use Friendica\App;
use Friendica\Core\Config;
+use Friendica\Core\System;
use Friendica\Database\DBM;
-use Friendica\Object\Contact;
+use Friendica\Model\Contact;
use Friendica\Protocol\DFRN;
require_once 'include/items.php';
);
if (! DBM::is_result($r)) {
logger('dfrn_notify: could not match challenge to dfrn_id ' . $dfrn_id . ' challenge=' . $challenge);
- xml_status(3, 'Could not match challenge');
+ System::xmlExit(3, 'Could not match challenge');
}
$r = q("DELETE FROM `challenge` WHERE `dfrn-id` = '%s' AND `challenge` = '%s'",
$sql_extra = sprintf(" AND `dfrn-id` = '%s' AND `duplex` = 1 ", dbesc($dfrn_id));
break;
default:
- xml_status(3, 'Invalid direction');
+ System::xmlExit(3, 'Invalid direction');
break; // NOTREACHED
}
if (! DBM::is_result($r)) {
logger('dfrn_notify: contact not found for dfrn_id ' . $dfrn_id);
- xml_status(3, 'Contact not found');
+ System::xmlExit(3, 'Contact not found');
//NOTREACHED
}
// if contact's ssl policy changed, update our links
- fix_contact_ssl_policy($importer,$ssl_policy);
+ $importer = Contact::updateSslPolicy($importer, $ssl_policy);
logger('dfrn_notify: received notify from ' . $importer['name'] . ' for ' . $importer['username']);
logger('dfrn_notify: data: ' . $data, LOGGER_DATA);
// Relationship is dissolved permanently
Contact::remove($importer['id']);
logger('relationship dissolved : ' . $importer['name'] . ' dissolved ' . $importer['username']);
- xml_status(0, 'relationship dissolved');
+ System::xmlExit(0, 'relationship dissolved');
}
$rino = Config::get('system', 'rino_encrypt');
// if local rino is lower than remote rino, abort: should not happen!
// but only for $remote_rino > 1, because old code did't send rino version
- if ($rino_remote_version > 1 && $rino < $rino_remote) {
+ if ($rino_remote > 1 && $rino < $rino_remote) {
logger("rino version '$rino_remote' is lower than supported '$rino'");
- xml_status(0, "rino version '$rino_remote' is lower than supported '$rino'");
+ System::xmlExit(0, "rino version '$rino_remote' is lower than supported '$rino'");
}
$rawkey = hex2bin(trim($key));
}
}
- #logger('rino: received key : ' . $final_key);
-
switch($rino_remote) {
case 0:
case 1:
- /*
- *we got a key. old code send only the key, without RINO version.
- * we assume RINO 1 if key and no RINO version
- */
+ // we got a key. old code send only the key, without RINO version.
+ // we assume RINO 1 if key and no RINO version
$data = DFRN::aesDecrypt(hex2bin($data), $final_key);
break;
- case 2:
- try {
- $data = \Crypto::decrypt(hex2bin($data), $final_key);
- } catch (\InvalidCiphertextException $ex) { // VERY IMPORTANT
- /*
- * Either:
- * 1. The ciphertext was modified by the attacker,
- * 2. The key is wrong, or
- * 3. $ciphertext is not a valid ciphertext or was corrupted.
- * Assume the worst.
- */
- logger('The ciphertext has been tampered with!');
- xml_status(0, 'The ciphertext has been tampered with!');
- } catch (\CryptoTestFailedException $ex) {
- logger('Cannot safely perform dencryption');
- xml_status(0, 'CryptoTestFailed');
- } catch (\CannotPerformOperationException $ex) {
- logger('Cannot safely perform decryption');
- xml_status(0, 'Cannot safely perform decryption');
- }
- break;
default:
logger("rino: invalid sent version '$rino_remote'");
- xml_status(0, "Invalid sent version '$rino_remote'");
+ System::xmlExit(0, "Invalid sent version '$rino_remote'");
}
-
logger('rino: decrypted data: ' . $data, LOGGER_DATA);
}
$ret = DFRN::import($data, $importer);
- xml_status($ret, 'Processed');
+ System::xmlExit($ret, 'Processed');
// NOTREACHED
}