filesafe 3.0.0 → 3.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/README.txt +1 -1
- data/Rakefile +7 -6
- data/VERSION.txt +1 -1
- data/lib/filesafe.rb +18 -7
- data/test/test_cli.rb +1 -0
- data/test/test_decrypt.rb +88 -11
- data/test/test_encrypt.rb +82 -0
- metadata +41 -23
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 2b861521a8fb52cf218a3222749b3daf51c664f2
|
4
|
+
data.tar.gz: f81c942da0d839c87694778cc3c8a5c2d06ab12b
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: c86db90a87c2de7d0bbc55870bda68605ed701126c108dbf2626dfe41c49fa5e40b877e9f418889e05d117eefd01916cd73fe68a0e320e91fb1f6eb3b8e97f88
|
7
|
+
data.tar.gz: fa49b8818edbc5a99f6a1cf23a91381950d07ad9fa358f2416f52f42b503cb8a13a0d8a5732cb57a661600fd1b7d6602c11d8b8cbf0456ae058a9538410ee0f2
|
data/README.txt
CHANGED
@@ -114,7 +114,7 @@ This script requires or relies on:
|
|
114
114
|
tempfile -- for temporary file creation
|
115
115
|
|
116
116
|
It uses the following gems:
|
117
|
-
pbkdf2
|
117
|
+
pbkdf2-ruby -- for the password-based key derivitive function PBKDF2
|
118
118
|
highline -- for reading a password/passphrase from a terminal
|
119
119
|
|
120
120
|
|
data/Rakefile
CHANGED
@@ -1,10 +1,11 @@
|
|
1
|
-
require '
|
2
|
-
require '
|
1
|
+
require 'rubygems/package_task'
|
2
|
+
require 'rdoc/task'
|
3
3
|
require 'rake/testtask'
|
4
4
|
|
5
5
|
gemspec = Gem::Specification.new do |spec|
|
6
6
|
spec.name = 'filesafe'
|
7
7
|
spec.version = File.open('VERSION.txt','r').to_a.join.strip
|
8
|
+
spec.licenses = ['MIT']
|
8
9
|
spec.date = File.mtime('VERSION.txt')
|
9
10
|
spec.author = 'Aaron D. Gifford'
|
10
11
|
spec.homepage = 'http://www.aarongifford.com/computers/filesafe/'
|
@@ -22,16 +23,16 @@ gemspec = Gem::Specification.new do |spec|
|
|
22
23
|
'test/*'
|
23
24
|
]
|
24
25
|
spec.executables = [ 'filesafe' ]
|
25
|
-
spec.
|
26
|
-
spec.
|
26
|
+
spec.add_runtime_dependency 'pbkdf2-ruby', '~> 0.2', '>= 0.2.0'
|
27
|
+
spec.add_runtime_dependency 'highline', '~>1.6.1', '>= 1.6.1'
|
27
28
|
end
|
28
29
|
|
29
|
-
|
30
|
+
Gem::PackageTask.new(gemspec) do |pkg|
|
30
31
|
pkg.need_zip = true
|
31
32
|
pkg.need_tar = true
|
32
33
|
end
|
33
34
|
|
34
|
-
|
35
|
+
RDoc::Task.new do |rdoc|
|
35
36
|
rdoc.name = 'rdoc'
|
36
37
|
rdoc.main = 'README.txt'
|
37
38
|
rdoc.rdoc_dir = 'doc'
|
data/VERSION.txt
CHANGED
@@ -1 +1 @@
|
|
1
|
-
3.
|
1
|
+
3.1.0
|
data/lib/filesafe.rb
CHANGED
@@ -76,9 +76,9 @@ module FileSafe
|
|
76
76
|
# Read a passphrase from a terminal.
|
77
77
|
def self.getphrase(check=false)
|
78
78
|
begin
|
79
|
-
phrase = HighLine.new.ask('Passphrase: '){|q| q.echo = '*' ; q.overwrite = true }
|
79
|
+
phrase = HighLine.new.ask('Passphrase: '){|q| q.echo = '*' ; q.overwrite = true ; q.validate = nil }
|
80
80
|
return phrase unless check
|
81
|
-
tmp = HighLine.new.ask('Retype passphrase: '){|q| q.echo = '*' ; q.overwrite = true }
|
81
|
+
tmp = HighLine.new.ask('Retype passphrase: '){|q| q.echo = '*' ; q.overwrite = true ; q.validate = nil }
|
82
82
|
return phrase if tmp == phrase
|
83
83
|
rescue Interrupt
|
84
84
|
exit -1
|
@@ -91,7 +91,7 @@ module FileSafe
|
|
91
91
|
|
92
92
|
# Encrypt a file with the supplied passphrase--or if none is supplied,
|
93
93
|
# read a passphrase from the terminal.
|
94
|
-
def self.encrypt(file, passphrase=nil, notemp=true)
|
94
|
+
def self.encrypt(file, passphrase=nil, notemp=true, debug_params=nil)
|
95
95
|
raise "Cannot encrypt non-existent file: #{file.inspect}" unless File.exist?(file)
|
96
96
|
raise "Cannot encrypt unreadable file: #{file.inspect}" unless File.readable?(file)
|
97
97
|
raise "Cannot encrypt unwritable file: #{file.inspect}" unless File.writable?(file)
|
@@ -127,10 +127,21 @@ module FileSafe
|
|
127
127
|
passphrase = getphrase(true)
|
128
128
|
end
|
129
129
|
|
130
|
-
## Use secure random data to populate salt, key, and
|
131
|
-
|
132
|
-
|
133
|
-
|
130
|
+
## Use secure random data to populate salt, key, and iv (unless debugging data is provided):
|
131
|
+
if debug_params.nil?
|
132
|
+
file_key = SecureRandom.random_bytes(KEY_LEN) ## Get some random key material
|
133
|
+
file_iv = SecureRandom.random_bytes(IV_LEN) ## And a random initialization vector
|
134
|
+
salt = SecureRandom.random_bytes(SALT_LEN)
|
135
|
+
else
|
136
|
+
## Manually-provided debugging/testing data will be used instead
|
137
|
+
## (not recommended unless testing/debugging):
|
138
|
+
raise "Invalid debugging parameter data provided!" unless debug_params.is_a?(String) &&
|
139
|
+
debug_params.encoding == Encoding::BINARY &&
|
140
|
+
debug_params.size == SALT_LEN + KEY_LEN + IV_LEN
|
141
|
+
salt = debug_params.slice!(0,SALT_LEN)
|
142
|
+
file_key = debug_params.slice!(0,KEY_LEN)
|
143
|
+
file_iv = debug_params
|
144
|
+
end
|
134
145
|
|
135
146
|
## Encrypt the file key and IV using password-derived keying material:
|
136
147
|
keymaterial = pbkdf2(passphrase, salt, KEY_LEN + IV_LEN)
|
data/test/test_cli.rb
CHANGED
data/test/test_decrypt.rb
CHANGED
@@ -5,19 +5,96 @@ require 'test/unit'
|
|
5
5
|
require_relative '../lib/filesafe.rb'
|
6
6
|
|
7
7
|
class FileSafeDecryptTest < Test::Unit::TestCase
|
8
|
+
## Unicode UTF-8 endash character as ASCII-8BIT binary two-byte, two-character string
|
9
|
+
ENDASH = ["2014"].pack('H*')
|
10
|
+
|
11
|
+
## Encrypted ciphertext:
|
8
12
|
CIPHERTEXT = [
|
9
|
-
"
|
10
|
-
"
|
11
|
-
"
|
12
|
-
"
|
13
|
-
"
|
14
|
-
"
|
15
|
-
"
|
16
|
-
"
|
13
|
+
"cda462fe3b2ec9f141fcec6e32198effcb0ed661c35af78878c1e6fb52f5e798" +
|
14
|
+
"552e2e02c080cb37aaa298d2a27831d4dabe111101107ee85b21e7b5d91262f1" +
|
15
|
+
"f6bf0c63dee422b0a39bbd662202e7cf85feab6c50216b812504119e37f876ce" +
|
16
|
+
"baa1a8d402614cfdd5e40a725f0229e19c046f00c8dc264a481b22fece930113" +
|
17
|
+
"85debf353626c7dcc34747b5d766ec979d69cf61d4a9bf0db218d4eda7c2b9f9" +
|
18
|
+
"e045ac11ebd034caad05fe318aad9cc85500be80b2ff398d62958cb82ee0a583" +
|
19
|
+
"b3f0512ef2f9a09dc4dee2e7250ee8db3ce720d84c7f4409e8852ab582118410" +
|
20
|
+
"06f9b26163bd0262c7eb7d239c2a66b7228e2372d6bdc9f32dced48e4387829a" +
|
21
|
+
"3358abfaf8dff19651e7d06eb8f06dd181df78ced880c1ae4e4aa8e4f2e58d18" +
|
22
|
+
"e8603ca8714081e935e1b5d3916de4bf1f3f083ab1b0a70abfd6bf5a25244032" +
|
23
|
+
"9327a4da7e1b28e13bddc660ae9e4426ec5bc0e28eba2f794e8ed5c26c9c6717" +
|
24
|
+
"e81d194ca2e0e135c3e89a87241d75279eb11352e9ccbbf973de265ebf173916" +
|
25
|
+
"421e3c5575350cdd4ff0adb8008aa2ced5ae855940a6d7a221dd651340a4c361" +
|
26
|
+
"c1e31e7c6ad4ca6156632cd5f92c48990275b53aca0251d89d61fb25635c965c" +
|
27
|
+
"57e615ba69f54cff5ca8b56607e71c3f1a76c81ceb86ab99216da0932b09c72e" +
|
28
|
+
"46aae92870105a7c9613acf9d40520692370c1c30249870ba9f0914514389693" +
|
29
|
+
"8a3c06414ff868511b52c5fa6d2465c5cad3002724852998ea096ad9eea02b5c" +
|
30
|
+
"98faf9954240000938a2ac152b4bcb836fb1fe77ff0f6a3fa0cfebc4d93ac8fc" +
|
31
|
+
"9da2c7171319de5a7b034485abb1fbff7ca323be0240394e0cd32d0cfa30c52d" +
|
32
|
+
"ea5d02569b95eec39b8bd64559873fdf7eda67523c2fe0234883a0f7e98571ee" +
|
33
|
+
"80176609f776be278f7f8665951689b01f6af2ef3002bc1ade88aa398d44039f" +
|
34
|
+
"b996d4a094c74925020740573b0c4df4a39cdc689280f535d8e2603fc2c0d4c0" +
|
35
|
+
"909933efbd4b99a56564084bab6be5198e0af1d3217ca29def5b422c270c3076" +
|
36
|
+
"4af961c2e47d57d520d664e920645a438d339dcaba36246ce4d58fd858e53ceb" +
|
37
|
+
"7bbc42cc559eee525f3790810a5e647a7c444308ce47bd61cdfbd416fb935cdf" +
|
38
|
+
"f467e9c810c3127c53eb7abe5ca39c3ce98c5b91b3f0696c13c14344717d565d" +
|
39
|
+
"e34163cc0af075ef05bda600eeac2c60779b29fdf060e612dc6dd4d81e4c5a38" +
|
40
|
+
"5be05409a153177bad7349362c320664043980dd960f923a2de274f01b6b9397" +
|
41
|
+
"e24fcd61cd16c10c79649574e7f2874e71dbc563b2b6807359f0799314189000" +
|
42
|
+
"6e211a033058adec7a7e58349342803cc784e1e989f1bc552c0a13753ad43661" +
|
43
|
+
"71de7f01d35b75e4143a59d738b3b6bd3b45609bdca7996d60564fce0e12df2e" +
|
44
|
+
"4658d33b7db5587f431893b44c199d475f7b47a436171d66a6a6d4575c80c6c9" +
|
45
|
+
"0f847223367c8c91a74fad3d27cc954ed72640fff84fc33cfb9b4acdef3e2b7c" +
|
46
|
+
"810d52e507c74c55cf6123e64b3a6706caa032475793425ebba18c9ca60b3a35" +
|
47
|
+
"da91e6d7c4e998fc44aece8a6e0c47184176b4430378e12f1c970a7d27c6350d" +
|
48
|
+
"080d79a08b535fe89afb2e02e9d72bb652fb3c09ab948b3fcc43401f0e5719c5" +
|
49
|
+
"0cb859975770f0389430eed2c82883e3d07f727b4442f9922712ae763f9c32d4" +
|
50
|
+
"84ddd3c2d220ada8e70fef0d5217d24df24f000b827d84ce26702a253717e9bc" +
|
51
|
+
"3aaddd3de3ccd833adf668efca3ae6db77290b5de6d6ee5c8223a500066ca69f" +
|
52
|
+
"3694ba6b1c15414a7c689f284bad5402d01aa3738196b653c6795e512d839e10" +
|
53
|
+
"9f99210803fbc635dd0dcf19c1ea141c8772fb43ea18606f7cae68974b23ff03" +
|
54
|
+
"90f0f76cde8e23c19844d95e9564c3174572c45654c2e9e727839b768057993f" +
|
55
|
+
"6348c81e45be01e6b8b41cd2156aa05e5587c5fe7c54eb4803ddaa82c717d6d6" +
|
56
|
+
"b7874dc209c0e3897ad3760a80af234a2d256e7d4fc120f92a3d9460e933b3ac" +
|
57
|
+
"99059edca183cc0e9226d128a799db259f6b0842a7c4d6c80d9b7dce202d33f9" +
|
58
|
+
"40fdecc27ffa9201dd2dc18043cae5c4460c0421c272b1b941543a80f7cd2aab" +
|
59
|
+
"edf9886c8fdd1ee85aa2ebb158046420fb44a7a0879f5a318a5434de86d58683" +
|
60
|
+
"898240d4c9e81b3ae28907472f8bc498ebce1266b6e721f3538d7f4737a8913d" +
|
61
|
+
"e29d9f4200dcfa988b3d17fefc4e24d33677f49842955abf06e80cc98ff255e0" +
|
62
|
+
"a23db1556b6e9eea66bf121e8152d4ae73f674698cf09d7ee7b7863f9fd00d81" +
|
63
|
+
"2f144ef1237ab6a4f2f6c9a69c0129f231df17ff5815a8871ef7fe16fc8efd1a"
|
64
|
+
].pack('H*')
|
65
|
+
|
66
|
+
## Expected plaintext result as ASCII-8BIT binary string (though
|
67
|
+
## it technically does contain several two-byte UTF-8 Unicode
|
68
|
+
## endash characters mixed in):
|
17
69
|
PLAINTEXT =
|
18
|
-
"
|
70
|
+
"Four score and seven years ago our fathers brought forth on this " +
|
71
|
+
"continent a new nation, conceived in liberty, and dedicated to the " +
|
72
|
+
"proposition that all men are created equal.\n" +
|
73
|
+
"Now we are engaged in a great civil war, testing whether that " +
|
74
|
+
"nation, or any nation so conceived and so dedicated, can long " +
|
75
|
+
"endure. We are met on a great battlefield of that war. We have " +
|
76
|
+
"come to dedicate a portion of that field, as a final resting place " +
|
77
|
+
"for those who here gave their lives that that nation might live. " +
|
78
|
+
"It is altogether fitting and proper that we should do this.\n" +
|
79
|
+
"But, in a larger sense, we can not dedicate, we can not " +
|
80
|
+
"consecrate, we can not hallow this ground. The brave men, living " +
|
81
|
+
"and dead, who struggled here, have consecrated it, far above our " +
|
82
|
+
"poor power to add or detract. The world will little note, nor long " +
|
83
|
+
"remember what we say here, but it can never forget what they did " +
|
84
|
+
"here. It is for us the living, rather, to be dedicated here to the " +
|
85
|
+
"unfinished work which they who fought here have thus far so nobly " +
|
86
|
+
"advanced. It is rather for us to be here dedicated to the great " +
|
87
|
+
"task remaining before us" + ENDASH + "that from these honored dead " +
|
88
|
+
"we take increased devotion to that cause for which they gave the " +
|
89
|
+
"last full measure of devotion" + ENDASH + "that we here highly " +
|
90
|
+
"resolve that these dead shall not have died in vain" + ENDASH +
|
91
|
+
"that this nation, under God, shall have a new birth of freedom" +
|
92
|
+
ENDASH + "and that government of the people, by the people, for the " +
|
93
|
+
"people, shall not perish from the earth.\n"
|
94
|
+
|
95
|
+
## Passphrase used to decrypt:
|
19
96
|
PASS =
|
20
|
-
"
|
97
|
+
"gfDLT0RbXgW5OvLnoj7mEX (Now doesn't that look fun...)"
|
21
98
|
|
22
99
|
def setup
|
23
100
|
## Create a temporary file:
|
@@ -36,7 +113,7 @@ class FileSafeDecryptTest < Test::Unit::TestCase
|
|
36
113
|
## Read decrypted file contents:
|
37
114
|
plaintext = File.open(@testfile,'r'){|f| f.read}
|
38
115
|
|
39
|
-
assert(PLAINTEXT == plaintext)
|
116
|
+
assert(PLAINTEXT == plaintext, "Decryption of ciphertext with passphrase failed to match expected plaintext result.")
|
40
117
|
end
|
41
118
|
end
|
42
119
|
|
@@ -0,0 +1,82 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
# encoding: ASCII-8BIT
|
3
|
+
|
4
|
+
require 'test/unit'
|
5
|
+
require_relative '../lib/filesafe.rb'
|
6
|
+
|
7
|
+
class FileSafeEncryptTest < Test::Unit::TestCase
|
8
|
+
PLAINTEXT = [
|
9
|
+
"eb82c419f0bec066419fd1dd2d18fbe540ee9419f0e16dbb643effc0cb108f98" +
|
10
|
+
"be67cd67bce8745c6ad6259421093606186023b6ff86a684b086321822247489" +
|
11
|
+
"a264f20ea51c87ec72105f230a5f79520fe090b17c70e6e1df2ab0a0f28140eb" +
|
12
|
+
"7481399d4a327ceb5d7763d9f4df4810a8da896fc5e0ca068402359dc24272fe" +
|
13
|
+
"4fa12cd9d40a9f9b39e59c4d598f1db2f18e6932d34908a3a8591c818b146f64" +
|
14
|
+
"c37bc4d67610678dfa801502ca84d21e3eab03d9cfd862dc04e7f31aaee78d5d" +
|
15
|
+
"24b7ab09971f489ac9e16215f30e2b586e861ac39ffa34d656f084c29d5df1e9" +
|
16
|
+
"c22612b1fa1bfb955c745af3d64036e38c526ab20a37400122dac284f4ddbbd1" +
|
17
|
+
"ec706229c49422e6ab3ccc8a1766ab13cb876c2cca998aa46afa5e0433b21d2b" +
|
18
|
+
"9b5d4b3770aac592d19c5ff21202dc5d27e12b794ad5df26f97ab2c19a16f5ee" +
|
19
|
+
"2c21c90f8e462e43917cd109118d2cbc888dc6d29727cdba22857549b1900754" +
|
20
|
+
"b22e71d27df5a57b85da7e13ed6acb4768969491473d13c9298f980b08ba032e"
|
21
|
+
].pack('H*')
|
22
|
+
|
23
|
+
DEBUG_PARAMS = [
|
24
|
+
## SALT (48 bytes, 384 bits):
|
25
|
+
"4e7953c3f5434aabbb358af82363592ddbf42f707f6cfaf9" +
|
26
|
+
"d61710b0cc7275829f6195881712baf29362cd7f73523de3" +
|
27
|
+
## KEY (32 bytes, 256 bits):
|
28
|
+
"16cdd98ca1eacffd7685ab387ad882b603c93c4a26e5bf874747b15e122acd76" +
|
29
|
+
## IV (16 bytes, 128 bits):
|
30
|
+
"1a2466b2480b84d571b1749e9bab67f5"
|
31
|
+
].pack('H*')
|
32
|
+
|
33
|
+
CIPHERTEXT = [
|
34
|
+
## SALT (48 bytes, 384 bits):
|
35
|
+
"4e7953c3f5434aabbb358af82363592ddbf42f707f6cfaf9" +
|
36
|
+
"d61710b0cc7275829f6195881712baf29362cd7f73523de3" +
|
37
|
+
## C_F_KEY (32 bytes, 256 bits):
|
38
|
+
"d83eab0e69e061212206f8a8a24e83150370eebbb4458464f8c3d929b922c35e" +
|
39
|
+
## C_F_IV (16 bytes, 128 bits):
|
40
|
+
"51a8cf9549d3dcb1d83d504d31d160a1" +
|
41
|
+
## PBKDF2(passphrase + HMAC(SALT + C_F_KEY + C_F_IV)) (512 bits, 64 bytes):
|
42
|
+
"b1e619b7cdae804fb127440458852f2955fb3d0a5a2121c93ea03427f7f1d029" +
|
43
|
+
"ae88b0b3acc2b05d2dcc0af79934282e469024e8a9cd8f9f5671afaa6290784f" +
|
44
|
+
## CIPHERTEXT BLOCKS:
|
45
|
+
"7852374484758b04bcf661a667dc2e03576f231897a52426f9cd547667b6ef16" +
|
46
|
+
"bcf17d2f23e9a30115a1619a219158259e64d13d3197019af92a8ccb22d24e0e" +
|
47
|
+
"248d48f867223086eb5ec729878fbe1696d83f357791c2af221ba7843cbb149c" +
|
48
|
+
"9ca1e50816dd14ccff97cf37e554d87b8ee3a4d121025877554858e3d365ab6a" +
|
49
|
+
"0440e65bf191d51f58eb3cee355101ab507dedb1700cb668843f698a4e8539d2" +
|
50
|
+
"324416336d479b156232d9759719596fe8d8ef494a33e7859d349a8764866b43" +
|
51
|
+
"0395d4f88234fcec7d9972ded3ec7418bcf098f0004245d3733ed80c7a2e6a5f" +
|
52
|
+
"ada107b1b7cc770bf9063e5f86de817c3fb72c2b8c3354c85c1c32770fb81052" +
|
53
|
+
"f2aab51e76233b755ba7712fb1389c267d994ded420c30fed22834cf5d0b1924" +
|
54
|
+
"9c5a297e5f57e5b9a7f2318b6edccf9a1d2b024cc6c4e7d8bbf3435185c8f7e0" +
|
55
|
+
"caa97abc688873da904deadc744c216ef044901edce3d239ffffc4b4f999a3cc" +
|
56
|
+
"32671bd83819b0478638eef85b5063bd5ba2cf9bc1f57ad05afc44fe35ff546f" +
|
57
|
+
"563b163ddb641c2e8f9bcd603b7d5c12"
|
58
|
+
].pack('H*')
|
59
|
+
PASS =
|
60
|
+
"This is my very TOP SECRET passphrase. Please don't share it!"
|
61
|
+
|
62
|
+
def setup
|
63
|
+
## Create a temporary file:
|
64
|
+
@testfile = 'test.out'
|
65
|
+
File.open(@testfile,'w'){|f| f.print PLAINTEXT}
|
66
|
+
end
|
67
|
+
|
68
|
+
def teardown
|
69
|
+
File.unlink(@testfile)
|
70
|
+
end
|
71
|
+
|
72
|
+
def test_encrypt
|
73
|
+
## Encrypt data:
|
74
|
+
FileSafe.encrypt(@testfile, PASS, true, DEBUG_PARAMS)
|
75
|
+
|
76
|
+
## Read encrypted file contents:
|
77
|
+
ciphertext = File.read(@testfile, :encoding => Encoding::BINARY)
|
78
|
+
|
79
|
+
assert(CIPHERTEXT == ciphertext, "Resulting encryption of plaintext to ciphertext does NOT match expected ciphertext.")
|
80
|
+
end
|
81
|
+
end
|
82
|
+
|
metadata
CHANGED
@@ -1,38 +1,55 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: filesafe
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.
|
5
|
-
prerelease:
|
4
|
+
version: 3.1.0
|
6
5
|
platform: ruby
|
7
6
|
authors:
|
8
7
|
- Aaron D. Gifford
|
9
8
|
autorequire:
|
10
9
|
bindir: bin
|
11
10
|
cert_chain: []
|
12
|
-
date:
|
11
|
+
date: 2014-02-03 00:00:00.000000000 Z
|
13
12
|
dependencies:
|
14
13
|
- !ruby/object:Gem::Dependency
|
15
|
-
name: pbkdf2
|
16
|
-
requirement:
|
17
|
-
none: false
|
14
|
+
name: pbkdf2-ruby
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
18
16
|
requirements:
|
19
|
-
- -
|
17
|
+
- - ~>
|
20
18
|
- !ruby/object:Gem::Version
|
21
|
-
version: 0.
|
19
|
+
version: '0.2'
|
20
|
+
- - '>='
|
21
|
+
- !ruby/object:Gem::Version
|
22
|
+
version: 0.2.0
|
22
23
|
type: :runtime
|
23
24
|
prerelease: false
|
24
|
-
version_requirements:
|
25
|
+
version_requirements: !ruby/object:Gem::Requirement
|
26
|
+
requirements:
|
27
|
+
- - ~>
|
28
|
+
- !ruby/object:Gem::Version
|
29
|
+
version: '0.2'
|
30
|
+
- - '>='
|
31
|
+
- !ruby/object:Gem::Version
|
32
|
+
version: 0.2.0
|
25
33
|
- !ruby/object:Gem::Dependency
|
26
34
|
name: highline
|
27
|
-
requirement:
|
28
|
-
none: false
|
35
|
+
requirement: !ruby/object:Gem::Requirement
|
29
36
|
requirements:
|
30
|
-
- -
|
37
|
+
- - ~>
|
38
|
+
- !ruby/object:Gem::Version
|
39
|
+
version: 1.6.1
|
40
|
+
- - '>='
|
31
41
|
- !ruby/object:Gem::Version
|
32
42
|
version: 1.6.1
|
33
43
|
type: :runtime
|
34
44
|
prerelease: false
|
35
|
-
version_requirements:
|
45
|
+
version_requirements: !ruby/object:Gem::Requirement
|
46
|
+
requirements:
|
47
|
+
- - ~>
|
48
|
+
- !ruby/object:Gem::Version
|
49
|
+
version: 1.6.1
|
50
|
+
- - '>='
|
51
|
+
- !ruby/object:Gem::Version
|
52
|
+
version: 1.6.1
|
36
53
|
description: A utility script for encrypting and decrypting files using a randomly
|
37
54
|
generated 256-bit AES key and initialization vector secured using the PBKDF2 password/passphrase
|
38
55
|
key derivation algorithm to secure the file key and IV.
|
@@ -44,36 +61,37 @@ extra_rdoc_files:
|
|
44
61
|
- README.txt
|
45
62
|
files:
|
46
63
|
- README.txt
|
47
|
-
- VERSION.txt
|
48
64
|
- Rakefile
|
65
|
+
- VERSION.txt
|
49
66
|
- bin/filesafe
|
50
67
|
- lib/filesafe.rb
|
51
|
-
- test/test_module.rb
|
52
|
-
- test/test_decrypt.rb
|
53
68
|
- test/test_cli.rb
|
69
|
+
- test/test_decrypt.rb
|
70
|
+
- test/test_encrypt.rb
|
71
|
+
- test/test_module.rb
|
54
72
|
homepage: http://www.aarongifford.com/computers/filesafe/
|
55
|
-
licenses:
|
73
|
+
licenses:
|
74
|
+
- MIT
|
75
|
+
metadata: {}
|
56
76
|
post_install_message:
|
57
77
|
rdoc_options: []
|
58
78
|
require_paths:
|
59
79
|
- lib
|
60
80
|
required_ruby_version: !ruby/object:Gem::Requirement
|
61
|
-
none: false
|
62
81
|
requirements:
|
63
|
-
- -
|
82
|
+
- - '>='
|
64
83
|
- !ruby/object:Gem::Version
|
65
84
|
version: '0'
|
66
85
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
67
|
-
none: false
|
68
86
|
requirements:
|
69
|
-
- -
|
87
|
+
- - '>='
|
70
88
|
- !ruby/object:Gem::Version
|
71
89
|
version: '0'
|
72
90
|
requirements: []
|
73
91
|
rubyforge_project:
|
74
|
-
rubygems_version:
|
92
|
+
rubygems_version: 2.2.1
|
75
93
|
signing_key:
|
76
|
-
specification_version:
|
94
|
+
specification_version: 4
|
77
95
|
summary: Encrypt/decrypt files with a random 256-bit AES key secured by a passphrase
|
78
96
|
derived master key using PBKDF2
|
79
97
|
test_files: []
|