jirafeau_clean_rm_file ($md5)
{
$p = s2p ("$md5");
- if (file_exists (VAR_FILES . $p . $md5))
- unlink (VAR_FILES . $p . $md5);
- if (file_exists (VAR_FILES . $p . $md5 . '_count'))
- unlink (VAR_FILES . $p . $md5 . '_count');
+ $f = VAR_FILES . $p . $md5;
+ if (file_exists ($f) && is_file ($f))
+ unlink ($f);
+ if (file_exists ($f . '_count') && is_file ($f . '_count'))
+ unlink ($f . '_count');
$parse = VAR_FILES . $p;
$scan = array();
while (file_exists ($parse)
* @param $key if not empty, protect the file with this key
* @param $time the time of validity of the file
* @param $ip uploader's ip
+ * @param $crypt boolean asking to crypt or not
+ * @param $link_name_length size of the link name
* @returns an array containing some information
* 'error' => information on possible errors
* 'link' => the link name of the uploaded file
* 'delete_link' => the link code to delete file
*/
function
-jirafeau_upload ($file, $one_time_download, $key, $time, $ip)
+jirafeau_upload ($file, $one_time_download, $key, $time, $ip, $crypt, $link_name_length)
{
if (empty ($file['tmp_name']) || !is_uploaded_file ($file['tmp_name']))
{
/* array representing no error */
$noerr = array ('has_error' => false, 'why' => '');
+ /* Crypt file if option is enabled. */
+ $crypted = false;
+ $crypt_key = '';
+ if ($crypt == true && extension_loaded('mcrypt'))
+ {
+ $crypt_key = jirafeau_encrypt_file ($file['tmp_name'], $file['tmp_name']);
+ if (strlen($crypt_key) > 0)
+ $crypted = true;
+ }
+
/* file informations */
$md5 = md5_file ($file['tmp_name']);
- $name = trim ($file['name']);
+ $name = str_replace (NL, '', trim ($file['name']));
$mime_type = $file['type'];
$size = $file['size'];
fclose ($handle);
/* Create delete code. */
- $delete_link_code = jirafeau_gen_random (8);
+ $delete_link_code = jirafeau_gen_random (5);
- /* md5 password or empty */
+ /* md5 password or empty. */
$password = '';
if (!empty ($key))
$password = md5 ($key);
/* create link file */
- $link_tmp_name = VAR_LINKS . $md5 . rand (0, 10000) . ' .tmp';
+ $link_tmp_name = VAR_LINKS . $md5 . rand (0, 10000) . '.tmp';
$handle = fopen ($link_tmp_name, 'w');
fwrite ($handle,
$name . NL. $mime_type . NL. $size . NL. $password . NL. $time .
NL . $md5. NL . ($one_time_download ? 'O' : 'R') . NL . date ('U') .
- NL . $ip . NL. $delete_link_code . NL);
+ NL . $ip . NL. $delete_link_code . NL . ($crypted ? 'C' : 'O'));
fclose ($handle);
- $md5_link = base_16_to_64 (md5_file ($link_tmp_name));
+ $md5_link = substr(base_16_to_64 (md5_file ($link_tmp_name)), 0, $link_name_length);
$l = s2p ("$md5_link");
if (!@mkdir (VAR_LINKS . $l, 0755, true) ||
!rename ($link_tmp_name, VAR_LINKS . $l . $md5_link))
}
return (array ('error' => $noerr,
'link' => $md5_link,
- 'delete_link' => $delete_link_code));
+ 'delete_link' => $delete_link_code,
+ 'crypt_key' => $crypt_key));
}
/**
if (!is_writable (VAR_ASYNC))
add_error (t('The async directory is not writable!'), VAR_ASYNC);
- /* Check if the install.php script is still in the directory. */
+ if (!is_writable (VAR_BLOCK))
+ add_error (t('The block directory is not writable!'), VAR_BLOCK);
+
+ /* Check if the install.php script is still in the directory. */
if (file_exists (JIRAFEAU_ROOT . 'install.php'))
add_error (t('Installer script still present'),
t('Please make sure to delete the installer script ' .
$out['upload_date'] = trim ($c[7]);
$out['ip'] = trim ($c[8]);
$out['link_code'] = trim ($c[9]);
+ if (trim ($c[10]) == 'C')
+ $out['crypted'] = true;
return $out;
}
$p .= $ref;
$handle = fopen ($p, 'w');
fwrite ($handle,
- $filename . NL. $type . NL. $password . NL. $time . NL .
- ($one_time ? 'O' : 'R') . NL . $ip . NL . date ('U') . NL .
- $code . NL);
+ str_replace (NL, '', trim ($filename)) . NL .
+ str_replace (NL, '', trim ($type)) . NL . $password . NL .
+ $time . NL . ($one_time ? 'O' : 'R') . NL . $ip . NL .
+ date ('U') . NL . $code . NL);
fclose ($handle);
return $ref . NL . $code ;
* Finalyze an asynchronous upload.
* @param $ref asynchronous upload reference
* @param $code client code for this operation
+ * @param $crypt boolean asking to crypt or not
+ * @param $link_name_length link name lenght
* @return a string containing the download reference followed by a delete code or the string "Error"
*/
function
-jirafeau_async_end ($ref, $code)
+jirafeau_async_end ($ref, $code, $crypt, $link_name_length)
{
/* Get async infos. */
$a = jirafeau_get_async_ref ($ref);
$p = VAR_ASYNC . s2p ($ref) . $ref . "_data";
if (!file_exists($p))
return "Error";
+
+ $crypted = false;
+ $crypt_key = '';
+ if ($crypt == true && extension_loaded('mcrypt'))
+ {
+ $crypt_key = jirafeau_encrypt_file ($p, $p);
+ if (strlen($crypt_key) > 0)
+ $crypted = true;
+ }
+
$md5 = md5_file ($p);
$size = filesize($p);
$np = s2p ($md5);
- $delete_link_code = jirafeau_gen_random (8);
+ $delete_link_code = jirafeau_gen_random (5);
/* File already exist ? */
if (!file_exists (VAR_FILES . $np))
fclose ($handle);
/* Create link. */
- $link_tmp_name = VAR_LINKS . $md5 . rand (0, 10000) . ' .tmp';
+ $link_tmp_name = VAR_LINKS . $md5 . rand (0, 10000) . '.tmp';
$handle = fopen ($link_tmp_name, 'w');
fwrite ($handle,
$a['file_name'] . NL . $a['mime_type'] . NL . $size . NL .
$a['key'] . NL . $a['time'] . NL . $md5 . NL . $a['onetime'] . NL .
- date ('U') . NL . $a['ip'] . NL . $delete_link_code . NL);
+ date ('U') . NL . $a['ip'] . NL . $delete_link_code . NL . ($crypted ? 'C' : 'O'));
fclose ($handle);
- $md5_link = base_16_to_64 (md5_file ($link_tmp_name));
+ $md5_link = substr(base_16_to_64 (md5_file ($link_tmp_name)), 0, $link_name_length);
$l = s2p ("$md5_link");
if (!@mkdir (VAR_LINKS . $l, 0755, true) ||
!rename ($link_tmp_name, VAR_LINKS . $l . $md5_link))
/* Clean async upload. */
jirafeau_async_delete ($ref);
- return $md5_link . NL . $delete_link_code;
+ return $md5_link . NL . $delete_link_code . NL . urlencode($crypt_key);
+}
+
+/**
+ * Delete a block.
+ * @param $id identifier of the block.
+ */
+function
+jirafeau_block_delete_ ($id)
+{
+ $p = VAR_BLOCK . s2p ($id);
+ if (!file_exists ($p))
+ return;
+
+ if (file_exists ($p . $id))
+ unlink ($p . $id);
+ if (file_exists ($p . $id . '_infos'))
+ unlink ($p . $id . '_infos');
+ $parse = $p;
+ $scan = array();
+ while (file_exists ($parse)
+ && ($scan = scandir ($parse))
+ && count ($scan) == 2 // '.' and '..' folders => empty.
+ && basename ($parse) != basename (VAR_BLOCK))
+ {
+ rmdir ($parse);
+ $parse = substr ($parse, 0, strlen($parse) - strlen(basename ($parse)) - 1);
+ }
+}
+
+/**
+ * Create a file filled with zeros.
+ * @param $size size of the file.
+ * @return a string corresponding to an id or the string "Error"
+ */
+function
+jirafeau_block_init ($size)
+{
+ if (!ctype_digit ($size) || $size <= 0)
+ return "Error";
+
+ /* Create folder. */
+ $id;
+ do
+ {
+ $id = jirafeau_gen_random (32);
+ $p = VAR_BLOCK . s2p ($id);
+ } while (file_exists ($p));
+ @mkdir ($p, 0755, true);
+ if (!file_exists ($p))
+ {
+ echo "Error";
+ return;
+ }
+
+ /* Create block. */
+ $p .= $id;
+ $h = fopen ($p, 'w');
+ $fill = str_repeat ("\0", 1024);
+ for ($cnt = 0; $cnt < $size; $cnt += 1024)
+ {
+ if ($size - $cnt < 1024)
+ $fill = str_repeat ("\0", $size - $cnt);
+ if (fwrite ($h, $fill) === false)
+ {
+ fclose ($h);
+ jirafeau_block_delete_ ($id);
+ return "Error";
+ }
+ }
+ fclose ($h);
+
+ /* Generate a write/delete code. */
+ $code = jirafeau_gen_random (12);
+
+ /* Add block infos. */
+ if (file_put_contents ($p . '_infos', date ('U') . NL . $size . NL . $code) === FALSE)
+ {
+ jirafeau_block_delete_ ($id);
+ return "Error";
+ }
+
+ return $id . NL . $code;
+}
+
+/** Get block size in bytes.
+ * @param $id identifier of the block
+ * @return block size in bytes
+ */
+function
+jirafeau_block_get_size ($id)
+{
+ $p = VAR_BLOCK . s2p ($id) . $id;
+ if (!file_exists ($p))
+ return "Error";
+
+ /* Check date. */
+ $f = file ($p . '_infos');
+ $date = trim ($f[0]);
+ $block_size = trim ($f[1]);
+ $stored_code = trim ($f[2]);
+ /* Update date. */
+ if (date ('U') - $date > JIRAFEAU_HOUR
+ && date ('U') - $date < JIRAFEAU_MONTH)
+ {
+ if (file_put_contents ($p . '_infos', date ('U') . NL . $block_size . NL . $stored_code) === FALSE)
+ {
+ jirafeau_block_delete_ ($id);
+ return "Error";
+ }
+ }
+ /* Remove data. */
+ elseif (date ('U') - $date >= JIRAFEAU_MONTH)
+ {
+ echo date ('U'). " $date ";
+ jirafeau_block_delete_ ($id);
+ return "Error";
+ }
+
+ return $block_size;
+}
+
+/**
+ * Read some data in a block.
+ * @param $id identifier of the block
+ * @param $start where to read data (starting from zero).
+ * @param $length length to read.
+ * @return echo data
+ */
+function
+jirafeau_block_read ($id, $start, $length)
+{
+ if (!ctype_digit ($start) || $start < 0
+ || !ctype_digit ($length) || $length <= 0)
+ {
+ echo "Error";
+ return;
+ }
+
+ $p = VAR_BLOCK . s2p ($id) . $id;
+ if (!file_exists ($p))
+ {
+ echo "Error";
+ return;
+ }
+
+ /* Check date. */
+ $f = file ($p . '_infos');
+ $date = trim ($f[0]);
+ $block_size = trim ($f[1]);
+ $stored_code = trim ($f[2]);
+ /* Update date. */
+ if (date ('U') - $date > JIRAFEAU_HOUR
+ && date ('U') - $date < JIRAFEAU_MONTH)
+ {
+ if (file_put_contents ($p . '_infos', date ('U') . NL . $block_size . NL . $stored_code) === FALSE)
+ {
+ jirafeau_block_delete_ ($id);
+ echo "Error";
+ return;
+ }
+ }
+ /* Remove data. */
+ elseif (date ('U') - $date >= JIRAFEAU_MONTH)
+ {
+ echo date ('U'). " $date ";
+ jirafeau_block_delete_ ($id);
+ echo "Error";
+ return;
+ }
+
+ if ($start + $length > $block_size)
+ {
+ echo "Error";
+ return;
+ }
+
+ /* Read content. */
+ header ('Content-Length: ' . $length);
+ header ('Content-Disposition: attachment');
+
+ $r = fopen ($p, 'r');
+ if (fseek ($r, $start) != 0)
+ {
+ echo "Error";
+ return;
+ }
+ $c = 1024;
+ for ($cnt = 0; $cnt < $length && !feof ($r); $cnt += 1024)
+ {
+ if ($length - $cnt < 1024)
+ $c = $length - $cnt;
+ print fread ($r, $c);
+ ob_flush();
+ }
+ fclose ($r);
+}
+
+/**
+ * Write some data in a block.
+ * @param $id identifier of the block
+ * @param $start where to writing data (starting from zero).
+ * @param $data data to write.
+ * @param $code code to allow writing.
+ * @return string "Ok" or string "Error".
+ */
+function
+jirafeau_block_write ($id, $start, $data, $code)
+{
+ if (!ctype_digit ($start) || $start < 0
+ || strlen ($code) == 0)
+ return "Error";
+
+ $p = VAR_BLOCK . s2p ($id) . $id;
+ if (!file_exists ($p))
+ return "Error";
+
+ /* Check date. */
+ $f = file ($p . '_infos');
+ $date = trim ($f[0]);
+ $block_size = trim ($f[1]);
+ $stored_code = trim ($f[2]);
+ /* Update date. */
+ if (date ('U') - $date > JIRAFEAU_HOUR
+ && date ('U') - $date < JIRAFEAU_MONTH)
+ {
+ if (file_put_contents ($p . '_infos', date ('U') . NL . $block_size . NL . $stored_code) === FALSE)
+ {
+ jirafeau_block_delete_ ($id);
+ return "Error";
+ }
+ }
+ /* Remove data. */
+ elseif (date ('U') - $date >= JIRAFEAU_MONTH)
+ {
+ jirafeau_block_delete_ ($id);
+ return "Error";
+ }
+
+ /* Check code. */
+ if ($stored_code != $code)
+ {
+ echo "Error";
+ return;
+ }
+
+ /* Check data. */
+ $size = $data['size'];
+ if ($size <= 0)
+ return "Error";
+ if ($start + $size > $block_size)
+ return "Error";
+
+ /* Open data. */
+ $r = fopen ($data['tmp_name'], 'r');
+
+ /* Open Block. */
+ $w = fopen ($p, 'r+');
+ if (fseek ($w, $start) != 0)
+ return "Error";
+
+ /* Write content. */
+ $c = 1024;
+ for ($cnt = 0; $cnt <= $size && !feof ($w); $cnt += 1024)
+ {
+ if ($size - $cnt < 1024)
+ $c = $size - $cnt;
+ $d = fread ($r, $c);
+ fwrite ($w, $d);
+ }
+ fclose ($r);
+ fclose ($w);
+ unlink ($data['tmp_name']);
+ return "Ok";
+}
+
+/**
+ * Delete a block.
+ * @param $id identifier of the block.
+ * @param $code code to allow writing.
+ * @return string "Ok" or string "Error".
+ */
+function
+jirafeau_block_delete ($id, $code)
+{
+ $p = VAR_BLOCK . s2p ($id) . $id;
+
+ if (!file_exists ($p))
+ return "Error";
+
+ $f = file ($p . '_infos');
+ $date = trim ($f[0]);
+ $block_size = trim ($f[1]);
+ $stored_code = trim ($f[2]);
+
+ if ($code != $stored_code)
+ return "Error";
+
+ jirafeau_block_delete_ ($id);
+ return "Ok";
+}
+
+/**
+ * Clean old unused blocks.
+ * @return number of cleaned blocks.
+ */
+function
+jirafeau_admin_clean_block ()
+{
+ $count = 0;
+ /* Get all blocks. */
+ $stack = array (VAR_BLOCK);
+ while (($d = array_shift ($stack)) && $d != NULL)
+ {
+ $dir = scandir ($d);
+
+ foreach ($dir as $node)
+ {
+ if (strcmp ($node, '.') == 0 || strcmp ($node, '..') == 0)
+ continue;
+
+ if (is_dir ($d . $node))
+ {
+ /* Push new found directory. */
+ $stack[] = $d . $node . '/';
+ }
+ elseif (is_file ($d . $node) && preg_match ('/\_infos/i', "$node"))
+ {
+ /* Read block informations. */
+ $f = file ($d . $node);
+ $date = trim ($f[0]);
+ $block_size = trim ($f[1]);
+ if (date ('U') - $date >= JIRAFEAU_MONTH)
+ {
+ jirafeau_block_delete_ (substr($node, 0, -6));
+ $count++;
+ }
+ }
+ }
+ }
+ return $count;
}
+
+function
+jirafeau_crypt_create_iv($base, $size)
+{
+ $iv = '';
+ while (strlen ($iv) < $size)
+ $iv = $iv . $base;
+ $iv = substr($iv, 0, $size);
+ return $iv;
+}
+
+/**
+ * Crypt file and returns decrypt key.
+ * @param $fp_src file path to the file to crypt.
+ * @param $fp_dst file path to the file to write crypted file (could be the same).
+ * @return decrypt key composed of the key and the iv separated by a point ('.')
+ */
+function
+jirafeau_encrypt_file ($fp_src, $fp_dst)
+{
+ $fs = filesize ($fp_src);
+ if ($fs === false || $fs == 0 || !extension_loaded('mcrypt'))
+ return '';
+
+ /* Prepare module. */
+ $m = mcrypt_module_open('rijndael-256', '', 'ofb', '');
+ /* Generate key. */
+ $crypt_key = jirafeau_gen_random (10);
+ $md5_key = md5($crypt_key);
+ $iv = jirafeau_crypt_create_iv ($md5_key, mcrypt_enc_get_iv_size($m));
+ /* Init module. */
+ mcrypt_generic_init($m, $md5_key, $iv);
+ /* Crypt file. */
+ $r = fopen ($fp_src, 'r');
+ $w = fopen ($fp_dst, 'c');
+ while (!feof ($r))
+ {
+ $enc = mcrypt_generic($m, fread ($r, 1024));
+ if (fwrite ($w, $enc) === false)
+ return '';
+ }
+ fclose ($r);
+ fclose ($w);
+ /* Cleanup. */
+ mcrypt_generic_deinit($m);
+ mcrypt_module_close($m);
+ return $crypt_key;
+}
+
+/**
+ * Decrypt file.
+ * @param $fp_src file path to the file to decrypt.
+ * @param $fp_dst file path to the file to write decrypted file (could be the same).
+ * @param $k string composed of the key and the iv separated by a point ('.')
+ * @return key used to decrypt. a string of length 0 is returned if failed.
+ */
+function
+jirafeau_decrypt_file ($fp_src, $fp_dst, $k)
+{
+ $fs = filesize ($fp_src);
+ if ($fs === false || $fs == 0 || !extension_loaded('mcrypt'))
+ return false;
+
+ /* Init module */
+ $m = mcrypt_module_open('rijndael-256', '', 'ofb', '');
+ /* Extract key and iv. */
+ $crypt_key = $k;
+ $md5_key = md5($crypt_key);
+ $iv = jirafeau_crypt_create_iv ($md5_key, mcrypt_enc_get_iv_size($m));
+ /* Decrypt file. */
+ $r = fopen ($fp_src, 'r');
+ $w = fopen ($fp_dst, 'c');
+ while (!feof ($r))
+ {
+ $dec = mdecrypt_generic($m, fread ($r, 1024));
+ if (fwrite ($w, $dec) === false)
+ return false;
+ }
+ fclose ($r);
+ fclose ($w);
+ /* Cleanup. */
+ mcrypt_generic_deinit($m);
+ mcrypt_module_close($m);
+ return true;
+}
+
?>