NCEndToEndMetadataV20.swift 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. //
  2. // NCEndToEndMetadataV20.swift
  3. // Nextcloud
  4. //
  5. // Created by Marino Faggiana on 09/08/23.
  6. // Copyright © 2023 Marino Faggiana. All rights reserved.
  7. //
  8. // Author Marino Faggiana <marino.faggiana@nextcloud.com>
  9. //
  10. // This program is free software: you can redistribute it and/or modify
  11. // it under the terms of the GNU General Public License as published by
  12. // the Free Software Foundation, either version 3 of the License, or
  13. // (at your option) any later version.
  14. //
  15. // This program is distributed in the hope that it will be useful,
  16. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. // GNU General Public License for more details.
  19. //
  20. // You should have received a copy of the GNU General Public License
  21. // along with this program. If not, see <http://www.gnu.org/licenses/>.
  22. //
  23. import Foundation
  24. import NextcloudKit
  25. import Gzip
  26. extension NCEndToEndMetadata {
  27. // --------------------------------------------------------------------------------------------
  28. // MARK: Ecode JSON Metadata V2.0
  29. // --------------------------------------------------------------------------------------------
  30. func encoderMetadataV20(account: String, serverUrl: String, userId: String) -> (metadata: String?, signature: String?) {
  31. let e2eEncryptions = NCManageDatabase.shared.getE2eEncryptions(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  32. let e2eMetadataV2 = NCManageDatabase.shared.getE2eMetadataV2(account: account, serverUrl: serverUrl)
  33. let e2eUsers = NCManageDatabase.shared.getE2EUsersV2(account: account, serverUrl: serverUrl, userId: userId)
  34. if e2eUsers == nil {
  35. }
  36. // Signature
  37. var signature: String?
  38. let dataMetadata = Data(base64Encoded: "metadata")
  39. if let signatureData = NCEndToEndEncryption.sharedManager().generateSignatureCMS(dataMetadata, certificate: CCUtility.getEndToEndCertificate(account), privateKey: CCUtility.getEndToEndPrivateKey(account), publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId) {
  40. signature = signatureData.base64EncodedString()
  41. }
  42. return (nil, signature)
  43. }
  44. // --------------------------------------------------------------------------------------------
  45. // MARK: Decode JSON Metadata V2.0
  46. // --------------------------------------------------------------------------------------------
  47. func decoderMetadataV20(_ json: String, serverUrl: String, account: String, urlBase: String, userId: String, ownerId: String?) -> NKError {
  48. guard let data = json.data(using: .utf8) else {
  49. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decoding JSON")
  50. }
  51. func addE2eEncryption(fileNameIdentifier: String, filename: String, authenticationTag: String?, key: String, initializationVector: String, metadataKey: String, mimetype: String) {
  52. if let metadata = NCManageDatabase.shared.getMetadata(predicate: NSPredicate(format: "account == %@ AND fileName == %@", account, fileNameIdentifier)) {
  53. let object = tableE2eEncryption()
  54. object.account = account
  55. object.authenticationTag = authenticationTag ?? ""
  56. object.blob = "files"
  57. object.fileName = filename
  58. object.fileNameIdentifier = fileNameIdentifier
  59. object.fileNamePath = CCUtility.returnFileNamePath(fromFileName: filename, serverUrl: serverUrl, urlBase: urlBase, userId: userId, account: account)
  60. object.key = key
  61. object.initializationVector = initializationVector
  62. object.metadataKey = metadataKey
  63. object.mimeType = mimetype
  64. object.serverUrl = serverUrl
  65. // Write file parameter for decrypted on DB
  66. NCManageDatabase.shared.addE2eEncryption(object)
  67. // Update metadata on tableMetadata
  68. metadata.fileNameView = filename
  69. let results = NextcloudKit.shared.nkCommonInstance.getInternalType(fileName: filename, mimeType: metadata.contentType, directory: metadata.directory)
  70. metadata.contentType = results.mimeType
  71. metadata.iconName = results.iconName
  72. metadata.classFile = results.classFile
  73. NCManageDatabase.shared.addMetadata(metadata)
  74. }
  75. }
  76. let decoder = JSONDecoder()
  77. let privateKey = CCUtility.getEndToEndPrivateKey(account)
  78. do {
  79. let json = try decoder.decode(E2eeV20.self, from: data)
  80. let metadata = json.metadata
  81. let users = json.users
  82. let filedrop = json.filedrop
  83. let version = json.version as String? ?? "2.0"
  84. // DATA
  85. NCManageDatabase.shared.deleteE2eMetadataV2(account: account, serverUrl: serverUrl)
  86. NCManageDatabase.shared.deleteE2EUsersV2(account: account, serverUrl: serverUrl)
  87. NCManageDatabase.shared.deleteE2eEncryption(predicate: NSPredicate(format: "account == %@ AND serverUrl == %@", account, serverUrl))
  88. //
  89. // users
  90. //
  91. for user in users {
  92. var decryptedMetadataKey: Data?
  93. var decryptedFiledropKey: Data?
  94. var metadataKey: String?
  95. var filedropKey: String?
  96. if let encryptedMetadataKey = user.encryptedMetadataKey {
  97. let data = Data(base64Encoded: encryptedMetadataKey)
  98. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  99. decryptedMetadataKey = decrypted
  100. metadataKey = decrypted.base64EncodedString()
  101. }
  102. }
  103. if let encryptedFiledropKey = user.encryptedFiledropKey {
  104. let data = Data(base64Encoded: encryptedFiledropKey)
  105. if let decrypted = NCEndToEndEncryption.sharedManager().decryptAsymmetricData(data, privateKey: privateKey) {
  106. decryptedFiledropKey = decrypted
  107. filedropKey = decrypted.base64EncodedString()
  108. }
  109. }
  110. NCManageDatabase.shared.addE2EUsersV2(account: account, serverUrl: serverUrl, userId: user.userId, certificate: user.certificate, encryptedFiledropKey: user.encryptedFiledropKey, encryptedMetadataKey: user.encryptedMetadataKey, decryptedFiledropKey: decryptedFiledropKey, decryptedMetadataKey: decryptedMetadataKey, filedropKey: filedropKey, metadataKey: metadataKey)
  111. }
  112. //
  113. // metadata
  114. //
  115. if let tableE2eUsersV2 = NCManageDatabase.shared.getE2EUsersV2(account: account, serverUrl: serverUrl, userId: userId),
  116. let metadataKey = tableE2eUsersV2.first?.metadataKey,
  117. let decryptedMetadataKey = tableE2eUsersV2.first?.decryptedMetadataKey {
  118. if let decrypted = NCEndToEndEncryption.sharedManager().decryptPayloadFile(metadata.ciphertext, key: metadataKey, initializationVector: metadata.nonce, authenticationTag: metadata.authenticationTag) {
  119. if decrypted.isGzipped {
  120. do {
  121. let data = try decrypted.gunzipped()
  122. if let jsonText = String(data: data, encoding: .utf8) {
  123. print(jsonText)
  124. }
  125. if let json = try JSONSerialization.jsonObject(with: data) as? [String: AnyObject] {
  126. let keyChecksums = json["keyChecksums"] as? [String]
  127. let deleted = json["deleted"] as? Bool ?? false
  128. let counter = json["counter"] as? Int ?? 0
  129. // Checksums
  130. if let keyChecksums,
  131. let hash = NCEndToEndEncryption.sharedManager().createSHA256(from: decryptedMetadataKey),
  132. !keyChecksums.contains(hash) {
  133. return NKError(errorCode: NCGlobal.shared.errorE2EEKeyChecksums, errorDescription: NSLocalizedString("_e2ee_checksums_error_", comment: ""))
  134. }
  135. NCManageDatabase.shared.addE2eMetadataV2(account: account, serverUrl: serverUrl, keyChecksums: keyChecksums, deleted: deleted, counter: counter, folders: json["folders"] as? [String: String], version: version)
  136. if let files = json["files"] as? [String: Any] {
  137. for file in files {
  138. let uid = file.key
  139. if let dic = file.value as? [String: String] {
  140. if let authenticationTag = dic["authenticationTag"],
  141. let nonce = dic["nonce"],
  142. let mimetype = dic["mimetype"],
  143. let key = dic["key"],
  144. let filename = dic["filename"] {
  145. addE2eEncryption(fileNameIdentifier: uid, filename: filename, authenticationTag: authenticationTag, key: key, initializationVector: nonce, metadataKey: metadataKey, mimetype: mimetype)
  146. }
  147. }
  148. }
  149. }
  150. if let folders = json["folders"] as? [String: String] {
  151. for folder in folders {
  152. addE2eEncryption(fileNameIdentifier: folder.key, filename: folder.value, authenticationTag: metadata.authenticationTag, key: metadataKey, initializationVector: metadata.nonce, metadataKey: metadataKey, mimetype: "httpd/unix-directory")
  153. }
  154. }
  155. }
  156. } catch let error {
  157. return NKError(error: error)
  158. }
  159. } else {
  160. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error unzip ciphertext")
  161. }
  162. } else {
  163. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: "Error decrypt ciphertext")
  164. }
  165. }
  166. } catch let error {
  167. return NKError(errorCode: NCGlobal.shared.errorE2EE, errorDescription: error.localizedDescription)
  168. }
  169. return NKError()
  170. }
  171. }
  172. /* TEST CMS
  173. if let cmsData = NCEndToEndEncryption.sharedManager().generateSignatureCMS(data, certificate: CCUtility.getEndToEndCertificate(account), privateKey: CCUtility.getEndToEndPrivateKey(account), publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId) {
  174. let cms = cmsData.base64EncodedString()
  175. print(cms)
  176. let cmsTest = "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"
  177. let data = Data(base64Encoded: cmsTest)
  178. NCEndToEndEncryption.sharedManager().verifySignatureCMS(data, data: nil, publicKey: CCUtility.getEndToEndPublicKey(account), userId: userId)
  179. }
  180. */