mirror of
https://github.com/remotely-save/remotely-save.git
synced 2024-06-07 21:10:45 +00:00
add test
This commit is contained in:
parent
9d5fb7e966
commit
170cbbfb4f
@ -37,12 +37,12 @@
|
|||||||
"aws-crt": "^1.10.1",
|
"aws-crt": "^1.10.1",
|
||||||
"buffer": "^6.0.3",
|
"buffer": "^6.0.3",
|
||||||
"codemirror": "^5.63.1",
|
"codemirror": "^5.63.1",
|
||||||
"hi-base32": "^0.5.1",
|
|
||||||
"lovefield-ts": "^0.7.0",
|
"lovefield-ts": "^0.7.0",
|
||||||
"mime-types": "^2.1.33",
|
"mime-types": "^2.1.33",
|
||||||
"obsidian": "^0.12.0",
|
"obsidian": "^0.12.0",
|
||||||
"path-browserify": "^1.0.1",
|
"path-browserify": "^1.0.1",
|
||||||
"process": "^0.11.10",
|
"process": "^0.11.10",
|
||||||
|
"rfc4648": "^1.5.0",
|
||||||
"rimraf": "^3.0.2",
|
"rimraf": "^3.0.2",
|
||||||
"stream-browserify": "^3.0.0",
|
"stream-browserify": "^3.0.0",
|
||||||
"webdav": "^4.7.0",
|
"webdav": "^4.7.0",
|
||||||
|
@ -1,5 +1,10 @@
|
|||||||
import * as base32 from "hi-base32";
|
import { base32, base64 } from "rfc4648";
|
||||||
import { bufferToArrayBuffer, arrayBufferToBuffer } from "./misc";
|
import {
|
||||||
|
bufferToArrayBuffer,
|
||||||
|
arrayBufferToBuffer,
|
||||||
|
hexStringToTypedArray,
|
||||||
|
arrayBufferToHex,
|
||||||
|
} from "./misc";
|
||||||
|
|
||||||
const DEFAULT_ITER = 10000;
|
const DEFAULT_ITER = 10000;
|
||||||
|
|
||||||
@ -33,9 +38,15 @@ const getKeyIVFromPassword = async (
|
|||||||
export const encryptArrayBuffer = async (
|
export const encryptArrayBuffer = async (
|
||||||
arrBuf: ArrayBuffer,
|
arrBuf: ArrayBuffer,
|
||||||
password: string,
|
password: string,
|
||||||
rounds: number = DEFAULT_ITER
|
rounds: number = DEFAULT_ITER,
|
||||||
|
saltHex: string = ""
|
||||||
) => {
|
) => {
|
||||||
const salt = window.crypto.getRandomValues(new Uint8Array(8));
|
let salt: Uint8Array;
|
||||||
|
if (saltHex !== "") {
|
||||||
|
salt = hexStringToTypedArray(saltHex);
|
||||||
|
} else {
|
||||||
|
salt = window.crypto.getRandomValues(new Uint8Array(8));
|
||||||
|
}
|
||||||
|
|
||||||
const derivedKey = await getKeyIVFromPassword(salt, password, rounds);
|
const derivedKey = await getKeyIVFromPassword(salt, password, rounds);
|
||||||
const key = derivedKey.slice(0, 32);
|
const key = derivedKey.slice(0, 32);
|
||||||
@ -97,11 +108,16 @@ export const decryptArrayBuffer = async (
|
|||||||
export const encryptStringToBase32 = async (
|
export const encryptStringToBase32 = async (
|
||||||
text: string,
|
text: string,
|
||||||
password: string,
|
password: string,
|
||||||
rounds: number = DEFAULT_ITER
|
rounds: number = DEFAULT_ITER,
|
||||||
|
saltHex: string = ""
|
||||||
) => {
|
) => {
|
||||||
return base32.encode(
|
const enc = await encryptArrayBuffer(
|
||||||
await encryptArrayBuffer(new TextEncoder().encode(text), password, rounds)
|
bufferToArrayBuffer(new TextEncoder().encode(text)),
|
||||||
|
password,
|
||||||
|
rounds,
|
||||||
|
saltHex
|
||||||
);
|
);
|
||||||
|
return base32.stringify(new Uint8Array(enc));
|
||||||
};
|
};
|
||||||
|
|
||||||
export const decryptBase32ToString = async (
|
export const decryptBase32ToString = async (
|
||||||
@ -109,11 +125,11 @@ export const decryptBase32ToString = async (
|
|||||||
password: string,
|
password: string,
|
||||||
rounds: number = DEFAULT_ITER
|
rounds: number = DEFAULT_ITER
|
||||||
) => {
|
) => {
|
||||||
return (
|
return new TextDecoder().decode(
|
||||||
await decryptArrayBuffer(
|
await decryptArrayBuffer(
|
||||||
bufferToArrayBuffer(Uint8Array.from(base32.decode.asBytes(text))),
|
bufferToArrayBuffer(base32.parse(text)),
|
||||||
password,
|
password,
|
||||||
rounds
|
rounds
|
||||||
)
|
)
|
||||||
).toString();
|
);
|
||||||
};
|
};
|
||||||
|
23
src/misc.ts
23
src/misc.ts
@ -1,6 +1,8 @@
|
|||||||
import { Vault } from "obsidian";
|
import { Vault } from "obsidian";
|
||||||
import * as path from "path";
|
import * as path from "path";
|
||||||
|
|
||||||
|
import { base32 } from "rfc4648";
|
||||||
|
|
||||||
export type SUPPORTED_SERVICES_TYPE = "s3" | "webdav" | "ftp";
|
export type SUPPORTED_SERVICES_TYPE = "s3" | "webdav" | "ftp";
|
||||||
|
|
||||||
export const ignoreHiddenFiles = (item: string) => {
|
export const ignoreHiddenFiles = (item: string) => {
|
||||||
@ -63,6 +65,27 @@ export const arrayBufferToBase64 = (b: ArrayBuffer) => {
|
|||||||
return arrayBufferToBuffer(b).toString("base64");
|
return arrayBufferToBuffer(b).toString("base64");
|
||||||
};
|
};
|
||||||
|
|
||||||
|
export const arrayBufferToHex = (b: ArrayBuffer) => {
|
||||||
|
return arrayBufferToBuffer(b).toString("hex");
|
||||||
|
};
|
||||||
|
|
||||||
export const base64ToArrayBuffer = (b64text: string) => {
|
export const base64ToArrayBuffer = (b64text: string) => {
|
||||||
return bufferToArrayBuffer(Buffer.from(b64text, "base64"));
|
return bufferToArrayBuffer(Buffer.from(b64text, "base64"));
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* https://stackoverflow.com/questions/43131242
|
||||||
|
* @param hex
|
||||||
|
* @returns
|
||||||
|
*/
|
||||||
|
export const hexStringToTypedArray = (hex: string) => {
|
||||||
|
return new Uint8Array(
|
||||||
|
hex.match(/[\da-f]{2}/gi).map(function (h) {
|
||||||
|
return parseInt(h, 16);
|
||||||
|
})
|
||||||
|
);
|
||||||
|
};
|
||||||
|
|
||||||
|
export const base64ToBase32 = (a: string) => {
|
||||||
|
return base32.stringify(Buffer.from(a, "base64"));
|
||||||
|
};
|
||||||
|
1
tests/sometext.txt
Normal file
1
tests/sometext.txt
Normal file
@ -0,0 +1 @@
|
|||||||
|
A secret text 你好世界
|
@ -1,5 +1,10 @@
|
|||||||
|
import * as fs from "fs";
|
||||||
import { expect } from "chai";
|
import { expect } from "chai";
|
||||||
import { encryptStringToBase32 } from "../src/encrypt";
|
import { base64ToBase32 } from "../src/misc";
|
||||||
|
import {
|
||||||
|
decryptBase32ToString,
|
||||||
|
encryptStringToBase32,
|
||||||
|
} from "../src/encrypt";
|
||||||
|
|
||||||
describe("Encryption tests", () => {
|
describe("Encryption tests", () => {
|
||||||
beforeEach(function () {
|
beforeEach(function () {
|
||||||
@ -13,4 +18,38 @@ describe("Encryption tests", () => {
|
|||||||
const password = "hey";
|
const password = "hey";
|
||||||
expect(await encryptStringToBase32(k, password)).to.not.equal(k);
|
expect(await encryptStringToBase32(k, password)).to.not.equal(k);
|
||||||
});
|
});
|
||||||
|
|
||||||
|
it("should encrypt and decrypt string and get the same result returned", async () => {
|
||||||
|
const k = "jfkkjkjbce7983ycdeknkkjckooAIUHIDIBIE((*BII)njD/d/dd/d/sjxhux";
|
||||||
|
const password = "hfiuibec989###oiu982bj1`";
|
||||||
|
const enc = await encryptStringToBase32(k, password);
|
||||||
|
console.log(enc);
|
||||||
|
const dec = await decryptBase32ToString(enc, password);
|
||||||
|
console.log(dec);
|
||||||
|
expect(dec).equal(k);
|
||||||
|
});
|
||||||
|
|
||||||
|
it("should encrypt and get the same result as openssl", async () => {
|
||||||
|
const fileContent = (
|
||||||
|
await fs.readFileSync(__dirname + "/sometext.txt")
|
||||||
|
).toString("utf-8");
|
||||||
|
const password = "somepassword";
|
||||||
|
const saltHex = "8302F586FAB491EC";
|
||||||
|
const enc = await encryptStringToBase32(
|
||||||
|
fileContent,
|
||||||
|
password,
|
||||||
|
undefined,
|
||||||
|
saltHex
|
||||||
|
);
|
||||||
|
|
||||||
|
// two command returns same result:
|
||||||
|
// cat ./sometext.txt | openssl enc -p -aes-256-cbc -S 8302F586FAB491EC -pbkdf2 -iter 10000 -base64 -pass pass:somepassword
|
||||||
|
// openssl enc -p -aes-256-cbc -S 8302F586FAB491EC -pbkdf2 -iter 10000 -base64 -pass pass:somepassword -in ./sometext.txt
|
||||||
|
const opensslBase64Res =
|
||||||
|
"U2FsdGVkX1+DAvWG+rSR7MSa+yJav1zCE7SSXiBooqwI5Q+LMpIthpk/pXkLj+25";
|
||||||
|
// we output base32, so we need some transformation
|
||||||
|
const opensslBase32Res = base64ToBase32(opensslBase64Res);
|
||||||
|
|
||||||
|
expect(enc).equal(opensslBase32Res);
|
||||||
|
});
|
||||||
});
|
});
|
||||||
|
Loading…
Reference in New Issue
Block a user