Module: Pindo::AESHelper
- Defined in:
- lib/pindo/base/aeshelper.rb
Class Method Summary collapse
- .aes_128_ecb_decrypt(key, decrypted_string) ⇒ Object
- .aes_128_ecb_encrypt(key, encrypted_string) ⇒ Object
-
.decrypt_specific_file(src_file: nil, password: nil, output_dir: nil, hash_algorithm: "MD5") ⇒ Object
The encryption parameters in this implementations reflect the old behavior which depended on the users’ local OpenSSL version 1.0.x OpenSSL and earlier versions use MD5, 1.1.0c and newer uses SHA256, we try both before giving an error.
- .delete_password(keychain_name: nil) ⇒ Object
- .encrypt_specific_file(src_file: nil, password: nil, output_dir: nil) ⇒ Object
- .fetch_password(keychain_name: nil) ⇒ Object
- .store_password(keychain_name: nil, password: nil) ⇒ Object
Class Method Details
.aes_128_ecb_decrypt(key, decrypted_string) ⇒ Object
47 48 49 50 51 52 53 |
# File 'lib/pindo/base/aeshelper.rb', line 47 def self.aes_128_ecb_decrypt(key, decrypted_string) cipher = OpenSSL::Cipher.new("AES-128-ECB") cipher.decrypt cipher.key = key text = cipher.update(Base64.strict_decode64(decrypted_string)) + cipher.final return text end |
.aes_128_ecb_encrypt(key, encrypted_string) ⇒ Object
38 39 40 41 42 43 44 45 |
# File 'lib/pindo/base/aeshelper.rb', line 38 def self.aes_128_ecb_encrypt(key, encrypted_string) cipher = OpenSSL::Cipher::Cipher.new('AES-128-ECB') cipher.encrypt cipher.key = key txt = cipher.update(encrypted_string) << cipher.final content = Base64.strict_encode64(txt) return content end |
.decrypt_specific_file(src_file: nil, password: nil, output_dir: nil, hash_algorithm: "MD5") ⇒ Object
The encryption parameters in this implementations reflect the old behavior which depended on the users’ local OpenSSL version 1.0.x OpenSSL and earlier versions use MD5, 1.1.0c and newer uses SHA256, we try both before giving an error
70 71 72 73 74 75 76 77 78 79 80 81 82 |
# File 'lib/pindo/base/aeshelper.rb', line 70 def self.decrypt_specific_file(src_file: nil, password: nil, output_dir: nil, hash_algorithm: "MD5") begin destfile = File.join(output_dir, File.basename(src_file)) e = Match::Encryption::MatchFileEncryption.new e.decrypt(file_path: src_file, password: password, output_path:destfile) return destfile rescue => error Funlog.instance.("解析文件失败: #{src_file}") raise Informative, error return nil end end |
.delete_password(keychain_name: nil) ⇒ Object
27 28 29 30 |
# File 'lib/pindo/base/aeshelper.rb', line 27 def self.delete_password(keychain_name:nil) server_name = ["match", keychain_name].join("_") Security::InternetPassword.delete(server:server_name) end |
.encrypt_specific_file(src_file: nil, password: nil, output_dir: nil) ⇒ Object
56 57 58 59 60 61 62 63 64 65 66 |
# File 'lib/pindo/base/aeshelper.rb', line 56 def self.encrypt_specific_file(src_file: nil, password: nil, output_dir: nil) UI.user_error!("No password supplied") if password.to_s.strip.length == 0 destfile = File.join(output_dir, File.basename(src_file)) e = Match::Encryption::MatchFileEncryption.new e.encrypt(file_path: src_file, password: password, output_path:destfile) return destfile rescue error puts path raise Informative, error end |
.fetch_password(keychain_name: nil) ⇒ Object
11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 |
# File 'lib/pindo/base/aeshelper.rb', line 11 def self.fetch_password(keychain_name:nil) # password = ENV["MATCH_PASSWORD"] server_name = ["match", keychain_name].join("_") item = Security::InternetPassword.find(server: server_name) password = item.password if item unless password password = FastlaneCore::Helper.ask_password(message: "请输入证书仓库的加密密码: ", confirm: true) Security::InternetPassword.add(server_name, "", password) end return password end |
.store_password(keychain_name: nil, password: nil) ⇒ Object
32 33 34 35 |
# File 'lib/pindo/base/aeshelper.rb', line 32 def self.store_password(keychain_name:nil, password:nil) server_name = ["match", keychain_name].join("_") Security::InternetPassword.add(server_name, "", password) end |