UNPKG

@kya-os/mcp-bri

Version:

Give your MCP server cryptographic identity in 2 lines of code

117 lines 4.17 kB
"use strict"; /** * Cryptographic utilities for MCP-I * Implements Ed25519 signing and verification for challenge-response authentication */ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || (function () { var ownKeys = function(o) { ownKeys = Object.getOwnPropertyNames || function (o) { var ar = []; for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k; return ar; }; return ownKeys(o); }; return function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]); __setModuleDefault(result, mod); return result; }; })(); Object.defineProperty(exports, "__esModule", { value: true }); exports.generateKeyPair = generateKeyPair; exports.sign = sign; exports.verify = verify; exports.generateNonce = generateNonce; exports.constantTimeEqual = constantTimeEqual; exports.publicKeyToDid = publicKeyToDid; const ed25519 = __importStar(require("@noble/ed25519")); const crypto_1 = require("crypto"); /** * Generate a new Ed25519 key pair */ async function generateKeyPair() { const privateKey = ed25519.utils.randomPrivateKey(); const publicKey = await ed25519.getPublicKeyAsync(privateKey); return { publicKey: Buffer.from(publicKey).toString('base64'), privateKey: Buffer.from(privateKey).toString('base64') }; } /** * Sign a message with Ed25519 */ async function sign(message, privateKeyBase64) { const messageBuffer = typeof message === 'string' ? Buffer.from(message, 'utf-8') : message; const privateKey = Buffer.from(privateKeyBase64, 'base64'); const signature = await ed25519.signAsync(messageBuffer, privateKey); return Buffer.from(signature).toString('base64'); } /** * Verify an Ed25519 signature */ async function verify(message, signatureBase64, publicKeyBase64) { try { const messageBuffer = typeof message === 'string' ? Buffer.from(message, 'utf-8') : message; const signature = Buffer.from(signatureBase64, 'base64'); const publicKey = Buffer.from(publicKeyBase64, 'base64'); return await ed25519.verifyAsync(signature, messageBuffer, publicKey); } catch { return false; } } /** * Generate a cryptographically secure nonce */ function generateNonce(length = 32) { return (0, crypto_1.randomBytes)(length).toString('hex'); } /** * Constant-time string comparison to prevent timing attacks */ function constantTimeEqual(a, b) { if (a.length !== b.length) { return false; } let result = 0; for (let i = 0; i < a.length; i++) { result |= a.charCodeAt(i) ^ b.charCodeAt(i); } return result === 0; } /** * Convert Ed25519 public key to did:key format */ function publicKeyToDid(publicKeyBase64) { const publicKey = Buffer.from(publicKeyBase64, 'base64'); // Multicodec ed25519-pub header (0xed 0x01) const multicodec = Buffer.from([0xed, 0x01]); const multikey = Buffer.concat([multicodec, publicKey]); // Base58 encode (simplified - in production use a proper base58 library) // For now, just return a placeholder return `did:key:z${multikey.toString('base64').replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '')}`; } //# sourceMappingURL=crypto.js.map