2015-02-24 21:05:19 +03:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @author Clark Tomlinson <clark@owncloud.com>
|
|
|
|
* @since 2/19/15, 1:20 PM
|
|
|
|
* @copyright Copyright (c) 2015, ownCloud, Inc.
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\Encryption;
|
|
|
|
|
|
|
|
|
2015-03-25 00:29:10 +03:00
|
|
|
use OC\Encryption\Exceptions\DecryptionFailedException;
|
2015-02-24 21:05:19 +03:00
|
|
|
use OC\Encryption\Exceptions\PrivateKeyMissingException;
|
|
|
|
use OC\Encryption\Exceptions\PublicKeyMissingException;
|
|
|
|
use OCA\Encryption\Crypto\Crypt;
|
2015-03-25 00:29:10 +03:00
|
|
|
use OCP\Encryption\Keys\IStorage;
|
|
|
|
use OCP\ICache;
|
|
|
|
use OCP\ICacheFactory;
|
2015-02-24 21:05:19 +03:00
|
|
|
use OCP\IConfig;
|
2015-03-25 00:29:10 +03:00
|
|
|
use OCP\ILogger;
|
2015-02-24 21:05:19 +03:00
|
|
|
use OCP\IUserSession;
|
2015-03-26 16:13:39 +03:00
|
|
|
use \OCP\ISession;
|
2015-02-24 21:05:19 +03:00
|
|
|
|
|
|
|
class KeyManager {
|
|
|
|
|
|
|
|
/**
|
2015-03-27 03:35:36 +03:00
|
|
|
* @var ISession
|
2015-03-25 00:29:10 +03:00
|
|
|
*/
|
2015-03-27 03:35:36 +03:00
|
|
|
public static $session;
|
2015-03-25 00:29:10 +03:00
|
|
|
/**
|
|
|
|
* @var IStorage
|
2015-02-24 21:05:19 +03:00
|
|
|
*/
|
|
|
|
private $keyStorage;
|
|
|
|
/**
|
|
|
|
* @var Crypt
|
|
|
|
*/
|
|
|
|
private $crypt;
|
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private $recoveryKeyId;
|
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
|
|
|
private $publicShareKeyId;
|
|
|
|
/**
|
|
|
|
* @var string UserID
|
|
|
|
*/
|
|
|
|
private $keyId;
|
2015-03-25 00:29:10 +03:00
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
2015-03-26 14:23:36 +03:00
|
|
|
private $publicKeyId = 'publicKey';
|
2015-03-25 00:29:10 +03:00
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
2015-03-26 14:23:36 +03:00
|
|
|
private $privateKeyId = 'privateKey';
|
2015-02-24 21:05:19 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
2015-03-26 14:23:36 +03:00
|
|
|
private $shareKeyId = 'shareKey';
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-02-24 21:05:19 +03:00
|
|
|
/**
|
|
|
|
* @var string
|
|
|
|
*/
|
2015-03-26 14:23:36 +03:00
|
|
|
private $fileKeyId = 'fileKey';
|
2015-02-24 21:05:19 +03:00
|
|
|
/**
|
|
|
|
* @var IConfig
|
|
|
|
*/
|
|
|
|
private $config;
|
2015-03-25 00:29:10 +03:00
|
|
|
/**
|
|
|
|
* @var ILogger
|
|
|
|
*/
|
|
|
|
private $log;
|
2015-02-24 21:05:19 +03:00
|
|
|
|
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param IStorage $keyStorage
|
2015-02-24 21:05:19 +03:00
|
|
|
* @param Crypt $crypt
|
|
|
|
* @param IConfig $config
|
2015-03-27 03:35:36 +03:00
|
|
|
* @param IUserSession $userSession
|
2015-03-26 16:13:39 +03:00
|
|
|
* @param \OCP\ISession $session
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param ILogger $log
|
2015-02-24 21:05:19 +03:00
|
|
|
*/
|
2015-03-27 20:10:32 +03:00
|
|
|
public function __construct(
|
|
|
|
IStorage $keyStorage,
|
|
|
|
Crypt $crypt,
|
|
|
|
IConfig $config,
|
|
|
|
IUserSession $userSession,
|
|
|
|
ISession $session,
|
|
|
|
ILogger $log) {
|
2015-02-24 21:05:19 +03:00
|
|
|
|
2015-03-27 03:35:36 +03:00
|
|
|
self::$session = $session;
|
2015-02-24 21:05:19 +03:00
|
|
|
$this->keyStorage = $keyStorage;
|
|
|
|
$this->crypt = $crypt;
|
|
|
|
$this->config = $config;
|
2015-03-25 00:29:10 +03:00
|
|
|
$this->recoveryKeyId = $this->config->getAppValue('encryption',
|
|
|
|
'recoveryKeyId');
|
|
|
|
$this->publicShareKeyId = $this->config->getAppValue('encryption',
|
|
|
|
'publicShareKeyId');
|
2015-03-30 10:59:28 +03:00
|
|
|
$this->log = $log;
|
2015-03-27 20:10:32 +03:00
|
|
|
|
|
|
|
if (empty($this->publicShareKeyId)) {
|
|
|
|
$this->publicShareKeyId = 'pubShare_' . substr(md5(time()), 0, 8);
|
|
|
|
$this->config->setAppValue('encryption', 'publicShareKeyId', $this->publicShareKeyId);
|
|
|
|
|
2015-03-30 10:59:28 +03:00
|
|
|
$keyPair = $this->crypt->createKeyPair();
|
2015-03-27 20:10:32 +03:00
|
|
|
|
|
|
|
// Save public key
|
|
|
|
$this->keyStorage->setSystemUserKey(
|
|
|
|
$this->publicShareKeyId . '.publicKey',
|
2015-03-30 10:59:28 +03:00
|
|
|
$keyPair['publicKey']);
|
2015-03-27 20:10:32 +03:00
|
|
|
|
|
|
|
// Encrypt private key empty passphrase
|
2015-03-30 10:59:28 +03:00
|
|
|
$encryptedKey = $this->crypt->symmetricEncryptFileContent($keyPair['privateKey'], '');
|
2015-03-27 20:10:32 +03:00
|
|
|
if ($encryptedKey) {
|
|
|
|
$this->keyStorage->setSystemUserKey($this->publicShareKeyId . '.privateKey', $encryptedKey);
|
|
|
|
} else {
|
|
|
|
$this->log->error('Could not create public share keys');
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-02-24 21:05:19 +03:00
|
|
|
$this->keyId = $userSession && $userSession->isLoggedIn() ? $userSession->getUser()->getUID() : false;
|
2015-03-25 00:29:10 +03:00
|
|
|
$this->log = $log;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function recoveryKeyExists() {
|
2015-03-28 13:02:26 +03:00
|
|
|
return (!empty($this->keyStorage->getSystemUserKey($this->recoveryKeyId)));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get recovery key
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getRecoveryKey() {
|
|
|
|
return $this->keyStorage->getSystemUserKey($this->recoveryKeyId . '.publicKey');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get recovery key ID
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getRecoveryKeyId() {
|
|
|
|
return $this->recoveryKeyId;
|
2015-03-25 00:29:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param $password
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function checkRecoveryPassword($password) {
|
|
|
|
$recoveryKey = $this->keyStorage->getSystemUserKey($this->recoveryKeyId);
|
|
|
|
$decryptedRecoveryKey = $this->crypt->decryptPrivateKey($recoveryKey,
|
|
|
|
$password);
|
|
|
|
|
|
|
|
if ($decryptedRecoveryKey) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $uid
|
|
|
|
* @param string $password
|
|
|
|
* @param string $keyPair
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function storeKeyPair($uid, $password, $keyPair) {
|
|
|
|
// Save Public Key
|
|
|
|
$this->setPublicKey($uid, $keyPair['publicKey']);
|
|
|
|
|
|
|
|
$encryptedKey = $this->crypt->symmetricEncryptFileContent($keyPair['privateKey'],
|
|
|
|
$password);
|
|
|
|
|
|
|
|
if ($encryptedKey) {
|
|
|
|
$this->setPrivateKey($uid, $encryptedKey);
|
|
|
|
$this->config->setAppValue('encryption', 'recoveryAdminEnabled', 1);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param $userId
|
|
|
|
* @param $key
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function setPublicKey($userId, $key) {
|
|
|
|
return $this->keyStorage->setUserKey($userId, $this->publicKeyId, $key);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param $userId
|
|
|
|
* @param $key
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function setPrivateKey($userId, $key) {
|
|
|
|
return $this->keyStorage->setUserKey($userId,
|
|
|
|
$this->privateKeyId,
|
|
|
|
$key);
|
|
|
|
}
|
|
|
|
|
2015-03-26 15:37:14 +03:00
|
|
|
/**
|
|
|
|
* write file key to key storage
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param string $key
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function setFileKey($path, $key) {
|
|
|
|
return $this->keyStorage->setFileKey($path, $this->fileKeyId, $key);
|
|
|
|
}
|
|
|
|
|
2015-03-27 13:43:02 +03:00
|
|
|
/**
|
|
|
|
* set all file keys (the file key and the corresponding share keys)
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param array $keys
|
|
|
|
*/
|
|
|
|
public function setAllFileKeys($path, $keys) {
|
|
|
|
$this->setFileKey($path, $keys['data']);
|
|
|
|
foreach ($keys['keys'] as $uid => $keyFile) {
|
|
|
|
$this->setShareKey($path, $uid, $keyFile);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-26 15:37:14 +03:00
|
|
|
/**
|
|
|
|
* write share key to the key storage
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param string $uid
|
|
|
|
* @param string $key
|
|
|
|
* @return boolean
|
|
|
|
*/
|
|
|
|
public function setShareKey($path, $uid, $key) {
|
|
|
|
$keyId = $uid . '.' . $this->shareKeyId;
|
|
|
|
return $this->keyStorage->setFileKey($path, $keyId, $key);
|
|
|
|
}
|
|
|
|
|
2015-03-25 00:29:10 +03:00
|
|
|
/**
|
|
|
|
* Decrypt private key and store it
|
|
|
|
*
|
|
|
|
* @param string $uid userid
|
|
|
|
* @param string $passPhrase users password
|
2015-03-27 03:35:36 +03:00
|
|
|
* @return ISession
|
2015-03-25 00:29:10 +03:00
|
|
|
*/
|
|
|
|
public function init($uid, $passPhrase) {
|
|
|
|
try {
|
|
|
|
$privateKey = $this->getPrivateKey($uid);
|
|
|
|
$privateKey = $this->crypt->decryptPrivateKey($privateKey,
|
|
|
|
$passPhrase);
|
|
|
|
} catch (PrivateKeyMissingException $e) {
|
|
|
|
return false;
|
|
|
|
} catch (DecryptionFailedException $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-03-26 16:13:39 +03:00
|
|
|
|
2015-03-27 03:35:36 +03:00
|
|
|
self::$session->set('privateKey', $privateKey);
|
|
|
|
self::$session->set('initStatus', true);
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-27 03:35:36 +03:00
|
|
|
return self::$session;
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param $userId
|
|
|
|
* @return mixed
|
|
|
|
* @throws PrivateKeyMissingException
|
|
|
|
*/
|
|
|
|
public function getPrivateKey($userId) {
|
2015-03-25 00:29:10 +03:00
|
|
|
$privateKey = $this->keyStorage->getUserKey($userId,
|
|
|
|
$this->privateKeyId);
|
2015-02-24 21:05:19 +03:00
|
|
|
|
|
|
|
if (strlen($privateKey) !== 0) {
|
|
|
|
return $privateKey;
|
|
|
|
}
|
|
|
|
throw new PrivateKeyMissingException();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param $path
|
2015-03-26 16:13:39 +03:00
|
|
|
* @param $uid
|
|
|
|
* @return string
|
2015-02-24 21:05:19 +03:00
|
|
|
*/
|
2015-03-26 16:13:39 +03:00
|
|
|
public function getFileKey($path, $uid) {
|
|
|
|
$key = '';
|
2015-03-27 03:35:36 +03:00
|
|
|
$encryptedFileKey = $this->keyStorage->getFileKey($path,
|
|
|
|
$this->fileKeyId);
|
2015-03-26 16:13:39 +03:00
|
|
|
$shareKey = $this->getShareKey($path, $uid);
|
2015-03-27 20:10:32 +03:00
|
|
|
$privateKey = self::$session->get('privateKey');
|
2015-03-26 16:13:39 +03:00
|
|
|
|
|
|
|
if ($encryptedFileKey && $shareKey && $privateKey) {
|
2015-03-27 03:35:36 +03:00
|
|
|
$key = $this->crypt->multiKeyDecrypt($encryptedFileKey,
|
|
|
|
$shareKey,
|
|
|
|
$privateKey);
|
2015-03-26 16:13:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return $key;
|
2015-03-25 00:29:10 +03:00
|
|
|
}
|
2015-02-24 21:05:19 +03:00
|
|
|
|
2015-03-25 00:29:10 +03:00
|
|
|
/**
|
|
|
|
* @param $path
|
2015-03-26 16:13:39 +03:00
|
|
|
* @param $uid
|
2015-03-25 00:29:10 +03:00
|
|
|
* @return mixed
|
|
|
|
*/
|
2015-03-26 16:13:39 +03:00
|
|
|
public function getShareKey($path, $uid) {
|
|
|
|
$keyId = $uid . '.' . $this->shareKeyId;
|
|
|
|
return $this->keyStorage->getFileKey($path, $keyId);
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* Change a user's encryption passphrase
|
|
|
|
*
|
|
|
|
* @param array $params keys: uid, password
|
|
|
|
* @param IUserSession $user
|
|
|
|
* @param Util $util
|
2015-02-24 21:05:19 +03:00
|
|
|
* @return bool
|
|
|
|
*/
|
2015-03-25 00:29:10 +03:00
|
|
|
public function setPassphrase($params, IUserSession $user, Util $util) {
|
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// Get existing decrypted private key
|
2015-03-30 10:59:28 +03:00
|
|
|
$privateKey = self::$session->get('privateKey');
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
if ($params['uid'] === $user->getUser()->getUID() && $privateKey) {
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// Encrypt private key with new user pwd as passphrase
|
2015-03-27 03:35:36 +03:00
|
|
|
$encryptedPrivateKey = $this->crypt->symmetricEncryptFileContent($privateKey,
|
|
|
|
$params['password']);
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// Save private key
|
|
|
|
if ($encryptedPrivateKey) {
|
2015-03-27 03:35:36 +03:00
|
|
|
$this->setPrivateKey($user->getUser()->getUID(),
|
|
|
|
$encryptedPrivateKey);
|
2015-03-26 11:58:31 +03:00
|
|
|
} else {
|
|
|
|
$this->log->error('Encryption could not update users encryption password');
|
|
|
|
}
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// NOTE: Session does not need to be updated as the
|
|
|
|
// private key has not changed, only the passphrase
|
|
|
|
// used to decrypt it has changed
|
|
|
|
} else { // admin changed the password for a different user, create new keys and reencrypt file keys
|
|
|
|
$user = $params['uid'];
|
|
|
|
$recoveryPassword = isset($params['recoveryPassword']) ? $params['recoveryPassword'] : null;
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// we generate new keys if...
|
|
|
|
// ...we have a recovery password and the user enabled the recovery key
|
|
|
|
// ...encryption was activated for the first time (no keys exists)
|
|
|
|
// ...the user doesn't have any files
|
|
|
|
if (($util->recoveryEnabledForUser() && $recoveryPassword) || !$this->userHasKeys($user) || !$util->userHasFiles($user)
|
|
|
|
) {
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// backup old keys
|
|
|
|
$this->backupAllKeys('recovery');
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
$newUserPassword = $params['password'];
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-30 10:59:28 +03:00
|
|
|
$keyPair = $this->crypt->createKeyPair();
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// Save public key
|
2015-03-30 10:59:28 +03:00
|
|
|
$this->setPublicKey($user, $keyPair['publicKey']);
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
// Encrypt private key with new password
|
2015-03-30 10:59:28 +03:00
|
|
|
$encryptedKey = $this->crypt->symmetricEncryptFileContent($keyPair['privateKey'],
|
2015-03-27 03:35:36 +03:00
|
|
|
$newUserPassword);
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
if ($encryptedKey) {
|
|
|
|
$this->setPrivateKey($user, $encryptedKey);
|
2015-03-25 00:29:10 +03:00
|
|
|
|
2015-03-26 11:58:31 +03:00
|
|
|
if ($recoveryPassword) { // if recovery key is set we can re-encrypt the key files
|
|
|
|
$util->recoverUsersFiles($recoveryPassword);
|
2015-03-25 00:29:10 +03:00
|
|
|
}
|
2015-03-26 11:58:31 +03:00
|
|
|
} else {
|
|
|
|
$this->log->error('Encryption Could not update users encryption password');
|
2015-03-25 00:29:10 +03:00
|
|
|
}
|
2015-03-26 11:58:31 +03:00
|
|
|
|
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2015-03-25 00:29:10 +03:00
|
|
|
}
|
|
|
|
}
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param $userId
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function userHasKeys($userId) {
|
|
|
|
try {
|
|
|
|
$this->getPrivateKey($userId);
|
|
|
|
$this->getPublicKey($userId);
|
|
|
|
} catch (PrivateKeyMissingException $e) {
|
|
|
|
return false;
|
|
|
|
} catch (PublicKeyMissingException $e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param $userId
|
|
|
|
* @return mixed
|
|
|
|
* @throws PublicKeyMissingException
|
2015-02-24 21:05:19 +03:00
|
|
|
*/
|
2015-03-25 00:29:10 +03:00
|
|
|
public function getPublicKey($userId) {
|
|
|
|
$publicKey = $this->keyStorage->getUserKey($userId, $this->publicKeyId);
|
2015-02-24 21:05:19 +03:00
|
|
|
|
2015-03-25 00:29:10 +03:00
|
|
|
if (strlen($publicKey) !== 0) {
|
|
|
|
return $publicKey;
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
2015-03-25 00:29:10 +03:00
|
|
|
throw new PublicKeyMissingException();
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
|
|
|
|
2015-03-27 20:10:32 +03:00
|
|
|
public function getPublicShareKeyId() {
|
|
|
|
return $this->publicShareKeyId;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* get public key for public link shares
|
|
|
|
*
|
|
|
|
* @return string
|
|
|
|
*/
|
|
|
|
public function getPublicShareKey() {
|
|
|
|
return $this->keyStorage->getSystemUserKey($this->publicShareKeyId . '.publicKey');
|
|
|
|
}
|
|
|
|
|
2015-02-24 21:05:19 +03:00
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param $purpose
|
|
|
|
* @param bool $timestamp
|
|
|
|
* @param bool $includeUserKeys
|
2015-02-24 21:05:19 +03:00
|
|
|
*/
|
2015-03-25 00:29:10 +03:00
|
|
|
public function backupAllKeys($purpose, $timestamp = true, $includeUserKeys = true) {
|
|
|
|
// $backupDir = $this->keyStorage->;
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param string $uid
|
2015-02-24 21:05:19 +03:00
|
|
|
*/
|
2015-03-25 00:29:10 +03:00
|
|
|
public function replaceUserKeys($uid) {
|
|
|
|
$this->backupAllKeys('password_reset');
|
|
|
|
$this->deletePublicKey($uid);
|
|
|
|
$this->deletePrivateKey($uid);
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param $uid
|
2015-02-24 21:05:19 +03:00
|
|
|
* @return bool
|
|
|
|
*/
|
2015-03-25 00:29:10 +03:00
|
|
|
public function deletePublicKey($uid) {
|
|
|
|
return $this->keyStorage->deleteUserKey($uid, $this->publicKeyId);
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param $uid
|
2015-02-24 21:05:19 +03:00
|
|
|
* @return bool
|
|
|
|
*/
|
2015-03-25 00:29:10 +03:00
|
|
|
private function deletePrivateKey($uid) {
|
|
|
|
return $this->keyStorage->deleteUserKey($uid, $this->privateKeyId);
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|
|
|
|
|
2015-03-27 13:43:02 +03:00
|
|
|
public function deleteAllFileKeys($path) {
|
|
|
|
return $this->keyStorage->deleteAllFileKeys($path);
|
|
|
|
}
|
|
|
|
|
2015-02-24 21:05:19 +03:00
|
|
|
/**
|
2015-03-25 00:29:10 +03:00
|
|
|
* @param array $userIds
|
|
|
|
* @return array
|
|
|
|
* @throws PublicKeyMissingException
|
2015-02-24 21:05:19 +03:00
|
|
|
*/
|
2015-03-25 00:29:10 +03:00
|
|
|
public function getPublicKeys(array $userIds) {
|
|
|
|
$keys = [];
|
2015-02-24 21:05:19 +03:00
|
|
|
|
2015-03-25 00:29:10 +03:00
|
|
|
foreach ($userIds as $userId) {
|
|
|
|
try {
|
|
|
|
$keys[$userId] = $this->getPublicKey($userId);
|
|
|
|
} catch (PublicKeyMissingException $e) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
2015-02-24 21:05:19 +03:00
|
|
|
|
2015-03-25 00:29:10 +03:00
|
|
|
return $keys;
|
2015-02-24 21:05:19 +03:00
|
|
|
|
|
|
|
}
|
2015-03-27 03:35:36 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @return string returns openssl key
|
|
|
|
*/
|
|
|
|
public function getSystemPrivateKey() {
|
|
|
|
return $this->keyStorage->getSystemUserKey($this->privateKeyId);
|
|
|
|
}
|
2015-02-24 21:05:19 +03:00
|
|
|
}
|