2013-02-05 18:43:55 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ownCloud
|
|
|
|
*
|
|
|
|
* @author Bjoern Schiessle
|
|
|
|
* @copyright 2012 Bjoern Schiessle <schiessle@owncloud.com>
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
namespace OCA\Encryption;
|
|
|
|
|
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Class to manage storage and retrieval of encryption keys
|
2013-02-05 18:43:55 +00:00
|
|
|
* @note Where a method requires a view object, it's root must be '/'
|
|
|
|
*/
|
2013-05-27 15:26:58 +00:00
|
|
|
class Keymanager {
|
2013-05-19 20:31:00 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* retrieve the ENCRYPTED private key from a user
|
2013-05-19 20:31:00 +00:00
|
|
|
*
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-05-19 20:31:00 +00:00
|
|
|
* @param string $user
|
2013-05-01 17:18:31 +00:00
|
|
|
* @return string private key or false (hopefully)
|
2013-02-05 18:43:55 +00:00
|
|
|
* @note the key returned by this method must be decrypted before use
|
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
public static function getPrivateKey(\OC\Files\View $view, $user) {
|
2013-05-15 00:36:23 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$path = '/' . $user . '/' . 'files_encryption' . '/' . $user . '.private.key';
|
2013-09-25 15:44:05 +00:00
|
|
|
$key = false;
|
2013-05-15 00:36:23 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-09-25 15:44:05 +00:00
|
|
|
if ($view->file_exists($path)) {
|
|
|
|
$key = $view->file_get_contents($path);
|
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-05-15 00:36:23 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
return $key;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* retrieve public key for a specified user
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2014-05-13 11:29:25 +00:00
|
|
|
* @param string $userId
|
2013-02-05 18:43:55 +00:00
|
|
|
* @return string public key or false
|
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
public static function getPublicKey(\OC\Files\View $view, $userId) {
|
2013-04-25 12:56:11 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 17:39:12 +00:00
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$result = $view->file_get_contents('/public-keys/' . $userId . '.public.key');
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-25 12:56:11 +00:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
return $result;
|
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Retrieve a user's public and private key
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2014-05-13 11:29:25 +00:00
|
|
|
* @param string $userId
|
2013-02-05 18:43:55 +00:00
|
|
|
* @return array keys: privateKey, publicKey
|
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
public static function getUserKeys(\OC\Files\View $view, $userId) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
return array(
|
2013-05-27 18:44:38 +00:00
|
|
|
'publicKey' => self::getPublicKey($view, $userId),
|
2013-05-27 15:26:58 +00:00
|
|
|
'privateKey' => self::getPrivateKey($view, $userId)
|
2013-02-05 18:43:55 +00:00
|
|
|
);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Retrieve public keys for given users
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-03-28 17:39:12 +00:00
|
|
|
* @param array $userIds
|
|
|
|
* @return array of public keys for the specified users
|
2013-02-05 18:43:55 +00:00
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
public static function getPublicKeys(\OC\Files\View $view, array $userIds) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
$keys = array();
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
foreach ($userIds as $userId) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$keys[$userId] = self::getPublicKey($view, $userId);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
return $keys;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* store file encryption key
|
2013-02-05 18:43:55 +00:00
|
|
|
*
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-11-20 23:23:38 +00:00
|
|
|
* @param \OCA\Encryption\Util $util
|
2013-02-05 18:43:55 +00:00
|
|
|
* @param string $path relative path of the file, including filename
|
2013-11-27 10:46:24 +00:00
|
|
|
* @param string $catfile keyfile content
|
2013-02-05 18:43:55 +00:00
|
|
|
* @return bool true/false
|
2013-05-19 23:24:36 +00:00
|
|
|
* @note The keyfile is not encrypted here. Client code must
|
2013-02-05 18:43:55 +00:00
|
|
|
* asymmetrically encrypt the keyfile before passing it to this method
|
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
public static function setFileKey(\OC\Files\View $view, $util, $path, $catfile) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-23 16:41:01 +00:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 17:39:12 +00:00
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-04-18 14:34:23 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
list($owner, $filename) = $util->getUidAndFilename($path);
|
2013-04-18 14:34:23 +00:00
|
|
|
|
2013-06-25 10:21:54 +00:00
|
|
|
// in case of system wide mount points the keys are stored directly in the data directory
|
2013-06-25 12:25:00 +00:00
|
|
|
if ($util->isSystemWideMountPoint($filename)) {
|
2013-06-25 10:21:54 +00:00
|
|
|
$basePath = '/files_encryption/keyfiles';
|
|
|
|
} else {
|
|
|
|
$basePath = '/' . $owner . '/files_encryption/keyfiles';
|
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2014-06-23 15:13:56 +00:00
|
|
|
$targetPath = self::keySetPreparation($view, $filename, $basePath);
|
2013-04-27 18:18:57 +00:00
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
// try reusing key file if part file
|
2013-11-12 09:24:10 +00:00
|
|
|
if (Helper::isPartialFilePath($targetPath)) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$result = $view->file_put_contents(
|
2013-11-12 15:48:24 +00:00
|
|
|
$basePath . '/' . Helper::stripPartialFileExtension($targetPath) . '.key', $catfile);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
} else {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$result = $view->file_put_contents($basePath . '/' . $targetPath . '.key', $catfile);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-23 16:41:01 +00:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
return $result;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-04-27 18:18:57 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* retrieve keyfile for an encrypted file
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-11-20 17:10:56 +00:00
|
|
|
* @param \OCA\Encryption\Util $util
|
2014-02-06 15:30:58 +00:00
|
|
|
* @param string|false $filePath
|
2013-02-09 17:01:38 +00:00
|
|
|
* @internal param \OCA\Encryption\file $string name
|
|
|
|
* @return string file key or false
|
2013-02-05 18:43:55 +00:00
|
|
|
* @note The keyfile returned is asymmetrically encrypted. Decryption
|
|
|
|
* of the keyfile must be performed by client code
|
|
|
|
*/
|
2013-11-27 10:46:24 +00:00
|
|
|
public static function getFileKey($view, $util, $filePath) {
|
2013-04-27 18:18:57 +00:00
|
|
|
|
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
list($owner, $filename) = $util->getUidAndFilename($filePath);
|
2013-11-12 15:48:24 +00:00
|
|
|
$filename = Helper::stripPartialFileExtension($filename);
|
2013-05-27 15:26:58 +00:00
|
|
|
$filePath_f = ltrim($filename, '/');
|
2013-05-23 18:30:07 +00:00
|
|
|
|
2013-06-25 10:21:54 +00:00
|
|
|
// in case of system wide mount points the keys are stored directly in the data directory
|
2013-06-25 12:25:00 +00:00
|
|
|
if ($util->isSystemWideMountPoint($filename)) {
|
2013-06-25 10:21:54 +00:00
|
|
|
$keyfilePath = '/files_encryption/keyfiles/' . $filePath_f . '.key';
|
|
|
|
} else {
|
|
|
|
$keyfilePath = '/' . $owner . '/files_encryption/keyfiles/' . $filePath_f . '.key';
|
|
|
|
}
|
2013-04-25 12:56:11 +00:00
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 17:39:12 +00:00
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-02-05 18:43:55 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
if ($view->file_exists($keyfilePath)) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$result = $view->file_get_contents($keyfilePath);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
} else {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
$result = false;
|
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-25 12:56:11 +00:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
return $result;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Delete a keyfile
|
2013-02-05 18:43:55 +00:00
|
|
|
*
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-02-09 17:01:38 +00:00
|
|
|
* @param string $path path of the file the key belongs to
|
2014-01-31 19:39:11 +00:00
|
|
|
* @param string $userId the user to whom the file belongs
|
2013-02-09 17:01:38 +00:00
|
|
|
* @return bool Outcome of unlink operation
|
|
|
|
* @note $path must be relative to data/user/files. e.g. mydoc.txt NOT
|
|
|
|
* /data/admin/files/mydoc.txt
|
2013-02-05 18:43:55 +00:00
|
|
|
*/
|
2014-01-31 19:39:11 +00:00
|
|
|
public static function deleteFileKey($view, $path, $userId=null) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$trimmed = ltrim($path, '/');
|
2013-06-25 14:03:03 +00:00
|
|
|
|
2014-01-31 19:39:11 +00:00
|
|
|
if ($trimmed === '') {
|
|
|
|
\OCP\Util::writeLog('Encryption library',
|
|
|
|
'Can\'t delete file-key empty path given!', \OCP\Util::ERROR);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($userId === null) {
|
|
|
|
$userId = Helper::getUser($path);
|
|
|
|
}
|
2013-11-20 22:23:23 +00:00
|
|
|
$util = new Util($view, $userId);
|
2013-06-25 14:03:03 +00:00
|
|
|
|
|
|
|
if($util->isSystemWideMountPoint($path)) {
|
|
|
|
$keyPath = '/files_encryption/keyfiles/' . $trimmed;
|
|
|
|
} else {
|
|
|
|
$keyPath = '/' . $userId . '/files_encryption/keyfiles/' . $trimmed;
|
|
|
|
}
|
2013-03-28 17:39:12 +00:00
|
|
|
|
|
|
|
$result = false;
|
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
if ($view->is_dir($keyPath)) {
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$result = $view->unlink($keyPath);
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
} else {
|
|
|
|
if ($view->file_exists($keyPath . '.key')) {
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$result = $view->unlink($keyPath . '.key');
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
}
|
2013-03-28 17:39:12 +00:00
|
|
|
}
|
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
if (!$result) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 18:51:52 +00:00
|
|
|
\OCP\Util::writeLog('Encryption library',
|
|
|
|
'Could not delete keyfile; does not exist: "' . $keyPath, \OCP\Util::ERROR);
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-03-28 17:39:12 +00:00
|
|
|
|
|
|
|
return $result;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* store private key from the user
|
2013-05-19 23:24:36 +00:00
|
|
|
* @param string $key
|
2013-02-05 18:43:55 +00:00
|
|
|
* @return bool
|
|
|
|
* @note Encryption of the private key must be performed by client code
|
|
|
|
* as no encryption takes place here
|
|
|
|
*/
|
2013-05-27 15:26:58 +00:00
|
|
|
public static function setPrivateKey($key) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
$user = \OCP\User::getUser();
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2014-05-12 14:30:39 +00:00
|
|
|
$view = new \OC\Files\View('/' . $user . '/files_encryption');
|
2013-04-25 12:56:11 +00:00
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-02-05 18:43:55 +00:00
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2014-06-23 15:13:56 +00:00
|
|
|
if (!$view->file_exists('')) {
|
2013-05-27 15:26:58 +00:00
|
|
|
$view->mkdir('');
|
2014-06-23 15:13:56 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$result = $view->file_put_contents($user . '.private.key', $key);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-25 12:56:11 +00:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
return $result;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* store share key
|
2013-02-09 17:01:38 +00:00
|
|
|
*
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-06-25 12:15:53 +00:00
|
|
|
* @param string $path where the share key is stored
|
2014-05-13 11:29:25 +00:00
|
|
|
* @param string $shareKey
|
2013-02-09 17:01:38 +00:00
|
|
|
* @return bool true/false
|
|
|
|
* @note The keyfile is not encrypted here. Client code must
|
|
|
|
* asymmetrically encrypt the keyfile before passing it to this method
|
2013-02-05 18:43:55 +00:00
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
private static function setShareKey(\OC\Files\View $view, $path, $shareKey) {
|
2013-04-25 12:56:11 +00:00
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 17:39:12 +00:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-06-25 12:15:53 +00:00
|
|
|
$result = $view->file_put_contents($path, $shareKey);
|
2013-04-25 12:56:11 +00:00
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-04-25 12:56:11 +00:00
|
|
|
|
2013-06-25 12:15:53 +00:00
|
|
|
if (is_int($result) && $result > 0) {
|
2013-03-28 17:39:12 +00:00
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* store multiple share keys for a single file
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-11-20 23:23:38 +00:00
|
|
|
* @param \OCA\Encryption\Util $util
|
|
|
|
* @param string $path
|
2013-05-19 23:24:36 +00:00
|
|
|
* @param array $shareKeys
|
2013-03-28 17:39:12 +00:00
|
|
|
* @return bool
|
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
public static function setShareKeys(\OC\Files\View $view, $util, $path, array $shareKeys) {
|
2013-03-28 17:39:12 +00:00
|
|
|
|
|
|
|
// $shareKeys must be an array with the following format:
|
|
|
|
// [userId] => [encrypted key]
|
2013-11-20 22:23:23 +00:00
|
|
|
|
2013-06-25 12:15:53 +00:00
|
|
|
list($owner, $filename) = $util->getUidAndFilename($path);
|
|
|
|
|
|
|
|
// in case of system wide mount points the keys are stored directly in the data directory
|
2013-06-25 12:25:00 +00:00
|
|
|
if ($util->isSystemWideMountPoint($filename)) {
|
2013-06-25 12:15:53 +00:00
|
|
|
$basePath = '/files_encryption/share-keys';
|
|
|
|
} else {
|
|
|
|
$basePath = '/' . $owner . '/files_encryption/share-keys';
|
|
|
|
}
|
|
|
|
|
2014-06-23 15:13:56 +00:00
|
|
|
$shareKeyPath = self::keySetPreparation($view, $filename, $basePath);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
$result = true;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
foreach ($shareKeys as $userId => $shareKey) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-06-25 12:15:53 +00:00
|
|
|
// try reusing key file if part file
|
2013-11-12 09:24:10 +00:00
|
|
|
if (Helper::isPartialFilePath($shareKeyPath)) {
|
2013-11-12 15:48:24 +00:00
|
|
|
$writePath = $basePath . '/' . Helper::stripPartialFileExtension($shareKeyPath) . '.' . $userId . '.shareKey';
|
2013-06-25 12:15:53 +00:00
|
|
|
} else {
|
|
|
|
$writePath = $basePath . '/' . $shareKeyPath . '.' . $userId . '.shareKey';
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!self::setShareKey($view, $writePath, $shareKey)) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
// If any of the keys are not set, flag false
|
|
|
|
$result = false;
|
|
|
|
}
|
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
// Returns false if any of the keys weren't set
|
|
|
|
return $result;
|
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* retrieve shareKey for an encrypted file
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-03-28 17:39:12 +00:00
|
|
|
* @param string $userId
|
2013-11-20 17:10:56 +00:00
|
|
|
* @param \OCA\Encryption\Util $util
|
2013-03-28 17:39:12 +00:00
|
|
|
* @param string $filePath
|
|
|
|
* @return string file key or false
|
|
|
|
* @note The sharekey returned is encrypted. Decryption
|
|
|
|
* of the keyfile must be performed by client code
|
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
public static function getShareKey(\OC\Files\View $view, $userId, $util, $filePath) {
|
2013-04-25 12:56:11 +00:00
|
|
|
|
2013-05-09 16:24:07 +00:00
|
|
|
// try reusing key file if part file
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 17:39:12 +00:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
list($owner, $filename) = $util->getUidAndFilename($filePath);
|
2013-11-12 15:48:24 +00:00
|
|
|
$filename = Helper::stripPartialFileExtension($filename);
|
2013-06-25 10:21:54 +00:00
|
|
|
// in case of system wide mount points the keys are stored directly in the data directory
|
2013-06-25 12:25:00 +00:00
|
|
|
if ($util->isSystemWideMountPoint($filename)) {
|
2013-06-25 10:21:54 +00:00
|
|
|
$shareKeyPath = '/files_encryption/share-keys/' . $filename . '.' . $userId . '.shareKey';
|
|
|
|
} else {
|
|
|
|
$shareKeyPath = '/' . $owner . '/files_encryption/share-keys/' . $filename . '.' . $userId . '.shareKey';
|
|
|
|
}
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
if ($view->file_exists($shareKeyPath)) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$result = $view->file_get_contents($shareKeyPath);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
} else {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
$result = false;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-25 12:56:11 +00:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
return $result;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
}
|
2013-04-22 13:29:58 +00:00
|
|
|
|
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* delete all share keys of a given file
|
2014-05-12 14:30:39 +00:00
|
|
|
* @param \OC\Files\View $view
|
2013-05-19 23:24:36 +00:00
|
|
|
* @param string $userId owner of the file
|
|
|
|
* @param string $filePath path to the file, relative to the owners file dir
|
2013-04-22 13:29:58 +00:00
|
|
|
*/
|
2014-01-31 19:39:11 +00:00
|
|
|
public static function delAllShareKeys($view, $userId, $filePath) {
|
|
|
|
|
|
|
|
$filePath = ltrim($filePath, '/');
|
|
|
|
|
|
|
|
if ($filePath === '') {
|
|
|
|
\OCP\Util::writeLog('Encryption library',
|
|
|
|
'Can\'t delete share-keys empty path given!', \OCP\Util::ERROR);
|
|
|
|
return false;
|
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-06-25 14:41:51 +00:00
|
|
|
$util = new util($view, $userId);
|
|
|
|
|
|
|
|
if ($util->isSystemWideMountPoint($filePath)) {
|
|
|
|
$baseDir = '/files_encryption/share-keys/';
|
|
|
|
} else {
|
|
|
|
$baseDir = $userId . '/files_encryption/share-keys/';
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-31 19:39:11 +00:00
|
|
|
if ($view->is_dir($baseDir . $filePath)) {
|
2013-06-25 14:41:51 +00:00
|
|
|
$view->unlink($baseDir . $filePath);
|
2013-04-22 13:29:58 +00:00
|
|
|
} else {
|
2014-01-31 19:39:11 +00:00
|
|
|
$parentDir = dirname($baseDir . $filePath);
|
|
|
|
$filename = pathinfo($filePath, PATHINFO_BASENAME);
|
|
|
|
foreach($view->getDirectoryContent($parentDir) as $content) {
|
|
|
|
$path = $content['path'];
|
2014-02-03 12:39:05 +00:00
|
|
|
if (self::getFilenameFromShareKey($content['name']) === $filename) {
|
2014-01-31 19:39:11 +00:00
|
|
|
$view->unlink('/' . $userId . '/' . $path);
|
2013-05-23 21:56:31 +00:00
|
|
|
}
|
2013-04-22 13:29:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Delete a single user's shareKey for a single file
|
2013-03-28 17:39:12 +00:00
|
|
|
*/
|
2014-05-12 14:30:39 +00:00
|
|
|
public static function delShareKey(\OC\Files\View $view, $userIds, $filePath) {
|
2013-04-25 12:56:11 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-03-28 17:39:12 +00:00
|
|
|
\OC_FileProxy::$enabled = false;
|
|
|
|
|
2013-11-20 22:23:23 +00:00
|
|
|
$userId = Helper::getUser($filePath);
|
|
|
|
|
|
|
|
$util = new Util($view, $userId);
|
2013-04-19 11:17:08 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
list($owner, $filename) = $util->getUidAndFilename($filePath);
|
2013-04-19 11:17:08 +00:00
|
|
|
|
2013-06-25 14:41:51 +00:00
|
|
|
if ($util->isSystemWideMountPoint($filename)) {
|
|
|
|
$shareKeyPath = \OC\Files\Filesystem::normalizePath('/files_encryption/share-keys/' . $filename);
|
|
|
|
} else {
|
|
|
|
$shareKeyPath = \OC\Files\Filesystem::normalizePath('/' . $owner . '/files_encryption/share-keys/' . $filename);
|
|
|
|
}
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
if ($view->is_dir($shareKeyPath)) {
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2014-06-23 15:13:56 +00:00
|
|
|
self::recursiveDelShareKeys($shareKeyPath, $userIds, $view);
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-04-19 11:17:08 +00:00
|
|
|
} else {
|
2013-03-28 17:39:12 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
foreach ($userIds as $userId) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
if (!$view->unlink($shareKeyPath . '.' . $userId . '.shareKey')) {
|
2013-05-27 18:51:52 +00:00
|
|
|
\OCP\Util::writeLog('Encryption library',
|
2013-05-27 15:26:58 +00:00
|
|
|
'Could not delete shareKey; does not exist: "' . $shareKeyPath . '.' . $userId
|
2013-05-27 18:51:52 +00:00
|
|
|
. '.shareKey"', \OCP\Util::ERROR);
|
2013-05-20 19:24:39 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-20 19:24:39 +00:00
|
|
|
}
|
2013-03-28 17:39:12 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-25 12:56:11 +00:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-02-09 17:01:38 +00:00
|
|
|
}
|
2013-04-19 11:17:08 +00:00
|
|
|
|
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* recursively delete share keys from given users
|
2013-04-19 11:17:08 +00:00
|
|
|
*
|
2013-05-19 23:24:36 +00:00
|
|
|
* @param string $dir directory
|
|
|
|
* @param array $userIds user ids for which the share keys should be deleted
|
2013-04-19 11:17:08 +00:00
|
|
|
*/
|
2014-06-23 15:13:56 +00:00
|
|
|
private static function recursiveDelShareKeys($dir, $userIds, $view) {
|
|
|
|
|
|
|
|
$dirContent = $view->opendir($dir);
|
|
|
|
|
|
|
|
if (is_resource($dirContent)) {
|
|
|
|
while (($file = readdir($dirContent)) !== false) {
|
|
|
|
if (!\OC\Files\Filesystem::isIgnoredDir($file)) {
|
|
|
|
if ($view->is_dir($dir . '/' . $file)) {
|
|
|
|
self::recursiveDelShareKeys($dir . '/' . $file, $userIds, $view);
|
|
|
|
} else {
|
|
|
|
foreach ($userIds as $userId) {
|
|
|
|
if (preg_match("/(.*)." . $userId . ".shareKey/", $file)) {
|
|
|
|
$view->unlink($dir . '/' . $file);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-05-20 19:24:39 +00:00
|
|
|
}
|
2014-06-23 15:13:56 +00:00
|
|
|
closedir($dirContent);
|
2013-04-19 11:17:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-09 17:01:38 +00:00
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* Make preparations to vars and filesystem for saving a keyfile
|
2014-02-06 15:30:58 +00:00
|
|
|
* @param string|boolean $path
|
|
|
|
* @param string $basePath
|
2013-02-09 17:01:38 +00:00
|
|
|
*/
|
2014-06-23 15:13:56 +00:00
|
|
|
protected static function keySetPreparation(\OC\Files\View $view, $path, $basePath) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$targetPath = ltrim($path, '/');
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-05-27 15:26:58 +00:00
|
|
|
$path_parts = pathinfo($targetPath);
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-05 18:43:55 +00:00
|
|
|
// If the file resides within a subdirectory, create it
|
2013-05-19 23:24:36 +00:00
|
|
|
if (
|
2013-05-27 15:26:58 +00:00
|
|
|
isset($path_parts['dirname'])
|
|
|
|
&& !$view->file_exists($basePath . '/' . $path_parts['dirname'])
|
2013-02-05 18:43:55 +00:00
|
|
|
) {
|
2014-06-24 07:29:11 +00:00
|
|
|
$sub_dirs = explode('/', $basePath . '/' . $path_parts['dirname']);
|
2013-03-28 17:39:12 +00:00
|
|
|
$dir = '';
|
2013-05-27 15:26:58 +00:00
|
|
|
foreach ($sub_dirs as $sub_dir) {
|
2013-03-28 17:39:12 +00:00
|
|
|
$dir .= '/' . $sub_dir;
|
2013-05-27 15:26:58 +00:00
|
|
|
if (!$view->is_dir($dir)) {
|
|
|
|
$view->mkdir($dir);
|
2013-03-28 17:39:12 +00:00
|
|
|
}
|
|
|
|
}
|
2013-02-05 18:43:55 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-02-09 17:01:38 +00:00
|
|
|
return $targetPath;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-03-28 17:39:12 +00:00
|
|
|
}
|
2014-02-03 12:39:05 +00:00
|
|
|
|
|
|
|
/**
|
2014-05-19 15:50:53 +00:00
|
|
|
* extract filename from share key name
|
2014-02-03 12:39:05 +00:00
|
|
|
* @param string $shareKey (filename.userid.sharekey)
|
2014-02-06 15:30:58 +00:00
|
|
|
* @return string|false filename or false
|
2014-02-03 12:39:05 +00:00
|
|
|
*/
|
|
|
|
protected static function getFilenameFromShareKey($shareKey) {
|
|
|
|
$parts = explode('.', $shareKey);
|
|
|
|
|
|
|
|
$filename = false;
|
|
|
|
if(count($parts) > 2) {
|
|
|
|
$filename = implode('.', array_slice($parts, 0, count($parts)-2));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $filename;
|
|
|
|
}
|
2013-08-18 09:02:08 +00:00
|
|
|
}
|