run('data_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook if ($return_now) { return $login_status; } //normal return $this->normal($name, $pass, $expire, $hashed, $loginadm); } //get username by id public function usernamebyid($user_id) { $return_now = $auth_status = false; is_array($plugin_run_result = Plugins::getInstance()->run('auth_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook if ($return_now) { return $auth_status; } //normal system $u = $this->get_data('name', $user_id); return $u['name']; } //now our table, normal user system public function normal($name, $pass, $expire, $hashed = false, $loginadm = false) { global $SQL, $dbprefix, $config, $userinfo; $userinfo = [ 'id' => $this->user_id, 'group_id' => $this->group_id, ]; $query = [ 'SELECT' => '*', 'FROM' => "{$dbprefix}users", 'LIMIT' => '1' ]; if ($hashed) { $query['WHERE'] = 'id=' . intval($name) . " and password='" . $SQL->escape($pass) . "'"; } else { $query['WHERE'] = "clean_name='" . $SQL->real_escape($this->cleanusername($name)) . "'"; } is_array($plugin_run_result = Plugins::getInstance()->run('qr_select_usrdata_n_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook $result = $SQL->build($query); if ($SQL->num_rows($result)) { while ($row=$SQL->fetch_array($result)) { if (empty($row['password'])) { //more security return false; } $phppass = $hashed ? $pass : $pass . $row['password_salt']; //CHECK IF IT'S MD5 PASSWORD if (strlen($row['password']) == '32' && empty($row['password_salt']) && defined('CONVERTED_SCRIPT')) { $passmd5 = md5($pass); ////update old md5 hash to phpass hash if ($row['password'] == $passmd5) { ////new salt $new_salt = substr(base64_encode(pack('H*', sha1(mt_rand()))), 0, 7); ////new password hash $new_password = $this->kleeja_hash_password(trim($pass) . $new_salt); is_array($plugin_run_result = Plugins::getInstance()->run('qr_update_usrdata_md5_n_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook ////update now !! $update_query = [ 'UPDATE' => "{$dbprefix}users", 'SET' => "password='" . $new_password . "' ,password_salt='" . $new_salt . "'", 'WHERE' => 'id=' . intval($row['id']) ]; $SQL->build($update_query); } else //if the password is wrong { return false; } } if (($phppass != $row['password'] && $hashed) || ($this->kleeja_hash_password($phppass, $row['password']) != true && $hashed == false)) { return false; } //all user fileds info $userinfo = $row; $this->user_id = $row['id']; $this->group_id = $row['group_id']; $this->user_name = $row['name']; $this->user_mail = $row['mail']; $this->last_visit = $row['last_visit']; $user_y = base64_encode(serialize(['id'=>$row['id'], 'name'=>$row['name'], 'mail'=>$row['mail'], 'last_visit'=>$row['last_visit']])); if (! $hashed && ! $loginadm) { $hash_key_expire = sha1(md5($config['h_key'] . $row['password']) . $expire); $this->kleeja_set_cookie('ulogu', $this->en_de_crypt($row['id'] . '|' . $row['password'] . '|' . $expire . '|' . $hash_key_expire . '|' . $row['group_id'] . '|' . $user_y), $expire); } //if last visit > 1 minute then update it if (empty($row['last_visit']) || time() - $row['last_visit'] > 60) { $this->last_visit = time(); $update_last_visit = [ 'UPDATE' => "{$dbprefix}users", 'SET' => 'last_visit=' . $this->last_visit, 'WHERE' => 'id=' . intval($row['id']) ]; $SQL->build($update_last_visit); } is_array($plugin_run_result = Plugins::getInstance()->run('qr_while_usrdata_n_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook } $SQL->freeresult($result); unset($pass); return true; } else { return false; } } /* get user data new function:1rc5+ */ public function get_data($type='*', $user_id = false) { global $dbprefix, $SQL; if (! $user_id) { $user_id = $this->id(); } //todo : //if type != '*' and contains no , and type in 'name, id, email' return $this->id .. etc //te get files and update them !! $query_name = [ 'SELECT' => $type, 'FROM' => "{$dbprefix}users", 'WHERE' => 'id=' . intval($user_id) ]; is_array($plugin_run_result = Plugins::getInstance()->run('qr_select_userdata_in_usrclass', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook $data_user = $SQL->fetch_array($SQL->build($query_name)); return $data_user; } // user ids public function id() { is_array($plugin_run_result = Plugins::getInstance()->run('id_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook return $this->user_id; } // group ids public function group_id() { is_array($plugin_run_result = Plugins::getInstance()->run('group_id_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook return $this->group_id; } // user name public function name() { is_array($plugin_run_result = Plugins::getInstance()->run('name_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook return $this->user_name; } // user mail public function mail() { is_array($plugin_run_result = Plugins::getInstance()->run('mail_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook return $this->user_mail; } // last visit public function last_visit() { is_array($plugin_run_result = Plugins::getInstance()->run('last_visit_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook return $this->last_visit; } // logout func public function logout() { is_array($plugin_run_result = Plugins::getInstance()->run('logout_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook //acp if (user_can('enter_acp') && ! empty($_SESSION['ADMINLOGIN'])) { $this->logout_cp(); } $this->user_id = -1; $this->group_id = 2; $this->user_name = null; $this->user_mail = null; $this->last_visit = null; //is ther any cookies $this->kleeja_set_cookie('ulogu', '', time() - 31536000);//31536000 = year return true; } // logut just from acp public function logout_cp() { is_array($plugin_run_result = Plugins::getInstance()->run('logout_cp_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook if (! empty($_SESSION['ADMINLOGIN'])) { unset($_SESSION['ADMINLOGIN'], $_SESSION['USER_SESS'] /*, $_SESSION['LAST_VISIT']*/); } return true; } //clean usernames public function cleanusername($uname) { is_array($plugin_run_result = Plugins::getInstance()->run('cleanusername_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook static $arabic_t = []; static $latin_t = [ ['á','à','â','ã','å','Á','À','Â','Ã','Å','é','è','ê','ë','É','È','Ê','í','ì','ï','î','Í','Ì','Î','Ï','ò','ó','ô','õ','º','ø','Ó','Ò','Ô','Õ','Ø','ú','ù','û','Ú','Ù','Û','ç','Ç','Ñ','ñ','ÿ','Ë'], ['a','a','a','a','a','a','a','a','a','a','e','e','e','e','e','e','e','i','i','i','i','i','i','i','i','o','o','o','o','o','o','o','o','o','o','o','u','u','u','u','u','u','c','c','n','n','y','e'] ]; if (empty($arabic_t)) { //Arabic chars must be stay in utf8 format, so we encoded them $arabic_t = unserialize(base64_decode('YToyOntpOjA7YToxMjp7aTowO3M6Mjoi2KMiO2k6MTtzOjI6ItilIjtpOjI7czoyOiLYpCI7aTozO3M6Mjoi2YAiO2k6NDtzOjI6Itm' . 'LIjtpOjU7czoyOiLZjCI7aTo2O3M6Mjoi2Y8iO2k6NztzOjI6ItmOIjtpOjg7czoyOiLZkCI7aTo5O3M6Mjoi2ZIiO2k6MTA7czoyOiLYoiI7aToxMTtzOjI6ItimIjt9aToxO' . '2E6MTI6e2k6MDtzOjI6ItinIjtpOjE7czoyOiLYpyI7aToyO3M6Mjoi2YgiO2k6MztzOjA6IiI7aTo0O3M6MDoiIjtpOjU7czowOiIiO2k6NjtzOjA6IiI7aTo3O3M6MDoiIjt' . 'pOjg7czowOiIiO2k6OTtzOjA6IiI7aToxMDtzOjI6ItinIjtpOjExO3M6Mjoi2YkiO319')); } $uname = str_replace($latin_t[0], $latin_t[1], $uname); //replace confusable Latin chars $uname = str_replace($arabic_t[0], $arabic_t[1], $uname); //replace confusable Arabic chars $uname = preg_replace('#(?:[\x00-\x1F\x7F]+|(?:\xC2[\x80-\x9F])+)#', '', $uname); //un-wanted utf8 control chars $uname = preg_replace('# {2,}#', ' ', $uname); //2+ spaces with one space return strtolower($uname); } //depand on phpass class public function kleeja_hash_password($password, $check_pass = false) { include_once 'phpass.php'; is_array($plugin_run_result = Plugins::getInstance()->run('kleeja_hash_password_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook $hasher = new PasswordHash(8, true); $return = $hasher->HashPassword($password); //return check or hash return $check_pass != false ? $hasher->CheckPassword($password, $check_pass) : $return; } //kleeja cookie public function kleeja_set_cookie($name, $value, $expire) { global $config; is_array($plugin_run_result = Plugins::getInstance()->run('kleeja_set_cookie_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook // //when user add cookie_* in config this will replace the current ones // global $config_cookie_name, $config_cookie_domain, $config_cookie_secure, $config_cookie_path; $config['cookie_name'] = isset($config_cookie_name) ? $config_cookie_name : $config['cookie_name']; $config['cookie_domain'] = isset($config_cookie_domain) ? $config_cookie_domain : $config['cookie_domain']; $config['cookie_secure'] = isset($config_cookie_secure) ? $config_cookie_secure : $config['cookie_secure']; $config['cookie_path'] = isset($config_cookie_path) ? $config_cookie_path : $config['cookie_path']; // //when user add define('FORCE_COOKIES', true) in config.php we will make our settings of cookies // if (defined('FORCE_COOKIES')) { $config['cookie_domain'] = ! empty($_SERVER['HTTP_HOST']) ? strtolower($_SERVER['HTTP_HOST']) : (! empty($_SERVER['SERVER_NAME']) ? $_SERVER['SERVER_NAME'] : @getenv('SERVER_NAME')); $config['cookie_domain'] = str_replace('www.', '.', substr($config['cookie_domain'], 0, strpos($config['cookie_domain'], ':'))); $config['cookie_path'] = '/'; $config['cookie_secure'] = isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == 'on'; } // Enable sending of a P3P header header('P3P: CP="CUR ADM"'); $name_data = rawurlencode($config['cookie_name'] . '_' . $name) . '=' . rawurlencode($value); $rexpire = gmdate('D, d-M-Y H:i:s \\G\\M\\T', $expire); $domain = (! $config['cookie_domain'] || $config['cookie_domain'] == 'localhost' || $config['cookie_domain'] == '127.0.0.1') ? '' : '; domain=' . $config['cookie_domain']; header('Set-Cookie: ' . $name_data . ($expire ? '; expires=' . $rexpire : '') . '; path=' . $config['cookie_path'] . $domain . (! $config['cookie_secure'] ? '' : '; secure') . '; HttpOnly', false); } //encrypt and decrypt any data with our function public function en_de_crypt($data, $type = 1) { global $config; static $txt = []; if (empty($txt)) { if (empty($config['h_key'])) { $config['h_key'] = sha1(microtime()); } $chars = str_split($config['h_key']); foreach (range('a', 'z') as $k=>$v) { if (! isset($chars[$k])) { break; } $txt[$v] = $chars[$k] . $k . '-'; } } switch ($type) { case 1: $data = str_replace('=', '_', base64_encode($data)); $data = strtr($data, $txt); break; case 2: $txtx = array_flip($txt); $txtx = array_reverse($txtx, true); $data = strtr($data, $txtx); $data = base64_decode(str_replace('_', '=', $data)); break; } return $data; } // //get cookie // public function kleeja_get_cookie($name) { global $config; is_array($plugin_run_result = Plugins::getInstance()->run('kleeja_get_cookie_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook return $_COOKIE[$config['cookie_name'] . '_' . $name] ?? false; } //check if user is admin or not //return : mean return true or false, but if return is false will show msg public function kleeja_check_user() { global $config, $userinfo; is_array($plugin_run_result = Plugins::getInstance()->run('kleeja_check_user_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook //to make sure $userinfo = [ 'id' => $this->user_id, 'group_id' => $this->group_id, ]; //if login up if ($this->kleeja_get_cookie('ulogu')) { $user_data = false; list($user_id, $hashed_password, $expire_at, $hashed_expire, $group_id, $u_info) = @explode('|', $this->en_de_crypt($this->kleeja_get_cookie('ulogu'), 2)); //if not expire if (($hashed_expire == sha1(md5($config['h_key'] . $hashed_password) . $expire_at)) && ($expire_at > time())) { if (! empty($u_info)) { $userinfo = unserialize(base64_decode($u_info)); $userinfo['group_id'] = $group_id; $userinfo['password'] = $hashed_password; $user_data = $this->data($user_id, $hashed_password, true, $expire_at); } } if ($user_data == false) { $this->logout(); } else { $this->user_id = $userinfo['id']; $this->group_id = $userinfo['group_id']; $this->user_name = $userinfo['name']; $this->user_mail = $userinfo['mail']; $this->last_visit = $userinfo['last_visit']; return $user_data; } } return false; //nothing } }