X-Git-Url: https://git.p6c8.net/jirafeau_project.git/blobdiff_plain/9cc17fe0ab37c643201faaa3879740bdb1937dc6..9d07b167c00155c1d60041f02ccd2f5293940aa5:/f.php?ds=sidebyside diff --git a/f.php b/f.php index 79cbe8e..c19232d 100644 --- a/f.php +++ b/f.php @@ -73,8 +73,8 @@ if (isset($_GET['p']) && !empty($_GET['p'])) { $do_preview = true; } -$p = s2p($link['md5']); -if (!file_exists(VAR_FILES . $p . $link['md5'])) { +$p = s2p($link['hash']); +if (!file_exists(VAR_FILES . $p . $link['hash'])) { jirafeau_delete_link($link_name); require(JIRAFEAU_ROOT.'lib/template/header.php'); echo '

'.t('FILE_NOT_AVAIL'). @@ -100,7 +100,7 @@ if (!empty($delete_code) && $delete_code == $link['link_code']) { - ' . t('TOS') . '.' ?> + ' . t('TOS') . '.' ?> ' . '' . '' . - t('USING_SERIVCE'). ' ' . t('TOS') . '.' . + t('USING_SERVICE'). ' ' . t('TOS') . '.' . ''; if ($link['onetime'] == 'O') { @@ -198,7 +198,7 @@ if (!$password_challenged && !$do_download && !$do_preview) { t('NOW_DOWNLOADING') . ' "' . jirafeau_escape($link['file_name']) . '" (' . jirafeau_human_size($link['file_size']) . ').' . '' . '' . - t('USING_SERIVCE'). ' ' . t('TOS') . '.' . + t('USING_SERVICE'). ' ' . t('TOS') . '.' . ''; if ($link['onetime'] == 'O') { @@ -238,19 +238,33 @@ if (!jirafeau_is_viewable($link['mime_type']) || !$cfg['preview'] || $do_downloa header('Content-Disposition: filename="' . $link['file_name'] . '"'); } header('Content-Type: ' . $link['mime_type']); -header('Content-MD5: ' . hex_to_base64($link['md5'])); - +if ($cfg['file_hash'] == "md5") { + header('Content-MD5: ' . hex_to_base64($link['hash'])); +} +if ($cfg['litespeed_workaround']) { + // Work around that LiteSpeed truncates large files. + // See https://www.litespeedtech.com/support/wiki/doku.php/litespeed_wiki:config:internal-redirect + if ($_GET['litespeed_workaround'] == 'phase2') { + $file_web_path = preg_replace('#^' . $_SERVER['DOCUMENT_ROOT'] . '#', '', VAR_FILES); + header('X-LiteSpeed-Location: ' . $file_web_path . $p . $link['hash']); + } else { + // Since Content-Type isn't forwarded by LiteSpeed, first + // redirect to the same URL but append the file name. + header('Location: ' . $_SERVER['PHP_SELF'] . '/' . $link['file_name'] . '?' . + $_SERVER['QUERY_STRING'] . '&litespeed_workaround=phase2'); + } +} /* Read encrypted file. */ -if ($link['crypted']) { +else if ($link['crypted']) { /* Init module */ $m = mcrypt_module_open('rijndael-256', '', 'ofb', ''); /* Extract key and iv. */ - $md5_key = md5($crypt_key); - $iv = jirafeau_crypt_create_iv($md5_key, mcrypt_enc_get_iv_size($m)); + $hash_key = md5($crypt_key); + $iv = jirafeau_crypt_create_iv($hash_key, mcrypt_enc_get_iv_size($m)); /* Init module. */ - mcrypt_generic_init($m, $md5_key, $iv); + mcrypt_generic_init($m, $hash_key, $iv); /* Decrypt file. */ - $r = fopen(VAR_FILES . $p . $link['md5'], 'r'); + $r = fopen(VAR_FILES . $p . $link['hash'], 'r'); while (!feof($r)) { $dec = mdecrypt_generic($m, fread($r, 1024)); print $dec; @@ -263,7 +277,7 @@ if ($link['crypted']) { } /* Read file. */ else { - $r = fopen(VAR_FILES . $p . $link['md5'], 'r'); + $r = fopen(VAR_FILES . $p . $link['hash'], 'r'); while (!feof($r)) { print fread($r, 1024); ob_flush();