Completed
Pull Request — master (#7013)
by Jan-Christoph
28:40 queued 13:57
created
apps/encryption/lib/Command/EnableMasterKey.php 2 patches
Indentation   +49 added lines, -49 removed lines patch added patch discarded remove patch
@@ -34,54 +34,54 @@
 block discarded – undo
34 34
 
35 35
 class EnableMasterKey extends Command {
36 36
 
37
-	/** @var Util */
38
-	protected $util;
39
-
40
-	/** @var IConfig */
41
-	protected $config;
42
-
43
-	/** @var  QuestionHelper */
44
-	protected $questionHelper;
45
-
46
-	/**
47
-	 * @param Util $util
48
-	 * @param IConfig $config
49
-	 * @param QuestionHelper $questionHelper
50
-	 */
51
-	public function __construct(Util $util,
52
-								IConfig $config,
53
-								QuestionHelper $questionHelper) {
54
-
55
-		$this->util = $util;
56
-		$this->config = $config;
57
-		$this->questionHelper = $questionHelper;
58
-		parent::__construct();
59
-	}
60
-
61
-	protected function configure() {
62
-		$this
63
-			->setName('encryption:enable-master-key')
64
-			->setDescription('Enable the master key. Only available for fresh installations with no existing encrypted data! There is also no way to disable it again.');
65
-	}
66
-
67
-	protected function execute(InputInterface $input, OutputInterface $output) {
68
-
69
-		$isAlreadyEnabled = $this->util->isMasterKeyEnabled();
70
-
71
-		if($isAlreadyEnabled) {
72
-			$output->writeln('Master key already enabled');
73
-		} else {
74
-			$question = new ConfirmationQuestion(
75
-				'Warning: Only available for fresh installations with no existing encrypted data! '
76
-			. 'There is also no way to disable it again. Do you want to continue? (y/n) ', false);
77
-			if ($this->questionHelper->ask($input, $output, $question)) {
78
-				$this->config->setAppValue('encryption', 'useMasterKey', '1');
79
-				$output->writeln('Master key successfully enabled.');
80
-			} else {
81
-				$output->writeln('aborted.');
82
-			}
83
-		}
84
-
85
-	}
37
+    /** @var Util */
38
+    protected $util;
39
+
40
+    /** @var IConfig */
41
+    protected $config;
42
+
43
+    /** @var  QuestionHelper */
44
+    protected $questionHelper;
45
+
46
+    /**
47
+     * @param Util $util
48
+     * @param IConfig $config
49
+     * @param QuestionHelper $questionHelper
50
+     */
51
+    public function __construct(Util $util,
52
+                                IConfig $config,
53
+                                QuestionHelper $questionHelper) {
54
+
55
+        $this->util = $util;
56
+        $this->config = $config;
57
+        $this->questionHelper = $questionHelper;
58
+        parent::__construct();
59
+    }
60
+
61
+    protected function configure() {
62
+        $this
63
+            ->setName('encryption:enable-master-key')
64
+            ->setDescription('Enable the master key. Only available for fresh installations with no existing encrypted data! There is also no way to disable it again.');
65
+    }
66
+
67
+    protected function execute(InputInterface $input, OutputInterface $output) {
68
+
69
+        $isAlreadyEnabled = $this->util->isMasterKeyEnabled();
70
+
71
+        if($isAlreadyEnabled) {
72
+            $output->writeln('Master key already enabled');
73
+        } else {
74
+            $question = new ConfirmationQuestion(
75
+                'Warning: Only available for fresh installations with no existing encrypted data! '
76
+            . 'There is also no way to disable it again. Do you want to continue? (y/n) ', false);
77
+            if ($this->questionHelper->ask($input, $output, $question)) {
78
+                $this->config->setAppValue('encryption', 'useMasterKey', '1');
79
+                $output->writeln('Master key successfully enabled.');
80
+            } else {
81
+                $output->writeln('aborted.');
82
+            }
83
+        }
84
+
85
+    }
86 86
 
87 87
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -68,7 +68,7 @@
 block discarded – undo
68 68
 
69 69
 		$isAlreadyEnabled = $this->util->isMasterKeyEnabled();
70 70
 
71
-		if($isAlreadyEnabled) {
71
+		if ($isAlreadyEnabled) {
72 72
 			$output->writeln('Master key already enabled');
73 73
 		} else {
74 74
 			$question = new ConfirmationQuestion(
Please login to merge, or discard this patch.
apps/encryption/lib/Hooks/UserHooks.php 3 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -276,7 +276,7 @@  discard block
 block discarded – undo
276 276
 			// Save private key
277 277
 			if ($encryptedPrivateKey) {
278 278
 				$this->keyManager->setPrivateKey($this->user->getUser()->getUID(),
279
-					$this->crypt->generateHeader() . $encryptedPrivateKey);
279
+					$this->crypt->generateHeader().$encryptedPrivateKey);
280 280
 			} else {
281 281
 				$this->logger->error('Encryption could not update users encryption password');
282 282
 			}
@@ -313,7 +313,7 @@  discard block
 block discarded – undo
313 313
 				$encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $newUserPassword, $user);
314 314
 
315 315
 				if ($encryptedKey) {
316
-					$this->keyManager->setPrivateKey($user, $this->crypt->generateHeader() . $encryptedKey);
316
+					$this->keyManager->setPrivateKey($user, $this->crypt->generateHeader().$encryptedKey);
317 317
 
318 318
 					if ($recoveryPassword) { // if recovery key is set we can re-encrypt the key files
319 319
 						$this->recovery->recoverUsersFiles($recoveryPassword, $user);
Please login to merge, or discard this patch.
Unused Use Statements   -1 removed lines patch added patch discarded remove patch
@@ -32,7 +32,6 @@
 block discarded – undo
32 32
 use OCA\Encryption\KeyManager;
33 33
 use OCA\Encryption\Crypto\Crypt;
34 34
 use OCA\Encryption\Users\Setup;
35
-use OCP\App;
36 35
 use OCP\ILogger;
37 36
 use OCP\IUserSession;
38 37
 use OCA\Encryption\Util;
Please login to merge, or discard this patch.
Indentation   +289 added lines, -289 removed lines patch added patch discarded remove patch
@@ -41,293 +41,293 @@
 block discarded – undo
41 41
 
42 42
 class UserHooks implements IHook {
43 43
 
44
-	/**
45
-	 * list of user for which we perform a password reset
46
-	 * @var array
47
-	 */
48
-	protected static $passwordResetUsers = [];
49
-
50
-	/**
51
-	 * @var KeyManager
52
-	 */
53
-	private $keyManager;
54
-	/**
55
-	 * @var IUserManager
56
-	 */
57
-	private $userManager;
58
-	/**
59
-	 * @var ILogger
60
-	 */
61
-	private $logger;
62
-	/**
63
-	 * @var Setup
64
-	 */
65
-	private $userSetup;
66
-	/**
67
-	 * @var IUserSession
68
-	 */
69
-	private $user;
70
-	/**
71
-	 * @var Util
72
-	 */
73
-	private $util;
74
-	/**
75
-	 * @var Session
76
-	 */
77
-	private $session;
78
-	/**
79
-	 * @var Recovery
80
-	 */
81
-	private $recovery;
82
-	/**
83
-	 * @var Crypt
84
-	 */
85
-	private $crypt;
86
-
87
-	/**
88
-	 * UserHooks constructor.
89
-	 *
90
-	 * @param KeyManager $keyManager
91
-	 * @param IUserManager $userManager
92
-	 * @param ILogger $logger
93
-	 * @param Setup $userSetup
94
-	 * @param IUserSession $user
95
-	 * @param Util $util
96
-	 * @param Session $session
97
-	 * @param Crypt $crypt
98
-	 * @param Recovery $recovery
99
-	 */
100
-	public function __construct(KeyManager $keyManager,
101
-								IUserManager $userManager,
102
-								ILogger $logger,
103
-								Setup $userSetup,
104
-								IUserSession $user,
105
-								Util $util,
106
-								Session $session,
107
-								Crypt $crypt,
108
-								Recovery $recovery) {
109
-
110
-		$this->keyManager = $keyManager;
111
-		$this->userManager = $userManager;
112
-		$this->logger = $logger;
113
-		$this->userSetup = $userSetup;
114
-		$this->user = $user;
115
-		$this->util = $util;
116
-		$this->session = $session;
117
-		$this->recovery = $recovery;
118
-		$this->crypt = $crypt;
119
-	}
120
-
121
-	/**
122
-	 * Connects Hooks
123
-	 *
124
-	 * @return null
125
-	 */
126
-	public function addHooks() {
127
-		OCUtil::connectHook('OC_User', 'post_login', $this, 'login');
128
-		OCUtil::connectHook('OC_User', 'logout', $this, 'logout');
129
-
130
-		// this hooks only make sense if no master key is used
131
-		if ($this->util->isMasterKeyEnabled() === false) {
132
-			OCUtil::connectHook('OC_User',
133
-				'post_setPassword',
134
-				$this,
135
-				'setPassphrase');
136
-
137
-			OCUtil::connectHook('OC_User',
138
-				'pre_setPassword',
139
-				$this,
140
-				'preSetPassphrase');
141
-
142
-			OCUtil::connectHook('\OC\Core\LostPassword\Controller\LostController',
143
-				'post_passwordReset',
144
-				$this,
145
-				'postPasswordReset');
146
-
147
-			OCUtil::connectHook('\OC\Core\LostPassword\Controller\LostController',
148
-				'pre_passwordReset',
149
-				$this,
150
-				'prePasswordReset');
151
-
152
-			OCUtil::connectHook('OC_User',
153
-				'post_createUser',
154
-				$this,
155
-				'postCreateUser');
156
-
157
-			OCUtil::connectHook('OC_User',
158
-				'post_deleteUser',
159
-				$this,
160
-				'postDeleteUser');
161
-		}
162
-	}
163
-
164
-
165
-	/**
166
-	 * Startup encryption backend upon user login
167
-	 *
168
-	 * @note This method should never be called for users using client side encryption
169
-	 * @param array $params
170
-	 * @return boolean|null
171
-	 */
172
-	public function login($params) {
173
-		// ensure filesystem is loaded
174
-		if (!\OC\Files\Filesystem::$loaded) {
175
-			$this->setupFS($params['uid']);
176
-		}
177
-		if ($this->util->isMasterKeyEnabled() === false) {
178
-			$this->userSetup->setupUser($params['uid'], $params['password']);
179
-		}
180
-
181
-		$this->keyManager->init($params['uid'], $params['password']);
182
-	}
183
-
184
-	/**
185
-	 * remove keys from session during logout
186
-	 */
187
-	public function logout() {
188
-		$this->session->clear();
189
-	}
190
-
191
-	/**
192
-	 * setup encryption backend upon user created
193
-	 *
194
-	 * @note This method should never be called for users using client side encryption
195
-	 * @param array $params
196
-	 */
197
-	public function postCreateUser($params) {
198
-		$this->userSetup->setupUser($params['uid'], $params['password']);
199
-	}
200
-
201
-	/**
202
-	 * cleanup encryption backend upon user deleted
203
-	 *
204
-	 * @param array $params : uid, password
205
-	 * @note This method should never be called for users using client side encryption
206
-	 */
207
-	public function postDeleteUser($params) {
208
-		$this->keyManager->deletePublicKey($params['uid']);
209
-	}
210
-
211
-	public function prePasswordReset($params) {
212
-		$user = $params['uid'];
213
-		self::$passwordResetUsers[$user] = true;
214
-	}
215
-
216
-	public function postPasswordReset($params) {
217
-		$uid = $params['uid'];
218
-		$password = $params['password'];
219
-		$this->keyManager->backupUserKeys('passwordReset', $uid);
220
-		$this->keyManager->deleteUserKeys($uid);
221
-		$this->userSetup->setupUser($uid, $password);
222
-		unset(self::$passwordResetUsers[$uid]);
223
-	}
224
-
225
-	/**
226
-	 * If the password can't be changed within Nextcloud, than update the key password in advance.
227
-	 *
228
-	 * @param array $params : uid, password
229
-	 * @return boolean|null
230
-	 */
231
-	public function preSetPassphrase($params) {
232
-		$user = $this->userManager->get($params['uid']);
233
-
234
-		if ($user && !$user->canChangePassword()) {
235
-			$this->setPassphrase($params);
236
-		}
237
-	}
238
-
239
-	/**
240
-	 * Change a user's encryption passphrase
241
-	 *
242
-	 * @param array $params keys: uid, password
243
-	 * @return boolean|null
244
-	 */
245
-	public function setPassphrase($params) {
246
-
247
-		// if we are in the process to resetting a user password, we have nothing
248
-		// to do here
249
-		if (isset(self::$passwordResetUsers[$params['uid']])) {
250
-			return true;
251
-		}
252
-
253
-		// Get existing decrypted private key
254
-		$privateKey = $this->session->getPrivateKey();
255
-		$user = $this->user->getUser();
256
-
257
-		// current logged in user changes his own password
258
-		if ($user && $params['uid'] === $user->getUID() && $privateKey) {
259
-
260
-			// Encrypt private key with new user pwd as passphrase
261
-			$encryptedPrivateKey = $this->crypt->encryptPrivateKey($privateKey, $params['password'], $params['uid']);
262
-
263
-			// Save private key
264
-			if ($encryptedPrivateKey) {
265
-				$this->keyManager->setPrivateKey($this->user->getUser()->getUID(),
266
-					$this->crypt->generateHeader() . $encryptedPrivateKey);
267
-			} else {
268
-				$this->logger->error('Encryption could not update users encryption password');
269
-			}
270
-
271
-			// NOTE: Session does not need to be updated as the
272
-			// private key has not changed, only the passphrase
273
-			// used to decrypt it has changed
274
-		} else { // admin changed the password for a different user, create new keys and re-encrypt file keys
275
-			$user = $params['uid'];
276
-			$this->initMountPoints($user);
277
-			$recoveryPassword = isset($params['recoveryPassword']) ? $params['recoveryPassword'] : null;
278
-
279
-			// we generate new keys if...
280
-			// ...we have a recovery password and the user enabled the recovery key
281
-			// ...encryption was activated for the first time (no keys exists)
282
-			// ...the user doesn't have any files
283
-			if (
284
-				($this->recovery->isRecoveryEnabledForUser($user) && $recoveryPassword)
285
-				|| !$this->keyManager->userHasKeys($user)
286
-				|| !$this->util->userHasFiles($user)
287
-			) {
288
-
289
-				// backup old keys
290
-				//$this->backupAllKeys('recovery');
291
-
292
-				$newUserPassword = $params['password'];
293
-
294
-				$keyPair = $this->crypt->createKeyPair();
295
-
296
-				// Save public key
297
-				$this->keyManager->setPublicKey($user, $keyPair['publicKey']);
298
-
299
-				// Encrypt private key with new password
300
-				$encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $newUserPassword, $user);
301
-
302
-				if ($encryptedKey) {
303
-					$this->keyManager->setPrivateKey($user, $this->crypt->generateHeader() . $encryptedKey);
304
-
305
-					if ($recoveryPassword) { // if recovery key is set we can re-encrypt the key files
306
-						$this->recovery->recoverUsersFiles($recoveryPassword, $user);
307
-					}
308
-				} else {
309
-					$this->logger->error('Encryption Could not update users encryption password');
310
-				}
311
-			}
312
-		}
313
-	}
314
-
315
-	/**
316
-	 * init mount points for given user
317
-	 *
318
-	 * @param string $user
319
-	 * @throws \OC\User\NoUserException
320
-	 */
321
-	protected function initMountPoints($user) {
322
-		Filesystem::initMountPoints($user);
323
-	}
324
-
325
-	/**
326
-	 * setup file system for user
327
-	 *
328
-	 * @param string $uid user id
329
-	 */
330
-	protected function setupFS($uid) {
331
-		\OC_Util::setupFS($uid);
332
-	}
44
+    /**
45
+     * list of user for which we perform a password reset
46
+     * @var array
47
+     */
48
+    protected static $passwordResetUsers = [];
49
+
50
+    /**
51
+     * @var KeyManager
52
+     */
53
+    private $keyManager;
54
+    /**
55
+     * @var IUserManager
56
+     */
57
+    private $userManager;
58
+    /**
59
+     * @var ILogger
60
+     */
61
+    private $logger;
62
+    /**
63
+     * @var Setup
64
+     */
65
+    private $userSetup;
66
+    /**
67
+     * @var IUserSession
68
+     */
69
+    private $user;
70
+    /**
71
+     * @var Util
72
+     */
73
+    private $util;
74
+    /**
75
+     * @var Session
76
+     */
77
+    private $session;
78
+    /**
79
+     * @var Recovery
80
+     */
81
+    private $recovery;
82
+    /**
83
+     * @var Crypt
84
+     */
85
+    private $crypt;
86
+
87
+    /**
88
+     * UserHooks constructor.
89
+     *
90
+     * @param KeyManager $keyManager
91
+     * @param IUserManager $userManager
92
+     * @param ILogger $logger
93
+     * @param Setup $userSetup
94
+     * @param IUserSession $user
95
+     * @param Util $util
96
+     * @param Session $session
97
+     * @param Crypt $crypt
98
+     * @param Recovery $recovery
99
+     */
100
+    public function __construct(KeyManager $keyManager,
101
+                                IUserManager $userManager,
102
+                                ILogger $logger,
103
+                                Setup $userSetup,
104
+                                IUserSession $user,
105
+                                Util $util,
106
+                                Session $session,
107
+                                Crypt $crypt,
108
+                                Recovery $recovery) {
109
+
110
+        $this->keyManager = $keyManager;
111
+        $this->userManager = $userManager;
112
+        $this->logger = $logger;
113
+        $this->userSetup = $userSetup;
114
+        $this->user = $user;
115
+        $this->util = $util;
116
+        $this->session = $session;
117
+        $this->recovery = $recovery;
118
+        $this->crypt = $crypt;
119
+    }
120
+
121
+    /**
122
+     * Connects Hooks
123
+     *
124
+     * @return null
125
+     */
126
+    public function addHooks() {
127
+        OCUtil::connectHook('OC_User', 'post_login', $this, 'login');
128
+        OCUtil::connectHook('OC_User', 'logout', $this, 'logout');
129
+
130
+        // this hooks only make sense if no master key is used
131
+        if ($this->util->isMasterKeyEnabled() === false) {
132
+            OCUtil::connectHook('OC_User',
133
+                'post_setPassword',
134
+                $this,
135
+                'setPassphrase');
136
+
137
+            OCUtil::connectHook('OC_User',
138
+                'pre_setPassword',
139
+                $this,
140
+                'preSetPassphrase');
141
+
142
+            OCUtil::connectHook('\OC\Core\LostPassword\Controller\LostController',
143
+                'post_passwordReset',
144
+                $this,
145
+                'postPasswordReset');
146
+
147
+            OCUtil::connectHook('\OC\Core\LostPassword\Controller\LostController',
148
+                'pre_passwordReset',
149
+                $this,
150
+                'prePasswordReset');
151
+
152
+            OCUtil::connectHook('OC_User',
153
+                'post_createUser',
154
+                $this,
155
+                'postCreateUser');
156
+
157
+            OCUtil::connectHook('OC_User',
158
+                'post_deleteUser',
159
+                $this,
160
+                'postDeleteUser');
161
+        }
162
+    }
163
+
164
+
165
+    /**
166
+     * Startup encryption backend upon user login
167
+     *
168
+     * @note This method should never be called for users using client side encryption
169
+     * @param array $params
170
+     * @return boolean|null
171
+     */
172
+    public function login($params) {
173
+        // ensure filesystem is loaded
174
+        if (!\OC\Files\Filesystem::$loaded) {
175
+            $this->setupFS($params['uid']);
176
+        }
177
+        if ($this->util->isMasterKeyEnabled() === false) {
178
+            $this->userSetup->setupUser($params['uid'], $params['password']);
179
+        }
180
+
181
+        $this->keyManager->init($params['uid'], $params['password']);
182
+    }
183
+
184
+    /**
185
+     * remove keys from session during logout
186
+     */
187
+    public function logout() {
188
+        $this->session->clear();
189
+    }
190
+
191
+    /**
192
+     * setup encryption backend upon user created
193
+     *
194
+     * @note This method should never be called for users using client side encryption
195
+     * @param array $params
196
+     */
197
+    public function postCreateUser($params) {
198
+        $this->userSetup->setupUser($params['uid'], $params['password']);
199
+    }
200
+
201
+    /**
202
+     * cleanup encryption backend upon user deleted
203
+     *
204
+     * @param array $params : uid, password
205
+     * @note This method should never be called for users using client side encryption
206
+     */
207
+    public function postDeleteUser($params) {
208
+        $this->keyManager->deletePublicKey($params['uid']);
209
+    }
210
+
211
+    public function prePasswordReset($params) {
212
+        $user = $params['uid'];
213
+        self::$passwordResetUsers[$user] = true;
214
+    }
215
+
216
+    public function postPasswordReset($params) {
217
+        $uid = $params['uid'];
218
+        $password = $params['password'];
219
+        $this->keyManager->backupUserKeys('passwordReset', $uid);
220
+        $this->keyManager->deleteUserKeys($uid);
221
+        $this->userSetup->setupUser($uid, $password);
222
+        unset(self::$passwordResetUsers[$uid]);
223
+    }
224
+
225
+    /**
226
+     * If the password can't be changed within Nextcloud, than update the key password in advance.
227
+     *
228
+     * @param array $params : uid, password
229
+     * @return boolean|null
230
+     */
231
+    public function preSetPassphrase($params) {
232
+        $user = $this->userManager->get($params['uid']);
233
+
234
+        if ($user && !$user->canChangePassword()) {
235
+            $this->setPassphrase($params);
236
+        }
237
+    }
238
+
239
+    /**
240
+     * Change a user's encryption passphrase
241
+     *
242
+     * @param array $params keys: uid, password
243
+     * @return boolean|null
244
+     */
245
+    public function setPassphrase($params) {
246
+
247
+        // if we are in the process to resetting a user password, we have nothing
248
+        // to do here
249
+        if (isset(self::$passwordResetUsers[$params['uid']])) {
250
+            return true;
251
+        }
252
+
253
+        // Get existing decrypted private key
254
+        $privateKey = $this->session->getPrivateKey();
255
+        $user = $this->user->getUser();
256
+
257
+        // current logged in user changes his own password
258
+        if ($user && $params['uid'] === $user->getUID() && $privateKey) {
259
+
260
+            // Encrypt private key with new user pwd as passphrase
261
+            $encryptedPrivateKey = $this->crypt->encryptPrivateKey($privateKey, $params['password'], $params['uid']);
262
+
263
+            // Save private key
264
+            if ($encryptedPrivateKey) {
265
+                $this->keyManager->setPrivateKey($this->user->getUser()->getUID(),
266
+                    $this->crypt->generateHeader() . $encryptedPrivateKey);
267
+            } else {
268
+                $this->logger->error('Encryption could not update users encryption password');
269
+            }
270
+
271
+            // NOTE: Session does not need to be updated as the
272
+            // private key has not changed, only the passphrase
273
+            // used to decrypt it has changed
274
+        } else { // admin changed the password for a different user, create new keys and re-encrypt file keys
275
+            $user = $params['uid'];
276
+            $this->initMountPoints($user);
277
+            $recoveryPassword = isset($params['recoveryPassword']) ? $params['recoveryPassword'] : null;
278
+
279
+            // we generate new keys if...
280
+            // ...we have a recovery password and the user enabled the recovery key
281
+            // ...encryption was activated for the first time (no keys exists)
282
+            // ...the user doesn't have any files
283
+            if (
284
+                ($this->recovery->isRecoveryEnabledForUser($user) && $recoveryPassword)
285
+                || !$this->keyManager->userHasKeys($user)
286
+                || !$this->util->userHasFiles($user)
287
+            ) {
288
+
289
+                // backup old keys
290
+                //$this->backupAllKeys('recovery');
291
+
292
+                $newUserPassword = $params['password'];
293
+
294
+                $keyPair = $this->crypt->createKeyPair();
295
+
296
+                // Save public key
297
+                $this->keyManager->setPublicKey($user, $keyPair['publicKey']);
298
+
299
+                // Encrypt private key with new password
300
+                $encryptedKey = $this->crypt->encryptPrivateKey($keyPair['privateKey'], $newUserPassword, $user);
301
+
302
+                if ($encryptedKey) {
303
+                    $this->keyManager->setPrivateKey($user, $this->crypt->generateHeader() . $encryptedKey);
304
+
305
+                    if ($recoveryPassword) { // if recovery key is set we can re-encrypt the key files
306
+                        $this->recovery->recoverUsersFiles($recoveryPassword, $user);
307
+                    }
308
+                } else {
309
+                    $this->logger->error('Encryption Could not update users encryption password');
310
+                }
311
+            }
312
+        }
313
+    }
314
+
315
+    /**
316
+     * init mount points for given user
317
+     *
318
+     * @param string $user
319
+     * @throws \OC\User\NoUserException
320
+     */
321
+    protected function initMountPoints($user) {
322
+        Filesystem::initMountPoints($user);
323
+    }
324
+
325
+    /**
326
+     * setup file system for user
327
+     *
328
+     * @param string $uid user id
329
+     */
330
+    protected function setupFS($uid) {
331
+        \OC_Util::setupFS($uid);
332
+    }
333 333
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Hooks/Contracts/IHook.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -24,10 +24,10 @@
 block discarded – undo
24 24
 
25 25
 
26 26
 interface IHook {
27
-	/**
28
-	 * Connects Hooks
29
-	 *
30
-	 * @return null
31
-	 */
32
-	public function addHooks();
27
+    /**
28
+     * Connects Hooks
29
+     *
30
+     * @return null
31
+     */
32
+    public function addHooks();
33 33
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Settings/Admin.php 1 patch
Indentation   +85 added lines, -85 removed lines patch added patch discarded remove patch
@@ -38,90 +38,90 @@
 block discarded – undo
38 38
 
39 39
 class Admin implements ISettings {
40 40
 
41
-	/** @var IL10N */
42
-	private $l;
43
-
44
-	/** @var ILogger */
45
-	private $logger;
46
-
47
-	/** @var IUserSession */
48
-	private $userSession;
49
-
50
-	/** @var IConfig */
51
-	private $config;
52
-
53
-	/** @var IUserManager */
54
-	private $userManager;
55
-
56
-	/** @var ISession */
57
-	private $session;
58
-
59
-	public function __construct(
60
-		IL10N $l,
61
-		ILogger $logger,
62
-		IUserSession $userSession,
63
-		IConfig $config,
64
-		IUserManager $userManager,
65
-		ISession $session
66
-	) {
67
-		$this->l = $l;
68
-		$this->logger = $logger;
69
-		$this->userSession = $userSession;
70
-		$this->config = $config;
71
-		$this->userManager = $userManager;
72
-		$this->session = $session;
73
-	}
74
-
75
-	/**
76
-	 * @return TemplateResponse
77
-	 */
78
-	public function getForm() {
79
-		$crypt = new Crypt(
80
-			$this->logger,
81
-			$this->userSession,
82
-			$this->config,
83
-			$this->l);
84
-
85
-		$util = new Util(
86
-			new View(),
87
-			$crypt,
88
-			$this->logger,
89
-			$this->userSession,
90
-			$this->config,
91
-			$this->userManager);
92
-
93
-		// Check if an adminRecovery account is enabled for recovering files after lost pwd
94
-		$recoveryAdminEnabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', '0');
95
-		$session = new Session($this->session);
96
-
97
-		$encryptHomeStorage = $util->shouldEncryptHomeStorage();
98
-
99
-		$parameters = [
100
-			'recoveryEnabled'    => $recoveryAdminEnabled,
101
-			'initStatus'         => $session->getStatus(),
102
-			'encryptHomeStorage' => $encryptHomeStorage,
103
-			'masterKeyEnabled'   => $util->isMasterKeyEnabled(),
104
-		];
105
-
106
-		return new TemplateResponse('encryption', 'settings-admin', $parameters, '');
107
-	}
108
-
109
-	/**
110
-	 * @return string the section ID, e.g. 'sharing'
111
-	 */
112
-	public function getSection() {
113
-		return 'encryption';
114
-	}
115
-
116
-	/**
117
-	 * @return int whether the form should be rather on the top or bottom of
118
-	 * the admin section. The forms are arranged in ascending order of the
119
-	 * priority values. It is required to return a value between 0 and 100.
120
-	 *
121
-	 * E.g.: 70
122
-	 */
123
-	public function getPriority() {
124
-		return 5;
125
-	}
41
+    /** @var IL10N */
42
+    private $l;
43
+
44
+    /** @var ILogger */
45
+    private $logger;
46
+
47
+    /** @var IUserSession */
48
+    private $userSession;
49
+
50
+    /** @var IConfig */
51
+    private $config;
52
+
53
+    /** @var IUserManager */
54
+    private $userManager;
55
+
56
+    /** @var ISession */
57
+    private $session;
58
+
59
+    public function __construct(
60
+        IL10N $l,
61
+        ILogger $logger,
62
+        IUserSession $userSession,
63
+        IConfig $config,
64
+        IUserManager $userManager,
65
+        ISession $session
66
+    ) {
67
+        $this->l = $l;
68
+        $this->logger = $logger;
69
+        $this->userSession = $userSession;
70
+        $this->config = $config;
71
+        $this->userManager = $userManager;
72
+        $this->session = $session;
73
+    }
74
+
75
+    /**
76
+     * @return TemplateResponse
77
+     */
78
+    public function getForm() {
79
+        $crypt = new Crypt(
80
+            $this->logger,
81
+            $this->userSession,
82
+            $this->config,
83
+            $this->l);
84
+
85
+        $util = new Util(
86
+            new View(),
87
+            $crypt,
88
+            $this->logger,
89
+            $this->userSession,
90
+            $this->config,
91
+            $this->userManager);
92
+
93
+        // Check if an adminRecovery account is enabled for recovering files after lost pwd
94
+        $recoveryAdminEnabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', '0');
95
+        $session = new Session($this->session);
96
+
97
+        $encryptHomeStorage = $util->shouldEncryptHomeStorage();
98
+
99
+        $parameters = [
100
+            'recoveryEnabled'    => $recoveryAdminEnabled,
101
+            'initStatus'         => $session->getStatus(),
102
+            'encryptHomeStorage' => $encryptHomeStorage,
103
+            'masterKeyEnabled'   => $util->isMasterKeyEnabled(),
104
+        ];
105
+
106
+        return new TemplateResponse('encryption', 'settings-admin', $parameters, '');
107
+    }
108
+
109
+    /**
110
+     * @return string the section ID, e.g. 'sharing'
111
+     */
112
+    public function getSection() {
113
+        return 'encryption';
114
+    }
115
+
116
+    /**
117
+     * @return int whether the form should be rather on the top or bottom of
118
+     * the admin section. The forms are arranged in ascending order of the
119
+     * priority values. It is required to return a value between 0 and 100.
120
+     *
121
+     * E.g.: 70
122
+     */
123
+    public function getPriority() {
124
+        return 5;
125
+    }
126 126
 
127 127
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Session.php 1 patch
Indentation   +154 added lines, -154 removed lines patch added patch discarded remove patch
@@ -29,159 +29,159 @@
 block discarded – undo
29 29
 
30 30
 class Session {
31 31
 
32
-	/** @var ISession */
33
-	protected $session;
34
-
35
-	const NOT_INITIALIZED = '0';
36
-	const INIT_EXECUTED = '1';
37
-	const INIT_SUCCESSFUL = '2';
38
-	const RUN_MIGRATION = '3';
39
-
40
-	/**
41
-	 * @param ISession $session
42
-	 */
43
-	public function __construct(ISession $session) {
44
-		$this->session = $session;
45
-	}
46
-
47
-	/**
48
-	 * Sets status of encryption app
49
-	 *
50
-	 * @param string $status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
51
-	 */
52
-	public function setStatus($status) {
53
-		$this->session->set('encryptionInitialized', $status);
54
-	}
55
-
56
-	/**
57
-	 * Gets status if we already tried to initialize the encryption app
58
-	 *
59
-	 * @return string init status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
60
-	 */
61
-	public function getStatus() {
62
-		$status = $this->session->get('encryptionInitialized');
63
-		if (is_null($status)) {
64
-			$status = self::NOT_INITIALIZED;
65
-		}
66
-
67
-		return $status;
68
-	}
69
-
70
-	/**
71
-	 * check if encryption was initialized successfully
72
-	 *
73
-	 * @return bool
74
-	 */
75
-	public function isReady() {
76
-		$status = $this->getStatus();
77
-		return $status === self::INIT_SUCCESSFUL;
78
-	}
79
-
80
-	/**
81
-	 * Gets user or public share private key from session
82
-	 *
83
-	 * @return string $privateKey The user's plaintext private key
84
-	 * @throws Exceptions\PrivateKeyMissingException
85
-	 */
86
-	public function getPrivateKey() {
87
-		$key = $this->session->get('privateKey');
88
-		if (is_null($key)) {
89
-			throw new Exceptions\PrivateKeyMissingException('please try to log-out and log-in again', 0);
90
-		}
91
-		return $key;
92
-	}
93
-
94
-	/**
95
-	 * check if private key is set
96
-	 *
97
-	 * @return boolean
98
-	 */
99
-	public function isPrivateKeySet() {
100
-		$key = $this->session->get('privateKey');
101
-		if (is_null($key)) {
102
-			return false;
103
-		}
104
-
105
-		return true;
106
-	}
107
-
108
-	/**
109
-	 * Sets user private key to session
110
-	 *
111
-	 * @param string $key users private key
112
-	 *
113
-	 * @note this should only be set on login
114
-	 */
115
-	public function setPrivateKey($key) {
116
-		$this->session->set('privateKey', $key);
117
-	}
118
-
119
-	/**
120
-	 * store data needed for the decrypt all operation in the session
121
-	 *
122
-	 * @param string $user
123
-	 * @param string $key
124
-	 */
125
-	public function prepareDecryptAll($user, $key) {
126
-		$this->session->set('decryptAll', true);
127
-		$this->session->set('decryptAllKey', $key);
128
-		$this->session->set('decryptAllUid', $user);
129
-	}
130
-
131
-	/**
132
-	 * check if we are in decrypt all mode
133
-	 *
134
-	 * @return bool
135
-	 */
136
-	public function decryptAllModeActivated() {
137
-		$decryptAll = $this->session->get('decryptAll');
138
-		return ($decryptAll === true);
139
-	}
140
-
141
-	/**
142
-	 * get uid used for decrypt all operation
143
-	 *
144
-	 * @return string
145
-	 * @throws \Exception
146
-	 */
147
-	public function getDecryptAllUid() {
148
-		$uid = $this->session->get('decryptAllUid');
149
-		if (is_null($uid) && $this->decryptAllModeActivated()) {
150
-			throw new \Exception('No uid found while in decrypt all mode');
151
-		} elseif (is_null($uid)) {
152
-			throw new \Exception('Please activate decrypt all mode first');
153
-		}
154
-
155
-		return $uid;
156
-	}
157
-
158
-	/**
159
-	 * get private key for decrypt all operation
160
-	 *
161
-	 * @return string
162
-	 * @throws PrivateKeyMissingException
163
-	 */
164
-	public function getDecryptAllKey() {
165
-		$privateKey = $this->session->get('decryptAllKey');
166
-		if (is_null($privateKey) && $this->decryptAllModeActivated()) {
167
-			throw new PrivateKeyMissingException('No private key found while in decrypt all mode');
168
-		} elseif (is_null($privateKey)) {
169
-			throw new PrivateKeyMissingException('Please activate decrypt all mode first');
170
-		}
171
-
172
-		return $privateKey;
173
-	}
174
-
175
-	/**
176
-	 * remove keys from session
177
-	 */
178
-	public function clear() {
179
-		$this->session->remove('publicSharePrivateKey');
180
-		$this->session->remove('privateKey');
181
-		$this->session->remove('encryptionInitialized');
182
-		$this->session->remove('decryptAll');
183
-		$this->session->remove('decryptAllKey');
184
-		$this->session->remove('decryptAllUid');
185
-	}
32
+    /** @var ISession */
33
+    protected $session;
34
+
35
+    const NOT_INITIALIZED = '0';
36
+    const INIT_EXECUTED = '1';
37
+    const INIT_SUCCESSFUL = '2';
38
+    const RUN_MIGRATION = '3';
39
+
40
+    /**
41
+     * @param ISession $session
42
+     */
43
+    public function __construct(ISession $session) {
44
+        $this->session = $session;
45
+    }
46
+
47
+    /**
48
+     * Sets status of encryption app
49
+     *
50
+     * @param string $status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
51
+     */
52
+    public function setStatus($status) {
53
+        $this->session->set('encryptionInitialized', $status);
54
+    }
55
+
56
+    /**
57
+     * Gets status if we already tried to initialize the encryption app
58
+     *
59
+     * @return string init status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
60
+     */
61
+    public function getStatus() {
62
+        $status = $this->session->get('encryptionInitialized');
63
+        if (is_null($status)) {
64
+            $status = self::NOT_INITIALIZED;
65
+        }
66
+
67
+        return $status;
68
+    }
69
+
70
+    /**
71
+     * check if encryption was initialized successfully
72
+     *
73
+     * @return bool
74
+     */
75
+    public function isReady() {
76
+        $status = $this->getStatus();
77
+        return $status === self::INIT_SUCCESSFUL;
78
+    }
79
+
80
+    /**
81
+     * Gets user or public share private key from session
82
+     *
83
+     * @return string $privateKey The user's plaintext private key
84
+     * @throws Exceptions\PrivateKeyMissingException
85
+     */
86
+    public function getPrivateKey() {
87
+        $key = $this->session->get('privateKey');
88
+        if (is_null($key)) {
89
+            throw new Exceptions\PrivateKeyMissingException('please try to log-out and log-in again', 0);
90
+        }
91
+        return $key;
92
+    }
93
+
94
+    /**
95
+     * check if private key is set
96
+     *
97
+     * @return boolean
98
+     */
99
+    public function isPrivateKeySet() {
100
+        $key = $this->session->get('privateKey');
101
+        if (is_null($key)) {
102
+            return false;
103
+        }
104
+
105
+        return true;
106
+    }
107
+
108
+    /**
109
+     * Sets user private key to session
110
+     *
111
+     * @param string $key users private key
112
+     *
113
+     * @note this should only be set on login
114
+     */
115
+    public function setPrivateKey($key) {
116
+        $this->session->set('privateKey', $key);
117
+    }
118
+
119
+    /**
120
+     * store data needed for the decrypt all operation in the session
121
+     *
122
+     * @param string $user
123
+     * @param string $key
124
+     */
125
+    public function prepareDecryptAll($user, $key) {
126
+        $this->session->set('decryptAll', true);
127
+        $this->session->set('decryptAllKey', $key);
128
+        $this->session->set('decryptAllUid', $user);
129
+    }
130
+
131
+    /**
132
+     * check if we are in decrypt all mode
133
+     *
134
+     * @return bool
135
+     */
136
+    public function decryptAllModeActivated() {
137
+        $decryptAll = $this->session->get('decryptAll');
138
+        return ($decryptAll === true);
139
+    }
140
+
141
+    /**
142
+     * get uid used for decrypt all operation
143
+     *
144
+     * @return string
145
+     * @throws \Exception
146
+     */
147
+    public function getDecryptAllUid() {
148
+        $uid = $this->session->get('decryptAllUid');
149
+        if (is_null($uid) && $this->decryptAllModeActivated()) {
150
+            throw new \Exception('No uid found while in decrypt all mode');
151
+        } elseif (is_null($uid)) {
152
+            throw new \Exception('Please activate decrypt all mode first');
153
+        }
154
+
155
+        return $uid;
156
+    }
157
+
158
+    /**
159
+     * get private key for decrypt all operation
160
+     *
161
+     * @return string
162
+     * @throws PrivateKeyMissingException
163
+     */
164
+    public function getDecryptAllKey() {
165
+        $privateKey = $this->session->get('decryptAllKey');
166
+        if (is_null($privateKey) && $this->decryptAllModeActivated()) {
167
+            throw new PrivateKeyMissingException('No private key found while in decrypt all mode');
168
+        } elseif (is_null($privateKey)) {
169
+            throw new PrivateKeyMissingException('Please activate decrypt all mode first');
170
+        }
171
+
172
+        return $privateKey;
173
+    }
174
+
175
+    /**
176
+     * remove keys from session
177
+     */
178
+    public function clear() {
179
+        $this->session->remove('publicSharePrivateKey');
180
+        $this->session->remove('privateKey');
181
+        $this->session->remove('encryptionInitialized');
182
+        $this->session->remove('decryptAll');
183
+        $this->session->remove('decryptAllKey');
184
+        $this->session->remove('decryptAllUid');
185
+    }
186 186
 
187 187
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Crypto/EncryptAll.php 2 patches
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -133,7 +133,7 @@  discard block
 block discarded – undo
133 133
 		$this->input = $input;
134 134
 		$this->output = $output;
135 135
 
136
-		$headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME;
136
+		$headline = 'Encrypt all files with the '.Encryption::DISPLAY_NAME;
137 137
 		$this->output->writeln("\n");
138 138
 		$this->output->writeln($headline);
139 139
 		$this->output->writeln(str_pad('', strlen($headline), '='));
@@ -179,14 +179,14 @@  discard block
 block discarded – undo
179 179
 		$progress->setFormat(" %message% \n [%bar%]");
180 180
 		$progress->start();
181 181
 
182
-		foreach($this->userManager->getBackends() as $backend) {
182
+		foreach ($this->userManager->getBackends() as $backend) {
183 183
 			$limit = 500;
184 184
 			$offset = 0;
185 185
 			do {
186 186
 				$users = $backend->getUsers('', $limit, $offset);
187 187
 				foreach ($users as $user) {
188 188
 					if ($this->keyManager->userHasKeys($user) === false) {
189
-						$progress->setMessage('Create key-pair for ' . $user);
189
+						$progress->setMessage('Create key-pair for '.$user);
190 190
 						$progress->advance();
191 191
 						$this->setupUserFS($user);
192 192
 						$password = $this->generateOneTimePassword($user);
@@ -198,7 +198,7 @@  discard block
 block discarded – undo
198 198
 					}
199 199
 				}
200 200
 				$offset += $limit;
201
-			} while(count($users) >= $limit);
201
+			} while (count($users) >= $limit);
202 202
 		}
203 203
 
204 204
 		$progress->setMessage('Key-pair created for all users');
@@ -236,7 +236,7 @@  discard block
 block discarded – undo
236 236
 	 */
237 237
 	protected function encryptAllUserFilesWithMasterKey(ProgressBar $progress) {
238 238
 		$userNo = 1;
239
-		foreach($this->userManager->getBackends() as $backend) {
239
+		foreach ($this->userManager->getBackends() as $backend) {
240 240
 			$limit = 500;
241 241
 			$offset = 0;
242 242
 			do {
@@ -247,7 +247,7 @@  discard block
 block discarded – undo
247 247
 					$userNo++;
248 248
 				}
249 249
 				$offset += $limit;
250
-			} while(count($users) >= $limit);
250
+			} while (count($users) >= $limit);
251 251
 		}
252 252
 	}
253 253
 
@@ -262,19 +262,19 @@  discard block
 block discarded – undo
262 262
 
263 263
 		$this->setupUserFS($uid);
264 264
 		$directories = array();
265
-		$directories[] =  '/' . $uid . '/files';
265
+		$directories[] = '/'.$uid.'/files';
266 266
 
267
-		while($root = array_pop($directories)) {
267
+		while ($root = array_pop($directories)) {
268 268
 			$content = $this->rootView->getDirectoryContent($root);
269 269
 			foreach ($content as $file) {
270
-				$path = $root . '/' . $file['name'];
270
+				$path = $root.'/'.$file['name'];
271 271
 				if ($this->rootView->is_dir($path)) {
272 272
 					$directories[] = $path;
273 273
 					continue;
274 274
 				} else {
275 275
 					$progress->setMessage("encrypt files for user $userCount: $path");
276 276
 					$progress->advance();
277
-					if($this->encryptFile($path) === false) {
277
+					if ($this->encryptFile($path) === false) {
278 278
 						$progress->setMessage("encrypt files for user $userCount: $path (already encrypted)");
279 279
 						$progress->advance();
280 280
 					}
@@ -292,7 +292,7 @@  discard block
 block discarded – undo
292 292
 	protected function encryptFile($path) {
293 293
 
294 294
 		$source = $path;
295
-		$target = $path . '.encrypted.' . time();
295
+		$target = $path.'.encrypted.'.time();
296 296
 
297 297
 		try {
298 298
 			$this->rootView->copy($source, $target);
@@ -414,7 +414,7 @@  discard block
 block discarded – undo
414 414
 					continue;
415 415
 				}
416 416
 
417
-				$subject = (string)$this->l->t('one-time password for server-side-encryption');
417
+				$subject = (string) $this->l->t('one-time password for server-side-encryption');
418 418
 				list($htmlBody, $textBody) = $this->createMailBody($password);
419 419
 
420 420
 				// send it out now
@@ -462,11 +462,11 @@  discard block
 block discarded – undo
462 462
 	protected function createMailBody($password) {
463 463
 
464 464
 		$html = new \OC_Template("encryption", "mail", "");
465
-		$html->assign ('password', $password);
465
+		$html->assign('password', $password);
466 466
 		$htmlMail = $html->fetchPage();
467 467
 
468 468
 		$plainText = new \OC_Template("encryption", "altmail", "");
469
-		$plainText->assign ('password', $password);
469
+		$plainText->assign('password', $password);
470 470
 		$plainTextMail = $plainText->fetchPage();
471 471
 
472 472
 		return [$htmlMail, $plainTextMail];
Please login to merge, or discard this patch.
Indentation   +429 added lines, -429 removed lines patch added patch discarded remove patch
@@ -45,434 +45,434 @@
 block discarded – undo
45 45
 
46 46
 class EncryptAll {
47 47
 
48
-	/** @var Setup */
49
-	protected $userSetup;
50
-
51
-	/** @var IUserManager */
52
-	protected $userManager;
53
-
54
-	/** @var View */
55
-	protected $rootView;
56
-
57
-	/** @var KeyManager */
58
-	protected $keyManager;
59
-
60
-	/** @var Util */
61
-	protected $util;
62
-
63
-	/** @var array  */
64
-	protected $userPasswords;
65
-
66
-	/** @var  IConfig */
67
-	protected $config;
68
-
69
-	/** @var IMailer */
70
-	protected $mailer;
71
-
72
-	/** @var  IL10N */
73
-	protected $l;
74
-
75
-	/** @var  QuestionHelper */
76
-	protected $questionHelper;
77
-
78
-	/** @var  OutputInterface */
79
-	protected $output;
80
-
81
-	/** @var  InputInterface */
82
-	protected $input;
83
-
84
-	/** @var ISecureRandom */
85
-	protected $secureRandom;
86
-
87
-	/**
88
-	 * @param Setup $userSetup
89
-	 * @param IUserManager $userManager
90
-	 * @param View $rootView
91
-	 * @param KeyManager $keyManager
92
-	 * @param Util $util
93
-	 * @param IConfig $config
94
-	 * @param IMailer $mailer
95
-	 * @param IL10N $l
96
-	 * @param QuestionHelper $questionHelper
97
-	 * @param ISecureRandom $secureRandom
98
-	 */
99
-	public function __construct(
100
-		Setup $userSetup,
101
-		IUserManager $userManager,
102
-		View $rootView,
103
-		KeyManager $keyManager,
104
-		Util $util,
105
-		IConfig $config,
106
-		IMailer $mailer,
107
-		IL10N $l,
108
-		QuestionHelper $questionHelper,
109
-		ISecureRandom $secureRandom
110
-	) {
111
-		$this->userSetup = $userSetup;
112
-		$this->userManager = $userManager;
113
-		$this->rootView = $rootView;
114
-		$this->keyManager = $keyManager;
115
-		$this->util = $util;
116
-		$this->config = $config;
117
-		$this->mailer = $mailer;
118
-		$this->l = $l;
119
-		$this->questionHelper = $questionHelper;
120
-		$this->secureRandom = $secureRandom;
121
-		// store one time passwords for the users
122
-		$this->userPasswords = array();
123
-	}
124
-
125
-	/**
126
-	 * start to encrypt all files
127
-	 *
128
-	 * @param InputInterface $input
129
-	 * @param OutputInterface $output
130
-	 */
131
-	public function encryptAll(InputInterface $input, OutputInterface $output) {
132
-
133
-		$this->input = $input;
134
-		$this->output = $output;
135
-
136
-		$headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME;
137
-		$this->output->writeln("\n");
138
-		$this->output->writeln($headline);
139
-		$this->output->writeln(str_pad('', strlen($headline), '='));
140
-		$this->output->writeln("\n");
141
-
142
-		if ($this->util->isMasterKeyEnabled()) {
143
-			$this->output->writeln('Use master key to encrypt all files.');
144
-			$this->keyManager->validateMasterKey();
145
-		} else {
146
-			//create private/public keys for each user and store the private key password
147
-			$this->output->writeln('Create key-pair for every user');
148
-			$this->output->writeln('------------------------------');
149
-			$this->output->writeln('');
150
-			$this->output->writeln('This module will encrypt all files in the users files folder initially.');
151
-			$this->output->writeln('Already existing versions and files in the trash bin will not be encrypted.');
152
-			$this->output->writeln('');
153
-			$this->createKeyPairs();
154
-		}
155
-
156
-
157
-		// output generated encryption key passwords
158
-		if ($this->util->isMasterKeyEnabled() === false) {
159
-			//send-out or display password list and write it to a file
160
-			$this->output->writeln("\n");
161
-			$this->output->writeln('Generated encryption key passwords');
162
-			$this->output->writeln('----------------------------------');
163
-			$this->output->writeln('');
164
-			$this->outputPasswords();
165
-		}
166
-
167
-		//setup users file system and encrypt all files one by one (take should encrypt setting of storage into account)
168
-		$this->output->writeln("\n");
169
-		$this->output->writeln('Start to encrypt users files');
170
-		$this->output->writeln('----------------------------');
171
-		$this->output->writeln('');
172
-		$this->encryptAllUsersFiles();
173
-		$this->output->writeln("\n");
174
-	}
175
-
176
-	/**
177
-	 * create key-pair for every user
178
-	 */
179
-	protected function createKeyPairs() {
180
-		$this->output->writeln("\n");
181
-		$progress = new ProgressBar($this->output);
182
-		$progress->setFormat(" %message% \n [%bar%]");
183
-		$progress->start();
184
-
185
-		foreach($this->userManager->getBackends() as $backend) {
186
-			$limit = 500;
187
-			$offset = 0;
188
-			do {
189
-				$users = $backend->getUsers('', $limit, $offset);
190
-				foreach ($users as $user) {
191
-					if ($this->keyManager->userHasKeys($user) === false) {
192
-						$progress->setMessage('Create key-pair for ' . $user);
193
-						$progress->advance();
194
-						$this->setupUserFS($user);
195
-						$password = $this->generateOneTimePassword($user);
196
-						$this->userSetup->setupUser($user, $password);
197
-					} else {
198
-						// users which already have a key-pair will be stored with a
199
-						// empty password and filtered out later
200
-						$this->userPasswords[$user] = '';
201
-					}
202
-				}
203
-				$offset += $limit;
204
-			} while(count($users) >= $limit);
205
-		}
206
-
207
-		$progress->setMessage('Key-pair created for all users');
208
-		$progress->finish();
209
-	}
210
-
211
-	/**
212
-	 * iterate over all user and encrypt their files
213
-	 */
214
-	protected function encryptAllUsersFiles() {
215
-		$this->output->writeln("\n");
216
-		$progress = new ProgressBar($this->output);
217
-		$progress->setFormat(" %message% \n [%bar%]");
218
-		$progress->start();
219
-		$numberOfUsers = count($this->userPasswords);
220
-		$userNo = 1;
221
-		if ($this->util->isMasterKeyEnabled()) {
222
-			$this->encryptAllUserFilesWithMasterKey($progress);
223
-		} else {
224
-			foreach ($this->userPasswords as $uid => $password) {
225
-				$userCount = "$uid ($userNo of $numberOfUsers)";
226
-				$this->encryptUsersFiles($uid, $progress, $userCount);
227
-				$userNo++;
228
-			}
229
-		}
230
-		$progress->setMessage("all files encrypted");
231
-		$progress->finish();
232
-
233
-	}
234
-
235
-	/**
236
-	 * encrypt all user files with the master key
237
-	 *
238
-	 * @param ProgressBar $progress
239
-	 */
240
-	protected function encryptAllUserFilesWithMasterKey(ProgressBar $progress) {
241
-		$userNo = 1;
242
-		foreach($this->userManager->getBackends() as $backend) {
243
-			$limit = 500;
244
-			$offset = 0;
245
-			do {
246
-				$users = $backend->getUsers('', $limit, $offset);
247
-				foreach ($users as $user) {
248
-					$userCount = "$user ($userNo)";
249
-					$this->encryptUsersFiles($user, $progress, $userCount);
250
-					$userNo++;
251
-				}
252
-				$offset += $limit;
253
-			} while(count($users) >= $limit);
254
-		}
255
-	}
256
-
257
-	/**
258
-	 * encrypt files from the given user
259
-	 *
260
-	 * @param string $uid
261
-	 * @param ProgressBar $progress
262
-	 * @param string $userCount
263
-	 */
264
-	protected function encryptUsersFiles($uid, ProgressBar $progress, $userCount) {
265
-
266
-		$this->setupUserFS($uid);
267
-		$directories = array();
268
-		$directories[] =  '/' . $uid . '/files';
269
-
270
-		while($root = array_pop($directories)) {
271
-			$content = $this->rootView->getDirectoryContent($root);
272
-			foreach ($content as $file) {
273
-				$path = $root . '/' . $file['name'];
274
-				if ($this->rootView->is_dir($path)) {
275
-					$directories[] = $path;
276
-					continue;
277
-				} else {
278
-					$progress->setMessage("encrypt files for user $userCount: $path");
279
-					$progress->advance();
280
-					if($this->encryptFile($path) === false) {
281
-						$progress->setMessage("encrypt files for user $userCount: $path (already encrypted)");
282
-						$progress->advance();
283
-					}
284
-				}
285
-			}
286
-		}
287
-	}
288
-
289
-	/**
290
-	 * encrypt file
291
-	 *
292
-	 * @param string $path
293
-	 * @return bool
294
-	 */
295
-	protected function encryptFile($path) {
296
-
297
-		$source = $path;
298
-		$target = $path . '.encrypted.' . time();
299
-
300
-		try {
301
-			$this->rootView->copy($source, $target);
302
-			$this->rootView->rename($target, $source);
303
-		} catch (DecryptionFailedException $e) {
304
-			if ($this->rootView->file_exists($target)) {
305
-				$this->rootView->unlink($target);
306
-			}
307
-			return false;
308
-		}
309
-
310
-		return true;
311
-	}
312
-
313
-	/**
314
-	 * output one-time encryption passwords
315
-	 */
316
-	protected function outputPasswords() {
317
-		$table = new Table($this->output);
318
-		$table->setHeaders(array('Username', 'Private key password'));
319
-
320
-		//create rows
321
-		$newPasswords = array();
322
-		$unchangedPasswords = array();
323
-		foreach ($this->userPasswords as $uid => $password) {
324
-			if (empty($password)) {
325
-				$unchangedPasswords[] = $uid;
326
-			} else {
327
-				$newPasswords[] = [$uid, $password];
328
-			}
329
-		}
330
-
331
-		if (empty($newPasswords)) {
332
-			$this->output->writeln("\nAll users already had a key-pair, no further action needed.\n");
333
-			return;
334
-		}
335
-
336
-		$table->setRows($newPasswords);
337
-		$table->render();
338
-
339
-		if (!empty($unchangedPasswords)) {
340
-			$this->output->writeln("\nThe following users already had a key-pair which was reused without setting a new password:\n");
341
-			foreach ($unchangedPasswords as $uid) {
342
-				$this->output->writeln("    $uid");
343
-			}
344
-		}
345
-
346
-		$this->writePasswordsToFile($newPasswords);
347
-
348
-		$this->output->writeln('');
349
-		$question = new ConfirmationQuestion('Do you want to send the passwords directly to the users by mail? (y/n) ', false);
350
-		if ($this->questionHelper->ask($this->input, $this->output, $question)) {
351
-			$this->sendPasswordsByMail();
352
-		}
353
-	}
354
-
355
-	/**
356
-	 * write one-time encryption passwords to a csv file
357
-	 *
358
-	 * @param array $passwords
359
-	 */
360
-	protected function writePasswordsToFile(array $passwords) {
361
-		$fp = $this->rootView->fopen('oneTimeEncryptionPasswords.csv', 'w');
362
-		foreach ($passwords as $pwd) {
363
-			fputcsv($fp, $pwd);
364
-		}
365
-		fclose($fp);
366
-		$this->output->writeln("\n");
367
-		$this->output->writeln('A list of all newly created passwords was written to data/oneTimeEncryptionPasswords.csv');
368
-		$this->output->writeln('');
369
-		$this->output->writeln('Each of these users need to login to the web interface, go to the');
370
-		$this->output->writeln('personal settings section "basic encryption module" and');
371
-		$this->output->writeln('update the private key password to match the login password again by');
372
-		$this->output->writeln('entering the one-time password into the "old log-in password" field');
373
-		$this->output->writeln('and their current login password');
374
-	}
375
-
376
-	/**
377
-	 * setup user file system
378
-	 *
379
-	 * @param string $uid
380
-	 */
381
-	protected function setupUserFS($uid) {
382
-		\OC_Util::tearDownFS();
383
-		\OC_Util::setupFS($uid);
384
-	}
385
-
386
-	/**
387
-	 * generate one time password for the user and store it in a array
388
-	 *
389
-	 * @param string $uid
390
-	 * @return string password
391
-	 */
392
-	protected function generateOneTimePassword($uid) {
393
-		$password = $this->secureRandom->generate(8);
394
-		$this->userPasswords[$uid] = $password;
395
-		return $password;
396
-	}
397
-
398
-	/**
399
-	 * send encryption key passwords to the users by mail
400
-	 */
401
-	protected function sendPasswordsByMail() {
402
-		$noMail = [];
403
-
404
-		$this->output->writeln('');
405
-		$progress = new ProgressBar($this->output, count($this->userPasswords));
406
-		$progress->start();
407
-
408
-		foreach ($this->userPasswords as $uid => $password) {
409
-			$progress->advance();
410
-			if (!empty($password)) {
411
-				$recipient = $this->userManager->get($uid);
412
-				$recipientDisplayName = $recipient->getDisplayName();
413
-				$to = $recipient->getEMailAddress();
414
-
415
-				if ($to === '') {
416
-					$noMail[] = $uid;
417
-					continue;
418
-				}
419
-
420
-				$subject = (string)$this->l->t('one-time password for server-side-encryption');
421
-				list($htmlBody, $textBody) = $this->createMailBody($password);
422
-
423
-				// send it out now
424
-				try {
425
-					$message = $this->mailer->createMessage();
426
-					$message->setSubject($subject);
427
-					$message->setTo([$to => $recipientDisplayName]);
428
-					$message->setHtmlBody($htmlBody);
429
-					$message->setPlainBody($textBody);
430
-					$message->setFrom([
431
-						\OCP\Util::getDefaultEmailAddress('admin-noreply')
432
-					]);
433
-
434
-					$this->mailer->send($message);
435
-				} catch (\Exception $e) {
436
-					$noMail[] = $uid;
437
-				}
438
-			}
439
-		}
440
-
441
-		$progress->finish();
442
-
443
-		if (empty($noMail)) {
444
-			$this->output->writeln("\n\nPassword successfully send to all users");
445
-		} else {
446
-			$table = new Table($this->output);
447
-			$table->setHeaders(array('Username', 'Private key password'));
448
-			$this->output->writeln("\n\nCould not send password to following users:\n");
449
-			$rows = [];
450
-			foreach ($noMail as $uid) {
451
-				$rows[] = [$uid, $this->userPasswords[$uid]];
452
-			}
453
-			$table->setRows($rows);
454
-			$table->render();
455
-		}
456
-
457
-	}
458
-
459
-	/**
460
-	 * create mail body for plain text and html mail
461
-	 *
462
-	 * @param string $password one-time encryption password
463
-	 * @return array an array of the html mail body and the plain text mail body
464
-	 */
465
-	protected function createMailBody($password) {
466
-
467
-		$html = new \OC_Template("encryption", "mail", "");
468
-		$html->assign ('password', $password);
469
-		$htmlMail = $html->fetchPage();
470
-
471
-		$plainText = new \OC_Template("encryption", "altmail", "");
472
-		$plainText->assign ('password', $password);
473
-		$plainTextMail = $plainText->fetchPage();
474
-
475
-		return [$htmlMail, $plainTextMail];
476
-	}
48
+    /** @var Setup */
49
+    protected $userSetup;
50
+
51
+    /** @var IUserManager */
52
+    protected $userManager;
53
+
54
+    /** @var View */
55
+    protected $rootView;
56
+
57
+    /** @var KeyManager */
58
+    protected $keyManager;
59
+
60
+    /** @var Util */
61
+    protected $util;
62
+
63
+    /** @var array  */
64
+    protected $userPasswords;
65
+
66
+    /** @var  IConfig */
67
+    protected $config;
68
+
69
+    /** @var IMailer */
70
+    protected $mailer;
71
+
72
+    /** @var  IL10N */
73
+    protected $l;
74
+
75
+    /** @var  QuestionHelper */
76
+    protected $questionHelper;
77
+
78
+    /** @var  OutputInterface */
79
+    protected $output;
80
+
81
+    /** @var  InputInterface */
82
+    protected $input;
83
+
84
+    /** @var ISecureRandom */
85
+    protected $secureRandom;
86
+
87
+    /**
88
+     * @param Setup $userSetup
89
+     * @param IUserManager $userManager
90
+     * @param View $rootView
91
+     * @param KeyManager $keyManager
92
+     * @param Util $util
93
+     * @param IConfig $config
94
+     * @param IMailer $mailer
95
+     * @param IL10N $l
96
+     * @param QuestionHelper $questionHelper
97
+     * @param ISecureRandom $secureRandom
98
+     */
99
+    public function __construct(
100
+        Setup $userSetup,
101
+        IUserManager $userManager,
102
+        View $rootView,
103
+        KeyManager $keyManager,
104
+        Util $util,
105
+        IConfig $config,
106
+        IMailer $mailer,
107
+        IL10N $l,
108
+        QuestionHelper $questionHelper,
109
+        ISecureRandom $secureRandom
110
+    ) {
111
+        $this->userSetup = $userSetup;
112
+        $this->userManager = $userManager;
113
+        $this->rootView = $rootView;
114
+        $this->keyManager = $keyManager;
115
+        $this->util = $util;
116
+        $this->config = $config;
117
+        $this->mailer = $mailer;
118
+        $this->l = $l;
119
+        $this->questionHelper = $questionHelper;
120
+        $this->secureRandom = $secureRandom;
121
+        // store one time passwords for the users
122
+        $this->userPasswords = array();
123
+    }
124
+
125
+    /**
126
+     * start to encrypt all files
127
+     *
128
+     * @param InputInterface $input
129
+     * @param OutputInterface $output
130
+     */
131
+    public function encryptAll(InputInterface $input, OutputInterface $output) {
132
+
133
+        $this->input = $input;
134
+        $this->output = $output;
135
+
136
+        $headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME;
137
+        $this->output->writeln("\n");
138
+        $this->output->writeln($headline);
139
+        $this->output->writeln(str_pad('', strlen($headline), '='));
140
+        $this->output->writeln("\n");
141
+
142
+        if ($this->util->isMasterKeyEnabled()) {
143
+            $this->output->writeln('Use master key to encrypt all files.');
144
+            $this->keyManager->validateMasterKey();
145
+        } else {
146
+            //create private/public keys for each user and store the private key password
147
+            $this->output->writeln('Create key-pair for every user');
148
+            $this->output->writeln('------------------------------');
149
+            $this->output->writeln('');
150
+            $this->output->writeln('This module will encrypt all files in the users files folder initially.');
151
+            $this->output->writeln('Already existing versions and files in the trash bin will not be encrypted.');
152
+            $this->output->writeln('');
153
+            $this->createKeyPairs();
154
+        }
155
+
156
+
157
+        // output generated encryption key passwords
158
+        if ($this->util->isMasterKeyEnabled() === false) {
159
+            //send-out or display password list and write it to a file
160
+            $this->output->writeln("\n");
161
+            $this->output->writeln('Generated encryption key passwords');
162
+            $this->output->writeln('----------------------------------');
163
+            $this->output->writeln('');
164
+            $this->outputPasswords();
165
+        }
166
+
167
+        //setup users file system and encrypt all files one by one (take should encrypt setting of storage into account)
168
+        $this->output->writeln("\n");
169
+        $this->output->writeln('Start to encrypt users files');
170
+        $this->output->writeln('----------------------------');
171
+        $this->output->writeln('');
172
+        $this->encryptAllUsersFiles();
173
+        $this->output->writeln("\n");
174
+    }
175
+
176
+    /**
177
+     * create key-pair for every user
178
+     */
179
+    protected function createKeyPairs() {
180
+        $this->output->writeln("\n");
181
+        $progress = new ProgressBar($this->output);
182
+        $progress->setFormat(" %message% \n [%bar%]");
183
+        $progress->start();
184
+
185
+        foreach($this->userManager->getBackends() as $backend) {
186
+            $limit = 500;
187
+            $offset = 0;
188
+            do {
189
+                $users = $backend->getUsers('', $limit, $offset);
190
+                foreach ($users as $user) {
191
+                    if ($this->keyManager->userHasKeys($user) === false) {
192
+                        $progress->setMessage('Create key-pair for ' . $user);
193
+                        $progress->advance();
194
+                        $this->setupUserFS($user);
195
+                        $password = $this->generateOneTimePassword($user);
196
+                        $this->userSetup->setupUser($user, $password);
197
+                    } else {
198
+                        // users which already have a key-pair will be stored with a
199
+                        // empty password and filtered out later
200
+                        $this->userPasswords[$user] = '';
201
+                    }
202
+                }
203
+                $offset += $limit;
204
+            } while(count($users) >= $limit);
205
+        }
206
+
207
+        $progress->setMessage('Key-pair created for all users');
208
+        $progress->finish();
209
+    }
210
+
211
+    /**
212
+     * iterate over all user and encrypt their files
213
+     */
214
+    protected function encryptAllUsersFiles() {
215
+        $this->output->writeln("\n");
216
+        $progress = new ProgressBar($this->output);
217
+        $progress->setFormat(" %message% \n [%bar%]");
218
+        $progress->start();
219
+        $numberOfUsers = count($this->userPasswords);
220
+        $userNo = 1;
221
+        if ($this->util->isMasterKeyEnabled()) {
222
+            $this->encryptAllUserFilesWithMasterKey($progress);
223
+        } else {
224
+            foreach ($this->userPasswords as $uid => $password) {
225
+                $userCount = "$uid ($userNo of $numberOfUsers)";
226
+                $this->encryptUsersFiles($uid, $progress, $userCount);
227
+                $userNo++;
228
+            }
229
+        }
230
+        $progress->setMessage("all files encrypted");
231
+        $progress->finish();
232
+
233
+    }
234
+
235
+    /**
236
+     * encrypt all user files with the master key
237
+     *
238
+     * @param ProgressBar $progress
239
+     */
240
+    protected function encryptAllUserFilesWithMasterKey(ProgressBar $progress) {
241
+        $userNo = 1;
242
+        foreach($this->userManager->getBackends() as $backend) {
243
+            $limit = 500;
244
+            $offset = 0;
245
+            do {
246
+                $users = $backend->getUsers('', $limit, $offset);
247
+                foreach ($users as $user) {
248
+                    $userCount = "$user ($userNo)";
249
+                    $this->encryptUsersFiles($user, $progress, $userCount);
250
+                    $userNo++;
251
+                }
252
+                $offset += $limit;
253
+            } while(count($users) >= $limit);
254
+        }
255
+    }
256
+
257
+    /**
258
+     * encrypt files from the given user
259
+     *
260
+     * @param string $uid
261
+     * @param ProgressBar $progress
262
+     * @param string $userCount
263
+     */
264
+    protected function encryptUsersFiles($uid, ProgressBar $progress, $userCount) {
265
+
266
+        $this->setupUserFS($uid);
267
+        $directories = array();
268
+        $directories[] =  '/' . $uid . '/files';
269
+
270
+        while($root = array_pop($directories)) {
271
+            $content = $this->rootView->getDirectoryContent($root);
272
+            foreach ($content as $file) {
273
+                $path = $root . '/' . $file['name'];
274
+                if ($this->rootView->is_dir($path)) {
275
+                    $directories[] = $path;
276
+                    continue;
277
+                } else {
278
+                    $progress->setMessage("encrypt files for user $userCount: $path");
279
+                    $progress->advance();
280
+                    if($this->encryptFile($path) === false) {
281
+                        $progress->setMessage("encrypt files for user $userCount: $path (already encrypted)");
282
+                        $progress->advance();
283
+                    }
284
+                }
285
+            }
286
+        }
287
+    }
288
+
289
+    /**
290
+     * encrypt file
291
+     *
292
+     * @param string $path
293
+     * @return bool
294
+     */
295
+    protected function encryptFile($path) {
296
+
297
+        $source = $path;
298
+        $target = $path . '.encrypted.' . time();
299
+
300
+        try {
301
+            $this->rootView->copy($source, $target);
302
+            $this->rootView->rename($target, $source);
303
+        } catch (DecryptionFailedException $e) {
304
+            if ($this->rootView->file_exists($target)) {
305
+                $this->rootView->unlink($target);
306
+            }
307
+            return false;
308
+        }
309
+
310
+        return true;
311
+    }
312
+
313
+    /**
314
+     * output one-time encryption passwords
315
+     */
316
+    protected function outputPasswords() {
317
+        $table = new Table($this->output);
318
+        $table->setHeaders(array('Username', 'Private key password'));
319
+
320
+        //create rows
321
+        $newPasswords = array();
322
+        $unchangedPasswords = array();
323
+        foreach ($this->userPasswords as $uid => $password) {
324
+            if (empty($password)) {
325
+                $unchangedPasswords[] = $uid;
326
+            } else {
327
+                $newPasswords[] = [$uid, $password];
328
+            }
329
+        }
330
+
331
+        if (empty($newPasswords)) {
332
+            $this->output->writeln("\nAll users already had a key-pair, no further action needed.\n");
333
+            return;
334
+        }
335
+
336
+        $table->setRows($newPasswords);
337
+        $table->render();
338
+
339
+        if (!empty($unchangedPasswords)) {
340
+            $this->output->writeln("\nThe following users already had a key-pair which was reused without setting a new password:\n");
341
+            foreach ($unchangedPasswords as $uid) {
342
+                $this->output->writeln("    $uid");
343
+            }
344
+        }
345
+
346
+        $this->writePasswordsToFile($newPasswords);
347
+
348
+        $this->output->writeln('');
349
+        $question = new ConfirmationQuestion('Do you want to send the passwords directly to the users by mail? (y/n) ', false);
350
+        if ($this->questionHelper->ask($this->input, $this->output, $question)) {
351
+            $this->sendPasswordsByMail();
352
+        }
353
+    }
354
+
355
+    /**
356
+     * write one-time encryption passwords to a csv file
357
+     *
358
+     * @param array $passwords
359
+     */
360
+    protected function writePasswordsToFile(array $passwords) {
361
+        $fp = $this->rootView->fopen('oneTimeEncryptionPasswords.csv', 'w');
362
+        foreach ($passwords as $pwd) {
363
+            fputcsv($fp, $pwd);
364
+        }
365
+        fclose($fp);
366
+        $this->output->writeln("\n");
367
+        $this->output->writeln('A list of all newly created passwords was written to data/oneTimeEncryptionPasswords.csv');
368
+        $this->output->writeln('');
369
+        $this->output->writeln('Each of these users need to login to the web interface, go to the');
370
+        $this->output->writeln('personal settings section "basic encryption module" and');
371
+        $this->output->writeln('update the private key password to match the login password again by');
372
+        $this->output->writeln('entering the one-time password into the "old log-in password" field');
373
+        $this->output->writeln('and their current login password');
374
+    }
375
+
376
+    /**
377
+     * setup user file system
378
+     *
379
+     * @param string $uid
380
+     */
381
+    protected function setupUserFS($uid) {
382
+        \OC_Util::tearDownFS();
383
+        \OC_Util::setupFS($uid);
384
+    }
385
+
386
+    /**
387
+     * generate one time password for the user and store it in a array
388
+     *
389
+     * @param string $uid
390
+     * @return string password
391
+     */
392
+    protected function generateOneTimePassword($uid) {
393
+        $password = $this->secureRandom->generate(8);
394
+        $this->userPasswords[$uid] = $password;
395
+        return $password;
396
+    }
397
+
398
+    /**
399
+     * send encryption key passwords to the users by mail
400
+     */
401
+    protected function sendPasswordsByMail() {
402
+        $noMail = [];
403
+
404
+        $this->output->writeln('');
405
+        $progress = new ProgressBar($this->output, count($this->userPasswords));
406
+        $progress->start();
407
+
408
+        foreach ($this->userPasswords as $uid => $password) {
409
+            $progress->advance();
410
+            if (!empty($password)) {
411
+                $recipient = $this->userManager->get($uid);
412
+                $recipientDisplayName = $recipient->getDisplayName();
413
+                $to = $recipient->getEMailAddress();
414
+
415
+                if ($to === '') {
416
+                    $noMail[] = $uid;
417
+                    continue;
418
+                }
419
+
420
+                $subject = (string)$this->l->t('one-time password for server-side-encryption');
421
+                list($htmlBody, $textBody) = $this->createMailBody($password);
422
+
423
+                // send it out now
424
+                try {
425
+                    $message = $this->mailer->createMessage();
426
+                    $message->setSubject($subject);
427
+                    $message->setTo([$to => $recipientDisplayName]);
428
+                    $message->setHtmlBody($htmlBody);
429
+                    $message->setPlainBody($textBody);
430
+                    $message->setFrom([
431
+                        \OCP\Util::getDefaultEmailAddress('admin-noreply')
432
+                    ]);
433
+
434
+                    $this->mailer->send($message);
435
+                } catch (\Exception $e) {
436
+                    $noMail[] = $uid;
437
+                }
438
+            }
439
+        }
440
+
441
+        $progress->finish();
442
+
443
+        if (empty($noMail)) {
444
+            $this->output->writeln("\n\nPassword successfully send to all users");
445
+        } else {
446
+            $table = new Table($this->output);
447
+            $table->setHeaders(array('Username', 'Private key password'));
448
+            $this->output->writeln("\n\nCould not send password to following users:\n");
449
+            $rows = [];
450
+            foreach ($noMail as $uid) {
451
+                $rows[] = [$uid, $this->userPasswords[$uid]];
452
+            }
453
+            $table->setRows($rows);
454
+            $table->render();
455
+        }
456
+
457
+    }
458
+
459
+    /**
460
+     * create mail body for plain text and html mail
461
+     *
462
+     * @param string $password one-time encryption password
463
+     * @return array an array of the html mail body and the plain text mail body
464
+     */
465
+    protected function createMailBody($password) {
466
+
467
+        $html = new \OC_Template("encryption", "mail", "");
468
+        $html->assign ('password', $password);
469
+        $htmlMail = $html->fetchPage();
470
+
471
+        $plainText = new \OC_Template("encryption", "altmail", "");
472
+        $plainText->assign ('password', $password);
473
+        $plainTextMail = $plainText->fetchPage();
474
+
475
+        return [$htmlMail, $plainTextMail];
476
+    }
477 477
 
478 478
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Crypto/Crypt.php 2 patches
Spacing   +19 added lines, -19 removed lines patch added patch discarded remove patch
@@ -117,7 +117,7 @@  discard block
 block discarded – undo
117 117
 				['app' => 'encryption']);
118 118
 
119 119
 			if (openssl_error_string()) {
120
-				$log->error('Encryption library openssl_pkey_new() fails: ' . openssl_error_string(),
120
+				$log->error('Encryption library openssl_pkey_new() fails: '.openssl_error_string(),
121 121
 					['app' => 'encryption']);
122 122
 			}
123 123
 		} elseif (openssl_pkey_export($res,
@@ -132,10 +132,10 @@  discard block
 block discarded – undo
132 132
 				'privateKey' => $privateKey
133 133
 			];
134 134
 		}
135
-		$log->error('Encryption library couldn\'t export users private key, please check your servers OpenSSL configuration.' . $this->user,
135
+		$log->error('Encryption library couldn\'t export users private key, please check your servers OpenSSL configuration.'.$this->user,
136 136
 			['app' => 'encryption']);
137 137
 		if (openssl_error_string()) {
138
-			$log->error('Encryption Library:' . openssl_error_string(),
138
+			$log->error('Encryption Library:'.openssl_error_string(),
139 139
 				['app' => 'encryption']);
140 140
 		}
141 141
 
@@ -210,15 +210,15 @@  discard block
 block discarded – undo
210 210
 	public function generateHeader($keyFormat = 'hash') {
211 211
 
212 212
 		if (in_array($keyFormat, $this->supportedKeyFormats, true) === false) {
213
-			throw new \InvalidArgumentException('key format "' . $keyFormat . '" is not supported');
213
+			throw new \InvalidArgumentException('key format "'.$keyFormat.'" is not supported');
214 214
 		}
215 215
 
216 216
 		$cipher = $this->getCipher();
217 217
 
218 218
 		$header = self::HEADER_START
219
-			. ':cipher:' . $cipher
220
-			. ':keyFormat:' . $keyFormat
221
-			. ':' . self::HEADER_END;
219
+			. ':cipher:'.$cipher
220
+			. ':keyFormat:'.$keyFormat
221
+			. ':'.self::HEADER_END;
222 222
 
223 223
 		return $header;
224 224
 	}
@@ -240,7 +240,7 @@  discard block
 block discarded – undo
240 240
 
241 241
 		if (!$encryptedContent) {
242 242
 			$error = 'Encryption (symmetric) of content failed';
243
-			$this->logger->error($error . openssl_error_string(),
243
+			$this->logger->error($error.openssl_error_string(),
244 244
 				['app' => 'encryption']);
245 245
 			throw new EncryptionFailedException($error);
246 246
 		}
@@ -268,8 +268,8 @@  discard block
 block discarded – undo
268 268
 		}
269 269
 
270 270
 		// Workaround for OpenSSL 0.9.8. Fallback to an old cipher that should work.
271
-		if(OPENSSL_VERSION_NUMBER < 0x1000101f) {
272
-			if($cipher === 'AES-256-CTR' || $cipher === 'AES-128-CTR') {
271
+		if (OPENSSL_VERSION_NUMBER < 0x1000101f) {
272
+			if ($cipher === 'AES-256-CTR' || $cipher === 'AES-128-CTR') {
273 273
 				$cipher = self::LEGACY_CIPHER;
274 274
 			}
275 275
 		}
@@ -285,7 +285,7 @@  discard block
 block discarded – undo
285 285
 	 * @throws \InvalidArgumentException
286 286
 	 */
287 287
 	protected function getKeySize($cipher) {
288
-		if(isset($this->supportedCiphersAndKeySize[$cipher])) {
288
+		if (isset($this->supportedCiphersAndKeySize[$cipher])) {
289 289
 			return $this->supportedCiphersAndKeySize[$cipher];
290 290
 		}
291 291
 
@@ -312,7 +312,7 @@  discard block
 block discarded – undo
312 312
 	 * @return string
313 313
 	 */
314 314
 	private function concatIV($encryptedContent, $iv) {
315
-		return $encryptedContent . '00iv00' . $iv;
315
+		return $encryptedContent.'00iv00'.$iv;
316 316
 	}
317 317
 
318 318
 	/**
@@ -321,7 +321,7 @@  discard block
 block discarded – undo
321 321
 	 * @return string
322 322
 	 */
323 323
 	private function concatSig($encryptedContent, $signature) {
324
-		return $encryptedContent . '00sig00' . $signature;
324
+		return $encryptedContent.'00sig00'.$signature;
325 325
 	}
326 326
 
327 327
 	/**
@@ -333,7 +333,7 @@  discard block
 block discarded – undo
333 333
 	 * @return string
334 334
 	 */
335 335
 	private function addPadding($data) {
336
-		return $data . 'xxx';
336
+		return $data.'xxx';
337 337
 	}
338 338
 
339 339
 	/**
@@ -347,7 +347,7 @@  discard block
 block discarded – undo
347 347
 	protected function generatePasswordHash($password, $cipher, $uid = '') {
348 348
 		$instanceId = $this->config->getSystemValue('instanceid');
349 349
 		$instanceSecret = $this->config->getSystemValue('secret');
350
-		$salt = hash('sha256', $uid . $instanceId . $instanceSecret, true);
350
+		$salt = hash('sha256', $uid.$instanceId.$instanceSecret, true);
351 351
 		$keySize = $this->getKeySize($cipher);
352 352
 
353 353
 		$hash = hash_pbkdf2(
@@ -493,7 +493,7 @@  discard block
 block discarded – undo
493 493
 	 * @return string
494 494
 	 */
495 495
 	private function createSignature($data, $passPhrase) {
496
-		$passPhrase = hash('sha512', $passPhrase . 'a', true);
496
+		$passPhrase = hash('sha512', $passPhrase.'a', true);
497 497
 		$signature = hash_hmac('sha256', $data, $passPhrase);
498 498
 		return $signature;
499 499
 	}
@@ -585,7 +585,7 @@  discard block
 block discarded – undo
585 585
 		if ($plainContent) {
586 586
 			return $plainContent;
587 587
 		} else {
588
-			throw new DecryptionFailedException('Encryption library: Decryption (symmetric) of content failed: ' . openssl_error_string());
588
+			throw new DecryptionFailedException('Encryption library: Decryption (symmetric) of content failed: '.openssl_error_string());
589 589
 		}
590 590
 	}
591 591
 
@@ -651,7 +651,7 @@  discard block
 block discarded – undo
651 651
 		if (openssl_open($encKeyFile, $plainContent, $shareKey, $privateKey)) {
652 652
 			return $plainContent;
653 653
 		} else {
654
-			throw new MultiKeyDecryptException('multikeydecrypt with share key failed:' . openssl_error_string());
654
+			throw new MultiKeyDecryptException('multikeydecrypt with share key failed:'.openssl_error_string());
655 655
 		}
656 656
 	}
657 657
 
@@ -687,7 +687,7 @@  discard block
 block discarded – undo
687 687
 				'data' => $sealed
688 688
 			];
689 689
 		} else {
690
-			throw new MultiKeyEncryptException('multikeyencryption failed ' . openssl_error_string());
690
+			throw new MultiKeyEncryptException('multikeyencryption failed '.openssl_error_string());
691 691
 		}
692 692
 	}
693 693
 }
Please login to merge, or discard this patch.
Indentation   +636 added lines, -636 removed lines patch added patch discarded remove patch
@@ -53,641 +53,641 @@
 block discarded – undo
53 53
  */
54 54
 class Crypt {
55 55
 
56
-	const DEFAULT_CIPHER = 'AES-256-CTR';
57
-	// default cipher from old Nextcloud versions
58
-	const LEGACY_CIPHER = 'AES-128-CFB';
59
-
60
-	// default key format, old Nextcloud version encrypted the private key directly
61
-	// with the user password
62
-	const LEGACY_KEY_FORMAT = 'password';
63
-
64
-	const HEADER_START = 'HBEGIN';
65
-	const HEADER_END = 'HEND';
66
-
67
-	/** @var ILogger */
68
-	private $logger;
69
-
70
-	/** @var string */
71
-	private $user;
72
-
73
-	/** @var IConfig */
74
-	private $config;
75
-
76
-	/** @var array */
77
-	private $supportedKeyFormats;
78
-
79
-	/** @var IL10N */
80
-	private $l;
81
-
82
-	/** @var array */
83
-	private $supportedCiphersAndKeySize = [
84
-		'AES-256-CTR' => 32,
85
-		'AES-128-CTR' => 16,
86
-		'AES-256-CFB' => 32,
87
-		'AES-128-CFB' => 16,
88
-	];
89
-
90
-	/**
91
-	 * @param ILogger $logger
92
-	 * @param IUserSession $userSession
93
-	 * @param IConfig $config
94
-	 * @param IL10N $l
95
-	 */
96
-	public function __construct(ILogger $logger, IUserSession $userSession, IConfig $config, IL10N $l) {
97
-		$this->logger = $logger;
98
-		$this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser()->getUID() : '"no user given"';
99
-		$this->config = $config;
100
-		$this->l = $l;
101
-		$this->supportedKeyFormats = ['hash', 'password'];
102
-	}
103
-
104
-	/**
105
-	 * create new private/public key-pair for user
106
-	 *
107
-	 * @return array|bool
108
-	 */
109
-	public function createKeyPair() {
110
-
111
-		$log = $this->logger;
112
-		$res = $this->getOpenSSLPKey();
113
-
114
-		if (!$res) {
115
-			$log->error("Encryption Library couldn't generate users key-pair for {$this->user}",
116
-				['app' => 'encryption']);
117
-
118
-			if (openssl_error_string()) {
119
-				$log->error('Encryption library openssl_pkey_new() fails: ' . openssl_error_string(),
120
-					['app' => 'encryption']);
121
-			}
122
-		} elseif (openssl_pkey_export($res,
123
-			$privateKey,
124
-			null,
125
-			$this->getOpenSSLConfig())) {
126
-			$keyDetails = openssl_pkey_get_details($res);
127
-			$publicKey = $keyDetails['key'];
128
-
129
-			return [
130
-				'publicKey' => $publicKey,
131
-				'privateKey' => $privateKey
132
-			];
133
-		}
134
-		$log->error('Encryption library couldn\'t export users private key, please check your servers OpenSSL configuration.' . $this->user,
135
-			['app' => 'encryption']);
136
-		if (openssl_error_string()) {
137
-			$log->error('Encryption Library:' . openssl_error_string(),
138
-				['app' => 'encryption']);
139
-		}
140
-
141
-		return false;
142
-	}
143
-
144
-	/**
145
-	 * Generates a new private key
146
-	 *
147
-	 * @return resource
148
-	 */
149
-	public function getOpenSSLPKey() {
150
-		$config = $this->getOpenSSLConfig();
151
-		return openssl_pkey_new($config);
152
-	}
153
-
154
-	/**
155
-	 * get openSSL Config
156
-	 *
157
-	 * @return array
158
-	 */
159
-	private function getOpenSSLConfig() {
160
-		$config = ['private_key_bits' => 4096];
161
-		$config = array_merge(
162
-			$config,
163
-			$this->config->getSystemValue('openssl', [])
164
-		);
165
-		return $config;
166
-	}
167
-
168
-	/**
169
-	 * @param string $plainContent
170
-	 * @param string $passPhrase
171
-	 * @param int $version
172
-	 * @param int $position
173
-	 * @return false|string
174
-	 * @throws EncryptionFailedException
175
-	 */
176
-	public function symmetricEncryptFileContent($plainContent, $passPhrase, $version, $position) {
177
-
178
-		if (!$plainContent) {
179
-			$this->logger->error('Encryption Library, symmetrical encryption failed no content given',
180
-				['app' => 'encryption']);
181
-			return false;
182
-		}
183
-
184
-		$iv = $this->generateIv();
185
-
186
-		$encryptedContent = $this->encrypt($plainContent,
187
-			$iv,
188
-			$passPhrase,
189
-			$this->getCipher());
190
-
191
-		// Create a signature based on the key as well as the current version
192
-		$sig = $this->createSignature($encryptedContent, $passPhrase.$version.$position);
193
-
194
-		// combine content to encrypt the IV identifier and actual IV
195
-		$catFile = $this->concatIV($encryptedContent, $iv);
196
-		$catFile = $this->concatSig($catFile, $sig);
197
-		$padded = $this->addPadding($catFile);
198
-
199
-		return $padded;
200
-	}
201
-
202
-	/**
203
-	 * generate header for encrypted file
204
-	 *
205
-	 * @param string $keyFormat (can be 'hash' or 'password')
206
-	 * @return string
207
-	 * @throws \InvalidArgumentException
208
-	 */
209
-	public function generateHeader($keyFormat = 'hash') {
210
-
211
-		if (in_array($keyFormat, $this->supportedKeyFormats, true) === false) {
212
-			throw new \InvalidArgumentException('key format "' . $keyFormat . '" is not supported');
213
-		}
214
-
215
-		$cipher = $this->getCipher();
216
-
217
-		$header = self::HEADER_START
218
-			. ':cipher:' . $cipher
219
-			. ':keyFormat:' . $keyFormat
220
-			. ':' . self::HEADER_END;
221
-
222
-		return $header;
223
-	}
224
-
225
-	/**
226
-	 * @param string $plainContent
227
-	 * @param string $iv
228
-	 * @param string $passPhrase
229
-	 * @param string $cipher
230
-	 * @return string
231
-	 * @throws EncryptionFailedException
232
-	 */
233
-	private function encrypt($plainContent, $iv, $passPhrase = '', $cipher = self::DEFAULT_CIPHER) {
234
-		$encryptedContent = openssl_encrypt($plainContent,
235
-			$cipher,
236
-			$passPhrase,
237
-			false,
238
-			$iv);
239
-
240
-		if (!$encryptedContent) {
241
-			$error = 'Encryption (symmetric) of content failed';
242
-			$this->logger->error($error . openssl_error_string(),
243
-				['app' => 'encryption']);
244
-			throw new EncryptionFailedException($error);
245
-		}
246
-
247
-		return $encryptedContent;
248
-	}
249
-
250
-	/**
251
-	 * return Cipher either from config.php or the default cipher defined in
252
-	 * this class
253
-	 *
254
-	 * @return string
255
-	 */
256
-	public function getCipher() {
257
-		$cipher = $this->config->getSystemValue('cipher', self::DEFAULT_CIPHER);
258
-		if (!isset($this->supportedCiphersAndKeySize[$cipher])) {
259
-			$this->logger->warning(
260
-					sprintf(
261
-							'Unsupported cipher (%s) defined in config.php supported. Falling back to %s',
262
-							$cipher,
263
-							self::DEFAULT_CIPHER
264
-					),
265
-				['app' => 'encryption']);
266
-			$cipher = self::DEFAULT_CIPHER;
267
-		}
268
-
269
-		// Workaround for OpenSSL 0.9.8. Fallback to an old cipher that should work.
270
-		if(OPENSSL_VERSION_NUMBER < 0x1000101f) {
271
-			if($cipher === 'AES-256-CTR' || $cipher === 'AES-128-CTR') {
272
-				$cipher = self::LEGACY_CIPHER;
273
-			}
274
-		}
275
-
276
-		return $cipher;
277
-	}
278
-
279
-	/**
280
-	 * get key size depending on the cipher
281
-	 *
282
-	 * @param string $cipher
283
-	 * @return int
284
-	 * @throws \InvalidArgumentException
285
-	 */
286
-	protected function getKeySize($cipher) {
287
-		if(isset($this->supportedCiphersAndKeySize[$cipher])) {
288
-			return $this->supportedCiphersAndKeySize[$cipher];
289
-		}
290
-
291
-		throw new \InvalidArgumentException(
292
-			sprintf(
293
-					'Unsupported cipher (%s) defined.',
294
-					$cipher
295
-			)
296
-		);
297
-	}
298
-
299
-	/**
300
-	 * get legacy cipher
301
-	 *
302
-	 * @return string
303
-	 */
304
-	public function getLegacyCipher() {
305
-		return self::LEGACY_CIPHER;
306
-	}
307
-
308
-	/**
309
-	 * @param string $encryptedContent
310
-	 * @param string $iv
311
-	 * @return string
312
-	 */
313
-	private function concatIV($encryptedContent, $iv) {
314
-		return $encryptedContent . '00iv00' . $iv;
315
-	}
316
-
317
-	/**
318
-	 * @param string $encryptedContent
319
-	 * @param string $signature
320
-	 * @return string
321
-	 */
322
-	private function concatSig($encryptedContent, $signature) {
323
-		return $encryptedContent . '00sig00' . $signature;
324
-	}
325
-
326
-	/**
327
-	 * Note: This is _NOT_ a padding used for encryption purposes. It is solely
328
-	 * used to achieve the PHP stream size. It has _NOTHING_ to do with the
329
-	 * encrypted content and is not used in any crypto primitive.
330
-	 *
331
-	 * @param string $data
332
-	 * @return string
333
-	 */
334
-	private function addPadding($data) {
335
-		return $data . 'xxx';
336
-	}
337
-
338
-	/**
339
-	 * generate password hash used to encrypt the users private key
340
-	 *
341
-	 * @param string $password
342
-	 * @param string $cipher
343
-	 * @param string $uid only used for user keys
344
-	 * @return string
345
-	 */
346
-	protected function generatePasswordHash($password, $cipher, $uid = '') {
347
-		$instanceId = $this->config->getSystemValue('instanceid');
348
-		$instanceSecret = $this->config->getSystemValue('secret');
349
-		$salt = hash('sha256', $uid . $instanceId . $instanceSecret, true);
350
-		$keySize = $this->getKeySize($cipher);
351
-
352
-		$hash = hash_pbkdf2(
353
-			'sha256',
354
-			$password,
355
-			$salt,
356
-			100000,
357
-			$keySize,
358
-			true
359
-		);
360
-
361
-		return $hash;
362
-	}
363
-
364
-	/**
365
-	 * encrypt private key
366
-	 *
367
-	 * @param string $privateKey
368
-	 * @param string $password
369
-	 * @param string $uid for regular users, empty for system keys
370
-	 * @return false|string
371
-	 */
372
-	public function encryptPrivateKey($privateKey, $password, $uid = '') {
373
-		$cipher = $this->getCipher();
374
-		$hash = $this->generatePasswordHash($password, $cipher, $uid);
375
-		$encryptedKey = $this->symmetricEncryptFileContent(
376
-			$privateKey,
377
-			$hash,
378
-			0,
379
-			0
380
-		);
381
-
382
-		return $encryptedKey;
383
-	}
384
-
385
-	/**
386
-	 * @param string $privateKey
387
-	 * @param string $password
388
-	 * @param string $uid for regular users, empty for system keys
389
-	 * @return false|string
390
-	 */
391
-	public function decryptPrivateKey($privateKey, $password = '', $uid = '') {
392
-
393
-		$header = $this->parseHeader($privateKey);
394
-
395
-		if (isset($header['cipher'])) {
396
-			$cipher = $header['cipher'];
397
-		} else {
398
-			$cipher = self::LEGACY_CIPHER;
399
-		}
400
-
401
-		if (isset($header['keyFormat'])) {
402
-			$keyFormat = $header['keyFormat'];
403
-		} else {
404
-			$keyFormat = self::LEGACY_KEY_FORMAT;
405
-		}
406
-
407
-		if ($keyFormat === 'hash') {
408
-			$password = $this->generatePasswordHash($password, $cipher, $uid);
409
-		}
410
-
411
-		// If we found a header we need to remove it from the key we want to decrypt
412
-		if (!empty($header)) {
413
-			$privateKey = substr($privateKey,
414
-				strpos($privateKey,
415
-					self::HEADER_END) + strlen(self::HEADER_END));
416
-		}
417
-
418
-		$plainKey = $this->symmetricDecryptFileContent(
419
-			$privateKey,
420
-			$password,
421
-			$cipher,
422
-			0
423
-		);
424
-
425
-		if ($this->isValidPrivateKey($plainKey) === false) {
426
-			return false;
427
-		}
428
-
429
-		return $plainKey;
430
-	}
431
-
432
-	/**
433
-	 * check if it is a valid private key
434
-	 *
435
-	 * @param string $plainKey
436
-	 * @return bool
437
-	 */
438
-	protected function isValidPrivateKey($plainKey) {
439
-		$res = openssl_get_privatekey($plainKey);
440
-		if (is_resource($res)) {
441
-			$sslInfo = openssl_pkey_get_details($res);
442
-			if (isset($sslInfo['key'])) {
443
-				return true;
444
-			}
445
-		}
446
-
447
-		return false;
448
-	}
449
-
450
-	/**
451
-	 * @param string $keyFileContents
452
-	 * @param string $passPhrase
453
-	 * @param string $cipher
454
-	 * @param int $version
455
-	 * @param int $position
456
-	 * @return string
457
-	 * @throws DecryptionFailedException
458
-	 */
459
-	public function symmetricDecryptFileContent($keyFileContents, $passPhrase, $cipher = self::DEFAULT_CIPHER, $version = 0, $position = 0) {
460
-		$catFile = $this->splitMetaData($keyFileContents, $cipher);
461
-
462
-		if ($catFile['signature'] !== false) {
463
-			$this->checkSignature($catFile['encrypted'], $passPhrase.$version.$position, $catFile['signature']);
464
-		}
465
-
466
-		return $this->decrypt($catFile['encrypted'],
467
-			$catFile['iv'],
468
-			$passPhrase,
469
-			$cipher);
470
-	}
471
-
472
-	/**
473
-	 * check for valid signature
474
-	 *
475
-	 * @param string $data
476
-	 * @param string $passPhrase
477
-	 * @param string $expectedSignature
478
-	 * @throws GenericEncryptionException
479
-	 */
480
-	private function checkSignature($data, $passPhrase, $expectedSignature) {
481
-		$signature = $this->createSignature($data, $passPhrase);
482
-		if (!hash_equals($expectedSignature, $signature)) {
483
-			throw new GenericEncryptionException('Bad Signature', $this->l->t('Bad Signature'));
484
-		}
485
-	}
486
-
487
-	/**
488
-	 * create signature
489
-	 *
490
-	 * @param string $data
491
-	 * @param string $passPhrase
492
-	 * @return string
493
-	 */
494
-	private function createSignature($data, $passPhrase) {
495
-		$passPhrase = hash('sha512', $passPhrase . 'a', true);
496
-		$signature = hash_hmac('sha256', $data, $passPhrase);
497
-		return $signature;
498
-	}
499
-
500
-
501
-	/**
502
-	 * remove padding
503
-	 *
504
-	 * @param string $padded
505
-	 * @param bool $hasSignature did the block contain a signature, in this case we use a different padding
506
-	 * @return string|false
507
-	 */
508
-	private function removePadding($padded, $hasSignature = false) {
509
-		if ($hasSignature === false && substr($padded, -2) === 'xx') {
510
-			return substr($padded, 0, -2);
511
-		} elseif ($hasSignature === true && substr($padded, -3) === 'xxx') {
512
-			return substr($padded, 0, -3);
513
-		}
514
-		return false;
515
-	}
516
-
517
-	/**
518
-	 * split meta data from encrypted file
519
-	 * Note: for now, we assume that the meta data always start with the iv
520
-	 *       followed by the signature, if available
521
-	 *
522
-	 * @param string $catFile
523
-	 * @param string $cipher
524
-	 * @return array
525
-	 */
526
-	private function splitMetaData($catFile, $cipher) {
527
-		if ($this->hasSignature($catFile, $cipher)) {
528
-			$catFile = $this->removePadding($catFile, true);
529
-			$meta = substr($catFile, -93);
530
-			$iv = substr($meta, strlen('00iv00'), 16);
531
-			$sig = substr($meta, 22 + strlen('00sig00'));
532
-			$encrypted = substr($catFile, 0, -93);
533
-		} else {
534
-			$catFile = $this->removePadding($catFile);
535
-			$meta = substr($catFile, -22);
536
-			$iv = substr($meta, -16);
537
-			$sig = false;
538
-			$encrypted = substr($catFile, 0, -22);
539
-		}
540
-
541
-		return [
542
-			'encrypted' => $encrypted,
543
-			'iv' => $iv,
544
-			'signature' => $sig
545
-		];
546
-	}
547
-
548
-	/**
549
-	 * check if encrypted block is signed
550
-	 *
551
-	 * @param string $catFile
552
-	 * @param string $cipher
553
-	 * @return bool
554
-	 * @throws GenericEncryptionException
555
-	 */
556
-	private function hasSignature($catFile, $cipher) {
557
-		$meta = substr($catFile, -93);
558
-		$signaturePosition = strpos($meta, '00sig00');
559
-
560
-		// enforce signature for the new 'CTR' ciphers
561
-		if ($signaturePosition === false && strpos(strtolower($cipher), 'ctr') !== false) {
562
-			throw new GenericEncryptionException('Missing Signature', $this->l->t('Missing Signature'));
563
-		}
564
-
565
-		return ($signaturePosition !== false);
566
-	}
567
-
568
-
569
-	/**
570
-	 * @param string $encryptedContent
571
-	 * @param string $iv
572
-	 * @param string $passPhrase
573
-	 * @param string $cipher
574
-	 * @return string
575
-	 * @throws DecryptionFailedException
576
-	 */
577
-	private function decrypt($encryptedContent, $iv, $passPhrase = '', $cipher = self::DEFAULT_CIPHER) {
578
-		$plainContent = openssl_decrypt($encryptedContent,
579
-			$cipher,
580
-			$passPhrase,
581
-			false,
582
-			$iv);
583
-
584
-		if ($plainContent) {
585
-			return $plainContent;
586
-		} else {
587
-			throw new DecryptionFailedException('Encryption library: Decryption (symmetric) of content failed: ' . openssl_error_string());
588
-		}
589
-	}
590
-
591
-	/**
592
-	 * @param string $data
593
-	 * @return array
594
-	 */
595
-	protected function parseHeader($data) {
596
-		$result = [];
597
-
598
-		if (substr($data, 0, strlen(self::HEADER_START)) === self::HEADER_START) {
599
-			$endAt = strpos($data, self::HEADER_END);
600
-			$header = substr($data, 0, $endAt + strlen(self::HEADER_END));
601
-
602
-			// +1 not to start with an ':' which would result in empty element at the beginning
603
-			$exploded = explode(':',
604
-				substr($header, strlen(self::HEADER_START) + 1));
605
-
606
-			$element = array_shift($exploded);
607
-
608
-			while ($element !== self::HEADER_END) {
609
-				$result[$element] = array_shift($exploded);
610
-				$element = array_shift($exploded);
611
-			}
612
-		}
613
-
614
-		return $result;
615
-	}
616
-
617
-	/**
618
-	 * generate initialization vector
619
-	 *
620
-	 * @return string
621
-	 * @throws GenericEncryptionException
622
-	 */
623
-	private function generateIv() {
624
-		return random_bytes(16);
625
-	}
626
-
627
-	/**
628
-	 * Generate a cryptographically secure pseudo-random 256-bit ASCII key, used
629
-	 * as file key
630
-	 *
631
-	 * @return string
632
-	 * @throws \Exception
633
-	 */
634
-	public function generateFileKey() {
635
-		return random_bytes(32);
636
-	}
637
-
638
-	/**
639
-	 * @param $encKeyFile
640
-	 * @param $shareKey
641
-	 * @param $privateKey
642
-	 * @return string
643
-	 * @throws MultiKeyDecryptException
644
-	 */
645
-	public function multiKeyDecrypt($encKeyFile, $shareKey, $privateKey) {
646
-		if (!$encKeyFile) {
647
-			throw new MultiKeyDecryptException('Cannot multikey decrypt empty plain content');
648
-		}
649
-
650
-		if (openssl_open($encKeyFile, $plainContent, $shareKey, $privateKey)) {
651
-			return $plainContent;
652
-		} else {
653
-			throw new MultiKeyDecryptException('multikeydecrypt with share key failed:' . openssl_error_string());
654
-		}
655
-	}
656
-
657
-	/**
658
-	 * @param string $plainContent
659
-	 * @param array $keyFiles
660
-	 * @return array
661
-	 * @throws MultiKeyEncryptException
662
-	 */
663
-	public function multiKeyEncrypt($plainContent, array $keyFiles) {
664
-		// openssl_seal returns false without errors if plaincontent is empty
665
-		// so trigger our own error
666
-		if (empty($plainContent)) {
667
-			throw new MultiKeyEncryptException('Cannot multikeyencrypt empty plain content');
668
-		}
669
-
670
-		// Set empty vars to be set by openssl by reference
671
-		$sealed = '';
672
-		$shareKeys = [];
673
-		$mappedShareKeys = [];
674
-
675
-		if (openssl_seal($plainContent, $sealed, $shareKeys, $keyFiles)) {
676
-			$i = 0;
677
-
678
-			// Ensure each shareKey is labelled with its corresponding key id
679
-			foreach ($keyFiles as $userId => $publicKey) {
680
-				$mappedShareKeys[$userId] = $shareKeys[$i];
681
-				$i++;
682
-			}
683
-
684
-			return [
685
-				'keys' => $mappedShareKeys,
686
-				'data' => $sealed
687
-			];
688
-		} else {
689
-			throw new MultiKeyEncryptException('multikeyencryption failed ' . openssl_error_string());
690
-		}
691
-	}
56
+    const DEFAULT_CIPHER = 'AES-256-CTR';
57
+    // default cipher from old Nextcloud versions
58
+    const LEGACY_CIPHER = 'AES-128-CFB';
59
+
60
+    // default key format, old Nextcloud version encrypted the private key directly
61
+    // with the user password
62
+    const LEGACY_KEY_FORMAT = 'password';
63
+
64
+    const HEADER_START = 'HBEGIN';
65
+    const HEADER_END = 'HEND';
66
+
67
+    /** @var ILogger */
68
+    private $logger;
69
+
70
+    /** @var string */
71
+    private $user;
72
+
73
+    /** @var IConfig */
74
+    private $config;
75
+
76
+    /** @var array */
77
+    private $supportedKeyFormats;
78
+
79
+    /** @var IL10N */
80
+    private $l;
81
+
82
+    /** @var array */
83
+    private $supportedCiphersAndKeySize = [
84
+        'AES-256-CTR' => 32,
85
+        'AES-128-CTR' => 16,
86
+        'AES-256-CFB' => 32,
87
+        'AES-128-CFB' => 16,
88
+    ];
89
+
90
+    /**
91
+     * @param ILogger $logger
92
+     * @param IUserSession $userSession
93
+     * @param IConfig $config
94
+     * @param IL10N $l
95
+     */
96
+    public function __construct(ILogger $logger, IUserSession $userSession, IConfig $config, IL10N $l) {
97
+        $this->logger = $logger;
98
+        $this->user = $userSession && $userSession->isLoggedIn() ? $userSession->getUser()->getUID() : '"no user given"';
99
+        $this->config = $config;
100
+        $this->l = $l;
101
+        $this->supportedKeyFormats = ['hash', 'password'];
102
+    }
103
+
104
+    /**
105
+     * create new private/public key-pair for user
106
+     *
107
+     * @return array|bool
108
+     */
109
+    public function createKeyPair() {
110
+
111
+        $log = $this->logger;
112
+        $res = $this->getOpenSSLPKey();
113
+
114
+        if (!$res) {
115
+            $log->error("Encryption Library couldn't generate users key-pair for {$this->user}",
116
+                ['app' => 'encryption']);
117
+
118
+            if (openssl_error_string()) {
119
+                $log->error('Encryption library openssl_pkey_new() fails: ' . openssl_error_string(),
120
+                    ['app' => 'encryption']);
121
+            }
122
+        } elseif (openssl_pkey_export($res,
123
+            $privateKey,
124
+            null,
125
+            $this->getOpenSSLConfig())) {
126
+            $keyDetails = openssl_pkey_get_details($res);
127
+            $publicKey = $keyDetails['key'];
128
+
129
+            return [
130
+                'publicKey' => $publicKey,
131
+                'privateKey' => $privateKey
132
+            ];
133
+        }
134
+        $log->error('Encryption library couldn\'t export users private key, please check your servers OpenSSL configuration.' . $this->user,
135
+            ['app' => 'encryption']);
136
+        if (openssl_error_string()) {
137
+            $log->error('Encryption Library:' . openssl_error_string(),
138
+                ['app' => 'encryption']);
139
+        }
140
+
141
+        return false;
142
+    }
143
+
144
+    /**
145
+     * Generates a new private key
146
+     *
147
+     * @return resource
148
+     */
149
+    public function getOpenSSLPKey() {
150
+        $config = $this->getOpenSSLConfig();
151
+        return openssl_pkey_new($config);
152
+    }
153
+
154
+    /**
155
+     * get openSSL Config
156
+     *
157
+     * @return array
158
+     */
159
+    private function getOpenSSLConfig() {
160
+        $config = ['private_key_bits' => 4096];
161
+        $config = array_merge(
162
+            $config,
163
+            $this->config->getSystemValue('openssl', [])
164
+        );
165
+        return $config;
166
+    }
167
+
168
+    /**
169
+     * @param string $plainContent
170
+     * @param string $passPhrase
171
+     * @param int $version
172
+     * @param int $position
173
+     * @return false|string
174
+     * @throws EncryptionFailedException
175
+     */
176
+    public function symmetricEncryptFileContent($plainContent, $passPhrase, $version, $position) {
177
+
178
+        if (!$plainContent) {
179
+            $this->logger->error('Encryption Library, symmetrical encryption failed no content given',
180
+                ['app' => 'encryption']);
181
+            return false;
182
+        }
183
+
184
+        $iv = $this->generateIv();
185
+
186
+        $encryptedContent = $this->encrypt($plainContent,
187
+            $iv,
188
+            $passPhrase,
189
+            $this->getCipher());
190
+
191
+        // Create a signature based on the key as well as the current version
192
+        $sig = $this->createSignature($encryptedContent, $passPhrase.$version.$position);
193
+
194
+        // combine content to encrypt the IV identifier and actual IV
195
+        $catFile = $this->concatIV($encryptedContent, $iv);
196
+        $catFile = $this->concatSig($catFile, $sig);
197
+        $padded = $this->addPadding($catFile);
198
+
199
+        return $padded;
200
+    }
201
+
202
+    /**
203
+     * generate header for encrypted file
204
+     *
205
+     * @param string $keyFormat (can be 'hash' or 'password')
206
+     * @return string
207
+     * @throws \InvalidArgumentException
208
+     */
209
+    public function generateHeader($keyFormat = 'hash') {
210
+
211
+        if (in_array($keyFormat, $this->supportedKeyFormats, true) === false) {
212
+            throw new \InvalidArgumentException('key format "' . $keyFormat . '" is not supported');
213
+        }
214
+
215
+        $cipher = $this->getCipher();
216
+
217
+        $header = self::HEADER_START
218
+            . ':cipher:' . $cipher
219
+            . ':keyFormat:' . $keyFormat
220
+            . ':' . self::HEADER_END;
221
+
222
+        return $header;
223
+    }
224
+
225
+    /**
226
+     * @param string $plainContent
227
+     * @param string $iv
228
+     * @param string $passPhrase
229
+     * @param string $cipher
230
+     * @return string
231
+     * @throws EncryptionFailedException
232
+     */
233
+    private function encrypt($plainContent, $iv, $passPhrase = '', $cipher = self::DEFAULT_CIPHER) {
234
+        $encryptedContent = openssl_encrypt($plainContent,
235
+            $cipher,
236
+            $passPhrase,
237
+            false,
238
+            $iv);
239
+
240
+        if (!$encryptedContent) {
241
+            $error = 'Encryption (symmetric) of content failed';
242
+            $this->logger->error($error . openssl_error_string(),
243
+                ['app' => 'encryption']);
244
+            throw new EncryptionFailedException($error);
245
+        }
246
+
247
+        return $encryptedContent;
248
+    }
249
+
250
+    /**
251
+     * return Cipher either from config.php or the default cipher defined in
252
+     * this class
253
+     *
254
+     * @return string
255
+     */
256
+    public function getCipher() {
257
+        $cipher = $this->config->getSystemValue('cipher', self::DEFAULT_CIPHER);
258
+        if (!isset($this->supportedCiphersAndKeySize[$cipher])) {
259
+            $this->logger->warning(
260
+                    sprintf(
261
+                            'Unsupported cipher (%s) defined in config.php supported. Falling back to %s',
262
+                            $cipher,
263
+                            self::DEFAULT_CIPHER
264
+                    ),
265
+                ['app' => 'encryption']);
266
+            $cipher = self::DEFAULT_CIPHER;
267
+        }
268
+
269
+        // Workaround for OpenSSL 0.9.8. Fallback to an old cipher that should work.
270
+        if(OPENSSL_VERSION_NUMBER < 0x1000101f) {
271
+            if($cipher === 'AES-256-CTR' || $cipher === 'AES-128-CTR') {
272
+                $cipher = self::LEGACY_CIPHER;
273
+            }
274
+        }
275
+
276
+        return $cipher;
277
+    }
278
+
279
+    /**
280
+     * get key size depending on the cipher
281
+     *
282
+     * @param string $cipher
283
+     * @return int
284
+     * @throws \InvalidArgumentException
285
+     */
286
+    protected function getKeySize($cipher) {
287
+        if(isset($this->supportedCiphersAndKeySize[$cipher])) {
288
+            return $this->supportedCiphersAndKeySize[$cipher];
289
+        }
290
+
291
+        throw new \InvalidArgumentException(
292
+            sprintf(
293
+                    'Unsupported cipher (%s) defined.',
294
+                    $cipher
295
+            )
296
+        );
297
+    }
298
+
299
+    /**
300
+     * get legacy cipher
301
+     *
302
+     * @return string
303
+     */
304
+    public function getLegacyCipher() {
305
+        return self::LEGACY_CIPHER;
306
+    }
307
+
308
+    /**
309
+     * @param string $encryptedContent
310
+     * @param string $iv
311
+     * @return string
312
+     */
313
+    private function concatIV($encryptedContent, $iv) {
314
+        return $encryptedContent . '00iv00' . $iv;
315
+    }
316
+
317
+    /**
318
+     * @param string $encryptedContent
319
+     * @param string $signature
320
+     * @return string
321
+     */
322
+    private function concatSig($encryptedContent, $signature) {
323
+        return $encryptedContent . '00sig00' . $signature;
324
+    }
325
+
326
+    /**
327
+     * Note: This is _NOT_ a padding used for encryption purposes. It is solely
328
+     * used to achieve the PHP stream size. It has _NOTHING_ to do with the
329
+     * encrypted content and is not used in any crypto primitive.
330
+     *
331
+     * @param string $data
332
+     * @return string
333
+     */
334
+    private function addPadding($data) {
335
+        return $data . 'xxx';
336
+    }
337
+
338
+    /**
339
+     * generate password hash used to encrypt the users private key
340
+     *
341
+     * @param string $password
342
+     * @param string $cipher
343
+     * @param string $uid only used for user keys
344
+     * @return string
345
+     */
346
+    protected function generatePasswordHash($password, $cipher, $uid = '') {
347
+        $instanceId = $this->config->getSystemValue('instanceid');
348
+        $instanceSecret = $this->config->getSystemValue('secret');
349
+        $salt = hash('sha256', $uid . $instanceId . $instanceSecret, true);
350
+        $keySize = $this->getKeySize($cipher);
351
+
352
+        $hash = hash_pbkdf2(
353
+            'sha256',
354
+            $password,
355
+            $salt,
356
+            100000,
357
+            $keySize,
358
+            true
359
+        );
360
+
361
+        return $hash;
362
+    }
363
+
364
+    /**
365
+     * encrypt private key
366
+     *
367
+     * @param string $privateKey
368
+     * @param string $password
369
+     * @param string $uid for regular users, empty for system keys
370
+     * @return false|string
371
+     */
372
+    public function encryptPrivateKey($privateKey, $password, $uid = '') {
373
+        $cipher = $this->getCipher();
374
+        $hash = $this->generatePasswordHash($password, $cipher, $uid);
375
+        $encryptedKey = $this->symmetricEncryptFileContent(
376
+            $privateKey,
377
+            $hash,
378
+            0,
379
+            0
380
+        );
381
+
382
+        return $encryptedKey;
383
+    }
384
+
385
+    /**
386
+     * @param string $privateKey
387
+     * @param string $password
388
+     * @param string $uid for regular users, empty for system keys
389
+     * @return false|string
390
+     */
391
+    public function decryptPrivateKey($privateKey, $password = '', $uid = '') {
392
+
393
+        $header = $this->parseHeader($privateKey);
394
+
395
+        if (isset($header['cipher'])) {
396
+            $cipher = $header['cipher'];
397
+        } else {
398
+            $cipher = self::LEGACY_CIPHER;
399
+        }
400
+
401
+        if (isset($header['keyFormat'])) {
402
+            $keyFormat = $header['keyFormat'];
403
+        } else {
404
+            $keyFormat = self::LEGACY_KEY_FORMAT;
405
+        }
406
+
407
+        if ($keyFormat === 'hash') {
408
+            $password = $this->generatePasswordHash($password, $cipher, $uid);
409
+        }
410
+
411
+        // If we found a header we need to remove it from the key we want to decrypt
412
+        if (!empty($header)) {
413
+            $privateKey = substr($privateKey,
414
+                strpos($privateKey,
415
+                    self::HEADER_END) + strlen(self::HEADER_END));
416
+        }
417
+
418
+        $plainKey = $this->symmetricDecryptFileContent(
419
+            $privateKey,
420
+            $password,
421
+            $cipher,
422
+            0
423
+        );
424
+
425
+        if ($this->isValidPrivateKey($plainKey) === false) {
426
+            return false;
427
+        }
428
+
429
+        return $plainKey;
430
+    }
431
+
432
+    /**
433
+     * check if it is a valid private key
434
+     *
435
+     * @param string $plainKey
436
+     * @return bool
437
+     */
438
+    protected function isValidPrivateKey($plainKey) {
439
+        $res = openssl_get_privatekey($plainKey);
440
+        if (is_resource($res)) {
441
+            $sslInfo = openssl_pkey_get_details($res);
442
+            if (isset($sslInfo['key'])) {
443
+                return true;
444
+            }
445
+        }
446
+
447
+        return false;
448
+    }
449
+
450
+    /**
451
+     * @param string $keyFileContents
452
+     * @param string $passPhrase
453
+     * @param string $cipher
454
+     * @param int $version
455
+     * @param int $position
456
+     * @return string
457
+     * @throws DecryptionFailedException
458
+     */
459
+    public function symmetricDecryptFileContent($keyFileContents, $passPhrase, $cipher = self::DEFAULT_CIPHER, $version = 0, $position = 0) {
460
+        $catFile = $this->splitMetaData($keyFileContents, $cipher);
461
+
462
+        if ($catFile['signature'] !== false) {
463
+            $this->checkSignature($catFile['encrypted'], $passPhrase.$version.$position, $catFile['signature']);
464
+        }
465
+
466
+        return $this->decrypt($catFile['encrypted'],
467
+            $catFile['iv'],
468
+            $passPhrase,
469
+            $cipher);
470
+    }
471
+
472
+    /**
473
+     * check for valid signature
474
+     *
475
+     * @param string $data
476
+     * @param string $passPhrase
477
+     * @param string $expectedSignature
478
+     * @throws GenericEncryptionException
479
+     */
480
+    private function checkSignature($data, $passPhrase, $expectedSignature) {
481
+        $signature = $this->createSignature($data, $passPhrase);
482
+        if (!hash_equals($expectedSignature, $signature)) {
483
+            throw new GenericEncryptionException('Bad Signature', $this->l->t('Bad Signature'));
484
+        }
485
+    }
486
+
487
+    /**
488
+     * create signature
489
+     *
490
+     * @param string $data
491
+     * @param string $passPhrase
492
+     * @return string
493
+     */
494
+    private function createSignature($data, $passPhrase) {
495
+        $passPhrase = hash('sha512', $passPhrase . 'a', true);
496
+        $signature = hash_hmac('sha256', $data, $passPhrase);
497
+        return $signature;
498
+    }
499
+
500
+
501
+    /**
502
+     * remove padding
503
+     *
504
+     * @param string $padded
505
+     * @param bool $hasSignature did the block contain a signature, in this case we use a different padding
506
+     * @return string|false
507
+     */
508
+    private function removePadding($padded, $hasSignature = false) {
509
+        if ($hasSignature === false && substr($padded, -2) === 'xx') {
510
+            return substr($padded, 0, -2);
511
+        } elseif ($hasSignature === true && substr($padded, -3) === 'xxx') {
512
+            return substr($padded, 0, -3);
513
+        }
514
+        return false;
515
+    }
516
+
517
+    /**
518
+     * split meta data from encrypted file
519
+     * Note: for now, we assume that the meta data always start with the iv
520
+     *       followed by the signature, if available
521
+     *
522
+     * @param string $catFile
523
+     * @param string $cipher
524
+     * @return array
525
+     */
526
+    private function splitMetaData($catFile, $cipher) {
527
+        if ($this->hasSignature($catFile, $cipher)) {
528
+            $catFile = $this->removePadding($catFile, true);
529
+            $meta = substr($catFile, -93);
530
+            $iv = substr($meta, strlen('00iv00'), 16);
531
+            $sig = substr($meta, 22 + strlen('00sig00'));
532
+            $encrypted = substr($catFile, 0, -93);
533
+        } else {
534
+            $catFile = $this->removePadding($catFile);
535
+            $meta = substr($catFile, -22);
536
+            $iv = substr($meta, -16);
537
+            $sig = false;
538
+            $encrypted = substr($catFile, 0, -22);
539
+        }
540
+
541
+        return [
542
+            'encrypted' => $encrypted,
543
+            'iv' => $iv,
544
+            'signature' => $sig
545
+        ];
546
+    }
547
+
548
+    /**
549
+     * check if encrypted block is signed
550
+     *
551
+     * @param string $catFile
552
+     * @param string $cipher
553
+     * @return bool
554
+     * @throws GenericEncryptionException
555
+     */
556
+    private function hasSignature($catFile, $cipher) {
557
+        $meta = substr($catFile, -93);
558
+        $signaturePosition = strpos($meta, '00sig00');
559
+
560
+        // enforce signature for the new 'CTR' ciphers
561
+        if ($signaturePosition === false && strpos(strtolower($cipher), 'ctr') !== false) {
562
+            throw new GenericEncryptionException('Missing Signature', $this->l->t('Missing Signature'));
563
+        }
564
+
565
+        return ($signaturePosition !== false);
566
+    }
567
+
568
+
569
+    /**
570
+     * @param string $encryptedContent
571
+     * @param string $iv
572
+     * @param string $passPhrase
573
+     * @param string $cipher
574
+     * @return string
575
+     * @throws DecryptionFailedException
576
+     */
577
+    private function decrypt($encryptedContent, $iv, $passPhrase = '', $cipher = self::DEFAULT_CIPHER) {
578
+        $plainContent = openssl_decrypt($encryptedContent,
579
+            $cipher,
580
+            $passPhrase,
581
+            false,
582
+            $iv);
583
+
584
+        if ($plainContent) {
585
+            return $plainContent;
586
+        } else {
587
+            throw new DecryptionFailedException('Encryption library: Decryption (symmetric) of content failed: ' . openssl_error_string());
588
+        }
589
+    }
590
+
591
+    /**
592
+     * @param string $data
593
+     * @return array
594
+     */
595
+    protected function parseHeader($data) {
596
+        $result = [];
597
+
598
+        if (substr($data, 0, strlen(self::HEADER_START)) === self::HEADER_START) {
599
+            $endAt = strpos($data, self::HEADER_END);
600
+            $header = substr($data, 0, $endAt + strlen(self::HEADER_END));
601
+
602
+            // +1 not to start with an ':' which would result in empty element at the beginning
603
+            $exploded = explode(':',
604
+                substr($header, strlen(self::HEADER_START) + 1));
605
+
606
+            $element = array_shift($exploded);
607
+
608
+            while ($element !== self::HEADER_END) {
609
+                $result[$element] = array_shift($exploded);
610
+                $element = array_shift($exploded);
611
+            }
612
+        }
613
+
614
+        return $result;
615
+    }
616
+
617
+    /**
618
+     * generate initialization vector
619
+     *
620
+     * @return string
621
+     * @throws GenericEncryptionException
622
+     */
623
+    private function generateIv() {
624
+        return random_bytes(16);
625
+    }
626
+
627
+    /**
628
+     * Generate a cryptographically secure pseudo-random 256-bit ASCII key, used
629
+     * as file key
630
+     *
631
+     * @return string
632
+     * @throws \Exception
633
+     */
634
+    public function generateFileKey() {
635
+        return random_bytes(32);
636
+    }
637
+
638
+    /**
639
+     * @param $encKeyFile
640
+     * @param $shareKey
641
+     * @param $privateKey
642
+     * @return string
643
+     * @throws MultiKeyDecryptException
644
+     */
645
+    public function multiKeyDecrypt($encKeyFile, $shareKey, $privateKey) {
646
+        if (!$encKeyFile) {
647
+            throw new MultiKeyDecryptException('Cannot multikey decrypt empty plain content');
648
+        }
649
+
650
+        if (openssl_open($encKeyFile, $plainContent, $shareKey, $privateKey)) {
651
+            return $plainContent;
652
+        } else {
653
+            throw new MultiKeyDecryptException('multikeydecrypt with share key failed:' . openssl_error_string());
654
+        }
655
+    }
656
+
657
+    /**
658
+     * @param string $plainContent
659
+     * @param array $keyFiles
660
+     * @return array
661
+     * @throws MultiKeyEncryptException
662
+     */
663
+    public function multiKeyEncrypt($plainContent, array $keyFiles) {
664
+        // openssl_seal returns false without errors if plaincontent is empty
665
+        // so trigger our own error
666
+        if (empty($plainContent)) {
667
+            throw new MultiKeyEncryptException('Cannot multikeyencrypt empty plain content');
668
+        }
669
+
670
+        // Set empty vars to be set by openssl by reference
671
+        $sealed = '';
672
+        $shareKeys = [];
673
+        $mappedShareKeys = [];
674
+
675
+        if (openssl_seal($plainContent, $sealed, $shareKeys, $keyFiles)) {
676
+            $i = 0;
677
+
678
+            // Ensure each shareKey is labelled with its corresponding key id
679
+            foreach ($keyFiles as $userId => $publicKey) {
680
+                $mappedShareKeys[$userId] = $shareKeys[$i];
681
+                $i++;
682
+            }
683
+
684
+            return [
685
+                'keys' => $mappedShareKeys,
686
+                'data' => $sealed
687
+            ];
688
+        } else {
689
+            throw new MultiKeyEncryptException('multikeyencryption failed ' . openssl_error_string());
690
+        }
691
+    }
692 692
 }
693 693
 
Please login to merge, or discard this patch.
apps/encryption/lib/Crypto/DecryptAll.php 2 patches
Indentation   +123 added lines, -123 removed lines patch added patch discarded remove patch
@@ -35,127 +35,127 @@
 block discarded – undo
35 35
 
36 36
 class DecryptAll {
37 37
 
38
-	/** @var Util  */
39
-	protected $util;
40
-
41
-	/** @var QuestionHelper  */
42
-	protected $questionHelper;
43
-
44
-	/** @var  Crypt */
45
-	protected $crypt;
46
-
47
-	/** @var  KeyManager */
48
-	protected $keyManager;
49
-
50
-	/** @var Session  */
51
-	protected $session;
52
-
53
-	/**
54
-	 * @param Util $util
55
-	 * @param KeyManager $keyManager
56
-	 * @param Crypt $crypt
57
-	 * @param Session $session
58
-	 * @param QuestionHelper $questionHelper
59
-	 */
60
-	public function __construct(
61
-		Util $util,
62
-		KeyManager $keyManager,
63
-		Crypt $crypt,
64
-		Session $session,
65
-		QuestionHelper $questionHelper
66
-	) {
67
-		$this->util = $util;
68
-		$this->keyManager = $keyManager;
69
-		$this->crypt = $crypt;
70
-		$this->session = $session;
71
-		$this->questionHelper = $questionHelper;
72
-	}
73
-
74
-	/**
75
-	 * prepare encryption module to decrypt all files
76
-	 *
77
-	 * @param InputInterface $input
78
-	 * @param OutputInterface $output
79
-	 * @param $user
80
-	 * @return bool
81
-	 */
82
-	public function prepare(InputInterface $input, OutputInterface $output, $user) {
83
-
84
-		$question = new Question('Please enter the recovery key password: ');
85
-
86
-		if($this->util->isMasterKeyEnabled()) {
87
-			$output->writeln('Use master key to decrypt all files');
88
-			$user = $this->keyManager->getMasterKeyId();
89
-			$password =$this->keyManager->getMasterKeyPassword();
90
-		} else {
91
-			$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
92
-			if (!empty($user)) {
93
-				$output->writeln('You can only decrypt the users files if you know');
94
-				$output->writeln('the users password or if he activated the recovery key.');
95
-				$output->writeln('');
96
-				$questionUseLoginPassword = new ConfirmationQuestion(
97
-					'Do you want to use the users login password to decrypt all files? (y/n) ',
98
-					false
99
-				);
100
-				$useLoginPassword = $this->questionHelper->ask($input, $output, $questionUseLoginPassword);
101
-				if ($useLoginPassword) {
102
-					$question = new Question('Please enter the user\'s login password: ');
103
-				} else if ($this->util->isRecoveryEnabledForUser($user) === false) {
104
-					$output->writeln('No recovery key available for user ' . $user);
105
-					return false;
106
-				} else {
107
-					$user = $recoveryKeyId;
108
-				}
109
-			} else {
110
-				$output->writeln('You can only decrypt the files of all users if the');
111
-				$output->writeln('recovery key is enabled by the admin and activated by the users.');
112
-				$output->writeln('');
113
-				$user = $recoveryKeyId;
114
-			}
115
-
116
-			$question->setHidden(true);
117
-			$question->setHiddenFallback(false);
118
-			$password = $this->questionHelper->ask($input, $output, $question);
119
-		}
120
-
121
-		$privateKey = $this->getPrivateKey($user, $password);
122
-		if ($privateKey !== false) {
123
-			$this->updateSession($user, $privateKey);
124
-			return true;
125
-		} else {
126
-			$output->writeln('Could not decrypt private key, maybe you entered the wrong password?');
127
-		}
128
-
129
-
130
-		return false;
131
-	}
132
-
133
-	/**
134
-	 * get the private key which will be used to decrypt all files
135
-	 *
136
-	 * @param string $user
137
-	 * @param string $password
138
-	 * @return bool|string
139
-	 * @throws \OCA\Encryption\Exceptions\PrivateKeyMissingException
140
-	 */
141
-	protected function getPrivateKey($user, $password) {
142
-		$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
143
-		$masterKeyId = $this->keyManager->getMasterKeyId();
144
-		if ($user === $recoveryKeyId) {
145
-			$recoveryKey = $this->keyManager->getSystemPrivateKey($recoveryKeyId);
146
-			$privateKey = $this->crypt->decryptPrivateKey($recoveryKey, $password);
147
-		} elseif ($user === $masterKeyId) {
148
-			$masterKey = $this->keyManager->getSystemPrivateKey($masterKeyId);
149
-			$privateKey = $this->crypt->decryptPrivateKey($masterKey, $password, $masterKeyId);
150
-		} else {
151
-			$userKey = $this->keyManager->getPrivateKey($user);
152
-			$privateKey = $this->crypt->decryptPrivateKey($userKey, $password, $user);
153
-		}
154
-
155
-		return $privateKey;
156
-	}
157
-
158
-	protected function updateSession($user, $privateKey) {
159
-		$this->session->prepareDecryptAll($user, $privateKey);
160
-	}
38
+    /** @var Util  */
39
+    protected $util;
40
+
41
+    /** @var QuestionHelper  */
42
+    protected $questionHelper;
43
+
44
+    /** @var  Crypt */
45
+    protected $crypt;
46
+
47
+    /** @var  KeyManager */
48
+    protected $keyManager;
49
+
50
+    /** @var Session  */
51
+    protected $session;
52
+
53
+    /**
54
+     * @param Util $util
55
+     * @param KeyManager $keyManager
56
+     * @param Crypt $crypt
57
+     * @param Session $session
58
+     * @param QuestionHelper $questionHelper
59
+     */
60
+    public function __construct(
61
+        Util $util,
62
+        KeyManager $keyManager,
63
+        Crypt $crypt,
64
+        Session $session,
65
+        QuestionHelper $questionHelper
66
+    ) {
67
+        $this->util = $util;
68
+        $this->keyManager = $keyManager;
69
+        $this->crypt = $crypt;
70
+        $this->session = $session;
71
+        $this->questionHelper = $questionHelper;
72
+    }
73
+
74
+    /**
75
+     * prepare encryption module to decrypt all files
76
+     *
77
+     * @param InputInterface $input
78
+     * @param OutputInterface $output
79
+     * @param $user
80
+     * @return bool
81
+     */
82
+    public function prepare(InputInterface $input, OutputInterface $output, $user) {
83
+
84
+        $question = new Question('Please enter the recovery key password: ');
85
+
86
+        if($this->util->isMasterKeyEnabled()) {
87
+            $output->writeln('Use master key to decrypt all files');
88
+            $user = $this->keyManager->getMasterKeyId();
89
+            $password =$this->keyManager->getMasterKeyPassword();
90
+        } else {
91
+            $recoveryKeyId = $this->keyManager->getRecoveryKeyId();
92
+            if (!empty($user)) {
93
+                $output->writeln('You can only decrypt the users files if you know');
94
+                $output->writeln('the users password or if he activated the recovery key.');
95
+                $output->writeln('');
96
+                $questionUseLoginPassword = new ConfirmationQuestion(
97
+                    'Do you want to use the users login password to decrypt all files? (y/n) ',
98
+                    false
99
+                );
100
+                $useLoginPassword = $this->questionHelper->ask($input, $output, $questionUseLoginPassword);
101
+                if ($useLoginPassword) {
102
+                    $question = new Question('Please enter the user\'s login password: ');
103
+                } else if ($this->util->isRecoveryEnabledForUser($user) === false) {
104
+                    $output->writeln('No recovery key available for user ' . $user);
105
+                    return false;
106
+                } else {
107
+                    $user = $recoveryKeyId;
108
+                }
109
+            } else {
110
+                $output->writeln('You can only decrypt the files of all users if the');
111
+                $output->writeln('recovery key is enabled by the admin and activated by the users.');
112
+                $output->writeln('');
113
+                $user = $recoveryKeyId;
114
+            }
115
+
116
+            $question->setHidden(true);
117
+            $question->setHiddenFallback(false);
118
+            $password = $this->questionHelper->ask($input, $output, $question);
119
+        }
120
+
121
+        $privateKey = $this->getPrivateKey($user, $password);
122
+        if ($privateKey !== false) {
123
+            $this->updateSession($user, $privateKey);
124
+            return true;
125
+        } else {
126
+            $output->writeln('Could not decrypt private key, maybe you entered the wrong password?');
127
+        }
128
+
129
+
130
+        return false;
131
+    }
132
+
133
+    /**
134
+     * get the private key which will be used to decrypt all files
135
+     *
136
+     * @param string $user
137
+     * @param string $password
138
+     * @return bool|string
139
+     * @throws \OCA\Encryption\Exceptions\PrivateKeyMissingException
140
+     */
141
+    protected function getPrivateKey($user, $password) {
142
+        $recoveryKeyId = $this->keyManager->getRecoveryKeyId();
143
+        $masterKeyId = $this->keyManager->getMasterKeyId();
144
+        if ($user === $recoveryKeyId) {
145
+            $recoveryKey = $this->keyManager->getSystemPrivateKey($recoveryKeyId);
146
+            $privateKey = $this->crypt->decryptPrivateKey($recoveryKey, $password);
147
+        } elseif ($user === $masterKeyId) {
148
+            $masterKey = $this->keyManager->getSystemPrivateKey($masterKeyId);
149
+            $privateKey = $this->crypt->decryptPrivateKey($masterKey, $password, $masterKeyId);
150
+        } else {
151
+            $userKey = $this->keyManager->getPrivateKey($user);
152
+            $privateKey = $this->crypt->decryptPrivateKey($userKey, $password, $user);
153
+        }
154
+
155
+        return $privateKey;
156
+    }
157
+
158
+    protected function updateSession($user, $privateKey) {
159
+        $this->session->prepareDecryptAll($user, $privateKey);
160
+    }
161 161
 }
Please login to merge, or discard this patch.
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -83,10 +83,10 @@  discard block
 block discarded – undo
83 83
 
84 84
 		$question = new Question('Please enter the recovery key password: ');
85 85
 
86
-		if($this->util->isMasterKeyEnabled()) {
86
+		if ($this->util->isMasterKeyEnabled()) {
87 87
 			$output->writeln('Use master key to decrypt all files');
88 88
 			$user = $this->keyManager->getMasterKeyId();
89
-			$password =$this->keyManager->getMasterKeyPassword();
89
+			$password = $this->keyManager->getMasterKeyPassword();
90 90
 		} else {
91 91
 			$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
92 92
 			if (!empty($user)) {
@@ -101,7 +101,7 @@  discard block
 block discarded – undo
101 101
 				if ($useLoginPassword) {
102 102
 					$question = new Question('Please enter the user\'s login password: ');
103 103
 				} else if ($this->util->isRecoveryEnabledForUser($user) === false) {
104
-					$output->writeln('No recovery key available for user ' . $user);
104
+					$output->writeln('No recovery key available for user '.$user);
105 105
 					return false;
106 106
 				} else {
107 107
 					$user = $recoveryKeyId;
Please login to merge, or discard this patch.
apps/encryption/lib/HookManager.php 1 patch
Indentation   +29 added lines, -29 removed lines patch added patch discarded remove patch
@@ -28,38 +28,38 @@
 block discarded – undo
28 28
 
29 29
 class HookManager {
30 30
 
31
-	private $hookInstances = [];
31
+    private $hookInstances = [];
32 32
 
33
-	/**
34
-	 * @param array|IHook $instances
35
-	 *        - This accepts either a single instance of IHook or an array of instances of IHook
36
-	 * @return bool
37
-	 */
38
-	public function registerHook($instances) {
39
-		if (is_array($instances)) {
40
-			foreach ($instances as $instance) {
41
-				if (!$instance instanceof IHook) {
42
-					return false;
43
-				}
44
-				$this->hookInstances[] = $instance;
45
-			}
33
+    /**
34
+     * @param array|IHook $instances
35
+     *        - This accepts either a single instance of IHook or an array of instances of IHook
36
+     * @return bool
37
+     */
38
+    public function registerHook($instances) {
39
+        if (is_array($instances)) {
40
+            foreach ($instances as $instance) {
41
+                if (!$instance instanceof IHook) {
42
+                    return false;
43
+                }
44
+                $this->hookInstances[] = $instance;
45
+            }
46 46
 
47
-		} elseif ($instances instanceof IHook) {
48
-			$this->hookInstances[] = $instances;
49
-		}
50
-		return true;
51
-	}
47
+        } elseif ($instances instanceof IHook) {
48
+            $this->hookInstances[] = $instances;
49
+        }
50
+        return true;
51
+    }
52 52
 
53
-	public function fireHooks() {
54
-		foreach ($this->hookInstances as $instance) {
55
-			/**
56
-			 * Fire off the add hooks method of each instance stored in cache
57
-			 *
58
-			 * @var $instance IHook
59
-			 */
60
-			$instance->addHooks();
61
-		}
53
+    public function fireHooks() {
54
+        foreach ($this->hookInstances as $instance) {
55
+            /**
56
+             * Fire off the add hooks method of each instance stored in cache
57
+             *
58
+             * @var $instance IHook
59
+             */
60
+            $instance->addHooks();
61
+        }
62 62
 
63
-	}
63
+    }
64 64
 
65 65
 }
Please login to merge, or discard this patch.