3846 lines
118 KiB
PHP
3846 lines
118 KiB
PHP
<?php
|
|
// $Header: /cvsroot/phpldapadmin/phpldapadmin/functions.php,v 1.252 2005/04/15 13:16:58 wurley Exp $
|
|
|
|
/**
|
|
* A collection of functions used throughout phpLDAPadmin.
|
|
* @author The phpLDAPadmin development team
|
|
* @package phpLDAPadmin
|
|
*
|
|
* @todo move functions that are only used by one script into said script (if any)
|
|
*/
|
|
|
|
/**
|
|
* Determines if an attribute's value can contain multiple lines. Attributes that fall
|
|
* in this multi-line category may be configured in config.php. Hence, this function
|
|
* accesses the global variable $multi_line_attributes;
|
|
*
|
|
* Usage example:
|
|
* <code>
|
|
* if( is_muli_line_attr( "postalAddress" ) )
|
|
* echo "<textarea name=\"postalAddress\"></textarea>";
|
|
* else
|
|
* echo "<input name=\"postalAddress\" type=\"text\">";
|
|
* </code>
|
|
*
|
|
* @param string $attr_name The name of the attribute of interestd (case insensivite)
|
|
* @param string $val (optional) The current value of the attribute (speeds up the
|
|
* process by searching for carriage returns already in the attribute value)
|
|
* @param int $server_id (optional) The ID of the server of interest. If specified,
|
|
* is_multi_line_attr() will read the schema from the server to determine if
|
|
* the attr is multi-line capable. (note that schema reads can be expensive,
|
|
* but that impact is lessened due to PLA's new caching mechanism)
|
|
* @return bool
|
|
*/
|
|
function is_multi_line_attr( $attr_name, $val=null, $server_id=null )
|
|
{
|
|
// First, check the optional val param for a \n or a \r
|
|
if( null != $val &&
|
|
( false !== strpos( $val, "\n" ) ||
|
|
false !== strpos( $val, "\r" ) ) )
|
|
return true;
|
|
|
|
// Next, compare strictly by name first
|
|
global $multi_line_attributes;
|
|
if( isset( $multi_line_attributes ) && is_array( $multi_line_attributes ) )
|
|
foreach( $multi_line_attributes as $multi_line_attr_name )
|
|
if( 0 == strcasecmp( $multi_line_attr_name, $attr_name ) )
|
|
return true;
|
|
|
|
// If unfound, compare by syntax OID
|
|
if( null !== $server_id ) {
|
|
$ldapserver = new LDAPServer($server_id);
|
|
global $multi_line_syntax_oids;
|
|
if( isset( $multi_line_syntax_oids ) && is_array( $multi_line_syntax_oids ) ) {
|
|
$schema_attr = get_schema_attribute( $ldapserver, $attr_name );
|
|
if( ! $schema_attr )
|
|
return false;
|
|
$syntax_oid = $schema_attr->getSyntaxOID();
|
|
if( ! $syntax_oid )
|
|
return false;
|
|
foreach( $multi_line_syntax_oids as $multi_line_syntax_oid )
|
|
if( $multi_line_syntax_oid == $syntax_oid )
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
/**
|
|
* Fetches the user setting for $search_deref from config.php. The returned value
|
|
* will be one of the four LDAP_DEREF_* constancts defined by the PHP LDAP API. If
|
|
* the user has failed to configure this setting or configured an inappropriate
|
|
* value, the constant DEFAULT_SEARCH_DEREF_SETTING is returned.
|
|
*
|
|
* @see DEFAULT_SEARCH_DEREF_SETTING
|
|
* @see is_valid_deref_setting()
|
|
* @return int
|
|
*/
|
|
function get_search_deref_setting()
|
|
{
|
|
global $search_deref;
|
|
if( ! isset( $search_deref ) || ! is_valid_deref_setting( $search_deref ) )
|
|
return DEFAULT_SEARCH_DEREF_SETTING;
|
|
else
|
|
return $search_deref;
|
|
}
|
|
|
|
/**
|
|
* Fetches the user setting for $tree_deref from config.php. The returned value
|
|
* will be one of the four LDAP_DEREF_* constancts defined by the PHP LDAP API. If
|
|
* the user has failed to configure this setting or configured an inappropriate
|
|
* value, the constant DEFAULT_TREE_DEREF_SETTING is returned.
|
|
*
|
|
* @see DEFAULT_TREE_DEREF_SETTING
|
|
* @see is_valid_deref_setting()
|
|
* @return int
|
|
*/
|
|
function get_tree_deref_setting()
|
|
{
|
|
global $tree_deref;
|
|
if( ! isset( $tree_deref ) || ! is_valid_deref_setting( $tree_deref ) )
|
|
return DEFAULT_TREE_DEREF_SETTING;
|
|
else
|
|
return $tree_deref;
|
|
}
|
|
|
|
/**
|
|
* Fetches the user setting for $export_deref from config.php. The returned value
|
|
* will be one of the four LDAP_DEREF_* constancts defined by the PHP LDAP API. If
|
|
* the user has failed to configure this setting or configured an inappropriate
|
|
* value, the constant DEFAULT_EXPORT_DEREF_SETTING is returned.
|
|
*
|
|
* @see DEFAULT_EXPORT_DEREF_SETTING
|
|
* @see is_valid_deref_setting()
|
|
* @return int
|
|
*/
|
|
function get_export_deref_setting()
|
|
{
|
|
global $export_deref;
|
|
if( ! isset( $export_deref ) || ! is_valid_deref_setting( $export_deref ) )
|
|
return DEFAULT_EXPORT_DEREF_SETTING;
|
|
else
|
|
return $export_deref;
|
|
}
|
|
|
|
/**
|
|
* Fetches the user setting for $view_deref from config.php. The returned value
|
|
* will be one of the four LDAP_DEREF_* constancts defined by the PHP LDAP API. If
|
|
* the user has failed to configure this setting or configured an inappropriate
|
|
* value, the constant DEFAULT_VIEW_DEREF_SETTING is returned.
|
|
*
|
|
* @see DEFAULT_VIEW_DEREF_SETTING
|
|
* @see is_valid_deref_setting()
|
|
* @return int
|
|
*/
|
|
function get_view_deref_setting()
|
|
{
|
|
global $view_deref;
|
|
if( ! isset( $view_deref ) || ! is_valid_deref_setting( $view_deref ) )
|
|
return DEFAULT_VIEW_DEREF_SETTING;
|
|
else
|
|
return $view_deref;
|
|
}
|
|
|
|
/**
|
|
* Checks the user-configured parameter for sanity. For the various *_deref settings, users
|
|
* may only use one of LDAP_DEREF_NEVER, LDAP_DEREF_SEARCHING, LDAP_DEREF_FINDING, or
|
|
* LDAP_DEREF_ALWAYS. This function can be used to conveniently enforce this.
|
|
*
|
|
* @param int $deref_setting The deref setting to validate.
|
|
* @return bool
|
|
*/
|
|
function is_valid_deref_setting( $deref_setting )
|
|
{
|
|
if( $deref_setting == LDAP_DEREF_NEVER ||
|
|
$deref_setting == LDAP_DEREF_SEARCHING ||
|
|
$deref_setting == LDAP_DEREF_FINDING ||
|
|
$deref_setting == LDAP_DEREF_ALWAYS )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Fetches whether phpLDAPadmin has been configured to redirect anonymously bound users
|
|
* to a search form with no tree displayed.
|
|
*
|
|
* This is configured in config.php thus:
|
|
* <code>
|
|
* $anonymous_bind_redirect_no_tree = true;
|
|
* </code>
|
|
* @return bool
|
|
*/
|
|
function anon_bind_tree_disabled()
|
|
{
|
|
global $anonymous_bind_redirect_no_tree;
|
|
if( isset( $anonymous_bind_redirect_no_tree ) && true == $anonymous_bind_redirect_no_tree )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Fetches whether phpLDAPadmin has been configured to display configuration
|
|
* management links (report bug, request feature, etc)
|
|
* @return bool
|
|
*/
|
|
function hide_configuration_management()
|
|
{
|
|
global $hide_configuration_management;
|
|
if( isset( $hide_configuration_management ) &&
|
|
$hide_configuration_management == true )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Fetches whether the user has configured phpLDAPadmin to obfuscate passwords
|
|
* with "*********" when displaying them.
|
|
*
|
|
* This is configured in config.php thus:
|
|
* <code>
|
|
* $obfuscate_password_display = true;
|
|
* </code>
|
|
* @return bool
|
|
*/
|
|
function obfuscate_password_display()
|
|
{
|
|
global $obfuscate_password_display;
|
|
if( isset( $obfuscate_password_display ) && true == $obfuscate_password_display )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Returns an HTML-beautified version of a DN.
|
|
* Internally, this function makes use of pla_explode_dn() to break the
|
|
* the DN into its components. It then glues them back together with
|
|
* "pretty" HTML. The returned HTML is NOT to be used as a real DN, but
|
|
* simply displayed.
|
|
*
|
|
* @param string $dn The DN to pretty-print.
|
|
* @return string
|
|
*/
|
|
function pretty_print_dn( $dn )
|
|
{
|
|
$dn = pla_explode_dn( $dn );
|
|
foreach( $dn as $i => $element ) {
|
|
$element = htmlspecialchars( $element );
|
|
$element = explode( '=', $element, 2 );
|
|
$element = implode( '<span style="color: blue; font-family: courier; font-weight: bold">=</span>', $element );
|
|
$dn[$i] = $element;
|
|
}
|
|
$dn = implode( '<span style="color:red; font-family:courier; font-weight: bold;">,</span>', $dn );
|
|
|
|
return $dn;
|
|
}
|
|
|
|
/**
|
|
* Returns true if the attribute specified is required to take as input a DN.
|
|
* Some examples include 'distinguishedName', 'member' and 'uniqueMember'.
|
|
* @param int $server_id The ID of the server of interest
|
|
* (required since this operation demands a schema lookup)
|
|
* @param string $attr_name The name of the attribute of interest (case insensitive)
|
|
* @return bool
|
|
*/
|
|
function is_dn_attr( $ldapserver, $attr_name ) {
|
|
// Simple test first
|
|
$dn_attrs = array( "aliasedObjectName" );
|
|
foreach( $dn_attrs as $dn_attr )
|
|
if( 0 == strcasecmp( $attr_name, $dn_attr ) )
|
|
return true;
|
|
|
|
// Now look at the schema OID
|
|
$attr_schema = get_schema_attribute( $ldapserver, $attr_name );
|
|
if( ! $attr_schema )
|
|
return false;
|
|
|
|
$syntax_oid = $attr_schema->getSyntaxOID();
|
|
if( '1.3.6.1.4.1.1466.115.121.1.12' == $syntax_oid )
|
|
return true;
|
|
if( '1.3.6.1.4.1.1466.115.121.1.34' == $syntax_oid )
|
|
return true;
|
|
|
|
$syntaxes = get_schema_syntaxes( $ldapserver );
|
|
if( ! isset( $syntaxes[ $syntax_oid ] ) )
|
|
return false;
|
|
|
|
$syntax_desc = $syntaxes[ $syntax_oid ]->getDescription();
|
|
if( false !== strpos( strtolower($syntax_desc), 'distinguished name' ) )
|
|
return true;
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Given a string, this function returns true if the string has the format
|
|
* of a DN (ie, looks like "cn=Foo,dc=example,dc=com"). Returns false otherwise.
|
|
* The purpose of this function is so that developers can examine a string and
|
|
* know if it looks like a DN, and draw a hyperlink as needed.
|
|
*
|
|
* (See unit_test.php for test cases)
|
|
*
|
|
* @param string $attr The attribute to examine for "DNness"
|
|
* @see unit_test.php
|
|
* @return bool
|
|
*/
|
|
function is_dn_string( $str )
|
|
{
|
|
// Try to break the string into its component parts if it can be done
|
|
// ie, "uid=Manager" "dc=example" and "dc=com"
|
|
$parts = pla_explode_dn( $str );
|
|
if( ! is_array( $parts ) )
|
|
return false;
|
|
if( 0 == count( $parts ) )
|
|
return false;
|
|
|
|
// Foreach of the "parts", look for an "=" character,
|
|
// and make sure neither the left nor the right is empty
|
|
foreach( $parts as $part ) {
|
|
if( false === strpos( $part, "=" ) )
|
|
return false;
|
|
$sub_parts = explode( "=", $part, 2 );
|
|
$left = $sub_parts[0];
|
|
$right = $sub_parts[1];
|
|
if( 0 == strlen( trim( $left ) ) || 0 == strlen( trim( $right ) ) )
|
|
return false;
|
|
if( false !== strpos( $left, '#' ) )
|
|
return false;
|
|
}
|
|
|
|
// We survived the above rigor. This is a bonified DN string.
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Get whether a string looks like an email address (user@example.com).
|
|
*
|
|
* @param string $str The string to analyze.
|
|
* @return bool Returns true if the specified string looks like
|
|
* an email address or false otherwise.
|
|
*/
|
|
function is_mail_string( $str )
|
|
{
|
|
$mail_regex = "/^[_A-Za-z0-9-]+(\\.[_A-Za-z0-9-]+)*@[A-Za-z0-9-]+(\\.[A-Za-z0-9-]+)*$/";
|
|
if( preg_match( $mail_regex, $str ) )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Get whether a string looks like a web URL (http://www.example.com/)
|
|
*
|
|
* @param string $str The string to analyze.
|
|
* @return bool Returns true if the specified string looks like
|
|
* a web URL or false otherwise.
|
|
*/
|
|
function is_url_string( $str )
|
|
{
|
|
$url_regex = '/(ftp|https?):\/\/+[\w\.\-\/\?\=\&]*\w+/';
|
|
if( preg_match( $url_regex, $str ) )
|
|
return true;
|
|
else
|
|
return false;
|
|
|
|
}
|
|
|
|
/**
|
|
* Utility wrapper for setting cookies, which takes into consideration
|
|
* phpLDAPadmin configuration values. On success, true is returned. On
|
|
* failure, false is returned.
|
|
*
|
|
* @param string $name The name of the cookie to set.
|
|
* @param string $val The value of the cookie to set.
|
|
* @param int $expire (optional) The duration in seconds of this cookie. If unspecified, $cookie_time
|
|
* is used from config.php
|
|
* @param string $dir (optional) The directory value of this cookie (see php.net/setcookie)
|
|
*
|
|
* @see setcookie
|
|
* @return bool
|
|
*/
|
|
function pla_set_cookie( $name, $val, $expire=null, $dir=null )
|
|
{
|
|
if( $expire == null ) {
|
|
global $cookie_time;
|
|
if( ! isset( $cookie_time ) )
|
|
$cookie_time = 0;
|
|
$expire = $cookie_time == 0 ? null : time() + $cookie_time;
|
|
}
|
|
|
|
if( $dir == null ) {
|
|
$dir = dirname( $_SERVER['PHP_SELF'] );
|
|
}
|
|
|
|
if( @setcookie( $name, $val, $expire, $dir ) ) {
|
|
$_COOKIE[ $name ] = $val;
|
|
return true;
|
|
} else {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Responsible for setting two cookies/session-vars to indicate that a user has logged in,
|
|
* one for the logged in DN and one for the logged in password.
|
|
*
|
|
* This function is only used if 'auth_type' is set to 'cookie' or 'session'. The values
|
|
* written have the name "pla_login_dn_X" and "pla_login_pass_X" where X is the
|
|
* ID of the server to which the user is attempting login.
|
|
*
|
|
* Note that as with all cookie/session operations this function must be called BEFORE
|
|
* any output is sent to the browser.
|
|
*
|
|
* On success, true is returned. On failure, false is returned.
|
|
*
|
|
* @param object $ldapserver The LDAPServer object of the server which the user hsa logged in.
|
|
* @param string $dn The DN with which the user has logged in.
|
|
* @param string $password The password of the user logged in.
|
|
* @param bool $anon_bind Indicates that this is an anonymous bind such that
|
|
* a password of "0" is stored.
|
|
* @return bool
|
|
* @see unset_login_dn
|
|
*/
|
|
function set_login_dn( $ldapserver, $dn, $password, $anon_bind )
|
|
{
|
|
if (! $ldapserver->auth_type)
|
|
return false;
|
|
|
|
switch( $ldapserver->auth_type )
|
|
{
|
|
case 'cookie':
|
|
$cookie_dn_name = sprintf("pla_login_dn_%s",$ldapserver->server_id);
|
|
$cookie_pass_name = sprintf("pla_login_pass_%s",$ldapserver->server_id);
|
|
|
|
// we set the cookie password to 0 for anonymous binds.
|
|
if( $anon_bind ) {
|
|
$dn = 'anonymous';
|
|
$password = '0';
|
|
}
|
|
|
|
$res1 = pla_set_cookie( $cookie_dn_name, pla_blowfish_encrypt( $dn ) );
|
|
$res2 = pla_set_cookie( $cookie_pass_name, pla_blowfish_encrypt( $password ) );
|
|
if( $res1 && $res2 )
|
|
return true;
|
|
else
|
|
return false;
|
|
break;
|
|
|
|
case 'session':
|
|
$sess_var_dn_name = sprintf("pla_login_dn_%s",$ldapserver->server_id);
|
|
$sess_var_pass_name = sprintf("pla_login_pass_%s",$ldapserver->server_id);
|
|
|
|
// we set the cookie password to 0 for anonymous binds.
|
|
if( $anon_bind ) {
|
|
$dn = 'anonymous';
|
|
$password = '0';
|
|
}
|
|
|
|
$_SESSION[ $sess_var_dn_name ] = pla_blowfish_encrypt( $dn );
|
|
$_SESSION[ $sess_var_pass_name ] = pla_blowfish_encrypt ( $password );
|
|
return true;
|
|
break;
|
|
default:
|
|
global $lang;
|
|
pla_error( sprintf( $lang['unknown_auth_type'], htmlspecialchars( $ldapserver->auth_type ) ) );
|
|
break;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Log a user out of the LDAP server.
|
|
*
|
|
* Removes the cookies/session-vars set by set_login_dn()
|
|
* after a user logs out using "auth_type" of "session" or "cookie".
|
|
* Returns true on success, false on failure.
|
|
*
|
|
* @param object $ldapserver The LDAPServer object of the server which the user hsa logged in.
|
|
* @return bool True on success, false on failure.
|
|
* @see set_login_dn
|
|
*/
|
|
function unset_login_dn( $ldapserver )
|
|
{
|
|
if (! $ldapserver->auth_type)
|
|
return false;
|
|
|
|
switch( $ldapserver->auth_type )
|
|
{
|
|
case 'cookie':
|
|
$logged_in_dn = get_logged_in_dn( $ldapserver );
|
|
if( ! $logged_in_dn )
|
|
return false;
|
|
|
|
$logged_in_pass = get_logged_in_pass( $ldapserver );
|
|
$anon_bind = $logged_in_dn == 'anonymous' ? true : false;
|
|
|
|
// set cookie with expire time already passed to erase cookie from client
|
|
$expire = time()-3600;
|
|
$cookie_dn_name = sprintf("pla_login_dn_%s",$ldapserver->server_id);
|
|
$cookie_pass_name = sprintf("pla_login_pass_%s",$ldapserver->server_id);
|
|
|
|
if( $anon_bind ) {
|
|
$res1 = pla_set_cookie( $cookie_dn_name, 'anonymous', $expire );
|
|
$res2 = pla_set_cookie( $cookie_pass_name, '0', $expire );
|
|
} else {
|
|
$res1 = pla_set_cookie( $cookie_dn_name, pla_blowfish_encrypt( $logged_in_dn ), $expire );
|
|
$res2 = pla_set_cookie( $cookie_pass_name, pla_blowfish_encrypt( $logged_in_pass ), $expire );
|
|
}
|
|
|
|
# Need to unset the cookies too, since they are still set if further processing occurs (eg: Timeout)
|
|
unset($_COOKIE[$cookie_dn_name]);
|
|
unset($_COOKIE[$cookie_pass_name]);
|
|
|
|
if( ! $res1 || ! $res2 )
|
|
return false;
|
|
else
|
|
return true;
|
|
break;
|
|
|
|
case 'session':
|
|
// unset session variables
|
|
$session_var_dn_name = sprintf("pla_login_dn_%s",$ldapserver->server_id);
|
|
$session_var_pass_name = sprintf("pla_login_pass_%s",$ldapserver->server_id);
|
|
|
|
if( array_key_exists( $session_var_dn_name, $_SESSION ) )
|
|
unset( $_SESSION[ $session_var_dn_name ] );
|
|
|
|
if( array_key_exists( $session_var_pass_name, $_SESSION ) )
|
|
unset( $_SESSION[ "$session_var_pass_name" ] );
|
|
|
|
session_write_close();
|
|
return true;
|
|
break;
|
|
|
|
default:
|
|
global $lang;
|
|
pla_error( sprintf( $lang['unknown_auth_type'], htmlspecialchars( $auth_type ) ) );
|
|
break;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get a customized file for a server
|
|
* We don't need any caching, because it's done by PHP
|
|
*
|
|
* @param int $server_id The ID of the server
|
|
* @param string $filename The requested filename
|
|
*
|
|
* @return string The customized filename, if exists, or the standard one
|
|
*/
|
|
function get_custom_file( $server_id, $filename )
|
|
{
|
|
global $servers;
|
|
|
|
if( ! check_server_id( $server_id ) )
|
|
return $filename;
|
|
|
|
if( isset( $servers[ $server_id ]['custom_pages_prefix'] ) ) {
|
|
$custom = $servers[ $server_id ][ 'custom_pages_prefix' ];
|
|
if( is_file( realpath( $custom . $filename ) ) )
|
|
return ( $custom . $filename );
|
|
}
|
|
|
|
return $filename;
|
|
}
|
|
|
|
/**
|
|
* Call a customized function
|
|
*
|
|
* @param int $server_id The ID of the server
|
|
* @param string $filename The requested function
|
|
*
|
|
* @return any The result of the called function
|
|
*/
|
|
function call_custom_function( $server_id, $function )
|
|
{
|
|
global $servers;
|
|
|
|
if( ! check_server_id( $server_id ) )
|
|
return $function;
|
|
|
|
if( isset( $servers[$server_id]['custom_pages_prefix'] ) ) {
|
|
$custom = $servers[$server_id]['custom_pages_prefix'];
|
|
if( function_exists( $custom . $function ) )
|
|
return call_user_func ( $custom . $function );
|
|
}
|
|
return call_user_func( $function );
|
|
}
|
|
|
|
/**
|
|
* Compares 2 DNs. If they are equivelant, returns 0, otherwise,
|
|
* returns their sorting order (similar to strcmp()):
|
|
* Returns < 0 if dn1 is less than dn2.
|
|
* Returns > 0 if dn1 is greater than dn2.
|
|
*
|
|
* The comparison is performed starting with the top-most element
|
|
* of the DN. Thus, the following list:
|
|
* <code>
|
|
* ou=people,dc=example,dc=com
|
|
* cn=Admin,ou=People,dc=example,dc=com
|
|
* cn=Joe,ou=people,dc=example,dc=com
|
|
* dc=example,dc=com
|
|
* cn=Fred,ou=people,dc=example,dc=org
|
|
* cn=Dave,ou=people,dc=example,dc=org
|
|
* </code>
|
|
* Will be sorted thus using usort( $list, "pla_compare_dns" ):
|
|
* <code>
|
|
* dc=com
|
|
* dc=example,dc=com
|
|
* ou=people,dc=example,dc=com
|
|
* cn=Admin,ou=People,dc=example,dc=com
|
|
* cn=Joe,ou=people,dc=example,dc=com
|
|
* cn=Dave,ou=people,dc=example,dc=org
|
|
* cn=Fred,ou=people,dc=example,dc=org
|
|
* </code>
|
|
*
|
|
* @param string $dn1 The first of two DNs to compare
|
|
* @param string $dn2 The second of two DNs to compare
|
|
* @return int
|
|
*/
|
|
function pla_compare_dns( $dn1, $dn2 )
|
|
{
|
|
// If they are obviously the same, return immediately
|
|
if( 0 === strcasecmp( $dn1, $dn2 ) )
|
|
return 0;
|
|
|
|
$dn1_parts = pla_explode_dn( pla_reverse_dn($dn1) );
|
|
$dn2_parts = pla_explode_dn( pla_reverse_dn($dn2) );
|
|
assert( is_array( $dn1_parts ) );
|
|
assert( is_array( $dn2_parts ) );
|
|
|
|
// Foreach of the "parts" of the smaller DN
|
|
for( $i=0; $i<count( $dn1_parts ) && $i<count( $dn2_parts ); $i++ )
|
|
{
|
|
// dnX_part is of the form: "cn=joe" or "cn = joe" or "dc=example"
|
|
// ie, one part of a multi-part DN.
|
|
$dn1_part = $dn1_parts[$i];
|
|
$dn2_part = $dn2_parts[$i];
|
|
|
|
// Each "part" consists of two sub-parts:
|
|
// 1. the attribute (ie, "cn" or "o")
|
|
// 2. the value (ie, "joe" or "example")
|
|
$dn1_sub_parts = explode( '=', $dn1_part, 2 );
|
|
$dn2_sub_parts = explode( '=', $dn2_part, 2 );
|
|
|
|
$dn1_sub_part_attr = trim( $dn1_sub_parts[0] );
|
|
$dn2_sub_part_attr = trim( $dn2_sub_parts[0] );
|
|
if( 0 != ( $cmp = strcasecmp( $dn1_sub_part_attr, $dn2_sub_part_attr ) ) )
|
|
return $cmp;
|
|
|
|
$dn1_sub_part_val = trim( $dn1_sub_parts[1] );
|
|
$dn2_sub_part_val = trim( $dn2_sub_parts[1] );
|
|
if( 0 != ( $cmp = strcasecmp( $dn1_sub_part_val, $dn2_sub_part_val ) ) )
|
|
return $cmp;
|
|
}
|
|
|
|
// If we iterated through all entries in the smaller of the two DNs
|
|
// (ie, the one with fewer parts), and the entries are different sized,
|
|
// then, the smaller of the two must be "less than" than the larger.
|
|
if( count($dn1_parts) > count($dn2_parts) ) {
|
|
return 1;
|
|
} elseif( count( $dn2_parts ) > count( $dn1_parts ) ) {
|
|
return -1;
|
|
} else {
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Prunes off anything after the ";" in an attr name. This is useful for
|
|
* attributes that may have ";binary" appended to their names. With
|
|
* real_attr_name(), you can more easily fetch these attributes' schema
|
|
* with their "real" attribute name.
|
|
*
|
|
* @param string $attr_name The name of the attribute to examine.
|
|
* @return string
|
|
*/
|
|
function real_attr_name( $attr_name )
|
|
{
|
|
$attr_name = preg_replace( "/;.*$/U", "", $attr_name );
|
|
return $attr_name;
|
|
}
|
|
|
|
/**
|
|
* Returns true if the user has configured PLA to show
|
|
* helpful hints with the $show_hints setting.
|
|
* This is configured in config.php thus:
|
|
* <code>
|
|
* $show_hints = true;
|
|
* </code>
|
|
*
|
|
* @return bool
|
|
*/
|
|
function show_hints()
|
|
{
|
|
global $show_hints;
|
|
if( isset( $show_hints ) && $show_hints === true )
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Determines if the user has enabled auto uidNumbers for the specified server ID.
|
|
*
|
|
* @param int $server_id The id of the server of interest.
|
|
* @return bool True if auto uidNumbers are enabled, false otherwise.
|
|
*/
|
|
function auto_uid_numbers_enabled( $server_id )
|
|
{
|
|
global $servers;
|
|
if( isset( $servers[$server_id]['enable_auto_uid_numbers'] ) &&
|
|
true == $servers[$server_id]['enable_auto_uid_numbers'] )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* For hosts who have 'enable_auto_uid_numbers' set to true, this function will
|
|
* get the next available uidNumber using the host's preferred mechanism
|
|
* (uidpool or search). The uidpool mechanism uses a user-configured entry in
|
|
* the LDAP server to store the last used uidNumber. This mechanism simply fetches
|
|
* and increments and returns that value. The search mechanism is more complicated
|
|
* and slow. It searches all entries that have uidNumber set, finds the smalles and
|
|
* "fills in the gaps" by incrementing the smallest uidNumber until an unused value
|
|
* is found. Both mechanisms do NOT prevent race conditions or toe-stomping, so
|
|
* care must be taken when actually creating the entry to check that the uidNumber
|
|
* returned here has not been used in the mean time. Note that the two different
|
|
* mechanisms may (will!) return different values as they use different algorithms
|
|
* to arrive at their result. Do not be alarmed if (when!) this is the case.
|
|
*
|
|
* Also note that both algorithms are susceptible to a race condition. If two admins
|
|
* are adding users simultaneously, the users may get identical uidNumbers with this
|
|
* function.
|
|
*
|
|
* See config.php.example for more notes on the two auto uidNumber mechanisms.
|
|
*
|
|
* @param object $ldapserver The LDAP Server Object of interest.
|
|
* @return int
|
|
*
|
|
* @todo eliminate race condition at create time by re-running this function.
|
|
* @todo take advantage of multiple connections with new LDAPServer object.
|
|
*/
|
|
function get_next_uid_number( $ldapserver ) {
|
|
global $servers, $lang;
|
|
|
|
if( ! auto_uid_numbers_enabled( $ldapserver->server_id ) )
|
|
return false;
|
|
|
|
if( ! isset( $servers[ $ldapserver->server_id ]['enable_auto_uid_numbers'] ) )
|
|
return false;
|
|
|
|
if( ! isset( $servers[ $ldapserver->server_id ]['auto_uid_number_mechanism'] ) )
|
|
pla_error( sprintf($lang['auto_update_not_setup'], $ldapserver->name));
|
|
|
|
// Based on the configured mechanism, go get the next available uidNumber!
|
|
$mechanism = $servers[$ldapserver->server_id]['auto_uid_number_mechanism'];
|
|
|
|
// case 1: uidpool mechanism
|
|
if( 0 == strcasecmp( $mechanism, 'uidpool' ) ) {
|
|
if( ! isset( $servers[ $ldapserver->server_id ][ 'auto_uid_number_uid_pool_dn' ] ) )
|
|
pla_error( sprintf( $lang['uidpool_not_set'], $ldapserver->name ) );
|
|
|
|
$uid_pool_dn = $servers[ $ldapserver->server_id ][ 'auto_uid_number_uid_pool_dn' ];
|
|
if( ! dn_exists( $ldapserver, $uid_pool_dn ) )
|
|
pla_error( sprintf( $lang['uidpool_not_exist'] , $uid_pool_dn ) );
|
|
|
|
$next_uid_number = get_object_attr( $ldapserver, $uid_pool_dn, 'uidNumber' );
|
|
$next_uid_number = intval( $next_uid_number[ 0 ] );
|
|
$next_uid_number++;
|
|
|
|
return $next_uid_number;
|
|
|
|
// case 2: search mechanism
|
|
} elseif( 0 == strcasecmp( $mechanism, 'search' ) ) {
|
|
if( ! isset( $servers[ $ldapserver->server_id ][ 'auto_uid_number_search_base' ] ) )
|
|
pla_error( sprintf( $lang['specified_uidpool'] , $ldapserver->name ) );
|
|
|
|
$base_dn = $servers[ $ldapserver->server_id ][ 'auto_uid_number_search_base' ];
|
|
$filter = "(uidNumber=*)";
|
|
|
|
// Check see and use our alternate uid_dn and password if we have it.
|
|
if ( isset( $servers[ $ldapserver->server_id ][ 'auto_uid_number_search_dn' ] ) &&
|
|
isset( $servers[ $ldapserver->server_id ][ 'auto_uid_number_search_dn_pass' ] ) ) {
|
|
|
|
$con = @ldap_connect( $servers[$ldapserver->server_id]['host'], $servers[$ldapserver->server_id]['port'] );
|
|
@ldap_set_option( $con, LDAP_OPT_PROTOCOL_VERSION, 3 );
|
|
@ldap_set_option( $con, LDAP_OPT_REFERRALS, 0);
|
|
|
|
// Bind with the alternate ID.
|
|
$res = @ldap_bind( $con,
|
|
$servers[ $ldapserver->server_id ][ 'auto_uid_number_search_dn' ],
|
|
$servers[ $ldapserver->server_id ][ 'auto_uid_number_search_dn_pass' ] );
|
|
|
|
if (! $res) pla_error( sprintf( $lang['auto_uid_invalid_credential'] , $ldapserver->name ) );
|
|
|
|
$search = @ldap_search( $con, $base_dn, $filter, array('uidNumber'), 0, 0, 0, get_search_deref_setting() );
|
|
if( ! $search ) pla_error( sprintf( $lang['bad_auto_uid_search_base'], $ldapserver->name ) );
|
|
|
|
$search = @ldap_get_entries( $con, $search );
|
|
$res = @ldap_unbind( $con );
|
|
|
|
$results = array();
|
|
for( $i=0; $i<$search['count']; $i++ ) {
|
|
$entry = $search[$i];
|
|
$dn['dn'] = $entry['dn'];
|
|
$dn['uidnumber'] = $entry['uidnumber'][0];
|
|
$results[] = $dn;
|
|
}
|
|
|
|
} else {
|
|
$results = pla_ldap_search( $ldapserver, $filter, $base_dn, array('uidNumber'));
|
|
}
|
|
|
|
// lower-case all the inices so we can access them by name correctly
|
|
foreach( $results as $dn => $attrs )
|
|
foreach( $attrs as $attr => $vals ) {
|
|
unset( $results[$dn][$attr] );
|
|
$results[$dn][strtolower( $attr )] = $vals;
|
|
}
|
|
|
|
// construct a list of used uidNumbers
|
|
$uids = array();
|
|
foreach ($results as $result)
|
|
$uids[] = $result['uidnumber'];
|
|
|
|
$uids = array_unique( $uids );
|
|
if( count( $uids ) == 0 )
|
|
return false;
|
|
|
|
sort( $uids );
|
|
foreach( $uids as $uid )
|
|
$uid_hash[ $uid ] = 1;
|
|
|
|
// start with the least existing uidNumber and add 1
|
|
if (isset($servers[$ldapserver->server_id]['auto_uid_number_min'])) {
|
|
$uidNumber = $servers[$ldapserver->server_id]['auto_uid_number_min'];
|
|
|
|
} else {
|
|
$uidNumber = intval( $uids[0] ) + 1;
|
|
}
|
|
|
|
// this loop terminates as soon as we encounter the next available uidNumber
|
|
while( isset( $uid_hash[ $uidNumber ] ) )
|
|
$uidNumber++;
|
|
|
|
return $uidNumber;
|
|
|
|
// No other cases allowed. The user has an error in the configuration
|
|
} else {
|
|
pla_error( sprintf( $lang['auto_uid_invalid_value'] , $mechanism) );
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Used to determine if the specified attribute is indeed a jpegPhoto. If the
|
|
* specified attribute is one that houses jpeg data, true is returned. Otherwise
|
|
* this function returns false.
|
|
*
|
|
* @param int $server_id The ID of the server hosuing the attribute of interest
|
|
* @param string $attr_name The name of the attribute to test.
|
|
* @return bool
|
|
* @see draw_jpeg_photos
|
|
*/
|
|
function is_jpeg_photo( $ldapserver, $attr_name ) {
|
|
// easy quick check
|
|
if( 0 == strcasecmp( $attr_name, 'jpegPhoto' ) ||
|
|
0 == strcasecmp( $attr_name, 'photo' ) )
|
|
return true;
|
|
|
|
// go to the schema and get the Syntax OID
|
|
require_once realpath( 'schema_functions.php' );
|
|
$schema_attr = get_schema_attribute( $ldapserver, $attr_name );
|
|
if( ! $schema_attr )
|
|
return false;
|
|
|
|
$oid = $schema_attr->getSyntaxOID();
|
|
$type = $schema_attr->getType();
|
|
|
|
if( 0 == strcasecmp( $type, 'JPEG' ) )
|
|
return true;
|
|
if( $oid == '1.3.6.1.4.1.1466.115.121.1.28' )
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Given an attribute name and server ID number, this function returns
|
|
* whether the attrbiute contains boolean data. This is useful for
|
|
* developers who wish to display the contents of a boolean attribute
|
|
* with a drop-down.
|
|
*
|
|
* @param int $server_id The ID of the server of interest (required since
|
|
* this action requires a schema lookup on the server)
|
|
* @param string $attr_name The name of the attribute to test.
|
|
* @return bool
|
|
*/
|
|
function is_attr_boolean( $ldapserver, $attr_name ) {
|
|
$type = ( $schema_attr = get_schema_attribute( $ldapserver, $attr_name ) ) ?
|
|
$schema_attr->getType() : null;
|
|
|
|
if( 0 == strcasecmp( 'boolean', $type ) ||
|
|
0 == strcasecmp( 'isCriticalSystemObject', $attr_name ) ||
|
|
0 == strcasecmp( 'showInAdvancedViewOnly', $attr_name ) )
|
|
return true;
|
|
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Given an attribute name and server ID number, this function returns
|
|
* whether the attrbiute may contain binary data. This is useful for
|
|
* developers who wish to display the contents of an arbitrary attribute
|
|
* but don't want to dump binary data on the page.
|
|
*
|
|
* @param int $server_id The ID of the server of interest (required since
|
|
* this action requires a schema lookup on the server)
|
|
* @param string $attr_name The name of the attribute to test.
|
|
* @return bool
|
|
*
|
|
* @see is_jpeg_photo
|
|
*/
|
|
function is_attr_binary( $ldapserver, $attr_name )
|
|
{
|
|
$attr_name = strtolower( $attr_name );
|
|
/**
|
|
* Determining if an attribute is binary can be an expensive operation.
|
|
* We cache the results for each attr name on each server in the $attr_cache
|
|
* to speed up subsequent calls. The $attr_cache looks like this:
|
|
*
|
|
* Array
|
|
* 0 => Array
|
|
* 'objectclass' => false
|
|
* 'cn' => false
|
|
* 'usercertificate' => true
|
|
* 1 => Array
|
|
* 'jpegphoto' => true
|
|
* 'cn' => false
|
|
*/
|
|
|
|
static $attr_cache;
|
|
if( isset( $attr_cache[ $ldapserver->server_id ][ $attr_name ] ) )
|
|
return $attr_cache[ $ldapserver->server_id ][ $attr_name ];
|
|
|
|
if( $attr_name == 'userpassword' ) {
|
|
$attr_cache[ $ldapserver->server_id ][ $attr_name ] = false;
|
|
return false;
|
|
}
|
|
|
|
// Quick check: If the attr name ends in ";binary", then it's binary.
|
|
if( 0 == strcasecmp( substr( $attr_name, strlen( $attr_name ) - 7 ), ";binary" ) ) {
|
|
$attr_cache[ $ldapserver->server_id ][ $attr_name ] = true;
|
|
return true;
|
|
}
|
|
|
|
// See what the server schema says about this attribute
|
|
$schema_attr = get_schema_attribute( $ldapserver, $attr_name );
|
|
if( ! $schema_attr ) {
|
|
|
|
// Strangely, some attributeTypes may not show up in the server
|
|
// schema. This behavior has been observed in MS Active Directory.
|
|
$type = null;
|
|
$syntax = null;
|
|
|
|
} else {
|
|
$type = $schema_attr->getType();
|
|
$syntax = $schema_attr->getSyntaxOID();
|
|
}
|
|
|
|
if( 0 == strcasecmp( $type, 'Certificate' ) ||
|
|
0 == strcasecmp( $type, 'Binary' ) ||
|
|
0 == strcasecmp( $attr_name, 'usercertificate' ) ||
|
|
0 == strcasecmp( $attr_name, 'usersmimecertificate' ) ||
|
|
0 == strcasecmp( $attr_name, 'networkaddress' ) ||
|
|
0 == strcasecmp( $attr_name, 'objectGUID' ) ||
|
|
0 == strcasecmp( $attr_name, 'objectSID' ) ||
|
|
$syntax == '1.3.6.1.4.1.1466.115.121.1.10' ||
|
|
$syntax == '1.3.6.1.4.1.1466.115.121.1.28' ||
|
|
$syntax == '1.3.6.1.4.1.1466.115.121.1.5' ||
|
|
$syntax == '1.3.6.1.4.1.1466.115.121.1.8' ||
|
|
$syntax == '1.3.6.1.4.1.1466.115.121.1.9' ) {
|
|
|
|
$attr_cache[ $ldapserver->server_id ][ $attr_name ] = true;
|
|
return true;
|
|
|
|
} else {
|
|
$attr_cache[ $ldapserver->server_id ][ $attr_name ] = false;
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns true if the specified attribute is configured as read only
|
|
* in config.php with the $read_only_attrs array.
|
|
* Attributes are configured as read-only in config.php thus:
|
|
* <code>
|
|
* $read_only_attrs = array( "objectClass", "givenName" );
|
|
* </code>
|
|
*
|
|
* @param string $attr The name of the attribute to test.
|
|
* @return bool
|
|
*/
|
|
function is_attr_read_only( $ldapserver, $attr ) {
|
|
global $read_only_attrs, $read_only_except_dn;
|
|
|
|
$attr = trim( $attr );
|
|
if( '' === $attr )
|
|
return false;
|
|
if( ! isset( $read_only_attrs ) )
|
|
return false;
|
|
if( ! is_array( $read_only_attrs) )
|
|
return false;
|
|
|
|
// Is the user excluded?
|
|
if (isset($read_only_except_dn) && userIsMember($ldapserver, get_logged_in_dn( $ldapserver ),$read_only_except_dn))
|
|
return false;
|
|
|
|
foreach( $read_only_attrs as $attr_name )
|
|
if( 0 == strcasecmp( $attr, trim($attr_name) ) )
|
|
return true;
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Returns true if the specified attribute is configured as hidden
|
|
* in config.php with the $hidden_attrs array or the $hidden_attrs_ro
|
|
* array.
|
|
* Attributes are configured as hidden in config.php thus:
|
|
* <code>
|
|
* $hidden_attrs = array( "objectClass", "givenName" );
|
|
* </code>
|
|
* or
|
|
* <code>
|
|
* $hidden_attrs_ro = array( "objectClass", "givenName", "shadowWarning",
|
|
* "shadowLastChange", "shadowMax", "shadowFlag",
|
|
* "shadowInactive", "shadowMin", "shadowExpire" );
|
|
* </code>
|
|
*
|
|
* @param string $attr The name of the attribute to test.
|
|
* @return bool
|
|
*/
|
|
function is_attr_hidden( $ldapserver, $attr ) {
|
|
global $hidden_attrs, $hidden_attrs_ro, $hidden_except_dn;
|
|
|
|
$attr = trim( $attr );
|
|
if( '' === $attr )
|
|
return false;
|
|
if( ! isset( $hidden_attrs ) )
|
|
return false;
|
|
if( ! is_array( $hidden_attrs) )
|
|
return false;
|
|
|
|
if( ! isset( $hidden_attrs_ro ) )
|
|
$hidden_attrs_ro = $hidden_attrs;
|
|
if( ! is_array( $hidden_attrs_ro) )
|
|
$hidden_attrs_ro = $hidden_attrs;
|
|
|
|
// Is the user excluded?
|
|
if (isset($hidden_except_dn) && userIsMember($ldapserver, get_logged_in_dn( $ldapserver ),$hidden_except_dn))
|
|
return false;
|
|
|
|
if( $ldapserver->isReadOnly() ) {
|
|
foreach( $hidden_attrs_ro as $attr_name )
|
|
if( 0 == strcasecmp( $attr, trim($attr_name) ) )
|
|
return true;
|
|
|
|
} else {
|
|
foreach( $hidden_attrs as $attr_name )
|
|
if( 0 == strcasecmp( $attr, trim($attr_name) ) )
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Returns true if the specified server is configured to be displayed
|
|
* in read only mode. If a user has logged in via anonymous bind, and
|
|
* config.php specifies anonymous_bind_implies_read_only as true, then
|
|
* this also returns true. Servers can be configured read-only in
|
|
* config.php thus:
|
|
* <code>
|
|
* $server[$i]['read_only'] = true;
|
|
* </code>
|
|
*
|
|
* @param int $server_id The ID of the server of interest from the $servers array in config.php
|
|
* @return bool
|
|
* @deprecated
|
|
*/
|
|
function is_server_read_only( $server_id )
|
|
{
|
|
global $servers;
|
|
if( isset( $servers[$server_id]['read_only'] ) &&
|
|
$servers[$server_id]['read_only'] == true )
|
|
return true;
|
|
|
|
global $anonymous_bind_implies_read_only;
|
|
|
|
if( "anonymous" == get_logged_in_dn( $server_id ) &&
|
|
isset( $anonymous_bind_implies_read_only ) &&
|
|
$anonymous_bind_implies_read_only == true )
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Given a DN and server ID, this function reads the DN's objectClasses and
|
|
* determines which icon best represents the entry. The results of this query
|
|
* are cached in a session variable so it is not run every time the tree
|
|
* browser changes, just when exposing new DNs that were not displayed
|
|
* previously. That means we can afford a little bit of inefficiency here
|
|
* in favor of coolness. :)
|
|
*
|
|
* This function returns a string like "country.png". All icon files are assumed
|
|
* to be contained in the /images/ directory of phpLDAPadmin.
|
|
*
|
|
* Developers are encouraged to add new icons to the images directory and modify
|
|
* this function as needed to suit their types of LDAP entries. If the modifications
|
|
* are general to an LDAP audience, the phpLDAPadmin team will gladly accept them
|
|
* as a patch.
|
|
*
|
|
* @param int $server_id The ID of the LDAP server housing the DN of interest.
|
|
* @param string $dn The DN of the entry whose icon you wish to fetch.
|
|
*
|
|
* @return string
|
|
*/
|
|
function get_icon( $ldapserver, $dn ) {
|
|
// fetch and lowercase all the objectClasses in an array
|
|
$object_classes = get_object_attr( $ldapserver, $dn, 'objectClass', true );
|
|
|
|
if( $object_classes === null || $object_classes === false || ! is_array( $object_classes ) )
|
|
$object_classes = array();
|
|
|
|
foreach( $object_classes as $i => $class )
|
|
$object_classes[$i] = strtolower( $class );
|
|
|
|
$rdn = get_rdn( $dn );
|
|
$rdn_parts = explode( '=', $rdn, 2 );
|
|
$rdn_value = isset( $rdn_parts[0] ) ? $rdn_parts[0] : null;
|
|
$rdn_attr = isset( $rdn_parts[1] ) ? $rdn_parts[1] : null;
|
|
unset( $rdn_parts );
|
|
|
|
// return icon filename based upon objectClass value
|
|
if( in_array( 'sambaaccount', $object_classes ) &&
|
|
'$' == $rdn{ strlen($rdn) - 1 } )
|
|
return 'nt_machine.png';
|
|
|
|
if( in_array( 'sambaaccount', $object_classes ) )
|
|
return 'nt_user.png';
|
|
|
|
elseif( in_array( 'person', $object_classes ) ||
|
|
in_array( 'organizationalperson', $object_classes ) ||
|
|
in_array( 'inetorgperson', $object_classes ) ||
|
|
in_array( 'account', $object_classes ) ||
|
|
in_array( 'posixaccount', $object_classes ) )
|
|
|
|
return 'user.png';
|
|
|
|
elseif( in_array( 'organization', $object_classes ) )
|
|
return 'o.png';
|
|
|
|
elseif( in_array( 'organizationalunit', $object_classes ) )
|
|
return 'ou.png';
|
|
|
|
elseif( in_array( 'organizationalrole', $object_classes ) )
|
|
return 'uid.png';
|
|
|
|
elseif( in_array( 'dcobject', $object_classes ) ||
|
|
in_array( 'domainrelatedobject', $object_classes ) ||
|
|
in_array( 'domain', $object_classes ) ||
|
|
in_array( 'builtindomain', $object_classes ))
|
|
|
|
return 'dc.png';
|
|
|
|
elseif( in_array( 'alias', $object_classes ) )
|
|
return 'go.png';
|
|
|
|
elseif( in_array( 'room', $object_classes ) )
|
|
return 'door.png';
|
|
|
|
elseif( in_array( 'device', $object_classes ) )
|
|
return 'device.png';
|
|
|
|
elseif( in_array( 'document', $object_classes ) )
|
|
return 'document.png';
|
|
|
|
elseif( in_array( 'country', $object_classes ) ) {
|
|
$tmp = pla_explode_dn( $dn );
|
|
$cval = explode( '=', $tmp[0], 2 );
|
|
$cval = isset( $cval[1] ) ? $cval[1] : false;
|
|
if( $cval && false === strpos( $cval, ".." ) &&
|
|
file_exists( realpath( sprintf("./images/countries/%s.png",strtolower($cval)) ) ) )
|
|
|
|
return sprintf("countries/%s.png",strtolower($cval));
|
|
|
|
else
|
|
return 'country.png';
|
|
}
|
|
|
|
elseif( in_array( 'jammvirtualdomain', $object_classes ) )
|
|
return 'mail.png';
|
|
|
|
elseif( in_array( 'locality', $object_classes ) )
|
|
return 'locality.png';
|
|
|
|
elseif( in_array( 'posixgroup', $object_classes ) ||
|
|
in_array( 'groupofnames', $object_classes ) ||
|
|
in_array( 'group', $object_classes ) )
|
|
|
|
return 'ou.png';
|
|
|
|
elseif( in_array( 'applicationprocess', $object_classes ) )
|
|
return 'process.png';
|
|
|
|
elseif( in_array( 'groupofuniquenames', $object_classes ) )
|
|
return 'uniquegroup.png';
|
|
|
|
elseif( in_array( 'iphost', $object_classes ) )
|
|
return 'host.png';
|
|
|
|
elseif( in_array( 'nlsproductcontainer', $object_classes ) )
|
|
return 'n.png';
|
|
|
|
elseif( in_array( 'ndspkikeymaterial', $object_classes ) )
|
|
return 'lock.png';
|
|
|
|
elseif( in_array( 'server', $object_classes ) )
|
|
return 'server-small.png';
|
|
|
|
elseif( in_array( 'volume', $object_classes ) )
|
|
return 'hard-drive.png';
|
|
|
|
elseif( in_array( 'ndscatcatalog', $object_classes ) )
|
|
return 'catalog.png';
|
|
|
|
elseif( in_array( 'resource', $object_classes ) )
|
|
return 'n.png';
|
|
|
|
elseif( in_array( 'ldapgroup', $object_classes ) )
|
|
return 'ldap-server.png';
|
|
|
|
elseif( in_array( 'ldapserver', $object_classes ) )
|
|
return 'ldap-server.png';
|
|
|
|
elseif( in_array( 'nisserver', $object_classes ) )
|
|
return 'ldap-server.png';
|
|
|
|
elseif( in_array( 'rbscollection', $object_classes ) )
|
|
return 'ou.png';
|
|
|
|
elseif( in_array( 'dfsconfiguration', $object_classes ) )
|
|
return 'nt_machine.png';
|
|
|
|
elseif( in_array( 'applicationsettings', $object_classes ) )
|
|
return 'server-settings.png';
|
|
|
|
elseif( in_array( 'aspenalias', $object_classes ) )
|
|
return 'mail.png';
|
|
|
|
elseif( in_array( 'container', $object_classes ) )
|
|
return 'folder.png';
|
|
|
|
elseif( in_array( 'ipnetwork', $object_classes ) )
|
|
return 'network.png';
|
|
|
|
elseif( in_array( 'samserver', $object_classes ) )
|
|
return 'server-small.png';
|
|
|
|
elseif( in_array( 'lostandfound', $object_classes ) )
|
|
return 'find.png';
|
|
|
|
elseif( in_array( 'infrastructureupdate', $object_classes ) )
|
|
return 'server-small.png';
|
|
|
|
elseif( in_array( 'filelinktracking', $object_classes ) )
|
|
return 'files.png';
|
|
|
|
elseif( in_array( 'automountmap', $object_classes ) ||
|
|
in_array( 'automount', $object_classes ) )
|
|
|
|
return 'hard-drive.png';
|
|
|
|
elseif( 0 === strpos( $rdn_value, "ipsec" ) ||
|
|
0 == strcasecmp( $rdn_value, "IP Security" ) ||
|
|
0 == strcasecmp( $rdn_value, "MSRADIUSPRIVKEY Secret" ) ||
|
|
0 === strpos( $rdn_value, "BCKUPKEY_" ) )
|
|
|
|
return 'lock.png';
|
|
|
|
elseif( 0 == strcasecmp( $rdn_value, "MicrosoftDNS" ) )
|
|
return 'dc.png';
|
|
|
|
// Oh well, I don't know what it is. Use a generic icon.
|
|
else
|
|
return 'object.png';
|
|
}
|
|
|
|
/**
|
|
* Does the same thing as get_icon(), but it tries to fetch the icon name from the
|
|
* tree_icons session variable first. If not found, resorts to get_icon() and stores
|
|
* the icon nmae in the tree_icons session before returing the icon.
|
|
*
|
|
* @param int $server_id The ID of the server housing the DN of interest.
|
|
* @param string $dn The DN of the entry of interest.
|
|
*
|
|
* @return string
|
|
*
|
|
* @see get_icon
|
|
*/
|
|
function get_icon_use_cache( $ldapserver, $dn ) {
|
|
initialize_session_tree();
|
|
|
|
if( array_key_exists( 'tree_icons', $_SESSION ) ) {
|
|
if( array_key_exists( $ldapserver->server_id, $_SESSION['tree_icons'] ) &&
|
|
array_key_exists( $dn, $_SESSION['tree_icons'][$ldapserver->server_id] ) ) {
|
|
return $_SESSION['tree_icons'][ $ldapserver->server_id ][ $dn ];
|
|
|
|
} else {
|
|
$icon = get_icon( $ldapserver, $dn );
|
|
$_SESSION['tree_icons'][ $ldapserver->server_id ][ $dn ] = $icon;
|
|
return $icon;
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Given a server_id, returns whether or not we have enough information
|
|
* to authenticate against the server. For example, if the user specifies
|
|
* auth_type of 'cookie' in the config for that server, it checks the $_COOKIE array to
|
|
* see if the cookie username and password is set for the server. If the auth_type
|
|
* is 'session', the $_SESSION array is checked.
|
|
*
|
|
* There are three cases for this function depending on the auth_type configured for
|
|
* the specified server. If the auth_type is form or http, then get_logged_in_dn() is
|
|
* called to verify that the user has logged in. If the auth_type is config, then the
|
|
* $servers array in config.php is checked to ensure that the user has specified
|
|
* login information. In any case, if phpLDAPadmin has enough information to login
|
|
* to the server, true is returned. Otherwise false is returned.
|
|
*
|
|
* @param int $server_id
|
|
* @return bool
|
|
* @see get_logged_in_dn
|
|
* @deprecated
|
|
*/
|
|
function have_auth_info( $server_id )
|
|
{
|
|
$ldapserver = new LDAPServer($server_id);
|
|
global $servers;
|
|
|
|
$server = $servers[$server_id];
|
|
|
|
// For session or cookie auth_types, we check the session or cookie to see if a user has logged in.
|
|
if( isset( $server['auth_type'] ) && ( in_array( $server['auth_type'], array( 'session', 'cookie' ) ) ) ) {
|
|
// we don't look at get_logged_in_pass() cause it may be null for anonymous binds
|
|
// get_logged_in_dn() will never return null if someone is really logged in.
|
|
if( get_logged_in_dn( $ldapserver ) )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
// whether or not the login_dn or pass is specified, we return
|
|
// true here. (if they are blank, we do an anonymous bind anyway)
|
|
elseif( ! isset( $server['auth_type'] ) || $server['auth_type'] == 'config' ) {
|
|
return true;
|
|
}
|
|
else {
|
|
global $lang;
|
|
pla_error( sprintf( $lang['error_auth_type_config'],
|
|
htmlspecialchars( $server[ 'auth_type' ] ) ) );
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Fetches the password of the currently logged in user (for auth_types "form" and "http" only)
|
|
* or false if the current login is anonymous.
|
|
*
|
|
* @param object $ldapserver The LDAPServer object of the server which the user hsa logged in.
|
|
* @return string
|
|
* @see have_auth_info
|
|
* @see get_logged_in_dn
|
|
*/
|
|
function get_logged_in_pass( $ldapserver )
|
|
{
|
|
if (! $ldapserver->auth_type)
|
|
return false;
|
|
|
|
switch( $ldapserver->auth_type )
|
|
{
|
|
case 'cookie':
|
|
$cookie_name = sprintf('pla_login_pass_%s',$ldapserver->server_id);
|
|
$pass = isset( $_COOKIE[ $cookie_name ] ) ? $_COOKIE[ $cookie_name ] : false;
|
|
|
|
if( $pass == '0' )
|
|
return null;
|
|
else
|
|
return pla_blowfish_decrypt( $pass );
|
|
break;
|
|
|
|
case 'session':
|
|
$session_var_name = sprintf('pla_login_pass_%s',$ldapserver->server_id);
|
|
$pass = isset( $_SESSION[ $session_var_name ] ) ? $_SESSION[ $session_var_name ] : false;
|
|
|
|
if( $pass == '0' )
|
|
return null;
|
|
else
|
|
return pla_blowfish_decrypt ( $pass );
|
|
break;
|
|
|
|
case 'config':
|
|
return $ldapserver->login_pass;
|
|
break;
|
|
|
|
default:
|
|
global $lang;
|
|
pla_error( sprintf( $lang['unknown_auth_type'], htmlspecialchars( $ldapserver->auth_type ) ) );
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns the DN who is logged in currently to the given server, which may
|
|
* either be a DN or the string 'anonymous'. This applies only for auth_types
|
|
* "form" and "http".
|
|
*
|
|
* One place where this function is used is the tree viewer:
|
|
* After a user logs in, the text "Logged in as: " is displayed under the server
|
|
* name. This information is retrieved from this function.
|
|
*
|
|
* @param object $ldapserver The LDAPServer object of the server which the user hsa logged in.
|
|
* @return string
|
|
* @see have_auth_info
|
|
* @see get_logged_in_pass
|
|
*/
|
|
function get_logged_in_dn( $ldapserver )
|
|
{
|
|
if (! $ldapserver->auth_type)
|
|
return false;
|
|
|
|
switch( $ldapserver->auth_type )
|
|
{
|
|
case 'cookie':
|
|
$cookie_name = sprintf('pla_login_dn_%s',$ldapserver->server_id);
|
|
|
|
if( isset( $_COOKIE[ $cookie_name ] ) )
|
|
return pla_blowfish_decrypt ( $_COOKIE[ $cookie_name ] );
|
|
else
|
|
return false;
|
|
|
|
break;
|
|
|
|
case 'session':
|
|
$session_var_name = sprintf('pla_login_dn_%s',$ldapserver->server_id);
|
|
|
|
if( isset( $_SESSION[ $session_var_name ] ) )
|
|
return( pla_blowfish_decrypt ( $_SESSION[ $session_var_name ] ) );
|
|
else
|
|
return false;
|
|
|
|
break;
|
|
|
|
case 'config':
|
|
return $ldapserver->login_dn;
|
|
break;
|
|
|
|
default:
|
|
global $lang;
|
|
pla_error( sprintf( $lang['unknown_auth_type'], htmlspecialchars( $auth_type ) ) );
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Appends a servers base to a "sub" dn or returns the base.
|
|
*
|
|
* If $get_base is true, return at least the base, otherwise null.
|
|
* @param object $ldapserver The LDAPServer object of the server which the user hsa logged in.
|
|
* @return string|null
|
|
* @todo This function no longer return the base, since the LDAP server could have multiple bases.
|
|
*/
|
|
function expand_dn_with_base( $ldapserver,$sub_dn,$get_base=true )
|
|
{
|
|
$empty_str = ( is_null($sub_dn) || ( ( $len = strlen( trim( $sub_dn ) ) ) == 0 ) );
|
|
|
|
if ( $empty_str ) {
|
|
// If we have no string and want not base
|
|
if ( ! $get_base )
|
|
return null;
|
|
|
|
} elseif ( $sub_dn[$len - 1] != ',' )
|
|
// If we have a string which doesn't need a base
|
|
return $sub_dn;
|
|
|
|
if( ( $empty_str && $get_base ) || ! $empty_str ) {
|
|
if ( $ldapserver->getBaseDN() )
|
|
return ( ! $empty_str ) ? $sub_dn . $ldapserver->getBaseDN() : $ldapserver->getBaseDN();
|
|
}
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* Gets a list of child entries for an entry. Given a DN, this function fetches the list of DNs of
|
|
* child entries one level beneath the parent. For example, for the following tree:
|
|
*
|
|
* <code>
|
|
* dc=example,dc=com
|
|
* ou=People
|
|
* cn=Dave
|
|
* cn=Fred
|
|
* cn=Joe
|
|
* ou=More People
|
|
* cn=Mark
|
|
* cn=Bob
|
|
* </code>
|
|
*
|
|
* Calling <code>get_container_contents( $server_id, "ou=people,dc=example,dc=com" )</code>
|
|
* would return the following list:
|
|
*
|
|
* <code>
|
|
* cn=Dave
|
|
* cn=Fred
|
|
* cn=Joe
|
|
* ou=More People
|
|
* </code>
|
|
*
|
|
* @param object $ldapserver The LDAP Server Object housing the entry of interest
|
|
* @param string $dn The DN of the entry whose children to return.
|
|
* @param int $size_limit (optional) The maximum number of entries to return.
|
|
* If unspecified, no limit is applied to the number of entries in the returned.
|
|
* @param string $filter (optional) An LDAP filter to apply when fetching children, example: "(objectClass=inetOrgPerson)"
|
|
* @return array An array of DN strings listing the immediate children of the specified entry.
|
|
*/
|
|
function get_container_contents( $ldapserver, $dn, $size_limit=0, $filter='(objectClass=*)', $deref=LDAP_DEREF_ALWAYS ) {
|
|
$search = @ldap_list( $ldapserver->connect(), $dn, $filter, array( 'dn' ), 1, $size_limit, 0, $deref );
|
|
if( ! $search )
|
|
return array();
|
|
|
|
$search = ldap_get_entries( $ldapserver->connect(), $search );
|
|
|
|
$return = array();
|
|
for( $i=0; $i<$search['count']; $i++ ) {
|
|
$entry = $search[$i];
|
|
$dn = $entry['dn'];
|
|
$return[] = $dn;
|
|
}
|
|
|
|
return $return;
|
|
}
|
|
|
|
/**
|
|
* Builds the initial tree that is stored in the session variable 'tree'.
|
|
* Simply returns an array with an entry for each active server in
|
|
* config.php. The structure of the returned array is simple, and looks like
|
|
* this:
|
|
* <code>
|
|
* Array (
|
|
* 0 => Array ( )
|
|
* 1 => Array ( )
|
|
* )
|
|
* </code>
|
|
* This function is not meant as a user callable function, but rather a convenient,
|
|
* automated method for setting up the initial structure for the tree viewer.
|
|
*/
|
|
function build_initial_tree()
|
|
{
|
|
global $servers;
|
|
|
|
$tree = array();
|
|
foreach( $servers as $id => $server ) {
|
|
if( $server['host'] == '' )
|
|
continue;
|
|
|
|
$tree[$id] = array();
|
|
}
|
|
|
|
return $tree;
|
|
}
|
|
|
|
/**
|
|
* Builds the initial array that stores the icon-lookup for each server's DN in the tree browser. The returned
|
|
* array is then stored in the current session. The structure of the returned array is simple, and looks like
|
|
* this:
|
|
* <code>
|
|
* Array
|
|
* (
|
|
* [0] => Array
|
|
* (
|
|
* [dc=example,dc=com] => "dcobject.png"
|
|
* )
|
|
* [1] => Array
|
|
(
|
|
* [o=Corporation] => "o.png"
|
|
* )
|
|
* )
|
|
* </code>
|
|
* This function is not meant as a user-callable function, but rather a convenient, automated method for
|
|
* setting up the initial data structure for the tree viewer's icon cache.
|
|
*/
|
|
function build_initial_tree_icons()
|
|
{
|
|
global $servers;
|
|
$tree_icons = array();
|
|
|
|
// initialize an empty array for each server
|
|
foreach( $servers as $id => $server ) {
|
|
if( $server['host'] == '' )
|
|
continue;
|
|
|
|
$ldapserver = new LDAPServer($id);
|
|
|
|
$tree_icons[ $id ] = array();
|
|
$tree_icons[ $id ][ $server['base'] ] = get_icon( $ldapserver, $server['base'] );
|
|
}
|
|
|
|
return $tree_icons;
|
|
}
|
|
|
|
/*
|
|
* Checks and fixes an initial session's tree cache if needed.
|
|
*
|
|
* This function is not meant as a user-callable function, but rather a convenient,
|
|
* automated method for checking the initial data structure of the session.
|
|
*/
|
|
function initialize_session_tree()
|
|
{
|
|
// From the PHP manual: If you use $_SESSION don't use
|
|
// session_register(), session_is_registered() or session_unregister()!
|
|
if( ! array_key_exists( 'tree', $_SESSION ) )
|
|
$_SESSION['tree'] = build_initial_tree();
|
|
if( ! array_key_exists( 'tree_icons', $_SESSION ) )
|
|
$_SESSION['tree_icons'] = build_initial_tree_icons();
|
|
|
|
// Make sure that the tree index is indeed well formed.
|
|
if( ! is_array( $_SESSION['tree'] ) )
|
|
$_SESSION['tree'] = build_initial_tree();
|
|
if( ! is_array( $_SESSION['tree_icons'] ) )
|
|
$_SESSION['tree_icons'] = build_initial_tree_icons();
|
|
}
|
|
|
|
/**
|
|
* Gets the operational attributes for an entry. Given a DN, this function fetches that entry's
|
|
* operational (ie, system or internal) attributes. These attributes include "createTimeStamp",
|
|
* "creatorsName", and any other attribute that the LDAP server sets automatically. The returned
|
|
* associative array is of this form:
|
|
* <code>
|
|
* Array
|
|
* (
|
|
* [creatorsName] => Array
|
|
* (
|
|
* [0] => "cn=Admin,dc=example,dc=com"
|
|
* )
|
|
* [createTimeStamp]=> Array
|
|
* (
|
|
* [0] => "10401040130"
|
|
* )
|
|
* [hasSubordinates] => Array
|
|
* (
|
|
* [0] => "FALSE"
|
|
* )
|
|
* )
|
|
* </code>
|
|
*
|
|
* @param object $ldapserver The LDAP Server Object of interest
|
|
* @param string $dn The DN of the entry whose interal attributes are desired.
|
|
* @param int $deref For aliases and referrals, this parameter specifies whether to
|
|
* follow references to the referenced DN or to fetch the attributes for
|
|
* the referencing DN. See http://php.net/ldap_search for the 4 valid
|
|
* options.
|
|
* @return array An associative array whose keys are attribute names and whose values
|
|
* are arrays of values for the aforementioned attribute.
|
|
*/
|
|
function get_entry_system_attrs( $ldapserver, $dn, $deref=LDAP_DEREF_NEVER ) {
|
|
|
|
$attrs = array( 'creatorsname', 'createtimestamp', 'modifiersname',
|
|
'structuralObjectClass', 'entryUUID', 'modifytimestamp',
|
|
'subschemaSubentry', 'hasSubordinates', '+' );
|
|
|
|
$search = @ldap_read( $ldapserver->connect(), $dn, '(objectClass=*)', $attrs, 0, 0, 0, $deref );
|
|
if( ! $search )
|
|
return false;
|
|
|
|
$entry = ldap_first_entry( $ldapserver->connect(), $search );
|
|
if( ! $entry)
|
|
return false;
|
|
|
|
$attrs = ldap_get_attributes( $ldapserver->connect(), $entry );
|
|
if( ! $attrs )
|
|
return false;
|
|
|
|
if( ! isset( $attrs['count'] ) )
|
|
return false;
|
|
|
|
$count = $attrs['count'];
|
|
unset( $attrs['count'] );
|
|
$return_attrs = array();
|
|
|
|
for( $i=0; $i<$count; $i++ ) {
|
|
$attr_name = $attrs[$i];
|
|
unset( $attrs[$attr_name]['count'] );
|
|
$return_attrs[$attr_name] = $attrs[$attr_name];
|
|
}
|
|
|
|
return $return_attrs;
|
|
}
|
|
|
|
/**
|
|
* Gets the attributes/values of an entry. Returns an associative array whose
|
|
* keys are attribute value names and whose values are arrays of values for
|
|
* said attribute. Optionally, callers may specify true for the parameter
|
|
* $lower_case_attr_names to force all keys in the associate array (attribute
|
|
* names) to be lower case.
|
|
*
|
|
* Sample return value of <code>get_object_attrs( 0, "cn=Bob,ou=pepole,dc=example,dc=com" )</code>
|
|
*
|
|
* <code>
|
|
* Array
|
|
* (
|
|
* [objectClass] => Array
|
|
* (
|
|
* [0] => person
|
|
* [1] => top
|
|
* )
|
|
* [cn] => Array
|
|
* (
|
|
* [0] => Bob
|
|
* )
|
|
* [sn] => Array
|
|
* (
|
|
* [0] => Jones
|
|
* )
|
|
* [dn] => Array
|
|
* (
|
|
* [0] => cn=Bob,ou=pepole,dc=example,dc=com
|
|
* )
|
|
* )
|
|
* </code>
|
|
*
|
|
* @param object $ldapserver The LDAP Server Object of interest
|
|
* @param string $dn The distinguished name (DN) of the entry whose attributes/values to fetch.
|
|
* @param bool $lower_case_attr_names (optional) If true, all keys of the returned associative
|
|
* array will be lower case. Otherwise, they will be cased as the LDAP server returns
|
|
* them.
|
|
* @param int $deref For aliases and referrals, this parameter specifies whether to
|
|
* follow references to the referenced DN or to fetch the attributes for
|
|
* the referencing DN. See http://php.net/ldap_search for the 4 valid
|
|
* options.
|
|
* @return array
|
|
* @see get_entry_system_attrs
|
|
* @see get_object_attr
|
|
*/
|
|
function get_object_attrs( $ldapserver, $dn, $lower_case_attr_names=false, $deref=LDAP_DEREF_NEVER ) {
|
|
|
|
$search = @ldap_read( $ldapserver->connect(), $dn, '(objectClass=*)', array( ), 0, 0, 0, $deref );
|
|
if( ! $search )
|
|
return false;
|
|
|
|
$entry = ldap_first_entry( $ldapserver->connect(), $search );
|
|
if( ! $entry )
|
|
return false;
|
|
|
|
$attrs = ldap_get_attributes( $ldapserver->connect(), $entry );
|
|
if( ! $attrs || $attrs['count'] == 0 )
|
|
return false;
|
|
|
|
$num_attrs = $attrs['count'];
|
|
unset( $attrs['count'] );
|
|
|
|
// strip numerical inices
|
|
for( $i=0; $i<$num_attrs; $i++ )
|
|
unset( $attrs[$i] );
|
|
|
|
$return_array = array();
|
|
foreach( $attrs as $attr => $vals ) {
|
|
if( $lower_case_attr_names )
|
|
$attr = strtolower( $attr );
|
|
|
|
if( is_attr_binary( $ldapserver, $attr ) )
|
|
$vals = ldap_get_values_len( $ldapserver->connect(), $entry, $attr );
|
|
|
|
unset( $vals['count'] );
|
|
$return_array[ $attr ] = $vals;
|
|
}
|
|
|
|
ksort( $return_array );
|
|
return $return_array;
|
|
}
|
|
|
|
/**
|
|
* Returns true if the passed string $temp contains all printable
|
|
* ASCII characters. Otherwise (like if it contains binary data),
|
|
* returns false.
|
|
*/
|
|
function is_printable_str($temp) {
|
|
$len = strlen($temp);
|
|
|
|
for ($i=0; $i<$len; $i++) {
|
|
$ascii_val = ord( substr( $temp,$i,1 ) );
|
|
if( $ascii_val < 32 || $ascii_val > 126 )
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Much like get_object_attrs(), but only returns the values for
|
|
* one attribute of an object. Example calls:
|
|
*
|
|
* <code>
|
|
* print_r( get_object_attr( 0, "cn=Bob,ou=people,dc=example,dc=com", "sn" ) );
|
|
* // prints:
|
|
* // Array
|
|
* // (
|
|
* // [0] => "Smith"
|
|
* // )
|
|
*
|
|
* print_r( get_object_attr( 0, "cn=Bob,ou=people,dc=example,dc=com", "objectClass" ) );
|
|
* // prints:
|
|
* // Array
|
|
* // (
|
|
* // [0] => "top"
|
|
* // [1] => "person"
|
|
* // )
|
|
* </code>
|
|
*
|
|
* @param int $server_id The ID of the server of interest
|
|
* @param string $dn The distinguished name (DN) of the entry whose attributes/values to fetch.
|
|
* @param string $attr The attribute whose value(s) to return (ie, "objectClass", "cn", "userPassword")
|
|
* @param bool $lower_case_attr_names (optional) If true, all keys of the returned associative
|
|
* array will be lower case. Otherwise, they will be cased as the LDAP server returns
|
|
* them.
|
|
* @param int $deref For aliases and referrals, this parameter specifies whether to
|
|
* follow references to the referenced DN or to fetch the attributes for
|
|
* the referencing DN. See http://php.net/ldap_search for the 4 valid
|
|
* options.
|
|
* @see get_object_attrs
|
|
*/
|
|
function get_object_attr( $ldapserver, $dn, $attr, $lower_case_attr_names=false, $deref=LDAP_DEREF_NEVER ) {
|
|
if ($lower_case_attr_names)
|
|
$attr = strtolower( $attr );
|
|
|
|
$attrs = get_object_attrs( $ldapserver, $dn, $lower_case_attr_names, $deref );
|
|
if( isset( $attrs[$attr] ) )
|
|
return $attrs[$attr];
|
|
else
|
|
return false;
|
|
|
|
//echo "get_object_attr( $server_id, $dn, $attr )<br />";
|
|
|
|
/*
|
|
$search = @ldap_read( $ldapesrver->connect(), $dn, '(objectClass=*)', array( $attr ), 0, 0, 0, $deref );
|
|
if( ! $search )
|
|
return false;
|
|
|
|
$entry = ldap_first_entry( $ldapesrver->connect(), $search );
|
|
if( ! $entry )
|
|
return false;
|
|
|
|
$attrs = ldap_get_attributes( $ldapesrver->connect(), $entry );
|
|
if( ! $attrs || $attrs['count'] == 0 )
|
|
return false;
|
|
|
|
if( is_attr_binary( $ldapserver, $attr ) )
|
|
$vals = ldap_get_values_len( $ldapesrver->connect(), $entry, $attr );
|
|
else
|
|
$vals = ldap_get_values( $ldapesrver->connect(), $entry, $attr );
|
|
unset( $vals['count'] );
|
|
return $vals;
|
|
*/
|
|
}
|
|
|
|
/**
|
|
* A handy ldap searching function very similar to PHP's ldap_search() with the
|
|
* following exceptions: Callers may specify a search scope and the return value
|
|
* is an array containing the search results rather than an LDAP result resource.
|
|
*
|
|
* Example usage:
|
|
* <code>
|
|
* $samba_users = ldap_search( 0, "(&(objectClass=sambaAccount)(objectClass=posixAccount))",
|
|
* "ou=People,dc=example,dc=com", array( "uid", "homeDirectory" ) );
|
|
* print_r( $samba_users );
|
|
* // prints (for example):
|
|
* // Array
|
|
* // (
|
|
* // [uid=jsmith,ou=People,dc=example,dc=com] => Array
|
|
* // (
|
|
* // [dn] => "uid=jsmith,ou=People,dc=example,dc=com"
|
|
* // [uid] => "jsmith"
|
|
* // [homeDirectory] => "\\server\jsmith"
|
|
* // )
|
|
* // [uid=byoung,ou=People,dc=example,dc=com] => Array
|
|
* // (
|
|
* // [dn] => "uid=byoung,ou=Samba,ou=People,dc=example,dc=com"
|
|
* // [uid] => "byoung"
|
|
* // [homeDirectory] => "\\server\byoung"
|
|
* // )
|
|
* // )
|
|
* </code>
|
|
*
|
|
* WARNING: This function will use a lot of memory on large searches since the entire result set is
|
|
* stored in a single array. For large searches, you should consider sing the less memory intensive
|
|
* PHP LDAP API directly (ldap_search(), ldap_next_entry(), ldap_next_attribute(), etc).
|
|
*
|
|
* @param int $server_id The ID of the server to search on.
|
|
* @param string $filter The LDAP filter to use when searching (example: "(objectClass=*)") (see RFC 2254)
|
|
* @param string $base_dn The DN of the base of search.
|
|
* @param array $attrs An array of attributes to include in the search result (example: array( "objectClass", "uid", "sn" )).
|
|
* @param string $scope The LDAP search scope. Must be one of "base", "one", or "sub". Standard LDAP search scope.
|
|
* @param bool $sort_results Specify false to not sort results by DN or true to have the
|
|
* returned array sorted by DN (uses ksort)
|
|
* @param int $deref When handling aliases or referrals, this specifies whether to follow referrals. Must be one of
|
|
* LDAP_DEREF_ALWAYS, LDAP_DEREF_NEVER, LDAP_DEREF_SEARCHING, or LDAP_DEREF_FINDING. See the PHP LDAP API for details.
|
|
*/
|
|
function pla_ldap_search( $ldapserver, $filter, $base_dn=null, $attrs=array(), $scope='sub', $sort_results=true, $deref=LDAP_DEREF_ALWAYS ) {
|
|
|
|
if( $base_dn == null )
|
|
$base_dn = $ldapserver->getBaseDN();
|
|
|
|
switch( $scope ) {
|
|
case 'base':
|
|
$search = @ldap_read( $ldapserver->connect(false), $base_dn, $filter, $attrs, 0, 0, 0, $deref );
|
|
break;
|
|
case 'one':
|
|
$search = @ldap_list( $ldapserver->connect(false), $base_dn, $filter, $attrs, 0, 0, 0, $defef );
|
|
break;
|
|
case 'sub':
|
|
default:
|
|
$search = @ldap_search( $ldapserver->connect(false), $base_dn, $filter, $attrs, 0, 0, 0, $deref );
|
|
break;
|
|
}
|
|
|
|
if( ! $search )
|
|
return array();
|
|
|
|
$return = array();
|
|
|
|
//get the first entry identifier
|
|
if( $entry_id = ldap_first_entry($ldapserver->connect(false),$search) )
|
|
|
|
//iterate over the entries
|
|
while($entry_id) {
|
|
|
|
//get the distinguished name of the entry
|
|
$dn = ldap_get_dn($ldapserver->connect(false),$entry_id);
|
|
|
|
//get the attributes of the entry
|
|
$attrs = ldap_get_attributes($ldapserver->connect(false),$entry_id);
|
|
$return[$dn]['dn'] = $dn;
|
|
|
|
//get the first attribute of the entry
|
|
if($attr = ldap_first_attribute($ldapserver->connect(false),$entry_id,$attrs))
|
|
|
|
//iterate over the attributes
|
|
while($attr) {
|
|
if( is_attr_binary($ldapserver,$attr))
|
|
$values = ldap_get_values_len($ldapserver->connect(false),$entry_id,$attr);
|
|
else
|
|
$values = ldap_get_values($ldapserver->connect(false),$entry_id,$attr);
|
|
|
|
//get the number of values for this attribute
|
|
$count = $values['count'];
|
|
unset($values['count']);
|
|
if($count==1)
|
|
$return[$dn][$attr] = $values[0];
|
|
else
|
|
$return[$dn][$attr] = $values;
|
|
|
|
$attr = ldap_next_attribute($ldapserver->connect(false),$entry_id,$attrs);
|
|
}// end while attr
|
|
|
|
$entry_id = ldap_next_entry($ldapserver->connect(false),$entry_id);
|
|
|
|
} // end while entry_id
|
|
|
|
if( $sort_results && is_array( $return ) )
|
|
ksort( $return );
|
|
|
|
return $return;
|
|
}
|
|
|
|
/**
|
|
* Reads the query, checks all values and sets defaults.
|
|
*
|
|
* @param int $query_id The ID of the predefined query.
|
|
* @return array The fixed query or null on error
|
|
* @todo Fix base_dn processing and use getBaseDN()
|
|
* @todo expand_dn_with_base no longer knows what the base_dn is, so you need to pass it the base, need to fix this function.
|
|
*/
|
|
function get_cleaned_up_predefined_search( $query_id )
|
|
{
|
|
global $queries;
|
|
|
|
if( ! isset( $queries[$query_id] ) )
|
|
return null;
|
|
|
|
$query = $queries[$query_id];
|
|
|
|
if( isset( $query['server'] ) && ( is_numeric( $query['server'] ) ) )
|
|
$server_id = $query['server'];
|
|
else $server_id = 0;
|
|
|
|
$ldapserver = new LDAPServer($server_id);
|
|
|
|
$base = ( isset( $query['base'] ) ) ? $query['base'] : null;
|
|
$base = expand_dn_with_base( $ldapserver, $base );
|
|
|
|
if( isset( $query['filter'] ) && strlen( trim( $query['filter'] ) ) > 0 )
|
|
$filter = $query['filter'];
|
|
else
|
|
$filter = 'objectclass=*';
|
|
|
|
$scope = isset( $query['scope'] )
|
|
&& ( in_array( $query['scope'], array( 'base', 'sub', 'one' ) ) )
|
|
? $query['scope'] : 'sub';
|
|
|
|
if( isset( $query['attributes'] ) && strlen( trim( $query['filter'] ) ) > 0 )
|
|
$attrib = $query['attributes'];
|
|
else
|
|
$attrib = "dn, cn, sn, objectClass";
|
|
|
|
return array (
|
|
'server' => $server_id, 'base' => $base,
|
|
'filter' => $filter, 'scope' => $scope, 'attributes' => $attrib );
|
|
}
|
|
|
|
/**
|
|
* Transforms the user-configured search lists into arrays for use by other components of phpLDAPadmin.
|
|
* This may seem a little strange, and that's because it is strange.
|
|
*
|
|
* The function takes the comma-separated lists (like the search result attribute list) in config.php
|
|
* and turns them into arrays. Only call this ONCE per script. Any subsequent call will
|
|
* mess up the arrays. This function operates on global variables defined in config.php and is currently
|
|
* only used by search_form_simple.php
|
|
*
|
|
* For more details, just read the function's code. It's short and pretty straightforward.
|
|
*/
|
|
function process_config()
|
|
{
|
|
global $search_result_attributes;
|
|
$search_result_attributes = explode( ",", $search_result_attributes );
|
|
array_walk( $search_result_attributes, "trim_it" );
|
|
|
|
global $search_attributes_display;
|
|
$search_attributes_display = explode( ",", $search_attributes_display );
|
|
array_walk( $search_attributes_display, "trim_it" );
|
|
|
|
global $search_attributes;
|
|
$search_attributes= explode( ",", $search_attributes);
|
|
array_walk( $search_attributes, "trim_it" );
|
|
|
|
if( count( $search_attributes ) != count( $search_attributes_display ) )
|
|
pla_error( $lang['search_attrs_wrong_count'] );
|
|
}
|
|
|
|
/**
|
|
* Trim a string in place (call by reference) Used to filter empty entries out of the arrays
|
|
* that we generate in process_config().
|
|
*
|
|
* @see process_config
|
|
*/
|
|
function trim_it( &$str ) {
|
|
$str = trim($str);
|
|
}
|
|
|
|
/**
|
|
* Checks the specified server id for sanity. Ensures that the server is indeed in the configured
|
|
* list and active. This is used by many many scripts to ensure that valid server ID values
|
|
* are passed in POST and GET.
|
|
* @deprecated
|
|
*/
|
|
function check_server_id( $server_id )
|
|
{
|
|
global $servers;
|
|
if( ! is_numeric( $server_id ) || ! isset( $servers[$server_id] ) || ! isset( $servers[$server_id]['host'] ) || $servers[$server_id]['host'] == '' )
|
|
return false;
|
|
else
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Used to generate a random salt for crypt-style passwords. Salt strings are used
|
|
* to make pre-built hash cracking dictionaries difficult to use as the hash algorithm uses
|
|
* not only the user's password but also a randomly generated string. The string is
|
|
* stored as the first N characters of the hash for reference of hashing algorithms later.
|
|
*
|
|
* --- added 20021125 by bayu irawan <bayuir@divnet.telkom.co.id> ---
|
|
* --- ammended 20030625 by S C Rigler <srigler@houston.rr.com> ---
|
|
*
|
|
* @param int $length The length of the salt string to generate.
|
|
* @return string The generated salt string.
|
|
*/
|
|
function random_salt( $length )
|
|
{
|
|
$possible = '0123456789'.
|
|
'abcdefghijklmnopqrstuvwxyz'.
|
|
'ABCDEFGHIJKLMNOPQRSTUVWXYZ'.
|
|
'./';
|
|
$str = "";
|
|
mt_srand((double)microtime() * 1000000);
|
|
|
|
while( strlen( $str ) < $length )
|
|
$str .= substr( $possible, ( rand() % strlen( $possible ) ), 1 );
|
|
|
|
/**
|
|
* Commented out following line because of problem
|
|
* with crypt function in update.php
|
|
* --- 20030625 by S C Rigler <srigler@houston.rr.com> ---
|
|
*/
|
|
//$str = "\$1\$".$str."\$";
|
|
return $str;
|
|
}
|
|
|
|
/**
|
|
* Given a DN string, this returns the 'RDN' portion of the string.
|
|
* For example. given 'cn=Manager,dc=example,dc=com', this function returns
|
|
* 'cn=Manager' (it is really the exact opposite of get_container()).
|
|
*
|
|
* @param string $dn The DN whose RDN to return.
|
|
* @param bool $include_attrs If true, include attributes in the RDN string.
|
|
* See http://php.net/ldap_explode_dn for details
|
|
*
|
|
* @return string The RDN
|
|
* @see get_container
|
|
*/
|
|
function get_rdn( $dn, $include_attrs=0 )
|
|
{
|
|
if( $dn == null )
|
|
return null;
|
|
$rdn = pla_explode_dn( $dn, $include_attrs );
|
|
if( 0 == count($rdn) )
|
|
return $dn;
|
|
if( ! isset( $rdn[0] ) )
|
|
return $dn;
|
|
$rdn = $rdn[0];
|
|
return $rdn;
|
|
}
|
|
|
|
/**
|
|
* Given a DN string, this returns the parent container portion of the string.
|
|
* For example. given 'cn=Manager,dc=example,dc=com', this function returns
|
|
* 'dc=example,dc=com'.
|
|
*
|
|
* @param string $dn The DN whose container string to return.
|
|
*
|
|
* @return string The container
|
|
* @see get_rdn
|
|
*/
|
|
function get_container( $dn )
|
|
{
|
|
$parts = pla_explode_dn( $dn );
|
|
if( count( $parts ) <= 1 )
|
|
return null;
|
|
$container = $parts[1];
|
|
for( $i=2; $i<count($parts); $i++ )
|
|
$container .= ',' . $parts[$i];
|
|
return $container;
|
|
}
|
|
|
|
/**
|
|
* Given an LDAP error number, returns a verbose description of the error.
|
|
* This function parses ldap_error_codes.txt and looks up the specified
|
|
* ldap error number, and returns the verbose message defined in that file.
|
|
*
|
|
* @param string $err_no The hex error number (ie, "0x42") of the LDAP error of interest.
|
|
* @return array An associative array contianing the error title and description like so:
|
|
* <code>
|
|
* Array
|
|
* (
|
|
* [title] => "Invalid Credentials"
|
|
* [description] => "An invalid username and/or password was supplied to the LDAP server."
|
|
* )
|
|
* </code>
|
|
*/
|
|
function pla_verbose_error( $err_no )
|
|
{
|
|
static $err_codes;
|
|
if( count($err_codes) > 0 ) {
|
|
if( isset( $err_codes[ $err_no ] ) )
|
|
return $err_codes[ $err_no ];
|
|
else
|
|
return array( 'title' => null, 'desc' => null );
|
|
}
|
|
|
|
$err_codes_file = 'ldap_error_codes.txt';
|
|
|
|
if( ! file_exists( realpath( $err_codes_file ) ) )
|
|
return false;
|
|
if( ! is_readable( realpath( $err_codes_file ) ) )
|
|
return false;
|
|
if( ! ($f = fopen( realpath( $err_codes_file ), 'r' ) ) )
|
|
return false;
|
|
|
|
$contents = fread( $f, filesize( $err_codes_file ) );
|
|
fclose( $f );
|
|
$entries = array();
|
|
preg_match_all( "/0x[A-Fa-f0-9][A-Za-z0-9]\s+[0-9A-Za-z_]+\s+\"[^\"]*\"\n/", $contents, $entries );
|
|
$err_codes = array();
|
|
foreach( $entries[0] as $e ) {
|
|
$entry = array();
|
|
preg_match( "/(0x[A-Za-z0-9][A-Za-z0-9])\s+([0-9A-Za-z_]+)\s+\"([^\"]*)\"/", $e, $entry );
|
|
$hex_code = isset( $entry[1] ) ? $entry[1] : null;
|
|
$title = isset( $entry[2] ) ? $entry[2] : null;
|
|
$desc = isset( $entry[3] ) ? $entry[3] : null;
|
|
$desc = preg_replace( "/\s+/", " ", $desc );
|
|
$err_codes[ "$hex_code" ] = array( 'title' => $title, 'desc' => $desc );
|
|
}
|
|
|
|
// Sanity check
|
|
if( isset( $err_codes[ $err_no ] ) )
|
|
return $err_codes[ $err_no ];
|
|
else
|
|
return array( 'title' => null, 'desc' => null );
|
|
}
|
|
|
|
function support_oid_to_text($oid_id)
|
|
{
|
|
static $oid;
|
|
if( count($oid) > 0 ) {
|
|
if( isset( $oid[ $oid_id ] ) )
|
|
return $oid[ $oid_id ];
|
|
|
|
else
|
|
return null;
|
|
}
|
|
|
|
$oid_codes_file = 'ldap_supported_oids.txt';
|
|
|
|
if( ! file_exists( realpath( $oid_codes_file ) ) )
|
|
return false;
|
|
if( ! is_readable( realpath( $oid_codes_file ) ) )
|
|
return false;
|
|
if( ! ($f = fopen( realpath( $oid_codes_file ), 'r' ) ) )
|
|
return false;
|
|
|
|
$contents = fread( $f, filesize( $oid_codes_file ) );
|
|
fclose( $f );
|
|
$entries = array();
|
|
preg_match_all( "/[0-9]\..+\s+\"[^\"]*\"\n/", $contents, $entries );
|
|
$err_codes = array();
|
|
foreach( $entries[0] as $e ) {
|
|
$entry = array();
|
|
preg_match( "/([0-9]\.([0-9]+\.)*[0-9]+)\s+\"([^\"]*)\"/", $e, $entry );
|
|
$oid_id_a = isset( $entry[1] ) ? $entry[1] : null;
|
|
$desc = isset( $entry[3] ) ? $entry[3] : null;
|
|
$desc = preg_replace( "/\s+/", " ", $desc );
|
|
$oid[ "$oid_id_a" ] = $desc;
|
|
}
|
|
|
|
// Sanity check
|
|
if( isset( $oid[ $oid_id ] ) )
|
|
return $oid[ $oid_id ];
|
|
else
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* Prints an HTML-formatted error string. If you specify the optional
|
|
* parameters $ldap_err_msg and $ldap_err_no, this function will
|
|
* lookup the error number and display a verbose message in addition
|
|
* to the message you pass it.
|
|
*
|
|
* @param string $msg The error message to display.
|
|
* @param string $ldap_err_msg (optional) The error message supplied by the LDAP server
|
|
* @param string $ldap_err_no (optional) The hexadecimal error number string supplied by the LDAP server
|
|
* @param bool $fatal (optional) If true, phpLDAPadmin will terminate execution with the PHP die() function.
|
|
*
|
|
* @see die
|
|
* @see ldap_errno
|
|
* @see pla_verbose_error
|
|
*/
|
|
function pla_error( $msg, $ldap_err_msg=null, $ldap_err_no=-1, $fatal=true )
|
|
{
|
|
@include_once './header.php';
|
|
global $lang, $use_syslog;
|
|
|
|
?>
|
|
<center>
|
|
<table class="error"><tr><td class="img"><img src="images/warning.png" /></td>
|
|
<td><center><h2><?php echo $lang['ferror_error'];?></h2></center>
|
|
<?php echo $msg; ?>
|
|
<br />
|
|
<br />
|
|
<?php
|
|
|
|
if ( isset($use_syslog) and $use_syslog )
|
|
syslog_err ( $msg );
|
|
|
|
if( $ldap_err_msg ) {
|
|
echo sprintf($lang['ldap_said'], htmlspecialchars( $ldap_err_msg ));
|
|
echo '<br />';
|
|
}
|
|
|
|
if( $ldap_err_no != -1 ) {
|
|
$ldap_err_no = ( '0x' . str_pad( dechex( $ldap_err_no ), 2, 0, STR_PAD_LEFT ) );
|
|
$verbose_error = pla_verbose_error( $ldap_err_no );
|
|
|
|
if( $verbose_error ) {
|
|
echo sprintf( $lang['ferror_number'], $ldap_err_no, $verbose_error['title']);
|
|
echo '<br />';
|
|
echo sprintf( $lang['ferror_discription'], $verbose_error['desc']);
|
|
} else {
|
|
echo sprintf($lang['ferror_number_short'], $ldap_err_no);
|
|
echo '<br />';
|
|
echo $lang['ferror_discription_short'];
|
|
}
|
|
|
|
if ( isset($use_syslog) and $use_syslog )
|
|
syslog_err ( sprintf($lang['ferror_number_short'], $ldap_err_no) );
|
|
}
|
|
?>
|
|
<br />
|
|
<!-- Commented out due to too many false bug reports. :)
|
|
<br />
|
|
<center>
|
|
<small>
|
|
<?php echo sprintf($lang['ferror_submit_bug'] , get_href( 'add_bug' ));?>
|
|
<?php
|
|
if( function_exists( "debug_print_backtrace" ) )
|
|
debug_print_backtrace();
|
|
?>
|
|
</small>
|
|
</center>
|
|
-->
|
|
</td></tr></table>
|
|
</center>
|
|
<?php
|
|
|
|
if( $fatal ) {
|
|
echo "</body>\n</html>";
|
|
die();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* phpLDAPadmin's custom error handling function. When a PHP error occurs,
|
|
* PHP will call this function rather than printing the typical PHP error string.
|
|
* This provides phpLDAPadmin the ability to format an error message more "pretty"
|
|
* and provide a link for users to submit a bug report. This function is not to
|
|
* be called by users. It is exclusively for the use of PHP internally. If this
|
|
* function is called by PHP from within a context where error handling has been
|
|
* disabled (ie, from within a function called with "@" prepended), then this
|
|
* function does nothing.
|
|
*
|
|
* @param int $errno The PHP error number that occurred (ie, E_ERROR, E_WARNING, E_PARSE, etc).
|
|
* @param string $errstr The PHP error string provided (ie, "Warning index "foo" is undefined)
|
|
* @param string $file The file in which the PHP error ocurred.
|
|
* @param int $lineno The line number on which the PHP error ocurred
|
|
*
|
|
* @see set_error_handler
|
|
*/
|
|
function pla_error_handler( $errno, $errstr, $file, $lineno )
|
|
{
|
|
global $lang;
|
|
|
|
// error_reporting will be 0 if the error context occurred
|
|
// within a function call with '@' preprended (ie, @ldap_bind() );
|
|
// So, don't report errors if the caller has specifically
|
|
// disabled them with '@'
|
|
if( 0 == ini_get( 'error_reporting' ) || 0 == error_reporting() )
|
|
return;
|
|
|
|
$file = basename( $file );
|
|
$caller = basename( $_SERVER['PHP_SELF'] );
|
|
$errtype = "";
|
|
switch( $errno ) {
|
|
case E_STRICT: $errtype = "E_STRICT"; break;
|
|
case E_ERROR: $errtype = "E_ERROR"; break;
|
|
case E_WARNING: $errtype = "E_WARNING"; break;
|
|
case E_PARSE: $errtype = "E_PARSE"; break;
|
|
case E_NOTICE: $errtype = "E_NOTICE"; break;
|
|
case E_CORE_ERROR: $errtype = "E_CORE_ERROR"; break;
|
|
case E_CORE_WARNING: $errtype = "E_CORE_WARNING"; break;
|
|
case E_COMPILE_ERROR: $errtype = "E_COMPILE_ERROR"; break;
|
|
case E_COMPILE_WARNING: $errtype = "E_COMPILE_WARNING"; break;
|
|
case E_USER_ERROR: $errtype = "E_USER_ERROR"; break;
|
|
case E_USER_WARNING: $errtype = "E_USER_WARNING"; break;
|
|
case E_USER_NOTICE: $errtype = "E_USER_NOTICE"; break;
|
|
case E_ALL: $errtype = "E_ALL"; break;
|
|
default: $errtype = $lang['ferror_unrecognized_num'] . $errno;
|
|
}
|
|
|
|
$errstr = preg_replace("/\s+/"," ",$errstr);
|
|
if( $errno == E_NOTICE ) {
|
|
echo sprintf($lang['ferror_nonfatil_bug'], $errstr, $errtype, $file,
|
|
$lineno, $caller, pla_version(), phpversion(), php_sapi_name(),
|
|
$_SERVER['SERVER_SOFTWARE'], get_href('search_bug',"&summary_keyword=".htmlspecialchars($errstr)),get_href('add_bug'));
|
|
return;
|
|
}
|
|
|
|
$server = isset( $_SERVER['SERVER_SOFTWARE'] ) ? $_SERVER['SERVER_SOFTWARE'] : 'undefined';
|
|
$phpself = isset( $_SERVER['PHP_SELF'] ) ? basename( $_SERVER['PHP_SELF'] ) : 'undefined';
|
|
pla_error( sprintf($lang['ferror_congrats_found_bug'], $errstr, $errtype, $file,
|
|
$lineno, $phpself, pla_version(),
|
|
phpversion(), php_sapi_name(), $server ));
|
|
}
|
|
|
|
/**
|
|
* Reads the friendly_attrs array as defined in config.php and lower-cases all
|
|
* the keys. Will return an empty array if the friendly_attrs array is not defined
|
|
* in config.php. This is simply used so we can more easily lookup user-friendly
|
|
* attributes configured by the admin.
|
|
*/
|
|
function process_friendly_attr_table()
|
|
{
|
|
require 'config.php';
|
|
global $friendly_attrs;
|
|
$attrs_table = array();
|
|
if( isset( $friendly_attrs ) && is_array( $friendly_attrs ) )
|
|
foreach( $friendly_attrs as $old_name => $new_name )
|
|
$attrs_table[ strtolower( $old_name ) ] = $new_name;
|
|
else
|
|
return array();
|
|
|
|
return $attrs_table;
|
|
}
|
|
|
|
/**
|
|
* Gets whether an entry exists based on its DN. If the entry exists,
|
|
* returns true. Otherwise returns false.
|
|
*
|
|
* @param object $ldapserver The LDAP Server Object of interest
|
|
* @param string $dn The DN\of the entry of interest.
|
|
*
|
|
* @return bool
|
|
*/
|
|
function dn_exists( $ldapserver, $dn ) {
|
|
$search_result = @ldap_read( $ldapserver->connect(false), $dn, 'objectClass=*', array('dn') );
|
|
|
|
if( ! $search_result )
|
|
return false;
|
|
|
|
$num_entries = ldap_count_entries( $ldapserver->connect(false), $search_result );
|
|
|
|
if( $num_entries > 0 )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Draw the jpegPhoto image(s) for an entry wrapped in HTML. Many options are available to
|
|
* specify how the images are to be displayed.
|
|
*
|
|
* Usage Examples:
|
|
* <code>
|
|
* draw_jpeg_photos( 0, "cn=Bob,ou=People,dc=example,dc=com", "jpegPhoto" true, false, "border: 1px; width: 150px" );
|
|
* draw_jpeg_photos( 1, "cn=Fred,ou=People,dc=example,dc=com" );
|
|
* </code>
|
|
*
|
|
* @param int $server_id The ID of the server of interest.
|
|
* @param string $dn The DN of the entry that contains the jpeg attribute you want to draw.
|
|
* @param string $attr_name The name of the attribute containing the jpeg data (usually 'jpegPhoto').
|
|
* @param bool $draw_delete_buttons If true, draws a button beneath the image titled 'Delete' allowing the user
|
|
* to delete the jpeg attribute by calling JavaScript function deleteAttribute() provided
|
|
* in the default modification template.
|
|
* @param bool $draw_bytes_and_size If true, draw text below the image indicating the byte size and dimensions.
|
|
* @param string $table_html_attrs Specifies optional CSS style attributes for the table tag.
|
|
*
|
|
* @return void
|
|
*/
|
|
function draw_jpeg_photos( $ldapserver, $dn, $attr_name='jpegPhoto', $draw_delete_buttons=false,
|
|
$draw_bytes_and_size=true, $table_html_attrs='align="left"', $img_html_attrs='' ) {
|
|
global $jpeg_temp_dir;
|
|
global $jpeg_tmp_keep_time;
|
|
global $lang;
|
|
|
|
$search_result = ldap_read( $ldapserver->connect(), $dn, 'objectClass=*', array( $attr_name ) );
|
|
$entry = ldap_first_entry( $ldapserver->connect(), $search_result );
|
|
|
|
echo "<table $table_html_attrs><td><center>\n\n";
|
|
|
|
// for each jpegPhoto in the entry, draw it (there may be only one, and that's okay)
|
|
$jpeg_data = @ldap_get_values_len( $ldapserver->connect(), $entry, $attr_name );
|
|
if( ! is_array( $jpeg_data ) ) {
|
|
printf( $lang['jpeg_unable_toget'], htmlspecialchars( $attr_name ));
|
|
return;
|
|
}
|
|
|
|
for( $i=0; $i<$jpeg_data['count']; $i++ ) {
|
|
// ensures that the photo is written to the specified jpeg_temp_dir
|
|
$jpeg_temp_dir = realpath($jpeg_temp_dir.'/');
|
|
if( ! is_writable( $jpeg_temp_dir ) )
|
|
pla_error( $lang['jpeg_dir_not_writable'] );
|
|
|
|
$jpeg_filename = tempnam($jpeg_temp_dir.'/', 'pla');
|
|
$outjpeg = @fopen($jpeg_filename, "wb");
|
|
if( ! $outjpeg )
|
|
pla_error( sprintf( $lang['jpeg_dir_not_writable_error'],$jpeg_temp_dir ));
|
|
fwrite($outjpeg, $jpeg_data[$i]);
|
|
fclose ($outjpeg);
|
|
|
|
$jpeg_data_size = filesize( $jpeg_filename );
|
|
if( $jpeg_data_size < 6 && $draw_delete_buttons ) {
|
|
echo $lang['jpeg_contains_errors'];
|
|
echo '<a href="javascript:deleteAttribute( \'' . $attr_name . '\' );" style="color:red; font-size: 75%">'. $lang['delete_photo'] .'</a>';
|
|
continue;
|
|
}
|
|
|
|
if( function_exists( 'getimagesize' ) ) {
|
|
$jpeg_dimensions = @getimagesize( $jpeg_filename );
|
|
$width = $jpeg_dimensions[0];
|
|
$height = $jpeg_dimensions[1];
|
|
|
|
} else {
|
|
$width = 0;
|
|
$height = 0;
|
|
}
|
|
|
|
if( $width > 300 ) {
|
|
$scale_factor = 300 / $width;
|
|
$img_width = 300;
|
|
$img_height = $height * $scale_factor;
|
|
|
|
} else {
|
|
$img_width = $width;
|
|
$img_height = $height;
|
|
}
|
|
|
|
echo "<img width=\"$img_width\" height=\"$img_height\" $img_html_attrs
|
|
src=\"view_jpeg_photo.php?file=" . basename($jpeg_filename) . "\" /><br />\n";
|
|
|
|
if( $draw_bytes_and_size ) {
|
|
echo "<small>" . number_format($jpeg_data_size) . " bytes. ";
|
|
echo "$width x $height pixels.<br /></small>\n\n";
|
|
}
|
|
|
|
if( $draw_delete_buttons ) { ?>
|
|
<!-- JavaScript function deleteJpegPhoto() to be defined later by calling script -->
|
|
<a href="javascript:deleteAttribute( '<?php echo $attr_name; ?>' );" style="color:red; font-size: 75%"><?php echo $lang['jpeg_delete'] ?></a>
|
|
<?php }
|
|
}
|
|
echo "</center></td></table>\n\n";
|
|
|
|
// If they have misconfigured their config.php, use default values
|
|
if( ! isset( $jpeg_tmp_keep_time ) )
|
|
$jpeg_tmp_keep_time = 120;
|
|
|
|
// If they set keep time to 0, we up it to 10 to allow the browser to fetch it before it is deleted.
|
|
if( $jpeg_tmp_keep_time == 0 )
|
|
$jpeg_tmp_keep_time = 10;
|
|
|
|
// delete old jpeg files.
|
|
$jpegtmp_wildcard = "/^pla/";
|
|
$handle = opendir($jpeg_temp_dir);
|
|
while( ($file = readdir($handle) ) != false ) {
|
|
if( preg_match( $jpegtmp_wildcard, $file ) ) {
|
|
$file = "$jpeg_temp_dir/$file";
|
|
if( (time() - filemtime($file) ) > $jpeg_tmp_keep_time )
|
|
@unlink( $file );
|
|
}
|
|
}
|
|
closedir($handle);
|
|
}
|
|
|
|
/**
|
|
* Hashes a password and returns the hash based on the specified enc_type.
|
|
*
|
|
* @param string $password_clear The password to hash in clear text.
|
|
* @param string $enc_type Standard LDAP encryption type which must be one of
|
|
* crypt, ext_des, md5crypt, blowfish, md5, sha, smd5, ssha, or clear.
|
|
* @return string The hashed password.
|
|
*/
|
|
function password_hash( $password_clear, $enc_type ) {
|
|
global $lang;
|
|
|
|
$enc_type = strtolower( $enc_type );
|
|
|
|
switch( $enc_type ) {
|
|
case 'crypt':
|
|
$new_value = '{CRYPT}' . crypt( $password_clear, random_salt(2) );
|
|
break;
|
|
|
|
case 'ext_des':
|
|
// extended des crypt. see OpenBSD crypt man page.
|
|
if ( ! defined( 'CRYPT_EXT_DES' ) || CRYPT_EXT_DES == 0 )
|
|
pla_error( $lang['install_not_support_ext_des'] );
|
|
|
|
$new_value = '{CRYPT}' . crypt( $password_clear, '_' . random_salt(8) );
|
|
break;
|
|
|
|
case 'md5crypt':
|
|
if( ! defined( 'CRYPT_MD5' ) || CRYPT_MD5 == 0 )
|
|
pla_error( $lang['install_not_support_md5crypt'] );
|
|
|
|
$new_value = '{CRYPT}' . crypt( $password_clear , '$1$' . random_salt(9) );
|
|
break;
|
|
|
|
case 'blowfish':
|
|
if( ! defined( 'CRYPT_BLOWFISH' ) || CRYPT_BLOWFISH == 0 )
|
|
pla_error( $lang['install_not_support_blowfish'] );
|
|
|
|
// hardcoded to second blowfish version and set number of rounds
|
|
$new_value = '{CRYPT}' . crypt( $password_clear , '$2a$12$' . random_salt(13) );
|
|
break;
|
|
|
|
case 'md5':
|
|
$new_value = '{MD5}' . base64_encode( pack( 'H*' , md5( $password_clear) ) );
|
|
break;
|
|
|
|
case 'sha':
|
|
if( function_exists('sha1') ) {
|
|
// use php 4.3.0+ sha1 function, if it is available.
|
|
$new_value = '{SHA}' . base64_encode( pack( 'H*' , sha1( $password_clear) ) );
|
|
|
|
} elseif( function_exists( 'mhash' ) ) {
|
|
$new_value = '{SHA}' . base64_encode( mhash( MHASH_SHA1, $password_clear) );
|
|
|
|
} else {
|
|
pla_error( $lang['install_no_mash'] );
|
|
}
|
|
break;
|
|
|
|
case 'ssha':
|
|
if( function_exists( 'mhash' ) && function_exists( 'mhash_keygen_s2k' ) ) {
|
|
mt_srand( (double) microtime() * 1000000 );
|
|
$salt = mhash_keygen_s2k( MHASH_SHA1, $password_clear, substr( pack( "h*", md5( mt_rand() ) ), 0, 8 ), 4 );
|
|
$new_value = "{SSHA}".base64_encode( mhash( MHASH_SHA1, $password_clear.$salt ).$salt );
|
|
|
|
} else {
|
|
pla_error( $lang['install_no_mash'] );
|
|
}
|
|
break;
|
|
|
|
case 'smd5':
|
|
if( function_exists( 'mhash' ) && function_exists( 'mhash_keygen_s2k' ) ) {
|
|
mt_srand( (double) microtime() * 1000000 );
|
|
$salt = mhash_keygen_s2k( MHASH_MD5, $password_clear, substr( pack( "h*", md5( mt_rand() ) ), 0, 8 ), 4 );
|
|
$new_value = "{SMD5}".base64_encode( mhash( MHASH_MD5, $password_clear.$salt ).$salt );
|
|
|
|
} else {
|
|
pla_error( $lang['install_no_mash'] );
|
|
}
|
|
break;
|
|
|
|
case 'clear':
|
|
default:
|
|
$new_value = $password_clear;
|
|
}
|
|
|
|
return $new_value;
|
|
}
|
|
|
|
/**
|
|
* Given a clear-text password and a hash, this function determines if the clear-text password
|
|
* is the password that was used to generate the hash. This is handy to verify a user's password
|
|
* when all that is given is the hash and a "guess".
|
|
* @param String $hash The hash.
|
|
* @param String $clear The password in clear text to test.
|
|
* @return Boolean True if the clear password matches the hash, and false otherwise.
|
|
*/
|
|
function password_check( $cryptedpassword, $plainpassword ) {
|
|
|
|
//echo "password_check( $cryptedpassword, $plainpassword )\n";
|
|
if( preg_match( "/{([^}]+)}(.*)/", $cryptedpassword, $cypher ) ) {
|
|
$cryptedpassword = $cypher[2];
|
|
$_cypher = strtolower($cypher[1]);
|
|
|
|
} else {
|
|
$_cypher = NULL;
|
|
}
|
|
|
|
switch( $_cypher ) {
|
|
// SSHA crypted passwords
|
|
case 'ssha':
|
|
// check php mhash support before using it
|
|
if( function_exists( 'mhash' ) ) {
|
|
$hash = base64_decode($cryptedpassword);
|
|
$salt = substr($hash, -4);
|
|
$new_hash = base64_encode( mhash( MHASH_SHA1, $plainpassword.$salt).$salt );
|
|
|
|
if( strcmp( $cryptedpassword, $new_hash ) == 0 )
|
|
return true;
|
|
else
|
|
return false;
|
|
|
|
} else {
|
|
pla_error( $lang['install_no_mash'] );
|
|
}
|
|
break;
|
|
|
|
// Salted MD5
|
|
case 'smd5':
|
|
// check php mhash support before using it
|
|
if( function_exists( 'mhash' ) ) {
|
|
$hash = base64_decode($cryptedpassword);
|
|
$salt = substr($hash, -4);
|
|
$new_hash = base64_encode( mhash( MHASH_MD5, $plainpassword.$salt).$salt );
|
|
|
|
if( strcmp( $cryptedpassword, $new_hash ) == 0)
|
|
return true;
|
|
else
|
|
return false;
|
|
|
|
} else {
|
|
pla_error( $lang['install_no_mash'] );
|
|
}
|
|
break;
|
|
|
|
// SHA crypted passwords
|
|
case 'sha':
|
|
if( strcasecmp( password_hash($plainpassword,'sha' ), "{SHA}".$cryptedpassword ) == 0 )
|
|
return true;
|
|
else
|
|
return false;
|
|
break;
|
|
|
|
// MD5 crypted passwords
|
|
case 'md5':
|
|
if( strcasecmp( password_hash( $plainpassword,'md5' ), "{MD5}".$cryptedpassword ) == 0 )
|
|
return true;
|
|
else
|
|
return false;
|
|
break;
|
|
|
|
// Crypt passwords
|
|
case 'crypt':
|
|
// Check if it's blowfish crypt
|
|
if( preg_match("/^\\$2+/",$cryptedpassword ) ) {
|
|
|
|
// make sure that web server supports blowfish crypt
|
|
if( ! defined( 'CRYPT_BLOWFISH' ) || CRYPT_BLOWFISH == 0 )
|
|
pla_error( $lang['install_not_support_blowfish'] );
|
|
|
|
list(,$version,$rounds,$salt_hash) = explode('$',$cryptedpassword);
|
|
|
|
if( crypt( $plainpassword, '$'. $version . '$' . $rounds . '$' .$salt_hash ) == $cryptedpassword )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
// Check if it's an crypted md5
|
|
elseif( strstr( $cryptedpassword, '$1$' ) ) {
|
|
|
|
// make sure that web server supports md5 crypt
|
|
if( ! defined( 'CRYPT_MD5' ) || CRYPT_MD5 == 0 )
|
|
pla_error( $lang['install_not_support_md5crypt'] );
|
|
|
|
list(,$type,$salt,$hash) = explode('$',$cryptedpassword);
|
|
|
|
if( crypt( $plainpassword, '$1$' .$salt ) == $cryptedpassword )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
// Check if it's extended des crypt
|
|
elseif (strstr( $cryptedpassword, '_' ) ) {
|
|
|
|
// make sure that web server supports ext_des
|
|
if ( ! defined( 'CRYPT_EXT_DES' ) || CRYPT_EXT_DES == 0 )
|
|
pla_error( $lang['install_not_support_ext_des'] );
|
|
|
|
if( crypt($plainpassword, $cryptedpassword ) == $cryptedpassword )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
|
|
// Password is plain crypt
|
|
else {
|
|
|
|
if( crypt($plainpassword, $cryptedpassword ) == $cryptedpassword )
|
|
return true;
|
|
else
|
|
return false;
|
|
}
|
|
break;
|
|
|
|
// No crypt is given assume plaintext passwords are used
|
|
default:
|
|
if( $plainpassword == $cryptedpassword )
|
|
return true;
|
|
else
|
|
return false;
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Detects password encryption type
|
|
*
|
|
* Returns crypto string listed in braces. If it is 'crypt' password,
|
|
* returns crypto detected in password hash. Function should detect
|
|
* md5crypt, blowfish and extended DES crypt. If function fails to detect
|
|
* encryption type, it returns NULL.
|
|
* @param string hashed password
|
|
* @return string
|
|
*/
|
|
function get_enc_type( $user_password ) {
|
|
/* Capture the stuff in the { } to determine if this is crypt, md5, etc. */
|
|
$enc_type = null;
|
|
|
|
if( preg_match( "/{([^}]+)}/", $user_password, $enc_type) )
|
|
$enc_type = strtolower( $enc_type[1] );
|
|
else
|
|
return null;
|
|
|
|
/* handle crypt types */
|
|
if( strcasecmp( $enc_type, 'crypt') == 0 ) {
|
|
|
|
if( preg_match( "/{[^}]+}\\$1\\$+/", $user_password) ) {
|
|
$enc_type = "md5crypt";
|
|
|
|
} elseif ( preg_match( "/{[^}]+}\\$2+/", $user_password) ) {
|
|
$enc_type = "blowfish";
|
|
|
|
} elseif ( preg_match( "/{[^}]+}_+/", $user_password) ) {
|
|
$enc_type = "ext_des";
|
|
}
|
|
|
|
/*
|
|
* No need to check for standard crypt,
|
|
* because enc_type is already equal to 'crypt'.
|
|
*/
|
|
}
|
|
return $enc_type;
|
|
}
|
|
|
|
/**
|
|
* Gets the default enc_type configured in config.php for the server indicated by $server_id;
|
|
* @param int $server_id The ID of the server of interest.
|
|
* @return String The enc_type, like 'sha', 'md5', 'ssha', 'md5crypt', for example.
|
|
*/
|
|
function get_default_hash( $server_id )
|
|
{
|
|
global $servers;
|
|
if( isset( $servers[$server_id]['default_hash'] ) )
|
|
return $servers[$server_id]['default_hash'];
|
|
else
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* Returns the phpLDAPadmin version currently running. The version
|
|
* is read from the file named VERSION.
|
|
*
|
|
* @return string The current version as read from the VERSION file.
|
|
*/
|
|
function pla_version()
|
|
{
|
|
if( ! file_exists( realpath( 'VERSION' ) ) )
|
|
return 'unknown version';
|
|
|
|
$f = fopen( realpath( 'VERSION' ), 'r' );
|
|
$version = fread( $f, filesize( realpath( 'VERSION' ) ) );
|
|
fclose( $f );
|
|
return $version;
|
|
}
|
|
|
|
/**
|
|
* Draws an HTML browse button which, when clicked, pops up a DN chooser dialog.
|
|
* @param string $form_element The name of the form element to which this chooser
|
|
* dialog will publish the user's choice. The form element must be a member
|
|
* of a form with the "name" or "id" attribute set in the form tag, and the element
|
|
* must also define "name" or "id" for JavaScript to uniquely identify it.
|
|
* Example $form_element values may include "creation_form.container" or
|
|
* "edit_form.member_uid". See /templates/modification/default.php for example usage.
|
|
* @param bool $include_choose_text (optional) If true, the function draws the localized text "choose" to the right of the button.
|
|
*/
|
|
function draw_chooser_link( $form_element, $include_choose_text=true, $rdn="none" )
|
|
{
|
|
global $lang;
|
|
if ($rdn == "none") {
|
|
$href = "javascript:dnChooserPopup('$form_element', '');";
|
|
}
|
|
else {
|
|
$href = "javascript:dnChooserPopup('$form_element', '$rdn');";
|
|
}
|
|
$title = $lang['chooser_link_tooltip'];
|
|
echo "<nobr><a href=\"$href\" title=\"$title\"><img class=\"chooser\" src=\"images/find.png\" /></a>";
|
|
if( $include_choose_text )
|
|
echo "<span class=\"x-small\"><a href=\"$href\" title=\"$title\">". $lang['fbrowse'] ."</a></span>";
|
|
echo "</nobr>";
|
|
}
|
|
|
|
/**
|
|
* Explode a DN into an array of its RDN parts. This function is UTF-8 safe
|
|
* and replaces the buggy PHP ldap_explode_dn() which does not properly
|
|
* handle UTF-8 DNs and also causes segmentation faults with some inputs.
|
|
*
|
|
* @param string $dn The DN to explode.
|
|
* @param int $with_attriutes (optional) Whether to include attribute names (see http://php.net/ldap_explode_dn for details)
|
|
*
|
|
* @return array An array of RDN parts of this format:
|
|
* <code>
|
|
* Array
|
|
* (
|
|
* [0] => uid=ppratt
|
|
* [1] => ou=People
|
|
* [2] => dc=example
|
|
* [3] => dc=com
|
|
* )
|
|
* </code>
|
|
*/
|
|
function pla_explode_dn( $dn, $with_attributes=0 )
|
|
{
|
|
// replace "\," with the hexadecimal value for safe split
|
|
$var = preg_replace("/\\\,/","\\\\\\\\2C",$dn);
|
|
|
|
// split the dn
|
|
$result = explode(",",$var);
|
|
|
|
//translate hex code into ascii for display
|
|
foreach( $result as $key => $value )
|
|
$result[$key] = preg_replace("/\\\([0-9A-Fa-f]{2})/e", "''.chr(hexdec('\\1')).''", $value);
|
|
|
|
return $result;
|
|
}
|
|
|
|
/**
|
|
* Fetches the URL for the specified item. This is a convenience function for
|
|
* fetching project HREFs (like bugs)
|
|
*
|
|
* @param string $type One of "open_bugs", "add_bug", "donate", or "add_rfe"
|
|
* (rfe = request for enhancement)
|
|
* @return string The URL to the requested item.
|
|
*/
|
|
function get_href( $type, $extra_info='' )
|
|
{
|
|
$group_id = "61828";
|
|
$bug_atid = "498546";
|
|
$rfe_atid = "498549";
|
|
$forum_id = "34809";
|
|
switch( $type ) {
|
|
case 'open_bugs': return "https://sourceforge.net/tracker/?group_id=$group_id&atid=$bug_atid";
|
|
case 'add_bug': return "https://sourceforge.net/tracker/?func=add&group_id=$group_id&atid=$bug_atid";
|
|
case 'add_rfe': return "https://sourceforge.net/tracker/?func=add&group_id=$group_id&atid=$rfe_atid";
|
|
case 'forum': return "http://sourceforge.net/mailarchive/forum.php?forum_id=$forum_id";
|
|
case 'search_bug': return "https://sourceforge.net/tracker/?func=search&group_id=$group_id&atid=$bug_atid&set=custom&_status=100&_group=100&order=summary$extra_info";
|
|
case 'donate': return "donate.php";
|
|
case 'help': return "help.php";
|
|
default: return null;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns the current time as a double (including micro-seconds).
|
|
*
|
|
* @return double The current time in seconds since the beginning of the UNIX epoch (Midnight Jan. 1, 1970)
|
|
*/
|
|
function utime ()
|
|
{
|
|
$time = explode( " ", microtime());
|
|
$usec = (double)$time[0];
|
|
$sec = (double)$time[1];
|
|
return $sec + $usec;
|
|
}
|
|
|
|
/**
|
|
* Converts an array to a query-string with the option to exclude certain variables
|
|
* from the returned query string. This is convenient if callers want to convert the
|
|
* current GET query string or POST array into a string and replace certain
|
|
* variables with their own.
|
|
*
|
|
* @param array $array The associate array to convert whose form is such that the keys are the
|
|
* names of the variables and the values are said variables' values like this:
|
|
* <code>
|
|
* Array
|
|
* (
|
|
* [server_id] = 0,
|
|
* [dn] = "dc=example,dc=com",
|
|
* [attr] = "sn"
|
|
* )
|
|
* </code>
|
|
* This will produce a string like this: "server_id=0&dn=dc=example,dc=com&attr=sn"
|
|
* @param array $exclude_vars (optional) An array of variables to exclude in the resulting string
|
|
* @param bool $url_encode_ampersands (optional) By default, this function encodes all ampersand-separators
|
|
* as & but callers may dislabe this by specifying false here. For example, URLs on HTML
|
|
* pages should encode the ampersands but URLs in header( "Location: http://example.com" ) should
|
|
* not be encoded.
|
|
* @return string The string created from the array.
|
|
*/
|
|
function array_to_query_string( $array, $exclude_vars=array(), $url_encode_ampersands=true )
|
|
{
|
|
if( ! is_array( $array ) )
|
|
return '';
|
|
if( ! $array )
|
|
return '';
|
|
$str = '';
|
|
$i=0;
|
|
foreach( $array as $name => $val ) {
|
|
if( ! in_array( $name, $exclude_vars ) ) {
|
|
if( $i>0 )
|
|
if( $url_encode_ampersands )
|
|
$str .= '&';
|
|
else
|
|
$str .= '&';
|
|
$str .= urlencode( $name ) . '=' . urlencode( $val );
|
|
$i++;
|
|
}
|
|
}
|
|
return $str;
|
|
}
|
|
|
|
/**
|
|
* Reverses a DN such that the top-level RDN is first and the bottom-level RDN is last
|
|
* For example:
|
|
* <code>
|
|
* cn=Brigham,ou=People,dc=example,dc=com
|
|
* </code>
|
|
* Becomes:
|
|
* <code>
|
|
* dc=com,dc=example,ou=People,cn=Brigham
|
|
* </code>
|
|
* This makes it possible to sort lists of DNs such that they are grouped by container.
|
|
*
|
|
* @param string $dn The DN to reverse
|
|
*
|
|
* @return string The reversed DN
|
|
*
|
|
* @see pla_compare_dns
|
|
*/
|
|
function pla_reverse_dn($dn)
|
|
{
|
|
foreach (pla_explode_dn($dn) as $key => $branch) {
|
|
|
|
// pla_expode_dn returns the array with an extra count attribute, we can ignore that.
|
|
if ( $key === "count" ) continue;
|
|
|
|
if (isset($rev)) {
|
|
$rev = $branch.",".$rev;
|
|
} else {
|
|
$rev = $branch;
|
|
}
|
|
}
|
|
return $rev;
|
|
}
|
|
|
|
/**
|
|
* Determins if the specified attribute is contained in the $unique_attrs list
|
|
* configured in config.php.
|
|
* @return Bool True if the specified attribute is in the $unique_attrs list and false
|
|
* otherwise.
|
|
*/
|
|
function is_unique_attr( $attr_name )
|
|
{
|
|
global $unique_attrs;
|
|
if( isset( $unique_attrs ) && is_array( $unique_attrs ) ) {
|
|
foreach( $unique_attrs as $attr )
|
|
if( 0 === strcasecmp( $attr_name, $attr ) )
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* This function will check whether the value for an attribute being changed
|
|
* is already assigned to another DN.
|
|
*
|
|
* Inputs:
|
|
* @param object $ldapserver The LDAP Server Object of interest
|
|
* @param dn $dn DN that is being changed
|
|
* @param string $attr_name Attribute being changed
|
|
* @param string|array $new values New values for the attribute
|
|
*
|
|
* Returns the bad value, or null if all values are OK
|
|
* @todo Implement alternate conection with LDAPserver object
|
|
*/
|
|
function checkUniqueAttr( $ldapserver, $dn, $attr_name, $new_value ) {
|
|
global $servers, $lang;
|
|
|
|
// Is this attribute in the unique_attrs list?
|
|
if ( is_unique_attr( $attr_name ) ) {
|
|
|
|
// Search the tree and make sure that attribute doesnt already exist to somebody else.
|
|
|
|
// Check see and use our alternate uid_dn and password if we have it.
|
|
$unique_attrs_dn = $servers[ $ldapserver->server_id ][ 'unique_attrs_dn' ];
|
|
$unique_attrs_pass = $servers[ $ldapserver->server_id ][ 'unique_attrs_dn_pass' ];
|
|
$need_to_unbind = false;
|
|
|
|
if ( isset( $unique_attrs_dn ) && $unique_attrs_dn != '' && isset( $uniqe_attrs_pass ) )
|
|
{
|
|
$con = @ldap_connect( $ldapserver->host, $ldapserver->port );
|
|
|
|
@ldap_set_option( $con, LDAP_OPT_PROTOCOL_VERSION, 3 );
|
|
|
|
// Bind with the alternate ID.
|
|
$res = @ldap_bind( $con, $unuque_attrs_dn, $unique_attrs_pass );
|
|
|
|
if (! $res) pla_error( sprintf( $lang['unique_attrs_invalid_credential'] , $ldapserver->name ) );
|
|
|
|
$need_to_unbind = true;
|
|
|
|
} else {
|
|
$con = $ldapserver->connect();
|
|
}
|
|
|
|
// Build our search filter to double check each attribute.
|
|
$searchfilter = "(|";
|
|
|
|
if ( is_array( $new_value ) ) {
|
|
foreach ($new_value as $val) {
|
|
$searchfilter .= sprintf("($attr_name=%s)",clean_search_vals($val));
|
|
}
|
|
|
|
} elseif ( $new_value ) {
|
|
$searchfilter .= sprintf("($attr_name=%s)",clean_search_vals($new_value));
|
|
}
|
|
|
|
$searchfilter .= ")";
|
|
|
|
// Do we need a sanity check to just in case $new_value was null and hence the search string is bad?
|
|
|
|
foreach ($ldapserver->getBaseDN() as $base_dn) {
|
|
|
|
// Do the search
|
|
$search = @ldap_search( $con, $base_dn, $searchfilter, array('dn',$attr_name), 0, 0, 0, LDAP_DEREF_ALWAYS);
|
|
if (! $search)
|
|
continue;
|
|
|
|
$search = ldap_get_entries( $con, $search );
|
|
|
|
foreach ($search as $result) {
|
|
// Skip the count result and go to the array.
|
|
if (! is_array($result)) continue;
|
|
|
|
// If one of the attributes is owned to somebody else, then we may as well die here.
|
|
if ($result['dn'] != $dn) {
|
|
|
|
// Find which attribute matched.
|
|
foreach ($result[strtolower($attr_name)] as $attr) {
|
|
foreach ($new_value as $new_value_attr) {
|
|
if ($attr == $new_value_attr)
|
|
return $attr;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if ( $need_to_unbind ) {
|
|
$res = @ldap_unbind( $con );
|
|
}
|
|
|
|
// If we get here, then it must be OK?
|
|
return;
|
|
|
|
} else {
|
|
return;
|
|
}
|
|
}
|
|
|
|
/**
|
|
*
|
|
*/
|
|
|
|
function sortAttrs($a,$b) {
|
|
global $friendly_attrs, $attrs_display_order;
|
|
|
|
// If $attrs_display_order is not set, make it a blank array.
|
|
if (! isset($attrs_display_order))
|
|
$attrs_display_order = array();
|
|
|
|
if ( $a == $b ) return 0;
|
|
|
|
// Check if $a is in $attrs_display_order, get its key
|
|
$a_key = array_search($a, $attrs_display_order);
|
|
// If not, check if its friendly name is $attrs_display_order, get its key
|
|
// If not, assign one greater than number of elements.
|
|
if ( $a_key == '' ) {
|
|
if (isset($friendly_attrs[ strtolower( $a ) ])) {
|
|
$a_key = array_search( $friendly_attrs[ strtolower( $a ) ], $attrs_display_order);
|
|
if ( $a_key == '' ) $a_key = count($attrs_display_order)+1;
|
|
}
|
|
else {
|
|
$a_key = count($attrs_display_order)+1;
|
|
}
|
|
}
|
|
|
|
$b_key = array_search($b, $attrs_display_order);
|
|
if ( $b_key == '' ) {
|
|
if (isset($friendly_attrs[ strtolower( $b ) ])) {
|
|
$b_key = array_search( $friendly_attrs[ strtolower( $b ) ], $attrs_display_order);
|
|
if ( $b_key == '' ) $b_key = count($attrs_display_order)+1;
|
|
}
|
|
else {
|
|
$b_key = count($attrs_display_order)+1;
|
|
}
|
|
}
|
|
|
|
// Case where neither $a, nor $b are in $attrs_display_order, $a_key = $b_key = one greater than num elements.
|
|
// So we sort them alphabetically
|
|
if ( $a_key == $b_key ) {
|
|
$a = strtolower( (isset($friendly_attrs[ strtolower( $a ) ]) ? $friendly_attrs[ strtolower( $a ) ] : $a));
|
|
$b = strtolower( (isset($friendly_attrs[ strtolower( $b ) ]) ? $friendly_attrs[ strtolower( $b ) ] : $b));
|
|
return strcmp ($a, $b);
|
|
}
|
|
|
|
// Case where at least one attribute or its friendly name is in $attrs_display_order
|
|
// return -1 if $a before $b in $attrs_display_order
|
|
return ( $a_key < $b_key ) ? -1 : 1;
|
|
}
|
|
|
|
function userIsMember($ldapserver,$user,$group) {
|
|
$group = get_object_attrs( $ldapserver, $group, false, $deref=LDAP_DEREF_NEVER );
|
|
|
|
if( is_array($group) ) {
|
|
// If you are using groupOfNames objectClass
|
|
if ( array_key_exists('member',$group) and in_array(strtolower($user),arrayLower($group['member'])) )
|
|
return true;
|
|
// If you are using groupOfUniqueNames objectClass
|
|
if ( array_key_exists('uniqueMember',$group) and in_array(strtolower($user),arrayLower($group['uniqueMember'])) )
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
}
|
|
|
|
function userIsAllowedLogin($ldapserver,$user) {
|
|
global $servers;
|
|
|
|
debug_log(sprintf('userIsAllowedLogin: Starting with (%s,%s)',is_object($ldapserver),$user),8);
|
|
|
|
if( ! isset( $servers[$ldapserver->server_id]['only_login_allowed_dns'] ) )
|
|
return true;
|
|
if( ! is_array( $servers[$ldapserver->server_id]['only_login_allowed_dns'] ) )
|
|
return true;
|
|
|
|
$user = strtolower($user);
|
|
|
|
foreach( $servers[$ldapserver->server_id]['only_login_allowed_dns'] as $login_allowed_dn ) {
|
|
debug_log(sprintf('userIsAllowedLogin: Working through (%s)',$login_allowed_dn),9);
|
|
|
|
// Check if $login_allowed_dn is an ldap search filter
|
|
// Is first occurence of 'filter=' (case ensitive) at position 0 ?
|
|
if ( preg_match('/^\([&|]\(/',$login_allowed_dn) ) {
|
|
$filter = $login_allowed_dn;
|
|
|
|
foreach($ldapserver->getBaseDN() as $base_dn) {
|
|
$results = array();
|
|
$results = pla_ldap_search( $ldapserver, $filter, $base_dn, array('dn') );
|
|
debug_log(sprintf('userIsAllowedLogin: Search, Filter [%s], BaseDN [%s] Results [%s]',
|
|
$filter, $base_dn, is_array($results)),9);
|
|
$dn_array = array();
|
|
|
|
if ($results) {
|
|
foreach ($results as $result)
|
|
$dn_array[] = $result['dn'];
|
|
$dn_array = array_unique( $dn_array );
|
|
|
|
if( count( $dn_array ) !== 0 )
|
|
foreach($dn_array as $result_dn) {
|
|
debug_log(sprintf('userIsAllowedLogin: Comparing with [%s]',
|
|
$result_dn),9);
|
|
|
|
// Check if $result_dn is a user DN
|
|
if ( 0 == strcasecmp( trim($user), trim(strtolower($result_dn)) ) )
|
|
return true;
|
|
|
|
// Check if $result_dn is a group DN
|
|
if ( userIsMember($ldapserver,$user,$result_dn) )
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Check if $login_allowed_dn is a user DN
|
|
if ( 0 == strcasecmp( trim($user), trim(strtolower($login_allowed_dn)) ) )
|
|
return true;
|
|
|
|
// Check if $login_allowed_dn is a group DN
|
|
if ( userIsMember($ldapserver,$user,$login_allowed_dn) )
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Reads an array and returns the array values back in lower case
|
|
* @param array $array The array to convert the values to lowercase.
|
|
* @returns array Array with values converted to lowercase.
|
|
*/
|
|
function arrayLower($array) {
|
|
if (! is_array($array))
|
|
return $array;
|
|
|
|
$newarray = array();
|
|
foreach ($array as $key => $value) {
|
|
$newarray[$key] = strtolower($value);
|
|
}
|
|
|
|
return $newarray;
|
|
}
|
|
|
|
/**
|
|
* Strips all slashes from the specified array in place (pass by ref).
|
|
* @param Array $array The array to strip slashes from, typically one of
|
|
* $_GET, $_POST, or $_COOKIE.
|
|
*/
|
|
function array_stripslashes(&$array)
|
|
{
|
|
if( is_array( $array ) )
|
|
while ( list( $key ) = each( $array ) )
|
|
if ( is_array( $array[$key] ) && $key != $array )
|
|
array_stripslashes( $array[$key] );
|
|
else
|
|
$array[$key] = stripslashes( $array[$key] );
|
|
}
|
|
|
|
/**
|
|
* Gets the USER_AGENT string from the $_SERVER array, all in lower case in
|
|
* an E_NOTICE safe manner.
|
|
* @return String The user agent string as reported by the browser.
|
|
*/
|
|
function get_user_agent_string()
|
|
{
|
|
if( isset( $_SERVER['HTTP_USER_AGENT'] ) )
|
|
return strtolower( $_SERVER['HTTP_USER_AGENT'] );
|
|
else
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Determines whether the browser's operating system is UNIX (or something like UNIX).
|
|
* @return boolean True if the brower's OS is UNIX, false otherwise.
|
|
*/
|
|
function is_browser_os_unix()
|
|
{
|
|
$agent = get_user_agent_string();
|
|
if( ! $agent )
|
|
return false;
|
|
$unix_agent_strs = array(
|
|
'sunos',
|
|
'sunos 4',
|
|
'sunos 5',
|
|
'i86',
|
|
'irix',
|
|
'irix 5',
|
|
'irix 6',
|
|
'irix6',
|
|
'hp-ux',
|
|
'09.',
|
|
'10.',
|
|
'aix',
|
|
'aix 1',
|
|
'aix 2',
|
|
'aix 3',
|
|
'aix 4',
|
|
'inux',
|
|
'sco',
|
|
'unix_sv',
|
|
'unix_system_v',
|
|
'ncr',
|
|
'reliant',
|
|
'dec',
|
|
'osf1',
|
|
'dec_alpha' ,
|
|
'alphaserver' ,
|
|
'ultrix' ,
|
|
'alphastation',
|
|
'sinix',
|
|
'freebsd',
|
|
'bsd',
|
|
'x11',
|
|
'vax',
|
|
'openvms'
|
|
);
|
|
foreach( $unix_agent_strs as $agent_str )
|
|
if( strpos( $agent, $agent_str ) !== false )
|
|
return true;
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Determines whether the browser's operating system is Windows.
|
|
* @return boolean True if the brower's OS is Windows, false otherwise.
|
|
*/
|
|
function is_browser_os_windows()
|
|
{
|
|
$agent = get_user_agent_string();
|
|
if( ! $agent )
|
|
return false;
|
|
$win_agent_strs = array(
|
|
'win',
|
|
'win95',
|
|
'windows 95',
|
|
'win16',
|
|
'windows 3.1',
|
|
'windows 16-bit',
|
|
'windows',
|
|
'win31',
|
|
'win16',
|
|
'winme',
|
|
'win2k',
|
|
'winxp',
|
|
'win98',
|
|
'windows 98',
|
|
'win9x',
|
|
'winnt',
|
|
'windows nt',
|
|
'win32',
|
|
'win32',
|
|
'32bit'
|
|
);
|
|
foreach( $win_agent_strs as $agent_str )
|
|
if( strpos( $agent, $agent_str ) !== false )
|
|
return true;
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Determines whether the browser's operating system is Macintosh.
|
|
* @return boolean True if the brower's OS is mac, false otherwise.
|
|
*/
|
|
function is_browser_os_mac()
|
|
{
|
|
$agent = get_user_agent_string();
|
|
if( ! $agent )
|
|
return false;
|
|
$mac_agent_strs = array(
|
|
'mac',
|
|
'68000',
|
|
'ppc',
|
|
'powerpc'
|
|
);
|
|
foreach( $mac_agent_strs as $agent_str )
|
|
if( strpos( $agent, $agent_str ) !== false )
|
|
return true;
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* Return posix group entries.
|
|
* @return Array An associative array of posix group entries with attributes as keys, and values as values.
|
|
* @param int $server_id The ID of the server to search.
|
|
* @param string $base_dn The base of the search.
|
|
*/
|
|
function get_posix_groups( $ldapserver , $base_dn = NULL ){
|
|
global $servers;
|
|
|
|
if( is_null( $base_dn ) )
|
|
$base_dn = $ldapserver->getBaseDN();
|
|
|
|
$results = pla_ldap_search( $ldapserver, "objectclass=posixGroup", $base_dn, array() );
|
|
|
|
if( !$results )
|
|
return array();
|
|
else
|
|
return $results;
|
|
}
|
|
|
|
/**
|
|
* Return the default format for search results.
|
|
*
|
|
* @return string The format to use.
|
|
*/
|
|
function get_default_search_display()
|
|
{
|
|
global $default_search_display;
|
|
|
|
if( ! isset( $default_search_display ) || is_null( $default_search_display ) )
|
|
return 'list';
|
|
|
|
elseif( 0 == strcasecmp( $default_search_display, 'list' ) )
|
|
return 'list';
|
|
|
|
elseif( 0 == strcasecmp( $default_search_display, 'table' ) )
|
|
return 'table';
|
|
|
|
else
|
|
pla_error( sprintf( $lang['bad_search_display'], htmlspecialchars( $default_search_display ) ) );
|
|
}
|
|
|
|
|
|
/**
|
|
* Checks if a string exists in an array, ignoring case.
|
|
*
|
|
* @param string $needle What you are looking for
|
|
* @param array $haystack The array that you think it is in.
|
|
* @return bool True if its there, false if its not.
|
|
*/
|
|
function in_array_ignore_case( $needle, $haystack )
|
|
{
|
|
if( ! is_array( $haystack ) )
|
|
return false;
|
|
if( ! is_string( $needle ) )
|
|
return false;
|
|
|
|
foreach( $haystack as $element )
|
|
if( is_string( $element ) && 0 == strcasecmp( $needle, $element ) )
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
/**
|
|
* String padding
|
|
*
|
|
* @param string input string
|
|
* @param integer length of the result
|
|
* @param string the filling string
|
|
* @param integer padding mode
|
|
*
|
|
* @return string the padded string
|
|
*/
|
|
function full_str_pad($input, $pad_length, $pad_string = '', $pad_type = 0) {
|
|
$str = '';
|
|
$length = $pad_length - strlen($input);
|
|
if ($length > 0) { // str_repeat doesn't like negatives
|
|
if ($pad_type == STR_PAD_RIGHT) { // STR_PAD_RIGHT == 1
|
|
$str = $input.str_repeat($pad_string, $length);
|
|
} elseif ($pad_type == STR_PAD_BOTH) { // STR_PAD_BOTH == 2
|
|
$str = str_repeat($pad_string, floor($length/2));
|
|
$str .= $input;
|
|
$str .= str_repeat($pad_string, ceil($length/2));
|
|
} else { // defaults to STR_PAD_LEFT == 0
|
|
$str = str_repeat($pad_string, $length).$input;
|
|
}
|
|
} else { // if $length is negative or zero we don't need to do anything
|
|
$str = $input;
|
|
}
|
|
return $str;
|
|
}
|
|
|
|
/**
|
|
* Gets the user configured $blowfish_secret from config.php.
|
|
*
|
|
* @return string|null Return the blowfish secret.
|
|
*/
|
|
function get_blowfish_secret()
|
|
{
|
|
global $blowfish_secret;
|
|
|
|
if( isset( $blowfish_secret ) ) {
|
|
if( trim( $blowfish_secret ) == '' )
|
|
return null;
|
|
else
|
|
return $blowfish_secret;
|
|
} else
|
|
return null;
|
|
}
|
|
|
|
/**
|
|
* Encryption using blowfish algorithm
|
|
*
|
|
* @param string original data
|
|
* @param string the secret
|
|
*
|
|
* @return string the encrypted result
|
|
*
|
|
* @access public
|
|
*
|
|
* @author lem9 (taken from the phpMyAdmin source)
|
|
*/
|
|
function pla_blowfish_encrypt( $data, $secret=null )
|
|
{
|
|
global $lang;
|
|
|
|
include_once './blowfish.php';
|
|
|
|
if( null === $secret ) {
|
|
$secret = get_blowfish_secret();
|
|
|
|
if( null === $secret )
|
|
pla_error( $lang['no_blowfish_secret'] );
|
|
}
|
|
|
|
$pma_cipher = new Horde_Cipher_blowfish;
|
|
$encrypt = '';
|
|
|
|
for ($i=0; $i<strlen($data); $i+=8) {
|
|
$block = substr($data, $i, 8);
|
|
|
|
if (strlen($block) < 8)
|
|
$block = full_str_pad($block,8,"\0", 1);
|
|
|
|
$encrypt .= $pma_cipher->encryptBlock($block, $secret);
|
|
}
|
|
return base64_encode($encrypt);
|
|
}
|
|
|
|
/**
|
|
* Decryption using blowfish algorithm
|
|
*
|
|
* @param string encrypted data
|
|
* @param string the secret
|
|
*
|
|
* @return string original data
|
|
*
|
|
* @access public
|
|
*
|
|
* @author lem9 (taken from the phpMyAdmin source)
|
|
*/
|
|
function pla_blowfish_decrypt( $encdata, $secret=null )
|
|
{
|
|
global $lang;
|
|
|
|
// This cache gives major speed up for stupid callers :)
|
|
static $cache = array();
|
|
|
|
if( isset( $cache[$encdata] ) )
|
|
return $cache[$encdata];
|
|
|
|
include_once './blowfish.php';
|
|
|
|
if( null === $secret ) {
|
|
$secret = get_blowfish_secret();
|
|
if( null === $secret )
|
|
pla_error( $lang['no_blowfish_secret'] );
|
|
}
|
|
|
|
$pma_cipher = new Horde_Cipher_blowfish;
|
|
$decrypt = '';
|
|
$data = base64_decode($encdata);
|
|
|
|
for ($i=0; $i<strlen($data); $i+=8) {
|
|
$decrypt .= $pma_cipher->decryptBlock(substr($data, $i, 8), $secret);
|
|
}
|
|
|
|
$return = trim($decrypt);
|
|
$cache[$encdata] = $return;
|
|
return $return;
|
|
}
|
|
|
|
/**
|
|
* Gets the user configured $tree_display_format from config.php
|
|
*/
|
|
function get_tree_display_format()
|
|
{
|
|
global $tree_display_format;
|
|
|
|
if( ! isset( $tree_display_format ) || '' == trim( $tree_display_format ) )
|
|
$tree_display_format = "%rdn";
|
|
|
|
return $tree_display_format;
|
|
}
|
|
|
|
/**
|
|
* Gets a DN string using the user-configured tree_display_format string to format it.
|
|
*/
|
|
function draw_formatted_dn( $ldapserver, $dn )
|
|
{
|
|
$format = get_tree_display_format();
|
|
preg_match_all( "/%[a-zA-Z_0-9]+/", $format, $tokens );
|
|
$tokens = $tokens[0];
|
|
foreach( $tokens as $token ) {
|
|
if( 0 == strcasecmp( $token, '%dn' ) )
|
|
$format = str_replace( $token, pretty_print_dn( $dn ), $format );
|
|
elseif( 0 == strcasecmp( $token, '%rdn' ) )
|
|
$format = str_replace( $token, pretty_print_dn( get_rdn( $dn ) ), $format );
|
|
elseif( 0 == strcasecmp( $token, '%rdnvalue' ) ) {
|
|
$rdn = get_rdn( $dn );
|
|
$rdn_value = explode( '=', $rdn, 2 );
|
|
$rdn_value = $rdn_value[1];
|
|
$format = str_replace( $token, $rdn_value, $format );
|
|
} else {
|
|
$attr_name = str_replace( '%', '', $token );
|
|
$attr_values = get_object_attr( $ldapserver, $dn, $attr_name );
|
|
if( null == $attr_values )
|
|
$display = 'none';
|
|
elseif( is_array( $attr_values ) )
|
|
$display = htmlspecialchars( implode( ', ', $attr_values ) );
|
|
else
|
|
$display = htmlspecialchars( $attr_values );
|
|
$format = str_replace( $token, $display, $format );
|
|
}
|
|
}
|
|
echo $format;
|
|
}
|
|
|
|
/**
|
|
* Gets the date format from the config - default locale if none.
|
|
*/
|
|
function get_date_format() {
|
|
global $date_format;
|
|
|
|
if (isset($date_format))
|
|
return $date_format;
|
|
else
|
|
return "%x";
|
|
}
|
|
|
|
/**
|
|
* Takes a shadow* attribute and returns the date as an integer.
|
|
*/
|
|
function shadow_date( $attrs, $attr) {
|
|
|
|
$shadowLastChange = isset($attrs['shadowLastChange']) ? $attrs['shadowLastChange'][0] : null;
|
|
$shadowMax = isset($attrs['shadowMax']) ? $attrs['shadowMax'][0] : null;
|
|
|
|
if( 0 == strcasecmp( $attr, 'shadowLastChange' ) && $shadowLastChange)
|
|
$shadow_date = $shadowLastChange;
|
|
|
|
elseif ( 0 == strcasecmp( $attr, 'shadowMax' ) && ($shadowMax > 0) && $shadowLastChange )
|
|
$shadow_date = $shadowLastChange+$shadowMax;
|
|
|
|
elseif ( 0 == strcasecmp( $attr, 'shadowWarning' ) && ($attrs[$attr][0] > 0) && $shadowLastChange && $shadowMax && $shadowMax > 0)
|
|
$shadow_date = $shadowLastChange+$shadowMax-$attrs[$attr][0];
|
|
|
|
elseif ( 0 == strcasecmp( $attr, 'shadowInactive' ) && ($attrs[$attr][0] > 0) && $shadowLastChange && $shadowMax && $shadowMax > 0)
|
|
$shadow_date = $shadowLastChange+$shadowMax+$attrs[$attr][0];
|
|
|
|
elseif ( 0 == strcasecmp( $attr, 'shadowMin' ) && ($attrs[$attr][0] > 0) && $shadowLastChange)
|
|
$shadow_date = $shadowLastChange+$attrs[$attr][0];
|
|
|
|
elseif ( 0 == strcasecmp( $attr, 'shadowExpire' ) && ($attrs[$attr][0] > 0))
|
|
$shadow_date = $attrs[$attr][0];
|
|
|
|
else // Couldn't interpret the shadow date (could be 0 or -1 or something)
|
|
return false;
|
|
|
|
return $shadow_date*24*3600;
|
|
}
|
|
|
|
/**
|
|
* This function will clean up the values use during a search - namely, values that have brackets
|
|
* as that messes up the search filter.
|
|
* @param string $val String that will be used in the search filter.
|
|
* @return string $result String that is ready for the search filter.
|
|
* @todo We really should improve this so that it only evaluates brackets after the = sign.
|
|
*/
|
|
function clean_search_vals( $val ) {
|
|
# Remove any escaped brackets already.
|
|
$val = preg_replace("/\\\\([\(\)])/","$1",$val);
|
|
|
|
# The string might be a proper search filter
|
|
if (preg_match("/^\([&\|]\(/",$val))
|
|
return $val;
|
|
|
|
else
|
|
return preg_replace("/([\(\)])/","\\\\$1",$val);
|
|
}
|
|
|
|
/**
|
|
* Server html select list
|
|
* @todo Change this so that if only 1 result is returned, then the select list is not displayed.
|
|
*/
|
|
function server_select_list ($select_id=null,$only_logged_on=true,$select_name='server_id',$js_script=null) {
|
|
global $servers;
|
|
|
|
$count = 0;
|
|
$server_menu_html = sprintf('<select name="%s" %s>',$select_name,$js_script);
|
|
foreach( $servers as $id => $server ) {
|
|
$ldapserver = new LDAPServer($id);
|
|
|
|
if( $ldapserver->isVisible() ) {
|
|
|
|
if ($only_logged_on && ! $ldapserver->haveAuthInfo())
|
|
continue;
|
|
|
|
$count++;
|
|
$server_name = $ldapserver->name;
|
|
$server_id = $ldapserver->server_id;
|
|
|
|
$server_menu_html .= sprintf('<option value="%s" %s>%s</option>',
|
|
$server_id,( $server_id==$select_id ? 'selected' : '' ),$server_name);
|
|
}
|
|
}
|
|
$server_menu_html .= '</select>';
|
|
|
|
if ($count > 1)
|
|
return $server_menu_html;
|
|
|
|
elseif ($count)
|
|
return sprintf('%s <input type="hidden" name="%s" value="%s">',$server_name,$select_name,$server_id);
|
|
|
|
else
|
|
return null;
|
|
}
|
|
|
|
function server_info_list() {
|
|
global $servers;
|
|
|
|
$server_info_list = array();
|
|
|
|
foreach( $servers as $id => $server ) {
|
|
$ldapserver = new LDAPServer($id);
|
|
|
|
//if (! $ldapserver->haveAuthInfo())
|
|
// continue;
|
|
|
|
$server_info_list[$id]['id'] = $id;
|
|
$server_info_list[$id]['name'] = $ldapserver->name;
|
|
$server_info_list[$id]['base_dn'] = $ldapserver->getBaseDN();
|
|
}
|
|
|
|
return $server_info_list;
|
|
}
|
|
|
|
/**
|
|
* Debug Logging to Syslog
|
|
*
|
|
* If the log level of the message is less than the log level of the debug setting in the config file
|
|
* then log the message to syslog.
|
|
*
|
|
* Suggested logging level messages:
|
|
* - 1: Informational
|
|
* - 4: Values used from Configuration
|
|
* - 5: LDAP Query Results
|
|
* - 6: Evaluated Results
|
|
* - 7: Returned Cached Evalutated Results
|
|
* - 8: Enter/Exit functions
|
|
* - 9: Very verbose (describing what the code is doing)
|
|
* @param string $msg Message to send to syslog
|
|
* @param int $level Log level of this message.
|
|
* @see syslog.php
|
|
*/
|
|
|
|
function debug_log($msg,$level=0) {
|
|
global $debug_level;
|
|
|
|
$caller = basename( $_SERVER['PHP_SELF'] );
|
|
if (! isset($debug_level))
|
|
$debug_level = -1;
|
|
|
|
if ($level <= $debug_level)
|
|
return syslog_notice( sprintf('%s(%s): %s',$caller,$level,$msg) );
|
|
}
|
|
|
|
function enc_type_select_list($enc_type) {
|
|
|
|
$html = '<select name="enc_type">';
|
|
$html .= '<option>clear</option>';
|
|
|
|
foreach (array('crypt','ext_des','md5crypt','blowfish','md5','smd5','sha','ssha') as $option)
|
|
$html .= sprintf('<option%s>%s</option>',($enc_type == $option ? ' selected="true"' : ''),$option);
|
|
|
|
$html .= "</select>";
|
|
|
|
return $html;
|
|
}
|
|
|
|
// Converts a little-endia hex-number to one, that 'hexdec' can convert
|
|
function littleEndian($hex) {
|
|
$result = '';
|
|
|
|
for ($x=strlen($hex)-2; $x >= 0; $x=$x-2)
|
|
$result .= substr($hex,$x,2);
|
|
|
|
return $result;
|
|
}
|
|
|
|
function binSIDtoText($binsid) {
|
|
$hex_sid=bin2hex($binsid);
|
|
$rev = hexdec(substr($hex_sid,0,2)); // Get revision-part of SID
|
|
$subcount = hexdec(substr($hex_sid,2,2)); // Get count of sub-auth entries
|
|
$auth = hexdec(substr($hex_sid,4,12)); // SECURITY_NT_AUTHORITY
|
|
|
|
$result = "$rev-$auth";
|
|
|
|
for ($x=0;$x < $subcount; $x++) {
|
|
$subauth[$x] =
|
|
hexdec(littleEndian(substr($hex_sid,16+($x*8),8))); // get all SECURITY_NT_AUTHORITY
|
|
$result .= "-".$subauth[$x];
|
|
}
|
|
|
|
return $result;
|
|
}
|
|
|
|
if (! function_exists('session_cache_expire')) {
|
|
|
|
/**
|
|
* session_cache_expire is a php 4.2.0 function, we'll emulate it if we are using php <4.2.0
|
|
*/
|
|
|
|
function session_cache_expire() {
|
|
return 180;
|
|
}
|
|
}
|
|
?>
|