$phase=999; //user unknown, trouble trouble
}
break;
- case 2 : //extracting user crypted password
- rou_alert(0,"$OPEP, JMPDBG dbpass=$dbpass");
- break;
- case 3 : //compare crypted password adn given password
+ case 2 : //'computing' crypted password
+ $idpass=$dbpass;
+ $ptr=strrchr($idpass,'$');
+ if ($ptr!=NULL)
+ $idpass=substr($idpass,0,strlen($idpass)-strlen($ptr)+1);
+ $coded=crypt($password,$idpass);
+ if (strcmp($dbpass,$coded)!=0) {
+ rou_alert(0,"$OPEP, user=<$logname> wrong password=<$password>");
+ $phase=999; //bad password
+ }
break;
- case 4 : //everything fine
+ case 3 : //everything fine
$random=(string)rand(0,9999999);
$uniqid=uniqid("",true);
$delay=time()+(24*3600);
$phase=0;
$proceed=true;
while ($proceed==true) {
- rou_alert(0,"$OPEP, JMPDBG phase=$phase");
+ //rou_alert(0,"$OPEP, JMPDBG phase=$phase");
switch ($phase) {
case 0 : //do we have a cookie
if ($cookie==NULL)