@neelegirl/baileys 1.5.2 → 1.5.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (193) hide show
  1. package/LICENSE +21 -21
  2. package/README.md +195 -187
  3. package/WAProto/WAProto.proto +537 -236
  4. package/WAProto/index.d.ts +5971 -2388
  5. package/WAProto/index.js +17298 -6513
  6. package/lib/Defaults/baileys-version.json +3 -3
  7. package/lib/Defaults/index.d.ts +77 -67
  8. package/lib/Defaults/index.js +148 -136
  9. package/lib/Defaults/phonenumber-mcc.json +223 -223
  10. package/lib/Signal/WASignalGroup/GroupProtocol.js +1908 -1908
  11. package/lib/Signal/WASignalGroup/ciphertext-message.d.ts +9 -0
  12. package/lib/Signal/WASignalGroup/ciphertext-message.js +19 -0
  13. package/lib/Signal/WASignalGroup/ciphertext_message.js +15 -15
  14. package/lib/Signal/WASignalGroup/group-session-builder.d.ts +17 -0
  15. package/lib/Signal/WASignalGroup/group-session-builder.js +72 -0
  16. package/lib/Signal/WASignalGroup/group.proto +41 -41
  17. package/lib/Signal/WASignalGroup/group_cipher.d.ts +19 -0
  18. package/lib/Signal/WASignalGroup/group_cipher.js +101 -110
  19. package/lib/Signal/WASignalGroup/group_session_builder.js +45 -45
  20. package/lib/Signal/WASignalGroup/index.d.ts +11 -0
  21. package/lib/Signal/WASignalGroup/index.js +61 -6
  22. package/lib/Signal/WASignalGroup/keyhelper.d.ts +16 -0
  23. package/lib/Signal/WASignalGroup/keyhelper.js +58 -13
  24. package/lib/Signal/WASignalGroup/protobufs.js +2 -2
  25. package/lib/Signal/WASignalGroup/queue_job.js +68 -68
  26. package/lib/Signal/WASignalGroup/readme.md +5 -5
  27. package/lib/Signal/WASignalGroup/sender-chain-key.d.ts +14 -0
  28. package/lib/Signal/WASignalGroup/sender-chain-key.js +47 -0
  29. package/lib/Signal/WASignalGroup/sender-key-distribution-message.d.ts +17 -0
  30. package/lib/Signal/WASignalGroup/sender-key-distribution-message.js +71 -0
  31. package/lib/Signal/WASignalGroup/sender-key-message.d.ts +19 -0
  32. package/lib/Signal/WASignalGroup/sender-key-message.js +73 -0
  33. package/lib/Signal/WASignalGroup/sender-key-name.d.ts +19 -0
  34. package/lib/Signal/WASignalGroup/sender-key-name.js +59 -0
  35. package/lib/Signal/WASignalGroup/sender-key-record.d.ts +32 -0
  36. package/lib/Signal/WASignalGroup/sender-key-record.js +58 -0
  37. package/lib/Signal/WASignalGroup/sender-key-state.d.ts +44 -0
  38. package/lib/Signal/WASignalGroup/sender-key-state.js +147 -0
  39. package/lib/Signal/WASignalGroup/sender-message-key.d.ts +11 -0
  40. package/lib/Signal/WASignalGroup/sender-message-key.js +33 -0
  41. package/lib/Signal/WASignalGroup/sender_chain_key.js +49 -49
  42. package/lib/Signal/WASignalGroup/sender_key_distribution_message.js +77 -77
  43. package/lib/Signal/WASignalGroup/sender_key_message.js +91 -91
  44. package/lib/Signal/WASignalGroup/sender_key_name.js +69 -69
  45. package/lib/Signal/WASignalGroup/sender_key_record.js +55 -55
  46. package/lib/Signal/WASignalGroup/sender_key_state.js +128 -128
  47. package/lib/Signal/WASignalGroup/sender_message_key.js +38 -38
  48. package/lib/Signal/libsignal.d.ts +5 -1
  49. package/lib/Signal/libsignal.js +390 -161
  50. package/lib/Signal/lid-mapping.d.ts +28 -0
  51. package/lib/Signal/lid-mapping.js +184 -0
  52. package/lib/Socket/Client/abstract-socket-client.d.ts +15 -15
  53. package/lib/Socket/Client/abstract-socket-client.js +13 -13
  54. package/lib/Socket/Client/index.d.ts +2 -2
  55. package/lib/Socket/Client/mobile-socket-client.d.ts +12 -12
  56. package/lib/Socket/Client/mobile-socket-client.js +65 -65
  57. package/lib/Socket/Client/types.d.ts +1 -1
  58. package/lib/Socket/Client/websocket.d.ts +1 -1
  59. package/lib/Socket/business.d.ts +6 -6
  60. package/lib/Socket/business.js +152 -5
  61. package/lib/Socket/chats.d.ts +3 -4
  62. package/lib/Socket/chats.js +31 -26
  63. package/lib/Socket/communities.d.ts +223 -223
  64. package/lib/Socket/communities.js +432 -432
  65. package/lib/Socket/groups.d.ts +2 -4
  66. package/lib/Socket/groups.js +22 -14
  67. package/lib/Socket/index.d.ts +69 -69
  68. package/lib/Socket/index.js +3 -2
  69. package/lib/Socket/messages-recv.d.ts +3 -6
  70. package/lib/Socket/messages-recv.js +1449 -1707
  71. package/lib/Socket/messages-send.d.ts +2 -4
  72. package/lib/Socket/messages-send.js +617 -126
  73. package/lib/Socket/mex.d.ts +2 -2
  74. package/lib/Socket/mex.js +46 -46
  75. package/lib/Socket/newsletter.d.ts +2 -4
  76. package/lib/Socket/newsletter.js +294 -285
  77. package/lib/Socket/socket.js +318 -132
  78. package/lib/Socket/usync.js +3 -3
  79. package/lib/Store/index.d.ts +4 -4
  80. package/lib/Store/index.js +23 -23
  81. package/lib/Store/make-cache-manager-store.d.ts +13 -13
  82. package/lib/Store/make-cache-manager-store.js +89 -89
  83. package/lib/Store/make-in-memory-store.d.ts +122 -122
  84. package/lib/Store/make-in-memory-store.js +428 -428
  85. package/lib/Store/make-ordered-dictionary.d.ts +11 -11
  86. package/lib/Store/make-ordered-dictionary.js +85 -85
  87. package/lib/Store/object-repository.d.ts +9 -9
  88. package/lib/Store/object-repository.js +30 -30
  89. package/lib/Types/Auth.d.ts +5 -4
  90. package/lib/Types/Bussines.js +3 -0
  91. package/lib/Types/Bussiness.d.ts +28 -0
  92. package/lib/Types/Chat.d.ts +13 -8
  93. package/lib/Types/Contact.d.ts +4 -1
  94. package/lib/Types/Events.d.ts +13 -16
  95. package/lib/Types/GroupMetadata.d.ts +1 -1
  96. package/lib/Types/Message.d.ts +18 -7
  97. package/lib/Types/Message.js +7 -1
  98. package/lib/Types/MexUpdates.d.ts +8 -8
  99. package/lib/Types/MexUpdates.js +17 -17
  100. package/lib/Types/Newsletter.d.ts +1 -1
  101. package/lib/Types/Product.d.ts +1 -1
  102. package/lib/Types/Signal.d.ts +31 -1
  103. package/lib/Types/Socket.d.ts +34 -13
  104. package/lib/Types/State.d.ts +1 -1
  105. package/lib/Types/USync.d.ts +2 -2
  106. package/lib/Types/index.d.ts +16 -15
  107. package/lib/Types/index.js +4 -2
  108. package/lib/Utils/auth-utils.d.ts +20 -20
  109. package/lib/Utils/auth-utils.js +527 -204
  110. package/lib/Utils/baileys-event-stream.d.ts +17 -17
  111. package/lib/Utils/baileys-event-stream.js +69 -69
  112. package/lib/Utils/business.d.ts +28 -28
  113. package/lib/Utils/business.js +254 -254
  114. package/lib/Utils/chat-utils.d.ts +81 -81
  115. package/lib/Utils/chat-utils.js +808 -780
  116. package/lib/Utils/crypto.d.ts +55 -55
  117. package/lib/Utils/crypto.js +188 -178
  118. package/lib/Utils/decode-wa-message.d.ts +52 -40
  119. package/lib/Utils/decode-wa-message.js +322 -252
  120. package/lib/Utils/event-buffer.d.ts +38 -38
  121. package/lib/Utils/event-buffer.js +594 -564
  122. package/lib/Utils/generics.d.ts +131 -129
  123. package/lib/Utils/generics.js +629 -623
  124. package/lib/Utils/history.d.ts +22 -22
  125. package/lib/Utils/history.js +103 -109
  126. package/lib/Utils/index.d.ts +20 -19
  127. package/lib/Utils/index.js +39 -38
  128. package/lib/Utils/link-preview.d.ts +22 -22
  129. package/lib/Utils/link-preview.js +119 -119
  130. package/lib/Utils/logger.d.ts +13 -13
  131. package/lib/Utils/logger.js +7 -7
  132. package/lib/Utils/lt-hash.d.ts +13 -13
  133. package/lib/Utils/lt-hash.js +57 -57
  134. package/lib/Utils/make-mutex.d.ts +8 -8
  135. package/lib/Utils/make-mutex.js +48 -48
  136. package/lib/Utils/message-retry-manager.d.ts +88 -0
  137. package/lib/Utils/message-retry-manager.js +160 -0
  138. package/lib/Utils/messages-media.d.ts +134 -128
  139. package/lib/Utils/messages-media.js +868 -805
  140. package/lib/Utils/messages.d.ts +104 -102
  141. package/lib/Utils/messages.js +1744 -1578
  142. package/lib/Utils/noise-handler.d.ts +20 -19
  143. package/lib/Utils/noise-handler.js +164 -154
  144. package/lib/Utils/process-message.d.ts +48 -48
  145. package/lib/Utils/process-message.js +427 -428
  146. package/lib/Utils/signal.d.ts +41 -41
  147. package/lib/Utils/signal.js +165 -165
  148. package/lib/Utils/use-mongo-file-auth-state.d.ts +5 -5
  149. package/lib/Utils/use-mongo-file-auth-state.js +83 -83
  150. package/lib/Utils/use-multi-file-auth-state.d.ts +17 -17
  151. package/lib/Utils/use-multi-file-auth-state.js +237 -237
  152. package/lib/Utils/use-single-file-auth-state.d.ts +12 -12
  153. package/lib/Utils/use-single-file-auth-state.js +79 -79
  154. package/lib/Utils/validate-connection.d.ts +12 -12
  155. package/lib/Utils/validate-connection.js +219 -186
  156. package/lib/WABinary/constants.d.ts +29 -29
  157. package/lib/WABinary/constants.js +1315 -1315
  158. package/lib/WABinary/decode.d.ts +8 -8
  159. package/lib/WABinary/decode.js +287 -287
  160. package/lib/WABinary/encode.d.ts +2 -2
  161. package/lib/WABinary/encode.js +264 -264
  162. package/lib/WABinary/generic-utils.d.ts +27 -27
  163. package/lib/WABinary/generic-utils.js +141 -141
  164. package/lib/WABinary/index.d.ts +5 -5
  165. package/lib/WABinary/index.js +24 -24
  166. package/lib/WABinary/jid-utils.d.ts +58 -53
  167. package/lib/WABinary/jid-utils.js +103 -91
  168. package/lib/WABinary/types.d.ts +21 -21
  169. package/lib/WABinary/types.js +2 -2
  170. package/lib/WAM/BinaryInfo.d.ts +15 -15
  171. package/lib/WAM/BinaryInfo.js +16 -16
  172. package/lib/WAM/constants.d.ts +46 -46
  173. package/lib/WAM/constants.js +15370 -15370
  174. package/lib/WAM/encode.d.ts +2 -2
  175. package/lib/WAM/encode.js +163 -164
  176. package/lib/WAM/index.d.ts +3 -3
  177. package/lib/WAM/index.js +22 -22
  178. package/lib/WAUSync/Protocols/USyncBotProfileProtocol.d.ts +27 -27
  179. package/lib/WAUSync/Protocols/USyncBotProfileProtocol.js +68 -68
  180. package/lib/WAUSync/Protocols/USyncContactProtocol.d.ts +3 -3
  181. package/lib/WAUSync/Protocols/USyncDeviceProtocol.d.ts +2 -2
  182. package/lib/WAUSync/Protocols/USyncDisappearingModeProtocol.d.ts +2 -2
  183. package/lib/WAUSync/Protocols/USyncLIDProtocol.d.ts +9 -8
  184. package/lib/WAUSync/Protocols/USyncLIDProtocol.js +37 -29
  185. package/lib/WAUSync/Protocols/USyncStatusProtocol.d.ts +2 -2
  186. package/lib/WAUSync/Protocols/index.d.ts +6 -6
  187. package/lib/WAUSync/USyncQuery.d.ts +3 -3
  188. package/lib/WAUSync/index.d.ts +3 -3
  189. package/lib/index.d.ts +13 -13
  190. package/lib/index.js +33 -33
  191. package/package.json +96 -94
  192. package/lib/Socket/registration.d.ts +0 -266
  193. package/lib/Socket/registration.js +0 -166
@@ -1,56 +1,56 @@
1
- import { KeyPair } from '../Types'
2
-
3
- /** prefix version byte to the pub keys, required for some curve crypto functions */
4
- export declare const generateSignalPubKey: (pubKey: Uint8Array | Buffer) => Uint8Array | Buffer
5
-
6
- export declare const Curve: {
7
- generateKeyPair: () => KeyPair
8
- sharedKey: (privateKey: Uint8Array, publicKey: Uint8Array) => Buffer
9
- sign: (privateKey: Uint8Array, buf: Uint8Array) => any
10
- verify: (pubKey: Uint8Array, message: Uint8Array, signature: Uint8Array) => boolean
11
- }
12
-
13
- export declare const signedKeyPair: (identityKeyPair: KeyPair, keyId: number) => {
14
- keyPair: KeyPair
15
- signature: any
16
- keyId: number
17
- }
18
-
19
- /**
20
- * encrypt AES 256 GCM
21
- * where the tag tag is suffixed to the ciphertext
22
- * */
23
- export declare function aesEncryptGCM(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer
24
-
25
- /**
26
- * decrypt AES 256 GCM
27
- * where the auth tag is suffixed to the ciphertext
28
- * */
29
- export declare function aesDecryptGCM(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer
30
-
31
- export declare function aesEncryptCTR(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer
32
-
33
- export declare function aesDecryptCTR(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer
34
-
35
- /** decrypt AES 256 CBC where the IV is prefixed to the buffer */
36
- export declare function aesDecrypt(buffer: Buffer, key: Buffer): Buffer
37
- /** decrypt AES 256 CBC */
38
-
39
- export declare function aesDecryptWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer
40
-
41
- export declare function aesEncrypt(buffer: Buffer | Uint8Array, key: Buffer): Buffer
42
-
43
- export declare function aesEncrypWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer
44
-
45
- export declare function hmacSign(buffer: Buffer | Uint8Array, key: Buffer | Uint8Array, variant?: 'sha256' | 'sha512'): Buffer
46
-
47
- export declare function sha256(buffer: Buffer): Buffer
48
-
49
- export declare function md5(buffer: Buffer): Buffer
50
-
51
- export declare function hkdf(buffer: Uint8Array | Buffer, expandedLength: number, info: {
52
- salt?: Buffer
53
- info?: string
54
- }): Promise<Buffer>
55
-
1
+ import { KeyPair } from '@neelegirl/baileys/lib/Types'
2
+
3
+ /** prefix version byte to the pub keys, required for some curve crypto functions */
4
+ export declare const generateSignalPubKey: (pubKey: Uint8Array | Buffer) => Uint8Array | Buffer
5
+
6
+ export declare const Curve: {
7
+ generateKeyPair: () => KeyPair
8
+ sharedKey: (privateKey: Uint8Array, publicKey: Uint8Array) => Buffer
9
+ sign: (privateKey: Uint8Array, buf: Uint8Array) => any
10
+ verify: (pubKey: Uint8Array, message: Uint8Array, signature: Uint8Array) => boolean
11
+ }
12
+
13
+ export declare const signedKeyPair: (identityKeyPair: KeyPair, keyId: number) => {
14
+ keyPair: KeyPair
15
+ signature: any
16
+ keyId: number
17
+ }
18
+
19
+ /**
20
+ * encrypt AES 256 GCM
21
+ * where the tag tag is suffixed to the ciphertext
22
+ * */
23
+ export declare function aesEncryptGCM(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer
24
+
25
+ /**
26
+ * decrypt AES 256 GCM
27
+ * where the auth tag is suffixed to the ciphertext
28
+ * */
29
+ export declare function aesDecryptGCM(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer
30
+
31
+ export declare function aesEncryptCTR(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer
32
+
33
+ export declare function aesDecryptCTR(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer
34
+
35
+ /** decrypt AES 256 CBC where the IV is prefixed to the buffer */
36
+ export declare function aesDecrypt(buffer: Buffer, key: Buffer): Buffer
37
+ /** decrypt AES 256 CBC */
38
+
39
+ export declare function aesDecryptWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer
40
+
41
+ export declare function aesEncrypt(buffer: Buffer | Uint8Array, key: Buffer): Buffer
42
+
43
+ export declare function aesEncrypWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer
44
+
45
+ export declare function hmacSign(buffer: Buffer | Uint8Array, key: Buffer | Uint8Array, variant?: 'sha256' | 'sha512'): Buffer
46
+
47
+ export declare function sha256(buffer: Buffer): Buffer
48
+
49
+ export declare function md5(buffer: Buffer): Buffer
50
+
51
+ export declare function hkdf(buffer: Uint8Array | Buffer, expandedLength: number, info: {
52
+ salt?: Buffer
53
+ info?: string
54
+ }): Promise<Buffer>
55
+
56
56
  export declare function derivePairingCodeKey(pairingCode: string, salt: Buffer): Promise<Buffer>
@@ -1,179 +1,189 @@
1
- "use strict"
2
-
3
- var __createBinding = (this && this.__createBinding) || (Object.create ? function(o, m, k, k2) {
4
- if (k2 === undefined) k2 = k
5
- var desc = Object.getOwnPropertyDescriptor(m, k)
6
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
7
- desc = { enumerable: true, get: function() { return m[k] } }
8
- }
9
- Object.defineProperty(o, k2, desc)
10
- } : function(o, m, k, k2) {
11
- if (k2 === undefined) k2 = k
12
- o[k2] = m[k]
13
- })
14
-
15
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? function(o, v) {
16
- Object.defineProperty(o, "default", { enumerable: true, value: v })
17
- } : function(o, v) {
18
- o["default"] = v
19
- })
20
-
21
- var __importStar = (this && this.__importStar) || function(mod) {
22
- if (mod && mod.__esModule) return mod
23
- var result = {}
24
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k)
25
- __setModuleDefault(result, mod)
26
- return result
27
- }
28
-
29
- Object.defineProperty(exports, "__esModule", { value: true })
30
-
31
- const crypto_1 = require("crypto")
32
- const libsignal = __importStar(require("@neelegirl/libsignal"))
33
- const Defaults_1 = require("../Defaults")
34
-
35
- const generateSignalPubKey = (pubKey) => (
36
- pubKey.length === 33 ? pubKey : Buffer.concat([Defaults_1.KEY_BUNDLE_TYPE, pubKey])
37
- )
38
-
39
- const Curve = {
40
- generateKeyPair: () => {
41
- const { pubKey, privKey } = libsignal.curve.generateKeyPair()
42
- return {
43
- private: Buffer.from(privKey),
44
- public: Buffer.from(pubKey.slice(1))
45
- }
46
- },
47
- sharedKey: (privateKey, publicKey) => {
48
- const shared = libsignal.curve.calculateAgreement(generateSignalPubKey(publicKey), privateKey)
49
- return Buffer.from(shared)
50
- },
51
- sign: (privateKey, buf) => libsignal.curve.calculateSignature(privateKey, buf),
52
- verify: (pubKey, message, signature) => {
53
- try {
54
- libsignal.curve.verifySignature(generateSignalPubKey(pubKey), message, signature)
55
- return true
56
- } catch {
57
- return false
58
- }
59
- }
60
- }
61
-
62
- const signedKeyPair = (identityKeyPair, keyId) => {
63
- const preKey = Curve.generateKeyPair()
64
- const pubKey = generateSignalPubKey(preKey.public)
65
- const signature = Curve.sign(identityKeyPair.private, pubKey)
66
- return { keyPair: preKey, signature, keyId }
67
- }
68
-
69
- const GCM_TAG_LENGTH = 128 >> 3
70
-
71
- function aesEncryptGCM(plaintext, key, iv, additionalData) {
72
- const cipher = crypto_1.createCipheriv('aes-256-gcm', key, iv)
73
- cipher.setAAD(additionalData)
74
- return Buffer.concat([cipher.update(plaintext), cipher.final(), cipher.getAuthTag()])
75
- }
76
-
77
- function aesDecryptGCM(ciphertext, key, iv, additionalData) {
78
- const decipher = crypto_1.createDecipheriv('aes-256-gcm', key, iv)
79
- const enc = ciphertext.slice(0, ciphertext.length - GCM_TAG_LENGTH)
80
- const tag = ciphertext.slice(ciphertext.length - GCM_TAG_LENGTH)
81
- decipher.setAAD(additionalData)
82
- decipher.setAuthTag(tag)
83
- return Buffer.concat([decipher.update(enc), decipher.final()])
84
- }
85
-
86
- function aesEncryptCTR(plaintext, key, iv) {
87
- const cipher = crypto_1.createCipheriv('aes-256-ctr', key, iv)
88
- return Buffer.concat([cipher.update(plaintext), cipher.final()])
89
- }
90
-
91
- function aesDecryptCTR(ciphertext, key, iv) {
92
- const decipher = crypto_1.createDecipheriv('aes-256-ctr', key, iv)
93
- return Buffer.concat([decipher.update(ciphertext), decipher.final()])
94
- }
95
-
96
- function aesDecrypt(buffer, key) {
97
- return aesDecryptWithIV(buffer.slice(16), key, buffer.slice(0, 16))
98
- }
99
-
100
- function aesDecryptWithIV(buffer, key, IV) {
101
- const aes = crypto_1.createDecipheriv('aes-256-cbc', key, IV)
102
- return Buffer.concat([aes.update(buffer), aes.final()])
103
- }
104
-
105
- function aesEncrypt(buffer, key) {
106
- const IV = crypto_1.randomBytes(16)
107
- const aes = crypto_1.createCipheriv('aes-256-cbc', key, IV)
108
- return Buffer.concat([IV, aes.update(buffer), aes.final()])
109
- }
110
-
111
- function aesEncrypWithIV(buffer, key, IV) {
112
- const aes = crypto_1.createCipheriv('aes-256-cbc', key, IV)
113
- return Buffer.concat([aes.update(buffer), aes.final()])
114
- }
115
-
116
- function hmacSign(buffer, key, variant = 'sha256') {
117
- return crypto_1.createHmac(variant, key).update(buffer).digest()
118
- }
119
-
120
- function sha256(buffer) {
121
- return crypto_1.createHash('sha256').update(buffer).digest()
122
- }
123
-
124
- function md5(buffer) {
125
- return crypto_1.createHash('md5').update(buffer).digest()
126
- }
127
-
128
- async function hkdf(buffer, expandedLength, info) {
129
- const inputKeyMaterial = buffer instanceof Uint8Array ? buffer : new Uint8Array(buffer)
130
- const salt = info.salt ? new Uint8Array(info.salt) : new Uint8Array(0)
131
- const infoBytes = info.info ? new TextEncoder().encode(info.info) : new Uint8Array(0)
132
-
133
- const importedKey = await crypto.subtle.importKey('raw', inputKeyMaterial, { name: 'HKDF' }, false, ['deriveBits'])
134
-
135
- const derivedBits = await crypto.subtle.deriveBits({
136
- name: 'HKDF',
137
- hash: 'SHA-256',
138
- salt,
139
- info: infoBytes
140
- }, importedKey, expandedLength * 8)
141
-
142
- return Buffer.from(derivedBits)
143
- }
144
-
145
- async function derivePairingCodeKey(pairingCode, salt) {
146
- const encoder = new TextEncoder()
147
- const pairingCodeBuffer = encoder.encode(pairingCode)
148
- const saltBuffer = salt instanceof Uint8Array ? salt : new Uint8Array(salt)
149
-
150
- const keyMaterial = await crypto.subtle.importKey('raw', pairingCodeBuffer, { name: 'PBKDF2' }, false, ['deriveBits'])
151
-
152
- const derivedBits = await crypto.subtle.deriveBits({
153
- name: 'PBKDF2',
154
- salt: saltBuffer,
155
- iterations: 2 << 16,
156
- hash: 'SHA-256'
157
- }, keyMaterial, 32 * 8)
158
-
159
- return Buffer.from(derivedBits)
160
- }
161
-
162
- module.exports = {
163
- generateSignalPubKey,
164
- Curve,
165
- signedKeyPair,
166
- aesEncryptGCM,
167
- aesDecryptGCM,
168
- aesEncryptCTR,
169
- aesDecryptCTR,
170
- aesDecrypt,
171
- aesDecryptWithIV,
172
- aesEncrypt,
173
- aesEncrypWithIV,
174
- hmacSign,
175
- sha256,
176
- md5,
177
- hkdf,
178
- derivePairingCodeKey
1
+ "use strict"
2
+
3
+ var __createBinding = (this && this.__createBinding) || (Object.create ? function(o, m, k, k2) {
4
+ if (k2 === undefined) k2 = k
5
+ var desc = Object.getOwnPropertyDescriptor(m, k)
6
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
7
+ desc = { enumerable: true, get: function() { return m[k] } }
8
+ }
9
+ Object.defineProperty(o, k2, desc)
10
+ } : function(o, m, k, k2) {
11
+ if (k2 === undefined) k2 = k
12
+ o[k2] = m[k]
13
+ })
14
+
15
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? function(o, v) {
16
+ Object.defineProperty(o, "default", { enumerable: true, value: v })
17
+ } : function(o, v) {
18
+ o["default"] = v
19
+ })
20
+
21
+ var __importStar = (this && this.__importStar) || function(mod) {
22
+ if (mod && mod.__esModule) return mod
23
+ var result = {}
24
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k)
25
+ __setModuleDefault(result, mod)
26
+ return result
27
+ }
28
+
29
+ Object.defineProperty(exports, "__esModule", { value: true })
30
+
31
+ const crypto_1 = require("crypto")
32
+ const libsignal = __importStar(require("@neelegirl/libsignal"))
33
+ const Defaults_1 = require("../Defaults")
34
+
35
+ const generateSignalPubKey = (pubKey) => (
36
+ pubKey.length === 33 ? pubKey : Buffer.concat([Defaults_1.KEY_BUNDLE_TYPE, pubKey])
37
+ )
38
+
39
+ const Curve = {
40
+ generateKeyPair: () => {
41
+ const { pubKey, privKey } = libsignal.curve.generateKeyPair()
42
+ return {
43
+ private: Buffer.from(privKey),
44
+ public: Buffer.from(pubKey.slice(1))
45
+ }
46
+ },
47
+ sharedKey: (privateKey, publicKey) => {
48
+ const shared = libsignal.curve.calculateAgreement(generateSignalPubKey(publicKey), privateKey)
49
+ return Buffer.from(shared)
50
+ },
51
+ sign: (privateKey, buf) => libsignal.curve.calculateSignature(privateKey, buf),
52
+ verify: (pubKey, message, signature) => {
53
+ try {
54
+ libsignal.curve.verifySignature(generateSignalPubKey(pubKey), message, signature)
55
+ return true
56
+ } catch {
57
+ return false
58
+ }
59
+ }
60
+ }
61
+
62
+ const signedKeyPair = (identityKeyPair, keyId) => {
63
+ const preKey = Curve.generateKeyPair()
64
+ const pubKey = generateSignalPubKey(preKey.public)
65
+ const signature = Curve.sign(identityKeyPair.private, pubKey)
66
+ return { keyPair: preKey, signature, keyId }
67
+ }
68
+
69
+ const GCM_TAG_LENGTH = 128 >> 3
70
+
71
+ function aesEncryptGCM(plaintext, key, iv, additionalData) {
72
+ const cipher = crypto_1.createCipheriv('aes-256-gcm', key, iv)
73
+ cipher.setAAD(additionalData)
74
+ return Buffer.concat([cipher.update(plaintext), cipher.final(), cipher.getAuthTag()])
75
+ }
76
+
77
+ function aesDecryptGCM(ciphertext, key, iv, additionalData) {
78
+ const decipher = crypto_1.createDecipheriv('aes-256-gcm', key, iv)
79
+ const enc = ciphertext.slice(0, ciphertext.length - GCM_TAG_LENGTH)
80
+ const tag = ciphertext.slice(ciphertext.length - GCM_TAG_LENGTH)
81
+ decipher.setAAD(additionalData)
82
+ decipher.setAuthTag(tag)
83
+ return Buffer.concat([decipher.update(enc), decipher.final()])
84
+ }
85
+
86
+ function aesEncryptCTR(plaintext, key, iv) {
87
+ const cipher = crypto_1.createCipheriv('aes-256-ctr', key, iv)
88
+ return Buffer.concat([cipher.update(plaintext), cipher.final()])
89
+ }
90
+
91
+ function aesDecryptCTR(ciphertext, key, iv) {
92
+ const decipher = crypto_1.createDecipheriv('aes-256-ctr', key, iv)
93
+ return Buffer.concat([decipher.update(ciphertext), decipher.final()])
94
+ }
95
+
96
+ function aesDecrypt(buffer, key) {
97
+ return aesDecryptWithIV(buffer.slice(16), key, buffer.slice(0, 16))
98
+ }
99
+
100
+ function aesDecryptWithIV(buffer, key, IV) {
101
+ const aes = crypto_1.createDecipheriv('aes-256-cbc', key, IV)
102
+ return Buffer.concat([aes.update(buffer), aes.final()])
103
+ }
104
+
105
+ function aesEncrypt(buffer, key) {
106
+ const IV = crypto_1.randomBytes(16)
107
+ const aes = crypto_1.createCipheriv('aes-256-cbc', key, IV)
108
+ return Buffer.concat([IV, aes.update(buffer), aes.final()])
109
+ }
110
+
111
+ function aesEncrypWithIV(buffer, key, IV) {
112
+ const aes = crypto_1.createCipheriv('aes-256-cbc', key, IV)
113
+ return Buffer.concat([aes.update(buffer), aes.final()])
114
+ }
115
+
116
+ function hmacSign(buffer, key, variant = 'sha256') {
117
+ return crypto_1.createHmac(variant, key).update(buffer).digest()
118
+ }
119
+
120
+ function sha256(buffer) {
121
+ return crypto_1.createHash('sha256').update(buffer).digest()
122
+ }
123
+
124
+ function md5(buffer) {
125
+ return crypto_1.createHash('md5').update(buffer).digest()
126
+ }
127
+
128
+ async function hkdf(buffer, expandedLength, info) {
129
+ // Normalize to a Uint8Array whose underlying buffer is a regular ArrayBuffer (not ArrayBufferLike)
130
+ // Cloning via new Uint8Array(...) guarantees the generic parameter is ArrayBuffer which satisfies WebCrypto types.
131
+ const inputKeyMaterial = new Uint8Array(buffer instanceof Uint8Array ? buffer : new Uint8Array(buffer))
132
+
133
+ // Set default values if not provided
134
+ const salt = info.salt ? new Uint8Array(info.salt) : new Uint8Array(0)
135
+ const infoBytes = info.info ? new TextEncoder().encode(info.info) : new Uint8Array(0)
136
+
137
+ // Import the input key material (cast to BufferSource to appease TS DOM typings)
138
+ const importedKey = await crypto.subtle.importKey('raw', inputKeyMaterial, { name: 'HKDF' }, false, [
139
+ 'deriveBits'
140
+ ])
141
+
142
+ const derivedBits = await crypto.subtle.deriveBits({
143
+ name: 'HKDF',
144
+ hash: 'SHA-256',
145
+ salt,
146
+ info: infoBytes
147
+ }, importedKey, expandedLength * 8)
148
+
149
+ return Buffer.from(derivedBits)
150
+ }
151
+
152
+ async function derivePairingCodeKey(pairingCode, salt) {
153
+ const encoder = new TextEncoder()
154
+ const pairingCodeBuffer = encoder.encode(pairingCode)
155
+ const saltBuffer = new Uint8Array(salt instanceof Uint8Array ? salt : new Uint8Array(salt))
156
+
157
+ // Import the pairing code as key material
158
+ const keyMaterial = await crypto.subtle.importKey('raw', pairingCodeBuffer, { name: 'PBKDF2' }, false, [
159
+ 'deriveBits'
160
+ ])
161
+
162
+ const derivedBits = await crypto.subtle.deriveBits({
163
+ name: 'PBKDF2',
164
+ salt: saltBuffer,
165
+ iterations: 2 << 16,
166
+ hash: 'SHA-256'
167
+ }, keyMaterial, 32 * 8)
168
+
169
+ return Buffer.from(derivedBits)
170
+ }
171
+
172
+ module.exports = {
173
+ generateSignalPubKey,
174
+ Curve,
175
+ signedKeyPair,
176
+ aesEncryptGCM,
177
+ aesDecryptGCM,
178
+ aesEncryptCTR,
179
+ aesDecryptCTR,
180
+ aesDecrypt,
181
+ aesDecryptWithIV,
182
+ aesEncrypt,
183
+ aesEncrypWithIV,
184
+ hmacSign,
185
+ sha256,
186
+ md5,
187
+ hkdf,
188
+ derivePairingCodeKey
179
189
  }
@@ -1,41 +1,53 @@
1
- import { proto } from '../../WAProto'
2
- import { SignalRepository } from '../Types'
3
- import { BinaryNode } from '../WABinary'
4
- import { ILogger } from './logger'
5
-
6
- export declare const NO_MESSAGE_FOUND_ERROR_TEXT = "Message absent from node"
7
-
8
- export declare const MISSING_KEYS_ERROR_TEXT = "Key used already or never filled"
9
-
10
- export declare const NACK_REASONS: {
11
- ParsingError: number
12
- UnrecognizedStanza: number
13
- UnrecognizedStanzaClass: number
14
- UnrecognizedStanzaType: number
15
- InvalidProtobuf: number
16
- InvalidHostedCompanionStanza: number
17
- MissingMessageSecret: number
18
- SignalErrorOldCounter: number
19
- MessageDeletedOnPeer: number
20
- UnhandledError: number
21
- UnsupportedAdminRevoke: number
22
- UnsupportedLIDGroup: number
23
- DBOperationFailed: number
24
- }
25
-
26
- /**
27
- * Decode the received node as a message.
28
- * @note this will only parse the message, not decrypt it
29
- */
30
- export declare function decodeMessageNode(stanza: BinaryNode, meId: string, meLid: string): {
31
- fullMessage: proto.IWebMessageInfo
32
- author: string
33
- sender: string
34
- }
35
-
36
- export declare const decryptMessageNode: (stanza: BinaryNode, meId: string, meLid: string, repository: SignalRepository, logger: ILogger) => {
37
- fullMessage: proto.IWebMessageInfo
38
- category: string
39
- author: string
40
- decrypt(): Promise<void>
1
+ import { proto } from '@neelegirl/baileys/WAProto'
2
+ import { SignalRepository } from '@neelegirl/baileys/lib/Types'
3
+ import { BinaryNode } from '@neelegirl/baileys/lib/WABinary'
4
+ import { ILogger } from '@neelegirl/baileys/lib/Utils/logger'
5
+
6
+ export declare const NO_MESSAGE_FOUND_ERROR_TEXT = "Message absent from node"
7
+
8
+ export declare const MISSING_KEYS_ERROR_TEXT = "Key used already or never filled"
9
+
10
+ export declare const DECRYPTION_RETRY_CONFIG: {
11
+ maxRetries: number
12
+ baseDelayMs: number
13
+ sessionRecordErrors: string[]
14
+ }
15
+
16
+ export declare const NACK_REASONS: {
17
+ ParsingError: number
18
+ UnrecognizedStanza: number
19
+ UnrecognizedStanzaClass: number
20
+ UnrecognizedStanzaType: number
21
+ InvalidProtobuf: number
22
+ InvalidHostedCompanionStanza: number
23
+ MissingMessageSecret: number
24
+ SignalErrorOldCounter: number
25
+ MessageDeletedOnPeer: number
26
+ UnhandledError: number
27
+ UnsupportedAdminRevoke: number
28
+ UnsupportedLIDGroup: number
29
+ DBOperationFailed: number
30
+ }
31
+
32
+ export declare const extractAddressingContext: (stanza: BinaryNode) => {
33
+ addressingMode: string
34
+ senderAlt: string | undefined
35
+ recipientAlt: string | undefined
36
+ }
37
+
38
+ /**
39
+ * Decode the received node as a message.
40
+ * @note this will only parse the message, not decrypt it
41
+ */
42
+ export declare function decodeMessageNode(stanza: BinaryNode, meId: string, meLid: string): {
43
+ fullMessage: proto.IWebMessageInfo
44
+ author: string
45
+ sender: string
46
+ }
47
+
48
+ export declare const decryptMessageNode: (stanza: BinaryNode, meId: string, meLid: string, repository: SignalRepository, logger: ILogger) => {
49
+ fullMessage: proto.IWebMessageInfo
50
+ category: string
51
+ author: string
52
+ decrypt(): Promise<void>
41
53
  }