X-Git-Url: https://git.tokkee.org/?a=blobdiff_plain;f=gosa-core%2Finclude%2Ffunctions.inc;h=f58ed2a2e60ab73da2d552bd8bbf1711abc85f30;hb=06cc53394cf695b3bc663073e526d7d94e4bb2d6;hp=5c4af16790a22ca831c3791a6bea121b08271f27;hpb=6a9f0a5811944230a4d0f6a57563e16c7951d5c7;p=gosa.git diff --git a/gosa-core/include/functions.inc b/gosa-core/include/functions.inc index 5c4af1679..f58ed2a2e 100644 --- a/gosa-core/include/functions.inc +++ b/gosa-core/include/functions.inc @@ -1,7 +1,9 @@ "ae", /* Class autoloader */ function __autoload($class_name) { global $class_mapping, $BASE_DIR; + + if ($class_mapping === NULL){ + echo sprintf(_("Fatal error: no class locations defined - please run '%s' to fix this"), "update-gosa"); + exit; + } + if (isset($class_mapping[$class_name])){ require_once($BASE_DIR."/".$class_mapping[$class_name]); } else { - echo _("Fatal: cannot load class \"$class_name\" - execution aborted"); + echo sprintf(_("Fatal error: cannot instantiate class '%s' - try running '%s' to fix this"), $class_name, "update-gosa"); + exit; } } +/*! \brief Checks if a class is available. + * @param name String The class name. + * @return boolean True if class is available, else false. + */ +function class_available($name) +{ + global $class_mapping; + return(isset($class_mapping[$name])); +} + + +/* Check if plugin is avaliable */ +function plugin_available($plugin) +{ + global $class_mapping, $BASE_DIR; + + if (!isset($class_mapping[$plugin])){ + return false; + } else { + return is_readable($BASE_DIR."/".$class_mapping[$plugin]); + } +} + + /* Create seed with microseconds */ function make_seed() { list($usec, $sec) = explode(' ', microtime()); @@ -142,8 +193,8 @@ function get_browser_language() } /* Check for global language settings in gosa.conf */ - if(isset($config->data['MAIN']['LANG']) && !empty($config->data['MAIN']['LANG'])) { - $lang = $config->data['MAIN']['LANG']; + if (isset ($config) && $config->get_cfg_value('language') != ""){ + $lang = $config->get_cfg_value('language'); if(!preg_match("/utf/i",$lang)){ $lang .= ".UTF-8"; } @@ -180,10 +231,11 @@ function get_template_path($filename= '', $plugin= FALSE, $path= "") { global $config, $BASE_DIR; - if (!@isset($config->data['MAIN']['THEME'])){ - $theme= 'default'; + /* Set theme */ + if (isset ($config)){ + $theme= $config->get_cfg_value("theme", "default"); } else { - $theme= $config->data['MAIN']['THEME']; + $theme= "default"; } /* Return path for empty filename */ @@ -242,6 +294,21 @@ function array_remove_entries($needles, $haystack) } +function array_remove_entries_ics($needles, $haystack) +{ + $tmp= array(); + + /* Loop through entries to be removed */ + foreach ($haystack as $entry){ + if (!in_array_ics($entry, $needles)){ + $tmp[]= $entry; + } + } + + return ($tmp); +} + + function gosa_array_merge($ar1,$ar2) { if(!is_array($ar1) || !is_array($ar2)){ @@ -281,8 +348,10 @@ function ldap_init ($server, $base, $binddn='', $pass='') isset($config->current['TLS']) && $config->current['TLS'] == "true"); /* Sadly we've no proper return values here. Use the error message instead. */ - if (!preg_match("/Success/i", $ldap->error)){ - echo sprintf(_("FATAL: Error when connecting the LDAP. Server said '%s'."), $ldap->get_error()); + if (!$ldap->success()){ + msg_dialog::display(_("Fatal error"), + sprintf(_("FATAL: Error when connecting the LDAP. Server said '%s'."), $ldap->get_error()), + FATAL_ERROR_DIALOG); exit(); } @@ -301,17 +370,16 @@ function process_htaccess ($username, $kerberos= FALSE) $config->set_current($name); $mode= "kerberos"; - if (isset($config->current['KRBSASL']) && preg_match('/^true$/i', $config->current['KRBSASL'])){ + if ($config->get_cfg_value("krbsasl") == "true"){ $mode= "sasl"; } /* Look for entry or realm */ $ldap= $config->get_ldap_link(); - if (!preg_match("/Success/i", $ldap->error)){ - msg_dialog::display(_("LDAP error"), sprintf(_('User login failed.').'

'._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); - $smarty= get_smarty(); - $smarty->display(get_template_path('headers.tpl')); - echo "".session::get('errors').""; + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), + msgPool::ldaperror($ldap->get_error(), "", LDAP_AUTH)."

".session::get('errors'), + FATAL_ERROR_DIALOG); exit(); } $ldap->search("(&(objectClass=gosaAccount)(|(uid=$username)(userPassword={$mode}$username)))", array("uid")); @@ -334,17 +402,16 @@ function ldap_login_user_htaccess ($username) /* Look for entry or realm */ $ldap= $config->get_ldap_link(); - if (!preg_match("/Success/i", $ldap->error)){ - msg_dialog::display(_("LDAP error"), sprintf(_('User login failed.').'

'._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); - $smarty= get_smarty(); - $smarty->display(get_template_path('headers.tpl')); - echo "".session::get('errors').""; + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), + msgPool::ldaperror($ldap->get_error(), "", LDAP_AUTH)."

".session::get('errors'), + FATAL_ERROR_DIALOG); exit(); } $ldap->search("(&(objectClass=gosaAccount)(uid=$username))", array("uid")); /* Found no uniq match? Strange, because we did above... */ if ($ldap->count() != 1) { - msg_dialog::display(_("LDAP error"), _("Username / UID is not unique inside the LDAP tree. Please contact your Administrator."), ERROR_DIALOG); + msg_dialog::display(_("LDAP error"), _("Username / UID is not unique inside the LDAP tree!"), FATAL_ERROR_DIALOG); return (NULL); } $attrs= $ldap->fetch(); @@ -372,18 +439,17 @@ function ldap_login_user ($username, $password) /* look through the entire ldap */ $ldap = $config->get_ldap_link(); - if (!preg_match("/Success/i", $ldap->error)){ - msg_dialog::display(_("LDAP error"), sprintf(_("User login failed.")."

"._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); - $smarty= get_smarty(); - $smarty->display(get_template_path('headers.tpl')); - echo "".session::get('errors').""; + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), + msgPool::ldaperror($ldap->get_error(), "", LDAP_AUTH)."

".session::get('errors'), + FATAL_ERROR_DIALOG); exit(); } $ldap->cd($config->current['BASE']); $allowed_attributes = array("uid","mail"); $verify_attr = array(); - if(isset($config->current['LOGIN_ATTRIBUTE'])){ - $tmp = split(",",$config->current['LOGIN_ATTRIBUTE']); + if($config->get_cfg_value("login_attribute") != ""){ + $tmp = split(",", $config->get_cfg_value("login_attribute")); foreach($tmp as $attr){ if(in_array($attr,$allowed_attributes)){ $verify_attr[] = $attr; @@ -414,7 +480,7 @@ function ldap_login_user ($username, $password) /* found more than one matching id */ default: - msg_dialog::display(_("Internal error"), _("Username / UID is not unique inside the LDAP tree. Please contact your Administrator."), ERROR_DIALOG); + msg_dialog::display(_("Internal error"), _("Username / UID is not unique inside the LDAP tree. Please contact your Administrator."), FATAL_ERROR_DIALOG); return (NULL); } @@ -441,7 +507,7 @@ function ldap_login_user ($username, $password) $config->current['RECURSIVE'] == "true", isset($config->current['TLS']) && $config->current['TLS'] == "true"); - if (!preg_match("/Success/i", $ldap->error)){ + if (!$ldap->success()){ return (NULL); } @@ -565,10 +631,10 @@ function add_lock ($object, $user) /* Check for existing entries in lock area */ $ldap= $config->get_ldap_link(); - $ldap->cd ($config->current['CONFIG']); + $ldap->cd ($config->get_cfg_value("config")); $ldap->search("(&(objectClass=gosaLockEntry)(gosaUser=$user)(gosaObject=".base64_encode($object)."))", array("gosaUser")); - if (!preg_match("/Success/i", $ldap->error)){ + if (!$ldap->success()){ msg_dialog::display(_("Configuration error"), sprintf(_("Cannot create locking information in LDAP tree. Please contact your administrator!")."

"._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); return; } @@ -577,14 +643,14 @@ function add_lock ($object, $user) if ($ldap->count() == 0){ $attrs= array(); $name= md5($object); - $ldap->cd("cn=$name,".$config->current['CONFIG']); + $ldap->cd("cn=$name,".$config->get_cfg_value("config")); $attrs["objectClass"] = "gosaLockEntry"; $attrs["gosaUser"] = $user; $attrs["gosaObject"] = base64_encode($object); $attrs["cn"] = "$name"; $ldap->add($attrs); - if (!preg_match("/Success/i", $ldap->error)){ - msg_dialog::display(_("Internal error"), sprintf(_("Adding a lock failed.")."

"._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), "cn=$name,".$config->get_cfg_value("config"), 0, ERROR_DIALOG)); return; } } @@ -609,14 +675,14 @@ function del_lock ($object) /* Check for existance and remove the entry */ $ldap= $config->get_ldap_link(); - $ldap->cd ($config->current['CONFIG']); + $ldap->cd ($config->get_cfg_value("config")); $ldap->search ("(&(objectClass=gosaLockEntry)(gosaObject=".base64_encode($object)."))", array("gosaObject")); $attrs= $ldap->fetch(); - if ($ldap->getDN() != "" && preg_match("/Success/i", $ldap->error)){ + if ($ldap->getDN() != "" && $ldap->success()){ $ldap->rmdir ($ldap->getDN()); - if (!preg_match("/Success/i", $ldap->error)){ - msg_dialog::display(_("LDAP error"), sprintf(_("Removing a lock failed.")."

"._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $ldap->getDN(), LDAP_DEL, ERROR_DIALOG)); return; } } @@ -629,7 +695,7 @@ function del_user_locks($userdn) /* Get LDAP ressources */ $ldap= $config->get_ldap_link(); - $ldap->cd ($config->current['CONFIG']); + $ldap->cd ($config->get_cfg_value("config")); /* Remove all objects of this user, drop errors silently in this case. */ $ldap->search("(&(objectClass=gosaLockEntry)(gosaUser=$userdn))", array("gosaUser")); @@ -652,10 +718,10 @@ function get_lock ($object) /* Get LDAP link, check for presence of the lock entry */ $user= ""; $ldap= $config->get_ldap_link(); - $ldap->cd ($config->current['CONFIG']); + $ldap->cd ($config->get_cfg_value("config")); $ldap->search("(&(objectClass=gosaLockEntry)(gosaObject=".base64_encode($object)."))", array("gosaUser")); - if (!preg_match("/Success/i", $ldap->error)){ - msg_dialog::display(_("LDAP error"), sprintf(_("Cannot get locking information from LDAP tree!")."

"._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), "", LDAP_SEARCH, ERROR_DIALOG)); return(""); } @@ -697,10 +763,10 @@ function get_multiple_locks($objects) /* Get LDAP link, check for presence of the lock entry */ $user= ""; $ldap= $config->get_ldap_link(); - $ldap->cd ($config->current['CONFIG']); + $ldap->cd ($config->get_cfg_value("config")); $ldap->search($filter, array("gosaUser","gosaObject")); - if (!preg_match("/Success/i", $ldap->error)){ - msg_dialog::display(_("LDAP error"), sprintf(_("Cannot get locking information from LDAP tree!")."

"._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), "", LDAP_SEARCH, ERROR_DIALOG)); return(""); } @@ -715,43 +781,100 @@ function get_multiple_locks($objects) /* \!brief This function searches the ldap database. - It search in $sub_base,*,$base for all objects matching the $filter. + It search in $sub_bases,*,$base for all objects matching the $filter. @param $filter String The ldap search filter @param $category String The ACL category the result objects belongs - @param $sub_base String The sub base we want to search for e.g. "ou=apps" + @param $sub_bases String The sub base we want to search for e.g. "ou=apps" @param $base String The ldap base from which we start the search @param $attributes Array The attributes we search for. @param $flags Long A set of Flags */ -function get_sub_list($filter, $category,$sub_base, $base= "", $attributes= array(), $flags= GL_SUBSEARCH) +function get_sub_list($filter, $category,$sub_deps, $base= "", $attributes= array(), $flags= GL_SUBSEARCH) { - global $config, $ui; + $departments = array(); + +# $start = microtime(TRUE); /* Get LDAP link */ $ldap= $config->get_ldap_link($flags & GL_SIZELIMIT); /* Set search base to configured base if $base is empty */ if ($base == ""){ - $ldap->cd ($config->current['BASE']); - } else { - $ldap->cd ($base); + $base = $config->current['BASE']; + } + $ldap->cd ($base); + + /* Ensure we have an array as department list */ + if(is_string($sub_deps)){ + $sub_deps = array($sub_deps); } - /* Remove , ("ou=1,ou=2.." => "ou=1") */ - $sub_base = preg_replace("/,.*$/","",$sub_base); + /* Remove ,.*$ ("ou=1,ou=2.." => "ou=1") */ + $sub_bases = array(); + foreach($sub_deps as $key => $sub_base){ + if(empty($sub_base)){ - /* Check if there is a sub department specified */ - if($sub_base == ""){ - return(get_list($filter, $category,$base,$attributes,$flags)); + /* Subsearch is activated and we got an empty sub_base. + * (This may be the case if you have empty people/group ous). + * Fall back to old get_list(). + * A log entry will be written. + */ + if($flags & GL_SUBSEARCH){ + $sub_bases = array(); + break; + }else{ + + /* Do NOT search within subtrees is requeste and the sub base is empty. + * Append all known departments that matches the base. + */ + $departments[$base] = $base; + } + }else{ + $sub_bases[$key] = preg_replace("/,.*$/","",$sub_base); + } + } + + /* If there is no sub_department specified, fall back to old method, get_list(). + */ + if(!count($sub_bases) && !count($departments)){ + + /* Log this fall back, it may be an unpredicted behaviour. + */ + if(!count($sub_bases) && !count($departments)){ + // log($action,$objecttype,$object,$changes_array = array(),$result = "") + new log("debug","all",__FILE__,$attributes, + sprintf("get_sub_list(): Falling back to get_list(), due to empty sub_bases parameter.". + " This may slow down GOsa. Search was: '%s'",$filter)); + } + $tmp = get_list($filter, $category,$base,$attributes,$flags); + return($tmp); } - /* Get all deparments matching the given sub_base */ - $departments = array(); - $ldap->search($sub_base,array("dn")); + /* Get all deparments matching the given sub_bases */ + $base_filter= ""; + foreach($sub_bases as $sub_base){ + $base_filter .= "(".$sub_base.")"; + } + $base_filter = "(&(objectClass=organizationalUnit)(|".$base_filter."))"; + $ldap->search($base_filter,array("dn")); while($attrs = $ldap->fetch()){ - $departments[$attrs['dn']] = $attrs['dn']; + foreach($sub_deps as $sub_dep){ + + /* Only add those departments that match the reuested list of departments. + * + * e.g. sub_deps = array("ou=servers,ou=systems,"); + * + * In this case we have search for "ou=servers" and we may have also fetched + * departments like this "ou=servers,ou=blafasel,..." + * Here we filter out those blafasel departments. + */ + if(preg_match("/".normalizePreg($sub_dep)."/",$attrs['dn'])){ + $departments[$attrs['dn']] = $attrs['dn']; + break; + } + } } $result= array(); @@ -771,11 +894,11 @@ function get_sub_list($filter, $category,$sub_base, $base= "", $attributes= arra if ($flags & GL_SUBSEARCH) { $ldap->search ($filter, $attributes); } else { - $ldap->ls ($filter,$base,$attributes); + $ldap->ls ($filter,$dep,$attributes); } /* Check for size limit exceeded messages for GUI feedback */ - if (preg_match("/size limit/i", $ldap->error)){ + if (preg_match("/size limit/i", $ldap->get_error())){ session::set('limit_exceeded', TRUE); $limit_exceeded = TRUE; } @@ -792,21 +915,28 @@ function get_sub_list($filter, $category,$sub_base, $base= "", $attributes= arra $attrs["dn"]= $dn; } - /* Sort in every value that fits the permissions */ - if (is_array($category)){ + /* Skip ACL checks if we are forced to skip those checks */ + if($flags & GL_NO_ACL_CHECK){ + $result[]= $attrs; + }else{ + + /* Sort in every value that fits the permissions */ + if (!is_array($category)){ + $category = array($category); + } foreach ($category as $o){ - if ($ui->get_category_permissions($dn, $o) != ""){ + if((preg_match("/\//",$o) && preg_match("/r/",$ui->get_permissions($dn,$o))) || + (!preg_match("/\//",$o) && preg_match("/r/",$ui->get_category_permissions($dn, $o)))){ $result[]= $attrs; break; } } - } else { - if ($ui->get_category_permissions($dn, $category) != ""){ - $result[]= $attrs; - } } } } +# if(microtime(TRUE) - $start > 0.1){ +# echo sprintf("
GET_SUB_LIST  %s .| %f  --- $base -----$filter ---- $flags
",__LINE__,microtime(TRUE) - $start); +# } return($result); } @@ -815,6 +945,8 @@ function get_list($filter, $category, $base= "", $attributes= array(), $flags= G { global $config, $ui; +# $start = microtime(TRUE); + /* Get LDAP link */ $ldap= $config->get_ldap_link($flags & GL_SIZELIMIT); @@ -833,7 +965,7 @@ function get_list($filter, $category, $base= "", $attributes= array(), $flags= G } /* Check for size limit exceeded messages for GUI feedback */ - if (preg_match("/size limit/i", $ldap->error)){ + if (preg_match("/size limit/i", $ldap->get_error())){ session::set('limit_exceeded', TRUE); } @@ -842,36 +974,37 @@ function get_list($filter, $category, $base= "", $attributes= array(), $flags= G $result= array(); while($attrs = $ldap->fetch()) { + $dn= $ldap->getDN(); - /* Sort in every value that fits the permissions */ - if (is_array($category)){ - foreach ($category as $o){ - if ($ui->get_category_permissions($dn, $o) != ""){ - if ($flags & GL_CONVERT){ - $attrs["dn"]= convert_department_dn($dn); - } else { - $attrs["dn"]= $dn; - } + /* Convert dn into a printable format */ + if ($flags & GL_CONVERT){ + $attrs["dn"]= convert_department_dn($dn); + } else { + $attrs["dn"]= $dn; + } - /* We found what we were looking for, break speeds things up */ + if($flags & GL_NO_ACL_CHECK){ + $result[]= $attrs; + }else{ + + /* Sort in every value that fits the permissions */ + if (!is_array($category)){ + $category = array($category); + } + foreach ($category as $o){ + if((preg_match("/\//",$o) && preg_match("/r/",$ui->get_permissions($dn,$o))) || + (!preg_match("/\//",$o) && preg_match("/r/",$ui->get_category_permissions($dn, $o)))){ $result[]= $attrs; + break; } } - } else { - if ($ui->get_category_permissions($dn, $category) != ""){ - if ($flags & GL_CONVERT){ - $attrs["dn"]= convert_department_dn($dn); - } else { - $attrs["dn"]= $dn; - } - - /* We found what we were looking for, break speeds things up */ - $result[]= $attrs; - } } } - + +# if(microtime(TRUE) - $start > 0.1){ +# echo sprintf("
GET_LIST %s .| %f  --- $base -----$filter ---- $flags
",__LINE__,microtime(TRUE) - $start); +# } return ($result); } @@ -916,7 +1049,7 @@ function eval_sizelimit() if (isset($_POST['set_size_action'])){ /* User wants new size limit? */ - if (is_id($_POST['new_limit']) && + if (tests::is_id($_POST['new_limit']) && isset($_POST['action']) && $_POST['action']=="newlimit"){ session::set('size_limit', validate($_POST['new_limit'])); @@ -981,27 +1114,27 @@ function &get_smarty() } -function convert_department_dn($dn) +function convert_department_dn($dn, $base = NULL) { - $dep= ""; + global $config; + + if($base == NULL){ + $base = $config->current['BASE']; + } /* Build a sub-directory style list of the tree level specified in $dn */ - foreach (split(',', $dn) as $rdn){ + $dn = preg_replace("/".normalizePreg($base)."$/i","",$dn); + if(empty($dn)) return("/"); - /* We're only interested in organizational units... */ - if (substr($rdn,0,3) == 'ou='){ - $dep= substr($rdn,3)."/$dep"; - } - /* ... and location objects */ - if (substr($rdn,0,2) == 'l='){ - $dep= substr($rdn,2)."/$dep"; - } + $dep= ""; + foreach (split(',', $dn) as $rdn){ + $dep = preg_replace("/^[^=]+=/","",$rdn)."/".$dep; } /* Return and remove accidently trailing slashes */ - return rtrim($dep, "/"); + return(trim($dep, "/")); } @@ -1017,7 +1150,11 @@ function get_ou($name) { global $config; - $map = array( "applicationou" => "ou=apps,", + $name= strtolower($name); + + $map = array( + "ogroupou" => "ou=groups,", + "applicationou" => "ou=apps,", "systemsou" => "ou=systems,", "serverou" => "ou=servers,ou=systems,", "terminalou" => "ou=terminals,ou=systems,", @@ -1025,6 +1162,8 @@ function get_ou($name) "printerou" => "ou=printers,ou=systems,", "phoneou" => "ou=phones,ou=systems,", "componentou" => "ou=netdevices,ou=systems,", + "winstations" => "ou=winstation,", + "blocklistou" => "ou=gofax,ou=systems,", "incomingou" => "ou=incoming,", "aclroleou" => "ou=aclroles,", @@ -1044,8 +1183,8 @@ function get_ou($name) "mimetypeou" => "ou=mime,"); /* Preset ou... */ - if (isset($config->current[$name])){ - $ou= $config->current[$name]; + if ($config->get_cfg_value($name, "_not_set_") != "_not_set_"){ + $ou= $config->get_cfg_value($name); } elseif (isset($map[$name])) { $ou = $map[$name]; return($ou); @@ -1057,10 +1196,17 @@ function get_ou($name) if ($ou != ""){ if (!preg_match('/^[^=]+=[^=]+/', $ou)){ - return @LDAP::convert("ou=$ou,"); + $ou = @LDAP::convert("ou=$ou"); } else { - return @LDAP::convert("$ou,"); + $ou = @LDAP::convert("$ou"); + } + + if(preg_match("/".normalizePreg($config->current['BASE'])."$/",$ou)){ + return($ou); + }else{ + return("$ou,"); } + } else { return ""; } @@ -1069,7 +1215,7 @@ function get_ou($name) function get_people_ou() { - return (get_ou("PEOPLE")); + return (get_ou("USERRDN")); } @@ -1101,45 +1247,14 @@ function get_base_from_people($dn) } -function is_phone_nr($nr) -{ - if ($nr == ""){ - return (TRUE); - } - - return preg_match ("/^[\/0-9 ()+*-]+$/", $nr); -} - - -function is_dns_name($str) -{ - return(preg_match("/^[a-z0-9\.\-]*$/i",$str)); -} - - -function is_url($url) +function strict_uid_mode() { - if ($url == ""){ - return (TRUE); - } - - return preg_match ("/^(http|https):\/\/((?:[a-zA-Z0-9_-]+\.?)+):?(\d*)/", $url); -} - + global $config; -function is_dn($dn) -{ - if ($dn == ""){ - return (TRUE); + if (isset($config)){ + return ($config->get_cfg_value("strict") == "true"); } - - return preg_match ("/^[a-z0-9 _-]+$/i", $dn); -} - - -function strict_uid_mode() -{ - return !(isset($config->current['STRICT']) && preg_match('/^(no|false)$/i', $config->current['STRICT'])); + return (TRUE); } @@ -1155,164 +1270,6 @@ function get_uid_regexp() } -function is_uid($uid) -{ - global $config; - - if ($uid == ""){ - return (TRUE); - } - - /* STRICT adds spaces and case insenstivity to the uid check. - This is dangerous and should not be used. */ - if (strict_uid_mode()){ - return preg_match ("/^[a-z0-9_-]+$/", $uid); - } else { - return preg_match ("/^[a-z0-9 _.-]+$/i", $uid); - } -} - - -function is_ip($ip) -{ - return preg_match("/^(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$/", $ip); -} - - -function is_mac($mac) -{ - return preg_match("/^[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]:[a-f0-9][a-f0-9]$/i", $mac); -} - - -/* Checks if the given ip address dosen't match - "is_ip" because there is also a sub net mask given */ -function is_ip_with_subnetmask($ip) -{ - /* Generate list of valid submasks */ - $res = array(); - for($e = 0 ; $e <= 32; $e++){ - $res[$e] = $e; - } - $i[0] =255; - $i[1] =255; - $i[2] =255; - $i[3] =255; - for($a= 3 ; $a >= 0 ; $a --){ - $c = 1; - while($i[$a] > 0 ){ - $str = $i[0].".".$i[1].".".$i[2].".".$i[3]; - $res[$str] = $str; - $i[$a] -=$c; - $c = 2*$c; - } - } - $res["0.0.0.0"] = "0.0.0.0"; - if(preg_match("/^(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)/", $ip)){ - $mask = preg_replace("/^(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.". - "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)/","",$ip); - - $mask = preg_replace("/^\//","",$mask); - if((in_array("$mask",$res)) && preg_match("/^[0-9\.]/",$mask)){ - return(TRUE); - } - } - return(FALSE); -} - - -/* Simple is domain check, it checks if the given string looks like "string(...).string" */ -function is_domain($str) -{ - return(preg_match("/^([a-z0-9i\-]*)\.[a-z0-9]*$/i",$str)); -} - - -function is_id($id) -{ - if ($id == ""){ - return (FALSE); - } - - return preg_match ("/^[0-9]+$/", $id); -} - - -function is_path($path) -{ - if ($path == ""){ - return (TRUE); - } - if (!preg_match('/^[a-z0-9%\/_.+-]+$/i', $path)){ - return (FALSE); - } - - return preg_match ("/\/.+$/", $path); -} - - -function is_email($address, $template= FALSE) -{ - if ($address == ""){ - return (TRUE); - } - if ($template){ - return preg_match ("/^[._a-z0-9%-]+@[_a-z0-9-]+(\.[a-z0-9-]+)(\.[a-z0-9-]+)*$/i", - $address); - } else { - return preg_match ("/^[._a-z0-9-]+@[_a-z0-9-]+(\.[a-z0-9i-]+)(\.[a-z0-9-]+)*$/i", - $address); - } -} - - -function print_red() -{ - trigger_error("Use of obsolete print_red"); - /* Check number of arguments */ - if (func_num_args() < 1){ - return; - } - - /* Get arguments, save string */ - $array = func_get_args(); - $string= $array[0]; - - /* Step through arguments */ - for ($i= 1; $i/', ' ', $string); - $addmsg= _("Please check your input and fix the error. Press 'OK' to close this message box."); - $addmsg = ""; - } - if(empty($addmsg)){ - $addmsg = _("Error"); - } - msg_dialog::display($addmsg, $string,ERROR_DIALOG); - return; - }else{ - return; - } - -} - - function gen_locked_message($user, $dn) { global $plug, $config; @@ -1367,7 +1324,7 @@ function gen_locked_message($user, $dn) } else { $smarty->assign ("action", _("Edit anyway")); } - $smarty->assign ("message", sprintf(_("You're going to edit the LDAP entry/entries '%s'"), "".$msg."", "")); + $smarty->assign ("message", sprintf(_("You're going to edit the LDAP entry/entries %s"), "".$msg."", "")); return ($smarty->fetch (get_template_path('islocked.tpl'))); } @@ -1400,41 +1357,6 @@ function get_printer_list() } -function show_errors($message) -{ - $complete= ""; - - /* Assemble the message array to a plain string */ - foreach ($message as $error){ - if ($complete == ""){ - $complete= $error; - } else { - $complete= "$error
$complete"; - } - } - - /* Fill ERROR variable with nice error dialog */ - msg_dialog::display(_("Error"), $complete, ERROR_DIALOG); -} - - -function show_ldap_error($message, $addon= "") -{ - if (!preg_match("/Success/i", $message)){ - if ($addon == ""){ - msg_dialog::display(_("LDAP error:"), $message, ERROR_DIALOG); - } else { - if(!preg_match("/No such object/i",$message)){ - msg_dialog::display(sprintf(_("LDAP error in plugin '%s':"),"".$addon.""),$message,ERROR_DIALOG); - } - } - return TRUE; - } else { - return FALSE; - } -} - - function rewrite($s) { global $REWRITE; @@ -1623,7 +1545,7 @@ function apply_filter() function back_to_main() { $string= '

'; + msgPool::backButton().'">

'; return ($string); } @@ -2063,34 +1985,32 @@ function progressbar($percentage,$width=100,$height=15,$showvalue=false) $progress = (int)(($percentage /100)*$width); - /* Abort printing out percentage, if divs are to small */ - - /* If theres a better solution for this, use it... */ - $str = " -
- -
+ $str = "\n
"; -
"; + $str.= "\n
"; + if(($height >10)&&($showvalue)){ + $str.= "\n "; + $str.= "\n ".$percentage."% "; + $str.= "\n "; + } - if(($height >10)&&($showvalue)){ - $str.= " - ".$percentage."% - "; - } - - $str.= "
"; + $str.= "\n
"; + $str.= "\n
"; + $str.= "\n
"; + $str.= "\n
"; - return($str); + return($str); } @@ -2184,29 +2104,6 @@ function get_MicroTimeDiff($start , $stop) } -/* Check if the given department name is valid */ -function is_department_name_reserved($name,$base) -{ - $reservedName = array("systems","apps","incomming","internal","accounts","fax","addressbook", - preg_replace("/ou=(.*),/","\\1",get_people_ou()), - preg_replace("/ou=(.*),/","\\1",get_groups_ou())); - $follwedNames['/ou=fai,ou=configs,ou=systems,/'] = array("fai","hooks","templates","scripts","disk","packages","variables","profiles"); - - /* Check if name is one of the reserved names */ - if(in_array_ics($name,$reservedName)) { - return(true); - } - - /* Check all follow combinations if name is in array && parent base == array_key, return false*/ - foreach($follwedNames as $key => $names){ - if((in_array_ics($name,$names)) && (preg_match($key,$base))){ - return(true); - } - } - return(false); -} - - function get_base_dir() { global $BASE_DIR; @@ -2295,10 +2192,10 @@ function get_base_from_hook($dn, $attrib) { global $config; - if (isset($config->current['BASE_HOOK'])){ + if ($config->get_cfg_value("base_hook") != ""){ /* Call hook script - if present */ - $command= $config->current['BASE_HOOK']; + $command= $config->get_cfg_value("base_hook"); if ($command != ""){ $command.= " '".LDAP::fix($dn)."' $attrib"; @@ -2308,18 +2205,18 @@ function get_base_from_hook($dn, $attrib) if (preg_match("/^[0-9]+$/", $output[0])){ return ($output[0]); } else { - msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base."), WARNING_DIALOG); - return ($config->current['UIDBASE']); + msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base!"), WARNING_DIALOG); + return ($config->get_cfg_value("uidbase")); } } else { - msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base."), WARNING_DIALOG); - return ($config->current['UIDBASE']); + msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base!"), WARNING_DIALOG); + return ($config->get_cfg_value("uidbase")); } } else { - msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base."), WARNING_DIALOG); - return ($config->current['UIDBASE']); + msg_dialog::display(_("Warning"), _("'base_hook' is not available. Using default base!"), WARNING_DIALOG); + return ($config->get_cfg_value("uidbase")); } } @@ -2337,7 +2234,7 @@ function check_schema($cfg,$rfc2307bis = FALSE) $messages= array(); /* Get objectclasses */ - $ldap = new LDAP($cfg['admin'],$cfg['password'],$cfg['connection'] ,FALSE,$cfg['tls']); + $ldap = new ldapMultiplexer(new LDAP($cfg['admin'],$cfg['password'],$cfg['connection'] ,FALSE,$cfg['tls'])); $objectclasses = $ldap->get_objectclasses(); if(count($objectclasses) == 0){ msg_dialog::display(_("LDAP warning"), _("Cannot get schema information from server. No schema check possible!"), WARNING_DIALOG); @@ -2416,17 +2313,17 @@ function check_schema($cfg,$rfc2307bis = FALSE) if(!isset($objectclasses[$name])){ $checks[$name]['STATUS'] = FALSE; if($value['IS_MUST_HAVE']){ - $checks[$name]['MSG'] = sprintf(_("The required objectClass '%s' is not present in your schema setup"),$class); + $checks[$name]['MSG'] = sprintf(_("Missing required object class '%s'!"),$class); }else{ - $checks[$name]['MSG'] = sprintf(_("The optional objectClass '%s' is not present in your schema setup"),$class); + $checks[$name]['MSG'] = sprintf(_("Missing optional object class '%s'!"),$class); } }elseif(!check_schema_version($objectclasses[$name],$value['REQUIRED_VERSION'])){ $checks[$name]['STATUS'] = FALSE; if($value['IS_MUST_HAVE']){ - $checks[$name]['MSG'] = sprintf(_("The required objectclass '%s' does not have version %s"), $class, $value['REQUIRED_VERSION']); + $checks[$name]['MSG'] = sprintf(_("Version mismatch for required object class '%s' (!=%s)!"), $class, $value['REQUIRED_VERSION']); }else{ - $checks[$name]['MSG'] = sprintf(_("The optional objectclass '%s' does not have version %s"), $class, $value['REQUIRED_VERSION']); + $checks[$name]['MSG'] = sprintf(_("Version mismatch for optional object class '%s' (!=%s)!"), $class, $value['REQUIRED_VERSION']); } }else{ $checks[$name]['STATUS'] = TRUE; @@ -2457,7 +2354,7 @@ function check_schema($cfg,$rfc2307bis = FALSE) } if(!$rfc2307bis && !isset($tmp['posixGroup']['STRUCTURAL'])){ $checks['posixGroup']['STATUS'] = FALSE; - $checks['posixGroup']['MSG'] = _("You have disabled the rfc2307bis option on the 'ldap setup' step, but your schema configuration do not support this option."); + $checks['posixGroup']['MSG'] = _("Your schema is configured to support the rfc2307bis group, but you have disabled this option on the 'ldap setup' step."); $checks['posixGroup']['INFO'] = _("The objectClass 'posixGroup' must be STRUCTURAL"); } } @@ -2478,6 +2375,7 @@ function get_languages($languages_in_own_language = FALSE,$strip_region_tag = FA "pl_PL" => "Polish", "sv_SE" => "Swedish", "zh_CN" => "Chinese", + "vi_VN" => "Vietnamese", "ru_RU" => "Russian"); $tmp2= array( @@ -2490,12 +2388,23 @@ function get_languages($languages_in_own_language = FALSE,$strip_region_tag = FA "pl_PL" => _("Polish"), "sv_SE" => _("Swedish"), "zh_CN" => _("Chinese"), + "vi_VN" => _("Vietnamese"), "ru_RU" => _("Russian")); $ret = array(); if($languages_in_own_language){ $old_lang = setlocale(LC_ALL, 0); + + /* If the locale wasn't correclty set before, there may be an incorrect + locale returned. Something like this: + C_CTYPE=de_DE.UTF-8;LC_NUMERIC=C;LC_TIME=de_DE.UTF-8;LC ... + Extract the locale name from this string and use it to restore old locale. + */ + if(preg_match("/LC_CTYPE/",$old_lang)){ + $old_lang = preg_replace("/^.*LC_CTYPE=([^;]*).*$/","\\1",$old_lang); + } + foreach($tmp as $key => $name){ $lang = $key.".UTF-8"; setlocale(LC_ALL, $lang); @@ -2534,49 +2443,7 @@ function get_post($name) } -/* Check if $ip1 and $ip2 represents a valid IP range - * returns TRUE in case of a valid range, FALSE in case of an error. - */ -function is_ip_range($ip1,$ip2) -{ - if(!is_ip($ip1) || !is_ip($ip2)){ - return(FALSE); - }else{ - $ar1 = split("\.",$ip1); - $var1 = $ar1[0] * (16777216) + $ar1[1] * (65536) + $ar1[2] * (256) + $ar1[3]; - - $ar2 = split("\.",$ip2); - $var2 = $ar2[0] * (16777216) + $ar2[1] * (65536) + $ar2[2] * (256) + $ar2[3]; - return($var1 < $var2); - } -} - - -/* Check if the specified IP address $address is inside the given network */ -function is_in_network($network, $netmask, $address) -{ - $nw= split('\.', $network); - $nm= split('\.', $netmask); - $ad= split('\.', $address); - - /* Generate inverted netmask */ - for ($i= 0; $i<4; $i++){ - $ni[$i]= 255-$nm[$i]; - $la[$i]= $nw[$i] | $ni[$i]; - } - - /* Transform to integer */ - $first= $nw[0] * (16777216) + $nw[1] * (65536) + $nw[2] * (256) + $nw[3]; - $curr= $ad[0] * (16777216) + $ad[1] * (65536) + $ad[2] * (256) + $ad[3]; - $last= $la[0] * (16777216) + $la[1] * (65536) + $la[2] * (256) + $la[3]; - - return ($first < $curr&& $last > $curr); -} - - -/* Return class name in correct case - * mailMethodkolab => mailMethodKolab ( k => K ) - */ +/* Return class name in correct case */ function get_correct_class_name($cls) { global $class_mapping; @@ -2603,8 +2470,8 @@ function change_password ($dn, $password, $mode=0, $hash= "") // Get all available encryption Methods // NON STATIC CALL :) - $tmp = new passwordMethod(session::get('config')); - $available = $tmp->get_available_methods(); + $methods = new passwordMethod(session::get('config')); + $available = $methods->get_available_methods(); // read current password entry for $dn, to detect the encryption Method $ldap = $config->get_ldap_link(); @@ -2631,11 +2498,12 @@ function change_password ($dn, $password, $mode=0, $hash= "") /* Extract used hash */ if ($hash == ""){ - $hash= strtolower($matches[1]); + $test = passwordMethod::get_method($attrs['userPassword'][0],$dn); + } else { + $test = new $available[$hash]($config,$dn); + $test->set_hash($hash); } - $test = new $available[$hash]($config); - } else { // User MD5 by default $hash= "md5"; @@ -2669,7 +2537,7 @@ function change_password ($dn, $password, $mode=0, $hash= "") $attrs= generate_smb_nt_hash($password); } - /* Readd ! if user was deactivated */ + /* Read ! if user was deactivated */ if($deactivated){ $newpass = preg_replace("/(^[^\}]+\})(.*$)/","\\1!\\2",$newpass); } @@ -2681,12 +2549,14 @@ function change_password ($dn, $password, $mode=0, $hash= "") new log("modify","users/passwordMethod",$dn,array_keys($attrs),$ldap->get_error()); - if ($ldap->error != 'Success') { - msg_dialog::display(_("LDAP error"), sprintf(_('Setting the password failed!').'

'._('LDAP server returned: %s'), "

".$ldap->get_error().""), ERROR_DIALOG); + if (!$ldap->success()) { + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $dn, LDAP_MOD, ERROR_DIALOG)); } else { /* Run backend method for change/create */ - $test->set_password($password); + if(!$test->set_password($password)){ + return(FALSE); + } /* Find postmodify entries for this class */ $command= $config->search("password", "POSTMODIFY",array('menu')); @@ -2705,6 +2575,7 @@ function change_password ($dn, $password, $mode=0, $hash= "") } } } + return(TRUE); } @@ -2712,37 +2583,44 @@ function change_password ($dn, $password, $mode=0, $hash= "") function generate_smb_nt_hash($password) { global $config; - $tmp= $config->data['MAIN']['SMBHASH']." ".escapeshellarg($password); - @DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__, $tmp, "Execute"); - exec($tmp, $ar); - flush(); - reset($ar); - $hash= current($ar); - if ($hash == "") { - msg_dialog::display(_("Configuration error"), _("Setting for SMBHASH in gosa.conf is incorrect! Cannot change Samba password."), ERROR_DIALOG); - } else { - list($lm,$nt)= split (":", trim($hash)); - - if ($config->current['SAMBAVERSION'] == 3) { - $attrs['sambaLMPassword']= $lm; - $attrs['sambaNTPassword']= $nt; - $attrs['sambaPwdLastSet']= date('U'); - $attrs['sambaBadPasswordCount']= "0"; - $attrs['sambaBadPasswordTime']= "0"; + # Try to use gosa-si? + if ($config->get_cfg_value("gosa_si") != ""){ + $res= gosaSupportDaemon::send("gosa_gen_smb_hash", "GOSA", array("password" => $password), TRUE); + if (isset($res['XML']['HASH'])){ + $hash= $res['XML']['HASH']; } else { - $attrs['lmPassword']= $lm; - $attrs['ntPassword']= $nt; - $attrs['pwdLastSet']= date('U'); + $hash= ""; } - return($attrs); + } else { + $tmp= $config->get_cfg_value('sambaHashHook')." ".escapeshellarg($password); + @DEBUG (DEBUG_LDAP, __LINE__, __FUNCTION__, __FILE__, $tmp, "Execute"); + + exec($tmp, $ar); + flush(); + reset($ar); + $hash= current($ar); + } + + if ($hash == "") { + msg_dialog::display(_("Configuration error"), _("Cannot generate samba hash!"), ERROR_DIALOG); + return (""); } -} + list($lm,$nt)= split (":", trim($hash)); -function crypt_single($string,$enc_type ) -{ - return( passwordMethod::crypt_single_str($string,$enc_type)); + if ($config->get_cfg_value("sambaversion") == 3) { + $attrs['sambaLMPassword']= $lm; + $attrs['sambaNTPassword']= $nt; + $attrs['sambaPwdLastSet']= date('U'); + $attrs['sambaBadPasswordCount']= "0"; + $attrs['sambaBadPasswordTime']= "0"; + } else { + $attrs['lmPassword']= $lm; + $attrs['ntPassword']= $nt; + $attrs['pwdLastSet']= date('U'); + } + return($attrs); } @@ -2754,12 +2632,8 @@ function getEntryCSN($dn) } /* Get attribute that we should use as serial number */ - if(isset($config->current['UNIQ_IDENTIFIER'])){ - $attr = $config->current['UNIQ_IDENTIFIER']; - }elseif(isset($config->data['MAIN']['UNIQ_IDENTIFIER'])){ - $attr = $config->data['MAIN']['UNIQ_IDENTIFIER']; - } - if(!empty($attr)){ + $attr= $config->get_cfg_value("modificationDetectionAttribute"); + if($attr != ""){ $ldap = $config->get_ldap_link(); $ldap->cat($dn,array($attr)); $csn = $ldap->fetch(); @@ -2771,659 +2645,187 @@ function getEntryCSN($dn) } -/* This function returns the offset for the default timezone. - * $stamp is used to detect summer or winter time. - * In case of PHP5, the integrated timezone functions are used. +/* Add a given objectClass to an attrs entry */ +function add_objectClass($classes, &$attrs) +{ + if (is_array($classes)){ + $list= $classes; + } else { + $list= array($classes); + } + + foreach ($list as $class){ + $attrs['objectClass'][]= $class; + } +} + + +/* Removes a given objectClass from the attrs entry */ +function remove_objectClass($classes, &$attrs) +{ + if (isset($attrs['objectClass'])){ + /* Array? */ + if (is_array($classes)){ + $list= $classes; + } else { + $list= array($classes); + } + + $tmp= array(); + foreach ($attrs['objectClass'] as $oc) { + foreach ($list as $class){ + if (strtolower($oc) != strtolower($class)){ + $tmp[]= $oc; + } + } + } + $attrs['objectClass']= $tmp; + } +} + +/*! \brief Initialize a file download with given content, name and data type. + * @param data String The content to send. + * @param name String The name of the file. + * @param type String The content identifier, default value is "application/octet-stream"; */ -function get_default_timezone($stamp = NULL) +function send_binary_content($data,$name,$type = "application/octet-stream") { - global $config; - $tz =""; + header("Expires: Mon, 26 Jul 1997 05:00:00 GMT"); + header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT"); + header("Cache-Control: no-cache"); + header("Pragma: no-cache"); + header("Cache-Control: post-check=0, pre-check=0"); + header("Content-type: ".$type.""); - /* Default return value if zone could not be detected */ - $zone = array("name" => "unconfigured", "value" => 0); + $HTTP_USER_AGENT = $_SERVER['HTTP_USER_AGENT']; - /* Use current timestamp if $stamp is not set */ - if($stamp === NULL){ - $stamp = time(); + /* Strip name if it is a complete path */ + if (preg_match ("/\//", $name)) { + $name= basename($name); + } + + /* force download dialog */ + if (preg_match('/MSIE 5.5/', $HTTP_USER_AGENT) || preg_match('/MSIE 6.0/', $HTTP_USER_AGENT)) { + header('Content-Disposition: filename="'.$name.'"'); + } else { + header('Content-Disposition: attachment; filename="'.$name.'"'); } - /* Is there a timezone configured in the gosa configuration (gosa.conf) */ - if(isset($config->current['TIMEZONE']) || isset($config->data['MAIN']['TIMEZONE'])){ + echo $data; + exit(); +} - /* Get zonename */ - if(isset($config->current['TIMEZONE'])){ - $tz = $config->current['TIMEZONE']; - }else{ - $tz = $config->data['MAIN']['TIMEZONE']; - } - - if(!@date_default_timezone_set($tz)){ - msg_dialog::display(_("Configuration error"), sprintf(_("The timezone setting '%s' in your gosa.conf is not valid. Cannot calculate correct timezone offest."), $tz), ERROR_DIALOG); - } - $tz_delta = date("Z", $stamp); - $tz_delta = $tz_delta / 3600 ; - return(array("name" => $tz, "value" => $tz_delta)); - - } - return($zone); -} - - -/* Return zone informations */ -function _get_tz_zones() -{ - $timezones = array( - 'Africa/Abidjan' => 0, - 'Africa/Accra' => 0, - 'Africa/Addis_Ababa' => 10800, - 'Africa/Algiers' => 3600, - 'Africa/Asmera' => 10800, - 'Africa/Bamako' => 0, - 'Africa/Bangui' => 3600, - 'Africa/Banjul' => 0, - 'Africa/Bissau' => 0, - 'Africa/Blantyre' => 7200, - 'Africa/Brazzaville' => 3600, - 'Africa/Bujumbura' => 7200, - 'Africa/Cairo' => 7200, - 'Africa/Casablanca' => 0, - 'Africa/Ceuta' => 3600, - 'Africa/Conakry' => 0, - 'Africa/Dakar' => 0, - 'Africa/Dar_es_Salaam' => 10800, - 'Africa/Djibouti' => 10800, - 'Africa/Douala' => 3600, - 'Africa/El_Aaiun' => 0, - 'Africa/Freetown' => 0, - 'Africa/Gaborone' => 7200, - 'Africa/Harare' => 7200, - 'Africa/Johannesburg' => 7200, - 'Africa/Kampala' => 10800, - 'Africa/Khartoum' => 10800, - 'Africa/Kigali' => 7200, - 'Africa/Kinshasa' => 3600, - 'Africa/Lagos' => 3600, - 'Africa/Libreville' => 3600, - 'Africa/Lome' => 0, - 'Africa/Luanda' => 3600, - 'Africa/Lubumbashi' => 7200, - 'Africa/Lusaka' => 7200, - 'Africa/Malabo' => 3600, - 'Africa/Maputo' => 7200, - 'Africa/Maseru' => 7200, - 'Africa/Mbabane' => 7200, - 'Africa/Mogadishu' => 10800, - 'Africa/Monrovia' => 0, - 'Africa/Nairobi' => 10800, - 'Africa/Ndjamena' => 3600, - 'Africa/Niamey' => 3600, - 'Africa/Nouakchott' => 0, - 'Africa/Ouagadougou' => 0, - 'Africa/Porto-Novo' => 3600, - 'Africa/Sao_Tome' => 0, - 'Africa/Timbuktu' => 0, - 'Africa/Tripoli' => 7200, - 'Africa/Tunis' => 3600, - 'Africa/Windhoek' => 3600, - 'America/Adak' => -36000, - 'America/Anchorage' => -32400, - 'America/Anguilla' => -14400, - 'America/Antigua' => -14400, - 'America/Araguaina' => -10800, - 'America/Argentina/Buenos_Aires' => 0, - 'America/Argentina/Catamarca' => 0, - 'America/Argentina/ComodRivadavia' => 0, - 'America/Argentina/Cordoba' => 0, - 'America/Argentina/Jujuy' => 0, - 'America/Argentina/La_Rioja' => 0, - 'America/Argentina/Mendoza' => 0, - 'America/Argentina/Rio_Gallegos' => 0, - 'America/Argentina/San_Juan' => 0, - 'America/Argentina/Tucuman' => 0, - 'America/Argentina/Ushuaia' => 0, - 'America/Aruba' => -14400, - 'America/Asuncion' => -14400, - 'America/Atikokan' => 0, - 'America/Atka' => -36000, - 'America/Bahia' => 0, - 'America/Barbados' => -14400, - 'America/Belem' => -10800, - 'America/Belize' => -21600, - 'America/Blanc-Sablon' => 0, - 'America/Boa_Vista' => -14400, - 'America/Bogota' => -18000, - 'America/Boise' => -25200, - 'America/Buenos_Aires' => -10800, - 'America/Cambridge_Bay' => -25200, - 'America/Campo_Grande' => 0, - 'America/Cancun' => -21600, - 'America/Caracas' => -14400, - 'America/Catamarca' => -10800, - 'America/Cayenne' => -10800, - 'America/Cayman' => -18000, - 'America/Chicago' => -21600, - 'America/Chihuahua' => -25200, - 'America/Coral_Harbour' => 0, - 'America/Cordoba' => -10800, - 'America/Costa_Rica' => -21600, - 'America/Cuiaba' => -14400, - 'America/Curacao' => -14400, - 'America/Danmarkshavn' => 0, - 'America/Dawson' => -28800, - 'America/Dawson_Creek' => -25200, - 'America/Denver' => -25200, - 'America/Detroit' => -18000, - 'America/Dominica' => -14400, - 'America/Edmonton' => -25200, - 'America/Eirunepe' => -18000, - 'America/El_Salvador' => -21600, - 'America/Ensenada' => -28800, - 'America/Fort_Wayne' => -18000, - 'America/Fortaleza' => -10800, - 'America/Glace_Bay' => -14400, - 'America/Godthab' => -10800, - 'America/Goose_Bay' => -14400, - 'America/Grand_Turk' => -18000, - 'America/Grenada' => -14400, - 'America/Guadeloupe' => -14400, - 'America/Guatemala' => -21600, - 'America/Guayaquil' => -18000, - 'America/Guyana' => -14400, - 'America/Halifax' => -14400, - 'America/Havana' => -18000, - 'America/Hermosillo' => -25200, - 'America/Indiana/Indianapolis' => -18000, - 'America/Indiana/Knox' => -18000, - 'America/Indiana/Marengo' => -18000, - 'America/Indiana/Petersburg' => 0, - 'America/Indiana/Vevay' => -18000, - 'America/Indiana/Vincennes' => 0, - 'America/Indianapolis' => -18000, - 'America/Inuvik' => -25200, - 'America/Iqaluit' => -18000, - 'America/Jamaica' => -18000, - 'America/Jujuy' => -10800, - 'America/Juneau' => -32400, - 'America/Kentucky/Louisville' => -18000, - 'America/Kentucky/Monticello' => -18000, - 'America/Knox_IN' => -18000, - 'America/La_Paz' => -14400, - 'America/Lima' => -18000, - 'America/Los_Angeles' => -28800, - 'America/Louisville' => -18000, - 'America/Maceio' => -10800, - 'America/Managua' => -21600, - 'America/Manaus' => -14400, - 'America/Martinique' => -14400, - 'America/Mazatlan' => -25200, - 'America/Mendoza' => -10800, - 'America/Menominee' => -21600, - 'America/Merida' => -21600, - 'America/Mexico_City' => -21600, - 'America/Miquelon' => -10800, - 'America/Moncton' => 0, - 'America/Monterrey' => -21600, - 'America/Montevideo' => -10800, - 'America/Montreal' => -18000, - 'America/Montserrat' => -14400, - 'America/Nassau' => -18000, - 'America/New_York' => -18000, - 'America/Nipigon' => -18000, - 'America/Nome' => -32400, - 'America/Noronha' => -7200, - 'America/North_Dakota/Center' => -21600, - 'America/North_Dakota/New_Salem' => 0, - 'America/Panama' => -18000, - 'America/Pangnirtung' => -18000, - 'America/Paramaribo' => -10800, - 'America/Phoenix' => -25200, - 'America/Port-au-Prince' => -18000, - 'America/Port_of_Spain' => -14400, - 'America/Porto_Acre' => -18000, - 'America/Porto_Velho' => -14400, - 'America/Puerto_Rico' => -14400, - 'America/Rainy_River' => -21600, - 'America/Rankin_Inlet' => -21600, - 'America/Recife' => -10800, - 'America/Regina' => -21600, - 'America/Rio_Branco' => -18000, - 'America/Rosario' => -10800, - 'America/Santiago' => -14400, - 'America/Santo_Domingo' => -14400, - 'America/Sao_Paulo' => -10800, - 'America/Scoresbysund' => -3600, - 'America/Shiprock' => -25200, - 'America/St_Johns' => -12600, - 'America/St_Kitts' => -14400, - 'America/St_Lucia' => -14400, - 'America/St_Thomas' => -14400, - 'America/St_Vincent' => -14400, - 'America/Swift_Current' => -21600, - 'America/Tegucigalpa' => -21600, - 'America/Thule' => -14400, - 'America/Thunder_Bay' => -18000, - 'America/Tijuana' => -28800, - 'America/Toronto' => 0, - 'America/Tortola' => -14400, - 'America/Vancouver' => -28800, - 'America/Virgin' => -14400, - 'America/Whitehorse' => -28800, - 'America/Winnipeg' => -21600, - 'America/Yakutat' => -32400, - 'America/Yellowknife' => -25200, - 'Antarctica/Casey' => 28800, - 'Antarctica/Davis' => 25200, - 'Antarctica/DumontDUrville' => 36000, - 'Antarctica/Mawson' => 21600, - 'Antarctica/McMurdo' => 43200, - 'Antarctica/Palmer' => -14400, - 'Antarctica/Rothera' => 0, - 'Antarctica/South_Pole' => 43200, - 'Antarctica/Syowa' => 10800, - 'Antarctica/VostokArctic/Longyearbyen' => 0, - 'Asia/Aden' => 10800, - 'Asia/Almaty' => 21600, - 'Asia/Amman' => 7200, - 'Asia/Anadyr' => 43200, - 'Asia/Aqtau' => 14400, - 'Asia/Aqtobe' => 18000, - 'Asia/Ashgabat' => 18000, - 'Asia/Ashkhabad' => 18000, - 'Asia/Baghdad' => 10800, - 'Asia/Bahrain' => 10800, - 'Asia/Baku' => 14400, - 'Asia/Bangkok' => 25200, - 'Asia/Beirut' => 7200, - 'Asia/Bishkek' => 18000, - 'Asia/Brunei' => 28800, - 'Asia/Calcutta' => 19800, - 'Asia/Choibalsan' => 32400, - 'Asia/Chongqing' => 28800, - 'Asia/Chungking' => 28800, - 'Asia/Colombo' => 21600, - 'Asia/Dacca' => 21600, - 'Asia/Damascus' => 7200, - 'Asia/Dhaka' => 21600, - 'Asia/Dili' => 32400, - 'Asia/Dubai' => 14400, - 'Asia/Dushanbe' => 18000, - 'Asia/Gaza' => 7200, - 'Asia/Harbin' => 28800, - 'Asia/Hong_Kong' => 28800, - 'Asia/Hovd' => 25200, - 'Asia/Irkutsk' => 28800, - 'Asia/Istanbul' => 7200, - 'Asia/Jakarta' => 25200, - 'Asia/Jayapura' => 32400, - 'Asia/Jerusalem' => 7200, - 'Asia/Kabul' => 16200, - 'Asia/Kamchatka' => 43200, - 'Asia/Karachi' => 18000, - 'Asia/Kashgar' => 28800, - 'Asia/Katmandu' => 20700, - 'Asia/Krasnoyarsk' => 25200, - 'Asia/Kuala_Lumpur' => 28800, - 'Asia/Kuching' => 28800, - 'Asia/Kuwait' => 10800, - 'Asia/Macao' => 28800, - 'Asia/Macau' => 0, - 'Asia/Magadan' => 39600, - 'Asia/Makassar' => 0, - 'Asia/Manila' => 28800, - 'Asia/Muscat' => 14400, - 'Asia/Nicosia' => 7200, - 'Asia/Novosibirsk' => 21600, - 'Asia/Omsk' => 21600, - 'Asia/Oral' => 0, - 'Asia/Phnom_Penh' => 25200, - 'Asia/Pontianak' => 25200, - 'Asia/Pyongyang' => 32400, - 'Asia/Qatar' => 10800, - 'Asia/Qyzylorda' => 0, - 'Asia/Rangoon' => 23400, - 'Asia/Riyadh' => 10800, - 'Asia/Saigon' => 25200, - 'Asia/Sakhalin' => 36000, - 'Asia/Samarkand' => 18000, - 'Asia/Seoul' => 32400, - 'Asia/Shanghai' => 28800, - 'Asia/Singapore' => 28800, - 'Asia/Taipei' => 28800, - 'Asia/Tashkent' => 18000, - 'Asia/Tbilisi' => 14400, - 'Asia/Tehran' => 12600, - 'Asia/Tel_Aviv' => 7200, - 'Asia/Thimbu' => 21600, - 'Asia/Thimphu' => 21600, - 'Asia/Tokyo' => 32400, - 'Asia/Ujung_Pandang' => 28800, - 'Asia/Ulaanbaatar' => 28800, - 'Asia/Ulan_Bator' => 28800, - 'Asia/Urumqi' => 28800, - 'Asia/Vientiane' => 25200, - 'Asia/Vladivostok' => 36000, - 'Asia/Yakutsk' => 32400, - 'Asia/Yekaterinburg' => 18000, - 'Asia/YerevanAtlantic/Azores' => 0, - 'Atlantic/Bermuda' => -14400, - 'Atlantic/Canary' => 0, - 'Atlantic/Cape_Verde' => -3600, - 'Atlantic/Faeroe' => 0, - 'Atlantic/Jan_Mayen' => 3600, - 'Atlantic/Madeira' => 0, - 'Atlantic/Reykjavik' => 0, - 'Atlantic/South_Georgia' => -7200, - 'Atlantic/St_Helena' => 0, - 'Atlantic/Stanley' => -14400, - 'Australia/ACT' => 36000, - 'Australia/Adelaide' => 34200, - 'Australia/Brisbane' => 36000, - 'Australia/Broken_Hill' => 34200, - 'Australia/Canberra' => 36000, - 'Australia/Currie' => 0, - 'Australia/Darwin' => 34200, - 'Australia/Hobart' => 36000, - 'Australia/LHI' => 37800, - 'Australia/Lindeman' => 36000, - 'Australia/Lord_Howe' => 37800, - 'Australia/Melbourne' => 36000, - 'Australia/NSW' => 36000, - 'Australia/North' => 34200, - 'Australia/Perth' => 28800, - 'Australia/Queensland' => 36000, - 'Australia/South' => 34200, - 'Australia/Sydney' => 36000, - 'Australia/Tasmania' => 36000, - 'Australia/Victoria' => 36000, - 'Australia/West' => 28800, - 'Australia/Yancowinna' => 34200, - 'Europe/Amsterdam' => 3600, - 'Europe/Andorra' => 3600, - 'Europe/Athens' => 7200, - 'Europe/Belfast' => 0, - 'Europe/Belgrade' => 3600, - 'Europe/Berlin' => 3600, - 'Europe/Bratislava' => 3600, - 'Europe/Brussels' => 3600, - 'Europe/Bucharest' => 7200, - 'Europe/Budapest' => 3600, - 'Europe/Chisinau' => 7200, - 'Europe/Copenhagen' => 3600, - 'Europe/Dublin' => 0, - 'Europe/Gibraltar' => 3600, - 'Europe/Guernsey' => 0, - 'Europe/Helsinki' => 7200, - 'Europe/Isle_of_Man' => 0, - 'Europe/Istanbul' => 7200, - 'Europe/Jersey' => 0, - 'Europe/Kaliningrad' => 7200, - 'Europe/Kiev' => 7200, - 'Europe/Lisbon' => 0, - 'Europe/Ljubljana' => 3600, - 'Europe/London' => 0, - 'Europe/Luxembourg' => 3600, - 'Europe/Madrid' => 3600, - 'Europe/Malta' => 3600, - 'Europe/Mariehamn' => 0, - 'Europe/Minsk' => 7200, - 'Europe/Monaco' => 3600, - 'Europe/Moscow' => 10800, - 'Europe/Nicosia' => 7200, - 'Europe/Oslo' => 3600, - 'Europe/Paris' => 3600, - 'Europe/Prague' => 3600, - 'Europe/Riga' => 7200, - 'Europe/Rome' => 3600, - 'Europe/Samara' => 14400, - 'Europe/San_Marino' => 3600, - 'Europe/Sarajevo' => 3600, - 'Europe/Simferopol' => 7200, - 'Europe/Skopje' => 3600, - 'Europe/Sofia' => 7200, - 'Europe/Stockholm' => 3600, - 'Europe/Tallinn' => 7200, - 'Europe/Tirane' => 3600, - 'Europe/Tiraspol' => 7200, - 'Europe/Uzhgorod' => 7200, - 'Europe/Vaduz' => 3600, - 'Europe/Vatican' => 3600, - 'Europe/Vienna' => 3600, - 'Europe/Vilnius' => 7200, - 'Europe/Volgograd' => 0, - 'Europe/Warsaw' => 3600, - 'Europe/Zagreb' => 3600, - 'Europe/Zaporozhye' => 7200, - 'Europe/Zurich' => 3600, - 'Indian/Antananarivo' => 10800, - 'Indian/Chagos' => 21600, - 'Indian/Christmas' => 25200, - 'Indian/Cocos' => 23400, - 'Indian/Comoro' => 10800, - 'Indian/Kerguelen' => 18000, - 'Indian/Mahe' => 14400, - 'Indian/Maldives' => 18000, - 'Indian/Mauritius' => 14400, - 'Indian/Mayotte' => 10800, - 'Indian/Reunion' => 14400, - 'Pacific/Apia' => -39600, - 'Pacific/Auckland' => 43200, - 'Pacific/Chatham' => 45900, - 'Pacific/Easter' => -21600, - 'Pacific/Efate' => 39600, - 'Pacific/Enderbury' => 46800, - 'Pacific/Fakaofo' => -36000, - 'Pacific/Fiji' => 43200, - 'Pacific/Funafuti' => 43200, - 'Pacific/Galapagos' => -21600, - 'Pacific/Gambier' => -32400, - 'Pacific/Guadalcanal' => 39600, - 'Pacific/Guam' => 36000, - 'Pacific/Honolulu' => -36000, - 'Pacific/Johnston' => -36000, - 'Pacific/Kiritimati' => 50400, - 'Pacific/Kosrae' => 39600, - 'Pacific/Kwajalein' => 43200, - 'Pacific/Majuro' => 43200, - 'Pacific/Marquesas' => -34200, - 'Pacific/Midway' => -39600, - 'Pacific/Nauru' => 43200, - 'Pacific/Niue' => -39600, - 'Pacific/Norfolk' => 41400, - 'Pacific/Noumea' => 39600, - 'Pacific/Pago_Pago' => -39600, - 'Pacific/Palau' => 32400, - 'Pacific/Pitcairn' => -28800, - 'Pacific/Ponape' => 39600, - 'Pacific/Port_Moresby' => 36000, - 'Pacific/Rarotonga' => -36000, - 'Pacific/Saipan' => 36000, - 'Pacific/Samoa' => -39600, - 'Pacific/Tahiti' => -36000, - 'Pacific/Tarawa' => 43200, - 'Pacific/Tongatapu' => 46800, - 'Pacific/Truk' => 36000, - 'Pacific/Wake' => 43200, - 'Pacific/Wallis' => 43200, - 'Pacific/Yap' => 36000 ); - - $dst_timezones = array ( - 'America/Adak' => 1, - 'America/Atka' => 1, - 'America/Anchorage' => 1, - 'America/Juneau' => 1, - 'America/Nome' => 1, - 'America/Yakutat' => 1, - 'America/Dawson' => 1, - 'America/Ensenada' => 1, - 'America/Los_Angeles' => 1, - 'America/Tijuana' => 1, - 'America/Vancouver' => 1, - 'America/Whitehorse' => 1, - 'America/Boise' => 1, - 'America/Cambridge_Bay' => 1, - 'America/Chihuahua' => 1, - 'America/Denver' => 1, - 'America/Edmonton' => 1, - 'America/Inuvik' => 1, - 'America/Mazatlan' => 1, - 'America/Shiprock' => 1, - 'America/Yellowknife' => 1, - 'America/Cancun' => 1, - 'America/Chicago' => 1, - 'America/Menominee' => 1, - 'America/Merida' => 1, - 'America/Monterrey' => 1, - 'America/North_Dakota/Center' => 1, - 'America/Rainy_River' => 1, - 'America/Rankin_Inlet' => 1, - 'America/Winnipeg' => 1, - 'Pacific/Easter' => 1, - 'America/Detroit' => 1, - 'America/Grand_Turk' => 1, - 'America/Havana' => 1, - 'America/Iqaluit' => 1, - 'America/Kentucky/Louisville' => 1, - 'America/Kentucky/Monticello' => 1, - 'America/Louisville' => 1, - 'America/Montreal' => 1, - 'America/Nassau' => 1, - 'America/New_York' => 1, - 'America/Nipigon' => 1, - 'America/Pangnirtung' => 1, - 'America/Thunder_Bay' => 1, - 'America/Asuncion' => 1, - 'America/Cuiaba' => 1, - 'America/Glace_Bay' => 1, - 'America/Goose_Bay' => 1, - 'America/Halifax' => 1, - 'America/Santiago' => 1, - 'Antarctica/Palmer' => 1, - 'Atlantic/Bermuda' => 1, - 'Atlantic/Stanley' => 1, - 'America/St_Johns' => 1, - 'America/Araguaina' => 1, - 'America/Fortaleza' => 1, - 'America/Godthab' => 1, - 'America/Maceio' => 1, - 'America/Miquelon' => 1, - 'America/Recife' => 1, - 'America/Sao_Paulo' => 1, - 'America/Scoresbysund' => 1, - 'Atlantic/Canary' => 1, - 'Atlantic/Faeroe' => 1, - 'Atlantic/Madeira' => 1, - 'Europe/Belfast' => 1, - 'Europe/Dublin' => 1, - 'Europe/Lisbon' => 1, - 'Europe/London' => 1, - 'Africa/Ceuta' => 1, - 'Africa/Windhoek' => 1, - 'Atlantic/Jan_Mayen' => 1, - 'Europe/Amsterdam' => 1, - 'Europe/Andorra' => 1, - 'Europe/Belgrade' => 1, - 'Europe/Berlin' => 1, - 'Europe/Bratislava' => 1, - 'Europe/Brussels' => 1, - 'Europe/Budapest' => 1, - 'Europe/Copenhagen' => 1, - 'Europe/Gibraltar' => 1, - 'Europe/Ljubljana' => 1, - 'Europe/Luxembourg' => 1, - 'Europe/Madrid' => 1, - 'Europe/Malta' => 1, - 'Europe/Monaco' => 1, - 'Europe/Oslo' => 1, - 'Europe/Paris' => 1, - 'Europe/Prague' => 1, - 'Europe/Rome' => 1, - 'Europe/San_Marino' => 1, - 'Europe/Sarajevo' => 1, - 'Europe/Skopje' => 1, - 'Europe/Stockholm' => 1, - 'Europe/Tirane' => 1, - 'Europe/Vaduz' => 1, - 'Europe/Vatican' => 1, - 'Europe/Vienna' => 1, - 'Europe/Warsaw' => 1, - 'Europe/Zagreb' => 1, - 'Europe/Zurich' => 1, - 'Africa/Cairo' => 1, - 'Asia/Amman' => 1, - 'Asia/Beirut' => 1, - 'Asia/Damascus' => 1, - 'Asia/Gaza' => 1, - 'Asia/Istanbul' => 1, - 'Asia/Jerusalem' => 1, - 'Asia/Nicosia' => 1, - 'Asia/Tel_Aviv' => 1, - 'Europe/Athens' => 1, - 'Europe/Bucharest' => 1, - 'Europe/Chisinau' => 1, - 'Europe/Helsinki' => 1, - 'Europe/Istanbul' => 1, - 'Europe/Kaliningrad' => 1, - 'Europe/Kiev' => 1, - 'Europe/Minsk' => 1, - 'Europe/Nicosia' => 1, - 'Europe/Riga' => 1, - 'Europe/Simferopol' => 1, - 'Europe/Sofia' => 1, - 'Europe/Tiraspol' => 1, - 'Europe/Uzhgorod' => 1, - 'Europe/Zaporozhye' => 1, - 'Asia/Baghdad' => 1, - 'Europe/Moscow' => 1, - 'Asia/Tehran' => 1, - 'Asia/Aqtau' => 1, - 'Asia/Baku' => 1, - 'Asia/Tbilisi' => 1, - 'Europe/Samara' => 1, - 'Asia/Aqtobe' => 1, - 'Asia/Bishkek' => 1, - 'Asia/Yekaterinburg' => 1, - 'Asia/Almaty' => 1, - 'Asia/Novosibirsk' => 1, - 'Asia/Omsk' => 1, - 'Asia/Krasnoyarsk' => 1, - 'Asia/Irkutsk' => 1, - 'Asia/Yakutsk' => 1, - 'Australia/Adelaide' => 1, - 'Australia/Broken_Hill' => 1, - 'Australia/South' => 1, - 'Australia/Yancowinna' => 1, - 'Asia/Sakhalin' => 1, - 'Asia/Vladivostok' => 1, - 'Australia/ACT' => 1, - 'Australia/Canberra' => 1, - 'Australia/Hobart' => 1, - 'Australia/Melbourne' => 1, - 'Australia/NSW' => 1, - 'Australia/Sydney' => 1, - 'Australia/Tasmania' => 1, - 'Australia/Victoria' => 1, - 'Australia/LHI' => 1, - 'Australia/Lord_Howe' => 1, - 'Asia/Magadan' => 1, - 'Antarctica/McMurdo' => 1, - 'Antarctica/South_Pole' => 1, - 'Asia/Anadyr' => 1, - 'Asia/Kamchatka' => 1, - 'Pacific/Auckland' => 1, - 'Pacific/Chatham' => 1, - ); - return(array("TIMEZONES" => $timezones, "DST_ZONES" => $dst_timezones)); -} - - -function display_error_page() + +function reverse_html_entities($str,$type = ENT_QUOTES , $charset = "UTF-8") { - $smarty= get_smarty(); - $smarty->display(get_template_path('headers.tpl')); - echo "".msg_dialog::get_dialogs().""; - exit(); + if(is_string($str)){ + return(htmlentities($str,$type,$charset)); + }elseif(is_array($str)){ + foreach($str as $name => $value){ + $str[$name] = reverse_html_entities($value,$type,$charset); + } + } + return($str); +} + + +/*! \brief Encode special string characters so we can use the string in \ + HTML output, without breaking quotes. + @param The String we want to encode. + @return The encoded String + */ +function xmlentities($str) +{ + if(is_string($str)){ + + static $asc2uni= array(); + if (!count($asc2uni)){ + for($i=128;$i<256;$i++){ + # $asc2uni[chr($i)] = "&#x".dechex($i).";"; + } + } + + $str = str_replace("&", "&", $str); + $str = str_replace("<", "<", $str); + $str = str_replace(">", ">", $str); + $str = str_replace("'", "'", $str); + $str = str_replace("\"", """, $str); + $str = str_replace("\r", "", $str); + $str = strtr($str,$asc2uni); + return $str; + }elseif(is_array($str)){ + foreach($str as $name => $value){ + $str[$name] = xmlentities($value); + } + } + return($str); +} + + +/*! \brief Updates all accessTo attributes from a given value to a new one. + For example if a host is renamed. + @param String $from The source accessTo name. + @param String $to The destination accessTo name. +*/ +function update_accessTo($from,$to) +{ + global $config; + $ldap = $config->get_ldap_link(); + $ldap->cd($config->current['BASE']); + $ldap->search("(&(objectClass=trustAccount)(accessTo=".$from."))",array("objectClass","accessTo")); + while($attrs = $ldap->fetch()){ + $new_attrs = array("accessTo" => array()); + $dn = $attrs['dn']; + for($i = 0 ; $i < $attrs['objectClass']['count']; $i++){ + $new_attrs['objectClass'][] = $attrs['objectClass'][$i]; + } + for($i = 0 ; $i < $attrs['accessTo']['count']; $i++){ + if($attrs['accessTo'][$i] == $from){ + if(!empty($to)){ + $new_attrs['accessTo'][] = $to; + } + }else{ + $new_attrs['accessTo'][] = $attrs['accessTo'][$i]; + } + } + $ldap->cd($dn); + $ldap->modify($new_attrs); + if (!$ldap->success()){ + msg_dialog::display(_("LDAP error"), msgPool::ldaperror($ldap->get_error(), $dn, LDAP_MOD, "update_accessTo($from,$to)")); + } + new log("modify","update_accessTo($from,$to)",$dn,array_keys($new_attrs),$ldap->get_error()); + } +} + + +function get_random_char () { + $randno = rand (0, 63); + if ($randno < 12) { + return (chr ($randno + 46)); // Digits, '/' and '.' + } else if ($randno < 38) { + return (chr ($randno + 53)); // Uppercase + } else { + return (chr ($randno + 59)); // Lowercase + } } + +function cred_encrypt($input, $password) { + + $size = mcrypt_get_iv_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); + $iv = mcrypt_create_iv($size, MCRYPT_DEV_RANDOM); + + return bin2hex(mcrypt_encrypt(MCRYPT_RIJNDAEL_128, $password, $input, MCRYPT_MODE_ECB, $iv)); + +} + +function cred_decrypt($input,$password) { + $size = mcrypt_get_iv_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); + $iv = mcrypt_create_iv($size, MCRYPT_DEV_RANDOM); + + return mcrypt_decrypt(MCRYPT_RIJNDAEL_128, $password, pack("H*", $input), MCRYPT_MODE_ECB, $iv); +} + + // vim:tabstop=2:expandtab:shiftwidth=2:filetype=php:syntax:ruler: ?>