* @return true / false\r
*/\r
public static function isLegacyEncryptedContent( $data, $relPath ) {\r
- \r
-// trigger_error("REL PATH = ".var_export($relPath, 1));\r
- \r
-// trigger_error( "DATA = ".var_export($data, 1). " CATFILE?: ".var_export( self::isCatfile( $data ), 1));\r
\r
// Fetch all file metadata from DB\r
$metadata = \OC\Files\Filesystem::getFileInfo( $relPath, '' );\r
\r
- trigger_error("PATH = ". var_export($relPath, 1)." METADATA = ".var_export($metadata['encrypted'], 1));\r
- \r
// If a file is flagged with encryption in DB, but isn't a \r
// valid content + IV combination, it's probably using the \r
// legacy encryption system\r
$data = $this->view->file_get_contents( $filePath );
-// trigger_error("HAKE \n".var_export($this->view->file_get_contents( $filePath ), 1)." \nfilepath = ".var_export($filePath, 1 ));
-
// If the file is encrypted
// NOTE: If the userId is
// empty or not set, file will
if ( $found = $this->findFiles( $dirPath ) ) {
-// trigger_error("FOUND = ".print_r($found, 1));
-
// Disable proxy to prevent file being encrypted twice
\OC_FileProxy::$enabled = false;
// Fetch data from file
$legacyData = $this->view->file_get_contents( $legacyFile['path'] );
- trigger_error("\n\nlegdata = ".var_export($legacyData, 1).' \n\npassphrase = '.var_export($legacyPassphrase, 1).' \n\npublickey = '.var_export($publicKey, 1).' \n\nnewpass = '.var_export($newPassphrase, 1));
-
// Recrypt data, generate catfile
$recrypted = Crypt::legacyKeyRecryptKeyfile( $legacyData, $legacyPassphrase, $publicKey, $newPassphrase );