// if local rino is lower than remote rino, abort: should not happen!
// but only for $remote_rino > 1, because old code did't send rino version
- if ($rino_remote_version > 1 && $rino < $rino_remote) {
+ if ($rino_remote > 1 && $rino < $rino_remote) {
logger("rino version '$rino_remote' is lower than supported '$rino'");
xml_status(0, "rino version '$rino_remote' is lower than supported '$rino'");
}
}
}
- #logger('rino: received key : ' . $final_key);
-
switch($rino_remote) {
case 0:
case 1:
- /*
- * we got a key. old code send only the key, without RINO version.
- * we assume RINO 1 if key and no RINO version
- */
+ // we got a key. old code send only the key, without RINO version.
+ // we assume RINO 1 if key and no RINO version
$data = DFRN::aesDecrypt(hex2bin($data), $final_key);
break;
default:
use Friendica\Model\User;
use Friendica\Object\Image;
use Friendica\Protocol\OStatus;
-use Friendica\Util\Crypto as FriendicaCrypto;
+use Friendica\Util\Crypto;
use Friendica\Util\XML;
use dba;
/* get site pubkey. this could be a new installation with no site keys*/
$pubkey = Config::get('system', 'site_pubkey');
if (! $pubkey) {
- $res = FriendicaCrypto::newKeypair(2048);
+ $res = Crypto::newKeypair(2048);
Config::set('system', 'site_prvkey', $res['prvkey']);
Config::set('system', 'site_pubkey', $res['pubkey']);
}
switch ($rino_remote_version) {
case 1:
case 2:
+ // Force downgrade in case the remote server is still using the deprecated version 2
$rino = 1;
$rino_remote_version = 1;
- // Deprecated rino version!
+
$key = openssl_random_pseudo_bytes(16);
$data = self::aesEncrypt($postvars['data'], $key);
break;