nextcloud/apps/files_encryption/lib/keymanager.php

617 lines
17 KiB
PHP
Raw Normal View History

<?php
/**
* ownCloud
*
* @author Bjoern Schiessle
* @copyright 2012 Bjoern Schiessle <schiessle@owncloud.com>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
* License as published by the Free Software Foundation; either
* version 3 of the License, or any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
*
* You should have received a copy of the GNU Affero General Public
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
*
*/
namespace OCA\Encryption;
/**
* Class to manage storage and retrieval of encryption keys
* @note Where a method requires a view object, it's root must be '/'
*/
2013-05-27 19:26:58 +04:00
class Keymanager {
2013-05-20 00:31:00 +04:00
/**
* retrieve the ENCRYPTED private key from a user
2013-05-20 00:31:00 +04:00
*
* @param \OC\Files\View $view
2013-05-20 00:31:00 +04:00
* @param string $user
* @return string private key or false (hopefully)
* @note the key returned by this method must be decrypted before use
*/
public static function getPrivateKey(\OC\Files\View $view, $user) {
2013-05-20 03:24:36 +04:00
$path = '/' . $user . '/' . 'files_encryption' . '/' . $user . '.private.key';
2013-09-25 19:44:05 +04:00
$key = false;
2013-05-20 03:24:36 +04:00
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-09-25 19:44:05 +04:00
if ($view->file_exists($path)) {
$key = $view->file_get_contents($path);
}
2013-05-20 03:24:36 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
return $key;
}
/**
* retrieve public key for a specified user
* @param \OC\Files\View $view
2014-05-13 15:29:25 +04:00
* @param string $userId
* @return string public key or false
*/
public static function getPublicKey(\OC\Files\View $view, $userId) {
2013-04-25 16:56:11 +04:00
2013-05-20 03:24:36 +04:00
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$result = $view->file_get_contents('/public-keys/' . $userId . '.public.key');
2013-05-20 03:24:36 +04:00
2013-04-25 16:56:11 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
2013-05-20 03:24:36 +04:00
return $result;
}
2013-05-20 03:24:36 +04:00
/**
* Retrieve a user's public and private key
* @param \OC\Files\View $view
2014-05-13 15:29:25 +04:00
* @param string $userId
* @return array keys: privateKey, publicKey
*/
public static function getUserKeys(\OC\Files\View $view, $userId) {
2013-05-20 03:24:36 +04:00
return array(
'publicKey' => self::getPublicKey($view, $userId),
2013-05-27 19:26:58 +04:00
'privateKey' => self::getPrivateKey($view, $userId)
);
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
/**
* Retrieve public keys for given users
* @param \OC\Files\View $view
* @param array $userIds
* @return array of public keys for the specified users
*/
public static function getPublicKeys(\OC\Files\View $view, array $userIds) {
2013-05-20 03:24:36 +04:00
$keys = array();
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
foreach ($userIds as $userId) {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$keys[$userId] = self::getPublicKey($view, $userId);
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
return $keys;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
/**
* store file encryption key
*
* @param \OC\Files\View $view
* @param \OCA\Encryption\Util $util
* @param string $path relative path of the file, including filename
* @param string $catfile keyfile content
* @return bool true/false
2013-05-20 03:24:36 +04:00
* @note The keyfile is not encrypted here. Client code must
* asymmetrically encrypt the keyfile before passing it to this method
*/
public static function setFileKey(\OC\Files\View $view, $util, $path, $catfile) {
2013-05-20 03:24:36 +04:00
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-05-27 19:26:58 +04:00
list($owner, $filename) = $util->getUidAndFilename($path);
2013-06-25 14:21:54 +04:00
// in case of system wide mount points the keys are stored directly in the data directory
if ($util->isSystemWideMountPoint($filename)) {
2013-06-25 14:21:54 +04:00
$basePath = '/files_encryption/keyfiles';
} else {
$basePath = '/' . $owner . '/files_encryption/keyfiles';
}
2013-05-20 03:24:36 +04:00
2014-06-23 19:13:56 +04:00
$targetPath = self::keySetPreparation($view, $filename, $basePath);
2013-04-27 22:18:57 +04:00
// try reusing key file if part file
if (Helper::isPartialFilePath($targetPath)) {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$result = $view->file_put_contents(
$basePath . '/' . Helper::stripPartialFileExtension($targetPath) . '.key', $catfile);
2013-05-20 03:24:36 +04:00
} else {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$result = $view->file_put_contents($basePath . '/' . $targetPath . '.key', $catfile);
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
2013-05-20 03:24:36 +04:00
return $result;
2013-05-20 03:24:36 +04:00
}
2013-04-27 22:18:57 +04:00
/**
* retrieve keyfile for an encrypted file
* @param \OC\Files\View $view
* @param \OCA\Encryption\Util $util
* @param string|false $filePath
2013-02-09 21:01:38 +04:00
* @internal param \OCA\Encryption\file $string name
* @return string file key or false
* @note The keyfile returned is asymmetrically encrypted. Decryption
* of the keyfile must be performed by client code
*/
public static function getFileKey($view, $util, $filePath) {
2013-04-27 22:18:57 +04:00
2013-05-27 19:26:58 +04:00
list($owner, $filename) = $util->getUidAndFilename($filePath);
$filename = Helper::stripPartialFileExtension($filename);
2013-05-27 19:26:58 +04:00
$filePath_f = ltrim($filename, '/');
2013-06-25 14:21:54 +04:00
// in case of system wide mount points the keys are stored directly in the data directory
if ($util->isSystemWideMountPoint($filename)) {
2013-06-25 14:21:54 +04:00
$keyfilePath = '/files_encryption/keyfiles/' . $filePath_f . '.key';
} else {
$keyfilePath = '/' . $owner . '/files_encryption/keyfiles/' . $filePath_f . '.key';
}
2013-04-25 16:56:11 +04:00
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-05-27 19:26:58 +04:00
if ($view->file_exists($keyfilePath)) {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$result = $view->file_get_contents($keyfilePath);
2013-05-20 03:24:36 +04:00
} else {
2013-05-20 03:24:36 +04:00
$result = false;
}
2013-05-20 03:24:36 +04:00
2013-04-25 16:56:11 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
2013-05-20 03:24:36 +04:00
return $result;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
/**
* Delete a keyfile
*
* @param \OC\Files\View $view
2013-02-09 21:01:38 +04:00
* @param string $path path of the file the key belongs to
* @param string $userId the user to whom the file belongs
2013-02-09 21:01:38 +04:00
* @return bool Outcome of unlink operation
* @note $path must be relative to data/user/files. e.g. mydoc.txt NOT
* /data/admin/files/mydoc.txt
*/
public static function deleteFileKey($view, $path, $userId=null) {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$trimmed = ltrim($path, '/');
if ($trimmed === '') {
\OCP\Util::writeLog('Encryption library',
'Can\'t delete file-key empty path given!', \OCP\Util::ERROR);
return false;
}
if ($userId === null) {
$userId = Helper::getUser($path);
}
$util = new Util($view, $userId);
if($util->isSystemWideMountPoint($path)) {
$keyPath = '/files_encryption/keyfiles/' . $trimmed;
} else {
$keyPath = '/' . $userId . '/files_encryption/keyfiles/' . $trimmed;
}
$result = false;
2014-06-30 18:28:40 +04:00
$fileExists = $view->file_exists('/' . $userId . '/files/' . $trimmed);
2014-06-30 18:28:40 +04:00
if ($view->is_dir($keyPath) && !$fileExists) {
\OCP\Util::writeLog('files_encryption', 'deleteFileKey: delete file key: ' . $keyPath, \OCP\Util::DEBUG);
2013-05-27 19:26:58 +04:00
$result = $view->unlink($keyPath);
2014-06-30 18:28:40 +04:00
} elseif ($view->file_exists($keyPath . '.key') && !$fileExists) {
\OCP\Util::writeLog('files_encryption', 'deleteFileKey: delete file key: ' . $keyPath, \OCP\Util::DEBUG);
$result = $view->unlink($keyPath . '.key');
}
2014-06-30 18:28:40 +04:00
if ($fileExists) {
2013-05-27 22:51:52 +04:00
\OCP\Util::writeLog('Encryption library',
2014-06-30 18:28:40 +04:00
'Did not delete the file key, file still exists: ' . '/' . $userId . '/files/' . $trimmed, \OCP\Util::ERROR);
} elseif (!$result) {
\OCP\Util::writeLog('Encryption library',
'Could not delete keyfile; does not exist: "' . $keyPath, \OCP\Util::ERROR);
}
return $result;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
/**
* store private key from the user
2013-05-20 03:24:36 +04:00
* @param string $key
* @return bool
* @note Encryption of the private key must be performed by client code
* as no encryption takes place here
*/
2014-07-21 15:02:28 +04:00
public static function setPrivateKey($key, $user = '') {
2013-05-20 03:24:36 +04:00
2014-07-21 15:02:28 +04:00
if ($user === '') {
$user = \OCP\User::getUser();
}
$header = Crypt::generateHeader();
2013-05-20 03:24:36 +04:00
$view = new \OC\Files\View('/' . $user . '/files_encryption');
2013-04-25 16:56:11 +04:00
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-05-20 03:24:36 +04:00
2014-06-23 19:13:56 +04:00
if (!$view->file_exists('')) {
2013-05-27 19:26:58 +04:00
$view->mkdir('');
2014-06-23 19:13:56 +04:00
}
2013-05-20 03:24:36 +04:00
2014-07-21 15:02:28 +04:00
$result = $view->file_put_contents($user . '.private.key', $header . $key);
2013-05-20 03:24:36 +04:00
2013-04-25 16:56:11 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
return $result;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
2014-07-21 15:02:28 +04:00
/**
* write private system key (recovery and public share key) to disk
*
* @param string $key encrypted key
* @param string $keyName name of the key file
* @return boolean
*/
public static function setPrivateSystemKey($key, $keyName) {
$header = Crypt::generateHeader();
$view = new \OC\Files\View('/owncloud_private_key');
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
if (!$view->file_exists('')) {
$view->mkdir('');
}
$result = $view->file_put_contents($keyName, $header . $key);
\OC_FileProxy::$enabled = $proxyStatus;
return $result;
}
/**
* store share key
2013-02-09 21:01:38 +04:00
*
* @param \OC\Files\View $view
* @param string $path where the share key is stored
2014-05-13 15:29:25 +04:00
* @param string $shareKey
2013-02-09 21:01:38 +04:00
* @return bool true/false
* @note The keyfile is not encrypted here. Client code must
* asymmetrically encrypt the keyfile before passing it to this method
*/
private static function setShareKey(\OC\Files\View $view, $path, $shareKey) {
2013-04-25 16:56:11 +04:00
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
$result = $view->file_put_contents($path, $shareKey);
2013-04-25 16:56:11 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
2013-04-25 16:56:11 +04:00
if (is_int($result) && $result > 0) {
return true;
} else {
return false;
}
}
2013-05-20 03:24:36 +04:00
/**
* store multiple share keys for a single file
* @param \OC\Files\View $view
* @param \OCA\Encryption\Util $util
* @param string $path
2013-05-20 03:24:36 +04:00
* @param array $shareKeys
* @return bool
*/
public static function setShareKeys(\OC\Files\View $view, $util, $path, array $shareKeys) {
// $shareKeys must be an array with the following format:
// [userId] => [encrypted key]
list($owner, $filename) = $util->getUidAndFilename($path);
// in case of system wide mount points the keys are stored directly in the data directory
if ($util->isSystemWideMountPoint($filename)) {
$basePath = '/files_encryption/share-keys';
} else {
$basePath = '/' . $owner . '/files_encryption/share-keys';
}
2014-06-23 19:13:56 +04:00
$shareKeyPath = self::keySetPreparation($view, $filename, $basePath);
2013-05-20 03:24:36 +04:00
$result = true;
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
foreach ($shareKeys as $userId => $shareKey) {
2013-05-20 03:24:36 +04:00
// try reusing key file if part file
if (Helper::isPartialFilePath($shareKeyPath)) {
$writePath = $basePath . '/' . Helper::stripPartialFileExtension($shareKeyPath) . '.' . $userId . '.shareKey';
} else {
$writePath = $basePath . '/' . $shareKeyPath . '.' . $userId . '.shareKey';
}
if (!self::setShareKey($view, $writePath, $shareKey)) {
2013-05-20 03:24:36 +04:00
// If any of the keys are not set, flag false
$result = false;
}
}
2013-05-20 03:24:36 +04:00
// Returns false if any of the keys weren't set
return $result;
}
2013-05-20 03:24:36 +04:00
/**
* retrieve shareKey for an encrypted file
* @param \OC\Files\View $view
* @param string $userId
* @param \OCA\Encryption\Util $util
* @param string $filePath
* @return string file key or false
* @note The sharekey returned is encrypted. Decryption
* of the keyfile must be performed by client code
*/
public static function getShareKey(\OC\Files\View $view, $userId, $util, $filePath) {
2013-04-25 16:56:11 +04:00
// try reusing key file if part file
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-05-27 19:26:58 +04:00
list($owner, $filename) = $util->getUidAndFilename($filePath);
$filename = Helper::stripPartialFileExtension($filename);
2013-06-25 14:21:54 +04:00
// in case of system wide mount points the keys are stored directly in the data directory
if ($util->isSystemWideMountPoint($filename)) {
2013-06-25 14:21:54 +04:00
$shareKeyPath = '/files_encryption/share-keys/' . $filename . '.' . $userId . '.shareKey';
} else {
$shareKeyPath = '/' . $owner . '/files_encryption/share-keys/' . $filename . '.' . $userId . '.shareKey';
}
2013-05-27 19:26:58 +04:00
if ($view->file_exists($shareKeyPath)) {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$result = $view->file_get_contents($shareKeyPath);
2013-05-20 03:24:36 +04:00
} else {
2013-05-20 03:24:36 +04:00
$result = false;
2013-05-20 03:24:36 +04:00
}
2013-05-20 03:24:36 +04:00
2013-04-25 16:56:11 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
2013-05-20 03:24:36 +04:00
return $result;
2013-05-20 03:24:36 +04:00
}
/**
* delete all share keys of a given file
* @param \OC\Files\View $view
2013-05-20 03:24:36 +04:00
* @param string $userId owner of the file
* @param string $filePath path to the file, relative to the owners file dir
*/
public static function delAllShareKeys($view, $userId, $filePath) {
$filePath = ltrim($filePath, '/');
if ($view->file_exists('/' . $userId . '/files/' . $filePath)) {
\OCP\Util::writeLog('Encryption library',
'File still exists, stop deleting share keys!', \OCP\Util::ERROR);
return false;
}
if ($filePath === '') {
\OCP\Util::writeLog('Encryption library',
'Can\'t delete share-keys empty path given!', \OCP\Util::ERROR);
return false;
}
2013-05-20 03:24:36 +04:00
2013-06-25 18:41:51 +04:00
$util = new util($view, $userId);
if ($util->isSystemWideMountPoint($filePath)) {
$baseDir = '/files_encryption/share-keys/';
} else {
$baseDir = $userId . '/files_encryption/share-keys/';
}
$result = true;
2013-06-25 18:41:51 +04:00
if ($view->is_dir($baseDir . $filePath)) {
\OCP\Util::writeLog('files_encryption', 'delAllShareKeys: delete share keys: ' . $baseDir . $filePath, \OCP\Util::DEBUG);
$result = $view->unlink($baseDir . $filePath);
} else {
$sharingEnabled = \OCP\Share::isEnabled();
$users = $util->getSharingUsersArray($sharingEnabled, $filePath);
foreach($users as $user) {
$keyName = $baseDir . $filePath . '.' . $user . '.shareKey';
if ($view->file_exists($keyName)) {
\OCP\Util::writeLog(
'files_encryption',
'dellAllShareKeys: delete share keys: "' . $keyName . '"',
\OCP\Util::DEBUG
);
$result &= $view->unlink($keyName);
2013-05-24 01:56:31 +04:00
}
}
}
return (bool)$result;
}
/**
* Delete a single user's shareKey for a single file
2014-07-04 14:06:23 +04:00
*
* @param \OC\Files\View $view relative to data/
* @param array $userIds list of users we want to remove
* @param string $filename the owners name of the file for which we want to remove the users relative to data/user/files
* @param string $owner owner of the file
*/
2014-07-04 14:06:23 +04:00
public static function delShareKey($view, $userIds, $filename, $owner) {
2013-04-25 16:56:11 +04:00
2013-05-20 03:24:36 +04:00
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2014-07-04 14:06:23 +04:00
$util = new Util($view, $owner);
2013-06-25 18:41:51 +04:00
if ($util->isSystemWideMountPoint($filename)) {
$shareKeyPath = \OC\Files\Filesystem::normalizePath('/files_encryption/share-keys/' . $filename);
} else {
$shareKeyPath = \OC\Files\Filesystem::normalizePath('/' . $owner . '/files_encryption/share-keys/' . $filename);
}
2013-05-27 19:26:58 +04:00
if ($view->is_dir($shareKeyPath)) {
self::recursiveDelShareKeys($shareKeyPath, $userIds, $owner, $view);
} else {
2013-05-27 19:26:58 +04:00
foreach ($userIds as $userId) {
2013-05-20 03:24:36 +04:00
if ($userId === $owner && $view->file_exists('/' . $owner . '/files/' . $filename)) {
\OCP\Util::writeLog('files_encryption', 'Tried to delete owner key, but the file still exists!', \OCP\Util::FATAL);
continue;
}
$result = $view->unlink($shareKeyPath . '.' . $userId . '.shareKey');
\OCP\Util::writeLog('files_encryption', 'delShareKey: delete share key: ' . $shareKeyPath . '.' . $userId . '.shareKey' , \OCP\Util::DEBUG);
if (!$result) {
2013-05-27 22:51:52 +04:00
\OCP\Util::writeLog('Encryption library',
2013-05-27 19:26:58 +04:00
'Could not delete shareKey; does not exist: "' . $shareKeyPath . '.' . $userId
2013-05-27 22:51:52 +04:00
. '.shareKey"', \OCP\Util::ERROR);
2013-05-20 23:24:39 +04:00
}
}
}
2013-05-20 03:24:36 +04:00
2013-04-25 16:56:11 +04:00
\OC_FileProxy::$enabled = $proxyStatus;
2013-02-09 21:01:38 +04:00
}
/**
* recursively delete share keys from given users
*
2013-05-20 03:24:36 +04:00
* @param string $dir directory
* @param array $userIds user ids for which the share keys should be deleted
* @param string $owner owner of the file
* @param \OC\Files\View $view view relative to data/
*/
private static function recursiveDelShareKeys($dir, $userIds, $owner, $view) {
2014-06-23 19:13:56 +04:00
$dirContent = $view->opendir($dir);
$dirSlices = explode('/', ltrim($dir, '/'));
$realFileDir = '/' . $owner . '/files/' . implode('/', array_slice($dirSlices, 3)) . '/';
2014-06-23 19:13:56 +04:00
if (is_resource($dirContent)) {
while (($file = readdir($dirContent)) !== false) {
if (!\OC\Files\Filesystem::isIgnoredDir($file)) {
if ($view->is_dir($dir . '/' . $file)) {
self::recursiveDelShareKeys($dir . '/' . $file, $userIds, $owner, $view);
2014-06-23 19:13:56 +04:00
} else {
foreach ($userIds as $userId) {
$fileNameFromShareKey = self::getFilenameFromShareKey($file, $userId);
if (!$fileNameFromShareKey) {
continue;
2014-06-23 19:13:56 +04:00
}
$realFile = $realFileDir . $fileNameFromShareKey;
if ($userId === $owner &&
$view->file_exists($realFile)) {
\OCP\Util::writeLog('files_encryption', 'original file still exists, keep owners share key!', \OCP\Util::ERROR);
continue;
}
\OCP\Util::writeLog('files_encryption', 'recursiveDelShareKey: delete share key: ' . $file, \OCP\Util::DEBUG);
$view->unlink($dir . '/' . $file);
2014-06-23 19:13:56 +04:00
}
}
}
2013-05-20 23:24:39 +04:00
}
2014-06-23 19:13:56 +04:00
closedir($dirContent);
}
}
2013-02-09 21:01:38 +04:00
/**
* Make preparations to vars and filesystem for saving a keyfile
* @param string|boolean $path
* @param string $basePath
2013-02-09 21:01:38 +04:00
*/
2014-06-23 19:13:56 +04:00
protected static function keySetPreparation(\OC\Files\View $view, $path, $basePath) {
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$targetPath = ltrim($path, '/');
2013-05-20 03:24:36 +04:00
2013-05-27 19:26:58 +04:00
$path_parts = pathinfo($targetPath);
2013-05-20 03:24:36 +04:00
// If the file resides within a subdirectory, create it
2013-05-20 03:24:36 +04:00
if (
2013-05-27 19:26:58 +04:00
isset($path_parts['dirname'])
&& !$view->file_exists($basePath . '/' . $path_parts['dirname'])
) {
2014-06-24 11:29:11 +04:00
$sub_dirs = explode('/', $basePath . '/' . $path_parts['dirname']);
$dir = '';
2013-05-27 19:26:58 +04:00
foreach ($sub_dirs as $sub_dir) {
$dir .= '/' . $sub_dir;
2013-05-27 19:26:58 +04:00
if (!$view->is_dir($dir)) {
$view->mkdir($dir);
}
}
}
2013-05-20 03:24:36 +04:00
2013-02-09 21:01:38 +04:00
return $targetPath;
2013-05-20 03:24:36 +04:00
}
/**
* extract filename from share key name
* @param string $shareKey (filename.userid.sharekey)
* @param string $userId
* @return string|false filename or false
*/
protected static function getFilenameFromShareKey($shareKey, $userId) {
$expectedSuffix = '.' . $userId . '.' . 'shareKey';
$suffixLen = strlen($expectedSuffix);
$suffix = substr($shareKey, -$suffixLen);
if ($suffix !== $expectedSuffix) {
return false;
}
return substr($shareKey, 0, -$suffixLen);
}
}