NCEndToEndMetadataV1.swift 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423
  1. //
  2. // NCEndToEndMetadataV1.swift
  3. // Created by Marino Faggiana on 09/08/23.
  4. // Copyright © 2023 Marino Faggiana. All rights reserved.
  5. //
  6. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  7. //
  8. // This program is free software: you can redistribute it and/or modify
  9. // it under the terms of the GNU General Public License as published by
  10. // the Free Software Foundation, either version 3 of the License, or
  11. // (at your option) any later version.
  12. //
  13. // This program is distributed in the hope that it will be useful,
  14. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. // GNU General Public License for more details.
  17. //
  18. // You should have received a copy of the GNU General Public License
  19. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  20. //
  21. import Foundation
  22. import NextcloudKit
  23. extension NCEndToEndMetadata {
  24. // --------------------------------------------------------------------------------------------
  25. // MARK: Ecode JSON Metadata V1.2
  26. // --------------------------------------------------------------------------------------------
  27. func encoderMetadataV12(account: String, serverUrl: String, ocId: String) -> (metadata: String?, signature: String?) {
  28. let encoder = JSONEncoder()
  29. var metadataKey: String = ""
  30. let metadataVersion = 1.2
  31. var files: [String: E2eeV12.Files] = [:]
  32. var filesCodable: [String: E2eeV12.Files]?
  33. var filedrop: [String: E2eeV12.Filedrop] = [:]
  34. var filedropCodable: [String: E2eeV12.Filedrop]?
  35. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  36. var fileNameIdentifiers: [String] = []
  37. let e2eEncryptions = NCManageDatabase.shared.getE2eEncryptions(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  38. //
  39. // metadata
  40. //
  41. if e2eEncryptions.isEmpty, let key = NCEndToEndEncryption.sharedManager()?.generateKey() as? NSData {
  42. if let key = key.base64EncodedString().data(using: .utf8)?.base64EncodedString().data(using: .utf8),
  43. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricData(key, privateKey: privateKey) {
  44. metadataKey = metadataKeyEncrypted.base64EncodedString()
  45. }
  46. } else if let metadatakey = (e2eEncryptions.first!.metadataKey.data(using: .utf8)?.base64EncodedString().data(using: .utf8)),
  47. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricData(metadatakey, privateKey: privateKey) {
  48. metadataKey = metadataKeyEncrypted.base64EncodedString()
  49. }
  50. for e2eEncryption in e2eEncryptions {
  51. //
  52. // files
  53. //
  54. if e2eEncryption.blob == "files" {
  55. let encrypted = E2eeV12.Encrypted(key: e2eEncryption.key, filename: e2eEncryption.fileName, mimetype: e2eEncryption.mimeType)
  56. do {
  57. // Create "encrypted"
  58. var json = try encoder.encode(encrypted)
  59. json = json.base64EncodedString().data(using: .utf8)!
  60. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(json, key: e2eEncryption.metadataKey) {
  61. let record = E2eeV12.Files(initializationVector: e2eEncryption.initializationVector, authenticationTag: e2eEncryption.authenticationTag, encrypted: encrypted)
  62. files.updateValue(record, forKey: e2eEncryption.fileNameIdentifier)
  63. }
  64. fileNameIdentifiers.append(e2eEncryption.fileNameIdentifier)
  65. } catch let error {
  66. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  67. return (nil, nil)
  68. }
  69. }
  70. //
  71. // filedrop
  72. //
  73. if e2eEncryption.blob == "filedrop" {
  74. var encryptedKey: String?
  75. var encryptedInitializationVector: NSString?
  76. var encryptedTag: NSString?
  77. if let metadataKeyFiledrop = (e2eEncryption.metadataKeyFiledrop.data(using: .utf8)?.base64EncodedString().data(using: .utf8)),
  78. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricData(metadataKeyFiledrop, privateKey: privateKey) {
  79. encryptedKey = metadataKeyEncrypted.base64EncodedString()
  80. }
  81. let encrypted = E2eeV12.Encrypted(key: e2eEncryption.key, filename: e2eEncryption.fileName, mimetype: e2eEncryption.mimeType)
  82. do {
  83. // Create "encrypted"
  84. var json = try encoder.encode(encrypted)
  85. json = json.base64EncodedString().data(using: .utf8)!
  86. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(json, key: e2eEncryption.metadataKeyFiledrop, initializationVector: &encryptedInitializationVector, authenticationTag: &encryptedTag) {
  87. let record = E2eeV12.Filedrop(initializationVector: e2eEncryption.initializationVector, authenticationTag: e2eEncryption.authenticationTag, encrypted: encrypted, encryptedKey: encryptedKey, encryptedTag: encryptedTag as? String, encryptedInitializationVector: encryptedInitializationVector as? String)
  88. filedrop.updateValue(record, forKey: e2eEncryption.fileNameIdentifier)
  89. }
  90. } catch let error {
  91. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  92. return (nil, nil)
  93. }
  94. }
  95. }
  96. // Create checksum
  97. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  98. let dataChecksum = (passphrase + fileNameIdentifiers.sorted().joined() + metadataKey).data(using: .utf8)
  99. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(dataChecksum)
  100. // Create Json
  101. let metadata = E2eeV12.Metadata(metadataKey: metadataKey, version: metadataVersion, checksum: checksum)
  102. if !files.isEmpty { filesCodable = files }
  103. if !filedrop.isEmpty { filedropCodable = filedrop }
  104. let e2ee = E2eeV12(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  105. do {
  106. let data = try encoder.encode(e2ee)
  107. data.printJson()
  108. let jsonString = String(data: data, encoding: .utf8)
  109. // Updated metadata to 1.2
  110. if NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) == nil {
  111. NCManageDatabase.shared.setE2eMetadata(account: account, serverUrl: serverUrl, metadataKey: metadataKey, version: metadataVersion)
  112. }
  113. return (jsonString, nil)
  114. } catch let error {
  115. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  116. return (nil, nil)
  117. }
  118. }
  119. // --------------------------------------------------------------------------------------------
  120. // MARK: Decode JSON Metadata V1.2
  121. // --------------------------------------------------------------------------------------------
  122. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, ocId: String, urlBase: String, userId: String, ownerId: String?) -> NKError {
  123. guard let data = json.data(using: .utf8) else {
  124. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  125. }
  126. let decoder = JSONDecoder()
  127. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  128. var metadataVersion: Double = 0
  129. var metadataKey = ""
  130. do {
  131. let json = try decoder.decode(E2eeV12.self, from: data)
  132. let metadata = json.metadata
  133. let files = json.files
  134. let filedrop = json.filedrop
  135. var fileNameIdentifiers: [String] = []
  136. metadataVersion = metadata.version
  137. //
  138. // metadata
  139. //
  140. let data = Data(base64Encoded: metadata.metadataKey)
  141. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  142. let keyData = Data(base64Encoded: decrypted),
  143. let key = String(data: keyData, encoding: .utf8) {
  144. metadataKey = key
  145. } else {
  146. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt metadataKey")
  147. }
  148. // DATA
  149. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  150. //
  151. // files
  152. //
  153. if let files = files {
  154. for file in files {
  155. let fileNameIdentifier = file.key
  156. let files = file.value as E2eeV12.Files
  157. let encrypted = files.encrypted
  158. let authenticationTag = files.authenticationTag
  159. let initializationVector = files.initializationVector
  160. fileNameIdentifiers.append(fileNameIdentifier)
  161. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  162. let decryptedData = Data(base64Encoded: decrypted) {
  163. do {
  164. decryptedData.printJson()
  165. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  166. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  167. let object = tableE2eEncryption()
  168. object.account = account
  169. object.authenticationTag = authenticationTag ?? ""
  170. object.blob = "files"
  171. object.fileName = encrypted.filename
  172. object.fileNameIdentifier = fileNameIdentifier
  173. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  174. object.key = encrypted.key
  175. object.initializationVector = initializationVector
  176. object.metadataKey = metadataKey
  177. object.metadataVersion = metadataVersion
  178. object.mimeType = encrypted.mimetype
  179. object.serverUrl = serverUrl
  180. // Write file parameter for decrypted on DB
  181. NCManageDatabase.shared.addE2eEncryption(object)
  182. // Update metadata on tableMetadata
  183. metadata.fileNameView = encrypted.filename
  184. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  185. metadata.contentType = results.mimeType
  186. metadata.iconName = results.iconName
  187. metadata.classFile = results.classFile
  188. NCManageDatabase.shared.addMetadata(metadata)
  189. }
  190. } catch let error {
  191. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription)
  192. }
  193. }
  194. }
  195. }
  196. //
  197. // filedrop
  198. //
  199. if let filedrop = filedrop {
  200. for filedrop in filedrop {
  201. let fileNameIdentifier = filedrop.key
  202. let filedrop = filedrop.value as E2eeV12.Filedrop
  203. var metadataKeyFiledrop: String?
  204. if let encryptedKey = filedrop.encryptedKey,
  205. let data = Data(base64Encoded: encryptedKey),
  206. let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  207. let keyData = Data(base64Encoded: decrypted)
  208. metadataKeyFiledrop = String(data: keyData!, encoding: .utf8)
  209. }
  210. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(filedrop.encrypted, key: metadataKeyFiledrop, initializationVector: filedrop.encryptedInitializationVector, authenticationTag: filedrop.encryptedTag),
  211. let decryptedData = Data(base64Encoded: decrypted) {
  212. do {
  213. decryptedData.printJson()
  214. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  215. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  216. let object = tableE2eEncryption()
  217. object.account = account
  218. object.authenticationTag = filedrop.authenticationTag ?? ""
  219. object.blob = "filedrop"
  220. object.fileName = encrypted.filename
  221. object.fileNameIdentifier = fileNameIdentifier
  222. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  223. object.key = encrypted.key
  224. object.metadataKeyFiledrop = metadataKeyFiledrop ?? ""
  225. object.initializationVector = filedrop.initializationVector
  226. object.metadataKey = metadataKey
  227. object.metadataVersion = metadataVersion
  228. object.mimeType = encrypted.mimetype
  229. object.serverUrl = serverUrl
  230. // Write file parameter for decrypted on DB
  231. NCManageDatabase.shared.addE2eEncryption(object)
  232. // Update metadata on tableMetadata
  233. metadata.fileNameView = encrypted.filename
  234. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  235. metadata.contentType = results.mimeType
  236. metadata.iconName = results.iconName
  237. metadata.classFile = results.classFile
  238. NCManageDatabase.shared.addMetadata(metadata)
  239. }
  240. } catch let error {
  241. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt filedrop: " + error.localizedDescription)
  242. }
  243. }
  244. }
  245. }
  246. // verify checksum
  247. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  248. let dataChecksum = (passphrase + fileNameIdentifiers.sorted().joined() + metadata.metadataKey).data(using: .utf8)
  249. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(dataChecksum)
  250. if metadata.checksum != checksum {
  251. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error checksum")
  252. }
  253. } catch let error {
  254. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  255. }
  256. return NKError()
  257. }
  258. // --------------------------------------------------------------------------------------------
  259. // MARK: Decode JSON Metadata V1.1
  260. // --------------------------------------------------------------------------------------------
  261. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, ocId: String, urlBase: String, userId: String) -> NKError {
  262. guard let data = json.data(using: .utf8) else {
  263. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  264. }
  265. let decoder = JSONDecoder()
  266. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  267. var metadataVersion: Double = 0
  268. do {
  269. let json = try decoder.decode(E2eeV1.self, from: data)
  270. let metadata = json.metadata
  271. let files = json.files
  272. var metadataKeys: [String: String] = [:]
  273. metadataVersion = metadata.version
  274. // DATA
  275. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  276. //
  277. // metadata
  278. //
  279. for metadataKey in metadata.metadataKeys {
  280. let data = Data(base64Encoded: metadataKey.value)
  281. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  282. let keyData = Data(base64Encoded: decrypted) {
  283. let key = String(data: keyData, encoding: .utf8)
  284. metadataKeys[metadataKey.key] = key
  285. }
  286. }
  287. //
  288. // verify version
  289. //
  290. if let tableE2eMetadata = NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) {
  291. if tableE2eMetadata.version > metadataVersion {
  292. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error verify version \(tableE2eMetadata.version)")
  293. }
  294. }
  295. //
  296. // files
  297. //
  298. if let files = files {
  299. for files in files {
  300. let fileNameIdentifier = files.key
  301. let files = files.value as E2eeV1.Files
  302. let encrypted = files.encrypted
  303. let authenticationTag = files.authenticationTag
  304. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  305. let metadataKeyIndex = files.metadataKey
  306. let initializationVector = files.initializationVector
  307. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  308. let decryptedData = Data(base64Encoded: decrypted) {
  309. do {
  310. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  311. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  312. let object = tableE2eEncryption()
  313. object.account = account
  314. object.authenticationTag = authenticationTag ?? ""
  315. object.blob = "files"
  316. object.fileName = encrypted.filename
  317. object.fileNameIdentifier = fileNameIdentifier
  318. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: encrypted.filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  319. object.key = encrypted.key
  320. object.initializationVector = initializationVector
  321. object.metadataKey = metadataKey
  322. object.metadataKeyIndex = metadataKeyIndex
  323. object.metadataVersion = metadataVersion
  324. object.mimeType = encrypted.mimetype
  325. object.serverUrl = serverUrl
  326. // Write file parameter for decrypted on DB
  327. NCManageDatabase.shared.addE2eEncryption(object)
  328. // Update metadata on tableMetadata
  329. metadata.fileNameView = encrypted.filename
  330. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  331. metadata.contentType = results.mimeType
  332. metadata.iconName = results.iconName
  333. metadata.classFile = results.classFile
  334. NCManageDatabase.shared.addMetadata(metadata)
  335. }
  336. } catch let error {
  337. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription)
  338. }
  339. }
  340. }
  341. }
  342. } catch let error {
  343. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  344. }
  345. return NKError()
  346. }
  347. }