NCEndToEndMetadataV1.swift 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472
  1. //
  2. // NCEndToEndMetadataV1.swift
  3. // Created by Marino Faggiana on 09/08/23.
  4. // Copyright © 2023 Marino Faggiana. All rights reserved.
  5. //
  6. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  7. //
  8. // This program is free software: you can redistribute it and/or modify
  9. // it under the terms of the GNU General Public License as published by
  10. // the Free Software Foundation, either version 3 of the License, or
  11. // (at your option) any later version.
  12. //
  13. // This program is distributed in the hope that it will be useful,
  14. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. // GNU General Public License for more details.
  17. //
  18. // You should have received a copy of the GNU General Public License
  19. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  20. //
  21. import Foundation
  22. import NextcloudKit
  23. extension NCEndToEndMetadata {
  24. struct E2eeV1: Codable {
  25. struct Metadata: Codable {
  26. let metadataKeys: [String: String]
  27. let version: Double
  28. }
  29. struct Encrypted: Codable {
  30. let key: String
  31. let filename: String
  32. let mimetype: String
  33. }
  34. struct Files: Codable {
  35. let initializationVector: String
  36. let authenticationTag: String?
  37. let metadataKey: Int
  38. let encrypted: String
  39. }
  40. let metadata: Metadata
  41. let files: [String: Files]?
  42. }
  43. struct E2eeV12: Codable {
  44. struct Metadata: Codable {
  45. let metadataKey: String
  46. let version: Double
  47. let checksum: String?
  48. }
  49. struct Encrypted: Codable {
  50. let key: String
  51. let filename: String
  52. let mimetype: String
  53. }
  54. struct Files: Codable {
  55. let initializationVector: String
  56. let authenticationTag: String?
  57. let encrypted: String
  58. }
  59. struct Filedrop: Codable {
  60. let initializationVector: String
  61. let authenticationTag: String?
  62. let encrypted: String
  63. let encryptedKey: String?
  64. let encryptedTag: String?
  65. let encryptedInitializationVector: String?
  66. }
  67. let metadata: Metadata
  68. let files: [String: Files]?
  69. let filedrop: [String: Filedrop]?
  70. }
  71. // --------------------------------------------------------------------------------------------
  72. // MARK: Ecode JSON Metadata V1.2
  73. // --------------------------------------------------------------------------------------------
  74. func encoderMetadataV12(account: String, serverUrl: String, ocIdServerUrl: String) -> (metadata: String?, signature: String?) {
  75. let encoder = JSONEncoder()
  76. var metadataKey: String = ""
  77. let metadataVersion = 1.2
  78. var files: [String: E2eeV12.Files] = [:]
  79. var filesCodable: [String: E2eeV12.Files]?
  80. var filedrop: [String: E2eeV12.Filedrop] = [:]
  81. var filedropCodable: [String: E2eeV12.Filedrop]?
  82. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  83. var fileNameIdentifiers: [String] = []
  84. let e2eEncryptions = NCManageDatabase.shared.getE2eEncryptions(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  85. //
  86. // metadata
  87. //
  88. if e2eEncryptions.isEmpty, let key = NCEndToEndEncryption.sharedManager()?.generateKey() as? NSData {
  89. if let key = key.base64EncodedString().data(using: .utf8)?.base64EncodedString().data(using: .utf8),
  90. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricData(key, privateKey: privateKey) {
  91. metadataKey = metadataKeyEncrypted.base64EncodedString()
  92. }
  93. } else if let metadatakey = (e2eEncryptions.first!.metadataKey.data(using: .utf8)?.base64EncodedString().data(using: .utf8)),
  94. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricData(metadatakey, privateKey: privateKey) {
  95. metadataKey = metadataKeyEncrypted.base64EncodedString()
  96. }
  97. for e2eEncryption in e2eEncryptions {
  98. //
  99. // files & folders
  100. //
  101. if e2eEncryption.blob == "files" || e2eEncryption.blob == "folders" {
  102. let encrypted = E2eeV12.Encrypted(key: e2eEncryption.key, filename: e2eEncryption.fileName, mimetype: e2eEncryption.mimeType)
  103. do {
  104. // Create "encrypted"
  105. var json = try encoder.encode(encrypted)
  106. json = json.base64EncodedString().data(using: .utf8)!
  107. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(json, key: e2eEncryption.metadataKey) {
  108. let record = E2eeV12.Files(initializationVector: e2eEncryption.initializationVector, authenticationTag: e2eEncryption.authenticationTag, encrypted: encrypted)
  109. files.updateValue(record, forKey: e2eEncryption.fileNameIdentifier)
  110. }
  111. fileNameIdentifiers.append(e2eEncryption.fileNameIdentifier)
  112. } catch let error {
  113. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  114. return (nil, nil)
  115. }
  116. }
  117. //
  118. // filedrop
  119. //
  120. if e2eEncryption.blob == "filedrop" {
  121. var encryptedKey: String?
  122. var encryptedInitializationVector: NSString?
  123. var encryptedTag: NSString?
  124. if let metadataKeyFiledrop = (e2eEncryption.metadataKeyFiledrop.data(using: .utf8)?.base64EncodedString().data(using: .utf8)),
  125. let metadataKeyEncrypted = NCEndToEndEncryption.sharedManager().encryptAsymmetricData(metadataKeyFiledrop, privateKey: privateKey) {
  126. encryptedKey = metadataKeyEncrypted.base64EncodedString()
  127. }
  128. let encrypted = E2eeV12.Encrypted(key: e2eEncryption.key, filename: e2eEncryption.fileName, mimetype: e2eEncryption.mimeType)
  129. do {
  130. // Create "encrypted"
  131. var json = try encoder.encode(encrypted)
  132. json = json.base64EncodedString().data(using: .utf8)!
  133. if let encrypted = NCEndToEndEncryption.sharedManager().encryptPayloadFile(json, key: e2eEncryption.metadataKeyFiledrop, initializationVector: &encryptedInitializationVector, authenticationTag: &encryptedTag) {
  134. let record = E2eeV12.Filedrop(initializationVector: e2eEncryption.initializationVector, authenticationTag: e2eEncryption.authenticationTag, encrypted: encrypted, encryptedKey: encryptedKey, encryptedTag: encryptedTag as? String, encryptedInitializationVector: encryptedInitializationVector as? String)
  135. filedrop.updateValue(record, forKey: e2eEncryption.fileNameIdentifier)
  136. }
  137. } catch let error {
  138. print("Serious internal error in encoding metadata (" + error.localizedDescription + ")")
  139. return (nil, nil)
  140. }
  141. }
  142. }
  143. // Create checksum
  144. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  145. let dataChecksum = (passphrase + fileNameIdentifiers.sorted().joined() + metadataKey).data(using: .utf8)
  146. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(dataChecksum)
  147. // Create Json
  148. let metadata = E2eeV12.Metadata(metadataKey: metadataKey, version: metadataVersion, checksum: checksum)
  149. if !files.isEmpty { filesCodable = files }
  150. if !filedrop.isEmpty { filedropCodable = filedrop }
  151. let e2ee = E2eeV12(metadata: metadata, files: filesCodable, filedrop: filedropCodable)
  152. do {
  153. let data = try encoder.encode(e2ee)
  154. data.printJson()
  155. let jsonString = String(data: data, encoding: .utf8)
  156. // Updated metadata to 1.2
  157. if NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) == nil {
  158. NCManageDatabase.shared.setE2eMetadata(account: account, serverUrl: serverUrl, metadataKey: metadataKey, version: metadataVersion)
  159. }
  160. return (jsonString, nil)
  161. } catch let error {
  162. print("Serious internal error in encoding e2ee (" + error.localizedDescription + ")")
  163. return (nil, nil)
  164. }
  165. }
  166. // --------------------------------------------------------------------------------------------
  167. // MARK: Decode JSON Metadata V1.2
  168. // --------------------------------------------------------------------------------------------
  169. func decoderMetadataV12(_ json: String, serverUrl: String, account: String, ocIdServerUrl: String, urlBase: String, userId: String, ownerId: String?) -> NKError {
  170. guard let data = json.data(using: .utf8) else {
  171. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  172. }
  173. let decoder = JSONDecoder()
  174. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  175. var metadataVersion: Double = 0
  176. var metadataKey = ""
  177. do {
  178. let json = try decoder.decode(E2eeV12.self, from: data)
  179. let metadata = json.metadata
  180. let files = json.files
  181. let filedrop = json.filedrop
  182. var fileNameIdentifiers: [String] = []
  183. metadataVersion = metadata.version
  184. //
  185. // metadata
  186. //
  187. let data = Data(base64Encoded: metadata.metadataKey)
  188. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  189. let keyData = Data(base64Encoded: decrypted),
  190. let key = String(data: keyData, encoding: .utf8) {
  191. metadataKey = key
  192. } else {
  193. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt metadataKey")
  194. }
  195. // DATA
  196. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  197. //
  198. // files
  199. //
  200. if let files = files {
  201. for file in files {
  202. let fileNameIdentifier = file.key
  203. let files = file.value as E2eeV12.Files
  204. let encrypted = files.encrypted
  205. let authenticationTag = files.authenticationTag
  206. let initializationVector = files.initializationVector
  207. fileNameIdentifiers.append(fileNameIdentifier)
  208. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  209. let decryptedData = Data(base64Encoded: decrypted) {
  210. do {
  211. decryptedData.printJson()
  212. let encrypted = try decoder.decode(E2eeV12.Encrypted.self, from: decryptedData)
  213. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  214. let object = tableE2eEncryption.init(account: account, ocIdServerUrl: ocIdServerUrl, fileNameIdentifier: fileNameIdentifier)
  215. object.authenticationTag = authenticationTag ?? ""
  216. object.blob = "files"
  217. object.fileName = encrypted.filename
  218. object.key = encrypted.key
  219. object.initializationVector = initializationVector
  220. object.metadataKey = metadataKey
  221. object.metadataVersion = metadataVersion
  222. object.mimeType = encrypted.mimetype
  223. object.serverUrl = serverUrl
  224. // Write file parameter for decrypted on DB
  225. NCManageDatabase.shared.addE2eEncryption(object)
  226. // Update metadata on tableMetadata
  227. metadata.fileNameView = encrypted.filename
  228. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  229. metadata.contentType = results.mimeType
  230. metadata.iconName = results.iconName
  231. metadata.classFile = results.classFile
  232. NCManageDatabase.shared.addMetadata(metadata)
  233. }
  234. } catch let error {
  235. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription)
  236. }
  237. }
  238. }
  239. }
  240. //
  241. // filedrop
  242. //
  243. if let filedrop = filedrop {
  244. for filedrop in filedrop {
  245. let fileNameIdentifier = filedrop.key
  246. let filedrop = filedrop.value as E2eeV12.Filedrop
  247. var metadataKeyFiledrop: String?
  248. if let encryptedKey = filedrop.encryptedKey,
  249. let data = Data(base64Encoded: encryptedKey),
  250. let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  251. let keyData = Data(base64Encoded: decrypted)
  252. metadataKeyFiledrop = String(data: keyData!, encoding: .utf8)
  253. }
  254. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(filedrop.encrypted, key: metadataKeyFiledrop, initializationVector: filedrop.encryptedInitializationVector, authenticationTag: filedrop.encryptedTag),
  255. let decryptedData = Data(base64Encoded: decrypted) {
  256. do {
  257. decryptedData.printJson()
  258. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  259. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  260. let object = tableE2eEncryption.init(account: account, ocIdServerUrl: ocIdServerUrl, fileNameIdentifier: fileNameIdentifier)
  261. object.authenticationTag = filedrop.authenticationTag ?? ""
  262. object.blob = "filedrop"
  263. object.fileName = encrypted.filename
  264. object.key = encrypted.key
  265. object.metadataKeyFiledrop = metadataKeyFiledrop ?? ""
  266. object.initializationVector = filedrop.initializationVector
  267. object.metadataKey = metadataKey
  268. object.metadataVersion = metadataVersion
  269. object.mimeType = encrypted.mimetype
  270. object.serverUrl = serverUrl
  271. // Write file parameter for decrypted on DB
  272. NCManageDatabase.shared.addE2eEncryption(object)
  273. // Update metadata on tableMetadata
  274. metadata.fileNameView = encrypted.filename
  275. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  276. metadata.contentType = results.mimeType
  277. metadata.iconName = results.iconName
  278. metadata.classFile = results.classFile
  279. NCManageDatabase.shared.addMetadata(metadata)
  280. }
  281. } catch let error {
  282. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt filedrop: " + error.localizedDescription)
  283. }
  284. }
  285. }
  286. }
  287. // verify checksum
  288. let passphrase = CCUtility.getEndToEndPassphrase(account).replacingOccurrences(of: " ", with: "")
  289. let dataChecksum = (passphrase + fileNameIdentifiers.sorted().joined() + metadata.metadataKey).data(using: .utf8)
  290. let checksum = NCEndToEndEncryption.sharedManager().createSHA256(dataChecksum)
  291. if metadata.checksum != checksum {
  292. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error checksum")
  293. }
  294. } catch let error {
  295. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  296. }
  297. return NKError()
  298. }
  299. // --------------------------------------------------------------------------------------------
  300. // MARK: Decode JSON Metadata V1.1
  301. // --------------------------------------------------------------------------------------------
  302. func decoderMetadataV1(_ json: String, serverUrl: String, account: String, ocIdServerUrl: String, urlBase: String, userId: String) -> NKError {
  303. guard let data = json.data(using: .utf8) else {
  304. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  305. }
  306. let decoder = JSONDecoder()
  307. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  308. var metadataVersion: Double = 0
  309. do {
  310. let json = try decoder.decode(E2eeV1.self, from: data)
  311. let metadata = json.metadata
  312. let files = json.files
  313. var metadataKeys: [String: String] = [:]
  314. metadataVersion = metadata.version
  315. // DATA
  316. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  317. //
  318. // metadata
  319. //
  320. for metadataKey in metadata.metadataKeys {
  321. let data = Data(base64Encoded: metadataKey.value)
  322. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey),
  323. let keyData = Data(base64Encoded: decrypted) {
  324. let key = String(data: keyData, encoding: .utf8)
  325. metadataKeys[metadataKey.key] = key
  326. }
  327. }
  328. //
  329. // verify version
  330. //
  331. if let tableE2eMetadata = NCManageDatabase.shared.getE2eMetadata(account: account, serverUrl: serverUrl) {
  332. if tableE2eMetadata.version > metadataVersion {
  333. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error verify version \(tableE2eMetadata.version)")
  334. }
  335. }
  336. //
  337. // files
  338. //
  339. if let files = files {
  340. for files in files {
  341. let fileNameIdentifier = files.key
  342. let files = files.value as E2eeV1.Files
  343. let encrypted = files.encrypted
  344. let authenticationTag = files.authenticationTag
  345. guard let metadataKey = metadataKeys["\(files.metadataKey)"] else { continue }
  346. let metadataKeyIndex = files.metadataKey
  347. let initializationVector = files.initializationVector
  348. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(encrypted, key: metadataKey),
  349. let decryptedData = Data(base64Encoded: decrypted) {
  350. do {
  351. let encrypted = try decoder.decode(E2eeV1.Encrypted.self, from: decryptedData)
  352. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  353. let object = tableE2eEncryption.init(account: account, ocIdServerUrl: ocIdServerUrl, fileNameIdentifier: fileNameIdentifier)
  354. object.authenticationTag = authenticationTag ?? ""
  355. object.blob = "files"
  356. object.fileName = encrypted.filename
  357. object.key = encrypted.key
  358. object.initializationVector = initializationVector
  359. object.metadataKey = metadataKey
  360. object.metadataKeyIndex = metadataKeyIndex
  361. object.metadataVersion = metadataVersion
  362. object.mimeType = encrypted.mimetype
  363. object.serverUrl = serverUrl
  364. // Write file parameter for decrypted on DB
  365. NCManageDatabase.shared.addE2eEncryption(object)
  366. // Update metadata on tableMetadata
  367. metadata.fileNameView = encrypted.filename
  368. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: encrypted.filename, mimeType: metadata.contentType, directory: metadata.directory)
  369. metadata.contentType = results.mimeType
  370. metadata.iconName = results.iconName
  371. metadata.classFile = results.classFile
  372. NCManageDatabase.shared.addMetadata(metadata)
  373. }
  374. } catch let error {
  375. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt file: " + error.localizedDescription)
  376. }
  377. }
  378. }
  379. }
  380. } catch let error {
  381. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  382. }
  383. return NKError()
  384. }
  385. }