2012-12-11 19:10:56 +04:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* ownCloud
|
|
|
|
*
|
|
|
|
* @author Sam Tuke
|
|
|
|
* @copyright 2012 Sam Tuke samtuke@owncloud.com
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\Encryption;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Class for handling encryption related session data
|
|
|
|
*/
|
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
class Session {
|
2013-04-09 21:11:38 +04:00
|
|
|
|
|
|
|
private $view;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-09-06 14:27:40 +04:00
|
|
|
const NOT_INITIALIZED = '0';
|
|
|
|
const INIT_EXECUTED = '1';
|
|
|
|
const INIT_SUCCESSFUL = '2';
|
|
|
|
|
|
|
|
|
2013-02-13 20:57:45 +04:00
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* if session is started, check if ownCloud key pair is set up, if not create it
|
2014-05-12 18:30:39 +04:00
|
|
|
* @param \OC\Files\View $view
|
2013-05-20 03:24:36 +04:00
|
|
|
*
|
|
|
|
* @note The ownCloud key pair is used to allow public link sharing even if encryption is enabled
|
2013-02-13 20:57:45 +04:00
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function __construct($view) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-04-09 21:11:38 +04:00
|
|
|
$this->view = $view;
|
2013-04-10 18:46:02 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!$this->view->is_dir('owncloud_private_key')) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$this->view->mkdir('owncloud_private_key');
|
2013-04-10 18:46:02 +04:00
|
|
|
|
2013-02-13 20:57:45 +04:00
|
|
|
}
|
2013-05-13 17:15:35 +04:00
|
|
|
|
2014-02-13 19:28:49 +04:00
|
|
|
$appConfig = \OC::$server->getAppConfig();
|
|
|
|
|
|
|
|
$publicShareKeyId = $appConfig->getValue('files_encryption', 'publicShareKeyId');
|
2013-05-13 17:15:35 +04:00
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if ($publicShareKeyId === null) {
|
|
|
|
$publicShareKeyId = 'pubShare_' . substr(md5(time()), 0, 8);
|
2014-02-13 19:28:49 +04:00
|
|
|
$appConfig->setValue('files_encryption', 'publicShareKeyId', $publicShareKeyId);
|
2013-05-13 17:15:35 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
|
|
|
if (
|
2013-05-27 19:26:58 +04:00
|
|
|
!$this->view->file_exists("/public-keys/" . $publicShareKeyId . ".public.key")
|
|
|
|
|| !$this->view->file_exists("/owncloud_private_key/" . $publicShareKeyId . ".private.key")
|
2013-04-09 21:11:38 +04:00
|
|
|
) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
|
|
|
$keypair = Crypt::createKeypair();
|
|
|
|
|
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
|
|
|
// Save public key
|
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
if (!$view->is_dir('/public-keys')) {
|
|
|
|
$view->mkdir('/public-keys');
|
2013-05-20 03:24:36 +04:00
|
|
|
}
|
|
|
|
|
2013-05-27 19:26:58 +04:00
|
|
|
$this->view->file_put_contents('/public-keys/' . $publicShareKeyId . '.public.key', $keypair['publicKey']);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-24 01:56:31 +04:00
|
|
|
// Encrypt private key empty passphrase
|
2013-05-27 19:26:58 +04:00
|
|
|
$encryptedPrivateKey = Crypt::symmetricEncryptFileContent($keypair['privateKey'], '');
|
2013-05-20 03:24:36 +04:00
|
|
|
|
|
|
|
// Save private key
|
2013-05-27 19:26:58 +04:00
|
|
|
$this->view->file_put_contents(
|
|
|
|
'/owncloud_private_key/' . $publicShareKeyId . '.private.key', $encryptedPrivateKey);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-13 23:24:59 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-02-13 20:57:45 +04:00
|
|
|
}
|
2013-05-13 23:24:59 +04:00
|
|
|
|
2013-05-28 11:27:04 +04:00
|
|
|
if (\OCA\Encryption\Helper::isPublicAccess()) {
|
2013-05-20 03:24:36 +04:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-05-13 23:24:59 +04:00
|
|
|
|
2013-06-03 20:42:13 +04:00
|
|
|
$encryptedKey = $this->view->file_get_contents(
|
|
|
|
'/owncloud_private_key/' . $publicShareKeyId . '.private.key');
|
2013-06-03 16:19:31 +04:00
|
|
|
$privateKey = Crypt::decryptPrivateKey($encryptedKey, '');
|
2013-06-03 20:42:13 +04:00
|
|
|
$this->setPublicSharePrivateKey($privateKey);
|
2013-05-13 23:24:59 +04:00
|
|
|
|
2014-05-20 19:54:14 +04:00
|
|
|
$this->setInitialized(\OCA\Encryption\Session::INIT_SUCCESSFUL);
|
|
|
|
|
2013-05-20 03:24:36 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
}
|
2013-02-13 20:57:45 +04:00
|
|
|
}
|
2012-12-11 19:10:56 +04:00
|
|
|
|
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* Sets user private key to session
|
2013-05-20 00:31:00 +04:00
|
|
|
* @param string $privateKey
|
2012-12-11 19:10:56 +04:00
|
|
|
* @return bool
|
2013-05-28 11:27:04 +04:00
|
|
|
*
|
|
|
|
* @note this should only be set on login
|
2012-12-11 19:10:56 +04:00
|
|
|
*/
|
2013-05-27 19:26:58 +04:00
|
|
|
public function setPrivateKey($privateKey) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-28 03:31:26 +04:00
|
|
|
\OC::$session->set('privateKey', $privateKey);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-12-11 19:10:56 +04:00
|
|
|
return true;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2012-12-11 19:10:56 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2014-08-07 17:26:09 +04:00
|
|
|
/**
|
|
|
|
* remove keys from session
|
|
|
|
*/
|
|
|
|
public function removeKeys() {
|
|
|
|
\OC::$session->remove('publicSharePrivateKey');
|
|
|
|
\OC::$session->remove('privateKey');
|
|
|
|
}
|
|
|
|
|
2013-09-02 13:26:11 +04:00
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* Sets status of encryption app
|
2014-05-16 00:47:28 +04:00
|
|
|
* @param string $init INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
|
2013-09-02 13:26:11 +04:00
|
|
|
* @return bool
|
2013-09-06 14:27:40 +04:00
|
|
|
*
|
2013-09-02 13:34:28 +04:00
|
|
|
* @note this doesn not indicate of the init was successful, we just remeber the try!
|
2013-09-02 13:26:11 +04:00
|
|
|
*/
|
|
|
|
public function setInitialized($init) {
|
|
|
|
|
|
|
|
\OC::$session->set('encryptionInitialized', $init);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2014-02-26 20:18:38 +04:00
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* remove encryption keys and init status from session
|
2014-02-26 20:18:38 +04:00
|
|
|
*/
|
|
|
|
public function closeSession() {
|
|
|
|
\OC::$session->remove('encryptionInitialized');
|
|
|
|
\OC::$session->remove('privateKey');
|
|
|
|
}
|
|
|
|
|
2013-09-02 13:26:11 +04:00
|
|
|
|
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* Gets status if we already tried to initialize the encryption app
|
2014-05-13 15:29:25 +04:00
|
|
|
* @return string init status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
|
2013-09-02 13:26:11 +04:00
|
|
|
*
|
2013-09-02 13:34:28 +04:00
|
|
|
* @note this doesn not indicate of the init was successful, we just remeber the try!
|
2013-09-02 13:26:11 +04:00
|
|
|
*/
|
|
|
|
public function getInitialized() {
|
|
|
|
if (!is_null(\OC::$session->get('encryptionInitialized'))) {
|
|
|
|
return \OC::$session->get('encryptionInitialized');
|
|
|
|
} else {
|
2013-09-06 14:27:40 +04:00
|
|
|
return self::NOT_INITIALIZED;
|
2013-09-02 13:26:11 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-11 19:10:56 +04:00
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* Gets user or public share private key from session
|
2014-05-13 14:36:01 +04:00
|
|
|
* @return string $privateKey The user's plaintext private key
|
2012-12-11 19:10:56 +04:00
|
|
|
*
|
|
|
|
*/
|
2013-05-24 01:56:31 +04:00
|
|
|
public function getPrivateKey() {
|
2013-05-28 11:27:04 +04:00
|
|
|
// return the public share private key if this is a public access
|
|
|
|
if (\OCA\Encryption\Helper::isPublicAccess()) {
|
|
|
|
return $this->getPublicSharePrivateKey();
|
|
|
|
} else {
|
2013-06-03 20:42:13 +04:00
|
|
|
if (!is_null(\OC::$session->get('privateKey'))) {
|
2013-05-28 16:55:42 +04:00
|
|
|
return \OC::$session->get('privateKey');
|
2013-05-28 11:27:04 +04:00
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-28 11:27:04 +04:00
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* Sets public user private key to session
|
2013-05-28 11:27:04 +04:00
|
|
|
* @param string $privateKey
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function setPublicSharePrivateKey($privateKey) {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-06-03 20:42:13 +04:00
|
|
|
\OC::$session->set('publicSharePrivateKey', $privateKey);
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-28 11:27:04 +04:00
|
|
|
return true;
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-28 11:27:04 +04:00
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-28 11:27:04 +04:00
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* Gets public share private key from session
|
2014-05-13 14:36:01 +04:00
|
|
|
* @return string $privateKey
|
2013-05-28 11:27:04 +04:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
public function getPublicSharePrivateKey() {
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-06-03 20:42:13 +04:00
|
|
|
if (!is_null(\OC::$session->get('publicSharePrivateKey'))) {
|
2013-05-28 19:06:37 +04:00
|
|
|
return \OC::$session->get('publicSharePrivateKey');
|
2013-05-28 11:27:04 +04:00
|
|
|
} else {
|
|
|
|
return false;
|
2012-12-11 19:10:56 +04:00
|
|
|
}
|
|
|
|
}
|
2013-05-20 03:24:36 +04:00
|
|
|
|
2013-05-28 03:04:09 +04:00
|
|
|
}
|