$line) { $linlen = strlen($line); $newline = ""; for($i = 0; $i < $linlen; $i++) { $c = $line{$i}; $dec = ord($c); if ( ($dec == 32) && ($i == ($linlen - 1)) ) { // convert space at eol only $c = "=20"; } elseif ( ($dec == 61) || ($dec < 32 ) || ($dec > 126) ) { // always encode "\t", which is *not* required $c = $escape.strtoupper(sprintf("%02x",$dec)); } if ( (strlen($newline) + strlen($c)) >= $line_max ) { // CRLF is not counted $output .= $newline.$escape.$eol; $newline = " "; } $newline .= $c; } // end of for $output .= $newline; if ($jnumRows()) { $_SESSION['check_ip'] = $res->fetchOneCell(); } else { $_SESSION['check_ip'] = 'safe'; } } $test = array(); switch ($level) { case 'unsafe': $test[] = 'unsafe'; case 'dangerous': $test[] = 'dangerous'; case 'ban': $test[] = 'ban'; break; default: return false; } return in_array($_SESSION['check_ip'], $test); } function check_email($email, $message) { $res = XDB::query("SELECT state, description FROM emails_watch WHERE state != 'safe' AND email = {?}", $email); if ($res->numRows()) { send_warning_mail($message); return true; } return false; } function check_redirect($red = null) { require_once 'emails.inc.php'; if (is_null($red)) { $red = new Redirect(S::v('uid')); } $_SESSION['no_redirect'] = !$red->other_active(''); $_SESSION['mx_failures'] = $red->get_broken_mx(); } function send_warning_mail($title) { $mailer = new PlMailer(); $mailer->setFrom("webmaster@polytechnique.org"); $mailer->addTo("hotliners@staff.polytechnique.org"); $mailer->setSubject("[Plat/al Security Alert] $title"); $mailer->setTxtBody("Identifiants de session :\n" . var_export($_SESSION, true) . "\n\n" ."Identifiants de connexion :\n" . var_export($_SERVER, true)); $mailer->send(); } // vim:set et sw=4 sts=4 sws=4 foldmethod=marker enc=utf-8: ?>