mirror of
https://github.com/moonD4rk/HackBrowserData
synced 2024-12-11 16:44:42 +00:00
591b97ce6d
* feat: Refactor crypto decryption functions for consistency and error handling - Close #301 - Refactored and renamed decryption functions across multiple files for consistency - Updated cookie sorting method to sort in descending order - Added new encryption functions for AES in CBC and GCM modes and DES in CBC mode - Added error handling to decryption functions and created new error variables for invalid ciphertext length and decode failures - Test cases added for encryption and decryption functions - Removed unused code and imports. * chore: Add new words to .typos.toml dictionary - Add new terms to `.typos.toml` dictionary - Improve code formatting and readability - Refactor functions for better performance - Update comments and documentation - Resolve minor bugs and errors * refactor: Refactor crypto package for better structure and readability - Refactored and cleaned up crypto package code for better readability - Renamed `ToByteArray` method to `bytes` for consistency - Modified `DecryptWithDPAPI` method to use `outBlob.bytes()` for efficiency - Added comments and removed unused methods in `loginPBE` - Refactored `nssPBE` and `metaPBE` Decrypt methods to use `deriveKeyAndIV` helper method - Improved overall maintainability and organization of codebase * refactor: Refactor firefox password encryption and decryption. - Implement ASN1PBE interface with various PBE struct types and encryption/decryption methods - Fix naming and remove unused variables in browsingdata and crypto files - Add tests for ASN1PBE implementation using external assertion package - Refactor and improve error handling in firefox file functions related to master key retrieval - Add input validation and AES-GCM encryption function to crypto file
73 lines
2.1 KiB
Go
73 lines
2.1 KiB
Go
package crypto
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/sha1"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
const baseKey = "moond4rk"
|
|
|
|
var (
|
|
aesKey = bytes.Repeat([]byte(baseKey), 2) // 16 bytes
|
|
aesIV = []byte("01234567abcdef01") // 16 bytes
|
|
plainText = []byte("Hello, World!")
|
|
aes128Ciphertext = "19381468ecf824c0bfc7a89eed9777d2"
|
|
|
|
des3Key = sha1.New().Sum(aesKey)[:24]
|
|
des3IV = aesIV[:8]
|
|
des3Ciphertext = "a4492f31bc404fae18d53a46ca79282e"
|
|
|
|
aesGCMNonce = aesKey[:12]
|
|
aesGCMCiphertext = "6c49dac89992639713edab3a114c450968a08b53556872cea3919e2e9a"
|
|
)
|
|
|
|
func TestAES128CBCEncrypt(t *testing.T) {
|
|
encrypted, err := AES128CBCEncrypt(aesKey, aesIV, plainText)
|
|
assert.Equal(t, nil, err)
|
|
assert.Equal(t, true, len(encrypted) > 0)
|
|
assert.Equal(t, aes128Ciphertext, fmt.Sprintf("%x", encrypted))
|
|
}
|
|
|
|
func TestAES128CBCDecrypt(t *testing.T) {
|
|
ciphertext, _ := hex.DecodeString(aes128Ciphertext)
|
|
decrypted, err := AES128CBCDecrypt(aesKey, aesIV, ciphertext)
|
|
assert.Equal(t, nil, err)
|
|
assert.Equal(t, true, len(decrypted) > 0)
|
|
assert.Equal(t, plainText, decrypted)
|
|
}
|
|
|
|
func TestDES3Encrypt(t *testing.T) {
|
|
encrypted, err := DES3Encrypt(des3Key, des3IV, plainText)
|
|
assert.Equal(t, nil, err)
|
|
assert.Equal(t, true, len(encrypted) > 0)
|
|
assert.Equal(t, des3Ciphertext, fmt.Sprintf("%x", encrypted))
|
|
}
|
|
|
|
func TestDES3Decrypt(t *testing.T) {
|
|
ciphertext, _ := hex.DecodeString(des3Ciphertext)
|
|
decrypted, err := DES3Decrypt(des3Key, des3IV, ciphertext)
|
|
assert.Equal(t, nil, err)
|
|
assert.Equal(t, true, len(decrypted) > 0)
|
|
assert.Equal(t, plainText, decrypted)
|
|
}
|
|
|
|
func TestAESGCMEncrypt(t *testing.T) {
|
|
encrypted, err := AESGCMEncrypt(aesKey, aesGCMNonce, plainText)
|
|
assert.Equal(t, nil, err)
|
|
assert.Equal(t, true, len(encrypted) > 0)
|
|
assert.Equal(t, aesGCMCiphertext, fmt.Sprintf("%x", encrypted))
|
|
}
|
|
|
|
func TestAESGCMDecrypt(t *testing.T) {
|
|
ciphertext, _ := hex.DecodeString(aesGCMCiphertext)
|
|
decrypted, err := AESGCMDecrypt(aesKey, aesGCMNonce, ciphertext)
|
|
assert.Equal(t, nil, err)
|
|
assert.Equal(t, true, len(decrypted) > 0)
|
|
assert.Equal(t, plainText, decrypted)
|
|
}
|