@neelegirl/baileys 1.5.2 → 1.5.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -21
- package/README.md +195 -187
- package/WAProto/WAProto.proto +537 -236
- package/WAProto/index.d.ts +5971 -2388
- package/WAProto/index.js +17298 -6513
- package/lib/Defaults/baileys-version.json +3 -3
- package/lib/Defaults/index.d.ts +77 -67
- package/lib/Defaults/index.js +148 -136
- package/lib/Defaults/phonenumber-mcc.json +223 -223
- package/lib/Signal/WASignalGroup/GroupProtocol.js +1908 -1908
- package/lib/Signal/WASignalGroup/ciphertext-message.d.ts +9 -0
- package/lib/Signal/WASignalGroup/ciphertext-message.js +19 -0
- package/lib/Signal/WASignalGroup/ciphertext_message.js +15 -15
- package/lib/Signal/WASignalGroup/group-session-builder.d.ts +17 -0
- package/lib/Signal/WASignalGroup/group-session-builder.js +72 -0
- package/lib/Signal/WASignalGroup/group.proto +41 -41
- package/lib/Signal/WASignalGroup/group_cipher.d.ts +19 -0
- package/lib/Signal/WASignalGroup/group_cipher.js +101 -110
- package/lib/Signal/WASignalGroup/group_session_builder.js +45 -45
- package/lib/Signal/WASignalGroup/index.d.ts +11 -0
- package/lib/Signal/WASignalGroup/index.js +61 -6
- package/lib/Signal/WASignalGroup/keyhelper.d.ts +16 -0
- package/lib/Signal/WASignalGroup/keyhelper.js +58 -13
- package/lib/Signal/WASignalGroup/protobufs.js +2 -2
- package/lib/Signal/WASignalGroup/queue_job.js +68 -68
- package/lib/Signal/WASignalGroup/readme.md +5 -5
- package/lib/Signal/WASignalGroup/sender-chain-key.d.ts +14 -0
- package/lib/Signal/WASignalGroup/sender-chain-key.js +47 -0
- package/lib/Signal/WASignalGroup/sender-key-distribution-message.d.ts +17 -0
- package/lib/Signal/WASignalGroup/sender-key-distribution-message.js +71 -0
- package/lib/Signal/WASignalGroup/sender-key-message.d.ts +19 -0
- package/lib/Signal/WASignalGroup/sender-key-message.js +73 -0
- package/lib/Signal/WASignalGroup/sender-key-name.d.ts +19 -0
- package/lib/Signal/WASignalGroup/sender-key-name.js +59 -0
- package/lib/Signal/WASignalGroup/sender-key-record.d.ts +32 -0
- package/lib/Signal/WASignalGroup/sender-key-record.js +58 -0
- package/lib/Signal/WASignalGroup/sender-key-state.d.ts +44 -0
- package/lib/Signal/WASignalGroup/sender-key-state.js +147 -0
- package/lib/Signal/WASignalGroup/sender-message-key.d.ts +11 -0
- package/lib/Signal/WASignalGroup/sender-message-key.js +33 -0
- package/lib/Signal/WASignalGroup/sender_chain_key.js +49 -49
- package/lib/Signal/WASignalGroup/sender_key_distribution_message.js +77 -77
- package/lib/Signal/WASignalGroup/sender_key_message.js +91 -91
- package/lib/Signal/WASignalGroup/sender_key_name.js +69 -69
- package/lib/Signal/WASignalGroup/sender_key_record.js +55 -55
- package/lib/Signal/WASignalGroup/sender_key_state.js +128 -128
- package/lib/Signal/WASignalGroup/sender_message_key.js +38 -38
- package/lib/Signal/libsignal.d.ts +5 -1
- package/lib/Signal/libsignal.js +390 -161
- package/lib/Signal/lid-mapping.d.ts +28 -0
- package/lib/Signal/lid-mapping.js +184 -0
- package/lib/Socket/Client/abstract-socket-client.d.ts +15 -15
- package/lib/Socket/Client/abstract-socket-client.js +13 -13
- package/lib/Socket/Client/index.d.ts +2 -2
- package/lib/Socket/Client/mobile-socket-client.d.ts +12 -12
- package/lib/Socket/Client/mobile-socket-client.js +65 -65
- package/lib/Socket/Client/types.d.ts +1 -1
- package/lib/Socket/Client/websocket.d.ts +1 -1
- package/lib/Socket/business.d.ts +6 -6
- package/lib/Socket/business.js +152 -5
- package/lib/Socket/chats.d.ts +3 -4
- package/lib/Socket/chats.js +31 -26
- package/lib/Socket/communities.d.ts +223 -223
- package/lib/Socket/communities.js +432 -432
- package/lib/Socket/groups.d.ts +2 -4
- package/lib/Socket/groups.js +22 -14
- package/lib/Socket/index.d.ts +69 -69
- package/lib/Socket/index.js +3 -2
- package/lib/Socket/messages-recv.d.ts +3 -6
- package/lib/Socket/messages-recv.js +1449 -1707
- package/lib/Socket/messages-send.d.ts +2 -4
- package/lib/Socket/messages-send.js +617 -126
- package/lib/Socket/mex.d.ts +2 -2
- package/lib/Socket/mex.js +46 -46
- package/lib/Socket/newsletter.d.ts +2 -4
- package/lib/Socket/newsletter.js +294 -285
- package/lib/Socket/socket.js +318 -132
- package/lib/Socket/usync.js +3 -3
- package/lib/Store/index.d.ts +4 -4
- package/lib/Store/index.js +23 -23
- package/lib/Store/make-cache-manager-store.d.ts +13 -13
- package/lib/Store/make-cache-manager-store.js +89 -89
- package/lib/Store/make-in-memory-store.d.ts +122 -122
- package/lib/Store/make-in-memory-store.js +428 -428
- package/lib/Store/make-ordered-dictionary.d.ts +11 -11
- package/lib/Store/make-ordered-dictionary.js +85 -85
- package/lib/Store/object-repository.d.ts +9 -9
- package/lib/Store/object-repository.js +30 -30
- package/lib/Types/Auth.d.ts +5 -4
- package/lib/Types/Bussines.js +3 -0
- package/lib/Types/Bussiness.d.ts +28 -0
- package/lib/Types/Chat.d.ts +13 -8
- package/lib/Types/Contact.d.ts +4 -1
- package/lib/Types/Events.d.ts +13 -16
- package/lib/Types/GroupMetadata.d.ts +1 -1
- package/lib/Types/Message.d.ts +18 -7
- package/lib/Types/Message.js +7 -1
- package/lib/Types/MexUpdates.d.ts +8 -8
- package/lib/Types/MexUpdates.js +17 -17
- package/lib/Types/Newsletter.d.ts +1 -1
- package/lib/Types/Product.d.ts +1 -1
- package/lib/Types/Signal.d.ts +31 -1
- package/lib/Types/Socket.d.ts +34 -13
- package/lib/Types/State.d.ts +1 -1
- package/lib/Types/USync.d.ts +2 -2
- package/lib/Types/index.d.ts +16 -15
- package/lib/Types/index.js +4 -2
- package/lib/Utils/auth-utils.d.ts +20 -20
- package/lib/Utils/auth-utils.js +527 -204
- package/lib/Utils/baileys-event-stream.d.ts +17 -17
- package/lib/Utils/baileys-event-stream.js +69 -69
- package/lib/Utils/business.d.ts +28 -28
- package/lib/Utils/business.js +254 -254
- package/lib/Utils/chat-utils.d.ts +81 -81
- package/lib/Utils/chat-utils.js +808 -780
- package/lib/Utils/crypto.d.ts +55 -55
- package/lib/Utils/crypto.js +188 -178
- package/lib/Utils/decode-wa-message.d.ts +52 -40
- package/lib/Utils/decode-wa-message.js +322 -252
- package/lib/Utils/event-buffer.d.ts +38 -38
- package/lib/Utils/event-buffer.js +594 -564
- package/lib/Utils/generics.d.ts +131 -129
- package/lib/Utils/generics.js +629 -623
- package/lib/Utils/history.d.ts +22 -22
- package/lib/Utils/history.js +103 -109
- package/lib/Utils/index.d.ts +20 -19
- package/lib/Utils/index.js +39 -38
- package/lib/Utils/link-preview.d.ts +22 -22
- package/lib/Utils/link-preview.js +119 -119
- package/lib/Utils/logger.d.ts +13 -13
- package/lib/Utils/logger.js +7 -7
- package/lib/Utils/lt-hash.d.ts +13 -13
- package/lib/Utils/lt-hash.js +57 -57
- package/lib/Utils/make-mutex.d.ts +8 -8
- package/lib/Utils/make-mutex.js +48 -48
- package/lib/Utils/message-retry-manager.d.ts +88 -0
- package/lib/Utils/message-retry-manager.js +160 -0
- package/lib/Utils/messages-media.d.ts +134 -128
- package/lib/Utils/messages-media.js +868 -805
- package/lib/Utils/messages.d.ts +104 -102
- package/lib/Utils/messages.js +1744 -1578
- package/lib/Utils/noise-handler.d.ts +20 -19
- package/lib/Utils/noise-handler.js +164 -154
- package/lib/Utils/process-message.d.ts +48 -48
- package/lib/Utils/process-message.js +427 -428
- package/lib/Utils/signal.d.ts +41 -41
- package/lib/Utils/signal.js +165 -165
- package/lib/Utils/use-mongo-file-auth-state.d.ts +5 -5
- package/lib/Utils/use-mongo-file-auth-state.js +83 -83
- package/lib/Utils/use-multi-file-auth-state.d.ts +17 -17
- package/lib/Utils/use-multi-file-auth-state.js +237 -237
- package/lib/Utils/use-single-file-auth-state.d.ts +12 -12
- package/lib/Utils/use-single-file-auth-state.js +79 -79
- package/lib/Utils/validate-connection.d.ts +12 -12
- package/lib/Utils/validate-connection.js +219 -186
- package/lib/WABinary/constants.d.ts +29 -29
- package/lib/WABinary/constants.js +1315 -1315
- package/lib/WABinary/decode.d.ts +8 -8
- package/lib/WABinary/decode.js +287 -287
- package/lib/WABinary/encode.d.ts +2 -2
- package/lib/WABinary/encode.js +264 -264
- package/lib/WABinary/generic-utils.d.ts +27 -27
- package/lib/WABinary/generic-utils.js +141 -141
- package/lib/WABinary/index.d.ts +5 -5
- package/lib/WABinary/index.js +24 -24
- package/lib/WABinary/jid-utils.d.ts +58 -53
- package/lib/WABinary/jid-utils.js +103 -91
- package/lib/WABinary/types.d.ts +21 -21
- package/lib/WABinary/types.js +2 -2
- package/lib/WAM/BinaryInfo.d.ts +15 -15
- package/lib/WAM/BinaryInfo.js +16 -16
- package/lib/WAM/constants.d.ts +46 -46
- package/lib/WAM/constants.js +15370 -15370
- package/lib/WAM/encode.d.ts +2 -2
- package/lib/WAM/encode.js +163 -164
- package/lib/WAM/index.d.ts +3 -3
- package/lib/WAM/index.js +22 -22
- package/lib/WAUSync/Protocols/USyncBotProfileProtocol.d.ts +27 -27
- package/lib/WAUSync/Protocols/USyncBotProfileProtocol.js +68 -68
- package/lib/WAUSync/Protocols/USyncContactProtocol.d.ts +3 -3
- package/lib/WAUSync/Protocols/USyncDeviceProtocol.d.ts +2 -2
- package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.d.ts +2 -2
- package/lib/WAUSync/Protocols/USyncLIDProtocol.d.ts +9 -8
- package/lib/WAUSync/Protocols/USyncLIDProtocol.js +37 -29
- package/lib/WAUSync/Protocols/USyncStatusProtocol.d.ts +2 -2
- package/lib/WAUSync/Protocols/index.d.ts +6 -6
- package/lib/WAUSync/USyncQuery.d.ts +3 -3
- package/lib/WAUSync/index.d.ts +3 -3
- package/lib/index.d.ts +13 -13
- package/lib/index.js +33 -33
- package/package.json +96 -94
- package/lib/Socket/registration.d.ts +0 -266
- package/lib/Socket/registration.js +0 -166
package/lib/Utils/crypto.d.ts
CHANGED
|
@@ -1,56 +1,56 @@
|
|
|
1
|
-
import { KeyPair } from '
|
|
2
|
-
|
|
3
|
-
/** prefix version byte to the pub keys, required for some curve crypto functions */
|
|
4
|
-
export declare const generateSignalPubKey: (pubKey: Uint8Array | Buffer) => Uint8Array | Buffer
|
|
5
|
-
|
|
6
|
-
export declare const Curve: {
|
|
7
|
-
generateKeyPair: () => KeyPair
|
|
8
|
-
sharedKey: (privateKey: Uint8Array, publicKey: Uint8Array) => Buffer
|
|
9
|
-
sign: (privateKey: Uint8Array, buf: Uint8Array) => any
|
|
10
|
-
verify: (pubKey: Uint8Array, message: Uint8Array, signature: Uint8Array) => boolean
|
|
11
|
-
}
|
|
12
|
-
|
|
13
|
-
export declare const signedKeyPair: (identityKeyPair: KeyPair, keyId: number) => {
|
|
14
|
-
keyPair: KeyPair
|
|
15
|
-
signature: any
|
|
16
|
-
keyId: number
|
|
17
|
-
}
|
|
18
|
-
|
|
19
|
-
/**
|
|
20
|
-
* encrypt AES 256 GCM
|
|
21
|
-
* where the tag tag is suffixed to the ciphertext
|
|
22
|
-
* */
|
|
23
|
-
export declare function aesEncryptGCM(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer
|
|
24
|
-
|
|
25
|
-
/**
|
|
26
|
-
* decrypt AES 256 GCM
|
|
27
|
-
* where the auth tag is suffixed to the ciphertext
|
|
28
|
-
* */
|
|
29
|
-
export declare function aesDecryptGCM(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer
|
|
30
|
-
|
|
31
|
-
export declare function aesEncryptCTR(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer
|
|
32
|
-
|
|
33
|
-
export declare function aesDecryptCTR(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer
|
|
34
|
-
|
|
35
|
-
/** decrypt AES 256 CBC where the IV is prefixed to the buffer */
|
|
36
|
-
export declare function aesDecrypt(buffer: Buffer, key: Buffer): Buffer
|
|
37
|
-
/** decrypt AES 256 CBC */
|
|
38
|
-
|
|
39
|
-
export declare function aesDecryptWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer
|
|
40
|
-
|
|
41
|
-
export declare function aesEncrypt(buffer: Buffer | Uint8Array, key: Buffer): Buffer
|
|
42
|
-
|
|
43
|
-
export declare function aesEncrypWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer
|
|
44
|
-
|
|
45
|
-
export declare function hmacSign(buffer: Buffer | Uint8Array, key: Buffer | Uint8Array, variant?: 'sha256' | 'sha512'): Buffer
|
|
46
|
-
|
|
47
|
-
export declare function sha256(buffer: Buffer): Buffer
|
|
48
|
-
|
|
49
|
-
export declare function md5(buffer: Buffer): Buffer
|
|
50
|
-
|
|
51
|
-
export declare function hkdf(buffer: Uint8Array | Buffer, expandedLength: number, info: {
|
|
52
|
-
salt?: Buffer
|
|
53
|
-
info?: string
|
|
54
|
-
}): Promise<Buffer>
|
|
55
|
-
|
|
1
|
+
import { KeyPair } from '@neelegirl/baileys/lib/Types'
|
|
2
|
+
|
|
3
|
+
/** prefix version byte to the pub keys, required for some curve crypto functions */
|
|
4
|
+
export declare const generateSignalPubKey: (pubKey: Uint8Array | Buffer) => Uint8Array | Buffer
|
|
5
|
+
|
|
6
|
+
export declare const Curve: {
|
|
7
|
+
generateKeyPair: () => KeyPair
|
|
8
|
+
sharedKey: (privateKey: Uint8Array, publicKey: Uint8Array) => Buffer
|
|
9
|
+
sign: (privateKey: Uint8Array, buf: Uint8Array) => any
|
|
10
|
+
verify: (pubKey: Uint8Array, message: Uint8Array, signature: Uint8Array) => boolean
|
|
11
|
+
}
|
|
12
|
+
|
|
13
|
+
export declare const signedKeyPair: (identityKeyPair: KeyPair, keyId: number) => {
|
|
14
|
+
keyPair: KeyPair
|
|
15
|
+
signature: any
|
|
16
|
+
keyId: number
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
/**
|
|
20
|
+
* encrypt AES 256 GCM
|
|
21
|
+
* where the tag tag is suffixed to the ciphertext
|
|
22
|
+
* */
|
|
23
|
+
export declare function aesEncryptGCM(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer
|
|
24
|
+
|
|
25
|
+
/**
|
|
26
|
+
* decrypt AES 256 GCM
|
|
27
|
+
* where the auth tag is suffixed to the ciphertext
|
|
28
|
+
* */
|
|
29
|
+
export declare function aesDecryptGCM(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer
|
|
30
|
+
|
|
31
|
+
export declare function aesEncryptCTR(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer
|
|
32
|
+
|
|
33
|
+
export declare function aesDecryptCTR(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer
|
|
34
|
+
|
|
35
|
+
/** decrypt AES 256 CBC where the IV is prefixed to the buffer */
|
|
36
|
+
export declare function aesDecrypt(buffer: Buffer, key: Buffer): Buffer
|
|
37
|
+
/** decrypt AES 256 CBC */
|
|
38
|
+
|
|
39
|
+
export declare function aesDecryptWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer
|
|
40
|
+
|
|
41
|
+
export declare function aesEncrypt(buffer: Buffer | Uint8Array, key: Buffer): Buffer
|
|
42
|
+
|
|
43
|
+
export declare function aesEncrypWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer
|
|
44
|
+
|
|
45
|
+
export declare function hmacSign(buffer: Buffer | Uint8Array, key: Buffer | Uint8Array, variant?: 'sha256' | 'sha512'): Buffer
|
|
46
|
+
|
|
47
|
+
export declare function sha256(buffer: Buffer): Buffer
|
|
48
|
+
|
|
49
|
+
export declare function md5(buffer: Buffer): Buffer
|
|
50
|
+
|
|
51
|
+
export declare function hkdf(buffer: Uint8Array | Buffer, expandedLength: number, info: {
|
|
52
|
+
salt?: Buffer
|
|
53
|
+
info?: string
|
|
54
|
+
}): Promise<Buffer>
|
|
55
|
+
|
|
56
56
|
export declare function derivePairingCodeKey(pairingCode: string, salt: Buffer): Promise<Buffer>
|
package/lib/Utils/crypto.js
CHANGED
|
@@ -1,179 +1,189 @@
|
|
|
1
|
-
"use strict"
|
|
2
|
-
|
|
3
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? function(o, m, k, k2) {
|
|
4
|
-
if (k2 === undefined) k2 = k
|
|
5
|
-
var desc = Object.getOwnPropertyDescriptor(m, k)
|
|
6
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
7
|
-
desc = { enumerable: true, get: function() { return m[k] } }
|
|
8
|
-
}
|
|
9
|
-
Object.defineProperty(o, k2, desc)
|
|
10
|
-
} : function(o, m, k, k2) {
|
|
11
|
-
if (k2 === undefined) k2 = k
|
|
12
|
-
o[k2] = m[k]
|
|
13
|
-
})
|
|
14
|
-
|
|
15
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? function(o, v) {
|
|
16
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v })
|
|
17
|
-
} : function(o, v) {
|
|
18
|
-
o["default"] = v
|
|
19
|
-
})
|
|
20
|
-
|
|
21
|
-
var __importStar = (this && this.__importStar) || function(mod) {
|
|
22
|
-
if (mod && mod.__esModule) return mod
|
|
23
|
-
var result = {}
|
|
24
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k)
|
|
25
|
-
__setModuleDefault(result, mod)
|
|
26
|
-
return result
|
|
27
|
-
}
|
|
28
|
-
|
|
29
|
-
Object.defineProperty(exports, "__esModule", { value: true })
|
|
30
|
-
|
|
31
|
-
const crypto_1 = require("crypto")
|
|
32
|
-
const libsignal = __importStar(require("@neelegirl/libsignal"))
|
|
33
|
-
const Defaults_1 = require("../Defaults")
|
|
34
|
-
|
|
35
|
-
const generateSignalPubKey = (pubKey) => (
|
|
36
|
-
pubKey.length === 33 ? pubKey : Buffer.concat([Defaults_1.KEY_BUNDLE_TYPE, pubKey])
|
|
37
|
-
)
|
|
38
|
-
|
|
39
|
-
const Curve = {
|
|
40
|
-
generateKeyPair: () => {
|
|
41
|
-
const { pubKey, privKey } = libsignal.curve.generateKeyPair()
|
|
42
|
-
return {
|
|
43
|
-
private: Buffer.from(privKey),
|
|
44
|
-
public: Buffer.from(pubKey.slice(1))
|
|
45
|
-
}
|
|
46
|
-
},
|
|
47
|
-
sharedKey: (privateKey, publicKey) => {
|
|
48
|
-
const shared = libsignal.curve.calculateAgreement(generateSignalPubKey(publicKey), privateKey)
|
|
49
|
-
return Buffer.from(shared)
|
|
50
|
-
},
|
|
51
|
-
sign: (privateKey, buf) => libsignal.curve.calculateSignature(privateKey, buf),
|
|
52
|
-
verify: (pubKey, message, signature) => {
|
|
53
|
-
try {
|
|
54
|
-
libsignal.curve.verifySignature(generateSignalPubKey(pubKey), message, signature)
|
|
55
|
-
return true
|
|
56
|
-
} catch {
|
|
57
|
-
return false
|
|
58
|
-
}
|
|
59
|
-
}
|
|
60
|
-
}
|
|
61
|
-
|
|
62
|
-
const signedKeyPair = (identityKeyPair, keyId) => {
|
|
63
|
-
const preKey = Curve.generateKeyPair()
|
|
64
|
-
const pubKey = generateSignalPubKey(preKey.public)
|
|
65
|
-
const signature = Curve.sign(identityKeyPair.private, pubKey)
|
|
66
|
-
return { keyPair: preKey, signature, keyId }
|
|
67
|
-
}
|
|
68
|
-
|
|
69
|
-
const GCM_TAG_LENGTH = 128 >> 3
|
|
70
|
-
|
|
71
|
-
function aesEncryptGCM(plaintext, key, iv, additionalData) {
|
|
72
|
-
const cipher = crypto_1.createCipheriv('aes-256-gcm', key, iv)
|
|
73
|
-
cipher.setAAD(additionalData)
|
|
74
|
-
return Buffer.concat([cipher.update(plaintext), cipher.final(), cipher.getAuthTag()])
|
|
75
|
-
}
|
|
76
|
-
|
|
77
|
-
function aesDecryptGCM(ciphertext, key, iv, additionalData) {
|
|
78
|
-
const decipher = crypto_1.createDecipheriv('aes-256-gcm', key, iv)
|
|
79
|
-
const enc = ciphertext.slice(0, ciphertext.length - GCM_TAG_LENGTH)
|
|
80
|
-
const tag = ciphertext.slice(ciphertext.length - GCM_TAG_LENGTH)
|
|
81
|
-
decipher.setAAD(additionalData)
|
|
82
|
-
decipher.setAuthTag(tag)
|
|
83
|
-
return Buffer.concat([decipher.update(enc), decipher.final()])
|
|
84
|
-
}
|
|
85
|
-
|
|
86
|
-
function aesEncryptCTR(plaintext, key, iv) {
|
|
87
|
-
const cipher = crypto_1.createCipheriv('aes-256-ctr', key, iv)
|
|
88
|
-
return Buffer.concat([cipher.update(plaintext), cipher.final()])
|
|
89
|
-
}
|
|
90
|
-
|
|
91
|
-
function aesDecryptCTR(ciphertext, key, iv) {
|
|
92
|
-
const decipher = crypto_1.createDecipheriv('aes-256-ctr', key, iv)
|
|
93
|
-
return Buffer.concat([decipher.update(ciphertext), decipher.final()])
|
|
94
|
-
}
|
|
95
|
-
|
|
96
|
-
function aesDecrypt(buffer, key) {
|
|
97
|
-
return aesDecryptWithIV(buffer.slice(16), key, buffer.slice(0, 16))
|
|
98
|
-
}
|
|
99
|
-
|
|
100
|
-
function aesDecryptWithIV(buffer, key, IV) {
|
|
101
|
-
const aes = crypto_1.createDecipheriv('aes-256-cbc', key, IV)
|
|
102
|
-
return Buffer.concat([aes.update(buffer), aes.final()])
|
|
103
|
-
}
|
|
104
|
-
|
|
105
|
-
function aesEncrypt(buffer, key) {
|
|
106
|
-
const IV = crypto_1.randomBytes(16)
|
|
107
|
-
const aes = crypto_1.createCipheriv('aes-256-cbc', key, IV)
|
|
108
|
-
return Buffer.concat([IV, aes.update(buffer), aes.final()])
|
|
109
|
-
}
|
|
110
|
-
|
|
111
|
-
function aesEncrypWithIV(buffer, key, IV) {
|
|
112
|
-
const aes = crypto_1.createCipheriv('aes-256-cbc', key, IV)
|
|
113
|
-
return Buffer.concat([aes.update(buffer), aes.final()])
|
|
114
|
-
}
|
|
115
|
-
|
|
116
|
-
function hmacSign(buffer, key, variant = 'sha256') {
|
|
117
|
-
return crypto_1.createHmac(variant, key).update(buffer).digest()
|
|
118
|
-
}
|
|
119
|
-
|
|
120
|
-
function sha256(buffer) {
|
|
121
|
-
return crypto_1.createHash('sha256').update(buffer).digest()
|
|
122
|
-
}
|
|
123
|
-
|
|
124
|
-
function md5(buffer) {
|
|
125
|
-
return crypto_1.createHash('md5').update(buffer).digest()
|
|
126
|
-
}
|
|
127
|
-
|
|
128
|
-
async function hkdf(buffer, expandedLength, info) {
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
const
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
const
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
|
|
1
|
+
"use strict"
|
|
2
|
+
|
|
3
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? function(o, m, k, k2) {
|
|
4
|
+
if (k2 === undefined) k2 = k
|
|
5
|
+
var desc = Object.getOwnPropertyDescriptor(m, k)
|
|
6
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
7
|
+
desc = { enumerable: true, get: function() { return m[k] } }
|
|
8
|
+
}
|
|
9
|
+
Object.defineProperty(o, k2, desc)
|
|
10
|
+
} : function(o, m, k, k2) {
|
|
11
|
+
if (k2 === undefined) k2 = k
|
|
12
|
+
o[k2] = m[k]
|
|
13
|
+
})
|
|
14
|
+
|
|
15
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? function(o, v) {
|
|
16
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v })
|
|
17
|
+
} : function(o, v) {
|
|
18
|
+
o["default"] = v
|
|
19
|
+
})
|
|
20
|
+
|
|
21
|
+
var __importStar = (this && this.__importStar) || function(mod) {
|
|
22
|
+
if (mod && mod.__esModule) return mod
|
|
23
|
+
var result = {}
|
|
24
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k)
|
|
25
|
+
__setModuleDefault(result, mod)
|
|
26
|
+
return result
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
Object.defineProperty(exports, "__esModule", { value: true })
|
|
30
|
+
|
|
31
|
+
const crypto_1 = require("crypto")
|
|
32
|
+
const libsignal = __importStar(require("@neelegirl/libsignal"))
|
|
33
|
+
const Defaults_1 = require("../Defaults")
|
|
34
|
+
|
|
35
|
+
const generateSignalPubKey = (pubKey) => (
|
|
36
|
+
pubKey.length === 33 ? pubKey : Buffer.concat([Defaults_1.KEY_BUNDLE_TYPE, pubKey])
|
|
37
|
+
)
|
|
38
|
+
|
|
39
|
+
const Curve = {
|
|
40
|
+
generateKeyPair: () => {
|
|
41
|
+
const { pubKey, privKey } = libsignal.curve.generateKeyPair()
|
|
42
|
+
return {
|
|
43
|
+
private: Buffer.from(privKey),
|
|
44
|
+
public: Buffer.from(pubKey.slice(1))
|
|
45
|
+
}
|
|
46
|
+
},
|
|
47
|
+
sharedKey: (privateKey, publicKey) => {
|
|
48
|
+
const shared = libsignal.curve.calculateAgreement(generateSignalPubKey(publicKey), privateKey)
|
|
49
|
+
return Buffer.from(shared)
|
|
50
|
+
},
|
|
51
|
+
sign: (privateKey, buf) => libsignal.curve.calculateSignature(privateKey, buf),
|
|
52
|
+
verify: (pubKey, message, signature) => {
|
|
53
|
+
try {
|
|
54
|
+
libsignal.curve.verifySignature(generateSignalPubKey(pubKey), message, signature)
|
|
55
|
+
return true
|
|
56
|
+
} catch {
|
|
57
|
+
return false
|
|
58
|
+
}
|
|
59
|
+
}
|
|
60
|
+
}
|
|
61
|
+
|
|
62
|
+
const signedKeyPair = (identityKeyPair, keyId) => {
|
|
63
|
+
const preKey = Curve.generateKeyPair()
|
|
64
|
+
const pubKey = generateSignalPubKey(preKey.public)
|
|
65
|
+
const signature = Curve.sign(identityKeyPair.private, pubKey)
|
|
66
|
+
return { keyPair: preKey, signature, keyId }
|
|
67
|
+
}
|
|
68
|
+
|
|
69
|
+
const GCM_TAG_LENGTH = 128 >> 3
|
|
70
|
+
|
|
71
|
+
function aesEncryptGCM(plaintext, key, iv, additionalData) {
|
|
72
|
+
const cipher = crypto_1.createCipheriv('aes-256-gcm', key, iv)
|
|
73
|
+
cipher.setAAD(additionalData)
|
|
74
|
+
return Buffer.concat([cipher.update(plaintext), cipher.final(), cipher.getAuthTag()])
|
|
75
|
+
}
|
|
76
|
+
|
|
77
|
+
function aesDecryptGCM(ciphertext, key, iv, additionalData) {
|
|
78
|
+
const decipher = crypto_1.createDecipheriv('aes-256-gcm', key, iv)
|
|
79
|
+
const enc = ciphertext.slice(0, ciphertext.length - GCM_TAG_LENGTH)
|
|
80
|
+
const tag = ciphertext.slice(ciphertext.length - GCM_TAG_LENGTH)
|
|
81
|
+
decipher.setAAD(additionalData)
|
|
82
|
+
decipher.setAuthTag(tag)
|
|
83
|
+
return Buffer.concat([decipher.update(enc), decipher.final()])
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
function aesEncryptCTR(plaintext, key, iv) {
|
|
87
|
+
const cipher = crypto_1.createCipheriv('aes-256-ctr', key, iv)
|
|
88
|
+
return Buffer.concat([cipher.update(plaintext), cipher.final()])
|
|
89
|
+
}
|
|
90
|
+
|
|
91
|
+
function aesDecryptCTR(ciphertext, key, iv) {
|
|
92
|
+
const decipher = crypto_1.createDecipheriv('aes-256-ctr', key, iv)
|
|
93
|
+
return Buffer.concat([decipher.update(ciphertext), decipher.final()])
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
function aesDecrypt(buffer, key) {
|
|
97
|
+
return aesDecryptWithIV(buffer.slice(16), key, buffer.slice(0, 16))
|
|
98
|
+
}
|
|
99
|
+
|
|
100
|
+
function aesDecryptWithIV(buffer, key, IV) {
|
|
101
|
+
const aes = crypto_1.createDecipheriv('aes-256-cbc', key, IV)
|
|
102
|
+
return Buffer.concat([aes.update(buffer), aes.final()])
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
function aesEncrypt(buffer, key) {
|
|
106
|
+
const IV = crypto_1.randomBytes(16)
|
|
107
|
+
const aes = crypto_1.createCipheriv('aes-256-cbc', key, IV)
|
|
108
|
+
return Buffer.concat([IV, aes.update(buffer), aes.final()])
|
|
109
|
+
}
|
|
110
|
+
|
|
111
|
+
function aesEncrypWithIV(buffer, key, IV) {
|
|
112
|
+
const aes = crypto_1.createCipheriv('aes-256-cbc', key, IV)
|
|
113
|
+
return Buffer.concat([aes.update(buffer), aes.final()])
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
function hmacSign(buffer, key, variant = 'sha256') {
|
|
117
|
+
return crypto_1.createHmac(variant, key).update(buffer).digest()
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
function sha256(buffer) {
|
|
121
|
+
return crypto_1.createHash('sha256').update(buffer).digest()
|
|
122
|
+
}
|
|
123
|
+
|
|
124
|
+
function md5(buffer) {
|
|
125
|
+
return crypto_1.createHash('md5').update(buffer).digest()
|
|
126
|
+
}
|
|
127
|
+
|
|
128
|
+
async function hkdf(buffer, expandedLength, info) {
|
|
129
|
+
// Normalize to a Uint8Array whose underlying buffer is a regular ArrayBuffer (not ArrayBufferLike)
|
|
130
|
+
// Cloning via new Uint8Array(...) guarantees the generic parameter is ArrayBuffer which satisfies WebCrypto types.
|
|
131
|
+
const inputKeyMaterial = new Uint8Array(buffer instanceof Uint8Array ? buffer : new Uint8Array(buffer))
|
|
132
|
+
|
|
133
|
+
// Set default values if not provided
|
|
134
|
+
const salt = info.salt ? new Uint8Array(info.salt) : new Uint8Array(0)
|
|
135
|
+
const infoBytes = info.info ? new TextEncoder().encode(info.info) : new Uint8Array(0)
|
|
136
|
+
|
|
137
|
+
// Import the input key material (cast to BufferSource to appease TS DOM typings)
|
|
138
|
+
const importedKey = await crypto.subtle.importKey('raw', inputKeyMaterial, { name: 'HKDF' }, false, [
|
|
139
|
+
'deriveBits'
|
|
140
|
+
])
|
|
141
|
+
|
|
142
|
+
const derivedBits = await crypto.subtle.deriveBits({
|
|
143
|
+
name: 'HKDF',
|
|
144
|
+
hash: 'SHA-256',
|
|
145
|
+
salt,
|
|
146
|
+
info: infoBytes
|
|
147
|
+
}, importedKey, expandedLength * 8)
|
|
148
|
+
|
|
149
|
+
return Buffer.from(derivedBits)
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
async function derivePairingCodeKey(pairingCode, salt) {
|
|
153
|
+
const encoder = new TextEncoder()
|
|
154
|
+
const pairingCodeBuffer = encoder.encode(pairingCode)
|
|
155
|
+
const saltBuffer = new Uint8Array(salt instanceof Uint8Array ? salt : new Uint8Array(salt))
|
|
156
|
+
|
|
157
|
+
// Import the pairing code as key material
|
|
158
|
+
const keyMaterial = await crypto.subtle.importKey('raw', pairingCodeBuffer, { name: 'PBKDF2' }, false, [
|
|
159
|
+
'deriveBits'
|
|
160
|
+
])
|
|
161
|
+
|
|
162
|
+
const derivedBits = await crypto.subtle.deriveBits({
|
|
163
|
+
name: 'PBKDF2',
|
|
164
|
+
salt: saltBuffer,
|
|
165
|
+
iterations: 2 << 16,
|
|
166
|
+
hash: 'SHA-256'
|
|
167
|
+
}, keyMaterial, 32 * 8)
|
|
168
|
+
|
|
169
|
+
return Buffer.from(derivedBits)
|
|
170
|
+
}
|
|
171
|
+
|
|
172
|
+
module.exports = {
|
|
173
|
+
generateSignalPubKey,
|
|
174
|
+
Curve,
|
|
175
|
+
signedKeyPair,
|
|
176
|
+
aesEncryptGCM,
|
|
177
|
+
aesDecryptGCM,
|
|
178
|
+
aesEncryptCTR,
|
|
179
|
+
aesDecryptCTR,
|
|
180
|
+
aesDecrypt,
|
|
181
|
+
aesDecryptWithIV,
|
|
182
|
+
aesEncrypt,
|
|
183
|
+
aesEncrypWithIV,
|
|
184
|
+
hmacSign,
|
|
185
|
+
sha256,
|
|
186
|
+
md5,
|
|
187
|
+
hkdf,
|
|
188
|
+
derivePairingCodeKey
|
|
179
189
|
}
|
|
@@ -1,41 +1,53 @@
|
|
|
1
|
-
import { proto } from '
|
|
2
|
-
import { SignalRepository } from '
|
|
3
|
-
import { BinaryNode } from '
|
|
4
|
-
import { ILogger } from '
|
|
5
|
-
|
|
6
|
-
export declare const NO_MESSAGE_FOUND_ERROR_TEXT = "Message absent from node"
|
|
7
|
-
|
|
8
|
-
export declare const MISSING_KEYS_ERROR_TEXT = "Key used already or never filled"
|
|
9
|
-
|
|
10
|
-
export declare const
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
1
|
+
import { proto } from '@neelegirl/baileys/WAProto'
|
|
2
|
+
import { SignalRepository } from '@neelegirl/baileys/lib/Types'
|
|
3
|
+
import { BinaryNode } from '@neelegirl/baileys/lib/WABinary'
|
|
4
|
+
import { ILogger } from '@neelegirl/baileys/lib/Utils/logger'
|
|
5
|
+
|
|
6
|
+
export declare const NO_MESSAGE_FOUND_ERROR_TEXT = "Message absent from node"
|
|
7
|
+
|
|
8
|
+
export declare const MISSING_KEYS_ERROR_TEXT = "Key used already or never filled"
|
|
9
|
+
|
|
10
|
+
export declare const DECRYPTION_RETRY_CONFIG: {
|
|
11
|
+
maxRetries: number
|
|
12
|
+
baseDelayMs: number
|
|
13
|
+
sessionRecordErrors: string[]
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
export declare const NACK_REASONS: {
|
|
17
|
+
ParsingError: number
|
|
18
|
+
UnrecognizedStanza: number
|
|
19
|
+
UnrecognizedStanzaClass: number
|
|
20
|
+
UnrecognizedStanzaType: number
|
|
21
|
+
InvalidProtobuf: number
|
|
22
|
+
InvalidHostedCompanionStanza: number
|
|
23
|
+
MissingMessageSecret: number
|
|
24
|
+
SignalErrorOldCounter: number
|
|
25
|
+
MessageDeletedOnPeer: number
|
|
26
|
+
UnhandledError: number
|
|
27
|
+
UnsupportedAdminRevoke: number
|
|
28
|
+
UnsupportedLIDGroup: number
|
|
29
|
+
DBOperationFailed: number
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
export declare const extractAddressingContext: (stanza: BinaryNode) => {
|
|
33
|
+
addressingMode: string
|
|
34
|
+
senderAlt: string | undefined
|
|
35
|
+
recipientAlt: string | undefined
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
/**
|
|
39
|
+
* Decode the received node as a message.
|
|
40
|
+
* @note this will only parse the message, not decrypt it
|
|
41
|
+
*/
|
|
42
|
+
export declare function decodeMessageNode(stanza: BinaryNode, meId: string, meLid: string): {
|
|
43
|
+
fullMessage: proto.IWebMessageInfo
|
|
44
|
+
author: string
|
|
45
|
+
sender: string
|
|
46
|
+
}
|
|
47
|
+
|
|
48
|
+
export declare const decryptMessageNode: (stanza: BinaryNode, meId: string, meLid: string, repository: SignalRepository, logger: ILogger) => {
|
|
49
|
+
fullMessage: proto.IWebMessageInfo
|
|
50
|
+
category: string
|
|
51
|
+
author: string
|
|
52
|
+
decrypt(): Promise<void>
|
|
41
53
|
}
|