X-Git-Url: https://git.p6c8.net/jirafeau_project.git/blobdiff_plain/bd23d65292b6eda5c00e85ddce27235b5529a565..0a5462c3311b4541a858b8e719ae8548877c7a62:/file.php
diff --git a/file.php b/file.php
index 710ce3d..d632beb 100644
--- a/file.php
+++ b/file.php
@@ -33,7 +33,7 @@ if (!isset ($_GET['h']) || empty ($_GET['h']))
/* Operations may take a long time.
* Be sure PHP's safe mode is off.
*/
- set_time_limit(0);
+set_time_limit(0);
$link_name = $_GET['h'];
@@ -59,6 +59,10 @@ $delete_code = '';
if (isset ($_GET['d']) && !empty ($_GET['d']))
$delete_code = $_GET['d'];
+$crypt_key = '';
+if (isset ($_GET['k']) && !empty ($_GET['k']))
+ $crypt_key = $_GET['k'];
+
$button_download = false;
if (isset ($_GET['bd']) && !empty ($_GET['bd']))
$button_download = true;
@@ -100,6 +104,15 @@ if ($link['time'] != JIRAFEAU_INFINITY && time () > $link['time'])
exit;
}
+if (empty ($crypt_key) && $link['crypted'])
+{
+ require (JIRAFEAU_ROOT.'lib/template/header.php');
+ echo '
' . t('Sorry, the requested file is not found') .
+ '
';
+ require (JIRAFEAU_ROOT.'lib/template/footer.php');
+ exit;
+}
+
$password_challenged = false;
if (!empty ($link['key']))
{
@@ -107,8 +120,10 @@ if (!empty ($link['key']))
{
require (JIRAFEAU_ROOT.'lib/template/header.php');
echo '' .
- '
';
require (JIRAFEAU_ROOT.'lib/template/footer.php');
@@ -136,7 +160,9 @@ if (!empty ($link['key']))
}
else
{
- if ($link['key'] != md5 ($_POST['key']))
+ if ($link['key'] == md5 ($_POST['key']))
+ $password_challenged = true;
+ else
{
header ("Access denied");
require (JIRAFEAU_ROOT.'lib/template/header.php');
@@ -145,8 +171,6 @@ if (!empty ($link['key']))
require (JIRAFEAU_ROOT.'lib/template/footer.php');
exit;
}
- else
- $password_challenged = true;
}
}
@@ -154,8 +178,10 @@ if ($cfg['download_page'] && !$password_challenged && !$button_download && !$but
{
require (JIRAFEAU_ROOT.'lib/template/header.php');
echo '';
@@ -187,16 +223,41 @@ if (!jirafeau_is_viewable ($link['mime_type']) || !$cfg['preview'] || $button_do
else
header ('Content-Type: ' . $link['mime_type']);
-/* Read file */
-$r = fopen (VAR_FILES . $p . $link['md5'], 'r');
-while (!feof ($r))
+/* Read encrypted file. */
+if ($link['crypted'])
+{
+ /* Extract key and iv. */
+ $ex = explode (".", $crypt_key);
+ $key = $ex[0];
+ $iv = base64_decode($ex[1]);
+ error_log ("crypt_key: " . $crypt_key . " iv: " . $v . " key: ". $key . "\n", 3, "debug.log");
+ /* Init module */
+ $m = mcrypt_module_open('rijndael-256', '', 'ofb', '');
+ mcrypt_generic_init($m, $key, $iv);
+ /* Decrypt file. */
+ $r = fopen (VAR_FILES . $p . $link['md5'], 'r');
+ while (!feof ($r))
+ {
+ $dec = mdecrypt_generic($m, fread ($r, 1024));
+ print $dec;
+ ob_flush();
+ }
+ fclose ($r);
+ /* Cleanup. */
+ mcrypt_generic_deinit($m);
+ mcrypt_module_close($m);
+}
+/* Read file. */
+else
{
- print fread ($r, 1024);
- ob_flush();
+ $r = fopen (VAR_FILES . $p . $link['md5'], 'r');
+ while (!feof ($r))
+ {
+ print fread ($r, 1024);
+ ob_flush();
+ }
+ fclose ($r);
}
-fclose ($r);
-
-//readfile (VAR_FILES . $p . $link['md5']);
if ($link['onetime'] == 'O')
jirafeau_delete_link ($link_name);