X-Git-Url: https://git.p6c8.net/jirafeau.git/blobdiff_plain/9cc17fe0ab37c643201faaa3879740bdb1937dc6..cd4892472b534b68a094ea582f79efc27dda3924:/f.php?ds=inline
diff --git a/f.php b/f.php
index 79cbe8e..c19232d 100644
--- a/f.php
+++ b/f.php
@@ -73,8 +73,8 @@ if (isset($_GET['p']) && !empty($_GET['p'])) {
$do_preview = true;
}
-$p = s2p($link['md5']);
-if (!file_exists(VAR_FILES . $p . $link['md5'])) {
+$p = s2p($link['hash']);
+if (!file_exists(VAR_FILES . $p . $link['hash'])) {
jirafeau_delete_link($link_name);
require(JIRAFEAU_ROOT.'lib/template/header.php');
echo '
'.t('FILE_NOT_AVAIL').
@@ -100,7 +100,7 @@ if (!empty($delete_code) && $delete_code == $link['link_code']) {
- ' . t('TOS') . '.' ?>
+ ' . t('TOS') . '.' ?>
|
' .
' |
' .
'
' .
- t('USING_SERIVCE'). ' ' . t('TOS') . '.' .
+ t('USING_SERVICE'). ' ' . t('TOS') . '.' .
' |
';
if ($link['onetime'] == 'O') {
@@ -198,7 +198,7 @@ if (!$password_challenged && !$do_download && !$do_preview) {
t('NOW_DOWNLOADING') . ' "' . jirafeau_escape($link['file_name']) . '" (' . jirafeau_human_size($link['file_size']) . ').' .
'' .
'
' .
- t('USING_SERIVCE'). ' ' . t('TOS') . '.' .
+ t('USING_SERVICE'). ' ' . t('TOS') . '.' .
' |
';
if ($link['onetime'] == 'O') {
@@ -238,19 +238,33 @@ if (!jirafeau_is_viewable($link['mime_type']) || !$cfg['preview'] || $do_downloa
header('Content-Disposition: filename="' . $link['file_name'] . '"');
}
header('Content-Type: ' . $link['mime_type']);
-header('Content-MD5: ' . hex_to_base64($link['md5']));
-
+if ($cfg['file_hash'] == "md5") {
+ header('Content-MD5: ' . hex_to_base64($link['hash']));
+}
+if ($cfg['litespeed_workaround']) {
+ // Work around that LiteSpeed truncates large files.
+ // See https://www.litespeedtech.com/support/wiki/doku.php/litespeed_wiki:config:internal-redirect
+ if ($_GET['litespeed_workaround'] == 'phase2') {
+ $file_web_path = preg_replace('#^' . $_SERVER['DOCUMENT_ROOT'] . '#', '', VAR_FILES);
+ header('X-LiteSpeed-Location: ' . $file_web_path . $p . $link['hash']);
+ } else {
+ // Since Content-Type isn't forwarded by LiteSpeed, first
+ // redirect to the same URL but append the file name.
+ header('Location: ' . $_SERVER['PHP_SELF'] . '/' . $link['file_name'] . '?' .
+ $_SERVER['QUERY_STRING'] . '&litespeed_workaround=phase2');
+ }
+}
/* Read encrypted file. */
-if ($link['crypted']) {
+else if ($link['crypted']) {
/* Init module */
$m = mcrypt_module_open('rijndael-256', '', 'ofb', '');
/* Extract key and iv. */
- $md5_key = md5($crypt_key);
- $iv = jirafeau_crypt_create_iv($md5_key, mcrypt_enc_get_iv_size($m));
+ $hash_key = md5($crypt_key);
+ $iv = jirafeau_crypt_create_iv($hash_key, mcrypt_enc_get_iv_size($m));
/* Init module. */
- mcrypt_generic_init($m, $md5_key, $iv);
+ mcrypt_generic_init($m, $hash_key, $iv);
/* Decrypt file. */
- $r = fopen(VAR_FILES . $p . $link['md5'], 'r');
+ $r = fopen(VAR_FILES . $p . $link['hash'], 'r');
while (!feof($r)) {
$dec = mdecrypt_generic($m, fread($r, 1024));
print $dec;
@@ -263,7 +277,7 @@ if ($link['crypted']) {
}
/* Read file. */
else {
- $r = fopen(VAR_FILES . $p . $link['md5'], 'r');
+ $r = fopen(VAR_FILES . $p . $link['hash'], 'r');
while (!feof($r)) {
print fread($r, 1024);
ob_flush();