-if (empty($_CONFIG['file_hash']))
-{
- // Create filename from hashed random string
- $file_hash = generateHash(GEN_PASS(rand(128, 256)));
- $file = PATH."inc/.secret/.".$file_hash;
-
- // File hash was never created
- $fp = @fopen($file, 'w') or mxchange_die("Cannot write secret key file!");
- if ($fp != false)
- {
- // Could write to secret file! So let's generate the secret key...
- // 1. Count of chars to be taken from back of the string
- $nums = rand(40, 45);
- // 2. Generate secret key from a randomized string
- $secretKey = substr(generateHash(GEN_PASS(rand(128, 256))), -$nums);
- // 3. Write the key to the file
- fwrite($fp, $secretKey);
- // 4. Close file
- fclose($fp);
-
- // Change access rights for more security
- @chmod($file, 0644);
-
- //* DEBUG: */ unlink($file);
- //* DEBUG: */ $test = hexdec($_COOKIE['u_hash']) / hexdec($secretKey);
- //* DEBUG: */ $test = generateHash(str_replace('.', '', $test));
- //* DEBUG: */ die("Secret-Key: ".$secretKey."<br>Cookie: ".$_COOKIE['u_hash']."<br>Test: ".$test);
-
- // Write $file_hash to database
- $result = SQL_QUERY_ESC("UPDATE "._MYSQL_PREFIX."_config SET file_hash='%s' WHERE config='0' LIMIT 1",
- array($file_hash), __FILE__, __LINE__);
-
- // Also create .htaccess file
- $fp = @fopen(PATH."inc/.secret/.htaccess", 'w') or mxchange_die("Cannot write to .htaccess file!");
- if ($fp != false)
- {
- // Add deny line to file
- fwrite($fp, "Deny from all");
-
- // Close the file
- fclose($fp);
- }
-
- // Also update configuration
- $_CONFIG['secret_key'] = $secretKey; unset($secretKey);
- $_CONFIG['file_hash'] = $file_hash; unset($file_hash);
- }
-}
+ // Remove dummy string
+ unset($scrambleString);
+} // END - if
+
+// Check if there is no master salt string
+if (getConfig('master_salt') == '') {
+ // Generate the master salt which is the first chars minus 40 chars of this random hash
+ // We do an extra scrambling here...
+ $masterSalt = scrambleString(sha1(generatePassword(mt_rand(128, 256))));
+
+ // ... and store it there for future usage
+ updateConfiguration('master_salt', $masterSalt);
+
+ // Remove dummy string
+ unset($masterSalt);
+} // END - if
+
+if (getConfig('file_hash') == '') {
+ // Create filename from hashed random string
+ $fileHash = sha1(generatePassword(mt_rand(128, 256)));
+ $FQFN = sprintf("%sinc/.secret/.%s",
+ getConfig('PATH'),
+ $fileHash
+ );
+
+ // Count of chars to be taken from back of the string
+ $nums = mt_rand(40, 45);
+
+ // Generate secret key from a randomized string
+ $secretKey = substr(sha1(generatePassword(mt_rand(128, 256))), -$nums);
+
+ // File hash was never created
+ writeToFile($FQFN, $secretKey);
+
+ // Is the file there?
+ if (isFileReadable($FQFN)) {
+ //* DEBUG: */ removeFile($FQFN);
+ //* DEBUG: */ $test = hexdec(getSession('u_hash')) / hexdec($secretKey);
+ //* DEBUG: */ $test = generateHash(str_replace('.', '', $test));
+ //* DEBUG: */ die("Secret-Key: ".$secretKey."<br />Cookie: ".getSession('u_hash')."<br />Test: ".$test);
+
+ // Write $fileHash to database
+ updateConfiguration('file_hash', $fileHash);
+
+ // Generate FQFN for .htaccess file
+ $FQFN = sprintf("%sinc/.secret/.htaccess",
+ getConfig('PATH')
+ );
+
+ // Is the .htaccess file there?
+ if (!isFileReadable($FQFN)) {
+ // Also create .htaccess file
+ writeToFile($FQFN, "Deny from all\n");
+ } // END - if
+
+ // Also update configuration
+ setConfigEntry('secret_key', $secretKey);
+
+ // Remove variables
+ unset($secretKey);
+ unset($fileHash);
+ } // END - if
+} // END - if