diff --git a/extension/changelog.txt b/extension/changelog.txt index ec81c4289d6..c30014c94e1 100644 --- a/extension/changelog.txt +++ b/extension/changelog.txt @@ -84,7 +84,7 @@ version 8.1.3 on July 31, 2021: Enterprise EIS -version 8.1.1 on June 29, 2021: EKM setup with pass phrase +version 8.1.1 on June 29, 2021: EKM setup with passphrase version 8.1.0 on June 9, 2021: Fix settings layout @@ -114,7 +114,7 @@ version 7.9.8 on Oct 29, 2020: Custom SKS fix -version 7.9.6 on Oct 19, 2020: Preview attachments pass phrase +version 7.9.6 on Oct 19, 2020: Preview attachments passphrase version 7.9.5 on Oct 19, 2020: Wkd Advanced Lookup, UTF files @@ -186,7 +186,7 @@ version 7.5.9 on Feb 1, 2020: Fix pwd msg online reply -version 7.5.5 on Jan 9, 2020: Default don't remember pass phrase +version 7.5.5 on Jan 9, 2020: Default don't remember passphrase version 7.5.4 on Dec 27, 2019: Support ISO-2022-JP @@ -236,7 +236,7 @@ version 7.0.7 on Nov 5, 2019: Contact search bugfix -version 7.0.5 on Oct 18, 2019: Write pass phrase down +version 7.0.5 on Oct 18, 2019: Write passphrase down version 7.0.4 on Oct 10, 2019: Fix sendAs migration @@ -310,7 +310,7 @@ version 6.7.0 on March 23, 2019: Minimize compose window -version 6.6.8 on March 7, 2019: Fix decrypt files with session pass phrase +version 6.6.8 on March 7, 2019: Fix decrypt files with session passphrase version 6.6.7 on March 2, 2019: Bugfixes @@ -346,7 +346,7 @@ version 6.5.2 on January 6, 2019: Unicode fix -version 6.5.0 on January 4, 2019: Fix pass phrase change dialog +version 6.5.0 on January 4, 2019: Fix passphrase change dialog version 6.4.9 on January 2, 2019: Error handling @@ -462,7 +462,7 @@ version 5.9.0 on August 7, 2018: Attestation fix -version 5.8.8 on August 6, 2018: Pass phrase prompt +version 5.8.8 on August 6, 2018: Passphrase prompt version 5.8.7 on August 5, 2018: Key decrypted error @@ -596,7 +596,7 @@ internal: allow extension to work when block 3rd party cookies enabled internal: library upgrades, bugfixes and other maintenance version 5.2.7 on February 19, 2018: Session -reading: fixed decrypting when pass phrase is in session +reading: fixed decrypting when passphrase is in session version 5.2.6 on February 19, 2018: Unicode reading: fixed Russian and Chinese UTF from facebook @@ -622,7 +622,7 @@ tests: improve automated tests version 5.2.0 on February 11, 2018: Security security: double check passphrase strength when trying to back up imported key security -settings: rename to "test my pass phrase" +settings: rename to "test my passphrase" reading: support eM client compatibility version 5.1.9 on January 31, 2018: Public key management @@ -745,7 +745,7 @@ internal: fix key array migration missing key internal: update openpgp.js version 4.3.5 on July 21, 2017: Migration fix -internal: getting pass phrase during migrations fixed +internal: getting passphrase during migrations fixed version 4.3.4 on July 20, 2017: Attest fix setup: fixing attest element @@ -799,7 +799,7 @@ internal: better reporting of unhandled promise errors internal: prepare comose.js for desktop internal: libsync from desktop internal: consolidate new_message and reply_message into one template refactor -settings: Repeat password -> Repeat pass phrase placeholder backup +settings: Repeat password -> Repeat passphrase placeholder backup reading: fix formatting of password messages version 4.2.1 on June 25, 2017: Bugfixes @@ -846,7 +846,7 @@ composing: drag and drop attachments reading: recognize public keys sent as inner attachment of pgp message reading: recognize pubkeys inside encrypted messages reading: Compatibility issues with encrypted.asc -reading: enter pass phrase misbehaved with "show original message" +reading: enter passphrase misbehaved with "show original message" reading: "Forget passphrase when I close chrome" in firefox fixed setup: fix wording after setup done @@ -970,7 +970,7 @@ internal: document.body.append is not a function bug version 3.9.0 on March 30, 2017: Experimental Client settings: alternative email client reading: improve MIME support -setup: mention in backup email that it's protected by pass phrase +setup: mention in backup email that it's protected by passphrase version 3.8.9 on March 28, 2017: Fix xss security: fix xss issue outside of pgp blocks @@ -1151,7 +1151,7 @@ design: changed size of profile image on setup version 3.4.1 on February 19, 2017: User Friendly reading: badly displayed verification message result -reading: correct pass phrase will get rejected when opening email +reading: correct passphrase will get rejected when opening email reading: FlowCrypt failing to render decrypted messages reading: google auth keeps reappearing on spotty internet reading: switch-to-encrypted and show-original buttons improved @@ -1379,7 +1379,7 @@ reading: fixed issue with very large messages + more efficient reading: better message decrypting behavior on update or uninstall setup: checking public key fingerprints on keyserver setup: fixed bug in internal plugin messaging during setup -setup: evaluating pass phrase strength error fix +setup: evaluating passphrase strength error fix version 2.8.4 on December 29, 2016: Improved Message Detection reading: more robust and faster pgp block replacing @@ -1403,7 +1403,7 @@ setup: Public Key Server page blank screen fix setup: updated chrome content settings instructions setup: uninstall stats setup: uncaught exceptions handling -reading: fixed broken pass phrase dialog +reading: fixed broken passphrase dialog reading: improved compatibility with PGP/MIME composing: stopped repeated 404 errors when missing a draft @@ -1428,8 +1428,8 @@ setup: increased minimal passphrase strength setup: fixed broken pubkey submitting on keyservers page setup: fixed broken checkboxes on manual setup page -version 2.5.6 on December 14, 2016: Pass phrase change -setup: create a new backup on pass phrase change +version 2.5.6 on December 14, 2016: Passphrase change +setup: create a new backup on passphrase change setup: smoother plugin update: prompt to refresh gmail composing: opened compose window won't close - bugfix @@ -1479,7 +1479,7 @@ composing: first time users send button freeze fix version 2.4.0 on November 22, 2016: human feedback setup: guide user to send their first email -setup: explain what is pass phrase for +setup: explain what is passphrase for setup: suggest to refresh gmail window after installation setup: explain what is backup email for setup: centering loading symbol @@ -1570,13 +1570,13 @@ setup: don't rely on English language version 1.8.0 on April 17, 2016: Drafts composing: encrypted drafts functionality -setup: remember pass phrase and submit pubkey by default for new keys +setup: remember passphrase and submit pubkey by default for new keys version 1.7.0 on April 14, 2016: Contacts composing: search google contacts in new messge and reply box composing: add all recipients on group reply composing: change any recipient on reply -setup: changing pass phrase +setup: changing passphrase version 1.6.0 on April 11, 2016: Public key management setup: see and manage list of pubkeys @@ -1587,14 +1587,14 @@ composing: contacts search is case insensitive reading: load pgp pubkey blocs into pubkey cache version 1.5.0 on April 9, 2016: Private key best practices and backups -reading: better pass phrase dialog +reading: better passphrase dialog security: more and clearer setup and backup options -security: pass phrase strength bar + examples +security: passphrase strength bar + examples security: better always encrypting private key replying: triple recipient bugfix design: new logo -version 1.4.0 on Mar 27, 2016: Session based private key pass phrase +version 1.4.0 on Mar 27, 2016: Session based private key passphrase security: manual setup has option to forget passphrase security: session passphrase entering dialog reading: attachment file icons diff --git a/extension/chrome/elements/backup.htm b/extension/chrome/elements/backup.htm index 0851bc0fecb..afe1ae92349 100644 --- a/extension/chrome/elements/backup.htm +++ b/extension/chrome/elements/backup.htm @@ -13,10 +13,10 @@
- This backup is protected by your pass phrase. Please make sure to note your pass phrase down or you may lose access to your encrypted emails! + This backup is protected by your passphrase. Please make sure to note your passphrase down or you may lose access to your encrypted emails!
- +
Key Fingerprint:
diff --git a/extension/chrome/elements/backup.ts b/extension/chrome/elements/backup.ts index 34093c9f387..fe3675e49ef 100644 --- a/extension/chrome/elements/backup.ts +++ b/extension/chrome/elements/backup.ts @@ -83,10 +83,10 @@ View.run( private testPassphraseHandler = async () => { if (await KeyUtil.checkPassPhrase(this.armoredPrvBackup, String($('#pass_phrase').val()))) { - await Ui.modal.info('Success - your pass phrase matches this backup!'); + await Ui.modal.info('Success - your passphrase matches this backup!'); } else { await Ui.modal.warning( - "Pass phrase did not match. Please try again. If you forgot your pass phrase, please change it, so that you don't get" + + "Passphrase did not match. Please try again. If you forgot your passphrase, please change it, so that you don't get" + ' locked out of your encrypted messages.' ); } diff --git a/extension/chrome/elements/compose-modules/compose-draft-module.ts b/extension/chrome/elements/compose-modules/compose-draft-module.ts index bc2ba73e173..51ee98669fc 100644 --- a/extension/chrome/elements/compose-modules/compose-draft-module.ts +++ b/extension/chrome/elements/compose-modules/compose-draft-module.ts @@ -376,9 +376,9 @@ export class ComposeDraftModule extends ViewModule { Xss.sanitizeRender( this.view.S.cached('prompt'), ` -
Waiting for pass phrase to open draft...
+
Waiting for passphrase to open draft...
- +
` diff --git a/extension/chrome/elements/compose-modules/compose-err-module.ts b/extension/chrome/elements/compose-modules/compose-err-module.ts index 146760a3a4e..2f7dfab8d1a 100644 --- a/extension/chrome/elements/compose-modules/compose-err-module.ts +++ b/extension/chrome/elements/compose-modules/compose-err-module.ts @@ -174,7 +174,7 @@ export class ComposeErrModule extends ViewModule { if (pwd) { if (await this.view.storageModule.isPwdMatchingPassphrase(pwd)) { throw new ComposerUserError( - 'Please do not use your private key pass phrase as a password for this message.\n\n' + + 'Please do not use your private key passphrase as a password for this message.\n\n' + 'You should come up with some other unique password that you can share with recipient.' ); } diff --git a/extension/chrome/elements/compose-modules/compose-storage-module.ts b/extension/chrome/elements/compose-modules/compose-storage-module.ts index c4a76c6173f..07f7c34f2e7 100644 --- a/extension/chrome/elements/compose-modules/compose-storage-module.ts +++ b/extension/chrome/elements/compose-modules/compose-storage-module.ts @@ -80,8 +80,8 @@ export class ComposeStorageModule extends ViewModule { }; /** - * returns decrypted key (potentially using user-entered pass phrase) - * otherwise throws ComposerResetBtnTrigger when pass phrase not entered + * returns decrypted key (potentially using user-entered passphrase) + * otherwise throws ComposerResetBtnTrigger when passphrase not entered */ public decryptSenderKey = async (parsedKey: ParsedKeyInfo): Promise => { const passphrase = await this.passphraseGet(parsedKey.keyInfo); @@ -92,7 +92,7 @@ export class ComposeStorageModule extends ViewModule { return await this.decryptSenderKey(parsedKey); } else { // reset - no passphrase entered - throw new ComposerResetBtnTrigger('no pass phrase entered'); + throw new ComposerResetBtnTrigger('no passphrase entered'); } } else { if (!parsedKey.key.fullyDecrypted) { diff --git a/extension/chrome/elements/compose-modules/formatters/general-mail-formatter.ts b/extension/chrome/elements/compose-modules/formatters/general-mail-formatter.ts index b3c3091cc59..a6271402b40 100644 --- a/extension/chrome/elements/compose-modules/formatters/general-mail-formatter.ts +++ b/extension/chrome/elements/compose-modules/formatters/general-mail-formatter.ts @@ -85,7 +85,7 @@ export class GeneralMailFormatter { if (!parsedSenderPrv) { return undefined; } - // throws ComposerResetBtnTrigger when user closes pass phrase dialog without entering + // throws ComposerResetBtnTrigger when user closes passphrase dialog without entering return await view.storageModule.decryptSenderKey(parsedSenderPrv); } diff --git a/extension/chrome/elements/passphrase.htm b/extension/chrome/elements/passphrase.htm index 95b31cdfa00..17509c49bc8 100644 --- a/extension/chrome/elements/passphrase.htm +++ b/extension/chrome/elements/passphrase.htm @@ -38,9 +38,9 @@

Lost pass phrase?
+ >
Lost passphrase?
- Ask your IT staff for help if you lost your pass phrase. + Ask your IT staff for help if you lost your passphrase.
diff --git a/extension/chrome/elements/passphrase.ts b/extension/chrome/elements/passphrase.ts index 9b909361567..f30ef7a8ab5 100644 --- a/extension/chrome/elements/passphrase.ts +++ b/extension/chrome/elements/passphrase.ts @@ -105,7 +105,7 @@ View.run( if (this.keysWeNeedPassPhraseFor.length === 1) { html = `For key Fingerprint: ${Xss.escape(Str.spaced(this.keysWeNeedPassPhraseFor[0].fingerprints[0] || ''))}`; } else { - html = 'Pass phrase needed for any of the following keys:'; + html = 'Passphrase needed for any of the following keys:'; for (const i of this.keysWeNeedPassPhraseFor.keys()) { html += `
Fingerprint ${String(i + 1)}: ${Xss.escape( Str.spaced(this.keysWeNeedPassPhraseFor[i].fingerprints[0]) || '' @@ -146,12 +146,12 @@ View.run( Change Pass Phrase.
It will let you change it without knowing the previous one. When done, reset FlowCrypt on this device - and use the new pass phrase during the recovery step when + and use the new passphrase during the recovery step when you set up FlowCrypt on this device again.

If no: unfortunately, you will not be able to read previously encrypted emails regardless of what you do. You can reset FlowCrypt on this device - and then click Lost your pass phrase? during recovery step. + and then click Lost your passphrase? during recovery step.

`, true @@ -227,7 +227,7 @@ View.run( let unlockCount = 0; // may include non-matching keys const allPrivateKeys = await KeyStore.get(this.acctEmail); for (const keyinfo of allPrivateKeys) { - // if passphrase matches more keys, it will save the pass phrase for all keys + // if passphrase matches more keys, it will save the passphrase for all keys const prv = await KeyUtil.parse(keyinfo.private); try { if (await KeyUtil.decrypt(prv, pass)) { @@ -252,7 +252,7 @@ View.run( } } if (unlockCount && allPrivateKeys.length > 1) { - Ui.toast(`${unlockCount} of ${allPrivateKeys.length} keys ${unlockCount > 1 ? 'were' : 'was'} unlocked by this pass phrase`); + Ui.toast(`${unlockCount} of ${allPrivateKeys.length} keys ${unlockCount > 1 ? 'were' : 'was'} unlocked by this passphrase`); await this.closeDialogPageOpenedExternally(); } if (atLeastOneMatched) { diff --git a/extension/chrome/elements/pgp_block_modules/pgp-block-render-module.ts b/extension/chrome/elements/pgp_block_modules/pgp-block-render-module.ts index b559ee528b5..f9d2c8584c4 100644 --- a/extension/chrome/elements/pgp_block_modules/pgp-block-render-module.ts +++ b/extension/chrome/elements/pgp_block_modules/pgp-block-render-module.ts @@ -117,7 +117,7 @@ export class PgpBlockViewRenderModule { public renderPassphraseNeeded = (longids: string[]) => { const enterPp = `${Lang.pgpBlock.enterPassphrase} ${Lang.pgpBlock.toOpenMsg}`; - this.view.errorModule.renderErr(enterPp, undefined, 'pass phrase needed'); + this.view.errorModule.renderErr(enterPp, undefined, 'passphrase needed'); $('.enter_passphrase').on( 'click', this.view.setHandler(() => { diff --git a/extension/chrome/elements/shared/backup.template.htm b/extension/chrome/elements/shared/backup.template.htm index 9ad1e14b78a..8844f98d813 100644 --- a/extension/chrome/elements/shared/backup.template.htm +++ b/extension/chrome/elements/shared/backup.template.htm @@ -56,7 +56,7 @@

- Back up private key in your Gmail Inbox. The security depends on the strength of your pass phrase, which should be very long and hard to guess. + Back up private key in your Gmail Inbox. The security depends on the strength of your passphrase, which should be very long and hard to guess. Best option for most users.

@@ -72,7 +72,7 @@

- Manage the backup file yourself. To prevent data loss, you will need this file and your pass phrase if you ever lose your device or it stops + Manage the backup file yourself. To prevent data loss, you will need this file and your passphrase if you ever lose your device or it stops working.

diff --git a/extension/chrome/elements/shared/create_key.template.htm b/extension/chrome/elements/shared/create_key.template.htm index 9f96f9d33c9..6fbd8d61b44 100644 --- a/extension/chrome/elements/shared/create_key.template.htm +++ b/extension/chrome/elements/shared/create_key.template.htm @@ -1,12 +1,12 @@
- Choose pass phrase to protect your encrypted emails. choosing secure pass phrases + Choose passphrase to protect your encrypted emails. choosing secure passphrases
diff --git a/extension/chrome/emails/email_intro.template.htm b/extension/chrome/emails/email_intro.template.htm index 3731b4590c1..d4a13564a9c 100644 --- a/extension/chrome/emails/email_intro.template.htm +++ b/extension/chrome/emails/email_intro.template.htm @@ -2,11 +2,11 @@
- This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave + This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it.

-
The key below is protected with pass phrase that only you know. You should make sure to note your pass phrase down.
+
The key below is protected with passphrase that only you know. You should make sure to note your passphrase down.

DO NOT DELETE THIS EMAIL. Email human@flowcrypt.com if you need help. We respond promptly. diff --git a/extension/chrome/settings/modules/add_key.htm b/extension/chrome/settings/modules/add_key.htm index 30ff0047375..8cc1adb8906 100644 --- a/extension/chrome/settings/modules/add_key.htm +++ b/extension/chrome/settings/modules/add_key.htm @@ -59,7 +59,7 @@

Add Private Key

- This key is unprotected. Create a pass phrase or + This key is unprotected. Create a passphrase or use a random one .
@@ -69,7 +69,7 @@

Add Private Key

diff --git a/extension/chrome/settings/modules/add_key.ts b/extension/chrome/settings/modules/add_key.ts index 0d79a8e90c3..227819287ea 100644 --- a/extension/chrome/settings/modules/add_key.ts +++ b/extension/chrome/settings/modules/add_key.ts @@ -119,7 +119,7 @@ export class AddKeyView extends View { private addPrivateKeyHandler = async (submitBtn: HTMLElement) => { if (submitBtn.className.includes('gray')) { - await Ui.modal.warning('Please double check the pass phrase input field for any issues.'); + await Ui.modal.warning('Please double check the passphrase input field for any issues.'); return; } try { diff --git a/extension/chrome/settings/modules/change_passphrase.htm b/extension/chrome/settings/modules/change_passphrase.htm index 6cc6ee253ff..a9ef0f5e611 100644 --- a/extension/chrome/settings/modules/change_passphrase.htm +++ b/extension/chrome/settings/modules/change_passphrase.htm @@ -16,9 +16,9 @@
-
Enter your current pass phrase
+
Enter your current passphrase
- +
@@ -27,20 +27,20 @@
- +
- +
-
Loss of this pass phrase cannot be recovered.
+
Loss of this passphrase cannot be recovered.
-
Please repeat it one more time. Make sure to note the pass phrase down.
+
Please repeat it one more time. Make sure to note the passphrase down.
- +
diff --git a/extension/chrome/settings/modules/change_passphrase.ts b/extension/chrome/settings/modules/change_passphrase.ts index 9c0ac87656b..e70d03c3fcd 100644 --- a/extension/chrome/settings/modules/change_passphrase.ts +++ b/extension/chrome/settings/modules/change_passphrase.ts @@ -48,10 +48,10 @@ View.run( const privateKeys = await KeyStore.get(this.acctEmail); if (privateKeys.length > 1) { $('#step_0_enter_current .sentence').text('Enter the current passphrase for your key'); - $('#step_0_enter_current #current_pass_phrase').attr('placeholder', 'Current key pass phrase'); - $('#step_1_enter_new #new_pass_phrase').attr('placeholder', 'Enter a new key pass phrase'); + $('#step_0_enter_current #current_pass_phrase').attr('placeholder', 'Current key passphrase'); + $('#step_1_enter_new #new_pass_phrase').attr('placeholder', 'Enter a new key passphrase'); } - // todo - should be working across all keys. Existing keys may be encrypted for various pass phrases, + // todo - should be working across all keys. Existing keys may be encrypted for various passphrases, // which will complicate UI once implemented this.mostUsefulPrv = KeyStoreUtil.chooseMostUseful(await KeyStoreUtil.parse(await KeyStore.getRequired(this.acctEmail)), 'EVEN-IF-UNUSABLE'); // eslint-disable-next-line @typescript-eslint/no-non-null-assertion @@ -107,7 +107,7 @@ View.run( $('#new_pass_phrase').trigger('focus'); } else { await this.bruteForceProtection.passphraseCheckFailed(); - await Ui.modal.error('Pass phrase did not match, please try again.'); + await Ui.modal.error('Passphrase did not match, please try again.'); $('#current_pass_phrase').val('').trigger('focus'); } }; @@ -117,7 +117,7 @@ View.run( this.displayBlock('step_2_confirm_new'); $('#new_pass_phrase_confirm').trigger('focus'); } else { - await Ui.modal.warning('Please select a stronger pass phrase. Combinations of 4 to 5 uncommon words are the best.'); + await Ui.modal.warning('Please select a stronger passphrase. Combinations of 4 to 5 uncommon words are the best.'); } }; @@ -131,7 +131,7 @@ View.run( private actionDoChangePassPhraseHandler = async () => { const newPp = String($('#new_pass_phrase').val()); if (newPp !== $('#new_pass_phrase_confirm').val()) { - await Ui.modal.warning('The two pass phrases do not match, please try again.'); + await Ui.modal.warning('The two passphrases do not match, please try again.'); $('#new_pass_phrase_confirm').val(''); $('#new_pass_phrase_confirm').trigger('focus'); return; @@ -154,10 +154,10 @@ View.run( await PassphraseStore.set('session', this.acctEmail, this.mostUsefulPrv!.keyInfo, shouldSavePassphraseInStorage ? undefined : newPp); /* eslint-enable @typescript-eslint/no-non-null-assertion */ if (this.clientConfiguration.canBackupKeys()) { - await Ui.modal.info('Now that you changed your pass phrase, you should back up your key. New backup will be protected with new passphrase.'); + await Ui.modal.info('Now that you changed your passphrase, you should back up your key. New backup will be protected with new passphrase.'); Settings.redirectSubPage(this.acctEmail, this.parentTabId, '/chrome/settings/modules/backup.htm', '&action=backup_manual'); } else { - await Ui.modal.info('Pass phrase changed for this device'); + await Ui.modal.info('Passphrase changed for this device'); BrowserMsg.send.closePage(this.parentTabId); } }; diff --git a/extension/chrome/settings/modules/my_key.htm b/extension/chrome/settings/modules/my_key.htm index 1da60c7be2c..8a4da802442 100644 --- a/extension/chrome/settings/modules/my_key.htm +++ b/extension/chrome/settings/modules/my_key.htm @@ -48,7 +48,7 @@ >  revocation certificate
-

Private key pass phrase

+

Private key passphrase

- This key is unprotected. Create a pass phrase or + This key is unprotected. Create a passphrase or use a random one.
@@ -167,7 +167,7 @@

Set Up FlowCrypt

@@ -194,13 +194,13 @@

Set Up FlowCrypt

- Choose pass phrase to protect your encrypted emails. choosing secure pass phrases + Choose passphrase to protect your encrypted emails. choosing secure passphrases
Set Up FlowCrypt Set Up FlowCrypt

Your keys are managed with your organization's Email Key Manager.

@@ -231,15 +231,15 @@

Set Up FlowCrypt

-
Found of your account key. Enter your pass phrase to continue.
+
Found of your account key. Enter your passphrase to continue.
- +
diff --git a/extension/chrome/settings/setup.ts b/extension/chrome/settings/setup.ts index 5c9c47a375e..06932222db0 100644 --- a/extension/chrome/settings/setup.ts +++ b/extension/chrome/settings/setup.ts @@ -263,7 +263,7 @@ export class SetupView extends View { Change Pass Phrase.
It will let you change it without knowing the previous one. When done, reload this page - and use the new pass phrase. + and use the new passphrase.

If no: unfortunately, you will not be able to read previously encrypted emails regardless of what you do. You can skip recovery diff --git a/extension/chrome/settings/setup/setup-import-key.ts b/extension/chrome/settings/setup/setup-import-key.ts index 91f4862a9a5..2b185a25364 100644 --- a/extension/chrome/settings/setup/setup-import-key.ts +++ b/extension/chrome/settings/setup/setup-import-key.ts @@ -16,7 +16,7 @@ export class SetupImportKeyModule { public actionImportPrivateKeyHandle = async (button: HTMLElement) => { if (button.className.includes('gray')) { - await Ui.modal.warning('Please double check the pass phrase input field for any issues.'); + await Ui.modal.warning('Please double check the passphrase input field for any issues.'); return; } /* eslint-disable @typescript-eslint/naming-convention */ diff --git a/extension/chrome/settings/setup/setup-key-manager-autogen.ts b/extension/chrome/settings/setup/setup-key-manager-autogen.ts index bcf04b66593..a528578f150 100644 --- a/extension/chrome/settings/setup/setup-key-manager-autogen.ts +++ b/extension/chrome/settings/setup/setup-key-manager-autogen.ts @@ -127,6 +127,6 @@ export class SetupWithEmailKeyManagerModule { 'Failed to store newly generated key on FlowCrypt Email Key Manager', Lang.general.contactIfNeedAssistance(this.view.isCustomerUrlFesUsed()) ); - await saveKeysAndPassPhrase(this.view.acctEmail, [await KeyUtil.parse(generated.private)], setupOptions); // store encrypted key + pass phrase locally + await saveKeysAndPassPhrase(this.view.acctEmail, [await KeyUtil.parse(generated.private)], setupOptions); // store encrypted key + passphrase locally }; } diff --git a/extension/chrome/settings/setup/setup-recover-key.ts b/extension/chrome/settings/setup/setup-recover-key.ts index 2d8ce05ca61..cd03ab330dd 100644 --- a/extension/chrome/settings/setup/setup-recover-key.ts +++ b/extension/chrome/settings/setup/setup-recover-key.ts @@ -26,7 +26,7 @@ export class SetupRecoverKeyModule { return; } if (!passphrase) { - await Ui.modal.warning('Please enter the pass phrase you used when you first set up FlowCrypt, so that we can recover your original keys.'); + await Ui.modal.warning('Please enter the passphrase you used when you first set up FlowCrypt, so that we can recover your original keys.'); return; } let matchedPreviouslyRecoveredKey = false; @@ -47,13 +47,13 @@ export class SetupRecoverKeyModule { if (!newlyMatchingKeys.length) { if (matchedPreviouslyRecoveredKey) { $('#recovery_password').val(''); - await Ui.modal.warning('This is a correct pass phrase, but it matches a key that was already recovered. Please try another pass phrase.'); + await Ui.modal.warning('This is a correct passphrase, but it matches a key that was already recovered. Please try another passphrase.'); } else if (this.view.fetchedKeyBackupsUniqueLongids.length > 1) { await Ui.modal.warning( - `This pass phrase did not match any of your ${this.view.fetchedKeyBackupsUniqueLongids.length} backed up keys. Please try again.` + `This passphrase did not match any of your ${this.view.fetchedKeyBackupsUniqueLongids.length} backed up keys. Please try again.` ); } else { - await Ui.modal.warning('This pass phrase did not match your original setup. Please try again.'); + await Ui.modal.warning('This passphrase did not match your original setup. Please try again.'); } return; } @@ -107,7 +107,7 @@ export class SetupRecoverKeyModule { }) ); } else { - Xss.sanitizeRender('#step_2_recovery .recovery_status', `There ${txtKeysTeft} left to recover.

Try different pass phrases to unlock all backups.`); + Xss.sanitizeRender('#step_2_recovery .recovery_status', `There ${txtKeysTeft} left to recover.

Try different passphrases to unlock all backups.`); $('#step_2_recovery .line_skip_recovery').css('display', 'none'); } }; diff --git a/extension/chrome/settings/setup/setup-render.ts b/extension/chrome/settings/setup/setup-render.ts index 45c97e3f312..19c24a20ea9 100644 --- a/extension/chrome/settings/setup/setup-render.ts +++ b/extension/chrome/settings/setup/setup-render.ts @@ -54,7 +54,7 @@ export class SetupRenderModule { public renderSetupDone = async () => { const storedKeys = await KeyStore.get(this.view.acctEmail); if (this.view.fetchedKeyBackupsUniqueLongids.length > storedKeys.length) { - // recovery where not all keys were processed: some may have other pass phrase + // recovery where not all keys were processed: some may have other passphrase this.displayBlock('step_4_more_to_recover'); $('h1').text('More keys to recover'); $('.email').text(this.view.acctEmail); diff --git a/extension/chrome/texts/passphrase_help.htm b/extension/chrome/texts/passphrase_help.htm index efd15e45270..9696c608872 100644 --- a/extension/chrome/texts/passphrase_help.htm +++ b/extension/chrome/texts/passphrase_help.htm @@ -9,7 +9,7 @@ >

Combinations like that are memorable, easy to type and the most secure.

- In contrast, pass phrases like @ut0m4t3d, Honey167! or lA45pf8$d are a poor + In contrast, passphrases like @ut0m4t3d, Honey167! or lA45pf8$d are a poor choice when it comes to security. Because they are so short, on a fleet of 10,000 ordinary computers, these can be guessed in 7 seconds.

diff --git a/extension/js/common/assert.ts b/extension/js/common/assert.ts index e95aaecda03..66b91a4d27e 100644 --- a/extension/js/common/assert.ts +++ b/extension/js/common/assert.ts @@ -49,7 +49,7 @@ export class Assert { // eslint-disable-next-line @typescript-eslint/no-non-null-assertion await Settings.renderSubPage(acctEmail, tabId!, '/chrome/settings/modules/change_passphrase.htm'); } else { - const msg = `Protect your key with a pass phrase to finish setup.`; + const msg = `Protect your key with a passphrase to finish setup.`; const r = await Ui.renderOverlayPromptAwaitUserChoice( { finishSetup: {}, later: { color: 'gray' } }, msg, diff --git a/extension/js/common/client-configuration.ts b/extension/js/common/client-configuration.ts index a0601a461c7..351a2ac44e1 100644 --- a/extension/js/common/client-configuration.ts +++ b/extension/js/common/client-configuration.ts @@ -128,7 +128,7 @@ export class ClientConfiguration { }; /** - * pass phrase session length to be configurable with client configuraiton + * passphrase session length to be configurable with client configuraiton * default 4 hours */ public getInMemoryPassPhraseSessionExpirationMs = (): number => { @@ -166,8 +166,8 @@ export class ClientConfiguration { }; /** - * Normally, during setup, "remember pass phrase" is unchecked - * This option will cause "remember pass phrase" option to be checked by default + * Normally, during setup, "remember passphrase" is unchecked + * This option will cause "remember passphrase" option to be checked by default * This behavior is also enabled as a byproduct of PASS_PHRASE_QUIET_AUTOGEN */ public rememberPassPhraseByDefault = (): boolean => { @@ -197,10 +197,10 @@ export class ClientConfiguration { }; /** - * When generating keys, user will not be prompted to choose a pass phrase - * Instead a pass phrase will be automatically generated, and stored locally - * The pass phrase will NOT be displayed to user, and it will never be asked of the user - * This creates the smoothest user experience, for organisations that use full-disk-encryption and don't need pass phrase protection + * When generating keys, user will not be prompted to choose a passphrase + * Instead a passphrase will be automatically generated, and stored locally + * The passphrase will NOT be displayed to user, and it will never be asked of the user + * This creates the smoothest user experience, for organisations that use full-disk-encryption and don't need passphrase protection */ public mustAutogenPassPhraseQuietly = (): boolean => { return this.usesKeyManager() && (this.clientConfigurationJson.flags || []).includes('PASS_PHRASE_QUIET_AUTOGEN'); diff --git a/extension/js/common/core/crypto/key.ts b/extension/js/common/core/crypto/key.ts index 07d5478b788..eb017bb436f 100644 --- a/extension/js/common/core/crypto/key.ts +++ b/extension/js/common/core/crypto/key.ts @@ -222,7 +222,7 @@ export class KeyUtil { // if (await KeyUtil.decrypt(parsed, passPhrase, undefined, 'OK-IF-ALREADY-DECRYPTED')) { allKeys.push(parsed); // } else { - // allErr.push(new Error(`Wrong pass phrase for OpenPGP key ${parsed.id} (${parsed.emails[0]})`)); + // allErr.push(new Error(`Wrong passphrase for OpenPGP key ${parsed.id} (${parsed.emails[0]})`)); // } } catch (e) { allErr.push(e as Error); diff --git a/extension/js/common/core/crypto/pgp/msg-util.ts b/extension/js/common/core/crypto/pgp/msg-util.ts index 00773e275b6..c724b57b471 100644 --- a/extension/js/common/core/crypto/pgp/msg-util.ts +++ b/extension/js/common/core/crypto/pgp/msg-util.ts @@ -207,7 +207,7 @@ export class MsgUtil { if (!keys.prvForDecryptDecrypted.length && (!msgPwd || prepared.isPkcs7)) { return { success: false, - error: { type: DecryptErrTypes.needPassphrase, message: 'Missing pass phrase' }, + error: { type: DecryptErrTypes.needPassphrase, message: 'Missing passphrase' }, longids, isEncrypted, }; diff --git a/extension/js/common/core/crypto/pgp/pgp-password.ts b/extension/js/common/core/crypto/pgp/pgp-password.ts index 464aa9bc487..e44290f1673 100644 --- a/extension/js/common/core/crypto/pgp/pgp-password.ts +++ b/extension/js/common/core/crypto/pgp/pgp-password.ts @@ -35,7 +35,7 @@ export class PgpPwd { ]; private static CRACK_TIME_WORDS_PASS_PHRASE = [ - // the requirements for a pass phrase are meant to be strict + // the requirements for a passphrase are meant to be strict { match: 'millenni', word: 'perfect', bar: 100, color: 'green', pass: true }, { match: 'centu', word: 'great', bar: 80, color: 'green', pass: true }, { match: 'year', word: 'good', bar: 60, color: 'orange', pass: true }, @@ -81,13 +81,13 @@ export class PgpPwd { 'words', 'in', 'them', - 'Best pass phrases are long', + 'Best passphrases are long', 'have several words', 'in them', 'bestpassphrasesarelong', 'haveseveralwords', 'inthem', - 'Loss of this pass phrase', + 'Loss of this passphrase', 'cannot be recovered', 'Note it down', 'on a paper', @@ -99,7 +99,7 @@ export class PgpPwd { 'set password', 'set pass word', 'setpassphrase', - 'set pass phrase', + 'set passphrase', 'set passphrase', ]; }; diff --git a/extension/js/common/lang.ts b/extension/js/common/lang.ts index fef5f946685..06d1e1a6a04 100644 --- a/extension/js/common/lang.ts +++ b/extension/js/common/lang.ts @@ -39,19 +39,19 @@ export const Lang = { confirmSkipRecovery: 'Your account will be set up for encryption again, but your previous encrypted emails will be unreadable. You will need to inform your encrypted contacts that you have a new key. Regular email will not be affected. Are you sure?', nBackupsAlreadyRecoveredOrLeft: (nGot: number, nBups: number, txtTeft: string) => - `You successfully recovered ${nGot} of ${nBups} backups. There ${txtTeft} left.

Try a different pass phrase to unlock all backups.`, + `You successfully recovered ${nGot} of ${nBups} backups. There ${txtTeft} left.

Try a different passphrase to unlock all backups.`, tryDifferentPassPhraseForRemainingBackups: - 'This pass phrase was already used to recover some of your backups.\n\nThe remaining backups use a different pass phrase.\n\nPlease try another one.\n\nYou can skip this step, but some of your encrypted email may not be readable.', + 'This passphrase was already used to recover some of your backups.\n\nThe remaining backups use a different passphrase.\n\nPlease try another one.\n\nYou can skip this step, but some of your encrypted email may not be readable.', creatingKeysNotAllowedPleaseImport: 'Creating keys is not allowed on your domain. Please import your keys.', keyBackupsNotAllowed: 'Key backups are not allowed on this domain.', prvHasFixableCompatIssue: 'This key has minor usability issues that can be fixed. This commonly happens when importing keys from Symantec™ PGP Desktop or other legacy software.It may be missing user IDs, a self-signature, or have an invalid user ID (e.g., a user ID with image data). It is also possible that the key is simply expired.', - ppMatchAllSet: "Your pass phrase matches. Good job! You're all set.", + ppMatchAllSet: "Your passphrase matches. Good job! You're all set.", noKeys: 'Keys for your account were not set up yet - please ask your systems administrator.', prvBackupToDesignatedMailboxEmailSubject: (acctEmail: string, fingerprint: string) => `FlowCrypt OpenPGP Private Key backup for user ${acctEmail} with id ${fingerprint}`, prvBackupToDesignatedMailboxEmailBody: - "Please keep this email and attachment in the mailbox for safekeeping. It will be needed if the user ever needs to set up FlowCrypt again or forgets their pass phrase. Without this, the user won't be able to read their emails.\n\nSee https://flowcrypt.com/docs/technical/enterprise/configuration/backup-to-designated-mailbox.html#account-recovery.", + "Please keep this email and attachment in the mailbox for safekeeping. It will be needed if the user ever needs to set up FlowCrypt again or forgets their passphrase. Without this, the user won't be able to read their emails.\n\nSee https://flowcrypt.com/docs/technical/enterprise/configuration/backup-to-designated-mailbox.html#account-recovery.", }, account: { googleAcctDisabledOrPolicy: `Your Google Account or Google Email seems to be disabled, or access to this app is disabled by your organisation admin policy. Contact your email administrator.`, @@ -144,13 +144,13 @@ export const Lang = { emailAliasChangedAskForReload: 'Your email aliases on Gmail have refreshed since the last time you used FlowCrypt.\nReload the compose window now?', }, passphraseRequired: { - sign: 'Enter FlowCrypt pass phrase to sign email', - draft: 'Enter FlowCrypt pass phrase to load a draft', - attachment: 'Enter FlowCrypt pass phrase to decrypt a file', - quote: 'Enter FlowCrypt pass phrase to load quoted content', - backup: 'Enter FlowCrypt pass phrase to back up', - updateKey: 'Enter FlowCrypt pass phrase to keep your account keys up to date', - email: 'Enter FlowCrypt pass phrase to read encrypted email', + sign: 'Enter FlowCrypt passphrase to sign email', + draft: 'Enter FlowCrypt passphrase to load a draft', + attachment: 'Enter FlowCrypt passphrase to decrypt a file', + quote: 'Enter FlowCrypt passphrase to load quoted content', + backup: 'Enter FlowCrypt passphrase to back up', + updateKey: 'Enter FlowCrypt passphrase to keep your account keys up to date', + email: 'Enter FlowCrypt passphrase to read encrypted email', }, settings: { deleteKeyConfirm: (fingerprint: string) => `Are you sure you want to remove encryption key with fingerprint ${fingerprint}?`, diff --git a/extension/js/common/platform/store/passphrase-store.ts b/extension/js/common/platform/store/passphrase-store.ts index 763f2e9606b..a4d59460f2a 100644 --- a/extension/js/common/platform/store/passphrase-store.ts +++ b/extension/js/common/platform/store/passphrase-store.ts @@ -8,7 +8,7 @@ import { InMemoryStore } from './in-memory-store.js'; import { ClientConfiguration } from '../../client-configuration.js'; /** - * Local or session store of pass phrases + * Local or session store of passphrases */ export class PassphraseStore extends AbstractStore { // if we implement (and migrate) password storage to use KeyIdentity instead of longid, we'll have `keyInfo: KeyIdentity` here diff --git a/extension/js/common/settings.ts b/extension/js/common/settings.ts index 311658ee1ff..1d5de8094af 100644 --- a/extension/js/common/settings.ts +++ b/extension/js/common/settings.ts @@ -132,7 +132,7 @@ export class Settings { if (!oldAcctEmailIndexPrefix) { throw new Error(`Filter is empty for account_email "${oldAcctEmail}"`); } - // in case the destination email address was already set up with an account, recover keys and pass phrases before it's overwritten + // in case the destination email address was already set up with an account, recover keys and passphrases before it's overwritten const oldAccountPrivateKeys = await KeyStore.get(oldAcctEmail); const newAccountPrivateKeys = await KeyStore.get(newAcctEmail); const oldAcctPassPhrases: KeyInfoWithIdentityAndOptionalPp[] = []; @@ -535,8 +535,8 @@ export class Settings { '', 'NOTE DOWN YOUR PASS PHRASE IN A SAFE PLACE THAT YOU CAN FIND LATER', '', - 'If this key was registered on a keyserver (typically they are), you will need this same key (and pass phrase!) to replace it.', - 'In other words, losing this key or pass phrase may cause people to have trouble writing you encrypted emails, even if you use another key (on FlowCrypt or elsewhere) later on!', + 'If this key was registered on a keyserver (typically they are), you will need this same key (and passphrase!) to replace it.', + 'In other words, losing this key or passphrase may cause people to have trouble writing you encrypted emails, even if you use another key (on FlowCrypt or elsewhere) later on!', '', 'acctEmail: ' + acctEmail, ]; diff --git a/extension/js/common/ui/backup-ui/backup-ui-automatic-module.ts b/extension/js/common/ui/backup-ui/backup-ui-automatic-module.ts index f2acd760b69..bb113ee2d5d 100644 --- a/extension/js/common/ui/backup-ui/backup-ui-automatic-module.ts +++ b/extension/js/common/ui/backup-ui/backup-ui-automatic-module.ts @@ -30,8 +30,8 @@ export class BackupUiAutomaticModule extends BackupUiModule { private setupCreateSimpleAutomaticInboxBackup = async () => { const prvs = await KeyStoreUtil.parse(await KeyStore.getRequired(this.ui.acctEmail)); if (prvs.find(prv => !prv.key.fullyEncrypted)) { - await Ui.modal.warning('Key not protected with a pass phrase, skipping'); - throw new UnreportableError('Key not protected with a pass phrase, skipping'); + await Ui.modal.warning('Key not protected with a passphrase, skipping'); + throw new UnreportableError('Key not protected with a passphrase, skipping'); } try { await this.ui.manualModule.doBackupOnEmailProvider(prvs.map(prv => prv.keyInfo)); diff --git a/extension/js/common/ui/backup-ui/backup-ui-manual-module.ts b/extension/js/common/ui/backup-ui/backup-ui-manual-module.ts index aabdf3383cd..fb02fb0d6c9 100644 --- a/extension/js/common/ui/backup-ui/backup-ui-manual-module.ts +++ b/extension/js/common/ui/backup-ui/backup-ui-manual-module.ts @@ -22,7 +22,7 @@ import { BackupUiModule } from './backup-ui-module.js'; import { Lang } from '../../../../js/common/lang.js'; import { MsgUtil } from '../../core/crypto/pgp/msg-util.js'; -const differentPassphrasesError = `Your keys are protected with different pass phrases.\n\nBacking them up together isn't supported yet.`; +const differentPassphrasesError = `Your keys are protected with different passphrases.\n\nBacking them up together isn't supported yet.`; export class BackupUiManualActionModule extends BackupUiModule { private ppChangedPromiseCancellation: PromiseCancellation = { cancel: false }; private readonly proceedBtn = $('#module_manual .action_manual_backup'); @@ -97,7 +97,7 @@ export class BackupUiManualActionModule extends BackupUiModule { for (const ki of keyInfosToBackup) { if (!(await this.isPrivateKeyEncrypted(ki))) { // todo: this check can also be moved to encryptForBackup method when we solve the same passphrase issue (#4060) - await Ui.modal.error("Sorry, cannot back up private key because it's not protected with a pass phrase."); + await Ui.modal.error("Sorry, cannot back up private key because it's not protected with a passphrase."); return; } } @@ -145,15 +145,15 @@ export class BackupUiManualActionModule extends BackupUiModule { return undefined; } if (checks.checkStrength && distinctPassphrases[0] && !Settings.evalPasswordStrength(distinctPassphrases[0]).word.pass) { - await Ui.modal.warning("Please change your pass phrase first.\n\nIt's too weak for this backup method."); - // Actually, until #956 is resolved, we can only modify the pass phrase of the first key + await Ui.modal.warning("Please change your passphrase first.\n\nIt's too weak for this backup method."); + // Actually, until #956 is resolved, we can only modify the passphrase of the first key if (this.ui.parentTabId && kisWithPp[0].passphrase === distinctPassphrases[0]) { Settings.redirectSubPage(this.ui.acctEmail, this.ui.parentTabId, '/chrome/settings/modules/change_passphrase.htm'); } return undefined; } if (distinctPassphrases.length === 1) { - // trying to apply the known pass phrase + // trying to apply the known passphrase for (const ki of kisWithPp.filter(ki => !ki.passphrase)) { if (await KeyUtil.decrypt(await KeyUtil.parse(ki.private), distinctPassphrases[0])) { ki.passphrase = distinctPassphrases[0]; @@ -166,7 +166,7 @@ export class BackupUiManualActionModule extends BackupUiModule { await Ui.modal.error(differentPassphrasesError); return undefined; } - // todo: reset invalid pass phrases (mismatch === true)? + // todo: reset invalid passphrases (mismatch === true)? const longids = kisMissingPp.map(ki => ki.longid); if (this.ui.parentTabId) { BrowserMsg.send.passphraseDialog(this.ui.parentTabId, { type: 'backup', longids }); @@ -174,10 +174,10 @@ export class BackupUiManualActionModule extends BackupUiModule { return undefined; } } else { - await Ui.modal.error(`Sorry, can't back up private key because its pass phrase can't be extracted. Please restart your browser and try again.`); + await Ui.modal.error(`Sorry, can't back up private key because its passphrase can't be extracted. Please restart your browser and try again.`); return undefined; } - // re-start the function recursively with newly discovered pass phrases + // re-start the function recursively with newly discovered passphrases // todo: #4059 however, this code is never actually executed, because our backup frame gets wiped out by the passphrase frame return await this.encryptForBackup(keyInfos, checks); } diff --git a/extension/js/common/ui/key-import-ui.ts b/extension/js/common/ui/key-import-ui.ts index 1b3bba4e0fa..6f7aba7cc52 100644 --- a/extension/js/common/ui/key-import-ui.ts +++ b/extension/js/common/ui/key-import-ui.ts @@ -411,7 +411,7 @@ export class KeyImportUi { private decryptAndEncryptAsNeeded = async (toDecrypt: Key, toEncrypt: Key, passphrase: string, contactSubsentence: string): Promise => { if (!passphrase) { - throw new UserAlert('Please enter a pass phrase to use with this key'); + throw new UserAlert('Please enter a passphrase to use with this key'); } try { if (toEncrypt.fullyDecrypted) { @@ -424,10 +424,10 @@ export class KeyImportUi { this.onBadPassphrase(); if (this.expectedLongid) { // todo - double check this line, should it not say `this.expectedLongid === PgpKey.longid() ? Or is that checked elsewhere beforehand? - throw new UserAlert(`This is the right key! However, the pass phrase does not match. Please try a different pass phrase. - Your original pass phrase might have been different then what you use now.`); + throw new UserAlert(`This is the right key! However, the passphrase does not match. Please try a different passphrase. + Your original passphrase might have been different then what you use now.`); } else { - throw new UserAlert('The pass phrase does not match. Please try a different pass phrase.'); + throw new UserAlert('The passphrase does not match. Please try a different passphrase.'); } } } else if (!toDecrypt.fullyDecrypted) { diff --git a/extension/js/common/ui/passphrase-ui.ts b/extension/js/common/ui/passphrase-ui.ts index 46738c99666..32f15e6149e 100644 --- a/extension/js/common/ui/passphrase-ui.ts +++ b/extension/js/common/ui/passphrase-ui.ts @@ -66,17 +66,17 @@ export const isCreatePrivateFormInputCorrect = async (section: string, clientCon const password1 = $(`#${section} .input_password`); const password2 = $(`#${section} .input_password2`); if (!password1.val()) { - await Ui.modal.warning('Pass phrase is needed to protect your private email. Please enter a pass phrase.'); + await Ui.modal.warning('Passphrase is needed to protect your private email. Please enter a passphrase.'); password1.trigger('focus'); return false; } if ($(`#${section} .action_proceed_private`).hasClass('gray')) { - await Ui.modal.warning('Pass phrase is not strong enough. Please make it stronger, by adding a few words.'); + await Ui.modal.warning('Passphrase is not strong enough. Please make it stronger, by adding a few words.'); password1.trigger('focus'); return false; } if (password1.val() !== password2.val()) { - await Ui.modal.warning('The pass phrases do not match. Please try again.'); + await Ui.modal.warning('The passphrases do not match. Please try again.'); password2.val('').trigger('focus'); return false; } @@ -87,7 +87,7 @@ export const isCreatePrivateFormInputCorrect = async (section: string, clientCon if (!clientConfiguration.usesKeyManager()) { const paperPassPhraseStickyNote = `

- Please write down your pass phrase and store it in safe place or even two. + Please write down your passphrase and store it in safe place or even two. It is needed in order to access your FlowCrypt account.
${notePp}
diff --git a/test/source/mock/google/exported-messages/message-export-15f7f0e992f2c830.json b/test/source/mock/google/exported-messages/message-export-15f7f0e992f2c830.json index c2fcc0ca3a3..114bd542faf 100644 --- a/test/source/mock/google/exported-messages/message-export-15f7f0e992f2c830.json +++ b/test/source/mock/google/exported-messages/message-export-15f7f0e992f2c830.json @@ -4,7 +4,7 @@ "id": "15f7f0e992f2c830", "threadId": "15f7f0e992f2c830", "labelIds": ["Label_1", "STARRED", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "payload": { "partId": "", "mimeType": "multipart/mixed", @@ -101,7 +101,7 @@ "id": "15f7f0e992f2c830", "threadId": "15f7f0e992f2c830", "labelIds": ["Label_1", "STARRED", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "sizeEstimate": 11111, "raw": "Received: from 717284730244
	named unknown
	by gmailapi.google.com
	with HTTPREST;
	Thu, 2 Nov 2017 16:26:23 -0700
Content-Type: multipart/mixed;
 boundary="----sinikael-?=_1-15096651828580.3547439414339175"
From: flowcrypt.compatibility@gmail.com
To: flowcrypt.compatibility@gmail.com
Subject: Your FlowCrypt Backup
Date: Thu, 2 Nov 2017 16:26:23 -0700
Message-Id: <CAKbuLTocb_QHHLuO_hrU5ub9qP-Zr6JSck0nPdZYm4tahJW_9Q@mail.gmail.com>
MIME-Version: 1.0

------sinikael-?=_1-15096651828580.3547439414339175
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<!-- Business Source License 1.0 =C2=A9 2016-2017 FlowCrypt Limited. Use =
limitations apply. Contact human@flowcrypt.com -->

<div dir=3D"ltr">
  <div style=3D"font-size:12.8px">This email contains a key backup. It will=
 help you access your encrypted messages from other computers (along with =
your pass phrase). You can safely leave it in your inbox or archive it.=
</div>
  <br>
  <div style=3D"font-size:12.8px">The key below is protected with pass =
phrase that only you know. You should make sure to note your pass phrase =
down.</div>
  <br>
  <div style=3D"font-size:12.8px;">
    <span style=3D"color: red;">DO NOT DELETE THIS EMAIL.</span> Write me =
at human@flowcrypt.com so that I can help. I respond very promptly.
  </div>
</div>
------sinikael-?=_1-15096651828580.3547439414339175
Content-Type: text/plain;
 name=cryptup-backup-flowcryptcompatibilitygmailcom.key
Content-Disposition: attachment;
 filename=cryptup-backup-flowcryptcompatibilitygmailcom.key
X-Attachment-Id: f_tcdYzZsXyw
Content-Transfer-Encoding: base64

LS0tLS1CRUdJTiBQR1AgUFJJVkFURSBLRVkgQkxPQ0stLS0tLQ0KVmVyc2lvbjogRmxvd0NyeXB0
IDUuMC40IEdtYWlsIEVuY3J5cHRpb24gZmxvd2NyeXB0LmNvbQ0KQ29tbWVudDogU2VhbWxlc3Ns
eSBzZW5kLCByZWNlaXZlIGFuZCBzZWFyY2ggZW5jcnlwdGVkIGVtYWlsDQoNCnhjYUdCRm43cVY0
QkVBQ2dLZnVmRzZ5c2VSUDlqS1haMXpyTTVzUXRrR1dpS0xrczE3OTltMEt3SVl1QQpReVl2dzZj
SVdiTTJkY3VCTk96WUhzTHFsdXFvWGFDRGJVcEs4d0kveG5ILzlaSER5b21rMEFTZHlJMEsKT2du
MkRyWEZ5U3VSbGdsUG1uTVFGN3ZocG5YZWZscXA5YnhROW00eWlITVMrRlFhek12Zi96Y3JBS0tn
CmhQeGNZWEMxQkpmU3ViNXRqMXJZMjRBUnBLOTFmV09RTzZnQUZVdnBlU2lOaUtiN0M0bG1XdUxn
NjRVTApqTFRMWE85UC8yVnMyQkJIT0FDczZ1MHBtRG5GdERuRmxlR0xDNWpyTDZWdlFEcDNla0V2
Y3FjZkM1TVYKUjBONnVWVGVzUmM1aGxCdHdoYkdnNEh1STVjRkxMK2prUndXY1ZTbHVKUzlNTXR1
ZzJlVTdGQVdJek9DCnhXYStMZmI4Y0hwRWc2Y2lkR1N4U2U0OXZnS0tyeXN2NVBkVmZPdVhoTDYz
aTRURW5LRnNwT1lCOHFYeQo1bjNGa1lGLzVDcFlOL0hRYW9DQ3hESVhMR3AzM3UwM09JdGFkQXRR
VStxQUNhR21SaFFBOXF3ZTRpK2sKTFdMM294b1N3US9hZXdiM2ZWbytLN3lnR05sdGs2cG9IUGNM
MGRVNlZIWWU4aDJNQ0VPLzFMUjd5VnNLClc0N0I0ZmdkM2h1WGg4NjhBWDNZUW40UGQ2bXFmdDRX
ZGNDdVJwR0pndkpOSHExOEp2SXlzRHBnc0xTcQpRRjQ0WjBHT0gydlFybk9oSnhJV05VS04rUW5N
eThSTjZTWjFVRm80UCt2ZjF6OTdZSTJNZnJNTGZIQi8KVFVuc3hTNmZHcktoTlZ4TjdFVEg2OXAy
ckk2RjgzNkVaaGViTFFBUkFRQUIvZ2tEQ0R5dU16a29NUWpDCllMVWRsUGhWaWlvUFFBYi9XTWZh
aUU1bnRmM3UyU2NtMW1HdVhUUXNUbVUyeVRiWTNpZ1hUSjZZSkg0QwpGTEIxOGY2dStOaFpiMHI5
N0x0ZUY0Sml1VHRtNlpBNjNlalNncC81TG5zMVo1d1k3cE1OUHNIMGNUVTMKVXJGUWgvZ2hveGFu
U0hhTjFYUXBhb3ZZc09IZnNXY1l6QXh0dnFoRFYydnFmSWxoaUw2RWRFN1ZuODRDClFFMDk2R3U0
aU10S1pTWENEVTlCMVhOMitySzJlKzljMW5RSEFYakFxNDl2OVdVenN0emp2ckNtQmFqVQpHUzZD
Y3kzVkhSZWw0NThib01OT1pxdkxPQkN0dzRueDJHRkRzMTZaUU5aRnl3ajFwVGhFeEtNeEhsbkIK
U3c2dE1KMEZKQkNrMkU5UzI4QnV1ZHU2c0pKZXJaR2pVS0lhZm9TQ2NPOHdwdml4ekwxczRkcUpz
K2lIClJ2MDR4ZkhrNzhyZ2FQMDEwTndvcUhqZCtvcHMrTnhMb0M5ZFM1UGNEbTlDQXVCeFJqZjln
U0o4UW84dwoxamVsZGo5M3FpWVU0WjBPODdyelcrSURYNkdCSWNFOEpnaHBPTytYTXhOMG5mYjJF
WnBrRmhCTGU2MmoKSk9nUXNkb1l5K2lCS0dTZ3gydW9ISXZpZnhpcTgyN1hHQ1hUWm1Ia0F3WnlK
UGw3bXlqYS9xZGl1ZGxECkZuQnRPZXhUblo3N0hYbEZDOXM3L1BJdFpacUtuSVB1SUtoc1cvVGs4
ZnpwVVBmN1V1MHRTL3ZDemM4KwphYnJwUU0ycHBJN085M2tDS0pkWFZ6S2lvRTJNZlY1RGhMak5P
ZTgyT1JXWk80dXdDZzJ1OFpIaENPenoKTXNNcEFtODlmKzFudk9RdHZCUzl2NDVNaFpkYm5kd1BI
UUVnMnBNNjg5WnhIdzlFZ1BpT2h5T01GR00xCjR0QlozallmUHhHeFRXN05aZnJ5V1VReHZTU2tG
YUxzUE1qeFRCOTNUL2ZzSmRlVURHS0pSNDRjUndlUApBVFFXSy9FQmd4MWQrakpVSEtZbDVhSFV4
ZEtMdndIMWlremdIdUtrYjRwVjB5YVJqT055OHNFZ1hZa2oKSG9IMXFmWkFxYkNvcXJhUm9yVEVn
TzlRdnphTEtiOWdkRGpFTXh1ekVKdUEzUXhQOUhxSFI1YVUrVDhvCmhYc3M5U01GVmpWb2s2dDky
djZrZWVVVlJKWXhqaG9ST1pOVWVNd2ZJZy9FUUVYQUNRVUlHb2tKcWFZQwo0VFgzR29MV2E1K0JU
dzVDaEtpUkM5Vk95Rk52cThRMmV1QnpTUm9ZUFlVVTdla0Rhd1VRVStTQ3BOMEkKM0hZaUpsR3pE
Sjd6d0Z5YmVFTWR2MUY5NEY0TmVmUk9kUkZjUHR6ckFKNExNMzh6b3EyWUVVeUs5Uk4wCmxPMkk5
QkZ3MzBBUitQcy9xeHRwdFd0ek5YQm9oWXVOTnBhWnQyVU1jTU9aaFJZbUhKanE1OW9INjVYOQov
bDh3RWs0bnhnRm1Dam5wSHlHcG4yanRkTXRSRHJ3QWVIS0JKNFpRVVYzU1UvY2dwYzBWWjJyZyta
cUwKN2lBV2ZvZm9EL00vM2JFT3U2ZVBxY2wyYktPaHc4UlQwN0NpbW92S1VjWHVqcDcvaHNqNDd5
TkdLQVNzCnJaTXlKWFQrVnFNQS9NV2IrK2pPVXdRa0N6NmRsek04VzVVQzJlemxtMXVJWCtuclpw
MExvV3pxMlZHRwpFTmJEcG55WGgwVzNGbVZlU2d3ZWoxRmc3QUo0d2RMa1B4ZWI5MTZVR09OclVi
RllSdEU3akFvL2g5YzMKa3VzLzhyc3hNVmZUdlF1K3RaUE83bGlXeGh1dVJXYUcrWU9KZTJzOE5Z
dXFseXlQcHZLUnRHSXF5MzYzCmM5ajVWbmZxT2lsMVN4QWpFZ203RTVBSGtDZFFEMi9CTDQraFJl
ZXgyN1dlamVkU0hSVnlRNk04SDBSTworNDhlZmxGZWFDVFRXRTk3MEhJWjFoTVFUZjNiTEVhQjA4
NzU4VXVZVmE3Z2VGNmpRbXBnOE9ua1JQQlEKYWNRSGdCT1YxRnpmMGFuMHVNaFZ3MHZCUUlYM1hk
YUxlK3VWVXV2bDAwVk9MQjRKRXJDUXpLREdzQU1qCk4ydUUxY0FDZkFFYXVUTWlrOSsvRzV3cDJo
VzhKT08xbXJIN2xxN3ozUnpoSk4vVmtURkZTT0d5L21CMQp5dTRpbmIrdTVhVnlKSUw1bGpzL05C
bm85Yi9hRE9VbW1pSHc0bXkwS0NRVmRHTmJsZXRxZmplSlY0Z00KSVFuWFlYbFFnZzM5OExCYXdD
TkxZSGtiL2RETk8wWnNiM2REY25sd2RDQkRiMjF3WVhScFltbHNhWFI1CklEeG1iRzkzWTNKNWNI
UXVZMjl0Y0dGMGFXSnBiR2wwZVVCbmJXRnBiQzVqYjIwK3dzRjFCQkFCQ0FBcApCUUpaKzZsakJn
c0pCd2dEQWdrUXJhd25uSlVKTWdjRUZRZ0tBZ01XQWdFQ0dRRUNHd01DSGdFQUFNN20KRC85cTUw
N2tUc3BlSmNoRE9xeFYrSFJHazVMa3JBTnJ4azBBN05zR05CdCtQSytPZTk2UDJsakw3cytpCjMw
ME44YTB3UXlsYVBtNWE0K0VQVisvWXEvKzRFL2h5d21wL3hWdXpVZldFUGl3UGJWR3NkNnN6dkVJ
WApNZzNWY2VHUjZaSHNnQXMxOTZTc0wxTWFMZ2hoaG10a3JQL0lyU1VLTlB3RWl1aU5oUVRrSTRO
cnlZbzgKSFlGS1luQ28zQm5HR3ZRb3FjL0tTczRCbCtrQ3VjY1IxamNrVG5oSjdvVUxFb3hZNjJj
b0VkekFlSkpPCnhmK2NHMHJmU3dLNlgyUFZhQjNXTVZFbmJqZ1JJbDNzenB3R1Uyc25vWk5rT0tX
dWFtajJkVTdTeVZQQQpQOWdQb1lMSTNldmVFbmNnUU9mQmtyVG1rdjdXMnN6cnZYeW5KWnJMQjlQ
cmE5Yk12dWsycVR1MGlDRmYKNGV1K3NkVTFpejhiY3VjMzJibk9VSWt5VG5Bby81LzJpV3pQY3VX
NmxxYlpxNlNEK0hVZGNTWGVXV0wyCjcxQ1FtUnNab1FOWkgxUUtjZi9Hakp1bExTYUNOVmkzUUhx
TTFpOGNFc3VHNXFPRkg3V3lOVWdpRFNUQgovRmw5Q0FWZklBdnd0YTdpYzFwSVFnSlNYeUZVRlov
MVhwZWZoVmZzbVNSYVVUY2tRSEppSzVtUUFPRkoKM0tTVWxpUkgxOUNOUnprQnhteFNBNjVOZXhq
aDhiUWdTdkl6T3ZGSERTcUNvYlh1dUt2VzZxdThzT3NNCnpYd1U5YVJiWW5BYk1YUmhIbko3Tysv
UGNmZXRlaUQ2dklUTjVrQTNqeG5Ddk84WkZ5OFJra1dZSFVMQgpNZXRiaFRLUUxuM2Ftb2RIa3Jp
ZFhzRlJQTWZHaGdSWis2bGVBUkFBcjhZYVBLSGNJZURUSVprdm1yZ3MKbCtmYkVBRlhUUkZlTERF
M0k5ei90ak5pQkpxY0ZDYk1XUGNBd21Gd1Ywbkg4U0RlTFNsT3ZxcHNDZkRPClJpaEtiMUgyVGpR
OU1EMHMvZ0F3RS9pNWVMQnR1UlhZMldqOUV5Q1ljM2dxcTdQQmorRnMwcnBtNk1XMApNWmVuYXov
Q3ExK3QrWjBPZGU1U0dlS1dzNmpvMUg4T3UweG9TYXhkTUo5Q0ptT2VaS1FBUW05VlFrcUsKRnYw
TG5Vdk1WSlk5Z1F5U001YWpUZGxKZ2xIbzJPNXVNd3JhRlVSdUh6QkR0YSs5MSt5dzZMQTc2REJm
CkR2T0p0bW1FSXdEc0FOV3BSNHpYU3I2UDVNc2FIK0MrbWJTQ0dxTXBteDJUWjZHZHhTVk5DRU9U
Qmp3awpubUlucEJPR0NOakJvQndMUUNSN21zRC91YytmcGd5ZkdVLzlIczJycm5XWHhJR2pOeFBP
T3g0NUxCNXEKc2ZtMHg0ckpxeTFOWVFnY1VCM210Z2dTcHJDbkgwWHp1UXZGR0ZDUDAxUkRxNlNa
MUhyby94Nld5YjBCCmwxQzVwQVhuZWdSRG5QQzVRcno3QmVvTk1Mem5kZTE4ZXdLL0VvUTAvUmxk
ZS9LcFdqWWcxRTBFN2xhVgpKaENNYkdqR2lHelZmNEl3Q1lWSU85dFh2UjFsVi9SeEFuMGFKMmh3
Qy92UU00ZDVjRzQ2SmRrR3JJWkkKMk41dytYWnNXdmdEcXZsRXljMWtPdGlKNWNrNFJaU3FCcGZT
NDFCcHhmZ0I1eVlxSUlUSkhUeGNvUTlXCmVja1pRenVZNitHNFowZlJrTFRkbFErb3NDRjliWnpG
eXlJNTVORHUxendzdHBPN2Zqdy9GV3crUTNYMQpGc0VBRVFFQUFmNEpBd2hlZHp1V3QxeHJSR0R4
NHM0ZXB0bmdkbDRxekIwdlFtQ1UxbjBXZW5aazg2Q3UKZGpHcDRKdWxHaG5DdlQxcG44TmlKUjlT
QU82NGtoRVhPYWl1RnpQSW93NVpOYjU1Tk1ZVllna0hnQTBBCmFKN2dSU0dzbDdod01YRStEaFMr
NitUOG95M21RdE01eEpvM3ZTUWdxKzNhVkJNc1hPTHFBSmIxTllDMQova21ENEp3Nmc3RFMwaXdG
ekZOSXZaWHBKQU1CTDBvRWx5REtGQUM5dDdMamhsdnl6eVNhMjNWZkNYMXMKUzBiYTRPOG8yOXR2
VWF6TjVkL1hCYlpwekE3ZzRDYXNsY3lFNnh4WnZwNklQSDcyd2d6bFdnT3RRYm9yCjd2WlZLZjNH
cHNRVDBybjVUemVwNEFodngyZjRVdTRwSFQ1cTRBa1hYMXVRSlRObEJMZkJmTUtiOFA0KwpvVDRG
WjdGM3NsM3liL09EUjVMUEQ3U0VERkR1ekRsellSMW5vdWFvRFdxenJKU0FpVDNZZTUrQTc1K2wK
R2RSVkdFUHRtU1hGOW9iZDBzaDFzNnpsSG9OMEQzUFRYbXZaVTZIaExtWXNsOWlzSkNvUzJwdTBt
bFE2CnQ3SmQ2TU5nNEsrLytha1ZyelVSWTR3YWJKSzhROHJ0M2JsVUNBZ3o4eExhWFlmNmdudWN3
amhuR0FIdApiaWRYUFhsZ3JkR2drb0NWekxMLy9Vd0RJMXNmZE5UeXZLMDRwdzk4SUh1cUFBL3JL
TUVhdDZQUWpPNHgKWUdhNjRzSzkrSmdpcGdNR0Jub2F1NEFtRzY1MDlkdUdpT1hTWDNQNlZ3ejNn
aFFZNmdZYUZRakxkbUMzCmFjdEFVSGk5NkJqWVJoUUV3NDdwMWg0eUhaQXpDVkpUcmR5ZW5FVC9E
ckJ2THh0Rm5nWU04UUdaaVFKTgpuUzl0WGZpOG52Wm40c25UOFU2dE81QUR4RWRRbnNzeVJOWGs0
WHlpamJSd1QwNkh3VEpyTDdKaTF4d3YKWXp5YW1JbjBWYzdMRlJGWExQaFZvTjlKZCtqWnE1TE85
UUF0VUQrUXhQY2hWWm4zYjFNSnZtNGo4ckJ5Cm9neVUva2lIbUdQVDdRTGZpL2xlZVEwTXM3d2Jk
dHhENDBCdmZKMVNEa1drUkhMUzlibE8yQkNaL1RnSgowOG5malc2c2cyaDIydFJKcHVJNm9FZEpN
dFZwcGh0SVZ3WVh0U3ZpVkhBT1hIZm5RbW9CeHVud09YWjQKb3lOYnNTUWVkTm9vb0x1VW5BYnJZ
amRkdFdEaVoyU0RNMEE0WDFRcU4wZFdmdEQ4TlRlYnJ0azNuREJLCnU1OSs3b05ZMnNPZksybVgw
ZDNEYXowQVhsUTNWWi9HaHM3czRQYTlBOG53VnlEeVE5U0NjblU3TUcyLwpNMC9uY0NpdHQzeEVQ
SEh1c0ZBRzBJVkEzeFNyV1N4UXFKZzJwdDVGbnE4NjJZY3VHTEtHTXl5c1hSeWkKRHV2enAwQUNW
WkFrdWUvN05TMTFuWXNaTGRvWXlNQnZ0aitJNVZMbERyL3RuRDNmQW9BQitYdThWMW50Ck1YT3Ir
blgvN0hCempaYTA3M3BlTVVLMm9xMmxEaXdaRXhTM3ZOUzZyeGttVGJxTnIzaisvcUllRkgwWQpn
UGNjMklNdEcrbEE4V0lyazh6bW5vUWpSbmtsOHZrNUNPK3lhLytXMjdsZVk3clR5NWVoa2t6c2pB
OEYKMFpudkkyc083UVQwd1JUdFJibVNCSkRONFlSSlg2UERhdGZGVHJCZDRnQ0dRYUc2YnQvUW1n
cXBoZzZOCkVNc0JjNjBtQlVBY1p5Mmo1VGhjbEFyZ0cvdWlFS2svUXo2RktzUlRXNWdZTFViZzdv
WktrMzdoWlgzMgpMNGtzVUhKclJIUmxSbDhwQzVUUVNORmRmZjFZcFBrdGZ0eFJOTXdlMjVqZGQz
OEVMOWd3V3B1VG40eG4KUS9VdlZyQWthU0V4SnpXb0t0RFU0UzB5VGoxcVRZaXRQNFRYMkJEcVZI
ZXJ2SkFIa1B2S3o5bmxmUmx0Ck96TG9Zcmtsa1RkZmZXaC84Tk51S0NwWXNRMlRlaUhrNW9NMW5X
RmhTWWQ3VGV4QzVXdkFQeE5hcUtEago4cDlDQVd0UU1zUjFOa2w3TlN6SnNmT1BOYkRrVHo3bGF1
VUdmSGs4UkZwbk1FWEM1dFhNQWdBUDAyeEUKWURNUVhSa0VpeXJOekV4RE1YU09lKzJYdGdRMUM0
ZjFsZzI1bGoySDEveTV6TlhwWXpZZVpDS2dWU3pDCmZNTDRVM0FMMUY3NDAyT3UxMUFDeFVrQ2Vm
WUZiaTI5ZVZodmZ0K2g3U3Z4WU9SUXRuaER3c0ZmQkJnQgpDQUFUQlFKWis2bGtDUkN0ckNlY2xR
a3lCd0liREFBQXViZ1AvalFPTTFmalZrVFNLWk1rd3p3K3hSb3UKS1poWERGTFBlbHMzSG5jZHVP
R3J1SXNTeTZhMGpvbStYZ05WQ0pvMFZxYlNTQ09xMlNRaDFhd2Y2eFNWClVJVWgyaVVBckVuZkN0
RGRRempxNytLR2hxeS9jOHN6M1FFMXZJczJQYTh5RVdqWVBVb3ZBNzFDM3lpSQpYaXlPTnZVVmcz
M21CWXhUMVNmSitlWU1Hbjl2RGFiY2JNcU9KaEZvWC9xUmY1ZkIya0xUc3l3Zk5qeE8KRFY4Szgz
OWpLSURjOTF1UVRMM0ZtYU5WWm11Q005U0NYeDNUWldXQ1R0YnpBdTd2K3lXQU03Y2grZEpsCjAv
U1llbE5vNHB1VGhKUlVUUkZJZCtSTlM5aHVsODBYVGlheEYyNElSZXhEdm9ucENNa1VuSDlxUlBy
egpRWVM5b3NKeWJQZ29ZQlF4U0JwMGZtWThKZDZ4dkpyc2RJc3BMSHViems2SW5mRWhHZGVwN3Ux
aGZXL0kKU01UcXpPelFRQ0dsbFEvYUtyTVBMdnA5OURLZEF3ZnFYTkRKNGN0TVl6Rm5VNWkzS2Zs
SytVZHJtZWtBCm1kSldNeXhXTE8yVnVGK3BrOTA4TFJsbXUzZ1RTRVlzZ0FadVlONDRVNHZMTUVG
NGIvRExSdW5pNHNmQgorZjF3em1VdmRjdWo1VkhRSTN3MHQrUHlIakpVdkVqTlVDSlFaQ3g2aWRm
TDRrRFI2c1BZbUczK2VlelEKT2dWYXFOd05qbFQ4c2dsV2lrYUdCOXkwM0VoS2NUSElxamg3S3JX
SlVxTzNVY2lUaEZFT20xaEVTQUIrCmJ3dmVYd1M0SGFyWG5mbXVTcXYrNGNmTEg2MkhTOVpTY3JZ
aTlGWUJsa3RCbFM5WEdURk1JYjc3dkc4UwoNCj1GMDZ4DQotLS0tLUVORCBQR1AgUFJJVkFURSBL
RVkgQkxPQ0stLS0tLQ0K
------sinikael-?=_1-15096651828580.3547439414339175--
", "historyId": "1214302", diff --git a/test/source/mock/google/exported-messages/message-export-15f84afa553d8a83.json b/test/source/mock/google/exported-messages/message-export-15f84afa553d8a83.json index 3e9ed1c1eae..2c96328f036 100644 --- a/test/source/mock/google/exported-messages/message-export-15f84afa553d8a83.json +++ b/test/source/mock/google/exported-messages/message-export-15f84afa553d8a83.json @@ -4,7 +4,7 @@ "id": "15f84afa553d8a83", "threadId": "15f84afa553d8a83", "labelIds": ["Label_1", "STARRED", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "payload": { "partId": "", "mimeType": "multipart/mixed", @@ -101,7 +101,7 @@ "id": "15f84afa553d8a83", "threadId": "15f84afa553d8a83", "labelIds": ["Label_1", "STARRED", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "sizeEstimate": 11111, "raw": "Received: from 717284730244
	named unknown
	by gmailapi.google.com
	with HTTPREST;
	Fri, 3 Nov 2017 18:40:24 -0700
Content-Type: multipart/mixed;
 boundary="----sinikael-?=_1-15097596230640.8936837704747487"
From: flowcrypt.compatibility@gmail.com
To: flowcrypt.compatibility@gmail.com
Subject: Your FlowCrypt Backup
Date: Fri, 3 Nov 2017 18:40:24 -0700
Message-Id: <CAKbuLTrOJCtn8OgqSk9ax+Apk3TA6kBr4dEJb6D7URPmJdi9Pg@mail.gmail.com>
MIME-Version: 1.0

------sinikael-?=_1-15097596230640.8936837704747487
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<!-- Business Source License 1.0 =C2=A9 2016-2017 FlowCrypt Limited. Use =
limitations apply. Contact human@flowcrypt.com -->

<div dir=3D"ltr">
  <div style=3D"font-size:12.8px">This email contains a key backup. It will=
 help you access your encrypted messages from other computers (along with =
your pass phrase). You can safely leave it in your inbox or archive it.=
</div>
  <br>
  <div style=3D"font-size:12.8px">The key below is protected with pass =
phrase that only you know. You should make sure to note your pass phrase =
down.</div>
  <br>
  <div style=3D"font-size:12.8px;">
    <span style=3D"color: red;">DO NOT DELETE THIS EMAIL.</span> Write me =
at human@flowcrypt.com so that I can help. I respond very promptly.
  </div>
</div>
------sinikael-?=_1-15097596230640.8936837704747487
Content-Type: text/plain;
 name=cryptup-backup-flowcryptcompatibilitygmailcom.key
Content-Disposition: attachment;
 filename=cryptup-backup-flowcryptcompatibilitygmailcom.key
X-Attachment-Id: f_NWKxzAcaBK
Content-Transfer-Encoding: base64

LS0tLS1CRUdJTiBQR1AgUFJJVkFURSBLRVkgQkxPQ0stLS0tLQ0KVmVyc2lvbjogRmxvd0NyeXB0
IDUuMC40IEdtYWlsIEVuY3J5cHRpb24gZmxvd2NyeXB0LmNvbQ0KQ29tbWVudDogU2VhbWxlc3Ns
eSBzZW5kLCByZWNlaXZlIGFuZCBzZWFyY2ggZW5jcnlwdGVkIGVtYWlsDQoNCnhjYUdCRm45R2xJ
QkVBQ2lBVTh5aHltTnEybFR4RUcxT1UwWGthOXRVSjRBN3dzRGhITm51aHh6alZQOApURG5wV2Ir
a1E3cERnajRTRWpYVjVOQUtMUzlJU1JzaXp4RXZ3bzhIV3VsTDBrbW1sYUVTZDVvTndjMysKTzRD
eFgzTTlvTkRhRUhYbXNwaFd5dkJ2VHhkWlczZDVJOWRUNHZqSi9wN0F6blk5OTViS2hMQ0s3S3lv
Cko2TGUrSDdJOEVYVWZOQklrSzdBVW1odHphSDJVbGhmQnRKbDMrVks3bUFqZTZ3Z3ZmNGJ6K3hz
dVovcwpHbFFBaFFqclJheC96alR4U0hkRWpCSitsMmdJdkNua1ZlNmkvQmNqcUxRVXZISnNnemFL
ciszUmkyUXMKQWpWTDNNdHNOeVVoYTJRSW1rV1NQNjJKMjhBR1NnazU1NnZkOUNPUDg5ZHhjbWhY
bG1lVE00MEEyOUdjCnhOem9CVURKeGJYLy9nazFWVlhoT0E5L0JrNkpBUzRUK20zSWZ0SzNRSk5D
L3krU25xRFY5eHdBbDRLTQo4cUJ3ZVV0RkowWDJDNERiQzlFSVA5RjJTeTJqV2JNOWN1YVREMjFt
alFkT1U1Y2JXa0pWNDBIMkZnRUgKY2JLQjkrR2xNbnRnK3RQVUZscklKUFNLaERVQkN5bTJ6VWJr
V2t6NjA2cTVXNXZwU1VPdSszR2lWMlhGCmVHdnY5YWZuT29vM3JMalZXNFVpbWNFRExyeGlFZGN0
K29EVEkwWFJOVExJVUZ0WnNrZEVVZTdwUG9xVwo0K1RQejlHeFVsZlA5Q3NpMXB5bGdISGNsbkU3
cy9CK1ordGpVT3JoSWF5dzZqMGRZdGwwekJoTWUxNEoKdzUzZk8vQUtlNGh0aFZZT0gxb2o2elNK
S2VFd0pZZTlGOG9mc1FBUkFRQUIvZ2tEQ1BvVWxUNE5meTdnCllPdjVONkR6anJEaGVLNHhDTE50
L3E2c2VnMnNMWnRxWUljSVUvNUFOeGtkaEVMb3VDL24wOWRPQk5tYwpRcGlTSW5DS1lHblBFSHFx
QmFjRktFd1pJeEgreVVBejV3ck5QSzhIMHZkZmhHTGc3Wll6cFVCNkRWSmEKSG8yb05NdTlVaVln
L0I3ZDQyS2Jzakp1VHFEQnMvTUNRbnZRcDU3TUxIODlUOEFvTTErQzJzUFpCQlBDCjVKRTQ4TlJs
a2RIajRPTHVsdEFLQTlRNHdIZE45a3BuZVE3a0tXK09FRW42ejY1dHY2YUZUQjg4Q2pjZApLa3ZE
VFduR28yazhEMDlHYVJ3S2VDVTNyUEdFZ1I2Y0xLVlF0ZVk4dk41dHVjWmhiMXVPUVFQK3ZzSzAK
QjF0WktUVURYSkZJcmZCQVU2N1lNd0dkSzE2QlNwN1NMTnhyUmNweEJyQlB6RjBvbC9GK284d09Q
eUU2CjQwTjFLMFdFeE1kWVFqekdUaGFqdzJnSVIyQ3lNdkxDRktvam10am1wMnA5M2t6dmtHNG11
c1ZheVFSVQpZWXNlQ3lQbGRDVXpxQXpkOXdRd1BZN1ltNXRwVjdxcVJYZk5ya3lsRUJVNk53Rlgx
RjZienBYWmZFeHUKLzFpaXNZR2VMTlVxM0gxbktwcVVkR3dmMHFxNUR1RTRlS2dGVnhCNzFMUnRY
ai9hOW00Qlkxd2dTZTRDClpWS3hwREM1QkxPSkNsUXk2ODRrS2RlVnBWaVhUb3ZuNE9oYmlTZ1R6
a1IwRGhkOVRPaXdabG5uSXp1QworNXpoa2NmcG5xdVBSbmNxZlJ2Sm9yUGpIbGtFUWR6c3doNlpw
NzdFTSs3MUVCVlhmQ2ZBRFhaazRtMG0KOFhPUTFXMjNTRTlxWVoxSXMrUGdBckNBRUF3UEVwK25o
UXlGT2R2Ui9xNWd3L1BwOTNic2RYQ0ZMbE5FClhaSUw1TmtWM3lwWmRMWEVuRVdjbEdHN2I2NDFr
R0NMTmkxVEEvRW5UaHIwSk1ybEVnWmpnZkZEcnQzVgpseWZFZFVzU1JSTkZmR1hwMVQ3VnpWenA3
QWFDUzh2dm5qM3VoL1VlZWtXRkMzWVdReis0TFgreUM4elYKL1k2MjF3QmtaVVZsbEtYRUNEemtI
WEtoQWE5d1Jub241RjRYOHd5eWVObzUrdHVlenBvQnFQa3dkVTByClBnNnVmL0h4dWtkNXNZS1BV
QWxJNE1RaXoxTTBkVFhTUkpCeE15dG8zajN6UGIvcnFNc3N0YS9oS29acQpLRGtqeXlFRUpRc0VC
MEhEbUtDUXJDUktYOWNwSm1GT0o1Y2JpNEtvSWdGQUhZeHE1SmtPVFB4dWFqeFYKOFFEMlJua2xT
SklYWm4vcStSa0E0NUtYYXQxY01UbVRibUJhY25LZUpaMmFqQXNoL3BXTkw3VXRSSE51CkpwZUZX
UVA1bHlDR1psL0MxeUF4UkV4U3FOR2RraitvVWVJazBhdlBITVI5dlNud3VhbSt0N3kybFp4dgph
bjlBeGNvNzVyRk1zNmhHeEVoTVJoS2VsdVdjYndXaUE1NVFJZ1VQUzBxQ01zY0U1NEszTnc3UXdw
WkwKOVVyU1dGVHhKUUVVblQyVkpHRk52NjlYWUNhTElXc2drN2hNTElTNm9QNjJUVTBvNGROZ2ln
NEkzTFUvCldqRkQyNDQrQjBrSFJyOWFkTC9VN3ZYbmJ0VFIyb0F6SjI4MTYvOThGbGRpMHZYSW9D
bUVJLzMwQnE0NApXNlpWaVEyTUZnTmYweDl4bmI5VEVpN1Q3RWxHZVp6SlNISkVIQzVZcVJLSllk
dXZFU29pK0tpb3gydHMKb1NqTHNyVmgraXRjY1ZRNE1ISmFXM2pkMHlqWmc2d1dNUFZrZkMzbnpq
VnN2TnZXbTVlWGNiU2dhanR4ClcvSlYxV2UveWttOGEvYTYzZmFyT0Y1Nk1ua1dySGd6MEhGZTli
SUxQcUo1Zkd6SlIvWmZtWlZTOXBkaQo5anQrVm1SRUZxaGg1Q1VkaUcrUHhxZVdsUGMrSUZqZ0FG
NmIvRExoREc1T203SmlEdVphdDNvY2lWeFoKQzZrVWl0dHZrVkNocm1lUmp0aDJ2dmJWVVJtalBl
YS94MTNVNTVQTG9XeGtpVlUzdkQ3L0h2L3NLaFNJCk1JM2RmVjRwa1Z2T1lVRXFUOUIwYzRUR1RL
U1BkZjRlTHdiYkJPdUxDUW9XaUVsTThuM1haMG1hVldrRQpMdkdrdEpKNW8yYkgyZ1JhUGxTTzQ4
eU5mSlNYa1UyVHZFU3BCVDRrUHhocC9DeWUxM01sZFR5eFk5OXUKYUxaUzlSZ1FmM1JnaWtZdzEr
VllUVHd6SnB6Tk8wWnNiM2REY25sd2RDQkRiMjF3WVhScFltbHNhWFI1CklEeG1iRzkzWTNKNWNI
UXVZMjl0Y0dGMGFXSnBiR2wwZVVCbmJXRnBiQzVqYjIwK3dzRjFCQkFCQ0FBcApCUUpaL1JwWEJn
c0pCd2dEQWdrUWY5NW9WVWl1cDRnRUZRZ0tBZ01XQWdFQ0dRRUNHd01DSGdFQUFJTTAKRC9vQ3FK
d2NMMVFRQUR0U2kxY2JOc20wVmd2eTNqdTF3REo4YUt0Qm0rTDRtb1lnZ05nZjJiamhhNFd3CnJa
eWlmeGxDRE90RU1HREJtQ2x1eEtFTHZobk4ySlNkRS9LNFlTZDd4Sm8yOVhDM2pXdEJuR3ZQeC9T
YgpCVm1ydjBLT01LTWU1ZW42SlV1aC9SczBOaXhLeVovS1NzOTNXc1FpTm9HUmZPeUR5UjFmb2gv
WW85clgKZ3JiUFhzcE1CalZOT3M5am9KUzA2S0pyNEJncXY3dlVOS2c1YkZaNWdWRSs0VVFlNFV5
cTZnM29mMXU1Cm51MkVDSTg2WTBzV2F5bWpIendkZWYrYWRTOTV0TWF3UlVrazRpa3RUWm9BTWNL
K241STdMTmhVUTdqcgp1NVB3WGhJSGdFV0IwaTlzN3lVTHp4TXlodUE2Z3NzaGpaWW1MTjQ4d29J
Lzl3L1Z4ckFMdG45V1dYN2UKOU5COG81dlFHZ09oWkdHVUFaaDU5eW9KYTBwbzVIQ0hIUnpQWlh1
YWMvZGhZeWVOak8wVHJISWJMOGExCnZKSGJmQWJSZFVoV2NUOFdBK3BBZGVKZU4yMG83bzhweFRV
T01sMGxicWo1anJXR3RsWVo0RklyVEcvZQpQamhlRnhxUkZRbUltMW9QS3g4RXlxS3MvT2ppeXRM
bldydUlwRTFNNit3a1BhajlIamViOVVBUHNXbEcKZ01jZkY4dVB5SzZqczVZam8yTXdNL3BPOUJJ
YXhrazd4bGttZE5yM1NHOGY3eHlGVkcyQzhUQnlsUjlOCmMwZ2tFMitDOVBXM1o4YnRFNXZ6T2h2
OXRHNjVWN25DN2pQL0RnbXh5NzRoSWxHakFxbFBJRVh1ckVJSwpwMk9vTnc3OEdZajdteVVnZzBs
elllN1RsY2ZHaGdSWi9ScFNBUkFBMzlFNk1DTEJwam9kRTYrd0pyZHkKZzFaQmNWak04S0h6cDFR
UGp0MklHQWdMRWVWcjBkZkU4R3QvWTZvTjhnbnVoZWx2aFRKWXIvdXB0bk1JCjJjM2NoSHcrVy9k
TTRCV3d2ZmFzWHVLZmdjWlNscXVMTUx2YTZGRVZhYXZ0dXFucS9WVWJQQmFVbHpuQgo0MzhiekNL
M2dKcVJHZFIrYnMzQytPcXBmR0RrNDF1WDlub2N2dm4vUjhiVERIUlRFVFBweXdCcW9CUEkKM2lM
bnJFVzF4blBRcjJSSldMSjFoRUhFdjVxeUF0dWhoUE52Tm0ycVRpTEdZNzBGM1ZZVHU1SWtDbnl6
ClQrRVJrWm5HWFhPWVVCcUloRzNuNFMzV2VkQTFlWUg0QzhNTUplVUtZU2RxOXkzUU5HQjg0emNw
Q1dtSwpTZWtYTTA4MlJiYWZ6OERmU0ZUem4rcWtGY3FoRSszVTlySElKRU5acFl3VDVCbk9KejYz
b1pDOEFjb24KUnNsMklicUxzQldFRGdmajloWlpzcjU4OGlLS0ZPWHFCUjNsM1hWL202M2lDaWNT
Y2pibTQ5UlF0QzluCk93dFNLcEJ4c3A2SmFicmJLc0dUWWtNWFJDdEJTeWVDME5nTXlNeGdQMDJz
M1B3REthZ3RJa2Q2USs3TApYRUxMRGh2UkVTWjFIbkJvTTVwMWJxNVlvUXdud2Zpd0hhY2xub3pk
anBPeGhMcHZQRm9CWFJ1SWdhV3MKeDR4Q0xJSEdMRCs4T3J1UnhyaGJiUEhMOExQQnhYZ1RocVhn
dDdOcXJVV1hmVmJIYWMzQW5pUEtXbzZ2CmZQVERwNVNjNkZMQU5IdUpoT1pDc3ROaURBVnpiNXVB
U3NVSmowQjRieDBpZ0orMGxqUWJFVTVMRUhJagplSk1BRVFFQUFmNEpBd2lWWFhtL2JEbnV6R0Ew
allMTWluZEVyYytvZktNaENCNjBUSWhON3dFMzd4ZmYKQk51NnJqSU9kVHAwaW5JbGxYQWVicUc2
Sk1pS0cwR2M1THRxeHJ1eHM3MFJreHZuMXE4MTNydDNFT2NpCjBiRVk2UXY4L3FTb2pza2VhMUNY
YmJjbGpaUFFrcmVxOTdlT3BieHNHdE9jdFFGS0I4QmxhZ3RWMi9CVgpRa1dkTTRjY2doWFR1LzV2
SXJwUXZ6NlBCRU8zS3JxM1F6Y1NveC84NytXbytjSE1KZ3JhR2ExbnM4MnIKZSttODZOTUM0N2Fi
VnI4K0tUL3RTUEhOSVlsTFdnU0pJbDkzbURJa29VV1VFZC9BRDdSc0t6ZkpLaktXCmg5T0lyczJ1
V081ZGdXNXZreER1ZmJNY0NJSk9iUnRyMStzYThUZ3ZwcTUwNGFlam1laWlEK094aS9DdwpabUlK
NW9mT1JES1l4NDRMYnEwWHlCK1lSQmtmVCt3Mi9YNHNTbUlsQmF6MlpWOG1SWUdlT2crbU90bnMK
U1hYQkdPRk51V25TdDZDRDIwQ3FqVVJzQ2tRSEZiQnZNR2p4MTJEUVRRekw0UGtkRHBIdXNrWVBI
Nkt3CktjekIwNXUwa0NGUUlOWSthanVIYmVjcFZ5M1F3NnNrTE9BUzJ1Ukhxc3dKQ2d0V3Bia0RT
TWZSVUpXZQp6OGxTaDYwVjVBL1pQZU1iL0Y2L080ZVBxa3ZYYnJJK2FrLytDcms5bkc2R1RJbWZO
WkJJbDBndG5peG8KUVF5OTZWMjZ0T25WT0FoeWtSSWlKU0ljVjRFMk1QK3ZrbTdDYXRMbTRTQU5P
aTlxNUxjcFdkVFJkdXYwCm0wOTBid0pnc2dOeDRmeEg2MGlUWmZVK1J2eXV0bUo1NzRyeng3Yy8r
K291d2x0RTFnZDNJYmQzMHdxSwpEaTQ1YkRPbzVyL2ppMVVNcTJtdndtUXVkTTRkZUhoK1JrZmtv
NmdRRU9GOTVzYWg5OVZFc0Y5Yjc5QnAKWm1wZEhNZUtua3JuMUFiVm1pY2VQTjMrblNzYjFCSmFJ
RHZYOTdYcklKRjl6N0VWQTVYNkVmMEFkTGlLCnBVNGMxa1owU2thUVBoTGwzb015YWhDZXo0dnB6
VFowazE3bVd5R1RXOVdnOFNOdWZ2UWhlcERIZnZEbQp0SzlqdDlYdmE2eEFBVmM1QkVPR1Y0VnNZ
ZVRjcnowa3pWRXE5L0R6VEJHSHRwRUp6ZDFJTnFnanEyUnkKc2NHYkNlNkcxQ2ZLOUFMVUVJc3BO
eHBlL0VTSWpUeHc1cEEwM0xjWE8yTUFhNzEvVFNEOERUc2lPVmpLCmxqaE9GMWg0VUw3MGNTNzh0
elpKNkt4RUlHWlJqdlpRdytaZG9WbVN3MG40cXBDTktyM2dvYUZ4UnNGMApKNDliL3JieXVaM1ox
WG5zZDlqeXZvdzNhNFRkclBlZHdyMjA4YnZlK0NRUG1CN2N5N21lam8rZGJKaUIKMncxMVZzUnZn
QkRDMjdKNmlvTmEwcS9hYy9nZGxoNWRaVjNnV2QzQ1YvaXpKWTFRc0FYMDE0TEZ6N3hHClVJWlBY
NWMwN0d2UVNYNFFlR1NuMXdtTEdsQ2E2SDhPUWJSaXo2N0lmQjdPMFFBcldXaXZTUkVWVDZlNApi
MWxkRlNqNEVDa2EyNk9nRkxTTlBhZmxNR0dkRDZwYkJpQjB1dk5pUkVuRFpLcVpoblVKQzJEZENS
TnAKSkdPK25pK0tzWEhyUnlBemV5VUZIUUFjdFNIRnhYd2RlQnhiUGZNS3R0b1lzaUEvcDR2dFNx
MVlNS29VCnhsRVZsUTFIc3hQaGhwRk1jYURPSkVVdFZ5RmxkUFl3UndlbkZjUGRLaFdaMG1uOU1C
a3BtT1dQNGsySwpxdHk3TEttc0t2cjk2UmRFakx1VnJYVnpOeUxNc0RQaDVmc2xIdXMyYWxXankx
NTlkdldpcktEbUNTSXQKcWVOSGE1WDVheDFwd2RQNXRDeE1Qd0ExWUR6dU5tS29wT2ZxZFFtSmNR
dXFQTytpMzJVYXdQcDZUZGt2ClI2R0U2bzJ3bElqZFc2Y0N6UXU1TXlwS29wbkFkYzNkNVo2WXpN
MHpOY2xyMTdPMDF2bkk1a0NEdUxSagplQUJvT0tWVHNJcjVwUFJ6MmdGYWZ2U091L3V1R1N3VTlS
b2hLbnUzSkFHK251V1cyUzYzMzRZL1JDSTEKNk9pS0ZNdVMvZW56YXNSTTIwZUxSbkt1NTJIbUNW
T1ZNRHdpN2VrNWtPL0UwekxQTzI2eGJmKzlaNlNRClJWUFJpUWU2YjQzSUtrUTZZZGtHRW5Wa1R3
OXNQYzZnaHd5ZEtoRXliN1FXYitKWkttMUR3c0ZmQkJnQgpDQUFUQlFKWi9ScFpDUkIvM21oVlNL
Nm5pQUliREFBQU5Oa1Ard1h3c0U0cGpnYXU1YktLcFQxSU1NT2gKTmJtNTJTVTFabk1xOWpMZXlC
SWtNVXl0NmV5c2QvR1ZNNlFPd0hUY2tlSDFubWxzdmFiYm9SaFIrMGs2ClRHNEJiei9ndUNpcDZq
bzZxN2IzVTFKV0hULzJDTkE2NkkrT28vY0lDdHpEQUU3NmQybit5YThRck5IVgpwVlgwNnh5ZWph
QjA5bWhCclpqZlVZdWFrT0k1U0J1b1laZGVQYVB2RGxuVEQzY3QxVVY3QVBiK3l3dEQKM3lqTWU5
Mk5NSjNFN2kzNFlIUEdtVFBMVm96aTUwRjZ4NXlIOFBrUlNmbGlvd2tXM1ZlNWozUGRFdFZaCkNn
dXJWWlJTZ2hjT2tHeFF3aktEKzNpRHNoTSs5NVkzTWhGejNMVHBzWUZUek1JVGpxY0RCVnEvdzRP
MQpsd05FdlZqcEZOcDhoZjl6YnBVWHowcGNTQnVONkU5aVZEUzhqOEd6ZXAxSVlyQjFmLzU5bkFU
QmE4dXcKdEpUSUxKOE12MHd6QmVsejdzWmdsUU5aeDM2S1JqQy9IdzJhZXJVVUZRekZqSTNaYW8v
NDlISmxFbUxnCjdLNjV0VVFTTTFUejlJeW00NVlqTHBtSXpqOXk2UzRrWkRacVdwWTFScVRsclBx
TGNnSTZHTXd3dFYzRQp0aVFGa00zdWo0YjFvRUJteU5vSnNiTTVjcEkyWnAwZ2c5ZFRxZExvUWZJ
NHBRbjk0TVVaTitkM2thUmEKVXJ1L3NmK1FpckwwYUMvUHFQK3g2cWlRM3RmaWU1enZFNU81dnBZ
ald3MUZCNDhpN0RhNmI1aW5YaWNHClRyb2pPNk9lL0JyMXRYUGVlNWVFajNSWU11ZTd3NURJQjc4
M2crLzJsZTdVZ2FEZzNIekpnRXU0eTV4NgoNCj0rQTBJDQotLS0tLUVORCBQR1AgUFJJVkFURSBL
RVkgQkxPQ0stLS0tLQ0K
------sinikael-?=_1-15097596230640.8936837704747487--
", "historyId": "1214295", diff --git a/test/source/mock/google/exported-messages/message-export-161e0ddd8b234e67.json b/test/source/mock/google/exported-messages/message-export-161e0ddd8b234e67.json index fea83a087c7..bc5d8e3a483 100644 --- a/test/source/mock/google/exported-messages/message-export-161e0ddd8b234e67.json +++ b/test/source/mock/google/exported-messages/message-export-161e0ddd8b234e67.json @@ -4,7 +4,7 @@ "id": "161e0ddd8b234e67", "threadId": "161e0ddd8b234e67", "labelIds": ["Label_1", "STARRED", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "payload": { "partId": "", "mimeType": "multipart/mixed", @@ -101,7 +101,7 @@ "id": "161e0ddd8b234e67", "threadId": "161e0ddd8b234e67", "labelIds": ["Label_1", "STARRED", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "sizeEstimate": 11083, "raw": "Received: from 717284730244
	named unknown
	by gmailapi.google.com
	with HTTPREST;
	Thu, 1 Mar 2018 01:21:31 -0800
Content-Type: multipart/mixed;
 boundary="----sinikael-?=_1-15198960871560.08922239808370458"
From: flowcrypt.compatibility@gmail.com
To: flowcrypt.compatibility@gmail.com
Subject: Your FlowCrypt Backup
Date: Thu, 1 Mar 2018 01:21:31 -0800
Message-Id: <CAKbuLTrwv-hQGPcjFnA5FApaho6gvw_Rw0cQmOcwv9FmKmb+4g@mail.gmail.com>
MIME-Version: 1.0

------sinikael-?=_1-15198960871560.08922239808370458
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<!-- =C2=A9 2016-2018 FlowCrypt Limited. Limitations apply. Contact =
human@flowcrypt.com -->

<div dir=3D"ltr">
  <div style=3D"font-size:12.8px">This email contains a key backup. It will=
 help you access your encrypted messages from other computers (along with =
your pass phrase). You can safely leave it in your inbox or archive it.=
</div>
  <br>
  <div style=3D"font-size:12.8px">The key below is protected with pass =
phrase that only you know. You should make sure to note your pass phrase =
down.</div>
  <br>
  <div style=3D"font-size:12.8px;">
    <span style=3D"color: red;">DO NOT DELETE THIS EMAIL.</span> Write me =
at human@flowcrypt.com so that I can help. I respond very promptly.
  </div>
</div>
------sinikael-?=_1-15198960871560.08922239808370458
Content-Type: text/plain;
 name=cryptup-backup-flowcryptcompatibilitygmailcom.key
Content-Disposition: attachment;
 filename=cryptup-backup-flowcryptcompatibilitygmailcom.key
X-Attachment-Id: f_yTYOYsZrBn
Content-Transfer-Encoding: base64
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------sinikael-?=_1-15198960871560.08922239808370458--
", "historyId": "1214289", diff --git a/test/source/mock/google/exported-messages/message-export-1631d0d78df8dd16.json b/test/source/mock/google/exported-messages/message-export-1631d0d78df8dd16.json index c0a0802a4fe..1584349fd22 100644 --- a/test/source/mock/google/exported-messages/message-export-1631d0d78df8dd16.json +++ b/test/source/mock/google/exported-messages/message-export-1631d0d78df8dd16.json @@ -4,7 +4,7 @@ "id": "1631d0d78df8dd16", "threadId": "1631d0d78df8dd16", "labelIds": ["UNREAD", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "historyId": "1351", "internalDate": "1525200811000", "payload": { diff --git a/test/source/mock/google/exported-messages/message-export-16819bec18d4e011.json b/test/source/mock/google/exported-messages/message-export-16819bec18d4e011.json index 7e0de4d7470..249750a8a28 100644 --- a/test/source/mock/google/exported-messages/message-export-16819bec18d4e011.json +++ b/test/source/mock/google/exported-messages/message-export-16819bec18d4e011.json @@ -98,7 +98,7 @@ }, { "name": "Subject", - "value": "for ci tests that change pass phrase" + "value": "for ci tests that change passphrase" }, { "name": "To", diff --git a/test/source/mock/google/exported-messages/message-export-173fd735b2d9eaf4.json b/test/source/mock/google/exported-messages/message-export-173fd735b2d9eaf4.json index b3f9e970572..ce80bcbe4f7 100644 --- a/test/source/mock/google/exported-messages/message-export-173fd735b2d9eaf4.json +++ b/test/source/mock/google/exported-messages/message-export-173fd735b2d9eaf4.json @@ -4,7 +4,7 @@ "id": "173fd735b2d9eaf4", "threadId": "173fd735b2d9eaf4", "labelIds": ["SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "payload": { "partId": "", "mimeType": "multipart/mixed", @@ -109,7 +109,7 @@ "id": "173fd735b2d9eaf4", "threadId": "173fd735b2d9eaf4", "labelIds": ["SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "sizeEstimate": 3179, "raw": "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-VGhpcyBlbWFpbCBjb250YWlucyBhIGtleSBiYWNrdXAuIEl0ID0NCndpbGwgaGVscCB5b3UgYWNjZXNzIHlvdXIgZW5jcnlwdGVkIG1lc3NhZ2VzIGZyb20NCiAgICBvdGhlciBjb21wdXRlcnMgKGFsb25nIHdpdGggeW91ciBwYXNzIHBocmFzZSkuIFlvdSBjYW4gc2FmZWx5IGxlYXZlIGl0ID0NCmluIHlvdXIgaW5ib3ggb3IgYXJjaGl2ZSBpdC48L2Rpdj4NCiAgPGJyPg0KICA8ZGl2IHN0eWxlPTNEImZvbnQtc2l6ZTogMTIuOHB4OyI-VGhlIGtleSBiZWxvdyBpcyBwcm90ZWN0ZWQgd2l0aCBwYXNzID0NCnBocmFzZSB0aGF0IG9ubHkgeW91IGtub3cuIFlvdSBzaG91bGQgbWFrZSBzdXJlIHRvDQogICAgbm90ZSB5b3VyIHBhc3MgcGhyYXNlIGRvd24uPC9kaXY-DQogIDxicj4NCiAgPGRpdiBzdHlsZT0zRCJmb250LXNpemU6IDEyLjhweDsiPg0KICAgIDxzcGFuIHN0eWxlPTNEImNvbG9yOiByZWQ7Ij5ETyBOT1QgREVMRVRFIFRISVMgRU1BSUwuPC9zcGFuPiBFbWFpbCA9DQpodW1hbkBmbG93Y3J5cHQuY29tIGlmIHlvdSBuZWVkIGhlbHAuIFdlIHJlc3BvbmQNCiAgICBwcm9tcHRseS4NCiAgPC9kaXY-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", "historyId": "2032", diff --git a/test/source/mock/google/exported-messages/message-export-188923a75165a3c8.json b/test/source/mock/google/exported-messages/message-export-188923a75165a3c8.json index 62d3f1097e8..9f3857954b8 100644 --- a/test/source/mock/google/exported-messages/message-export-188923a75165a3c8.json +++ b/test/source/mock/google/exported-messages/message-export-188923a75165a3c8.json @@ -4,7 +4,7 @@ "id": "188923a75165a3c8", "threadId": "188923a75165a3c8", "labelIds": ["Label_15", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "payload": { "partId": "", "mimeType": "multipart/mixed", @@ -109,7 +109,7 @@ "id": "188923a75165a3c8", "threadId": "188923a75165a3c8", "labelIds": ["Label_15", "SENT", "INBOX"], - "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your pass phrase). You can safely leave it in your inbox or archive it. The key below", + "snippet": "This email contains a key backup. It will help you access your encrypted messages from other computers (along with your passphrase). You can safely leave it in your inbox or archive it. The key below", "sizeEstimate": 11303, "raw": "Received: from 717284730244
	named unknown
	by gmailapi.google.com
	with HTTPREST;
	Tue, 6 Jun 2023 12:41:24 -0700
Content-Type: multipart/mixed;
 boundary="----sinikael-?=_1-16860804834980.17416740120924445"
Openpgp: id=E8F0517BA6D7DAB6081C96E4ADAC279C95093207
From: flowcrypt.compatibility@gmail.com
To: flowcrypt.compatibility@gmail.com
Subject: Your FlowCrypt Backup
Date: Tue, 6 Jun 2023 12:41:24 -0700
Message-Id: <CAKbuLTpHvLBszYVqjYi_eoxEqTKE8-qBHFgb7XDfBHGOBvysdw@mail.gmail.com>
MIME-Version: 1.0

------sinikael-?=_1-16860804834980.17416740120924445
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<!-- =C2=A9 2016-2018 FlowCrypt Limited. Limitations apply. Contact =
human@flowcrypt.com -->

<div dir=3D"ltr">
  <div style=3D"font-size: 12.8px">
    This email contains a key backup. It will help you access your =
encrypted messages from other computers (along with your pass phrase). You =
can safely leave
    it in your inbox or archive it.
  </div>
  <br />
  <div style=3D"font-size: 12.8px">The key below is protected with pass =
phrase that only you know. You should make sure to note your pass phrase =
down.</div>
  <br />
  <div style=3D"font-size: 12.8px">
    <span style=3D"color: red">DO NOT DELETE THIS EMAIL.</span> Email =
human@flowcrypt.com if you need help. We respond promptly.
  </div>
</div>

------sinikael-?=_1-16860804834980.17416740120924445
Content-Type: application/pgp-keys;
 name=flowcrypt-backup-flowcryptcompatibilitygmailcom-5520CACE2CB61EA713E5B0057FDE685548AEA788.asc
Content-Disposition: attachment;
 filename*0=flowcrypt-backup-flowcryptcompatibilitygmailcom-55;
 filename*1=20CACE2CB61EA713E5B0057FDE685548AEA788.asc
X-Attachment-Id: f_RndiNRaPuBxJxPECzuvtMRHqSegKqn@flowcrypt
Content-Id: <f_RndiNRaPuBxJxPECzuvtMRHqSegKqn@flowcrypt>
Content-Transfer-Encoding: base64
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------sinikael-?=_1-16860804834980.17416740120924445--
", "historyId": "1423368", diff --git a/test/source/tests/compose.ts b/test/source/tests/compose.ts index 369033df536..99815bc84e1 100644 --- a/test/source/tests/compose.ts +++ b/test/source/tests/compose.ts @@ -169,7 +169,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te ); test( - 'compose - trying to send PWD encrypted message with pass phrase - should show err', + 'compose - trying to send PWD encrypted message with passphrase - should show err', testWithBrowser(async (t, browser) => { const acctEmail = 'ci.tests.gmail@flowcrypt.test'; await BrowserRecipe.setupCommonAcctWithAttester(t, browser, 'ci.tests.gmail'); @@ -180,14 +180,14 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te await composePage.waitAndType('@input-password', msgPwd); await composePage.waitAndClick('@action-send', { delay: 1 }); await PageRecipe.waitForModalAndRespond(composePage, 'error', { - contentToCheck: 'Please do not use your private key pass phrase as a password for this message', + contentToCheck: 'Please do not use your private key passphrase as a password for this message', clickOn: 'confirm', }); // changing case should result in this error too await composePage.waitAndType('@input-password', msgPwd.toUpperCase()); await composePage.waitAndClick('@action-send', { delay: 1 }); await PageRecipe.waitForModalAndRespond(composePage, 'error', { - contentToCheck: 'Please do not use your private key pass phrase as a password for this message', + contentToCheck: 'Please do not use your private key passphrase as a password for this message', clickOn: 'confirm', }); const forgottenPassphrase = 'this passphrase is forgotten'; @@ -198,7 +198,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te await composePage.waitAndType('@input-password', forgottenPassphrase); await composePage.waitAndClick('@action-send', { delay: 1 }); await PageRecipe.waitForModalAndRespond(composePage, 'error', { - contentToCheck: 'Please do not use your private key pass phrase as a password for this message', + contentToCheck: 'Please do not use your private key passphrase as a password for this message', clickOn: 'confirm', }); }) @@ -274,7 +274,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te ); test( - 'compose - signed with entered pass phrase + will remember pass phrase in session', + 'compose - signed with entered passphrase + will remember passphrase in session', testWithBrowser(async (t, browser) => { const acctEmail = 'ci.tests.gmail@flowcrypt.test'; await BrowserRecipe.setupCommonAcctWithAttester(t, browser, 'ci.tests.gmail', { @@ -285,17 +285,17 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te await SettingsPageRecipe.forgetAllPassPhrasesInStorage(settingsPage, k.passphrase); const inboxPage = await browser.newExtensionInboxPage(t, acctEmail); const composeFrame = await InboxPageRecipe.openAndGetComposeFrame(inboxPage); - await ComposePageRecipe.fillMsg(composeFrame, { to: 'human@flowcrypt.com' }, 'sign with entered pass phrase', undefined, { + await ComposePageRecipe.fillMsg(composeFrame, { to: 'human@flowcrypt.com' }, 'sign with entered passphrase', undefined, { encrypt: false, }); await composeFrame.waitAndClick('@action-send'); await inboxPage.waitAll('@dialog-passphrase'); const passphraseDialog = await inboxPage.getFrame(['passphrase.htm']); - await passphraseDialog.waitForContent('@lost-pass-phrase', 'Lost pass phrase?'); + await passphraseDialog.waitForContent('@lost-pass-phrase', 'Lost passphrase?'); await passphraseDialog.waitAndType('@input-pass-phrase', k.passphrase); await passphraseDialog.waitAndClick('@action-confirm-pass-phrase-entry'); await inboxPage.waitTillGone('@dialog-passphrase'); - await inboxPage.waitTillGone('@container-new-message'); // confirming pass phrase will auto-send the message + await inboxPage.waitTillGone('@container-new-message'); // confirming passphrase will auto-send the message // signed - done, now try to see if it remembered pp in session const composePage = await ComposePageRecipe.openStandalone(t, browser, 'compose'); await ComposePageRecipe.fillMsg(composePage, { to: 'human@flowcrypt.com' }, 'signed message pp in session', undefined, { @@ -802,7 +802,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te for (const inputMethod of ['mouse', 'keyboard']) { test( - `compose - reply - pass phrase dialog - dialog ok (${inputMethod})`, + `compose - reply - passphrase dialog - dialog ok (${inputMethod})`, testWithBrowser(async (t, browser) => { await BrowserRecipe.setupCommonAcctWithAttester(t, browser, 'compatibility'); const pp = Config.key('flowcrypt.compatibility.1pp1').passphrase; @@ -838,7 +838,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te ); test( - `compose - reply - pass phrase dialog - dialog cancel (${inputMethod})`, + `compose - reply - passphrase dialog - dialog cancel (${inputMethod})`, testWithBrowser(async (t, browser) => { await BrowserRecipe.setupCommonAcctWithAttester(t, browser, 'compatibility'); const pp = Config.key('flowcrypt.compatibility.1pp1').passphrase; @@ -858,7 +858,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te ); test( - `compose - pass phrase dialog - dialog cancel (${inputMethod})`, + `compose - passphrase dialog - dialog cancel (${inputMethod})`, testWithBrowser(async (t, browser) => { const k = Config.key('ci.tests.gmail'); const acctEmail = 'ci.tests.gmail@flowcrypt.test'; @@ -875,7 +875,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te expect(passphraseDialog.frame.detached).to.equal(false); await Util.sleep(0.5); expect(await composeFrame.read('@action-send')).to.eq('Signing...'); - await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt pass phrase to sign email'); + await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt passphrase to sign email'); await ComposePageRecipe.cancelPassphraseDialog(inboxPage, inputMethod); await Util.sleep(0.5); await composeFrame.waitForContent('@action-send', 'Sign and Send'); @@ -883,7 +883,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te ); test( - `compose - non-primary pass phrase dialog - dialog cancel (${inputMethod})`, + `compose - non-primary passphrase dialog - dialog cancel (${inputMethod})`, testWithBrowser(async (t, browser) => { const k = Config.key('ci.tests.gmail'); const acctEmail = 'ci.tests.gmail@flowcrypt.test'; @@ -905,7 +905,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te const passphraseDialog = await inboxPage.getFrame(['passphrase.htm']); expect(passphraseDialog.frame.detached).to.equal(false); await composeFrame.waitForContent('@action-send', 'Loading...'); - await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt pass phrase to sign email'); + await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt passphrase to sign email'); await passphraseDialog.waitForContent('@which-key', '47FB 0318 3E03 A8ED 44E3 BBFC CEA2 D53B B9D2 4871'); await ComposePageRecipe.cancelPassphraseDialog(inboxPage, inputMethod); await composeFrame.waitForContent('@action-send', 'Encrypt, Sign, and Send'); @@ -914,7 +914,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te } // end of tests per inputMethod test( - `compose - signed and encrypted S/MIME message - pass phrase dialog`, + `compose - signed and encrypted S/MIME message - passphrase dialog`, testWithBrowser(async (t, browser) => { const k = Config.key('ci.tests.gmail'); const acctEmail = 'ci.tests.gmail@flowcrypt.test'; @@ -935,7 +935,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te await composeFrame.waitAndClick('@action-send', { delay: 2 }); const passphraseDialog = await inboxPage.getFrame(['passphrase.htm']); expect(passphraseDialog.frame.detached).to.equal(false); - await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt pass phrase to sign email'); + await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt passphrase to sign email'); await passphraseDialog.waitForContent('@which-key', '47FB 0318 3E03 A8ED 44E3 BBFC CEA2 D53B B9D2 4871'); await passphraseDialog.waitAndType('@input-pass-phrase', forgottenPassphrase); await passphraseDialog.waitAndClick('@action-confirm-pass-phrase-entry'); @@ -1327,7 +1327,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te ); test( - 'compose - loading drafts - PKCS#7 encrypted draft with forgotten non-primary pass phrase', + 'compose - loading drafts - PKCS#7 encrypted draft with forgotten non-primary passphrase', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.imported@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -1376,7 +1376,7 @@ export const defineComposeTests = (testVariant: TestVariant, testWithBrowser: Te await composeFrame.waitAndClick('@action-open-passphrase-dialog'); const passphraseDialog = await inboxPage.getFrame(['passphrase.htm']); await passphraseDialog.waitForSelTestState('ready'); - expect(await passphraseDialog.read('@passphrase-text')).to.equal('Enter FlowCrypt pass phrase to load a draft'); + expect(await passphraseDialog.read('@passphrase-text')).to.equal('Enter FlowCrypt passphrase to load a draft'); const whichKeyText = await passphraseDialog.read('@which-key'); expect(whichKeyText).to.include('9B5F CFF5 76A0 3249 5AFE 7780 5354 351B 39AB 3BC6'); expect(whichKeyText).to.not.include('CB04 85FE 44FC 22FF 09AF 0DB3 1B38 3D03 34E3 8B28'); diff --git a/test/source/tests/decrypt.ts b/test/source/tests/decrypt.ts index 3cc7a9551bd..809571c6b9c 100644 --- a/test/source/tests/decrypt.ts +++ b/test/source/tests/decrypt.ts @@ -1065,7 +1065,7 @@ XZ8r4OC6sguP/yozWlkG+7dDxsgKQVBENeG6Lw== ); test( - `compose - #5125 test pass phrase anti brute force protection`, + `compose - #5125 test passphrase anti brute force protection`, testWithBrowser(async (t, browser) => { await BrowserRecipe.setupCommonAcctWithAttester(t, browser, 'compatibility'); const wrongPassphrase = 'wrong'; @@ -1094,7 +1094,7 @@ XZ8r4OC6sguP/yozWlkG+7dDxsgKQVBENeG6Lw== ); test( - 'decrypt - by entering pass phrase + remember in session', + 'decrypt - by entering passphrase + remember in session', testWithBrowser(async (t, browser) => { const { acctEmail, authHdr } = await BrowserRecipe.setupCommonAcctWithAttester(t, browser, 'compatibility'); const pp = Config.key('flowcrypt.compatibility.1pp1').passphrase; @@ -1977,7 +1977,7 @@ XZ8r4OC6sguP/yozWlkG+7dDxsgKQVBENeG6Lw== }) ); - test.todo('decrypt - by entering secondary pass phrase'); + test.todo('decrypt - by entering secondary passphrase'); test( `decrypt - signed only - parse error in a badge`, diff --git a/test/source/tests/elements.ts b/test/source/tests/elements.ts index 202e8d4ffe6..c2c7dc9b698 100644 --- a/test/source/tests/elements.ts +++ b/test/source/tests/elements.ts @@ -36,11 +36,11 @@ export const defineElementTests = (testVariant: TestVariant, testWithBrowser: Te ); await ppPage.waitAndType('@input-pass-phrase', passphrase); await ppPage.waitAndClick('@action-confirm-pass-phrase-entry', { delay: 1 }); - await ppPage.waitForContent('.ui-toast-title', '1 of 3 keys was unlocked by this pass phrase'); + await ppPage.waitForContent('.ui-toast-title', '1 of 3 keys was unlocked by this passphrase'); await SettingsPageRecipe.addKeyTest(t, browser, acctEmail, testConstants.testkey0389D3A7, passphrase, {}, false); await ppPage.waitAndType('@input-pass-phrase', passphrase); await ppPage.waitAndClick('@action-confirm-pass-phrase-entry', { delay: 1 }); - await ppPage.waitForContent('.ui-toast-title', '2 of 4 keys were unlocked by this pass phrase'); + await ppPage.waitForContent('.ui-toast-title', '2 of 4 keys were unlocked by this passphrase'); }) ); diff --git a/test/source/tests/flaky.ts b/test/source/tests/flaky.ts index f95e5598a4d..ffb2d1f0717 100644 --- a/test/source/tests/flaky.ts +++ b/test/source/tests/flaky.ts @@ -426,13 +426,13 @@ export const defineFlakyTests = (testVariant: TestVariant, testWithBrowser: Test const inboxPage = await browser.newExtensionInboxPage(t, acctEmail); await BrowserRecipe.finishSession(inboxPage); const composeFrame = await InboxPageRecipe.openAndGetComposeFrame(inboxPage); - await ComposePageRecipe.fillMsg(composeFrame, { to: 'human@flowcrypt.com' }, 'should not send as pass phrase is not known', undefined, { + await ComposePageRecipe.fillMsg(composeFrame, { to: 'human@flowcrypt.com' }, 'should not send as passphrase is not known', undefined, { encrypt: false, }); await composeFrame.waitAndClick('@action-send'); await inboxPage.waitAll('@dialog-passphrase'); const passphraseDialog = await inboxPage.getFrame(['passphrase.htm']); - await passphraseDialog.waitForContent('@lost-pass-phrase-with-ekm', 'Ask your IT staff for help if you lost your pass phrase.'); + await passphraseDialog.waitForContent('@lost-pass-phrase-with-ekm', 'Ask your IT staff for help if you lost your passphrase.'); expect(await passphraseDialog.hasClass('@forget-pass-phrase-label', 'hidden')).to.equal(true); expect(await passphraseDialog.isChecked('@forget-pass-phrase-checkbox')).to.equal(true); await inboxPage.close(); @@ -603,7 +603,7 @@ export const defineFlakyTests = (testVariant: TestVariant, testWithBrowser: Test }) ); test( - 'decrypt - entering pass phrase should unlock all keys that match the pass phrase', + 'decrypt - entering passphrase should unlock all keys that match the passphrase', testWithBrowser( async (t, browser) => { const acctEmail = 'flowcrypt.compatibility@gmail.com'; diff --git a/test/source/tests/page-recipe/settings-page-recipe.ts b/test/source/tests/page-recipe/settings-page-recipe.ts index 1f95744bb2b..f62a9b479cf 100644 --- a/test/source/tests/page-recipe/settings-page-recipe.ts +++ b/test/source/tests/page-recipe/settings-page-recipe.ts @@ -61,7 +61,7 @@ export class SettingsPageRecipe extends PageRecipe { await securityFrame.waitAndClick('@action-show-confirm-new-pp', { delay: 1 }); await securityFrame.waitAndType('@input-confirm-new-pp', newPp, { delay: 1 }); await securityFrame.waitAndClick('@action-confirm-new-pp', { delay: 1 }); - await securityFrame.waitAndRespondToModal('info', 'confirm', 'Now that you changed your pass phrase, you should back up your key'); + await securityFrame.waitAndRespondToModal('info', 'confirm', 'Now that you changed your passphrase, you should back up your key'); await securityFrame.waitAll('@container-backup-dialog'); // offers a new backup await securityFrame.waitAndClick('@input-backup-step3manual-file'); await securityFrame.waitAndClick('@action-backup-step3manual-continue'); diff --git a/test/source/tests/page-recipe/setup-page-recipe.ts b/test/source/tests/page-recipe/setup-page-recipe.ts index fc3b40ff2b5..d37969abfb5 100644 --- a/test/source/tests/page-recipe/setup-page-recipe.ts +++ b/test/source/tests/page-recipe/setup-page-recipe.ts @@ -81,7 +81,7 @@ export class SetupPageRecipe extends PageRecipe { expect(await settingsPage.isChecked('@input-step2bmanualcreate-save-passphrase')).to.equal(checks.isSavePassphraseChecked); } await settingsPage.waitAndClick('@input-step2bmanualcreate-create-and-save'); - await settingsPage.waitAndRespondToModal('confirm-checkbox', 'confirm', 'Please write down your pass phrase'); + await settingsPage.waitAndRespondToModal('confirm-checkbox', 'confirm', 'Please write down your passphrase'); if (backup === 'none') { await settingsPage.waitAll('@input-backup-step3manual-no-backup', { timeout: 90 }); await settingsPage.waitAndClick('@input-backup-step3manual-no-backup'); @@ -186,7 +186,7 @@ export class SetupPageRecipe extends PageRecipe { await Util.sleep(1); const generatedPp = await settingsPage.value('@input-step2bmanualenter-passphrase'); if (!/^[A-Z0-9]{4}-[A-Z0-9]{4}-[A-Z0-9]{4}-[A-Z0-9]{4}$/.test(generatedPp)) { - throw new Error(`Import naked key page did not generate proper pass phrase, instead got: ${generatedPp}`); + throw new Error(`Import naked key page did not generate proper passphrase, instead got: ${generatedPp}`); } const ppValidationExpect = 'GREAT (time to crack: centuries)'; const ppValidationResult = await settingsPage.read('@container-password-feedback', true); diff --git a/test/source/tests/settings.ts b/test/source/tests/settings.ts index 150ee74cccc..3e44426e9f1 100644 --- a/test/source/tests/settings.ts +++ b/test/source/tests/settings.ts @@ -131,7 +131,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }) ); test( - 'settings - test pass phrase', + 'settings - test passphrase', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.compatibility@gmail.com'; await BrowserRecipe.setupCommonAcctWithAttester(t, browser, 'compatibility'); @@ -153,27 +153,27 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T const baseUrl = `chrome/elements/passphrase.htm?acctEmail=${acctEmail}&longids=${longid}&parentTabId=`; let passphrasePage = await browser.newPage(t, baseUrl.concat('&type=sign')); await passphrasePage.waitForSelTestState('ready'); - expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt pass phrase to sign email'); + expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt passphrase to sign email'); await passphrasePage.close(); passphrasePage = await browser.newPage(t, baseUrl.concat('&type=message')); await passphrasePage.waitForSelTestState('ready'); - expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt pass phrase to read encrypted email'); + expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt passphrase to read encrypted email'); await passphrasePage.close(); passphrasePage = await browser.newPage(t, baseUrl.concat('&type=draft')); await passphrasePage.waitForSelTestState('ready'); - expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt pass phrase to load a draft'); + expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt passphrase to load a draft'); await passphrasePage.close(); passphrasePage = await browser.newPage(t, baseUrl.concat('&type=attachment')); await passphrasePage.waitForSelTestState('ready'); - expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt pass phrase to decrypt a file'); + expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt passphrase to decrypt a file'); await passphrasePage.close(); passphrasePage = await browser.newPage(t, baseUrl.concat('&type=quote')); await passphrasePage.waitForSelTestState('ready'); - expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt pass phrase to load quoted content'); + expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt passphrase to load quoted content'); await passphrasePage.close(); passphrasePage = await browser.newPage(t, baseUrl.concat('&type=backup')); await passphrasePage.waitForSelTestState('ready'); - expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt pass phrase to back up'); + expect(await passphrasePage.read('@passphrase-text')).to.equal('Enter FlowCrypt passphrase to back up'); await passphrasePage.close(); }) ); @@ -555,21 +555,21 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T await addKeyPopup.waitAndClick('@source-generate'); // Check if error modal displays correctly when user didn't enter passphrase await addKeyPopup.waitAndClick('@input-step2bmanualcreate-create-and-save'); - await addKeyPopup.waitAndRespondToModal('warning', 'confirm', 'Pass phrase is needed to protect your private email.'); + await addKeyPopup.waitAndRespondToModal('warning', 'confirm', 'Passphrase is needed to protect your private email.'); // Check if error modal displays correctly when user enters weak passphrase await addKeyPopup.waitAndType('@input-step2bmanualcreate-passphrase-1', 'short passphrase'); await addKeyPopup.waitAndClick('@input-step2bmanualcreate-create-and-save'); - await addKeyPopup.waitAndRespondToModal('warning', 'confirm', 'Pass phrase is not strong enough.'); + await addKeyPopup.waitAndRespondToModal('warning', 'confirm', 'Passphrase is not strong enough.'); // Check if error modal displays correctly when pasphrase doesn't match const passphrase = 'long enough to suit requirements'; await addKeyPopup.waitAndType('@input-step2bmanualcreate-passphrase-1', passphrase); await addKeyPopup.waitAndClick('@input-step2bmanualcreate-create-and-save'); - await addKeyPopup.waitAndRespondToModal('warning', 'confirm', 'The pass phrases do not match.'); + await addKeyPopup.waitAndRespondToModal('warning', 'confirm', 'The passphrases do not match.'); await addKeyPopup.waitAndType('@input-step2bmanualcreate-passphrase-2', passphrase); // Uncheck backup_inbox to check if backup view correctly displayed await addKeyPopup.waitAndClick('@input-step2bmanualcreate-backup-inbox'); await addKeyPopup.waitAndClick('@input-step2bmanualcreate-create-and-save'); - await addKeyPopup.waitAndRespondToModal('confirm-checkbox', 'confirm', 'Please write down your pass phrase'); + await addKeyPopup.waitAndRespondToModal('confirm-checkbox', 'confirm', 'Please write down your passphrase'); await addKeyPopup.waitAndClick('@input-backup-step3manual-no-backup'); // choose no_backup so that it doesn't affect other tests. await addKeyPopup.waitAndClick('@action-backup-step3manual-continue'); await SettingsPageRecipe.ready(settingsPage); @@ -597,7 +597,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T await addKeyPopup.waitAndType('@input-step2bmanualcreate-passphrase-2', passphrase); await addKeyPopup.waitAndClick('@input-step2bmanualcreate-backup-inbox'); await addKeyPopup.waitAndClick('@input-step2bmanualcreate-create-and-save'); - await addKeyPopup.waitAndRespondToModal('confirm-checkbox', 'confirm', 'Please write down your pass phrase'); + await addKeyPopup.waitAndRespondToModal('confirm-checkbox', 'confirm', 'Please write down your passphrase'); await addKeyPopup.waitAndClick('@input-backup-step3manual-no-backup'); // choose no_backup so that it doesn't affect other tests. await addKeyPopup.waitAndClick('@action-backup-step3manual-continue'); await SettingsPageRecipe.ready(settingsPage); @@ -686,13 +686,13 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }); // change pp - should not ask for pp because already in session await SettingsPageRecipe.changePassphrase(settingsPage, undefined, newPp); - // now it will remember the pass phrase so decrypts without asking + // now it will remember the passphrase so decrypts without asking await InboxPageRecipe.checkDecryptMsg(t, browser, { acctEmail, threadId: '16819bec18d4e011', content: ['changed correctly if this can be decrypted'], }); - // test decrypt - should ask for new pass phrase + // test decrypt - should ask for new passphrase await InboxPageRecipe.checkDecryptMsg(t, browser, { acctEmail, threadId: '16819bec18d4e011', @@ -753,7 +753,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T threadId: '179f6feb575df213', content: ['changed correctly if this can be decrypted'], }); - // test decrypt - should ask for new pass phrase + // test decrypt - should ask for new passphrase await InboxPageRecipe.checkDecryptMsg(t, browser, { acctEmail, threadId: '179f6feb575df213', @@ -776,13 +776,13 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T await SettingsPageRecipe.forgetAllPassPhrasesInStorage(settingsPage, passphrase); // pp wiped after switching to session - should be needed to change pp await SettingsPageRecipe.changePassphrase(settingsPage, passphrase, newPp); - // now it will remember the pass phrase so decrypts without asking + // now it will remember the passphrase so decrypts without asking await InboxPageRecipe.checkDecryptMsg(t, browser, { acctEmail, threadId: '16819bec18d4e011', content: ['changed correctly if this can be decrypted'], }); - // test decrypt - should ask for new pass phrase + // test decrypt - should ask for new passphrase await InboxPageRecipe.checkDecryptMsg(t, browser, { acctEmail, threadId: '16819bec18d4e011', @@ -950,7 +950,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }) ); test( - 'settings - attachment previews with entering pass phrase', + 'settings - attachment previews with entering passphrase', testWithBrowser(async (t, browser) => { await BrowserRecipe.setupCommonAcctWithAttester(t, browser, 'compatibility'); const settingsPage = await browser.newExtensionSettingsPage(t, 'flowcrypt.compatibility@gmail.com'); @@ -1314,7 +1314,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }) ); test( - 'settings - manual backup several keys to file with the same pass phrase', + 'settings - manual backup several keys to file with the same passphrase', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.multiple@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -1386,7 +1386,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }) ); test( - 'settings - manual backup several keys to inbox with the same strong pass phrase', + 'settings - manual backup several keys to inbox with the same strong passphrase', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.multiple.inbox2@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -1436,7 +1436,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }) ); test( - 'settings - manual backup several keys to file with a missing but guessed pass phrase', + 'settings - manual backup several keys to file with a missing but guessed passphrase', testWithBrowser(async (t, browser) => { t.context.mockApi!.configProvider = new ConfigurationProvider({ attester: { @@ -1493,7 +1493,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }) ); test( - 'settings - manual backup several keys to inbox with a missing pass phrase', + 'settings - manual backup several keys to inbox with a missing passphrase', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.multiple@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -1534,12 +1534,12 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T expect(await backupFrame.isDisabled('[data-id="CB0485FE44FC22FF09AF0DB31B383D0334E38B28"]')).to.equal(false); expect(await backupFrame.isDisabled('[data-id="515431151DDD3EA232B37A4C98ACFA1EADAB5B92"]')).to.equal(false); await backupFrame.waitAndClick('@action-backup-step3manual-continue'); - await backupFrame.waitAndRespondToModal('error', 'confirm', 'Your keys are protected with different pass phrases'); + await backupFrame.waitAndRespondToModal('error', 'confirm', 'Your keys are protected with different passphrases'); await settingsPage.close(); }) ); test( - 'settings - manual backup a key with a missing pass phrase', + 'settings - manual backup a key with a missing passphrase', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.multiple@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -1577,7 +1577,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }) ); test( - 'settings - manual backup several keys to file with different pass phrases', + 'settings - manual backup several keys to file with different passphrases', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.multiple@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -1619,7 +1619,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T expect(await backupPage.isDisabled('[data-id="515431151DDD3EA232B37A4C98ACFA1EADAB5B92"]')).to.equal(false); await backupPage.waitAndClick('@input-backup-step3manual-file'); await backupPage.waitAndClick('@action-backup-step3manual-continue'); - await backupPage.waitAndRespondToModal('error', 'confirm', 'Your keys are protected with different pass phrases'); + await backupPage.waitAndRespondToModal('error', 'confirm', 'Your keys are protected with different passphrases'); await backupPage.close(); }) ); @@ -1721,7 +1721,7 @@ export const defineSettingsTests = (testVariant: TestVariant, testWithBrowser: T }) ); test( - 'settings - manual backup to inbox keys with weak pass phrases results in error', + 'settings - manual backup to inbox keys with weak passphrases results in error', testWithBrowser(async (t, browser) => { t.context.mockApi!.configProvider = new ConfigurationProvider({ attester: { diff --git a/test/source/tests/setup.ts b/test/source/tests/setup.ts index 6898cf8ed61..86fd2a9b4c9 100644 --- a/test/source/tests/setup.ts +++ b/test/source/tests/setup.ts @@ -237,7 +237,7 @@ export const defineSetupTests = (testVariant: TestVariant, testWithBrowser: Test ); test( - 'setup - import key - naked - choose my own pass phrase', + 'setup - import key - naked - choose my own passphrase', testWithBrowser(async (t, browser) => { t.context.mockApi!.configProvider = new ConfigurationProvider({ attester: { @@ -255,7 +255,7 @@ export const defineSetupTests = (testVariant: TestVariant, testWithBrowser: Test ); test( - 'setup - import key - naked - auto-generate a pass phrase', + 'setup - import key - naked - auto-generate a passphrase', testWithBrowser(async (t, browser) => { t.context.mockApi!.configProvider = new ConfigurationProvider({ attester: { @@ -272,7 +272,7 @@ export const defineSetupTests = (testVariant: TestVariant, testWithBrowser: Test }) ); - test.todo('setup - import key - naked - do not supply pass phrase gets error'); + test.todo('setup - import key - naked - do not supply passphrase gets error'); test( 'setup - import key - fix key self signatures', @@ -525,7 +525,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== ); test( - 'setup - recover with a pass phrase - skip remaining', + 'setup - recover with a passphrase - skip remaining', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.compatibility@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -540,7 +540,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== ); test( - 'setup - recover with a pass phrase - 1pp1 then 2pp1', + 'setup - recover with a passphrase - 1pp1 then 2pp1', testWithBrowser(async (t, browser) => { t.context.mockApi!.configProvider = new ConfigurationProvider({ attester: { @@ -561,7 +561,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== ); test( - 'setup - recover with a pass phrase - 1pp2 then 2pp1', + 'setup - recover with a passphrase - 1pp2 then 2pp1', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.compatibility@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -577,7 +577,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== ); test( - 'setup - recover with a pass phrase - 2pp1 then 1pp1', + 'setup - recover with a passphrase - 2pp1 then 1pp1', testWithBrowser(async (t, browser) => { t.context.mockApi!.configProvider = new ConfigurationProvider({ attester: { @@ -598,7 +598,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== ); test( - 'setup - recover with a pass phrase - 2pp1 then 1pp2', + 'setup - recover with a passphrase - 2pp1 then 1pp2', testWithBrowser(async (t, browser) => { t.context.mockApi!.configProvider = new ConfigurationProvider({ attester: { @@ -619,7 +619,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== ); test( - 'setup - recover with a pass phrase - 1pp1 then 1pp2 (shows already recovered), then 2pp1', + 'setup - recover with a passphrase - 1pp1 then 1pp2 (shows already recovered), then 2pp1', testWithBrowser(async (t, browser) => { t.context.mockApi!.configProvider = new ConfigurationProvider({ attester: { @@ -933,8 +933,8 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== }) ); - test.todo('setup - recover with a pass phrase - 1pp1 then wrong, then skip'); - // test('setup - recover with a pass phrase - 1pp1 then wrong, then skip', test_with_browser(async (t, browser) => { + test.todo('setup - recover with a passphrase - 1pp1 then wrong, then skip'); + // test('setup - recover with a passphrase - 1pp1 then wrong, then skip', test_with_browser(async (t, browser) => { // const settingsPage = await BrowserRecipe.open_settings_login_approve(t, browser,'flowcrypt.compatibility@gmail.com'); // await SetupPageRecipe.setup_recover(settingsPage, 'flowcrypt.compatibility.1pp1', {has_recover_more: true, click_recover_more: true}); // await SetupPageRecipe.setup_recover(settingsPage, 'flowcrypt.wrong.passphrase', {wrong_passphrase: true}); @@ -942,7 +942,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== // })); test( - 'setup - recover with a pass phrase - no remaining', + 'setup - recover with a passphrase - no remaining', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.recovered@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -954,7 +954,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== ); test( - 'setup - fail to recover with a wrong pass phrase', + 'setup - fail to recover with a wrong passphrase', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.recovered@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -969,7 +969,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== ); test( - 'setup - fail to recover with a wrong pass phrase at first, then recover with good pass phrase', + 'setup - fail to recover with a wrong passphrase at first, then recover with good passphrase', testWithBrowser(async (t, browser) => { const acctEmail = 'flowcrypt.test.key.recovered@gmail.com'; t.context.mockApi!.configProvider = new ConfigurationProvider({ @@ -1445,7 +1445,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== expect(await myKeyFrame.read('@content-fingerprint')).to.contain('00B0 1158 0796 9D75'); await SettingsPageRecipe.closeDialog(settingsPage); await Util.sleep(2); - // check that it does not offer any pass phrase options + // check that it does not offer any passphrase options await SettingsPageRecipe.toggleScreen(settingsPage, 'basic'); const securityFrame = await SettingsPageRecipe.awaitNewPageFrame(settingsPage, '@action-open-security-page', ['security.htm', 'placement=settings']); await Util.sleep(1); @@ -1548,7 +1548,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== { const passphraseDialog = await gmailPage.getFrame(['passphrase.htm']); await Util.sleep(2); - await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt pass phrase to keep your account keys up to date'); + await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt passphrase to keep your account keys up to date'); await passphraseDialog.waitAndType('@input-pass-phrase', passphrase); await passphraseDialog.waitAndClick('@action-confirm-pass-phrase-entry'); } @@ -1624,7 +1624,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== await gmailPage.waitAll('@dialog-passphrase'); { const passphraseDialog = await gmailPage.getFrame(['passphrase.htm']); - await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt pass phrase to keep your account keys up to date'); + await passphraseDialog.waitForContent('@passphrase-text', 'Enter FlowCrypt passphrase to keep your account keys up to date'); await passphraseDialog.waitAndType('@input-pass-phrase', passphrase); await passphraseDialog.waitAndClick('@action-confirm-pass-phrase-entry'); } @@ -2075,7 +2075,7 @@ AN8G3r5Htj8olot+jm9mIa5XLXWzMNUZgg== expect(await myKeyFrame.read('@content-key-expiration')).to.equal('Does not expire'); await SettingsPageRecipe.closeDialog(settingsPage); await Util.sleep(2); - // check that it does not offer any pass phrase options + // check that it does not offer any passphrase options await SettingsPageRecipe.toggleScreen(settingsPage, 'basic'); const securityFrame = await SettingsPageRecipe.awaitNewPageFrame(settingsPage, '@action-open-security-page', ['security.htm', 'placement=settings']); await Util.sleep(1); diff --git a/test/source/tests/tooling/browser-recipe.ts b/test/source/tests/tooling/browser-recipe.ts index a68216eba13..b884efd5d7f 100644 --- a/test/source/tests/tooling/browser-recipe.ts +++ b/test/source/tests/tooling/browser-recipe.ts @@ -325,7 +325,7 @@ export class BrowserRecipe { const page = pgpBlockFrame.getPage(); await page.notPresent('@action-finish-session'); const errBadgeContent = await pgpBlockFrame.read('@pgp-error'); - expect(errBadgeContent).to.equal('pass phrase needed'); + expect(errBadgeContent).to.equal('passphrase needed'); await pgpBlockFrame.notPresent('@action-print'); await pgpBlockFrame.waitAndClick('@action-show-passphrase-dialog', { delay: 1 }); await page.waitAll('@dialog-passphrase'); diff --git a/test/source/tests/unit-node.ts b/test/source/tests/unit-node.ts index 1d4577444fb..a0bdbb67089 100644 --- a/test/source/tests/unit-node.ts +++ b/test/source/tests/unit-node.ts @@ -1095,7 +1095,7 @@ jLwe8W9IMt765T5x5oux9MmPDXF05xHfm4qfH/BMO3a802x5u2gJjJjuknrFdgXY test('[MsgUtil.decryptMessage] handles long message', async t => { const data = Buf.fromUtfStr('The test string concatenated many times to produce large output'.repeat(100000)); - const passphrase = 'pass phrase'; + const passphrase = 'passphrase'; const prv = await KeyUtil.parse(prvEncryptForSubkeyOnly); const encrypted = await MsgUtil.encryptMessage({ pubkeys: [await KeyUtil.asPublicKey(prv)], @@ -1373,7 +1373,7 @@ jSB6A93JmnQGIkAem/kzGkKclmfAdGfc4FS+3Cn+6Q==Xmrz test('[MsgUtil.encryptMessage] do not decrypt message when encrypted for key not meant for encryption', async t => { const data = Buf.fromUtfStr('hello'); - const passphrase = 'pass phrase'; + const passphrase = 'passphrase'; const tmpPrv = await KeyUtil.parse(prvEncryptForSubkeyOnly); await KeyUtil.encrypt(tmpPrv, passphrase); expect(tmpPrv.fullyEncrypted).to.equal(true);