NCEndToEndMetadata.swift 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515
  1. //
  2. // NCEndToEndMetadata.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 13/11/17.
  6. // Copyright © 2017 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import NextcloudKit
  25. class NCEndToEndMetadata: NSObject {
  26. struct E2eeV1: Codable {
  27. struct Metadata: Codable {
  28. let metadataKeys: [String: String]
  29. let version: Double
  30. }
  31. struct Encrypted: Codable {
  32. let key: String
  33. let filename: String
  34. let mimetype: String
  35. }
  36. struct Files: Codable {
  37. let initializationVector: String
  38. let authenticationTag: String?
  39. let metadataKey: Int
  40. let encrypted: String
  41. }
  42. let metadata: Metadata
  43. let files: [String: Files]?
  44. }
  45. struct E2eeV12: Codable {
  46. struct Metadata: Codable {
  47. let metadataKey: String
  48. let version: Double
  49. let checksum: String?
  50. }
  51. struct Encrypted: Codable {
  52. let key: String
  53. let filename: String
  54. let mimetype: String
  55. }
  56. struct Files: Codable {
  57. let initializationVector: String
  58. let authenticationTag: String?
  59. let encrypted: String
  60. }
  61. struct Filedrop: Codable {
  62. let initializationVector: String
  63. let authenticationTag: String?
  64. let encrypted: String
  65. let encryptedKey: String?
  66. let encryptedTag: String?
  67. let encryptedInitializationVector: String?
  68. }
  69. let metadata: Metadata
  70. let files: [String: Files]?
  71. let filedrop: [String: Filedrop]?
  72. }
  73. // --------------------------------------------------------------------------------------------
  74. // MARK: Encode JSON Metadata V1.2
  75. // --------------------------------------------------------------------------------------------
  76. func encoderMetadata(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> String? {
  77. let encoder = JSONEncoder()
  78. var metadataKey: String = ""
  79. let metadataVersion = 1.2
  80. var files: [String: E2eeV12.Files] = [:]
  81. var filesCodable: [String: E2eeV12.Files]?
  82. var filedrop: [String: E2eeV12.Filedrop] = [:]
  83. var filedropCodable: [String: E2eeV12.Filedrop]?
  84. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  85. var fileNameIdentifiers: [String] = []
  86. // let shortVersion: String = Bundle.main.infoDictionary?["CFBundleShortVersionString"] as? String ?? ""
  87. // var filesCodable: [String: E2eeV12.Files] = [String: E2eeV12.Files]()
  88. // var filedropCodable: [String: E2eeV12.Filedrop] = [String: E2eeV12.Filedrop]()
  89. //
  90. // metadata
  91. //
  92. if items.isEmpty, let key = NCEndToEndEncryption.sharedManager()?.generateKey() as? NSData {
  93. if let key = key.base64EncodedString().data(using: .utf8)?.base64EncodedString(),
  94. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(key, publicKey: nil, privateKey: privateKey) {
  95. metadataKey = metadataKeyEncrypted.base64EncodedString()
  96. }
  97. } else if let metadatakey = (items.first!.metadataKey.data(using: .utf8)?.base64EncodedString()),
  98. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadatakey, publicKey: nil, privateKey: privateKey) {
  99. metadataKey = metadataKeyEncrypted.base64EncodedString()
  100. }
  101. for item in items {
  102. //
  103. // files
  104. //
  105. if item.blob == "files" {
  106. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  107. do {
  108. // Create "encrypted"
  109. let json = try encoder.encode(encrypted)
  110. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(String(data: json, encoding: .utf8), key: item.metadataKey) {
  111. let record = E2eeV12.Files(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  112. files.updateValue(record, forKey: item.fileNameIdentifier)
  113. }
  114. fileNameIdentifiers.append(item.fileNameIdentifier)
  115. } catch let error {
  116. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  117. return nil
  118. }
  119. }
  120. //
  121. // filedrop
  122. //
  123. if item.blob == "filedrop" {
  124. var encryptedKey: String?
  125. var encryptedInitializationVector: NSString?
  126. var encryptedTag: NSString?
  127. if let metadataKeyFiledrop = (item.metadataKeyFiledrop.data(using: .utf8)?.base64EncodedString()),
  128. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadataKeyFiledrop, publicKey: nil, privateKey: privateKey) {
  129. encryptedKey = metadataKeyEncrypted.base64EncodedString()
  130. }
  131. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  132. do {
  133. // Create "encrypted"
  134. let json = try encoder.encode(encrypted)
  135. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(String(data: json, encoding: .utf8), key: item.metadataKeyFiledrop, initializationVector: &encryptedInitializationVector, authenticationTag: &encryptedTag) {
  136. let record = E2eeV12.Filedrop(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted, encryptedKey: encryptedKey, encryptedTag: encryptedTag as? String, encryptedInitializationVector: encryptedInitializationVector as? String)
  137. filedrop.updateValue(record, forKey: item.fileNameIdentifier)
  138. }
  139. } catch let error {
  140. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  141. return nil
  142. }
  143. }
  144. }
  145. // Create checksum
  146. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  147. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(passphrase + fileNameIdentifiers.sorted().joined() + metadataKey)
  148. // Create Json
  149. let metadata = E2eeV12.Metadata(metadataKey: metadataKey, version: metadataVersion, checksum: checksum)
  150. if !files.isEmpty { filesCodable = files }
  151. if !filedrop.isEmpty { filedropCodable = filedrop }
  152. let e2ee = E2eeV12(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  153. do {
  154. let data = try encoder.encode(e2ee)
  155. data.printJson()
  156. let jsonString = String(data: data, encoding: .utf8)
  157. // Updated metadata to 1.2
  158. if NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) == nil {
  159. NCManageDatabase.shared.setE2eMetadata(account: account, serverUrl: serverUrl, metadataKey: metadataKey, version: metadataVersion)
  160. }
  161. return jsonString
  162. } catch let error {
  163. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  164. return nil
  165. }
  166. }
  167. // --------------------------------------------------------------------------------------------
  168. // MARK: Decode JSON Metadata Bridge
  169. // --------------------------------------------------------------------------------------------
  170. func decoderMetadata(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> (version: Double, metadataKey: String, error: NKError) {
  171. guard let data = json.data(using: .utf8) else {
  172. return (0, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON"))
  173. }
  174. data.printJson()
  175. let decoder = JSONDecoder()
  176. if (try? decoder.decode(E2eeV1.self, from: data)) != nil {
  177. return decoderMetadataV1(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId)
  178. } else if (try? decoder.decode(E2eeV12.self, from: data)) != nil {
  179. return decoderMetadataV12(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  180. } else {
  181. return (0, "", NKError(errorCode: NCGlobal.shared.errorInternalError, errorDescription: "Server E2EE version " + NCGlobal.shared.capabilityE2EEApiVersion + ", not compatible"))
  182. }
  183. }
  184. // --------------------------------------------------------------------------------------------
  185. // MARK: Decode JSON Metadata V1.1
  186. // --------------------------------------------------------------------------------------------
  187. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String) -> (version: Double, metadataKey: String, error: NKError) {
  188. guard let data = json.data(using: .utf8) else {
  189. return (0, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON"))
  190. }
  191. let decoder = JSONDecoder()
  192. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  193. var metadataVersion: Double = 0
  194. do {
  195. let json = try decoder.decode(E2eeV1.self, from: data)
  196. let metadata = json.metadata
  197. let files = json.files
  198. var metadataKeys: [String: String] = [:]
  199. metadataVersion = metadata.version
  200. // DATA
  201. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  202. //
  203. // metadata
  204. //
  205. for metadataKey in metadata.metadataKeys {
  206. let data = Data(base64Encoded: metadataKey.value)
  207. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  208. let keyData = Data(base64Encoded: decrypted) {
  209. let key = String(data: keyData, encoding: .utf8)
  210. metadataKeys[metadataKey.key] = key
  211. }
  212. }
  213. //
  214. // verify version
  215. //
  216. if let tableE2eMetadata = NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) {
  217. if tableE2eMetadata.version > metadataVersion {
  218. return (metadataVersion, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error verify version \(tableE2eMetadata.version)"))
  219. }
  220. }
  221. //
  222. // files
  223. //
  224. if let files = files {
  225. for files in files {
  226. let fileNameIdentifier = files.key
  227. let files = files.value as E2eeV1.Files
  228. let encrypted = files.encrypted
  229. let authenticationTag = files.authenticationTag
  230. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  231. let metadataKeyIndex = files.metadataKey
  232. let initializationVector = files.initializationVector
  233. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  234. let decryptedData = Data(base64Encoded: decrypted) {
  235. do {
  236. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  237. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  238. let object = tableE2eEncryption()
  239. object.account = account
  240. object.authenticationTag = authenticationTag ?? ""
  241. object.blob = "files"
  242. object.fileName = encrypted.filename
  243. object.fileNameIdentifier = fileNameIdentifier
  244. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  245. object.key = encrypted.key
  246. object.initializationVector = initializationVector
  247. object.metadataKey = metadataKey
  248. object.metadataKeyIndex = metadataKeyIndex
  249. object.metadataVersion = metadataVersion
  250. object.mimeType = encrypted.mimetype
  251. object.serverUrl = serverUrl
  252. // Write file parameter for decrypted on DB
  253. NCManageDatabase.shared.addE2eEncryption(object)
  254. // Update metadata on tableMetadata
  255. metadata.fileNameView = encrypted.filename
  256. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  257. metadata.contentType = results.mimeType
  258. metadata.iconName = results.iconName
  259. metadata.classFile = results.classFile
  260. NCManageDatabase.shared.addMetadata(metadata)
  261. }
  262. } catch let error {
  263. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription))
  264. }
  265. }
  266. }
  267. }
  268. } catch let error {
  269. return (metadataVersion, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription))
  270. }
  271. return (metadataVersion, "", NKError())
  272. }
  273. // --------------------------------------------------------------------------------------------
  274. // MARK: Decode JSON Metadata V1.2
  275. // --------------------------------------------------------------------------------------------
  276. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> (version: Double, metadataKey: String, error: NKError) {
  277. guard let data = json.data(using: .utf8) else {
  278. return (0, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON"))
  279. }
  280. let decoder = JSONDecoder()
  281. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  282. var metadataVersion: Double = 0
  283. var metadataKey = ""
  284. do {
  285. let json = try decoder.decode(E2eeV12.self, from: data)
  286. let metadata = json.metadata
  287. let files = json.files
  288. let filedrop = json.filedrop
  289. var fileNameIdentifiers: [String] = []
  290. metadataVersion = metadata.version
  291. //
  292. // metadata
  293. //
  294. let data = Data(base64Encoded: metadata.metadataKey)
  295. /* TEST CMS
  296. if let cmsData = NCEndToEndEncryption.sharedManager().generateSignatureCMS(data, certificate: CCUtility.getEndToEndCertificate(account), privateKey: CCUtility.getEndToEndPrivateKey(account), publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId) {
  297. let cms = cmsData.base64EncodedString()
  298. print(cms)
  299. let cmsTest = "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"
  300. let data = Data(base64Encoded: cmsTest)
  301. NCEndToEndEncryption.sharedManager().verifySignatureCMS(data, data: nil, publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId)
  302. }
  303. */
  304. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  305. let keyData = Data(base64Encoded: decrypted),
  306. let key = String(data: keyData, encoding: .utf8) {
  307. metadataKey = key
  308. } else {
  309. return (metadataVersion, "", NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt metadataKey"))
  310. }
  311. // DATA
  312. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  313. //
  314. // files
  315. //
  316. if let files = files {
  317. for file in files {
  318. let fileNameIdentifier = file.key
  319. let files = file.value as E2eeV12.Files
  320. let encrypted = files.encrypted
  321. let authenticationTag = files.authenticationTag
  322. let initializationVector = files.initializationVector
  323. fileNameIdentifiers.append(fileNameIdentifier)
  324. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  325. let decryptedData = Data(base64Encoded: decrypted) {
  326. do {
  327. decryptedData.printJson()
  328. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  329. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  330. let object = tableE2eEncryption()
  331. object.account = account
  332. object.authenticationTag = authenticationTag ?? ""
  333. object.blob = "files"
  334. object.fileName = encrypted.filename
  335. object.fileNameIdentifier = fileNameIdentifier
  336. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  337. object.key = encrypted.key
  338. object.initializationVector = initializationVector
  339. object.metadataKey = metadataKey
  340. object.metadataVersion = metadataVersion
  341. object.mimeType = encrypted.mimetype
  342. object.serverUrl = serverUrl
  343. // Write file parameter for decrypted on DB
  344. NCManageDatabase.shared.addE2eEncryption(object)
  345. // Update metadata on tableMetadata
  346. metadata.fileNameView = encrypted.filename
  347. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  348. metadata.contentType = results.mimeType
  349. metadata.iconName = results.iconName
  350. metadata.classFile = results.classFile
  351. NCManageDatabase.shared.addMetadata(metadata)
  352. }
  353. } catch let error {
  354. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription))
  355. }
  356. }
  357. }
  358. }
  359. //
  360. // filedrop
  361. //
  362. if let filedrop = filedrop {
  363. for filedrop in filedrop {
  364. let fileNameIdentifier = filedrop.key
  365. let filedrop = filedrop.value as E2eeV12.Filedrop
  366. var metadataKeyFiledrop: String?
  367. if let encryptedKey = filedrop.encryptedKey,
  368. let data = Data(base64Encoded: encryptedKey),
  369. let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  370. let keyData = Data(base64Encoded: decrypted)
  371. metadataKeyFiledrop = String(data: keyData!, encoding: .utf8)
  372. }
  373. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(filedrop.encrypted, key: metadataKeyFiledrop, initializationVector: filedrop.encryptedInitializationVector, authenticationTag: filedrop.encryptedTag),
  374. let decryptedData = Data(base64Encoded: decrypted) {
  375. do {
  376. decryptedData.printJson()
  377. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  378. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  379. let object = tableE2eEncryption()
  380. object.account = account
  381. object.authenticationTag = filedrop.authenticationTag ?? ""
  382. object.blob = "filedrop"
  383. object.fileName = encrypted.filename
  384. object.fileNameIdentifier = fileNameIdentifier
  385. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  386. object.key = encrypted.key
  387. object.metadataKeyFiledrop = metadataKeyFiledrop ?? ""
  388. object.initializationVector = filedrop.initializationVector
  389. object.metadataKey = metadataKey
  390. object.metadataVersion = metadataVersion
  391. object.mimeType = encrypted.mimetype
  392. object.serverUrl = serverUrl
  393. // Write file parameter for decrypted on DB
  394. NCManageDatabase.shared.addE2eEncryption(object)
  395. // Update metadata on tableMetadata
  396. metadata.fileNameView = encrypted.filename
  397. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  398. metadata.contentType = results.mimeType
  399. metadata.iconName = results.iconName
  400. metadata.classFile = results.classFile
  401. NCManageDatabase.shared.addMetadata(metadata)
  402. }
  403. } catch let error {
  404. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt filedrop: " + error.localizedDescription))
  405. }
  406. }
  407. }
  408. }
  409. // verify checksum
  410. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  411. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(passphrase + fileNameIdentifiers.sorted().joined() + metadata.metadataKey)
  412. if metadata.checksum != checksum {
  413. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error checksum"))
  414. }
  415. } catch let error {
  416. return (metadataVersion, metadataKey, NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription))
  417. }
  418. return (metadataVersion, metadataKey, NKError())
  419. }
  420. }