Completed
Pull Request — master (#5550)
by Andreas
16:28
created
apps/encryption/lib/AppInfo/Application.php 1 patch
Indentation   +223 added lines, -223 removed lines patch added patch discarded remove patch
@@ -48,227 +48,227 @@
 block discarded – undo
48 48
 
49 49
 class Application extends \OCP\AppFramework\App {
50 50
 
51
-	/** @var IManager */
52
-	private $encryptionManager;
53
-	/** @var IConfig */
54
-	private $config;
55
-
56
-	/**
57
-	 * @param array $urlParams
58
-	 * @param bool $encryptionSystemReady
59
-	 */
60
-	public function __construct($urlParams = array(), $encryptionSystemReady = true) {
61
-		parent::__construct('encryption', $urlParams);
62
-		$this->encryptionManager = \OC::$server->getEncryptionManager();
63
-		$this->config = \OC::$server->getConfig();
64
-		$this->registerServices();
65
-		if($encryptionSystemReady === false) {
66
-			/** @var Session $session */
67
-			$session = $this->getContainer()->query('Session');
68
-			$session->setStatus(Session::RUN_MIGRATION);
69
-		}
70
-		if ($this->encryptionManager->isEnabled() && $encryptionSystemReady) {
71
-			/** @var Setup $setup */
72
-			$setup = $this->getContainer()->query('UserSetup');
73
-			$setup->setupSystem();
74
-		}
75
-	}
76
-
77
-	/**
78
-	 * register hooks
79
-	 */
80
-
81
-	public function registerHooks() {
82
-		if (!$this->config->getSystemValue('maintenance', false)) {
83
-
84
-			$container = $this->getContainer();
85
-			$server = $container->getServer();
86
-			// Register our hooks and fire them.
87
-			$hookManager = new HookManager();
88
-
89
-			$hookManager->registerHook([
90
-				new UserHooks($container->query('KeyManager'),
91
-					$server->getUserManager(),
92
-					$server->getLogger(),
93
-					$container->query('UserSetup'),
94
-					$server->getUserSession(),
95
-					$container->query('Util'),
96
-					$container->query('Session'),
97
-					$container->query('Crypt'),
98
-					$container->query('Recovery'))
99
-			]);
100
-
101
-			$hookManager->fireHooks();
102
-
103
-		} else {
104
-			// Logout user if we are in maintenance to force re-login
105
-			$this->getContainer()->getServer()->getUserSession()->logout();
106
-		}
107
-	}
108
-
109
-	public function registerEncryptionModule() {
110
-		$container = $this->getContainer();
111
-
112
-
113
-		$this->encryptionManager->registerEncryptionModule(
114
-			Encryption::ID,
115
-			Encryption::DISPLAY_NAME,
116
-			function() use ($container) {
117
-
118
-			return new Encryption(
119
-				$container->query('Crypt'),
120
-				$container->query('KeyManager'),
121
-				$container->query('Util'),
122
-				$container->query('Session'),
123
-				$container->query('EncryptAll'),
124
-				$container->query('DecryptAll'),
125
-				$container->getServer()->getLogger(),
126
-				$container->getServer()->getL10N($container->getAppName())
127
-			);
128
-		});
129
-
130
-	}
131
-
132
-	public function registerServices() {
133
-		$container = $this->getContainer();
134
-
135
-		$container->registerService('Crypt',
136
-			function (IAppContainer $c) {
137
-				$server = $c->getServer();
138
-				return new Crypt($server->getLogger(),
139
-					$server->getUserSession(),
140
-					$server->getConfig(),
141
-					$server->getL10N($c->getAppName()));
142
-			});
143
-
144
-		$container->registerService('Session',
145
-			function (IAppContainer $c) {
146
-				$server = $c->getServer();
147
-				return new Session($server->getSession());
148
-			}
149
-		);
150
-
151
-		$container->registerService('KeyManager',
152
-			function (IAppContainer $c) {
153
-				$server = $c->getServer();
154
-
155
-				return new KeyManager($server->getEncryptionKeyStorage(),
156
-					$c->query('Crypt'),
157
-					$server->getConfig(),
158
-					$server->getUserSession(),
159
-					new Session($server->getSession()),
160
-					$server->getLogger(),
161
-					$c->query('Util')
162
-				);
163
-			});
164
-
165
-		$container->registerService('Recovery',
166
-			function (IAppContainer $c) {
167
-				$server = $c->getServer();
168
-
169
-				return new Recovery(
170
-					$server->getUserSession(),
171
-					$c->query('Crypt'),
172
-					$server->getSecureRandom(),
173
-					$c->query('KeyManager'),
174
-					$server->getConfig(),
175
-					$server->getEncryptionKeyStorage(),
176
-					$server->getEncryptionFilesHelper(),
177
-					new View());
178
-			});
179
-
180
-		$container->registerService('RecoveryController', function (IAppContainer $c) {
181
-			$server = $c->getServer();
182
-			return new RecoveryController(
183
-				$c->getAppName(),
184
-				$server->getRequest(),
185
-				$server->getConfig(),
186
-				$server->getL10N($c->getAppName()),
187
-				$c->query('Recovery'));
188
-		});
189
-
190
-		$container->registerService('StatusController', function (IAppContainer $c) {
191
-			$server = $c->getServer();
192
-			return new StatusController(
193
-				$c->getAppName(),
194
-				$server->getRequest(),
195
-				$server->getL10N($c->getAppName()),
196
-				$c->query('Session')
197
-			);
198
-		});
199
-
200
-		$container->registerService('SettingsController', function (IAppContainer $c) {
201
-			$server = $c->getServer();
202
-			return new SettingsController(
203
-				$c->getAppName(),
204
-				$server->getRequest(),
205
-				$server->getL10N($c->getAppName()),
206
-				$server->getUserManager(),
207
-				$server->getUserSession(),
208
-				$c->query('KeyManager'),
209
-				$c->query('Crypt'),
210
-				$c->query('Session'),
211
-				$server->getSession(),
212
-				$c->query('Util')
213
-			);
214
-		});
215
-
216
-		$container->registerService('UserSetup',
217
-			function (IAppContainer $c) {
218
-				$server = $c->getServer();
219
-				return new Setup($server->getLogger(),
220
-					$server->getUserSession(),
221
-					$c->query('Crypt'),
222
-					$c->query('KeyManager'));
223
-			});
224
-
225
-		$container->registerService('Util',
226
-			function (IAppContainer $c) {
227
-				$server = $c->getServer();
228
-
229
-				return new Util(
230
-					new View(),
231
-					$c->query('Crypt'),
232
-					$server->getLogger(),
233
-					$server->getUserSession(),
234
-					$server->getConfig(),
235
-					$server->getUserManager());
236
-			});
237
-
238
-		$container->registerService('EncryptAll',
239
-			function (IAppContainer $c) {
240
-				$server = $c->getServer();
241
-				return new EncryptAll(
242
-					$c->query('UserSetup'),
243
-					$c->getServer()->getUserManager(),
244
-					new View(),
245
-					$c->query('KeyManager'),
246
-					$c->query('Util'),
247
-					$server->getConfig(),
248
-					$server->getMailer(),
249
-					$server->getL10N('encryption'),
250
-					new QuestionHelper(),
251
-					$server->getSecureRandom()
252
-				);
253
-			}
254
-		);
255
-
256
-		$container->registerService('DecryptAll',
257
-			function (IAppContainer $c) {
258
-				return new DecryptAll(
259
-					$c->query('Util'),
260
-					$c->query('KeyManager'),
261
-					$c->query('Crypt'),
262
-					$c->query('Session'),
263
-					new QuestionHelper()
264
-				);
265
-			}
266
-		);
267
-
268
-	}
269
-
270
-	public function registerSettings() {
271
-		// Register settings scripts
272
-		App::registerPersonal('encryption', 'settings/settings-personal');
273
-	}
51
+    /** @var IManager */
52
+    private $encryptionManager;
53
+    /** @var IConfig */
54
+    private $config;
55
+
56
+    /**
57
+     * @param array $urlParams
58
+     * @param bool $encryptionSystemReady
59
+     */
60
+    public function __construct($urlParams = array(), $encryptionSystemReady = true) {
61
+        parent::__construct('encryption', $urlParams);
62
+        $this->encryptionManager = \OC::$server->getEncryptionManager();
63
+        $this->config = \OC::$server->getConfig();
64
+        $this->registerServices();
65
+        if($encryptionSystemReady === false) {
66
+            /** @var Session $session */
67
+            $session = $this->getContainer()->query('Session');
68
+            $session->setStatus(Session::RUN_MIGRATION);
69
+        }
70
+        if ($this->encryptionManager->isEnabled() && $encryptionSystemReady) {
71
+            /** @var Setup $setup */
72
+            $setup = $this->getContainer()->query('UserSetup');
73
+            $setup->setupSystem();
74
+        }
75
+    }
76
+
77
+    /**
78
+     * register hooks
79
+     */
80
+
81
+    public function registerHooks() {
82
+        if (!$this->config->getSystemValue('maintenance', false)) {
83
+
84
+            $container = $this->getContainer();
85
+            $server = $container->getServer();
86
+            // Register our hooks and fire them.
87
+            $hookManager = new HookManager();
88
+
89
+            $hookManager->registerHook([
90
+                new UserHooks($container->query('KeyManager'),
91
+                    $server->getUserManager(),
92
+                    $server->getLogger(),
93
+                    $container->query('UserSetup'),
94
+                    $server->getUserSession(),
95
+                    $container->query('Util'),
96
+                    $container->query('Session'),
97
+                    $container->query('Crypt'),
98
+                    $container->query('Recovery'))
99
+            ]);
100
+
101
+            $hookManager->fireHooks();
102
+
103
+        } else {
104
+            // Logout user if we are in maintenance to force re-login
105
+            $this->getContainer()->getServer()->getUserSession()->logout();
106
+        }
107
+    }
108
+
109
+    public function registerEncryptionModule() {
110
+        $container = $this->getContainer();
111
+
112
+
113
+        $this->encryptionManager->registerEncryptionModule(
114
+            Encryption::ID,
115
+            Encryption::DISPLAY_NAME,
116
+            function() use ($container) {
117
+
118
+            return new Encryption(
119
+                $container->query('Crypt'),
120
+                $container->query('KeyManager'),
121
+                $container->query('Util'),
122
+                $container->query('Session'),
123
+                $container->query('EncryptAll'),
124
+                $container->query('DecryptAll'),
125
+                $container->getServer()->getLogger(),
126
+                $container->getServer()->getL10N($container->getAppName())
127
+            );
128
+        });
129
+
130
+    }
131
+
132
+    public function registerServices() {
133
+        $container = $this->getContainer();
134
+
135
+        $container->registerService('Crypt',
136
+            function (IAppContainer $c) {
137
+                $server = $c->getServer();
138
+                return new Crypt($server->getLogger(),
139
+                    $server->getUserSession(),
140
+                    $server->getConfig(),
141
+                    $server->getL10N($c->getAppName()));
142
+            });
143
+
144
+        $container->registerService('Session',
145
+            function (IAppContainer $c) {
146
+                $server = $c->getServer();
147
+                return new Session($server->getSession());
148
+            }
149
+        );
150
+
151
+        $container->registerService('KeyManager',
152
+            function (IAppContainer $c) {
153
+                $server = $c->getServer();
154
+
155
+                return new KeyManager($server->getEncryptionKeyStorage(),
156
+                    $c->query('Crypt'),
157
+                    $server->getConfig(),
158
+                    $server->getUserSession(),
159
+                    new Session($server->getSession()),
160
+                    $server->getLogger(),
161
+                    $c->query('Util')
162
+                );
163
+            });
164
+
165
+        $container->registerService('Recovery',
166
+            function (IAppContainer $c) {
167
+                $server = $c->getServer();
168
+
169
+                return new Recovery(
170
+                    $server->getUserSession(),
171
+                    $c->query('Crypt'),
172
+                    $server->getSecureRandom(),
173
+                    $c->query('KeyManager'),
174
+                    $server->getConfig(),
175
+                    $server->getEncryptionKeyStorage(),
176
+                    $server->getEncryptionFilesHelper(),
177
+                    new View());
178
+            });
179
+
180
+        $container->registerService('RecoveryController', function (IAppContainer $c) {
181
+            $server = $c->getServer();
182
+            return new RecoveryController(
183
+                $c->getAppName(),
184
+                $server->getRequest(),
185
+                $server->getConfig(),
186
+                $server->getL10N($c->getAppName()),
187
+                $c->query('Recovery'));
188
+        });
189
+
190
+        $container->registerService('StatusController', function (IAppContainer $c) {
191
+            $server = $c->getServer();
192
+            return new StatusController(
193
+                $c->getAppName(),
194
+                $server->getRequest(),
195
+                $server->getL10N($c->getAppName()),
196
+                $c->query('Session')
197
+            );
198
+        });
199
+
200
+        $container->registerService('SettingsController', function (IAppContainer $c) {
201
+            $server = $c->getServer();
202
+            return new SettingsController(
203
+                $c->getAppName(),
204
+                $server->getRequest(),
205
+                $server->getL10N($c->getAppName()),
206
+                $server->getUserManager(),
207
+                $server->getUserSession(),
208
+                $c->query('KeyManager'),
209
+                $c->query('Crypt'),
210
+                $c->query('Session'),
211
+                $server->getSession(),
212
+                $c->query('Util')
213
+            );
214
+        });
215
+
216
+        $container->registerService('UserSetup',
217
+            function (IAppContainer $c) {
218
+                $server = $c->getServer();
219
+                return new Setup($server->getLogger(),
220
+                    $server->getUserSession(),
221
+                    $c->query('Crypt'),
222
+                    $c->query('KeyManager'));
223
+            });
224
+
225
+        $container->registerService('Util',
226
+            function (IAppContainer $c) {
227
+                $server = $c->getServer();
228
+
229
+                return new Util(
230
+                    new View(),
231
+                    $c->query('Crypt'),
232
+                    $server->getLogger(),
233
+                    $server->getUserSession(),
234
+                    $server->getConfig(),
235
+                    $server->getUserManager());
236
+            });
237
+
238
+        $container->registerService('EncryptAll',
239
+            function (IAppContainer $c) {
240
+                $server = $c->getServer();
241
+                return new EncryptAll(
242
+                    $c->query('UserSetup'),
243
+                    $c->getServer()->getUserManager(),
244
+                    new View(),
245
+                    $c->query('KeyManager'),
246
+                    $c->query('Util'),
247
+                    $server->getConfig(),
248
+                    $server->getMailer(),
249
+                    $server->getL10N('encryption'),
250
+                    new QuestionHelper(),
251
+                    $server->getSecureRandom()
252
+                );
253
+            }
254
+        );
255
+
256
+        $container->registerService('DecryptAll',
257
+            function (IAppContainer $c) {
258
+                return new DecryptAll(
259
+                    $c->query('Util'),
260
+                    $c->query('KeyManager'),
261
+                    $c->query('Crypt'),
262
+                    $c->query('Session'),
263
+                    new QuestionHelper()
264
+                );
265
+            }
266
+        );
267
+
268
+    }
269
+
270
+    public function registerSettings() {
271
+        // Register settings scripts
272
+        App::registerPersonal('encryption', 'settings/settings-personal');
273
+    }
274 274
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Recovery.php 1 patch
Indentation   +287 added lines, -287 removed lines patch added patch discarded remove patch
@@ -38,293 +38,293 @@
 block discarded – undo
38 38
 class Recovery {
39 39
 
40 40
 
41
-	/**
42
-	 * @var null|IUser
43
-	 */
44
-	protected $user;
45
-	/**
46
-	 * @var Crypt
47
-	 */
48
-	protected $crypt;
49
-	/**
50
-	 * @var ISecureRandom
51
-	 */
52
-	private $random;
53
-	/**
54
-	 * @var KeyManager
55
-	 */
56
-	private $keyManager;
57
-	/**
58
-	 * @var IConfig
59
-	 */
60
-	private $config;
61
-	/**
62
-	 * @var IStorage
63
-	 */
64
-	private $keyStorage;
65
-	/**
66
-	 * @var View
67
-	 */
68
-	private $view;
69
-	/**
70
-	 * @var IFile
71
-	 */
72
-	private $file;
73
-
74
-	/**
75
-	 * @param IUserSession $user
76
-	 * @param Crypt $crypt
77
-	 * @param ISecureRandom $random
78
-	 * @param KeyManager $keyManager
79
-	 * @param IConfig $config
80
-	 * @param IStorage $keyStorage
81
-	 * @param IFile $file
82
-	 * @param View $view
83
-	 */
84
-	public function __construct(IUserSession $user,
85
-								Crypt $crypt,
86
-								ISecureRandom $random,
87
-								KeyManager $keyManager,
88
-								IConfig $config,
89
-								IStorage $keyStorage,
90
-								IFile $file,
91
-								View $view) {
92
-		$this->user = ($user && $user->isLoggedIn()) ? $user->getUser() : false;
93
-		$this->crypt = $crypt;
94
-		$this->random = $random;
95
-		$this->keyManager = $keyManager;
96
-		$this->config = $config;
97
-		$this->keyStorage = $keyStorage;
98
-		$this->view = $view;
99
-		$this->file = $file;
100
-	}
101
-
102
-	/**
103
-	 * @param string $password
104
-	 * @return bool
105
-	 */
106
-	public function enableAdminRecovery($password) {
107
-		$appConfig = $this->config;
108
-		$keyManager = $this->keyManager;
109
-
110
-		if (!$keyManager->recoveryKeyExists()) {
111
-			$keyPair = $this->crypt->createKeyPair();
112
-			if(!is_array($keyPair)) {
113
-				return false;
114
-			}
115
-
116
-			$this->keyManager->setRecoveryKey($password, $keyPair);
117
-		}
118
-
119
-		if ($keyManager->checkRecoveryPassword($password)) {
120
-			$appConfig->setAppValue('encryption', 'recoveryAdminEnabled', 1);
121
-			return true;
122
-		}
123
-
124
-		return false;
125
-	}
126
-
127
-	/**
128
-	 * change recovery key id
129
-	 *
130
-	 * @param string $newPassword
131
-	 * @param string $oldPassword
132
-	 * @return bool
133
-	 */
134
-	public function changeRecoveryKeyPassword($newPassword, $oldPassword) {
135
-		$recoveryKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
136
-		$decryptedRecoveryKey = $this->crypt->decryptPrivateKey($recoveryKey, $oldPassword);
137
-		if($decryptedRecoveryKey === false) {
138
-			return false;
139
-		}
140
-		$encryptedRecoveryKey = $this->crypt->encryptPrivateKey($decryptedRecoveryKey, $newPassword);
141
-		$header = $this->crypt->generateHeader();
142
-		if ($encryptedRecoveryKey) {
143
-			$this->keyManager->setSystemPrivateKey($this->keyManager->getRecoveryKeyId(), $header . $encryptedRecoveryKey);
144
-			return true;
145
-		}
146
-		return false;
147
-	}
148
-
149
-	/**
150
-	 * @param string $recoveryPassword
151
-	 * @return bool
152
-	 */
153
-	public function disableAdminRecovery($recoveryPassword) {
154
-		$keyManager = $this->keyManager;
155
-
156
-		if ($keyManager->checkRecoveryPassword($recoveryPassword)) {
157
-			// Set recoveryAdmin as disabled
158
-			$this->config->setAppValue('encryption', 'recoveryAdminEnabled', 0);
159
-			return true;
160
-		}
161
-		return false;
162
-	}
163
-
164
-	/**
165
-	 * check if recovery is enabled for user
166
-	 *
167
-	 * @param string $user if no user is given we check the current logged-in user
168
-	 *
169
-	 * @return bool
170
-	 */
171
-	public function isRecoveryEnabledForUser($user = '') {
172
-		$uid = empty($user) ? $this->user->getUID() : $user;
173
-		$recoveryMode = $this->config->getUserValue($uid,
174
-			'encryption',
175
-			'recoveryEnabled',
176
-			0);
177
-
178
-		return ($recoveryMode === '1');
179
-	}
180
-
181
-	/**
182
-	 * check if recovery is key is enabled by the administrator
183
-	 *
184
-	 * @return bool
185
-	 */
186
-	public function isRecoveryKeyEnabled() {
187
-		$enabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', 0);
188
-
189
-		return ($enabled === '1');
190
-	}
191
-
192
-	/**
193
-	 * @param string $value
194
-	 * @return bool
195
-	 */
196
-	public function setRecoveryForUser($value) {
197
-
198
-		try {
199
-			$this->config->setUserValue($this->user->getUID(),
200
-				'encryption',
201
-				'recoveryEnabled',
202
-				$value);
203
-
204
-			if ($value === '1') {
205
-				$this->addRecoveryKeys('/' . $this->user->getUID() . '/files/');
206
-			} else {
207
-				$this->removeRecoveryKeys('/' . $this->user->getUID() . '/files/');
208
-			}
209
-
210
-			return true;
211
-		} catch (PreConditionNotMetException $e) {
212
-			return false;
213
-		}
214
-	}
215
-
216
-	/**
217
-	 * add recovery key to all encrypted files
218
-	 * @param string $path
219
-	 */
220
-	private function addRecoveryKeys($path) {
221
-		$dirContent = $this->view->getDirectoryContent($path);
222
-		foreach ($dirContent as $item) {
223
-			$filePath = $item->getPath();
224
-			if ($item['type'] === 'dir') {
225
-				$this->addRecoveryKeys($filePath . '/');
226
-			} else {
227
-				$fileKey = $this->keyManager->getFileKey($filePath, $this->user->getUID());
228
-				if (!empty($fileKey)) {
229
-					$accessList = $this->file->getAccessList($filePath);
230
-					$publicKeys = array();
231
-					foreach ($accessList['users'] as $uid) {
232
-						$publicKeys[$uid] = $this->keyManager->getPublicKey($uid);
233
-					}
234
-
235
-					$publicKeys = $this->keyManager->addSystemKeys($accessList, $publicKeys, $this->user->getUID());
236
-
237
-					$encryptedKeyfiles = $this->crypt->multiKeyEncrypt($fileKey, $publicKeys);
238
-					$this->keyManager->setAllFileKeys($filePath, $encryptedKeyfiles);
239
-				}
240
-			}
241
-		}
242
-	}
243
-
244
-	/**
245
-	 * remove recovery key to all encrypted files
246
-	 * @param string $path
247
-	 */
248
-	private function removeRecoveryKeys($path) {
249
-		$dirContent = $this->view->getDirectoryContent($path);
250
-		foreach ($dirContent as $item) {
251
-			$filePath = $item->getPath();
252
-			if ($item['type'] === 'dir') {
253
-				$this->removeRecoveryKeys($filePath . '/');
254
-			} else {
255
-				$this->keyManager->deleteShareKey($filePath, $this->keyManager->getRecoveryKeyId());
256
-			}
257
-		}
258
-	}
259
-
260
-	/**
261
-	 * recover users files with the recovery key
262
-	 *
263
-	 * @param string $recoveryPassword
264
-	 * @param string $user
265
-	 */
266
-	public function recoverUsersFiles($recoveryPassword, $user) {
267
-		$encryptedKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
268
-
269
-		$privateKey = $this->crypt->decryptPrivateKey($encryptedKey, $recoveryPassword);
270
-		if($privateKey !== false) {
271
-			$this->recoverAllFiles('/' . $user . '/files/', $privateKey, $user);
272
-		}
273
-	}
274
-
275
-	/**
276
-	 * recover users files
277
-	 *
278
-	 * @param string $path
279
-	 * @param string $privateKey
280
-	 * @param string $uid
281
-	 */
282
-	private function recoverAllFiles($path, $privateKey, $uid) {
283
-		$dirContent = $this->view->getDirectoryContent($path);
284
-
285
-		foreach ($dirContent as $item) {
286
-			// Get relative path from encryption/keyfiles
287
-			$filePath = $item->getPath();
288
-			if ($this->view->is_dir($filePath)) {
289
-				$this->recoverAllFiles($filePath . '/', $privateKey, $uid);
290
-			} else {
291
-				$this->recoverFile($filePath, $privateKey, $uid);
292
-			}
293
-		}
294
-
295
-	}
296
-
297
-	/**
298
-	 * recover file
299
-	 *
300
-	 * @param string $path
301
-	 * @param string $privateKey
302
-	 * @param string $uid
303
-	 */
304
-	private function recoverFile($path, $privateKey, $uid) {
305
-		$encryptedFileKey = $this->keyManager->getEncryptedFileKey($path);
306
-		$shareKey = $this->keyManager->getShareKey($path, $this->keyManager->getRecoveryKeyId());
307
-
308
-		if ($encryptedFileKey && $shareKey && $privateKey) {
309
-			$fileKey = $this->crypt->multiKeyDecrypt($encryptedFileKey,
310
-				$shareKey,
311
-				$privateKey);
312
-		}
313
-
314
-		if (!empty($fileKey)) {
315
-			$accessList = $this->file->getAccessList($path);
316
-			$publicKeys = array();
317
-			foreach ($accessList['users'] as $user) {
318
-				$publicKeys[$user] = $this->keyManager->getPublicKey($user);
319
-			}
320
-
321
-			$publicKeys = $this->keyManager->addSystemKeys($accessList, $publicKeys, $uid);
322
-
323
-			$encryptedKeyfiles = $this->crypt->multiKeyEncrypt($fileKey, $publicKeys);
324
-			$this->keyManager->setAllFileKeys($path, $encryptedKeyfiles);
325
-		}
326
-
327
-	}
41
+    /**
42
+     * @var null|IUser
43
+     */
44
+    protected $user;
45
+    /**
46
+     * @var Crypt
47
+     */
48
+    protected $crypt;
49
+    /**
50
+     * @var ISecureRandom
51
+     */
52
+    private $random;
53
+    /**
54
+     * @var KeyManager
55
+     */
56
+    private $keyManager;
57
+    /**
58
+     * @var IConfig
59
+     */
60
+    private $config;
61
+    /**
62
+     * @var IStorage
63
+     */
64
+    private $keyStorage;
65
+    /**
66
+     * @var View
67
+     */
68
+    private $view;
69
+    /**
70
+     * @var IFile
71
+     */
72
+    private $file;
73
+
74
+    /**
75
+     * @param IUserSession $user
76
+     * @param Crypt $crypt
77
+     * @param ISecureRandom $random
78
+     * @param KeyManager $keyManager
79
+     * @param IConfig $config
80
+     * @param IStorage $keyStorage
81
+     * @param IFile $file
82
+     * @param View $view
83
+     */
84
+    public function __construct(IUserSession $user,
85
+                                Crypt $crypt,
86
+                                ISecureRandom $random,
87
+                                KeyManager $keyManager,
88
+                                IConfig $config,
89
+                                IStorage $keyStorage,
90
+                                IFile $file,
91
+                                View $view) {
92
+        $this->user = ($user && $user->isLoggedIn()) ? $user->getUser() : false;
93
+        $this->crypt = $crypt;
94
+        $this->random = $random;
95
+        $this->keyManager = $keyManager;
96
+        $this->config = $config;
97
+        $this->keyStorage = $keyStorage;
98
+        $this->view = $view;
99
+        $this->file = $file;
100
+    }
101
+
102
+    /**
103
+     * @param string $password
104
+     * @return bool
105
+     */
106
+    public function enableAdminRecovery($password) {
107
+        $appConfig = $this->config;
108
+        $keyManager = $this->keyManager;
109
+
110
+        if (!$keyManager->recoveryKeyExists()) {
111
+            $keyPair = $this->crypt->createKeyPair();
112
+            if(!is_array($keyPair)) {
113
+                return false;
114
+            }
115
+
116
+            $this->keyManager->setRecoveryKey($password, $keyPair);
117
+        }
118
+
119
+        if ($keyManager->checkRecoveryPassword($password)) {
120
+            $appConfig->setAppValue('encryption', 'recoveryAdminEnabled', 1);
121
+            return true;
122
+        }
123
+
124
+        return false;
125
+    }
126
+
127
+    /**
128
+     * change recovery key id
129
+     *
130
+     * @param string $newPassword
131
+     * @param string $oldPassword
132
+     * @return bool
133
+     */
134
+    public function changeRecoveryKeyPassword($newPassword, $oldPassword) {
135
+        $recoveryKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
136
+        $decryptedRecoveryKey = $this->crypt->decryptPrivateKey($recoveryKey, $oldPassword);
137
+        if($decryptedRecoveryKey === false) {
138
+            return false;
139
+        }
140
+        $encryptedRecoveryKey = $this->crypt->encryptPrivateKey($decryptedRecoveryKey, $newPassword);
141
+        $header = $this->crypt->generateHeader();
142
+        if ($encryptedRecoveryKey) {
143
+            $this->keyManager->setSystemPrivateKey($this->keyManager->getRecoveryKeyId(), $header . $encryptedRecoveryKey);
144
+            return true;
145
+        }
146
+        return false;
147
+    }
148
+
149
+    /**
150
+     * @param string $recoveryPassword
151
+     * @return bool
152
+     */
153
+    public function disableAdminRecovery($recoveryPassword) {
154
+        $keyManager = $this->keyManager;
155
+
156
+        if ($keyManager->checkRecoveryPassword($recoveryPassword)) {
157
+            // Set recoveryAdmin as disabled
158
+            $this->config->setAppValue('encryption', 'recoveryAdminEnabled', 0);
159
+            return true;
160
+        }
161
+        return false;
162
+    }
163
+
164
+    /**
165
+     * check if recovery is enabled for user
166
+     *
167
+     * @param string $user if no user is given we check the current logged-in user
168
+     *
169
+     * @return bool
170
+     */
171
+    public function isRecoveryEnabledForUser($user = '') {
172
+        $uid = empty($user) ? $this->user->getUID() : $user;
173
+        $recoveryMode = $this->config->getUserValue($uid,
174
+            'encryption',
175
+            'recoveryEnabled',
176
+            0);
177
+
178
+        return ($recoveryMode === '1');
179
+    }
180
+
181
+    /**
182
+     * check if recovery is key is enabled by the administrator
183
+     *
184
+     * @return bool
185
+     */
186
+    public function isRecoveryKeyEnabled() {
187
+        $enabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', 0);
188
+
189
+        return ($enabled === '1');
190
+    }
191
+
192
+    /**
193
+     * @param string $value
194
+     * @return bool
195
+     */
196
+    public function setRecoveryForUser($value) {
197
+
198
+        try {
199
+            $this->config->setUserValue($this->user->getUID(),
200
+                'encryption',
201
+                'recoveryEnabled',
202
+                $value);
203
+
204
+            if ($value === '1') {
205
+                $this->addRecoveryKeys('/' . $this->user->getUID() . '/files/');
206
+            } else {
207
+                $this->removeRecoveryKeys('/' . $this->user->getUID() . '/files/');
208
+            }
209
+
210
+            return true;
211
+        } catch (PreConditionNotMetException $e) {
212
+            return false;
213
+        }
214
+    }
215
+
216
+    /**
217
+     * add recovery key to all encrypted files
218
+     * @param string $path
219
+     */
220
+    private function addRecoveryKeys($path) {
221
+        $dirContent = $this->view->getDirectoryContent($path);
222
+        foreach ($dirContent as $item) {
223
+            $filePath = $item->getPath();
224
+            if ($item['type'] === 'dir') {
225
+                $this->addRecoveryKeys($filePath . '/');
226
+            } else {
227
+                $fileKey = $this->keyManager->getFileKey($filePath, $this->user->getUID());
228
+                if (!empty($fileKey)) {
229
+                    $accessList = $this->file->getAccessList($filePath);
230
+                    $publicKeys = array();
231
+                    foreach ($accessList['users'] as $uid) {
232
+                        $publicKeys[$uid] = $this->keyManager->getPublicKey($uid);
233
+                    }
234
+
235
+                    $publicKeys = $this->keyManager->addSystemKeys($accessList, $publicKeys, $this->user->getUID());
236
+
237
+                    $encryptedKeyfiles = $this->crypt->multiKeyEncrypt($fileKey, $publicKeys);
238
+                    $this->keyManager->setAllFileKeys($filePath, $encryptedKeyfiles);
239
+                }
240
+            }
241
+        }
242
+    }
243
+
244
+    /**
245
+     * remove recovery key to all encrypted files
246
+     * @param string $path
247
+     */
248
+    private function removeRecoveryKeys($path) {
249
+        $dirContent = $this->view->getDirectoryContent($path);
250
+        foreach ($dirContent as $item) {
251
+            $filePath = $item->getPath();
252
+            if ($item['type'] === 'dir') {
253
+                $this->removeRecoveryKeys($filePath . '/');
254
+            } else {
255
+                $this->keyManager->deleteShareKey($filePath, $this->keyManager->getRecoveryKeyId());
256
+            }
257
+        }
258
+    }
259
+
260
+    /**
261
+     * recover users files with the recovery key
262
+     *
263
+     * @param string $recoveryPassword
264
+     * @param string $user
265
+     */
266
+    public function recoverUsersFiles($recoveryPassword, $user) {
267
+        $encryptedKey = $this->keyManager->getSystemPrivateKey($this->keyManager->getRecoveryKeyId());
268
+
269
+        $privateKey = $this->crypt->decryptPrivateKey($encryptedKey, $recoveryPassword);
270
+        if($privateKey !== false) {
271
+            $this->recoverAllFiles('/' . $user . '/files/', $privateKey, $user);
272
+        }
273
+    }
274
+
275
+    /**
276
+     * recover users files
277
+     *
278
+     * @param string $path
279
+     * @param string $privateKey
280
+     * @param string $uid
281
+     */
282
+    private function recoverAllFiles($path, $privateKey, $uid) {
283
+        $dirContent = $this->view->getDirectoryContent($path);
284
+
285
+        foreach ($dirContent as $item) {
286
+            // Get relative path from encryption/keyfiles
287
+            $filePath = $item->getPath();
288
+            if ($this->view->is_dir($filePath)) {
289
+                $this->recoverAllFiles($filePath . '/', $privateKey, $uid);
290
+            } else {
291
+                $this->recoverFile($filePath, $privateKey, $uid);
292
+            }
293
+        }
294
+
295
+    }
296
+
297
+    /**
298
+     * recover file
299
+     *
300
+     * @param string $path
301
+     * @param string $privateKey
302
+     * @param string $uid
303
+     */
304
+    private function recoverFile($path, $privateKey, $uid) {
305
+        $encryptedFileKey = $this->keyManager->getEncryptedFileKey($path);
306
+        $shareKey = $this->keyManager->getShareKey($path, $this->keyManager->getRecoveryKeyId());
307
+
308
+        if ($encryptedFileKey && $shareKey && $privateKey) {
309
+            $fileKey = $this->crypt->multiKeyDecrypt($encryptedFileKey,
310
+                $shareKey,
311
+                $privateKey);
312
+        }
313
+
314
+        if (!empty($fileKey)) {
315
+            $accessList = $this->file->getAccessList($path);
316
+            $publicKeys = array();
317
+            foreach ($accessList['users'] as $user) {
318
+                $publicKeys[$user] = $this->keyManager->getPublicKey($user);
319
+            }
320
+
321
+            $publicKeys = $this->keyManager->addSystemKeys($accessList, $publicKeys, $uid);
322
+
323
+            $encryptedKeyfiles = $this->crypt->multiKeyEncrypt($fileKey, $publicKeys);
324
+            $this->keyManager->setAllFileKeys($path, $encryptedKeyfiles);
325
+        }
326
+
327
+    }
328 328
 
329 329
 
330 330
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Command/MigrateKeys.php 1 patch
Indentation   +76 added lines, -76 removed lines patch added patch discarded remove patch
@@ -36,91 +36,91 @@
 block discarded – undo
36 36
 
37 37
 class MigrateKeys extends Command {
38 38
 
39
-	/** @var IUserManager */
40
-	private $userManager;
41
-	/** @var View */
42
-	private $view;
43
-	/** @var IDBConnection */
44
-	private $connection;
45
-	/** @var IConfig */
46
-	private $config;
47
-	/** @var  ILogger */
48
-	private $logger;
39
+    /** @var IUserManager */
40
+    private $userManager;
41
+    /** @var View */
42
+    private $view;
43
+    /** @var IDBConnection */
44
+    private $connection;
45
+    /** @var IConfig */
46
+    private $config;
47
+    /** @var  ILogger */
48
+    private $logger;
49 49
 
50
-	/**
51
-	 * @param IUserManager $userManager
52
-	 * @param View $view
53
-	 * @param IDBConnection $connection
54
-	 * @param IConfig $config
55
-	 * @param ILogger $logger
56
-	 */
57
-	public function __construct(IUserManager $userManager,
58
-								View $view,
59
-								IDBConnection $connection,
60
-								IConfig $config,
61
-								ILogger $logger) {
50
+    /**
51
+     * @param IUserManager $userManager
52
+     * @param View $view
53
+     * @param IDBConnection $connection
54
+     * @param IConfig $config
55
+     * @param ILogger $logger
56
+     */
57
+    public function __construct(IUserManager $userManager,
58
+                                View $view,
59
+                                IDBConnection $connection,
60
+                                IConfig $config,
61
+                                ILogger $logger) {
62 62
 
63
-		$this->userManager = $userManager;
64
-		$this->view = $view;
65
-		$this->connection = $connection;
66
-		$this->config = $config;
67
-		$this->logger = $logger;
68
-		parent::__construct();
69
-	}
63
+        $this->userManager = $userManager;
64
+        $this->view = $view;
65
+        $this->connection = $connection;
66
+        $this->config = $config;
67
+        $this->logger = $logger;
68
+        parent::__construct();
69
+    }
70 70
 
71
-	protected function configure() {
72
-		$this
73
-			->setName('encryption:migrate')
74
-			->setDescription('initial migration to encryption 2.0')
75
-			->addArgument(
76
-				'user_id',
77
-				InputArgument::OPTIONAL | InputArgument::IS_ARRAY,
78
-				'will migrate keys of the given user(s)'
79
-			);
80
-	}
71
+    protected function configure() {
72
+        $this
73
+            ->setName('encryption:migrate')
74
+            ->setDescription('initial migration to encryption 2.0')
75
+            ->addArgument(
76
+                'user_id',
77
+                InputArgument::OPTIONAL | InputArgument::IS_ARRAY,
78
+                'will migrate keys of the given user(s)'
79
+            );
80
+    }
81 81
 
82
-	protected function execute(InputInterface $input, OutputInterface $output) {
82
+    protected function execute(InputInterface $input, OutputInterface $output) {
83 83
 
84
-		// perform system reorganization
85
-		$migration = new Migration($this->config, $this->view, $this->connection, $this->logger);
84
+        // perform system reorganization
85
+        $migration = new Migration($this->config, $this->view, $this->connection, $this->logger);
86 86
 
87
-		$users = $input->getArgument('user_id');
88
-		if (!empty($users)) {
89
-			foreach ($users as $user) {
90
-				if ($this->userManager->userExists($user)) {
91
-					$output->writeln("Migrating keys   <info>$user</info>");
92
-					$migration->reorganizeFolderStructureForUser($user);
93
-				} else {
94
-					$output->writeln("<error>Unknown user $user</error>");
95
-				}
96
-			}
97
-		} else {
98
-			$output->writeln("Reorganize system folder structure");
99
-			$migration->reorganizeSystemFolderStructure();
100
-			$migration->updateDB();
101
-			foreach($this->userManager->getBackends() as $backend) {
102
-				$name = get_class($backend);
87
+        $users = $input->getArgument('user_id');
88
+        if (!empty($users)) {
89
+            foreach ($users as $user) {
90
+                if ($this->userManager->userExists($user)) {
91
+                    $output->writeln("Migrating keys   <info>$user</info>");
92
+                    $migration->reorganizeFolderStructureForUser($user);
93
+                } else {
94
+                    $output->writeln("<error>Unknown user $user</error>");
95
+                }
96
+            }
97
+        } else {
98
+            $output->writeln("Reorganize system folder structure");
99
+            $migration->reorganizeSystemFolderStructure();
100
+            $migration->updateDB();
101
+            foreach($this->userManager->getBackends() as $backend) {
102
+                $name = get_class($backend);
103 103
 
104
-				if ($backend instanceof IUserBackend) {
105
-					$name = $backend->getBackendName();
106
-				}
104
+                if ($backend instanceof IUserBackend) {
105
+                    $name = $backend->getBackendName();
106
+                }
107 107
 
108
-				$output->writeln("Migrating keys for users on backend <info>$name</info>");
108
+                $output->writeln("Migrating keys for users on backend <info>$name</info>");
109 109
 
110
-				$limit = 500;
111
-				$offset = 0;
112
-				do {
113
-					$users = $backend->getUsers('', $limit, $offset);
114
-					foreach ($users as $user) {
115
-						$output->writeln("   <info>$user</info>");
116
-						$migration->reorganizeFolderStructureForUser($user);
117
-					}
118
-					$offset += $limit;
119
-				} while(count($users) >= $limit);
120
-			}
121
-		}
110
+                $limit = 500;
111
+                $offset = 0;
112
+                do {
113
+                    $users = $backend->getUsers('', $limit, $offset);
114
+                    foreach ($users as $user) {
115
+                        $output->writeln("   <info>$user</info>");
116
+                        $migration->reorganizeFolderStructureForUser($user);
117
+                    }
118
+                    $offset += $limit;
119
+                } while(count($users) >= $limit);
120
+            }
121
+        }
122 122
 
123
-		$migration->finalCleanUp();
123
+        $migration->finalCleanUp();
124 124
 
125
-	}
125
+    }
126 126
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Command/EnableMasterKey.php 1 patch
Indentation   +49 added lines, -49 removed lines patch added patch discarded remove patch
@@ -34,54 +34,54 @@
 block discarded – undo
34 34
 
35 35
 class EnableMasterKey extends Command {
36 36
 
37
-	/** @var Util */
38
-	protected $util;
39
-
40
-	/** @var IConfig */
41
-	protected $config;
42
-
43
-	/** @var  QuestionHelper */
44
-	protected $questionHelper;
45
-
46
-	/**
47
-	 * @param Util $util
48
-	 * @param IConfig $config
49
-	 * @param QuestionHelper $questionHelper
50
-	 */
51
-	public function __construct(Util $util,
52
-								IConfig $config,
53
-								QuestionHelper $questionHelper) {
54
-
55
-		$this->util = $util;
56
-		$this->config = $config;
57
-		$this->questionHelper = $questionHelper;
58
-		parent::__construct();
59
-	}
60
-
61
-	protected function configure() {
62
-		$this
63
-			->setName('encryption:enable-master-key')
64
-			->setDescription('Enable the master key. Only available for fresh installations with no existing encrypted data! There is also no way to disable it again.');
65
-	}
66
-
67
-	protected function execute(InputInterface $input, OutputInterface $output) {
68
-
69
-		$isAlreadyEnabled = $this->util->isMasterKeyEnabled();
70
-
71
-		if($isAlreadyEnabled) {
72
-			$output->writeln('Master key already enabled');
73
-		} else {
74
-			$question = new ConfirmationQuestion(
75
-				'Warning: Only available for fresh installations with no existing encrypted data! '
76
-			. 'There is also no way to disable it again. Do you want to continue? (y/n) ', false);
77
-			if ($this->questionHelper->ask($input, $output, $question)) {
78
-				$this->config->setAppValue('encryption', 'useMasterKey', '1');
79
-				$output->writeln('Master key successfully enabled.');
80
-			} else {
81
-				$output->writeln('aborted.');
82
-			}
83
-		}
84
-
85
-	}
37
+    /** @var Util */
38
+    protected $util;
39
+
40
+    /** @var IConfig */
41
+    protected $config;
42
+
43
+    /** @var  QuestionHelper */
44
+    protected $questionHelper;
45
+
46
+    /**
47
+     * @param Util $util
48
+     * @param IConfig $config
49
+     * @param QuestionHelper $questionHelper
50
+     */
51
+    public function __construct(Util $util,
52
+                                IConfig $config,
53
+                                QuestionHelper $questionHelper) {
54
+
55
+        $this->util = $util;
56
+        $this->config = $config;
57
+        $this->questionHelper = $questionHelper;
58
+        parent::__construct();
59
+    }
60
+
61
+    protected function configure() {
62
+        $this
63
+            ->setName('encryption:enable-master-key')
64
+            ->setDescription('Enable the master key. Only available for fresh installations with no existing encrypted data! There is also no way to disable it again.');
65
+    }
66
+
67
+    protected function execute(InputInterface $input, OutputInterface $output) {
68
+
69
+        $isAlreadyEnabled = $this->util->isMasterKeyEnabled();
70
+
71
+        if($isAlreadyEnabled) {
72
+            $output->writeln('Master key already enabled');
73
+        } else {
74
+            $question = new ConfirmationQuestion(
75
+                'Warning: Only available for fresh installations with no existing encrypted data! '
76
+            . 'There is also no way to disable it again. Do you want to continue? (y/n) ', false);
77
+            if ($this->questionHelper->ask($input, $output, $question)) {
78
+                $this->config->setAppValue('encryption', 'useMasterKey', '1');
79
+                $output->writeln('Master key successfully enabled.');
80
+            } else {
81
+                $output->writeln('aborted.');
82
+            }
83
+        }
84
+
85
+    }
86 86
 
87 87
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Hooks/Contracts/IHook.php 1 patch
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -24,10 +24,10 @@
 block discarded – undo
24 24
 
25 25
 
26 26
 interface IHook {
27
-	/**
28
-	 * Connects Hooks
29
-	 *
30
-	 * @return null
31
-	 */
32
-	public function addHooks();
27
+    /**
28
+     * Connects Hooks
29
+     *
30
+     * @return null
31
+     */
32
+    public function addHooks();
33 33
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Settings/Admin.php 1 patch
Indentation   +85 added lines, -85 removed lines patch added patch discarded remove patch
@@ -38,90 +38,90 @@
 block discarded – undo
38 38
 
39 39
 class Admin implements ISettings {
40 40
 
41
-	/** @var IL10N */
42
-	private $l;
43
-
44
-	/** @var ILogger */
45
-	private $logger;
46
-
47
-	/** @var IUserSession */
48
-	private $userSession;
49
-
50
-	/** @var IConfig */
51
-	private $config;
52
-
53
-	/** @var IUserManager */
54
-	private $userManager;
55
-
56
-	/** @var ISession */
57
-	private $session;
58
-
59
-	public function __construct(
60
-		IL10N $l,
61
-		ILogger $logger,
62
-		IUserSession $userSession,
63
-		IConfig $config,
64
-		IUserManager $userManager,
65
-		ISession $session
66
-	) {
67
-		$this->l = $l;
68
-		$this->logger = $logger;
69
-		$this->userSession = $userSession;
70
-		$this->config = $config;
71
-		$this->userManager = $userManager;
72
-		$this->session = $session;
73
-	}
74
-
75
-	/**
76
-	 * @return TemplateResponse
77
-	 */
78
-	public function getForm() {
79
-		$crypt = new Crypt(
80
-			$this->logger,
81
-			$this->userSession,
82
-			$this->config,
83
-			$this->l);
84
-
85
-		$util = new Util(
86
-			new View(),
87
-			$crypt,
88
-			$this->logger,
89
-			$this->userSession,
90
-			$this->config,
91
-			$this->userManager);
92
-
93
-		// Check if an adminRecovery account is enabled for recovering files after lost pwd
94
-		$recoveryAdminEnabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', '0');
95
-		$session = new Session($this->session);
96
-
97
-		$encryptHomeStorage = $util->shouldEncryptHomeStorage();
98
-
99
-		$parameters = [
100
-			'recoveryEnabled'    => $recoveryAdminEnabled,
101
-			'initStatus'         => $session->getStatus(),
102
-			'encryptHomeStorage' => $encryptHomeStorage,
103
-			'masterKeyEnabled'   => $util->isMasterKeyEnabled(),
104
-		];
105
-
106
-		return new TemplateResponse('encryption', 'settings-admin', $parameters, '');
107
-	}
108
-
109
-	/**
110
-	 * @return string the section ID, e.g. 'sharing'
111
-	 */
112
-	public function getSection() {
113
-		return 'encryption';
114
-	}
115
-
116
-	/**
117
-	 * @return int whether the form should be rather on the top or bottom of
118
-	 * the admin section. The forms are arranged in ascending order of the
119
-	 * priority values. It is required to return a value between 0 and 100.
120
-	 *
121
-	 * E.g.: 70
122
-	 */
123
-	public function getPriority() {
124
-		return 5;
125
-	}
41
+    /** @var IL10N */
42
+    private $l;
43
+
44
+    /** @var ILogger */
45
+    private $logger;
46
+
47
+    /** @var IUserSession */
48
+    private $userSession;
49
+
50
+    /** @var IConfig */
51
+    private $config;
52
+
53
+    /** @var IUserManager */
54
+    private $userManager;
55
+
56
+    /** @var ISession */
57
+    private $session;
58
+
59
+    public function __construct(
60
+        IL10N $l,
61
+        ILogger $logger,
62
+        IUserSession $userSession,
63
+        IConfig $config,
64
+        IUserManager $userManager,
65
+        ISession $session
66
+    ) {
67
+        $this->l = $l;
68
+        $this->logger = $logger;
69
+        $this->userSession = $userSession;
70
+        $this->config = $config;
71
+        $this->userManager = $userManager;
72
+        $this->session = $session;
73
+    }
74
+
75
+    /**
76
+     * @return TemplateResponse
77
+     */
78
+    public function getForm() {
79
+        $crypt = new Crypt(
80
+            $this->logger,
81
+            $this->userSession,
82
+            $this->config,
83
+            $this->l);
84
+
85
+        $util = new Util(
86
+            new View(),
87
+            $crypt,
88
+            $this->logger,
89
+            $this->userSession,
90
+            $this->config,
91
+            $this->userManager);
92
+
93
+        // Check if an adminRecovery account is enabled for recovering files after lost pwd
94
+        $recoveryAdminEnabled = $this->config->getAppValue('encryption', 'recoveryAdminEnabled', '0');
95
+        $session = new Session($this->session);
96
+
97
+        $encryptHomeStorage = $util->shouldEncryptHomeStorage();
98
+
99
+        $parameters = [
100
+            'recoveryEnabled'    => $recoveryAdminEnabled,
101
+            'initStatus'         => $session->getStatus(),
102
+            'encryptHomeStorage' => $encryptHomeStorage,
103
+            'masterKeyEnabled'   => $util->isMasterKeyEnabled(),
104
+        ];
105
+
106
+        return new TemplateResponse('encryption', 'settings-admin', $parameters, '');
107
+    }
108
+
109
+    /**
110
+     * @return string the section ID, e.g. 'sharing'
111
+     */
112
+    public function getSection() {
113
+        return 'encryption';
114
+    }
115
+
116
+    /**
117
+     * @return int whether the form should be rather on the top or bottom of
118
+     * the admin section. The forms are arranged in ascending order of the
119
+     * priority values. It is required to return a value between 0 and 100.
120
+     *
121
+     * E.g.: 70
122
+     */
123
+    public function getPriority() {
124
+        return 5;
125
+    }
126 126
 
127 127
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Session.php 1 patch
Indentation   +154 added lines, -154 removed lines patch added patch discarded remove patch
@@ -29,159 +29,159 @@
 block discarded – undo
29 29
 
30 30
 class Session {
31 31
 
32
-	/** @var ISession */
33
-	protected $session;
34
-
35
-	const NOT_INITIALIZED = '0';
36
-	const INIT_EXECUTED = '1';
37
-	const INIT_SUCCESSFUL = '2';
38
-	const RUN_MIGRATION = '3';
39
-
40
-	/**
41
-	 * @param ISession $session
42
-	 */
43
-	public function __construct(ISession $session) {
44
-		$this->session = $session;
45
-	}
46
-
47
-	/**
48
-	 * Sets status of encryption app
49
-	 *
50
-	 * @param string $status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
51
-	 */
52
-	public function setStatus($status) {
53
-		$this->session->set('encryptionInitialized', $status);
54
-	}
55
-
56
-	/**
57
-	 * Gets status if we already tried to initialize the encryption app
58
-	 *
59
-	 * @return string init status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
60
-	 */
61
-	public function getStatus() {
62
-		$status = $this->session->get('encryptionInitialized');
63
-		if (is_null($status)) {
64
-			$status = self::NOT_INITIALIZED;
65
-		}
66
-
67
-		return $status;
68
-	}
69
-
70
-	/**
71
-	 * check if encryption was initialized successfully
72
-	 *
73
-	 * @return bool
74
-	 */
75
-	public function isReady() {
76
-		$status = $this->getStatus();
77
-		return $status === self::INIT_SUCCESSFUL;
78
-	}
79
-
80
-	/**
81
-	 * Gets user or public share private key from session
82
-	 *
83
-	 * @return string $privateKey The user's plaintext private key
84
-	 * @throws Exceptions\PrivateKeyMissingException
85
-	 */
86
-	public function getPrivateKey() {
87
-		$key = $this->session->get('privateKey');
88
-		if (is_null($key)) {
89
-			throw new Exceptions\PrivateKeyMissingException('please try to log-out and log-in again', 0);
90
-		}
91
-		return $key;
92
-	}
93
-
94
-	/**
95
-	 * check if private key is set
96
-	 *
97
-	 * @return boolean
98
-	 */
99
-	public function isPrivateKeySet() {
100
-		$key = $this->session->get('privateKey');
101
-		if (is_null($key)) {
102
-			return false;
103
-		}
104
-
105
-		return true;
106
-	}
107
-
108
-	/**
109
-	 * Sets user private key to session
110
-	 *
111
-	 * @param string $key users private key
112
-	 *
113
-	 * @note this should only be set on login
114
-	 */
115
-	public function setPrivateKey($key) {
116
-		$this->session->set('privateKey', $key);
117
-	}
118
-
119
-	/**
120
-	 * store data needed for the decrypt all operation in the session
121
-	 *
122
-	 * @param string $user
123
-	 * @param string $key
124
-	 */
125
-	public function prepareDecryptAll($user, $key) {
126
-		$this->session->set('decryptAll', true);
127
-		$this->session->set('decryptAllKey', $key);
128
-		$this->session->set('decryptAllUid', $user);
129
-	}
130
-
131
-	/**
132
-	 * check if we are in decrypt all mode
133
-	 *
134
-	 * @return bool
135
-	 */
136
-	public function decryptAllModeActivated() {
137
-		$decryptAll = $this->session->get('decryptAll');
138
-		return ($decryptAll === true);
139
-	}
140
-
141
-	/**
142
-	 * get uid used for decrypt all operation
143
-	 *
144
-	 * @return string
145
-	 * @throws \Exception
146
-	 */
147
-	public function getDecryptAllUid() {
148
-		$uid = $this->session->get('decryptAllUid');
149
-		if (is_null($uid) && $this->decryptAllModeActivated()) {
150
-			throw new \Exception('No uid found while in decrypt all mode');
151
-		} elseif (is_null($uid)) {
152
-			throw new \Exception('Please activate decrypt all mode first');
153
-		}
154
-
155
-		return $uid;
156
-	}
157
-
158
-	/**
159
-	 * get private key for decrypt all operation
160
-	 *
161
-	 * @return string
162
-	 * @throws PrivateKeyMissingException
163
-	 */
164
-	public function getDecryptAllKey() {
165
-		$privateKey = $this->session->get('decryptAllKey');
166
-		if (is_null($privateKey) && $this->decryptAllModeActivated()) {
167
-			throw new PrivateKeyMissingException('No private key found while in decrypt all mode');
168
-		} elseif (is_null($privateKey)) {
169
-			throw new PrivateKeyMissingException('Please activate decrypt all mode first');
170
-		}
171
-
172
-		return $privateKey;
173
-	}
174
-
175
-	/**
176
-	 * remove keys from session
177
-	 */
178
-	public function clear() {
179
-		$this->session->remove('publicSharePrivateKey');
180
-		$this->session->remove('privateKey');
181
-		$this->session->remove('encryptionInitialized');
182
-		$this->session->remove('decryptAll');
183
-		$this->session->remove('decryptAllKey');
184
-		$this->session->remove('decryptAllUid');
185
-	}
32
+    /** @var ISession */
33
+    protected $session;
34
+
35
+    const NOT_INITIALIZED = '0';
36
+    const INIT_EXECUTED = '1';
37
+    const INIT_SUCCESSFUL = '2';
38
+    const RUN_MIGRATION = '3';
39
+
40
+    /**
41
+     * @param ISession $session
42
+     */
43
+    public function __construct(ISession $session) {
44
+        $this->session = $session;
45
+    }
46
+
47
+    /**
48
+     * Sets status of encryption app
49
+     *
50
+     * @param string $status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
51
+     */
52
+    public function setStatus($status) {
53
+        $this->session->set('encryptionInitialized', $status);
54
+    }
55
+
56
+    /**
57
+     * Gets status if we already tried to initialize the encryption app
58
+     *
59
+     * @return string init status INIT_SUCCESSFUL, INIT_EXECUTED, NOT_INITIALIZED
60
+     */
61
+    public function getStatus() {
62
+        $status = $this->session->get('encryptionInitialized');
63
+        if (is_null($status)) {
64
+            $status = self::NOT_INITIALIZED;
65
+        }
66
+
67
+        return $status;
68
+    }
69
+
70
+    /**
71
+     * check if encryption was initialized successfully
72
+     *
73
+     * @return bool
74
+     */
75
+    public function isReady() {
76
+        $status = $this->getStatus();
77
+        return $status === self::INIT_SUCCESSFUL;
78
+    }
79
+
80
+    /**
81
+     * Gets user or public share private key from session
82
+     *
83
+     * @return string $privateKey The user's plaintext private key
84
+     * @throws Exceptions\PrivateKeyMissingException
85
+     */
86
+    public function getPrivateKey() {
87
+        $key = $this->session->get('privateKey');
88
+        if (is_null($key)) {
89
+            throw new Exceptions\PrivateKeyMissingException('please try to log-out and log-in again', 0);
90
+        }
91
+        return $key;
92
+    }
93
+
94
+    /**
95
+     * check if private key is set
96
+     *
97
+     * @return boolean
98
+     */
99
+    public function isPrivateKeySet() {
100
+        $key = $this->session->get('privateKey');
101
+        if (is_null($key)) {
102
+            return false;
103
+        }
104
+
105
+        return true;
106
+    }
107
+
108
+    /**
109
+     * Sets user private key to session
110
+     *
111
+     * @param string $key users private key
112
+     *
113
+     * @note this should only be set on login
114
+     */
115
+    public function setPrivateKey($key) {
116
+        $this->session->set('privateKey', $key);
117
+    }
118
+
119
+    /**
120
+     * store data needed for the decrypt all operation in the session
121
+     *
122
+     * @param string $user
123
+     * @param string $key
124
+     */
125
+    public function prepareDecryptAll($user, $key) {
126
+        $this->session->set('decryptAll', true);
127
+        $this->session->set('decryptAllKey', $key);
128
+        $this->session->set('decryptAllUid', $user);
129
+    }
130
+
131
+    /**
132
+     * check if we are in decrypt all mode
133
+     *
134
+     * @return bool
135
+     */
136
+    public function decryptAllModeActivated() {
137
+        $decryptAll = $this->session->get('decryptAll');
138
+        return ($decryptAll === true);
139
+    }
140
+
141
+    /**
142
+     * get uid used for decrypt all operation
143
+     *
144
+     * @return string
145
+     * @throws \Exception
146
+     */
147
+    public function getDecryptAllUid() {
148
+        $uid = $this->session->get('decryptAllUid');
149
+        if (is_null($uid) && $this->decryptAllModeActivated()) {
150
+            throw new \Exception('No uid found while in decrypt all mode');
151
+        } elseif (is_null($uid)) {
152
+            throw new \Exception('Please activate decrypt all mode first');
153
+        }
154
+
155
+        return $uid;
156
+    }
157
+
158
+    /**
159
+     * get private key for decrypt all operation
160
+     *
161
+     * @return string
162
+     * @throws PrivateKeyMissingException
163
+     */
164
+    public function getDecryptAllKey() {
165
+        $privateKey = $this->session->get('decryptAllKey');
166
+        if (is_null($privateKey) && $this->decryptAllModeActivated()) {
167
+            throw new PrivateKeyMissingException('No private key found while in decrypt all mode');
168
+        } elseif (is_null($privateKey)) {
169
+            throw new PrivateKeyMissingException('Please activate decrypt all mode first');
170
+        }
171
+
172
+        return $privateKey;
173
+    }
174
+
175
+    /**
176
+     * remove keys from session
177
+     */
178
+    public function clear() {
179
+        $this->session->remove('publicSharePrivateKey');
180
+        $this->session->remove('privateKey');
181
+        $this->session->remove('encryptionInitialized');
182
+        $this->session->remove('decryptAll');
183
+        $this->session->remove('decryptAllKey');
184
+        $this->session->remove('decryptAllUid');
185
+    }
186 186
 
187 187
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Crypto/EncryptAll.php 1 patch
Indentation   +426 added lines, -426 removed lines patch added patch discarded remove patch
@@ -45,431 +45,431 @@
 block discarded – undo
45 45
 
46 46
 class EncryptAll {
47 47
 
48
-	/** @var Setup */
49
-	protected $userSetup;
50
-
51
-	/** @var IUserManager */
52
-	protected $userManager;
53
-
54
-	/** @var View */
55
-	protected $rootView;
56
-
57
-	/** @var KeyManager */
58
-	protected $keyManager;
59
-
60
-	/** @var Util */
61
-	protected $util;
62
-
63
-	/** @var array  */
64
-	protected $userPasswords;
65
-
66
-	/** @var  IConfig */
67
-	protected $config;
68
-
69
-	/** @var IMailer */
70
-	protected $mailer;
71
-
72
-	/** @var  IL10N */
73
-	protected $l;
74
-
75
-	/** @var  QuestionHelper */
76
-	protected $questionHelper;
77
-
78
-	/** @var  OutputInterface */
79
-	protected $output;
80
-
81
-	/** @var  InputInterface */
82
-	protected $input;
83
-
84
-	/** @var ISecureRandom */
85
-	protected $secureRandom;
86
-
87
-	/**
88
-	 * @param Setup $userSetup
89
-	 * @param IUserManager $userManager
90
-	 * @param View $rootView
91
-	 * @param KeyManager $keyManager
92
-	 * @param Util $util
93
-	 * @param IConfig $config
94
-	 * @param IMailer $mailer
95
-	 * @param IL10N $l
96
-	 * @param QuestionHelper $questionHelper
97
-	 * @param ISecureRandom $secureRandom
98
-	 */
99
-	public function __construct(
100
-		Setup $userSetup,
101
-		IUserManager $userManager,
102
-		View $rootView,
103
-		KeyManager $keyManager,
104
-		Util $util,
105
-		IConfig $config,
106
-		IMailer $mailer,
107
-		IL10N $l,
108
-		QuestionHelper $questionHelper,
109
-		ISecureRandom $secureRandom
110
-	) {
111
-		$this->userSetup = $userSetup;
112
-		$this->userManager = $userManager;
113
-		$this->rootView = $rootView;
114
-		$this->keyManager = $keyManager;
115
-		$this->util = $util;
116
-		$this->config = $config;
117
-		$this->mailer = $mailer;
118
-		$this->l = $l;
119
-		$this->questionHelper = $questionHelper;
120
-		$this->secureRandom = $secureRandom;
121
-		// store one time passwords for the users
122
-		$this->userPasswords = array();
123
-	}
124
-
125
-	/**
126
-	 * start to encrypt all files
127
-	 *
128
-	 * @param InputInterface $input
129
-	 * @param OutputInterface $output
130
-	 */
131
-	public function encryptAll(InputInterface $input, OutputInterface $output) {
132
-
133
-		$this->input = $input;
134
-		$this->output = $output;
135
-
136
-		$headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME;
137
-		$this->output->writeln("\n");
138
-		$this->output->writeln($headline);
139
-		$this->output->writeln(str_pad('', strlen($headline), '='));
140
-		$this->output->writeln("\n");
141
-
142
-		if ($this->util->isMasterKeyEnabled()) {
143
-			$this->output->writeln('Use master key to encrypt all files.');
144
-			$this->keyManager->validateMasterKey();
145
-		} else {
146
-			//create private/public keys for each user and store the private key password
147
-			$this->output->writeln('Create key-pair for every user');
148
-			$this->output->writeln('------------------------------');
149
-			$this->output->writeln('');
150
-			$this->output->writeln('This module will encrypt all files in the users files folder initially.');
151
-			$this->output->writeln('Already existing versions and files in the trash bin will not be encrypted.');
152
-			$this->output->writeln('');
153
-			$this->createKeyPairs();
154
-		}
155
-
156
-		//setup users file system and encrypt all files one by one (take should encrypt setting of storage into account)
157
-		$this->output->writeln("\n");
158
-		$this->output->writeln('Start to encrypt users files');
159
-		$this->output->writeln('----------------------------');
160
-		$this->output->writeln('');
161
-		$this->encryptAllUsersFiles();
162
-		if ($this->util->isMasterKeyEnabled() === false) {
163
-			//send-out or display password list and write it to a file
164
-			$this->output->writeln("\n");
165
-			$this->output->writeln('Generated encryption key passwords');
166
-			$this->output->writeln('----------------------------------');
167
-			$this->output->writeln('');
168
-			$this->outputPasswords();
169
-		}
170
-		$this->output->writeln("\n");
171
-	}
172
-
173
-	/**
174
-	 * create key-pair for every user
175
-	 */
176
-	protected function createKeyPairs() {
177
-		$this->output->writeln("\n");
178
-		$progress = new ProgressBar($this->output);
179
-		$progress->setFormat(" %message% \n [%bar%]");
180
-		$progress->start();
181
-
182
-		foreach($this->userManager->getBackends() as $backend) {
183
-			$limit = 500;
184
-			$offset = 0;
185
-			do {
186
-				$users = $backend->getUsers('', $limit, $offset);
187
-				foreach ($users as $user) {
188
-					if ($this->keyManager->userHasKeys($user) === false) {
189
-						$progress->setMessage('Create key-pair for ' . $user);
190
-						$progress->advance();
191
-						$this->setupUserFS($user);
192
-						$password = $this->generateOneTimePassword($user);
193
-						$this->userSetup->setupUser($user, $password);
194
-					} else {
195
-						// users which already have a key-pair will be stored with a
196
-						// empty password and filtered out later
197
-						$this->userPasswords[$user] = '';
198
-					}
199
-				}
200
-				$offset += $limit;
201
-			} while(count($users) >= $limit);
202
-		}
203
-
204
-		$progress->setMessage('Key-pair created for all users');
205
-		$progress->finish();
206
-	}
207
-
208
-	/**
209
-	 * iterate over all user and encrypt their files
210
-	 */
211
-	protected function encryptAllUsersFiles() {
212
-		$this->output->writeln("\n");
213
-		$progress = new ProgressBar($this->output);
214
-		$progress->setFormat(" %message% \n [%bar%]");
215
-		$progress->start();
216
-		$numberOfUsers = count($this->userPasswords);
217
-		$userNo = 1;
218
-		if ($this->util->isMasterKeyEnabled()) {
219
-			$this->encryptAllUserFilesWithMasterKey($progress);
220
-		} else {
221
-			foreach ($this->userPasswords as $uid => $password) {
222
-				$userCount = "$uid ($userNo of $numberOfUsers)";
223
-				$this->encryptUsersFiles($uid, $progress, $userCount);
224
-				$userNo++;
225
-			}
226
-		}
227
-		$progress->setMessage("all files encrypted");
228
-		$progress->finish();
229
-
230
-	}
231
-
232
-	/**
233
-	 * encrypt all user files with the master key
234
-	 *
235
-	 * @param ProgressBar $progress
236
-	 */
237
-	protected function encryptAllUserFilesWithMasterKey(ProgressBar $progress) {
238
-		$userNo = 1;
239
-		foreach($this->userManager->getBackends() as $backend) {
240
-			$limit = 500;
241
-			$offset = 0;
242
-			do {
243
-				$users = $backend->getUsers('', $limit, $offset);
244
-				foreach ($users as $user) {
245
-					$userCount = "$user ($userNo)";
246
-					$this->encryptUsersFiles($user, $progress, $userCount);
247
-					$userNo++;
248
-				}
249
-				$offset += $limit;
250
-			} while(count($users) >= $limit);
251
-		}
252
-	}
253
-
254
-	/**
255
-	 * encrypt files from the given user
256
-	 *
257
-	 * @param string $uid
258
-	 * @param ProgressBar $progress
259
-	 * @param string $userCount
260
-	 */
261
-	protected function encryptUsersFiles($uid, ProgressBar $progress, $userCount) {
262
-
263
-		$this->setupUserFS($uid);
264
-		$directories = array();
265
-		$directories[] =  '/' . $uid . '/files';
266
-
267
-		while($root = array_pop($directories)) {
268
-			$content = $this->rootView->getDirectoryContent($root);
269
-			foreach ($content as $file) {
270
-				$path = $root . '/' . $file['name'];
271
-				if ($this->rootView->is_dir($path)) {
272
-					$directories[] = $path;
273
-					continue;
274
-				} else {
275
-					$progress->setMessage("encrypt files for user $userCount: $path");
276
-					$progress->advance();
277
-					if($this->encryptFile($path) === false) {
278
-						$progress->setMessage("encrypt files for user $userCount: $path (already encrypted)");
279
-						$progress->advance();
280
-					}
281
-				}
282
-			}
283
-		}
284
-	}
285
-
286
-	/**
287
-	 * encrypt file
288
-	 *
289
-	 * @param string $path
290
-	 * @return bool
291
-	 */
292
-	protected function encryptFile($path) {
293
-
294
-		$source = $path;
295
-		$target = $path . '.encrypted.' . time();
296
-
297
-		try {
298
-			$this->rootView->copy($source, $target);
299
-			$this->rootView->rename($target, $source);
300
-		} catch (DecryptionFailedException $e) {
301
-			if ($this->rootView->file_exists($target)) {
302
-				$this->rootView->unlink($target);
303
-			}
304
-			return false;
305
-		}
306
-
307
-		return true;
308
-	}
309
-
310
-	/**
311
-	 * output one-time encryption passwords
312
-	 */
313
-	protected function outputPasswords() {
314
-		$table = new Table($this->output);
315
-		$table->setHeaders(array('Username', 'Private key password'));
316
-
317
-		//create rows
318
-		$newPasswords = array();
319
-		$unchangedPasswords = array();
320
-		foreach ($this->userPasswords as $uid => $password) {
321
-			if (empty($password)) {
322
-				$unchangedPasswords[] = $uid;
323
-			} else {
324
-				$newPasswords[] = [$uid, $password];
325
-			}
326
-		}
327
-
328
-		if (empty($newPasswords)) {
329
-			$this->output->writeln("\nAll users already had a key-pair, no further action needed.\n");
330
-			return;
331
-		}
332
-
333
-		$table->setRows($newPasswords);
334
-		$table->render();
335
-
336
-		if (!empty($unchangedPasswords)) {
337
-			$this->output->writeln("\nThe following users already had a key-pair which was reused without setting a new password:\n");
338
-			foreach ($unchangedPasswords as $uid) {
339
-				$this->output->writeln("    $uid");
340
-			}
341
-		}
342
-
343
-		$this->writePasswordsToFile($newPasswords);
344
-
345
-		$this->output->writeln('');
346
-		$question = new ConfirmationQuestion('Do you want to send the passwords directly to the users by mail? (y/n) ', false);
347
-		if ($this->questionHelper->ask($this->input, $this->output, $question)) {
348
-			$this->sendPasswordsByMail();
349
-		}
350
-	}
351
-
352
-	/**
353
-	 * write one-time encryption passwords to a csv file
354
-	 *
355
-	 * @param array $passwords
356
-	 */
357
-	protected function writePasswordsToFile(array $passwords) {
358
-		$fp = $this->rootView->fopen('oneTimeEncryptionPasswords.csv', 'w');
359
-		foreach ($passwords as $pwd) {
360
-			fputcsv($fp, $pwd);
361
-		}
362
-		fclose($fp);
363
-		$this->output->writeln("\n");
364
-		$this->output->writeln('A list of all newly created passwords was written to data/oneTimeEncryptionPasswords.csv');
365
-		$this->output->writeln('');
366
-		$this->output->writeln('Each of these users need to login to the web interface, go to the');
367
-		$this->output->writeln('personal settings section "basic encryption module" and');
368
-		$this->output->writeln('update the private key password to match the login password again by');
369
-		$this->output->writeln('entering the one-time password into the "old log-in password" field');
370
-		$this->output->writeln('and their current login password');
371
-	}
372
-
373
-	/**
374
-	 * setup user file system
375
-	 *
376
-	 * @param string $uid
377
-	 */
378
-	protected function setupUserFS($uid) {
379
-		\OC_Util::tearDownFS();
380
-		\OC_Util::setupFS($uid);
381
-	}
382
-
383
-	/**
384
-	 * generate one time password for the user and store it in a array
385
-	 *
386
-	 * @param string $uid
387
-	 * @return string password
388
-	 */
389
-	protected function generateOneTimePassword($uid) {
390
-		$password = $this->secureRandom->generate(8);
391
-		$this->userPasswords[$uid] = $password;
392
-		return $password;
393
-	}
394
-
395
-	/**
396
-	 * send encryption key passwords to the users by mail
397
-	 */
398
-	protected function sendPasswordsByMail() {
399
-		$noMail = [];
400
-
401
-		$this->output->writeln('');
402
-		$progress = new ProgressBar($this->output, count($this->userPasswords));
403
-		$progress->start();
404
-
405
-		foreach ($this->userPasswords as $uid => $password) {
406
-			$progress->advance();
407
-			if (!empty($password)) {
408
-				$recipient = $this->userManager->get($uid);
409
-				$recipientDisplayName = $recipient->getDisplayName();
410
-				$to = $recipient->getEMailAddress();
411
-
412
-				if ($to === '') {
413
-					$noMail[] = $uid;
414
-					continue;
415
-				}
416
-
417
-				$subject = (string)$this->l->t('one-time password for server-side-encryption');
418
-				list($htmlBody, $textBody) = $this->createMailBody($password);
419
-
420
-				// send it out now
421
-				try {
422
-					$message = $this->mailer->createMessage();
423
-					$message->setSubject($subject);
424
-					$message->setTo([$to => $recipientDisplayName]);
425
-					$message->setHtmlBody($htmlBody);
426
-					$message->setPlainBody($textBody);
427
-					$message->setFrom([
428
-						\OCP\Util::getDefaultEmailAddress('admin-noreply')
429
-					]);
430
-
431
-					$this->mailer->send($message);
432
-				} catch (\Exception $e) {
433
-					$noMail[] = $uid;
434
-				}
435
-			}
436
-		}
437
-
438
-		$progress->finish();
439
-
440
-		if (empty($noMail)) {
441
-			$this->output->writeln("\n\nPassword successfully send to all users");
442
-		} else {
443
-			$table = new Table($this->output);
444
-			$table->setHeaders(array('Username', 'Private key password'));
445
-			$this->output->writeln("\n\nCould not send password to following users:\n");
446
-			$rows = [];
447
-			foreach ($noMail as $uid) {
448
-				$rows[] = [$uid, $this->userPasswords[$uid]];
449
-			}
450
-			$table->setRows($rows);
451
-			$table->render();
452
-		}
453
-
454
-	}
455
-
456
-	/**
457
-	 * create mail body for plain text and html mail
458
-	 *
459
-	 * @param string $password one-time encryption password
460
-	 * @return array an array of the html mail body and the plain text mail body
461
-	 */
462
-	protected function createMailBody($password) {
463
-
464
-		$html = new \OC_Template("encryption", "mail", "");
465
-		$html->assign ('password', $password);
466
-		$htmlMail = $html->fetchPage();
467
-
468
-		$plainText = new \OC_Template("encryption", "altmail", "");
469
-		$plainText->assign ('password', $password);
470
-		$plainTextMail = $plainText->fetchPage();
471
-
472
-		return [$htmlMail, $plainTextMail];
473
-	}
48
+    /** @var Setup */
49
+    protected $userSetup;
50
+
51
+    /** @var IUserManager */
52
+    protected $userManager;
53
+
54
+    /** @var View */
55
+    protected $rootView;
56
+
57
+    /** @var KeyManager */
58
+    protected $keyManager;
59
+
60
+    /** @var Util */
61
+    protected $util;
62
+
63
+    /** @var array  */
64
+    protected $userPasswords;
65
+
66
+    /** @var  IConfig */
67
+    protected $config;
68
+
69
+    /** @var IMailer */
70
+    protected $mailer;
71
+
72
+    /** @var  IL10N */
73
+    protected $l;
74
+
75
+    /** @var  QuestionHelper */
76
+    protected $questionHelper;
77
+
78
+    /** @var  OutputInterface */
79
+    protected $output;
80
+
81
+    /** @var  InputInterface */
82
+    protected $input;
83
+
84
+    /** @var ISecureRandom */
85
+    protected $secureRandom;
86
+
87
+    /**
88
+     * @param Setup $userSetup
89
+     * @param IUserManager $userManager
90
+     * @param View $rootView
91
+     * @param KeyManager $keyManager
92
+     * @param Util $util
93
+     * @param IConfig $config
94
+     * @param IMailer $mailer
95
+     * @param IL10N $l
96
+     * @param QuestionHelper $questionHelper
97
+     * @param ISecureRandom $secureRandom
98
+     */
99
+    public function __construct(
100
+        Setup $userSetup,
101
+        IUserManager $userManager,
102
+        View $rootView,
103
+        KeyManager $keyManager,
104
+        Util $util,
105
+        IConfig $config,
106
+        IMailer $mailer,
107
+        IL10N $l,
108
+        QuestionHelper $questionHelper,
109
+        ISecureRandom $secureRandom
110
+    ) {
111
+        $this->userSetup = $userSetup;
112
+        $this->userManager = $userManager;
113
+        $this->rootView = $rootView;
114
+        $this->keyManager = $keyManager;
115
+        $this->util = $util;
116
+        $this->config = $config;
117
+        $this->mailer = $mailer;
118
+        $this->l = $l;
119
+        $this->questionHelper = $questionHelper;
120
+        $this->secureRandom = $secureRandom;
121
+        // store one time passwords for the users
122
+        $this->userPasswords = array();
123
+    }
124
+
125
+    /**
126
+     * start to encrypt all files
127
+     *
128
+     * @param InputInterface $input
129
+     * @param OutputInterface $output
130
+     */
131
+    public function encryptAll(InputInterface $input, OutputInterface $output) {
132
+
133
+        $this->input = $input;
134
+        $this->output = $output;
135
+
136
+        $headline = 'Encrypt all files with the ' . Encryption::DISPLAY_NAME;
137
+        $this->output->writeln("\n");
138
+        $this->output->writeln($headline);
139
+        $this->output->writeln(str_pad('', strlen($headline), '='));
140
+        $this->output->writeln("\n");
141
+
142
+        if ($this->util->isMasterKeyEnabled()) {
143
+            $this->output->writeln('Use master key to encrypt all files.');
144
+            $this->keyManager->validateMasterKey();
145
+        } else {
146
+            //create private/public keys for each user and store the private key password
147
+            $this->output->writeln('Create key-pair for every user');
148
+            $this->output->writeln('------------------------------');
149
+            $this->output->writeln('');
150
+            $this->output->writeln('This module will encrypt all files in the users files folder initially.');
151
+            $this->output->writeln('Already existing versions and files in the trash bin will not be encrypted.');
152
+            $this->output->writeln('');
153
+            $this->createKeyPairs();
154
+        }
155
+
156
+        //setup users file system and encrypt all files one by one (take should encrypt setting of storage into account)
157
+        $this->output->writeln("\n");
158
+        $this->output->writeln('Start to encrypt users files');
159
+        $this->output->writeln('----------------------------');
160
+        $this->output->writeln('');
161
+        $this->encryptAllUsersFiles();
162
+        if ($this->util->isMasterKeyEnabled() === false) {
163
+            //send-out or display password list and write it to a file
164
+            $this->output->writeln("\n");
165
+            $this->output->writeln('Generated encryption key passwords');
166
+            $this->output->writeln('----------------------------------');
167
+            $this->output->writeln('');
168
+            $this->outputPasswords();
169
+        }
170
+        $this->output->writeln("\n");
171
+    }
172
+
173
+    /**
174
+     * create key-pair for every user
175
+     */
176
+    protected function createKeyPairs() {
177
+        $this->output->writeln("\n");
178
+        $progress = new ProgressBar($this->output);
179
+        $progress->setFormat(" %message% \n [%bar%]");
180
+        $progress->start();
181
+
182
+        foreach($this->userManager->getBackends() as $backend) {
183
+            $limit = 500;
184
+            $offset = 0;
185
+            do {
186
+                $users = $backend->getUsers('', $limit, $offset);
187
+                foreach ($users as $user) {
188
+                    if ($this->keyManager->userHasKeys($user) === false) {
189
+                        $progress->setMessage('Create key-pair for ' . $user);
190
+                        $progress->advance();
191
+                        $this->setupUserFS($user);
192
+                        $password = $this->generateOneTimePassword($user);
193
+                        $this->userSetup->setupUser($user, $password);
194
+                    } else {
195
+                        // users which already have a key-pair will be stored with a
196
+                        // empty password and filtered out later
197
+                        $this->userPasswords[$user] = '';
198
+                    }
199
+                }
200
+                $offset += $limit;
201
+            } while(count($users) >= $limit);
202
+        }
203
+
204
+        $progress->setMessage('Key-pair created for all users');
205
+        $progress->finish();
206
+    }
207
+
208
+    /**
209
+     * iterate over all user and encrypt their files
210
+     */
211
+    protected function encryptAllUsersFiles() {
212
+        $this->output->writeln("\n");
213
+        $progress = new ProgressBar($this->output);
214
+        $progress->setFormat(" %message% \n [%bar%]");
215
+        $progress->start();
216
+        $numberOfUsers = count($this->userPasswords);
217
+        $userNo = 1;
218
+        if ($this->util->isMasterKeyEnabled()) {
219
+            $this->encryptAllUserFilesWithMasterKey($progress);
220
+        } else {
221
+            foreach ($this->userPasswords as $uid => $password) {
222
+                $userCount = "$uid ($userNo of $numberOfUsers)";
223
+                $this->encryptUsersFiles($uid, $progress, $userCount);
224
+                $userNo++;
225
+            }
226
+        }
227
+        $progress->setMessage("all files encrypted");
228
+        $progress->finish();
229
+
230
+    }
231
+
232
+    /**
233
+     * encrypt all user files with the master key
234
+     *
235
+     * @param ProgressBar $progress
236
+     */
237
+    protected function encryptAllUserFilesWithMasterKey(ProgressBar $progress) {
238
+        $userNo = 1;
239
+        foreach($this->userManager->getBackends() as $backend) {
240
+            $limit = 500;
241
+            $offset = 0;
242
+            do {
243
+                $users = $backend->getUsers('', $limit, $offset);
244
+                foreach ($users as $user) {
245
+                    $userCount = "$user ($userNo)";
246
+                    $this->encryptUsersFiles($user, $progress, $userCount);
247
+                    $userNo++;
248
+                }
249
+                $offset += $limit;
250
+            } while(count($users) >= $limit);
251
+        }
252
+    }
253
+
254
+    /**
255
+     * encrypt files from the given user
256
+     *
257
+     * @param string $uid
258
+     * @param ProgressBar $progress
259
+     * @param string $userCount
260
+     */
261
+    protected function encryptUsersFiles($uid, ProgressBar $progress, $userCount) {
262
+
263
+        $this->setupUserFS($uid);
264
+        $directories = array();
265
+        $directories[] =  '/' . $uid . '/files';
266
+
267
+        while($root = array_pop($directories)) {
268
+            $content = $this->rootView->getDirectoryContent($root);
269
+            foreach ($content as $file) {
270
+                $path = $root . '/' . $file['name'];
271
+                if ($this->rootView->is_dir($path)) {
272
+                    $directories[] = $path;
273
+                    continue;
274
+                } else {
275
+                    $progress->setMessage("encrypt files for user $userCount: $path");
276
+                    $progress->advance();
277
+                    if($this->encryptFile($path) === false) {
278
+                        $progress->setMessage("encrypt files for user $userCount: $path (already encrypted)");
279
+                        $progress->advance();
280
+                    }
281
+                }
282
+            }
283
+        }
284
+    }
285
+
286
+    /**
287
+     * encrypt file
288
+     *
289
+     * @param string $path
290
+     * @return bool
291
+     */
292
+    protected function encryptFile($path) {
293
+
294
+        $source = $path;
295
+        $target = $path . '.encrypted.' . time();
296
+
297
+        try {
298
+            $this->rootView->copy($source, $target);
299
+            $this->rootView->rename($target, $source);
300
+        } catch (DecryptionFailedException $e) {
301
+            if ($this->rootView->file_exists($target)) {
302
+                $this->rootView->unlink($target);
303
+            }
304
+            return false;
305
+        }
306
+
307
+        return true;
308
+    }
309
+
310
+    /**
311
+     * output one-time encryption passwords
312
+     */
313
+    protected function outputPasswords() {
314
+        $table = new Table($this->output);
315
+        $table->setHeaders(array('Username', 'Private key password'));
316
+
317
+        //create rows
318
+        $newPasswords = array();
319
+        $unchangedPasswords = array();
320
+        foreach ($this->userPasswords as $uid => $password) {
321
+            if (empty($password)) {
322
+                $unchangedPasswords[] = $uid;
323
+            } else {
324
+                $newPasswords[] = [$uid, $password];
325
+            }
326
+        }
327
+
328
+        if (empty($newPasswords)) {
329
+            $this->output->writeln("\nAll users already had a key-pair, no further action needed.\n");
330
+            return;
331
+        }
332
+
333
+        $table->setRows($newPasswords);
334
+        $table->render();
335
+
336
+        if (!empty($unchangedPasswords)) {
337
+            $this->output->writeln("\nThe following users already had a key-pair which was reused without setting a new password:\n");
338
+            foreach ($unchangedPasswords as $uid) {
339
+                $this->output->writeln("    $uid");
340
+            }
341
+        }
342
+
343
+        $this->writePasswordsToFile($newPasswords);
344
+
345
+        $this->output->writeln('');
346
+        $question = new ConfirmationQuestion('Do you want to send the passwords directly to the users by mail? (y/n) ', false);
347
+        if ($this->questionHelper->ask($this->input, $this->output, $question)) {
348
+            $this->sendPasswordsByMail();
349
+        }
350
+    }
351
+
352
+    /**
353
+     * write one-time encryption passwords to a csv file
354
+     *
355
+     * @param array $passwords
356
+     */
357
+    protected function writePasswordsToFile(array $passwords) {
358
+        $fp = $this->rootView->fopen('oneTimeEncryptionPasswords.csv', 'w');
359
+        foreach ($passwords as $pwd) {
360
+            fputcsv($fp, $pwd);
361
+        }
362
+        fclose($fp);
363
+        $this->output->writeln("\n");
364
+        $this->output->writeln('A list of all newly created passwords was written to data/oneTimeEncryptionPasswords.csv');
365
+        $this->output->writeln('');
366
+        $this->output->writeln('Each of these users need to login to the web interface, go to the');
367
+        $this->output->writeln('personal settings section "basic encryption module" and');
368
+        $this->output->writeln('update the private key password to match the login password again by');
369
+        $this->output->writeln('entering the one-time password into the "old log-in password" field');
370
+        $this->output->writeln('and their current login password');
371
+    }
372
+
373
+    /**
374
+     * setup user file system
375
+     *
376
+     * @param string $uid
377
+     */
378
+    protected function setupUserFS($uid) {
379
+        \OC_Util::tearDownFS();
380
+        \OC_Util::setupFS($uid);
381
+    }
382
+
383
+    /**
384
+     * generate one time password for the user and store it in a array
385
+     *
386
+     * @param string $uid
387
+     * @return string password
388
+     */
389
+    protected function generateOneTimePassword($uid) {
390
+        $password = $this->secureRandom->generate(8);
391
+        $this->userPasswords[$uid] = $password;
392
+        return $password;
393
+    }
394
+
395
+    /**
396
+     * send encryption key passwords to the users by mail
397
+     */
398
+    protected function sendPasswordsByMail() {
399
+        $noMail = [];
400
+
401
+        $this->output->writeln('');
402
+        $progress = new ProgressBar($this->output, count($this->userPasswords));
403
+        $progress->start();
404
+
405
+        foreach ($this->userPasswords as $uid => $password) {
406
+            $progress->advance();
407
+            if (!empty($password)) {
408
+                $recipient = $this->userManager->get($uid);
409
+                $recipientDisplayName = $recipient->getDisplayName();
410
+                $to = $recipient->getEMailAddress();
411
+
412
+                if ($to === '') {
413
+                    $noMail[] = $uid;
414
+                    continue;
415
+                }
416
+
417
+                $subject = (string)$this->l->t('one-time password for server-side-encryption');
418
+                list($htmlBody, $textBody) = $this->createMailBody($password);
419
+
420
+                // send it out now
421
+                try {
422
+                    $message = $this->mailer->createMessage();
423
+                    $message->setSubject($subject);
424
+                    $message->setTo([$to => $recipientDisplayName]);
425
+                    $message->setHtmlBody($htmlBody);
426
+                    $message->setPlainBody($textBody);
427
+                    $message->setFrom([
428
+                        \OCP\Util::getDefaultEmailAddress('admin-noreply')
429
+                    ]);
430
+
431
+                    $this->mailer->send($message);
432
+                } catch (\Exception $e) {
433
+                    $noMail[] = $uid;
434
+                }
435
+            }
436
+        }
437
+
438
+        $progress->finish();
439
+
440
+        if (empty($noMail)) {
441
+            $this->output->writeln("\n\nPassword successfully send to all users");
442
+        } else {
443
+            $table = new Table($this->output);
444
+            $table->setHeaders(array('Username', 'Private key password'));
445
+            $this->output->writeln("\n\nCould not send password to following users:\n");
446
+            $rows = [];
447
+            foreach ($noMail as $uid) {
448
+                $rows[] = [$uid, $this->userPasswords[$uid]];
449
+            }
450
+            $table->setRows($rows);
451
+            $table->render();
452
+        }
453
+
454
+    }
455
+
456
+    /**
457
+     * create mail body for plain text and html mail
458
+     *
459
+     * @param string $password one-time encryption password
460
+     * @return array an array of the html mail body and the plain text mail body
461
+     */
462
+    protected function createMailBody($password) {
463
+
464
+        $html = new \OC_Template("encryption", "mail", "");
465
+        $html->assign ('password', $password);
466
+        $htmlMail = $html->fetchPage();
467
+
468
+        $plainText = new \OC_Template("encryption", "altmail", "");
469
+        $plainText->assign ('password', $password);
470
+        $plainTextMail = $plainText->fetchPage();
471
+
472
+        return [$htmlMail, $plainTextMail];
473
+    }
474 474
 
475 475
 }
Please login to merge, or discard this patch.
apps/encryption/lib/Crypto/DecryptAll.php 1 patch
Indentation   +123 added lines, -123 removed lines patch added patch discarded remove patch
@@ -35,127 +35,127 @@
 block discarded – undo
35 35
 
36 36
 class DecryptAll {
37 37
 
38
-	/** @var Util  */
39
-	protected $util;
40
-
41
-	/** @var QuestionHelper  */
42
-	protected $questionHelper;
43
-
44
-	/** @var  Crypt */
45
-	protected $crypt;
46
-
47
-	/** @var  KeyManager */
48
-	protected $keyManager;
49
-
50
-	/** @var Session  */
51
-	protected $session;
52
-
53
-	/**
54
-	 * @param Util $util
55
-	 * @param KeyManager $keyManager
56
-	 * @param Crypt $crypt
57
-	 * @param Session $session
58
-	 * @param QuestionHelper $questionHelper
59
-	 */
60
-	public function __construct(
61
-		Util $util,
62
-		KeyManager $keyManager,
63
-		Crypt $crypt,
64
-		Session $session,
65
-		QuestionHelper $questionHelper
66
-	) {
67
-		$this->util = $util;
68
-		$this->keyManager = $keyManager;
69
-		$this->crypt = $crypt;
70
-		$this->session = $session;
71
-		$this->questionHelper = $questionHelper;
72
-	}
73
-
74
-	/**
75
-	 * prepare encryption module to decrypt all files
76
-	 *
77
-	 * @param InputInterface $input
78
-	 * @param OutputInterface $output
79
-	 * @param $user
80
-	 * @return bool
81
-	 */
82
-	public function prepare(InputInterface $input, OutputInterface $output, $user) {
83
-
84
-		$question = new Question('Please enter the recovery key password: ');
85
-
86
-		if($this->util->isMasterKeyEnabled()) {
87
-			$output->writeln('Use master key to decrypt all files');
88
-			$user = $this->keyManager->getMasterKeyId();
89
-			$password =$this->keyManager->getMasterKeyPassword();
90
-		} else {
91
-			$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
92
-			if (!empty($user)) {
93
-				$output->writeln('You can only decrypt the users files if you know');
94
-				$output->writeln('the users password or if he activated the recovery key.');
95
-				$output->writeln('');
96
-				$questionUseLoginPassword = new ConfirmationQuestion(
97
-					'Do you want to use the users login password to decrypt all files? (y/n) ',
98
-					false
99
-				);
100
-				$useLoginPassword = $this->questionHelper->ask($input, $output, $questionUseLoginPassword);
101
-				if ($useLoginPassword) {
102
-					$question = new Question('Please enter the user\'s login password: ');
103
-				} else if ($this->util->isRecoveryEnabledForUser($user) === false) {
104
-					$output->writeln('No recovery key available for user ' . $user);
105
-					return false;
106
-				} else {
107
-					$user = $recoveryKeyId;
108
-				}
109
-			} else {
110
-				$output->writeln('You can only decrypt the files of all users if the');
111
-				$output->writeln('recovery key is enabled by the admin and activated by the users.');
112
-				$output->writeln('');
113
-				$user = $recoveryKeyId;
114
-			}
115
-
116
-			$question->setHidden(true);
117
-			$question->setHiddenFallback(false);
118
-			$password = $this->questionHelper->ask($input, $output, $question);
119
-		}
120
-
121
-		$privateKey = $this->getPrivateKey($user, $password);
122
-		if ($privateKey !== false) {
123
-			$this->updateSession($user, $privateKey);
124
-			return true;
125
-		} else {
126
-			$output->writeln('Could not decrypt private key, maybe you entered the wrong password?');
127
-		}
128
-
129
-
130
-		return false;
131
-	}
132
-
133
-	/**
134
-	 * get the private key which will be used to decrypt all files
135
-	 *
136
-	 * @param string $user
137
-	 * @param string $password
138
-	 * @return bool|string
139
-	 * @throws \OCA\Encryption\Exceptions\PrivateKeyMissingException
140
-	 */
141
-	protected function getPrivateKey($user, $password) {
142
-		$recoveryKeyId = $this->keyManager->getRecoveryKeyId();
143
-		$masterKeyId = $this->keyManager->getMasterKeyId();
144
-		if ($user === $recoveryKeyId) {
145
-			$recoveryKey = $this->keyManager->getSystemPrivateKey($recoveryKeyId);
146
-			$privateKey = $this->crypt->decryptPrivateKey($recoveryKey, $password);
147
-		} elseif ($user === $masterKeyId) {
148
-			$masterKey = $this->keyManager->getSystemPrivateKey($masterKeyId);
149
-			$privateKey = $this->crypt->decryptPrivateKey($masterKey, $password, $masterKeyId);
150
-		} else {
151
-			$userKey = $this->keyManager->getPrivateKey($user);
152
-			$privateKey = $this->crypt->decryptPrivateKey($userKey, $password, $user);
153
-		}
154
-
155
-		return $privateKey;
156
-	}
157
-
158
-	protected function updateSession($user, $privateKey) {
159
-		$this->session->prepareDecryptAll($user, $privateKey);
160
-	}
38
+    /** @var Util  */
39
+    protected $util;
40
+
41
+    /** @var QuestionHelper  */
42
+    protected $questionHelper;
43
+
44
+    /** @var  Crypt */
45
+    protected $crypt;
46
+
47
+    /** @var  KeyManager */
48
+    protected $keyManager;
49
+
50
+    /** @var Session  */
51
+    protected $session;
52
+
53
+    /**
54
+     * @param Util $util
55
+     * @param KeyManager $keyManager
56
+     * @param Crypt $crypt
57
+     * @param Session $session
58
+     * @param QuestionHelper $questionHelper
59
+     */
60
+    public function __construct(
61
+        Util $util,
62
+        KeyManager $keyManager,
63
+        Crypt $crypt,
64
+        Session $session,
65
+        QuestionHelper $questionHelper
66
+    ) {
67
+        $this->util = $util;
68
+        $this->keyManager = $keyManager;
69
+        $this->crypt = $crypt;
70
+        $this->session = $session;
71
+        $this->questionHelper = $questionHelper;
72
+    }
73
+
74
+    /**
75
+     * prepare encryption module to decrypt all files
76
+     *
77
+     * @param InputInterface $input
78
+     * @param OutputInterface $output
79
+     * @param $user
80
+     * @return bool
81
+     */
82
+    public function prepare(InputInterface $input, OutputInterface $output, $user) {
83
+
84
+        $question = new Question('Please enter the recovery key password: ');
85
+
86
+        if($this->util->isMasterKeyEnabled()) {
87
+            $output->writeln('Use master key to decrypt all files');
88
+            $user = $this->keyManager->getMasterKeyId();
89
+            $password =$this->keyManager->getMasterKeyPassword();
90
+        } else {
91
+            $recoveryKeyId = $this->keyManager->getRecoveryKeyId();
92
+            if (!empty($user)) {
93
+                $output->writeln('You can only decrypt the users files if you know');
94
+                $output->writeln('the users password or if he activated the recovery key.');
95
+                $output->writeln('');
96
+                $questionUseLoginPassword = new ConfirmationQuestion(
97
+                    'Do you want to use the users login password to decrypt all files? (y/n) ',
98
+                    false
99
+                );
100
+                $useLoginPassword = $this->questionHelper->ask($input, $output, $questionUseLoginPassword);
101
+                if ($useLoginPassword) {
102
+                    $question = new Question('Please enter the user\'s login password: ');
103
+                } else if ($this->util->isRecoveryEnabledForUser($user) === false) {
104
+                    $output->writeln('No recovery key available for user ' . $user);
105
+                    return false;
106
+                } else {
107
+                    $user = $recoveryKeyId;
108
+                }
109
+            } else {
110
+                $output->writeln('You can only decrypt the files of all users if the');
111
+                $output->writeln('recovery key is enabled by the admin and activated by the users.');
112
+                $output->writeln('');
113
+                $user = $recoveryKeyId;
114
+            }
115
+
116
+            $question->setHidden(true);
117
+            $question->setHiddenFallback(false);
118
+            $password = $this->questionHelper->ask($input, $output, $question);
119
+        }
120
+
121
+        $privateKey = $this->getPrivateKey($user, $password);
122
+        if ($privateKey !== false) {
123
+            $this->updateSession($user, $privateKey);
124
+            return true;
125
+        } else {
126
+            $output->writeln('Could not decrypt private key, maybe you entered the wrong password?');
127
+        }
128
+
129
+
130
+        return false;
131
+    }
132
+
133
+    /**
134
+     * get the private key which will be used to decrypt all files
135
+     *
136
+     * @param string $user
137
+     * @param string $password
138
+     * @return bool|string
139
+     * @throws \OCA\Encryption\Exceptions\PrivateKeyMissingException
140
+     */
141
+    protected function getPrivateKey($user, $password) {
142
+        $recoveryKeyId = $this->keyManager->getRecoveryKeyId();
143
+        $masterKeyId = $this->keyManager->getMasterKeyId();
144
+        if ($user === $recoveryKeyId) {
145
+            $recoveryKey = $this->keyManager->getSystemPrivateKey($recoveryKeyId);
146
+            $privateKey = $this->crypt->decryptPrivateKey($recoveryKey, $password);
147
+        } elseif ($user === $masterKeyId) {
148
+            $masterKey = $this->keyManager->getSystemPrivateKey($masterKeyId);
149
+            $privateKey = $this->crypt->decryptPrivateKey($masterKey, $password, $masterKeyId);
150
+        } else {
151
+            $userKey = $this->keyManager->getPrivateKey($user);
152
+            $privateKey = $this->crypt->decryptPrivateKey($userKey, $password, $user);
153
+        }
154
+
155
+        return $privateKey;
156
+    }
157
+
158
+    protected function updateSession($user, $privateKey) {
159
+        $this->session->prepareDecryptAll($user, $privateKey);
160
+    }
161 161
 }
Please login to merge, or discard this patch.