@debros/network-ts-sdk 0.6.1 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +191 -0
- package/dist/index.d.ts +457 -5
- package/dist/index.js +790 -9
- package/dist/index.js.map +1 -1
- package/package.json +9 -2
- package/src/core/interfaces/IWebSocketClient.ts +2 -2
- package/src/core/ws.ts +14 -6
- package/src/index.ts +66 -0
- package/src/pubsub/client.ts +3 -3
- package/src/pubsub/types.ts +1 -1
- package/src/vault/auth.ts +98 -0
- package/src/vault/client.ts +197 -0
- package/src/vault/crypto/aes.ts +271 -0
- package/src/vault/crypto/hkdf.ts +42 -0
- package/src/vault/crypto/index.ts +27 -0
- package/src/vault/crypto/shamir.ts +173 -0
- package/src/vault/index.ts +65 -0
- package/src/vault/quorum.ts +16 -0
- package/src/vault/transport/fanout.ts +94 -0
- package/src/vault/transport/guardian.ts +285 -0
- package/src/vault/transport/index.ts +19 -0
- package/src/vault/transport/types.ts +101 -0
- package/src/vault/types.ts +62 -0
|
@@ -0,0 +1,271 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* AES-256-GCM Encryption
|
|
3
|
+
*
|
|
4
|
+
* Implements authenticated encryption using AES-256 in Galois/Counter Mode.
|
|
5
|
+
* Uses @noble/ciphers for platform-agnostic, audited cryptographic operations.
|
|
6
|
+
*
|
|
7
|
+
* Features:
|
|
8
|
+
* - Authenticated encryption (confidentiality + integrity)
|
|
9
|
+
* - 256-bit keys for strong security
|
|
10
|
+
* - 96-bit nonces (randomly generated)
|
|
11
|
+
* - 128-bit authentication tags
|
|
12
|
+
*
|
|
13
|
+
* Security considerations:
|
|
14
|
+
* - Never reuse a nonce with the same key
|
|
15
|
+
* - Nonces are randomly generated and prepended to ciphertext
|
|
16
|
+
* - Authentication tags are verified before decryption
|
|
17
|
+
*/
|
|
18
|
+
|
|
19
|
+
import { gcm } from '@noble/ciphers/aes';
|
|
20
|
+
import { randomBytes } from '@noble/ciphers/webcrypto';
|
|
21
|
+
import { bytesToHex, hexToBytes, concatBytes } from '@noble/hashes/utils';
|
|
22
|
+
|
|
23
|
+
/**
|
|
24
|
+
* Size constants
|
|
25
|
+
*/
|
|
26
|
+
export const KEY_SIZE = 32; // 256 bits
|
|
27
|
+
export const NONCE_SIZE = 12; // 96 bits (recommended for GCM)
|
|
28
|
+
export const TAG_SIZE = 16; // 128 bits
|
|
29
|
+
|
|
30
|
+
/**
|
|
31
|
+
* Encrypted data structure
|
|
32
|
+
*/
|
|
33
|
+
export interface EncryptedData {
|
|
34
|
+
/** Ciphertext including authentication tag */
|
|
35
|
+
ciphertext: Uint8Array;
|
|
36
|
+
/** Nonce used for encryption */
|
|
37
|
+
nonce: Uint8Array;
|
|
38
|
+
/** Additional authenticated data (optional) */
|
|
39
|
+
aad?: Uint8Array;
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
/**
|
|
43
|
+
* Serialized encrypted data (nonce prepended to ciphertext)
|
|
44
|
+
*/
|
|
45
|
+
export interface SerializedEncryptedData {
|
|
46
|
+
/** Combined nonce + ciphertext + tag */
|
|
47
|
+
data: Uint8Array;
|
|
48
|
+
/** Additional authenticated data (optional) */
|
|
49
|
+
aad?: Uint8Array;
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
/**
|
|
53
|
+
* Encrypts data using AES-256-GCM
|
|
54
|
+
*/
|
|
55
|
+
export function encrypt(
|
|
56
|
+
plaintext: Uint8Array,
|
|
57
|
+
key: Uint8Array,
|
|
58
|
+
aad?: Uint8Array
|
|
59
|
+
): EncryptedData {
|
|
60
|
+
validateKey(key);
|
|
61
|
+
|
|
62
|
+
const nonce = randomBytes(NONCE_SIZE);
|
|
63
|
+
const cipher = gcm(key, nonce, aad);
|
|
64
|
+
const ciphertext = cipher.encrypt(plaintext);
|
|
65
|
+
|
|
66
|
+
return {
|
|
67
|
+
ciphertext,
|
|
68
|
+
nonce,
|
|
69
|
+
aad,
|
|
70
|
+
};
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
/**
|
|
74
|
+
* Decrypts data using AES-256-GCM
|
|
75
|
+
*/
|
|
76
|
+
export function decrypt(encryptedData: EncryptedData, key: Uint8Array): Uint8Array {
|
|
77
|
+
validateKey(key);
|
|
78
|
+
validateNonce(encryptedData.nonce);
|
|
79
|
+
|
|
80
|
+
const cipher = gcm(key, encryptedData.nonce, encryptedData.aad);
|
|
81
|
+
|
|
82
|
+
try {
|
|
83
|
+
return cipher.decrypt(encryptedData.ciphertext);
|
|
84
|
+
} catch (error) {
|
|
85
|
+
throw new Error('Decryption failed: invalid ciphertext or authentication tag');
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
/**
|
|
90
|
+
* Encrypts a string message
|
|
91
|
+
*/
|
|
92
|
+
export function encryptString(
|
|
93
|
+
message: string,
|
|
94
|
+
key: Uint8Array,
|
|
95
|
+
aad?: Uint8Array
|
|
96
|
+
): EncryptedData {
|
|
97
|
+
const plaintext = new TextEncoder().encode(message);
|
|
98
|
+
try {
|
|
99
|
+
return encrypt(plaintext, key, aad);
|
|
100
|
+
} finally {
|
|
101
|
+
plaintext.fill(0);
|
|
102
|
+
}
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
/**
|
|
106
|
+
* Decrypts to a string message
|
|
107
|
+
*/
|
|
108
|
+
export function decryptString(encryptedData: EncryptedData, key: Uint8Array): string {
|
|
109
|
+
const plaintext = decrypt(encryptedData, key);
|
|
110
|
+
try {
|
|
111
|
+
return new TextDecoder().decode(plaintext);
|
|
112
|
+
} finally {
|
|
113
|
+
plaintext.fill(0);
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
/**
|
|
118
|
+
* Serializes encrypted data (prepends nonce to ciphertext)
|
|
119
|
+
*/
|
|
120
|
+
export function serialize(encryptedData: EncryptedData): SerializedEncryptedData {
|
|
121
|
+
const data = concatBytes(encryptedData.nonce, encryptedData.ciphertext);
|
|
122
|
+
|
|
123
|
+
return {
|
|
124
|
+
data,
|
|
125
|
+
aad: encryptedData.aad,
|
|
126
|
+
};
|
|
127
|
+
}
|
|
128
|
+
|
|
129
|
+
/**
|
|
130
|
+
* Deserializes encrypted data
|
|
131
|
+
*/
|
|
132
|
+
export function deserialize(serialized: SerializedEncryptedData): EncryptedData {
|
|
133
|
+
if (serialized.data.length < NONCE_SIZE + TAG_SIZE) {
|
|
134
|
+
throw new Error('Invalid serialized data: too short');
|
|
135
|
+
}
|
|
136
|
+
|
|
137
|
+
const nonce = serialized.data.slice(0, NONCE_SIZE);
|
|
138
|
+
const ciphertext = serialized.data.slice(NONCE_SIZE);
|
|
139
|
+
|
|
140
|
+
return {
|
|
141
|
+
ciphertext,
|
|
142
|
+
nonce,
|
|
143
|
+
aad: serialized.aad,
|
|
144
|
+
};
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
/**
|
|
148
|
+
* Encrypts and serializes data in one step
|
|
149
|
+
*/
|
|
150
|
+
export function encryptAndSerialize(
|
|
151
|
+
plaintext: Uint8Array,
|
|
152
|
+
key: Uint8Array,
|
|
153
|
+
aad?: Uint8Array
|
|
154
|
+
): SerializedEncryptedData {
|
|
155
|
+
const encrypted = encrypt(plaintext, key, aad);
|
|
156
|
+
return serialize(encrypted);
|
|
157
|
+
}
|
|
158
|
+
|
|
159
|
+
/**
|
|
160
|
+
* Deserializes and decrypts data in one step
|
|
161
|
+
*/
|
|
162
|
+
export function deserializeAndDecrypt(
|
|
163
|
+
serialized: SerializedEncryptedData,
|
|
164
|
+
key: Uint8Array
|
|
165
|
+
): Uint8Array {
|
|
166
|
+
const encrypted = deserialize(serialized);
|
|
167
|
+
return decrypt(encrypted, key);
|
|
168
|
+
}
|
|
169
|
+
|
|
170
|
+
/**
|
|
171
|
+
* Converts encrypted data to hex string
|
|
172
|
+
*/
|
|
173
|
+
export function toHex(encryptedData: EncryptedData): string {
|
|
174
|
+
const serialized = serialize(encryptedData);
|
|
175
|
+
return bytesToHex(serialized.data);
|
|
176
|
+
}
|
|
177
|
+
|
|
178
|
+
/**
|
|
179
|
+
* Parses encrypted data from hex string
|
|
180
|
+
*/
|
|
181
|
+
export function fromHex(hex: string, aad?: Uint8Array): EncryptedData {
|
|
182
|
+
const normalized = hex.startsWith('0x') ? hex.slice(2) : hex;
|
|
183
|
+
const data = hexToBytes(normalized);
|
|
184
|
+
|
|
185
|
+
return deserialize({ data, aad });
|
|
186
|
+
}
|
|
187
|
+
|
|
188
|
+
/**
|
|
189
|
+
* Converts encrypted data to base64 string
|
|
190
|
+
*/
|
|
191
|
+
export function toBase64(encryptedData: EncryptedData): string {
|
|
192
|
+
const serialized = serialize(encryptedData);
|
|
193
|
+
|
|
194
|
+
if (typeof btoa === 'function') {
|
|
195
|
+
return btoa(String.fromCharCode(...serialized.data));
|
|
196
|
+
} else {
|
|
197
|
+
return Buffer.from(serialized.data).toString('base64');
|
|
198
|
+
}
|
|
199
|
+
}
|
|
200
|
+
|
|
201
|
+
/**
|
|
202
|
+
* Parses encrypted data from base64 string
|
|
203
|
+
*/
|
|
204
|
+
export function fromBase64(base64: string, aad?: Uint8Array): EncryptedData {
|
|
205
|
+
let data: Uint8Array;
|
|
206
|
+
|
|
207
|
+
if (typeof atob === 'function') {
|
|
208
|
+
const binary = atob(base64);
|
|
209
|
+
data = new Uint8Array(binary.length);
|
|
210
|
+
for (let i = 0; i < binary.length; i++) {
|
|
211
|
+
data[i] = binary.charCodeAt(i);
|
|
212
|
+
}
|
|
213
|
+
} else {
|
|
214
|
+
data = new Uint8Array(Buffer.from(base64, 'base64'));
|
|
215
|
+
}
|
|
216
|
+
|
|
217
|
+
return deserialize({ data, aad });
|
|
218
|
+
}
|
|
219
|
+
|
|
220
|
+
function validateKey(key: Uint8Array): void {
|
|
221
|
+
if (!(key instanceof Uint8Array)) {
|
|
222
|
+
throw new Error('Key must be a Uint8Array');
|
|
223
|
+
}
|
|
224
|
+
|
|
225
|
+
if (key.length !== KEY_SIZE) {
|
|
226
|
+
throw new Error(`Invalid key length: expected ${KEY_SIZE}, got ${key.length}`);
|
|
227
|
+
}
|
|
228
|
+
}
|
|
229
|
+
|
|
230
|
+
function validateNonce(nonce: Uint8Array): void {
|
|
231
|
+
if (!(nonce instanceof Uint8Array)) {
|
|
232
|
+
throw new Error('Nonce must be a Uint8Array');
|
|
233
|
+
}
|
|
234
|
+
|
|
235
|
+
if (nonce.length !== NONCE_SIZE) {
|
|
236
|
+
throw new Error(`Invalid nonce length: expected ${NONCE_SIZE}, got ${nonce.length}`);
|
|
237
|
+
}
|
|
238
|
+
}
|
|
239
|
+
|
|
240
|
+
/**
|
|
241
|
+
* Generates a random encryption key
|
|
242
|
+
*/
|
|
243
|
+
export function generateKey(): Uint8Array {
|
|
244
|
+
return randomBytes(KEY_SIZE);
|
|
245
|
+
}
|
|
246
|
+
|
|
247
|
+
/**
|
|
248
|
+
* Generates a random nonce
|
|
249
|
+
*/
|
|
250
|
+
export function generateNonce(): Uint8Array {
|
|
251
|
+
return randomBytes(NONCE_SIZE);
|
|
252
|
+
}
|
|
253
|
+
|
|
254
|
+
/**
|
|
255
|
+
* Securely clears a key from memory
|
|
256
|
+
*/
|
|
257
|
+
export function clearKey(key: Uint8Array): void {
|
|
258
|
+
key.fill(0);
|
|
259
|
+
}
|
|
260
|
+
|
|
261
|
+
/**
|
|
262
|
+
* Checks if encrypted data appears valid (basic structure check)
|
|
263
|
+
*/
|
|
264
|
+
export function isValidEncryptedData(data: EncryptedData): boolean {
|
|
265
|
+
return (
|
|
266
|
+
data.nonce instanceof Uint8Array &&
|
|
267
|
+
data.nonce.length === NONCE_SIZE &&
|
|
268
|
+
data.ciphertext instanceof Uint8Array &&
|
|
269
|
+
data.ciphertext.length >= TAG_SIZE
|
|
270
|
+
);
|
|
271
|
+
}
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* HKDF Key Derivation
|
|
3
|
+
*
|
|
4
|
+
* Derives deterministic sub-keys from a master secret using HKDF-SHA256 (RFC 5869).
|
|
5
|
+
*/
|
|
6
|
+
|
|
7
|
+
import { hkdf } from '@noble/hashes/hkdf';
|
|
8
|
+
import { sha256 } from '@noble/hashes/sha256';
|
|
9
|
+
|
|
10
|
+
/** Default output length in bytes (256 bits) */
|
|
11
|
+
const DEFAULT_KEY_LENGTH = 32;
|
|
12
|
+
|
|
13
|
+
/** Maximum allowed output length (255 * SHA-256 output = 8160 bytes) */
|
|
14
|
+
const MAX_KEY_LENGTH = 255 * 32;
|
|
15
|
+
|
|
16
|
+
/**
|
|
17
|
+
* Derives a sub-key from input key material using HKDF-SHA256.
|
|
18
|
+
*
|
|
19
|
+
* @param ikm - Input key material (e.g., wallet private key). MUST be high-entropy.
|
|
20
|
+
* @param salt - Domain separation salt. Can be a string or bytes.
|
|
21
|
+
* @param info - Context-specific info. Can be a string or bytes.
|
|
22
|
+
* @param length - Output key length in bytes (default: 32).
|
|
23
|
+
* @returns Derived key as Uint8Array. Caller MUST zero this after use.
|
|
24
|
+
*/
|
|
25
|
+
export function deriveKeyHKDF(
|
|
26
|
+
ikm: Uint8Array,
|
|
27
|
+
salt: string | Uint8Array,
|
|
28
|
+
info: string | Uint8Array,
|
|
29
|
+
length: number = DEFAULT_KEY_LENGTH,
|
|
30
|
+
): Uint8Array {
|
|
31
|
+
if (!ikm || ikm.length === 0) {
|
|
32
|
+
throw new Error('HKDF: input key material must not be empty');
|
|
33
|
+
}
|
|
34
|
+
if (length <= 0 || length > MAX_KEY_LENGTH) {
|
|
35
|
+
throw new Error(`HKDF: output length must be between 1 and ${MAX_KEY_LENGTH}`);
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
const saltBytes = typeof salt === 'string' ? new TextEncoder().encode(salt) : salt;
|
|
39
|
+
const infoBytes = typeof info === 'string' ? new TextEncoder().encode(info) : info;
|
|
40
|
+
|
|
41
|
+
return hkdf(sha256, ikm, saltBytes, infoBytes, length);
|
|
42
|
+
}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
export {
|
|
2
|
+
encrypt,
|
|
3
|
+
decrypt,
|
|
4
|
+
encryptString,
|
|
5
|
+
decryptString,
|
|
6
|
+
serialize,
|
|
7
|
+
deserialize,
|
|
8
|
+
encryptAndSerialize,
|
|
9
|
+
deserializeAndDecrypt,
|
|
10
|
+
toHex,
|
|
11
|
+
fromHex,
|
|
12
|
+
toBase64,
|
|
13
|
+
fromBase64,
|
|
14
|
+
generateKey,
|
|
15
|
+
generateNonce,
|
|
16
|
+
clearKey,
|
|
17
|
+
isValidEncryptedData,
|
|
18
|
+
KEY_SIZE,
|
|
19
|
+
NONCE_SIZE,
|
|
20
|
+
TAG_SIZE,
|
|
21
|
+
} from './aes';
|
|
22
|
+
export type { EncryptedData, SerializedEncryptedData } from './aes';
|
|
23
|
+
|
|
24
|
+
export { deriveKeyHKDF } from './hkdf';
|
|
25
|
+
|
|
26
|
+
export { split as shamirSplit, combine as shamirCombine } from './shamir';
|
|
27
|
+
export type { Share as ShamirShare } from './shamir';
|
|
@@ -0,0 +1,173 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Shamir's Secret Sharing over GF(2^8)
|
|
3
|
+
*
|
|
4
|
+
* Information-theoretic secret splitting: any K shares reconstruct the secret,
|
|
5
|
+
* K-1 shares reveal zero information.
|
|
6
|
+
*
|
|
7
|
+
* Uses GF(2^8) with irreducible polynomial x^8 + x^4 + x^3 + x + 1 (0x11B),
|
|
8
|
+
* same as AES. This is the standard choice for byte-level SSS.
|
|
9
|
+
*/
|
|
10
|
+
|
|
11
|
+
import { randomBytes } from '@noble/ciphers/webcrypto';
|
|
12
|
+
|
|
13
|
+
// ── GF(2^8) Arithmetic ─────────────────────────────────────────────────────
|
|
14
|
+
|
|
15
|
+
const IRREDUCIBLE = 0x11b;
|
|
16
|
+
|
|
17
|
+
/** Exponential table: exp[log[a] + log[b]] = a * b */
|
|
18
|
+
const EXP_TABLE = new Uint8Array(512);
|
|
19
|
+
|
|
20
|
+
/** Logarithm table: log[a] for a in 1..255 (log[0] is undefined) */
|
|
21
|
+
const LOG_TABLE = new Uint8Array(256);
|
|
22
|
+
|
|
23
|
+
// Build log/exp tables using generator 3
|
|
24
|
+
(function buildTables() {
|
|
25
|
+
let x = 1;
|
|
26
|
+
for (let i = 0; i < 255; i++) {
|
|
27
|
+
EXP_TABLE[i] = x;
|
|
28
|
+
LOG_TABLE[x] = i;
|
|
29
|
+
x = x ^ (x << 1); // multiply by generator (3 is primitive in this field)
|
|
30
|
+
if (x >= 256) x ^= IRREDUCIBLE;
|
|
31
|
+
}
|
|
32
|
+
// Extend exp table for easy modular arithmetic (avoid mod 255)
|
|
33
|
+
for (let i = 255; i < 512; i++) {
|
|
34
|
+
EXP_TABLE[i] = EXP_TABLE[i - 255]!;
|
|
35
|
+
}
|
|
36
|
+
})();
|
|
37
|
+
|
|
38
|
+
/** GF(2^8) addition: XOR */
|
|
39
|
+
function gfAdd(a: number, b: number): number {
|
|
40
|
+
return a ^ b;
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
/** GF(2^8) multiplication via log/exp tables */
|
|
44
|
+
function gfMul(a: number, b: number): number {
|
|
45
|
+
if (a === 0 || b === 0) return 0;
|
|
46
|
+
return EXP_TABLE[LOG_TABLE[a]! + LOG_TABLE[b]!]!;
|
|
47
|
+
}
|
|
48
|
+
|
|
49
|
+
/** GF(2^8) multiplicative inverse */
|
|
50
|
+
function gfInv(a: number): number {
|
|
51
|
+
if (a === 0) throw new Error('GF(2^8): division by zero');
|
|
52
|
+
return EXP_TABLE[255 - LOG_TABLE[a]!]!;
|
|
53
|
+
}
|
|
54
|
+
|
|
55
|
+
/** GF(2^8) division: a / b */
|
|
56
|
+
function gfDiv(a: number, b: number): number {
|
|
57
|
+
if (b === 0) throw new Error('GF(2^8): division by zero');
|
|
58
|
+
if (a === 0) return 0;
|
|
59
|
+
return EXP_TABLE[(LOG_TABLE[a]! - LOG_TABLE[b]! + 255) % 255]!;
|
|
60
|
+
}
|
|
61
|
+
|
|
62
|
+
// ── Share Type ──────────────────────────────────────────────────────────────
|
|
63
|
+
|
|
64
|
+
/** A single Shamir share */
|
|
65
|
+
export interface Share {
|
|
66
|
+
/** Share index (1..N, never 0) */
|
|
67
|
+
x: number;
|
|
68
|
+
/** Share data (same length as secret) */
|
|
69
|
+
y: Uint8Array;
|
|
70
|
+
}
|
|
71
|
+
|
|
72
|
+
// ── Split ───────────────────────────────────────────────────────────────────
|
|
73
|
+
|
|
74
|
+
/**
|
|
75
|
+
* Splits a secret into N shares with threshold K.
|
|
76
|
+
*
|
|
77
|
+
* @param secret - Secret bytes to split (any length)
|
|
78
|
+
* @param n - Total number of shares to create (2..255)
|
|
79
|
+
* @param k - Minimum shares needed for reconstruction (2..n)
|
|
80
|
+
* @returns Array of N shares
|
|
81
|
+
*/
|
|
82
|
+
export function split(secret: Uint8Array, n: number, k: number): Share[] {
|
|
83
|
+
if (k < 2) throw new Error('Threshold K must be at least 2');
|
|
84
|
+
if (n < k) throw new Error('Share count N must be >= threshold K');
|
|
85
|
+
if (n > 255) throw new Error('Maximum 255 shares (GF(2^8) limit)');
|
|
86
|
+
if (secret.length === 0) throw new Error('Secret must not be empty');
|
|
87
|
+
|
|
88
|
+
const coefficients = new Array<Uint8Array>(secret.length);
|
|
89
|
+
for (let i = 0; i < secret.length; i++) {
|
|
90
|
+
const poly = new Uint8Array(k);
|
|
91
|
+
poly[0] = secret[i]!;
|
|
92
|
+
const rand = randomBytes(k - 1);
|
|
93
|
+
poly.set(rand, 1);
|
|
94
|
+
coefficients[i] = poly;
|
|
95
|
+
}
|
|
96
|
+
|
|
97
|
+
const shares: Share[] = [];
|
|
98
|
+
for (let xi = 1; xi <= n; xi++) {
|
|
99
|
+
const y = new Uint8Array(secret.length);
|
|
100
|
+
for (let byteIdx = 0; byteIdx < secret.length; byteIdx++) {
|
|
101
|
+
y[byteIdx] = evaluatePolynomial(coefficients[byteIdx]!, xi);
|
|
102
|
+
}
|
|
103
|
+
shares.push({ x: xi, y });
|
|
104
|
+
}
|
|
105
|
+
|
|
106
|
+
for (const poly of coefficients) {
|
|
107
|
+
poly.fill(0);
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
return shares;
|
|
111
|
+
}
|
|
112
|
+
|
|
113
|
+
function evaluatePolynomial(coeffs: Uint8Array, x: number): number {
|
|
114
|
+
let result = 0;
|
|
115
|
+
for (let i = coeffs.length - 1; i >= 0; i--) {
|
|
116
|
+
result = gfAdd(gfMul(result, x), coeffs[i]!);
|
|
117
|
+
}
|
|
118
|
+
return result;
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
// ── Combine ─────────────────────────────────────────────────────────────────
|
|
122
|
+
|
|
123
|
+
/**
|
|
124
|
+
* Reconstructs a secret from K or more shares using Lagrange interpolation.
|
|
125
|
+
*
|
|
126
|
+
* @param shares - Array of K or more shares (must all have same y.length)
|
|
127
|
+
* @returns Reconstructed secret
|
|
128
|
+
*/
|
|
129
|
+
export function combine(shares: Share[]): Uint8Array {
|
|
130
|
+
if (shares.length < 2) throw new Error('Need at least 2 shares');
|
|
131
|
+
|
|
132
|
+
const secretLength = shares[0]!.y.length;
|
|
133
|
+
for (const share of shares) {
|
|
134
|
+
if (share.y.length !== secretLength) {
|
|
135
|
+
throw new Error('All shares must have the same data length');
|
|
136
|
+
}
|
|
137
|
+
if (share.x === 0) {
|
|
138
|
+
throw new Error('Share index must not be 0');
|
|
139
|
+
}
|
|
140
|
+
}
|
|
141
|
+
|
|
142
|
+
const xValues = new Set(shares.map(s => s.x));
|
|
143
|
+
if (xValues.size !== shares.length) {
|
|
144
|
+
throw new Error('Duplicate share indices');
|
|
145
|
+
}
|
|
146
|
+
|
|
147
|
+
const secret = new Uint8Array(secretLength);
|
|
148
|
+
|
|
149
|
+
for (let byteIdx = 0; byteIdx < secretLength; byteIdx++) {
|
|
150
|
+
let value = 0;
|
|
151
|
+
|
|
152
|
+
for (let i = 0; i < shares.length; i++) {
|
|
153
|
+
const xi = shares[i]!.x;
|
|
154
|
+
const yi = shares[i]!.y[byteIdx]!;
|
|
155
|
+
|
|
156
|
+
let basis = 1;
|
|
157
|
+
for (let j = 0; j < shares.length; j++) {
|
|
158
|
+
if (i === j) continue;
|
|
159
|
+
const xj = shares[j]!.x;
|
|
160
|
+
basis = gfMul(basis, gfDiv(xj, gfAdd(xi, xj)));
|
|
161
|
+
}
|
|
162
|
+
|
|
163
|
+
value = gfAdd(value, gfMul(yi, basis));
|
|
164
|
+
}
|
|
165
|
+
|
|
166
|
+
secret[byteIdx] = value;
|
|
167
|
+
}
|
|
168
|
+
|
|
169
|
+
return secret;
|
|
170
|
+
}
|
|
171
|
+
|
|
172
|
+
/** @internal Exported for cross-platform test vector validation */
|
|
173
|
+
export const _gf = { add: gfAdd, mul: gfMul, inv: gfInv, div: gfDiv, EXP_TABLE, LOG_TABLE } as const;
|
|
@@ -0,0 +1,65 @@
|
|
|
1
|
+
// High-level vault client
|
|
2
|
+
export { VaultClient } from './client';
|
|
3
|
+
export { adaptiveThreshold, writeQuorum } from './quorum';
|
|
4
|
+
export type {
|
|
5
|
+
VaultConfig,
|
|
6
|
+
SecretMeta,
|
|
7
|
+
StoreResult,
|
|
8
|
+
RetrieveResult,
|
|
9
|
+
ListResult,
|
|
10
|
+
DeleteResult,
|
|
11
|
+
GuardianResult,
|
|
12
|
+
} from './types';
|
|
13
|
+
|
|
14
|
+
// Vault auth (renamed to avoid collision with top-level AuthClient)
|
|
15
|
+
export { AuthClient as VaultAuthClient } from './auth';
|
|
16
|
+
|
|
17
|
+
// Transport (guardian communication)
|
|
18
|
+
export { GuardianClient, GuardianError } from './transport';
|
|
19
|
+
export { fanOut, fanOutIndexed, withTimeout, withRetry } from './transport';
|
|
20
|
+
export type {
|
|
21
|
+
GuardianEndpoint,
|
|
22
|
+
GuardianErrorCode,
|
|
23
|
+
GuardianInfo,
|
|
24
|
+
HealthResponse as GuardianHealthResponse,
|
|
25
|
+
StatusResponse as GuardianStatusResponse,
|
|
26
|
+
PushResponse,
|
|
27
|
+
PullResponse,
|
|
28
|
+
StoreSecretResponse,
|
|
29
|
+
GetSecretResponse,
|
|
30
|
+
DeleteSecretResponse,
|
|
31
|
+
ListSecretsResponse,
|
|
32
|
+
SecretEntry,
|
|
33
|
+
ChallengeResponse as GuardianChallengeResponse,
|
|
34
|
+
SessionResponse as GuardianSessionResponse,
|
|
35
|
+
FanOutResult,
|
|
36
|
+
} from './transport';
|
|
37
|
+
|
|
38
|
+
// Crypto primitives
|
|
39
|
+
export {
|
|
40
|
+
encrypt,
|
|
41
|
+
decrypt,
|
|
42
|
+
encryptString,
|
|
43
|
+
decryptString,
|
|
44
|
+
serialize as serializeEncrypted,
|
|
45
|
+
deserialize as deserializeEncrypted,
|
|
46
|
+
encryptAndSerialize,
|
|
47
|
+
deserializeAndDecrypt,
|
|
48
|
+
toHex as encryptedToHex,
|
|
49
|
+
fromHex as encryptedFromHex,
|
|
50
|
+
toBase64 as encryptedToBase64,
|
|
51
|
+
fromBase64 as encryptedFromBase64,
|
|
52
|
+
generateKey,
|
|
53
|
+
generateNonce,
|
|
54
|
+
clearKey,
|
|
55
|
+
isValidEncryptedData,
|
|
56
|
+
KEY_SIZE,
|
|
57
|
+
NONCE_SIZE,
|
|
58
|
+
TAG_SIZE,
|
|
59
|
+
} from './crypto';
|
|
60
|
+
export type { EncryptedData, SerializedEncryptedData } from './crypto';
|
|
61
|
+
|
|
62
|
+
export { deriveKeyHKDF } from './crypto';
|
|
63
|
+
|
|
64
|
+
export { shamirSplit, shamirCombine } from './crypto';
|
|
65
|
+
export type { ShamirShare } from './crypto';
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Quorum calculations for distributed vault operations.
|
|
3
|
+
* Must match orama-vault (Zig side).
|
|
4
|
+
*/
|
|
5
|
+
|
|
6
|
+
/** Adaptive Shamir threshold: max(3, floor(N/3)). */
|
|
7
|
+
export function adaptiveThreshold(n: number): number {
|
|
8
|
+
return Math.max(3, Math.floor(n / 3));
|
|
9
|
+
}
|
|
10
|
+
|
|
11
|
+
/** Write quorum: ceil(2N/3). Requires majority for consistency. */
|
|
12
|
+
export function writeQuorum(n: number): number {
|
|
13
|
+
if (n === 0) return 0;
|
|
14
|
+
if (n <= 2) return n;
|
|
15
|
+
return Math.ceil((2 * n) / 3);
|
|
16
|
+
}
|
|
@@ -0,0 +1,94 @@
|
|
|
1
|
+
import { GuardianClient, GuardianError } from './guardian';
|
|
2
|
+
import type { GuardianEndpoint, GuardianErrorCode, FanOutResult } from './types';
|
|
3
|
+
|
|
4
|
+
/**
|
|
5
|
+
* Fan out an operation to multiple guardians in parallel.
|
|
6
|
+
* Returns results from all guardians (both successes and failures).
|
|
7
|
+
*/
|
|
8
|
+
export async function fanOut<T>(
|
|
9
|
+
guardians: GuardianEndpoint[],
|
|
10
|
+
operation: (client: GuardianClient) => Promise<T>,
|
|
11
|
+
): Promise<FanOutResult<T>[]> {
|
|
12
|
+
const results = await Promise.allSettled(
|
|
13
|
+
guardians.map(async (endpoint) => {
|
|
14
|
+
const client = new GuardianClient(endpoint);
|
|
15
|
+
const result = await operation(client);
|
|
16
|
+
return { endpoint, result, error: null } as FanOutResult<T>;
|
|
17
|
+
}),
|
|
18
|
+
);
|
|
19
|
+
|
|
20
|
+
return results.map((r, i) => {
|
|
21
|
+
if (r.status === 'fulfilled') return r.value;
|
|
22
|
+
const reason = r.reason as Error;
|
|
23
|
+
const errorCode: GuardianErrorCode | undefined = reason instanceof GuardianError ? reason.code : undefined;
|
|
24
|
+
return {
|
|
25
|
+
endpoint: guardians[i]!,
|
|
26
|
+
result: null,
|
|
27
|
+
error: reason.message,
|
|
28
|
+
errorCode,
|
|
29
|
+
};
|
|
30
|
+
});
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
/**
|
|
34
|
+
* Fan out an indexed operation to multiple guardians in parallel.
|
|
35
|
+
* The operation receives the index so each guardian can get a different share.
|
|
36
|
+
*/
|
|
37
|
+
export async function fanOutIndexed<T>(
|
|
38
|
+
guardians: GuardianEndpoint[],
|
|
39
|
+
operation: (client: GuardianClient, index: number) => Promise<T>,
|
|
40
|
+
): Promise<FanOutResult<T>[]> {
|
|
41
|
+
const results = await Promise.allSettled(
|
|
42
|
+
guardians.map(async (endpoint, i) => {
|
|
43
|
+
const client = new GuardianClient(endpoint);
|
|
44
|
+
const result = await operation(client, i);
|
|
45
|
+
return { endpoint, result, error: null } as FanOutResult<T>;
|
|
46
|
+
}),
|
|
47
|
+
);
|
|
48
|
+
|
|
49
|
+
return results.map((r, i) => {
|
|
50
|
+
if (r.status === 'fulfilled') return r.value;
|
|
51
|
+
const reason = r.reason as Error;
|
|
52
|
+
const errorCode: GuardianErrorCode | undefined = reason instanceof GuardianError ? reason.code : undefined;
|
|
53
|
+
return {
|
|
54
|
+
endpoint: guardians[i]!,
|
|
55
|
+
result: null,
|
|
56
|
+
error: reason.message,
|
|
57
|
+
errorCode,
|
|
58
|
+
};
|
|
59
|
+
});
|
|
60
|
+
}
|
|
61
|
+
|
|
62
|
+
/**
|
|
63
|
+
* Race a promise against a timeout.
|
|
64
|
+
*/
|
|
65
|
+
export function withTimeout<T>(promise: Promise<T>, ms: number): Promise<T> {
|
|
66
|
+
return Promise.race([
|
|
67
|
+
promise,
|
|
68
|
+
new Promise<never>((_, reject) =>
|
|
69
|
+
setTimeout(() => reject(new Error(`timeout after ${ms}ms`)), ms),
|
|
70
|
+
),
|
|
71
|
+
]);
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
/**
|
|
75
|
+
* Retry a function with exponential backoff.
|
|
76
|
+
* Does not retry auth or not-found errors.
|
|
77
|
+
*/
|
|
78
|
+
export async function withRetry<T>(fn: () => Promise<T>, attempts = 3): Promise<T> {
|
|
79
|
+
let lastError: Error | undefined;
|
|
80
|
+
for (let i = 0; i < attempts; i++) {
|
|
81
|
+
try {
|
|
82
|
+
return await fn();
|
|
83
|
+
} catch (err) {
|
|
84
|
+
lastError = err as Error;
|
|
85
|
+
if (err instanceof GuardianError && (err.code === 'AUTH' || err.code === 'NOT_FOUND')) {
|
|
86
|
+
throw err;
|
|
87
|
+
}
|
|
88
|
+
if (i < attempts - 1) {
|
|
89
|
+
await new Promise((r) => setTimeout(r, 200 * Math.pow(2, i)));
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
throw lastError!;
|
|
94
|
+
}
|