X-Git-Url: https://git.mxchange.org/?p=mailer.git;a=blobdiff_plain;f=inc%2Fgen_sql_patches.php;h=24bd20b76f0851532d4f571faa5e6a2883d9f707;hp=a358c8d74a31730107d78eb09ce915688c3d742c;hb=b68d7d9622a02f3ea9d44ae3c5dee672b097f956;hpb=263a089d8a499e0e26d0af9e7aa7639f88b8ca60 diff --git a/inc/gen_sql_patches.php b/inc/gen_sql_patches.php index a358c8d74a..24bd20b76f 100644 --- a/inc/gen_sql_patches.php +++ b/inc/gen_sql_patches.php @@ -14,10 +14,9 @@ * $Date:: $ * * $Tag:: 0.2.1-FINAL $ * * $Author:: $ * - * Needs to be in all Files and every File needs "svn propset * - * svn:keywords Date Revision" (autoprobset!) at least!!!!!! * * -------------------------------------------------------------------- * * Copyright (c) 2003 - 2009 by Roland Haeder * + * Copyright (c) 2009 - 2011 by Mailer Developer Team * * For more information visit: http://www.mxchange.org * * * * This program is free software; you can redistribute it and/or modify * @@ -39,13 +38,10 @@ // Some security stuff... if (!defined('__SECURITY')) { die(); -} - -// Check for version of sql_patches -if (getExtensionVersion('sql_patches') < '0.3.6') return false; +} // END - if // Check if there is no scrambling string -if (getConfig('pass_scramble') == '') { +if (getPassScramble() == '') { // Generate 40 chars long scramble string $scrambleString = genScrambleString(40); @@ -57,7 +53,7 @@ if (getConfig('pass_scramble') == '') { } // END - if // Check if there is no master salt string -if (getConfig('master_salt') == '') { +if (getMasterSalt() == '') { // Generate the master salt which is the first chars minus 40 chars of this random hash // We do an extra scrambling here... $masterSalt = scrambleString(sha1(generatePassword(mt_rand(128, 256)))); @@ -69,46 +65,26 @@ if (getConfig('master_salt') == '') { unset($masterSalt); } // END - if -if (getConfig('file_hash') == '') { +if (getFileHash() == '') { // Create filename from hashed random string $fileHash = sha1(generatePassword(mt_rand(128, 256))); - $FQFN = sprintf("%sinc/.secret/.%s", - getConfig('PATH'), + $FQFN = sprintf("%s%s.%s.cache", + getPath(), + getCachePath(), $fileHash ); - // Count of chars to be taken from back of the string - $nums = mt_rand(40, 45); - // Generate secret key from a randomized string - $secretKey = substr(sha1(generatePassword(mt_rand(128, 256))), -$nums); + $secretKey = sha1(generateHash(mt_rand(128, 256))); // File hash was never created writeToFile($FQFN, $secretKey); // Is the file there? if (isFileReadable($FQFN)) { - //* DEBUG: */ removeFile($FQFN); - //* DEBUG: */ $test = hexdec(getSession('u_hash')) / hexdec($secretKey); - //* DEBUG: */ $test = generateHash(str_replace('.', '', $test)); - //* DEBUG: */ die("Secret-Key: ".$secretKey."
Cookie: ".getSession('u_hash')."
Test: ".$test); - - // Write $fileHash to database - updateConfiguration('file_hash', $fileHash); - - // Generate FQFN for .htaccess file - $FQFN = sprintf("%sinc/.secret/.htaccess", - getConfig('PATH') - ); - - // Is the .htaccess file there? - if (!isFileReadable($FQFN)) { - // Also create .htaccess file - writeToFile($FQFN, "Deny from all\n"); - } // END - if - // Also update configuration setConfigEntry('secret_key', $secretKey); + updateConfiguration('file_hash', $fileHash); // Remove variables unset($secretKey); @@ -116,5 +92,13 @@ if (getConfig('file_hash') == '') { } // END - if } // END - if -// -?> \ No newline at end of file +// @TODO Rewrite this to a filter +if ((isExtensionInstalledAndNewer('cache', '0.1.2')) && (isCacheInstanceValid())) { + // Destroy some cache files + if ($GLOBALS['cache_instance']->loadCacheFile('config')) $GLOBALS['cache_instance']->removeCacheFile(); + if ($GLOBALS['cache_instance']->loadCacheFile('extension')) $GLOBALS['cache_instance']->removeCacheFile(); + if ($GLOBALS['cache_instance']->loadCacheFile('modules')) $GLOBALS['cache_instance']->removeCacheFile(); +} // END - if + +// [EOF] +?>