mirror of
https://github.com/kleeja-official/kleeja.git
synced 2025-12-15 20:49:41 +01:00
630 lines
18 KiB
PHP
Executable File
630 lines
18 KiB
PHP
Executable File
<?php
|
|
/**
|
|
*
|
|
* @package Kleeja
|
|
* @copyright (c) 2007 Kleeja.com
|
|
* @license ./docs/license.txt
|
|
*
|
|
*/
|
|
|
|
|
|
//no for directly open
|
|
if (!defined('IN_COMMON'))
|
|
{
|
|
exit();
|
|
}
|
|
|
|
|
|
class usrcp
|
|
{
|
|
// this function like a traffic sign :)
|
|
function data ($name, $pass, $hashed = false, $expire = 86400, $loginadm = false)
|
|
{
|
|
global $config, $userinfo;
|
|
|
|
//return user system to normal
|
|
if(defined('DISABLE_INTR') || $config['user_system'] == '' || empty($config['user_system']))
|
|
{
|
|
$config['user_system'] = '1';
|
|
}
|
|
|
|
|
|
//expire
|
|
$expire = time() + ((int) $expire ? intval($expire) : 86400);
|
|
|
|
$return_now = $login_status = false;
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('data_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
if($return_now)
|
|
{
|
|
return $login_status;
|
|
}
|
|
|
|
|
|
if((int) $config['user_system'] != 1)
|
|
{
|
|
if(file_exists(PATH . 'includes/auth_integration/' . trim($config['user_system']) . '.php'))
|
|
{
|
|
include_once PATH . 'includes/auth_integration/' . trim($config['user_system']) . '.php';
|
|
$login_status = kleeja_auth_login(trim($name), trim($pass), $hashed, $expire, $loginadm);
|
|
|
|
return $login_status;
|
|
}
|
|
}
|
|
|
|
//normal
|
|
return $this->normal(trim($name), trim($pass), $hashed, $expire, $loginadm);
|
|
}
|
|
|
|
//get username by id
|
|
function usernamebyid($user_id)
|
|
{
|
|
global $config;
|
|
|
|
//return user system to normal
|
|
if(defined('DISABLE_INTR'))
|
|
{
|
|
$config['user_system'] = 1;
|
|
}
|
|
|
|
$return_now = $auth_status = false;
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('auth_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
if($return_now)
|
|
{
|
|
return $auth_status;
|
|
}
|
|
|
|
if((int) $config['user_system'] != 1)
|
|
{
|
|
if(file_exists(PATH . 'includes/auth_integration/' . trim($config['user_system']) . '.php'))
|
|
{
|
|
include_once (PATH . 'includes/auth_integration/' . trim($config['user_system']) . '.php');
|
|
return kleeja_auth_username($user_id);
|
|
}
|
|
}
|
|
|
|
//normal system
|
|
$u = $this->get_data('name', $user_id);
|
|
return $u['name'];
|
|
}
|
|
|
|
//now our table, normal user system
|
|
function normal ($name, $pass, $hashed = false, $expire, $loginadm = false)
|
|
{
|
|
global $SQL, $dbprefix, $config, $userinfo;
|
|
|
|
$userinfo = array(
|
|
'id' => 0,
|
|
'group_id' => 2,
|
|
);
|
|
|
|
$query = array(
|
|
'SELECT' => '*',
|
|
'FROM' => "{$dbprefix}users",
|
|
'LIMIT' => '1'
|
|
);
|
|
|
|
if($hashed)
|
|
{
|
|
$query['WHERE'] = "id=" . intval($name) . " and password='" . $SQL->escape($pass) . "'";
|
|
}
|
|
else
|
|
{
|
|
$query['WHERE'] = "clean_name='" . $SQL->real_escape($this->cleanusername($name)) . "'";
|
|
}
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('qr_select_usrdata_n_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
$result = $SQL->build($query);
|
|
|
|
if ($SQL->num_rows($result))
|
|
{
|
|
while($row=$SQL->fetch_array($result))
|
|
{
|
|
if(empty($row['password'])) //more security
|
|
{
|
|
return false;
|
|
}
|
|
|
|
$phppass = $hashed ? $pass : $pass . $row['password_salt'];
|
|
|
|
//CHECK IF IT'S MD5 PASSWORD
|
|
if(strlen($row['password']) == '32' && empty($row['password_salt']) && defined('CONVERTED_SCRIPT'))
|
|
{
|
|
$passmd5 = md5($pass);
|
|
////update old md5 hash to phpass hash
|
|
if($row['password'] == $passmd5)
|
|
{
|
|
////new salt
|
|
$new_salt = substr(kleeja_base64_encode(pack("H*", sha1(mt_rand()))), 0, 7);
|
|
////new password hash
|
|
$new_password = $this->kleeja_hash_password(trim($pass) . $new_salt);
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('qr_update_usrdata_md5_n_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
////update now !!
|
|
$update_query = array(
|
|
'UPDATE' => "{$dbprefix}users",
|
|
'SET' => "password='" . $new_password . "' ,password_salt='" . $new_salt . "'",
|
|
'WHERE' => "id=" . intval($row['id'])
|
|
);
|
|
|
|
$SQL->build($update_query);
|
|
}
|
|
else //if the password is wrong
|
|
{
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if(($phppass != $row['password'] && $hashed) || ($this->kleeja_hash_password($phppass, $row['password']) != true && $hashed == false))
|
|
{
|
|
return false;
|
|
}
|
|
|
|
//Avoid dfining constants again for admin panel login
|
|
if(!$loginadm)
|
|
{
|
|
define('USER_ID', $row['id']);
|
|
define('GROUP_ID', $row['group_id']);
|
|
define('USER_NAME', $row['name']);
|
|
define('USER_MAIL', $row['mail']);
|
|
define('LAST_VISIT', $row['last_visit']);
|
|
}
|
|
|
|
//all user fileds info
|
|
$userinfo = $row;
|
|
|
|
$user_y = kleeja_base64_encode(serialize(array('id'=>$row['id'], 'name'=>$row['name'], 'mail'=>$row['mail'], 'last_visit'=>$row['last_visit'])));
|
|
|
|
if(!$hashed && !$loginadm)
|
|
{
|
|
$hash_key_expire = sha1(md5($config['h_key'] . $row['password']). $expire);
|
|
$this->kleeja_set_cookie('ulogu', $this->en_de_crypt($row['id'] . '|' . $row['password'] . '|' . $expire . '|' . $hash_key_expire . '|' . $row['group_id'] . '|' . $user_y), $expire);
|
|
}
|
|
|
|
#if last visit > 1 minute then update it
|
|
if(empty($row['last_visit']) || time() - $row['last_visit'] > 60)
|
|
{
|
|
$update_last_visit = array(
|
|
'UPDATE' => "{$dbprefix}users",
|
|
'SET' => "last_visit=" . time(),
|
|
'WHERE' => "id=" . intval($row['id'])
|
|
);
|
|
|
|
$SQL->build($update_last_visit);
|
|
}
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('qr_while_usrdata_n_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
}
|
|
$SQL->freeresult($result);
|
|
|
|
unset($pass);
|
|
return true;
|
|
}
|
|
else
|
|
{
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/*
|
|
get user data
|
|
new function:1rc5+
|
|
*/
|
|
function get_data($type="*", $user_id = false)
|
|
{
|
|
global $dbprefix, $SQL;
|
|
|
|
if(!$user_id)
|
|
{
|
|
$user_id = $this->id();
|
|
}
|
|
|
|
//todo :
|
|
//if type != '*' and contains no , and type in 'name, id, email' return $this->id .. etc
|
|
|
|
//te get files and update them !!
|
|
$query_name = array(
|
|
'SELECT' => $type,
|
|
'FROM' => "{$dbprefix}users",
|
|
'WHERE' => "id=" . intval($user_id)
|
|
);
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('qr_select_userdata_in_usrclass', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
$data_user = $SQL->fetch_array($SQL->build($query_name));
|
|
|
|
return $data_user;
|
|
}
|
|
|
|
/*
|
|
user ids
|
|
*/
|
|
function id ()
|
|
{
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('id_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
return defined('USER_ID') ? USER_ID : false;
|
|
}
|
|
|
|
/*
|
|
group ids
|
|
*/
|
|
function group_id ()
|
|
{
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('group_id_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
return defined('GROUP_ID') ? GROUP_ID : false;
|
|
}
|
|
|
|
/*
|
|
user name
|
|
*/
|
|
function name ()
|
|
{
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('name_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
return defined('USER_NAME') ? USER_NAME : false;
|
|
}
|
|
|
|
/*
|
|
user mail
|
|
*/
|
|
function mail ()
|
|
{
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('mail_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
return defined('USER_MAIL') ? USER_MAIL : false;
|
|
}
|
|
|
|
/*
|
|
logout func
|
|
*/
|
|
function logout()
|
|
{
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('logout_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
//acp
|
|
if(user_can('enter_acp') && !empty($_SESSION['ADMINLOGIN']))
|
|
{
|
|
$this->logout_cp();
|
|
}
|
|
|
|
//is ther any cookies
|
|
$this->kleeja_set_cookie('ulogu', '', time() - 31536000);//31536000 = year
|
|
|
|
return true;
|
|
}
|
|
|
|
/*
|
|
logut just from acp
|
|
*/
|
|
function logout_cp()
|
|
{
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('logout_cp_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
if(!empty($_SESSION['ADMINLOGIN']))
|
|
{
|
|
unset($_SESSION['ADMINLOGIN'], $_SESSION['USER_SESS'] /*, $_SESSION['LAST_VISIT']*/);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
//clean usernames
|
|
function cleanusername($uname)
|
|
{
|
|
if(!function_exists('kleeja_base64_decode'))
|
|
{
|
|
include_once (PATH . 'includes/functions_alternative.php');
|
|
}
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('cleanusername_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
static $arabic_t = array();
|
|
static $latin_t = array(
|
|
array('á','à','â','ã','å','Á','À','Â','Ã','Å','é','è','ê','ë','É','È','Ê','í','ì','ï','î','Í','Ì','Î','Ï','ò','ó','ô','õ','º','ø','Ó','Ò','Ô','Õ','Ø','ú','ù','û','Ú','Ù','Û','ç','Ç','Ñ','ñ','ÿ','Ë'),
|
|
array('a','a','a','a','a','a','a','a','a','a','e','e','e','e','e','e','e','i','i','i','i','i','i','i','i','o','o','o','o','o','o','o','o','o','o','o','u','u','u','u','u','u','c','c','n','n','y','e')
|
|
);
|
|
|
|
if(empty($arabic_t))
|
|
{
|
|
//Arabic chars must be stay in utf8 format, so we encoded them
|
|
$arabic_t = unserialize(kleeja_base64_decode('YToyOntpOjA7YToxMjp7aTowO3M6Mjoi2KMiO2k6MTtzOjI6ItilIjtpOjI7czoyOiLYpCI7aTozO3M6Mjoi2YAiO2k6NDtzOjI6Itm' .
|
|
'LIjtpOjU7czoyOiLZjCI7aTo2O3M6Mjoi2Y8iO2k6NztzOjI6ItmOIjtpOjg7czoyOiLZkCI7aTo5O3M6Mjoi2ZIiO2k6MTA7czoyOiLYoiI7aToxMTtzOjI6ItimIjt9aToxO' .
|
|
'2E6MTI6e2k6MDtzOjI6ItinIjtpOjE7czoyOiLYpyI7aToyO3M6Mjoi2YgiO2k6MztzOjA6IiI7aTo0O3M6MDoiIjtpOjU7czowOiIiO2k6NjtzOjA6IiI7aTo3O3M6MDoiIjt' .
|
|
'pOjg7czowOiIiO2k6OTtzOjA6IiI7aToxMDtzOjI6ItinIjtpOjExO3M6Mjoi2YkiO319'));
|
|
}
|
|
|
|
$uname = str_replace($latin_t[0], $latin_t[1], $uname); //replace confusable Latin chars
|
|
$uname = str_replace($arabic_t[0], $arabic_t[1], $uname); //replace confusable Arabic chars
|
|
$uname = preg_replace('#(?:[\x00-\x1F\x7F]+|(?:\xC2[\x80-\x9F])+)#', '', $uname); //un-wanted utf8 control chars
|
|
$uname = preg_replace('# {2,}#', ' ', $uname); //2+ spaces with one space
|
|
return strtolower($uname);
|
|
}
|
|
|
|
//depand on phpass class
|
|
function kleeja_hash_password($password, $check_pass = false)
|
|
{
|
|
include_once('phpass.php');
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('kleeja_hash_password_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
|
|
$hasher = new PasswordHash(8, true);
|
|
$return = $hasher->HashPassword($password);
|
|
|
|
//return check or hash
|
|
return $check_pass != false ? $hasher->CheckPassword($password, $check_pass) : $return;
|
|
}
|
|
|
|
//kleeja cookie
|
|
function kleeja_set_cookie($name, $value, $expire)
|
|
{
|
|
global $config;
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('kleeja_set_cookie_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
//
|
|
//when user add cookie_* in config this will replace the current ones
|
|
//
|
|
global $config_cookie_name, $config_cookie_domain, $config_cookie_secure, $config_cookie_path;
|
|
$config['cookie_name'] = isset($config_cookie_name) ? $config_cookie_name : $config['cookie_name'];
|
|
$config['cookie_domain'] = isset($config_cookie_domain) ? $config_cookie_domain : $config['cookie_domain'];
|
|
$config['cookie_secure'] = isset($config_cookie_secure) ? $config_cookie_secure : $config['cookie_secure'];
|
|
$config['cookie_path'] = isset($config_cookie_path) ? $config_cookie_path : $config['cookie_path'];
|
|
|
|
//
|
|
//when user add define('FORCE_COOKIES', true) in config.php we will make our settings of cookies
|
|
//
|
|
if(defined('FORCE_COOKIES'))
|
|
{
|
|
$config['cookie_domain'] = (!empty($_SERVER['HTTP_HOST'])) ? strtolower($_SERVER['HTTP_HOST']) : ((!empty($_SERVER['SERVER_NAME'])) ? $_SERVER['SERVER_NAME'] : @getenv('SERVER_NAME'));
|
|
$config['cookie_domain'] = str_replace('www.', '.', substr($config['cookie_domain'], 0, strpos($config['cookie_domain'], ':')));
|
|
$config['cookie_path'] = '/';
|
|
$config['cookie_secure'] = (isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == 'on') ? true : false;
|
|
}
|
|
|
|
// Enable sending of a P3P header
|
|
header('P3P: CP="CUR ADM"');
|
|
|
|
$name_data = rawurlencode($config['cookie_name'] . '_' . $name) . '=' . rawurlencode($value);
|
|
$rexpire = gmdate('D, d-M-Y H:i:s \\G\\M\\T', $expire);
|
|
$domain = (!$config['cookie_domain'] || $config['cookie_domain'] == 'localhost' || $config['cookie_domain'] == '127.0.0.1') ? '' : '; domain=' . $config['cookie_domain'];
|
|
|
|
header('Set-Cookie: ' . $name_data . (($expire) ? '; expires=' . $rexpire : '') . '; path=' . $config['cookie_path'] . $domain . ((!$config['cookie_secure']) ? '' : '; secure') . '; HttpOnly', false);
|
|
}
|
|
|
|
//encrypt and decrypt any data with our function
|
|
function en_de_crypt($data, $type = 1)
|
|
{
|
|
global $config;
|
|
static $txt = array();
|
|
|
|
if(empty($txt))
|
|
{
|
|
if(empty($config['h_key']))
|
|
{
|
|
$config['h_key'] = sha1(microtime());
|
|
}
|
|
|
|
$chars = str_split($config['h_key']);
|
|
|
|
foreach(range('a', 'z') as $k=>$v)
|
|
{
|
|
if(!isset($chars[$k]))
|
|
{
|
|
break;
|
|
}
|
|
$txt[$v] = $chars[$k] . $k . '-';
|
|
}
|
|
}
|
|
|
|
switch($type)
|
|
{
|
|
case 1:
|
|
$data = str_replace('=', '_', kleeja_base64_encode($data));
|
|
$data = strtr($data, $txt);
|
|
break;
|
|
case 2:
|
|
$txtx = array_flip($txt);
|
|
$txtx = array_reverse($txtx, true);
|
|
$data = strtr($data, $txtx);
|
|
$data = kleeja_base64_decode(str_replace('_', '=', $data));
|
|
break;
|
|
}
|
|
|
|
return $data;
|
|
}
|
|
|
|
|
|
//
|
|
//get cookie
|
|
//
|
|
function kleeja_get_cookie($name)
|
|
{
|
|
global $config;
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('kleeja_get_cookie_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
return isset($_COOKIE[$config['cookie_name'] . '_' . $name]) ? $_COOKIE[$config['cookie_name'] . '_' . $name] : false;
|
|
}
|
|
|
|
//check if user is admin or not
|
|
//return : mean return true or false, but if return is false will show msg
|
|
function kleeja_check_user()
|
|
{
|
|
global $config, $SQL, $dbprefix, $userinfo;
|
|
|
|
is_array($plugin_run_result = Plugins::getInstance()->run('kleeja_check_user_func_usr_class', get_defined_vars())) ? extract($plugin_run_result) : null; //run hook
|
|
|
|
#to make sure
|
|
$userinfo = array(
|
|
'id' => -1,
|
|
'group_id' => 2,
|
|
);
|
|
|
|
//if login up
|
|
if($this->kleeja_get_cookie('ulogu'))
|
|
{
|
|
$user_data = false;
|
|
|
|
list($user_id, $hashed_password, $expire_at, $hashed_expire, $group_id, $u_info) = @explode('|', $this->en_de_crypt($this->kleeja_get_cookie('ulogu'), 2));
|
|
|
|
//if not expire
|
|
if(($hashed_expire == sha1(md5($config['h_key'] . $hashed_password) . $expire_at)) && ($expire_at > time()))
|
|
{
|
|
/* For better performance we will take the risks */
|
|
/*
|
|
!defined('IN_DOWNLOAD')
|
|
*/
|
|
//exit(print_r( @explode('|', $this->en_de_crypt($this->kleeja_get_cookie('ulogu'), 2))));
|
|
if(user_can('enter_acp', $group_id))
|
|
{
|
|
$user_data = $this->data($user_id, $hashed_password, true, $expire_at);
|
|
}
|
|
else
|
|
{
|
|
if(!empty($u_info))
|
|
{
|
|
$userinfo = unserialize(kleeja_base64_decode($u_info));
|
|
$userinfo['group_id'] = $group_id;
|
|
$userinfo['password'] = $hashed_password;
|
|
|
|
define('USER_ID', $userinfo['id']);
|
|
define('GROUP_ID', $userinfo['group_id']);
|
|
define('USER_NAME', $userinfo['name']);
|
|
define('USER_MAIL', $userinfo['mail']);
|
|
define('LAST_VISIT', $userinfo['last_visit']);
|
|
$user_data = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
if($user_data == false)
|
|
{
|
|
$this->logout();
|
|
}
|
|
else
|
|
{
|
|
return $user_data;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
#guest
|
|
define('USER_ID', $userinfo['id']);
|
|
define('GROUP_ID', $userinfo['group_id']);
|
|
}
|
|
|
|
return false; //nothing
|
|
}
|
|
|
|
|
|
/*
|
|
* convert from utf8 to cp1256 and vice versa
|
|
*/
|
|
function kleeja_utf8($str, $to_utf8 = true)
|
|
{
|
|
$utf8 = new kleeja_utf8;
|
|
if($to_utf8)
|
|
{
|
|
//return iconv('CP1256', "UTF-8//IGNORE", $str);
|
|
return $utf8->to_utf8($str);
|
|
}
|
|
return $utf8->from_utf8($str);
|
|
//return iconv('UTF-8', "CP1256//IGNORE", $str);
|
|
}
|
|
|
|
}#end class
|
|
|
|
|
|
/**
|
|
* Deep modifieded by Kleeja team ...
|
|
* depend on class by Alexander Minkovsky (a_minkovsky@hotmail.com)
|
|
*/
|
|
class kleeja_utf8
|
|
{
|
|
var $ascMap = array();
|
|
var $utfMap = array();
|
|
//ignore the untranslated char, of you put true we will translate it to html tags
|
|
//it's same the action of //IGNORE in iconv
|
|
var $ignore = false;
|
|
|
|
//Constructor
|
|
function __construct()
|
|
{
|
|
static $lines = array();
|
|
if(empty($lines))
|
|
{
|
|
$lines = explode("\n", preg_replace(array("/#.*$/m", "/\n\n/"), '', file_get_contents(PATH . 'includes/CP1256.MAP')));
|
|
}
|
|
if(empty($this->ascMap))
|
|
{
|
|
foreach($lines as $line)
|
|
{
|
|
$parts = explode('0x', $line);
|
|
if(sizeof($parts) == 3)
|
|
$this->ascMap[hexdec(trim($parts[1]))] = hexdec(trim($parts[2]));
|
|
}
|
|
$this->utfMap = array_flip($this->ascMap);
|
|
}
|
|
}
|
|
|
|
//Translate string ($str) to UTF-8 from given charset
|
|
function to_utf8($str)
|
|
{
|
|
$chars = unpack('C*', $str);
|
|
$cnt = sizeof($chars);
|
|
for($i=1;$i <= $cnt; ++$i)
|
|
$this->_charToUtf8($chars[$i]);
|
|
return implode('', $chars);
|
|
}
|
|
|
|
//Translate UTF-8 string to single byte string in the given charset
|
|
function from_utf8($utf)
|
|
{
|
|
$chars = unpack('C*', $utf);
|
|
$cnt = sizeof($chars);
|
|
$res = ''; //No simple way to do it in place... concatenate char by char
|
|
for ($i=1;$i<=$cnt;$i++)
|
|
$res .= $this->_utf8ToChar($chars, $i);
|
|
return $res;
|
|
}
|
|
|
|
//Char to UTF-8 sequence
|
|
function _charToUtf8(&$char)
|
|
{
|
|
$c = (int) $this->ascMap[$char];
|
|
if ($c < 0x80)
|
|
$char = chr($c);
|
|
else if($c<0x800) // 2 bytes
|
|
$char = (chr(0xC0 | $c>>6) . chr(0x80 | $c & 0x3F));
|
|
else if($c<0x10000) // 3 bytes
|
|
$char = (chr(0xE0 | $c>>12) . chr(0x80 | $c>>6 & 0x3F) . chr(0x80 | $c & 0x3F));
|
|
else if($c<0x200000) // 4 bytes
|
|
$char = (chr(0xF0 | $c>>18) . chr(0x80 | $c>>12 & 0x3F) . chr(0x80 | $c>>6 & 0x3F) . chr(0x80 | $c & 0x3F));
|
|
}
|
|
|
|
//UTF-8 sequence to single byte character
|
|
function _utf8ToChar(&$chars, &$idx)
|
|
{
|
|
if(($chars[$idx] >= 240) && ($chars[$idx] <= 255))// 4 bytes
|
|
$utf = (intval($chars[$idx]-240) << 18) + (intval($chars[++$idx]-128) << 12) + (intval($chars[++$idx]-128) << 6) + (intval($chars[++$idx]-128) << 0);
|
|
else if (($chars[$idx] >= 224) && ($chars[$idx] <= 239)) // 3 bytes
|
|
$utf = (intval($chars[$idx]-224) << 12) + (intval($chars[++$idx]-128) << 6) + (intval($chars[++$idx]-128) << 0);
|
|
else if (($chars[$idx] >= 192) && ($chars[$idx] <= 223))// 2 bytes
|
|
$utf = (intval($chars[$idx]-192) << 6) + (intval($chars[++$idx]-128) << 0);
|
|
else// 1 byte
|
|
$utf = $chars[$idx];
|
|
|
|
if(array_key_exists($utf, $this->utfMap))
|
|
return chr($this->utfMap[$utf]);
|
|
else
|
|
return $this->ignore ? '' : '&#' . $utf . ';';
|
|
}
|
|
}
|
|
|
|
#<-- EOF
|