@dxos/crypto 0.8.3 → 0.8.4-main.1da679c
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/lib/browser/index.mjs +30 -31
- package/dist/lib/browser/index.mjs.map +4 -4
- package/dist/lib/browser/meta.json +1 -1
- package/dist/lib/node-esm/index.mjs +23 -25
- package/dist/lib/node-esm/index.mjs.map +4 -4
- package/dist/lib/node-esm/meta.json +1 -1
- package/dist/types/src/index.d.ts +3 -3
- package/dist/types/src/index.d.ts.map +1 -1
- package/dist/types/src/keys.d.ts +1 -1
- package/dist/types/src/keys.d.ts.map +1 -1
- package/dist/types/src/validator.d.ts +1 -1
- package/dist/types/src/validator.d.ts.map +1 -1
- package/dist/types/src/verify.d.ts.map +1 -1
- package/dist/types/tsconfig.tsbuildinfo +1 -1
- package/package.json +11 -12
- package/src/index.ts +3 -3
- package/src/keys.test.ts +1 -1
- package/src/keys.ts +2 -3
- package/src/uuid.ts +1 -1
- package/src/validator.ts +1 -2
- package/src/verify.ts +6 -4
- package/vendor/subtle.d.ts +3 -0
- package/dist/lib/node/index.cjs +0 -166
- package/dist/lib/node/index.cjs.map +0 -7
- package/dist/lib/node/meta.json +0 -1
- package/dist/types/src/browser/subtle.d.ts +0 -3
- package/dist/types/src/browser/subtle.d.ts.map +0 -1
- package/dist/types/src/subtle.d.ts +0 -4
- package/dist/types/src/subtle.d.ts.map +0 -1
- package/hypercore-crypto-stub.mjs +0 -11
- package/src/shims.d.ts +0 -6
- /package/{src/browser/subtle.ts → vendor/subtle-browser.mjs} +0 -0
- /package/{src/subtle.ts → vendor/subtle-node.mjs} +0 -0
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dxos/crypto",
|
|
3
|
-
"version": "0.8.
|
|
3
|
+
"version": "0.8.4-main.1da679c",
|
|
4
4
|
"description": "Basic cross-platform crypto utils.",
|
|
5
5
|
"homepage": "https://dxos.org",
|
|
6
6
|
"bugs": "https://github.com/dxos/dxos/issues",
|
|
@@ -9,21 +9,20 @@
|
|
|
9
9
|
"sideEffects": true,
|
|
10
10
|
"type": "module",
|
|
11
11
|
"imports": {
|
|
12
|
-
"#
|
|
13
|
-
"
|
|
14
|
-
"
|
|
12
|
+
"#subtle": {
|
|
13
|
+
"types": "./vendor/subtle.d.ts",
|
|
14
|
+
"node": "./vendor/subtle-node.mjs",
|
|
15
|
+
"browser": "./vendor/subtle-browser.mjs"
|
|
15
16
|
}
|
|
16
17
|
},
|
|
17
18
|
"exports": {
|
|
18
19
|
".": {
|
|
20
|
+
"source": "./src/index.ts",
|
|
19
21
|
"types": "./dist/types/src/index.d.ts",
|
|
20
22
|
"browser": "./dist/lib/browser/index.mjs",
|
|
21
23
|
"node": "./dist/lib/node-esm/index.mjs"
|
|
22
24
|
}
|
|
23
25
|
},
|
|
24
|
-
"browser": {
|
|
25
|
-
"./src/subtle.ts": "./src/browser/subtle.ts"
|
|
26
|
-
},
|
|
27
26
|
"types": "dist/types/src/index.d.ts",
|
|
28
27
|
"typesVersions": {
|
|
29
28
|
"*": {}
|
|
@@ -31,13 +30,13 @@
|
|
|
31
30
|
"files": [
|
|
32
31
|
"dist",
|
|
33
32
|
"src",
|
|
34
|
-
"
|
|
33
|
+
"vendor"
|
|
35
34
|
],
|
|
36
35
|
"dependencies": {
|
|
37
|
-
"
|
|
38
|
-
"@dxos/
|
|
39
|
-
"@dxos/keys": "0.8.
|
|
40
|
-
"@dxos/
|
|
36
|
+
"@dxos/invariant": "0.8.4-main.1da679c",
|
|
37
|
+
"@dxos/node-std": "0.8.4-main.1da679c",
|
|
38
|
+
"@dxos/keys": "0.8.4-main.1da679c",
|
|
39
|
+
"@dxos/vendor-hypercore": "0.8.4-main.1da679c"
|
|
41
40
|
},
|
|
42
41
|
"devDependencies": {},
|
|
43
42
|
"publishConfig": {
|
package/src/index.ts
CHANGED
|
@@ -2,9 +2,9 @@
|
|
|
2
2
|
// Copyright 2020 DXOS.org
|
|
3
3
|
//
|
|
4
4
|
|
|
5
|
+
export * from '#subtle';
|
|
5
6
|
export * from './keys';
|
|
6
|
-
export * from './signer';
|
|
7
|
-
export * from './
|
|
7
|
+
export type * from './signer';
|
|
8
|
+
export * from './uuid';
|
|
8
9
|
export * from './validator';
|
|
9
10
|
export * from './verify';
|
|
10
|
-
export * from './uuid';
|
package/src/keys.test.ts
CHANGED
package/src/keys.ts
CHANGED
|
@@ -3,9 +3,8 @@
|
|
|
3
3
|
//
|
|
4
4
|
|
|
5
5
|
import { invariant } from '@dxos/invariant';
|
|
6
|
-
import { type KeyPair, PublicKey, type PublicKeyLike,
|
|
7
|
-
|
|
8
|
-
import crypto from '#hypercore-crypto';
|
|
6
|
+
import { type KeyPair, PUBLIC_KEY_LENGTH, PublicKey, type PublicKeyLike, SECRET_KEY_LENGTH } from '@dxos/keys';
|
|
7
|
+
import crypto from '@dxos/vendor-hypercore/hypercore-crypto';
|
|
9
8
|
|
|
10
9
|
export const SIGNATURE_LENGTH = 64;
|
|
11
10
|
|
package/src/uuid.ts
CHANGED
package/src/validator.ts
CHANGED
package/src/verify.ts
CHANGED
|
@@ -4,7 +4,7 @@
|
|
|
4
4
|
|
|
5
5
|
import { type PublicKey } from '@dxos/keys';
|
|
6
6
|
|
|
7
|
-
import { subtleCrypto } from '
|
|
7
|
+
import { subtleCrypto } from '#subtle';
|
|
8
8
|
|
|
9
9
|
/**
|
|
10
10
|
* Verify a signature with the given key.
|
|
@@ -18,7 +18,9 @@ export const verifySignature = async (
|
|
|
18
18
|
let publicKey!: CryptoKey;
|
|
19
19
|
|
|
20
20
|
try {
|
|
21
|
-
publicKey = await subtleCrypto.importKey('raw', key.asUint8Array()
|
|
21
|
+
publicKey = await subtleCrypto.importKey('raw', key.asUint8Array() as Uint8Array<ArrayBuffer>, algorithm, true, [
|
|
22
|
+
'verify',
|
|
23
|
+
]);
|
|
22
24
|
} catch {
|
|
23
25
|
return false;
|
|
24
26
|
}
|
|
@@ -29,7 +31,7 @@ export const verifySignature = async (
|
|
|
29
31
|
hash: 'SHA-256',
|
|
30
32
|
},
|
|
31
33
|
publicKey,
|
|
32
|
-
signature
|
|
33
|
-
message
|
|
34
|
+
signature as Uint8Array<ArrayBuffer>,
|
|
35
|
+
message as Uint8Array<ArrayBuffer>,
|
|
34
36
|
);
|
|
35
37
|
};
|
package/dist/lib/node/index.cjs
DELETED
|
@@ -1,166 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __create = Object.create;
|
|
3
|
-
var __defProp = Object.defineProperty;
|
|
4
|
-
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
|
|
5
|
-
var __getOwnPropNames = Object.getOwnPropertyNames;
|
|
6
|
-
var __getProtoOf = Object.getPrototypeOf;
|
|
7
|
-
var __hasOwnProp = Object.prototype.hasOwnProperty;
|
|
8
|
-
var __export = (target, all) => {
|
|
9
|
-
for (var name in all)
|
|
10
|
-
__defProp(target, name, { get: all[name], enumerable: true });
|
|
11
|
-
};
|
|
12
|
-
var __copyProps = (to, from, except, desc) => {
|
|
13
|
-
if (from && typeof from === "object" || typeof from === "function") {
|
|
14
|
-
for (let key of __getOwnPropNames(from))
|
|
15
|
-
if (!__hasOwnProp.call(to, key) && key !== except)
|
|
16
|
-
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
|
|
17
|
-
}
|
|
18
|
-
return to;
|
|
19
|
-
};
|
|
20
|
-
var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
|
|
21
|
-
// If the importer is in node compatibility mode or this is not an ESM
|
|
22
|
-
// file that has been converted to a CommonJS file using a Babel-
|
|
23
|
-
// compatible transform (i.e. "__esModule" has not been set), then set
|
|
24
|
-
// "default" to the CommonJS "module.exports" for node compatibility.
|
|
25
|
-
isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
|
|
26
|
-
mod
|
|
27
|
-
));
|
|
28
|
-
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
29
|
-
var node_exports = {};
|
|
30
|
-
__export(node_exports, {
|
|
31
|
-
SIGNATURE_LENGTH: () => SIGNATURE_LENGTH,
|
|
32
|
-
createId: () => createId,
|
|
33
|
-
createKeyPair: () => createKeyPair,
|
|
34
|
-
discoveryKey: () => discoveryKey,
|
|
35
|
-
getSignatureValidator: () => getSignatureValidator,
|
|
36
|
-
randomBytes: () => randomBytes,
|
|
37
|
-
randomUUID: () => randomUUID,
|
|
38
|
-
sign: () => sign,
|
|
39
|
-
subtleCrypto: () => subtleCrypto,
|
|
40
|
-
validateKeyPair: () => validateKeyPair,
|
|
41
|
-
verify: () => verify,
|
|
42
|
-
verifySignature: () => verifySignature,
|
|
43
|
-
webcrypto: () => webcrypto2
|
|
44
|
-
});
|
|
45
|
-
module.exports = __toCommonJS(node_exports);
|
|
46
|
-
var import_invariant = require("@dxos/invariant");
|
|
47
|
-
var import_keys = require("@dxos/keys");
|
|
48
|
-
var import_hypercore_crypto = __toESM(require("#hypercore-crypto"));
|
|
49
|
-
var nodeCrypto = __toESM(require("node:crypto"));
|
|
50
|
-
var import_keys2 = require("@dxos/keys");
|
|
51
|
-
var import_hypercore_crypto2 = require("#hypercore-crypto");
|
|
52
|
-
var __dxlog_file = "/home/runner/work/dxos/dxos/packages/common/crypto/src/keys.ts";
|
|
53
|
-
var SIGNATURE_LENGTH = 64;
|
|
54
|
-
var createId = () => import_keys.PublicKey.stringify(randomBytes(32));
|
|
55
|
-
var createKeyPair = (seed) => {
|
|
56
|
-
if (seed) {
|
|
57
|
-
(0, import_invariant.invariant)(seed.length >= 32, "Seedphrase too sort. Expecting length of 32.", {
|
|
58
|
-
F: __dxlog_file,
|
|
59
|
-
L: 20,
|
|
60
|
-
S: void 0,
|
|
61
|
-
A: [
|
|
62
|
-
"seed.length >= 32",
|
|
63
|
-
"'Seedphrase too sort. Expecting length of 32.'"
|
|
64
|
-
]
|
|
65
|
-
});
|
|
66
|
-
return import_hypercore_crypto.default.keyPair(seed.slice(0, 32));
|
|
67
|
-
}
|
|
68
|
-
return import_hypercore_crypto.default.keyPair();
|
|
69
|
-
};
|
|
70
|
-
var validateKeyPair = (publicKey, secretKey) => import_hypercore_crypto.default.validateKeyPair({
|
|
71
|
-
publicKey: publicKey.asBuffer(),
|
|
72
|
-
secretKey
|
|
73
|
-
});
|
|
74
|
-
var discoveryKey = (key) => import_hypercore_crypto.default.discoveryKey(import_keys.PublicKey.from(key).asBuffer().slice(1));
|
|
75
|
-
var randomBytes = (length = 32) => import_hypercore_crypto.default.randomBytes(length);
|
|
76
|
-
var sign = (message, secretKey) => {
|
|
77
|
-
(0, import_invariant.invariant)(Buffer.isBuffer(message), void 0, {
|
|
78
|
-
F: __dxlog_file,
|
|
79
|
-
L: 50,
|
|
80
|
-
S: void 0,
|
|
81
|
-
A: [
|
|
82
|
-
"Buffer.isBuffer(message)",
|
|
83
|
-
""
|
|
84
|
-
]
|
|
85
|
-
});
|
|
86
|
-
(0, import_invariant.invariant)(Buffer.isBuffer(secretKey) && secretKey.length === import_keys.SECRET_KEY_LENGTH, void 0, {
|
|
87
|
-
F: __dxlog_file,
|
|
88
|
-
L: 51,
|
|
89
|
-
S: void 0,
|
|
90
|
-
A: [
|
|
91
|
-
"Buffer.isBuffer(secretKey) && secretKey.length === SECRET_KEY_LENGTH",
|
|
92
|
-
""
|
|
93
|
-
]
|
|
94
|
-
});
|
|
95
|
-
return import_hypercore_crypto.default.sign(message, secretKey);
|
|
96
|
-
};
|
|
97
|
-
var verify = (message, signature, publicKey) => {
|
|
98
|
-
(0, import_invariant.invariant)(Buffer.isBuffer(message), void 0, {
|
|
99
|
-
F: __dxlog_file,
|
|
100
|
-
L: 64,
|
|
101
|
-
S: void 0,
|
|
102
|
-
A: [
|
|
103
|
-
"Buffer.isBuffer(message)",
|
|
104
|
-
""
|
|
105
|
-
]
|
|
106
|
-
});
|
|
107
|
-
(0, import_invariant.invariant)(Buffer.isBuffer(signature) && signature.length === SIGNATURE_LENGTH, void 0, {
|
|
108
|
-
F: __dxlog_file,
|
|
109
|
-
L: 65,
|
|
110
|
-
S: void 0,
|
|
111
|
-
A: [
|
|
112
|
-
"Buffer.isBuffer(signature) && signature.length === SIGNATURE_LENGTH",
|
|
113
|
-
""
|
|
114
|
-
]
|
|
115
|
-
});
|
|
116
|
-
(0, import_invariant.invariant)(Buffer.isBuffer(publicKey) && publicKey.length === import_keys.PUBLIC_KEY_LENGTH, void 0, {
|
|
117
|
-
F: __dxlog_file,
|
|
118
|
-
L: 66,
|
|
119
|
-
S: void 0,
|
|
120
|
-
A: [
|
|
121
|
-
"Buffer.isBuffer(publicKey) && publicKey.length === PUBLIC_KEY_LENGTH",
|
|
122
|
-
""
|
|
123
|
-
]
|
|
124
|
-
});
|
|
125
|
-
return import_hypercore_crypto.default.verify(message, signature, publicKey);
|
|
126
|
-
};
|
|
127
|
-
var subtleCrypto = nodeCrypto.webcrypto.subtle;
|
|
128
|
-
var webcrypto2 = nodeCrypto.webcrypto;
|
|
129
|
-
var getSignatureValidator = (publicKey) => (message, signature) => (0, import_hypercore_crypto2.verify)(message, signature, import_keys2.PublicKey.bufferize(publicKey));
|
|
130
|
-
var verifySignature = async (key, message, signature, algorithm = {
|
|
131
|
-
name: "ECDSA",
|
|
132
|
-
namedCurve: "P-256"
|
|
133
|
-
}) => {
|
|
134
|
-
let publicKey;
|
|
135
|
-
try {
|
|
136
|
-
publicKey = await subtleCrypto.importKey("raw", key.asUint8Array(), algorithm, true, [
|
|
137
|
-
"verify"
|
|
138
|
-
]);
|
|
139
|
-
} catch {
|
|
140
|
-
return false;
|
|
141
|
-
}
|
|
142
|
-
return subtleCrypto.verify({
|
|
143
|
-
name: algorithm.name,
|
|
144
|
-
hash: "SHA-256"
|
|
145
|
-
}, publicKey, signature, message);
|
|
146
|
-
};
|
|
147
|
-
var randomUUID = () => {
|
|
148
|
-
return webcrypto2.randomUUID();
|
|
149
|
-
};
|
|
150
|
-
// Annotate the CommonJS export names for ESM import in node:
|
|
151
|
-
0 && (module.exports = {
|
|
152
|
-
SIGNATURE_LENGTH,
|
|
153
|
-
createId,
|
|
154
|
-
createKeyPair,
|
|
155
|
-
discoveryKey,
|
|
156
|
-
getSignatureValidator,
|
|
157
|
-
randomBytes,
|
|
158
|
-
randomUUID,
|
|
159
|
-
sign,
|
|
160
|
-
subtleCrypto,
|
|
161
|
-
validateKeyPair,
|
|
162
|
-
verify,
|
|
163
|
-
verifySignature,
|
|
164
|
-
webcrypto
|
|
165
|
-
});
|
|
166
|
-
//# sourceMappingURL=index.cjs.map
|
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"version": 3,
|
|
3
|
-
"sources": ["../../../src/keys.ts", "../../../src/subtle.ts", "../../../src/validator.ts", "../../../src/verify.ts", "../../../src/uuid.ts"],
|
|
4
|
-
"sourcesContent": ["//\n// Copyright 2020 DXOS.org\n//\n\nimport { invariant } from '@dxos/invariant';\nimport { type KeyPair, PublicKey, type PublicKeyLike, PUBLIC_KEY_LENGTH, SECRET_KEY_LENGTH } from '@dxos/keys';\n\nimport crypto from '#hypercore-crypto';\n\nexport const SIGNATURE_LENGTH = 64;\n\n/**\n * @deprecated\n */\n// TODO(burdon): Remove.\nexport const createId = (): string => PublicKey.stringify(randomBytes(32));\n\nexport const createKeyPair = (seed?: Buffer): KeyPair => {\n if (seed) {\n invariant(seed.length >= 32, 'Seedphrase too sort. Expecting length of 32.');\n return crypto.keyPair(seed.slice(0, 32));\n }\n\n // TODO(burdon): Enable seed for debugging.\n return crypto.keyPair();\n};\n\n// TODO(burdon): Buffer.\nexport const validateKeyPair = (publicKey: PublicKey, secretKey: Buffer) =>\n crypto.validateKeyPair({ publicKey: publicKey.asBuffer(), secretKey });\n\n// TODO(dmaretskyi): Slicing because webcrypto keys are too long.\nexport const discoveryKey = (key: PublicKeyLike): Buffer =>\n crypto.discoveryKey(PublicKey.from(key).asBuffer().slice(1));\n\n/**\n * Return random bytes of length.\n * @param [length=32]\n * @return {Buffer}\n */\nexport const randomBytes = (length = 32): Buffer => crypto.randomBytes(length);\n\n/**\n * Sign the contents of message with secret_key\n * @param {Buffer} message\n * @param {Buffer} secretKey\n * @returns {Buffer} signature\n */\nexport const sign = (message: Buffer, secretKey: Buffer): Buffer => {\n invariant(Buffer.isBuffer(message));\n invariant(Buffer.isBuffer(secretKey) && secretKey.length === SECRET_KEY_LENGTH);\n\n return crypto.sign(message, secretKey);\n};\n\n/**\n * Verifies the signature against the message and public_key.\n * @param {Buffer} message\n * @param {Buffer} publicKey\n * @param {Buffer} signature\n * @return {boolean}\n */\nexport const verify = (message: Buffer, signature: Buffer, publicKey: Buffer): boolean => {\n invariant(Buffer.isBuffer(message));\n invariant(Buffer.isBuffer(signature) && signature.length === SIGNATURE_LENGTH);\n invariant(Buffer.isBuffer(publicKey) && publicKey.length === PUBLIC_KEY_LENGTH);\n\n return crypto.verify(message, signature, publicKey);\n};\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport * as nodeCrypto from 'node:crypto';\n\nexport const subtleCrypto = nodeCrypto.webcrypto.subtle;\n\nexport const webcrypto = nodeCrypto.webcrypto;\n", "//\n// Copyright 2020 DXOS.org\n//\n\nimport { PublicKey } from '@dxos/keys';\n\nimport { verify } from '#hypercore-crypto';\n\n/**\n * Generator for signature validation function.\n * @param {String} publicKey\n */\nexport const getSignatureValidator = (publicKey: string) => (message: Buffer, signature: Buffer) =>\n verify(message, signature, PublicKey.bufferize(publicKey));\n", "//\n// Copyright 2022 DXOS.org\n//\n\nimport { type PublicKey } from '@dxos/keys';\n\nimport { subtleCrypto } from './subtle';\n\n/**\n * Verify a signature with the given key.\n */\nexport const verifySignature = async (\n key: PublicKey,\n message: Uint8Array,\n signature: Uint8Array,\n algorithm: { name: string; namedCurve?: string } = { name: 'ECDSA', namedCurve: 'P-256' },\n): Promise<boolean> => {\n let publicKey!: CryptoKey;\n\n try {\n publicKey = await subtleCrypto.importKey('raw', key.asUint8Array(), algorithm, true, ['verify']);\n } catch {\n return false;\n }\n\n return subtleCrypto.verify(\n {\n name: algorithm.name,\n hash: 'SHA-256',\n },\n publicKey,\n signature,\n message,\n );\n};\n", "//\n// Copyright 2024 DXOS.org\n//\n\nimport { webcrypto } from './subtle';\n\nexport const randomUUID = (): string => {\n return webcrypto.randomUUID();\n};\n"],
|
|
5
|
-
"mappings": ";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAIA,uBAA0B;AAC1B,kBAAkG;AAElG,8BAAmB;ACHnB,iBAA4B;ACA5B,IAAAA,eAA0B;AAE1B,IAAAC,2BAAuB;;AFGhB,IAAMC,mBAAmB;AAMzB,IAAMC,WAAW,MAAcC,sBAAUC,UAAUC,YAAY,EAAA,CAAA;AAE/D,IAAMC,gBAAgB,CAACC,SAAAA;AAC5B,MAAIA,MAAM;AACRC,oCAAUD,KAAKE,UAAU,IAAI,gDAAA;;;;;;;;;AAC7B,WAAOC,wBAAAA,QAAOC,QAAQJ,KAAKK,MAAM,GAAG,EAAA,CAAA;EACtC;AAGA,SAAOF,wBAAAA,QAAOC,QAAO;AACvB;AAGO,IAAME,kBAAkB,CAACC,WAAsBC,cACpDL,wBAAAA,QAAOG,gBAAgB;EAAEC,WAAWA,UAAUE,SAAQ;EAAID;AAAU,CAAA;AAG/D,IAAME,eAAe,CAACC,QAC3BR,wBAAAA,QAAOO,aAAad,sBAAUgB,KAAKD,GAAAA,EAAKF,SAAQ,EAAGJ,MAAM,CAAA,CAAA;AAOpD,IAAMP,cAAc,CAACI,SAAS,OAAeC,wBAAAA,QAAOL,YAAYI,MAAAA;AAQhE,IAAMW,OAAO,CAACC,SAAiBN,cAAAA;AACpCP,kCAAUc,OAAOC,SAASF,OAAAA,GAAAA,QAAAA;;;;;;;;;AAC1Bb,kCAAUc,OAAOC,SAASR,SAAAA,KAAcA,UAAUN,WAAWe,+BAAAA,QAAAA;;;;;;;;;AAE7D,SAAOd,wBAAAA,QAAOU,KAAKC,SAASN,SAAAA;AAC9B;AASO,IAAMU,SAAS,CAACJ,SAAiBK,WAAmBZ,cAAAA;AACzDN,kCAAUc,OAAOC,SAASF,OAAAA,GAAAA,QAAAA;;;;;;;;;AAC1Bb,kCAAUc,OAAOC,SAASG,SAAAA,KAAcA,UAAUjB,WAAWR,kBAAAA,QAAAA;;;;;;;;;AAC7DO,kCAAUc,OAAOC,SAAST,SAAAA,KAAcA,UAAUL,WAAWkB,+BAAAA,QAAAA;;;;;;;;;AAE7D,SAAOjB,wBAAAA,QAAOe,OAAOJ,SAASK,WAAWZ,SAAAA;AAC3C;AC9DO,IAAMc,eAA0BC,WAAAA,UAAUC;AAE1C,IAAMD,aAAuBA,WAAAA;ACI7B,IAAME,wBAAwB,CAACjB,cAAsB,CAACO,SAAiBK,kBAC5ED,yBAAAA,QAAOJ,SAASK,WAAWvB,aAAAA,UAAU6B,UAAUlB,SAAAA,CAAAA;ACF1C,IAAMmB,kBAAkB,OAC7Bf,KACAG,SACAK,WACAQ,YAAmD;EAAEC,MAAM;EAASC,YAAY;AAAQ,MAAC;AAEzF,MAAItB;AAEJ,MAAI;AACFA,gBAAY,MAAMc,aAAaS,UAAU,OAAOnB,IAAIoB,aAAY,GAAIJ,WAAW,MAAM;MAAC;KAAS;EACjG,QAAQ;AACN,WAAO;EACT;AAEA,SAAON,aAAaH,OAClB;IACEU,MAAMD,UAAUC;IAChBI,MAAM;EACR,GACAzB,WACAY,WACAL,OAAAA;AAEJ;AC5BO,IAAMmB,aAAa,MAAA;AACxB,SAAOX,WAAUW,WAAU;AAC7B;",
|
|
6
|
-
"names": ["import_keys", "import_hypercore_crypto", "SIGNATURE_LENGTH", "createId", "PublicKey", "stringify", "randomBytes", "createKeyPair", "seed", "invariant", "length", "crypto", "keyPair", "slice", "validateKeyPair", "publicKey", "secretKey", "asBuffer", "discoveryKey", "key", "from", "sign", "message", "Buffer", "isBuffer", "SECRET_KEY_LENGTH", "verify", "signature", "PUBLIC_KEY_LENGTH", "subtleCrypto", "webcrypto", "subtle", "getSignatureValidator", "bufferize", "verifySignature", "algorithm", "name", "namedCurve", "importKey", "asUint8Array", "hash", "randomUUID"]
|
|
7
|
-
}
|
package/dist/lib/node/meta.json
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"inputs":{"packages/common/crypto/src/keys.ts":{"bytes":8293,"imports":[{"path":"@dxos/invariant","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"format":"esm"},"packages/common/crypto/src/signer.ts":{"bytes":778,"imports":[],"format":"esm"},"packages/common/crypto/src/subtle.ts":{"bytes":946,"imports":[{"path":"node:crypto","kind":"import-statement","external":true}],"format":"esm"},"packages/common/crypto/src/validator.ts":{"bytes":1483,"imports":[{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"format":"esm"},"packages/common/crypto/src/verify.ts":{"bytes":2537,"imports":[{"path":"packages/common/crypto/src/subtle.ts","kind":"import-statement","original":"./subtle"}],"format":"esm"},"packages/common/crypto/src/uuid.ts":{"bytes":785,"imports":[{"path":"packages/common/crypto/src/subtle.ts","kind":"import-statement","original":"./subtle"}],"format":"esm"},"packages/common/crypto/src/index.ts":{"bytes":873,"imports":[{"path":"packages/common/crypto/src/keys.ts","kind":"import-statement","original":"./keys"},{"path":"packages/common/crypto/src/signer.ts","kind":"import-statement","original":"./signer"},{"path":"packages/common/crypto/src/subtle.ts","kind":"import-statement","original":"./subtle"},{"path":"packages/common/crypto/src/validator.ts","kind":"import-statement","original":"./validator"},{"path":"packages/common/crypto/src/verify.ts","kind":"import-statement","original":"./verify"},{"path":"packages/common/crypto/src/uuid.ts","kind":"import-statement","original":"./uuid"}],"format":"esm"}},"outputs":{"packages/common/crypto/dist/lib/node/index.cjs.map":{"imports":[],"exports":[],"inputs":{},"bytes":6211},"packages/common/crypto/dist/lib/node/index.cjs":{"imports":[{"path":"@dxos/invariant","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true},{"path":"node:crypto","kind":"import-statement","external":true},{"path":"@dxos/keys","kind":"import-statement","external":true},{"path":"#hypercore-crypto","kind":"import-statement","external":true}],"exports":["SIGNATURE_LENGTH","createId","createKeyPair","discoveryKey","getSignatureValidator","randomBytes","randomUUID","sign","subtleCrypto","validateKeyPair","verify","verifySignature","webcrypto"],"entryPoint":"packages/common/crypto/src/index.ts","inputs":{"packages/common/crypto/src/keys.ts":{"bytesInOutput":2233},"packages/common/crypto/src/index.ts":{"bytesInOutput":0},"packages/common/crypto/src/subtle.ts":{"bytesInOutput":130},"packages/common/crypto/src/validator.ts":{"bytesInOutput":238},"packages/common/crypto/src/verify.ts":{"bytesInOutput":405},"packages/common/crypto/src/uuid.ts":{"bytesInOutput":62}},"bytes":3535}}}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"subtle.d.ts","sourceRoot":"","sources":["../../../../src/browser/subtle.ts"],"names":[],"mappings":"AAMA,eAAO,MAAM,YAAY,cAAgB,CAAC;AAE1C,eAAO,MAAM,SAAS,QAAS,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"subtle.d.ts","sourceRoot":"","sources":["../../../src/subtle.ts"],"names":[],"mappings":"AAIA,OAAO,KAAK,UAAU,MAAM,aAAa,CAAC;AAE1C,eAAO,MAAM,YAAY,mCAA8B,CAAC;AAExD,eAAO,MAAM,SAAS,6BAAuB,CAAC"}
|
package/src/shims.d.ts
DELETED
|
File without changes
|
|
File without changes
|