@towns-protocol/encryption 0.0.191
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE.txt +21 -0
- package/README.md +3 -0
- package/dist/base.d.ts +64 -0
- package/dist/base.d.ts.map +1 -0
- package/dist/base.js +44 -0
- package/dist/base.js.map +1 -0
- package/dist/cryptoAesGcm.d.ts +9 -0
- package/dist/cryptoAesGcm.d.ts.map +1 -0
- package/dist/cryptoAesGcm.js +30 -0
- package/dist/cryptoAesGcm.js.map +1 -0
- package/dist/cryptoStore.d.ts +52 -0
- package/dist/cryptoStore.d.ts.map +1 -0
- package/dist/cryptoStore.js +131 -0
- package/dist/cryptoStore.js.map +1 -0
- package/dist/decryptionExtensions.d.ts +200 -0
- package/dist/decryptionExtensions.d.ts.map +1 -0
- package/dist/decryptionExtensions.js +687 -0
- package/dist/decryptionExtensions.js.map +1 -0
- package/dist/derivedEncryption.d.ts +2 -0
- package/dist/derivedEncryption.d.ts.map +1 -0
- package/dist/derivedEncryption.js +2 -0
- package/dist/derivedEncryption.js.map +1 -0
- package/dist/encryptionDelegate.d.ts +20 -0
- package/dist/encryptionDelegate.d.ts.map +1 -0
- package/dist/encryptionDelegate.js +86 -0
- package/dist/encryptionDelegate.js.map +1 -0
- package/dist/encryptionDevice.d.ts +264 -0
- package/dist/encryptionDevice.d.ts.map +1 -0
- package/dist/encryptionDevice.js +742 -0
- package/dist/encryptionDevice.js.map +1 -0
- package/dist/encryptionTypes.d.ts +20 -0
- package/dist/encryptionTypes.d.ts.map +1 -0
- package/dist/encryptionTypes.js +2 -0
- package/dist/encryptionTypes.js.map +1 -0
- package/dist/groupDecryption.d.ts +34 -0
- package/dist/groupDecryption.d.ts.map +1 -0
- package/dist/groupDecryption.js +84 -0
- package/dist/groupDecryption.js.map +1 -0
- package/dist/groupEncryption.d.ts +36 -0
- package/dist/groupEncryption.d.ts.map +1 -0
- package/dist/groupEncryption.js +90 -0
- package/dist/groupEncryption.js.map +1 -0
- package/dist/groupEncryptionCrypto.d.ts +119 -0
- package/dist/groupEncryptionCrypto.d.ts.map +1 -0
- package/dist/groupEncryptionCrypto.js +256 -0
- package/dist/groupEncryptionCrypto.js.map +1 -0
- package/dist/hybridGroupDecryption.d.ts +33 -0
- package/dist/hybridGroupDecryption.d.ts.map +1 -0
- package/dist/hybridGroupDecryption.js +84 -0
- package/dist/hybridGroupDecryption.js.map +1 -0
- package/dist/hybridGroupEncryption.d.ts +30 -0
- package/dist/hybridGroupEncryption.d.ts.map +1 -0
- package/dist/hybridGroupEncryption.js +92 -0
- package/dist/hybridGroupEncryption.js.map +1 -0
- package/dist/index.d.ts +19 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +19 -0
- package/dist/index.js.map +1 -0
- package/dist/olmLib.d.ts +35 -0
- package/dist/olmLib.d.ts.map +1 -0
- package/dist/olmLib.js +37 -0
- package/dist/olmLib.js.map +1 -0
- package/dist/storeTypes.d.ts +27 -0
- package/dist/storeTypes.d.ts.map +1 -0
- package/dist/storeTypes.js +2 -0
- package/dist/storeTypes.js.map +1 -0
- package/dist/tests/cryptoAesGcm.test.d.ts +2 -0
- package/dist/tests/cryptoAesGcm.test.d.ts.map +1 -0
- package/dist/tests/cryptoAesGcm.test.js +71 -0
- package/dist/tests/cryptoAesGcm.test.js.map +1 -0
- package/dist/tests/cryptoStore.test.d.ts +5 -0
- package/dist/tests/cryptoStore.test.d.ts.map +1 -0
- package/dist/tests/cryptoStore.test.js +114 -0
- package/dist/tests/cryptoStore.test.js.map +1 -0
- package/dist/tests/decryptionExtensions.test.d.ts +2 -0
- package/dist/tests/decryptionExtensions.test.d.ts.map +1 -0
- package/dist/tests/decryptionExtensions.test.js +355 -0
- package/dist/tests/decryptionExtensions.test.js.map +1 -0
- package/dist/tests/encryption-protocol.test.d.ts +2 -0
- package/dist/tests/encryption-protocol.test.d.ts.map +1 -0
- package/dist/tests/encryption-protocol.test.js +150 -0
- package/dist/tests/encryption-protocol.test.js.map +1 -0
- package/dist/tests/encryptionDelegate.test.d.ts +2 -0
- package/dist/tests/encryptionDelegate.test.d.ts.map +1 -0
- package/dist/tests/encryptionDelegate.test.js +78 -0
- package/dist/tests/encryptionDelegate.test.js.map +1 -0
- package/dist/tests/group-encryption-protocol.test.d.ts +2 -0
- package/dist/tests/group-encryption-protocol.test.d.ts.map +1 -0
- package/dist/tests/group-encryption-protocol.test.js +103 -0
- package/dist/tests/group-encryption-protocol.test.js.map +1 -0
- package/dist/tests/group-encryptionDelegate.test.d.ts +2 -0
- package/dist/tests/group-encryptionDelegate.test.d.ts.map +1 -0
- package/dist/tests/group-encryptionDelegate.test.js +23 -0
- package/dist/tests/group-encryptionDelegate.test.js.map +1 -0
- package/dist/tests/pk.test.d.ts +2 -0
- package/dist/tests/pk.test.d.ts.map +1 -0
- package/dist/tests/pk.test.js +103 -0
- package/dist/tests/pk.test.js.map +1 -0
- package/package.json +54 -0
|
@@ -0,0 +1,103 @@
|
|
|
1
|
+
import { EncryptionDelegate } from '../encryptionDelegate';
|
|
2
|
+
import debug from 'debug';
|
|
3
|
+
const log = debug('test');
|
|
4
|
+
describe.concurrent('Group Encryption Protocol', () => {
|
|
5
|
+
let aliceSession;
|
|
6
|
+
let bobSession;
|
|
7
|
+
let eveSession;
|
|
8
|
+
afterAll(async () => {
|
|
9
|
+
if (aliceSession !== undefined) {
|
|
10
|
+
aliceSession.free();
|
|
11
|
+
aliceSession = undefined;
|
|
12
|
+
}
|
|
13
|
+
if (bobSession !== undefined) {
|
|
14
|
+
bobSession.free();
|
|
15
|
+
bobSession = undefined;
|
|
16
|
+
}
|
|
17
|
+
if (eveSession !== undefined) {
|
|
18
|
+
eveSession.free();
|
|
19
|
+
eveSession = undefined;
|
|
20
|
+
}
|
|
21
|
+
});
|
|
22
|
+
it('noInitShouldFail', async () => {
|
|
23
|
+
const delegate = new EncryptionDelegate();
|
|
24
|
+
try {
|
|
25
|
+
aliceSession = delegate.createOutboundGroupSession();
|
|
26
|
+
}
|
|
27
|
+
catch (e) {
|
|
28
|
+
expect(e.message).toEqual('olm not initialized');
|
|
29
|
+
}
|
|
30
|
+
expect(aliceSession).toBeUndefined();
|
|
31
|
+
});
|
|
32
|
+
it('shouldEncryptAndDecryptGroup', async () => {
|
|
33
|
+
const delegate = new EncryptionDelegate();
|
|
34
|
+
await delegate.init();
|
|
35
|
+
aliceSession = delegate.createOutboundGroupSession();
|
|
36
|
+
bobSession = delegate.createInboundGroupSession();
|
|
37
|
+
eveSession = delegate.createInboundGroupSession();
|
|
38
|
+
aliceSession.create();
|
|
39
|
+
expect(aliceSession.message_index()).toEqual(0);
|
|
40
|
+
bobSession.create(aliceSession.session_key());
|
|
41
|
+
eveSession.create(aliceSession.session_key());
|
|
42
|
+
let TEST_TEXT = 'alice test text';
|
|
43
|
+
let encrypted = aliceSession.encrypt(TEST_TEXT);
|
|
44
|
+
let decrypted = bobSession.decrypt(encrypted);
|
|
45
|
+
log('bob decrypted ciphertext: ', decrypted);
|
|
46
|
+
expect(decrypted.plaintext).toEqual(TEST_TEXT);
|
|
47
|
+
expect(decrypted.message_index).toEqual(0);
|
|
48
|
+
TEST_TEXT = 'alice test text: =';
|
|
49
|
+
encrypted = aliceSession.encrypt(TEST_TEXT);
|
|
50
|
+
decrypted = bobSession.decrypt(encrypted);
|
|
51
|
+
log('bob decrypted ciphertext: ', decrypted);
|
|
52
|
+
expect(decrypted.plaintext).toEqual(TEST_TEXT);
|
|
53
|
+
expect(decrypted.message_index).toEqual(1);
|
|
54
|
+
TEST_TEXT = '!';
|
|
55
|
+
encrypted = aliceSession.encrypt(TEST_TEXT);
|
|
56
|
+
decrypted = bobSession.decrypt(encrypted);
|
|
57
|
+
log('bob decrypted ciphertext: ', decrypted);
|
|
58
|
+
expect(decrypted.plaintext).toEqual(TEST_TEXT);
|
|
59
|
+
expect(decrypted.message_index).toEqual(2);
|
|
60
|
+
decrypted = eveSession.decrypt(encrypted);
|
|
61
|
+
log('eve decrypted ciphertext: ', decrypted);
|
|
62
|
+
expect(decrypted.plaintext).toEqual(TEST_TEXT);
|
|
63
|
+
expect(decrypted.message_index).toEqual(2);
|
|
64
|
+
});
|
|
65
|
+
it('shouldEncryptAndDecryptGroupMultipleInit', async () => {
|
|
66
|
+
const delegate = new EncryptionDelegate();
|
|
67
|
+
await delegate.init();
|
|
68
|
+
aliceSession = delegate.createOutboundGroupSession();
|
|
69
|
+
bobSession = delegate.createInboundGroupSession();
|
|
70
|
+
eveSession = delegate.createInboundGroupSession();
|
|
71
|
+
aliceSession.create();
|
|
72
|
+
expect(aliceSession.message_index()).toEqual(0);
|
|
73
|
+
bobSession.create(aliceSession.session_key());
|
|
74
|
+
eveSession.create(aliceSession.session_key());
|
|
75
|
+
await delegate.init();
|
|
76
|
+
let TEST_TEXT = 'alice test text';
|
|
77
|
+
let encrypted = aliceSession.encrypt(TEST_TEXT);
|
|
78
|
+
let decrypted = bobSession.decrypt(encrypted);
|
|
79
|
+
log('bob decrypted ciphertext: ', decrypted);
|
|
80
|
+
expect(decrypted.plaintext).toEqual(TEST_TEXT);
|
|
81
|
+
expect(decrypted.message_index).toEqual(0);
|
|
82
|
+
await delegate.init();
|
|
83
|
+
TEST_TEXT = 'alice test text: =';
|
|
84
|
+
encrypted = aliceSession.encrypt(TEST_TEXT);
|
|
85
|
+
decrypted = bobSession.decrypt(encrypted);
|
|
86
|
+
log('bob decrypted ciphertext: ', decrypted);
|
|
87
|
+
expect(decrypted.plaintext).toEqual(TEST_TEXT);
|
|
88
|
+
expect(decrypted.message_index).toEqual(1);
|
|
89
|
+
await delegate.init();
|
|
90
|
+
TEST_TEXT = '!';
|
|
91
|
+
encrypted = aliceSession.encrypt(TEST_TEXT);
|
|
92
|
+
decrypted = bobSession.decrypt(encrypted);
|
|
93
|
+
log('bob decrypted ciphertext: ', decrypted);
|
|
94
|
+
expect(decrypted.plaintext).toEqual(TEST_TEXT);
|
|
95
|
+
expect(decrypted.message_index).toEqual(2);
|
|
96
|
+
await delegate.init();
|
|
97
|
+
decrypted = eveSession.decrypt(encrypted);
|
|
98
|
+
log('eve decrypted ciphertext: ', decrypted);
|
|
99
|
+
expect(decrypted.plaintext).toEqual(TEST_TEXT);
|
|
100
|
+
expect(decrypted.message_index).toEqual(2);
|
|
101
|
+
});
|
|
102
|
+
});
|
|
103
|
+
//# sourceMappingURL=group-encryption-protocol.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"group-encryption-protocol.test.js","sourceRoot":"","sources":["../../src/tests/group-encryption-protocol.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAA;AAC1D,OAAO,KAAK,MAAM,OAAO,CAAA;AAGzB,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,CAAA;AAEzB,QAAQ,CAAC,UAAU,CAAC,2BAA2B,EAAE,GAAG,EAAE;IAClD,IAAI,YAA8C,CAAA;IAClD,IAAI,UAA2C,CAAA;IAC/C,IAAI,UAA2C,CAAA;IAE/C,QAAQ,CAAC,KAAK,IAAI,EAAE;QAChB,IAAI,YAAY,KAAK,SAAS,EAAE,CAAC;YAC7B,YAAY,CAAC,IAAI,EAAE,CAAA;YACnB,YAAY,GAAG,SAAS,CAAA;QAC5B,CAAC;QAED,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YAC3B,UAAU,CAAC,IAAI,EAAE,CAAA;YACjB,UAAU,GAAG,SAAS,CAAA;QAC1B,CAAC;QAED,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YAC3B,UAAU,CAAC,IAAI,EAAE,CAAA;YACjB,UAAU,GAAG,SAAS,CAAA;QAC1B,CAAC;IACL,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,kBAAkB,EAAE,KAAK,IAAI,EAAE;QAC9B,MAAM,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;QACzC,IAAI,CAAC;YACD,YAAY,GAAG,QAAQ,CAAC,0BAA0B,EAAE,CAAA;QACxD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACT,MAAM,CAAE,CAAW,CAAC,OAAO,CAAC,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAA;QAC/D,CAAC;QACD,MAAM,CAAC,YAAY,CAAC,CAAC,aAAa,EAAE,CAAA;IACxC,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,8BAA8B,EAAE,KAAK,IAAI,EAAE;QAC1C,MAAM,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;QACzC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,YAAY,GAAG,QAAQ,CAAC,0BAA0B,EAAE,CAAA;QACpD,UAAU,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QACjD,UAAU,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QAEjD,YAAY,CAAC,MAAM,EAAE,CAAA;QACrB,MAAM,CAAC,YAAY,CAAC,aAAa,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAC/C,UAAU,CAAC,MAAM,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAAA;QAC7C,UAAU,CAAC,MAAM,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAAA;QAE7C,IAAI,SAAS,GAAG,iBAAiB,CAAA;QACjC,IAAI,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC/C,IAAI,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC7C,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,SAAS,GAAG,oBAAoB,CAAA;QAChC,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC3C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,SAAS,GAAG,GAAG,CAAA;QACf,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC3C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;IAC9C,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,0CAA0C,EAAE,KAAK,IAAI,EAAE;QACtD,MAAM,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;QACzC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,YAAY,GAAG,QAAQ,CAAC,0BAA0B,EAAE,CAAA;QACpD,UAAU,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QACjD,UAAU,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QAEjD,YAAY,CAAC,MAAM,EAAE,CAAA;QACrB,MAAM,CAAC,YAAY,CAAC,aAAa,EAAE,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAC/C,UAAU,CAAC,MAAM,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAAA;QAC7C,UAAU,CAAC,MAAM,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAAA;QAE7C,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,IAAI,SAAS,GAAG,iBAAiB,CAAA;QACjC,IAAI,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC/C,IAAI,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC7C,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,SAAS,GAAG,oBAAoB,CAAA;QAChC,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC3C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,SAAS,GAAG,GAAG,CAAA;QACf,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC3C,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;QAE1C,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,GAAG,CAAC,4BAA4B,EAAE,SAAS,CAAC,CAAA;QAC5C,MAAM,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC9C,MAAM,CAAC,SAAS,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,CAAA;IAC9C,CAAC,CAAC,CAAA;AACN,CAAC,CAAC,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"group-encryptionDelegate.test.d.ts","sourceRoot":"","sources":["../../src/tests/group-encryptionDelegate.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
import { EncryptionDelegate } from '../encryptionDelegate';
|
|
2
|
+
describe.concurrent('EncryptionDelegate with group session', () => {
|
|
3
|
+
const delegate = new EncryptionDelegate();
|
|
4
|
+
beforeEach(async () => {
|
|
5
|
+
await delegate.init();
|
|
6
|
+
});
|
|
7
|
+
it('decrypt messages out of order', async () => {
|
|
8
|
+
const outboundSession = delegate.createOutboundGroupSession();
|
|
9
|
+
outboundSession.create();
|
|
10
|
+
const exportedSession = outboundSession.session_key();
|
|
11
|
+
const inboundSession = delegate.createInboundGroupSession();
|
|
12
|
+
inboundSession.create(exportedSession);
|
|
13
|
+
const encrypted1 = outboundSession.encrypt('message 1');
|
|
14
|
+
const decrypted1 = inboundSession.decrypt(encrypted1);
|
|
15
|
+
expect(decrypted1.plaintext).toEqual('message 1');
|
|
16
|
+
const encrypted3 = outboundSession.encrypt('message 3');
|
|
17
|
+
const decrypted3 = inboundSession.decrypt(encrypted3);
|
|
18
|
+
expect(decrypted3.plaintext).toEqual('message 3');
|
|
19
|
+
const decrypted2 = inboundSession.decrypt(encrypted3);
|
|
20
|
+
expect(decrypted2.plaintext).toEqual('message 3');
|
|
21
|
+
});
|
|
22
|
+
});
|
|
23
|
+
//# sourceMappingURL=group-encryptionDelegate.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"group-encryptionDelegate.test.js","sourceRoot":"","sources":["../../src/tests/group-encryptionDelegate.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAA;AAE1D,QAAQ,CAAC,UAAU,CAAC,uCAAuC,EAAE,GAAG,EAAE;IAC9D,MAAM,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;IAEzC,UAAU,CAAC,KAAK,IAAI,EAAE;QAClB,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;IACzB,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,+BAA+B,EAAE,KAAK,IAAI,EAAE;QAC3C,MAAM,eAAe,GAAG,QAAQ,CAAC,0BAA0B,EAAE,CAAA;QAC7D,eAAe,CAAC,MAAM,EAAE,CAAA;QAExB,MAAM,eAAe,GAAG,eAAe,CAAC,WAAW,EAAE,CAAA;QACrD,MAAM,cAAc,GAAG,QAAQ,CAAC,yBAAyB,EAAE,CAAA;QAC3D,cAAc,CAAC,MAAM,CAAC,eAAe,CAAC,CAAA;QAEtC,MAAM,UAAU,GAAG,eAAe,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QACvD,MAAM,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;QACrD,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QAEjD,MAAM,UAAU,GAAG,eAAe,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QAEvD,MAAM,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;QACrD,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;QAEjD,MAAM,UAAU,GAAG,cAAc,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;QACrD,MAAM,CAAC,UAAU,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAA;IACrD,CAAC,CAAC,CAAA;AACN,CAAC,CAAC,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"pk.test.d.ts","sourceRoot":"","sources":["../../src/tests/pk.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,103 @@
|
|
|
1
|
+
import { EncryptionDelegate } from '../encryptionDelegate';
|
|
2
|
+
import debug from 'debug';
|
|
3
|
+
const log = debug('test');
|
|
4
|
+
describe.concurrent('Pk Signing and Encryption', () => {
|
|
5
|
+
let encryption;
|
|
6
|
+
let decryption;
|
|
7
|
+
let signing;
|
|
8
|
+
let delegate;
|
|
9
|
+
beforeEach(async () => {
|
|
10
|
+
delegate = new EncryptionDelegate();
|
|
11
|
+
await delegate.init();
|
|
12
|
+
// create a key pair for encryption
|
|
13
|
+
encryption = delegate.createPkEncryption();
|
|
14
|
+
// create a key pair for decryption
|
|
15
|
+
decryption = delegate.createPkDecryption();
|
|
16
|
+
signing = delegate.createPkSigning();
|
|
17
|
+
});
|
|
18
|
+
afterEach(async () => {
|
|
19
|
+
if (encryption !== undefined) {
|
|
20
|
+
encryption.free();
|
|
21
|
+
encryption = undefined;
|
|
22
|
+
}
|
|
23
|
+
if (decryption !== undefined) {
|
|
24
|
+
decryption.free();
|
|
25
|
+
decryption = undefined;
|
|
26
|
+
}
|
|
27
|
+
});
|
|
28
|
+
it('shouldImportAndExportKeysFromPrivateParts', async () => {
|
|
29
|
+
if (encryption === undefined || decryption === undefined) {
|
|
30
|
+
throw new Error('key pairs not initialized');
|
|
31
|
+
}
|
|
32
|
+
const alice_private = new Uint8Array([
|
|
33
|
+
0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d, 0x3c, 0x16, 0xc1, 0x72, 0x51, 0xb2,
|
|
34
|
+
0x66, 0x45, 0xdf, 0x4c, 0x2f, 0x87, 0xeb, 0xc0, 0x99, 0x2a, 0xb1, 0x77, 0xfb, 0xa5,
|
|
35
|
+
0x1d, 0xb9, 0x2c, 0x2a,
|
|
36
|
+
]);
|
|
37
|
+
const alice_public = decryption.init_with_private_key(alice_private);
|
|
38
|
+
expect(alice_public).toEqual('hSDwCYkwp1R0i33ctD73Wg2/Og0mOBr066SpjqqbTmo');
|
|
39
|
+
const alice_private_out = decryption.get_private_key();
|
|
40
|
+
expect(alice_private_out).toEqual(alice_private);
|
|
41
|
+
});
|
|
42
|
+
it('shouldEncryptAndDecrypt', async () => {
|
|
43
|
+
if (encryption === undefined || decryption === undefined) {
|
|
44
|
+
throw new Error('key pairs not initialized');
|
|
45
|
+
}
|
|
46
|
+
let TEST_TEXT = 'test text';
|
|
47
|
+
const pubkey = decryption.generate_key();
|
|
48
|
+
encryption.set_recipient_key(pubkey);
|
|
49
|
+
let encrypted = encryption.encrypt(TEST_TEXT);
|
|
50
|
+
let decrypted = decryption.decrypt(encrypted.ephemeral, encrypted.mac, encrypted.ciphertext);
|
|
51
|
+
log('decrypted ciphertext: ', decrypted);
|
|
52
|
+
expect(decrypted).toEqual(TEST_TEXT);
|
|
53
|
+
TEST_TEXT = 'test text: =';
|
|
54
|
+
encryption.set_recipient_key(pubkey);
|
|
55
|
+
encrypted = encryption.encrypt(TEST_TEXT);
|
|
56
|
+
decrypted = decryption.decrypt(encrypted.ephemeral, encrypted.mac, encrypted.ciphertext);
|
|
57
|
+
log('decrypted ciphertext: ', decrypted);
|
|
58
|
+
expect(decrypted).toEqual(TEST_TEXT);
|
|
59
|
+
});
|
|
60
|
+
it('shouldPickleAndUnpickleKey', async () => {
|
|
61
|
+
if (encryption === undefined || decryption === undefined || delegate === undefined) {
|
|
62
|
+
throw new Error('key pairs not initialized');
|
|
63
|
+
}
|
|
64
|
+
const TEST_TEXT = 'test text';
|
|
65
|
+
const pubkey = decryption.generate_key();
|
|
66
|
+
encryption.set_recipient_key(pubkey);
|
|
67
|
+
const encrypted = encryption.encrypt(TEST_TEXT);
|
|
68
|
+
const PICKLE_KEY = 'secret_key';
|
|
69
|
+
const pickle = decryption.pickle(PICKLE_KEY);
|
|
70
|
+
const new_decryption = delegate.createPkDecryption();
|
|
71
|
+
const new_pubkey = new_decryption.unpickle(PICKLE_KEY, pickle);
|
|
72
|
+
expect(new_pubkey).toEqual(pubkey);
|
|
73
|
+
const decrypted = new_decryption.decrypt(encrypted.ephemeral, encrypted.mac, encrypted.ciphertext);
|
|
74
|
+
log('decrypted ciphertext: ', decrypted);
|
|
75
|
+
expect(decrypted).toEqual(TEST_TEXT);
|
|
76
|
+
new_decryption.free();
|
|
77
|
+
});
|
|
78
|
+
it('shouldSignAndVerify', async () => {
|
|
79
|
+
if (signing === undefined || delegate === undefined) {
|
|
80
|
+
throw new Error('key pairs not initialized');
|
|
81
|
+
}
|
|
82
|
+
const seed = new Uint8Array([
|
|
83
|
+
0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, 0x7d, 0x3c, 0x16, 0xc1, 0x72, 0x51, 0xb2,
|
|
84
|
+
0x66, 0x45, 0xdf, 0x4c, 0x2f, 0x87, 0xeb, 0xc0, 0x99, 0x2a, 0xb1, 0x77, 0xfb, 0xa5,
|
|
85
|
+
0x1d, 0xb9, 0x2c, 0x2a,
|
|
86
|
+
]);
|
|
87
|
+
const TEST_TEXT = 'I am attesting to this text';
|
|
88
|
+
const pubkey = signing.init_with_seed(seed);
|
|
89
|
+
const sig = signing.sign(TEST_TEXT);
|
|
90
|
+
const util = delegate.createUtility();
|
|
91
|
+
util.ed25519_verify(pubkey, TEST_TEXT, sig);
|
|
92
|
+
let verifyFailure = null;
|
|
93
|
+
try {
|
|
94
|
+
util.ed25519_verify(pubkey, TEST_TEXT, 'p' + sig.slice(1));
|
|
95
|
+
}
|
|
96
|
+
catch (e) {
|
|
97
|
+
verifyFailure = e;
|
|
98
|
+
}
|
|
99
|
+
expect(verifyFailure).not.toBeNull();
|
|
100
|
+
util.free();
|
|
101
|
+
});
|
|
102
|
+
});
|
|
103
|
+
//# sourceMappingURL=pk.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"pk.test.js","sourceRoot":"","sources":["../../src/tests/pk.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,uBAAuB,CAAA;AAC1D,OAAO,KAAK,MAAM,OAAO,CAAA;AAGzB,MAAM,GAAG,GAAG,KAAK,CAAC,MAAM,CAAC,CAAA;AAEzB,QAAQ,CAAC,UAAU,CAAC,2BAA2B,EAAE,GAAG,EAAE;IAClD,IAAI,UAAoC,CAAA;IACxC,IAAI,UAAoC,CAAA;IACxC,IAAI,OAA8B,CAAA;IAClC,IAAI,QAAwC,CAAA;IAE5C,UAAU,CAAC,KAAK,IAAI,EAAE;QAClB,QAAQ,GAAG,IAAI,kBAAkB,EAAE,CAAA;QACnC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAA;QACrB,mCAAmC;QACnC,UAAU,GAAG,QAAQ,CAAC,kBAAkB,EAAE,CAAA;QAC1C,mCAAmC;QACnC,UAAU,GAAG,QAAQ,CAAC,kBAAkB,EAAE,CAAA;QAC1C,OAAO,GAAG,QAAQ,CAAC,eAAe,EAAE,CAAA;IACxC,CAAC,CAAC,CAAA;IAEF,SAAS,CAAC,KAAK,IAAI,EAAE;QACjB,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YAC3B,UAAU,CAAC,IAAI,EAAE,CAAA;YACjB,UAAU,GAAG,SAAS,CAAA;QAC1B,CAAC;QAED,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YAC3B,UAAU,CAAC,IAAI,EAAE,CAAA;YACjB,UAAU,GAAG,SAAS,CAAA;QAC1B,CAAC;IACL,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,2CAA2C,EAAE,KAAK,IAAI,EAAE;QACvD,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YACvD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;QAChD,CAAC;QACD,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC;YACjC,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAClF,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAClF,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;SACzB,CAAC,CAAA;QACF,MAAM,YAAY,GAAG,UAAU,CAAC,qBAAqB,CAAC,aAAa,CAAC,CAAA;QACpE,MAAM,CAAC,YAAY,CAAC,CAAC,OAAO,CAAC,6CAA6C,CAAC,CAAA;QAC3E,MAAM,iBAAiB,GAAG,UAAU,CAAC,eAAe,EAAE,CAAA;QACtD,MAAM,CAAC,iBAAiB,CAAC,CAAC,OAAO,CAAC,aAAa,CAAC,CAAA;IACpD,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,yBAAyB,EAAE,KAAK,IAAI,EAAE;QACrC,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;YACvD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;QAChD,CAAC;QACD,IAAI,SAAS,GAAG,WAAW,CAAA;QAC3B,MAAM,MAAM,GAAG,UAAU,CAAC,YAAY,EAAE,CAAA;QACxC,UAAU,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAA;QACpC,IAAI,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAC7C,IAAI,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,SAAS,EAAE,SAAS,CAAC,GAAG,EAAE,SAAS,CAAC,UAAU,CAAC,CAAA;QAC5F,GAAG,CAAC,wBAAwB,EAAE,SAAS,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAEpC,SAAS,GAAG,cAAc,CAAA;QAC1B,UAAU,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAA;QACpC,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACzC,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,SAAS,EAAE,SAAS,CAAC,GAAG,EAAE,SAAS,CAAC,UAAU,CAAC,CAAA;QACxF,GAAG,CAAC,wBAAwB,EAAE,SAAS,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;IACxC,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,4BAA4B,EAAE,KAAK,IAAI,EAAE;QACxC,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,KAAK,SAAS,IAAI,QAAQ,KAAK,SAAS,EAAE,CAAC;YACjF,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;QAChD,CAAC;QACD,MAAM,SAAS,GAAG,WAAW,CAAA;QAC7B,MAAM,MAAM,GAAG,UAAU,CAAC,YAAY,EAAE,CAAA;QACxC,UAAU,CAAC,iBAAiB,CAAC,MAAM,CAAC,CAAA;QACpC,MAAM,SAAS,GAAG,UAAU,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QAE/C,MAAM,UAAU,GAAG,YAAY,CAAA;QAC/B,MAAM,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC,UAAU,CAAC,CAAA;QAE5C,MAAM,cAAc,GAAG,QAAQ,CAAC,kBAAkB,EAAE,CAAA;QACpD,MAAM,UAAU,GAAG,cAAc,CAAC,QAAQ,CAAC,UAAU,EAAE,MAAM,CAAC,CAAA;QAC9D,MAAM,CAAC,UAAU,CAAC,CAAC,OAAO,CAAC,MAAM,CAAC,CAAA;QAClC,MAAM,SAAS,GAAG,cAAc,CAAC,OAAO,CACpC,SAAS,CAAC,SAAS,EACnB,SAAS,CAAC,GAAG,EACb,SAAS,CAAC,UAAU,CACvB,CAAA;QACD,GAAG,CAAC,wBAAwB,EAAE,SAAS,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,CAAA;QACpC,cAAc,CAAC,IAAI,EAAE,CAAA;IACzB,CAAC,CAAC,CAAA;IAEF,EAAE,CAAC,qBAAqB,EAAE,KAAK,IAAI,EAAE;QACjC,IAAI,OAAO,KAAK,SAAS,IAAI,QAAQ,KAAK,SAAS,EAAE,CAAC;YAClD,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;QAChD,CAAC;QACD,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC;YACxB,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAClF,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAClF,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;SACzB,CAAC,CAAA;QACF,MAAM,SAAS,GAAG,6BAA6B,CAAA;QAC/C,MAAM,MAAM,GAAG,OAAO,CAAC,cAAc,CAAC,IAAI,CAAC,CAAA;QAC3C,MAAM,GAAG,GAAG,OAAO,CAAC,IAAI,CAAC,SAAS,CAAC,CAAA;QACnC,MAAM,IAAI,GAAG,QAAQ,CAAC,aAAa,EAAE,CAAA;QACrC,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,SAAS,EAAE,GAAG,CAAC,CAAA;QAC3C,IAAI,aAAa,GAAG,IAAI,CAAA;QACxB,IAAI,CAAC;YACD,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,SAAS,EAAE,GAAG,GAAG,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAA;QAC9D,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACT,aAAa,GAAG,CAAC,CAAA;QACrB,CAAC;QACD,MAAM,CAAC,aAAa,CAAC,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAA;QACpC,IAAI,CAAC,IAAI,EAAE,CAAA;IACf,CAAC,CAAC,CAAA;AACN,CAAC,CAAC,CAAA"}
|
package/package.json
ADDED
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "@towns-protocol/encryption",
|
|
3
|
+
"version": "0.0.191",
|
|
4
|
+
"packageManager": "yarn@3.8.0",
|
|
5
|
+
"type": "module",
|
|
6
|
+
"main": "dist/index.js",
|
|
7
|
+
"types": "dist/index.d.ts",
|
|
8
|
+
"publishConfig": {
|
|
9
|
+
"access": "public"
|
|
10
|
+
},
|
|
11
|
+
"scripts": {
|
|
12
|
+
"build": "tsc",
|
|
13
|
+
"cb": "yarn clean && yarn build",
|
|
14
|
+
"clean": "rm -rf dist",
|
|
15
|
+
"lint": "yarn eslint --format unix ./src",
|
|
16
|
+
"lint:fix": "yarn lint --fix",
|
|
17
|
+
"test": "vitest run",
|
|
18
|
+
"test:watch": "vitest --watch",
|
|
19
|
+
"test:ci": "yarn test",
|
|
20
|
+
"test:debug": "DEBUG=test yarn test",
|
|
21
|
+
"watch": "tsc --watch"
|
|
22
|
+
},
|
|
23
|
+
"dependencies": {
|
|
24
|
+
"@bufbuild/protobuf": "^2.2.2",
|
|
25
|
+
"@ethereumjs/util": "^8.0.1",
|
|
26
|
+
"@matrix-org/olm": "^3.2.15",
|
|
27
|
+
"@towns-protocol/dlog": "^0.0.191",
|
|
28
|
+
"@towns-protocol/proto": "^0.0.191",
|
|
29
|
+
"@towns-protocol/web3": "^0.0.191",
|
|
30
|
+
"debug": "^4.3.4",
|
|
31
|
+
"dexie": "^4.0.7",
|
|
32
|
+
"ethers": "^5.7.2",
|
|
33
|
+
"lru-cache": "^11.0.1",
|
|
34
|
+
"nanoid": "^4.0.0",
|
|
35
|
+
"typed-emitter": "^2.1.0"
|
|
36
|
+
},
|
|
37
|
+
"devDependencies": {
|
|
38
|
+
"@types/lodash": "^4.14.186",
|
|
39
|
+
"@types/node": "^20.14.8",
|
|
40
|
+
"@typescript-eslint/eslint-plugin": "^8.29.0",
|
|
41
|
+
"@typescript-eslint/parser": "^8.29.0",
|
|
42
|
+
"eslint": "^8.57.0",
|
|
43
|
+
"eslint-import-resolver-typescript": "^3.5.5",
|
|
44
|
+
"eslint-plugin-import": "^2.27.5",
|
|
45
|
+
"fake-indexeddb": "^4.0.1",
|
|
46
|
+
"ts-node": "^10.9.1",
|
|
47
|
+
"typescript": "^5.8.2",
|
|
48
|
+
"vitest": "3.0.5"
|
|
49
|
+
},
|
|
50
|
+
"files": [
|
|
51
|
+
"dist"
|
|
52
|
+
],
|
|
53
|
+
"gitHead": "cdd08f6e1b007e061eda9e6051c658d5fc909a79"
|
|
54
|
+
}
|