display(); require_once './libraries/footer.inc.php'; } // end if /** * If the "change password" form has been submitted, checks for valid values * and submit the query or logout */ if (isset($_REQUEST['nopass'])) { // similar logic in server_privileges.php $_error = false; if ($_REQUEST['nopass'] == '1') { $password = ''; } elseif (empty($_REQUEST['pma_pw']) || empty($_REQUEST['pma_pw2'])) { $message = PMA_Message::error('strPasswordEmpty'); $_error = true; } elseif ($_REQUEST['pma_pw'] != $_REQUEST['pma_pw2']) { $message = PMA_Message::error('strPasswordNotSame'); $_error = true; } else { $password = $_REQUEST['pma_pw']; } if (! $_error) { // Defines the url to return to in case of error in the sql statement $_url_params = array(); $err_url = 'user_password.php' . PMA_generate_common_url($_url_params); if (PMA_isValid($_REQUEST['pw_hash'], 'identical', 'old')) { $hashing_function = 'OLD_PASSWORD'; } else { $hashing_function = 'PASSWORD'; } $sql_query = 'SET password = ' . (($password == '') ? '\'\'' : $hashing_function . '(\'***\')'); $local_query = 'SET password = ' . (($password == '') ? '\'\'' : $hashing_function . '(\'' . PMA_sqlAddslashes($password) . '\')'); $result = @PMA_DBI_try_query($local_query) or PMA_mysqlDie(PMA_DBI_getError(), $sql_query, false, $err_url); // Changes password cookie if required // Duration = till the browser is closed for password (we don't want this to be saved) if ($cfg['Server']['auth_type'] == 'cookie') { PMA_setCookie('pmaPass-' . $server, PMA_blowfish_encrypt($password, $GLOBALS['cfg']['blowfish_secret'])); } // end if // For http auth. mode, the "back" link will also enforce new // authentication if ($cfg['Server']['auth_type'] == 'http') { $_url_params['old_usr'] = 'relog'; } // Displays the page require_once './libraries/header.inc.php'; echo '