diff --git a/README.md b/README.md index 7caee8f..159f18b 100644 --- a/README.md +++ b/README.md @@ -82,11 +82,7 @@ A sample configuration file is available _gpass.ini.sample_ Version Information ------------------- -Current version is 0.9. **(not compatible with 0.7)** - -Firefox will remove support for addons, so the gPass addon code is not supported since v0.8, please migrate to webextension. - -Transition from v0.7 to v0.8 : **Please update your masterkey (even with the same one) to gain a security level of your passwords's wallet.** +Current version is 0.9. License diff --git a/chrome_addon/background.js b/chrome_addon/background.js index 2fa30c1..14a3438 100644 --- a/chrome_addon/background.js +++ b/chrome_addon/background.js @@ -20,7 +20,6 @@ var browser = browser || chrome; var protocol_version = 4; var account_url = null; -var crypto_v2_logins_size = 0; function _notification(message, data) { @@ -39,24 +38,16 @@ function _notification(message, data) window.setTimeout(function() {browser.notifications.clear("gPass", function(){})}, 2000); } -async function generate_request(domain, login, mkey, iv, old) +async function generate_request(domain, login, mkey, iv) { - if (old) - { - var v = "@@" + domain + ";" + login; - debug("will encrypt " + v); - enc = encrypt_ecb(mkey, v); - } - else - { - var v = domain + ";" + login; - debug("will encrypt " + v); - while ((v.length % 16)) - v += "\0"; - hash = await digest(v); - v += hash.slice(8, 24); - enc = encrypt_cbc(mkey, iv, v); - } + var v = domain + ";" + login; + debug("will encrypt " + v); + while ((v.length % 16)) + v += "\0"; + hash = await digest(v); + v += hash.slice(8, 24); + enc = encrypt_cbc(mkey, iv, v); + return enc; } @@ -80,35 +71,18 @@ async function ask_server(logins, domain, wdomain, mkey, sendResponse, options) keys = ""; for(key_index=0, a=0; a= crypto_v2_logins_size) - // Crypto v1 - { - clear_password = await decrypt_ecb(mkey, hex2a(ciphered_password)); - // Remove trailing \0 and salt - clear_password = clear_password.replace(/\0*$/, ""); - clear_password = clear_password.substr(0, clear_password.length-3); - } - else - { - clear_password = await decrypt_cbc(mkey, global_iv, hex2a(ciphered_password)); - clear_password = clear_password.replace(/\0*$/, ""); - clear_password = clear_password.substr(3, clear_password.length); - } + clear_password = await decrypt_cbc(mkey, global_iv, hex2a(ciphered_password)); + clear_password = clear_password.replace(/\0*$/, ""); + clear_password = clear_password.substr(3, clear_password.length); debug("Clear password " + clear_password); } else diff --git a/chrome_addon/options.html b/chrome_addon/options.html index 07d56fd..c169be1 100644 --- a/chrome_addon/options.html +++ b/chrome_addon/options.html @@ -11,8 +11,6 @@ PBKDF2 level Number of iterations used to derivate master key


- Crypto v1 compatible Compatible with old crypto schema (AES ECB). Use it for encrypted passwords with server <= 0.7
-