#!/usr/bin/perl use CGI qw(param); use DBI; use Crypt::Blowfish; $db_user = "root"; $db_pass = "###########fuck###########"; $c_time = time(); $token = param("q"); print "Content-type: text/plain\n\n"; #SELECT valid_key,valid_until,is_valid FROM `authentification` WHERE valid_key = 'TESTKEY' # insert into authentification (valid_key, valid_until,is_valid) values('TESTKEY1','1120896154','1'); my $dbh = DBI->connect('DBI:mysql:spider_authentification', $db_user, $db_pass) or die "failed to open $dbh: $!\n"; my $sth = $dbh->prepare("SELECT valid_key,valid_until,is_valid FROM `authentification` WHERE valid_key = '$token'"); $sth->execute(); while (my $ref = $sth->fetchrow_hashref()) { $is_vaild = $ref->{'is_valid'}; $valid_until = $ref->{'valid_until'}; $valid_key = $ref->{'valid_key'}; } $sth->finish(); $dbh->disconnect(); if ($token eq $valid_key){ if ($c_time > $valid_until){ #print "Key abgelaufen!\n"; #print "$c_time und $valid_until"; exit(0); } else { if ($is_vaild == "1"){ #print "key noch valid"; print "1"; } else { #print "key nicht valid - breche ab"; exit(0); } } } else { #print "TOKEN mismatch"; print "0"; exit(0); }