@digitaldefiance/node-ecies-lib 4.5.19 → 4.6.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (353) hide show
  1. package/package.json +2 -2
  2. package/src/builders/ecies-builder.d.ts +11 -0
  3. package/src/builders/ecies-builder.d.ts.map +1 -0
  4. package/src/builders/ecies-builder.js +26 -0
  5. package/src/builders/ecies-builder.js.map +1 -0
  6. package/src/builders/index.d.ts +3 -0
  7. package/src/builders/index.d.ts.map +1 -0
  8. package/src/builders/index.js +6 -0
  9. package/src/builders/index.js.map +1 -0
  10. package/src/builders/member-builder.d.ts +47 -0
  11. package/src/builders/member-builder.d.ts.map +1 -0
  12. package/src/builders/member-builder.js +99 -0
  13. package/src/builders/member-builder.js.map +1 -0
  14. package/src/constants.d.ts +38 -0
  15. package/src/constants.d.ts.map +1 -0
  16. package/src/constants.js +191 -0
  17. package/src/constants.js.map +1 -0
  18. package/src/core/errors/crypto-error.d.ts +6 -0
  19. package/src/core/errors/crypto-error.d.ts.map +1 -0
  20. package/src/core/errors/crypto-error.js +15 -0
  21. package/src/core/errors/crypto-error.js.map +1 -0
  22. package/src/core/index.d.ts +3 -0
  23. package/src/core/index.d.ts.map +1 -0
  24. package/src/core/index.js +6 -0
  25. package/src/core/index.js.map +1 -0
  26. package/src/core/types/result.d.ts +8 -0
  27. package/src/core/types/result.d.ts.map +1 -0
  28. package/src/core/types/result.js +3 -0
  29. package/src/core/types/result.js.map +1 -0
  30. package/src/enumerations/index.d.ts +3 -0
  31. package/src/enumerations/index.d.ts.map +1 -0
  32. package/src/enumerations/index.js +6 -0
  33. package/src/enumerations/index.js.map +1 -0
  34. package/src/enumerations/pbkdf2-profile.d.ts +9 -0
  35. package/src/enumerations/pbkdf2-profile.d.ts.map +1 -0
  36. package/src/enumerations/pbkdf2-profile.js +13 -0
  37. package/src/enumerations/pbkdf2-profile.js.map +1 -0
  38. package/src/enumerations/voting-error-type.d.ts +37 -0
  39. package/src/enumerations/voting-error-type.d.ts.map +1 -0
  40. package/src/enumerations/voting-error-type.js +48 -0
  41. package/src/enumerations/voting-error-type.js.map +1 -0
  42. package/src/errors/index.d.ts +2 -0
  43. package/src/errors/index.d.ts.map +1 -0
  44. package/src/errors/index.js +5 -0
  45. package/src/errors/index.js.map +1 -0
  46. package/src/errors/voting.d.ts +16 -0
  47. package/src/errors/voting.d.ts.map +1 -0
  48. package/src/errors/voting.js +27 -0
  49. package/src/errors/voting.js.map +1 -0
  50. package/src/i18n/ecies-i18n-factory.d.ts +28 -0
  51. package/src/i18n/ecies-i18n-factory.d.ts.map +1 -0
  52. package/src/i18n/ecies-i18n-factory.js +90 -0
  53. package/src/i18n/ecies-i18n-factory.js.map +1 -0
  54. package/src/i18n/index.d.ts +3 -0
  55. package/src/i18n/index.d.ts.map +1 -0
  56. package/src/i18n/index.js +8 -0
  57. package/src/i18n/index.js.map +1 -0
  58. package/src/i18n/node-ecies-i18n-setup.d.ts +5 -0
  59. package/src/i18n/node-ecies-i18n-setup.d.ts.map +1 -0
  60. package/src/i18n/node-ecies-i18n-setup.js +48 -0
  61. package/src/i18n/node-ecies-i18n-setup.js.map +1 -0
  62. package/src/i18n/node-keys.d.ts +57 -0
  63. package/src/i18n/node-keys.d.ts.map +1 -0
  64. package/src/i18n/node-keys.js +67 -0
  65. package/src/i18n/node-keys.js.map +1 -0
  66. package/src/i18n/translations/de.d.ts +3 -0
  67. package/src/i18n/translations/de.d.ts.map +1 -0
  68. package/src/i18n/translations/de.js +57 -0
  69. package/src/i18n/translations/de.js.map +1 -0
  70. package/src/i18n/translations/en-GB.d.ts +3 -0
  71. package/src/i18n/translations/en-GB.d.ts.map +1 -0
  72. package/src/i18n/translations/en-GB.js +61 -0
  73. package/src/i18n/translations/en-GB.js.map +1 -0
  74. package/src/i18n/translations/en-US.d.ts +6 -0
  75. package/src/i18n/translations/en-US.d.ts.map +1 -0
  76. package/src/i18n/translations/en-US.js +65 -0
  77. package/src/i18n/translations/en-US.js.map +1 -0
  78. package/src/i18n/translations/es.d.ts +3 -0
  79. package/src/i18n/translations/es.d.ts.map +1 -0
  80. package/src/i18n/translations/es.js +57 -0
  81. package/src/i18n/translations/es.js.map +1 -0
  82. package/src/i18n/translations/fr.d.ts +3 -0
  83. package/src/i18n/translations/fr.d.ts.map +1 -0
  84. package/src/i18n/translations/fr.js +57 -0
  85. package/src/i18n/translations/fr.js.map +1 -0
  86. package/src/i18n/translations/index.d.ts +9 -0
  87. package/src/i18n/translations/index.d.ts.map +1 -0
  88. package/src/i18n/translations/index.js +20 -0
  89. package/src/i18n/translations/index.js.map +1 -0
  90. package/src/i18n/translations/ja.d.ts +3 -0
  91. package/src/i18n/translations/ja.d.ts.map +1 -0
  92. package/src/i18n/translations/ja.js +57 -0
  93. package/src/i18n/translations/ja.js.map +1 -0
  94. package/src/i18n/translations/uk.d.ts +3 -0
  95. package/src/i18n/translations/uk.d.ts.map +1 -0
  96. package/src/i18n/translations/uk.js +57 -0
  97. package/src/i18n/translations/uk.js.map +1 -0
  98. package/src/i18n/translations/zh-cn.d.ts +3 -0
  99. package/src/i18n/translations/zh-cn.d.ts.map +1 -0
  100. package/src/i18n/translations/zh-cn.js +57 -0
  101. package/src/i18n/translations/zh-cn.js.map +1 -0
  102. package/src/i18n-setup.d.ts +26 -0
  103. package/src/i18n-setup.d.ts.map +1 -0
  104. package/src/i18n-setup.js +111 -0
  105. package/src/i18n-setup.js.map +1 -0
  106. package/src/index.d.ts +21 -0
  107. package/src/index.d.ts.map +1 -0
  108. package/src/index.js +36 -0
  109. package/src/index.js.map +1 -0
  110. package/src/interfaces/authenticated-cipher.d.ts +12 -0
  111. package/src/interfaces/authenticated-cipher.d.ts.map +1 -0
  112. package/src/interfaces/authenticated-cipher.js +3 -0
  113. package/src/interfaces/authenticated-cipher.js.map +1 -0
  114. package/src/interfaces/authenticated-decipher.d.ts +11 -0
  115. package/src/interfaces/authenticated-decipher.d.ts.map +1 -0
  116. package/src/interfaces/authenticated-decipher.js +3 -0
  117. package/src/interfaces/authenticated-decipher.js.map +1 -0
  118. package/src/interfaces/backend-member-operational.d.ts +48 -0
  119. package/src/interfaces/backend-member-operational.d.ts.map +1 -0
  120. package/src/interfaces/backend-member-operational.js +3 -0
  121. package/src/interfaces/backend-member-operational.js.map +1 -0
  122. package/src/interfaces/checksum-config.d.ts +5 -0
  123. package/src/interfaces/checksum-config.d.ts.map +1 -0
  124. package/src/interfaces/checksum-config.js +3 -0
  125. package/src/interfaces/checksum-config.js.map +1 -0
  126. package/src/interfaces/checksum-consts.d.ts +11 -0
  127. package/src/interfaces/checksum-consts.d.ts.map +1 -0
  128. package/src/interfaces/checksum-consts.js +3 -0
  129. package/src/interfaces/checksum-consts.js.map +1 -0
  130. package/src/interfaces/constants.d.ts +52 -0
  131. package/src/interfaces/constants.d.ts.map +1 -0
  132. package/src/interfaces/constants.js +3 -0
  133. package/src/interfaces/constants.js.map +1 -0
  134. package/src/interfaces/ecies-consts.d.ts +88 -0
  135. package/src/interfaces/ecies-consts.d.ts.map +1 -0
  136. package/src/interfaces/ecies-consts.js +3 -0
  137. package/src/interfaces/ecies-consts.js.map +1 -0
  138. package/src/interfaces/encrypted-chunk.d.ts +12 -0
  139. package/src/interfaces/encrypted-chunk.d.ts.map +1 -0
  140. package/src/interfaces/encrypted-chunk.js +3 -0
  141. package/src/interfaces/encrypted-chunk.js.map +1 -0
  142. package/src/interfaces/encryption-consts.d.ts +11 -0
  143. package/src/interfaces/encryption-consts.d.ts.map +1 -0
  144. package/src/interfaces/encryption-consts.js +3 -0
  145. package/src/interfaces/encryption-consts.js.map +1 -0
  146. package/src/interfaces/index.d.ts +31 -0
  147. package/src/interfaces/index.d.ts.map +1 -0
  148. package/src/interfaces/index.js +33 -0
  149. package/src/interfaces/index.js.map +1 -0
  150. package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.d.ts +6 -0
  151. package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.d.ts.map +1 -0
  152. package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.js +3 -0
  153. package/src/interfaces/keypair-buffer-with-un-encrypted-private-key.js.map +1 -0
  154. package/src/interfaces/keyring-consts.d.ts +6 -0
  155. package/src/interfaces/keyring-consts.d.ts.map +1 -0
  156. package/src/interfaces/keyring-consts.js +3 -0
  157. package/src/interfaces/keyring-consts.js.map +1 -0
  158. package/src/interfaces/member-with-mnemonic.d.ts +7 -0
  159. package/src/interfaces/member-with-mnemonic.d.ts.map +1 -0
  160. package/src/interfaces/member-with-mnemonic.js +3 -0
  161. package/src/interfaces/member-with-mnemonic.js.map +1 -0
  162. package/src/interfaces/member.d.ts +47 -0
  163. package/src/interfaces/member.d.ts.map +1 -0
  164. package/src/interfaces/member.js +3 -0
  165. package/src/interfaces/member.js.map +1 -0
  166. package/src/interfaces/multi-encrypted-message.d.ts +8 -0
  167. package/src/interfaces/multi-encrypted-message.d.ts.map +1 -0
  168. package/src/interfaces/multi-encrypted-message.js +3 -0
  169. package/src/interfaces/multi-encrypted-message.js.map +1 -0
  170. package/src/interfaces/multi-encrypted-parsed-header.d.ts +27 -0
  171. package/src/interfaces/multi-encrypted-parsed-header.d.ts.map +1 -0
  172. package/src/interfaces/multi-encrypted-parsed-header.js +3 -0
  173. package/src/interfaces/multi-encrypted-parsed-header.js.map +1 -0
  174. package/src/interfaces/multi-recipient-chunk.d.ts +26 -0
  175. package/src/interfaces/multi-recipient-chunk.d.ts.map +1 -0
  176. package/src/interfaces/multi-recipient-chunk.js +15 -0
  177. package/src/interfaces/multi-recipient-chunk.js.map +1 -0
  178. package/src/interfaces/pbkdf-profiles.d.ts +6 -0
  179. package/src/interfaces/pbkdf-profiles.d.ts.map +1 -0
  180. package/src/interfaces/pbkdf-profiles.js +3 -0
  181. package/src/interfaces/pbkdf-profiles.js.map +1 -0
  182. package/src/interfaces/pbkdf2-result.d.ts +6 -0
  183. package/src/interfaces/pbkdf2-result.d.ts.map +1 -0
  184. package/src/interfaces/pbkdf2-result.js +3 -0
  185. package/src/interfaces/pbkdf2-result.js.map +1 -0
  186. package/src/interfaces/signing-key-private-key-info.d.ts +11 -0
  187. package/src/interfaces/signing-key-private-key-info.d.ts.map +1 -0
  188. package/src/interfaces/signing-key-private-key-info.js +3 -0
  189. package/src/interfaces/signing-key-private-key-info.js.map +1 -0
  190. package/src/interfaces/simple-keypair-buffer.d.ts +6 -0
  191. package/src/interfaces/simple-keypair-buffer.d.ts.map +1 -0
  192. package/src/interfaces/simple-keypair-buffer.js +3 -0
  193. package/src/interfaces/simple-keypair-buffer.js.map +1 -0
  194. package/src/interfaces/simple-keypair.d.ts +6 -0
  195. package/src/interfaces/simple-keypair.d.ts.map +1 -0
  196. package/src/interfaces/simple-keypair.js +3 -0
  197. package/src/interfaces/simple-keypair.js.map +1 -0
  198. package/src/interfaces/simple-public-key-only-buffer.d.ts +4 -0
  199. package/src/interfaces/simple-public-key-only-buffer.d.ts.map +1 -0
  200. package/src/interfaces/simple-public-key-only-buffer.js +3 -0
  201. package/src/interfaces/simple-public-key-only-buffer.js.map +1 -0
  202. package/src/interfaces/simple-public-key-only.d.ts +4 -0
  203. package/src/interfaces/simple-public-key-only.d.ts.map +1 -0
  204. package/src/interfaces/simple-public-key-only.js +3 -0
  205. package/src/interfaces/simple-public-key-only.js.map +1 -0
  206. package/src/interfaces/single-encrypted-parsed-header.d.ts +35 -0
  207. package/src/interfaces/single-encrypted-parsed-header.d.ts.map +1 -0
  208. package/src/interfaces/single-encrypted-parsed-header.js +3 -0
  209. package/src/interfaces/single-encrypted-parsed-header.js.map +1 -0
  210. package/src/interfaces/stream-config.d.ts +6 -0
  211. package/src/interfaces/stream-config.d.ts.map +1 -0
  212. package/src/interfaces/stream-config.js +8 -0
  213. package/src/interfaces/stream-config.js.map +1 -0
  214. package/src/interfaces/stream-progress.d.ts +22 -0
  215. package/src/interfaces/stream-progress.d.ts.map +1 -0
  216. package/src/interfaces/stream-progress.js +3 -0
  217. package/src/interfaces/stream-progress.js.map +1 -0
  218. package/src/interfaces/voting-consts.d.ts +86 -0
  219. package/src/interfaces/voting-consts.d.ts.map +1 -0
  220. package/src/interfaces/voting-consts.js +27 -0
  221. package/src/interfaces/voting-consts.js.map +1 -0
  222. package/src/interfaces/wallet-seed.d.ts +7 -0
  223. package/src/interfaces/wallet-seed.d.ts.map +1 -0
  224. package/src/interfaces/wallet-seed.js +3 -0
  225. package/src/interfaces/wallet-seed.js.map +1 -0
  226. package/src/interfaces/wrapped-key-consts.d.ts +7 -0
  227. package/src/interfaces/wrapped-key-consts.d.ts.map +1 -0
  228. package/src/interfaces/wrapped-key-consts.js +3 -0
  229. package/src/interfaces/wrapped-key-consts.js.map +1 -0
  230. package/src/isolated-private.d.ts +62 -0
  231. package/src/isolated-private.d.ts.map +1 -0
  232. package/src/isolated-private.js +139 -0
  233. package/src/isolated-private.js.map +1 -0
  234. package/src/isolated-public.d.ts +118 -0
  235. package/src/isolated-public.d.ts.map +1 -0
  236. package/src/isolated-public.js +317 -0
  237. package/src/isolated-public.js.map +1 -0
  238. package/src/lib/crypto-container.d.ts +13 -0
  239. package/src/lib/crypto-container.d.ts.map +1 -0
  240. package/src/lib/crypto-container.js +32 -0
  241. package/src/lib/crypto-container.js.map +1 -0
  242. package/src/lib/index.d.ts +4 -0
  243. package/src/lib/index.d.ts.map +1 -0
  244. package/src/lib/index.js +7 -0
  245. package/src/lib/index.js.map +1 -0
  246. package/src/lib/invariant-validator.d.ts +69 -0
  247. package/src/lib/invariant-validator.d.ts.map +1 -0
  248. package/src/lib/invariant-validator.js +98 -0
  249. package/src/lib/invariant-validator.js.map +1 -0
  250. package/src/lib/invariants/index.d.ts +8 -0
  251. package/src/lib/invariants/index.d.ts.map +1 -0
  252. package/src/lib/invariants/index.js +12 -0
  253. package/src/lib/invariants/index.js.map +1 -0
  254. package/src/lib/invariants/recipient-id-consistency.d.ts +41 -0
  255. package/src/lib/invariants/recipient-id-consistency.d.ts.map +1 -0
  256. package/src/lib/invariants/recipient-id-consistency.js +75 -0
  257. package/src/lib/invariants/recipient-id-consistency.js.map +1 -0
  258. package/src/member.d.ts +100 -0
  259. package/src/member.d.ts.map +1 -0
  260. package/src/member.js +345 -0
  261. package/src/member.js.map +1 -0
  262. package/src/services/aes-gcm.d.ts +66 -0
  263. package/src/services/aes-gcm.d.ts.map +1 -0
  264. package/src/services/aes-gcm.js +161 -0
  265. package/src/services/aes-gcm.js.map +1 -0
  266. package/src/services/chunk-processor.d.ts +15 -0
  267. package/src/services/chunk-processor.d.ts.map +1 -0
  268. package/src/services/chunk-processor.js +36 -0
  269. package/src/services/chunk-processor.js.map +1 -0
  270. package/src/services/ecies/crypto-core.d.ts +104 -0
  271. package/src/services/ecies/crypto-core.d.ts.map +1 -0
  272. package/src/services/ecies/crypto-core.js +234 -0
  273. package/src/services/ecies/crypto-core.js.map +1 -0
  274. package/src/services/ecies/file.d.ts +30 -0
  275. package/src/services/ecies/file.d.ts.map +1 -0
  276. package/src/services/ecies/file.js +112 -0
  277. package/src/services/ecies/file.js.map +1 -0
  278. package/src/services/ecies/index.d.ts +8 -0
  279. package/src/services/ecies/index.d.ts.map +1 -0
  280. package/src/services/ecies/index.js +11 -0
  281. package/src/services/ecies/index.js.map +1 -0
  282. package/src/services/ecies/multi-recipient.d.ts +84 -0
  283. package/src/services/ecies/multi-recipient.d.ts.map +1 -0
  284. package/src/services/ecies/multi-recipient.js +502 -0
  285. package/src/services/ecies/multi-recipient.js.map +1 -0
  286. package/src/services/ecies/service.d.ts +75 -0
  287. package/src/services/ecies/service.d.ts.map +1 -0
  288. package/src/services/ecies/service.js +152 -0
  289. package/src/services/ecies/service.js.map +1 -0
  290. package/src/services/ecies/signature.d.ts +38 -0
  291. package/src/services/ecies/signature.d.ts.map +1 -0
  292. package/src/services/ecies/signature.js +70 -0
  293. package/src/services/ecies/signature.js.map +1 -0
  294. package/src/services/ecies/single-recipient.d.ts +83 -0
  295. package/src/services/ecies/single-recipient.d.ts.map +1 -0
  296. package/src/services/ecies/single-recipient.js +452 -0
  297. package/src/services/ecies/single-recipient.js.map +1 -0
  298. package/src/services/ecies/utilities.d.ts +33 -0
  299. package/src/services/ecies/utilities.d.ts.map +1 -0
  300. package/src/services/ecies/utilities.js +91 -0
  301. package/src/services/ecies/utilities.js.map +1 -0
  302. package/src/services/encryption-stream.d.ts +33 -0
  303. package/src/services/encryption-stream.d.ts.map +1 -0
  304. package/src/services/encryption-stream.js +211 -0
  305. package/src/services/encryption-stream.js.map +1 -0
  306. package/src/services/index.d.ts +9 -0
  307. package/src/services/index.d.ts.map +1 -0
  308. package/src/services/index.js +14 -0
  309. package/src/services/index.js.map +1 -0
  310. package/src/services/multi-recipient-processor.d.ts +72 -0
  311. package/src/services/multi-recipient-processor.d.ts.map +1 -0
  312. package/src/services/multi-recipient-processor.js +325 -0
  313. package/src/services/multi-recipient-processor.js.map +1 -0
  314. package/src/services/pbkdf2.d.ts +105 -0
  315. package/src/services/pbkdf2.d.ts.map +1 -0
  316. package/src/services/pbkdf2.js +191 -0
  317. package/src/services/pbkdf2.js.map +1 -0
  318. package/src/services/progress-tracker.d.ts +14 -0
  319. package/src/services/progress-tracker.d.ts.map +1 -0
  320. package/src/services/progress-tracker.js +94 -0
  321. package/src/services/progress-tracker.js.map +1 -0
  322. package/src/services/voting.service.d.ts +262 -0
  323. package/src/services/voting.service.d.ts.map +1 -0
  324. package/src/services/voting.service.js +791 -0
  325. package/src/services/voting.service.js.map +1 -0
  326. package/src/test-mocks/index.d.ts +2 -0
  327. package/src/test-mocks/index.d.ts.map +1 -0
  328. package/src/test-mocks/index.js +5 -0
  329. package/src/test-mocks/index.js.map +1 -0
  330. package/src/test-mocks/mock-backend-member.d.ts +76 -0
  331. package/src/test-mocks/mock-backend-member.d.ts.map +1 -0
  332. package/src/test-mocks/mock-backend-member.js +139 -0
  333. package/src/test-mocks/mock-backend-member.js.map +1 -0
  334. package/src/testing.d.ts +2 -0
  335. package/src/testing.d.ts.map +1 -0
  336. package/src/testing.js +6 -0
  337. package/src/testing.js.map +1 -0
  338. package/src/types/id-guards.d.ts +39 -0
  339. package/src/types/id-guards.d.ts.map +1 -0
  340. package/src/types/id-guards.js +91 -0
  341. package/src/types/id-guards.js.map +1 -0
  342. package/src/types/index.d.ts +2 -0
  343. package/src/types/index.d.ts.map +1 -0
  344. package/src/types/index.js +5 -0
  345. package/src/types/index.js.map +1 -0
  346. package/src/types.d.ts +26 -0
  347. package/src/types.d.ts.map +1 -0
  348. package/src/types.js +6 -0
  349. package/src/types.js.map +1 -0
  350. package/src/utils.d.ts +11 -0
  351. package/src/utils.d.ts.map +1 -0
  352. package/src/utils.js +82 -0
  353. package/src/utils.js.map +1 -0
@@ -0,0 +1,161 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.AESGCMService = void 0;
4
+ /* eslint-disable @typescript-eslint/no-unsafe-assignment */
5
+ const crypto_1 = require("crypto");
6
+ const constants_1 = require("../constants");
7
+ const i18n_1 = require("../i18n");
8
+ class AESGCMService {
9
+ algorithmName;
10
+ mode;
11
+ keyBits;
12
+ ivSize;
13
+ keyringAlgorithmConfiguration;
14
+ constructor(constants = constants_1.Constants) {
15
+ this.algorithmName = constants.KEYRING.ALGORITHM;
16
+ this.mode = constants.KEYRING.MODE;
17
+ this.keyBits = constants.KEYRING.KEY_BITS;
18
+ this.ivSize = constants.WRAPPED_KEY.IV_SIZE;
19
+ this.keyringAlgorithmConfiguration =
20
+ constants.KEYRING_ALGORITHM_CONFIGURATION;
21
+ }
22
+ get ALGORITHM_NAME() {
23
+ return this.algorithmName;
24
+ }
25
+ get MODE() {
26
+ return this.mode;
27
+ }
28
+ get KEY_BITS() {
29
+ return this.keyBits;
30
+ }
31
+ /**
32
+ * Encrypt data using AES-GCM
33
+ * @param data Data to encrypt
34
+ * @param key Key to use for encryption (must be 16, 24 or 32 bytes for AES)
35
+ * @param authTag Whether to return separate auth tag
36
+ * @returns Encrypted data with IV and optional separate auth tag
37
+ */
38
+ encrypt(data, key, authTag = false, aad) {
39
+ // Security fix 9: Key length validation - must match algorithm requirements
40
+ const requiredKeyLength = this.keyBits / 8;
41
+ if (key.length !== requiredKeyLength) {
42
+ const pluginEngine = (0, i18n_1.getEciesPluginI18nEngine)();
43
+ throw new Error(pluginEngine.translate(i18n_1.NodeEciesComponentId, i18n_1.NodeEciesStringKey.Error_InvalidAESKeyLength));
44
+ }
45
+ // Security fix 11: Data null/undefined check
46
+ if (data === null || data === undefined) {
47
+ const pluginEngine = (0, i18n_1.getEciesPluginI18nEngine)();
48
+ throw new Error(pluginEngine.translate(i18n_1.NodeEciesComponentId, i18n_1.NodeEciesStringKey.Error_CannotEncryptEmptyData));
49
+ }
50
+ // Security fix 12: Data size validation (max 2GB)
51
+ if (data.length > 0x7fffffff) {
52
+ const pluginEngine = (0, i18n_1.getEciesPluginI18nEngine)();
53
+ throw new Error(pluginEngine.translate(i18n_1.NodeEciesComponentId, i18n_1.NodeEciesStringKey.Error_MessageTooLarge));
54
+ }
55
+ const iv = (0, crypto_1.randomBytes)(this.ivSize);
56
+ const cipher = (0, crypto_1.createCipheriv)(this.keyringAlgorithmConfiguration, key, iv);
57
+ if (aad) {
58
+ cipher.setAAD(aad);
59
+ }
60
+ const encrypted = Buffer.concat([cipher.update(data), cipher.final()]);
61
+ const tag = cipher.getAuthTag();
62
+ if (!authTag) {
63
+ const encryptedWithTag = Buffer.concat([encrypted, tag]);
64
+ return { encrypted: encryptedWithTag, iv: iv };
65
+ }
66
+ return {
67
+ encrypted: encrypted,
68
+ iv: iv,
69
+ tag: tag,
70
+ };
71
+ }
72
+ /**
73
+ * Combine encrypted data and auth tag into a single Buffer
74
+ * @param encryptedData The encrypted data
75
+ * @param authTag The authentication tag
76
+ * @returns The combined Buffer
77
+ */
78
+ combineEncryptedDataAndTag(encryptedData, authTag) {
79
+ return Buffer.concat([encryptedData, authTag]);
80
+ }
81
+ /**
82
+ * Combine IV and encrypted data (with optional auth tag) into a single Buffer
83
+ * @param iv The initialization vector
84
+ * @param encryptedDataWithTag The encrypted data with auth tag already appended (if applicable)
85
+ * @returns The combined Buffer
86
+ */
87
+ combineIvAndEncryptedData(iv, encryptedDataWithTag) {
88
+ return Buffer.concat([iv, encryptedDataWithTag]);
89
+ }
90
+ /**
91
+ * Combine IV, encrypted data and auth tag into a single Buffer
92
+ * @param iv The initialization vector
93
+ * @param encryptedData The encrypted data
94
+ * @param authTag The authentication tag
95
+ * @returns The combined Buffer
96
+ */
97
+ combineIvTagAndEncryptedData(iv, encryptedData, authTag) {
98
+ const encryptedWithTag = this.combineEncryptedDataAndTag(encryptedData, authTag);
99
+ return this.combineIvAndEncryptedData(iv, encryptedWithTag);
100
+ }
101
+ /**
102
+ * Split combined encrypted data back into its components
103
+ * @param combinedData The combined data containing IV, encrypted data, and optionally auth tag
104
+ * @param hasAuthTag Whether the combined data includes an authentication tag
105
+ * @returns Object containing the split components
106
+ */
107
+ splitEncryptedData(combinedData, hasAuthTag = true) {
108
+ const ivLength = this.ivSize;
109
+ const minLength = ivLength + (hasAuthTag ? 16 : 0);
110
+ if (combinedData.length < minLength) {
111
+ const pluginEngine = (0, i18n_1.getEciesPluginI18nEngine)();
112
+ throw new Error(pluginEngine.translate(i18n_1.NodeEciesComponentId, i18n_1.NodeEciesStringKey.Error_CombinedDataTooShort));
113
+ }
114
+ const iv = combinedData.subarray(0, ivLength);
115
+ const encryptedDataWithTag = combinedData.subarray(ivLength);
116
+ return { iv, encryptedDataWithTag };
117
+ }
118
+ /**
119
+ * Decrypt data using AES-GCM
120
+ * @param iv The initialization vector
121
+ * @param encryptedData Data to decrypt (with auth tag appended)
122
+ * @param key Key to use for decryption (must be 16, 24 or 32 bytes for AES)
123
+ * @param authTag Whether the encrypted data includes an authentication tag
124
+ * @returns Decrypted data
125
+ */
126
+ decrypt(iv, encryptedData, key,
127
+ // eslint-disable-next-line @typescript-eslint/no-unused-vars
128
+ _authTag = false, aad) {
129
+ // Security fix 9: Key length validation - must match algorithm requirements
130
+ const requiredKeyLength = this.keyBits / 8;
131
+ if (key.length !== requiredKeyLength) {
132
+ const pluginEngine = (0, i18n_1.getEciesPluginI18nEngine)();
133
+ throw new Error(pluginEngine.translate(i18n_1.NodeEciesComponentId, i18n_1.NodeEciesStringKey.Error_InvalidAESKeyLength));
134
+ }
135
+ // Security fix 10: IV length validation
136
+ if (iv.length !== 16) {
137
+ const pluginEngine = (0, i18n_1.getEciesPluginI18nEngine)();
138
+ throw new Error(pluginEngine.translate(i18n_1.NodeEciesComponentId, i18n_1.NodeEciesStringKey.Error_InvalidIVLength));
139
+ }
140
+ // Security fix 13: Decrypt input validation
141
+ if (encryptedData === null || encryptedData === undefined) {
142
+ const pluginEngine = (0, i18n_1.getEciesPluginI18nEngine)();
143
+ throw new Error(pluginEngine.translate(i18n_1.NodeEciesComponentId, i18n_1.NodeEciesStringKey.Error_CannotDecryptEmptyData));
144
+ }
145
+ if (encryptedData.length > 0x7fffffff) {
146
+ const pluginEngine = (0, i18n_1.getEciesPluginI18nEngine)();
147
+ throw new Error(pluginEngine.translate(i18n_1.NodeEciesComponentId, i18n_1.NodeEciesStringKey.Error_MessageTooLarge));
148
+ }
149
+ const decipher = (0, crypto_1.createDecipheriv)(this.keyringAlgorithmConfiguration, key, iv);
150
+ if (aad) {
151
+ decipher.setAAD(aad);
152
+ }
153
+ const tagLength = 16;
154
+ const tag = encryptedData.subarray(-tagLength);
155
+ const ciphertext = encryptedData.subarray(0, -tagLength);
156
+ decipher.setAuthTag(tag);
157
+ return Buffer.concat([decipher.update(ciphertext), decipher.final()]);
158
+ }
159
+ }
160
+ exports.AESGCMService = AESGCMService;
161
+ //# sourceMappingURL=aes-gcm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"aes-gcm.js","sourceRoot":"","sources":["../../../../../packages/digitaldefiance-node-ecies-lib/src/services/aes-gcm.ts"],"names":[],"mappings":";;;AAAA,4DAA4D;AAC5D,mCAKgB;AAEhB,4CAAyC;AACzC,kCAIiB;AAGjB,MAAa,aAAa;IACP,aAAa,CAAS;IACtB,IAAI,CAAS;IACb,OAAO,CAAS;IAChB,MAAM,CAAS;IACf,6BAA6B,CAAiB;IAE/D,YAAY,YAAwB,qBAAS;QAC3C,IAAI,CAAC,aAAa,GAAG,SAAS,CAAC,OAAO,CAAC,SAAS,CAAC;QACjD,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC;QACnC,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,OAAO,CAAC,QAAQ,CAAC;QAC1C,IAAI,CAAC,MAAM,GAAG,SAAS,CAAC,WAAW,CAAC,OAAO,CAAC;QAC5C,IAAI,CAAC,6BAA6B;YAChC,SAAS,CAAC,+BAA+B,CAAC;IAC9C,CAAC;IAED,IAAW,cAAc;QACvB,OAAO,IAAI,CAAC,aAAa,CAAC;IAC5B,CAAC;IAED,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,IAAI,CAAC;IACnB,CAAC;IAED,IAAW,QAAQ;QACjB,OAAO,IAAI,CAAC,OAAO,CAAC;IACtB,CAAC;IAED;;;;;;OAMG;IACI,OAAO,CACZ,IAAY,EACZ,GAAW,EACX,UAAmB,KAAK,EACxB,GAAY;QAEZ,4EAA4E;QAC5E,MAAM,iBAAiB,GAAG,IAAI,CAAC,OAAO,GAAG,CAAC,CAAC;QAC3C,IAAI,GAAG,CAAC,MAAM,KAAK,iBAAiB,EAAE,CAAC;YACrC,MAAM,YAAY,GAAG,IAAA,+BAAwB,GAAE,CAAC;YAChD,MAAM,IAAI,KAAK,CACb,YAAY,CAAC,SAAS,CACpB,2BAAoB,EACpB,yBAAkB,CAAC,yBAAyB,CAC7C,CACF,CAAC;QACJ,CAAC;QAED,6CAA6C;QAC7C,IAAI,IAAI,KAAK,IAAI,IAAI,IAAI,KAAK,SAAS,EAAE,CAAC;YACxC,MAAM,YAAY,GAAG,IAAA,+BAAwB,GAAE,CAAC;YAChD,MAAM,IAAI,KAAK,CACb,YAAY,CAAC,SAAS,CACpB,2BAAoB,EACpB,yBAAkB,CAAC,4BAA4B,CAChD,CACF,CAAC;QACJ,CAAC;QAED,kDAAkD;QAClD,IAAI,IAAI,CAAC,MAAM,GAAG,UAAU,EAAE,CAAC;YAC7B,MAAM,YAAY,GAAG,IAAA,+BAAwB,GAAE,CAAC;YAChD,MAAM,IAAI,KAAK,CACb,YAAY,CAAC,SAAS,CACpB,2BAAoB,EACpB,yBAAkB,CAAC,qBAAqB,CACzC,CACF,CAAC;QACJ,CAAC;QAED,MAAM,EAAE,GAAG,IAAA,oBAAW,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACpC,MAAM,MAAM,GAAG,IAAA,uBAAc,EAAC,IAAI,CAAC,6BAA6B,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;QAE3E,IAAI,GAAG,EAAE,CAAC;YACR,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QACrB,CAAC;QAED,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC;QACvE,MAAM,GAAG,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;QAEhC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,gBAAgB,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,SAAS,EAAE,GAAG,CAAC,CAAC,CAAC;YACzD,OAAO,EAAE,SAAS,EAAE,gBAAgB,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC;QACjD,CAAC;QAED,OAAO;YACL,SAAS,EAAE,SAAS;YACpB,EAAE,EAAE,EAAE;YACN,GAAG,EAAE,GAAG;SACT,CAAC;IACJ,CAAC;IAED;;;;;OAKG;IACI,0BAA0B,CAC/B,aAAqB,EACrB,OAAe;QAEf,OAAO,MAAM,CAAC,MAAM,CAAC,CAAC,aAAa,EAAE,OAAO,CAAC,CAAC,CAAC;IACjD,CAAC;IAED;;;;;OAKG;IACI,yBAAyB,CAC9B,EAAU,EACV,oBAA4B;QAE5B,OAAO,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,EAAE,oBAAoB,CAAC,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;OAMG;IACI,4BAA4B,CACjC,EAAU,EACV,aAAqB,EACrB,OAAe;QAEf,MAAM,gBAAgB,GAAG,IAAI,CAAC,0BAA0B,CACtD,aAAa,EACb,OAAO,CACR,CAAC;QACF,OAAO,IAAI,CAAC,yBAAyB,CAAC,EAAE,EAAE,gBAAgB,CAAC,CAAC;IAC9D,CAAC;IAED;;;;;OAKG;IACI,kBAAkB,CACvB,YAAoB,EACpB,aAAsB,IAAI;QAE1B,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAAC;QAC7B,MAAM,SAAS,GAAG,QAAQ,GAAG,CAAC,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAEnD,IAAI,YAAY,CAAC,MAAM,GAAG,SAAS,EAAE,CAAC;YACpC,MAAM,YAAY,GAAG,IAAA,+BAAwB,GAAE,CAAC;YAEhD,MAAM,IAAI,KAAK,CACb,YAAY,CAAC,SAAS,CACpB,2BAAoB,EACpB,yBAAkB,CAAC,0BAA0B,CAC9C,CACF,CAAC;QACJ,CAAC;QAED,MAAM,EAAE,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC;QAC9C,MAAM,oBAAoB,GAAG,YAAY,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAE7D,OAAO,EAAE,EAAE,EAAE,oBAAoB,EAAE,CAAC;IACtC,CAAC;IAED;;;;;;;OAOG;IACI,OAAO,CACZ,EAAU,EACV,aAAqB,EACrB,GAAW;IACX,6DAA6D;IAC7D,WAAoB,KAAK,EACzB,GAAY;QAEZ,4EAA4E;QAC5E,MAAM,iBAAiB,GAAG,IAAI,CAAC,OAAO,GAAG,CAAC,CAAC;QAC3C,IAAI,GAAG,CAAC,MAAM,KAAK,iBAAiB,EAAE,CAAC;YACrC,MAAM,YAAY,GAAG,IAAA,+BAAwB,GAAE,CAAC;YAChD,MAAM,IAAI,KAAK,CACb,YAAY,CAAC,SAAS,CACpB,2BAAoB,EACpB,yBAAkB,CAAC,yBAAyB,CAC7C,CACF,CAAC;QACJ,CAAC;QAED,wCAAwC;QACxC,IAAI,EAAE,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;YACrB,MAAM,YAAY,GAAG,IAAA,+BAAwB,GAAE,CAAC;YAChD,MAAM,IAAI,KAAK,CACb,YAAY,CAAC,SAAS,CACpB,2BAAoB,EACpB,yBAAkB,CAAC,qBAAqB,CACzC,CACF,CAAC;QACJ,CAAC;QAED,4CAA4C;QAC5C,IAAI,aAAa,KAAK,IAAI,IAAI,aAAa,KAAK,SAAS,EAAE,CAAC;YAC1D,MAAM,YAAY,GAAG,IAAA,+BAAwB,GAAE,CAAC;YAChD,MAAM,IAAI,KAAK,CACb,YAAY,CAAC,SAAS,CACpB,2BAAoB,EACpB,yBAAkB,CAAC,4BAA4B,CAChD,CACF,CAAC;QACJ,CAAC;QAED,IAAI,aAAa,CAAC,MAAM,GAAG,UAAU,EAAE,CAAC;YACtC,MAAM,YAAY,GAAG,IAAA,+BAAwB,GAAE,CAAC;YAChD,MAAM,IAAI,KAAK,CACb,YAAY,CAAC,SAAS,CACpB,2BAAoB,EACpB,yBAAkB,CAAC,qBAAqB,CACzC,CACF,CAAC;QACJ,CAAC;QAED,MAAM,QAAQ,GAAG,IAAA,yBAAgB,EAC/B,IAAI,CAAC,6BAA6B,EAClC,GAAG,EACH,EAAE,CACH,CAAC;QAEF,IAAI,GAAG,EAAE,CAAC;YACR,QAAQ,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;QACvB,CAAC;QAED,MAAM,SAAS,GAAG,EAAE,CAAC;QACrB,MAAM,GAAG,GAAG,aAAa,CAAC,QAAQ,CAAC,CAAC,SAAS,CAAC,CAAC;QAC/C,MAAM,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,CAAC,EAAE,CAAC,SAAS,CAAC,CAAC;QAEzD,QAAQ,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;QAEzB,OAAO,MAAM,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,UAAU,CAAC,EAAE,QAAQ,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC;IACxE,CAAC;CACF;AA1PD,sCA0PC"}
@@ -0,0 +1,15 @@
1
+ import { IEncryptedChunk } from '../interfaces/encrypted-chunk';
2
+ import { ECIESService } from './ecies/service';
3
+ export declare class ChunkProcessor {
4
+ private readonly ecies;
5
+ constructor(ecies: ECIESService);
6
+ encryptChunk(data: Buffer, publicKey: Buffer, chunkIndex: number, isLast: boolean, includeChecksums?: boolean): Promise<IEncryptedChunk>;
7
+ decryptChunk(chunkData: Buffer, privateKey: Buffer): Promise<{
8
+ data: Buffer;
9
+ header: {
10
+ index: number;
11
+ flags: number;
12
+ };
13
+ }>;
14
+ }
15
+ //# sourceMappingURL=chunk-processor.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"chunk-processor.d.ts","sourceRoot":"","sources":["../../../../../packages/digitaldefiance-node-ecies-lib/src/services/chunk-processor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAEhE,OAAO,EAAE,YAAY,EAAE,MAAM,iBAAiB,CAAC;AAE/C,qBAAa,cAAc;IACb,OAAO,CAAC,QAAQ,CAAC,KAAK;gBAAL,KAAK,EAAE,YAAY;IAEnC,YAAY,CACvB,IAAI,EAAE,MAAM,EACZ,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,MAAM,EAAE,OAAO,EACf,gBAAgB,GAAE,OAAe,GAChC,OAAO,CAAC,eAAe,CAAC;IAkBd,YAAY,CACvB,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,GACjB,OAAO,CAAC;QAAE,IAAI,EAAE,MAAM,CAAC;QAAC,MAAM,EAAE;YAAE,KAAK,EAAE,MAAM,CAAC;YAAC,KAAK,EAAE,MAAM,CAAA;SAAE,CAAA;KAAE,CAAC;CAiBvE"}
@@ -0,0 +1,36 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.ChunkProcessor = void 0;
4
+ class ChunkProcessor {
5
+ ecies;
6
+ constructor(ecies) {
7
+ this.ecies = ecies;
8
+ }
9
+ async encryptChunk(data, publicKey, chunkIndex, isLast, includeChecksums = false) {
10
+ const encrypted = this.ecies.encryptSimpleOrSingle(false, publicKey, data);
11
+ // Prepend chunk header: 4 bytes index + 1 byte flags
12
+ const header = Buffer.alloc(5);
13
+ header.writeUInt32BE(chunkIndex, 0);
14
+ header.writeUInt8(isLast ? 1 : 0, 4);
15
+ const dataWithHeader = Buffer.concat([header, encrypted]);
16
+ return {
17
+ index: chunkIndex,
18
+ data: dataWithHeader,
19
+ isLast,
20
+ metadata: includeChecksums ? { totalChunks: chunkIndex + 1 } : undefined,
21
+ };
22
+ }
23
+ async decryptChunk(chunkData, privateKey) {
24
+ // Extract chunk header: 4 bytes index + 1 byte flags
25
+ const index = chunkData.readUInt32BE(0);
26
+ const flags = chunkData.readUInt8(4);
27
+ const encrypted = chunkData.subarray(5);
28
+ const decrypted = this.ecies.decryptSimpleOrSingleWithHeader(false, privateKey, encrypted);
29
+ return {
30
+ data: decrypted,
31
+ header: { index, flags },
32
+ };
33
+ }
34
+ }
35
+ exports.ChunkProcessor = ChunkProcessor;
36
+ //# sourceMappingURL=chunk-processor.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"chunk-processor.js","sourceRoot":"","sources":["../../../../../packages/digitaldefiance-node-ecies-lib/src/services/chunk-processor.ts"],"names":[],"mappings":";;;AAIA,MAAa,cAAc;IACI;IAA7B,YAA6B,KAAmB;QAAnB,UAAK,GAAL,KAAK,CAAc;IAAG,CAAC;IAE7C,KAAK,CAAC,YAAY,CACvB,IAAY,EACZ,SAAiB,EACjB,UAAkB,EAClB,MAAe,EACf,mBAA4B,KAAK;QAEjC,MAAM,SAAS,GAAG,IAAI,CAAC,KAAK,CAAC,qBAAqB,CAAC,KAAK,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC;QAE3E,qDAAqD;QACrD,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,CAAC,aAAa,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC;QACpC,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QAErC,MAAM,cAAc,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC,CAAC;QAE1D,OAAO;YACL,KAAK,EAAE,UAAU;YACjB,IAAI,EAAE,cAAc;YACpB,MAAM;YACN,QAAQ,EAAE,gBAAgB,CAAC,CAAC,CAAC,EAAE,WAAW,EAAE,UAAU,GAAG,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS;SACzE,CAAC;IACJ,CAAC;IAEM,KAAK,CAAC,YAAY,CACvB,SAAiB,EACjB,UAAkB;QAElB,qDAAqD;QACrD,MAAM,KAAK,GAAG,SAAS,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;QACxC,MAAM,KAAK,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC;QACrC,MAAM,SAAS,GAAG,SAAS,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;QAExC,MAAM,SAAS,GAAG,IAAI,CAAC,KAAK,CAAC,+BAA+B,CAC1D,KAAK,EACL,UAAU,EACV,SAAS,CACV,CAAC;QAEF,OAAO;YACL,IAAI,EAAE,SAAS;YACf,MAAM,EAAE,EAAE,KAAK,EAAE,KAAK,EAAE;SACzB,CAAC;IACJ,CAAC;CACF;AA/CD,wCA+CC"}
@@ -0,0 +1,104 @@
1
+ import { IECIESConfig, IECIESConstants, SecureString } from '@digitaldefiance/ecies-lib';
2
+ import { Wallet } from '@ethereumjs/wallet';
3
+ import { ISimpleKeyPairBuffer } from '../../interfaces/simple-keypair-buffer';
4
+ import { IWalletSeed } from '../../interfaces/wallet-seed';
5
+ /**
6
+ * Core encryption and decryption functions for ECIES
7
+ * Includes coverage for simple and single modes, does not cover multiple mode which is in a separate module
8
+ */
9
+ export declare class EciesCryptoCore {
10
+ protected readonly _config: IECIESConfig;
11
+ protected readonly _consts: IECIESConstants;
12
+ get config(): IECIESConfig;
13
+ get consts(): IECIESConstants;
14
+ constructor(config: IECIESConfig, eciesParams?: IECIESConstants);
15
+ /**
16
+ * Validates and normalizes a public key for ECIES operations
17
+ * @param publicKey The public key to normalize
18
+ * @returns Properly formatted public key
19
+ */
20
+ normalizePublicKey(publicKey: Buffer): Buffer;
21
+ /**
22
+ * Generate a new mnemonic
23
+ * @returns {SecureString} The new mnemonic
24
+ */
25
+ generateNewMnemonic(): SecureString;
26
+ /**
27
+ * Generate a new wallet from a seed
28
+ * @param seed {Buffer} The seed to generate the wallet from
29
+ * @returns {Wallet} The new wallet
30
+ */
31
+ walletFromSeed(seed: Buffer): Wallet;
32
+ /**
33
+ * Generate a new wallet and seed from a mnemonic
34
+ * @param mnemonic {SecureString} The mnemonic to generate the wallet and seed from
35
+ * @returns {IWalletSeed} The new wallet and seed
36
+ */
37
+ walletAndSeedFromMnemonic(mnemonic: SecureString): IWalletSeed;
38
+ /**
39
+ * Generate a new wallet and seed from a mnemonic
40
+ * @param wallet {Wallet} The wallet to generate the key pair from
41
+ * @returns {ISimpleKeyPairBuffer} The new key pair
42
+ */
43
+ walletToSimpleKeyPairBuffer(wallet: Wallet): ISimpleKeyPairBuffer;
44
+ /**
45
+ * Create a simple key pair from a seed
46
+ * @param seed {Buffer} The seed to generate the key pair from
47
+ * @returns {ISimpleKeyPairBuffer} The new key pair
48
+ */
49
+ seedToSimpleKeyPairBuffer(seed: Buffer): ISimpleKeyPairBuffer;
50
+ /**
51
+ * Create a simple key pair from a mnemonic
52
+ * @param mnemonic {SecureString} The mnemonic to generate the key pair from
53
+ * @returns {ISimpleKeyPairBuffer} The new key pair
54
+ */
55
+ mnemonicToSimpleKeyPairBuffer(mnemonic: SecureString): ISimpleKeyPairBuffer;
56
+ /**
57
+ * Generate a random private key
58
+ * @returns {Buffer} The new private key
59
+ */
60
+ generatePrivateKey(): Buffer;
61
+ /**
62
+ * Get public key from private key
63
+ * @param privateKey {Buffer} The private key
64
+ * @returns {Buffer} The public key
65
+ */
66
+ getPublicKey(privateKey: Buffer): Buffer;
67
+ /**
68
+ * Generate ephemeral key pair for ECIES
69
+ * @returns {Promise<ISimpleKeyPairBuffer>} The key pair
70
+ */
71
+ generateEphemeralKeyPair(): Promise<{
72
+ privateKey: Buffer;
73
+ publicKey: Buffer;
74
+ }>;
75
+ /**
76
+ * Compute ECDH shared secret
77
+ * @param privateKey {Buffer} The private key
78
+ * @param publicKey {Buffer} The public key
79
+ * @returns {Buffer} The shared secret
80
+ */
81
+ computeSharedSecret(privateKey: Buffer, publicKey: Buffer): Buffer;
82
+ /**
83
+ * Derive a symmetric key from a shared secret using HKDF
84
+ * @param sharedSecret The shared secret (ECDH output)
85
+ * @param salt Optional salt
86
+ * @param info Optional context info
87
+ * @param length Length of the output key (default 32 for AES-256)
88
+ */
89
+ deriveSharedKey(sharedSecret: Buffer, salt?: Buffer, info?: Buffer, length?: number): Buffer;
90
+ /**
91
+ * Sign a message using ECDSA
92
+ * @param privateKey The private key to sign with
93
+ * @param message The message to sign
94
+ */
95
+ sign(privateKey: Buffer, message: Buffer): Buffer;
96
+ /**
97
+ * Verify a signature using ECDSA
98
+ * @param publicKey The public key to verify with
99
+ * @param message The message that was signed
100
+ * @param signature The signature to verify
101
+ */
102
+ verify(publicKey: Buffer, message: Buffer, signature: Buffer): boolean;
103
+ }
104
+ //# sourceMappingURL=crypto-core.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"crypto-core.d.ts","sourceRoot":"","sources":["../../../../../../packages/digitaldefiance-node-ecies-lib/src/services/ecies/crypto-core.ts"],"names":[],"mappings":"AAIA,OAAO,EAGL,YAAY,EACZ,eAAe,EAEf,YAAY,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAS,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAUnD,OAAO,EAAE,oBAAoB,EAAE,MAAM,wCAAwC,CAAC;AAC9E,OAAO,EAAE,WAAW,EAAE,MAAM,8BAA8B,CAAC;AAE3D;;;GAGG;AACH,qBAAa,eAAe;IAC1B,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,YAAY,CAAC;IACzC,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,eAAe,CAAC;IAC5C,IAAW,MAAM,IAAI,YAAY,CAEhC;IAED,IAAW,MAAM,IAAI,eAAe,CAEnC;gBAGC,MAAM,EAAE,YAAY,EACpB,WAAW,GAAE,eAAiC;IAMhD;;;;OAIG;IACI,kBAAkB,CAAC,SAAS,EAAE,MAAM,GAAG,MAAM;IAsEpD;;;OAGG;IACI,mBAAmB,IAAI,YAAY;IAI1C;;;;OAIG;IACI,cAAc,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM;IAO3C;;;;OAIG;IACI,yBAAyB,CAAC,QAAQ,EAAE,YAAY,GAAG,WAAW;IAcrE;;;;OAIG;IACI,2BAA2B,CAAC,MAAM,EAAE,MAAM,GAAG,oBAAoB;IAUxE;;;;OAIG;IACI,yBAAyB,CAAC,IAAI,EAAE,MAAM,GAAG,oBAAoB;IAKpE;;;;OAIG;IACI,6BAA6B,CAClC,QAAQ,EAAE,YAAY,GACrB,oBAAoB;IAKvB;;;OAGG;IACI,kBAAkB,IAAI,MAAM;IAInC;;;;OAIG;IACI,YAAY,CAAC,UAAU,EAAE,MAAM,GAAG,MAAM;IAS/C;;;OAGG;IACU,wBAAwB,IAAI,OAAO,CAAC;QAC/C,UAAU,EAAE,MAAM,CAAC;QACnB,SAAS,EAAE,MAAM,CAAC;KACnB,CAAC;IAMF;;;;;OAKG;IACI,mBAAmB,CAAC,UAAU,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,GAAG,MAAM;IAuBzE;;;;;;OAMG;IACI,eAAe,CACpB,YAAY,EAAE,MAAM,EACpB,IAAI,GAAE,MAAwB,EAC9B,IAAI,GAAE,MAAwB,EAC9B,MAAM,GAAE,MAAW,GAClB,MAAM;IAIT;;;;OAIG;IACI,IAAI,CAAC,UAAU,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,GAAG,MAAM;IAMxD;;;;;OAKG;IACI,MAAM,CACX,SAAS,EAAE,MAAM,EACjB,OAAO,EAAE,MAAM,EACf,SAAS,EAAE,MAAM,GAChB,OAAO;CAQX"}
@@ -0,0 +1,234 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.EciesCryptoCore = void 0;
4
+ /* eslint-disable @typescript-eslint/no-unsafe-assignment */
5
+ /* eslint-disable @typescript-eslint/no-unsafe-argument */
6
+ const crypto_1 = require("crypto");
7
+ const ecies_lib_1 = require("@digitaldefiance/ecies-lib");
8
+ const wallet_1 = require("@ethereumjs/wallet");
9
+ const bip39_1 = require("bip39");
10
+ const secp256k1_js_1 = require("ethereum-cryptography/secp256k1.js");
11
+ const constants_1 = require("../../constants");
12
+ const ecies_i18n_factory_1 = require("../../i18n/ecies-i18n-factory");
13
+ /**
14
+ * Core encryption and decryption functions for ECIES
15
+ * Includes coverage for simple and single modes, does not cover multiple mode which is in a separate module
16
+ */
17
+ class EciesCryptoCore {
18
+ _config;
19
+ _consts;
20
+ get config() {
21
+ return this._config;
22
+ }
23
+ get consts() {
24
+ return this._consts;
25
+ }
26
+ constructor(config, eciesParams = constants_1.Constants.ECIES) {
27
+ this._config = config;
28
+ this._consts = eciesParams;
29
+ }
30
+ /**
31
+ * Validates and normalizes a public key for ECIES operations
32
+ * @param publicKey The public key to normalize
33
+ * @returns Properly formatted public key
34
+ */
35
+ normalizePublicKey(publicKey) {
36
+ if (!publicKey) {
37
+ const pluginEngine = (0, ecies_i18n_factory_1.getEciesPluginI18nEngine)();
38
+ throw new ecies_lib_1.ECIESError(ecies_lib_1.ECIESErrorTypeEnum.InvalidEphemeralPublicKey, undefined, undefined, {
39
+ error: pluginEngine.translate(ecies_i18n_factory_1.NodeEciesComponentId, ecies_i18n_factory_1.NodeEciesStringKey.Error_InvalidPublicKey),
40
+ });
41
+ }
42
+ const keyLength = publicKey.length;
43
+ // console.log('[normalizePublicKey] Magic:', this._consts.PUBLIC_KEY_MAGIC);
44
+ // Check for compressed key (33 bytes, starts with 0x02 or 0x03)
45
+ if (keyLength === 33 && (publicKey[0] === 0x02 || publicKey[0] === 0x03)) {
46
+ return publicKey;
47
+ }
48
+ // Check for uncompressed key (65 bytes, starts with 0x04)
49
+ if (keyLength === 65 && publicKey[0] === 0x04) {
50
+ return publicKey;
51
+ }
52
+ // Raw key without prefix (64 bytes) - add the 0x04 prefix
53
+ if (keyLength === 64) {
54
+ return Buffer.concat([Buffer.from([0x04]), publicKey]);
55
+ }
56
+ // Raw key without prefix (32 bytes) - add the 0x02 prefix (assuming even Y)
57
+ // Note: This is ambiguous for compressed keys as we don't know Y parity.
58
+ // But if we assume it's a raw X coordinate, we might default to 0x02?
59
+ // Actually, RAW_PUBLIC_KEY_LENGTH is 32.
60
+ if (keyLength === this._consts.RAW_PUBLIC_KEY_LENGTH) {
61
+ // If we only have X, we can't fully reconstruct without knowing Y parity.
62
+ // But maybe the intention of RAW_PUBLIC_KEY_LENGTH was for uncompressed without prefix (64 bytes)?
63
+ // The constants say RAW_PUBLIC_KEY_LENGTH = 32.
64
+ // So it expects X coordinate only.
65
+ // We can try to prepend 0x02.
66
+ return Buffer.concat([
67
+ Buffer.from([this._consts.PUBLIC_KEY_MAGIC]),
68
+ publicKey,
69
+ ]);
70
+ }
71
+ const pluginEngine = (0, ecies_i18n_factory_1.getEciesPluginI18nEngine)();
72
+ // Invalid format
73
+ throw new ecies_lib_1.ECIESError(ecies_lib_1.ECIESErrorTypeEnum.InvalidEphemeralPublicKey, undefined, undefined, {
74
+ error: pluginEngine.translate(ecies_i18n_factory_1.NodeEciesComponentId, ecies_i18n_factory_1.NodeEciesStringKey.Error_InvalidPublicKeyFormat),
75
+ keyLength: String(keyLength),
76
+ expectedLength64: String(this._consts.RAW_PUBLIC_KEY_LENGTH),
77
+ expectedLength65: String(this._consts.PUBLIC_KEY_LENGTH),
78
+ keyPrefix: keyLength > 0 ? String(publicKey[0]) : 'N/A',
79
+ expectedPrefix: String(this._consts.PUBLIC_KEY_MAGIC),
80
+ });
81
+ }
82
+ /**
83
+ * Generate a new mnemonic
84
+ * @returns {SecureString} The new mnemonic
85
+ */
86
+ generateNewMnemonic() {
87
+ return new ecies_lib_1.SecureString((0, bip39_1.generateMnemonic)(this._config.mnemonicStrength));
88
+ }
89
+ /**
90
+ * Generate a new wallet from a seed
91
+ * @param seed {Buffer} The seed to generate the wallet from
92
+ * @returns {Wallet} The new wallet
93
+ */
94
+ walletFromSeed(seed) {
95
+ const hdWallet = wallet_1.hdkey.EthereumHDKey.fromMasterSeed(seed);
96
+ return hdWallet
97
+ .derivePath(this._config.primaryKeyDerivationPath)
98
+ .getWallet();
99
+ }
100
+ /**
101
+ * Generate a new wallet and seed from a mnemonic
102
+ * @param mnemonic {SecureString} The mnemonic to generate the wallet and seed from
103
+ * @returns {IWalletSeed} The new wallet and seed
104
+ */
105
+ walletAndSeedFromMnemonic(mnemonic) {
106
+ if (!mnemonic.value || !(0, bip39_1.validateMnemonic)(mnemonic.value)) {
107
+ throw new ecies_lib_1.ECIESError(ecies_lib_1.ECIESErrorTypeEnum.InvalidMnemonic);
108
+ }
109
+ const seed = (0, bip39_1.mnemonicToSeedSync)(mnemonic.value);
110
+ const wallet = this.walletFromSeed(seed);
111
+ return {
112
+ seed: new ecies_lib_1.SecureBuffer(seed),
113
+ wallet,
114
+ };
115
+ }
116
+ /**
117
+ * Generate a new wallet and seed from a mnemonic
118
+ * @param wallet {Wallet} The wallet to generate the key pair from
119
+ * @returns {ISimpleKeyPairBuffer} The new key pair
120
+ */
121
+ walletToSimpleKeyPairBuffer(wallet) {
122
+ const privateKey = Buffer.from(wallet.getPrivateKey());
123
+ const publicKey = this.getPublicKey(privateKey);
124
+ return {
125
+ privateKey,
126
+ publicKey,
127
+ };
128
+ }
129
+ /**
130
+ * Create a simple key pair from a seed
131
+ * @param seed {Buffer} The seed to generate the key pair from
132
+ * @returns {ISimpleKeyPairBuffer} The new key pair
133
+ */
134
+ seedToSimpleKeyPairBuffer(seed) {
135
+ const wallet = this.walletFromSeed(seed);
136
+ return this.walletToSimpleKeyPairBuffer(wallet);
137
+ }
138
+ /**
139
+ * Create a simple key pair from a mnemonic
140
+ * @param mnemonic {SecureString} The mnemonic to generate the key pair from
141
+ * @returns {ISimpleKeyPairBuffer} The new key pair
142
+ */
143
+ mnemonicToSimpleKeyPairBuffer(mnemonic) {
144
+ const { seed } = this.walletAndSeedFromMnemonic(mnemonic);
145
+ return this.seedToSimpleKeyPairBuffer(Buffer.from(seed.value));
146
+ }
147
+ /**
148
+ * Generate a random private key
149
+ * @returns {Buffer} The new private key
150
+ */
151
+ generatePrivateKey() {
152
+ return Buffer.from(secp256k1_js_1.secp256k1.utils.randomPrivateKey());
153
+ }
154
+ /**
155
+ * Get public key from private key
156
+ * @param privateKey {Buffer} The private key
157
+ * @returns {Buffer} The public key
158
+ */
159
+ getPublicKey(privateKey) {
160
+ // Security fix 2: Private key validation
161
+ if (privateKey.every((byte) => byte === 0)) {
162
+ throw new ecies_lib_1.ECIESError(ecies_lib_1.ECIESErrorTypeEnum.PrivateKeyNotLoaded);
163
+ }
164
+ const publicKey = secp256k1_js_1.secp256k1.getPublicKey(privateKey, true);
165
+ return Buffer.from(publicKey);
166
+ }
167
+ /**
168
+ * Generate ephemeral key pair for ECIES
169
+ * @returns {Promise<ISimpleKeyPairBuffer>} The key pair
170
+ */
171
+ async generateEphemeralKeyPair() {
172
+ const privateKey = this.generatePrivateKey();
173
+ const publicKey = this.getPublicKey(privateKey);
174
+ return { privateKey, publicKey };
175
+ }
176
+ /**
177
+ * Compute ECDH shared secret
178
+ * @param privateKey {Buffer} The private key
179
+ * @param publicKey {Buffer} The public key
180
+ * @returns {Buffer} The shared secret
181
+ */
182
+ computeSharedSecret(privateKey, publicKey) {
183
+ // Security fix 1: Public key validation (check normalized key)
184
+ const normalizedKey = this.normalizePublicKey(publicKey);
185
+ const isAllZeros = normalizedKey.slice(1).every((byte) => byte === 0);
186
+ if (isAllZeros) {
187
+ throw new ecies_lib_1.ECIESError(ecies_lib_1.ECIESErrorTypeEnum.InvalidRecipientPublicKey);
188
+ }
189
+ const sharedSecret = secp256k1_js_1.secp256k1.getSharedSecret(privateKey, normalizedKey, true);
190
+ const secret = Buffer.from(sharedSecret.slice(1)); // Remove the 0x02/0x03 prefix
191
+ // Security fix 3: Shared secret validation
192
+ if (secret.every((byte) => byte === 0)) {
193
+ throw new ecies_lib_1.ECIESError(ecies_lib_1.ECIESErrorTypeEnum.SecretComputationFailed);
194
+ }
195
+ return secret;
196
+ }
197
+ /**
198
+ * Derive a symmetric key from a shared secret using HKDF
199
+ * @param sharedSecret The shared secret (ECDH output)
200
+ * @param salt Optional salt
201
+ * @param info Optional context info
202
+ * @param length Length of the output key (default 32 for AES-256)
203
+ */
204
+ deriveSharedKey(sharedSecret, salt = Buffer.alloc(0), info = Buffer.alloc(0), length = 32) {
205
+ return Buffer.from((0, crypto_1.hkdfSync)('sha256', sharedSecret, salt, info, length));
206
+ }
207
+ /**
208
+ * Sign a message using ECDSA
209
+ * @param privateKey The private key to sign with
210
+ * @param message The message to sign
211
+ */
212
+ sign(privateKey, message) {
213
+ const hash = (0, crypto_1.createHash)('sha256').update(message).digest();
214
+ const signature = secp256k1_js_1.secp256k1.sign(hash, privateKey);
215
+ return Buffer.from(signature.toCompactRawBytes());
216
+ }
217
+ /**
218
+ * Verify a signature using ECDSA
219
+ * @param publicKey The public key to verify with
220
+ * @param message The message that was signed
221
+ * @param signature The signature to verify
222
+ */
223
+ verify(publicKey, message, signature) {
224
+ const hash = (0, crypto_1.createHash)('sha256').update(message).digest();
225
+ try {
226
+ return secp256k1_js_1.secp256k1.verify(signature, hash, publicKey);
227
+ }
228
+ catch {
229
+ return false;
230
+ }
231
+ }
232
+ }
233
+ exports.EciesCryptoCore = EciesCryptoCore;
234
+ //# sourceMappingURL=crypto-core.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"crypto-core.js","sourceRoot":"","sources":["../../../../../../packages/digitaldefiance-node-ecies-lib/src/services/ecies/crypto-core.ts"],"names":[],"mappings":";;;AAAA,4DAA4D;AAC5D,0DAA0D;AAC1D,mCAA8C;AAE9C,0DAOoC;AACpC,+CAAmD;AACnD,iCAA+E;AAC/E,qEAA+D;AAE/D,+CAA4C;AAC5C,sEAIuC;AAIvC;;;GAGG;AACH,MAAa,eAAe;IACP,OAAO,CAAe;IACtB,OAAO,CAAkB;IAC5C,IAAW,MAAM;QACf,OAAO,IAAI,CAAC,OAAO,CAAC;IACtB,CAAC;IAED,IAAW,MAAM;QACf,OAAO,IAAI,CAAC,OAAO,CAAC;IACtB,CAAC;IAED,YACE,MAAoB,EACpB,cAA+B,qBAAS,CAAC,KAAK;QAE9C,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,WAAW,CAAC;IAC7B,CAAC;IAED;;;;OAIG;IACI,kBAAkB,CAAC,SAAiB;QACzC,IAAI,CAAC,SAAS,EAAE,CAAC;YACf,MAAM,YAAY,GAAG,IAAA,6CAAwB,GAAE,CAAC;YAChD,MAAM,IAAI,sBAAU,CAClB,8BAAkB,CAAC,yBAAyB,EAC5C,SAAS,EACT,SAAS,EACT;gBACE,KAAK,EAAE,YAAY,CAAC,SAAS,CAC3B,yCAAoB,EACpB,uCAAkB,CAAC,sBAAsB,CAC1C;aACF,CACF,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,SAAS,CAAC,MAAM,CAAC;QACnC,6EAA6E;QAE7E,gEAAgE;QAChE,IAAI,SAAS,KAAK,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,SAAS,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,EAAE,CAAC;YACzE,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,0DAA0D;QAC1D,IAAI,SAAS,KAAK,EAAE,IAAI,SAAS,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;YAC9C,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,0DAA0D;QAC1D,IAAI,SAAS,KAAK,EAAE,EAAE,CAAC;YACrB,OAAO,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC,CAAC;QACzD,CAAC;QAED,4EAA4E;QAC5E,yEAAyE;QACzE,sEAAsE;QACtE,yCAAyC;QACzC,IAAI,SAAS,KAAK,IAAI,CAAC,OAAO,CAAC,qBAAqB,EAAE,CAAC;YACrD,0EAA0E;YAC1E,mGAAmG;YACnG,gDAAgD;YAChD,mCAAmC;YACnC,8BAA8B;YAC9B,OAAO,MAAM,CAAC,MAAM,CAAC;gBACnB,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;gBAC5C,SAAS;aACV,CAAC,CAAC;QACL,CAAC;QAED,MAAM,YAAY,GAAG,IAAA,6CAAwB,GAAE,CAAC;QAChD,iBAAiB;QACjB,MAAM,IAAI,sBAAU,CAClB,8BAAkB,CAAC,yBAAyB,EAC5C,SAAS,EACT,SAAS,EACT;YACE,KAAK,EAAE,YAAY,CAAC,SAAS,CAC3B,yCAAoB,EACpB,uCAAkB,CAAC,4BAA4B,CAChD;YACD,SAAS,EAAE,MAAM,CAAC,SAAS,CAAC;YAC5B,gBAAgB,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,qBAAqB,CAAC;YAC5D,gBAAgB,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,iBAAiB,CAAC;YACxD,SAAS,EAAE,SAAS,GAAG,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,KAAK;YACvD,cAAc,EAAE,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,gBAAgB,CAAC;SACtD,CACF,CAAC;IACJ,CAAC;IAED;;;OAGG;IACI,mBAAmB;QACxB,OAAO,IAAI,wBAAY,CAAC,IAAA,wBAAgB,EAAC,IAAI,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;IAC3E,CAAC;IAED;;;;OAIG;IACI,cAAc,CAAC,IAAY;QAChC,MAAM,QAAQ,GAAG,cAAK,CAAC,aAAa,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QAC1D,OAAO,QAAQ;aACZ,UAAU,CAAC,IAAI,CAAC,OAAO,CAAC,wBAAwB,CAAC;aACjD,SAAS,EAAE,CAAC;IACjB,CAAC;IAED;;;;OAIG;IACI,yBAAyB,CAAC,QAAsB;QACrD,IAAI,CAAC,QAAQ,CAAC,KAAK,IAAI,CAAC,IAAA,wBAAgB,EAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;YACzD,MAAM,IAAI,sBAAU,CAAC,8BAAkB,CAAC,eAAe,CAAC,CAAC;QAC3D,CAAC;QAED,MAAM,IAAI,GAAG,IAAA,0BAAkB,EAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;QAChD,MAAM,MAAM,GAAG,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QAEzC,OAAO;YACL,IAAI,EAAE,IAAI,wBAAY,CAAC,IAAI,CAAC;YAC5B,MAAM;SACP,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACI,2BAA2B,CAAC,MAAc;QAC/C,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,CAAC;QACvD,MAAM,SAAS,GAAG,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC,CAAC;QAEhD,OAAO;YACL,UAAU;YACV,SAAS;SACV,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACI,yBAAyB,CAAC,IAAY;QAC3C,MAAM,MAAM,GAAG,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QACzC,OAAO,IAAI,CAAC,2BAA2B,CAAC,MAAM,CAAC,CAAC;IAClD,CAAC;IAED;;;;OAIG;IACI,6BAA6B,CAClC,QAAsB;QAEtB,MAAM,EAAE,IAAI,EAAE,GAAG,IAAI,CAAC,yBAAyB,CAAC,QAAQ,CAAC,CAAC;QAC1D,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;IACjE,CAAC;IAED;;;OAGG;IACI,kBAAkB;QACvB,OAAO,MAAM,CAAC,IAAI,CAAC,wBAAS,CAAC,KAAK,CAAC,gBAAgB,EAAE,CAAC,CAAC;IACzD,CAAC;IAED;;;;OAIG;IACI,YAAY,CAAC,UAAkB;QACpC,yCAAyC;QACzC,IAAI,UAAU,CAAC,KAAK,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,KAAK,CAAC,CAAC,EAAE,CAAC;YAC3C,MAAM,IAAI,sBAAU,CAAC,8BAAkB,CAAC,mBAAmB,CAAC,CAAC;QAC/D,CAAC;QACD,MAAM,SAAS,GAAG,wBAAS,CAAC,YAAY,CAAC,UAAU,EAAE,IAAI,CAAC,CAAC;QAC3D,OAAO,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAChC,CAAC;IAED;;;OAGG;IACI,KAAK,CAAC,wBAAwB;QAInC,MAAM,UAAU,GAAG,IAAI,CAAC,kBAAkB,EAAE,CAAC;QAC7C,MAAM,SAAS,GAAG,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC,CAAC;QAChD,OAAO,EAAE,UAAU,EAAE,SAAS,EAAE,CAAC;IACnC,CAAC;IAED;;;;;OAKG;IACI,mBAAmB,CAAC,UAAkB,EAAE,SAAiB;QAC9D,+DAA+D;QAC/D,MAAM,aAAa,GAAG,IAAI,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC;QACzD,MAAM,UAAU,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC;QACtE,IAAI,UAAU,EAAE,CAAC;YACf,MAAM,IAAI,sBAAU,CAAC,8BAAkB,CAAC,yBAAyB,CAAC,CAAC;QACrE,CAAC;QAED,MAAM,YAAY,GAAG,wBAAS,CAAC,eAAe,CAC5C,UAAU,EACV,aAAa,EACb,IAAI,CACL,CAAC;QACF,MAAM,MAAM,GAAG,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,8BAA8B;QAEjF,2CAA2C;QAC3C,IAAI,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,KAAK,CAAC,CAAC,EAAE,CAAC;YACvC,MAAM,IAAI,sBAAU,CAAC,8BAAkB,CAAC,uBAAuB,CAAC,CAAC;QACnE,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;;;;;OAMG;IACI,eAAe,CACpB,YAAoB,EACpB,OAAe,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,EAC9B,OAAe,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,EAC9B,SAAiB,EAAE;QAEnB,OAAO,MAAM,CAAC,IAAI,CAAC,IAAA,iBAAQ,EAAC,QAAQ,EAAE,YAAY,EAAE,IAAI,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;IAC3E,CAAC;IAED;;;;OAIG;IACI,IAAI,CAAC,UAAkB,EAAE,OAAe;QAC7C,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,CAAC;QAC3D,MAAM,SAAS,GAAG,wBAAS,CAAC,IAAI,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QACnD,OAAO,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,iBAAiB,EAAE,CAAC,CAAC;IACpD,CAAC;IAED;;;;;OAKG;IACI,MAAM,CACX,SAAiB,EACjB,OAAe,EACf,SAAiB;QAEjB,MAAM,IAAI,GAAG,IAAA,mBAAU,EAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,CAAC;QAC3D,IAAI,CAAC;YACH,OAAO,wBAAS,CAAC,MAAM,CAAC,SAAS,EAAE,IAAI,EAAE,SAAS,CAAC,CAAC;QACtD,CAAC;QAAC,MAAM,CAAC;YACP,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;CACF;AAvRD,0CAuRC"}
@@ -0,0 +1,30 @@
1
+ import { ECIESService } from './service';
2
+ interface ChunkedFileHeader {
3
+ version: number;
4
+ chunkSize: number;
5
+ totalChunks: number;
6
+ originalSize: number;
7
+ }
8
+ export declare class EciesFileService {
9
+ protected readonly eciesService: ECIESService;
10
+ protected readonly userPrivateKey: Buffer;
11
+ protected readonly config: {
12
+ chunkSize: number;
13
+ headerSize: number;
14
+ };
15
+ constructor(eciesService: ECIESService, userPrivateKey: Buffer, config?: {
16
+ chunkSize: number;
17
+ headerSize: number;
18
+ });
19
+ decryptFile(encryptedData: Buffer): Buffer;
20
+ encryptFileFromPath(filePath: string, recipientPublicKey: Buffer): Buffer;
21
+ decryptFileToPath(encryptedData: Buffer, outputPath: string): void;
22
+ protected serializeHeader(header: ChunkedFileHeader): Buffer;
23
+ protected deserializeHeader(data: Buffer): ChunkedFileHeader;
24
+ protected parseEncryptedFile(encryptedData: Buffer): {
25
+ header: ChunkedFileHeader;
26
+ chunks: Buffer[];
27
+ };
28
+ }
29
+ export {};
30
+ //# sourceMappingURL=file.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"file.d.ts","sourceRoot":"","sources":["../../../../../../packages/digitaldefiance-node-ecies-lib/src/services/ecies/file.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,YAAY,EAAE,MAAM,WAAW,CAAC;AAEzC,UAAU,iBAAiB;IACzB,OAAO,EAAE,MAAM,CAAC;IAChB,SAAS,EAAE,MAAM,CAAC;IAClB,WAAW,EAAE,MAAM,CAAC;IACpB,YAAY,EAAE,MAAM,CAAC;CACtB;AAED,qBAAa,gBAAgB;IAC3B,SAAS,CAAC,QAAQ,CAAC,YAAY,EAAE,YAAY,CAAC;IAC9C,SAAS,CAAC,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAC1C,SAAS,CAAC,QAAQ,CAAC,MAAM,EAAE;QAAE,SAAS,EAAE,MAAM,CAAC;QAAC,UAAU,EAAE,MAAM,CAAA;KAAE,CAAC;gBAGnE,YAAY,EAAE,YAAY,EAC1B,cAAc,EAAE,MAAM,EACtB,MAAM,GAAE;QAAE,SAAS,EAAE,MAAM,CAAC;QAAC,UAAU,EAAE,MAAM,CAAA;KAG9C;IAOH,WAAW,CAAC,aAAa,EAAE,MAAM,GAAG,MAAM;IAuB1C,mBAAmB,CAAC,QAAQ,EAAE,MAAM,EAAE,kBAAkB,EAAE,MAAM,GAAG,MAAM;IAyCzE,iBAAiB,CAAC,aAAa,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,GAAG,IAAI;IAwBlE,SAAS,CAAC,eAAe,CAAC,MAAM,EAAE,iBAAiB,GAAG,MAAM;IAS5D,SAAS,CAAC,iBAAiB,CAAC,IAAI,EAAE,MAAM,GAAG,iBAAiB;IAS5D,SAAS,CAAC,kBAAkB,CAAC,aAAa,EAAE,MAAM,GAAG;QACnD,MAAM,EAAE,iBAAiB,CAAC;QAC1B,MAAM,EAAE,MAAM,EAAE,CAAC;KAClB;CAiCF"}