From bd0551b22076b82a6d49e9f7a2b2e0c90a1b2326 Mon Sep 17 00:00:00 2001
From: Aleksander Machniak <alec@alec.pl>
Date: Fri, 05 Feb 2016 07:25:27 -0500
Subject: [PATCH] Secure also downloads of addressbook exports, managesieve script exports and Enigma keys exports

---
 plugins/enigma/lib/enigma_driver_gnupg.php |  208 ++++++++++++++++++++++++++++++++++++++++-----------
 1 files changed, 163 insertions(+), 45 deletions(-)

diff --git a/plugins/enigma/lib/enigma_driver_gnupg.php b/plugins/enigma/lib/enigma_driver_gnupg.php
index 52a0ad6..5ddf724 100644
--- a/plugins/enigma/lib/enigma_driver_gnupg.php
+++ b/plugins/enigma/lib/enigma_driver_gnupg.php
@@ -1,5 +1,6 @@
 <?php
-/*
+
+/**
  +-------------------------------------------------------------------------+
  | GnuPG (PGP) driver for the Enigma Plugin                                |
  |                                                                         |
@@ -18,10 +19,10 @@
 
 class enigma_driver_gnupg extends enigma_driver
 {
-    private $rc;
-    private $gpg;
-    private $homedir;
-    private $user;
+    protected $rc;
+    protected $gpg;
+    protected $homedir;
+    protected $user;
 
 
     function __construct($user)
@@ -41,15 +42,15 @@
         $homedir = $this->rc->config->get('enigma_pgp_homedir', INSTALL_PATH . 'plugins/enigma/home');
 
         if (!$homedir)
-            return new enigma_error(enigma_error::E_INTERNAL,
+            return new enigma_error(enigma_error::INTERNAL,
                 "Option 'enigma_pgp_homedir' not specified");
 
         // check if homedir exists (create it if not) and is readable
         if (!file_exists($homedir))
-            return new enigma_error(enigma_error::E_INTERNAL,
+            return new enigma_error(enigma_error::INTERNAL,
                 "Keys directory doesn't exists: $homedir");
         if (!is_writable($homedir))
-            return new enigma_error(enigma_error::E_INTERNAL,
+            return new enigma_error(enigma_error::INTERNAL,
                 "Keys directory isn't writeable: $homedir");
 
         $homedir = $homedir . '/' . $this->user;
@@ -59,10 +60,10 @@
             mkdir($homedir, 0700);
 
         if (!file_exists($homedir))
-            return new enigma_error(enigma_error::E_INTERNAL,
+            return new enigma_error(enigma_error::INTERNAL,
                 "Unable to create keys directory: $homedir");
         if (!is_writable($homedir))
-            return new enigma_error(enigma_error::E_INTERNAL,
+            return new enigma_error(enigma_error::INTERNAL,
                 "Unable to write to keys directory: $homedir");
 
         $this->homedir = $homedir;
@@ -81,10 +82,12 @@
     }
 
     /**
-     * Encrypt a message
+     * Encryption.
      *
-     * @param string The message
-     * @param array  List of keys
+     * @param string Message body
+     * @param array  List of key-password mapping
+     *
+     * @return mixed Encrypted message or enigma_error on failure
      */
     function encrypt($text, $keys)
     {
@@ -93,8 +96,7 @@
                 $this->gpg->addEncryptKey($key);
             }
 
-            $dec = $this->gpg->encrypt($text, true);
-            return $dec;
+            return $this->gpg->encrypt($text, true);
         }
         catch (Exception $e) {
             return $this->get_error_from_exception($e);
@@ -106,6 +108,8 @@
      *
      * @param string Encrypted message
      * @param array  List of key-password mapping
+     *
+     * @return mixed Decrypted message or enigma_error on failure
      */
     function decrypt($text, $keys = array())
     {
@@ -114,14 +118,23 @@
                 $this->gpg->addDecryptKey($key, $password);
             }
 
-            $dec = $this->gpg->decrypt($text);
-            return $dec;
+            return $this->gpg->decrypt($text);
         }
         catch (Exception $e) {
             return $this->get_error_from_exception($e);
         }
     }
 
+    /**
+     * Signing.
+     *
+     * @param string Message body
+     * @param string Key ID
+     * @param string Key password
+     * @param int    Signing mode (enigma_engine::SIGN_*)
+     *
+     * @return mixed True on success or enigma_error on failure
+     */
     function sign($text, $key, $passwd, $mode = null)
     {
         try {
@@ -133,6 +146,14 @@
         }
     }
 
+    /**
+     * Signature verification.
+     *
+     * @param string Message body
+     * @param string Signature, if message is of type PGP/MIME and body doesn't contain it
+     *
+     * @return mixed Signature information (enigma_signature) or enigma_error
+     */
     function verify($text, $signature)
     {
         try {
@@ -144,6 +165,14 @@
         }
     }
 
+    /**
+     * Key file import.
+     *
+     * @param string  File name or file content
+     * @param bollean True if first argument is a filename
+     *
+     * @return mixed Import status array or enigma_error
+     */
     public function import($content, $isfile=false)
     {
         try {
@@ -157,6 +186,30 @@
         }
     }
 
+    /**
+     * Key export.
+     *
+     * @param string Key ID
+     *
+     * @return mixed Key content or enigma_error
+     */
+    public function export($keyid)
+    {
+        try {
+            return $this->gpg->exportPublicKey($keyid, true);
+        }
+        catch (Exception $e) {
+            return $this->get_error_from_exception($e);
+        }
+    }
+
+    /**
+     * Keys listing.
+     *
+     * @param string Optional pattern for key ID, user ID or fingerprint
+     *
+     * @return mixed Array of enigma_key objects or enigma_error
+     */
     public function list_keys($pattern='')
     {
         try {
@@ -175,35 +228,93 @@
         }
     }
 
+    /**
+     * Single key information.
+     *
+     * @param string Key ID, user ID or fingerprint
+     *
+     * @return mixed Key (enigma_key) object or enigma_error
+     */
     public function get_key($keyid)
     {
         $list = $this->list_keys($keyid);
 
-        if (is_array($list))
-            return array_shift($list);
+        if (is_array($list)) {
+            return $list[key($list)];
+        }
 
         // error
         return $list;
     }
 
+    /**
+     * Key pair generation.
+     *
+     * @param array Key/User data (user, email, password, size)
+     *
+     * @return mixed Key (enigma_key) object or enigma_error
+     */
     public function gen_key($data)
     {
+        try {
+            $keygen = new Crypt_GPG_KeyGenerator(array(
+                    'homedir' => $this->homedir,
+                    // 'binary'  => '/usr/bin/gpg2',
+                    // 'debug'   => true,
+            ));
+
+            $key = $keygen
+                ->setExpirationDate(0)
+                ->setPassphrase($data['password'])
+                ->generateKey($data['user'], $data['email']);
+
+            return $this->parse_key($key);
+        }
+        catch (Exception $e) {
+            return $this->get_error_from_exception($e);
+        }
     }
 
+    /**
+     * Key deletion.
+     *
+     * @param string Key ID
+     *
+     * @return mixed True on success or enigma_error
+     */
     public function delete_key($keyid)
     {
         // delete public key
         $result = $this->delete_pubkey($keyid);
 
-        // if not found, delete private key
-        if ($result !== true && $result->getCode() == enigma_error::E_KEYNOTFOUND) {
-            $result = $this->delete_privkey($keyid);
+        // error handling
+        if ($result !== true) {
+            $code = $result->getCode();
+
+            // if not found, delete private key
+            if ($code == enigma_error::KEYNOTFOUND) {
+                $result = $this->delete_privkey($keyid);
+            }
+            // need to delete private key first
+            else if ($code == enigma_error::DELKEY) {
+                $key = $this->get_key($keyid);
+                for ($i = count($key->subkeys) - 1; $i >= 0; $i--) {
+                    $type = ($key->subkeys[$i]->usage & enigma_key::CAN_ENCRYPT) ? 'priv' : 'pub';
+                    $result = $this->{'delete_' . $type . 'key'}($key->subkeys[$i]->id);
+                    if ($result !== true) {
+                        return $result;
+                    }
+                }
+            }
         }
 
         return $result;
     }
 
-    public function delete_privkey($keyid)
+    /**
+     * Private key deletion.
+     */
+    protected function delete_privkey($keyid)
     {
         try {
             $this->gpg->deletePrivateKey($keyid);
@@ -214,7 +325,10 @@
         }
     }
 
-    public function delete_pubkey($keyid)
+    /**
+     * Public key deletion.
+     */
+    protected function delete_pubkey($keyid)
     {
         try {
             $this->gpg->deletePublicKey($keyid);
@@ -232,25 +346,28 @@
      *
      * @return enigma_error Error object
      */
-    private function get_error_from_exception($e)
+    protected function get_error_from_exception($e)
     {
         $data = array();
 
         if ($e instanceof Crypt_GPG_KeyNotFoundException) {
-            $error = enigma_error::E_KEYNOTFOUND;
+            $error = enigma_error::KEYNOTFOUND;
             $data['id'] = $e->getKeyId();
         }
         else if ($e instanceof Crypt_GPG_BadPassphraseException) {
-            $error = enigma_error::E_BADPASS;
+            $error = enigma_error::BADPASS;
             $data['bad']     = $e->getBadPassphrases();
             $data['missing'] = $e->getMissingPassphrases();
         }
-        else if ($e instanceof Crypt_GPG_NoDataException)
-            $error = enigma_error::E_NODATA;
-        else if ($e instanceof Crypt_GPG_DeletePrivateKeyException)
-            $error = enigma_error::E_DELKEY;
-        else
-            $error = enigma_error::E_INTERNAL;
+        else if ($e instanceof Crypt_GPG_NoDataException) {
+            $error = enigma_error::NODATA;
+        }
+        else if ($e instanceof Crypt_GPG_DeletePrivateKeyException) {
+            $error = enigma_error::DELKEY;
+        }
+        else {
+            $error = enigma_error::INTERNAL;
+        }
 
         $msg = $e->getMessage();
 
@@ -264,7 +381,7 @@
      *
      * @return enigma_signature Signature object
      */
-    private function parse_signature($sig)
+    protected function parse_signature($sig)
     {
         $user = $sig->getUserId();
 
@@ -288,7 +405,7 @@
      *
      * @return enigma_key Key object
      */
-    private function parse_key($key)
+    protected function parse_key($key)
     {
         $ekey = new enigma_key();
 
@@ -306,17 +423,18 @@
         $ekey->name = trim($ekey->users[0]->name . ' <' . $ekey->users[0]->email . '>');
 
         foreach ($key->getSubKeys() as $idx => $subkey) {
-                $skey = new enigma_subkey();
-                $skey->id          = $subkey->getId();
-                $skey->revoked     = $subkey->isRevoked();
-                $skey->created     = $subkey->getCreationDate();
-                $skey->expires     = $subkey->getExpirationDate();
-                $skey->fingerprint = $subkey->getFingerprint();
-                $skey->has_private = $subkey->hasPrivate();
-                $skey->can_sign    = $subkey->canSign();
-                $skey->can_encrypt = $subkey->canEncrypt();
+            $skey = new enigma_subkey();
+            $skey->id          = $subkey->getId();
+            $skey->revoked     = $subkey->isRevoked();
+            $skey->created     = $subkey->getCreationDate();
+            $skey->expires     = $subkey->getExpirationDate();
+            $skey->fingerprint = $subkey->getFingerprint();
+            $skey->has_private = $subkey->hasPrivate();
+            $skey->algorithm   = $subkey->getAlgorithm();
+            $skey->length      = $subkey->getLength();
+            $skey->usage       = $subkey->usage();
 
-                $ekey->subkeys[$idx] = $skey;
+            $ekey->subkeys[$idx] = $skey;
         };
 
         $ekey->id = $ekey->subkeys[0]->id;

--
Gitblit v1.9.1