Page MenuHomePhabricator

local.inc
No OneTemporary

local.inc

<?
class CDRTool_CT_Sql extends CT_Sql {
var $database_class = "DB_CDRTool"; ## Which database to connect...
var $database_table = "active_sessions"; ## and find our session data in this table.
}
class CDRTool_Session extends Session {
var $classname = "CDRTool_Session";
var $auto_init = "setup.inc";
var $cookiename = "CDRc"; ## defaults to classname
var $magic = "bzssdgaune"; ## ID seed
var $mode = "cookie"; ## We propagate session IDs with cookies
var $fallback_mode = "get";
var $allowcache = "no";
var $allowcache_expires = "5";
var $lifetime = 0; ## 0 = do session cookies, else minutes
var $that_class = "CDRTool_CT_Sql"; ## name of data storage container
var $gc_probability = 5;
}
class CDRTool_User extends User {
var $classname = "CDRTool_User";
var $magic = "Abraacdascadabra"; ## ID seed
var $that_class = "CDRTool_CT_Sql"; ## data storage container
}
class CDRTool_Auth extends Auth {
var $classname = "CDRTool_Auth";
var $lifetime = 240;
var $database_class = "DB_CDRTool";
var $database_table = "auth_user";
function auth_loginform() {
global $sess;
global $_PHPLIB;
global $max_login_attempts;
global $CDRTool;
$username = $_POST["username"];
$sendotp = $_POST["sendotp"];
$password = $_POST["password"];
$challenge = $_POST["challenge"];
$response = $_POST["response"];
$max_login_attempts=5;
$sess->register("challenge");
if (!$challenge) {
$challenge = md5(uniqid($this->magic));
}
$query=sprintf("select * from spam where ip = '%s'",$_SERVER['REMOTE_ADDR']);
$this->db->query($query);
if ($this->db->num_rows()) {
$this->db->next_record();
$spam_login_ip = $this->db->f('ip');
$spam_login_tries = $this->db->f('tries');
$spam_login_stamp = $this->db->f('stamp');
$next_try = $spam_login_stamp+120;
$remains = $next_try-time();
$next_try = Date("Y-m-d H:i:s",$next_try);
$now = Date("Y-m-d H:i:s",time());
}
if ($remains < 0) {
$query="delete from spam where ip = '$spam_login_ip'";
if ($this->db->query("$query")) {
unset($spam_login_tries);
}
}
if ($spam_login_tries < $max_login_attempts) {
$title="Login";
if (is_readable("/etc/cdrtool/local/header.phtml")) {
include("/etc/cdrtool/local/header.phtml");
} else {
include("$CDRTool[Path]/header.phtml");
}
$layout = new pageLayoutLocal();
$layout->showLoginForm($this);
$layout->showFooter();
} else {
if ($spam_login_tries == $max_login_attempts) {
$log_time=Date("Y-m-d H:i:s",time());
$log_query=sprintf("insert into log (date,login,ip,description,results)
values ('%s','%s','%s','%s attempts to wrong login', 'IP blocked until %s')",
$log_time,addslashes($username),$_SERVER['REMOTE_ADDR'],$spam_login_tries,$next_try);
$this->db->query($log_query);
}
$new_stamp=time();
$query=sprintf("update spam
set tries = tries + 1
where ip = '%s' ",$_SERVER['REMOTE_ADDR']);
$this->db->query($query);
print "
<html>
<body>
<p>The current time on this system is $now.
<p>Too many wrong attempts to login, wait until
$next_try (over $remains seconds) and try again.
<p>
If you forgot your password please contact your system administrator for obtaining a new one.
</body>
</html>
";
exit;
}
}
function auth_validatelogin() {
global $d_cli, $d_card, $prepaid_login, $cust_form, $codeFilter, $aNumberFilter,$login_for;
global $CDRTool;
global $otp_error, $otpasswd;
global $verbose;
global $DATASOURCES;
$username = $_POST["username"];
$sendotp = $_POST["sendotp"];
$password = $_POST["password"];
$challenge = $_POST["challenge"];
$response = $_POST["response"];
$REMOTE_ADDR = $_SERVER["REMOTE_ADDR"];
if(isset($username)) {
$this->auth["uname"]=$username; ## This provides access for "loginform.ihtml"
}
$uid = false;
if ($username) {
$username=trim($username);
if (preg_match ("/\@/",$username)) {
$a=explode("@",$username);
$domainAuth = new DomainAuthLocal();
$ret=$domainAuth->validate($a[0],$a[1],$password);
if ($ret[0]) {
foreach ($ret[2] as $allowedDS) {
$CDRTool[dataSourcesAllowed][]=$allowedDS;
}
if ($ret[1] == "subscriber") {
$CDRTool[filter][aNumber] = $username;
$this->auth["perm"] = "callsearch,statistics,showPrice,showCallerId";
} else {
$CDRTool[filter][domain] = $a[1];
$this->auth["perm"] = "callsearch,statistics,showPrice,showCallerId";
}
}
return $ret[0];
} else {
$username_sql=addslashes($username);
$this->db->query("select * from auth_user where
username = '$username_sql' and expire > NOW()");
$this->db->next_record();
$otp_enabled_db =$this->db->f('otp_enable');
$otp_email =$this->db->f('email');
$otp_tel =$this->db->f('tel');
$otp_passwd =$this->db->f('otp_passwd');
$otp_passwd_md5 =md5($this->db->f('otp_passwd'));
if ($sendotp) {
if ($otp_email || $otp_tel) {
$interval="15";
print "<p>Sending OneTimePassword ";
$random_otp=random_passwd_gen();
$expire_otp= date("Y-m-d H:i:s", mktime(date("H"),date("i")+$interval,0,date("m") ,date("d"),date("Y")));
$update="update auth_user
set otp_passwd='$random_otp',
otp_expire = '$expire_otp'
where username = '$username_sql'
";
if ($this->db->query($update)) {
if ($otp_email) {
$body=sprintf("%s valid until %s CET (GMT+1) requested from %s",$random_otp,$expire_otp,$_SERVER['REMOTE_ADDR']);
mail($otp_email, "OTP for CDRTool", $body, "From: support@ag-projects.com");
}
if ($otp_tel) {
$body=sprintf("Password is %s valid until %s CET (GMT+1) from %s",$random_otp,$expire_otp,$_SERVER['REMOTE_ADDR']);
$otp_tel=preg_replace("/[^0-9+]/","",$otp_tel);
otp_sms($otp_tel, $body,"1");
}
print "<p>
Password will expire at: $expire_otp (in $interval minutes)<br>";
}
} else {
print "<p>No OTP recipient exists for this account. ";
}
}
$this->db->query(sprintf("
select *,UNIX_TIMESTAMP(otp_expire) as timestamp_otp ,
UNIX_TIMESTAMP() as timestamp_now ".
" from %s ".
" where username = '%s' " .
" and expire > NOW() " ,
$this->database_table,
addslashes($username)));
$this->db->next_record();
$uid = $this->db->f("user_id");
$perm = $this->db->f("perms");
$pass = $this->db->f("password");
$pass_md5 = md5($this->db->f("password"));
$otp_passwd = $this->db->f("otp_passwd");
if (strlen($this->db->f('otp_passwd'))) {
$otp_passwd_md5 =md5($this->db->f('otp_passwd'));
} else {
$otp_passwd_md5="garbage";
}
$timestamp_otp = $this->db->f("timestamp_otp");
$timestamp_now = $this->db->f("timestamp_now");
$CDRTool['loginName'] = $this->db->f("name");
$CDRTool['loginEmail'] = $this->db->f("email");
$_dataSourcesAllowed = explode(",",$this->db->f("sources"));
$_datasourceDefined = array_keys($DATASOURCES);
$CDRTool['dataSourcesAllowed'] = array_intersect($_dataSourcesAllowed,$_datasourceDefined);
// limits per CDRTool login account
$CDRTool['filter']['user_id'] = $this->db->f("user_id");
$CDRTool['filter']['aNumber'] = $this->db->f('aNumberFilter');
$CDRTool['filter']['displayA'] = $this->db->f('display_cli');
$CDRTool['filter']['domain'] = $this->db->f('domainFilter');
$CDRTool['filter']['gateway'] = $this->db->f('gatewayFilter');
$CDRTool['filter']['compid'] = $this->db->f('compidFilter');
$CDRTool['filter']['cscode'] = $this->db->f('cscodeFilter');
if (preg_match("/^(\d+)\.(\d+)$/",$this->db->f('impersonate'),$m)) {
$CDRTool['filter']['reseller'] = $m[2];
} else if (preg_match("/^(\d+)$/",$this->db->f('impersonate'),$m)) {
$CDRTool['filter']['reseller'] = $m[1];
} else {
$CDRTool['filter']['reseller'] = '';
}
$CDRTool['impersonate'] = $this->db->f('impersonate');
if ($this->db->f('only_after_date') && $this->db->f('only_after_date') != "0000-00-00") {
$CDRTool[filter][after_date]=$this->db->f('only_after_date');
}
$expected_response = md5("$username:$pass_md5:$challenge");
$expect_otp=md5("$username:$otp_passwd_md5:$challenge");
## True when JS is disabled
if ($response == "") {
if ($password == $pass || ($password == $otp_passwd && $timestamp_otp > $timestamp_now)) {
$this->auth["perm"] = $perm;
return $uid;
} else {
return false;
}
} else {
## Response is set, JS is enabled
// we check if either otp or normal password match
//print "<p>$response == $expected_response <p>$response == $expect_otp";
if ($expected_response == $response || ($response == $expect_otp && $timestamp_otp > $timestamp_now)) {
$this->auth["perm"] = $perm;
return $uid;
} else {
return false;
}
}
}
}
}
}
class CDRTool_Perm extends Perm {
var $classname = "CDRTool_Perm";
var $permissions = array(
"admin" => 1,
"callsearch" => 2,
"statistics" => 4,
"sqlquery" => 8,
"soapclient" => 16,
"rates" => 32,
"showCallerId" => 64,
"showPrice" => 128,
"provisioning" => 256,
"readonly" => 512
);
function perm_invalid($does_have, $must_have) {
global $perm, $auth, $sess;
global $_PHPLIB;
include($_PHPLIB["libdir"] . "perminvalid.phtml");
}
}
class SIP_Subscriber_Session extends Session {
var $classname = "SIP_Subscriber_Session";
var $auto_init = "SIP_setup.inc";
var $cookiename = "SIPCookie2"; ## defaults to classname
var $magic = "3333jhjjjss13"; ## ID seed
var $mode = "cookie"; ## We propagate session IDs with cookies
var $fallback_mode = "get";
var $allowcache = "public";
var $lifetime = 0; ## 0 = do session cookies, else minutes
var $that_class = "CDRTool_CT_Sql"; ## name of data storage container
var $gc_probability = 5;
}
class SIP_Subscriber_Auth extends Auth {
// use this auth for SIP accounts
var $classname = "SIP_Subscriber_Auth";
var $lifetime = 0;
var $magic = "d66mmmg111dsgzz"; ## Challenge seed
function auth_loginform() {
global $sess;
global $max_login_attempts;
$username = $_POST["username"];
$password = $_POST["password"];
$challenge = $_POST["challenge"];
$step = $_POST["step"];
$REMOTE_ADDR = $_SERVER["REMOTE_ADDR"];
$sess->register("challenge");
if (!$challenge) {
$challenge = md5(uniqid($this->magic));
}
include("sip_login.phtml");
}
function auth_validatelogin() {
global $SIP;
$username = $_POST["username"];
$password = $_POST["password"];
$challenge = $_POST["challenge"];
$response = $_POST["response"];
if(isset($username)) {
$this->auth["uname"]=$username;
}
$a=explode("@",$username);
$domain= $a[1];
if (count($a) !=2 ) return false;
global $domainFilters, $resellerFilters, $soapEngines ;
require_once('SOAP/Client.php');
require("/etc/cdrtool/ngnpro_engines.inc");
require_once("ngnpro_soap_library.php");
$SIP['account'] = $username;
if ($domainFilters[$domain]['sip_engine']) {
$SIP['engine'] = $domainFilters[$domain]['sip_engine'];
} else if ($domainFilters['default']['sip_engine']) {
$SIP['engine']=$domainFilters['default']['sip_engine'];
} else {
print "Error: cannot authenticate SIP subscriber, no domainFilter defined in ngnpro_engines.inc";
return false;
}
printf ("Engine=%s",$SIP['engine']);
$this->SOAPlogin=array(
"username" => $soapEngines[$SIP['engine']]['username'],
"password" => $soapEngines[$SIP['engine']]['password'],
"admin" => true
);
$this->SoapAuth = array('auth', $this->SOAPlogin , 'urn:AGProjects:NGNPro', 0, '');
$this->SipPort = new WebService_NGNPro_SipPort($soapEngines[$SIP['engine']]['url']);
$this->SipPort->setOpt('curl', CURLOPT_TIMEOUT, 5);
$this->SipPort->setOpt('curl', CURLOPT_SSL_VERIFYPEER, 0);
$this->SipPort->setOpt('curl', CURLOPT_SSL_VERIFYHOST, 0);
$this->SipPort->addHeader($this->SoapAuth);
$result = $this->SipPort->getAccount(array("username" =>$a[0],"domain" =>$domain));
if (PEAR::isError($result)) {
$error_msg = $result->getMessage();
$error_fault= $result->getFault();
$error_code = $result->getCode();
printf ("<p><font color=red>Error from %s (SipPort): %s (%s): %s</font>",$soapEngines[$SIP['engine']]['url'],$error_msg, $error_fault->detail->exception->errorcode,$error_fault->detail->exception->errorstring);
return false;
}
$pass_md5 = md5($result->password);
$expected_response = md5("$username:$pass_md5:$challenge");
$SIP['customer'] = $result->customer;
$SIP['reseller'] = $result->reseller;
if ($expected_response == $response) {
return true;
} else {
return false;
}
}
}
function otp_sms($tel,$message,$hideoutput) {
$tel=preg_replace("/[^0-9]/","",$tel);
$tel="+".$tel;
$message=substr($message,0,135);
if (!$tel || !$message) return 0;
$cmd="/usr/bin/sms --destination $tel --message \"$message\"";
exec($cmd,$output,$returnCode);
if ($returnCode == "0") {
if (!$hideoutput) {
print "<p>";
printf (_("SMS sent succesfully to %s. "), $tel);
}
} else {
print "<p>";
print "<b>";
print "OTP ";
print _("Error");
}
}
function random_passwd_gen() {
# Calculating random password
$alf=array("a","b","c","d","e","f",
"h","i","j","k","l","m",
"n","p","r","s","t","w",
"x","y","1","2","3","4",
"5","6","7","8","9");
while($i < 5) {
srand((double)microtime()*1000000);
$randval = rand(0,28);
$random_otp="$random_otp"."$alf[$randval]";
$i++;
}
return $random_otp;
}
function dprint($msg="") {
global $verbose;
if ($verbose) {
print "<br>$msg\n";
}
}
function dprint_r($obj) {
global $verbose;
if ($verbose) {
print "<pre>\n";
print_r($obj);
print "</pre>\n";
}
}
function checkEmail($email) {
global $verbose;
dprint ("<b>checkEmail($email) </b>");
if (stristr($email,"-.") ||
!preg_match("/^[a-zA-Z0-9][a-zA-Z0-9_.-]*@([a-zA-Z0-9][a-zA-Z0-9-]*\.)+[a-zA-Z]{2,}$/i",$email)) {
return 0;
}
return 1;
}
class OpenSIPS_DomainAuth {
function OpenSIPS_DomainAuth () {
$this->userDB = new DB_opensips;
$this->allowedDataSourcesSubscriber = array('opensips_radius','sip_trace','media_trace');
}
function validate ($user, $domain, $password) {
$ha1 = md5($user. ':' . $domain . ':' . $password);
$query = sprintf("SELECT * FROM subscriber
WHERE username = '%s'
AND domain = '%s'
AND ( password = '%s' or ha1 = '%s') ",
addslashes($user),
addslashes($domain),
addslashes($password),
addslashes($ha1)
);
if ($this->userDB->query($query)) {
$this->userDB->next_record();
$uid = $this->userDB->f('username');
if ($uid) {
return array($uid, "subscriber", $this->allowedDataSourcesSubscriber);
}
}
}
}
class SipThor_DomainAuth {
function SipThor_DomainAuth () {
$this->userDB = new DB_sipthor;
$this->allowedDataSourcesSubscriber = array('sipthor','sip_trace_thor','media_trace_thor');
}
function validate ($user, $domain, $password) {
$query = sprintf("SELECT * FROM sip_accounts
WHERE username = '%s'
AND domain = '%s'
",
addslashes($user),
addslashes($domain)
);
if ($this->userDB->query($query)) {
$this->userDB->next_record();
$profile=json_decode($this->userDB->f('profile'),'true');
if ($profile['password'] == $password) {
$uid = $this->userDB->f('username');
if ($uid) {
return array($uid, "subscriber", $this->allowedDataSourcesSubscriber);
}
}
}
}
}
class pageLayout {
function showLoginForm(&$parentAuth) {
global $username, $otp_error, $CDRTool;
$auth=$parentAuth;
print "
<script language=javascript src=md5.js></script>
<script language=javascript>
function doChallengeResponse() {
str = document.login.username.value + \":\" +
MD5(document.login.password.value) + \":\" +
document.login.challenge.value;
document.login.response.value = MD5(str);
document.login.password.value = \"\";
document.login.submit();
}
</script>
<script language=JavaScript>
<!--
if (document.forms[0][0].value != '') {
document.forms[0][1].focus();
} else {
document.forms[0][0].focus();
}
// -->
</script>
";
$url=$auth->url();
print "
<center>
<br>
";
$this->hasAGProjectslogo=1;
$logo=$CDRTool['tld']."/images/CDRTool.gif";
print "<a href=http://cdrtool.ag-projects.com target=agprojects><img src=$logo border=0></a>";
print "
<form action=\"$url\" method=post>
<p>
<table align=center cellspacing=0 cellpadding=2 width=300 border=5>
<tr>
<td colspan=2>
<p>
Please identify yourself with username and password.
";
if ($CDRTool[provider][sampleLoginSubscriber]) {
$sampleLoginSubscriber = $CDRTool[provider][sampleLoginSubscriber];
} else {
$sampleLoginSubscriber="account@example.com";
}
if ($CDRTool[provider][sampleLoginDomain]) {
$sampleLoginDomain = $CDRTool[provider][sampleLoginDomain];
} else {
$sampleLoginDomain="client2.eurovoice.ro";
}
$web_username=$auth->auth["uname"];
print "
<p>
<ul>
<li>Subscriber account (e.g. $sampleLoginSubscriber)</li>
<li>Domain account (e.g. $sampleLoginDomain)</li>
<li>Administrator account
</ul>
</td>
</tr>
<tr valign=middle align=left>
<td>Username:</td>
<td>
<input type=text name=username value=\"$web_username\" size=40 maxlength=255></td>
</tr>
<tr valign=middle align=left>
<td>Password:</td>
<td>
<input type=password name=password size=40 maxlength=32></td>
</tr>
<tr>
<td valign=center align=center>
&nbsp;
</td>
<td align=left>
<input onClick=\"doChallengeResponse(); return false;\" type=submit name=submitbtn value=\"Login now\">
</td>
</tr>
";
print "
<tr>
<td colspan=2>
<p>
If you make use of <b>O</b>ne <b>T</b>ime <b>P</b>asswords:
<ul class=s>
<li>Fill in your username
<li>Press the Send OTP button
<li>Collect the password
<li>Fill it in the password field
<li>Press the Login Now button to login
</ul>
<input type=submit name=sendotp value=\"Send OTP\">
</td>
</tr>
";
print "
</table>
";
if ( isset($username)) {
if (!$sendotp || $username) {
print "
<p>
<table>
<tr>
<td colspan=2><font color=red><b>Invalid username/password combination. <br>
<br> $otp_error</b></font></td>
</tr>
</table>
";
$spam=new DB_CDRTool;
$query="select * from spam where ip = '$_SERVER[REMOTE_ADDR]'";
$spam->query($query);
if (!$spam->num_rows()) {
$query=sprintf("insert into spam (ip,tries,login,stamp)
values ('%s','1','%s','%s')
",$_SERVER[REMOTE_ADDR],addslashes($username),time());
} else {
$query=sprintf("update spam set
tries = tries +1 where ip = '%s'", $_SERVER[REMOTE_ADDR]);
}
$spam->query($query);
} else {
print "Please fill in your One Time Password!";
}
}
print "
</table>
</form>
";
}
function showHeader($title='') {
}
function showTopMenu($title='') {
global $DATASOURCES, $CDRTool, $cdr_source, $perm;
$version=trim(file_get_contents('version'));
print "<table width=100% cellpadding=5 CELLSPACING=0 border=5 align=center>
<tr>
";
if (is_readable($CDRTool['Path']."/images/logo.gif")) {
printf ("<td valign=middle><img src=\"%s/images/logo.gif\"></td>",$CDRTool['tld']);
} else if (is_readable($CDRTool['Path']."/images/logo.jpg")) {
printf ("<td valign=middle><img src=\"%s/images/logo.jpg\"></td>",$CDRTool['tld']);
} else if (is_readable($CDRTool['Path']."/images/logo.png")) {
printf ("<td valign=middle><img src=\"%s/images/logo.png\"></td>",$CDRTool['tld']);
} else {
$this->hasAGProjectslogo=1;
print "<td>";
printf ("<a href=http://cdrtool.ag-projects.com target=agprojects><img src='%s/images/CDRTool.gif' border=0></a>",$CDRTool['tld']);
print "</td>";
}
print "
<td width=100%>
<table width=100%>
</tr>
<td>";
print "<h1>$title";
print " ";
print $DATASOURCES[$cdr_source]['name'];
print "</h1><p>";
print "<td align=right>";
print "</td></tr>
</table>
";
print "<table width=100%>
<tr>
<td align=left>
";
if ($perm->have_perm("callsearch")) {
print " <a href=callsearch.phtml>CDRs</a> ";
}
if ($perm->have_perm("rates")) {
print " | <a href=rating_tables.phtml>Rating</a>";
print " | <a href=rating_tables.phtml?table=prepaid>Prepaid</a>";
print " | <a href=rating_tables.phtml?table=quota_usage>Quota</a>";
}
if ($perm->have_perm("statistics")) {
print " | <a href=network_status.phtml>Network</a>";
print " | <a href=media_sessions.phtml>Sessions</a>";
print " | <a href=status/usage/index.phtml target=usage>Usage</a>";
}
if ($perm->have_perm("admin")) {
print " | <a href=mysql_replication_status.phtml>Replication</a>";
}
if ($perm->have_perm("provisioning")) {
print " | <a href=provisioning.phtml>Provisioning</a>";
}
print " | <a href=accounts.phtml>Accounts</a>";
print " | <a href=log.phtml>Logs</a>";
$now_print=Date("Y-m-d H:i:s",time());
$tz=$CDRTool['provider']['timezone'];
print " | $now_print | <a href=doc/changelog target=changelog>v. $version</a>";
print "
</td>
<td align=right>
";
printf ("<a href=logout.phtml target=_top><b>Logout %s</b></a>",$CDRTool['loginName']);
print "
</tr>
</table>
</td>
</tr>
</table>
<p>
";
}
function showTopMenuSubscriber($title="") {
global $DATASOURCES, $CDRTool, $cdr_source, $perm;
$version=trim(file_get_contents(version));
print "<table width=100% cellpadding=5 CELLSPACING=0 border=5 align=center>
<tr>
<td>
<table width=100%>
</tr>
<td>";
print "<h1>$title";
print " ";
print $DATASOURCES[$cdr_source]['name'];
print "</h1><p>";
print "<td align=right>";
print "</td></tr>
</table>
";
print "<table width=100%>
<tr>
<td align=left>
";
if ($perm->have_perm("callsearch")) {
print " <a href=callsearch.phtml>Call detail records</a>";
}
$now_print=Date("Y-m-d H:i:s",time());
$tz=getenv('TZ');
print " | $now_print ($tz) | v. $version";
print "
</td>
<td align=right>
";
printf ("<a href=logout.phtml target=_top><b>Logout %s</b></a>",$CDRTool['loginName']);
print "
</tr>
</table>
</td>
</tr>
</table>
<p>
";
}
function showLegalNotice () {
global $loginname, $CDRTool;
$CDRTool_company=$CDRTool[provider][name];
$legalNotice="Legal Notice".
"\n\n".
"This software is intended for the use of $CDRTool_company, ".
"resellers of $CDRTool_company and the customers of $CDRTool_company. ".
"The use of this software by any natural or legal person that does ".
"not belong to $CDRTool_company, its Resellers or is a not a ".
"customer of $CDRTool_company or its resellers is therefore ".
"expressly prohibited.".
"\n\n".
"All the information stored on, and accessible through this software ".
"are personal data protected as such by international and domestic ".
"legislation relating to the processing of personal data and ".
"the protection of the right to privacy. For these reasons: ".
"1. This software shall exclusively be used to the extent that it ".
"is necessary for the provision of services to $CDRTool_company ".
"customers and its resellers; ".
"2. No information displayed on, and accessible through this software ".
"shall be communicated to any natural or legal person outside ".
"$CDRTool_company and its resellers, without prejudice to the ".
"possibility for competent authorities (namely government bodies, ".
"courts, regulatory authorities) to be informed of billing or ".
"traffic data in conformity with the applicable legislation. ".
"\n\n";
$loginName=$CDRTool[loginName];
$this->hasAGProjectslogo=1;
print "
<table border=0 align=center>
<tr>
<td>
<a href=http://cdrtool.ag-projects.com target=agprojects><img src=images/CDRTool.gif border=0></a>
<p>
<h2>Terms and conditions</h2>
<p>
<form action=callsearch.phtml method=post>
<textarea name=legal rows=20 cols=60 wrap=virtual readonly=yes>$legalNotice</textarea>
<p>
You are logged in as $loginname
<p>
If you agree with the Terms and Conditions, <br>
press on <b>I agree</b> button to continue.
<p>
<input type=submit value=\"I agree\">
<input type=hidden name=previous_page value=license_page>
</form>
</td>
</tr>
</table>
";
}
function showFooter() {
global $CDRTool;
if (!$CDRTool['filter']['aNumber'] && !$this->hasAGProjectslogo) {
$thisYear=date("Y",time());
print "
<p>
<table width=100% border=0 align=center>
<tr>
<td align=right>
<a href=http://cdrtool.ag-projects.com target=agprojects><img src=images/PoweredbyAGProjects.gif border=0>
</td>
</tr>
</table>
";
}
}
function showLogout ($loginname) {
print "
<table width=70% align=center>
<td>
<br>
<br>
<h1>Logout</h1>
<p>
You have been logged in as $loginname.</b>
<p>
You have been logged out.
<br>
<br>
<p>
<a href=index.phtml>Login again</a>
</td>
</table>
";
}
}
function unLockTables ($dbid) {
$dbid->query("unlock tables");
}
function changeLanguage() {
}
function RandomString($len=11) {
$alf=array("a","b","c","d","e","f",
"h","i","j","k","l","m",
"n","p","r","s","t","w",
"x","y","1","2","3","4",
"5","6","7","8","9");
$i=0;
while($i < $len) {
srand((double)microtime()*1000000);
$randval = rand(0,28);
$string="$string"."$alf[$randval]";
$i++;
}
return $string;
}
function RandomNumber($len=5,$skipzero=false) {
$alf=array("1","2","3","4","5",
"9","8","7","6");
if (!$skipzero) $alf[]="0";
$i=0;
while($i < $len) {
srand((double)microtime()*1000000);
$randval = rand(0,9);
$string="$string"."$alf[$randval]";
$i++;
}
return $string;
}
function microtime_float() {
list($usec, $sec) = explode(" ", microtime());
return ((float)$usec + (float)$sec);
}
function sec2hms ($duration) {
// return seconds in HH:MM:SS format
$sum1=$duration;
$duration_print="";
$duration_hour=floor($sum1/3600);
if ($duration_hour > 0) {
$sum1=$sum1-($duration_hour*3600);
$duration_print="$duration_hour:";
}
$duration_min=floor($sum1/60);
if ($duration_min > 0) {
$sum1=$sum1-($duration_min*60);
if ($duration_min < 10) {
$duration_min="0"."$duration_min";
}
$duration_print="$duration_print"."$duration_min:";
} else {
$duration_print="$duration_print"."00:";
}
if ($sum1< 10 ) {
$duration_sec="0"."$sum1";
} else {
$duration_sec=$sum1;
}
$duration_print="$duration_print"."$duration_sec";
return $duration_print;
}
?>

File Metadata

Mime Type
text/html
Expires
Sat, Nov 23, 2:18 PM (1 d, 5 h)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
3409226
Default Alt Text
local.inc (32 KB)

Event Timeline