NCEndToEndMetadataV20.swift 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305
  1. //
  2. // NCEndToEndMetadataV20.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 09/08/23.
  6. // Copyright © 2023 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import Foundation
  24. import NextcloudKit
  25. import Gzip
  26. extension NCEndToEndMetadata {
  27. // --------------------------------------------------------------------------------------------
  28. // MARK: Ecode JSON Metadata V2.0
  29. // --------------------------------------------------------------------------------------------
  30. func encoderMetadataV20(account: String, serverUrl: String, userId: String) -> (metadata: String?, signature: String?) {
  31. guard let privateKey = CCUtility.getEndToEndPrivateKey(account),
  32. let publicKey = CCUtility.getEndToEndPublicKey(account),
  33. let certificate = CCUtility.getEndToEndCertificate(account) else {
  34. return (nil, nil)
  35. }
  36. var usersCodable: [E2eeV20.Users] = []
  37. var filedropCodable: [String: E2eeV20.Filedrop] = [:]
  38. var encryptedMetadataKey: String?
  39. var e2eeJson: String?
  40. var signature: String?
  41. if let user = NCManageDatabase.shared.getE2EUsersV2(account: account, serverUrl: serverUrl, userId: userId) {
  42. encryptedMetadataKey = user.encryptedMetadataKey
  43. } else {
  44. guard let keyGenerated = NCEndToEndEncryption.sharedManager()?.generateKey() as? Data else { return (nil, nil) }
  45. let key = keyGenerated.base64EncodedString().data(using: .utf8)?.base64EncodedString()
  46. guard let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricString(key, publicKey: nil, privateKey: privateKey) else { return (nil, nil) }
  47. encryptedMetadataKey = metadataKeyEncrypted.base64EncodedString()
  48. /* TEST */
  49. let data = Data(base64Encoded: encryptedMetadataKey!)
  50. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  51. if let keyData = Data(base64Encoded: decrypted) {
  52. print(String(data: keyData, encoding: .utf8))
  53. }
  54. let metadataKey = decrypted.base64EncodedString() // GIUSTA
  55. print(metadataKey)
  56. }
  57. NCManageDatabase.shared.addE2EUsersV2(account: account, serverUrl: serverUrl, userId: userId, certificate: certificate, encryptedFiledropKey: nil, encryptedMetadataKey: encryptedMetadataKey, decryptedFiledropKey: nil, decryptedMetadataKey: nil, filedropKey: nil, metadataKey: nil)
  58. }
  59. guard let encryptedMetadataKey else { return (nil, nil) }
  60. // Create E2eeV20.Users
  61. if let e2eUsers = NCManageDatabase.shared.getE2EUsersV2(account: account, serverUrl: serverUrl) {
  62. for user in e2eUsers {
  63. usersCodable.append(E2eeV20.Users(userId: user.userId, certificate: user.certificate, encryptedMetadataKey: user.encryptedMetadataKey, encryptedFiledropKey: user.encryptedFiledropKey))
  64. }
  65. }
  66. // tableE2eMetadataV2
  67. if NCManageDatabase.shared.getE2eMetadataV2(account: account, serverUrl: serverUrl) == nil {
  68. NCManageDatabase.shared.addE2eMetadataV2(account: account, serverUrl: serverUrl, keyChecksums: nil, deleted: false, counter: 1, folders: nil, version: "2.0")
  69. } else {
  70. NCManageDatabase.shared.incrementCounterE2eMetadataV2(account: account, serverUrl: serverUrl)
  71. }
  72. guard let e2eMetadataV2 = NCManageDatabase.shared.getE2eMetadataV2(account: account, serverUrl: serverUrl) else {
  73. return (nil, nil)
  74. }
  75. // Create ciphertext
  76. let e2eEncryptions = NCManageDatabase.shared.getE2eEncryptions(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  77. var filesCodable: [String: E2eeV20.Files] = [:]
  78. for e2eEncryption in e2eEncryptions {
  79. if e2eEncryption.blob == "files" {
  80. let file = E2eeV20.Files(authenticationTag: e2eEncryption.authenticationTag, filename: e2eEncryption.fileName, key: e2eEncryption.key, mimetype: e2eEncryption.mimeType, nonce: e2eEncryption.initializationVector)
  81. filesCodable.updateValue(file, forKey: e2eEncryption.fileNameIdentifier)
  82. }
  83. }
  84. var keyChecksums = Array(e2eMetadataV2.keyChecksums.map { $0 })
  85. if let hash = NCEndToEndEncryption.sharedManager().createSHA256(from: encryptedMetadataKey) {
  86. keyChecksums.append(hash)
  87. }
  88. let ciphertext = E2eeV20.ciphertext(counter: e2eMetadataV2.counter, deleted: false, keyChecksums: keyChecksums, files: filesCodable, folders: [:])
  89. var authenticationTag: NSString?
  90. var initializationVector: NSString?
  91. do {
  92. let json = try JSONEncoder().encode(ciphertext)
  93. let dataCiphertext = try json.gzipped()
  94. let base64Ciphertext = dataCiphertext.base64EncodedString()
  95. let ciphertext = NCEndToEndEncryption.sharedManager().encryptPayloadFile(base64Ciphertext, key: encryptedMetadataKey, initializationVector: &initializationVector, authenticationTag: &authenticationTag)
  96. guard let ciphertext, let initializationVector = initializationVector as? String, let authenticationTag = authenticationTag as? String else {
  97. return (nil, nil)
  98. }
  99. let metadataCodable = E2eeV20.Metadata(ciphertext: ciphertext, nonce: initializationVector, authenticationTag: authenticationTag)
  100. let e2eeCodable = E2eeV20(metadata: metadataCodable, users: usersCodable, filedrop: filedropCodable, version: "2.0")
  101. let e2eeData = try JSONEncoder().encode(e2eeCodable)
  102. e2eeData.printJson()
  103. e2eeJson = String(data: e2eeData, encoding: .utf8)
  104. print("")
  105. } catch let error {
  106. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  107. return (nil, nil)
  108. }
  109. // Signature
  110. if let e2eeJson {
  111. let dataMetadata = Data(base64Encoded: "e2eeJson")
  112. if let signatureData = NCEndToEndEncryption.sharedManager().generateSignatureCMS(dataMetadata, certificate: certificate, privateKey: privateKey, publicKey: publicKey, userId: userId) {
  113. signature = signatureData.base64EncodedString()
  114. }
  115. }
  116. return (e2eeJson, signature)
  117. }
  118. // --------------------------------------------------------------------------------------------
  119. // MARK: Decode JSON Metadata V2.0
  120. // --------------------------------------------------------------------------------------------
  121. func decoderMetadataV20(_ json: String, signature: String?, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> NKError {
  122. guard let data = json.data(using: .utf8) else {
  123. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  124. }
  125. func addE2eEncryption(fileNameIdentifier: String, filename: String, authenticationTag: String, key: String, initializationVector: String, metadataKey: String, mimetype: String) {
  126. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  127. let object = tableE2eEncryption()
  128. object.account = account
  129. object.authenticationTag = authenticationTag
  130. object.blob = "files"
  131. object.fileName = filename
  132. object.fileNameIdentifier = fileNameIdentifier
  133. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  134. object.key = key
  135. object.initializationVector = initializationVector
  136. object.metadataKey = metadataKey
  137. object.mimeType = mimetype
  138. object.serverUrl = serverUrl
  139. // Write file parameter for decrypted on DB
  140. NCManageDatabase.shared.addE2eEncryption(object)
  141. // Update metadata on tableMetadata
  142. metadata.fileNameView = filename
  143. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: filename, mimeType: metadata.contentType, directory: metadata.directory)
  144. metadata.contentType = results.mimeType
  145. metadata.iconName = results.iconName
  146. metadata.classFile = results.classFile
  147. NCManageDatabase.shared.addMetadata(metadata)
  148. }
  149. }
  150. do {
  151. let json = try JSONDecoder().decode(E2eeV20.self, from: data)
  152. let metadata = json.metadata
  153. let users = json.users
  154. let filedrop = json.filedrop
  155. let version = json.version as String? ?? "2.0"
  156. // Signature check
  157. let metadataCodable = E2eeV20.Metadata(ciphertext: metadata.ciphertext, nonce: metadata.nonce, authenticationTag: metadata.authenticationTag)
  158. let metadataData = try JSONEncoder().encode(metadataCodable)
  159. if let signatureData = NCEndToEndEncryption.sharedManager().generateSignatureCMS(metadataData, certificate: CCUtility.getEndToEndPublicKey(account), privateKey: CCUtility.getEndToEndPrivateKey(account), publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId) {
  160. let signatureX = signatureData.base64EncodedString()
  161. print(signatureX)
  162. }
  163. // DATA
  164. NCManageDatabase.shared.deleteE2eMetadataV2(account: account, serverUrl: serverUrl)
  165. NCManageDatabase.shared.deleteE2EUsersV2(account: account, serverUrl: serverUrl)
  166. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  167. //
  168. // users
  169. //
  170. for user in users {
  171. var decryptedMetadataKey: Data?
  172. var decryptedFiledropKey: Data?
  173. var metadataKey: String?
  174. var filedropKey: String?
  175. if let encryptedMetadataKey = user.encryptedMetadataKey {
  176. let data = Data(base64Encoded: encryptedMetadataKey)
  177. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: CCUtility.getEndToEndPrivateKey(account)) {
  178. decryptedMetadataKey = decrypted
  179. metadataKey = decrypted.base64EncodedString()
  180. }
  181. }
  182. if let encryptedFiledropKey = user.encryptedFiledropKey {
  183. let data = Data(base64Encoded: encryptedFiledropKey)
  184. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: CCUtility.getEndToEndPrivateKey(account)) {
  185. decryptedFiledropKey = decrypted
  186. filedropKey = decrypted.base64EncodedString()
  187. }
  188. }
  189. NCManageDatabase.shared.addE2EUsersV2(account: account, serverUrl: serverUrl, userId: user.userId, certificate: user.certificate, encryptedFiledropKey: user.encryptedFiledropKey, encryptedMetadataKey: user.encryptedMetadataKey, decryptedFiledropKey: decryptedFiledropKey, decryptedMetadataKey: decryptedMetadataKey, filedropKey: filedropKey, metadataKey: metadataKey)
  190. }
  191. //
  192. // metadata
  193. //
  194. if let tableE2eUsersV2 = NCManageDatabase.shared.getE2EUsersV2(account: account, serverUrl: serverUrl, userId: userId),
  195. let metadataKey = tableE2eUsersV2.metadataKey,
  196. let decryptedMetadataKey = tableE2eUsersV2.decryptedMetadataKey {
  197. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(metadata.ciphertext, key: metadataKey, initializationVector: metadata.nonce, authenticationTag: metadata.authenticationTag) {
  198. if decrypted.isGzipped {
  199. do {
  200. let data = try decrypted.gunzipped()
  201. if let jsonText = String(data: data, encoding: .utf8) {
  202. print(jsonText)
  203. }
  204. let json = try JSONDecoder().decode(E2eeV20.ciphertext.self, from: data)
  205. // Checksums check
  206. if let keyChecksums = json.keyChecksums,
  207. let hash = NCEndToEndEncryption.sharedManager().createSHA256(from: decryptedMetadataKey),
  208. !keyChecksums.contains(hash) {
  209. return NKError(errorCode: NCGlobal.shared.errorE2EEKeyChecksums, errorDescription: NSLocalizedString("_e2ee_checksums_error_", comment: ""))
  210. }
  211. NCManageDatabase.shared.addE2eMetadataV2(account: account, serverUrl: serverUrl, keyChecksums: json.keyChecksums, deleted: json.deleted ?? false, counter: json.counter, folders: json.folders, version: version)
  212. if let files = json.files {
  213. for file in files {
  214. addE2eEncryption(fileNameIdentifier: file.key, filename: file.value.filename, authenticationTag: file.value.authenticationTag, key: file.value.key, initializationVector: file.value.nonce, metadataKey: metadataKey, mimetype: file.value.mimetype)
  215. }
  216. }
  217. if let folders = json.folders {
  218. for folder in folders {
  219. addE2eEncryption(fileNameIdentifier: folder.key, filename: folder.value, authenticationTag: metadata.authenticationTag, key: metadataKey, initializationVector: metadata.nonce, metadataKey: metadataKey, mimetype: "httpd/unix-directory")
  220. }
  221. }
  222. } catch let error {
  223. return NKError(error: error)
  224. }
  225. } else {
  226. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error unzip ciphertext")
  227. }
  228. } else {
  229. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt ciphertext")
  230. }
  231. }
  232. } catch let error {
  233. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  234. }
  235. return NKError()
  236. }
  237. }
  238. /* TEST CMS
  239. if let cmsData = NCEndToEndEncryption.sharedManager().generateSignatureCMS(data, certificate: CCUtility.getEndToEndCertificate(account), privateKey: CCUtility.getEndToEndPrivateKey(account), publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId) {
  240. let cms = cmsData.base64EncodedString()
  241. print(cms)
  242. let cmsTest = "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"
  243. let data = Data(base64Encoded: cmsTest)
  244. NCEndToEndEncryption.sharedManager().verifySignatureCMS(data, data: nil, publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId)
  245. }
  246. */