mirror of
https://github.com/PrivateBin/PrivateBin.git
synced 2024-10-01 01:26:10 -04:00
initial refactoring for support of version 2 paste format, some cleanup on the side
This commit is contained in:
parent
f3165f0cab
commit
0ab06e34ec
462
js/privatebin.js
462
js/privatebin.js
@ -701,17 +701,25 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
* @private
|
||||
* @param {string} key
|
||||
* @param {string} password
|
||||
* @param {object} object cryptographic message
|
||||
* @param {array} spec cryptographic specification
|
||||
* @return {CryptoKey} derived key
|
||||
*/
|
||||
async function deriveKey(key, password, object)
|
||||
async function deriveKey(key, password, spec)
|
||||
{
|
||||
let keyArray = StrToArr(key);
|
||||
if ((password || '').trim().length > 0) {
|
||||
keyArray += await window.crypto.subtle.digest(
|
||||
let passwordBuffer = await window.crypto.subtle.digest(
|
||||
{name: 'SHA-256'},
|
||||
StrToArr(password)
|
||||
StrToArr(utob(password))
|
||||
);
|
||||
let hexHash = Array.prototype.map.call(
|
||||
new Uint8Array(passwordBuffer), x => ('00' + x.toString(16)).slice(-2)
|
||||
).join('');
|
||||
let passwordArray = StrToArr(hexHash),
|
||||
newKeyArray = new Uint8Array(keyArray.length + passwordArray.length);
|
||||
newKeyArray.set(keyArray, 0);
|
||||
newKeyArray.set(passwordArray, keyArray.length);
|
||||
keyArray = newKeyArray;
|
||||
}
|
||||
|
||||
// import raw key
|
||||
@ -724,39 +732,40 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
);
|
||||
|
||||
// derive a stronger key for use with AES
|
||||
return await window.crypto.subtle.deriveKey(
|
||||
return window.crypto.subtle.deriveKey(
|
||||
{
|
||||
name: 'PBKDF2', // we use PBKDF2 for key derivation
|
||||
salt: StrToArr(atob(object.salt)), // salt used in HMAC
|
||||
iterations: object.iter, // amount of iterations to apply
|
||||
salt: StrToArr(spec[1]), // salt used in HMAC
|
||||
iterations: spec[2], // amount of iterations to apply
|
||||
hash: {name: 'SHA-256'} // can be "SHA-1", "SHA-256", "SHA-384" or "SHA-512"
|
||||
},
|
||||
importedKey,
|
||||
{
|
||||
name: 'AES-' + object.mode.toUpperCase(), // can be any supported AES algorithm ("AES-CTR", "AES-CBC", "AES-CMAC", "AES-GCM", "AES-CFB", "AES-KW", "ECDH", "DH" or "HMAC")
|
||||
length: object.ks // can be 128, 192 or 256
|
||||
name: 'AES-' + spec[6].toUpperCase(), // can be any supported AES algorithm ("AES-CTR", "AES-CBC", "AES-CMAC", "AES-GCM", "AES-CFB", "AES-KW", "ECDH", "DH" or "HMAC")
|
||||
length: spec[3] // can be 128, 192 or 256
|
||||
},
|
||||
false, // the key may not be exported
|
||||
['encrypt'] // we may only use it for decryption
|
||||
['encrypt', 'decrypt'] // we use it for de- and encryption
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* gets crypto settings from given object
|
||||
* gets crypto settings from specification and authenticated data
|
||||
*
|
||||
* @name CryptTool.cryptoSettings
|
||||
* @function
|
||||
* @private
|
||||
* @param {object} object cryptographic message
|
||||
* @param {string} adata authenticated data
|
||||
* @param {array} spec cryptographic specification
|
||||
* @return {object} crypto settings
|
||||
*/
|
||||
function cryptoSettings(object)
|
||||
function cryptoSettings(adata, spec)
|
||||
{
|
||||
return {
|
||||
name: 'AES-' + object.mode.toUpperCase(), // can be any supported AES algorithm ("AES-CTR", "AES-CBC", "AES-CMAC", "AES-GCM", "AES-CFB", "AES-KW", "ECDH", "DH" or "HMAC")
|
||||
iv: StrToArr(atob(object.iv)), // the initialization vector you used to encrypt
|
||||
additionalData: StrToArr(atob(object.adata)), // the addtional data you used during encryption (if any)
|
||||
tagLength: object.ts // the length of the tag you used to encrypt (if any)
|
||||
name: 'AES-' + spec[6].toUpperCase(), // can be any supported AES algorithm ("AES-CTR", "AES-CBC", "AES-CMAC", "AES-GCM", "AES-CFB", "AES-KW", "ECDH", "DH" or "HMAC")
|
||||
iv: StrToArr(spec[0]), // the initialization vector you used to encrypt
|
||||
additionalData: StrToArr(adata), // the addtional data you used during encryption (if any)
|
||||
tagLength: spec[4] // the length of the tag you used to encrypt (if any)
|
||||
};
|
||||
}
|
||||
|
||||
@ -769,32 +778,53 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
* @param {string} key
|
||||
* @param {string} password
|
||||
* @param {string} message
|
||||
* @return {string} data - JSON with encrypted data
|
||||
* @param {array} adata
|
||||
* @return {array} encrypted message & adata containing encryption spec
|
||||
*/
|
||||
me.cipher = async function(key, password, message)
|
||||
me.cipher = async function(key, password, message, adata)
|
||||
{
|
||||
// AES in Galois Counter Mode, keysize 256 bit, authentication tag 128 bit, 10000 iterations in key derivation
|
||||
const iv = getRandomBytes(16);
|
||||
let object = {
|
||||
iv: btoa(iv),
|
||||
v: 1,
|
||||
iter: 10000,
|
||||
ks: 256,
|
||||
ts: 128,
|
||||
mode: 'gcm',
|
||||
adata: '', // if used, base64 encode it with btoa()
|
||||
cipher: 'aes',
|
||||
salt: btoa(getRandomBytes(8))
|
||||
};
|
||||
// AES in Galois Counter Mode, keysize 256 bit,
|
||||
// authentication tag 128 bit, 10000 iterations in key derivation
|
||||
const spec = [
|
||||
getRandomBytes(16), // initialization vector
|
||||
getRandomBytes(8), // salt
|
||||
10000, // iterations
|
||||
256, // key size
|
||||
128, // tag size
|
||||
'aes', // algorithm
|
||||
'gcm', // algorithm mode
|
||||
'none' // compression
|
||||
], encodedSpec = [
|
||||
btoa(spec[0]),
|
||||
btoa(spec[1]),
|
||||
spec[2],
|
||||
spec[3],
|
||||
spec[4],
|
||||
spec[5],
|
||||
spec[6],
|
||||
spec[7]
|
||||
];
|
||||
if (adata.length === 0) {
|
||||
// comment
|
||||
adata = encodedSpec;
|
||||
} else if (adata[0] === null) {
|
||||
// paste
|
||||
adata[0] = encodedSpec;
|
||||
}
|
||||
|
||||
// finally, encrypt message
|
||||
const encrypted = await window.crypto.subtle.encrypt(
|
||||
cryptoSettings(object),
|
||||
await deriveKey(key, password, object),
|
||||
StrToArr(compress(message)) // compressed plain text to encrypt
|
||||
);
|
||||
object.ct = btoa(ArrToStr(encrypted));
|
||||
return JSON.stringify(object);
|
||||
return [
|
||||
btoa(
|
||||
ArrToStr(
|
||||
await window.crypto.subtle.encrypt(
|
||||
cryptoSettings(JSON.stringify(adata), spec),
|
||||
await deriveKey(key, password, spec),
|
||||
StrToArr(utob(message))
|
||||
)
|
||||
)
|
||||
),
|
||||
adata
|
||||
];
|
||||
};
|
||||
|
||||
/**
|
||||
@ -805,25 +835,57 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
* @function
|
||||
* @param {string} key
|
||||
* @param {string} password
|
||||
* @param {string} data - JSON with encrypted data
|
||||
* @param {string|object} data encrypted message
|
||||
* @return {string} decrypted message, empty if decryption failed
|
||||
*/
|
||||
me.decipher = async function(key, password, data)
|
||||
{
|
||||
let adataString, encodedSpec, compression, cipherMessage;
|
||||
if (data instanceof Array) {
|
||||
// version 2
|
||||
adataString = JSON.stringify(data[1]);
|
||||
encodedSpec = (data[1][0] instanceof Array ? data[1][0] : data[1]);
|
||||
cipherMessage = data[0];
|
||||
} else if (typeof data === 'string') {
|
||||
// version 1
|
||||
let object = JSON.parse(data);
|
||||
adataString = atob(object.adata);
|
||||
encodedSpec = [
|
||||
object.iv,
|
||||
object.salt,
|
||||
object.iter,
|
||||
object.ks,
|
||||
object.ts,
|
||||
object.cipher,
|
||||
object.mode,
|
||||
'rawdeflate'
|
||||
];
|
||||
cipherMessage = object.ct;
|
||||
} else {
|
||||
throw 'unsupported message format';
|
||||
}
|
||||
compression = encodedSpec[7];
|
||||
let spec = encodedSpec, plainText = '';
|
||||
spec[0] = atob(spec[0]);
|
||||
spec[1] = atob(spec[1]);
|
||||
try {
|
||||
const object = JSON.parse(data);
|
||||
return decompress(
|
||||
ArrToStr(
|
||||
await window.crypto.subtle.decrypt(
|
||||
cryptoSettings(object),
|
||||
await deriveKey(key, password, object),
|
||||
StrToArr(atob(object.ct)) // cipher text to decrypt
|
||||
)
|
||||
plainText = ArrToStr(
|
||||
await window.crypto.subtle.decrypt(
|
||||
cryptoSettings(adataString, spec),
|
||||
await deriveKey(key, password, spec),
|
||||
StrToArr(atob(cipherMessage))
|
||||
)
|
||||
);
|
||||
} catch(err) {
|
||||
return '';
|
||||
}
|
||||
if (compression === 'none') {
|
||||
return btou(plainText);
|
||||
} else if (compression === 'rawdeflate') {
|
||||
return decompress(plainText);
|
||||
} else {
|
||||
throw 'unsupported compression format';
|
||||
}
|
||||
};
|
||||
|
||||
/**
|
||||
@ -906,25 +968,25 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
}
|
||||
|
||||
// reload data
|
||||
Uploader.prepare();
|
||||
Uploader.setUrl(Helper.baseUri() + '?' + me.getPasteId());
|
||||
ServerInteraction.prepare();
|
||||
ServerInteraction.setUrl(Helper.baseUri() + '?' + me.getPasteId());
|
||||
|
||||
Uploader.setFailure(function (status, data) {
|
||||
ServerInteraction.setFailure(function (status, data) {
|
||||
// revert loading status…
|
||||
Alert.hideLoading();
|
||||
TopNav.showViewButtons();
|
||||
|
||||
// show error message
|
||||
Alert.showError(Uploader.parseUploadError(status, data, 'get paste data'));
|
||||
Alert.showError(ServerInteraction.parseUploadError(status, data, 'get paste data'));
|
||||
});
|
||||
Uploader.setSuccess(function (status, data) {
|
||||
ServerInteraction.setSuccess(function (status, data) {
|
||||
pasteData = data;
|
||||
|
||||
if (typeof callback === 'function') {
|
||||
return callback(data);
|
||||
}
|
||||
});
|
||||
Uploader.run();
|
||||
ServerInteraction.run();
|
||||
};
|
||||
|
||||
/**
|
||||
@ -1290,7 +1352,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
*/
|
||||
me.showStatus = function(message, icon)
|
||||
{
|
||||
console.info('status shown: ', message);
|
||||
handleNotification(1, $statusMessage, message, icon);
|
||||
};
|
||||
|
||||
@ -1307,7 +1368,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
*/
|
||||
me.showError = function(message, icon)
|
||||
{
|
||||
console.error('error message shown: ', message);
|
||||
handleNotification(3, $errorMessage, message, icon);
|
||||
};
|
||||
|
||||
@ -1322,7 +1382,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
*/
|
||||
me.showRemaining = function(message)
|
||||
{
|
||||
console.info('remaining message shown: ', message);
|
||||
handleNotification(1, $remainingTime, message);
|
||||
};
|
||||
|
||||
@ -1338,10 +1397,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
*/
|
||||
me.showLoading = function(message, icon)
|
||||
{
|
||||
if (typeof message !== 'undefined' && message !== null) {
|
||||
console.info('status changed: ', message);
|
||||
}
|
||||
|
||||
// default message text
|
||||
if (typeof message === 'undefined') {
|
||||
message = 'Loading…';
|
||||
@ -2132,7 +2187,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
me.hide = function()
|
||||
{
|
||||
if (!isDisplayed) {
|
||||
console.warn('PasteViewer was called to hide the parsed view, but it is already hidden.');
|
||||
return;
|
||||
}
|
||||
|
||||
$plainText.addClass('hidden');
|
||||
@ -3184,7 +3239,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
me.showViewButtons = function()
|
||||
{
|
||||
if (viewButtonsDisplayed) {
|
||||
console.warn('showViewButtons: view buttons are already displayed');
|
||||
return;
|
||||
}
|
||||
|
||||
@ -3205,7 +3259,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
me.hideViewButtons = function()
|
||||
{
|
||||
if (!viewButtonsDisplayed) {
|
||||
console.warn('hideViewButtons: view buttons are already hidden');
|
||||
return;
|
||||
}
|
||||
|
||||
@ -3238,7 +3291,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
me.showCreateButtons = function()
|
||||
{
|
||||
if (createButtonsDisplayed) {
|
||||
console.warn('showCreateButtons: create buttons are already displayed');
|
||||
return;
|
||||
}
|
||||
|
||||
@ -3263,7 +3315,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
me.hideCreateButtons = function()
|
||||
{
|
||||
if (!createButtonsDisplayed) {
|
||||
console.warn('hideCreateButtons: create buttons are already hidden');
|
||||
return;
|
||||
}
|
||||
|
||||
@ -3534,23 +3585,23 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* Responsible for AJAX requests, transparently handles encryption…
|
||||
*
|
||||
* @name Uploader
|
||||
* @name ServerInteraction
|
||||
* @class
|
||||
*/
|
||||
var Uploader = (function () {
|
||||
var ServerInteraction = (function () {
|
||||
var me = {};
|
||||
|
||||
var successFunc = null,
|
||||
failureFunc = null,
|
||||
symmetricKey = null,
|
||||
url,
|
||||
data,
|
||||
symmetricKey,
|
||||
password;
|
||||
|
||||
/**
|
||||
* public variable ('constant') for errors to prevent magic numbers
|
||||
*
|
||||
* @name Uploader.error
|
||||
* @name ServerInteraction.error
|
||||
* @readonly
|
||||
* @enum {Object}
|
||||
*/
|
||||
@ -3564,7 +3615,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* ajaxHeaders to send in AJAX requests
|
||||
*
|
||||
* @name Uploader.ajaxHeaders
|
||||
* @name ServerInteraction.ajaxHeaders
|
||||
* @private
|
||||
* @readonly
|
||||
* @enum {Object}
|
||||
@ -3574,40 +3625,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* called after successful upload
|
||||
*
|
||||
* @name Uploader.checkCryptParameters
|
||||
* @private
|
||||
* @function
|
||||
* @throws {string}
|
||||
*/
|
||||
function checkCryptParameters()
|
||||
{
|
||||
// workaround for this nasty 'bug' in ECMAScript
|
||||
// see https://stackoverflow.com/questions/18808226/why-is-typeof-null-object
|
||||
var typeOfKey = typeof symmetricKey;
|
||||
if (symmetricKey === null) {
|
||||
typeOfKey = 'null';
|
||||
}
|
||||
|
||||
// in case of missing preparation, throw error
|
||||
switch (typeOfKey) {
|
||||
case 'string':
|
||||
// already set, all right
|
||||
return;
|
||||
case 'null':
|
||||
// needs to be generated auto-generate
|
||||
symmetricKey = CryptTool.getSymmetricKey();
|
||||
break;
|
||||
default:
|
||||
console.error('current invalid symmetricKey: ', symmetricKey);
|
||||
throw 'symmetricKey is invalid, probably the module was not prepared';
|
||||
}
|
||||
// password is optional
|
||||
}
|
||||
|
||||
/**
|
||||
* called after successful upload
|
||||
*
|
||||
* @name Uploader.success
|
||||
* @name ServerInteraction.success
|
||||
* @private
|
||||
* @function
|
||||
* @param {int} status
|
||||
@ -3627,7 +3645,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* called after a upload failure
|
||||
*
|
||||
* @name Uploader.fail
|
||||
* @name ServerInteraction.fail
|
||||
* @private
|
||||
* @function
|
||||
* @param {int} status - internal code
|
||||
@ -3643,13 +3661,13 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* actually uploads the data
|
||||
*
|
||||
* @name Uploader.run
|
||||
* @name ServerInteraction.run
|
||||
* @function
|
||||
*/
|
||||
me.run = function()
|
||||
{
|
||||
$.ajax({
|
||||
type: 'POST',
|
||||
type: data ? 'POST' : 'GET',
|
||||
url: url,
|
||||
data: data,
|
||||
dataType: 'json',
|
||||
@ -3673,7 +3691,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* set success function
|
||||
*
|
||||
* @name Uploader.setUrl
|
||||
* @name ServerInteraction.setUrl
|
||||
* @function
|
||||
* @param {function} newUrl
|
||||
*/
|
||||
@ -3684,11 +3702,11 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
|
||||
/**
|
||||
* sets the password to use (first value) and optionally also the
|
||||
* encryption key (not recommend, it is automatically generated).
|
||||
* encryption key (not recommended, it is automatically generated).
|
||||
*
|
||||
* Note: Call this after prepare() as prepare() resets these values.
|
||||
*
|
||||
* @name Uploader.setCryptValues
|
||||
* @name ServerInteraction.setCryptValues
|
||||
* @function
|
||||
* @param {string} newPassword
|
||||
* @param {string} newKey - optional
|
||||
@ -3705,7 +3723,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* set success function
|
||||
*
|
||||
* @name Uploader.setSuccess
|
||||
* @name ServerInteraction.setSuccess
|
||||
* @function
|
||||
* @param {function} func
|
||||
*/
|
||||
@ -3717,7 +3735,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* set failure function
|
||||
*
|
||||
* @name Uploader.setFailure
|
||||
* @name ServerInteraction.setFailure
|
||||
* @function
|
||||
* @param {function} func
|
||||
*/
|
||||
@ -3733,7 +3751,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
* previous uploads. Must be called before any other method of this
|
||||
* module.
|
||||
*
|
||||
* @name Uploader.prepare
|
||||
* @name ServerInteraction.prepare
|
||||
* @function
|
||||
* @return {object}
|
||||
*/
|
||||
@ -3757,22 +3775,33 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
/**
|
||||
* encrypts and sets the data
|
||||
*
|
||||
* @name Uploader.setData
|
||||
* @name ServerInteraction.setCipherMessage
|
||||
* @async
|
||||
* @function
|
||||
* @param {string} index
|
||||
* @param {mixed} element
|
||||
* @param {object} cipherMessage
|
||||
*/
|
||||
me.setData = async function(index, element)
|
||||
me.setCipherMessage = async function(cipherMessage)
|
||||
{
|
||||
checkCryptParameters();
|
||||
data[index] = await CryptTool.cipher(symmetricKey, password, element);
|
||||
if (
|
||||
symmetricKey === null ||
|
||||
(typeof symmetricKey === 'string' && symmetricKey === '')
|
||||
) {
|
||||
symmetricKey = CryptTool.getSymmetricKey();
|
||||
}
|
||||
if (!data.hasOwnProperty('adata')) {
|
||||
data['adata'] = [];
|
||||
}
|
||||
let cipherResult = await CryptTool.cipher(symmetricKey, password, JSON.stringify(cipherMessage), data['adata']);
|
||||
data['v'] = 2;
|
||||
data['ct'] = cipherResult[0];
|
||||
data['adata'] = cipherResult[1];
|
||||
|
||||
};
|
||||
|
||||
/**
|
||||
* set the additional metadata to send unencrypted
|
||||
*
|
||||
* @name Uploader.setUnencryptedData
|
||||
* @name ServerInteraction.setUnencryptedData
|
||||
* @function
|
||||
* @param {string} index
|
||||
* @param {mixed} element
|
||||
@ -3783,21 +3812,9 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
};
|
||||
|
||||
/**
|
||||
* set the additional metadata to send unencrypted passed at once
|
||||
* Helper, which parses shows a general error message based on the result of the ServerInteraction
|
||||
*
|
||||
* @name Uploader.setUnencryptedData
|
||||
* @function
|
||||
* @param {object} newData
|
||||
*/
|
||||
me.setUnencryptedBulkData = function(newData)
|
||||
{
|
||||
$.extend(data, newData);
|
||||
};
|
||||
|
||||
/**
|
||||
* Helper, which parses shows a general error message based on the result of the Uploader
|
||||
*
|
||||
* @name Uploader.parseUploadError
|
||||
* @name ServerInteraction.parseUploadError
|
||||
* @function
|
||||
* @param {int} status
|
||||
* @param {object} data
|
||||
@ -3825,24 +3842,13 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
return errorArray;
|
||||
};
|
||||
|
||||
/**
|
||||
* init Uploader
|
||||
*
|
||||
* @name Uploader.init
|
||||
* @function
|
||||
*/
|
||||
me.init = function()
|
||||
{
|
||||
// nothing yet
|
||||
};
|
||||
|
||||
return me;
|
||||
})();
|
||||
|
||||
/**
|
||||
* (controller) Responsible for encrypting paste and sending it to server.
|
||||
*
|
||||
* Does upload, encryption is done transparently by Uploader.
|
||||
* Does upload, encryption is done transparently by ServerInteraction.
|
||||
*
|
||||
* @name PasteEncrypter
|
||||
* @class
|
||||
@ -3906,43 +3912,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* adds attachments to the Uploader
|
||||
*
|
||||
* @name PasteEncrypter.encryptAttachments
|
||||
* @private
|
||||
* @function
|
||||
* @param {function} callback - excuted when action is successful
|
||||
*/
|
||||
function encryptAttachments(callback) {
|
||||
var file = AttachmentViewer.getAttachmentData();
|
||||
|
||||
let encryptAttachmentPromise, encryptAttachmentNamePromise;
|
||||
if (typeof file !== 'undefined' && file !== null) {
|
||||
var fileName = AttachmentViewer.getFile().name;
|
||||
|
||||
// run concurrently to encrypt everything
|
||||
encryptAttachmentPromise = Uploader.setData('attachment', file);
|
||||
encryptAttachmentNamePromise = Uploader.setData('attachmentname', fileName);
|
||||
} else if (AttachmentViewer.hasAttachment()) {
|
||||
// fall back to cloned part
|
||||
var attachment = AttachmentViewer.getAttachment();
|
||||
|
||||
encryptAttachmentPromise = Uploader.setData('attachment', attachment[0]);
|
||||
encryptAttachmentNamePromise = Uploader.setData('attachmentname', attachment[1]);
|
||||
} else {
|
||||
// if there are no attachments, this is of course still successful
|
||||
return callback();
|
||||
}
|
||||
|
||||
// TODO: change this callback to also use Promises instead,
|
||||
// this here just waits
|
||||
return Promise.all([encryptAttachmentPromise, encryptAttachmentNamePromise]).then(() => {
|
||||
// run callback
|
||||
return callback();
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* send a reply in a discussion
|
||||
*
|
||||
@ -3973,20 +3942,20 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
return;
|
||||
}
|
||||
|
||||
// prepare Uploader
|
||||
Uploader.prepare();
|
||||
Uploader.setCryptParameters(Prompt.getPassword(), Model.getPasteKey());
|
||||
// prepare server interaction
|
||||
ServerInteraction.prepare();
|
||||
ServerInteraction.setCryptParameters(Prompt.getPassword(), Model.getPasteKey());
|
||||
|
||||
// set success/fail functions
|
||||
Uploader.setSuccess(showUploadedComment);
|
||||
Uploader.setFailure(function (status, data) {
|
||||
ServerInteraction.setSuccess(showUploadedComment);
|
||||
ServerInteraction.setFailure(function (status, data) {
|
||||
// revert loading status…
|
||||
Alert.hideLoading();
|
||||
TopNav.showViewButtons();
|
||||
|
||||
// …show error message…
|
||||
Alert.showError(
|
||||
Uploader.parseUploadError(status, data, 'post comment')
|
||||
ServerInteraction.parseUploadError(status, data, 'post comment')
|
||||
);
|
||||
|
||||
// …and reset error handler
|
||||
@ -3994,28 +3963,24 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
});
|
||||
|
||||
// fill it with unencrypted params
|
||||
Uploader.setUnencryptedData('pasteid', Model.getPasteId());
|
||||
ServerInteraction.setUnencryptedData('pasteid', Model.getPasteId());
|
||||
if (typeof parentid === 'undefined') {
|
||||
// if parent id is not set, this is the top-most comment, so use
|
||||
// paste id as parent, as the root element of the discussion tree
|
||||
Uploader.setUnencryptedData('parentid', Model.getPasteId());
|
||||
ServerInteraction.setUnencryptedData('parentid', Model.getPasteId());
|
||||
} else {
|
||||
Uploader.setUnencryptedData('parentid', parentid);
|
||||
ServerInteraction.setUnencryptedData('parentid', parentid);
|
||||
}
|
||||
|
||||
// start promises to encrypt data…
|
||||
let dataPromises = [];
|
||||
dataPromises.push(Uploader.setData('data', plainText));
|
||||
// prepare cypher message
|
||||
let cipherMessage = {
|
||||
'comment': plainText
|
||||
};
|
||||
if (nickname.length > 0) {
|
||||
dataPromises.push(Uploader.setData('nickname', nickname));
|
||||
cipherMessage['nickname'] = nickname;
|
||||
}
|
||||
|
||||
// …and upload when they are all done
|
||||
Promise.all(dataPromises).then(() => {
|
||||
Uploader.run();
|
||||
}).catch((e) => {
|
||||
Alert.showError(e);
|
||||
});
|
||||
await ServerInteraction.setCipherMessage(cipherMessage).catch(Alert.showError);
|
||||
};
|
||||
|
||||
/**
|
||||
@ -4049,60 +4014,55 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
return;
|
||||
}
|
||||
|
||||
// prepare Uploader
|
||||
Uploader.prepare();
|
||||
Uploader.setCryptParameters(TopNav.getPassword());
|
||||
// prepare server interaction
|
||||
ServerInteraction.prepare();
|
||||
ServerInteraction.setCryptParameters(TopNav.getPassword());
|
||||
|
||||
// set success/fail functions
|
||||
Uploader.setSuccess(showCreatedPaste);
|
||||
Uploader.setFailure(function (status, data) {
|
||||
ServerInteraction.setSuccess(showCreatedPaste);
|
||||
ServerInteraction.setFailure(function (status, data) {
|
||||
// revert loading status…
|
||||
Alert.hideLoading();
|
||||
TopNav.showCreateButtons();
|
||||
|
||||
// show error message
|
||||
Alert.showError(
|
||||
Uploader.parseUploadError(status, data, 'create paste')
|
||||
ServerInteraction.parseUploadError(status, data, 'create paste')
|
||||
);
|
||||
});
|
||||
|
||||
// fill it with unencrypted submitted options
|
||||
Uploader.setUnencryptedBulkData({
|
||||
expire: TopNav.getExpiration(),
|
||||
formatter: format,
|
||||
burnafterreading: TopNav.getBurnAfterReading() ? 1 : 0,
|
||||
opendiscussion: TopNav.getOpenDiscussion() ? 1 : 0
|
||||
});
|
||||
ServerInteraction.setUnencryptedData('adata', [
|
||||
null, format,
|
||||
TopNav.getOpenDiscussion() ? 1 : 0,
|
||||
TopNav.getBurnAfterReading() ? 1 : 0
|
||||
]);
|
||||
ServerInteraction.setUnencryptedData('meta', {'expire': TopNav.getExpiration()});
|
||||
|
||||
// prepare PasteViewer for later preview
|
||||
PasteViewer.setText(plainText);
|
||||
PasteViewer.setFormat(format);
|
||||
|
||||
// encrypt attachments
|
||||
const encryptAttachmentsPromise = encryptAttachments(
|
||||
function () {
|
||||
// TODO: remove, is not needed anymore as we use Promises
|
||||
}
|
||||
);
|
||||
// prepare cypher message
|
||||
let file = AttachmentViewer.getAttachmentData(),
|
||||
cipherMessage = {
|
||||
'paste': plainText
|
||||
};
|
||||
if (typeof file !== 'undefined' && file !== null) {
|
||||
cipherMessage['attachment'] = file;
|
||||
cipherMessage['attachment_name'] = AttachmentViewer.getFile().name;
|
||||
} else if (AttachmentViewer.hasAttachment()) {
|
||||
// fall back to cloned part
|
||||
let attachment = AttachmentViewer.getAttachment();
|
||||
cipherMessage['attachment'] = attachment[0];
|
||||
cipherMessage['attachment_name'] = attachment[1];
|
||||
}
|
||||
|
||||
// encrypt plain text
|
||||
const encryptDataPromise = Uploader.setData('data', plainText);
|
||||
|
||||
await Promise.all([encryptAttachmentsPromise, encryptDataPromise]).catch(Alert.showError);
|
||||
// encrypt message
|
||||
await ServerInteraction.setCipherMessage(cipherMessage).catch(Alert.showError);
|
||||
|
||||
// send data
|
||||
Uploader.run();
|
||||
};
|
||||
|
||||
/**
|
||||
* initialize
|
||||
*
|
||||
* @name PasteEncrypter.init
|
||||
* @function
|
||||
*/
|
||||
me.init = function()
|
||||
{
|
||||
// nothing yet
|
||||
ServerInteraction.run();
|
||||
};
|
||||
|
||||
return me;
|
||||
@ -4347,17 +4307,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
});
|
||||
};
|
||||
|
||||
/**
|
||||
* initialize
|
||||
*
|
||||
* @name PasteDecrypter.init
|
||||
* @function
|
||||
*/
|
||||
me.init = function()
|
||||
{
|
||||
// nothing yet
|
||||
};
|
||||
|
||||
return me;
|
||||
})();
|
||||
|
||||
@ -4457,20 +4406,20 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
var orgPosition = $(window).scrollTop();
|
||||
|
||||
Model.getPasteData(function (data) {
|
||||
Uploader.prepare();
|
||||
Uploader.setUrl(Helper.baseUri() + '?' + Model.getPasteId());
|
||||
ServerInteraction.prepare();
|
||||
ServerInteraction.setUrl(Helper.baseUri() + '?' + Model.getPasteId());
|
||||
|
||||
Uploader.setFailure(function (status, data) {
|
||||
ServerInteraction.setFailure(function (status, data) {
|
||||
// revert loading status…
|
||||
Alert.hideLoading();
|
||||
TopNav.showViewButtons();
|
||||
|
||||
// show error message
|
||||
Alert.showError(
|
||||
Uploader.parseUploadError(status, data, 'refresh display')
|
||||
ServerInteraction.parseUploadError(status, data, 'refresh display')
|
||||
);
|
||||
});
|
||||
Uploader.setSuccess(function (status, data) {
|
||||
ServerInteraction.setSuccess(function (status, data) {
|
||||
PasteDecrypter.run(data);
|
||||
|
||||
// restore position
|
||||
@ -4481,7 +4430,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
// password being entered
|
||||
callback();
|
||||
});
|
||||
Uploader.run();
|
||||
ServerInteraction.run();
|
||||
}, false); // this false is important as it circumvents the cache
|
||||
}
|
||||
|
||||
@ -4551,14 +4500,11 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
AttachmentViewer.init();
|
||||
DiscussionViewer.init();
|
||||
Editor.init();
|
||||
PasteDecrypter.init();
|
||||
PasteEncrypter.init();
|
||||
PasteStatus.init();
|
||||
PasteViewer.init();
|
||||
Prompt.init();
|
||||
TopNav.init();
|
||||
UiHelper.init();
|
||||
Uploader.init();
|
||||
|
||||
// check whether existing paste needs to be shown
|
||||
try {
|
||||
@ -4602,7 +4548,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
|
||||
AttachmentViewer: AttachmentViewer,
|
||||
DiscussionViewer: DiscussionViewer,
|
||||
TopNav: TopNav,
|
||||
Uploader: Uploader,
|
||||
ServerInteraction: ServerInteraction,
|
||||
PasteEncrypter: PasteEncrypter,
|
||||
PasteDecrypter: PasteDecrypter,
|
||||
Controller: Controller
|
||||
|
@ -2,6 +2,11 @@
|
||||
require('../common');
|
||||
|
||||
describe('CryptTool', function () {
|
||||
afterEach(async function () {
|
||||
// pause to let async functions conclude
|
||||
await new Promise(resolve => setTimeout(resolve, 1900));
|
||||
});
|
||||
|
||||
describe('cipher & decipher', function () {
|
||||
this.timeout(30000);
|
||||
it('can en- and decrypt any message', function () {
|
||||
@ -9,24 +14,22 @@ describe('CryptTool', function () {
|
||||
'string',
|
||||
'string',
|
||||
'string',
|
||||
function (key, password, message) {
|
||||
var clean = jsdom();
|
||||
async function (key, password, message) {
|
||||
// pause to let async functions conclude
|
||||
await new Promise(resolve => setTimeout(resolve, 300));
|
||||
let clean = jsdom();
|
||||
window.crypto = new WebCrypto();
|
||||
message = message.trim();
|
||||
return $.PrivateBin.CryptTool.cipher(
|
||||
key, password, message
|
||||
).then(function(ciphertext) {
|
||||
$.PrivateBin.CryptTool.decipher(
|
||||
key, password, ciphertext
|
||||
).then(function(plaintext) {
|
||||
clean();
|
||||
return message === plaintext;
|
||||
});
|
||||
});
|
||||
let cipherMessage = await $.PrivateBin.CryptTool.cipher(
|
||||
key, password, message, []
|
||||
),
|
||||
plaintext = await $.PrivateBin.CryptTool.decipher(
|
||||
key, password, cipherMessage
|
||||
);
|
||||
clean();
|
||||
return message === plaintext;
|
||||
}
|
||||
),
|
||||
// reducing amount of checks as running 100 async ones causes issues for later test scripts
|
||||
{tests: 3});
|
||||
));
|
||||
});
|
||||
|
||||
// The below static unit tests are included to ensure deciphering of "classic"
|
||||
@ -35,7 +38,7 @@ describe('CryptTool', function () {
|
||||
'supports PrivateBin v1 ciphertext (SJCL & browser atob)',
|
||||
function () {
|
||||
delete global.Base64;
|
||||
var clean = jsdom();
|
||||
let clean = jsdom();
|
||||
window.crypto = new WebCrypto();
|
||||
|
||||
// Of course you can easily decipher the following texts, if you like.
|
||||
@ -43,7 +46,7 @@ describe('CryptTool', function () {
|
||||
return $.PrivateBin.CryptTool.decipher(
|
||||
'6t2qsmLyfXIokNCL+3/yl15rfTUBQvm5SOnFPvNE7Q8=',
|
||||
// -- "That's amazing. I've got the same combination on my luggage."
|
||||
Array.apply(0, Array(6)).map(function(_,b) { return b + 1; }).join(''),
|
||||
Array.apply(0, Array(6)).map((_,b) => b + 1).join(''),
|
||||
'{"iv":"4HNFIl7eYbCh6HuShctTIA==","v":1,"iter":10000,"ks"' +
|
||||
':256,"ts":128,"mode":"gcm","adata":"","cipher":"aes","sa' +
|
||||
'lt":"u0lQvePq6L0=","ct":"fGPUVrDyaVr1ZDGb+kqQ3CPEW8x4YKG' +
|
||||
@ -71,7 +74,7 @@ describe('CryptTool', function () {
|
||||
'QUxMXI5htsn2rf0HxCFu7Po8DNYLxTS+67hYjDIYWYaEIc8LXWMLyDm9' +
|
||||
'C5fARPJ4F2BIWgzgzkNj+dVjusft2XnziamWdbS5u3kuRlVuz5LQj+R5' +
|
||||
'imnqQAincdZTkTT1nYx+DatlOLllCYIHffpI="}'
|
||||
).then(function(paste1) {
|
||||
).then(function (paste1) {
|
||||
$.PrivateBin.CryptTool.decipher(
|
||||
's9pmKZKOBN7EVvHpTA8jjLFH3Xlz/0l8lB4+ONPACrM=',
|
||||
'', // no password
|
||||
@ -97,7 +100,7 @@ describe('CryptTool', function () {
|
||||
'XhHvixZLcSjX2KQuHmEoWzmJcr3DavdoXZmAurGWLKjzEdJc5dSD/eNr' +
|
||||
'99gjHX7wphJ6umKMM+fn6PcbYJkhDh2GlJL5COXjXfm/5aj/vuyaRRWZ' +
|
||||
'MZtmnYpGAtAPg7AUG"}'
|
||||
).then(function(paste2) {
|
||||
).then(function (paste2) {
|
||||
clean();
|
||||
assert.ok(
|
||||
paste1.includes('securely packed in iron') &&
|
||||
@ -120,7 +123,7 @@ describe('CryptTool', function () {
|
||||
return $.PrivateBin.CryptTool.decipher(
|
||||
'6t2qsmLyfXIokNCL+3/yl15rfTUBQvm5SOnFPvNE7Q8=',
|
||||
// -- "That's amazing. I've got the same combination on my luggage."
|
||||
Array.apply(0, Array(6)).map(function(_,b) { return b + 1; }).join(''),
|
||||
Array.apply(0, Array(6)).map((_,b) => b + 1).join(''),
|
||||
'{"iv":"aTnR2qBL1CAmLX8FdWe3VA==","v":1,"iter":10000,"ks"' +
|
||||
':256,"ts":128,"mode":"gcm","adata":"","cipher":"aes","sa' +
|
||||
'lt":"u0lQvePq6L0=","ct":"A3nBTvICZtYy6xqbIJE0c8Veored5lM' +
|
||||
@ -140,7 +143,7 @@ describe('CryptTool', function () {
|
||||
'7mNNo7xba/YT9KoPDaniqnYqb+q2pX1WNWE7dLS2wfroMAS3kh8P22DA' +
|
||||
'V37AeiNoD2PcI6ZcHbRdPa+XRrRcJhSPPW7UQ0z4OvBfjdu/w390QxAx' +
|
||||
'SxvZewoh49fKKB6hTsRnZb4tpHkjlww=="}'
|
||||
).then(function(paste1) {
|
||||
).then(function (paste1) {
|
||||
$.PrivateBin.CryptTool.decipher(
|
||||
's9pmKZKOBN7EVvHpTA8jjLFH3Xlz/0l8lB4+ONPACrM=',
|
||||
'', // no password
|
||||
@ -159,7 +162,7 @@ describe('CryptTool', function () {
|
||||
'7tmfcF73w9dufDFI3LNca2KxzBnWNPYvIZKBwWbq8ncxkb191dP6mjEi' +
|
||||
'7NnhqVk5A6vIBbu4AC5PZf76l6yep4xsoy/QtdDxCMocCXeAML9MQ9uP' +
|
||||
'QbuspOKrBvMfN5igA1kBqasnxI472KBNXsdZnaDddSVUuvhTcETM="}'
|
||||
).then(function(paste2) {
|
||||
).then(function (paste2) {
|
||||
clean();
|
||||
delete global.Base64;
|
||||
assert.ok(
|
||||
|
@ -71,7 +71,7 @@ if ($MARKDOWN):
|
||||
endif;
|
||||
?>
|
||||
<script type="text/javascript" data-cfasync="false" src="js/purify-1.0.7.js" integrity="sha512-VnKJHLosO8z2ojNvWk9BEKYqnhZyWK9rM90FgZUUEp/PRnUqR5OLLKE0a3BkVmn7YgB7LXRrjHgFHQYKd6DAIA==" crossorigin="anonymous"></script>
|
||||
<script type="text/javascript" data-cfasync="false" src="js/privatebin.js?<?php echo rawurlencode($VERSION); ?>" integrity="sha512-/hqrAlB/+OWfUg9D/0knhNkmUCzSJNqK2GIU3KBt/vhgfFiKGByOAzFYsyNxINu7c1pEwc/F/ZL5A/iF1rnK0Q==" crossorigin="anonymous"></script>
|
||||
<script type="text/javascript" data-cfasync="false" src="js/privatebin.js?<?php echo rawurlencode($VERSION); ?>" integrity="sha512-RVKB+q9cuKqmERwDv0KDUn1HAeNHCtlWS8Ww9+YeCKW842yyyCEBKw0gR8oS0XU3AXUsKTr3iiUJSJtqrdwm9w==" crossorigin="anonymous"></script>
|
||||
<!--[if lt IE 10]>
|
||||
<style type="text/css">body {padding-left:60px;padding-right:60px;} #ienotice {display:block;} #oldienotice {display:block;}</style>
|
||||
<![endif]-->
|
||||
|
@ -49,7 +49,7 @@ if ($MARKDOWN):
|
||||
endif;
|
||||
?>
|
||||
<script type="text/javascript" data-cfasync="false" src="js/purify-1.0.7.js" integrity="sha512-VnKJHLosO8z2ojNvWk9BEKYqnhZyWK9rM90FgZUUEp/PRnUqR5OLLKE0a3BkVmn7YgB7LXRrjHgFHQYKd6DAIA==" crossorigin="anonymous"></script>
|
||||
<script type="text/javascript" data-cfasync="false" src="js/privatebin.js?<?php echo rawurlencode($VERSION); ?>" integrity="sha512-/hqrAlB/+OWfUg9D/0knhNkmUCzSJNqK2GIU3KBt/vhgfFiKGByOAzFYsyNxINu7c1pEwc/F/ZL5A/iF1rnK0Q==" crossorigin="anonymous"></script>
|
||||
<script type="text/javascript" data-cfasync="false" src="js/privatebin.js?<?php echo rawurlencode($VERSION); ?>" integrity="sha512-RVKB+q9cuKqmERwDv0KDUn1HAeNHCtlWS8Ww9+YeCKW842yyyCEBKw0gR8oS0XU3AXUsKTr3iiUJSJtqrdwm9w==" crossorigin="anonymous"></script>
|
||||
<!--[if lt IE 10]>
|
||||
<style type="text/css">body {padding-left:60px;padding-right:60px;} #ienotice {display:block;} #oldienotice {display:block;}</style>
|
||||
<![endif]-->
|
||||
|
Loading…
Reference in New Issue
Block a user