@cubist-labs/cubesigner-sdk-key-import 0.4.68-0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md ADDED
@@ -0,0 +1,90 @@
1
+ # CubeSigner key import
2
+
3
+ This library implements the client-side encryption used to import keys
4
+ into CubeSigner.
5
+
6
+ ## WARNING
7
+
8
+ Importing keys using code running in an untrusted environment is **dangerous**
9
+ because that code must process secret key material. For example, importing
10
+ keys from a user's web browser is **very risky**: exposing secret keys
11
+ in browsers means that malicious web pages, advertisements, and extensions
12
+ may be able to steal your key. JS execution environments are also great
13
+ targets for side-channel attackers.
14
+
15
+ Whenever possible, Cubist strongly recommends generating keys using the
16
+ `createKey` API. We strongly recommend against using local keygen plus
17
+ import as a replacement for real disaster-recovery backup. Please contact
18
+ us if you have questions about or need help with disaster-recovery planning.
19
+
20
+ ## Example
21
+
22
+ ```ts
23
+ import * as cs from "@cubist-labs/cubesigner-sdk";
24
+ import * as csFs from "@cubist-labs/cubesigner-sdk-fs-storage";
25
+ import { KeyImporter, type MnemonicToImport } from "@cubist-labs/cubesigner-sdk-key-import";
26
+
27
+ // create a CubeSigner client from credentials on-disk, which
28
+ // you can create by running `cs login` from the CLI.
29
+ const client = await cs.CubeSignerClient.create(csFs.defaultManagementSessionManager());
30
+
31
+ // create the key-importer instance
32
+ const keyImporter = new KeyImporter(client.org());
33
+
34
+ // mnemonics to import directly as EVM keys
35
+ const evmMnemonics: MnemonicToImport[] = [
36
+ {
37
+ mnemonic: "car split like parrot uphold faint amount alert inch bean priority custom auction denial reason oyster food duck horn top battle video seed company",
38
+ derivationPath: "m/44'/60'/0'/0/0",
39
+ },
40
+ {
41
+ mnemonic: "force focus walnut scale barrel faint hotel fabric source because heavy provide bridge intact they receive stairs matter fetch family color happy slender accident",
42
+ derivationPath: "m/44'/60'/1'/0/0",
43
+ password: "bip39 passwords are silly",
44
+ },
45
+ ];
46
+ // mnemonic to import directly as Bitcoin Segwit keys
47
+ const btcMnemonics: MnemonicToImport[] = [
48
+ {
49
+ mnemonic: "style goddess hair mountain open when train mail fly engage fork walnut end toe mail price priority ocean uncover immune spray person slogan avoid",
50
+ derivationPath: "m/84'/0'/0'/0/0",
51
+ },
52
+ {
53
+ mnemonic: "marine airport maze doll note assume deliver second bus include deal escape detail friend letter captain glide actual resemble nation shell search elephant busy",
54
+ derivationPath: "m/84'/0'/9'/0/1",
55
+ },
56
+ ];
57
+
58
+ // import the keys
59
+ const evmKeys = await keyImporter.importMnemonics(cs.Secp256k1.Evm, evmMnemonics);
60
+ const btcKeys = await keyImporter.importMnemonics(cs.Secp256k1.Btc, btcMnemonics);
61
+
62
+ // If you want to derive many keys from the same mnemonic, you should import
63
+ // the bare mnemonic and use the `deriveKey` and/or `deriveKeys` methods to
64
+ // create keys.
65
+ const bareMnemonic: MnemonicToImport = {
66
+ mnemonic: "divide impact town typical inhale uncover rifle pet multiply idea long before debate apart pulse type need produce among pony attend cat injury ring",
67
+ };
68
+
69
+ // First, import the bare mnemonic
70
+ const mnemonic = (await keyImporter.importMnemonics(cs.Mnemonic, [bareMnemonic]))[0];
71
+
72
+ // Then derive keys from it.
73
+ const deriveResponse = await org.deriveKey(cs.Secp256k1.Taproot, "m/86'/0'/3'/1/0", mnemonic.materialId);
74
+ const otherDeriveResponses = await org.deriveKeys(
75
+ cs.Secp256k1.Ava,
76
+ [
77
+ "m/1'/2'/3",
78
+ "m/4'/5/6",
79
+ "m/7/8'/9",
80
+ ],
81
+ mnemonic.materialId,
82
+ );
83
+ ```
84
+
85
+ # License
86
+
87
+ Copyright (C) 2024 Cubist, Inc. All rights reserved.
88
+
89
+ This library is licensed under the MIT and Apache-2.0 licenses.
90
+ See the [../../NOTICE] file for further information.
@@ -0,0 +1,23 @@
1
+ import type { Key, KeyType, Org } from "@cubist-labs/cubesigner-sdk";
2
+ import type { MnemonicToImport } from "./mnemonic";
3
+ /**
4
+ * An import encryption key and the corresponding attestation document
5
+ */
6
+ export declare class KeyImporter {
7
+ #private;
8
+ /**
9
+ * Construct from a CubeSigner `Org` instance
10
+ *
11
+ * @param { Org } cs A CubeSigner `Org` instance
12
+ */
13
+ constructor(cs: Org);
14
+ /**
15
+ * Encrypts a set of mnemonics and imports them.
16
+ *
17
+ * @param { KeyType } keyType The type of key to import
18
+ * @param { MnemonicToImport[] } mnes The mnemonics to import, with optional derivation paths and passwords
19
+ * @return { Promise<Key[]> } `Key` objects for each imported key.
20
+ */
21
+ importMnemonics(keyType: KeyType, mnes: MnemonicToImport[]): Promise<Key[]>;
22
+ }
23
+ //# sourceMappingURL=import.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"import.d.ts","sourceRoot":"","sources":["../src/import.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAIV,GAAG,EACH,OAAO,EACP,GAAG,EACJ,MAAM,6BAA6B,CAAC;AAWrC,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAoLnD;;GAEG;AACH,qBAAa,WAAW;;IAOtB;;;;OAIG;gBACS,EAAE,EAAE,GAAG;IAoDnB;;;;;;OAMG;IACU,eAAe,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,gBAAgB,EAAE,GAAG,OAAO,CAAC,GAAG,EAAE,CAAC;CAyEzF"}
package/dist/import.js ADDED
@@ -0,0 +1,333 @@
1
+ "use strict";
2
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
3
+ if (kind === "m") throw new TypeError("Private method is not writable");
4
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
5
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
6
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
7
+ };
8
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
9
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
10
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
11
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
12
+ };
13
+ var _WrappedImportKey_instances, _WrappedImportKey_enclaveAttestation, _WrappedImportKey_enclaveSignature, _WrappedImportKey_verifyImportKey, _WrappedImportKey_signedData, _KeyImporter_instances, _KeyImporter_wrappedImportKey, _KeyImporter_subtleCrypto, _KeyImporter_publicKeyHandle, _KeyImporter_hpkeSuite, _KeyImporter_cs, _KeyImporter_getWrappedImportAndPubKey, _KeyImporter_getSubtleCrypto, _KeyImporter_encrypt;
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.KeyImporter = void 0;
16
+ const cubesigner_sdk_1 = require("@cubist-labs/cubesigner-sdk");
17
+ const core_1 = require("@hpke/core");
18
+ const asn1_ecc_1 = require("@peculiar/asn1-ecc");
19
+ const asn1_schema_1 = require("@peculiar/asn1-schema");
20
+ const x509_1 = require("@peculiar/x509");
21
+ const mnemonic_1 = require("./mnemonic");
22
+ const util_1 = require("./util");
23
+ // domain-separation tag used when generating signing hash for import key
24
+ const IMPORT_KEY_SIGNING_DST = new TextEncoder().encode("CUBESIGNER_EPHEMERAL_IMPORT_P384");
25
+ // attestation document slack times
26
+ const MAX_ATTESTATION_AGE_MINUTES = 15n;
27
+ const MAX_ATTESTATION_FUTURE_MINUTES = 5n;
28
+ const WIK_REFRESH_EARLY_MILLIS = 60000n;
29
+ // OIDs for elliptic curve X509 certs
30
+ const EC_PUBLIC_KEY = "1.2.840.10045.2.1";
31
+ const NIST_P384 = "1.3.132.0.34";
32
+ // Maximum number of keys to import in a single API call
33
+ const MAX_IMPORTS_PER_API_CALL = 32n;
34
+ // AWS Nitro Enclaves root CA certificate
35
+ // https://aws-nitro-enclaves.amazonaws.com/AWS_NitroEnclaves_Root-G1.zip
36
+ //
37
+ // See the documentation about AWS Nitro Enclaves verification:
38
+ // https://docs.aws.amazon.com/enclaves/latest/user/verify-root.html
39
+ const AWS_CA_CERT = "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";
40
+ /**
41
+ * The result of deserializing a CreateKeyImportKeyResponse
42
+ */
43
+ class WrappedImportKey {
44
+ /**
45
+ * Constructor. This is only called from `WrappedImportKey.createAndVerify()`.
46
+ *
47
+ * @param { CreateKeyImportKeyResponse } resp The response from CubeSigner
48
+ */
49
+ constructor(resp) {
50
+ _WrappedImportKey_instances.add(this);
51
+ _WrappedImportKey_enclaveAttestation.set(this, void 0);
52
+ _WrappedImportKey_enclaveSignature.set(this, void 0);
53
+ if (!resp.enclave_attestation || !resp.enclave_signature) {
54
+ throw new Error("No attestation found in CreateKeyImportKeyResponse");
55
+ }
56
+ // parse the response
57
+ this.publicKey = new Uint8Array(Buffer.from(resp.public_key, "base64"));
58
+ this.publicKeyBase64 = resp.public_key;
59
+ this.skEnc = new Uint8Array(Buffer.from(resp.sk_enc, "base64"));
60
+ this.skEncBase64 = resp.sk_enc;
61
+ this.dkEnc = new Uint8Array(Buffer.from(resp.dk_enc, "base64"));
62
+ this.dkEncBase64 = resp.dk_enc;
63
+ __classPrivateFieldSet(this, _WrappedImportKey_enclaveAttestation, new Uint8Array(Buffer.from(resp.enclave_attestation, "base64")), "f");
64
+ __classPrivateFieldSet(this, _WrappedImportKey_enclaveSignature, new Uint8Array(Buffer.from(resp.enclave_signature, "base64")), "f");
65
+ this.expEpochSeconds = BigInt(resp.expires);
66
+ // this array is updated in createAndVerify once verification succeeds
67
+ this.verifiedHash = new Uint8Array(32);
68
+ }
69
+ /**
70
+ * Create and verify an instance of this type
71
+ *
72
+ * @param { CreateKeyImportKeyResponse } resp The response from CubeSigner
73
+ * @param { SubtleCrypto } subtle An instance of SubtleCrypto used for verification
74
+ * @return { Promise<WrappedImportKey> } A newly constructed instance
75
+ */
76
+ static async createAndVerify(resp, subtle) {
77
+ const ret = new WrappedImportKey(resp);
78
+ const hash = await __classPrivateFieldGet(ret, _WrappedImportKey_instances, "m", _WrappedImportKey_verifyImportKey).call(ret, subtle);
79
+ ret.verifiedHash.set(hash);
80
+ return ret;
81
+ }
82
+ /**
83
+ * Returns `true` if this WrappedImportKey needs to be refreshed.
84
+ *
85
+ * @return { boolean } True just if this key needs to be refreshed.
86
+ */
87
+ needsRefresh() {
88
+ // force refresh if we're within WIK_REFRESH_EARLY_MILLIS of the expiration
89
+ return (0, util_1.nowEpochMillis)() + WIK_REFRESH_EARLY_MILLIS > this.expEpochSeconds * 1000n;
90
+ }
91
+ }
92
+ _WrappedImportKey_enclaveAttestation = new WeakMap(), _WrappedImportKey_enclaveSignature = new WeakMap(), _WrappedImportKey_instances = new WeakSet(), _WrappedImportKey_verifyImportKey =
93
+ /**
94
+ * Verify this wrapped import key.
95
+ *
96
+ * @param { SubtleCrypto } subtle An instance of SubtleCrypto used for verification
97
+ * @return { Promise<Uint8Array> } The hash of the successfully verified wrapped import key
98
+ */
99
+ async function _WrappedImportKey_verifyImportKey(subtle) {
100
+ // check expiration date
101
+ if ((0, util_1.nowEpochMillis)() > this.expEpochSeconds * 1000n) {
102
+ throw new Error("Import key is expired");
103
+ }
104
+ // make sure that there is an attestation
105
+ if (!__classPrivateFieldGet(this, _WrappedImportKey_enclaveSignature, "f") || !__classPrivateFieldGet(this, _WrappedImportKey_enclaveAttestation, "f")) {
106
+ throw new Error("No attestation found");
107
+ }
108
+ const signing_key = await verifyAttestationKey(__classPrivateFieldGet(this, _WrappedImportKey_enclaveAttestation, "f"));
109
+ // we use subtlecrypto's impl of RSA-PSS verification
110
+ const rsaPssKeyParams = {
111
+ name: "RSA-PSS",
112
+ hash: "SHA-256",
113
+ };
114
+ const pubkey = await subtle.importKey("spki", signing_key, rsaPssKeyParams, true, ["verify"]);
115
+ const pubkeyAlg = pubkey.algorithm;
116
+ // compute the signing hash and verify the signature
117
+ const message = __classPrivateFieldGet(this, _WrappedImportKey_instances, "m", _WrappedImportKey_signedData).call(this);
118
+ const mlen = Number(BigInt(pubkeyAlg.modulusLength) / 8n);
119
+ const rsaPssParams = {
120
+ name: "RSA-PSS",
121
+ saltLength: mlen - 2 - 32,
122
+ };
123
+ if (await subtle.verify(rsaPssParams, pubkey, __classPrivateFieldGet(this, _WrappedImportKey_enclaveSignature, "f"), message)) {
124
+ return new Uint8Array(await subtle.digest("SHA-256", message));
125
+ }
126
+ throw new Error("Import key signature verification failed");
127
+ }, _WrappedImportKey_signedData = function _WrappedImportKey_signedData() {
128
+ const parts = [
129
+ // domain separation tag
130
+ (0, util_1.toBigEndian)(BigInt(IMPORT_KEY_SIGNING_DST.length), 2),
131
+ IMPORT_KEY_SIGNING_DST,
132
+ // public key
133
+ (0, util_1.toBigEndian)(BigInt(this.publicKey.length), 2),
134
+ this.publicKey,
135
+ // sk_enc
136
+ (0, util_1.toBigEndian)(BigInt(this.skEnc.length), 2),
137
+ this.skEnc,
138
+ // dk_enc
139
+ (0, util_1.toBigEndian)(BigInt(this.dkEnc.length), 2),
140
+ this.dkEnc,
141
+ // 8-byte big-endian expiration time in seconds since UNIX epoch
142
+ (0, util_1.toBigEndian)(this.expEpochSeconds, 8),
143
+ ];
144
+ return (0, util_1.concatArrays)(parts);
145
+ };
146
+ /**
147
+ * An import encryption key and the corresponding attestation document
148
+ */
149
+ class KeyImporter {
150
+ /**
151
+ * Construct from a CubeSigner `Org` instance
152
+ *
153
+ * @param { Org } cs A CubeSigner `Org` instance
154
+ */
155
+ constructor(cs) {
156
+ _KeyImporter_instances.add(this);
157
+ _KeyImporter_wrappedImportKey.set(this, null);
158
+ _KeyImporter_subtleCrypto.set(this, null);
159
+ _KeyImporter_publicKeyHandle.set(this, null);
160
+ _KeyImporter_hpkeSuite.set(this, void 0);
161
+ _KeyImporter_cs.set(this, void 0);
162
+ __classPrivateFieldSet(this, _KeyImporter_cs, cs, "f");
163
+ __classPrivateFieldSet(this, _KeyImporter_hpkeSuite, new core_1.CipherSuite({
164
+ kem: new core_1.DhkemP384HkdfSha384(),
165
+ kdf: new core_1.HkdfSha384(),
166
+ aead: new core_1.Aes256Gcm(),
167
+ }), "f");
168
+ }
169
+ /**
170
+ * Encrypts a set of mnemonics and imports them.
171
+ *
172
+ * @param { KeyType } keyType The type of key to import
173
+ * @param { MnemonicToImport[] } mnes The mnemonics to import, with optional derivation paths and passwords
174
+ * @return { Promise<Key[]> } `Key` objects for each imported key.
175
+ */
176
+ async importMnemonics(keyType, mnes) {
177
+ const nChunks = Number((BigInt(mnes.length) + MAX_IMPORTS_PER_API_CALL - 1n) / MAX_IMPORTS_PER_API_CALL);
178
+ const keys = [];
179
+ for (let i = 0; i < nChunks; ++i) {
180
+ // first, make sure that the wrapped import key is valid, i.e., that
181
+ // we have retrieved it and that it hasn't expired. We do this here
182
+ // for a couple reasons:
183
+ //
184
+ // - all encryptions in a give request must use the same import key, and
185
+ //
186
+ // - when importing a huge number of keys the import pubkey might expire
187
+ // during the import, so we check for expiration before each request
188
+ const { wik, ipk } = await __classPrivateFieldGet(this, _KeyImporter_instances, "m", _KeyImporter_getWrappedImportAndPubKey).call(this);
189
+ // next, encrypt this chunk of mnemonics
190
+ const start = Number(MAX_IMPORTS_PER_API_CALL) * i;
191
+ const end = Number(MAX_IMPORTS_PER_API_CALL) + start;
192
+ const mneSlice = mnes.slice(start, end);
193
+ const key_material = [];
194
+ for (const mne of mneSlice) {
195
+ const keyPkg = (0, mnemonic_1.newMnemonicKeyPackage)(mne);
196
+ const material = await __classPrivateFieldGet(this, _KeyImporter_instances, "m", _KeyImporter_encrypt).call(this, keyPkg, wik.verifiedHash, ipk);
197
+ key_material.push(material);
198
+ }
199
+ // construct the request
200
+ const req = {
201
+ public_key: wik.publicKeyBase64,
202
+ sk_enc: wik.skEncBase64,
203
+ dk_enc: wik.dkEncBase64,
204
+ expires: Number(wik.expEpochSeconds),
205
+ key_type: keyType,
206
+ key_material,
207
+ };
208
+ // send it and append the result to the return value
209
+ const resp = await __classPrivateFieldGet(this, _KeyImporter_cs, "f").importKeys(req);
210
+ keys.push(...resp);
211
+ }
212
+ return keys;
213
+ }
214
+ }
215
+ exports.KeyImporter = KeyImporter;
216
+ _KeyImporter_wrappedImportKey = new WeakMap(), _KeyImporter_subtleCrypto = new WeakMap(), _KeyImporter_publicKeyHandle = new WeakMap(), _KeyImporter_hpkeSuite = new WeakMap(), _KeyImporter_cs = new WeakMap(), _KeyImporter_instances = new WeakSet(), _KeyImporter_getWrappedImportAndPubKey =
217
+ /**
218
+ * Check that the wrapped import key is unexpired and verified. Otherwise,
219
+ * request a new one, verify it, and update the verified signing hash.
220
+ *
221
+ * @return { Promise<[WrappedImportKey, CryptoKey]> } The verified signing hash.
222
+ */
223
+ async function _KeyImporter_getWrappedImportAndPubKey() {
224
+ if (!__classPrivateFieldGet(this, _KeyImporter_wrappedImportKey, "f")) {
225
+ // first time we load a WrappedImportKey, make sure the x509 crypto
226
+ // provider is set correctly.
227
+ x509_1.cryptoProvider.set(await (0, cubesigner_sdk_1.loadCrypto)());
228
+ }
229
+ if (!__classPrivateFieldGet(this, _KeyImporter_wrappedImportKey, "f") || __classPrivateFieldGet(this, _KeyImporter_wrappedImportKey, "f").needsRefresh()) {
230
+ const kikResp = await __classPrivateFieldGet(this, _KeyImporter_cs, "f").createKeyImportKey();
231
+ const subtle = await __classPrivateFieldGet(this, _KeyImporter_instances, "m", _KeyImporter_getSubtleCrypto).call(this);
232
+ const wik = await WrappedImportKey.createAndVerify(kikResp, subtle);
233
+ // import the public key from the WrappedImportKey
234
+ const p384Params = {
235
+ name: "ECDH",
236
+ namedCurve: "P-384",
237
+ };
238
+ __classPrivateFieldSet(this, _KeyImporter_publicKeyHandle, await subtle.importKey("raw", wik.publicKey, p384Params, true, []), "f");
239
+ __classPrivateFieldSet(this, _KeyImporter_wrappedImportKey, wik, "f");
240
+ }
241
+ return {
242
+ wik: __classPrivateFieldGet(this, _KeyImporter_wrappedImportKey, "f"),
243
+ ipk: __classPrivateFieldGet(this, _KeyImporter_publicKeyHandle, "f"),
244
+ };
245
+ }, _KeyImporter_getSubtleCrypto =
246
+ /**
247
+ * Get or create an instance of SubtleCrypto.
248
+ *
249
+ * @return { SubtleCrypto } The instance of SubtleCrypto.
250
+ */
251
+ async function _KeyImporter_getSubtleCrypto() {
252
+ if (!__classPrivateFieldGet(this, _KeyImporter_subtleCrypto, "f")) {
253
+ __classPrivateFieldSet(this, _KeyImporter_subtleCrypto, await (0, cubesigner_sdk_1.loadSubtleCrypto)(), "f");
254
+ }
255
+ return __classPrivateFieldGet(this, _KeyImporter_subtleCrypto, "f");
256
+ }, _KeyImporter_encrypt =
257
+ /**
258
+ * Encrypt to this wrapped import key. Stores the result in `this.encrypted_keys`
259
+ *
260
+ * @param { Uint8Array } data The data to encrypt
261
+ * @param { Uint8Array } verifiedHash The verified signing hash of the wrapped import key to which to encrypt
262
+ * @param { CryptoKey } pubkey The public key to encrypt to
263
+ * @return { Promise<ImportKeyRequestMaterial> } The encrypted key material
264
+ */
265
+ async function _KeyImporter_encrypt(data, verifiedHash, pubkey) {
266
+ // set up the HPKE sender
267
+ const sender = await __classPrivateFieldGet(this, _KeyImporter_hpkeSuite, "f").createSenderContext({
268
+ recipientPublicKey: pubkey,
269
+ info: verifiedHash,
270
+ });
271
+ // encrypt and construct the return value
272
+ const senderCtext = await sender.seal(data);
273
+ return {
274
+ salt: "",
275
+ client_public_key: Buffer.from(sender.enc).toString("base64"),
276
+ ikm_enc: Buffer.from(senderCtext).toString("base64"),
277
+ };
278
+ };
279
+ /**
280
+ * Verifies the attestation key against the AWS Nitro Enclaves signing
281
+ * key and returns the attested signing key.
282
+ *
283
+ * @param { Uint8Array } attBytes An attestation from an AWS nitro enclave
284
+ * @return { Promise<Uint8Array> } The signing key that was attested, or null if verification failed
285
+ */
286
+ async function verifyAttestationKey(attBytes) {
287
+ // cbor-x is being imported as ESM, so we must asynchronously import it here.
288
+ // Because we only use that and auth0/cose here, we import both this way.
289
+ const { Sign1 } = await import("@auth0/cose");
290
+ const { decode: cborDecode } = await import("cbor-x");
291
+ const att = Sign1.decode(attBytes);
292
+ const attDoc = cborDecode(att.payload);
293
+ // check expiration date of attestation
294
+ const latest = (0, util_1.nowEpochMillis)() + MAX_ATTESTATION_FUTURE_MINUTES * 60n * 1000n;
295
+ const earliest = latest - (MAX_ATTESTATION_FUTURE_MINUTES + MAX_ATTESTATION_AGE_MINUTES) * 60n * 1000n;
296
+ if (attDoc.timestamp < earliest || attDoc.timestamp > latest) {
297
+ throw new Error("Attestation is expired");
298
+ }
299
+ // if there's no public key in this attestation, give up
300
+ if (!attDoc.public_key) {
301
+ throw new Error("Attestation did not include a signing public key");
302
+ }
303
+ // Verify certificate chain starting with AWS Nitro CA cert
304
+ let parent = new x509_1.X509Certificate(AWS_CA_CERT);
305
+ for (let i = 0; i < attDoc.cabundle.length; ++i) {
306
+ const cert = new x509_1.X509Certificate(attDoc.cabundle[i]);
307
+ if (!(await cert.verify(parent))) {
308
+ throw new Error(`Attestation certificate chain failed at index ${i}`);
309
+ }
310
+ parent = cert;
311
+ }
312
+ const cert = new x509_1.X509Certificate(attDoc.certificate);
313
+ if (!(await cert.verify(parent))) {
314
+ throw new Error("Attestation certificate chain failed at leaf");
315
+ }
316
+ const pubkey = cert.publicKey;
317
+ // make sure that we got the expected public key type
318
+ const alg = new x509_1.AlgorithmProvider().toAsnAlgorithm(pubkey.algorithm);
319
+ if (alg.algorithm != EC_PUBLIC_KEY) {
320
+ // not the expected algorithm, i.e., elliptic curve signing
321
+ throw new Error("Attestation contained unexpected signature algorithm");
322
+ }
323
+ const params = asn1_schema_1.AsnParser.parse(alg.parameters, asn1_ecc_1.ECParameters);
324
+ if (!params.namedCurve || params.namedCurve !== NIST_P384) {
325
+ // not the expected params, i.e., NIST P384
326
+ throw new Error("Attestation contained unexpected signature algorithm");
327
+ }
328
+ // verify the cose signature with the key, which we verified against
329
+ // the AWS Nitro CA certificate above
330
+ await att.verify(await pubkey.export());
331
+ return attDoc.public_key;
332
+ }
333
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"import.js","sourceRoot":"","sources":["../src/import.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAQA,gEAA2E;AAC3E,qCAAqF;AACrF,iDAAkD;AAClD,uDAAkD;AAClD,yCAIwB;AAGxB,yCAAmD;AACnD,iCAAmE;AAEnE,yEAAyE;AACzE,MAAM,sBAAsB,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,kCAAkC,CAAC,CAAC;AAE5F,mCAAmC;AACnC,MAAM,2BAA2B,GAAG,GAAG,CAAC;AACxC,MAAM,8BAA8B,GAAG,EAAE,CAAC;AAC1C,MAAM,wBAAwB,GAAG,MAAO,CAAC;AAEzC,qCAAqC;AACrC,MAAM,aAAa,GAAG,mBAAmB,CAAC;AAC1C,MAAM,SAAS,GAAG,cAAc,CAAC;AAEjC,wDAAwD;AACxD,MAAM,wBAAwB,GAAG,GAAG,CAAC;AAErC,yCAAyC;AACzC,yEAAyE;AACzE,EAAE;AACF,+DAA+D;AAC/D,oEAAoE;AACpE,MAAM,WAAW,GACf,0sBAA0sB,CAAC;AAE7sB;;GAEG;AACH,MAAM,gBAAgB;IAgBpB;;;;OAIG;IACH,YAAoB,IAAgC;;QAR3C,uDAAgC;QAChC,qDAA8B;QAQrC,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACzD,MAAM,IAAI,KAAK,CAAC,oDAAoD,CAAC,CAAC;QACxE,CAAC;QAED,qBAAqB;QACrB,IAAI,CAAC,SAAS,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC,CAAC;QACxE,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,UAAU,CAAC;QAEvC,IAAI,CAAC,KAAK,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;QAChE,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC;QAE/B,IAAI,CAAC,KAAK,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;QAChE,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC;QAE/B,uBAAA,IAAI,wCAAuB,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC,MAAA,CAAC;QAC3F,uBAAA,IAAI,sCAAqB,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE,QAAQ,CAAC,CAAC,MAAA,CAAC;QACvF,IAAI,CAAC,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAE5C,sEAAsE;QACtE,IAAI,CAAC,YAAY,GAAG,IAAI,UAAU,CAAC,EAAE,CAAC,CAAC;IACzC,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,KAAK,CAAC,eAAe,CACjC,IAAgC,EAChC,MAAoB;QAEpB,MAAM,GAAG,GAAG,IAAI,gBAAgB,CAAC,IAAI,CAAC,CAAC;QACvC,MAAM,IAAI,GAAG,MAAM,uBAAA,GAAG,sEAAiB,MAApB,GAAG,EAAkB,MAAM,CAAC,CAAC;QAChD,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QAC3B,OAAO,GAAG,CAAC;IACb,CAAC;IA0CD;;;;OAIG;IACI,YAAY;QACjB,2EAA2E;QAC3E,OAAO,IAAA,qBAAc,GAAE,GAAG,wBAAwB,GAAG,IAAI,CAAC,eAAe,GAAG,KAAK,CAAC;IACpF,CAAC;CA+BF;;AA/EC;;;;;GAKG;AACH,KAAK,4CAAkB,MAAoB;IACzC,wBAAwB;IACxB,IAAI,IAAA,qBAAc,GAAE,GAAG,IAAI,CAAC,eAAe,GAAG,KAAK,EAAE,CAAC;QACpD,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;IAC3C,CAAC;IAED,yCAAyC;IACzC,IAAI,CAAC,uBAAA,IAAI,0CAAkB,IAAI,CAAC,uBAAA,IAAI,4CAAoB,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IACD,MAAM,WAAW,GAAG,MAAM,oBAAoB,CAAC,uBAAA,IAAI,4CAAoB,CAAC,CAAC;IAEzE,qDAAqD;IACrD,MAAM,eAAe,GAAG;QACtB,IAAI,EAAE,SAAS;QACf,IAAI,EAAE,SAAS;KAChB,CAAC;IACF,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,WAAW,EAAE,eAAe,EAAE,IAAI,EAAE,CAAC,QAAQ,CAAC,CAAC,CAAC;IAC9F,MAAM,SAAS,GAAG,MAAM,CAAC,SAAiD,CAAC;IAE3E,oDAAoD;IACpD,MAAM,OAAO,GAAG,uBAAA,IAAI,iEAAY,MAAhB,IAAI,CAAc,CAAC;IACnC,MAAM,IAAI,GAAG,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,GAAG,EAAE,CAAC,CAAC;IAC1D,MAAM,YAAY,GAAG;QACnB,IAAI,EAAE,SAAS;QACf,UAAU,EAAE,IAAI,GAAG,CAAC,GAAG,EAAE;KAC1B,CAAC;IAEF,IAAI,MAAM,MAAM,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,EAAE,uBAAA,IAAI,0CAAkB,EAAE,OAAO,CAAC,EAAE,CAAC;QAC/E,OAAO,IAAI,UAAU,CAAC,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAAC;IACjE,CAAC;IACD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;AAC9D,CAAC;IAkBC,MAAM,KAAK,GAAiB;QAC1B,wBAAwB;QACxB,IAAA,kBAAW,EAAC,MAAM,CAAC,sBAAsB,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACrD,sBAAsB;QAEtB,aAAa;QACb,IAAA,kBAAW,EAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAC7C,IAAI,CAAC,SAAS;QAEd,SAAS;QACT,IAAA,kBAAW,EAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACzC,IAAI,CAAC,KAAK;QAEV,SAAS;QACT,IAAA,kBAAW,EAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACzC,IAAI,CAAC,KAAK;QAEV,gEAAgE;QAChE,IAAA,kBAAW,EAAC,IAAI,CAAC,eAAe,EAAE,CAAC,CAAC;KACrC,CAAC;IAEF,OAAO,IAAA,mBAAY,EAAC,KAAK,CAAC,CAAC;AAC7B,CAAC;AAWH;;GAEG;AACH,MAAa,WAAW;IAOtB;;;;OAIG;IACH,YAAY,EAAO;;QAXnB,wCAA6C,IAAI,EAAC;QAClD,oCAAqC,IAAI,EAAC;QAC1C,uCAAqC,IAAI,EAAC;QACjC,yCAAwB;QACxB,kCAAS;QAQhB,uBAAA,IAAI,mBAAO,EAAE,MAAA,CAAC;QACd,uBAAA,IAAI,0BAAc,IAAI,kBAAW,CAAC;YAChC,GAAG,EAAE,IAAI,0BAAmB,EAAE;YAC9B,GAAG,EAAE,IAAI,iBAAU,EAAE;YACrB,IAAI,EAAE,IAAI,gBAAS,EAAE;SACtB,CAAC,MAAA,CAAC;IACL,CAAC;IA6CD;;;;;;OAMG;IACI,KAAK,CAAC,eAAe,CAAC,OAAgB,EAAE,IAAwB;QACrE,MAAM,OAAO,GAAG,MAAM,CACpB,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,GAAG,wBAAwB,GAAG,EAAE,CAAC,GAAG,wBAAwB,CACjF,CAAC;QACF,MAAM,IAAI,GAAG,EAAE,CAAC;QAEhB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,OAAO,EAAE,EAAE,CAAC,EAAE,CAAC;YACjC,oEAAoE;YACpE,mEAAmE;YACnE,wBAAwB;YACxB,EAAE;YACF,wEAAwE;YACxE,EAAE;YACF,wEAAwE;YACxE,sEAAsE;YACtE,MAAM,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,MAAM,uBAAA,IAAI,sEAA2B,MAA/B,IAAI,CAA6B,CAAC;YAE7D,wCAAwC;YACxC,MAAM,KAAK,GAAG,MAAM,CAAC,wBAAwB,CAAC,GAAG,CAAC,CAAC;YACnD,MAAM,GAAG,GAAG,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC;YACrD,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YACxC,MAAM,YAAY,GAAG,EAAE,CAAC;YACxB,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;gBAC3B,MAAM,MAAM,GAAG,IAAA,gCAAqB,EAAC,GAAG,CAAC,CAAC;gBAC1C,MAAM,QAAQ,GAAG,MAAM,uBAAA,IAAI,oDAAS,MAAb,IAAI,EAAU,MAAM,EAAE,GAAG,CAAC,YAAY,EAAE,GAAG,CAAC,CAAC;gBACpE,YAAY,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YAC9B,CAAC;YAED,wBAAwB;YACxB,MAAM,GAAG,GAAqB;gBAC5B,UAAU,EAAE,GAAG,CAAC,eAAe;gBAC/B,MAAM,EAAE,GAAG,CAAC,WAAW;gBACvB,MAAM,EAAE,GAAG,CAAC,WAAW;gBACvB,OAAO,EAAE,MAAM,CAAC,GAAG,CAAC,eAAe,CAAC;gBACpC,QAAQ,EAAE,OAAO;gBACjB,YAAY;aACb,CAAC;YAEF,oDAAoD;YACpD,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,uBAAI,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;YAC5C,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACrB,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;CA6BF;AAhJD,kCAgJC;;AA3HC;;;;;GAKG;AACH,KAAK;IACH,IAAI,CAAC,uBAAA,IAAI,qCAAkB,EAAE,CAAC;QAC5B,mEAAmE;QACnE,6BAA6B;QAC7B,qBAAkB,CAAC,GAAG,CAAC,MAAM,IAAA,2BAAU,GAAE,CAAC,CAAC;IAC7C,CAAC;IACD,IAAI,CAAC,uBAAA,IAAI,qCAAkB,IAAI,uBAAA,IAAI,qCAAkB,CAAC,YAAY,EAAE,EAAE,CAAC;QACrE,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,uBAAI,CAAC,kBAAkB,EAAE,CAAC;QACpD,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,4DAAiB,MAArB,IAAI,CAAmB,CAAC;QAC7C,MAAM,GAAG,GAAG,MAAM,gBAAgB,CAAC,eAAe,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;QAEpE,kDAAkD;QAClD,MAAM,UAAU,GAAG;YACjB,IAAI,EAAE,MAAM;YACZ,UAAU,EAAE,OAAO;SACpB,CAAC;QACF,uBAAA,IAAI,gCAAoB,MAAM,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,SAAS,EAAE,UAAU,EAAE,IAAI,EAAE,EAAE,CAAC,MAAA,CAAC;QAC3F,uBAAA,IAAI,iCAAqB,GAAG,MAAA,CAAC;IAC/B,CAAC;IACD,OAAO;QACL,GAAG,EAAE,uBAAA,IAAI,qCAAkB;QAC3B,GAAG,EAAE,uBAAA,IAAI,oCAAkB;KAC5B,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACH,KAAK;IACH,IAAI,CAAC,uBAAA,IAAI,iCAAc,EAAE,CAAC;QACxB,uBAAA,IAAI,6BAAiB,MAAM,IAAA,iCAAgB,GAAE,MAAA,CAAC;IAChD,CAAC;IACD,OAAO,uBAAA,IAAI,iCAAc,CAAC;AAC5B,CAAC;AAuDD;;;;;;;GAOG;AACH,KAAK,+BACH,IAAgB,EAChB,YAAwB,EACxB,MAAiB;IAEjB,yBAAyB;IACzB,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,8BAAW,CAAC,mBAAmB,CAAC;QACvD,kBAAkB,EAAE,MAAM;QAC1B,IAAI,EAAE,YAAY;KACnB,CAAC,CAAC;IAEH,yCAAyC;IACzC,MAAM,WAAW,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC5C,OAAO;QACL,IAAI,EAAE,EAAE;QACR,iBAAiB,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAC7D,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;KACrD,CAAC;AACJ,CAAC;AAoBH;;;;;;GAMG;AACH,KAAK,UAAU,oBAAoB,CAAC,QAAoB;IACtD,6EAA6E;IAC7E,yEAAyE;IACzE,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,MAAM,CAAC,aAAa,CAAC,CAAC;IAC9C,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,MAAM,CAAC,QAAQ,CAAC,CAAC;IAEtD,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;IACnC,MAAM,MAAM,GAAG,UAAU,CAAC,GAAG,CAAC,OAAO,CAAmB,CAAC;IAEzD,uCAAuC;IACvC,MAAM,MAAM,GAAG,IAAA,qBAAc,GAAE,GAAG,8BAA8B,GAAG,GAAG,GAAG,KAAK,CAAC;IAC/E,MAAM,QAAQ,GACZ,MAAM,GAAG,CAAC,8BAA8B,GAAG,2BAA2B,CAAC,GAAG,GAAG,GAAG,KAAK,CAAC;IACxF,IAAI,MAAM,CAAC,SAAS,GAAG,QAAQ,IAAI,MAAM,CAAC,SAAS,GAAG,MAAM,EAAE,CAAC;QAC7D,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;IAC5C,CAAC;IAED,wDAAwD;IACxD,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;QACvB,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;IACtE,CAAC;IAED,2DAA2D;IAC3D,IAAI,MAAM,GAAG,IAAI,sBAAe,CAAC,WAAW,CAAC,CAAC;IAC9C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,EAAE,EAAE,CAAC,EAAE,CAAC;QAChD,MAAM,IAAI,GAAG,IAAI,sBAAe,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC;QACrD,IAAI,CAAC,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,EAAE,CAAC,CAAC;QACxE,CAAC;QACD,MAAM,GAAG,IAAI,CAAC;IAChB,CAAC;IACD,MAAM,IAAI,GAAG,IAAI,sBAAe,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;IACrD,IAAI,CAAC,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC;QACjC,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;IAClE,CAAC;IACD,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;IAE9B,qDAAqD;IACrD,MAAM,GAAG,GAAG,IAAI,wBAAiB,EAAE,CAAC,cAAc,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IACrE,IAAI,GAAG,CAAC,SAAS,IAAI,aAAa,EAAE,CAAC;QACnC,2DAA2D;QAC3D,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;IAC1E,CAAC;IACD,MAAM,MAAM,GAAG,uBAAS,CAAC,KAAK,CAAC,GAAG,CAAC,UAAW,EAAE,uBAAY,CAAC,CAAC;IAC9D,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,UAAU,KAAK,SAAS,EAAE,CAAC;QAC1D,2CAA2C;QAC3C,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;IAC1E,CAAC;IAED,oEAAoE;IACpE,qCAAqC;IACrC,MAAM,GAAG,CAAC,MAAM,CAAC,MAAM,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;IAExC,OAAO,MAAM,CAAC,UAAU,CAAC;AAC3B,CAAC","sourcesContent":["import type {\n  CreateKeyImportKeyResponse,\n  ImportKeyRequest,\n  ImportKeyRequestMaterial,\n  Key,\n  KeyType,\n  Org,\n} from \"@cubist-labs/cubesigner-sdk\";\nimport { loadCrypto, loadSubtleCrypto } from \"@cubist-labs/cubesigner-sdk\";\nimport { CipherSuite, Aes256Gcm, HkdfSha384, DhkemP384HkdfSha384 } from \"@hpke/core\";\nimport { ECParameters } from \"@peculiar/asn1-ecc\";\nimport { AsnParser } from \"@peculiar/asn1-schema\";\nimport {\n  AlgorithmProvider,\n  X509Certificate,\n  cryptoProvider as x509CryptoProvider,\n} from \"@peculiar/x509\";\n\nimport type { MnemonicToImport } from \"./mnemonic\";\nimport { newMnemonicKeyPackage } from \"./mnemonic\";\nimport { toBigEndian, concatArrays, nowEpochMillis } from \"./util\";\n\n// domain-separation tag used when generating signing hash for import key\nconst IMPORT_KEY_SIGNING_DST = new TextEncoder().encode(\"CUBESIGNER_EPHEMERAL_IMPORT_P384\");\n\n// attestation document slack times\nconst MAX_ATTESTATION_AGE_MINUTES = 15n;\nconst MAX_ATTESTATION_FUTURE_MINUTES = 5n;\nconst WIK_REFRESH_EARLY_MILLIS = 60_000n;\n\n// OIDs for elliptic curve X509 certs\nconst EC_PUBLIC_KEY = \"1.2.840.10045.2.1\";\nconst NIST_P384 = \"1.3.132.0.34\";\n\n// Maximum number of keys to import in a single API call\nconst MAX_IMPORTS_PER_API_CALL = 32n;\n\n// AWS Nitro Enclaves root CA certificate\n// https://aws-nitro-enclaves.amazonaws.com/AWS_NitroEnclaves_Root-G1.zip\n//\n// See the documentation about AWS Nitro Enclaves verification:\n// https://docs.aws.amazon.com/enclaves/latest/user/verify-root.html\nconst AWS_CA_CERT =\n  \"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\";\n\n/**\n * The result of deserializing a CreateKeyImportKeyResponse\n */\nclass WrappedImportKey {\n  readonly verifiedHash: Uint8Array;\n\n  readonly publicKey: Uint8Array;\n  readonly publicKeyBase64: string;\n\n  readonly skEnc: Uint8Array;\n  readonly skEncBase64: string;\n\n  readonly dkEnc: Uint8Array;\n  readonly dkEncBase64: string;\n\n  readonly expEpochSeconds: bigint;\n  readonly #enclaveAttestation: Uint8Array;\n  readonly #enclaveSignature: Uint8Array;\n\n  /**\n   * Constructor. This is only called from `WrappedImportKey.createAndVerify()`.\n   *\n   * @param { CreateKeyImportKeyResponse } resp The response from CubeSigner\n   */\n  private constructor(resp: CreateKeyImportKeyResponse) {\n    if (!resp.enclave_attestation || !resp.enclave_signature) {\n      throw new Error(\"No attestation found in CreateKeyImportKeyResponse\");\n    }\n\n    // parse the response\n    this.publicKey = new Uint8Array(Buffer.from(resp.public_key, \"base64\"));\n    this.publicKeyBase64 = resp.public_key;\n\n    this.skEnc = new Uint8Array(Buffer.from(resp.sk_enc, \"base64\"));\n    this.skEncBase64 = resp.sk_enc;\n\n    this.dkEnc = new Uint8Array(Buffer.from(resp.dk_enc, \"base64\"));\n    this.dkEncBase64 = resp.dk_enc;\n\n    this.#enclaveAttestation = new Uint8Array(Buffer.from(resp.enclave_attestation, \"base64\"));\n    this.#enclaveSignature = new Uint8Array(Buffer.from(resp.enclave_signature, \"base64\"));\n    this.expEpochSeconds = BigInt(resp.expires);\n\n    // this array is updated in createAndVerify once verification succeeds\n    this.verifiedHash = new Uint8Array(32);\n  }\n\n  /**\n   * Create and verify an instance of this type\n   *\n   * @param { CreateKeyImportKeyResponse } resp The response from CubeSigner\n   * @param { SubtleCrypto } subtle An instance of SubtleCrypto used for verification\n   * @return { Promise<WrappedImportKey> } A newly constructed instance\n   */\n  public static async createAndVerify(\n    resp: CreateKeyImportKeyResponse,\n    subtle: SubtleCrypto,\n  ): Promise<WrappedImportKey> {\n    const ret = new WrappedImportKey(resp);\n    const hash = await ret.#verifyImportKey(subtle);\n    ret.verifiedHash.set(hash);\n    return ret;\n  }\n\n  /**\n   * Verify this wrapped import key.\n   *\n   * @param { SubtleCrypto } subtle An instance of SubtleCrypto used for verification\n   * @return { Promise<Uint8Array> } The hash of the successfully verified wrapped import key\n   */\n  async #verifyImportKey(subtle: SubtleCrypto): Promise<Uint8Array> {\n    // check expiration date\n    if (nowEpochMillis() > this.expEpochSeconds * 1000n) {\n      throw new Error(\"Import key is expired\");\n    }\n\n    // make sure that there is an attestation\n    if (!this.#enclaveSignature || !this.#enclaveAttestation) {\n      throw new Error(\"No attestation found\");\n    }\n    const signing_key = await verifyAttestationKey(this.#enclaveAttestation);\n\n    // we use subtlecrypto's impl of RSA-PSS verification\n    const rsaPssKeyParams = {\n      name: \"RSA-PSS\",\n      hash: \"SHA-256\",\n    };\n    const pubkey = await subtle.importKey(\"spki\", signing_key, rsaPssKeyParams, true, [\"verify\"]);\n    const pubkeyAlg = pubkey.algorithm as unknown as { modulusLength: number };\n\n    // compute the signing hash and verify the signature\n    const message = this.#signedData();\n    const mlen = Number(BigInt(pubkeyAlg.modulusLength) / 8n);\n    const rsaPssParams = {\n      name: \"RSA-PSS\",\n      saltLength: mlen - 2 - 32,\n    };\n\n    if (await subtle.verify(rsaPssParams, pubkey, this.#enclaveSignature, message)) {\n      return new Uint8Array(await subtle.digest(\"SHA-256\", message));\n    }\n    throw new Error(\"Import key signature verification failed\");\n  }\n\n  /**\n   * Returns `true` if this WrappedImportKey needs to be refreshed.\n   *\n   * @return { boolean } True just if this key needs to be refreshed.\n   */\n  public needsRefresh(): boolean {\n    // force refresh if we're within WIK_REFRESH_EARLY_MILLIS of the expiration\n    return nowEpochMillis() + WIK_REFRESH_EARLY_MILLIS > this.expEpochSeconds * 1000n;\n  }\n\n  /**\n   * Computes the signing hash for a wrapped import key\n   *\n   * @return { Uint8Array } The signing hash\n   */\n  #signedData(): Uint8Array {\n    const parts: Uint8Array[] = [\n      // domain separation tag\n      toBigEndian(BigInt(IMPORT_KEY_SIGNING_DST.length), 2),\n      IMPORT_KEY_SIGNING_DST,\n\n      // public key\n      toBigEndian(BigInt(this.publicKey.length), 2),\n      this.publicKey,\n\n      // sk_enc\n      toBigEndian(BigInt(this.skEnc.length), 2),\n      this.skEnc,\n\n      // dk_enc\n      toBigEndian(BigInt(this.dkEnc.length), 2),\n      this.dkEnc,\n\n      // 8-byte big-endian expiration time in seconds since UNIX epoch\n      toBigEndian(this.expEpochSeconds, 8),\n    ];\n\n    return concatArrays(parts);\n  }\n}\n\n/**\n * The return value from KeyImporter.#getWrappedImportAndPubKey()\n */\ntype WrappedImportAndPubKey = {\n  wik: WrappedImportKey;\n  ipk: CryptoKey;\n};\n\n/**\n * An import encryption key and the corresponding attestation document\n */\nexport class KeyImporter {\n  #wrappedImportKey: null | WrappedImportKey = null;\n  #subtleCrypto: null | SubtleCrypto = null;\n  #publicKeyHandle: null | CryptoKey = null;\n  readonly #hpkeSuite: CipherSuite;\n  readonly #cs: Org;\n\n  /**\n   * Construct from a CubeSigner `Org` instance\n   *\n   * @param { Org } cs A CubeSigner `Org` instance\n   */\n  constructor(cs: Org) {\n    this.#cs = cs;\n    this.#hpkeSuite = new CipherSuite({\n      kem: new DhkemP384HkdfSha384(),\n      kdf: new HkdfSha384(),\n      aead: new Aes256Gcm(),\n    });\n  }\n\n  /**\n   * Check that the wrapped import key is unexpired and verified. Otherwise,\n   * request a new one, verify it, and update the verified signing hash.\n   *\n   * @return { Promise<[WrappedImportKey, CryptoKey]> } The verified signing hash.\n   */\n  async #getWrappedImportAndPubKey(): Promise<WrappedImportAndPubKey> {\n    if (!this.#wrappedImportKey) {\n      // first time we load a WrappedImportKey, make sure the x509 crypto\n      // provider is set correctly.\n      x509CryptoProvider.set(await loadCrypto());\n    }\n    if (!this.#wrappedImportKey || this.#wrappedImportKey.needsRefresh()) {\n      const kikResp = await this.#cs.createKeyImportKey();\n      const subtle = await this.#getSubtleCrypto();\n      const wik = await WrappedImportKey.createAndVerify(kikResp, subtle);\n\n      // import the public key from the WrappedImportKey\n      const p384Params = {\n        name: \"ECDH\",\n        namedCurve: \"P-384\",\n      };\n      this.#publicKeyHandle = await subtle.importKey(\"raw\", wik.publicKey, p384Params, true, []);\n      this.#wrappedImportKey = wik;\n    }\n    return {\n      wik: this.#wrappedImportKey,\n      ipk: this.#publicKeyHandle!,\n    };\n  }\n\n  /**\n   * Get or create an instance of SubtleCrypto.\n   *\n   * @return { SubtleCrypto } The instance of SubtleCrypto.\n   */\n  async #getSubtleCrypto(): Promise<SubtleCrypto> {\n    if (!this.#subtleCrypto) {\n      this.#subtleCrypto = await loadSubtleCrypto();\n    }\n    return this.#subtleCrypto;\n  }\n\n  /**\n   * Encrypts a set of mnemonics and imports them.\n   *\n   * @param { KeyType } keyType The type of key to import\n   * @param { MnemonicToImport[] } mnes The mnemonics to import, with optional derivation paths and passwords\n   * @return { Promise<Key[]> } `Key` objects for each imported key.\n   */\n  public async importMnemonics(keyType: KeyType, mnes: MnemonicToImport[]): Promise<Key[]> {\n    const nChunks = Number(\n      (BigInt(mnes.length) + MAX_IMPORTS_PER_API_CALL - 1n) / MAX_IMPORTS_PER_API_CALL,\n    );\n    const keys = [];\n\n    for (let i = 0; i < nChunks; ++i) {\n      // first, make sure that the wrapped import key is valid, i.e., that\n      // we have retrieved it and that it hasn't expired. We do this here\n      // for a couple reasons:\n      //\n      // - all encryptions in a give request must use the same import key, and\n      //\n      // - when importing a huge number of keys the import pubkey might expire\n      //   during the import, so we check for expiration before each request\n      const { wik, ipk } = await this.#getWrappedImportAndPubKey();\n\n      // next, encrypt this chunk of mnemonics\n      const start = Number(MAX_IMPORTS_PER_API_CALL) * i;\n      const end = Number(MAX_IMPORTS_PER_API_CALL) + start;\n      const mneSlice = mnes.slice(start, end);\n      const key_material = [];\n      for (const mne of mneSlice) {\n        const keyPkg = newMnemonicKeyPackage(mne);\n        const material = await this.#encrypt(keyPkg, wik.verifiedHash, ipk);\n        key_material.push(material);\n      }\n\n      // construct the request\n      const req: ImportKeyRequest = {\n        public_key: wik.publicKeyBase64,\n        sk_enc: wik.skEncBase64,\n        dk_enc: wik.dkEncBase64,\n        expires: Number(wik.expEpochSeconds),\n        key_type: keyType,\n        key_material,\n      };\n\n      // send it and append the result to the return value\n      const resp = await this.#cs.importKeys(req);\n      keys.push(...resp);\n    }\n\n    return keys;\n  }\n\n  /**\n   * Encrypt to this wrapped import key. Stores the result in `this.encrypted_keys`\n   *\n   * @param { Uint8Array } data The data to encrypt\n   * @param { Uint8Array } verifiedHash The verified signing hash of the wrapped import key to which to encrypt\n   * @param { CryptoKey } pubkey The public key to encrypt to\n   * @return { Promise<ImportKeyRequestMaterial> } The encrypted key material\n   */\n  async #encrypt(\n    data: Uint8Array,\n    verifiedHash: Uint8Array,\n    pubkey: CryptoKey,\n  ): Promise<ImportKeyRequestMaterial> {\n    // set up the HPKE sender\n    const sender = await this.#hpkeSuite.createSenderContext({\n      recipientPublicKey: pubkey,\n      info: verifiedHash,\n    });\n\n    // encrypt and construct the return value\n    const senderCtext = await sender.seal(data);\n    return {\n      salt: \"\",\n      client_public_key: Buffer.from(sender.enc).toString(\"base64\"),\n      ikm_enc: Buffer.from(senderCtext).toString(\"base64\"),\n    };\n  }\n}\n\n/*\n * An AWS Nitro attestation document\n *\n * https://github.com/aws/aws-nitro-enclaves-nsm-api/blob/4b851f3006c6fa98f23dcffb2cba03b39de9b8af/src/api/mod.rs#L208\n */\ntype AttestationDoc = {\n  module_id: string;\n  digest: \"SHA256\" | \"SHA384\" | \"SHA512\";\n  timestamp: bigint;\n  pcrs: Map<number, Uint8Array>;\n  certificate: Uint8Array;\n  cabundle: Uint8Array[];\n  public_key?: Uint8Array;\n  user_data?: Uint8Array;\n  nonce?: Uint8Array;\n};\n\n/**\n * Verifies the attestation key against the AWS Nitro Enclaves signing\n * key and returns the attested signing key.\n *\n * @param { Uint8Array } attBytes An attestation from an AWS nitro enclave\n * @return { Promise<Uint8Array> } The signing key that was attested, or null if verification failed\n */\nasync function verifyAttestationKey(attBytes: Uint8Array): Promise<Uint8Array> {\n  // cbor-x is being imported as ESM, so we must asynchronously import it here.\n  // Because we only use that and auth0/cose here, we import both this way.\n  const { Sign1 } = await import(\"@auth0/cose\");\n  const { decode: cborDecode } = await import(\"cbor-x\");\n\n  const att = Sign1.decode(attBytes);\n  const attDoc = cborDecode(att.payload) as AttestationDoc;\n\n  // check expiration date of attestation\n  const latest = nowEpochMillis() + MAX_ATTESTATION_FUTURE_MINUTES * 60n * 1000n;\n  const earliest =\n    latest - (MAX_ATTESTATION_FUTURE_MINUTES + MAX_ATTESTATION_AGE_MINUTES) * 60n * 1000n;\n  if (attDoc.timestamp < earliest || attDoc.timestamp > latest) {\n    throw new Error(\"Attestation is expired\");\n  }\n\n  // if there's no public key in this attestation, give up\n  if (!attDoc.public_key) {\n    throw new Error(\"Attestation did not include a signing public key\");\n  }\n\n  // Verify certificate chain starting with AWS Nitro CA cert\n  let parent = new X509Certificate(AWS_CA_CERT);\n  for (let i = 0; i < attDoc.cabundle.length; ++i) {\n    const cert = new X509Certificate(attDoc.cabundle[i]);\n    if (!(await cert.verify(parent))) {\n      throw new Error(`Attestation certificate chain failed at index ${i}`);\n    }\n    parent = cert;\n  }\n  const cert = new X509Certificate(attDoc.certificate);\n  if (!(await cert.verify(parent))) {\n    throw new Error(\"Attestation certificate chain failed at leaf\");\n  }\n  const pubkey = cert.publicKey;\n\n  // make sure that we got the expected public key type\n  const alg = new AlgorithmProvider().toAsnAlgorithm(pubkey.algorithm);\n  if (alg.algorithm != EC_PUBLIC_KEY) {\n    // not the expected algorithm, i.e., elliptic curve signing\n    throw new Error(\"Attestation contained unexpected signature algorithm\");\n  }\n  const params = AsnParser.parse(alg.parameters!, ECParameters);\n  if (!params.namedCurve || params.namedCurve !== NIST_P384) {\n    // not the expected params, i.e., NIST P384\n    throw new Error(\"Attestation contained unexpected signature algorithm\");\n  }\n\n  // verify the cose signature with the key, which we verified against\n  // the AWS Nitro CA certificate above\n  await att.verify(await pubkey.export());\n\n  return attDoc.public_key;\n}\n"]}
@@ -0,0 +1,3 @@
1
+ export { KeyImporter } from "./import";
2
+ export { MnemonicToImport } from "./mnemonic";
3
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,UAAU,CAAC;AACvC,OAAO,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC"}
package/dist/index.js ADDED
@@ -0,0 +1,6 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.KeyImporter = void 0;
4
+ var import_1 = require("./import");
5
+ Object.defineProperty(exports, "KeyImporter", { enumerable: true, get: function () { return import_1.KeyImporter; } });
6
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7O0FBQUEsbUNBQXVDO0FBQTlCLHFHQUFBLFdBQVcsT0FBQSIsInNvdXJjZXNDb250ZW50IjpbImV4cG9ydCB7IEtleUltcG9ydGVyIH0gZnJvbSBcIi4vaW1wb3J0XCI7XG5leHBvcnQgeyBNbmVtb25pY1RvSW1wb3J0IH0gZnJvbSBcIi4vbW5lbW9uaWNcIjtcbiJdfQ==
@@ -0,0 +1,35 @@
1
+ export type MnemonicKeyPackage = {
2
+ EnglishMnemonic: {
3
+ mnemonic: {
4
+ entropy: Uint8Array;
5
+ };
6
+ der_path: {
7
+ path: number[];
8
+ };
9
+ password: string;
10
+ };
11
+ };
12
+ /**
13
+ * A BIP39 mnemonic to be imported, plus optional BIP39 password
14
+ * and BIP32 derivation path.
15
+ */
16
+ export type MnemonicToImport = {
17
+ mnemonic: string;
18
+ derivationPath?: string;
19
+ password?: string;
20
+ };
21
+ /**
22
+ * Create a new MnemonicKeyPackage value
23
+ *
24
+ * @param { MnemonicToImport } mne A BIP39 mnemonic and optional BIP39 password and BIP32 derivation path
25
+ * @return { Uint8Array } A serialized key package for import to CubeSigner
26
+ */
27
+ export declare function newMnemonicKeyPackage(mne: MnemonicToImport): Uint8Array;
28
+ /**
29
+ * Parse a derivation path into a sequence of 32-bit integers
30
+ *
31
+ * @param { string } derp The derivation path to parse; must start with 'm/'
32
+ * @return { number[] } The parsed path
33
+ */
34
+ export declare function parseDerivationPath(derp: string): number[];
35
+ //# sourceMappingURL=mnemonic.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"mnemonic.d.ts","sourceRoot":"","sources":["../src/mnemonic.ts"],"names":[],"mappings":"AAKA,MAAM,MAAM,kBAAkB,GAAG;IAC/B,eAAe,EAAE;QACf,QAAQ,EAAE;YACR,OAAO,EAAE,UAAU,CAAC;SACrB,CAAC;QACF,QAAQ,EAAE;YACR,IAAI,EAAE,MAAM,EAAE,CAAC;SAChB,CAAC;QACF,QAAQ,EAAE,MAAM,CAAC;KAClB,CAAC;CACH,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,gBAAgB,GAAG;IAC7B,QAAQ,EAAE,MAAM,CAAC;IACjB,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF;;;;;GAKG;AACH,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,gBAAgB,GAAG,UAAU,CAgBvE;AAMD;;;;;GAKG;AACH,wBAAgB,mBAAmB,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,EAAE,CA6B1D"}