@dxos/crypto 0.8.3 → 0.8.4-main.28f8d3d
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/lib/browser/index.mjs +23 -24
- package/dist/lib/browser/index.mjs.map +4 -4
- package/dist/lib/browser/meta.json +1 -1
- package/dist/lib/node-esm/index.mjs +15 -17
- package/dist/lib/node-esm/index.mjs.map +4 -4
- package/dist/lib/node-esm/meta.json +1 -1
- package/dist/types/src/index.d.ts +3 -3
- package/dist/types/src/index.d.ts.map +1 -1
- package/dist/types/src/keys.d.ts.map +1 -1
- package/dist/types/src/verify.d.ts.map +1 -1
- package/dist/types/tsconfig.tsbuildinfo +1 -1
- package/package.json +12 -9
- package/src/index.ts +3 -3
- package/src/keys.test.ts +1 -1
- package/src/keys.ts +1 -1
- package/src/uuid.ts +1 -1
- package/src/verify.ts +6 -4
- package/vendor/subtle.d.ts +3 -0
- package/dist/lib/node/index.cjs +0 -166
- package/dist/lib/node/index.cjs.map +0 -7
- package/dist/lib/node/meta.json +0 -1
- package/dist/types/src/browser/subtle.d.ts +0 -3
- package/dist/types/src/browser/subtle.d.ts.map +0 -1
- package/dist/types/src/subtle.d.ts +0 -4
- package/dist/types/src/subtle.d.ts.map +0 -1
- /package/{hypercore-crypto-stub.mjs → vendor/hypercore-crypto-stub.mjs} +0 -0
- /package/{src/browser/subtle.ts → vendor/subtle-browser.mjs} +0 -0
- /package/{src/subtle.ts → vendor/subtle-node.mjs} +0 -0
|
@@ -1,10 +1,13 @@
|
|
|
1
1
|
import "@dxos/node-std/globals";
|
|
2
2
|
|
|
3
|
-
//
|
|
3
|
+
// src/index.ts
|
|
4
|
+
export * from "#subtle";
|
|
5
|
+
|
|
6
|
+
// src/keys.ts
|
|
4
7
|
import { invariant } from "@dxos/invariant";
|
|
5
|
-
import {
|
|
6
|
-
import
|
|
7
|
-
var __dxlog_file = "/
|
|
8
|
+
import { PUBLIC_KEY_LENGTH, PublicKey, SECRET_KEY_LENGTH } from "@dxos/keys";
|
|
9
|
+
import crypto from "#hypercore-crypto";
|
|
10
|
+
var __dxlog_file = "/__w/dxos/dxos/packages/common/crypto/src/keys.ts";
|
|
8
11
|
var SIGNATURE_LENGTH = 64;
|
|
9
12
|
var createId = () => PublicKey.stringify(randomBytes(32));
|
|
10
13
|
var createKeyPair = (seed) => {
|
|
@@ -18,16 +21,16 @@ var createKeyPair = (seed) => {
|
|
|
18
21
|
"'Seedphrase too sort. Expecting length of 32.'"
|
|
19
22
|
]
|
|
20
23
|
});
|
|
21
|
-
return
|
|
24
|
+
return crypto.keyPair(seed.slice(0, 32));
|
|
22
25
|
}
|
|
23
|
-
return
|
|
26
|
+
return crypto.keyPair();
|
|
24
27
|
};
|
|
25
|
-
var validateKeyPair = (publicKey, secretKey) =>
|
|
28
|
+
var validateKeyPair = (publicKey, secretKey) => crypto.validateKeyPair({
|
|
26
29
|
publicKey: publicKey.asBuffer(),
|
|
27
30
|
secretKey
|
|
28
31
|
});
|
|
29
|
-
var discoveryKey = (key) =>
|
|
30
|
-
var randomBytes = (length = 32) =>
|
|
32
|
+
var discoveryKey = (key) => crypto.discoveryKey(PublicKey.from(key).asBuffer().slice(1));
|
|
33
|
+
var randomBytes = (length = 32) => crypto.randomBytes(length);
|
|
31
34
|
var sign = (message, secretKey) => {
|
|
32
35
|
invariant(Buffer.isBuffer(message), void 0, {
|
|
33
36
|
F: __dxlog_file,
|
|
@@ -47,7 +50,7 @@ var sign = (message, secretKey) => {
|
|
|
47
50
|
""
|
|
48
51
|
]
|
|
49
52
|
});
|
|
50
|
-
return
|
|
53
|
+
return crypto.sign(message, secretKey);
|
|
51
54
|
};
|
|
52
55
|
var verify = (message, signature, publicKey) => {
|
|
53
56
|
invariant(Buffer.isBuffer(message), void 0, {
|
|
@@ -77,19 +80,22 @@ var verify = (message, signature, publicKey) => {
|
|
|
77
80
|
""
|
|
78
81
|
]
|
|
79
82
|
});
|
|
80
|
-
return
|
|
83
|
+
return crypto.verify(message, signature, publicKey);
|
|
81
84
|
};
|
|
82
85
|
|
|
83
|
-
//
|
|
84
|
-
|
|
85
|
-
var
|
|
86
|
+
// src/uuid.ts
|
|
87
|
+
import { webcrypto } from "#subtle";
|
|
88
|
+
var randomUUID = () => {
|
|
89
|
+
return webcrypto.randomUUID();
|
|
90
|
+
};
|
|
86
91
|
|
|
87
|
-
//
|
|
92
|
+
// src/validator.ts
|
|
88
93
|
import { PublicKey as PublicKey2 } from "@dxos/keys";
|
|
89
94
|
import { verify as verify2 } from "#hypercore-crypto";
|
|
90
95
|
var getSignatureValidator = (publicKey) => (message, signature) => verify2(message, signature, PublicKey2.bufferize(publicKey));
|
|
91
96
|
|
|
92
|
-
//
|
|
97
|
+
// src/verify.ts
|
|
98
|
+
import { subtleCrypto } from "#subtle";
|
|
93
99
|
var verifySignature = async (key, message, signature, algorithm = {
|
|
94
100
|
name: "ECDSA",
|
|
95
101
|
namedCurve: "P-256"
|
|
@@ -107,11 +113,6 @@ var verifySignature = async (key, message, signature, algorithm = {
|
|
|
107
113
|
hash: "SHA-256"
|
|
108
114
|
}, publicKey, signature, message);
|
|
109
115
|
};
|
|
110
|
-
|
|
111
|
-
// packages/common/crypto/src/uuid.ts
|
|
112
|
-
var randomUUID = () => {
|
|
113
|
-
return webcrypto.randomUUID();
|
|
114
|
-
};
|
|
115
116
|
export {
|
|
116
117
|
SIGNATURE_LENGTH,
|
|
117
118
|
createId,
|
|
@@ -121,10 +122,8 @@ export {
|
|
|
121
122
|
randomBytes,
|
|
122
123
|
randomUUID,
|
|
123
124
|
sign,
|
|
124
|
-
subtleCrypto,
|
|
125
125
|
validateKeyPair,
|
|
126
126
|
verify,
|
|
127
|
-
verifySignature
|
|
128
|
-
webcrypto
|
|
127
|
+
verifySignature
|
|
129
128
|
};
|
|
130
129
|
//# sourceMappingURL=index.mjs.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
|
-
"sources": ["../../../src/
|
|
4
|
-
"sourcesContent": ["//\n// Copyright 2020 DXOS.org\n//\n\nimport { invariant } from '@dxos/invariant';\nimport { type KeyPair, PublicKey, type PublicKeyLike,
|
|
5
|
-
"mappings": ";;;AAIA,SAASA,iBAAiB;AAC1B,SAAuBC,WAA+BC,
|
|
6
|
-
"names": ["invariant", "
|
|
3
|
+
"sources": ["../../../src/index.ts", "../../../src/keys.ts", "../../../src/uuid.ts", "../../../src/validator.ts", "../../../src/verify.ts"],
|
|
4
|
+
"sourcesContent": ["//\n// Copyright 2020 DXOS.org\n//\n\nexport * from '#subtle';\nexport * from './keys';\nexport type * from './signer';\nexport * from './uuid';\nexport * from './validator';\nexport * from './verify';\n", "//\n// Copyright 2020 DXOS.org\n//\n\nimport { invariant } from '@dxos/invariant';\nimport { type KeyPair, PUBLIC_KEY_LENGTH, PublicKey, type PublicKeyLike, SECRET_KEY_LENGTH } from '@dxos/keys';\n\nimport crypto from '#hypercore-crypto';\n\nexport const SIGNATURE_LENGTH = 64;\n\n/**\n * @deprecated\n */\n// TODO(burdon): Remove.\nexport const createId = (): string => PublicKey.stringify(randomBytes(32));\n\nexport const createKeyPair = (seed?: Buffer): KeyPair => {\n if (seed) {\n invariant(seed.length >= 32, 'Seedphrase too sort. Expecting length of 32.');\n return crypto.keyPair(seed.slice(0, 32));\n }\n\n // TODO(burdon): Enable seed for debugging.\n return crypto.keyPair();\n};\n\n// TODO(burdon): Buffer.\nexport const validateKeyPair = (publicKey: PublicKey, secretKey: Buffer) =>\n crypto.validateKeyPair({ publicKey: publicKey.asBuffer(), secretKey });\n\n// TODO(dmaretskyi): Slicing because webcrypto keys are too long.\nexport const discoveryKey = (key: PublicKeyLike): Buffer =>\n crypto.discoveryKey(PublicKey.from(key).asBuffer().slice(1));\n\n/**\n * Return random bytes of length.\n * @param [length=32]\n * @return {Buffer}\n */\nexport const randomBytes = (length = 32): Buffer => crypto.randomBytes(length);\n\n/**\n * Sign the contents of message with secret_key\n * @param {Buffer} message\n * @param {Buffer} secretKey\n * @returns {Buffer} signature\n */\nexport const sign = (message: Buffer, secretKey: Buffer): Buffer => {\n invariant(Buffer.isBuffer(message));\n invariant(Buffer.isBuffer(secretKey) && secretKey.length === SECRET_KEY_LENGTH);\n\n return crypto.sign(message, secretKey);\n};\n\n/**\n * Verifies the signature against the message and public_key.\n * @param {Buffer} message\n * @param {Buffer} publicKey\n * @param {Buffer} signature\n * @return {boolean}\n */\nexport const verify = (message: Buffer, signature: Buffer, publicKey: Buffer): boolean => {\n invariant(Buffer.isBuffer(message));\n invariant(Buffer.isBuffer(signature) && signature.length === SIGNATURE_LENGTH);\n invariant(Buffer.isBuffer(publicKey) && publicKey.length === PUBLIC_KEY_LENGTH);\n\n return crypto.verify(message, signature, publicKey);\n};\n", "//\n// Copyright 2024 DXOS.org\n//\n\nimport { webcrypto } from '#subtle';\n\nexport const randomUUID = (): string => {\n return webcrypto.randomUUID();\n};\n", "//\n// Copyright 2020 DXOS.org\n//\n\nimport { PublicKey } from '@dxos/keys';\n\nimport { verify } from '#hypercore-crypto';\n\n/**\n * Generator for signature validation function.\n * @param {String} publicKey\n */\nexport const getSignatureValidator = (publicKey: string) => (message: Buffer, signature: Buffer) =>\n verify(message, signature, PublicKey.bufferize(publicKey));\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport { type PublicKey } from '@dxos/keys';\n\nimport { subtleCrypto } from '#subtle';\n\n/**\n * Verify a signature with the given key.\n */\nexport const verifySignature = async (\n key: PublicKey,\n message: Uint8Array,\n signature: Uint8Array,\n algorithm: { name: string; namedCurve?: string } = { name: 'ECDSA', namedCurve: 'P-256' },\n): Promise<boolean> => {\n let publicKey!: CryptoKey;\n\n try {\n publicKey = await subtleCrypto.importKey('raw', key.asUint8Array() as Uint8Array<ArrayBuffer>, algorithm, true, [\n 'verify',\n ]);\n } catch {\n return false;\n }\n\n return subtleCrypto.verify(\n {\n name: algorithm.name,\n hash: 'SHA-256',\n },\n publicKey,\n signature as Uint8Array<ArrayBuffer>,\n message as Uint8Array<ArrayBuffer>,\n );\n};\n"],
|
|
5
|
+
"mappings": ";;;AAIA,cAAc;;;ACAd,SAASA,iBAAiB;AAC1B,SAAuBC,mBAAmBC,WAA+BC,yBAAyB;AAElG,OAAOC,YAAY;;AAEZ,IAAMC,mBAAmB;AAMzB,IAAMC,WAAW,MAAcJ,UAAUK,UAAUC,YAAY,EAAA,CAAA;AAE/D,IAAMC,gBAAgB,CAACC,SAAAA;AAC5B,MAAIA,MAAM;AACRV,cAAUU,KAAKC,UAAU,IAAI,gDAAA;;;;;;;;;AAC7B,WAAOP,OAAOQ,QAAQF,KAAKG,MAAM,GAAG,EAAA,CAAA;EACtC;AAGA,SAAOT,OAAOQ,QAAO;AACvB;AAGO,IAAME,kBAAkB,CAACC,WAAsBC,cACpDZ,OAAOU,gBAAgB;EAAEC,WAAWA,UAAUE,SAAQ;EAAID;AAAU,CAAA;AAG/D,IAAME,eAAe,CAACC,QAC3Bf,OAAOc,aAAahB,UAAUkB,KAAKD,GAAAA,EAAKF,SAAQ,EAAGJ,MAAM,CAAA,CAAA;AAOpD,IAAML,cAAc,CAACG,SAAS,OAAeP,OAAOI,YAAYG,MAAAA;AAQhE,IAAMU,OAAO,CAACC,SAAiBN,cAAAA;AACpChB,YAAUuB,OAAOC,SAASF,OAAAA,GAAAA,QAAAA;;;;;;;;;AAC1BtB,YAAUuB,OAAOC,SAASR,SAAAA,KAAcA,UAAUL,WAAWR,mBAAAA,QAAAA;;;;;;;;;AAE7D,SAAOC,OAAOiB,KAAKC,SAASN,SAAAA;AAC9B;AASO,IAAMS,SAAS,CAACH,SAAiBI,WAAmBX,cAAAA;AACzDf,YAAUuB,OAAOC,SAASF,OAAAA,GAAAA,QAAAA;;;;;;;;;AAC1BtB,YAAUuB,OAAOC,SAASE,SAAAA,KAAcA,UAAUf,WAAWN,kBAAAA,QAAAA;;;;;;;;;AAC7DL,YAAUuB,OAAOC,SAAST,SAAAA,KAAcA,UAAUJ,WAAWV,mBAAAA,QAAAA;;;;;;;;;AAE7D,SAAOG,OAAOqB,OAAOH,SAASI,WAAWX,SAAAA;AAC3C;;;AChEA,SAASY,iBAAiB;AAEnB,IAAMC,aAAa,MAAA;AACxB,SAAOC,UAAUD,WAAU;AAC7B;;;ACJA,SAASE,aAAAA,kBAAiB;AAE1B,SAASC,UAAAA,eAAc;AAMhB,IAAMC,wBAAwB,CAACC,cAAsB,CAACC,SAAiBC,cAC5EC,QAAOF,SAASC,WAAWE,WAAUC,UAAUL,SAAAA,CAAAA;;;ACPjD,SAASM,oBAAoB;AAKtB,IAAMC,kBAAkB,OAC7BC,KACAC,SACAC,WACAC,YAAmD;EAAEC,MAAM;EAASC,YAAY;AAAQ,MAAC;AAEzF,MAAIC;AAEJ,MAAI;AACFA,gBAAY,MAAMC,aAAaC,UAAU,OAAOR,IAAIS,aAAY,GAA+BN,WAAW,MAAM;MAC9G;KACD;EACH,QAAQ;AACN,WAAO;EACT;AAEA,SAAOI,aAAaG,OAClB;IACEN,MAAMD,UAAUC;IAChBO,MAAM;EACR,GACAL,WACAJ,WACAD,OAAAA;AAEJ;",
|
|
6
|
+
"names": ["invariant", "PUBLIC_KEY_LENGTH", "PublicKey", "SECRET_KEY_LENGTH", "crypto", "SIGNATURE_LENGTH", "createId", "stringify", "randomBytes", "createKeyPair", "seed", "length", "keyPair", "slice", "validateKeyPair", "publicKey", "secretKey", "asBuffer", "discoveryKey", "key", "from", "sign", "message", "Buffer", "isBuffer", "verify", "signature", "webcrypto", "randomUUID", "webcrypto", "PublicKey", "verify", "getSignatureValidator", "publicKey", "message", "signature", "verify", "PublicKey", "bufferize", "subtleCrypto", "verifySignature", "key", "message", "signature", "algorithm", "name", "namedCurve", "publicKey", "subtleCrypto", "importKey", "asUint8Array", "verify", "hash"]
|
|
7
7
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"inputs":{"
|
|
1
|
+
{"inputs":{"src/keys.ts":{"bytes":8280,"imports":[{"path":"@dxos/invariant","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"format":"esm"},"src/uuid.ts":{"bytes":771,"imports":[{"path":"#subtle","kind":"import-statement","external":true}],"format":"esm"},"src/validator.ts":{"bytes":1470,"imports":[{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"format":"esm"},"src/verify.ts":{"bytes":2651,"imports":[{"path":"#subtle","kind":"import-statement","external":true}],"format":"esm"},"src/index.ts":{"bytes":817,"imports":[{"path":"#subtle","kind":"import-statement","external":true},{"path":"src/keys.ts","kind":"import-statement","original":"./keys"},{"path":"src/uuid.ts","kind":"import-statement","original":"./uuid"},{"path":"src/validator.ts","kind":"import-statement","original":"./validator"},{"path":"src/verify.ts","kind":"import-statement","original":"./verify"}],"format":"esm"}},"outputs":{"dist/lib/browser/index.mjs.map":{"imports":[],"exports":[],"inputs":{},"bytes":6277},"dist/lib/browser/index.mjs":{"imports":[{"path":"#subtle","kind":"import-statement","external":true},{"path":"@dxos/invariant","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true},{"path":"#subtle","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true},{"path":"#subtle","kind":"import-statement","external":true}],"exports":["SIGNATURE_LENGTH","createId","createKeyPair","discoveryKey","getSignatureValidator","randomBytes","randomUUID","sign","validateKeyPair","verify","verifySignature"],"entryPoint":"src/index.ts","inputs":{"src/index.ts":{"bytesInOutput":25},"src/keys.ts":{"bytesInOutput":2220},"src/uuid.ts":{"bytesInOutput":98},"src/validator.ts":{"bytesInOutput":238},"src/verify.ts":{"bytesInOutput":445}},"bytes":3368}}}
|
|
@@ -1,10 +1,13 @@
|
|
|
1
1
|
import { createRequire } from 'node:module';const require = createRequire(import.meta.url);
|
|
2
2
|
|
|
3
|
-
//
|
|
3
|
+
// src/index.ts
|
|
4
|
+
export * from "#subtle";
|
|
5
|
+
|
|
6
|
+
// src/keys.ts
|
|
4
7
|
import { invariant } from "@dxos/invariant";
|
|
5
|
-
import {
|
|
8
|
+
import { PUBLIC_KEY_LENGTH, PublicKey, SECRET_KEY_LENGTH } from "@dxos/keys";
|
|
6
9
|
import crypto from "#hypercore-crypto";
|
|
7
|
-
var __dxlog_file = "/
|
|
10
|
+
var __dxlog_file = "/__w/dxos/dxos/packages/common/crypto/src/keys.ts";
|
|
8
11
|
var SIGNATURE_LENGTH = 64;
|
|
9
12
|
var createId = () => PublicKey.stringify(randomBytes(32));
|
|
10
13
|
var createKeyPair = (seed) => {
|
|
@@ -80,17 +83,19 @@ var verify = (message, signature, publicKey) => {
|
|
|
80
83
|
return crypto.verify(message, signature, publicKey);
|
|
81
84
|
};
|
|
82
85
|
|
|
83
|
-
//
|
|
84
|
-
import
|
|
85
|
-
var
|
|
86
|
-
|
|
86
|
+
// src/uuid.ts
|
|
87
|
+
import { webcrypto } from "#subtle";
|
|
88
|
+
var randomUUID = () => {
|
|
89
|
+
return webcrypto.randomUUID();
|
|
90
|
+
};
|
|
87
91
|
|
|
88
|
-
//
|
|
92
|
+
// src/validator.ts
|
|
89
93
|
import { PublicKey as PublicKey2 } from "@dxos/keys";
|
|
90
94
|
import { verify as verify2 } from "#hypercore-crypto";
|
|
91
95
|
var getSignatureValidator = (publicKey) => (message, signature) => verify2(message, signature, PublicKey2.bufferize(publicKey));
|
|
92
96
|
|
|
93
|
-
//
|
|
97
|
+
// src/verify.ts
|
|
98
|
+
import { subtleCrypto } from "#subtle";
|
|
94
99
|
var verifySignature = async (key, message, signature, algorithm = {
|
|
95
100
|
name: "ECDSA",
|
|
96
101
|
namedCurve: "P-256"
|
|
@@ -108,11 +113,6 @@ var verifySignature = async (key, message, signature, algorithm = {
|
|
|
108
113
|
hash: "SHA-256"
|
|
109
114
|
}, publicKey, signature, message);
|
|
110
115
|
};
|
|
111
|
-
|
|
112
|
-
// packages/common/crypto/src/uuid.ts
|
|
113
|
-
var randomUUID = () => {
|
|
114
|
-
return webcrypto2.randomUUID();
|
|
115
|
-
};
|
|
116
116
|
export {
|
|
117
117
|
SIGNATURE_LENGTH,
|
|
118
118
|
createId,
|
|
@@ -122,10 +122,8 @@ export {
|
|
|
122
122
|
randomBytes,
|
|
123
123
|
randomUUID,
|
|
124
124
|
sign,
|
|
125
|
-
subtleCrypto,
|
|
126
125
|
validateKeyPair,
|
|
127
126
|
verify,
|
|
128
|
-
verifySignature
|
|
129
|
-
webcrypto2 as webcrypto
|
|
127
|
+
verifySignature
|
|
130
128
|
};
|
|
131
129
|
//# sourceMappingURL=index.mjs.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
|
-
"sources": ["../../../src/
|
|
4
|
-
"sourcesContent": ["//\n// Copyright 2020 DXOS.org\n//\n\nimport { invariant } from '@dxos/invariant';\nimport { type KeyPair, PublicKey, type PublicKeyLike,
|
|
5
|
-
"mappings": ";;;AAIA,SAASA,iBAAiB;AAC1B,SAAuBC,WAA+BC,
|
|
6
|
-
"names": ["invariant", "
|
|
3
|
+
"sources": ["../../../src/index.ts", "../../../src/keys.ts", "../../../src/uuid.ts", "../../../src/validator.ts", "../../../src/verify.ts"],
|
|
4
|
+
"sourcesContent": ["//\n// Copyright 2020 DXOS.org\n//\n\nexport * from '#subtle';\nexport * from './keys';\nexport type * from './signer';\nexport * from './uuid';\nexport * from './validator';\nexport * from './verify';\n", "//\n// Copyright 2020 DXOS.org\n//\n\nimport { invariant } from '@dxos/invariant';\nimport { type KeyPair, PUBLIC_KEY_LENGTH, PublicKey, type PublicKeyLike, SECRET_KEY_LENGTH } from '@dxos/keys';\n\nimport crypto from '#hypercore-crypto';\n\nexport const SIGNATURE_LENGTH = 64;\n\n/**\n * @deprecated\n */\n// TODO(burdon): Remove.\nexport const createId = (): string => PublicKey.stringify(randomBytes(32));\n\nexport const createKeyPair = (seed?: Buffer): KeyPair => {\n if (seed) {\n invariant(seed.length >= 32, 'Seedphrase too sort. Expecting length of 32.');\n return crypto.keyPair(seed.slice(0, 32));\n }\n\n // TODO(burdon): Enable seed for debugging.\n return crypto.keyPair();\n};\n\n// TODO(burdon): Buffer.\nexport const validateKeyPair = (publicKey: PublicKey, secretKey: Buffer) =>\n crypto.validateKeyPair({ publicKey: publicKey.asBuffer(), secretKey });\n\n// TODO(dmaretskyi): Slicing because webcrypto keys are too long.\nexport const discoveryKey = (key: PublicKeyLike): Buffer =>\n crypto.discoveryKey(PublicKey.from(key).asBuffer().slice(1));\n\n/**\n * Return random bytes of length.\n * @param [length=32]\n * @return {Buffer}\n */\nexport const randomBytes = (length = 32): Buffer => crypto.randomBytes(length);\n\n/**\n * Sign the contents of message with secret_key\n * @param {Buffer} message\n * @param {Buffer} secretKey\n * @returns {Buffer} signature\n */\nexport const sign = (message: Buffer, secretKey: Buffer): Buffer => {\n invariant(Buffer.isBuffer(message));\n invariant(Buffer.isBuffer(secretKey) && secretKey.length === SECRET_KEY_LENGTH);\n\n return crypto.sign(message, secretKey);\n};\n\n/**\n * Verifies the signature against the message and public_key.\n * @param {Buffer} message\n * @param {Buffer} publicKey\n * @param {Buffer} signature\n * @return {boolean}\n */\nexport const verify = (message: Buffer, signature: Buffer, publicKey: Buffer): boolean => {\n invariant(Buffer.isBuffer(message));\n invariant(Buffer.isBuffer(signature) && signature.length === SIGNATURE_LENGTH);\n invariant(Buffer.isBuffer(publicKey) && publicKey.length === PUBLIC_KEY_LENGTH);\n\n return crypto.verify(message, signature, publicKey);\n};\n", "//\n// Copyright 2024 DXOS.org\n//\n\nimport { webcrypto } from '#subtle';\n\nexport const randomUUID = (): string => {\n return webcrypto.randomUUID();\n};\n", "//\n// Copyright 2020 DXOS.org\n//\n\nimport { PublicKey } from '@dxos/keys';\n\nimport { verify } from '#hypercore-crypto';\n\n/**\n * Generator for signature validation function.\n * @param {String} publicKey\n */\nexport const getSignatureValidator = (publicKey: string) => (message: Buffer, signature: Buffer) =>\n verify(message, signature, PublicKey.bufferize(publicKey));\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport { type PublicKey } from '@dxos/keys';\n\nimport { subtleCrypto } from '#subtle';\n\n/**\n * Verify a signature with the given key.\n */\nexport const verifySignature = async (\n key: PublicKey,\n message: Uint8Array,\n signature: Uint8Array,\n algorithm: { name: string; namedCurve?: string } = { name: 'ECDSA', namedCurve: 'P-256' },\n): Promise<boolean> => {\n let publicKey!: CryptoKey;\n\n try {\n publicKey = await subtleCrypto.importKey('raw', key.asUint8Array() as Uint8Array<ArrayBuffer>, algorithm, true, [\n 'verify',\n ]);\n } catch {\n return false;\n }\n\n return subtleCrypto.verify(\n {\n name: algorithm.name,\n hash: 'SHA-256',\n },\n publicKey,\n signature as Uint8Array<ArrayBuffer>,\n message as Uint8Array<ArrayBuffer>,\n );\n};\n"],
|
|
5
|
+
"mappings": ";;;AAIA,cAAc;;;ACAd,SAASA,iBAAiB;AAC1B,SAAuBC,mBAAmBC,WAA+BC,yBAAyB;AAElG,OAAOC,YAAY;;AAEZ,IAAMC,mBAAmB;AAMzB,IAAMC,WAAW,MAAcJ,UAAUK,UAAUC,YAAY,EAAA,CAAA;AAE/D,IAAMC,gBAAgB,CAACC,SAAAA;AAC5B,MAAIA,MAAM;AACRV,cAAUU,KAAKC,UAAU,IAAI,gDAAA;;;;;;;;;AAC7B,WAAOP,OAAOQ,QAAQF,KAAKG,MAAM,GAAG,EAAA,CAAA;EACtC;AAGA,SAAOT,OAAOQ,QAAO;AACvB;AAGO,IAAME,kBAAkB,CAACC,WAAsBC,cACpDZ,OAAOU,gBAAgB;EAAEC,WAAWA,UAAUE,SAAQ;EAAID;AAAU,CAAA;AAG/D,IAAME,eAAe,CAACC,QAC3Bf,OAAOc,aAAahB,UAAUkB,KAAKD,GAAAA,EAAKF,SAAQ,EAAGJ,MAAM,CAAA,CAAA;AAOpD,IAAML,cAAc,CAACG,SAAS,OAAeP,OAAOI,YAAYG,MAAAA;AAQhE,IAAMU,OAAO,CAACC,SAAiBN,cAAAA;AACpChB,YAAUuB,OAAOC,SAASF,OAAAA,GAAAA,QAAAA;;;;;;;;;AAC1BtB,YAAUuB,OAAOC,SAASR,SAAAA,KAAcA,UAAUL,WAAWR,mBAAAA,QAAAA;;;;;;;;;AAE7D,SAAOC,OAAOiB,KAAKC,SAASN,SAAAA;AAC9B;AASO,IAAMS,SAAS,CAACH,SAAiBI,WAAmBX,cAAAA;AACzDf,YAAUuB,OAAOC,SAASF,OAAAA,GAAAA,QAAAA;;;;;;;;;AAC1BtB,YAAUuB,OAAOC,SAASE,SAAAA,KAAcA,UAAUf,WAAWN,kBAAAA,QAAAA;;;;;;;;;AAC7DL,YAAUuB,OAAOC,SAAST,SAAAA,KAAcA,UAAUJ,WAAWV,mBAAAA,QAAAA;;;;;;;;;AAE7D,SAAOG,OAAOqB,OAAOH,SAASI,WAAWX,SAAAA;AAC3C;;;AChEA,SAASY,iBAAiB;AAEnB,IAAMC,aAAa,MAAA;AACxB,SAAOC,UAAUD,WAAU;AAC7B;;;ACJA,SAASE,aAAAA,kBAAiB;AAE1B,SAASC,UAAAA,eAAc;AAMhB,IAAMC,wBAAwB,CAACC,cAAsB,CAACC,SAAiBC,cAC5EC,QAAOF,SAASC,WAAWE,WAAUC,UAAUL,SAAAA,CAAAA;;;ACPjD,SAASM,oBAAoB;AAKtB,IAAMC,kBAAkB,OAC7BC,KACAC,SACAC,WACAC,YAAmD;EAAEC,MAAM;EAASC,YAAY;AAAQ,MAAC;AAEzF,MAAIC;AAEJ,MAAI;AACFA,gBAAY,MAAMC,aAAaC,UAAU,OAAOR,IAAIS,aAAY,GAA+BN,WAAW,MAAM;MAC9G;KACD;EACH,QAAQ;AACN,WAAO;EACT;AAEA,SAAOI,aAAaG,OAClB;IACEN,MAAMD,UAAUC;IAChBO,MAAM;EACR,GACAL,WACAJ,WACAD,OAAAA;AAEJ;",
|
|
6
|
+
"names": ["invariant", "PUBLIC_KEY_LENGTH", "PublicKey", "SECRET_KEY_LENGTH", "crypto", "SIGNATURE_LENGTH", "createId", "stringify", "randomBytes", "createKeyPair", "seed", "length", "keyPair", "slice", "validateKeyPair", "publicKey", "secretKey", "asBuffer", "discoveryKey", "key", "from", "sign", "message", "Buffer", "isBuffer", "verify", "signature", "webcrypto", "randomUUID", "webcrypto", "PublicKey", "verify", "getSignatureValidator", "publicKey", "message", "signature", "verify", "PublicKey", "bufferize", "subtleCrypto", "verifySignature", "key", "message", "signature", "algorithm", "name", "namedCurve", "publicKey", "subtleCrypto", "importKey", "asUint8Array", "verify", "hash"]
|
|
7
7
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"inputs":{"
|
|
1
|
+
{"inputs":{"src/keys.ts":{"bytes":8280,"imports":[{"path":"@dxos/invariant","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"format":"esm"},"src/uuid.ts":{"bytes":771,"imports":[{"path":"#subtle","kind":"import-statement","external":true}],"format":"esm"},"src/validator.ts":{"bytes":1470,"imports":[{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"format":"esm"},"src/verify.ts":{"bytes":2651,"imports":[{"path":"#subtle","kind":"import-statement","external":true}],"format":"esm"},"src/index.ts":{"bytes":817,"imports":[{"path":"#subtle","kind":"import-statement","external":true},{"path":"src/keys.ts","kind":"import-statement","original":"./keys"},{"path":"src/uuid.ts","kind":"import-statement","original":"./uuid"},{"path":"src/validator.ts","kind":"import-statement","original":"./validator"},{"path":"src/verify.ts","kind":"import-statement","original":"./verify"}],"format":"esm"}},"outputs":{"dist/lib/node-esm/index.mjs.map":{"imports":[],"exports":[],"inputs":{},"bytes":6277},"dist/lib/node-esm/index.mjs":{"imports":[{"path":"#subtle","kind":"import-statement","external":true},{"path":"@dxos/invariant","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true},{"path":"#subtle","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true},{"path":"#subtle","kind":"import-statement","external":true}],"exports":["SIGNATURE_LENGTH","createId","createKeyPair","discoveryKey","getSignatureValidator","randomBytes","randomUUID","sign","validateKeyPair","verify","verifySignature"],"entryPoint":"src/index.ts","inputs":{"src/index.ts":{"bytesInOutput":25},"src/keys.ts":{"bytesInOutput":2220},"src/uuid.ts":{"bytesInOutput":98},"src/validator.ts":{"bytesInOutput":238},"src/verify.ts":{"bytesInOutput":445}},"bytes":3427}}}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
+
export * from '#subtle';
|
|
1
2
|
export * from './keys';
|
|
2
|
-
export * from './signer';
|
|
3
|
-
export * from './
|
|
3
|
+
export type * from './signer';
|
|
4
|
+
export * from './uuid';
|
|
4
5
|
export * from './validator';
|
|
5
6
|
export * from './verify';
|
|
6
|
-
export * from './uuid';
|
|
7
7
|
//# sourceMappingURL=index.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/index.ts"],"names":[],"mappings":"AAIA,cAAc,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/index.ts"],"names":[],"mappings":"AAIA,cAAc,SAAS,CAAC;AACxB,cAAc,QAAQ,CAAC;AACvB,mBAAmB,UAAU,CAAC;AAC9B,cAAc,QAAQ,CAAC;AACvB,cAAc,aAAa,CAAC;AAC5B,cAAc,UAAU,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"keys.d.ts","sourceRoot":"","sources":["../../../src/keys.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,KAAK,OAAO,
|
|
1
|
+
{"version":3,"file":"keys.d.ts","sourceRoot":"","sources":["../../../src/keys.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,KAAK,OAAO,EAAqB,SAAS,EAAE,KAAK,aAAa,EAAqB,MAAM,YAAY,CAAC;AAI/G,eAAO,MAAM,gBAAgB,KAAK,CAAC;AAEnC;;GAEG;AAEH,eAAO,MAAM,QAAQ,QAAO,MAA8C,CAAC;AAE3E,eAAO,MAAM,aAAa,GAAI,OAAO,MAAM,KAAG,OAQ7C,CAAC;AAGF,eAAO,MAAM,eAAe,GAAI,WAAW,SAAS,EAAE,WAAW,MAAM,QACC,CAAC;AAGzE,eAAO,MAAM,YAAY,GAAI,KAAK,aAAa,KAAG,MACY,CAAC;AAE/D;;;;GAIG;AACH,eAAO,MAAM,WAAW,GAAI,eAAW,KAAG,MAAoC,CAAC;AAE/E;;;;;GAKG;AACH,eAAO,MAAM,IAAI,GAAI,SAAS,MAAM,EAAE,WAAW,MAAM,KAAG,MAKzD,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,MAAM,GAAI,SAAS,MAAM,EAAE,WAAW,MAAM,EAAE,WAAW,MAAM,KAAG,OAM9E,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"verify.d.ts","sourceRoot":"","sources":["../../../src/verify.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,YAAY,CAAC;AAI5C;;GAEG;AACH,eAAO,MAAM,eAAe,GAC1B,KAAK,SAAS,EACd,SAAS,UAAU,EACnB,WAAW,UAAU,EACrB,YAAW;IAAE,IAAI,EAAE,MAAM,CAAC;IAAC,UAAU,CAAC,EAAE,MAAM,CAAA;CAA2C,KACxF,OAAO,CAAC,OAAO,
|
|
1
|
+
{"version":3,"file":"verify.d.ts","sourceRoot":"","sources":["../../../src/verify.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,YAAY,CAAC;AAI5C;;GAEG;AACH,eAAO,MAAM,eAAe,GAC1B,KAAK,SAAS,EACd,SAAS,UAAU,EACnB,WAAW,UAAU,EACrB,YAAW;IAAE,IAAI,EAAE,MAAM,CAAC;IAAC,UAAU,CAAC,EAAE,MAAM,CAAA;CAA2C,KACxF,OAAO,CAAC,OAAO,CAoBjB,CAAC"}
|