@queenanya/baileys 6.7.0 → 6.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (129) hide show
  1. package/WASignalGroup/readme.md +6 -0
  2. package/lib/Defaults/baileys-version.json +3 -3
  3. package/lib/Defaults/index.d.ts +284 -284
  4. package/lib/Defaults/index.js +120 -120
  5. package/lib/Defaults/phonenumber-mcc.json +223 -223
  6. package/lib/Signal/libsignal.d.ts +3 -3
  7. package/lib/Signal/libsignal.js +152 -152
  8. package/lib/Socket/Client/abstract-socket-client.d.ts +17 -17
  9. package/lib/Socket/Client/abstract-socket-client.js +13 -13
  10. package/lib/Socket/Client/index.d.ts +3 -3
  11. package/lib/Socket/Client/index.js +19 -19
  12. package/lib/Socket/Client/mobile-socket-client.d.ts +13 -13
  13. package/lib/Socket/Client/mobile-socket-client.js +65 -65
  14. package/lib/Socket/Client/web-socket-client.d.ts +12 -12
  15. package/lib/Socket/Client/web-socket-client.js +62 -62
  16. package/lib/Socket/business.d.ts +135 -135
  17. package/lib/Socket/business.js +259 -259
  18. package/lib/Socket/chats.d.ts +79 -79
  19. package/lib/Socket/chats.js +854 -854
  20. package/lib/Socket/groups.d.ts +113 -113
  21. package/lib/Socket/groups.js +302 -302
  22. package/lib/Socket/index.d.ts +137 -137
  23. package/lib/Socket/index.js +10 -10
  24. package/lib/Socket/messages-recv.d.ts +124 -124
  25. package/lib/Socket/messages-recv.js +747 -747
  26. package/lib/Socket/messages-send.d.ts +119 -119
  27. package/lib/Socket/messages-send.js +663 -663
  28. package/lib/Socket/registration.d.ts +232 -232
  29. package/lib/Socket/registration.js +166 -166
  30. package/lib/Socket/socket.d.ts +42 -42
  31. package/lib/Socket/socket.js +588 -588
  32. package/lib/Store/index.d.ts +3 -3
  33. package/lib/Store/index.js +10 -10
  34. package/lib/Store/make-cache-manager-store.d.ts +13 -13
  35. package/lib/Store/make-cache-manager-store.js +83 -83
  36. package/lib/Store/make-in-memory-store.d.ts +117 -117
  37. package/lib/Store/make-in-memory-store.js +437 -437
  38. package/lib/Store/make-ordered-dictionary.d.ts +13 -13
  39. package/lib/Store/make-ordered-dictionary.js +81 -81
  40. package/lib/Store/object-repository.d.ts +10 -10
  41. package/lib/Store/object-repository.js +27 -27
  42. package/lib/Types/Auth.d.ts +108 -108
  43. package/lib/Types/Auth.js +2 -2
  44. package/lib/Types/Call.d.ts +13 -13
  45. package/lib/Types/Call.js +2 -2
  46. package/lib/Types/Chat.d.ts +102 -102
  47. package/lib/Types/Chat.js +4 -4
  48. package/lib/Types/Contact.d.ts +19 -19
  49. package/lib/Types/Contact.js +2 -2
  50. package/lib/Types/Events.d.ts +157 -157
  51. package/lib/Types/Events.js +2 -2
  52. package/lib/Types/GroupMetadata.d.ts +52 -52
  53. package/lib/Types/GroupMetadata.js +2 -2
  54. package/lib/Types/Label.d.ts +35 -35
  55. package/lib/Types/Label.js +27 -27
  56. package/lib/Types/LabelAssociation.d.ts +29 -29
  57. package/lib/Types/LabelAssociation.js +9 -9
  58. package/lib/Types/Message.d.ts +261 -261
  59. package/lib/Types/Message.js +9 -9
  60. package/lib/Types/Product.d.ts +78 -78
  61. package/lib/Types/Product.js +2 -2
  62. package/lib/Types/Signal.d.ts +57 -57
  63. package/lib/Types/Signal.js +2 -2
  64. package/lib/Types/Socket.d.ts +111 -111
  65. package/lib/Types/Socket.js +2 -2
  66. package/lib/Types/State.d.ts +27 -27
  67. package/lib/Types/State.js +2 -2
  68. package/lib/Types/index.d.ts +56 -56
  69. package/lib/Types/index.js +41 -41
  70. package/lib/Utils/auth-utils.d.ts +18 -18
  71. package/lib/Utils/auth-utils.js +204 -204
  72. package/lib/Utils/baileys-event-stream.d.ts +16 -16
  73. package/lib/Utils/baileys-event-stream.js +63 -63
  74. package/lib/Utils/business.d.ts +22 -22
  75. package/lib/Utils/business.js +234 -234
  76. package/lib/Utils/chat-utils.d.ts +71 -71
  77. package/lib/Utils/chat-utils.js +724 -724
  78. package/lib/Utils/crypto.d.ts +41 -41
  79. package/lib/Utils/crypto.js +151 -151
  80. package/lib/Utils/decode-wa-message.d.ts +19 -19
  81. package/lib/Utils/decode-wa-message.js +174 -174
  82. package/lib/Utils/event-buffer.d.ts +35 -35
  83. package/lib/Utils/event-buffer.js +514 -514
  84. package/lib/Utils/generics.d.ts +94 -94
  85. package/lib/Utils/generics.js +367 -367
  86. package/lib/Utils/history.d.ts +15 -15
  87. package/lib/Utils/history.js +91 -91
  88. package/lib/Utils/index.d.ts +17 -17
  89. package/lib/Utils/index.js +33 -33
  90. package/lib/Utils/link-preview.d.ts +21 -21
  91. package/lib/Utils/link-preview.js +93 -93
  92. package/lib/Utils/logger.d.ts +4 -4
  93. package/lib/Utils/logger.js +7 -7
  94. package/lib/Utils/lt-hash.d.ts +12 -12
  95. package/lib/Utils/lt-hash.js +51 -51
  96. package/lib/Utils/make-mutex.d.ts +7 -7
  97. package/lib/Utils/make-mutex.js +43 -43
  98. package/lib/Utils/messages-media.d.ts +107 -107
  99. package/lib/Utils/messages-media.js +680 -680
  100. package/lib/Utils/messages.d.ts +76 -76
  101. package/lib/Utils/messages.js +768 -768
  102. package/lib/Utils/noise-handler.d.ts +20 -20
  103. package/lib/Utils/noise-handler.js +142 -142
  104. package/lib/Utils/process-message.d.ts +41 -41
  105. package/lib/Utils/process-message.js +320 -320
  106. package/lib/Utils/signal.d.ts +32 -32
  107. package/lib/Utils/signal.js +151 -151
  108. package/lib/Utils/use-multi-file-auth-state.d.ts +12 -12
  109. package/lib/Utils/use-multi-file-auth-state.js +80 -80
  110. package/lib/Utils/validate-connection.d.ts +11 -11
  111. package/lib/Utils/validate-connection.js +191 -222
  112. package/lib/WABinary/constants.d.ts +27 -27
  113. package/lib/WABinary/constants.js +40 -40
  114. package/lib/WABinary/decode.d.ts +7 -7
  115. package/lib/WABinary/decode.js +252 -252
  116. package/lib/WABinary/encode.d.ts +3 -3
  117. package/lib/WABinary/encode.js +228 -228
  118. package/lib/WABinary/generic-utils.d.ts +15 -15
  119. package/lib/WABinary/generic-utils.js +110 -110
  120. package/lib/WABinary/index.d.ts +5 -5
  121. package/lib/WABinary/index.js +21 -21
  122. package/lib/WABinary/jid-utils.d.ts +29 -29
  123. package/lib/WABinary/jid-utils.js +59 -59
  124. package/lib/WABinary/types.d.ts +18 -18
  125. package/lib/WABinary/types.js +2 -2
  126. package/lib/index.d.ts +10 -10
  127. package/lib/index.js +29 -29
  128. package/package.json +1 -1
  129. package/CHANGELOG.md +0 -4
@@ -1,41 +1,41 @@
1
- /// <reference types="node" />
2
- import { KeyPair } from '../Types';
3
- /** prefix version byte to the pub keys, required for some curve crypto functions */
4
- export declare const generateSignalPubKey: (pubKey: Uint8Array | Buffer) => Uint8Array | Buffer;
5
- export declare const Curve: {
6
- generateKeyPair: () => KeyPair;
7
- sharedKey: (privateKey: Uint8Array, publicKey: Uint8Array) => Buffer;
8
- sign: (privateKey: Uint8Array, buf: Uint8Array) => any;
9
- verify: (pubKey: Uint8Array, message: Uint8Array, signature: Uint8Array) => boolean;
10
- };
11
- export declare const signedKeyPair: (identityKeyPair: KeyPair, keyId: number) => {
12
- keyPair: KeyPair;
13
- signature: any;
14
- keyId: number;
15
- };
16
- /**
17
- * encrypt AES 256 GCM;
18
- * where the tag tag is suffixed to the ciphertext
19
- * */
20
- export declare function aesEncryptGCM(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer;
21
- /**
22
- * decrypt AES 256 GCM;
23
- * where the auth tag is suffixed to the ciphertext
24
- * */
25
- export declare function aesDecryptGCM(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer;
26
- export declare function aesEncryptCTR(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer;
27
- export declare function aesDecryptCTR(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer;
28
- /** decrypt AES 256 CBC; where the IV is prefixed to the buffer */
29
- export declare function aesDecrypt(buffer: Buffer, key: Buffer): Buffer;
30
- /** decrypt AES 256 CBC */
31
- export declare function aesDecryptWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer;
32
- export declare function aesEncrypt(buffer: Buffer | Uint8Array, key: Buffer): Buffer;
33
- export declare function aesEncrypWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer;
34
- export declare function hmacSign(buffer: Buffer | Uint8Array, key: Buffer | Uint8Array, variant?: 'sha256' | 'sha512'): Buffer;
35
- export declare function sha256(buffer: Buffer): Buffer;
36
- export declare function md5(buffer: Buffer): Buffer;
37
- export declare function hkdf(buffer: Uint8Array | Buffer, expandedLength: number, info: {
38
- salt?: Buffer;
39
- info?: string;
40
- }): Buffer;
41
- export declare function derivePairingCodeKey(pairingCode: string, salt: Buffer): Buffer;
1
+ /// <reference types="node" />
2
+ import { KeyPair } from '../Types';
3
+ /** prefix version byte to the pub keys, required for some curve crypto functions */
4
+ export declare const generateSignalPubKey: (pubKey: Uint8Array | Buffer) => Uint8Array | Buffer;
5
+ export declare const Curve: {
6
+ generateKeyPair: () => KeyPair;
7
+ sharedKey: (privateKey: Uint8Array, publicKey: Uint8Array) => Buffer;
8
+ sign: (privateKey: Uint8Array, buf: Uint8Array) => any;
9
+ verify: (pubKey: Uint8Array, message: Uint8Array, signature: Uint8Array) => boolean;
10
+ };
11
+ export declare const signedKeyPair: (identityKeyPair: KeyPair, keyId: number) => {
12
+ keyPair: KeyPair;
13
+ signature: any;
14
+ keyId: number;
15
+ };
16
+ /**
17
+ * encrypt AES 256 GCM;
18
+ * where the tag tag is suffixed to the ciphertext
19
+ * */
20
+ export declare function aesEncryptGCM(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer;
21
+ /**
22
+ * decrypt AES 256 GCM;
23
+ * where the auth tag is suffixed to the ciphertext
24
+ * */
25
+ export declare function aesDecryptGCM(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array, additionalData: Uint8Array): Buffer;
26
+ export declare function aesEncryptCTR(plaintext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer;
27
+ export declare function aesDecryptCTR(ciphertext: Uint8Array, key: Uint8Array, iv: Uint8Array): Buffer;
28
+ /** decrypt AES 256 CBC; where the IV is prefixed to the buffer */
29
+ export declare function aesDecrypt(buffer: Buffer, key: Buffer): Buffer;
30
+ /** decrypt AES 256 CBC */
31
+ export declare function aesDecryptWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer;
32
+ export declare function aesEncrypt(buffer: Buffer | Uint8Array, key: Buffer): Buffer;
33
+ export declare function aesEncrypWithIV(buffer: Buffer, key: Buffer, IV: Buffer): Buffer;
34
+ export declare function hmacSign(buffer: Buffer | Uint8Array, key: Buffer | Uint8Array, variant?: 'sha256' | 'sha512'): Buffer;
35
+ export declare function sha256(buffer: Buffer): Buffer;
36
+ export declare function md5(buffer: Buffer): Buffer;
37
+ export declare function hkdf(buffer: Uint8Array | Buffer, expandedLength: number, info: {
38
+ salt?: Buffer;
39
+ info?: string;
40
+ }): Buffer;
41
+ export declare function derivePairingCodeKey(pairingCode: string, salt: Buffer): Buffer;
@@ -1,151 +1,151 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- var __importDefault = (this && this.__importDefault) || function (mod) {
26
- return (mod && mod.__esModule) ? mod : { "default": mod };
27
- };
28
- Object.defineProperty(exports, "__esModule", { value: true });
29
- exports.derivePairingCodeKey = exports.hkdf = exports.md5 = exports.sha256 = exports.hmacSign = exports.aesEncrypWithIV = exports.aesEncrypt = exports.aesDecryptWithIV = exports.aesDecrypt = exports.aesDecryptCTR = exports.aesEncryptCTR = exports.aesDecryptGCM = exports.aesEncryptGCM = exports.signedKeyPair = exports.Curve = exports.generateSignalPubKey = void 0;
30
- const crypto_1 = require("crypto");
31
- const futoin_hkdf_1 = __importDefault(require("futoin-hkdf"));
32
- const libsignal = __importStar(require("libsignal"));
33
- const Defaults_1 = require("../Defaults");
34
- /** prefix version byte to the pub keys, required for some curve crypto functions */
35
- const generateSignalPubKey = (pubKey) => (pubKey.length === 33
36
- ? pubKey
37
- : Buffer.concat([Defaults_1.KEY_BUNDLE_TYPE, pubKey]));
38
- exports.generateSignalPubKey = generateSignalPubKey;
39
- exports.Curve = {
40
- generateKeyPair: () => {
41
- const { pubKey, privKey } = libsignal.curve.generateKeyPair();
42
- return {
43
- private: Buffer.from(privKey),
44
- // remove version byte
45
- public: Buffer.from(pubKey.slice(1))
46
- };
47
- },
48
- sharedKey: (privateKey, publicKey) => {
49
- const shared = libsignal.curve.calculateAgreement((0, exports.generateSignalPubKey)(publicKey), privateKey);
50
- return Buffer.from(shared);
51
- },
52
- sign: (privateKey, buf) => (libsignal.curve.calculateSignature(privateKey, buf)),
53
- verify: (pubKey, message, signature) => {
54
- try {
55
- libsignal.curve.verifySignature((0, exports.generateSignalPubKey)(pubKey), message, signature);
56
- return true;
57
- }
58
- catch (error) {
59
- return false;
60
- }
61
- }
62
- };
63
- const signedKeyPair = (identityKeyPair, keyId) => {
64
- const preKey = exports.Curve.generateKeyPair();
65
- const pubKey = (0, exports.generateSignalPubKey)(preKey.public);
66
- const signature = exports.Curve.sign(identityKeyPair.private, pubKey);
67
- return { keyPair: preKey, signature, keyId };
68
- };
69
- exports.signedKeyPair = signedKeyPair;
70
- const GCM_TAG_LENGTH = 128 >> 3;
71
- /**
72
- * encrypt AES 256 GCM;
73
- * where the tag tag is suffixed to the ciphertext
74
- * */
75
- function aesEncryptGCM(plaintext, key, iv, additionalData) {
76
- const cipher = (0, crypto_1.createCipheriv)('aes-256-gcm', key, iv);
77
- cipher.setAAD(additionalData);
78
- return Buffer.concat([cipher.update(plaintext), cipher.final(), cipher.getAuthTag()]);
79
- }
80
- exports.aesEncryptGCM = aesEncryptGCM;
81
- /**
82
- * decrypt AES 256 GCM;
83
- * where the auth tag is suffixed to the ciphertext
84
- * */
85
- function aesDecryptGCM(ciphertext, key, iv, additionalData) {
86
- const decipher = (0, crypto_1.createDecipheriv)('aes-256-gcm', key, iv);
87
- // decrypt additional adata
88
- const enc = ciphertext.slice(0, ciphertext.length - GCM_TAG_LENGTH);
89
- const tag = ciphertext.slice(ciphertext.length - GCM_TAG_LENGTH);
90
- // set additional data
91
- decipher.setAAD(additionalData);
92
- decipher.setAuthTag(tag);
93
- return Buffer.concat([decipher.update(enc), decipher.final()]);
94
- }
95
- exports.aesDecryptGCM = aesDecryptGCM;
96
- function aesEncryptCTR(plaintext, key, iv) {
97
- const cipher = (0, crypto_1.createCipheriv)('aes-256-ctr', key, iv);
98
- return Buffer.concat([cipher.update(plaintext), cipher.final()]);
99
- }
100
- exports.aesEncryptCTR = aesEncryptCTR;
101
- function aesDecryptCTR(ciphertext, key, iv) {
102
- const decipher = (0, crypto_1.createDecipheriv)('aes-256-ctr', key, iv);
103
- return Buffer.concat([decipher.update(ciphertext), decipher.final()]);
104
- }
105
- exports.aesDecryptCTR = aesDecryptCTR;
106
- /** decrypt AES 256 CBC; where the IV is prefixed to the buffer */
107
- function aesDecrypt(buffer, key) {
108
- return aesDecryptWithIV(buffer.slice(16, buffer.length), key, buffer.slice(0, 16));
109
- }
110
- exports.aesDecrypt = aesDecrypt;
111
- /** decrypt AES 256 CBC */
112
- function aesDecryptWithIV(buffer, key, IV) {
113
- const aes = (0, crypto_1.createDecipheriv)('aes-256-cbc', key, IV);
114
- return Buffer.concat([aes.update(buffer), aes.final()]);
115
- }
116
- exports.aesDecryptWithIV = aesDecryptWithIV;
117
- // encrypt AES 256 CBC; where a random IV is prefixed to the buffer
118
- function aesEncrypt(buffer, key) {
119
- const IV = (0, crypto_1.randomBytes)(16);
120
- const aes = (0, crypto_1.createCipheriv)('aes-256-cbc', key, IV);
121
- return Buffer.concat([IV, aes.update(buffer), aes.final()]); // prefix IV to the buffer
122
- }
123
- exports.aesEncrypt = aesEncrypt;
124
- // encrypt AES 256 CBC with a given IV
125
- function aesEncrypWithIV(buffer, key, IV) {
126
- const aes = (0, crypto_1.createCipheriv)('aes-256-cbc', key, IV);
127
- return Buffer.concat([aes.update(buffer), aes.final()]); // prefix IV to the buffer
128
- }
129
- exports.aesEncrypWithIV = aesEncrypWithIV;
130
- // sign HMAC using SHA 256
131
- function hmacSign(buffer, key, variant = 'sha256') {
132
- return (0, crypto_1.createHmac)(variant, key).update(buffer).digest();
133
- }
134
- exports.hmacSign = hmacSign;
135
- function sha256(buffer) {
136
- return (0, crypto_1.createHash)('sha256').update(buffer).digest();
137
- }
138
- exports.sha256 = sha256;
139
- function md5(buffer) {
140
- return (0, crypto_1.createHash)('md5').update(buffer).digest();
141
- }
142
- exports.md5 = md5;
143
- // HKDF key expansion
144
- function hkdf(buffer, expandedLength, info) {
145
- return (0, futoin_hkdf_1.default)(!Buffer.isBuffer(buffer) ? Buffer.from(buffer) : buffer, expandedLength, info);
146
- }
147
- exports.hkdf = hkdf;
148
- function derivePairingCodeKey(pairingCode, salt) {
149
- return (0, crypto_1.pbkdf2Sync)(pairingCode, salt, 2 << 16, 32, 'sha256');
150
- }
151
- exports.derivePairingCodeKey = derivePairingCodeKey;
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ var __importDefault = (this && this.__importDefault) || function (mod) {
26
+ return (mod && mod.__esModule) ? mod : { "default": mod };
27
+ };
28
+ Object.defineProperty(exports, "__esModule", { value: true });
29
+ exports.derivePairingCodeKey = exports.hkdf = exports.md5 = exports.sha256 = exports.hmacSign = exports.aesEncrypWithIV = exports.aesEncrypt = exports.aesDecryptWithIV = exports.aesDecrypt = exports.aesDecryptCTR = exports.aesEncryptCTR = exports.aesDecryptGCM = exports.aesEncryptGCM = exports.signedKeyPair = exports.Curve = exports.generateSignalPubKey = void 0;
30
+ const crypto_1 = require("crypto");
31
+ const futoin_hkdf_1 = __importDefault(require("futoin-hkdf"));
32
+ const libsignal = __importStar(require("libsignal"));
33
+ const Defaults_1 = require("../Defaults");
34
+ /** prefix version byte to the pub keys, required for some curve crypto functions */
35
+ const generateSignalPubKey = (pubKey) => (pubKey.length === 33
36
+ ? pubKey
37
+ : Buffer.concat([Defaults_1.KEY_BUNDLE_TYPE, pubKey]));
38
+ exports.generateSignalPubKey = generateSignalPubKey;
39
+ exports.Curve = {
40
+ generateKeyPair: () => {
41
+ const { pubKey, privKey } = libsignal.curve.generateKeyPair();
42
+ return {
43
+ private: Buffer.from(privKey),
44
+ // remove version byte
45
+ public: Buffer.from(pubKey.slice(1))
46
+ };
47
+ },
48
+ sharedKey: (privateKey, publicKey) => {
49
+ const shared = libsignal.curve.calculateAgreement((0, exports.generateSignalPubKey)(publicKey), privateKey);
50
+ return Buffer.from(shared);
51
+ },
52
+ sign: (privateKey, buf) => (libsignal.curve.calculateSignature(privateKey, buf)),
53
+ verify: (pubKey, message, signature) => {
54
+ try {
55
+ libsignal.curve.verifySignature((0, exports.generateSignalPubKey)(pubKey), message, signature);
56
+ return true;
57
+ }
58
+ catch (error) {
59
+ return false;
60
+ }
61
+ }
62
+ };
63
+ const signedKeyPair = (identityKeyPair, keyId) => {
64
+ const preKey = exports.Curve.generateKeyPair();
65
+ const pubKey = (0, exports.generateSignalPubKey)(preKey.public);
66
+ const signature = exports.Curve.sign(identityKeyPair.private, pubKey);
67
+ return { keyPair: preKey, signature, keyId };
68
+ };
69
+ exports.signedKeyPair = signedKeyPair;
70
+ const GCM_TAG_LENGTH = 128 >> 3;
71
+ /**
72
+ * encrypt AES 256 GCM;
73
+ * where the tag tag is suffixed to the ciphertext
74
+ * */
75
+ function aesEncryptGCM(plaintext, key, iv, additionalData) {
76
+ const cipher = (0, crypto_1.createCipheriv)('aes-256-gcm', key, iv);
77
+ cipher.setAAD(additionalData);
78
+ return Buffer.concat([cipher.update(plaintext), cipher.final(), cipher.getAuthTag()]);
79
+ }
80
+ exports.aesEncryptGCM = aesEncryptGCM;
81
+ /**
82
+ * decrypt AES 256 GCM;
83
+ * where the auth tag is suffixed to the ciphertext
84
+ * */
85
+ function aesDecryptGCM(ciphertext, key, iv, additionalData) {
86
+ const decipher = (0, crypto_1.createDecipheriv)('aes-256-gcm', key, iv);
87
+ // decrypt additional adata
88
+ const enc = ciphertext.slice(0, ciphertext.length - GCM_TAG_LENGTH);
89
+ const tag = ciphertext.slice(ciphertext.length - GCM_TAG_LENGTH);
90
+ // set additional data
91
+ decipher.setAAD(additionalData);
92
+ decipher.setAuthTag(tag);
93
+ return Buffer.concat([decipher.update(enc), decipher.final()]);
94
+ }
95
+ exports.aesDecryptGCM = aesDecryptGCM;
96
+ function aesEncryptCTR(plaintext, key, iv) {
97
+ const cipher = (0, crypto_1.createCipheriv)('aes-256-ctr', key, iv);
98
+ return Buffer.concat([cipher.update(plaintext), cipher.final()]);
99
+ }
100
+ exports.aesEncryptCTR = aesEncryptCTR;
101
+ function aesDecryptCTR(ciphertext, key, iv) {
102
+ const decipher = (0, crypto_1.createDecipheriv)('aes-256-ctr', key, iv);
103
+ return Buffer.concat([decipher.update(ciphertext), decipher.final()]);
104
+ }
105
+ exports.aesDecryptCTR = aesDecryptCTR;
106
+ /** decrypt AES 256 CBC; where the IV is prefixed to the buffer */
107
+ function aesDecrypt(buffer, key) {
108
+ return aesDecryptWithIV(buffer.slice(16, buffer.length), key, buffer.slice(0, 16));
109
+ }
110
+ exports.aesDecrypt = aesDecrypt;
111
+ /** decrypt AES 256 CBC */
112
+ function aesDecryptWithIV(buffer, key, IV) {
113
+ const aes = (0, crypto_1.createDecipheriv)('aes-256-cbc', key, IV);
114
+ return Buffer.concat([aes.update(buffer), aes.final()]);
115
+ }
116
+ exports.aesDecryptWithIV = aesDecryptWithIV;
117
+ // encrypt AES 256 CBC; where a random IV is prefixed to the buffer
118
+ function aesEncrypt(buffer, key) {
119
+ const IV = (0, crypto_1.randomBytes)(16);
120
+ const aes = (0, crypto_1.createCipheriv)('aes-256-cbc', key, IV);
121
+ return Buffer.concat([IV, aes.update(buffer), aes.final()]); // prefix IV to the buffer
122
+ }
123
+ exports.aesEncrypt = aesEncrypt;
124
+ // encrypt AES 256 CBC with a given IV
125
+ function aesEncrypWithIV(buffer, key, IV) {
126
+ const aes = (0, crypto_1.createCipheriv)('aes-256-cbc', key, IV);
127
+ return Buffer.concat([aes.update(buffer), aes.final()]); // prefix IV to the buffer
128
+ }
129
+ exports.aesEncrypWithIV = aesEncrypWithIV;
130
+ // sign HMAC using SHA 256
131
+ function hmacSign(buffer, key, variant = 'sha256') {
132
+ return (0, crypto_1.createHmac)(variant, key).update(buffer).digest();
133
+ }
134
+ exports.hmacSign = hmacSign;
135
+ function sha256(buffer) {
136
+ return (0, crypto_1.createHash)('sha256').update(buffer).digest();
137
+ }
138
+ exports.sha256 = sha256;
139
+ function md5(buffer) {
140
+ return (0, crypto_1.createHash)('md5').update(buffer).digest();
141
+ }
142
+ exports.md5 = md5;
143
+ // HKDF key expansion
144
+ function hkdf(buffer, expandedLength, info) {
145
+ return (0, futoin_hkdf_1.default)(!Buffer.isBuffer(buffer) ? Buffer.from(buffer) : buffer, expandedLength, info);
146
+ }
147
+ exports.hkdf = hkdf;
148
+ function derivePairingCodeKey(pairingCode, salt) {
149
+ return (0, crypto_1.pbkdf2Sync)(pairingCode, salt, 2 << 16, 32, 'sha256');
150
+ }
151
+ exports.derivePairingCodeKey = derivePairingCodeKey;
@@ -1,19 +1,19 @@
1
- import { Logger } from 'pino';
2
- import { proto } from '../../WAProto';
3
- import { SignalRepository } from '../Types';
4
- import { BinaryNode } from '../WABinary';
5
- /**
6
- * Decode the received node as a message.
7
- * @note this will only parse the message, not decrypt it
8
- */
9
- export declare function decodeMessageNode(stanza: BinaryNode, meId: string, meLid: string): {
10
- fullMessage: proto.IWebMessageInfo;
11
- author: string;
12
- sender: string;
13
- };
14
- export declare const decryptMessageNode: (stanza: BinaryNode, meId: string, meLid: string, repository: SignalRepository, logger: Logger) => {
15
- fullMessage: proto.IWebMessageInfo;
16
- category: string;
17
- author: string;
18
- decrypt(): Promise<void>;
19
- };
1
+ import { Logger } from 'pino';
2
+ import { proto } from '../../WAProto';
3
+ import { SignalRepository } from '../Types';
4
+ import { BinaryNode } from '../WABinary';
5
+ /**
6
+ * Decode the received node as a message.
7
+ * @note this will only parse the message, not decrypt it
8
+ */
9
+ export declare function decodeMessageNode(stanza: BinaryNode, meId: string, meLid: string): {
10
+ fullMessage: proto.IWebMessageInfo;
11
+ author: string;
12
+ sender: string;
13
+ };
14
+ export declare const decryptMessageNode: (stanza: BinaryNode, meId: string, meLid: string, repository: SignalRepository, logger: Logger) => {
15
+ fullMessage: proto.IWebMessageInfo;
16
+ category: string;
17
+ author: string;
18
+ decrypt(): Promise<void>;
19
+ };