protected function performConfigChecksServers($cookieAuthUsed, $blowfishSecret, $sServerAuthCfgMsg, $sSecurityInfoMsg, $blowfishSecretSet)
{
$serverCnt = $this->cfg->getServerCount();
for ($i = 1; $i <= $serverCnt; $i++) {
$cookieAuthServer = $this->cfg->getValue("Servers/{$i}/auth_type") == 'cookie';
$cookieAuthUsed |= $cookieAuthServer;
$serverName = $this->performConfigChecksServersGetServerName($this->cfg->getServerName($i), $i);
$serverName = htmlspecialchars($serverName);
list($blowfishSecret, $blowfishSecretSet) = $this->performConfigChecksServersSetBlowfishSecret($blowfishSecret, $cookieAuthServer, $blowfishSecretSet);
//
// $cfg['Servers'][$i]['ssl']
// should be enabled if possible
//
if (!$this->cfg->getValue("Servers/{$i}/ssl")) {
$title = PMA_lang(PMA_langName('Servers/1/ssl')) . " ({$serverName})";
PMA_messagesSet('notice', "Servers/{$i}/ssl", $title, __('You should use SSL connections if your database server ' . 'supports it.'));
}
//
// $cfg['Servers'][$i]['auth_type']
// warn about full user credentials if 'auth_type' is 'config'
//
if ($this->cfg->getValue("Servers/{$i}/auth_type") == 'config' && $this->cfg->getValue("Servers/{$i}/user") != '' && $this->cfg->getValue("Servers/{$i}/password") != '') {
$title = PMA_lang(PMA_langName('Servers/1/auth_type')) . " ({$serverName})";
PMA_messagesSet('notice', "Servers/{$i}/auth_type", $title, PMA_lang($sServerAuthCfgMsg, $i) . ' ' . PMA_lang($sSecurityInfoMsg, $i));
}
//
// $cfg['Servers'][$i]['AllowRoot']
// $cfg['Servers'][$i]['AllowNoPassword']
// serious security flaw
//
if ($this->cfg->getValue("Servers/{$i}/AllowRoot") && $this->cfg->getValue("Servers/{$i}/AllowNoPassword")) {
$title = PMA_lang(PMA_langName('Servers/1/AllowNoPassword')) . " ({$serverName})";
PMA_messagesSet('notice', "Servers/{$i}/AllowNoPassword", $title, __('You allow for connecting to the server without a password.') . ' ' . PMA_lang($sSecurityInfoMsg, $i));
}
}
return array($cookieAuthUsed, $blowfishSecret, $blowfishSecretSet);
}