@@ -387,7 +387,7 @@ discard block |
||
387 | 387 | |
388 | 388 | if ($position !== false && $position >= 0) |
389 | 389 | { |
390 | - $size = $stats['size'] - $position; |
|
390 | + $size = $stats['size']-$position; |
|
391 | 391 | } |
392 | 392 | } |
393 | 393 | } |
@@ -462,7 +462,7 @@ discard block |
||
462 | 462 | */ |
463 | 463 | public function set_seek_position($position) |
464 | 464 | { |
465 | - $this->seek_position = isset($position) ? (integer) $position : null; |
|
465 | + $this->seek_position = isset($position) ? (integer)$position : null; |
|
466 | 466 | |
467 | 467 | return $this; |
468 | 468 | } |
@@ -533,7 +533,7 @@ discard block |
||
533 | 533 | // Execute callback function |
534 | 534 | if ($this->registered_streaming_read_callback) |
535 | 535 | { |
536 | - return $this->registered_streaming_read_callback->streaming_read_callback($curl_handle, $file_handle, $length,$this->read_stream,$this->seek_position); |
|
536 | + return $this->registered_streaming_read_callback->streaming_read_callback($curl_handle, $file_handle, $length, $this->read_stream, $this->seek_position); |
|
537 | 537 | } |
538 | 538 | // Once we've sent as much as we're supposed to send... |
539 | 539 | if ($this->read_stream_read >= $this->read_stream_size) |
@@ -551,7 +551,7 @@ discard block |
||
551 | 551 | } |
552 | 552 | } |
553 | 553 | |
554 | - $read = fread($this->read_stream, min($this->read_stream_size - $this->read_stream_read, $length)); // Remaining upload data or cURL's requested chunk size |
|
554 | + $read = fread($this->read_stream, min($this->read_stream_size-$this->read_stream_read, $length)); // Remaining upload data or cURL's requested chunk size |
|
555 | 555 | $this->read_stream_read += strlen($read); |
556 | 556 | |
557 | 557 | $out = $read === false ? '' : $read; |
@@ -568,8 +568,8 @@ discard block |
||
568 | 568 | */ |
569 | 569 | public function streaming_write_callback($curl_handle, $data) |
570 | 570 | { |
571 | - if ($this->registered_streaming_write_callback){ |
|
572 | - return $this->registered_streaming_write_callback->streaming_write_callback($curl_handle,$data,$this->write_stream); |
|
571 | + if ($this->registered_streaming_write_callback) { |
|
572 | + return $this->registered_streaming_write_callback->streaming_write_callback($curl_handle, $data, $this->write_stream); |
|
573 | 573 | } |
574 | 574 | $length = strlen($data); |
575 | 575 | $written_total = 0; |
@@ -631,7 +631,7 @@ discard block |
||
631 | 631 | // chmod the file as 0755 |
632 | 632 | if ($this->cacert_location === true) |
633 | 633 | { |
634 | - curl_setopt($curl_handle, CURLOPT_CAINFO, dirname(__FILE__) . '/cacert.pem'); |
|
634 | + curl_setopt($curl_handle, CURLOPT_CAINFO, dirname(__FILE__).'/cacert.pem'); |
|
635 | 635 | } |
636 | 636 | elseif (is_string($this->cacert_location)) |
637 | 637 | { |
@@ -656,12 +656,12 @@ discard block |
||
656 | 656 | curl_setopt($curl_handle, CURLOPT_HTTPPROXYTUNNEL, true); |
657 | 657 | |
658 | 658 | $host = $this->proxy['host']; |
659 | - $host .= ($this->proxy['port']) ? ':' . $this->proxy['port'] : ''; |
|
659 | + $host .= ($this->proxy['port']) ? ':'.$this->proxy['port'] : ''; |
|
660 | 660 | curl_setopt($curl_handle, CURLOPT_PROXY, $host); |
661 | 661 | |
662 | 662 | if (isset($this->proxy['user']) && isset($this->proxy['pass'])) |
663 | 663 | { |
664 | - curl_setopt($curl_handle, CURLOPT_PROXYUSERPWD, $this->proxy['user'] . ':' . $this->proxy['pass']); |
|
664 | + curl_setopt($curl_handle, CURLOPT_PROXYUSERPWD, $this->proxy['user'].':'.$this->proxy['pass']); |
|
665 | 665 | } |
666 | 666 | } |
667 | 667 | |
@@ -669,7 +669,7 @@ discard block |
||
669 | 669 | if ($this->username && $this->password) |
670 | 670 | { |
671 | 671 | curl_setopt($curl_handle, CURLOPT_HTTPAUTH, CURLAUTH_ANY); |
672 | - curl_setopt($curl_handle, CURLOPT_USERPWD, $this->username . ':' . $this->password); |
|
672 | + curl_setopt($curl_handle, CURLOPT_USERPWD, $this->username.':'.$this->password); |
|
673 | 673 | } |
674 | 674 | |
675 | 675 | // Handle the encoding if we can. |
@@ -685,7 +685,7 @@ discard block |
||
685 | 685 | |
686 | 686 | foreach ($this->request_headers as $k => $v) |
687 | 687 | { |
688 | - $temp_headers[] = $k . ': ' . $v; |
|
688 | + $temp_headers[] = $k.': '.$v; |
|
689 | 689 | } |
690 | 690 | |
691 | 691 | curl_setopt($curl_handle, CURLOPT_HTTPHEADER, $temp_headers); |
@@ -787,7 +787,7 @@ discard block |
||
787 | 787 | foreach ($this->response_headers as $header) |
788 | 788 | { |
789 | 789 | $kv = explode(': ', $header); |
790 | - $header_assoc[strtolower($kv[0])] = isset($kv[1])?$kv[1]:''; |
|
790 | + $header_assoc[strtolower($kv[0])] = isset($kv[1]) ? $kv[1] : ''; |
|
791 | 791 | } |
792 | 792 | |
793 | 793 | // Reset the headers to the appropriate property. |
@@ -820,7 +820,7 @@ discard block |
||
820 | 820 | |
821 | 821 | if ($this->response === false) |
822 | 822 | { |
823 | - throw new RequestCore_Exception('cURL resource: ' . (string) $curl_handle . '; cURL error: ' . curl_error($curl_handle) . ' (' . curl_errno($curl_handle) . ')'); |
|
823 | + throw new RequestCore_Exception('cURL resource: '.(string)$curl_handle.'; cURL error: '.curl_error($curl_handle).' ('.curl_errno($curl_handle).')'); |
|
824 | 824 | } |
825 | 825 | |
826 | 826 | $parsed_response = $this->process_response($curl_handle, $this->response); |
@@ -893,13 +893,13 @@ discard block |
||
893 | 893 | // Since curl_errno() isn't reliable for handles that were in multirequests, we check the 'result' of the info read, which contains the curl error number, (listed here http://curl.haxx.se/libcurl/c/libcurl-errors.html ) |
894 | 894 | if ($done['result'] > 0) |
895 | 895 | { |
896 | - throw new RequestCore_Exception('cURL resource: ' . (string) $done['handle'] . '; cURL error: ' . curl_error($done['handle']) . ' (' . $done['result'] . ')'); |
|
896 | + throw new RequestCore_Exception('cURL resource: '.(string)$done['handle'].'; cURL error: '.curl_error($done['handle']).' ('.$done['result'].')'); |
|
897 | 897 | } |
898 | 898 | |
899 | 899 | // Because curl_multi_info_read() might return more than one message about a request, we check to see if this request is already in our array of completed requests |
900 | - elseif (!isset($to_process[(int) $done['handle']])) |
|
900 | + elseif (!isset($to_process[(int)$done['handle']])) |
|
901 | 901 | { |
902 | - $to_process[(int) $done['handle']] = $done; |
|
902 | + $to_process[(int)$done['handle']] = $done; |
|
903 | 903 | } |
904 | 904 | } |
905 | 905 |
@@ -1,7 +1,7 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | //使用客户端加密的方式上传下载文件 |
3 | 3 | //检测API路径 |
4 | -if(!defined('KS3_API_PATH')) |
|
4 | +if (!defined('KS3_API_PATH')) |
|
5 | 5 | define('KS3_API_PATH', dirname(__FILE__)); |
6 | 6 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."Ks3Client.class.php"; |
7 | 7 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionUtil.php"; |
@@ -9,88 +9,88 @@ discard block |
||
9 | 9 | |
10 | 10 | //加密模式 |
11 | 11 | //暂时仅支持EO,使用AES/CBC/PKCS5Padding算法对数据进行加密 |
12 | -if(!defined("ENCRYPTPTION_MODE")) |
|
13 | -define("ENCRYPTPTION_MODE","EO"); |
|
12 | +if (!defined("ENCRYPTPTION_MODE")) |
|
13 | +define("ENCRYPTPTION_MODE", "EO"); |
|
14 | 14 | //加密信息存储模式,暂时支持 ObjectMetadata和InstructionFile |
15 | 15 | //ObjectMetadata:存在用户元数据中 |
16 | 16 | //InstructionFile:存在一个.instruction文件中 |
17 | -if(!defined("ENCRYPTPTION_STORAGE_MODE")) |
|
18 | -define("ENCRYPTPTION_STORAGE_MODE","ObjectMetadata"); |
|
17 | +if (!defined("ENCRYPTPTION_STORAGE_MODE")) |
|
18 | +define("ENCRYPTPTION_STORAGE_MODE", "ObjectMetadata"); |
|
19 | 19 | |
20 | 20 | |
21 | -if(function_exists('get_loaded_extensions')){ |
|
21 | +if (function_exists('get_loaded_extensions')) { |
|
22 | 22 | //检测mcrypt,openssl扩展 |
23 | 23 | $extensions = get_loaded_extensions(); |
24 | - if($extensions){ |
|
25 | - if(!in_array('mcrypt', $extensions)){ |
|
24 | + if ($extensions) { |
|
25 | + if (!in_array('mcrypt', $extensions)) { |
|
26 | 26 | throw new Ks3ClientException("please install mcrypt extension"); |
27 | 27 | } |
28 | - if(!in_array('openssl', $extensions)){ |
|
28 | + if (!in_array('openssl', $extensions)) { |
|
29 | 29 | throw new Ks3ClientException("please install openssl extension"); |
30 | 30 | } |
31 | - }else{ |
|
31 | + }else { |
|
32 | 32 | throw new Ks3ClientException("please install extensions"); |
33 | 33 | } |
34 | -}else{ |
|
34 | +}else { |
|
35 | 35 | throw new Ks3ClientException(); |
36 | 36 | } |
37 | -class Ks3EncryptionClient extends Ks3Client{ |
|
37 | +class Ks3EncryptionClient extends Ks3Client { |
|
38 | 38 | private $encryptionHandler = NULL; |
39 | 39 | //用户提供的主密钥,可以是对称秘钥或非对称秘钥(array,分别是公钥和私钥) |
40 | 40 | private $encryptionMaterials = NULL; |
41 | 41 | |
42 | - public function __construct($accessKey, $secretKey,$encryptionMaterials, $endpoint = NULL ){ |
|
43 | - parent::__construct($accessKey,$secretKey,$endpoint); |
|
44 | - if(is_array($encryptionMaterials)){ |
|
45 | - if(count($encryptionMaterials)==2){ |
|
42 | + public function __construct($accessKey, $secretKey, $encryptionMaterials, $endpoint = NULL) { |
|
43 | + parent::__construct($accessKey, $secretKey, $endpoint); |
|
44 | + if (is_array($encryptionMaterials)) { |
|
45 | + if (count($encryptionMaterials) == 2) { |
|
46 | 46 | $pk = openssl_pkey_get_public($encryptionMaterials[0]); |
47 | 47 | $sk = openssl_pkey_get_private($encryptionMaterials[1]); |
48 | - if(!$pk) |
|
48 | + if (!$pk) |
|
49 | 49 | throw new Ks3ClientException("invalid RSA public key,you can generate key use openssl"); |
50 | - if(!$sk) |
|
50 | + if (!$sk) |
|
51 | 51 | throw new Ks3ClientException("invalid RSA private key,you can generate key use openssl"); |
52 | - $encryptionMaterials = array($pk,$sk); |
|
53 | - }else{ |
|
52 | + $encryptionMaterials = array($pk, $sk); |
|
53 | + }else { |
|
54 | 54 | throw new Ks3ClientException("encryptionMaterials should be string or an array of size 2"); |
55 | 55 | } |
56 | 56 | } |
57 | - $ks3client = new Ks3Client($accessKey,$secretKey,$endpoint); |
|
57 | + $ks3client = new Ks3Client($accessKey, $secretKey, $endpoint); |
|
58 | 58 | $this->encryptionMaterials = $encryptionMaterials; |
59 | - if(ENCRYPTPTION_MODE == "EO"){ |
|
60 | - $this->encryptionHandler = new EncryptionEO($ks3client,$encryptionMaterials); |
|
59 | + if (ENCRYPTPTION_MODE == "EO") { |
|
60 | + $this->encryptionHandler = new EncryptionEO($ks3client, $encryptionMaterials); |
|
61 | 61 | }elseif (ENCRYPTPTION_MODE == "AE") { |
62 | 62 | throw new Ks3ClientException("Authenticated encryption will be supported in the futher"); |
63 | 63 | } |
64 | - else{ |
|
64 | + else { |
|
65 | 65 | throw new Ks3ClientException("unsupported encryption mode :".ENCRYPTPTION_MODE); |
66 | 66 | } |
67 | - if(ENCRYPTPTION_STORAGE_MODE != "ObjectMetadata"&&ENCRYPTPTION_STORAGE_MODE!="InstructionFile"){ |
|
67 | + if (ENCRYPTPTION_STORAGE_MODE != "ObjectMetadata" && ENCRYPTPTION_STORAGE_MODE != "InstructionFile") { |
|
68 | 68 | throw new Ks3ClientException("unsupported encryption storage mode :".ENCRYPTPTION_STORAGE_MODE); |
69 | 69 | } |
70 | 70 | } |
71 | 71 | |
72 | - public function putObjectByContent($args=array()){ |
|
72 | + public function putObjectByContent($args = array()) { |
|
73 | 73 | return $this->encryptionHandler->putObjectByContentSecurely($args); |
74 | 74 | } |
75 | - public function putObjectByFile($args=array()){ |
|
75 | + public function putObjectByFile($args = array()) { |
|
76 | 76 | return $this->encryptionHandler->putObjectByFileSecurely($args); |
77 | 77 | } |
78 | - public function getObject($args=array()){ |
|
78 | + public function getObject($args = array()) { |
|
79 | 79 | return $this->encryptionHandler->getObjectSecurely($args); |
80 | 80 | } |
81 | - public function initMultipartUpload($args=array()){ |
|
81 | + public function initMultipartUpload($args = array()) { |
|
82 | 82 | return $this->encryptionHandler->initMultipartUploadSecurely($args); |
83 | 83 | } |
84 | - public function uploadPart($args=array()){ |
|
84 | + public function uploadPart($args = array()) { |
|
85 | 85 | return $this->encryptionHandler->uploadPartSecurely($args); |
86 | 86 | } |
87 | - public function abortMultipartUpload($args=array()){ |
|
87 | + public function abortMultipartUpload($args = array()) { |
|
88 | 88 | return $this->encryptionHandler->abortMultipartUploadSecurely($args); |
89 | 89 | } |
90 | - public function completeMultipartUpload($args=array()){ |
|
90 | + public function completeMultipartUpload($args = array()) { |
|
91 | 91 | return $this->encryptionHandler->completeMultipartUploadSecurely($args); |
92 | 92 | } |
93 | - public function deleteObject($args=array()){ |
|
93 | + public function deleteObject($args = array()) { |
|
94 | 94 | $result = parent::deleteObject($args); |
95 | 95 | $args["Key"] = $args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX; |
96 | 96 | try { |
@@ -100,17 +100,17 @@ discard block |
||
100 | 100 | } |
101 | 101 | return $result; |
102 | 102 | } |
103 | - public function copyObject($args=array()){ |
|
104 | - if(parent::objectExists(array( |
|
103 | + public function copyObject($args = array()) { |
|
104 | + if (parent::objectExists(array( |
|
105 | 105 | "Bucket"=>$args["Bucket"], |
106 | 106 | "Key"=>$args["Key"] |
107 | - ))){ |
|
107 | + ))) { |
|
108 | 108 | throw new Ks3ClientException("copy object faild,destination object exists"); |
109 | 109 | } |
110 | - if(parent::objectExists(array( |
|
110 | + if (parent::objectExists(array( |
|
111 | 111 | "Bucket"=>$args["CopySource"]["Bucket"], |
112 | 112 | "Key"=>$args["CopySource"]["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX |
113 | - ))){ |
|
113 | + ))) { |
|
114 | 114 | parent::copyObject( |
115 | 115 | array( |
116 | 116 | "Bucket"=>$args["Bucket"], |
@@ -2,9 +2,9 @@ discard block |
||
2 | 2 | //更加详细的表单上传请参考js sdk |
3 | 3 | require_once "../Ks3Client.class.php"; |
4 | 4 | |
5 | -$client = new Ks3Client("",""); |
|
5 | +$client = new Ks3Client("", ""); |
|
6 | 6 | $bucket_name = "phpsdktestlijunwei"; |
7 | -if(!$client->bucketExists(array("Bucket"=>$bucket_name))){ |
|
7 | +if (!$client->bucketExists(array("Bucket"=>$bucket_name))) { |
|
8 | 8 | $client->createBucket(array("Bucket"=>$bucket_name)); |
9 | 9 | } |
10 | 10 | |
@@ -24,7 +24,7 @@ discard block |
||
24 | 24 | $unknowData = array( |
25 | 25 | "random" |
26 | 26 | ); |
27 | -$result = $client->postObject($bucket_name,$postData,$unknowData); |
|
27 | +$result = $client->postObject($bucket_name, $postData, $unknowData); |
|
28 | 28 | print_r($result); |
29 | 29 | |
30 | 30 | ?> |
@@ -33,14 +33,14 @@ discard block |
||
33 | 33 | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> |
34 | 34 | </head> |
35 | 35 | <body> |
36 | -<form action="<?php echo $host_uri;?>" method="post" enctype="multipart/form-data"> |
|
37 | -Key to upload: <input type="input" name="key" value="<?php echo $key;?>" /><br /> |
|
38 | -<input type="hidden" name="success_action_redirect" value="<?php echo $redirect;?>" /> |
|
36 | +<form action="<?php echo $host_uri; ?>" method="post" enctype="multipart/form-data"> |
|
37 | +Key to upload: <input type="input" name="key" value="<?php echo $key; ?>" /><br /> |
|
38 | +<input type="hidden" name="success_action_redirect" value="<?php echo $redirect; ?>" /> |
|
39 | 39 | <input type="hidden" name="Content-Type" value="text/html" /> |
40 | 40 | <input type="hidden" name="random" value="vfegf34egf3" /> |
41 | -<input type="hidden" name="KSSAccessKeyId" value="<?php echo $result["KSSAccessKeyId"];?>" /> |
|
42 | -<input type="hidden" name="Policy" value="<?php echo $result["Policy"];?>" /> |
|
43 | -<input type="hidden" name="Signature" value="<?php echo $result["Signature"];?>" /> |
|
41 | +<input type="hidden" name="KSSAccessKeyId" value="<?php echo $result["KSSAccessKeyId"]; ?>" /> |
|
42 | +<input type="hidden" name="Policy" value="<?php echo $result["Policy"]; ?>" /> |
|
43 | +<input type="hidden" name="Signature" value="<?php echo $result["Signature"]; ?>" /> |
|
44 | 44 | File: <input type="file" name="file" /> <br /> |
45 | 45 | <!-- The elements after this will be ignored --> |
46 | 46 | <input type="submit" name="submit" value="Upload to KSS S3" /> |
@@ -1,5 +1,5 @@ discard block |
||
1 | 1 | <?php |
2 | -define("ENCRYPTPTION_STORAGE_MODE","ObjectMetadata"); |
|
2 | +define("ENCRYPTPTION_STORAGE_MODE", "ObjectMetadata"); |
|
3 | 3 | require_once "../Ks3EncryptionClient.class.php"; |
4 | 4 | require_once "../Ks3Client.class.php"; |
5 | 5 | $bucket = "test-encryption"; |
@@ -7,16 +7,16 @@ discard block |
||
7 | 7 | |
8 | 8 | $filename = "secret.key"; |
9 | 9 | $handle = fopen($filename, "r"); |
10 | -$contents = fread($handle, filesize ($filename)); |
|
10 | +$contents = fread($handle, filesize($filename)); |
|
11 | 11 | fclose($handle); |
12 | 12 | |
13 | -$client = new Ks3EncryptionClient("lMQTr0hNlMpB0iOk/i+x","D4CsYLs75JcWEjbiI22zR3P7kJ/+5B1qdEje7A7I",$contents); |
|
14 | -putObjectByContentAndGetObjectUsingMeta($client,$bucket,$keyprefix); |
|
15 | -putObjectByFileAndGetObjectUsingMeta($client,$bucket,$keyprefix); |
|
16 | -multipartUpload($client,$bucket,$keyprefix); |
|
13 | +$client = new Ks3EncryptionClient("lMQTr0hNlMpB0iOk/i+x", "D4CsYLs75JcWEjbiI22zR3P7kJ/+5B1qdEje7A7I", $contents); |
|
14 | +putObjectByContentAndGetObjectUsingMeta($client, $bucket, $keyprefix); |
|
15 | +putObjectByFileAndGetObjectUsingMeta($client, $bucket, $keyprefix); |
|
16 | +multipartUpload($client, $bucket, $keyprefix); |
|
17 | 17 | |
18 | -function putObjectByContentAndGetObjectUsingMeta($client,$bucket,$keyprefix){ |
|
19 | - for($i = 45 ;$i < 60;$i++){ |
|
18 | +function putObjectByContentAndGetObjectUsingMeta($client, $bucket, $keyprefix) { |
|
19 | + for ($i = 45; $i < 60; $i++) { |
|
20 | 20 | |
21 | 21 | $content = EncryptionUtil::genereateOnceUsedKey($i); |
22 | 22 | |
@@ -27,11 +27,11 @@ discard block |
||
27 | 27 | "Content"=>$content |
28 | 28 | ); |
29 | 29 | $client->putObjectByContent($args); |
30 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
31 | - "D://testdown/down",base64_encode(md5($args["Content"]))); |
|
30 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOMeta", |
|
31 | + "D://testdown/down", base64_encode(md5($args["Content"]))); |
|
32 | 32 | } |
33 | 33 | } |
34 | -function putObjectByFileAndGetObjectUsingMeta($client,$bucket,$keyprefix){ |
|
34 | +function putObjectByFileAndGetObjectUsingMeta($client, $bucket, $keyprefix) { |
|
35 | 35 | |
36 | 36 | $args = array( |
37 | 37 | "Bucket"=>$bucket, |
@@ -42,39 +42,39 @@ discard block |
||
42 | 42 | ) |
43 | 43 | ); |
44 | 44 | $client->putObjectByFile($args); |
45 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
46 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
45 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOMeta", |
|
46 | + "D://testdown/down", base64_encode(md5_file("D://IMG.jpg"))); |
|
47 | 47 | } |
48 | -function multipartUpload($client,$bucket,$keyprefix){ |
|
48 | +function multipartUpload($client, $bucket, $keyprefix) { |
|
49 | 49 | //初始化分开上传,获取uploadid |
50 | 50 | $args = array( |
51 | 51 | "Bucket"=>$bucket, |
52 | 52 | "Key"=>$keyprefix."EOMeta", |
53 | 53 | ); |
54 | 54 | $uploadid = $client->initMultipartUpload($args); |
55 | - $uploadid = $uploadid["UploadId"];//获取到uploadid |
|
55 | + $uploadid = $uploadid["UploadId"]; //获取到uploadid |
|
56 | 56 | //开始上传 |
57 | 57 | |
58 | - $file = "D://IMG.jpg";//要上传的文件 |
|
58 | + $file = "D://IMG.jpg"; //要上传的文件 |
|
59 | 59 | $partsize = 1024*100; |
60 | - $resource = fopen($file,"r"); |
|
60 | + $resource = fopen($file, "r"); |
|
61 | 61 | $stat = fstat($resource); |
62 | - $total = $stat["size"];//获取文件的总大小 |
|
62 | + $total = $stat["size"]; //获取文件的总大小 |
|
63 | 63 | fclose($resource); |
64 | - $count = (int)(($total-1)/$partsize)+1;//计算文件需要分几块上传 |
|
65 | - for($i = 0;$i < $count;$i++){ |
|
64 | + $count = (int)(($total-1)/$partsize)+1; //计算文件需要分几块上传 |
|
65 | + for ($i = 0; $i < $count; $i++) { |
|
66 | 66 | //依次上传每一块 |
67 | 67 | echo "upload".$i."\r\n"; |
68 | - $args=array( |
|
68 | + $args = array( |
|
69 | 69 | "Bucket"=>$bucket, |
70 | 70 | "Key"=>$keyprefix."EOMeta", |
71 | - "LastPart"=>($i===$count-1), |
|
71 | + "LastPart"=>($i === $count-1), |
|
72 | 72 | "Options"=>array( |
73 | 73 | "partNumber"=>$i+1, |
74 | 74 | "uploadId"=>$uploadid |
75 | 75 | ), |
76 | 76 | "ObjectMeta"=>array( |
77 | - "Content-Length"=>min($partsize,$total-$partsize*$i)//每次上传$partsize大小 |
|
77 | + "Content-Length"=>min($partsize, $total-$partsize*$i)//每次上传$partsize大小 |
|
78 | 78 | ), |
79 | 79 | "Content"=>array( |
80 | 80 | "content"=>$file, |
@@ -84,9 +84,9 @@ discard block |
||
84 | 84 | $etag = $client->uploadPart($args); |
85 | 85 | $etag = $etag["ETag"]; |
86 | 86 | } |
87 | - $parts = $client->listParts(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOMeta","Options"=>array("uploadId"=>$uploadid))); |
|
87 | + $parts = $client->listParts(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOMeta", "Options"=>array("uploadId"=>$uploadid))); |
|
88 | 88 | //结束上传 |
89 | - $args=array( |
|
89 | + $args = array( |
|
90 | 90 | "Bucket"=>$bucket, |
91 | 91 | "Key"=>$keyprefix."EOMeta", |
92 | 92 | "Options"=>array("uploadId"=>$uploadid), |
@@ -94,21 +94,21 @@ discard block |
||
94 | 94 | ); |
95 | 95 | $result = $client->completeMultipartUpload($args); |
96 | 96 | |
97 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOMeta", |
|
98 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
97 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOMeta", |
|
98 | + "D://testdown/down", base64_encode(md5_file("D://IMG.jpg"))); |
|
99 | 99 | } |
100 | -function rangeGetAndCheckMd5($client,$bucket,$key,$file,$expectedMd5){ |
|
101 | - $args = array("Bucket"=>$bucket,"Key"=>$key); |
|
100 | +function rangeGetAndCheckMd5($client, $bucket, $key, $file, $expectedMd5) { |
|
101 | + $args = array("Bucket"=>$bucket, "Key"=>$key); |
|
102 | 102 | $meta = $client->getObjectMeta($args); |
103 | 103 | $contentlength = $meta["ObjectMeta"]["Content-Length"]; |
104 | 104 | |
105 | 105 | $filelist = array(); |
106 | 106 | |
107 | - for($begin = 0;$begin <$contentlength;){ |
|
108 | - $index = rand((int)($contentlength/20),(int)($contentlength/10)); |
|
109 | - $range = array("start"=>$begin,"end"=>$begin+$index); |
|
107 | + for ($begin = 0; $begin < $contentlength;) { |
|
108 | + $index = rand((int)($contentlength/20), (int)($contentlength/10)); |
|
109 | + $range = array("start"=>$begin, "end"=>$begin+$index); |
|
110 | 110 | $destFile = $file.$begin."-".($begin+$index); |
111 | - array_push($filelist,$destFile); |
|
111 | + array_push($filelist, $destFile); |
|
112 | 112 | $begin += ($index+1); |
113 | 113 | $args = array( |
114 | 114 | "Bucket"=>$bucket, |
@@ -120,17 +120,17 @@ discard block |
||
120 | 120 | } |
121 | 121 | |
122 | 122 | foreach ($filelist as $key => $value) { |
123 | - $handle = fopen($value,"r"); |
|
123 | + $handle = fopen($value, "r"); |
|
124 | 124 | $size = filesize($value); |
125 | - if($size > 0){ |
|
126 | - $content = fread($handle,$size); |
|
127 | - file_put_contents($file,$content,FILE_APPEND); |
|
125 | + if ($size > 0) { |
|
126 | + $content = fread($handle, $size); |
|
127 | + file_put_contents($file, $content, FILE_APPEND); |
|
128 | 128 | } |
129 | 129 | fclose($handle); |
130 | 130 | @unlink($value); |
131 | 131 | } |
132 | 132 | $md5 = base64_encode(md5_file($file)); |
133 | - if($md5 != $expectedMd5) |
|
133 | + if ($md5 != $expectedMd5) |
|
134 | 134 | throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
135 | 135 | @unlink($file); |
136 | 136 | } |
@@ -1,5 +1,5 @@ discard block |
||
1 | 1 | <?php |
2 | -define("ENCRYPTPTION_STORAGE_MODE","InstructionFile"); |
|
2 | +define("ENCRYPTPTION_STORAGE_MODE", "InstructionFile"); |
|
3 | 3 | require_once "../Ks3EncryptionClient.class.php"; |
4 | 4 | require_once "../Ks3Client.class.php"; |
5 | 5 | $bucket = "test-encryption"; |
@@ -7,17 +7,17 @@ discard block |
||
7 | 7 | |
8 | 8 | $filename = "secret.key"; |
9 | 9 | $handle = fopen($filename, "r"); |
10 | -$contents = fread($handle, filesize ($filename)); |
|
10 | +$contents = fread($handle, filesize($filename)); |
|
11 | 11 | fclose($handle); |
12 | 12 | |
13 | -$client = new Ks3EncryptionClient("lMQTr0hNlMpB0iOk/i+x","D4CsYLs75JcWEjbiI22zR3P7kJ/+5B1qdEje7A7I",$contents); |
|
14 | -putObjectByContentAndGetObjectUsingInstruction($client,$bucket,$keyprefix); |
|
15 | -putObjectByFileAndGetObjectUsingFile($client,$bucket,$keyprefix); |
|
16 | -multipartUpload($client,$bucket,$keyprefix); |
|
17 | -copyAnddeleteObject($client,$bucket,$keyprefix); |
|
13 | +$client = new Ks3EncryptionClient("lMQTr0hNlMpB0iOk/i+x", "D4CsYLs75JcWEjbiI22zR3P7kJ/+5B1qdEje7A7I", $contents); |
|
14 | +putObjectByContentAndGetObjectUsingInstruction($client, $bucket, $keyprefix); |
|
15 | +putObjectByFileAndGetObjectUsingFile($client, $bucket, $keyprefix); |
|
16 | +multipartUpload($client, $bucket, $keyprefix); |
|
17 | +copyAnddeleteObject($client, $bucket, $keyprefix); |
|
18 | 18 | |
19 | -function putObjectByContentAndGetObjectUsingInstruction($client,$bucket,$keyprefix){ |
|
20 | - $content = EncryptionUtil::genereateOnceUsedKey(rand(100,1000)); |
|
19 | +function putObjectByContentAndGetObjectUsingInstruction($client, $bucket, $keyprefix) { |
|
20 | + $content = EncryptionUtil::genereateOnceUsedKey(rand(100, 1000)); |
|
21 | 21 | $args = array( |
22 | 22 | "Bucket"=>$bucket, |
23 | 23 | "Key"=>$keyprefix."EOFile", |
@@ -25,10 +25,10 @@ discard block |
||
25 | 25 | "Content"=>$content |
26 | 26 | ); |
27 | 27 | $client->putObjectByContent($args); |
28 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
29 | - "D://testdown/down",base64_encode(md5($args["Content"]))); |
|
28 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOFile", |
|
29 | + "D://testdown/down", base64_encode(md5($args["Content"]))); |
|
30 | 30 | } |
31 | -function putObjectByFileAndGetObjectUsingFile($client,$bucket,$keyprefix){ |
|
31 | +function putObjectByFileAndGetObjectUsingFile($client, $bucket, $keyprefix) { |
|
32 | 32 | |
33 | 33 | $args = array( |
34 | 34 | "Bucket"=>$bucket, |
@@ -39,39 +39,39 @@ discard block |
||
39 | 39 | ) |
40 | 40 | ); |
41 | 41 | $client->putObjectByFile($args); |
42 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
43 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
42 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOFile", |
|
43 | + "D://testdown/down", base64_encode(md5_file("D://IMG.jpg"))); |
|
44 | 44 | } |
45 | -function multipartUpload($client,$bucket,$keyprefix){ |
|
45 | +function multipartUpload($client, $bucket, $keyprefix) { |
|
46 | 46 | //初始化分开上传,获取uploadid |
47 | 47 | $args = array( |
48 | 48 | "Bucket"=>$bucket, |
49 | 49 | "Key"=>$keyprefix."EOFile", |
50 | 50 | ); |
51 | 51 | $uploadid = $client->initMultipartUpload($args); |
52 | - $uploadid = $uploadid["UploadId"];//获取到uploadid |
|
52 | + $uploadid = $uploadid["UploadId"]; //获取到uploadid |
|
53 | 53 | //开始上传 |
54 | 54 | |
55 | - $file = "D://IMG.jpg";//要上传的文件 |
|
55 | + $file = "D://IMG.jpg"; //要上传的文件 |
|
56 | 56 | $partsize = 1024*100; |
57 | - $resource = fopen($file,"r"); |
|
57 | + $resource = fopen($file, "r"); |
|
58 | 58 | $stat = fstat($resource); |
59 | - $total = $stat["size"];//获取文件的总大小 |
|
59 | + $total = $stat["size"]; //获取文件的总大小 |
|
60 | 60 | fclose($resource); |
61 | - $count = (int)(($total-1)/$partsize)+1;//计算文件需要分几块上传 |
|
62 | - for($i = 0;$i < $count;$i++){ |
|
61 | + $count = (int)(($total-1)/$partsize)+1; //计算文件需要分几块上传 |
|
62 | + for ($i = 0; $i < $count; $i++) { |
|
63 | 63 | //依次上传每一块 |
64 | 64 | echo "upload".$i."\r\n"; |
65 | - $args=array( |
|
65 | + $args = array( |
|
66 | 66 | "Bucket"=>$bucket, |
67 | 67 | "Key"=>$keyprefix."EOFile", |
68 | - "LastPart"=>($i===$count-1), |
|
68 | + "LastPart"=>($i === $count-1), |
|
69 | 69 | "Options"=>array( |
70 | 70 | "partNumber"=>$i+1, |
71 | 71 | "uploadId"=>$uploadid |
72 | 72 | ), |
73 | 73 | "ObjectMeta"=>array( |
74 | - "Content-Length"=>min($partsize,$total-$partsize*$i)//每次上传$partsize大小 |
|
74 | + "Content-Length"=>min($partsize, $total-$partsize*$i)//每次上传$partsize大小 |
|
75 | 75 | ), |
76 | 76 | "Content"=>array( |
77 | 77 | "content"=>$file, |
@@ -81,9 +81,9 @@ discard block |
||
81 | 81 | $etag = $client->uploadPart($args); |
82 | 82 | $etag = $etag["ETag"]; |
83 | 83 | } |
84 | - $parts = $client->listParts(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFile","Options"=>array("uploadId"=>$uploadid))); |
|
84 | + $parts = $client->listParts(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFile", "Options"=>array("uploadId"=>$uploadid))); |
|
85 | 85 | //结束上传 |
86 | - $args=array( |
|
86 | + $args = array( |
|
87 | 87 | "Bucket"=>$bucket, |
88 | 88 | "Key"=>$keyprefix."EOFile", |
89 | 89 | "Options"=>array("uploadId"=>$uploadid), |
@@ -91,11 +91,11 @@ discard block |
||
91 | 91 | ); |
92 | 92 | $result = $client->completeMultipartUpload($args); |
93 | 93 | |
94 | - rangeGetAndCheckMd5($client,$bucket,$keyprefix."EOFile", |
|
95 | - "D://testdown/down",base64_encode(md5_file("D://IMG.jpg"))); |
|
94 | + rangeGetAndCheckMd5($client, $bucket, $keyprefix."EOFile", |
|
95 | + "D://testdown/down", base64_encode(md5_file("D://IMG.jpg"))); |
|
96 | 96 | } |
97 | -function copyAnddeleteObject($client,$bucket,$keyprefix){ |
|
98 | - $content = EncryptionUtil::genereateOnceUsedKey(rand(100,1000)); |
|
97 | +function copyAnddeleteObject($client, $bucket, $keyprefix) { |
|
98 | + $content = EncryptionUtil::genereateOnceUsedKey(rand(100, 1000)); |
|
99 | 99 | $args = array( |
100 | 100 | "Bucket"=>$bucket, |
101 | 101 | "Key"=>$keyprefix."EOFile", |
@@ -104,10 +104,10 @@ discard block |
||
104 | 104 | ); |
105 | 105 | $client->putObjectByContent($args); |
106 | 106 | |
107 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
108 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
109 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
110 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction")); |
|
107 | + if ($client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy"))) |
|
108 | + $client->deleteObject(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy")); |
|
109 | + if ($client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
110 | + $client->deleteObject(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy.instruction")); |
|
111 | 111 | |
112 | 112 | $copyReq = array( |
113 | 113 | "Bucket"=>$bucket, |
@@ -119,30 +119,30 @@ discard block |
||
119 | 119 | ); |
120 | 120 | $client->copyObject($copyReq); |
121 | 121 | |
122 | - if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
122 | + if (!$client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy"))) |
|
123 | 123 | throw new Exception("not found ".$keyprefix."EOFileCopy"); |
124 | - if(!$client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
124 | + if (!$client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
125 | 125 | throw new Exception("not found ".$keyprefix."EOFileCopy.instruction"); |
126 | 126 | |
127 | - $client->deleteObject(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy")); |
|
127 | + $client->deleteObject(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy")); |
|
128 | 128 | |
129 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy"))) |
|
129 | + if ($client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy"))) |
|
130 | 130 | throw new Exception("found ".$keyprefix."EOFileCopy"); |
131 | - if($client->objectExists(array("Bucket"=>$bucket,"Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
131 | + if ($client->objectExists(array("Bucket"=>$bucket, "Key"=>$keyprefix."EOFileCopy.instruction"))) |
|
132 | 132 | throw new Exception("found ".$keyprefix."EOFileCopy.instruction"); |
133 | 133 | } |
134 | -function rangeGetAndCheckMd5($client,$bucket,$key,$file,$expectedMd5){ |
|
135 | - $args = array("Bucket"=>$bucket,"Key"=>$key); |
|
134 | +function rangeGetAndCheckMd5($client, $bucket, $key, $file, $expectedMd5) { |
|
135 | + $args = array("Bucket"=>$bucket, "Key"=>$key); |
|
136 | 136 | $meta = $client->getObjectMeta($args); |
137 | 137 | $contentlength = $meta["ObjectMeta"]["Content-Length"]; |
138 | 138 | |
139 | 139 | $filelist = array(); |
140 | 140 | |
141 | - for($begin = 0;$begin <$contentlength;){ |
|
142 | - $index = rand((int)($contentlength/20),(int)($contentlength/10)); |
|
143 | - $range = array("start"=>$begin,"end"=>$begin+$index); |
|
141 | + for ($begin = 0; $begin < $contentlength;) { |
|
142 | + $index = rand((int)($contentlength/20), (int)($contentlength/10)); |
|
143 | + $range = array("start"=>$begin, "end"=>$begin+$index); |
|
144 | 144 | $destFile = $file.$begin."-".($begin+$index); |
145 | - array_push($filelist,$destFile); |
|
145 | + array_push($filelist, $destFile); |
|
146 | 146 | $begin += ($index+1); |
147 | 147 | $args = array( |
148 | 148 | "Bucket"=>$bucket, |
@@ -154,17 +154,17 @@ discard block |
||
154 | 154 | } |
155 | 155 | |
156 | 156 | foreach ($filelist as $key => $value) { |
157 | - $handle = fopen($value,"r"); |
|
157 | + $handle = fopen($value, "r"); |
|
158 | 158 | $size = filesize($value); |
159 | - if($size > 0){ |
|
160 | - $content = fread($handle,$size); |
|
161 | - file_put_contents($file,$content,FILE_APPEND); |
|
159 | + if ($size > 0) { |
|
160 | + $content = fread($handle, $size); |
|
161 | + file_put_contents($file, $content, FILE_APPEND); |
|
162 | 162 | } |
163 | 163 | fclose($handle); |
164 | 164 | @unlink($value); |
165 | 165 | } |
166 | 166 | $md5 = base64_encode(md5_file($file)); |
167 | - if($md5 != $expectedMd5) |
|
167 | + if ($md5 != $expectedMd5) |
|
168 | 168 | throw new Exception("file md5 check error expected ".$expectedMd5." ,actual ".$md5, 1); |
169 | 169 | @unlink($file); |
170 | 170 | } |
@@ -2,7 +2,7 @@ discard block |
||
2 | 2 | require_once "../Ks3Client.class.php"; |
3 | 3 | require_once "../core/Utils.class.php"; |
4 | 4 | |
5 | -$client = new Ks3Client("","","kss.ksyun.com");//!!第三个参数endpoint需要对应bucket所在region!! 详见http://ks3.ksyun.com/doc/api/index.html Region(区域)一节 |
|
5 | +$client = new Ks3Client("", "", "kss.ksyun.com"); //!!第三个参数endpoint需要对应bucket所在region!! 详见http://ks3.ksyun.com/doc/api/index.html Region(区域)一节 |
|
6 | 6 | //print_r(listBuckets($client)); |
7 | 7 | //print_r(deleteBucket($client)); |
8 | 8 | //print_r(deleteBucketCORS($client)); |
@@ -32,16 +32,16 @@ discard block |
||
32 | 32 | //print_r(multipartUploadWithAdpAndCallBack($client)); |
33 | 33 | //print_r(putAdp($client)); |
34 | 34 | //print_r(postObject($client)); |
35 | -function listBuckets($client){ |
|
35 | +function listBuckets($client) { |
|
36 | 36 | return $client->listBuckets(); |
37 | 37 | } |
38 | -function deleteBucket($client){ |
|
38 | +function deleteBucket($client) { |
|
39 | 39 | return $client->deleteBucket(array("Bucket"=>"ksc-scm")); |
40 | 40 | } |
41 | -function deleteBucketCORS($client){ |
|
41 | +function deleteBucketCORS($client) { |
|
42 | 42 | return $client->deleteBucketCORS(array("Bucket"=>"ksc-scm")); |
43 | 43 | } |
44 | -function listObjects($client){ |
|
44 | +function listObjects($client) { |
|
45 | 45 | $args = array( |
46 | 46 | "Bucket"=>"lijunwei.test", |
47 | 47 | "Options"=>array( |
@@ -53,49 +53,49 @@ discard block |
||
53 | 53 | ); |
54 | 54 | return $client->listObjects($args); |
55 | 55 | } |
56 | -function getBucketAcl($client){ |
|
56 | +function getBucketAcl($client) { |
|
57 | 57 | return $client->getBucketAcl(array("Bucket"=>"aaphp")); |
58 | 58 | } |
59 | -function getBucketCORS($client){ |
|
59 | +function getBucketCORS($client) { |
|
60 | 60 | return $client->getBucketCORS(array("Bucket"=>"ksc-scm")); |
61 | 61 | } |
62 | -function getBucketLocation($client){ |
|
62 | +function getBucketLocation($client) { |
|
63 | 63 | return $client->getBucketLocation(array("Bucket"=>"ksc-scm")); |
64 | 64 | } |
65 | -function getBucketLogging($client){ |
|
65 | +function getBucketLogging($client) { |
|
66 | 66 | return $client->getBucketLogging(array("Bucket"=>"ksc-scm")); |
67 | 67 | } |
68 | -function bucketExists($client){ |
|
68 | +function bucketExists($client) { |
|
69 | 69 | $args = array("Bucket"=>"ksc-scm"); |
70 | 70 | return $client->bucketExists($args); |
71 | 71 | } |
72 | -function createBucket($client){ |
|
72 | +function createBucket($client) { |
|
73 | 73 | $args = array( |
74 | 74 | "Bucket"=>"ksc-scm", |
75 | 75 | "ACL"=>"private" |
76 | 76 | ); |
77 | 77 | return $client->createBucket($args); |
78 | 78 | } |
79 | -function setBucketAcl($client){ |
|
79 | +function setBucketAcl($client) { |
|
80 | 80 | $args = array( |
81 | 81 | "Bucket"=>"ksc-scm", |
82 | 82 | "ACL"=>"private" |
83 | 83 | ); |
84 | 84 | return $client->setBucketAcl($args); |
85 | 85 | } |
86 | -function setBucketCORS($client){ |
|
86 | +function setBucketCORS($client) { |
|
87 | 87 | $args = array( |
88 | 88 | "Bucket"=>"ksc-scm", |
89 | 89 | "CORS"=>array( |
90 | 90 | array( |
91 | - "AllowedMethod"=>array("GET","PUT"), |
|
91 | + "AllowedMethod"=>array("GET", "PUT"), |
|
92 | 92 | "AllowedOrigin"=>array("http://www.kingsoft.com"), |
93 | 93 | "AllowedHeader"=>array("*"), |
94 | 94 | "ExposeHeader"=>array("*"), |
95 | 95 | "MaxAgeSeconds"=>10 |
96 | 96 | ), |
97 | 97 | array( |
98 | - "AllowedMethod"=>array("GET","PUT"), |
|
98 | + "AllowedMethod"=>array("GET", "PUT"), |
|
99 | 99 | "AllowedOrigin"=>array("*"), |
100 | 100 | "AllowedHeader"=>array("*"), |
101 | 101 | "ExposeHeader"=>array("*"), |
@@ -105,7 +105,7 @@ discard block |
||
105 | 105 | ); |
106 | 106 | return $client->setBucketCORS($args); |
107 | 107 | } |
108 | -function setBucketLogging($client){ |
|
108 | +function setBucketLogging($client) { |
|
109 | 109 | $args = array( |
110 | 110 | "Bucket"=>"ksc-scm", |
111 | 111 | "BucketLogging"=>array( |
@@ -116,21 +116,21 @@ discard block |
||
116 | 116 | ); |
117 | 117 | return $client->setBucketLogging($args); |
118 | 118 | } |
119 | -function deleteObject($client){ |
|
119 | +function deleteObject($client) { |
|
120 | 120 | $args = array( |
121 | 121 | "Bucket"=>"ksc-scm", |
122 | 122 | "Key"=>"123.pdf" |
123 | 123 | ); |
124 | 124 | return $client->deleteObject($args); |
125 | 125 | } |
126 | -function deleteObjects($client){ |
|
126 | +function deleteObjects($client) { |
|
127 | 127 | $args = array( |
128 | 128 | "Bucket"=>"ksc-scm", |
129 | - "DeleteKeys"=>array("copy/test.zip","copy/123.doc") |
|
129 | + "DeleteKeys"=>array("copy/test.zip", "copy/123.doc") |
|
130 | 130 | ); |
131 | 131 | return $client->deleteObjects($args); |
132 | 132 | } |
133 | -function getObject($client){ |
|
133 | +function getObject($client) { |
|
134 | 134 | $args = array( |
135 | 135 | "Bucket"=>"aaphp", |
136 | 136 | "Key"=>"multi.exe", |
@@ -142,28 +142,28 @@ discard block |
||
142 | 142 | ); |
143 | 143 | return $client->getObject($args); |
144 | 144 | } |
145 | -function getObjectAcl($client){ |
|
145 | +function getObjectAcl($client) { |
|
146 | 146 | $args = array( |
147 | 147 | "Bucket"=>"aaphp", |
148 | 148 | "Key"=>"multi.exe" |
149 | 149 | ); |
150 | 150 | return $client->getObjectAcl($args); |
151 | 151 | } |
152 | -function objectExists($client){ |
|
152 | +function objectExists($client) { |
|
153 | 153 | $args = array( |
154 | 154 | "Bucket"=>"ksc-scm", |
155 | 155 | "Key"=>"123.pdf" |
156 | 156 | ); |
157 | 157 | return $client->objectExists($args); |
158 | 158 | } |
159 | -function getObjectMeta($client){ |
|
159 | +function getObjectMeta($client) { |
|
160 | 160 | $args = array( |
161 | 161 | "Bucket"=>"aaphp", |
162 | 162 | "Key"=>"test.zip" |
163 | 163 | ); |
164 | 164 | return $client->getObjectMeta($args); |
165 | 165 | } |
166 | -function setObjectAcl($client){ |
|
166 | +function setObjectAcl($client) { |
|
167 | 167 | $args = array( |
168 | 168 | "Bucket"=>"aaphp", |
169 | 169 | "Key"=>"test.zip", |
@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | ); |
172 | 172 | return $client->setObjectAcl($args); |
173 | 173 | } |
174 | -function copyObject($client){ |
|
174 | +function copyObject($client) { |
|
175 | 175 | $args = array( |
176 | 176 | "Bucket"=>"aaphp", |
177 | 177 | "Key"=>"copy/test.zip", |
@@ -182,10 +182,10 @@ discard block |
||
182 | 182 | ); |
183 | 183 | return $client->copyObject($args); |
184 | 184 | } |
185 | -function putObjectByFile($client){ |
|
185 | +function putObjectByFile($client) { |
|
186 | 186 | $file = "D://phpput"; |
187 | - if(Utils::chk_chinese($file)){ |
|
188 | - $file = iconv('utf-8','gbk',$file); |
|
187 | + if (Utils::chk_chinese($file)) { |
|
188 | + $file = iconv('utf-8', 'gbk', $file); |
|
189 | 189 | } |
190 | 190 | $content = $file; |
191 | 191 | $args = array( |
@@ -193,7 +193,7 @@ discard block |
||
193 | 193 | "Key"=>"stream_upload1.txt", |
194 | 194 | "ACL"=>"public-read", |
195 | 195 | "ObjectMeta"=>array( |
196 | - "Content-Type"=>"image/jpg",//只传0-10字节, |
|
196 | + "Content-Type"=>"image/jpg", //只传0-10字节, |
|
197 | 197 | ), |
198 | 198 | "Content"=>array( |
199 | 199 | "content"=>$file, |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | ); |
203 | 203 | return $client->putObjectByFile($args); |
204 | 204 | } |
205 | -function multipartUpload($client){ |
|
205 | +function multipartUpload($client) { |
|
206 | 206 | $args = array( |
207 | 207 | "Bucket"=>"aaphp", |
208 | 208 | "Key"=>"multi.zip", |
@@ -220,16 +220,16 @@ discard block |
||
220 | 220 | //开始上传 |
221 | 221 | |
222 | 222 | $file = "D://新建文件夹.rar"; |
223 | - if(Utils::chk_chinese($file)){ |
|
224 | - $file = iconv('utf-8','gbk',$file); |
|
223 | + if (Utils::chk_chinese($file)) { |
|
224 | + $file = iconv('utf-8', 'gbk', $file); |
|
225 | 225 | } |
226 | 226 | $total = Utils::getFileSize($file); |
227 | 227 | $partsize = 1024*1024*5; |
228 | 228 | $count = (int)(($total-1)/$partsize)+1; |
229 | 229 | echo $count."\r\n"; |
230 | - for($i = 0;$i < $count;$i++){ |
|
230 | + for ($i = 0; $i < $count; $i++) { |
|
231 | 231 | echo "upload".$i."\r\n"; |
232 | - $args=array( |
|
232 | + $args = array( |
|
233 | 233 | "Bucket"=>"aaphp", |
234 | 234 | "Key"=>"multi.zip", |
235 | 235 | "Options"=>array( |
@@ -248,10 +248,10 @@ discard block |
||
248 | 248 | print_r($etag); |
249 | 249 | $etag = $etag["ETag"]; |
250 | 250 | } |
251 | - $parts = $client->listParts(array("Bucket"=>"aaphp","Key"=>"multi.zip","Options"=>array("uploadId"=>$uploadid))); |
|
251 | + $parts = $client->listParts(array("Bucket"=>"aaphp", "Key"=>"multi.zip", "Options"=>array("uploadId"=>$uploadid))); |
|
252 | 252 | print_r($parts); |
253 | 253 | //结束上传 |
254 | - $args=array( |
|
254 | + $args = array( |
|
255 | 255 | "Bucket"=>"aaphp", |
256 | 256 | "Key"=>"multi.zip", |
257 | 257 | "Options"=>array("uploadId"=>$uploadid), |
@@ -260,16 +260,16 @@ discard block |
||
260 | 260 | $result = $client->completeMultipartUpload($args); |
261 | 261 | print_r($result); |
262 | 262 | } |
263 | -function abortMultipartUpload($client){ |
|
264 | - $args=array( |
|
263 | +function abortMultipartUpload($client) { |
|
264 | + $args = array( |
|
265 | 265 | "Bucket"=>"aaphp", |
266 | 266 | "Key"=>"multi.zip", |
267 | 267 | "Options"=>array("uploadId"=>"1234") |
268 | 268 | ); |
269 | 269 | return $client->abortMultipartUpload($args); |
270 | 270 | } |
271 | -function generatePresignedUrl($client){ |
|
272 | - $args=array( |
|
271 | +function generatePresignedUrl($client) { |
|
272 | + $args = array( |
|
273 | 273 | "Bucket"=>"aaphp", |
274 | 274 | "Key"=>"multi.zip", |
275 | 275 | "Options"=>array( |
@@ -279,7 +279,7 @@ discard block |
||
279 | 279 | ); |
280 | 280 | return $client->generatePresignedUrl($args); |
281 | 281 | } |
282 | -function putObjectWithAdpAndCallBack($client){ |
|
282 | +function putObjectWithAdpAndCallBack($client) { |
|
283 | 283 | $content = "D://野生动物.3gp"; |
284 | 284 | $args = array( |
285 | 285 | "Bucket"=>"aaphp", |
@@ -299,13 +299,13 @@ discard block |
||
299 | 299 | ), |
300 | 300 | "CallBack"=>array( |
301 | 301 | "Url"=>"http://10.4.2.38:19090/", |
302 | - "BodyMagicVariables"=>array("bucket"=>"bucket","key"=>"key"), |
|
302 | + "BodyMagicVariables"=>array("bucket"=>"bucket", "key"=>"key"), |
|
303 | 303 | "BodyVariables"=>array("name"=>"lijunwei") |
304 | 304 | ) |
305 | 305 | ); |
306 | 306 | return $client->putObjectByFile($args); |
307 | 307 | } |
308 | -function multipartUploadWithAdpAndCallBack($client){ |
|
308 | +function multipartUploadWithAdpAndCallBack($client) { |
|
309 | 309 | $args = array( |
310 | 310 | "Bucket"=>"aaphp", |
311 | 311 | "Key"=>"multi.zip", |
@@ -323,16 +323,16 @@ discard block |
||
323 | 323 | //开始上传 |
324 | 324 | |
325 | 325 | $file = "D://野生动物.3gp"; |
326 | - if(Utils::chk_chinese($file)){ |
|
327 | - $file = iconv('utf-8','gbk',$file); |
|
326 | + if (Utils::chk_chinese($file)) { |
|
327 | + $file = iconv('utf-8', 'gbk', $file); |
|
328 | 328 | } |
329 | 329 | $partsize = 1024*1024*5; |
330 | 330 | $total = Utils::getFileSize($file); |
331 | 331 | $count = (int)(($total-1)/$partsize)+1; |
332 | 332 | echo $count."\r\n"; |
333 | - for($i = 0;$i < $count;$i++){ |
|
333 | + for ($i = 0; $i < $count; $i++) { |
|
334 | 334 | echo "upload".$i."\r\n"; |
335 | - $args=array( |
|
335 | + $args = array( |
|
336 | 336 | "Bucket"=>"aaphp", |
337 | 337 | "Key"=>"multi.zip", |
338 | 338 | "Options"=>array( |
@@ -351,10 +351,10 @@ discard block |
||
351 | 351 | print_r($etag); |
352 | 352 | $etag = $etag["ETag"]; |
353 | 353 | } |
354 | - $parts = $client->listParts(array("Bucket"=>"aaphp","Key"=>"multi.zip","Options"=>array("uploadId"=>$uploadid))); |
|
354 | + $parts = $client->listParts(array("Bucket"=>"aaphp", "Key"=>"multi.zip", "Options"=>array("uploadId"=>$uploadid))); |
|
355 | 355 | print_r($parts); |
356 | 356 | //结束上传 |
357 | - $args=array( |
|
357 | + $args = array( |
|
358 | 358 | "Bucket"=>"aaphp", |
359 | 359 | "Key"=>"multi.zip", |
360 | 360 | "Options"=>array("uploadId"=>$uploadid), |
@@ -370,7 +370,7 @@ discard block |
||
370 | 370 | ), |
371 | 371 | "CallBack"=>array( |
372 | 372 | "Url"=>"http://10.4.2.38:19090/", |
373 | - "BodyMagicVariables"=>array("bucket"=>"bucket","key"=>"key"), |
|
373 | + "BodyMagicVariables"=>array("bucket"=>"bucket", "key"=>"key"), |
|
374 | 374 | "BodyVariables"=>array("name"=>"lijunwei") |
375 | 375 | ) |
376 | 376 | ); |
@@ -380,8 +380,8 @@ discard block |
||
380 | 380 | $task = $client->getAdp(array("TaskID"=>$taskid)); |
381 | 381 | print_r($task); |
382 | 382 | } |
383 | -function putAdp($client){ |
|
384 | - $args=array( |
|
383 | +function putAdp($client) { |
|
384 | + $args = array( |
|
385 | 385 | "Bucket"=>"aaphp", |
386 | 386 | "Key"=>"multi.zip", |
387 | 387 | "Adp"=>array( |
@@ -400,14 +400,14 @@ discard block |
||
400 | 400 | $task = $client->getAdp(array("TaskID"=>$taskid)); |
401 | 401 | print_r($task); |
402 | 402 | } |
403 | -function postObject($client){ |
|
403 | +function postObject($client) { |
|
404 | 404 | |
405 | 405 | $postData = array( |
406 | 406 | "key"=>"~!@\\#$\%^&*()_+-=qw", |
407 | 407 | "acl"=>"public-read" |
408 | 408 | ); |
409 | - $unKnowData=array("122","334"); |
|
409 | + $unKnowData = array("122", "334"); |
|
410 | 410 | |
411 | - print_r($client->postObject("ksc-scm",$postData,$unKnowData)); |
|
411 | + print_r($client->postObject("ksc-scm", $postData, $unKnowData)); |
|
412 | 412 | } |
413 | 413 | ?> |
@@ -1,7 +1,7 @@ discard block |
||
1 | 1 | <?php |
2 | -class EncryptionUtil{ |
|
2 | +class EncryptionUtil { |
|
3 | 3 | public static $INSTRUCTION_SUFFIX = ".instruction"; |
4 | - public static function genereateOnceUsedKey($length=32){ |
|
4 | + public static function genereateOnceUsedKey($length = 32) { |
|
5 | 5 | $randpwd = ""; |
6 | 6 | for ($i = 0; $i < $length; $i++) |
7 | 7 | { |
@@ -9,24 +9,24 @@ discard block |
||
9 | 9 | } |
10 | 10 | return $randpwd; |
11 | 11 | } |
12 | - public static function encode_AES_ECB($data,$secret_key){ |
|
13 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_ECB,''); |
|
12 | + public static function encode_AES_ECB($data, $secret_key) { |
|
13 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_ECB, ''); |
|
14 | 14 | |
15 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_ECB); |
|
16 | - $pad = $blocksize - (strlen($data) % $blocksize); |
|
17 | - $data = $data . str_repeat(chr($pad), $pad); |
|
15 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_ECB); |
|
16 | + $pad = $blocksize-(strlen($data)%$blocksize); |
|
17 | + $data = $data.str_repeat(chr($pad), $pad); |
|
18 | 18 | |
19 | - $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
20 | - mcrypt_generic_init($td,$secret_key,$iv); |
|
21 | - $encrypted = mcrypt_generic($td,$data); |
|
19 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
20 | + mcrypt_generic_init($td, $secret_key, $iv); |
|
21 | + $encrypted = mcrypt_generic($td, $data); |
|
22 | 22 | mcrypt_generic_deinit($td); |
23 | 23 | return $encrypted; |
24 | 24 | } |
25 | - public static function decode_AES_ECB($data,$secret_key){ |
|
26 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_ECB,''); |
|
27 | - $iv = mcrypt_create_iv (mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
28 | - mcrypt_generic_init($td,$secret_key,$iv); |
|
29 | - $data = mdecrypt_generic($td,$data); |
|
25 | + public static function decode_AES_ECB($data, $secret_key) { |
|
26 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_ECB, ''); |
|
27 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
28 | + mcrypt_generic_init($td, $secret_key, $iv); |
|
29 | + $data = mdecrypt_generic($td, $data); |
|
30 | 30 | mcrypt_generic_deinit($td); |
31 | 31 | mcrypt_module_close($td); |
32 | 32 | |
@@ -36,155 +36,155 @@ discard block |
||
36 | 36 | |
37 | 37 | return trim($data); |
38 | 38 | } |
39 | - public static function getKeyEncryptionAlgm($encryptionMaterials){ |
|
40 | - if(is_array($encryptionMaterials)){ |
|
39 | + public static function getKeyEncryptionAlgm($encryptionMaterials) { |
|
40 | + if (is_array($encryptionMaterials)) { |
|
41 | 41 | return "RSA"; |
42 | - }else{ |
|
42 | + }else { |
|
43 | 43 | return "AES"; |
44 | 44 | } |
45 | 45 | } |
46 | - public static function getAdjustedRange($range,$blocksize){ |
|
46 | + public static function getAdjustedRange($range, $blocksize) { |
|
47 | 47 | $a = $range["start"]; |
48 | 48 | $b = $range["end"]; |
49 | - $a = $a - ($a%$blocksize)-$blocksize; |
|
50 | - if($a < 0) |
|
49 | + $a = $a-($a%$blocksize)-$blocksize; |
|
50 | + if ($a < 0) |
|
51 | 51 | $a = 0; |
52 | 52 | |
53 | 53 | $b = $b+$blocksize-$b%$blocksize+$blocksize; |
54 | 54 | |
55 | - return array("start"=>$a,"end"=>$b); |
|
55 | + return array("start"=>$a, "end"=>$b); |
|
56 | 56 | } |
57 | - public static function encodeCek($encryptionMaterials,$cek){ |
|
57 | + public static function encodeCek($encryptionMaterials, $cek) { |
|
58 | 58 | $encrypKeyAlg = EncryptionUtil::getKeyEncryptionAlgm($encryptionMaterials); |
59 | - if($encrypKeyAlg === "AES"){ |
|
59 | + if ($encrypKeyAlg === "AES") { |
|
60 | 60 | $secretKey = $encryptionMaterials; |
61 | - $encryptedSek = EncryptionUtil::encode_AES_ECB($cek,$secretKey); |
|
62 | - if(empty($encryptedSek)) |
|
61 | + $encryptedSek = EncryptionUtil::encode_AES_ECB($cek, $secretKey); |
|
62 | + if (empty($encryptedSek)) |
|
63 | 63 | throw new Ks3ClientException("can not encode cek useing AES"); |
64 | - }else if($encrypKeyAlg === "RSA"){ |
|
64 | + }else if ($encrypKeyAlg === "RSA") { |
|
65 | 65 | $encryptedSek = ""; |
66 | - openssl_public_encrypt($cek,$encryptedSek, $encryptionMaterials[0]); |
|
67 | - if(empty($encryptedSek)) |
|
66 | + openssl_public_encrypt($cek, $encryptedSek, $encryptionMaterials[0]); |
|
67 | + if (empty($encryptedSek)) |
|
68 | 68 | throw new Ks3ClientException("can not encode cek useing RSA"); |
69 | 69 | } |
70 | 70 | return $encryptedSek; |
71 | 71 | } |
72 | - public static function decodeCek($encryptionMaterials,$cekEncrypted){ |
|
72 | + public static function decodeCek($encryptionMaterials, $cekEncrypted) { |
|
73 | 73 | $encrypKeyAlg = EncryptionUtil::getKeyEncryptionAlgm($encryptionMaterials); |
74 | - if($encrypKeyAlg === "AES"){ |
|
74 | + if ($encrypKeyAlg === "AES") { |
|
75 | 75 | $secretKey = $encryptionMaterials; |
76 | - $cek = EncryptionUtil::decode_AES_ECB($cekEncrypted,$secretKey); |
|
77 | - if(empty($cek)) |
|
76 | + $cek = EncryptionUtil::decode_AES_ECB($cekEncrypted, $secretKey); |
|
77 | + if (empty($cek)) |
|
78 | 78 | throw new Ks3ClientException("can not decode cek useing AES,secret key maybe not correct"); |
79 | - }else if($encrypKeyAlg === "RSA"){ |
|
79 | + }else if ($encrypKeyAlg === "RSA") { |
|
80 | 80 | $cek = ""; |
81 | - openssl_private_decrypt($cekEncrypted,$cek, $encryptionMaterials[1]); |
|
82 | - if(empty($cek)) |
|
81 | + openssl_private_decrypt($cekEncrypted, $cek, $encryptionMaterials[1]); |
|
82 | + if (empty($cek)) |
|
83 | 83 | throw new Ks3ClientException("can not decode cek useing RSA,public/private key pair maybe not correct"); |
84 | 84 | } |
85 | 85 | return $cek; |
86 | 86 | } |
87 | - public static function getPKCS5EncrypedLength($length,$blocksize){ |
|
88 | - $pad = $blocksize - $length%$blocksize; |
|
87 | + public static function getPKCS5EncrypedLength($length, $blocksize) { |
|
88 | + $pad = $blocksize-$length%$blocksize; |
|
89 | 89 | return $length+$pad; |
90 | 90 | } |
91 | 91 | //pkcs5填充 |
92 | - public static function PKCS5Padding($data,$blocksize){ |
|
93 | - $pad = $blocksize - strlen($data)%$blocksize; |
|
94 | - for($i = 0;$i < $pad;$i++){ |
|
95 | - $data.= chr($pad); |
|
92 | + public static function PKCS5Padding($data, $blocksize) { |
|
93 | + $pad = $blocksize-strlen($data)%$blocksize; |
|
94 | + for ($i = 0; $i < $pad; $i++) { |
|
95 | + $data .= chr($pad); |
|
96 | 96 | } |
97 | 97 | return $data; |
98 | 98 | } |
99 | - public static function updateContentMD5Header($req){ |
|
100 | - if(!is_array($req)) |
|
99 | + public static function updateContentMD5Header($req) { |
|
100 | + if (!is_array($req)) |
|
101 | 101 | return $req; |
102 | - if(isset($req["ObjectMeta"])){ |
|
102 | + if (isset($req["ObjectMeta"])) { |
|
103 | 103 | $meta = $req["ObjectMeta"]; |
104 | - }else{ |
|
104 | + }else { |
|
105 | 105 | return $req; |
106 | 106 | } |
107 | - if(is_array($meta) && isset($meta["Content-MD5"])){ |
|
107 | + if (is_array($meta) && isset($meta["Content-MD5"])) { |
|
108 | 108 | $md5 = $meta["Content-MD5"]; |
109 | - }else{ |
|
109 | + }else { |
|
110 | 110 | return $req; |
111 | 111 | } |
112 | - if(empty($md5)){ |
|
112 | + if (empty($md5)) { |
|
113 | 113 | return $req; |
114 | - }else{ |
|
114 | + }else { |
|
115 | 115 | $req["ObjectMeta"]["Content-MD5"] = NULL; |
116 | 116 | $req["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-md5"] = $md5; |
117 | 117 | } |
118 | 118 | return $req; |
119 | 119 | } |
120 | - public static function metaTextLength($req){ |
|
121 | - if(!is_array($req)) |
|
120 | + public static function metaTextLength($req) { |
|
121 | + if (!is_array($req)) |
|
122 | 122 | return -1; |
123 | - if(isset($req["ObjectMeta"])){ |
|
123 | + if (isset($req["ObjectMeta"])) { |
|
124 | 124 | $meta = $req["ObjectMeta"]; |
125 | - }else{ |
|
125 | + }else { |
|
126 | 126 | return -1; |
127 | 127 | } |
128 | - if(is_array($meta) && isset($meta["Content-Length"])){ |
|
128 | + if (is_array($meta) && isset($meta["Content-Length"])) { |
|
129 | 129 | $length = $meta["Content-Length"]; |
130 | 130 | return $length; |
131 | 131 | }else |
132 | 132 | return -1; |
133 | 133 | } |
134 | - public static function plainTextLength($args){ |
|
135 | - if(isset($args["Content"])){ |
|
136 | - if(is_array($args["Content"])){ |
|
134 | + public static function plainTextLength($args) { |
|
135 | + if (isset($args["Content"])) { |
|
136 | + if (is_array($args["Content"])) { |
|
137 | 137 | $content = $args["Content"]["content"]; |
138 | 138 | $seek_position = 0; |
139 | 139 | $resourceLength = 0; |
140 | 140 | $length = -1; |
141 | 141 | $isFile = FALSE; |
142 | 142 | |
143 | - if (!is_resource($content)){ |
|
143 | + if (!is_resource($content)) { |
|
144 | 144 | $isFile = TRUE; |
145 | 145 | //如果之前用户已经转化为GBK则不转换 |
146 | - if(Utils::chk_chinese($content)&&!Utils::check_char($content)){ |
|
147 | - $content = iconv('utf-8','gbk',$content); |
|
146 | + if (Utils::chk_chinese($content) && !Utils::check_char($content)) { |
|
147 | + $content = iconv('utf-8', 'gbk', $content); |
|
148 | 148 | } |
149 | - if(!file_exists($content)) |
|
149 | + if (!file_exists($content)) |
|
150 | 150 | throw new Ks3ClientException("the specified file does not exist "); |
151 | 151 | $length = Utils::getFileSize($content); |
152 | - $content = fopen($content,"r"); |
|
153 | - }else{ |
|
152 | + $content = fopen($content, "r"); |
|
153 | + }else { |
|
154 | 154 | $stats = fstat($content); |
155 | - if ($stats && $stats["size"] >= 0){ |
|
155 | + if ($stats && $stats["size"] >= 0) { |
|
156 | 156 | $length = $stats["size"]; |
157 | 157 | } |
158 | 158 | } |
159 | 159 | $resourceLength = $length; |
160 | 160 | //优先取用户设置seek_position,没有的话取ftell |
161 | - if(isset($args["Content"]["seek_position"])&&$args["Content"]["seek_position"]>0){ |
|
161 | + if (isset($args["Content"]["seek_position"]) && $args["Content"]["seek_position"] > 0) { |
|
162 | 162 | $seek_position = $args["Content"]["seek_position"]; |
163 | - }else if(!$isFile){ |
|
163 | + }else if (!$isFile) { |
|
164 | 164 | $seek_position = ftell($content); |
165 | - if($seek_position<0) |
|
165 | + if ($seek_position < 0) |
|
166 | 166 | $seek_position = 0; |
167 | - fseek($content,0); |
|
167 | + fseek($content, 0); |
|
168 | 168 | } |
169 | 169 | |
170 | 170 | $lengthInMeta = -1; |
171 | - if(isset($args["ObjectMeta"]["Content-Length"])){ |
|
171 | + if (isset($args["ObjectMeta"]["Content-Length"])) { |
|
172 | 172 | $lengthInMeta = $args["ObjectMeta"]["Content-Length"]; |
173 | 173 | } |
174 | - if($lengthInMeta > 0){ |
|
174 | + if ($lengthInMeta > 0) { |
|
175 | 175 | $length = $lengthInMeta; |
176 | - }else if($resourceLength > 0){ |
|
176 | + }else if ($resourceLength > 0) { |
|
177 | 177 | //根据seek_position计算实际长度 |
178 | - $length = $resourceLength - $seek_position; |
|
178 | + $length = $resourceLength-$seek_position; |
|
179 | 179 | } |
180 | - if($length <= 0) |
|
180 | + if ($length <= 0) |
|
181 | 181 | throw new Ks3ClientException("calculate content length failed,unexpected contetn length ".$length); |
182 | 182 | return $length; |
183 | - }else{ |
|
183 | + }else { |
|
184 | 184 | $content = $args["Content"]; |
185 | 185 | $lengthInMeta = EncryptionUtil::metaTextLength($args); |
186 | 186 | $length = strlen($content); |
187 | - if($length<$lengthInMeta||$lengthInMeta <= 0) |
|
187 | + if ($length < $lengthInMeta || $lengthInMeta <= 0) |
|
188 | 188 | return $length; |
189 | 189 | else |
190 | 190 | return $lengthInMeta; |
@@ -192,14 +192,14 @@ discard block |
||
192 | 192 | } |
193 | 193 | return -1; |
194 | 194 | } |
195 | - public static function initMultipartUploadContext($initResult,$iv,$cek,$encryptedCek,$matdesc="{}"){ |
|
195 | + public static function initMultipartUploadContext($initResult, $iv, $cek, $encryptedCek, $matdesc = "{}") { |
|
196 | 196 | $cacheDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR; |
197 | 197 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
198 | - if(!is_dir($cacheDir)) |
|
198 | + if (!is_dir($cacheDir)) |
|
199 | 199 | mkdir($cacheDir); |
200 | - if(!is_dir($encryptionDir)) |
|
200 | + if (!is_dir($encryptionDir)) |
|
201 | 201 | mkdir($encryptionDir); |
202 | - if(is_array($matdesc)){ |
|
202 | + if (is_array($matdesc)) { |
|
203 | 203 | $matdesc = json_encode($matdesc); |
204 | 204 | } |
205 | 205 | $initResult["firstIv"] = base64_encode($iv); |
@@ -213,7 +213,7 @@ discard block |
||
213 | 213 | fwrite($file, $json); |
214 | 214 | fclose($file); |
215 | 215 | } |
216 | - public static function updateMultipartUploadContext($UploadId,$iv,$lastPart = FALSE){ |
|
216 | + public static function updateMultipartUploadContext($UploadId, $iv, $lastPart = FALSE) { |
|
217 | 217 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
218 | 218 | $content = EncryptionUtil::getMultipartUploadContext($UploadId); |
219 | 219 | $content["nextIv"] = base64_encode($iv); |
@@ -223,32 +223,32 @@ discard block |
||
223 | 223 | fwrite($file, $json); |
224 | 224 | fclose($file); |
225 | 225 | } |
226 | - public static function getMultipartUploadContext($UploadId){ |
|
226 | + public static function getMultipartUploadContext($UploadId) { |
|
227 | 227 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
228 | - if(!EncryptionUtil::multipartUploadContextExists($UploadId)) |
|
228 | + if (!EncryptionUtil::multipartUploadContextExists($UploadId)) |
|
229 | 229 | throw new Ks3ClientException("can not found multipart upload context in cache dir"); |
230 | 230 | $jsonString = file_get_contents($encryptionDir.$UploadId); |
231 | - $arry = json_decode($jsonString,TRUE); |
|
231 | + $arry = json_decode($jsonString, TRUE); |
|
232 | 232 | return $arry; |
233 | 233 | } |
234 | - public static function deleteMultipartUploadContext($UploadId){ |
|
234 | + public static function deleteMultipartUploadContext($UploadId) { |
|
235 | 235 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
236 | 236 | @unlink($encryptionDir.$UploadId); |
237 | 237 | } |
238 | - public static function multipartUploadContextExists($UploadId){ |
|
238 | + public static function multipartUploadContextExists($UploadId) { |
|
239 | 239 | $encryptionDir = KS3_API_PATH.DIRECTORY_SEPARATOR."cache".DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR; |
240 | 240 | return file_exists($encryptionDir.$UploadId); |
241 | 241 | } |
242 | - public static function openfile($path,$mode){ |
|
242 | + public static function openfile($path, $mode) { |
|
243 | 243 | $file = fopen($path, $mode); |
244 | - if($file) |
|
244 | + if ($file) |
|
245 | 245 | return $file; |
246 | 246 | else |
247 | 247 | throw new Ks3ClientException("open file ".$path." error"); |
248 | 248 | } |
249 | 249 | //matdesc为字符串或array数据类型。 |
250 | - public static function createInstructionFile($bucket,$key,$cek,$iv,$matdesc="{}"){ |
|
251 | - if(is_array($matdesc)){ |
|
250 | + public static function createInstructionFile($bucket, $key, $cek, $iv, $matdesc = "{}") { |
|
251 | + if (is_array($matdesc)) { |
|
252 | 252 | $matdesc = json_encode($matdesc); |
253 | 253 | } |
254 | 254 | $key = $key.EncryptionUtil::$INSTRUCTION_SUFFIX; |
@@ -269,9 +269,9 @@ discard block |
||
269 | 269 | ); |
270 | 270 | return $req; |
271 | 271 | } |
272 | - public static function isInstructionFile($s3Object){ |
|
272 | + public static function isInstructionFile($s3Object) { |
|
273 | 273 | $meta = $s3Object["Meta"]; |
274 | - if(isset($meta["UserMeta"]["x-kss-meta-x-kss-crypto-instr-file"])) |
|
274 | + if (isset($meta["UserMeta"]["x-kss-meta-x-kss-crypto-instr-file"])) |
|
275 | 275 | return TRUE; |
276 | 276 | return FALSE; |
277 | 277 | } |
@@ -2,47 +2,47 @@ discard block |
||
2 | 2 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionUtil.php"; |
3 | 3 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionCallBack.php"; |
4 | 4 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."exceptions".DIRECTORY_SEPARATOR."Exceptions.php"; |
5 | -interface EncryptionHandler{ |
|
6 | - public function putObjectByContentSecurely($args=array()); |
|
7 | - public function putObjectByFileSecurely($args=array()); |
|
8 | - public function getObjectSecurely($args=array()); |
|
9 | - public function initMultipartUploadSecurely($args=array()); |
|
10 | - public function uploadPartSecurely($args=array()); |
|
11 | - public function abortMultipartUploadSecurely($args=array()); |
|
12 | - public function completeMultipartUploadSecurely($args=array()); |
|
5 | +interface EncryptionHandler { |
|
6 | + public function putObjectByContentSecurely($args = array()); |
|
7 | + public function putObjectByFileSecurely($args = array()); |
|
8 | + public function getObjectSecurely($args = array()); |
|
9 | + public function initMultipartUploadSecurely($args = array()); |
|
10 | + public function uploadPartSecurely($args = array()); |
|
11 | + public function abortMultipartUploadSecurely($args = array()); |
|
12 | + public function completeMultipartUploadSecurely($args = array()); |
|
13 | 13 | } |
14 | -class EncryptionEO implements EncryptionHandler{ |
|
14 | +class EncryptionEO implements EncryptionHandler { |
|
15 | 15 | private $encryptionMaterials = NULL; |
16 | 16 | private $ks3client = NULL; |
17 | - public function __construct($ks3client,$encryptionMaterials){ |
|
17 | + public function __construct($ks3client, $encryptionMaterials) { |
|
18 | 18 | $this->encryptionMaterials = $encryptionMaterials; |
19 | 19 | $this->ks3client = $ks3client; |
20 | 20 | } |
21 | - public function putObjectByContentSecurely($args=array()){ |
|
21 | + public function putObjectByContentSecurely($args = array()) { |
|
22 | 22 | $sek = EncryptionUtil::genereateOnceUsedKey(); |
23 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
23 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials, $sek); |
|
24 | 24 | $content = $args["Content"]; |
25 | - if(empty($content)) |
|
25 | + if (empty($content)) |
|
26 | 26 | throw new Ks3ClientException("please specifie Content in request args"); |
27 | 27 | $metaContentLength = EncryptionUtil::metaTextLength($args); |
28 | 28 | $plainTextLength = strlen($content); |
29 | - if($metaContentLength > 0 && $metaContentLength < $plainTextLength){ |
|
29 | + if ($metaContentLength > 0 && $metaContentLength < $plainTextLength) { |
|
30 | 30 | $plainTextLength = $metaContentLength; |
31 | 31 | } |
32 | - if($plainTextLength > 0) |
|
32 | + if ($plainTextLength > 0) |
|
33 | 33 | $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
34 | 34 | else |
35 | 35 | throw new Ks3ClientException("unexpected content length ".$plainTextLength); |
36 | 36 | |
37 | - $content = substr($content, 0,$plainTextLength); |
|
37 | + $content = substr($content, 0, $plainTextLength); |
|
38 | 38 | |
39 | 39 | |
40 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
41 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
42 | - mcrypt_generic_init($td,$sek,$iv); |
|
40 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
41 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
42 | + mcrypt_generic_init($td, $sek, $iv); |
|
43 | 43 | //对content进行pkcs5填充 |
44 | - $content = EncryptionUtil::PKCS5Padding($content,mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC)); |
|
45 | - $encrypted = mcrypt_generic($td,$content); |
|
44 | + $content = EncryptionUtil::PKCS5Padding($content, mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC)); |
|
45 | + $encrypted = mcrypt_generic($td, $content); |
|
46 | 46 | mcrypt_generic_deinit($td); |
47 | 47 | |
48 | 48 | $args["ObjectMeta"]["Content-Length"] = strlen($encrypted); |
@@ -52,7 +52,7 @@ discard block |
||
52 | 52 | |
53 | 53 | //TODO |
54 | 54 | $matdesc = "{}"; |
55 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
55 | + if (ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata") { |
|
56 | 56 | $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
57 | 57 | $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
58 | 58 | $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
@@ -60,31 +60,31 @@ discard block |
||
60 | 60 | |
61 | 61 | $result = $this->ks3client->putObjectByContent($args); |
62 | 62 | |
63 | - if(ENCRYPTPTION_STORAGE_MODE == "InstructionFile"){ |
|
64 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
65 | - base64_encode($encryptedSek),base64_encode($iv),$matdesc); |
|
63 | + if (ENCRYPTPTION_STORAGE_MODE == "InstructionFile") { |
|
64 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"], $args["Key"], |
|
65 | + base64_encode($encryptedSek), base64_encode($iv), $matdesc); |
|
66 | 66 | $this->ks3client->putObjectByContent($req); |
67 | 67 | } |
68 | 68 | |
69 | 69 | return $result; |
70 | 70 | } |
71 | - public function putObjectByFileSecurely($args=array()){ |
|
71 | + public function putObjectByFileSecurely($args = array()) { |
|
72 | 72 | $sek = EncryptionUtil::genereateOnceUsedKey(); |
73 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
74 | - if(!isset($args["Content"])||!is_array($args["Content"]) |
|
73 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials, $sek); |
|
74 | + if (!isset($args["Content"]) || !is_array($args["Content"]) |
|
75 | 75 | ||!isset($args["Content"]["content"]) |
76 | 76 | ||empty($args["Content"]["content"])) |
77 | 77 | throw new Ks3ClientException("please specifie file content in request args"); |
78 | 78 | $content = $args["Content"]; |
79 | 79 | $plainTextLength = EncryptionUtil::plainTextLength($args); |
80 | - if($plainTextLength <= 0){ |
|
80 | + if ($plainTextLength <= 0) { |
|
81 | 81 | throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
82 | 82 | } |
83 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
84 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
83 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
84 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
85 | 85 | |
86 | 86 | $args = EncryptionUtil::updateContentMD5Header($args); |
87 | - $encryptedLength = EncryptionUtil::getPKCS5EncrypedLength($plainTextLength,mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC)); |
|
87 | + $encryptedLength = EncryptionUtil::getPKCS5EncrypedLength($plainTextLength, mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC)); |
|
88 | 88 | |
89 | 89 | $args["ObjectMeta"]["Content-Length"] = $encryptedLength; |
90 | 90 | $args["UserMeta"]["x-kss-meta-x-kss-unencrypted-content-length"] = $plainTextLength; |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | |
98 | 98 | //TODO |
99 | 99 | $matdesc = "{}"; |
100 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
100 | + if (ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata") { |
|
101 | 101 | $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
102 | 102 | $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
103 | 103 | $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
@@ -105,86 +105,86 @@ discard block |
||
105 | 105 | |
106 | 106 | $result = $this->ks3client->putObjectByFile($args); |
107 | 107 | |
108 | - if(ENCRYPTPTION_STORAGE_MODE == "InstructionFile"){ |
|
109 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
110 | - base64_encode($encryptedSek),base64_encode($iv),$matdesc); |
|
108 | + if (ENCRYPTPTION_STORAGE_MODE == "InstructionFile") { |
|
109 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"], $args["Key"], |
|
110 | + base64_encode($encryptedSek), base64_encode($iv), $matdesc); |
|
111 | 111 | $this->ks3client->putObjectByContent($req); |
112 | 112 | } |
113 | 113 | |
114 | 114 | return $result; |
115 | 115 | } |
116 | - public function getObjectSecurely($args=array()){ |
|
116 | + public function getObjectSecurely($args = array()) { |
|
117 | 117 | $meta = $this->ks3client->getObjectMeta($args); |
118 | - if(isset($meta["UserMeta"]["x-kss-meta-x-kss-key"])&&isset($meta["UserMeta"]["x-kss-meta-x-kss-iv"])){ |
|
118 | + if (isset($meta["UserMeta"]["x-kss-meta-x-kss-key"]) && isset($meta["UserMeta"]["x-kss-meta-x-kss-iv"])) { |
|
119 | 119 | $encryptedInMeta = TRUE; |
120 | - }else{ |
|
120 | + }else { |
|
121 | 121 | $encryptedInMeta = FALSE; |
122 | 122 | } |
123 | 123 | $encrypted = TRUE; |
124 | 124 | $encryptionInfo = array(); |
125 | - if($encryptedInMeta){ |
|
125 | + if ($encryptedInMeta) { |
|
126 | 126 | $encryptionInfo["iv"] = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-iv"]); |
127 | - $matdesc =$meta["UserMeta"]["x-kss-meta-x-kss-matdesc"]; |
|
127 | + $matdesc = $meta["UserMeta"]["x-kss-meta-x-kss-matdesc"]; |
|
128 | 128 | $encryptionInfo["matdesc"] = $matdesc; |
129 | 129 | $cekEncrypted = base64_decode($meta["UserMeta"]["x-kss-meta-x-kss-key"]); |
130 | - $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
|
131 | - }else{ |
|
132 | - if($this->ks3client->objectExists(array( |
|
130 | + $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials, $cekEncrypted); |
|
131 | + }else { |
|
132 | + if ($this->ks3client->objectExists(array( |
|
133 | 133 | "Bucket"=>$args["Bucket"], |
134 | 134 | "Key"=>$args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX) |
135 | 135 | ) |
136 | - ){ |
|
136 | + ) { |
|
137 | 137 | $insKey = $args["Key"].EncryptionUtil::$INSTRUCTION_SUFFIX; |
138 | 138 | $getIns = array( |
139 | 139 | "Bucket"=>$args["Bucket"], |
140 | 140 | "Key"=>$insKey, |
141 | 141 | ); |
142 | 142 | $s3Object = $this->ks3client->getObject($getIns); |
143 | - if(!EncryptionUtil::isInstructionFile($s3Object)) |
|
143 | + if (!EncryptionUtil::isInstructionFile($s3Object)) |
|
144 | 144 | throw new Ks3ClientException($insKey." is not an InstructionFile"); |
145 | 145 | |
146 | 146 | $content = $s3Object["Content"]; |
147 | - $content = json_decode($content,TRUE); |
|
147 | + $content = json_decode($content, TRUE); |
|
148 | 148 | $encryptionInfo["iv"] = base64_decode($content["x-kss-iv"]); |
149 | - $matdesc =$content["x-kss-matdesc"]; |
|
149 | + $matdesc = $content["x-kss-matdesc"]; |
|
150 | 150 | $encryptionInfo["matdesc"] = $matdesc; |
151 | 151 | $cekEncrypted = base64_decode($content["x-kss-key"]); |
152 | - $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials,$cekEncrypted); |
|
153 | - }else{ |
|
154 | - $encrypted =FALSE; |
|
152 | + $encryptionInfo["cek"] = $cek = EncryptionUtil::decodeCek($this->encryptionMaterials, $cekEncrypted); |
|
153 | + }else { |
|
154 | + $encrypted = FALSE; |
|
155 | 155 | } |
156 | 156 | } |
157 | 157 | //是否为下载到文件中 |
158 | - $isWriteToFile=FALSE; |
|
159 | - if($encrypted) |
|
158 | + $isWriteToFile = FALSE; |
|
159 | + if ($encrypted) |
|
160 | 160 | { |
161 | 161 | $iv = $encryptionInfo["iv"]; |
162 | 162 | $cek = $encryptionInfo["cek"]; |
163 | 163 | |
164 | - if(empty($iv)) |
|
164 | + if (empty($iv)) |
|
165 | 165 | throw new Ks3ClientException("can not find iv in UserMeta or InstructionFile"); |
166 | - if(empty($cek)) |
|
166 | + if (empty($cek)) |
|
167 | 167 | throw new Ks3ClientException("can not find cek in UserMeta or InstructionFile"); |
168 | 168 | |
169 | - if(isset($args["Range"])){ |
|
169 | + if (isset($args["Range"])) { |
|
170 | 170 | $range = $args["Range"]; |
171 | - if(!is_array($range)){ |
|
172 | - if(preg_match('/^bytes=[0-9]*-[0-9]*$/', $range)){ |
|
173 | - $ranges = explode("-",substr($range,strlen("bytes="))); |
|
171 | + if (!is_array($range)) { |
|
172 | + if (preg_match('/^bytes=[0-9]*-[0-9]*$/', $range)) { |
|
173 | + $ranges = explode("-", substr($range, strlen("bytes="))); |
|
174 | 174 | $a = $ranges[0]; |
175 | 175 | $b = $ranges[1]; |
176 | - if($a > $b){ |
|
176 | + if ($a > $b) { |
|
177 | 177 | throw new Ks3ClientException("Invalid range ".$range); |
178 | 178 | } |
179 | - $range = array("start"=>$a,"end"=>$b); |
|
180 | - }else{ |
|
179 | + $range = array("start"=>$a, "end"=>$b); |
|
180 | + }else { |
|
181 | 181 | throw new Ks3ClientException("Invalid range ".$range); |
182 | 182 | } |
183 | - }else{ |
|
184 | - if(!isset($range["start"])||!isset($range["end"])){ |
|
183 | + }else { |
|
184 | + if (!isset($range["start"]) || !isset($range["end"])) { |
|
185 | 185 | throw new Ks3ClientException("Invalid range ".serialize($range)); |
186 | 186 | } |
187 | - if($range["start"] > $range["end"]){ |
|
187 | + if ($range["start"] > $range["end"]) { |
|
188 | 188 | throw new Ks3ClientException("Invalid range ".serialize($range)); |
189 | 189 | } |
190 | 190 | } |
@@ -192,97 +192,97 @@ discard block |
||
192 | 192 | |
193 | 193 | $isWriteToFile = isset($args["WriteTo"]); |
194 | 194 | $contentLength = $meta["ObjectMeta"]["Content-Length"]; |
195 | - if($isWriteToFile){ |
|
195 | + if ($isWriteToFile) { |
|
196 | 196 | $writeCallBack = new AESCBCStreamWriteCallBack(); |
197 | - $writeCallBack->iv=$iv; |
|
198 | - $writeCallBack->cek=$cek; |
|
197 | + $writeCallBack->iv = $iv; |
|
198 | + $writeCallBack->cek = $cek; |
|
199 | 199 | $writeCallBack->contentLength = $contentLength; |
200 | - if(isset($range)){ |
|
201 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
202 | - $adjustedRange = EncryptionUtil::getAdjustedRange($range,$blocksize); |
|
200 | + if (isset($range)) { |
|
201 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); |
|
202 | + $adjustedRange = EncryptionUtil::getAdjustedRange($range, $blocksize); |
|
203 | 203 | $writeCallBack->expectedRange = $range; |
204 | 204 | $writeCallBack->adjustedRange = $adjustedRange; |
205 | - $args["Range"]=$adjustedRange; |
|
205 | + $args["Range"] = $adjustedRange; |
|
206 | 206 | } |
207 | 207 | $args["writeCallBack"] = $writeCallBack; |
208 | 208 | return $this->ks3client->getObject($args); |
209 | - }else{ |
|
209 | + }else { |
|
210 | 210 | $offset = 0; |
211 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
212 | - if(isset($range)){ |
|
213 | - $adjustedRange = EncryptionUtil::getAdjustedRange($range,$blocksize); |
|
214 | - $args["Range"]=$adjustedRange; |
|
211 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); |
|
212 | + if (isset($range)) { |
|
213 | + $adjustedRange = EncryptionUtil::getAdjustedRange($range, $blocksize); |
|
214 | + $args["Range"] = $adjustedRange; |
|
215 | 215 | } |
216 | 216 | $s3Object = $this->ks3client->getObject($args); |
217 | 217 | $content = $s3Object["Content"]; |
218 | 218 | |
219 | - if(isset($range)){ |
|
220 | - if($adjustedRange["start"] > 0){ |
|
221 | - $iv = substr($content,0,$blocksize); |
|
222 | - $content = substr($content,$blocksize); |
|
219 | + if (isset($range)) { |
|
220 | + if ($adjustedRange["start"] > 0) { |
|
221 | + $iv = substr($content, 0, $blocksize); |
|
222 | + $content = substr($content, $blocksize); |
|
223 | 223 | $offset = $blocksize+$adjustedRange["start"]; |
224 | 224 | } |
225 | 225 | } |
226 | - if(!empty($content)){ |
|
227 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
228 | - mcrypt_generic_init($td,$cek,$iv); |
|
229 | - $decoded = mdecrypt_generic($td,$content); |
|
226 | + if (!empty($content)) { |
|
227 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
228 | + mcrypt_generic_init($td, $cek, $iv); |
|
229 | + $decoded = mdecrypt_generic($td, $content); |
|
230 | 230 | mcrypt_generic_deinit($td); |
231 | 231 | mcrypt_module_close($td); |
232 | - }else{ |
|
232 | + }else { |
|
233 | 233 | $decoded = ""; |
234 | 234 | } |
235 | 235 | |
236 | 236 | //判断是否需要删除最后填充的字符,以及获取填充的字符 |
237 | 237 | $needRemovePad = FALSE; |
238 | 238 | $pad = NULL; |
239 | - if($offset+strlen($decoded) >=$contentLength){ |
|
239 | + if ($offset+strlen($decoded) >= $contentLength) { |
|
240 | 240 | $needRemovePad = TRUE; |
241 | - $pad = ord(substr($decoded,strlen($decoded)-1,1)); |
|
242 | - if($pad<=0||$pad>$blocksize) |
|
241 | + $pad = ord(substr($decoded, strlen($decoded)-1, 1)); |
|
242 | + if ($pad <= 0 || $pad > $blocksize) |
|
243 | 243 | { |
244 | 244 | //invalid pad |
245 | 245 | $needRemovePad = FALSE; |
246 | 246 | } |
247 | 247 | } |
248 | 248 | $endOffset = 0; |
249 | - if(isset($range)){ |
|
250 | - if($offset+strlen($decoded)>$range["end"]){ |
|
249 | + if (isset($range)) { |
|
250 | + if ($offset+strlen($decoded) > $range["end"]) { |
|
251 | 251 | $preLength = strlen($decoded); |
252 | - $decoded = substr($decoded, 0,$range["end"]-$offset+1); |
|
252 | + $decoded = substr($decoded, 0, $range["end"]-$offset+1); |
|
253 | 253 | $endOffset = $preLength-strlen($decoded); |
254 | 254 | } |
255 | - if($offset<$range["start"]){ |
|
256 | - $decoded = substr($decoded,$range["start"] - $offset); |
|
255 | + if ($offset < $range["start"]) { |
|
256 | + $decoded = substr($decoded, $range["start"]-$offset); |
|
257 | 257 | } |
258 | 258 | } |
259 | 259 | //再次根据截取的长度判断是否需要删除最后填充的字符 |
260 | - if($needRemovePad&&$endOffset > $pad){ |
|
260 | + if ($needRemovePad && $endOffset > $pad) { |
|
261 | 261 | $needRemovePad = FALSE; |
262 | 262 | } |
263 | - if($needRemovePad){ |
|
263 | + if ($needRemovePad) { |
|
264 | 264 | $padOffset = $pad-$endOffset; |
265 | 265 | $actualWriteCount = strlen($decoded)-$padOffset; |
266 | - if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
266 | + if ($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
267 | 267 | $decoded = ""; |
268 | 268 | else |
269 | - $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
269 | + $decoded = substr($decoded, 0, strlen($decoded)-$padOffset); |
|
270 | 270 | } |
271 | 271 | $s3Object["Content"] = $decoded; |
272 | 272 | return $s3Object; |
273 | 273 | } |
274 | - }else{ |
|
274 | + }else { |
|
275 | 275 | return $this->ks3client->getObject($args); |
276 | 276 | } |
277 | 277 | } |
278 | - public function initMultipartUploadSecurely($args=array()){ |
|
278 | + public function initMultipartUploadSecurely($args = array()) { |
|
279 | 279 | $sek = EncryptionUtil::genereateOnceUsedKey(); |
280 | - $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials,$sek); |
|
281 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
282 | - $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td),MCRYPT_RAND); |
|
280 | + $encryptedSek = EncryptionUtil::encodeCek($this->encryptionMaterials, $sek); |
|
281 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
282 | + $iv = mcrypt_create_iv(mcrypt_enc_get_iv_size($td), MCRYPT_RAND); |
|
283 | 283 | |
284 | 284 | $matdesc = "{}"; |
285 | - if(ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata"){ |
|
285 | + if (ENCRYPTPTION_STORAGE_MODE == "ObjectMetadata") { |
|
286 | 286 | $args["UserMeta"]["x-kss-meta-x-kss-key"] = base64_encode($encryptedSek); |
287 | 287 | $args["UserMeta"]["x-kss-meta-x-kss-iv"] = base64_encode($iv); |
288 | 288 | $args["UserMeta"]["x-kss-meta-x-kss-matdesc"] = $matdesc; |
@@ -290,33 +290,33 @@ discard block |
||
290 | 290 | |
291 | 291 | $initResult = $this->ks3client->initMultipartUpload($args); |
292 | 292 | |
293 | - EncryptionUtil::initMultipartUploadContext($initResult,$iv,$sek,$encryptedSek,$matdesc); |
|
293 | + EncryptionUtil::initMultipartUploadContext($initResult, $iv, $sek, $encryptedSek, $matdesc); |
|
294 | 294 | |
295 | 295 | return $initResult; |
296 | 296 | } |
297 | - public function uploadPartSecurely($args=array()){ |
|
297 | + public function uploadPartSecurely($args = array()) { |
|
298 | 298 | $uploadId = $args["Options"]["uploadId"]; |
299 | 299 | $isLastPart = FALSE; |
300 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
301 | - if(isset($args["LastPart"])) |
|
300 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); |
|
301 | + if (isset($args["LastPart"])) |
|
302 | 302 | $isLastPart = $args["LastPart"]; |
303 | 303 | $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
304 | - if(!$exists){ |
|
304 | + if (!$exists) { |
|
305 | 305 | throw new Ks3ClientException("no such upload in cache/encryption/"); |
306 | 306 | } |
307 | 307 | $context = EncryptionUtil::getMultipartUploadContext($uploadId); |
308 | - if($context["lastPart"]){ |
|
309 | - throw new Ks3ClientException("this upload with uploadId ".$uploadId," has been upload last part"); |
|
308 | + if ($context["lastPart"]) { |
|
309 | + throw new Ks3ClientException("this upload with uploadId ".$uploadId, " has been upload last part"); |
|
310 | 310 | } |
311 | 311 | $plainTextLength = EncryptionUtil::plainTextLength($args); |
312 | - if($plainTextLength <= 0){ |
|
312 | + if ($plainTextLength <= 0) { |
|
313 | 313 | throw new Ks3ClientException("get content length failed ,unexpected content length ".$plainTextLength); |
314 | 314 | } |
315 | - if(!$isLastPart){ |
|
316 | - if($plainTextLength % $blocksize != 0) |
|
315 | + if (!$isLastPart) { |
|
316 | + if ($plainTextLength%$blocksize != 0) |
|
317 | 317 | throw new Ks3ClientException("Invalid part size,part size (".$plainTextLength.") must be multiples of the block size ".$blocksize); |
318 | - }else{ |
|
319 | - $args["ObjectMeta"]["Content-Length"] = $plainTextLength + ($blocksize - $plainTextLength%$blocksize); |
|
318 | + }else { |
|
319 | + $args["ObjectMeta"]["Content-Length"] = $plainTextLength+($blocksize-$plainTextLength%$blocksize); |
|
320 | 320 | } |
321 | 321 | $readCallBack = new AESCBCStreamReadCallBack(); |
322 | 322 | $readCallBack->iv = base64_decode($context["nextIv"]); |
@@ -327,28 +327,28 @@ discard block |
||
327 | 327 | $args["readCallBack"] = $readCallBack; |
328 | 328 | |
329 | 329 | $upResult = $this->ks3client->uploadPart($args); |
330 | - EncryptionUtil::updateMultipartUploadContext($uploadId,$readCallBack->iv,$isLastPart); |
|
330 | + EncryptionUtil::updateMultipartUploadContext($uploadId, $readCallBack->iv, $isLastPart); |
|
331 | 331 | return $upResult; |
332 | 332 | } |
333 | - public function abortMultipartUploadSecurely($args=array()){ |
|
333 | + public function abortMultipartUploadSecurely($args = array()) { |
|
334 | 334 | $uploadId = $args["Options"]["uploadId"]; |
335 | 335 | EncryptionUtil::deleteMultipartUploadContext($uploadId); |
336 | 336 | return $this->ks3client->abortMultipartUpload($args); |
337 | 337 | } |
338 | - public function completeMultipartUploadSecurely($args=array()){ |
|
338 | + public function completeMultipartUploadSecurely($args = array()) { |
|
339 | 339 | $uploadId = $args["Options"]["uploadId"]; |
340 | 340 | $exists = EncryptionUtil::multipartUploadContextExists($uploadId); |
341 | - if(!$exists){ |
|
341 | + if (!$exists) { |
|
342 | 342 | throw new Ks3ClientException("no such upload in cache/encryption/"); |
343 | 343 | } |
344 | 344 | $context = EncryptionUtil::getMultipartUploadContext($uploadId); |
345 | - if(!$context["lastPart"]){ |
|
345 | + if (!$context["lastPart"]) { |
|
346 | 346 | throw new Ks3ClientException("Unable to complete an encrypted multipart upload without being told which part was the last. when upload part you can add item in args like args[\"LastPart\"]=TRUE"); |
347 | 347 | } |
348 | 348 | $result = $this->ks3client->completeMultipartUpload($args); |
349 | - if(ENCRYPTPTION_STORAGE_MODE=="InstructionFile"){ |
|
350 | - $req = EncryptionUtil::createInstructionFile($args["Bucket"],$args["Key"], |
|
351 | - $context["encryptedCek"],$context["firstIv"],$context["matdesc"]); |
|
349 | + if (ENCRYPTPTION_STORAGE_MODE == "InstructionFile") { |
|
350 | + $req = EncryptionUtil::createInstructionFile($args["Bucket"], $args["Key"], |
|
351 | + $context["encryptedCek"], $context["firstIv"], $context["matdesc"]); |
|
352 | 352 | $this->ks3client->putObjectByContent($req); |
353 | 353 | } |
354 | 354 | EncryptionUtil::deleteMultipartUploadContext($uploadId); |
@@ -1,7 +1,7 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | require_once KS3_API_PATH.DIRECTORY_SEPARATOR."encryption".DIRECTORY_SEPARATOR."EncryptionUtil.php"; |
3 | 3 | //下载 |
4 | -class AESCBCStreamWriteCallBack{ |
|
4 | +class AESCBCStreamWriteCallBack { |
|
5 | 5 | private $iv; |
6 | 6 | private $cek; |
7 | 7 | private $contentLength; |
@@ -11,13 +11,13 @@ discard block |
||
11 | 11 | private $adjustedRange; |
12 | 12 | //当前指针位置 |
13 | 13 | private $currentIndex; |
14 | - private $buffer;//上一次调用streaming_write_callback后,未解码的数据 |
|
14 | + private $buffer; //上一次调用streaming_write_callback后,未解码的数据 |
|
15 | 15 | private $firstWrite = TRUE; |
16 | - public function __set($property_name, $value){ |
|
17 | - $this->$property_name=$value; |
|
16 | + public function __set($property_name, $value) { |
|
17 | + $this->$property_name = $value; |
|
18 | 18 | } |
19 | - public function __get($property_name){ |
|
20 | - if(isset($this->$property_name)) |
|
19 | + public function __get($property_name) { |
|
20 | + if (isset($this->$property_name)) |
|
21 | 21 | { |
22 | 22 | return($this->$property_name); |
23 | 23 | }else |
@@ -26,59 +26,59 @@ discard block |
||
26 | 26 | } |
27 | 27 | } |
28 | 28 | //最后的数据大小肯定是blocksize的倍数,所以最后buffer中不会有未解密的内容。否则可以认为该文件是错误的 |
29 | - public function streaming_write_callback($curl_handle,$data,$write_stream){ |
|
29 | + public function streaming_write_callback($curl_handle, $data, $write_stream) { |
|
30 | 30 | $data = $this->buffer.$data; |
31 | 31 | |
32 | 32 | $length = strlen($data); |
33 | 33 | //不能把上次的没读完的长度算在这次里,应该算在上次 |
34 | 34 | $written_total = 0-strlen($this->buffer); |
35 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_CBC); |
|
36 | - if($length<$blocksize) |
|
35 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC); |
|
36 | + if ($length < $blocksize) |
|
37 | 37 | $this->buffer = $data; |
38 | - else{ |
|
38 | + else { |
|
39 | 39 | //如果期望的范围之后还有数据,则认为数据已经接收完毕。不做任何处理 |
40 | - if($this->expectedRange["end"] < $this->expectedRange["start"]){ |
|
40 | + if ($this->expectedRange["end"] < $this->expectedRange["start"]) { |
|
41 | 41 | return $written_total+strlen($data); |
42 | 42 | } |
43 | - $this->buffer = substr($data,$length - $length%$blocksize); |
|
44 | - $data = substr($data,0,$length - $length%$blocksize); |
|
43 | + $this->buffer = substr($data, $length-$length%$blocksize); |
|
44 | + $data = substr($data, 0, $length-$length%$blocksize); |
|
45 | 45 | |
46 | 46 | $ivoffset = 0; |
47 | 47 | //range get时,如果不是从刚开始,则应该取加密后数据的前16个字节作为之后解密的iv |
48 | - if($this->firstWrite){ |
|
48 | + if ($this->firstWrite) { |
|
49 | 49 | $this->firstWrite = FALSE; |
50 | - if(!$this->isBegin()){ |
|
51 | - $this->iv = substr($data,0,$blocksize); |
|
52 | - $data = substr($data,$blocksize); |
|
50 | + if (!$this->isBegin()) { |
|
51 | + $this->iv = substr($data, 0, $blocksize); |
|
52 | + $data = substr($data, $blocksize); |
|
53 | 53 | $ivoffset = $blocksize; |
54 | 54 | } |
55 | 55 | //初始化当前位置 |
56 | - if(isset($this->adjustedRange)) |
|
56 | + if (isset($this->adjustedRange)) |
|
57 | 57 | $this->currentIndex = $ivoffset+$this->adjustedRange["start"]; |
58 | 58 | else |
59 | 59 | $this->currentIndex = $ivoffset; |
60 | 60 | } |
61 | - $written_total+=$ivoffset; |
|
62 | - if(strlen($data) == 0){ |
|
61 | + $written_total += $ivoffset; |
|
62 | + if (strlen($data) == 0) { |
|
63 | 63 | $decoded = ""; |
64 | 64 | return $written_total; |
65 | - }else{ |
|
66 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
67 | - mcrypt_generic_init($td,$this->cek,$this->iv); |
|
68 | - $decoded = mdecrypt_generic($td,$data); |
|
65 | + }else { |
|
66 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
67 | + mcrypt_generic_init($td, $this->cek, $this->iv); |
|
68 | + $decoded = mdecrypt_generic($td, $data); |
|
69 | 69 | mcrypt_generic_deinit($td); |
70 | 70 | mcrypt_module_close($td); |
71 | 71 | } |
72 | 72 | |
73 | - $this->iv = substr($data,strlen($data)-$blocksize); |
|
73 | + $this->iv = substr($data, strlen($data)-$blocksize); |
|
74 | 74 | //判断是否需要删除最后填充的字符,以及获取填充的字符 |
75 | 75 | $needRemovePad = FALSE; |
76 | 76 | $pad = NULL; |
77 | 77 | |
78 | - if($this->currentIndex+strlen($decoded) >=$this->contentLength){ |
|
78 | + if ($this->currentIndex+strlen($decoded) >= $this->contentLength) { |
|
79 | 79 | $needRemovePad = TRUE; |
80 | - $pad = ord(substr($decoded,strlen($decoded)-1,1)); |
|
81 | - if($pad<=0||$pad>$blocksize) |
|
80 | + $pad = ord(substr($decoded, strlen($decoded)-1, 1)); |
|
81 | + if ($pad <= 0 || $pad > $blocksize) |
|
82 | 82 | { |
83 | 83 | //invalid pad |
84 | 84 | $needRemovePad = FALSE; |
@@ -88,21 +88,21 @@ discard block |
||
88 | 88 | //将解密后的数据截取到期望的长度 |
89 | 89 | $startOffset = 0; |
90 | 90 | $endOffset = 0; |
91 | - if(isset($this->expectedRange)){ |
|
91 | + if (isset($this->expectedRange)) { |
|
92 | 92 | $trueEnd = $expectedEnd = $this->expectedRange["end"]; |
93 | 93 | |
94 | - if($this->currentIndex+strlen($decoded)>$expectedEnd){ |
|
94 | + if ($this->currentIndex+strlen($decoded) > $expectedEnd) { |
|
95 | 95 | $preLength = strlen($decoded); |
96 | - $decoded = substr($decoded, 0,$expectedEnd-$this->currentIndex+1); |
|
96 | + $decoded = substr($decoded, 0, $expectedEnd-$this->currentIndex+1); |
|
97 | 97 | $endOffset = $preLength-strlen($decoded); |
98 | - }else{ |
|
98 | + }else { |
|
99 | 99 | //因为range是开始结束都计算的,range=1-2。currentIndex=1,长度是2,end=currentIndex+2-1 |
100 | 100 | $trueEnd = $this->currentIndex+strlen($decoded)-1; |
101 | 101 | } |
102 | 102 | $expectedStart = $this->expectedRange["start"]; |
103 | - if($this->currentIndex<$expectedStart){ |
|
104 | - $decoded = substr($decoded,$expectedStart - $this->currentIndex); |
|
105 | - $startOffset = $expectedStart - $this->currentIndex; |
|
103 | + if ($this->currentIndex < $expectedStart) { |
|
104 | + $decoded = substr($decoded, $expectedStart-$this->currentIndex); |
|
105 | + $startOffset = $expectedStart-$this->currentIndex; |
|
106 | 106 | } |
107 | 107 | //调整下次期望的开始 |
108 | 108 | $this->expectedRange["start"] = $trueEnd+1; |
@@ -110,56 +110,56 @@ discard block |
||
110 | 110 | |
111 | 111 | $padOffset = 0; |
112 | 112 | //再次根据截取的长度判断是否需要删除最后填充的字符 |
113 | - if($needRemovePad&&$endOffset > $pad){ |
|
113 | + if ($needRemovePad && $endOffset > $pad) { |
|
114 | 114 | $needRemovePad = FALSE; |
115 | 115 | } |
116 | 116 | $actualWriteCount = 0; |
117 | - if($needRemovePad){ |
|
117 | + if ($needRemovePad) { |
|
118 | 118 | $padOffset = $pad-$endOffset; |
119 | 119 | $actualWriteCount = strlen($decoded)-$padOffset; |
120 | - if($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
120 | + if ($actualWriteCount <= 0)//负数的情况就是用户期望的range里全是填充的 |
|
121 | 121 | $decoded = ""; |
122 | 122 | else |
123 | - $decoded = substr($decoded,0,strlen($decoded)-$padOffset); |
|
123 | + $decoded = substr($decoded, 0, strlen($decoded)-$padOffset); |
|
124 | 124 | } |
125 | 125 | $count = fwrite($write_stream, $decoded); |
126 | - if($count == 0) |
|
126 | + if ($count == 0) |
|
127 | 127 | $count = $actualWriteCount; |
128 | 128 | $count += $padOffset; |
129 | 129 | $count += $startOffset; |
130 | 130 | $count += $endOffset; |
131 | 131 | $this->currentIndex += $count; |
132 | - $written_total+=$count; |
|
132 | + $written_total += $count; |
|
133 | 133 | } |
134 | 134 | //否则curl框架会报错 |
135 | - $written_total+=strlen($this->buffer); |
|
135 | + $written_total += strlen($this->buffer); |
|
136 | 136 | return $written_total; |
137 | 137 | } |
138 | 138 | //是的话则使用初始化IV |
139 | - private function isBegin(){ |
|
139 | + private function isBegin() { |
|
140 | 140 | $beginIndex = 0; |
141 | - if(isset($this->adjustedRange["start"])) |
|
141 | + if (isset($this->adjustedRange["start"])) |
|
142 | 142 | $beginIndex = $this->adjustedRange["start"]; |
143 | - if($beginIndex == 0) |
|
143 | + if ($beginIndex == 0) |
|
144 | 144 | return TRUE; |
145 | 145 | else |
146 | 146 | return FALSE; |
147 | 147 | } |
148 | 148 | } |
149 | 149 | //上传 |
150 | -class AESCBCStreamReadCallBack{ |
|
150 | +class AESCBCStreamReadCallBack { |
|
151 | 151 | private $iv; |
152 | 152 | private $cek; |
153 | 153 | private $contentLength; |
154 | 154 | private $buffer; |
155 | 155 | private $hasread = 0; |
156 | - private $mutipartUpload =FALSE; |
|
156 | + private $mutipartUpload = FALSE; |
|
157 | 157 | private $isLastPart = FALSE; |
158 | - public function __set($property_name, $value){ |
|
159 | - $this->$property_name=$value; |
|
158 | + public function __set($property_name, $value) { |
|
159 | + $this->$property_name = $value; |
|
160 | 160 | } |
161 | - public function __get($property_name){ |
|
162 | - if(isset($this->$property_name)) |
|
161 | + public function __get($property_name) { |
|
162 | + if (isset($this->$property_name)) |
|
163 | 163 | { |
164 | 164 | return($this->$property_name); |
165 | 165 | }else |
@@ -167,7 +167,7 @@ discard block |
||
167 | 167 | return(NULL); |
168 | 168 | } |
169 | 169 | } |
170 | - public function streaming_read_callback($curl_handle,$file_handle,$length,$read_stream,$seek_position){ |
|
170 | + public function streaming_read_callback($curl_handle, $file_handle, $length, $read_stream, $seek_position) { |
|
171 | 171 | // Once we've sent as much as we're supposed to send... |
172 | 172 | if ($this->hasread >= $this->contentLength) |
173 | 173 | { |
@@ -175,7 +175,7 @@ discard block |
||
175 | 175 | return ''; |
176 | 176 | } |
177 | 177 | // If we're at the beginning of an upload and need to seek... |
178 | - if ($this->hasread == 0 && $seek_position>0 && $seek_position !== ftell($read_stream)) |
|
178 | + if ($this->hasread == 0 && $seek_position > 0 && $seek_position !== ftell($read_stream)) |
|
179 | 179 | { |
180 | 180 | if (fseek($read_stream, $seek_position) !== 0) |
181 | 181 | { |
@@ -184,38 +184,38 @@ discard block |
||
184 | 184 | } |
185 | 185 | |
186 | 186 | |
187 | - $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128,MCRYPT_MODE_ECB); |
|
188 | - $needRead = min($this->contentLength - $this->hasread,$length); |
|
189 | - $read = fread($read_stream,$needRead); |
|
187 | + $blocksize = mcrypt_get_block_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_ECB); |
|
188 | + $needRead = min($this->contentLength-$this->hasread, $length); |
|
189 | + $read = fread($read_stream, $needRead); |
|
190 | 190 | $this->hasread += strlen($read); |
191 | 191 | $isLast = FALSE; |
192 | - if($this->hasread >= $this->contentLength){ |
|
192 | + if ($this->hasread >= $this->contentLength) { |
|
193 | 193 | $isLast = TRUE; |
194 | 194 | } |
195 | 195 | $data = $this->buffer.$read; |
196 | 196 | |
197 | 197 | $dataLength = strlen($data); |
198 | 198 | |
199 | - if(!$isLast){ |
|
200 | - $this->buffer = substr($data,$dataLength-$dataLength%$blocksize); |
|
201 | - $data = substr($data, 0,$dataLength-$dataLength%$blocksize); |
|
202 | - }else{ |
|
199 | + if (!$isLast) { |
|
200 | + $this->buffer = substr($data, $dataLength-$dataLength%$blocksize); |
|
201 | + $data = substr($data, 0, $dataLength-$dataLength%$blocksize); |
|
202 | + }else { |
|
203 | 203 | //分块上传除最后一块外肯定是blocksize大小的倍数,所以不需要填充。 |
204 | - if($this->mutipartUpload){ |
|
205 | - if($this->isLastPart){ |
|
204 | + if ($this->mutipartUpload) { |
|
205 | + if ($this->isLastPart) { |
|
206 | 206 | $this->buffer = NULL; |
207 | - $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
|
208 | - }else{ |
|
207 | + $data = EncryptionUtil::PKCS5Padding($data, $blocksize); |
|
208 | + }else { |
|
209 | 209 | //donothing |
210 | 210 | } |
211 | - }else{ |
|
211 | + }else { |
|
212 | 212 | $this->buffer = NULL; |
213 | - $data = EncryptionUtil::PKCS5Padding($data,$blocksize); |
|
213 | + $data = EncryptionUtil::PKCS5Padding($data, $blocksize); |
|
214 | 214 | } |
215 | 215 | } |
216 | - $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128,'',MCRYPT_MODE_CBC,''); |
|
217 | - mcrypt_generic_init($td,$this->cek,$this->iv); |
|
218 | - $encrypted = mcrypt_generic($td,$data); |
|
216 | + $td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_CBC, ''); |
|
217 | + mcrypt_generic_init($td, $this->cek, $this->iv); |
|
218 | + $encrypted = mcrypt_generic($td, $data); |
|
219 | 219 | mcrypt_generic_deinit($td); |
220 | 220 | //去除自动填充的16个字节//php的当恰好为16的倍数时竟然不填充? |
221 | 221 | //$encrypted = substr($encrypted,0,strlen($encrypted)-$blocksize); |