@kernelift/ai-chat 2.3.1 → 2.3.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +6 -0
- package/dist/ai-chat.css +1 -1
- package/dist/index.js +431 -431
- package/package.json +1 -1
package/dist/index.js
CHANGED
|
@@ -249,7 +249,7 @@ const Za = /* @__PURE__ */ kt(xn, [["render", Gn]]), jn = { class: "kernelift-th
|
|
|
249
249
|
(ce(!0), de(Dt, null, Vt(U.value, (n) => (ce(), de("div", {
|
|
250
250
|
key: n.key,
|
|
251
251
|
class: "kernelift-chat-bubble__action-item",
|
|
252
|
-
onClick: (
|
|
252
|
+
onClick: (T) => v(n.key)
|
|
253
253
|
}, [
|
|
254
254
|
re("i", {
|
|
255
255
|
class: rt(B(n)),
|
|
@@ -278,7 +278,7 @@ const Za = /* @__PURE__ */ kt(xn, [["render", Gn]]), jn = { class: "kernelift-th
|
|
|
278
278
|
(ce(!0), de(Dt, null, Vt(E.value, (n) => (ce(), de("div", {
|
|
279
279
|
key: n.key,
|
|
280
280
|
class: "kernelift-chat-bubble__context-item",
|
|
281
|
-
onClick: (
|
|
281
|
+
onClick: (T) => s(n.key)
|
|
282
282
|
}, [
|
|
283
283
|
re("i", {
|
|
284
284
|
class: rt(B(n)),
|
|
@@ -532,7 +532,7 @@ function Ut(t, e, a, p = {}) {
|
|
|
532
532
|
U && r && (a instanceof Storage ? ea(U, "storage", i, { passive: !0 }) : ea(U, ta, n)), y ? mi(() => {
|
|
533
533
|
c = !0, D();
|
|
534
534
|
}) : D();
|
|
535
|
-
function
|
|
535
|
+
function T(x, G) {
|
|
536
536
|
if (U) {
|
|
537
537
|
const z = {
|
|
538
538
|
key: m.value,
|
|
@@ -547,10 +547,10 @@ function Ut(t, e, a, p = {}) {
|
|
|
547
547
|
try {
|
|
548
548
|
const G = a.getItem(m.value);
|
|
549
549
|
if (x == null)
|
|
550
|
-
|
|
550
|
+
T(G, null), a.removeItem(m.value);
|
|
551
551
|
else {
|
|
552
552
|
const z = v.write(x);
|
|
553
|
-
G !== z && (a.setItem(m.value, z),
|
|
553
|
+
G !== z && (a.setItem(m.value, z), T(G, z));
|
|
554
554
|
}
|
|
555
555
|
} catch (G) {
|
|
556
556
|
u(G);
|
|
@@ -1018,8 +1018,8 @@ function Se() {
|
|
|
1018
1018
|
let i = function(n) {
|
|
1019
1019
|
if (n.source === window && n.data === s) {
|
|
1020
1020
|
n.stopPropagation();
|
|
1021
|
-
var
|
|
1022
|
-
h.length = 0,
|
|
1021
|
+
var T = h.slice();
|
|
1022
|
+
h.length = 0, T.forEach(function(V) {
|
|
1023
1023
|
V();
|
|
1024
1024
|
});
|
|
1025
1025
|
}
|
|
@@ -1033,8 +1033,8 @@ function Se() {
|
|
|
1033
1033
|
var v = Date.now(), B = !0, R = document.createElement("div"), h = [];
|
|
1034
1034
|
new MutationObserver(function() {
|
|
1035
1035
|
var n = h.slice();
|
|
1036
|
-
h.length = 0, n.forEach(function(
|
|
1037
|
-
|
|
1036
|
+
h.length = 0, n.forEach(function(T) {
|
|
1037
|
+
T();
|
|
1038
1038
|
});
|
|
1039
1039
|
}).observe(R, { attributes: !0 });
|
|
1040
1040
|
var c = a.setImmediate;
|
|
@@ -1507,8 +1507,8 @@ function Se() {
|
|
|
1507
1507
|
}, a.binary.base64.decode = function(s, h, v) {
|
|
1508
1508
|
var B = h;
|
|
1509
1509
|
B || (B = new Uint8Array(Math.ceil(s.length / 4) * 3)), s = s.replace(/[^A-Za-z0-9\+\/\=]/g, ""), v = v || 0;
|
|
1510
|
-
for (var R, c, i, n,
|
|
1511
|
-
R = g[s.charCodeAt(
|
|
1510
|
+
for (var R, c, i, n, T = 0, V = v; T < s.length; )
|
|
1511
|
+
R = g[s.charCodeAt(T++) - 43], c = g[s.charCodeAt(T++) - 43], i = g[s.charCodeAt(T++) - 43], n = g[s.charCodeAt(T++) - 43], B[V++] = R << 2 | c >> 4, i !== 64 && (B[V++] = (c & 15) << 4 | i >> 2, n !== 64 && (B[V++] = (i & 3) << 6 | n));
|
|
1512
1512
|
return h ? V - v : B.subarray(0, V);
|
|
1513
1513
|
}, a.binary.base58.encode = function(s, h) {
|
|
1514
1514
|
return a.binary.baseN.encode(s, l, h);
|
|
@@ -1600,8 +1600,8 @@ function Se() {
|
|
|
1600
1600
|
B = s.apply(this, h), c = R === "flash";
|
|
1601
1601
|
}
|
|
1602
1602
|
(R === "web" || R === "both") && (h[0] = localStorage, B = s.apply(this, h), c = !0);
|
|
1603
|
-
} catch (
|
|
1604
|
-
i =
|
|
1603
|
+
} catch (T) {
|
|
1604
|
+
i = T;
|
|
1605
1605
|
}
|
|
1606
1606
|
if (c)
|
|
1607
1607
|
break;
|
|
@@ -1644,8 +1644,8 @@ function Se() {
|
|
|
1644
1644
|
}
|
|
1645
1645
|
return c.push(s.substring(i)), c.join("");
|
|
1646
1646
|
}, a.formatNumber = function(s, h, v, B) {
|
|
1647
|
-
var R = s, c = isNaN(h = Math.abs(h)) ? 2 : h, i = v === void 0 ? "," : v, n = B === void 0 ? "." : B,
|
|
1648
|
-
return
|
|
1647
|
+
var R = s, c = isNaN(h = Math.abs(h)) ? 2 : h, i = v === void 0 ? "," : v, n = B === void 0 ? "." : B, T = R < 0 ? "-" : "", V = parseInt(R = Math.abs(+R || 0).toFixed(c), 10) + "", O = V.length > 3 ? V.length % 3 : 0;
|
|
1648
|
+
return T + (O ? V.substr(0, O) + n : "") + V.substr(O).replace(/(\d{3})(?=\d)/g, "$1" + n) + (c ? i + Math.abs(R - V).toFixed(c).slice(2) : "");
|
|
1649
1649
|
}, a.formatSize = function(s) {
|
|
1650
1650
|
return s >= 1073741824 ? s = a.formatNumber(s / 1073741824, 2, ".", "") + " GiB" : s >= 1048576 ? s = a.formatNumber(s / 1048576, 2, ".", "") + " MiB" : s >= 1024 ? s = a.formatNumber(s / 1024, 0) + " KiB" : s = a.formatNumber(s, 0) + " bytes", s;
|
|
1651
1651
|
}, a.bytesFromIP = function(s) {
|
|
@@ -1695,8 +1695,8 @@ function Se() {
|
|
|
1695
1695
|
h.push(c);
|
|
1696
1696
|
}
|
|
1697
1697
|
if (v.length > 0) {
|
|
1698
|
-
var
|
|
1699
|
-
|
|
1698
|
+
var T = v[B];
|
|
1699
|
+
T.end - T.start > 0 && (h.splice(T.start, T.end - T.start + 1, ""), T.start === 0 && h.unshift(""), T.end === 7 && h.push(""));
|
|
1700
1700
|
}
|
|
1701
1701
|
return h.join(":");
|
|
1702
1702
|
}, a.estimateCores = function(s, h) {
|
|
@@ -1712,46 +1712,46 @@ function Se() {
|
|
|
1712
1712
|
"(",
|
|
1713
1713
|
(function() {
|
|
1714
1714
|
self.addEventListener("message", function(i) {
|
|
1715
|
-
var n = Date.now(),
|
|
1716
|
-
self.postMessage({ st: n, et:
|
|
1715
|
+
var n = Date.now(), T = n + 4;
|
|
1716
|
+
self.postMessage({ st: n, et: T });
|
|
1717
1717
|
});
|
|
1718
1718
|
}).toString(),
|
|
1719
1719
|
")()"
|
|
1720
1720
|
], { type: "application/javascript" }));
|
|
1721
1721
|
B([], 5, 16);
|
|
1722
|
-
function B(i, n,
|
|
1722
|
+
function B(i, n, T) {
|
|
1723
1723
|
if (n === 0) {
|
|
1724
1724
|
var V = Math.floor(i.reduce(function(O, D) {
|
|
1725
1725
|
return O + D;
|
|
1726
1726
|
}, 0) / i.length);
|
|
1727
1727
|
return a.cores = Math.max(1, V), URL.revokeObjectURL(v), h(null, a.cores);
|
|
1728
1728
|
}
|
|
1729
|
-
R(
|
|
1730
|
-
i.push(c(
|
|
1729
|
+
R(T, function(O, D) {
|
|
1730
|
+
i.push(c(T, D)), B(i, n - 1, T);
|
|
1731
1731
|
});
|
|
1732
1732
|
}
|
|
1733
1733
|
function R(i, n) {
|
|
1734
|
-
for (var
|
|
1734
|
+
for (var T = [], V = [], O = 0; O < i; ++O) {
|
|
1735
1735
|
var D = new Worker(v);
|
|
1736
1736
|
D.addEventListener("message", function(M) {
|
|
1737
1737
|
if (V.push(M.data), V.length === i) {
|
|
1738
1738
|
for (var x = 0; x < i; ++x)
|
|
1739
|
-
|
|
1739
|
+
T[x].terminate();
|
|
1740
1740
|
n(null, V);
|
|
1741
1741
|
}
|
|
1742
|
-
}),
|
|
1742
|
+
}), T.push(D);
|
|
1743
1743
|
}
|
|
1744
1744
|
for (var O = 0; O < i; ++O)
|
|
1745
|
-
|
|
1745
|
+
T[O].postMessage(O);
|
|
1746
1746
|
}
|
|
1747
1747
|
function c(i, n) {
|
|
1748
|
-
for (var
|
|
1749
|
-
for (var O = n[V], D =
|
|
1748
|
+
for (var T = [], V = 0; V < i; ++V)
|
|
1749
|
+
for (var O = n[V], D = T[V] = [], M = 0; M < i; ++M)
|
|
1750
1750
|
if (V !== M) {
|
|
1751
1751
|
var x = n[M];
|
|
1752
1752
|
(O.st > x.st && O.st < x.et || x.st > O.st && x.st < O.et) && D.push(M);
|
|
1753
1753
|
}
|
|
1754
|
-
return
|
|
1754
|
+
return T.reduce(function(G, z) {
|
|
1755
1755
|
return Math.max(G, z.length);
|
|
1756
1756
|
}, 0);
|
|
1757
1757
|
}
|
|
@@ -2259,14 +2259,14 @@ function Nt() {
|
|
|
2259
2259
|
for (var C = u.slice(0), m, s = 1, h = C.length, v = h + 6 + 1, B = p * v, R = h; R < B; ++R)
|
|
2260
2260
|
m = C[R - 1], R % h === 0 ? (m = I[m >>> 16 & 255] << 24 ^ I[m >>> 8 & 255] << 16 ^ I[m & 255] << 8 ^ I[m >>> 24] ^ f[s] << 24, s++) : h > 6 && R % h === 4 && (m = I[m >>> 24] << 24 ^ I[m >>> 16 & 255] << 16 ^ I[m >>> 8 & 255] << 8 ^ I[m & 255]), C[R] = C[R - h] ^ m;
|
|
2261
2261
|
if (y) {
|
|
2262
|
-
var c, i = g[0], n = g[1],
|
|
2262
|
+
var c, i = g[0], n = g[1], T = g[2], V = g[3], O = C.slice(0);
|
|
2263
2263
|
B = C.length;
|
|
2264
2264
|
for (var R = 0, D = B - p; R < B; R += p, D -= p)
|
|
2265
2265
|
if (R === 0 || R === B - p)
|
|
2266
2266
|
O[R] = C[D], O[R + 1] = C[D + 3], O[R + 2] = C[D + 2], O[R + 3] = C[D + 1];
|
|
2267
2267
|
else
|
|
2268
2268
|
for (var M = 0; M < p; ++M)
|
|
2269
|
-
c = C[D + M], O[R + (3 & -M)] = i[I[c >>> 24]] ^ n[I[c >>> 16 & 255]] ^
|
|
2269
|
+
c = C[D + M], O[R + (3 & -M)] = i[I[c >>> 24]] ^ n[I[c >>> 16 & 255]] ^ T[I[c >>> 8 & 255]] ^ V[I[c & 255]];
|
|
2270
2270
|
C = O;
|
|
2271
2271
|
}
|
|
2272
2272
|
return C;
|
|
@@ -2274,11 +2274,11 @@ function Nt() {
|
|
|
2274
2274
|
function U(u, y, C, m) {
|
|
2275
2275
|
var s = u.length / 4 - 1, h, v, B, R, c;
|
|
2276
2276
|
m ? (h = g[0], v = g[1], B = g[2], R = g[3], c = S) : (h = r[0], v = r[1], B = r[2], R = r[3], c = I);
|
|
2277
|
-
var i, n,
|
|
2278
|
-
i = y[0] ^ u[0], n = y[m ? 3 : 1] ^ u[1],
|
|
2277
|
+
var i, n, T, V, O, D, M;
|
|
2278
|
+
i = y[0] ^ u[0], n = y[m ? 3 : 1] ^ u[1], T = y[2] ^ u[2], V = y[m ? 1 : 3] ^ u[3];
|
|
2279
2279
|
for (var x = 3, G = 1; G < s; ++G)
|
|
2280
|
-
O = h[i >>> 24] ^ v[n >>> 16 & 255] ^ B[
|
|
2281
|
-
C[0] = c[i >>> 24] << 24 ^ c[n >>> 16 & 255] << 16 ^ c[
|
|
2280
|
+
O = h[i >>> 24] ^ v[n >>> 16 & 255] ^ B[T >>> 8 & 255] ^ R[V & 255] ^ u[++x], D = h[n >>> 24] ^ v[T >>> 16 & 255] ^ B[V >>> 8 & 255] ^ R[i & 255] ^ u[++x], M = h[T >>> 24] ^ v[V >>> 16 & 255] ^ B[i >>> 8 & 255] ^ R[n & 255] ^ u[++x], V = h[V >>> 24] ^ v[i >>> 16 & 255] ^ B[n >>> 8 & 255] ^ R[T & 255] ^ u[++x], i = O, n = D, T = M;
|
|
2281
|
+
C[0] = c[i >>> 24] << 24 ^ c[n >>> 16 & 255] << 16 ^ c[T >>> 8 & 255] << 8 ^ c[V & 255] ^ u[++x], C[m ? 3 : 1] = c[n >>> 24] << 24 ^ c[T >>> 16 & 255] << 16 ^ c[V >>> 8 & 255] << 8 ^ c[i & 255] ^ u[++x], C[2] = c[T >>> 24] << 24 ^ c[V >>> 16 & 255] << 16 ^ c[i >>> 8 & 255] << 8 ^ c[n & 255] ^ u[++x], C[m ? 1 : 3] = c[V >>> 24] << 24 ^ c[i >>> 16 & 255] << 16 ^ c[n >>> 8 & 255] << 8 ^ c[T & 255] ^ u[++x];
|
|
2282
2282
|
}
|
|
2283
2283
|
function E(u) {
|
|
2284
2284
|
u = u || {};
|
|
@@ -2471,8 +2471,8 @@ function yt() {
|
|
|
2471
2471
|
decodeBitStrings: !0
|
|
2472
2472
|
}, i = I(f, r, g + 1, c), n = b - f.length();
|
|
2473
2473
|
r -= n, u == e.Type.BITSTRING && n++;
|
|
2474
|
-
var
|
|
2475
|
-
n === y && (
|
|
2474
|
+
var T = i.tagClass;
|
|
2475
|
+
n === y && (T === e.Class.UNIVERSAL || T === e.Class.CONTEXT_SPECIFIC) && (m = [i]);
|
|
2476
2476
|
} catch {
|
|
2477
2477
|
}
|
|
2478
2478
|
m === void 0 && (f.read = v, r = B);
|
|
@@ -3173,12 +3173,12 @@ function _t() {
|
|
|
3173
3173
|
}
|
|
3174
3174
|
var a = [16843776, 0, 65536, 16843780, 16842756, 66564, 4, 65536, 1024, 16843776, 16843780, 1024, 16778244, 16842756, 16777216, 4, 1028, 16778240, 16778240, 66560, 66560, 16842752, 16842752, 16778244, 65540, 16777220, 16777220, 65540, 0, 1028, 66564, 16777216, 65536, 16843780, 4, 16842752, 16843776, 16777216, 16777216, 1024, 16842756, 65536, 66560, 16777220, 1024, 4, 16778244, 66564, 16843780, 65540, 16842752, 16778244, 16777220, 1028, 66564, 16843776, 1028, 16778240, 16778240, 0, 65540, 66560, 0, 16842756], p = [-2146402272, -2147450880, 32768, 1081376, 1048576, 32, -2146435040, -2147450848, -2147483616, -2146402272, -2146402304, -2147483648, -2147450880, 1048576, 32, -2146435040, 1081344, 1048608, -2147450848, 0, -2147483648, 32768, 1081376, -2146435072, 1048608, -2147483616, 0, 1081344, 32800, -2146402304, -2146435072, 32800, 0, 1081376, -2146435040, 1048576, -2147450848, -2146435072, -2146402304, 32768, -2146435072, -2147450880, 32, -2146402272, 1081376, 32, 32768, -2147483648, 32800, -2146402304, 1048576, -2147483616, 1048608, -2147450848, -2147483616, 1048608, 1081344, 0, -2147450880, 32800, -2147483648, -2146435040, -2146402272, 1081344], I = [520, 134349312, 0, 134348808, 134218240, 0, 131592, 134218240, 131080, 134217736, 134217736, 131072, 134349320, 131080, 134348800, 520, 134217728, 8, 134349312, 512, 131584, 134348800, 134348808, 131592, 134218248, 131584, 131072, 134218248, 8, 134349320, 512, 134217728, 134349312, 134217728, 131080, 520, 131072, 134349312, 134218240, 0, 512, 131080, 134349320, 134218240, 134217736, 512, 0, 134348808, 134218248, 131072, 134217728, 134349320, 8, 131592, 131584, 134217736, 134348800, 134218248, 520, 134348800, 131592, 8, 134348808, 131584], S = [8396801, 8321, 8321, 128, 8396928, 8388737, 8388609, 8193, 0, 8396800, 8396800, 8396929, 129, 0, 8388736, 8388609, 1, 8192, 8388608, 8396801, 128, 8388608, 8193, 8320, 8388737, 1, 8320, 8388736, 8192, 8396928, 8396929, 129, 8388736, 8388609, 8396800, 8396929, 129, 0, 0, 8396800, 8320, 8388736, 8388737, 1, 8396801, 8321, 8321, 128, 8396929, 129, 1, 8192, 8388609, 8193, 8396928, 8388737, 8193, 8320, 8388608, 8396801, 128, 8388608, 8192, 8396928], f = [256, 34078976, 34078720, 1107296512, 524288, 256, 1073741824, 34078720, 1074266368, 524288, 33554688, 1074266368, 1107296512, 1107820544, 524544, 1073741824, 33554432, 1074266112, 1074266112, 0, 1073742080, 1107820800, 1107820800, 33554688, 1107820544, 1073742080, 0, 1107296256, 34078976, 33554432, 1107296256, 524544, 524288, 1107296512, 256, 33554432, 1073741824, 34078720, 1107296512, 1074266368, 33554688, 1073741824, 1107820544, 34078976, 1074266368, 256, 33554432, 1107820544, 1107820800, 524544, 1107296256, 1107820800, 34078720, 0, 1074266112, 1107296256, 524544, 33554688, 1073742080, 524288, 0, 1074266112, 34078976, 1073742080], r = [536870928, 541065216, 16384, 541081616, 541065216, 16, 541081616, 4194304, 536887296, 4210704, 4194304, 536870928, 4194320, 536887296, 536870912, 16400, 0, 4194320, 536887312, 16384, 4210688, 536887312, 16, 541065232, 541065232, 0, 4210704, 541081600, 16400, 4210688, 541081600, 536870912, 536887296, 16, 541065232, 4210688, 541081616, 4194304, 16400, 536870928, 4194304, 536887296, 536870912, 16400, 536870928, 541081616, 4210688, 541065216, 4210704, 541081600, 0, 541065232, 16, 16384, 541065216, 4210704, 16384, 4194320, 536887312, 0, 541081600, 536870912, 4194320, 536887312], g = [2097152, 69206018, 67110914, 0, 2048, 67110914, 2099202, 69208064, 69208066, 2097152, 0, 67108866, 2, 67108864, 69206018, 2050, 67110912, 2099202, 2097154, 67110912, 67108866, 69206016, 69208064, 2097154, 69206016, 2048, 2050, 69208066, 2099200, 2, 67108864, 2099200, 67108864, 2099200, 2097152, 67110914, 67110914, 69206018, 69206018, 2, 2097154, 67108864, 67110912, 2097152, 69208064, 2050, 2099202, 69208064, 2050, 67108866, 69208066, 69206016, 2099200, 0, 2, 69208066, 0, 2099202, 69206016, 2048, 67108866, 67110912, 2048, 2097154], l = [268439616, 4096, 262144, 268701760, 268435456, 268439616, 64, 268435456, 262208, 268697600, 268701760, 266240, 268701696, 266304, 4096, 64, 268697600, 268435520, 268439552, 4160, 266240, 262208, 268697664, 268701696, 4160, 0, 0, 268697664, 268435520, 268439552, 266304, 262144, 266304, 262144, 268701696, 4096, 64, 268697664, 4096, 266304, 268439552, 64, 268435520, 268697600, 268697664, 268435456, 262144, 268439616, 0, 268701760, 262208, 268435520, 268697600, 268439552, 268439616, 0, 268701760, 266240, 266240, 4160, 4160, 262208, 268435456, 268701696];
|
|
3175
3175
|
function b(u) {
|
|
3176
|
-
for (var y = [0, 4, 536870912, 536870916, 65536, 65540, 536936448, 536936452, 512, 516, 536871424, 536871428, 66048, 66052, 536936960, 536936964], C = [0, 1, 1048576, 1048577, 67108864, 67108865, 68157440, 68157441, 256, 257, 1048832, 1048833, 67109120, 67109121, 68157696, 68157697], m = [0, 8, 2048, 2056, 16777216, 16777224, 16779264, 16779272, 0, 8, 2048, 2056, 16777216, 16777224, 16779264, 16779272], s = [0, 2097152, 134217728, 136314880, 8192, 2105344, 134225920, 136323072, 131072, 2228224, 134348800, 136445952, 139264, 2236416, 134356992, 136454144], h = [0, 262144, 16, 262160, 0, 262144, 16, 262160, 4096, 266240, 4112, 266256, 4096, 266240, 4112, 266256], v = [0, 1024, 32, 1056, 0, 1024, 32, 1056, 33554432, 33555456, 33554464, 33555488, 33554432, 33555456, 33554464, 33555488], B = [0, 268435456, 524288, 268959744, 2, 268435458, 524290, 268959746, 0, 268435456, 524288, 268959744, 2, 268435458, 524290, 268959746], R = [0, 65536, 2048, 67584, 536870912, 536936448, 536872960, 536938496, 131072, 196608, 133120, 198656, 537001984, 537067520, 537004032, 537069568], c = [0, 262144, 0, 262144, 2, 262146, 2, 262146, 33554432, 33816576, 33554432, 33816576, 33554434, 33816578, 33554434, 33816578], i = [0, 268435456, 8, 268435464, 0, 268435456, 8, 268435464, 1024, 268436480, 1032, 268436488, 1024, 268436480, 1032, 268436488], n = [0, 32, 0, 32, 1048576, 1048608, 1048576, 1048608, 8192, 8224, 8192, 8224, 1056768, 1056800, 1056768, 1056800],
|
|
3176
|
+
for (var y = [0, 4, 536870912, 536870916, 65536, 65540, 536936448, 536936452, 512, 516, 536871424, 536871428, 66048, 66052, 536936960, 536936964], C = [0, 1, 1048576, 1048577, 67108864, 67108865, 68157440, 68157441, 256, 257, 1048832, 1048833, 67109120, 67109121, 68157696, 68157697], m = [0, 8, 2048, 2056, 16777216, 16777224, 16779264, 16779272, 0, 8, 2048, 2056, 16777216, 16777224, 16779264, 16779272], s = [0, 2097152, 134217728, 136314880, 8192, 2105344, 134225920, 136323072, 131072, 2228224, 134348800, 136445952, 139264, 2236416, 134356992, 136454144], h = [0, 262144, 16, 262160, 0, 262144, 16, 262160, 4096, 266240, 4112, 266256, 4096, 266240, 4112, 266256], v = [0, 1024, 32, 1056, 0, 1024, 32, 1056, 33554432, 33555456, 33554464, 33555488, 33554432, 33555456, 33554464, 33555488], B = [0, 268435456, 524288, 268959744, 2, 268435458, 524290, 268959746, 0, 268435456, 524288, 268959744, 2, 268435458, 524290, 268959746], R = [0, 65536, 2048, 67584, 536870912, 536936448, 536872960, 536938496, 131072, 196608, 133120, 198656, 537001984, 537067520, 537004032, 537069568], c = [0, 262144, 0, 262144, 2, 262146, 2, 262146, 33554432, 33816576, 33554432, 33816576, 33554434, 33816578, 33554434, 33816578], i = [0, 268435456, 8, 268435464, 0, 268435456, 8, 268435464, 1024, 268436480, 1032, 268436488, 1024, 268436480, 1032, 268436488], n = [0, 32, 0, 32, 1048576, 1048608, 1048576, 1048608, 8192, 8224, 8192, 8224, 1056768, 1056800, 1056768, 1056800], T = [0, 16777216, 512, 16777728, 2097152, 18874368, 2097664, 18874880, 67108864, 83886080, 67109376, 83886592, 69206016, 85983232, 69206528, 85983744], V = [0, 4096, 134217728, 134221824, 524288, 528384, 134742016, 134746112, 16, 4112, 134217744, 134221840, 524304, 528400, 134742032, 134746128], O = [0, 4, 256, 260, 0, 4, 256, 260, 1, 5, 257, 261, 1, 5, 257, 261], D = u.length() > 8 ? 3 : 1, M = [], x = [0, 0, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1, 1, 1, 1, 0], G = 0, z, Y = 0; Y < D; Y++) {
|
|
3177
3177
|
var Z = u.getInt32(), te = u.getInt32();
|
|
3178
3178
|
z = (Z >>> 4 ^ te) & 252645135, te ^= z, Z ^= z << 4, z = (te >>> -16 ^ Z) & 65535, Z ^= z, te ^= z << -16, z = (Z >>> 2 ^ te) & 858993459, te ^= z, Z ^= z << 2, z = (te >>> -16 ^ Z) & 65535, Z ^= z, te ^= z << -16, z = (Z >>> 1 ^ te) & 1431655765, te ^= z, Z ^= z << 1, z = (te >>> 8 ^ Z) & 16711935, Z ^= z, te ^= z << 8, z = (Z >>> 1 ^ te) & 1431655765, te ^= z, Z ^= z << 1, z = Z << 8 | te >>> 20 & 240, Z = te << 24 | te << 8 & 16711680 | te >>> 8 & 65280 | te >>> 24 & 240, te = z;
|
|
3179
3179
|
for (var ue = 0; ue < x.length; ++ue) {
|
|
3180
3180
|
x[ue] ? (Z = Z << 2 | Z >>> 26, te = te << 2 | te >>> 26) : (Z = Z << 1 | Z >>> 27, te = te << 1 | te >>> 27), Z &= -15, te &= -15;
|
|
3181
|
-
var he = y[Z >>> 28] | C[Z >>> 24 & 15] | m[Z >>> 20 & 15] | s[Z >>> 16 & 15] | h[Z >>> 12 & 15] | v[Z >>> 8 & 15] | B[Z >>> 4 & 15], Ce = R[te >>> 28] | c[te >>> 24 & 15] | i[te >>> 20 & 15] | n[te >>> 16 & 15] |
|
|
3181
|
+
var he = y[Z >>> 28] | C[Z >>> 24 & 15] | m[Z >>> 20 & 15] | s[Z >>> 16 & 15] | h[Z >>> 12 & 15] | v[Z >>> 8 & 15] | B[Z >>> 4 & 15], Ce = R[te >>> 28] | c[te >>> 24 & 15] | i[te >>> 20 & 15] | n[te >>> 16 & 15] | T[te >>> 12 & 15] | V[te >>> 8 & 15] | O[te >>> 4 & 15];
|
|
3182
3182
|
z = (Ce >>> 16 ^ he) & 65535, M[G++] = he ^ z, M[G++] = Ce ^ z << 16;
|
|
3183
3183
|
}
|
|
3184
3184
|
}
|
|
@@ -3190,8 +3190,8 @@ function _t() {
|
|
|
3190
3190
|
var v, B = y[0], R = y[1];
|
|
3191
3191
|
v = (B >>> 4 ^ R) & 252645135, R ^= v, B ^= v << 4, v = (B >>> 16 ^ R) & 65535, R ^= v, B ^= v << 16, v = (R >>> 2 ^ B) & 858993459, B ^= v, R ^= v << 2, v = (R >>> 8 ^ B) & 16711935, B ^= v, R ^= v << 8, v = (B >>> 1 ^ R) & 1431655765, R ^= v, B ^= v << 1, B = B << 1 | B >>> 31, R = R << 1 | R >>> 31;
|
|
3192
3192
|
for (var c = 0; c < s; c += 3) {
|
|
3193
|
-
for (var i = h[c + 1], n = h[c + 2],
|
|
3194
|
-
var V = R ^ u[
|
|
3193
|
+
for (var i = h[c + 1], n = h[c + 2], T = h[c]; T != i; T += n) {
|
|
3194
|
+
var V = R ^ u[T], O = (R >>> 4 | R << 28) ^ u[T + 1];
|
|
3195
3195
|
v = B, B = R, R = v ^ (p[V >>> 24 & 63] | S[V >>> 16 & 63] | r[V >>> 8 & 63] | l[V & 63] | a[O >>> 24 & 63] | I[O >>> 16 & 63] | f[O >>> 8 & 63] | g[O & 63]);
|
|
3196
3196
|
}
|
|
3197
3197
|
v = B, B = R, R = v;
|
|
@@ -3404,14 +3404,14 @@ function en() {
|
|
|
3404
3404
|
], p = !0;
|
|
3405
3405
|
}
|
|
3406
3406
|
function f(r, g, l) {
|
|
3407
|
-
for (var b, U, E, u, y, C, m, s, h, v, B, R, c, i, n,
|
|
3407
|
+
for (var b, U, E, u, y, C, m, s, h, v, B, R, c, i, n, T = l.length(); T >= 64; ) {
|
|
3408
3408
|
for (m = 0; m < 16; ++m)
|
|
3409
3409
|
g[m] = l.getInt32();
|
|
3410
3410
|
for (; m < 64; ++m)
|
|
3411
3411
|
b = g[m - 2], b = (b >>> 17 | b << 15) ^ (b >>> 19 | b << 13) ^ b >>> 10, U = g[m - 15], U = (U >>> 7 | U << 25) ^ (U >>> 18 | U << 14) ^ U >>> 3, g[m] = b + g[m - 7] + U + g[m - 16] | 0;
|
|
3412
3412
|
for (s = r.h0, h = r.h1, v = r.h2, B = r.h3, R = r.h4, c = r.h5, i = r.h6, n = r.h7, m = 0; m < 64; ++m)
|
|
3413
3413
|
u = (R >>> 6 | R << 26) ^ (R >>> 11 | R << 21) ^ (R >>> 25 | R << 7), y = i ^ R & (c ^ i), E = (s >>> 2 | s << 30) ^ (s >>> 13 | s << 19) ^ (s >>> 22 | s << 10), C = s & h | v & (s ^ h), b = n + u + y + I[m] + g[m], U = E + C, n = i, i = c, c = R, R = B + b >>> 0, B = v, v = h, h = s, s = b + U >>> 0;
|
|
3414
|
-
r.h0 = r.h0 + s | 0, r.h1 = r.h1 + h | 0, r.h2 = r.h2 + v | 0, r.h3 = r.h3 + B | 0, r.h4 = r.h4 + R | 0, r.h5 = r.h5 + c | 0, r.h6 = r.h6 + i | 0, r.h7 = r.h7 + n | 0,
|
|
3414
|
+
r.h0 = r.h0 + s | 0, r.h1 = r.h1 + h | 0, r.h2 = r.h2 + v | 0, r.h3 = r.h3 + B | 0, r.h4 = r.h4 + R | 0, r.h5 = r.h5 + c | 0, r.h6 = r.h6 + i | 0, r.h7 = r.h7 + n | 0, T -= 64;
|
|
3415
3415
|
}
|
|
3416
3416
|
}
|
|
3417
3417
|
return Cr.exports;
|
|
@@ -4118,7 +4118,7 @@ function $t() {
|
|
|
4118
4118
|
function n() {
|
|
4119
4119
|
return this.t <= 0 ? 0 : this.DB * (this.t - 1) + i(this.data[this.t - 1] ^ this.s & this.DM);
|
|
4120
4120
|
}
|
|
4121
|
-
function
|
|
4121
|
+
function T(A, N) {
|
|
4122
4122
|
var P;
|
|
4123
4123
|
for (P = this.t - 1; P >= 0; --P) N.data[P + A] = this.data[P];
|
|
4124
4124
|
for (P = A - 1; P >= 0; --P) N.data[P] = 0;
|
|
@@ -4272,11 +4272,11 @@ function $t() {
|
|
|
4272
4272
|
}
|
|
4273
4273
|
return N.revert(P);
|
|
4274
4274
|
}
|
|
4275
|
-
function
|
|
4275
|
+
function k(A, N) {
|
|
4276
4276
|
var P;
|
|
4277
4277
|
return A < 256 || N.isEven() ? P = new Z(N) : P = new $(N), this.exp(A, P);
|
|
4278
4278
|
}
|
|
4279
|
-
a.prototype.copyTo = y, a.prototype.fromInt = C, a.prototype.fromString = s, a.prototype.clamp = h, a.prototype.dlShiftTo =
|
|
4279
|
+
a.prototype.copyTo = y, a.prototype.fromInt = C, a.prototype.fromString = s, a.prototype.clamp = h, a.prototype.dlShiftTo = T, a.prototype.drShiftTo = V, a.prototype.lShiftTo = O, a.prototype.rShiftTo = D, a.prototype.subTo = M, a.prototype.multiplyTo = x, a.prototype.squareTo = G, a.prototype.divRemTo = z, a.prototype.invDigit = _, a.prototype.isEven = w, a.prototype.exp = o, a.prototype.toString = v, a.prototype.negate = B, a.prototype.abs = R, a.prototype.compareTo = c, a.prototype.bitLength = n, a.prototype.mod = Y, a.prototype.modPowInt = k, a.ZERO = m(0), a.ONE = m(1);
|
|
4280
4280
|
function F() {
|
|
4281
4281
|
var A = p();
|
|
4282
4282
|
return this.copyTo(A), A;
|
|
@@ -4767,8 +4767,8 @@ function an() {
|
|
|
4767
4767
|
for (var U = r.digest().getBytes(), E = I.charAt(0), u = I.substring(1, r.digestLength + 1), y = I.substring(1 + r.digestLength), C = a(y, r.digestLength, g), m = t.util.xorBytes(u, C, u.length), s = a(m, l - r.digestLength - 1, g), h = t.util.xorBytes(y, s, y.length), v = h.substring(0, r.digestLength), b = E !== "\0", B = 0; B < r.digestLength; ++B)
|
|
4768
4768
|
b |= U.charAt(B) !== v.charAt(B);
|
|
4769
4769
|
for (var R = 1, c = r.digestLength, i = r.digestLength; i < h.length; i++) {
|
|
4770
|
-
var n = h.charCodeAt(i),
|
|
4771
|
-
b |= n & V, R = R &
|
|
4770
|
+
var n = h.charCodeAt(i), T = n & 1 ^ 1, V = R ? 65534 : 0;
|
|
4771
|
+
b |= n & V, R = R & T, c += R;
|
|
4772
4772
|
}
|
|
4773
4773
|
if (b || h.charCodeAt(c) !== 1)
|
|
4774
4774
|
throw new Error("Invalid RSAES-OAEP padding.");
|
|
@@ -4853,9 +4853,9 @@ function nn() {
|
|
|
4853
4853
|
for (var c = [], i = 0; i < s; ++i)
|
|
4854
4854
|
c[i] = new Worker(B);
|
|
4855
4855
|
for (var i = 0; i < s; ++i)
|
|
4856
|
-
c[i].addEventListener("message",
|
|
4856
|
+
c[i].addEventListener("message", T);
|
|
4857
4857
|
var n = !1;
|
|
4858
|
-
function
|
|
4858
|
+
function T(V) {
|
|
4859
4859
|
if (!n) {
|
|
4860
4860
|
var O = V.data;
|
|
4861
4861
|
if (O.found) {
|
|
@@ -5089,8 +5089,8 @@ function er() {
|
|
|
5089
5089
|
if (i.algorithm in S.oids)
|
|
5090
5090
|
n = S.oids[i.algorithm];
|
|
5091
5091
|
else {
|
|
5092
|
-
var
|
|
5093
|
-
throw
|
|
5092
|
+
var T = new Error("Unknown message digest algorithm.");
|
|
5093
|
+
throw T.algorithm = i.algorithm, T;
|
|
5094
5094
|
}
|
|
5095
5095
|
var V = p.oidToDer(n).getBytes(), O = p.create(
|
|
5096
5096
|
p.Class.UNIVERSAL,
|
|
@@ -5121,8 +5121,8 @@ function er() {
|
|
|
5121
5121
|
i.digest().getBytes()
|
|
5122
5122
|
);
|
|
5123
5123
|
return O.value.push(D), O.value.push(M), p.toDer(O).getBytes();
|
|
5124
|
-
}, u = function(i, n,
|
|
5125
|
-
if (
|
|
5124
|
+
}, u = function(i, n, T) {
|
|
5125
|
+
if (T)
|
|
5126
5126
|
return i.modPow(n.e, n.n);
|
|
5127
5127
|
if (!n.p || !n.q)
|
|
5128
5128
|
return i.modPow(n.d, n.n);
|
|
@@ -5140,13 +5140,13 @@ function er() {
|
|
|
5140
5140
|
var M = O.subtract(D).multiply(n.qInv).mod(n.p).multiply(n.q).add(D);
|
|
5141
5141
|
return M = M.multiply(V.modInverse(n.n)).mod(n.n), M;
|
|
5142
5142
|
};
|
|
5143
|
-
S.rsa.encrypt = function(i, n,
|
|
5144
|
-
var V =
|
|
5145
|
-
|
|
5143
|
+
S.rsa.encrypt = function(i, n, T) {
|
|
5144
|
+
var V = T, O, D = Math.ceil(n.n.bitLength() / 8);
|
|
5145
|
+
T !== !1 && T !== !0 ? (V = T === 2, O = y(i, n, T)) : (O = t.util.createBuffer(), O.putBytes(i));
|
|
5146
5146
|
for (var M = new e(O.toHex(), 16), x = u(M, n, V), G = x.toString(16), z = t.util.createBuffer(), Y = D - Math.ceil(G.length / 2); Y > 0; )
|
|
5147
5147
|
z.putByte(0), --Y;
|
|
5148
5148
|
return z.putBytes(t.util.hexToBytes(G)), z.getBytes();
|
|
5149
|
-
}, S.rsa.decrypt = function(i, n,
|
|
5149
|
+
}, S.rsa.decrypt = function(i, n, T, V) {
|
|
5150
5150
|
var O = Math.ceil(n.n.bitLength() / 8);
|
|
5151
5151
|
if (i.length !== O) {
|
|
5152
5152
|
var D = new Error("Encrypted message length is invalid.");
|
|
@@ -5155,18 +5155,18 @@ function er() {
|
|
|
5155
5155
|
var M = new e(t.util.createBuffer(i).toHex(), 16);
|
|
5156
5156
|
if (M.compareTo(n.n) >= 0)
|
|
5157
5157
|
throw new Error("Encrypted message is invalid.");
|
|
5158
|
-
for (var x = u(M, n,
|
|
5158
|
+
for (var x = u(M, n, T), G = x.toString(16), z = t.util.createBuffer(), Y = O - Math.ceil(G.length / 2); Y > 0; )
|
|
5159
5159
|
z.putByte(0), --Y;
|
|
5160
|
-
return z.putBytes(t.util.hexToBytes(G)), V !== !1 ? C(z.getBytes(), n,
|
|
5161
|
-
}, S.rsa.createKeyPairGenerationState = function(i, n,
|
|
5162
|
-
typeof i == "string" && (i = parseInt(i, 10)), i = i || 2048,
|
|
5163
|
-
var V =
|
|
5160
|
+
return z.putBytes(t.util.hexToBytes(G)), V !== !1 ? C(z.getBytes(), n, T) : z.getBytes();
|
|
5161
|
+
}, S.rsa.createKeyPairGenerationState = function(i, n, T) {
|
|
5162
|
+
typeof i == "string" && (i = parseInt(i, 10)), i = i || 2048, T = T || {};
|
|
5163
|
+
var V = T.prng || t.random, O = {
|
|
5164
5164
|
// x is an array to fill with bytes
|
|
5165
5165
|
nextBytes: function(x) {
|
|
5166
5166
|
for (var G = V.getBytesSync(x.length), z = 0; z < x.length; ++z)
|
|
5167
5167
|
x[z] = G.charCodeAt(z);
|
|
5168
5168
|
}
|
|
5169
|
-
}, D =
|
|
5169
|
+
}, D = T.algorithm || "PRIMEINC", M;
|
|
5170
5170
|
if (D === "PRIMEINC")
|
|
5171
5171
|
M = {
|
|
5172
5172
|
algorithm: D,
|
|
@@ -5188,8 +5188,8 @@ function er() {
|
|
|
5188
5188
|
return M;
|
|
5189
5189
|
}, S.rsa.stepKeyPairGenerationState = function(i, n) {
|
|
5190
5190
|
"algorithm" in i || (i.algorithm = "PRIMEINC");
|
|
5191
|
-
var
|
|
5192
|
-
|
|
5191
|
+
var T = new e(null);
|
|
5192
|
+
T.fromInt(30);
|
|
5193
5193
|
for (var V = 0, O = function(Z, te) {
|
|
5194
5194
|
return Z | te;
|
|
5195
5195
|
}, D = +/* @__PURE__ */ new Date(), M, x = 0; i.keys === null && (n <= 0 || x < n); ) {
|
|
@@ -5199,7 +5199,7 @@ function er() {
|
|
|
5199
5199
|
e.ONE.shiftLeft(z),
|
|
5200
5200
|
O,
|
|
5201
5201
|
i.num
|
|
5202
|
-
), i.num.dAddOffset(31 - i.num.mod(
|
|
5202
|
+
), i.num.dAddOffset(31 - i.num.mod(T).byteValue(), 0), V = 0, ++i.pqState) : i.pqState === 1 ? i.num.bitLength() > G ? i.pqState = 0 : i.num.isProbablePrime(
|
|
5203
5203
|
h(i.num.bitLength())
|
|
5204
5204
|
) ? ++i.pqState : i.num.dAddOffset(f[V++ % 8], 0) : i.pqState === 2 ? i.pqState = i.num.subtract(e.ONE).gcd(i.e).compareTo(e.ONE) === 0 ? 3 : 0 : i.pqState === 3 && (i.pqState = 0, i.p === null ? i.p = i.num : i.q = i.num, i.p !== null && i.q !== null && ++i.state, i.num = null);
|
|
5205
5205
|
} else if (i.state === 1)
|
|
@@ -5229,8 +5229,8 @@ function er() {
|
|
|
5229
5229
|
M = +/* @__PURE__ */ new Date(), x += M - D, D = M;
|
|
5230
5230
|
}
|
|
5231
5231
|
return i.keys !== null;
|
|
5232
|
-
}, S.rsa.generateKeyPair = function(i, n,
|
|
5233
|
-
if (arguments.length === 1 ? typeof i == "object" ? (
|
|
5232
|
+
}, S.rsa.generateKeyPair = function(i, n, T, V) {
|
|
5233
|
+
if (arguments.length === 1 ? typeof i == "object" ? (T = i, i = void 0) : typeof i == "function" && (V = i, i = void 0) : arguments.length === 2 ? typeof i == "number" ? typeof n == "function" ? (V = n, n = void 0) : typeof n != "number" && (T = n, n = void 0) : (T = i, V = n, i = void 0, n = void 0) : arguments.length === 3 && (typeof n == "number" ? typeof T == "function" && (V = T, T = void 0) : (V = T, T = n, n = void 0)), T = T || {}, i === void 0 && (i = T.bits || 2048), n === void 0 && (n = T.e || 65537), !t.options.usePureJavaScript && !T.prng && i >= 256 && i <= 16384 && (n === 65537 || n === 3)) {
|
|
5234
5234
|
if (V) {
|
|
5235
5235
|
if (v("generateKeyPair"))
|
|
5236
5236
|
return a.generateKeyPair("rsa", {
|
|
@@ -5323,16 +5323,16 @@ function er() {
|
|
|
5323
5323
|
};
|
|
5324
5324
|
}
|
|
5325
5325
|
}
|
|
5326
|
-
var M = S.rsa.createKeyPairGenerationState(i, n,
|
|
5326
|
+
var M = S.rsa.createKeyPairGenerationState(i, n, T);
|
|
5327
5327
|
if (!V)
|
|
5328
5328
|
return S.rsa.stepKeyPairGenerationState(M, 0), M.keys;
|
|
5329
|
-
m(M,
|
|
5329
|
+
m(M, T, V);
|
|
5330
5330
|
}, S.setRsaPublicKey = S.rsa.setPublicKey = function(i, n) {
|
|
5331
|
-
var
|
|
5331
|
+
var T = {
|
|
5332
5332
|
n: i,
|
|
5333
5333
|
e: n
|
|
5334
5334
|
};
|
|
5335
|
-
return
|
|
5335
|
+
return T.encrypt = function(V, O, D) {
|
|
5336
5336
|
if (typeof O == "string" ? O = O.toUpperCase() : O === void 0 && (O = "RSAES-PKCS1-V1_5"), O === "RSAES-PKCS1-V1_5")
|
|
5337
5337
|
O = {
|
|
5338
5338
|
encode: function(x, G, z) {
|
|
@@ -5351,14 +5351,14 @@ function er() {
|
|
|
5351
5351
|
} };
|
|
5352
5352
|
else if (typeof O == "string")
|
|
5353
5353
|
throw new Error('Unsupported encryption scheme: "' + O + '".');
|
|
5354
|
-
var M = O.encode(V,
|
|
5355
|
-
return S.rsa.encrypt(M,
|
|
5356
|
-
},
|
|
5354
|
+
var M = O.encode(V, T, !0);
|
|
5355
|
+
return S.rsa.encrypt(M, T, !0);
|
|
5356
|
+
}, T.verify = function(V, O, D, M) {
|
|
5357
5357
|
typeof D == "string" ? D = D.toUpperCase() : D === void 0 && (D = "RSASSA-PKCS1-V1_5"), M === void 0 && (M = {
|
|
5358
5358
|
_parseAllDigestBytes: !0
|
|
5359
5359
|
}), "_parseAllDigestBytes" in M || (M._parseAllDigestBytes = !0), D === "RSASSA-PKCS1-V1_5" ? D = {
|
|
5360
5360
|
verify: function(G, z) {
|
|
5361
|
-
z = C(z,
|
|
5361
|
+
z = C(z, T, !0);
|
|
5362
5362
|
var Y = p.fromDer(z, {
|
|
5363
5363
|
parseAllBytes: M._parseAllDigestBytes
|
|
5364
5364
|
}), Z = {}, te = [];
|
|
@@ -5383,17 +5383,17 @@ function er() {
|
|
|
5383
5383
|
}
|
|
5384
5384
|
} : (D === "NONE" || D === "NULL" || D === null) && (D = {
|
|
5385
5385
|
verify: function(G, z) {
|
|
5386
|
-
return z = C(z,
|
|
5386
|
+
return z = C(z, T, !0), G === z;
|
|
5387
5387
|
}
|
|
5388
5388
|
});
|
|
5389
|
-
var x = S.rsa.decrypt(O,
|
|
5390
|
-
return D.verify(V, x,
|
|
5391
|
-
},
|
|
5392
|
-
}, S.setRsaPrivateKey = S.rsa.setPrivateKey = function(i, n,
|
|
5389
|
+
var x = S.rsa.decrypt(O, T, !0, !1);
|
|
5390
|
+
return D.verify(V, x, T.n.bitLength());
|
|
5391
|
+
}, T;
|
|
5392
|
+
}, S.setRsaPrivateKey = S.rsa.setPrivateKey = function(i, n, T, V, O, D, M, x) {
|
|
5393
5393
|
var G = {
|
|
5394
5394
|
n: i,
|
|
5395
5395
|
e: n,
|
|
5396
|
-
d:
|
|
5396
|
+
d: T,
|
|
5397
5397
|
p: V,
|
|
5398
5398
|
q: O,
|
|
5399
5399
|
dP: D,
|
|
@@ -5454,10 +5454,10 @@ function er() {
|
|
|
5454
5454
|
)
|
|
5455
5455
|
]);
|
|
5456
5456
|
}, S.privateKeyFromAsn1 = function(i) {
|
|
5457
|
-
var n = {},
|
|
5458
|
-
if (p.validate(i, r, n,
|
|
5457
|
+
var n = {}, T = [];
|
|
5458
|
+
if (p.validate(i, r, n, T) && (i = p.fromDer(t.util.createBuffer(n.privateKey))), n = {}, T = [], !p.validate(i, g, n, T)) {
|
|
5459
5459
|
var V = new Error("Cannot read private key. ASN.1 object does not contain an RSAPrivateKey.");
|
|
5460
|
-
throw V.errors =
|
|
5460
|
+
throw V.errors = T, V;
|
|
5461
5461
|
}
|
|
5462
5462
|
var O, D, M, x, G, z, Y, Z;
|
|
5463
5463
|
return O = t.util.createBuffer(n.privateKeyModulus).toHex(), D = t.util.createBuffer(n.privateKeyPublicExponent).toHex(), M = t.util.createBuffer(n.privateKeyPrivateExponent).toHex(), x = t.util.createBuffer(n.privateKeyPrime1).toHex(), G = t.util.createBuffer(n.privateKeyPrime2).toHex(), z = t.util.createBuffer(n.privateKeyExponent1).toHex(), Y = t.util.createBuffer(n.privateKeyExponent2).toHex(), Z = t.util.createBuffer(n.privateKeyCoefficient).toHex(), S.setRsaPrivateKey(
|
|
@@ -5537,8 +5537,8 @@ function er() {
|
|
|
5537
5537
|
)
|
|
5538
5538
|
]);
|
|
5539
5539
|
}, S.publicKeyFromAsn1 = function(i) {
|
|
5540
|
-
var n = {},
|
|
5541
|
-
if (p.validate(i, b, n,
|
|
5540
|
+
var n = {}, T = [];
|
|
5541
|
+
if (p.validate(i, b, n, T)) {
|
|
5542
5542
|
var V = p.derToOid(n.publicKeyOid);
|
|
5543
5543
|
if (V !== S.oids.rsaEncryption) {
|
|
5544
5544
|
var O = new Error("Cannot read public key. Unknown OID.");
|
|
@@ -5546,9 +5546,9 @@ function er() {
|
|
|
5546
5546
|
}
|
|
5547
5547
|
i = n.rsaPublicKey;
|
|
5548
5548
|
}
|
|
5549
|
-
if (
|
|
5549
|
+
if (T = [], !p.validate(i, l, n, T)) {
|
|
5550
5550
|
var O = new Error("Cannot read public key. ASN.1 object does not contain an RSAPublicKey.");
|
|
5551
|
-
throw O.errors =
|
|
5551
|
+
throw O.errors = T, O;
|
|
5552
5552
|
}
|
|
5553
5553
|
var D = t.util.createBuffer(n.publicKeyModulus).toHex(), M = t.util.createBuffer(n.publicKeyExponent).toHex();
|
|
5554
5554
|
return S.setRsaPublicKey(
|
|
@@ -5592,16 +5592,16 @@ function er() {
|
|
|
5592
5592
|
)
|
|
5593
5593
|
]);
|
|
5594
5594
|
};
|
|
5595
|
-
function y(i, n,
|
|
5595
|
+
function y(i, n, T) {
|
|
5596
5596
|
var V = t.util.createBuffer(), O = Math.ceil(n.n.bitLength() / 8);
|
|
5597
5597
|
if (i.length > O - 11) {
|
|
5598
5598
|
var D = new Error("Message is too long for PKCS#1 v1.5 padding.");
|
|
5599
5599
|
throw D.length = i.length, D.max = O - 11, D;
|
|
5600
5600
|
}
|
|
5601
|
-
V.putByte(0), V.putByte(
|
|
5601
|
+
V.putByte(0), V.putByte(T);
|
|
5602
5602
|
var M = O - 3 - i.length, x;
|
|
5603
|
-
if (
|
|
5604
|
-
x =
|
|
5603
|
+
if (T === 0 || T === 1) {
|
|
5604
|
+
x = T === 0 ? 0 : 255;
|
|
5605
5605
|
for (var G = 0; G < M; ++G)
|
|
5606
5606
|
V.putByte(x);
|
|
5607
5607
|
} else
|
|
@@ -5612,9 +5612,9 @@ function er() {
|
|
|
5612
5612
|
}
|
|
5613
5613
|
return V.putByte(0), V.putBytes(i), V;
|
|
5614
5614
|
}
|
|
5615
|
-
function C(i, n,
|
|
5615
|
+
function C(i, n, T, V) {
|
|
5616
5616
|
var O = Math.ceil(n.n.bitLength() / 8), D = t.util.createBuffer(i), M = D.getByte(), x = D.getByte();
|
|
5617
|
-
if (M !== 0 ||
|
|
5617
|
+
if (M !== 0 || T && x !== 0 && x !== 1 || !T && x != 2 || T && x === 0 && typeof V > "u")
|
|
5618
5618
|
throw new Error("Encryption block is invalid.");
|
|
5619
5619
|
var G = 0;
|
|
5620
5620
|
if (x === 0) {
|
|
@@ -5643,8 +5643,8 @@ function er() {
|
|
|
5643
5643
|
throw new Error("Encryption block is invalid.");
|
|
5644
5644
|
return D.getBytes();
|
|
5645
5645
|
}
|
|
5646
|
-
function m(i, n,
|
|
5647
|
-
typeof n == "function" && (
|
|
5646
|
+
function m(i, n, T) {
|
|
5647
|
+
typeof n == "function" && (T = n, n = {}), n = n || {};
|
|
5648
5648
|
var V = {
|
|
5649
5649
|
algorithm: {
|
|
5650
5650
|
name: n.algorithm || "PRIMEINC",
|
|
@@ -5659,7 +5659,7 @@ function er() {
|
|
|
5659
5659
|
function O() {
|
|
5660
5660
|
D(i.pBits, function(x, G) {
|
|
5661
5661
|
if (x)
|
|
5662
|
-
return
|
|
5662
|
+
return T(x);
|
|
5663
5663
|
if (i.p = G, i.q !== null)
|
|
5664
5664
|
return M(x, i.q);
|
|
5665
5665
|
D(i.qBits, M);
|
|
@@ -5670,7 +5670,7 @@ function er() {
|
|
|
5670
5670
|
}
|
|
5671
5671
|
function M(x, G) {
|
|
5672
5672
|
if (x)
|
|
5673
|
-
return
|
|
5673
|
+
return T(x);
|
|
5674
5674
|
if (i.q = G, i.p.compareTo(i.q) < 0) {
|
|
5675
5675
|
var z = i.p;
|
|
5676
5676
|
i.p = i.q, i.q = z;
|
|
@@ -5704,16 +5704,16 @@ function er() {
|
|
|
5704
5704
|
i.q.modInverse(i.p)
|
|
5705
5705
|
),
|
|
5706
5706
|
publicKey: S.rsa.setPublicKey(i.n, i.e)
|
|
5707
|
-
},
|
|
5707
|
+
}, T(null, i.keys);
|
|
5708
5708
|
}
|
|
5709
5709
|
}
|
|
5710
5710
|
function s(i) {
|
|
5711
5711
|
var n = i.toString(16);
|
|
5712
5712
|
n[0] >= "8" && (n = "00" + n);
|
|
5713
|
-
var
|
|
5714
|
-
return
|
|
5715
|
-
(
|
|
5716
|
-
|
|
5713
|
+
var T = t.util.hexToBytes(n);
|
|
5714
|
+
return T.length > 1 && // leading 0x00 for positive integer
|
|
5715
|
+
(T.charCodeAt(0) === 0 && (T.charCodeAt(1) & 128) === 0 || // leading 0xFF for negative integer
|
|
5716
|
+
T.charCodeAt(0) === 255 && (T.charCodeAt(1) & 128) === 128) ? T.substr(1) : T;
|
|
5717
5717
|
}
|
|
5718
5718
|
function h(i) {
|
|
5719
5719
|
return i <= 100 ? 27 : i <= 150 ? 18 : i <= 200 ? 15 : i <= 250 ? 12 : i <= 300 ? 9 : i <= 350 ? 8 : i <= 400 ? 7 : i <= 500 ? 6 : i <= 600 ? 5 : i <= 800 ? 4 : i <= 1250 ? 3 : 2;
|
|
@@ -5728,9 +5728,9 @@ function er() {
|
|
|
5728
5728
|
return typeof I.globalScope < "u" && typeof I.globalScope.msCrypto == "object" && typeof I.globalScope.msCrypto.subtle == "object" && typeof I.globalScope.msCrypto.subtle[i] == "function";
|
|
5729
5729
|
}
|
|
5730
5730
|
function c(i) {
|
|
5731
|
-
for (var n = t.util.hexToBytes(i.toString(16)),
|
|
5732
|
-
|
|
5733
|
-
return
|
|
5731
|
+
for (var n = t.util.hexToBytes(i.toString(16)), T = new Uint8Array(n.length), V = 0; V < n.length; ++V)
|
|
5732
|
+
T[V] = n.charCodeAt(V);
|
|
5733
|
+
return T;
|
|
5734
5734
|
}
|
|
5735
5735
|
return Br;
|
|
5736
5736
|
}
|
|
@@ -5890,9 +5890,9 @@ function sn() {
|
|
|
5890
5890
|
var n = new Error("Cannot encrypt private key. Unknown encryption algorithm.");
|
|
5891
5891
|
throw n.algorithm = y.algorithm, n;
|
|
5892
5892
|
}
|
|
5893
|
-
var
|
|
5893
|
+
var T = "hmacWith" + y.prfAlgorithm.toUpperCase(), V = b(T), O = t.pkcs5.pbkdf2(u, C, m, h, V), D = t.random.getBytesSync(R), M = i(O);
|
|
5894
5894
|
M.start(D), M.update(a.toDer(E)), M.finish(), B = M.output.getBytes();
|
|
5895
|
-
var x = U(C, s, h,
|
|
5895
|
+
var x = U(C, s, h, T);
|
|
5896
5896
|
v = a.create(
|
|
5897
5897
|
a.Class.UNIVERSAL,
|
|
5898
5898
|
a.Type.SEQUENCE,
|
|
@@ -6107,11 +6107,11 @@ function sn() {
|
|
|
6107
6107
|
i.putInt16(E.charCodeAt(v));
|
|
6108
6108
|
i.putInt16(0);
|
|
6109
6109
|
}
|
|
6110
|
-
var n = i.length(),
|
|
6110
|
+
var n = i.length(), T = u.length(), V = new t.util.ByteBuffer();
|
|
6111
6111
|
V.fillWithByte(y, R);
|
|
6112
|
-
var O = R * Math.ceil(
|
|
6112
|
+
var O = R * Math.ceil(T / R), D = new t.util.ByteBuffer();
|
|
6113
6113
|
for (v = 0; v < O; v++)
|
|
6114
|
-
D.putByte(u.at(v %
|
|
6114
|
+
D.putByte(u.at(v % T));
|
|
6115
6115
|
var M = R * Math.ceil(n / R), x = new t.util.ByteBuffer();
|
|
6116
6116
|
for (v = 0; v < M; v++)
|
|
6117
6117
|
x.putByte(i.at(v % n));
|
|
@@ -6125,7 +6125,7 @@ function sn() {
|
|
|
6125
6125
|
var ue = new t.util.ByteBuffer();
|
|
6126
6126
|
for (v = 0; v < R; v++)
|
|
6127
6127
|
ue.putByte(Z.at(v % B));
|
|
6128
|
-
var he = Math.ceil(
|
|
6128
|
+
var he = Math.ceil(T / R) + Math.ceil(n / R), Ce = new t.util.ByteBuffer();
|
|
6129
6129
|
for (h = 0; h < he; h++) {
|
|
6130
6130
|
var Ie = new t.util.ByteBuffer(G.getBytes(R)), _ = 511;
|
|
6131
6131
|
for (v = ue.length() - 1; v >= 0; v--)
|
|
@@ -6190,8 +6190,8 @@ function sn() {
|
|
|
6190
6190
|
B = 8, R = t.des.createDecryptionCipher;
|
|
6191
6191
|
break;
|
|
6192
6192
|
}
|
|
6193
|
-
var c = l(C.prfOid), i = t.pkcs5.pbkdf2(y, h, v, B, c), n = C.encIv,
|
|
6194
|
-
return
|
|
6193
|
+
var c = l(C.prfOid), i = t.pkcs5.pbkdf2(y, h, v, B, c), n = C.encIv, T = R(i);
|
|
6194
|
+
return T.start(n), T;
|
|
6195
6195
|
}, p.pbe.getCipherForPKCS12PBE = function(E, u, y) {
|
|
6196
6196
|
var C = {}, m = [];
|
|
6197
6197
|
if (!a.validate(u, r, C, m)) {
|
|
@@ -6217,8 +6217,8 @@ function sn() {
|
|
|
6217
6217
|
}
|
|
6218
6218
|
var i = l(C.prfOid), n = p.pbe.generatePkcs12Key(y, h, 1, v, B, i);
|
|
6219
6219
|
i.start();
|
|
6220
|
-
var
|
|
6221
|
-
return c(n,
|
|
6220
|
+
var T = p.pbe.generatePkcs12Key(y, h, 2, v, R, i);
|
|
6221
|
+
return c(n, T);
|
|
6222
6222
|
}, p.pbe.opensslDeriveBytes = function(E, u, y, C) {
|
|
6223
6223
|
if (typeof C > "u" || C === null) {
|
|
6224
6224
|
if (!("md5" in t.md))
|
|
@@ -6705,8 +6705,8 @@ function Wr() {
|
|
|
6705
6705
|
throw new Error("Inconsistent PSS signature, 0x01 marker not found");
|
|
6706
6706
|
var i = R.substr(-r), n = new t.util.ByteBuffer();
|
|
6707
6707
|
n.fillWithByte(0, 8), n.putBytes(b), n.putBytes(i), p.start(), p.update(n.getBytes());
|
|
6708
|
-
var
|
|
6709
|
-
return h ===
|
|
6708
|
+
var T = p.digest().getBytes();
|
|
6709
|
+
return h === T;
|
|
6710
6710
|
}, l;
|
|
6711
6711
|
}, Ur.exports;
|
|
6712
6712
|
}
|
|
@@ -7069,15 +7069,15 @@ function Xr() {
|
|
|
7069
7069
|
]
|
|
7070
7070
|
};
|
|
7071
7071
|
a.RDNAttributesAsArray = function(c, i) {
|
|
7072
|
-
for (var n = [],
|
|
7073
|
-
|
|
7074
|
-
for (var M = 0; M <
|
|
7075
|
-
O = {}, V =
|
|
7072
|
+
for (var n = [], T, V, O, D = 0; D < c.value.length; ++D) {
|
|
7073
|
+
T = c.value[D];
|
|
7074
|
+
for (var M = 0; M < T.value.length; ++M)
|
|
7075
|
+
O = {}, V = T.value[M], O.type = e.derToOid(V.value[0].value), O.value = V.value[1].value, O.valueTagClass = V.value[1].type, O.type in p && (O.name = p[O.type], O.name in I && (O.shortName = I[O.name])), i && (i.update(O.type), i.update(O.value)), n.push(O);
|
|
7076
7076
|
}
|
|
7077
7077
|
return n;
|
|
7078
7078
|
}, a.CRIAttributesAsArray = function(c) {
|
|
7079
7079
|
for (var i = [], n = 0; n < c.length; ++n)
|
|
7080
|
-
for (var
|
|
7080
|
+
for (var T = c[n], V = e.derToOid(T.value[0].value), O = T.value[1].value, D = 0; D < O.length; ++D) {
|
|
7081
7081
|
var M = {};
|
|
7082
7082
|
if (M.type = V, M.value = O[D].value, M.valueTagClass = O[D].type, M.type in p && (M.name = p[M.type], M.name in I && (M.shortName = I[M.name])), M.type === p.extensionRequest) {
|
|
7083
7083
|
M.extensions = [];
|
|
@@ -7090,15 +7090,15 @@ function Xr() {
|
|
|
7090
7090
|
};
|
|
7091
7091
|
function b(c, i) {
|
|
7092
7092
|
typeof i == "string" && (i = { shortName: i });
|
|
7093
|
-
for (var n = null,
|
|
7094
|
-
|
|
7093
|
+
for (var n = null, T, V = 0; n === null && V < c.attributes.length; ++V)
|
|
7094
|
+
T = c.attributes[V], (i.type && i.type === T.type || i.name && i.name === T.name || i.shortName && i.shortName === T.shortName) && (n = T);
|
|
7095
7095
|
return n;
|
|
7096
7096
|
}
|
|
7097
7097
|
var U = function(c, i, n) {
|
|
7098
|
-
var
|
|
7098
|
+
var T = {};
|
|
7099
7099
|
if (c !== p["RSASSA-PSS"])
|
|
7100
|
-
return
|
|
7101
|
-
n && (
|
|
7100
|
+
return T;
|
|
7101
|
+
n && (T = {
|
|
7102
7102
|
hash: {
|
|
7103
7103
|
algorithmOid: p.sha1
|
|
7104
7104
|
},
|
|
@@ -7115,7 +7115,7 @@ function Xr() {
|
|
|
7115
7115
|
var D = new Error("Cannot read RSASSA-PSS parameter block.");
|
|
7116
7116
|
throw D.errors = O, D;
|
|
7117
7117
|
}
|
|
7118
|
-
return V.hashOid !== void 0 && (
|
|
7118
|
+
return V.hashOid !== void 0 && (T.hash = T.hash || {}, T.hash.algorithmOid = e.derToOid(V.hashOid)), V.maskGenOid !== void 0 && (T.mgf = T.mgf || {}, T.mgf.algorithmOid = e.derToOid(V.maskGenOid), T.mgf.hash = T.mgf.hash || {}, T.mgf.hash.algorithmOid = e.derToOid(V.maskGenHashOid)), V.saltLength !== void 0 && (T.saltLength = V.saltLength.charCodeAt(0)), T;
|
|
7119
7119
|
}, E = function(c) {
|
|
7120
7120
|
switch (p[c.signatureOid]) {
|
|
7121
7121
|
case "sha1WithRSAEncryption":
|
|
@@ -7146,21 +7146,21 @@ function Xr() {
|
|
|
7146
7146
|
case p.sha1WithRSASignature:
|
|
7147
7147
|
break;
|
|
7148
7148
|
case p["RSASSA-PSS"]:
|
|
7149
|
-
var
|
|
7150
|
-
if (
|
|
7149
|
+
var T, V;
|
|
7150
|
+
if (T = p[i.signatureParameters.mgf.hash.algorithmOid], T === void 0 || t.md[T] === void 0) {
|
|
7151
7151
|
var O = new Error("Unsupported MGF hash function.");
|
|
7152
|
-
throw O.oid = i.signatureParameters.mgf.hash.algorithmOid, O.name =
|
|
7152
|
+
throw O.oid = i.signatureParameters.mgf.hash.algorithmOid, O.name = T, O;
|
|
7153
7153
|
}
|
|
7154
7154
|
if (V = p[i.signatureParameters.mgf.algorithmOid], V === void 0 || t.mgf[V] === void 0) {
|
|
7155
7155
|
var O = new Error("Unsupported MGF function.");
|
|
7156
7156
|
throw O.oid = i.signatureParameters.mgf.algorithmOid, O.name = V, O;
|
|
7157
7157
|
}
|
|
7158
|
-
if (V = t.mgf[V].create(t.md[
|
|
7158
|
+
if (V = t.mgf[V].create(t.md[T].create()), T = p[i.signatureParameters.hash.algorithmOid], T === void 0 || t.md[T] === void 0) {
|
|
7159
7159
|
var O = new Error("Unsupported RSASSA-PSS hash function.");
|
|
7160
|
-
throw O.oid = i.signatureParameters.hash.algorithmOid, O.name =
|
|
7160
|
+
throw O.oid = i.signatureParameters.hash.algorithmOid, O.name = T, O;
|
|
7161
7161
|
}
|
|
7162
7162
|
n = t.pss.create(
|
|
7163
|
-
t.md[
|
|
7163
|
+
t.md[T].create(),
|
|
7164
7164
|
V,
|
|
7165
7165
|
i.signatureParameters.saltLength
|
|
7166
7166
|
);
|
|
@@ -7173,18 +7173,18 @@ function Xr() {
|
|
|
7173
7173
|
);
|
|
7174
7174
|
};
|
|
7175
7175
|
a.certificateFromPem = function(c, i, n) {
|
|
7176
|
-
var
|
|
7177
|
-
if (
|
|
7176
|
+
var T = t.pem.decode(c)[0];
|
|
7177
|
+
if (T.type !== "CERTIFICATE" && T.type !== "X509 CERTIFICATE" && T.type !== "TRUSTED CERTIFICATE") {
|
|
7178
7178
|
var V = new Error(
|
|
7179
7179
|
'Could not convert certificate from PEM; PEM header type is not "CERTIFICATE", "X509 CERTIFICATE", or "TRUSTED CERTIFICATE".'
|
|
7180
7180
|
);
|
|
7181
|
-
throw V.headerType =
|
|
7181
|
+
throw V.headerType = T.type, V;
|
|
7182
7182
|
}
|
|
7183
|
-
if (
|
|
7183
|
+
if (T.procType && T.procType.type === "ENCRYPTED")
|
|
7184
7184
|
throw new Error(
|
|
7185
7185
|
"Could not convert certificate from PEM; PEM is encrypted."
|
|
7186
7186
|
);
|
|
7187
|
-
var O = e.fromDer(
|
|
7187
|
+
var O = e.fromDer(T.body, n);
|
|
7188
7188
|
return a.certificateFromAsn1(O, i);
|
|
7189
7189
|
}, a.certificateToPem = function(c, i) {
|
|
7190
7190
|
var n = {
|
|
@@ -7200,8 +7200,8 @@ function Xr() {
|
|
|
7200
7200
|
}
|
|
7201
7201
|
if (i.procType && i.procType.type === "ENCRYPTED")
|
|
7202
7202
|
throw new Error("Could not convert public key from PEM; PEM is encrypted.");
|
|
7203
|
-
var
|
|
7204
|
-
return a.publicKeyFromAsn1(
|
|
7203
|
+
var T = e.fromDer(i.body);
|
|
7204
|
+
return a.publicKeyFromAsn1(T);
|
|
7205
7205
|
}, a.publicKeyToPem = function(c, i) {
|
|
7206
7206
|
var n = {
|
|
7207
7207
|
type: "PUBLIC KEY",
|
|
@@ -7216,8 +7216,8 @@ function Xr() {
|
|
|
7216
7216
|
return t.pem.encode(n, { maxline: i });
|
|
7217
7217
|
}, a.getPublicKeyFingerprint = function(c, i) {
|
|
7218
7218
|
i = i || {};
|
|
7219
|
-
var n = i.md || t.md.sha1.create(),
|
|
7220
|
-
switch (
|
|
7219
|
+
var n = i.md || t.md.sha1.create(), T = i.type || "RSAPublicKey", V;
|
|
7220
|
+
switch (T) {
|
|
7221
7221
|
case "RSAPublicKey":
|
|
7222
7222
|
V = e.toDer(a.publicKeyToRSAPublicKey(c)).getBytes();
|
|
7223
7223
|
break;
|
|
@@ -7240,14 +7240,14 @@ function Xr() {
|
|
|
7240
7240
|
}
|
|
7241
7241
|
return O;
|
|
7242
7242
|
}, a.certificationRequestFromPem = function(c, i, n) {
|
|
7243
|
-
var
|
|
7244
|
-
if (
|
|
7243
|
+
var T = t.pem.decode(c)[0];
|
|
7244
|
+
if (T.type !== "CERTIFICATE REQUEST") {
|
|
7245
7245
|
var V = new Error('Could not convert certification request from PEM; PEM header type is not "CERTIFICATE REQUEST".');
|
|
7246
|
-
throw V.headerType =
|
|
7246
|
+
throw V.headerType = T.type, V;
|
|
7247
7247
|
}
|
|
7248
|
-
if (
|
|
7248
|
+
if (T.procType && T.procType.type === "ENCRYPTED")
|
|
7249
7249
|
throw new Error("Could not convert certification request from PEM; PEM is encrypted.");
|
|
7250
|
-
var O = e.fromDer(
|
|
7250
|
+
var O = e.fromDer(T.body, n);
|
|
7251
7251
|
return a.certificationRequestFromAsn1(O, i);
|
|
7252
7252
|
}, a.certificationRequestToPem = function(c, i) {
|
|
7253
7253
|
var n = {
|
|
@@ -7275,26 +7275,26 @@ function Xr() {
|
|
|
7275
7275
|
c.extensions = i;
|
|
7276
7276
|
}, c.getExtension = function(i) {
|
|
7277
7277
|
typeof i == "string" && (i = { name: i });
|
|
7278
|
-
for (var n = null,
|
|
7279
|
-
|
|
7278
|
+
for (var n = null, T, V = 0; n === null && V < c.extensions.length; ++V)
|
|
7279
|
+
T = c.extensions[V], (i.id && T.id === i.id || i.name && T.name === i.name) && (n = T);
|
|
7280
7280
|
return n;
|
|
7281
7281
|
}, c.sign = function(i, n) {
|
|
7282
7282
|
c.md = n || t.md.sha1.create();
|
|
7283
|
-
var
|
|
7284
|
-
if (!
|
|
7283
|
+
var T = p[c.md.algorithm + "WithRSAEncryption"];
|
|
7284
|
+
if (!T) {
|
|
7285
7285
|
var V = new Error("Could not compute certificate digest. Unknown message digest algorithm OID.");
|
|
7286
7286
|
throw V.algorithm = c.md.algorithm, V;
|
|
7287
7287
|
}
|
|
7288
|
-
c.signatureOid = c.siginfo.algorithmOid =
|
|
7288
|
+
c.signatureOid = c.siginfo.algorithmOid = T, c.tbsCertificate = a.getTBSCertificate(c);
|
|
7289
7289
|
var O = e.toDer(c.tbsCertificate);
|
|
7290
7290
|
c.md.update(O.getBytes()), c.signature = i.sign(c.md);
|
|
7291
7291
|
}, c.verify = function(i) {
|
|
7292
7292
|
var n = !1;
|
|
7293
7293
|
if (!c.issued(i)) {
|
|
7294
|
-
var
|
|
7294
|
+
var T = i.issuer, V = c.subject, O = new Error(
|
|
7295
7295
|
"The parent certificate did not issue the given child certificate; the child certificate's issuer does not match the parent's subject."
|
|
7296
7296
|
);
|
|
7297
|
-
throw O.expectedIssuer = V.attributes, O.actualIssuer =
|
|
7297
|
+
throw O.expectedIssuer = V.attributes, O.actualIssuer = T.attributes, O;
|
|
7298
7298
|
}
|
|
7299
7299
|
var D = i.md;
|
|
7300
7300
|
if (D === null) {
|
|
@@ -7311,13 +7311,13 @@ function Xr() {
|
|
|
7311
7311
|
signature: i.signature
|
|
7312
7312
|
})), n;
|
|
7313
7313
|
}, c.isIssuer = function(i) {
|
|
7314
|
-
var n = !1,
|
|
7315
|
-
if (
|
|
7316
|
-
n =
|
|
7317
|
-
else if (
|
|
7314
|
+
var n = !1, T = c.issuer, V = i.subject;
|
|
7315
|
+
if (T.hash && V.hash)
|
|
7316
|
+
n = T.hash === V.hash;
|
|
7317
|
+
else if (T.attributes.length === V.attributes.length) {
|
|
7318
7318
|
n = !0;
|
|
7319
|
-
for (var O, D, M = 0; n && M <
|
|
7320
|
-
O =
|
|
7319
|
+
for (var O, D, M = 0; n && M < T.attributes.length; ++M)
|
|
7320
|
+
O = T.attributes[M], D = V.attributes[M], (O.type !== D.type || O.value !== D.value) && (n = !1);
|
|
7321
7321
|
}
|
|
7322
7322
|
return n;
|
|
7323
7323
|
}, c.issued = function(i) {
|
|
@@ -7326,19 +7326,19 @@ function Xr() {
|
|
|
7326
7326
|
return a.getPublicKeyFingerprint(c.publicKey, { type: "RSAPublicKey" });
|
|
7327
7327
|
}, c.verifySubjectKeyIdentifier = function() {
|
|
7328
7328
|
for (var i = p.subjectKeyIdentifier, n = 0; n < c.extensions.length; ++n) {
|
|
7329
|
-
var
|
|
7330
|
-
if (
|
|
7329
|
+
var T = c.extensions[n];
|
|
7330
|
+
if (T.id === i) {
|
|
7331
7331
|
var V = c.generateSubjectKeyIdentifier().getBytes();
|
|
7332
|
-
return t.util.hexToBytes(
|
|
7332
|
+
return t.util.hexToBytes(T.subjectKeyIdentifier) === V;
|
|
7333
7333
|
}
|
|
7334
7334
|
}
|
|
7335
7335
|
return !1;
|
|
7336
7336
|
}, c;
|
|
7337
7337
|
}, a.certificateFromAsn1 = function(c, i) {
|
|
7338
|
-
var n = {},
|
|
7339
|
-
if (!e.validate(c, f, n,
|
|
7338
|
+
var n = {}, T = [];
|
|
7339
|
+
if (!e.validate(c, f, n, T)) {
|
|
7340
7340
|
var V = new Error("Cannot read X.509 certificate. ASN.1 object is not an X509v3 Certificate.");
|
|
7341
|
-
throw V.errors =
|
|
7341
|
+
throw V.errors = T, V;
|
|
7342
7342
|
}
|
|
7343
7343
|
var O = e.derToOid(n.publicKeyOid);
|
|
7344
7344
|
if (O !== a.oids.rsaEncryption)
|
|
@@ -7386,15 +7386,15 @@ function Xr() {
|
|
|
7386
7386
|
}, D.subject.attributes = a.RDNAttributesAsArray(n.certSubject), n.certSubjectUniqueId && (D.subject.uniqueId = n.certSubjectUniqueId), D.subject.hash = Z.digest().toHex(), n.certExtensions ? D.extensions = a.certificateExtensionsFromAsn1(n.certExtensions) : D.extensions = [], D.publicKey = a.publicKeyFromAsn1(n.subjectPublicKeyInfo), D;
|
|
7387
7387
|
}, a.certificateExtensionsFromAsn1 = function(c) {
|
|
7388
7388
|
for (var i = [], n = 0; n < c.value.length; ++n)
|
|
7389
|
-
for (var
|
|
7390
|
-
i.push(a.certificateExtensionFromAsn1(
|
|
7389
|
+
for (var T = c.value[n], V = 0; V < T.value.length; ++V)
|
|
7390
|
+
i.push(a.certificateExtensionFromAsn1(T.value[V]));
|
|
7391
7391
|
return i;
|
|
7392
7392
|
}, a.certificateExtensionFromAsn1 = function(c) {
|
|
7393
7393
|
var i = {};
|
|
7394
7394
|
if (i.id = e.derToOid(c.value[0].value), i.critical = !1, c.value[1].type === e.Type.BOOLEAN ? (i.critical = c.value[1].value.charCodeAt(0) !== 0, i.value = c.value[2].value) : i.value = c.value[1].value, i.id in p) {
|
|
7395
7395
|
if (i.name = p[i.id], i.name === "keyUsage") {
|
|
7396
|
-
var n = e.fromDer(i.value),
|
|
7397
|
-
n.value.length > 1 && (
|
|
7396
|
+
var n = e.fromDer(i.value), T = 0, V = 0;
|
|
7397
|
+
n.value.length > 1 && (T = n.value.charCodeAt(1), V = n.value.length > 2 ? n.value.charCodeAt(2) : 0), i.digitalSignature = (T & 128) === 128, i.nonRepudiation = (T & 64) === 64, i.keyEncipherment = (T & 32) === 32, i.dataEncipherment = (T & 16) === 16, i.keyAgreement = (T & 8) === 8, i.keyCertSign = (T & 4) === 4, i.cRLSign = (T & 2) === 2, i.encipherOnly = (T & 1) === 1, i.decipherOnly = (V & 128) === 128;
|
|
7398
7398
|
} else if (i.name === "basicConstraints") {
|
|
7399
7399
|
var n = e.fromDer(i.value);
|
|
7400
7400
|
n.value.length > 0 && n.value[0].type === e.Type.BOOLEAN ? i.cA = n.value[0].value.charCodeAt(0) !== 0 : i.cA = !1;
|
|
@@ -7406,8 +7406,8 @@ function Xr() {
|
|
|
7406
7406
|
M in p ? i[p[M]] = !0 : i[M] = !0;
|
|
7407
7407
|
}
|
|
7408
7408
|
else if (i.name === "nsCertType") {
|
|
7409
|
-
var n = e.fromDer(i.value),
|
|
7410
|
-
n.value.length > 1 && (
|
|
7409
|
+
var n = e.fromDer(i.value), T = 0;
|
|
7410
|
+
n.value.length > 1 && (T = n.value.charCodeAt(1)), i.client = (T & 128) === 128, i.server = (T & 64) === 64, i.email = (T & 32) === 32, i.objsign = (T & 16) === 16, i.reserved = (T & 8) === 8, i.sslCA = (T & 4) === 4, i.emailCA = (T & 2) === 2, i.objCA = (T & 1) === 1;
|
|
7411
7411
|
} else if (i.name === "subjectAltName" || i.name === "issuerAltName") {
|
|
7412
7412
|
i.altNames = [];
|
|
7413
7413
|
for (var x, n = e.fromDer(i.value), G = 0; G < n.value.length; ++G) {
|
|
@@ -7441,10 +7441,10 @@ function Xr() {
|
|
|
7441
7441
|
}
|
|
7442
7442
|
return i;
|
|
7443
7443
|
}, a.certificationRequestFromAsn1 = function(c, i) {
|
|
7444
|
-
var n = {},
|
|
7445
|
-
if (!e.validate(c, l, n,
|
|
7444
|
+
var n = {}, T = [];
|
|
7445
|
+
if (!e.validate(c, l, n, T)) {
|
|
7446
7446
|
var V = new Error("Cannot read PKCS#10 certificate request. ASN.1 object is not a PKCS#10 CertificationRequest.");
|
|
7447
|
-
throw V.errors =
|
|
7447
|
+
throw V.errors = T, V;
|
|
7448
7448
|
}
|
|
7449
7449
|
var O = e.derToOid(n.publicKeyOid);
|
|
7450
7450
|
if (O !== a.oids.rsaEncryption)
|
|
@@ -7497,12 +7497,12 @@ function Xr() {
|
|
|
7497
7497
|
C(i), c.attributes = i;
|
|
7498
7498
|
}, c.sign = function(i, n) {
|
|
7499
7499
|
c.md = n || t.md.sha1.create();
|
|
7500
|
-
var
|
|
7501
|
-
if (!
|
|
7500
|
+
var T = p[c.md.algorithm + "WithRSAEncryption"];
|
|
7501
|
+
if (!T) {
|
|
7502
7502
|
var V = new Error("Could not compute certification request digest. Unknown message digest algorithm OID.");
|
|
7503
7503
|
throw V.algorithm = c.md.algorithm, V;
|
|
7504
7504
|
}
|
|
7505
|
-
c.signatureOid = c.siginfo.algorithmOid =
|
|
7505
|
+
c.signatureOid = c.siginfo.algorithmOid = T, c.certificationRequestInfo = a.getCertificationRequestInfo(c);
|
|
7506
7506
|
var O = e.toDer(c.certificationRequestInfo);
|
|
7507
7507
|
c.md.update(O.getBytes()), c.signature = i.sign(c.md);
|
|
7508
7508
|
}, c.verify = function() {
|
|
@@ -7512,7 +7512,7 @@ function Xr() {
|
|
|
7512
7512
|
signatureOid: c.signatureOid,
|
|
7513
7513
|
type: "certification request"
|
|
7514
7514
|
});
|
|
7515
|
-
var
|
|
7515
|
+
var T = c.certificationRequestInfo || a.getCertificationRequestInfo(c), V = e.toDer(T);
|
|
7516
7516
|
n.update(V.getBytes());
|
|
7517
7517
|
}
|
|
7518
7518
|
return n !== null && (i = u({
|
|
@@ -7528,10 +7528,10 @@ function Xr() {
|
|
|
7528
7528
|
e.Type.SEQUENCE,
|
|
7529
7529
|
!0,
|
|
7530
7530
|
[]
|
|
7531
|
-
), n,
|
|
7531
|
+
), n, T, V = c.attributes, O = 0; O < V.length; ++O) {
|
|
7532
7532
|
n = V[O];
|
|
7533
7533
|
var D = n.value, M = e.Type.PRINTABLESTRING;
|
|
7534
|
-
"valueTagClass" in n && (M = n.valueTagClass, M === e.Type.UTF8 && (D = t.util.encodeUtf8(D))),
|
|
7534
|
+
"valueTagClass" in n && (M = n.valueTagClass, M === e.Type.UTF8 && (D = t.util.encodeUtf8(D))), T = e.create(e.Class.UNIVERSAL, e.Type.SET, !0, [
|
|
7535
7535
|
e.create(e.Class.UNIVERSAL, e.Type.SEQUENCE, !0, [
|
|
7536
7536
|
// AttributeType
|
|
7537
7537
|
e.create(
|
|
@@ -7543,7 +7543,7 @@ function Xr() {
|
|
|
7543
7543
|
// AttributeValue
|
|
7544
7544
|
e.create(e.Class.UNIVERSAL, M, !1, D)
|
|
7545
7545
|
])
|
|
7546
|
-
]), i.value.push(
|
|
7546
|
+
]), i.value.push(T);
|
|
7547
7547
|
}
|
|
7548
7548
|
return i;
|
|
7549
7549
|
}
|
|
@@ -7553,8 +7553,8 @@ function Xr() {
|
|
|
7553
7553
|
if (i.name && i.name in a.oids)
|
|
7554
7554
|
i.type = a.oids[i.name];
|
|
7555
7555
|
else {
|
|
7556
|
-
var
|
|
7557
|
-
throw
|
|
7556
|
+
var T = new Error("Attribute type not specified.");
|
|
7557
|
+
throw T.attribute = i, T;
|
|
7558
7558
|
}
|
|
7559
7559
|
if (typeof i.shortName > "u" && i.name && i.name in I && (i.shortName = I[i.name]), i.type === p.extensionRequest && (i.valueConstructed = !0, i.valueTagClass = e.Type.SEQUENCE, !i.value && i.extensions)) {
|
|
7560
7560
|
i.value = [];
|
|
@@ -7564,8 +7564,8 @@ function Xr() {
|
|
|
7564
7564
|
));
|
|
7565
7565
|
}
|
|
7566
7566
|
if (typeof i.value > "u") {
|
|
7567
|
-
var
|
|
7568
|
-
throw
|
|
7567
|
+
var T = new Error("Attribute value not specified.");
|
|
7568
|
+
throw T.attribute = i, T;
|
|
7569
7569
|
}
|
|
7570
7570
|
}
|
|
7571
7571
|
}
|
|
@@ -7580,9 +7580,9 @@ function Xr() {
|
|
|
7580
7580
|
if (typeof c.value < "u")
|
|
7581
7581
|
return c;
|
|
7582
7582
|
if (c.name === "keyUsage") {
|
|
7583
|
-
var
|
|
7584
|
-
c.digitalSignature && (V |= 128,
|
|
7585
|
-
var D = String.fromCharCode(
|
|
7583
|
+
var T = 0, V = 0, O = 0;
|
|
7584
|
+
c.digitalSignature && (V |= 128, T = 7), c.nonRepudiation && (V |= 64, T = 6), c.keyEncipherment && (V |= 32, T = 5), c.dataEncipherment && (V |= 16, T = 4), c.keyAgreement && (V |= 8, T = 3), c.keyCertSign && (V |= 4, T = 2), c.cRLSign && (V |= 2, T = 1), c.encipherOnly && (V |= 1, T = 0), c.decipherOnly && (O |= 128, T = 7);
|
|
7585
|
+
var D = String.fromCharCode(T);
|
|
7586
7586
|
O !== 0 ? D += String.fromCharCode(V) + String.fromCharCode(O) : V !== 0 && (D += String.fromCharCode(V)), c.value = e.create(
|
|
7587
7587
|
e.Class.UNIVERSAL,
|
|
7588
7588
|
e.Type.BITSTRING,
|
|
@@ -7627,9 +7627,9 @@ function Xr() {
|
|
|
7627
7627
|
e.oidToDer(x).getBytes()
|
|
7628
7628
|
)));
|
|
7629
7629
|
} else if (c.name === "nsCertType") {
|
|
7630
|
-
var
|
|
7631
|
-
c.client && (V |= 128,
|
|
7632
|
-
var D = String.fromCharCode(
|
|
7630
|
+
var T = 0, V = 0;
|
|
7631
|
+
c.client && (V |= 128, T = 7), c.server && (V |= 64, T = 6), c.email && (V |= 32, T = 5), c.objsign && (V |= 16, T = 4), c.reserved && (V |= 8, T = 3), c.sslCA && (V |= 4, T = 2), c.emailCA && (V |= 2, T = 1), c.objCA && (V |= 1, T = 0);
|
|
7632
|
+
var D = String.fromCharCode(T);
|
|
7633
7633
|
V !== 0 && (D += String.fromCharCode(V)), c.value = e.create(
|
|
7634
7634
|
e.Class.UNIVERSAL,
|
|
7635
7635
|
e.Type.BITSTRING,
|
|
@@ -7789,8 +7789,8 @@ function Xr() {
|
|
|
7789
7789
|
var i = e.create(e.Class.CONTEXT_SPECIFIC, 0, !0, []);
|
|
7790
7790
|
if (c.attributes.length === 0)
|
|
7791
7791
|
return i;
|
|
7792
|
-
for (var n = c.attributes,
|
|
7793
|
-
var V = n[
|
|
7792
|
+
for (var n = c.attributes, T = 0; T < n.length; ++T) {
|
|
7793
|
+
var V = n[T], O = V.value, D = e.Type.UTF8;
|
|
7794
7794
|
"valueTagClass" in V && (D = V.valueTagClass), D === e.Type.UTF8 && (O = t.util.encodeUtf8(O));
|
|
7795
7795
|
var M = !1;
|
|
7796
7796
|
"valueConstructed" in V && (M = V.valueConstructed);
|
|
@@ -7831,7 +7831,7 @@ function Xr() {
|
|
|
7831
7831
|
);
|
|
7832
7832
|
}
|
|
7833
7833
|
return a.getTBSCertificate = function(c) {
|
|
7834
|
-
var i = R(c.validity.notBefore), n = R(c.validity.notAfter),
|
|
7834
|
+
var i = R(c.validity.notBefore), n = R(c.validity.notAfter), T = e.create(e.Class.UNIVERSAL, e.Type.SEQUENCE, !0, [
|
|
7835
7835
|
// version
|
|
7836
7836
|
e.create(e.Class.CONTEXT_SPECIFIC, 0, !0, [
|
|
7837
7837
|
// integer
|
|
@@ -7876,7 +7876,7 @@ function Xr() {
|
|
|
7876
7876
|
// SubjectPublicKeyInfo
|
|
7877
7877
|
a.publicKeyToAsn1(c.publicKey)
|
|
7878
7878
|
]);
|
|
7879
|
-
return c.issuer.uniqueId &&
|
|
7879
|
+
return c.issuer.uniqueId && T.value.push(
|
|
7880
7880
|
e.create(e.Class.CONTEXT_SPECIFIC, 1, !0, [
|
|
7881
7881
|
e.create(
|
|
7882
7882
|
e.Class.UNIVERSAL,
|
|
@@ -7886,7 +7886,7 @@ function Xr() {
|
|
|
7886
7886
|
"\0" + c.issuer.uniqueId
|
|
7887
7887
|
)
|
|
7888
7888
|
])
|
|
7889
|
-
), c.subject.uniqueId &&
|
|
7889
|
+
), c.subject.uniqueId && T.value.push(
|
|
7890
7890
|
e.create(e.Class.CONTEXT_SPECIFIC, 2, !0, [
|
|
7891
7891
|
e.create(
|
|
7892
7892
|
e.Class.UNIVERSAL,
|
|
@@ -7896,7 +7896,7 @@ function Xr() {
|
|
|
7896
7896
|
"\0" + c.subject.uniqueId
|
|
7897
7897
|
)
|
|
7898
7898
|
])
|
|
7899
|
-
), c.extensions.length > 0 &&
|
|
7899
|
+
), c.extensions.length > 0 && T.value.push(a.certificateExtensionsToAsn1(c.extensions)), T;
|
|
7900
7900
|
}, a.getCertificationRequestInfo = function(c) {
|
|
7901
7901
|
var i = e.create(e.Class.UNIVERSAL, e.Type.SEQUENCE, !0, [
|
|
7902
7902
|
// version
|
|
@@ -7944,8 +7944,8 @@ function Xr() {
|
|
|
7944
7944
|
}, a.certificateExtensionsToAsn1 = function(c) {
|
|
7945
7945
|
var i = e.create(e.Class.CONTEXT_SPECIFIC, 3, !0, []), n = e.create(e.Class.UNIVERSAL, e.Type.SEQUENCE, !0, []);
|
|
7946
7946
|
i.value.push(n);
|
|
7947
|
-
for (var
|
|
7948
|
-
n.value.push(a.certificateExtensionToAsn1(c[
|
|
7947
|
+
for (var T = 0; T < c.length; ++T)
|
|
7948
|
+
n.value.push(a.certificateExtensionToAsn1(c[T]));
|
|
7949
7949
|
return i;
|
|
7950
7950
|
}, a.certificateExtensionToAsn1 = function(c) {
|
|
7951
7951
|
var i = e.create(e.Class.UNIVERSAL, e.Type.SEQUENCE, !0, []);
|
|
@@ -8001,7 +8001,7 @@ function Xr() {
|
|
|
8001
8001
|
var M = n(D.issuer);
|
|
8002
8002
|
return M;
|
|
8003
8003
|
}, i.addCertificate = function(D) {
|
|
8004
|
-
if (typeof D == "string" && (D = t.pki.certificateFromPem(D)),
|
|
8004
|
+
if (typeof D == "string" && (D = t.pki.certificateFromPem(D)), T(D.subject), !i.hasCertificate(D))
|
|
8005
8005
|
if (D.subject.hash in i.certs) {
|
|
8006
8006
|
var M = i.certs[D.subject.hash];
|
|
8007
8007
|
t.util.isArray(M) || (M = [M]), M.push(D), i.certs[D.subject.hash] = M;
|
|
@@ -8033,7 +8033,7 @@ function Xr() {
|
|
|
8033
8033
|
return D;
|
|
8034
8034
|
}, i.removeCertificate = function(D) {
|
|
8035
8035
|
var M;
|
|
8036
|
-
if (typeof D == "string" && (D = t.pki.certificateFromPem(D)),
|
|
8036
|
+
if (typeof D == "string" && (D = t.pki.certificateFromPem(D)), T(D.subject), !i.hasCertificate(D))
|
|
8037
8037
|
return null;
|
|
8038
8038
|
var x = n(D.subject);
|
|
8039
8039
|
if (!t.util.isArray(x))
|
|
@@ -8045,9 +8045,9 @@ function Xr() {
|
|
|
8045
8045
|
return x.length === 0 && delete i.certs[D.subject.hash], M;
|
|
8046
8046
|
};
|
|
8047
8047
|
function n(D) {
|
|
8048
|
-
return
|
|
8048
|
+
return T(D), i.certs[D.hash] || null;
|
|
8049
8049
|
}
|
|
8050
|
-
function
|
|
8050
|
+
function T(D) {
|
|
8051
8051
|
if (!D.hash) {
|
|
8052
8052
|
var M = t.md.sha1.create();
|
|
8053
8053
|
D.attributes = a.RDNAttributesAsArray(y(D), M), D.hash = M.digest().toHex();
|
|
@@ -8068,7 +8068,7 @@ function Xr() {
|
|
|
8068
8068
|
unknown_ca: "forge.pki.UnknownCertificateAuthority"
|
|
8069
8069
|
}, a.verifyCertificateChain = function(c, i, n) {
|
|
8070
8070
|
typeof n == "function" && (n = { verify: n }), n = n || {}, i = i.slice(0);
|
|
8071
|
-
var
|
|
8071
|
+
var T = i.slice(0), V = n.validityCheckDate;
|
|
8072
8072
|
typeof V > "u" && (V = /* @__PURE__ */ new Date());
|
|
8073
8073
|
var O = !0, D = null, M = 0;
|
|
8074
8074
|
do {
|
|
@@ -8132,7 +8132,7 @@ function Xr() {
|
|
|
8132
8132
|
});
|
|
8133
8133
|
}
|
|
8134
8134
|
}
|
|
8135
|
-
var $ = D === null ? !0 : D.error, X = n.verify ? n.verify($, M,
|
|
8135
|
+
var $ = D === null ? !0 : D.error, X = n.verify ? n.verify($, M, T) : $;
|
|
8136
8136
|
if (X === !0)
|
|
8137
8137
|
D = null;
|
|
8138
8138
|
else
|
|
@@ -8409,8 +8409,8 @@ function un() {
|
|
|
8409
8409
|
if (c.tagClass !== e.Class.UNIVERSAL || c.type !== e.Type.OCTETSTRING)
|
|
8410
8410
|
throw new Error("PKCS#12 authSafe content data is not an OCTET STRING.");
|
|
8411
8411
|
if (c = b(c), h.mac) {
|
|
8412
|
-
var i = null, n = 0,
|
|
8413
|
-
switch (
|
|
8412
|
+
var i = null, n = 0, T = e.derToOid(h.macAlgorithm);
|
|
8413
|
+
switch (T) {
|
|
8414
8414
|
case a.oids.sha1:
|
|
8415
8415
|
i = t.md.sha1.create(), n = 20;
|
|
8416
8416
|
break;
|
|
@@ -8428,7 +8428,7 @@ function un() {
|
|
|
8428
8428
|
break;
|
|
8429
8429
|
}
|
|
8430
8430
|
if (i === null)
|
|
8431
|
-
throw new Error("PKCS#12 uses unsupported MAC algorithm: " +
|
|
8431
|
+
throw new Error("PKCS#12 uses unsupported MAC algorithm: " + T);
|
|
8432
8432
|
var V = new t.util.ByteBuffer(h.macSalt), O = "macIterations" in h ? parseInt(t.util.bytesToHex(h.macIterations), 16) : 1, D = p.generateKey(
|
|
8433
8433
|
s,
|
|
8434
8434
|
V,
|
|
@@ -8463,21 +8463,21 @@ function un() {
|
|
|
8463
8463
|
}
|
|
8464
8464
|
var n = {
|
|
8465
8465
|
encrypted: !1
|
|
8466
|
-
},
|
|
8466
|
+
}, T = null, V = R.content.value[0];
|
|
8467
8467
|
switch (e.derToOid(R.contentType)) {
|
|
8468
8468
|
case a.oids.data:
|
|
8469
8469
|
if (V.tagClass !== e.Class.UNIVERSAL || V.type !== e.Type.OCTETSTRING)
|
|
8470
8470
|
throw new Error("PKCS#12 SafeContents Data is not an OCTET STRING.");
|
|
8471
|
-
|
|
8471
|
+
T = b(V).value;
|
|
8472
8472
|
break;
|
|
8473
8473
|
case a.oids.encryptedData:
|
|
8474
|
-
|
|
8474
|
+
T = E(V, h), n.encrypted = !0;
|
|
8475
8475
|
break;
|
|
8476
8476
|
default:
|
|
8477
8477
|
var i = new Error("Unsupported PKCS#12 contentType.");
|
|
8478
8478
|
throw i.contentType = e.derToOid(R.contentType), i;
|
|
8479
8479
|
}
|
|
8480
|
-
n.safeBags = u(
|
|
8480
|
+
n.safeBags = u(T, s, h), C.safeContents.push(n);
|
|
8481
8481
|
}
|
|
8482
8482
|
}
|
|
8483
8483
|
function E(C, m) {
|
|
@@ -8522,7 +8522,7 @@ function un() {
|
|
|
8522
8522
|
attributes: y(R.bagAttributes)
|
|
8523
8523
|
};
|
|
8524
8524
|
h.push(n);
|
|
8525
|
-
var
|
|
8525
|
+
var T, V, O = R.bagValue.value[0];
|
|
8526
8526
|
switch (n.type) {
|
|
8527
8527
|
case a.oids.pkcs8ShroudedKeyBag:
|
|
8528
8528
|
if (O = a.decryptPrivateKeyInfo(O, s), O === null)
|
|
@@ -8539,7 +8539,7 @@ function un() {
|
|
|
8539
8539
|
continue;
|
|
8540
8540
|
/* Nothing more to do. */
|
|
8541
8541
|
case a.oids.certBag:
|
|
8542
|
-
|
|
8542
|
+
T = g, V = function() {
|
|
8543
8543
|
if (e.derToOid(R.certId) !== a.oids.x509Certificate) {
|
|
8544
8544
|
var M = new Error(
|
|
8545
8545
|
"Unsupported certificate type, only X.509 supported."
|
|
@@ -8558,8 +8558,8 @@ function un() {
|
|
|
8558
8558
|
var i = new Error("Unsupported PKCS#12 SafeBag type.");
|
|
8559
8559
|
throw i.oid = n.type, i;
|
|
8560
8560
|
}
|
|
8561
|
-
if (
|
|
8562
|
-
var i = new Error("Cannot read PKCS#12 " +
|
|
8561
|
+
if (T !== void 0 && !e.validate(O, T, R, c)) {
|
|
8562
|
+
var i = new Error("Cannot read PKCS#12 " + T.name);
|
|
8563
8563
|
throw i.errors = c, i;
|
|
8564
8564
|
}
|
|
8565
8565
|
V();
|
|
@@ -8639,10 +8639,10 @@ function un() {
|
|
|
8639
8639
|
])
|
|
8640
8640
|
])
|
|
8641
8641
|
), i.length > 0 && (B = e.create(e.Class.UNIVERSAL, e.Type.SET, !0, i));
|
|
8642
|
-
var n = [],
|
|
8643
|
-
m !== null && (t.util.isArray(m) ?
|
|
8644
|
-
for (var V = [], O = 0; O <
|
|
8645
|
-
m =
|
|
8642
|
+
var n = [], T = [];
|
|
8643
|
+
m !== null && (t.util.isArray(m) ? T = m : T = [m]);
|
|
8644
|
+
for (var V = [], O = 0; O < T.length; ++O) {
|
|
8645
|
+
m = T[O], typeof m == "string" && (m = a.certificateFromPem(m));
|
|
8646
8646
|
var D = O === 0 ? B : void 0, M = a.certificateToAsn1(m), x = e.create(e.Class.UNIVERSAL, e.Type.SEQUENCE, !0, [
|
|
8647
8647
|
// bagId
|
|
8648
8648
|
e.create(
|
|
@@ -8892,7 +8892,7 @@ function fn() {
|
|
|
8892
8892
|
var t = ve();
|
|
8893
8893
|
yt(), Gt(), Jr(), Ot(), cn(), ht(), jt(), Se();
|
|
8894
8894
|
var e = function(d, L, w, o) {
|
|
8895
|
-
var
|
|
8895
|
+
var k = t.util.createBuffer(), F = d.length >> 1, K = F + (d.length & 1), Q = d.substr(0, K), se = d.substr(F, K), le = t.util.createBuffer(), q = t.hmac.create();
|
|
8896
8896
|
w = L + w;
|
|
8897
8897
|
var ie = Math.ceil(o / 16), fe = Math.ceil(o / 20);
|
|
8898
8898
|
q.start("MD5", Q);
|
|
@@ -8905,29 +8905,29 @@ function fn() {
|
|
|
8905
8905
|
le.clear(), le.putBytes(w);
|
|
8906
8906
|
for (var ge = 0; ge < fe; ++ge)
|
|
8907
8907
|
q.start(null, null), q.update(le.getBytes()), le.putBuffer(q.digest()), q.start(null, null), q.update(le.bytes() + w), ke.putBuffer(q.digest());
|
|
8908
|
-
return
|
|
8908
|
+
return k.putBytes(t.util.xorBytes(
|
|
8909
8909
|
Ee.getBytes(),
|
|
8910
8910
|
ke.getBytes(),
|
|
8911
8911
|
o
|
|
8912
|
-
)),
|
|
8912
|
+
)), k;
|
|
8913
8913
|
}, a = function(d, L, w) {
|
|
8914
8914
|
var o = t.hmac.create();
|
|
8915
8915
|
o.start("SHA1", d);
|
|
8916
|
-
var
|
|
8917
|
-
return
|
|
8916
|
+
var k = t.util.createBuffer();
|
|
8917
|
+
return k.putInt32(L[0]), k.putInt32(L[1]), k.putByte(w.type), k.putByte(w.version.major), k.putByte(w.version.minor), k.putInt16(w.length), k.putBytes(w.fragment.bytes()), o.update(k.getBytes()), o.digest().getBytes();
|
|
8918
8918
|
}, p = function(d, L, w) {
|
|
8919
8919
|
var o = !1;
|
|
8920
8920
|
try {
|
|
8921
|
-
var
|
|
8922
|
-
L.fragment = t.util.createBuffer(
|
|
8921
|
+
var k = d.deflate(L.fragment.getBytes());
|
|
8922
|
+
L.fragment = t.util.createBuffer(k), L.length = k.length, o = !0;
|
|
8923
8923
|
} catch {
|
|
8924
8924
|
}
|
|
8925
8925
|
return o;
|
|
8926
8926
|
}, I = function(d, L, w) {
|
|
8927
8927
|
var o = !1;
|
|
8928
8928
|
try {
|
|
8929
|
-
var
|
|
8930
|
-
L.fragment = t.util.createBuffer(
|
|
8929
|
+
var k = d.inflate(L.fragment.getBytes());
|
|
8930
|
+
L.fragment = t.util.createBuffer(k), L.length = k.length, o = !0;
|
|
8931
8931
|
} catch {
|
|
8932
8932
|
}
|
|
8933
8933
|
return o;
|
|
@@ -9055,10 +9055,10 @@ function fn() {
|
|
|
9055
9055
|
description: r.Alert.Description.no_renegotiation
|
|
9056
9056
|
})), r.flush(d)), d.process();
|
|
9057
9057
|
}, r.parseHelloMessage = function(d, L, w) {
|
|
9058
|
-
var o = null,
|
|
9058
|
+
var o = null, k = d.entity === r.ConnectionEnd.client;
|
|
9059
9059
|
if (w < 38)
|
|
9060
9060
|
d.error(d, {
|
|
9061
|
-
message:
|
|
9061
|
+
message: k ? "Invalid ServerHello message. Message too short." : "Invalid ClientHello message. Message too short.",
|
|
9062
9062
|
send: !0,
|
|
9063
9063
|
alert: {
|
|
9064
9064
|
level: r.Alert.Level.fatal,
|
|
@@ -9075,13 +9075,13 @@ function fn() {
|
|
|
9075
9075
|
random: t.util.createBuffer(F.getBytes(32)),
|
|
9076
9076
|
session_id: S(F, 1),
|
|
9077
9077
|
extensions: []
|
|
9078
|
-
},
|
|
9078
|
+
}, k ? (o.cipher_suite = F.getBytes(2), o.compression_method = F.getByte()) : (o.cipher_suites = S(F, 2), o.compression_methods = S(F, 1)), K = w - (K - F.length()), K > 0) {
|
|
9079
9079
|
for (var Q = S(F, 2); Q.length() > 0; )
|
|
9080
9080
|
o.extensions.push({
|
|
9081
9081
|
type: [Q.getByte(), Q.getByte()],
|
|
9082
9082
|
data: S(Q, 2)
|
|
9083
9083
|
});
|
|
9084
|
-
if (!
|
|
9084
|
+
if (!k)
|
|
9085
9085
|
for (var se = 0; se < o.extensions.length; ++se) {
|
|
9086
9086
|
var le = o.extensions[se];
|
|
9087
9087
|
if (le.type[0] === 0 && le.type[1] === 0)
|
|
@@ -9104,7 +9104,7 @@ function fn() {
|
|
|
9104
9104
|
description: r.Alert.Description.protocol_version
|
|
9105
9105
|
}
|
|
9106
9106
|
});
|
|
9107
|
-
if (
|
|
9107
|
+
if (k)
|
|
9108
9108
|
d.session.cipherSuite = r.getCipherSuite(o.cipher_suite);
|
|
9109
9109
|
else
|
|
9110
9110
|
for (var fe = t.util.createBuffer(o.cipher_suites.bytes()); fe.length() > 0 && (d.session.cipherSuite = r.getCipherSuite(fe.getBytes(2)), d.session.cipherSuite === null); )
|
|
@@ -9119,11 +9119,11 @@ function fn() {
|
|
|
9119
9119
|
},
|
|
9120
9120
|
cipherSuite: t.util.bytesToHex(o.cipher_suite)
|
|
9121
9121
|
});
|
|
9122
|
-
|
|
9122
|
+
k ? d.session.compressionMethod = o.compression_method : d.session.compressionMethod = r.CompressionMethod.none;
|
|
9123
9123
|
}
|
|
9124
9124
|
return o;
|
|
9125
9125
|
}, r.createSecurityParameters = function(d, L) {
|
|
9126
|
-
var w = d.entity === r.ConnectionEnd.client, o = L.random.bytes(),
|
|
9126
|
+
var w = d.entity === r.ConnectionEnd.client, o = L.random.bytes(), k = w ? d.session.sp.client_random : o, F = w ? o : r.createRandom().getBytes();
|
|
9127
9127
|
d.session.sp = {
|
|
9128
9128
|
entity: d.entity,
|
|
9129
9129
|
prf_algorithm: r.PRFAlgorithm.tls_prf_sha256,
|
|
@@ -9139,7 +9139,7 @@ function fn() {
|
|
|
9139
9139
|
compression_algorithm: d.session.compressionMethod,
|
|
9140
9140
|
pre_master_secret: null,
|
|
9141
9141
|
master_secret: null,
|
|
9142
|
-
client_random:
|
|
9142
|
+
client_random: k,
|
|
9143
9143
|
server_random: F
|
|
9144
9144
|
};
|
|
9145
9145
|
}, r.handleServerHello = function(d, L, w) {
|
|
@@ -9157,14 +9157,14 @@ function fn() {
|
|
|
9157
9157
|
}
|
|
9158
9158
|
});
|
|
9159
9159
|
d.session.version = d.version;
|
|
9160
|
-
var
|
|
9161
|
-
|
|
9160
|
+
var k = o.session_id.bytes();
|
|
9161
|
+
k.length > 0 && k === d.session.id ? (d.expect = u, d.session.resuming = !0, d.session.sp.server_random = o.random.bytes()) : (d.expect = l, d.session.resuming = !1, r.createSecurityParameters(d, o)), d.session.id = k, d.process();
|
|
9162
9162
|
}
|
|
9163
9163
|
}, r.handleClientHello = function(d, L, w) {
|
|
9164
9164
|
var o = r.parseHelloMessage(d, L, w);
|
|
9165
9165
|
if (!d.fail) {
|
|
9166
|
-
var
|
|
9167
|
-
if (d.sessionCache && (F = d.sessionCache.getSession(
|
|
9166
|
+
var k = o.session_id.bytes(), F = null;
|
|
9167
|
+
if (d.sessionCache && (F = d.sessionCache.getSession(k), F === null ? k = "" : (F.version.major !== o.version.major || F.version.minor > o.version.minor) && (F = null, k = "")), k.length === 0 && (k = t.random.getBytes(32)), d.session.id = k, d.session.clientHelloVersion = o.version, d.session.sp = {}, F)
|
|
9168
9168
|
d.version = d.session.version = F.version, d.session.sp = F.sp;
|
|
9169
9169
|
else {
|
|
9170
9170
|
for (var K, Q = 1; Q < r.SupportedVersions.length && (K = r.SupportedVersions[Q], !(K.minor <= o.version.minor)); ++Q)
|
|
@@ -9204,12 +9204,12 @@ function fn() {
|
|
|
9204
9204
|
description: r.Alert.Description.illegal_parameter
|
|
9205
9205
|
}
|
|
9206
9206
|
});
|
|
9207
|
-
var o = L.fragment,
|
|
9207
|
+
var o = L.fragment, k = {
|
|
9208
9208
|
certificate_list: S(o, 3)
|
|
9209
9209
|
}, F, K, Q = [];
|
|
9210
9210
|
try {
|
|
9211
|
-
for (;
|
|
9212
|
-
F = S(
|
|
9211
|
+
for (; k.certificate_list.length() > 0; )
|
|
9212
|
+
F = S(k.certificate_list, 3), K = t.asn1.fromDer(F), F = t.pki.certificateFromAsn1(K, !0), Q.push(F);
|
|
9213
9213
|
} catch (le) {
|
|
9214
9214
|
return d.error(d, {
|
|
9215
9215
|
message: "Could not parse certificate list.",
|
|
@@ -9251,7 +9251,7 @@ function fn() {
|
|
|
9251
9251
|
description: r.Alert.Description.unsupported_certificate
|
|
9252
9252
|
}
|
|
9253
9253
|
});
|
|
9254
|
-
var o = L.fragment,
|
|
9254
|
+
var o = L.fragment, k = {
|
|
9255
9255
|
enc_pre_master_secret: S(o, 2).getBytes()
|
|
9256
9256
|
}, F = null;
|
|
9257
9257
|
if (d.getPrivateKey)
|
|
@@ -9279,7 +9279,7 @@ function fn() {
|
|
|
9279
9279
|
});
|
|
9280
9280
|
try {
|
|
9281
9281
|
var K = d.session.sp;
|
|
9282
|
-
K.pre_master_secret = F.decrypt(
|
|
9282
|
+
K.pre_master_secret = F.decrypt(k.enc_pre_master_secret);
|
|
9283
9283
|
var Q = d.session.clientHelloVersion;
|
|
9284
9284
|
if (Q.major !== K.pre_master_secret.charCodeAt(0) || Q.minor !== K.pre_master_secret.charCodeAt(1))
|
|
9285
9285
|
throw new Error("TLS version rollback attack detected.");
|
|
@@ -9297,11 +9297,11 @@ function fn() {
|
|
|
9297
9297
|
description: r.Alert.Description.illegal_parameter
|
|
9298
9298
|
}
|
|
9299
9299
|
});
|
|
9300
|
-
var o = L.fragment,
|
|
9300
|
+
var o = L.fragment, k = {
|
|
9301
9301
|
certificate_types: S(o, 1),
|
|
9302
9302
|
certificate_authorities: S(o, 2)
|
|
9303
9303
|
};
|
|
9304
|
-
d.session.certificateRequest =
|
|
9304
|
+
d.session.certificateRequest = k, d.expect = E, d.process();
|
|
9305
9305
|
}, r.handleCertificateVerify = function(d, L, w) {
|
|
9306
9306
|
if (w < 2)
|
|
9307
9307
|
return d.error(d, {
|
|
@@ -9314,7 +9314,7 @@ function fn() {
|
|
|
9314
9314
|
});
|
|
9315
9315
|
var o = L.fragment;
|
|
9316
9316
|
o.read -= 4;
|
|
9317
|
-
var
|
|
9317
|
+
var k = o.bytes();
|
|
9318
9318
|
o.read += 4;
|
|
9319
9319
|
var F = {
|
|
9320
9320
|
signature: S(o, 2).getBytes()
|
|
@@ -9324,7 +9324,7 @@ function fn() {
|
|
|
9324
9324
|
var Q = d.session.clientCertificate;
|
|
9325
9325
|
if (!Q.publicKey.verify(K, F.signature, "NONE"))
|
|
9326
9326
|
throw new Error("CertificateVerify signature does not match.");
|
|
9327
|
-
d.session.md5.update(
|
|
9327
|
+
d.session.md5.update(k), d.session.sha1.update(k);
|
|
9328
9328
|
} catch {
|
|
9329
9329
|
return d.error(d, {
|
|
9330
9330
|
message: "Bad signature in CertificateVerify.",
|
|
@@ -9354,7 +9354,7 @@ function fn() {
|
|
|
9354
9354
|
level: r.Alert.Level.fatal,
|
|
9355
9355
|
description: r.Alert.Description.insufficient_security
|
|
9356
9356
|
}
|
|
9357
|
-
},
|
|
9357
|
+
}, k = 0, F = d.verify(d, o.alert.description, k, []);
|
|
9358
9358
|
if (F !== !0)
|
|
9359
9359
|
return (F || F === 0) && (typeof F == "object" && !t.util.isArray(F) ? (F.message && (o.message = F.message), F.alert && (o.alert.description = F.alert)) : typeof F == "number" && (o.alert.description = F)), d.error(d, o);
|
|
9360
9360
|
}
|
|
@@ -9395,7 +9395,7 @@ function fn() {
|
|
|
9395
9395
|
}, r.handleFinished = function(d, L, w) {
|
|
9396
9396
|
var o = L.fragment;
|
|
9397
9397
|
o.read -= 4;
|
|
9398
|
-
var
|
|
9398
|
+
var k = o.bytes();
|
|
9399
9399
|
o.read += 4;
|
|
9400
9400
|
var F = L.fragment.getBytes();
|
|
9401
9401
|
o = t.util.createBuffer(), o.putBuffer(d.session.md5.digest()), o.putBuffer(d.session.sha1.digest());
|
|
@@ -9409,7 +9409,7 @@ function fn() {
|
|
|
9409
9409
|
description: r.Alert.Description.decrypt_error
|
|
9410
9410
|
}
|
|
9411
9411
|
});
|
|
9412
|
-
d.session.md5.update(
|
|
9412
|
+
d.session.md5.update(k), d.session.sha1.update(k), (d.session.resuming && K || !d.session.resuming && !K) && (r.queue(d, r.createRecord(d, {
|
|
9413
9413
|
type: r.ContentType.change_cipher_spec,
|
|
9414
9414
|
data: r.createChangeCipherSpec()
|
|
9415
9415
|
})), d.state.current.write = d.state.pending.write, d.state.pending = null, r.queue(d, r.createRecord(d, {
|
|
@@ -9420,96 +9420,96 @@ function fn() {
|
|
|
9420
9420
|
var w = L.fragment, o = {
|
|
9421
9421
|
level: w.getByte(),
|
|
9422
9422
|
description: w.getByte()
|
|
9423
|
-
},
|
|
9423
|
+
}, k;
|
|
9424
9424
|
switch (o.description) {
|
|
9425
9425
|
case r.Alert.Description.close_notify:
|
|
9426
|
-
|
|
9426
|
+
k = "Connection closed.";
|
|
9427
9427
|
break;
|
|
9428
9428
|
case r.Alert.Description.unexpected_message:
|
|
9429
|
-
|
|
9429
|
+
k = "Unexpected message.";
|
|
9430
9430
|
break;
|
|
9431
9431
|
case r.Alert.Description.bad_record_mac:
|
|
9432
|
-
|
|
9432
|
+
k = "Bad record MAC.";
|
|
9433
9433
|
break;
|
|
9434
9434
|
case r.Alert.Description.decryption_failed:
|
|
9435
|
-
|
|
9435
|
+
k = "Decryption failed.";
|
|
9436
9436
|
break;
|
|
9437
9437
|
case r.Alert.Description.record_overflow:
|
|
9438
|
-
|
|
9438
|
+
k = "Record overflow.";
|
|
9439
9439
|
break;
|
|
9440
9440
|
case r.Alert.Description.decompression_failure:
|
|
9441
|
-
|
|
9441
|
+
k = "Decompression failed.";
|
|
9442
9442
|
break;
|
|
9443
9443
|
case r.Alert.Description.handshake_failure:
|
|
9444
|
-
|
|
9444
|
+
k = "Handshake failure.";
|
|
9445
9445
|
break;
|
|
9446
9446
|
case r.Alert.Description.bad_certificate:
|
|
9447
|
-
|
|
9447
|
+
k = "Bad certificate.";
|
|
9448
9448
|
break;
|
|
9449
9449
|
case r.Alert.Description.unsupported_certificate:
|
|
9450
|
-
|
|
9450
|
+
k = "Unsupported certificate.";
|
|
9451
9451
|
break;
|
|
9452
9452
|
case r.Alert.Description.certificate_revoked:
|
|
9453
|
-
|
|
9453
|
+
k = "Certificate revoked.";
|
|
9454
9454
|
break;
|
|
9455
9455
|
case r.Alert.Description.certificate_expired:
|
|
9456
|
-
|
|
9456
|
+
k = "Certificate expired.";
|
|
9457
9457
|
break;
|
|
9458
9458
|
case r.Alert.Description.certificate_unknown:
|
|
9459
|
-
|
|
9459
|
+
k = "Certificate unknown.";
|
|
9460
9460
|
break;
|
|
9461
9461
|
case r.Alert.Description.illegal_parameter:
|
|
9462
|
-
|
|
9462
|
+
k = "Illegal parameter.";
|
|
9463
9463
|
break;
|
|
9464
9464
|
case r.Alert.Description.unknown_ca:
|
|
9465
|
-
|
|
9465
|
+
k = "Unknown certificate authority.";
|
|
9466
9466
|
break;
|
|
9467
9467
|
case r.Alert.Description.access_denied:
|
|
9468
|
-
|
|
9468
|
+
k = "Access denied.";
|
|
9469
9469
|
break;
|
|
9470
9470
|
case r.Alert.Description.decode_error:
|
|
9471
|
-
|
|
9471
|
+
k = "Decode error.";
|
|
9472
9472
|
break;
|
|
9473
9473
|
case r.Alert.Description.decrypt_error:
|
|
9474
|
-
|
|
9474
|
+
k = "Decrypt error.";
|
|
9475
9475
|
break;
|
|
9476
9476
|
case r.Alert.Description.export_restriction:
|
|
9477
|
-
|
|
9477
|
+
k = "Export restriction.";
|
|
9478
9478
|
break;
|
|
9479
9479
|
case r.Alert.Description.protocol_version:
|
|
9480
|
-
|
|
9480
|
+
k = "Unsupported protocol version.";
|
|
9481
9481
|
break;
|
|
9482
9482
|
case r.Alert.Description.insufficient_security:
|
|
9483
|
-
|
|
9483
|
+
k = "Insufficient security.";
|
|
9484
9484
|
break;
|
|
9485
9485
|
case r.Alert.Description.internal_error:
|
|
9486
|
-
|
|
9486
|
+
k = "Internal error.";
|
|
9487
9487
|
break;
|
|
9488
9488
|
case r.Alert.Description.user_canceled:
|
|
9489
|
-
|
|
9489
|
+
k = "User canceled.";
|
|
9490
9490
|
break;
|
|
9491
9491
|
case r.Alert.Description.no_renegotiation:
|
|
9492
|
-
|
|
9492
|
+
k = "Renegotiation not supported.";
|
|
9493
9493
|
break;
|
|
9494
9494
|
default:
|
|
9495
|
-
|
|
9495
|
+
k = "Unknown error.";
|
|
9496
9496
|
break;
|
|
9497
9497
|
}
|
|
9498
9498
|
if (o.description === r.Alert.Description.close_notify)
|
|
9499
9499
|
return d.close();
|
|
9500
9500
|
d.error(d, {
|
|
9501
|
-
message:
|
|
9501
|
+
message: k,
|
|
9502
9502
|
send: !1,
|
|
9503
9503
|
// origin is the opposite end
|
|
9504
9504
|
origin: d.entity === r.ConnectionEnd.client ? "server" : "client",
|
|
9505
9505
|
alert: o
|
|
9506
9506
|
}), d.process();
|
|
9507
9507
|
}, r.handleHandshake = function(d, L) {
|
|
9508
|
-
var w = L.fragment, o = w.getByte(),
|
|
9509
|
-
if (
|
|
9508
|
+
var w = L.fragment, o = w.getByte(), k = w.getInt24();
|
|
9509
|
+
if (k > w.length())
|
|
9510
9510
|
return d.fragmented = L, L.fragment = t.util.createBuffer(), w.read -= 4, d.process();
|
|
9511
9511
|
d.fragmented = null, w.read -= 4;
|
|
9512
|
-
var F = w.bytes(
|
|
9512
|
+
var F = w.bytes(k + 4);
|
|
9513
9513
|
w.read += 4, o in Ce[d.entity][d.expect] ? (d.entity === r.ConnectionEnd.server && !d.open && !d.fail && (d.handshaking = !0, d.session = {
|
|
9514
9514
|
version: null,
|
|
9515
9515
|
extensions: {
|
|
@@ -9523,13 +9523,13 @@ function fn() {
|
|
|
9523
9523
|
clientCertificate: null,
|
|
9524
9524
|
md5: t.md.md5.create(),
|
|
9525
9525
|
sha1: t.md.sha1.create()
|
|
9526
|
-
}), o !== r.HandshakeType.hello_request && o !== r.HandshakeType.certificate_verify && o !== r.HandshakeType.finished && (d.session.md5.update(F), d.session.sha1.update(F)), Ce[d.entity][d.expect][o](d, L,
|
|
9526
|
+
}), o !== r.HandshakeType.hello_request && o !== r.HandshakeType.certificate_verify && o !== r.HandshakeType.finished && (d.session.md5.update(F), d.session.sha1.update(F)), Ce[d.entity][d.expect][o](d, L, k)) : r.handleUnexpected(d, L);
|
|
9527
9527
|
}, r.handleApplicationData = function(d, L) {
|
|
9528
9528
|
d.data.putBuffer(L.fragment), d.dataReady(d), d.process();
|
|
9529
9529
|
}, r.handleHeartbeat = function(d, L) {
|
|
9530
|
-
var w = L.fragment, o = w.getByte(),
|
|
9530
|
+
var w = L.fragment, o = w.getByte(), k = w.getInt16(), F = w.getBytes(k);
|
|
9531
9531
|
if (o === r.HeartbeatMessageType.heartbeat_request) {
|
|
9532
|
-
if (d.handshaking ||
|
|
9532
|
+
if (d.handshaking || k > F.length)
|
|
9533
9533
|
return d.process();
|
|
9534
9534
|
r.queue(d, r.createRecord(d, {
|
|
9535
9535
|
type: r.ContentType.heartbeat,
|
|
@@ -9545,7 +9545,7 @@ function fn() {
|
|
|
9545
9545
|
}
|
|
9546
9546
|
d.process();
|
|
9547
9547
|
};
|
|
9548
|
-
var g = 0, l = 1, b = 2, U = 3, E = 4, u = 5, y = 6, C = 7, m = 8, s = 0, h = 1, v = 2, B = 3, R = 4, c = 5, i = 6, n = r.handleUnexpected,
|
|
9548
|
+
var g = 0, l = 1, b = 2, U = 3, E = 4, u = 5, y = 6, C = 7, m = 8, s = 0, h = 1, v = 2, B = 3, R = 4, c = 5, i = 6, n = r.handleUnexpected, T = r.handleChangeCipherSpec, V = r.handleAlert, O = r.handleHandshake, D = r.handleApplicationData, M = r.handleHeartbeat, x = [];
|
|
9549
9549
|
x[r.ConnectionEnd.client] = [
|
|
9550
9550
|
// CC,AL,HS,AD,HB
|
|
9551
9551
|
/*SHE*/
|
|
@@ -9559,7 +9559,7 @@ function fn() {
|
|
|
9559
9559
|
/*SHD*/
|
|
9560
9560
|
[n, V, O, n, M],
|
|
9561
9561
|
/*SCC*/
|
|
9562
|
-
[
|
|
9562
|
+
[T, V, n, n, M],
|
|
9563
9563
|
/*SFI*/
|
|
9564
9564
|
[n, V, O, n, M],
|
|
9565
9565
|
/*SAD*/
|
|
@@ -9577,7 +9577,7 @@ function fn() {
|
|
|
9577
9577
|
/*CCV*/
|
|
9578
9578
|
[n, V, O, n, M],
|
|
9579
9579
|
/*CCC*/
|
|
9580
|
-
[
|
|
9580
|
+
[T, V, n, n, M],
|
|
9581
9581
|
/*CFI*/
|
|
9582
9582
|
[n, V, O, n, M],
|
|
9583
9583
|
/*CAD*/
|
|
@@ -9634,9 +9634,9 @@ function fn() {
|
|
|
9634
9634
|
o,
|
|
9635
9635
|
48
|
|
9636
9636
|
).bytes(), L.pre_master_secret = null), o = L.server_random + L.client_random;
|
|
9637
|
-
var
|
|
9638
|
-
F && (
|
|
9639
|
-
var K = w(L.master_secret, "key expansion", o,
|
|
9637
|
+
var k = 2 * L.mac_key_length + 2 * L.enc_key_length, F = d.version.major === r.Versions.TLS_1_0.major && d.version.minor === r.Versions.TLS_1_0.minor;
|
|
9638
|
+
F && (k += 2 * L.fixed_iv_length);
|
|
9639
|
+
var K = w(L.master_secret, "key expansion", o, k), Q = {
|
|
9640
9640
|
client_write_MAC_key: K.getBytes(L.mac_key_length),
|
|
9641
9641
|
server_write_MAC_key: K.getBytes(L.mac_key_length),
|
|
9642
9642
|
client_write_key: K.getBytes(L.enc_key_length),
|
|
@@ -9704,8 +9704,8 @@ function fn() {
|
|
|
9704
9704
|
}
|
|
9705
9705
|
}), !F.fail;
|
|
9706
9706
|
}, d.session) {
|
|
9707
|
-
var
|
|
9708
|
-
switch (d.session.cipherSuite.initSecurityParameters(
|
|
9707
|
+
var k = d.session.sp;
|
|
9708
|
+
switch (d.session.cipherSuite.initSecurityParameters(k), k.keys = r.generateKeys(d, k), o.read.macKey = L ? k.keys.server_write_MAC_key : k.keys.client_write_MAC_key, o.write.macKey = L ? k.keys.client_write_MAC_key : k.keys.server_write_MAC_key, d.session.cipherSuite.initConnectionState(o, d, k), k.compression_algorithm) {
|
|
9709
9709
|
case r.CompressionMethod.none:
|
|
9710
9710
|
break;
|
|
9711
9711
|
case r.CompressionMethod.deflate:
|
|
@@ -9747,7 +9747,7 @@ function fn() {
|
|
|
9747
9747
|
var o = d.cipherSuites[w];
|
|
9748
9748
|
L.putByte(o.id[0]), L.putByte(o.id[1]);
|
|
9749
9749
|
}
|
|
9750
|
-
var
|
|
9750
|
+
var k = L.length(), F = t.util.createBuffer();
|
|
9751
9751
|
F.putByte(r.CompressionMethod.none);
|
|
9752
9752
|
var K = F.length(), Q = t.util.createBuffer();
|
|
9753
9753
|
if (d.virtualHost) {
|
|
@@ -9763,7 +9763,7 @@ function fn() {
|
|
|
9763
9763
|
var fe = d.session.id, Ee = fe.length + 1 + // session ID vector
|
|
9764
9764
|
2 + // version (major + minor)
|
|
9765
9765
|
4 + 28 + // random time and random bytes
|
|
9766
|
-
2 +
|
|
9766
|
+
2 + k + // cipher suites vector
|
|
9767
9767
|
1 + K + // compression methods vector
|
|
9768
9768
|
ie, ge = t.util.createBuffer();
|
|
9769
9769
|
return ge.putByte(r.HandshakeType.client_hello), ge.putInt24(Ee), ge.putByte(d.version.major), ge.putByte(d.version.minor), ge.putBytes(d.session.sp.client_random), f(ge, 1, t.util.createBuffer(fe)), f(ge, 2, L), f(ge, 1, F), ie > 0 && f(ge, 2, Q), ge;
|
|
@@ -9780,7 +9780,7 @@ function fn() {
|
|
|
9780
9780
|
var o;
|
|
9781
9781
|
L ? o = d.session.certificateRequest : o = d.session.extensions.server_name.serverNameList, w = d.getCertificate(d, o);
|
|
9782
9782
|
}
|
|
9783
|
-
var
|
|
9783
|
+
var k = t.util.createBuffer();
|
|
9784
9784
|
if (w !== null)
|
|
9785
9785
|
try {
|
|
9786
9786
|
t.util.isArray(w) || (w = [w]);
|
|
@@ -9795,7 +9795,7 @@ function fn() {
|
|
|
9795
9795
|
var le = t.util.createBuffer(Q.body);
|
|
9796
9796
|
F === null && (F = t.asn1.fromDer(le.bytes(), !1));
|
|
9797
9797
|
var q = t.util.createBuffer();
|
|
9798
|
-
f(q, 3, le),
|
|
9798
|
+
f(q, 3, le), k.putBuffer(q);
|
|
9799
9799
|
}
|
|
9800
9800
|
w = t.pki.certificateFromAsn1(F), L ? d.session.clientCertificate = w : d.session.serverCertificate = w;
|
|
9801
9801
|
} catch (Ee) {
|
|
@@ -9809,8 +9809,8 @@ function fn() {
|
|
|
9809
9809
|
}
|
|
9810
9810
|
});
|
|
9811
9811
|
}
|
|
9812
|
-
var ie = 3 +
|
|
9813
|
-
return fe.putByte(r.HandshakeType.certificate), fe.putInt24(ie), f(fe, 3,
|
|
9812
|
+
var ie = 3 + k.length(), fe = t.util.createBuffer();
|
|
9813
|
+
return fe.putByte(r.HandshakeType.certificate), fe.putInt24(ie), f(fe, 3, k), fe;
|
|
9814
9814
|
}, r.createClientKeyExchange = function(d) {
|
|
9815
9815
|
var L = t.util.createBuffer();
|
|
9816
9816
|
L.putByte(d.session.clientHelloVersion.major), L.putByte(d.session.clientHelloVersion.minor), L.putBytes(t.random.getBytes(46));
|
|
@@ -9818,14 +9818,14 @@ function fn() {
|
|
|
9818
9818
|
w.pre_master_secret = L.getBytes();
|
|
9819
9819
|
var o = d.session.serverCertificate.publicKey;
|
|
9820
9820
|
L = o.encrypt(w.pre_master_secret);
|
|
9821
|
-
var
|
|
9822
|
-
return F.putByte(r.HandshakeType.client_key_exchange), F.putInt24(
|
|
9821
|
+
var k = L.length + 2, F = t.util.createBuffer();
|
|
9822
|
+
return F.putByte(r.HandshakeType.client_key_exchange), F.putInt24(k), F.putInt16(L.length), F.putBytes(L), F;
|
|
9823
9823
|
}, r.createServerKeyExchange = function(d) {
|
|
9824
9824
|
var L = t.util.createBuffer();
|
|
9825
9825
|
return L;
|
|
9826
9826
|
}, r.getClientSignature = function(d, L) {
|
|
9827
9827
|
var w = t.util.createBuffer();
|
|
9828
|
-
w.putBuffer(d.session.md5.digest()), w.putBuffer(d.session.sha1.digest()), w = w.getBytes(), d.getSignature = d.getSignature || function(o,
|
|
9828
|
+
w.putBuffer(d.session.md5.digest()), w.putBuffer(d.session.sha1.digest()), w = w.getBytes(), d.getSignature = d.getSignature || function(o, k, F) {
|
|
9829
9829
|
var K = null;
|
|
9830
9830
|
if (o.getPrivateKey)
|
|
9831
9831
|
try {
|
|
@@ -9848,7 +9848,7 @@ function fn() {
|
|
|
9848
9848
|
level: r.Alert.Level.fatal,
|
|
9849
9849
|
description: r.Alert.Description.internal_error
|
|
9850
9850
|
}
|
|
9851
|
-
}) :
|
|
9851
|
+
}) : k = K.sign(k, null), F(o, k);
|
|
9852
9852
|
}, d.getSignature(d, w, L);
|
|
9853
9853
|
}, r.createCertificateVerify = function(d, L) {
|
|
9854
9854
|
var w = L.length + 2, o = t.util.createBuffer();
|
|
@@ -9858,7 +9858,7 @@ function fn() {
|
|
|
9858
9858
|
L.putByte(1);
|
|
9859
9859
|
var w = t.util.createBuffer();
|
|
9860
9860
|
for (var o in d.caStore.certs) {
|
|
9861
|
-
var
|
|
9861
|
+
var k = d.caStore.certs[o], F = t.pki.distinguishedNameToAsn1(k.subject), K = t.asn1.toDer(F);
|
|
9862
9862
|
w.putInt16(K.length()), w.putBuffer(K);
|
|
9863
9863
|
}
|
|
9864
9864
|
var Q = 1 + L.length() + 2 + w.length(), se = t.util.createBuffer();
|
|
@@ -9872,15 +9872,15 @@ function fn() {
|
|
|
9872
9872
|
}, r.createFinished = function(d) {
|
|
9873
9873
|
var L = t.util.createBuffer();
|
|
9874
9874
|
L.putBuffer(d.session.md5.digest()), L.putBuffer(d.session.sha1.digest());
|
|
9875
|
-
var w = d.entity === r.ConnectionEnd.client, o = d.session.sp,
|
|
9876
|
-
L = F(o.master_secret, K, L.getBytes(),
|
|
9875
|
+
var w = d.entity === r.ConnectionEnd.client, o = d.session.sp, k = 12, F = e, K = w ? "client finished" : "server finished";
|
|
9876
|
+
L = F(o.master_secret, K, L.getBytes(), k);
|
|
9877
9877
|
var Q = t.util.createBuffer();
|
|
9878
9878
|
return Q.putByte(r.HandshakeType.finished), Q.putInt24(L.length()), Q.putBuffer(L), Q;
|
|
9879
9879
|
}, r.createHeartbeat = function(d, L, w) {
|
|
9880
9880
|
typeof w > "u" && (w = L.length);
|
|
9881
9881
|
var o = t.util.createBuffer();
|
|
9882
9882
|
o.putByte(d), o.putInt16(w), o.putBytes(L);
|
|
9883
|
-
var
|
|
9883
|
+
var k = o.length(), F = Math.max(16, k - w - 3);
|
|
9884
9884
|
return o.putBytes(t.random.getBytes(F)), o;
|
|
9885
9885
|
}, r.queue = function(d, L) {
|
|
9886
9886
|
if (L && !(L.fragment.length() === 0 && (L.type === r.ContentType.handshake || L.type === r.ContentType.alert || L.type === r.ContentType.change_cipher_spec))) {
|
|
@@ -9893,14 +9893,14 @@ function fn() {
|
|
|
9893
9893
|
o = [L];
|
|
9894
9894
|
else {
|
|
9895
9895
|
o = [];
|
|
9896
|
-
for (var
|
|
9896
|
+
for (var k = L.fragment.bytes(); k.length > r.MaxFragment; )
|
|
9897
9897
|
o.push(r.createRecord(d, {
|
|
9898
9898
|
type: L.type,
|
|
9899
|
-
data: t.util.createBuffer(
|
|
9900
|
-
})),
|
|
9901
|
-
|
|
9899
|
+
data: t.util.createBuffer(k.slice(0, r.MaxFragment))
|
|
9900
|
+
})), k = k.slice(r.MaxFragment);
|
|
9901
|
+
k.length > 0 && o.push(r.createRecord(d, {
|
|
9902
9902
|
type: L.type,
|
|
9903
|
-
data: t.util.createBuffer(
|
|
9903
|
+
data: t.util.createBuffer(k)
|
|
9904
9904
|
}));
|
|
9905
9905
|
}
|
|
9906
9906
|
for (var F = 0; F < o.length && !d.fail; ++F) {
|
|
@@ -9974,17 +9974,17 @@ function fn() {
|
|
|
9974
9974
|
return le;
|
|
9975
9975
|
}, t.pki.verifyCertificateChain(d.caStore, L, w);
|
|
9976
9976
|
} catch (F) {
|
|
9977
|
-
var
|
|
9978
|
-
(typeof
|
|
9977
|
+
var k = F;
|
|
9978
|
+
(typeof k != "object" || t.util.isArray(k)) && (k = {
|
|
9979
9979
|
send: !0,
|
|
9980
9980
|
alert: {
|
|
9981
9981
|
level: r.Alert.Level.fatal,
|
|
9982
9982
|
description: X(F)
|
|
9983
9983
|
}
|
|
9984
|
-
}), "send" in
|
|
9984
|
+
}), "send" in k || (k.send = !0), "alert" in k || (k.alert = {
|
|
9985
9985
|
level: r.Alert.Level.fatal,
|
|
9986
|
-
description: X(
|
|
9987
|
-
}), d.error(d,
|
|
9986
|
+
description: X(k.error)
|
|
9987
|
+
}), d.error(d, k);
|
|
9988
9988
|
}
|
|
9989
9989
|
return !d.fail;
|
|
9990
9990
|
}, r.createSessionCache = function(d, L) {
|
|
@@ -9995,9 +9995,9 @@ function fn() {
|
|
|
9995
9995
|
w = {}, w.cache = d || {}, w.capacity = Math.max(L || 100, 1), w.order = [];
|
|
9996
9996
|
for (var o in d)
|
|
9997
9997
|
w.order.length <= L ? w.order.push(o) : delete d[o];
|
|
9998
|
-
w.getSession = function(
|
|
9998
|
+
w.getSession = function(k) {
|
|
9999
9999
|
var F = null, K = null;
|
|
10000
|
-
if (
|
|
10000
|
+
if (k ? K = t.util.bytesToHex(k) : w.order.length > 0 && (K = w.order[0]), K !== null && K in w.cache) {
|
|
10001
10001
|
F = w.cache[K], delete w.cache[K];
|
|
10002
10002
|
for (var Q in w.order)
|
|
10003
10003
|
if (w.order[Q] === K) {
|
|
@@ -10006,12 +10006,12 @@ function fn() {
|
|
|
10006
10006
|
}
|
|
10007
10007
|
}
|
|
10008
10008
|
return F;
|
|
10009
|
-
}, w.setSession = function(
|
|
10009
|
+
}, w.setSession = function(k, F) {
|
|
10010
10010
|
if (w.order.length === w.capacity) {
|
|
10011
10011
|
var K = w.order.shift();
|
|
10012
10012
|
delete w.cache[K];
|
|
10013
10013
|
}
|
|
10014
|
-
var K = t.util.bytesToHex(
|
|
10014
|
+
var K = t.util.bytesToHex(k);
|
|
10015
10015
|
w.order.push(K), w.cache[K] = F;
|
|
10016
10016
|
};
|
|
10017
10017
|
}
|
|
@@ -10025,9 +10025,9 @@ function fn() {
|
|
|
10025
10025
|
for (var o in r.CipherSuites)
|
|
10026
10026
|
w.push(r.CipherSuites[o]);
|
|
10027
10027
|
}
|
|
10028
|
-
var
|
|
10028
|
+
var k = d.server ? r.ConnectionEnd.server : r.ConnectionEnd.client, F = d.sessionCache ? r.createSessionCache(d.sessionCache) : null, K = {
|
|
10029
10029
|
version: { major: r.Version.major, minor: r.Version.minor },
|
|
10030
|
-
entity:
|
|
10030
|
+
entity: k,
|
|
10031
10031
|
sessionId: d.sessionId,
|
|
10032
10032
|
caStore: L,
|
|
10033
10033
|
sessionCache: F,
|
|
@@ -10324,11 +10324,11 @@ function pn() {
|
|
|
10324
10324
|
for (var n = new Array(U.length), i = 0; i < U.length; ++i)
|
|
10325
10325
|
n[i] = U[i].slice(0);
|
|
10326
10326
|
g(n, u, s);
|
|
10327
|
-
var
|
|
10327
|
+
var T = t.util.createBuffer(), V;
|
|
10328
10328
|
l === "SHA-512" ? V = n.length : l === "SHA-384" ? V = n.length - 2 : V = n.length - 4;
|
|
10329
10329
|
for (var i = 0; i < V; ++i)
|
|
10330
|
-
|
|
10331
|
-
return
|
|
10330
|
+
T.putInt32(n[i][0]), (i !== V - 1 || l !== "SHA-512/224") && T.putInt32(n[i][1]);
|
|
10331
|
+
return T;
|
|
10332
10332
|
}, m;
|
|
10333
10333
|
};
|
|
10334
10334
|
var p = null, I = !1, S = null, f = null;
|
|
@@ -10453,7 +10453,7 @@ function pn() {
|
|
|
10453
10453
|
], I = !0;
|
|
10454
10454
|
}
|
|
10455
10455
|
function g(l, b, U) {
|
|
10456
|
-
for (var E, u, y, C, m, s, h, v, B, R, c, i, n,
|
|
10456
|
+
for (var E, u, y, C, m, s, h, v, B, R, c, i, n, T, V, O, D, M, x, G, z, Y, Z, te, ue, he, Ce, Ie, _, $, X, Oe, pe, d, L, w = U.length(); w >= 128; ) {
|
|
10457
10457
|
for (_ = 0; _ < 16; ++_)
|
|
10458
10458
|
b[_][0] = U.getInt32() >>> 0, b[_][1] = U.getInt32() >>> 0;
|
|
10459
10459
|
for (; _ < 80; ++_)
|
|
@@ -10466,17 +10466,17 @@ function pn() {
|
|
|
10466
10466
|
$ >>> 7) >>> 0, C = (($ << 31 | X >>> 1) ^ // ROTR 1
|
|
10467
10467
|
($ << 24 | X >>> 8) ^ // ROTR 8
|
|
10468
10468
|
($ << 25 | X >>> 7)) >>> 0, pe = b[_ - 7], L = b[_ - 16], X = u + pe[1] + C + L[1], b[_][0] = E + pe[0] + y + L[0] + (X / 4294967296 >>> 0) >>> 0, b[_][1] = X >>> 0;
|
|
10469
|
-
for (n = l[0][0],
|
|
10469
|
+
for (n = l[0][0], T = l[0][1], V = l[1][0], O = l[1][1], D = l[2][0], M = l[2][1], x = l[3][0], G = l[3][1], z = l[4][0], Y = l[4][1], Z = l[5][0], te = l[5][1], ue = l[6][0], he = l[6][1], Ce = l[7][0], Ie = l[7][1], _ = 0; _ < 80; ++_)
|
|
10470
10470
|
h = ((z >>> 14 | Y << 18) ^ // ROTR 14
|
|
10471
10471
|
(z >>> 18 | Y << 14) ^ // ROTR 18
|
|
10472
10472
|
(Y >>> 9 | z << 23)) >>> 0, v = ((z << 18 | Y >>> 14) ^ // ROTR 14
|
|
10473
10473
|
(z << 14 | Y >>> 18) ^ // ROTR 18
|
|
10474
|
-
(Y << 23 | z >>> 9)) >>> 0, B = (ue ^ z & (Z ^ ue)) >>> 0, R = (he ^ Y & (te ^ he)) >>> 0, m = ((n >>> 28 |
|
|
10475
|
-
(
|
|
10476
|
-
(
|
|
10477
|
-
(
|
|
10478
|
-
(
|
|
10479
|
-
X = l[0][1] +
|
|
10474
|
+
(Y << 23 | z >>> 9)) >>> 0, B = (ue ^ z & (Z ^ ue)) >>> 0, R = (he ^ Y & (te ^ he)) >>> 0, m = ((n >>> 28 | T << 4) ^ // ROTR 28
|
|
10475
|
+
(T >>> 2 | n << 30) ^ // ROTR 34/(swap + ROTR 2)
|
|
10476
|
+
(T >>> 7 | n << 25)) >>> 0, s = ((n << 4 | T >>> 28) ^ // ROTR 28
|
|
10477
|
+
(T << 30 | n >>> 2) ^ // ROTR 34/(swap + ROTR 2)
|
|
10478
|
+
(T << 25 | n >>> 7)) >>> 0, c = (n & V | D & (n ^ V)) >>> 0, i = (T & O | M & (T ^ O)) >>> 0, X = Ie + v + R + S[_][1] + b[_][1], E = Ce + h + B + S[_][0] + b[_][0] + (X / 4294967296 >>> 0) >>> 0, u = X >>> 0, X = s + i, y = m + c + (X / 4294967296 >>> 0) >>> 0, C = X >>> 0, Ce = ue, Ie = he, ue = Z, he = te, Z = z, te = Y, X = G + u, z = x + E + (X / 4294967296 >>> 0) >>> 0, Y = X >>> 0, x = D, G = M, D = V, M = O, V = n, O = T, X = u + C, n = E + y + (X / 4294967296 >>> 0) >>> 0, T = X >>> 0;
|
|
10479
|
+
X = l[0][1] + T, l[0][0] = l[0][0] + n + (X / 4294967296 >>> 0) >>> 0, l[0][1] = X >>> 0, X = l[1][1] + O, l[1][0] = l[1][0] + V + (X / 4294967296 >>> 0) >>> 0, l[1][1] = X >>> 0, X = l[2][1] + M, l[2][0] = l[2][0] + D + (X / 4294967296 >>> 0) >>> 0, l[2][1] = X >>> 0, X = l[3][1] + G, l[3][0] = l[3][0] + x + (X / 4294967296 >>> 0) >>> 0, l[3][1] = X >>> 0, X = l[4][1] + Y, l[4][0] = l[4][0] + z + (X / 4294967296 >>> 0) >>> 0, l[4][1] = X >>> 0, X = l[5][1] + te, l[5][0] = l[5][0] + Z + (X / 4294967296 >>> 0) >>> 0, l[5][1] = X >>> 0, X = l[6][1] + he, l[6][0] = l[6][0] + ue + (X / 4294967296 >>> 0) >>> 0, l[6][1] = X >>> 0, X = l[7][1] + Ie, l[7][0] = l[7][0] + Ce + (X / 4294967296 >>> 0) >>> 0, l[7][1] = X >>> 0, w -= 128;
|
|
10480
10480
|
}
|
|
10481
10481
|
}
|
|
10482
10482
|
return Vr.exports;
|
|
@@ -10598,14 +10598,14 @@ function gs() {
|
|
|
10598
10598
|
'"seed" must be a node.js Buffer, Uint8Array, or a binary string.'
|
|
10599
10599
|
);
|
|
10600
10600
|
L = g({ message: L, encoding: "binary" });
|
|
10601
|
-
for (var w = new f(r.constants.PUBLIC_KEY_BYTE_LENGTH), o = new f(r.constants.PRIVATE_KEY_BYTE_LENGTH),
|
|
10602
|
-
o[
|
|
10601
|
+
for (var w = new f(r.constants.PUBLIC_KEY_BYTE_LENGTH), o = new f(r.constants.PRIVATE_KEY_BYTE_LENGTH), k = 0; k < 32; ++k)
|
|
10602
|
+
o[k] = L[k];
|
|
10603
10603
|
return h(w, o), { publicKey: w, privateKey: o };
|
|
10604
10604
|
}, r.privateKeyFromAsn1 = function(d) {
|
|
10605
10605
|
var L = {}, w = [], o = t.asn1.validate(d, p, L, w);
|
|
10606
10606
|
if (!o) {
|
|
10607
|
-
var
|
|
10608
|
-
throw
|
|
10607
|
+
var k = new Error("Invalid Key.");
|
|
10608
|
+
throw k.errors = w, k;
|
|
10609
10609
|
}
|
|
10610
10610
|
var F = t.asn1.derToOid(L.privateKeyOid), K = t.oids.EdDSA25519;
|
|
10611
10611
|
if (F !== K)
|
|
@@ -10618,8 +10618,8 @@ function gs() {
|
|
|
10618
10618
|
}, r.publicKeyFromAsn1 = function(d) {
|
|
10619
10619
|
var L = {}, w = [], o = t.asn1.validate(d, a, L, w);
|
|
10620
10620
|
if (!o) {
|
|
10621
|
-
var
|
|
10622
|
-
throw
|
|
10621
|
+
var k = new Error("Invalid Key.");
|
|
10622
|
+
throw k.errors = w, k;
|
|
10623
10623
|
}
|
|
10624
10624
|
var F = t.asn1.derToOid(L.publicKeyOid), K = t.oids.EdDSA25519;
|
|
10625
10625
|
if (F !== K)
|
|
@@ -10657,12 +10657,12 @@ function gs() {
|
|
|
10657
10657
|
throw new TypeError(
|
|
10658
10658
|
'"options.privateKey" must have a byte length of ' + r.constants.SEED_BYTE_LENGTH + " or " + r.constants.PRIVATE_KEY_BYTE_LENGTH
|
|
10659
10659
|
);
|
|
10660
|
-
var
|
|
10660
|
+
var k = new f(
|
|
10661
10661
|
r.constants.SIGN_BYTE_LENGTH + L.length
|
|
10662
10662
|
);
|
|
10663
|
-
v(
|
|
10663
|
+
v(k, L, L.length, w);
|
|
10664
10664
|
for (var F = new f(r.constants.SIGN_BYTE_LENGTH), K = 0; K < F.length; ++K)
|
|
10665
|
-
F[K] =
|
|
10665
|
+
F[K] = k[K];
|
|
10666
10666
|
return F;
|
|
10667
10667
|
}, r.verify = function(d) {
|
|
10668
10668
|
d = d || {};
|
|
@@ -10687,12 +10687,12 @@ function gs() {
|
|
|
10687
10687
|
throw new TypeError(
|
|
10688
10688
|
'"options.publicKey" must have a byte length of ' + r.constants.PUBLIC_KEY_BYTE_LENGTH
|
|
10689
10689
|
);
|
|
10690
|
-
var
|
|
10690
|
+
var k = new f(r.constants.SIGN_BYTE_LENGTH + L.length), F = new f(r.constants.SIGN_BYTE_LENGTH + L.length), K;
|
|
10691
10691
|
for (K = 0; K < r.constants.SIGN_BYTE_LENGTH; ++K)
|
|
10692
|
-
|
|
10692
|
+
k[K] = w[K];
|
|
10693
10693
|
for (K = 0; K < L.length; ++K)
|
|
10694
|
-
|
|
10695
|
-
return B(F,
|
|
10694
|
+
k[K + r.constants.SIGN_BYTE_LENGTH] = L[K];
|
|
10695
|
+
return B(F, k, k.length, o) >= 0;
|
|
10696
10696
|
};
|
|
10697
10697
|
function g(d) {
|
|
10698
10698
|
var L = d.message;
|
|
@@ -10714,8 +10714,8 @@ function gs() {
|
|
|
10714
10714
|
throw new TypeError(
|
|
10715
10715
|
'"options.message" must be a node.js Buffer, a Uint8Array, a forge ByteBuffer, or a string with "options.encoding" specifying its encoding.'
|
|
10716
10716
|
);
|
|
10717
|
-
for (var o = new f(L.length()),
|
|
10718
|
-
o[
|
|
10717
|
+
for (var o = new f(L.length()), k = 0; k < o.length; ++k)
|
|
10718
|
+
o[k] = L.at(k);
|
|
10719
10719
|
return o;
|
|
10720
10720
|
}
|
|
10721
10721
|
var l = _(), b = _([1]), U = _([
|
|
@@ -10840,69 +10840,69 @@ function gs() {
|
|
|
10840
10840
|
function s(d, L) {
|
|
10841
10841
|
var w = t.md.sha512.create(), o = new S(d);
|
|
10842
10842
|
w.update(o.getBytes(L), "binary");
|
|
10843
|
-
var
|
|
10843
|
+
var k = w.digest().getBytes();
|
|
10844
10844
|
if (typeof Buffer < "u")
|
|
10845
|
-
return Buffer.from(
|
|
10845
|
+
return Buffer.from(k, "binary");
|
|
10846
10846
|
for (var F = new f(r.constants.HASH_BYTE_LENGTH), K = 0; K < 64; ++K)
|
|
10847
|
-
F[K] =
|
|
10847
|
+
F[K] = k.charCodeAt(K);
|
|
10848
10848
|
return F;
|
|
10849
10849
|
}
|
|
10850
10850
|
function h(d, L) {
|
|
10851
|
-
var w = [_(), _(), _(), _()], o,
|
|
10852
|
-
for (
|
|
10851
|
+
var w = [_(), _(), _(), _()], o, k = s(L, 32);
|
|
10852
|
+
for (k[0] &= 248, k[31] &= 127, k[31] |= 64, te(w, k), T(d, w), o = 0; o < 32; ++o)
|
|
10853
10853
|
L[o + 32] = d[o];
|
|
10854
10854
|
return 0;
|
|
10855
10855
|
}
|
|
10856
10856
|
function v(d, L, w, o) {
|
|
10857
|
-
var
|
|
10857
|
+
var k, F, K = new Float64Array(64), Q = [_(), _(), _(), _()], se = s(o, 32);
|
|
10858
10858
|
se[0] &= 248, se[31] &= 127, se[31] |= 64;
|
|
10859
10859
|
var le = w + 64;
|
|
10860
|
-
for (
|
|
10861
|
-
d[64 +
|
|
10862
|
-
for (
|
|
10863
|
-
d[32 +
|
|
10860
|
+
for (k = 0; k < w; ++k)
|
|
10861
|
+
d[64 + k] = L[k];
|
|
10862
|
+
for (k = 0; k < 32; ++k)
|
|
10863
|
+
d[32 + k] = se[32 + k];
|
|
10864
10864
|
var q = s(d.subarray(32), w + 32);
|
|
10865
|
-
for (c(q), te(Q, q),
|
|
10866
|
-
d[
|
|
10865
|
+
for (c(q), te(Q, q), T(d, Q), k = 32; k < 64; ++k)
|
|
10866
|
+
d[k] = o[k];
|
|
10867
10867
|
var ie = s(d, w + 64);
|
|
10868
|
-
for (c(ie),
|
|
10869
|
-
K[
|
|
10870
|
-
for (
|
|
10871
|
-
K[
|
|
10872
|
-
for (
|
|
10868
|
+
for (c(ie), k = 32; k < 64; ++k)
|
|
10869
|
+
K[k] = 0;
|
|
10870
|
+
for (k = 0; k < 32; ++k)
|
|
10871
|
+
K[k] = q[k];
|
|
10872
|
+
for (k = 0; k < 32; ++k)
|
|
10873
10873
|
for (F = 0; F < 32; F++)
|
|
10874
|
-
K[
|
|
10874
|
+
K[k + F] += ie[k] * se[F];
|
|
10875
10875
|
return R(d.subarray(32), K), le;
|
|
10876
10876
|
}
|
|
10877
10877
|
function B(d, L, w, o) {
|
|
10878
|
-
var
|
|
10878
|
+
var k, F, K = new f(32), Q = [_(), _(), _(), _()], se = [_(), _(), _(), _()];
|
|
10879
10879
|
if (F = -1, w < 64 || O(se, o))
|
|
10880
10880
|
return -1;
|
|
10881
|
-
for (
|
|
10882
|
-
d[
|
|
10883
|
-
for (
|
|
10884
|
-
d[
|
|
10881
|
+
for (k = 0; k < w; ++k)
|
|
10882
|
+
d[k] = L[k];
|
|
10883
|
+
for (k = 0; k < 32; ++k)
|
|
10884
|
+
d[k + 32] = o[k];
|
|
10885
10885
|
var le = s(d, w);
|
|
10886
|
-
if (c(le), Z(Q, se, le), te(se, L.subarray(32)), i(Q, se),
|
|
10887
|
-
for (
|
|
10888
|
-
d[
|
|
10886
|
+
if (c(le), Z(Q, se, le), te(se, L.subarray(32)), i(Q, se), T(K, Q), w -= 64, G(L, 0, K, 0)) {
|
|
10887
|
+
for (k = 0; k < w; ++k)
|
|
10888
|
+
d[k] = 0;
|
|
10889
10889
|
return -1;
|
|
10890
10890
|
}
|
|
10891
|
-
for (
|
|
10892
|
-
d[
|
|
10891
|
+
for (k = 0; k < w; ++k)
|
|
10892
|
+
d[k] = L[k + 64];
|
|
10893
10893
|
return F = w, F;
|
|
10894
10894
|
}
|
|
10895
10895
|
function R(d, L) {
|
|
10896
|
-
var w, o,
|
|
10896
|
+
var w, o, k, F;
|
|
10897
10897
|
for (o = 63; o >= 32; --o) {
|
|
10898
|
-
for (w = 0,
|
|
10899
|
-
L[
|
|
10900
|
-
L[
|
|
10901
|
-
}
|
|
10902
|
-
for (w = 0,
|
|
10903
|
-
L[
|
|
10904
|
-
for (
|
|
10905
|
-
L[
|
|
10898
|
+
for (w = 0, k = o - 32, F = o - 12; k < F; ++k)
|
|
10899
|
+
L[k] += w - 16 * L[o] * C[k - (o - 32)], w = L[k] + 128 >> 8, L[k] -= w * 256;
|
|
10900
|
+
L[k] += w, L[o] = 0;
|
|
10901
|
+
}
|
|
10902
|
+
for (w = 0, k = 0; k < 32; ++k)
|
|
10903
|
+
L[k] += w - (L[31] >> 4) * C[k], w = L[k] >> 8, L[k] &= 255;
|
|
10904
|
+
for (k = 0; k < 32; ++k)
|
|
10905
|
+
L[k] -= w * C[k];
|
|
10906
10906
|
for (o = 0; o < 32; ++o)
|
|
10907
10907
|
L[o + 1] += L[o] >> 8, d[o] = L[o] & 255;
|
|
10908
10908
|
}
|
|
@@ -10912,32 +10912,32 @@ function gs() {
|
|
|
10912
10912
|
R(d, L);
|
|
10913
10913
|
}
|
|
10914
10914
|
function i(d, L) {
|
|
10915
|
-
var w = _(), o = _(),
|
|
10916
|
-
X(w, d[1], d[0]), X(q, L[1], L[0]), pe(w, w, q), $(o, d[0], d[1]), $(q, L[0], L[1]), pe(o, o, q), pe(
|
|
10915
|
+
var w = _(), o = _(), k = _(), F = _(), K = _(), Q = _(), se = _(), le = _(), q = _();
|
|
10916
|
+
X(w, d[1], d[0]), X(q, L[1], L[0]), pe(w, w, q), $(o, d[0], d[1]), $(q, L[0], L[1]), pe(o, o, q), pe(k, d[3], L[3]), pe(k, k, E), pe(F, d[2], L[2]), $(F, F, F), X(K, o, w), X(Q, F, k), $(se, F, k), $(le, o, w), pe(d[0], K, Q), pe(d[1], le, se), pe(d[2], se, Q), pe(d[3], K, le);
|
|
10917
10917
|
}
|
|
10918
10918
|
function n(d, L, w) {
|
|
10919
10919
|
for (var o = 0; o < 4; ++o)
|
|
10920
10920
|
Ie(d[o], L[o], w);
|
|
10921
10921
|
}
|
|
10922
|
-
function
|
|
10923
|
-
var w = _(), o = _(),
|
|
10924
|
-
he(
|
|
10922
|
+
function T(d, L) {
|
|
10923
|
+
var w = _(), o = _(), k = _();
|
|
10924
|
+
he(k, L[2]), pe(w, L[0], k), pe(o, L[1], k), V(d, o), d[31] ^= Y(w) << 7;
|
|
10925
10925
|
}
|
|
10926
10926
|
function V(d, L) {
|
|
10927
|
-
var w, o,
|
|
10927
|
+
var w, o, k, F = _(), K = _();
|
|
10928
10928
|
for (w = 0; w < 16; ++w)
|
|
10929
10929
|
K[w] = L[w];
|
|
10930
10930
|
for (Ce(K), Ce(K), Ce(K), o = 0; o < 2; ++o) {
|
|
10931
10931
|
for (F[0] = K[0] - 65517, w = 1; w < 15; ++w)
|
|
10932
10932
|
F[w] = K[w] - 65535 - (F[w - 1] >> 16 & 1), F[w - 1] &= 65535;
|
|
10933
|
-
F[15] = K[15] - 32767 - (F[14] >> 16 & 1),
|
|
10933
|
+
F[15] = K[15] - 32767 - (F[14] >> 16 & 1), k = F[15] >> 16 & 1, F[14] &= 65535, Ie(K, F, 1 - k);
|
|
10934
10934
|
}
|
|
10935
10935
|
for (w = 0; w < 16; w++)
|
|
10936
10936
|
d[2 * w] = K[w] & 255, d[2 * w + 1] = K[w] >> 8;
|
|
10937
10937
|
}
|
|
10938
10938
|
function O(d, L) {
|
|
10939
|
-
var w = _(), o = _(),
|
|
10940
|
-
return ue(d[2], b), D(d[1], L), Oe(
|
|
10939
|
+
var w = _(), o = _(), k = _(), F = _(), K = _(), Q = _(), se = _();
|
|
10940
|
+
return ue(d[2], b), D(d[1], L), Oe(k, d[1]), pe(F, k, U), X(k, k, d[2]), $(F, d[2], F), Oe(K, F), Oe(Q, K), pe(se, Q, K), pe(w, se, k), pe(w, w, F), M(w, w), pe(w, w, k), pe(w, w, F), pe(w, w, F), pe(d[0], w, F), Oe(o, d[0]), pe(o, o, F), x(o, k) && pe(d[0], d[0], m), Oe(o, d[0]), pe(o, o, F), x(o, k) ? -1 : (Y(d[0]) === L[31] >> 7 && X(d[0], l, d[0]), pe(d[3], d[0], d[1]), 0);
|
|
10941
10941
|
}
|
|
10942
10942
|
function D(d, L) {
|
|
10943
10943
|
var w;
|
|
@@ -10961,9 +10961,9 @@ function gs() {
|
|
|
10961
10961
|
function G(d, L, w, o) {
|
|
10962
10962
|
return z(d, L, w, o, 32);
|
|
10963
10963
|
}
|
|
10964
|
-
function z(d, L, w, o,
|
|
10964
|
+
function z(d, L, w, o, k) {
|
|
10965
10965
|
var F, K = 0;
|
|
10966
|
-
for (F = 0; F <
|
|
10966
|
+
for (F = 0; F < k; ++F)
|
|
10967
10967
|
K |= d[L + F] ^ w[o + F];
|
|
10968
10968
|
return (1 & K - 1 >>> 8) - 1;
|
|
10969
10969
|
}
|
|
@@ -10972,9 +10972,9 @@ function gs() {
|
|
|
10972
10972
|
return V(L, d), L[0] & 1;
|
|
10973
10973
|
}
|
|
10974
10974
|
function Z(d, L, w) {
|
|
10975
|
-
var o,
|
|
10976
|
-
for (ue(d[0], l), ue(d[1], b), ue(d[2], b), ue(d[3], l),
|
|
10977
|
-
o = w[
|
|
10975
|
+
var o, k;
|
|
10976
|
+
for (ue(d[0], l), ue(d[1], b), ue(d[2], b), ue(d[3], l), k = 255; k >= 0; --k)
|
|
10977
|
+
o = w[k / 8 | 0] >> (k & 7) & 1, n(d, L, o), i(L, d), i(d, d), n(d, L, o);
|
|
10978
10978
|
}
|
|
10979
10979
|
function te(d, L) {
|
|
10980
10980
|
var w = [_(), _(), _(), _()];
|
|
@@ -11001,8 +11001,8 @@ function gs() {
|
|
|
11001
11001
|
d[0] += o - 1 + 37 * (o - 1);
|
|
11002
11002
|
}
|
|
11003
11003
|
function Ie(d, L, w) {
|
|
11004
|
-
for (var o,
|
|
11005
|
-
o =
|
|
11004
|
+
for (var o, k = ~(w - 1), F = 0; F < 16; ++F)
|
|
11005
|
+
o = k & (d[F] ^ L[F]), d[F] ^= o, L[F] ^= o;
|
|
11006
11006
|
}
|
|
11007
11007
|
function _(d) {
|
|
11008
11008
|
var L, w = new Float64Array(16);
|
|
@@ -11023,8 +11023,8 @@ function gs() {
|
|
|
11023
11023
|
pe(d, L, L);
|
|
11024
11024
|
}
|
|
11025
11025
|
function pe(d, L, w) {
|
|
11026
|
-
var o,
|
|
11027
|
-
o = L[0], F += o * Fe, K += o * Ge, Q += o * je, se += o * ze, le += o * qe, q += o * Qe, ie += o * Je, fe += o * He, Ee += o * Ye, ge += o * We, ke += o * Xe, we += o * Ze, Ae += o * Le, Ne += o * Me, Be += o * _e, Te += o * $e, o = L[1], K += o * Fe, Q += o * Ge, se += o * je, le += o * ze, q += o * qe, ie += o * Qe, fe += o * Je, Ee += o * He, ge += o * Ye, ke += o * We, we += o * Xe, Ae += o * Ze, Ne += o * Le, Be += o * Me, Te += o * _e, Re += o * $e, o = L[2], Q += o * Fe, se += o * Ge, le += o * je, q += o * ze, ie += o * qe, fe += o * Qe, Ee += o * Je, ge += o * He, ke += o * Ye, we += o * We, Ae += o * Xe, Ne += o * Ze, Be += o * Le, Te += o * Me, Re += o * _e, Ue += o * $e, o = L[3], se += o * Fe, le += o * Ge, q += o * je, ie += o * ze, fe += o * qe, Ee += o * Qe, ge += o * Je, ke += o * He, we += o * Ye, Ae += o * We, Ne += o * Xe, Be += o * Ze, Te += o * Le, Re += o * Me, Ue += o * _e, J += o * $e, o = L[4], le += o * Fe, q += o * Ge, ie += o * je, fe += o * ze, Ee += o * qe, ge += o * Qe, ke += o * Je, we += o * He, Ae += o * Ye, Ne += o * We, Be += o * Xe, Te += o * Ze, Re += o * Le, Ue += o * Me, J += o * _e, ee += o * $e, o = L[5], q += o * Fe, ie += o * Ge, fe += o * je, Ee += o * ze, ge += o * qe, ke += o * Qe, we += o * Je, Ae += o * He, Ne += o * Ye, Be += o * We, Te += o * Xe, Re += o * Ze, Ue += o * Le, J += o * Me, ee += o * _e, ae += o * $e, o = L[6], ie += o * Fe, fe += o * Ge, Ee += o * je, ge += o * ze, ke += o * qe, we += o * Qe, Ae += o * Je, Ne += o * He, Be += o * Ye, Te += o * We, Re += o * Xe, Ue += o * Ze, J += o * Le, ee += o * Me, ae += o * _e, me += o * $e, o = L[7], fe += o * Fe, Ee += o * Ge, ge += o * je, ke += o * ze, we += o * qe, Ae += o * Qe, Ne += o * Je, Be += o * He, Te += o * Ye, Re += o * We, Ue += o * Xe, J += o * Ze, ee += o * Le, ae += o * Me, me += o * _e, Ke += o * $e, o = L[8], Ee += o * Fe, ge += o * Ge, ke += o * je, we += o * ze, Ae += o * qe, Ne += o * Qe, Be += o * Je, Te += o * He, Re += o * Ye, Ue += o * We, J += o * Xe, ee += o * Ze, ae += o * Le, me += o * Me, Ke += o * _e, ot += o * $e, o = L[9], ge += o * Fe, ke += o * Ge, we += o * je, Ae += o * ze, Ne += o * qe, Be += o * Qe, Te += o * Je, Re += o * He, Ue += o * Ye, J += o * We, ee += o * Xe, ae += o * Ze, me += o * Le, Ke += o * Me, ot += o * _e, lt += o * $e, o = L[10], ke += o * Fe, we += o * Ge, Ae += o * je, Ne += o * ze, Be += o * qe, Te += o * Qe, Re += o * Je, Ue += o * He, J += o * Ye, ee += o * We, ae += o * Xe, me += o * Ze, Ke += o * Le, ot += o * Me, lt += o * _e, vt += o * $e, o = L[11], we += o * Fe, Ae += o * Ge, Ne += o * je, Be += o * ze, Te += o * qe, Re += o * Qe, Ue += o * Je, J += o * He, ee += o * Ye, ae += o * We, me += o * Xe, Ke += o * Ze, ot += o * Le, lt += o * Me, vt += o * _e, bt += o * $e, o = L[12], Ae += o * Fe, Ne += o * Ge, Be += o * je, Te += o * ze, Re += o * qe, Ue += o * Qe, J += o * Je, ee += o * He, ae += o * Ye, me += o * We, Ke += o * Xe, ot += o * Ze, lt += o * Le, vt += o * Me, bt += o * _e, Bt += o * $e, o = L[13], Ne += o * Fe, Be += o * Ge, Te += o * je, Re += o * ze, Ue += o * qe, J += o * Qe, ee += o * Je, ae += o * He, me += o * Ye, Ke += o * We, ot += o * Xe, lt += o * Ze, vt += o * Le, bt += o * Me, Bt += o * _e, Rt += o * $e, o = L[14], Be += o * Fe, Te += o * Ge, Re += o * je, Ue += o * ze, J += o * qe, ee += o * Qe, ae += o * Je, me += o * He, Ke += o * Ye, ot += o * We, lt += o * Xe, vt += o * Ze, bt += o * Le, Bt += o * Me, Rt += o * _e, Mt += o * $e, o = L[15], Te += o * Fe, Re += o * Ge, Ue += o * je, J += o * ze, ee += o * qe, ae += o * Qe, me += o * Je, Ke += o * He, ot += o * Ye, lt += o * We, vt += o * Xe, bt += o * Ze, Bt += o * Le, Rt += o * Me, Mt += o * _e, zt += o * $e, F += 38 * Re, K += 38 * Ue, Q += 38 * J, se += 38 * ee, le += 38 * ae, q += 38 * me, ie += 38 * Ke, fe += 38 * ot, Ee += 38 * lt, ge += 38 * vt, ke += 38 * bt, we += 38 * Bt, Ae += 38 * Rt, Ne += 38 * Mt, Be += 38 * zt,
|
|
11026
|
+
var o, k, F = 0, K = 0, Q = 0, se = 0, le = 0, q = 0, ie = 0, fe = 0, Ee = 0, ge = 0, ke = 0, we = 0, Ae = 0, Ne = 0, Be = 0, Te = 0, Re = 0, Ue = 0, J = 0, ee = 0, ae = 0, me = 0, Ke = 0, ot = 0, lt = 0, vt = 0, bt = 0, Bt = 0, Rt = 0, Mt = 0, zt = 0, Fe = w[0], Ge = w[1], je = w[2], ze = w[3], qe = w[4], Qe = w[5], Je = w[6], He = w[7], Ye = w[8], We = w[9], Xe = w[10], Ze = w[11], Le = w[12], Me = w[13], _e = w[14], $e = w[15];
|
|
11027
|
+
o = L[0], F += o * Fe, K += o * Ge, Q += o * je, se += o * ze, le += o * qe, q += o * Qe, ie += o * Je, fe += o * He, Ee += o * Ye, ge += o * We, ke += o * Xe, we += o * Ze, Ae += o * Le, Ne += o * Me, Be += o * _e, Te += o * $e, o = L[1], K += o * Fe, Q += o * Ge, se += o * je, le += o * ze, q += o * qe, ie += o * Qe, fe += o * Je, Ee += o * He, ge += o * Ye, ke += o * We, we += o * Xe, Ae += o * Ze, Ne += o * Le, Be += o * Me, Te += o * _e, Re += o * $e, o = L[2], Q += o * Fe, se += o * Ge, le += o * je, q += o * ze, ie += o * qe, fe += o * Qe, Ee += o * Je, ge += o * He, ke += o * Ye, we += o * We, Ae += o * Xe, Ne += o * Ze, Be += o * Le, Te += o * Me, Re += o * _e, Ue += o * $e, o = L[3], se += o * Fe, le += o * Ge, q += o * je, ie += o * ze, fe += o * qe, Ee += o * Qe, ge += o * Je, ke += o * He, we += o * Ye, Ae += o * We, Ne += o * Xe, Be += o * Ze, Te += o * Le, Re += o * Me, Ue += o * _e, J += o * $e, o = L[4], le += o * Fe, q += o * Ge, ie += o * je, fe += o * ze, Ee += o * qe, ge += o * Qe, ke += o * Je, we += o * He, Ae += o * Ye, Ne += o * We, Be += o * Xe, Te += o * Ze, Re += o * Le, Ue += o * Me, J += o * _e, ee += o * $e, o = L[5], q += o * Fe, ie += o * Ge, fe += o * je, Ee += o * ze, ge += o * qe, ke += o * Qe, we += o * Je, Ae += o * He, Ne += o * Ye, Be += o * We, Te += o * Xe, Re += o * Ze, Ue += o * Le, J += o * Me, ee += o * _e, ae += o * $e, o = L[6], ie += o * Fe, fe += o * Ge, Ee += o * je, ge += o * ze, ke += o * qe, we += o * Qe, Ae += o * Je, Ne += o * He, Be += o * Ye, Te += o * We, Re += o * Xe, Ue += o * Ze, J += o * Le, ee += o * Me, ae += o * _e, me += o * $e, o = L[7], fe += o * Fe, Ee += o * Ge, ge += o * je, ke += o * ze, we += o * qe, Ae += o * Qe, Ne += o * Je, Be += o * He, Te += o * Ye, Re += o * We, Ue += o * Xe, J += o * Ze, ee += o * Le, ae += o * Me, me += o * _e, Ke += o * $e, o = L[8], Ee += o * Fe, ge += o * Ge, ke += o * je, we += o * ze, Ae += o * qe, Ne += o * Qe, Be += o * Je, Te += o * He, Re += o * Ye, Ue += o * We, J += o * Xe, ee += o * Ze, ae += o * Le, me += o * Me, Ke += o * _e, ot += o * $e, o = L[9], ge += o * Fe, ke += o * Ge, we += o * je, Ae += o * ze, Ne += o * qe, Be += o * Qe, Te += o * Je, Re += o * He, Ue += o * Ye, J += o * We, ee += o * Xe, ae += o * Ze, me += o * Le, Ke += o * Me, ot += o * _e, lt += o * $e, o = L[10], ke += o * Fe, we += o * Ge, Ae += o * je, Ne += o * ze, Be += o * qe, Te += o * Qe, Re += o * Je, Ue += o * He, J += o * Ye, ee += o * We, ae += o * Xe, me += o * Ze, Ke += o * Le, ot += o * Me, lt += o * _e, vt += o * $e, o = L[11], we += o * Fe, Ae += o * Ge, Ne += o * je, Be += o * ze, Te += o * qe, Re += o * Qe, Ue += o * Je, J += o * He, ee += o * Ye, ae += o * We, me += o * Xe, Ke += o * Ze, ot += o * Le, lt += o * Me, vt += o * _e, bt += o * $e, o = L[12], Ae += o * Fe, Ne += o * Ge, Be += o * je, Te += o * ze, Re += o * qe, Ue += o * Qe, J += o * Je, ee += o * He, ae += o * Ye, me += o * We, Ke += o * Xe, ot += o * Ze, lt += o * Le, vt += o * Me, bt += o * _e, Bt += o * $e, o = L[13], Ne += o * Fe, Be += o * Ge, Te += o * je, Re += o * ze, Ue += o * qe, J += o * Qe, ee += o * Je, ae += o * He, me += o * Ye, Ke += o * We, ot += o * Xe, lt += o * Ze, vt += o * Le, bt += o * Me, Bt += o * _e, Rt += o * $e, o = L[14], Be += o * Fe, Te += o * Ge, Re += o * je, Ue += o * ze, J += o * qe, ee += o * Qe, ae += o * Je, me += o * He, Ke += o * Ye, ot += o * We, lt += o * Xe, vt += o * Ze, bt += o * Le, Bt += o * Me, Rt += o * _e, Mt += o * $e, o = L[15], Te += o * Fe, Re += o * Ge, Ue += o * je, J += o * ze, ee += o * qe, ae += o * Qe, me += o * Je, Ke += o * He, ot += o * Ye, lt += o * We, vt += o * Xe, bt += o * Ze, Bt += o * Le, Rt += o * Me, Mt += o * _e, zt += o * $e, F += 38 * Re, K += 38 * Ue, Q += 38 * J, se += 38 * ee, le += 38 * ae, q += 38 * me, ie += 38 * Ke, fe += 38 * ot, Ee += 38 * lt, ge += 38 * vt, ke += 38 * bt, we += 38 * Bt, Ae += 38 * Rt, Ne += 38 * Mt, Be += 38 * zt, k = 1, o = F + k + 65535, k = Math.floor(o / 65536), F = o - k * 65536, o = K + k + 65535, k = Math.floor(o / 65536), K = o - k * 65536, o = Q + k + 65535, k = Math.floor(o / 65536), Q = o - k * 65536, o = se + k + 65535, k = Math.floor(o / 65536), se = o - k * 65536, o = le + k + 65535, k = Math.floor(o / 65536), le = o - k * 65536, o = q + k + 65535, k = Math.floor(o / 65536), q = o - k * 65536, o = ie + k + 65535, k = Math.floor(o / 65536), ie = o - k * 65536, o = fe + k + 65535, k = Math.floor(o / 65536), fe = o - k * 65536, o = Ee + k + 65535, k = Math.floor(o / 65536), Ee = o - k * 65536, o = ge + k + 65535, k = Math.floor(o / 65536), ge = o - k * 65536, o = ke + k + 65535, k = Math.floor(o / 65536), ke = o - k * 65536, o = we + k + 65535, k = Math.floor(o / 65536), we = o - k * 65536, o = Ae + k + 65535, k = Math.floor(o / 65536), Ae = o - k * 65536, o = Ne + k + 65535, k = Math.floor(o / 65536), Ne = o - k * 65536, o = Be + k + 65535, k = Math.floor(o / 65536), Be = o - k * 65536, o = Te + k + 65535, k = Math.floor(o / 65536), Te = o - k * 65536, F += k - 1 + 37 * (k - 1), k = 1, o = F + k + 65535, k = Math.floor(o / 65536), F = o - k * 65536, o = K + k + 65535, k = Math.floor(o / 65536), K = o - k * 65536, o = Q + k + 65535, k = Math.floor(o / 65536), Q = o - k * 65536, o = se + k + 65535, k = Math.floor(o / 65536), se = o - k * 65536, o = le + k + 65535, k = Math.floor(o / 65536), le = o - k * 65536, o = q + k + 65535, k = Math.floor(o / 65536), q = o - k * 65536, o = ie + k + 65535, k = Math.floor(o / 65536), ie = o - k * 65536, o = fe + k + 65535, k = Math.floor(o / 65536), fe = o - k * 65536, o = Ee + k + 65535, k = Math.floor(o / 65536), Ee = o - k * 65536, o = ge + k + 65535, k = Math.floor(o / 65536), ge = o - k * 65536, o = ke + k + 65535, k = Math.floor(o / 65536), ke = o - k * 65536, o = we + k + 65535, k = Math.floor(o / 65536), we = o - k * 65536, o = Ae + k + 65535, k = Math.floor(o / 65536), Ae = o - k * 65536, o = Ne + k + 65535, k = Math.floor(o / 65536), Ne = o - k * 65536, o = Be + k + 65535, k = Math.floor(o / 65536), Be = o - k * 65536, o = Te + k + 65535, k = Math.floor(o / 65536), Te = o - k * 65536, F += k - 1 + 37 * (k - 1), d[0] = F, d[1] = K, d[2] = Q, d[3] = se, d[4] = le, d[5] = q, d[6] = ie, d[7] = fe, d[8] = Ee, d[9] = ge, d[10] = ke, d[11] = we, d[12] = Ae, d[13] = Ne, d[14] = Be, d[15] = Te;
|
|
11028
11028
|
}
|
|
11029
11029
|
return Pr;
|
|
11030
11030
|
}
|
|
@@ -11377,8 +11377,8 @@ function Cs() {
|
|
|
11377
11377
|
}
|
|
11378
11378
|
var c = m.authenticatedAttributes || [];
|
|
11379
11379
|
if (c.length > 0) {
|
|
11380
|
-
for (var i = !1, n = !1,
|
|
11381
|
-
var V = c[
|
|
11380
|
+
for (var i = !1, n = !1, T = 0; T < c.length; ++T) {
|
|
11381
|
+
var V = c[T];
|
|
11382
11382
|
if (!i && V.type === t.pki.oids.contentType) {
|
|
11383
11383
|
if (i = !0, n)
|
|
11384
11384
|
break;
|
|
@@ -11515,8 +11515,8 @@ function Cs() {
|
|
|
11515
11515
|
e.Type.SET,
|
|
11516
11516
|
!0,
|
|
11517
11517
|
[]
|
|
11518
|
-
),
|
|
11519
|
-
var V = i.authenticatedAttributes[
|
|
11518
|
+
), T = 0; T < i.authenticatedAttributes.length; ++T) {
|
|
11519
|
+
var V = i.authenticatedAttributes[T];
|
|
11520
11520
|
V.type === t.pki.oids.messageDigest ? V.value = m[i.digestAlgorithm].digest() : V.type === t.pki.oids.signingTime && (V.value || (V.value = R)), n.value.push(l(V)), i.authenticatedAttributesAsn1.value.push(l(V));
|
|
11521
11521
|
}
|
|
11522
11522
|
v = e.toDer(n).getBytes(), i.md.start().update(v);
|
|
@@ -12171,16 +12171,16 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12171
12171
|
emits: /* @__PURE__ */ Et(["send", "cancel", "clear", "change-record", "change-collapse", "change-theme", "change-aside-width", "click-logo", "bubble-event", "close-workspace", "scroll-bottom"], ["update:messages", "update:modelValue", "update:loading", "update:record-id"]),
|
|
12172
12172
|
setup(t, { expose: e, emit: a }) {
|
|
12173
12173
|
Wa((J) => ({
|
|
12174
|
-
|
|
12175
|
-
|
|
12176
|
-
|
|
12177
|
-
|
|
12178
|
-
|
|
12179
|
-
|
|
12180
|
-
|
|
12181
|
-
|
|
12182
|
-
|
|
12183
|
-
|
|
12174
|
+
d12ae074: J.primaryColor,
|
|
12175
|
+
v22505420: g.value,
|
|
12176
|
+
v4f354832: f.value[0],
|
|
12177
|
+
v4f3547f4: f.value[1],
|
|
12178
|
+
v4f3547b6: f.value[2],
|
|
12179
|
+
v4f354778: f.value[3],
|
|
12180
|
+
v4f35473a: f.value[4],
|
|
12181
|
+
v4d772450: Be.value,
|
|
12182
|
+
v65471b75: Te.value,
|
|
12183
|
+
ca7bf4d0: Ne.value
|
|
12184
12184
|
}));
|
|
12185
12185
|
const p = t, I = parseFloat(getComputedStyle(document.documentElement).fontSize), S = tt(Fr), f = De(() => ss(p.primaryColor, 5, 0.8, 4));
|
|
12186
12186
|
function r(J) {
|
|
@@ -12195,7 +12195,7 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12195
12195
|
E.value = !1, s("cancel");
|
|
12196
12196
|
};
|
|
12197
12197
|
function B(J) {
|
|
12198
|
-
u.value = J, y.value = J?.id, $.value && L(!1), s("change-record", J);
|
|
12198
|
+
u.value = J, y.value = J?.id, $.value && L(!1), T.value = !1, s("change-record", J);
|
|
12199
12199
|
}
|
|
12200
12200
|
At(
|
|
12201
12201
|
() => y.value,
|
|
@@ -12209,7 +12209,7 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12209
12209
|
const R = De(() => {
|
|
12210
12210
|
if (b.value[b.value.length - 1]?.nextTips)
|
|
12211
12211
|
return b.value[b.value.length - 1].nextTips;
|
|
12212
|
-
}), c = De(() => b.value.filter((J) => J.role === "user")), i = tt(), n = tt(!1),
|
|
12212
|
+
}), c = De(() => b.value.filter((J) => J.role === "user")), i = tt(), n = tt(!1), T = tt(!1), V = tt(!1);
|
|
12213
12213
|
let O = null, D = !1, M = 0;
|
|
12214
12214
|
const x = () => {
|
|
12215
12215
|
!p.autoScroll || n.value || qr(() => {
|
|
@@ -12224,7 +12224,7 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12224
12224
|
const J = i.value;
|
|
12225
12225
|
if (!J) return;
|
|
12226
12226
|
const ee = J.scrollHeight - J.scrollTop - J.clientHeight < 50, ae = J.scrollHeight > J.clientHeight;
|
|
12227
|
-
|
|
12227
|
+
T.value = ae && !ee, !(!p.autoScroll || !E.value) && (!ee && !D ? (D = !0, n.value = !0, O && clearTimeout(O), O = setTimeout(() => {
|
|
12228
12228
|
n.value = !1, D = !1, E.value && G();
|
|
12229
12229
|
}, p.autoScrollPauseTime)) : ee && (D = !1, n.value = !1, O && (clearTimeout(O), O = null)));
|
|
12230
12230
|
};
|
|
@@ -12296,7 +12296,7 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12296
12296
|
function o(J, ee) {
|
|
12297
12297
|
s("bubble-event", J, ee);
|
|
12298
12298
|
}
|
|
12299
|
-
function
|
|
12299
|
+
function k() {
|
|
12300
12300
|
s("close-workspace");
|
|
12301
12301
|
}
|
|
12302
12302
|
function F(J) {
|
|
@@ -12323,7 +12323,7 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12323
12323
|
me && (me.scrollIntoView({ behavior: "smooth", block: "center" }), V.value = !1);
|
|
12324
12324
|
}
|
|
12325
12325
|
function ie() {
|
|
12326
|
-
u.value = null, y.value = void 0, b.value = [], $.value && L(!1), s("clear");
|
|
12326
|
+
u.value = null, y.value = void 0, b.value = [], $.value && L(!1), T.value = !1, s("clear");
|
|
12327
12327
|
}
|
|
12328
12328
|
function fe() {
|
|
12329
12329
|
pe.value = !pe.value;
|
|
@@ -12640,7 +12640,7 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12640
12640
|
])) : Ve("", !0),
|
|
12641
12641
|
Ct(Zr, { name: "scroll-to-bottom-fade" }, {
|
|
12642
12642
|
default: xe(() => [
|
|
12643
|
-
|
|
12643
|
+
T.value ? (ce(), de("div", {
|
|
12644
12644
|
key: 0,
|
|
12645
12645
|
class: "kernelift-chat-container__scroll-to-bottom",
|
|
12646
12646
|
onClick: K,
|
|
@@ -12737,7 +12737,7 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12737
12737
|
re("div", Zs, [
|
|
12738
12738
|
re("i", {
|
|
12739
12739
|
class: "material-symbols--close",
|
|
12740
|
-
onClick: ee[12] || (ee[12] = (ae) =>
|
|
12740
|
+
onClick: ee[12] || (ee[12] = (ae) => k())
|
|
12741
12741
|
})
|
|
12742
12742
|
]),
|
|
12743
12743
|
ye(J.$slots, "workspace", {
|
|
@@ -12749,7 +12749,7 @@ const bs = { button: { think: "深度思考", net: "联网搜索", copyCode: "
|
|
|
12749
12749
|
])
|
|
12750
12750
|
], 2));
|
|
12751
12751
|
}
|
|
12752
|
-
}), no = /* @__PURE__ */ kt($s, [["__scopeId", "data-v-
|
|
12752
|
+
}), no = /* @__PURE__ */ kt($s, [["__scopeId", "data-v-b0998e0d"]]);
|
|
12753
12753
|
class io {
|
|
12754
12754
|
controller;
|
|
12755
12755
|
buffer;
|