@digitaldefiance/node-ecies-lib 1.1.22 → 1.1.24
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -0
- package/package.json +6 -5
- package/src/constants.d.ts +32 -0
- package/src/constants.d.ts.map +1 -0
- package/src/constants.js +137 -0
- package/src/constants.js.map +1 -0
- package/src/enumerations/index.d.ts +2 -0
- package/src/enumerations/index.d.ts.map +1 -0
- package/src/enumerations/index.js +5 -0
- package/src/enumerations/index.js.map +1 -0
- package/src/enumerations/pbkdf2-profile.d.ts +9 -0
- package/src/enumerations/pbkdf2-profile.d.ts.map +1 -0
- package/src/enumerations/pbkdf2-profile.js +13 -0
- package/src/enumerations/pbkdf2-profile.js.map +1 -0
- package/src/i18n/ecies-i18n-factory.d.ts +54 -0
- package/src/i18n/ecies-i18n-factory.d.ts.map +1 -0
- package/src/i18n/ecies-i18n-factory.js +333 -0
- package/src/i18n/ecies-i18n-factory.js.map +1 -0
- package/src/i18n/{index.ts → index.d.ts} +1 -0
- package/src/i18n/index.d.ts.map +1 -0
- package/src/i18n/index.js +5 -0
- package/src/i18n/index.js.map +1 -0
- package/src/{index.ts → index.d.ts} +1 -0
- package/src/index.d.ts.map +1 -0
- package/src/index.js +11 -0
- package/src/index.js.map +1 -0
- package/src/interfaces/authenticated-cipher.d.ts +10 -0
- package/src/interfaces/authenticated-cipher.d.ts.map +1 -0
- package/src/interfaces/authenticated-cipher.js +3 -0
- package/src/interfaces/authenticated-cipher.js.map +1 -0
- package/src/interfaces/authenticated-decipher.d.ts +9 -0
- package/src/interfaces/authenticated-decipher.d.ts.map +1 -0
- package/src/interfaces/authenticated-decipher.js +3 -0
- package/src/interfaces/authenticated-decipher.js.map +1 -0
- package/src/interfaces/checksum-config.d.ts +5 -0
- package/src/interfaces/checksum-config.d.ts.map +1 -0
- package/src/interfaces/checksum-config.js +3 -0
- package/src/interfaces/checksum-config.js.map +1 -0
- package/src/interfaces/checksum-consts.d.ts +11 -0
- package/src/interfaces/checksum-consts.d.ts.map +1 -0
- package/src/interfaces/checksum-consts.js +3 -0
- package/src/interfaces/checksum-consts.js.map +1 -0
- package/src/interfaces/constants.d.ts +43 -0
- package/src/interfaces/constants.d.ts.map +1 -0
- package/src/interfaces/constants.js +3 -0
- package/src/interfaces/constants.js.map +1 -0
- package/src/interfaces/ecies-consts.d.ts +88 -0
- package/src/interfaces/ecies-consts.d.ts.map +1 -0
- package/src/interfaces/ecies-consts.js +3 -0
- package/src/interfaces/ecies-consts.js.map +1 -0
- package/src/interfaces/encryption-consts.d.ts +11 -0
- package/src/interfaces/encryption-consts.d.ts.map +1 -0
- package/src/interfaces/encryption-consts.js +3 -0
- package/src/interfaces/encryption-consts.js.map +1 -0
- package/src/interfaces/{index.ts → index.d.ts} +1 -0
- package/src/interfaces/index.d.ts.map +1 -0
- package/src/interfaces/index.js +21 -0
- package/src/interfaces/index.js.map +1 -0
- package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.d.ts +6 -0
- package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.d.ts.map +1 -0
- package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.js +3 -0
- package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.js.map +1 -0
- package/src/interfaces/keyring-consts.d.ts +6 -0
- package/src/interfaces/keyring-consts.d.ts.map +1 -0
- package/src/interfaces/keyring-consts.js +3 -0
- package/src/interfaces/keyring-consts.js.map +1 -0
- package/src/interfaces/member-operational.d.ts +36 -0
- package/src/interfaces/member-operational.d.ts.map +1 -0
- package/src/interfaces/member-operational.js +3 -0
- package/src/interfaces/member-operational.js.map +1 -0
- package/src/interfaces/{member-with-mnemonic.ts → member-with-mnemonic.d.ts} +3 -3
- package/src/interfaces/member-with-mnemonic.d.ts.map +1 -0
- package/src/interfaces/member-with-mnemonic.js +3 -0
- package/src/interfaces/member-with-mnemonic.js.map +1 -0
- package/src/interfaces/{multi-encrypted-message.ts → multi-encrypted-message.d.ts} +5 -5
- package/src/interfaces/multi-encrypted-message.d.ts.map +1 -0
- package/src/interfaces/multi-encrypted-message.js +3 -0
- package/src/interfaces/multi-encrypted-message.js.map +1 -0
- package/src/interfaces/multi-encrypted-parsed-header.d.ts +24 -0
- package/src/interfaces/multi-encrypted-parsed-header.d.ts.map +1 -0
- package/src/interfaces/multi-encrypted-parsed-header.js +3 -0
- package/src/interfaces/multi-encrypted-parsed-header.js.map +1 -0
- package/src/interfaces/{pbkdf-profiles.ts → pbkdf-profiles.d.ts} +2 -2
- package/src/interfaces/pbkdf-profiles.d.ts.map +1 -0
- package/src/interfaces/pbkdf-profiles.js +3 -0
- package/src/interfaces/pbkdf-profiles.js.map +1 -0
- package/src/interfaces/pbkdf2-result.d.ts +6 -0
- package/src/interfaces/pbkdf2-result.d.ts.map +1 -0
- package/src/interfaces/pbkdf2-result.js +3 -0
- package/src/interfaces/pbkdf2-result.js.map +1 -0
- package/src/interfaces/signing-key-private-key-info.d.ts +11 -0
- package/src/interfaces/signing-key-private-key-info.d.ts.map +1 -0
- package/src/interfaces/signing-key-private-key-info.js +3 -0
- package/src/interfaces/signing-key-private-key-info.js.map +1 -0
- package/src/interfaces/{simple-keypair-buffer.ts → simple-keypair-buffer.d.ts} +3 -3
- package/src/interfaces/simple-keypair-buffer.d.ts.map +1 -0
- package/src/interfaces/simple-keypair-buffer.js +3 -0
- package/src/interfaces/simple-keypair-buffer.js.map +1 -0
- package/src/interfaces/{simple-keypair.ts → simple-keypair.d.ts} +3 -3
- package/src/interfaces/simple-keypair.d.ts.map +1 -0
- package/src/interfaces/simple-keypair.js +3 -0
- package/src/interfaces/simple-keypair.js.map +1 -0
- package/src/interfaces/simple-public-key-only-buffer.d.ts +4 -0
- package/src/interfaces/simple-public-key-only-buffer.d.ts.map +1 -0
- package/src/interfaces/simple-public-key-only-buffer.js +3 -0
- package/src/interfaces/simple-public-key-only-buffer.js.map +1 -0
- package/src/interfaces/simple-public-key-only.d.ts +4 -0
- package/src/interfaces/simple-public-key-only.d.ts.map +1 -0
- package/src/interfaces/simple-public-key-only.js +3 -0
- package/src/interfaces/simple-public-key-only.js.map +1 -0
- package/src/interfaces/single-encrypted-parsed-header.d.ts +35 -0
- package/src/interfaces/single-encrypted-parsed-header.d.ts.map +1 -0
- package/src/interfaces/single-encrypted-parsed-header.js +3 -0
- package/src/interfaces/single-encrypted-parsed-header.js.map +1 -0
- package/src/interfaces/{wallet-seed.ts → wallet-seed.d.ts} +3 -3
- package/src/interfaces/wallet-seed.d.ts.map +1 -0
- package/src/interfaces/wallet-seed.js +3 -0
- package/src/interfaces/wallet-seed.js.map +1 -0
- package/src/interfaces/wrapped-key-consts.d.ts +7 -0
- package/src/interfaces/wrapped-key-consts.d.ts.map +1 -0
- package/src/interfaces/wrapped-key-consts.js +3 -0
- package/src/interfaces/wrapped-key-consts.js.map +1 -0
- package/src/member.d.ts +74 -0
- package/src/member.d.ts.map +1 -0
- package/src/member.js +273 -0
- package/src/member.js.map +1 -0
- package/src/services/aes-gcm.d.ts +66 -0
- package/src/services/aes-gcm.d.ts.map +1 -0
- package/src/services/aes-gcm.js +115 -0
- package/src/services/aes-gcm.js.map +1 -0
- package/src/services/ecies/crypto-core.d.ts +83 -0
- package/src/services/ecies/crypto-core.d.ts.map +1 -0
- package/src/services/ecies/crypto-core.js +166 -0
- package/src/services/ecies/crypto-core.js.map +1 -0
- package/src/services/ecies/file.d.ts +30 -0
- package/src/services/ecies/file.d.ts.map +1 -0
- package/src/services/ecies/file.js +112 -0
- package/src/services/ecies/file.js.map +1 -0
- package/src/services/ecies/{index.ts → index.d.ts} +1 -0
- package/src/services/ecies/index.d.ts.map +1 -0
- package/src/services/ecies/index.js +11 -0
- package/src/services/ecies/index.js.map +1 -0
- package/src/services/ecies/multi-recipient.d.ts +82 -0
- package/src/services/ecies/multi-recipient.d.ts.map +1 -0
- package/src/services/ecies/multi-recipient.js +360 -0
- package/src/services/ecies/multi-recipient.js.map +1 -0
- package/src/services/ecies/service.d.ts +70 -0
- package/src/services/ecies/service.d.ts.map +1 -0
- package/src/services/ecies/service.js +167 -0
- package/src/services/ecies/service.js.map +1 -0
- package/src/services/ecies/signature.d.ts +38 -0
- package/src/services/ecies/signature.d.ts.map +1 -0
- package/src/services/ecies/signature.js +69 -0
- package/src/services/ecies/signature.js.map +1 -0
- package/src/services/ecies/single-recipient.d.ts +85 -0
- package/src/services/ecies/single-recipient.d.ts.map +1 -0
- package/src/services/ecies/single-recipient.js +399 -0
- package/src/services/ecies/single-recipient.js.map +1 -0
- package/src/services/ecies/utilities.d.ts +22 -0
- package/src/services/ecies/utilities.d.ts.map +1 -0
- package/src/services/ecies/utilities.js +75 -0
- package/src/services/ecies/utilities.js.map +1 -0
- package/src/services/index.d.ts +4 -0
- package/src/services/index.d.ts.map +1 -0
- package/src/services/index.js +7 -0
- package/src/services/index.js.map +1 -0
- package/src/services/pbkdf2.d.ts +106 -0
- package/src/services/pbkdf2.d.ts.map +1 -0
- package/src/services/pbkdf2.js +195 -0
- package/src/services/pbkdf2.js.map +1 -0
- package/src/{types.ts → types.d.ts} +9 -26
- package/src/types.d.ts.map +1 -0
- package/src/types.js +3 -0
- package/src/types.js.map +1 -0
- package/src/utils.d.ts +11 -0
- package/src/utils.d.ts.map +1 -0
- package/src/utils.js +82 -0
- package/src/utils.js.map +1 -0
- package/LICENSE +0 -21
- package/src/constants.ts +0 -182
- package/src/enumerations/index.ts +0 -1
- package/src/enumerations/pbkdf2-profile.ts +0 -8
- package/src/i18n/ecies-i18n-factory.ts +0 -435
- package/src/interfaces/authenticated-cipher.ts +0 -9
- package/src/interfaces/authenticated-decipher.ts +0 -8
- package/src/interfaces/checksum-config.ts +0 -4
- package/src/interfaces/checksum-consts.ts +0 -13
- package/src/interfaces/constants.ts +0 -43
- package/src/interfaces/ecies-consts.ts +0 -99
- package/src/interfaces/encryption-consts.ts +0 -10
- package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.ts +0 -7
- package/src/interfaces/keyring-consts.ts +0 -5
- package/src/interfaces/member-operational.ts +0 -52
- package/src/interfaces/multi-encrypted-parsed-header.ts +0 -24
- package/src/interfaces/pbkdf2-result.ts +0 -5
- package/src/interfaces/signing-key-private-key-info.ts +0 -12
- package/src/interfaces/simple-public-key-only-buffer.ts +0 -3
- package/src/interfaces/simple-public-key-only.ts +0 -3
- package/src/interfaces/single-encrypted-parsed-header.ts +0 -35
- package/src/interfaces/wrapped-key-consts.ts +0 -6
- package/src/member.ts +0 -463
- package/src/services/aes-gcm.ts +0 -160
- package/src/services/ecies/crypto-core.ts +0 -213
- package/src/services/ecies/file.ts +0 -174
- package/src/services/ecies/multi-recipient.ts +0 -583
- package/src/services/ecies/service.ts +0 -351
- package/src/services/ecies/signature.ts +0 -91
- package/src/services/ecies/single-recipient.ts +0 -676
- package/src/services/ecies/utilities.ts +0 -111
- package/src/services/index.ts +0 -3
- package/src/services/pbkdf2.ts +0 -307
- package/src/utils.ts +0 -104
package/src/member.ts
DELETED
|
@@ -1,463 +0,0 @@
|
|
|
1
|
-
import {
|
|
2
|
-
ECIES,
|
|
3
|
-
EmailString,
|
|
4
|
-
IMemberStorageData,
|
|
5
|
-
MemberErrorType,
|
|
6
|
-
MemberType,
|
|
7
|
-
SecureBuffer,
|
|
8
|
-
SecureString,
|
|
9
|
-
} from '@digitaldefiance/ecies-lib';
|
|
10
|
-
import { Wallet } from '@ethereumjs/wallet';
|
|
11
|
-
import {
|
|
12
|
-
getNodeEciesTranslation,
|
|
13
|
-
NodeEciesStringKey,
|
|
14
|
-
} from './i18n/ecies-i18n-factory';
|
|
15
|
-
|
|
16
|
-
/**
|
|
17
|
-
* Custom error classes that work with the plugin i18n system
|
|
18
|
-
*/
|
|
19
|
-
export class NodeMemberError extends Error {
|
|
20
|
-
constructor(message: string, public readonly type: MemberErrorType) {
|
|
21
|
-
super(message);
|
|
22
|
-
this.name = 'NodeMemberError';
|
|
23
|
-
}
|
|
24
|
-
}
|
|
25
|
-
|
|
26
|
-
import { ECIESService } from './services/ecies/service';
|
|
27
|
-
// Removed: import { ServiceProvider } from './services/service.provider';
|
|
28
|
-
import { ObjectId } from 'mongodb';
|
|
29
|
-
import { Types } from 'mongoose';
|
|
30
|
-
import { IMemberOperational } from './interfaces/member-operational';
|
|
31
|
-
import { SignatureBuffer } from './types';
|
|
32
|
-
|
|
33
|
-
/**
|
|
34
|
-
* A member of Brightchain.
|
|
35
|
-
* In the Owner Free Filesystem (OFF), members are used to:
|
|
36
|
-
* 1. Sign and verify data
|
|
37
|
-
* 2. Encrypt and decrypt data
|
|
38
|
-
* 3. Participate in voting
|
|
39
|
-
* 4. Establish ownership of data
|
|
40
|
-
*/
|
|
41
|
-
export class Member implements IMemberOperational<Types.ObjectId> {
|
|
42
|
-
private readonly _eciesService: ECIESService;
|
|
43
|
-
private readonly _id: Types.ObjectId;
|
|
44
|
-
private readonly _type: MemberType;
|
|
45
|
-
private readonly _name: string;
|
|
46
|
-
private readonly _email: EmailString;
|
|
47
|
-
private readonly _publicKey: Buffer;
|
|
48
|
-
private readonly _creatorId: Types.ObjectId;
|
|
49
|
-
private readonly _dateCreated: Date;
|
|
50
|
-
private readonly _dateUpdated: Date;
|
|
51
|
-
private _privateKey?: SecureBuffer;
|
|
52
|
-
private _wallet?: Wallet;
|
|
53
|
-
|
|
54
|
-
constructor(
|
|
55
|
-
// Add injected services as parameters
|
|
56
|
-
eciesService: ECIESService,
|
|
57
|
-
// Original parameters
|
|
58
|
-
type: MemberType,
|
|
59
|
-
name: string,
|
|
60
|
-
email: EmailString,
|
|
61
|
-
publicKey: Buffer,
|
|
62
|
-
privateKey?: SecureBuffer,
|
|
63
|
-
wallet?: Wallet,
|
|
64
|
-
id?: Types.ObjectId,
|
|
65
|
-
dateCreated?: Date,
|
|
66
|
-
dateUpdated?: Date,
|
|
67
|
-
creatorId?: Types.ObjectId,
|
|
68
|
-
) {
|
|
69
|
-
// Assign injected services
|
|
70
|
-
this._eciesService = eciesService;
|
|
71
|
-
// Assign original parameters
|
|
72
|
-
this._type = type;
|
|
73
|
-
this._id = id ?? new ObjectId();
|
|
74
|
-
this._name = name;
|
|
75
|
-
if (!this._name || this._name.length == 0) {
|
|
76
|
-
throw new NodeMemberError(
|
|
77
|
-
getNodeEciesTranslation(
|
|
78
|
-
NodeEciesStringKey.Error_Member_MissingMemberName,
|
|
79
|
-
),
|
|
80
|
-
MemberErrorType.MissingMemberName,
|
|
81
|
-
);
|
|
82
|
-
}
|
|
83
|
-
if (this._name.trim() != this._name) {
|
|
84
|
-
throw new NodeMemberError(
|
|
85
|
-
getNodeEciesTranslation(
|
|
86
|
-
NodeEciesStringKey.Error_Member_InvalidMemberNameWhitespace,
|
|
87
|
-
),
|
|
88
|
-
MemberErrorType.InvalidMemberNameWhitespace,
|
|
89
|
-
);
|
|
90
|
-
}
|
|
91
|
-
this._email = email;
|
|
92
|
-
this._publicKey = publicKey;
|
|
93
|
-
this._privateKey = privateKey;
|
|
94
|
-
this._wallet = wallet;
|
|
95
|
-
|
|
96
|
-
// don't create a new date object with nearly identical values to the existing one
|
|
97
|
-
let _now: null | Date = null;
|
|
98
|
-
const now = function () {
|
|
99
|
-
if (!_now) {
|
|
100
|
-
_now = new Date();
|
|
101
|
-
}
|
|
102
|
-
return _now;
|
|
103
|
-
};
|
|
104
|
-
this._dateCreated = dateCreated ?? now();
|
|
105
|
-
this._dateUpdated = dateUpdated ?? now();
|
|
106
|
-
this._creatorId = creatorId ?? this._id;
|
|
107
|
-
}
|
|
108
|
-
|
|
109
|
-
// Required getters
|
|
110
|
-
public get id(): Types.ObjectId {
|
|
111
|
-
return this._id;
|
|
112
|
-
}
|
|
113
|
-
public get type(): MemberType {
|
|
114
|
-
return this._type;
|
|
115
|
-
}
|
|
116
|
-
public get name(): string {
|
|
117
|
-
return this._name;
|
|
118
|
-
}
|
|
119
|
-
public get email(): EmailString {
|
|
120
|
-
return this._email;
|
|
121
|
-
}
|
|
122
|
-
public get publicKey(): Buffer {
|
|
123
|
-
return this._publicKey;
|
|
124
|
-
}
|
|
125
|
-
public get creatorId(): Types.ObjectId {
|
|
126
|
-
return this._creatorId;
|
|
127
|
-
}
|
|
128
|
-
public get dateCreated(): Date {
|
|
129
|
-
return this._dateCreated;
|
|
130
|
-
}
|
|
131
|
-
public get dateUpdated(): Date {
|
|
132
|
-
return this._dateUpdated;
|
|
133
|
-
}
|
|
134
|
-
|
|
135
|
-
// Optional private data getters
|
|
136
|
-
public get privateKey(): SecureBuffer | undefined {
|
|
137
|
-
return this._privateKey;
|
|
138
|
-
}
|
|
139
|
-
public get wallet(): Wallet {
|
|
140
|
-
if (!this._wallet) {
|
|
141
|
-
throw new NodeMemberError(
|
|
142
|
-
getNodeEciesTranslation(NodeEciesStringKey.Error_Member_NoWallet),
|
|
143
|
-
MemberErrorType.NoWallet,
|
|
144
|
-
);
|
|
145
|
-
}
|
|
146
|
-
return this._wallet;
|
|
147
|
-
}
|
|
148
|
-
|
|
149
|
-
// State getters
|
|
150
|
-
public get hasPrivateKey(): boolean {
|
|
151
|
-
return this._privateKey !== undefined;
|
|
152
|
-
}
|
|
153
|
-
|
|
154
|
-
public unloadPrivateKey(): void {
|
|
155
|
-
// Do not dispose here; tests expect the same SecureBuffer instance to remain usable
|
|
156
|
-
// when reloaded into another member in the same process.
|
|
157
|
-
this._privateKey = undefined;
|
|
158
|
-
}
|
|
159
|
-
|
|
160
|
-
public unloadWallet(): void {
|
|
161
|
-
this._wallet = undefined;
|
|
162
|
-
}
|
|
163
|
-
|
|
164
|
-
public unloadWalletAndPrivateKey(): void {
|
|
165
|
-
this.unloadWallet();
|
|
166
|
-
this.unloadPrivateKey();
|
|
167
|
-
}
|
|
168
|
-
|
|
169
|
-
public loadWallet(mnemonic: SecureString): void {
|
|
170
|
-
if (this._wallet) {
|
|
171
|
-
throw new NodeMemberError(
|
|
172
|
-
getNodeEciesTranslation(
|
|
173
|
-
NodeEciesStringKey.Error_Member_WalletAlreadyLoaded,
|
|
174
|
-
),
|
|
175
|
-
MemberErrorType.WalletAlreadyLoaded,
|
|
176
|
-
);
|
|
177
|
-
}
|
|
178
|
-
const { wallet } = this._eciesService.walletAndSeedFromMnemonic(mnemonic);
|
|
179
|
-
const privateKey = wallet.getPrivateKey();
|
|
180
|
-
const publicKey = wallet.getPublicKey();
|
|
181
|
-
const publicKeyWithPrefix = Buffer.concat([
|
|
182
|
-
Buffer.from([ECIES.PUBLIC_KEY_MAGIC]),
|
|
183
|
-
publicKey,
|
|
184
|
-
]);
|
|
185
|
-
|
|
186
|
-
if (
|
|
187
|
-
publicKeyWithPrefix.toString('hex') !== this._publicKey.toString('hex')
|
|
188
|
-
) {
|
|
189
|
-
throw new NodeMemberError(
|
|
190
|
-
getNodeEciesTranslation(
|
|
191
|
-
NodeEciesStringKey.Error_Member_InvalidMnemonic,
|
|
192
|
-
),
|
|
193
|
-
MemberErrorType.InvalidMnemonic,
|
|
194
|
-
);
|
|
195
|
-
}
|
|
196
|
-
this._wallet = wallet;
|
|
197
|
-
this._privateKey = new SecureBuffer(privateKey);
|
|
198
|
-
}
|
|
199
|
-
|
|
200
|
-
/**
|
|
201
|
-
* Loads the private key and optionally the voting private key.
|
|
202
|
-
*
|
|
203
|
-
* @param privateKey The private key to load.
|
|
204
|
-
* @param votingPrivateKey The voting private key to load.
|
|
205
|
-
*/
|
|
206
|
-
public loadPrivateKey(privateKey: SecureBuffer): void {
|
|
207
|
-
this._privateKey = privateKey;
|
|
208
|
-
}
|
|
209
|
-
|
|
210
|
-
public sign(data: Buffer): SignatureBuffer {
|
|
211
|
-
if (!this._privateKey) {
|
|
212
|
-
throw new NodeMemberError(
|
|
213
|
-
getNodeEciesTranslation(
|
|
214
|
-
NodeEciesStringKey.Error_Member_MissingPrivateKey,
|
|
215
|
-
),
|
|
216
|
-
MemberErrorType.MissingPrivateKey,
|
|
217
|
-
);
|
|
218
|
-
}
|
|
219
|
-
return this._eciesService.signMessage(
|
|
220
|
-
Buffer.from(this._privateKey.value),
|
|
221
|
-
data,
|
|
222
|
-
);
|
|
223
|
-
}
|
|
224
|
-
|
|
225
|
-
public signData(data: Buffer): SignatureBuffer {
|
|
226
|
-
if (!this._privateKey) {
|
|
227
|
-
throw new NodeMemberError(
|
|
228
|
-
getNodeEciesTranslation(
|
|
229
|
-
NodeEciesStringKey.Error_Member_MissingPrivateKey,
|
|
230
|
-
),
|
|
231
|
-
MemberErrorType.MissingPrivateKey,
|
|
232
|
-
);
|
|
233
|
-
}
|
|
234
|
-
return this._eciesService.signMessage(
|
|
235
|
-
Buffer.from(this._privateKey.value),
|
|
236
|
-
data,
|
|
237
|
-
);
|
|
238
|
-
}
|
|
239
|
-
|
|
240
|
-
public verify(signature: SignatureBuffer, data: Buffer): boolean {
|
|
241
|
-
return this._eciesService.verifyMessage(this._publicKey, data, signature);
|
|
242
|
-
}
|
|
243
|
-
|
|
244
|
-
public verifySignature(
|
|
245
|
-
data: Buffer,
|
|
246
|
-
signature: Buffer,
|
|
247
|
-
publicKey: Buffer,
|
|
248
|
-
): boolean {
|
|
249
|
-
return this._eciesService.verifyMessage(
|
|
250
|
-
publicKey,
|
|
251
|
-
data,
|
|
252
|
-
signature as SignatureBuffer,
|
|
253
|
-
);
|
|
254
|
-
}
|
|
255
|
-
|
|
256
|
-
private static readonly MAX_ENCRYPTION_SIZE = 1024 * 1024 * 10; // 10MB limit
|
|
257
|
-
private static readonly VALID_STRING_REGEX = /^[\x20-\x7E\n\r\t]*$/; // Printable ASCII + common whitespace
|
|
258
|
-
|
|
259
|
-
public encryptData(
|
|
260
|
-
data: string | Buffer,
|
|
261
|
-
recipientPublicKey?: Buffer,
|
|
262
|
-
): Buffer {
|
|
263
|
-
// Validate input
|
|
264
|
-
if (!data) {
|
|
265
|
-
throw new NodeMemberError(
|
|
266
|
-
getNodeEciesTranslation(
|
|
267
|
-
NodeEciesStringKey.Error_Member_MissingEncryptionData,
|
|
268
|
-
),
|
|
269
|
-
MemberErrorType.MissingEncryptionData,
|
|
270
|
-
);
|
|
271
|
-
}
|
|
272
|
-
|
|
273
|
-
// Check size limit
|
|
274
|
-
const dataSize = Buffer.isBuffer(data)
|
|
275
|
-
? data.length
|
|
276
|
-
: Buffer.byteLength(data);
|
|
277
|
-
if (dataSize > Member.MAX_ENCRYPTION_SIZE) {
|
|
278
|
-
throw new NodeMemberError(
|
|
279
|
-
getNodeEciesTranslation(
|
|
280
|
-
NodeEciesStringKey.Error_Member_EncryptionDataTooLarge,
|
|
281
|
-
),
|
|
282
|
-
MemberErrorType.EncryptionDataTooLarge,
|
|
283
|
-
);
|
|
284
|
-
}
|
|
285
|
-
|
|
286
|
-
// Create buffer from data
|
|
287
|
-
const bufferData = Buffer.isBuffer(data) ? data : Buffer.from(data);
|
|
288
|
-
|
|
289
|
-
// Use recipient public key or self public key
|
|
290
|
-
const targetPublicKey = recipientPublicKey || this._publicKey;
|
|
291
|
-
|
|
292
|
-
return this._eciesService.encryptSimpleOrSingle(
|
|
293
|
-
false,
|
|
294
|
-
targetPublicKey,
|
|
295
|
-
bufferData,
|
|
296
|
-
);
|
|
297
|
-
}
|
|
298
|
-
|
|
299
|
-
public decryptData(encryptedData: Buffer): Buffer {
|
|
300
|
-
if (!this._privateKey) {
|
|
301
|
-
throw new NodeMemberError(
|
|
302
|
-
getNodeEciesTranslation(
|
|
303
|
-
NodeEciesStringKey.Error_Member_MissingPrivateKey,
|
|
304
|
-
),
|
|
305
|
-
MemberErrorType.MissingPrivateKey,
|
|
306
|
-
);
|
|
307
|
-
}
|
|
308
|
-
// decryptSingleWithHeader now returns the Buffer directly
|
|
309
|
-
return this._eciesService.decryptSimpleOrSingleWithHeader(
|
|
310
|
-
false,
|
|
311
|
-
Buffer.from(this._privateKey.value),
|
|
312
|
-
encryptedData,
|
|
313
|
-
);
|
|
314
|
-
}
|
|
315
|
-
|
|
316
|
-
public toJson(): string {
|
|
317
|
-
const storage: IMemberStorageData = {
|
|
318
|
-
id: this._id.toString(),
|
|
319
|
-
type: this._type,
|
|
320
|
-
name: this._name,
|
|
321
|
-
email: this._email.toString(),
|
|
322
|
-
publicKey: this._publicKey.toString('base64'),
|
|
323
|
-
creatorId: this._creatorId.toString(),
|
|
324
|
-
dateCreated: this._dateCreated.toISOString(),
|
|
325
|
-
dateUpdated: this._dateUpdated.toISOString(),
|
|
326
|
-
};
|
|
327
|
-
return JSON.stringify(storage);
|
|
328
|
-
}
|
|
329
|
-
|
|
330
|
-
public dispose(): void {
|
|
331
|
-
// Ensure secret material is zeroized when disposing
|
|
332
|
-
try {
|
|
333
|
-
this._privateKey?.dispose();
|
|
334
|
-
} finally {
|
|
335
|
-
this.unloadWalletAndPrivateKey();
|
|
336
|
-
}
|
|
337
|
-
}
|
|
338
|
-
|
|
339
|
-
public static fromJson(
|
|
340
|
-
json: string,
|
|
341
|
-
// Add injected services as parameters
|
|
342
|
-
eciesService: ECIESService,
|
|
343
|
-
): Member {
|
|
344
|
-
const storage: IMemberStorageData = JSON.parse(json);
|
|
345
|
-
const email = new EmailString(storage.email);
|
|
346
|
-
|
|
347
|
-
// Pass injected services to constructor
|
|
348
|
-
const dateCreated = new Date(storage.dateCreated);
|
|
349
|
-
return new Member(
|
|
350
|
-
eciesService,
|
|
351
|
-
storage.type,
|
|
352
|
-
storage.name,
|
|
353
|
-
email,
|
|
354
|
-
Buffer.from(storage.publicKey, 'base64'),
|
|
355
|
-
undefined,
|
|
356
|
-
undefined,
|
|
357
|
-
new ObjectId(storage.id),
|
|
358
|
-
dateCreated,
|
|
359
|
-
new Date(storage.dateUpdated),
|
|
360
|
-
new ObjectId(storage.creatorId),
|
|
361
|
-
);
|
|
362
|
-
}
|
|
363
|
-
|
|
364
|
-
public static fromMnemonic(
|
|
365
|
-
mnemonic: SecureString,
|
|
366
|
-
eciesService: ECIESService,
|
|
367
|
-
memberType = MemberType.User,
|
|
368
|
-
name = 'Test User',
|
|
369
|
-
email = new EmailString('test@example.com'),
|
|
370
|
-
): Member {
|
|
371
|
-
const { wallet } = eciesService.walletAndSeedFromMnemonic(mnemonic);
|
|
372
|
-
const privateKey = wallet.getPrivateKey();
|
|
373
|
-
const publicKeyWithPrefix = Buffer.concat([
|
|
374
|
-
Buffer.from([ECIES.PUBLIC_KEY_MAGIC]),
|
|
375
|
-
wallet.getPublicKey(),
|
|
376
|
-
]);
|
|
377
|
-
|
|
378
|
-
return new Member(
|
|
379
|
-
eciesService,
|
|
380
|
-
memberType,
|
|
381
|
-
name,
|
|
382
|
-
email,
|
|
383
|
-
publicKeyWithPrefix,
|
|
384
|
-
new SecureBuffer(privateKey),
|
|
385
|
-
wallet,
|
|
386
|
-
);
|
|
387
|
-
}
|
|
388
|
-
|
|
389
|
-
public static newMember(
|
|
390
|
-
// Add injected services as parameters
|
|
391
|
-
eciesService: ECIESService,
|
|
392
|
-
// Original parameters
|
|
393
|
-
type: MemberType,
|
|
394
|
-
name: string,
|
|
395
|
-
email: EmailString,
|
|
396
|
-
forceMnemonic?: SecureString,
|
|
397
|
-
createdBy?: Types.ObjectId,
|
|
398
|
-
): { member: Member; mnemonic: SecureString } {
|
|
399
|
-
// Validate inputs first
|
|
400
|
-
if (!name || name.length == 0) {
|
|
401
|
-
throw new NodeMemberError(
|
|
402
|
-
getNodeEciesTranslation(
|
|
403
|
-
NodeEciesStringKey.Error_Member_MissingMemberName,
|
|
404
|
-
),
|
|
405
|
-
MemberErrorType.MissingMemberName,
|
|
406
|
-
);
|
|
407
|
-
}
|
|
408
|
-
if (name.trim() != name) {
|
|
409
|
-
throw new NodeMemberError(
|
|
410
|
-
getNodeEciesTranslation(
|
|
411
|
-
NodeEciesStringKey.Error_Member_InvalidMemberNameWhitespace,
|
|
412
|
-
),
|
|
413
|
-
MemberErrorType.InvalidMemberNameWhitespace,
|
|
414
|
-
);
|
|
415
|
-
}
|
|
416
|
-
if (!email || email.toString().length == 0) {
|
|
417
|
-
throw new NodeMemberError(
|
|
418
|
-
getNodeEciesTranslation(NodeEciesStringKey.Error_Member_MissingEmail),
|
|
419
|
-
MemberErrorType.MissingEmail,
|
|
420
|
-
);
|
|
421
|
-
}
|
|
422
|
-
if (email.toString().trim() != email.toString()) {
|
|
423
|
-
throw new NodeMemberError(
|
|
424
|
-
getNodeEciesTranslation(
|
|
425
|
-
NodeEciesStringKey.Error_Member_InvalidEmailWhitespace,
|
|
426
|
-
),
|
|
427
|
-
MemberErrorType.InvalidEmailWhitespace,
|
|
428
|
-
);
|
|
429
|
-
}
|
|
430
|
-
|
|
431
|
-
// Use injected services
|
|
432
|
-
const mnemonic = forceMnemonic ?? eciesService.generateNewMnemonic();
|
|
433
|
-
const { wallet } = eciesService.walletAndSeedFromMnemonic(mnemonic);
|
|
434
|
-
|
|
435
|
-
// Get private key from wallet
|
|
436
|
-
const privateKey = wallet.getPrivateKey();
|
|
437
|
-
// Get public key with 0x04 prefix
|
|
438
|
-
const publicKeyWithPrefix = Buffer.concat([
|
|
439
|
-
Buffer.from([ECIES.PUBLIC_KEY_MAGIC]),
|
|
440
|
-
wallet.getPublicKey(),
|
|
441
|
-
]);
|
|
442
|
-
|
|
443
|
-
const newId = new ObjectId();
|
|
444
|
-
const dateCreated = new Date();
|
|
445
|
-
return {
|
|
446
|
-
// Pass injected services to constructor
|
|
447
|
-
member: new Member(
|
|
448
|
-
eciesService,
|
|
449
|
-
type,
|
|
450
|
-
name,
|
|
451
|
-
email,
|
|
452
|
-
publicKeyWithPrefix,
|
|
453
|
-
new SecureBuffer(privateKey),
|
|
454
|
-
wallet,
|
|
455
|
-
newId,
|
|
456
|
-
dateCreated,
|
|
457
|
-
dateCreated,
|
|
458
|
-
createdBy ?? newId,
|
|
459
|
-
),
|
|
460
|
-
mnemonic,
|
|
461
|
-
};
|
|
462
|
-
}
|
|
463
|
-
}
|
package/src/services/aes-gcm.ts
DELETED
|
@@ -1,160 +0,0 @@
|
|
|
1
|
-
import { createCipheriv, createDecipheriv, randomBytes } from 'crypto';
|
|
2
|
-
import { CipherGCMTypes } from 'crypto';
|
|
3
|
-
import { IConstants } from '../interfaces/constants';
|
|
4
|
-
import { getEciesPluginI18nEngine, NodeEciesComponentId, NodeEciesStringKey } from '../i18n';
|
|
5
|
-
import { Constants } from '../constants';
|
|
6
|
-
|
|
7
|
-
export class AESGCMService {
|
|
8
|
-
private readonly algorithmName: string;
|
|
9
|
-
private readonly mode: string;
|
|
10
|
-
private readonly keyBits: number;
|
|
11
|
-
private readonly ivSize: number;
|
|
12
|
-
private readonly keyringAlgorithmConfiguration: CipherGCMTypes;
|
|
13
|
-
|
|
14
|
-
constructor(constants: IConstants = Constants) {
|
|
15
|
-
this.algorithmName = constants.KEYRING.ALGORITHM;
|
|
16
|
-
this.mode = constants.KEYRING.MODE;
|
|
17
|
-
this.keyBits = constants.KEYRING.KEY_BITS;
|
|
18
|
-
this.ivSize = constants.WRAPPED_KEY.IV_SIZE;
|
|
19
|
-
this.keyringAlgorithmConfiguration = constants.KEYRING_ALGORITHM_CONFIGURATION;
|
|
20
|
-
}
|
|
21
|
-
|
|
22
|
-
public get ALGORITHM_NAME(): string {
|
|
23
|
-
return this.algorithmName;
|
|
24
|
-
}
|
|
25
|
-
|
|
26
|
-
public get MODE(): string {
|
|
27
|
-
return this.mode;
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
public get KEY_BITS(): number {
|
|
31
|
-
return this.keyBits;
|
|
32
|
-
}
|
|
33
|
-
|
|
34
|
-
/**
|
|
35
|
-
* Encrypt data using AES-GCM
|
|
36
|
-
* @param data Data to encrypt
|
|
37
|
-
* @param key Key to use for encryption (must be 16, 24 or 32 bytes for AES)
|
|
38
|
-
* @param authTag Whether to return separate auth tag
|
|
39
|
-
* @returns Encrypted data with IV and optional separate auth tag
|
|
40
|
-
*/
|
|
41
|
-
public encrypt(
|
|
42
|
-
data: Buffer,
|
|
43
|
-
key: Buffer,
|
|
44
|
-
authTag: boolean = false,
|
|
45
|
-
): { encrypted: Buffer; iv: Buffer; tag?: Buffer } {
|
|
46
|
-
const iv = randomBytes(this.ivSize);
|
|
47
|
-
const cipher = createCipheriv(this.keyringAlgorithmConfiguration, key, iv);
|
|
48
|
-
|
|
49
|
-
const encrypted = Buffer.concat([cipher.update(data), cipher.final()]);
|
|
50
|
-
const tag = cipher.getAuthTag();
|
|
51
|
-
|
|
52
|
-
if (!authTag) {
|
|
53
|
-
const encryptedWithTag = Buffer.concat([encrypted, tag]);
|
|
54
|
-
return { encrypted: encryptedWithTag, iv: iv };
|
|
55
|
-
}
|
|
56
|
-
|
|
57
|
-
return {
|
|
58
|
-
encrypted: encrypted,
|
|
59
|
-
iv: iv,
|
|
60
|
-
tag: tag,
|
|
61
|
-
};
|
|
62
|
-
}
|
|
63
|
-
|
|
64
|
-
/**
|
|
65
|
-
* Combine encrypted data and auth tag into a single Buffer
|
|
66
|
-
* @param encryptedData The encrypted data
|
|
67
|
-
* @param authTag The authentication tag
|
|
68
|
-
* @returns The combined Buffer
|
|
69
|
-
*/
|
|
70
|
-
public combineEncryptedDataAndTag(
|
|
71
|
-
encryptedData: Buffer,
|
|
72
|
-
authTag: Buffer,
|
|
73
|
-
): Buffer {
|
|
74
|
-
return Buffer.concat([encryptedData, authTag]);
|
|
75
|
-
}
|
|
76
|
-
|
|
77
|
-
/**
|
|
78
|
-
* Combine IV and encrypted data (with optional auth tag) into a single Buffer
|
|
79
|
-
* @param iv The initialization vector
|
|
80
|
-
* @param encryptedDataWithTag The encrypted data with auth tag already appended (if applicable)
|
|
81
|
-
* @returns The combined Buffer
|
|
82
|
-
*/
|
|
83
|
-
public combineIvAndEncryptedData(
|
|
84
|
-
iv: Buffer,
|
|
85
|
-
encryptedDataWithTag: Buffer,
|
|
86
|
-
): Buffer {
|
|
87
|
-
return Buffer.concat([iv, encryptedDataWithTag]);
|
|
88
|
-
}
|
|
89
|
-
|
|
90
|
-
/**
|
|
91
|
-
* Combine IV, encrypted data and auth tag into a single Buffer
|
|
92
|
-
* @param iv The initialization vector
|
|
93
|
-
* @param encryptedData The encrypted data
|
|
94
|
-
* @param authTag The authentication tag
|
|
95
|
-
* @returns The combined Buffer
|
|
96
|
-
*/
|
|
97
|
-
public combineIvTagAndEncryptedData(
|
|
98
|
-
iv: Buffer,
|
|
99
|
-
encryptedData: Buffer,
|
|
100
|
-
authTag: Buffer,
|
|
101
|
-
): Buffer {
|
|
102
|
-
const encryptedWithTag = this.combineEncryptedDataAndTag(
|
|
103
|
-
encryptedData,
|
|
104
|
-
authTag,
|
|
105
|
-
);
|
|
106
|
-
return this.combineIvAndEncryptedData(iv, encryptedWithTag);
|
|
107
|
-
}
|
|
108
|
-
|
|
109
|
-
/**
|
|
110
|
-
* Split combined encrypted data back into its components
|
|
111
|
-
* @param combinedData The combined data containing IV, encrypted data, and optionally auth tag
|
|
112
|
-
* @param hasAuthTag Whether the combined data includes an authentication tag
|
|
113
|
-
* @returns Object containing the split components
|
|
114
|
-
*/
|
|
115
|
-
public splitEncryptedData(
|
|
116
|
-
combinedData: Buffer,
|
|
117
|
-
hasAuthTag: boolean = true,
|
|
118
|
-
): { iv: Buffer; encryptedDataWithTag: Buffer } {
|
|
119
|
-
const ivLength = this.ivSize;
|
|
120
|
-
const minLength = ivLength + (hasAuthTag ? 16 : 0);
|
|
121
|
-
|
|
122
|
-
if (combinedData.length < minLength) {
|
|
123
|
-
const pluginEngine = getEciesPluginI18nEngine();
|
|
124
|
-
|
|
125
|
-
throw new Error(
|
|
126
|
-
pluginEngine.translate(NodeEciesComponentId, NodeEciesStringKey.Error_CombinedDataTooShort),
|
|
127
|
-
);
|
|
128
|
-
}
|
|
129
|
-
|
|
130
|
-
const iv = combinedData.subarray(0, ivLength);
|
|
131
|
-
const encryptedDataWithTag = combinedData.subarray(ivLength);
|
|
132
|
-
|
|
133
|
-
return { iv, encryptedDataWithTag };
|
|
134
|
-
}
|
|
135
|
-
|
|
136
|
-
/**
|
|
137
|
-
* Decrypt data using AES-GCM
|
|
138
|
-
* @param iv The initialization vector
|
|
139
|
-
* @param encryptedData Data to decrypt (with auth tag appended)
|
|
140
|
-
* @param key Key to use for decryption (must be 16, 24 or 32 bytes for AES)
|
|
141
|
-
* @param authTag Whether the encrypted data includes an authentication tag
|
|
142
|
-
* @returns Decrypted data
|
|
143
|
-
*/
|
|
144
|
-
public decrypt(
|
|
145
|
-
iv: Buffer,
|
|
146
|
-
encryptedData: Buffer,
|
|
147
|
-
key: Buffer,
|
|
148
|
-
authTag: boolean = false,
|
|
149
|
-
): Buffer {
|
|
150
|
-
const decipher = createDecipheriv(this.keyringAlgorithmConfiguration, key, iv);
|
|
151
|
-
|
|
152
|
-
const tagLength = 16;
|
|
153
|
-
const tag = encryptedData.subarray(-tagLength);
|
|
154
|
-
const ciphertext = encryptedData.subarray(0, -tagLength);
|
|
155
|
-
|
|
156
|
-
decipher.setAuthTag(tag);
|
|
157
|
-
|
|
158
|
-
return Buffer.concat([decipher.update(ciphertext), decipher.final()]);
|
|
159
|
-
}
|
|
160
|
-
}
|