// // NCEndToEndInitialize.swift // Nextcloud // // Created by Marino Faggiana on 03/04/17. // Copyright © 2017 TWS. All rights reserved. // // Author Marino Faggiana // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program. If not, see . // import Foundation @objc protocol NCEndToEndInitializeDelegate { func endToEndInitializeSuccess() } class NCEndToEndInitialize : NSObject, OCNetworkingDelegate { @objc weak var delegate: NCEndToEndInitializeDelegate? let appDelegate = UIApplication.shared.delegate as! AppDelegate override init() { } // -------------------------------------------------------------------------------------------- // MARK: Initialize // -------------------------------------------------------------------------------------------- @objc func initEndToEndEncryption() { // Clear all keys CCUtility.clearAllKeysEnd(toEnd: appDelegate.activeAccount) let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount) metadataNet.action = actionGetEndToEndPublicKeys appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet) } func getPrivateKeyCipher() { let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount) metadataNet.action = actionGetEndToEndPrivateKeyCipher appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet) } func getPublicKeyServer() { let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount) metadataNet.action = actionGetEndToEndServerPublicKey appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet) } // -------------------------------------------------------------------------------------------- // MARK: Manage PublicKey // -------------------------------------------------------------------------------------------- func getEndToEndPublicKeysSuccess(_ metadataNet: CCMetadataNet!) { CCUtility.setEndToEndPublicKey(appDelegate.activeAccount, publicKey: metadataNet.key) // Request PrivateKey chiper to Server getPrivateKeyCipher() } func getEndToEndPublicKeysFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) { switch errorCode { case 400: appDelegate.messageNotification("E2E get publicKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) case 404: guard let csr = NCEndToEndEncryption.sharedManager().createCSR(appDelegate.activeUserID, directory: CCUtility.getDirectoryUserData()) else { appDelegate.messageNotification("E2E Csr", description: "Error to create Csr", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) return } let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount) metadataNet.action = actionSignEndToEndPublicKey; metadataNet.key = csr; appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet) case 409: appDelegate.messageNotification("E2E get publicKey", description: "forbidden: the user can't access the public keys", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) default: appDelegate.messageNotification("E2E get publicKey", description: message as String, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) } } func signEnd(toEndPublicKeySuccess metadataNet: CCMetadataNet!) { CCUtility.setEndToEndPublicKey(appDelegate.activeAccount, publicKey: metadataNet.key) // Request PrivateKey chiper to Server getPrivateKeyCipher() } func signEnd(toEndPublicKeyFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) { switch errorCode { case 400: appDelegate.messageNotification("E2E sign publicKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) case 409: appDelegate.messageNotification("E2E sign publicKey", description: "conflict: a public key for the user already exists", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) default: appDelegate.messageNotification("E2E sign publicKey", description: message as String, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) } } // -------------------------------------------------------------------------------------------- // MARK: Manage PrivateKey // -------------------------------------------------------------------------------------------- func getEndToEndPrivateKeyCipherSuccess(_ metadataNet: CCMetadataNet!) { // request Passphrase var passphraseTextField: UITextField? let alertController = UIAlertController(title: NSLocalizedString("_e2e_passphrase_request_title_", comment: ""), message: NSLocalizedString("_e2e_passphrase_request_message_", comment: ""), preferredStyle: .alert) //TEST /* if let dir = FileManager.default.urls(for: .documentDirectory, in: .userDomainMask).first { let fileURL = dir.appendingPathComponent("privatekey.txt") //writing do { try metadataNet.key.write(to: fileURL, atomically: false, encoding: .utf8) } catch {/* error handling here */} } */ // let ok = UIAlertAction(title: "OK", style: .default, handler: { (action) -> Void in let passphrase = passphraseTextField?.text let publicKey = CCUtility.getEndToEndPublicKey(self.appDelegate.activeAccount) guard let privateKey = (NCEndToEndEncryption.sharedManager().decryptPrivateKey(metadataNet.key, passphrase: passphrase, publicKey: publicKey)) else { self.appDelegate.messageNotification("E2E decrypt privateKey", description: "Serious internal error to decrypt Private Key", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: Int(k_CCErrorInternalError)) return } // privateKey print(privateKey) // Save to keychain CCUtility.setEndToEndPrivateKey(self.appDelegate.activeAccount, privateKey: privateKey) CCUtility.setEndToEndPassphrase(self.appDelegate.activeAccount, passphrase:passphrase) // request publicKey Server() self.getPublicKeyServer() }) let cancel = UIAlertAction(title: "Cancel", style: .cancel) { (action) -> Void in } alertController.addAction(ok) alertController.addAction(cancel) alertController.addTextField { (textField) -> Void in passphraseTextField = textField passphraseTextField?.placeholder = "Enter passphrase (12 words)" } appDelegate.activeMain.present(alertController, animated: true) } func getEndToEndPrivateKeyCipherFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) { switch errorCode { case 400: appDelegate.messageNotification("E2E get privateKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) case 404: // message let e2ePassphrase = NYMnemonic.generateString(128, language: "english") let message = "\n" + NSLocalizedString("_e2e_settings_view_passphrase_", comment: "") + "\n\n" + e2ePassphrase! let alertController = UIAlertController(title: NSLocalizedString("_e2e_settings_title_", comment: ""), message: NSLocalizedString(message, comment: ""), preferredStyle: .alert) let OKAction = UIAlertAction(title: NSLocalizedString("_ok_", comment: ""), style: .default) { action in var privateKey: NSString? guard let privateKeyChiper = NCEndToEndEncryption.sharedManager().encryptPrivateKey(self.appDelegate.activeUserID, directory: CCUtility.getDirectoryUserData(), passphrase: e2ePassphrase, privateKey: &privateKey) else { self.appDelegate.messageNotification("E2E privateKey", description: "Serious internal error to create PrivateKey chiper", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) return } let metadataNet: CCMetadataNet = CCMetadataNet.init(account: self.appDelegate.activeAccount) metadataNet.action = actionStoreEndToEndPrivateKeyCipher metadataNet.key = privateKey! as String metadataNet.keyCipher = privateKeyChiper metadataNet.password = e2ePassphrase self.appDelegate.addNetworkingOperationQueue(self.appDelegate.netQueue, delegate: self, metadataNet: metadataNet) } alertController.addAction(OKAction) appDelegate.activeMain.present(alertController, animated: true) case 409: appDelegate.messageNotification("E2E get privateKey", description: "forbidden: the user can't access the private key", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) default: appDelegate.messageNotification("E2E get privateKey", description: message as String, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) } } func storeEnd(toEndPrivateKeyCipherSuccess metadataNet: CCMetadataNet!) { CCUtility.setEndToEndPrivateKey(appDelegate.activeAccount, privateKey: metadataNet.key) CCUtility.setEndToEndPassphrase(appDelegate.activeAccount, passphrase:metadataNet.password) // request publicKey Server() self.getPublicKeyServer() } func storeEnd(toEndPrivateKeyCipherFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) { switch errorCode { case 400: appDelegate.messageNotification("E2E store privateKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) case 409: appDelegate.messageNotification("E2E store privateKey", description: "conflict: a private key for the user already exists", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) default: appDelegate.messageNotification("E2E store privateKey", description: message as String, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) } } // -------------------------------------------------------------------------------------------- // MARK: Manage Server PublicKey // -------------------------------------------------------------------------------------------- func getEndToEndServerPublicKeySuccess(_ metadataNet: CCMetadataNet!) { CCUtility.setEndToEndPublicKeyServer(appDelegate.activeAccount, publicKey: metadataNet.key) // Clear Table NCManageDatabase.sharedInstance.clearTable(tableDirectory.self, account: appDelegate.activeAccount) NCManageDatabase.sharedInstance.clearTable(tableE2eEncryption.self, account: appDelegate.activeAccount) self.delegate?.endToEndInitializeSuccess() } func getEndToEndServerPublicKeyFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) { switch (errorCode) { case 400: appDelegate.messageNotification("E2E Server publicKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) case 404: appDelegate.messageNotification("E2E Server publicKey", description: "Server publickey doesn't exists", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) case 409: appDelegate.messageNotification("E2E Server publicKey", description: "forbidden: the user can't access the Server publickey", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) default: appDelegate.messageNotification("E2E Server publicKey", description: message as String, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode) } } }