2012-08-16 18:18:18 +00:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* ownCloud
|
|
|
|
*
|
|
|
|
* @author Robin Appelman
|
2013-05-19 23:24:36 +00:00
|
|
|
* @copyright 2012 Sam Tuke <samtuke@owncloud.com>, 2011 Robin Appelman
|
2012-12-12 17:39:43 +00:00
|
|
|
* <icewind1991@gmail.com>
|
2012-08-16 18:18:18 +00:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 3 of the License, or any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public
|
|
|
|
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* transparently encrypted filestream
|
|
|
|
*
|
|
|
|
* you can use it as wrapper around an existing stream by setting CryptStream::$sourceStreams['foo']=array('path'=>$path,'stream'=>$stream)
|
2012-12-12 17:39:43 +00:00
|
|
|
* and then fopen('crypt://streams/foo');
|
2012-08-16 18:18:18 +00:00
|
|
|
*/
|
|
|
|
|
2012-10-17 15:35:19 +00:00
|
|
|
namespace OCA\Encryption;
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2012-10-10 17:40:59 +00:00
|
|
|
/**
|
|
|
|
* @brief Provides 'crypt://' stream wrapper protocol.
|
2013-05-19 23:24:36 +00:00
|
|
|
* @note We use a stream wrapper because it is the most secure way to handle
|
2012-11-16 18:31:37 +00:00
|
|
|
* decrypted content transfers. There is no safe way to decrypt the entire file
|
|
|
|
* somewhere on the server, so we have to encrypt and decrypt blocks on the fly.
|
|
|
|
* @note Paths used with this protocol MUST BE RELATIVE. Use URLs like:
|
2013-05-19 23:24:36 +00:00
|
|
|
* crypt://filename, or crypt://subdirectory/filename, NOT
|
|
|
|
* crypt:///home/user/owncloud/data. Otherwise keyfiles will be put in
|
|
|
|
* [owncloud]/data/user/files_encryption/keyfiles/home/user/owncloud/data and
|
2012-12-12 17:39:43 +00:00
|
|
|
* will not be accessible to other methods.
|
2013-05-19 23:24:36 +00:00
|
|
|
* @note Data read and written must always be 8192 bytes long, as this is the
|
|
|
|
* buffer size used internally by PHP. The encryption process makes the input
|
|
|
|
* data longer, and input is chunked into smaller pieces in order to result in
|
2012-11-16 18:31:37 +00:00
|
|
|
* a 8192 encrypted block size.
|
2013-05-19 23:24:36 +00:00
|
|
|
* @note When files are deleted via webdav, or when they are updated and the
|
|
|
|
* previous version deleted, this is handled by OC\Files\View, and thus the
|
2013-04-16 16:29:22 +00:00
|
|
|
* encryption proxies are used and keyfiles deleted.
|
2012-10-10 17:40:59 +00:00
|
|
|
*/
|
2013-05-19 23:24:36 +00:00
|
|
|
class Stream
|
|
|
|
{
|
2012-08-16 18:18:18 +00:00
|
|
|
|
|
|
|
public static $sourceStreams = array();
|
2013-05-19 23:24:36 +00:00
|
|
|
private $plainKey;
|
|
|
|
private $encKeyfiles;
|
2012-09-11 12:40:45 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
private $rawPath; // The raw path relative to the data dir
|
|
|
|
private $relPath; // rel path to users file dir
|
2012-11-16 18:31:37 +00:00
|
|
|
private $userId;
|
2012-09-11 12:40:45 +00:00
|
|
|
private $handle; // Resource returned by fopen
|
2012-08-16 18:18:18 +00:00
|
|
|
private $path;
|
|
|
|
private $readBuffer; // For streams that dont support seeking
|
|
|
|
private $meta = array(); // Header / meta for source stream
|
|
|
|
private $count;
|
|
|
|
private $writeCache;
|
2013-05-19 23:24:36 +00:00
|
|
|
private $size;
|
|
|
|
private $unencryptedSize;
|
2012-12-11 15:10:56 +00:00
|
|
|
private $publicKey;
|
2012-08-23 15:43:10 +00:00
|
|
|
private $keyfile;
|
2012-12-11 15:10:56 +00:00
|
|
|
private $encKeyfile;
|
2013-01-05 17:12:23 +00:00
|
|
|
private static $view; // a fsview object set to user dir
|
|
|
|
private $rootView; // a fsview object set to '/'
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
/**
|
|
|
|
* @param $path
|
|
|
|
* @param $mode
|
|
|
|
* @param $options
|
|
|
|
* @param $opened_path
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function stream_open($path, $mode, $options, &$opened_path)
|
|
|
|
{
|
2013-01-05 17:12:23 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
if (!isset($this->rootView)) {
|
|
|
|
$this->rootView = new \OC_FilesystemView('/');
|
2013-01-05 17:12:23 +00:00
|
|
|
}
|
2013-03-04 16:58:56 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$util = new Util($this->rootView, \OCP\USER::getUser());
|
2013-05-13 19:24:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$this->userId = $util->getUserId();
|
|
|
|
|
|
|
|
// Strip identifier text from path, this gives us the path relative to data/<user>/files
|
|
|
|
$this->relPath = \OC\Files\Filesystem::normalizePath(str_replace('crypt://', '', $path));
|
2013-05-13 19:24:59 +00:00
|
|
|
|
2013-04-12 12:30:02 +00:00
|
|
|
// rawPath is relative to the data directory
|
2013-05-13 19:24:59 +00:00
|
|
|
$this->rawPath = $util->getUserFilesDir() . $this->relPath;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-25 20:49:47 +00:00
|
|
|
if (
|
2013-05-19 23:24:36 +00:00
|
|
|
dirname($this->rawPath) == 'streams'
|
|
|
|
and isset(self::$sourceStreams[basename($this->rawPath)])
|
2012-08-16 18:18:18 +00:00
|
|
|
) {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-09-11 12:40:45 +00:00
|
|
|
// Is this just for unit testing purposes?
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$this->handle = self::$sourceStreams[basename($this->rawPath)]['stream'];
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$this->path = self::$sourceStreams[basename($this->rawPath)]['path'];
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$this->size = self::$sourceStreams[basename($this->rawPath)]['size'];
|
2012-08-16 18:18:18 +00:00
|
|
|
|
|
|
|
} else {
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Disable fileproxies so we can get the file size and open the source file without recursive encryption
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-04-22 02:40:49 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
if (
|
|
|
|
$mode == 'w'
|
|
|
|
or $mode == 'w+'
|
|
|
|
or $mode == 'wb'
|
|
|
|
or $mode == 'wb+'
|
2012-08-16 18:18:18 +00:00
|
|
|
) {
|
|
|
|
|
2013-03-09 18:18:34 +00:00
|
|
|
// We're writing a new file so start write counter with 0 bytes
|
2012-08-16 18:18:18 +00:00
|
|
|
$this->size = 0;
|
2013-05-19 23:24:36 +00:00
|
|
|
$this->unencryptedSize = 0;
|
2012-08-16 18:18:18 +00:00
|
|
|
|
|
|
|
} else {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
$this->size = $this->rootView->filesize($this->rawPath, $mode);
|
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$this->handle = $this->rootView->fopen($this->rawPath, $mode);
|
|
|
|
|
2013-04-25 13:20:06 +00:00
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
if (!is_resource($this->handle)) {
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
\OCP\Util::writeLog('files_encryption', 'failed to open file "' . $this->rawPath . '"', \OCP\Util::ERROR);
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2013-03-09 18:18:34 +00:00
|
|
|
} else {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
$this->meta = stream_get_meta_data($this->handle);
|
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
return is_resource($this->handle);
|
2012-08-16 18:18:18 +00:00
|
|
|
|
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param $offset
|
|
|
|
* @param int $whence
|
|
|
|
*/
|
|
|
|
public function stream_seek($offset, $whence = SEEK_SET)
|
|
|
|
{
|
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
$this->flush();
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
fseek($this->handle, $offset, $whence);
|
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @return int
|
|
|
|
*/
|
|
|
|
public function stream_tell()
|
|
|
|
{
|
2012-09-11 12:40:45 +00:00
|
|
|
return ftell($this->handle);
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param $count
|
|
|
|
* @return bool|string
|
|
|
|
* @throws \Exception
|
|
|
|
*/
|
|
|
|
public function stream_read($count)
|
|
|
|
{
|
|
|
|
|
2012-08-23 15:43:10 +00:00
|
|
|
$this->writeCache = '';
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
if ($count != 8192) {
|
|
|
|
|
2012-08-23 15:43:10 +00:00
|
|
|
// $count will always be 8192 https://bugs.php.net/bug.php?id=21641
|
|
|
|
// This makes this function a lot simpler, but will break this class if the above 'bug' gets 'fixed'
|
2013-05-19 23:24:36 +00:00
|
|
|
\OCP\Util::writeLog('files_encryption', 'PHP "bug" 21641 no longer holds, decryption system requires refactoring', \OCP\Util::FATAL);
|
2012-08-23 15:43:10 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
die();
|
2012-08-23 15:43:10 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2012-08-23 15:43:10 +00:00
|
|
|
|
2012-10-17 15:35:19 +00:00
|
|
|
// Get the data from the file handle
|
2013-05-19 23:24:36 +00:00
|
|
|
$data = fread($this->handle, 8192);
|
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
$result = '';
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
if (strlen($data)) {
|
|
|
|
|
|
|
|
if (!$this->getKey()) {
|
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
// Error! We don't have a key to decrypt the file with
|
2013-05-19 23:24:36 +00:00
|
|
|
throw new \Exception('Encryption key not found for "' . $this->rawPath . '" during attempted read via stream');
|
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
// Decrypt data
|
2013-05-19 23:24:36 +00:00
|
|
|
$result = Crypt::symmetricDecryptFileContent($data, $this->plainKey);
|
2012-08-23 15:43:10 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
}
|
2012-08-23 15:43:10 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
return $result;
|
2012-08-23 15:43:10 +00:00
|
|
|
|
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
/**
|
2013-02-09 17:01:38 +00:00
|
|
|
* @brief Encrypt and pad data ready for writing to disk
|
2012-10-16 14:02:51 +00:00
|
|
|
* @param string $plainData data to be encrypted
|
|
|
|
* @param string $key key to use for encryption
|
2013-05-19 23:24:36 +00:00
|
|
|
* @return string encrypted data on success, false on failure
|
2012-10-16 14:02:51 +00:00
|
|
|
*/
|
2013-05-19 23:24:36 +00:00
|
|
|
public function preWriteEncrypt($plainData, $key)
|
|
|
|
{
|
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
// Encrypt data to 'catfile', which includes IV
|
2013-05-19 23:24:36 +00:00
|
|
|
if ($encrypted = Crypt::symmetricEncryptFileContent($plainData, $key)) {
|
|
|
|
|
|
|
|
return $encrypted;
|
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
} else {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
return false;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-23 15:43:10 +00:00
|
|
|
/**
|
2013-04-17 15:20:37 +00:00
|
|
|
* @brief Fetch the plain encryption key for the file and set it as plainKey property
|
2013-05-19 23:24:36 +00:00
|
|
|
* @internal param bool $generate if true, a new key will be generated if none can be found
|
2012-10-16 14:02:51 +00:00
|
|
|
* @return bool true on key found and set, false on key not found and new key generated and set
|
2012-08-23 15:43:10 +00:00
|
|
|
*/
|
2013-05-19 23:24:36 +00:00
|
|
|
public function getKey()
|
|
|
|
{
|
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
// Check if key is already set
|
2013-05-19 23:24:36 +00:00
|
|
|
if (isset($this->plainKey) && isset($this->encKeyfile)) {
|
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
return true;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-04-25 20:49:47 +00:00
|
|
|
// Fetch and decrypt keyfile
|
2013-05-19 23:24:36 +00:00
|
|
|
// Fetch existing keyfile
|
|
|
|
$this->encKeyfile = Keymanager::getFileKey($this->rootView, $this->userId, $this->relPath);
|
2013-04-22 02:40:49 +00:00
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
// If a keyfile already exists
|
2013-05-19 23:24:36 +00:00
|
|
|
if ($this->encKeyfile) {
|
2013-04-16 12:50:20 +00:00
|
|
|
$this->setUserProperty();
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
$session = new Session($this->rootView);
|
|
|
|
|
|
|
|
$privateKey = $session->getPrivateKey($this->userId);
|
|
|
|
|
|
|
|
$shareKey = Keymanager::getShareKey($this->rootView, $this->userId, $this->relPath);
|
|
|
|
|
|
|
|
$this->plainKey = Crypt::multiKeyDecrypt($this->encKeyfile, $shareKey, $privateKey);
|
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
return true;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-23 15:43:10 +00:00
|
|
|
} else {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-12-11 15:10:56 +00:00
|
|
|
return false;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-12-11 15:10:56 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-12-11 15:10:56 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
public function setUserProperty()
|
|
|
|
{
|
|
|
|
|
2012-12-11 15:10:56 +00:00
|
|
|
// Only get the user again if it isn't already set
|
2013-05-19 23:24:36 +00:00
|
|
|
if (empty($this->userId)) {
|
|
|
|
|
2013-01-24 18:37:34 +00:00
|
|
|
// TODO: Move this user call out of here - it belongs
|
|
|
|
// elsewhere
|
2012-12-11 15:10:56 +00:00
|
|
|
$this->userId = \OCP\User::getUser();
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-23 15:43:10 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-01-24 18:37:34 +00:00
|
|
|
// TODO: Add a method for getting the user in case OCP\User::
|
|
|
|
// getUser() doesn't work (can that scenario ever occur?)
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
/**
|
2012-10-16 14:02:51 +00:00
|
|
|
* @brief Handle plain data from the stream, and write it in 8192 byte blocks
|
2012-10-10 17:40:59 +00:00
|
|
|
* @param string $data data to be written to disk
|
|
|
|
* @note the data will be written to the path stored in the stream handle, set in stream_open()
|
2012-10-16 14:02:51 +00:00
|
|
|
* @note $data is only ever be a maximum of 8192 bytes long. This is set by PHP internally. stream_write() is called multiple times in a loop on data larger than 8192 bytes
|
|
|
|
* @note Because the encryption process used increases the length of $data, a writeCache is used to carry over data which would not fit in the required block size
|
|
|
|
* @note Padding is added to each encrypted block to ensure that the resulting block is exactly 8192 bytes. This is removed during stream_read
|
|
|
|
* @note PHP automatically updates the file pointer after writing data to reflect it's length. There is generally no need to update the poitner manually using fseek
|
2012-08-16 18:18:18 +00:00
|
|
|
*/
|
2013-05-19 23:24:36 +00:00
|
|
|
public function stream_write($data)
|
|
|
|
{
|
|
|
|
|
2013-01-24 18:37:34 +00:00
|
|
|
// Disable the file proxies so that encryption is not
|
|
|
|
// automatically attempted when the file is written to disk -
|
|
|
|
// we are handling that separately here and we don't want to
|
|
|
|
// get into an infinite loop
|
2013-05-19 23:24:36 +00:00
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
2013-04-28 23:43:59 +00:00
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
// Get the length of the unencrypted data that we are handling
|
2013-05-19 23:24:36 +00:00
|
|
|
$length = strlen($data);
|
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
// So far this round, no data has been written
|
2012-08-16 18:18:18 +00:00
|
|
|
$written = 0;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-01-24 18:37:34 +00:00
|
|
|
// Find out where we are up to in the writing of data to the
|
|
|
|
// file
|
2013-05-19 23:24:36 +00:00
|
|
|
$pointer = ftell($this->handle);
|
|
|
|
|
2012-12-11 15:10:56 +00:00
|
|
|
// Make sure the userId is set
|
2013-04-16 16:29:22 +00:00
|
|
|
$this->setUserProperty();
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
// Get / generate the keyfile for the file we're handling
|
2013-01-14 19:07:28 +00:00
|
|
|
// If we're writing a new file (not overwriting an existing
|
|
|
|
// one), save the newly generated keyfile
|
2013-05-19 23:24:36 +00:00
|
|
|
if (!$this->getKey()) {
|
|
|
|
|
2013-04-16 16:29:22 +00:00
|
|
|
$this->plainKey = Crypt::generateKey();
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2013-04-22 02:40:49 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-01-24 18:37:34 +00:00
|
|
|
// If extra data is left over from the last round, make sure it
|
|
|
|
// is integrated into the next 6126 / 8192 block
|
2013-05-19 23:24:36 +00:00
|
|
|
if ($this->writeCache) {
|
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
// Concat writeCache to start of $data
|
|
|
|
$data = $this->writeCache . $data;
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2013-01-24 18:37:34 +00:00
|
|
|
// Clear the write cache, ready for resuse - it has been
|
|
|
|
// flushed and its old contents processed
|
2012-10-16 14:02:51 +00:00
|
|
|
$this->writeCache = '';
|
|
|
|
|
|
|
|
}
|
2012-10-10 17:40:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
// While there still remains somed data to be processed & written
|
|
|
|
while (strlen($data) > 0) {
|
|
|
|
|
|
|
|
// Remaining length for this iteration, not of the
|
|
|
|
// entire file (may be greater than 8192 bytes)
|
|
|
|
$remainingLength = strlen( $data );
|
|
|
|
|
|
|
|
// If data remaining to be written is less than the
|
|
|
|
// size of 1 6126 byte block
|
|
|
|
if (strlen($data) < 6126) {
|
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
// Set writeCache to contents of $data
|
2013-01-24 18:37:34 +00:00
|
|
|
// The writeCache will be carried over to the
|
|
|
|
// next write round, and added to the start of
|
|
|
|
// $data to ensure that written blocks are
|
|
|
|
// always the correct length. If there is still
|
|
|
|
// data in writeCache after the writing round
|
|
|
|
// has finished, then the data will be written
|
|
|
|
// to disk by $this->flush().
|
2012-10-16 14:02:51 +00:00
|
|
|
$this->writeCache = $data;
|
|
|
|
|
|
|
|
// Clear $data ready for next round
|
|
|
|
$data = '';
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
} else {
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-10 17:40:59 +00:00
|
|
|
// Read the chunk from the start of $data
|
2013-05-19 23:24:36 +00:00
|
|
|
$chunk = substr($data, 0, 6126);
|
|
|
|
|
|
|
|
$encrypted = $this->preWriteEncrypt($chunk, $this->plainKey);
|
|
|
|
|
2013-01-24 18:37:34 +00:00
|
|
|
// Write the data chunk to disk. This will be
|
2013-02-09 17:01:38 +00:00
|
|
|
// attended to the last data chunk if the file
|
2013-01-24 18:37:34 +00:00
|
|
|
// being handled totals more than 6126 bytes
|
2013-05-19 23:24:36 +00:00
|
|
|
fwrite($this->handle, $encrypted);
|
|
|
|
|
|
|
|
$writtenLen = strlen($encrypted);
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2013-01-24 18:37:34 +00:00
|
|
|
// Remove the chunk we just processed from
|
|
|
|
// $data, leaving only unprocessed data in $data
|
|
|
|
// var, for handling on the next round
|
2013-05-19 23:24:36 +00:00
|
|
|
$data = substr($data, 6126);
|
2012-08-16 18:18:18 +00:00
|
|
|
|
2012-10-16 14:02:51 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-10-10 17:40:59 +00:00
|
|
|
}
|
2013-04-25 13:20:06 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$this->size = max($this->size, $pointer + $length);
|
|
|
|
$this->unencryptedSize += $length;
|
|
|
|
|
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
return $length;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
/**
|
|
|
|
* @param $option
|
|
|
|
* @param $arg1
|
|
|
|
* @param $arg2
|
|
|
|
*/
|
|
|
|
public function stream_set_option($option, $arg1, $arg2)
|
|
|
|
{
|
|
|
|
switch ($option) {
|
2012-08-16 18:18:18 +00:00
|
|
|
case STREAM_OPTION_BLOCKING:
|
2013-05-19 23:24:36 +00:00
|
|
|
stream_set_blocking($this->handle, $arg1);
|
2012-08-16 18:18:18 +00:00
|
|
|
break;
|
|
|
|
case STREAM_OPTION_READ_TIMEOUT:
|
2013-05-19 23:24:36 +00:00
|
|
|
stream_set_timeout($this->handle, $arg1, $arg2);
|
2012-08-16 18:18:18 +00:00
|
|
|
break;
|
|
|
|
case STREAM_OPTION_WRITE_BUFFER:
|
2013-05-19 23:24:36 +00:00
|
|
|
stream_set_write_buffer($this->handle, $arg1, $arg2);
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
/**
|
|
|
|
* @return array
|
|
|
|
*/
|
|
|
|
public function stream_stat()
|
|
|
|
{
|
2012-09-11 12:40:45 +00:00
|
|
|
return fstat($this->handle);
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @param $mode
|
|
|
|
*/
|
|
|
|
public function stream_lock($mode)
|
|
|
|
{
|
|
|
|
flock($this->handle, $mode);
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function stream_flush()
|
|
|
|
{
|
|
|
|
|
|
|
|
return fflush($this->handle);
|
2013-01-24 18:37:34 +00:00
|
|
|
// Not a typo: http://php.net/manual/en/function.fflush.php
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
/**
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function stream_eof()
|
|
|
|
{
|
2012-09-11 12:40:45 +00:00
|
|
|
return feof($this->handle);
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
private function flush()
|
|
|
|
{
|
|
|
|
|
|
|
|
if ($this->writeCache) {
|
|
|
|
|
2012-09-11 12:40:45 +00:00
|
|
|
// Set keyfile property for file in question
|
|
|
|
$this->getKey();
|
2013-05-19 23:24:36 +00:00
|
|
|
|
|
|
|
$encrypted = $this->preWriteEncrypt($this->writeCache, $this->plainKey);
|
|
|
|
|
|
|
|
fwrite($this->handle, $encrypted);
|
|
|
|
|
2012-09-11 12:40:45 +00:00
|
|
|
$this->writeCache = '';
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2013-05-19 23:24:36 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
/**
|
|
|
|
* @return bool
|
|
|
|
*/
|
|
|
|
public function stream_close()
|
|
|
|
{
|
|
|
|
|
|
|
|
$this->flush();
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
if (
|
|
|
|
$this->meta['mode'] != 'r'
|
|
|
|
and $this->meta['mode'] != 'rb'
|
|
|
|
and $this->size > 0
|
2013-01-06 18:38:35 +00:00
|
|
|
) {
|
2013-05-19 23:24:36 +00:00
|
|
|
// Disable encryption proxy to prevent recursive calls
|
|
|
|
$proxyStatus = \OC_FileProxy::$enabled;
|
|
|
|
\OC_FileProxy::$enabled = false;
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Fetch user's public key
|
|
|
|
$this->publicKey = Keymanager::getPublicKey($this->rootView, $this->userId);
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Check if OC sharing api is enabled
|
|
|
|
$sharingEnabled = \OCP\Share::isEnabled();
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$util = new Util($this->rootView, $this->userId);
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Get all users sharing the file includes current user
|
|
|
|
$uniqueUserIds = $util->getSharingUsersArray($sharingEnabled, $this->relPath, $this->userId);
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Fetch public keys for all sharing users
|
|
|
|
$publicKeys = Keymanager::getPublicKeys($this->rootView, $uniqueUserIds);
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Encrypt enc key for all sharing users
|
|
|
|
$this->encKeyfiles = Crypt::multiKeyEncrypt($this->plainKey, $publicKeys);
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
$view = new \OC_FilesystemView('/');
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Save the new encrypted file key
|
|
|
|
Keymanager::setFileKey($this->rootView, $this->relPath, $this->userId, $this->encKeyfiles['data']);
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Save the sharekeys
|
|
|
|
Keymanager::setShareKeys($view, $this->relPath, $this->encKeyfiles['keys']);
|
2013-04-28 23:43:59 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// get file info
|
|
|
|
$fileInfo = $view->getFileInfo($this->rawPath);
|
|
|
|
if (!is_array($fileInfo)) {
|
|
|
|
$fileInfo = array();
|
|
|
|
}
|
2013-05-06 19:15:25 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// Re-enable proxy - our work is done
|
|
|
|
\OC_FileProxy::$enabled = $proxyStatus;
|
2013-05-15 00:34:36 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// set encryption data
|
|
|
|
$fileInfo['encrypted'] = true;
|
|
|
|
$fileInfo['size'] = $this->size;
|
|
|
|
$fileInfo['unencrypted_size'] = $this->unencryptedSize;
|
2013-05-06 19:15:25 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
// set fileinfo
|
|
|
|
$view->putFileInfo($this->rawPath, $fileInfo);
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2012-08-23 15:43:10 +00:00
|
|
|
|
2013-05-19 23:24:36 +00:00
|
|
|
return fclose($this->handle);
|
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|
2012-08-23 15:43:10 +00:00
|
|
|
|
2012-08-16 18:18:18 +00:00
|
|
|
}
|