External Portal System

Need some custom code changes to the phpBB core simple enough that you feel doesn't require an extension? Then post your request here so that community members can provide some assistance.

NOTE: NO OFFICIAL SUPPORT IS PROVIDED IN THIS SUB-FORUM
Forum rules
READ: phpBB.com Board-Wide Rules and Regulations

NOTE: NO OFFICIAL SUPPORT IS PROVIDED IN THIS SUB-FORUM
Post Reply
User avatar
Madea
Registered User
Posts: 3
Joined: Sun Jul 08, 2018 7:41 pm

External Portal System

Post by Madea » Fri Jul 20, 2018 12:24 am

Okay, so I went a little crazy on the coding part for people who got stuck on this.
I seen many posts about how to integrate phpBB in your external website.

For this there is a requirement of the ' PasswordHash.php ' files that are found all over the forums..
but i will include this below here

PasswordHash.php

Code: Select all

<?php
#
# Portable PHP password hashing framework.
#
# Version 0.1 / genuine.
#
# Written by Solar Designer <solar at openwall.com> in 2004-2006 and placed in
# the public domain.
#
# There's absolutely no warranty.
#
# The homepage URL for this framework is:
#
#	http://www.openwall.com/phpass/
#
# Please be sure to update the Version line if you edit this file in any way.
# It is suggested that you leave the main version number intact, but indicate
# your project name (after the slash) and add your own revision information.
#
# Please do not change the "private" password hashing method implemented in
# here, thereby making your hashes incompatible.  However, if you must, please
# change the hash type identifier (the "$P$") to something different.
#
# Obviously, since this code is in the public domain, the above are not
# requirements (there can be none), but merely suggestions.
#
class PasswordHash {
	var $itoa64;
	var $iteration_count_log2;
	var $portable_hashes;
	var $random_state;

	function PasswordHash($iteration_count_log2, $portable_hashes)
	{
		$this->itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz';

		if ($iteration_count_log2 < 4 || $iteration_count_log2 > 31)
			$iteration_count_log2 = 8;
		$this->iteration_count_log2 = $iteration_count_log2;

		$this->portable_hashes = $portable_hashes;

		$this->random_state = microtime() . getmypid();
	}

	function get_random_bytes($count)
	{
		$output = '';
		if (($fh = @fopen('/dev/urandom', 'rb'))) {
			$output = fread($fh, $count);
			fclose($fh);
		}

		if (strlen($output) < $count) {
			$output = '';
			for ($i = 0; $i < $count; $i += 16) {
				$this->random_state =
				    md5(microtime() . $this->random_state);
				$output .=
				    pack('H*', md5($this->random_state));
			}
			$output = substr($output, 0, $count);
		}

		return $output;
	}

	function encode64($input, $count)
	{
		$output = '';
		$i = 0;
		do {
			$value = ord($input[$i++]);
			$output .= $this->itoa64[$value & 0x3f];
			if ($i < $count)
				$value |= ord($input[$i]) << 8;
			$output .= $this->itoa64[($value >> 6) & 0x3f];
			if ($i++ >= $count)
				break;
			if ($i < $count)
				$value |= ord($input[$i]) << 16;
			$output .= $this->itoa64[($value >> 12) & 0x3f];
			if ($i++ >= $count)
				break;
			$output .= $this->itoa64[($value >> 18) & 0x3f];
		} while ($i < $count);

		return $output;
	}

	function gensalt_private($input)
	{
		$output = '$H$';
		$output .= $this->itoa64[min($this->iteration_count_log2 +
			((PHP_VERSION >= '5') ? 5 : 3), 30)];
		$output .= $this->encode64($input, 6);

		return $output;
	}

	function crypt_private($password, $setting)
	{
		$output = '*0';
		if (substr($setting, 0, 2) == $output)
			$output = '*1';

		if (substr($setting, 0, 3) != '$H$')
			return $output;

		$count_log2 = strpos($this->itoa64, $setting[3]);
		if ($count_log2 < 7 || $count_log2 > 30)
			return $output;

		$count = 1 << $count_log2;

		$salt = substr($setting, 4, 8);
		if (strlen($salt) != 8)
			return $output;

		# We're kind of forced to use MD5 here since it's the only
		# cryptographic primitive available in all versions of PHP
		# currently in use.  To implement our own low-level crypto
		# in PHP would result in much worse performance and
		# consequently in lower iteration counts and hashes that are
		# quicker to crack (by non-PHP code).
		if (PHP_VERSION >= '5') {
			$hash = md5($salt . $password, TRUE);
			do {
				$hash = md5($hash . $password, TRUE);
			} while (--$count);
		} else {
			$hash = pack('H*', md5($salt . $password));
			do {
				$hash = pack('H*', md5($hash . $password));
			} while (--$count);
		}

		$output = substr($setting, 0, 12);
		$output .= $this->encode64($hash, 16);

		return $output;
	}

	function gensalt_extended($input)
	{
		$count_log2 = min($this->iteration_count_log2 + 8, 24);
		# This should be odd to not reveal weak DES keys, and the
		# maximum valid value is (2**24 - 1) which is odd anyway.
		$count = (1 << $count_log2) - 1;

		$output = '_';
		$output .= $this->itoa64[$count & 0x3f];
		$output .= $this->itoa64[($count >> 6) & 0x3f];
		$output .= $this->itoa64[($count >> 12) & 0x3f];
		$output .= $this->itoa64[($count >> 18) & 0x3f];

		$output .= $this->encode64($input, 3);

		return $output;
	}

	function gensalt_blowfish($input)
	{
		# This one needs to use a different order of characters and a
		# different encoding scheme from the one in encode64() above.
		# We care because the last character in our encoded string will
		# only represent 2 bits.  While two known implementations of
		# bcrypt will happily accept and correct a salt string which
		# has the 4 unused bits set to non-zero, we do not want to take
		# chances and we also do not want to waste an additional byte
		# of entropy.
		$itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz';

		$output = '$2a$';
		$output .= chr(ord('0') + $this->iteration_count_log2 / 10);
		$output .= chr(ord('0') + $this->iteration_count_log2 % 10);
		$output .= '$';

		$i = 0;
		do {
			$c1 = ord($input[$i++]);
			$output .= $itoa64[$c1 >> 2];
			$c1 = ($c1 & 0x03) << 4;
			if ($i >= 16) {
				$output .= $itoa64[$c1];
				break;
			}

			$c2 = ord($input[$i++]);
			$c1 |= $c2 >> 4;
			$output .= $itoa64[$c1];
			$c1 = ($c2 & 0x0f) << 2;

			$c2 = ord($input[$i++]);
			$c1 |= $c2 >> 6;
			$output .= $itoa64[$c1];
			$output .= $itoa64[$c2 & 0x3f];
		} while (1);

		return $output;
	}

	function HashPassword($password)
	{
		$random = '';

		if (CRYPT_BLOWFISH == 1 && !$this->portable_hashes) {
			$random = $this->get_random_bytes(16);
			$hash =
			    crypt($password, $this->gensalt_blowfish($random));
			if (strlen($hash) == 60)
				return $hash;
		}

		if (CRYPT_EXT_DES == 1 && !$this->portable_hashes) {
			if (strlen($random) < 3)
				$random = $this->get_random_bytes(3);
			$hash =
			    crypt($password, $this->gensalt_extended($random));
			if (strlen($hash) == 20)
				return $hash;
		}

		if (strlen($random) < 6)
			$random = $this->get_random_bytes(6);
		$hash =
		    $this->crypt_private($password,
		    $this->gensalt_private($random));
		if (strlen($hash) == 34)
			return $hash;

		# Returning '*' on error is safe here, but would _not_ be safe
		# in a crypt(3)-like function used _both_ for generating new
		# hashes and for validating passwords against existing hashes.
		return '*';
	}

	function CheckPassword($password, $stored_hash)
	{
		$hash = $this->crypt_private($password, $stored_hash);
		if ($hash[0] == '*')
			$hash = crypt($password, $stored_hash);

		return $hash == $stored_hash;
	}
}

?>
Now having this code available makes things a lot easier for people who do understand MySQLi and PHP.
This is only a basic example.
But for every programmer out there...
Enjoy
Because this should be enough to get you all started on your own external portal system.

tester.php

Code: Select all

<?php
//ini_set('display_errors', 1);
//ini_set('display_startup_errors', 1);
//error_reporting(E_ALL);
error_reporting(0);
session_start();

$CONF["file"]  = "./tester.php"; // this is your current file... 

$MYSQL["host"] = "localhost";
$MYSQL["user"] = "username";
$MYSQL["pass"] = "password";
$MYSQL["data"] = "database";

require_once("./PasswordHash.php");

if (strtolower($_GET['act']) == "logout") {
	unset($_SESSION['p_user']);
	unset($_SESSION['p_pass']);
	unset($_SESSION['is_admin']);
	$msg = "You are logged out.<br /><a href=\"" . $CONF["file"] . "\" target=\"_self\">Return to Main</a><br />\r\n";
	echo $msg;
	exit;
}

function getDBInfo($user,$type) {
	global $MYSQL;
	$query="SELECT username, user_password, group_id FROM `phpbb_users` WHERE `username`='" . $user . "' LIMIT 1;";
	$mysqli = new mysqli($MYSQL["host"], $MYSQL["user"], $MYSQL["pass"], $MYSQL["data"]);
	if ($mysqli->connect_errno) {
    	printf("Connect failed: %s\n", $mysqli->connect_error);
	    exit();
	}
	if ($result = $mysqli->query($query)) {
    	while ($row = $result->fetch_assoc()) {
			switch($type) {
				case "password": $ret = $row["user_password"]; break;
				case "group_id": $ret = $row["group_id"]; break;
			}
	    }
    	$result->free();
	}
	$mysqli->close();
	unset($result);
	unset($query);
	return $ret;
}
function chkRole($id) {
	global $MYSQL;
	$query="SELECT username, user_password FROM `phpbb_users` WHERE `username`='" . $user . "' LIMIT 1;";
	$mysqli = new mysqli($MYSQL["host"], $MYSQL["user"], $MYSQL["pass"], $MYSQL["data"]);
	if ($mysqli->connect_errno) {
    	printf("Connect failed: %s\n", $mysqli->connect_error);
	    exit();
	}
	if ($result = $mysqli->query($query)) {
    	while ($row = $result->fetch_assoc()) {
        	$ret = $row["user_password"];
	    }
    	$result->free();
	}
	$mysqli->close();
	unset($result);
	unset($query);
	return $ret;
}
function chkPassword($var, $str) {
	$t_hasher = new PasswordHash(8, TRUE);
	$return = $t_hasher->CheckPassword($var, $str);
	unset($t_hasher);
	return $return;
}
if ($_SESSION['p_user'] && $_SESSION['p_pass']) {
	$p_username = $_SESSION['p_user'];
	$p_password = $_SESSION['p_pass'];
	$d_password = getDBInfo($p_username, "password");
	$confirm = chkPassword($p_password, $d_password);
	$msg = "";
	if ($confirm === true) {
		$msg .= "Welcome <b>" . $p_username . "</b>";
	    if ($_SESSION['is_admin']) {
			$msg .= " (Admin)";
		}
		$msg .= ". ";
		$msg .= "<a href=\"" . $CONF["file"] . "?act=Logout\" target=\"_self\">Logout</a><br />\r\n";
		echo $msg;
	}
	else {
		// not a valid user
		unset($_SESSION);
		header("Location: " . $CONF["file"]);
		exit;
	}
}
else if ($_POST['p_user'] && $_POST['p_pass']) {
	$myusername = $_POST['p_user'];
	$mypassword = $_POST['p_pass'];
	$dbpassword = getDBInfo($myusername, "password");
	$confirm = chkPassword($mypassword, $dbpassword);
	if ($confirm === true) {
	    $group_id = getDBInfo($myusername, "group_id");
		$_SESSION['p_user'] = $myusername;
		$_SESSION['p_pass'] = $mypassword;
		if ($group_id === "5") {
			$_SESSION['is_admin'] = 1;
		}
		else {
			$_SESSION['is_admin'] = 0;
		}
		// session variables set
		header("Location: " . $CONF["file"]);
		exit;
	}
	else {
		// not a valid user
		unset($_SESSION);
		header("Location: " . $CONF["file"]);
		exit;
	}
}
else {
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
    <title>phpBB Login</title>
    <style type="text/css">
      body, th, tr { font-size: 11px; font-family: "Lucida Console", "Lucida Sans Unicode", "Lucida Grande",  Verdana, Geneva, sans-serif; }
	  input[type=text], input[type=password] { font-size: 11px; font-family: "Lucida Console", "Lucida Sans Unicode", "Lucida Grande",  Verdana, Geneva, sans-serif; padding: 2px; width: 180px; background-color: #FFFFFF; border: 1px solid #333333; color: #111111; }
	  input[type=submit] { font-size: 11px; font-family: "Lucida Console", "Lucida Sans Unicode", "Lucida Grande",  Verdana, Geneva, sans-serif; padding: 2px; width: 180px; background-color: #CCCCCC; border: 1px solid #333333; color: #333333; }
    </style>
  </head>
  <body>
    <form action="<?=$CONF["file"];?>" method="post">
      Username:<br />
      <input name="p_user" type="text" /><br />
      <br />
      Password:<br />
      <input name="p_pass" type="password" /><br />
      <br />
      <input type="submit" value="Submit" />
    </form>
</body>
</html>
<?php
}
?>
Have fun guys...
Madea
Give a man a fire, and he will be warm for a day!
Set a man on fire and he will be warm for the rest of his life!

User avatar
Madea
Registered User
Posts: 3
Joined: Sun Jul 08, 2018 7:41 pm

Re: External Portal System

Post by Madea » Fri Aug 03, 2018 6:24 am

Updated code..

now i actual had some time...

index.php

Code: Select all

<?php
//ini_set('display_errors', 1);
//ini_set('display_startup_errors', 1);
//error_reporting(E_ALL);
error_reporting(0);
session_start();

$load_config = true;
require_once("./inc/config.php");
require_once("./inc/class/PasswordHash.class.php");
require_once("./inc/class/Madea.class.php");

$madea = new MADEA($MYSQL, $CONF);

if (strtolower($_GET['act']) == "logout") {
	$madea->destroy_session();
}

if ($madea->check_setup() === true) {
	include($CONF["fold"]."logged_in.php");
}
else {
	include($CONF["fold"]."login_form.php");
}
?>

./inc/config.php

Code: Select all

<?php
if (!$load_config) { header("Location: //www.gotohell.com/"); exit; }
$CONF["file"]  = "./index.php"; // this is your current file... 
$CONF["fold"]  = "./site/";     // where are your files located...

$MYSQL["hostname"] = "localhost";
$MYSQL["username"] = "username";
$MYSQL["password"] = "password";
$MYSQL["database"] = "database";
?>

./inc/class/PasswordHash.class.php

Code: Select all

<?php
#
# Portable PHP password hashing framework.
#
# Version 0.1 / genuine.
#
# Written by Solar Designer <solar at openwall.com> in 2004-2006 and placed in
# the public domain.
#
# There's absolutely no warranty.
#
# The homepage URL for this framework is:
#
#	http://www.openwall.com/phpass/
#
# Please be sure to update the Version line if you edit this file in any way.
# It is suggested that you leave the main version number intact, but indicate
# your project name (after the slash) and add your own revision information.
#
# Please do not change the "private" password hashing method implemented in
# here, thereby making your hashes incompatible.  However, if you must, please
# change the hash type identifier (the "$P$") to something different.
#
# Obviously, since this code is in the public domain, the above are not
# requirements (there can be none), but merely suggestions.
#
class PasswordHash {
	var $itoa64;
	var $iteration_count_log2;
	var $portable_hashes;
	var $random_state;

	function PasswordHash($iteration_count_log2, $portable_hashes)
	{
		$this->itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz';

		if ($iteration_count_log2 < 4 || $iteration_count_log2 > 31)
			$iteration_count_log2 = 8;
		$this->iteration_count_log2 = $iteration_count_log2;

		$this->portable_hashes = $portable_hashes;

		$this->random_state = microtime() . getmypid();
	}

	function get_random_bytes($count)
	{
		$output = '';
		if (($fh = @fopen('/dev/urandom', 'rb'))) {
			$output = fread($fh, $count);
			fclose($fh);
		}

		if (strlen($output) < $count) {
			$output = '';
			for ($i = 0; $i < $count; $i += 16) {
				$this->random_state =
				    md5(microtime() . $this->random_state);
				$output .=
				    pack('H*', md5($this->random_state));
			}
			$output = substr($output, 0, $count);
		}

		return $output;
	}

	function encode64($input, $count)
	{
		$output = '';
		$i = 0;
		do {
			$value = ord($input[$i++]);
			$output .= $this->itoa64[$value & 0x3f];
			if ($i < $count)
				$value |= ord($input[$i]) << 8;
			$output .= $this->itoa64[($value >> 6) & 0x3f];
			if ($i++ >= $count)
				break;
			if ($i < $count)
				$value |= ord($input[$i]) << 16;
			$output .= $this->itoa64[($value >> 12) & 0x3f];
			if ($i++ >= $count)
				break;
			$output .= $this->itoa64[($value >> 18) & 0x3f];
		} while ($i < $count);

		return $output;
	}

	function gensalt_private($input)
	{
		$output = '$H$';
		$output .= $this->itoa64[min($this->iteration_count_log2 +
			((PHP_VERSION >= '5') ? 5 : 3), 30)];
		$output .= $this->encode64($input, 6);

		return $output;
	}

	function crypt_private($password, $setting)
	{
		$output = '*0';
		if (substr($setting, 0, 2) == $output)
			$output = '*1';

		if (substr($setting, 0, 3) != '$H$')
			return $output;

		$count_log2 = strpos($this->itoa64, $setting[3]);
		if ($count_log2 < 7 || $count_log2 > 30)
			return $output;

		$count = 1 << $count_log2;

		$salt = substr($setting, 4, 8);
		if (strlen($salt) != 8)
			return $output;

		# We're kind of forced to use MD5 here since it's the only
		# cryptographic primitive available in all versions of PHP
		# currently in use.  To implement our own low-level crypto
		# in PHP would result in much worse performance and
		# consequently in lower iteration counts and hashes that are
		# quicker to crack (by non-PHP code).
		if (PHP_VERSION >= '5') {
			$hash = md5($salt . $password, TRUE);
			do {
				$hash = md5($hash . $password, TRUE);
			} while (--$count);
		} else {
			$hash = pack('H*', md5($salt . $password));
			do {
				$hash = pack('H*', md5($hash . $password));
			} while (--$count);
		}

		$output = substr($setting, 0, 12);
		$output .= $this->encode64($hash, 16);

		return $output;
	}

	function gensalt_extended($input)
	{
		$count_log2 = min($this->iteration_count_log2 + 8, 24);
		# This should be odd to not reveal weak DES keys, and the
		# maximum valid value is (2**24 - 1) which is odd anyway.
		$count = (1 << $count_log2) - 1;

		$output = '_';
		$output .= $this->itoa64[$count & 0x3f];
		$output .= $this->itoa64[($count >> 6) & 0x3f];
		$output .= $this->itoa64[($count >> 12) & 0x3f];
		$output .= $this->itoa64[($count >> 18) & 0x3f];

		$output .= $this->encode64($input, 3);

		return $output;
	}

	function gensalt_blowfish($input)
	{
		# This one needs to use a different order of characters and a
		# different encoding scheme from the one in encode64() above.
		# We care because the last character in our encoded string will
		# only represent 2 bits.  While two known implementations of
		# bcrypt will happily accept and correct a salt string which
		# has the 4 unused bits set to non-zero, we do not want to take
		# chances and we also do not want to waste an additional byte
		# of entropy.
		$itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz';

		$output = '$2a$';
		$output .= chr(ord('0') + $this->iteration_count_log2 / 10);
		$output .= chr(ord('0') + $this->iteration_count_log2 % 10);
		$output .= '$';

		$i = 0;
		do {
			$c1 = ord($input[$i++]);
			$output .= $itoa64[$c1 >> 2];
			$c1 = ($c1 & 0x03) << 4;
			if ($i >= 16) {
				$output .= $itoa64[$c1];
				break;
			}

			$c2 = ord($input[$i++]);
			$c1 |= $c2 >> 4;
			$output .= $itoa64[$c1];
			$c1 = ($c2 & 0x0f) << 2;

			$c2 = ord($input[$i++]);
			$c1 |= $c2 >> 6;
			$output .= $itoa64[$c1];
			$output .= $itoa64[$c2 & 0x3f];
		} while (1);

		return $output;
	}

	function HashPassword($password)
	{
		$random = '';

		if (CRYPT_BLOWFISH == 1 && !$this->portable_hashes) {
			$random = $this->get_random_bytes(16);
			$hash =
			    crypt($password, $this->gensalt_blowfish($random));
			if (strlen($hash) == 60)
				return $hash;
		}

		if (CRYPT_EXT_DES == 1 && !$this->portable_hashes) {
			if (strlen($random) < 3)
				$random = $this->get_random_bytes(3);
			$hash =
			    crypt($password, $this->gensalt_extended($random));
			if (strlen($hash) == 20)
				return $hash;
		}

		if (strlen($random) < 6)
			$random = $this->get_random_bytes(6);
		$hash =
		    $this->crypt_private($password,
		    $this->gensalt_private($random));
		if (strlen($hash) == 34)
			return $hash;

		# Returning '*' on error is safe here, but would _not_ be safe
		# in a crypt(3)-like function used _both_ for generating new
		# hashes and for validating passwords against existing hashes.
		return '*';
	}

	function CheckPassword($password, $stored_hash)
	{
		$hash = $this->crypt_private($password, $stored_hash);
		if ($hash[0] == '*')
			$hash = crypt($password, $stored_hash);

		return $hash == $stored_hash;
	}
}

?>

./inc/class/Madea.class.php

Code: Select all

<?php
class MADEA {
    protected $m_host, $m_user, $m_pass, $m_data;
    protected $c_file;
    public $_SESSION;
    public $m_return = '';
    public $ret = '';
    
    function __construct($sql, $cnf) {
        $this->m_host = $sql['hostname'];
        $this->m_user = $sql['username'];
        $this->m_pass = $sql['password'];
        $this->m_data = $sql['database'];
		$this->c_file = $cnf['file'];
    }

	public function _username() {
		return $_SESSION['p_user'];	
	}
	public function _admin() {
		$group_id = $this->check_information($_SESSION['p_user'], "group_id");
		if ($group_id === "5") { $return = true; }
		else { $return = false; }
		return $return;
	}

	private function m_connect() {
		$data = new mysqli($this->m_host, $this->m_user, $this->m_pass, $this->m_data);
		if ($data->connect_errno) {
	    	printf("Connect failed: %s\n", $mysqli->connect_error);
		    exit();
		}
		return $data;
	}
	private function m_disconnect($conn) {
		return $conn->close();
	}
	public function check_setup() {
		if ($_SESSION['p_user'] && $_SESSION['p_pass']) {
			$confirm = $this->check_session($_SESSION['p_user'], $_SESSION['p_pass']);
			if ($confirm === true) {
				$this->ret = true;
			}
			else {
				$this->destroy_session();
			}
		}
		else if ($_POST['p_user'] && $_POST['p_pass']) {
			$confirm = $this->check_session($_POST['p_user'], $_POST['p_pass']);
			if ($confirm === true) {
				$this->create_session($_POST['p_user'], $_POST['p_pass']);
			}
			else {
				$this->destroy_session();
			}
		}
		else {
			$this->ret = false;
		}
		return $this->ret;
	}
	private function check_session($u, $p) {
		$d_password = $this->check_information($u, "password");
		$confirm = $this->check_password($p, $d_password);
		return $confirm;
	}
	private function create_session($u, $p) {
		$_SESSION['p_user'] = $u;
		$_SESSION['p_pass'] = $p;
		header("Location: " . $this->c_file);
		exit;
	}
	public function destroy_session() {
		session_unset();
		header("Location: " . $this->c_file);
		//die('bitch');
		exit;	
	}
	private function check_password($var, $str) {
		$t_hasher = new PasswordHash(8, TRUE);
		$return = $t_hasher->CheckPassword($var, $str);
		unset($t_hasher);
		return $return;
	}
	private function check_information($user,$type) {
		$query="SELECT username, user_password, group_id FROM `phpbb_users` WHERE `username`='" . $user . "' LIMIT 1;";
		$mysqli = $this->m_connect();
		if ($result = $mysqli->query($query)) {
	    	while ($row = $result->fetch_assoc()) {
				switch($type) {
					case "password": $this->ret = $row["user_password"]; break;
					case "group_id": $this->ret = $row["group_id"]; break;
				}
		    }
	    	$result->free();
		}
		$this->m_disconnect($mysqli);
		unset($result);
		unset($query);
		return $this->ret;
	}
}
?>

./site/logged_in.php

Code: Select all

<?php
if ($madea->_admin()) { $code = " (Admin)."; }
else { $code = "."; }
?>
Welcome <?=$madea->_username().$code;?> (<a href="<?=$CONF["file"];?>?act=Logout">Logout</a>)

./site/login_form.php

Code: Select all

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
    <title>phpBB Login</title>
    <style type="text/css">
      body, th, tr { font-size: 11px; font-family: "Lucida Console", "Lucida Sans Unicode", "Lucida Grande",  Verdana, Geneva, sans-serif; }
      input[type=text], input[type=password] { font-size: 11px; font-family: "Lucida Console", "Lucida Sans Unicode", "Lucida Grande",  Verdana, Geneva, sans-serif; padding: 2px; width: 180px; background-color: #FFFFFF; border: 1px solid #333333; color: #111111; }
      input[type=submit] { font-size: 11px; font-family: "Lucida Console", "Lucida Sans Unicode", "Lucida Grande",  Verdana, Geneva, sans-serif; padding: 2px; width: 180px; background-color: #CCCCCC; border: 1px solid #333333; color: #333333; }
    </style>
  </head>
  <body>
    <form action="<?=$CONF['file'];?>" method="post">
      Username:<br />
      <input name="p_user" type="text" /><br />
      <br />
      Password:<br />
      <input name="p_pass" type="password" /><br />
      <br />
      <input type="submit" value="Submit" />
    </form>
  </body>
</html>
Give a man a fire, and he will be warm for a day!
Set a man on fire and he will be warm for the rest of his life!

Post Reply

Return to “phpBB Custom Coding”

Who is online

Users browsing this forum: No registered users and 4 guests