nextcloud/apps/files_encryption/lib/session.php

166 lines
4.0 KiB
PHP
Raw Normal View History

<?php
/**
* ownCloud
*
* @author Sam Tuke
* @copyright 2012 Sam Tuke samtuke@owncloud.com
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
* License as published by the Free Software Foundation; either
* version 3 of the License, or any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
*
* You should have received a copy of the GNU Affero General Public
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
*
*/
namespace OCA\Encryption;
/**
* Class for handling encryption related session data
*/
2013-05-20 03:24:36 +04:00
class Session
{
private $view;
2013-05-20 03:24:36 +04:00
/**
* @brief if session is started, check if ownCloud key pair is set up, if not create it
2013-05-20 03:24:36 +04:00
* @param \OC_FilesystemView $view
*
* @note The ownCloud key pair is used to allow public link sharing even if encryption is enabled
*/
2013-05-24 01:56:31 +04:00
public function __construct( $view ) {
2013-05-20 03:24:36 +04:00
$this->view = $view;
2013-04-10 18:46:02 +04:00
2013-05-24 01:56:31 +04:00
if ( !$this->view->is_dir( 'owncloud_private_key' ) ) {
2013-05-20 03:24:36 +04:00
2013-05-24 01:56:31 +04:00
$this->view->mkdir( 'owncloud_private_key' );
2013-04-10 18:46:02 +04:00
}
2013-05-24 01:56:31 +04:00
$publicShareKeyId = \OC_Appconfig::getValue( 'files_encryption', 'publicShareKeyId' );
2013-05-24 01:56:31 +04:00
if ( $publicShareKeyId === null ) {
$publicShareKeyId = 'pubShare_' . substr( md5( time() ), 0, 8 );
\OC_Appconfig::setValue( 'files_encryption', 'publicShareKeyId', $publicShareKeyId );
}
2013-05-20 03:24:36 +04:00
if (
2013-05-24 01:56:31 +04:00
!$this->view->file_exists( "/public-keys/" . $publicShareKeyId . ".public.key" )
|| !$this->view->file_exists( "/owncloud_private_key/" . $publicShareKeyId . ".private.key" )
) {
2013-05-20 03:24:36 +04:00
$keypair = Crypt::createKeypair();
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
// Save public key
2013-05-24 01:56:31 +04:00
if ( !$view->is_dir( '/public-keys' ) ) {
$view->mkdir( '/public-keys' );
2013-05-20 03:24:36 +04:00
}
2013-05-24 01:56:31 +04:00
$this->view->file_put_contents( '/public-keys/' . $publicShareKeyId . '.public.key', $keypair['publicKey'] );
2013-05-20 03:24:36 +04:00
2013-05-24 01:56:31 +04:00
// Encrypt private key empty passphrase
$encryptedPrivateKey = Crypt::symmetricEncryptFileContent( $keypair['privateKey'], '' );
2013-05-20 03:24:36 +04:00
// Save private key
2013-05-24 01:56:31 +04:00
$this->view->file_put_contents( '/owncloud_private_key/' . $publicShareKeyId . '.private.key', $encryptedPrivateKey );
2013-05-20 03:24:36 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
2013-05-20 03:24:36 +04:00
}
2013-05-24 01:56:31 +04:00
if ( \OCP\USER::getUser() === false ||
( isset( $_GET['service'] ) && $_GET['service'] == 'files' &&
isset( $_GET['t'] ) )
) {
2013-05-20 03:24:36 +04:00
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-05-24 01:56:31 +04:00
$encryptedKey = $this->view->file_get_contents( '/owncloud_private_key/' . $publicShareKeyId . '.private.key' );
$privateKey = Crypt::symmetricDecryptFileContent( $encryptedKey, '' );
$this->setPrivateKey( $privateKey );
2013-05-20 03:24:36 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
}
}
/**
* @brief Sets user private key to session
2013-05-20 00:31:00 +04:00
* @param string $privateKey
* @return bool
*/
2013-05-24 01:56:31 +04:00
public function setPrivateKey( $privateKey ) {
2013-05-20 03:24:36 +04:00
2013-05-28 03:31:26 +04:00
\OC::$session->set('privateKey', $privateKey);
2013-05-20 03:24:36 +04:00
return true;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
/**
* @brief Gets user private key from session
* @returns string $privateKey The user's plaintext private key
*
*/
2013-05-24 01:56:31 +04:00
public function getPrivateKey() {
2013-05-20 03:24:36 +04:00
2013-05-28 03:04:09 +04:00
if ( !is_null( \OC::$session->get('privateKey') ) ) {
2013-05-20 03:24:36 +04:00
2013-05-28 03:04:09 +04:00
return \OC::$session->get('privateKey');
2013-05-20 03:24:36 +04:00
} else {
2013-05-20 03:24:36 +04:00
return false;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
/**
* @brief Sets user legacy key to session
2013-05-20 03:24:36 +04:00
* @param $legacyKey
* @return bool
*/
2013-05-24 01:56:31 +04:00
public function setLegacyKey( $legacyKey ) {
2013-05-20 03:24:36 +04:00
2013-05-28 03:04:09 +04:00
\OC::$session->set('legacyKey', $legacyKey);
2013-05-20 03:24:36 +04:00
return true;
}
2013-05-20 03:24:36 +04:00
/**
* @brief Gets user legacy key from session
* @returns string $legacyKey The user's plaintext legacy key
*
*/
2013-05-24 01:56:31 +04:00
public function getLegacyKey() {
2013-05-20 03:24:36 +04:00
2013-05-28 03:04:09 +04:00
if ( !is_null( \OC::$session->get('legacyKey') ) ) {
2013-05-20 03:24:36 +04:00
2013-05-28 03:04:09 +04:00
return \OC::$session->get('legacyKey');
2013-05-20 03:24:36 +04:00
} else {
2013-05-20 03:24:36 +04:00
return false;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
}
2013-05-28 03:04:09 +04:00
}