123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624 |
- <?php
- /**
- * This file does a lot of important stuff. Mainly, this means it handles
- * the query string, request variables, and session management.
- *
- * Simple Machines Forum (SMF)
- *
- * @package SMF
- * @author Simple Machines http://www.simplemachines.org
- * @copyright 2011 Simple Machines
- * @license http://www.simplemachines.org/about/smf/license.php BSD
- *
- * @version 2.1 Alpha 1
- */
- if (!defined('SMF'))
- die('Hacking attempt...');
- /**
- * Clean the request variables - add html entities to GET and slashes if magic_quotes_gpc is Off.
- *
- * What it does:
- * - cleans the request variables (ENV, GET, POST, COOKIE, SERVER) and
- * makes sure the query string was parsed correctly.
- * - handles the URLs passed by the queryless URLs option.
- * - makes sure, regardless of php.ini, everything has slashes.
- * - sets up $board, $topic, and $scripturl and $_REQUEST['start'].
- * - determines, or rather tries to determine, the client's IP.
- */
- function cleanRequest()
- {
- global $board, $topic, $boardurl, $scripturl, $modSettings, $smcFunc;
- // Makes it easier to refer to things this way.
- $scripturl = $boardurl . '/index.php';
- // What function to use to reverse magic quotes - if sybase is on we assume that the database sensibly has the right unescape function!
- $removeMagicQuoteFunction = ini_get('magic_quotes_sybase') || strtolower(ini_get('magic_quotes_sybase')) == 'on' ? 'unescapestring__recursive' : 'stripslashes__recursive';
- // Save some memory.. (since we don't use these anyway.)
- unset($GLOBALS['HTTP_POST_VARS'], $GLOBALS['HTTP_POST_VARS']);
- unset($GLOBALS['HTTP_POST_FILES'], $GLOBALS['HTTP_POST_FILES']);
- // These keys shouldn't be set...ever.
- if (isset($_REQUEST['GLOBALS']) || isset($_COOKIE['GLOBALS']))
- die('Invalid request variable.');
- // Same goes for numeric keys.
- foreach (array_merge(array_keys($_POST), array_keys($_GET), array_keys($_FILES)) as $key)
- if (is_numeric($key))
- die('Numeric request keys are invalid.');
- // Numeric keys in cookies are less of a problem. Just unset those.
- foreach ($_COOKIE as $key => $value)
- if (is_numeric($key))
- unset($_COOKIE[$key]);
- // Get the correct query string. It may be in an environment variable...
- if (!isset($_SERVER['QUERY_STRING']))
- $_SERVER['QUERY_STRING'] = getenv('QUERY_STRING');
- // It seems that sticking a URL after the query string is mighty common, well, it's evil - don't.
- if (strpos($_SERVER['QUERY_STRING'], 'http') === 0)
- {
- header('HTTP/1.1 400 Bad Request');
- die;
- }
- // Are we going to need to parse the ; out?
- if (strpos(ini_get('arg_separator.input'), ';') === false && !empty($_SERVER['QUERY_STRING']))
- {
- // Get rid of the old one! You don't know where it's been!
- $_GET = array();
- // Was this redirected? If so, get the REDIRECT_QUERY_STRING.
- // Do not urldecode() the querystring, unless you so much wish to break OpenID implementation. :)
- $_SERVER['QUERY_STRING'] = substr($_SERVER['QUERY_STRING'], 0, 5) === 'url=/' ? $_SERVER['REDIRECT_QUERY_STRING'] : $_SERVER['QUERY_STRING'];
- // Replace ';' with '&' and '&something&' with '&something=&'. (this is done for compatibility...)
- // @todo smflib
- parse_str(preg_replace('/&(\w+)(?=&|$)/', '&$1=', strtr($_SERVER['QUERY_STRING'], array(';?' => '&', ';' => '&', '%00' => '', "\0" => ''))), $_GET);
- // Magic quotes still applies with parse_str - so clean it up.
- if (function_exists('get_magic_quotes_gpc') && @get_magic_quotes_gpc() != 0 && empty($modSettings['integrate_magic_quotes']))
- $_GET = $removeMagicQuoteFunction($_GET);
- }
- elseif (strpos(ini_get('arg_separator.input'), ';') !== false)
- {
- if (function_exists('get_magic_quotes_gpc') && @get_magic_quotes_gpc() != 0 && empty($modSettings['integrate_magic_quotes']))
- $_GET = $removeMagicQuoteFunction($_GET);
- // Search engines will send action=profile%3Bu=1, which confuses PHP.
- foreach ($_GET as $k => $v)
- {
- if ((string) $v === $v && strpos($k, ';') !== false)
- {
- $temp = explode(';', $v);
- $_GET[$k] = $temp[0];
- for ($i = 1, $n = count($temp); $i < $n; $i++)
- {
- @list ($key, $val) = @explode('=', $temp[$i], 2);
- if (!isset($_GET[$key]))
- $_GET[$key] = $val;
- }
- }
- // This helps a lot with integration!
- if (strpos($k, '?') === 0)
- {
- $_GET[substr($k, 1)] = $v;
- unset($_GET[$k]);
- }
- }
- }
- // There's no query string, but there is a URL... try to get the data from there.
- if (!empty($_SERVER['REQUEST_URI']))
- {
- // Remove the .html, assuming there is one.
- if (substr($_SERVER['REQUEST_URI'], strrpos($_SERVER['REQUEST_URI'], '.'), 4) == '.htm')
- $request = substr($_SERVER['REQUEST_URI'], 0, strrpos($_SERVER['REQUEST_URI'], '.'));
- else
- $request = $_SERVER['REQUEST_URI'];
- // @todo smflib.
- // Replace 'index.php/a,b,c/d/e,f' with 'a=b,c&d=&e=f' and parse it into $_GET.
- if (strpos($request, basename($scripturl) . '/') !== false)
- {
- parse_str(substr(preg_replace('/&(\w+)(?=&|$)/', '&$1=', strtr(preg_replace('~/([^,/]+),~', '/$1=', substr($request, strpos($request, basename($scripturl)) + strlen(basename($scripturl)))), '/', '&')), 1), $temp);
- if (function_exists('get_magic_quotes_gpc') && @get_magic_quotes_gpc() != 0 && empty($modSettings['integrate_magic_quotes']))
- $temp = $removeMagicQuoteFunction($temp);
- $_GET += $temp;
- }
- }
- // If magic quotes is on we have some work...
- if (function_exists('get_magic_quotes_gpc') && @get_magic_quotes_gpc() != 0)
- {
- $_ENV = $removeMagicQuoteFunction($_ENV);
- $_POST = $removeMagicQuoteFunction($_POST);
- $_COOKIE = $removeMagicQuoteFunction($_COOKIE);
- foreach ($_FILES as $k => $dummy)
- if (isset($_FILES[$k]['name']))
- $_FILES[$k]['name'] = $removeMagicQuoteFunction($_FILES[$k]['name']);
- }
- // Add entities to GET. This is kinda like the slashes on everything else.
- $_GET = htmlspecialchars__recursive($_GET);
- // Let's not depend on the ini settings... why even have COOKIE in there, anyway?
- $_REQUEST = $_POST + $_GET;
- // Make sure $board and $topic are numbers.
- if (isset($_REQUEST['board']))
- {
- // Make sure its a string and not something else like an array
- $_REQUEST['board'] = (string) $_REQUEST['board'];
- // If there's a slash in it, we've got a start value! (old, compatible links.)
- if (strpos($_REQUEST['board'], '/') !== false)
- list ($_REQUEST['board'], $_REQUEST['start']) = explode('/', $_REQUEST['board']);
- // Same idea, but dots. This is the currently used format - ?board=1.0...
- elseif (strpos($_REQUEST['board'], '.') !== false)
- list ($_REQUEST['board'], $_REQUEST['start']) = explode('.', $_REQUEST['board']);
- // Now make absolutely sure it's a number.
- $board = (int) $_REQUEST['board'];
- $_REQUEST['start'] = isset($_REQUEST['start']) ? (int) $_REQUEST['start'] : 0;
- // This is for "Who's Online" because it might come via POST - and it should be an int here.
- $_GET['board'] = $board;
- }
- // Well, $board is going to be a number no matter what.
- else
- $board = 0;
- // If there's a threadid, it's probably an old YaBB SE link. Flow with it.
- if (isset($_REQUEST['threadid']) && !isset($_REQUEST['topic']))
- $_REQUEST['topic'] = $_REQUEST['threadid'];
- // We've got topic!
- if (isset($_REQUEST['topic']))
- {
- // Make sure its a string and not something else like an array
- $_REQUEST['topic'] = (string) $_REQUEST['topic'];
- // Slash means old, beta style, formatting. That's okay though, the link should still work.
- if (strpos($_REQUEST['topic'], '/') !== false)
- list ($_REQUEST['topic'], $_REQUEST['start']) = explode('/', $_REQUEST['topic']);
- // Dots are useful and fun ;). This is ?topic=1.15.
- elseif (strpos($_REQUEST['topic'], '.') !== false)
- list ($_REQUEST['topic'], $_REQUEST['start']) = explode('.', $_REQUEST['topic']);
- $topic = (int) $_REQUEST['topic'];
- // Now make sure the online log gets the right number.
- $_GET['topic'] = $topic;
- }
- else
- $topic = 0;
- // There should be a $_REQUEST['start'], some at least. If you need to default to other than 0, use $_GET['start'].
- if (empty($_REQUEST['start']) || $_REQUEST['start'] < 0 || (int) $_REQUEST['start'] > 2147473647)
- $_REQUEST['start'] = 0;
- // The action needs to be a string and not an array or anything else
- if (isset($_REQUEST['action']))
- $_REQUEST['action'] = (string) $_REQUEST['action'];
- if (isset($_GET['action']))
- $_GET['action'] = (string) $_GET['action'];
- // Make sure we have a valid REMOTE_ADDR.
- if (!isset($_SERVER['REMOTE_ADDR']))
- {
- $_SERVER['REMOTE_ADDR'] = '';
- // A new magic variable to indicate we think this is command line.
- $_SERVER['is_cli'] = true;
- }
- // Perhaps we have a IPv6 address.
- elseif (!isValidIPv6($_SERVER['REMOTE_ADDR']) || preg_match('~::ffff:\d+\.\d+\.\d+\.\d+~', $_SERVER['REMOTE_ADDR']) !== 0)
- {
- $_SERVER['REMOTE_ADDR'] = preg_replace('~^::ffff:(\d+\.\d+\.\d+\.\d+)~', '\1', $_SERVER['REMOTE_ADDR']);
- // Just incase we have a legacy IPv4 address.
- // @ TODO: Convert to IPv6.
- if (preg_match('~^((([1]?\d)?\d|2[0-4]\d|25[0-5])\.){3}(([1]?\d)?\d|2[0-4]\d|25[0-5])$~', $_SERVER['REMOTE_ADDR']) === 0)
- $_SERVER['REMOTE_ADDR'] = 'unknown';
- }
- // Try to calculate their most likely IP for those people behind proxies (And the like).
- $_SERVER['BAN_CHECK_IP'] = $_SERVER['REMOTE_ADDR'];
- // Find the user's IP address. (but don't let it give you 'unknown'!)
- // @ TODO: IPv6 really doesn't need this.
- if (!empty($_SERVER['HTTP_X_FORWARDED_FOR']) && !empty($_SERVER['HTTP_CLIENT_IP']) && (preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown|::1|fe80::|fc00::)~', $_SERVER['HTTP_CLIENT_IP']) == 0 || preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown|::1|fe80::|fc00::)~', $_SERVER['REMOTE_ADDR']) != 0))
- {
- // We have both forwarded for AND client IP... check the first forwarded for as the block - only switch if it's better that way.
- if (strtok($_SERVER['HTTP_X_FORWARDED_FOR'], '.') != strtok($_SERVER['HTTP_CLIENT_IP'], '.') && '.' . strtok($_SERVER['HTTP_X_FORWARDED_FOR'], '.') == strrchr($_SERVER['HTTP_CLIENT_IP'], '.') && (preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown)~', $_SERVER['HTTP_X_FORWARDED_FOR']) == 0 || preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown)~', $_SERVER['REMOTE_ADDR']) != 0))
- $_SERVER['BAN_CHECK_IP'] = implode('.', array_reverse(explode('.', $_SERVER['HTTP_CLIENT_IP'])));
- else
- $_SERVER['BAN_CHECK_IP'] = $_SERVER['HTTP_CLIENT_IP'];
- }
- if (!empty($_SERVER['HTTP_CLIENT_IP']) && (preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown|::1|fe80::|fc00::)~', $_SERVER['HTTP_CLIENT_IP']) == 0 || preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown|::1|fe80::|fc00::)~', $_SERVER['REMOTE_ADDR']) != 0))
- {
- // Since they are in different blocks, it's probably reversed.
- if (strtok($_SERVER['REMOTE_ADDR'], '.') != strtok($_SERVER['HTTP_CLIENT_IP'], '.'))
- $_SERVER['BAN_CHECK_IP'] = implode('.', array_reverse(explode('.', $_SERVER['HTTP_CLIENT_IP'])));
- else
- $_SERVER['BAN_CHECK_IP'] = $_SERVER['HTTP_CLIENT_IP'];
- }
- elseif (!empty($_SERVER['HTTP_X_FORWARDED_FOR']))
- {
- // If there are commas, get the last one.. probably.
- if (strpos($_SERVER['HTTP_X_FORWARDED_FOR'], ',') !== false)
- {
- $ips = array_reverse(explode(', ', $_SERVER['HTTP_X_FORWARDED_FOR']));
- // Go through each IP...
- foreach ($ips as $i => $ip)
- {
- // Make sure it's in a valid range...
- if (preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown|::1|fe80::|fc00::)~', $ip) != 0 && preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown|::1|fe80::|fc00::)~', $_SERVER['REMOTE_ADDR']) == 0)
- continue;
- // Otherwise, we've got an IP!
- $_SERVER['BAN_CHECK_IP'] = trim($ip);
- break;
- }
- }
- // Otherwise just use the only one.
- elseif (preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown|::1|fe80::|fc00::)~', $_SERVER['HTTP_X_FORWARDED_FOR']) == 0 || preg_match('~^((0|10|172\.(1[6-9]|2[0-9]|3[01])|192\.168|255|127)\.|unknown|::1|fe80::|fc00::)~', $_SERVER['REMOTE_ADDR']) != 0)
- $_SERVER['BAN_CHECK_IP'] = $_SERVER['HTTP_X_FORWARDED_FOR'];
- }
- // Make sure we know the URL of the current request.
- if (empty($_SERVER['REQUEST_URI']))
- $_SERVER['REQUEST_URL'] = $scripturl . (!empty($_SERVER['QUERY_STRING']) ? '?' . $_SERVER['QUERY_STRING'] : '');
- elseif (preg_match('~^([^/]+//[^/]+)~', $scripturl, $match) == 1)
- $_SERVER['REQUEST_URL'] = $match[1] . $_SERVER['REQUEST_URI'];
- else
- $_SERVER['REQUEST_URL'] = $_SERVER['REQUEST_URI'];
- // And make sure HTTP_USER_AGENT is set.
- $_SERVER['HTTP_USER_AGENT'] = isset($_SERVER['HTTP_USER_AGENT']) ? htmlspecialchars($smcFunc['db_unescape_string']($_SERVER['HTTP_USER_AGENT']), ENT_QUOTES) : '';
- // Some final checking.
- if (preg_match('~^((([1]?\d)?\d|2[0-4]\d|25[0-5])\.){3}(([1]?\d)?\d|2[0-4]\d|25[0-5])$~', $_SERVER['BAN_CHECK_IP']) === 0 || !isValidIPv6($_SERVER['BAN_CHECK_IP']))
- $_SERVER['BAN_CHECK_IP'] = '';
- if ($_SERVER['REMOTE_ADDR'] == 'unknown')
- $_SERVER['REMOTE_ADDR'] = '';
- }
- /**
- * Validates a IPv6 address. returns true if it is ipv6.
- * @param string $ip ip address to be validated
- * @return bool true|false
- */
- function isValidIPv6($ip)
- {
- if (preg_match('~^((([0-9A-Fa-f]{1,4}:){7}[0-9A-Fa-f]{1,4})|(([0-9A-Fa-f]{1,4}:){6}:[0-9A-Fa-f]{1,4})|(([0-9A-Fa-f]{1,4}:){5}:([0-9A-Fa-f]{1,4}:)?[0-9A-Fa-f]{1,4})|(([0-9A-Fa-f]{1,4}:){4}:([0-9A-Fa-f]{1,4}:){0,2}[0-9A-Fa-f]{1,4})|(([0-9A-Fa-f]{1,4}:){3}:([0-9A-Fa-f]{1,4}:){0,3}[0-9A-Fa-f]{1,4})|(([0-9A-Fa-f]{1,4}:){2}:([0-9A-Fa-f]{1,4}:){0,4}[0-9A-Fa-f]{1,4})|(([0-9A-Fa-f]{1,4}:){6}((\b((25[0-5])|(1\d{2})|(2[0-4]\d)|(\d{1,2}))\b)\.){3}(\b((25[0-5])|(1\d{2})|(2[0-4]\d)|(\d{1,2}))\b))|(([0-9A-Fa-f]{1,4}:){0,5}:((\b((25[0-5])|(1\d{2})|(2[0-4]\d)|(\d{1,2}))\b)\.){3}(\b((25[0-5])|(1\d{2})|(2[0-4]\d)|(\d{1,2}))\b))|(::([0-9A-Fa-f]{1,4}:){0,5}((\b((25[0-5])|(1\d{2})|(2[0-4]\d)|(\d{1,2}))\b)\.){3}(\b((25[0-5])|(1\d{2})|(2[0-4]\d)|(\d{1,2}))\b))|([0-9A-Fa-f]{1,4}::([0-9A-Fa-f]{1,4}:){0,5}[0-9A-Fa-f]{1,4})|(::([0-9A-Fa-f]{1,4}:){0,6}[0-9A-Fa-f]{1,4})|(([0-9A-Fa-f]{1,4}:){1,7}:))$~', $ip) === 0)
- return false;
- return true;
- }
- /**
- * Converts IPv6s to numbers. This makes ban checks much easier.
- * @param string $ip ip address to be converted
- * @return string
- */
- function convertIPv6toInts($ip)
- {
- static $expanded = array();
- // Check if we have done this already.
- if (isset($expanded[$ip]))
- return $expanded[$ip];
- // Expand the IP out.
- $expanded_ip = explode(':', expandIPv6($ip));
- $new_ip = array();
- foreach ($expanded_ip as $int)
- $new_ip[] = hexdec($int);
- // Save this incase of repeated use.
- $expanded[$ip] = implode($new_ip, '-');
- return $expanded[$ip];
- }
- /**
- * Expands a IPv6 address to its full form.
- * @param string $ip ip address to be converted
- * @return bool/string expanded ipv6 address.
- */
- function expandIPv6($addr, $strict_check = true)
- {
- static $converted = array();
- // Check if we have done this already.
- if (isset($converted[$addr]))
- return $converted[$addr];
- // Check if there are segments missing, insert if necessary.
- if (strpos($addr, '::') !== false)
- {
- $part = explode('::', $addr);
- $part[0] = explode(':', $part[0]);
- $part[1] = explode(':', $part[1]);
- $missing = array();
- for ($i = 0; $i < (8 - (count($part[0]) + count($part[1]))); $i++)
- array_push($missing, '0000');
- $part = array_merge($part[0], $missing, $part[1]);
- }
- else
- $part = explode(':', $addr);
- // Pad each segment until it has 4 digits.
- foreach ($part as &$p)
- while (strlen($p) < 4)
- $p = '0' . $p;
- unset($p);
- // Join segments.
- $result = implode(':', $part);
- // Save this incase of repeated use.
- $converted[$addr] = $result;
- // Quick check to make sure the length is as expected.
- if (!$strict_check || strlen($result) == 39)
- return $result;
- else
- return false;
- }
- /**
- * Adds slashes to the array/variable.
- * What it does:
- * - returns the var, as an array or string, with escapes as required.
- * - importantly escapes all keys and values!
- * - calls itself recursively if necessary.
- *
- * @param array|string $var
- * @return array|string
- */
- function escapestring__recursive($var)
- {
- global $smcFunc;
- if (!is_array($var))
- return $smcFunc['db_escape_string']($var);
- // Reindex the array with slashes.
- $new_var = array();
- // Add slashes to every element, even the indexes!
- foreach ($var as $k => $v)
- $new_var[$smcFunc['db_escape_string']($k)] = escapestring__recursive($v);
- return $new_var;
- }
- /**
- * Adds html entities to the array/variable. Uses two underscores to guard against overloading.
- * What it does:
- * - adds entities (", <, >) to the array or string var.
- * - importantly, does not effect keys, only values.
- * - calls itself recursively if necessary.
- *
- * @param array|string $var
- * @param int $level = 0
- * @return array|string
- */
- function htmlspecialchars__recursive($var, $level = 0)
- {
- global $smcFunc;
- if (!is_array($var))
- return isset($smcFunc['htmlspecialchars']) ? $smcFunc['htmlspecialchars']($var, ENT_QUOTES) : htmlspecialchars($var, ENT_QUOTES);
- // Add the htmlspecialchars to every element.
- foreach ($var as $k => $v)
- $var[$k] = $level > 25 ? null : htmlspecialchars__recursive($v, $level + 1);
- return $var;
- }
- /**
- * Removes url stuff from the array/variable. Uses two underscores to guard against overloading.
- * What it does:
- * - takes off url encoding (%20, etc.) from the array or string var.
- * - importantly, does it to keys too!
- * - calls itself recursively if there are any sub arrays.
- *
- * @param array|string $var
- * @param int $level = 0
- * @return array|string
- */
- function urldecode__recursive($var, $level = 0)
- {
- if (!is_array($var))
- return urldecode($var);
- // Reindex the array...
- $new_var = array();
- // Add the htmlspecialchars to every element.
- foreach ($var as $k => $v)
- $new_var[urldecode($k)] = $level > 25 ? null : urldecode__recursive($v, $level + 1);
- return $new_var;
- }
- /**
- * Unescapes any array or variable. Uses two underscores to guard against overloading.
- * What it does:
- * - unescapes, recursively, from the array or string var.
- * - effects both keys and values of arrays.
- * - calls itself recursively to handle arrays of arrays.
- *
- * @param array|string $var
- * @return array|string
- */
- function unescapestring__recursive($var)
- {
- global $smcFunc;
- if (!is_array($var))
- return $smcFunc['db_unescape_string']($var);
- // Reindex the array without slashes, this time.
- $new_var = array();
- // Strip the slashes from every element.
- foreach ($var as $k => $v)
- $new_var[$smcFunc['db_unescape_string']($k)] = unescapestring__recursive($v);
- return $new_var;
- }
- /**
- * Remove slashes recursively. Uses two underscores to guard against overloading.
- * What it does:
- * - removes slashes, recursively, from the array or string var.
- * - effects both keys and values of arrays.
- * - calls itself recursively to handle arrays of arrays.
- *
- * @param array|string $var
- * @param int $level = 0
- * @return array|string
- */
- function stripslashes__recursive($var, $level = 0)
- {
- if (!is_array($var))
- return stripslashes($var);
- // Reindex the array without slashes, this time.
- $new_var = array();
- // Strip the slashes from every element.
- foreach ($var as $k => $v)
- $new_var[stripslashes($k)] = $level > 25 ? null : stripslashes__recursive($v, $level + 1);
- return $new_var;
- }
- /**
- * Trim a string including the HTML space, character 160. Uses two underscores to guard against overloading.
- * What it does:
- * - trims a string or an the var array using html characters as well.
- * - does not effect keys, only values.
- * - may call itself recursively if needed.
- *
- * @param array|string $var
- * @param int $level = 0
- * @return array|string
- */
- function htmltrim__recursive($var, $level = 0)
- {
- global $smcFunc;
- // Remove spaces (32), tabs (9), returns (13, 10, and 11), nulls (0), and hard spaces. (160)
- if (!is_array($var))
- return isset($smcFunc) ? $smcFunc['htmltrim']($var) : trim($var, ' ' . "\t\n\r\x0B" . '\0' . "\xA0");
- // Go through all the elements and remove the whitespace.
- foreach ($var as $k => $v)
- $var[$k] = $level > 25 ? null : htmltrim__recursive($v, $level + 1);
- return $var;
- }
- /**
- * Clean up the XML to make sure it doesn't contain invalid characters.
- * What it does:
- * - removes invalid XML characters to assure the input string being
- * - parsed properly.
- *
- * @param string $string
- * @return string
- */
- function cleanXml($string)
- {
- global $context;
- // http://www.w3.org/TR/2000/REC-xml-20001006#NT-Char
- return preg_replace('~[\x00-\x08\x0B\x0C\x0E-\x19' . ($context['utf8'] ? '\x{FFFE}\x{FFFF}' : '') . ']~' . ($context['utf8'] ? 'u' : ''), '', $string);
- }
- /**
- * @todo needs a description
- *
- * @param string $string
- * @return string
- */
- function JavaScriptEscape($string)
- {
- global $scripturl;
- return '\'' . strtr($string, array(
- "\r" => '',
- "\n" => '\\n',
- "\t" => '\\t',
- '\\' => '\\\\',
- '\'' => '\\\'',
- '</' => '<\' + \'/',
- 'script' => 'scri\'+\'pt',
- '<a href' => '<a hr\'+\'ef',
- $scripturl => '\' + smf_scripturl + \'',
- )) . '\'';
- }
- /**
- * Rewrite URLs to include the session ID.
- * What it does:
- * - rewrites the URLs outputted to have the session ID, if the user
- * is not accepting cookies and is using a standard web browser.
- * - handles rewriting URLs for the queryless URLs option.
- * - can be turned off entirely by setting $scripturl to an empty
- * string, ''. (it wouldn't work well like that anyway.)
- * - because of bugs in certain builds of PHP, does not function in
- * versions lower than 4.3.0 - please upgrade if this hurts you.
- *
- * @param string $buffer
- * @return string
- */
- function ob_sessrewrite($buffer)
- {
- global $scripturl, $modSettings, $user_info, $context;
- // If $scripturl is set to nothing, or the SID is not defined (SSI?) just quit.
- if ($scripturl == '' || !defined('SID'))
- return $buffer;
- // Do nothing if the session is cookied, or they are a crawler - guests are caught by redirectexit(). This doesn't work below PHP 4.3.0, because it makes the output buffer bigger.
- // @todo smflib
- if (empty($_COOKIE) && SID != '' && !isBrowser('possibly_robot'))
- $buffer = preg_replace('/"' . preg_quote($scripturl, '/') . '(?!\?' . preg_quote(SID, '/') . ')\\??/', '"' . $scripturl . '?' . SID . '&', $buffer);
- // Debugging templates, are we?
- elseif (isset($_GET['debug']))
- $buffer = preg_replace('/(?<!<link rel="canonical" href=)"' . preg_quote($scripturl, '/') . '\\??/', '"' . $scripturl . '?debug;', $buffer);
- // This should work even in 4.2.x, just not CGI without cgi.fix_pathinfo.
- if (!empty($modSettings['queryless_urls']) && (!$context['server']['is_cgi'] || ini_get('cgi.fix_pathinfo') == 1 || @get_cfg_var('cgi.fix_pathinfo') == 1) && ($context['server']['is_apache'] || $context['server']['is_lighttpd'] || $context['server']['is_litespeed']))
- {
- // Let's do something special for session ids!
- if (defined('SID') && SID != '')
- $buffer = preg_replace('/"' . preg_quote($scripturl, '/') . '\?(?:' . SID . '(?:;|&|&))((?:board|topic)=[^#"]+?)(#[^"]*?)?"/e', "'\"' . \$scripturl . '/' . strtr('\$1', '&;=', '//,') . '.html?' . SID . '\$2\"'", $buffer);
- else
- $buffer = preg_replace('/"' . preg_quote($scripturl, '/') . '\?((?:board|topic)=[^#"]+?)(#[^"]*?)?"/e', "'\"' . \$scripturl . '/' . strtr('\$1', '&;=', '//,') . '.html\$2\"'", $buffer);
- }
- // Return the changed buffer.
- return $buffer;
- }
- ?>
|