2013-02-05 22:43:55 +04:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ownCloud
|
|
|
|
*
|
|
|
|
* @author Bjoern Schiessle
|
|
|
|
* @copyright 2012 Bjoern Schiessle <schiessle@owncloud.com>
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\Encryption;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Class to manage storage and retrieval of encryption keys
|
|
|
|
* @note Where a method requires a view object, it's root must be '/'
|
|
|
|
*/
|
|
|
|
class Keymanager {
|
2013-02-09 21:01:38 +04:00
|
|
|
|
2013-02-05 22:43:55 +04:00
|
|
|
/**
|
|
|
|
* @brief retrieve the ENCRYPTED private key from a user
|
|
|
|
*
|
2013-05-01 21:18:31 +04:00
|
|
|
* @return string private key or false (hopefully)
|
2013-02-05 22:43:55 +04:00
|
|
|
* @note the key returned by this method must be decrypted before use
|
|
|
|
*/
|
|
|
|
public static function getPrivateKey( \OC_FilesystemView $view, $user ) {
|
|
|
|
|
|
|
|
$path = '/' . $user . '/' . 'files_encryption' . '/' . $user.'.private.key';
|
|
|
|
|
|
|
|
$key = $view->file_get_contents( $path );
|
|
|
|
|
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief retrieve public key for a specified user
|
2013-02-09 21:01:38 +04:00
|
|
|
* @param \OC_FilesystemView $view
|
|
|
|
* @param $userId
|
2013-02-05 22:43:55 +04:00
|
|
|
* @return string public key or false
|
|
|
|
*/
|
|
|
|
public static function getPublicKey( \OC_FilesystemView $view, $userId ) {
|
2013-04-25 16:56:11 +04:00
|
|
|
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 21:39:12 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
$result = $view->file_get_contents( '/public-keys/' . $userId . '.public.key' );
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
|
|
|
|
return $result;
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-02-05 22:43:55 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-03-28 21:39:12 +04:00
|
|
|
* @brief Retrieve a user's public and private key
|
2013-02-09 21:01:38 +04:00
|
|
|
* @param \OC_FilesystemView $view
|
|
|
|
* @param $userId
|
2013-02-05 22:43:55 +04:00
|
|
|
* @return array keys: privateKey, publicKey
|
|
|
|
*/
|
|
|
|
public static function getUserKeys( \OC_FilesystemView $view, $userId ) {
|
|
|
|
|
|
|
|
return array(
|
|
|
|
'publicKey' => self::getPublicKey( $view, $userId )
|
|
|
|
, 'privateKey' => self::getPrivateKey( $view, $userId )
|
|
|
|
);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-03-28 21:39:12 +04:00
|
|
|
* @brief Retrieve public keys for given users
|
|
|
|
* @param \OC_FilesystemView $view
|
|
|
|
* @param array $userIds
|
|
|
|
* @return array of public keys for the specified users
|
2013-02-05 22:43:55 +04:00
|
|
|
*/
|
2013-03-28 21:39:12 +04:00
|
|
|
public static function getPublicKeys( \OC_FilesystemView $view, array $userIds ) {
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
$keys = array();
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
foreach ( $userIds as $userId ) {
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
$keys[$userId] = self::getPublicKey( $view, $userId );
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
return $keys;
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief store file encryption key
|
|
|
|
*
|
|
|
|
* @param string $path relative path of the file, including filename
|
|
|
|
* @param string $key
|
|
|
|
* @return bool true/false
|
|
|
|
* @note The keyfile is not encrypted here. Client code must
|
|
|
|
* asymmetrically encrypt the keyfile before passing it to this method
|
|
|
|
*/
|
|
|
|
public static function setFileKey( \OC_FilesystemView $view, $path, $userId, $catfile ) {
|
|
|
|
|
2013-04-23 20:41:01 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 21:39:12 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-04-18 18:34:23 +04:00
|
|
|
|
2013-04-18 19:52:27 +04:00
|
|
|
//here we need the currently logged in user, while userId can be a different user
|
2013-05-09 20:24:07 +04:00
|
|
|
$util = new Util( $view, \OCP\User::getUser() );
|
|
|
|
list( $owner, $filename ) = $util->getUidAndFilename( $path );
|
2013-04-18 18:34:23 +04:00
|
|
|
|
|
|
|
$basePath = '/' . $owner . '/files_encryption/keyfiles';
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-04-18 18:34:23 +04:00
|
|
|
$targetPath = self::keySetPreparation( $view, $filename, $basePath, $owner );
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-04-12 16:13:38 +04:00
|
|
|
if ( !$view->is_dir( $basePath . '/' . $targetPath ) ) {
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-04-12 16:13:38 +04:00
|
|
|
// create all parent folders
|
2013-05-09 20:24:07 +04:00
|
|
|
$info = pathinfo( $basePath . '/' . $targetPath );
|
|
|
|
$keyfileFolderName = $view->getLocalFolder( $info['dirname'] );
|
|
|
|
|
|
|
|
if ( ! file_exists( $keyfileFolderName ) ) {
|
|
|
|
|
|
|
|
mkdir( $keyfileFolderName, 0750, true );
|
|
|
|
|
2013-04-12 16:13:38 +04:00
|
|
|
}
|
2013-02-05 22:43:55 +04:00
|
|
|
}
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
// try reusing key file if part file
|
|
|
|
if ( self::isPartialFilePath( $targetPath ) ) {
|
|
|
|
|
|
|
|
$result = $view->file_put_contents( $basePath . '/' . self::fixPartialFilePath( $targetPath ) . '.key', $catfile );
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
$result = $view->file_put_contents( $basePath . '/' . $targetPath . '.key', $catfile );
|
|
|
|
|
|
|
|
}
|
2013-04-12 16:13:38 +04:00
|
|
|
|
2013-04-23 20:41:01 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
2013-02-05 22:43:55 +04:00
|
|
|
}
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
/**
|
|
|
|
* @brief Remove .path extension from a file path
|
|
|
|
* @param string $path Path that may identify a .part file
|
|
|
|
* @return string File path without .part extension
|
|
|
|
* @note this is needed for reusing keys
|
|
|
|
*/
|
|
|
|
public static function fixPartialFilePath( $path ) {
|
|
|
|
|
|
|
|
if (preg_match('/\.part$/', $path)) {
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
$newLength = strlen($path) - 5;
|
|
|
|
$fPath = substr($path, 0, $newLength);
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
return $fPath;
|
|
|
|
|
|
|
|
} else {
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
return $path;
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
}
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
}
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
/**
|
|
|
|
* @brief Check if a path is a .part file
|
|
|
|
* @param string $path Path that may identify a .part file
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function isPartialFilePath( $path ) {
|
|
|
|
|
|
|
|
if ( preg_match('/\.part$/', $path ) ) {
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
}
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
}
|
2013-02-05 22:43:55 +04:00
|
|
|
/**
|
|
|
|
* @brief retrieve keyfile for an encrypted file
|
2013-02-09 21:01:38 +04:00
|
|
|
* @param \OC_FilesystemView $view
|
|
|
|
* @param $userId
|
|
|
|
* @param $filePath
|
|
|
|
* @internal param \OCA\Encryption\file $string name
|
|
|
|
* @return string file key or false
|
2013-02-05 22:43:55 +04:00
|
|
|
* @note The keyfile returned is asymmetrically encrypted. Decryption
|
|
|
|
* of the keyfile must be performed by client code
|
|
|
|
*/
|
|
|
|
public static function getFileKey( \OC_FilesystemView $view, $userId, $filePath ) {
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
// try reusing key file if part file
|
|
|
|
if ( self::isPartialFilePath( $filePath ) ) {
|
|
|
|
|
|
|
|
$result = self::getFileKey( $view, $userId, self::fixPartialFilePath( $filePath ) );
|
|
|
|
|
|
|
|
if ( $result ) {
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-04-18 19:52:27 +04:00
|
|
|
$util = new Util($view, \OCP\User::getUser());
|
2013-04-18 18:34:23 +04:00
|
|
|
list($owner, $filename) = $util->getUidAndFilename($filePath);
|
|
|
|
$filePath_f = ltrim( $filename, '/' );
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
$keyfilePath = '/' . $owner . '/files_encryption/keyfiles/' . $filePath_f . '.key';
|
2013-04-25 16:56:11 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 21:39:12 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
if ( $view->file_exists( $keyfilePath ) ) {
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
$result = $view->file_get_contents( $keyfilePath );
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
} else {
|
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
$result = false;
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
2013-02-05 22:43:55 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Delete a keyfile
|
|
|
|
*
|
2013-02-09 21:01:38 +04:00
|
|
|
* @param OC_FilesystemView $view
|
|
|
|
* @param string $userId username
|
|
|
|
* @param string $path path of the file the key belongs to
|
|
|
|
* @return bool Outcome of unlink operation
|
|
|
|
* @note $path must be relative to data/user/files. e.g. mydoc.txt NOT
|
|
|
|
* /data/admin/files/mydoc.txt
|
2013-02-05 22:43:55 +04:00
|
|
|
*/
|
|
|
|
public static function deleteFileKey( \OC_FilesystemView $view, $userId, $path ) {
|
|
|
|
|
|
|
|
$trimmed = ltrim( $path, '/' );
|
2013-03-28 21:39:12 +04:00
|
|
|
$keyPath = '/' . $userId . '/files_encryption/keyfiles/' . $trimmed;
|
|
|
|
|
|
|
|
$result = false;
|
|
|
|
|
|
|
|
if ( $view->is_dir($keyPath) ) {
|
|
|
|
|
|
|
|
$result = $view->unlink($keyPath);
|
|
|
|
|
|
|
|
} else if ( $view->file_exists( $keyPath.'.key' ) ) {
|
|
|
|
|
|
|
|
$result = $view->unlink( $keyPath.'.key' );
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( !$result ) {
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
\OC_Log::write( 'Encryption library', 'Could not delete keyfile; does not exist: "' . $keyPath, \OC_Log::ERROR );
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-02-05 22:43:55 +04:00
|
|
|
}
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
return $result;
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief store private key from the user
|
|
|
|
* @param string key
|
|
|
|
* @return bool
|
|
|
|
* @note Encryption of the private key must be performed by client code
|
|
|
|
* as no encryption takes place here
|
|
|
|
*/
|
|
|
|
public static function setPrivateKey( $key ) {
|
|
|
|
|
|
|
|
$user = \OCP\User::getUser();
|
|
|
|
|
|
|
|
$view = new \OC_FilesystemView( '/' . $user . '/files_encryption' );
|
2013-04-25 16:56:11 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-02-05 22:43:55 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
if ( !$view->file_exists( '' ) ) $view->mkdir( '' );
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
$result = $view->file_put_contents( $user . '.private.key', $key );
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
return $result;
|
|
|
|
|
2013-02-05 22:43:55 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief store private keys from the user
|
|
|
|
*
|
|
|
|
* @param string privatekey
|
|
|
|
* @param string publickey
|
|
|
|
* @return bool true/false
|
|
|
|
*/
|
|
|
|
public static function setUserKeys($privatekey, $publickey) {
|
|
|
|
|
|
|
|
return ( self::setPrivateKey( $privatekey ) && self::setPublicKey( $publickey ) );
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief store public key of the user
|
|
|
|
*
|
|
|
|
* @param string key
|
|
|
|
* @return bool true/false
|
|
|
|
*/
|
|
|
|
public static function setPublicKey( $key ) {
|
|
|
|
|
|
|
|
$view = new \OC_FilesystemView( '/public-keys' );
|
2013-04-25 16:56:11 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-02-05 22:43:55 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
if ( !$view->file_exists( '' ) ) $view->mkdir( '' );
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
$result = $view->file_put_contents( \OCP\User::getUser() . '.public.key', $key );
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
return $result;
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-03-28 21:39:12 +04:00
|
|
|
* @brief store share key
|
2013-02-09 21:01:38 +04:00
|
|
|
*
|
|
|
|
* @param string $path relative path of the file, including filename
|
|
|
|
* @param string $key
|
|
|
|
* @param null $view
|
|
|
|
* @param string $dbClassName
|
|
|
|
* @return bool true/false
|
|
|
|
* @note The keyfile is not encrypted here. Client code must
|
|
|
|
* asymmetrically encrypt the keyfile before passing it to this method
|
2013-02-05 22:43:55 +04:00
|
|
|
*/
|
|
|
|
public static function setShareKey( \OC_FilesystemView $view, $path, $userId, $shareKey ) {
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
// Here we need the currently logged in user, while userId can be a different user
|
2013-04-18 19:52:27 +04:00
|
|
|
$util = new Util( $view, \OCP\User::getUser() );
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
list( $owner, $filename ) = $util->getUidAndFilename( $path );
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
$basePath = '/' . $owner . '/files_encryption/share-keys';
|
|
|
|
|
|
|
|
$shareKeyPath = self::keySetPreparation( $view, $filename, $basePath, $owner );
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
// try reusing key file if part file
|
|
|
|
if(self::isPartialFilePath($shareKeyPath)) {
|
|
|
|
|
|
|
|
$writePath = $basePath . '/' . self::fixPartialFilePath($shareKeyPath) . '.' . $userId . '.shareKey';
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
$writePath = $basePath . '/' . $shareKeyPath . '.' . $userId . '.shareKey';
|
|
|
|
|
|
|
|
}
|
2013-04-25 16:56:11 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 21:39:12 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
|
|
|
$result = $view->file_put_contents( $writePath, $shareKey );
|
2013-04-25 16:56:11 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-04-25 16:56:11 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
if (
|
|
|
|
is_int( $result )
|
|
|
|
&& $result > 0
|
|
|
|
) {
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
return true;
|
|
|
|
|
|
|
|
} else {
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
return false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief store multiple share keys for a single file
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public static function setShareKeys( \OC_FilesystemView $view, $path, array $shareKeys ) {
|
|
|
|
|
|
|
|
// $shareKeys must be an array with the following format:
|
|
|
|
// [userId] => [encrypted key]
|
|
|
|
|
|
|
|
$result = true;
|
|
|
|
|
|
|
|
foreach ( $shareKeys as $userId => $shareKey ) {
|
|
|
|
|
|
|
|
if ( ! self::setShareKey( $view, $path, $userId, $shareKey ) ) {
|
|
|
|
|
|
|
|
// If any of the keys are not set, flag false
|
|
|
|
$result = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns false if any of the keys weren't set
|
|
|
|
return $result;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief retrieve shareKey for an encrypted file
|
|
|
|
* @param \OC_FilesystemView $view
|
|
|
|
* @param string $userId
|
|
|
|
* @param string $filePath
|
|
|
|
* @internal param \OCA\Encryption\file $string name
|
|
|
|
* @return string file key or false
|
|
|
|
* @note The sharekey returned is encrypted. Decryption
|
|
|
|
* of the keyfile must be performed by client code
|
|
|
|
*/
|
|
|
|
public static function getShareKey( \OC_FilesystemView $view, $userId, $filePath ) {
|
2013-04-25 16:56:11 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
// try reusing key file if part file
|
|
|
|
if(self::isPartialFilePath($filePath)) {
|
|
|
|
|
|
|
|
$result = self::getShareKey($view, $userId, self::fixPartialFilePath($filePath));
|
|
|
|
|
|
|
|
if($result) {
|
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2013-04-27 22:18:57 +04:00
|
|
|
|
2013-05-09 20:24:07 +04:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 21:39:12 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-04-18 19:52:27 +04:00
|
|
|
//here we need the currently logged in user, while userId can be a different user
|
|
|
|
$util = new Util( $view, \OCP\User::getUser() );
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
list($owner, $filename) = $util->getUidAndFilename($filePath);
|
|
|
|
|
|
|
|
$shareKeyPath = '/' . $owner . '/files_encryption/share-keys/' . $filename . '.' . $userId . '.shareKey';
|
|
|
|
if ( $view->file_exists( $shareKeyPath ) ) {
|
|
|
|
|
|
|
|
$result = $view->file_get_contents( $shareKeyPath );
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
$result = false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
return $result;
|
|
|
|
|
|
|
|
}
|
2013-04-22 17:29:58 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief delete all share keys of a given file
|
|
|
|
* @param \OC_FilesystemView $view
|
|
|
|
* @param type $userId owner of the file
|
|
|
|
* @param type $filePath path to the file, relative to the owners file dir
|
|
|
|
*/
|
|
|
|
public static function delAllShareKeys(\OC_FilesystemView $view, $userId, $filePath) {
|
|
|
|
|
|
|
|
if ($view->is_dir($userId.'/files/'.$filePath)) {
|
|
|
|
$view->unlink($userId.'/files_encryption/share-keys/'.$filePath);
|
|
|
|
} else {
|
|
|
|
$localKeyPath = $view->getLocalFile($userId.'/files_encryption/share-keys/'.$filePath);
|
|
|
|
$matches = glob(preg_quote($localKeyPath).'*.shareKey');
|
|
|
|
foreach ($matches as $ma) {
|
|
|
|
unlink($ma);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
/**
|
|
|
|
* @brief Delete a single user's shareKey for a single file
|
|
|
|
*/
|
2013-04-19 15:17:08 +04:00
|
|
|
public static function delShareKey( \OC_FilesystemView $view, $userIds, $filePath ) {
|
2013-04-25 16:56:11 +04:00
|
|
|
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 21:39:12 +04:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-04-19 15:17:08 +04:00
|
|
|
//here we need the currently logged in user, while userId can be a different user
|
|
|
|
$util = new Util( $view, \OCP\User::getUser() );
|
|
|
|
|
|
|
|
list($owner, $filename) = $util->getUidAndFilename($filePath);
|
|
|
|
|
|
|
|
$shareKeyPath = '/' . $owner . '/files_encryption/share-keys/' . $filename;
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
$result = false;
|
|
|
|
|
|
|
|
if ( $view->is_dir($shareKeyPath) ) {
|
|
|
|
|
2013-04-19 15:17:08 +04:00
|
|
|
$localPath = \OC_Filesystem::normalizePath($view->getLocalFolder($shareKeyPath));
|
|
|
|
$result = self::recursiveDelShareKeys($localPath, $userIds);
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-04-19 15:17:08 +04:00
|
|
|
} else {
|
2013-03-28 21:39:12 +04:00
|
|
|
|
2013-04-19 15:17:08 +04:00
|
|
|
foreach ($userIds as $userId) {
|
|
|
|
$view->unlink($shareKeyPath.'.'.$userId.'.shareKey');
|
2013-03-28 21:39:12 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
$result = true;
|
|
|
|
}
|
|
|
|
|
2013-03-30 00:11:29 +04:00
|
|
|
if ( ! $result ) {
|
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
\OC_Log::write( 'Encryption library', 'Could not delete shareKey; does not exist: "' . $shareKeyPath, \OC_Log::ERROR );
|
2013-03-30 00:11:29 +04:00
|
|
|
|
2013-03-28 21:39:12 +04:00
|
|
|
}
|
|
|
|
|
2013-04-25 16:56:11 +04:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
return $result;
|
2013-02-05 22:43:55 +04:00
|
|
|
|
2013-02-09 21:01:38 +04:00
|
|
|
}
|
2013-04-19 15:17:08 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief recursively delete share keys from given users
|
|
|
|
*
|
|
|
|
* @param type $dir directory
|
|
|
|
* @param type $userIds user ids for which the share keys should be deleted
|
|
|
|
*/
|
|
|
|
private static function recursiveDelShareKeys($dir, $userIds) {
|
|
|
|
foreach ($userIds as $userId) {
|
|
|
|
$completePath = $dir.'/.*'.'.'.$userId.'.shareKey';
|
|
|
|
$matches = glob(preg_quote($dir).'/*'.preg_quote('.'.$userId.'.shareKey'));
|
|
|
|
}
|
|
|
|
foreach ($matches as $ma) {
|
|
|
|
unlink($ma);
|
|
|
|
}
|
|
|
|
$subdirs = $directories = glob(preg_quote($dir) . '/*' , GLOB_ONLYDIR);
|
|
|
|
foreach ( $subdirs as $subdir ) {
|
|
|
|
self::recursiveDelShareKeys($subdir, $userIds);
|
|
|
|
}
|
2013-04-25 16:56:11 +04:00
|
|
|
return true;
|
2013-04-19 15:17:08 +04:00
|
|
|
}
|
|
|
|
|
2013-02-09 21:01:38 +04:00
|
|
|
/**
|
|
|
|
* @brief Make preparations to vars and filesystem for saving a keyfile
|
|
|
|
*/
|
|
|
|
public static function keySetPreparation( \OC_FilesystemView $view, $path, $basePath, $userId ) {
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
$targetPath = ltrim( $path, '/' );
|
|
|
|
|
|
|
|
$path_parts = pathinfo( $targetPath );
|
|
|
|
|
|
|
|
// If the file resides within a subdirectory, create it
|
2013-02-09 21:01:38 +04:00
|
|
|
if (
|
|
|
|
isset( $path_parts['dirname'] )
|
|
|
|
&& ! $view->file_exists( $basePath . '/' . $path_parts['dirname'] )
|
2013-02-05 22:43:55 +04:00
|
|
|
) {
|
2013-03-28 21:39:12 +04:00
|
|
|
$sub_dirs = explode(DIRECTORY_SEPARATOR, $basePath . '/' . $path_parts['dirname']);
|
|
|
|
$dir = '';
|
|
|
|
foreach ($sub_dirs as $sub_dir) {
|
|
|
|
$dir .= '/' . $sub_dir;
|
|
|
|
if (!$view->is_dir($dir)) {
|
|
|
|
$view->mkdir($dir);
|
|
|
|
}
|
|
|
|
}
|
2013-02-05 22:43:55 +04:00
|
|
|
}
|
|
|
|
|
2013-02-09 21:01:38 +04:00
|
|
|
return $targetPath;
|
2013-02-05 22:43:55 +04:00
|
|
|
|
|
|
|
}
|
2013-03-28 21:39:12 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief change password of private encryption key
|
|
|
|
*
|
|
|
|
* @param string $oldpasswd old password
|
|
|
|
* @param string $newpasswd new password
|
|
|
|
* @return bool true/false
|
|
|
|
*/
|
|
|
|
public static function changePasswd($oldpasswd, $newpasswd) {
|
|
|
|
|
|
|
|
if ( \OCP\User::checkPassword(\OCP\User::getUser(), $newpasswd) ) {
|
|
|
|
return Crypt::changekeypasscode($oldpasswd, $newpasswd);
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-02-05 22:43:55 +04:00
|
|
|
/**
|
|
|
|
* @brief Fetch the legacy encryption key from user files
|
|
|
|
* @param string $login used to locate the legacy key
|
|
|
|
* @param string $passphrase used to decrypt the legacy key
|
|
|
|
* @return true / false
|
|
|
|
*
|
2013-03-28 21:39:12 +04:00
|
|
|
* if the key is left out, the default handeler will be used
|
2013-02-05 22:43:55 +04:00
|
|
|
*/
|
|
|
|
public function getLegacyKey() {
|
|
|
|
|
|
|
|
$user = \OCP\User::getUser();
|
|
|
|
$view = new \OC_FilesystemView( '/' . $user );
|
|
|
|
return $view->file_get_contents( 'encryption.key' );
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2012-07-25 18:59:55 +04:00
|
|
|
}
|