} else { $encode = false; } if (frm_ok('templist', 1)) { $kpx->genxmlfile(frm_get('templist'), $encode); } break; } } die; } if (USERSIGNUP && frm_isset('l_signup')) { kp_signup(); } if (frm_isset('update') && frm_isset('user')) { search_updateautomatic(frm_get('user'), $phpenv['remote'], frm_get('update', 1, 0)); } if (frm_isset('l_username') && frm_isset('l_password')) { $loginstatus = webauthenticate(); switch ($loginstatus) { case 0: if ($setctl->get('report_attempts')) { syslog_write('User could not be validated (user: "******")'); } klogon(get_lang(307)); break; case 1: $uri = PHPSELF . '?checkcookie=true'; if (frm_isset('l_uri') && !frm_empty('l_uri')) { $ourl = urldecode(frm_get('l_uri')); $qpos = strrpos($ourl, '?');
break; case 'templist': $kpx = new swfront(); if (fruserset('encode')) { $encode = true; } else { $encode = false; } $kpx->genxmlfile($_GET['templist'], $encode); break; } } die; } if (isset($_GET['update']) && isset($_GET['user'])) { search_updateautomatic($_GET['user'], $phpenv['remote'], $_GET['update']); } if (isset($_POST['signup']) || isset($_GET['signup']) && USERSIGNUP) { KSignup(); } if (isset($_POST['user']) && isset($_POST['password']) && !empty($_POST['user']) && !empty($_POST['password'])) { $loginstatus = webauthenticate(); switch ($loginstatus) { case 0: if ($setctl->get('report_attempts')) { syslog_write('User could not be validated (user: "******")'); } klogon(get_lang(307)); break; case 1: $uri = PHPSELF . '?checkcookie=true';