@oxyhq/services 5.16.34 → 5.16.36
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -26
- package/lib/commonjs/core/OxyServices.base.js.map +1 -1
- package/lib/commonjs/core/mixins/OxyServices.user.js.map +1 -1
- package/lib/commonjs/core/mixins/OxyServices.utility.js.map +1 -1
- package/lib/commonjs/crypto/README.md +142 -0
- package/lib/commonjs/crypto/core.js +147 -0
- package/lib/commonjs/crypto/core.js.map +1 -0
- package/lib/commonjs/crypto/index.js +16 -0
- package/lib/commonjs/crypto/index.js.map +1 -1
- package/lib/commonjs/crypto/keyManager.js +19 -24
- package/lib/commonjs/crypto/keyManager.js.map +1 -1
- package/lib/commonjs/crypto/signatureService.js +116 -37
- package/lib/commonjs/crypto/signatureService.js.map +1 -1
- package/lib/commonjs/index.js.map +1 -1
- package/lib/commonjs/models/interfaces.js +10 -11
- package/lib/commonjs/models/interfaces.js.map +1 -1
- package/lib/commonjs/node/index.js +10 -1
- package/lib/commonjs/node/index.js.map +1 -1
- package/lib/commonjs/node/signatureService.js +107 -0
- package/lib/commonjs/node/signatureService.js.map +1 -0
- package/lib/commonjs/ui/context/OxyContext.js.map +1 -1
- package/lib/commonjs/ui/context/hooks/useAuthOperations.js.map +1 -1
- package/lib/commonjs/ui/context/hooks/useLanguageManagement.js.map +1 -1
- package/lib/commonjs/ui/hooks/useLanguageManagement.js.map +1 -1
- package/lib/commonjs/ui/hooks/useSessionManagement.js.map +1 -1
- package/lib/commonjs/ui/index.js +0 -2
- package/lib/commonjs/ui/index.js.map +1 -1
- package/lib/commonjs/ui/screens/AccountSettingsScreen.js.map +1 -1
- package/lib/commonjs/ui/screens/OxyAuthScreen.js +13 -9
- package/lib/commonjs/ui/screens/OxyAuthScreen.js.map +1 -1
- package/lib/module/core/OxyServices.base.js.map +1 -1
- package/lib/module/core/mixins/OxyServices.user.js.map +1 -1
- package/lib/module/core/mixins/OxyServices.utility.js.map +1 -1
- package/lib/module/crypto/README.md +142 -0
- package/lib/module/crypto/core.js +133 -0
- package/lib/module/crypto/core.js.map +1 -0
- package/lib/module/crypto/index.js +3 -9
- package/lib/module/crypto/index.js.map +1 -1
- package/lib/module/crypto/keyManager.js +19 -24
- package/lib/module/crypto/keyManager.js.map +1 -1
- package/lib/module/crypto/signatureService.js +113 -33
- package/lib/module/crypto/signatureService.js.map +1 -1
- package/lib/module/index.js +0 -1
- package/lib/module/index.js.map +1 -1
- package/lib/module/models/interfaces.js +10 -11
- package/lib/module/models/interfaces.js.map +1 -1
- package/lib/module/node/index.js +3 -0
- package/lib/module/node/index.js.map +1 -1
- package/lib/module/node/signatureService.js +101 -0
- package/lib/module/node/signatureService.js.map +1 -0
- package/lib/module/ui/context/OxyContext.js.map +1 -1
- package/lib/module/ui/context/hooks/useAuthOperations.js.map +1 -1
- package/lib/module/ui/context/hooks/useLanguageManagement.js.map +1 -1
- package/lib/module/ui/hooks/useLanguageManagement.js.map +1 -1
- package/lib/module/ui/hooks/useSessionManagement.js.map +1 -1
- package/lib/module/ui/index.js +0 -1
- package/lib/module/ui/index.js.map +1 -1
- package/lib/module/ui/screens/AccountSettingsScreen.js.map +1 -1
- package/lib/module/ui/screens/OxyAuthScreen.js +9 -7
- package/lib/module/ui/screens/OxyAuthScreen.js.map +1 -1
- package/lib/typescript/core/OxyServices.base.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.analytics.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.assets.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.auth.d.ts +1 -1
- package/lib/typescript/core/mixins/OxyServices.auth.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.developer.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.devices.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.karma.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.language.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.location.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.payment.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.privacy.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.security.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.user.d.ts +1 -2
- package/lib/typescript/core/mixins/OxyServices.user.d.ts.map +1 -1
- package/lib/typescript/core/mixins/OxyServices.utility.d.ts.map +1 -1
- package/lib/typescript/core/mixins/index.d.ts +13 -13
- package/lib/typescript/core/mixins/index.d.ts.map +1 -1
- package/lib/typescript/core/services/SessionService.d.ts +1 -1
- package/lib/typescript/core/services/SessionService.d.ts.map +1 -1
- package/lib/typescript/crypto/core.d.ts +56 -0
- package/lib/typescript/crypto/core.d.ts.map +1 -0
- package/lib/typescript/crypto/index.d.ts +1 -9
- package/lib/typescript/crypto/index.d.ts.map +1 -1
- package/lib/typescript/crypto/keyManager.d.ts +13 -1
- package/lib/typescript/crypto/keyManager.d.ts.map +1 -1
- package/lib/typescript/crypto/signatureService.d.ts +15 -9
- package/lib/typescript/crypto/signatureService.d.ts.map +1 -1
- package/lib/typescript/index.d.ts +1 -1
- package/lib/typescript/index.d.ts.map +1 -1
- package/lib/typescript/models/interfaces.d.ts +68 -15
- package/lib/typescript/models/interfaces.d.ts.map +1 -1
- package/lib/typescript/node/index.d.ts +1 -0
- package/lib/typescript/node/index.d.ts.map +1 -1
- package/lib/typescript/node/signatureService.d.ts +55 -0
- package/lib/typescript/node/signatureService.d.ts.map +1 -0
- package/lib/typescript/ui/context/OxyContext.d.ts +1 -2
- package/lib/typescript/ui/context/OxyContext.d.ts.map +1 -1
- package/lib/typescript/ui/context/hooks/useAuthOperations.d.ts +1 -2
- package/lib/typescript/ui/context/hooks/useAuthOperations.d.ts.map +1 -1
- package/lib/typescript/ui/context/hooks/useLanguageManagement.d.ts +1 -2
- package/lib/typescript/ui/context/hooks/useLanguageManagement.d.ts.map +1 -1
- package/lib/typescript/ui/hooks/mutations/useAccountMutations.d.ts +1 -1
- package/lib/typescript/ui/hooks/mutations/useAccountMutations.d.ts.map +1 -1
- package/lib/typescript/ui/hooks/queries/useAccountQueries.d.ts +1 -1
- package/lib/typescript/ui/hooks/queries/useAccountQueries.d.ts.map +1 -1
- package/lib/typescript/ui/hooks/useLanguageManagement.d.ts +1 -2
- package/lib/typescript/ui/hooks/useLanguageManagement.d.ts.map +1 -1
- package/lib/typescript/ui/hooks/useSessionManagement.d.ts +1 -2
- package/lib/typescript/ui/hooks/useSessionManagement.d.ts.map +1 -1
- package/lib/typescript/ui/index.d.ts +1 -1
- package/lib/typescript/ui/index.d.ts.map +1 -1
- package/lib/typescript/ui/screens/OxyAuthScreen.d.ts.map +1 -1
- package/lib/typescript/ui/stores/authStore.d.ts +1 -1
- package/lib/typescript/ui/stores/authStore.d.ts.map +1 -1
- package/lib/typescript/ui/utils/avatarUtils.d.ts +1 -1
- package/lib/typescript/ui/utils/avatarUtils.d.ts.map +1 -1
- package/package.json +6 -2
- package/src/core/OxyServices.base.ts +1 -2
- package/src/core/mixins/OxyServices.auth.ts +1 -1
- package/src/core/mixins/OxyServices.user.ts +1 -2
- package/src/core/mixins/OxyServices.utility.ts +1 -2
- package/src/core/services/SessionService.ts +1 -1
- package/src/crypto/README.md +142 -0
- package/src/crypto/__tests__/core.test.ts +203 -0
- package/src/crypto/core.ts +142 -0
- package/src/crypto/index.ts +3 -10
- package/src/crypto/keyManager.ts +25 -21
- package/src/crypto/signatureService.ts +137 -37
- package/src/index.ts +2 -1
- package/src/models/interfaces.ts +73 -21
- package/src/node/index.ts +3 -0
- package/src/node/signatureService.ts +126 -0
- package/src/ui/context/OxyContext.tsx +1 -2
- package/src/ui/context/hooks/useAuthOperations.ts +1 -2
- package/src/ui/context/hooks/useLanguageManagement.ts +1 -2
- package/src/ui/hooks/auth/index.ts +2 -0
- package/src/ui/hooks/mutations/useAccountMutations.ts +1 -1
- package/src/ui/hooks/mutations/useServicesMutations.ts +1 -1
- package/src/ui/hooks/queries/useAccountQueries.ts +1 -1
- package/src/ui/hooks/useLanguageManagement.ts +1 -2
- package/src/ui/hooks/useSessionManagement.ts +1 -2
- package/src/ui/index.ts +1 -2
- package/src/ui/screens/AccountSettingsScreen.tsx +6 -6
- package/src/ui/screens/AccountSwitcherScreen.tsx +1 -1
- package/src/ui/screens/OxyAuthScreen.tsx +9 -5
- package/src/ui/screens/ProfileScreen.tsx +1 -1
- package/src/ui/stores/authStore.ts +1 -1
- package/src/ui/types/navigation.ts +1 -1
- package/src/ui/utils/avatarUtils.ts +1 -1
- package/lib/commonjs/core/services/AuthService.js +0 -156
- package/lib/commonjs/core/services/AuthService.js.map +0 -1
- package/lib/commonjs/core/services/SessionTransportService.js +0 -64
- package/lib/commonjs/core/services/SessionTransportService.js.map +0 -1
- package/lib/commonjs/core/services/UserService.js +0 -123
- package/lib/commonjs/core/services/UserService.js.map +0 -1
- package/lib/commonjs/core/services/index.js +0 -34
- package/lib/commonjs/core/services/index.js.map +0 -1
- package/lib/module/core/services/AuthService.js +0 -151
- package/lib/module/core/services/AuthService.js.map +0 -1
- package/lib/module/core/services/SessionTransportService.js +0 -59
- package/lib/module/core/services/SessionTransportService.js.map +0 -1
- package/lib/module/core/services/UserService.js +0 -118
- package/lib/module/core/services/UserService.js.map +0 -1
- package/lib/module/core/services/index.js +0 -16
- package/lib/module/core/services/index.js.map +0 -1
- package/lib/typescript/core/services/AuthService.d.ts +0 -50
- package/lib/typescript/core/services/AuthService.d.ts.map +0 -1
- package/lib/typescript/core/services/SessionTransportService.d.ts +0 -31
- package/lib/typescript/core/services/SessionTransportService.d.ts.map +0 -1
- package/lib/typescript/core/services/UserService.d.ts +0 -39
- package/lib/typescript/core/services/UserService.d.ts.map +0 -1
- package/lib/typescript/core/services/index.d.ts +0 -13
- package/lib/typescript/core/services/index.d.ts.map +0 -1
- package/src/core/services/AuthService.ts +0 -153
- package/src/core/services/SessionTransportService.ts +0 -69
- package/src/core/services/UserService.ts +0 -125
- package/src/core/services/index.ts +0 -14
|
@@ -0,0 +1,142 @@
|
|
|
1
|
+
# Oxy Crypto Module
|
|
2
|
+
|
|
3
|
+
This module provides cryptographic operations for the Oxy ecosystem, supporting both React Native and Node.js environments.
|
|
4
|
+
|
|
5
|
+
## Architecture
|
|
6
|
+
|
|
7
|
+
The crypto module is organized into several layers:
|
|
8
|
+
|
|
9
|
+
### Core Layer (`core.ts`)
|
|
10
|
+
Platform-agnostic cryptographic functions that work everywhere:
|
|
11
|
+
- Signature verification using elliptic curve cryptography
|
|
12
|
+
- Public/private key validation
|
|
13
|
+
- Message formatting (auth, registration, requests)
|
|
14
|
+
- Utility functions (shortenPublicKey, derivePublicKey, etc.)
|
|
15
|
+
|
|
16
|
+
### Platform-Specific Implementations
|
|
17
|
+
|
|
18
|
+
#### React Native (`signatureService.ts`, `keyManager.ts`)
|
|
19
|
+
- **KeyManager**: Manages ECDSA key pairs with secure storage via Expo SecureStore
|
|
20
|
+
- ⚠️ **For Oxy Accounts app only** - Not intended for third-party apps
|
|
21
|
+
- Handles key generation, import, backup, and secure retrieval
|
|
22
|
+
- Private keys never leave the device
|
|
23
|
+
|
|
24
|
+
- **SignatureService**: Provides async signing and verification
|
|
25
|
+
- Uses `expo-crypto` for hashing in React Native
|
|
26
|
+
- Falls back to Node.js crypto when available
|
|
27
|
+
- Suitable for both React Native and Node.js environments
|
|
28
|
+
|
|
29
|
+
#### Node.js (`node/signatureService.ts`)
|
|
30
|
+
- Optimized synchronous signature operations for backend
|
|
31
|
+
- Uses Node's `crypto` module directly for better performance
|
|
32
|
+
- Exports same API as React Native version for consistency
|
|
33
|
+
|
|
34
|
+
## Usage
|
|
35
|
+
|
|
36
|
+
### In React Native / Accounts App
|
|
37
|
+
|
|
38
|
+
```typescript
|
|
39
|
+
import { KeyManager, SignatureService } from '@oxyhq/services/crypto';
|
|
40
|
+
|
|
41
|
+
// Create identity (Accounts app only)
|
|
42
|
+
const publicKey = await KeyManager.createIdentity();
|
|
43
|
+
|
|
44
|
+
// Sign a challenge
|
|
45
|
+
const signature = await SignatureService.sign(message);
|
|
46
|
+
|
|
47
|
+
// Verify a signature
|
|
48
|
+
const isValid = await SignatureService.verify(message, signature, publicKey);
|
|
49
|
+
```
|
|
50
|
+
|
|
51
|
+
### In Node.js Backend
|
|
52
|
+
|
|
53
|
+
```typescript
|
|
54
|
+
import { SignatureService } from '@oxyhq/services/node';
|
|
55
|
+
|
|
56
|
+
// Generate challenge
|
|
57
|
+
const challenge = SignatureService.generateChallenge();
|
|
58
|
+
|
|
59
|
+
// Verify signature (synchronous)
|
|
60
|
+
const isValid = SignatureService.verifyChallengeResponse(
|
|
61
|
+
publicKey,
|
|
62
|
+
challenge,
|
|
63
|
+
signature,
|
|
64
|
+
timestamp
|
|
65
|
+
);
|
|
66
|
+
```
|
|
67
|
+
|
|
68
|
+
### In Third-Party Apps (Services SDK)
|
|
69
|
+
|
|
70
|
+
Third-party apps should **not** use KeyManager directly. Instead, use the authentication flows provided by the OxyServices class:
|
|
71
|
+
|
|
72
|
+
```typescript
|
|
73
|
+
import { OxyServices } from '@oxyhq/services';
|
|
74
|
+
|
|
75
|
+
const oxy = new OxyServices({ baseURL: 'https://api.oxy.so' });
|
|
76
|
+
|
|
77
|
+
// Request authentication (shows QR code / deep link)
|
|
78
|
+
// User approves in Oxy Accounts app
|
|
79
|
+
// Returns session when approved
|
|
80
|
+
const session = await oxy.requestAuth({ appId: 'my-app' });
|
|
81
|
+
```
|
|
82
|
+
|
|
83
|
+
## Security Considerations
|
|
84
|
+
|
|
85
|
+
### Message Formats
|
|
86
|
+
All signed messages follow specific formats to prevent replay attacks:
|
|
87
|
+
|
|
88
|
+
- **Authentication**: `auth:{publicKey}:{challenge}:{timestamp}`
|
|
89
|
+
- **Registration**: `oxy:register:{publicKey}:{timestamp}`
|
|
90
|
+
- **API Requests**: `request:{publicKey}:{timestamp}:{canonicalData}`
|
|
91
|
+
|
|
92
|
+
Timestamps must be within 5 minutes to be valid.
|
|
93
|
+
|
|
94
|
+
### Key Storage
|
|
95
|
+
- Private keys are stored in device secure storage (iOS Keychain, Android Keystore)
|
|
96
|
+
- Never transmitted or exposed outside the device
|
|
97
|
+
- Only the Oxy Accounts app has access to private keys
|
|
98
|
+
|
|
99
|
+
### Backup Encryption
|
|
100
|
+
⚠️ **Current Implementation**: The backup encryption currently uses a custom XOR scheme with key stretching. This is functional but not optimal.
|
|
101
|
+
|
|
102
|
+
📋 **Planned Improvement**: Migrate to standard AES-256-GCM encryption for better security and interoperability.
|
|
103
|
+
|
|
104
|
+
## Separation of Concerns
|
|
105
|
+
|
|
106
|
+
### Oxy Accounts App
|
|
107
|
+
- Owns and manages the user's private key
|
|
108
|
+
- Handles identity creation, backup, and recovery
|
|
109
|
+
- Signs authentication challenges
|
|
110
|
+
- Uses `KeyManager` and `SignatureService`
|
|
111
|
+
|
|
112
|
+
### Services SDK / Third-Party Apps
|
|
113
|
+
- Does NOT generate or store private keys
|
|
114
|
+
- Displays QR codes and deep links for authentication
|
|
115
|
+
- Polls server for authentication status
|
|
116
|
+
- Uses `OxyServices` class for API communication
|
|
117
|
+
|
|
118
|
+
### API Backend
|
|
119
|
+
- Generates challenges
|
|
120
|
+
- Verifies signatures using public keys
|
|
121
|
+
- Manages sessions and user data
|
|
122
|
+
- Uses `SignatureService` from `@oxyhq/services/node`
|
|
123
|
+
|
|
124
|
+
## Migration from Old Signature Service
|
|
125
|
+
|
|
126
|
+
The API previously had a duplicate `signature.service.ts` file. This has been replaced with a re-export from `@oxyhq/services/node` to ensure consistency and eliminate duplication.
|
|
127
|
+
|
|
128
|
+
If you're maintaining code that imports from the old location, it will continue to work as the file now re-exports from the shared module.
|
|
129
|
+
|
|
130
|
+
## Testing
|
|
131
|
+
|
|
132
|
+
When making changes to crypto code:
|
|
133
|
+
1. Test in both React Native and Node.js environments
|
|
134
|
+
2. Verify signatures created in one environment can be verified in another
|
|
135
|
+
3. Check that timestamps are properly validated
|
|
136
|
+
4. Ensure message formats match exactly between client and server
|
|
137
|
+
|
|
138
|
+
## Further Reading
|
|
139
|
+
|
|
140
|
+
- [Public Key Authentication Guide](../docs/PUBLIC_KEY_AUTHENTICATION.md)
|
|
141
|
+
- [ECDSA on secp256k1](https://en.bitcoin.it/wiki/Secp256k1)
|
|
142
|
+
- [Expo SecureStore Documentation](https://docs.expo.dev/versions/latest/sdk/securestore/)
|
|
@@ -0,0 +1,203 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Tests for the shared crypto core module
|
|
3
|
+
* These tests verify that signature verification is consistent across platforms
|
|
4
|
+
*/
|
|
5
|
+
|
|
6
|
+
import {
|
|
7
|
+
verifySignatureCore,
|
|
8
|
+
isValidPublicKey,
|
|
9
|
+
isValidPrivateKey,
|
|
10
|
+
isTimestampFresh,
|
|
11
|
+
buildAuthMessage,
|
|
12
|
+
buildRegistrationMessage,
|
|
13
|
+
buildRequestMessage,
|
|
14
|
+
shortenPublicKey,
|
|
15
|
+
derivePublicKey,
|
|
16
|
+
getEllipticCurve,
|
|
17
|
+
CHALLENGE_TTL_MS,
|
|
18
|
+
MAX_SIGNATURE_AGE_MS,
|
|
19
|
+
} from '../core';
|
|
20
|
+
|
|
21
|
+
describe('Crypto Core Module', () => {
|
|
22
|
+
// Test key pair (for testing only - never use in production)
|
|
23
|
+
const testPrivateKey = '1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef';
|
|
24
|
+
// Public key derived from the private key above
|
|
25
|
+
const testPublicKey = '04bb50e2d89a4ed70663d080659fe0ad4b9bc3e06c17a227433966cb59ceee020decddbf6e00192011648d13b1c00af770c0c1bb609d4d3a5c98a43772e0e18ef4';
|
|
26
|
+
|
|
27
|
+
describe('Public/Private Key Validation', () => {
|
|
28
|
+
it('should validate correct public keys', () => {
|
|
29
|
+
expect(isValidPublicKey(testPublicKey)).toBe(true);
|
|
30
|
+
});
|
|
31
|
+
|
|
32
|
+
it('should reject invalid public keys', () => {
|
|
33
|
+
expect(isValidPublicKey('invalid')).toBe(false);
|
|
34
|
+
expect(isValidPublicKey('')).toBe(false);
|
|
35
|
+
expect(isValidPublicKey('1234')).toBe(false);
|
|
36
|
+
});
|
|
37
|
+
|
|
38
|
+
it('should validate correct private keys', () => {
|
|
39
|
+
expect(isValidPrivateKey(testPrivateKey)).toBe(true);
|
|
40
|
+
});
|
|
41
|
+
|
|
42
|
+
it('should reject invalid private keys', () => {
|
|
43
|
+
expect(isValidPrivateKey('invalid')).toBe(false);
|
|
44
|
+
expect(isValidPrivateKey('')).toBe(false);
|
|
45
|
+
expect(isValidPrivateKey('1234')).toBe(false);
|
|
46
|
+
});
|
|
47
|
+
|
|
48
|
+
it('should derive public key from private key', () => {
|
|
49
|
+
const derived = derivePublicKey(testPrivateKey);
|
|
50
|
+
expect(derived).toBe(testPublicKey);
|
|
51
|
+
});
|
|
52
|
+
});
|
|
53
|
+
|
|
54
|
+
describe('Utility Functions', () => {
|
|
55
|
+
it('should shorten public keys correctly', () => {
|
|
56
|
+
const shortened = shortenPublicKey(testPublicKey);
|
|
57
|
+
expect(shortened).toBe('04bb50e2...e0e18ef4');
|
|
58
|
+
expect(shortened.length).toBeLessThan(testPublicKey.length);
|
|
59
|
+
});
|
|
60
|
+
|
|
61
|
+
it('should not shorten already short keys', () => {
|
|
62
|
+
const shortKey = '1234567890';
|
|
63
|
+
expect(shortenPublicKey(shortKey)).toBe(shortKey);
|
|
64
|
+
});
|
|
65
|
+
});
|
|
66
|
+
|
|
67
|
+
describe('Timestamp Validation', () => {
|
|
68
|
+
it('should accept fresh timestamps', () => {
|
|
69
|
+
const now = Date.now();
|
|
70
|
+
expect(isTimestampFresh(now)).toBe(true);
|
|
71
|
+
expect(isTimestampFresh(now - 1000)).toBe(true); // 1 second ago
|
|
72
|
+
});
|
|
73
|
+
|
|
74
|
+
it('should reject old timestamps', () => {
|
|
75
|
+
const old = Date.now() - (MAX_SIGNATURE_AGE_MS + 1000);
|
|
76
|
+
expect(isTimestampFresh(old)).toBe(false);
|
|
77
|
+
});
|
|
78
|
+
|
|
79
|
+
it('should respect custom max age', () => {
|
|
80
|
+
const timestamp = Date.now() - 10000; // 10 seconds ago
|
|
81
|
+
expect(isTimestampFresh(timestamp, 5000)).toBe(false); // max 5 seconds
|
|
82
|
+
expect(isTimestampFresh(timestamp, 15000)).toBe(true); // max 15 seconds
|
|
83
|
+
});
|
|
84
|
+
});
|
|
85
|
+
|
|
86
|
+
describe('Message Building', () => {
|
|
87
|
+
it('should build auth messages correctly', () => {
|
|
88
|
+
const publicKey = 'abc123';
|
|
89
|
+
const challenge = 'challenge456';
|
|
90
|
+
const timestamp = 1234567890;
|
|
91
|
+
|
|
92
|
+
const message = buildAuthMessage(publicKey, challenge, timestamp);
|
|
93
|
+
expect(message).toBe('auth:abc123:challenge456:1234567890');
|
|
94
|
+
});
|
|
95
|
+
|
|
96
|
+
it('should build registration messages correctly', () => {
|
|
97
|
+
const publicKey = 'abc123';
|
|
98
|
+
const timestamp = 1234567890;
|
|
99
|
+
|
|
100
|
+
const message = buildRegistrationMessage(publicKey, timestamp);
|
|
101
|
+
expect(message).toBe('oxy:register:abc123:1234567890');
|
|
102
|
+
});
|
|
103
|
+
|
|
104
|
+
it('should build request messages with canonical data', () => {
|
|
105
|
+
const publicKey = 'abc123';
|
|
106
|
+
const timestamp = 1234567890;
|
|
107
|
+
const data = {
|
|
108
|
+
username: 'testuser',
|
|
109
|
+
action: 'update',
|
|
110
|
+
id: 42,
|
|
111
|
+
};
|
|
112
|
+
|
|
113
|
+
const message = buildRequestMessage(publicKey, timestamp, data);
|
|
114
|
+
|
|
115
|
+
// Keys should be sorted alphabetically
|
|
116
|
+
expect(message).toContain('action:"update"');
|
|
117
|
+
expect(message).toContain('id:42');
|
|
118
|
+
expect(message).toContain('username:"testuser"');
|
|
119
|
+
expect(message).toContain('request:abc123:1234567890:');
|
|
120
|
+
});
|
|
121
|
+
|
|
122
|
+
it('should produce consistent canonical strings', () => {
|
|
123
|
+
const publicKey = 'key';
|
|
124
|
+
const timestamp = 1000;
|
|
125
|
+
|
|
126
|
+
// Same data, different order
|
|
127
|
+
const data1 = { b: 2, a: 1, c: 3 };
|
|
128
|
+
const data2 = { c: 3, a: 1, b: 2 };
|
|
129
|
+
|
|
130
|
+
const message1 = buildRequestMessage(publicKey, timestamp, data1);
|
|
131
|
+
const message2 = buildRequestMessage(publicKey, timestamp, data2);
|
|
132
|
+
|
|
133
|
+
expect(message1).toBe(message2);
|
|
134
|
+
});
|
|
135
|
+
});
|
|
136
|
+
|
|
137
|
+
describe('Signature Verification Core', () => {
|
|
138
|
+
it('should verify valid signatures', () => {
|
|
139
|
+
const ec = getEllipticCurve();
|
|
140
|
+
const keyPair = ec.keyFromPrivate(testPrivateKey);
|
|
141
|
+
|
|
142
|
+
// Create a test message hash
|
|
143
|
+
const messageHash = 'abcdef1234567890abcdef1234567890abcdef1234567890abcdef1234567890';
|
|
144
|
+
|
|
145
|
+
// Sign it
|
|
146
|
+
const signature = keyPair.sign(messageHash);
|
|
147
|
+
const signatureHex = signature.toDER('hex');
|
|
148
|
+
|
|
149
|
+
// Verify it
|
|
150
|
+
const isValid = verifySignatureCore(messageHash, signatureHex, testPublicKey);
|
|
151
|
+
expect(isValid).toBe(true);
|
|
152
|
+
});
|
|
153
|
+
|
|
154
|
+
it('should reject invalid signatures', () => {
|
|
155
|
+
const messageHash = 'abcdef1234567890abcdef1234567890abcdef1234567890abcdef1234567890';
|
|
156
|
+
const invalidSignature = '1234567890abcdef';
|
|
157
|
+
|
|
158
|
+
const isValid = verifySignatureCore(messageHash, invalidSignature, testPublicKey);
|
|
159
|
+
expect(isValid).toBe(false);
|
|
160
|
+
});
|
|
161
|
+
|
|
162
|
+
it('should reject signatures with wrong public key', () => {
|
|
163
|
+
const ec = getEllipticCurve();
|
|
164
|
+
const keyPair = ec.keyFromPrivate(testPrivateKey);
|
|
165
|
+
|
|
166
|
+
const messageHash = 'abcdef1234567890abcdef1234567890abcdef1234567890abcdef1234567890';
|
|
167
|
+
const signature = keyPair.sign(messageHash);
|
|
168
|
+
const signatureHex = signature.toDER('hex');
|
|
169
|
+
|
|
170
|
+
// Use a different public key
|
|
171
|
+
const wrongPublicKey = '04' + 'a'.repeat(128);
|
|
172
|
+
|
|
173
|
+
const isValid = verifySignatureCore(messageHash, signatureHex, wrongPublicKey);
|
|
174
|
+
expect(isValid).toBe(false);
|
|
175
|
+
});
|
|
176
|
+
});
|
|
177
|
+
|
|
178
|
+
describe('Constants', () => {
|
|
179
|
+
it('should export correct TTL constants', () => {
|
|
180
|
+
expect(CHALLENGE_TTL_MS).toBe(5 * 60 * 1000); // 5 minutes
|
|
181
|
+
expect(MAX_SIGNATURE_AGE_MS).toBe(5 * 60 * 1000); // 5 minutes
|
|
182
|
+
});
|
|
183
|
+
});
|
|
184
|
+
|
|
185
|
+
describe('Elliptic Curve', () => {
|
|
186
|
+
it('should provide secp256k1 curve', () => {
|
|
187
|
+
const ec = getEllipticCurve();
|
|
188
|
+
expect(ec).toBeDefined();
|
|
189
|
+
expect(ec.curve.type).toBe('short');
|
|
190
|
+
});
|
|
191
|
+
|
|
192
|
+
it('should generate valid key pairs', () => {
|
|
193
|
+
const ec = getEllipticCurve();
|
|
194
|
+
const keyPair = ec.genKeyPair();
|
|
195
|
+
|
|
196
|
+
const privateKey = keyPair.getPrivate('hex');
|
|
197
|
+
const publicKey = keyPair.getPublic('hex');
|
|
198
|
+
|
|
199
|
+
expect(isValidPrivateKey(privateKey)).toBe(true);
|
|
200
|
+
expect(isValidPublicKey(publicKey)).toBe(true);
|
|
201
|
+
});
|
|
202
|
+
});
|
|
203
|
+
});
|
|
@@ -0,0 +1,142 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Core Cryptographic Functions - Platform Agnostic
|
|
3
|
+
*
|
|
4
|
+
* This module contains the core signature verification logic
|
|
5
|
+
* that is shared between all platforms (React Native, Node.js, Web).
|
|
6
|
+
* Platform-specific implementations (hashing, random generation) are injected.
|
|
7
|
+
*/
|
|
8
|
+
|
|
9
|
+
import { ec as EC } from 'elliptic';
|
|
10
|
+
import type { EC as ECType } from 'elliptic';
|
|
11
|
+
|
|
12
|
+
const ec = new EC('secp256k1');
|
|
13
|
+
|
|
14
|
+
// Constants for signature validation
|
|
15
|
+
export const CHALLENGE_TTL_MS = 5 * 60 * 1000; // 5 minutes
|
|
16
|
+
export const MAX_SIGNATURE_AGE_MS = 5 * 60 * 1000; // 5 minutes
|
|
17
|
+
|
|
18
|
+
/**
|
|
19
|
+
* Core signature verification using elliptic curve
|
|
20
|
+
* This is platform-agnostic and works everywhere
|
|
21
|
+
*/
|
|
22
|
+
export function verifySignatureCore(
|
|
23
|
+
messageHash: string,
|
|
24
|
+
signature: string,
|
|
25
|
+
publicKey: string
|
|
26
|
+
): boolean {
|
|
27
|
+
try {
|
|
28
|
+
const key = ec.keyFromPublic(publicKey, 'hex');
|
|
29
|
+
return key.verify(messageHash, signature);
|
|
30
|
+
} catch {
|
|
31
|
+
return false;
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
|
|
35
|
+
/**
|
|
36
|
+
* Validate that a string is a valid public key
|
|
37
|
+
*/
|
|
38
|
+
export function isValidPublicKey(publicKey: string): boolean {
|
|
39
|
+
// Reject empty strings
|
|
40
|
+
if (!publicKey || publicKey.trim().length === 0) {
|
|
41
|
+
return false;
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
try {
|
|
45
|
+
ec.keyFromPublic(publicKey, 'hex');
|
|
46
|
+
return true;
|
|
47
|
+
} catch {
|
|
48
|
+
return false;
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
/**
|
|
53
|
+
* Validate that a string is a valid private key
|
|
54
|
+
*/
|
|
55
|
+
export function isValidPrivateKey(privateKey: string): boolean {
|
|
56
|
+
// Reject empty strings
|
|
57
|
+
if (!privateKey || privateKey.trim().length === 0) {
|
|
58
|
+
return false;
|
|
59
|
+
}
|
|
60
|
+
|
|
61
|
+
// Private keys must be 64 hex characters (32 bytes)
|
|
62
|
+
if (!/^[0-9a-fA-F]{64}$/.test(privateKey)) {
|
|
63
|
+
return false;
|
|
64
|
+
}
|
|
65
|
+
|
|
66
|
+
try {
|
|
67
|
+
const keyPair = ec.keyFromPrivate(privateKey);
|
|
68
|
+
// Verify it can derive a public key and the key is valid
|
|
69
|
+
keyPair.getPublic('hex');
|
|
70
|
+
// Check that the private key is not zero (which would be invalid)
|
|
71
|
+
const priv = keyPair.getPrivate();
|
|
72
|
+
if (!priv || priv.isZero()) {
|
|
73
|
+
return false;
|
|
74
|
+
}
|
|
75
|
+
return true;
|
|
76
|
+
} catch {
|
|
77
|
+
return false;
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
/**
|
|
82
|
+
* Get a shortened display version of a public key
|
|
83
|
+
* Format: first 8 chars...last 8 chars
|
|
84
|
+
*/
|
|
85
|
+
export function shortenPublicKey(publicKey: string): string {
|
|
86
|
+
if (publicKey.length <= 20) return publicKey;
|
|
87
|
+
return `${publicKey.slice(0, 8)}...${publicKey.slice(-8)}`;
|
|
88
|
+
}
|
|
89
|
+
|
|
90
|
+
/**
|
|
91
|
+
* Derive public key from a private key (without storing)
|
|
92
|
+
*/
|
|
93
|
+
export function derivePublicKey(privateKey: string): string {
|
|
94
|
+
const keyPair = ec.keyFromPrivate(privateKey);
|
|
95
|
+
return keyPair.getPublic('hex');
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
/**
|
|
99
|
+
* Check timestamp freshness
|
|
100
|
+
*/
|
|
101
|
+
export function isTimestampFresh(timestamp: number, maxAgeMs: number = MAX_SIGNATURE_AGE_MS): boolean {
|
|
102
|
+
const now = Date.now();
|
|
103
|
+
return (now - timestamp) <= maxAgeMs;
|
|
104
|
+
}
|
|
105
|
+
|
|
106
|
+
/**
|
|
107
|
+
* Build authentication challenge message
|
|
108
|
+
* Format: auth:{publicKey}:{challenge}:{timestamp}
|
|
109
|
+
*/
|
|
110
|
+
export function buildAuthMessage(publicKey: string, challenge: string, timestamp: number): string {
|
|
111
|
+
return `auth:${publicKey}:${challenge}:${timestamp}`;
|
|
112
|
+
}
|
|
113
|
+
|
|
114
|
+
/**
|
|
115
|
+
* Build registration message
|
|
116
|
+
* Format: oxy:register:{publicKey}:{timestamp}
|
|
117
|
+
*/
|
|
118
|
+
export function buildRegistrationMessage(publicKey: string, timestamp: number): string {
|
|
119
|
+
return `oxy:register:${publicKey}:${timestamp}`;
|
|
120
|
+
}
|
|
121
|
+
|
|
122
|
+
/**
|
|
123
|
+
* Build request signature message
|
|
124
|
+
* Format: request:{publicKey}:{timestamp}:{canonicalString}
|
|
125
|
+
*/
|
|
126
|
+
export function buildRequestMessage(
|
|
127
|
+
publicKey: string,
|
|
128
|
+
timestamp: number,
|
|
129
|
+
data: Record<string, unknown>
|
|
130
|
+
): string {
|
|
131
|
+
const sortedKeys = Object.keys(data).sort();
|
|
132
|
+
const canonicalParts = sortedKeys.map(key => `${key}:${JSON.stringify(data[key])}`);
|
|
133
|
+
const canonicalString = canonicalParts.join('|');
|
|
134
|
+
return `request:${publicKey}:${timestamp}:${canonicalString}`;
|
|
135
|
+
}
|
|
136
|
+
|
|
137
|
+
/**
|
|
138
|
+
* Get the elliptic curve instance (for key generation)
|
|
139
|
+
*/
|
|
140
|
+
export function getEllipticCurve(): ECType {
|
|
141
|
+
return ec;
|
|
142
|
+
}
|
package/src/crypto/index.ts
CHANGED
|
@@ -3,15 +3,6 @@
|
|
|
3
3
|
*
|
|
4
4
|
* Provides cryptographic identity management for the Oxy ecosystem.
|
|
5
5
|
* Handles key generation, secure storage, and digital signatures.
|
|
6
|
-
*
|
|
7
|
-
* ⚠️ IMPORTANT: KeyManager is primarily intended for use in the Oxy Accounts app.
|
|
8
|
-
* While it's exported here for convenience, third-party applications should NOT
|
|
9
|
-
* generate or store user identities. The Accounts app is the identity wallet.
|
|
10
|
-
*
|
|
11
|
-
* For third-party apps:
|
|
12
|
-
* - Use SignatureService for signing operations (but keys come from Accounts app)
|
|
13
|
-
* - Do NOT call KeyManager.createIdentity() or KeyManager.importKeyPair()
|
|
14
|
-
* - The Oxy Accounts app handles all identity generation and key storage
|
|
15
6
|
*/
|
|
16
7
|
|
|
17
8
|
// Import polyfills first - this ensures Buffer is available for crypto libraries
|
|
@@ -25,7 +16,9 @@ export {
|
|
|
25
16
|
} from './signatureService';
|
|
26
17
|
export { type BackupData } from './types';
|
|
27
18
|
|
|
19
|
+
// Export core crypto utilities (shared across platforms)
|
|
20
|
+
export * from './core';
|
|
21
|
+
|
|
28
22
|
// Re-export for convenience
|
|
29
23
|
export { KeyManager as default } from './keyManager';
|
|
30
24
|
|
|
31
|
-
|
package/src/crypto/keyManager.ts
CHANGED
|
@@ -1,19 +1,38 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* Key Manager - ECDSA secp256k1 Key Generation and Storage
|
|
3
3
|
*
|
|
4
|
-
*
|
|
4
|
+
* ⚠️ **FOR OXY ACCOUNTS APP ONLY**
|
|
5
|
+
*
|
|
6
|
+
* This module handles secure generation, storage, and retrieval of cryptographic keys.
|
|
5
7
|
* Private keys are stored securely using expo-secure-store and never leave the device.
|
|
8
|
+
*
|
|
9
|
+
* **IMPORTANT**: Third-party apps should NOT use KeyManager directly.
|
|
10
|
+
* Instead, use the OxyServices authentication flows which communicate with the
|
|
11
|
+
* Oxy Accounts app via deep links/QR codes to obtain user authorization.
|
|
12
|
+
*
|
|
13
|
+
* The Oxy Accounts app is the sole owner of the user's private key and identity.
|
|
14
|
+
* Other apps request authentication from the Accounts app, which signs challenges
|
|
15
|
+
* and returns authorization to the requesting app via the API.
|
|
16
|
+
*
|
|
17
|
+
* @see {@link https://github.com/OxyHQ/OxyHQServices/blob/main/packages/services/src/crypto/README.md|Crypto Module Documentation}
|
|
6
18
|
*/
|
|
7
19
|
|
|
8
20
|
import { ec as EC } from 'elliptic';
|
|
9
21
|
import type { ECKeyPair } from 'elliptic';
|
|
10
22
|
import { Platform } from 'react-native';
|
|
23
|
+
import {
|
|
24
|
+
isValidPublicKey as validatePublicKey,
|
|
25
|
+
isValidPrivateKey as validatePrivateKey,
|
|
26
|
+
derivePublicKey as derivePublicKeyFromPrivate,
|
|
27
|
+
shortenPublicKey as shortenKey,
|
|
28
|
+
getEllipticCurve,
|
|
29
|
+
} from './core';
|
|
11
30
|
|
|
12
31
|
// Lazy imports for React Native specific modules
|
|
13
32
|
let SecureStore: typeof import('expo-secure-store') | null = null;
|
|
14
33
|
let ExpoCrypto: typeof import('expo-crypto') | null = null;
|
|
15
34
|
|
|
16
|
-
const ec =
|
|
35
|
+
const ec = getEllipticCurve();
|
|
17
36
|
|
|
18
37
|
const STORAGE_KEYS = {
|
|
19
38
|
PRIVATE_KEY: 'oxy_identity_private_key',
|
|
@@ -504,34 +523,21 @@ export class KeyManager {
|
|
|
504
523
|
* Derive public key from a private key (without storing)
|
|
505
524
|
*/
|
|
506
525
|
static derivePublicKey(privateKey: string): string {
|
|
507
|
-
|
|
508
|
-
return keyPair.getPublic('hex');
|
|
526
|
+
return derivePublicKeyFromPrivate(privateKey);
|
|
509
527
|
}
|
|
510
528
|
|
|
511
529
|
/**
|
|
512
530
|
* Validate that a string is a valid public key
|
|
513
531
|
*/
|
|
514
532
|
static isValidPublicKey(publicKey: string): boolean {
|
|
515
|
-
|
|
516
|
-
ec.keyFromPublic(publicKey, 'hex');
|
|
517
|
-
return true;
|
|
518
|
-
} catch {
|
|
519
|
-
return false;
|
|
520
|
-
}
|
|
533
|
+
return validatePublicKey(publicKey);
|
|
521
534
|
}
|
|
522
535
|
|
|
523
536
|
/**
|
|
524
537
|
* Validate that a string is a valid private key
|
|
525
538
|
*/
|
|
526
539
|
static isValidPrivateKey(privateKey: string): boolean {
|
|
527
|
-
|
|
528
|
-
const keyPair = ec.keyFromPrivate(privateKey);
|
|
529
|
-
// Verify it can derive a public key
|
|
530
|
-
keyPair.getPublic('hex');
|
|
531
|
-
return true;
|
|
532
|
-
} catch {
|
|
533
|
-
return false;
|
|
534
|
-
}
|
|
540
|
+
return validatePrivateKey(privateKey);
|
|
535
541
|
}
|
|
536
542
|
|
|
537
543
|
/**
|
|
@@ -539,9 +545,7 @@ export class KeyManager {
|
|
|
539
545
|
* Format: first 8 chars...last 8 chars
|
|
540
546
|
*/
|
|
541
547
|
static shortenPublicKey(publicKey: string): string {
|
|
542
|
-
|
|
543
|
-
const { shortenPublicKey } = require('@oxyhq/shared');
|
|
544
|
-
return shortenPublicKey(publicKey);
|
|
548
|
+
return shortenKey(publicKey);
|
|
545
549
|
}
|
|
546
550
|
}
|
|
547
551
|
|