Initial commit
This commit is contained in:
7
README
Normal file
7
README
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
gPass : global Password.
|
||||||
|
|
||||||
|
Copyright (C) 2013 Grégory Soutadé
|
||||||
|
|
||||||
|
Licence : GPL v3
|
||||||
|
|
||||||
|
See http://indefero.soutade.fr/p/gpass/ for further information
|
||||||
39
firefox_addon/README.md
Normal file
39
firefox_addon/README.md
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
gPass : global password
|
||||||
|
=======================
|
||||||
|
|
||||||
|
Introduction
|
||||||
|
------------
|
||||||
|
|
||||||
|
Everyday we have a lot of passwords to manage corresponding to a lot of accounts we use. It's hard to remain all of these, moreover if we don't use it often. So, what we most people do is to generate only a subset of passwords easy to remain. This implies two common errors :
|
||||||
|
* Password are not very strong
|
||||||
|
* We use them for multiple accounts
|
||||||
|
|
||||||
|
The best way to avoid these errors is to have a unique strong password for each account. gPass helps to reach this goal : you keep a subset of passwords and for each login/password tuple you chose, gPass returns the real password by querying a password server.
|
||||||
|
|
||||||
|
To have a high level of security, all information is stored encrypted. The decryption is done on the fly when it's needed and only with user input. So, a hacker can get your password database, it will not be able to see any information !
|
||||||
|
|
||||||
|
This addon is like [last pass](https://lastpass.com/) one, but I wanted it to be open source and home hostable. Moreover, with gPass, you can have multiple master key !
|
||||||
|
|
||||||
|
|
||||||
|
Usage
|
||||||
|
-----
|
||||||
|
|
||||||
|
The first thing to do is to populate your database (from your/a password server) with login/password/master key values. If you want to make strong password, there is a password generator. After that, configure your addon in addons -> gPass -> preferences to point to your password server.
|
||||||
|
|
||||||
|
When you're in a login form and you want to use gPass. Type your login and fill "@@masterkey" in password field. Then, submit and password willll automatically be replaced by the one in the database (after decryption).
|
||||||
|
|
||||||
|
|
||||||
|
Technique
|
||||||
|
---------
|
||||||
|
|
||||||
|
The only two columns in database are "login" and "password".
|
||||||
|
login is compounded by "@@domain;login" encrypted with AES 256
|
||||||
|
password encrypted with AES 256
|
||||||
|
|
||||||
|
The key that encrypt these fields is sha256(masterkey)
|
||||||
|
|
||||||
|
|
||||||
|
Licence
|
||||||
|
-------
|
||||||
|
|
||||||
|
All the code is licenced under GPL v3. Source code is available [here](http://indefero.soutade.fr/p/gpass).
|
||||||
0
firefox_addon/data/.empty
Normal file
0
firefox_addon/data/.empty
Normal file
674
firefox_addon/doc/gpl-3.0.txt
Normal file
674
firefox_addon/doc/gpl-3.0.txt
Normal file
@@ -0,0 +1,674 @@
|
|||||||
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
Version 3, 29 June 2007
|
||||||
|
|
||||||
|
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies
|
||||||
|
of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
|
Preamble
|
||||||
|
|
||||||
|
The GNU General Public License is a free, copyleft license for
|
||||||
|
software and other kinds of works.
|
||||||
|
|
||||||
|
The licenses for most software and other practical works are designed
|
||||||
|
to take away your freedom to share and change the works. By contrast,
|
||||||
|
the GNU General Public License is intended to guarantee your freedom to
|
||||||
|
share and change all versions of a program--to make sure it remains free
|
||||||
|
software for all its users. We, the Free Software Foundation, use the
|
||||||
|
GNU General Public License for most of our software; it applies also to
|
||||||
|
any other work released this way by its authors. You can apply it to
|
||||||
|
your programs, too.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom, not
|
||||||
|
price. Our General Public Licenses are designed to make sure that you
|
||||||
|
have the freedom to distribute copies of free software (and charge for
|
||||||
|
them if you wish), that you receive source code or can get it if you
|
||||||
|
want it, that you can change the software or use pieces of it in new
|
||||||
|
free programs, and that you know you can do these things.
|
||||||
|
|
||||||
|
To protect your rights, we need to prevent others from denying you
|
||||||
|
these rights or asking you to surrender the rights. Therefore, you have
|
||||||
|
certain responsibilities if you distribute copies of the software, or if
|
||||||
|
you modify it: responsibilities to respect the freedom of others.
|
||||||
|
|
||||||
|
For example, if you distribute copies of such a program, whether
|
||||||
|
gratis or for a fee, you must pass on to the recipients the same
|
||||||
|
freedoms that you received. You must make sure that they, too, receive
|
||||||
|
or can get the source code. And you must show them these terms so they
|
||||||
|
know their rights.
|
||||||
|
|
||||||
|
Developers that use the GNU GPL protect your rights with two steps:
|
||||||
|
(1) assert copyright on the software, and (2) offer you this License
|
||||||
|
giving you legal permission to copy, distribute and/or modify it.
|
||||||
|
|
||||||
|
For the developers' and authors' protection, the GPL clearly explains
|
||||||
|
that there is no warranty for this free software. For both users' and
|
||||||
|
authors' sake, the GPL requires that modified versions be marked as
|
||||||
|
changed, so that their problems will not be attributed erroneously to
|
||||||
|
authors of previous versions.
|
||||||
|
|
||||||
|
Some devices are designed to deny users access to install or run
|
||||||
|
modified versions of the software inside them, although the manufacturer
|
||||||
|
can do so. This is fundamentally incompatible with the aim of
|
||||||
|
protecting users' freedom to change the software. The systematic
|
||||||
|
pattern of such abuse occurs in the area of products for individuals to
|
||||||
|
use, which is precisely where it is most unacceptable. Therefore, we
|
||||||
|
have designed this version of the GPL to prohibit the practice for those
|
||||||
|
products. If such problems arise substantially in other domains, we
|
||||||
|
stand ready to extend this provision to those domains in future versions
|
||||||
|
of the GPL, as needed to protect the freedom of users.
|
||||||
|
|
||||||
|
Finally, every program is threatened constantly by software patents.
|
||||||
|
States should not allow patents to restrict development and use of
|
||||||
|
software on general-purpose computers, but in those that do, we wish to
|
||||||
|
avoid the special danger that patents applied to a free program could
|
||||||
|
make it effectively proprietary. To prevent this, the GPL assures that
|
||||||
|
patents cannot be used to render the program non-free.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and
|
||||||
|
modification follow.
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
0. Definitions.
|
||||||
|
|
||||||
|
"This License" refers to version 3 of the GNU General Public License.
|
||||||
|
|
||||||
|
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||||
|
works, such as semiconductor masks.
|
||||||
|
|
||||||
|
"The Program" refers to any copyrightable work licensed under this
|
||||||
|
License. Each licensee is addressed as "you". "Licensees" and
|
||||||
|
"recipients" may be individuals or organizations.
|
||||||
|
|
||||||
|
To "modify" a work means to copy from or adapt all or part of the work
|
||||||
|
in a fashion requiring copyright permission, other than the making of an
|
||||||
|
exact copy. The resulting work is called a "modified version" of the
|
||||||
|
earlier work or a work "based on" the earlier work.
|
||||||
|
|
||||||
|
A "covered work" means either the unmodified Program or a work based
|
||||||
|
on the Program.
|
||||||
|
|
||||||
|
To "propagate" a work means to do anything with it that, without
|
||||||
|
permission, would make you directly or secondarily liable for
|
||||||
|
infringement under applicable copyright law, except executing it on a
|
||||||
|
computer or modifying a private copy. Propagation includes copying,
|
||||||
|
distribution (with or without modification), making available to the
|
||||||
|
public, and in some countries other activities as well.
|
||||||
|
|
||||||
|
To "convey" a work means any kind of propagation that enables other
|
||||||
|
parties to make or receive copies. Mere interaction with a user through
|
||||||
|
a computer network, with no transfer of a copy, is not conveying.
|
||||||
|
|
||||||
|
An interactive user interface displays "Appropriate Legal Notices"
|
||||||
|
to the extent that it includes a convenient and prominently visible
|
||||||
|
feature that (1) displays an appropriate copyright notice, and (2)
|
||||||
|
tells the user that there is no warranty for the work (except to the
|
||||||
|
extent that warranties are provided), that licensees may convey the
|
||||||
|
work under this License, and how to view a copy of this License. If
|
||||||
|
the interface presents a list of user commands or options, such as a
|
||||||
|
menu, a prominent item in the list meets this criterion.
|
||||||
|
|
||||||
|
1. Source Code.
|
||||||
|
|
||||||
|
The "source code" for a work means the preferred form of the work
|
||||||
|
for making modifications to it. "Object code" means any non-source
|
||||||
|
form of a work.
|
||||||
|
|
||||||
|
A "Standard Interface" means an interface that either is an official
|
||||||
|
standard defined by a recognized standards body, or, in the case of
|
||||||
|
interfaces specified for a particular programming language, one that
|
||||||
|
is widely used among developers working in that language.
|
||||||
|
|
||||||
|
The "System Libraries" of an executable work include anything, other
|
||||||
|
than the work as a whole, that (a) is included in the normal form of
|
||||||
|
packaging a Major Component, but which is not part of that Major
|
||||||
|
Component, and (b) serves only to enable use of the work with that
|
||||||
|
Major Component, or to implement a Standard Interface for which an
|
||||||
|
implementation is available to the public in source code form. A
|
||||||
|
"Major Component", in this context, means a major essential component
|
||||||
|
(kernel, window system, and so on) of the specific operating system
|
||||||
|
(if any) on which the executable work runs, or a compiler used to
|
||||||
|
produce the work, or an object code interpreter used to run it.
|
||||||
|
|
||||||
|
The "Corresponding Source" for a work in object code form means all
|
||||||
|
the source code needed to generate, install, and (for an executable
|
||||||
|
work) run the object code and to modify the work, including scripts to
|
||||||
|
control those activities. However, it does not include the work's
|
||||||
|
System Libraries, or general-purpose tools or generally available free
|
||||||
|
programs which are used unmodified in performing those activities but
|
||||||
|
which are not part of the work. For example, Corresponding Source
|
||||||
|
includes interface definition files associated with source files for
|
||||||
|
the work, and the source code for shared libraries and dynamically
|
||||||
|
linked subprograms that the work is specifically designed to require,
|
||||||
|
such as by intimate data communication or control flow between those
|
||||||
|
subprograms and other parts of the work.
|
||||||
|
|
||||||
|
The Corresponding Source need not include anything that users
|
||||||
|
can regenerate automatically from other parts of the Corresponding
|
||||||
|
Source.
|
||||||
|
|
||||||
|
The Corresponding Source for a work in source code form is that
|
||||||
|
same work.
|
||||||
|
|
||||||
|
2. Basic Permissions.
|
||||||
|
|
||||||
|
All rights granted under this License are granted for the term of
|
||||||
|
copyright on the Program, and are irrevocable provided the stated
|
||||||
|
conditions are met. This License explicitly affirms your unlimited
|
||||||
|
permission to run the unmodified Program. The output from running a
|
||||||
|
covered work is covered by this License only if the output, given its
|
||||||
|
content, constitutes a covered work. This License acknowledges your
|
||||||
|
rights of fair use or other equivalent, as provided by copyright law.
|
||||||
|
|
||||||
|
You may make, run and propagate covered works that you do not
|
||||||
|
convey, without conditions so long as your license otherwise remains
|
||||||
|
in force. You may convey covered works to others for the sole purpose
|
||||||
|
of having them make modifications exclusively for you, or provide you
|
||||||
|
with facilities for running those works, provided that you comply with
|
||||||
|
the terms of this License in conveying all material for which you do
|
||||||
|
not control copyright. Those thus making or running the covered works
|
||||||
|
for you must do so exclusively on your behalf, under your direction
|
||||||
|
and control, on terms that prohibit them from making any copies of
|
||||||
|
your copyrighted material outside their relationship with you.
|
||||||
|
|
||||||
|
Conveying under any other circumstances is permitted solely under
|
||||||
|
the conditions stated below. Sublicensing is not allowed; section 10
|
||||||
|
makes it unnecessary.
|
||||||
|
|
||||||
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||||
|
|
||||||
|
No covered work shall be deemed part of an effective technological
|
||||||
|
measure under any applicable law fulfilling obligations under article
|
||||||
|
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||||
|
similar laws prohibiting or restricting circumvention of such
|
||||||
|
measures.
|
||||||
|
|
||||||
|
When you convey a covered work, you waive any legal power to forbid
|
||||||
|
circumvention of technological measures to the extent such circumvention
|
||||||
|
is effected by exercising rights under this License with respect to
|
||||||
|
the covered work, and you disclaim any intention to limit operation or
|
||||||
|
modification of the work as a means of enforcing, against the work's
|
||||||
|
users, your or third parties' legal rights to forbid circumvention of
|
||||||
|
technological measures.
|
||||||
|
|
||||||
|
4. Conveying Verbatim Copies.
|
||||||
|
|
||||||
|
You may convey verbatim copies of the Program's source code as you
|
||||||
|
receive it, in any medium, provided that you conspicuously and
|
||||||
|
appropriately publish on each copy an appropriate copyright notice;
|
||||||
|
keep intact all notices stating that this License and any
|
||||||
|
non-permissive terms added in accord with section 7 apply to the code;
|
||||||
|
keep intact all notices of the absence of any warranty; and give all
|
||||||
|
recipients a copy of this License along with the Program.
|
||||||
|
|
||||||
|
You may charge any price or no price for each copy that you convey,
|
||||||
|
and you may offer support or warranty protection for a fee.
|
||||||
|
|
||||||
|
5. Conveying Modified Source Versions.
|
||||||
|
|
||||||
|
You may convey a work based on the Program, or the modifications to
|
||||||
|
produce it from the Program, in the form of source code under the
|
||||||
|
terms of section 4, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) The work must carry prominent notices stating that you modified
|
||||||
|
it, and giving a relevant date.
|
||||||
|
|
||||||
|
b) The work must carry prominent notices stating that it is
|
||||||
|
released under this License and any conditions added under section
|
||||||
|
7. This requirement modifies the requirement in section 4 to
|
||||||
|
"keep intact all notices".
|
||||||
|
|
||||||
|
c) You must license the entire work, as a whole, under this
|
||||||
|
License to anyone who comes into possession of a copy. This
|
||||||
|
License will therefore apply, along with any applicable section 7
|
||||||
|
additional terms, to the whole of the work, and all its parts,
|
||||||
|
regardless of how they are packaged. This License gives no
|
||||||
|
permission to license the work in any other way, but it does not
|
||||||
|
invalidate such permission if you have separately received it.
|
||||||
|
|
||||||
|
d) If the work has interactive user interfaces, each must display
|
||||||
|
Appropriate Legal Notices; however, if the Program has interactive
|
||||||
|
interfaces that do not display Appropriate Legal Notices, your
|
||||||
|
work need not make them do so.
|
||||||
|
|
||||||
|
A compilation of a covered work with other separate and independent
|
||||||
|
works, which are not by their nature extensions of the covered work,
|
||||||
|
and which are not combined with it such as to form a larger program,
|
||||||
|
in or on a volume of a storage or distribution medium, is called an
|
||||||
|
"aggregate" if the compilation and its resulting copyright are not
|
||||||
|
used to limit the access or legal rights of the compilation's users
|
||||||
|
beyond what the individual works permit. Inclusion of a covered work
|
||||||
|
in an aggregate does not cause this License to apply to the other
|
||||||
|
parts of the aggregate.
|
||||||
|
|
||||||
|
6. Conveying Non-Source Forms.
|
||||||
|
|
||||||
|
You may convey a covered work in object code form under the terms
|
||||||
|
of sections 4 and 5, provided that you also convey the
|
||||||
|
machine-readable Corresponding Source under the terms of this License,
|
||||||
|
in one of these ways:
|
||||||
|
|
||||||
|
a) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by the
|
||||||
|
Corresponding Source fixed on a durable physical medium
|
||||||
|
customarily used for software interchange.
|
||||||
|
|
||||||
|
b) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by a
|
||||||
|
written offer, valid for at least three years and valid for as
|
||||||
|
long as you offer spare parts or customer support for that product
|
||||||
|
model, to give anyone who possesses the object code either (1) a
|
||||||
|
copy of the Corresponding Source for all the software in the
|
||||||
|
product that is covered by this License, on a durable physical
|
||||||
|
medium customarily used for software interchange, for a price no
|
||||||
|
more than your reasonable cost of physically performing this
|
||||||
|
conveying of source, or (2) access to copy the
|
||||||
|
Corresponding Source from a network server at no charge.
|
||||||
|
|
||||||
|
c) Convey individual copies of the object code with a copy of the
|
||||||
|
written offer to provide the Corresponding Source. This
|
||||||
|
alternative is allowed only occasionally and noncommercially, and
|
||||||
|
only if you received the object code with such an offer, in accord
|
||||||
|
with subsection 6b.
|
||||||
|
|
||||||
|
d) Convey the object code by offering access from a designated
|
||||||
|
place (gratis or for a charge), and offer equivalent access to the
|
||||||
|
Corresponding Source in the same way through the same place at no
|
||||||
|
further charge. You need not require recipients to copy the
|
||||||
|
Corresponding Source along with the object code. If the place to
|
||||||
|
copy the object code is a network server, the Corresponding Source
|
||||||
|
may be on a different server (operated by you or a third party)
|
||||||
|
that supports equivalent copying facilities, provided you maintain
|
||||||
|
clear directions next to the object code saying where to find the
|
||||||
|
Corresponding Source. Regardless of what server hosts the
|
||||||
|
Corresponding Source, you remain obligated to ensure that it is
|
||||||
|
available for as long as needed to satisfy these requirements.
|
||||||
|
|
||||||
|
e) Convey the object code using peer-to-peer transmission, provided
|
||||||
|
you inform other peers where the object code and Corresponding
|
||||||
|
Source of the work are being offered to the general public at no
|
||||||
|
charge under subsection 6d.
|
||||||
|
|
||||||
|
A separable portion of the object code, whose source code is excluded
|
||||||
|
from the Corresponding Source as a System Library, need not be
|
||||||
|
included in conveying the object code work.
|
||||||
|
|
||||||
|
A "User Product" is either (1) a "consumer product", which means any
|
||||||
|
tangible personal property which is normally used for personal, family,
|
||||||
|
or household purposes, or (2) anything designed or sold for incorporation
|
||||||
|
into a dwelling. In determining whether a product is a consumer product,
|
||||||
|
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||||
|
product received by a particular user, "normally used" refers to a
|
||||||
|
typical or common use of that class of product, regardless of the status
|
||||||
|
of the particular user or of the way in which the particular user
|
||||||
|
actually uses, or expects or is expected to use, the product. A product
|
||||||
|
is a consumer product regardless of whether the product has substantial
|
||||||
|
commercial, industrial or non-consumer uses, unless such uses represent
|
||||||
|
the only significant mode of use of the product.
|
||||||
|
|
||||||
|
"Installation Information" for a User Product means any methods,
|
||||||
|
procedures, authorization keys, or other information required to install
|
||||||
|
and execute modified versions of a covered work in that User Product from
|
||||||
|
a modified version of its Corresponding Source. The information must
|
||||||
|
suffice to ensure that the continued functioning of the modified object
|
||||||
|
code is in no case prevented or interfered with solely because
|
||||||
|
modification has been made.
|
||||||
|
|
||||||
|
If you convey an object code work under this section in, or with, or
|
||||||
|
specifically for use in, a User Product, and the conveying occurs as
|
||||||
|
part of a transaction in which the right of possession and use of the
|
||||||
|
User Product is transferred to the recipient in perpetuity or for a
|
||||||
|
fixed term (regardless of how the transaction is characterized), the
|
||||||
|
Corresponding Source conveyed under this section must be accompanied
|
||||||
|
by the Installation Information. But this requirement does not apply
|
||||||
|
if neither you nor any third party retains the ability to install
|
||||||
|
modified object code on the User Product (for example, the work has
|
||||||
|
been installed in ROM).
|
||||||
|
|
||||||
|
The requirement to provide Installation Information does not include a
|
||||||
|
requirement to continue to provide support service, warranty, or updates
|
||||||
|
for a work that has been modified or installed by the recipient, or for
|
||||||
|
the User Product in which it has been modified or installed. Access to a
|
||||||
|
network may be denied when the modification itself materially and
|
||||||
|
adversely affects the operation of the network or violates the rules and
|
||||||
|
protocols for communication across the network.
|
||||||
|
|
||||||
|
Corresponding Source conveyed, and Installation Information provided,
|
||||||
|
in accord with this section must be in a format that is publicly
|
||||||
|
documented (and with an implementation available to the public in
|
||||||
|
source code form), and must require no special password or key for
|
||||||
|
unpacking, reading or copying.
|
||||||
|
|
||||||
|
7. Additional Terms.
|
||||||
|
|
||||||
|
"Additional permissions" are terms that supplement the terms of this
|
||||||
|
License by making exceptions from one or more of its conditions.
|
||||||
|
Additional permissions that are applicable to the entire Program shall
|
||||||
|
be treated as though they were included in this License, to the extent
|
||||||
|
that they are valid under applicable law. If additional permissions
|
||||||
|
apply only to part of the Program, that part may be used separately
|
||||||
|
under those permissions, but the entire Program remains governed by
|
||||||
|
this License without regard to the additional permissions.
|
||||||
|
|
||||||
|
When you convey a copy of a covered work, you may at your option
|
||||||
|
remove any additional permissions from that copy, or from any part of
|
||||||
|
it. (Additional permissions may be written to require their own
|
||||||
|
removal in certain cases when you modify the work.) You may place
|
||||||
|
additional permissions on material, added by you to a covered work,
|
||||||
|
for which you have or can give appropriate copyright permission.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, for material you
|
||||||
|
add to a covered work, you may (if authorized by the copyright holders of
|
||||||
|
that material) supplement the terms of this License with terms:
|
||||||
|
|
||||||
|
a) Disclaiming warranty or limiting liability differently from the
|
||||||
|
terms of sections 15 and 16 of this License; or
|
||||||
|
|
||||||
|
b) Requiring preservation of specified reasonable legal notices or
|
||||||
|
author attributions in that material or in the Appropriate Legal
|
||||||
|
Notices displayed by works containing it; or
|
||||||
|
|
||||||
|
c) Prohibiting misrepresentation of the origin of that material, or
|
||||||
|
requiring that modified versions of such material be marked in
|
||||||
|
reasonable ways as different from the original version; or
|
||||||
|
|
||||||
|
d) Limiting the use for publicity purposes of names of licensors or
|
||||||
|
authors of the material; or
|
||||||
|
|
||||||
|
e) Declining to grant rights under trademark law for use of some
|
||||||
|
trade names, trademarks, or service marks; or
|
||||||
|
|
||||||
|
f) Requiring indemnification of licensors and authors of that
|
||||||
|
material by anyone who conveys the material (or modified versions of
|
||||||
|
it) with contractual assumptions of liability to the recipient, for
|
||||||
|
any liability that these contractual assumptions directly impose on
|
||||||
|
those licensors and authors.
|
||||||
|
|
||||||
|
All other non-permissive additional terms are considered "further
|
||||||
|
restrictions" within the meaning of section 10. If the Program as you
|
||||||
|
received it, or any part of it, contains a notice stating that it is
|
||||||
|
governed by this License along with a term that is a further
|
||||||
|
restriction, you may remove that term. If a license document contains
|
||||||
|
a further restriction but permits relicensing or conveying under this
|
||||||
|
License, you may add to a covered work material governed by the terms
|
||||||
|
of that license document, provided that the further restriction does
|
||||||
|
not survive such relicensing or conveying.
|
||||||
|
|
||||||
|
If you add terms to a covered work in accord with this section, you
|
||||||
|
must place, in the relevant source files, a statement of the
|
||||||
|
additional terms that apply to those files, or a notice indicating
|
||||||
|
where to find the applicable terms.
|
||||||
|
|
||||||
|
Additional terms, permissive or non-permissive, may be stated in the
|
||||||
|
form of a separately written license, or stated as exceptions;
|
||||||
|
the above requirements apply either way.
|
||||||
|
|
||||||
|
8. Termination.
|
||||||
|
|
||||||
|
You may not propagate or modify a covered work except as expressly
|
||||||
|
provided under this License. Any attempt otherwise to propagate or
|
||||||
|
modify it is void, and will automatically terminate your rights under
|
||||||
|
this License (including any patent licenses granted under the third
|
||||||
|
paragraph of section 11).
|
||||||
|
|
||||||
|
However, if you cease all violation of this License, then your
|
||||||
|
license from a particular copyright holder is reinstated (a)
|
||||||
|
provisionally, unless and until the copyright holder explicitly and
|
||||||
|
finally terminates your license, and (b) permanently, if the copyright
|
||||||
|
holder fails to notify you of the violation by some reasonable means
|
||||||
|
prior to 60 days after the cessation.
|
||||||
|
|
||||||
|
Moreover, your license from a particular copyright holder is
|
||||||
|
reinstated permanently if the copyright holder notifies you of the
|
||||||
|
violation by some reasonable means, this is the first time you have
|
||||||
|
received notice of violation of this License (for any work) from that
|
||||||
|
copyright holder, and you cure the violation prior to 30 days after
|
||||||
|
your receipt of the notice.
|
||||||
|
|
||||||
|
Termination of your rights under this section does not terminate the
|
||||||
|
licenses of parties who have received copies or rights from you under
|
||||||
|
this License. If your rights have been terminated and not permanently
|
||||||
|
reinstated, you do not qualify to receive new licenses for the same
|
||||||
|
material under section 10.
|
||||||
|
|
||||||
|
9. Acceptance Not Required for Having Copies.
|
||||||
|
|
||||||
|
You are not required to accept this License in order to receive or
|
||||||
|
run a copy of the Program. Ancillary propagation of a covered work
|
||||||
|
occurring solely as a consequence of using peer-to-peer transmission
|
||||||
|
to receive a copy likewise does not require acceptance. However,
|
||||||
|
nothing other than this License grants you permission to propagate or
|
||||||
|
modify any covered work. These actions infringe copyright if you do
|
||||||
|
not accept this License. Therefore, by modifying or propagating a
|
||||||
|
covered work, you indicate your acceptance of this License to do so.
|
||||||
|
|
||||||
|
10. Automatic Licensing of Downstream Recipients.
|
||||||
|
|
||||||
|
Each time you convey a covered work, the recipient automatically
|
||||||
|
receives a license from the original licensors, to run, modify and
|
||||||
|
propagate that work, subject to this License. You are not responsible
|
||||||
|
for enforcing compliance by third parties with this License.
|
||||||
|
|
||||||
|
An "entity transaction" is a transaction transferring control of an
|
||||||
|
organization, or substantially all assets of one, or subdividing an
|
||||||
|
organization, or merging organizations. If propagation of a covered
|
||||||
|
work results from an entity transaction, each party to that
|
||||||
|
transaction who receives a copy of the work also receives whatever
|
||||||
|
licenses to the work the party's predecessor in interest had or could
|
||||||
|
give under the previous paragraph, plus a right to possession of the
|
||||||
|
Corresponding Source of the work from the predecessor in interest, if
|
||||||
|
the predecessor has it or can get it with reasonable efforts.
|
||||||
|
|
||||||
|
You may not impose any further restrictions on the exercise of the
|
||||||
|
rights granted or affirmed under this License. For example, you may
|
||||||
|
not impose a license fee, royalty, or other charge for exercise of
|
||||||
|
rights granted under this License, and you may not initiate litigation
|
||||||
|
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||||
|
any patent claim is infringed by making, using, selling, offering for
|
||||||
|
sale, or importing the Program or any portion of it.
|
||||||
|
|
||||||
|
11. Patents.
|
||||||
|
|
||||||
|
A "contributor" is a copyright holder who authorizes use under this
|
||||||
|
License of the Program or a work on which the Program is based. The
|
||||||
|
work thus licensed is called the contributor's "contributor version".
|
||||||
|
|
||||||
|
A contributor's "essential patent claims" are all patent claims
|
||||||
|
owned or controlled by the contributor, whether already acquired or
|
||||||
|
hereafter acquired, that would be infringed by some manner, permitted
|
||||||
|
by this License, of making, using, or selling its contributor version,
|
||||||
|
but do not include claims that would be infringed only as a
|
||||||
|
consequence of further modification of the contributor version. For
|
||||||
|
purposes of this definition, "control" includes the right to grant
|
||||||
|
patent sublicenses in a manner consistent with the requirements of
|
||||||
|
this License.
|
||||||
|
|
||||||
|
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||||
|
patent license under the contributor's essential patent claims, to
|
||||||
|
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||||
|
propagate the contents of its contributor version.
|
||||||
|
|
||||||
|
In the following three paragraphs, a "patent license" is any express
|
||||||
|
agreement or commitment, however denominated, not to enforce a patent
|
||||||
|
(such as an express permission to practice a patent or covenant not to
|
||||||
|
sue for patent infringement). To "grant" such a patent license to a
|
||||||
|
party means to make such an agreement or commitment not to enforce a
|
||||||
|
patent against the party.
|
||||||
|
|
||||||
|
If you convey a covered work, knowingly relying on a patent license,
|
||||||
|
and the Corresponding Source of the work is not available for anyone
|
||||||
|
to copy, free of charge and under the terms of this License, through a
|
||||||
|
publicly available network server or other readily accessible means,
|
||||||
|
then you must either (1) cause the Corresponding Source to be so
|
||||||
|
available, or (2) arrange to deprive yourself of the benefit of the
|
||||||
|
patent license for this particular work, or (3) arrange, in a manner
|
||||||
|
consistent with the requirements of this License, to extend the patent
|
||||||
|
license to downstream recipients. "Knowingly relying" means you have
|
||||||
|
actual knowledge that, but for the patent license, your conveying the
|
||||||
|
covered work in a country, or your recipient's use of the covered work
|
||||||
|
in a country, would infringe one or more identifiable patents in that
|
||||||
|
country that you have reason to believe are valid.
|
||||||
|
|
||||||
|
If, pursuant to or in connection with a single transaction or
|
||||||
|
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||||
|
covered work, and grant a patent license to some of the parties
|
||||||
|
receiving the covered work authorizing them to use, propagate, modify
|
||||||
|
or convey a specific copy of the covered work, then the patent license
|
||||||
|
you grant is automatically extended to all recipients of the covered
|
||||||
|
work and works based on it.
|
||||||
|
|
||||||
|
A patent license is "discriminatory" if it does not include within
|
||||||
|
the scope of its coverage, prohibits the exercise of, or is
|
||||||
|
conditioned on the non-exercise of one or more of the rights that are
|
||||||
|
specifically granted under this License. You may not convey a covered
|
||||||
|
work if you are a party to an arrangement with a third party that is
|
||||||
|
in the business of distributing software, under which you make payment
|
||||||
|
to the third party based on the extent of your activity of conveying
|
||||||
|
the work, and under which the third party grants, to any of the
|
||||||
|
parties who would receive the covered work from you, a discriminatory
|
||||||
|
patent license (a) in connection with copies of the covered work
|
||||||
|
conveyed by you (or copies made from those copies), or (b) primarily
|
||||||
|
for and in connection with specific products or compilations that
|
||||||
|
contain the covered work, unless you entered into that arrangement,
|
||||||
|
or that patent license was granted, prior to 28 March 2007.
|
||||||
|
|
||||||
|
Nothing in this License shall be construed as excluding or limiting
|
||||||
|
any implied license or other defenses to infringement that may
|
||||||
|
otherwise be available to you under applicable patent law.
|
||||||
|
|
||||||
|
12. No Surrender of Others' Freedom.
|
||||||
|
|
||||||
|
If conditions are imposed on you (whether by court order, agreement or
|
||||||
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
|
excuse you from the conditions of this License. If you cannot convey a
|
||||||
|
covered work so as to satisfy simultaneously your obligations under this
|
||||||
|
License and any other pertinent obligations, then as a consequence you may
|
||||||
|
not convey it at all. For example, if you agree to terms that obligate you
|
||||||
|
to collect a royalty for further conveying from those to whom you convey
|
||||||
|
the Program, the only way you could satisfy both those terms and this
|
||||||
|
License would be to refrain entirely from conveying the Program.
|
||||||
|
|
||||||
|
13. Use with the GNU Affero General Public License.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, you have
|
||||||
|
permission to link or combine any covered work with a work licensed
|
||||||
|
under version 3 of the GNU Affero General Public License into a single
|
||||||
|
combined work, and to convey the resulting work. The terms of this
|
||||||
|
License will continue to apply to the part which is the covered work,
|
||||||
|
but the special requirements of the GNU Affero General Public License,
|
||||||
|
section 13, concerning interaction through a network will apply to the
|
||||||
|
combination as such.
|
||||||
|
|
||||||
|
14. Revised Versions of this License.
|
||||||
|
|
||||||
|
The Free Software Foundation may publish revised and/or new versions of
|
||||||
|
the GNU General Public License from time to time. Such new versions will
|
||||||
|
be similar in spirit to the present version, but may differ in detail to
|
||||||
|
address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the
|
||||||
|
Program specifies that a certain numbered version of the GNU General
|
||||||
|
Public License "or any later version" applies to it, you have the
|
||||||
|
option of following the terms and conditions either of that numbered
|
||||||
|
version or of any later version published by the Free Software
|
||||||
|
Foundation. If the Program does not specify a version number of the
|
||||||
|
GNU General Public License, you may choose any version ever published
|
||||||
|
by the Free Software Foundation.
|
||||||
|
|
||||||
|
If the Program specifies that a proxy can decide which future
|
||||||
|
versions of the GNU General Public License can be used, that proxy's
|
||||||
|
public statement of acceptance of a version permanently authorizes you
|
||||||
|
to choose that version for the Program.
|
||||||
|
|
||||||
|
Later license versions may give you additional or different
|
||||||
|
permissions. However, no additional obligations are imposed on any
|
||||||
|
author or copyright holder as a result of your choosing to follow a
|
||||||
|
later version.
|
||||||
|
|
||||||
|
15. Disclaimer of Warranty.
|
||||||
|
|
||||||
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||||
|
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||||
|
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||||
|
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||||
|
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||||
|
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||||
|
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
16. Limitation of Liability.
|
||||||
|
|
||||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||||
|
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||||
|
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||||
|
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||||
|
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||||
|
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||||
|
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||||
|
SUCH DAMAGES.
|
||||||
|
|
||||||
|
17. Interpretation of Sections 15 and 16.
|
||||||
|
|
||||||
|
If the disclaimer of warranty and limitation of liability provided
|
||||||
|
above cannot be given local legal effect according to their terms,
|
||||||
|
reviewing courts shall apply local law that most closely approximates
|
||||||
|
an absolute waiver of all civil liability in connection with the
|
||||||
|
Program, unless a warranty or assumption of liability accompanies a
|
||||||
|
copy of the Program in return for a fee.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
How to Apply These Terms to Your New Programs
|
||||||
|
|
||||||
|
If you develop a new program, and you want it to be of the greatest
|
||||||
|
possible use to the public, the best way to achieve this is to make it
|
||||||
|
free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
|
To do so, attach the following notices to the program. It is safest
|
||||||
|
to attach them to the start of each source file to most effectively
|
||||||
|
state the exclusion of warranty; and each file should have at least
|
||||||
|
the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
<one line to give the program's name and a brief idea of what it does.>
|
||||||
|
Copyright (C) <year> <name of author>
|
||||||
|
|
||||||
|
This program is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
If the program does terminal interaction, make it output a short
|
||||||
|
notice like this when it starts in an interactive mode:
|
||||||
|
|
||||||
|
<program> Copyright (C) <year> <name of author>
|
||||||
|
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||||
|
This is free software, and you are welcome to redistribute it
|
||||||
|
under certain conditions; type `show c' for details.
|
||||||
|
|
||||||
|
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||||
|
parts of the General Public License. Of course, your program's commands
|
||||||
|
might be different; for a GUI interface, you would use an "about box".
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or school,
|
||||||
|
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||||
|
For more information on this, and how to apply and follow the GNU GPL, see
|
||||||
|
<http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
The GNU General Public License does not permit incorporating your program
|
||||||
|
into proprietary programs. If your program is a subroutine library, you
|
||||||
|
may consider it more useful to permit linking proprietary applications with
|
||||||
|
the library. If this is what you want to do, use the GNU Lesser General
|
||||||
|
Public License instead of this License. But first, please read
|
||||||
|
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
||||||
291
firefox_addon/lib/jsaes.js
Normal file
291
firefox_addon/lib/jsaes.js
Normal file
@@ -0,0 +1,291 @@
|
|||||||
|
/*
|
||||||
|
* jsaes version 0.1 - Copyright 2006 B. Poettering
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU General Public License as
|
||||||
|
* published by the Free Software Foundation; either version 2 of the
|
||||||
|
* License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
* General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License
|
||||||
|
* along with this program; if not, write to the Free Software
|
||||||
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
||||||
|
* 02111-1307 USA
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* http://point-at-infinity.org/jsaes/
|
||||||
|
*
|
||||||
|
* This is a javascript implementation of the AES block cipher. Key lengths
|
||||||
|
* of 128, 192 and 256 bits are supported.
|
||||||
|
*
|
||||||
|
* The well-functioning of the encryption/decryption routines has been
|
||||||
|
* verified for different key lengths with the test vectors given in
|
||||||
|
* FIPS-197, Appendix C.
|
||||||
|
*
|
||||||
|
* The following code example enciphers the plaintext block '00 11 22 .. EE FF'
|
||||||
|
* with the 256 bit key '00 01 02 .. 1E 1F'.
|
||||||
|
*
|
||||||
|
* AES_Init();
|
||||||
|
*
|
||||||
|
* var block = new Array(16);
|
||||||
|
* for(var i = 0; i < 16; i++)
|
||||||
|
* block[i] = 0x11 * i;
|
||||||
|
*
|
||||||
|
* var key = new Array(32);
|
||||||
|
* for(var i = 0; i < 32; i++)
|
||||||
|
* key[i] = i;
|
||||||
|
*
|
||||||
|
* AES_ExpandKey(key);
|
||||||
|
* AES_Encrypt(block, key);
|
||||||
|
*
|
||||||
|
* AES_Done();
|
||||||
|
*
|
||||||
|
* Report bugs to: jsaes AT point-at-infinity.org
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
/******************************************************************************/
|
||||||
|
|
||||||
|
/*
|
||||||
|
AES_Init: initialize the tables needed at runtime. Call this function
|
||||||
|
before the (first) key expansion.
|
||||||
|
*/
|
||||||
|
|
||||||
|
function AES_Init() {
|
||||||
|
AES_Sbox_Inv = new Array(256);
|
||||||
|
for(var i = 0; i < 256; i++)
|
||||||
|
AES_Sbox_Inv[AES_Sbox[i]] = i;
|
||||||
|
|
||||||
|
AES_ShiftRowTab_Inv = new Array(16);
|
||||||
|
for(var i = 0; i < 16; i++)
|
||||||
|
AES_ShiftRowTab_Inv[AES_ShiftRowTab[i]] = i;
|
||||||
|
|
||||||
|
AES_xtime = new Array(256);
|
||||||
|
for(var i = 0; i < 128; i++) {
|
||||||
|
AES_xtime[i] = i << 1;
|
||||||
|
AES_xtime[128 + i] = (i << 1) ^ 0x1b;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
AES_Done: release memory reserved by AES_Init. Call this function after
|
||||||
|
the last encryption/decryption operation.
|
||||||
|
*/
|
||||||
|
|
||||||
|
function AES_Done() {
|
||||||
|
delete AES_Sbox_Inv;
|
||||||
|
delete AES_ShiftRowTab_Inv;
|
||||||
|
delete AES_xtime;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
AES_ExpandKey: expand a cipher key. Depending on the desired encryption
|
||||||
|
strength of 128, 192 or 256 bits 'key' has to be a byte array of length
|
||||||
|
16, 24 or 32, respectively. The key expansion is done "in place", meaning
|
||||||
|
that the array 'key' is modified.
|
||||||
|
*/
|
||||||
|
|
||||||
|
function AES_ExpandKey(key) {
|
||||||
|
var kl = key.length, ks, Rcon = 1;
|
||||||
|
switch (kl) {
|
||||||
|
case 16: ks = 16 * (10 + 1); break;
|
||||||
|
case 24: ks = 16 * (12 + 1); break;
|
||||||
|
case 32: ks = 16 * (14 + 1); break;
|
||||||
|
default:
|
||||||
|
alert("AES_ExpandKey: Only key lengths of 16, 24 or 32 bytes allowed!");
|
||||||
|
}
|
||||||
|
for(var i = kl; i < ks; i += 4) {
|
||||||
|
var temp = key.slice(i - 4, i);
|
||||||
|
if (i % kl == 0) {
|
||||||
|
temp = new Array(AES_Sbox[temp[1]] ^ Rcon, AES_Sbox[temp[2]],
|
||||||
|
AES_Sbox[temp[3]], AES_Sbox[temp[0]]);
|
||||||
|
if ((Rcon <<= 1) >= 256)
|
||||||
|
Rcon ^= 0x11b;
|
||||||
|
}
|
||||||
|
else if ((kl > 24) && (i % kl == 16))
|
||||||
|
temp = new Array(AES_Sbox[temp[0]], AES_Sbox[temp[1]],
|
||||||
|
AES_Sbox[temp[2]], AES_Sbox[temp[3]]);
|
||||||
|
for(var j = 0; j < 4; j++)
|
||||||
|
key[i + j] = key[i + j - kl] ^ temp[j];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
AES_Encrypt: encrypt the 16 byte array 'block' with the previously
|
||||||
|
expanded key 'key'.
|
||||||
|
*/
|
||||||
|
|
||||||
|
function AES_Encrypt(block, key) {
|
||||||
|
var l = key.length;
|
||||||
|
AES_AddRoundKey(block, key.slice(0, 16));
|
||||||
|
for(var i = 16; i < l - 16; i += 16) {
|
||||||
|
AES_SubBytes(block, AES_Sbox);
|
||||||
|
AES_ShiftRows(block, AES_ShiftRowTab);
|
||||||
|
AES_MixColumns(block);
|
||||||
|
AES_AddRoundKey(block, key.slice(i, i + 16));
|
||||||
|
}
|
||||||
|
AES_SubBytes(block, AES_Sbox);
|
||||||
|
AES_ShiftRows(block, AES_ShiftRowTab);
|
||||||
|
AES_AddRoundKey(block, key.slice(i, l));
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
AES_Decrypt: decrypt the 16 byte array 'block' with the previously
|
||||||
|
expanded key 'key'.
|
||||||
|
*/
|
||||||
|
|
||||||
|
function AES_Decrypt(block, key) {
|
||||||
|
var l = key.length;
|
||||||
|
AES_AddRoundKey(block, key.slice(l - 16, l));
|
||||||
|
AES_ShiftRows(block, AES_ShiftRowTab_Inv);
|
||||||
|
AES_SubBytes(block, AES_Sbox_Inv);
|
||||||
|
for(var i = l - 32; i >= 16; i -= 16) {
|
||||||
|
AES_AddRoundKey(block, key.slice(i, i + 16));
|
||||||
|
AES_MixColumns_Inv(block);
|
||||||
|
AES_ShiftRows(block, AES_ShiftRowTab_Inv);
|
||||||
|
AES_SubBytes(block, AES_Sbox_Inv);
|
||||||
|
}
|
||||||
|
AES_AddRoundKey(block, key.slice(0, 16));
|
||||||
|
}
|
||||||
|
|
||||||
|
/******************************************************************************/
|
||||||
|
|
||||||
|
/* The following lookup tables and functions are for internal use only! */
|
||||||
|
|
||||||
|
AES_Sbox = new Array(99,124,119,123,242,107,111,197,48,1,103,43,254,215,171,
|
||||||
|
118,202,130,201,125,250,89,71,240,173,212,162,175,156,164,114,192,183,253,
|
||||||
|
147,38,54,63,247,204,52,165,229,241,113,216,49,21,4,199,35,195,24,150,5,154,
|
||||||
|
7,18,128,226,235,39,178,117,9,131,44,26,27,110,90,160,82,59,214,179,41,227,
|
||||||
|
47,132,83,209,0,237,32,252,177,91,106,203,190,57,74,76,88,207,208,239,170,
|
||||||
|
251,67,77,51,133,69,249,2,127,80,60,159,168,81,163,64,143,146,157,56,245,
|
||||||
|
188,182,218,33,16,255,243,210,205,12,19,236,95,151,68,23,196,167,126,61,
|
||||||
|
100,93,25,115,96,129,79,220,34,42,144,136,70,238,184,20,222,94,11,219,224,
|
||||||
|
50,58,10,73,6,36,92,194,211,172,98,145,149,228,121,231,200,55,109,141,213,
|
||||||
|
78,169,108,86,244,234,101,122,174,8,186,120,37,46,28,166,180,198,232,221,
|
||||||
|
116,31,75,189,139,138,112,62,181,102,72,3,246,14,97,53,87,185,134,193,29,
|
||||||
|
158,225,248,152,17,105,217,142,148,155,30,135,233,206,85,40,223,140,161,
|
||||||
|
137,13,191,230,66,104,65,153,45,15,176,84,187,22);
|
||||||
|
|
||||||
|
AES_ShiftRowTab = new Array(0,5,10,15,4,9,14,3,8,13,2,7,12,1,6,11);
|
||||||
|
|
||||||
|
function AES_SubBytes(state, sbox) {
|
||||||
|
for(var i = 0; i < 16; i++)
|
||||||
|
state[i] = sbox[state[i]];
|
||||||
|
}
|
||||||
|
|
||||||
|
function AES_AddRoundKey(state, rkey) {
|
||||||
|
for(var i = 0; i < 16; i++)
|
||||||
|
state[i] ^= rkey[i];
|
||||||
|
}
|
||||||
|
|
||||||
|
function AES_ShiftRows(state, shifttab) {
|
||||||
|
var h = new Array().concat(state);
|
||||||
|
for(var i = 0; i < 16; i++)
|
||||||
|
state[i] = h[shifttab[i]];
|
||||||
|
}
|
||||||
|
|
||||||
|
function AES_MixColumns(state) {
|
||||||
|
for(var i = 0; i < 16; i += 4) {
|
||||||
|
var s0 = state[i + 0], s1 = state[i + 1];
|
||||||
|
var s2 = state[i + 2], s3 = state[i + 3];
|
||||||
|
var h = s0 ^ s1 ^ s2 ^ s3;
|
||||||
|
state[i + 0] ^= h ^ AES_xtime[s0 ^ s1];
|
||||||
|
state[i + 1] ^= h ^ AES_xtime[s1 ^ s2];
|
||||||
|
state[i + 2] ^= h ^ AES_xtime[s2 ^ s3];
|
||||||
|
state[i + 3] ^= h ^ AES_xtime[s3 ^ s0];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function AES_MixColumns_Inv(state) {
|
||||||
|
for(var i = 0; i < 16; i += 4) {
|
||||||
|
var s0 = state[i + 0], s1 = state[i + 1];
|
||||||
|
var s2 = state[i + 2], s3 = state[i + 3];
|
||||||
|
var h = s0 ^ s1 ^ s2 ^ s3;
|
||||||
|
var xh = AES_xtime[h];
|
||||||
|
var h1 = AES_xtime[AES_xtime[xh ^ s0 ^ s2]] ^ h;
|
||||||
|
var h2 = AES_xtime[AES_xtime[xh ^ s1 ^ s3]] ^ h;
|
||||||
|
state[i + 0] ^= h1 ^ AES_xtime[s0 ^ s1];
|
||||||
|
state[i + 1] ^= h2 ^ AES_xtime[s1 ^ s2];
|
||||||
|
state[i + 2] ^= h1 ^ AES_xtime[s2 ^ s3];
|
||||||
|
state[i + 3] ^= h2 ^ AES_xtime[s3 ^ s0];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function bin2String (array) {
|
||||||
|
var result = "";
|
||||||
|
for (var i = 0; i < array.length; i++) {
|
||||||
|
result += String.fromCharCode(parseInt(array[i], 2));
|
||||||
|
}
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
function string2Bin (str) {
|
||||||
|
var result = [];
|
||||||
|
for (var i = 0; i < str.length; i++) {
|
||||||
|
result.push(str.charCodeAt(i));
|
||||||
|
}
|
||||||
|
while ((result.length % 16))
|
||||||
|
result.push(0);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
function bin2String (array) {
|
||||||
|
return String.fromCharCode.apply(String, array);
|
||||||
|
}
|
||||||
|
|
||||||
|
// http://osama-oransa.blogspot.fr/2012/03/using-aes-encrypting-in-java-script.html
|
||||||
|
exports.aes = {
|
||||||
|
init : function (myKey){
|
||||||
|
AES_Init();
|
||||||
|
var key = string2Bin(myKey);
|
||||||
|
AES_ExpandKey(key);
|
||||||
|
return key;
|
||||||
|
},
|
||||||
|
|
||||||
|
encrypt : function ( inputStr,key ) {
|
||||||
|
var block = string2Bin(inputStr);
|
||||||
|
AES_Encrypt(block, key);
|
||||||
|
var data=bin2String(block);
|
||||||
|
return data;
|
||||||
|
},
|
||||||
|
|
||||||
|
decrypt : function ( inputStr,key ) {
|
||||||
|
block = string2Bin(inputStr);
|
||||||
|
AES_Decrypt(block, key);
|
||||||
|
var data=bin2String(block);
|
||||||
|
return data;
|
||||||
|
},
|
||||||
|
|
||||||
|
encryptLongString : function( myString,key ) {
|
||||||
|
if(myString.length>16){
|
||||||
|
var data='';
|
||||||
|
for(var i=0;i<myString.length;i=i+16){
|
||||||
|
data+=this.encrypt(myString.substr(i,16),key);
|
||||||
|
}
|
||||||
|
return data;
|
||||||
|
}else{
|
||||||
|
return this.encrypt(myString,key);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
decryptLongString : function ( myString,key ) {
|
||||||
|
if(myString.length>16){
|
||||||
|
var data='';
|
||||||
|
for(var i=0;i<myString.length;i=i+16){
|
||||||
|
data+=this.decrypt(myString.substr(i,16),key);
|
||||||
|
}
|
||||||
|
return data;
|
||||||
|
}else{
|
||||||
|
return this.decrypt(myString,key);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
finish : function(){
|
||||||
|
AES_Done();
|
||||||
|
},
|
||||||
|
};
|
||||||
404
firefox_addon/lib/jshashtable-3.0.js
Normal file
404
firefox_addon/lib/jshashtable-3.0.js
Normal file
@@ -0,0 +1,404 @@
|
|||||||
|
/**
|
||||||
|
* @license jahashtable, a JavaScript implementation of a hash table. It creates a single constructor function called
|
||||||
|
* Hashtable in the global scope.
|
||||||
|
*
|
||||||
|
* http://www.timdown.co.uk/jshashtable/
|
||||||
|
* Copyright 2013 Tim Down.
|
||||||
|
* Version: 3.0
|
||||||
|
* Build date: 17 July 2013
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
var Hashtable = (function(UNDEFINED) {
|
||||||
|
var FUNCTION = "function", STRING = "string", UNDEF = "undefined";
|
||||||
|
|
||||||
|
// Require Array.prototype.splice, Object.prototype.hasOwnProperty and encodeURIComponent. In environments not
|
||||||
|
// having these (e.g. IE <= 5), we bail out now and leave Hashtable null.
|
||||||
|
if (typeof encodeURIComponent == UNDEF ||
|
||||||
|
Array.prototype.splice === UNDEFINED ||
|
||||||
|
Object.prototype.hasOwnProperty === UNDEFINED) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
function toStr(obj) {
|
||||||
|
return (typeof obj == STRING) ? obj : "" + obj;
|
||||||
|
}
|
||||||
|
|
||||||
|
function hashObject(obj) {
|
||||||
|
var hashCode;
|
||||||
|
if (typeof obj == STRING) {
|
||||||
|
return obj;
|
||||||
|
} else if (typeof obj.hashCode == FUNCTION) {
|
||||||
|
// Check the hashCode method really has returned a string
|
||||||
|
hashCode = obj.hashCode();
|
||||||
|
return (typeof hashCode == STRING) ? hashCode : hashObject(hashCode);
|
||||||
|
} else {
|
||||||
|
return toStr(obj);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function merge(o1, o2) {
|
||||||
|
for (var i in o2) {
|
||||||
|
if (o2.hasOwnProperty(i)) {
|
||||||
|
o1[i] = o2[i];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function equals_fixedValueHasEquals(fixedValue, variableValue) {
|
||||||
|
return fixedValue.equals(variableValue);
|
||||||
|
}
|
||||||
|
|
||||||
|
function equals_fixedValueNoEquals(fixedValue, variableValue) {
|
||||||
|
return (typeof variableValue.equals == FUNCTION) ?
|
||||||
|
variableValue.equals(fixedValue) : (fixedValue === variableValue);
|
||||||
|
}
|
||||||
|
|
||||||
|
function createKeyValCheck(kvStr) {
|
||||||
|
return function(kv) {
|
||||||
|
if (kv === null) {
|
||||||
|
throw new Error("null is not a valid " + kvStr);
|
||||||
|
} else if (kv === UNDEFINED) {
|
||||||
|
throw new Error(kvStr + " must not be undefined");
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
var checkKey = createKeyValCheck("key"), checkValue = createKeyValCheck("value");
|
||||||
|
|
||||||
|
/*----------------------------------------------------------------------------------------------------------------*/
|
||||||
|
|
||||||
|
function Bucket(hash, firstKey, firstValue, equalityFunction) {
|
||||||
|
this[0] = hash;
|
||||||
|
this.entries = [];
|
||||||
|
this.addEntry(firstKey, firstValue);
|
||||||
|
|
||||||
|
if (equalityFunction !== null) {
|
||||||
|
this.getEqualityFunction = function() {
|
||||||
|
return equalityFunction;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var EXISTENCE = 0, ENTRY = 1, ENTRY_INDEX_AND_VALUE = 2;
|
||||||
|
|
||||||
|
function createBucketSearcher(mode) {
|
||||||
|
return function(key) {
|
||||||
|
var i = this.entries.length, entry, equals = this.getEqualityFunction(key);
|
||||||
|
while (i--) {
|
||||||
|
entry = this.entries[i];
|
||||||
|
if ( equals(key, entry[0]) ) {
|
||||||
|
switch (mode) {
|
||||||
|
case EXISTENCE:
|
||||||
|
return true;
|
||||||
|
case ENTRY:
|
||||||
|
return entry;
|
||||||
|
case ENTRY_INDEX_AND_VALUE:
|
||||||
|
return [ i, entry[1] ];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
function createBucketLister(entryProperty) {
|
||||||
|
return function(aggregatedArr) {
|
||||||
|
var startIndex = aggregatedArr.length;
|
||||||
|
for (var i = 0, entries = this.entries, len = entries.length; i < len; ++i) {
|
||||||
|
aggregatedArr[startIndex + i] = entries[i][entryProperty];
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
Bucket.prototype = {
|
||||||
|
getEqualityFunction: function(searchValue) {
|
||||||
|
return (typeof searchValue.equals == FUNCTION) ? equals_fixedValueHasEquals : equals_fixedValueNoEquals;
|
||||||
|
},
|
||||||
|
|
||||||
|
getEntryForKey: createBucketSearcher(ENTRY),
|
||||||
|
|
||||||
|
getEntryAndIndexForKey: createBucketSearcher(ENTRY_INDEX_AND_VALUE),
|
||||||
|
|
||||||
|
removeEntryForKey: function(key) {
|
||||||
|
var result = this.getEntryAndIndexForKey(key);
|
||||||
|
if (result) {
|
||||||
|
this.entries.splice(result[0], 1);
|
||||||
|
return result[1];
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
},
|
||||||
|
|
||||||
|
addEntry: function(key, value) {
|
||||||
|
this.entries.push( [key, value] );
|
||||||
|
},
|
||||||
|
|
||||||
|
keys: createBucketLister(0),
|
||||||
|
|
||||||
|
values: createBucketLister(1),
|
||||||
|
|
||||||
|
getEntries: function(destEntries) {
|
||||||
|
var startIndex = destEntries.length;
|
||||||
|
for (var i = 0, entries = this.entries, len = entries.length; i < len; ++i) {
|
||||||
|
// Clone the entry stored in the bucket before adding to array
|
||||||
|
destEntries[startIndex + i] = entries[i].slice(0);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
containsKey: createBucketSearcher(EXISTENCE),
|
||||||
|
|
||||||
|
containsValue: function(value) {
|
||||||
|
var entries = this.entries, i = entries.length;
|
||||||
|
while (i--) {
|
||||||
|
if ( value === entries[i][1] ) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
/*----------------------------------------------------------------------------------------------------------------*/
|
||||||
|
|
||||||
|
// Supporting functions for searching hashtable buckets
|
||||||
|
|
||||||
|
function searchBuckets(buckets, hash) {
|
||||||
|
var i = buckets.length, bucket;
|
||||||
|
while (i--) {
|
||||||
|
bucket = buckets[i];
|
||||||
|
if (hash === bucket[0]) {
|
||||||
|
return i;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
function getBucketForHash(bucketsByHash, hash) {
|
||||||
|
var bucket = bucketsByHash[hash];
|
||||||
|
|
||||||
|
// Check that this is a genuine bucket and not something inherited from the bucketsByHash's prototype
|
||||||
|
return ( bucket && (bucket instanceof Bucket) ) ? bucket : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*----------------------------------------------------------------------------------------------------------------*/
|
||||||
|
|
||||||
|
function Hashtable() {
|
||||||
|
var buckets = [];
|
||||||
|
var bucketsByHash = {};
|
||||||
|
var properties = {
|
||||||
|
replaceDuplicateKey: true,
|
||||||
|
hashCode: hashObject,
|
||||||
|
equals: null
|
||||||
|
};
|
||||||
|
|
||||||
|
var arg0 = arguments[0], arg1 = arguments[1];
|
||||||
|
if (arg1 !== UNDEFINED) {
|
||||||
|
properties.hashCode = arg0;
|
||||||
|
properties.equals = arg1;
|
||||||
|
} else if (arg0 !== UNDEFINED) {
|
||||||
|
merge(properties, arg0);
|
||||||
|
}
|
||||||
|
|
||||||
|
var hashCode = properties.hashCode, equals = properties.equals;
|
||||||
|
|
||||||
|
this.properties = properties;
|
||||||
|
|
||||||
|
this.put = function(key, value) {
|
||||||
|
checkKey(key);
|
||||||
|
checkValue(value);
|
||||||
|
var hash = hashCode(key), bucket, bucketEntry, oldValue = null;
|
||||||
|
|
||||||
|
// Check if a bucket exists for the bucket key
|
||||||
|
bucket = getBucketForHash(bucketsByHash, hash);
|
||||||
|
if (bucket) {
|
||||||
|
// Check this bucket to see if it already contains this key
|
||||||
|
bucketEntry = bucket.getEntryForKey(key);
|
||||||
|
if (bucketEntry) {
|
||||||
|
// This bucket entry is the current mapping of key to value, so replace the old value.
|
||||||
|
// Also, we optionally replace the key so that the latest key is stored.
|
||||||
|
if (properties.replaceDuplicateKey) {
|
||||||
|
bucketEntry[0] = key;
|
||||||
|
}
|
||||||
|
oldValue = bucketEntry[1];
|
||||||
|
bucketEntry[1] = value;
|
||||||
|
} else {
|
||||||
|
// The bucket does not contain an entry for this key, so add one
|
||||||
|
bucket.addEntry(key, value);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// No bucket exists for the key, so create one and put our key/value mapping in
|
||||||
|
bucket = new Bucket(hash, key, value, equals);
|
||||||
|
buckets.push(bucket);
|
||||||
|
bucketsByHash[hash] = bucket;
|
||||||
|
}
|
||||||
|
return oldValue;
|
||||||
|
};
|
||||||
|
|
||||||
|
this.get = function(key) {
|
||||||
|
checkKey(key);
|
||||||
|
|
||||||
|
var hash = hashCode(key);
|
||||||
|
|
||||||
|
// Check if a bucket exists for the bucket key
|
||||||
|
var bucket = getBucketForHash(bucketsByHash, hash);
|
||||||
|
if (bucket) {
|
||||||
|
// Check this bucket to see if it contains this key
|
||||||
|
var bucketEntry = bucket.getEntryForKey(key);
|
||||||
|
if (bucketEntry) {
|
||||||
|
// This bucket entry is the current mapping of key to value, so return the value.
|
||||||
|
return bucketEntry[1];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
};
|
||||||
|
|
||||||
|
this.containsKey = function(key) {
|
||||||
|
checkKey(key);
|
||||||
|
var bucketKey = hashCode(key);
|
||||||
|
|
||||||
|
// Check if a bucket exists for the bucket key
|
||||||
|
var bucket = getBucketForHash(bucketsByHash, bucketKey);
|
||||||
|
|
||||||
|
return bucket ? bucket.containsKey(key) : false;
|
||||||
|
};
|
||||||
|
|
||||||
|
this.containsValue = function(value) {
|
||||||
|
checkValue(value);
|
||||||
|
var i = buckets.length;
|
||||||
|
while (i--) {
|
||||||
|
if (buckets[i].containsValue(value)) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
};
|
||||||
|
|
||||||
|
this.clear = function() {
|
||||||
|
buckets.length = 0;
|
||||||
|
bucketsByHash = {};
|
||||||
|
};
|
||||||
|
|
||||||
|
this.isEmpty = function() {
|
||||||
|
return !buckets.length;
|
||||||
|
};
|
||||||
|
|
||||||
|
var createBucketAggregator = function(bucketFuncName) {
|
||||||
|
return function() {
|
||||||
|
var aggregated = [], i = buckets.length;
|
||||||
|
while (i--) {
|
||||||
|
buckets[i][bucketFuncName](aggregated);
|
||||||
|
}
|
||||||
|
return aggregated;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
this.keys = createBucketAggregator("keys");
|
||||||
|
this.values = createBucketAggregator("values");
|
||||||
|
this.entries = createBucketAggregator("getEntries");
|
||||||
|
|
||||||
|
this.remove = function(key) {
|
||||||
|
checkKey(key);
|
||||||
|
|
||||||
|
var hash = hashCode(key), bucketIndex, oldValue = null;
|
||||||
|
|
||||||
|
// Check if a bucket exists for the bucket key
|
||||||
|
var bucket = getBucketForHash(bucketsByHash, hash);
|
||||||
|
|
||||||
|
if (bucket) {
|
||||||
|
// Remove entry from this bucket for this key
|
||||||
|
oldValue = bucket.removeEntryForKey(key);
|
||||||
|
if (oldValue !== null) {
|
||||||
|
// Entry was removed, so check if bucket is empty
|
||||||
|
if (bucket.entries.length == 0) {
|
||||||
|
// Bucket is empty, so remove it from the bucket collections
|
||||||
|
bucketIndex = searchBuckets(buckets, hash);
|
||||||
|
buckets.splice(bucketIndex, 1);
|
||||||
|
delete bucketsByHash[hash];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return oldValue;
|
||||||
|
};
|
||||||
|
|
||||||
|
this.size = function() {
|
||||||
|
var total = 0, i = buckets.length;
|
||||||
|
while (i--) {
|
||||||
|
total += buckets[i].entries.length;
|
||||||
|
}
|
||||||
|
return total;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
Hashtable.prototype = {
|
||||||
|
each: function(callback) {
|
||||||
|
var entries = this.entries(), i = entries.length, entry;
|
||||||
|
while (i--) {
|
||||||
|
entry = entries[i];
|
||||||
|
callback(entry[0], entry[1]);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
equals: function(hashtable) {
|
||||||
|
var keys, key, val, count = this.size();
|
||||||
|
if (count == hashtable.size()) {
|
||||||
|
keys = this.keys();
|
||||||
|
while (count--) {
|
||||||
|
key = keys[count];
|
||||||
|
val = hashtable.get(key);
|
||||||
|
if (val === null || val !== this.get(key)) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
},
|
||||||
|
|
||||||
|
putAll: function(hashtable, conflictCallback) {
|
||||||
|
var entries = hashtable.entries();
|
||||||
|
var entry, key, value, thisValue, i = entries.length;
|
||||||
|
var hasConflictCallback = (typeof conflictCallback == FUNCTION);
|
||||||
|
while (i--) {
|
||||||
|
entry = entries[i];
|
||||||
|
key = entry[0];
|
||||||
|
value = entry[1];
|
||||||
|
|
||||||
|
// Check for a conflict. The default behaviour is to overwrite the value for an existing key
|
||||||
|
if ( hasConflictCallback && (thisValue = this.get(key)) ) {
|
||||||
|
value = conflictCallback(key, thisValue, value);
|
||||||
|
}
|
||||||
|
this.put(key, value);
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
clone: function() {
|
||||||
|
var clone = new Hashtable(this.properties);
|
||||||
|
clone.putAll(this);
|
||||||
|
return clone;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
Hashtable.prototype.toQueryString = function() {
|
||||||
|
var entries = this.entries(), i = entries.length, entry;
|
||||||
|
var parts = [];
|
||||||
|
while (i--) {
|
||||||
|
entry = entries[i];
|
||||||
|
parts[i] = encodeURIComponent( toStr(entry[0]) ) + "=" + encodeURIComponent( toStr(entry[1]) );
|
||||||
|
}
|
||||||
|
return parts.join("&");
|
||||||
|
};
|
||||||
|
|
||||||
|
return Hashtable;
|
||||||
|
})();
|
||||||
|
|
||||||
|
exports.Hashtable = Hashtable;
|
||||||
252
firefox_addon/lib/jssha256.js
Normal file
252
firefox_addon/lib/jssha256.js
Normal file
@@ -0,0 +1,252 @@
|
|||||||
|
/*
|
||||||
|
* A JavaScript implementation of the SHA256 hash function.
|
||||||
|
*
|
||||||
|
* FILE: sha256.js
|
||||||
|
* VERSION: 0.8
|
||||||
|
* AUTHOR: Christoph Bichlmeier <informatik@zombiearena.de>
|
||||||
|
*
|
||||||
|
* NOTE: This version is not tested thoroughly!
|
||||||
|
*
|
||||||
|
* Copyright (c) 2003, Christoph Bichlmeier
|
||||||
|
* All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in the
|
||||||
|
* documentation and/or other materials provided with the distribution.
|
||||||
|
* 3. Neither the name of the copyright holder nor the names of contributors
|
||||||
|
* may be used to endorse or promote products derived from this software
|
||||||
|
* without specific prior written permission.
|
||||||
|
*
|
||||||
|
* ======================================================================
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
|
||||||
|
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
||||||
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
|
||||||
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||||
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||||
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
||||||
|
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||||
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
||||||
|
* OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
||||||
|
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* SHA256 logical functions */
|
||||||
|
function rotateRight(n,x) {
|
||||||
|
return ((x >>> n) | (x << (32 - n)));
|
||||||
|
}
|
||||||
|
function choice(x,y,z) {
|
||||||
|
return ((x & y) ^ (~x & z));
|
||||||
|
}
|
||||||
|
function majority(x,y,z) {
|
||||||
|
return ((x & y) ^ (x & z) ^ (y & z));
|
||||||
|
}
|
||||||
|
function sha256_Sigma0(x) {
|
||||||
|
return (rotateRight(2, x) ^ rotateRight(13, x) ^ rotateRight(22, x));
|
||||||
|
}
|
||||||
|
function sha256_Sigma1(x) {
|
||||||
|
return (rotateRight(6, x) ^ rotateRight(11, x) ^ rotateRight(25, x));
|
||||||
|
}
|
||||||
|
function sha256_sigma0(x) {
|
||||||
|
return (rotateRight(7, x) ^ rotateRight(18, x) ^ (x >>> 3));
|
||||||
|
}
|
||||||
|
function sha256_sigma1(x) {
|
||||||
|
return (rotateRight(17, x) ^ rotateRight(19, x) ^ (x >>> 10));
|
||||||
|
}
|
||||||
|
function sha256_expand(W, j) {
|
||||||
|
return (W[j&0x0f] += sha256_sigma1(W[(j+14)&0x0f]) + W[(j+9)&0x0f] +
|
||||||
|
sha256_sigma0(W[(j+1)&0x0f]));
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Hash constant words K: */
|
||||||
|
var K256 = new Array(
|
||||||
|
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,
|
||||||
|
0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
|
||||||
|
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
|
||||||
|
0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
|
||||||
|
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,
|
||||||
|
0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
|
||||||
|
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,
|
||||||
|
0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
|
||||||
|
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
|
||||||
|
0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
|
||||||
|
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,
|
||||||
|
0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
|
||||||
|
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,
|
||||||
|
0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
|
||||||
|
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
|
||||||
|
0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
|
||||||
|
);
|
||||||
|
|
||||||
|
/* global arrays */
|
||||||
|
var ihash, count, buffer;
|
||||||
|
var sha256_hex_digits = "0123456789abcdef";
|
||||||
|
|
||||||
|
/* Add 32-bit integers with 16-bit operations (bug in some JS-interpreters:
|
||||||
|
overflow) */
|
||||||
|
function safe_add(x, y)
|
||||||
|
{
|
||||||
|
var lsw = (x & 0xffff) + (y & 0xffff);
|
||||||
|
var msw = (x >> 16) + (y >> 16) + (lsw >> 16);
|
||||||
|
return (msw << 16) | (lsw & 0xffff);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Initialise the SHA256 computation */
|
||||||
|
function sha256_init() {
|
||||||
|
ihash = new Array(8);
|
||||||
|
count = new Array(2);
|
||||||
|
buffer = new Array(64);
|
||||||
|
count[0] = count[1] = 0;
|
||||||
|
ihash[0] = 0x6a09e667;
|
||||||
|
ihash[1] = 0xbb67ae85;
|
||||||
|
ihash[2] = 0x3c6ef372;
|
||||||
|
ihash[3] = 0xa54ff53a;
|
||||||
|
ihash[4] = 0x510e527f;
|
||||||
|
ihash[5] = 0x9b05688c;
|
||||||
|
ihash[6] = 0x1f83d9ab;
|
||||||
|
ihash[7] = 0x5be0cd19;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Transform a 512-bit message block */
|
||||||
|
function sha256_transform() {
|
||||||
|
var a, b, c, d, e, f, g, h, T1, T2;
|
||||||
|
var W = new Array(16);
|
||||||
|
|
||||||
|
/* Initialize registers with the previous intermediate value */
|
||||||
|
a = ihash[0];
|
||||||
|
b = ihash[1];
|
||||||
|
c = ihash[2];
|
||||||
|
d = ihash[3];
|
||||||
|
e = ihash[4];
|
||||||
|
f = ihash[5];
|
||||||
|
g = ihash[6];
|
||||||
|
h = ihash[7];
|
||||||
|
|
||||||
|
/* make 32-bit words */
|
||||||
|
for(var i=0; i<16; i++)
|
||||||
|
W[i] = ((buffer[(i<<2)+3]) | (buffer[(i<<2)+2] << 8) | (buffer[(i<<2)+1]
|
||||||
|
<< 16) | (buffer[i<<2] << 24));
|
||||||
|
|
||||||
|
for(var j=0; j<64; j++) {
|
||||||
|
T1 = h + sha256_Sigma1(e) + choice(e, f, g) + K256[j];
|
||||||
|
if(j < 16) T1 += W[j];
|
||||||
|
else T1 += sha256_expand(W, j);
|
||||||
|
T2 = sha256_Sigma0(a) + majority(a, b, c);
|
||||||
|
h = g;
|
||||||
|
g = f;
|
||||||
|
f = e;
|
||||||
|
e = safe_add(d, T1);
|
||||||
|
d = c;
|
||||||
|
c = b;
|
||||||
|
b = a;
|
||||||
|
a = safe_add(T1, T2);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Compute the current intermediate hash value */
|
||||||
|
ihash[0] += a;
|
||||||
|
ihash[1] += b;
|
||||||
|
ihash[2] += c;
|
||||||
|
ihash[3] += d;
|
||||||
|
ihash[4] += e;
|
||||||
|
ihash[5] += f;
|
||||||
|
ihash[6] += g;
|
||||||
|
ihash[7] += h;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Read the next chunk of data and update the SHA256 computation */
|
||||||
|
function sha256_update(data, inputLen) {
|
||||||
|
var i, index, curpos = 0;
|
||||||
|
/* Compute number of bytes mod 64 */
|
||||||
|
index = ((count[0] >> 3) & 0x3f);
|
||||||
|
var remainder = (inputLen & 0x3f);
|
||||||
|
|
||||||
|
/* Update number of bits */
|
||||||
|
if ((count[0] += (inputLen << 3)) < (inputLen << 3)) count[1]++;
|
||||||
|
count[1] += (inputLen >> 29);
|
||||||
|
|
||||||
|
/* Transform as many times as possible */
|
||||||
|
for(i=0; i+63<inputLen; i+=64) {
|
||||||
|
for(var j=index; j<64; j++)
|
||||||
|
buffer[j] = data.charCodeAt(curpos++);
|
||||||
|
sha256_transform();
|
||||||
|
index = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Buffer remaining input */
|
||||||
|
for(var j=0; j<remainder; j++)
|
||||||
|
buffer[j] = data.charCodeAt(curpos++);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Finish the computation by operations such as padding */
|
||||||
|
function sha256_final() {
|
||||||
|
var index = ((count[0] >> 3) & 0x3f);
|
||||||
|
buffer[index++] = 0x80;
|
||||||
|
if(index <= 56) {
|
||||||
|
for(var i=index; i<56; i++)
|
||||||
|
buffer[i] = 0;
|
||||||
|
} else {
|
||||||
|
for(var i=index; i<64; i++)
|
||||||
|
buffer[i] = 0;
|
||||||
|
sha256_transform();
|
||||||
|
for(var i=0; i<56; i++)
|
||||||
|
buffer[i] = 0;
|
||||||
|
}
|
||||||
|
buffer[56] = (count[1] >>> 24) & 0xff;
|
||||||
|
buffer[57] = (count[1] >>> 16) & 0xff;
|
||||||
|
buffer[58] = (count[1] >>> 8) & 0xff;
|
||||||
|
buffer[59] = count[1] & 0xff;
|
||||||
|
buffer[60] = (count[0] >>> 24) & 0xff;
|
||||||
|
buffer[61] = (count[0] >>> 16) & 0xff;
|
||||||
|
buffer[62] = (count[0] >>> 8) & 0xff;
|
||||||
|
buffer[63] = count[0] & 0xff;
|
||||||
|
sha256_transform();
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Split the internal hash values into an array of bytes */
|
||||||
|
function sha256_encode_bytes() {
|
||||||
|
var j=0;
|
||||||
|
var output = new Array(32);
|
||||||
|
for(var i=0; i<8; i++) {
|
||||||
|
output[j++] = ((ihash[i] >>> 24) & 0xff);
|
||||||
|
output[j++] = ((ihash[i] >>> 16) & 0xff);
|
||||||
|
output[j++] = ((ihash[i] >>> 8) & 0xff);
|
||||||
|
output[j++] = (ihash[i] & 0xff);
|
||||||
|
}
|
||||||
|
return output;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Get the internal hash as a hex string */
|
||||||
|
function sha256_encode_hex() {
|
||||||
|
var output = new String();
|
||||||
|
for(var i=0; i<8; i++) {
|
||||||
|
for(var j=28; j>=0; j-=4)
|
||||||
|
output += sha256_hex_digits.charAt((ihash[i] >>> j) & 0x0f);
|
||||||
|
}
|
||||||
|
return output;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Main function: returns a hex string representing the SHA256 value of the
|
||||||
|
given data */
|
||||||
|
exports.sha256 = {
|
||||||
|
digest : function (data) {
|
||||||
|
sha256_init();
|
||||||
|
sha256_update(data, data.length);
|
||||||
|
sha256_final();
|
||||||
|
return sha256_encode_hex();
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
/* test if the JS-interpreter is working properly */
|
||||||
|
function sha256_self_test()
|
||||||
|
{
|
||||||
|
return sha256_digest("message digest") ==
|
||||||
|
"f7846f55cf23e14eebeab5b4e1550cad5b509e3348fbc4efa3a1413d393cb650";
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
203
firefox_addon/lib/main.js
Normal file
203
firefox_addon/lib/main.js
Normal file
@@ -0,0 +1,203 @@
|
|||||||
|
/*
|
||||||
|
Copyright (C) 2013 Grégory Soutadé
|
||||||
|
|
||||||
|
This file is part of gPass.
|
||||||
|
|
||||||
|
gPass is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
gPass is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with gPass. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
var {Cc, Ci} = require("chrome");
|
||||||
|
var notifications = require("sdk/notifications");
|
||||||
|
|
||||||
|
// http://www.timdown.co.uk/jshashtable/
|
||||||
|
var Hashtable = require("jshashtable-3.0").Hashtable;
|
||||||
|
// http://code.google.com/p/crypto-js/
|
||||||
|
var sha256 = require("jssha256").sha256;
|
||||||
|
var aes = require("jsaes").aes;
|
||||||
|
var prefSet = require("simple-prefs");
|
||||||
|
// Global document
|
||||||
|
var doc;
|
||||||
|
var DEBUG = false;
|
||||||
|
|
||||||
|
|
||||||
|
// http://stackoverflow.com/questions/3745666/how-to-convert-from-hex-to-ascii-in-javascript
|
||||||
|
function hex2a(hex) {
|
||||||
|
var str = '';
|
||||||
|
for (var i = 0; i < hex.length; i += 2)
|
||||||
|
str += String.fromCharCode(parseInt(hex.substr(i, 2), 16));
|
||||||
|
return str;
|
||||||
|
}
|
||||||
|
|
||||||
|
function a2hex(str) {
|
||||||
|
var hex = '';
|
||||||
|
for (var i = 0; i < str.length; i++)
|
||||||
|
{
|
||||||
|
c = str.charCodeAt(i).toString(16);
|
||||||
|
if (c.length == 1) c = "0" + c;
|
||||||
|
hex += c;
|
||||||
|
}
|
||||||
|
return hex;
|
||||||
|
}
|
||||||
|
|
||||||
|
function debug(s)
|
||||||
|
{
|
||||||
|
if (DEBUG)
|
||||||
|
console.log(s);
|
||||||
|
}
|
||||||
|
|
||||||
|
function on_sumbit()
|
||||||
|
{
|
||||||
|
var form = this;
|
||||||
|
var fields = form.getElementsByTagName("input");
|
||||||
|
var my_map = new Hashtable();
|
||||||
|
|
||||||
|
domain = form.ownerDocument.domain;
|
||||||
|
|
||||||
|
// Get all <input type="text">
|
||||||
|
for (i=0; i<fields.length; i++)
|
||||||
|
{
|
||||||
|
var field = fields[i];
|
||||||
|
if (field.getAttribute("type") == "text")
|
||||||
|
{
|
||||||
|
if (field.hasAttribute("name"))
|
||||||
|
my_map.put(field.getAttribute("name"), field.value);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Look for <input type="password" value="@@...">
|
||||||
|
for (i=0; i<fields.length; i++)
|
||||||
|
{
|
||||||
|
var field = fields[i];
|
||||||
|
|
||||||
|
if (field.getAttribute("type") == "password")
|
||||||
|
{
|
||||||
|
debug(field.value);
|
||||||
|
password = field.value;
|
||||||
|
if (password.indexOf("@@") != 0)
|
||||||
|
continue;
|
||||||
|
|
||||||
|
mkey = password.substring(2);
|
||||||
|
mkey = sha256.digest(mkey);
|
||||||
|
|
||||||
|
user = null;
|
||||||
|
// Subset of common user field
|
||||||
|
if (my_map.containsKey("user")) user = my_map.get("user");
|
||||||
|
else if (my_map.containsKey("usr")) user = my_map.get("usr");
|
||||||
|
else if (my_map.containsKey("username")) user = my_map.get("username");
|
||||||
|
else if (my_map.containsKey("login")) user = my_map.get("login");
|
||||||
|
|
||||||
|
// If no one found, use all
|
||||||
|
logins = (user != null) ? new Array(user) : my_map.values();
|
||||||
|
|
||||||
|
keys = "";
|
||||||
|
for(a=0; a<logins.length; a++)
|
||||||
|
{
|
||||||
|
v = "@@" + domain + ";" + logins[a];
|
||||||
|
debug("will encrypt " + v);
|
||||||
|
debug("with " + mkey);
|
||||||
|
enc = aes.encryptLongString(v, aes.init(hex2a(mkey)));
|
||||||
|
aes.finish();
|
||||||
|
debug("res " + enc);
|
||||||
|
|
||||||
|
keys += (keys.length != 0) ? "&" : "";
|
||||||
|
keys += "k" + a + "=" + a2hex(enc);
|
||||||
|
}
|
||||||
|
|
||||||
|
debug(keys);
|
||||||
|
|
||||||
|
// Need to do a synchronous request
|
||||||
|
var gPassRequest = Cc["@mozilla.org/xmlextras/xmlhttprequest;1"].
|
||||||
|
createInstance(Ci.nsIXMLHttpRequest);
|
||||||
|
|
||||||
|
var ret = true;
|
||||||
|
// gPassRequest.addEventListener("progress", function(evt) { ; }, false);
|
||||||
|
gPassRequest.addEventListener("load", function(evt) {
|
||||||
|
r = this.responseText.split("\n");
|
||||||
|
if (r[0] != "<end>" && r[0].startsWith("pass="))
|
||||||
|
{
|
||||||
|
ciphered_password = r[0].susbtr(5);
|
||||||
|
debug("Ciphered password : " + ciphered_password);
|
||||||
|
clear_password = aes.decryptLongString(hex2a(ciphered_password), aes.init(hex2a(mkey)));
|
||||||
|
aes.finish();
|
||||||
|
// Remove salt
|
||||||
|
clear_password = clear_password.replace(/\0*$/, "");
|
||||||
|
clear_password = clear_password.substr(0, clear_password.length-3);
|
||||||
|
debug("Clear password " + clear_password);
|
||||||
|
field.value = clear_password;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
debug("No password found");
|
||||||
|
|
||||||
|
ret = false;
|
||||||
|
|
||||||
|
notifications.notify({
|
||||||
|
title: "gPasss",
|
||||||
|
text: "No password found in database",
|
||||||
|
data: "No password found in database",
|
||||||
|
});
|
||||||
|
}
|
||||||
|
}, false);
|
||||||
|
gPassRequest.addEventListener("error", function(evt) {
|
||||||
|
debug("error");
|
||||||
|
ret = false;
|
||||||
|
notifications.notify({
|
||||||
|
title: "gPasss",
|
||||||
|
text: "Error",
|
||||||
|
data: "Error",
|
||||||
|
});
|
||||||
|
|
||||||
|
}, false);
|
||||||
|
gPassRequest.open("POST", prefSet.prefs["account_url"], true);
|
||||||
|
gPassRequest.setRequestHeader('Content-Type', 'application/x-www-form-urlencoded; charset=UTF-8');
|
||||||
|
gPassRequest.send(keys);
|
||||||
|
|
||||||
|
if (!ret) return ret;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function document_loaded(event)
|
||||||
|
{
|
||||||
|
// If there is a password in the form, add a "submit" listener
|
||||||
|
for(i=0; i<doc.document.forms.length; i++)
|
||||||
|
{
|
||||||
|
var form = doc.document.forms[i];
|
||||||
|
var fields = form.getElementsByTagName("input");
|
||||||
|
for (a=0; a<fields.length; a++)
|
||||||
|
{
|
||||||
|
var field = fields[a];
|
||||||
|
if (field.getAttribute("type") == "password")
|
||||||
|
{
|
||||||
|
form.addEventListener("submit", on_sumbit);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var httpRequestObserver =
|
||||||
|
{
|
||||||
|
observe: function(subject, topic, data)
|
||||||
|
{
|
||||||
|
if (topic == "content-document-global-created")
|
||||||
|
{
|
||||||
|
doc = subject;
|
||||||
|
doc.addEventListener("DOMContentLoaded", document_loaded, false);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
var observerService = Cc["@mozilla.org/observer-service;1"].getService(Ci.nsIObserverService);
|
||||||
|
observerService.addObserver(httpRequestObserver, "content-document-global-created", false);
|
||||||
16
firefox_addon/package.json
Normal file
16
firefox_addon/package.json
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
"name": "gpass",
|
||||||
|
"fullName": "gPass",
|
||||||
|
"id": "jid1-eNs887pPJU8aNg",
|
||||||
|
"description": "gPass : global password manager",
|
||||||
|
"author": "Grégory Soutadé",
|
||||||
|
"license": "GNU GPL v3",
|
||||||
|
"version": "0.1",
|
||||||
|
"preferences": [{
|
||||||
|
"name": "account_url",
|
||||||
|
"title": "Account URL",
|
||||||
|
"description": "URL of your gPass account",
|
||||||
|
"type": "string",
|
||||||
|
"value": "http://gpass-demo.soutade.fr/demo"
|
||||||
|
}]
|
||||||
|
}
|
||||||
12
firefox_addon/test/test-main.js
Normal file
12
firefox_addon/test/test-main.js
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
var main = require("./main");
|
||||||
|
|
||||||
|
exports["test main"] = function(assert) {
|
||||||
|
assert.pass("Unit test running!");
|
||||||
|
};
|
||||||
|
|
||||||
|
exports["test main async"] = function(assert, done) {
|
||||||
|
assert.pass("async Unit test running!");
|
||||||
|
done();
|
||||||
|
};
|
||||||
|
|
||||||
|
require("sdk/test").run(exports);
|
||||||
674
gpl-3.0.txt
Normal file
674
gpl-3.0.txt
Normal file
@@ -0,0 +1,674 @@
|
|||||||
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
Version 3, 29 June 2007
|
||||||
|
|
||||||
|
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies
|
||||||
|
of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
|
Preamble
|
||||||
|
|
||||||
|
The GNU General Public License is a free, copyleft license for
|
||||||
|
software and other kinds of works.
|
||||||
|
|
||||||
|
The licenses for most software and other practical works are designed
|
||||||
|
to take away your freedom to share and change the works. By contrast,
|
||||||
|
the GNU General Public License is intended to guarantee your freedom to
|
||||||
|
share and change all versions of a program--to make sure it remains free
|
||||||
|
software for all its users. We, the Free Software Foundation, use the
|
||||||
|
GNU General Public License for most of our software; it applies also to
|
||||||
|
any other work released this way by its authors. You can apply it to
|
||||||
|
your programs, too.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom, not
|
||||||
|
price. Our General Public Licenses are designed to make sure that you
|
||||||
|
have the freedom to distribute copies of free software (and charge for
|
||||||
|
them if you wish), that you receive source code or can get it if you
|
||||||
|
want it, that you can change the software or use pieces of it in new
|
||||||
|
free programs, and that you know you can do these things.
|
||||||
|
|
||||||
|
To protect your rights, we need to prevent others from denying you
|
||||||
|
these rights or asking you to surrender the rights. Therefore, you have
|
||||||
|
certain responsibilities if you distribute copies of the software, or if
|
||||||
|
you modify it: responsibilities to respect the freedom of others.
|
||||||
|
|
||||||
|
For example, if you distribute copies of such a program, whether
|
||||||
|
gratis or for a fee, you must pass on to the recipients the same
|
||||||
|
freedoms that you received. You must make sure that they, too, receive
|
||||||
|
or can get the source code. And you must show them these terms so they
|
||||||
|
know their rights.
|
||||||
|
|
||||||
|
Developers that use the GNU GPL protect your rights with two steps:
|
||||||
|
(1) assert copyright on the software, and (2) offer you this License
|
||||||
|
giving you legal permission to copy, distribute and/or modify it.
|
||||||
|
|
||||||
|
For the developers' and authors' protection, the GPL clearly explains
|
||||||
|
that there is no warranty for this free software. For both users' and
|
||||||
|
authors' sake, the GPL requires that modified versions be marked as
|
||||||
|
changed, so that their problems will not be attributed erroneously to
|
||||||
|
authors of previous versions.
|
||||||
|
|
||||||
|
Some devices are designed to deny users access to install or run
|
||||||
|
modified versions of the software inside them, although the manufacturer
|
||||||
|
can do so. This is fundamentally incompatible with the aim of
|
||||||
|
protecting users' freedom to change the software. The systematic
|
||||||
|
pattern of such abuse occurs in the area of products for individuals to
|
||||||
|
use, which is precisely where it is most unacceptable. Therefore, we
|
||||||
|
have designed this version of the GPL to prohibit the practice for those
|
||||||
|
products. If such problems arise substantially in other domains, we
|
||||||
|
stand ready to extend this provision to those domains in future versions
|
||||||
|
of the GPL, as needed to protect the freedom of users.
|
||||||
|
|
||||||
|
Finally, every program is threatened constantly by software patents.
|
||||||
|
States should not allow patents to restrict development and use of
|
||||||
|
software on general-purpose computers, but in those that do, we wish to
|
||||||
|
avoid the special danger that patents applied to a free program could
|
||||||
|
make it effectively proprietary. To prevent this, the GPL assures that
|
||||||
|
patents cannot be used to render the program non-free.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and
|
||||||
|
modification follow.
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
0. Definitions.
|
||||||
|
|
||||||
|
"This License" refers to version 3 of the GNU General Public License.
|
||||||
|
|
||||||
|
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||||
|
works, such as semiconductor masks.
|
||||||
|
|
||||||
|
"The Program" refers to any copyrightable work licensed under this
|
||||||
|
License. Each licensee is addressed as "you". "Licensees" and
|
||||||
|
"recipients" may be individuals or organizations.
|
||||||
|
|
||||||
|
To "modify" a work means to copy from or adapt all or part of the work
|
||||||
|
in a fashion requiring copyright permission, other than the making of an
|
||||||
|
exact copy. The resulting work is called a "modified version" of the
|
||||||
|
earlier work or a work "based on" the earlier work.
|
||||||
|
|
||||||
|
A "covered work" means either the unmodified Program or a work based
|
||||||
|
on the Program.
|
||||||
|
|
||||||
|
To "propagate" a work means to do anything with it that, without
|
||||||
|
permission, would make you directly or secondarily liable for
|
||||||
|
infringement under applicable copyright law, except executing it on a
|
||||||
|
computer or modifying a private copy. Propagation includes copying,
|
||||||
|
distribution (with or without modification), making available to the
|
||||||
|
public, and in some countries other activities as well.
|
||||||
|
|
||||||
|
To "convey" a work means any kind of propagation that enables other
|
||||||
|
parties to make or receive copies. Mere interaction with a user through
|
||||||
|
a computer network, with no transfer of a copy, is not conveying.
|
||||||
|
|
||||||
|
An interactive user interface displays "Appropriate Legal Notices"
|
||||||
|
to the extent that it includes a convenient and prominently visible
|
||||||
|
feature that (1) displays an appropriate copyright notice, and (2)
|
||||||
|
tells the user that there is no warranty for the work (except to the
|
||||||
|
extent that warranties are provided), that licensees may convey the
|
||||||
|
work under this License, and how to view a copy of this License. If
|
||||||
|
the interface presents a list of user commands or options, such as a
|
||||||
|
menu, a prominent item in the list meets this criterion.
|
||||||
|
|
||||||
|
1. Source Code.
|
||||||
|
|
||||||
|
The "source code" for a work means the preferred form of the work
|
||||||
|
for making modifications to it. "Object code" means any non-source
|
||||||
|
form of a work.
|
||||||
|
|
||||||
|
A "Standard Interface" means an interface that either is an official
|
||||||
|
standard defined by a recognized standards body, or, in the case of
|
||||||
|
interfaces specified for a particular programming language, one that
|
||||||
|
is widely used among developers working in that language.
|
||||||
|
|
||||||
|
The "System Libraries" of an executable work include anything, other
|
||||||
|
than the work as a whole, that (a) is included in the normal form of
|
||||||
|
packaging a Major Component, but which is not part of that Major
|
||||||
|
Component, and (b) serves only to enable use of the work with that
|
||||||
|
Major Component, or to implement a Standard Interface for which an
|
||||||
|
implementation is available to the public in source code form. A
|
||||||
|
"Major Component", in this context, means a major essential component
|
||||||
|
(kernel, window system, and so on) of the specific operating system
|
||||||
|
(if any) on which the executable work runs, or a compiler used to
|
||||||
|
produce the work, or an object code interpreter used to run it.
|
||||||
|
|
||||||
|
The "Corresponding Source" for a work in object code form means all
|
||||||
|
the source code needed to generate, install, and (for an executable
|
||||||
|
work) run the object code and to modify the work, including scripts to
|
||||||
|
control those activities. However, it does not include the work's
|
||||||
|
System Libraries, or general-purpose tools or generally available free
|
||||||
|
programs which are used unmodified in performing those activities but
|
||||||
|
which are not part of the work. For example, Corresponding Source
|
||||||
|
includes interface definition files associated with source files for
|
||||||
|
the work, and the source code for shared libraries and dynamically
|
||||||
|
linked subprograms that the work is specifically designed to require,
|
||||||
|
such as by intimate data communication or control flow between those
|
||||||
|
subprograms and other parts of the work.
|
||||||
|
|
||||||
|
The Corresponding Source need not include anything that users
|
||||||
|
can regenerate automatically from other parts of the Corresponding
|
||||||
|
Source.
|
||||||
|
|
||||||
|
The Corresponding Source for a work in source code form is that
|
||||||
|
same work.
|
||||||
|
|
||||||
|
2. Basic Permissions.
|
||||||
|
|
||||||
|
All rights granted under this License are granted for the term of
|
||||||
|
copyright on the Program, and are irrevocable provided the stated
|
||||||
|
conditions are met. This License explicitly affirms your unlimited
|
||||||
|
permission to run the unmodified Program. The output from running a
|
||||||
|
covered work is covered by this License only if the output, given its
|
||||||
|
content, constitutes a covered work. This License acknowledges your
|
||||||
|
rights of fair use or other equivalent, as provided by copyright law.
|
||||||
|
|
||||||
|
You may make, run and propagate covered works that you do not
|
||||||
|
convey, without conditions so long as your license otherwise remains
|
||||||
|
in force. You may convey covered works to others for the sole purpose
|
||||||
|
of having them make modifications exclusively for you, or provide you
|
||||||
|
with facilities for running those works, provided that you comply with
|
||||||
|
the terms of this License in conveying all material for which you do
|
||||||
|
not control copyright. Those thus making or running the covered works
|
||||||
|
for you must do so exclusively on your behalf, under your direction
|
||||||
|
and control, on terms that prohibit them from making any copies of
|
||||||
|
your copyrighted material outside their relationship with you.
|
||||||
|
|
||||||
|
Conveying under any other circumstances is permitted solely under
|
||||||
|
the conditions stated below. Sublicensing is not allowed; section 10
|
||||||
|
makes it unnecessary.
|
||||||
|
|
||||||
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||||
|
|
||||||
|
No covered work shall be deemed part of an effective technological
|
||||||
|
measure under any applicable law fulfilling obligations under article
|
||||||
|
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||||
|
similar laws prohibiting or restricting circumvention of such
|
||||||
|
measures.
|
||||||
|
|
||||||
|
When you convey a covered work, you waive any legal power to forbid
|
||||||
|
circumvention of technological measures to the extent such circumvention
|
||||||
|
is effected by exercising rights under this License with respect to
|
||||||
|
the covered work, and you disclaim any intention to limit operation or
|
||||||
|
modification of the work as a means of enforcing, against the work's
|
||||||
|
users, your or third parties' legal rights to forbid circumvention of
|
||||||
|
technological measures.
|
||||||
|
|
||||||
|
4. Conveying Verbatim Copies.
|
||||||
|
|
||||||
|
You may convey verbatim copies of the Program's source code as you
|
||||||
|
receive it, in any medium, provided that you conspicuously and
|
||||||
|
appropriately publish on each copy an appropriate copyright notice;
|
||||||
|
keep intact all notices stating that this License and any
|
||||||
|
non-permissive terms added in accord with section 7 apply to the code;
|
||||||
|
keep intact all notices of the absence of any warranty; and give all
|
||||||
|
recipients a copy of this License along with the Program.
|
||||||
|
|
||||||
|
You may charge any price or no price for each copy that you convey,
|
||||||
|
and you may offer support or warranty protection for a fee.
|
||||||
|
|
||||||
|
5. Conveying Modified Source Versions.
|
||||||
|
|
||||||
|
You may convey a work based on the Program, or the modifications to
|
||||||
|
produce it from the Program, in the form of source code under the
|
||||||
|
terms of section 4, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) The work must carry prominent notices stating that you modified
|
||||||
|
it, and giving a relevant date.
|
||||||
|
|
||||||
|
b) The work must carry prominent notices stating that it is
|
||||||
|
released under this License and any conditions added under section
|
||||||
|
7. This requirement modifies the requirement in section 4 to
|
||||||
|
"keep intact all notices".
|
||||||
|
|
||||||
|
c) You must license the entire work, as a whole, under this
|
||||||
|
License to anyone who comes into possession of a copy. This
|
||||||
|
License will therefore apply, along with any applicable section 7
|
||||||
|
additional terms, to the whole of the work, and all its parts,
|
||||||
|
regardless of how they are packaged. This License gives no
|
||||||
|
permission to license the work in any other way, but it does not
|
||||||
|
invalidate such permission if you have separately received it.
|
||||||
|
|
||||||
|
d) If the work has interactive user interfaces, each must display
|
||||||
|
Appropriate Legal Notices; however, if the Program has interactive
|
||||||
|
interfaces that do not display Appropriate Legal Notices, your
|
||||||
|
work need not make them do so.
|
||||||
|
|
||||||
|
A compilation of a covered work with other separate and independent
|
||||||
|
works, which are not by their nature extensions of the covered work,
|
||||||
|
and which are not combined with it such as to form a larger program,
|
||||||
|
in or on a volume of a storage or distribution medium, is called an
|
||||||
|
"aggregate" if the compilation and its resulting copyright are not
|
||||||
|
used to limit the access or legal rights of the compilation's users
|
||||||
|
beyond what the individual works permit. Inclusion of a covered work
|
||||||
|
in an aggregate does not cause this License to apply to the other
|
||||||
|
parts of the aggregate.
|
||||||
|
|
||||||
|
6. Conveying Non-Source Forms.
|
||||||
|
|
||||||
|
You may convey a covered work in object code form under the terms
|
||||||
|
of sections 4 and 5, provided that you also convey the
|
||||||
|
machine-readable Corresponding Source under the terms of this License,
|
||||||
|
in one of these ways:
|
||||||
|
|
||||||
|
a) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by the
|
||||||
|
Corresponding Source fixed on a durable physical medium
|
||||||
|
customarily used for software interchange.
|
||||||
|
|
||||||
|
b) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by a
|
||||||
|
written offer, valid for at least three years and valid for as
|
||||||
|
long as you offer spare parts or customer support for that product
|
||||||
|
model, to give anyone who possesses the object code either (1) a
|
||||||
|
copy of the Corresponding Source for all the software in the
|
||||||
|
product that is covered by this License, on a durable physical
|
||||||
|
medium customarily used for software interchange, for a price no
|
||||||
|
more than your reasonable cost of physically performing this
|
||||||
|
conveying of source, or (2) access to copy the
|
||||||
|
Corresponding Source from a network server at no charge.
|
||||||
|
|
||||||
|
c) Convey individual copies of the object code with a copy of the
|
||||||
|
written offer to provide the Corresponding Source. This
|
||||||
|
alternative is allowed only occasionally and noncommercially, and
|
||||||
|
only if you received the object code with such an offer, in accord
|
||||||
|
with subsection 6b.
|
||||||
|
|
||||||
|
d) Convey the object code by offering access from a designated
|
||||||
|
place (gratis or for a charge), and offer equivalent access to the
|
||||||
|
Corresponding Source in the same way through the same place at no
|
||||||
|
further charge. You need not require recipients to copy the
|
||||||
|
Corresponding Source along with the object code. If the place to
|
||||||
|
copy the object code is a network server, the Corresponding Source
|
||||||
|
may be on a different server (operated by you or a third party)
|
||||||
|
that supports equivalent copying facilities, provided you maintain
|
||||||
|
clear directions next to the object code saying where to find the
|
||||||
|
Corresponding Source. Regardless of what server hosts the
|
||||||
|
Corresponding Source, you remain obligated to ensure that it is
|
||||||
|
available for as long as needed to satisfy these requirements.
|
||||||
|
|
||||||
|
e) Convey the object code using peer-to-peer transmission, provided
|
||||||
|
you inform other peers where the object code and Corresponding
|
||||||
|
Source of the work are being offered to the general public at no
|
||||||
|
charge under subsection 6d.
|
||||||
|
|
||||||
|
A separable portion of the object code, whose source code is excluded
|
||||||
|
from the Corresponding Source as a System Library, need not be
|
||||||
|
included in conveying the object code work.
|
||||||
|
|
||||||
|
A "User Product" is either (1) a "consumer product", which means any
|
||||||
|
tangible personal property which is normally used for personal, family,
|
||||||
|
or household purposes, or (2) anything designed or sold for incorporation
|
||||||
|
into a dwelling. In determining whether a product is a consumer product,
|
||||||
|
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||||
|
product received by a particular user, "normally used" refers to a
|
||||||
|
typical or common use of that class of product, regardless of the status
|
||||||
|
of the particular user or of the way in which the particular user
|
||||||
|
actually uses, or expects or is expected to use, the product. A product
|
||||||
|
is a consumer product regardless of whether the product has substantial
|
||||||
|
commercial, industrial or non-consumer uses, unless such uses represent
|
||||||
|
the only significant mode of use of the product.
|
||||||
|
|
||||||
|
"Installation Information" for a User Product means any methods,
|
||||||
|
procedures, authorization keys, or other information required to install
|
||||||
|
and execute modified versions of a covered work in that User Product from
|
||||||
|
a modified version of its Corresponding Source. The information must
|
||||||
|
suffice to ensure that the continued functioning of the modified object
|
||||||
|
code is in no case prevented or interfered with solely because
|
||||||
|
modification has been made.
|
||||||
|
|
||||||
|
If you convey an object code work under this section in, or with, or
|
||||||
|
specifically for use in, a User Product, and the conveying occurs as
|
||||||
|
part of a transaction in which the right of possession and use of the
|
||||||
|
User Product is transferred to the recipient in perpetuity or for a
|
||||||
|
fixed term (regardless of how the transaction is characterized), the
|
||||||
|
Corresponding Source conveyed under this section must be accompanied
|
||||||
|
by the Installation Information. But this requirement does not apply
|
||||||
|
if neither you nor any third party retains the ability to install
|
||||||
|
modified object code on the User Product (for example, the work has
|
||||||
|
been installed in ROM).
|
||||||
|
|
||||||
|
The requirement to provide Installation Information does not include a
|
||||||
|
requirement to continue to provide support service, warranty, or updates
|
||||||
|
for a work that has been modified or installed by the recipient, or for
|
||||||
|
the User Product in which it has been modified or installed. Access to a
|
||||||
|
network may be denied when the modification itself materially and
|
||||||
|
adversely affects the operation of the network or violates the rules and
|
||||||
|
protocols for communication across the network.
|
||||||
|
|
||||||
|
Corresponding Source conveyed, and Installation Information provided,
|
||||||
|
in accord with this section must be in a format that is publicly
|
||||||
|
documented (and with an implementation available to the public in
|
||||||
|
source code form), and must require no special password or key for
|
||||||
|
unpacking, reading or copying.
|
||||||
|
|
||||||
|
7. Additional Terms.
|
||||||
|
|
||||||
|
"Additional permissions" are terms that supplement the terms of this
|
||||||
|
License by making exceptions from one or more of its conditions.
|
||||||
|
Additional permissions that are applicable to the entire Program shall
|
||||||
|
be treated as though they were included in this License, to the extent
|
||||||
|
that they are valid under applicable law. If additional permissions
|
||||||
|
apply only to part of the Program, that part may be used separately
|
||||||
|
under those permissions, but the entire Program remains governed by
|
||||||
|
this License without regard to the additional permissions.
|
||||||
|
|
||||||
|
When you convey a copy of a covered work, you may at your option
|
||||||
|
remove any additional permissions from that copy, or from any part of
|
||||||
|
it. (Additional permissions may be written to require their own
|
||||||
|
removal in certain cases when you modify the work.) You may place
|
||||||
|
additional permissions on material, added by you to a covered work,
|
||||||
|
for which you have or can give appropriate copyright permission.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, for material you
|
||||||
|
add to a covered work, you may (if authorized by the copyright holders of
|
||||||
|
that material) supplement the terms of this License with terms:
|
||||||
|
|
||||||
|
a) Disclaiming warranty or limiting liability differently from the
|
||||||
|
terms of sections 15 and 16 of this License; or
|
||||||
|
|
||||||
|
b) Requiring preservation of specified reasonable legal notices or
|
||||||
|
author attributions in that material or in the Appropriate Legal
|
||||||
|
Notices displayed by works containing it; or
|
||||||
|
|
||||||
|
c) Prohibiting misrepresentation of the origin of that material, or
|
||||||
|
requiring that modified versions of such material be marked in
|
||||||
|
reasonable ways as different from the original version; or
|
||||||
|
|
||||||
|
d) Limiting the use for publicity purposes of names of licensors or
|
||||||
|
authors of the material; or
|
||||||
|
|
||||||
|
e) Declining to grant rights under trademark law for use of some
|
||||||
|
trade names, trademarks, or service marks; or
|
||||||
|
|
||||||
|
f) Requiring indemnification of licensors and authors of that
|
||||||
|
material by anyone who conveys the material (or modified versions of
|
||||||
|
it) with contractual assumptions of liability to the recipient, for
|
||||||
|
any liability that these contractual assumptions directly impose on
|
||||||
|
those licensors and authors.
|
||||||
|
|
||||||
|
All other non-permissive additional terms are considered "further
|
||||||
|
restrictions" within the meaning of section 10. If the Program as you
|
||||||
|
received it, or any part of it, contains a notice stating that it is
|
||||||
|
governed by this License along with a term that is a further
|
||||||
|
restriction, you may remove that term. If a license document contains
|
||||||
|
a further restriction but permits relicensing or conveying under this
|
||||||
|
License, you may add to a covered work material governed by the terms
|
||||||
|
of that license document, provided that the further restriction does
|
||||||
|
not survive such relicensing or conveying.
|
||||||
|
|
||||||
|
If you add terms to a covered work in accord with this section, you
|
||||||
|
must place, in the relevant source files, a statement of the
|
||||||
|
additional terms that apply to those files, or a notice indicating
|
||||||
|
where to find the applicable terms.
|
||||||
|
|
||||||
|
Additional terms, permissive or non-permissive, may be stated in the
|
||||||
|
form of a separately written license, or stated as exceptions;
|
||||||
|
the above requirements apply either way.
|
||||||
|
|
||||||
|
8. Termination.
|
||||||
|
|
||||||
|
You may not propagate or modify a covered work except as expressly
|
||||||
|
provided under this License. Any attempt otherwise to propagate or
|
||||||
|
modify it is void, and will automatically terminate your rights under
|
||||||
|
this License (including any patent licenses granted under the third
|
||||||
|
paragraph of section 11).
|
||||||
|
|
||||||
|
However, if you cease all violation of this License, then your
|
||||||
|
license from a particular copyright holder is reinstated (a)
|
||||||
|
provisionally, unless and until the copyright holder explicitly and
|
||||||
|
finally terminates your license, and (b) permanently, if the copyright
|
||||||
|
holder fails to notify you of the violation by some reasonable means
|
||||||
|
prior to 60 days after the cessation.
|
||||||
|
|
||||||
|
Moreover, your license from a particular copyright holder is
|
||||||
|
reinstated permanently if the copyright holder notifies you of the
|
||||||
|
violation by some reasonable means, this is the first time you have
|
||||||
|
received notice of violation of this License (for any work) from that
|
||||||
|
copyright holder, and you cure the violation prior to 30 days after
|
||||||
|
your receipt of the notice.
|
||||||
|
|
||||||
|
Termination of your rights under this section does not terminate the
|
||||||
|
licenses of parties who have received copies or rights from you under
|
||||||
|
this License. If your rights have been terminated and not permanently
|
||||||
|
reinstated, you do not qualify to receive new licenses for the same
|
||||||
|
material under section 10.
|
||||||
|
|
||||||
|
9. Acceptance Not Required for Having Copies.
|
||||||
|
|
||||||
|
You are not required to accept this License in order to receive or
|
||||||
|
run a copy of the Program. Ancillary propagation of a covered work
|
||||||
|
occurring solely as a consequence of using peer-to-peer transmission
|
||||||
|
to receive a copy likewise does not require acceptance. However,
|
||||||
|
nothing other than this License grants you permission to propagate or
|
||||||
|
modify any covered work. These actions infringe copyright if you do
|
||||||
|
not accept this License. Therefore, by modifying or propagating a
|
||||||
|
covered work, you indicate your acceptance of this License to do so.
|
||||||
|
|
||||||
|
10. Automatic Licensing of Downstream Recipients.
|
||||||
|
|
||||||
|
Each time you convey a covered work, the recipient automatically
|
||||||
|
receives a license from the original licensors, to run, modify and
|
||||||
|
propagate that work, subject to this License. You are not responsible
|
||||||
|
for enforcing compliance by third parties with this License.
|
||||||
|
|
||||||
|
An "entity transaction" is a transaction transferring control of an
|
||||||
|
organization, or substantially all assets of one, or subdividing an
|
||||||
|
organization, or merging organizations. If propagation of a covered
|
||||||
|
work results from an entity transaction, each party to that
|
||||||
|
transaction who receives a copy of the work also receives whatever
|
||||||
|
licenses to the work the party's predecessor in interest had or could
|
||||||
|
give under the previous paragraph, plus a right to possession of the
|
||||||
|
Corresponding Source of the work from the predecessor in interest, if
|
||||||
|
the predecessor has it or can get it with reasonable efforts.
|
||||||
|
|
||||||
|
You may not impose any further restrictions on the exercise of the
|
||||||
|
rights granted or affirmed under this License. For example, you may
|
||||||
|
not impose a license fee, royalty, or other charge for exercise of
|
||||||
|
rights granted under this License, and you may not initiate litigation
|
||||||
|
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||||
|
any patent claim is infringed by making, using, selling, offering for
|
||||||
|
sale, or importing the Program or any portion of it.
|
||||||
|
|
||||||
|
11. Patents.
|
||||||
|
|
||||||
|
A "contributor" is a copyright holder who authorizes use under this
|
||||||
|
License of the Program or a work on which the Program is based. The
|
||||||
|
work thus licensed is called the contributor's "contributor version".
|
||||||
|
|
||||||
|
A contributor's "essential patent claims" are all patent claims
|
||||||
|
owned or controlled by the contributor, whether already acquired or
|
||||||
|
hereafter acquired, that would be infringed by some manner, permitted
|
||||||
|
by this License, of making, using, or selling its contributor version,
|
||||||
|
but do not include claims that would be infringed only as a
|
||||||
|
consequence of further modification of the contributor version. For
|
||||||
|
purposes of this definition, "control" includes the right to grant
|
||||||
|
patent sublicenses in a manner consistent with the requirements of
|
||||||
|
this License.
|
||||||
|
|
||||||
|
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||||
|
patent license under the contributor's essential patent claims, to
|
||||||
|
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||||
|
propagate the contents of its contributor version.
|
||||||
|
|
||||||
|
In the following three paragraphs, a "patent license" is any express
|
||||||
|
agreement or commitment, however denominated, not to enforce a patent
|
||||||
|
(such as an express permission to practice a patent or covenant not to
|
||||||
|
sue for patent infringement). To "grant" such a patent license to a
|
||||||
|
party means to make such an agreement or commitment not to enforce a
|
||||||
|
patent against the party.
|
||||||
|
|
||||||
|
If you convey a covered work, knowingly relying on a patent license,
|
||||||
|
and the Corresponding Source of the work is not available for anyone
|
||||||
|
to copy, free of charge and under the terms of this License, through a
|
||||||
|
publicly available network server or other readily accessible means,
|
||||||
|
then you must either (1) cause the Corresponding Source to be so
|
||||||
|
available, or (2) arrange to deprive yourself of the benefit of the
|
||||||
|
patent license for this particular work, or (3) arrange, in a manner
|
||||||
|
consistent with the requirements of this License, to extend the patent
|
||||||
|
license to downstream recipients. "Knowingly relying" means you have
|
||||||
|
actual knowledge that, but for the patent license, your conveying the
|
||||||
|
covered work in a country, or your recipient's use of the covered work
|
||||||
|
in a country, would infringe one or more identifiable patents in that
|
||||||
|
country that you have reason to believe are valid.
|
||||||
|
|
||||||
|
If, pursuant to or in connection with a single transaction or
|
||||||
|
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||||
|
covered work, and grant a patent license to some of the parties
|
||||||
|
receiving the covered work authorizing them to use, propagate, modify
|
||||||
|
or convey a specific copy of the covered work, then the patent license
|
||||||
|
you grant is automatically extended to all recipients of the covered
|
||||||
|
work and works based on it.
|
||||||
|
|
||||||
|
A patent license is "discriminatory" if it does not include within
|
||||||
|
the scope of its coverage, prohibits the exercise of, or is
|
||||||
|
conditioned on the non-exercise of one or more of the rights that are
|
||||||
|
specifically granted under this License. You may not convey a covered
|
||||||
|
work if you are a party to an arrangement with a third party that is
|
||||||
|
in the business of distributing software, under which you make payment
|
||||||
|
to the third party based on the extent of your activity of conveying
|
||||||
|
the work, and under which the third party grants, to any of the
|
||||||
|
parties who would receive the covered work from you, a discriminatory
|
||||||
|
patent license (a) in connection with copies of the covered work
|
||||||
|
conveyed by you (or copies made from those copies), or (b) primarily
|
||||||
|
for and in connection with specific products or compilations that
|
||||||
|
contain the covered work, unless you entered into that arrangement,
|
||||||
|
or that patent license was granted, prior to 28 March 2007.
|
||||||
|
|
||||||
|
Nothing in this License shall be construed as excluding or limiting
|
||||||
|
any implied license or other defenses to infringement that may
|
||||||
|
otherwise be available to you under applicable patent law.
|
||||||
|
|
||||||
|
12. No Surrender of Others' Freedom.
|
||||||
|
|
||||||
|
If conditions are imposed on you (whether by court order, agreement or
|
||||||
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
|
excuse you from the conditions of this License. If you cannot convey a
|
||||||
|
covered work so as to satisfy simultaneously your obligations under this
|
||||||
|
License and any other pertinent obligations, then as a consequence you may
|
||||||
|
not convey it at all. For example, if you agree to terms that obligate you
|
||||||
|
to collect a royalty for further conveying from those to whom you convey
|
||||||
|
the Program, the only way you could satisfy both those terms and this
|
||||||
|
License would be to refrain entirely from conveying the Program.
|
||||||
|
|
||||||
|
13. Use with the GNU Affero General Public License.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, you have
|
||||||
|
permission to link or combine any covered work with a work licensed
|
||||||
|
under version 3 of the GNU Affero General Public License into a single
|
||||||
|
combined work, and to convey the resulting work. The terms of this
|
||||||
|
License will continue to apply to the part which is the covered work,
|
||||||
|
but the special requirements of the GNU Affero General Public License,
|
||||||
|
section 13, concerning interaction through a network will apply to the
|
||||||
|
combination as such.
|
||||||
|
|
||||||
|
14. Revised Versions of this License.
|
||||||
|
|
||||||
|
The Free Software Foundation may publish revised and/or new versions of
|
||||||
|
the GNU General Public License from time to time. Such new versions will
|
||||||
|
be similar in spirit to the present version, but may differ in detail to
|
||||||
|
address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the
|
||||||
|
Program specifies that a certain numbered version of the GNU General
|
||||||
|
Public License "or any later version" applies to it, you have the
|
||||||
|
option of following the terms and conditions either of that numbered
|
||||||
|
version or of any later version published by the Free Software
|
||||||
|
Foundation. If the Program does not specify a version number of the
|
||||||
|
GNU General Public License, you may choose any version ever published
|
||||||
|
by the Free Software Foundation.
|
||||||
|
|
||||||
|
If the Program specifies that a proxy can decide which future
|
||||||
|
versions of the GNU General Public License can be used, that proxy's
|
||||||
|
public statement of acceptance of a version permanently authorizes you
|
||||||
|
to choose that version for the Program.
|
||||||
|
|
||||||
|
Later license versions may give you additional or different
|
||||||
|
permissions. However, no additional obligations are imposed on any
|
||||||
|
author or copyright holder as a result of your choosing to follow a
|
||||||
|
later version.
|
||||||
|
|
||||||
|
15. Disclaimer of Warranty.
|
||||||
|
|
||||||
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||||
|
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||||
|
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||||
|
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||||
|
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||||
|
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||||
|
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
16. Limitation of Liability.
|
||||||
|
|
||||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||||
|
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||||
|
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||||
|
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||||
|
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||||
|
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||||
|
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||||
|
SUCH DAMAGES.
|
||||||
|
|
||||||
|
17. Interpretation of Sections 15 and 16.
|
||||||
|
|
||||||
|
If the disclaimer of warranty and limitation of liability provided
|
||||||
|
above cannot be given local legal effect according to their terms,
|
||||||
|
reviewing courts shall apply local law that most closely approximates
|
||||||
|
an absolute waiver of all civil liability in connection with the
|
||||||
|
Program, unless a warranty or assumption of liability accompanies a
|
||||||
|
copy of the Program in return for a fee.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
How to Apply These Terms to Your New Programs
|
||||||
|
|
||||||
|
If you develop a new program, and you want it to be of the greatest
|
||||||
|
possible use to the public, the best way to achieve this is to make it
|
||||||
|
free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
|
To do so, attach the following notices to the program. It is safest
|
||||||
|
to attach them to the start of each source file to most effectively
|
||||||
|
state the exclusion of warranty; and each file should have at least
|
||||||
|
the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
<one line to give the program's name and a brief idea of what it does.>
|
||||||
|
Copyright (C) <year> <name of author>
|
||||||
|
|
||||||
|
This program is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
If the program does terminal interaction, make it output a short
|
||||||
|
notice like this when it starts in an interactive mode:
|
||||||
|
|
||||||
|
<program> Copyright (C) <year> <name of author>
|
||||||
|
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||||
|
This is free software, and you are welcome to redistribute it
|
||||||
|
under certain conditions; type `show c' for details.
|
||||||
|
|
||||||
|
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||||
|
parts of the General Public License. Of course, your program's commands
|
||||||
|
might be different; for a GUI interface, you would use an "about box".
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or school,
|
||||||
|
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||||
|
For more information on this, and how to apply and follow the GNU GPL, see
|
||||||
|
<http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
The GNU General Public License does not permit incorporating your program
|
||||||
|
into proprietary programs. If your program is a subroutine library, you
|
||||||
|
may consider it more useful to permit linking proprietary applications with
|
||||||
|
the library. If this is what you want to do, use the GNU Lesser General
|
||||||
|
Public License instead of this License. But first, please read
|
||||||
|
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
||||||
24
ressources/apache2_gpass.conf
Normal file
24
ressources/apache2_gpass.conf
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
<VirtualHost *:80>
|
||||||
|
ServerName gpass-demo.soutade.fr
|
||||||
|
|
||||||
|
DocumentRoot /var/www/gpass
|
||||||
|
DirectoryIndex index.php
|
||||||
|
|
||||||
|
<Location />
|
||||||
|
AuthType Basic
|
||||||
|
AuthName "Private"
|
||||||
|
AuthUserFile /private/_pwd/user
|
||||||
|
Require valid-user
|
||||||
|
</Location>
|
||||||
|
|
||||||
|
<Location "/users/">
|
||||||
|
Allow from all
|
||||||
|
Satisfy Any
|
||||||
|
</Location>
|
||||||
|
|
||||||
|
RewriteEngine On
|
||||||
|
RewriteCond %{DOCUMENT_ROOT}%{REQUEST_FILENAME} !-f
|
||||||
|
RewriteCond %{DOCUMENT_ROOT}%{REQUEST_FILENAME} !-d
|
||||||
|
RewriteCond %{REQUEST_FILENAME} !index.php
|
||||||
|
RewriteRule ^/(.*)$ /users/$1/index.php [PT]
|
||||||
|
</VirtualHost>
|
||||||
BIN
ressources/gpass.png
Normal file
BIN
ressources/gpass.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 17 KiB |
BIN
ressources/gpass.xcf
Normal file
BIN
ressources/gpass.xcf
Normal file
Binary file not shown.
260
server/functions.php
Executable file
260
server/functions.php
Executable file
@@ -0,0 +1,260 @@
|
|||||||
|
<?php
|
||||||
|
/*
|
||||||
|
Copyright (C) 2013 Grégory Soutadé
|
||||||
|
|
||||||
|
This file is part of gPass.
|
||||||
|
|
||||||
|
gPass is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
gPass is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with gPass. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
login is stored as :
|
||||||
|
@@url;login
|
||||||
|
|
||||||
|
Password is salted (3 random characters) and encrypted
|
||||||
|
|
||||||
|
All is encrypted with AES256 and key : sha256(master key)
|
||||||
|
*/
|
||||||
|
$MAX_ENTRY_LEN = 512;
|
||||||
|
$USERS_PATH = "./users/";
|
||||||
|
|
||||||
|
function open_crypto($mkey)
|
||||||
|
{
|
||||||
|
if (!isset($_SESSION['td']))
|
||||||
|
{
|
||||||
|
$td = mcrypt_module_open(MCRYPT_RIJNDAEL_128, '', MCRYPT_MODE_ECB, '');
|
||||||
|
|
||||||
|
if ($td == false)
|
||||||
|
die("Unable to open mcrypt");
|
||||||
|
|
||||||
|
$ret = mcrypt_generic_init($td, hash("sha256", $mkey, true), '0000000000000000');
|
||||||
|
|
||||||
|
if ($ret < 0)
|
||||||
|
{
|
||||||
|
echo "<div class=\"error\">Unable to set key $ret</div>";
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
$_SESSION['td'] = $td;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
$td = $_SESSION['td'];
|
||||||
|
|
||||||
|
return $td;
|
||||||
|
}
|
||||||
|
|
||||||
|
function decrypt($mkey, $val, $salted)
|
||||||
|
{
|
||||||
|
$td = open_crypto($mkey);
|
||||||
|
|
||||||
|
if ($td == null) return;
|
||||||
|
|
||||||
|
$val = mdecrypt_generic($td, hex2bin($val));
|
||||||
|
|
||||||
|
// Remove 0 added by encrypt
|
||||||
|
$val = str_replace("\0", '', $val);
|
||||||
|
|
||||||
|
// Remove salt
|
||||||
|
if ($salted)
|
||||||
|
$val = substr($val, 0, strlen($val)-3);
|
||||||
|
|
||||||
|
return $val;
|
||||||
|
}
|
||||||
|
|
||||||
|
function encrypt($mkey, $val, $salted)
|
||||||
|
{
|
||||||
|
global $MAX_ENTRY_LEN;
|
||||||
|
|
||||||
|
$td = open_crypto($mkey);
|
||||||
|
|
||||||
|
if ($td == null) return;
|
||||||
|
|
||||||
|
if ($salted)
|
||||||
|
{
|
||||||
|
$val .= dechex(rand(256,4095)); //between 0x100 and 0xfff
|
||||||
|
}
|
||||||
|
|
||||||
|
$val = mcrypt_generic($td, $val);
|
||||||
|
|
||||||
|
if (strlen($val) > $MAX_ENTRY_LEN)
|
||||||
|
{
|
||||||
|
echo "<div class=\"error\">Value to encrypt is too long</div>";
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
return bin2hex($val);
|
||||||
|
}
|
||||||
|
|
||||||
|
// From http://php.net/manual/en/function.copy.php
|
||||||
|
function recurse_copy($src,$dst) {
|
||||||
|
$dir = opendir($src);
|
||||||
|
if ($dir == FALSE) return FALSE;
|
||||||
|
if (!@mkdir($dst)) return FALSE;
|
||||||
|
while(false !== ( $file = readdir($dir)) ) {
|
||||||
|
if (( $file != '.' ) && ( $file != '..' )) {
|
||||||
|
if ( is_dir($src . '/' . $file) ) {
|
||||||
|
return recurse_copy($src . '/' . $file,$dst . '/' . $file);
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
copy($src . '/' . $file,$dst . '/' . $file);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
closedir($dir);
|
||||||
|
return TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
function create_user($user)
|
||||||
|
{
|
||||||
|
global $USERS_PATH;
|
||||||
|
|
||||||
|
if (strpos($user, "..") || strpos($user, "/") || $user[0] == "." || $user[0] == "_")
|
||||||
|
{
|
||||||
|
echo "<div class=\"error\">Invalid user</div>";
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
$user = $USERS_PATH . $user;
|
||||||
|
|
||||||
|
if (file_exists($user))
|
||||||
|
{
|
||||||
|
echo "<div class=\"error\">User already exists</div>";
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!recurse_copy("./ref", $user))
|
||||||
|
{
|
||||||
|
echo "<div class=\"error\">Cannot create user $user</div>";
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
function load_database($user)
|
||||||
|
{
|
||||||
|
global $USERS_PATH;
|
||||||
|
|
||||||
|
try {
|
||||||
|
$db = new SQLite3($USERS_PATH . "$user/gpass.bdd", SQLITE3_OPEN_READWRITE);
|
||||||
|
}
|
||||||
|
catch(Exception $e)
|
||||||
|
{
|
||||||
|
echo "<div class=\"error\">Unable to load database for user $user !</div>";
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
// New access need to reset crypto
|
||||||
|
unset($_SESSION['td']);
|
||||||
|
|
||||||
|
return $db;
|
||||||
|
}
|
||||||
|
|
||||||
|
function add_entry($user, $mkey, $url, $login, $password)
|
||||||
|
{
|
||||||
|
$db = load_database($user);
|
||||||
|
|
||||||
|
if ($db == null) return false;
|
||||||
|
|
||||||
|
$password = encrypt($mkey, $password, true);
|
||||||
|
$login = encrypt($mkey, "@@" . $url . ";" . $login, false);
|
||||||
|
|
||||||
|
if ($password == null || $login == null)
|
||||||
|
return false;
|
||||||
|
|
||||||
|
$count = $db->querySingle("SELECT COUNT(*) FROM gpass WHERE login='" . $login . "'");
|
||||||
|
|
||||||
|
if ($count != 0)
|
||||||
|
{
|
||||||
|
echo "<div class=\"error\">Entry already exists</div>";
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
$result = $db->query("INSERT INTO gpass ('login', 'password') VALUES ('" . $login . "', '" . $password . "')");
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
function delete_entry($user, $login)
|
||||||
|
{
|
||||||
|
$db = load_database($user);
|
||||||
|
|
||||||
|
if ($db == null) return false;
|
||||||
|
|
||||||
|
$db->query("DELETE FROM gpass WHERE login='" . $login . "'");
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
function update_entry($user, $mkey, $old_login, $url, $login, $password)
|
||||||
|
{
|
||||||
|
if (delete_entry($user, $old_login))
|
||||||
|
return add_entry($user, $mkey, $url, $login, $password);
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
function list_entries($user, $mkey)
|
||||||
|
{
|
||||||
|
$db = load_database($user);
|
||||||
|
|
||||||
|
if ($db == null) return;
|
||||||
|
|
||||||
|
$result = $db->query("SELECT * FROM gpass");
|
||||||
|
|
||||||
|
$res = array();
|
||||||
|
$valid_accounts = 0;
|
||||||
|
$total_accounts = 0;
|
||||||
|
while ($row = $result->fetchArray())
|
||||||
|
{
|
||||||
|
$total_accounts++;
|
||||||
|
|
||||||
|
$login = decrypt($mkey, $row['login'], false);
|
||||||
|
|
||||||
|
if ($login[0] != '@' && $login[1] != '@')
|
||||||
|
{
|
||||||
|
$subres = array('login_ciph' => $row['login'],
|
||||||
|
'url' => '', 'login' => '',
|
||||||
|
'password' => $row['password'],
|
||||||
|
'ciphered' => 1);
|
||||||
|
|
||||||
|
array_push($res, $subres);
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
$login = substr($login, 2);
|
||||||
|
$sep = strpos($login, ';');
|
||||||
|
$url = substr($login, 0, $sep);
|
||||||
|
$login = substr($login, $sep+1);
|
||||||
|
|
||||||
|
$password = decrypt($mkey, $row['password'], true);
|
||||||
|
|
||||||
|
$subres = array('login_ciph' => $row['login'],
|
||||||
|
'url' => $url, 'login' => $login,
|
||||||
|
'password' => $password,
|
||||||
|
'ciphered' => 0);
|
||||||
|
|
||||||
|
array_push($res, $subres);
|
||||||
|
$valid_accounts++;
|
||||||
|
}
|
||||||
|
|
||||||
|
return array($total_accounts-$valid_accounts, $res);
|
||||||
|
}
|
||||||
|
|
||||||
|
?>
|
||||||
174
server/index.php
Executable file
174
server/index.php
Executable file
@@ -0,0 +1,174 @@
|
|||||||
|
<?php
|
||||||
|
/*
|
||||||
|
Copyright (C) 2013 Grégory Soutadé
|
||||||
|
|
||||||
|
This file is part of gPass.
|
||||||
|
|
||||||
|
gPass is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
gPass is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with gPass. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
include('functions.php');
|
||||||
|
|
||||||
|
session_start();
|
||||||
|
|
||||||
|
$VIEW_CIPHERED_PASSWORDS=true;
|
||||||
|
|
||||||
|
$mkey = (isset($_POST['mkey'])) ? $_POST['mkey'] : "";
|
||||||
|
$user = (isset($_POST['user'])) ? $_POST['user'] : "";
|
||||||
|
?>
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" >
|
||||||
|
<link rel="stylesheet" type="text/css" href="/ressources/gpass.css" />
|
||||||
|
<script src="ressources/gpass.js"></script>
|
||||||
|
<?php
|
||||||
|
global $user;
|
||||||
|
if ($user == "")
|
||||||
|
echo "<title>gPass : global Password</title>";
|
||||||
|
else
|
||||||
|
echo "<title>gPass : global Password - $user</title>";
|
||||||
|
?>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
|
||||||
|
<?php
|
||||||
|
if (isset($_POST['create_user']))
|
||||||
|
{
|
||||||
|
if (create_user($_POST['user']))
|
||||||
|
$user = $_POST['user'];
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (isset($_POST['add']))
|
||||||
|
add_entry($user, $mkey, $_POST['url'], $_POST['login'], $_POST['pwd']);
|
||||||
|
else if (isset($_POST['delete']))
|
||||||
|
delete_entry($user, $_POST['login_ciph']);
|
||||||
|
else if (isset($_POST['update']))
|
||||||
|
update_entry($user, $mkey, $_POST['login_ciph'], $_POST['url'], $_POST['login'], $_POST['pwd']);
|
||||||
|
}
|
||||||
|
?>
|
||||||
|
|
||||||
|
<img src="ressources/gpass.png" id="logo" alt="logo"/>
|
||||||
|
|
||||||
|
<div id="admin">
|
||||||
|
<form method="post">
|
||||||
|
<input type="text" name="user"/> <input type="submit" name="create_user" value="Create user" onclick="return confirm('Are you sure want to create this user ?');"/>
|
||||||
|
</form>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div id="user">
|
||||||
|
<form method="post" id="select_user">
|
||||||
|
<?php
|
||||||
|
global $user;
|
||||||
|
global $mkey;
|
||||||
|
|
||||||
|
$users = scandir("./users/");
|
||||||
|
$count = 0;
|
||||||
|
foreach($users as $u)
|
||||||
|
{
|
||||||
|
if (is_dir("./users/" . $u) && $u[0] != '_' && $u[0] != '.')
|
||||||
|
$count++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ($count == 0)
|
||||||
|
echo "<b>No user found</b><br/>";
|
||||||
|
else
|
||||||
|
{
|
||||||
|
echo '<b>User</b> <select name="user">';
|
||||||
|
foreach($users as $u)
|
||||||
|
{
|
||||||
|
if (is_dir("./users/" . $u) && $u[0] != '_' && $u[0] != '.')
|
||||||
|
{
|
||||||
|
if ($user == "") $user = $u;
|
||||||
|
if ($user == $u)
|
||||||
|
echo "<option value=\"$u\" selected=\"1\"/>$u</option>";
|
||||||
|
else
|
||||||
|
echo "<option value=\"$u\"/>$u</option>";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
echo "</select>";
|
||||||
|
echo ' <b>Master key </b> <input type="password" name="mkey"/> <input name="list" type="submit" value="See"/>';
|
||||||
|
}
|
||||||
|
?>
|
||||||
|
</form>
|
||||||
|
<div id="passwords">
|
||||||
|
<?php
|
||||||
|
global $user;
|
||||||
|
global $mkey;
|
||||||
|
global $VIEW_UNCIPHERED_PASSWORDS;
|
||||||
|
|
||||||
|
if ($user != "")
|
||||||
|
{
|
||||||
|
$nb_unciphered = 0;
|
||||||
|
list($nb_ciphered, $entries) = list_entries($user, $mkey);
|
||||||
|
|
||||||
|
echo "<b>" . (count($entries) - $nb_ciphered) . " unciphered password(s)</b><br/>";
|
||||||
|
foreach($entries as $entry)
|
||||||
|
{
|
||||||
|
if ($entry['ciphered'] == 1) continue;
|
||||||
|
echo '<form method="post">';
|
||||||
|
echo '<input type="hidden" name="user" value="' . $user . '"/>';
|
||||||
|
echo '<input type="hidden" name="mkey" value="' . $mkey . '"/>';
|
||||||
|
echo '<input type="hidden" name="login_ciph" value="' . $entry['login_ciph'] . '"/>';
|
||||||
|
echo 'URL <input type="text" name="url" value="' . $entry['url'] . '"/>';
|
||||||
|
echo 'login <input type="text" name="login" value="' . $entry['login'] . '"/>';
|
||||||
|
echo 'password <input type="text" name="pwd" value="' . $entry['password'] . '"/>';
|
||||||
|
echo '<input type="submit" name="delete" value="Delete" onclick="return confirm(\'Are you sure want to delete this password ?\');"/>';
|
||||||
|
echo '<input type="submit" name="update" value="Update" onclick="return confirm(\'Are you sure want to update this password ?\');"/>';
|
||||||
|
echo '</form>';
|
||||||
|
}
|
||||||
|
|
||||||
|
echo "<br/><br/>";
|
||||||
|
echo "<b>$nb_ciphered ciphered password(s)</b><br/>";
|
||||||
|
if ($VIEW_CIPHERED_PASSWORDS)
|
||||||
|
{
|
||||||
|
foreach($entries as $entry)
|
||||||
|
{
|
||||||
|
if ($entry['ciphered'] == 0) continue;
|
||||||
|
echo '<form method="post">';
|
||||||
|
echo '<input type="hidden" name="user" value="' . $user . '"/>';
|
||||||
|
echo '<input type="hidden" name="mkey" value="' . $mkey . '"/>';
|
||||||
|
echo '<input class="hash" type="text" name="login_ciph" value="' . $entry['login_ciph'] . '"/>';
|
||||||
|
echo '<input class="hash" type="text" name="pwd" value="' . $entry['password'] . '"/>';
|
||||||
|
echo '<input type="submit" name="delete" value="Delete" onclick="return confirm(\'Are you sure want to delete this password ?\');"/>';
|
||||||
|
echo '</form>';
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
?>
|
||||||
|
</div>
|
||||||
|
<div id="add_new_password">
|
||||||
|
<?php
|
||||||
|
global $user;
|
||||||
|
|
||||||
|
if ($user != "")
|
||||||
|
{
|
||||||
|
echo "<b>Add a new password</b><br/>";
|
||||||
|
echo '<form method="post">';
|
||||||
|
echo '<input type="hidden" name="user" value="' . $user . '"/>';
|
||||||
|
|
||||||
|
echo 'URL <input id="new_url" type="text" name="url"/>';
|
||||||
|
echo 'login <input type="text" name="login" />';
|
||||||
|
echo 'password <input id="new_password" type="text" name="pwd"/>';
|
||||||
|
echo 'master key <input type="password" name="mkey"/>';
|
||||||
|
echo '<input type="button" value="Generate password" onClick="generate_password();"/>';
|
||||||
|
echo "<input type=\"submit\" name=\"add\" value=\"Add\" onclick='a = document.getElementById(\"new_url\") ; a.value = url_domain(a.value);'/>";
|
||||||
|
echo '</form>';
|
||||||
|
}
|
||||||
|
?>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
1
server/init.sql
Executable file
1
server/init.sql
Executable file
@@ -0,0 +1 @@
|
|||||||
|
CREATE TABLE gpass(login VARCHAR(512) PRIMARY KEY, password VARCHAR(512));
|
||||||
BIN
server/ref/gpass.bdd
Executable file
BIN
server/ref/gpass.bdd
Executable file
Binary file not shown.
56
server/ref/index.php
Executable file
56
server/ref/index.php
Executable file
@@ -0,0 +1,56 @@
|
|||||||
|
<?php
|
||||||
|
/*
|
||||||
|
Copyright (C) 2013 Grégory Soutadé
|
||||||
|
|
||||||
|
This file is part of gPass.
|
||||||
|
|
||||||
|
gPass is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
gPass is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with gPass. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
function load_database()
|
||||||
|
{
|
||||||
|
try {
|
||||||
|
$db = new SQLite3("./gpass.bdd", SQLITE3_OPEN_READONLY);
|
||||||
|
}
|
||||||
|
catch(Exception $e)
|
||||||
|
{
|
||||||
|
die("<b>Unable to load database for user $user !</b><br/>");
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
return $db;
|
||||||
|
}
|
||||||
|
|
||||||
|
$db = load_database();
|
||||||
|
|
||||||
|
$res = "";
|
||||||
|
|
||||||
|
$statement = $db->prepare("SELECT password FROM gpass WHERE login=:login");
|
||||||
|
|
||||||
|
for ($i=0; isset($_POST["k$i"]); $i++)
|
||||||
|
{
|
||||||
|
$statement->bindValue(":login", $_POST["k$i"]);
|
||||||
|
$result = $statement->execute();
|
||||||
|
$row = $result->fetchArray();
|
||||||
|
if (isset($row["password"]))
|
||||||
|
{
|
||||||
|
echo "pass=" . $row["password"] . "\n";
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
$statement->close();
|
||||||
|
|
||||||
|
echo "<end>";
|
||||||
|
|
||||||
|
?>
|
||||||
70
server/ressources/gpass.css
Executable file
70
server/ressources/gpass.css
Executable file
@@ -0,0 +1,70 @@
|
|||||||
|
|
||||||
|
body {
|
||||||
|
background-image:linear-gradient(#0096ff 30%, white);
|
||||||
|
height:100%; width:100%;
|
||||||
|
}
|
||||||
|
|
||||||
|
#logo {
|
||||||
|
display:block;
|
||||||
|
margin-left:auto;
|
||||||
|
margin-right:auto;
|
||||||
|
margin-top:30px;
|
||||||
|
margin-bottom:40px;
|
||||||
|
}
|
||||||
|
|
||||||
|
#admin {
|
||||||
|
border-style:solid;
|
||||||
|
border-width:5px;
|
||||||
|
border-color:red;
|
||||||
|
padding : 15px;
|
||||||
|
margin : 15px;
|
||||||
|
}
|
||||||
|
|
||||||
|
#admin form {
|
||||||
|
text-align : center;
|
||||||
|
}
|
||||||
|
|
||||||
|
#user {
|
||||||
|
border-style:solid;
|
||||||
|
border-width:5px;
|
||||||
|
border-color:green;
|
||||||
|
padding : 15px;
|
||||||
|
margin : 15px;
|
||||||
|
}
|
||||||
|
|
||||||
|
#user input {
|
||||||
|
margin-right : 30px;
|
||||||
|
margin-top : 10px;
|
||||||
|
margin-bottom : 10px;
|
||||||
|
}
|
||||||
|
|
||||||
|
#select_user {
|
||||||
|
text-align : center;
|
||||||
|
}
|
||||||
|
|
||||||
|
#passwords {
|
||||||
|
border-style:solid;
|
||||||
|
border-width:5px;
|
||||||
|
border-color:grey;
|
||||||
|
padding : 15px;
|
||||||
|
margin : 15px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.hash {
|
||||||
|
width : 700px;
|
||||||
|
}
|
||||||
|
|
||||||
|
#add_new_password {
|
||||||
|
border-style:solid;
|
||||||
|
border-width:5px;
|
||||||
|
border-color:blue;
|
||||||
|
padding : 15px;
|
||||||
|
margin : 15px;
|
||||||
|
}
|
||||||
|
|
||||||
|
.error {
|
||||||
|
text-align:center;
|
||||||
|
color:red;
|
||||||
|
font-weight:bold;
|
||||||
|
font-size:xx-large;
|
||||||
|
}
|
||||||
63
server/ressources/gpass.js
Executable file
63
server/ressources/gpass.js
Executable file
@@ -0,0 +1,63 @@
|
|||||||
|
// parseUri 1.2.2
|
||||||
|
// (c) Steven Levithan <stevenlevithan.com>
|
||||||
|
// MIT License
|
||||||
|
// http://blog.stevenlevithan.com/archives/parseuri
|
||||||
|
function parseUri (str) {
|
||||||
|
var o = parseUri.options,
|
||||||
|
m = o.parser[o.strictMode ? "strict" : "loose"].exec(str),
|
||||||
|
uri = {},
|
||||||
|
i = 14;
|
||||||
|
|
||||||
|
while (i--) uri[o.key[i]] = m[i] || "";
|
||||||
|
|
||||||
|
uri[o.q.name] = {};
|
||||||
|
uri[o.key[12]].replace(o.q.parser, function ($0, $1, $2) {
|
||||||
|
if ($1) uri[o.q.name][$1] = $2;
|
||||||
|
});
|
||||||
|
|
||||||
|
return uri;
|
||||||
|
};
|
||||||
|
|
||||||
|
parseUri.options = {
|
||||||
|
strictMode: false,
|
||||||
|
key: ["source","protocol","authority","userInfo","user","password","host","port","relative","path","directory","file","query","anchor"],
|
||||||
|
q: {
|
||||||
|
name: "queryKey",
|
||||||
|
parser: /(?:^|&)([^&=]*)=?([^&]*)/g
|
||||||
|
},
|
||||||
|
parser: {
|
||||||
|
strict: /^(?:([^:\/?#]+):)?(?:\/\/((?:(([^:@]*)(?::([^:@]*))?)?@)?([^:\/?#]*)(?::(\d*))?))?((((?:[^?#\/]*\/)*)([^?#]*))(?:\?([^#]*))?(?:#(.*))?)/,
|
||||||
|
loose: /^(?:(?![^:@]+:[^:@\/]*@)([^:\/?#.]+):)?(?:\/\/)?((?:(([^:@]*)(?::([^:@]*))?)?@)?([^:\/?#]*)(?::(\d*))?)(((\/(?:[^?#](?![^?#\/]*\.[^?#\/.]+(?:[?#]|$)))*\/?)?([^?#\/]*))(?:\?([^#]*))?(?:#(.*))?)/
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
function generate_password()
|
||||||
|
{
|
||||||
|
// symbols 32 - 47 / 58 - 64 / 91 - 96 / 123 - 126
|
||||||
|
// numbers 48 - 57
|
||||||
|
// upper 65 - 90
|
||||||
|
// lower 97 - 122
|
||||||
|
var symbols = new Array(40, 47, 48, 57, 65, 90, 97, 122, 123, 126);
|
||||||
|
// var symbols = new Array(32, 47, 58, 64, 91, 96, 123, 126, 48, 57, 65, 90, 97, 122);
|
||||||
|
|
||||||
|
field = document.getElementById("new_password");
|
||||||
|
|
||||||
|
var res = "";
|
||||||
|
//for(i=0; i<16; i++)
|
||||||
|
while (res.length < 16)
|
||||||
|
{
|
||||||
|
a = Math.round(Math.random() * (symbols.length/2) * 2);
|
||||||
|
diff = symbols[a+1] - symbols[a];
|
||||||
|
r = Math.round(Math.random()*diff);
|
||||||
|
if (isNaN(r+symbols[a]))
|
||||||
|
continue;
|
||||||
|
res += String.fromCharCode(r + symbols[a]);
|
||||||
|
}
|
||||||
|
|
||||||
|
field.value = res;
|
||||||
|
}
|
||||||
|
|
||||||
|
function url_domain(data) {
|
||||||
|
var uri = parseUri(data)
|
||||||
|
return uri['host'];
|
||||||
|
}
|
||||||
BIN
server/ressources/gpass.png
Executable file
BIN
server/ressources/gpass.png
Executable file
Binary file not shown.
|
After Width: | Height: | Size: 17 KiB |
32
server/ressources/parseuri.js
Executable file
32
server/ressources/parseuri.js
Executable file
@@ -0,0 +1,32 @@
|
|||||||
|
// parseUri 1.2.2
|
||||||
|
// (c) Steven Levithan <stevenlevithan.com>
|
||||||
|
// MIT License
|
||||||
|
|
||||||
|
function parseUri (str) {
|
||||||
|
var o = parseUri.options,
|
||||||
|
m = o.parser[o.strictMode ? "strict" : "loose"].exec(str),
|
||||||
|
uri = {},
|
||||||
|
i = 14;
|
||||||
|
|
||||||
|
while (i--) uri[o.key[i]] = m[i] || "";
|
||||||
|
|
||||||
|
uri[o.q.name] = {};
|
||||||
|
uri[o.key[12]].replace(o.q.parser, function ($0, $1, $2) {
|
||||||
|
if ($1) uri[o.q.name][$1] = $2;
|
||||||
|
});
|
||||||
|
|
||||||
|
return uri;
|
||||||
|
};
|
||||||
|
|
||||||
|
parseUri.options = {
|
||||||
|
strictMode: false,
|
||||||
|
key: ["source","protocol","authority","userInfo","user","password","host","port","relative","path","directory","file","query","anchor"],
|
||||||
|
q: {
|
||||||
|
name: "queryKey",
|
||||||
|
parser: /(?:^|&)([^&=]*)=?([^&]*)/g
|
||||||
|
},
|
||||||
|
parser: {
|
||||||
|
strict: /^(?:([^:\/?#]+):)?(?:\/\/((?:(([^:@]*)(?::([^:@]*))?)?@)?([^:\/?#]*)(?::(\d*))?))?((((?:[^?#\/]*\/)*)([^?#]*))(?:\?([^#]*))?(?:#(.*))?)/,
|
||||||
|
loose: /^(?:(?![^:@]+:[^:@\/]*@)([^:\/?#.]+):)?(?:\/\/)?((?:(([^:@]*)(?::([^:@]*))?)?@)?([^:\/?#]*)(?::(\d*))?)(((\/(?:[^?#](?![^?#\/]*\.[^?#\/.]+(?:[?#]|$)))*\/?)?([^?#\/]*))(?:\?([^#]*))?(?:#(.*))?)/
|
||||||
|
}
|
||||||
|
};
|
||||||
Reference in New Issue
Block a user