@towns-labs/encryption 2.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. package/README.md +3 -0
  2. package/dist/CryptoStoreInMemory.d.ts +42 -0
  3. package/dist/CryptoStoreInMemory.d.ts.map +1 -0
  4. package/dist/CryptoStoreInMemory.js +172 -0
  5. package/dist/CryptoStoreInMemory.js.map +1 -0
  6. package/dist/CryptoStoreIndexedDb.d.ts +55 -0
  7. package/dist/CryptoStoreIndexedDb.d.ts.map +1 -0
  8. package/dist/CryptoStoreIndexedDb.js +139 -0
  9. package/dist/CryptoStoreIndexedDb.js.map +1 -0
  10. package/dist/base.d.ts +69 -0
  11. package/dist/base.d.ts.map +1 -0
  12. package/dist/base.js +44 -0
  13. package/dist/base.js.map +1 -0
  14. package/dist/cryptoAesGcm.d.ts +9 -0
  15. package/dist/cryptoAesGcm.d.ts.map +1 -0
  16. package/dist/cryptoAesGcm.js +30 -0
  17. package/dist/cryptoAesGcm.js.map +1 -0
  18. package/dist/cryptoStore.d.ts +34 -0
  19. package/dist/cryptoStore.d.ts.map +1 -0
  20. package/dist/cryptoStore.js +17 -0
  21. package/dist/cryptoStore.js.map +1 -0
  22. package/dist/derivedEncryption.d.ts +2 -0
  23. package/dist/derivedEncryption.d.ts.map +1 -0
  24. package/dist/derivedEncryption.js +2 -0
  25. package/dist/derivedEncryption.js.map +1 -0
  26. package/dist/encryptionDelegate.d.ts +16 -0
  27. package/dist/encryptionDelegate.d.ts.map +1 -0
  28. package/dist/encryptionDelegate.js +64 -0
  29. package/dist/encryptionDelegate.js.map +1 -0
  30. package/dist/encryptionDevice.d.ts +264 -0
  31. package/dist/encryptionDevice.d.ts.map +1 -0
  32. package/dist/encryptionDevice.js +745 -0
  33. package/dist/encryptionDevice.js.map +1 -0
  34. package/dist/encryptionTypes.d.ts +21 -0
  35. package/dist/encryptionTypes.d.ts.map +1 -0
  36. package/dist/encryptionTypes.js +2 -0
  37. package/dist/encryptionTypes.js.map +1 -0
  38. package/dist/groupDecryption.d.ts +34 -0
  39. package/dist/groupDecryption.d.ts.map +1 -0
  40. package/dist/groupDecryption.js +84 -0
  41. package/dist/groupDecryption.js.map +1 -0
  42. package/dist/groupEncryption.d.ts +35 -0
  43. package/dist/groupEncryption.d.ts.map +1 -0
  44. package/dist/groupEncryption.js +99 -0
  45. package/dist/groupEncryption.js.map +1 -0
  46. package/dist/groupEncryptionCrypto.d.ts +125 -0
  47. package/dist/groupEncryptionCrypto.d.ts.map +1 -0
  48. package/dist/groupEncryptionCrypto.js +268 -0
  49. package/dist/groupEncryptionCrypto.js.map +1 -0
  50. package/dist/hybridGroupDecryption.d.ts +33 -0
  51. package/dist/hybridGroupDecryption.d.ts.map +1 -0
  52. package/dist/hybridGroupDecryption.js +84 -0
  53. package/dist/hybridGroupDecryption.js.map +1 -0
  54. package/dist/hybridGroupEncryption.d.ts +27 -0
  55. package/dist/hybridGroupEncryption.d.ts.map +1 -0
  56. package/dist/hybridGroupEncryption.js +101 -0
  57. package/dist/hybridGroupEncryption.js.map +1 -0
  58. package/dist/index.d.ts +20 -0
  59. package/dist/index.d.ts.map +1 -0
  60. package/dist/index.js +20 -0
  61. package/dist/index.js.map +1 -0
  62. package/dist/olmLib.d.ts +35 -0
  63. package/dist/olmLib.d.ts.map +1 -0
  64. package/dist/olmLib.js +37 -0
  65. package/dist/olmLib.js.map +1 -0
  66. package/dist/storeTypes.d.ts +27 -0
  67. package/dist/storeTypes.d.ts.map +1 -0
  68. package/dist/storeTypes.js +2 -0
  69. package/dist/storeTypes.js.map +1 -0
  70. package/dist/tests/cryptoAesGcm.test.d.ts +2 -0
  71. package/dist/tests/cryptoAesGcm.test.d.ts.map +1 -0
  72. package/dist/tests/cryptoAesGcm.test.js +71 -0
  73. package/dist/tests/cryptoAesGcm.test.js.map +1 -0
  74. package/dist/tests/cryptoStore.test.d.ts +5 -0
  75. package/dist/tests/cryptoStore.test.d.ts.map +1 -0
  76. package/dist/tests/cryptoStore.test.js +114 -0
  77. package/dist/tests/cryptoStore.test.js.map +1 -0
  78. package/dist/tests/encryption-protocol.test.d.ts +2 -0
  79. package/dist/tests/encryption-protocol.test.d.ts.map +1 -0
  80. package/dist/tests/encryption-protocol.test.js +150 -0
  81. package/dist/tests/encryption-protocol.test.js.map +1 -0
  82. package/dist/tests/encryptionDelegate.test.d.ts +2 -0
  83. package/dist/tests/encryptionDelegate.test.d.ts.map +1 -0
  84. package/dist/tests/encryptionDelegate.test.js +78 -0
  85. package/dist/tests/encryptionDelegate.test.js.map +1 -0
  86. package/dist/tests/group-encryption-protocol.test.d.ts +2 -0
  87. package/dist/tests/group-encryption-protocol.test.d.ts.map +1 -0
  88. package/dist/tests/group-encryption-protocol.test.js +103 -0
  89. package/dist/tests/group-encryption-protocol.test.js.map +1 -0
  90. package/dist/tests/group-encryptionDelegate.test.d.ts +2 -0
  91. package/dist/tests/group-encryptionDelegate.test.d.ts.map +1 -0
  92. package/dist/tests/group-encryptionDelegate.test.js +23 -0
  93. package/dist/tests/group-encryptionDelegate.test.js.map +1 -0
  94. package/dist/tests/pk.test.d.ts +2 -0
  95. package/dist/tests/pk.test.d.ts.map +1 -0
  96. package/dist/tests/pk.test.js +103 -0
  97. package/dist/tests/pk.test.js.map +1 -0
  98. package/package.json +51 -0
@@ -0,0 +1,103 @@
1
+ import { EncryptionDelegate } from '../encryptionDelegate';
2
+ import debug from 'debug';
3
+ const log = debug('test');
4
+ describe.concurrent('Group Encryption Protocol', () => {
5
+ let aliceSession;
6
+ let bobSession;
7
+ let eveSession;
8
+ afterAll(async () => {
9
+ if (aliceSession !== undefined) {
10
+ aliceSession.free();
11
+ aliceSession = undefined;
12
+ }
13
+ if (bobSession !== undefined) {
14
+ bobSession.free();
15
+ bobSession = undefined;
16
+ }
17
+ if (eveSession !== undefined) {
18
+ eveSession.free();
19
+ eveSession = undefined;
20
+ }
21
+ });
22
+ it('noInitShouldFail', async () => {
23
+ const delegate = new EncryptionDelegate();
24
+ try {
25
+ aliceSession = delegate.createOutboundGroupSession();
26
+ }
27
+ catch (e) {
28
+ expect(e.message).toEqual('olm not initialized');
29
+ }
30
+ expect(aliceSession).toBeUndefined();
31
+ });
32
+ it('shouldEncryptAndDecryptGroup', async () => {
33
+ const delegate = new EncryptionDelegate();
34
+ await delegate.init();
35
+ aliceSession = delegate.createOutboundGroupSession();
36
+ bobSession = delegate.createInboundGroupSession();
37
+ eveSession = delegate.createInboundGroupSession();
38
+ aliceSession.create();
39
+ expect(aliceSession.message_index()).toEqual(0);
40
+ bobSession.create(aliceSession.session_key());
41
+ eveSession.create(aliceSession.session_key());
42
+ let TEST_TEXT = 'alice test text';
43
+ let encrypted = aliceSession.encrypt(TEST_TEXT);
44
+ let decrypted = bobSession.decrypt(encrypted);
45
+ log('bob decrypted ciphertext: ', decrypted);
46
+ expect(decrypted.plaintext).toEqual(TEST_TEXT);
47
+ expect(decrypted.message_index).toEqual(0);
48
+ TEST_TEXT = 'alice test text: =';
49
+ encrypted = aliceSession.encrypt(TEST_TEXT);
50
+ decrypted = bobSession.decrypt(encrypted);
51
+ log('bob decrypted ciphertext: ', decrypted);
52
+ expect(decrypted.plaintext).toEqual(TEST_TEXT);
53
+ expect(decrypted.message_index).toEqual(1);
54
+ TEST_TEXT = '!';
55
+ encrypted = aliceSession.encrypt(TEST_TEXT);
56
+ decrypted = bobSession.decrypt(encrypted);
57
+ log('bob decrypted ciphertext: ', decrypted);
58
+ expect(decrypted.plaintext).toEqual(TEST_TEXT);
59
+ expect(decrypted.message_index).toEqual(2);
60
+ decrypted = eveSession.decrypt(encrypted);
61
+ log('eve decrypted ciphertext: ', decrypted);
62
+ expect(decrypted.plaintext).toEqual(TEST_TEXT);
63
+ expect(decrypted.message_index).toEqual(2);
64
+ });
65
+ it('shouldEncryptAndDecryptGroupMultipleInit', async () => {
66
+ const delegate = new EncryptionDelegate();
67
+ await delegate.init();
68
+ aliceSession = delegate.createOutboundGroupSession();
69
+ bobSession = delegate.createInboundGroupSession();
70
+ eveSession = delegate.createInboundGroupSession();
71
+ aliceSession.create();
72
+ expect(aliceSession.message_index()).toEqual(0);
73
+ bobSession.create(aliceSession.session_key());
74
+ eveSession.create(aliceSession.session_key());
75
+ await delegate.init();
76
+ let TEST_TEXT = 'alice test text';
77
+ let encrypted = aliceSession.encrypt(TEST_TEXT);
78
+ let decrypted = bobSession.decrypt(encrypted);
79
+ log('bob decrypted ciphertext: ', decrypted);
80
+ expect(decrypted.plaintext).toEqual(TEST_TEXT);
81
+ expect(decrypted.message_index).toEqual(0);
82
+ await delegate.init();
83
+ TEST_TEXT = 'alice test text: =';
84
+ encrypted = aliceSession.encrypt(TEST_TEXT);
85
+ decrypted = bobSession.decrypt(encrypted);
86
+ log('bob decrypted ciphertext: ', decrypted);
87
+ expect(decrypted.plaintext).toEqual(TEST_TEXT);
88
+ expect(decrypted.message_index).toEqual(1);
89
+ await delegate.init();
90
+ TEST_TEXT = '!';
91
+ encrypted = aliceSession.encrypt(TEST_TEXT);
92
+ decrypted = bobSession.decrypt(encrypted);
93
+ log('bob decrypted ciphertext: ', decrypted);
94
+ expect(decrypted.plaintext).toEqual(TEST_TEXT);
95
+ expect(decrypted.message_index).toEqual(2);
96
+ await delegate.init();
97
+ decrypted = eveSession.decrypt(encrypted);
98
+ log('eve decrypted ciphertext: ', decrypted);
99
+ expect(decrypted.plaintext).toEqual(TEST_TEXT);
100
+ expect(decrypted.message_index).toEqual(2);
101
+ });
102
+ });
103
+ //# sourceMappingURL=group-encryption-protocol.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"group-encryption-protocol.test.js","sourceRoot":"","sources":["../../src/tests/group-encryption-protocol.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAA;AAC1D,OAAO,KAAK,MAAM,OAAO,CAAA;AAGzB,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,CAAA;AAEzB,QAAQ,CAAC,UAAU,CAAC,2BAA2B,EAAE,GAAG,EAAE;IAClD,IAAI,YAA8C,CAAA;IAClD,IAAI,UAA2C,CAAA;IAC/C,IAAI,UAA2C,CAAA;IAE/C,QAAQ,CAAC,KAAK,IAAI,EAAE;QAChB,IAAI,YAAY,KAAK,SAAS,EAAE,CAAC;YAC7B,YAAY,CAAC,IAAI,EAAE,CAAA;YACnB,YAAY,GAAG,SAAS,CAAA;QAC5B,CAAC;QAED,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YAC3B,UAAU,CAAC,IAAI,EAAE,CAAA;YACjB,UAAU,GAAG,SAAS,CAAA;QAC1B,CAAC;QAED,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YAC3B,UAAU,CAAC,IAAI,EAAE,CAAA;YACjB,UAAU,GAAG,SAAS,CAAA;QAC1B,CAAC;IACL,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,kBAAkB,EAAE,KAAK,IAAI,EAAE;QAC9B,MAAM,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;QACzC,IAAI,CAAC;YACD,YAAY,GAAG,QAAQ,CAAC,0BAA0B,EAAE,CAAA;QACxD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACT,MAAM,CAAE,CAAW,CAAC,OAAO,CAAC,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAA;QAC/D,CAAC;QACD,MAAM,CAAC,YAAY,CAAC,CAAC,aAAa,EAAE,CAAA;IACxC,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,8BAA8B,EAAE,KAAK,IAAI,EAAE;QAC1C,MAAM,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;QACzC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,YAAY,GAAG,QAAQ,CAAC,0BAA0B,EAAE,CAAA;QACpD,UAAU,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QACjD,UAAU,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QAEjD,YAAY,CAAC,MAAM,EAAE,CAAA;QACrB,MAAM,CAAC,YAAY,CAAC,aAAa,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAC/C,UAAU,CAAC,MAAM,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAAA;QAC7C,UAAU,CAAC,MAAM,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAAA;QAE7C,IAAI,SAAS,GAAG,iBAAiB,CAAA;QACjC,IAAI,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC/C,IAAI,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC7C,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,SAAS,GAAG,oBAAoB,CAAA;QAChC,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC3C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,SAAS,GAAG,GAAG,CAAA;QACf,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC3C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;IAC9C,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,0CAA0C,EAAE,KAAK,IAAI,EAAE;QACtD,MAAM,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;QACzC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,YAAY,GAAG,QAAQ,CAAC,0BAA0B,EAAE,CAAA;QACpD,UAAU,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QACjD,UAAU,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QAEjD,YAAY,CAAC,MAAM,EAAE,CAAA;QACrB,MAAM,CAAC,YAAY,CAAC,aAAa,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAC/C,UAAU,CAAC,MAAM,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAAA;QAC7C,UAAU,CAAC,MAAM,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAAA;QAE7C,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,IAAI,SAAS,GAAG,iBAAiB,CAAA;QACjC,IAAI,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC/C,IAAI,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC7C,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,SAAS,GAAG,oBAAoB,CAAA;QAChC,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC3C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,SAAS,GAAG,GAAG,CAAA;QACf,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC3C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;IAC9C,CAAC,CAAC,CAAA;AACN,CAAC,CAAC,CAAA"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=group-encryptionDelegate.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"group-encryptionDelegate.test.d.ts","sourceRoot":"","sources":["../../src/tests/group-encryptionDelegate.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,23 @@
1
+ import { EncryptionDelegate } from '../encryptionDelegate';
2
+ describe.concurrent('EncryptionDelegate with group session', () => {
3
+ const delegate = new EncryptionDelegate();
4
+ beforeEach(async () => {
5
+ await delegate.init();
6
+ });
7
+ it('decrypt messages out of order', async () => {
8
+ const outboundSession = delegate.createOutboundGroupSession();
9
+ outboundSession.create();
10
+ const exportedSession = outboundSession.session_key();
11
+ const inboundSession = delegate.createInboundGroupSession();
12
+ inboundSession.create(exportedSession);
13
+ const encrypted1 = outboundSession.encrypt('message 1');
14
+ const decrypted1 = inboundSession.decrypt(encrypted1);
15
+ expect(decrypted1.plaintext).toEqual('message 1');
16
+ const encrypted3 = outboundSession.encrypt('message 3');
17
+ const decrypted3 = inboundSession.decrypt(encrypted3);
18
+ expect(decrypted3.plaintext).toEqual('message 3');
19
+ const decrypted2 = inboundSession.decrypt(encrypted3);
20
+ expect(decrypted2.plaintext).toEqual('message 3');
21
+ });
22
+ });
23
+ //# sourceMappingURL=group-encryptionDelegate.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"group-encryptionDelegate.test.js","sourceRoot":"","sources":["../../src/tests/group-encryptionDelegate.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAA;AAE1D,QAAQ,CAAC,UAAU,CAAC,uCAAuC,EAAE,GAAG,EAAE;IAC9D,MAAM,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;IAEzC,UAAU,CAAC,KAAK,IAAI,EAAE;QAClB,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;IACzB,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,+BAA+B,EAAE,KAAK,IAAI,EAAE;QAC3C,MAAM,eAAe,GAAG,QAAQ,CAAC,0BAA0B,EAAE,CAAA;QAC7D,eAAe,CAAC,MAAM,EAAE,CAAA;QAExB,MAAM,eAAe,GAAG,eAAe,CAAC,WAAW,EAAE,CAAA;QACrD,MAAM,cAAc,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QAC3D,cAAc,CAAC,MAAM,CAAC,eAAe,CAAC,CAAA;QAEtC,MAAM,UAAU,GAAG,eAAe,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QACvD,MAAM,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;QACrD,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QAEjD,MAAM,UAAU,GAAG,eAAe,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QAEvD,MAAM,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;QACrD,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QAEjD,MAAM,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;QACrD,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;IACrD,CAAC,CAAC,CAAA;AACN,CAAC,CAAC,CAAA"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=pk.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"pk.test.d.ts","sourceRoot":"","sources":["../../src/tests/pk.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,103 @@
1
+ import { EncryptionDelegate } from '../encryptionDelegate';
2
+ import debug from 'debug';
3
+ const log = debug('test');
4
+ describe.concurrent('Pk Signing and Encryption', () => {
5
+ let encryption;
6
+ let decryption;
7
+ let signing;
8
+ let delegate;
9
+ beforeEach(async () => {
10
+ delegate = new EncryptionDelegate();
11
+ await delegate.init();
12
+ // create a key pair for encryption
13
+ encryption = delegate.createPkEncryption();
14
+ // create a key pair for decryption
15
+ decryption = delegate.createPkDecryption();
16
+ signing = delegate.createPkSigning();
17
+ });
18
+ afterEach(async () => {
19
+ if (encryption !== undefined) {
20
+ encryption.free();
21
+ encryption = undefined;
22
+ }
23
+ if (decryption !== undefined) {
24
+ decryption.free();
25
+ decryption = undefined;
26
+ }
27
+ });
28
+ it('shouldImportAndExportKeysFromPrivateParts', async () => {
29
+ if (encryption === undefined || decryption === undefined) {
30
+ throw new Error('key pairs not initialized');
31
+ }
32
+ const alice_private = new Uint8Array([
33
+ 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d, 0x3c, 0x16, 0xc1, 0x72, 0x51, 0xb2,
34
+ 0x66, 0x45, 0xdf, 0x4c, 0x2f, 0x87, 0xeb, 0xc0, 0x99, 0x2a, 0xb1, 0x77, 0xfb, 0xa5,
35
+ 0x1d, 0xb9, 0x2c, 0x2a,
36
+ ]);
37
+ const alice_public = decryption.init_with_private_key(alice_private);
38
+ expect(alice_public).toEqual('hSDwCYkwp1R0i33ctD73Wg2/Og0mOBr066SpjqqbTmo');
39
+ const alice_private_out = decryption.get_private_key();
40
+ expect(alice_private_out).toEqual(alice_private);
41
+ });
42
+ it('shouldEncryptAndDecrypt', async () => {
43
+ if (encryption === undefined || decryption === undefined) {
44
+ throw new Error('key pairs not initialized');
45
+ }
46
+ let TEST_TEXT = 'test text';
47
+ const pubkey = decryption.generate_key();
48
+ encryption.set_recipient_key(pubkey);
49
+ let encrypted = encryption.encrypt(TEST_TEXT);
50
+ let decrypted = decryption.decrypt(encrypted.ephemeral, encrypted.mac, encrypted.ciphertext);
51
+ log('decrypted ciphertext: ', decrypted);
52
+ expect(decrypted).toEqual(TEST_TEXT);
53
+ TEST_TEXT = 'test text: =';
54
+ encryption.set_recipient_key(pubkey);
55
+ encrypted = encryption.encrypt(TEST_TEXT);
56
+ decrypted = decryption.decrypt(encrypted.ephemeral, encrypted.mac, encrypted.ciphertext);
57
+ log('decrypted ciphertext: ', decrypted);
58
+ expect(decrypted).toEqual(TEST_TEXT);
59
+ });
60
+ it('shouldPickleAndUnpickleKey', async () => {
61
+ if (encryption === undefined || decryption === undefined || delegate === undefined) {
62
+ throw new Error('key pairs not initialized');
63
+ }
64
+ const TEST_TEXT = 'test text';
65
+ const pubkey = decryption.generate_key();
66
+ encryption.set_recipient_key(pubkey);
67
+ const encrypted = encryption.encrypt(TEST_TEXT);
68
+ const PICKLE_KEY = 'secret_key';
69
+ const pickle = decryption.pickle(PICKLE_KEY);
70
+ const new_decryption = delegate.createPkDecryption();
71
+ const new_pubkey = new_decryption.unpickle(PICKLE_KEY, pickle);
72
+ expect(new_pubkey).toEqual(pubkey);
73
+ const decrypted = new_decryption.decrypt(encrypted.ephemeral, encrypted.mac, encrypted.ciphertext);
74
+ log('decrypted ciphertext: ', decrypted);
75
+ expect(decrypted).toEqual(TEST_TEXT);
76
+ new_decryption.free();
77
+ });
78
+ it('shouldSignAndVerify', async () => {
79
+ if (signing === undefined || delegate === undefined) {
80
+ throw new Error('key pairs not initialized');
81
+ }
82
+ const seed = new Uint8Array([
83
+ 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d, 0x3c, 0x16, 0xc1, 0x72, 0x51, 0xb2,
84
+ 0x66, 0x45, 0xdf, 0x4c, 0x2f, 0x87, 0xeb, 0xc0, 0x99, 0x2a, 0xb1, 0x77, 0xfb, 0xa5,
85
+ 0x1d, 0xb9, 0x2c, 0x2a,
86
+ ]);
87
+ const TEST_TEXT = 'I am attesting to this text';
88
+ const pubkey = signing.init_with_seed(seed);
89
+ const sig = signing.sign(TEST_TEXT);
90
+ const util = delegate.createUtility();
91
+ util.ed25519_verify(pubkey, TEST_TEXT, sig);
92
+ let verifyFailure = null;
93
+ try {
94
+ util.ed25519_verify(pubkey, TEST_TEXT, 'p' + sig.slice(1));
95
+ }
96
+ catch (e) {
97
+ verifyFailure = e;
98
+ }
99
+ expect(verifyFailure).not.toBeNull();
100
+ util.free();
101
+ });
102
+ });
103
+ //# sourceMappingURL=pk.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"pk.test.js","sourceRoot":"","sources":["../../src/tests/pk.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAA;AAC1D,OAAO,KAAK,MAAM,OAAO,CAAA;AAGzB,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,CAAA;AAEzB,QAAQ,CAAC,UAAU,CAAC,2BAA2B,EAAE,GAAG,EAAE;IAClD,IAAI,UAAoC,CAAA;IACxC,IAAI,UAAoC,CAAA;IACxC,IAAI,OAA8B,CAAA;IAClC,IAAI,QAAwC,CAAA;IAE5C,UAAU,CAAC,KAAK,IAAI,EAAE;QAClB,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;QACnC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,mCAAmC;QACnC,UAAU,GAAG,QAAQ,CAAC,kBAAkB,EAAE,CAAA;QAC1C,mCAAmC;QACnC,UAAU,GAAG,QAAQ,CAAC,kBAAkB,EAAE,CAAA;QAC1C,OAAO,GAAG,QAAQ,CAAC,eAAe,EAAE,CAAA;IACxC,CAAC,CAAC,CAAA;IAEF,SAAS,CAAC,KAAK,IAAI,EAAE;QACjB,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YAC3B,UAAU,CAAC,IAAI,EAAE,CAAA;YACjB,UAAU,GAAG,SAAS,CAAA;QAC1B,CAAC;QAED,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YAC3B,UAAU,CAAC,IAAI,EAAE,CAAA;YACjB,UAAU,GAAG,SAAS,CAAA;QAC1B,CAAC;IACL,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;QACvD,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YACvD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;QAChD,CAAC;QACD,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC;YACjC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAClF,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAClF,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;SACzB,CAAC,CAAA;QACF,MAAM,YAAY,GAAG,UAAU,CAAC,qBAAqB,CAAC,aAAa,CAAC,CAAA;QACpE,MAAM,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,6CAA6C,CAAC,CAAA;QAC3E,MAAM,iBAAiB,GAAG,UAAU,CAAC,eAAe,EAAE,CAAA;QACtD,MAAM,CAAC,iBAAiB,CAAC,CAAC,OAAO,CAAC,aAAa,CAAC,CAAA;IACpD,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,yBAAyB,EAAE,KAAK,IAAI,EAAE;QACrC,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YACvD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;QAChD,CAAC;QACD,IAAI,SAAS,GAAG,WAAW,CAAA;QAC3B,MAAM,MAAM,GAAG,UAAU,CAAC,YAAY,EAAE,CAAA;QACxC,UAAU,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAA;QACpC,IAAI,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC7C,IAAI,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,SAAS,EAAE,SAAS,CAAC,GAAG,EAAE,SAAS,CAAC,UAAU,CAAC,CAAA;QAC5F,GAAG,CAAC,wBAAwB,EAAE,SAAS,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAEpC,SAAS,GAAG,cAAc,CAAA;QAC1B,UAAU,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAA;QACpC,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,SAAS,EAAE,SAAS,CAAC,GAAG,EAAE,SAAS,CAAC,UAAU,CAAC,CAAA;QACxF,GAAG,CAAC,wBAAwB,EAAE,SAAS,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;IACxC,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,4BAA4B,EAAE,KAAK,IAAI,EAAE;QACxC,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,KAAK,SAAS,IAAI,QAAQ,KAAK,SAAS,EAAE,CAAC;YACjF,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;QAChD,CAAC;QACD,MAAM,SAAS,GAAG,WAAW,CAAA;QAC7B,MAAM,MAAM,GAAG,UAAU,CAAC,YAAY,EAAE,CAAA;QACxC,UAAU,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAA;QACpC,MAAM,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAE/C,MAAM,UAAU,GAAG,YAAY,CAAA;QAC/B,MAAM,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC,UAAU,CAAC,CAAA;QAE5C,MAAM,cAAc,GAAG,QAAQ,CAAC,kBAAkB,EAAE,CAAA;QACpD,MAAM,UAAU,GAAG,cAAc,CAAC,QAAQ,CAAC,UAAU,EAAE,MAAM,CAAC,CAAA;QAC9D,MAAM,CAAC,UAAU,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,CAAA;QAClC,MAAM,SAAS,GAAG,cAAc,CAAC,OAAO,CACpC,SAAS,CAAC,SAAS,EACnB,SAAS,CAAC,GAAG,EACb,SAAS,CAAC,UAAU,CACvB,CAAA;QACD,GAAG,CAAC,wBAAwB,EAAE,SAAS,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACpC,cAAc,CAAC,IAAI,EAAE,CAAA;IACzB,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,qBAAqB,EAAE,KAAK,IAAI,EAAE;QACjC,IAAI,OAAO,KAAK,SAAS,IAAI,QAAQ,KAAK,SAAS,EAAE,CAAC;YAClD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;QAChD,CAAC;QACD,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC;YACxB,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAClF,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAClF,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;SACzB,CAAC,CAAA;QACF,MAAM,SAAS,GAAG,6BAA6B,CAAA;QAC/C,MAAM,MAAM,GAAG,OAAO,CAAC,cAAc,CAAC,IAAI,CAAC,CAAA;QAC3C,MAAM,GAAG,GAAG,OAAO,CAAC,IAAI,CAAC,SAAS,CAAC,CAAA;QACnC,MAAM,IAAI,GAAG,QAAQ,CAAC,aAAa,EAAE,CAAA;QACrC,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,SAAS,EAAE,GAAG,CAAC,CAAA;QAC3C,IAAI,aAAa,GAAG,IAAI,CAAA;QACxB,IAAI,CAAC;YACD,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,SAAS,EAAE,GAAG,GAAG,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAA;QAC9D,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACT,aAAa,GAAG,CAAC,CAAA;QACrB,CAAC;QACD,MAAM,CAAC,aAAa,CAAC,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAA;QACpC,IAAI,CAAC,IAAI,EAAE,CAAA;IACf,CAAC,CAAC,CAAA;AACN,CAAC,CAAC,CAAA"}
package/package.json ADDED
@@ -0,0 +1,51 @@
1
+ {
2
+ "name": "@towns-labs/encryption",
3
+ "version": "2.0.1",
4
+ "type": "module",
5
+ "main": "dist/index.js",
6
+ "types": "dist/index.d.ts",
7
+ "scripts": {
8
+ "build": "tsc",
9
+ "cb": "bun run clean && bun run build",
10
+ "clean": "rm -rf dist",
11
+ "lint": "eslint --format unix ./src",
12
+ "lint:fix": "bun run lint --fix",
13
+ "test": "vitest run",
14
+ "test:ci": "vitest run --silent=passed-only",
15
+ "test:debug": "DEBUG=test bun run test",
16
+ "test:watch": "vitest --watch",
17
+ "watch": "tsc --watch"
18
+ },
19
+ "dependencies": {
20
+ "@bufbuild/protobuf": "^2.9.0",
21
+ "@towns-protocol/olm": "3.2.28",
22
+ "@towns-labs/proto": "^1.0.1",
23
+ "@towns-labs/utils": "^1.0.1",
24
+ "@towns-labs/web3": "^1.0.1",
25
+ "debug": "^4.3.4",
26
+ "dexie": "^4.2.1",
27
+ "ethers": "^5.8.0",
28
+ "lru-cache": "^11.0.1",
29
+ "nanoid": "^4.0.0",
30
+ "typed-emitter": "^2.1.0"
31
+ },
32
+ "devDependencies": {
33
+ "@types/debug": "^4.1.8",
34
+ "@types/node": "^20.14.8",
35
+ "@typescript-eslint/eslint-plugin": "^8.29.0",
36
+ "@typescript-eslint/parser": "^8.29.0",
37
+ "eslint": "^8.57.1",
38
+ "eslint-import-resolver-typescript": "^4.3.2",
39
+ "eslint-plugin-import-x": "^4.10.2",
40
+ "fake-indexeddb": "^6.0.1",
41
+ "ts-node": "^10.9.1",
42
+ "typescript": "~5.8.3",
43
+ "vitest": "^3.2.3"
44
+ },
45
+ "files": [
46
+ "dist"
47
+ ],
48
+ "publishConfig": {
49
+ "access": "public"
50
+ }
51
+ }