@haex-space/vault-sdk 2.5.119 → 2.5.122
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{client-CJTSbNLI.d.mts → client-CrXV__Zx.d.mts} +2 -5
- package/dist/{client-E86CS0KK.d.ts → client-DzQv-YCD.d.ts} +2 -5
- package/dist/index.d.mts +10 -10
- package/dist/index.d.ts +10 -10
- package/dist/index.js +10 -10
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +9 -9
- package/dist/index.mjs.map +1 -1
- package/dist/react.d.mts +1 -1
- package/dist/react.d.ts +1 -1
- package/dist/react.js.map +1 -1
- package/dist/react.mjs.map +1 -1
- package/dist/runtime/nuxt.plugin.client.d.mts +1 -1
- package/dist/runtime/nuxt.plugin.client.d.ts +1 -1
- package/dist/svelte.d.mts +1 -1
- package/dist/svelte.d.ts +1 -1
- package/dist/svelte.js.map +1 -1
- package/dist/svelte.mjs.map +1 -1
- package/dist/vue.d.mts +1 -1
- package/dist/vue.d.ts +1 -1
- package/dist/vue.js.map +1 -1
- package/dist/vue.mjs.map +1 -1
- package/package.json +1 -1
package/dist/index.mjs
CHANGED
|
@@ -3097,7 +3097,7 @@ init_vaultKey();
|
|
|
3097
3097
|
function generateSpaceKey() {
|
|
3098
3098
|
return generateVaultKey();
|
|
3099
3099
|
}
|
|
3100
|
-
async function
|
|
3100
|
+
async function encryptWithPublicKeyAsync(data, recipientPublicKeyBase64) {
|
|
3101
3101
|
const ephemeral = await crypto.subtle.generateKey(KEY_AGREEMENT_ALGO, true, ["deriveBits"]);
|
|
3102
3102
|
const recipientKey = await importPublicKeyForKeyAgreementAsync(recipientPublicKeyBase64);
|
|
3103
3103
|
const sharedBits = await crypto.subtle.deriveBits(
|
|
@@ -3118,18 +3118,18 @@ async function encryptSpaceKeyForRecipientAsync(spaceKey, recipientPublicKeyBase
|
|
|
3118
3118
|
["encrypt"]
|
|
3119
3119
|
);
|
|
3120
3120
|
const nonce = crypto.getRandomValues(new Uint8Array(12));
|
|
3121
|
-
const encrypted = await crypto.subtle.encrypt({ name: "AES-GCM", iv: nonce }, aesKey,
|
|
3121
|
+
const encrypted = await crypto.subtle.encrypt({ name: "AES-GCM", iv: nonce }, aesKey, data);
|
|
3122
3122
|
const ephPub = await crypto.subtle.exportKey("spki", ephemeral.publicKey);
|
|
3123
3123
|
return {
|
|
3124
|
-
|
|
3125
|
-
|
|
3124
|
+
encryptedData: arrayBufferToBase64(encrypted),
|
|
3125
|
+
nonce: arrayBufferToBase64(nonce),
|
|
3126
3126
|
ephemeralPublicKey: arrayBufferToBase64(ephPub)
|
|
3127
3127
|
};
|
|
3128
3128
|
}
|
|
3129
|
-
async function
|
|
3129
|
+
async function decryptWithPrivateKeyAsync(sealed, ownPrivateKeyBase64) {
|
|
3130
3130
|
const ephPubKey = await crypto.subtle.importKey(
|
|
3131
3131
|
"spki",
|
|
3132
|
-
base64ToArrayBuffer(
|
|
3132
|
+
base64ToArrayBuffer(sealed.ephemeralPublicKey),
|
|
3133
3133
|
KEY_AGREEMENT_ALGO,
|
|
3134
3134
|
true,
|
|
3135
3135
|
[]
|
|
@@ -3153,9 +3153,9 @@ async function decryptSpaceKeyAsync(encrypted, ownPrivateKeyBase64) {
|
|
|
3153
3153
|
["decrypt"]
|
|
3154
3154
|
);
|
|
3155
3155
|
const decrypted = await crypto.subtle.decrypt(
|
|
3156
|
-
{ name: "AES-GCM", iv: base64ToArrayBuffer(
|
|
3156
|
+
{ name: "AES-GCM", iv: base64ToArrayBuffer(sealed.nonce) },
|
|
3157
3157
|
aesKey,
|
|
3158
|
-
base64ToArrayBuffer(
|
|
3158
|
+
base64ToArrayBuffer(sealed.encryptedData)
|
|
3159
3159
|
);
|
|
3160
3160
|
return new Uint8Array(decrypted);
|
|
3161
3161
|
}
|
|
@@ -3452,6 +3452,6 @@ function createHaexVaultSdk(config = {}) {
|
|
|
3452
3452
|
return new HaexVaultSdk(config);
|
|
3453
3453
|
}
|
|
3454
3454
|
|
|
3455
|
-
export { COSE_ALGORITHM, DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, ExternalConnectionErrorCode, ExternalConnectionState, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HaexVaultSdk, HaexVaultSdkError, KEY_AGREEMENT_ALGO, LOCALSEND_EVENTS, LocalSendAPI, PermissionErrorCode, PermissionStatus, PermissionsAPI, RemoteStorageAPI, SIGNING_ALGO, SPACE_COMMANDS, SpacesAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, canExternalClientSendRequests, createHaexVaultSdk, decryptCrdtData, decryptPrivateKeyAsync,
|
|
3455
|
+
export { COSE_ALGORITHM, DEFAULT_TIMEOUT, DatabaseAPI, EXTERNAL_EVENTS, ErrorCode, ExternalConnectionErrorCode, ExternalConnectionState, FilesystemAPI, HAEXSPACE_MESSAGE_TYPES, HAEXTENSION_EVENTS, HaexVaultSdk, HaexVaultSdkError, KEY_AGREEMENT_ALGO, LOCALSEND_EVENTS, LocalSendAPI, PermissionErrorCode, PermissionStatus, PermissionsAPI, RemoteStorageAPI, SIGNING_ALGO, SPACE_COMMANDS, SpacesAPI, TABLE_SEPARATOR, TAURI_COMMANDS, WebAPI, arrayBufferToBase64, base64ToArrayBuffer, canExternalClientSendRequests, createHaexVaultSdk, decryptCrdtData, decryptPrivateKeyAsync, decryptSpaceNameAsync, decryptString, decryptVaultKey, decryptVaultName, decryptWithPrivateKeyAsync, deriveKeyFromPassword, didKeyToPublicKeyAsync, encryptCrdtData, encryptPrivateKeyAsync, encryptSpaceNameAsync, encryptString, encryptVaultKey, encryptWithPublicKeyAsync, exportKeyPairAsync, exportPrivateKeyAsync, exportPublicKeyAsync, exportPublicKeyCoseAsync, exportUserKeypairAsync, generateCredentialId, generateIdentityAsync, generatePasskeyPairAsync, generateSpaceKey, generateUserKeypairAsync, generateVaultKey, getTableName, hexToBytes, importPrivateKeyAsync, importPrivateKeyForKeyAgreementAsync, importPublicKeyAsync, importPublicKeyForKeyAgreementAsync, importUserPrivateKeyAsync, importUserPublicKeyAsync, installBaseTag, installCookiePolyfill, installHistoryPolyfill, installLocalStoragePolyfill, installPolyfills, installSessionStoragePolyfill, isExternalClientConnected, isPermissionDeniedError, isPermissionError, isPermissionPromptError, publicKeyToDidKeyAsync, signClaimPresentationAsync, signRecordAsync, signSpaceChallengeAsync, signWithPasskeyAsync, sortObjectKeysRecursively, unwrapKey, verifyClaimPresentationAsync, verifyExtensionSignature, verifyRecordSignatureAsync, verifySpaceChallengeAsync, verifyWithPasskeyAsync, wrapKey };
|
|
3456
3456
|
//# sourceMappingURL=index.mjs.map
|
|
3457
3457
|
//# sourceMappingURL=index.mjs.map
|