@cubist-labs/cubesigner-sdk-key-import 0.4.68-0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +90 -0
- package/dist/import.d.ts +23 -0
- package/dist/import.d.ts.map +1 -0
- package/dist/import.js +333 -0
- package/dist/index.d.ts +3 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +6 -0
- package/dist/mnemonic.d.ts +35 -0
- package/dist/mnemonic.d.ts.map +1 -0
- package/dist/mnemonic.js +93 -0
- package/dist/util.d.ts +22 -0
- package/dist/util.d.ts.map +1 -0
- package/dist/util.js +49 -0
- package/package.json +39 -0
- package/src/import.ts +426 -0
- package/src/index.ts +2 -0
- package/src/mnemonic.ts +91 -0
- package/src/util.ts +47 -0
package/README.md
ADDED
|
@@ -0,0 +1,90 @@
|
|
|
1
|
+
# CubeSigner key import
|
|
2
|
+
|
|
3
|
+
This library implements the client-side encryption used to import keys
|
|
4
|
+
into CubeSigner.
|
|
5
|
+
|
|
6
|
+
## WARNING
|
|
7
|
+
|
|
8
|
+
Importing keys using code running in an untrusted environment is **dangerous**
|
|
9
|
+
because that code must process secret key material. For example, importing
|
|
10
|
+
keys from a user's web browser is **very risky**: exposing secret keys
|
|
11
|
+
in browsers means that malicious web pages, advertisements, and extensions
|
|
12
|
+
may be able to steal your key. JS execution environments are also great
|
|
13
|
+
targets for side-channel attackers.
|
|
14
|
+
|
|
15
|
+
Whenever possible, Cubist strongly recommends generating keys using the
|
|
16
|
+
`createKey` API. We strongly recommend against using local keygen plus
|
|
17
|
+
import as a replacement for real disaster-recovery backup. Please contact
|
|
18
|
+
us if you have questions about or need help with disaster-recovery planning.
|
|
19
|
+
|
|
20
|
+
## Example
|
|
21
|
+
|
|
22
|
+
```ts
|
|
23
|
+
import * as cs from "@cubist-labs/cubesigner-sdk";
|
|
24
|
+
import * as csFs from "@cubist-labs/cubesigner-sdk-fs-storage";
|
|
25
|
+
import { KeyImporter, type MnemonicToImport } from "@cubist-labs/cubesigner-sdk-key-import";
|
|
26
|
+
|
|
27
|
+
// create a CubeSigner client from credentials on-disk, which
|
|
28
|
+
// you can create by running `cs login` from the CLI.
|
|
29
|
+
const client = await cs.CubeSignerClient.create(csFs.defaultManagementSessionManager());
|
|
30
|
+
|
|
31
|
+
// create the key-importer instance
|
|
32
|
+
const keyImporter = new KeyImporter(client.org());
|
|
33
|
+
|
|
34
|
+
// mnemonics to import directly as EVM keys
|
|
35
|
+
const evmMnemonics: MnemonicToImport[] = [
|
|
36
|
+
{
|
|
37
|
+
mnemonic: "car split like parrot uphold faint amount alert inch bean priority custom auction denial reason oyster food duck horn top battle video seed company",
|
|
38
|
+
derivationPath: "m/44'/60'/0'/0/0",
|
|
39
|
+
},
|
|
40
|
+
{
|
|
41
|
+
mnemonic: "force focus walnut scale barrel faint hotel fabric source because heavy provide bridge intact they receive stairs matter fetch family color happy slender accident",
|
|
42
|
+
derivationPath: "m/44'/60'/1'/0/0",
|
|
43
|
+
password: "bip39 passwords are silly",
|
|
44
|
+
},
|
|
45
|
+
];
|
|
46
|
+
// mnemonic to import directly as Bitcoin Segwit keys
|
|
47
|
+
const btcMnemonics: MnemonicToImport[] = [
|
|
48
|
+
{
|
|
49
|
+
mnemonic: "style goddess hair mountain open when train mail fly engage fork walnut end toe mail price priority ocean uncover immune spray person slogan avoid",
|
|
50
|
+
derivationPath: "m/84'/0'/0'/0/0",
|
|
51
|
+
},
|
|
52
|
+
{
|
|
53
|
+
mnemonic: "marine airport maze doll note assume deliver second bus include deal escape detail friend letter captain glide actual resemble nation shell search elephant busy",
|
|
54
|
+
derivationPath: "m/84'/0'/9'/0/1",
|
|
55
|
+
},
|
|
56
|
+
];
|
|
57
|
+
|
|
58
|
+
// import the keys
|
|
59
|
+
const evmKeys = await keyImporter.importMnemonics(cs.Secp256k1.Evm, evmMnemonics);
|
|
60
|
+
const btcKeys = await keyImporter.importMnemonics(cs.Secp256k1.Btc, btcMnemonics);
|
|
61
|
+
|
|
62
|
+
// If you want to derive many keys from the same mnemonic, you should import
|
|
63
|
+
// the bare mnemonic and use the `deriveKey` and/or `deriveKeys` methods to
|
|
64
|
+
// create keys.
|
|
65
|
+
const bareMnemonic: MnemonicToImport = {
|
|
66
|
+
mnemonic: "divide impact town typical inhale uncover rifle pet multiply idea long before debate apart pulse type need produce among pony attend cat injury ring",
|
|
67
|
+
};
|
|
68
|
+
|
|
69
|
+
// First, import the bare mnemonic
|
|
70
|
+
const mnemonic = (await keyImporter.importMnemonics(cs.Mnemonic, [bareMnemonic]))[0];
|
|
71
|
+
|
|
72
|
+
// Then derive keys from it.
|
|
73
|
+
const deriveResponse = await org.deriveKey(cs.Secp256k1.Taproot, "m/86'/0'/3'/1/0", mnemonic.materialId);
|
|
74
|
+
const otherDeriveResponses = await org.deriveKeys(
|
|
75
|
+
cs.Secp256k1.Ava,
|
|
76
|
+
[
|
|
77
|
+
"m/1'/2'/3",
|
|
78
|
+
"m/4'/5/6",
|
|
79
|
+
"m/7/8'/9",
|
|
80
|
+
],
|
|
81
|
+
mnemonic.materialId,
|
|
82
|
+
);
|
|
83
|
+
```
|
|
84
|
+
|
|
85
|
+
# License
|
|
86
|
+
|
|
87
|
+
Copyright (C) 2024 Cubist, Inc. All rights reserved.
|
|
88
|
+
|
|
89
|
+
This library is licensed under the MIT and Apache-2.0 licenses.
|
|
90
|
+
See the [../../NOTICE] file for further information.
|
package/dist/import.d.ts
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
import type { Key, KeyType, Org } from "@cubist-labs/cubesigner-sdk";
|
|
2
|
+
import type { MnemonicToImport } from "./mnemonic";
|
|
3
|
+
/**
|
|
4
|
+
* An import encryption key and the corresponding attestation document
|
|
5
|
+
*/
|
|
6
|
+
export declare class KeyImporter {
|
|
7
|
+
#private;
|
|
8
|
+
/**
|
|
9
|
+
* Construct from a CubeSigner `Org` instance
|
|
10
|
+
*
|
|
11
|
+
* @param { Org } cs A CubeSigner `Org` instance
|
|
12
|
+
*/
|
|
13
|
+
constructor(cs: Org);
|
|
14
|
+
/**
|
|
15
|
+
* Encrypts a set of mnemonics and imports them.
|
|
16
|
+
*
|
|
17
|
+
* @param { KeyType } keyType The type of key to import
|
|
18
|
+
* @param { MnemonicToImport[] } mnes The mnemonics to import, with optional derivation paths and passwords
|
|
19
|
+
* @return { Promise<Key[]> } `Key` objects for each imported key.
|
|
20
|
+
*/
|
|
21
|
+
importMnemonics(keyType: KeyType, mnes: MnemonicToImport[]): Promise<Key[]>;
|
|
22
|
+
}
|
|
23
|
+
//# sourceMappingURL=import.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"import.d.ts","sourceRoot":"","sources":["../src/import.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAIV,GAAG,EACH,OAAO,EACP,GAAG,EACJ,MAAM,6BAA6B,CAAC;AAWrC,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAoLnD;;GAEG;AACH,qBAAa,WAAW;;IAOtB;;;;OAIG;gBACS,EAAE,EAAE,GAAG;IAoDnB;;;;;;OAMG;IACU,eAAe,CAAC,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,gBAAgB,EAAE,GAAG,OAAO,CAAC,GAAG,EAAE,CAAC;CAyEzF"}
|
package/dist/import.js
ADDED
|
@@ -0,0 +1,333 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
3
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
4
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
5
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
6
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
7
|
+
};
|
|
8
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
9
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
10
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
11
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
12
|
+
};
|
|
13
|
+
var _WrappedImportKey_instances, _WrappedImportKey_enclaveAttestation, _WrappedImportKey_enclaveSignature, _WrappedImportKey_verifyImportKey, _WrappedImportKey_signedData, _KeyImporter_instances, _KeyImporter_wrappedImportKey, _KeyImporter_subtleCrypto, _KeyImporter_publicKeyHandle, _KeyImporter_hpkeSuite, _KeyImporter_cs, _KeyImporter_getWrappedImportAndPubKey, _KeyImporter_getSubtleCrypto, _KeyImporter_encrypt;
|
|
14
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
15
|
+
exports.KeyImporter = void 0;
|
|
16
|
+
const cubesigner_sdk_1 = require("@cubist-labs/cubesigner-sdk");
|
|
17
|
+
const core_1 = require("@hpke/core");
|
|
18
|
+
const asn1_ecc_1 = require("@peculiar/asn1-ecc");
|
|
19
|
+
const asn1_schema_1 = require("@peculiar/asn1-schema");
|
|
20
|
+
const x509_1 = require("@peculiar/x509");
|
|
21
|
+
const mnemonic_1 = require("./mnemonic");
|
|
22
|
+
const util_1 = require("./util");
|
|
23
|
+
// domain-separation tag used when generating signing hash for import key
|
|
24
|
+
const IMPORT_KEY_SIGNING_DST = new TextEncoder().encode("CUBESIGNER_EPHEMERAL_IMPORT_P384");
|
|
25
|
+
// attestation document slack times
|
|
26
|
+
const MAX_ATTESTATION_AGE_MINUTES = 15n;
|
|
27
|
+
const MAX_ATTESTATION_FUTURE_MINUTES = 5n;
|
|
28
|
+
const WIK_REFRESH_EARLY_MILLIS = 60000n;
|
|
29
|
+
// OIDs for elliptic curve X509 certs
|
|
30
|
+
const EC_PUBLIC_KEY = "1.2.840.10045.2.1";
|
|
31
|
+
const NIST_P384 = "1.3.132.0.34";
|
|
32
|
+
// Maximum number of keys to import in a single API call
|
|
33
|
+
const MAX_IMPORTS_PER_API_CALL = 32n;
|
|
34
|
+
// AWS Nitro Enclaves root CA certificate
|
|
35
|
+
// https://aws-nitro-enclaves.amazonaws.com/AWS_NitroEnclaves_Root-G1.zip
|
|
36
|
+
//
|
|
37
|
+
// See the documentation about AWS Nitro Enclaves verification:
|
|
38
|
+
// https://docs.aws.amazon.com/enclaves/latest/user/verify-root.html
|
|
39
|
+
const AWS_CA_CERT = "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";
|
|
40
|
+
/**
|
|
41
|
+
* The result of deserializing a CreateKeyImportKeyResponse
|
|
42
|
+
*/
|
|
43
|
+
class WrappedImportKey {
|
|
44
|
+
/**
|
|
45
|
+
* Constructor. This is only called from `WrappedImportKey.createAndVerify()`.
|
|
46
|
+
*
|
|
47
|
+
* @param { CreateKeyImportKeyResponse } resp The response from CubeSigner
|
|
48
|
+
*/
|
|
49
|
+
constructor(resp) {
|
|
50
|
+
_WrappedImportKey_instances.add(this);
|
|
51
|
+
_WrappedImportKey_enclaveAttestation.set(this, void 0);
|
|
52
|
+
_WrappedImportKey_enclaveSignature.set(this, void 0);
|
|
53
|
+
if (!resp.enclave_attestation || !resp.enclave_signature) {
|
|
54
|
+
throw new Error("No attestation found in CreateKeyImportKeyResponse");
|
|
55
|
+
}
|
|
56
|
+
// parse the response
|
|
57
|
+
this.publicKey = new Uint8Array(Buffer.from(resp.public_key, "base64"));
|
|
58
|
+
this.publicKeyBase64 = resp.public_key;
|
|
59
|
+
this.skEnc = new Uint8Array(Buffer.from(resp.sk_enc, "base64"));
|
|
60
|
+
this.skEncBase64 = resp.sk_enc;
|
|
61
|
+
this.dkEnc = new Uint8Array(Buffer.from(resp.dk_enc, "base64"));
|
|
62
|
+
this.dkEncBase64 = resp.dk_enc;
|
|
63
|
+
__classPrivateFieldSet(this, _WrappedImportKey_enclaveAttestation, new Uint8Array(Buffer.from(resp.enclave_attestation, "base64")), "f");
|
|
64
|
+
__classPrivateFieldSet(this, _WrappedImportKey_enclaveSignature, new Uint8Array(Buffer.from(resp.enclave_signature, "base64")), "f");
|
|
65
|
+
this.expEpochSeconds = BigInt(resp.expires);
|
|
66
|
+
// this array is updated in createAndVerify once verification succeeds
|
|
67
|
+
this.verifiedHash = new Uint8Array(32);
|
|
68
|
+
}
|
|
69
|
+
/**
|
|
70
|
+
* Create and verify an instance of this type
|
|
71
|
+
*
|
|
72
|
+
* @param { CreateKeyImportKeyResponse } resp The response from CubeSigner
|
|
73
|
+
* @param { SubtleCrypto } subtle An instance of SubtleCrypto used for verification
|
|
74
|
+
* @return { Promise<WrappedImportKey> } A newly constructed instance
|
|
75
|
+
*/
|
|
76
|
+
static async createAndVerify(resp, subtle) {
|
|
77
|
+
const ret = new WrappedImportKey(resp);
|
|
78
|
+
const hash = await __classPrivateFieldGet(ret, _WrappedImportKey_instances, "m", _WrappedImportKey_verifyImportKey).call(ret, subtle);
|
|
79
|
+
ret.verifiedHash.set(hash);
|
|
80
|
+
return ret;
|
|
81
|
+
}
|
|
82
|
+
/**
|
|
83
|
+
* Returns `true` if this WrappedImportKey needs to be refreshed.
|
|
84
|
+
*
|
|
85
|
+
* @return { boolean } True just if this key needs to be refreshed.
|
|
86
|
+
*/
|
|
87
|
+
needsRefresh() {
|
|
88
|
+
// force refresh if we're within WIK_REFRESH_EARLY_MILLIS of the expiration
|
|
89
|
+
return (0, util_1.nowEpochMillis)() + WIK_REFRESH_EARLY_MILLIS > this.expEpochSeconds * 1000n;
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
_WrappedImportKey_enclaveAttestation = new WeakMap(), _WrappedImportKey_enclaveSignature = new WeakMap(), _WrappedImportKey_instances = new WeakSet(), _WrappedImportKey_verifyImportKey =
|
|
93
|
+
/**
|
|
94
|
+
* Verify this wrapped import key.
|
|
95
|
+
*
|
|
96
|
+
* @param { SubtleCrypto } subtle An instance of SubtleCrypto used for verification
|
|
97
|
+
* @return { Promise<Uint8Array> } The hash of the successfully verified wrapped import key
|
|
98
|
+
*/
|
|
99
|
+
async function _WrappedImportKey_verifyImportKey(subtle) {
|
|
100
|
+
// check expiration date
|
|
101
|
+
if ((0, util_1.nowEpochMillis)() > this.expEpochSeconds * 1000n) {
|
|
102
|
+
throw new Error("Import key is expired");
|
|
103
|
+
}
|
|
104
|
+
// make sure that there is an attestation
|
|
105
|
+
if (!__classPrivateFieldGet(this, _WrappedImportKey_enclaveSignature, "f") || !__classPrivateFieldGet(this, _WrappedImportKey_enclaveAttestation, "f")) {
|
|
106
|
+
throw new Error("No attestation found");
|
|
107
|
+
}
|
|
108
|
+
const signing_key = await verifyAttestationKey(__classPrivateFieldGet(this, _WrappedImportKey_enclaveAttestation, "f"));
|
|
109
|
+
// we use subtlecrypto's impl of RSA-PSS verification
|
|
110
|
+
const rsaPssKeyParams = {
|
|
111
|
+
name: "RSA-PSS",
|
|
112
|
+
hash: "SHA-256",
|
|
113
|
+
};
|
|
114
|
+
const pubkey = await subtle.importKey("spki", signing_key, rsaPssKeyParams, true, ["verify"]);
|
|
115
|
+
const pubkeyAlg = pubkey.algorithm;
|
|
116
|
+
// compute the signing hash and verify the signature
|
|
117
|
+
const message = __classPrivateFieldGet(this, _WrappedImportKey_instances, "m", _WrappedImportKey_signedData).call(this);
|
|
118
|
+
const mlen = Number(BigInt(pubkeyAlg.modulusLength) / 8n);
|
|
119
|
+
const rsaPssParams = {
|
|
120
|
+
name: "RSA-PSS",
|
|
121
|
+
saltLength: mlen - 2 - 32,
|
|
122
|
+
};
|
|
123
|
+
if (await subtle.verify(rsaPssParams, pubkey, __classPrivateFieldGet(this, _WrappedImportKey_enclaveSignature, "f"), message)) {
|
|
124
|
+
return new Uint8Array(await subtle.digest("SHA-256", message));
|
|
125
|
+
}
|
|
126
|
+
throw new Error("Import key signature verification failed");
|
|
127
|
+
}, _WrappedImportKey_signedData = function _WrappedImportKey_signedData() {
|
|
128
|
+
const parts = [
|
|
129
|
+
// domain separation tag
|
|
130
|
+
(0, util_1.toBigEndian)(BigInt(IMPORT_KEY_SIGNING_DST.length), 2),
|
|
131
|
+
IMPORT_KEY_SIGNING_DST,
|
|
132
|
+
// public key
|
|
133
|
+
(0, util_1.toBigEndian)(BigInt(this.publicKey.length), 2),
|
|
134
|
+
this.publicKey,
|
|
135
|
+
// sk_enc
|
|
136
|
+
(0, util_1.toBigEndian)(BigInt(this.skEnc.length), 2),
|
|
137
|
+
this.skEnc,
|
|
138
|
+
// dk_enc
|
|
139
|
+
(0, util_1.toBigEndian)(BigInt(this.dkEnc.length), 2),
|
|
140
|
+
this.dkEnc,
|
|
141
|
+
// 8-byte big-endian expiration time in seconds since UNIX epoch
|
|
142
|
+
(0, util_1.toBigEndian)(this.expEpochSeconds, 8),
|
|
143
|
+
];
|
|
144
|
+
return (0, util_1.concatArrays)(parts);
|
|
145
|
+
};
|
|
146
|
+
/**
|
|
147
|
+
* An import encryption key and the corresponding attestation document
|
|
148
|
+
*/
|
|
149
|
+
class KeyImporter {
|
|
150
|
+
/**
|
|
151
|
+
* Construct from a CubeSigner `Org` instance
|
|
152
|
+
*
|
|
153
|
+
* @param { Org } cs A CubeSigner `Org` instance
|
|
154
|
+
*/
|
|
155
|
+
constructor(cs) {
|
|
156
|
+
_KeyImporter_instances.add(this);
|
|
157
|
+
_KeyImporter_wrappedImportKey.set(this, null);
|
|
158
|
+
_KeyImporter_subtleCrypto.set(this, null);
|
|
159
|
+
_KeyImporter_publicKeyHandle.set(this, null);
|
|
160
|
+
_KeyImporter_hpkeSuite.set(this, void 0);
|
|
161
|
+
_KeyImporter_cs.set(this, void 0);
|
|
162
|
+
__classPrivateFieldSet(this, _KeyImporter_cs, cs, "f");
|
|
163
|
+
__classPrivateFieldSet(this, _KeyImporter_hpkeSuite, new core_1.CipherSuite({
|
|
164
|
+
kem: new core_1.DhkemP384HkdfSha384(),
|
|
165
|
+
kdf: new core_1.HkdfSha384(),
|
|
166
|
+
aead: new core_1.Aes256Gcm(),
|
|
167
|
+
}), "f");
|
|
168
|
+
}
|
|
169
|
+
/**
|
|
170
|
+
* Encrypts a set of mnemonics and imports them.
|
|
171
|
+
*
|
|
172
|
+
* @param { KeyType } keyType The type of key to import
|
|
173
|
+
* @param { MnemonicToImport[] } mnes The mnemonics to import, with optional derivation paths and passwords
|
|
174
|
+
* @return { Promise<Key[]> } `Key` objects for each imported key.
|
|
175
|
+
*/
|
|
176
|
+
async importMnemonics(keyType, mnes) {
|
|
177
|
+
const nChunks = Number((BigInt(mnes.length) + MAX_IMPORTS_PER_API_CALL - 1n) / MAX_IMPORTS_PER_API_CALL);
|
|
178
|
+
const keys = [];
|
|
179
|
+
for (let i = 0; i < nChunks; ++i) {
|
|
180
|
+
// first, make sure that the wrapped import key is valid, i.e., that
|
|
181
|
+
// we have retrieved it and that it hasn't expired. We do this here
|
|
182
|
+
// for a couple reasons:
|
|
183
|
+
//
|
|
184
|
+
// - all encryptions in a give request must use the same import key, and
|
|
185
|
+
//
|
|
186
|
+
// - when importing a huge number of keys the import pubkey might expire
|
|
187
|
+
// during the import, so we check for expiration before each request
|
|
188
|
+
const { wik, ipk } = await __classPrivateFieldGet(this, _KeyImporter_instances, "m", _KeyImporter_getWrappedImportAndPubKey).call(this);
|
|
189
|
+
// next, encrypt this chunk of mnemonics
|
|
190
|
+
const start = Number(MAX_IMPORTS_PER_API_CALL) * i;
|
|
191
|
+
const end = Number(MAX_IMPORTS_PER_API_CALL) + start;
|
|
192
|
+
const mneSlice = mnes.slice(start, end);
|
|
193
|
+
const key_material = [];
|
|
194
|
+
for (const mne of mneSlice) {
|
|
195
|
+
const keyPkg = (0, mnemonic_1.newMnemonicKeyPackage)(mne);
|
|
196
|
+
const material = await __classPrivateFieldGet(this, _KeyImporter_instances, "m", _KeyImporter_encrypt).call(this, keyPkg, wik.verifiedHash, ipk);
|
|
197
|
+
key_material.push(material);
|
|
198
|
+
}
|
|
199
|
+
// construct the request
|
|
200
|
+
const req = {
|
|
201
|
+
public_key: wik.publicKeyBase64,
|
|
202
|
+
sk_enc: wik.skEncBase64,
|
|
203
|
+
dk_enc: wik.dkEncBase64,
|
|
204
|
+
expires: Number(wik.expEpochSeconds),
|
|
205
|
+
key_type: keyType,
|
|
206
|
+
key_material,
|
|
207
|
+
};
|
|
208
|
+
// send it and append the result to the return value
|
|
209
|
+
const resp = await __classPrivateFieldGet(this, _KeyImporter_cs, "f").importKeys(req);
|
|
210
|
+
keys.push(...resp);
|
|
211
|
+
}
|
|
212
|
+
return keys;
|
|
213
|
+
}
|
|
214
|
+
}
|
|
215
|
+
exports.KeyImporter = KeyImporter;
|
|
216
|
+
_KeyImporter_wrappedImportKey = new WeakMap(), _KeyImporter_subtleCrypto = new WeakMap(), _KeyImporter_publicKeyHandle = new WeakMap(), _KeyImporter_hpkeSuite = new WeakMap(), _KeyImporter_cs = new WeakMap(), _KeyImporter_instances = new WeakSet(), _KeyImporter_getWrappedImportAndPubKey =
|
|
217
|
+
/**
|
|
218
|
+
* Check that the wrapped import key is unexpired and verified. Otherwise,
|
|
219
|
+
* request a new one, verify it, and update the verified signing hash.
|
|
220
|
+
*
|
|
221
|
+
* @return { Promise<[WrappedImportKey, CryptoKey]> } The verified signing hash.
|
|
222
|
+
*/
|
|
223
|
+
async function _KeyImporter_getWrappedImportAndPubKey() {
|
|
224
|
+
if (!__classPrivateFieldGet(this, _KeyImporter_wrappedImportKey, "f")) {
|
|
225
|
+
// first time we load a WrappedImportKey, make sure the x509 crypto
|
|
226
|
+
// provider is set correctly.
|
|
227
|
+
x509_1.cryptoProvider.set(await (0, cubesigner_sdk_1.loadCrypto)());
|
|
228
|
+
}
|
|
229
|
+
if (!__classPrivateFieldGet(this, _KeyImporter_wrappedImportKey, "f") || __classPrivateFieldGet(this, _KeyImporter_wrappedImportKey, "f").needsRefresh()) {
|
|
230
|
+
const kikResp = await __classPrivateFieldGet(this, _KeyImporter_cs, "f").createKeyImportKey();
|
|
231
|
+
const subtle = await __classPrivateFieldGet(this, _KeyImporter_instances, "m", _KeyImporter_getSubtleCrypto).call(this);
|
|
232
|
+
const wik = await WrappedImportKey.createAndVerify(kikResp, subtle);
|
|
233
|
+
// import the public key from the WrappedImportKey
|
|
234
|
+
const p384Params = {
|
|
235
|
+
name: "ECDH",
|
|
236
|
+
namedCurve: "P-384",
|
|
237
|
+
};
|
|
238
|
+
__classPrivateFieldSet(this, _KeyImporter_publicKeyHandle, await subtle.importKey("raw", wik.publicKey, p384Params, true, []), "f");
|
|
239
|
+
__classPrivateFieldSet(this, _KeyImporter_wrappedImportKey, wik, "f");
|
|
240
|
+
}
|
|
241
|
+
return {
|
|
242
|
+
wik: __classPrivateFieldGet(this, _KeyImporter_wrappedImportKey, "f"),
|
|
243
|
+
ipk: __classPrivateFieldGet(this, _KeyImporter_publicKeyHandle, "f"),
|
|
244
|
+
};
|
|
245
|
+
}, _KeyImporter_getSubtleCrypto =
|
|
246
|
+
/**
|
|
247
|
+
* Get or create an instance of SubtleCrypto.
|
|
248
|
+
*
|
|
249
|
+
* @return { SubtleCrypto } The instance of SubtleCrypto.
|
|
250
|
+
*/
|
|
251
|
+
async function _KeyImporter_getSubtleCrypto() {
|
|
252
|
+
if (!__classPrivateFieldGet(this, _KeyImporter_subtleCrypto, "f")) {
|
|
253
|
+
__classPrivateFieldSet(this, _KeyImporter_subtleCrypto, await (0, cubesigner_sdk_1.loadSubtleCrypto)(), "f");
|
|
254
|
+
}
|
|
255
|
+
return __classPrivateFieldGet(this, _KeyImporter_subtleCrypto, "f");
|
|
256
|
+
}, _KeyImporter_encrypt =
|
|
257
|
+
/**
|
|
258
|
+
* Encrypt to this wrapped import key. Stores the result in `this.encrypted_keys`
|
|
259
|
+
*
|
|
260
|
+
* @param { Uint8Array } data The data to encrypt
|
|
261
|
+
* @param { Uint8Array } verifiedHash The verified signing hash of the wrapped import key to which to encrypt
|
|
262
|
+
* @param { CryptoKey } pubkey The public key to encrypt to
|
|
263
|
+
* @return { Promise<ImportKeyRequestMaterial> } The encrypted key material
|
|
264
|
+
*/
|
|
265
|
+
async function _KeyImporter_encrypt(data, verifiedHash, pubkey) {
|
|
266
|
+
// set up the HPKE sender
|
|
267
|
+
const sender = await __classPrivateFieldGet(this, _KeyImporter_hpkeSuite, "f").createSenderContext({
|
|
268
|
+
recipientPublicKey: pubkey,
|
|
269
|
+
info: verifiedHash,
|
|
270
|
+
});
|
|
271
|
+
// encrypt and construct the return value
|
|
272
|
+
const senderCtext = await sender.seal(data);
|
|
273
|
+
return {
|
|
274
|
+
salt: "",
|
|
275
|
+
client_public_key: Buffer.from(sender.enc).toString("base64"),
|
|
276
|
+
ikm_enc: Buffer.from(senderCtext).toString("base64"),
|
|
277
|
+
};
|
|
278
|
+
};
|
|
279
|
+
/**
|
|
280
|
+
* Verifies the attestation key against the AWS Nitro Enclaves signing
|
|
281
|
+
* key and returns the attested signing key.
|
|
282
|
+
*
|
|
283
|
+
* @param { Uint8Array } attBytes An attestation from an AWS nitro enclave
|
|
284
|
+
* @return { Promise<Uint8Array> } The signing key that was attested, or null if verification failed
|
|
285
|
+
*/
|
|
286
|
+
async function verifyAttestationKey(attBytes) {
|
|
287
|
+
// cbor-x is being imported as ESM, so we must asynchronously import it here.
|
|
288
|
+
// Because we only use that and auth0/cose here, we import both this way.
|
|
289
|
+
const { Sign1 } = await import("@auth0/cose");
|
|
290
|
+
const { decode: cborDecode } = await import("cbor-x");
|
|
291
|
+
const att = Sign1.decode(attBytes);
|
|
292
|
+
const attDoc = cborDecode(att.payload);
|
|
293
|
+
// check expiration date of attestation
|
|
294
|
+
const latest = (0, util_1.nowEpochMillis)() + MAX_ATTESTATION_FUTURE_MINUTES * 60n * 1000n;
|
|
295
|
+
const earliest = latest - (MAX_ATTESTATION_FUTURE_MINUTES + MAX_ATTESTATION_AGE_MINUTES) * 60n * 1000n;
|
|
296
|
+
if (attDoc.timestamp < earliest || attDoc.timestamp > latest) {
|
|
297
|
+
throw new Error("Attestation is expired");
|
|
298
|
+
}
|
|
299
|
+
// if there's no public key in this attestation, give up
|
|
300
|
+
if (!attDoc.public_key) {
|
|
301
|
+
throw new Error("Attestation did not include a signing public key");
|
|
302
|
+
}
|
|
303
|
+
// Verify certificate chain starting with AWS Nitro CA cert
|
|
304
|
+
let parent = new x509_1.X509Certificate(AWS_CA_CERT);
|
|
305
|
+
for (let i = 0; i < attDoc.cabundle.length; ++i) {
|
|
306
|
+
const cert = new x509_1.X509Certificate(attDoc.cabundle[i]);
|
|
307
|
+
if (!(await cert.verify(parent))) {
|
|
308
|
+
throw new Error(`Attestation certificate chain failed at index ${i}`);
|
|
309
|
+
}
|
|
310
|
+
parent = cert;
|
|
311
|
+
}
|
|
312
|
+
const cert = new x509_1.X509Certificate(attDoc.certificate);
|
|
313
|
+
if (!(await cert.verify(parent))) {
|
|
314
|
+
throw new Error("Attestation certificate chain failed at leaf");
|
|
315
|
+
}
|
|
316
|
+
const pubkey = cert.publicKey;
|
|
317
|
+
// make sure that we got the expected public key type
|
|
318
|
+
const alg = new x509_1.AlgorithmProvider().toAsnAlgorithm(pubkey.algorithm);
|
|
319
|
+
if (alg.algorithm != EC_PUBLIC_KEY) {
|
|
320
|
+
// not the expected algorithm, i.e., elliptic curve signing
|
|
321
|
+
throw new Error("Attestation contained unexpected signature algorithm");
|
|
322
|
+
}
|
|
323
|
+
const params = asn1_schema_1.AsnParser.parse(alg.parameters, asn1_ecc_1.ECParameters);
|
|
324
|
+
if (!params.namedCurve || params.namedCurve !== NIST_P384) {
|
|
325
|
+
// not the expected params, i.e., NIST P384
|
|
326
|
+
throw new Error("Attestation contained unexpected signature algorithm");
|
|
327
|
+
}
|
|
328
|
+
// verify the cose signature with the key, which we verified against
|
|
329
|
+
// the AWS Nitro CA certificate above
|
|
330
|
+
await att.verify(await pubkey.export());
|
|
331
|
+
return attDoc.public_key;
|
|
332
|
+
}
|
|
333
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"import.js","sourceRoot":"","sources":["../src/import.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;AAQA,gEAA2E;AAC3E,qCAAqF;AACrF,iDAAkD;AAClD,uDAAkD;AAClD,yCAIwB;AAGxB,yCAAmD;AACnD,iCAAmE;AAEnE,yEAAyE;AACzE,MAAM,sBAAsB,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,kCAAkC,CAAC,CAAC;AAE5F,mCAAmC;AACnC,MAAM,2BAA2B,GAAG,GAAG,CAAC;AACxC,MAAM,8BAA8B,GAAG,EAAE,CAAC;AAC1C,MAAM,wBAAwB,GAAG,MAAO,CAAC;AAEzC,qCAAqC;AACrC,MAAM,aAAa,GAAG,mBAAmB,CAAC;AAC1C,MAAM,SAAS,GAAG,cAAc,CAAC;AAEjC,wDAAwD;AACxD,MAAM,wBAAwB,GAAG,GAAG,CAAC;AAErC,yCAAyC;AACzC,yEAAyE;AACzE,EAAE;AACF,+DAA+D;AAC/D,oEAAoE;AACpE,MAAM,WAAW,GACf,0sBAA0sB,CAAC;AAE7sB;;GAEG;AACH,MAAM,gBAAgB;IAgBpB;;;;OAIG;IACH,YAAoB,IAAgC;;QAR3C,uDAAgC;QAChC,qDAA8B;QAQrC,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE,CAAC;YACzD,MAAM,IAAI,KAAK,CAAC,oDAAoD,CAAC,CAAC;QACxE,CAAC;QAED,qBAAqB;QACrB,IAAI,CAAC,SAAS,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC,CAAC;QACxE,IAAI,CAAC,eAAe,GAAG,IAAI,CAAC,UAAU,CAAC;QAEvC,IAAI,CAAC,KAAK,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;QAChE,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC;QAE/B,IAAI,CAAC,KAAK,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC;QAChE,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC;QAE/B,uBAAA,IAAI,wCAAuB,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,QAAQ,CAAC,CAAC,MAAA,CAAC;QAC3F,uBAAA,IAAI,sCAAqB,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,iBAAiB,EAAE,QAAQ,CAAC,CAAC,MAAA,CAAC;QACvF,IAAI,CAAC,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAE5C,sEAAsE;QACtE,IAAI,CAAC,YAAY,GAAG,IAAI,UAAU,CAAC,EAAE,CAAC,CAAC;IACzC,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,KAAK,CAAC,eAAe,CACjC,IAAgC,EAChC,MAAoB;QAEpB,MAAM,GAAG,GAAG,IAAI,gBAAgB,CAAC,IAAI,CAAC,CAAC;QACvC,MAAM,IAAI,GAAG,MAAM,uBAAA,GAAG,sEAAiB,MAApB,GAAG,EAAkB,MAAM,CAAC,CAAC;QAChD,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QAC3B,OAAO,GAAG,CAAC;IACb,CAAC;IA0CD;;;;OAIG;IACI,YAAY;QACjB,2EAA2E;QAC3E,OAAO,IAAA,qBAAc,GAAE,GAAG,wBAAwB,GAAG,IAAI,CAAC,eAAe,GAAG,KAAK,CAAC;IACpF,CAAC;CA+BF;;AA/EC;;;;;GAKG;AACH,KAAK,4CAAkB,MAAoB;IACzC,wBAAwB;IACxB,IAAI,IAAA,qBAAc,GAAE,GAAG,IAAI,CAAC,eAAe,GAAG,KAAK,EAAE,CAAC;QACpD,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;IAC3C,CAAC;IAED,yCAAyC;IACzC,IAAI,CAAC,uBAAA,IAAI,0CAAkB,IAAI,CAAC,uBAAA,IAAI,4CAAoB,EAAE,CAAC;QACzD,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IACD,MAAM,WAAW,GAAG,MAAM,oBAAoB,CAAC,uBAAA,IAAI,4CAAoB,CAAC,CAAC;IAEzE,qDAAqD;IACrD,MAAM,eAAe,GAAG;QACtB,IAAI,EAAE,SAAS;QACf,IAAI,EAAE,SAAS;KAChB,CAAC;IACF,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,WAAW,EAAE,eAAe,EAAE,IAAI,EAAE,CAAC,QAAQ,CAAC,CAAC,CAAC;IAC9F,MAAM,SAAS,GAAG,MAAM,CAAC,SAAiD,CAAC;IAE3E,oDAAoD;IACpD,MAAM,OAAO,GAAG,uBAAA,IAAI,iEAAY,MAAhB,IAAI,CAAc,CAAC;IACnC,MAAM,IAAI,GAAG,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,GAAG,EAAE,CAAC,CAAC;IAC1D,MAAM,YAAY,GAAG;QACnB,IAAI,EAAE,SAAS;QACf,UAAU,EAAE,IAAI,GAAG,CAAC,GAAG,EAAE;KAC1B,CAAC;IAEF,IAAI,MAAM,MAAM,CAAC,MAAM,CAAC,YAAY,EAAE,MAAM,EAAE,uBAAA,IAAI,0CAAkB,EAAE,OAAO,CAAC,EAAE,CAAC;QAC/E,OAAO,IAAI,UAAU,CAAC,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAAC;IACjE,CAAC;IACD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;AAC9D,CAAC;IAkBC,MAAM,KAAK,GAAiB;QAC1B,wBAAwB;QACxB,IAAA,kBAAW,EAAC,MAAM,CAAC,sBAAsB,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACrD,sBAAsB;QAEtB,aAAa;QACb,IAAA,kBAAW,EAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QAC7C,IAAI,CAAC,SAAS;QAEd,SAAS;QACT,IAAA,kBAAW,EAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACzC,IAAI,CAAC,KAAK;QAEV,SAAS;QACT,IAAA,kBAAW,EAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;QACzC,IAAI,CAAC,KAAK;QAEV,gEAAgE;QAChE,IAAA,kBAAW,EAAC,IAAI,CAAC,eAAe,EAAE,CAAC,CAAC;KACrC,CAAC;IAEF,OAAO,IAAA,mBAAY,EAAC,KAAK,CAAC,CAAC;AAC7B,CAAC;AAWH;;GAEG;AACH,MAAa,WAAW;IAOtB;;;;OAIG;IACH,YAAY,EAAO;;QAXnB,wCAA6C,IAAI,EAAC;QAClD,oCAAqC,IAAI,EAAC;QAC1C,uCAAqC,IAAI,EAAC;QACjC,yCAAwB;QACxB,kCAAS;QAQhB,uBAAA,IAAI,mBAAO,EAAE,MAAA,CAAC;QACd,uBAAA,IAAI,0BAAc,IAAI,kBAAW,CAAC;YAChC,GAAG,EAAE,IAAI,0BAAmB,EAAE;YAC9B,GAAG,EAAE,IAAI,iBAAU,EAAE;YACrB,IAAI,EAAE,IAAI,gBAAS,EAAE;SACtB,CAAC,MAAA,CAAC;IACL,CAAC;IA6CD;;;;;;OAMG;IACI,KAAK,CAAC,eAAe,CAAC,OAAgB,EAAE,IAAwB;QACrE,MAAM,OAAO,GAAG,MAAM,CACpB,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,GAAG,wBAAwB,GAAG,EAAE,CAAC,GAAG,wBAAwB,CACjF,CAAC;QACF,MAAM,IAAI,GAAG,EAAE,CAAC;QAEhB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,OAAO,EAAE,EAAE,CAAC,EAAE,CAAC;YACjC,oEAAoE;YACpE,mEAAmE;YACnE,wBAAwB;YACxB,EAAE;YACF,wEAAwE;YACxE,EAAE;YACF,wEAAwE;YACxE,sEAAsE;YACtE,MAAM,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,MAAM,uBAAA,IAAI,sEAA2B,MAA/B,IAAI,CAA6B,CAAC;YAE7D,wCAAwC;YACxC,MAAM,KAAK,GAAG,MAAM,CAAC,wBAAwB,CAAC,GAAG,CAAC,CAAC;YACnD,MAAM,GAAG,GAAG,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC;YACrD,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;YACxC,MAAM,YAAY,GAAG,EAAE,CAAC;YACxB,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;gBAC3B,MAAM,MAAM,GAAG,IAAA,gCAAqB,EAAC,GAAG,CAAC,CAAC;gBAC1C,MAAM,QAAQ,GAAG,MAAM,uBAAA,IAAI,oDAAS,MAAb,IAAI,EAAU,MAAM,EAAE,GAAG,CAAC,YAAY,EAAE,GAAG,CAAC,CAAC;gBACpE,YAAY,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YAC9B,CAAC;YAED,wBAAwB;YACxB,MAAM,GAAG,GAAqB;gBAC5B,UAAU,EAAE,GAAG,CAAC,eAAe;gBAC/B,MAAM,EAAE,GAAG,CAAC,WAAW;gBACvB,MAAM,EAAE,GAAG,CAAC,WAAW;gBACvB,OAAO,EAAE,MAAM,CAAC,GAAG,CAAC,eAAe,CAAC;gBACpC,QAAQ,EAAE,OAAO;gBACjB,YAAY;aACb,CAAC;YAEF,oDAAoD;YACpD,MAAM,IAAI,GAAG,MAAM,uBAAA,IAAI,uBAAI,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;YAC5C,IAAI,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC;QACrB,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;CA6BF;AAhJD,kCAgJC;;AA3HC;;;;;GAKG;AACH,KAAK;IACH,IAAI,CAAC,uBAAA,IAAI,qCAAkB,EAAE,CAAC;QAC5B,mEAAmE;QACnE,6BAA6B;QAC7B,qBAAkB,CAAC,GAAG,CAAC,MAAM,IAAA,2BAAU,GAAE,CAAC,CAAC;IAC7C,CAAC;IACD,IAAI,CAAC,uBAAA,IAAI,qCAAkB,IAAI,uBAAA,IAAI,qCAAkB,CAAC,YAAY,EAAE,EAAE,CAAC;QACrE,MAAM,OAAO,GAAG,MAAM,uBAAA,IAAI,uBAAI,CAAC,kBAAkB,EAAE,CAAC;QACpD,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,4DAAiB,MAArB,IAAI,CAAmB,CAAC;QAC7C,MAAM,GAAG,GAAG,MAAM,gBAAgB,CAAC,eAAe,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC;QAEpE,kDAAkD;QAClD,MAAM,UAAU,GAAG;YACjB,IAAI,EAAE,MAAM;YACZ,UAAU,EAAE,OAAO;SACpB,CAAC;QACF,uBAAA,IAAI,gCAAoB,MAAM,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,SAAS,EAAE,UAAU,EAAE,IAAI,EAAE,EAAE,CAAC,MAAA,CAAC;QAC3F,uBAAA,IAAI,iCAAqB,GAAG,MAAA,CAAC;IAC/B,CAAC;IACD,OAAO;QACL,GAAG,EAAE,uBAAA,IAAI,qCAAkB;QAC3B,GAAG,EAAE,uBAAA,IAAI,oCAAkB;KAC5B,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACH,KAAK;IACH,IAAI,CAAC,uBAAA,IAAI,iCAAc,EAAE,CAAC;QACxB,uBAAA,IAAI,6BAAiB,MAAM,IAAA,iCAAgB,GAAE,MAAA,CAAC;IAChD,CAAC;IACD,OAAO,uBAAA,IAAI,iCAAc,CAAC;AAC5B,CAAC;AAuDD;;;;;;;GAOG;AACH,KAAK,+BACH,IAAgB,EAChB,YAAwB,EACxB,MAAiB;IAEjB,yBAAyB;IACzB,MAAM,MAAM,GAAG,MAAM,uBAAA,IAAI,8BAAW,CAAC,mBAAmB,CAAC;QACvD,kBAAkB,EAAE,MAAM;QAC1B,IAAI,EAAE,YAAY;KACnB,CAAC,CAAC;IAEH,yCAAyC;IACzC,MAAM,WAAW,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC5C,OAAO;QACL,IAAI,EAAE,EAAE;QACR,iBAAiB,EAAE,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAC7D,OAAO,EAAE,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC;KACrD,CAAC;AACJ,CAAC;AAoBH;;;;;;GAMG;AACH,KAAK,UAAU,oBAAoB,CAAC,QAAoB;IACtD,6EAA6E;IAC7E,yEAAyE;IACzE,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,MAAM,CAAC,aAAa,CAAC,CAAC;IAC9C,MAAM,EAAE,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,MAAM,CAAC,QAAQ,CAAC,CAAC;IAEtD,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;IACnC,MAAM,MAAM,GAAG,UAAU,CAAC,GAAG,CAAC,OAAO,CAAmB,CAAC;IAEzD,uCAAuC;IACvC,MAAM,MAAM,GAAG,IAAA,qBAAc,GAAE,GAAG,8BAA8B,GAAG,GAAG,GAAG,KAAK,CAAC;IAC/E,MAAM,QAAQ,GACZ,MAAM,GAAG,CAAC,8BAA8B,GAAG,2BAA2B,CAAC,GAAG,GAAG,GAAG,KAAK,CAAC;IACxF,IAAI,MAAM,CAAC,SAAS,GAAG,QAAQ,IAAI,MAAM,CAAC,SAAS,GAAG,MAAM,EAAE,CAAC;QAC7D,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;IAC5C,CAAC;IAED,wDAAwD;IACxD,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;QACvB,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;IACtE,CAAC;IAED,2DAA2D;IAC3D,IAAI,MAAM,GAAG,IAAI,sBAAe,CAAC,WAAW,CAAC,CAAC;IAC9C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,EAAE,EAAE,CAAC,EAAE,CAAC;QAChD,MAAM,IAAI,GAAG,IAAI,sBAAe,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC;QACrD,IAAI,CAAC,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,EAAE,CAAC,CAAC;QACxE,CAAC;QACD,MAAM,GAAG,IAAI,CAAC;IAChB,CAAC;IACD,MAAM,IAAI,GAAG,IAAI,sBAAe,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;IACrD,IAAI,CAAC,CAAC,MAAM,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC;QACjC,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;IAClE,CAAC;IACD,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;IAE9B,qDAAqD;IACrD,MAAM,GAAG,GAAG,IAAI,wBAAiB,EAAE,CAAC,cAAc,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IACrE,IAAI,GAAG,CAAC,SAAS,IAAI,aAAa,EAAE,CAAC;QACnC,2DAA2D;QAC3D,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;IAC1E,CAAC;IACD,MAAM,MAAM,GAAG,uBAAS,CAAC,KAAK,CAAC,GAAG,CAAC,UAAW,EAAE,uBAAY,CAAC,CAAC;IAC9D,IAAI,CAAC,MAAM,CAAC,UAAU,IAAI,MAAM,CAAC,UAAU,KAAK,SAAS,EAAE,CAAC;QAC1D,2CAA2C;QAC3C,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;IAC1E,CAAC;IAED,oEAAoE;IACpE,qCAAqC;IACrC,MAAM,GAAG,CAAC,MAAM,CAAC,MAAM,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;IAExC,OAAO,MAAM,CAAC,UAAU,CAAC;AAC3B,CAAC","sourcesContent":["import type {\n  CreateKeyImportKeyResponse,\n  ImportKeyRequest,\n  ImportKeyRequestMaterial,\n  Key,\n  KeyType,\n  Org,\n} from \"@cubist-labs/cubesigner-sdk\";\nimport { loadCrypto, loadSubtleCrypto } from \"@cubist-labs/cubesigner-sdk\";\nimport { CipherSuite, Aes256Gcm, HkdfSha384, DhkemP384HkdfSha384 } from \"@hpke/core\";\nimport { ECParameters } from \"@peculiar/asn1-ecc\";\nimport { AsnParser } from \"@peculiar/asn1-schema\";\nimport {\n  AlgorithmProvider,\n  X509Certificate,\n  cryptoProvider as x509CryptoProvider,\n} from \"@peculiar/x509\";\n\nimport type { MnemonicToImport } from \"./mnemonic\";\nimport { newMnemonicKeyPackage } from \"./mnemonic\";\nimport { toBigEndian, concatArrays, nowEpochMillis } from \"./util\";\n\n// domain-separation tag used when generating signing hash for import key\nconst IMPORT_KEY_SIGNING_DST = new TextEncoder().encode(\"CUBESIGNER_EPHEMERAL_IMPORT_P384\");\n\n// attestation document slack times\nconst MAX_ATTESTATION_AGE_MINUTES = 15n;\nconst MAX_ATTESTATION_FUTURE_MINUTES = 5n;\nconst WIK_REFRESH_EARLY_MILLIS = 60_000n;\n\n// OIDs for elliptic curve X509 certs\nconst EC_PUBLIC_KEY = \"1.2.840.10045.2.1\";\nconst NIST_P384 = \"1.3.132.0.34\";\n\n// Maximum number of keys to import in a single API call\nconst MAX_IMPORTS_PER_API_CALL = 32n;\n\n// AWS Nitro Enclaves root CA certificate\n// https://aws-nitro-enclaves.amazonaws.com/AWS_NitroEnclaves_Root-G1.zip\n//\n// See the documentation about AWS Nitro Enclaves verification:\n// https://docs.aws.amazon.com/enclaves/latest/user/verify-root.html\nconst AWS_CA_CERT =\n  \"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\";\n\n/**\n * The result of deserializing a CreateKeyImportKeyResponse\n */\nclass WrappedImportKey {\n  readonly verifiedHash: Uint8Array;\n\n  readonly publicKey: Uint8Array;\n  readonly publicKeyBase64: string;\n\n  readonly skEnc: Uint8Array;\n  readonly skEncBase64: string;\n\n  readonly dkEnc: Uint8Array;\n  readonly dkEncBase64: string;\n\n  readonly expEpochSeconds: bigint;\n  readonly #enclaveAttestation: Uint8Array;\n  readonly #enclaveSignature: Uint8Array;\n\n  /**\n   * Constructor. This is only called from `WrappedImportKey.createAndVerify()`.\n   *\n   * @param { CreateKeyImportKeyResponse } resp The response from CubeSigner\n   */\n  private constructor(resp: CreateKeyImportKeyResponse) {\n    if (!resp.enclave_attestation || !resp.enclave_signature) {\n      throw new Error(\"No attestation found in CreateKeyImportKeyResponse\");\n    }\n\n    // parse the response\n    this.publicKey = new Uint8Array(Buffer.from(resp.public_key, \"base64\"));\n    this.publicKeyBase64 = resp.public_key;\n\n    this.skEnc = new Uint8Array(Buffer.from(resp.sk_enc, \"base64\"));\n    this.skEncBase64 = resp.sk_enc;\n\n    this.dkEnc = new Uint8Array(Buffer.from(resp.dk_enc, \"base64\"));\n    this.dkEncBase64 = resp.dk_enc;\n\n    this.#enclaveAttestation = new Uint8Array(Buffer.from(resp.enclave_attestation, \"base64\"));\n    this.#enclaveSignature = new Uint8Array(Buffer.from(resp.enclave_signature, \"base64\"));\n    this.expEpochSeconds = BigInt(resp.expires);\n\n    // this array is updated in createAndVerify once verification succeeds\n    this.verifiedHash = new Uint8Array(32);\n  }\n\n  /**\n   * Create and verify an instance of this type\n   *\n   * @param { CreateKeyImportKeyResponse } resp The response from CubeSigner\n   * @param { SubtleCrypto } subtle An instance of SubtleCrypto used for verification\n   * @return { Promise<WrappedImportKey> } A newly constructed instance\n   */\n  public static async createAndVerify(\n    resp: CreateKeyImportKeyResponse,\n    subtle: SubtleCrypto,\n  ): Promise<WrappedImportKey> {\n    const ret = new WrappedImportKey(resp);\n    const hash = await ret.#verifyImportKey(subtle);\n    ret.verifiedHash.set(hash);\n    return ret;\n  }\n\n  /**\n   * Verify this wrapped import key.\n   *\n   * @param { SubtleCrypto } subtle An instance of SubtleCrypto used for verification\n   * @return { Promise<Uint8Array> } The hash of the successfully verified wrapped import key\n   */\n  async #verifyImportKey(subtle: SubtleCrypto): Promise<Uint8Array> {\n    // check expiration date\n    if (nowEpochMillis() > this.expEpochSeconds * 1000n) {\n      throw new Error(\"Import key is expired\");\n    }\n\n    // make sure that there is an attestation\n    if (!this.#enclaveSignature || !this.#enclaveAttestation) {\n      throw new Error(\"No attestation found\");\n    }\n    const signing_key = await verifyAttestationKey(this.#enclaveAttestation);\n\n    // we use subtlecrypto's impl of RSA-PSS verification\n    const rsaPssKeyParams = {\n      name: \"RSA-PSS\",\n      hash: \"SHA-256\",\n    };\n    const pubkey = await subtle.importKey(\"spki\", signing_key, rsaPssKeyParams, true, [\"verify\"]);\n    const pubkeyAlg = pubkey.algorithm as unknown as { modulusLength: number };\n\n    // compute the signing hash and verify the signature\n    const message = this.#signedData();\n    const mlen = Number(BigInt(pubkeyAlg.modulusLength) / 8n);\n    const rsaPssParams = {\n      name: \"RSA-PSS\",\n      saltLength: mlen - 2 - 32,\n    };\n\n    if (await subtle.verify(rsaPssParams, pubkey, this.#enclaveSignature, message)) {\n      return new Uint8Array(await subtle.digest(\"SHA-256\", message));\n    }\n    throw new Error(\"Import key signature verification failed\");\n  }\n\n  /**\n   * Returns `true` if this WrappedImportKey needs to be refreshed.\n   *\n   * @return { boolean } True just if this key needs to be refreshed.\n   */\n  public needsRefresh(): boolean {\n    // force refresh if we're within WIK_REFRESH_EARLY_MILLIS of the expiration\n    return nowEpochMillis() + WIK_REFRESH_EARLY_MILLIS > this.expEpochSeconds * 1000n;\n  }\n\n  /**\n   * Computes the signing hash for a wrapped import key\n   *\n   * @return { Uint8Array } The signing hash\n   */\n  #signedData(): Uint8Array {\n    const parts: Uint8Array[] = [\n      // domain separation tag\n      toBigEndian(BigInt(IMPORT_KEY_SIGNING_DST.length), 2),\n      IMPORT_KEY_SIGNING_DST,\n\n      // public key\n      toBigEndian(BigInt(this.publicKey.length), 2),\n      this.publicKey,\n\n      // sk_enc\n      toBigEndian(BigInt(this.skEnc.length), 2),\n      this.skEnc,\n\n      // dk_enc\n      toBigEndian(BigInt(this.dkEnc.length), 2),\n      this.dkEnc,\n\n      // 8-byte big-endian expiration time in seconds since UNIX epoch\n      toBigEndian(this.expEpochSeconds, 8),\n    ];\n\n    return concatArrays(parts);\n  }\n}\n\n/**\n * The return value from KeyImporter.#getWrappedImportAndPubKey()\n */\ntype WrappedImportAndPubKey = {\n  wik: WrappedImportKey;\n  ipk: CryptoKey;\n};\n\n/**\n * An import encryption key and the corresponding attestation document\n */\nexport class KeyImporter {\n  #wrappedImportKey: null | WrappedImportKey = null;\n  #subtleCrypto: null | SubtleCrypto = null;\n  #publicKeyHandle: null | CryptoKey = null;\n  readonly #hpkeSuite: CipherSuite;\n  readonly #cs: Org;\n\n  /**\n   * Construct from a CubeSigner `Org` instance\n   *\n   * @param { Org } cs A CubeSigner `Org` instance\n   */\n  constructor(cs: Org) {\n    this.#cs = cs;\n    this.#hpkeSuite = new CipherSuite({\n      kem: new DhkemP384HkdfSha384(),\n      kdf: new HkdfSha384(),\n      aead: new Aes256Gcm(),\n    });\n  }\n\n  /**\n   * Check that the wrapped import key is unexpired and verified. Otherwise,\n   * request a new one, verify it, and update the verified signing hash.\n   *\n   * @return { Promise<[WrappedImportKey, CryptoKey]> } The verified signing hash.\n   */\n  async #getWrappedImportAndPubKey(): Promise<WrappedImportAndPubKey> {\n    if (!this.#wrappedImportKey) {\n      // first time we load a WrappedImportKey, make sure the x509 crypto\n      // provider is set correctly.\n      x509CryptoProvider.set(await loadCrypto());\n    }\n    if (!this.#wrappedImportKey || this.#wrappedImportKey.needsRefresh()) {\n      const kikResp = await this.#cs.createKeyImportKey();\n      const subtle = await this.#getSubtleCrypto();\n      const wik = await WrappedImportKey.createAndVerify(kikResp, subtle);\n\n      // import the public key from the WrappedImportKey\n      const p384Params = {\n        name: \"ECDH\",\n        namedCurve: \"P-384\",\n      };\n      this.#publicKeyHandle = await subtle.importKey(\"raw\", wik.publicKey, p384Params, true, []);\n      this.#wrappedImportKey = wik;\n    }\n    return {\n      wik: this.#wrappedImportKey,\n      ipk: this.#publicKeyHandle!,\n    };\n  }\n\n  /**\n   * Get or create an instance of SubtleCrypto.\n   *\n   * @return { SubtleCrypto } The instance of SubtleCrypto.\n   */\n  async #getSubtleCrypto(): Promise<SubtleCrypto> {\n    if (!this.#subtleCrypto) {\n      this.#subtleCrypto = await loadSubtleCrypto();\n    }\n    return this.#subtleCrypto;\n  }\n\n  /**\n   * Encrypts a set of mnemonics and imports them.\n   *\n   * @param { KeyType } keyType The type of key to import\n   * @param { MnemonicToImport[] } mnes The mnemonics to import, with optional derivation paths and passwords\n   * @return { Promise<Key[]> } `Key` objects for each imported key.\n   */\n  public async importMnemonics(keyType: KeyType, mnes: MnemonicToImport[]): Promise<Key[]> {\n    const nChunks = Number(\n      (BigInt(mnes.length) + MAX_IMPORTS_PER_API_CALL - 1n) / MAX_IMPORTS_PER_API_CALL,\n    );\n    const keys = [];\n\n    for (let i = 0; i < nChunks; ++i) {\n      // first, make sure that the wrapped import key is valid, i.e., that\n      // we have retrieved it and that it hasn't expired. We do this here\n      // for a couple reasons:\n      //\n      // - all encryptions in a give request must use the same import key, and\n      //\n      // - when importing a huge number of keys the import pubkey might expire\n      //   during the import, so we check for expiration before each request\n      const { wik, ipk } = await this.#getWrappedImportAndPubKey();\n\n      // next, encrypt this chunk of mnemonics\n      const start = Number(MAX_IMPORTS_PER_API_CALL) * i;\n      const end = Number(MAX_IMPORTS_PER_API_CALL) + start;\n      const mneSlice = mnes.slice(start, end);\n      const key_material = [];\n      for (const mne of mneSlice) {\n        const keyPkg = newMnemonicKeyPackage(mne);\n        const material = await this.#encrypt(keyPkg, wik.verifiedHash, ipk);\n        key_material.push(material);\n      }\n\n      // construct the request\n      const req: ImportKeyRequest = {\n        public_key: wik.publicKeyBase64,\n        sk_enc: wik.skEncBase64,\n        dk_enc: wik.dkEncBase64,\n        expires: Number(wik.expEpochSeconds),\n        key_type: keyType,\n        key_material,\n      };\n\n      // send it and append the result to the return value\n      const resp = await this.#cs.importKeys(req);\n      keys.push(...resp);\n    }\n\n    return keys;\n  }\n\n  /**\n   * Encrypt to this wrapped import key. Stores the result in `this.encrypted_keys`\n   *\n   * @param { Uint8Array } data The data to encrypt\n   * @param { Uint8Array } verifiedHash The verified signing hash of the wrapped import key to which to encrypt\n   * @param { CryptoKey } pubkey The public key to encrypt to\n   * @return { Promise<ImportKeyRequestMaterial> } The encrypted key material\n   */\n  async #encrypt(\n    data: Uint8Array,\n    verifiedHash: Uint8Array,\n    pubkey: CryptoKey,\n  ): Promise<ImportKeyRequestMaterial> {\n    // set up the HPKE sender\n    const sender = await this.#hpkeSuite.createSenderContext({\n      recipientPublicKey: pubkey,\n      info: verifiedHash,\n    });\n\n    // encrypt and construct the return value\n    const senderCtext = await sender.seal(data);\n    return {\n      salt: \"\",\n      client_public_key: Buffer.from(sender.enc).toString(\"base64\"),\n      ikm_enc: Buffer.from(senderCtext).toString(\"base64\"),\n    };\n  }\n}\n\n/*\n * An AWS Nitro attestation document\n *\n * https://github.com/aws/aws-nitro-enclaves-nsm-api/blob/4b851f3006c6fa98f23dcffb2cba03b39de9b8af/src/api/mod.rs#L208\n */\ntype AttestationDoc = {\n  module_id: string;\n  digest: \"SHA256\" | \"SHA384\" | \"SHA512\";\n  timestamp: bigint;\n  pcrs: Map<number, Uint8Array>;\n  certificate: Uint8Array;\n  cabundle: Uint8Array[];\n  public_key?: Uint8Array;\n  user_data?: Uint8Array;\n  nonce?: Uint8Array;\n};\n\n/**\n * Verifies the attestation key against the AWS Nitro Enclaves signing\n * key and returns the attested signing key.\n *\n * @param { Uint8Array } attBytes An attestation from an AWS nitro enclave\n * @return { Promise<Uint8Array> } The signing key that was attested, or null if verification failed\n */\nasync function verifyAttestationKey(attBytes: Uint8Array): Promise<Uint8Array> {\n  // cbor-x is being imported as ESM, so we must asynchronously import it here.\n  // Because we only use that and auth0/cose here, we import both this way.\n  const { Sign1 } = await import(\"@auth0/cose\");\n  const { decode: cborDecode } = await import(\"cbor-x\");\n\n  const att = Sign1.decode(attBytes);\n  const attDoc = cborDecode(att.payload) as AttestationDoc;\n\n  // check expiration date of attestation\n  const latest = nowEpochMillis() + MAX_ATTESTATION_FUTURE_MINUTES * 60n * 1000n;\n  const earliest =\n    latest - (MAX_ATTESTATION_FUTURE_MINUTES + MAX_ATTESTATION_AGE_MINUTES) * 60n * 1000n;\n  if (attDoc.timestamp < earliest || attDoc.timestamp > latest) {\n    throw new Error(\"Attestation is expired\");\n  }\n\n  // if there's no public key in this attestation, give up\n  if (!attDoc.public_key) {\n    throw new Error(\"Attestation did not include a signing public key\");\n  }\n\n  // Verify certificate chain starting with AWS Nitro CA cert\n  let parent = new X509Certificate(AWS_CA_CERT);\n  for (let i = 0; i < attDoc.cabundle.length; ++i) {\n    const cert = new X509Certificate(attDoc.cabundle[i]);\n    if (!(await cert.verify(parent))) {\n      throw new Error(`Attestation certificate chain failed at index ${i}`);\n    }\n    parent = cert;\n  }\n  const cert = new X509Certificate(attDoc.certificate);\n  if (!(await cert.verify(parent))) {\n    throw new Error(\"Attestation certificate chain failed at leaf\");\n  }\n  const pubkey = cert.publicKey;\n\n  // make sure that we got the expected public key type\n  const alg = new AlgorithmProvider().toAsnAlgorithm(pubkey.algorithm);\n  if (alg.algorithm != EC_PUBLIC_KEY) {\n    // not the expected algorithm, i.e., elliptic curve signing\n    throw new Error(\"Attestation contained unexpected signature algorithm\");\n  }\n  const params = AsnParser.parse(alg.parameters!, ECParameters);\n  if (!params.namedCurve || params.namedCurve !== NIST_P384) {\n    // not the expected params, i.e., NIST P384\n    throw new Error(\"Attestation contained unexpected signature algorithm\");\n  }\n\n  // verify the cose signature with the key, which we verified against\n  // the AWS Nitro CA certificate above\n  await att.verify(await pubkey.export());\n\n  return attDoc.public_key;\n}\n"]}
|
package/dist/index.d.ts
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,UAAU,CAAC;AACvC,OAAO,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC"}
|
package/dist/index.js
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.KeyImporter = void 0;
|
|
4
|
+
var import_1 = require("./import");
|
|
5
|
+
Object.defineProperty(exports, "KeyImporter", { enumerable: true, get: function () { return import_1.KeyImporter; } });
|
|
6
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7O0FBQUEsbUNBQXVDO0FBQTlCLHFHQUFBLFdBQVcsT0FBQSIsInNvdXJjZXNDb250ZW50IjpbImV4cG9ydCB7IEtleUltcG9ydGVyIH0gZnJvbSBcIi4vaW1wb3J0XCI7XG5leHBvcnQgeyBNbmVtb25pY1RvSW1wb3J0IH0gZnJvbSBcIi4vbW5lbW9uaWNcIjtcbiJdfQ==
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
export type MnemonicKeyPackage = {
|
|
2
|
+
EnglishMnemonic: {
|
|
3
|
+
mnemonic: {
|
|
4
|
+
entropy: Uint8Array;
|
|
5
|
+
};
|
|
6
|
+
der_path: {
|
|
7
|
+
path: number[];
|
|
8
|
+
};
|
|
9
|
+
password: string;
|
|
10
|
+
};
|
|
11
|
+
};
|
|
12
|
+
/**
|
|
13
|
+
* A BIP39 mnemonic to be imported, plus optional BIP39 password
|
|
14
|
+
* and BIP32 derivation path.
|
|
15
|
+
*/
|
|
16
|
+
export type MnemonicToImport = {
|
|
17
|
+
mnemonic: string;
|
|
18
|
+
derivationPath?: string;
|
|
19
|
+
password?: string;
|
|
20
|
+
};
|
|
21
|
+
/**
|
|
22
|
+
* Create a new MnemonicKeyPackage value
|
|
23
|
+
*
|
|
24
|
+
* @param { MnemonicToImport } mne A BIP39 mnemonic and optional BIP39 password and BIP32 derivation path
|
|
25
|
+
* @return { Uint8Array } A serialized key package for import to CubeSigner
|
|
26
|
+
*/
|
|
27
|
+
export declare function newMnemonicKeyPackage(mne: MnemonicToImport): Uint8Array;
|
|
28
|
+
/**
|
|
29
|
+
* Parse a derivation path into a sequence of 32-bit integers
|
|
30
|
+
*
|
|
31
|
+
* @param { string } derp The derivation path to parse; must start with 'm/'
|
|
32
|
+
* @return { number[] } The parsed path
|
|
33
|
+
*/
|
|
34
|
+
export declare function parseDerivationPath(derp: string): number[];
|
|
35
|
+
//# sourceMappingURL=mnemonic.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mnemonic.d.ts","sourceRoot":"","sources":["../src/mnemonic.ts"],"names":[],"mappings":"AAKA,MAAM,MAAM,kBAAkB,GAAG;IAC/B,eAAe,EAAE;QACf,QAAQ,EAAE;YACR,OAAO,EAAE,UAAU,CAAC;SACrB,CAAC;QACF,QAAQ,EAAE;YACR,IAAI,EAAE,MAAM,EAAE,CAAC;SAChB,CAAC;QACF,QAAQ,EAAE,MAAM,CAAC;KAClB,CAAC;CACH,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,gBAAgB,GAAG;IAC7B,QAAQ,EAAE,MAAM,CAAC;IACjB,cAAc,CAAC,EAAE,MAAM,CAAC;IACxB,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF;;;;;GAKG;AACH,wBAAgB,qBAAqB,CAAC,GAAG,EAAE,gBAAgB,GAAG,UAAU,CAgBvE;AAMD;;;;;GAKG;AACH,wBAAgB,mBAAmB,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,EAAE,CA6B1D"}
|