configuration.dart 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. import 'dart:convert';
  2. import 'dart:io' as io;
  3. import 'dart:typed_data';
  4. import 'package:flutter/foundation.dart';
  5. import 'package:flutter_secure_storage/flutter_secure_storage.dart';
  6. import 'package:flutter_sodium/flutter_sodium.dart';
  7. import 'package:path_provider/path_provider.dart';
  8. import 'package:photos/models/key_attributes.dart';
  9. import 'package:shared_preferences/shared_preferences.dart';
  10. import 'package:photos/utils/crypto_util.dart';
  11. class Configuration {
  12. Configuration._privateConstructor();
  13. static final Configuration instance = Configuration._privateConstructor();
  14. static const endpointKey = "endpoint";
  15. static const userIDKey = "user_id";
  16. static const emailKey = "email";
  17. static const tokenKey = "token";
  18. static const hasOptedForE2EKey = "has_opted_for_e2e_encryption";
  19. static const foldersToBackUpKey = "folders_to_back_up";
  20. static const keyKey = "key";
  21. static const secretKeyKey = "secret_key";
  22. static const keyAttributesKey = "key_attributes";
  23. SharedPreferences _preferences;
  24. FlutterSecureStorage _secureStorage;
  25. String _key;
  26. String _secretKey;
  27. String _documentsDirectory;
  28. String _tempDirectory;
  29. String _thumbnailsDirectory;
  30. Future<void> init() async {
  31. _preferences = await SharedPreferences.getInstance();
  32. _secureStorage = FlutterSecureStorage();
  33. _documentsDirectory = (await getApplicationDocumentsDirectory()).path;
  34. _tempDirectory = _documentsDirectory + "/temp/";
  35. _thumbnailsDirectory = _documentsDirectory + "/thumbnails/";
  36. new io.Directory(_tempDirectory).createSync(recursive: true);
  37. new io.Directory(_thumbnailsDirectory).createSync(recursive: true);
  38. _key = await _secureStorage.read(key: keyKey);
  39. _secretKey = await _secureStorage.read(key: secretKeyKey);
  40. }
  41. Future<KeyAttributes> generateAndSaveKey(String passphrase) async {
  42. // Create a master key
  43. final key = CryptoUtil.generateKey();
  44. // Derive a key from the passphrase that will be used to encrypt and
  45. // decrypt the master key
  46. final kekSalt = CryptoUtil.getSaltToDeriveKey();
  47. final kek = CryptoUtil.deriveKey(utf8.encode(passphrase), kekSalt);
  48. // Encrypt the key with this derived key
  49. final encryptedKeyData = CryptoUtil.encryptSync(key, kek);
  50. // Hash the passphrase so that its correctness can be compared later
  51. final kekHash = await CryptoUtil.hash(kek);
  52. // Generate a public-private keypair and encrypt the latter
  53. final keyPair = await CryptoUtil.generateKeyPair();
  54. final encryptedSecretKeyData = CryptoUtil.encryptSync(keyPair.sk, kek);
  55. final attributes = KeyAttributes(
  56. Sodium.bin2base64(kekSalt),
  57. kekHash,
  58. Sodium.bin2base64(encryptedKeyData.encryptedData),
  59. Sodium.bin2base64(encryptedKeyData.nonce),
  60. Sodium.bin2base64(keyPair.pk),
  61. Sodium.bin2base64(encryptedSecretKeyData.encryptedData),
  62. Sodium.bin2base64(encryptedSecretKeyData.nonce),
  63. );
  64. await setKey(Sodium.bin2base64(key));
  65. await setSecretKey(Sodium.bin2base64(keyPair.sk));
  66. await setKeyAttributes(attributes);
  67. return attributes;
  68. }
  69. Future<void> decryptAndSaveKey(
  70. String passphrase, KeyAttributes attributes) async {
  71. final kek = CryptoUtil.deriveKey(
  72. utf8.encode(passphrase), Sodium.base642bin(attributes.kekSalt));
  73. bool correctPassphrase =
  74. await CryptoUtil.verifyHash(kek, attributes.kekHash);
  75. if (!correctPassphrase) {
  76. throw Exception("Incorrect passphrase");
  77. }
  78. final key = CryptoUtil.decryptSync(
  79. Sodium.base642bin(attributes.encryptedKey),
  80. kek,
  81. Sodium.base642bin(attributes.keyDecryptionNonce));
  82. await setKey(Sodium.bin2base64(key));
  83. }
  84. String getHttpEndpoint() {
  85. if (kDebugMode) {
  86. return "http://192.168.0.100";
  87. }
  88. return "https://api.staging.ente.io";
  89. }
  90. Future<void> setEndpoint(String endpoint) async {
  91. await _preferences.setString(endpointKey, endpoint);
  92. }
  93. String getToken() {
  94. return _preferences.getString(tokenKey);
  95. }
  96. Future<void> setToken(String token) async {
  97. await _preferences.setString(tokenKey, token);
  98. }
  99. String getEmail() {
  100. return _preferences.getString(emailKey);
  101. }
  102. Future<void> setEmail(String email) async {
  103. await _preferences.setString(emailKey, email);
  104. }
  105. int getUserID() {
  106. return _preferences.getInt(userIDKey);
  107. }
  108. Future<void> setUserID(int userID) async {
  109. await _preferences.setInt(userIDKey, userID);
  110. }
  111. Future<void> setOptInForE2E(bool hasOptedForE2E) async {
  112. await _preferences.setBool(hasOptedForE2EKey, hasOptedForE2E);
  113. }
  114. bool hasOptedForE2E() {
  115. return true;
  116. // return _preferences.getBool(hasOptedForE2EKey);
  117. }
  118. Set<String> getFoldersToBackUp() {
  119. if (_preferences.containsKey(foldersToBackUpKey)) {
  120. return _preferences.getStringList(foldersToBackUpKey).toSet();
  121. } else {
  122. final foldersToBackUp = Set<String>();
  123. foldersToBackUp.add("Camera");
  124. foldersToBackUp.add("Recents");
  125. foldersToBackUp.add("DCIM");
  126. foldersToBackUp.add("Download");
  127. foldersToBackUp.add("Screenshot");
  128. return foldersToBackUp;
  129. }
  130. }
  131. Future<void> setFoldersToBackUp(Set<String> folders) async {
  132. await _preferences.setStringList(foldersToBackUpKey, folders.toList());
  133. }
  134. Future<void> setKeyAttributes(KeyAttributes attributes) async {
  135. await _preferences.setString(
  136. keyAttributesKey, attributes == null ? null : attributes.toJson());
  137. }
  138. KeyAttributes getKeyAttributes() {
  139. final jsonValue = _preferences.getString(keyAttributesKey);
  140. if (jsonValue == null) {
  141. return null;
  142. } else {
  143. return KeyAttributes.fromJson(jsonValue);
  144. }
  145. }
  146. Future<void> setKey(String key) async {
  147. _key = key;
  148. if (key == null) {
  149. await _secureStorage.delete(key: keyKey);
  150. } else {
  151. await _secureStorage.write(key: keyKey, value: key);
  152. }
  153. }
  154. Future<void> setSecretKey(String secretKey) async {
  155. _secretKey = secretKey;
  156. if (secretKey == null) {
  157. await _secureStorage.delete(key: secretKeyKey);
  158. } else {
  159. await _secureStorage.write(key: secretKeyKey, value: secretKey);
  160. }
  161. }
  162. Uint8List getKey() {
  163. return _key == null ? null : Sodium.base642bin(_key);
  164. }
  165. Uint8List getSecretKey() {
  166. return _secretKey == null ? null : Sodium.base642bin(_secretKey);
  167. }
  168. String getDocumentsDirectory() {
  169. return _documentsDirectory;
  170. }
  171. String getThumbnailsDirectory() {
  172. return _thumbnailsDirectory;
  173. }
  174. String getTempDirectory() {
  175. return _tempDirectory;
  176. }
  177. bool hasConfiguredAccount() {
  178. return getToken() != null && getKey() != null;
  179. }
  180. }