Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
@solana/keys
Advanced tools
Helpers for generating and transforming key material
This package contains utilities for validating, generating, and manipulating addresses and key material. It can be used standalone, but it is also exported as part of the Solana JavaScript SDK @solana/web3.js@next
.
Signature
This type represents a 64-byte Ed25519 signature of some data with a private key, as a base58-encoded string.
SignatureBytes
This type represents a 64-byte Ed25519 signature of some data with a private key.
Whenever you need to verify that a particular signature is, in fact, the one that would have been produced by signing some known bytes using the private key associated with some known public key, use the verifySignature()
function in this package.
assertIsSignature()
From time to time you might acquire a string that you expect to be a base58-encoded signature (eg. of a transaction) from an untrusted network API or user input. To assert that such an arbitrary string is in fact an Ed25519 signature, use the assertIsSignature
function.
import { assertIsSignature } from '@solana/keys';
// Imagine a function that asserts whether a user-supplied signature is valid or not.
function handleSubmit() {
// We know only that what the user typed conforms to the `string` type.
const signature: string = signatureInput.value;
try {
// If this type assertion function doesn't throw, then
// Typescript will upcast `signature` to `Signature`.
assertIsSignature(signature);
// At this point, `signature` is a `Signature` that can be used with the RPC.
const {
value: [status],
} = await rpc.getSignatureStatuses([signature]).send();
} catch (e) {
// `signature` turned out not to be a base58-encoded signature
}
}
generateKeyPair()
Generates an Ed25519 public/private key pair for use with other methods in this package that accept CryptoKey
objects.
import { generateKeyPair } from '@solana/keys';
const { privateKey, publicKey } = await generateKeyPair();
createKeyPairFromBytes()
Given a 64-bytes Uint8Array
secret key, creates an Ed25519 public/private key pair for use with other methods in this package that accept CryptoKey
objects.
import fs from 'fs';
import { createKeyPairFromBytes } from '@solana/keys';
// Get bytes from local keypair file.
const keypairFile = fs.readFileSync('~/.config/solana/id.json');
const keypairBytes = new Uint8Array(JSON.parse(keypairFile.toString()));
// Create a CryptoKeyPair from the bytes.
const { privateKey, publicKey } = await createKeyPairFromBytes(keypairBytes);
createKeyPairFromPrivateKeyBytes()
Given a private key represented as a 32-bytes Uint8Array
, creates an Ed25519 public/private key pair for use with other methods in this package that accept CryptoKey
objects.
import { createKeyPairFromPrivateKeyBytes } from '@solana/keys';
const { privateKey, publicKey } = await createKeyPairFromPrivateKeyBytes(new Uint8Array([...]));
This can be useful when you have a private key but not the corresponding public key or when you need to derive key pairs from seeds. For instance, the following code snippet derives a key pair from the hash of a message.
import { getUtf8Encoder } from '@solana/codecs-strings';
import { createKeyPairFromPrivateKeyBytes } from '@solana/keys';
const message = getUtf8Encoder().encode('Hello, World!');
const seed = new Uint8Array(await crypto.subtle.digest('SHA-256', message));
const derivedKeypair = await createKeyPairFromPrivateKeyBytes(seed);
createPrivateKeyFromBytes()
Given a private key represented as a 32-bytes Uint8Array
, creates an Ed25519 private key for use with other methods in this package that accept CryptoKey
objects.
import { createPrivateKeyFromBytes } from '@solana/keys';
const privateKey = await createPrivateKeyFromBytes(new Uint8Array([...]));
const extractablePrivateKey = await createPrivateKeyFromBytes(new Uint8Array([...]), true);
getPublicKeyFromPrivateKey()
Given an extractable CryptoKey
private key, gets the corresponding public key as a CryptoKey
.
import { createPrivateKeyFromBytes, getPublicKeyFromPrivateKey } from '@solana/keys';
const privateKey = await createPrivateKeyFromBytes(new Uint8Array([...]), true);
const publicKey = await getPublicKeyFromPrivateKey(privateKey);
const extractablePublicKey = await getPublicKeyFromPrivateKey(privateKey, true);
isSignature()
This is a type guard that accepts a string as input. It will both return true
if the string conforms to the Signature
type and will refine the type for use in your program.
import { isSignature } from '@solana/keys';
if (isSignature(signature)) {
// At this point, `signature` has been refined to a
// `Signature` that can be used with the RPC.
const {
value: [status],
} = await rpc.getSignatureStatuses([signature]).send();
setSignatureStatus(status);
} else {
setError(`${signature} is not a transaction signature`);
}
signBytes()
Given a private CryptoKey
and a Uint8Array
of bytes, this method will return the 64-byte Ed25519 signature of that data as a Uint8Array
.
import { signBytes } from '@solana/keys';
const data = new Uint8Array([1, 2, 3]);
const signature = await signBytes(privateKey, data);
signature()
This helper combines asserting that a string is an Ed25519 signature with coercing it to the Signature
type. It's best used with untrusted input.
import { signature } from '@solana/keys';
const signature = signature(userSuppliedSignature);
const {
value: [status],
} = await rpc.getSignatureStatuses([signature]).send();
verifySignature()
Given a public CryptoKey
, some SignatureBytes
, and a Uint8Array
of data, this method will return true
if the signature was produced by signing the data using the private key associated with the public key, and false
otherwise.
import { verifySignature } from '@solana/keys';
const data = new Uint8Array([1, 2, 3]);
if (!(await verifySignature(publicKey, signature, data))) {
throw new Error('The data were *not* signed by the private key associated with `publicKey`');
}
FAQs
Helpers for generating and transforming key material
The npm package @solana/keys receives a total of 21,257 weekly downloads. As such, @solana/keys popularity was classified as popular.
We found that @solana/keys demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 14 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.