ts-mls 1.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +196 -0
- package/dist/src/IncomingMessageAction.d.ts +10 -0
- package/dist/src/IncomingMessageAction.js +2 -0
- package/dist/src/IncomingMessageAction.js.map +1 -0
- package/dist/src/authenticatedContent.d.ts +32 -0
- package/dist/src/authenticatedContent.js +26 -0
- package/dist/src/authenticatedContent.js.map +1 -0
- package/dist/src/authenticationService.d.ts +7 -0
- package/dist/src/authenticationService.js +6 -0
- package/dist/src/authenticationService.js.map +1 -0
- package/dist/src/capabilities.d.ts +14 -0
- package/dist/src/capabilities.js +28 -0
- package/dist/src/capabilities.js.map +1 -0
- package/dist/src/clientConfig.d.ts +21 -0
- package/dist/src/clientConfig.js +13 -0
- package/dist/src/clientConfig.js.map +1 -0
- package/dist/src/clientState.d.ts +122 -0
- package/dist/src/clientState.js +547 -0
- package/dist/src/clientState.js.map +1 -0
- package/dist/src/codec/number.d.ts +10 -0
- package/dist/src/codec/number.js +56 -0
- package/dist/src/codec/number.js.map +1 -0
- package/dist/src/codec/optional.d.ts +4 -0
- package/dist/src/codec/optional.js +20 -0
- package/dist/src/codec/optional.js.map +1 -0
- package/dist/src/codec/tlsDecoder.d.ts +14 -0
- package/dist/src/codec/tlsDecoder.js +78 -0
- package/dist/src/codec/tlsDecoder.js.map +1 -0
- package/dist/src/codec/tlsEncoder.d.ts +9 -0
- package/dist/src/codec/tlsEncoder.js +23 -0
- package/dist/src/codec/tlsEncoder.js.map +1 -0
- package/dist/src/codec/variableLength.d.ts +11 -0
- package/dist/src/codec/variableLength.js +95 -0
- package/dist/src/codec/variableLength.js.map +1 -0
- package/dist/src/commit.d.ts +10 -0
- package/dist/src/commit.js +9 -0
- package/dist/src/commit.js.map +1 -0
- package/dist/src/contentType.d.ts +12 -0
- package/dist/src/contentType.js +12 -0
- package/dist/src/contentType.js.map +1 -0
- package/dist/src/createCommit.d.ts +32 -0
- package/dist/src/createCommit.js +250 -0
- package/dist/src/createCommit.js.map +1 -0
- package/dist/src/createMessage.d.ts +24 -0
- package/dist/src/createMessage.js +32 -0
- package/dist/src/createMessage.js.map +1 -0
- package/dist/src/credential.d.ts +21 -0
- package/dist/src/credential.js +31 -0
- package/dist/src/credential.js.map +1 -0
- package/dist/src/credentialType.d.ts +11 -0
- package/dist/src/credentialType.js +11 -0
- package/dist/src/credentialType.js.map +1 -0
- package/dist/src/crypto/aead.d.ts +8 -0
- package/dist/src/crypto/aead.js +69 -0
- package/dist/src/crypto/aead.js.map +1 -0
- package/dist/src/crypto/ciphersuite.d.ts +51 -0
- package/dist/src/crypto/ciphersuite.js +245 -0
- package/dist/src/crypto/ciphersuite.js.map +1 -0
- package/dist/src/crypto/hash.d.ts +8 -0
- package/dist/src/crypto/hash.js +32 -0
- package/dist/src/crypto/hash.js.map +1 -0
- package/dist/src/crypto/hpke.d.ts +51 -0
- package/dist/src/crypto/hpke.js +109 -0
- package/dist/src/crypto/hpke.js.map +1 -0
- package/dist/src/crypto/kdf.d.ts +12 -0
- package/dist/src/crypto/kdf.js +42 -0
- package/dist/src/crypto/kdf.js.map +1 -0
- package/dist/src/crypto/kem.d.ts +3 -0
- package/dist/src/crypto/kem.js +49 -0
- package/dist/src/crypto/kem.js.map +1 -0
- package/dist/src/crypto/rng.d.ts +4 -0
- package/dist/src/crypto/rng.js +6 -0
- package/dist/src/crypto/rng.js.map +1 -0
- package/dist/src/crypto/signature.d.ts +12 -0
- package/dist/src/crypto/signature.js +127 -0
- package/dist/src/crypto/signature.js.map +1 -0
- package/dist/src/customCredential.d.ts +2 -0
- package/dist/src/customCredential.js +11 -0
- package/dist/src/customCredential.js.map +1 -0
- package/dist/src/defaultCapabilities.d.ts +2 -0
- package/dist/src/defaultCapabilities.js +12 -0
- package/dist/src/defaultCapabilities.js.map +1 -0
- package/dist/src/defaultExtensionType.d.ts +13 -0
- package/dist/src/defaultExtensionType.js +14 -0
- package/dist/src/defaultExtensionType.js.map +1 -0
- package/dist/src/defaultProposalType.d.ts +15 -0
- package/dist/src/defaultProposalType.js +16 -0
- package/dist/src/defaultProposalType.js.map +1 -0
- package/dist/src/extension.d.ts +18 -0
- package/dist/src/extension.js +30 -0
- package/dist/src/extension.js.map +1 -0
- package/dist/src/externalProposal.d.ts +7 -0
- package/dist/src/externalProposal.js +40 -0
- package/dist/src/externalProposal.js.map +1 -0
- package/dist/src/externalSender.d.ts +9 -0
- package/dist/src/externalSender.js +7 -0
- package/dist/src/externalSender.js.map +1 -0
- package/dist/src/framedContent.d.ts +113 -0
- package/dist/src/framedContent.js +131 -0
- package/dist/src/framedContent.js.map +1 -0
- package/dist/src/grease.d.ts +16 -0
- package/dist/src/grease.js +29 -0
- package/dist/src/grease.js.map +1 -0
- package/dist/src/groupContext.d.ts +19 -0
- package/dist/src/groupContext.js +44 -0
- package/dist/src/groupContext.js.map +1 -0
- package/dist/src/groupInfo.d.ts +26 -0
- package/dist/src/groupInfo.js +47 -0
- package/dist/src/groupInfo.js.map +1 -0
- package/dist/src/groupSecrets.d.ts +10 -0
- package/dist/src/groupSecrets.js +8 -0
- package/dist/src/groupSecrets.js.map +1 -0
- package/dist/src/hpkeCiphertext.d.ts +8 -0
- package/dist/src/hpkeCiphertext.js +6 -0
- package/dist/src/hpkeCiphertext.js.map +1 -0
- package/dist/src/index.d.ts +32 -0
- package/dist/src/index.js +24 -0
- package/dist/src/index.js.map +1 -0
- package/dist/src/keyPackage.d.ts +38 -0
- package/dist/src/keyPackage.js +72 -0
- package/dist/src/keyPackage.js.map +1 -0
- package/dist/src/keyPackageEqualityConfig.d.ts +7 -0
- package/dist/src/keyPackageEqualityConfig.js +10 -0
- package/dist/src/keyPackageEqualityConfig.js.map +1 -0
- package/dist/src/keyRetentionConfig.d.ts +6 -0
- package/dist/src/keyRetentionConfig.js +6 -0
- package/dist/src/keyRetentionConfig.js.map +1 -0
- package/dist/src/keySchedule.d.ts +24 -0
- package/dist/src/keySchedule.js +43 -0
- package/dist/src/keySchedule.js.map +1 -0
- package/dist/src/leafNode.d.ts +78 -0
- package/dist/src/leafNode.js +87 -0
- package/dist/src/leafNode.js.map +1 -0
- package/dist/src/leafNodeSource.d.ts +12 -0
- package/dist/src/leafNodeSource.js +12 -0
- package/dist/src/leafNodeSource.js.map +1 -0
- package/dist/src/lifetime.d.ts +9 -0
- package/dist/src/lifetime.js +13 -0
- package/dist/src/lifetime.js.map +1 -0
- package/dist/src/lifetimeConfig.d.ts +5 -0
- package/dist/src/lifetimeConfig.js +5 -0
- package/dist/src/lifetimeConfig.js.map +1 -0
- package/dist/src/message.d.ts +42 -0
- package/dist/src/message.js +45 -0
- package/dist/src/message.js.map +1 -0
- package/dist/src/messageProtection.d.ts +36 -0
- package/dist/src/messageProtection.js +128 -0
- package/dist/src/messageProtection.js.map +1 -0
- package/dist/src/messageProtectionPublic.d.ts +17 -0
- package/dist/src/messageProtectionPublic.js +99 -0
- package/dist/src/messageProtectionPublic.js.map +1 -0
- package/dist/src/mlsError.d.ts +24 -0
- package/dist/src/mlsError.js +49 -0
- package/dist/src/mlsError.js.map +1 -0
- package/dist/src/nodeType.d.ts +11 -0
- package/dist/src/nodeType.js +11 -0
- package/dist/src/nodeType.js.map +1 -0
- package/dist/src/paddingConfig.d.ts +9 -0
- package/dist/src/paddingConfig.js +8 -0
- package/dist/src/paddingConfig.js.map +1 -0
- package/dist/src/parentHash.d.ts +16 -0
- package/dist/src/parentHash.js +103 -0
- package/dist/src/parentHash.js.map +1 -0
- package/dist/src/parentNode.d.ts +9 -0
- package/dist/src/parentNode.js +11 -0
- package/dist/src/parentNode.js.map +1 -0
- package/dist/src/pathSecrets.d.ts +10 -0
- package/dist/src/pathSecrets.js +31 -0
- package/dist/src/pathSecrets.js.map +1 -0
- package/dist/src/presharedkey.d.ts +51 -0
- package/dist/src/presharedkey.js +59 -0
- package/dist/src/presharedkey.js.map +1 -0
- package/dist/src/privateKeyPath.d.ts +12 -0
- package/dist/src/privateKeyPath.js +21 -0
- package/dist/src/privateKeyPath.js.map +1 -0
- package/dist/src/privateMessage.d.ts +41 -0
- package/dist/src/privateMessage.js +114 -0
- package/dist/src/privateMessage.js.map +1 -0
- package/dist/src/processMessages.d.ts +26 -0
- package/dist/src/processMessages.js +196 -0
- package/dist/src/processMessages.js.map +1 -0
- package/dist/src/proposal.d.ts +97 -0
- package/dist/src/proposal.js +91 -0
- package/dist/src/proposal.js.map +1 -0
- package/dist/src/proposalOrRefType.d.ts +25 -0
- package/dist/src/proposalOrRefType.js +31 -0
- package/dist/src/proposalOrRefType.js.map +1 -0
- package/dist/src/protocolVersion.d.ts +9 -0
- package/dist/src/protocolVersion.js +10 -0
- package/dist/src/protocolVersion.js.map +1 -0
- package/dist/src/pskIndex.d.ts +7 -0
- package/dist/src/pskIndex.js +18 -0
- package/dist/src/pskIndex.js.map +1 -0
- package/dist/src/publicMessage.d.ts +29 -0
- package/dist/src/publicMessage.js +71 -0
- package/dist/src/publicMessage.js.map +1 -0
- package/dist/src/ratchetTree.d.ts +46 -0
- package/dist/src/ratchetTree.js +254 -0
- package/dist/src/ratchetTree.js.map +1 -0
- package/dist/src/requiredCapabilities.d.ts +10 -0
- package/dist/src/requiredCapabilities.js +8 -0
- package/dist/src/requiredCapabilities.js.map +1 -0
- package/dist/src/resumption.d.ts +18 -0
- package/dist/src/resumption.js +74 -0
- package/dist/src/resumption.js.map +1 -0
- package/dist/src/secretTree.d.ts +29 -0
- package/dist/src/secretTree.js +137 -0
- package/dist/src/secretTree.js.map +1 -0
- package/dist/src/sender.d.ts +56 -0
- package/dist/src/sender.js +81 -0
- package/dist/src/sender.js.map +1 -0
- package/dist/src/transcriptHash.d.ts +14 -0
- package/dist/src/transcriptHash.js +23 -0
- package/dist/src/transcriptHash.js.map +1 -0
- package/dist/src/treeHash.d.ts +27 -0
- package/dist/src/treeHash.js +70 -0
- package/dist/src/treeHash.js.map +1 -0
- package/dist/src/treemath.d.ts +14 -0
- package/dist/src/treemath.js +87 -0
- package/dist/src/treemath.js.map +1 -0
- package/dist/src/unappliedProposals.d.ts +7 -0
- package/dist/src/unappliedProposals.js +9 -0
- package/dist/src/unappliedProposals.js.map +1 -0
- package/dist/src/updatePath.d.ts +34 -0
- package/dist/src/updatePath.js +163 -0
- package/dist/src/updatePath.js.map +1 -0
- package/dist/src/util/addToMap.d.ts +1 -0
- package/dist/src/util/addToMap.js +6 -0
- package/dist/src/util/addToMap.js.map +1 -0
- package/dist/src/util/array.d.ts +2 -0
- package/dist/src/util/array.js +9 -0
- package/dist/src/util/array.js.map +1 -0
- package/dist/src/util/byteArray.d.ts +3 -0
- package/dist/src/util/byteArray.js +27 -0
- package/dist/src/util/byteArray.js.map +1 -0
- package/dist/src/util/constantTimeCompare.d.ts +1 -0
- package/dist/src/util/constantTimeCompare.js +10 -0
- package/dist/src/util/constantTimeCompare.js.map +1 -0
- package/dist/src/util/enumHelpers.d.ts +4 -0
- package/dist/src/util/enumHelpers.js +28 -0
- package/dist/src/util/enumHelpers.js.map +1 -0
- package/dist/src/util/repeat.d.ts +1 -0
- package/dist/src/util/repeat.js +8 -0
- package/dist/src/util/repeat.js.map +1 -0
- package/dist/src/welcome.d.ts +29 -0
- package/dist/src/welcome.js +46 -0
- package/dist/src/welcome.js.map +1 -0
- package/dist/src/wireformat.d.ts +13 -0
- package/dist/src/wireformat.js +14 -0
- package/dist/src/wireformat.js.map +1 -0
- package/dist/test/base64.test.d.ts +1 -0
- package/dist/test/base64.test.js +87 -0
- package/dist/test/base64.test.js.map +1 -0
- package/dist/test/codec/authenticatedContent.test.d.ts +1 -0
- package/dist/test/codec/authenticatedContent.test.js +38 -0
- package/dist/test/codec/authenticatedContent.test.js.map +1 -0
- package/dist/test/codec/capabilities.test.d.ts +1 -0
- package/dist/test/codec/capabilities.test.js +26 -0
- package/dist/test/codec/capabilities.test.js.map +1 -0
- package/dist/test/codec/commit.test.d.ts +1 -0
- package/dist/test/codec/commit.test.js +15 -0
- package/dist/test/codec/commit.test.js.map +1 -0
- package/dist/test/codec/composite.test.d.ts +1 -0
- package/dist/test/codec/composite.test.js +61 -0
- package/dist/test/codec/composite.test.js.map +1 -0
- package/dist/test/codec/contentType.test.d.ts +1 -0
- package/dist/test/codec/contentType.test.js +12 -0
- package/dist/test/codec/contentType.test.js.map +1 -0
- package/dist/test/codec/credential.test.d.ts +1 -0
- package/dist/test/codec/credential.test.js +17 -0
- package/dist/test/codec/credential.test.js.map +1 -0
- package/dist/test/codec/credentialType.test.d.ts +1 -0
- package/dist/test/codec/credentialType.test.js +12 -0
- package/dist/test/codec/credentialType.test.js.map +1 -0
- package/dist/test/codec/encryptedGroupSecrets.test.d.ts +1 -0
- package/dist/test/codec/encryptedGroupSecrets.test.js +18 -0
- package/dist/test/codec/encryptedGroupSecrets.test.js.map +1 -0
- package/dist/test/codec/extension.test.d.ts +1 -0
- package/dist/test/codec/extension.test.js +20 -0
- package/dist/test/codec/extension.test.js.map +1 -0
- package/dist/test/codec/extensionType.test.d.ts +1 -0
- package/dist/test/codec/extensionType.test.js +12 -0
- package/dist/test/codec/extensionType.test.js.map +1 -0
- package/dist/test/codec/externalSender.test.d.ts +1 -0
- package/dist/test/codec/externalSender.test.js +20 -0
- package/dist/test/codec/externalSender.test.js.map +1 -0
- package/dist/test/codec/framedContent.test.d.ts +1 -0
- package/dist/test/codec/framedContent.test.js +26 -0
- package/dist/test/codec/framedContent.test.js.map +1 -0
- package/dist/test/codec/groupContext.test.d.ts +1 -0
- package/dist/test/codec/groupContext.test.js +30 -0
- package/dist/test/codec/groupContext.test.js.map +1 -0
- package/dist/test/codec/groupInfo.test.d.ts +1 -0
- package/dist/test/codec/groupInfo.test.js +45 -0
- package/dist/test/codec/groupInfo.test.js.map +1 -0
- package/dist/test/codec/groupSecrets.test.d.ts +1 -0
- package/dist/test/codec/groupSecrets.test.js +16 -0
- package/dist/test/codec/groupSecrets.test.js.map +1 -0
- package/dist/test/codec/hpkeCiphertext.test.d.ts +1 -0
- package/dist/test/codec/hpkeCiphertext.test.js +13 -0
- package/dist/test/codec/hpkeCiphertext.test.js.map +1 -0
- package/dist/test/codec/keyPackage.test.d.ts +1 -0
- package/dist/test/codec/keyPackage.test.js +58 -0
- package/dist/test/codec/keyPackage.test.js.map +1 -0
- package/dist/test/codec/keyPackageTBS.test.d.ts +1 -0
- package/dist/test/codec/keyPackageTBS.test.js +59 -0
- package/dist/test/codec/keyPackageTBS.test.js.map +1 -0
- package/dist/test/codec/leafNode.test.d.ts +1 -0
- package/dist/test/codec/leafNode.test.js +43 -0
- package/dist/test/codec/leafNode.test.js.map +1 -0
- package/dist/test/codec/leafNodeData.test.d.ts +1 -0
- package/dist/test/codec/leafNodeData.test.js +36 -0
- package/dist/test/codec/leafNodeData.test.js.map +1 -0
- package/dist/test/codec/leafNodeSource.test.d.ts +1 -0
- package/dist/test/codec/leafNodeSource.test.js +15 -0
- package/dist/test/codec/leafNodeSource.test.js.map +1 -0
- package/dist/test/codec/lifetime.test.d.ts +1 -0
- package/dist/test/codec/lifetime.test.js +12 -0
- package/dist/test/codec/lifetime.test.js.map +1 -0
- package/dist/test/codec/message.test.d.ts +1 -0
- package/dist/test/codec/message.test.js +100 -0
- package/dist/test/codec/message.test.js.map +1 -0
- package/dist/test/codec/nodeType.test.d.ts +1 -0
- package/dist/test/codec/nodeType.test.js +12 -0
- package/dist/test/codec/nodeType.test.js.map +1 -0
- package/dist/test/codec/number.test.d.ts +1 -0
- package/dist/test/codec/number.test.js +74 -0
- package/dist/test/codec/number.test.js.map +1 -0
- package/dist/test/codec/optional.test.d.ts +1 -0
- package/dist/test/codec/optional.test.js +42 -0
- package/dist/test/codec/optional.test.js.map +1 -0
- package/dist/test/codec/padding.test.d.ts +1 -0
- package/dist/test/codec/padding.test.js +40 -0
- package/dist/test/codec/padding.test.js.map +1 -0
- package/dist/test/codec/parentHash.test.d.ts +1 -0
- package/dist/test/codec/parentHash.test.js +13 -0
- package/dist/test/codec/parentHash.test.js.map +1 -0
- package/dist/test/codec/parentNode.test.d.ts +1 -0
- package/dist/test/codec/parentNode.test.js +22 -0
- package/dist/test/codec/parentNode.test.js.map +1 -0
- package/dist/test/codec/presharedkey.test.d.ts +1 -0
- package/dist/test/codec/presharedkey.test.js +35 -0
- package/dist/test/codec/presharedkey.test.js.map +1 -0
- package/dist/test/codec/privateContentAAD.test.d.ts +1 -0
- package/dist/test/codec/privateContentAAD.test.js +30 -0
- package/dist/test/codec/privateContentAAD.test.js.map +1 -0
- package/dist/test/codec/privateMessage.test.d.ts +1 -0
- package/dist/test/codec/privateMessage.test.js +36 -0
- package/dist/test/codec/privateMessage.test.js.map +1 -0
- package/dist/test/codec/proposal.test.d.ts +1 -0
- package/dist/test/codec/proposal.test.js +44 -0
- package/dist/test/codec/proposal.test.js.map +1 -0
- package/dist/test/codec/proposalOrRef.test.d.ts +1 -0
- package/dist/test/codec/proposalOrRef.test.js +12 -0
- package/dist/test/codec/proposalOrRef.test.js.map +1 -0
- package/dist/test/codec/proposalOrRefType.test.d.ts +1 -0
- package/dist/test/codec/proposalOrRefType.test.js +12 -0
- package/dist/test/codec/proposalOrRefType.test.js.map +1 -0
- package/dist/test/codec/proposalType.test.d.ts +1 -0
- package/dist/test/codec/proposalType.test.js +12 -0
- package/dist/test/codec/proposalType.test.js.map +1 -0
- package/dist/test/codec/protocolVersion.test.d.ts +1 -0
- package/dist/test/codec/protocolVersion.test.js +9 -0
- package/dist/test/codec/protocolVersion.test.js.map +1 -0
- package/dist/test/codec/pskId.test.d.ts +1 -0
- package/dist/test/codec/pskId.test.js +18 -0
- package/dist/test/codec/pskId.test.js.map +1 -0
- package/dist/test/codec/pskInfo.test.d.ts +1 -0
- package/dist/test/codec/pskInfo.test.js +12 -0
- package/dist/test/codec/pskInfo.test.js.map +1 -0
- package/dist/test/codec/pskLabel.test.d.ts +1 -0
- package/dist/test/codec/pskLabel.test.js +26 -0
- package/dist/test/codec/pskLabel.test.js.map +1 -0
- package/dist/test/codec/pskType.test.d.ts +1 -0
- package/dist/test/codec/pskType.test.js +12 -0
- package/dist/test/codec/pskType.test.js.map +1 -0
- package/dist/test/codec/publicMessage.test.d.ts +1 -0
- package/dist/test/codec/publicMessage.test.js +39 -0
- package/dist/test/codec/publicMessage.test.js.map +1 -0
- package/dist/test/codec/ratchetTree.test.d.ts +1 -0
- package/dist/test/codec/ratchetTree.test.js +83 -0
- package/dist/test/codec/ratchetTree.test.js.map +1 -0
- package/dist/test/codec/requiredCapabilities.test.d.ts +1 -0
- package/dist/test/codec/requiredCapabilities.test.js +30 -0
- package/dist/test/codec/requiredCapabilities.test.js.map +1 -0
- package/dist/test/codec/resumptionPSKUsage.test.d.ts +1 -0
- package/dist/test/codec/resumptionPSKUsage.test.js +15 -0
- package/dist/test/codec/resumptionPSKUsage.test.js.map +1 -0
- package/dist/test/codec/reuseGuard.test.d.ts +1 -0
- package/dist/test/codec/reuseGuard.test.js +9 -0
- package/dist/test/codec/reuseGuard.test.js.map +1 -0
- package/dist/test/codec/roundtrip.d.ts +3 -0
- package/dist/test/codec/roundtrip.js +8 -0
- package/dist/test/codec/roundtrip.js.map +1 -0
- package/dist/test/codec/sender.test.d.ts +1 -0
- package/dist/test/codec/sender.test.js +18 -0
- package/dist/test/codec/sender.test.js.map +1 -0
- package/dist/test/codec/senderData.test.d.ts +1 -0
- package/dist/test/codec/senderData.test.js +12 -0
- package/dist/test/codec/senderData.test.js.map +1 -0
- package/dist/test/codec/senderDataAAD.test.d.ts +1 -0
- package/dist/test/codec/senderDataAAD.test.js +12 -0
- package/dist/test/codec/senderDataAAD.test.js.map +1 -0
- package/dist/test/codec/senderType.test.d.ts +1 -0
- package/dist/test/codec/senderType.test.js +18 -0
- package/dist/test/codec/senderType.test.js.map +1 -0
- package/dist/test/codec/transcriptHash.test.d.ts +1 -0
- package/dist/test/codec/transcriptHash.test.js +38 -0
- package/dist/test/codec/transcriptHash.test.js.map +1 -0
- package/dist/test/codec/treeHash.test.d.ts +1 -0
- package/dist/test/codec/treeHash.test.js +17 -0
- package/dist/test/codec/treeHash.test.js.map +1 -0
- package/dist/test/codec/updatePath.test.d.ts +1 -0
- package/dist/test/codec/updatePath.test.js +81 -0
- package/dist/test/codec/updatePath.test.js.map +1 -0
- package/dist/test/codec/updatePathNode.test.d.ts +1 -0
- package/dist/test/codec/updatePathNode.test.js +23 -0
- package/dist/test/codec/updatePathNode.test.js.map +1 -0
- package/dist/test/codec/varLengthEncoding.test.d.ts +1 -0
- package/dist/test/codec/varLengthEncoding.test.js +90 -0
- package/dist/test/codec/varLengthEncoding.test.js.map +1 -0
- package/dist/test/codec/welcome.test.d.ts +1 -0
- package/dist/test/codec/welcome.test.js +25 -0
- package/dist/test/codec/welcome.test.js.map +1 -0
- package/dist/test/codec/wireformat.test.d.ts +1 -0
- package/dist/test/codec/wireformat.test.js +21 -0
- package/dist/test/codec/wireformat.test.js.map +1 -0
- package/dist/test/crypto/aead.test.d.ts +1 -0
- package/dist/test/crypto/aead.test.js +44 -0
- package/dist/test/crypto/aead.test.js.map +1 -0
- package/dist/test/crypto/hpke.test.d.ts +1 -0
- package/dist/test/crypto/hpke.test.js +58 -0
- package/dist/test/crypto/hpke.test.js.map +1 -0
- package/dist/test/crypto/keyMatch.d.ts +7 -0
- package/dist/test/crypto/keyMatch.js +22 -0
- package/dist/test/crypto/keyMatch.js.map +1 -0
- package/dist/test/extensionsEqual.test.d.ts +1 -0
- package/dist/test/extensionsEqual.test.js +51 -0
- package/dist/test/extensionsEqual.test.js.map +1 -0
- package/dist/test/groupinfo.test.d.ts +1 -0
- package/dist/test/groupinfo.test.js +40 -0
- package/dist/test/groupinfo.test.js.map +1 -0
- package/dist/test/scenario/common.d.ts +8 -0
- package/dist/test/scenario/common.js +41 -0
- package/dist/test/scenario/common.js.map +1 -0
- package/dist/test/scenario/customExtensions.test.d.ts +1 -0
- package/dist/test/scenario/customExtensions.test.js +56 -0
- package/dist/test/scenario/customExtensions.test.js.map +1 -0
- package/dist/test/scenario/customProposal.test.d.ts +1 -0
- package/dist/test/scenario/customProposal.test.js +71 -0
- package/dist/test/scenario/customProposal.test.js.map +1 -0
- package/dist/test/scenario/epochOutOfOrder.test.d.ts +1 -0
- package/dist/test/scenario/epochOutOfOrder.test.js +162 -0
- package/dist/test/scenario/epochOutOfOrder.test.js.map +1 -0
- package/dist/test/scenario/externalAddProposal.test.d.ts +1 -0
- package/dist/test/scenario/externalAddProposal.test.js +69 -0
- package/dist/test/scenario/externalAddProposal.test.js.map +1 -0
- package/dist/test/scenario/externalJoin.test.d.ts +1 -0
- package/dist/test/scenario/externalJoin.test.js +51 -0
- package/dist/test/scenario/externalJoin.test.js.map +1 -0
- package/dist/test/scenario/externalJoinResync.test.d.ts +1 -0
- package/dist/test/scenario/externalJoinResync.test.js +59 -0
- package/dist/test/scenario/externalJoinResync.test.js.map +1 -0
- package/dist/test/scenario/externalProposal.test.d.ts +1 -0
- package/dist/test/scenario/externalProposal.test.js +69 -0
- package/dist/test/scenario/externalProposal.test.js.map +1 -0
- package/dist/test/scenario/externalPsk.test.d.ts +1 -0
- package/dist/test/scenario/externalPsk.test.js +73 -0
- package/dist/test/scenario/externalPsk.test.js.map +1 -0
- package/dist/test/scenario/externalPskJoin.test.d.ts +1 -0
- package/dist/test/scenario/externalPskJoin.test.js +51 -0
- package/dist/test/scenario/externalPskJoin.test.js.map +1 -0
- package/dist/test/scenario/generationOutOfOrder.test.d.ts +1 -0
- package/dist/test/scenario/generationOutOfOrder.test.js +111 -0
- package/dist/test/scenario/generationOutOfOrder.test.js.map +1 -0
- package/dist/test/scenario/grease.test.d.ts +1 -0
- package/dist/test/scenario/grease.test.js +44 -0
- package/dist/test/scenario/grease.test.js.map +1 -0
- package/dist/test/scenario/largeGroupFullLifecycle.test.d.ts +1 -0
- package/dist/test/scenario/largeGroupFullLifecycle.test.js +127 -0
- package/dist/test/scenario/largeGroupFullLifecycle.test.js.map +1 -0
- package/dist/test/scenario/leaveProposal.test.d.ts +1 -0
- package/dist/test/scenario/leaveProposal.test.js +77 -0
- package/dist/test/scenario/leaveProposal.test.js.map +1 -0
- package/dist/test/scenario/multipleJoinsAtOnce.test.d.ts +1 -0
- package/dist/test/scenario/multipleJoinsAtOnce.test.js +48 -0
- package/dist/test/scenario/multipleJoinsAtOnce.test.js.map +1 -0
- package/dist/test/scenario/oneToOneJoin.test.d.ts +1 -0
- package/dist/test/scenario/oneToOneJoin.test.js +98 -0
- package/dist/test/scenario/oneToOneJoin.test.js.map +1 -0
- package/dist/test/scenario/ratchetTreeExtension.test.d.ts +1 -0
- package/dist/test/scenario/ratchetTreeExtension.test.js +48 -0
- package/dist/test/scenario/ratchetTreeExtension.test.js.map +1 -0
- package/dist/test/scenario/reinit.test.d.ts +1 -0
- package/dist/test/scenario/reinit.test.js +57 -0
- package/dist/test/scenario/reinit.test.js.map +1 -0
- package/dist/test/scenario/rejectIncomingMessage.test.d.ts +1 -0
- package/dist/test/scenario/rejectIncomingMessage.test.js +67 -0
- package/dist/test/scenario/rejectIncomingMessage.test.js.map +1 -0
- package/dist/test/scenario/remove.test.d.ts +1 -0
- package/dist/test/scenario/remove.test.js +68 -0
- package/dist/test/scenario/remove.test.js.map +1 -0
- package/dist/test/scenario/requiredCapabilites.test.d.ts +1 -0
- package/dist/test/scenario/requiredCapabilites.test.js +65 -0
- package/dist/test/scenario/requiredCapabilites.test.js.map +1 -0
- package/dist/test/scenario/resumption.test.d.ts +1 -0
- package/dist/test/scenario/resumption.test.js +43 -0
- package/dist/test/scenario/resumption.test.js.map +1 -0
- package/dist/test/scenario/threePartyJoin.test.d.ts +1 -0
- package/dist/test/scenario/threePartyJoin.test.js +56 -0
- package/dist/test/scenario/threePartyJoin.test.js.map +1 -0
- package/dist/test/scenario/update.test.d.ts +1 -0
- package/dist/test/scenario/update.test.js +50 -0
- package/dist/test/scenario/update.test.js.map +1 -0
- package/dist/test/test-vectors/cryptoBasics.test.d.ts +1 -0
- package/dist/test/test-vectors/cryptoBasics.test.js +60 -0
- package/dist/test/test-vectors/cryptoBasics.test.js.map +1 -0
- package/dist/test/test-vectors/deserialization.test.d.ts +1 -0
- package/dist/test/test-vectors/deserialization.test.js +13 -0
- package/dist/test/test-vectors/deserialization.test.js.map +1 -0
- package/dist/test/test-vectors/keySchedule.test.d.ts +1 -0
- package/dist/test/test-vectors/keySchedule.test.js +48 -0
- package/dist/test/test-vectors/keySchedule.test.js.map +1 -0
- package/dist/test/test-vectors/messageProtection.test.d.ts +1 -0
- package/dist/test/test-vectors/messageProtection.test.js +215 -0
- package/dist/test/test-vectors/messageProtection.test.js.map +1 -0
- package/dist/test/test-vectors/messages.test.d.ts +1 -0
- package/dist/test/test-vectors/messages.test.js +136 -0
- package/dist/test/test-vectors/messages.test.js.map +1 -0
- package/dist/test/test-vectors/passiveClientScenarios.test.d.ts +1 -0
- package/dist/test/test-vectors/passiveClientScenarios.test.js +86 -0
- package/dist/test/test-vectors/passiveClientScenarios.test.js.map +1 -0
- package/dist/test/test-vectors/pskSecret.test.d.ts +1 -0
- package/dist/test/test-vectors/pskSecret.test.js +18 -0
- package/dist/test/test-vectors/pskSecret.test.js.map +1 -0
- package/dist/test/test-vectors/secretTree.test.d.ts +1 -0
- package/dist/test/test-vectors/secretTree.test.js +48 -0
- package/dist/test/test-vectors/secretTree.test.js.map +1 -0
- package/dist/test/test-vectors/transcriptHashes.test.d.ts +1 -0
- package/dist/test/test-vectors/transcriptHashes.test.js +26 -0
- package/dist/test/test-vectors/transcriptHashes.test.js.map +1 -0
- package/dist/test/test-vectors/treeOperations.test.d.ts +1 -0
- package/dist/test/test-vectors/treeOperations.test.js +45 -0
- package/dist/test/test-vectors/treeOperations.test.js.map +1 -0
- package/dist/test/test-vectors/treeValidation.test.d.ts +1 -0
- package/dist/test/test-vectors/treeValidation.test.js +36 -0
- package/dist/test/test-vectors/treeValidation.test.js.map +1 -0
- package/dist/test/test-vectors/treekem.test.d.ts +1 -0
- package/dist/test/test-vectors/treekem.test.js +100 -0
- package/dist/test/test-vectors/treekem.test.js.map +1 -0
- package/dist/test/test-vectors/treemath.test.d.ts +1 -0
- package/dist/test/test-vectors/treemath.test.js +55 -0
- package/dist/test/test-vectors/treemath.test.js.map +1 -0
- package/dist/test/test-vectors/welcome.test.d.ts +1 -0
- package/dist/test/test-vectors/welcome.test.js +40 -0
- package/dist/test/test-vectors/welcome.test.js.map +1 -0
- package/dist/test/validation/proposalValidation.test.d.ts +1 -0
- package/dist/test/validation/proposalValidation.test.js +231 -0
- package/dist/test/validation/proposalValidation.test.js.map +1 -0
- package/dist/test/validation/ratchetTreeValidation.test.d.ts +1 -0
- package/dist/test/validation/ratchetTreeValidation.test.js +51 -0
- package/dist/test/validation/ratchetTreeValidation.test.js.map +1 -0
- package/dist/test/validation/resumptionValidation.test.d.ts +1 -0
- package/dist/test/validation/resumptionValidation.test.js +79 -0
- package/dist/test/validation/resumptionValidation.test.js.map +1 -0
- package/dist/test_vectors/crypto-basics.json +303 -0
- package/dist/test_vectors/deserialization.json +58 -0
- package/dist/test_vectors/key-schedule.json +926 -0
- package/dist/test_vectors/message-protection.json +142 -0
- package/dist/test_vectors/messages.json +5702 -0
- package/dist/test_vectors/passive-client-handling-commit.json +2683 -0
- package/dist/test_vectors/passive-client-random.json +2657 -0
- package/dist/test_vectors/passive-client-welcome.json +814 -0
- package/dist/test_vectors/psk_secret.json +2382 -0
- package/dist/test_vectors/secret-tree.json +4846 -0
- package/dist/test_vectors/transcript-hashes.json +58 -0
- package/dist/test_vectors/tree-math.json +8156 -0
- package/dist/test_vectors/tree-operations.json +47 -0
- package/dist/test_vectors/tree-validation.json +6204 -0
- package/dist/test_vectors/treekem.json +14859 -0
- package/dist/test_vectors/welcome.json +51 -0
- package/package.json +108 -0
|
@@ -0,0 +1,215 @@
|
|
|
1
|
+
import json from "../../test_vectors/message-protection.json";
|
|
2
|
+
import { hexToBytes } from "@noble/ciphers/utils";
|
|
3
|
+
import { getCiphersuiteFromId, getCiphersuiteImpl, getCiphersuiteNameFromId, } from "../../src/crypto/ciphersuite";
|
|
4
|
+
import { decodeMlsMessage } from "../../src/message";
|
|
5
|
+
import { protect, unprotectPrivateMessage } from "../../src/messageProtection";
|
|
6
|
+
import { createContentCommitSignature } from "../../src/framedContent";
|
|
7
|
+
import { decodeProposal, encodeProposal } from "../../src/proposal";
|
|
8
|
+
import { decodeCommit, encodeCommit } from "../../src/commit";
|
|
9
|
+
import { createSecretTree } from "../../src/secretTree";
|
|
10
|
+
import { protectApplicationData, protectProposal } from "../../src/messageProtection";
|
|
11
|
+
import { protectProposalPublic, protectPublicMessage, unprotectPublicMessage } from "../../src/messageProtectionPublic";
|
|
12
|
+
import { defaultKeyRetentionConfig } from "../../src/keyRetentionConfig";
|
|
13
|
+
import { defaultCapabilities } from "../../src/defaultCapabilities";
|
|
14
|
+
import { UsageError } from "../../src/mlsError";
|
|
15
|
+
import { defaultPaddingConfig } from "../../src/paddingConfig";
|
|
16
|
+
for (const [index, x] of json.entries()) {
|
|
17
|
+
test(`message-protection test vectors ${index}`, async () => {
|
|
18
|
+
const impl = await getCiphersuiteImpl(getCiphersuiteFromId(x.cipher_suite));
|
|
19
|
+
await testMessageProtection(x, impl);
|
|
20
|
+
});
|
|
21
|
+
}
|
|
22
|
+
async function testMessageProtection(data, impl) {
|
|
23
|
+
const gc = {
|
|
24
|
+
version: "mls10",
|
|
25
|
+
cipherSuite: getCiphersuiteNameFromId(data.cipher_suite),
|
|
26
|
+
groupId: hexToBytes(data.group_id),
|
|
27
|
+
epoch: BigInt(data.epoch),
|
|
28
|
+
treeHash: hexToBytes(data.tree_hash),
|
|
29
|
+
confirmedTranscriptHash: hexToBytes(data.confirmed_transcript_hash),
|
|
30
|
+
extensions: [],
|
|
31
|
+
};
|
|
32
|
+
await publicProposal(data, gc, impl);
|
|
33
|
+
await protectThenUnprotectProposalPublic(data, gc, impl);
|
|
34
|
+
await publicCommit(data, gc, impl);
|
|
35
|
+
await protectThenUnprotectCommitPublic(data, gc, impl);
|
|
36
|
+
await proposal(data, gc, impl);
|
|
37
|
+
await protectThenUnprotectProposal(data, gc, impl);
|
|
38
|
+
await application(data, gc, impl);
|
|
39
|
+
await protectThenUnprotectApplication(data, gc, impl);
|
|
40
|
+
await commit(data, gc, impl);
|
|
41
|
+
await protectThenUnprotectCommit(data, gc, impl);
|
|
42
|
+
await publicApplicationFails(data, gc, impl);
|
|
43
|
+
}
|
|
44
|
+
// need to provide a ratchet tree with non blank leaf node so senderData validation doesn't fail
|
|
45
|
+
const treeForLeafIndex1 = [
|
|
46
|
+
undefined,
|
|
47
|
+
undefined,
|
|
48
|
+
{
|
|
49
|
+
nodeType: "leaf",
|
|
50
|
+
leaf: {
|
|
51
|
+
leafNodeSource: "commit",
|
|
52
|
+
hpkePublicKey: new Uint8Array(),
|
|
53
|
+
signaturePublicKey: new Uint8Array(),
|
|
54
|
+
capabilities: defaultCapabilities(),
|
|
55
|
+
parentHash: new Uint8Array(),
|
|
56
|
+
extensions: [],
|
|
57
|
+
signature: new Uint8Array(),
|
|
58
|
+
credential: { credentialType: "basic", identity: new Uint8Array() },
|
|
59
|
+
},
|
|
60
|
+
},
|
|
61
|
+
];
|
|
62
|
+
async function protectThenUnprotectProposalPublic(data, gc, impl) {
|
|
63
|
+
const p = decodeProposal(hexToBytes(data.proposal), 0);
|
|
64
|
+
if (p === undefined)
|
|
65
|
+
throw new Error("could not decode proposal");
|
|
66
|
+
const prot = await protectProposalPublic(hexToBytes(data.signature_priv), hexToBytes(data.membership_key), gc, new Uint8Array(), p[0], 1, impl);
|
|
67
|
+
const unprotected = await unprotectPublicMessage(hexToBytes(data.membership_key), gc, [], prot.publicMessage, impl, hexToBytes(data.signature_pub));
|
|
68
|
+
if (unprotected === undefined || unprotected.content.contentType !== "proposal")
|
|
69
|
+
throw new Error("could not unprotect mls public message");
|
|
70
|
+
expect(encodeProposal(unprotected.content.proposal)).toStrictEqual(hexToBytes(data.proposal));
|
|
71
|
+
}
|
|
72
|
+
async function protectThenUnprotectCommitPublic(data, gc, impl) {
|
|
73
|
+
const c = decodeCommit(hexToBytes(data.commit), 0);
|
|
74
|
+
if (c === undefined)
|
|
75
|
+
throw new Error("could not decode commit");
|
|
76
|
+
const confirmationTag = crypto.getRandomValues(new Uint8Array(impl.hpke.keyLength)); // should I be getting this elsewhere?
|
|
77
|
+
const { framedContent, signature } = await createContentCommitSignature(gc, "mls_public_message", c[0], { leafIndex: 1, senderType: "member" }, new Uint8Array(), hexToBytes(data.signature_priv), impl.signature);
|
|
78
|
+
const authenticatedContent = {
|
|
79
|
+
wireformat: "mls_public_message",
|
|
80
|
+
content: framedContent,
|
|
81
|
+
auth: { contentType: "commit", signature: signature, confirmationTag },
|
|
82
|
+
};
|
|
83
|
+
const prot = await protectPublicMessage(hexToBytes(data.membership_key), gc, authenticatedContent, impl);
|
|
84
|
+
const unprotected = await unprotectPublicMessage(hexToBytes(data.membership_key), gc, [], prot, impl, hexToBytes(data.signature_pub));
|
|
85
|
+
if (unprotected === undefined || unprotected.content.contentType !== "commit")
|
|
86
|
+
throw new Error("could not unprotect mls public message");
|
|
87
|
+
expect(encodeCommit(unprotected.content.commit)).toStrictEqual(hexToBytes(data.commit));
|
|
88
|
+
}
|
|
89
|
+
async function publicProposal(data, gc, impl) {
|
|
90
|
+
const prop = decodeMlsMessage(hexToBytes(data.proposal_pub), 0);
|
|
91
|
+
if (prop === undefined || prop[0].wireformat !== "mls_public_message")
|
|
92
|
+
throw new Error("could not decode mls public message");
|
|
93
|
+
const unprotected = await unprotectPublicMessage(hexToBytes(data.membership_key), gc, [], prop[0].publicMessage, impl, hexToBytes(data.signature_pub));
|
|
94
|
+
if (unprotected.content.contentType !== "proposal")
|
|
95
|
+
throw new Error("Could not decode as proposal");
|
|
96
|
+
expect(encodeProposal(unprotected.content.proposal)).toStrictEqual(hexToBytes(data.proposal));
|
|
97
|
+
}
|
|
98
|
+
async function publicCommit(data, gc, impl) {
|
|
99
|
+
const c = decodeMlsMessage(hexToBytes(data.commit_pub), 0);
|
|
100
|
+
if (c === undefined || c[0].wireformat !== "mls_public_message")
|
|
101
|
+
throw new Error("could not decode mls public message");
|
|
102
|
+
const unprotected = await unprotectPublicMessage(hexToBytes(data.membership_key), gc, [], c[0].publicMessage, impl, hexToBytes(data.signature_pub));
|
|
103
|
+
if (unprotected.content.contentType !== "commit")
|
|
104
|
+
throw new Error("Could not decode as commit");
|
|
105
|
+
expect(encodeCommit(unprotected.content.commit)).toStrictEqual(hexToBytes(data.commit));
|
|
106
|
+
}
|
|
107
|
+
async function publicApplicationFails(data, gc, impl) {
|
|
108
|
+
const privateApplication = decodeMlsMessage(hexToBytes(data.application_priv), 0);
|
|
109
|
+
if (privateApplication === undefined || privateApplication[0].wireformat !== "mls_private_message")
|
|
110
|
+
throw new Error("could not decode mls private message");
|
|
111
|
+
const secretTree = await createSecretTree(2, hexToBytes(data.encryption_secret), impl.kdf);
|
|
112
|
+
const unprotected = await unprotectPrivateMessage(hexToBytes(data.sender_data_secret), privateApplication[0].privateMessage, secretTree, treeForLeafIndex1, gc, defaultKeyRetentionConfig, impl, hexToBytes(data.signature_pub));
|
|
113
|
+
if (unprotected === undefined || unprotected.content.content.contentType !== "application")
|
|
114
|
+
throw new Error("could not unprotect mls private message");
|
|
115
|
+
const content = {
|
|
116
|
+
content: {
|
|
117
|
+
...unprotected.content.content,
|
|
118
|
+
contentType: "application",
|
|
119
|
+
groupId: gc.groupId,
|
|
120
|
+
sender: { leafIndex: 0, senderType: "member" },
|
|
121
|
+
epoch: gc.epoch,
|
|
122
|
+
authenticatedData: new Uint8Array(),
|
|
123
|
+
},
|
|
124
|
+
auth: unprotected.content.auth,
|
|
125
|
+
wireformat: "mls_public_message",
|
|
126
|
+
};
|
|
127
|
+
await expect(protectPublicMessage(hexToBytes(data.membership_key), gc, content, impl)).rejects.toThrow(UsageError);
|
|
128
|
+
}
|
|
129
|
+
async function commit(data, gc, impl) {
|
|
130
|
+
const privateCommit = decodeMlsMessage(hexToBytes(data.commit_priv), 0);
|
|
131
|
+
if (privateCommit === undefined || privateCommit[0].wireformat !== "mls_private_message")
|
|
132
|
+
throw new Error("could not decode mls private message");
|
|
133
|
+
const secretTree = await createSecretTree(2, hexToBytes(data.encryption_secret), impl.kdf);
|
|
134
|
+
const unprotected = await unprotectPrivateMessage(hexToBytes(data.sender_data_secret), privateCommit[0].privateMessage, secretTree, treeForLeafIndex1, gc, defaultKeyRetentionConfig, impl, hexToBytes(data.signature_pub));
|
|
135
|
+
if (unprotected === undefined || unprotected.content.content.contentType !== "commit")
|
|
136
|
+
throw new Error("could not unprotect mls private message");
|
|
137
|
+
expect(encodeCommit(unprotected.content.content.commit)).toStrictEqual(hexToBytes(data.commit));
|
|
138
|
+
}
|
|
139
|
+
async function application(data, gc, impl) {
|
|
140
|
+
const privateApplication = decodeMlsMessage(hexToBytes(data.application_priv), 0);
|
|
141
|
+
if (privateApplication === undefined || privateApplication[0].wireformat !== "mls_private_message")
|
|
142
|
+
throw new Error("could not decode mls private message");
|
|
143
|
+
const secretTree = await createSecretTree(2, hexToBytes(data.encryption_secret), impl.kdf);
|
|
144
|
+
const unprotected = await unprotectPrivateMessage(hexToBytes(data.sender_data_secret), privateApplication[0].privateMessage, secretTree, treeForLeafIndex1, gc, defaultKeyRetentionConfig, impl, hexToBytes(data.signature_pub));
|
|
145
|
+
if (unprotected === undefined || unprotected.content.content.contentType !== "application")
|
|
146
|
+
throw new Error("could not unprotect mls private message");
|
|
147
|
+
expect(unprotected.content.content.applicationData).toStrictEqual(hexToBytes(data.application));
|
|
148
|
+
}
|
|
149
|
+
async function protectThenUnprotectProposal(data, gc, impl) {
|
|
150
|
+
const p = decodeProposal(hexToBytes(data.proposal), 0);
|
|
151
|
+
if (p === undefined)
|
|
152
|
+
throw new Error("could not decode proposal");
|
|
153
|
+
const secretTree = await createSecretTree(2, hexToBytes(data.encryption_secret), impl.kdf);
|
|
154
|
+
const pro = await protectProposal(hexToBytes(data.signature_priv), hexToBytes(data.sender_data_secret), p[0], new Uint8Array(), gc, secretTree, 1, defaultPaddingConfig, impl);
|
|
155
|
+
const unprotected = await unprotectPrivateMessage(hexToBytes(data.sender_data_secret), pro.privateMessage, secretTree, treeForLeafIndex1, gc, defaultKeyRetentionConfig, impl, hexToBytes(data.signature_pub));
|
|
156
|
+
if (unprotected === undefined || unprotected.content.content.contentType !== "proposal")
|
|
157
|
+
throw new Error("could not unprotect mls private message");
|
|
158
|
+
expect(encodeProposal(unprotected.content.content.proposal)).toStrictEqual(hexToBytes(data.proposal));
|
|
159
|
+
}
|
|
160
|
+
async function protectThenUnprotectApplication(data, gc, impl) {
|
|
161
|
+
const secretTree = await createSecretTree(2, hexToBytes(data.encryption_secret), impl.kdf);
|
|
162
|
+
const pro = await protectApplicationData(hexToBytes(data.signature_priv), hexToBytes(data.sender_data_secret), hexToBytes(data.application), new Uint8Array(), gc, secretTree, 1, defaultPaddingConfig, impl);
|
|
163
|
+
const unprotected = await unprotectPrivateMessage(hexToBytes(data.sender_data_secret), pro.privateMessage, secretTree, treeForLeafIndex1, gc, defaultKeyRetentionConfig, impl, hexToBytes(data.signature_pub));
|
|
164
|
+
if (unprotected === undefined || unprotected.content.content.contentType !== "application")
|
|
165
|
+
throw new Error("could not unprotect mls private message");
|
|
166
|
+
expect(unprotected.content.content.applicationData).toStrictEqual(hexToBytes(data.application));
|
|
167
|
+
}
|
|
168
|
+
async function protectThenUnprotectCommit(data, gc, impl) {
|
|
169
|
+
const c = decodeCommit(hexToBytes(data.commit), 0);
|
|
170
|
+
if (c === undefined)
|
|
171
|
+
throw new Error("could not decode commit");
|
|
172
|
+
const secretTree = await createSecretTree(2, hexToBytes(data.encryption_secret), impl.kdf);
|
|
173
|
+
const confirmationTag = crypto.getRandomValues(new Uint8Array(impl.hpke.keyLength)); // should I be getting this elsewhere?
|
|
174
|
+
const { framedContent, signature } = await createContentCommitSignature(gc, "mls_private_message", c[0], { leafIndex: 1, senderType: "member" }, new Uint8Array(), hexToBytes(data.signature_priv), impl.signature);
|
|
175
|
+
const content = {
|
|
176
|
+
...framedContent,
|
|
177
|
+
auth: {
|
|
178
|
+
contentType: framedContent.contentType,
|
|
179
|
+
signature,
|
|
180
|
+
confirmationTag,
|
|
181
|
+
},
|
|
182
|
+
};
|
|
183
|
+
const pro = await protect(hexToBytes(data.sender_data_secret), new Uint8Array(), gc, secretTree, content, 1, defaultPaddingConfig, impl);
|
|
184
|
+
const unprotected = await unprotectPrivateMessage(hexToBytes(data.sender_data_secret), pro.privateMessage, secretTree, treeForLeafIndex1, gc, defaultKeyRetentionConfig, impl, hexToBytes(data.signature_pub));
|
|
185
|
+
if (unprotected === undefined || unprotected.content.content.contentType !== "commit")
|
|
186
|
+
throw new Error("could not unprotect mls private message");
|
|
187
|
+
expect(encodeCommit(unprotected.content.content.commit)).toStrictEqual(hexToBytes(data.commit));
|
|
188
|
+
}
|
|
189
|
+
async function proposal(data, gc, impl) {
|
|
190
|
+
const privateProposal = decodeMlsMessage(hexToBytes(data.proposal_priv), 0);
|
|
191
|
+
if (privateProposal === undefined || privateProposal[0].wireformat !== "mls_private_message")
|
|
192
|
+
throw new Error("could not decode mls private message");
|
|
193
|
+
const secretTree = await createSecretTree(2, hexToBytes(data.encryption_secret), impl.kdf);
|
|
194
|
+
const unprotected = await unprotectPrivateMessage(hexToBytes(data.sender_data_secret), privateProposal[0].privateMessage, secretTree, [
|
|
195
|
+
undefined,
|
|
196
|
+
undefined,
|
|
197
|
+
{
|
|
198
|
+
nodeType: "leaf",
|
|
199
|
+
leaf: {
|
|
200
|
+
leafNodeSource: "commit",
|
|
201
|
+
hpkePublicKey: new Uint8Array(),
|
|
202
|
+
signaturePublicKey: new Uint8Array(),
|
|
203
|
+
capabilities: defaultCapabilities(),
|
|
204
|
+
parentHash: new Uint8Array(),
|
|
205
|
+
extensions: [],
|
|
206
|
+
signature: new Uint8Array(),
|
|
207
|
+
credential: { credentialType: "basic", identity: new Uint8Array() },
|
|
208
|
+
},
|
|
209
|
+
},
|
|
210
|
+
], gc, defaultKeyRetentionConfig, impl, hexToBytes(data.signature_pub));
|
|
211
|
+
if (unprotected === undefined || unprotected.content.content.contentType !== "proposal")
|
|
212
|
+
throw new Error("could not unprotect mls private message");
|
|
213
|
+
expect(encodeProposal(unprotected.content.content.proposal)).toStrictEqual(hexToBytes(data.proposal));
|
|
214
|
+
}
|
|
215
|
+
//# sourceMappingURL=messageProtection.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"messageProtection.test.js","sourceRoot":"","sources":["../../../test/test-vectors/messageProtection.test.ts"],"names":[],"mappings":"AAAA,OAAO,IAAI,MAAM,4CAA4C,CAAA;AAC7D,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAA;AAEjD,OAAO,EAGL,oBAAoB,EACpB,kBAAkB,EAClB,wBAAwB,GACzB,MAAM,8BAA8B,CAAA;AACrC,OAAO,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAA;AACpD,OAAO,EAAE,OAAO,EAAE,uBAAuB,EAAE,MAAM,6BAA6B,CAAA;AAC9E,OAAO,EAAE,4BAA4B,EAAE,MAAM,yBAAyB,CAAA;AACtE,OAAO,EAAE,cAAc,EAAE,cAAc,EAAE,MAAM,oBAAoB,CAAA;AACnE,OAAO,EAAE,YAAY,EAAE,YAAY,EAAE,MAAM,kBAAkB,CAAA;AAE7D,OAAO,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAA;AACvD,OAAO,EAAE,sBAAsB,EAAE,eAAe,EAAE,MAAM,6BAA6B,CAAA;AACrF,OAAO,EAAE,qBAAqB,EAAE,oBAAoB,EAAE,sBAAsB,EAAE,MAAM,mCAAmC,CAAA;AACvH,OAAO,EAAE,yBAAyB,EAAE,MAAM,8BAA8B,CAAA;AACxE,OAAO,EAAE,mBAAmB,EAAE,MAAM,+BAA+B,CAAA;AAEnE,OAAO,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAA;AAC/C,OAAO,EAAE,oBAAoB,EAAE,MAAM,yBAAyB,CAAA;AAE9D,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;IACxC,IAAI,CAAC,mCAAmC,KAAK,EAAE,EAAE,KAAK,IAAI,EAAE;QAC1D,MAAM,IAAI,GAAG,MAAM,kBAAkB,CAAC,oBAAoB,CAAC,CAAC,CAAC,YAA6B,CAAC,CAAC,CAAA;QAC5F,MAAM,qBAAqB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAA;IACtC,CAAC,CAAC,CAAA;AACJ,CAAC;AAuBD,KAAK,UAAU,qBAAqB,CAAC,IAA2B,EAAE,IAAqB;IACrF,MAAM,EAAE,GAAiB;QACvB,OAAO,EAAE,OAAO;QAChB,WAAW,EAAE,wBAAwB,CAAC,IAAI,CAAC,YAA6B,CAAC;QACzE,OAAO,EAAE,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC;QAClC,KAAK,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC;QACzB,QAAQ,EAAE,UAAU,CAAC,IAAI,CAAC,SAAS,CAAC;QACpC,uBAAuB,EAAE,UAAU,CAAC,IAAI,CAAC,yBAAyB,CAAC;QACnE,UAAU,EAAE,EAAE;KACf,CAAA;IAED,MAAM,cAAc,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IACpC,MAAM,kCAAkC,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IAExD,MAAM,YAAY,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IAClC,MAAM,gCAAgC,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IAEtD,MAAM,QAAQ,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IAC9B,MAAM,4BAA4B,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IAElD,MAAM,WAAW,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IACjC,MAAM,+BAA+B,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IAErD,MAAM,MAAM,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IAC5B,MAAM,0BAA0B,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;IAEhD,MAAM,sBAAsB,CAAC,IAAI,EAAE,EAAE,EAAE,IAAI,CAAC,CAAA;AAC9C,CAAC;AAED,gGAAgG;AAChG,MAAM,iBAAiB,GAAgB;IACrC,SAAS;IACT,SAAS;IACT;QACE,QAAQ,EAAE,MAAM;QAChB,IAAI,EAAE;YACJ,cAAc,EAAE,QAAQ;YACxB,aAAa,EAAE,IAAI,UAAU,EAAE;YAC/B,kBAAkB,EAAE,IAAI,UAAU,EAAE;YACpC,YAAY,EAAE,mBAAmB,EAAE;YACnC,UAAU,EAAE,IAAI,UAAU,EAAE;YAC5B,UAAU,EAAE,EAAE;YACd,SAAS,EAAE,IAAI,UAAU,EAAE;YAC3B,UAAU,EAAE,EAAE,cAAc,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,UAAU,EAAE,EAAE;SACpE;KACF;CACF,CAAA;AAED,KAAK,UAAU,kCAAkC,CAC/C,IAA2B,EAC3B,EAAgB,EAChB,IAAqB;IAErB,MAAM,CAAC,GAAG,cAAc,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAA;IACtD,IAAI,CAAC,KAAK,SAAS;QAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;IAEjE,MAAM,IAAI,GAAG,MAAM,qBAAqB,CACtC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,EAAE,EACF,IAAI,UAAU,EAAE,EAChB,CAAC,CAAC,CAAC,CAAC,EACJ,CAAC,EACD,IAAI,CACL,CAAA;IAED,MAAM,WAAW,GAAG,MAAM,sBAAsB,CAC9C,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,EAAE,EACF,EAAE,EACF,IAAI,CAAC,aAAa,EAClB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,WAAW,KAAK,UAAU;QAC7E,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAA;IAE3D,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAA;AAC/F,CAAC;AAED,KAAK,UAAU,gCAAgC,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IAClH,MAAM,CAAC,GAAG,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAA;IAClD,IAAI,CAAC,KAAK,SAAS;QAAE,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAA;IAE/D,MAAM,eAAe,GAAG,MAAM,CAAC,eAAe,CAAC,IAAI,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAA,CAAC,sCAAsC;IAE1H,MAAM,EAAE,aAAa,EAAE,SAAS,EAAE,GAAG,MAAM,4BAA4B,CACrE,EAAE,EACF,oBAAoB,EACpB,CAAC,CAAC,CAAC,CAAC,EACJ,EAAE,SAAS,EAAE,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,EACtC,IAAI,UAAU,EAAE,EAChB,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,IAAI,CAAC,SAAS,CACf,CAAA;IAED,MAAM,oBAAoB,GAAyB;QACjD,UAAU,EAAE,oBAAoB;QAChC,OAAO,EAAE,aAAa;QACtB,IAAI,EAAE,EAAE,WAAW,EAAE,QAAQ,EAAE,SAAS,EAAE,SAAS,EAAE,eAAe,EAAE;KACvE,CAAA;IAED,MAAM,IAAI,GAAG,MAAM,oBAAoB,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,EAAE,EAAE,oBAAoB,EAAE,IAAI,CAAC,CAAA;IAExG,MAAM,WAAW,GAAG,MAAM,sBAAsB,CAC9C,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,EAAE,EACF,EAAE,EACF,IAAI,EACJ,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,WAAW,KAAK,QAAQ;QAC3E,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAA;IAE3D,MAAM,CAAC,YAAY,CAAC,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAA;AACzF,CAAC;AAED,KAAK,UAAU,cAAc,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IAChG,MAAM,IAAI,GAAG,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC,CAAA;IAC/D,IAAI,IAAI,KAAK,SAAS,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,oBAAoB;QACnE,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAA;IAExD,MAAM,WAAW,GAAG,MAAM,sBAAsB,CAC9C,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,EAAE,EACF,EAAE,EACF,IAAI,CAAC,CAAC,CAAC,CAAC,aAAa,EACrB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,CAAC,OAAO,CAAC,WAAW,KAAK,UAAU;QAAE,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAA;IAEnG,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAA;AAC/F,CAAC;AAED,KAAK,UAAU,YAAY,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IAC9F,MAAM,CAAC,GAAG,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC,CAAA;IAC1D,IAAI,CAAC,KAAK,SAAS,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,oBAAoB;QAC7D,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAA;IAExD,MAAM,WAAW,GAAG,MAAM,sBAAsB,CAC9C,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,EAAE,EACF,EAAE,EACF,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,EAClB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,CAAC,OAAO,CAAC,WAAW,KAAK,QAAQ;QAAE,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAA;IAE/F,MAAM,CAAC,YAAY,CAAC,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAA;AACzF,CAAC;AAED,KAAK,UAAU,sBAAsB,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IACxG,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,gBAAgB,CAAC,EAAE,CAAC,CAAC,CAAA;IACjF,IAAI,kBAAkB,KAAK,SAAS,IAAI,kBAAkB,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB;QAChG,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAA;IAEzD,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,CAAC,EAAE,UAAU,CAAC,IAAI,CAAC,iBAAiB,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;IAE1F,MAAM,WAAW,GAAG,MAAM,uBAAuB,CAC/C,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,kBAAkB,CAAC,CAAC,CAAC,CAAC,cAAc,EACpC,UAAU,EACV,iBAAiB,EACjB,EAAE,EACF,yBAAyB,EACzB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,KAAK,aAAa;QACxF,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAA;IAE5D,MAAM,OAAO,GAAyB;QACpC,OAAO,EAAE;YACP,GAAG,WAAW,CAAC,OAAO,CAAC,OAAO;YAC9B,WAAW,EAAE,aAAa;YAC1B,OAAO,EAAE,EAAE,CAAC,OAAO;YACnB,MAAM,EAAE,EAAE,SAAS,EAAE,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE;YAC9C,KAAK,EAAE,EAAE,CAAC,KAAK;YACf,iBAAiB,EAAE,IAAI,UAAU,EAAE;SACpC;QACD,IAAI,EAAE,WAAW,CAAC,OAAO,CAAC,IAAI;QAC9B,UAAU,EAAE,oBAAoB;KACjC,CAAA;IAED,MAAM,MAAM,CAAC,oBAAoB,CAAC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,EAAE,EAAE,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,UAAU,CAAC,CAAA;AACpH,CAAC;AAED,KAAK,UAAU,MAAM,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IACxF,MAAM,aAAa,GAAG,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,CAAA;IACvE,IAAI,aAAa,KAAK,SAAS,IAAI,aAAa,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB;QACtF,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAA;IAEzD,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,CAAC,EAAE,UAAU,CAAC,IAAI,CAAC,iBAAiB,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;IAE1F,MAAM,WAAW,GAAG,MAAM,uBAAuB,CAC/C,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,aAAa,CAAC,CAAC,CAAC,CAAC,cAAc,EAC/B,UAAU,EACV,iBAAiB,EACjB,EAAE,EACF,yBAAyB,EACzB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,KAAK,QAAQ;QACnF,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAA;IAE5D,MAAM,CAAC,YAAY,CAAC,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAA;AACjG,CAAC;AAED,KAAK,UAAU,WAAW,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IAC7F,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,gBAAgB,CAAC,EAAE,CAAC,CAAC,CAAA;IACjF,IAAI,kBAAkB,KAAK,SAAS,IAAI,kBAAkB,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB;QAChG,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAA;IAEzD,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,CAAC,EAAE,UAAU,CAAC,IAAI,CAAC,iBAAiB,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;IAE1F,MAAM,WAAW,GAAG,MAAM,uBAAuB,CAC/C,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,kBAAkB,CAAC,CAAC,CAAC,CAAC,cAAc,EACpC,UAAU,EACV,iBAAiB,EACjB,EAAE,EACF,yBAAyB,EACzB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,KAAK,aAAa;QACxF,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAA;IAE5D,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAA;AACjG,CAAC;AAED,KAAK,UAAU,4BAA4B,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IAC9G,MAAM,CAAC,GAAG,cAAc,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAA;IACtD,IAAI,CAAC,KAAK,SAAS;QAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAA;IAEjE,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,CAAC,EAAE,UAAU,CAAC,IAAI,CAAC,iBAAiB,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;IAE1F,MAAM,GAAG,GAAG,MAAM,eAAe,CAC/B,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,CAAC,CAAC,CAAC,CAAC,EACJ,IAAI,UAAU,EAAE,EAChB,EAAE,EACF,UAAU,EACV,CAAC,EACD,oBAAoB,EACpB,IAAI,CACL,CAAA;IAED,MAAM,WAAW,GAAG,MAAM,uBAAuB,CAC/C,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,GAAG,CAAC,cAAc,EAClB,UAAU,EACV,iBAAiB,EACjB,EAAE,EACF,yBAAyB,EACzB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,KAAK,UAAU;QACrF,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAA;IAE5D,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAA;AACvG,CAAC;AAED,KAAK,UAAU,+BAA+B,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IACjH,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,CAAC,EAAE,UAAU,CAAC,IAAI,CAAC,iBAAiB,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;IAE1F,MAAM,GAAG,GAAG,MAAM,sBAAsB,CACtC,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,EAC5B,IAAI,UAAU,EAAE,EAChB,EAAE,EACF,UAAU,EACV,CAAC,EACD,oBAAoB,EACpB,IAAI,CACL,CAAA;IAED,MAAM,WAAW,GAAG,MAAM,uBAAuB,CAC/C,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,GAAG,CAAC,cAAc,EAClB,UAAU,EACV,iBAAiB,EACjB,EAAE,EACF,yBAAyB,EACzB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,KAAK,aAAa;QACxF,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAA;IAE5D,MAAM,CAAC,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAA;AACjG,CAAC;AAED,KAAK,UAAU,0BAA0B,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IAC5G,MAAM,CAAC,GAAG,YAAY,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAA;IAClD,IAAI,CAAC,KAAK,SAAS;QAAE,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAA;IAE/D,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,CAAC,EAAE,UAAU,CAAC,IAAI,CAAC,iBAAiB,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;IAE1F,MAAM,eAAe,GAAG,MAAM,CAAC,eAAe,CAAC,IAAI,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAA,CAAC,sCAAsC;IAE1H,MAAM,EAAE,aAAa,EAAE,SAAS,EAAE,GAAG,MAAM,4BAA4B,CACrE,EAAE,EACF,qBAAqB,EACrB,CAAC,CAAC,CAAC,CAAC,EACJ,EAAE,SAAS,EAAE,CAAC,EAAE,UAAU,EAAE,QAAQ,EAAE,EACtC,IAAI,UAAU,EAAE,EAChB,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAC/B,IAAI,CAAC,SAAS,CACf,CAAA;IAED,MAAM,OAAO,GAAG;QACd,GAAG,aAAa;QAChB,IAAI,EAAE;YACJ,WAAW,EAAE,aAAa,CAAC,WAAW;YACtC,SAAS;YACT,eAAe;SAChB;KACF,CAAA;IAED,MAAM,GAAG,GAAG,MAAM,OAAO,CACvB,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,IAAI,UAAU,EAAE,EAChB,EAAE,EACF,UAAU,EACV,OAAO,EACP,CAAC,EACD,oBAAoB,EACpB,IAAI,CACL,CAAA;IAED,MAAM,WAAW,GAAG,MAAM,uBAAuB,CAC/C,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,GAAG,CAAC,cAAc,EAClB,UAAU,EACV,iBAAiB,EACjB,EAAE,EACF,yBAAyB,EACzB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,KAAK,QAAQ;QACnF,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAA;IAE5D,MAAM,CAAC,YAAY,CAAC,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAA;AACjG,CAAC;AAED,KAAK,UAAU,QAAQ,CAAC,IAA2B,EAAE,EAAgB,EAAE,IAAqB;IAC1F,MAAM,eAAe,GAAG,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAA;IAC3E,IAAI,eAAe,KAAK,SAAS,IAAI,eAAe,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB;QAC1F,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAA;IAEzD,MAAM,UAAU,GAAG,MAAM,gBAAgB,CAAC,CAAC,EAAE,UAAU,CAAC,IAAI,CAAC,iBAAiB,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;IAE1F,MAAM,WAAW,GAAG,MAAM,uBAAuB,CAC/C,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,EACnC,eAAe,CAAC,CAAC,CAAC,CAAC,cAAc,EACjC,UAAU,EACV;QACE,SAAS;QACT,SAAS;QACT;YACE,QAAQ,EAAE,MAAM;YAChB,IAAI,EAAE;gBACJ,cAAc,EAAE,QAAQ;gBACxB,aAAa,EAAE,IAAI,UAAU,EAAE;gBAC/B,kBAAkB,EAAE,IAAI,UAAU,EAAE;gBACpC,YAAY,EAAE,mBAAmB,EAAE;gBACnC,UAAU,EAAE,IAAI,UAAU,EAAE;gBAC5B,UAAU,EAAE,EAAE;gBACd,SAAS,EAAE,IAAI,UAAU,EAAE;gBAC3B,UAAU,EAAE,EAAE,cAAc,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,UAAU,EAAE,EAAE;aACpE;SACF;KACF,EACD,EAAE,EACF,yBAAyB,EACzB,IAAI,EACJ,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,CAC/B,CAAA;IAED,IAAI,WAAW,KAAK,SAAS,IAAI,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,KAAK,UAAU;QACrF,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAA;IAE5D,MAAM,CAAC,cAAc,CAAC,WAAW,CAAC,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAA;AACvG,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,136 @@
|
|
|
1
|
+
import json from "../../test_vectors/messages.json";
|
|
2
|
+
import { hexToBytes } from "@noble/ciphers/utils";
|
|
3
|
+
import { decodeMlsMessage, encodeMlsMessage } from "../../src/message";
|
|
4
|
+
import { decodeCommit, encodeCommit } from "../../src/commit";
|
|
5
|
+
import { decodeAdd, decodeExternalInit, decodeGroupContextExtensions, decodePSK, decodeReinit, decodeRemove, decodeUpdate, encodeAdd, encodeExternalInit, encodeGroupContextExtensions, encodePSK, encodeReinit, encodeRemove, encodeUpdate, } from "../../src/proposal";
|
|
6
|
+
import { decodeRatchetTree, encodeRatchetTree } from "../../src/ratchetTree";
|
|
7
|
+
import { decodeGroupSecrets, encodeGroupSecrets } from "../../src/groupSecrets";
|
|
8
|
+
for (const [index, x] of json.entries()) {
|
|
9
|
+
test(`messages test vectors ${index}`, () => {
|
|
10
|
+
codecRoundtrip(x);
|
|
11
|
+
});
|
|
12
|
+
}
|
|
13
|
+
function codecRoundtrip(msgs) {
|
|
14
|
+
welcome(msgs.mls_welcome);
|
|
15
|
+
groupInfo(msgs.mls_group_info);
|
|
16
|
+
keyPackage(msgs.mls_key_package);
|
|
17
|
+
ratchetTree(msgs.ratchet_tree);
|
|
18
|
+
groupSecrets(msgs.group_secrets);
|
|
19
|
+
addProposal(msgs.add_proposal);
|
|
20
|
+
updateProposal(msgs.update_proposal);
|
|
21
|
+
removeProposal(msgs.remove_proposal);
|
|
22
|
+
pskProposal(msgs.pre_shared_key_proposal);
|
|
23
|
+
reinitProposal(msgs.re_init_proposal);
|
|
24
|
+
externalInitProposal(msgs.external_init_proposal);
|
|
25
|
+
groupContextExtension(msgs.group_context_extensions_proposal);
|
|
26
|
+
commit(msgs.commit);
|
|
27
|
+
publicMessageApplication(msgs.public_message_application);
|
|
28
|
+
publicMessageCommit(msgs.public_message_commit);
|
|
29
|
+
publicMessageProposal(msgs.public_message_proposal);
|
|
30
|
+
privateMessage(msgs.private_message);
|
|
31
|
+
}
|
|
32
|
+
function welcome(s) {
|
|
33
|
+
const inputBytes = hexToBytes(s);
|
|
34
|
+
const mlsWelcome = decodeMlsMessage(inputBytes, 0);
|
|
35
|
+
if (mlsWelcome === undefined || mlsWelcome[0].wireformat !== "mls_welcome") {
|
|
36
|
+
throw new Error("could not decode mls welcome");
|
|
37
|
+
}
|
|
38
|
+
else {
|
|
39
|
+
const reEncoded = encodeMlsMessage(mlsWelcome[0]);
|
|
40
|
+
expect(reEncoded).toStrictEqual(inputBytes);
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
function privateMessage(s) {
|
|
44
|
+
const inputBytes = hexToBytes(s);
|
|
45
|
+
const p = decodeMlsMessage(inputBytes, 0);
|
|
46
|
+
if (p === undefined || p[0].wireformat !== "mls_private_message") {
|
|
47
|
+
throw new Error("could not decode mls private message");
|
|
48
|
+
}
|
|
49
|
+
else {
|
|
50
|
+
const reEncoded = encodeMlsMessage(p?.[0]);
|
|
51
|
+
expect(reEncoded).toStrictEqual(inputBytes);
|
|
52
|
+
}
|
|
53
|
+
}
|
|
54
|
+
function groupInfo(s) {
|
|
55
|
+
const inputBytes = hexToBytes(s);
|
|
56
|
+
const gi = decodeMlsMessage(inputBytes, 0);
|
|
57
|
+
if (gi === undefined || gi[0].wireformat !== "mls_group_info") {
|
|
58
|
+
throw new Error("could not decode mls_group_info");
|
|
59
|
+
}
|
|
60
|
+
else {
|
|
61
|
+
const reEncoded = encodeMlsMessage(gi[0]);
|
|
62
|
+
expect(reEncoded).toStrictEqual(inputBytes);
|
|
63
|
+
}
|
|
64
|
+
}
|
|
65
|
+
function keyPackage(s) {
|
|
66
|
+
const inputBytes = hexToBytes(s);
|
|
67
|
+
const kp = decodeMlsMessage(inputBytes, 0);
|
|
68
|
+
if (kp === undefined || kp[0].wireformat !== "mls_key_package") {
|
|
69
|
+
throw new Error("could not decode mls_key_package");
|
|
70
|
+
}
|
|
71
|
+
else {
|
|
72
|
+
const reEncoded = encodeMlsMessage(kp[0]);
|
|
73
|
+
expect(reEncoded).toStrictEqual(inputBytes);
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
function publicMessageApplication(s) {
|
|
77
|
+
const inputBytes = hexToBytes(s);
|
|
78
|
+
const p = decodeMlsMessage(inputBytes, 0);
|
|
79
|
+
if (p === undefined || p[0].wireformat !== "mls_public_message") {
|
|
80
|
+
throw new Error("could not decode mls_public_message");
|
|
81
|
+
}
|
|
82
|
+
else {
|
|
83
|
+
expect(p[0].publicMessage.content.contentType).toBe("application");
|
|
84
|
+
const reEncoded = encodeMlsMessage(p[0]);
|
|
85
|
+
expect(reEncoded).toStrictEqual(inputBytes);
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
function publicMessageProposal(s) {
|
|
89
|
+
const inputBytes = hexToBytes(s);
|
|
90
|
+
const p = decodeMlsMessage(inputBytes, 0);
|
|
91
|
+
if (p === undefined || p[0].wireformat !== "mls_public_message") {
|
|
92
|
+
throw new Error("could not decode mls_public_message");
|
|
93
|
+
}
|
|
94
|
+
else {
|
|
95
|
+
expect(p[0].publicMessage.content.contentType).toBe("proposal");
|
|
96
|
+
const reEncoded = encodeMlsMessage(p[0]);
|
|
97
|
+
expect(reEncoded).toStrictEqual(inputBytes);
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
function publicMessageCommit(s) {
|
|
101
|
+
const inputBytes = hexToBytes(s);
|
|
102
|
+
const p = decodeMlsMessage(inputBytes, 0);
|
|
103
|
+
if (p === undefined || p[0].wireformat !== "mls_public_message") {
|
|
104
|
+
throw new Error("could not decode mls_public_message");
|
|
105
|
+
}
|
|
106
|
+
else {
|
|
107
|
+
expect(p[0].publicMessage.content.contentType).toBe("commit");
|
|
108
|
+
const reEncoded = encodeMlsMessage(p[0]);
|
|
109
|
+
expect(reEncoded).toStrictEqual(inputBytes);
|
|
110
|
+
}
|
|
111
|
+
}
|
|
112
|
+
//const keyPackage = createTest(encodeKeyPackage, decodeKeyPackage, '')
|
|
113
|
+
const commit = createTest(encodeCommit, decodeCommit, "commit");
|
|
114
|
+
const groupSecrets = createTest(encodeGroupSecrets, decodeGroupSecrets, "group_secrets");
|
|
115
|
+
const ratchetTree = createTest(encodeRatchetTree, decodeRatchetTree, "ratchet_tree");
|
|
116
|
+
const updateProposal = createTest(encodeUpdate, decodeUpdate, "update_proposal");
|
|
117
|
+
const addProposal = createTest(encodeAdd, decodeAdd, "add_proposal");
|
|
118
|
+
const pskProposal = createTest(encodePSK, decodePSK, "pre_shared_key_proposal");
|
|
119
|
+
const removeProposal = createTest(encodeRemove, decodeRemove, "remove_proposal");
|
|
120
|
+
const reinitProposal = createTest(encodeReinit, decodeReinit, "re_init_proposal");
|
|
121
|
+
const externalInitProposal = createTest(encodeExternalInit, decodeExternalInit, "external_init_proposal");
|
|
122
|
+
const groupContextExtension = createTest(encodeGroupContextExtensions, decodeGroupContextExtensions, "group_context_extensions_proposal");
|
|
123
|
+
function createTest(enc, dec, typeName) {
|
|
124
|
+
return (s) => {
|
|
125
|
+
const inputBytes = hexToBytes(s);
|
|
126
|
+
const decoded = dec(inputBytes, 0);
|
|
127
|
+
if (decoded === undefined) {
|
|
128
|
+
throw new Error(`could not decode ${typeName}`);
|
|
129
|
+
}
|
|
130
|
+
else {
|
|
131
|
+
const reEncoded = enc(decoded[0]);
|
|
132
|
+
expect(reEncoded).toStrictEqual(inputBytes);
|
|
133
|
+
}
|
|
134
|
+
};
|
|
135
|
+
}
|
|
136
|
+
//# sourceMappingURL=messages.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"messages.test.js","sourceRoot":"","sources":["../../../test/test-vectors/messages.test.ts"],"names":[],"mappings":"AAAA,OAAO,IAAI,MAAM,kCAAkC,CAAA;AAEnD,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAA;AACjD,OAAO,EAAE,gBAAgB,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAA;AACtE,OAAO,EAAE,YAAY,EAAE,YAAY,EAAE,MAAM,kBAAkB,CAAA;AAG7D,OAAO,EACL,SAAS,EACT,kBAAkB,EAClB,4BAA4B,EAC5B,SAAS,EACT,YAAY,EACZ,YAAY,EACZ,YAAY,EACZ,SAAS,EACT,kBAAkB,EAClB,4BAA4B,EAC5B,SAAS,EACT,YAAY,EACZ,YAAY,EACZ,YAAY,GACb,MAAM,oBAAoB,CAAA;AAC3B,OAAO,EAAE,iBAAiB,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAA;AAC5E,OAAO,EAAE,kBAAkB,EAAE,kBAAkB,EAAE,MAAM,wBAAwB,CAAA;AAE/E,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;IACxC,IAAI,CAAC,yBAAyB,KAAK,EAAE,EAAE,GAAG,EAAE;QAC1C,cAAc,CAAC,CAAC,CAAC,CAAA;IACnB,CAAC,CAAC,CAAA;AACJ,CAAC;AAsBD,SAAS,cAAc,CAAC,IAAc;IACpC,OAAO,CAAC,IAAI,CAAC,WAAW,CAAC,CAAA;IACzB,SAAS,CAAC,IAAI,CAAC,cAAc,CAAC,CAAA;IAC9B,UAAU,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;IAChC,WAAW,CAAC,IAAI,CAAC,YAAY,CAAC,CAAA;IAC9B,YAAY,CAAC,IAAI,CAAC,aAAa,CAAC,CAAA;IAChC,WAAW,CAAC,IAAI,CAAC,YAAY,CAAC,CAAA;IAC9B,cAAc,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;IACpC,cAAc,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;IACpC,WAAW,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAA;IACzC,cAAc,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAA;IACrC,oBAAoB,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAA;IACjD,qBAAqB,CAAC,IAAI,CAAC,iCAAiC,CAAC,CAAA;IAC7D,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,CAAA;IACnB,wBAAwB,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAA;IACzD,mBAAmB,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAA;IAC/C,qBAAqB,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAA;IACnD,cAAc,CAAC,IAAI,CAAC,eAAe,CAAC,CAAA;AACtC,CAAC;AAED,SAAS,OAAO,CAAC,CAAS;IACxB,MAAM,UAAU,GAAG,UAAU,CAAC,CAAC,CAAC,CAAA;IAChC,MAAM,UAAU,GAAG,gBAAgB,CAAC,UAAU,EAAE,CAAC,CAAC,CAAA;IAElD,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,aAAa,EAAE,CAAC;QAC3E,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAA;IACjD,CAAC;SAAM,CAAC;QACN,MAAM,SAAS,GAAG,gBAAgB,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAA;QACjD,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,CAAA;IAC7C,CAAC;AACH,CAAC;AAED,SAAS,cAAc,CAAC,CAAS;IAC/B,MAAM,UAAU,GAAG,UAAU,CAAC,CAAC,CAAC,CAAA;IAChC,MAAM,CAAC,GAAG,gBAAgB,CAAC,UAAU,EAAE,CAAC,CAAC,CAAA;IAEzC,IAAI,CAAC,KAAK,SAAS,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB,EAAE,CAAC;QACjE,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAA;IACzD,CAAC;SAAM,CAAC;QACN,MAAM,SAAS,GAAG,gBAAgB,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAA;QAC1C,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,CAAA;IAC7C,CAAC;AACH,CAAC;AAED,SAAS,SAAS,CAAC,CAAS;IAC1B,MAAM,UAAU,GAAG,UAAU,CAAC,CAAC,CAAC,CAAA;IAChC,MAAM,EAAE,GAAG,gBAAgB,CAAC,UAAU,EAAE,CAAC,CAAC,CAAA;IAE1C,IAAI,EAAE,KAAK,SAAS,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,gBAAgB,EAAE,CAAC;QAC9D,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAA;IACpD,CAAC;SAAM,CAAC;QACN,MAAM,SAAS,GAAG,gBAAgB,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAA;QACzC,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,CAAA;IAC7C,CAAC;AACH,CAAC;AAED,SAAS,UAAU,CAAC,CAAS;IAC3B,MAAM,UAAU,GAAG,UAAU,CAAC,CAAC,CAAC,CAAA;IAChC,MAAM,EAAE,GAAG,gBAAgB,CAAC,UAAU,EAAE,CAAC,CAAC,CAAA;IAE1C,IAAI,EAAE,KAAK,SAAS,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,iBAAiB,EAAE,CAAC;QAC/D,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAA;IACrD,CAAC;SAAM,CAAC;QACN,MAAM,SAAS,GAAG,gBAAgB,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAA;QACzC,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,CAAA;IAC7C,CAAC;AACH,CAAC;AAED,SAAS,wBAAwB,CAAC,CAAS;IACzC,MAAM,UAAU,GAAG,UAAU,CAAC,CAAC,CAAC,CAAA;IAChC,MAAM,CAAC,GAAG,gBAAgB,CAAC,UAAU,EAAE,CAAC,CAAC,CAAA;IAEzC,IAAI,CAAC,KAAK,SAAS,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,oBAAoB,EAAE,CAAC;QAChE,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAA;IACxD,CAAC;SAAM,CAAC;QACN,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAA;QAClE,MAAM,SAAS,GAAG,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,CAAA;IAC7C,CAAC;AACH,CAAC;AAED,SAAS,qBAAqB,CAAC,CAAS;IACtC,MAAM,UAAU,GAAG,UAAU,CAAC,CAAC,CAAC,CAAA;IAChC,MAAM,CAAC,GAAG,gBAAgB,CAAC,UAAU,EAAE,CAAC,CAAC,CAAA;IAEzC,IAAI,CAAC,KAAK,SAAS,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,oBAAoB,EAAE,CAAC;QAChE,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAA;IACxD,CAAC;SAAM,CAAC;QACN,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAA;QAC/D,MAAM,SAAS,GAAG,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,CAAA;IAC7C,CAAC;AACH,CAAC;AAED,SAAS,mBAAmB,CAAC,CAAS;IACpC,MAAM,UAAU,GAAG,UAAU,CAAC,CAAC,CAAC,CAAA;IAChC,MAAM,CAAC,GAAG,gBAAgB,CAAC,UAAU,EAAE,CAAC,CAAC,CAAA;IAEzC,IAAI,CAAC,KAAK,SAAS,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,oBAAoB,EAAE,CAAC;QAChE,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAA;IACxD,CAAC;SAAM,CAAC;QACN,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,aAAa,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAA;QAC7D,MAAM,SAAS,GAAG,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAA;QACxC,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,CAAA;IAC7C,CAAC;AACH,CAAC;AAED,uEAAuE;AACvE,MAAM,MAAM,GAAG,UAAU,CAAC,YAAY,EAAE,YAAY,EAAE,QAAQ,CAAC,CAAA;AAC/D,MAAM,YAAY,GAAG,UAAU,CAAC,kBAAkB,EAAE,kBAAkB,EAAE,eAAe,CAAC,CAAA;AACxF,MAAM,WAAW,GAAG,UAAU,CAAC,iBAAiB,EAAE,iBAAiB,EAAE,cAAc,CAAC,CAAA;AACpF,MAAM,cAAc,GAAG,UAAU,CAAC,YAAY,EAAE,YAAY,EAAE,iBAAiB,CAAC,CAAA;AAChF,MAAM,WAAW,GAAG,UAAU,CAAC,SAAS,EAAE,SAAS,EAAE,cAAc,CAAC,CAAA;AACpE,MAAM,WAAW,GAAG,UAAU,CAAC,SAAS,EAAE,SAAS,EAAE,yBAAyB,CAAC,CAAA;AAC/E,MAAM,cAAc,GAAG,UAAU,CAAC,YAAY,EAAE,YAAY,EAAE,iBAAiB,CAAC,CAAA;AAChF,MAAM,cAAc,GAAG,UAAU,CAAC,YAAY,EAAE,YAAY,EAAE,kBAAkB,CAAC,CAAA;AACjF,MAAM,oBAAoB,GAAG,UAAU,CAAC,kBAAkB,EAAE,kBAAkB,EAAE,wBAAwB,CAAC,CAAA;AACzG,MAAM,qBAAqB,GAAG,UAAU,CACtC,4BAA4B,EAC5B,4BAA4B,EAC5B,mCAAmC,CACpC,CAAA;AAED,SAAS,UAAU,CAAI,GAAe,EAAE,GAAe,EAAE,QAAgB;IACvE,OAAO,CAAC,CAAC,EAAE,EAAE;QACX,MAAM,UAAU,GAAG,UAAU,CAAC,CAAC,CAAC,CAAA;QAChC,MAAM,OAAO,GAAG,GAAG,CAAC,UAAU,EAAE,CAAC,CAAC,CAAA;QAElC,IAAI,OAAO,KAAK,SAAS,EAAE,CAAC;YAC1B,MAAM,IAAI,KAAK,CAAC,oBAAoB,QAAQ,EAAE,CAAC,CAAA;QACjD,CAAC;aAAM,CAAC;YACN,MAAM,SAAS,GAAG,GAAG,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAA;YACjC,MAAM,CAAC,SAAS,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,CAAA;QAC7C,CAAC;IACH,CAAC,CAAA;AACH,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,86 @@
|
|
|
1
|
+
import { getCiphersuiteFromId, getCiphersuiteImpl } from "../../src/crypto/ciphersuite";
|
|
2
|
+
import { hexToBytes } from "@noble/ciphers/utils";
|
|
3
|
+
import jsonCommit from "../../test_vectors/passive-client-handling-commit.json";
|
|
4
|
+
import jsonRandom from "../../test_vectors/passive-client-random.json";
|
|
5
|
+
import jsonWelcome from "../../test_vectors/passive-client-welcome.json";
|
|
6
|
+
import { hpkeKeysMatch, signatureKeysMatch } from "../crypto/keyMatch";
|
|
7
|
+
import { decodeMlsMessage } from "../../src/message";
|
|
8
|
+
import { decodeRatchetTree } from "../../src/ratchetTree";
|
|
9
|
+
import { joinGroup, makePskIndex } from "../../src/clientState";
|
|
10
|
+
import { processPrivateMessage, processPublicMessage } from "../../src/processMessages";
|
|
11
|
+
import { bytesToBase64 } from "../../src/util/byteArray";
|
|
12
|
+
for (const [index, x] of jsonCommit.entries()) {
|
|
13
|
+
test(`passive-client-handling-commit test vectors ${index}`, async () => {
|
|
14
|
+
const impl = await getCiphersuiteImpl(getCiphersuiteFromId(x.cipher_suite));
|
|
15
|
+
await testPassiveClientScenario(x, impl);
|
|
16
|
+
});
|
|
17
|
+
}
|
|
18
|
+
for (const [index, x] of jsonRandom.entries()) {
|
|
19
|
+
test(`passive-client-random test vectors ${index}`, async () => {
|
|
20
|
+
const impl = await getCiphersuiteImpl(getCiphersuiteFromId(x.cipher_suite));
|
|
21
|
+
await testPassiveClientScenario(x, impl);
|
|
22
|
+
}, 40000);
|
|
23
|
+
}
|
|
24
|
+
for (const [index, x] of jsonWelcome.entries()) {
|
|
25
|
+
test(`passive-client-welcome test vectors ${index}`, async () => {
|
|
26
|
+
const impl = await getCiphersuiteImpl(getCiphersuiteFromId(x.cipher_suite));
|
|
27
|
+
await testPassiveClientScenario(x, impl);
|
|
28
|
+
});
|
|
29
|
+
}
|
|
30
|
+
async function testPassiveClientScenario(data, impl) {
|
|
31
|
+
const kp = decodeMlsMessage(hexToBytes(data.key_package), 0);
|
|
32
|
+
if (kp === undefined || kp[0].wireformat !== "mls_key_package")
|
|
33
|
+
throw new Error("Could not decode KeyPackage");
|
|
34
|
+
await verifyKeys(data, kp[0].keyPackage, impl);
|
|
35
|
+
const welcome = decodeMlsMessage(hexToBytes(data.welcome), 0);
|
|
36
|
+
if (welcome === undefined || welcome[0].wireformat !== "mls_welcome")
|
|
37
|
+
throw new Error("Could not decode Welcome");
|
|
38
|
+
const pks = {
|
|
39
|
+
hpkePrivateKey: hexToBytes(data.encryption_priv),
|
|
40
|
+
initPrivateKey: hexToBytes(data.init_priv),
|
|
41
|
+
signaturePrivateKey: hexToBytes(data.signature_priv),
|
|
42
|
+
};
|
|
43
|
+
const tree = data.ratchet_tree !== null ? decodeRatchetTree(hexToBytes(data.ratchet_tree), 0)?.[0] : undefined;
|
|
44
|
+
const psks = data.external_psks.reduce((acc, psk) => ({ ...acc, [bytesToBase64(hexToBytes(psk.psk_id))]: hexToBytes(psk.psk) }), {});
|
|
45
|
+
let state = await joinGroup(welcome[0].welcome, kp[0].keyPackage, pks, makePskIndex(undefined, psks), impl, tree);
|
|
46
|
+
expect(state.keySchedule.epochAuthenticator).toStrictEqual(hexToBytes(data.initial_epoch_authenticator));
|
|
47
|
+
for (const epoch of data.epochs) {
|
|
48
|
+
for (const proposal of epoch.proposals) {
|
|
49
|
+
const mlsProposal = decodeMlsMessage(hexToBytes(proposal), 0);
|
|
50
|
+
if (mlsProposal === undefined ||
|
|
51
|
+
(mlsProposal[0].wireformat !== "mls_private_message" && mlsProposal[0].wireformat !== "mls_public_message"))
|
|
52
|
+
throw new Error("Could not decode proposal message");
|
|
53
|
+
if (mlsProposal[0].wireformat === "mls_private_message") {
|
|
54
|
+
const res = await processPrivateMessage(state, mlsProposal[0].privateMessage, makePskIndex(state, psks), impl);
|
|
55
|
+
state = res.newState;
|
|
56
|
+
}
|
|
57
|
+
else {
|
|
58
|
+
const res = await processPublicMessage(state, mlsProposal[0].publicMessage, makePskIndex(state, psks), impl);
|
|
59
|
+
state = res.newState;
|
|
60
|
+
}
|
|
61
|
+
}
|
|
62
|
+
const mlsCommit = decodeMlsMessage(hexToBytes(epoch.commit), 0);
|
|
63
|
+
if (mlsCommit === undefined ||
|
|
64
|
+
(mlsCommit[0].wireformat !== "mls_private_message" && mlsCommit[0].wireformat !== "mls_public_message"))
|
|
65
|
+
throw new Error("Could not decode commit message");
|
|
66
|
+
if (mlsCommit[0].wireformat === "mls_private_message") {
|
|
67
|
+
const res = await processPrivateMessage(state, mlsCommit[0].privateMessage, makePskIndex(state, psks), impl);
|
|
68
|
+
state = res.newState;
|
|
69
|
+
}
|
|
70
|
+
else {
|
|
71
|
+
const res = await processPublicMessage(state, mlsCommit[0].publicMessage, makePskIndex(state, psks), impl);
|
|
72
|
+
state = res.newState;
|
|
73
|
+
}
|
|
74
|
+
expect(state.keySchedule.epochAuthenticator).toStrictEqual(hexToBytes(epoch.epoch_authenticator));
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
async function verifyKeys(data, kp, impl) {
|
|
78
|
+
const hpke = await hpkeKeysMatch(kp.leafNode.hpkePublicKey, hexToBytes(data.encryption_priv), impl.hpke);
|
|
79
|
+
expect(hpke).toBe(true);
|
|
80
|
+
const hpkeInit = await hpkeKeysMatch(kp.initKey, hexToBytes(data.init_priv), impl.hpke);
|
|
81
|
+
expect(hpkeInit).toBe(true);
|
|
82
|
+
const sig = await signatureKeysMatch(kp.leafNode.signaturePublicKey, hexToBytes(data.signature_priv), impl.signature);
|
|
83
|
+
expect(sig).toBe(true);
|
|
84
|
+
hexToBytes(data.init_priv);
|
|
85
|
+
}
|
|
86
|
+
//# sourceMappingURL=passiveClientScenarios.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"passiveClientScenarios.test.js","sourceRoot":"","sources":["../../../test/test-vectors/passiveClientScenarios.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAkC,oBAAoB,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAA;AAEvH,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAA;AACjD,OAAO,UAAU,MAAM,wDAAwD,CAAA;AAC/E,OAAO,UAAU,MAAM,+CAA+C,CAAA;AACtE,OAAO,WAAW,MAAM,gDAAgD,CAAA;AACxE,OAAO,EAAE,aAAa,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAA;AACtE,OAAO,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAA;AACpD,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAA;AAEzD,OAAO,EAAE,SAAS,EAAE,YAAY,EAAE,MAAM,uBAAuB,CAAA;AAC/D,OAAO,EAAE,qBAAqB,EAAE,oBAAoB,EAAE,MAAM,2BAA2B,CAAA;AACvF,OAAO,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAExD,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,IAAI,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC;IAC9C,IAAI,CAAC,+CAA+C,KAAK,EAAE,EAAE,KAAK,IAAI,EAAE;QACtE,MAAM,IAAI,GAAG,MAAM,kBAAkB,CAAC,oBAAoB,CAAC,CAAC,CAAC,YAA6B,CAAC,CAAC,CAAA;QAC5F,MAAM,yBAAyB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAA;IAC1C,CAAC,CAAC,CAAA;AACJ,CAAC;AAED,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,IAAI,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC;IAC9C,IAAI,CAAC,sCAAsC,KAAK,EAAE,EAAE,KAAK,IAAI,EAAE;QAC7D,MAAM,IAAI,GAAG,MAAM,kBAAkB,CAAC,oBAAoB,CAAC,CAAC,CAAC,YAA6B,CAAC,CAAC,CAAA;QAC5F,MAAM,yBAAyB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAA;IAC1C,CAAC,EAAE,KAAK,CAAC,CAAA;AACX,CAAC;AAED,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,IAAI,WAAW,CAAC,OAAO,EAAE,EAAE,CAAC;IAC/C,IAAI,CAAC,uCAAuC,KAAK,EAAE,EAAE,KAAK,IAAI,EAAE;QAC9D,MAAM,IAAI,GAAG,MAAM,kBAAkB,CAAC,oBAAoB,CAAC,CAAC,CAAC,YAA6B,CAAC,CAAC,CAAA;QAC5F,MAAM,yBAAyB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAA;IAC1C,CAAC,CAAC,CAAA;AACJ,CAAC;AAED,KAAK,UAAU,yBAAyB,CAAC,IAAmB,EAAE,IAAqB;IACjF,MAAM,EAAE,GAAG,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,CAAA;IAE5D,IAAI,EAAE,KAAK,SAAS,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,iBAAiB;QAAE,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAA;IAC9G,MAAM,UAAU,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,EAAE,IAAI,CAAC,CAAA;IAE9C,MAAM,OAAO,GAAG,gBAAgB,CAAC,UAAU,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC,CAAA;IAE7D,IAAI,OAAO,KAAK,SAAS,IAAI,OAAO,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,aAAa;QAAE,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAA;IAEjH,MAAM,GAAG,GAAsB;QAC7B,cAAc,EAAE,UAAU,CAAC,IAAI,CAAC,eAAe,CAAC;QAChD,cAAc,EAAE,UAAU,CAAC,IAAI,CAAC,SAAS,CAAC;QAC1C,mBAAmB,EAAE,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC;KACrD,CAAA;IAED,MAAM,IAAI,GAAG,IAAI,CAAC,YAAY,KAAK,IAAI,CAAC,CAAC,CAAC,iBAAiB,CAAC,UAAU,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAA;IAE9G,MAAM,IAAI,GAA+B,IAAI,CAAC,aAAa,CAAC,MAAM,CAChE,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC,EAAE,GAAG,GAAG,EAAE,CAAC,aAAa,CAAC,UAAU,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,UAAU,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,EACxF,EAAE,CACH,CAAA;IACD,IAAI,KAAK,GAAG,MAAM,SAAS,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,CAAC,CAAC,CAAC,UAAU,EAAE,GAAG,EAAE,YAAY,CAAC,SAAS,EAAE,IAAI,CAAC,EAAE,IAAI,EAAE,IAAI,CAAC,CAAA;IAEjH,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,kBAAkB,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,IAAI,CAAC,2BAA2B,CAAC,CAAC,CAAA;IAExG,KAAK,MAAM,KAAK,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;QAChC,KAAK,MAAM,QAAQ,IAAI,KAAK,CAAC,SAAS,EAAE,CAAC;YACvC,MAAM,WAAW,GAAG,gBAAgB,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAA;YAC7D,IACE,WAAW,KAAK,SAAS;gBACzB,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,oBAAoB,CAAC;gBAE3G,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAA;YAEtD,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB,EAAE,CAAC;gBACxD,MAAM,GAAG,GAAG,MAAM,qBAAqB,CAAC,KAAK,EAAE,WAAW,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,KAAK,EAAE,IAAI,CAAC,EAAE,IAAI,CAAC,CAAA;gBAE9G,KAAK,GAAG,GAAG,CAAC,QAAQ,CAAA;YACtB,CAAC;iBAAM,CAAC;gBACN,MAAM,GAAG,GAAG,MAAM,oBAAoB,CAAC,KAAK,EAAE,WAAW,CAAC,CAAC,CAAC,CAAC,aAAa,EAAE,YAAY,CAAC,KAAK,EAAE,IAAI,CAAC,EAAE,IAAI,CAAC,CAAA;gBAE5G,KAAK,GAAG,GAAG,CAAC,QAAQ,CAAA;YACtB,CAAC;QACH,CAAC;QAED,MAAM,SAAS,GAAG,gBAAgB,CAAC,UAAU,CAAC,KAAK,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC,CAAA;QAC/D,IACE,SAAS,KAAK,SAAS;YACvB,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB,IAAI,SAAS,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,oBAAoB,CAAC;YAEvG,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAA;QAEpD,IAAI,SAAS,CAAC,CAAC,CAAC,CAAC,UAAU,KAAK,qBAAqB,EAAE,CAAC;YACtD,MAAM,GAAG,GAAG,MAAM,qBAAqB,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC,CAAC,CAAC,cAAc,EAAE,YAAY,CAAC,KAAK,EAAE,IAAI,CAAC,EAAE,IAAI,CAAC,CAAA;YAE5G,KAAK,GAAG,GAAG,CAAC,QAAQ,CAAA;QACtB,CAAC;aAAM,CAAC;YACN,MAAM,GAAG,GAAG,MAAM,oBAAoB,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC,CAAC,CAAC,aAAa,EAAE,YAAY,CAAC,KAAK,EAAE,IAAI,CAAC,EAAE,IAAI,CAAC,CAAA;YAC1G,KAAK,GAAG,GAAG,CAAC,QAAQ,CAAA;QACtB,CAAC;QAED,MAAM,CAAC,KAAK,CAAC,WAAW,CAAC,kBAAkB,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAA;IACnG,CAAC;AACH,CAAC;AAED,KAAK,UAAU,UAAU,CAAC,IAAmB,EAAE,EAAc,EAAE,IAAqB;IAClF,MAAM,IAAI,GAAG,MAAM,aAAa,CAAC,EAAE,CAAC,QAAQ,CAAC,aAAa,EAAE,UAAU,CAAC,IAAI,CAAC,eAAe,CAAC,EAAE,IAAI,CAAC,IAAI,CAAC,CAAA;IACxG,MAAM,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IAEvB,MAAM,QAAQ,GAAG,MAAM,aAAa,CAAC,EAAE,CAAC,OAAO,EAAE,UAAU,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,IAAI,CAAC,IAAI,CAAC,CAAA;IACvF,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IAE3B,MAAM,GAAG,GAAG,MAAM,kBAAkB,CAAC,EAAE,CAAC,QAAQ,CAAC,kBAAkB,EAAE,UAAU,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,IAAI,CAAC,SAAS,CAAC,CAAA;IACrH,MAAM,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IACtB,UAAU,CAAC,IAAI,CAAC,SAAS,CAAC,CAAA;AAC5B,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
import json from "../../test_vectors/psk_secret.json";
|
|
2
|
+
import { getCiphersuiteFromId, getCiphersuiteImpl } from "../../src/crypto/ciphersuite";
|
|
3
|
+
import { computePskSecret } from "../../src/presharedkey";
|
|
4
|
+
import { bytesToHex, hexToBytes } from "@noble/ciphers/utils";
|
|
5
|
+
for (const [index, x] of json.entries()) {
|
|
6
|
+
test(`psk_secret test vectors ${index}`, async () => {
|
|
7
|
+
const impl = await getCiphersuiteImpl(getCiphersuiteFromId(x.cipher_suite));
|
|
8
|
+
await testPskSecret(x.psk_secret, x.psks, impl);
|
|
9
|
+
});
|
|
10
|
+
}
|
|
11
|
+
function toExternalPsk(p) {
|
|
12
|
+
return [{ psktype: "external", pskId: hexToBytes(p.psk_id), pskNonce: hexToBytes(p.psk_nonce) }, hexToBytes(p.psk)];
|
|
13
|
+
}
|
|
14
|
+
async function testPskSecret(secret, psks, impl) {
|
|
15
|
+
const computedSecret = await computePskSecret(psks.map(toExternalPsk), impl);
|
|
16
|
+
expect(bytesToHex(computedSecret)).toBe(secret);
|
|
17
|
+
}
|
|
18
|
+
//# sourceMappingURL=pskSecret.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"pskSecret.test.js","sourceRoot":"","sources":["../../../test/test-vectors/pskSecret.test.ts"],"names":[],"mappings":"AAAA,OAAO,IAAI,MAAM,oCAAoC,CAAA;AACrD,OAAO,EAAkC,oBAAoB,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAA;AACvH,OAAO,EAAE,gBAAgB,EAA0B,MAAM,wBAAwB,CAAA;AACjF,OAAO,EAAE,UAAU,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAA;AAE7D,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;IACxC,IAAI,CAAC,2BAA2B,KAAK,EAAE,EAAE,KAAK,IAAI,EAAE;QAClD,MAAM,IAAI,GAAG,MAAM,kBAAkB,CAAC,oBAAoB,CAAC,CAAC,CAAC,YAA6B,CAAC,CAAC,CAAA;QAC5F,MAAM,aAAa,CAAC,CAAC,CAAC,UAAU,EAAE,CAAC,CAAC,IAAI,EAAE,IAAI,CAAC,CAAA;IACjD,CAAC,CAAC,CAAA;AACJ,CAAC;AAQD,SAAS,aAAa,CAAC,CAAM;IAC3B,OAAO,CAAC,EAAE,OAAO,EAAE,UAAU,EAAE,KAAK,EAAE,UAAU,CAAC,CAAC,CAAC,MAAM,CAAC,EAAE,QAAQ,EAAE,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,EAAE,EAAE,UAAU,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAA;AACrH,CAAC;AAED,KAAK,UAAU,aAAa,CAAC,MAAc,EAAE,IAAW,EAAE,IAAqB;IAC7E,MAAM,cAAc,GAAG,MAAM,gBAAgB,CAAC,IAAI,CAAC,GAAG,CAAC,aAAa,CAAC,EAAE,IAAI,CAAC,CAAA;IAC5E,MAAM,CAAC,UAAU,CAAC,cAAc,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAA;AACjD,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
import { getCiphersuiteFromId, getCiphersuiteImpl } from "../../src/crypto/ciphersuite";
|
|
2
|
+
import { hexToBytes } from "@noble/ciphers/utils";
|
|
3
|
+
import json from "../../test_vectors/secret-tree.json";
|
|
4
|
+
import { expandSenderDataKey, expandSenderDataNonce } from "../../src/sender";
|
|
5
|
+
import { createSecretTree, deriveKey, deriveNonce, ratchetUntil } from "../../src/secretTree";
|
|
6
|
+
import { leafToNodeIndex } from "../../src/treemath";
|
|
7
|
+
import { defaultKeyRetentionConfig } from "../../src/keyRetentionConfig";
|
|
8
|
+
for (const [index, x] of json.entries()) {
|
|
9
|
+
test(`secret-tree test vectors ${index}`, async () => {
|
|
10
|
+
const impl = await getCiphersuiteImpl(getCiphersuiteFromId(x.cipher_suite));
|
|
11
|
+
await testSecretTree(x.sender_data.sender_data_secret, x.sender_data.ciphertext, x.sender_data.key, x.sender_data.nonce, x.encryption_secret, x.leaves, impl);
|
|
12
|
+
});
|
|
13
|
+
}
|
|
14
|
+
async function testSecretTree(senderSecret, ciphertext, key, nonce, encryptionSecret, leaves, impl) {
|
|
15
|
+
// key == sender_data_key(sender_data_secret, ciphertext)
|
|
16
|
+
const derivedKey = await expandSenderDataKey(impl, hexToBytes(senderSecret), hexToBytes(ciphertext));
|
|
17
|
+
expect(derivedKey).toStrictEqual(hexToBytes(key));
|
|
18
|
+
//nonce == sender_data_nonce(sender_data_secret, ciphertext)
|
|
19
|
+
const derivedNonce = await expandSenderDataNonce(impl, hexToBytes(senderSecret), hexToBytes(ciphertext));
|
|
20
|
+
expect(derivedNonce).toStrictEqual(hexToBytes(nonce));
|
|
21
|
+
const tree = await createSecretTree(leaves.length, hexToBytes(encryptionSecret), impl.kdf);
|
|
22
|
+
for (const [index, leaf] of leaves.entries()) {
|
|
23
|
+
const nodeIndex = leafToNodeIndex(index);
|
|
24
|
+
const handshakeSecret = tree[nodeIndex].handshake;
|
|
25
|
+
for (const gen of leaf) {
|
|
26
|
+
const ratcheted = await ratchetUntil(handshakeSecret, gen.generation, defaultKeyRetentionConfig, impl.kdf);
|
|
27
|
+
expect(ratcheted.generation).toBe(gen.generation);
|
|
28
|
+
//handshake_key = handshake_ratchet_key_[i]_[generation]
|
|
29
|
+
const handshakeKey = await deriveKey(ratcheted.secret, ratcheted.generation, impl);
|
|
30
|
+
expect(handshakeKey).toStrictEqual(hexToBytes(gen.handshake_key));
|
|
31
|
+
// handshake_nonce = handshake_ratchet_nonce_[i]_[generation]
|
|
32
|
+
const handshakeNonce = await deriveNonce(ratcheted.secret, ratcheted.generation, impl);
|
|
33
|
+
expect(handshakeNonce).toStrictEqual(hexToBytes(gen.handshake_nonce));
|
|
34
|
+
}
|
|
35
|
+
const applicationSecret = tree[nodeIndex].application;
|
|
36
|
+
for (const gen of leaf) {
|
|
37
|
+
const ratcheted = await ratchetUntil(applicationSecret, gen.generation, defaultKeyRetentionConfig, impl.kdf);
|
|
38
|
+
expect(ratcheted.generation).toBe(gen.generation);
|
|
39
|
+
// application_key = application_ratchet_key_[i]_[generation]
|
|
40
|
+
const applicationKey = await deriveKey(ratcheted.secret, ratcheted.generation, impl);
|
|
41
|
+
expect(applicationKey).toStrictEqual(hexToBytes(gen.application_key));
|
|
42
|
+
// application_nonce = application_ratchet_nonce_[i]_[generation]
|
|
43
|
+
const applicationNonce = await deriveNonce(ratcheted.secret, ratcheted.generation, impl);
|
|
44
|
+
expect(applicationNonce).toStrictEqual(hexToBytes(gen.application_nonce));
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
}
|
|
48
|
+
//# sourceMappingURL=secretTree.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"secretTree.test.js","sourceRoot":"","sources":["../../../test/test-vectors/secretTree.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAkC,oBAAoB,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAA;AACvH,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAA;AACjD,OAAO,IAAI,MAAM,qCAAqC,CAAA;AACtD,OAAO,EAAE,mBAAmB,EAAE,qBAAqB,EAAE,MAAM,kBAAkB,CAAA;AAC7E,OAAO,EAAE,gBAAgB,EAAE,SAAS,EAAE,WAAW,EAAE,YAAY,EAAE,MAAM,sBAAsB,CAAA;AAC7F,OAAO,EAAE,eAAe,EAAE,MAAM,oBAAoB,CAAA;AACpD,OAAO,EAAE,yBAAyB,EAAE,MAAM,8BAA8B,CAAA;AAExE,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;IACxC,IAAI,CAAC,4BAA4B,KAAK,EAAE,EAAE,KAAK,IAAI,EAAE;QACnD,MAAM,IAAI,GAAG,MAAM,kBAAkB,CAAC,oBAAoB,CAAC,CAAC,CAAC,YAA6B,CAAC,CAAC,CAAA;QAC5F,MAAM,cAAc,CAClB,CAAC,CAAC,WAAW,CAAC,kBAAkB,EAChC,CAAC,CAAC,WAAW,CAAC,UAAU,EACxB,CAAC,CAAC,WAAW,CAAC,GAAG,EACjB,CAAC,CAAC,WAAW,CAAC,KAAK,EACnB,CAAC,CAAC,iBAAiB,EACnB,CAAC,CAAC,MAAM,EACR,IAAI,CACL,CAAA;IACH,CAAC,CAAC,CAAA;AACJ,CAAC;AAUD,KAAK,UAAU,cAAc,CAC3B,YAAoB,EACpB,UAAkB,EAClB,GAAW,EACX,KAAa,EACb,gBAAwB,EACxB,MAAgB,EAChB,IAAqB;IAErB,yDAAyD;IACzD,MAAM,UAAU,GAAG,MAAM,mBAAmB,CAAC,IAAI,EAAE,UAAU,CAAC,YAAY,CAAC,EAAE,UAAU,CAAC,UAAU,CAAC,CAAC,CAAA;IACpG,MAAM,CAAC,UAAU,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC,CAAA;IAEjD,4DAA4D;IAC5D,MAAM,YAAY,GAAG,MAAM,qBAAqB,CAAC,IAAI,EAAE,UAAU,CAAC,YAAY,CAAC,EAAE,UAAU,CAAC,UAAU,CAAC,CAAC,CAAA;IACxG,MAAM,CAAC,YAAY,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC,CAAA;IAErD,MAAM,IAAI,GAAG,MAAM,gBAAgB,CAAC,MAAM,CAAC,MAAM,EAAE,UAAU,CAAC,gBAAgB,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;IAC1F,KAAK,MAAM,CAAC,KAAK,EAAE,IAAI,CAAC,IAAI,MAAM,CAAC,OAAO,EAAE,EAAE,CAAC;QAC7C,MAAM,SAAS,GAAG,eAAe,CAAC,KAAK,CAAC,CAAA;QACxC,MAAM,eAAe,GAAG,IAAI,CAAC,SAAS,CAAE,CAAC,SAAS,CAAA;QAClD,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;YACvB,MAAM,SAAS,GAAG,MAAM,YAAY,CAAC,eAAe,EAAE,GAAG,CAAC,UAAU,EAAE,yBAAyB,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;YAC1G,MAAM,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,CAAA;YAEjD,wDAAwD;YACxD,MAAM,YAAY,GAAG,MAAM,SAAS,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,UAAU,EAAE,IAAI,CAAC,CAAA;YAClF,MAAM,CAAC,YAAY,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC,CAAA;YAEjE,6DAA6D;YAC7D,MAAM,cAAc,GAAG,MAAM,WAAW,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,UAAU,EAAE,IAAI,CAAC,CAAA;YACtF,MAAM,CAAC,cAAc,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC,CAAA;QACvE,CAAC;QAED,MAAM,iBAAiB,GAAG,IAAI,CAAC,SAAS,CAAE,CAAC,WAAW,CAAA;QACtD,KAAK,MAAM,GAAG,IAAI,IAAI,EAAE,CAAC;YACvB,MAAM,SAAS,GAAG,MAAM,YAAY,CAAC,iBAAiB,EAAE,GAAG,CAAC,UAAU,EAAE,yBAAyB,EAAE,IAAI,CAAC,GAAG,CAAC,CAAA;YAC5G,MAAM,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,UAAU,CAAC,CAAA;YAEjD,6DAA6D;YAC7D,MAAM,cAAc,GAAG,MAAM,SAAS,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,UAAU,EAAE,IAAI,CAAC,CAAA;YACpF,MAAM,CAAC,cAAc,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC,CAAA;YAErE,iEAAiE;YACjE,MAAM,gBAAgB,GAAG,MAAM,WAAW,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,UAAU,EAAE,IAAI,CAAC,CAAA;YACxF,MAAM,CAAC,gBAAgB,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC,CAAA;QAC3E,CAAC;IACH,CAAC;AACH,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
import { getCiphersuiteFromId, getCiphersuiteImpl } from "../../src/crypto/ciphersuite";
|
|
2
|
+
import { hexToBytes } from "@noble/ciphers/utils";
|
|
3
|
+
import json from "../../test_vectors/transcript-hashes.json";
|
|
4
|
+
import { decodeAuthenticatedContent } from "../../src/authenticatedContent";
|
|
5
|
+
import { createConfirmedHash, createInterimHash } from "../../src/transcriptHash";
|
|
6
|
+
for (const [index, x] of json.entries()) {
|
|
7
|
+
test(`transcript-hashes test vectors ${index}`, async () => {
|
|
8
|
+
const impl = await getCiphersuiteImpl(getCiphersuiteFromId(x.cipher_suite));
|
|
9
|
+
await testTranscriptHash(x.authenticated_content, x.confirmation_key, x.confirmed_transcript_hash_after, x.interim_transcript_hash_after, x.interim_transcript_hash_before, impl);
|
|
10
|
+
});
|
|
11
|
+
}
|
|
12
|
+
async function testTranscriptHash(authenticatedContent, confirmationKey, confirmedHashAfter, interimHashAfter, interimHashBefore, impl) {
|
|
13
|
+
const auth = decodeAuthenticatedContent(hexToBytes(authenticatedContent), 0);
|
|
14
|
+
if (auth === undefined || auth[0].content.contentType !== "commit" || auth[0].auth.contentType !== "commit") {
|
|
15
|
+
throw new Error("Could not decode authenticated content");
|
|
16
|
+
}
|
|
17
|
+
const confirmationTag = auth[0].auth.confirmationTag;
|
|
18
|
+
const verified = await impl.hash.verifyMac(hexToBytes(confirmationKey), confirmationTag, hexToBytes(confirmedHashAfter));
|
|
19
|
+
expect(verified).toBe(true);
|
|
20
|
+
const input = { wireformat: auth[0].wireformat, content: auth[0].content, signature: auth[0].auth.signature };
|
|
21
|
+
const computedConfirmedHash = await createConfirmedHash(hexToBytes(interimHashBefore), input, impl.hash);
|
|
22
|
+
expect(computedConfirmedHash).toStrictEqual(hexToBytes(confirmedHashAfter));
|
|
23
|
+
const computedInterimHash = await createInterimHash(hexToBytes(confirmedHashAfter), confirmationTag, impl.hash);
|
|
24
|
+
expect(computedInterimHash).toStrictEqual(hexToBytes(interimHashAfter));
|
|
25
|
+
}
|
|
26
|
+
//# sourceMappingURL=transcriptHashes.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"transcriptHashes.test.js","sourceRoot":"","sources":["../../../test/test-vectors/transcriptHashes.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAkC,oBAAoB,EAAE,kBAAkB,EAAE,MAAM,8BAA8B,CAAA;AACvH,OAAO,EAAE,UAAU,EAAE,MAAM,sBAAsB,CAAA;AACjD,OAAO,IAAI,MAAM,2CAA2C,CAAA;AAC5D,OAAO,EAAE,0BAA0B,EAAE,MAAM,gCAAgC,CAAA;AAC3E,OAAO,EAAE,mBAAmB,EAAE,iBAAiB,EAAE,MAAM,0BAA0B,CAAA;AAEjF,KAAK,MAAM,CAAC,KAAK,EAAE,CAAC,CAAC,IAAI,IAAI,CAAC,OAAO,EAAE,EAAE,CAAC;IACxC,IAAI,CAAC,kCAAkC,KAAK,EAAE,EAAE,KAAK,IAAI,EAAE;QACzD,MAAM,IAAI,GAAG,MAAM,kBAAkB,CAAC,oBAAoB,CAAC,CAAC,CAAC,YAA6B,CAAC,CAAC,CAAA;QAC5F,MAAM,kBAAkB,CACtB,CAAC,CAAC,qBAAqB,EACvB,CAAC,CAAC,gBAAgB,EAClB,CAAC,CAAC,+BAA+B,EACjC,CAAC,CAAC,6BAA6B,EAC/B,CAAC,CAAC,8BAA8B,EAChC,IAAI,CACL,CAAA;IACH,CAAC,CAAC,CAAA;AACJ,CAAC;AAED,KAAK,UAAU,kBAAkB,CAC/B,oBAA4B,EAC5B,eAAuB,EACvB,kBAA0B,EAC1B,gBAAwB,EACxB,iBAAyB,EACzB,IAAqB;IAErB,MAAM,IAAI,GAAG,0BAA0B,CAAC,UAAU,CAAC,oBAAoB,CAAC,EAAE,CAAC,CAAC,CAAA;IAC5E,IAAI,IAAI,KAAK,SAAS,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,WAAW,KAAK,QAAQ,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,KAAK,QAAQ,EAAE,CAAC;QAC5G,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAA;IAC3D,CAAC;IAED,MAAM,eAAe,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAA;IAEpD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,SAAS,CACxC,UAAU,CAAC,eAAe,CAAC,EAC3B,eAAe,EACf,UAAU,CAAC,kBAAkB,CAAC,CAC/B,CAAA;IACD,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IAE3B,MAAM,KAAK,GAAG,EAAE,UAAU,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,UAAU,EAAE,OAAO,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,OAAO,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,EAAE,CAAA;IAE7G,MAAM,qBAAqB,GAAG,MAAM,mBAAmB,CAAC,UAAU,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,IAAI,CAAC,IAAI,CAAC,CAAA;IAExG,MAAM,CAAC,qBAAqB,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,kBAAkB,CAAC,CAAC,CAAA;IAE3E,MAAM,mBAAmB,GAAG,MAAM,iBAAiB,CAAC,UAAU,CAAC,kBAAkB,CAAC,EAAE,eAAe,EAAE,IAAI,CAAC,IAAI,CAAC,CAAA;IAC/G,MAAM,CAAC,mBAAmB,CAAC,CAAC,aAAa,CAAC,UAAU,CAAC,gBAAgB,CAAC,CAAC,CAAA;AACzE,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export {};
|