@@ -45,37 +45,37 @@ |
||
| 45 | 45 | |
| 46 | 46 | case 'server.index.load.custom': |
| 47 | 47 | switch ($data['name']) { |
| 48 | - case 'files_get_recipients': |
|
| 49 | - RecipientHandler::doGetRecipients(); |
|
| 50 | - break; |
|
| 48 | + case 'files_get_recipients': |
|
| 49 | + RecipientHandler::doGetRecipients(); |
|
| 50 | + break; |
|
| 51 | 51 | |
| 52 | - case 'download_file': |
|
| 53 | - DownloadHandler::doDownload(); |
|
| 54 | - break; |
|
| 52 | + case 'download_file': |
|
| 53 | + DownloadHandler::doDownload(); |
|
| 54 | + break; |
|
| 55 | 55 | |
| 56 | - case 'upload_file': |
|
| 57 | - UploadHandler::doUpload(); |
|
| 58 | - break; |
|
| 56 | + case 'upload_file': |
|
| 57 | + UploadHandler::doUpload(); |
|
| 58 | + break; |
|
| 59 | 59 | |
| 60 | - case 'form': |
|
| 61 | - if (isset($_GET['backend'])) { |
|
| 62 | - $backend = urldecode($_GET["backend"]); |
|
| 63 | - } |
|
| 64 | - else { |
|
| 65 | - $backend = ''; |
|
| 66 | - } |
|
| 67 | - $backendstore = Files\Backend\BackendStore::getInstance(); |
|
| 60 | + case 'form': |
|
| 61 | + if (isset($_GET['backend'])) { |
|
| 62 | + $backend = urldecode($_GET["backend"]); |
|
| 63 | + } |
|
| 64 | + else { |
|
| 65 | + $backend = ''; |
|
| 66 | + } |
|
| 67 | + $backendstore = Files\Backend\BackendStore::getInstance(); |
|
| 68 | 68 | |
| 69 | - if ($backendstore->backendExists($backend)) { |
|
| 70 | - $backendInstance = $backendstore->getInstanceOfBackend($backend); |
|
| 71 | - $formdata = $backendInstance->getFormConfig(); |
|
| 69 | + if ($backendstore->backendExists($backend)) { |
|
| 70 | + $backendInstance = $backendstore->getInstanceOfBackend($backend); |
|
| 71 | + $formdata = $backendInstance->getFormConfig(); |
|
| 72 | 72 | |
| 73 | - exit($formdata); |
|
| 74 | - } |
|
| 73 | + exit($formdata); |
|
| 74 | + } |
|
| 75 | 75 | |
| 76 | - exit("Specified backend does not exist!"); |
|
| 76 | + exit("Specified backend does not exist!"); |
|
| 77 | 77 | |
| 78 | - break; |
|
| 78 | + break; |
|
| 79 | 79 | } |
| 80 | 80 | break; |
| 81 | 81 | } |
@@ -15,31 +15,31 @@ |
||
| 15 | 15 | $tag = $this->peek(); |
| 16 | 16 | |
| 17 | 17 | switch ($tag) { |
| 18 | - case 0: |
|
| 19 | - $res['otherName'] = $this->oid(-6); |
|
| 20 | - break; |
|
| 21 | - |
|
| 22 | - case 1: |
|
| 23 | - $res['rfc822Name'] = $this->next(-22); |
|
| 24 | - break; |
|
| 25 | - |
|
| 26 | - case 2: |
|
| 27 | - $res['dNSName'] = $this->next(-22); |
|
| 28 | - break; |
|
| 29 | - |
|
| 30 | - case 4: |
|
| 31 | - $this->next(4); |
|
| 32 | - $res['directoryName'] = $this->name(); |
|
| 33 | - $res['directoryName_'] = $this->nameasstring($res['directoryName']); |
|
| 34 | - break; |
|
| 35 | - |
|
| 36 | - case 6: |
|
| 37 | - $res['uniformResourceIdentifier'] = $this->next(-22); |
|
| 38 | - break; |
|
| 39 | - |
|
| 40 | - default: |
|
| 41 | - throw new \Exception("Unsupported GeneralName: {$tag}"); |
|
| 42 | -# trigger_error("Unsupported GeneralName: $tag", E_USER_ERROR); |
|
| 18 | + case 0: |
|
| 19 | + $res['otherName'] = $this->oid(-6); |
|
| 20 | + break; |
|
| 21 | + |
|
| 22 | + case 1: |
|
| 23 | + $res['rfc822Name'] = $this->next(-22); |
|
| 24 | + break; |
|
| 25 | + |
|
| 26 | + case 2: |
|
| 27 | + $res['dNSName'] = $this->next(-22); |
|
| 28 | + break; |
|
| 29 | + |
|
| 30 | + case 4: |
|
| 31 | + $this->next(4); |
|
| 32 | + $res['directoryName'] = $this->name(); |
|
| 33 | + $res['directoryName_'] = $this->nameasstring($res['directoryName']); |
|
| 34 | + break; |
|
| 35 | + |
|
| 36 | + case 6: |
|
| 37 | + $res['uniformResourceIdentifier'] = $this->next(-22); |
|
| 38 | + break; |
|
| 39 | + |
|
| 40 | + default: |
|
| 41 | + throw new \Exception("Unsupported GeneralName: {$tag}"); |
|
| 42 | + # trigger_error("Unsupported GeneralName: $tag", E_USER_ERROR); |
|
| 43 | 43 | } |
| 44 | 44 | |
| 45 | 45 | return $res; |
@@ -29,62 +29,62 @@ |
||
| 29 | 29 | if (!isset($actionType)) |
| 30 | 30 | continue; |
| 31 | 31 | switch ($actionType) { |
| 32 | - case 'certificate': |
|
| 33 | - $data = $this->verifyCertificate($actionData); |
|
| 34 | - $response = [ |
|
| 35 | - 'type' => 3, |
|
| 36 | - 'status' => $data['status'], |
|
| 37 | - 'message' => $data['message'], |
|
| 38 | - 'data' => $data['data'], |
|
| 39 | - ]; |
|
| 40 | - $this->addActionData('certificate', $response); |
|
| 41 | - $GLOBALS['bus']->addData($this->getResponseData()); |
|
| 42 | - break; |
|
| 32 | + case 'certificate': |
|
| 33 | + $data = $this->verifyCertificate($actionData); |
|
| 34 | + $response = [ |
|
| 35 | + 'type' => 3, |
|
| 36 | + 'status' => $data['status'], |
|
| 37 | + 'message' => $data['message'], |
|
| 38 | + 'data' => $data['data'], |
|
| 39 | + ]; |
|
| 40 | + $this->addActionData('certificate', $response); |
|
| 41 | + $GLOBALS['bus']->addData($this->getResponseData()); |
|
| 42 | + break; |
|
| 43 | 43 | |
| 44 | - case 'passphrase': |
|
| 45 | - $data = $this->verifyPassphrase($actionData); |
|
| 46 | - $response = [ |
|
| 47 | - 'type' => 3, |
|
| 48 | - 'status' => $data['status'], |
|
| 49 | - ]; |
|
| 50 | - $this->addActionData('passphrase', $response); |
|
| 51 | - $GLOBALS['bus']->addData($this->getResponseData()); |
|
| 52 | - break; |
|
| 44 | + case 'passphrase': |
|
| 45 | + $data = $this->verifyPassphrase($actionData); |
|
| 46 | + $response = [ |
|
| 47 | + 'type' => 3, |
|
| 48 | + 'status' => $data['status'], |
|
| 49 | + ]; |
|
| 50 | + $this->addActionData('passphrase', $response); |
|
| 51 | + $GLOBALS['bus']->addData($this->getResponseData()); |
|
| 52 | + break; |
|
| 53 | 53 | |
| 54 | - case 'changepassphrase': |
|
| 55 | - $data = $this->changePassphrase($actionData); |
|
| 56 | - if ($data === CHANGE_PASSPHRASE_SUCCESS) { |
|
| 57 | - // Reset cached passphrase. |
|
| 58 | - $encryptionStore = EncryptionStore::getInstance(); |
|
| 59 | - withPHPSession(function () use ($encryptionStore) { |
|
| 60 | - $encryptionStore->add('smime', ''); |
|
| 61 | - }); |
|
| 62 | - } |
|
| 63 | - $response = [ |
|
| 64 | - 'type' => 3, |
|
| 65 | - 'code' => $data, |
|
| 66 | - ]; |
|
| 67 | - $this->addActionData('changepassphrase', $response); |
|
| 68 | - $GLOBALS['bus']->addData($this->getResponseData()); |
|
| 69 | - break; |
|
| 54 | + case 'changepassphrase': |
|
| 55 | + $data = $this->changePassphrase($actionData); |
|
| 56 | + if ($data === CHANGE_PASSPHRASE_SUCCESS) { |
|
| 57 | + // Reset cached passphrase. |
|
| 58 | + $encryptionStore = EncryptionStore::getInstance(); |
|
| 59 | + withPHPSession(function () use ($encryptionStore) { |
|
| 60 | + $encryptionStore->add('smime', ''); |
|
| 61 | + }); |
|
| 62 | + } |
|
| 63 | + $response = [ |
|
| 64 | + 'type' => 3, |
|
| 65 | + 'code' => $data, |
|
| 66 | + ]; |
|
| 67 | + $this->addActionData('changepassphrase', $response); |
|
| 68 | + $GLOBALS['bus']->addData($this->getResponseData()); |
|
| 69 | + break; |
|
| 70 | 70 | |
| 71 | - case 'list': |
|
| 72 | - $data = $this->getPublicCertificates(); |
|
| 73 | - $this->addActionData('list', $data); |
|
| 74 | - $GLOBALS['bus']->addData($this->getResponseData()); |
|
| 75 | - break; |
|
| 71 | + case 'list': |
|
| 72 | + $data = $this->getPublicCertificates(); |
|
| 73 | + $this->addActionData('list', $data); |
|
| 74 | + $GLOBALS['bus']->addData($this->getResponseData()); |
|
| 75 | + break; |
|
| 76 | 76 | |
| 77 | - case 'delete': |
|
| 78 | - // FIXME: handle multiple deletes? Separate function? |
|
| 79 | - $entryid = $actionData['entryid']; |
|
| 80 | - $root = mapi_msgstore_openentry($this->store, null); |
|
| 81 | - mapi_folder_deletemessages($root, [hex2bin($entryid)]); |
|
| 77 | + case 'delete': |
|
| 78 | + // FIXME: handle multiple deletes? Separate function? |
|
| 79 | + $entryid = $actionData['entryid']; |
|
| 80 | + $root = mapi_msgstore_openentry($this->store, null); |
|
| 81 | + mapi_folder_deletemessages($root, [hex2bin($entryid)]); |
|
| 82 | 82 | |
| 83 | - $this->sendFeedback(true); |
|
| 84 | - break; |
|
| 83 | + $this->sendFeedback(true); |
|
| 84 | + break; |
|
| 85 | 85 | |
| 86 | - default: |
|
| 87 | - $this->handleUnknownActionType($actionType); |
|
| 86 | + default: |
|
| 87 | + $this->handleUnknownActionType($actionType); |
|
| 88 | 88 | } |
| 89 | 89 | } |
| 90 | 90 | catch (Exception $e) { |
@@ -92,45 +92,45 @@ discard block |
||
| 92 | 92 | public function execute($eventID, &$data) { |
| 93 | 93 | switch ($eventID) { |
| 94 | 94 | // Register plugin |
| 95 | - case 'server.core.settings.init.before': |
|
| 96 | - $this->onBeforeSettingsInit($data); |
|
| 97 | - break; |
|
| 98 | - // Verify a signed or encrypted message when an email is opened |
|
| 99 | - case 'server.util.parse_smime.signed': |
|
| 100 | - $this->onSignedMessage($data); |
|
| 101 | - break; |
|
| 102 | - |
|
| 103 | - case 'server.util.parse_smime.encrypted': |
|
| 104 | - $this->onEncrypted($data); |
|
| 105 | - break; |
|
| 106 | - // Add S/MIME property, which is send to the client |
|
| 107 | - case 'server.module.itemmodule.open.after': |
|
| 108 | - $this->onAfterOpen($data); |
|
| 109 | - break; |
|
| 110 | - // Catch uploaded certificate |
|
| 111 | - case 'server.upload_attachment.upload': |
|
| 112 | - $this->onUploadCertificate($data); |
|
| 113 | - break; |
|
| 114 | - // Sign email before sending |
|
| 115 | - case 'server.core.operations.submitmessage': |
|
| 116 | - $this->onBeforeSend($data); |
|
| 117 | - break; |
|
| 118 | - // Verify that we have public certificates for all recipients |
|
| 119 | - case 'server.module.createmailitemmodule.beforesend': |
|
| 120 | - $this->onCertificateCheck($data); |
|
| 121 | - break; |
|
| 122 | - |
|
| 123 | - case 'server.index.load.custom': |
|
| 124 | - if ($data['name'] === 'smime_passphrase') { |
|
| 125 | - include 'templates/passphrase.tpl.php'; |
|
| 126 | - exit(); |
|
| 127 | - } |
|
| 128 | - if ($data['name'] === 'smime_passphrasecheck') { |
|
| 129 | - // No need to do anything, this is just used to trigger |
|
| 130 | - // the browser's autofill save password dialog. |
|
| 131 | - exit(); |
|
| 132 | - } |
|
| 133 | - break; |
|
| 95 | + case 'server.core.settings.init.before': |
|
| 96 | + $this->onBeforeSettingsInit($data); |
|
| 97 | + break; |
|
| 98 | + // Verify a signed or encrypted message when an email is opened |
|
| 99 | + case 'server.util.parse_smime.signed': |
|
| 100 | + $this->onSignedMessage($data); |
|
| 101 | + break; |
|
| 102 | + |
|
| 103 | + case 'server.util.parse_smime.encrypted': |
|
| 104 | + $this->onEncrypted($data); |
|
| 105 | + break; |
|
| 106 | + // Add S/MIME property, which is send to the client |
|
| 107 | + case 'server.module.itemmodule.open.after': |
|
| 108 | + $this->onAfterOpen($data); |
|
| 109 | + break; |
|
| 110 | + // Catch uploaded certificate |
|
| 111 | + case 'server.upload_attachment.upload': |
|
| 112 | + $this->onUploadCertificate($data); |
|
| 113 | + break; |
|
| 114 | + // Sign email before sending |
|
| 115 | + case 'server.core.operations.submitmessage': |
|
| 116 | + $this->onBeforeSend($data); |
|
| 117 | + break; |
|
| 118 | + // Verify that we have public certificates for all recipients |
|
| 119 | + case 'server.module.createmailitemmodule.beforesend': |
|
| 120 | + $this->onCertificateCheck($data); |
|
| 121 | + break; |
|
| 122 | + |
|
| 123 | + case 'server.index.load.custom': |
|
| 124 | + if ($data['name'] === 'smime_passphrase') { |
|
| 125 | + include 'templates/passphrase.tpl.php'; |
|
| 126 | + exit(); |
|
| 127 | + } |
|
| 128 | + if ($data['name'] === 'smime_passphrasecheck') { |
|
| 129 | + // No need to do anything, this is just used to trigger |
|
| 130 | + // the browser's autofill save password dialog. |
|
| 131 | + exit(); |
|
| 132 | + } |
|
| 133 | + break; |
|
| 134 | 134 | } |
| 135 | 135 | } |
| 136 | 136 | |
@@ -663,23 +663,23 @@ discard block |
||
| 663 | 663 | |
| 664 | 664 | // Sign then Encrypt email |
| 665 | 665 | switch ($messageClass) { |
| 666 | - case 'IPM.Note.deferSMIME.SignedEncrypt': |
|
| 667 | - case 'IPM.Note.SMIME.SignedEncrypt': |
|
| 668 | - $tmpFile = tempnam(sys_get_temp_dir(), true); |
|
| 669 | - $this->sign($tmpSendEmail, $tmpFile, $message, $signedAttach, $smimeProps); |
|
| 670 | - $this->encrypt($tmpFile, $tmpSendSmimeEmail, $message, $signedAttach, $smimeProps); |
|
| 671 | - unlink($tmpFile); |
|
| 672 | - break; |
|
| 673 | - |
|
| 674 | - case 'IPM.Note.deferSMIME.MultipartSigned': |
|
| 675 | - case 'IPM.Note.SMIME.MultipartSigned': |
|
| 676 | - $this->sign($tmpSendEmail, $tmpSendSmimeEmail, $message, $signedAttach, $smimeProps); |
|
| 677 | - break; |
|
| 678 | - |
|
| 679 | - case 'IPM.Note.deferSMIME': |
|
| 680 | - case 'IPM.Note.SMIME': |
|
| 681 | - $this->encrypt($tmpSendEmail, $tmpSendSmimeEmail, $message, $signedAttach, $smimeProps); |
|
| 682 | - break; |
|
| 666 | + case 'IPM.Note.deferSMIME.SignedEncrypt': |
|
| 667 | + case 'IPM.Note.SMIME.SignedEncrypt': |
|
| 668 | + $tmpFile = tempnam(sys_get_temp_dir(), true); |
|
| 669 | + $this->sign($tmpSendEmail, $tmpFile, $message, $signedAttach, $smimeProps); |
|
| 670 | + $this->encrypt($tmpFile, $tmpSendSmimeEmail, $message, $signedAttach, $smimeProps); |
|
| 671 | + unlink($tmpFile); |
|
| 672 | + break; |
|
| 673 | + |
|
| 674 | + case 'IPM.Note.deferSMIME.MultipartSigned': |
|
| 675 | + case 'IPM.Note.SMIME.MultipartSigned': |
|
| 676 | + $this->sign($tmpSendEmail, $tmpSendSmimeEmail, $message, $signedAttach, $smimeProps); |
|
| 677 | + break; |
|
| 678 | + |
|
| 679 | + case 'IPM.Note.deferSMIME': |
|
| 680 | + case 'IPM.Note.SMIME': |
|
| 681 | + $this->encrypt($tmpSendEmail, $tmpSendSmimeEmail, $message, $signedAttach, $smimeProps); |
|
| 682 | + break; |
|
| 683 | 683 | } |
| 684 | 684 | |
| 685 | 685 | // Save the signed message as attachment of the send email |
@@ -33,14 +33,14 @@ |
||
| 33 | 33 | } |
| 34 | 34 | |
| 35 | 35 | switch ($this->status) { |
| 36 | - case 'good': |
|
| 37 | - return OCSP_CERT_STATUS_GOOD; |
|
| 36 | + case 'good': |
|
| 37 | + return OCSP_CERT_STATUS_GOOD; |
|
| 38 | 38 | |
| 39 | - case 'revoked': |
|
| 40 | - return OCSP_CERT_STATUS_REVOKED; |
|
| 39 | + case 'revoked': |
|
| 40 | + return OCSP_CERT_STATUS_REVOKED; |
|
| 41 | 41 | |
| 42 | - default: |
|
| 43 | - return OCSP_CERT_STATUS_UNKOWN; |
|
| 42 | + default: |
|
| 43 | + return OCSP_CERT_STATUS_UNKOWN; |
|
| 44 | 44 | } |
| 45 | 45 | } |
| 46 | 46 | } |