- // @TODO Invalid salt should be refused
- $length = '0';
- $GLOBALS['surfbar_cache']['salt'] = 'INVALID';
-
- // Is extension ext-other there?
- if (isExtensionActive('other')) {
- // Get code length from config
- $length = getCodeLength();
- } // END - if
-
- // Fix length to 10
- if ($length == '0') {
- $length = 10;
- } // END - if
-
- // Generate a code until the length matches
- $valCode = '';
- while (strlen($valCode) != $length) {
- // Is the salt set?
- if (empty($salt)) {
- // Generate random hashed string
- $GLOBALS['surfbar_cache']['salt'] = sha1(generatePassword(mt_rand(200, 255)));
- //* DEBUG: */ logDebugMessage(__FUNCTION__, __LINE__, 'newSalt='.SURFBAR_GET_SALT().'', false);
- } else {
- // Use this as salt!
- $GLOBALS['surfbar_cache']['salt'] = $salt;
- //* DEBUG: */ logDebugMessage(__FUNCTION__, __LINE__, 'oldSalt='.SURFBAR_GET_SALT().'', false);
- }
-
- // ... and now the validation code
- $valCode = generateRandomCode($length, sha1(SURFBAR_GET_SALT() . getEncryptSeperator() . $urlId), getMemberId());
- //* DEBUG: */ logDebugMessage(__FUNCTION__, __LINE__, 'valCode='.valCode.'', false);
- } // END - while
+ /* DEBUG: */ logDebugMessage(__FUNCTION__, __LINE__, 'urlId=' . $urlId . ',salt=' . $salt . ' - ENTERED!');
+ // Init hash with invalid value
+ if (empty($salt)) {
+ // Generate random hashed string
+ $GLOBALS['surfbar_cache']['salt'] = sha1(generatePassword(mt_rand(200, 255)));
+ //* DEBUG: */ logDebugMessage(__FUNCTION__, __LINE__, 'newSalt='.SURFBAR_GET_SALT().'', false);
+ } else {
+ // Use this as salt!
+ $GLOBALS['surfbar_cache']['salt'] = $salt;
+ //* DEBUG: */ logDebugMessage(__FUNCTION__, __LINE__, 'oldSalt='.SURFBAR_GET_SALT().'', false);
+ }