NCEntoToEndInterface.swift 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503
  1. //
  2. // NCEntoToEndInterface.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 03/04/17.
  6. // Copyright © 2017 TWS. All rights reserved.
  7. //
  8. // Author Marino Faggiana <m.faggiana@twsweb.it>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import Foundation
  24. class NCEntoToEndInterface : NSObject, OCNetworkingDelegate {
  25. struct e2eMetadata: Codable {
  26. let files: [String:Element]
  27. struct Element: Codable {
  28. let initializationVector: String
  29. let authenticationTag: String
  30. let metadataKey: Int
  31. struct encrypted: Codable {
  32. let key: String
  33. let filename: String
  34. let mimetype: String
  35. let version: Int
  36. }
  37. }
  38. }
  39. let appDelegate = UIApplication.shared.delegate as! AppDelegate
  40. override init() {
  41. }
  42. // --------------------------------------------------------------------------------------------
  43. // MARK: Initialize
  44. // --------------------------------------------------------------------------------------------
  45. @objc func initEndToEndEncryption() {
  46. // Clear all keys
  47. CCUtility.clearAllKeysEnd(toEnd: appDelegate.activeAccount)
  48. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  49. metadataNet.action = actionGetEndToEndPublicKeys
  50. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  51. }
  52. func getPrivateKeyCipher() {
  53. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  54. metadataNet.action = actionGetEndToEndPrivateKeyCipher
  55. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  56. }
  57. func getPublicKeyServer() {
  58. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  59. metadataNet.action = actionGetEndToEndServerPublicKey
  60. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  61. }
  62. // --------------------------------------------------------------------------------------------
  63. // MARK: Manage PublicKey
  64. // --------------------------------------------------------------------------------------------
  65. func getEndToEndPublicKeysSuccess(_ metadataNet: CCMetadataNet!) {
  66. CCUtility.setEndToEndPublicKey(appDelegate.activeAccount, publicKey: metadataNet.key)
  67. // Request PrivateKey chiper to Server
  68. getPrivateKeyCipher()
  69. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPublicKeys, note: "E2E PublicKey present on Server and stored to keychain", type: k_activityTypeSuccess, verbose: false, activeUrl: "")
  70. }
  71. func getEndToEndPublicKeysFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  72. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPublicKeys, note: message as String!, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  73. switch errorCode {
  74. case 400:
  75. appDelegate.messageNotification("E2E publicKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  76. case 404:
  77. guard let csr = NCEndToEndEncryption.sharedManager().createCSR(appDelegate.activeUserID, directoryUser: appDelegate.directoryUser) else {
  78. appDelegate.messageNotification("E2E Csr", description: "Error to create Csr", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  79. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPublicKeys, note: "E2E Error to create Csr", type: k_activityTypeFailure, verbose: false, activeUrl: "")
  80. return
  81. }
  82. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  83. metadataNet.action = actionSignEndToEndPublicKey;
  84. metadataNet.key = csr;
  85. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  86. case 409:
  87. appDelegate.messageNotification("E2E publicKey", description: "forbidden: the user can't access the public keys", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  88. default:
  89. appDelegate.messageNotification("E2E publicKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  90. }
  91. }
  92. func signEnd(toEndPublicKeySuccess metadataNet: CCMetadataNet!) {
  93. CCUtility.setEndToEndPublicKey(appDelegate.activeAccount, publicKey: metadataNet.key)
  94. // Request PrivateKey chiper to Server
  95. getPrivateKeyCipher()
  96. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionSignEndToEndPublicKey, note: "E2E Csr - publicKey sign on Server and stored publicKey locally", type: k_activityTypeFailure, verbose: false, activeUrl: "")
  97. }
  98. func signEnd(toEndPublicKeyFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  99. appDelegate.messageNotification("E2E sign Csr - publicKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  100. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionSignEndToEndPublicKey, note: message, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  101. }
  102. func deleteEnd(toEndPublicKeySuccess metadataNet: CCMetadataNet!) {
  103. appDelegate.messageNotification("E2E delete publicKey", description: "Success", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.success, errorCode: 0)
  104. }
  105. func deleteEnd(toEndPublicKeyFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  106. appDelegate.messageNotification("E2E delete publicKey", description: message, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  107. }
  108. // --------------------------------------------------------------------------------------------
  109. // MARK: Manage PrivateKey
  110. // --------------------------------------------------------------------------------------------
  111. func getEndToEndPrivateKeyCipherSuccess(_ metadataNet: CCMetadataNet!) {
  112. // request Passphrase
  113. var passphraseTextField: UITextField?
  114. let alertController = UIAlertController(title: NSLocalizedString("_e2e_passphrase_request_title_", comment: ""), message: NSLocalizedString("_e2e_passphrase_request_message_", comment: ""), preferredStyle: .alert)
  115. //TEST
  116. /*
  117. if let dir = FileManager.default.urls(for: .documentDirectory, in: .userDomainMask).first {
  118. let fileURL = dir.appendingPathComponent("privatekey.txt")
  119. //writing
  120. do {
  121. try metadataNet.key.write(to: fileURL, atomically: false, encoding: .utf8)
  122. }
  123. catch {/* error handling here */}
  124. }
  125. */
  126. //
  127. let ok = UIAlertAction(title: "OK", style: .default, handler: { (action) -> Void in
  128. let passphrase = passphraseTextField?.text
  129. let publicKey = CCUtility.getEndToEndPublicKey(self.appDelegate.activeAccount)
  130. guard let privateKey = (NCEndToEndEncryption.sharedManager().decryptPrivateKey(metadataNet.key, passphrase: passphrase, publicKey: publicKey)) else {
  131. self.appDelegate.messageNotification("E2E decrypt privateKey", description: "Error to decrypt Private Key", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: 0)
  132. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPrivateKeyCipher, note: "E2E Error to decrypt PrivateKey", type: k_activityTypeFailure, verbose: false, activeUrl: "")
  133. return
  134. }
  135. // privateKey
  136. print(privateKey)
  137. // Save to keychain
  138. CCUtility.setEndToEndPrivateKeyCipher(self.appDelegate.activeAccount, privateKeyCipher: metadataNet.key)
  139. CCUtility.setEndToEndPassphrase(self.appDelegate.activeAccount, passphrase:passphrase)
  140. // request publicKey Server()
  141. self.getPublicKeyServer()
  142. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPrivateKeyCipher, note: "E2E PrivateKey present on Server and stored to keychain", type: k_activityTypeSuccess, verbose: false, activeUrl: "")
  143. })
  144. let cancel = UIAlertAction(title: "Cancel", style: .cancel) { (action) -> Void in
  145. }
  146. alertController.addAction(ok)
  147. alertController.addAction(cancel)
  148. alertController.addTextField { (textField) -> Void in
  149. passphraseTextField = textField
  150. passphraseTextField?.placeholder = "Enter passphrase (12 words)"
  151. }
  152. appDelegate.activeMain.present(alertController, animated: true)
  153. }
  154. func getEndToEndPrivateKeyCipherFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  155. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPrivateKeyCipher, note: message as String!, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  156. switch errorCode {
  157. case 400:
  158. appDelegate.messageNotification("E2E privateKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  159. case 404:
  160. // message
  161. let e2ePassphrase = NYMnemonic.generateString(128, language: "english")
  162. let message = "\n" + NSLocalizedString("_e2e_settings_view_passphrase_", comment: "") + "\n\n" + e2ePassphrase!
  163. let alertController = UIAlertController(title: NSLocalizedString("_e2e_settings_title_", comment: ""), message: NSLocalizedString(message, comment: ""), preferredStyle: .alert)
  164. let OKAction = UIAlertAction(title: NSLocalizedString("_ok_", comment: ""), style: .default) { action in
  165. guard let privateKeyChiper = NCEndToEndEncryption.sharedManager().encryptPrivateKey(self.appDelegate.activeUserID, directoryUser: self.appDelegate.directoryUser, passphrase: e2ePassphrase) else {
  166. self.appDelegate.messageNotification("E2E privateKey", description: "Error to create PrivateKey chiper", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  167. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndPrivateKeyCipher, note: "E2E Error to create PrivateKey chiper", type: k_activityTypeFailure, verbose: false, activeUrl: "")
  168. return
  169. }
  170. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: self.appDelegate.activeAccount)
  171. metadataNet.action = actionStoreEndToEndPrivateKeyCipher
  172. metadataNet.key = privateKeyChiper
  173. metadataNet.password = e2ePassphrase
  174. self.appDelegate.addNetworkingOperationQueue(self.appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  175. }
  176. alertController.addAction(OKAction)
  177. appDelegate.activeMain.present(alertController, animated: true)
  178. case 409:
  179. appDelegate.messageNotification("E2E privateKey", description: "forbidden: the user can't access the private key", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  180. default:
  181. appDelegate.messageNotification("E2E privateKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  182. }
  183. }
  184. func storeEnd(toEndPrivateKeyCipherSuccess metadataNet: CCMetadataNet!) {
  185. CCUtility.setEndToEndPrivateKeyCipher(appDelegate.activeAccount, privateKeyCipher: metadataNet.key)
  186. CCUtility.setEndToEndPassphrase(appDelegate.activeAccount, passphrase:metadataNet.password)
  187. // request publicKey Server()
  188. self.getPublicKeyServer()
  189. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionStoreEndToEndPrivateKeyCipher, note: "E2E PrivateKey stored on Server and stored locally", type: k_activityTypeSuccess, verbose: false, activeUrl: "")
  190. }
  191. func storeEnd(toEndPrivateKeyCipherFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  192. appDelegate.messageNotification("E2E sign privateKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  193. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionStoreEndToEndPrivateKeyCipher, note: message, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  194. }
  195. func deleteEnd(toEndPrivateKeySuccess metadataNet: CCMetadataNet!) {
  196. appDelegate.messageNotification("E2E delete privateKey", description: "Success", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.success, errorCode: 0)
  197. }
  198. func deleteEnd(toEndPrivateKeyFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  199. appDelegate.messageNotification("E2E delete privateKey", description: message, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  200. }
  201. // --------------------------------------------------------------------------------------------
  202. // MARK: Manage Server PublicKey
  203. // --------------------------------------------------------------------------------------------
  204. func getEndToEndServerPublicKeySuccess(_ metadataNet: CCMetadataNet!) {
  205. CCUtility.setEndToEndPublicKeyServer(appDelegate.activeAccount, publicKey: metadataNet.key)
  206. // All OK Activated flsg on Manage EndToEnd Encryption
  207. NotificationCenter.default.post(name: Notification.Name("reloadManageEndToEndEncryption"), object: nil)
  208. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndServerPublicKey, note: "E2E Server PublicKey present on Server and stored to keychain", type: k_activityTypeSuccess, verbose: false, activeUrl: "")
  209. }
  210. func getEndToEndServerPublicKeyFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  211. NCManageDatabase.sharedInstance.addActivityClient("", fileID: "", action: k_activityDebugActionEndToEndEncryption, selector: actionGetEndToEndServerPublicKey, note: message as String!, type: k_activityTypeFailure, verbose: false, activeUrl: "")
  212. switch (errorCode) {
  213. case 400:
  214. appDelegate.messageNotification("E2E Server publicKey", description: "bad request: unpredictable internal error", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  215. case 404:
  216. appDelegate.messageNotification("E2E Server publicKey", description: "Server publickey doesn't exists", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  217. case 409:
  218. appDelegate.messageNotification("E2E Server publicKey", description: "forbidden: the user can't access the Server publickey", visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  219. default:
  220. appDelegate.messageNotification("E2E Server publicKey", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  221. }
  222. }
  223. // --------------------------------------------------------------------------------------------
  224. // MARK: Mark/Delete Encrypted Folder
  225. // --------------------------------------------------------------------------------------------
  226. func markEnd(toEndFolderEncryptedSuccess metadataNet: CCMetadataNet!) {
  227. print("E2E mark folder success")
  228. }
  229. func markEnd(toEndFolderEncryptedFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  230. // Unauthorized
  231. if (errorCode == kOCErrorServerUnauthorized) {
  232. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  233. }
  234. if (errorCode != kOCErrorServerUnauthorized) {
  235. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  236. }
  237. }
  238. @objc func markEndToEndFolderEncrypted(_ metadata: tableMetadata) {
  239. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  240. metadataNet.action = actionMarkEndToEndFolderEncrypted;
  241. metadataNet.fileID = metadata.fileID;
  242. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  243. }
  244. func deletemarkEnd(toEndFolderEncryptedSuccess metadataNet: CCMetadataNet!) {
  245. print("E2E delete mark folder success")
  246. }
  247. func deletemarkEnd(toEndFolderEncryptedFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  248. // Unauthorized
  249. if (errorCode == kOCErrorServerUnauthorized) {
  250. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  251. }
  252. if (errorCode != kOCErrorServerUnauthorized) {
  253. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  254. }
  255. }
  256. @objc func deletemarkEndToEndFolderEncrypted(_ metadata: tableMetadata) {
  257. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  258. metadataNet.action = actionDeletemarkEndToEndFolderEncrypted;
  259. metadataNet.fileID = metadata.fileID;
  260. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  261. }
  262. // --------------------------------------------------------------------------------------------
  263. // MARK: Lock/Unlock Encrypted Folder
  264. // --------------------------------------------------------------------------------------------
  265. func unlockEnd(toEndFolderEncryptedSuccess metadataNet: CCMetadataNet!) {
  266. print("E2E lock file success")
  267. }
  268. func unlockEnd(toEndFolderEncryptedFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  269. // Unauthorized
  270. if (errorCode == kOCErrorServerUnauthorized) {
  271. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  272. }
  273. if (errorCode != kOCErrorServerUnauthorized) {
  274. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  275. }
  276. }
  277. @objc func unlockEndToEndFolderEncrypted(_ metadata: tableMetadata) {
  278. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  279. metadataNet.action = actionUnlockEndToEndFolderEncrypted;
  280. metadataNet.fileID = metadata.fileID;
  281. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  282. }
  283. func lockEnd(toEndFolderEncryptedSuccess metadataNet: CCMetadataNet!) {
  284. print("E2E lock file success")
  285. }
  286. func lockEnd(toEndFolderEncryptedFailure metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  287. // Unauthorized
  288. if (errorCode == kOCErrorServerUnauthorized) {
  289. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  290. }
  291. if (errorCode != kOCErrorServerUnauthorized) {
  292. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  293. }
  294. }
  295. @objc func lockEndToEndFolderEncrypted(_ metadata: tableMetadata) {
  296. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  297. metadataNet.action = actionLockEndToEndFolderEncrypted;
  298. metadataNet.fileID = metadata.fileID;
  299. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  300. }
  301. // --------------------------------------------------------------------------------------------
  302. // MARK: Manage Metadata
  303. // --------------------------------------------------------------------------------------------
  304. func getEndToEndMetadataSuccess(_ metadataNet: CCMetadataNet!) {
  305. let decoder = JSONDecoder.init()
  306. let data = metadataNet.encryptedMetadata.data(using: .utf8)
  307. do {
  308. let response = try decoder.decode(e2eMetadata.self, from: data!)
  309. print(response)
  310. } catch let error {
  311. print("errore nella codifica dei dati", error)
  312. }
  313. print("E2E get metadata file success")
  314. }
  315. func getEndToEndMetadataFailure(_ metadataNet: CCMetadataNet!, message: String!, errorCode: Int) {
  316. // Unauthorized
  317. if (errorCode == kOCErrorServerUnauthorized) {
  318. appDelegate.openLoginView(appDelegate.activeMain, loginType: loginModifyPasswordUser)
  319. }
  320. if (errorCode != kOCErrorServerUnauthorized) {
  321. appDelegate.messageNotification("_error_", description: message as String!, visible: true, delay: TimeInterval(k_dismissAfterSecond), type: TWMessageBarMessageType.error, errorCode: errorCode)
  322. }
  323. }
  324. @objc func getEndToEndMetadata(_ metadata: tableMetadata) {
  325. let metadataNet: CCMetadataNet = CCMetadataNet.init(account: appDelegate.activeAccount)
  326. metadataNet.action = actionGetEndToEndMetadata;
  327. metadataNet.fileID = metadata.fileID;
  328. appDelegate.addNetworkingOperationQueue(appDelegate.netQueue, delegate: self, metadataNet: metadataNet)
  329. }
  330. }