cojson 0.10.8 → 0.11.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.turbo/turbo-build.log +1 -1
- package/CHANGELOG.md +20 -0
- package/dist/CoValuesStore.d.ts +12 -0
- package/dist/CoValuesStore.d.ts.map +1 -0
- package/dist/PeerKnownStates.d.ts +38 -0
- package/dist/PeerKnownStates.d.ts.map +1 -0
- package/dist/PeerState.d.ts +46 -0
- package/dist/PeerState.d.ts.map +1 -0
- package/dist/PriorityBasedMessageQueue.d.ts +18 -0
- package/dist/PriorityBasedMessageQueue.d.ts.map +1 -0
- package/dist/SyncStateManager.d.ts +20 -0
- package/dist/SyncStateManager.d.ts.map +1 -0
- package/dist/base64url.d.ts +3 -0
- package/dist/base64url.d.ts.map +1 -0
- package/dist/base64url.test.d.ts +2 -0
- package/dist/base64url.test.d.ts.map +1 -0
- package/dist/coValue.d.ts +52 -0
- package/dist/coValue.d.ts.map +1 -0
- package/dist/coValueCore.d.ts +143 -0
- package/dist/coValueCore.d.ts.map +1 -0
- package/dist/coValueCore.js +3 -9
- package/dist/coValueCore.js.map +1 -1
- package/dist/coValueState.d.ts +58 -0
- package/dist/coValueState.d.ts.map +1 -0
- package/dist/coValues/account.d.ts +69 -0
- package/dist/coValues/account.d.ts.map +1 -0
- package/dist/coValues/account.js +9 -10
- package/dist/coValues/account.js.map +1 -1
- package/dist/coValues/coList.d.ts +163 -0
- package/dist/coValues/coList.d.ts.map +1 -0
- package/dist/coValues/coMap.d.ts +142 -0
- package/dist/coValues/coMap.d.ts.map +1 -0
- package/dist/coValues/coPlainText.d.ts +33 -0
- package/dist/coValues/coPlainText.d.ts.map +1 -0
- package/dist/coValues/coStream.d.ts +109 -0
- package/dist/coValues/coStream.d.ts.map +1 -0
- package/dist/coValues/group.d.ts +143 -0
- package/dist/coValues/group.d.ts.map +1 -0
- package/dist/coValues/group.js +52 -6
- package/dist/coValues/group.js.map +1 -1
- package/dist/coreToCoValue.d.ts +15 -0
- package/dist/coreToCoValue.d.ts.map +1 -0
- package/dist/crypto/PureJSCrypto.d.ts +50 -0
- package/dist/crypto/PureJSCrypto.d.ts.map +1 -0
- package/dist/crypto/WasmCrypto.d.ts +49 -0
- package/dist/crypto/WasmCrypto.d.ts.map +1 -0
- package/dist/crypto/crypto.d.ts +142 -0
- package/dist/crypto/crypto.d.ts.map +1 -0
- package/dist/exports.d.ts +84 -0
- package/dist/exports.d.ts.map +1 -0
- package/dist/ids.d.ts +23 -0
- package/dist/ids.d.ts.map +1 -0
- package/dist/index.d.ts +2 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/jsonStringify.d.ts +7 -0
- package/dist/jsonStringify.d.ts.map +1 -0
- package/dist/jsonValue.d.ts +45 -0
- package/dist/jsonValue.d.ts.map +1 -0
- package/dist/localNode.d.ts +111 -0
- package/dist/localNode.d.ts.map +1 -0
- package/dist/localNode.js +3 -5
- package/dist/localNode.js.map +1 -1
- package/dist/logger.d.ts +33 -0
- package/dist/logger.d.ts.map +1 -0
- package/dist/media.d.ts +8 -0
- package/dist/media.d.ts.map +1 -0
- package/dist/permissions.d.ts +24 -0
- package/dist/permissions.d.ts.map +1 -0
- package/dist/permissions.js +5 -9
- package/dist/permissions.js.map +1 -1
- package/dist/priority.d.ts +19 -0
- package/dist/priority.d.ts.map +1 -0
- package/dist/storage/FileSystem.d.ts +37 -0
- package/dist/storage/FileSystem.d.ts.map +1 -0
- package/dist/storage/chunksAndKnownStates.d.ts +7 -0
- package/dist/storage/chunksAndKnownStates.d.ts.map +1 -0
- package/dist/storage/index.d.ts +52 -0
- package/dist/storage/index.d.ts.map +1 -0
- package/dist/streamUtils.d.ts +13 -0
- package/dist/streamUtils.d.ts.map +1 -0
- package/dist/sync.d.ts +97 -0
- package/dist/sync.d.ts.map +1 -0
- package/dist/tests/PeerKnownStates.test.d.ts +2 -0
- package/dist/tests/PeerKnownStates.test.d.ts.map +1 -0
- package/dist/tests/PeerKnownStates.test.js +82 -0
- package/dist/tests/PeerKnownStates.test.js.map +1 -0
- package/dist/tests/PeerState.test.d.ts +2 -0
- package/dist/tests/PeerState.test.d.ts.map +1 -0
- package/dist/tests/PeerState.test.js +188 -0
- package/dist/tests/PeerState.test.js.map +1 -0
- package/dist/tests/PriorityBasedMessageQueue.test.d.ts +2 -0
- package/dist/tests/PriorityBasedMessageQueue.test.d.ts.map +1 -0
- package/dist/tests/PriorityBasedMessageQueue.test.js +120 -0
- package/dist/tests/PriorityBasedMessageQueue.test.js.map +1 -0
- package/dist/tests/SyncStateManager.test.d.ts +2 -0
- package/dist/tests/SyncStateManager.test.d.ts.map +1 -0
- package/dist/tests/SyncStateManager.test.js +127 -0
- package/dist/tests/SyncStateManager.test.js.map +1 -0
- package/dist/tests/account.test.d.ts +2 -0
- package/dist/tests/account.test.d.ts.map +1 -0
- package/dist/tests/account.test.js +66 -0
- package/dist/tests/account.test.js.map +1 -0
- package/dist/tests/coList.test.d.ts +2 -0
- package/dist/tests/coList.test.d.ts.map +1 -0
- package/dist/tests/coList.test.js +120 -0
- package/dist/tests/coList.test.js.map +1 -0
- package/dist/tests/coMap.test.d.ts +2 -0
- package/dist/tests/coMap.test.d.ts.map +1 -0
- package/dist/tests/coMap.test.js +164 -0
- package/dist/tests/coMap.test.js.map +1 -0
- package/dist/tests/coPlainText.test.d.ts +2 -0
- package/dist/tests/coPlainText.test.d.ts.map +1 -0
- package/dist/tests/coPlainText.test.js +99 -0
- package/dist/tests/coPlainText.test.js.map +1 -0
- package/dist/tests/coStream.test.d.ts +2 -0
- package/dist/tests/coStream.test.d.ts.map +1 -0
- package/dist/tests/coStream.test.js +206 -0
- package/dist/tests/coStream.test.js.map +1 -0
- package/dist/tests/coValueCore.test.d.ts +2 -0
- package/dist/tests/coValueCore.test.d.ts.map +1 -0
- package/dist/tests/coValueCore.test.js +164 -0
- package/dist/tests/coValueCore.test.js.map +1 -0
- package/dist/tests/coValueState.test.d.ts +2 -0
- package/dist/tests/coValueState.test.d.ts.map +1 -0
- package/dist/tests/coValueState.test.js +364 -0
- package/dist/tests/coValueState.test.js.map +1 -0
- package/dist/tests/crypto.test.d.ts +2 -0
- package/dist/tests/crypto.test.d.ts.map +1 -0
- package/dist/tests/crypto.test.js +144 -0
- package/dist/tests/crypto.test.js.map +1 -0
- package/dist/tests/cryptoImpl.test.d.ts +2 -0
- package/dist/tests/cryptoImpl.test.d.ts.map +1 -0
- package/dist/tests/cryptoImpl.test.js +144 -0
- package/dist/tests/cryptoImpl.test.js.map +1 -0
- package/dist/tests/group.test.d.ts +2 -0
- package/dist/tests/group.test.d.ts.map +1 -0
- package/dist/tests/group.test.js +576 -0
- package/dist/tests/group.test.js.map +1 -0
- package/dist/tests/logger.test.d.ts +2 -0
- package/dist/tests/logger.test.d.ts.map +1 -0
- package/dist/tests/logger.test.js +118 -0
- package/dist/tests/logger.test.js.map +1 -0
- package/dist/tests/permissions.test.d.ts +2 -0
- package/dist/tests/permissions.test.d.ts.map +1 -0
- package/dist/tests/permissions.test.js +2051 -0
- package/dist/tests/permissions.test.js.map +1 -0
- package/dist/tests/priority.test.d.ts +2 -0
- package/dist/tests/priority.test.d.ts.map +1 -0
- package/dist/tests/priority.test.js +61 -0
- package/dist/tests/priority.test.js.map +1 -0
- package/dist/tests/sync.test.d.ts +2 -0
- package/dist/tests/sync.test.d.ts.map +1 -0
- package/dist/tests/sync.test.js +1548 -0
- package/dist/tests/sync.test.js.map +1 -0
- package/dist/tests/testUtils.d.ts +142 -0
- package/dist/tests/testUtils.d.ts.map +1 -0
- package/dist/tests/testUtils.js +315 -0
- package/dist/tests/testUtils.js.map +1 -0
- package/dist/typeUtils/accountOrAgentIDfromSessionID.d.ts +4 -0
- package/dist/typeUtils/accountOrAgentIDfromSessionID.d.ts.map +1 -0
- package/dist/typeUtils/expectGroup.d.ts +4 -0
- package/dist/typeUtils/expectGroup.d.ts.map +1 -0
- package/dist/typeUtils/isAccountID.d.ts +4 -0
- package/dist/typeUtils/isAccountID.d.ts.map +1 -0
- package/dist/typeUtils/isCoValue.d.ts +4 -0
- package/dist/typeUtils/isCoValue.d.ts.map +1 -0
- package/dist/utils.d.ts +5 -0
- package/dist/utils.d.ts.map +1 -0
- package/package.json +6 -6
- package/src/coValueCore.ts +3 -9
- package/src/coValues/account.ts +15 -15
- package/src/coValues/group.ts +85 -12
- package/src/jsonValue.ts +9 -5
- package/src/localNode.ts +3 -5
- package/src/permissions.ts +5 -15
- package/src/tests/coValueCore.test.ts +2 -2
- package/src/tests/group.test.ts +187 -0
- package/src/tests/permissions.test.ts +330 -57
- package/src/tests/testUtils.ts +4 -1
- package/tsconfig.json +4 -2
|
@@ -0,0 +1,144 @@
|
|
|
1
|
+
import { xsalsa20_poly1305 } from "@noble/ciphers/salsa";
|
|
2
|
+
import { x25519 } from "@noble/curves/ed25519";
|
|
3
|
+
import { blake3 } from "@noble/hashes/blake3";
|
|
4
|
+
import { base58, base64url } from "@scure/base";
|
|
5
|
+
import { expect, test, vi } from "vitest";
|
|
6
|
+
import { PureJSCrypto } from "../crypto/PureJSCrypto.js";
|
|
7
|
+
import { WasmCrypto } from "../crypto/WasmCrypto.js";
|
|
8
|
+
import { stableStringify } from "../jsonStringify.js";
|
|
9
|
+
const wasmCrypto = await WasmCrypto.create();
|
|
10
|
+
const pureJSCrypto = await PureJSCrypto.create();
|
|
11
|
+
[wasmCrypto, pureJSCrypto].forEach((crypto) => {
|
|
12
|
+
const name = crypto.constructor.name;
|
|
13
|
+
test(`Signatures round-trip and use stable stringify [${name}]`, () => {
|
|
14
|
+
const data = { b: "world", a: "hello" };
|
|
15
|
+
const signer = crypto.newRandomSigner();
|
|
16
|
+
const signature = crypto.sign(signer, data);
|
|
17
|
+
expect(signature).toMatch(/^signature_z/);
|
|
18
|
+
expect(crypto.verify(signature, { a: "hello", b: "world" }, crypto.getSignerID(signer))).toBe(true);
|
|
19
|
+
});
|
|
20
|
+
test(`Invalid signatures don't verify [${name}]`, () => {
|
|
21
|
+
const data = { b: "world", a: "hello" };
|
|
22
|
+
const signer = crypto.newRandomSigner();
|
|
23
|
+
const signer2 = crypto.newRandomSigner();
|
|
24
|
+
const wrongSignature = crypto.sign(signer2, data);
|
|
25
|
+
expect(crypto.verify(wrongSignature, data, crypto.getSignerID(signer))).toBe(false);
|
|
26
|
+
});
|
|
27
|
+
test(`encrypting round-trips, but invalid receiver can't unseal [${name}]`, () => {
|
|
28
|
+
const data = { b: "world", a: "hello" };
|
|
29
|
+
const sender = crypto.newRandomSealer();
|
|
30
|
+
const sealer = crypto.newRandomSealer();
|
|
31
|
+
const wrongSealer = crypto.newRandomSealer();
|
|
32
|
+
const nOnceMaterial = {
|
|
33
|
+
in: "co_zTEST",
|
|
34
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 0 },
|
|
35
|
+
};
|
|
36
|
+
const sealed = crypto.seal({
|
|
37
|
+
message: data,
|
|
38
|
+
from: sender,
|
|
39
|
+
to: crypto.getSealerID(sealer),
|
|
40
|
+
nOnceMaterial,
|
|
41
|
+
});
|
|
42
|
+
expect(crypto.unseal(sealed, sealer, crypto.getSealerID(sender), nOnceMaterial)).toEqual(data);
|
|
43
|
+
expect(() => crypto.unseal(sealed, wrongSealer, crypto.getSealerID(sender), nOnceMaterial)).toThrow(/Wrong tag/);
|
|
44
|
+
// trying with wrong sealer secret, by hand
|
|
45
|
+
const nOnce = blake3(new TextEncoder().encode(stableStringify(nOnceMaterial))).slice(0, 24);
|
|
46
|
+
const sealer3priv = base58.decode(wrongSealer.substring("sealerSecret_z".length));
|
|
47
|
+
const senderPub = base58.decode(crypto.getSealerID(sender).substring("sealer_z".length));
|
|
48
|
+
const sealedBytes = base64url.decode(sealed.substring("sealed_U".length));
|
|
49
|
+
const sharedSecret = x25519.getSharedSecret(sealer3priv, senderPub);
|
|
50
|
+
expect(() => {
|
|
51
|
+
const _ = xsalsa20_poly1305(sharedSecret, nOnce).decrypt(sealedBytes);
|
|
52
|
+
}).toThrow("Wrong tag");
|
|
53
|
+
});
|
|
54
|
+
test(`Hashing is deterministic [${name}]`, () => {
|
|
55
|
+
expect(crypto.secureHash({ b: "world", a: "hello" })).toEqual(crypto.secureHash({ a: "hello", b: "world" }));
|
|
56
|
+
expect(crypto.shortHash({ b: "world", a: "hello" })).toEqual(crypto.shortHash({ a: "hello", b: "world" }));
|
|
57
|
+
});
|
|
58
|
+
test(`Encryption for transactions round-trips [${name}]`, () => {
|
|
59
|
+
const { secret } = crypto.newRandomKeySecret();
|
|
60
|
+
const encrypted1 = crypto.encryptForTransaction({ a: "hello" }, secret, {
|
|
61
|
+
in: "co_zTEST",
|
|
62
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 0 },
|
|
63
|
+
});
|
|
64
|
+
const encrypted2 = crypto.encryptForTransaction({ b: "world" }, secret, {
|
|
65
|
+
in: "co_zTEST",
|
|
66
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 1 },
|
|
67
|
+
});
|
|
68
|
+
const decrypted1 = crypto.decryptForTransaction(encrypted1, secret, {
|
|
69
|
+
in: "co_zTEST",
|
|
70
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 0 },
|
|
71
|
+
});
|
|
72
|
+
const decrypted2 = crypto.decryptForTransaction(encrypted2, secret, {
|
|
73
|
+
in: "co_zTEST",
|
|
74
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 1 },
|
|
75
|
+
});
|
|
76
|
+
expect([decrypted1, decrypted2]).toEqual([{ a: "hello" }, { b: "world" }]);
|
|
77
|
+
});
|
|
78
|
+
test(`Encryption for transactions doesn't decrypt with a wrong key [${name}]`, () => {
|
|
79
|
+
const { secret } = crypto.newRandomKeySecret();
|
|
80
|
+
const { secret: secret2 } = crypto.newRandomKeySecret();
|
|
81
|
+
const encrypted1 = crypto.encryptForTransaction({ a: "hello" }, secret, {
|
|
82
|
+
in: "co_zTEST",
|
|
83
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 0 },
|
|
84
|
+
});
|
|
85
|
+
const encrypted2 = crypto.encryptForTransaction({ b: "world" }, secret, {
|
|
86
|
+
in: "co_zTEST",
|
|
87
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 1 },
|
|
88
|
+
});
|
|
89
|
+
const decrypted1 = crypto.decryptForTransaction(encrypted1, secret2, {
|
|
90
|
+
in: "co_zTEST",
|
|
91
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 0 },
|
|
92
|
+
});
|
|
93
|
+
const decrypted2 = crypto.decryptForTransaction(encrypted2, secret2, {
|
|
94
|
+
in: "co_zTEST",
|
|
95
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 1 },
|
|
96
|
+
});
|
|
97
|
+
expect([decrypted1, decrypted2]).toEqual([undefined, undefined]);
|
|
98
|
+
});
|
|
99
|
+
test(`Encryption of keySecrets round-trips [${name}]`, () => {
|
|
100
|
+
const toEncrypt = crypto.newRandomKeySecret();
|
|
101
|
+
const encrypting = crypto.newRandomKeySecret();
|
|
102
|
+
const keys = {
|
|
103
|
+
toEncrypt,
|
|
104
|
+
encrypting,
|
|
105
|
+
};
|
|
106
|
+
const encrypted = crypto.encryptKeySecret(keys);
|
|
107
|
+
const decrypted = crypto.decryptKeySecret(encrypted, encrypting.secret);
|
|
108
|
+
expect(decrypted).toEqual(toEncrypt.secret);
|
|
109
|
+
});
|
|
110
|
+
test(`Encryption of keySecrets doesn't decrypt with a wrong key [${name}]`, () => {
|
|
111
|
+
const toEncrypt = crypto.newRandomKeySecret();
|
|
112
|
+
const encrypting = crypto.newRandomKeySecret();
|
|
113
|
+
const encryptingWrong = crypto.newRandomKeySecret();
|
|
114
|
+
const keys = {
|
|
115
|
+
toEncrypt,
|
|
116
|
+
encrypting,
|
|
117
|
+
};
|
|
118
|
+
const encrypted = crypto.encryptKeySecret(keys);
|
|
119
|
+
const decrypted = crypto.decryptKeySecret(encrypted, encryptingWrong.secret);
|
|
120
|
+
expect(decrypted).toBeUndefined();
|
|
121
|
+
});
|
|
122
|
+
test(`Unsealing malformed JSON logs error [${name}]`, () => {
|
|
123
|
+
const data = "not valid json";
|
|
124
|
+
const sender = crypto.newRandomSealer();
|
|
125
|
+
const sealer = crypto.newRandomSealer();
|
|
126
|
+
const consoleSpy = vi.spyOn(console, "error").mockImplementation(() => { });
|
|
127
|
+
const nOnceMaterial = {
|
|
128
|
+
in: "co_zTEST",
|
|
129
|
+
tx: { sessionID: "co_zTEST_session_zTEST", txIndex: 0 },
|
|
130
|
+
};
|
|
131
|
+
// Create a sealed message with invalid JSON
|
|
132
|
+
const nOnce = blake3(new TextEncoder().encode(stableStringify(nOnceMaterial))).slice(0, 24);
|
|
133
|
+
const senderPriv = base58.decode(sender.substring("sealerSecret_z".length));
|
|
134
|
+
const sealerPub = base58.decode(crypto.getSealerID(sealer).substring("sealer_z".length));
|
|
135
|
+
const plaintext = new TextEncoder().encode(data);
|
|
136
|
+
const sharedSecret = x25519.getSharedSecret(senderPriv, sealerPub);
|
|
137
|
+
const sealedBytes = xsalsa20_poly1305(sharedSecret, nOnce).encrypt(plaintext);
|
|
138
|
+
const sealed = `sealed_U${base64url.encode(sealedBytes)}`;
|
|
139
|
+
const result = crypto.unseal(sealed, sealer, crypto.getSealerID(sender), nOnceMaterial);
|
|
140
|
+
expect(result).toBeUndefined();
|
|
141
|
+
expect(consoleSpy.mock.lastCall?.[0]).toContain("Failed to decrypt/parse sealed message");
|
|
142
|
+
});
|
|
143
|
+
});
|
|
144
|
+
//# sourceMappingURL=crypto.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"crypto.test.js","sourceRoot":"","sources":["../../src/tests/crypto.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,sBAAsB,CAAC;AACzD,OAAO,EAAE,MAAM,EAAE,MAAM,uBAAuB,CAAC;AAC/C,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAC9C,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,aAAa,CAAC;AAChD,OAAO,EAAE,MAAM,EAAE,IAAI,EAAE,EAAE,EAAE,MAAM,QAAQ,CAAC;AAC1C,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,UAAU,EAAE,MAAM,yBAAyB,CAAC;AAErD,OAAO,EAAE,eAAe,EAAE,MAAM,qBAAqB,CAAC;AAEtD,MAAM,UAAU,GAAG,MAAM,UAAU,CAAC,MAAM,EAAE,CAAC;AAC7C,MAAM,YAAY,GAAG,MAAM,YAAY,CAAC,MAAM,EAAE,CAAC;AAEjD,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC,OAAO,CAAC,CAAC,MAAM,EAAE,EAAE;IAC5C,MAAM,IAAI,GAAG,MAAM,CAAC,WAAW,CAAC,IAAI,CAAC;IAErC,IAAI,CAAC,mDAAmD,IAAI,GAAG,EAAE,GAAG,EAAE;QACpE,MAAM,IAAI,GAAG,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC;QACxC,MAAM,MAAM,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QACxC,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;QAE5C,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC;QAC1C,MAAM,CACJ,MAAM,CAAC,MAAM,CACX,SAAS,EACT,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,EAC1B,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,CAC3B,CACF,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IACf,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,oCAAoC,IAAI,GAAG,EAAE,GAAG,EAAE;QACrD,MAAM,IAAI,GAAG,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC;QACxC,MAAM,MAAM,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QACxC,MAAM,OAAO,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QACzC,MAAM,cAAc,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,IAAI,CAAC,CAAC;QAElD,MAAM,CACJ,MAAM,CAAC,MAAM,CAAC,cAAc,EAAE,IAAI,EAAE,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,CAChE,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IAChB,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,8DAA8D,IAAI,GAAG,EAAE,GAAG,EAAE;QAC/E,MAAM,IAAI,GAAG,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC;QACxC,MAAM,MAAM,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QACxC,MAAM,MAAM,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QACxC,MAAM,WAAW,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QAE7C,MAAM,aAAa,GAAG;YACpB,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SAC5D,CAAC;QAEX,MAAM,MAAM,GAAG,MAAM,CAAC,IAAI,CAAC;YACzB,OAAO,EAAE,IAAI;YACb,IAAI,EAAE,MAAM;YACZ,EAAE,EAAE,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC;YAC9B,aAAa;SACd,CAAC,CAAC;QAEH,MAAM,CACJ,MAAM,CAAC,MAAM,CAAC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,EAAE,aAAa,CAAC,CACzE,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;QAChB,MAAM,CAAC,GAAG,EAAE,CACV,MAAM,CAAC,MAAM,CACX,MAAM,EACN,WAAW,EACX,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,EAC1B,aAAa,CACd,CACF,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;QAEvB,2CAA2C;QAC3C,MAAM,KAAK,GAAG,MAAM,CAClB,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,eAAe,CAAC,aAAa,CAAC,CAAC,CACzD,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QACf,MAAM,WAAW,GAAG,MAAM,CAAC,MAAM,CAC/B,WAAW,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAC/C,CAAC;QACF,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAC7B,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,CACxD,CAAC;QACF,MAAM,WAAW,GAAG,SAAS,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC;QAC1E,MAAM,YAAY,GAAG,MAAM,CAAC,eAAe,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC;QAEpE,MAAM,CAAC,GAAG,EAAE;YACV,MAAM,CAAC,GAAG,iBAAiB,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;QACxE,CAAC,CAAC,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC;IAC1B,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,6BAA6B,IAAI,GAAG,EAAE,GAAG,EAAE;QAC9C,MAAM,CAAC,MAAM,CAAC,UAAU,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC,OAAO,CAC3D,MAAM,CAAC,UAAU,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CAC9C,CAAC;QAEF,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC,OAAO,CAC1D,MAAM,CAAC,SAAS,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CAC7C,CAAC;IACJ,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,4CAA4C,IAAI,GAAG,EAAE,GAAG,EAAE;QAC7D,MAAM,EAAE,MAAM,EAAE,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAE/C,MAAM,UAAU,GAAG,MAAM,CAAC,qBAAqB,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE;YACtE,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SACrE,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,MAAM,CAAC,qBAAqB,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE;YACtE,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SACrE,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,MAAM,CAAC,qBAAqB,CAAC,UAAU,EAAE,MAAM,EAAE;YAClE,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SACrE,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,MAAM,CAAC,qBAAqB,CAAC,UAAU,EAAE,MAAM,EAAE;YAClE,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SACrE,CAAC,CAAC;QAEH,MAAM,CAAC,CAAC,UAAU,EAAE,UAAU,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,EAAE,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC;IAC7E,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,iEAAiE,IAAI,GAAG,EAAE,GAAG,EAAE;QAClF,MAAM,EAAE,MAAM,EAAE,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAC/C,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAExD,MAAM,UAAU,GAAG,MAAM,CAAC,qBAAqB,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE;YACtE,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SACrE,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,MAAM,CAAC,qBAAqB,CAAC,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,MAAM,EAAE;YACtE,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SACrE,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,MAAM,CAAC,qBAAqB,CAAC,UAAU,EAAE,OAAO,EAAE;YACnE,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SACrE,CAAC,CAAC;QAEH,MAAM,UAAU,GAAG,MAAM,CAAC,qBAAqB,CAAC,UAAU,EAAE,OAAO,EAAE;YACnE,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SACrE,CAAC,CAAC;QAEH,MAAM,CAAC,CAAC,UAAU,EAAE,UAAU,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC,CAAC;IACnE,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,yCAAyC,IAAI,GAAG,EAAE,GAAG,EAAE;QAC1D,MAAM,SAAS,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAC9C,MAAM,UAAU,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAE/C,MAAM,IAAI,GAAG;YACX,SAAS;YACT,UAAU;SACX,CAAC;QAEF,MAAM,SAAS,GAAG,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAEhD,MAAM,SAAS,GAAG,MAAM,CAAC,gBAAgB,CAAC,SAAS,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC;QAExE,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;IAC9C,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,8DAA8D,IAAI,GAAG,EAAE,GAAG,EAAE;QAC/E,MAAM,SAAS,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAC9C,MAAM,UAAU,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAC/C,MAAM,eAAe,GAAG,MAAM,CAAC,kBAAkB,EAAE,CAAC;QAEpD,MAAM,IAAI,GAAG;YACX,SAAS;YACT,UAAU;SACX,CAAC;QAEF,MAAM,SAAS,GAAG,MAAM,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC;QAEhD,MAAM,SAAS,GAAG,MAAM,CAAC,gBAAgB,CACvC,SAAS,EACT,eAAe,CAAC,MAAM,CACvB,CAAC;QAEF,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,EAAE,CAAC;IACpC,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,wCAAwC,IAAI,GAAG,EAAE,GAAG,EAAE;QACzD,MAAM,IAAI,GAAG,gBAAgB,CAAC;QAC9B,MAAM,MAAM,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QACxC,MAAM,MAAM,GAAG,MAAM,CAAC,eAAe,EAAE,CAAC;QAExC,MAAM,UAAU,GAAG,EAAE,CAAC,KAAK,CAAC,OAAO,EAAE,OAAO,CAAC,CAAC,kBAAkB,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAE3E,MAAM,aAAa,GAAG;YACpB,EAAE,EAAE,UAAU;YACd,EAAE,EAAE,EAAE,SAAS,EAAE,wBAAqC,EAAE,OAAO,EAAE,CAAC,EAAE;SAC5D,CAAC;QAEX,4CAA4C;QAC5C,MAAM,KAAK,GAAG,MAAM,CAClB,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,eAAe,CAAC,aAAa,CAAC,CAAC,CACzD,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;QAEf,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,gBAAgB,CAAC,MAAM,CAAC,CAAC,CAAC;QAC5E,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAC7B,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,CACxD,CAAC;QAEF,MAAM,SAAS,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QACjD,MAAM,YAAY,GAAG,MAAM,CAAC,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;QACnE,MAAM,WAAW,GAAG,iBAAiB,CAAC,YAAY,EAAE,KAAK,CAAC,CAAC,OAAO,CAChE,SAAS,CACV,CAAC;QACF,MAAM,MAAM,GAAG,WAAW,SAAS,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,CAAC;QAE1D,MAAM,MAAM,GAAG,MAAM,CAAC,MAAM,CAC1B,MAAa,EACb,MAAM,EACN,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,EAC1B,aAAa,CACd,CAAC;QAEF,MAAM,CAAC,MAAM,CAAC,CAAC,aAAa,EAAE,CAAC;QAC/B,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAC7C,wCAAwC,CACzC,CAAC;IACJ,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cryptoImpl.test.d.ts","sourceRoot":"","sources":["../../src/tests/cryptoImpl.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,144 @@
|
|
|
1
|
+
import { describe, expect, test } from "vitest";
|
|
2
|
+
import { PureJSCrypto } from "../crypto/PureJSCrypto.js";
|
|
3
|
+
import { WasmCrypto } from "../crypto/WasmCrypto.js";
|
|
4
|
+
import { StreamingHash } from "../crypto/crypto.js";
|
|
5
|
+
describe.each([
|
|
6
|
+
{ impl: await WasmCrypto.create(), name: "Wasm" },
|
|
7
|
+
{ impl: await PureJSCrypto.create(), name: "PureJS" },
|
|
8
|
+
])("$name implementation", ({ impl, name }) => {
|
|
9
|
+
test("randomBytes", () => {
|
|
10
|
+
expect(impl.randomBytes(32).length).toEqual(32);
|
|
11
|
+
});
|
|
12
|
+
test("blake3HashOnce", () => {
|
|
13
|
+
const data = new Uint8Array([1, 2, 3, 4, 5]);
|
|
14
|
+
const hash = impl.blake3HashOnce(data);
|
|
15
|
+
// prettier-ignore
|
|
16
|
+
expect(hash).toEqual(new Uint8Array([
|
|
17
|
+
2, 79, 103, 192, 66, 90, 61, 192, 47, 186, 245, 140, 185, 61, 229, 19,
|
|
18
|
+
46, 61, 117, 197, 25, 250, 160, 186, 218, 33, 73, 29, 136, 201, 112, 87,
|
|
19
|
+
]));
|
|
20
|
+
});
|
|
21
|
+
test("blake3HashOnceWithContext", () => {
|
|
22
|
+
const data = new Uint8Array([1, 2, 3, 4, 5]);
|
|
23
|
+
const context = new Uint8Array([6, 7, 8, 9, 10]);
|
|
24
|
+
const hash = impl.blake3HashOnceWithContext(data, { context });
|
|
25
|
+
// prettier-ignore
|
|
26
|
+
expect(hash).toEqual(new Uint8Array([
|
|
27
|
+
26, 197, 20, 5, 159, 115, 36, 109, 188, 32, 237, 183, 252, 248, 89, 48,
|
|
28
|
+
212, 51, 102, 180, 94, 56, 201, 33, 196, 52, 222, 121, 103, 112, 153,
|
|
29
|
+
98,
|
|
30
|
+
]));
|
|
31
|
+
});
|
|
32
|
+
test("incrementalBlake3", () => {
|
|
33
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
34
|
+
const state = impl.emptyBlake3State();
|
|
35
|
+
const data = new Uint8Array([1, 2, 3, 4, 5]);
|
|
36
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
37
|
+
const state2 = impl.blake3IncrementalUpdate(state, data);
|
|
38
|
+
expect(impl.blake3DigestForState(state2)).toEqual(
|
|
39
|
+
// prettier-ignore
|
|
40
|
+
new Uint8Array([
|
|
41
|
+
2, 79, 103, 192, 66, 90, 61, 192, 47, 186, 245, 140, 185, 61, 229, 19,
|
|
42
|
+
46, 61, 117, 197, 25, 250, 160, 186, 218, 33, 73, 29, 136, 201, 112, 87,
|
|
43
|
+
]));
|
|
44
|
+
const data2 = new Uint8Array([6, 7, 8, 9, 10]);
|
|
45
|
+
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
46
|
+
const state3 = impl.blake3IncrementalUpdate(state2, data2);
|
|
47
|
+
expect(impl.blake3DigestForState(state3)).toEqual(
|
|
48
|
+
// prettier-ignore
|
|
49
|
+
new Uint8Array([
|
|
50
|
+
165, 131, 141, 69, 2, 69, 39, 236, 196, 244, 180, 213, 147, 124, 222,
|
|
51
|
+
39, 68, 223, 54, 176, 242, 97, 200, 101, 204, 79, 21, 233, 56, 51, 1,
|
|
52
|
+
199,
|
|
53
|
+
]));
|
|
54
|
+
});
|
|
55
|
+
test("newEd25519SigningKey", () => {
|
|
56
|
+
expect(impl.newEd25519SigningKey().length).toEqual(32);
|
|
57
|
+
});
|
|
58
|
+
test("getSignerID", () => {
|
|
59
|
+
const secret = impl.signerSecretFromBytes(new Uint8Array(Array.from({ length: 32 }, (_, i) => i * 2)));
|
|
60
|
+
const id = impl.getSignerID(secret);
|
|
61
|
+
expect(id).toEqual("signer_z8wDhwtSA2twZvmz8J3Df63TdCBxC7ta9hFASV9cZC9xw");
|
|
62
|
+
});
|
|
63
|
+
test("sign and verify", () => {
|
|
64
|
+
const secret = impl.signerSecretFromBytes(new Uint8Array(Array.from({ length: 32 }, (_, i) => i * 2)));
|
|
65
|
+
const wrongSecret = impl.signerSecretFromBytes(new Uint8Array(Array.from({ length: 32 }, (_, i) => (i === 0 ? 1 : i * 2))));
|
|
66
|
+
const message = { foo: "bar" };
|
|
67
|
+
const wrongMessage = { foo: "baz" };
|
|
68
|
+
const signature = impl.sign(secret, message);
|
|
69
|
+
const wrongSignature = impl.sign(wrongSecret, message);
|
|
70
|
+
expect(signature).toEqual("signature_zHH7trJJ4iJFgYv9B8QtF96qcG7PbPJcfojy9ACtJc6z9FqzbJNM6xeqVLxCEK1oSj1oSYAgy2V3CW5SzjYDh8ax");
|
|
71
|
+
expect(impl.verify(signature, message, impl.getSignerID(secret))).toBeTruthy();
|
|
72
|
+
expect(impl.verify(wrongSignature, message, impl.getSignerID(secret))).toBeFalsy();
|
|
73
|
+
expect(impl.verify(signature, wrongMessage, impl.getSignerID(secret))).toBeFalsy();
|
|
74
|
+
});
|
|
75
|
+
test("newX25519StaticSecret", () => {
|
|
76
|
+
expect(impl.newX25519StaticSecret().length).toEqual(32);
|
|
77
|
+
});
|
|
78
|
+
test("getSealerID", () => {
|
|
79
|
+
const secret = impl.sealerSecretFromBytes(new Uint8Array(Array.from({ length: 32 }, (_, i) => i * 2)));
|
|
80
|
+
const id = impl.getSealerID(secret);
|
|
81
|
+
expect(id).toEqual("sealer_zBvzQipsgJZwgy4rN5dfnWQWQNrV4PnJpWfDjZkJ5iYqy");
|
|
82
|
+
});
|
|
83
|
+
test("encrypt and decrypt", () => {
|
|
84
|
+
const secret = "keySecret_zyRhQCZGM3LwEjB2nXTktyBQ56JiDBHbRtYjjddiugjT";
|
|
85
|
+
const data = { foo: "bar" };
|
|
86
|
+
const nOnceMaterial = { bar: "foo" };
|
|
87
|
+
const encrypted = impl.encrypt(data, secret, nOnceMaterial);
|
|
88
|
+
expect(encrypted).toEqual("encrypted_UDrVbWTATlj-ECtLqJQ==");
|
|
89
|
+
const decrypted = impl.decrypt(encrypted, secret, nOnceMaterial);
|
|
90
|
+
expect(decrypted).toEqual(data);
|
|
91
|
+
const wrongSecret = "keySecret_zyRhQCZGM3LwEjB2nXTktyBQ56JiDBHbRtYjjddingjT";
|
|
92
|
+
expect(impl.decrypt(encrypted, wrongSecret, nOnceMaterial)).toBeUndefined();
|
|
93
|
+
const wrongNOnceMaterial = { bar: "baz" };
|
|
94
|
+
expect(impl.decrypt(encrypted, secret, wrongNOnceMaterial)).toBeUndefined();
|
|
95
|
+
});
|
|
96
|
+
test("seal and unseal", () => {
|
|
97
|
+
const senderSecret = "sealerSecret_zFffKAY7Ln5ouAbmC6K21N6uPs1RQXyhpcuQzK3kPWhhg";
|
|
98
|
+
const recipientSecret = "sealerSecret_z3K6m9AHmEJeTrCQW4zY5vicneorj9sVQasA7E8FYvDQa";
|
|
99
|
+
const message = { foo: "bar" };
|
|
100
|
+
const nOnceMaterial = {
|
|
101
|
+
in: "co_zSomeCoValue",
|
|
102
|
+
tx: {
|
|
103
|
+
sessionID: "co_zSomeAccount_session_zSomeSession",
|
|
104
|
+
txIndex: 42,
|
|
105
|
+
},
|
|
106
|
+
};
|
|
107
|
+
const sealed = impl.seal({
|
|
108
|
+
message,
|
|
109
|
+
from: senderSecret,
|
|
110
|
+
to: impl.getSealerID(recipientSecret),
|
|
111
|
+
nOnceMaterial,
|
|
112
|
+
});
|
|
113
|
+
expect(sealed).toEqual("sealed_UtuddAQjop6zMR47aI7HOqj-f0kR2tdFvRxzDe4I=");
|
|
114
|
+
const unsealed = impl.unseal(sealed, recipientSecret, impl.getSealerID(senderSecret), nOnceMaterial);
|
|
115
|
+
expect(unsealed).toEqual(message);
|
|
116
|
+
const wrongRecipientSecret = "sealerSecret_zHV1Y1VPbc31B8bi7yw4oL5CPPnPFspKwUjkFErgJFuoB";
|
|
117
|
+
expect(() => impl.unseal(sealed, wrongRecipientSecret, impl.getSealerID(senderSecret), nOnceMaterial)).toThrow();
|
|
118
|
+
const wrongNOnceMaterial = {
|
|
119
|
+
in: "co_zSomeCoValue",
|
|
120
|
+
tx: {
|
|
121
|
+
sessionID: "co_zSomeAccount_session_zSomeSession",
|
|
122
|
+
txIndex: 43,
|
|
123
|
+
},
|
|
124
|
+
};
|
|
125
|
+
expect(() => impl.unseal(sealed, recipientSecret, impl.getSealerID(senderSecret), wrongNOnceMaterial)).toThrow();
|
|
126
|
+
});
|
|
127
|
+
test("StreamingHash clone", () => {
|
|
128
|
+
const originalHash = new StreamingHash(impl);
|
|
129
|
+
originalHash.update({ foo: "bar" });
|
|
130
|
+
const clonedHash = originalHash.clone();
|
|
131
|
+
// Update the original hash
|
|
132
|
+
originalHash.update({ baz: "qux" });
|
|
133
|
+
// Update the cloned hash differently
|
|
134
|
+
clonedHash.update({ quux: "corge" });
|
|
135
|
+
// The digests should be different
|
|
136
|
+
expect(originalHash.digest()).not.toEqual(clonedHash.digest());
|
|
137
|
+
// The cloned hash should match a new hash with the same updates
|
|
138
|
+
const newHash = new StreamingHash(impl);
|
|
139
|
+
newHash.update({ foo: "bar" });
|
|
140
|
+
newHash.update({ quux: "corge" });
|
|
141
|
+
expect(clonedHash.digest()).toEqual(newHash.digest());
|
|
142
|
+
});
|
|
143
|
+
});
|
|
144
|
+
//# sourceMappingURL=cryptoImpl.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cryptoImpl.test.js","sourceRoot":"","sources":["../../src/tests/cryptoImpl.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,QAAQ,CAAC;AAChD,OAAO,EAAE,YAAY,EAAE,MAAM,2BAA2B,CAAC;AACzD,OAAO,EAAE,UAAU,EAAE,MAAM,yBAAyB,CAAC;AACrD,OAAO,EAAa,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAG/D,QAAQ,CAAC,IAAI,CAAC;IACZ,EAAE,IAAI,EAAE,MAAM,UAAU,CAAC,MAAM,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE;IACjD,EAAE,IAAI,EAAE,MAAM,YAAY,CAAC,MAAM,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;CACtD,CAAC,CAAC,sBAAsB,EAAE,CAAC,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE;IAC5C,IAAI,CAAC,aAAa,EAAE,GAAG,EAAE;QACvB,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC;IAClD,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,gBAAgB,EAAE,GAAG,EAAE;QAC1B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;QAC7C,MAAM,IAAI,GAAG,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QACvC,kBAAkB;QAClB,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAClB,IAAI,UAAU,CAAC;YACb,CAAC,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE;YACrE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE;SACxE,CAAC,CACH,CAAC;IACJ,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,2BAA2B,EAAE,GAAG,EAAE;QACrC,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;QAC7C,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC;QACjD,MAAM,IAAI,GAAG,IAAI,CAAC,yBAAyB,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,CAAC,CAAC;QAC/D,kBAAkB;QAClB,MAAM,CAAC,IAAI,CAAC,CAAC,OAAO,CAClB,IAAI,UAAU,CAAC;YACb,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE;YACtE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG;YACpE,EAAE;SACH,CAAC,CACH,CAAC;IACJ,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,mBAAmB,EAAE,GAAG,EAAE;QAC7B,8DAA8D;QAC9D,MAAM,KAAK,GAAG,IAAI,CAAC,gBAAgB,EAAS,CAAC;QAC7C,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;QAC7C,8DAA8D;QAC9D,MAAM,MAAM,GAAG,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE,IAAI,CAAQ,CAAC;QAChE,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO;QAC/C,kBAAkB;QAClB,IAAI,UAAU,CAAC;YACb,CAAC,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE;YACrE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE;SACxE,CAAC,CACH,CAAC;QACF,MAAM,KAAK,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC;QAC/C,8DAA8D;QAC9D,MAAM,MAAM,GAAG,IAAI,CAAC,uBAAuB,CAAC,MAAM,EAAE,KAAK,CAAQ,CAAC;QAClE,MAAM,CAAC,IAAI,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO;QAC/C,kBAAkB;QAClB,IAAI,UAAU,CAAC;YACb,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG;YACpE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC;YACpE,GAAG;SACJ,CAAC,CACH,CAAC;IACJ,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,sBAAsB,EAAE,GAAG,EAAE;QAChC,MAAM,CAAC,IAAI,CAAC,oBAAoB,EAAE,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC;IACzD,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,aAAa,EAAE,GAAG,EAAE;QACvB,MAAM,MAAM,GAAG,IAAI,CAAC,qBAAqB,CACvC,IAAI,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAC5D,CAAC;QACF,MAAM,EAAE,GAAG,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;QACpC,MAAM,CAAC,EAAE,CAAC,CAAC,OAAO,CAAC,sDAAsD,CAAC,CAAC;IAC7E,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,iBAAiB,EAAE,GAAG,EAAE;QAC3B,MAAM,MAAM,GAAG,IAAI,CAAC,qBAAqB,CACvC,IAAI,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAC5D,CAAC;QACF,MAAM,WAAW,GAAG,IAAI,CAAC,qBAAqB,CAC5C,IAAI,UAAU,CACZ,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAC5D,CACF,CAAC;QACF,MAAM,OAAO,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAC/B,MAAM,YAAY,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QACpC,MAAM,SAAS,GAAG,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;QAC7C,MAAM,cAAc,GAAG,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;QACvD,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CACvB,oGAAoG,CACrG,CAAC;QACF,MAAM,CACJ,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,CAC1D,CAAC,UAAU,EAAE,CAAC;QACf,MAAM,CACJ,IAAI,CAAC,MAAM,CAAC,cAAc,EAAE,OAAO,EAAE,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,CAC/D,CAAC,SAAS,EAAE,CAAC;QACd,MAAM,CACJ,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,YAAY,EAAE,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC,CAC/D,CAAC,SAAS,EAAE,CAAC;IAChB,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,uBAAuB,EAAE,GAAG,EAAE;QACjC,MAAM,CAAC,IAAI,CAAC,qBAAqB,EAAE,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC;IAC1D,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,aAAa,EAAE,GAAG,EAAE;QACvB,MAAM,MAAM,GAAG,IAAI,CAAC,qBAAqB,CACvC,IAAI,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,MAAM,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAC5D,CAAC;QACF,MAAM,EAAE,GAAG,IAAI,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;QACpC,MAAM,CAAC,EAAE,CAAC,CAAC,OAAO,CAAC,sDAAsD,CAAC,CAAC;IAC7E,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,qBAAqB,EAAE,GAAG,EAAE;QAC/B,MAAM,MAAM,GACV,wDAAwD,CAAC;QAC3D,MAAM,IAAI,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAC5B,MAAM,aAAa,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QACrC,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,MAAM,EAAE,aAAa,CAAC,CAAC;QAC5D,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,iCAAiC,CAAC,CAAC;QAC7D,MAAM,SAAS,GAAG,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,MAAM,EAAE,aAAa,CAAC,CAAC;QACjE,MAAM,CAAC,SAAS,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;QAChC,MAAM,WAAW,GACf,wDAAwD,CAAC;QAC3D,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,WAAW,EAAE,aAAa,CAAC,CAAC,CAAC,aAAa,EAAE,CAAC;QAC5E,MAAM,kBAAkB,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAC1C,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,SAAS,EAAE,MAAM,EAAE,kBAAkB,CAAC,CAAC,CAAC,aAAa,EAAE,CAAC;IAC9E,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,iBAAiB,EAAE,GAAG,EAAE;QAC3B,MAAM,YAAY,GAChB,4DAA4D,CAAC;QAC/D,MAAM,eAAe,GACnB,4DAA4D,CAAC;QAC/D,MAAM,OAAO,GAAG,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAC/B,MAAM,aAAa,GAAG;YACpB,EAAE,EAAE,iBAA0B;YAC9B,EAAE,EAAE;gBACF,SAAS,EAAE,sCAAmD;gBAC9D,OAAO,EAAE,EAAE;aACZ;SACF,CAAC;QAEF,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC;YACvB,OAAO;YACP,IAAI,EAAE,YAAY;YAClB,EAAE,EAAE,IAAI,CAAC,WAAW,CAAC,eAAe,CAAC;YACrC,aAAa;SACd,CAAC,CAAC;QAEH,MAAM,CAAC,MAAM,CAAC,CAAC,OAAO,CAAC,kDAAkD,CAAC,CAAC;QAE3E,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,CAC1B,MAAM,EACN,eAAe,EACf,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,EAC9B,aAAa,CACd,CAAC;QACF,MAAM,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;QAElC,MAAM,oBAAoB,GACxB,4DAA4D,CAAC;QAC/D,MAAM,CAAC,GAAG,EAAE,CACV,IAAI,CAAC,MAAM,CACT,MAAM,EACN,oBAAoB,EACpB,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,EAC9B,aAAa,CACd,CACF,CAAC,OAAO,EAAE,CAAC;QACZ,MAAM,kBAAkB,GAAG;YACzB,EAAE,EAAE,iBAA0B;YAC9B,EAAE,EAAE;gBACF,SAAS,EAAE,sCAAmD;gBAC9D,OAAO,EAAE,EAAE;aACZ;SACF,CAAC;QACF,MAAM,CAAC,GAAG,EAAE,CACV,IAAI,CAAC,MAAM,CACT,MAAM,EACN,eAAe,EACf,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,EAC9B,kBAAkB,CACnB,CACF,CAAC,OAAO,EAAE,CAAC;IACd,CAAC,CAAC,CAAC;IAEH,IAAI,CAAC,qBAAqB,EAAE,GAAG,EAAE;QAC/B,MAAM,YAAY,GAAG,IAAI,aAAa,CAAC,IAAI,CAAC,CAAC;QAC7C,YAAY,CAAC,MAAM,CAAC,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC,CAAC;QAEpC,MAAM,UAAU,GAAG,YAAY,CAAC,KAAK,EAAE,CAAC;QAExC,2BAA2B;QAC3B,YAAY,CAAC,MAAM,CAAC,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC,CAAC;QAEpC,qCAAqC;QACrC,UAAU,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,CAAC,CAAC;QAErC,kCAAkC;QAClC,MAAM,CAAC,YAAY,CAAC,MAAM,EAAE,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC,CAAC;QAE/D,gEAAgE;QAChE,MAAM,OAAO,GAAG,IAAI,aAAa,CAAC,IAAI,CAAC,CAAC;QACxC,OAAO,CAAC,MAAM,CAAC,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC,CAAC;QAC/B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,EAAE,OAAO,EAAE,CAAC,CAAC;QAClC,MAAM,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC;IACxD,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"group.test.d.ts","sourceRoot":"","sources":["../../src/tests/group.test.ts"],"names":[],"mappings":""}
|