gitspace 0.2.0-rc.2 → 0.2.0-rc.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (316) hide show
  1. package/README.md +68 -38
  2. package/package.json +36 -25
  3. package/.claude/settings.local.json +0 -21
  4. package/.gitspace/bundle.json +0 -50
  5. package/.gitspace/select/01-status.sh +0 -40
  6. package/.gitspace/setup/01-install-deps.sh +0 -12
  7. package/.gitspace/setup/02-typecheck.sh +0 -16
  8. package/AGENTS.md +0 -439
  9. package/CLAUDE.md +0 -1
  10. package/bun.lock +0 -647
  11. package/docs/CONNECTION.md +0 -623
  12. package/docs/GATEWAY-WORKER.md +0 -319
  13. package/docs/GETTING-STARTED.md +0 -448
  14. package/docs/GITSPACE-PLATFORM.md +0 -1819
  15. package/docs/INFRASTRUCTURE.md +0 -1347
  16. package/docs/PROTOCOL.md +0 -619
  17. package/docs/QUICKSTART.md +0 -174
  18. package/docs/RELAY.md +0 -327
  19. package/docs/REMOTE-DESIGN.md +0 -549
  20. package/docs/ROADMAP.md +0 -564
  21. package/docs/SITE_DOCS_FIGMA_MAKE.md +0 -1167
  22. package/docs/STACK-DESIGN.md +0 -588
  23. package/docs/UNIFIED_ARCHITECTURE.md +0 -292
  24. package/experiments/pty-benchmark.ts +0 -148
  25. package/experiments/pty-latency.ts +0 -100
  26. package/experiments/router/client.ts +0 -199
  27. package/experiments/router/protocol.ts +0 -74
  28. package/experiments/router/router.ts +0 -217
  29. package/experiments/router/session.ts +0 -180
  30. package/experiments/router/test.ts +0 -133
  31. package/experiments/socket-bandwidth.ts +0 -77
  32. package/homebrew/gitspace.rb +0 -45
  33. package/landing-page/ATTRIBUTIONS.md +0 -3
  34. package/landing-page/README.md +0 -11
  35. package/landing-page/bun.lock +0 -801
  36. package/landing-page/guidelines/Guidelines.md +0 -61
  37. package/landing-page/index.html +0 -37
  38. package/landing-page/package.json +0 -90
  39. package/landing-page/postcss.config.mjs +0 -15
  40. package/landing-page/public/_redirects +0 -1
  41. package/landing-page/public/favicon.png +0 -0
  42. package/landing-page/src/app/App.tsx +0 -53
  43. package/landing-page/src/app/components/figma/ImageWithFallback.tsx +0 -27
  44. package/landing-page/src/app/components/ui/accordion.tsx +0 -66
  45. package/landing-page/src/app/components/ui/alert-dialog.tsx +0 -157
  46. package/landing-page/src/app/components/ui/alert.tsx +0 -66
  47. package/landing-page/src/app/components/ui/aspect-ratio.tsx +0 -11
  48. package/landing-page/src/app/components/ui/avatar.tsx +0 -53
  49. package/landing-page/src/app/components/ui/badge.tsx +0 -46
  50. package/landing-page/src/app/components/ui/breadcrumb.tsx +0 -109
  51. package/landing-page/src/app/components/ui/button.tsx +0 -57
  52. package/landing-page/src/app/components/ui/calendar.tsx +0 -75
  53. package/landing-page/src/app/components/ui/card.tsx +0 -92
  54. package/landing-page/src/app/components/ui/carousel.tsx +0 -241
  55. package/landing-page/src/app/components/ui/chart.tsx +0 -353
  56. package/landing-page/src/app/components/ui/checkbox.tsx +0 -32
  57. package/landing-page/src/app/components/ui/collapsible.tsx +0 -33
  58. package/landing-page/src/app/components/ui/command.tsx +0 -177
  59. package/landing-page/src/app/components/ui/context-menu.tsx +0 -252
  60. package/landing-page/src/app/components/ui/dialog.tsx +0 -135
  61. package/landing-page/src/app/components/ui/drawer.tsx +0 -132
  62. package/landing-page/src/app/components/ui/dropdown-menu.tsx +0 -257
  63. package/landing-page/src/app/components/ui/form.tsx +0 -168
  64. package/landing-page/src/app/components/ui/hover-card.tsx +0 -44
  65. package/landing-page/src/app/components/ui/input-otp.tsx +0 -77
  66. package/landing-page/src/app/components/ui/input.tsx +0 -21
  67. package/landing-page/src/app/components/ui/label.tsx +0 -24
  68. package/landing-page/src/app/components/ui/menubar.tsx +0 -276
  69. package/landing-page/src/app/components/ui/navigation-menu.tsx +0 -168
  70. package/landing-page/src/app/components/ui/pagination.tsx +0 -127
  71. package/landing-page/src/app/components/ui/popover.tsx +0 -48
  72. package/landing-page/src/app/components/ui/progress.tsx +0 -31
  73. package/landing-page/src/app/components/ui/radio-group.tsx +0 -45
  74. package/landing-page/src/app/components/ui/resizable.tsx +0 -56
  75. package/landing-page/src/app/components/ui/scroll-area.tsx +0 -58
  76. package/landing-page/src/app/components/ui/select.tsx +0 -189
  77. package/landing-page/src/app/components/ui/separator.tsx +0 -28
  78. package/landing-page/src/app/components/ui/sheet.tsx +0 -139
  79. package/landing-page/src/app/components/ui/sidebar.tsx +0 -726
  80. package/landing-page/src/app/components/ui/skeleton.tsx +0 -13
  81. package/landing-page/src/app/components/ui/slider.tsx +0 -63
  82. package/landing-page/src/app/components/ui/sonner.tsx +0 -25
  83. package/landing-page/src/app/components/ui/switch.tsx +0 -31
  84. package/landing-page/src/app/components/ui/table.tsx +0 -116
  85. package/landing-page/src/app/components/ui/tabs.tsx +0 -66
  86. package/landing-page/src/app/components/ui/textarea.tsx +0 -18
  87. package/landing-page/src/app/components/ui/toggle-group.tsx +0 -73
  88. package/landing-page/src/app/components/ui/toggle.tsx +0 -47
  89. package/landing-page/src/app/components/ui/tooltip.tsx +0 -61
  90. package/landing-page/src/app/components/ui/use-mobile.ts +0 -21
  91. package/landing-page/src/app/components/ui/utils.ts +0 -6
  92. package/landing-page/src/components/docs/DocsContent.tsx +0 -718
  93. package/landing-page/src/components/docs/DocsSidebar.tsx +0 -84
  94. package/landing-page/src/components/landing/CTA.tsx +0 -59
  95. package/landing-page/src/components/landing/Comparison.tsx +0 -84
  96. package/landing-page/src/components/landing/FaultyTerminal.tsx +0 -424
  97. package/landing-page/src/components/landing/Features.tsx +0 -201
  98. package/landing-page/src/components/landing/Hero.tsx +0 -142
  99. package/landing-page/src/components/landing/Pricing.tsx +0 -140
  100. package/landing-page/src/components/landing/Roadmap.tsx +0 -86
  101. package/landing-page/src/components/landing/Security.tsx +0 -81
  102. package/landing-page/src/components/landing/TerminalWindow.tsx +0 -27
  103. package/landing-page/src/components/landing/UseCases.tsx +0 -55
  104. package/landing-page/src/components/landing/Workflow.tsx +0 -101
  105. package/landing-page/src/components/layout/DashboardNavbar.tsx +0 -37
  106. package/landing-page/src/components/layout/Footer.tsx +0 -55
  107. package/landing-page/src/components/layout/LandingNavbar.tsx +0 -82
  108. package/landing-page/src/components/ui/badge.tsx +0 -39
  109. package/landing-page/src/components/ui/breadcrumb.tsx +0 -115
  110. package/landing-page/src/components/ui/button.tsx +0 -57
  111. package/landing-page/src/components/ui/card.tsx +0 -79
  112. package/landing-page/src/components/ui/mock-terminal.tsx +0 -68
  113. package/landing-page/src/components/ui/separator.tsx +0 -28
  114. package/landing-page/src/lib/utils.ts +0 -6
  115. package/landing-page/src/main.tsx +0 -10
  116. package/landing-page/src/pages/Dashboard.tsx +0 -133
  117. package/landing-page/src/pages/DocsPage.tsx +0 -79
  118. package/landing-page/src/pages/LandingPage.tsx +0 -31
  119. package/landing-page/src/pages/TerminalView.tsx +0 -106
  120. package/landing-page/src/styles/fonts.css +0 -0
  121. package/landing-page/src/styles/index.css +0 -3
  122. package/landing-page/src/styles/tailwind.css +0 -4
  123. package/landing-page/src/styles/theme.css +0 -181
  124. package/landing-page/vite.config.ts +0 -19
  125. package/npm/darwin-arm64/bin/gssh +0 -0
  126. package/npm/darwin-arm64/package.json +0 -20
  127. package/scripts/build.ts +0 -298
  128. package/scripts/release.ts +0 -140
  129. package/src/__tests__/test-utils.ts +0 -298
  130. package/src/commands/__tests__/serve-messages.test.ts +0 -190
  131. package/src/commands/access.ts +0 -298
  132. package/src/commands/add.ts +0 -452
  133. package/src/commands/auth.ts +0 -364
  134. package/src/commands/connect.ts +0 -287
  135. package/src/commands/directory.ts +0 -16
  136. package/src/commands/host.ts +0 -396
  137. package/src/commands/identity.ts +0 -184
  138. package/src/commands/list.ts +0 -200
  139. package/src/commands/relay.ts +0 -315
  140. package/src/commands/remove.ts +0 -241
  141. package/src/commands/serve.ts +0 -1493
  142. package/src/commands/share.ts +0 -456
  143. package/src/commands/status.ts +0 -125
  144. package/src/commands/switch.ts +0 -353
  145. package/src/commands/tmux.ts +0 -317
  146. package/src/core/__tests__/access.test.ts +0 -240
  147. package/src/core/access.ts +0 -277
  148. package/src/core/bundle.ts +0 -342
  149. package/src/core/config.ts +0 -510
  150. package/src/core/git.ts +0 -317
  151. package/src/core/github.ts +0 -151
  152. package/src/core/identity.ts +0 -631
  153. package/src/core/linear.ts +0 -225
  154. package/src/core/shell.ts +0 -161
  155. package/src/core/trusted-relays.ts +0 -315
  156. package/src/index.ts +0 -810
  157. package/src/lib/remote-session/index.ts +0 -7
  158. package/src/lib/remote-session/protocol.ts +0 -267
  159. package/src/lib/remote-session/session-handler.ts +0 -581
  160. package/src/lib/remote-session/workspace-scanner.ts +0 -167
  161. package/src/lib/tmux-lite/README.md +0 -81
  162. package/src/lib/tmux-lite/cli.ts +0 -796
  163. package/src/lib/tmux-lite/crypto/__tests__/helpers/handshake-runner.ts +0 -349
  164. package/src/lib/tmux-lite/crypto/__tests__/helpers/mock-relay.ts +0 -291
  165. package/src/lib/tmux-lite/crypto/__tests__/helpers/test-identities.ts +0 -142
  166. package/src/lib/tmux-lite/crypto/__tests__/integration/authorization.integration.test.ts +0 -339
  167. package/src/lib/tmux-lite/crypto/__tests__/integration/e2e-communication.integration.test.ts +0 -477
  168. package/src/lib/tmux-lite/crypto/__tests__/integration/error-handling.integration.test.ts +0 -499
  169. package/src/lib/tmux-lite/crypto/__tests__/integration/handshake.integration.test.ts +0 -371
  170. package/src/lib/tmux-lite/crypto/__tests__/integration/security.integration.test.ts +0 -573
  171. package/src/lib/tmux-lite/crypto/access-control.test.ts +0 -512
  172. package/src/lib/tmux-lite/crypto/access-control.ts +0 -320
  173. package/src/lib/tmux-lite/crypto/frames.test.ts +0 -262
  174. package/src/lib/tmux-lite/crypto/frames.ts +0 -141
  175. package/src/lib/tmux-lite/crypto/handshake.ts +0 -894
  176. package/src/lib/tmux-lite/crypto/identity.test.ts +0 -220
  177. package/src/lib/tmux-lite/crypto/identity.ts +0 -286
  178. package/src/lib/tmux-lite/crypto/index.ts +0 -51
  179. package/src/lib/tmux-lite/crypto/invites.test.ts +0 -381
  180. package/src/lib/tmux-lite/crypto/invites.ts +0 -215
  181. package/src/lib/tmux-lite/crypto/keyexchange.ts +0 -435
  182. package/src/lib/tmux-lite/crypto/keys.test.ts +0 -58
  183. package/src/lib/tmux-lite/crypto/keys.ts +0 -47
  184. package/src/lib/tmux-lite/crypto/secretbox.test.ts +0 -169
  185. package/src/lib/tmux-lite/crypto/secretbox.ts +0 -124
  186. package/src/lib/tmux-lite/handshake-handler.ts +0 -451
  187. package/src/lib/tmux-lite/protocol.test.ts +0 -307
  188. package/src/lib/tmux-lite/protocol.ts +0 -266
  189. package/src/lib/tmux-lite/relay-client.ts +0 -506
  190. package/src/lib/tmux-lite/server.ts +0 -1250
  191. package/src/lib/tmux-lite/shell-integration.sh +0 -37
  192. package/src/lib/tmux-lite/terminal-queries.test.ts +0 -54
  193. package/src/lib/tmux-lite/terminal-queries.ts +0 -49
  194. package/src/relay/__tests__/e2e-flow.test.ts +0 -1284
  195. package/src/relay/__tests__/helpers/auth.ts +0 -354
  196. package/src/relay/__tests__/helpers/ports.ts +0 -51
  197. package/src/relay/__tests__/protocol-validation.test.ts +0 -265
  198. package/src/relay/authorization.ts +0 -303
  199. package/src/relay/embedded-assets.generated.d.ts +0 -15
  200. package/src/relay/identity.ts +0 -352
  201. package/src/relay/index.ts +0 -57
  202. package/src/relay/pipes.test.ts +0 -427
  203. package/src/relay/pipes.ts +0 -195
  204. package/src/relay/protocol.ts +0 -804
  205. package/src/relay/registries.test.ts +0 -437
  206. package/src/relay/registries.ts +0 -593
  207. package/src/relay/server.test.ts +0 -1323
  208. package/src/relay/server.ts +0 -1092
  209. package/src/relay/signing.ts +0 -238
  210. package/src/relay/types.ts +0 -69
  211. package/src/serve/client-session-manager.ts +0 -622
  212. package/src/serve/daemon.ts +0 -497
  213. package/src/serve/pty-session.ts +0 -236
  214. package/src/serve/types.ts +0 -169
  215. package/src/shared/components/Flow.tsx +0 -453
  216. package/src/shared/components/Flow.tui.tsx +0 -343
  217. package/src/shared/components/Flow.web.tsx +0 -442
  218. package/src/shared/components/Inbox.tsx +0 -446
  219. package/src/shared/components/Inbox.tui.tsx +0 -262
  220. package/src/shared/components/Inbox.web.tsx +0 -329
  221. package/src/shared/components/MachineList.tsx +0 -187
  222. package/src/shared/components/MachineList.tui.tsx +0 -161
  223. package/src/shared/components/MachineList.web.tsx +0 -210
  224. package/src/shared/components/ProjectList.tsx +0 -176
  225. package/src/shared/components/ProjectList.tui.tsx +0 -109
  226. package/src/shared/components/ProjectList.web.tsx +0 -143
  227. package/src/shared/components/SpacesBrowser.tsx +0 -332
  228. package/src/shared/components/SpacesBrowser.tui.tsx +0 -163
  229. package/src/shared/components/SpacesBrowser.web.tsx +0 -221
  230. package/src/shared/components/index.ts +0 -103
  231. package/src/shared/hooks/index.ts +0 -16
  232. package/src/shared/hooks/useNavigation.ts +0 -226
  233. package/src/shared/index.ts +0 -122
  234. package/src/shared/providers/LocalMachineProvider.ts +0 -425
  235. package/src/shared/providers/MachineProvider.ts +0 -165
  236. package/src/shared/providers/RemoteMachineProvider.ts +0 -444
  237. package/src/shared/providers/index.ts +0 -26
  238. package/src/shared/types.ts +0 -145
  239. package/src/tui/adapters.ts +0 -120
  240. package/src/tui/app.tsx +0 -1816
  241. package/src/tui/components/Terminal.tsx +0 -580
  242. package/src/tui/hooks/index.ts +0 -35
  243. package/src/tui/hooks/useAppState.ts +0 -314
  244. package/src/tui/hooks/useDaemonStatus.ts +0 -174
  245. package/src/tui/hooks/useInboxTUI.ts +0 -113
  246. package/src/tui/hooks/useRemoteMachines.ts +0 -209
  247. package/src/tui/index.ts +0 -24
  248. package/src/tui/state.ts +0 -299
  249. package/src/tui/terminal-bracketed-paste.test.ts +0 -45
  250. package/src/tui/terminal-bracketed-paste.ts +0 -47
  251. package/src/types/bundle.ts +0 -112
  252. package/src/types/config.ts +0 -89
  253. package/src/types/errors.ts +0 -206
  254. package/src/types/identity.ts +0 -284
  255. package/src/types/workspace-fuzzy.ts +0 -49
  256. package/src/types/workspace.ts +0 -151
  257. package/src/utils/bun-socket-writer.ts +0 -80
  258. package/src/utils/deps.ts +0 -127
  259. package/src/utils/fuzzy-match.ts +0 -125
  260. package/src/utils/logger.ts +0 -127
  261. package/src/utils/markdown.ts +0 -254
  262. package/src/utils/onboarding.ts +0 -229
  263. package/src/utils/prompts.ts +0 -114
  264. package/src/utils/run-commands.ts +0 -112
  265. package/src/utils/run-scripts.ts +0 -142
  266. package/src/utils/sanitize.ts +0 -98
  267. package/src/utils/secrets.ts +0 -122
  268. package/src/utils/shell-escape.ts +0 -40
  269. package/src/utils/utf8.ts +0 -79
  270. package/src/utils/workspace-state.ts +0 -47
  271. package/src/web/README.md +0 -73
  272. package/src/web/bun.lock +0 -575
  273. package/src/web/eslint.config.js +0 -23
  274. package/src/web/index.html +0 -16
  275. package/src/web/package.json +0 -37
  276. package/src/web/public/vite.svg +0 -1
  277. package/src/web/src/App.tsx +0 -604
  278. package/src/web/src/assets/react.svg +0 -1
  279. package/src/web/src/components/Terminal.tsx +0 -207
  280. package/src/web/src/hooks/useRelayConnection.ts +0 -224
  281. package/src/web/src/hooks/useTerminal.ts +0 -699
  282. package/src/web/src/index.css +0 -55
  283. package/src/web/src/lib/crypto/__tests__/web-terminal.test.ts +0 -1158
  284. package/src/web/src/lib/crypto/frames.ts +0 -205
  285. package/src/web/src/lib/crypto/handshake.ts +0 -396
  286. package/src/web/src/lib/crypto/identity.ts +0 -128
  287. package/src/web/src/lib/crypto/keyexchange.ts +0 -246
  288. package/src/web/src/lib/crypto/relay-signing.ts +0 -53
  289. package/src/web/src/lib/invite.ts +0 -58
  290. package/src/web/src/lib/storage/identity-store.ts +0 -94
  291. package/src/web/src/main.tsx +0 -10
  292. package/src/web/src/types/identity.ts +0 -45
  293. package/src/web/tsconfig.app.json +0 -28
  294. package/src/web/tsconfig.json +0 -7
  295. package/src/web/tsconfig.node.json +0 -26
  296. package/src/web/vite.config.ts +0 -31
  297. package/todo-security.md +0 -92
  298. package/tsconfig.json +0 -23
  299. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite +0 -0
  300. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-shm +0 -0
  301. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/12b7107e435bf1b9a8713a7f320472a63e543104d633d89a26f8d21f4e4ef182.sqlite-wal +0 -0
  302. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite +0 -0
  303. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-shm +0 -0
  304. package/worker/.wrangler/state/v3/d1/miniflare-D1DatabaseObject/1a1ac3db1ab86ecf712f90322868a9aabc2c7dc9fe2dfbe94f9b075096276b0f.sqlite-wal +0 -0
  305. package/worker/bun.lock +0 -237
  306. package/worker/package.json +0 -22
  307. package/worker/schema.sql +0 -96
  308. package/worker/src/handlers/auth.ts +0 -451
  309. package/worker/src/handlers/subdomains.ts +0 -376
  310. package/worker/src/handlers/user.ts +0 -98
  311. package/worker/src/index.ts +0 -70
  312. package/worker/src/middleware/auth.ts +0 -152
  313. package/worker/src/services/cloudflare.ts +0 -609
  314. package/worker/src/types.ts +0 -96
  315. package/worker/tsconfig.json +0 -15
  316. package/worker/wrangler.toml +0 -26
@@ -1,894 +0,0 @@
1
- /**
2
- * X3DH (Extended Triple Diffie-Hellman) handshake protocol implementation
3
- *
4
- * This module implements a 4-message mutual authentication handshake:
5
- * 1. ClientHello: Client sends ephemeral key and nonce
6
- * 2. ServerHello: Server sends identity, signed pre-key, ephemeral key, and nonce
7
- * 3. ClientAuth: Client proves identity and provides authorization
8
- * 4. ServerAuth: Server proves identity and returns authorization result
9
- *
10
- * The handshake provides:
11
- * - Perfect forward secrecy (ephemeral keys)
12
- * - Mutual authentication (both parties prove identity)
13
- * - Authorization (invite tokens or access lists)
14
- * - Protection against replay attacks (nonces, timestamps)
15
- * - Protection against man-in-the-middle (signed pre-keys)
16
- *
17
- * Key derivation uses triple DH:
18
- * - DH1 = client_ephemeral × server_signed_prekey
19
- * - DH2 = client_ephemeral × server_identity_keyexchange
20
- * - DH3 = client_ephemeral × server_ephemeral
21
- *
22
- * @module handshake
23
- */
24
-
25
- import { randomBytes } from "node:crypto";
26
- import { createHmac } from "node:crypto";
27
- import { sign, verify, deriveIdentityId } from "./identity.js";
28
- import {
29
- x25519SharedSecret,
30
- generateEphemeralKeypair,
31
- deriveSessionKeysFromMultiple,
32
- validateX25519PublicKey,
33
- } from "./keyexchange.js";
34
- import type {
35
- Identity,
36
- KeyExchangeKeypair,
37
- SessionKeys,
38
- X3DHInitMessage,
39
- X3DHResponseMessage,
40
- X3DHAuthMessage,
41
- X3DHResultMessage,
42
- HandshakePhase,
43
- } from "../../../types/identity.js";
44
-
45
- // ============================================================================
46
- // Constants
47
- // ============================================================================
48
-
49
- /** Nonce length (32 bytes, 256 bits) */
50
- const NONCE_LENGTH = 32;
51
-
52
- /** Maximum allowed clock skew for timestamp validation (5 minutes) */
53
- const MAX_TIMESTAMP_SKEW_MS = 5 * 60 * 1000;
54
-
55
- /** Protocol version */
56
- const PROTOCOL_VERSION = 1;
57
-
58
- // ============================================================================
59
- // Client State
60
- // ============================================================================
61
-
62
- /**
63
- * Client-side handshake state
64
- *
65
- * Tracks the client's progress through the handshake phases and
66
- * maintains ephemeral keys and received server information.
67
- */
68
- export interface X3DHClientState {
69
- /** Current handshake phase */
70
- phase: HandshakePhase;
71
- /** Client's ephemeral keypair */
72
- ephemeral: KeyExchangeKeypair;
73
- /** Client-generated nonce for replay protection */
74
- clientNonce: Uint8Array;
75
- /** Server's nonce (received in ServerHello) */
76
- serverNonce?: Uint8Array;
77
- /** Server's Ed25519 identity public key (received in ServerHello) */
78
- peerIdentityKey?: Uint8Array;
79
- /** Server's X25519 key exchange public key (received in ServerHello) */
80
- peerKeyExchangeKey?: Uint8Array;
81
- /** Server's ephemeral X25519 public key (received in ServerHello) */
82
- peerEphemeralKey?: Uint8Array;
83
- /** Server's signed X25519 pre-key (received in ServerHello) */
84
- peerSignedPreKey?: Uint8Array;
85
- }
86
-
87
- // ============================================================================
88
- // Server State
89
- // ============================================================================
90
-
91
- /**
92
- * Server-side handshake state
93
- *
94
- * Tracks the server's progress through the handshake phases and
95
- * maintains pre-signed keys and received client information.
96
- */
97
- export interface X3DHServerState {
98
- /** Current handshake phase */
99
- phase: HandshakePhase;
100
- /** Server's signed pre-key (signed with identity key) */
101
- signedPreKey: KeyExchangeKeypair;
102
- /** Signature over signedPreKey.publicKey using identity signing key */
103
- signedPreKeySignature: Uint8Array;
104
- /** Server's ephemeral keypair */
105
- ephemeral: KeyExchangeKeypair;
106
- /** Server-generated nonce for replay protection */
107
- serverNonce: Uint8Array;
108
- /** Client's nonce (received in ClientHello) */
109
- clientNonce?: Uint8Array;
110
- /** Client's ephemeral X25519 public key (received in ClientHello) */
111
- clientEphemeralKey?: Uint8Array;
112
- }
113
-
114
- // ============================================================================
115
- // Client-Side Functions
116
- // ============================================================================
117
-
118
- /**
119
- * Create initial ClientHello message
120
- *
121
- * Initiates the handshake by generating an ephemeral keypair and nonce.
122
- * The client sends their ephemeral public key and nonce to the server.
123
- *
124
- * @param machineIdHint - Optional machine ID for relay routing
125
- * @returns Client state and ClientHello message
126
- * @throws {Error} If key or nonce generation fails
127
- *
128
- * @example
129
- * ```typescript
130
- * const { state, message } = createClientHello("machine-123");
131
- * // Send message to server
132
- * await relay.send(message);
133
- * ```
134
- */
135
- export function createClientHello(machineIdHint?: string): {
136
- state: X3DHClientState;
137
- message: X3DHInitMessage;
138
- } {
139
- // Generate ephemeral keypair and nonce
140
- const ephemeral = generateEphemeralKeypair();
141
- const clientNonce = randomBytes(NONCE_LENGTH);
142
-
143
- const state: X3DHClientState = {
144
- phase: "awaiting_server_hello",
145
- ephemeral,
146
- clientNonce,
147
- };
148
-
149
- const message: X3DHInitMessage = {
150
- version: PROTOCOL_VERSION,
151
- ephemeralKey: Buffer.from(ephemeral.publicKey).toString("base64"),
152
- timestamp: Date.now(),
153
- clientNonce: Buffer.from(clientNonce).toString("base64"),
154
- machineIdHint,
155
- };
156
-
157
- return { state, message };
158
- }
159
-
160
- /**
161
- * Process ServerHello response
162
- *
163
- * Validates the server's response including:
164
- * - Protocol version
165
- * - Timestamp (replay protection)
166
- * - Signature on signed pre-key (authenticity)
167
- * - Public key validity
168
- *
169
- * @param state - Current client state (must be in awaiting_server_hello phase)
170
- * @param response - ServerHello message from server
171
- * @returns Updated client state, or null if validation fails
172
- *
173
- * @example
174
- * ```typescript
175
- * const message = await relay.receive();
176
- * const newState = processServerHello(state, message);
177
- * if (!newState) {
178
- * throw new Error("Invalid ServerHello");
179
- * }
180
- * ```
181
- */
182
- export function processServerHello(
183
- state: X3DHClientState,
184
- response: X3DHResponseMessage
185
- ): X3DHClientState | null {
186
- // Validate phase
187
- if (state.phase !== "awaiting_server_hello") {
188
- return null;
189
- }
190
-
191
- // Validate protocol version
192
- if (response.version !== PROTOCOL_VERSION) {
193
- return null;
194
- }
195
-
196
- // Validate timestamp (replay protection)
197
- const now = Date.now();
198
- const timeDiff = Math.abs(now - response.timestamp);
199
- if (timeDiff > MAX_TIMESTAMP_SKEW_MS) {
200
- return null;
201
- }
202
-
203
- try {
204
- // Decode server keys
205
- const peerIdentityKey = new Uint8Array(
206
- Buffer.from(response.identityKey, "base64")
207
- );
208
- const peerKeyExchangeKey = new Uint8Array(
209
- Buffer.from(response.keyExchangeKey, "base64")
210
- );
211
- const peerEphemeralKey = new Uint8Array(
212
- Buffer.from(response.ephemeralKey, "base64")
213
- );
214
- const peerSignedPreKey = new Uint8Array(
215
- Buffer.from(response.signedPreKey, "base64")
216
- );
217
- const preKeySignature = new Uint8Array(
218
- Buffer.from(response.preKeySignature, "base64")
219
- );
220
- const serverNonce = new Uint8Array(
221
- Buffer.from(response.serverNonce, "base64")
222
- );
223
-
224
- // Validate key lengths
225
- if (peerIdentityKey.length !== 32) return null;
226
- if (serverNonce.length !== NONCE_LENGTH) return null;
227
-
228
- // Validate X25519 public keys
229
- if (!validateX25519PublicKey(peerKeyExchangeKey)) return null;
230
- if (!validateX25519PublicKey(peerEphemeralKey)) return null;
231
- if (!validateX25519PublicKey(peerSignedPreKey)) return null;
232
-
233
- // Verify signature on signed pre-key
234
- const isValid = verify(peerSignedPreKey, preKeySignature, peerIdentityKey);
235
- if (!isValid) {
236
- return null;
237
- }
238
-
239
- // Update state
240
- return {
241
- ...state,
242
- phase: "awaiting_server_auth",
243
- serverNonce,
244
- peerIdentityKey,
245
- peerKeyExchangeKey,
246
- peerEphemeralKey,
247
- peerSignedPreKey,
248
- };
249
- } catch {
250
- return null;
251
- }
252
- }
253
-
254
- /**
255
- * Create ClientAuth message
256
- *
257
- * Computes session keys and proves client identity. The identity proof
258
- * is an HMAC over both nonces using a shared secret derived from the
259
- * client's signing key.
260
- *
261
- * Session keys are derived from triple DH:
262
- * - DH1 = client_ephemeral × server_signed_prekey
263
- * - DH2 = client_ephemeral × server_identity_keyexchange
264
- * - DH3 = client_ephemeral × server_ephemeral
265
- *
266
- * @param state - Current client state (must be in awaiting_server_auth phase)
267
- * @param identity - Client's identity for authentication
268
- * @param authorization - Authorization method (access list or invite token)
269
- * @returns Updated state, ClientAuth message, and derived session keys
270
- * @throws {Error} If state is invalid or key derivation fails
271
- *
272
- * @example
273
- * ```typescript
274
- * const { state: newState, message, sessionKeys } = createClientAuth(
275
- * state,
276
- * myIdentity,
277
- * { type: "invite", inviteToken: "token123" }
278
- * );
279
- * await relay.send(message);
280
- * // Store sessionKeys for later use
281
- * ```
282
- */
283
- export function createClientAuth(
284
- state: X3DHClientState,
285
- identity: Identity,
286
- authorization: X3DHAuthMessage["authorization"]
287
- ): {
288
- state: X3DHClientState;
289
- message: X3DHAuthMessage;
290
- sessionKeys: SessionKeys;
291
- } {
292
- // Validate phase
293
- if (state.phase !== "awaiting_server_auth") {
294
- throw new Error(
295
- `Invalid phase for ClientAuth: ${state.phase}, expected awaiting_server_auth`
296
- );
297
- }
298
-
299
- // Ensure we have server keys
300
- if (
301
- !state.peerSignedPreKey ||
302
- !state.peerEphemeralKey ||
303
- !state.peerIdentityKey ||
304
- !state.peerKeyExchangeKey ||
305
- !state.serverNonce
306
- ) {
307
- throw new Error("Missing server keys in state");
308
- }
309
-
310
- // Compute triple DH
311
- // DH1: client_ephemeral × server_signed_prekey
312
- const dh1 = x25519SharedSecret(
313
- state.ephemeral.privateKey,
314
- state.peerSignedPreKey
315
- );
316
-
317
- // DH2: client_ephemeral × server_identity_keyexchange
318
- const dh2 = x25519SharedSecret(
319
- state.ephemeral.privateKey,
320
- state.peerKeyExchangeKey
321
- );
322
-
323
- // DH3: client_ephemeral × server_ephemeral
324
- const dh3 = x25519SharedSecret(
325
- state.ephemeral.privateKey,
326
- state.peerEphemeralKey
327
- );
328
-
329
- // Derive session keys from triple DH
330
- const salt = new Uint8Array(state.clientNonce.length + state.serverNonce.length);
331
- salt.set(state.clientNonce, 0);
332
- salt.set(state.serverNonce, state.clientNonce.length);
333
-
334
- const sessionKeys = deriveSessionKeysFromMultiple(
335
- [dh1, dh2, dh3],
336
- salt,
337
- true // Client is initiator
338
- );
339
-
340
- // Create identity proof (HMAC over both nonces)
341
- const transcript = new Uint8Array(state.clientNonce.length + state.serverNonce.length);
342
- transcript.set(state.clientNonce, 0);
343
- transcript.set(state.serverNonce, state.clientNonce.length);
344
-
345
- const identityProof = createHmac("sha256", sessionKeys.sendKey)
346
- .update(transcript)
347
- .digest();
348
-
349
- // Create signature transcript for identity proof
350
- // This proves the client possesses the signing key, not just knows the public key
351
- // Signs: clientEphemeral || serverEphemeral || clientNonce || serverNonce
352
- const signatureTranscript = new Uint8Array(
353
- state.ephemeral.publicKey.length +
354
- state.peerEphemeralKey.length +
355
- state.clientNonce.length +
356
- state.serverNonce.length
357
- );
358
- let offset = 0;
359
- signatureTranscript.set(state.ephemeral.publicKey, offset);
360
- offset += state.ephemeral.publicKey.length;
361
- signatureTranscript.set(state.peerEphemeralKey, offset);
362
- offset += state.peerEphemeralKey.length;
363
- signatureTranscript.set(state.clientNonce, offset);
364
- offset += state.clientNonce.length;
365
- signatureTranscript.set(state.serverNonce, offset);
366
-
367
- // Sign the transcript with the client's identity signing key
368
- const identitySignature = sign(signatureTranscript, identity.signing.secretKey);
369
-
370
- // Create message
371
- const message: X3DHAuthMessage = {
372
- version: PROTOCOL_VERSION,
373
- identityKey: Buffer.from(identity.signing.publicKey).toString("base64"),
374
- keyExchangeKey: Buffer.from(identity.keyExchange.publicKey).toString(
375
- "base64"
376
- ),
377
- identityProof: Buffer.from(identityProof).toString("base64"),
378
- identitySignature: Buffer.from(identitySignature).toString("base64"),
379
- authorization,
380
- };
381
-
382
- const newState: X3DHClientState = {
383
- ...state,
384
- phase: "awaiting_server_auth",
385
- };
386
-
387
- return { state: newState, message, sessionKeys };
388
- }
389
-
390
- /**
391
- * Process ServerAuth response
392
- *
393
- * Validates the server's identity proof and checks authorization result.
394
- * On success, returns the established session keys and permissions.
395
- *
396
- * @param state - Current client state
397
- * @param response - ServerAuth message from server
398
- * @param sessionKeys - Session keys derived in createClientAuth
399
- * @returns Handshake result with session keys and permissions, or null if validation fails
400
- *
401
- * @example
402
- * ```typescript
403
- * const response = await relay.receive();
404
- * const result = processServerAuth(state, response, sessionKeys);
405
- * if (!result) {
406
- * throw new Error("Handshake failed");
407
- * }
408
- * console.log("Connected with accessType:", result.authResult.accessType);
409
- * ```
410
- */
411
- export function processServerAuth(
412
- state: X3DHClientState,
413
- response: X3DHResultMessage,
414
- sessionKeys: SessionKeys
415
- ): {
416
- sessionKeys: SessionKeys;
417
- peerIdentityId: string;
418
- authResult: X3DHResultMessage["result"];
419
- } | null {
420
- // Validate protocol version
421
- if (response.version !== PROTOCOL_VERSION) {
422
- return null;
423
- }
424
-
425
- // Check authorization result
426
- if (response.result.type === "rejected") {
427
- return null;
428
- }
429
-
430
- try {
431
- // Decode server identity key
432
- const serverIdentityKey = new Uint8Array(
433
- Buffer.from(response.identityKey, "base64")
434
- );
435
-
436
- // Verify it matches what we received in ServerHello
437
- if (!state.peerIdentityKey) {
438
- return null;
439
- }
440
-
441
- if (!arraysEqual(serverIdentityKey, state.peerIdentityKey)) {
442
- return null;
443
- }
444
-
445
- // Verify identity proof
446
- const identityProof = new Uint8Array(
447
- Buffer.from(response.identityProof, "base64")
448
- );
449
-
450
- // Recreate transcript
451
- if (!state.serverNonce) {
452
- return null;
453
- }
454
-
455
- const transcript = new Uint8Array(
456
- state.clientNonce.length + state.serverNonce.length
457
- );
458
- transcript.set(state.clientNonce, 0);
459
- transcript.set(state.serverNonce, state.clientNonce.length);
460
-
461
- // Verify HMAC
462
- const expectedProof = createHmac("sha256", sessionKeys.receiveKey)
463
- .update(transcript)
464
- .digest();
465
-
466
- if (!arraysEqual(identityProof, expectedProof)) {
467
- return null;
468
- }
469
-
470
- // Derive peer identity ID
471
- const peerIdentityId = deriveIdentityId(serverIdentityKey);
472
-
473
- return {
474
- sessionKeys,
475
- peerIdentityId,
476
- authResult: response.result,
477
- };
478
- } catch {
479
- return null;
480
- }
481
- }
482
-
483
- // ============================================================================
484
- // Server-Side Functions
485
- // ============================================================================
486
-
487
- /**
488
- * Create server state for a new handshake
489
- *
490
- * Generates and signs a pre-key, and creates an ephemeral keypair.
491
- * The signed pre-key provides authentication and the ephemeral key
492
- * provides forward secrecy.
493
- *
494
- * @param identity - Server's identity
495
- * @returns Initial server state
496
- * @throws {Error} If key generation or signing fails
497
- *
498
- * @example
499
- * ```typescript
500
- * const serverState = createServerState(machineIdentity);
501
- * // Keep state in memory for this handshake
502
- * handshakes.set(sessionId, serverState);
503
- * ```
504
- */
505
- export function createServerState(identity: Identity): X3DHServerState {
506
- // Generate signed pre-key
507
- const signedPreKey = generateEphemeralKeypair();
508
- const signedPreKeySignature = sign(
509
- signedPreKey.publicKey,
510
- identity.signing.secretKey
511
- );
512
-
513
- // Generate ephemeral keypair
514
- const ephemeral = generateEphemeralKeypair();
515
-
516
- // Generate server nonce
517
- const serverNonce = randomBytes(NONCE_LENGTH);
518
-
519
- return {
520
- phase: "idle",
521
- signedPreKey,
522
- signedPreKeySignature,
523
- ephemeral,
524
- serverNonce,
525
- };
526
- }
527
-
528
- /**
529
- * Process ClientHello message
530
- *
531
- * Validates the client's initial message and extracts their ephemeral
532
- * public key and nonce.
533
- *
534
- * @param state - Current server state (must be in idle phase)
535
- * @param message - ClientHello message from client
536
- * @returns Updated server state, or null if validation fails
537
- *
538
- * @example
539
- * ```typescript
540
- * const clientHello = await relay.receive();
541
- * const newState = processClientHello(state, clientHello);
542
- * if (!newState) {
543
- * throw new Error("Invalid ClientHello");
544
- * }
545
- * ```
546
- */
547
- export function processClientHello(
548
- state: X3DHServerState,
549
- message: X3DHInitMessage
550
- ): X3DHServerState | null {
551
- // Validate phase
552
- if (state.phase !== "idle") {
553
- return null;
554
- }
555
-
556
- // Validate protocol version
557
- if (message.version !== PROTOCOL_VERSION) {
558
- return null;
559
- }
560
-
561
- // Validate timestamp (replay protection)
562
- const now = Date.now();
563
- const timeDiff = Math.abs(now - message.timestamp);
564
- if (timeDiff > MAX_TIMESTAMP_SKEW_MS) {
565
- return null;
566
- }
567
-
568
- try {
569
- // Decode client ephemeral key and nonce
570
- const clientEphemeralKey = new Uint8Array(
571
- Buffer.from(message.ephemeralKey, "base64")
572
- );
573
- const clientNonce = new Uint8Array(
574
- Buffer.from(message.clientNonce, "base64")
575
- );
576
-
577
- // Validate key and nonce lengths
578
- if (!validateX25519PublicKey(clientEphemeralKey)) return null;
579
- if (clientNonce.length !== NONCE_LENGTH) return null;
580
-
581
- // Update state
582
- return {
583
- ...state,
584
- phase: "awaiting_client_auth",
585
- clientEphemeralKey,
586
- clientNonce,
587
- };
588
- } catch {
589
- return null;
590
- }
591
- }
592
-
593
- /**
594
- * Create ServerHello response
595
- *
596
- * Sends the server's identity, signed pre-key, ephemeral key, and nonce
597
- * to the client.
598
- *
599
- * @param state - Current server state (must be in awaiting_client_auth phase)
600
- * @param identity - Server's identity
601
- * @returns Updated state and ServerHello message
602
- * @throws {Error} If state is invalid
603
- *
604
- * @example
605
- * ```typescript
606
- * const { state: newState, message } = createServerHello(state, machineIdentity);
607
- * await relay.send(message);
608
- * ```
609
- */
610
- export function createServerHello(
611
- state: X3DHServerState,
612
- identity: Identity
613
- ): { state: X3DHServerState; message: X3DHResponseMessage } {
614
- // Validate phase
615
- if (state.phase !== "awaiting_client_auth") {
616
- throw new Error(
617
- `Invalid phase for ServerHello: ${state.phase}, expected awaiting_client_auth`
618
- );
619
- }
620
-
621
- const message: X3DHResponseMessage = {
622
- version: PROTOCOL_VERSION,
623
- identityKey: Buffer.from(identity.signing.publicKey).toString("base64"),
624
- keyExchangeKey: Buffer.from(identity.keyExchange.publicKey).toString("base64"),
625
- ephemeralKey: Buffer.from(state.ephemeral.publicKey).toString("base64"),
626
- signedPreKey: Buffer.from(state.signedPreKey.publicKey).toString("base64"),
627
- preKeySignature: Buffer.from(state.signedPreKeySignature).toString(
628
- "base64"
629
- ),
630
- serverNonce: Buffer.from(state.serverNonce).toString("base64"),
631
- timestamp: Date.now(),
632
- };
633
-
634
- return { state, message };
635
- }
636
-
637
- /**
638
- * Process ClientAuth message
639
- *
640
- * Validates the client's identity proof and authorization.
641
- * Returns the client's identity ID and authorization method for
642
- * access control checks.
643
- *
644
- * @param state - Current server state
645
- * @param message - ClientAuth message from client
646
- * @param identity - Server's identity
647
- * @returns Client identity ID and authorization, or null if validation fails
648
- *
649
- * @example
650
- * ```typescript
651
- * const clientAuth = await relay.receive();
652
- * const result = processClientAuth(state, clientAuth, machineIdentity);
653
- * if (!result) {
654
- * // Send rejection
655
- * return;
656
- * }
657
- * // Check authorization (access list or invite token)
658
- * const permissions = await checkAuthorization(result);
659
- * ```
660
- */
661
- export function processClientAuth(
662
- state: X3DHServerState,
663
- message: X3DHAuthMessage,
664
- identity: Identity
665
- ): {
666
- peerIdentityId: string;
667
- authorization: X3DHAuthMessage["authorization"];
668
- clientIdentityKey: Uint8Array;
669
- clientKeyExchangeKey: Uint8Array;
670
- } | null {
671
- // Validate protocol version
672
- if (message.version !== PROTOCOL_VERSION) {
673
- return null;
674
- }
675
-
676
- // Ensure we have client ephemeral key
677
- if (!state.clientEphemeralKey || !state.clientNonce) {
678
- return null;
679
- }
680
-
681
- try {
682
- // Decode client identity keys
683
- const clientIdentityKey = new Uint8Array(
684
- Buffer.from(message.identityKey, "base64")
685
- );
686
- const clientKeyExchangeKey = new Uint8Array(
687
- Buffer.from(message.keyExchangeKey, "base64")
688
- );
689
- const identityProof = new Uint8Array(
690
- Buffer.from(message.identityProof, "base64")
691
- );
692
-
693
- // Decode identity signature (required for security)
694
- if (!message.identitySignature) {
695
- return null; // Signature is required
696
- }
697
- const identitySignature = new Uint8Array(
698
- Buffer.from(message.identitySignature, "base64")
699
- );
700
-
701
- // Validate key lengths
702
- if (clientIdentityKey.length !== 32) return null;
703
- if (!validateX25519PublicKey(clientKeyExchangeKey)) return null;
704
- if (identitySignature.length !== 64) return null; // Ed25519 signature is 64 bytes
705
-
706
- // Compute triple DH (server side)
707
- // DH1: server_signed_prekey × client_ephemeral
708
- const dh1 = x25519SharedSecret(
709
- state.signedPreKey.privateKey,
710
- state.clientEphemeralKey
711
- );
712
-
713
- // DH2: server_identity_keyexchange × client_ephemeral
714
- const dh2 = x25519SharedSecret(
715
- identity.keyExchange.privateKey,
716
- state.clientEphemeralKey
717
- );
718
-
719
- // DH3: server_ephemeral × client_ephemeral
720
- const dh3 = x25519SharedSecret(
721
- state.ephemeral.privateKey,
722
- state.clientEphemeralKey
723
- );
724
-
725
- // Derive session keys (server is NOT initiator)
726
- const salt = new Uint8Array(state.clientNonce.length + state.serverNonce.length);
727
- salt.set(state.clientNonce, 0);
728
- salt.set(state.serverNonce, state.clientNonce.length);
729
-
730
- const sessionKeys = deriveSessionKeysFromMultiple(
731
- [dh1, dh2, dh3],
732
- salt,
733
- false // Server is NOT initiator
734
- );
735
-
736
- // Verify identity proof
737
- const transcript = new Uint8Array(
738
- state.clientNonce.length + state.serverNonce.length
739
- );
740
- transcript.set(state.clientNonce, 0);
741
- transcript.set(state.serverNonce, state.clientNonce.length);
742
-
743
- const expectedProof = createHmac("sha256", sessionKeys.receiveKey)
744
- .update(transcript)
745
- .digest();
746
-
747
- if (!arraysEqual(identityProof, expectedProof)) {
748
- return null;
749
- }
750
-
751
- // Verify identity signature - this proves the client possesses the signing key
752
- // Recreate signature transcript: clientEphemeral || serverEphemeral || clientNonce || serverNonce
753
- const signatureTranscript = new Uint8Array(
754
- state.clientEphemeralKey.length +
755
- state.ephemeral.publicKey.length +
756
- state.clientNonce.length +
757
- state.serverNonce.length
758
- );
759
- let sigOffset = 0;
760
- signatureTranscript.set(state.clientEphemeralKey, sigOffset);
761
- sigOffset += state.clientEphemeralKey.length;
762
- signatureTranscript.set(state.ephemeral.publicKey, sigOffset);
763
- sigOffset += state.ephemeral.publicKey.length;
764
- signatureTranscript.set(state.clientNonce, sigOffset);
765
- sigOffset += state.clientNonce.length;
766
- signatureTranscript.set(state.serverNonce, sigOffset);
767
-
768
- // Verify the signature using the client's claimed identity key
769
- const isValidSignature = verify(signatureTranscript, identitySignature, clientIdentityKey);
770
- if (!isValidSignature) {
771
- return null; // Client cannot prove they own the signing key
772
- }
773
-
774
- // Derive peer identity ID
775
- const peerIdentityId = deriveIdentityId(clientIdentityKey);
776
-
777
- return {
778
- peerIdentityId,
779
- authorization: message.authorization,
780
- clientIdentityKey,
781
- clientKeyExchangeKey,
782
- };
783
- } catch {
784
- return null;
785
- }
786
- }
787
-
788
- /**
789
- * Create ServerAuth response
790
- *
791
- * Sends the server's identity proof and authorization result.
792
- * Also computes and returns the session keys for the established session.
793
- *
794
- * @param identity - Server's identity
795
- * @param state - Current server state
796
- * @param clientIdentityKey - Client's identity public key (from processClientAuth)
797
- * @param result - Authorization result (accepted or rejected)
798
- * @returns ServerAuth message and session keys
799
- * @throws {Error} If state is invalid or key derivation fails
800
- *
801
- * @example
802
- * ```typescript
803
- * const permissions = { read: true, write: true, manage: false };
804
- * const { message, sessionKeys } = createServerAuth(
805
- * machineIdentity,
806
- * state,
807
- * clientIdentityKey,
808
- * { type: "accepted", permissions }
809
- * );
810
- * await relay.send(message);
811
- * // Store sessionKeys for this session
812
- * sessions.set(sessionId, sessionKeys);
813
- * ```
814
- */
815
- export function createServerAuth(
816
- identity: Identity,
817
- state: X3DHServerState,
818
- _clientIdentityKey: Uint8Array,
819
- result: X3DHResultMessage["result"]
820
- ): { message: X3DHResultMessage; sessionKeys: SessionKeys } {
821
- // Ensure we have client keys
822
- if (!state.clientEphemeralKey || !state.clientNonce) {
823
- throw new Error("Missing client keys in state");
824
- }
825
-
826
- // Compute triple DH (same as in processClientAuth)
827
- const dh1 = x25519SharedSecret(
828
- state.signedPreKey.privateKey,
829
- state.clientEphemeralKey
830
- );
831
- const dh2 = x25519SharedSecret(
832
- identity.keyExchange.privateKey,
833
- state.clientEphemeralKey
834
- );
835
- const dh3 = x25519SharedSecret(
836
- state.ephemeral.privateKey,
837
- state.clientEphemeralKey
838
- );
839
-
840
- // Derive session keys
841
- const salt = new Uint8Array(state.clientNonce.length + state.serverNonce.length);
842
- salt.set(state.clientNonce, 0);
843
- salt.set(state.serverNonce, state.clientNonce.length);
844
-
845
- const sessionKeys = deriveSessionKeysFromMultiple(
846
- [dh1, dh2, dh3],
847
- salt,
848
- false // Server is NOT initiator
849
- );
850
-
851
- // Create identity proof
852
- const transcript = new Uint8Array(
853
- state.clientNonce.length + state.serverNonce.length
854
- );
855
- transcript.set(state.clientNonce, 0);
856
- transcript.set(state.serverNonce, state.clientNonce.length);
857
-
858
- const identityProof = createHmac("sha256", sessionKeys.sendKey)
859
- .update(transcript)
860
- .digest();
861
-
862
- const message: X3DHResultMessage = {
863
- version: PROTOCOL_VERSION,
864
- identityKey: Buffer.from(identity.signing.publicKey).toString("base64"),
865
- identityProof: Buffer.from(identityProof).toString("base64"),
866
- result,
867
- };
868
-
869
- return { message, sessionKeys };
870
- }
871
-
872
- // ============================================================================
873
- // Helper Functions
874
- // ============================================================================
875
-
876
- /**
877
- * Compare two Uint8Arrays for equality (constant-time)
878
- *
879
- * @param a - First array
880
- * @param b - Second array
881
- * @returns True if arrays are equal, false otherwise
882
- */
883
- function arraysEqual(a: Uint8Array, b: Uint8Array): boolean {
884
- if (a.length !== b.length) {
885
- return false;
886
- }
887
-
888
- let result = 0;
889
- for (let i = 0; i < a.length; i++) {
890
- result |= a[i] ^ b[i];
891
- }
892
-
893
- return result === 0;
894
- }