verdnatura-chat/app/utils/base64-js/base64-js.test.js

145 lines
3.1 KiB
JavaScript
Raw Normal View History

[NEW] E2E Encryption (#2394) * Add E2EKey to Subscription Model * Install react-native-simple-crypto * Install bytebuffer * Add translations * CreateChannel Encrypted toggle * Request E2E_Enabled setting * Add some E2E API methods * POC E2E Encryption * Garbage remove * Remove keys cleaner * Android cast JWK -> PKCS1 * Initialize E2E when Login Success * Add some translations * Add e2e property to Message model * Send Encrypted messages * (iOS) PKCS1 -> JWK & e2e.setUserPublicAndPrivateKeys * (Android) PKCS1 -> JWK & e2e.setUserPublicAndPrivateKeys * Create an encrypted channel * Fix app crashing on RoomsList * Create room key * Set Room E2E Key (Android) * Edit room encrypted * Show encrypted icon on messages * logEvents * Decrypt pending subscriptions & messages * Handle user cancel e2e password entry * E2ESavePasswordView * Update Snapshot * Add encrypted props to message on Send * Thread messages encryption * E2E -> Encryption * Share Extension: Share encrypted text * (POC) Search messages on Encrypted room * Provide room key to new users * Request roomKey on stream-notify-room-users * Add e2eKeyId to Room Model * (WIP) E2E Encryption Screens * Remove encryption subscription file * Move E2E_Enable to Server Model * Encryption List Banner * Move Encryption init to Sagas * Show banner only when enabled * Use RocketChat/react-native-simple-crypto * Search on WM only when is an Encrypted channel * (WIP) Encryption Banner * Encryption banner * Patch -> Fork * Improve send encrypted message * Update simple-crypto * Not decrypt already decrypted messages * Add comments * Change eslint disable to inline * Improve code * Remove comment * Some fixes * (WIP) Encryption Screens * Improve sub find * Resend an encrypted message * Fix comment * Code improvements * Hide e2e buttons on features if it is not enabled * InApp notifications of a encrypted room * Encryption stop logic * Edit encrypted message * DB batch on decryptPending * Encryption ready client * Comments * Handle getRoomInstance errors * Multiple messages decrypt * Remove unnecessary try/catch * Fix decrypt all messages history * Just add a questionmark * Fix some subscriptions missing decrypt * Disable request key logic * Fix unicode emojis * Fix e2ekey request * roomId -> subscription * Decrypt subscription after merge * E2ERoom -> EncryptionRoom * Fix infinite loading * Handle import key errors * Handle request key errors * Move e2eRequestRoomKey to Rocket.Chat * WIP handshake when key should be requested * Add search messages explanation * Remove some TODO and update comments * Improvements * Dont show message hash to user * Handle key request & prevent multiple calls * Request E2EKey on decryptSubscription that doesn't exists on database yet * Insert decrypted subscription * Fix crash after login * Decrypt sub when receive the key * Decrypt pending messages of a room * Encrypted as a switch * Buffer to Base64 URI Safe * Add a relevant comment * Prevent import key without a privateKey * Prevent create a new instance when client is not ready * Update simple-crypto & remove replace trick * More comments * Remove useless comment * Remove useless try/catch * I18n all E2E screens * E2ESavePassword -> E2ESaveYourPassword * Prevent multiple views on message when is not encrypted * Fix encryption toggle not working sometimes * follow some suggestions * dont rotate icons * remove unnecessary condition * remove unreachable event * create channel comment * disable no-bitwise rule for entire file * loadKeys -> persistKeys * getMasterKey -> generateMasterKey * explicit difference between E2EKey & e2eKeyId * roomId -> rid * group columns * Remove server selector * missing log events * remove comment * use stored public key * update simple-crypto & remove base64-js patch * add some logs * remove unreachable condition * log errors * handle errors on provide key directly on subscription * Downgrade RocketChat/react-native-simple-crypto * improve get room instance * migration of older apps * check encrypted status before send a message * wait client ready * use our own base64-js * add more jest tests * explain return * remove unncessary stop * thrown error to caller * remove superfluous checks * use Encryption property * change ready state logic * ready -> establishing * encryption.room -> encryptionRoom * EncryptionRoom -> Room * add documentation * wait establishing before provide a room key * remove superfluous condition * improve error handling logic * fallback e2ekey set * remove no longer necessary check * remove e.g. * improve getRoomInstance * import from index * use batch * fix a comment * decrypt tmsg * dont show hash when message is encrypted * Fix detox * Apply suggestions from code review Co-authored-by: Diego Mello <diegolmello@gmail.com>
2020-09-11 14:31:38 +00:00
/* eslint-disable no-undef */
/* eslint-disable no-bitwise */
// https://github.com/beatgammit/base64-js/tree/master/test
import {
byteLength,
toByteArray,
fromByteArray
} from './index';
const map = (arr, callback) => {
const res = [];
let kValue;
let mappedValue;
for (let k = 0, len = arr.length; k < len; k += 1) {
if ((typeof arr === 'string' && !!arr.charAt(k))) {
kValue = arr.charAt(k);
mappedValue = callback(kValue, k, arr);
res[k] = mappedValue;
} else if (typeof arr !== 'string' && k in arr) {
kValue = arr[k];
mappedValue = callback(kValue, k, arr);
res[k] = mappedValue;
}
}
return res;
};
expect.extend({
toBeEqual(a, b) {
let i;
const { length } = a;
if (length !== b.length) {
return {
pass: false
};
}
for (i = 0; i < length; i += 1) {
if ((a[i] & 0xFF) !== (b[i] & 0xFF)) {
return {
pass: false
};
}
}
return {
pass: true
};
}
});
test('decode url-safe style base64 strings', () => {
const expected = [0xff, 0xff, 0xbe, 0xff, 0xef, 0xbf, 0xfb, 0xef, 0xff];
let str = '//++/++/++//';
let actual = toByteArray(str);
for (let i = 0; i < actual.length; i += 1) {
expect(actual[i]).toBe(expected[i]);
}
expect(byteLength(str)).toBe(actual.length);
str = '__--_--_--__';
actual = toByteArray(str);
for (let i = 0; i < actual.length; i += 1) {
expect(actual[i]).toBe(expected[i]);
}
expect(byteLength(str)).toBe(actual.length);
});
test('padding bytes found inside base64 string', () => {
// See https://github.com/beatgammit/base64-js/issues/42
const str = 'SQ==QU0=';
expect(toByteArray(str)).toEqual(new Uint8Array([73]));
expect(byteLength(str)).toBe(1);
});
const checks = [
'a',
'aa',
'aaa',
'hi',
'hi!',
'hi!!',
'sup',
'sup?',
'sup?!'
];
test('convert to base64 and back', () => {
for (let i = 0; i < checks.length; i += 1) {
const check = checks[i];
const b64Str = fromByteArray(map(check, char => char.charCodeAt(0)));
const arr = toByteArray(b64Str);
const str = map(arr, byte => String.fromCharCode(byte)).join('');
expect(check).toBe(str);
expect(byteLength(b64Str)).toBe(arr.length);
}
});
const data = [
[[0, 0, 0], 'AAAA'],
[[0, 0, 1], 'AAAB'],
[[0, 1, -1], 'AAH/'],
[[1, 1, 1], 'AQEB'],
[[0, -73, 23], 'ALcX']
];
test('convert known data to string', () => {
for (let i = 0; i < data.length; i += 1) {
const bytes = data[i][0];
const expected = data[i][1];
const actual = fromByteArray(bytes);
expect(actual).toBe(expected);
}
});
test('convert known data from string', () => {
for (let i = 0; i < data.length; i += 1) {
const expected = data[i][0];
const string = data[i][1];
const actual = toByteArray(string);
expect(actual).toBeEqual(expected);
const length = byteLength(string);
expect(length).toBe(expected.length);
}
});
test('convert big data to base64', () => {
let i;
let length;
const big = new Uint8Array(64 * 1024 * 1024);
for (i = 0, length = big.length; i < length; i += 1) {
big[i] = i % 256;
}
const b64str = fromByteArray(big);
const arr = toByteArray(b64str);
expect(arr).toBeEqual(big);
expect(byteLength(b64str)).toBe(arr.length);
});