7 * Checks Swekey authentication.
9 function Swekey_auth_check()
12 $confFile = $cfg['Server']['auth_swekey_config'];
14 if (! isset($_SESSION['SWEKEY'])) {
15 $_SESSION['SWEKEY'] = array();
18 $_SESSION['SWEKEY']['ENABLED'] = (! empty($confFile) && file_exists($confFile));
20 // Load the swekey.conf file the first time
21 if ($_SESSION['SWEKEY']['ENABLED'] && empty($_SESSION['SWEKEY']['CONF_LOADED'])) {
22 $_SESSION['SWEKEY']['CONF_LOADED'] = true;
23 $_SESSION['SWEKEY']['VALID_SWEKEYS'] = array();
24 $valid_swekeys = explode("\n", @file_get_contents
($confFile));
25 foreach ($valid_swekeys as $line) {
26 if (preg_match("/^[0-9A-F]{32}:.+$/", $line) != false) {
27 $items = explode(":", $line);
28 if (count($items) == 2)
29 $_SESSION['SWEKEY']['VALID_SWEKEYS'][$items[0]] = trim($items[1]);
30 } elseif (preg_match("/^[A-Z_]+=.*$/", $line) != false) {
31 $items = explode("=", $line);
32 $_SESSION['SWEKEY']['CONF_'.trim($items[0])] = trim($items[1]);
36 // Set default values for settings
37 if (! isset($_SESSION['SWEKEY']['CONF_SERVER_CHECK']))
38 $_SESSION['SWEKEY']['CONF_SERVER_CHECK'] = "";
39 if (! isset($_SESSION['SWEKEY']['CONF_SERVER_RNDTOKEN']))
40 $_SESSION['SWEKEY']['CONF_SERVER_RNDTOKEN'] = "";
41 if (! isset($_SESSION['SWEKEY']['CONF_SERVER_STATUS']))
42 $_SESSION['SWEKEY']['CONF_SERVER_STATUS'] = "";
43 if (! isset($_SESSION['SWEKEY']['CONF_CA_FILE']))
44 $_SESSION['SWEKEY']['CONF_CA_FILE'] = "";
45 if (! isset($_SESSION['SWEKEY']['CONF_ENABLE_TOKEN_CACHE']))
46 $_SESSION['SWEKEY']['CONF_ENABLE_TOKEN_CACHE'] = true;
47 if (! isset($_SESSION['SWEKEY']['CONF_DEBUG']))
48 $_SESSION['SWEKEY']['CONF_DEBUG'] = false;
51 // check if a web key has been authenticated
52 if ($_SESSION['SWEKEY']['ENABLED']) {
53 if (empty($_SESSION['SWEKEY']['AUTHENTICATED_SWEKEY']))
62 * Handle Swekey authentication error.
64 function Swekey_auth_error()
66 if (! isset($_SESSION['SWEKEY']))
69 if (! $_SESSION['SWEKEY']['ENABLED'])
72 include_once './libraries/auth/swekey/authentication.inc.php';
76 function Swekey_GetValidKey()
79 foreach ($_SESSION['SWEKEY']['VALID_SWEKEYS'] as $key => $value)
82 var connected_keys
= Swekey_ListKeyIds().split(",");
83 for (i in connected_keys
)
84 if (connected_keys
[i
] != null && connected_keys
[i
].length
== 32)
85 if (valids
.indexOf(connected_keys
[i
]) >= 0)
86 return connected_keys
[i
];
89 if (connected_keys
.length
> 0)
90 if (connected_keys
[0].length
== 32)
91 return "unknown_key_" + connected_keys
[0];
96 var key
= Swekey_GetValidKey();
100 if (key
!= Swekey_GetValidKey())
102 window
.location
.search
= "?swekey_reset";
105 setTimeout("timedCheck()",1000);
108 setTimeout("timedCheck()",1000);
112 if (! empty($_SESSION['SWEKEY']['AUTHENTICATED_SWEKEY']))
115 if (count($_SESSION['SWEKEY']['VALID_SWEKEYS']) == 0)
116 return sprintf(__('File %s does not contain any key id'), $GLOBALS['cfg']['Server']['auth_swekey_config']);
118 include_once "./libraries/auth/swekey/swekey.php";
120 Swekey_SetCheckServer($_SESSION['SWEKEY']['CONF_SERVER_CHECK']);
121 Swekey_SetRndTokenServer($_SESSION['SWEKEY']['CONF_SERVER_RNDTOKEN']);
122 Swekey_SetStatusServer($_SESSION['SWEKEY']['CONF_SERVER_STATUS']);
123 Swekey_EnableTokenCache($_SESSION['SWEKEY']['CONF_ENABLE_TOKEN_CACHE']);
125 $caFile = $_SESSION['SWEKEY']['CONF_CA_FILE'];
126 if (empty($caFile)) {
128 $pos = strrpos($caFile, '/');
130 $pos = strrpos($caFile, '\\'); // windows
131 $caFile = substr($caFile, 0, $pos +
1).'musbe-ca.crt';
132 // echo "\n<!-- $caFile -->\n";
133 // if (file_exists($caFile))
134 // echo "<!-- exists -->\n";
137 if (file_exists($caFile)) {
138 Swekey_SetCAFile($caFile);
139 } elseif (! empty($caFile) && (substr($_SESSION['SWEKEY']['CONF_SERVER_CHECK'], 0, 8) == "https://")) {
140 return "Internal Error: CA File $caFile not found";
144 $swekey_id = $_GET['swekey_id'];
145 $swekey_otp = $_GET['swekey_otp'];
147 if (isset($swekey_id)) {
148 unset($_SESSION['SWEKEY']['AUTHENTICATED_SWEKEY']);
149 if (! isset($_SESSION['SWEKEY']['RND_TOKEN'])) {
152 if (strlen($swekey_id) == 32) {
153 $res = Swekey_CheckOtp($swekey_id, $_SESSION['SWEKEY']['RND_TOKEN'], $swekey_otp);
154 unset($_SESSION['SWEKEY']['RND_TOKEN']);
156 $result = __('Hardware authentication failed') . ' (' . Swekey_GetLastError() . ')';
158 $_SESSION['SWEKEY']['AUTHENTICATED_SWEKEY'] = $swekey_id;
159 $_SESSION['SWEKEY']['FORCE_USER'] = $_SESSION['SWEKEY']['VALID_SWEKEYS'][$swekey_id];
163 $result = __('No valid authentication key plugged');
164 if ($_SESSION['SWEKEY']['CONF_DEBUG'])
166 $result .= "<br>" . htmlspecialchars($swekey_id);
168 unset($_SESSION['SWEKEY']['CONF_LOADED']); // reload the conf file
172 unset($_SESSION['SWEKEY']);
175 $_SESSION['SWEKEY']['RND_TOKEN'] = Swekey_GetFastRndToken();
176 if (strlen($_SESSION['SWEKEY']['RND_TOKEN']) != 64) {
177 $result = __('Hardware authentication failed') . ' (' . Swekey_GetLastError() . ')';
178 unset($_SESSION['SWEKEY']['CONF_LOADED']); // reload the conf file
181 if (! isset($swekey_id)) {
184 if (key
.length
!= 32) {
185 window
.location
.search
="?swekey_id=" + key +
"&token=<?php echo $_SESSION[' PMA_token ']; ?>";
187 var url
= "" + window
.location
;
188 if (url
.indexOf("?") > 0)
189 url
= url
.substr(0, url
.indexOf("?"));
190 Swekey_SetUnplugUrl(key
, "pma_login", url +
"?session_to_unset=<?php echo session_id();?>&token=<?php echo $_SESSION[' PMA_token ']; ?>");
191 var otp
= Swekey_GetOtp(key
, <?php
echo '"'.$_SESSION['SWEKEY']['RND_TOKEN'].'"';?
>);
192 window
.location
.search
="?swekey_id=" + key +
"&swekey_otp=" + otp +
"&token=<?php echo $_SESSION[' PMA_token ']; ?>";
196 return __('Authenticating...');
204 * Perform login using Swekey.
206 function Swekey_login($input_name, $input_go)
208 $swekeyErr = Swekey_auth_error();
209 if ($swekeyErr != null) {
210 PMA_Message
::error($swekeyErr)->display();
211 if ($GLOBALS['error_handler']->hasDisplayErrors()) {
213 $GLOBALS['error_handler']->dispErrors();
218 if (isset($_SESSION['SWEKEY']) && $_SESSION['SWEKEY']['ENABLED']) {
219 echo '<script type="text/javascript">';
220 if (empty($_SESSION['SWEKEY']['FORCE_USER'])) {
221 echo 'var user = null;';
223 echo 'var user = "'.$_SESSION['SWEKEY']['FORCE_USER'].'";';
227 function open_swekey_site()
229 window
.open("<?php echo PMA_linkURL('http://phpmyadmin.net/auth_key'); ?>");
232 var input_username
= document
.getElementById("<?php echo $input_name; ?>");
233 var input_go
= document
.getElementById("<?php echo $input_go; ?>");
234 var swekey_status
= document
.createElement('img');
235 swekey_status
.setAttribute('onClick', 'open_swekey_site()');
236 swekey_status
.setAttribute('style', 'width:8px; height:16px; border:0px; vspace:0px; hspace:0px; frameborder:no');
239 swekey_status
.setAttribute('src', 'http://artwork.swekey.com/unplugged-8x16.png');
240 //swekey_status.setAttribute('title', 'No swekey plugged');
241 input_go
.disabled
= true;
245 swekey_status
.setAttribute('src', 'http://artwork.swekey.com/plugged-8x16.png');
246 //swekey_status.setAttribute('title', 'swekey plugged');
247 input_username
.value
= user
;
249 input_username
.readOnly
= true;
251 if (input_username
.nextSibling
== null)
252 input_username
.parentNode
.appendChild(swekey_status
);
254 input_username
.parentNode
.insertBefore(swekey_status
, input_username
.nextSibling
);
261 if (!empty($_GET['session_to_unset'])) {
262 session_write_close();
263 session_id($_GET['session_to_unset']);
266 session_write_close();
271 if (isset($_GET['swekey_reset'])) {
272 unset($_SESSION['SWEKEY']);