@bananalink-sdk/protocol 1.2.8 → 1.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-32OWUOZ3.js → chunk-KJ7QIHAY.js} +11 -7
- package/dist/chunk-KJ7QIHAY.js.map +1 -0
- package/dist/{chunk-VXLUSU5B.cjs → chunk-MUYKP6UQ.cjs} +63 -8
- package/dist/chunk-MUYKP6UQ.cjs.map +1 -0
- package/dist/{chunk-MCZG7QEM.cjs → chunk-NGPP7HUR.cjs} +11 -7
- package/dist/chunk-NGPP7HUR.cjs.map +1 -0
- package/dist/{chunk-LELPCIE7.js → chunk-OBJR2TL4.js} +54 -4
- package/dist/chunk-OBJR2TL4.js.map +1 -0
- package/dist/crypto/providers/noble-provider.cjs +2 -3
- package/dist/crypto/providers/noble-provider.d.cts +0 -7
- package/dist/crypto/providers/noble-provider.d.ts +0 -7
- package/dist/crypto/providers/noble-provider.js +1 -2
- package/dist/crypto/providers/node-provider.cjs +7 -29
- package/dist/crypto/providers/node-provider.cjs.map +1 -1
- package/dist/crypto/providers/node-provider.d.cts +0 -7
- package/dist/crypto/providers/node-provider.d.ts +0 -7
- package/dist/crypto/providers/node-provider.js +7 -29
- package/dist/crypto/providers/node-provider.js.map +1 -1
- package/dist/crypto/providers/quickcrypto-provider.cjs +8 -46
- package/dist/crypto/providers/quickcrypto-provider.cjs.map +1 -1
- package/dist/crypto/providers/quickcrypto-provider.d.cts +0 -9
- package/dist/crypto/providers/quickcrypto-provider.d.ts +0 -9
- package/dist/crypto/providers/quickcrypto-provider.js +7 -45
- package/dist/crypto/providers/quickcrypto-provider.js.map +1 -1
- package/dist/crypto/providers/webcrypto-provider.cjs +0 -2
- package/dist/crypto/providers/webcrypto-provider.cjs.map +1 -1
- package/dist/crypto/providers/webcrypto-provider.d.cts +0 -7
- package/dist/crypto/providers/webcrypto-provider.d.ts +0 -7
- package/dist/crypto/providers/webcrypto-provider.js +0 -2
- package/dist/crypto/providers/webcrypto-provider.js.map +1 -1
- package/dist/crypto-export.cjs +50 -51
- package/dist/crypto-export.cjs.map +1 -1
- package/dist/crypto-export.js +2 -4
- package/dist/crypto-export.js.map +1 -1
- package/dist/index.cjs +3 -4
- package/dist/index.cjs.map +1 -1
- package/dist/index.js +2 -3
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
- package/src/crypto/providers/noble-provider.ts +44 -49
- package/src/crypto/providers/node-provider.ts +18 -59
- package/src/crypto/providers/quickcrypto-provider.ts +25 -84
- package/src/crypto/providers/registry.ts +14 -9
- package/src/crypto/providers/webcrypto-provider.ts +28 -43
- package/dist/chunk-32OWUOZ3.js.map +0 -1
- package/dist/chunk-A6FLEJ7R.cjs +0 -62
- package/dist/chunk-A6FLEJ7R.cjs.map +0 -1
- package/dist/chunk-LELPCIE7.js.map +0 -1
- package/dist/chunk-MCZG7QEM.cjs.map +0 -1
- package/dist/chunk-TCVKC227.js +0 -56
- package/dist/chunk-TCVKC227.js.map +0 -1
- package/dist/chunk-VXLUSU5B.cjs.map +0 -1
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/crypto/errors.ts","../src/crypto/providers/registry.ts","../src/crypto/providers/compliance-provider.ts","../src/crypto/context.ts","../src/crypto/utils.ts","../src/crypto/providers/factory.ts"],"names":["platform","recommendations"],"mappings":";;;AAMO,IAAM,YAAA,GAAN,MAAM,YAAA,SAAoB,KAAA,CAAM;AAAA,EACrC,WAAA,CACE,OAAA,EACgB,IAAA,EACA,OAAA,EAChB;AACA,IAAA,KAAA,CAAM,OAAO,CAAA;AAHG,IAAA,IAAA,CAAA,IAAA,GAAA,IAAA;AACA,IAAA,IAAA,CAAA,OAAA,GAAA,OAAA;AAGhB,IAAA,IAAA,CAAK,IAAA,GAAO,aAAA;AAGZ,IAAA,IAAI,MAAM,iBAAA,EAAmB;AAC3B,MAAA,KAAA,CAAM,iBAAA,CAAkB,IAAA,EAAM,IAAA,CAAK,WAAW,CAAA;AAAA,IAChD;AAAA,EACF;AACF,CAAA;AAduC,MAAA,CAAA,YAAA,EAAA,aAAA,CAAA;AAAhC,IAAM,WAAA,GAAN;AAoBA,IAAM,+BAAA,GAAN,MAAM,+BAAA,SAAuC,WAAA,CAAY;AAAA,EAC9D,WAAA,CACE,SACA,OAAA,EAMA;AACA,IAAA,KAAA,CAAM,OAAA,EAAS,wBAAwB,OAAO,CAAA;AAC9C,IAAA,IAAA,CAAK,IAAA,GAAO,gCAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,YAAA,GAAuB;AAErB,IAAA,IAAI,CAAC,KAAK,OAAA,EAAS;AACjB,MAAA,OAAO,IAAA,CAAK,OAAA;AAAA,IACd;AAEA,IAAA,MAAM,MAAM,IAAA,CAAK,OAAA;AAOjB,IAAA,MAAM,KAAA,GAAkB;AAAA,MACtB,IAAA,CAAK,OAAA;AAAA,MACL,EAAA;AAAA,MACA,sBAAA;AAAA,MACA,GAAG,GAAA,CAAI,kBAAA,CAAmB,IAAI,CAAA,CAAA,KAAK,CAAA,IAAA,EAAO,CAAC,CAAA,CAAE;AAAA,KAC/C;AAEA,IAAA,IAAI,GAAA,CAAI,eAAA,CAAgB,MAAA,GAAS,CAAA,EAAG;AAClC,MAAA,KAAA,CAAM,IAAA,CAAK,IAAI,kBAAkB,CAAA;AACjC,MAAA,KAAA,CAAM,IAAA,CAAK,GAAG,GAAA,CAAI,eAAA,CAAgB,IAAI,CAAA,CAAA,KAAK,CAAA,IAAA,EAAO,CAAC,CAAA,CAAE,CAAC,CAAA;AAAA,IACxD;AAGA,IAAA,IAAI,IAAI,QAAA,EAAU;AAChB,MAAA,MAAM,YAAA,GAAe,GAAA,CAAI,QAAA,CAAS,MAAA,GAC9B,SAAA,GACA,GAAA,CAAI,QAAA,CAAS,SAAA,GACX,SAAA,GACA,GAAA,CAAI,QAAA,CAAS,aAAA,GACX,cAAA,GACA,SAAA;AAER,MAAA,KAAA,CAAM,IAAA,CAAK,EAAA,EAAI,CAAA,UAAA,EAAa,YAAY,CAAA,CAAE,CAAA;AAE1C,MAAA,IAAI,GAAA,CAAI,SAAS,QAAA,EAAU;AACzB,QAAA,KAAA,CAAM,IAAA,CAAK,CAAA,IAAA,EAAO,GAAA,CAAI,QAAA,CAAS,QAAQ,CAAA,CAAE,CAAA;AAAA,MAC3C;AAEA,MAAA,IAAI,GAAA,CAAI,SAAS,SAAA,EAAW;AAC1B,QAAA,MAAM,EAAA,GAAK,IAAI,QAAA,CAAS,SAAA;AAExB,QAAA,MAAM,SAAA,GAAY,EAAA,CAAG,MAAA,GAAS,GAAA,GAAM,CAAA,EAAG,GAAG,SAAA,CAAU,CAAA,EAAG,GAAG,CAAC,CAAA,GAAA,CAAA,GAAQ,EAAA;AACnE,QAAA,KAAA,CAAM,IAAA,CAAK,CAAA,YAAA,EAAe,SAAS,CAAA,CAAE,CAAA;AAAA,MACvC;AAAA,IACF;AAEA,IAAA,OAAO,KAAA,CAAM,KAAK,IAAI,CAAA;AAAA,EACxB;AACF,CAAA;AArEgE,MAAA,CAAA,+BAAA,EAAA,gCAAA,CAAA;AAAzD,IAAM,8BAAA,GAAN;AA0EA,IAAM,6BAAA,GAAN,MAAM,6BAAA,SAAqC,WAAA,CAAY;AAAA,EAC5D,WAAA,CACE,SAAA,EACA,QAAA,EACA,MAAA,EACA;AACA,IAAA,KAAA;AAAA,MACE,CAAA,kBAAA,EAAqB,SAAS,CAAA,gCAAA,EAAmC,QAAQ,MAAM,MAAM,CAAA,CAAA;AAAA,MACrF,oBAAA;AAAA,MACA,EAAE,SAAA,EAAW,QAAA,EAAU,MAAA;AAAO,KAChC;AACA,IAAA,IAAA,CAAK,IAAA,GAAO,8BAAA;AAAA,EACd;AACF,CAAA;AAb8D,MAAA,CAAA,6BAAA,EAAA,8BAAA,CAAA;AAAvD,IAAM,4BAAA,GAAN;;;ACzEP,IAAM,eAAA,uBAAsB,GAAA,EAA+C;AAkBpE,SAAS,sBAAA,CAAuB,MAA0B,OAAA,EAAsC;AAErG,EAAA,IAAI,eAAA,CAAgB,GAAA,CAAI,IAAI,CAAA,EAAG;AAC7B,IAAA;AAAA,EACF;AACA,EAAA,eAAA,CAAgB,GAAA,CAAI,MAAM,OAAO,CAAA;AACnC;AANgB,MAAA,CAAA,sBAAA,EAAA,wBAAA,CAAA;AAeT,SAAS,yBAAyB,IAAA,EAAiD;AACxF,EAAA,MAAM,OAAA,GAAU,eAAA,CAAgB,GAAA,CAAI,IAAI,CAAA;AAExC,EAAA,IAAI,CAAC,OAAA,EAAS;AACZ,IAAA,MAAM,kBAAA,GAAqB,MAAM,IAAA,CAAK,eAAA,CAAgB,MAAM,CAAA,CAAE,KAAK,IAAI,CAAA;AACvE,IAAA,MAAM,UAAA,GAAa,cAAc,IAAI,CAAA;AAErC,IAAA,MAAM,IAAI,KAAA;AAAA,MACR,CAAA,iBAAA,EAAoB,IAAI,CAAA,qBAAA,EAAwB,UAAU;AAAA,qBAAA,EAChC,sBAAsB,MAAM;AAAA,iDAAA;AAAA,KAExD;AAAA,EACF;AAEA,EAAA,OAAO,OAAA;AACT;AAfgB,MAAA,CAAA,wBAAA,EAAA,0BAAA,CAAA;AAuBT,SAAS,2BAA2B,IAAA,EAAmC;AAC5E,EAAA,OAAO,eAAA,CAAgB,IAAI,IAAI,CAAA;AACjC;AAFgB,MAAA,CAAA,0BAAA,EAAA,4BAAA,CAAA;AAST,SAAS,4BAAA,GAAqD;AACnE,EAAA,OAAO,KAAA,CAAM,IAAA,CAAK,eAAA,CAAgB,IAAA,EAAM,CAAA;AAC1C;AAFgB,MAAA,CAAA,4BAAA,EAAA,8BAAA,CAAA;AAOT,SAAS,2BAAA,GAAoC;AAClD,EAAA,eAAA,CAAgB,KAAA,EAAM;AACxB;AAFgB,MAAA,CAAA,2BAAA,EAAA,6BAAA,CAAA;AAOhB,SAAS,cAAc,IAAA,EAAkC;AACvD,EAAA,QAAQ,IAAA;AAAM,IACZ,KAAK,OAAA;AACH,MAAA,OAAO,4EAAA;AAAA,IACT,KAAK,aAAA;AACH,MAAA,OAAO,kFAAA;AAAA,IACT,KAAK,WAAA;AACH,MAAA,OAAO,gFAAA;AAAA,IACT,KAAK,MAAA;AACH,MAAA,OAAO,2EAAA;AAAA,IACT;AACE,MAAA,OAAO,CAAA,8BAAA,EAAiC,MAAA,CAAO,IAAI,CAAC,CAAA,WAAA,CAAA;AAAA;AAE1D;AAbS,MAAA,CAAA,aAAA,EAAA,eAAA,CAAA;;;AC9DF,IAAM,yBAAA,GAAN,MAAM,yBAAA,CAAsD;AAAA,EAIjE,YAAY,MAAA,EAAiB;AAH7B,IAAA,IAAA,CAAQ,WAAmC,EAAC;AAI1C,IAAA,IAAA,CAAK,SAAS,MAAA,EAAQ,KAAA,CAAM,EAAE,SAAA,EAAW,qBAAqB,CAAA;AAAA,EAChE;AAAA,EAEA,SAAS,KAAA,EAAmC;AAC1C,IAAA,IAAA,CAAK,QAAA,CAAS,KAAK,KAAK,CAAA;AACxB,IAAA,IAAA,CAAK,MAAA,EAAQ,KAAK,wBAAA,EAA0B;AAAA,MAC1C,WAAW,KAAA,CAAM,SAAA;AAAA,MACjB,SAAS,KAAA,CAAM,OAAA;AAAA,MACf,WAAW,KAAA,CAAM,SAAA;AAAA,MACjB,WAAW,KAAA,CAAM;AAAA,KAClB,CAAA;AAAA,EACH;AAAA,EAEA,WAAA,GAAsC;AACpC,IAAA,OAAO,CAAC,GAAG,IAAA,CAAK,QAAQ,CAAA;AAAA,EAC1B;AAAA,EAEA,aAAA,GAAsB;AACpB,IAAA,IAAA,CAAK,WAAW,EAAC;AACjB,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,8BAA8B,CAAA;AAAA,EACnD;AACF,CAAA;AA1BmE,MAAA,CAAA,yBAAA,EAAA,0BAAA,CAAA;AAA5D,IAAM,wBAAA,GAAN;AAwDA,IAAM,yBAAA,GAAN,MAAM,yBAAA,CAAmD;AAAA,EAS9D,WAAA,CACE,kBAAA,EACA,MAAA,GAA2B,IAC3B,MAAA,EACA;AACA,IAAA,IAAA,CAAK,kBAAA,GAAqB,kBAAA;AAC1B,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,OAAA,GAAU,MAAA,CAAO,OAAA,IAAW,IAAI,yBAAyB,MAAM,CAAA;AACpE,IAAA,IAAA,CAAK,MAAA,GAAS,QAAQ,KAAA,CAAM;AAAA,MAC1B,SAAA,EAAW,0BAAA;AAAA,MACX,oBAAoB,kBAAA,CAAmB;AAAA,KACxC,CAAA;AAED,IAAA,IAAA,CAAK,IAAA,GAAO,CAAA,WAAA,EAAc,kBAAA,CAAmB,IAAI,CAAA,CAAA,CAAA;AACjD,IAAA,IAAA,CAAK,cAAc,kBAAA,CAAmB,WAAA;AAAA,EACxC;AAAA;AAAA;AAAA;AAAA,EAKQ,iBACN,SAAA,EACA,OAAA,EACA,QAAA,GAAoC,IACpC,KAAA,EACsB;AACtB,IAAA,OAAO;AAAA,MACL,SAAA;AAAA,MACA,SAAA,EAAA,iBAAW,IAAI,IAAA,EAAK,EAAE,WAAA,EAAY;AAAA,MAClC,SAAA,EAAW,KAAK,MAAA,CAAO,SAAA;AAAA,MACvB,OAAA;AAAA,MACA,KAAA;AAAA,MACA,QAAA;AAAA,MACA,GAAG;AAAA,KACL;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKQ,gBAAA,CAAiB,SAAA,EAAmB,SAAA,EAA+B,QAAA,EAAyB;AAClG,IAAA,MAAM,YAAA,GAAe,KAAK,MAAA,CAAO,eAAA;AACjC,IAAA,IAAI,CAAC,YAAA,EAAc;AAEnB,IAAA,IAAI,YAAA,CAAa,gBAAA,IAAoB,CAAC,IAAA,CAAK,OAAO,SAAA,EAAW;AAC3D,MAAA,MAAM,IAAI,MAAM,qDAAqD,CAAA;AAAA,IACvE;AAEA,IAAA,IAAI,YAAA,CAAa,WAAA,IAAe,QAAA,IAAY,QAAA,GAAW,aAAa,WAAA,EAAa;AAC/E,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,UAAA,EAAa,QAAQ,CAAA,yBAAA,EAA4B,YAAA,CAAa,WAAW,CAAA,MAAA,CAAQ,CAAA;AAAA,IACnG;AAEA,IAAA,IAAI,SAAA,IAAa,aAAa,iBAAA,EAAmB;AAC/C,MAAA,MAAM,gBAAA,GAAmB,aAAa,iBAAA,CAAkB,IAAA,CAAK,WAAS,SAAA,CAAU,QAAA,CAAS,KAAK,CAAC,CAAA;AAC/F,MAAA,IAAI,CAAC,gBAAA,EAAkB;AACrB,QAAA,MAAM,IAAI,MAAM,CAAA,sCAAA,EAAyC,YAAA,CAAa,kBAAkB,IAAA,CAAK,IAAI,CAAC,CAAA,CAAE,CAAA;AAAA,MACtG;AAAA,IACF;AAEA,IAAA,IAAI,SAAA,IAAa,aAAa,kBAAA,EAAoB;AAChD,MAAA,MAAM,iBAAA,GAAoB,aAAa,kBAAA,CAAmB,IAAA,CAAK,WAAS,SAAA,CAAU,QAAA,CAAS,KAAK,CAAC,CAAA;AACjG,MAAA,IAAI,iBAAA,EAAmB;AACrB,QAAA,MAAM,IAAI,MAAM,CAAA,oCAAA,EAAuC,YAAA,CAAa,mBAAmB,IAAA,CAAK,IAAI,CAAC,CAAA,CAAE,CAAA;AAAA,MACrG;AAAA,IACF;AAGA,IAAA,IAAI,SAAA,KAAc,QAAA,IAAY,YAAA,CAAa,cAAA,KAAmB,KAAA,EAAO;AACnE,MAAA,MAAM,IAAI,MAAM,8CAA8C,CAAA;AAAA,IAChE;AAEA,IAAA,IAAI,SAAA,KAAc,QAAA,IAAY,YAAA,CAAa,cAAA,KAAmB,KAAA,EAAO;AACnE,MAAA,MAAM,IAAI,MAAM,8CAA8C,CAAA;AAAA,IAChE;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eAAA,GAA4C;AAChD,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,2CAA2C,CAAA;AAE9D,MAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,kBAAA,CAAmB,eAAA,EAAgB;AAE9D,MAAA,IAAA,CAAK,gBAAA,CAAiB,YAAA,EAAc,OAAA,CAAQ,UAAA,CAAW,MAAM,CAAA;AAE7D,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,IAAA,EAAM;AAAA,QAClE,SAAA,EAAW,QAAQ,UAAA,CAAW,SAAA;AAAA,QAC9B,QAAA,EAAU,QAAQ,UAAA,CAAW,MAAA;AAAA,QAC7B,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,OAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,KAAA,EAAO;AAAA,QACnE,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,SAAA,EAAgD;AACpE,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,QAAA,EAAU,SAAA,CAAU,MAAM,CAAA;AAEhD,MAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,kBAAA,CAAmB,gBAAgB,SAAS,CAAA;AAEvE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,OAAA,EAAS,QAAA;AAAA,QACT,WAAW,SAAA,CAAU,SAAA;AAAA,QACrB,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,OAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,OAAA,EAAS,QAAA;AAAA,QACT,WAAW,SAAA,CAAU,SAAA;AAAA,QACrB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,iBAAiB,UAAA,EAAiD;AACtE,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,QAAA,EAAU,UAAA,CAAW,MAAM,CAAA;AAGjD,MAAA,IAAI,IAAA,CAAK,OAAO,gBAAA,EAAkB;AAChC,QAAA,IAAA,CAAK,MAAA,EAAQ,KAAK,8CAAA,EAAgD;AAAA,UAChE,SAAA,EAAW,KAAK,MAAA,CAAO,SAAA;AAAA,UACvB,WAAW,UAAA,CAAW;AAAA,SACvB,CAAA;AAAA,MACH;AAEA,MAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,kBAAA,CAAmB,iBAAiB,UAAU,CAAA;AAEzE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,OAAA,EAAS,SAAA;AAAA,QACT,WAAW,UAAA,CAAW,SAAA;AAAA,QACtB,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,UAAA,EAAY,KAAK,MAAA,CAAO,gBAAA;AAAA,QACxB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,OAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,OAAA,EAAS,SAAA;AAAA,QACT,WAAW,UAAA,CAAW,SAAA;AAAA,QACtB,UAAA,EAAY,KAAK,MAAA,CAAO,gBAAA;AAAA,QACxB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,OAAA,EAA8C;AAClE,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,iBAAiB,QAAQ,CAAA;AAE9B,MAAA,MAAM,GAAA,GAAM,MAAM,IAAA,CAAK,kBAAA,CAAmB,gBAAgB,OAAO,CAAA;AAEjE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,OAAA,EAAS,QAAA;AAAA,QACT,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,UAAU,GAAA,CAAI,MAAA;AAAA,QACd,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,GAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,OAAA,EAAS,QAAA;AAAA,QACT,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,iBAAiB,OAAA,EAA8C;AACnE,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,iBAAiB,QAAQ,CAAA;AAE9B,MAAA,MAAM,GAAA,GAAM,MAAM,IAAA,CAAK,kBAAA,CAAmB,iBAAiB,OAAO,CAAA;AAElE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,OAAA,EAAS,SAAA;AAAA,QACT,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,UAAU,GAAA,CAAI,MAAA;AAAA,QACd,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,GAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,OAAA,EAAS,SAAA;AAAA,QACT,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,kBAAA,CAAmB,UAAA,EAA2B,SAAA,EAAkD;AACpG,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,YAAA,EAAc,UAAA,CAAW,MAAM,CAAA;AAErD,MAAA,MAAM,eAAe,MAAM,IAAA,CAAK,kBAAA,CAAmB,kBAAA,CAAmB,YAAY,SAAS,CAAA;AAE3F,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,IAAA,EAAM;AAAA,QAClE,SAAA,EAAW,MAAA;AAAA,QACX,WAAW,UAAA,CAAW,SAAA;AAAA,QACtB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,YAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,KAAA,EAAO;AAAA,QACnE,SAAA,EAAW,MAAA;AAAA,QACX,WAAW,UAAA,CAAW,SAAA;AAAA,QACtB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,mBAAA,CAAoB,YAAA,EAA6B,IAAA,EAAmB,IAAA,EAA2C;AACnH,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,MAAM,gBAAgB,MAAM,IAAA,CAAK,mBAAmB,mBAAA,CAAoB,YAAA,EAAc,MAAM,IAAI,CAAA;AAEhG,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,IAAA,EAAM;AAAA,QAClE,SAAA,EAAW,MAAA;AAAA,QACX,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,aAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,KAAA,EAAO;AAAA,QACnE,SAAA,EAAW,MAAA;AAAA,QACX,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,YAAY,MAAA,EAA6B;AACvC,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,MAAM,UAAA,GAAa,IAAA,CAAK,kBAAA,CAAmB,WAAA,CAAY,MAAM,CAAA;AAE7D,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,qBAAqB,IAAA,EAAM;AAAA,QACrE,MAAA;AAAA,QACA,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,UAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,qBAAqB,KAAA,EAAO;AAAA,QACtE,MAAA;AAAA,QACA,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AAC1F,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,YAAA,EAAc,GAAA,CAAI,MAAA,EAAQ,KAAK,UAAU,CAAA;AAE/D,MAAA,MAAM,aAAa,MAAM,IAAA,CAAK,mBAAmB,OAAA,CAAQ,GAAA,EAAK,MAAM,EAAE,CAAA;AAEtE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAQ,EAAA,CAAG,UAAA;AAAA,QACX,gBAAgB,UAAA,CAAW,UAAA;AAAA,QAC3B,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,UAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAQ,EAAA,CAAG,UAAA;AAAA,QACX,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AAC1F,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,YAAA,EAAc,GAAA,CAAI,MAAA,EAAQ,KAAK,UAAU,CAAA;AAE/D,MAAA,MAAM,YAAY,MAAM,IAAA,CAAK,mBAAmB,OAAA,CAAQ,GAAA,EAAK,MAAM,EAAE,CAAA;AAErE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAQ,EAAA,CAAG,UAAA;AAAA,QACX,eAAe,SAAA,CAAU,UAAA;AAAA,QACzB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,SAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAQ,EAAA,CAAG,UAAA;AAAA,QACX,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAA,CAAa,GAAA,EAAoB,IAAA,EAAyC;AAC9E,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,MAAA,EAAQ,GAAA,CAAI,MAAA,EAAQ,KAAK,UAAU,CAAA;AAEzD,MAAA,MAAM,MAAM,MAAM,IAAA,CAAK,kBAAA,CAAmB,YAAA,CAAa,KAAK,IAAI,CAAA;AAEhE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,mBAAmB,IAAA,EAAM;AAAA,QACnE,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,SAAS,GAAA,CAAI,UAAA;AAAA,QACb,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,GAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,mBAAmB,KAAA,EAAO;AAAA,QACpE,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,UAAA,CAAW,GAAA,EAAoB,IAAA,EAAmB,GAAA,EAAoC;AAC1F,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,MAAA,EAAQ,GAAA,CAAI,MAAA,EAAQ,KAAK,UAAU,CAAA;AAEzD,MAAA,MAAM,UAAU,MAAM,IAAA,CAAK,mBAAmB,UAAA,CAAW,GAAA,EAAK,MAAM,GAAG,CAAA;AAEvE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,qBAAqB,IAAA,EAAM;AAAA,QACrE,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,SAAS,GAAA,CAAI,UAAA;AAAA,QACb,QAAA,EAAU,OAAA;AAAA,QACV,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,OAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,qBAAqB,KAAA,EAAO;AAAA,QACtE,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,SAAS,GAAA,CAAI,UAAA;AAAA,QACb,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,UAAA,GAAgC;AAC9B,IAAA,OAAO,IAAA,CAAK,OAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA,EAKA,aAAa,SAAA,EAA4C;AACvD,IAAA,MAAA,CAAO,MAAA,CAAO,IAAA,CAAK,MAAA,EAAQ,SAAS,CAAA;AACpC,IAAA,IAAA,CAAK,MAAA,EAAQ,KAAA,CAAM,kCAAA,EAAoC,SAAS,CAAA;AAAA,EAClE;AAAA;AAAA;AAAA;AAAA,EAKA,qBAAA,GAAwC;AACtC,IAAA,OAAO,IAAA,CAAK,kBAAA;AAAA,EACd;AACF,CAAA;AA9dgE,MAAA,CAAA,yBAAA,EAAA,0BAAA,CAAA;AAAzD,IAAM,wBAAA,GAAN;;;ACnDP,IAAM,qBAAA,GAAN,MAAM,qBAAA,CAAqB;AAAA,EAA3B,WAAA,GAAA;AACE,IAAA,IAAA,CAAQ,QAAA,GAAkC,IAAA;AAC1C,IAAA,IAAA,CAAQ,MAAA,GAAqC,IAAA;AAC7C,IAAA,IAAA,CAAQ,WAAA,GAAc,KAAA;AACtB,IAAA,IAAA,CAAQ,YAAA,GAAe,KAAA;AAAA,EAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASvB,UAAA,CAAW,MAAA,GAA8B,EAAC,EAAS;AACjD,IAAA,IAAI,IAAA,CAAK,WAAA,IAAe,IAAA,CAAK,QAAA,EAAU;AACrC,MAAA,MAAM,IAAI,KAAA;AAAA,QACR;AAAA,OACF;AAAA,IACF;AAGA,IAAA,IAAI,MAAA,CAAO,MAAA,IAAU,MAAA,CAAO,IAAA,EAAM;AAChC,MAAA,MAAM,qBAAqB,4BAAA,EAA6B;AACxD,MAAA,IAAI,CAAC,kBAAA,CAAmB,QAAA,CAAS,MAAA,CAAO,IAAI,CAAA,EAAG;AAC7C,QAAA,MAAM,WAAW,cAAA,EAAe;AAChC,QAAA,MAAM,eAAA,GAA4B;AAAA,UAChC,CAAA,sEAAA,EAAyE,OAAO,IAAI,CAAA,CAAA,CAAA;AAAA,UACpF;AAAA,SACF;AAGA,QAAA,IAAI,MAAA,CAAO,IAAA,KAAS,aAAA,IAAiB,CAAC,SAAS,aAAA,EAAe;AAC5D,UAAA,eAAA,CAAgB,KAAK,+CAA+C,CAAA;AACpE,UAAA,IAAI,SAAS,MAAA,EAAQ;AACnB,YAAA,eAAA,CAAgB,KAAK,iCAAiC,CAAA;AAAA,UACxD,CAAA,MAAA,IAAW,SAAS,SAAA,EAAW;AAC7B,YAAA,eAAA,CAAgB,KAAK,uCAAuC,CAAA;AAAA,UAC9D;AAAA,QACF;AAGA,QAAA,IAAI,kBAAA,CAAmB,QAAA,CAAS,OAAO,CAAA,EAAG;AACxC,UAAA,eAAA,CAAgB,KAAK,0DAA0D,CAAA;AAAA,QACjF;AAEA,QAAA,MAAM,IAAI,8BAAA;AAAA,UACR,CAAA,8BAAA,EAAiC,OAAO,IAAI,CAAA,iDAAA,CAAA;AAAA,UAC5C;AAAA,YACE,mBAAmB,MAAA,CAAO,IAAA;AAAA,YAC1B,kBAAA;AAAA,YACA,QAAA;AAAA,YACA;AAAA;AACF,SACF;AAAA,MACF;AAAA,IACF;AAEA,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,QAAA,GAAW,IAAA,CAAK,cAAA,CAAe,MAAM,CAAA;AAC1C,IAAA,IAAA,CAAK,WAAA,GAAc,IAAA;AAAA,EACrB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAkCA,WAAA,GAA8B;AAE5B,IAAA,IAAI,KAAK,QAAA,EAAU;AACjB,MAAA,OAAO,IAAA,CAAK,QAAA;AAAA,IACd;AAGA,IAAA,IAAI,KAAK,YAAA,EAAc;AACrB,MAAA,MAAM,IAAI,KAAA;AAAA,QACR;AAAA,OACF;AAAA,IACF;AAGA,IAAA,IAAA,CAAK,YAAA,GAAe,IAAA;AACpB,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,UAAA,EAAW;AAEhB,MAAA,IAAI,CAAC,KAAK,QAAA,EAAU;AAClB,QAAA,MAAM,IAAI,MAAM,uDAAuD,CAAA;AAAA,MACzE;AACA,MAAA,OAAO,IAAA,CAAK,QAAA;AAAA,IACd,CAAA,SAAE;AACA,MAAA,IAAA,CAAK,YAAA,GAAe,KAAA;AAAA,IACtB;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,YAAY,QAAA,EAAgC;AAC1C,IAAA,IAAA,CAAK,QAAA,GAAW,QAAA;AAChB,IAAA,IAAA,CAAK,WAAA,GAAc,IAAA;AAAA,EACrB;AAAA;AAAA;AAAA;AAAA,EAKA,aAAA,GAAyB;AACvB,IAAA,OAAO,IAAA,CAAK,WAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA,EAKA,SAAA,GAAwC;AACtC,IAAA,OAAO,IAAA,CAAK,MAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA,EAKA,KAAA,GAAc;AACZ,IAAA,IAAA,CAAK,QAAA,GAAW,IAAA;AAChB,IAAA,IAAA,CAAK,MAAA,GAAS,IAAA;AACd,IAAA,IAAA,CAAK,WAAA,GAAc,KAAA;AACnB,IAAA,IAAA,CAAK,YAAA,GAAe,KAAA;AAAA,EACtB;AAAA;AAAA;AAAA;AAAA,EAKQ,eAAe,MAAA,EAA6C;AAClE,IAAA,MAAM,eAAe,oBAAA,CAAqB,MAAA,CAAO,MAAM,MAAA,CAAO,MAAA,EAAQ,OAAO,MAAM,CAAA;AAEnF,IAAA,IAAI,MAAA,CAAO,YAAY,OAAA,EAAS;AAC9B,MAAA,OAAO,IAAI,wBAAA,CAAyB,YAAA,EAAc,MAAA,CAAO,UAAU,CAAA;AAAA,IACrE;AAEA,IAAA,OAAO,YAAA;AAAA,EACT;AAEF,CAAA;AAzK2B,MAAA,CAAA,qBAAA,EAAA,sBAAA,CAAA;AAA3B,IAAM,oBAAA,GAAN,qBAAA;AAkLO,IAAM,aAAA,GAAgB,IAAI,oBAAA;;;AC7M1B,SAAS,WAAA,CAAY,QAAgB,QAAA,EAAuC;AACjF,EAAA,MAAM,cAAA,GAAiB,QAAA,IAAY,aAAA,CAAc,WAAA,EAAY;AAC7D,EAAA,MAAM,MAAA,GAAS,cAAA,CAAe,WAAA,CAAY,MAAM,CAAA;AAChD,EAAA,OAAO,IAAI,WAAW,MAAM,CAAA;AAC9B;AAJgB,MAAA,CAAA,WAAA,EAAA,aAAA,CAAA;AAST,SAAS,oBAAoB,MAAA,EAA6B;AAC/D,EAAA,MAAM,KAAA,GAAQ,IAAI,UAAA,CAAW,MAAM,CAAA;AACnC,EAAA,IAAI,MAAA,GAAS,EAAA;AACb,EAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,KAAA,CAAM,YAAY,CAAA,EAAA,EAAK;AACzC,IAAA,MAAA,IAAU,MAAA,CAAO,YAAA,CAAa,KAAA,CAAM,CAAC,CAAC,CAAA;AAAA,EACxC;AACA,EAAA,OAAO,KAAK,MAAM,CAAA;AACpB;AAPgB,MAAA,CAAA,mBAAA,EAAA,qBAAA,CAAA;AAYT,SAAS,oBAAoB,MAAA,EAA6B;AAE/D,EAAA,MAAM,WAAA,GAAc,MAAA,CAAO,OAAA,CAAQ,kBAAA,EAAoB,EAAE,CAAA;AAGzD,EAAA,IAAI,YAAA,GAAe,WAAA;AACnB,EAAA,OAAO,YAAA,CAAa,MAAA,GAAS,CAAA,KAAM,CAAA,EAAG;AACpC,IAAA,YAAA,IAAgB,GAAA;AAAA,EAClB;AAEA,EAAA,IAAI;AACF,IAAA,MAAM,MAAA,GAAS,KAAK,YAAY,CAAA;AAChC,IAAA,MAAM,KAAA,GAAQ,IAAI,UAAA,CAAW,MAAA,CAAO,MAAM,CAAA;AAC1C,IAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,MAAA,CAAO,QAAQ,CAAA,EAAA,EAAK;AACtC,MAAA,KAAA,CAAM,CAAC,CAAA,GAAI,MAAA,CAAO,UAAA,CAAW,CAAC,CAAA;AAAA,IAChC;AACA,IAAA,OAAO,KAAA,CAAM,MAAA;AAAA,EACf,SAAS,KAAA,EAAO;AACd,IAAA,MAAM,IAAI,KAAA,CAAM,CAAA,gCAAA,EAAmC,KAAA,YAAiB,QAAQ,KAAA,CAAM,OAAA,GAAU,uBAAuB,CAAA,mBAAA,EAAsB,MAAA,CAAO,SAAA,CAAU,CAAA,EAAG,EAAE,CAAC,CAAA,GAAA,CAAK,CAAA;AAAA,EACvK;AACF;AApBgB,MAAA,CAAA,mBAAA,EAAA,qBAAA,CAAA;AAyBT,SAAS,oBAAoB,GAAA,EAA0B;AAC5D,EAAA,OAAO,IAAI,WAAA,EAAY,CAAE,MAAA,CAAO,GAAG,CAAA,CAAE,MAAA;AACvC;AAFgB,MAAA,CAAA,mBAAA,EAAA,qBAAA,CAAA;AAOT,SAAS,oBAAoB,MAAA,EAA6B;AAC/D,EAAA,OAAO,IAAI,WAAA,EAAY,CAAE,MAAA,CAAO,MAAM,CAAA;AACxC;AAFgB,MAAA,CAAA,mBAAA,EAAA,qBAAA,CAAA;AAoBT,SAAS,aAAA,CAAc,MAAA,GAAiB,EAAA,EAAI,QAAA,EAAmC;AACpF,EAAA,MAAM,KAAA,GAAQ,WAAA,CAAY,MAAA,EAAQ,QAAQ,CAAA;AAC1C,EAAA,OAAO,KAAA,CAAM,IAAA,CAAK,KAAA,EAAO,CAAC,SAAiB,IAAA,CAAK,QAAA,CAAS,EAAE,CAAA,CAAE,SAAS,CAAA,EAAG,GAAG,CAAC,CAAA,CAAE,KAAK,EAAE,CAAA;AACxF;AAHgB,MAAA,CAAA,aAAA,EAAA,eAAA,CAAA;AA2BT,SAAS,aAAa,QAAA,EAAmC;AAC9D,EAAA,MAAM,KAAA,GAAQ,WAAA,CAAY,EAAA,EAAI,QAAQ,CAAA;AAGtC,EAAA,KAAA,CAAM,CAAC,CAAA,GAAK,KAAA,CAAM,CAAC,IAAI,EAAA,GAAQ,EAAA;AAC/B,EAAA,KAAA,CAAM,CAAC,CAAA,GAAK,KAAA,CAAM,CAAC,IAAI,EAAA,GAAQ,GAAA;AAG/B,EAAA,MAAM,MAAM,KAAA,CAAM,IAAA,CAAK,KAAA,EAAO,CAAC,SAAiB,IAAA,CAAK,QAAA,CAAS,EAAE,CAAA,CAAE,SAAS,CAAA,EAAG,GAAG,CAAC,CAAA,CAAE,KAAK,EAAE,CAAA;AAC3F,EAAA,OAAO;AAAA,IACL,GAAA,CAAI,KAAA,CAAM,CAAA,EAAG,CAAC,CAAA;AAAA,IACd,GAAA,CAAI,KAAA,CAAM,CAAA,EAAG,EAAE,CAAA;AAAA,IACf,GAAA,CAAI,KAAA,CAAM,EAAA,EAAI,EAAE,CAAA;AAAA,IAChB,GAAA,CAAI,KAAA,CAAM,EAAA,EAAI,EAAE,CAAA;AAAA,IAChB,GAAA,CAAI,KAAA,CAAM,EAAA,EAAI,EAAE;AAAA,GAClB,CAAE,KAAK,GAAG,CAAA;AACZ;AAhBgB,MAAA,CAAA,YAAA,EAAA,cAAA,CAAA;AAkCT,SAAS,cAAA,GAA0C;AAExD,EAAA,MAAM,MAAA,GAAS,OAAO,OAAA,KAAY,WAAA,IAChC,QAAQ,QAAA,IAAY,IAAA,IACpB,OAAA,CAAQ,QAAA,CAAS,IAAA,IAAQ,IAAA;AAG3B,EAAA,MAAM,SAAA,GAAY,OAAO,MAAA,KAAW,WAAA,IAClC,OAAO,QAAA,KAAa,WAAA;AAGtB,EAAA,MAAM,aAAA,GAAgB,OAAO,SAAA,KAAc,WAAA,IACzC,UAAU,OAAA,KAAY,aAAA;AAGxB,EAAA,IAAI,QAAA;AACJ,EAAA,IAAI,MAAA,IAAU,OAAO,OAAA,CAAQ,QAAA,KAAa,QAAA,EAAU;AAClD,IAAA,QAAA,GAAW,OAAA,CAAQ,QAAA;AAAA,EACrB;AAGA,EAAA,IAAI,SAAA;AACJ,EAAA,IAAI,OAAO,SAAA,KAAc,WAAA,IAAe,OAAO,SAAA,CAAU,cAAc,QAAA,EAAU;AAC/E,IAAA,SAAA,GAAY,SAAA,CAAU,SAAA;AAAA,EACxB;AAEA,EAAA,OAAO;AAAA,IACL,MAAA;AAAA,IACA,SAAA;AAAA,IACA,aAAA;AAAA,IACA,QAAA;AAAA,IACA;AAAA,GACF;AACF;AAjCgB,MAAA,CAAA,cAAA,EAAA,gBAAA,CAAA;;;AChJhB,SAAS,uBAAA,CACP,mBACA,QAAA,EACU;AACV,EAAA,MAAM,kBAA4B,EAAC;AAGnC,EAAA,IAAI,sBAAsB,WAAA,EAAa;AACrC,IAAA,eAAA,CAAgB,KAAK,yDAAyD,CAAA;AAC9E,IAAA,IAAI,SAAS,MAAA,EAAQ;AACnB,MAAA,eAAA,CAAgB,KAAK,iCAAiC,CAAA;AAAA,IACxD;AAAA,EACF,CAAA,MAAA,IAAW,sBAAsB,MAAA,EAAQ;AACvC,IAAA,eAAA,CAAgB,KAAK,0CAA0C,CAAA;AAC/D,IAAA,IAAI,SAAS,SAAA,EAAW;AACtB,MAAA,eAAA,CAAgB,KAAK,uCAAuC,CAAA;AAAA,IAC9D;AAAA,EACF,CAAA,MAAA,IAAW,sBAAsB,aAAA,EAAe;AAC9C,IAAA,eAAA,CAAgB,KAAK,+CAA+C,CAAA;AACpE,IAAA,IAAI,CAAC,SAAS,aAAA,EAAe;AAC3B,MAAA,IAAI,SAAS,MAAA,EAAQ;AACnB,QAAA,eAAA,CAAgB,KAAK,iCAAiC,CAAA;AAAA,MACxD,CAAA,MAAA,IAAW,SAAS,SAAA,EAAW;AAC7B,QAAA,eAAA,CAAgB,KAAK,uCAAuC,CAAA;AAAA,MAC9D;AAAA,IACF;AAAA,EACF;AAGA,EAAA,eAAA,CAAgB,KAAK,0DAA0D,CAAA;AAC/E,EAAA,eAAA,CAAgB,IAAA,CAAK,CAAA,sEAAA,EAAyE,iBAAiB,CAAA,CAAA,CAAG,CAAA;AAElH,EAAA,OAAO,eAAA;AACT;AAjCS,MAAA,CAAA,uBAAA,EAAA,yBAAA,CAAA;AAwDF,SAAS,oBAAA,CACd,iBAAA,EACA,MAAA,EACA,MAAA,EACgB;AAChB,EAAA,MAAM,sBAAsB,4BAAA,EAA6B;AAEzD,EAAA,MAAA,EAAQ,MAAM,0BAAA,EAA4B;AAAA,IACxC,iBAAA;AAAA,IACA,MAAA;AAAA,IACA;AAAA,GACD,CAAA;AAGD,EAAA,IAAI,YAAA,GAA+C,iBAAA;AAGnD,EAAA,IAAI,CAAC,YAAA,EAAc;AACjB,IAAA,IAAI,mBAAA,CAAoB,WAAW,CAAA,EAAG;AACpC,MAAA,MAAM,IAAI,8BAAA;AAAA,QACR,0EAAA;AAAA,QACA;AAAA,UACE,oBAAoB,EAAC;AAAA,UACrB,eAAA,EAAiB;AAAA,YACf,oGAAA;AAAA,YACA;AAAA;AACF;AACF,OACF;AAAA,IACF,CAAA,MAAA,IAAW,mBAAA,CAAoB,MAAA,KAAW,CAAA,EAAG;AAE3C,MAAA,YAAA,GAAe,oBAAoB,CAAC,CAAA;AACpC,MAAA,MAAA,EAAQ,KAAA,CAAM,CAAA,eAAA,EAAkB,YAAY,CAAA,gCAAA,CAAkC,CAAA;AAAA,IAChF,CAAA,MAAO;AAEL,MAAA,MAAM,IAAI,8BAAA;AAAA,QACR,CAAA,sCAAA,EAAyC,oBAAoB,IAAA,CAAK,IAAI,CAAC,CAAA,2GAAA,EAElC,mBAAA,CAAoB,CAAC,CAAC,CAAA,GAAA,CAAA;AAAA,QAC3D;AAAA,UACE,kBAAA,EAAoB,mBAAA;AAAA,UACpB,eAAA,EAAiB;AAAA,YACf,CAAA,4DAAA,CAAA;AAAA,YACA,CAAA,sBAAA,EAAyB,mBAAA,CAAoB,IAAA,CAAK,IAAI,CAAC,CAAA,CAAA;AAAA,YACvD,CAAA,0DAAA;AAAA;AACF;AACF,OACF;AAAA,IACF;AAAA,EACF;AAGA,EAAA,IAAI;AACF,IAAA,MAAM,OAAA,GAAU,yBAAyB,YAAY,CAAA;AACrD,IAAA,MAAM,QAAA,GAAW,QAAQ,MAAM,CAAA;AAE/B,IAAA,MAAA,EAAQ,IAAA,CAAK,CAAA,MAAA,EAAS,QAAA,CAAS,IAAI,CAAA,gBAAA,CAAA,EAAoB;AAAA,MACrD,YAAA;AAAA,MACA,aAAa,QAAA,CAAS;AAAA,KACvB,CAAA;AAED,IAAA,OAAO,QAAA;AAAA,EACT,SAAS,KAAA,EAAO;AAEd,IAAA,MAAM,gCAAgC,iBAAA,KAAsB,MAAA;AAC5D,IAAA,IAAI,UAAU,6BAAA,EAA+B;AAE3C,MAAA,IAAI,iBAAiB,8BAAA,EAAgC;AACnD,QAAA,MAAM,KAAA;AAAA,MACR;AAGA,MAAA,MAAMA,YAAW,cAAA,EAAe;AAChC,MAAA,MAAM,qBAAqB,4BAAA,EAA6B;AACxD,MAAA,MAAMC,gBAAAA,GAAkB,uBAAA,CAAwB,YAAA,EAAcD,SAAQ,CAAA;AAEtE,MAAA,MAAM,IAAI,8BAAA;AAAA,QACR,CAAA,8BAAA,EAAiC,YAAY,CAAA,wBAAA,EAA2B,KAAA,YAAiB,QAAQ,KAAA,CAAM,OAAA,GAAU,MAAA,CAAO,KAAK,CAAC,CAAA,CAAA;AAAA,QAC9H;AAAA,UACE,iBAAA,EAAmB,YAAA;AAAA,UACnB,kBAAA;AAAA,UACA,QAAA,EAAAA,SAAAA;AAAA,UACA,eAAA,EAAAC;AAAA;AACF,OACF;AAAA,IACF;AAGA,IAAA,MAAA,EAAQ,IAAA,CAAK,CAAA,kBAAA,EAAqB,YAAY,CAAA,2BAAA,CAAA,EAA+B;AAAA,MAC3E,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,EAAE,OAAA,EAAS,KAAA,CAAM,OAAA,EAAQ,GAAI,EAAE,OAAA,EAAS,MAAA,CAAO,KAAK,CAAA;AAAE,KACvF,CAAA;AAGD,IAAA,KAAA,MAAW,gBAAgB,mBAAA,EAAqB;AAC9C,MAAA,IAAI,iBAAiB,YAAA,EAAc;AAEnC,MAAA,IAAI;AACF,QAAA,MAAM,OAAA,GAAU,yBAAyB,YAAY,CAAA;AACrD,QAAA,MAAM,QAAA,GAAW,QAAQ,MAAM,CAAA;AAE/B,QAAA,MAAA,EAAQ,IAAA,CAAK,CAAA,MAAA,EAAS,QAAA,CAAS,IAAI,CAAA,2BAAA,CAAA,EAA+B;AAAA,UAChE,YAAA,EAAc,YAAA;AAAA,UACd;AAAA,SACD,CAAA;AAED,QAAA,OAAO,QAAA;AAAA,MACT,SAAS,aAAA,EAAe;AACtB,QAAA,MAAA,EAAQ,KAAA,CAAM,CAAA,aAAA,EAAgB,YAAY,CAAA,QAAA,CAAA,EAAY;AAAA,UACpD,KAAA,EAAO,aAAA,YAAyB,KAAA,GAAQ,EAAE,OAAA,EAAS,aAAA,CAAc,OAAA,EAAQ,GAAI,EAAE,OAAA,EAAS,MAAA,CAAO,aAAa,CAAA;AAAE,SAC/G,CAAA;AAAA,MACH;AAAA,IACF;AAGA,IAAA,MAAM,WAAW,cAAA,EAAe;AAChC,IAAA,MAAM,eAAA,GAAkB,uBAAA,CAAwB,YAAA,EAAc,QAAQ,CAAA;AAEtE,IAAA,MAAM,IAAI,8BAAA;AAAA,MACR,qDAAqD,YAAY,CAAA,CAAA,CAAA;AAAA,MACjE;AAAA,QACE,iBAAA,EAAmB,YAAA;AAAA,QACnB,kBAAA,EAAoB,mBAAA;AAAA,QACpB,QAAA;AAAA,QACA;AAAA;AACF,KACF;AAAA,EACF;AACF;AA/HgB,MAAA,CAAA,oBAAA,EAAA,sBAAA,CAAA","file":"chunk-OBJR2TL4.js","sourcesContent":["import type { CryptoProviderType, PlatformDetectionResult } from '../types/crypto-provider';\n\n/**\n * Base class for all crypto-related errors\n * Provides structured context for better debugging\n */\nexport class CryptoError extends Error {\n constructor(\n message: string,\n public readonly code: string,\n public readonly context?: Record<string, unknown>\n ) {\n super(message);\n this.name = 'CryptoError';\n\n // Maintain proper stack trace in V8 environments\n if (Error.captureStackTrace) {\n Error.captureStackTrace(this, this.constructor);\n }\n }\n}\n\n/**\n * Thrown when a requested crypto provider is not available in the current environment\n * Includes diagnostic information to help developers understand why and what alternatives exist\n */\nexport class CryptoProviderUnavailableError extends CryptoError {\n constructor(\n message: string,\n context: {\n requestedProvider?: CryptoProviderType;\n availableProviders: CryptoProviderType[];\n platform?: PlatformDetectionResult;\n recommendations: string[];\n }\n ) {\n super(message, 'PROVIDER_UNAVAILABLE', context);\n this.name = 'CryptoProviderUnavailableError';\n }\n\n /**\n * Format a developer-friendly error message with context\n * Includes available alternatives and actionable recommendations\n */\n toDevMessage(): string {\n // Guard against undefined context (defensive programming)\n if (!this.context) {\n return this.message;\n }\n\n const ctx = this.context as {\n requestedProvider?: CryptoProviderType;\n availableProviders: CryptoProviderType[];\n platform?: PlatformDetectionResult;\n recommendations: string[];\n };\n\n const lines: string[] = [\n this.message,\n '',\n 'Available providers:',\n ...ctx.availableProviders.map(p => ` - ${p}`),\n ];\n\n if (ctx.recommendations.length > 0) {\n lines.push('', 'Recommendations:');\n lines.push(...ctx.recommendations.map(r => ` - ${r}`));\n }\n\n // Add platform information if available\n if (ctx.platform) {\n const platformType = ctx.platform.isNode\n ? 'Node.js'\n : ctx.platform.isBrowser\n ? 'Browser'\n : ctx.platform.isReactNative\n ? 'React Native'\n : 'Unknown';\n\n lines.push('', `Platform: ${platformType}`);\n\n if (ctx.platform.platform) {\n lines.push(`OS: ${ctx.platform.platform}`);\n }\n\n if (ctx.platform.userAgent) {\n const ua = ctx.platform.userAgent;\n // Only truncate if longer than 100 characters\n const truncated = ua.length > 100 ? `${ua.substring(0, 100)}...` : ua;\n lines.push(`User Agent: ${truncated}`);\n }\n }\n\n return lines.join('\\n');\n }\n}\n\n/**\n * Thrown when a specific cryptographic operation is not supported by the provider\n */\nexport class CryptoCapabilityMissingError extends CryptoError {\n constructor(\n operation: string,\n provider: string,\n reason: string\n ) {\n super(\n `Crypto operation '${operation}' is not available in provider '${provider}': ${reason}`,\n 'CAPABILITY_MISSING',\n { operation, provider, reason }\n );\n this.name = 'CryptoCapabilityMissingError';\n }\n}\n","/**\n * Global registry for crypto providers\n *\n * @deprecated This module is deprecated. Use crypto factory functions instead:\n * ```typescript\n * import { BananaLink, webSocketTransport, nobleCrypto } from '@bananalink-sdk/client'\n *\n * const client = new BananaLink({\n * transport: webSocketTransport(),\n * crypto: nobleCrypto(),\n * })\n * ```\n *\n * The registry is kept for backward compatibility but will be removed in a future version.\n */\n\nimport type { CryptoProvider, CryptoProviderType } from '../../types/crypto-provider';\nimport type { Logger } from '@bananalink-sdk/logger';\n\n/**\n * Factory function type for creating crypto provider instances\n */\nexport type CryptoProviderFactory = (logger?: Logger) => CryptoProvider;\n\n/**\n * Global registry storing available crypto providers\n */\nconst cryptoProviders = new Map<CryptoProviderType, CryptoProviderFactory>();\n\n/**\n * Register a crypto provider factory\n * Called automatically when a provider module is imported\n *\n * This function is idempotent - calling it multiple times with the same type\n * will only register the provider once.\n *\n * @param type - The provider type identifier\n * @param factory - Factory function that creates provider instances\n *\n * @example\n * ```typescript\n * // In noble-provider.ts\n * registerCryptoProvider('noble', (logger) => new NobleCryptoProvider(logger));\n * ```\n */\nexport function registerCryptoProvider(type: CryptoProviderType, factory: CryptoProviderFactory): void {\n // Skip if already registered (idempotent)\n if (cryptoProviders.has(type)) {\n return;\n }\n cryptoProviders.set(type, factory);\n}\n\n/**\n * Get a registered crypto provider factory\n *\n * @param type - The provider type to retrieve\n * @returns The provider factory function\n * @throws Error if the provider is not registered\n */\nexport function getCryptoProviderFactory(type: CryptoProviderType): CryptoProviderFactory {\n const factory = cryptoProviders.get(type);\n\n if (!factory) {\n const availableProviders = Array.from(cryptoProviders.keys()).join(', ');\n const importHint = getImportHint(type);\n\n throw new Error(\n `Crypto provider '${type}' is not registered. ${importHint}\\n` +\n `Available providers: ${availableProviders || 'none'}\\n` +\n `Make sure to import the provider before using it.`,\n );\n }\n\n return factory;\n}\n\n/**\n * Check if a crypto provider is registered\n *\n * @param type - The provider type to check\n * @returns True if the provider is registered\n */\nexport function isCryptoProviderRegistered(type: CryptoProviderType): boolean {\n return cryptoProviders.has(type);\n}\n\n/**\n * Get all registered crypto provider types\n *\n * @returns Array of registered provider types\n */\nexport function getRegisteredCryptoProviders(): CryptoProviderType[] {\n return Array.from(cryptoProviders.keys());\n}\n\n/**\n * Clear all registered providers (useful for testing)\n */\nexport function clearCryptoProviderRegistry(): void {\n cryptoProviders.clear();\n}\n\n/**\n * Get import hint for a specific provider type\n */\nfunction getImportHint(type: CryptoProviderType): string {\n switch (type) {\n case 'noble':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/noble'?\";\n case 'quickcrypto':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/quickcrypto'?\";\n case 'webcrypto':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/webcrypto'?\";\n case 'node':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/node'?\";\n default:\n return `Did you forget to import the '${String(type)}' provider?`;\n }\n}\n\n/**\n * Type augmentation for registered providers\n * This allows TypeScript to track which providers are available\n */\ndeclare global {\n // eslint-disable-next-line @typescript-eslint/no-namespace\n namespace BananaLink {\n // eslint-disable-next-line @typescript-eslint/no-empty-object-type\n interface RegisteredCryptoProviders {\n // This will be augmented by each provider module\n }\n }\n}\n","import type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoKeyLike, ProviderKeyPair } from '../../types/crypto-provider';\n\n/**\n * Compliance audit event types\n */\nexport type ComplianceEventType =\n | 'key_generation'\n | 'key_import'\n | 'key_export'\n | 'key_derivation'\n | 'encryption'\n | 'decryption'\n | 'hmac_generation'\n | 'hmac_verification'\n | 'random_generation';\n\n/**\n * Compliance audit event\n */\nexport interface ComplianceAuditEvent {\n eventType: ComplianceEventType;\n timestamp: string;\n sessionId?: string;\n keyUsage?: readonly string[];\n dataSize?: number;\n algorithm?: string;\n success: boolean;\n error?: string;\n metadata?: Record<string, unknown>;\n}\n\n/**\n * Compliance audit logger interface\n */\nexport interface ComplianceAuditor {\n logEvent(event: ComplianceAuditEvent): void;\n getAuditLog(): ComplianceAuditEvent[];\n clearAuditLog(): void;\n}\n\n/**\n * Default compliance auditor implementation\n */\nexport class DefaultComplianceAuditor implements ComplianceAuditor {\n private auditLog: ComplianceAuditEvent[] = [];\n private readonly logger?: Logger;\n\n constructor(logger?: Logger) {\n this.logger = logger?.child({ component: 'ComplianceAuditor' });\n }\n\n logEvent(event: ComplianceAuditEvent): void {\n this.auditLog.push(event);\n this.logger?.info('Compliance audit event', {\n eventType: event.eventType,\n success: event.success,\n sessionId: event.sessionId,\n timestamp: event.timestamp\n });\n }\n\n getAuditLog(): ComplianceAuditEvent[] {\n return [...this.auditLog];\n }\n\n clearAuditLog(): void {\n this.auditLog = [];\n this.logger?.debug('Compliance audit log cleared');\n }\n}\n\n/**\n * Key usage restrictions for compliance\n */\nexport interface KeyUsageRestrictions {\n allowKeyExport?: boolean;\n allowKeyImport?: boolean;\n requiredKeyUsages?: string[];\n forbiddenKeyUsages?: string[];\n maxDataSize?: number;\n requireSessionId?: boolean;\n}\n\n/**\n * Compliance configuration\n */\nexport interface ComplianceConfig {\n enabled?: boolean;\n auditor?: ComplianceAuditor;\n keyRestrictions?: KeyUsageRestrictions;\n sessionId?: string;\n enableStrictMode?: boolean;\n strictMode?: boolean;\n}\n\n/**\n * Compliance wrapper for CryptoProvider implementations\n * Provides audit logging, key usage restrictions, and regulatory compliance features\n */\nexport class ComplianceCryptoProvider implements CryptoProvider {\n public readonly name: string;\n public readonly isAvailable: boolean;\n\n private readonly underlyingProvider: CryptoProvider;\n private readonly config: ComplianceConfig;\n private readonly auditor: ComplianceAuditor;\n private readonly logger?: Logger;\n\n constructor(\n underlyingProvider: CryptoProvider,\n config: ComplianceConfig = {},\n logger?: Logger\n ) {\n this.underlyingProvider = underlyingProvider;\n this.config = config;\n this.auditor = config.auditor || new DefaultComplianceAuditor(logger);\n this.logger = logger?.child({\n component: 'ComplianceCryptoProvider',\n underlyingProvider: underlyingProvider.name\n });\n\n this.name = `Compliance(${underlyingProvider.name})`;\n this.isAvailable = underlyingProvider.isAvailable;\n }\n\n /**\n * Create compliance audit event\n */\n private createAuditEvent(\n eventType: ComplianceEventType,\n success: boolean,\n metadata: Record<string, unknown> = {},\n error?: string\n ): ComplianceAuditEvent {\n return {\n eventType,\n timestamp: new Date().toISOString(),\n sessionId: this.config.sessionId,\n success,\n error,\n metadata,\n ...metadata\n };\n }\n\n /**\n * Validate key usage restrictions\n */\n private validateKeyUsage(operation: string, keyUsages?: readonly string[], dataSize?: number): void {\n const restrictions = this.config.keyRestrictions;\n if (!restrictions) return;\n\n if (restrictions.requireSessionId && !this.config.sessionId) {\n throw new Error('Session ID required for compliance but not provided');\n }\n\n if (restrictions.maxDataSize && dataSize && dataSize > restrictions.maxDataSize) {\n throw new Error(`Data size ${dataSize} exceeds maximum allowed ${restrictions.maxDataSize} bytes`);\n }\n\n if (keyUsages && restrictions.requiredKeyUsages) {\n const hasRequiredUsage = restrictions.requiredKeyUsages.some(usage => keyUsages.includes(usage));\n if (!hasRequiredUsage) {\n throw new Error(`Key must have one of required usages: ${restrictions.requiredKeyUsages.join(', ')}`);\n }\n }\n\n if (keyUsages && restrictions.forbiddenKeyUsages) {\n const hasForbiddenUsage = restrictions.forbiddenKeyUsages.some(usage => keyUsages.includes(usage));\n if (hasForbiddenUsage) {\n throw new Error(`Key has forbidden usage. Forbidden: ${restrictions.forbiddenKeyUsages.join(', ')}`);\n }\n }\n\n // Operation-specific restrictions\n if (operation === 'export' && restrictions.allowKeyExport === false) {\n throw new Error('Key export is forbidden by compliance policy');\n }\n\n if (operation === 'import' && restrictions.allowKeyImport === false) {\n throw new Error('Key import is forbidden by compliance policy');\n }\n }\n\n /**\n * Generate ECDH P-256 key pair with compliance audit\n */\n async generateKeyPair(): Promise<ProviderKeyPair> {\n const startTime = Date.now();\n\n try {\n this.logger?.debug('Generating key pair with compliance audit');\n\n const keyPair = await this.underlyingProvider.generateKeyPair();\n\n this.validateKeyUsage('generation', keyPair.privateKey.usages);\n\n this.auditor.logEvent(this.createAuditEvent('key_generation', true, {\n algorithm: keyPair.privateKey.algorithm,\n keyUsage: keyPair.privateKey.usages,\n duration: Date.now() - startTime\n }));\n\n return keyPair;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_generation', false, {\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Export public key with compliance audit\n */\n async exportPublicKey(publicKey: CryptoKeyLike): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('export', publicKey.usages);\n\n const keyData = await this.underlyingProvider.exportPublicKey(publicKey);\n\n this.auditor.logEvent(this.createAuditEvent('key_export', true, {\n keyType: 'public',\n algorithm: publicKey.algorithm,\n keySize: keyData.byteLength,\n duration: Date.now() - startTime\n }));\n\n return keyData;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_export', false, {\n keyType: 'public',\n algorithm: publicKey.algorithm,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Export private key with compliance audit\n */\n async exportPrivateKey(privateKey: CryptoKeyLike): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('export', privateKey.usages);\n\n // Extra security check for private key export\n if (this.config.enableStrictMode) {\n this.logger?.warn('Private key export in strict compliance mode', {\n sessionId: this.config.sessionId,\n algorithm: privateKey.algorithm\n });\n }\n\n const keyData = await this.underlyingProvider.exportPrivateKey(privateKey);\n\n this.auditor.logEvent(this.createAuditEvent('key_export', true, {\n keyType: 'private',\n algorithm: privateKey.algorithm,\n keySize: keyData.byteLength,\n strictMode: this.config.enableStrictMode,\n duration: Date.now() - startTime\n }));\n\n return keyData;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_export', false, {\n keyType: 'private',\n algorithm: privateKey.algorithm,\n strictMode: this.config.enableStrictMode,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Import public key with compliance audit\n */\n async importPublicKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('import');\n\n const key = await this.underlyingProvider.importPublicKey(keyData);\n\n this.auditor.logEvent(this.createAuditEvent('key_import', true, {\n keyType: 'public',\n algorithm: key.algorithm,\n keySize: keyData.byteLength,\n keyUsage: key.usages,\n duration: Date.now() - startTime\n }));\n\n return key;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_import', false, {\n keyType: 'public',\n keySize: keyData.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Import private key with compliance audit\n */\n async importPrivateKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('import');\n\n const key = await this.underlyingProvider.importPrivateKey(keyData);\n\n this.auditor.logEvent(this.createAuditEvent('key_import', true, {\n keyType: 'private',\n algorithm: key.algorithm,\n keySize: keyData.byteLength,\n keyUsage: key.usages,\n duration: Date.now() - startTime\n }));\n\n return key;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_import', false, {\n keyType: 'private',\n keySize: keyData.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Derive shared secret with compliance audit\n */\n async deriveSharedSecret(privateKey: CryptoKeyLike, publicKey: CryptoKeyLike): Promise<CryptoKeyLike> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('derivation', privateKey.usages);\n\n const sharedSecret = await this.underlyingProvider.deriveSharedSecret(privateKey, publicKey);\n\n this.auditor.logEvent(this.createAuditEvent('key_derivation', true, {\n operation: 'ECDH',\n algorithm: privateKey.algorithm,\n duration: Date.now() - startTime\n }));\n\n return sharedSecret;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_derivation', false, {\n operation: 'ECDH',\n algorithm: privateKey.algorithm,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Derive encryption key with compliance audit\n */\n async deriveEncryptionKey(sharedSecret: CryptoKeyLike, salt: ArrayBuffer, info: ArrayBuffer): Promise<CryptoKeyLike> {\n const startTime = Date.now();\n\n try {\n const encryptionKey = await this.underlyingProvider.deriveEncryptionKey(sharedSecret, salt, info);\n\n this.auditor.logEvent(this.createAuditEvent('key_derivation', true, {\n operation: 'HKDF',\n algorithm: 'HKDF-SHA256',\n saltSize: salt.byteLength,\n infoSize: info.byteLength,\n duration: Date.now() - startTime\n }));\n\n return encryptionKey;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_derivation', false, {\n operation: 'HKDF',\n algorithm: 'HKDF-SHA256',\n saltSize: salt.byteLength,\n infoSize: info.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Generate random bytes with compliance audit\n */\n randomBytes(length: number): ArrayBuffer {\n const startTime = Date.now();\n\n try {\n const randomData = this.underlyingProvider.randomBytes(length);\n\n this.auditor.logEvent(this.createAuditEvent('random_generation', true, {\n length,\n duration: Date.now() - startTime\n }));\n\n return randomData;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('random_generation', false, {\n length,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Encrypt data with compliance audit\n */\n async encrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('encryption', key.usages, data.byteLength);\n\n const ciphertext = await this.underlyingProvider.encrypt(key, data, iv);\n\n this.auditor.logEvent(this.createAuditEvent('encryption', true, {\n algorithm: key.algorithm,\n dataSize: data.byteLength,\n ivSize: iv.byteLength,\n ciphertextSize: ciphertext.byteLength,\n duration: Date.now() - startTime\n }));\n\n return ciphertext;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('encryption', false, {\n algorithm: key.algorithm,\n dataSize: data.byteLength,\n ivSize: iv.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Decrypt data with compliance audit\n */\n async decrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('decryption', key.usages, data.byteLength);\n\n const plaintext = await this.underlyingProvider.decrypt(key, data, iv);\n\n this.auditor.logEvent(this.createAuditEvent('decryption', true, {\n algorithm: key.algorithm,\n dataSize: data.byteLength,\n ivSize: iv.byteLength,\n plaintextSize: plaintext.byteLength,\n duration: Date.now() - startTime\n }));\n\n return plaintext;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('decryption', false, {\n algorithm: key.algorithm,\n dataSize: data.byteLength,\n ivSize: iv.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Generate HMAC with compliance audit\n */\n async generateHMAC(key: CryptoKeyLike, data: ArrayBuffer): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('hmac', key.usages, data.byteLength);\n\n const mac = await this.underlyingProvider.generateHMAC(key, data);\n\n this.auditor.logEvent(this.createAuditEvent('hmac_generation', true, {\n algorithm: 'HMAC-SHA256',\n dataSize: data.byteLength,\n macSize: mac.byteLength,\n duration: Date.now() - startTime\n }));\n\n return mac;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('hmac_generation', false, {\n algorithm: 'HMAC-SHA256',\n dataSize: data.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Verify HMAC with compliance audit\n */\n async verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('hmac', key.usages, data.byteLength);\n\n const isValid = await this.underlyingProvider.verifyHMAC(key, data, mac);\n\n this.auditor.logEvent(this.createAuditEvent('hmac_verification', true, {\n algorithm: 'HMAC-SHA256',\n dataSize: data.byteLength,\n macSize: mac.byteLength,\n verified: isValid,\n duration: Date.now() - startTime\n }));\n\n return isValid;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('hmac_verification', false, {\n algorithm: 'HMAC-SHA256',\n dataSize: data.byteLength,\n macSize: mac.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Get compliance auditor for external access\n */\n getAuditor(): ComplianceAuditor {\n return this.auditor;\n }\n\n /**\n * Update compliance configuration\n */\n updateConfig(newConfig: Partial<ComplianceConfig>): void {\n Object.assign(this.config, newConfig);\n this.logger?.debug('Compliance configuration updated', newConfig);\n }\n\n /**\n * Get underlying provider (for debugging/testing)\n */\n getUnderlyingProvider(): CryptoProvider {\n return this.underlyingProvider;\n }\n}\n","/**\n * CryptoContext - Singleton manager for the active crypto provider\n *\n * Provides a global context for crypto operations while maintaining\n * the ability to use custom providers when needed.\n *\n * @example\n * // Automatic initialization with best available provider\n * const bytes = randomBytes(32);\n *\n * @example\n * // Explicit provider configuration\n * CryptoContext.initialize({ type: 'noble' });\n * const bytes = randomBytes(32);\n *\n * @example\n * // Custom provider instance\n * const provider = new NobleCryptoProvider();\n * CryptoContext.setProvider(provider);\n */\n\nimport type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoProviderType } from '../types/crypto-provider';\nimport { createCryptoProvider, getRegisteredCryptoProviders } from './providers';\nimport { ComplianceCryptoProvider } from './providers/compliance-provider';\nimport type { ComplianceConfig } from './providers/compliance-provider';\nimport { CryptoProviderUnavailableError } from './errors';\nimport { detectPlatform } from './utils';\n\nexport interface CryptoContextConfig {\n /** Provider type to use (auto-detects if not specified) */\n type?: CryptoProviderType;\n /** Strict mode - throw if preferred provider unavailable (default: false) */\n strict?: boolean;\n /** Compliance configuration (wraps provider if enabled) */\n compliance?: ComplianceConfig;\n /** Logger instance for debug output */\n logger?: Logger;\n}\n\n/**\n * Singleton context for managing the active crypto provider\n *\n * Design rationale:\n * - Provides convenient global access to crypto operations\n * - Maintains lazy initialization for tree-shaking\n * - Allows explicit provider configuration when needed\n * - Supports both automatic and manual provider selection\n */\nclass CryptoContextManager {\n private provider: CryptoProvider | null = null;\n private config: CryptoContextConfig | null = null;\n private initialized = false;\n private initializing = false;\n\n /**\n * Initialize the crypto context with specific configuration\n *\n * @param config - Provider configuration options\n * @throws Error if already initialized (call reset() first)\n * @throws CryptoProviderUnavailableError if strict mode enabled and provider unavailable\n */\n initialize(config: CryptoContextConfig = {}): void {\n if (this.initialized && this.provider) {\n throw new Error(\n 'CryptoContext already initialized. Call CryptoContext.reset() first to reconfigure.'\n );\n }\n\n // Strict mode validation - check if provider is registered\n if (config.strict && config.type) {\n const availableProviders = getRegisteredCryptoProviders();\n if (!availableProviders.includes(config.type)) {\n const platform = detectPlatform();\n const recommendations: string[] = [\n `Import the provider: import '@bananalink-sdk/protocol/crypto/provider/${config.type}'`,\n 'Ensure the provider package is installed',\n ];\n\n // Add platform-specific recommendations\n if (config.type === 'quickcrypto' && !platform.isReactNative) {\n recommendations.push('QuickCrypto requires React Native environment');\n if (platform.isNode) {\n recommendations.push(\"Try 'node' provider for Node.js\");\n } else if (platform.isBrowser) {\n recommendations.push(\"Try 'webcrypto' provider for browsers\");\n }\n }\n\n // Add universal fallback recommendation\n if (availableProviders.includes('noble')) {\n recommendations.push(\"'noble' provider works in all environments as a fallback\");\n }\n\n throw new CryptoProviderUnavailableError(\n `Strict mode: Crypto provider '${config.type}' is not registered. Did you forget to import it?`,\n {\n requestedProvider: config.type,\n availableProviders,\n platform,\n recommendations,\n }\n );\n }\n }\n\n this.config = config;\n this.provider = this.createProvider(config);\n this.initialized = true;\n }\n\n /**\n * Get the active crypto provider\n * Automatically initializes with default config if not already initialized\n *\n * @returns The active crypto provider instance\n * @throws Error if called concurrently during initialization\n *\n * @remarks\n * This method performs lazy initialization on first call. It is NOT safe to call\n * concurrently from multiple contexts before initialization completes (e.g., from\n * Worker threads or Promise.all). For concurrent access scenarios, explicitly call\n * initialize() first to ensure the provider is ready before concurrent operations begin.\n *\n * @example\n * ```typescript\n * // Safe: Single-threaded lazy initialization\n * const provider = CryptoContext.getProvider();\n *\n * // Safe: Pre-initialize for concurrent access\n * CryptoContext.initialize({ type: 'noble' });\n * await Promise.all([\n * operation1(CryptoContext.getProvider()),\n * operation2(CryptoContext.getProvider())\n * ]);\n *\n * // Unsafe: Concurrent calls during lazy initialization\n * await Promise.all([\n * operation1(CryptoContext.getProvider()), // May throw if not initialized yet\n * operation2(CryptoContext.getProvider())\n * ]);\n * ```\n */\n getProvider(): CryptoProvider {\n // Check if already initialized\n if (this.provider) {\n return this.provider;\n }\n\n // Prevent race condition - if already initializing, throw error\n if (this.initializing) {\n throw new Error(\n 'CryptoContext initialization in progress. Avoid concurrent calls to getProvider() during initialization.'\n );\n }\n\n // Lazy initialization with defaults\n this.initializing = true;\n try {\n this.initialize();\n // After initialize(), provider is guaranteed to be set\n if (!this.provider) {\n throw new Error('CryptoContext initialization failed: provider is null');\n }\n return this.provider;\n } finally {\n this.initializing = false;\n }\n }\n\n /**\n * Set a custom provider instance\n * Useful for testing or advanced use cases\n *\n * @param provider - Custom provider instance\n */\n setProvider(provider: CryptoProvider): void {\n this.provider = provider;\n this.initialized = true;\n }\n\n /**\n * Check if context has been explicitly initialized\n */\n isInitialized(): boolean {\n return this.initialized;\n }\n\n /**\n * Get current configuration\n */\n getConfig(): CryptoContextConfig | null {\n return this.config;\n }\n\n /**\n * Reset the context (for testing or reconfiguration)\n */\n reset(): void {\n this.provider = null;\n this.config = null;\n this.initialized = false;\n this.initializing = false;\n }\n\n /**\n * Create a provider instance from configuration\n */\n private createProvider(config: CryptoContextConfig): CryptoProvider {\n const baseProvider = createCryptoProvider(config.type, config.logger, config.strict);\n\n if (config.compliance?.enabled) {\n return new ComplianceCryptoProvider(baseProvider, config.compliance);\n }\n\n return baseProvider;\n }\n\n}\n\n/**\n * Global singleton instance\n *\n * Usage:\n * - Most code should use utility functions (randomBytes, generateNonce)\n * - Advanced use cases can access CryptoContext directly\n */\nexport const CryptoContext = new CryptoContextManager();\n","import type { CryptoProvider, PlatformDetectionResult } from '../types/crypto-provider';\nimport { CryptoContext } from './context';\n\n/**\n * Generate cryptographically secure random bytes\n *\n * Uses the global CryptoContext provider (auto-initializes if needed).\n * For custom provider usage, pass a provider instance.\n *\n * @param length - Number of bytes to generate\n * @param provider - Optional custom provider (uses CryptoContext if not provided)\n * @returns Cryptographically secure random bytes\n *\n * @example\n * // Default behavior (uses CryptoContext)\n * const bytes = randomBytes(32);\n *\n * @example\n * // With custom provider\n * const provider = new NobleCryptoProvider();\n * const bytes = randomBytes(32, provider);\n */\nexport function randomBytes(length: number, provider?: CryptoProvider): Uint8Array {\n const activeProvider = provider || CryptoContext.getProvider();\n const buffer = activeProvider.randomBytes(length);\n return new Uint8Array(buffer);\n}\n\n/**\n * Convert ArrayBuffer to base64 string\n */\nexport function arrayBufferToBase64(buffer: ArrayBuffer): string {\n const bytes = new Uint8Array(buffer);\n let binary = '';\n for (let i = 0; i < bytes.byteLength; i++) {\n binary += String.fromCharCode(bytes[i]);\n }\n return btoa(binary);\n}\n\n/**\n * Convert base64 string to ArrayBuffer\n */\nexport function base64ToArrayBuffer(base64: string): ArrayBuffer {\n // Sanitize the base64 string - remove any whitespace and invalid characters\n const cleanBase64 = base64.replace(/[^A-Za-z0-9+/=]/g, '');\n\n // Ensure proper padding\n let paddedBase64 = cleanBase64;\n while (paddedBase64.length % 4 !== 0) {\n paddedBase64 += '=';\n }\n\n try {\n const binary = atob(paddedBase64);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes.buffer;\n } catch (error) {\n throw new Error(`Failed to decode base64 string: ${error instanceof Error ? error.message : 'Invalid base64 format'}. Original string: ${base64.substring(0, 50)}...`);\n }\n}\n\n/**\n * Convert string to ArrayBuffer\n */\nexport function stringToArrayBuffer(str: string): ArrayBuffer {\n return new TextEncoder().encode(str).buffer;\n}\n\n/**\n * Convert ArrayBuffer to string\n */\nexport function arrayBufferToString(buffer: ArrayBuffer): string {\n return new TextDecoder().decode(buffer);\n}\n\n/**\n * Generate a cryptographically secure nonce\n *\n * @param length - Number of bytes to generate (default: 32)\n * @param provider - Optional custom provider (uses CryptoContext if not provided)\n * @returns Hex-encoded string (2 characters per byte)\n *\n * @example\n * generateNonce() // Returns 64-char hex string (32 bytes)\n * generateNonce(16) // Returns 32-char hex string (16 bytes)\n *\n * @example\n * // With custom provider\n * const provider = new NobleCryptoProvider();\n * const nonce = generateNonce(32, provider);\n */\nexport function generateNonce(length: number = 32, provider?: CryptoProvider): string {\n const bytes = randomBytes(length, provider);\n return Array.from(bytes, (byte: number) => byte.toString(16).padStart(2, '0')).join('');\n}\n\n/**\n * Generate a RFC 4122 version 4 UUID (Universally Unique Identifier)\n *\n * Uses cryptographically secure random bytes from the configured CryptoProvider.\n * This implementation is mobile-safe and works across all platforms (Browser, Node.js, React Native).\n *\n * Output format: xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\n * where x is any hexadecimal digit and y is one of 8, 9, a, or b.\n *\n * @param provider - Optional custom provider (uses CryptoContext if not provided)\n * @returns UUID v4 string (36 characters including dashes)\n *\n * @example\n * // Default behavior (uses CryptoContext)\n * const uuid = generateUUID();\n * // Example output: \"f47ac10b-58cc-4372-a567-0e02b2c3d479\"\n *\n * @example\n * // With custom provider\n * const provider = new NobleCryptoProvider();\n * const uuid = generateUUID(provider);\n */\nexport function generateUUID(provider?: CryptoProvider): string {\n const bytes = randomBytes(16, provider);\n\n // Set version (4) and variant bits according to RFC 4122\n bytes[6] = (bytes[6] & 0x0f) | 0x40; // Version 4\n bytes[8] = (bytes[8] & 0x3f) | 0x80; // Variant 10\n\n // Convert to hex string with dashes\n const hex = Array.from(bytes, (byte: number) => byte.toString(16).padStart(2, '0')).join('');\n return [\n hex.slice(0, 8),\n hex.slice(8, 12),\n hex.slice(12, 16),\n hex.slice(16, 20),\n hex.slice(20, 32)\n ].join('-');\n}\n\n/**\n * Detect the current platform/runtime environment\n *\n * Provides information about whether code is running in Node.js, browser,\n * React Native, or other JavaScript environments.\n *\n * @returns Platform detection result with environment flags\n *\n * @example\n * const platform = detectPlatform();\n * if (platform.isNode) {\n * console.log('Running in Node.js');\n * } else if (platform.isBrowser) {\n * console.log('Running in browser');\n * }\n */\nexport function detectPlatform(): PlatformDetectionResult {\n // Check for Node.js\n const isNode = typeof process !== 'undefined' &&\n process.versions != null &&\n process.versions.node != null;\n\n // Check for browser\n const isBrowser = typeof window !== 'undefined' &&\n typeof document !== 'undefined';\n\n // Check for React Native\n const isReactNative = typeof navigator !== 'undefined' &&\n navigator.product === 'ReactNative';\n\n // Get platform identifier (Node.js only)\n let platform: string | undefined;\n if (isNode && typeof process.platform === 'string') {\n platform = process.platform;\n }\n\n // Get user agent (browser/React Native)\n let userAgent: string | undefined;\n if (typeof navigator !== 'undefined' && typeof navigator.userAgent === 'string') {\n userAgent = navigator.userAgent;\n }\n\n return {\n isNode,\n isBrowser,\n isReactNative,\n platform,\n userAgent,\n };\n}\n","import type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoProviderType } from '../../types/crypto-provider';\nimport { CryptoProviderUnavailableError } from '../errors';\nimport { detectPlatform } from '../utils';\nimport {\n getCryptoProviderFactory,\n getRegisteredCryptoProviders\n} from './registry';\n\n/**\n * Generate context-appropriate recommendations for unavailable providers\n */\nfunction generateRecommendations(\n requestedProvider: CryptoProviderType,\n platform: ReturnType<typeof detectPlatform>\n): string[] {\n const recommendations: string[] = [];\n\n // Provider-specific recommendations\n if (requestedProvider === 'webcrypto') {\n recommendations.push(\"WebCrypto requires a browser or Node.js 15+ environment\");\n if (platform.isNode) {\n recommendations.push(\"Try 'node' provider for Node.js\");\n }\n } else if (requestedProvider === 'node') {\n recommendations.push(\"Node crypto requires Node.js environment\");\n if (platform.isBrowser) {\n recommendations.push(\"Try 'webcrypto' provider for browsers\");\n }\n } else if (requestedProvider === 'quickcrypto') {\n recommendations.push(\"QuickCrypto requires React Native environment\");\n if (!platform.isReactNative) {\n if (platform.isNode) {\n recommendations.push(\"Try 'node' provider for Node.js\");\n } else if (platform.isBrowser) {\n recommendations.push(\"Try 'webcrypto' provider for browsers\");\n }\n }\n }\n\n // Universal fallback\n recommendations.push(\"'noble' provider works in all environments as a fallback\");\n recommendations.push(`Import the provider: import '@bananalink-sdk/protocol/crypto/provider/${requestedProvider}'`);\n\n return recommendations;\n}\n\n/**\n * Create a crypto provider based on type\n *\n * This factory function uses the global registry to instantiate providers.\n * Providers must be explicitly imported before they can be used.\n *\n * @param preferredProvider - Optional preferred provider type\n * @param logger - Optional logger for debug output\n * @param strict - If true, throw error if preferred provider unavailable\n * @returns The created crypto provider instance\n *\n * @example\n * ```typescript\n * // Import providers to make them available\n * import '@bananalink-sdk/protocol/crypto/provider/noble';\n * import '@bananalink-sdk/protocol/crypto/provider/webcrypto';\n *\n * // Create provider\n * const provider = createCryptoProvider('noble');\n * ```\n */\nexport function createCryptoProvider(\n preferredProvider?: CryptoProviderType,\n logger?: Logger,\n strict?: boolean\n): CryptoProvider {\n const registeredProviders = getRegisteredCryptoProviders();\n\n logger?.debug('Creating crypto provider', {\n preferredProvider,\n strict,\n registeredProviders\n });\n\n // Determine which provider to use\n let providerType: CryptoProviderType | undefined = preferredProvider;\n\n // Strict validation: If no provider specified, require exactly one registered\n if (!providerType) {\n if (registeredProviders.length === 0) {\n throw new CryptoProviderUnavailableError(\n 'No crypto providers are registered. Did you forget to import a provider?',\n {\n availableProviders: [],\n recommendations: [\n \"Import at least one crypto provider, e.g.: import '@bananalink-sdk/protocol/crypto/provider/noble'\",\n \"Noble provider is recommended as a universal fallback\"\n ]\n }\n );\n } else if (registeredProviders.length === 1) {\n // Auto-select the single registered provider\n providerType = registeredProviders[0];\n logger?.debug(`Auto-selected '${providerType}' provider (only one registered)`);\n } else {\n // Multiple registered - require explicit selection\n throw new CryptoProviderUnavailableError(\n `Multiple crypto providers registered: ${registeredProviders.join(', ')}. ` +\n `Either import only one provider OR explicitly set cryptoProvider.type. ` +\n `Example: cryptoProvider: { type: '${registeredProviders[0]}' }`,\n {\n availableProviders: registeredProviders,\n recommendations: [\n `Import only one crypto provider, or specify which one to use`,\n `Registered providers: ${registeredProviders.join(', ')}`,\n `Set cryptoProvider.type to one of the registered providers`\n ]\n }\n );\n }\n }\n\n // Try to create the provider\n try {\n const factory = getCryptoProviderFactory(providerType);\n const provider = factory(logger);\n\n logger?.info(`Using ${provider.name} crypto provider`, {\n providerType,\n isAvailable: provider.isAvailable\n });\n\n return provider;\n } catch (error) {\n // If strict mode AND user explicitly requested a specific provider, throw immediately\n const userRequestedSpecificProvider = preferredProvider !== undefined;\n if (strict && userRequestedSpecificProvider) {\n // If already a CryptoProviderUnavailableError, re-throw as-is\n if (error instanceof CryptoProviderUnavailableError) {\n throw error;\n }\n\n // Wrap generic errors with full context\n const platform = detectPlatform();\n const availableProviders = getRegisteredCryptoProviders();\n const recommendations = generateRecommendations(providerType, platform);\n\n throw new CryptoProviderUnavailableError(\n `Strict mode: Crypto provider '${providerType}' failed to initialize: ${error instanceof Error ? error.message : String(error)}`,\n {\n requestedProvider: providerType,\n availableProviders,\n platform,\n recommendations,\n }\n );\n }\n\n // Try fallback to any available provider\n logger?.warn(`Failed to create '${providerType}' provider, trying fallback`, {\n error: error instanceof Error ? { message: error.message } : { message: String(error) }\n });\n\n // Try each registered provider as fallback\n for (const fallbackType of registeredProviders) {\n if (fallbackType === providerType) continue; // Skip the one that failed\n\n try {\n const factory = getCryptoProviderFactory(fallbackType);\n const provider = factory(logger);\n\n logger?.info(`Using ${provider.name} crypto provider (fallback)`, {\n originalType: providerType,\n fallbackType\n });\n\n return provider;\n } catch (fallbackError) {\n logger?.debug(`Fallback to '${fallbackType}' failed`, {\n error: fallbackError instanceof Error ? { message: fallbackError.message } : { message: String(fallbackError) }\n });\n }\n }\n\n // If we get here, no providers worked\n const platform = detectPlatform();\n const recommendations = generateRecommendations(providerType, platform);\n\n throw new CryptoProviderUnavailableError(\n `Failed to create any crypto provider. Requested: '${providerType}'`,\n {\n requestedProvider: providerType,\n availableProviders: registeredProviders,\n platform,\n recommendations,\n }\n );\n }\n}\n\n/**\n * Export registry functions for advanced usage\n */\nexport {\n isCryptoProviderRegistered,\n getRegisteredCryptoProviders\n} from './registry';\n"]}
|
|
@@ -1,14 +1,13 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var
|
|
4
|
-
require('../../chunk-A6FLEJ7R.cjs');
|
|
3
|
+
var chunkNGPP7HUR_cjs = require('../../chunk-NGPP7HUR.cjs');
|
|
5
4
|
require('../../chunk-WGEGR3DF.cjs');
|
|
6
5
|
|
|
7
6
|
|
|
8
7
|
|
|
9
8
|
Object.defineProperty(exports, "NobleCryptoProvider", {
|
|
10
9
|
enumerable: true,
|
|
11
|
-
get: function () { return
|
|
10
|
+
get: function () { return chunkNGPP7HUR_cjs.NobleCryptoProvider; }
|
|
12
11
|
});
|
|
13
12
|
//# sourceMappingURL=noble-provider.cjs.map
|
|
14
13
|
//# sourceMappingURL=noble-provider.cjs.map
|
|
@@ -19,12 +19,5 @@ declare class NobleCryptoProvider implements CryptoProvider {
|
|
|
19
19
|
generateHMAC(key: CryptoKeyLike, data: ArrayBuffer): Promise<ArrayBuffer>;
|
|
20
20
|
verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean>;
|
|
21
21
|
}
|
|
22
|
-
declare global {
|
|
23
|
-
namespace BananaLink {
|
|
24
|
-
interface RegisteredCryptoProviders {
|
|
25
|
-
noble: true;
|
|
26
|
-
}
|
|
27
|
-
}
|
|
28
|
-
}
|
|
29
22
|
|
|
30
23
|
export { NobleCryptoProvider };
|
|
@@ -19,12 +19,5 @@ declare class NobleCryptoProvider implements CryptoProvider {
|
|
|
19
19
|
generateHMAC(key: CryptoKeyLike, data: ArrayBuffer): Promise<ArrayBuffer>;
|
|
20
20
|
verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean>;
|
|
21
21
|
}
|
|
22
|
-
declare global {
|
|
23
|
-
namespace BananaLink {
|
|
24
|
-
interface RegisteredCryptoProviders {
|
|
25
|
-
noble: true;
|
|
26
|
-
}
|
|
27
|
-
}
|
|
28
|
-
}
|
|
29
22
|
|
|
30
23
|
export { NobleCryptoProvider };
|
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
export { NobleCryptoProvider } from '../../chunk-
|
|
2
|
-
import '../../chunk-TCVKC227.js';
|
|
1
|
+
export { NobleCryptoProvider } from '../../chunk-KJ7QIHAY.js';
|
|
3
2
|
import '../../chunk-WCQVDF3K.js';
|
|
4
3
|
//# sourceMappingURL=noble-provider.js.map
|
|
5
4
|
//# sourceMappingURL=noble-provider.js.map
|
|
@@ -1,6 +1,5 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var chunkA6FLEJ7R_cjs = require('../../chunk-A6FLEJ7R.cjs');
|
|
4
3
|
var chunkWGEGR3DF_cjs = require('../../chunk-WGEGR3DF.cjs');
|
|
5
4
|
|
|
6
5
|
// src/crypto/providers/node-provider.ts
|
|
@@ -62,9 +61,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
62
61
|
try {
|
|
63
62
|
this.cryptoModule = await import('crypto');
|
|
64
63
|
} catch {
|
|
65
|
-
throw new Error(
|
|
66
|
-
"Failed to load Node.js crypto module. This provider requires a Node.js environment."
|
|
67
|
-
);
|
|
64
|
+
throw new Error("Failed to load Node.js crypto module. This provider requires a Node.js environment.");
|
|
68
65
|
}
|
|
69
66
|
}
|
|
70
67
|
return this.cryptoModule;
|
|
@@ -113,10 +110,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
113
110
|
const y = Buffer.from(jwk.y, "base64url");
|
|
114
111
|
const uncompressed = Buffer.concat([Buffer.from([4]), x, y]);
|
|
115
112
|
return await Promise.resolve(
|
|
116
|
-
uncompressed.buffer.slice(
|
|
117
|
-
uncompressed.byteOffset,
|
|
118
|
-
uncompressed.byteOffset + uncompressed.byteLength
|
|
119
|
-
)
|
|
113
|
+
uncompressed.buffer.slice(uncompressed.byteOffset, uncompressed.byteOffset + uncompressed.byteLength)
|
|
120
114
|
);
|
|
121
115
|
}
|
|
122
116
|
/**
|
|
@@ -134,9 +128,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
134
128
|
});
|
|
135
129
|
const jwk = keyObj.export({ format: "jwk" });
|
|
136
130
|
const dValue = Buffer.from(jwk.d, "base64url");
|
|
137
|
-
return await Promise.resolve(
|
|
138
|
-
dValue.buffer.slice(dValue.byteOffset, dValue.byteOffset + dValue.byteLength)
|
|
139
|
-
);
|
|
131
|
+
return await Promise.resolve(dValue.buffer.slice(dValue.byteOffset, dValue.byteOffset + dValue.byteLength));
|
|
140
132
|
}
|
|
141
133
|
/**
|
|
142
134
|
* Import public key from raw ArrayBuffer format
|
|
@@ -223,16 +215,9 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
223
215
|
keyObject.export(),
|
|
224
216
|
Buffer.from(iv)
|
|
225
217
|
);
|
|
226
|
-
const encrypted = Buffer.concat([
|
|
227
|
-
cipher.update(Buffer.from(data)),
|
|
228
|
-
cipher.final(),
|
|
229
|
-
cipher.getAuthTag()
|
|
230
|
-
]);
|
|
218
|
+
const encrypted = Buffer.concat([cipher.update(Buffer.from(data)), cipher.final(), cipher.getAuthTag()]);
|
|
231
219
|
return await Promise.resolve(
|
|
232
|
-
encrypted.buffer.slice(
|
|
233
|
-
encrypted.byteOffset,
|
|
234
|
-
encrypted.byteOffset + encrypted.byteLength
|
|
235
|
-
)
|
|
220
|
+
encrypted.buffer.slice(encrypted.byteOffset, encrypted.byteOffset + encrypted.byteLength)
|
|
236
221
|
);
|
|
237
222
|
}
|
|
238
223
|
/**
|
|
@@ -254,10 +239,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
254
239
|
decipher.setAuthTag(authTag);
|
|
255
240
|
const decrypted = Buffer.concat([decipher.update(ciphertext), decipher.final()]);
|
|
256
241
|
return await Promise.resolve(
|
|
257
|
-
decrypted.buffer.slice(
|
|
258
|
-
decrypted.byteOffset,
|
|
259
|
-
decrypted.byteOffset + decrypted.byteLength
|
|
260
|
-
)
|
|
242
|
+
decrypted.buffer.slice(decrypted.byteOffset, decrypted.byteOffset + decrypted.byteLength)
|
|
261
243
|
);
|
|
262
244
|
}
|
|
263
245
|
/**
|
|
@@ -284,10 +266,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
284
266
|
if (expected.length !== actual.length) {
|
|
285
267
|
return false;
|
|
286
268
|
}
|
|
287
|
-
return cryptoModule.timingSafeEqual(
|
|
288
|
-
Buffer.from(expected),
|
|
289
|
-
Buffer.from(actual)
|
|
290
|
-
);
|
|
269
|
+
return cryptoModule.timingSafeEqual(Buffer.from(expected), Buffer.from(actual));
|
|
291
270
|
}
|
|
292
271
|
/**
|
|
293
272
|
* Generate cryptographically secure random bytes
|
|
@@ -301,7 +280,6 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
301
280
|
};
|
|
302
281
|
chunkWGEGR3DF_cjs.__name(_NodeCryptoProvider, "NodeCryptoProvider");
|
|
303
282
|
var NodeCryptoProvider = _NodeCryptoProvider;
|
|
304
|
-
chunkA6FLEJ7R_cjs.registerCryptoProvider("node", (logger) => new NodeCryptoProvider(logger));
|
|
305
283
|
|
|
306
284
|
exports.NodeCryptoProvider = NodeCryptoProvider;
|
|
307
285
|
//# sourceMappingURL=node-provider.cjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../../../src/crypto/providers/node-provider.ts"],"names":["__name","__require","registerCryptoProvider"],"mappings":";;;;;;AAaA,IAAM,qBAAA,GAAN,MAAM,qBAAA,CAA8C;AAAA,EAClD,WAAA,CACmB,WACA,OAAA,EACjB;AAFiB,IAAA,IAAA,CAAA,SAAA,GAAA,SAAA;AACA,IAAA,IAAA,CAAA,OAAA,GAAA,OAAA;AAAA,EAChB;AAAA,EAEH,IAAI,IAAA,GAAwC;AAC1C,IAAA,OAAO,IAAA,CAAK,OAAA;AAAA,EACd;AAAA,EAEA,IAAI,SAAA,GAAoB;AACtB,IAAA,OAAO,WAAA;AAAA,EACT;AAAA,EAEA,IAAI,WAAA,GAAuB;AACzB,IAAA,OAAO,IAAA;AAAA,EACT;AAAA,EAEA,IAAI,MAAA,GAA4B;AAC9B,IAAA,OAAO,IAAA,CAAK,YAAY,QAAA,GAAW,CAAC,WAAW,SAAS,CAAA,GAAI,CAAC,WAAW,CAAA;AAAA,EAC1E;AAAA,EAEA,IAAI,SAAA,GAAqB;AACvB,IAAA,OAAO,IAAA,CAAK,SAAA;AAAA,EACd;AACF,CAAA;AAzBoDA,wBAAA,CAAA,qBAAA,EAAA,sBAAA,CAAA;AAApD,IAAM,oBAAA,GAAN,qBAAA;AA8BA,SAAS,gBAAgB,OAAA,EAAiC;AACxD,EAAA,IAAI,mBAAmB,oBAAA,EAAsB;AAC3C,IAAA,OAAO,OAAA,CAAQ,SAAA;AAAA,EACjB;AAEA,EAAA,OAAO,OAAA;AACT;AANSA,wBAAA,CAAA,eAAA,EAAA,iBAAA,CAAA;AAyBF,IAAM,mBAAA,GAAN,MAAM,mBAAA,CAA6C;AAAA,EAkBxD,YAAY,MAAA,EAAiB;AAjB7B,IAAA,IAAA,CAAgB,IAAA,GAAO,YAAA;AAEvB,IAAA,IAAA,CAAQ,YAAA,GAAkC,IAAA;AAgBxC,IAAA,IAAI,CAAC,KAAK,WAAA,EAAa;AACrB,MAAA,MAAM,IAAI,MAAM,yDAAyD,CAAA;AAAA,IAC3E;AACA,IAAA,IAAA,CAAK,SAAS,MAAA,EAAQ,KAAA,CAAM,EAAE,SAAA,EAAW,sBAAsB,CAAA;AAAA,EACjE;AAAA,EAlBA,IAAW,WAAA,GAAuB;AAChC,IAAA,IAAI;AAEF,MAAA,IAAI,OAAO,OAAA,KAAY,WAAA,IAAe,CAAC,OAAA,CAAQ,UAAU,IAAA,EAAM;AAC7D,QAAA,OAAO,KAAA;AAAA,MACT;AAEA,MAAA,OAAO,IAAA;AAAA,IACT,CAAA,CAAA,MAAQ;AACN,MAAA,OAAO,KAAA;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,MAAc,SAAA,GAAiC;AAC7C,IAAA,IAAI,CAAC,KAAK,YAAA,EAAc;AACtB,MAAA,IAAI;AAEF,QAAA,IAAA,CAAK,YAAA,GAAe,MAAM,OAAO,QAAQ,CAAA;AAAA,MAC3C,CAAA,CAAA,MAAQ;AACN,QAAA,MAAM,IAAI,KAAA;AAAA,UACR;AAAA,SAEF;AAAA,MACF;AAAA,IACF;AACA,IAAA,OAAO,IAAA,CAAK,YAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eAAA,GAA4C;AAChD,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,oDAAoD,CAAA;AACvE,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAE1C,IAAA,OAAO,IAAI,OAAA,CAAQ,CAAC,OAAA,EAAS,MAAA,KAAW;AACtC,MAAA,YAAA,CAAa,eAAA;AAAA,QACX,IAAA;AAAA,QACA;AAAA,UACE,UAAA,EAAY,YAAA;AAAA;AAAA,UACZ,iBAAA,EAAmB,EAAE,IAAA,EAAM,MAAA,EAAQ,QAAQ,KAAA,EAAM;AAAA,UACjD,kBAAA,EAAoB,EAAE,IAAA,EAAM,OAAA,EAAS,QAAQ,KAAA;AAAM,SACrD;AAAA;AAAA,QAEA,CAAC,GAAA,EAAmB,SAAA,EAAgB,UAAA,KAAoB;AACtD,UAAA,IAAI,GAAA,EAAK;AACP,YAAA,IAAA,CAAK,QAAQ,KAAA,CAAM,4BAAA,EAA8B,EAAE,KAAA,EAAO,KAAK,CAAA;AAC/D,YAAA,MAAA,CAAO,GAAG,CAAA;AACV,YAAA;AAAA,UACF;AAEA,UAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,+BAA+B,CAAA;AAClD,UAAA,OAAA,CAAQ;AAAA,YACN,SAAA,EAAW,IAAI,oBAAA,CAAqB,SAAA,EAAW,QAAQ,CAAA;AAAA,YACvD,UAAA,EAAY,IAAI,oBAAA,CAAqB,UAAA,EAAY,SAAS;AAAA,WAC3D,CAAA;AAAA,QACH;AAAA,OACF;AAAA,IACF,CAAC,CAAA;AAAA,EACH;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,SAAA,EAAgD;AACpE,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sBAAsB,CAAA;AACzC,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,SAAS,CAAA;AAG3C,IAAA,MAAM,MAAA,GAAS,SAAA,YAAqB,MAAA,GAChC,YAAA,CAAa,eAAA,CAAgB,EAAE,GAAA,EAAK,SAAA,EAAW,MAAA,EAAQ,KAAA,EAAO,IAAA,EAAM,MAAA,EAAQ,CAAA,GAC5E,SAAA;AAIJ,IAAA,MAAM,MAAO,MAAA,CAAe,MAAA,CAAO,EAAE,MAAA,EAAQ,OAAO,CAAA;AAEpD,IAAA,MAAM,CAAA,GAAI,MAAA,CAAO,IAAA,CAAK,GAAA,CAAI,GAAa,WAAW,CAAA;AAElD,IAAA,MAAM,CAAA,GAAI,MAAA,CAAO,IAAA,CAAK,GAAA,CAAI,GAAa,WAAW,CAAA;AAGlD,IAAA,MAAM,YAAA,GAAe,MAAA,CAAO,MAAA,CAAO,CAAC,MAAA,CAAO,IAAA,CAAK,CAAC,CAAI,CAAC,CAAA,EAAG,CAAA,EAAG,CAAC,CAAC,CAAA;AAE9D,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA;AAAA,MACnB,aAAa,MAAA,CAAO,KAAA;AAAA,QAClB,YAAA,CAAa,UAAA;AAAA,QACb,YAAA,CAAa,aAAa,YAAA,CAAa;AAAA;AACzC,KACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,iBAAiB,UAAA,EAAiD;AACtE,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,uBAAuB,CAAA;AAC1C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,UAAU,CAAA;AAG5C,IAAA,MAAM,YAAY,SAAA,YAAqB,MAAA,GAAS,SAAA,GAAY,MAAA,CAAO,KAAK,SAAwB,CAAA;AAChG,IAAA,MAAM,MAAA,GAAS,aAAa,gBAAA,CAAiB;AAAA,MAC3C,GAAA,EAAK,SAAA;AAAA,MACL,MAAA,EAAQ,KAAA;AAAA,MACR,IAAA,EAAM;AAAA,KACP,CAAA;AAGD,IAAA,MAAM,MAAM,MAAA,CAAO,MAAA,CAAO,EAAE,MAAA,EAAQ,OAAO,CAAA;AAC3C,IAAA,MAAM,MAAA,GAAS,MAAA,CAAO,IAAA,CAAK,GAAA,CAAI,GAAa,WAAW,CAAA;AAEvD,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA;AAAA,MACnB,MAAA,CAAO,OAAO,KAAA,CAAM,MAAA,CAAO,YAAY,MAAA,CAAO,UAAA,GAAa,OAAO,UAAU;AAAA,KAC9E;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,OAAA,EAA8C;AAClE,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sBAAsB,CAAA;AACzC,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,MAAA,CAAO,IAAA,CAAK,OAAO,CAAA;AAGrC,IAAA,IAAI,UAAU,MAAA,KAAW,EAAA,IAAM,SAAA,CAAU,CAAC,MAAM,CAAA,EAAM;AACpD,MAAA,MAAM,IAAI,MAAM,iEAAiE,CAAA;AAAA,IACnF;AAIA,IAAA,MAAM,CAAA,GAAI,SAAA,CAAU,KAAA,CAAM,CAAA,EAAG,EAAE,CAAA;AAC/B,IAAA,MAAM,CAAA,GAAI,SAAA,CAAU,KAAA,CAAM,EAAA,EAAI,EAAE,CAAA;AAGhC,IAAA,MAAM,GAAA,GAAM;AAAA,MACV,GAAA,EAAK,IAAA;AAAA,MACL,GAAA,EAAK,OAAA;AAAA,MACL,CAAA,EAAG,CAAA,CAAE,QAAA,CAAS,WAAW,CAAA;AAAA,MACzB,CAAA,EAAG,CAAA,CAAE,QAAA,CAAS,WAAW;AAAA,KAC3B;AAEA,IAAA,MAAM,SAAA,GAAY,aAAa,eAAA,CAAgB,EAAE,KAAK,GAAA,EAAK,MAAA,EAAQ,OAAO,CAAA;AAC1E,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,IAAI,oBAAA,CAAqB,SAAA,EAAW,QAAQ,CAAC,CAAA;AAAA,EAC5E;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,iBAAiB,OAAA,EAA8C;AACnE,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,uBAAuB,CAAA;AAC1C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,MAAA,CAAO,IAAA,CAAK,OAAO,CAAA;AAErC,IAAA,IAAI,SAAA,CAAU,WAAW,EAAA,EAAI;AAC3B,MAAA,MAAM,IAAI,MAAM,+CAA+C,CAAA;AAAA,IACjE;AAGA,IAAA,MAAM,GAAA,GAAM;AAAA,MACV,GAAA,EAAK,IAAA;AAAA,MACL,GAAA,EAAK,OAAA;AAAA,MACL,CAAA,EAAG,SAAA,CAAU,QAAA,CAAS,WAAW;AAAA,KACnC;AAEA,IAAA,MAAM,SAAA,GAAY,aAAa,gBAAA,CAAiB,EAAE,KAAK,GAAA,EAAK,MAAA,EAAQ,OAAO,CAAA;AAC3E,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,IAAI,oBAAA,CAAqB,SAAA,EAAW,SAAS,CAAC,CAAA;AAAA,EAC7E;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,kBAAA,CAAmB,UAAA,EAA2B,SAAA,EAAkD;AACpG,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAwB,CAAA;AAC3C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAG1C,IAAA,MAAM,IAAA,GAAO,YAAA,CAAa,UAAA,CAAW,YAAY,CAAA;AAGjD,IAAA,MAAM,UAAA,GAAa,MAAM,IAAA,CAAK,gBAAA,CAAiB,UAAU,CAAA;AACzD,IAAA,IAAA,CAAK,aAAA,CAAc,MAAA,CAAO,IAAA,CAAK,UAAU,CAAC,CAAA;AAG1C,IAAA,MAAM,SAAA,GAAY,MAAM,IAAA,CAAK,eAAA,CAAgB,SAAS,CAAA;AACtD,IAAA,MAAM,eAAe,IAAA,CAAK,aAAA,CAAc,MAAA,CAAO,IAAA,CAAK,SAAS,CAAC,CAAA;AAG9D,IAAA,MAAM,SAAA,GAAY,YAAA,CAAa,eAAA,CAAgB,YAAY,CAAA;AAC3D,IAAA,OAAO,IAAI,oBAAA,CAAqB,SAAA,EAAW,QAAQ,CAAA;AAAA,EACrD;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,mBAAA,CACJ,YAAA,EACA,IAAA,EACA,IAAA,EACwB;AACxB,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,iCAAiC,CAAA;AACpD,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAG1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,YAAY,CAAA;AAE9C,IAAA,MAAM,eAAA,GAAmB,UAAkB,MAAA,EAAO;AAGlD,IAAA,MAAM,aAAa,YAAA,CAAa,QAAA;AAAA,MAC9B,QAAA;AAAA,MACA,OAAO,QAAA,CAAS,eAAe,IAAI,eAAA,GAAkB,MAAA,CAAO,KAAK,eAAe,CAAA;AAAA,MAChF,MAAA,CAAO,KAAK,IAAI,CAAA;AAAA,MAChB,MAAA,CAAO,KAAK,IAAI,CAAA;AAAA,MAChB;AAAA;AAAA,KACF;AAGA,IAAA,MAAM,YAAA,GAAe,YAAA,CAAa,eAAA,CAAgB,UAAU,CAAA;AAC5D,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,IAAI,oBAAA,CAAqB,YAAA,EAAc,QAAQ,CAAC,CAAA;AAAA,EAC/E;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AAC1F,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,6BAA6B,CAAA;AAChD,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,GAAG,CAAA;AAErC,IAAA,MAAM,SAAS,YAAA,CAAa,cAAA;AAAA,MAC1B,aAAA;AAAA;AAAA,MAEC,UAAkB,MAAA,EAAO;AAAA,MAC1B,MAAA,CAAO,KAAK,EAAE;AAAA,KAChB;AAEA,IAAA,MAAM,SAAA,GAAY,OAAO,MAAA,CAAO;AAAA,MAC9B,MAAA,CAAO,MAAA,CAAO,MAAA,CAAO,IAAA,CAAK,IAAI,CAAC,CAAA;AAAA,MAC/B,OAAO,KAAA,EAAM;AAAA,MACb,OAAO,UAAA;AAAW,KACnB,CAAA;AAED,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA;AAAA,MACnB,UAAU,MAAA,CAAO,KAAA;AAAA,QACf,SAAA,CAAU,UAAA;AAAA,QACV,SAAA,CAAU,aAAa,SAAA,CAAU;AAAA;AACnC,KACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AAC1F,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,6BAA6B,CAAA;AAChD,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,GAAG,CAAA;AACrC,IAAA,MAAM,UAAA,GAAa,MAAA,CAAO,IAAA,CAAK,IAAI,CAAA;AAGnC,IAAA,MAAM,OAAA,GAAU,UAAA,CAAW,KAAA,CAAM,GAAG,CAAA;AACpC,IAAA,MAAM,UAAA,GAAa,UAAA,CAAW,KAAA,CAAM,CAAA,EAAG,GAAG,CAAA;AAE1C,IAAA,MAAM,WAAW,YAAA,CAAa,gBAAA;AAAA,MAC5B,aAAA;AAAA;AAAA,MAEC,UAAkB,MAAA,EAAO;AAAA,MAC1B,MAAA,CAAO,KAAK,EAAE;AAAA,KAChB;AACA,IAAA,QAAA,CAAS,WAAW,OAAO,CAAA;AAE3B,IAAA,MAAM,SAAA,GAAY,MAAA,CAAO,MAAA,CAAO,CAAC,QAAA,CAAS,MAAA,CAAO,UAAU,CAAA,EAAG,QAAA,CAAS,KAAA,EAAO,CAAC,CAAA;AAE/E,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA;AAAA,MACnB,UAAU,MAAA,CAAO,KAAA;AAAA,QACf,SAAA,CAAU,UAAA;AAAA,QACV,SAAA,CAAU,aAAa,SAAA,CAAU;AAAA;AACnC,KACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAA,CAAa,GAAA,EAAoB,IAAA,EAAyC;AAC9E,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAwB,CAAA;AAC3C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,GAAG,CAAA;AAGrC,IAAA,MAAM,OAAO,YAAA,CAAa,UAAA,CAAW,QAAA,EAAW,SAAA,CAAkB,QAAQ,CAAA;AAC1E,IAAA,IAAA,CAAK,MAAA,CAAO,MAAA,CAAO,IAAA,CAAK,IAAI,CAAC,CAAA;AAC7B,IAAA,MAAM,GAAA,GAAM,KAAK,MAAA,EAAO;AAExB,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,GAAA,CAAI,MAAA,CAAO,KAAA,CAAM,GAAA,CAAI,UAAA,EAAY,GAAA,CAAI,UAAA,GAAa,GAAA,CAAI,UAAU,CAAC,CAAA;AAAA,EAChG;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,UAAA,CAAW,GAAA,EAAoB,IAAA,EAAmB,GAAA,EAAoC;AAC1F,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,uBAAuB,CAAA;AAC1C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,QAAA,GAAW,MAAM,IAAA,CAAK,YAAA,CAAa,KAAK,IAAI,CAAA;AAClD,IAAA,MAAM,QAAA,GAAW,IAAI,UAAA,CAAW,GAAG,CAAA;AACnC,IAAA,MAAM,MAAA,GAAS,IAAI,UAAA,CAAW,QAAQ,CAAA;AAEtC,IAAA,IAAI,QAAA,CAAS,MAAA,KAAW,MAAA,CAAO,MAAA,EAAQ;AACrC,MAAA,OAAO,KAAA;AAAA,IACT;AAGA,IAAA,OAAO,YAAA,CAAa,eAAA;AAAA,MAClB,MAAA,CAAO,KAAK,QAAQ,CAAA;AAAA,MACpB,MAAA,CAAO,KAAK,MAAM;AAAA,KACpB;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,YAAY,MAAA,EAA6B;AAGvC,IAAA,MAAM,YAAA,GAAe,IAAA,CAAK,YAAA,IAAgBC,2BAAA,CAAQ,QAAQ,CAAA;AAC1D,IAAA,MAAM,MAAA,GAAS,YAAA,CAAa,WAAA,CAAY,MAAM,CAAA;AAC9C,IAAA,OAAO,MAAA,CAAO,OAAO,KAAA,CAAM,MAAA,CAAO,YAAY,MAAA,CAAO,UAAA,GAAa,OAAO,UAAU,CAAA;AAAA,EACrF;AACF,CAAA;AA5V0DD,wBAAA,CAAA,mBAAA,EAAA,oBAAA,CAAA;AAAnD,IAAM,kBAAA,GAAN;AAkWPE,wCAAA,CAAuB,QAAQ,CAAC,MAAA,KAAW,IAAI,kBAAA,CAAmB,MAAM,CAAC,CAAA","file":"node-provider.cjs","sourcesContent":["import type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoKeyLike, ProviderKeyPair } from '../../types/crypto-provider';\nimport { registerCryptoProvider } from './registry';\n\n/**\n * Type definition for Node.js crypto module (loaded dynamically to prevent Metro bundling)\n */\ntype NodeCrypto = typeof import('crypto');\n\n/**\n * Node.js crypto.KeyObject wrapper to implement CryptoKeyLike interface\n * Note: keyObject type is unknown at compile time (crypto.KeyObject | Buffer at runtime)\n */\nclass NodeCryptoKeyWrapper implements CryptoKeyLike {\n constructor(\n private readonly keyObject: unknown, // crypto.KeyObject | Buffer at runtime\n private readonly keyType: 'public' | 'private' | 'secret'\n ) {}\n\n get type(): 'public' | 'private' | 'secret' {\n return this.keyType;\n }\n\n get algorithm(): string {\n return 'ECDH-P256';\n }\n\n get extractable(): boolean {\n return true;\n }\n\n get usages(): readonly string[] {\n return this.keyType === 'secret' ? ['encrypt', 'decrypt'] : ['deriveKey'];\n }\n\n get nativeKey(): unknown {\n return this.keyObject;\n }\n}\n\n/**\n * Helper function to unwrap CryptoKeyLike to native KeyObject or Buffer\n */\nfunction unwrapKeyObject(keyLike: CryptoKeyLike): unknown {\n if (keyLike instanceof NodeCryptoKeyWrapper) {\n return keyLike.nativeKey;\n }\n // Assume it's already a KeyObject\n return keyLike;\n}\n\n/**\n * Node.js crypto module implementation of CryptoProvider\n * Optimized for backend services with native crypto performance\n *\n * This provider uses the native Node.js crypto module which provides:\n * - Superior performance compared to Web Crypto API in Node.js\n * - Direct access to OpenSSL optimizations\n * - Zero additional dependencies\n * - Full support for ECDH P-256 and AES-256-GCM\n *\n * @example\n * ```typescript\n * import { NodeCryptoProvider } from '@bananalink-sdk/protocol/crypto/provider/node';\n * const provider = new NodeCryptoProvider();\n * const keyPair = await provider.generateKeyPair();\n * ```\n */\nexport class NodeCryptoProvider implements CryptoProvider {\n public readonly name = 'NodeCrypto';\n private readonly logger?: Logger;\n private cryptoModule: NodeCrypto | null = null;\n\n public get isAvailable(): boolean {\n try {\n // Check if we're in Node.js environment\n if (typeof process === 'undefined' || !process.versions?.node) {\n return false;\n }\n // Crypto module availability will be checked when getCrypto() is called\n return true;\n } catch {\n return false;\n }\n }\n\n constructor(logger?: Logger) {\n if (!this.isAvailable) {\n throw new Error('Node.js crypto module not available in this environment');\n }\n this.logger = logger?.child({ component: 'NodeCryptoProvider' });\n }\n\n /**\n * Get crypto module instance via dynamic import\n * This prevents Metro bundler from trying to resolve 'crypto' at build time\n */\n private async getCrypto(): Promise<NodeCrypto> {\n if (!this.cryptoModule) {\n try {\n // Dynamic import prevents static analysis by bundlers\n this.cryptoModule = await import('crypto');\n } catch {\n throw new Error(\n 'Failed to load Node.js crypto module. ' +\n 'This provider requires a Node.js environment.'\n );\n }\n }\n return this.cryptoModule;\n }\n\n /**\n * Generate ECDH P-256 key pair using Node.js crypto\n */\n async generateKeyPair(): Promise<ProviderKeyPair> {\n this.logger?.debug('Generating ECDH P-256 key pair with Node.js crypto');\n const cryptoModule = await this.getCrypto();\n\n return new Promise((resolve, reject) => {\n cryptoModule.generateKeyPair(\n 'ec',\n {\n namedCurve: 'prime256v1', // P-256\n publicKeyEncoding: { type: 'spki', format: 'der' },\n privateKeyEncoding: { type: 'pkcs8', format: 'der' },\n },\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n (err: Error | null, publicKey: any, privateKey: any) => {\n if (err) {\n this.logger?.error('Key pair generation failed', { error: err });\n reject(err);\n return;\n }\n\n this.logger?.debug('Key pair generation completed');\n resolve({\n publicKey: new NodeCryptoKeyWrapper(publicKey, 'public'),\n privateKey: new NodeCryptoKeyWrapper(privateKey, 'private'),\n });\n }\n );\n });\n }\n\n /**\n * Export public key to raw ArrayBuffer format (65 bytes uncompressed)\n */\n async exportPublicKey(publicKey: CryptoKeyLike): Promise<ArrayBuffer> {\n this.logger?.debug('Exporting public key');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(publicKey);\n\n // If it's a Buffer (DER format from generateKeyPair), convert to KeyObject first\n const keyObj = keyObject instanceof Buffer\n ? cryptoModule.createPublicKey({ key: keyObject, format: 'der', type: 'spki' })\n : keyObject;\n\n // Export as JWK to get X/Y coordinates\n // eslint-disable-next-line @typescript-eslint/no-unsafe-assignment, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n const jwk = (keyObj as any).export({ format: 'jwk' });\n // eslint-disable-next-line @typescript-eslint/no-unsafe-member-access\n const x = Buffer.from(jwk.x as string, 'base64url');\n // eslint-disable-next-line @typescript-eslint/no-unsafe-member-access\n const y = Buffer.from(jwk.y as string, 'base64url');\n\n // Construct 65-byte uncompressed point: 0x04 + X (32 bytes) + Y (32 bytes)\n const uncompressed = Buffer.concat([Buffer.from([0x04]), x, y]);\n\n return await Promise.resolve(\n uncompressed.buffer.slice(\n uncompressed.byteOffset,\n uncompressed.byteOffset + uncompressed.byteLength\n )\n );\n }\n\n /**\n * Export private key to raw ArrayBuffer format (32 bytes)\n */\n async exportPrivateKey(privateKey: CryptoKeyLike): Promise<ArrayBuffer> {\n this.logger?.debug('Exporting private key');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(privateKey);\n\n // Convert KeyObject to raw format\n const keyBuffer = keyObject instanceof Buffer ? keyObject : Buffer.from(keyObject as ArrayBuffer);\n const keyObj = cryptoModule.createPrivateKey({\n key: keyBuffer,\n format: 'der',\n type: 'pkcs8',\n });\n\n // Export as raw scalar (32 bytes)\n const jwk = keyObj.export({ format: 'jwk' });\n const dValue = Buffer.from(jwk.d as string, 'base64url');\n\n return await Promise.resolve(\n dValue.buffer.slice(dValue.byteOffset, dValue.byteOffset + dValue.byteLength)\n );\n }\n\n /**\n * Import public key from raw ArrayBuffer format\n */\n async importPublicKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n this.logger?.debug('Importing public key');\n const cryptoModule = await this.getCrypto();\n const keyBuffer = Buffer.from(keyData);\n\n // Ensure it's uncompressed format (65 bytes starting with 0x04)\n if (keyBuffer.length !== 65 || keyBuffer[0] !== 0x04) {\n throw new Error('Invalid public key format: expected 65 bytes uncompressed point');\n }\n\n // Create KeyObject from raw uncompressed point\n // We need to wrap it in DER format\n const x = keyBuffer.slice(1, 33);\n const y = keyBuffer.slice(33, 65);\n\n // Create JWK representation\n const jwk = {\n kty: 'EC' as const,\n crv: 'P-256' as const,\n x: x.toString('base64url'),\n y: y.toString('base64url'),\n };\n\n const keyObject = cryptoModule.createPublicKey({ key: jwk, format: 'jwk' });\n return await Promise.resolve(new NodeCryptoKeyWrapper(keyObject, 'public'));\n }\n\n /**\n * Import private key from raw ArrayBuffer format\n */\n async importPrivateKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n this.logger?.debug('Importing private key');\n const cryptoModule = await this.getCrypto();\n const keyBuffer = Buffer.from(keyData);\n\n if (keyBuffer.length !== 32) {\n throw new Error('Invalid private key format: expected 32 bytes');\n }\n\n // Create JWK representation\n const jwk = {\n kty: 'EC' as const,\n crv: 'P-256' as const,\n d: keyBuffer.toString('base64url'),\n };\n\n const keyObject = cryptoModule.createPrivateKey({ key: jwk, format: 'jwk' });\n return await Promise.resolve(new NodeCryptoKeyWrapper(keyObject, 'private'));\n }\n\n /**\n * Derive shared secret using ECDH\n */\n async deriveSharedSecret(privateKey: CryptoKeyLike, publicKey: CryptoKeyLike): Promise<CryptoKeyLike> {\n this.logger?.debug('Deriving shared secret');\n const cryptoModule = await this.getCrypto();\n\n // Create ECDH object\n const ecdh = cryptoModule.createECDH('prime256v1');\n\n // Set private key\n const privateRaw = await this.exportPrivateKey(privateKey);\n ecdh.setPrivateKey(Buffer.from(privateRaw));\n\n // Compute shared secret\n const publicRaw = await this.exportPublicKey(publicKey);\n const sharedSecret = ecdh.computeSecret(Buffer.from(publicRaw));\n\n // Wrap as secret key\n const keyObject = cryptoModule.createSecretKey(sharedSecret);\n return new NodeCryptoKeyWrapper(keyObject, 'secret');\n }\n\n /**\n * Derive AES-GCM encryption key using HKDF-SHA256\n */\n async deriveEncryptionKey(\n sharedSecret: CryptoKeyLike,\n salt: ArrayBuffer,\n info: ArrayBuffer\n ): Promise<CryptoKeyLike> {\n this.logger?.debug('Deriving AES-GCM encryption key');\n const cryptoModule = await this.getCrypto();\n\n // Extract raw shared secret\n const keyObject = unwrapKeyObject(sharedSecret);\n // eslint-disable-next-line @typescript-eslint/no-unsafe-assignment, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n const sharedSecretRaw = (keyObject as any).export();\n\n // Use HKDF to derive 32-byte key\n const derivedKey = cryptoModule.hkdfSync(\n 'sha256',\n Buffer.isBuffer(sharedSecretRaw) ? sharedSecretRaw : Buffer.from(sharedSecretRaw),\n Buffer.from(salt),\n Buffer.from(info),\n 32 // 256 bits\n ) as Buffer;\n\n // Create secret key object\n const aesKeyObject = cryptoModule.createSecretKey(derivedKey);\n return await Promise.resolve(new NodeCryptoKeyWrapper(aesKeyObject, 'secret'));\n }\n\n /**\n * Encrypt data using AES-256-GCM\n */\n async encrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Encrypting with AES-256-GCM');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(key);\n\n const cipher = cryptoModule.createCipheriv(\n 'aes-256-gcm',\n // eslint-disable-next-line @typescript-eslint/no-unsafe-argument, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n (keyObject as any).export(),\n Buffer.from(iv)\n );\n\n const encrypted = Buffer.concat([\n cipher.update(Buffer.from(data)),\n cipher.final(),\n cipher.getAuthTag(),\n ]);\n\n return await Promise.resolve(\n encrypted.buffer.slice(\n encrypted.byteOffset,\n encrypted.byteOffset + encrypted.byteLength\n )\n );\n }\n\n /**\n * Decrypt data using AES-256-GCM\n */\n async decrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Decrypting with AES-256-GCM');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(key);\n const dataBuffer = Buffer.from(data);\n\n // Last 16 bytes are the auth tag\n const authTag = dataBuffer.slice(-16);\n const ciphertext = dataBuffer.slice(0, -16);\n\n const decipher = cryptoModule.createDecipheriv(\n 'aes-256-gcm',\n // eslint-disable-next-line @typescript-eslint/no-unsafe-argument, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n (keyObject as any).export(),\n Buffer.from(iv)\n );\n decipher.setAuthTag(authTag);\n\n const decrypted = Buffer.concat([decipher.update(ciphertext), decipher.final()]);\n\n return await Promise.resolve(\n decrypted.buffer.slice(\n decrypted.byteOffset,\n decrypted.byteOffset + decrypted.byteLength\n )\n );\n }\n\n /**\n * Generate HMAC-SHA256 authentication code\n */\n async generateHMAC(key: CryptoKeyLike, data: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Generating HMAC-SHA256');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(key);\n\n // eslint-disable-next-line @typescript-eslint/no-unsafe-argument, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n const hmac = cryptoModule.createHmac('sha256', (keyObject as any).export());\n hmac.update(Buffer.from(data));\n const mac = hmac.digest();\n\n return await Promise.resolve(mac.buffer.slice(mac.byteOffset, mac.byteOffset + mac.byteLength));\n }\n\n /**\n * Verify HMAC-SHA256 authentication code\n */\n async verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean> {\n this.logger?.debug('Verifying HMAC-SHA256');\n const cryptoModule = await this.getCrypto();\n const computed = await this.generateHMAC(key, data);\n const expected = new Uint8Array(mac);\n const actual = new Uint8Array(computed);\n\n if (expected.length !== actual.length) {\n return false;\n }\n\n // Constant-time comparison\n return cryptoModule.timingSafeEqual(\n Buffer.from(expected),\n Buffer.from(actual)\n );\n }\n\n /**\n * Generate cryptographically secure random bytes\n * Note: This is a synchronous method, so it uses require() instead of dynamic import\n */\n randomBytes(length: number): ArrayBuffer {\n // Use cached module if available, otherwise use synchronous require\n // eslint-disable-next-line @typescript-eslint/no-require-imports\n const cryptoModule = this.cryptoModule ?? require('crypto') as NodeCrypto;\n const buffer = cryptoModule.randomBytes(length);\n return buffer.buffer.slice(buffer.byteOffset, buffer.byteOffset + buffer.byteLength);\n }\n}\n\n/**\n * Self-register Node provider on import\n * This allows the provider to be available when explicitly imported\n */\nregisterCryptoProvider('node', (logger) => new NodeCryptoProvider(logger));\n\n// TypeScript module augmentation to track this provider is available\ndeclare global {\n // eslint-disable-next-line @typescript-eslint/no-namespace\n namespace BananaLink {\n interface RegisteredCryptoProviders {\n node: true;\n }\n }\n}\n"]}
|
|
1
|
+
{"version":3,"sources":["../../../src/crypto/providers/node-provider.ts"],"names":["__name","__require"],"mappings":";;;;;AAYA,IAAM,qBAAA,GAAN,MAAM,qBAAA,CAA8C;AAAA,EAClD,WAAA,CACmB,WACA,OAAA,EACjB;AAFiB,IAAA,IAAA,CAAA,SAAA,GAAA,SAAA;AACA,IAAA,IAAA,CAAA,OAAA,GAAA,OAAA;AAAA,EAChB;AAAA,EAEH,IAAI,IAAA,GAAwC;AAC1C,IAAA,OAAO,IAAA,CAAK,OAAA;AAAA,EACd;AAAA,EAEA,IAAI,SAAA,GAAoB;AACtB,IAAA,OAAO,WAAA;AAAA,EACT;AAAA,EAEA,IAAI,WAAA,GAAuB;AACzB,IAAA,OAAO,IAAA;AAAA,EACT;AAAA,EAEA,IAAI,MAAA,GAA4B;AAC9B,IAAA,OAAO,IAAA,CAAK,YAAY,QAAA,GAAW,CAAC,WAAW,SAAS,CAAA,GAAI,CAAC,WAAW,CAAA;AAAA,EAC1E;AAAA,EAEA,IAAI,SAAA,GAAqB;AACvB,IAAA,OAAO,IAAA,CAAK,SAAA;AAAA,EACd;AACF,CAAA;AAzBoDA,wBAAA,CAAA,qBAAA,EAAA,sBAAA,CAAA;AAApD,IAAM,oBAAA,GAAN,qBAAA;AA8BA,SAAS,gBAAgB,OAAA,EAAiC;AACxD,EAAA,IAAI,mBAAmB,oBAAA,EAAsB;AAC3C,IAAA,OAAO,OAAA,CAAQ,SAAA;AAAA,EACjB;AAEA,EAAA,OAAO,OAAA;AACT;AANSA,wBAAA,CAAA,eAAA,EAAA,iBAAA,CAAA;AAyBF,IAAM,mBAAA,GAAN,MAAM,mBAAA,CAA6C;AAAA,EAkBxD,YAAY,MAAA,EAAiB;AAjB7B,IAAA,IAAA,CAAgB,IAAA,GAAO,YAAA;AAEvB,IAAA,IAAA,CAAQ,YAAA,GAAkC,IAAA;AAgBxC,IAAA,IAAI,CAAC,KAAK,WAAA,EAAa;AACrB,MAAA,MAAM,IAAI,MAAM,yDAAyD,CAAA;AAAA,IAC3E;AACA,IAAA,IAAA,CAAK,SAAS,MAAA,EAAQ,KAAA,CAAM,EAAE,SAAA,EAAW,sBAAsB,CAAA;AAAA,EACjE;AAAA,EAlBA,IAAW,WAAA,GAAuB;AAChC,IAAA,IAAI;AAEF,MAAA,IAAI,OAAO,OAAA,KAAY,WAAA,IAAe,CAAC,OAAA,CAAQ,UAAU,IAAA,EAAM;AAC7D,QAAA,OAAO,KAAA;AAAA,MACT;AAEA,MAAA,OAAO,IAAA;AAAA,IACT,CAAA,CAAA,MAAQ;AACN,MAAA,OAAO,KAAA;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,MAAc,SAAA,GAAiC;AAC7C,IAAA,IAAI,CAAC,KAAK,YAAA,EAAc;AACtB,MAAA,IAAI;AAEF,QAAA,IAAA,CAAK,YAAA,GAAe,MAAM,OAAO,QAAQ,CAAA;AAAA,MAC3C,CAAA,CAAA,MAAQ;AACN,QAAA,MAAM,IAAI,MAAM,qFAA0F,CAAA;AAAA,MAC5G;AAAA,IACF;AACA,IAAA,OAAO,IAAA,CAAK,YAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eAAA,GAA4C;AAChD,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,oDAAoD,CAAA;AACvE,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAE1C,IAAA,OAAO,IAAI,OAAA,CAAQ,CAAC,OAAA,EAAS,MAAA,KAAW;AACtC,MAAA,YAAA,CAAa,eAAA;AAAA,QACX,IAAA;AAAA,QACA;AAAA,UACE,UAAA,EAAY,YAAA;AAAA;AAAA,UACZ,iBAAA,EAAmB,EAAE,IAAA,EAAM,MAAA,EAAQ,QAAQ,KAAA,EAAM;AAAA,UACjD,kBAAA,EAAoB,EAAE,IAAA,EAAM,OAAA,EAAS,QAAQ,KAAA;AAAM,SACrD;AAAA;AAAA,QAEA,CAAC,GAAA,EAAmB,SAAA,EAAgB,UAAA,KAAoB;AACtD,UAAA,IAAI,GAAA,EAAK;AACP,YAAA,IAAA,CAAK,QAAQ,KAAA,CAAM,4BAAA,EAA8B,EAAE,KAAA,EAAO,KAAK,CAAA;AAC/D,YAAA,MAAA,CAAO,GAAG,CAAA;AACV,YAAA;AAAA,UACF;AAEA,UAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,+BAA+B,CAAA;AAClD,UAAA,OAAA,CAAQ;AAAA,YACN,SAAA,EAAW,IAAI,oBAAA,CAAqB,SAAA,EAAW,QAAQ,CAAA;AAAA,YACvD,UAAA,EAAY,IAAI,oBAAA,CAAqB,UAAA,EAAY,SAAS;AAAA,WAC3D,CAAA;AAAA,QACH;AAAA,OACF;AAAA,IACF,CAAC,CAAA;AAAA,EACH;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,SAAA,EAAgD;AACpE,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sBAAsB,CAAA;AACzC,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,SAAS,CAAA;AAG3C,IAAA,MAAM,MAAA,GACJ,SAAA,YAAqB,MAAA,GACjB,YAAA,CAAa,eAAA,CAAgB,EAAE,GAAA,EAAK,SAAA,EAAW,MAAA,EAAQ,KAAA,EAAO,IAAA,EAAM,MAAA,EAAQ,CAAA,GAC5E,SAAA;AAIN,IAAA,MAAM,MAAO,MAAA,CAAe,MAAA,CAAO,EAAE,MAAA,EAAQ,OAAO,CAAA;AAEpD,IAAA,MAAM,CAAA,GAAI,MAAA,CAAO,IAAA,CAAK,GAAA,CAAI,GAAa,WAAW,CAAA;AAElD,IAAA,MAAM,CAAA,GAAI,MAAA,CAAO,IAAA,CAAK,GAAA,CAAI,GAAa,WAAW,CAAA;AAGlD,IAAA,MAAM,YAAA,GAAe,MAAA,CAAO,MAAA,CAAO,CAAC,MAAA,CAAO,IAAA,CAAK,CAAC,CAAI,CAAC,CAAA,EAAG,CAAA,EAAG,CAAC,CAAC,CAAA;AAE9D,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA;AAAA,MACnB,YAAA,CAAa,OAAO,KAAA,CAAM,YAAA,CAAa,YAAY,YAAA,CAAa,UAAA,GAAa,aAAa,UAAU;AAAA,KACtG;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,iBAAiB,UAAA,EAAiD;AACtE,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,uBAAuB,CAAA;AAC1C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,UAAU,CAAA;AAG5C,IAAA,MAAM,YAAY,SAAA,YAAqB,MAAA,GAAS,SAAA,GAAY,MAAA,CAAO,KAAK,SAAwB,CAAA;AAChG,IAAA,MAAM,MAAA,GAAS,aAAa,gBAAA,CAAiB;AAAA,MAC3C,GAAA,EAAK,SAAA;AAAA,MACL,MAAA,EAAQ,KAAA;AAAA,MACR,IAAA,EAAM;AAAA,KACP,CAAA;AAGD,IAAA,MAAM,MAAM,MAAA,CAAO,MAAA,CAAO,EAAE,MAAA,EAAQ,OAAO,CAAA;AAC3C,IAAA,MAAM,MAAA,GAAS,MAAA,CAAO,IAAA,CAAK,GAAA,CAAI,GAAa,WAAW,CAAA;AAEvD,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,MAAA,CAAO,MAAA,CAAO,KAAA,CAAM,MAAA,CAAO,UAAA,EAAY,MAAA,CAAO,UAAA,GAAa,MAAA,CAAO,UAAU,CAAC,CAAA;AAAA,EAC5G;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,OAAA,EAA8C;AAClE,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sBAAsB,CAAA;AACzC,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,MAAA,CAAO,IAAA,CAAK,OAAO,CAAA;AAGrC,IAAA,IAAI,UAAU,MAAA,KAAW,EAAA,IAAM,SAAA,CAAU,CAAC,MAAM,CAAA,EAAM;AACpD,MAAA,MAAM,IAAI,MAAM,iEAAiE,CAAA;AAAA,IACnF;AAIA,IAAA,MAAM,CAAA,GAAI,SAAA,CAAU,KAAA,CAAM,CAAA,EAAG,EAAE,CAAA;AAC/B,IAAA,MAAM,CAAA,GAAI,SAAA,CAAU,KAAA,CAAM,EAAA,EAAI,EAAE,CAAA;AAGhC,IAAA,MAAM,GAAA,GAAM;AAAA,MACV,GAAA,EAAK,IAAA;AAAA,MACL,GAAA,EAAK,OAAA;AAAA,MACL,CAAA,EAAG,CAAA,CAAE,QAAA,CAAS,WAAW,CAAA;AAAA,MACzB,CAAA,EAAG,CAAA,CAAE,QAAA,CAAS,WAAW;AAAA,KAC3B;AAEA,IAAA,MAAM,SAAA,GAAY,aAAa,eAAA,CAAgB,EAAE,KAAK,GAAA,EAAK,MAAA,EAAQ,OAAO,CAAA;AAC1E,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,IAAI,oBAAA,CAAqB,SAAA,EAAW,QAAQ,CAAC,CAAA;AAAA,EAC5E;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,iBAAiB,OAAA,EAA8C;AACnE,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,uBAAuB,CAAA;AAC1C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,MAAA,CAAO,IAAA,CAAK,OAAO,CAAA;AAErC,IAAA,IAAI,SAAA,CAAU,WAAW,EAAA,EAAI;AAC3B,MAAA,MAAM,IAAI,MAAM,+CAA+C,CAAA;AAAA,IACjE;AAGA,IAAA,MAAM,GAAA,GAAM;AAAA,MACV,GAAA,EAAK,IAAA;AAAA,MACL,GAAA,EAAK,OAAA;AAAA,MACL,CAAA,EAAG,SAAA,CAAU,QAAA,CAAS,WAAW;AAAA,KACnC;AAEA,IAAA,MAAM,SAAA,GAAY,aAAa,gBAAA,CAAiB,EAAE,KAAK,GAAA,EAAK,MAAA,EAAQ,OAAO,CAAA;AAC3E,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,IAAI,oBAAA,CAAqB,SAAA,EAAW,SAAS,CAAC,CAAA;AAAA,EAC7E;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,kBAAA,CAAmB,UAAA,EAA2B,SAAA,EAAkD;AACpG,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAwB,CAAA;AAC3C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAG1C,IAAA,MAAM,IAAA,GAAO,YAAA,CAAa,UAAA,CAAW,YAAY,CAAA;AAGjD,IAAA,MAAM,UAAA,GAAa,MAAM,IAAA,CAAK,gBAAA,CAAiB,UAAU,CAAA;AACzD,IAAA,IAAA,CAAK,aAAA,CAAc,MAAA,CAAO,IAAA,CAAK,UAAU,CAAC,CAAA;AAG1C,IAAA,MAAM,SAAA,GAAY,MAAM,IAAA,CAAK,eAAA,CAAgB,SAAS,CAAA;AACtD,IAAA,MAAM,eAAe,IAAA,CAAK,aAAA,CAAc,MAAA,CAAO,IAAA,CAAK,SAAS,CAAC,CAAA;AAG9D,IAAA,MAAM,SAAA,GAAY,YAAA,CAAa,eAAA,CAAgB,YAAY,CAAA;AAC3D,IAAA,OAAO,IAAI,oBAAA,CAAqB,SAAA,EAAW,QAAQ,CAAA;AAAA,EACrD;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,mBAAA,CAAoB,YAAA,EAA6B,IAAA,EAAmB,IAAA,EAA2C;AACnH,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,iCAAiC,CAAA;AACpD,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAG1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,YAAY,CAAA;AAE9C,IAAA,MAAM,eAAA,GAAmB,UAAkB,MAAA,EAAO;AAGlD,IAAA,MAAM,aAAa,YAAA,CAAa,QAAA;AAAA,MAC9B,QAAA;AAAA,MACA,OAAO,QAAA,CAAS,eAAe,IAAI,eAAA,GAAkB,MAAA,CAAO,KAAK,eAAe,CAAA;AAAA,MAChF,MAAA,CAAO,KAAK,IAAI,CAAA;AAAA,MAChB,MAAA,CAAO,KAAK,IAAI,CAAA;AAAA,MAChB;AAAA;AAAA,KACF;AAGA,IAAA,MAAM,YAAA,GAAe,YAAA,CAAa,eAAA,CAAgB,UAAU,CAAA;AAC5D,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,IAAI,oBAAA,CAAqB,YAAA,EAAc,QAAQ,CAAC,CAAA;AAAA,EAC/E;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AAC1F,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,6BAA6B,CAAA;AAChD,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,GAAG,CAAA;AAErC,IAAA,MAAM,SAAS,YAAA,CAAa,cAAA;AAAA,MAC1B,aAAA;AAAA;AAAA,MAEC,UAAkB,MAAA,EAAO;AAAA,MAC1B,MAAA,CAAO,KAAK,EAAE;AAAA,KAChB;AAEA,IAAA,MAAM,YAAY,MAAA,CAAO,MAAA,CAAO,CAAC,MAAA,CAAO,OAAO,MAAA,CAAO,IAAA,CAAK,IAAI,CAAC,GAAG,MAAA,CAAO,KAAA,IAAS,MAAA,CAAO,UAAA,EAAY,CAAC,CAAA;AAEvG,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA;AAAA,MACnB,SAAA,CAAU,OAAO,KAAA,CAAM,SAAA,CAAU,YAAY,SAAA,CAAU,UAAA,GAAa,UAAU,UAAU;AAAA,KAC1F;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AAC1F,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,6BAA6B,CAAA;AAChD,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,GAAG,CAAA;AACrC,IAAA,MAAM,UAAA,GAAa,MAAA,CAAO,IAAA,CAAK,IAAI,CAAA;AAGnC,IAAA,MAAM,OAAA,GAAU,UAAA,CAAW,KAAA,CAAM,GAAG,CAAA;AACpC,IAAA,MAAM,UAAA,GAAa,UAAA,CAAW,KAAA,CAAM,CAAA,EAAG,GAAG,CAAA;AAE1C,IAAA,MAAM,WAAW,YAAA,CAAa,gBAAA;AAAA,MAC5B,aAAA;AAAA;AAAA,MAEC,UAAkB,MAAA,EAAO;AAAA,MAC1B,MAAA,CAAO,KAAK,EAAE;AAAA,KAChB;AACA,IAAA,QAAA,CAAS,WAAW,OAAO,CAAA;AAE3B,IAAA,MAAM,SAAA,GAAY,MAAA,CAAO,MAAA,CAAO,CAAC,QAAA,CAAS,MAAA,CAAO,UAAU,CAAA,EAAG,QAAA,CAAS,KAAA,EAAO,CAAC,CAAA;AAE/E,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA;AAAA,MACnB,SAAA,CAAU,OAAO,KAAA,CAAM,SAAA,CAAU,YAAY,SAAA,CAAU,UAAA,GAAa,UAAU,UAAU;AAAA,KAC1F;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAA,CAAa,GAAA,EAAoB,IAAA,EAAyC;AAC9E,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAwB,CAAA;AAC3C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,SAAA,GAAY,gBAAgB,GAAG,CAAA;AAGrC,IAAA,MAAM,OAAO,YAAA,CAAa,UAAA,CAAW,QAAA,EAAW,SAAA,CAAkB,QAAQ,CAAA;AAC1E,IAAA,IAAA,CAAK,MAAA,CAAO,MAAA,CAAO,IAAA,CAAK,IAAI,CAAC,CAAA;AAC7B,IAAA,MAAM,GAAA,GAAM,KAAK,MAAA,EAAO;AAExB,IAAA,OAAO,MAAM,OAAA,CAAQ,OAAA,CAAQ,GAAA,CAAI,MAAA,CAAO,KAAA,CAAM,GAAA,CAAI,UAAA,EAAY,GAAA,CAAI,UAAA,GAAa,GAAA,CAAI,UAAU,CAAC,CAAA;AAAA,EAChG;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,UAAA,CAAW,GAAA,EAAoB,IAAA,EAAmB,GAAA,EAAoC;AAC1F,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,uBAAuB,CAAA;AAC1C,IAAA,MAAM,YAAA,GAAe,MAAM,IAAA,CAAK,SAAA,EAAU;AAC1C,IAAA,MAAM,QAAA,GAAW,MAAM,IAAA,CAAK,YAAA,CAAa,KAAK,IAAI,CAAA;AAClD,IAAA,MAAM,QAAA,GAAW,IAAI,UAAA,CAAW,GAAG,CAAA;AACnC,IAAA,MAAM,MAAA,GAAS,IAAI,UAAA,CAAW,QAAQ,CAAA;AAEtC,IAAA,IAAI,QAAA,CAAS,MAAA,KAAW,MAAA,CAAO,MAAA,EAAQ;AACrC,MAAA,OAAO,KAAA;AAAA,IACT;AAGA,IAAA,OAAO,YAAA,CAAa,gBAAgB,MAAA,CAAO,IAAA,CAAK,QAAQ,CAAA,EAAG,MAAA,CAAO,IAAA,CAAK,MAAM,CAAC,CAAA;AAAA,EAChF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,YAAY,MAAA,EAA6B;AAGvC,IAAA,MAAM,YAAA,GAAe,IAAA,CAAK,YAAA,IAAiBC,2BAAA,CAAQ,QAAQ,CAAA;AAC3D,IAAA,MAAM,MAAA,GAAS,YAAA,CAAa,WAAA,CAAY,MAAM,CAAA;AAC9C,IAAA,OAAO,MAAA,CAAO,OAAO,KAAA,CAAM,MAAA,CAAO,YAAY,MAAA,CAAO,UAAA,GAAa,OAAO,UAAU,CAAA;AAAA,EACrF;AACF,CAAA;AApU0DD,wBAAA,CAAA,mBAAA,EAAA,oBAAA,CAAA;AAAnD,IAAM,kBAAA,GAAN","file":"node-provider.cjs","sourcesContent":["import type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoKeyLike, ProviderKeyPair } from '../../types/crypto-provider';\n\n/**\n * Type definition for Node.js crypto module (loaded dynamically to prevent Metro bundling)\n */\ntype NodeCrypto = typeof import('crypto');\n\n/**\n * Node.js crypto.KeyObject wrapper to implement CryptoKeyLike interface\n * Note: keyObject type is unknown at compile time (crypto.KeyObject | Buffer at runtime)\n */\nclass NodeCryptoKeyWrapper implements CryptoKeyLike {\n constructor(\n private readonly keyObject: unknown, // crypto.KeyObject | Buffer at runtime\n private readonly keyType: 'public' | 'private' | 'secret',\n ) {}\n\n get type(): 'public' | 'private' | 'secret' {\n return this.keyType;\n }\n\n get algorithm(): string {\n return 'ECDH-P256';\n }\n\n get extractable(): boolean {\n return true;\n }\n\n get usages(): readonly string[] {\n return this.keyType === 'secret' ? ['encrypt', 'decrypt'] : ['deriveKey'];\n }\n\n get nativeKey(): unknown {\n return this.keyObject;\n }\n}\n\n/**\n * Helper function to unwrap CryptoKeyLike to native KeyObject or Buffer\n */\nfunction unwrapKeyObject(keyLike: CryptoKeyLike): unknown {\n if (keyLike instanceof NodeCryptoKeyWrapper) {\n return keyLike.nativeKey;\n }\n // Assume it's already a KeyObject\n return keyLike;\n}\n\n/**\n * Node.js crypto module implementation of CryptoProvider\n * Optimized for backend services with native crypto performance\n *\n * This provider uses the native Node.js crypto module which provides:\n * - Superior performance compared to Web Crypto API in Node.js\n * - Direct access to OpenSSL optimizations\n * - Zero additional dependencies\n * - Full support for ECDH P-256 and AES-256-GCM\n *\n * @example\n * ```typescript\n * import { NodeCryptoProvider } from '@bananalink-sdk/protocol/crypto/provider/node';\n * const provider = new NodeCryptoProvider();\n * const keyPair = await provider.generateKeyPair();\n * ```\n */\nexport class NodeCryptoProvider implements CryptoProvider {\n public readonly name = 'NodeCrypto';\n private readonly logger?: Logger;\n private cryptoModule: NodeCrypto | null = null;\n\n public get isAvailable(): boolean {\n try {\n // Check if we're in Node.js environment\n if (typeof process === 'undefined' || !process.versions?.node) {\n return false;\n }\n // Crypto module availability will be checked when getCrypto() is called\n return true;\n } catch {\n return false;\n }\n }\n\n constructor(logger?: Logger) {\n if (!this.isAvailable) {\n throw new Error('Node.js crypto module not available in this environment');\n }\n this.logger = logger?.child({ component: 'NodeCryptoProvider' });\n }\n\n /**\n * Get crypto module instance via dynamic import\n * This prevents Metro bundler from trying to resolve 'crypto' at build time\n */\n private async getCrypto(): Promise<NodeCrypto> {\n if (!this.cryptoModule) {\n try {\n // Dynamic import prevents static analysis by bundlers\n this.cryptoModule = await import('crypto');\n } catch {\n throw new Error('Failed to load Node.js crypto module. ' + 'This provider requires a Node.js environment.');\n }\n }\n return this.cryptoModule;\n }\n\n /**\n * Generate ECDH P-256 key pair using Node.js crypto\n */\n async generateKeyPair(): Promise<ProviderKeyPair> {\n this.logger?.debug('Generating ECDH P-256 key pair with Node.js crypto');\n const cryptoModule = await this.getCrypto();\n\n return new Promise((resolve, reject) => {\n cryptoModule.generateKeyPair(\n 'ec',\n {\n namedCurve: 'prime256v1', // P-256\n publicKeyEncoding: { type: 'spki', format: 'der' },\n privateKeyEncoding: { type: 'pkcs8', format: 'der' },\n },\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n (err: Error | null, publicKey: any, privateKey: any) => {\n if (err) {\n this.logger?.error('Key pair generation failed', { error: err });\n reject(err);\n return;\n }\n\n this.logger?.debug('Key pair generation completed');\n resolve({\n publicKey: new NodeCryptoKeyWrapper(publicKey, 'public'),\n privateKey: new NodeCryptoKeyWrapper(privateKey, 'private'),\n });\n },\n );\n });\n }\n\n /**\n * Export public key to raw ArrayBuffer format (65 bytes uncompressed)\n */\n async exportPublicKey(publicKey: CryptoKeyLike): Promise<ArrayBuffer> {\n this.logger?.debug('Exporting public key');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(publicKey);\n\n // If it's a Buffer (DER format from generateKeyPair), convert to KeyObject first\n const keyObj =\n keyObject instanceof Buffer\n ? cryptoModule.createPublicKey({ key: keyObject, format: 'der', type: 'spki' })\n : keyObject;\n\n // Export as JWK to get X/Y coordinates\n // eslint-disable-next-line @typescript-eslint/no-unsafe-assignment, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n const jwk = (keyObj as any).export({ format: 'jwk' });\n // eslint-disable-next-line @typescript-eslint/no-unsafe-member-access\n const x = Buffer.from(jwk.x as string, 'base64url');\n // eslint-disable-next-line @typescript-eslint/no-unsafe-member-access\n const y = Buffer.from(jwk.y as string, 'base64url');\n\n // Construct 65-byte uncompressed point: 0x04 + X (32 bytes) + Y (32 bytes)\n const uncompressed = Buffer.concat([Buffer.from([0x04]), x, y]);\n\n return await Promise.resolve(\n uncompressed.buffer.slice(uncompressed.byteOffset, uncompressed.byteOffset + uncompressed.byteLength),\n );\n }\n\n /**\n * Export private key to raw ArrayBuffer format (32 bytes)\n */\n async exportPrivateKey(privateKey: CryptoKeyLike): Promise<ArrayBuffer> {\n this.logger?.debug('Exporting private key');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(privateKey);\n\n // Convert KeyObject to raw format\n const keyBuffer = keyObject instanceof Buffer ? keyObject : Buffer.from(keyObject as ArrayBuffer);\n const keyObj = cryptoModule.createPrivateKey({\n key: keyBuffer,\n format: 'der',\n type: 'pkcs8',\n });\n\n // Export as raw scalar (32 bytes)\n const jwk = keyObj.export({ format: 'jwk' });\n const dValue = Buffer.from(jwk.d as string, 'base64url');\n\n return await Promise.resolve(dValue.buffer.slice(dValue.byteOffset, dValue.byteOffset + dValue.byteLength));\n }\n\n /**\n * Import public key from raw ArrayBuffer format\n */\n async importPublicKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n this.logger?.debug('Importing public key');\n const cryptoModule = await this.getCrypto();\n const keyBuffer = Buffer.from(keyData);\n\n // Ensure it's uncompressed format (65 bytes starting with 0x04)\n if (keyBuffer.length !== 65 || keyBuffer[0] !== 0x04) {\n throw new Error('Invalid public key format: expected 65 bytes uncompressed point');\n }\n\n // Create KeyObject from raw uncompressed point\n // We need to wrap it in DER format\n const x = keyBuffer.slice(1, 33);\n const y = keyBuffer.slice(33, 65);\n\n // Create JWK representation\n const jwk = {\n kty: 'EC' as const,\n crv: 'P-256' as const,\n x: x.toString('base64url'),\n y: y.toString('base64url'),\n };\n\n const keyObject = cryptoModule.createPublicKey({ key: jwk, format: 'jwk' });\n return await Promise.resolve(new NodeCryptoKeyWrapper(keyObject, 'public'));\n }\n\n /**\n * Import private key from raw ArrayBuffer format\n */\n async importPrivateKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n this.logger?.debug('Importing private key');\n const cryptoModule = await this.getCrypto();\n const keyBuffer = Buffer.from(keyData);\n\n if (keyBuffer.length !== 32) {\n throw new Error('Invalid private key format: expected 32 bytes');\n }\n\n // Create JWK representation\n const jwk = {\n kty: 'EC' as const,\n crv: 'P-256' as const,\n d: keyBuffer.toString('base64url'),\n };\n\n const keyObject = cryptoModule.createPrivateKey({ key: jwk, format: 'jwk' });\n return await Promise.resolve(new NodeCryptoKeyWrapper(keyObject, 'private'));\n }\n\n /**\n * Derive shared secret using ECDH\n */\n async deriveSharedSecret(privateKey: CryptoKeyLike, publicKey: CryptoKeyLike): Promise<CryptoKeyLike> {\n this.logger?.debug('Deriving shared secret');\n const cryptoModule = await this.getCrypto();\n\n // Create ECDH object\n const ecdh = cryptoModule.createECDH('prime256v1');\n\n // Set private key\n const privateRaw = await this.exportPrivateKey(privateKey);\n ecdh.setPrivateKey(Buffer.from(privateRaw));\n\n // Compute shared secret\n const publicRaw = await this.exportPublicKey(publicKey);\n const sharedSecret = ecdh.computeSecret(Buffer.from(publicRaw));\n\n // Wrap as secret key\n const keyObject = cryptoModule.createSecretKey(sharedSecret);\n return new NodeCryptoKeyWrapper(keyObject, 'secret');\n }\n\n /**\n * Derive AES-GCM encryption key using HKDF-SHA256\n */\n async deriveEncryptionKey(sharedSecret: CryptoKeyLike, salt: ArrayBuffer, info: ArrayBuffer): Promise<CryptoKeyLike> {\n this.logger?.debug('Deriving AES-GCM encryption key');\n const cryptoModule = await this.getCrypto();\n\n // Extract raw shared secret\n const keyObject = unwrapKeyObject(sharedSecret);\n // eslint-disable-next-line @typescript-eslint/no-unsafe-assignment, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n const sharedSecretRaw = (keyObject as any).export();\n\n // Use HKDF to derive 32-byte key\n const derivedKey = cryptoModule.hkdfSync(\n 'sha256',\n Buffer.isBuffer(sharedSecretRaw) ? sharedSecretRaw : Buffer.from(sharedSecretRaw),\n Buffer.from(salt),\n Buffer.from(info),\n 32, // 256 bits\n ) as Buffer;\n\n // Create secret key object\n const aesKeyObject = cryptoModule.createSecretKey(derivedKey);\n return await Promise.resolve(new NodeCryptoKeyWrapper(aesKeyObject, 'secret'));\n }\n\n /**\n * Encrypt data using AES-256-GCM\n */\n async encrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Encrypting with AES-256-GCM');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(key);\n\n const cipher = cryptoModule.createCipheriv(\n 'aes-256-gcm',\n // eslint-disable-next-line @typescript-eslint/no-unsafe-argument, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n (keyObject as any).export(),\n Buffer.from(iv),\n );\n\n const encrypted = Buffer.concat([cipher.update(Buffer.from(data)), cipher.final(), cipher.getAuthTag()]);\n\n return await Promise.resolve(\n encrypted.buffer.slice(encrypted.byteOffset, encrypted.byteOffset + encrypted.byteLength),\n );\n }\n\n /**\n * Decrypt data using AES-256-GCM\n */\n async decrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Decrypting with AES-256-GCM');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(key);\n const dataBuffer = Buffer.from(data);\n\n // Last 16 bytes are the auth tag\n const authTag = dataBuffer.slice(-16);\n const ciphertext = dataBuffer.slice(0, -16);\n\n const decipher = cryptoModule.createDecipheriv(\n 'aes-256-gcm',\n // eslint-disable-next-line @typescript-eslint/no-unsafe-argument, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n (keyObject as any).export(),\n Buffer.from(iv),\n );\n decipher.setAuthTag(authTag);\n\n const decrypted = Buffer.concat([decipher.update(ciphertext), decipher.final()]);\n\n return await Promise.resolve(\n decrypted.buffer.slice(decrypted.byteOffset, decrypted.byteOffset + decrypted.byteLength),\n );\n }\n\n /**\n * Generate HMAC-SHA256 authentication code\n */\n async generateHMAC(key: CryptoKeyLike, data: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Generating HMAC-SHA256');\n const cryptoModule = await this.getCrypto();\n const keyObject = unwrapKeyObject(key);\n\n // eslint-disable-next-line @typescript-eslint/no-unsafe-argument, @typescript-eslint/no-unsafe-call, @typescript-eslint/no-unsafe-member-access, @typescript-eslint/no-explicit-any\n const hmac = cryptoModule.createHmac('sha256', (keyObject as any).export());\n hmac.update(Buffer.from(data));\n const mac = hmac.digest();\n\n return await Promise.resolve(mac.buffer.slice(mac.byteOffset, mac.byteOffset + mac.byteLength));\n }\n\n /**\n * Verify HMAC-SHA256 authentication code\n */\n async verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean> {\n this.logger?.debug('Verifying HMAC-SHA256');\n const cryptoModule = await this.getCrypto();\n const computed = await this.generateHMAC(key, data);\n const expected = new Uint8Array(mac);\n const actual = new Uint8Array(computed);\n\n if (expected.length !== actual.length) {\n return false;\n }\n\n // Constant-time comparison\n return cryptoModule.timingSafeEqual(Buffer.from(expected), Buffer.from(actual));\n }\n\n /**\n * Generate cryptographically secure random bytes\n * Note: This is a synchronous method, so it uses require() instead of dynamic import\n */\n randomBytes(length: number): ArrayBuffer {\n // Use cached module if available, otherwise use synchronous require\n // eslint-disable-next-line @typescript-eslint/no-require-imports\n const cryptoModule = this.cryptoModule ?? (require('crypto') as NodeCrypto);\n const buffer = cryptoModule.randomBytes(length);\n return buffer.buffer.slice(buffer.byteOffset, buffer.byteOffset + buffer.byteLength);\n }\n}\n"]}
|
|
@@ -21,12 +21,5 @@ declare class NodeCryptoProvider implements CryptoProvider {
|
|
|
21
21
|
verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean>;
|
|
22
22
|
randomBytes(length: number): ArrayBuffer;
|
|
23
23
|
}
|
|
24
|
-
declare global {
|
|
25
|
-
namespace BananaLink {
|
|
26
|
-
interface RegisteredCryptoProviders {
|
|
27
|
-
node: true;
|
|
28
|
-
}
|
|
29
|
-
}
|
|
30
|
-
}
|
|
31
24
|
|
|
32
25
|
export { NodeCryptoProvider };
|
|
@@ -21,12 +21,5 @@ declare class NodeCryptoProvider implements CryptoProvider {
|
|
|
21
21
|
verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean>;
|
|
22
22
|
randomBytes(length: number): ArrayBuffer;
|
|
23
23
|
}
|
|
24
|
-
declare global {
|
|
25
|
-
namespace BananaLink {
|
|
26
|
-
interface RegisteredCryptoProviders {
|
|
27
|
-
node: true;
|
|
28
|
-
}
|
|
29
|
-
}
|
|
30
|
-
}
|
|
31
24
|
|
|
32
25
|
export { NodeCryptoProvider };
|
|
@@ -1,4 +1,3 @@
|
|
|
1
|
-
import { registerCryptoProvider } from '../../chunk-TCVKC227.js';
|
|
2
1
|
import { __name, __require } from '../../chunk-WCQVDF3K.js';
|
|
3
2
|
|
|
4
3
|
// src/crypto/providers/node-provider.ts
|
|
@@ -60,9 +59,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
60
59
|
try {
|
|
61
60
|
this.cryptoModule = await import('crypto');
|
|
62
61
|
} catch {
|
|
63
|
-
throw new Error(
|
|
64
|
-
"Failed to load Node.js crypto module. This provider requires a Node.js environment."
|
|
65
|
-
);
|
|
62
|
+
throw new Error("Failed to load Node.js crypto module. This provider requires a Node.js environment.");
|
|
66
63
|
}
|
|
67
64
|
}
|
|
68
65
|
return this.cryptoModule;
|
|
@@ -111,10 +108,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
111
108
|
const y = Buffer.from(jwk.y, "base64url");
|
|
112
109
|
const uncompressed = Buffer.concat([Buffer.from([4]), x, y]);
|
|
113
110
|
return await Promise.resolve(
|
|
114
|
-
uncompressed.buffer.slice(
|
|
115
|
-
uncompressed.byteOffset,
|
|
116
|
-
uncompressed.byteOffset + uncompressed.byteLength
|
|
117
|
-
)
|
|
111
|
+
uncompressed.buffer.slice(uncompressed.byteOffset, uncompressed.byteOffset + uncompressed.byteLength)
|
|
118
112
|
);
|
|
119
113
|
}
|
|
120
114
|
/**
|
|
@@ -132,9 +126,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
132
126
|
});
|
|
133
127
|
const jwk = keyObj.export({ format: "jwk" });
|
|
134
128
|
const dValue = Buffer.from(jwk.d, "base64url");
|
|
135
|
-
return await Promise.resolve(
|
|
136
|
-
dValue.buffer.slice(dValue.byteOffset, dValue.byteOffset + dValue.byteLength)
|
|
137
|
-
);
|
|
129
|
+
return await Promise.resolve(dValue.buffer.slice(dValue.byteOffset, dValue.byteOffset + dValue.byteLength));
|
|
138
130
|
}
|
|
139
131
|
/**
|
|
140
132
|
* Import public key from raw ArrayBuffer format
|
|
@@ -221,16 +213,9 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
221
213
|
keyObject.export(),
|
|
222
214
|
Buffer.from(iv)
|
|
223
215
|
);
|
|
224
|
-
const encrypted = Buffer.concat([
|
|
225
|
-
cipher.update(Buffer.from(data)),
|
|
226
|
-
cipher.final(),
|
|
227
|
-
cipher.getAuthTag()
|
|
228
|
-
]);
|
|
216
|
+
const encrypted = Buffer.concat([cipher.update(Buffer.from(data)), cipher.final(), cipher.getAuthTag()]);
|
|
229
217
|
return await Promise.resolve(
|
|
230
|
-
encrypted.buffer.slice(
|
|
231
|
-
encrypted.byteOffset,
|
|
232
|
-
encrypted.byteOffset + encrypted.byteLength
|
|
233
|
-
)
|
|
218
|
+
encrypted.buffer.slice(encrypted.byteOffset, encrypted.byteOffset + encrypted.byteLength)
|
|
234
219
|
);
|
|
235
220
|
}
|
|
236
221
|
/**
|
|
@@ -252,10 +237,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
252
237
|
decipher.setAuthTag(authTag);
|
|
253
238
|
const decrypted = Buffer.concat([decipher.update(ciphertext), decipher.final()]);
|
|
254
239
|
return await Promise.resolve(
|
|
255
|
-
decrypted.buffer.slice(
|
|
256
|
-
decrypted.byteOffset,
|
|
257
|
-
decrypted.byteOffset + decrypted.byteLength
|
|
258
|
-
)
|
|
240
|
+
decrypted.buffer.slice(decrypted.byteOffset, decrypted.byteOffset + decrypted.byteLength)
|
|
259
241
|
);
|
|
260
242
|
}
|
|
261
243
|
/**
|
|
@@ -282,10 +264,7 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
282
264
|
if (expected.length !== actual.length) {
|
|
283
265
|
return false;
|
|
284
266
|
}
|
|
285
|
-
return cryptoModule.timingSafeEqual(
|
|
286
|
-
Buffer.from(expected),
|
|
287
|
-
Buffer.from(actual)
|
|
288
|
-
);
|
|
267
|
+
return cryptoModule.timingSafeEqual(Buffer.from(expected), Buffer.from(actual));
|
|
289
268
|
}
|
|
290
269
|
/**
|
|
291
270
|
* Generate cryptographically secure random bytes
|
|
@@ -299,7 +278,6 @@ var _NodeCryptoProvider = class _NodeCryptoProvider {
|
|
|
299
278
|
};
|
|
300
279
|
__name(_NodeCryptoProvider, "NodeCryptoProvider");
|
|
301
280
|
var NodeCryptoProvider = _NodeCryptoProvider;
|
|
302
|
-
registerCryptoProvider("node", (logger) => new NodeCryptoProvider(logger));
|
|
303
281
|
|
|
304
282
|
export { NodeCryptoProvider };
|
|
305
283
|
//# sourceMappingURL=node-provider.js.map
|