@kya-os/mcp-bri
Version:
Give your MCP server cryptographic identity in 2 lines of code
117 lines • 4.17 kB
JavaScript
;
/**
* Cryptographic utilities for MCP-I
* Implements Ed25519 signing and verification for challenge-response authentication
*/
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
var desc = Object.getOwnPropertyDescriptor(m, k);
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
desc = { enumerable: true, get: function() { return m[k]; } };
}
Object.defineProperty(o, k2, desc);
}) : (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
o[k2] = m[k];
}));
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
Object.defineProperty(o, "default", { enumerable: true, value: v });
}) : function(o, v) {
o["default"] = v;
});
var __importStar = (this && this.__importStar) || (function () {
var ownKeys = function(o) {
ownKeys = Object.getOwnPropertyNames || function (o) {
var ar = [];
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
return ar;
};
return ownKeys(o);
};
return function (mod) {
if (mod && mod.__esModule) return mod;
var result = {};
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
__setModuleDefault(result, mod);
return result;
};
})();
Object.defineProperty(exports, "__esModule", { value: true });
exports.generateKeyPair = generateKeyPair;
exports.sign = sign;
exports.verify = verify;
exports.generateNonce = generateNonce;
exports.constantTimeEqual = constantTimeEqual;
exports.publicKeyToDid = publicKeyToDid;
const ed25519 = __importStar(require("@noble/ed25519"));
const crypto_1 = require("crypto");
/**
* Generate a new Ed25519 key pair
*/
async function generateKeyPair() {
const privateKey = ed25519.utils.randomPrivateKey();
const publicKey = await ed25519.getPublicKeyAsync(privateKey);
return {
publicKey: Buffer.from(publicKey).toString('base64'),
privateKey: Buffer.from(privateKey).toString('base64')
};
}
/**
* Sign a message with Ed25519
*/
async function sign(message, privateKeyBase64) {
const messageBuffer = typeof message === 'string'
? Buffer.from(message, 'utf-8')
: message;
const privateKey = Buffer.from(privateKeyBase64, 'base64');
const signature = await ed25519.signAsync(messageBuffer, privateKey);
return Buffer.from(signature).toString('base64');
}
/**
* Verify an Ed25519 signature
*/
async function verify(message, signatureBase64, publicKeyBase64) {
try {
const messageBuffer = typeof message === 'string'
? Buffer.from(message, 'utf-8')
: message;
const signature = Buffer.from(signatureBase64, 'base64');
const publicKey = Buffer.from(publicKeyBase64, 'base64');
return await ed25519.verifyAsync(signature, messageBuffer, publicKey);
}
catch {
return false;
}
}
/**
* Generate a cryptographically secure nonce
*/
function generateNonce(length = 32) {
return (0, crypto_1.randomBytes)(length).toString('hex');
}
/**
* Constant-time string comparison to prevent timing attacks
*/
function constantTimeEqual(a, b) {
if (a.length !== b.length) {
return false;
}
let result = 0;
for (let i = 0; i < a.length; i++) {
result |= a.charCodeAt(i) ^ b.charCodeAt(i);
}
return result === 0;
}
/**
* Convert Ed25519 public key to did:key format
*/
function publicKeyToDid(publicKeyBase64) {
const publicKey = Buffer.from(publicKeyBase64, 'base64');
// Multicodec ed25519-pub header (0xed 0x01)
const multicodec = Buffer.from([0xed, 0x01]);
const multikey = Buffer.concat([multicodec, publicKey]);
// Base58 encode (simplified - in production use a proper base58 library)
// For now, just return a placeholder
return `did:key:z${multikey.toString('base64').replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '')}`;
}
//# sourceMappingURL=crypto.js.map