import React, { useState, useEffect, useContext } from 'react'; import Container from 'components/Container'; import styled from 'styled-components'; import Card from 'react-bootstrap/Card'; import Form from 'react-bootstrap/Form'; import constants from 'utils/strings/constants'; import { Formik, FormikHelpers } from 'formik'; import * as Yup from 'yup'; import Button from 'react-bootstrap/Button'; import { getData, LS_KEYS, setData } from 'utils/storage/localStorage'; import { useRouter } from 'next/router'; import { getKey, SESSION_KEYS, setKey } from 'utils/storage/sessionStorage'; import { B64EncryptionResult } from 'services/uploadService'; import CryptoWorker, { setSessionKeys, generateIntermediateKeyAttributes, } from 'utils/crypto'; import { Spinner } from 'react-bootstrap'; import { getActualKey } from 'utils/common/key'; import { setKeys, UpdatedKey } from 'services/userService'; const Image = styled.img` width: 200px; margin-bottom: 20px; max-width: 100%; `; interface formValues { passphrase: string; confirm: string; } export interface KEK { key: string; opsLimit: number; memLimit: number; } export default function Generate() { const [loading, setLoading] = useState(false); const [token, setToken] = useState(); const router = useRouter(); const key = getKey(SESSION_KEYS.ENCRYPTION_KEY); useEffect(() => { const user = getData(LS_KEYS.USER); if (!user?.token) { router.push('/'); } else { setToken(user.token); } }, []); const onSubmit = async ( values: formValues, { setFieldError }: FormikHelpers ) => { setLoading(true); try { const { passphrase, confirm } = values; if (passphrase === confirm) { const cryptoWorker = await new CryptoWorker(); const key: string = await getActualKey(); const keyAttributes = getData(LS_KEYS.KEY_ATTRIBUTES); const kekSalt: string = await cryptoWorker.generateSaltToDeriveKey(); let kek: KEK; try { kek = await cryptoWorker.deriveSensitiveKey( passphrase, kekSalt ); } catch (e) { setFieldError( 'confirm', constants.PASSWORD_GENERATION_FAILED ); return; } const encryptedKeyAttributes: B64EncryptionResult = await cryptoWorker.encryptToB64( key, kek.key ); const updatedKey: UpdatedKey = { kekSalt, encryptedKey: encryptedKeyAttributes.encryptedData, keyDecryptionNonce: encryptedKeyAttributes.nonce, opsLimit: kek.opsLimit, memLimit: kek.memLimit, }; await setKeys(token, updatedKey); const updatedKeyAttributes = Object.assign( keyAttributes, updatedKey ); setData( LS_KEYS.KEY_ATTRIBUTES, await generateIntermediateKeyAttributes( passphrase, updatedKeyAttributes, key ) ); setSessionKeys(key); router.push('/gallery'); } else { setFieldError('confirm', constants.PASSPHRASE_MATCH_ERROR); } } catch (e) { setFieldError( 'passphrase', `${constants.UNKNOWN_ERROR} ${e.message}` ); } finally { setLoading(false); } }; return ( {/* vault */}

{constants.ENTER_ENC_PASSPHRASE}

{constants.PASSPHRASE_DISCLAIMER()}
initialValues={{ passphrase: '', confirm: '' }} validationSchema={Yup.object().shape({ passphrase: Yup.string().required( constants.REQUIRED ), confirm: Yup.string().required(constants.REQUIRED), })} onSubmit={onSubmit} > {({ values, touched, errors, handleChange, handleBlur, handleSubmit, }) => (
{errors.passphrase} {errors.confirm}
)}
); }