universa-wasm
    TypeScript icon, indicating that this package has built-in type declarations

    0.4.2 • Public • Published

    universa-wasm

    Minimalistic Javascript library required to perform basic operations with Universa smart contracts and other objects. WASM version

    Supports:

    Installation

    Node.js

    For usage in an existing Node.js project, add it to your dependencies:

    $ npm install universa-wasm
    

    or with yarn:

    $ yarn add universa-wasm
    

    And use it with the following line wherever you need it.

    const Minicrypto = require('universa-minicrypto');

    Web

    In root folder of package run

    npm install
    npm run build

    In folder dist there will be minicrypto.min.js, crypto.js, crypto.wasm. Also there will be *.LICENSE files.

    Copy files to your scripts folder and set them in order. Also, wait for initalization:

    <script src="path/to/crypto.js"></script>
    <script src="path/to/minicrypto.min.js"></script>
     
    <script>
      async function main() {
        // Example of key generation
        const options = { strength: 2048 };
        const priv = await Minicrypto.PrivateKey.generate(options);
        console.log(priv);
      }
     
      main();
    </script> 

    Usage

    Signed record

    Pack data to signed record (Uint8Array) with key:

    const { SignedRecord, decode64, PrivateKey } = Minicrypto;
     
    const payload = { ab: "cd" };
    const nonce = decode64("abc");
    const key = await PrivateKey.unpack(privateKeyPacked);
     
    const recordBinary = await SignedRecord.packWithKey(key, payload, nonce); // Uint8Array

    Unpack signed record:

    const { SignedRecord, decode64, PrivateKey } = Minicrypto;
     
    const payload = { ab: "cd" };
    const nonce = decode64("abc");
    const key = await PrivateKey.unpack(privateKeyPacked);
     
    const recordBinary = await SignedRecord.packWithKey(key, payload, nonce); // Uint8Array
     
    const record = await SignedRecord.unpack(recordBinary);
     
    record.recordType === SignedRecord.RECORD_WITH_KEY; // true
    record.nonce // nonce
    record.payload // payload
    record.key // PublicKey

    Misc

    Random byte array for given length

    const { randomBytes } = Minicrypto;
    const bytes16 = randomBytes(16); // Uint8Array

    HashId for binary data

    const { hashId } = Minicrypto;
    const id = await hashId(decode64("abc")); // Uint8Array

    CRC32

    const { crc32 } = Minicrypto;
    const digest = crc32(decode64("abc")); // Uint8Array

    Converters

    Convert byte array to hex string and back

        const { bytesToHex, hexToBytes } = Minicrypto;
        const hexString = bytesToHex(uint8arr);  // String
        const bytesArray = hexToBytes(hexString); // Uint8Array

    Convert plain text to bytes and back

      const { textToBytes, bytesToText } = Minicrypto;
      const bytes = textToBytes("one two three"); // Uint8Array
      const text = bytesToText(bytes); // "one two three"

    Convert bytes to base64 and back

    const { encode64, encode64Short, decode64 } = Minicrypto;
    const bytes = decode64("abc"); // Uint8Array
    const base64str = encode64(bytes); // String
     
    // short representation of base64 string
    const base64ShortString = encode64Short(bytes);

    Convert bytes to base58 and back

    const { encode58, decode58 } = Minicrypto;
    const bytes = decode58("abc"); // Uint8Array
    const base58str = encode58(bytes); // String

    SHA

    Supports SHA256, SHA512, SHA1, SHA3(256, 384, 512)

    Get instant hash value for given byte array

    const { SHA } = Minicrypto;
     
    const resultBytes1 = await SHA.getDigest('sha256', textToBytes('somevalue')); // Uint8Array

    Get hash value for large data

    const { SHA } = Minicrypto;
    const sha512 = new SHA(512);
     
    await sha512.put(dataPart1); // dataPart1 is Uint8Array
    await sha512.put(dataPart2);
    // .....
    await sha512.put(dataPartFinal);
     
    const resultBytes = await sha512.get(); // Uint8Array

    Get hash value in HEX

    const { SHA } = Minicrypto;
    const sha256 = new SHA(256);
    const hexResult = await sha256.get(textToBytes("one two three"), 'hex'); // String

    HMAC

    const { SHA, HMAC } = Minicrypto;
    const data = textToBytes('a quick brown for his done something disgusting');
    const key = textToBytes('1234567890abcdef1234567890abcdef');
     
    const hmac = new HMAC('sha256', key);
    const result = await hmac.get(data) // Uint8Array

    PBKDF2

    const { hexToBytes, pbkdf2, SHA } = Minicrypto;
     
    const derivedKey = await pbkdf2('sha256', {
      rounds: 1, // number of iterations
      keyLength: 20,  // bytes length
      password: 'password',
      salt: hexToBytes('abc123')
    }); // Uint8Array

    RSA Pair, keys helpers

    Private key unpack

    const { PrivateKey, decode64, BigInteger } = Minicrypto;
     
    const bossEncodedKey = decode64(keyPacked64);
     
    const privateKey2 = await PrivateKey.unpack(bossEncodedKey);
     
    // Read password-protected key
    const privateKey4 = await PrivateKey.unpack({
      bin: bossEncodedKey,
      password: "qwerty"
    });

    Public key unpack

    const { PublicKey, PrivateKey, decode64, BigInteger } = Minicrypto;
     
    const bossEncodedKey = decode64(keyPacked64);
    const privateKey1 = await PrivateKey.unpack(bossEncodedKey);
    const publicKey1 = privateKey1.publicKey;
     
    const publicKey2 = await PublicKey.unpack(bossEncodedPublicKey);

    Public key fingerprint

    publicKey.fingerprint; // fingerprint (Uint8Array)

    Public key bit strength

    publicKey.getBitStrength(); // number

    Public key address

    publicKey.shortAddress;   // short address (Uint8Array)
    publicKey.shortAddress58; // short address (base58)
    publicKey.longAddress;    // long address (Uint8Array)
    publicKey.longAddress58;  // long address (base58)

    Check if given address is valid

    const { PublicKey } = Minicrypto;
     
    PublicKey.isValidAddress(publicKey.shortAddress) // true
     
    // accepts base58 representation of address too
    PublicKey.isValidAddress(publicKey.shortAddress58) // true
     

    Generate private key

    const { PrivateKey } = Minicrypto;
     
    const options = { strength: 2048 };
    const priv = await PrivateKey.generate(options); // instance of PrivateKey

    Private(public) key - export

    const { PrivateKey } = Minicrypto;
    const bossEncodedKey = decode64(keyPacked64);
     
    const key = await PrivateKey.unpack(bossEncodedKey);
    const keyPacked = await key.pack(); // Uint8Array
    const keyPackedProtected = await key.pack("somepassword"); // Uint8Array
    const keyPackedProtected1000 = await key.pack({ password: "qwerty", rounds: 1000 });
     
    const bossEncodedPublic = await key.publicKey.packed();

    Get type of key package. There are 4 types of what key binary package may contain.

    AbstractKey.TYPE_PRIVATE - binary package of private key without password AbstractKey.TYPE_PUBLIC - binary package of public key without password AbstractKey.TYPE_PRIVATE_PASSWORD_V2 - binary package of private key with password (actual version) AbstractKey.TYPE_PRIVATE_PASSWORD_V1 - binary package of private key with password (deprecated version)

    const { AbstractKey } = Minicrypto;
     
    const bossEncoded = await privateKey.pack("somepassword");
     
    AbstractKey.typeOf(bossEncoded) === AbstractKey.TYPE_PRIVATE_PASSWORD_V2 // true

    KEY INFO

    Contains information about Key and helper to match keys compatibility

    Supported algorithms: RSAPublic, RSAPrivate, AES256

    Supported PRF: HMAC_SHA1, HMAC_SHA256, HMAC_SHA512

    const { KeyInfo} = Minicrypto;
    const keyInfo = new KeyInfo({
      algorithm: KeyInfo.Algorithm.AES256,
      tag: decode64("abc"), // Uint8Array
      keyLength: 32,        // Int
      prf: KeyInfo.PRF.HMAC_SHA256,
      rounds: 16000,        // number of iterations
      salt: decode64("bcd") // Uint8Array
    });
     

    Pack to BOSS

    const packed = keyInfo.pack(); // Uint8Array

    Read from BOSS

    // bossEncoded is Uint8Array
    const keyInfo = KeyInfo.unpack(bossEncoded); // KeyInfo

    Check that this key can decrypt other key

    const canDecrypt = keyInfo.matchType(otherKeyInfo); // boolean

    Derived key from password

    const derivedKey = await keyInfo.derivePassword("somepassword"); // Uint8Array

    SYMMETRIC KEY

    Symmetric key: main interface to the symmetric cipher. This implementation uses AES256 in CTR mode with IV to encrypt / decrypt.

    const { SymmetricKey } = Universa;
     
    // Creates random key (AES256, CTR)
    const symmetricKey = new SymmetricKey();
     
    // Creates key by derived key (Uint8Array) and it's info (KeyInfo)
    const symmetricKey2 = new SymmetricKey({
      keyBytes: derivedKey,
      keyInfo: keyInfo
    });
     
    // Creates key by derived key (Uint8Array)
    const symmetricKey2 = new SymmetricKey({
      keyBytes: derivedKey
    });
     
    // Creates key by password (String) and number of rounds (Int). Salt is optional
    // Uint8Array, null by default
    const symmetricKey3 = await SymmetricKey.fromPassword(password, rounds, salt);

    Pack symmetric key (get derived key bytes)

    const { SymmetricKey } = Universa;
     
    // Creates random key (AES256, CTR)
    const symmetricKey = new SymmetricKey();
     
    const derivedKey = symmetricKey.pack(); // Uint8Array

    Encrypt / decrypt data with AES256 in CRT mode with IV

    // data is Uint8Array
    const encrypted = symmetricKey.encrypt(data); // Uint8Array
    const decrypted = symmetricKey.decrypt(encrypted); // Uint8Array

    Encrypt / decrypt data with EtA using Sha256-based HMAC

    // data is Uint8Array
    const encrypted = await symmetricKey.etaEncrypt(data); // Uint8Array
    const decrypted = await symmetricKey.etaDecrypt(encrypted); // Uint8Array

    RSA OAEP/PSS

    OAEP encrypt/decrypt

    You can pass hash types with instances or with string types. Supported types for SHA: sha1 sha256 sha384 sha512 sha512/256 sha3_256 sha3_384 sha3_512

    const privateKey; // some PrivateKey instance
    const publicKey = privateKey.publicKey;
     
    // encrypt data
    const data = decode64("abc123");
    const options = {
      seed: decode64("abcabc"), // optional, default none
      mgf1Hash: 'sha512', // optional, default SHA(256)
      oaepHash: 'sha512' // optional, default SHA(256)
    };
    const encrypted = await publicKey.encrypt(data, options);
    const decrypted = await privateKey.decrypt(encrypted, options);
     
    encode64(data) === encode64(decrypted); // true

    OAEP max encryption message length

    const privateKey; // some PrivateKey instance
    const publicKey = privateKey.publicKey;
     
    // encrypt data
    const options = {
      seed: decode64("abcabc"), // optional, default none
      mgf1Hash: 'SHA512', // optional, default SHA(256)
      oaepHash: 'SHA512' // optional, default SHA(256)
    };
     
    const maxLength = publicKey.encryptionMaxLength(options);

    OAEP default hash

    publicKey.DEFAULT_OAEP_HASH // SHA1 instance

    MGF1 default hash

    publicKey.DEFAULT_MGF1_HASH // SHA1 instance

    PSS sign/verify

    You can pass hash types with instances or with string types. Supported types for SHA: sha1 sha256 sha384 sha512 sha512/256 sha3_256 sha3_384 sha3_512

    const privateKey; // some PrivateKey instance
    const publicKey = privateKey.publicKey;
     
    const options = {
      salt: decode64("abcabc"), // optional
      saltLength: null, // optional, numeric
      mgf1Hash: 'sha512', // optional, default SHA(256)
      pssHash: 'sha512' // optional, default SHA(256)
    };
     
    const message = 'abc123';
     
    const signature = await privateKey.sign(message, options);
    const isCorrect = await publicKey.verify(message, signature, options);
    console.log(isCorrect); // true

    Extended signature

    Sign/verify

    const { ExtendedSignature } = Minicrypto;
    const data = decode64("abcde12345");
    const privateKey; // some PrivateKey instance
    const publicKey = privateKey.publicKey;
     
    const signature = await privateKey.signExtended(data);
    const es = await publicKey.verifyExtended(signature, data);
     
    const isCorrect = !!es;
    console.log(es.created_at); // Date - signature created at
    console.log(es.key); // Uint8Array - PublicKey fingerprint
    console.log(ExtendedSignature.extractPublicKey(signature)); // PublicKey instance

    BOSS

    Encode/decode

    const { Boss } = Minicrypto;
    const boss = new Boss();
     
    const data = {
      a: decode64("abc")
      b: new Date(),
      c: [1, 2, 'test'],
      d: { a: 1 }
    };
     
    const encoded = boss.dump(data); // Uint8Array
    const decoded = boss.load(encoded); // original data

    Encode stream

    const writer = new Boss.writer();
     
    writer.write(0);
    writer.write(1);
    writer.write(2);
    writer.write(3);
     
    const dump = writer.get(); // Uint8Array

    Decode stream

    const reader = new Boss.reader(hexToBytes('00081018'));
     
    const arg1 = reader.read(); // 0
    const arg2 = reader.read(); // 1
    const arg3 = reader.read(); // 2
    const arg4 = reader.read(); // 3
    const arg5 = reader.read(); // undefined

    AES

    Encrypt/decrypt

    const { AES } = Minicrypto;
    const key = decode64("abc"); // 16 bytes for aes128, 32 bytes for aes256
    const message = textToBytes('some text');
     
    const aes256 = new AES(key);
    const encrypted = aes256.encrypt(message);   // Uint8Array
    const decrypted = aes256.decrypt(encrypted); // Uint8Array

    Create bundle

    Run in package root folder

    npm install
    npm run build

    In folder dist there will be universa.min.js, crypto.js, crypto.wasm. Also there will be *.LICENSE files.

    Running tests

    npm test

    Install

    npm i universa-wasm

    DownloadsWeekly Downloads

    1

    Version

    0.4.2

    License

    (BSD-3-Clause OR GPL-2.0)

    Unpacked Size

    3.98 MB

    Total Files

    70

    Last publish

    Collaborators

    • anzhu