if( $result[0] > 1) {
			return $result[0];
		}
679
	}
680
681
682
683
	return 0;

}

canyonknight's avatar
canyonknight committed
684
685
686
687
688
689
690
691
692
693
694
# Remove session on logout
function delete_session_id($sid, $dbh=NULL) {
	if(!$dbh) {
		$dbh = db_connect();
	}

	$q = "DELETE FROM Sessions WHERE SessionID = '";
	$q.= db_escape_string($sid) . "'";
	db_query($q, $dbh);
}

695
# Clear out old expired sessions.
canyonknight's avatar
canyonknight committed
696
function clear_expired_sessions($dbh=NULL) {
697
698
	global $LOGIN_TIMEOUT;

canyonknight's avatar
canyonknight committed
699
700
701
702
	if(!$dbh) {
		$dbh = db_connect();
	}

703
	$q = "DELETE FROM Sessions WHERE LastUpdateTS < (UNIX_TIMESTAMP() - $LOGIN_TIMEOUT)";
704
705
706
707
	db_query($q, $dbh);

	return;
}
708