/**
  * Gets advanced authentication settings
  *
  * this function DOES NOT check authentication - it just checks/provides
  * authentication credentials required to connect to the MySQL server
  * usually with $GLOBALS['dbi']->connect()
  *
  * it returns false if something is missing - which usually leads to
  * auth() which displays login form
  *
  * it returns true if all seems ok which usually leads to auth_set_user()
  *
  * it directly switches to authFails() if user inactivity timeout is reached
  *
  * @return boolean   whether we get authentication settings or not
  */
 public function authCheck()
 {
     global $conn_error;
     // Initialization
     /**
      * @global $GLOBALS['pma_auth_server'] the user provided server to
      * connect to
      */
     $GLOBALS['pma_auth_server'] = '';
     $GLOBALS['PHP_AUTH_USER'] = $GLOBALS['PHP_AUTH_PW'] = '';
     $GLOBALS['from_cookie'] = false;
     if (!empty($_REQUEST['pma_username'])) {
         // Verify Captcha if it is required.
         if (!empty($GLOBALS['cfg']['CaptchaLoginPrivateKey']) && !empty($GLOBALS['cfg']['CaptchaLoginPublicKey'])) {
             if (!empty($_POST["g-recaptcha-response"])) {
                 include_once 'libraries/plugins/auth/recaptcha/autoload.php';
                 $reCaptcha = new ReCaptcha($GLOBALS['cfg']['CaptchaLoginPrivateKey']);
                 // verify captcha status.
                 $resp = $reCaptcha->verify($_POST["g-recaptcha-response"], $_SERVER["REMOTE_ADDR"]);
                 // Check if the captcha entered is valid, if not stop the login.
                 if ($resp == null || !$resp->isSuccess()) {
                     $conn_error = __('Entered captcha is wrong, try again!');
                     return false;
                 }
             } else {
                 $conn_error = __('Please enter correct captcha!');
                 return false;
             }
         }
         // The user just logged in
         $GLOBALS['PHP_AUTH_USER'] = PMA_sanitizeMySQLUser($_REQUEST['pma_username']);
         $GLOBALS['PHP_AUTH_PW'] = empty($_REQUEST['pma_password']) ? '' : $_REQUEST['pma_password'];
         if ($GLOBALS['cfg']['AllowArbitraryServer'] && isset($_REQUEST['pma_servername'])) {
             if ($GLOBALS['cfg']['ArbitraryServerRegexp']) {
                 $parts = explode(' ', $_REQUEST['pma_servername']);
                 if (count($parts) == 2) {
                     $tmp_host = $parts[0];
                 } else {
                     $tmp_host = $_REQUEST['pma_servername'];
                 }
                 $match = preg_match($GLOBALS['cfg']['ArbitraryServerRegexp'], $tmp_host);
                 if (!$match) {
                     $conn_error = __('You are not allowed to log in to this MySQL server!');
                     return false;
                 }
             }
             $GLOBALS['pma_auth_server'] = PMA_sanitizeMySQLHost($_REQUEST['pma_servername']);
         }
         PMA_secureSession();
         return true;
     }
     // At the end, try to set the $GLOBALS['PHP_AUTH_USER']
     // and $GLOBALS['PHP_AUTH_PW'] variables from cookies
     // check cookies
     if (empty($_COOKIE['pmaUser-' . $GLOBALS['server']])) {
         return false;
     }
     $GLOBALS['PHP_AUTH_USER'] = $this->cookieDecrypt($_COOKIE['pmaUser-' . $GLOBALS['server']], $this->_getEncryptionSecret());
     // user was never logged in since session start
     if (empty($_SESSION['last_access_time'])) {
         return false;
     }
     // User inactive too long
     $last_access_time = time() - $GLOBALS['cfg']['LoginCookieValidity'];
     if ($_SESSION['last_access_time'] < $last_access_time) {
         Util::cacheUnset('is_create_db_priv');
         Util::cacheUnset('is_reload_priv');
         Util::cacheUnset('db_to_create');
         Util::cacheUnset('dbs_where_create_table_allowed');
         Util::cacheUnset('dbs_to_test');
         Util::cacheUnset('db_priv');
         Util::cacheUnset('col_priv');
         Util::cacheUnset('table_priv');
         Util::cacheUnset('proc_priv');
         $GLOBALS['no_activity'] = true;
         $this->authFails();
         if (!defined('TESTSUITE')) {
             exit;
         } else {
             return false;
         }
     }
     // check password cookie
     if (empty($_COOKIE['pmaAuth-' . $GLOBALS['server']])) {
         return false;
     }
     $auth_data = json_decode($this->cookieDecrypt($_COOKIE['pmaAuth-' . $GLOBALS['server']], $this->_getSessionEncryptionSecret()), true);
     if (!is_array($auth_data) || !isset($auth_data['password'])) {
         return false;
     }
     $GLOBALS['PHP_AUTH_PW'] = $auth_data['password'];
     if ($GLOBALS['cfg']['AllowArbitraryServer'] && !empty($auth_data['server'])) {
         $GLOBALS['pma_auth_server'] = $auth_data['server'];
     }
     $GLOBALS['from_cookie'] = true;
     return true;
 }
 /**
  * Gets advanced authentication settings
  *
  * @global  string $PHP_AUTH_USER          the username if register_globals is
  *          on
  * @global  string $PHP_AUTH_PW            the password if register_globals is
  *          on
  *
  * @return boolean   whether we get authentication settings or not
  */
 public function authCheck()
 {
     global $PHP_AUTH_USER, $PHP_AUTH_PW;
     // Grabs the $PHP_AUTH_USER variable whatever are the values of the
     // 'register_globals' and the 'variables_order' directives
     if (empty($PHP_AUTH_USER)) {
         if (PMA_getenv('PHP_AUTH_USER')) {
             $PHP_AUTH_USER = PMA_getenv('PHP_AUTH_USER');
         } elseif (PMA_getenv('REMOTE_USER')) {
             // CGI, might be encoded, see below
             $PHP_AUTH_USER = PMA_getenv('REMOTE_USER');
         } elseif (PMA_getenv('REDIRECT_REMOTE_USER')) {
             // CGI, might be encoded, see below
             $PHP_AUTH_USER = PMA_getenv('REDIRECT_REMOTE_USER');
         } elseif (PMA_getenv('AUTH_USER')) {
             // WebSite Professional
             $PHP_AUTH_USER = PMA_getenv('AUTH_USER');
         } elseif (PMA_getenv('HTTP_AUTHORIZATION')) {
             // IIS, might be encoded, see below
             $PHP_AUTH_USER = PMA_getenv('HTTP_AUTHORIZATION');
         } elseif (PMA_getenv('Authorization')) {
             // FastCGI, might be encoded, see below
             $PHP_AUTH_USER = PMA_getenv('Authorization');
         }
     }
     // Grabs the $PHP_AUTH_PW variable whatever are the values of the
     // 'register_globals' and the 'variables_order' directives
     if (empty($PHP_AUTH_PW)) {
         if (PMA_getenv('PHP_AUTH_PW')) {
             $PHP_AUTH_PW = PMA_getenv('PHP_AUTH_PW');
         } elseif (PMA_getenv('REMOTE_PASSWORD')) {
             // Apache/CGI
             $PHP_AUTH_PW = PMA_getenv('REMOTE_PASSWORD');
         } elseif (PMA_getenv('AUTH_PASSWORD')) {
             // WebSite Professional
             $PHP_AUTH_PW = PMA_getenv('AUTH_PASSWORD');
         }
     }
     // Decode possibly encoded information (used by IIS/CGI/FastCGI)
     // (do not use explode() because a user might have a colon in his password
     if (strcmp(substr($PHP_AUTH_USER, 0, 6), 'Basic ') == 0) {
         $usr_pass = base64_decode(substr($PHP_AUTH_USER, 6));
         if (!empty($usr_pass)) {
             $colon = strpos($usr_pass, ':');
             if ($colon) {
                 $PHP_AUTH_USER = substr($usr_pass, 0, $colon);
                 $PHP_AUTH_PW = substr($usr_pass, $colon + 1);
             }
             unset($colon);
         }
         unset($usr_pass);
     }
     // sanitize username
     $PHP_AUTH_USER = PMA_sanitizeMySQLUser($PHP_AUTH_USER);
     // User logged out -> ensure the new username is not the same
     $old_usr = isset($_REQUEST['old_usr']) ? $_REQUEST['old_usr'] : '';
     if (!empty($old_usr) && (isset($PHP_AUTH_USER) && hash_equals($old_usr, $PHP_AUTH_USER))) {
         $PHP_AUTH_USER = '';
         // -> delete user's choices that were stored in session
         if (!defined('TESTSUITE')) {
             session_destroy();
         }
     }
     // Returns whether we get authentication settings or not
     if (empty($PHP_AUTH_USER)) {
         return false;
     } else {
         return true;
     }
 }