diff --git a/js/privatebin.js b/js/privatebin.js
index 5b3d926..560d6e7 100644
--- a/js/privatebin.js
+++ b/js/privatebin.js
@@ -701,17 +701,25 @@ jQuery.PrivateBin = (function($, RawDeflate) {
* @private
* @param {string} key
* @param {string} password
- * @param {object} object cryptographic message
+ * @param {array} spec cryptographic specification
* @return {CryptoKey} derived key
*/
- async function deriveKey(key, password, object)
+ async function deriveKey(key, password, spec)
{
let keyArray = StrToArr(key);
if ((password || '').trim().length > 0) {
- keyArray += await window.crypto.subtle.digest(
+ let passwordBuffer = await window.crypto.subtle.digest(
{name: 'SHA-256'},
- StrToArr(password)
+ StrToArr(utob(password))
);
+ let hexHash = Array.prototype.map.call(
+ new Uint8Array(passwordBuffer), x => ('00' + x.toString(16)).slice(-2)
+ ).join('');
+ let passwordArray = StrToArr(hexHash),
+ newKeyArray = new Uint8Array(keyArray.length + passwordArray.length);
+ newKeyArray.set(keyArray, 0);
+ newKeyArray.set(passwordArray, keyArray.length);
+ keyArray = newKeyArray;
}
// import raw key
@@ -724,39 +732,40 @@ jQuery.PrivateBin = (function($, RawDeflate) {
);
// derive a stronger key for use with AES
- return await window.crypto.subtle.deriveKey(
+ return window.crypto.subtle.deriveKey(
{
name: 'PBKDF2', // we use PBKDF2 for key derivation
- salt: StrToArr(atob(object.salt)), // salt used in HMAC
- iterations: object.iter, // amount of iterations to apply
+ salt: StrToArr(spec[1]), // salt used in HMAC
+ iterations: spec[2], // amount of iterations to apply
hash: {name: 'SHA-256'} // can be "SHA-1", "SHA-256", "SHA-384" or "SHA-512"
},
importedKey,
{
- name: 'AES-' + object.mode.toUpperCase(), // can be any supported AES algorithm ("AES-CTR", "AES-CBC", "AES-CMAC", "AES-GCM", "AES-CFB", "AES-KW", "ECDH", "DH" or "HMAC")
- length: object.ks // can be 128, 192 or 256
+ name: 'AES-' + spec[6].toUpperCase(), // can be any supported AES algorithm ("AES-CTR", "AES-CBC", "AES-CMAC", "AES-GCM", "AES-CFB", "AES-KW", "ECDH", "DH" or "HMAC")
+ length: spec[3] // can be 128, 192 or 256
},
false, // the key may not be exported
- ['encrypt'] // we may only use it for decryption
+ ['encrypt', 'decrypt'] // we use it for de- and encryption
);
}
/**
- * gets crypto settings from given object
+ * gets crypto settings from specification and authenticated data
*
* @name CryptTool.cryptoSettings
* @function
* @private
- * @param {object} object cryptographic message
+ * @param {string} adata authenticated data
+ * @param {array} spec cryptographic specification
* @return {object} crypto settings
*/
- function cryptoSettings(object)
+ function cryptoSettings(adata, spec)
{
return {
- name: 'AES-' + object.mode.toUpperCase(), // can be any supported AES algorithm ("AES-CTR", "AES-CBC", "AES-CMAC", "AES-GCM", "AES-CFB", "AES-KW", "ECDH", "DH" or "HMAC")
- iv: StrToArr(atob(object.iv)), // the initialization vector you used to encrypt
- additionalData: StrToArr(atob(object.adata)), // the addtional data you used during encryption (if any)
- tagLength: object.ts // the length of the tag you used to encrypt (if any)
+ name: 'AES-' + spec[6].toUpperCase(), // can be any supported AES algorithm ("AES-CTR", "AES-CBC", "AES-CMAC", "AES-GCM", "AES-CFB", "AES-KW", "ECDH", "DH" or "HMAC")
+ iv: StrToArr(spec[0]), // the initialization vector you used to encrypt
+ additionalData: StrToArr(adata), // the addtional data you used during encryption (if any)
+ tagLength: spec[4] // the length of the tag you used to encrypt (if any)
};
}
@@ -769,32 +778,53 @@ jQuery.PrivateBin = (function($, RawDeflate) {
* @param {string} key
* @param {string} password
* @param {string} message
- * @return {string} data - JSON with encrypted data
+ * @param {array} adata
+ * @return {array} encrypted message & adata containing encryption spec
*/
- me.cipher = async function(key, password, message)
+ me.cipher = async function(key, password, message, adata)
{
- // AES in Galois Counter Mode, keysize 256 bit, authentication tag 128 bit, 10000 iterations in key derivation
- const iv = getRandomBytes(16);
- let object = {
- iv: btoa(iv),
- v: 1,
- iter: 10000,
- ks: 256,
- ts: 128,
- mode: 'gcm',
- adata: '', // if used, base64 encode it with btoa()
- cipher: 'aes',
- salt: btoa(getRandomBytes(8))
- };
+ // AES in Galois Counter Mode, keysize 256 bit,
+ // authentication tag 128 bit, 10000 iterations in key derivation
+ const spec = [
+ getRandomBytes(16), // initialization vector
+ getRandomBytes(8), // salt
+ 10000, // iterations
+ 256, // key size
+ 128, // tag size
+ 'aes', // algorithm
+ 'gcm', // algorithm mode
+ 'none' // compression
+ ], encodedSpec = [
+ btoa(spec[0]),
+ btoa(spec[1]),
+ spec[2],
+ spec[3],
+ spec[4],
+ spec[5],
+ spec[6],
+ spec[7]
+ ];
+ if (adata.length === 0) {
+ // comment
+ adata = encodedSpec;
+ } else if (adata[0] === null) {
+ // paste
+ adata[0] = encodedSpec;
+ }
// finally, encrypt message
- const encrypted = await window.crypto.subtle.encrypt(
- cryptoSettings(object),
- await deriveKey(key, password, object),
- StrToArr(compress(message)) // compressed plain text to encrypt
- );
- object.ct = btoa(ArrToStr(encrypted));
- return JSON.stringify(object);
+ return [
+ btoa(
+ ArrToStr(
+ await window.crypto.subtle.encrypt(
+ cryptoSettings(JSON.stringify(adata), spec),
+ await deriveKey(key, password, spec),
+ StrToArr(utob(message))
+ )
+ )
+ ),
+ adata
+ ];
};
/**
@@ -805,25 +835,57 @@ jQuery.PrivateBin = (function($, RawDeflate) {
* @function
* @param {string} key
* @param {string} password
- * @param {string} data - JSON with encrypted data
+ * @param {string|object} data encrypted message
* @return {string} decrypted message, empty if decryption failed
*/
me.decipher = async function(key, password, data)
{
+ let adataString, encodedSpec, compression, cipherMessage;
+ if (data instanceof Array) {
+ // version 2
+ adataString = JSON.stringify(data[1]);
+ encodedSpec = (data[1][0] instanceof Array ? data[1][0] : data[1]);
+ cipherMessage = data[0];
+ } else if (typeof data === 'string') {
+ // version 1
+ let object = JSON.parse(data);
+ adataString = atob(object.adata);
+ encodedSpec = [
+ object.iv,
+ object.salt,
+ object.iter,
+ object.ks,
+ object.ts,
+ object.cipher,
+ object.mode,
+ 'rawdeflate'
+ ];
+ cipherMessage = object.ct;
+ } else {
+ throw 'unsupported message format';
+ }
+ compression = encodedSpec[7];
+ let spec = encodedSpec, plainText = '';
+ spec[0] = atob(spec[0]);
+ spec[1] = atob(spec[1]);
try {
- const object = JSON.parse(data);
- return decompress(
- ArrToStr(
- await window.crypto.subtle.decrypt(
- cryptoSettings(object),
- await deriveKey(key, password, object),
- StrToArr(atob(object.ct)) // cipher text to decrypt
- )
+ plainText = ArrToStr(
+ await window.crypto.subtle.decrypt(
+ cryptoSettings(adataString, spec),
+ await deriveKey(key, password, spec),
+ StrToArr(atob(cipherMessage))
)
);
} catch(err) {
return '';
}
+ if (compression === 'none') {
+ return btou(plainText);
+ } else if (compression === 'rawdeflate') {
+ return decompress(plainText);
+ } else {
+ throw 'unsupported compression format';
+ }
};
/**
@@ -906,25 +968,25 @@ jQuery.PrivateBin = (function($, RawDeflate) {
}
// reload data
- Uploader.prepare();
- Uploader.setUrl(Helper.baseUri() + '?' + me.getPasteId());
+ ServerInteraction.prepare();
+ ServerInteraction.setUrl(Helper.baseUri() + '?' + me.getPasteId());
- Uploader.setFailure(function (status, data) {
+ ServerInteraction.setFailure(function (status, data) {
// revert loading status…
Alert.hideLoading();
TopNav.showViewButtons();
// show error message
- Alert.showError(Uploader.parseUploadError(status, data, 'get paste data'));
+ Alert.showError(ServerInteraction.parseUploadError(status, data, 'get paste data'));
});
- Uploader.setSuccess(function (status, data) {
+ ServerInteraction.setSuccess(function (status, data) {
pasteData = data;
if (typeof callback === 'function') {
return callback(data);
}
});
- Uploader.run();
+ ServerInteraction.run();
};
/**
@@ -1290,7 +1352,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
*/
me.showStatus = function(message, icon)
{
- console.info('status shown: ', message);
handleNotification(1, $statusMessage, message, icon);
};
@@ -1307,7 +1368,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
*/
me.showError = function(message, icon)
{
- console.error('error message shown: ', message);
handleNotification(3, $errorMessage, message, icon);
};
@@ -1322,7 +1382,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
*/
me.showRemaining = function(message)
{
- console.info('remaining message shown: ', message);
handleNotification(1, $remainingTime, message);
};
@@ -1338,10 +1397,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
*/
me.showLoading = function(message, icon)
{
- if (typeof message !== 'undefined' && message !== null) {
- console.info('status changed: ', message);
- }
-
// default message text
if (typeof message === 'undefined') {
message = 'Loading…';
@@ -2132,7 +2187,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
me.hide = function()
{
if (!isDisplayed) {
- console.warn('PasteViewer was called to hide the parsed view, but it is already hidden.');
+ return;
}
$plainText.addClass('hidden');
@@ -3184,7 +3239,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
me.showViewButtons = function()
{
if (viewButtonsDisplayed) {
- console.warn('showViewButtons: view buttons are already displayed');
return;
}
@@ -3205,7 +3259,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
me.hideViewButtons = function()
{
if (!viewButtonsDisplayed) {
- console.warn('hideViewButtons: view buttons are already hidden');
return;
}
@@ -3238,7 +3291,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
me.showCreateButtons = function()
{
if (createButtonsDisplayed) {
- console.warn('showCreateButtons: create buttons are already displayed');
return;
}
@@ -3263,7 +3315,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
me.hideCreateButtons = function()
{
if (!createButtonsDisplayed) {
- console.warn('hideCreateButtons: create buttons are already hidden');
return;
}
@@ -3534,23 +3585,23 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* Responsible for AJAX requests, transparently handles encryption…
*
- * @name Uploader
+ * @name ServerInteraction
* @class
*/
- var Uploader = (function () {
+ var ServerInteraction = (function () {
var me = {};
var successFunc = null,
failureFunc = null,
+ symmetricKey = null,
url,
data,
- symmetricKey,
password;
/**
* public variable ('constant') for errors to prevent magic numbers
*
- * @name Uploader.error
+ * @name ServerInteraction.error
* @readonly
* @enum {Object}
*/
@@ -3564,7 +3615,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* ajaxHeaders to send in AJAX requests
*
- * @name Uploader.ajaxHeaders
+ * @name ServerInteraction.ajaxHeaders
* @private
* @readonly
* @enum {Object}
@@ -3574,40 +3625,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* called after successful upload
*
- * @name Uploader.checkCryptParameters
- * @private
- * @function
- * @throws {string}
- */
- function checkCryptParameters()
- {
- // workaround for this nasty 'bug' in ECMAScript
- // see https://stackoverflow.com/questions/18808226/why-is-typeof-null-object
- var typeOfKey = typeof symmetricKey;
- if (symmetricKey === null) {
- typeOfKey = 'null';
- }
-
- // in case of missing preparation, throw error
- switch (typeOfKey) {
- case 'string':
- // already set, all right
- return;
- case 'null':
- // needs to be generated auto-generate
- symmetricKey = CryptTool.getSymmetricKey();
- break;
- default:
- console.error('current invalid symmetricKey: ', symmetricKey);
- throw 'symmetricKey is invalid, probably the module was not prepared';
- }
- // password is optional
- }
-
- /**
- * called after successful upload
- *
- * @name Uploader.success
+ * @name ServerInteraction.success
* @private
* @function
* @param {int} status
@@ -3627,7 +3645,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* called after a upload failure
*
- * @name Uploader.fail
+ * @name ServerInteraction.fail
* @private
* @function
* @param {int} status - internal code
@@ -3643,13 +3661,13 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* actually uploads the data
*
- * @name Uploader.run
+ * @name ServerInteraction.run
* @function
*/
me.run = function()
{
$.ajax({
- type: 'POST',
+ type: data ? 'POST' : 'GET',
url: url,
data: data,
dataType: 'json',
@@ -3673,7 +3691,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* set success function
*
- * @name Uploader.setUrl
+ * @name ServerInteraction.setUrl
* @function
* @param {function} newUrl
*/
@@ -3684,11 +3702,11 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* sets the password to use (first value) and optionally also the
- * encryption key (not recommend, it is automatically generated).
+ * encryption key (not recommended, it is automatically generated).
*
* Note: Call this after prepare() as prepare() resets these values.
*
- * @name Uploader.setCryptValues
+ * @name ServerInteraction.setCryptValues
* @function
* @param {string} newPassword
* @param {string} newKey - optional
@@ -3705,7 +3723,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* set success function
*
- * @name Uploader.setSuccess
+ * @name ServerInteraction.setSuccess
* @function
* @param {function} func
*/
@@ -3717,7 +3735,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* set failure function
*
- * @name Uploader.setFailure
+ * @name ServerInteraction.setFailure
* @function
* @param {function} func
*/
@@ -3733,7 +3751,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
* previous uploads. Must be called before any other method of this
* module.
*
- * @name Uploader.prepare
+ * @name ServerInteraction.prepare
* @function
* @return {object}
*/
@@ -3757,22 +3775,33 @@ jQuery.PrivateBin = (function($, RawDeflate) {
/**
* encrypts and sets the data
*
- * @name Uploader.setData
+ * @name ServerInteraction.setCipherMessage
* @async
* @function
- * @param {string} index
- * @param {mixed} element
+ * @param {object} cipherMessage
*/
- me.setData = async function(index, element)
+ me.setCipherMessage = async function(cipherMessage)
{
- checkCryptParameters();
- data[index] = await CryptTool.cipher(symmetricKey, password, element);
+ if (
+ symmetricKey === null ||
+ (typeof symmetricKey === 'string' && symmetricKey === '')
+ ) {
+ symmetricKey = CryptTool.getSymmetricKey();
+ }
+ if (!data.hasOwnProperty('adata')) {
+ data['adata'] = [];
+ }
+ let cipherResult = await CryptTool.cipher(symmetricKey, password, JSON.stringify(cipherMessage), data['adata']);
+ data['v'] = 2;
+ data['ct'] = cipherResult[0];
+ data['adata'] = cipherResult[1];
+
};
/**
* set the additional metadata to send unencrypted
*
- * @name Uploader.setUnencryptedData
+ * @name ServerInteraction.setUnencryptedData
* @function
* @param {string} index
* @param {mixed} element
@@ -3783,21 +3812,9 @@ jQuery.PrivateBin = (function($, RawDeflate) {
};
/**
- * set the additional metadata to send unencrypted passed at once
+ * Helper, which parses shows a general error message based on the result of the ServerInteraction
*
- * @name Uploader.setUnencryptedData
- * @function
- * @param {object} newData
- */
- me.setUnencryptedBulkData = function(newData)
- {
- $.extend(data, newData);
- };
-
- /**
- * Helper, which parses shows a general error message based on the result of the Uploader
- *
- * @name Uploader.parseUploadError
+ * @name ServerInteraction.parseUploadError
* @function
* @param {int} status
* @param {object} data
@@ -3825,24 +3842,13 @@ jQuery.PrivateBin = (function($, RawDeflate) {
return errorArray;
};
- /**
- * init Uploader
- *
- * @name Uploader.init
- * @function
- */
- me.init = function()
- {
- // nothing yet
- };
-
return me;
})();
/**
* (controller) Responsible for encrypting paste and sending it to server.
*
- * Does upload, encryption is done transparently by Uploader.
+ * Does upload, encryption is done transparently by ServerInteraction.
*
* @name PasteEncrypter
* @class
@@ -3906,43 +3912,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
});
}
- /**
- * adds attachments to the Uploader
- *
- * @name PasteEncrypter.encryptAttachments
- * @private
- * @function
- * @param {function} callback - excuted when action is successful
- */
- function encryptAttachments(callback) {
- var file = AttachmentViewer.getAttachmentData();
-
- let encryptAttachmentPromise, encryptAttachmentNamePromise;
- if (typeof file !== 'undefined' && file !== null) {
- var fileName = AttachmentViewer.getFile().name;
-
- // run concurrently to encrypt everything
- encryptAttachmentPromise = Uploader.setData('attachment', file);
- encryptAttachmentNamePromise = Uploader.setData('attachmentname', fileName);
- } else if (AttachmentViewer.hasAttachment()) {
- // fall back to cloned part
- var attachment = AttachmentViewer.getAttachment();
-
- encryptAttachmentPromise = Uploader.setData('attachment', attachment[0]);
- encryptAttachmentNamePromise = Uploader.setData('attachmentname', attachment[1]);
- } else {
- // if there are no attachments, this is of course still successful
- return callback();
- }
-
- // TODO: change this callback to also use Promises instead,
- // this here just waits
- return Promise.all([encryptAttachmentPromise, encryptAttachmentNamePromise]).then(() => {
- // run callback
- return callback();
- });
- }
-
/**
* send a reply in a discussion
*
@@ -3973,20 +3942,20 @@ jQuery.PrivateBin = (function($, RawDeflate) {
return;
}
- // prepare Uploader
- Uploader.prepare();
- Uploader.setCryptParameters(Prompt.getPassword(), Model.getPasteKey());
+ // prepare server interaction
+ ServerInteraction.prepare();
+ ServerInteraction.setCryptParameters(Prompt.getPassword(), Model.getPasteKey());
// set success/fail functions
- Uploader.setSuccess(showUploadedComment);
- Uploader.setFailure(function (status, data) {
+ ServerInteraction.setSuccess(showUploadedComment);
+ ServerInteraction.setFailure(function (status, data) {
// revert loading status…
Alert.hideLoading();
TopNav.showViewButtons();
// …show error message…
Alert.showError(
- Uploader.parseUploadError(status, data, 'post comment')
+ ServerInteraction.parseUploadError(status, data, 'post comment')
);
// …and reset error handler
@@ -3994,28 +3963,24 @@ jQuery.PrivateBin = (function($, RawDeflate) {
});
// fill it with unencrypted params
- Uploader.setUnencryptedData('pasteid', Model.getPasteId());
+ ServerInteraction.setUnencryptedData('pasteid', Model.getPasteId());
if (typeof parentid === 'undefined') {
// if parent id is not set, this is the top-most comment, so use
// paste id as parent, as the root element of the discussion tree
- Uploader.setUnencryptedData('parentid', Model.getPasteId());
+ ServerInteraction.setUnencryptedData('parentid', Model.getPasteId());
} else {
- Uploader.setUnencryptedData('parentid', parentid);
+ ServerInteraction.setUnencryptedData('parentid', parentid);
}
- // start promises to encrypt data…
- let dataPromises = [];
- dataPromises.push(Uploader.setData('data', plainText));
+ // prepare cypher message
+ let cipherMessage = {
+ 'comment': plainText
+ };
if (nickname.length > 0) {
- dataPromises.push(Uploader.setData('nickname', nickname));
+ cipherMessage['nickname'] = nickname;
}
- // …and upload when they are all done
- Promise.all(dataPromises).then(() => {
- Uploader.run();
- }).catch((e) => {
- Alert.showError(e);
- });
+ await ServerInteraction.setCipherMessage(cipherMessage).catch(Alert.showError);
};
/**
@@ -4049,60 +4014,55 @@ jQuery.PrivateBin = (function($, RawDeflate) {
return;
}
- // prepare Uploader
- Uploader.prepare();
- Uploader.setCryptParameters(TopNav.getPassword());
+ // prepare server interaction
+ ServerInteraction.prepare();
+ ServerInteraction.setCryptParameters(TopNav.getPassword());
// set success/fail functions
- Uploader.setSuccess(showCreatedPaste);
- Uploader.setFailure(function (status, data) {
+ ServerInteraction.setSuccess(showCreatedPaste);
+ ServerInteraction.setFailure(function (status, data) {
// revert loading status…
Alert.hideLoading();
TopNav.showCreateButtons();
// show error message
Alert.showError(
- Uploader.parseUploadError(status, data, 'create paste')
+ ServerInteraction.parseUploadError(status, data, 'create paste')
);
});
// fill it with unencrypted submitted options
- Uploader.setUnencryptedBulkData({
- expire: TopNav.getExpiration(),
- formatter: format,
- burnafterreading: TopNav.getBurnAfterReading() ? 1 : 0,
- opendiscussion: TopNav.getOpenDiscussion() ? 1 : 0
- });
+ ServerInteraction.setUnencryptedData('adata', [
+ null, format,
+ TopNav.getOpenDiscussion() ? 1 : 0,
+ TopNav.getBurnAfterReading() ? 1 : 0
+ ]);
+ ServerInteraction.setUnencryptedData('meta', {'expire': TopNav.getExpiration()});
// prepare PasteViewer for later preview
PasteViewer.setText(plainText);
PasteViewer.setFormat(format);
- // encrypt attachments
- const encryptAttachmentsPromise = encryptAttachments(
- function () {
- // TODO: remove, is not needed anymore as we use Promises
- }
- );
+ // prepare cypher message
+ let file = AttachmentViewer.getAttachmentData(),
+ cipherMessage = {
+ 'paste': plainText
+ };
+ if (typeof file !== 'undefined' && file !== null) {
+ cipherMessage['attachment'] = file;
+ cipherMessage['attachment_name'] = AttachmentViewer.getFile().name;
+ } else if (AttachmentViewer.hasAttachment()) {
+ // fall back to cloned part
+ let attachment = AttachmentViewer.getAttachment();
+ cipherMessage['attachment'] = attachment[0];
+ cipherMessage['attachment_name'] = attachment[1];
+ }
- // encrypt plain text
- const encryptDataPromise = Uploader.setData('data', plainText);
-
- await Promise.all([encryptAttachmentsPromise, encryptDataPromise]).catch(Alert.showError);
+ // encrypt message
+ await ServerInteraction.setCipherMessage(cipherMessage).catch(Alert.showError);
// send data
- Uploader.run();
- };
-
- /**
- * initialize
- *
- * @name PasteEncrypter.init
- * @function
- */
- me.init = function()
- {
- // nothing yet
+ ServerInteraction.run();
};
return me;
@@ -4347,17 +4307,6 @@ jQuery.PrivateBin = (function($, RawDeflate) {
});
};
- /**
- * initialize
- *
- * @name PasteDecrypter.init
- * @function
- */
- me.init = function()
- {
- // nothing yet
- };
-
return me;
})();
@@ -4457,20 +4406,20 @@ jQuery.PrivateBin = (function($, RawDeflate) {
var orgPosition = $(window).scrollTop();
Model.getPasteData(function (data) {
- Uploader.prepare();
- Uploader.setUrl(Helper.baseUri() + '?' + Model.getPasteId());
+ ServerInteraction.prepare();
+ ServerInteraction.setUrl(Helper.baseUri() + '?' + Model.getPasteId());
- Uploader.setFailure(function (status, data) {
+ ServerInteraction.setFailure(function (status, data) {
// revert loading status…
Alert.hideLoading();
TopNav.showViewButtons();
// show error message
Alert.showError(
- Uploader.parseUploadError(status, data, 'refresh display')
+ ServerInteraction.parseUploadError(status, data, 'refresh display')
);
});
- Uploader.setSuccess(function (status, data) {
+ ServerInteraction.setSuccess(function (status, data) {
PasteDecrypter.run(data);
// restore position
@@ -4481,7 +4430,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
// password being entered
callback();
});
- Uploader.run();
+ ServerInteraction.run();
}, false); // this false is important as it circumvents the cache
}
@@ -4551,14 +4500,11 @@ jQuery.PrivateBin = (function($, RawDeflate) {
AttachmentViewer.init();
DiscussionViewer.init();
Editor.init();
- PasteDecrypter.init();
- PasteEncrypter.init();
PasteStatus.init();
PasteViewer.init();
Prompt.init();
TopNav.init();
UiHelper.init();
- Uploader.init();
// check whether existing paste needs to be shown
try {
@@ -4602,7 +4548,7 @@ jQuery.PrivateBin = (function($, RawDeflate) {
AttachmentViewer: AttachmentViewer,
DiscussionViewer: DiscussionViewer,
TopNav: TopNav,
- Uploader: Uploader,
+ ServerInteraction: ServerInteraction,
PasteEncrypter: PasteEncrypter,
PasteDecrypter: PasteDecrypter,
Controller: Controller
diff --git a/js/test/CryptTool.js b/js/test/CryptTool.js
index 4ea7024..c36e7c9 100644
--- a/js/test/CryptTool.js
+++ b/js/test/CryptTool.js
@@ -2,6 +2,11 @@
require('../common');
describe('CryptTool', function () {
+ afterEach(async function () {
+ // pause to let async functions conclude
+ await new Promise(resolve => setTimeout(resolve, 1900));
+ });
+
describe('cipher & decipher', function () {
this.timeout(30000);
it('can en- and decrypt any message', function () {
@@ -9,24 +14,22 @@ describe('CryptTool', function () {
'string',
'string',
'string',
- function (key, password, message) {
- var clean = jsdom();
+ async function (key, password, message) {
+ // pause to let async functions conclude
+ await new Promise(resolve => setTimeout(resolve, 300));
+ let clean = jsdom();
window.crypto = new WebCrypto();
message = message.trim();
- return $.PrivateBin.CryptTool.cipher(
- key, password, message
- ).then(function(ciphertext) {
- $.PrivateBin.CryptTool.decipher(
- key, password, ciphertext
- ).then(function(plaintext) {
- clean();
- return message === plaintext;
- });
- });
+ let cipherMessage = await $.PrivateBin.CryptTool.cipher(
+ key, password, message, []
+ ),
+ plaintext = await $.PrivateBin.CryptTool.decipher(
+ key, password, cipherMessage
+ );
+ clean();
+ return message === plaintext;
}
- ),
- // reducing amount of checks as running 100 async ones causes issues for later test scripts
- {tests: 3});
+ ));
});
// The below static unit tests are included to ensure deciphering of "classic"
@@ -35,7 +38,7 @@ describe('CryptTool', function () {
'supports PrivateBin v1 ciphertext (SJCL & browser atob)',
function () {
delete global.Base64;
- var clean = jsdom();
+ let clean = jsdom();
window.crypto = new WebCrypto();
// Of course you can easily decipher the following texts, if you like.
@@ -43,7 +46,7 @@ describe('CryptTool', function () {
return $.PrivateBin.CryptTool.decipher(
'6t2qsmLyfXIokNCL+3/yl15rfTUBQvm5SOnFPvNE7Q8=',
// -- "That's amazing. I've got the same combination on my luggage."
- Array.apply(0, Array(6)).map(function(_,b) { return b + 1; }).join(''),
+ Array.apply(0, Array(6)).map((_,b) => b + 1).join(''),
'{"iv":"4HNFIl7eYbCh6HuShctTIA==","v":1,"iter":10000,"ks"' +
':256,"ts":128,"mode":"gcm","adata":"","cipher":"aes","sa' +
'lt":"u0lQvePq6L0=","ct":"fGPUVrDyaVr1ZDGb+kqQ3CPEW8x4YKG' +
@@ -71,7 +74,7 @@ describe('CryptTool', function () {
'QUxMXI5htsn2rf0HxCFu7Po8DNYLxTS+67hYjDIYWYaEIc8LXWMLyDm9' +
'C5fARPJ4F2BIWgzgzkNj+dVjusft2XnziamWdbS5u3kuRlVuz5LQj+R5' +
'imnqQAincdZTkTT1nYx+DatlOLllCYIHffpI="}'
- ).then(function(paste1) {
+ ).then(function (paste1) {
$.PrivateBin.CryptTool.decipher(
's9pmKZKOBN7EVvHpTA8jjLFH3Xlz/0l8lB4+ONPACrM=',
'', // no password
@@ -97,7 +100,7 @@ describe('CryptTool', function () {
'XhHvixZLcSjX2KQuHmEoWzmJcr3DavdoXZmAurGWLKjzEdJc5dSD/eNr' +
'99gjHX7wphJ6umKMM+fn6PcbYJkhDh2GlJL5COXjXfm/5aj/vuyaRRWZ' +
'MZtmnYpGAtAPg7AUG"}'
- ).then(function(paste2) {
+ ).then(function (paste2) {
clean();
assert.ok(
paste1.includes('securely packed in iron') &&
@@ -120,7 +123,7 @@ describe('CryptTool', function () {
return $.PrivateBin.CryptTool.decipher(
'6t2qsmLyfXIokNCL+3/yl15rfTUBQvm5SOnFPvNE7Q8=',
// -- "That's amazing. I've got the same combination on my luggage."
- Array.apply(0, Array(6)).map(function(_,b) { return b + 1; }).join(''),
+ Array.apply(0, Array(6)).map((_,b) => b + 1).join(''),
'{"iv":"aTnR2qBL1CAmLX8FdWe3VA==","v":1,"iter":10000,"ks"' +
':256,"ts":128,"mode":"gcm","adata":"","cipher":"aes","sa' +
'lt":"u0lQvePq6L0=","ct":"A3nBTvICZtYy6xqbIJE0c8Veored5lM' +
@@ -140,7 +143,7 @@ describe('CryptTool', function () {
'7mNNo7xba/YT9KoPDaniqnYqb+q2pX1WNWE7dLS2wfroMAS3kh8P22DA' +
'V37AeiNoD2PcI6ZcHbRdPa+XRrRcJhSPPW7UQ0z4OvBfjdu/w390QxAx' +
'SxvZewoh49fKKB6hTsRnZb4tpHkjlww=="}'
- ).then(function(paste1) {
+ ).then(function (paste1) {
$.PrivateBin.CryptTool.decipher(
's9pmKZKOBN7EVvHpTA8jjLFH3Xlz/0l8lB4+ONPACrM=',
'', // no password
@@ -159,7 +162,7 @@ describe('CryptTool', function () {
'7tmfcF73w9dufDFI3LNca2KxzBnWNPYvIZKBwWbq8ncxkb191dP6mjEi' +
'7NnhqVk5A6vIBbu4AC5PZf76l6yep4xsoy/QtdDxCMocCXeAML9MQ9uP' +
'QbuspOKrBvMfN5igA1kBqasnxI472KBNXsdZnaDddSVUuvhTcETM="}'
- ).then(function(paste2) {
+ ).then(function (paste2) {
clean();
delete global.Base64;
assert.ok(
diff --git a/tpl/bootstrap.php b/tpl/bootstrap.php
index 55ebed6..47f9f42 100644
--- a/tpl/bootstrap.php
+++ b/tpl/bootstrap.php
@@ -71,7 +71,7 @@ if ($MARKDOWN):
endif;
?>
-
+
diff --git a/tpl/page.php b/tpl/page.php
index d200794..c7333fe 100644
--- a/tpl/page.php
+++ b/tpl/page.php
@@ -49,7 +49,7 @@ if ($MARKDOWN):
endif;
?>
-
+