mirror of
https://github.com/fluencelabs/js-libp2p-crypto
synced 2025-07-31 22:42:13 +00:00
Compare commits
26 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
7d63f698c0 | ||
|
a49df7786c | ||
|
c73adb00cc | ||
|
8a95de4700 | ||
|
c35a65133f | ||
|
4eb4aa05de | ||
|
21f96a4eb7 | ||
|
39b5124526 | ||
|
93e50dde10 | ||
|
e383da5d44 | ||
|
9b687f380c | ||
|
82abede64a | ||
|
a56ab406e4 | ||
|
d753941c6e | ||
|
6022eb0838 | ||
|
1c6d0912cd | ||
|
e18804c31e | ||
|
133a2c8833 | ||
|
fad0865b2b | ||
|
4edef07182 | ||
|
19c6ce7c06 | ||
|
3fa76a874f | ||
|
6e0fd6f257 | ||
|
c91d9b61c8 | ||
|
76eeb5aa18 | ||
|
843b5e33d6 |
22
README.md
22
README.md
@@ -107,9 +107,21 @@ Depending on the environment this is either an instance of [node-webcrypto-ossl]
|
|||||||
|
|
||||||
### `keys`
|
### `keys`
|
||||||
|
|
||||||
|
#### Supported Key Types
|
||||||
|
|
||||||
|
The [`generateKeyPair`](#generatekeypairtype-bits-callback), [`marshalPublicKey`](#marshalpublickeykey-type-callback), and
|
||||||
|
[`marshalPrivateKey`](#marshalprivatekeykey-type) functions accept a string `type` argument.
|
||||||
|
|
||||||
|
Currently the `'RSA'` and `'ed25519'` types are supported, although ed25519 keys support only signing and
|
||||||
|
verification of messages. For encryption / decryption support, RSA keys should be used.
|
||||||
|
|
||||||
|
Installing the [libp2p-crypto-secp256k1](https://github.com/libp2p/js-libp2p-crypto-secp256k1) module adds support for the
|
||||||
|
`'secp256k1'` type, which supports ECDSA signatures using the secp256k1 elliptic curve popularized by Bitcoin. This module
|
||||||
|
is not installed by default, and should be explicitly depended on if your project requires secp256k1 support.
|
||||||
|
|
||||||
### `generateKeyPair(type, bits, callback)`
|
### `generateKeyPair(type, bits, callback)`
|
||||||
|
|
||||||
- `type: String`, only `'RSA'` is currently supported
|
- `type: String`, see [Supported Key Types](#supported-key-types) above.
|
||||||
- `bits: Number` Minimum of 1024
|
- `bits: Number` Minimum of 1024
|
||||||
- `callback: Function`
|
- `callback: Function`
|
||||||
|
|
||||||
@@ -160,8 +172,8 @@ Calls back with an object of the form
|
|||||||
|
|
||||||
### `marshalPublicKey(key[, type], callback)`
|
### `marshalPublicKey(key[, type], callback)`
|
||||||
|
|
||||||
- `key: crypto.rsa.RsaPublicKey`
|
- `key: keys.rsa.RsaPublicKey | keys.ed25519.Ed25519PublicKey | require('libp2p-crypto-secp256k1').Secp256k1PublicKey`
|
||||||
- `type: String`, only `'RSA'` is currently supported
|
- `type: String`, see [Supported Key Types](#supported-key-types) above.
|
||||||
|
|
||||||
Converts a public key object into a protobuf serialized public key.
|
Converts a public key object into a protobuf serialized public key.
|
||||||
|
|
||||||
@@ -173,8 +185,8 @@ Converts a protobuf serialized public key into its representative object.
|
|||||||
|
|
||||||
### `marshalPrivateKey(key[, type])`
|
### `marshalPrivateKey(key[, type])`
|
||||||
|
|
||||||
- `key: crypto.rsa.RsaPrivateKey`
|
- `key: keys.rsa.RsaPrivateKey | keys.ed25519.Ed25519PrivateKey | require('libp2p-crypto-secp256k1').Secp256k1PrivateKey`
|
||||||
- `type: String`, only `'RSA'` is currently supported
|
- `type: String`, see [Supported Key Types](#supported-key-types) above.
|
||||||
|
|
||||||
Converts a private key object into a protobuf serialized private key.
|
Converts a private key object into a protobuf serialized private key.
|
||||||
|
|
||||||
|
30
package.json
30
package.json
@@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"name": "libp2p-crypto",
|
"name": "libp2p-crypto",
|
||||||
"version": "0.7.7",
|
"version": "0.8.5",
|
||||||
"description": "Crypto primitives for libp2p",
|
"description": "Crypto primitives for libp2p",
|
||||||
"main": "src/index.js",
|
"main": "src/index.js",
|
||||||
"browser": {
|
"browser": {
|
||||||
@@ -17,10 +17,10 @@
|
|||||||
"test": "npm run test:node && npm run test:no-webcrypto && npm run test:browser",
|
"test": "npm run test:node && npm run test:no-webcrypto && npm run test:browser",
|
||||||
"test:node": "aegir-test --env node",
|
"test:node": "aegir-test --env node",
|
||||||
"test:no-webcrypto": "NO_WEBCRYPTO=true aegir-test --env node",
|
"test:no-webcrypto": "NO_WEBCRYPTO=true aegir-test --env node",
|
||||||
"test:browser": "aegir-test --env browser --webworker",
|
"test:browser": "aegir-test --env browser",
|
||||||
"release": "aegir-release --webworker",
|
"release": "aegir-release",
|
||||||
"release-minor": "aegir-release --type minor --webworker",
|
"release-minor": "aegir-release --type minor",
|
||||||
"release-major": "aegir-release --type major --webworker",
|
"release-major": "aegir-release --type major",
|
||||||
"coverage": "aegir-coverage",
|
"coverage": "aegir-coverage",
|
||||||
"coverage-publish": "aegir-coverage publish"
|
"coverage-publish": "aegir-coverage publish"
|
||||||
},
|
},
|
||||||
@@ -37,7 +37,8 @@
|
|||||||
"async": "^2.1.4",
|
"async": "^2.1.4",
|
||||||
"browserify-aes": "^1.0.6",
|
"browserify-aes": "^1.0.6",
|
||||||
"keypair": "^1.0.1",
|
"keypair": "^1.0.1",
|
||||||
"multihashing-async": "^0.4.0",
|
"libp2p-crypto-secp256k1": "^0.1.3",
|
||||||
|
"multihashing-async": "~0.4.2",
|
||||||
"nodeify": "^1.0.0",
|
"nodeify": "^1.0.0",
|
||||||
"pem-jwk": "^1.5.1",
|
"pem-jwk": "^1.5.1",
|
||||||
"protocol-buffers": "^3.2.1",
|
"protocol-buffers": "^3.2.1",
|
||||||
@@ -47,37 +48,38 @@
|
|||||||
"webcrypto-shim": "github:dignifiedquire/webcrypto-shim#master"
|
"webcrypto-shim": "github:dignifiedquire/webcrypto-shim#master"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"aegir": "^9.4.0",
|
"aegir": "^10.0.0",
|
||||||
"benchmark": "^2.1.3",
|
"benchmark": "^2.1.3",
|
||||||
"chai": "^3.5.0",
|
"chai": "^3.5.0",
|
||||||
"pre-commit": "^1.2.2"
|
"pre-commit": "^1.2.2"
|
||||||
},
|
},
|
||||||
"optionalDependencies": {
|
"optionalDependencies": {
|
||||||
"node-webcrypto-ossl": "^1.0.16"
|
"node-webcrypto-ossl": "^1.0.17"
|
||||||
},
|
},
|
||||||
"pre-commit": [
|
"pre-commit": [
|
||||||
"lint",
|
"lint",
|
||||||
"test"
|
"test"
|
||||||
],
|
],
|
||||||
"engines": {
|
"engines": {
|
||||||
"node": ">=4.0.0"
|
"node": ">=4.0.0",
|
||||||
|
"npm": ">=3.0.0"
|
||||||
},
|
},
|
||||||
"repository": {
|
"repository": {
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://github.com/ipfs/js-libp2p-crypto.git"
|
"url": "https://github.com/libp2p/js-libp2p-crypto.git"
|
||||||
},
|
},
|
||||||
"bugs": {
|
"bugs": {
|
||||||
"url": "https://github.com/ipfs/js-libp2p-crypto/issues"
|
"url": "https://github.com/libp2p/js-libp2p-crypto/issues"
|
||||||
},
|
},
|
||||||
"homepage": "https://github.com/ipfs/js-libp2p-crypto",
|
"homepage": "https://github.com/libp2p/js-libp2p-crypto",
|
||||||
"contributors": [
|
"contributors": [
|
||||||
"David Dias <daviddias.p@gmail.com>",
|
"David Dias <daviddias.p@gmail.com>",
|
||||||
|
"Dmitriy Ryajov <dryajov@gmail.com>",
|
||||||
"Friedel Ziegelmayer <dignifiedquire@gmail.com>",
|
"Friedel Ziegelmayer <dignifiedquire@gmail.com>",
|
||||||
"Greenkeeper <support@greenkeeper.io>",
|
|
||||||
"Richard Littauer <richard.littauer@gmail.com>",
|
"Richard Littauer <richard.littauer@gmail.com>",
|
||||||
"Tom Swindell <t.swindell@rubyx.co.uk>",
|
"Tom Swindell <t.swindell@rubyx.co.uk>",
|
||||||
"Yusef Napora <yusef@napora.org>",
|
"Yusef Napora <yusef@napora.org>",
|
||||||
"dryajov <dryajov@gmail.com>",
|
"greenkeeperio-bot <support@greenkeeper.io>",
|
||||||
"nikuda <nikuda@gmail.com>"
|
"nikuda <nikuda@gmail.com>"
|
||||||
]
|
]
|
||||||
}
|
}
|
@@ -3,6 +3,7 @@
|
|||||||
module.exports = `enum KeyType {
|
module.exports = `enum KeyType {
|
||||||
RSA = 0;
|
RSA = 0;
|
||||||
Ed25519 = 1;
|
Ed25519 = 1;
|
||||||
|
Secp256k1 = 2;
|
||||||
}
|
}
|
||||||
|
|
||||||
message PublicKey {
|
message PublicKey {
|
||||||
|
@@ -3,12 +3,12 @@
|
|||||||
'use strict'
|
'use strict'
|
||||||
|
|
||||||
module.exports = function getWebCrypto () {
|
module.exports = function getWebCrypto () {
|
||||||
if (typeof window !== 'undefined') {
|
if (typeof self !== 'undefined') {
|
||||||
// This is only a shim for interfaces, not for functionality
|
// This is only a shim for interfaces, not for functionality
|
||||||
require('webcrypto-shim')(window)
|
require('webcrypto-shim')(self)
|
||||||
|
|
||||||
if (window.crypto) {
|
if (self.crypto) {
|
||||||
return window.crypto
|
return self.crypto
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
23
src/index.js
23
src/index.js
@@ -5,12 +5,17 @@ const protobuf = require('protocol-buffers')
|
|||||||
const pbm = protobuf(require('./crypto.proto'))
|
const pbm = protobuf(require('./crypto.proto'))
|
||||||
const c = require('./crypto')
|
const c = require('./crypto')
|
||||||
|
|
||||||
|
exports.protobuf = pbm
|
||||||
|
|
||||||
exports.hmac = c.hmac
|
exports.hmac = c.hmac
|
||||||
exports.aes = c.aes
|
exports.aes = c.aes
|
||||||
exports.webcrypto = c.webcrypto
|
exports.webcrypto = c.webcrypto
|
||||||
|
|
||||||
const keys = exports.keys = require('./keys')
|
const keys = exports.keys = require('./keys')
|
||||||
const KEY_TYPES = ['rsa', 'ed25519']
|
function isValidKeyType (keyType) {
|
||||||
|
const key = keys[keyType.toLowerCase()]
|
||||||
|
return key !== undefined
|
||||||
|
}
|
||||||
|
|
||||||
exports.keyStretcher = require('./key-stretcher')
|
exports.keyStretcher = require('./key-stretcher')
|
||||||
exports.generateEphemeralKeyPair = require('./ephemeral-keys')
|
exports.generateEphemeralKeyPair = require('./ephemeral-keys')
|
||||||
@@ -35,6 +40,12 @@ exports.unmarshalPublicKey = (buf) => {
|
|||||||
return keys.rsa.unmarshalRsaPublicKey(decoded.Data)
|
return keys.rsa.unmarshalRsaPublicKey(decoded.Data)
|
||||||
case pbm.KeyType.Ed25519:
|
case pbm.KeyType.Ed25519:
|
||||||
return keys.ed25519.unmarshalEd25519PublicKey(decoded.Data)
|
return keys.ed25519.unmarshalEd25519PublicKey(decoded.Data)
|
||||||
|
case pbm.KeyType.Secp256k1:
|
||||||
|
if (keys.secp256k1) {
|
||||||
|
return keys.secp256k1.unmarshalSecp256k1PublicKey(decoded.Data)
|
||||||
|
} else {
|
||||||
|
throw new Error('secp256k1 support requires libp2p-crypto-secp256k1 package')
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
throw new Error('invalid or unsupported key type')
|
throw new Error('invalid or unsupported key type')
|
||||||
}
|
}
|
||||||
@@ -43,7 +54,7 @@ exports.unmarshalPublicKey = (buf) => {
|
|||||||
// Converts a public key object into a protobuf serialized public key
|
// Converts a public key object into a protobuf serialized public key
|
||||||
exports.marshalPublicKey = (key, type) => {
|
exports.marshalPublicKey = (key, type) => {
|
||||||
type = (type || 'rsa').toLowerCase()
|
type = (type || 'rsa').toLowerCase()
|
||||||
if (KEY_TYPES.indexOf(type) < 0) {
|
if (!isValidKeyType(type)) {
|
||||||
throw new Error('invalid or unsupported key type')
|
throw new Error('invalid or unsupported key type')
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -60,6 +71,12 @@ exports.unmarshalPrivateKey = (buf, callback) => {
|
|||||||
return keys.rsa.unmarshalRsaPrivateKey(decoded.Data, callback)
|
return keys.rsa.unmarshalRsaPrivateKey(decoded.Data, callback)
|
||||||
case pbm.KeyType.Ed25519:
|
case pbm.KeyType.Ed25519:
|
||||||
return keys.ed25519.unmarshalEd25519PrivateKey(decoded.Data, callback)
|
return keys.ed25519.unmarshalEd25519PrivateKey(decoded.Data, callback)
|
||||||
|
case pbm.KeyType.Secp256k1:
|
||||||
|
if (keys.secp256k1) {
|
||||||
|
return keys.secp256k1.unmarshalSecp256k1PrivateKey(decoded.Data, callback)
|
||||||
|
} else {
|
||||||
|
return callback(new Error('secp256k1 support requires libp2p-crypto-secp256k1 package'))
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
callback(new Error('invalid or unsupported key type'))
|
callback(new Error('invalid or unsupported key type'))
|
||||||
}
|
}
|
||||||
@@ -68,7 +85,7 @@ exports.unmarshalPrivateKey = (buf, callback) => {
|
|||||||
// Converts a private key object into a protobuf serialized private key
|
// Converts a private key object into a protobuf serialized private key
|
||||||
exports.marshalPrivateKey = (key, type) => {
|
exports.marshalPrivateKey = (key, type) => {
|
||||||
type = (type || 'rsa').toLowerCase()
|
type = (type || 'rsa').toLowerCase()
|
||||||
if (KEY_TYPES.indexOf(type) < 0) {
|
if (!isValidKeyType(type)) {
|
||||||
throw new Error('invalid or unsupported key type')
|
throw new Error('invalid or unsupported key type')
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -2,5 +2,6 @@
|
|||||||
|
|
||||||
module.exports = {
|
module.exports = {
|
||||||
rsa: require('./rsa'),
|
rsa: require('./rsa'),
|
||||||
ed25519: require('./ed25519')
|
ed25519: require('./ed25519'),
|
||||||
|
secp256k1: require('libp2p-crypto-secp256k1')
|
||||||
}
|
}
|
||||||
|
11
test/fixtures/secp256k1.js
vendored
Normal file
11
test/fixtures/secp256k1.js
vendored
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
'use strict'
|
||||||
|
|
||||||
|
const Buffer = require('safe-buffer').Buffer
|
||||||
|
|
||||||
|
module.exports = {
|
||||||
|
|
||||||
|
// protobuf marshaled key pair generated with libp2p-crypto-secp256k1
|
||||||
|
// and marshaled with libp2p-crypto.marshalPublicKey / marshalPrivateKey
|
||||||
|
pbmPrivateKey: Buffer.from('08021220e0600103010000000100000000000000be1dc82c2e000000e8d6030301000000', 'hex'),
|
||||||
|
pbmPublicKey: Buffer.from('0802122103a9a7272a726fa083abf31ba44037f8347fbc5e5d3113d62a7c6bc26752fd8ee1', 'hex')
|
||||||
|
}
|
@@ -23,9 +23,17 @@ describe('libp2p-crypto', () => {
|
|||||||
const key2 = crypto.unmarshalPublicKey(crypto.marshalPublicKey(key.public))
|
const key2 = crypto.unmarshalPublicKey(crypto.marshalPublicKey(key.public))
|
||||||
|
|
||||||
expect(key2.equals(key.public)).to.be.eql(true)
|
expect(key2.equals(key.public)).to.be.eql(true)
|
||||||
|
|
||||||
|
expect(() => {
|
||||||
|
crypto.marshalPublicKey(key.public, 'invalid-key-type')
|
||||||
|
}).to.throw()
|
||||||
})
|
})
|
||||||
|
|
||||||
it('marshalPrivateKey and unmarshalPrivateKey', (done) => {
|
it('marshalPrivateKey and unmarshalPrivateKey', (done) => {
|
||||||
|
expect(() => {
|
||||||
|
crypto.marshalPrivateKey(key, 'invalid-key-type')
|
||||||
|
}).to.throw()
|
||||||
|
|
||||||
crypto.unmarshalPrivateKey(crypto.marshalPrivateKey(key), (err, key2) => {
|
crypto.unmarshalPrivateKey(crypto.marshalPrivateKey(key), (err, key2) => {
|
||||||
if (err) {
|
if (err) {
|
||||||
return done(err)
|
return done(err)
|
||||||
@@ -103,7 +111,7 @@ describe('libp2p-crypto', () => {
|
|||||||
it('throws with no number passed', () => {
|
it('throws with no number passed', () => {
|
||||||
expect(() => {
|
expect(() => {
|
||||||
crypto.randomBytes()
|
crypto.randomBytes()
|
||||||
}).to.throw
|
}).to.throw()
|
||||||
})
|
})
|
||||||
|
|
||||||
it('generates different random things', () => {
|
it('generates different random things', () => {
|
||||||
|
104
test/secp256k1.spec.js
Normal file
104
test/secp256k1.spec.js
Normal file
@@ -0,0 +1,104 @@
|
|||||||
|
/* eslint-env mocha */
|
||||||
|
'use strict'
|
||||||
|
|
||||||
|
const expect = require('chai').expect
|
||||||
|
const fixtures = require('./fixtures/secp256k1')
|
||||||
|
const crypto = require('../src')
|
||||||
|
|
||||||
|
const mockPublicKey = {
|
||||||
|
bytes: fixtures.pbmPublicKey
|
||||||
|
}
|
||||||
|
|
||||||
|
const mockPrivateKey = {
|
||||||
|
bytes: fixtures.pbmPrivateKey,
|
||||||
|
public: mockPublicKey
|
||||||
|
}
|
||||||
|
|
||||||
|
const mockSecp256k1Module = {
|
||||||
|
generateKeyPair (bits, callback) {
|
||||||
|
callback(null, mockPrivateKey)
|
||||||
|
},
|
||||||
|
|
||||||
|
unmarshalSecp256k1PrivateKey (buf, callback) {
|
||||||
|
callback(null, mockPrivateKey)
|
||||||
|
},
|
||||||
|
|
||||||
|
unmarshalSecp256k1PublicKey (buf) {
|
||||||
|
return mockPublicKey
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
describe('with libp2p-crypto-secp256k1 module present', () => {
|
||||||
|
let key
|
||||||
|
|
||||||
|
before((done) => {
|
||||||
|
crypto.keys['secp256k1'] = mockSecp256k1Module
|
||||||
|
crypto.generateKeyPair('secp256k1', 256, (err, _key) => {
|
||||||
|
if (err) return done(err)
|
||||||
|
key = _key
|
||||||
|
done()
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
after((done) => {
|
||||||
|
delete crypto.keys['secp256k1']
|
||||||
|
done()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('generates a valid key', (done) => {
|
||||||
|
expect(
|
||||||
|
key
|
||||||
|
).to.exist
|
||||||
|
done()
|
||||||
|
})
|
||||||
|
|
||||||
|
it('protobuf encoding', (done) => {
|
||||||
|
const keyMarshal = crypto.marshalPrivateKey(key)
|
||||||
|
crypto.unmarshalPrivateKey(keyMarshal, (err, key2) => {
|
||||||
|
if (err) return done(err)
|
||||||
|
const keyMarshal2 = crypto.marshalPrivateKey(key2)
|
||||||
|
|
||||||
|
expect(
|
||||||
|
keyMarshal
|
||||||
|
).to.be.eql(
|
||||||
|
keyMarshal2
|
||||||
|
)
|
||||||
|
|
||||||
|
const pk = key.public
|
||||||
|
const pkMarshal = crypto.marshalPublicKey(pk)
|
||||||
|
const pk2 = crypto.unmarshalPublicKey(pkMarshal)
|
||||||
|
const pkMarshal2 = crypto.marshalPublicKey(pk2)
|
||||||
|
|
||||||
|
expect(
|
||||||
|
pkMarshal
|
||||||
|
).to.be.eql(
|
||||||
|
pkMarshal2
|
||||||
|
)
|
||||||
|
done()
|
||||||
|
})
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
describe('without libp2p-crypto-secp256k1 module present', () => {
|
||||||
|
it('fails to generate a secp256k1 key', (done) => {
|
||||||
|
crypto.generateKeyPair('secp256k1', 256, (err, key) => {
|
||||||
|
expect(err).to.exist
|
||||||
|
expect(key).to.not.exist
|
||||||
|
done()
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
it('fails to unmarshal a secp256k1 private key', (done) => {
|
||||||
|
crypto.unmarshalPrivateKey(fixtures.pbmPrivateKey, (err, key) => {
|
||||||
|
expect(err).to.exist
|
||||||
|
expect(key).to.not.exist
|
||||||
|
done()
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
it('fails to unmarshal a secp256k1 public key', () => {
|
||||||
|
expect(() => {
|
||||||
|
crypto.unmarshalPublicKey(fixtures.pbmPublicKey)
|
||||||
|
}).to.throw(Error)
|
||||||
|
})
|
||||||
|
})
|
Reference in New Issue
Block a user