server/apps/files_encryption/lib/session.php

238 lines
5.8 KiB
PHP
Raw Normal View History

<?php
/**
* ownCloud
*
* @author Sam Tuke
* @copyright 2012 Sam Tuke samtuke@owncloud.com
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU AFFERO GENERAL PUBLIC LICENSE
* License as published by the Free Software Foundation; either
* version 3 of the License, or any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU AFFERO GENERAL PUBLIC LICENSE for more details.
*
* You should have received a copy of the GNU Affero General Public
* License along with this library. If not, see <http://www.gnu.org/licenses/>.
*
*/
namespace OCA\Encryption;
/**
* Class for handling encryption related session data
*/
2013-05-27 15:26:58 +00:00
class Session {
private $view;
2013-05-19 23:24:36 +00:00
const NOT_INITIALIZED = '0';
const INIT_EXECUTED = '1';
const INIT_SUCCESSFUL = '2';
/**
* @brief if session is started, check if ownCloud key pair is set up, if not create it
* @param \OC\Files\View $view
2013-05-19 23:24:36 +00:00
*
* @note The ownCloud key pair is used to allow public link sharing even if encryption is enabled
*/
2013-05-27 15:26:58 +00:00
public function __construct($view) {
2013-05-19 23:24:36 +00:00
$this->view = $view;
2013-04-10 14:46:02 +00:00
2013-05-27 15:26:58 +00:00
if (!$this->view->is_dir('owncloud_private_key')) {
2013-05-19 23:24:36 +00:00
2013-05-27 15:26:58 +00:00
$this->view->mkdir('owncloud_private_key');
2013-04-10 14:46:02 +00:00
}
2014-02-13 15:28:49 +00:00
$appConfig = \OC::$server->getAppConfig();
$publicShareKeyId = $appConfig->getValue('files_encryption', 'publicShareKeyId');
2013-05-27 15:26:58 +00:00
if ($publicShareKeyId === null) {
$publicShareKeyId = 'pubShare_' . substr(md5(time()), 0, 8);
2014-02-13 15:28:49 +00:00
$appConfig->setValue('files_encryption', 'publicShareKeyId', $publicShareKeyId);
}
2013-05-19 23:24:36 +00:00
if (
2013-05-27 15:26:58 +00:00
!$this->view->file_exists("/public-keys/" . $publicShareKeyId . ".public.key")
|| !$this->view->file_exists("/owncloud_private_key/" . $publicShareKeyId . ".private.key")
) {
2013-05-19 23:24:36 +00:00
$keypair = Crypt::createKeypair();
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
// Save public key
2013-05-27 15:26:58 +00:00
if (!$view->is_dir('/public-keys')) {
$view->mkdir('/public-keys');
2013-05-19 23:24:36 +00:00
}
2013-05-27 15:26:58 +00:00
$this->view->file_put_contents('/public-keys/' . $publicShareKeyId . '.public.key', $keypair['publicKey']);
2013-05-19 23:24:36 +00:00
2013-05-23 21:56:31 +00:00
// Encrypt private key empty passphrase
2013-05-27 15:26:58 +00:00
$encryptedPrivateKey = Crypt::symmetricEncryptFileContent($keypair['privateKey'], '');
2013-05-19 23:24:36 +00:00
// Save private key
2013-05-27 15:26:58 +00:00
$this->view->file_put_contents(
'/owncloud_private_key/' . $publicShareKeyId . '.private.key', $encryptedPrivateKey);
2013-05-19 23:24:36 +00:00
\OC_FileProxy::$enabled = $proxyStatus;
2013-05-19 23:24:36 +00:00
}
if (\OCA\Encryption\Helper::isPublicAccess()) {
2013-05-19 23:24:36 +00:00
// Disable encryption proxy to prevent recursive calls
$proxyStatus = \OC_FileProxy::$enabled;
\OC_FileProxy::$enabled = false;
2013-06-03 16:42:13 +00:00
$encryptedKey = $this->view->file_get_contents(
'/owncloud_private_key/' . $publicShareKeyId . '.private.key');
$privateKey = Crypt::decryptPrivateKey($encryptedKey, '');
2013-06-03 16:42:13 +00:00
$this->setPublicSharePrivateKey($privateKey);
2013-05-19 23:24:36 +00:00
\OC_FileProxy::$enabled = $proxyStatus;
}
}
/**
* @brief Sets user private key to session
2013-05-19 20:31:00 +00:00
* @param string $privateKey
* @return bool
*
* @note this should only be set on login
*/
2013-05-27 15:26:58 +00:00
public function setPrivateKey($privateKey) {
2013-05-19 23:24:36 +00:00
2013-05-27 23:31:26 +00:00
\OC::$session->set('privateKey', $privateKey);
2013-05-19 23:24:36 +00:00
return true;
2013-05-19 23:24:36 +00:00
}
2013-05-19 23:24:36 +00:00
/**
* @brief Sets status of encryption app
* @param string $init INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INOITIALIZED
* @return bool
*
2013-09-02 09:34:28 +00:00
* @note this doesn not indicate of the init was successful, we just remeber the try!
*/
public function setInitialized($init) {
\OC::$session->set('encryptionInitialized', $init);
return true;
}
/**
* @brief remove encryption keys and init status from session
*/
public function closeSession() {
\OC::$session->remove('encryptionInitialized');
\OC::$session->remove('privateKey');
}
/**
* @brief Gets status if we already tried to initialize the encryption app
* @returns init status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INOITIALIZED
*
2013-09-02 09:34:28 +00:00
* @note this doesn not indicate of the init was successful, we just remeber the try!
*/
public function getInitialized() {
if (!is_null(\OC::$session->get('encryptionInitialized'))) {
return \OC::$session->get('encryptionInitialized');
} else {
return self::NOT_INITIALIZED;
}
}
/**
* @brief Gets user or public share private key from session
* @returns string $privateKey The user's plaintext private key
*
*/
2013-05-23 21:56:31 +00:00
public function getPrivateKey() {
// return the public share private key if this is a public access
if (\OCA\Encryption\Helper::isPublicAccess()) {
return $this->getPublicSharePrivateKey();
} else {
2013-06-03 16:42:13 +00:00
if (!is_null(\OC::$session->get('privateKey'))) {
2013-05-28 12:55:42 +00:00
return \OC::$session->get('privateKey');
} else {
return false;
}
}
}
2013-05-19 23:24:36 +00:00
/**
* @brief Sets public user private key to session
* @param string $privateKey
* @return bool
*/
public function setPublicSharePrivateKey($privateKey) {
2013-05-19 23:24:36 +00:00
2013-06-03 16:42:13 +00:00
\OC::$session->set('publicSharePrivateKey', $privateKey);
2013-05-19 23:24:36 +00:00
return true;
2013-05-19 23:24:36 +00:00
}
2013-05-19 23:24:36 +00:00
/**
* @brief Gets public share private key from session
* @returns string $privateKey
*
*/
public function getPublicSharePrivateKey() {
2013-05-19 23:24:36 +00:00
2013-06-03 16:42:13 +00:00
if (!is_null(\OC::$session->get('publicSharePrivateKey'))) {
return \OC::$session->get('publicSharePrivateKey');
} else {
return false;
}
}
2013-05-19 23:24:36 +00:00
/**
* @brief Sets user legacy key to session
* @param string $legacyKey
* @return bool
*/
2013-05-27 15:26:58 +00:00
public function setLegacyKey($legacyKey) {
2013-05-19 23:24:36 +00:00
2013-05-27 23:04:09 +00:00
\OC::$session->set('legacyKey', $legacyKey);
2013-05-19 23:24:36 +00:00
return true;
}
2013-05-19 23:24:36 +00:00
/**
* @brief Gets user legacy key from session
* @returns string $legacyKey The user's plaintext legacy key
*
*/
2013-05-23 21:56:31 +00:00
public function getLegacyKey() {
2013-05-19 23:24:36 +00:00
2013-06-03 16:42:13 +00:00
if (!is_null(\OC::$session->get('legacyKey'))) {
2013-05-19 23:24:36 +00:00
2013-05-27 23:04:09 +00:00
return \OC::$session->get('legacyKey');
2013-05-19 23:24:36 +00:00
} else {
2013-05-19 23:24:36 +00:00
return false;
2013-05-19 23:24:36 +00:00
}
2013-05-19 23:24:36 +00:00
}
2013-05-27 23:04:09 +00:00
}