UNPKG

ox

Version:

Ethereum Standard Library

179 lines 6.46 kB
import { p256 } from '@noble/curves/p256'; import * as Bytes from './Bytes.js'; import * as Hex from './Hex.js'; import * as PublicKey from './PublicKey.js'; /** * Generates an ECDSA P256 key pair that includes: * * - a `privateKey` of type [`CryptoKey`](https://developer.mozilla.org/en-US/docs/Web/API/CryptoKey) * * - a `publicKey` of type {@link ox#Hex.Hex} or {@link ox#Bytes.Bytes} * * @example * ```ts twoslash * import { WebCryptoP256 } from 'ox' * * const { publicKey, privateKey } = await WebCryptoP256.createKeyPair() * // @log: { * // @log: privateKey: CryptoKey {}, * // @log: publicKey: { * // @log: x: 59295962801117472859457908919941473389380284132224861839820747729565200149877n, * // @log: y: 24099691209996290925259367678540227198235484593389470330605641003500238088869n, * // @log: prefix: 4, * // @log: }, * // @log: } * ``` * * @param options - Options for creating the key pair. * @returns The key pair. */ export async function createKeyPair(options = {}) { const { extractable = false } = options; const keypair = await globalThis.crypto.subtle.generateKey({ name: 'ECDSA', namedCurve: 'P-256', }, extractable, ['sign', 'verify']); const publicKey_raw = await globalThis.crypto.subtle.exportKey('raw', keypair.publicKey); const publicKey = PublicKey.from(new Uint8Array(publicKey_raw)); return { privateKey: keypair.privateKey, publicKey, }; } /** * Generates an ECDH P256 key pair for key agreement that includes: * * - a `privateKey` of type [`CryptoKey`](https://developer.mozilla.org/en-US/docs/Web/API/CryptoKey) * - a `publicKey` of type {@link ox#PublicKey.PublicKey} * * @example * ```ts twoslash * import { WebCryptoP256 } from 'ox' * * const { publicKey, privateKey } = await WebCryptoP256.createKeyPairECDH() * // @log: { * // @log: privateKey: CryptoKey {}, * // @log: publicKey: { * // @log: x: 59295962801117472859457908919941473389380284132224861839820747729565200149877n, * // @log: y: 24099691209996290925259367678540227198235484593389470330605641003500238088869n, * // @log: prefix: 4, * // @log: }, * // @log: } * ``` * * @param options - Options for creating the key pair. * @returns The key pair. */ export async function createKeyPairECDH(options = {}) { const { extractable = false } = options; const keypair = await globalThis.crypto.subtle.generateKey({ name: 'ECDH', namedCurve: 'P-256', }, extractable, ['deriveKey', 'deriveBits']); const publicKey_raw = await globalThis.crypto.subtle.exportKey('raw', keypair.publicKey); const publicKey = PublicKey.from(new Uint8Array(publicKey_raw)); return { privateKey: keypair.privateKey, publicKey, }; } /** * Computes a shared secret using ECDH (Elliptic Curve Diffie-Hellman) between a private key and a public key using Web Crypto APIs. * * @example * ```ts twoslash * import { WebCryptoP256 } from 'ox' * * const { privateKey: privateKeyA } = await WebCryptoP256.createKeyPairECDH() * const { publicKey: publicKeyB } = await WebCryptoP256.createKeyPairECDH() * * const sharedSecret = await WebCryptoP256.getSharedSecret({ * privateKey: privateKeyA, * publicKey: publicKeyB * }) * ``` * * @param options - The options to compute the shared secret. * @returns The computed shared secret. */ export async function getSharedSecret(options) { const { as = 'Hex', privateKey, publicKey } = options; if (privateKey.algorithm.name === 'ECDSA') { throw new Error('privateKey is not compatible with ECDH. please use `createKeyPairECDH` to create an ECDH key.'); } const publicKeyCrypto = await globalThis.crypto.subtle.importKey('raw', PublicKey.toBytes(publicKey), { name: 'ECDH', namedCurve: 'P-256' }, false, []); const sharedSecretBuffer = await globalThis.crypto.subtle.deriveBits({ name: 'ECDH', public: publicKeyCrypto, }, privateKey, 256); const sharedSecret = new Uint8Array(sharedSecretBuffer); if (as === 'Hex') return Hex.fromBytes(sharedSecret); return sharedSecret; } /** * Signs a payload with the provided `CryptoKey` private key and returns a P256 signature. * * @example * ```ts twoslash * import { WebCryptoP256 } from 'ox' * * const { privateKey } = await WebCryptoP256.createKeyPair() * * const signature = await WebCryptoP256.sign({ // [!code focus] * payload: '0xdeadbeef', // [!code focus] * privateKey, // [!code focus] * }) // [!code focus] * // @log: { * // @log: r: 151231...4423n, * // @log: s: 516123...5512n, * // @log: } * ``` * * @param options - Options for signing the payload. * @returns The P256 ECDSA {@link ox#Signature.Signature}. */ export async function sign(options) { const { payload, privateKey } = options; const signature = await globalThis.crypto.subtle.sign({ name: 'ECDSA', hash: 'SHA-256', }, privateKey, Bytes.from(payload)); const signature_bytes = Bytes.fromArray(new Uint8Array(signature)); const r = Bytes.toBigInt(Bytes.slice(signature_bytes, 0, 32)); let s = Bytes.toBigInt(Bytes.slice(signature_bytes, 32, 64)); if (s > p256.CURVE.n / 2n) s = p256.CURVE.n - s; return { r, s }; } /** * Verifies a payload was signed by the provided public key. * * @example * * ```ts twoslash * import { WebCryptoP256 } from 'ox' * * const { privateKey, publicKey } = await WebCryptoP256.createKeyPair() * const signature = await WebCryptoP256.sign({ payload: '0xdeadbeef', privateKey }) * * const verified = await WebCryptoP256.verify({ // [!code focus] * payload: '0xdeadbeef', // [!code focus] * publicKey, // [!code focus] * signature, // [!code focus] * }) // [!code focus] * // @log: true * ``` * * @param options - The verification options. * @returns Whether the payload was signed by the provided public key. */ export async function verify(options) { const { payload, signature } = options; const publicKey = await globalThis.crypto.subtle.importKey('raw', PublicKey.toBytes(options.publicKey), { name: 'ECDSA', namedCurve: 'P-256' }, true, ['verify']); return await globalThis.crypto.subtle.verify({ name: 'ECDSA', hash: 'SHA-256', }, publicKey, Bytes.concat(Bytes.fromNumber(signature.r), Bytes.fromNumber(signature.s)), Bytes.from(payload)); } //# sourceMappingURL=WebCryptoP256.js.map