Example #1
0
include "../spaceregentsconf/config.inc.php";
include "../spaceregentsinc/func.inc.php";
include "../spaceregentsinc/design.inc.php";
include "../spaceregentsinc/users.inc.php";
include "../spaceregentsinc/gp/dbwrap.inc";
include "../spaceregentsinc/gp/class_session.inc.php";
include "../spaceregentsinc/gp/class_master_auth.inc.php";
include "../spaceregentsinc/gp/class_anon_auth.inc.php";
include "../spaceregentsinc/class_login.php";
include "../spaceregentsinc/class_login_activate.inc.php";
connect();
/* SESSION HANDLING */
$auth_conf = array("ses_name" => "SR-GAMESES", "expire" => "3600", "fid" => "0", "cookies" => true);
// mop: typ 3 f�r admin session
$ses_conf = array("type" => "0");
$auth = new anon_auth($db, $auth_conf, $ses_conf);
if ($_GET["logout"] == 1 && $auth->ses->validate()) {
    $auth->close_session();
}
if (!$auth->ses->validate()) {
    if (!$auth->auth()) {
        print "INTERNAL ERROR!";
        $db->execute("########## SESSION ERROR ##### " . $db->errstr());
        die;
    }
}
$ses =& $auth->session();
// mop: logindaten....wrong_logins verhindert bruteforce attacken
if (isset($_POST["__user"]) && isset($_POST["__pass"]) && isset($_POST["activationcode"])) {
    $GLOBALS["__login"] = new login_activate($db, $auth_conf, $ses);
    if (!($uid = $GLOBALS["__login"]->auth())) {
<?php

include $__base_inc_dir . "gp/class_session.inc.php";
include $__base_inc_dir . "gp/class_master_auth.inc.php";
include $__base_inc_dir . "gp/class_anon_auth.inc.php";
/* SESSION HANDLING */
$auth_conf = array("ses_name" => "SR-SES", "expire" => "7200", "fid" => "0", "cookies" => true);
// mop: typ 3 für admin session
$ses_conf = array("type" => "1");
$auth = new anon_auth($db, $auth_conf, $ses_conf);
if ($_GET["logout"] == 1 && $auth->ses->validate()) {
    $auth->close_session();
}
if (!$auth->ses->validate()) {
    if (!$auth->auth()) {
        print "INTERNAL ERROR!";
        $db->execute("########## SESSION ERROR ##### " . $db->errstr());
        die;
    }
}
$GLOBALS["ses"] =& $auth->session();
// mop: logindaten....wrong_logins verhindert bruteforce attacken
if ($GLOBALS["ses"]->get_uid() == 0 && isset($_POST["__portal_user"]) && isset($_POST["__portal_pass"]) && $GLOBALS["ses"]->get_var("wrong_logins") < 10) {
    include "class_login.inc.php";
    $login = new login($db, $auth_conf, $GLOBALS["ses"]);
    if (!($uid = $login->auth($_POST["__portal_user"], $_POST["__portal_pass"], $ses->get_var("wrong_logins")))) {
        $wrong_logins = $ses->get_var("wrong_logins");
        $GLOBALS["ses"]->reg("wrong_logins", $wrong_logins++);
    } else {
        $GLOBALS["ses"]->update_uid($uid);
    }