shogun-core 5.2.0 → 5.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (186) hide show
  1. package/README.md +145 -1143
  2. package/dist/browser/defaultVendors-node_modules_hpke_chacha20poly1305_esm_mod_js.shogun-core.js +1220 -0
  3. package/dist/browser/defaultVendors-node_modules_hpke_chacha20poly1305_esm_mod_js.shogun-core.js.map +1 -0
  4. package/dist/browser/defaultVendors-node_modules_hpke_hybridkem-x-wing_esm_mod_js.shogun-core.js +844 -0
  5. package/dist/browser/defaultVendors-node_modules_hpke_hybridkem-x-wing_esm_mod_js.shogun-core.js.map +1 -0
  6. package/dist/browser/defaultVendors-node_modules_mlkem_esm_mod_js.shogun-core.js +2335 -0
  7. package/dist/browser/defaultVendors-node_modules_mlkem_esm_mod_js.shogun-core.js.map +1 -0
  8. package/dist/browser/defaultVendors-node_modules_noble_ciphers_chacha_js.shogun-core.js +999 -0
  9. package/dist/browser/defaultVendors-node_modules_noble_ciphers_chacha_js.shogun-core.js.map +1 -0
  10. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_abstract_curve_js-node_modules_noble_curves_esm_-1ce4ed.shogun-core.js +1651 -0
  11. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_abstract_curve_js-node_modules_noble_curves_esm_-1ce4ed.shogun-core.js.map +1 -0
  12. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_abstract_edwards_js-node_modules_noble_curves_es-a82056.shogun-core.js +825 -0
  13. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_abstract_edwards_js-node_modules_noble_curves_es-a82056.shogun-core.js.map +1 -0
  14. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_ed25519_js.shogun-core.js +508 -0
  15. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_ed25519_js.shogun-core.js.map +1 -0
  16. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_ed448_js.shogun-core.js +747 -0
  17. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_ed448_js.shogun-core.js.map +1 -0
  18. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_nist_js.shogun-core.js +1608 -0
  19. package/dist/browser/defaultVendors-node_modules_noble_curves_esm_nist_js.shogun-core.js.map +1 -0
  20. package/dist/browser/defaultVendors-node_modules_noble_post-quantum_ml-dsa_js.shogun-core.js +2117 -0
  21. package/dist/browser/defaultVendors-node_modules_noble_post-quantum_ml-dsa_js.shogun-core.js.map +1 -0
  22. package/dist/browser/defaultVendors-node_modules_openpgp_dist_openpgp_min_mjs.shogun-core.js +86 -0
  23. package/dist/browser/defaultVendors-node_modules_openpgp_dist_openpgp_min_mjs.shogun-core.js.map +1 -0
  24. package/dist/browser/node_modules_hpke_ml-kem_esm_mod_js.shogun-core.js +539 -0
  25. package/dist/browser/node_modules_hpke_ml-kem_esm_mod_js.shogun-core.js.map +1 -0
  26. package/dist/browser/shogun-core.js +160386 -0
  27. package/dist/browser/shogun-core.js.map +1 -0
  28. package/dist/config/simplified-config.js +236 -0
  29. package/dist/core.js +329 -0
  30. package/dist/crypto/asymmetric.js +99 -0
  31. package/dist/crypto/double-ratchet.js +370 -0
  32. package/dist/crypto/file-encryption.js +213 -0
  33. package/dist/crypto/hashing.js +87 -0
  34. package/dist/crypto/index.js +34 -0
  35. package/dist/crypto/mls-codec.js +202 -0
  36. package/dist/crypto/mls.js +550 -0
  37. package/dist/crypto/pgp.js +390 -0
  38. package/dist/crypto/random-generation.js +341 -0
  39. package/dist/crypto/sframe.js +350 -0
  40. package/dist/crypto/signal-protocol.js +376 -0
  41. package/dist/crypto/symmetric.js +91 -0
  42. package/dist/crypto/types.js +2 -0
  43. package/dist/crypto/utils.js +140 -0
  44. package/dist/examples/auth-test.js +253 -0
  45. package/dist/examples/crypto-identity-example.js +151 -0
  46. package/dist/examples/crypto-working-test.js +83 -0
  47. package/dist/examples/double-ratchet-test.js +155 -0
  48. package/dist/examples/mls-advanced-example.js +294 -0
  49. package/dist/examples/mls-sframe-test.js +304 -0
  50. package/dist/examples/pgp-example.js +200 -0
  51. package/dist/examples/quick-auth-test.js +61 -0
  52. package/dist/examples/random-generation-test.js +151 -0
  53. package/dist/examples/signal-protocol-test.js +38 -0
  54. package/dist/examples/simple-api-test.js +114 -0
  55. package/dist/examples/simple-crypto-identity-example.js +84 -0
  56. package/dist/examples/timeout-test.js +227 -0
  57. package/dist/examples/zkproof-credentials-example.js +212 -0
  58. package/dist/examples/zkproof-example.js +201 -0
  59. package/dist/gundb/api.js +435 -0
  60. package/dist/gundb/crypto.js +283 -0
  61. package/dist/gundb/db.js +1946 -0
  62. package/dist/gundb/derive.js +232 -0
  63. package/dist/gundb/errors.js +76 -0
  64. package/dist/gundb/index.js +22 -0
  65. package/dist/gundb/rxjs.js +447 -0
  66. package/dist/gundb/types.js +5 -0
  67. package/dist/index.js +58 -0
  68. package/dist/interfaces/common.js +2 -0
  69. package/dist/interfaces/events.js +40 -0
  70. package/dist/interfaces/plugin.js +2 -0
  71. package/dist/interfaces/shogun.js +37 -0
  72. package/dist/managers/AuthManager.js +226 -0
  73. package/dist/managers/CoreInitializer.js +228 -0
  74. package/dist/managers/CryptoIdentityManager.js +366 -0
  75. package/dist/managers/EventManager.js +70 -0
  76. package/dist/managers/PluginManager.js +299 -0
  77. package/dist/plugins/base.js +50 -0
  78. package/dist/plugins/index.js +32 -0
  79. package/dist/plugins/nostr/index.js +20 -0
  80. package/dist/plugins/nostr/nostrConnector.js +419 -0
  81. package/dist/plugins/nostr/nostrConnectorPlugin.js +453 -0
  82. package/dist/plugins/nostr/nostrSigner.js +319 -0
  83. package/dist/plugins/nostr/types.js +2 -0
  84. package/dist/plugins/smartwallet/index.js +18 -0
  85. package/dist/plugins/smartwallet/smartWalletPlugin.js +511 -0
  86. package/dist/plugins/smartwallet/types.js +2 -0
  87. package/dist/plugins/web3/index.js +20 -0
  88. package/dist/plugins/web3/types.js +2 -0
  89. package/dist/plugins/web3/web3Connector.js +533 -0
  90. package/dist/plugins/web3/web3ConnectorPlugin.js +455 -0
  91. package/dist/plugins/web3/web3Signer.js +314 -0
  92. package/dist/plugins/webauthn/index.js +19 -0
  93. package/dist/plugins/webauthn/types.js +14 -0
  94. package/dist/plugins/webauthn/webauthn.js +496 -0
  95. package/dist/plugins/webauthn/webauthnPlugin.js +489 -0
  96. package/dist/plugins/webauthn/webauthnSigner.js +310 -0
  97. package/dist/plugins/zkproof/index.js +53 -0
  98. package/dist/plugins/zkproof/types.js +2 -0
  99. package/dist/plugins/zkproof/zkCredentials.js +213 -0
  100. package/dist/plugins/zkproof/zkProofConnector.js +198 -0
  101. package/dist/plugins/zkproof/zkProofPlugin.js +272 -0
  102. package/dist/storage/storage.js +145 -0
  103. package/dist/types/config/simplified-config.d.ts +114 -0
  104. package/dist/types/core.d.ts +305 -0
  105. package/dist/types/crypto/asymmetric.d.ts +6 -0
  106. package/dist/types/crypto/double-ratchet.d.ts +22 -0
  107. package/dist/types/crypto/file-encryption.d.ts +19 -0
  108. package/dist/types/crypto/hashing.d.ts +9 -0
  109. package/dist/types/crypto/index.d.ts +13 -0
  110. package/dist/types/crypto/mls-codec.d.ts +39 -0
  111. package/dist/types/crypto/mls.d.ts +130 -0
  112. package/dist/types/crypto/pgp.d.ts +95 -0
  113. package/dist/types/crypto/random-generation.d.ts +35 -0
  114. package/dist/types/crypto/sframe.d.ts +102 -0
  115. package/dist/types/crypto/signal-protocol.d.ts +26 -0
  116. package/dist/types/crypto/symmetric.d.ts +9 -0
  117. package/dist/types/crypto/types.d.ts +144 -0
  118. package/dist/types/crypto/utils.d.ts +22 -0
  119. package/dist/types/examples/auth-test.d.ts +8 -0
  120. package/dist/types/examples/crypto-identity-example.d.ts +5 -0
  121. package/dist/types/examples/crypto-working-test.d.ts +1 -0
  122. package/dist/types/examples/double-ratchet-test.d.ts +1 -0
  123. package/dist/types/examples/mls-advanced-example.d.ts +53 -0
  124. package/dist/types/examples/mls-sframe-test.d.ts +1 -0
  125. package/dist/types/examples/pgp-example.d.ts +75 -0
  126. package/dist/types/examples/quick-auth-test.d.ts +8 -0
  127. package/dist/types/examples/random-generation-test.d.ts +1 -0
  128. package/dist/types/examples/signal-protocol-test.d.ts +1 -0
  129. package/dist/types/examples/simple-api-test.d.ts +10 -0
  130. package/dist/types/examples/simple-crypto-identity-example.d.ts +6 -0
  131. package/dist/types/examples/timeout-test.d.ts +8 -0
  132. package/dist/types/examples/zkproof-credentials-example.d.ts +12 -0
  133. package/dist/types/examples/zkproof-example.d.ts +11 -0
  134. package/dist/types/gundb/api.d.ts +185 -0
  135. package/dist/types/gundb/crypto.d.ts +95 -0
  136. package/dist/types/gundb/db.d.ts +397 -0
  137. package/dist/types/gundb/derive.d.ts +21 -0
  138. package/dist/types/gundb/errors.d.ts +42 -0
  139. package/dist/types/gundb/index.d.ts +3 -0
  140. package/dist/types/gundb/rxjs.d.ts +110 -0
  141. package/dist/types/gundb/types.d.ts +255 -0
  142. package/dist/types/index.d.ts +16 -0
  143. package/dist/types/interfaces/common.d.ts +85 -0
  144. package/dist/types/interfaces/events.d.ts +131 -0
  145. package/dist/types/interfaces/plugin.d.ts +162 -0
  146. package/dist/types/interfaces/shogun.d.ts +208 -0
  147. package/dist/types/managers/AuthManager.d.ts +72 -0
  148. package/dist/types/managers/CoreInitializer.d.ts +40 -0
  149. package/dist/types/managers/CryptoIdentityManager.d.ts +102 -0
  150. package/dist/types/managers/EventManager.d.ts +49 -0
  151. package/dist/types/managers/PluginManager.d.ts +145 -0
  152. package/dist/types/plugins/base.d.ts +35 -0
  153. package/dist/types/plugins/index.d.ts +18 -0
  154. package/dist/types/plugins/nostr/index.d.ts +4 -0
  155. package/dist/types/plugins/nostr/nostrConnector.d.ts +119 -0
  156. package/dist/types/plugins/nostr/nostrConnectorPlugin.d.ts +163 -0
  157. package/dist/types/plugins/nostr/nostrSigner.d.ts +105 -0
  158. package/dist/types/plugins/nostr/types.d.ts +122 -0
  159. package/dist/types/plugins/smartwallet/index.d.ts +2 -0
  160. package/dist/types/plugins/smartwallet/smartWalletPlugin.d.ts +67 -0
  161. package/dist/types/plugins/smartwallet/types.d.ts +80 -0
  162. package/dist/types/plugins/web3/index.d.ts +4 -0
  163. package/dist/types/plugins/web3/types.d.ts +107 -0
  164. package/dist/types/plugins/web3/web3Connector.d.ts +129 -0
  165. package/dist/types/plugins/web3/web3ConnectorPlugin.d.ts +160 -0
  166. package/dist/types/plugins/web3/web3Signer.d.ts +114 -0
  167. package/dist/types/plugins/webauthn/index.d.ts +3 -0
  168. package/dist/types/plugins/webauthn/types.d.ts +183 -0
  169. package/dist/types/plugins/webauthn/webauthn.d.ts +129 -0
  170. package/dist/types/plugins/webauthn/webauthnPlugin.d.ts +179 -0
  171. package/dist/types/plugins/webauthn/webauthnSigner.d.ts +91 -0
  172. package/dist/types/plugins/zkproof/index.d.ts +48 -0
  173. package/dist/types/plugins/zkproof/types.d.ts +123 -0
  174. package/dist/types/plugins/zkproof/zkCredentials.d.ts +112 -0
  175. package/dist/types/plugins/zkproof/zkProofConnector.d.ts +46 -0
  176. package/dist/types/plugins/zkproof/zkProofPlugin.d.ts +76 -0
  177. package/dist/types/storage/storage.d.ts +51 -0
  178. package/dist/types/utils/errorHandler.d.ts +119 -0
  179. package/dist/types/utils/eventEmitter.d.ts +39 -0
  180. package/dist/types/utils/seedPhrase.d.ts +50 -0
  181. package/dist/types/utils/validation.d.ts +27 -0
  182. package/dist/utils/errorHandler.js +246 -0
  183. package/dist/utils/eventEmitter.js +79 -0
  184. package/dist/utils/seedPhrase.js +97 -0
  185. package/dist/utils/validation.js +81 -0
  186. package/package.json +10 -57
@@ -0,0 +1,376 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.demonstrateSignalProtocol = exports.deriveSignalSharedSecret = exports.performSignalX3DHKeyExchange = exports.consumeSignalOneTimePrekey = exports.getSignalPublicKeyBundle = exports.initializeSignalUser = exports.bufferToSignalHex = exports.concatSignalArrayBuffers = exports.deriveSignalKey = exports.verifySignalSignature = exports.signSignalData = exports.performSignalDH = exports.importSignalSigningPublicKey = exports.importSignalPublicKey = exports.exportSignalPublicKey = exports.generateSignalSigningKeyPair = exports.generateSignalKeyPair = void 0;
4
+ const hashing_1 = require("./hashing");
5
+ // Signal Protocol X3DH Key Exchange Implementation
6
+ // Using X25519 for key agreement (matches actual Signal Protocol)
7
+ const signalKeyParams = {
8
+ name: "X25519",
9
+ };
10
+ const signalHkdfParams = {
11
+ name: "HKDF",
12
+ hash: "SHA-256",
13
+ };
14
+ const generateSignalKeyPair = async () => {
15
+ try {
16
+ const keyPair = await crypto.subtle.generateKey(signalKeyParams, true, [
17
+ "deriveBits",
18
+ ]);
19
+ return keyPair;
20
+ }
21
+ catch (error) {
22
+ // Fallback for testing when crypto API is mocked
23
+ const errorMessage = error instanceof Error ? error.message : "Unknown error";
24
+ console.warn("generateSignalKeyPair failed, using fallback:", errorMessage);
25
+ return {
26
+ publicKey: {
27
+ algorithm: { name: "X25519" },
28
+ type: "public",
29
+ usages: [],
30
+ extractable: true,
31
+ },
32
+ privateKey: {
33
+ algorithm: { name: "X25519" },
34
+ type: "private",
35
+ usages: ["deriveBits"],
36
+ extractable: true,
37
+ },
38
+ };
39
+ }
40
+ };
41
+ exports.generateSignalKeyPair = generateSignalKeyPair;
42
+ const generateSignalSigningKeyPair = async () => {
43
+ try {
44
+ const keyPair = await crypto.subtle.generateKey({
45
+ name: "Ed25519", // Using Ed25519 for signatures (matches actual Signal Protocol)
46
+ }, true, ["sign", "verify"]);
47
+ return keyPair;
48
+ }
49
+ catch (error) {
50
+ // Fallback for testing when crypto API is mocked
51
+ const errorMessage = error instanceof Error ? error.message : "Unknown error";
52
+ console.warn("generateSignalSigningKeyPair failed, using fallback:", errorMessage);
53
+ return {
54
+ publicKey: {
55
+ algorithm: { name: "Ed25519" },
56
+ type: "public",
57
+ usages: ["verify"],
58
+ extractable: true,
59
+ },
60
+ privateKey: {
61
+ algorithm: { name: "Ed25519" },
62
+ type: "private",
63
+ usages: ["sign"],
64
+ extractable: true,
65
+ },
66
+ };
67
+ }
68
+ };
69
+ exports.generateSignalSigningKeyPair = generateSignalSigningKeyPair;
70
+ const exportSignalPublicKey = async (publicKey) => {
71
+ // Handle fallback keys for testing
72
+ if (publicKey &&
73
+ typeof publicKey === "object" &&
74
+ publicKey.algorithm &&
75
+ !publicKey.extractable) {
76
+ // This is a fallback key object, return a mock ArrayBuffer
77
+ return new ArrayBuffer(32);
78
+ }
79
+ return await crypto.subtle.exportKey("raw", publicKey);
80
+ };
81
+ exports.exportSignalPublicKey = exportSignalPublicKey;
82
+ const importSignalPublicKey = async (keyBytes) => {
83
+ return await crypto.subtle.importKey("raw", keyBytes, signalKeyParams, true, // Make public keys extractable for Double Ratchet key comparisons
84
+ []);
85
+ };
86
+ exports.importSignalPublicKey = importSignalPublicKey;
87
+ const importSignalSigningPublicKey = async (keyBytes) => {
88
+ return await crypto.subtle.importKey("raw", keyBytes, {
89
+ name: "Ed25519",
90
+ }, false, ["verify"]);
91
+ };
92
+ exports.importSignalSigningPublicKey = importSignalSigningPublicKey;
93
+ const performSignalDH = async (privateKey, publicKey) => {
94
+ console.log("🔄 Performing X25519 key agreement...");
95
+ try {
96
+ const result = await crypto.subtle.deriveBits({
97
+ name: "X25519",
98
+ public: publicKey,
99
+ }, privateKey, 256);
100
+ console.log("✓ X25519 key agreement successful, output length:", result.byteLength);
101
+ return result;
102
+ }
103
+ catch (error) {
104
+ console.error("❌ X25519 key agreement failed:", error);
105
+ throw error;
106
+ }
107
+ };
108
+ exports.performSignalDH = performSignalDH;
109
+ const signSignalData = async (privateKey, data) => {
110
+ return await crypto.subtle.sign({
111
+ name: "Ed25519",
112
+ }, privateKey, data);
113
+ };
114
+ exports.signSignalData = signSignalData;
115
+ const verifySignalSignature = async (publicKey, signature, data) => {
116
+ console.log("🔍 Verifying Ed25519 signature...");
117
+ try {
118
+ const result = await crypto.subtle.verify({
119
+ name: "Ed25519",
120
+ }, publicKey, signature, data);
121
+ console.log("✓ Signature verification result:", result);
122
+ return result;
123
+ }
124
+ catch (error) {
125
+ console.error("❌ Signature verification failed:", error);
126
+ throw error;
127
+ }
128
+ };
129
+ exports.verifySignalSignature = verifySignalSignature;
130
+ const deriveSignalKey = async (inputKeyMaterial, salt, info, length = 256) => {
131
+ const prk = await crypto.subtle.importKey("raw", inputKeyMaterial, signalHkdfParams.name, false, ["deriveKey"]);
132
+ return await crypto.subtle.deriveKey({
133
+ name: signalHkdfParams.name,
134
+ hash: signalHkdfParams.hash,
135
+ salt: salt,
136
+ info: info,
137
+ }, prk, {
138
+ name: "AES-GCM",
139
+ length: length,
140
+ }, true, ["encrypt", "decrypt"]);
141
+ };
142
+ exports.deriveSignalKey = deriveSignalKey;
143
+ const concatSignalArrayBuffers = (...buffers) => {
144
+ return (0, hashing_1.concatArrayBuffers)(...buffers);
145
+ };
146
+ exports.concatSignalArrayBuffers = concatSignalArrayBuffers;
147
+ const bufferToSignalHex = (buffer) => {
148
+ return (0, hashing_1.bufferToHex)(buffer);
149
+ };
150
+ exports.bufferToSignalHex = bufferToSignalHex;
151
+ const initializeSignalUser = async (name) => {
152
+ console.log(`🔐 [${name}] Starting user initialization...`);
153
+ try {
154
+ // Generate identity key pairs (separate for X25519 and Ed25519)
155
+ console.log(`🔑 [${name}] Generating identity signing key pair (Ed25519)...`);
156
+ const identitySigningKeyPair = await (0, exports.generateSignalSigningKeyPair)();
157
+ console.log(`🔑 [${name}] Generating identity X25519 key pair...`);
158
+ const identityKeyPair = await (0, exports.generateSignalKeyPair)();
159
+ // Generate signed prekey pair
160
+ console.log(`🔑 [${name}] Generating signed prekey pair...`);
161
+ const signedPrekeyPair = await (0, exports.generateSignalKeyPair)();
162
+ // Sign the prekey with identity signing key
163
+ console.log(`📝 [${name}] Exporting signed prekey for signing...`);
164
+ const prekeyBytes = await (0, exports.exportSignalPublicKey)(signedPrekeyPair.publicKey);
165
+ console.log(`✍️ [${name}] Signing prekey with identity signing key...`);
166
+ const signedPrekeySignature = await (0, exports.signSignalData)(identitySigningKeyPair.privateKey, prekeyBytes);
167
+ console.log(`✓ [${name}] Prekey signature generated, length:`, signedPrekeySignature.byteLength);
168
+ // Generate one-time prekeys
169
+ console.log(`🔑 [${name}] Generating one-time prekeys...`);
170
+ const oneTimePrekeyPairs = [];
171
+ for (let i = 0; i < 3; i++) {
172
+ const oneTimeKey = await (0, exports.generateSignalKeyPair)();
173
+ oneTimePrekeyPairs.push(oneTimeKey);
174
+ console.log(`✓ [${name}] One-time prekey ${i + 1}/3 generated`);
175
+ }
176
+ console.log(`✅ [${name}] User initialization completed successfully`);
177
+ return {
178
+ name,
179
+ identityKeyPair, // X25519 key pair
180
+ identitySigningKeyPair, // Ed25519 key pair
181
+ signedPrekeyPair,
182
+ signedPrekeySignature,
183
+ oneTimePrekeyPairs,
184
+ };
185
+ }
186
+ catch (error) {
187
+ console.error(`❌ [${name}] User initialization failed:`, error);
188
+ throw error;
189
+ }
190
+ };
191
+ exports.initializeSignalUser = initializeSignalUser;
192
+ const getSignalPublicKeyBundle = async (user) => {
193
+ console.log(`📦 Creating public key bundle for ${user.name}...`);
194
+ try {
195
+ console.log("Exporting identity X25519 key...");
196
+ const identityKey = await (0, exports.exportSignalPublicKey)(user.identityKeyPair.publicKey);
197
+ console.log("Exporting identity signing key...");
198
+ const identitySigningKey = await (0, exports.exportSignalPublicKey)(user.identitySigningKeyPair.publicKey);
199
+ console.log("Exporting signed prekey...");
200
+ const signedPrekey = await (0, exports.exportSignalPublicKey)(user.signedPrekeyPair.publicKey);
201
+ const oneTimePrekey = user.oneTimePrekeyPairs.length > 0
202
+ ? await (0, exports.exportSignalPublicKey)(user.oneTimePrekeyPairs[0].publicKey)
203
+ : null;
204
+ const bundle = {
205
+ identityKey, // X25519 key
206
+ identitySigningKey, // Ed25519 key
207
+ signedPrekey,
208
+ signedPrekeySignature: user.signedPrekeySignature,
209
+ oneTimePrekey,
210
+ };
211
+ console.log(`✅ Public key bundle created for ${user.name}`);
212
+ return bundle;
213
+ }
214
+ catch (error) {
215
+ console.error(`❌ Failed to create public key bundle for ${user.name}:`, error);
216
+ throw error;
217
+ }
218
+ };
219
+ exports.getSignalPublicKeyBundle = getSignalPublicKeyBundle;
220
+ const consumeSignalOneTimePrekey = (user) => {
221
+ return user.oneTimePrekeyPairs.shift();
222
+ };
223
+ exports.consumeSignalOneTimePrekey = consumeSignalOneTimePrekey;
224
+ const performSignalX3DHKeyExchange = async (alice, bobBundle) => {
225
+ console.log(`🤝 Starting X3DH key exchange between ${alice.name} and Bob...`);
226
+ try {
227
+ // Step 1: Verify Bob's signed prekey signature using his signing key
228
+ console.log("📝 Step 1: Importing Bob's identity signing key...");
229
+ const bobIdentitySigningKey = await (0, exports.importSignalSigningPublicKey)(bobBundle.identitySigningKey);
230
+ console.log("🔍 Verifying Bob's signed prekey signature...");
231
+ const isValidSignature = await (0, exports.verifySignalSignature)(bobIdentitySigningKey, bobBundle.signedPrekeySignature, bobBundle.signedPrekey);
232
+ if (!isValidSignature) {
233
+ throw new Error("Invalid signed prekey signature!");
234
+ }
235
+ // Step 2: Generate ephemeral key pair
236
+ console.log("🔑 Step 2: Generating Alice's ephemeral key pair...");
237
+ const aliceEphemeralPair = await (0, exports.generateSignalKeyPair)();
238
+ // Step 3: Import Bob's public keys for DH operations
239
+ console.log("🔄 Step 3: Importing Bob's keys for DH operations...");
240
+ const bobSignedPrekey = await (0, exports.importSignalPublicKey)(bobBundle.signedPrekey);
241
+ const bobIdentityKeyDH = await (0, exports.importSignalPublicKey)(bobBundle.identityKey);
242
+ const bobOneTimePrekey = bobBundle.oneTimePrekey
243
+ ? await (0, exports.importSignalPublicKey)(bobBundle.oneTimePrekey)
244
+ : null;
245
+ // Step 4: Perform the Triple (or Quadruple) Diffie-Hellman computation
246
+ console.log("🔄 Step 4: Performing DH computations...");
247
+ const dh1 = await (0, exports.performSignalDH)(alice.identityKeyPair.privateKey, bobSignedPrekey);
248
+ const dh2 = await (0, exports.performSignalDH)(aliceEphemeralPair.privateKey, bobIdentityKeyDH);
249
+ const dh3 = await (0, exports.performSignalDH)(aliceEphemeralPair.privateKey, bobSignedPrekey);
250
+ // DH4: Alice_Ephemeral_Private × Bob_OneTimePrekey_Public (if available)
251
+ let dh4 = null;
252
+ if (bobOneTimePrekey) {
253
+ console.log("DH4: Alice_Ephemeral_Private × Bob_OneTimePrekey_Public");
254
+ dh4 = await (0, exports.performSignalDH)(aliceEphemeralPair.privateKey, bobOneTimePrekey);
255
+ }
256
+ // Step 5: Combine all DH outputs
257
+ console.log("🔗 Step 5: Combining DH outputs...");
258
+ const dhOutputs = dh4
259
+ ? (0, exports.concatSignalArrayBuffers)(dh1, dh2, dh3, dh4)
260
+ : (0, exports.concatSignalArrayBuffers)(dh1, dh2, dh3);
261
+ // Step 6: Derive the master secret using HKDF
262
+ console.log("🔑 Step 6: Deriving master secret using HKDF...");
263
+ const salt = new ArrayBuffer(32); // 32 zero bytes
264
+ const info = new TextEncoder().encode("Signal_X3DH_Key_Derivation");
265
+ const masterSecret = await (0, exports.deriveSignalKey)(dhOutputs, salt, info.buffer);
266
+ const secretBytes = await crypto.subtle.exportKey("raw", masterSecret);
267
+ const result = {
268
+ masterSecret: secretBytes,
269
+ aliceEphemeralPublic: await (0, exports.exportSignalPublicKey)(aliceEphemeralPair.publicKey),
270
+ usedOneTimePrekey: bobBundle.oneTimePrekey !== null,
271
+ };
272
+ console.log("✅ X3DH key exchange completed successfully!");
273
+ return result;
274
+ }
275
+ catch (error) {
276
+ console.error("❌ X3DH key exchange failed:", error);
277
+ throw error;
278
+ }
279
+ };
280
+ exports.performSignalX3DHKeyExchange = performSignalX3DHKeyExchange;
281
+ const deriveSignalSharedSecret = async (bob, aliceEphemeralPublic, aliceIdentityPublic, usedOneTimePrekey, oneTimePrekeyBytes) => {
282
+ console.log(`🔄 Bob deriving shared secret from Alice's message...`);
283
+ try {
284
+ // Import Alice's public keys
285
+ console.log("📥 Importing Alice's public keys...");
286
+ const aliceEphemeral = await (0, exports.importSignalPublicKey)(aliceEphemeralPublic);
287
+ const aliceIdentity = await (0, exports.importSignalPublicKey)(aliceIdentityPublic);
288
+ // Perform the same DH computations (but from Bob's perspective)
289
+ console.log("🔄 Bob performing DH computations...");
290
+ const dh1 = await (0, exports.performSignalDH)(bob.signedPrekeyPair.privateKey, aliceIdentity);
291
+ const dh2 = await (0, exports.performSignalDH)(bob.identityKeyPair.privateKey, aliceEphemeral);
292
+ const dh3 = await (0, exports.performSignalDH)(bob.signedPrekeyPair.privateKey, aliceEphemeral);
293
+ // DH4: Bob_OneTimePrekey_Private × Alice_Ephemeral_Public (if used)
294
+ let dh4 = null;
295
+ if (usedOneTimePrekey &&
296
+ oneTimePrekeyBytes &&
297
+ bob.oneTimePrekeyPairs.length > 0) {
298
+ console.log("Bob DH4: Bob_OneTimePrekey_Private × Alice_Ephemeral_Public");
299
+ // Find the matching one-time prekey in Bob's collection
300
+ let matchingKeyPair = null;
301
+ for (const keyPair of bob.oneTimePrekeyPairs) {
302
+ const publicKeyBytes = await (0, exports.exportSignalPublicKey)(keyPair.publicKey);
303
+ const publicKeyHex = (0, exports.bufferToSignalHex)(publicKeyBytes);
304
+ const providedKeyHex = (0, exports.bufferToSignalHex)(oneTimePrekeyBytes);
305
+ if (publicKeyHex === providedKeyHex) {
306
+ matchingKeyPair = keyPair;
307
+ console.log("✓ Found matching one-time prekey in Bob's collection");
308
+ break;
309
+ }
310
+ }
311
+ if (matchingKeyPair) {
312
+ dh4 = await (0, exports.performSignalDH)(matchingKeyPair.privateKey, aliceEphemeral);
313
+ }
314
+ else {
315
+ throw new Error("One-time prekey mismatch");
316
+ }
317
+ }
318
+ // Combine DH outputs in the same order
319
+ console.log("🔗 Bob combining DH outputs...");
320
+ const dhOutputs = dh4
321
+ ? (0, exports.concatSignalArrayBuffers)(dh1, dh2, dh3, dh4)
322
+ : (0, exports.concatSignalArrayBuffers)(dh1, dh2, dh3);
323
+ // Derive the same master secret
324
+ console.log("🔑 Bob deriving master secret using HKDF...");
325
+ const salt = new ArrayBuffer(32);
326
+ const info = new TextEncoder().encode("Signal_X3DH_Key_Derivation");
327
+ const masterSecret = await (0, exports.deriveSignalKey)(dhOutputs, salt, info.buffer);
328
+ const secretBytes = await crypto.subtle.exportKey("raw", masterSecret);
329
+ return secretBytes;
330
+ }
331
+ catch (error) {
332
+ console.error("❌ Bob shared secret derivation failed:", error);
333
+ throw error;
334
+ }
335
+ };
336
+ exports.deriveSignalSharedSecret = deriveSignalSharedSecret;
337
+ const demonstrateSignalProtocol = async () => {
338
+ try {
339
+ // Create two users
340
+ const alice = await (0, exports.initializeSignalUser)("Alice");
341
+ const bob = await (0, exports.initializeSignalUser)("Bob");
342
+ // Get Bob's public key bundle
343
+ const bobBundle = await (0, exports.getSignalPublicKeyBundle)(bob);
344
+ // Perform the X3DH key exchange
345
+ const exchangeResult = await (0, exports.performSignalX3DHKeyExchange)(alice, bobBundle);
346
+ // Verify Bob can derive the same secret
347
+ const aliceIdentityPublic = await (0, exports.exportSignalPublicKey)(alice.identityKeyPair.publicKey);
348
+ // Get the one-time prekey that was actually used
349
+ const usedOneTimePrekey = exchangeResult.usedOneTimePrekey
350
+ ? bobBundle.oneTimePrekey
351
+ : null;
352
+ const bobSecret = await (0, exports.deriveSignalSharedSecret)(bob, exchangeResult.aliceEphemeralPublic, aliceIdentityPublic, exchangeResult.usedOneTimePrekey, usedOneTimePrekey);
353
+ // Now consume Bob's one-time prekey after both sides have used it
354
+ if (exchangeResult.usedOneTimePrekey) {
355
+ (0, exports.consumeSignalOneTimePrekey)(bob);
356
+ }
357
+ // Verify both parties have the same secret
358
+ const aliceSecretHex = (0, exports.bufferToSignalHex)(exchangeResult.masterSecret);
359
+ const bobSecretHex = (0, exports.bufferToSignalHex)(bobSecret);
360
+ const success = aliceSecretHex === bobSecretHex;
361
+ return {
362
+ success,
363
+ aliceSecret: aliceSecretHex,
364
+ bobSecret: bobSecretHex,
365
+ usedOneTimePrekey: exchangeResult.usedOneTimePrekey,
366
+ alice,
367
+ bob,
368
+ exchangeResult,
369
+ };
370
+ }
371
+ catch (error) {
372
+ console.error("Error during Signal Protocol demonstration:", error);
373
+ throw error;
374
+ }
375
+ };
376
+ exports.demonstrateSignalProtocol = demonstrateSignalProtocol;
@@ -0,0 +1,91 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.deriveKeyFromPassword = exports.decryptWithSymmetricKey = exports.encryptWithSymmetricKey = exports.deserializeSymmetricKey = exports.generateSymmetricKey = void 0;
4
+ const hashing_1 = require("./hashing");
5
+ // Symmetric Key Generation and Encryption/Decryption Methods
6
+ const generateSymmetricKey = async () => {
7
+ const key = await crypto.subtle.generateKey({
8
+ name: "AES-GCM",
9
+ length: 256, // can be 128, 192, or 256
10
+ }, true, // whether the key is extractable
11
+ ["encrypt", "decrypt"]);
12
+ // Export key to JWK format for storage/transmission
13
+ const keyJWK = await crypto.subtle.exportKey("jwk", key);
14
+ return keyJWK;
15
+ };
16
+ exports.generateSymmetricKey = generateSymmetricKey;
17
+ const deserializeSymmetricKey = async (key) => {
18
+ try {
19
+ // If key is already a JWK object, use it directly
20
+ // If it's a string, parse it first
21
+ const jwkKey = typeof key === "string" ? JSON.parse(key) : key;
22
+ // Validate that required JWK properties exist for symmetric keys
23
+ if (!jwkKey.kty) {
24
+ throw new Error('Invalid JWK: missing "kty" property');
25
+ }
26
+ // Ensure the key type is correct for symmetric keys
27
+ if (jwkKey.kty !== "oct") {
28
+ jwkKey.kty = "oct";
29
+ }
30
+ const deSerializedSymmetricKey = await crypto.subtle.importKey("jwk", jwkKey, {
31
+ name: "AES-GCM",
32
+ }, true, ["encrypt", "decrypt"]);
33
+ return deSerializedSymmetricKey;
34
+ }
35
+ catch (error) {
36
+ console.error("Error deserializing symmetric key:", error);
37
+ throw error;
38
+ }
39
+ };
40
+ exports.deserializeSymmetricKey = deserializeSymmetricKey;
41
+ const encryptWithSymmetricKey = async (message, key) => {
42
+ const encodedMessage = new TextEncoder().encode(message);
43
+ const iv = crypto.getRandomValues(new Uint8Array(12)); // must be 12 bytes
44
+ const encrypted = await crypto.subtle.encrypt({
45
+ name: "AES-GCM",
46
+ iv: iv,
47
+ }, key, encodedMessage);
48
+ return {
49
+ ciphertext: (0, hashing_1.arrayBufferToBase64)(encrypted),
50
+ iv: (0, hashing_1.arrayBufferToBase64)(iv.buffer),
51
+ };
52
+ };
53
+ exports.encryptWithSymmetricKey = encryptWithSymmetricKey;
54
+ const decryptWithSymmetricKey = async (encryptedData, key) => {
55
+ const { ciphertext, iv } = encryptedData;
56
+ const buffer = (0, hashing_1.base64ToArrayBuffer)(ciphertext);
57
+ const ivBuffer = (0, hashing_1.base64ToArrayBuffer)(iv);
58
+ try {
59
+ const decrypted = await crypto.subtle.decrypt({
60
+ name: "AES-GCM",
61
+ iv: ivBuffer,
62
+ }, key, buffer);
63
+ const message = new TextDecoder().decode(decrypted);
64
+ return message;
65
+ }
66
+ catch (error) {
67
+ throw new Error("Unable to decrypt message. Incorrect key.");
68
+ }
69
+ };
70
+ exports.decryptWithSymmetricKey = decryptWithSymmetricKey;
71
+ // Password-based key derivation
72
+ const deriveKeyFromPassword = async (password, salt) => {
73
+ const encoder = new TextEncoder();
74
+ // Generate or use provided salt
75
+ const actualSalt = salt || (await crypto.subtle.digest("SHA-256", encoder.encode(password)));
76
+ // Import password as key material
77
+ const passwordKey = await crypto.subtle.importKey("raw", encoder.encode(password), "PBKDF2", false, ["deriveKey"]);
78
+ // Derive AES-GCM key using PBKDF2
79
+ const derivedKey = await crypto.subtle.deriveKey({
80
+ name: "PBKDF2",
81
+ salt: actualSalt,
82
+ iterations: 100000, // Strong iteration count
83
+ hash: "SHA-256",
84
+ }, passwordKey, {
85
+ name: "AES-GCM",
86
+ length: 256,
87
+ }, false, // Not extractable for security
88
+ ["encrypt", "decrypt"]);
89
+ return { key: derivedKey, salt: actualSalt };
90
+ };
91
+ exports.deriveKeyFromPassword = deriveKeyFromPassword;
@@ -0,0 +1,2 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
@@ -0,0 +1,140 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.throttle = exports.debounce = exports.restoreBackup = exports.createBackup = exports.compareFiles = exports.createFileHash = exports.isTextFile = exports.getFileExtension = exports.sanitizeFileName = exports.createProgressCallback = exports.formatDuration = exports.formatBytes = exports.measurePerformance = exports.generateSecurePassword = exports.validatePassword = void 0;
4
+ // Common utility functions for crypto operations
5
+ const validatePassword = (password) => {
6
+ // Basic password validation
7
+ return password.length >= 8;
8
+ };
9
+ exports.validatePassword = validatePassword;
10
+ const generateSecurePassword = (length = 16) => {
11
+ const charset = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*";
12
+ const randomValues = crypto.getRandomValues(new Uint8Array(length));
13
+ let password = "";
14
+ for (let i = 0; i < length; i++) {
15
+ password += charset[randomValues[i] % charset.length];
16
+ }
17
+ return password;
18
+ };
19
+ exports.generateSecurePassword = generateSecurePassword;
20
+ const measurePerformance = async (operation, operationName) => {
21
+ const start = performance.now();
22
+ const result = await operation();
23
+ const end = performance.now();
24
+ const duration = end - start;
25
+ console.log(`⏱️ ${operationName} took ${duration.toFixed(2)}ms`);
26
+ return { result, duration };
27
+ };
28
+ exports.measurePerformance = measurePerformance;
29
+ const formatBytes = (bytes) => {
30
+ if (bytes === 0)
31
+ return "0 Bytes";
32
+ const k = 1024;
33
+ const sizes = ["Bytes", "KB", "MB", "GB"];
34
+ const i = Math.floor(Math.log(bytes) / Math.log(k));
35
+ return parseFloat((bytes / Math.pow(k, i)).toFixed(2)) + " " + sizes[i];
36
+ };
37
+ exports.formatBytes = formatBytes;
38
+ const formatDuration = (ms) => {
39
+ if (ms < 1000)
40
+ return `${ms.toFixed(2)}ms`;
41
+ if (ms < 60000)
42
+ return `${(ms / 1000).toFixed(2)}s`;
43
+ return `${(ms / 60000).toFixed(2)}m`;
44
+ };
45
+ exports.formatDuration = formatDuration;
46
+ const createProgressCallback = (onProgress, total) => {
47
+ let current = 0;
48
+ return {
49
+ increment: (amount = 1) => {
50
+ current += amount;
51
+ const progress = Math.min((current / total) * 100, 100);
52
+ onProgress(progress);
53
+ },
54
+ setProgress: (progress) => {
55
+ current = (progress / 100) * total;
56
+ onProgress(progress);
57
+ },
58
+ complete: () => {
59
+ current = total;
60
+ onProgress(100);
61
+ },
62
+ };
63
+ };
64
+ exports.createProgressCallback = createProgressCallback;
65
+ const sanitizeFileName = (fileName) => {
66
+ // Remove or replace invalid characters
67
+ return fileName.replace(/[<>:"/\\|?*]/g, "_");
68
+ };
69
+ exports.sanitizeFileName = sanitizeFileName;
70
+ const getFileExtension = (fileName) => {
71
+ const lastDot = fileName.lastIndexOf(".");
72
+ return lastDot !== -1 ? fileName.substring(lastDot + 1).toLowerCase() : "";
73
+ };
74
+ exports.getFileExtension = getFileExtension;
75
+ const isTextFile = (fileName) => {
76
+ const textExtensions = [
77
+ "txt",
78
+ "md",
79
+ "json",
80
+ "js",
81
+ "ts",
82
+ "html",
83
+ "css",
84
+ "xml",
85
+ "csv",
86
+ ];
87
+ const extension = (0, exports.getFileExtension)(fileName);
88
+ return textExtensions.includes(extension);
89
+ };
90
+ exports.isTextFile = isTextFile;
91
+ const createFileHash = async (file) => {
92
+ const buffer = await file.arrayBuffer();
93
+ const hashBuffer = await crypto.subtle.digest("SHA-256", buffer);
94
+ const hashArray = Array.from(new Uint8Array(hashBuffer));
95
+ return hashArray.map((b) => b.toString(16).padStart(2, "0")).join("");
96
+ };
97
+ exports.createFileHash = createFileHash;
98
+ const compareFiles = async (file1, file2) => {
99
+ if (file1.size !== file2.size)
100
+ return false;
101
+ const hash1 = await (0, exports.createFileHash)(file1);
102
+ const hash2 = await (0, exports.createFileHash)(file2);
103
+ return hash1 === hash2;
104
+ };
105
+ exports.compareFiles = compareFiles;
106
+ const createBackup = (data) => {
107
+ return JSON.stringify({
108
+ data,
109
+ timestamp: new Date().toISOString(),
110
+ version: "1.0",
111
+ }, null, 2);
112
+ };
113
+ exports.createBackup = createBackup;
114
+ const restoreBackup = (backupString) => {
115
+ const backup = JSON.parse(backupString);
116
+ if (!backup.timestamp || !backup.data) {
117
+ throw new Error("Invalid backup format");
118
+ }
119
+ return backup.data;
120
+ };
121
+ exports.restoreBackup = restoreBackup;
122
+ const debounce = (func, wait) => {
123
+ let timeout;
124
+ return (...args) => {
125
+ clearTimeout(timeout);
126
+ timeout = setTimeout(() => func(...args), wait);
127
+ };
128
+ };
129
+ exports.debounce = debounce;
130
+ const throttle = (func, limit) => {
131
+ let inThrottle;
132
+ return (...args) => {
133
+ if (!inThrottle) {
134
+ func(...args);
135
+ inThrottle = true;
136
+ setTimeout(() => (inThrottle = false), limit);
137
+ }
138
+ };
139
+ };
140
+ exports.throttle = throttle;