NCEndToEndMetadata.swift 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736
  1. //
  2. // NCEndToEndMetadata.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 13/11/17.
  6. // Copyright © 2017 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import UIKit
  24. import NextcloudKit
  25. import Gzip
  26. class NCEndToEndMetadata: NSObject {
  27. struct E2eeV1: Codable {
  28. struct Metadata: Codable {
  29. let metadataKeys: [String: String]
  30. let version: Double
  31. }
  32. struct Encrypted: Codable {
  33. let key: String
  34. let filename: String
  35. let mimetype: String
  36. }
  37. struct Files: Codable {
  38. let initializationVector: String
  39. let authenticationTag: String?
  40. let metadataKey: Int
  41. let encrypted: String
  42. }
  43. let metadata: Metadata
  44. let files: [String: Files]?
  45. }
  46. struct E2eeV12: Codable {
  47. struct Metadata: Codable {
  48. let metadataKey: String
  49. let version: Double
  50. let checksum: String?
  51. }
  52. struct Encrypted: Codable {
  53. let key: String
  54. let filename: String
  55. let mimetype: String
  56. }
  57. struct Files: Codable {
  58. let initializationVector: String
  59. let authenticationTag: String?
  60. let encrypted: String
  61. }
  62. struct Filedrop: Codable {
  63. let initializationVector: String
  64. let authenticationTag: String?
  65. let encrypted: String
  66. let encryptedKey: String?
  67. let encryptedTag: String?
  68. let encryptedInitializationVector: String?
  69. }
  70. let metadata: Metadata
  71. let files: [String: Files]?
  72. let filedrop: [String: Filedrop]?
  73. }
  74. struct E2eeV20: Codable {
  75. struct Metadata: Codable {
  76. let ciphertext: String
  77. let nonce: String
  78. let authenticationTag: String
  79. let counter: Double?
  80. }
  81. struct Users: Codable {
  82. let userId: String
  83. let certificate: String
  84. let encryptedMetadataKey: String?
  85. let encryptedFiledropKey: String?
  86. }
  87. struct Filedrop: Codable {
  88. let ciphertext: String?
  89. let nonce: String?
  90. let authenticationTag: String?
  91. let users: [String: UsersFiledrop]?
  92. struct UsersFiledrop: Codable {
  93. let userId: String?
  94. let encryptedFiledropKey: String?
  95. }
  96. }
  97. let metadata: Metadata
  98. let users: [Users]
  99. let filedrop: [String: Filedrop]?
  100. let version: String
  101. }
  102. // --------------------------------------------------------------------------------------------
  103. // MARK: Encode JSON Metadata Bridge
  104. // --------------------------------------------------------------------------------------------
  105. func encoderMetadata(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> (metadata: String?, signature: String?) {
  106. let e2EEApiVersion = NCGlobal.shared.capabilityE2EEApiVersion
  107. switch e2EEApiVersion {
  108. case "1.2":
  109. return encoderMetadataV12(items, account: account, serverUrl: serverUrl)
  110. case "2.0":
  111. return encoderMetadataV20(items, account: account, serverUrl: serverUrl)
  112. default:
  113. return (nil, nil)
  114. }
  115. }
  116. // --------------------------------------------------------------------------------------------
  117. // MARK: Ecode JSON Metadata V1.2
  118. // --------------------------------------------------------------------------------------------
  119. func encoderMetadataV12(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> (metadata: String?, signature: String?) {
  120. let encoder = JSONEncoder()
  121. var metadataKey: String = ""
  122. let metadataVersion = 1.2
  123. var files: [String: E2eeV12.Files] = [:]
  124. var filesCodable: [String: E2eeV12.Files]?
  125. var filedrop: [String: E2eeV12.Filedrop] = [:]
  126. var filedropCodable: [String: E2eeV12.Filedrop]?
  127. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  128. var fileNameIdentifiers: [String] = []
  129. // let shortVersion: String = Bundle.main.infoDictionary?["CFBundleShortVersionString"] as? String ?? ""
  130. // var filesCodable: [String: E2eeV12.Files] = [String: E2eeV12.Files]()
  131. // var filedropCodable: [String: E2eeV12.Filedrop] = [String: E2eeV12.Filedrop]()
  132. //
  133. // metadata
  134. //
  135. if items.isEmpty, let key = NCEndToEndEncryption.sharedManager()?.generateKey() as? NSData {
  136. if let key = key.base64EncodedString().data(using: .utf8)?.base64EncodedString(),
  137. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(key, publicKey: nil, privateKey: privateKey) {
  138. metadataKey = metadataKeyEncrypted.base64EncodedString()
  139. }
  140. } else if let metadatakey = (items.first!.metadataKey.data(using: .utf8)?.base64EncodedString()),
  141. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadatakey, publicKey: nil, privateKey: privateKey) {
  142. metadataKey = metadataKeyEncrypted.base64EncodedString()
  143. }
  144. for item in items {
  145. //
  146. // files
  147. //
  148. if item.blob == "files" {
  149. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  150. do {
  151. // Create "encrypted"
  152. let json = try encoder.encode(encrypted)
  153. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(String(data: json, encoding: .utf8), key: item.metadataKey) {
  154. let record = E2eeV12.Files(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted)
  155. files.updateValue(record, forKey: item.fileNameIdentifier)
  156. }
  157. fileNameIdentifiers.append(item.fileNameIdentifier)
  158. } catch let error {
  159. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  160. return (nil, nil)
  161. }
  162. }
  163. //
  164. // filedrop
  165. //
  166. if item.blob == "filedrop" {
  167. var encryptedKey: String?
  168. var encryptedInitializationVector: NSString?
  169. var encryptedTag: NSString?
  170. if let metadataKeyFiledrop = (item.metadataKeyFiledrop.data(using: .utf8)?.base64EncodedString()),
  171. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(metadataKeyFiledrop, publicKey: nil, privateKey: privateKey) {
  172. encryptedKey = metadataKeyEncrypted.base64EncodedString()
  173. }
  174. let encrypted = E2eeV12.Encrypted(key: item.key, filename: item.fileName, mimetype: item.mimeType)
  175. do {
  176. // Create "encrypted"
  177. let json = try encoder.encode(encrypted)
  178. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(String(data: json, encoding: .utf8), key: item.metadataKeyFiledrop, initializationVector: &encryptedInitializationVector, authenticationTag: &encryptedTag) {
  179. let record = E2eeV12.Filedrop(initializationVector: item.initializationVector, authenticationTag: item.authenticationTag, encrypted: encrypted, encryptedKey: encryptedKey, encryptedTag: encryptedTag as? String, encryptedInitializationVector: encryptedInitializationVector as? String)
  180. filedrop.updateValue(record, forKey: item.fileNameIdentifier)
  181. }
  182. } catch let error {
  183. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  184. return (nil, nil)
  185. }
  186. }
  187. }
  188. // Create checksum
  189. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  190. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(passphrase + fileNameIdentifiers.sorted().joined() + metadataKey)
  191. // Create Json
  192. let metadata = E2eeV12.Metadata(metadataKey: metadataKey, version: metadataVersion, checksum: checksum)
  193. if !files.isEmpty { filesCodable = files }
  194. if !filedrop.isEmpty { filedropCodable = filedrop }
  195. let e2ee = E2eeV12(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  196. do {
  197. let data = try encoder.encode(e2ee)
  198. data.printJson()
  199. let jsonString = String(data: data, encoding: .utf8)
  200. // Updated metadata to 1.2
  201. if NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) == nil {
  202. NCManageDatabase.shared.setE2eMetadata(account: account, serverUrl: serverUrl, metadataKey: metadataKey, version: metadataVersion)
  203. }
  204. return (jsonString, nil)
  205. } catch let error {
  206. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  207. return (nil, nil)
  208. }
  209. }
  210. // --------------------------------------------------------------------------------------------
  211. // MARK: Ecode JSON Metadata V2.0
  212. // --------------------------------------------------------------------------------------------
  213. func encoderMetadataV20(_ items: [tableE2eEncryption], account: String, serverUrl: String) -> (metadata: String?, signature: String?) {
  214. return (nil, nil)
  215. }
  216. // --------------------------------------------------------------------------------------------
  217. // MARK: Decode JSON Metadata Bridge
  218. // --------------------------------------------------------------------------------------------
  219. func decoderMetadata(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> NKError {
  220. guard let data = json.data(using: .utf8) else {
  221. return (NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON"))
  222. }
  223. data.printJson()
  224. let decoder = JSONDecoder()
  225. if (try? decoder.decode(E2eeV1.self, from: data)) != nil {
  226. return decoderMetadataV1(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId)
  227. } else if (try? decoder.decode(E2eeV12.self, from: data)) != nil {
  228. return decoderMetadataV12(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  229. } else if (try? decoder.decode(E2eeV20.self, from: data)) != nil {
  230. return decoderMetadataV20(json, serverUrl: serverUrl, account: account, urlBase: urlBase, userId: userId, ownerId: ownerId)
  231. } else {
  232. return NKError(errorCode: NCGlobal.shared.errorInternalError, errorDescription: "Server E2EE version " + NCGlobal.shared.capabilityE2EEApiVersion + ", not compatible")
  233. }
  234. }
  235. // --------------------------------------------------------------------------------------------
  236. // MARK: Decode JSON Metadata V2.0
  237. // --------------------------------------------------------------------------------------------
  238. func decoderMetadataV20(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> NKError {
  239. guard let data = json.data(using: .utf8) else {
  240. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  241. }
  242. func addE2eEncryption(fileNameIdentifier: String, filename: String, authenticationTag: String?, key: String, initializationVector: String, metadataKey: String, mimetype: String) {
  243. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  244. let object = tableE2eEncryption()
  245. object.account = account
  246. object.authenticationTag = authenticationTag ?? ""
  247. object.blob = "files"
  248. object.fileName = filename
  249. object.fileNameIdentifier = fileNameIdentifier
  250. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  251. object.key = key
  252. object.initializationVector = initializationVector
  253. object.metadataKey = metadataKey
  254. object.mimeType = mimetype
  255. object.serverUrl = serverUrl
  256. // Write file parameter for decrypted on DB
  257. NCManageDatabase.shared.addE2eEncryption(object)
  258. // Update metadata on tableMetadata
  259. metadata.fileNameView = filename
  260. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: filename, mimeType: metadata.contentType, directory: metadata.directory)
  261. metadata.contentType = results.mimeType
  262. metadata.iconName = results.iconName
  263. metadata.classFile = results.classFile
  264. NCManageDatabase.shared.addMetadata(metadata)
  265. }
  266. }
  267. let decoder = JSONDecoder()
  268. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  269. do {
  270. let json = try decoder.decode(E2eeV20.self, from: data)
  271. let metadata = json.metadata
  272. let users = json.users
  273. let filedrop = json.filedrop
  274. let version = json.version as String? ?? "2.0"
  275. // DATA
  276. NCManageDatabase.shared.deleteE2eMetadataV2(account: account, serverUrl: serverUrl)
  277. NCManageDatabase.shared.deleteE2EUsersV2(account: account, serverUrl: serverUrl)
  278. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  279. //
  280. // users
  281. //
  282. for user in users {
  283. var decryptedMetadataKey: Data?
  284. var decryptedFiledropKey: Data?
  285. var metadataKey: String?
  286. var filedropKey: String?
  287. if let encryptedMetadataKey = user.encryptedMetadataKey {
  288. let data = Data(base64Encoded: encryptedMetadataKey)
  289. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  290. decryptedMetadataKey = decrypted
  291. metadataKey = decrypted.base64EncodedString()
  292. }
  293. }
  294. if let encryptedFiledropKey = user.encryptedFiledropKey {
  295. let data = Data(base64Encoded: encryptedFiledropKey)
  296. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  297. decryptedFiledropKey = decrypted
  298. filedropKey = decrypted.base64EncodedString()
  299. }
  300. }
  301. NCManageDatabase.shared.setE2EUsersV2(account: account, serverUrl: serverUrl, userId: user.userId, certificate: user.certificate, encryptedFiledropKey: user.encryptedFiledropKey, encryptedMetadataKey: user.encryptedMetadataKey, decryptedFiledropKey: decryptedFiledropKey, decryptedMetadataKey: decryptedMetadataKey, filedropKey: filedropKey, metadataKey: metadataKey)
  302. }
  303. //
  304. // metadata
  305. //
  306. if let tableE2eUsersV2 = NCManageDatabase.shared.getE2EUsersV2(account: account, serverUrl: serverUrl, userId: userId), let metadataKey = tableE2eUsersV2.metadataKey {
  307. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(metadata.ciphertext, key: tableE2eUsersV2.metadataKey, initializationVector: metadata.nonce, authenticationTag: metadata.authenticationTag) {
  308. if decrypted.isGzipped {
  309. do {
  310. let data = try decrypted.gunzipped()
  311. if let jsonText = String(data: data, encoding: .utf8) {
  312. print(jsonText)
  313. }
  314. if let json = try JSONSerialization.jsonObject(with: data) as? [String: AnyObject] {
  315. let keyChecksums = json["keyChecksums"] as? [String]
  316. let deleted = json["deleted"] as? Bool ?? false
  317. let counter = json["counter"] as? Int ?? 0
  318. // Signature
  319. if let keyChecksums,
  320. let hash = NCEndToEndEncryption.sharedManager().createSHA256(from: tableE2eUsersV2.decryptedMetadataKey),
  321. !keyChecksums.contains(hash) {
  322. return NKError(errorCode: NCGlobal.shared.errorE2EEKeyChecksums, errorDescription: NSLocalizedString("_e3ee_keyChecksum_", comment: ""))
  323. }
  324. NCManageDatabase.shared.setE2eMetadataV2(account: account, serverUrl: serverUrl, keyChecksums: keyChecksums, deleted: deleted, counter: counter, folders: json["folders"] as? [String: String], version: version)
  325. if let files = json["files"] as? [String: Any] {
  326. for file in files {
  327. let uid = file.key
  328. if let dic = file.value as? [String: String] {
  329. if let authenticationTag = dic["authenticationTag"],
  330. let nonce = dic["nonce"],
  331. let mimetype = dic["mimetype"],
  332. let key = dic["key"],
  333. let filename = dic["filename"] {
  334. addE2eEncryption(fileNameIdentifier: uid, filename: filename, authenticationTag: authenticationTag, key: key, initializationVector: nonce, metadataKey: metadataKey, mimetype: mimetype)
  335. }
  336. }
  337. }
  338. }
  339. if let folders = json["folders"] as? [String: String] {
  340. for folder in folders {
  341. addE2eEncryption(fileNameIdentifier: folder.key, filename: folder.value, authenticationTag: metadata.authenticationTag, key: metadataKey, initializationVector: metadata.nonce, metadataKey: metadataKey, mimetype: "httpd/unix-directory")
  342. }
  343. }
  344. }
  345. } catch let error {
  346. print("Serious internal error in decoding metadata (" + error.localizedDescription + ")")
  347. }
  348. } else {
  349. print("Serious internal error in decoding metadata")
  350. }
  351. }
  352. }
  353. /* TEST CMS
  354. if let cmsData = NCEndToEndEncryption.sharedManager().generateSignatureCMS(data, certificate: CCUtility.getEndToEndCertificate(account), privateKey: CCUtility.getEndToEndPrivateKey(account), publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId) {
  355. let cms = cmsData.base64EncodedString()
  356. print(cms)
  357. let cmsTest = "MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMAsGCSqGSIb3DQEHAaCAMIIDpzCCAo+gAwIBAgIBADANBgkqhkiG9w0BAQUFADBuMRowGAYDVQQDDBF3d3cubmV4dGNsb3VkLmNvbTESMBAGA1UECgwJTmV4dGNsb3VkMRIwEAYDVQQHDAlTdHV0dGdhcnQxGzAZBgNVBAgMEkJhZGVuLVd1ZXJ0dGVtYmVyZzELMAkGA1UEBhMCREUwHhcNMTcwOTI2MTAwNDMwWhcNMzcwOTIxMTAwNDMwWjBuMRowGAYDVQQDDBF3d3cubmV4dGNsb3VkLmNvbTESMBAGA1UECgwJTmV4dGNsb3VkMRIwEAYDVQQHDAlTdHV0dGdhcnQxGzAZBgNVBAgMEkJhZGVuLVd1ZXJ0dGVtYmVyZzELMAkGA1UEBhMCREUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDsn0JKS/THu328z1IgN0VzYU53HjSX03WJIgWkmyTaxbiKpoJaKbksXmfSpgzVGzKFvGfZ03fwFrN7Q8P8R2e8SNiell7mh1TDw9/0P7Bt/ER8PJrXORo+GviKHxaLr7Y0BJX9i/nW/L0L/VaE8CZTAqYBdcSJGgHJjY4UMf892ZPTa9T2Dl3ggdMZ7BQ2kiCiCC3qV99b0igRJGmmLQaGiAflhFzuDQPMifUMq75wI8RSRPdxUAtjTfkl68QHu7Umyeyy33OQgdUKaTl5zcS3VSQbNjveVCNM4RDH1RlEc+7Wf1BY8APqT6jbiBcROJD2CeoLH2eiIJCi+61ZkSGfAgMBAAGjUDBOMB0GA1UdDgQWBBTFrXz2tk1HivD9rQ75qeoyHrAgIjAfBgNVHSMEGDAWgBTFrXz2tk1HivD9rQ75qeoyHrAgIjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBBQUAA4IBAQARQTX21QKO77gAzBszFJ6xVnjfa23YZF26Z4X1KaM8uV8TGzuNJA95XmReeP2iO3r8EWXS9djVCD64m2xx6FOsrUI8HZaw1JErU8mmOaLAe8q9RsOm9Eq37e4vFp2YUEInYUqs87ByUcA4/8g3lEYeIUnRsRsWsA45S3wD7wy07t+KAn7jyMmfxdma6hFfG9iN/egN6QXUAyIPXvUvlUuZ7/BhWBj/3sHMrF9quy9Q2DOI8F3t1wdQrkq4BtStKhciY5AIXz9SqsctFHTv4Lwgtkapoel4izJnO0ZqYTXVe7THwri9H/gua6uJDWH9jk2/CiZDWfsyFuNUuXvDSp05AAAxggIlMIICIQIBATBzMG4xGjAYBgNVBAMMEXd3dy5uZXh0Y2xvdWQuY29tMRIwEAYDVQQKDAlOZXh0Y2xvdWQxEjAQBgNVBAcMCVN0dXR0Z2FydDEbMBkGA1UECAwSQmFkZW4tV3VlcnR0ZW1iZXJnMQswCQYDVQQGEwJERQIBADAJBgUrDgMCGgUAoIGIMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTIzMDUxMDA4NDYxOVowIwYJKoZIhvcNAQkEMRYEFKlnk+/ov3trKM1XlXzkC65w0BgeMCkGCSqGSIb3DQEJNDEcMBowCQYFKw4DAhoFAKENBgkqhkiG9w0BAQEFADANBgkqhkiG9w0BAQEFAASCAQAvEpKP2xYZh8C3baa9CXumMaUrtp5Ez0nKuFAoQEDMxRDsqoRnKDiJQDITaG4s79Pxj61OUU2YTyM5BATCP6Hag/mqvTEXyPy06E09bcGjNoeZi/unCCyuc77M3rlUOgdP03l+BxQ0lPDlX2N2cAhiDzsMiAbcYhrsYo9aX2ue4O3emp4InfHqVEQaMxsVb0OZH1coxazvGLk5UougrGESigbFhZq2CLMpo/B2WU774YaZ2TRbpDObPl5wl4dV43pPmIQtp7Z90Io93G7JthFgrVNVerIrAyiqrZSLAGTzIRdhvwolf1Ole87bP8zrlb6oHvZt0DqOtOP0fk9wY9ibAAAAAAAA"
  358. let data = Data(base64Encoded: cmsTest)
  359. NCEndToEndEncryption.sharedManager().verifySignatureCMS(data, data: nil, publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId)
  360. }
  361. */
  362. } catch let error {
  363. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  364. }
  365. return NKError()
  366. }
  367. // --------------------------------------------------------------------------------------------
  368. // MARK: Decode JSON Metadata V1.2
  369. // --------------------------------------------------------------------------------------------
  370. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> NKError {
  371. guard let data = json.data(using: .utf8) else {
  372. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  373. }
  374. let decoder = JSONDecoder()
  375. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  376. var metadataVersion: Double = 0
  377. var metadataKey = ""
  378. do {
  379. let json = try decoder.decode(E2eeV12.self, from: data)
  380. let metadata = json.metadata
  381. let files = json.files
  382. let filedrop = json.filedrop
  383. var fileNameIdentifiers: [String] = []
  384. metadataVersion = metadata.version
  385. //
  386. // metadata
  387. //
  388. let data = Data(base64Encoded: metadata.metadataKey)
  389. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  390. let keyData = Data(base64Encoded: decrypted),
  391. let key = String(data: keyData, encoding: .utf8) {
  392. metadataKey = key
  393. } else {
  394. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt metadataKey")
  395. }
  396. // DATA
  397. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  398. //
  399. // files
  400. //
  401. if let files = files {
  402. for file in files {
  403. let fileNameIdentifier = file.key
  404. let files = file.value as E2eeV12.Files
  405. let encrypted = files.encrypted
  406. let authenticationTag = files.authenticationTag
  407. let initializationVector = files.initializationVector
  408. fileNameIdentifiers.append(fileNameIdentifier)
  409. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  410. let decryptedData = Data(base64Encoded: decrypted) {
  411. do {
  412. decryptedData.printJson()
  413. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  414. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  415. let object = tableE2eEncryption()
  416. object.account = account
  417. object.authenticationTag = authenticationTag ?? ""
  418. object.blob = "files"
  419. object.fileName = encrypted.filename
  420. object.fileNameIdentifier = fileNameIdentifier
  421. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  422. object.key = encrypted.key
  423. object.initializationVector = initializationVector
  424. object.metadataKey = metadataKey
  425. object.metadataVersion = metadataVersion
  426. object.mimeType = encrypted.mimetype
  427. object.serverUrl = serverUrl
  428. // Write file parameter for decrypted on DB
  429. NCManageDatabase.shared.addE2eEncryption(object)
  430. // Update metadata on tableMetadata
  431. metadata.fileNameView = encrypted.filename
  432. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  433. metadata.contentType = results.mimeType
  434. metadata.iconName = results.iconName
  435. metadata.classFile = results.classFile
  436. NCManageDatabase.shared.addMetadata(metadata)
  437. }
  438. } catch let error {
  439. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription)
  440. }
  441. }
  442. }
  443. }
  444. //
  445. // filedrop
  446. //
  447. if let filedrop = filedrop {
  448. for filedrop in filedrop {
  449. let fileNameIdentifier = filedrop.key
  450. let filedrop = filedrop.value as E2eeV12.Filedrop
  451. var metadataKeyFiledrop: String?
  452. if let encryptedKey = filedrop.encryptedKey,
  453. let data = Data(base64Encoded: encryptedKey),
  454. let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  455. let keyData = Data(base64Encoded: decrypted)
  456. metadataKeyFiledrop = String(data: keyData!, encoding: .utf8)
  457. }
  458. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(filedrop.encrypted, key: metadataKeyFiledrop, initializationVector: filedrop.encryptedInitializationVector, authenticationTag: filedrop.encryptedTag),
  459. let decryptedData = Data(base64Encoded: decrypted) {
  460. do {
  461. decryptedData.printJson()
  462. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  463. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  464. let object = tableE2eEncryption()
  465. object.account = account
  466. object.authenticationTag = filedrop.authenticationTag ?? ""
  467. object.blob = "filedrop"
  468. object.fileName = encrypted.filename
  469. object.fileNameIdentifier = fileNameIdentifier
  470. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  471. object.key = encrypted.key
  472. object.metadataKeyFiledrop = metadataKeyFiledrop ?? ""
  473. object.initializationVector = filedrop.initializationVector
  474. object.metadataKey = metadataKey
  475. object.metadataVersion = metadataVersion
  476. object.mimeType = encrypted.mimetype
  477. object.serverUrl = serverUrl
  478. // Write file parameter for decrypted on DB
  479. NCManageDatabase.shared.addE2eEncryption(object)
  480. // Update metadata on tableMetadata
  481. metadata.fileNameView = encrypted.filename
  482. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  483. metadata.contentType = results.mimeType
  484. metadata.iconName = results.iconName
  485. metadata.classFile = results.classFile
  486. NCManageDatabase.shared.addMetadata(metadata)
  487. }
  488. } catch let error {
  489. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt filedrop: " + error.localizedDescription)
  490. }
  491. }
  492. }
  493. }
  494. // verify checksum
  495. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  496. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(passphrase + fileNameIdentifiers.sorted().joined() + metadata.metadataKey)
  497. if metadata.checksum != checksum {
  498. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error checksum")
  499. }
  500. } catch let error {
  501. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  502. }
  503. return NKError()
  504. }
  505. // --------------------------------------------------------------------------------------------
  506. // MARK: Decode JSON Metadata V1.1
  507. // --------------------------------------------------------------------------------------------
  508. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String) -> NKError {
  509. guard let data = json.data(using: .utf8) else {
  510. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  511. }
  512. let decoder = JSONDecoder()
  513. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  514. var metadataVersion: Double = 0
  515. do {
  516. let json = try decoder.decode(E2eeV1.self, from: data)
  517. let metadata = json.metadata
  518. let files = json.files
  519. var metadataKeys: [String: String] = [:]
  520. metadataVersion = metadata.version
  521. // DATA
  522. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  523. //
  524. // metadata
  525. //
  526. for metadataKey in metadata.metadataKeys {
  527. let data = Data(base64Encoded: metadataKey.value)
  528. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  529. let keyData = Data(base64Encoded: decrypted) {
  530. let key = String(data: keyData, encoding: .utf8)
  531. metadataKeys[metadataKey.key] = key
  532. }
  533. }
  534. //
  535. // verify version
  536. //
  537. if let tableE2eMetadata = NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) {
  538. if tableE2eMetadata.version > metadataVersion {
  539. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error verify version \(tableE2eMetadata.version)")
  540. }
  541. }
  542. //
  543. // files
  544. //
  545. if let files = files {
  546. for files in files {
  547. let fileNameIdentifier = files.key
  548. let files = files.value as E2eeV1.Files
  549. let encrypted = files.encrypted
  550. let authenticationTag = files.authenticationTag
  551. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  552. let metadataKeyIndex = files.metadataKey
  553. let initializationVector = files.initializationVector
  554. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  555. let decryptedData = Data(base64Encoded: decrypted) {
  556. do {
  557. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  558. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  559. let object = tableE2eEncryption()
  560. object.account = account
  561. object.authenticationTag = authenticationTag ?? ""
  562. object.blob = "files"
  563. object.fileName = encrypted.filename
  564. object.fileNameIdentifier = fileNameIdentifier
  565. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  566. object.key = encrypted.key
  567. object.initializationVector = initializationVector
  568. object.metadataKey = metadataKey
  569. object.metadataKeyIndex = metadataKeyIndex
  570. object.metadataVersion = metadataVersion
  571. object.mimeType = encrypted.mimetype
  572. object.serverUrl = serverUrl
  573. // Write file parameter for decrypted on DB
  574. NCManageDatabase.shared.addE2eEncryption(object)
  575. // Update metadata on tableMetadata
  576. metadata.fileNameView = encrypted.filename
  577. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  578. metadata.contentType = results.mimeType
  579. metadata.iconName = results.iconName
  580. metadata.classFile = results.classFile
  581. NCManageDatabase.shared.addMetadata(metadata)
  582. }
  583. } catch let error {
  584. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription)
  585. }
  586. }
  587. }
  588. }
  589. } catch let error {
  590. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  591. }
  592. return NKError()
  593. }
  594. }