cojson 0.8.11 → 0.8.16

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (158) hide show
  1. package/CHANGELOG.md +94 -82
  2. package/dist/native/PeerKnownStates.js +1 -1
  3. package/dist/native/PeerKnownStates.js.map +1 -1
  4. package/dist/native/PeerState.js +4 -1
  5. package/dist/native/PeerState.js.map +1 -1
  6. package/dist/native/PriorityBasedMessageQueue.js +1 -10
  7. package/dist/native/PriorityBasedMessageQueue.js.map +1 -1
  8. package/dist/native/base64url.js.map +1 -1
  9. package/dist/native/base64url.test.js +1 -1
  10. package/dist/native/base64url.test.js.map +1 -1
  11. package/dist/native/coValue.js.map +1 -1
  12. package/dist/native/coValueCore.js +141 -149
  13. package/dist/native/coValueCore.js.map +1 -1
  14. package/dist/native/coValueState.js.map +1 -1
  15. package/dist/native/coValues/account.js +6 -6
  16. package/dist/native/coValues/account.js.map +1 -1
  17. package/dist/native/coValues/coList.js +2 -3
  18. package/dist/native/coValues/coList.js.map +1 -1
  19. package/dist/native/coValues/coMap.js +1 -1
  20. package/dist/native/coValues/coMap.js.map +1 -1
  21. package/dist/native/coValues/coStream.js +3 -5
  22. package/dist/native/coValues/coStream.js.map +1 -1
  23. package/dist/native/coValues/group.js +11 -11
  24. package/dist/native/coValues/group.js.map +1 -1
  25. package/dist/native/coreToCoValue.js +2 -2
  26. package/dist/native/coreToCoValue.js.map +1 -1
  27. package/dist/native/crypto/PureJSCrypto.js +4 -4
  28. package/dist/native/crypto/PureJSCrypto.js.map +1 -1
  29. package/dist/native/crypto/crypto.js.map +1 -1
  30. package/dist/native/exports.js +12 -12
  31. package/dist/native/exports.js.map +1 -1
  32. package/dist/native/ids.js.map +1 -1
  33. package/dist/native/jsonStringify.js.map +1 -1
  34. package/dist/native/localNode.js +6 -8
  35. package/dist/native/localNode.js.map +1 -1
  36. package/dist/native/permissions.js +4 -7
  37. package/dist/native/permissions.js.map +1 -1
  38. package/dist/native/priority.js.map +1 -1
  39. package/dist/native/storage/FileSystem.js.map +1 -1
  40. package/dist/native/storage/chunksAndKnownStates.js +2 -4
  41. package/dist/native/storage/chunksAndKnownStates.js.map +1 -1
  42. package/dist/native/storage/index.js +7 -16
  43. package/dist/native/storage/index.js.map +1 -1
  44. package/dist/native/streamUtils.js.map +1 -1
  45. package/dist/native/sync.js +6 -8
  46. package/dist/native/sync.js.map +1 -1
  47. package/dist/native/typeUtils/accountOrAgentIDfromSessionID.js.map +1 -1
  48. package/dist/native/typeUtils/expectGroup.js.map +1 -1
  49. package/dist/native/typeUtils/isAccountID.js.map +1 -1
  50. package/dist/native/typeUtils/isCoValue.js +1 -1
  51. package/dist/native/typeUtils/isCoValue.js.map +1 -1
  52. package/dist/web/PeerKnownStates.js +1 -1
  53. package/dist/web/PeerKnownStates.js.map +1 -1
  54. package/dist/web/PeerState.js +4 -1
  55. package/dist/web/PeerState.js.map +1 -1
  56. package/dist/web/PriorityBasedMessageQueue.js +1 -10
  57. package/dist/web/PriorityBasedMessageQueue.js.map +1 -1
  58. package/dist/web/base64url.js.map +1 -1
  59. package/dist/web/base64url.test.js +1 -1
  60. package/dist/web/base64url.test.js.map +1 -1
  61. package/dist/web/coValue.js.map +1 -1
  62. package/dist/web/coValueCore.js +141 -149
  63. package/dist/web/coValueCore.js.map +1 -1
  64. package/dist/web/coValueState.js.map +1 -1
  65. package/dist/web/coValues/account.js +6 -6
  66. package/dist/web/coValues/account.js.map +1 -1
  67. package/dist/web/coValues/coList.js +2 -3
  68. package/dist/web/coValues/coList.js.map +1 -1
  69. package/dist/web/coValues/coMap.js +1 -1
  70. package/dist/web/coValues/coMap.js.map +1 -1
  71. package/dist/web/coValues/coStream.js +3 -5
  72. package/dist/web/coValues/coStream.js.map +1 -1
  73. package/dist/web/coValues/group.js +11 -11
  74. package/dist/web/coValues/group.js.map +1 -1
  75. package/dist/web/coreToCoValue.js +2 -2
  76. package/dist/web/coreToCoValue.js.map +1 -1
  77. package/dist/web/crypto/PureJSCrypto.js +4 -4
  78. package/dist/web/crypto/PureJSCrypto.js.map +1 -1
  79. package/dist/web/crypto/WasmCrypto.js +5 -5
  80. package/dist/web/crypto/WasmCrypto.js.map +1 -1
  81. package/dist/web/crypto/crypto.js.map +1 -1
  82. package/dist/web/exports.js +12 -12
  83. package/dist/web/exports.js.map +1 -1
  84. package/dist/web/ids.js.map +1 -1
  85. package/dist/web/jsonStringify.js.map +1 -1
  86. package/dist/web/localNode.js +6 -8
  87. package/dist/web/localNode.js.map +1 -1
  88. package/dist/web/permissions.js +4 -7
  89. package/dist/web/permissions.js.map +1 -1
  90. package/dist/web/priority.js.map +1 -1
  91. package/dist/web/storage/FileSystem.js.map +1 -1
  92. package/dist/web/storage/chunksAndKnownStates.js +2 -4
  93. package/dist/web/storage/chunksAndKnownStates.js.map +1 -1
  94. package/dist/web/storage/index.js +7 -16
  95. package/dist/web/storage/index.js.map +1 -1
  96. package/dist/web/streamUtils.js.map +1 -1
  97. package/dist/web/sync.js +6 -8
  98. package/dist/web/sync.js.map +1 -1
  99. package/dist/web/typeUtils/accountOrAgentIDfromSessionID.js.map +1 -1
  100. package/dist/web/typeUtils/expectGroup.js.map +1 -1
  101. package/dist/web/typeUtils/isAccountID.js.map +1 -1
  102. package/dist/web/typeUtils/isCoValue.js +1 -1
  103. package/dist/web/typeUtils/isCoValue.js.map +1 -1
  104. package/package.json +4 -14
  105. package/src/PeerKnownStates.ts +91 -89
  106. package/src/PeerState.ts +72 -69
  107. package/src/PriorityBasedMessageQueue.ts +42 -49
  108. package/src/base64url.test.ts +24 -24
  109. package/src/base64url.ts +44 -45
  110. package/src/coValue.ts +45 -45
  111. package/src/coValueCore.ts +746 -785
  112. package/src/coValueState.ts +82 -72
  113. package/src/coValues/account.ts +143 -150
  114. package/src/coValues/coList.ts +520 -522
  115. package/src/coValues/coMap.ts +283 -285
  116. package/src/coValues/coStream.ts +320 -324
  117. package/src/coValues/group.ts +306 -305
  118. package/src/coreToCoValue.ts +28 -31
  119. package/src/crypto/PureJSCrypto.ts +188 -194
  120. package/src/crypto/WasmCrypto.ts +236 -254
  121. package/src/crypto/crypto.ts +302 -309
  122. package/src/exports.ts +116 -116
  123. package/src/ids.ts +9 -9
  124. package/src/jsonStringify.ts +46 -46
  125. package/src/jsonValue.ts +24 -10
  126. package/src/localNode.ts +635 -660
  127. package/src/media.ts +3 -3
  128. package/src/permissions.ts +272 -278
  129. package/src/priority.ts +21 -19
  130. package/src/storage/FileSystem.ts +91 -99
  131. package/src/storage/chunksAndKnownStates.ts +110 -115
  132. package/src/storage/index.ts +466 -497
  133. package/src/streamUtils.ts +60 -60
  134. package/src/sync.ts +593 -615
  135. package/src/tests/PeerKnownStates.test.ts +38 -34
  136. package/src/tests/PeerState.test.ts +101 -64
  137. package/src/tests/PriorityBasedMessageQueue.test.ts +91 -91
  138. package/src/tests/account.test.ts +59 -59
  139. package/src/tests/coList.test.ts +65 -65
  140. package/src/tests/coMap.test.ts +137 -137
  141. package/src/tests/coStream.test.ts +254 -257
  142. package/src/tests/coValueCore.test.ts +153 -156
  143. package/src/tests/crypto.test.ts +136 -144
  144. package/src/tests/cryptoImpl.test.ts +205 -197
  145. package/src/tests/group.test.ts +24 -24
  146. package/src/tests/permissions.test.ts +1306 -1371
  147. package/src/tests/priority.test.ts +65 -82
  148. package/src/tests/sync.test.ts +1300 -1291
  149. package/src/tests/testUtils.ts +52 -53
  150. package/src/typeUtils/accountOrAgentIDfromSessionID.ts +4 -4
  151. package/src/typeUtils/expectGroup.ts +9 -9
  152. package/src/typeUtils/isAccountID.ts +1 -1
  153. package/src/typeUtils/isCoValue.ts +9 -9
  154. package/tsconfig.json +4 -6
  155. package/tsconfig.native.json +9 -11
  156. package/tsconfig.web.json +4 -10
  157. package/.eslintrc.cjs +0 -25
  158. package/.prettierrc.js +0 -9
@@ -1,265 +1,247 @@
1
1
  import {
2
- initBundledOnce,
3
- Ed25519SigningKey,
4
- Ed25519VerifyingKey,
5
- X25519StaticSecret,
6
- Memory,
7
- Ed25519Signature,
8
- X25519PublicKey,
2
+ Ed25519Signature,
3
+ Ed25519SigningKey,
4
+ Ed25519VerifyingKey,
5
+ Memory,
6
+ X25519PublicKey,
7
+ X25519StaticSecret,
8
+ initBundledOnce,
9
9
  } from "@hazae41/berith";
10
- import { xsalsa20_poly1305, xsalsa20 } from "@noble/ciphers/salsa";
11
- import { JsonValue } from "../jsonValue.js";
12
- import { base58 } from "@scure/base";
10
+ import { xsalsa20, xsalsa20_poly1305 } from "@noble/ciphers/salsa";
13
11
  import { randomBytes } from "@noble/ciphers/webcrypto/utils";
14
- import { RawCoID, TransactionID } from "../ids.js";
15
- import { base64URLtoBytes, bytesToBase64url } from "../base64url.js";
12
+ import { base58 } from "@scure/base";
16
13
  import { createBLAKE3 } from "hash-wasm";
14
+ import { base64URLtoBytes, bytesToBase64url } from "../base64url.js";
15
+ import { RawCoID, TransactionID } from "../ids.js";
17
16
  import { Stringified, stableStringify } from "../jsonStringify.js";
17
+ import { JsonValue } from "../jsonValue.js";
18
18
  import {
19
- CryptoProvider,
20
- SignerSecret,
21
- SignerID,
22
- Signature,
23
- textEncoder,
24
- SealerSecret,
25
- SealerID,
26
- KeySecret,
27
- Encrypted,
28
- textDecoder,
29
- Sealed,
19
+ CryptoProvider,
20
+ Encrypted,
21
+ KeySecret,
22
+ Sealed,
23
+ SealerID,
24
+ SealerSecret,
25
+ Signature,
26
+ SignerID,
27
+ SignerSecret,
28
+ textDecoder,
29
+ textEncoder,
30
30
  } from "./crypto.js";
31
31
 
32
32
  export class WasmCrypto extends CryptoProvider<Uint8Array> {
33
- private constructor(
34
- public blake3Instance: Awaited<ReturnType<typeof createBLAKE3>>,
35
- ) {
36
- super();
37
- }
38
-
39
- static async create(): Promise<WasmCrypto> {
40
- return Promise.all([
41
- createBLAKE3(),
42
- initBundledOnce(),
43
- new Promise<void>((resolve) => {
44
- if ("crypto" in globalThis) {
45
- resolve();
46
- } else {
47
- return import(/*webpackIgnore: true*/ "node:crypto").then(
48
- ({ webcrypto }) => {
49
- // eslint-disable-next-line @typescript-eslint/no-explicit-any
50
- (globalThis as any).crypto = webcrypto;
51
- resolve();
52
- },
53
- );
54
- }
55
- }),
56
- ]).then(([blake3instance]) => new WasmCrypto(blake3instance));
57
- }
58
-
59
- randomBytes(length: number): Uint8Array {
60
- return randomBytes(length);
61
- }
62
-
63
- emptyBlake3State(): Uint8Array {
64
- return this.blake3Instance.init().save();
65
- }
66
-
67
- cloneBlake3State(state: Uint8Array): Uint8Array {
68
- return this.blake3Instance.load(state).save();
69
- }
70
-
71
- blake3HashOnce(data: Uint8Array) {
72
- return this.blake3Instance.init().update(data).digest("binary");
73
- }
74
-
75
- blake3HashOnceWithContext(
76
- data: Uint8Array,
77
- { context }: { context: Uint8Array },
78
- ) {
79
- return this.blake3Instance
80
- .init()
81
- .update(context)
82
- .update(data)
83
- .digest("binary");
84
- }
85
-
86
- blake3IncrementalUpdate(state: Uint8Array, data: Uint8Array): Uint8Array {
87
- return this.blake3Instance.load(state).update(data).save();
88
- }
89
-
90
- blake3DigestForState(state: Uint8Array): Uint8Array {
91
- return this.blake3Instance.load(state).digest("binary");
92
- }
93
-
94
- newEd25519SigningKey(): Uint8Array {
95
- return new Ed25519SigningKey().to_bytes().copyAndDispose();
96
- }
97
-
98
- getSignerID(secret: SignerSecret): SignerID {
99
- return `signer_z${base58.encode(
100
- Ed25519SigningKey.from_bytes(
101
- new Memory(
102
- base58.decode(secret.substring("signerSecret_z".length)),
103
- ),
104
- )
105
- .public()
106
- .to_bytes()
107
- .copyAndDispose(),
108
- )}`;
109
- }
110
-
111
- sign(secret: SignerSecret, message: JsonValue): Signature {
112
- const signature = Ed25519SigningKey.from_bytes(
113
- new Memory(
114
- base58.decode(secret.substring("signerSecret_z".length)),
115
- ),
116
- )
117
- .sign(new Memory(textEncoder.encode(stableStringify(message))))
118
- .to_bytes()
119
- .copyAndDispose();
120
- return `signature_z${base58.encode(signature)}`;
121
- }
122
-
123
- verify(signature: Signature, message: JsonValue, id: SignerID): boolean {
124
- return new Ed25519VerifyingKey(
125
- new Memory(base58.decode(id.substring("signer_z".length))),
126
- ).verify(
127
- new Memory(textEncoder.encode(stableStringify(message))),
128
- new Ed25519Signature(
129
- new Memory(
130
- base58.decode(signature.substring("signature_z".length)),
131
- ),
132
- ),
133
- );
134
- }
135
-
136
- newX25519StaticSecret(): Uint8Array {
137
- return new X25519StaticSecret().to_bytes().copyAndDispose();
138
- }
139
-
140
- getSealerID(secret: SealerSecret): SealerID {
141
- return `sealer_z${base58.encode(
142
- X25519StaticSecret.from_bytes(
143
- new Memory(
144
- base58.decode(secret.substring("sealerSecret_z".length)),
145
- ),
146
- )
147
- .to_public()
148
- .to_bytes()
149
- .copyAndDispose(),
150
- )}`;
151
- }
152
-
153
- encrypt<T extends JsonValue, N extends JsonValue>(
154
- value: T,
155
- keySecret: KeySecret,
156
- nOnceMaterial: N,
157
- ): Encrypted<T, N> {
158
- const keySecretBytes = base58.decode(
159
- keySecret.substring("keySecret_z".length),
160
- );
161
- const nOnce = this.blake3HashOnce(
162
- textEncoder.encode(stableStringify(nOnceMaterial)),
163
- ).slice(0, 24);
164
-
165
- const plaintext = textEncoder.encode(stableStringify(value));
166
- const ciphertext = xsalsa20(keySecretBytes, nOnce, plaintext);
167
- return `encrypted_U${bytesToBase64url(ciphertext)}` as Encrypted<T, N>;
168
- }
169
-
170
- decryptRaw<T extends JsonValue, N extends JsonValue>(
171
- encrypted: Encrypted<T, N>,
172
- keySecret: KeySecret,
173
- nOnceMaterial: N,
174
- ): Stringified<T> {
175
- const keySecretBytes = base58.decode(
176
- keySecret.substring("keySecret_z".length),
177
- );
178
- const nOnce = this.blake3HashOnce(
179
- textEncoder.encode(stableStringify(nOnceMaterial)),
180
- ).slice(0, 24);
181
-
182
- const ciphertext = base64URLtoBytes(
183
- encrypted.substring("encrypted_U".length),
184
- );
185
- const plaintext = xsalsa20(keySecretBytes, nOnce, ciphertext);
186
-
187
- return textDecoder.decode(plaintext) as Stringified<T>;
188
- }
189
-
190
- seal<T extends JsonValue>({
191
- message,
192
- from,
193
- to,
194
- nOnceMaterial,
195
- }: {
196
- message: T;
197
- from: SealerSecret;
198
- to: SealerID;
199
- nOnceMaterial: { in: RawCoID; tx: TransactionID };
200
- }): Sealed<T> {
201
- const nOnce = this.blake3HashOnce(
202
- textEncoder.encode(stableStringify(nOnceMaterial)),
203
- ).slice(0, 24);
204
-
205
- const sealerPub = base58.decode(to.substring("sealer_z".length));
206
-
207
- const senderPriv = base58.decode(
208
- from.substring("sealerSecret_z".length),
209
- );
210
-
211
- const plaintext = textEncoder.encode(stableStringify(message));
212
-
213
- const sharedSecret = X25519StaticSecret.from_bytes(
214
- new Memory(senderPriv),
215
- )
216
- .diffie_hellman(X25519PublicKey.from_bytes(new Memory(sealerPub)))
217
- .to_bytes()
218
- .copyAndDispose();
219
-
220
- const sealedBytes = xsalsa20_poly1305(sharedSecret, nOnce).encrypt(
221
- plaintext,
222
- );
223
-
224
- return `sealed_U${bytesToBase64url(sealedBytes)}` as Sealed<T>;
225
- }
226
-
227
- unseal<T extends JsonValue>(
228
- sealed: Sealed<T>,
229
- sealer: SealerSecret,
230
- from: SealerID,
231
- nOnceMaterial: { in: RawCoID; tx: TransactionID },
232
- ): T | undefined {
233
- const nOnce = this.blake3HashOnce(
234
- textEncoder.encode(stableStringify(nOnceMaterial)),
235
- ).slice(0, 24);
236
-
237
- const sealerPriv = base58.decode(
238
- sealer.substring("sealerSecret_z".length),
239
- );
240
-
241
- const senderPub = base58.decode(from.substring("sealer_z".length));
242
-
243
- const sealedBytes = base64URLtoBytes(
244
- sealed.substring("sealed_U".length),
245
- );
246
-
247
- const sharedSecret = X25519StaticSecret.from_bytes(
248
- new Memory(sealerPriv),
249
- )
250
- .diffie_hellman(X25519PublicKey.from_bytes(new Memory(senderPub)))
251
- .to_bytes()
252
- .copyAndDispose();
253
-
254
- const plaintext = xsalsa20_poly1305(sharedSecret, nOnce).decrypt(
255
- sealedBytes,
256
- );
257
-
258
- try {
259
- return JSON.parse(textDecoder.decode(plaintext));
260
- } catch (e) {
261
- console.error("Failed to decrypt/parse sealed message", e);
262
- return undefined;
33
+ private constructor(
34
+ public blake3Instance: Awaited<ReturnType<typeof createBLAKE3>>,
35
+ ) {
36
+ super();
37
+ }
38
+
39
+ static async create(): Promise<WasmCrypto> {
40
+ return Promise.all([
41
+ createBLAKE3(),
42
+ initBundledOnce(),
43
+ new Promise<void>((resolve) => {
44
+ if ("crypto" in globalThis) {
45
+ resolve();
46
+ } else {
47
+ return import(/*webpackIgnore: true*/ "node:crypto").then(
48
+ ({ webcrypto }) => {
49
+ // eslint-disable-next-line @typescript-eslint/no-explicit-any
50
+ (globalThis as any).crypto = webcrypto;
51
+ resolve();
52
+ },
53
+ );
263
54
  }
264
- }
55
+ }),
56
+ ]).then(([blake3instance]) => new WasmCrypto(blake3instance));
57
+ }
58
+
59
+ randomBytes(length: number): Uint8Array {
60
+ return randomBytes(length);
61
+ }
62
+
63
+ emptyBlake3State(): Uint8Array {
64
+ return this.blake3Instance.init().save();
65
+ }
66
+
67
+ cloneBlake3State(state: Uint8Array): Uint8Array {
68
+ return this.blake3Instance.load(state).save();
69
+ }
70
+
71
+ blake3HashOnce(data: Uint8Array) {
72
+ return this.blake3Instance.init().update(data).digest("binary");
73
+ }
74
+
75
+ blake3HashOnceWithContext(
76
+ data: Uint8Array,
77
+ { context }: { context: Uint8Array },
78
+ ) {
79
+ return this.blake3Instance
80
+ .init()
81
+ .update(context)
82
+ .update(data)
83
+ .digest("binary");
84
+ }
85
+
86
+ blake3IncrementalUpdate(state: Uint8Array, data: Uint8Array): Uint8Array {
87
+ return this.blake3Instance.load(state).update(data).save();
88
+ }
89
+
90
+ blake3DigestForState(state: Uint8Array): Uint8Array {
91
+ return this.blake3Instance.load(state).digest("binary");
92
+ }
93
+
94
+ newEd25519SigningKey(): Uint8Array {
95
+ return new Ed25519SigningKey().to_bytes().copyAndDispose();
96
+ }
97
+
98
+ getSignerID(secret: SignerSecret): SignerID {
99
+ return `signer_z${base58.encode(
100
+ Ed25519SigningKey.from_bytes(
101
+ new Memory(base58.decode(secret.substring("signerSecret_z".length))),
102
+ )
103
+ .public()
104
+ .to_bytes()
105
+ .copyAndDispose(),
106
+ )}`;
107
+ }
108
+
109
+ sign(secret: SignerSecret, message: JsonValue): Signature {
110
+ const signature = Ed25519SigningKey.from_bytes(
111
+ new Memory(base58.decode(secret.substring("signerSecret_z".length))),
112
+ )
113
+ .sign(new Memory(textEncoder.encode(stableStringify(message))))
114
+ .to_bytes()
115
+ .copyAndDispose();
116
+ return `signature_z${base58.encode(signature)}`;
117
+ }
118
+
119
+ verify(signature: Signature, message: JsonValue, id: SignerID): boolean {
120
+ return new Ed25519VerifyingKey(
121
+ new Memory(base58.decode(id.substring("signer_z".length))),
122
+ ).verify(
123
+ new Memory(textEncoder.encode(stableStringify(message))),
124
+ new Ed25519Signature(
125
+ new Memory(base58.decode(signature.substring("signature_z".length))),
126
+ ),
127
+ );
128
+ }
129
+
130
+ newX25519StaticSecret(): Uint8Array {
131
+ return new X25519StaticSecret().to_bytes().copyAndDispose();
132
+ }
133
+
134
+ getSealerID(secret: SealerSecret): SealerID {
135
+ return `sealer_z${base58.encode(
136
+ X25519StaticSecret.from_bytes(
137
+ new Memory(base58.decode(secret.substring("sealerSecret_z".length))),
138
+ )
139
+ .to_public()
140
+ .to_bytes()
141
+ .copyAndDispose(),
142
+ )}`;
143
+ }
144
+
145
+ encrypt<T extends JsonValue, N extends JsonValue>(
146
+ value: T,
147
+ keySecret: KeySecret,
148
+ nOnceMaterial: N,
149
+ ): Encrypted<T, N> {
150
+ const keySecretBytes = base58.decode(
151
+ keySecret.substring("keySecret_z".length),
152
+ );
153
+ const nOnce = this.blake3HashOnce(
154
+ textEncoder.encode(stableStringify(nOnceMaterial)),
155
+ ).slice(0, 24);
156
+
157
+ const plaintext = textEncoder.encode(stableStringify(value));
158
+ const ciphertext = xsalsa20(keySecretBytes, nOnce, plaintext);
159
+ return `encrypted_U${bytesToBase64url(ciphertext)}` as Encrypted<T, N>;
160
+ }
161
+
162
+ decryptRaw<T extends JsonValue, N extends JsonValue>(
163
+ encrypted: Encrypted<T, N>,
164
+ keySecret: KeySecret,
165
+ nOnceMaterial: N,
166
+ ): Stringified<T> {
167
+ const keySecretBytes = base58.decode(
168
+ keySecret.substring("keySecret_z".length),
169
+ );
170
+ const nOnce = this.blake3HashOnce(
171
+ textEncoder.encode(stableStringify(nOnceMaterial)),
172
+ ).slice(0, 24);
173
+
174
+ const ciphertext = base64URLtoBytes(
175
+ encrypted.substring("encrypted_U".length),
176
+ );
177
+ const plaintext = xsalsa20(keySecretBytes, nOnce, ciphertext);
178
+
179
+ return textDecoder.decode(plaintext) as Stringified<T>;
180
+ }
181
+
182
+ seal<T extends JsonValue>({
183
+ message,
184
+ from,
185
+ to,
186
+ nOnceMaterial,
187
+ }: {
188
+ message: T;
189
+ from: SealerSecret;
190
+ to: SealerID;
191
+ nOnceMaterial: { in: RawCoID; tx: TransactionID };
192
+ }): Sealed<T> {
193
+ const nOnce = this.blake3HashOnce(
194
+ textEncoder.encode(stableStringify(nOnceMaterial)),
195
+ ).slice(0, 24);
196
+
197
+ const sealerPub = base58.decode(to.substring("sealer_z".length));
198
+
199
+ const senderPriv = base58.decode(from.substring("sealerSecret_z".length));
200
+
201
+ const plaintext = textEncoder.encode(stableStringify(message));
202
+
203
+ const sharedSecret = X25519StaticSecret.from_bytes(new Memory(senderPriv))
204
+ .diffie_hellman(X25519PublicKey.from_bytes(new Memory(sealerPub)))
205
+ .to_bytes()
206
+ .copyAndDispose();
207
+
208
+ const sealedBytes = xsalsa20_poly1305(sharedSecret, nOnce).encrypt(
209
+ plaintext,
210
+ );
211
+
212
+ return `sealed_U${bytesToBase64url(sealedBytes)}` as Sealed<T>;
213
+ }
214
+
215
+ unseal<T extends JsonValue>(
216
+ sealed: Sealed<T>,
217
+ sealer: SealerSecret,
218
+ from: SealerID,
219
+ nOnceMaterial: { in: RawCoID; tx: TransactionID },
220
+ ): T | undefined {
221
+ const nOnce = this.blake3HashOnce(
222
+ textEncoder.encode(stableStringify(nOnceMaterial)),
223
+ ).slice(0, 24);
224
+
225
+ const sealerPriv = base58.decode(sealer.substring("sealerSecret_z".length));
226
+
227
+ const senderPub = base58.decode(from.substring("sealer_z".length));
228
+
229
+ const sealedBytes = base64URLtoBytes(sealed.substring("sealed_U".length));
230
+
231
+ const sharedSecret = X25519StaticSecret.from_bytes(new Memory(sealerPriv))
232
+ .diffie_hellman(X25519PublicKey.from_bytes(new Memory(senderPub)))
233
+ .to_bytes()
234
+ .copyAndDispose();
235
+
236
+ const plaintext = xsalsa20_poly1305(sharedSecret, nOnce).decrypt(
237
+ sealedBytes,
238
+ );
239
+
240
+ try {
241
+ return JSON.parse(textDecoder.decode(plaintext));
242
+ } catch (e) {
243
+ console.error("Failed to decrypt/parse sealed message", e);
244
+ return undefined;
245
+ }
246
+ }
265
247
  }