diff options
Diffstat (limited to 'public/scripts/2_encryption.js')
-rw-r--r-- | public/scripts/2_encryption.js | 79 |
1 files changed, 46 insertions, 33 deletions
diff --git a/public/scripts/2_encryption.js b/public/scripts/2_encryption.js index 16ab711..c094c2c 100644 --- a/public/scripts/2_encryption.js +++ b/public/scripts/2_encryption.js @@ -1,16 +1,18 @@ -const alasql = require('alasql'); +const sql = require('alasql'); const openpgp = require('openpgp'); openpgp.initWorker({path: 'openpgp.worker.js'}); -let encrypted, decrypted; // REMEMBER: Remove testing variables (leaking) - +/** + * Generated localstorage database and tables + * @returns {boolean} + */ function setupDatabase() { - // REMEMBER: "key" and "type" are reserved names for SQL - alasql('CREATE localstorage DATABASE IF NOT EXISTS texx'); - alasql('ATTACH localStorage DATABASE texx AS db'); - alasql('CREATE TABLE IF NOT EXISTS db.own_keys (key_type STRING, key_data STRING)'); - alasql('CREATE TABLE IF NOT EXISTS db.keys (peer_id STRING, key_data STRING)'); - alasql('CREATE TABLE IF NOT EXISTS db.messages (id INT AUTO_INCREMENT, message STRING)'); + sql('CREATE localStorage DATABASE IF NOT EXISTS texx_ls'); + sql('ATTACH localStorage DATABASE texx_ls AS db'); + sql('SET AUTOCOMMIT ON'); + sql('CREATE TABLE IF NOT EXISTS db.own_keys (key_type STRING, key_data STRING)'); + sql('CREATE TABLE IF NOT EXISTS db.peer_keys (peer_id STRING, key_data STRING)'); + sql('CREATE TABLE IF NOT EXISTS db.messages (id INT AUTO_INCREMENT, message STRING)'); return true; } @@ -28,9 +30,9 @@ async function generateKeys(peerId, passphrase) { }; await openpgp.generateKey(options).then((key) => { - alasql(`INSERT INTO db.own_keys VALUES ("private_key", "${key.privateKeyArmored}")`); - alasql(`INSERT INTO db.own_keys VALUES ("public_key", "${key.publicKeyArmored}")`); - alasql(`INSERT INTO db.own_keys VALUES ("revocation_certificate", "${key.revocationCertificate}")`); + sql(`INSERT INTO db.own_keys VALUES ("private_key", "${key.privateKeyArmored}")`); + sql(`INSERT INTO db.own_keys VALUES ("public_key", "${key.publicKeyArmored}")`); + sql(`INSERT INTO db.own_keys VALUES ("revocation_certificate", "${key.revocationCertificate}")`); console.log('[LOG] Successfully generated and stored keys!'); }); } @@ -40,7 +42,7 @@ async function generateKeys(peerId, passphrase) { * @returns {string} */ function getPrivateKey() { - const privateKey = alasql('SELECT key_data FROM db.own_keys WHERE key_type = "private_key" LIMIT 1'); + const privateKey = sql('SELECT key_data FROM db.own_keys WHERE key_type = "private_key" LIMIT 1'); return privateKey.length > 0 ? privateKey[0]['key_data'] : ''; } @@ -49,7 +51,7 @@ function getPrivateKey() { * @returns {string} */ function getPublicKey() { - const publicKey = alasql('SELECT key_data FROM db.own_keys WHERE key_type = "public_key" LIMIT 1'); + const publicKey = sql('SELECT key_data FROM db.own_keys WHERE key_type = "public_key" LIMIT 1'); return publicKey.length > 0 ? publicKey[0]['key_data'] : ''; } @@ -58,31 +60,32 @@ function getPublicKey() { * @returns {string} */ function getRevocationCertificate() { - const revocationCertificate = alasql('SELECT key_data FROM db.own_keys WHERE key_type = "revocation_certificate" LIMIT 1'); + const revocationCertificate = sql('SELECT key_data FROM db.own_keys WHERE key_type = "revocation_certificate" LIMIT 1'); return revocationCertificate.length > 0 ? revocationCertificate[0]['key_data'] : ''; } /** + * /** * Encrypts the data with a public key (e.g the one of the peer with which you're chatting) * @param data * @param publicKey - * @returns {Promise<void>} + * @returns {Promise<String>} */ async function encrypt(data, publicKey) { + console.log(publicKey); //const privateKeyObj = (await openpgp.key.readArmored(privateKey)).keys[0]; //await privateKeyObj.decrypt(passphrase); const options = { message: openpgp.message.fromText(data), publicKeys: (await openpgp.key.readArmored(publicKey)).keys, - //privateKeys: [privateKeyObj] TODO: Use private key for signing + //privateKeys: [privateKeyObj] // TODO: Use private key for signing }; - await openpgp.encrypt(options).then(ciphertext => { - encrypted = ciphertext.data; - console.log(encrypted); - //return encrypted; // TODO: Return encrypted from async function - }) + return await openpgp.encrypt(options).then(ciphertext => { + console.log(ciphertext.data); + return ciphertext.data; + }); } /** @@ -91,7 +94,7 @@ async function encrypt(data, publicKey) { * @param publicKey * @param privateKey * @param passphrase - * @returns {Promise<void>} + * @returns {Promise<String>} */ async function decrypt(data, publicKey, privateKey, passphrase) { const privateKeyObj = (await openpgp.key.readArmored(privateKey)).keys[0]; @@ -103,11 +106,7 @@ async function decrypt(data, publicKey, privateKey, passphrase) { privateKeys: [privateKeyObj] }; - await openpgp.decrypt(options).then(plaintext => { - decrypted = plaintext.data; - console.log(plaintext.data); - //return plaintext.data - }) + return await openpgp.decrypt(options).then(plaintext => plaintext.data) } /** @@ -126,18 +125,29 @@ function isEncrypted() { * @param peerId * @param key */ -function storePublicKey(peerId, key) { - alasql(`INSERT INTO db.keys VALUES ("${peerId}", "${key}")`); +function storePeerPublicKey(peerId, key) { + console.log(peerId); + console.log(key); + sql(`INSERT INTO db.peer_keys VALUES ("${peerId}", "${key}")`); console.log('[LOG] Stored public key of ' + peerId); } /** + * Gets the public key of a peer + * @param peerId + */ +function getPeerPublicKey(peerId) { + const publicKey = sql(`SELECT key_data FROM db.peer_keys WHERE peer_id = "${peerId}" LIMIT 1`); + return publicKey.length > 0 ? publicKey[0]['key_data'] : ''; +} + +/** * Just a general test case */ function testEncryption() { generateKeys('test_id', 'supersecure').then(() => { - encrypt('The meaning of life', getPublicKey()).then(() => { - decrypt(encrypted, getPublicKey(), getPrivateKey(), 'supersecure').then(() => { + encrypt('The meaning of life', getPublicKey()).then(encrypted => { + decrypt(encrypted, getPublicKey(), getPrivateKey(), 'supersecure').then(decrypted => { if (decrypted === 'The meaning of life') console.log("YEEHA, Test succeeded!") }) @@ -152,5 +162,8 @@ exports.getPublic = getPublicKey; exports.encrypt = encrypt; exports.decrypt = decrypt; exports.check = isEncrypted; -exports.store = storePublicKey; +exports.store = storePeerPublicKey; +exports.get = getPeerPublicKey; exports.test = testEncryption; + +window.sql = sql; // For debugging |