X-Git-Url: https://git.p6c8.net/jirafeau_project.git/blobdiff_plain/3221172a6d3e623090449000b4f541849bc9f9a5..0a5462c3311b4541a858b8e719ae8548877c7a62:/lib/functions.php?ds=sidebyside diff --git a/lib/functions.php b/lib/functions.php index 87d2cff..c07b6c9 100755 --- a/lib/functions.php +++ b/lib/functions.php @@ -306,13 +306,14 @@ jirafeau_delete_file ($md5) * @param $key if not empty, protect the file with this key * @param $time the time of validity of the file * @param $ip uploader's ip + * @param $crypt boolean asking to crypt or not * @returns an array containing some information * 'error' => information on possible errors * 'link' => the link name of the uploaded file * 'delete_link' => the link code to delete file */ function -jirafeau_upload ($file, $one_time_download, $key, $time, $ip) +jirafeau_upload ($file, $one_time_download, $key, $time, $ip, $crypt) { if (empty ($file['tmp_name']) || !is_uploaded_file ($file['tmp_name'])) { @@ -327,6 +328,16 @@ jirafeau_upload ($file, $one_time_download, $key, $time, $ip) /* array representing no error */ $noerr = array ('has_error' => false, 'why' => ''); + /* Crypt file if option is enabled. */ + $crypted = false; + $crypt_key = ''; + if ($crypt == true && extension_loaded('mcrypt')) + { + $crypt_key = jirafeau_encrypt_file ($file['tmp_name'], $file['tmp_name']); + if (strlen($crypt_key) > 0) + $crypted = true; + } + /* file informations */ $md5 = md5_file ($file['tmp_name']); $name = str_replace (NL, '', trim ($file['name'])); @@ -370,7 +381,7 @@ jirafeau_upload ($file, $one_time_download, $key, $time, $ip) /* Create delete code. */ $delete_link_code = jirafeau_gen_random (8); - /* md5 password or empty */ + /* md5 password or empty. */ $password = ''; if (!empty ($key)) $password = md5 ($key); @@ -381,7 +392,7 @@ jirafeau_upload ($file, $one_time_download, $key, $time, $ip) fwrite ($handle, $name . NL. $mime_type . NL. $size . NL. $password . NL. $time . NL . $md5. NL . ($one_time_download ? 'O' : 'R') . NL . date ('U') . - NL . $ip . NL. $delete_link_code . NL); + NL . $ip . NL. $delete_link_code . NL . ($crypted ? 'C' : 'O')); fclose ($handle); $md5_link = base_16_to_64 (md5_file ($link_tmp_name)); $l = s2p ("$md5_link"); @@ -411,7 +422,8 @@ jirafeau_upload ($file, $one_time_download, $key, $time, $ip) } return (array ('error' => $noerr, 'link' => $md5_link, - 'delete_link' => $delete_link_code)); + 'delete_link' => $delete_link_code, + 'crypt_key' => $crypt_key)); } /** @@ -499,7 +511,10 @@ function check_errors () if (!is_writable (VAR_ASYNC)) add_error (t('The async directory is not writable!'), VAR_ASYNC); - /* Check if the install.php script is still in the directory. */ + if (!is_writable (VAR_BLOCK)) + add_error (t('The block directory is not writable!'), VAR_BLOCK); + + /* Check if the install.php script is still in the directory. */ if (file_exists (JIRAFEAU_ROOT . 'install.php')) add_error (t('Installer script still present'), t('Please make sure to delete the installer script ' . @@ -530,6 +545,8 @@ jirafeau_get_link ($hash) $out['upload_date'] = trim ($c[7]); $out['ip'] = trim ($c[8]); $out['link_code'] = trim ($c[9]); + if (trim ($c[10]) == 'C') + $out['crypted'] = true; return $out; } @@ -864,10 +881,11 @@ jirafeau_async_push ($ref, $data, $code) * Finalyze an asynchronous upload. * @param $ref asynchronous upload reference * @param $code client code for this operation + * @param $crypt boolean asking to crypt or not * @return a string containing the download reference followed by a delete code or the string "Error" */ function -jirafeau_async_end ($ref, $code) +jirafeau_async_end ($ref, $code, $crypt) { /* Get async infos. */ $a = jirafeau_get_async_ref ($ref); @@ -879,6 +897,16 @@ jirafeau_async_end ($ref, $code) $p = VAR_ASYNC . s2p ($ref) . $ref . "_data"; if (!file_exists($p)) return "Error"; + + $crypted = false; + $crypt_key = ''; + if ($crypt == true && extension_loaded('mcrypt')) + { + $cypt_key = jirafeau_encrypt_file ($p, $p); + if (strlen($crypt_key) > 0) + $crypted = true; + } + $md5 = md5_file ($p); $size = filesize($p); $np = s2p ($md5); @@ -908,7 +936,7 @@ jirafeau_async_end ($ref, $code) fwrite ($handle, $a['file_name'] . NL . $a['mime_type'] . NL . $size . NL . $a['key'] . NL . $a['time'] . NL . $md5 . NL . $a['onetime'] . NL . - date ('U') . NL . $a['ip'] . NL . $delete_link_code . NL); + date ('U') . NL . $a['ip'] . NL . $delete_link_code . NL . ($crypted ? 'C' : 'O')); fclose ($handle); $md5_link = base_16_to_64 (md5_file ($link_tmp_name)); $l = s2p ("$md5_link"); @@ -918,6 +946,423 @@ jirafeau_async_end ($ref, $code) /* Clean async upload. */ jirafeau_async_delete ($ref); - return $md5_link . NL . $delete_link_code; + return $md5_link . NL . $delete_link_code . NL . urlencode($crypt_key); +} + +/** + * Delete a block. + * @param $id identifier of the block. + */ +function +jirafeau_block_delete_ ($id) +{ + $p = VAR_BLOCK . s2p ($id); + if (!file_exists ($p)) + return; + + if (file_exists ($p . $id)) + unlink ($p . $id); + if (file_exists ($p . $id . '_infos')) + unlink ($p . $id . '_infos'); + $parse = $p; + $scan = array(); + while (file_exists ($parse) + && ($scan = scandir ($parse)) + && count ($scan) == 2 // '.' and '..' folders => empty. + && basename ($parse) != basename (VAR_BLOCK)) + { + rmdir ($parse); + $parse = substr ($parse, 0, strlen($parse) - strlen(basename ($parse)) - 1); + } +} + +/** + * Create a file filled with zeros. + * @param $size size of the file. + * @return a string corresponding to an id or the string "Error" + */ +function +jirafeau_block_init ($size) +{ + if (!ctype_digit ($size) || $size <= 0) + return "Error"; + + /* Create folder. */ + $id; + do + { + $id = jirafeau_gen_random (32); + $p = VAR_BLOCK . s2p ($id); + } while (file_exists ($p)); + @mkdir ($p, 0755, true); + if (!file_exists ($p)) + { + echo "Error"; + return; + } + + /* Create block. */ + $p .= $id; + $h = fopen ($p, 'w'); + $fill = str_repeat ("\0", 1024); + for ($cnt = 0; $cnt < $size; $cnt += 1024) + { + if ($size - $cnt < 1024) + $fill = str_repeat ("\0", $size - $cnt); + if (fwrite ($h, $fill) === false) + { + fclose ($h); + jirafeau_block_delete_ ($id); + return "Error"; + } + } + fclose ($h); + + /* Generate a write/delete code. */ + $code = jirafeau_gen_random (12); + + /* Add block infos. */ + if (file_put_contents ($p . '_infos', date ('U') . NL . $size . NL . $code) === FALSE) + { + jirafeau_block_delete_ ($id); + return "Error"; + } + + return $id . NL . $code; +} + +/** Get block size in bytes. + * @param $id identifier of the block + * @return block size in bytes + */ +function +jirafeau_block_get_size ($id) +{ + $p = VAR_BLOCK . s2p ($id) . $id; + if (!file_exists ($p)) + return "Error"; + + /* Check date. */ + $f = file ($p . '_infos'); + $date = trim ($f[0]); + $block_size = trim ($f[1]); + $stored_code = trim ($f[2]); + /* Update date. */ + if (date ('U') - $date > JIRAFEAU_HOUR + && date ('U') - $date < JIRAFEAU_MONTH) + { + if (file_put_contents ($p . '_infos', date ('U') . NL . $block_size . NL . $stored_code) === FALSE) + { + jirafeau_block_delete_ ($id); + return "Error"; + } + } + /* Remove data. */ + elseif (date ('U') - $date >= JIRAFEAU_MONTH) + { + echo date ('U'). " $date "; + jirafeau_block_delete_ ($id); + return "Error"; + } + + return $block_size; +} + +/** + * Read some data in a block. + * @param $id identifier of the block + * @param $start where to read data (starting from zero). + * @param $length length to read. + * @return echo data + */ +function +jirafeau_block_read ($id, $start, $length) +{ + if (!ctype_digit ($start) || $start < 0 + || !ctype_digit ($length) || $length <= 0) + { + echo "Error"; + return; + } + + $p = VAR_BLOCK . s2p ($id) . $id; + if (!file_exists ($p)) + { + echo "Error"; + return; + } + + /* Check date. */ + $f = file ($p . '_infos'); + $date = trim ($f[0]); + $block_size = trim ($f[1]); + $stored_code = trim ($f[2]); + /* Update date. */ + if (date ('U') - $date > JIRAFEAU_HOUR + && date ('U') - $date < JIRAFEAU_MONTH) + { + if (file_put_contents ($p . '_infos', date ('U') . NL . $block_size . NL . $stored_code) === FALSE) + { + jirafeau_block_delete_ ($id); + echo "Error"; + return; + } + } + /* Remove data. */ + elseif (date ('U') - $date >= JIRAFEAU_MONTH) + { + echo date ('U'). " $date "; + jirafeau_block_delete_ ($id); + echo "Error"; + return; + } + + if ($start + $length > $block_size) + { + echo "Error"; + return; + } + + /* Read content. */ + header ('Content-Length: ' . $length); + header ('Content-Disposition: attachment'); + + $r = fopen ($p, 'r'); + if (fseek ($r, $start) != 0) + { + echo "Error"; + return; + } + $c = 1024; + for ($cnt = 0; $cnt < $length && !feof ($r); $cnt += 1024) + { + if ($length - $cnt < 1024) + $c = $length - $cnt; + print fread ($r, $c); + ob_flush(); + } + fclose ($r); +} + +/** + * Write some data in a block. + * @param $id identifier of the block + * @param $start where to writing data (starting from zero). + * @param $data data to write. + * @param $code code to allow writing. + * @return string "Ok" or string "Error". + */ +function +jirafeau_block_write ($id, $start, $data, $code) +{ + if (!ctype_digit ($start) || $start < 0 + || strlen ($code) == 0) + return "Error"; + + $p = VAR_BLOCK . s2p ($id) . $id; + if (!file_exists ($p)) + return "Error"; + + /* Check date. */ + $f = file ($p . '_infos'); + $date = trim ($f[0]); + $block_size = trim ($f[1]); + $stored_code = trim ($f[2]); + /* Update date. */ + if (date ('U') - $date > JIRAFEAU_HOUR + && date ('U') - $date < JIRAFEAU_MONTH) + { + if (file_put_contents ($p . '_infos', date ('U') . NL . $block_size . NL . $stored_code) === FALSE) + { + jirafeau_block_delete_ ($id); + return "Error"; + } + } + /* Remove data. */ + elseif (date ('U') - $date >= JIRAFEAU_MONTH) + { + jirafeau_block_delete_ ($id); + return "Error"; + } + + /* Check code. */ + if ($stored_code != $code) + { + echo "Error"; + return; + } + + /* Check data. */ + $size = $data['size']; + if ($size <= 0) + return "Error"; + if ($start + $size > $block_size) + return "Error"; + + /* Open data. */ + $r = fopen ($data['tmp_name'], 'r'); + + /* Open Block. */ + $w = fopen ($p, 'r+'); + if (fseek ($w, $start) != 0) + return "Error"; + + /* Write content. */ + $c = 1024; + for ($cnt = 0; $cnt <= $size && !feof ($w); $cnt += 1024) + { + if ($size - $cnt < 1024) + $c = $size - $cnt; + $d = fread ($r, $c); + fwrite ($w, $d); + } + fclose ($r); + fclose ($w); + unlink ($data['tmp_name']); + return "Ok"; +} + +/** + * Delete a block. + * @param $id identifier of the block. + * @param $code code to allow writing. + * @return string "Ok" or string "Error". + */ +function +jirafeau_block_delete ($id, $code) +{ + $p = VAR_BLOCK . s2p ($id) . $id; + + if (!file_exists ($p)) + return "Error"; + + $f = file ($p . '_infos'); + $date = trim ($f[0]); + $block_size = trim ($f[1]); + $stored_code = trim ($f[2]); + + if ($code != $stored_code) + return "Error"; + + jirafeau_block_delete_ ($id); + return "Ok"; } + +/** + * Clean old unused blocks. + * @return number of cleaned blocks. + */ +function +jirafeau_admin_clean_block () +{ + $count = 0; + /* Get all blocks. */ + $stack = array (VAR_BLOCK); + while (($d = array_shift ($stack)) && $d != NULL) + { + $dir = scandir ($d); + + foreach ($dir as $node) + { + if (strcmp ($node, '.') == 0 || strcmp ($node, '..') == 0) + continue; + + if (is_dir ($d . $node)) + { + /* Push new found directory. */ + $stack[] = $d . $node . '/'; + } + elseif (is_file ($d . $node) && preg_match ('/\_infos/i', "$node")) + { + /* Read block informations. */ + $f = file ($d . $node); + $date = trim ($f[0]); + $block_size = trim ($f[1]); + if (date ('U') - $date >= JIRAFEAU_MONTH) + { + jirafeau_block_delete_ (substr($node, 0, -6)); + $count++; + } + } + } + } + return $count; +} + +/** + * Crypt file and returns decrypt key. + * @param $fp_src file path to the file to crypt. + * @param $fp_dst file path to the file to write crypted file (could be the same). + * @return decrypt key composed of the key and the iv separated by a point ('.') + */ +function +jirafeau_encrypt_file ($fp_src, $fp_dst) +{ + $fs = filesize ($fp_src); + if ($fs === false || $fs == 0 || !extension_loaded('mcrypt')) + return ''; + + /* Prepare module. */ + $m = mcrypt_module_open('rijndael-256', '', 'ofb', ''); + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($m), MCRYPT_DEV_URANDOM); + /* Generate key. */ + $ks = mcrypt_enc_get_key_size($m); + $key = substr(md5(jirafeau_gen_random(12)), 0, $ks); + /* Init module. */ + mcrypt_generic_init($m, $key, $iv); + /* Crypt file. */ + $r = fopen ($fp_src, 'r'); + $w = fopen ($fp_dst, 'c'); + while (!feof ($r)) + { + $enc = mcrypt_generic($m, fread ($r, 1024)); + if (fwrite ($w, $enc) === false) + return ''; + } + fclose ($r); + fclose ($w); + /* Cleanup. */ + mcrypt_generic_deinit($m); + mcrypt_module_close($m); + return $key . "." . base64_encode($iv); +} + +/** + * Decrypt file. + * @param $fp_src file path to the file to decrypt. + * @param $fp_dst file path to the file to write decrypted file (could be the same). + * @param $k string composed of the key and the iv separated by a point ('.') + * @return key used to decrypt. a string of length 0 is returned if failed. + */ +function +jirafeau_decrypt_file ($fp_src, $fp_dst, $k) +{ + $fs = filesize ($fp_src); + if ($fs === false || $fs == 0 || !extension_loaded('mcrypt')) + return false; + + /* Extract key and iv. */ + $ex = explode (".", $k); + $key = $ex[0]; + $iv = base64_decode($ex[1]); + /* Init module */ + $m = mcrypt_module_open('rijndael-256', '', 'ofb', ''); + mcrypt_generic_init($m, $key, $iv); + /* Decrypt file. */ + $r = fopen ($fp_src, 'r'); + $w = fopen ($fp_dst, 'c'); + while (!feof ($r)) + { + $dec = mdecrypt_generic($m, fread ($r, 1024)); + if (fwrite ($w, $dec) === false) + return false; + } + fclose ($r); + fclose ($w); + /* Cleanup. */ + mcrypt_generic_deinit($m); + mcrypt_module_close($m); + return true; +} + ?>