trustworthy 0.3.2 → 0.4.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/lib/trustworthy/cli/crypt.rb +4 -6
- data/lib/trustworthy/cli/decrypt.rb +9 -1
- data/lib/trustworthy/cli/encrypt.rb +9 -1
- data/lib/trustworthy/version.rb +1 -1
- data/spec/trustworthy/cli/add_key_spec.rb +3 -3
- data/spec/trustworthy/cli/decrypt_spec.rb +31 -10
- data/spec/trustworthy/cli/encrypt_spec.rb +15 -7
- data/spec/trustworthy/cli/init_spec.rb +9 -9
- data/spec/trustworthy/key_spec.rb +4 -4
- data/spec/trustworthy/master_key_spec.rb +10 -10
- data/spec/trustworthy/prompt_spec.rb +11 -11
- data/spec/trustworthy/random_spec.rb +4 -4
- data/spec/trustworthy/settings_spec.rb +16 -14
- metadata +9 -10
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6163419b9bd1c5182869f67d2aae6729a17902c7
|
4
|
+
data.tar.gz: 36cf221396e73c5c21a120d16960aa3c0c51330c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f358807df4c238f84f30efa2f61cf8a1940cef345ce6e506965aac2cf3b922050101f7e33a77d84bdbf78af717a92b9e822e6ce8ec62524bdb13cc44bd276f3e
|
7
|
+
data.tar.gz: bd8fe45b4dc039201e1155462f609837e633e5ac0326764a19ad5f22988c8d8302ec264ddb586f210b23cbf442a3a52a16bd7f651006b1bb4159cba7d229470d
|
data/README.md
CHANGED
@@ -20,13 +20,13 @@ The master key will be loaded so that a new user key can be added to the configu
|
|
20
20
|
|
21
21
|
### Encrypt a file
|
22
22
|
|
23
|
-
trustworthy encrypt
|
23
|
+
trustworthy encrypt foo.txt
|
24
24
|
|
25
25
|
The master key will be loaded and then used to encrypt the file specified.
|
26
26
|
|
27
27
|
### Decrypt a file
|
28
28
|
|
29
|
-
trustworthy decrypt
|
29
|
+
trustworthy decrypt foo.txt.tw
|
30
30
|
|
31
31
|
Decrypting works similar to encrypting, first the master key will be loaded and then used to decrypt the file.
|
32
32
|
|
@@ -6,15 +6,13 @@ module Trustworthy
|
|
6
6
|
end
|
7
7
|
|
8
8
|
def parse_options(args)
|
9
|
-
super(_command, args) do |opts, options|
|
10
|
-
opts.on('-i', '--input FILE', "File to #{_command}") do |file|
|
11
|
-
options[:input_file] = file
|
12
|
-
end
|
13
|
-
|
9
|
+
options = super(_command, args) do |opts, options|
|
14
10
|
opts.on('-o', '--output FILE', "File to write #{_command}ed contents to") do |file|
|
15
11
|
options[:output_file] = file
|
16
12
|
end
|
17
13
|
end
|
14
|
+
options[:input_file] = args.shift
|
15
|
+
options
|
18
16
|
end
|
19
17
|
|
20
18
|
def run(args)
|
@@ -33,7 +31,7 @@ module Trustworthy
|
|
33
31
|
|
34
32
|
def _check_options(args)
|
35
33
|
options = parse_options(args)
|
36
|
-
unless options
|
34
|
+
unless options[:input_file] && options[:output_file]
|
37
35
|
print_help
|
38
36
|
throw :error
|
39
37
|
end
|
@@ -5,7 +5,15 @@ module Trustworthy
|
|
5
5
|
include Trustworthy::CLI::Crypt
|
6
6
|
|
7
7
|
def self._command
|
8
|
-
'decrypt'
|
8
|
+
'decrypt filename'
|
9
|
+
end
|
10
|
+
|
11
|
+
def parse_options(args)
|
12
|
+
options = super(args)
|
13
|
+
if options[:input_file].to_s.end_with?('.tw') && !options.has_key?(:output_file)
|
14
|
+
options[:output_file] = File.basename(options[:input_file], '.tw')
|
15
|
+
end
|
16
|
+
options
|
9
17
|
end
|
10
18
|
|
11
19
|
def _transform(prompt, options, input_file)
|
@@ -5,7 +5,15 @@ module Trustworthy
|
|
5
5
|
include Trustworthy::CLI::Crypt
|
6
6
|
|
7
7
|
def self._command
|
8
|
-
'encrypt'
|
8
|
+
'encrypt filename'
|
9
|
+
end
|
10
|
+
|
11
|
+
def parse_options(args)
|
12
|
+
options = super(args)
|
13
|
+
unless options.has_key?(:output_file)
|
14
|
+
options[:output_file] = "#{options[:input_file]}.tw"
|
15
|
+
end
|
16
|
+
options
|
9
17
|
end
|
10
18
|
|
11
19
|
def _transform(prompt, options, input_file)
|
data/lib/trustworthy/version.rb
CHANGED
@@ -29,9 +29,9 @@ describe Trustworthy::CLI::AddKey do
|
|
29
29
|
|
30
30
|
contents = File.read(TestValues::SettingsFile)
|
31
31
|
subkeys = YAML.load(contents)
|
32
|
-
subkeys.
|
33
|
-
subkeys.
|
34
|
-
subkeys.
|
32
|
+
expect(subkeys).to have_key('user1')
|
33
|
+
expect(subkeys).to have_key('user2')
|
34
|
+
expect(subkeys).to have_key('user3')
|
35
35
|
end
|
36
36
|
end
|
37
37
|
end
|
@@ -8,7 +8,8 @@ describe Trustworthy::CLI::Decrypt do
|
|
8
8
|
around(:each) do |example|
|
9
9
|
within_construct do |construct|
|
10
10
|
construct.file(TestValues::SettingsFile)
|
11
|
-
construct.file('input.txt', TestValues::EncryptedFile)
|
11
|
+
construct.file('input.txt.tw', TestValues::EncryptedFile)
|
12
|
+
construct.file('input.txt')
|
12
13
|
construct.file('output.txt')
|
13
14
|
create_config(TestValues::SettingsFile)
|
14
15
|
example.run
|
@@ -23,11 +24,14 @@ describe Trustworthy::CLI::Decrypt do
|
|
23
24
|
'user2',
|
24
25
|
'password2'
|
25
26
|
) do
|
26
|
-
Trustworthy::CLI::Decrypt.new.run(['
|
27
|
+
Trustworthy::CLI::Decrypt.new.run(['input.txt.tw'])
|
27
28
|
end
|
28
29
|
|
30
|
+
plaintext = File.read('input.txt')
|
31
|
+
expect(plaintext).to eq(TestValues::Plaintext)
|
32
|
+
|
29
33
|
plaintext = File.read('output.txt')
|
30
|
-
plaintext.
|
34
|
+
expect(plaintext).to be_empty
|
31
35
|
end
|
32
36
|
|
33
37
|
it 'should require an input file' do
|
@@ -38,12 +42,12 @@ describe Trustworthy::CLI::Decrypt do
|
|
38
42
|
'password2'
|
39
43
|
) do
|
40
44
|
decrypt = Trustworthy::CLI::Decrypt.new
|
41
|
-
decrypt.
|
45
|
+
expect(decrypt).to receive(:print_help)
|
42
46
|
decrypt.run([])
|
43
47
|
end
|
44
48
|
end
|
45
49
|
|
46
|
-
it 'should require an output file' do
|
50
|
+
it 'should require an output file if input does not end in .tw' do
|
47
51
|
HighLine::Simulate.with(
|
48
52
|
'user1',
|
49
53
|
'password1',
|
@@ -51,19 +55,36 @@ describe Trustworthy::CLI::Decrypt do
|
|
51
55
|
'password2'
|
52
56
|
) do
|
53
57
|
decrypt = Trustworthy::CLI::Decrypt.new
|
54
|
-
decrypt.
|
55
|
-
decrypt.run(['
|
58
|
+
expect(decrypt).to receive(:print_help)
|
59
|
+
decrypt.run(['input.txt'])
|
56
60
|
end
|
57
61
|
end
|
58
62
|
|
63
|
+
it 'should take an optional output file' do
|
64
|
+
HighLine::Simulate.with(
|
65
|
+
'user1',
|
66
|
+
'password1',
|
67
|
+
'user2',
|
68
|
+
'password2'
|
69
|
+
) do
|
70
|
+
Trustworthy::CLI::Decrypt.new.run(['input.txt.tw', '-o', 'output.txt'])
|
71
|
+
end
|
72
|
+
|
73
|
+
plaintext = File.read('output.txt')
|
74
|
+
expect(plaintext).to eq(TestValues::Plaintext)
|
75
|
+
|
76
|
+
plaintext = File.read('input.txt')
|
77
|
+
expect(plaintext).to be_empty
|
78
|
+
end
|
79
|
+
|
59
80
|
it 'should error on non-trustworthy input files' do
|
60
|
-
File.open('input.txt', 'w+') do |file|
|
81
|
+
File.open('input.txt.tw', 'w+') do |file|
|
61
82
|
file.write('bad file')
|
62
83
|
end
|
63
84
|
|
64
85
|
decrypt = Trustworthy::CLI::Decrypt.new
|
65
|
-
decrypt.
|
66
|
-
decrypt.run(['
|
86
|
+
expect(decrypt).to receive(:say).with('File input.txt.tw does not appear to be a trustworthy encrypted file')
|
87
|
+
decrypt.run(['input.txt.tw'])
|
67
88
|
end
|
68
89
|
end
|
69
90
|
end
|
@@ -10,6 +10,7 @@ describe Trustworthy::CLI::Encrypt do
|
|
10
10
|
within_construct do |construct|
|
11
11
|
construct.file(TestValues::SettingsFile)
|
12
12
|
construct.file('input.txt', TestValues::Plaintext)
|
13
|
+
construct.file('input.txt.tw')
|
13
14
|
construct.file('output.txt')
|
14
15
|
create_config(TestValues::SettingsFile)
|
15
16
|
example.run
|
@@ -24,11 +25,14 @@ describe Trustworthy::CLI::Encrypt do
|
|
24
25
|
'user2',
|
25
26
|
'password2'
|
26
27
|
) do
|
27
|
-
Trustworthy::CLI::Encrypt.new.run(['
|
28
|
+
Trustworthy::CLI::Encrypt.new.run(['input.txt'])
|
28
29
|
end
|
29
30
|
|
31
|
+
ciphertext = File.read('input.txt.tw')
|
32
|
+
expect(ciphertext).to eq(TestValues::EncryptedFile)
|
33
|
+
|
30
34
|
ciphertext = File.read('output.txt')
|
31
|
-
ciphertext.
|
35
|
+
expect(ciphertext).to be_empty
|
32
36
|
end
|
33
37
|
|
34
38
|
it 'should require an input file' do
|
@@ -39,22 +43,26 @@ describe Trustworthy::CLI::Encrypt do
|
|
39
43
|
'password2'
|
40
44
|
) do
|
41
45
|
encrypt = Trustworthy::CLI::Encrypt.new
|
42
|
-
encrypt.
|
46
|
+
expect(encrypt).to receive(:print_help)
|
43
47
|
encrypt.run([])
|
44
48
|
end
|
45
49
|
end
|
46
50
|
|
47
|
-
it 'should
|
51
|
+
it 'should allow a named output file' do
|
48
52
|
HighLine::Simulate.with(
|
49
53
|
'user1',
|
50
54
|
'password1',
|
51
55
|
'user2',
|
52
56
|
'password2'
|
53
57
|
) do
|
54
|
-
|
55
|
-
encrypt.should_receive(:print_help)
|
56
|
-
encrypt.run(['-i', 'input.txt'])
|
58
|
+
Trustworthy::CLI::Encrypt.new.run(['input.txt', '-o', 'output.txt'])
|
57
59
|
end
|
60
|
+
|
61
|
+
ciphertext = File.read('output.txt')
|
62
|
+
expect(ciphertext).to eq(TestValues::EncryptedFile)
|
63
|
+
|
64
|
+
ciphertext = File.read('input.txt.tw')
|
65
|
+
expect(ciphertext).to be_empty
|
58
66
|
end
|
59
67
|
end
|
60
68
|
end
|
@@ -15,7 +15,7 @@ describe Trustworthy::CLI::Init do
|
|
15
15
|
describe 'run' do
|
16
16
|
it 'should not allow any previous keys to exist' do
|
17
17
|
create_config(TestValues::SettingsFile)
|
18
|
-
$terminal.
|
18
|
+
expect($terminal).to receive(:say).with('Config trustworthy.yml already exists')
|
19
19
|
Trustworthy::CLI::Init.new.run([])
|
20
20
|
end
|
21
21
|
|
@@ -33,8 +33,8 @@ describe Trustworthy::CLI::Init do
|
|
33
33
|
|
34
34
|
contents = File.read(TestValues::SettingsFile)
|
35
35
|
subkeys = YAML.load(contents)
|
36
|
-
subkeys.
|
37
|
-
subkeys.
|
36
|
+
expect(subkeys).to have_key('user1')
|
37
|
+
expect(subkeys).to have_key('user2')
|
38
38
|
end
|
39
39
|
|
40
40
|
it 'should write to a specified file' do
|
@@ -54,8 +54,8 @@ describe Trustworthy::CLI::Init do
|
|
54
54
|
|
55
55
|
contents = File.read(filename)
|
56
56
|
subkeys = YAML.load(contents)
|
57
|
-
subkeys.
|
58
|
-
subkeys.
|
57
|
+
expect(subkeys).to have_key('user1')
|
58
|
+
expect(subkeys).to have_key('user2')
|
59
59
|
end
|
60
60
|
end
|
61
61
|
|
@@ -76,14 +76,14 @@ describe Trustworthy::CLI::Init do
|
|
76
76
|
|
77
77
|
contents = File.read(TestValues::SettingsFile)
|
78
78
|
subkeys = YAML.load(contents)
|
79
|
-
subkeys.
|
80
|
-
subkeys.
|
81
|
-
subkeys.
|
79
|
+
expect(subkeys).to have_key('user1')
|
80
|
+
expect(subkeys).to have_key('user2')
|
81
|
+
expect(subkeys).to have_key('user3')
|
82
82
|
end
|
83
83
|
|
84
84
|
it 'should require two subkeys minimum' do
|
85
85
|
init = Trustworthy::CLI::Init.new
|
86
|
-
init.
|
86
|
+
expect(init).to receive(:print_help)
|
87
87
|
init.run(['-k', '1'])
|
88
88
|
end
|
89
89
|
end
|
@@ -5,15 +5,15 @@ describe Trustworthy::Key do
|
|
5
5
|
it 'should create a key along the slope and intercept' do
|
6
6
|
Trustworthy::Random.stub(:number).and_return(BigDecimal.new('10'))
|
7
7
|
key = Trustworthy::Key.create(6, 24)
|
8
|
-
key.y.
|
8
|
+
expect(key.y).to eq(84)
|
9
9
|
end
|
10
10
|
end
|
11
11
|
|
12
12
|
describe 'self.create_from_string' do
|
13
13
|
it 'should create a key from the string representation' do
|
14
14
|
key = Trustworthy::Key.create_from_string('4.0,5.0')
|
15
|
-
key.x.
|
16
|
-
key.y.
|
15
|
+
expect(key.x).to eq(BigDecimal.new('4.0'))
|
16
|
+
expect(key.y).to eq(BigDecimal.new('5.0'))
|
17
17
|
end
|
18
18
|
end
|
19
19
|
|
@@ -22,7 +22,7 @@ describe Trustworthy::Key do
|
|
22
22
|
x = BigDecimal.new('4')
|
23
23
|
y = BigDecimal.new('5')
|
24
24
|
key = Trustworthy::Key.new(x, y)
|
25
|
-
key.to_s.
|
25
|
+
expect(key.to_s).to eq('4.0,5.0')
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
@@ -10,7 +10,7 @@ describe Trustworthy::MasterKey do
|
|
10
10
|
|
11
11
|
new_master_key = Trustworthy::MasterKey.create_from_keys(key1, key2)
|
12
12
|
plaintext = new_master_key.decrypt(ciphertext)
|
13
|
-
plaintext.
|
13
|
+
expect(plaintext).to eq(TestValues::Plaintext)
|
14
14
|
end
|
15
15
|
|
16
16
|
it 'should function with any 2 of n keys' do
|
@@ -25,7 +25,7 @@ describe Trustworthy::MasterKey do
|
|
25
25
|
|
26
26
|
master_key3 = Trustworthy::MasterKey.create_from_keys(key1, key3)
|
27
27
|
plaintext = master_key3.decrypt(ciphertext)
|
28
|
-
plaintext.
|
28
|
+
expect(plaintext).to eq(TestValues::Plaintext)
|
29
29
|
end
|
30
30
|
|
31
31
|
describe 'self.create' do
|
@@ -33,8 +33,8 @@ describe Trustworthy::MasterKey do
|
|
33
33
|
Trustworthy::Random.stub(:number).and_return(BigDecimal.new('10'))
|
34
34
|
master_key = Trustworthy::MasterKey.create
|
35
35
|
key = master_key.create_key
|
36
|
-
key.x.
|
37
|
-
key.y.
|
36
|
+
expect(key.x).to eq(10)
|
37
|
+
expect(key.y).to eq(110)
|
38
38
|
end
|
39
39
|
end
|
40
40
|
|
@@ -47,8 +47,8 @@ describe Trustworthy::MasterKey do
|
|
47
47
|
|
48
48
|
master_key = Trustworthy::MasterKey.create_from_keys(key1, key2)
|
49
49
|
new_key = master_key.create_key
|
50
|
-
new_key.x.
|
51
|
-
new_key.y.
|
50
|
+
expect(new_key.x).to eq(10)
|
51
|
+
expect(new_key.y).to eq(110)
|
52
52
|
end
|
53
53
|
end
|
54
54
|
|
@@ -56,8 +56,8 @@ describe Trustworthy::MasterKey do
|
|
56
56
|
it 'should define a new key' do
|
57
57
|
master_key = Trustworthy::MasterKey.new(BigDecimal.new('6'), BigDecimal.new('24'))
|
58
58
|
key = master_key.create_key
|
59
|
-
key.x.
|
60
|
-
key.y.
|
59
|
+
expect(key.x).to_not eq(0)
|
60
|
+
expect(key.y).to_not eq(0)
|
61
61
|
end
|
62
62
|
end
|
63
63
|
|
@@ -66,7 +66,7 @@ describe Trustworthy::MasterKey do
|
|
66
66
|
AEAD::Cipher::AES_256_CBC_HMAC_SHA_256.stub(:generate_nonce).and_return(TestValues::InitializationVector)
|
67
67
|
master_key = Trustworthy::MasterKey.new(BigDecimal.new('6'), BigDecimal.new('24'))
|
68
68
|
ciphertext = master_key.encrypt(TestValues::Plaintext)
|
69
|
-
ciphertext.
|
69
|
+
expect(ciphertext).to eq(TestValues::Ciphertext)
|
70
70
|
end
|
71
71
|
end
|
72
72
|
|
@@ -74,7 +74,7 @@ describe Trustworthy::MasterKey do
|
|
74
74
|
it 'should decrypt and verify the data using the intercept' do
|
75
75
|
master_key = Trustworthy::MasterKey.new(BigDecimal.new('6'), BigDecimal.new('24'))
|
76
76
|
plaintext = master_key.decrypt(TestValues::Ciphertext)
|
77
|
-
plaintext.
|
77
|
+
expect(plaintext).to eq(TestValues::Plaintext)
|
78
78
|
end
|
79
79
|
|
80
80
|
it 'should raise an invalid signature error if signatures do not match' do
|
@@ -24,7 +24,7 @@ describe Trustworthy::Prompt do
|
|
24
24
|
) do
|
25
25
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
26
26
|
username = prompt.add_user_key(test_key)
|
27
|
-
username.
|
27
|
+
expect(username).to eq('user3')
|
28
28
|
end
|
29
29
|
end
|
30
30
|
|
@@ -38,7 +38,7 @@ describe Trustworthy::Prompt do
|
|
38
38
|
) do
|
39
39
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
40
40
|
username = prompt.add_user_key(test_key)
|
41
|
-
username.
|
41
|
+
expect(username).to eq('user3')
|
42
42
|
end
|
43
43
|
end
|
44
44
|
|
@@ -52,9 +52,9 @@ describe Trustworthy::Prompt do
|
|
52
52
|
'password'
|
53
53
|
) do
|
54
54
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
55
|
-
prompt.
|
55
|
+
expect(prompt).to receive(:_error).with('Key user1 is already in use')
|
56
56
|
username = prompt.add_user_key(test_key)
|
57
|
-
username.
|
57
|
+
expect(username).to eq('user3')
|
58
58
|
end
|
59
59
|
end
|
60
60
|
end
|
@@ -69,7 +69,7 @@ describe Trustworthy::Prompt do
|
|
69
69
|
) do
|
70
70
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
71
71
|
master_key = prompt.unlock_master_key
|
72
|
-
master_key.
|
72
|
+
expect(master_key).to eq(TestValues::MasterKey)
|
73
73
|
end
|
74
74
|
end
|
75
75
|
|
@@ -81,7 +81,7 @@ describe Trustworthy::Prompt do
|
|
81
81
|
expect do
|
82
82
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
83
83
|
master_key = prompt.unlock_master_key
|
84
|
-
master_key.
|
84
|
+
expect(master_key).to eq(TestValues::MasterKey)
|
85
85
|
end.to raise_error('must have two keys to unlock master key')
|
86
86
|
end
|
87
87
|
|
@@ -94,7 +94,7 @@ describe Trustworthy::Prompt do
|
|
94
94
|
'password2'
|
95
95
|
) do
|
96
96
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
97
|
-
prompt.
|
97
|
+
expect(prompt).to receive(:_error).with('Key user1 is already in use')
|
98
98
|
prompt.unlock_master_key
|
99
99
|
end
|
100
100
|
end
|
@@ -108,7 +108,7 @@ describe Trustworthy::Prompt do
|
|
108
108
|
'password2'
|
109
109
|
) do
|
110
110
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
111
|
-
prompt.
|
111
|
+
expect(prompt).to receive(:_error).with('Key missing does not exist')
|
112
112
|
prompt.unlock_master_key
|
113
113
|
end
|
114
114
|
end
|
@@ -122,7 +122,7 @@ describe Trustworthy::Prompt do
|
|
122
122
|
'password2'
|
123
123
|
) do
|
124
124
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
125
|
-
prompt.
|
125
|
+
expect(prompt).to receive(:_error).with('Key missing does not exist')
|
126
126
|
prompt.unlock_master_key
|
127
127
|
end
|
128
128
|
end
|
@@ -136,7 +136,7 @@ describe Trustworthy::Prompt do
|
|
136
136
|
'password2'
|
137
137
|
) do
|
138
138
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
139
|
-
prompt.
|
139
|
+
expect(prompt).to receive(:_error).with('Password incorrect for user1')
|
140
140
|
prompt.unlock_master_key
|
141
141
|
end
|
142
142
|
end
|
@@ -150,7 +150,7 @@ describe Trustworthy::Prompt do
|
|
150
150
|
'password2'
|
151
151
|
) do
|
152
152
|
prompt = Trustworthy::Prompt.new(TestValues::SettingsFile, $terminal)
|
153
|
-
prompt.
|
153
|
+
expect(prompt).to receive(:_error).with('Password incorrect for user2')
|
154
154
|
prompt.unlock_master_key
|
155
155
|
end
|
156
156
|
end
|
@@ -4,25 +4,25 @@ describe Trustworthy::Random do
|
|
4
4
|
describe 'self.number' do
|
5
5
|
it 'should return a random number' do
|
6
6
|
random = Trustworthy::Random.number
|
7
|
-
random.
|
7
|
+
expect(random).to_not eq(Trustworthy::Random.number)
|
8
8
|
end
|
9
9
|
|
10
10
|
it 'should return a number up to a given byte size' do
|
11
11
|
random = Trustworthy::Random.number(2)
|
12
|
-
random.
|
12
|
+
expect(random).to be <= 2 ** 16
|
13
13
|
end
|
14
14
|
end
|
15
15
|
|
16
16
|
describe 'self.bytes' do
|
17
17
|
it 'should return a string of the given length' do
|
18
18
|
bytes = Trustworthy::Random.bytes(16)
|
19
|
-
bytes.size.
|
19
|
+
expect(bytes.size).to eq(16)
|
20
20
|
end
|
21
21
|
|
22
22
|
it 'should return a random string' do
|
23
23
|
bytes1 = Trustworthy::Random.bytes(16)
|
24
24
|
bytes2 = Trustworthy::Random.bytes(16)
|
25
|
-
bytes1.
|
25
|
+
expect(bytes1).to_not eq(bytes2)
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
@@ -22,8 +22,8 @@ describe Trustworthy::Settings do
|
|
22
22
|
|
23
23
|
Trustworthy::Settings.open(TestValues::SettingsFile) do |settings|
|
24
24
|
found_key = settings.find_key('user')
|
25
|
-
found_key['salt'].
|
26
|
-
found_key['encrypted_point'].
|
25
|
+
expect(found_key['salt']).to eq(TestValues::Salt)
|
26
|
+
expect(found_key['encrypted_point']).to eq(TestValues::EncryptedPoint)
|
27
27
|
end
|
28
28
|
end
|
29
29
|
|
@@ -43,10 +43,12 @@ describe Trustworthy::Settings do
|
|
43
43
|
end.to raise_error
|
44
44
|
|
45
45
|
Trustworthy::Settings.open(TestValues::SettingsFile) do |settings|
|
46
|
-
settings.find_key('missing')
|
46
|
+
missing_key = settings.find_key('missing')
|
47
|
+
expect(missing_key).to be_nil
|
48
|
+
|
47
49
|
found_key = settings.find_key('user')
|
48
|
-
found_key['salt'].
|
49
|
-
found_key['encrypted_point'].
|
50
|
+
expect(found_key['salt']).to eq(TestValues::Salt)
|
51
|
+
expect(found_key['encrypted_point']).to eq(TestValues::EncryptedPoint)
|
50
52
|
end
|
51
53
|
end
|
52
54
|
end
|
@@ -57,8 +59,8 @@ describe Trustworthy::Settings do
|
|
57
59
|
key = Trustworthy::Key.new(BigDecimal.new('2'), BigDecimal.new('3'))
|
58
60
|
settings.add_key(key, 'user', 'password1')
|
59
61
|
found_key = settings.find_key('user')
|
60
|
-
found_key['salt'].
|
61
|
-
found_key['encrypted_point'].
|
62
|
+
expect(found_key['salt']).to eq(TestValues::Salt)
|
63
|
+
expect(found_key['encrypted_point']).to eq(TestValues::EncryptedPoint)
|
62
64
|
end
|
63
65
|
end
|
64
66
|
end
|
@@ -68,13 +70,13 @@ describe Trustworthy::Settings do
|
|
68
70
|
Trustworthy::Settings.open(TestValues::SettingsFile) do |settings|
|
69
71
|
key = Trustworthy::Key.new(BigDecimal.new('2'), BigDecimal.new('3'))
|
70
72
|
settings.add_key(key, 'user', 'password1')
|
71
|
-
settings.
|
73
|
+
expect(settings).to have_key('user')
|
72
74
|
end
|
73
75
|
end
|
74
76
|
|
75
77
|
it 'should be false if the key does exists' do
|
76
78
|
Trustworthy::Settings.open(TestValues::SettingsFile) do |settings|
|
77
|
-
settings.
|
79
|
+
expect(settings).to_not have_key('missing')
|
78
80
|
end
|
79
81
|
end
|
80
82
|
end
|
@@ -82,7 +84,7 @@ describe Trustworthy::Settings do
|
|
82
84
|
describe 'recoverable?' do
|
83
85
|
it 'should not be recoverable with no user keys' do
|
84
86
|
Trustworthy::Settings.open(TestValues::SettingsFile) do |settings|
|
85
|
-
settings.
|
87
|
+
expect(settings).to_not be_recoverable
|
86
88
|
end
|
87
89
|
end
|
88
90
|
|
@@ -90,7 +92,7 @@ describe Trustworthy::Settings do
|
|
90
92
|
Trustworthy::Settings.open(TestValues::SettingsFile) do |settings|
|
91
93
|
key = Trustworthy::Key.new(BigDecimal.new('2'), BigDecimal.new('3'))
|
92
94
|
settings.add_key(key, 'user', 'password')
|
93
|
-
settings.
|
95
|
+
expect(settings).to_not be_recoverable
|
94
96
|
end
|
95
97
|
end
|
96
98
|
|
@@ -100,7 +102,7 @@ describe Trustworthy::Settings do
|
|
100
102
|
key2 = Trustworthy::Key.new(BigDecimal.new('3'), BigDecimal.new('4'))
|
101
103
|
settings.add_key(key1, 'user1', 'password')
|
102
104
|
settings.add_key(key2, 'user2', 'password')
|
103
|
-
settings.
|
105
|
+
expect(settings).to be_recoverable
|
104
106
|
end
|
105
107
|
end
|
106
108
|
end
|
@@ -111,8 +113,8 @@ describe Trustworthy::Settings do
|
|
111
113
|
key = Trustworthy::Key.new(BigDecimal.new('2'), BigDecimal.new('3'))
|
112
114
|
settings.add_key(key, 'user', 'password1')
|
113
115
|
unlocked_key = settings.unlock_key('user', 'password1')
|
114
|
-
unlocked_key.x.
|
115
|
-
unlocked_key.y.
|
116
|
+
expect(unlocked_key.x).to eq(BigDecimal.new('2'))
|
117
|
+
expect(unlocked_key.y).to eq(BigDecimal.new('3'))
|
116
118
|
end
|
117
119
|
end
|
118
120
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: trustworthy
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.4.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- John Downey
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2013-
|
11
|
+
date: 2013-08-02 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aead
|
@@ -58,14 +58,14 @@ dependencies:
|
|
58
58
|
requirements:
|
59
59
|
- - ~>
|
60
60
|
- !ruby/object:Gem::Version
|
61
|
-
version:
|
61
|
+
version: 1.1.0
|
62
62
|
type: :runtime
|
63
63
|
prerelease: false
|
64
64
|
version_requirements: !ruby/object:Gem::Requirement
|
65
65
|
requirements:
|
66
66
|
- - ~>
|
67
67
|
- !ruby/object:Gem::Version
|
68
|
-
version:
|
68
|
+
version: 1.1.0
|
69
69
|
- !ruby/object:Gem::Dependency
|
70
70
|
name: test-construct
|
71
71
|
requirement: !ruby/object:Gem::Requirement
|
@@ -86,28 +86,28 @@ dependencies:
|
|
86
86
|
requirements:
|
87
87
|
- - '='
|
88
88
|
- !ruby/object:Gem::Version
|
89
|
-
version:
|
89
|
+
version: 2.14.1
|
90
90
|
type: :development
|
91
91
|
prerelease: false
|
92
92
|
version_requirements: !ruby/object:Gem::Requirement
|
93
93
|
requirements:
|
94
94
|
- - '='
|
95
95
|
- !ruby/object:Gem::Version
|
96
|
-
version:
|
96
|
+
version: 2.14.1
|
97
97
|
- !ruby/object:Gem::Dependency
|
98
98
|
name: rake
|
99
99
|
requirement: !ruby/object:Gem::Requirement
|
100
100
|
requirements:
|
101
101
|
- - '='
|
102
102
|
- !ruby/object:Gem::Version
|
103
|
-
version: 10.0
|
103
|
+
version: 10.1.0
|
104
104
|
type: :development
|
105
105
|
prerelease: false
|
106
106
|
version_requirements: !ruby/object:Gem::Requirement
|
107
107
|
requirements:
|
108
108
|
- - '='
|
109
109
|
- !ruby/object:Gem::Version
|
110
|
-
version: 10.0
|
110
|
+
version: 10.1.0
|
111
111
|
description: Implements a special case (k = 2) of Adi Shamir's secret sharing algorithm.
|
112
112
|
This allows secret files to be encrypted on disk and require two secret holders
|
113
113
|
to decrypt it.
|
@@ -165,7 +165,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
165
165
|
version: '0'
|
166
166
|
requirements: []
|
167
167
|
rubyforge_project:
|
168
|
-
rubygems_version: 2.0.
|
168
|
+
rubygems_version: 2.0.3
|
169
169
|
signing_key:
|
170
170
|
specification_version: 4
|
171
171
|
summary: Encrypt and decrypt files with multiple key holders
|
@@ -180,4 +180,3 @@ test_files:
|
|
180
180
|
- spec/trustworthy/prompt_spec.rb
|
181
181
|
- spec/trustworthy/random_spec.rb
|
182
182
|
- spec/trustworthy/settings_spec.rb
|
183
|
-
has_rdoc:
|