2018-01-17 16:28:19 +00:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @file security.php
|
|
|
|
* @date 2018-01-18
|
|
|
|
* @author Go Namhyeon <gnh1201@gmail.com>
|
|
|
|
* @brief Security module for VSPF
|
|
|
|
*/
|
|
|
|
|
|
|
|
if(!function_exists("check_token_abuse")) {
|
2018-02-12 10:41:44 +00:00
|
|
|
function check_token_abuse($_p_token, $_n_token) {
|
2018-01-17 16:28:19 +00:00
|
|
|
$abuse = false;
|
|
|
|
|
2018-02-12 10:41:44 +00:00
|
|
|
$_c_token = $_p_token . $_n_token;
|
|
|
|
if(empty($_c_token) || $_p_token != $_n_token || strlen($_c_token) != (strlen($_p_token) + strlen($_n_token))) {
|
2018-01-17 16:28:19 +00:00
|
|
|
$abuse = true;
|
|
|
|
}
|
2018-02-12 10:41:44 +00:00
|
|
|
|
2018-01-17 16:28:19 +00:00
|
|
|
return $abuse;
|
|
|
|
}
|
|
|
|
}
|
2018-02-09 09:03:06 +00:00
|
|
|
|
|
|
|
if(!function_exists("make_random_id")) {
|
|
|
|
function make_random_id($length = 10) {
|
|
|
|
$characters = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ';
|
|
|
|
$charactersLength = strlen($characters);
|
|
|
|
$randomString = '';
|
|
|
|
for ($i = 0; $i < $length; $i++) {
|
|
|
|
$randomString .= $characters[rand(0, $charactersLength - 1)];
|
|
|
|
}
|
|
|
|
return $randomString;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-12 09:03:11 +00:00
|
|
|
if(!function_exists("set_session")) {
|
|
|
|
function set_session($session_name, $value) {
|
|
|
|
if(PHP_VERSION < '5.3.0') {
|
|
|
|
session_register($session_name);
|
|
|
|
}
|
|
|
|
$$session_name = $_SESSION["$session_name"] = $value;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!function_exists("get_session")) {
|
|
|
|
function get_session($session_name) {
|
|
|
|
$session_value = "";
|
|
|
|
if(!array_key_empty($session_name, $_SESSION)) {
|
|
|
|
$session_value = $_SESSION[$session_name];
|
|
|
|
}
|
|
|
|
return $session_value;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-09 09:03:06 +00:00
|
|
|
if(!function_exists("set_session_token")) {
|
|
|
|
function set_session_token() {
|
|
|
|
$random_id = make_random_id(10);
|
2018-02-12 09:03:11 +00:00
|
|
|
set_session("random_id", $random_id);
|
2018-02-09 09:03:06 +00:00
|
|
|
|
|
|
|
return $random_id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!function_exists("get_session_token")) {
|
|
|
|
function get_session_token() {
|
2018-02-12 09:03:11 +00:00
|
|
|
return get_session("random_id");
|
2018-02-09 09:03:06 +00:00
|
|
|
}
|
|
|
|
}
|
2018-02-12 07:57:17 +00:00
|
|
|
|
|
|
|
if(!function_exists("check_token_abuse_by_requests")) {
|
2018-02-12 08:51:23 +00:00
|
|
|
function check_token_abuse_by_requests($name) {
|
|
|
|
global $requests;
|
2018-02-12 09:03:11 +00:00
|
|
|
return check_token_abuse($requests['_POST'][$name], get_session($name));
|
2018-02-12 07:57:17 +00:00
|
|
|
}
|
|
|
|
}
|
2018-02-12 08:10:51 +00:00
|
|
|
|
2018-02-12 08:51:23 +00:00
|
|
|
if(!function_exists("check_login_session")) {
|
|
|
|
function check_login_session($ss_key, $config) {
|
|
|
|
$flag = false;
|
|
|
|
|
|
|
|
$session_name = sha1($ss_key);
|
|
|
|
$session_file = $config['session_dir'] . '/' . $session_name;
|
|
|
|
$session_stored_key = "";
|
|
|
|
|
|
|
|
if(file_exists($session_file)) {
|
|
|
|
$fh = fopen($session_file, 'r');
|
|
|
|
if($session_stored_key = fread($fh, filesize($session_file))) {
|
|
|
|
$flag = ($session_stored_key == $ss_key) ? true : false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $flag;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!function_exists("store_login_session")) {
|
|
|
|
function store_login_session($ss_key, $config) {
|
|
|
|
$flag = false;
|
|
|
|
|
|
|
|
$session_name = sha1($ss_key);
|
|
|
|
$session_file = $config['session_dir'] . '/' . $session_name;
|
|
|
|
|
|
|
|
if(is_writable($session_file)) {
|
|
|
|
$fh = fopen($session_file, 'w');
|
|
|
|
if($fh) {
|
|
|
|
if(fwrite($fh, $session_name)) {
|
|
|
|
$flag = check_login_session($ss_key, $config);
|
|
|
|
}
|
|
|
|
@chmod($session_file, 600);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $flag;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!function_exists("process_safe_login")) {
|
2018-02-12 10:41:44 +00:00
|
|
|
function process_safe_login($user_name, $user_password) {
|
2018-02-12 08:51:23 +00:00
|
|
|
global $config;
|
|
|
|
|
|
|
|
$flag = false;
|
2018-02-12 09:03:11 +00:00
|
|
|
$ss_key = get_session("ss_key");
|
2018-02-12 08:51:23 +00:00
|
|
|
|
2018-02-12 09:06:09 +00:00
|
|
|
if(!empty($ss_key) && check_login_session($ss_key, $config)) {
|
|
|
|
$flag = true;
|
|
|
|
} else {
|
2018-02-12 08:51:23 +00:00
|
|
|
$ss_key = make_random_id(10);
|
2018-02-12 09:06:09 +00:00
|
|
|
|
2018-02-12 10:41:44 +00:00
|
|
|
//
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-02-12 09:03:11 +00:00
|
|
|
set_session("ss_user_name", $user_name);
|
|
|
|
set_session("ss_key", $ss_key);
|
|
|
|
|
|
|
|
$flag = store_login_session($ss_key, $config);
|
2018-02-12 08:51:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return $flag;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!function_exists("check_empty_fields")) {
|
|
|
|
function check_empty_fields($no_empty_fields, $method_get=true) {
|
|
|
|
global $requests;
|
|
|
|
|
|
|
|
$errors = array();
|
|
|
|
$check_data = $method_get ? $requests['_GET'] : $requests['_POST'];
|
|
|
|
|
|
|
|
foreach($no_empty_fields as $fieldname) {
|
2018-02-12 09:03:11 +00:00
|
|
|
if(array_key_empty($fieldname, $check_data)) {
|
2018-02-12 08:51:23 +00:00
|
|
|
$errors[] = array(
|
|
|
|
"fieldname" => $fieldname,
|
|
|
|
"message" => "{$fieldname} 항목은 공백일 수 없습니다."
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return $errors;
|
2018-02-12 08:10:51 +00:00
|
|
|
}
|
|
|
|
}
|
2018-02-12 10:41:44 +00:00
|
|
|
|
|
|
|
if(!function_exists("get_salt")) {
|
|
|
|
function get_salt() {
|
|
|
|
$salt = "H6hclwzFplRQw39C";
|
|
|
|
if(!array_key_empty("salt", $config)) {
|
|
|
|
$salt = $config['salt'];
|
|
|
|
}
|
|
|
|
return $salt;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!function_exists("get_password")) {
|
|
|
|
function get_password($text, $algo="sha1") {
|
|
|
|
global $config;
|
|
|
|
|
|
|
|
$salt = get_salt();
|
|
|
|
|
|
|
|
$plain_text = $text;
|
|
|
|
$hashed_text = "";
|
|
|
|
|
|
|
|
if(!empty($salt)) {
|
|
|
|
$plain_text .= $salt;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch($algo) {
|
|
|
|
case "sha1":
|
|
|
|
$hashed_text = sha1($plain_text);
|
|
|
|
break;
|
|
|
|
case "md5":
|
|
|
|
$hashed_text = md5($plain_text);
|
|
|
|
break;
|
|
|
|
case "crypt":
|
|
|
|
$hashed_text = crypt($plain_text);
|
|
|
|
default:
|
|
|
|
$is_not_supported = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if($is_not_supported) {
|
|
|
|
$hashed_text = $plain_text;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $hashed_text;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(!function_exists("check_match_password")) {
|
|
|
|
function check_match_password($p, $n, $algo="sha1") {
|
|
|
|
$flag = false;
|
|
|
|
$salt = get_salt();
|
|
|
|
|
|
|
|
$n_plain_text = $n . $salt;
|
|
|
|
$n_hashed_text = "";
|
|
|
|
|
|
|
|
switch($algo) {
|
|
|
|
case "sha1":
|
|
|
|
$n_hashed_text = sha1($n_plain_text);
|
|
|
|
$flag = ($n_hashed_text == $p);
|
|
|
|
break;
|
|
|
|
case "md5":
|
|
|
|
$n_hashed_text = md5($n_plain_text);
|
|
|
|
$flag = ($n_hashed_text == $p);
|
|
|
|
break;
|
|
|
|
case "crypt":
|
|
|
|
$flag = (crypt($n_plain_text, $p) == $p);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
$flag = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return $flag;
|
|
|
|
}
|
|
|
|
}
|