auth.inc.php 1.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. <?php
  2. if (strpos($_SERVER['PHP_SELF'], "inc.php") !== false)
  3. exit("This file is meant to be included.");
  4. function hashPassword($password) {
  5. return password_hash($password, ALGO_PASSWORD, OPTIONS_PASSWORD);
  6. }
  7. function checkPassword($username, $password) {
  8. $username2[0] = $username;
  9. $db = new PDO('sqlite:' . DB_PATH);
  10. $op = $db->prepare('SELECT username, password FROM users WHERE username = ?');
  11. $op->execute($username2);
  12. $dbPassword = $op->fetch()['password'];
  13. return password_verify($password, $dbPassword);
  14. }
  15. function outdatedPasswordHash($username) {
  16. $username2[0] = $username;
  17. $db = new PDO('sqlite:' . DB_PATH);
  18. $op = $db->prepare('SELECT username, password FROM users WHERE username = ?');
  19. $op->execute($username2);
  20. $dbPassword = $op->fetch()['password'];
  21. return password_needs_rehash($dbPassword, ALGO_PASSWORD, OPTIONS_PASSWORD);
  22. }
  23. function changePassword($username, $password) {
  24. $password = hashPassword($password);
  25. $db = new PDO('sqlite:' . DB_PATH);
  26. $stmt = $db->prepare("UPDATE users SET password = :password WHERE username = :username");
  27. $stmt->bindParam(':username', $username);
  28. $stmt->bindParam(':password', $password);
  29. $stmt->execute();
  30. }
  31. function antiCSRF() {
  32. if (!isset($_SERVER['HTTP_SEC_FETCH_SITE']) AND !isset($_SERVER['HTTP_ORIGIN']))
  33. exit("ERROR: Browser sent neither Sec-Fetch-Site nor Origin HTTP headers, so anti-CSRS verification can't be done.");
  34. if (isset($_SERVER['HTTP_ORIGIN']) AND $_SERVER['HTTP_ORIGIN'] !== "https://niver.4.niv.re")
  35. exit("ERROR: Anti-CSRF verification failed");
  36. if (isset($_SERVER['HTTP_SEC_FETCH_SITE']) AND $_SERVER['HTTP_SEC_FETCH_SITE'] !== "same-origin")
  37. exit("ERROR: Anti-CSRF verification failed");
  38. }