filesafe 3.0.0 → 3.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: 2b861521a8fb52cf218a3222749b3daf51c664f2
4
+ data.tar.gz: f81c942da0d839c87694778cc3c8a5c2d06ab12b
5
+ SHA512:
6
+ metadata.gz: c86db90a87c2de7d0bbc55870bda68605ed701126c108dbf2626dfe41c49fa5e40b877e9f418889e05d117eefd01916cd73fe68a0e320e91fb1f6eb3b8e97f88
7
+ data.tar.gz: fa49b8818edbc5a99f6a1cf23a91381950d07ad9fa358f2416f52f42b503cb8a13a0d8a5732cb57a661600fd1b7d6602c11d8b8cbf0456ae058a9538410ee0f2
data/README.txt CHANGED
@@ -114,7 +114,7 @@ This script requires or relies on:
114
114
  tempfile -- for temporary file creation
115
115
 
116
116
  It uses the following gems:
117
- pbkdf2 -- for the password-based key derivitive function PBKDF2
117
+ pbkdf2-ruby -- for the password-based key derivitive function PBKDF2
118
118
  highline -- for reading a password/passphrase from a terminal
119
119
 
120
120
 
data/Rakefile CHANGED
@@ -1,10 +1,11 @@
1
- require 'rake/gempackagetask'
2
- require 'rake/rdoctask'
1
+ require 'rubygems/package_task'
2
+ require 'rdoc/task'
3
3
  require 'rake/testtask'
4
4
 
5
5
  gemspec = Gem::Specification.new do |spec|
6
6
  spec.name = 'filesafe'
7
7
  spec.version = File.open('VERSION.txt','r').to_a.join.strip
8
+ spec.licenses = ['MIT']
8
9
  spec.date = File.mtime('VERSION.txt')
9
10
  spec.author = 'Aaron D. Gifford'
10
11
  spec.homepage = 'http://www.aarongifford.com/computers/filesafe/'
@@ -22,16 +23,16 @@ gemspec = Gem::Specification.new do |spec|
22
23
  'test/*'
23
24
  ]
24
25
  spec.executables = [ 'filesafe' ]
25
- spec.add_dependency('pbkdf2', '>= 0.1.0')
26
- spec.add_dependency('highline', '>= 1.6.1')
26
+ spec.add_runtime_dependency 'pbkdf2-ruby', '~> 0.2', '>= 0.2.0'
27
+ spec.add_runtime_dependency 'highline', '~>1.6.1', '>= 1.6.1'
27
28
  end
28
29
 
29
- Rake::GemPackageTask.new(gemspec) do |pkg|
30
+ Gem::PackageTask.new(gemspec) do |pkg|
30
31
  pkg.need_zip = true
31
32
  pkg.need_tar = true
32
33
  end
33
34
 
34
- Rake::RDocTask.new do |rdoc|
35
+ RDoc::Task.new do |rdoc|
35
36
  rdoc.name = 'rdoc'
36
37
  rdoc.main = 'README.txt'
37
38
  rdoc.rdoc_dir = 'doc'
@@ -1 +1 @@
1
- 3.0.0
1
+ 3.1.0
@@ -76,9 +76,9 @@ module FileSafe
76
76
  # Read a passphrase from a terminal.
77
77
  def self.getphrase(check=false)
78
78
  begin
79
- phrase = HighLine.new.ask('Passphrase: '){|q| q.echo = '*' ; q.overwrite = true }
79
+ phrase = HighLine.new.ask('Passphrase: '){|q| q.echo = '*' ; q.overwrite = true ; q.validate = nil }
80
80
  return phrase unless check
81
- tmp = HighLine.new.ask('Retype passphrase: '){|q| q.echo = '*' ; q.overwrite = true }
81
+ tmp = HighLine.new.ask('Retype passphrase: '){|q| q.echo = '*' ; q.overwrite = true ; q.validate = nil }
82
82
  return phrase if tmp == phrase
83
83
  rescue Interrupt
84
84
  exit -1
@@ -91,7 +91,7 @@ module FileSafe
91
91
 
92
92
  # Encrypt a file with the supplied passphrase--or if none is supplied,
93
93
  # read a passphrase from the terminal.
94
- def self.encrypt(file, passphrase=nil, notemp=true)
94
+ def self.encrypt(file, passphrase=nil, notemp=true, debug_params=nil)
95
95
  raise "Cannot encrypt non-existent file: #{file.inspect}" unless File.exist?(file)
96
96
  raise "Cannot encrypt unreadable file: #{file.inspect}" unless File.readable?(file)
97
97
  raise "Cannot encrypt unwritable file: #{file.inspect}" unless File.writable?(file)
@@ -127,10 +127,21 @@ module FileSafe
127
127
  passphrase = getphrase(true)
128
128
  end
129
129
 
130
- ## Use secure random data to populate salt, key, and IV:
131
- salt = SecureRandom.random_bytes(SALT_LEN) ## Acquire some fresh salt
132
- file_key = SecureRandom.random_bytes(KEY_LEN) ## Get some random key material
133
- file_iv = SecureRandom.random_bytes(IV_LEN) ## And a random initialization vector
130
+ ## Use secure random data to populate salt, key, and iv (unless debugging data is provided):
131
+ if debug_params.nil?
132
+ file_key = SecureRandom.random_bytes(KEY_LEN) ## Get some random key material
133
+ file_iv = SecureRandom.random_bytes(IV_LEN) ## And a random initialization vector
134
+ salt = SecureRandom.random_bytes(SALT_LEN)
135
+ else
136
+ ## Manually-provided debugging/testing data will be used instead
137
+ ## (not recommended unless testing/debugging):
138
+ raise "Invalid debugging parameter data provided!" unless debug_params.is_a?(String) &&
139
+ debug_params.encoding == Encoding::BINARY &&
140
+ debug_params.size == SALT_LEN + KEY_LEN + IV_LEN
141
+ salt = debug_params.slice!(0,SALT_LEN)
142
+ file_key = debug_params.slice!(0,KEY_LEN)
143
+ file_iv = debug_params
144
+ end
134
145
 
135
146
  ## Encrypt the file key and IV using password-derived keying material:
136
147
  keymaterial = pbkdf2(passphrase, salt, KEY_LEN + IV_LEN)
@@ -3,6 +3,7 @@
3
3
 
4
4
  require 'test/unit'
5
5
  require 'digest/sha2'
6
+ require_relative '../lib/filesafe.rb'
6
7
 
7
8
  class FileSafeCLITest < Test::Unit::TestCase
8
9
  FILESAFE = File.join(File.dirname(__FILE__), '..', 'bin', 'filesafe')
@@ -5,19 +5,96 @@ require 'test/unit'
5
5
  require_relative '../lib/filesafe.rb'
6
6
 
7
7
  class FileSafeDecryptTest < Test::Unit::TestCase
8
+ ## Unicode UTF-8 endash character as ASCII-8BIT binary two-byte, two-character string
9
+ ENDASH = ["2014"].pack('H*')
10
+
11
+ ## Encrypted ciphertext:
8
12
  CIPHERTEXT = [
9
- "60e8aacea874e36f39fef5f51cf727252359c575230b7306b6379194" +
10
- "12bc53e9106ddaecc0ded13503e6ef9d3ff9f0285bb133d3d88464c0" +
11
- "eea4f728ae509942a4e8be070a70d49b8668ddbda2102412ca42c917" +
12
- "bd74c824ae6b35bb697a0fccd8f0822e310f96bfc34546e289e6dbed" +
13
- "f3dd30eca6585ad344593ca65f6aa323722a29c1c19257b135756340" +
14
- "7a88de6a92a85dae5dd9ea0cb8a2ccaf3c45bace571cb0c791186837" +
15
- "a3a6ff650545286afbd75087b42582da571521fbc74fa3499dc22ebc" +
16
- "8482e13c4055313b38a0cf79"].pack('H*')
13
+ "cda462fe3b2ec9f141fcec6e32198effcb0ed661c35af78878c1e6fb52f5e798" +
14
+ "552e2e02c080cb37aaa298d2a27831d4dabe111101107ee85b21e7b5d91262f1" +
15
+ "f6bf0c63dee422b0a39bbd662202e7cf85feab6c50216b812504119e37f876ce" +
16
+ "baa1a8d402614cfdd5e40a725f0229e19c046f00c8dc264a481b22fece930113" +
17
+ "85debf353626c7dcc34747b5d766ec979d69cf61d4a9bf0db218d4eda7c2b9f9" +
18
+ "e045ac11ebd034caad05fe318aad9cc85500be80b2ff398d62958cb82ee0a583" +
19
+ "b3f0512ef2f9a09dc4dee2e7250ee8db3ce720d84c7f4409e8852ab582118410" +
20
+ "06f9b26163bd0262c7eb7d239c2a66b7228e2372d6bdc9f32dced48e4387829a" +
21
+ "3358abfaf8dff19651e7d06eb8f06dd181df78ced880c1ae4e4aa8e4f2e58d18" +
22
+ "e8603ca8714081e935e1b5d3916de4bf1f3f083ab1b0a70abfd6bf5a25244032" +
23
+ "9327a4da7e1b28e13bddc660ae9e4426ec5bc0e28eba2f794e8ed5c26c9c6717" +
24
+ "e81d194ca2e0e135c3e89a87241d75279eb11352e9ccbbf973de265ebf173916" +
25
+ "421e3c5575350cdd4ff0adb8008aa2ced5ae855940a6d7a221dd651340a4c361" +
26
+ "c1e31e7c6ad4ca6156632cd5f92c48990275b53aca0251d89d61fb25635c965c" +
27
+ "57e615ba69f54cff5ca8b56607e71c3f1a76c81ceb86ab99216da0932b09c72e" +
28
+ "46aae92870105a7c9613acf9d40520692370c1c30249870ba9f0914514389693" +
29
+ "8a3c06414ff868511b52c5fa6d2465c5cad3002724852998ea096ad9eea02b5c" +
30
+ "98faf9954240000938a2ac152b4bcb836fb1fe77ff0f6a3fa0cfebc4d93ac8fc" +
31
+ "9da2c7171319de5a7b034485abb1fbff7ca323be0240394e0cd32d0cfa30c52d" +
32
+ "ea5d02569b95eec39b8bd64559873fdf7eda67523c2fe0234883a0f7e98571ee" +
33
+ "80176609f776be278f7f8665951689b01f6af2ef3002bc1ade88aa398d44039f" +
34
+ "b996d4a094c74925020740573b0c4df4a39cdc689280f535d8e2603fc2c0d4c0" +
35
+ "909933efbd4b99a56564084bab6be5198e0af1d3217ca29def5b422c270c3076" +
36
+ "4af961c2e47d57d520d664e920645a438d339dcaba36246ce4d58fd858e53ceb" +
37
+ "7bbc42cc559eee525f3790810a5e647a7c444308ce47bd61cdfbd416fb935cdf" +
38
+ "f467e9c810c3127c53eb7abe5ca39c3ce98c5b91b3f0696c13c14344717d565d" +
39
+ "e34163cc0af075ef05bda600eeac2c60779b29fdf060e612dc6dd4d81e4c5a38" +
40
+ "5be05409a153177bad7349362c320664043980dd960f923a2de274f01b6b9397" +
41
+ "e24fcd61cd16c10c79649574e7f2874e71dbc563b2b6807359f0799314189000" +
42
+ "6e211a033058adec7a7e58349342803cc784e1e989f1bc552c0a13753ad43661" +
43
+ "71de7f01d35b75e4143a59d738b3b6bd3b45609bdca7996d60564fce0e12df2e" +
44
+ "4658d33b7db5587f431893b44c199d475f7b47a436171d66a6a6d4575c80c6c9" +
45
+ "0f847223367c8c91a74fad3d27cc954ed72640fff84fc33cfb9b4acdef3e2b7c" +
46
+ "810d52e507c74c55cf6123e64b3a6706caa032475793425ebba18c9ca60b3a35" +
47
+ "da91e6d7c4e998fc44aece8a6e0c47184176b4430378e12f1c970a7d27c6350d" +
48
+ "080d79a08b535fe89afb2e02e9d72bb652fb3c09ab948b3fcc43401f0e5719c5" +
49
+ "0cb859975770f0389430eed2c82883e3d07f727b4442f9922712ae763f9c32d4" +
50
+ "84ddd3c2d220ada8e70fef0d5217d24df24f000b827d84ce26702a253717e9bc" +
51
+ "3aaddd3de3ccd833adf668efca3ae6db77290b5de6d6ee5c8223a500066ca69f" +
52
+ "3694ba6b1c15414a7c689f284bad5402d01aa3738196b653c6795e512d839e10" +
53
+ "9f99210803fbc635dd0dcf19c1ea141c8772fb43ea18606f7cae68974b23ff03" +
54
+ "90f0f76cde8e23c19844d95e9564c3174572c45654c2e9e727839b768057993f" +
55
+ "6348c81e45be01e6b8b41cd2156aa05e5587c5fe7c54eb4803ddaa82c717d6d6" +
56
+ "b7874dc209c0e3897ad3760a80af234a2d256e7d4fc120f92a3d9460e933b3ac" +
57
+ "99059edca183cc0e9226d128a799db259f6b0842a7c4d6c80d9b7dce202d33f9" +
58
+ "40fdecc27ffa9201dd2dc18043cae5c4460c0421c272b1b941543a80f7cd2aab" +
59
+ "edf9886c8fdd1ee85aa2ebb158046420fb44a7a0879f5a318a5434de86d58683" +
60
+ "898240d4c9e81b3ae28907472f8bc498ebce1266b6e721f3538d7f4737a8913d" +
61
+ "e29d9f4200dcfa988b3d17fefc4e24d33677f49842955abf06e80cc98ff255e0" +
62
+ "a23db1556b6e9eea66bf121e8152d4ae73f674698cf09d7ee7b7863f9fd00d81" +
63
+ "2f144ef1237ab6a4f2f6c9a69c0129f231df17ff5815a8871ef7fe16fc8efd1a"
64
+ ].pack('H*')
65
+
66
+ ## Expected plaintext result as ASCII-8BIT binary string (though
67
+ ## it technically does contain several two-byte UTF-8 Unicode
68
+ ## endash characters mixed in):
17
69
  PLAINTEXT =
18
- "This is a PLAINTEXT file for testing\n"
70
+ "Four score and seven years ago our fathers brought forth on this " +
71
+ "continent a new nation, conceived in liberty, and dedicated to the " +
72
+ "proposition that all men are created equal.\n" +
73
+ "Now we are engaged in a great civil war, testing whether that " +
74
+ "nation, or any nation so conceived and so dedicated, can long " +
75
+ "endure. We are met on a great battlefield of that war. We have " +
76
+ "come to dedicate a portion of that field, as a final resting place " +
77
+ "for those who here gave their lives that that nation might live. " +
78
+ "It is altogether fitting and proper that we should do this.\n" +
79
+ "But, in a larger sense, we can not dedicate, we can not " +
80
+ "consecrate, we can not hallow this ground. The brave men, living " +
81
+ "and dead, who struggled here, have consecrated it, far above our " +
82
+ "poor power to add or detract. The world will little note, nor long " +
83
+ "remember what we say here, but it can never forget what they did " +
84
+ "here. It is for us the living, rather, to be dedicated here to the " +
85
+ "unfinished work which they who fought here have thus far so nobly " +
86
+ "advanced. It is rather for us to be here dedicated to the great " +
87
+ "task remaining before us" + ENDASH + "that from these honored dead " +
88
+ "we take increased devotion to that cause for which they gave the " +
89
+ "last full measure of devotion" + ENDASH + "that we here highly " +
90
+ "resolve that these dead shall not have died in vain" + ENDASH +
91
+ "that this nation, under God, shall have a new birth of freedom" +
92
+ ENDASH + "and that government of the people, by the people, for the " +
93
+ "people, shall not perish from the earth.\n"
94
+
95
+ ## Passphrase used to decrypt:
19
96
  PASS =
20
- "topsecretstuff"
97
+ "gfDLT0RbXgW5OvLnoj7mEX (Now doesn't that look fun...)"
21
98
 
22
99
  def setup
23
100
  ## Create a temporary file:
@@ -36,7 +113,7 @@ class FileSafeDecryptTest < Test::Unit::TestCase
36
113
  ## Read decrypted file contents:
37
114
  plaintext = File.open(@testfile,'r'){|f| f.read}
38
115
 
39
- assert(PLAINTEXT == plaintext)
116
+ assert(PLAINTEXT == plaintext, "Decryption of ciphertext with passphrase failed to match expected plaintext result.")
40
117
  end
41
118
  end
42
119
 
@@ -0,0 +1,82 @@
1
+ #!/usr/bin/env ruby
2
+ # encoding: ASCII-8BIT
3
+
4
+ require 'test/unit'
5
+ require_relative '../lib/filesafe.rb'
6
+
7
+ class FileSafeEncryptTest < Test::Unit::TestCase
8
+ PLAINTEXT = [
9
+ "eb82c419f0bec066419fd1dd2d18fbe540ee9419f0e16dbb643effc0cb108f98" +
10
+ "be67cd67bce8745c6ad6259421093606186023b6ff86a684b086321822247489" +
11
+ "a264f20ea51c87ec72105f230a5f79520fe090b17c70e6e1df2ab0a0f28140eb" +
12
+ "7481399d4a327ceb5d7763d9f4df4810a8da896fc5e0ca068402359dc24272fe" +
13
+ "4fa12cd9d40a9f9b39e59c4d598f1db2f18e6932d34908a3a8591c818b146f64" +
14
+ "c37bc4d67610678dfa801502ca84d21e3eab03d9cfd862dc04e7f31aaee78d5d" +
15
+ "24b7ab09971f489ac9e16215f30e2b586e861ac39ffa34d656f084c29d5df1e9" +
16
+ "c22612b1fa1bfb955c745af3d64036e38c526ab20a37400122dac284f4ddbbd1" +
17
+ "ec706229c49422e6ab3ccc8a1766ab13cb876c2cca998aa46afa5e0433b21d2b" +
18
+ "9b5d4b3770aac592d19c5ff21202dc5d27e12b794ad5df26f97ab2c19a16f5ee" +
19
+ "2c21c90f8e462e43917cd109118d2cbc888dc6d29727cdba22857549b1900754" +
20
+ "b22e71d27df5a57b85da7e13ed6acb4768969491473d13c9298f980b08ba032e"
21
+ ].pack('H*')
22
+
23
+ DEBUG_PARAMS = [
24
+ ## SALT (48 bytes, 384 bits):
25
+ "4e7953c3f5434aabbb358af82363592ddbf42f707f6cfaf9" +
26
+ "d61710b0cc7275829f6195881712baf29362cd7f73523de3" +
27
+ ## KEY (32 bytes, 256 bits):
28
+ "16cdd98ca1eacffd7685ab387ad882b603c93c4a26e5bf874747b15e122acd76" +
29
+ ## IV (16 bytes, 128 bits):
30
+ "1a2466b2480b84d571b1749e9bab67f5"
31
+ ].pack('H*')
32
+
33
+ CIPHERTEXT = [
34
+ ## SALT (48 bytes, 384 bits):
35
+ "4e7953c3f5434aabbb358af82363592ddbf42f707f6cfaf9" +
36
+ "d61710b0cc7275829f6195881712baf29362cd7f73523de3" +
37
+ ## C_F_KEY (32 bytes, 256 bits):
38
+ "d83eab0e69e061212206f8a8a24e83150370eebbb4458464f8c3d929b922c35e" +
39
+ ## C_F_IV (16 bytes, 128 bits):
40
+ "51a8cf9549d3dcb1d83d504d31d160a1" +
41
+ ## PBKDF2(passphrase + HMAC(SALT + C_F_KEY + C_F_IV)) (512 bits, 64 bytes):
42
+ "b1e619b7cdae804fb127440458852f2955fb3d0a5a2121c93ea03427f7f1d029" +
43
+ "ae88b0b3acc2b05d2dcc0af79934282e469024e8a9cd8f9f5671afaa6290784f" +
44
+ ## CIPHERTEXT BLOCKS:
45
+ "7852374484758b04bcf661a667dc2e03576f231897a52426f9cd547667b6ef16" +
46
+ "bcf17d2f23e9a30115a1619a219158259e64d13d3197019af92a8ccb22d24e0e" +
47
+ "248d48f867223086eb5ec729878fbe1696d83f357791c2af221ba7843cbb149c" +
48
+ "9ca1e50816dd14ccff97cf37e554d87b8ee3a4d121025877554858e3d365ab6a" +
49
+ "0440e65bf191d51f58eb3cee355101ab507dedb1700cb668843f698a4e8539d2" +
50
+ "324416336d479b156232d9759719596fe8d8ef494a33e7859d349a8764866b43" +
51
+ "0395d4f88234fcec7d9972ded3ec7418bcf098f0004245d3733ed80c7a2e6a5f" +
52
+ "ada107b1b7cc770bf9063e5f86de817c3fb72c2b8c3354c85c1c32770fb81052" +
53
+ "f2aab51e76233b755ba7712fb1389c267d994ded420c30fed22834cf5d0b1924" +
54
+ "9c5a297e5f57e5b9a7f2318b6edccf9a1d2b024cc6c4e7d8bbf3435185c8f7e0" +
55
+ "caa97abc688873da904deadc744c216ef044901edce3d239ffffc4b4f999a3cc" +
56
+ "32671bd83819b0478638eef85b5063bd5ba2cf9bc1f57ad05afc44fe35ff546f" +
57
+ "563b163ddb641c2e8f9bcd603b7d5c12"
58
+ ].pack('H*')
59
+ PASS =
60
+ "This is my very TOP SECRET passphrase. Please don't share it!"
61
+
62
+ def setup
63
+ ## Create a temporary file:
64
+ @testfile = 'test.out'
65
+ File.open(@testfile,'w'){|f| f.print PLAINTEXT}
66
+ end
67
+
68
+ def teardown
69
+ File.unlink(@testfile)
70
+ end
71
+
72
+ def test_encrypt
73
+ ## Encrypt data:
74
+ FileSafe.encrypt(@testfile, PASS, true, DEBUG_PARAMS)
75
+
76
+ ## Read encrypted file contents:
77
+ ciphertext = File.read(@testfile, :encoding => Encoding::BINARY)
78
+
79
+ assert(CIPHERTEXT == ciphertext, "Resulting encryption of plaintext to ciphertext does NOT match expected ciphertext.")
80
+ end
81
+ end
82
+
metadata CHANGED
@@ -1,38 +1,55 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: filesafe
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.0.0
5
- prerelease:
4
+ version: 3.1.0
6
5
  platform: ruby
7
6
  authors:
8
7
  - Aaron D. Gifford
9
8
  autorequire:
10
9
  bindir: bin
11
10
  cert_chain: []
12
- date: 2011-10-29 00:00:00.000000000Z
11
+ date: 2014-02-03 00:00:00.000000000 Z
13
12
  dependencies:
14
13
  - !ruby/object:Gem::Dependency
15
- name: pbkdf2
16
- requirement: &17188861760 !ruby/object:Gem::Requirement
17
- none: false
14
+ name: pbkdf2-ruby
15
+ requirement: !ruby/object:Gem::Requirement
18
16
  requirements:
19
- - - ! '>='
17
+ - - ~>
20
18
  - !ruby/object:Gem::Version
21
- version: 0.1.0
19
+ version: '0.2'
20
+ - - '>='
21
+ - !ruby/object:Gem::Version
22
+ version: 0.2.0
22
23
  type: :runtime
23
24
  prerelease: false
24
- version_requirements: *17188861760
25
+ version_requirements: !ruby/object:Gem::Requirement
26
+ requirements:
27
+ - - ~>
28
+ - !ruby/object:Gem::Version
29
+ version: '0.2'
30
+ - - '>='
31
+ - !ruby/object:Gem::Version
32
+ version: 0.2.0
25
33
  - !ruby/object:Gem::Dependency
26
34
  name: highline
27
- requirement: &17188861060 !ruby/object:Gem::Requirement
28
- none: false
35
+ requirement: !ruby/object:Gem::Requirement
29
36
  requirements:
30
- - - ! '>='
37
+ - - ~>
38
+ - !ruby/object:Gem::Version
39
+ version: 1.6.1
40
+ - - '>='
31
41
  - !ruby/object:Gem::Version
32
42
  version: 1.6.1
33
43
  type: :runtime
34
44
  prerelease: false
35
- version_requirements: *17188861060
45
+ version_requirements: !ruby/object:Gem::Requirement
46
+ requirements:
47
+ - - ~>
48
+ - !ruby/object:Gem::Version
49
+ version: 1.6.1
50
+ - - '>='
51
+ - !ruby/object:Gem::Version
52
+ version: 1.6.1
36
53
  description: A utility script for encrypting and decrypting files using a randomly
37
54
  generated 256-bit AES key and initialization vector secured using the PBKDF2 password/passphrase
38
55
  key derivation algorithm to secure the file key and IV.
@@ -44,36 +61,37 @@ extra_rdoc_files:
44
61
  - README.txt
45
62
  files:
46
63
  - README.txt
47
- - VERSION.txt
48
64
  - Rakefile
65
+ - VERSION.txt
49
66
  - bin/filesafe
50
67
  - lib/filesafe.rb
51
- - test/test_module.rb
52
- - test/test_decrypt.rb
53
68
  - test/test_cli.rb
69
+ - test/test_decrypt.rb
70
+ - test/test_encrypt.rb
71
+ - test/test_module.rb
54
72
  homepage: http://www.aarongifford.com/computers/filesafe/
55
- licenses: []
73
+ licenses:
74
+ - MIT
75
+ metadata: {}
56
76
  post_install_message:
57
77
  rdoc_options: []
58
78
  require_paths:
59
79
  - lib
60
80
  required_ruby_version: !ruby/object:Gem::Requirement
61
- none: false
62
81
  requirements:
63
- - - ! '>='
82
+ - - '>='
64
83
  - !ruby/object:Gem::Version
65
84
  version: '0'
66
85
  required_rubygems_version: !ruby/object:Gem::Requirement
67
- none: false
68
86
  requirements:
69
- - - ! '>='
87
+ - - '>='
70
88
  - !ruby/object:Gem::Version
71
89
  version: '0'
72
90
  requirements: []
73
91
  rubyforge_project:
74
- rubygems_version: 1.8.2
92
+ rubygems_version: 2.2.1
75
93
  signing_key:
76
- specification_version: 3
94
+ specification_version: 4
77
95
  summary: Encrypt/decrypt files with a random 256-bit AES key secured by a passphrase
78
96
  derived master key using PBKDF2
79
97
  test_files: []