NCEndToEndMetadataV20.swift 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488
  1. //
  2. // NCEndToEndMetadataV20.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 09/08/23.
  6. // Copyright © 2023 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import Foundation
  24. import NextcloudKit
  25. import Gzip
  26. extension NCEndToEndMetadata {
  27. struct E2eeV20: Codable {
  28. struct Files: Codable {
  29. let authenticationTag: String
  30. let filename: String
  31. let key: String
  32. let mimetype: String
  33. let nonce: String
  34. }
  35. struct ciphertext: Codable {
  36. let counter: Int
  37. let deleted: Bool?
  38. let keyChecksums: [String]?
  39. let files: [String: Files]?
  40. let folders: [String: String]?
  41. }
  42. struct Metadata: Codable {
  43. let ciphertext: String
  44. let nonce: String
  45. let authenticationTag: String
  46. }
  47. struct Users: Codable {
  48. let userId: String
  49. let certificate: String
  50. let encryptedMetadataKey: String?
  51. }
  52. struct Filedrop: Codable {
  53. let ciphertext: String?
  54. let nonce: String?
  55. let authenticationTag: String?
  56. let users: [UsersFiledrop]?
  57. struct UsersFiledrop: Codable {
  58. let userId: String?
  59. let encryptedFiledropKey: String?
  60. }
  61. }
  62. let metadata: Metadata
  63. let users: [Users]?
  64. let filedrop: [Filedrop]?
  65. let version: String
  66. }
  67. struct E2eeV20Signature: Codable {
  68. struct Metadata: Codable {
  69. let ciphertext: String
  70. let nonce: String
  71. let authenticationTag: String
  72. }
  73. struct Users: Codable {
  74. let userId: String
  75. let certificate: String
  76. let encryptedMetadataKey: String?
  77. }
  78. let metadata: Metadata
  79. let users: [Users]?
  80. let version: String
  81. }
  82. // --------------------------------------------------------------------------------------------
  83. // MARK: Ecode JSON Metadata V2.0
  84. // --------------------------------------------------------------------------------------------
  85. func encodeMetadataV20(account: String, serverUrl: String, ocIdServerUrl: String, userId: String, addUserId: String?, addCertificate: String?, removeUserId: String?) -> (metadata: String?, signature: String?, counter: Int, error: NKError) {
  86. guard let directoryTop = NCUtility.shared.getDirectoryE2EETop(serverUrl: serverUrl, account: account) else {
  87. return (nil, nil, 0, NKError(errorCode: NCGlobal.shared.errorUnexpectedResponseFromDB, errorDescription: "_e2e_error_"))
  88. }
  89. let isDirectoryTop = NCUtility.shared.isDirectoryE2EETop(account: account, serverUrl: serverUrl)
  90. var metadataKey: String?
  91. var keyChecksums: [String] = []
  92. var usersCodable: [E2eeV20.Users] = []
  93. var usersFileDropCodable: [E2eeV20.Filedrop.UsersFiledrop] = []
  94. var filesCodable: [String: E2eeV20.Files] = [:]
  95. var filedropCodable: [E2eeV20.Filedrop] = []
  96. var folders: [String: String] = [:]
  97. var counter: Int = 1
  98. func addUser(userId: String?, certificate: String?, key: Data) {
  99. guard let userId, let certificate else { return }
  100. if let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricData(key, certificate: certificate) {
  101. let encryptedMetadataKey = metadataKeyEncrypted.base64EncodedString()
  102. NCManageDatabase.shared.addE2EUsers(account: account, serverUrl: serverUrl, ocIdServerUrl: ocIdServerUrl, userId: userId, certificate: certificate, encryptedMetadataKey: encryptedMetadataKey, metadataKey: key)
  103. }
  104. }
  105. if isDirectoryTop {
  106. guard var key = NCEndToEndEncryption.sharedManager()?.generateKey() as? Data else {
  107. return (nil, nil, 0, NKError(errorCode: NCGlobal.shared.errorUnexpectedResponseFromDB, errorDescription: "_e2e_error_"))
  108. }
  109. if let tableUserId = NCManageDatabase.shared.getE2EUsers(account: account, ocIdServerUrl: directoryTop.ocId, userId: userId),
  110. let metadataKey = tableUserId.metadataKey {
  111. key = metadataKey
  112. } else {
  113. addUser(userId: userId, certificate: CCUtility.getEndToEndCertificate(account), key: key)
  114. }
  115. // ADDUSERID
  116. if let addUserId {
  117. addUser(userId: addUserId, certificate: addCertificate, key: key)
  118. }
  119. // REMOVEUSERID
  120. if let removeUserId {
  121. NCManageDatabase.shared.deleteE2EUsers(account: account, ocIdServerUrl: ocIdServerUrl, userId: removeUserId)
  122. }
  123. // FOR SECURITY recreate all users with key
  124. if let users = NCManageDatabase.shared.getE2EUsers(account: account, ocIdServerUrl: ocIdServerUrl) {
  125. for user in users {
  126. addUser(userId: user.userId, certificate: user.certificate, key: key)
  127. }
  128. }
  129. metadataKey = key.base64EncodedString()
  130. } else {
  131. guard let tableUserId = NCManageDatabase.shared.getE2EUsers(account: account, ocIdServerUrl: directoryTop.ocId, userId: userId), let key = tableUserId.metadataKey else {
  132. return (nil, nil, 0, NKError(errorCode: NCGlobal.shared.errorUnexpectedResponseFromDB, errorDescription: "_e2e_error_"))
  133. }
  134. metadataKey = key.base64EncodedString()
  135. }
  136. // USERS
  137. // CHECKSUM
  138. //
  139. if let users = NCManageDatabase.shared.getE2EUsers(account: account, ocIdServerUrl: directoryTop.ocId) {
  140. for user in users {
  141. if isDirectoryTop {
  142. usersCodable.append(E2eeV20.Users(userId: user.userId, certificate: user.certificate, encryptedMetadataKey: user.encryptedMetadataKey))
  143. // usersFileDropCodable.append(E2eeV20.Filedrop.UsersFiledrop(userId: user.userId, encryptedFiledropKey: user.encryptedFiledropKey))
  144. }
  145. if let hash = NCEndToEndEncryption.sharedManager().createSHA256(user.metadataKey) {
  146. keyChecksums.append(hash)
  147. }
  148. }
  149. }
  150. // COUNTER + 1
  151. //
  152. if let resultCounter = NCManageDatabase.shared.getCounterE2eMetadata(account: account, ocIdServerUrl: ocIdServerUrl) {
  153. counter = resultCounter + 1
  154. }
  155. // CIPERTEXT
  156. //
  157. let e2eEncryptions = NCManageDatabase.shared.getE2eEncryptions(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  158. for e2eEncryption in e2eEncryptions {
  159. if e2eEncryption.blob == "files" {
  160. let file = E2eeV20.Files(authenticationTag: e2eEncryption.authenticationTag, filename: e2eEncryption.fileName, key: e2eEncryption.key, mimetype: e2eEncryption.mimeType, nonce: e2eEncryption.initializationVector)
  161. filesCodable.updateValue(file, forKey: e2eEncryption.fileNameIdentifier)
  162. } else if e2eEncryption.blob == "folders" {
  163. folders[e2eEncryption.fileNameIdentifier] = e2eEncryption.fileName
  164. } else if e2eEncryption.blob == "filedrop" {
  165. let filedrop = E2eeV20.Files(authenticationTag: e2eEncryption.authenticationTag, filename: e2eEncryption.fileName, key: e2eEncryption.key, mimetype: e2eEncryption.mimeType, nonce: e2eEncryption.initializationVector)
  166. var authenticationTag: NSString?
  167. var initializationVector: NSString?
  168. do {
  169. let json = try JSONEncoder().encode(filedrop)
  170. let jsonZip = try json.gzipped()
  171. let ciphertext = NCEndToEndEncryption.sharedManager().encryptPayloadFile(jsonZip, key: metadataKey, initializationVector: &initializationVector, authenticationTag: &authenticationTag)
  172. guard var ciphertext, let initializationVector = initializationVector as? String, let authenticationTag = authenticationTag as? String else {
  173. return (nil, nil, counter, NKError(errorCode: NCGlobal.shared.errorE2EEEncryptPayloadFile, errorDescription: "_e2e_error_"))
  174. }
  175. // Add initializationVector [ANDROID]
  176. ciphertext = ciphertext + "|" + initializationVector
  177. let filedrop = E2eeV20.Filedrop(ciphertext: ciphertext, nonce: initializationVector, authenticationTag: authenticationTag, users: usersFileDropCodable)
  178. filedropCodable.append(filedrop)
  179. } catch let error {
  180. return (nil, nil, counter, NKError(errorCode: NCGlobal.shared.errorE2EEJSon, errorDescription: error.localizedDescription))
  181. }
  182. }
  183. }
  184. do {
  185. var authenticationTag: NSString?
  186. var initializationVector: NSString?
  187. let json = try JSONEncoder().encode(E2eeV20.ciphertext(counter: counter, deleted: false, keyChecksums: keyChecksums, files: filesCodable, folders: folders))
  188. let jsonZip = try json.gzipped()
  189. let ciphertextMetadata = NCEndToEndEncryption.sharedManager().encryptPayloadFile(jsonZip, key: metadataKey, initializationVector: &initializationVector, authenticationTag: &authenticationTag)
  190. guard var ciphertextMetadata, let initializationVector = initializationVector as? String, let authenticationTag = authenticationTag as? String else {
  191. return (nil, nil, counter, NKError(errorCode: NCGlobal.shared.errorE2EEEncryptPayloadFile, errorDescription: "_e2e_error_"))
  192. }
  193. // Add initializationVector [ANDROID]
  194. ciphertextMetadata = ciphertextMetadata + "|" + initializationVector
  195. let metadataCodable = E2eeV20.Metadata(ciphertext: ciphertextMetadata, nonce: initializationVector, authenticationTag: authenticationTag)
  196. let e2eeCodable = E2eeV20(metadata: metadataCodable, users: usersCodable, filedrop: filedropCodable, version: NCGlobal.shared.e2eeVersionV20)
  197. let e2eeData = try JSONEncoder().encode(e2eeCodable)
  198. e2eeData.printJson()
  199. let e2eeJson = String(data: e2eeData, encoding: .utf8)
  200. let signature = createSignature(account: account, userId: userId, metadata: metadataCodable, users: usersCodable, version: NCGlobal.shared.e2eeVersionV20, certificate: CCUtility.getEndToEndCertificate(account))
  201. return (e2eeJson, signature, counter, NKError())
  202. } catch let error {
  203. return (nil, nil, counter, NKError(errorCode: NCGlobal.shared.errorE2EEJSon, errorDescription: error.localizedDescription))
  204. }
  205. }
  206. // --------------------------------------------------------------------------------------------
  207. // MARK: Decode JSON Metadata V2.0
  208. // --------------------------------------------------------------------------------------------
  209. func decodeMetadataV20(_ json: String, signature: String?, serverUrl: String, account: String, ocIdServerUrl: String, urlBase: String, userId: String) -> NKError {
  210. guard let data = json.data(using: .utf8),
  211. let directoryTop = NCUtility.shared.getDirectoryE2EETop(serverUrl: serverUrl, account: account) else {
  212. return NKError(errorCode: NCGlobal.shared.errorE2EEKeyDecodeMetadata, errorDescription: "_e2e_error_")
  213. }
  214. func addE2eEncryption(fileNameIdentifier: String, filename: String, authenticationTag: String, key: String, initializationVector: String, metadataKey: String, mimetype: String, blob: String) {
  215. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  216. let object = tableE2eEncryption.init(account: account, ocIdServerUrl: ocIdServerUrl, fileNameIdentifier: fileNameIdentifier)
  217. object.authenticationTag = authenticationTag
  218. object.blob = blob
  219. object.fileName = filename
  220. object.key = key
  221. object.initializationVector = initializationVector
  222. object.metadataKey = metadataKey
  223. object.mimeType = mimetype
  224. object.serverUrl = serverUrl
  225. // Write file parameter for decrypted on DB
  226. NCManageDatabase.shared.addE2eEncryption(object)
  227. // Update metadata on tableMetadata
  228. metadata.fileNameView = filename
  229. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: filename, mimeType: metadata.contentType, directory: metadata.directory)
  230. metadata.contentType = results.mimeType
  231. metadata.iconName = results.iconName
  232. metadata.classFile = results.classFile
  233. NCManageDatabase.shared.addMetadata(metadata)
  234. }
  235. }
  236. do {
  237. let json = try JSONDecoder().decode(E2eeV20.self, from: data)
  238. let metadata = json.metadata
  239. let users = json.users
  240. let filesdrop = json.filedrop
  241. let version = json.version as String? ?? NCGlobal.shared.e2eeVersionV20
  242. // SAVE IN DB ALL USER
  243. //
  244. if let users {
  245. for user in users {
  246. var metadataKey: Data?
  247. if let encryptedMetadataKey = user.encryptedMetadataKey {
  248. let data = Data(base64Encoded: encryptedMetadataKey)
  249. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: CCUtility.getEndToEndPrivateKey(account)) {
  250. metadataKey = decrypted
  251. }
  252. }
  253. NCManageDatabase.shared.addE2EUsers(account: account, serverUrl: serverUrl, ocIdServerUrl: ocIdServerUrl, userId: user.userId, certificate: user.certificate, encryptedMetadataKey: user.encryptedMetadataKey, metadataKey: metadataKey)
  254. }
  255. }
  256. // GET metadataKey, decryptedMetadataKey
  257. //
  258. guard let objUsers = NCManageDatabase.shared.getE2EUsers(account: account, ocIdServerUrl: directoryTop.ocId, userId: userId),
  259. let metadataKey = objUsers.metadataKey?.base64EncodedString(),
  260. let decryptedMetadataKey = objUsers.metadataKey else {
  261. return NKError(errorCode: NCGlobal.shared.errorE2EENoUserFound, errorDescription: "_e2e_error_")
  262. }
  263. // SIGNATURE CHECK
  264. //
  265. guard let signature,
  266. verifySignature(account: account, signature: signature, userId: objUsers.userId, metadata: metadata, users: users, version: version, certificate: objUsers.certificate) else {
  267. return NKError(errorCode: NCGlobal.shared.errorE2EEKeyVerifySignature, errorDescription: "_e2e_error_")
  268. }
  269. // FILEDROP
  270. /*
  271. if let filesdrop, let filedropKey = tableE2eUsersV2.filedropKey?.base64EncodedString() {
  272. for filedrop in filesdrop {
  273. guard let decryptedFiledrop = NCEndToEndEncryption.sharedManager().decryptPayloadFile(filedrop.ciphertext, key: filedropKey, initializationVector: filedrop.nonce, authenticationTag: filedrop.authenticationTag),
  274. decryptedFiledrop.isGzipped else {
  275. return NKError(errorCode: NCGlobal.shared.errorE2EEKeyFiledropCiphertext, errorDescription: "_e2e_error_")
  276. }
  277. let data = try decryptedFiledrop.gunzipped()
  278. if let jsonText = String(data: data, encoding: .utf8) { print(jsonText) }
  279. let file = try JSONDecoder().decode(E2eeV20.Files.self, from: data)
  280. print(file)
  281. addE2eEncryption(fileNameIdentifier: file.key, filename: file.filename, authenticationTag: file.authenticationTag, key: file.key, initializationVector: file.nonce, metadataKey: filedropKey, mimetype: file.mimetype, blob: "filedrop")
  282. }
  283. }
  284. */
  285. // CIPHERTEXT METADATA
  286. //
  287. guard let decryptedMetadata = NCEndToEndEncryption.sharedManager().decryptPayloadFile(metadata.ciphertext, key: metadataKey, initializationVector: metadata.nonce, authenticationTag: metadata.authenticationTag),
  288. decryptedMetadata.isGzipped else {
  289. return NKError(errorCode: NCGlobal.shared.errorE2EEKeyCiphertext, errorDescription: "_e2e_error_")
  290. }
  291. let data = try decryptedMetadata.gunzipped()
  292. if let jsonText = String(data: data, encoding: .utf8) { print(jsonText) }
  293. let jsonCiphertextMetadata = try JSONDecoder().decode(E2eeV20.ciphertext.self, from: data)
  294. // CHECKSUM CHECK
  295. //
  296. guard let keyChecksums = jsonCiphertextMetadata.keyChecksums,
  297. let hash = NCEndToEndEncryption.sharedManager().createSHA256(decryptedMetadataKey),
  298. keyChecksums.contains(hash) else {
  299. return NKError(errorCode: NCGlobal.shared.errorE2EEKeyChecksums, errorDescription: NSLocalizedString("_e2e_error_", comment: ""))
  300. }
  301. print("\n\nCOUNTER -------------------------------")
  302. print("Counter: \(jsonCiphertextMetadata.counter)")
  303. // COUNTER CHECK
  304. //
  305. if let resultCounter = NCManageDatabase.shared.getCounterE2eMetadata(account: account, ocIdServerUrl: ocIdServerUrl) {
  306. print("Counter saved: \(resultCounter)")
  307. if jsonCiphertextMetadata.counter < resultCounter {
  308. // TODO: whats happen with < ?
  309. NCContentPresenter.shared.showError(error: NKError(errorCode: NCGlobal.shared.errorE2EECounter, errorDescription: NSLocalizedString("_e2e_error_", comment: "")))
  310. } else if jsonCiphertextMetadata.counter > resultCounter {
  311. print("Counter UPDATED: \(jsonCiphertextMetadata.counter)")
  312. NCManageDatabase.shared.updateCounterE2eMetadata(account: account, ocIdServerUrl: ocIdServerUrl, counter: jsonCiphertextMetadata.counter)
  313. }
  314. } else {
  315. print("Counter RESET: \(jsonCiphertextMetadata.counter)")
  316. NCManageDatabase.shared.updateCounterE2eMetadata(account: account, ocIdServerUrl: ocIdServerUrl, counter: jsonCiphertextMetadata.counter)
  317. }
  318. // DELETE CHECK
  319. //
  320. if let deleted = jsonCiphertextMetadata.deleted, deleted {
  321. // TODO: We need to check deleted, id yes ???
  322. }
  323. NCManageDatabase.shared.addE2eMetadata(account: account,
  324. serverUrl: serverUrl,
  325. ocIdServerUrl: ocIdServerUrl,
  326. keyChecksums: jsonCiphertextMetadata.keyChecksums,
  327. deleted: jsonCiphertextMetadata.deleted ?? false,
  328. folders: jsonCiphertextMetadata.folders,
  329. version: version)
  330. if let files = jsonCiphertextMetadata.files {
  331. print("\nFILES ---------------------------------\n")
  332. for file in files {
  333. addE2eEncryption(fileNameIdentifier: file.key, filename: file.value.filename, authenticationTag: file.value.authenticationTag, key: file.value.key, initializationVector: file.value.nonce, metadataKey: metadataKey, mimetype: file.value.mimetype, blob: "files")
  334. print("filename: \(file.value.filename)")
  335. print("fileNameIdentifier: \(file.key)")
  336. print("mimetype: \(file.value.mimetype)")
  337. print("\n")
  338. }
  339. }
  340. if let folders = jsonCiphertextMetadata.folders {
  341. print("FOLDERS--------------------------------\n")
  342. for folder in folders {
  343. addE2eEncryption(fileNameIdentifier: folder.key, filename: folder.value, authenticationTag: metadata.authenticationTag, key: metadataKey, initializationVector: metadata.nonce, metadataKey: metadataKey, mimetype: "httpd/unix-directory", blob: "folders")
  344. print("filename: \(folder.value)")
  345. print("fileNameIdentifier: \(folder.key)")
  346. print("\n")
  347. }
  348. }
  349. print("---------------------------------------\n\n")
  350. } catch let error {
  351. return NKError(errorCode: NCGlobal.shared.errorE2EEJSon, errorDescription: error.localizedDescription)
  352. }
  353. return NKError()
  354. }
  355. // MARK: -
  356. func createSignature(account: String, userId: String, metadata: E2eeV20.Metadata, users: [E2eeV20.Users]?, version: String, certificate: String) -> String? {
  357. guard let users else { return nil }
  358. var usersSignatureCodable: [E2eeV20Signature.Users] = []
  359. for user in users {
  360. usersSignatureCodable.append(E2eeV20Signature.Users(userId: user.userId, certificate: user.certificate, encryptedMetadataKey: user.encryptedMetadataKey))
  361. }
  362. let signatureCodable = E2eeV20Signature(metadata: E2eeV20Signature.Metadata(ciphertext: metadata.ciphertext, nonce: metadata.nonce, authenticationTag: metadata.authenticationTag), users: usersSignatureCodable, version: version)
  363. do {
  364. let jsonEncoder = JSONEncoder()
  365. let json = try jsonEncoder.encode(signatureCodable)
  366. let dataSerialization = try JSONSerialization.jsonObject(with: json, options: [])
  367. let decoded = try? JSONSerialization.data(withJSONObject: dataSerialization, options: [.sortedKeys, .withoutEscapingSlashes])
  368. let base64 = decoded!.base64EncodedString()
  369. if let base64Data = base64.data(using: .utf8),
  370. let signatureData = NCEndToEndEncryption.sharedManager().generateSignatureCMS(base64Data, certificate: certificate, privateKey: CCUtility.getEndToEndPrivateKey(account), userId: userId) {
  371. return signatureData.base64EncodedString()
  372. }
  373. } catch {
  374. print("Error: \(error.localizedDescription)")
  375. }
  376. return nil
  377. }
  378. func verifySignature(account: String, signature: String, userId: String, metadata: E2eeV20.Metadata, users: [E2eeV20.Users]?, version: String, certificate: String) -> Bool {
  379. guard let users else { return false }
  380. var usersSignatureCodable: [E2eeV20Signature.Users] = []
  381. for user in users {
  382. usersSignatureCodable.append(E2eeV20Signature.Users(userId: user.userId, certificate: user.certificate, encryptedMetadataKey: user.encryptedMetadataKey))
  383. }
  384. let signatureCodable = E2eeV20Signature(metadata: E2eeV20Signature.Metadata(ciphertext: metadata.ciphertext, nonce: metadata.nonce, authenticationTag: metadata.authenticationTag), users: usersSignatureCodable, version: version)
  385. do {
  386. let jsonEncoder = JSONEncoder()
  387. let json = try jsonEncoder.encode(signatureCodable)
  388. let dataSerialization = try JSONSerialization.jsonObject(with: json, options: [])
  389. let decoded = try? JSONSerialization.data(withJSONObject: dataSerialization, options: [.sortedKeys, .withoutEscapingSlashes])
  390. let base64 = decoded!.base64EncodedString()
  391. if let base64Data = base64.data(using: .utf8),
  392. let signatureData = Data(base64Encoded: signature) {
  393. let certificates = users.map { $0.certificate }
  394. return NCEndToEndEncryption.sharedManager().verifySignatureCMS(signatureData, data: base64Data, certificates: certificates)
  395. }
  396. } catch {
  397. print("Error: \(error.localizedDescription)")
  398. }
  399. return false
  400. }
  401. }