@ledgerhq/device-trusted-app-kit-ledger-keyring-protocol 0.0.0-develop-20250904001204 → 0.0.0-e2e-speculos-20250904125723

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (535) hide show
  1. package/lib/cjs/api/LedgerKeyringProtocol.js +1 -1
  2. package/lib/cjs/api/LedgerKeyringProtocol.js.map +1 -1
  3. package/lib/cjs/api/LedgerKeyringProtocolBuilder.js +1 -1
  4. package/lib/cjs/api/LedgerKeyringProtocolBuilder.js.map +3 -3
  5. package/lib/cjs/api/app-binder/AddToTrustchainDeviceActionTypes.js +1 -1
  6. package/lib/cjs/api/app-binder/AddToTrustchainDeviceActionTypes.js.map +3 -3
  7. package/lib/cjs/api/app-binder/AuthenticateDeviceActionTypes.js +1 -1
  8. package/lib/cjs/api/app-binder/AuthenticateDeviceActionTypes.js.map +3 -3
  9. package/lib/cjs/api/app-binder/Errors.js +2 -0
  10. package/lib/cjs/api/app-binder/Errors.js.map +7 -0
  11. package/lib/cjs/api/app-binder/GetAppNameCommandTypes.js +2 -0
  12. package/lib/cjs/api/app-binder/GetAppNameCommandTypes.js.map +7 -0
  13. package/lib/cjs/api/app-binder/GetSeedIdCommandTypes.js +2 -0
  14. package/lib/cjs/api/app-binder/GetSeedIdCommandTypes.js.map +7 -0
  15. package/lib/cjs/api/app-binder/GetVersionCommandTypes.js +1 -1
  16. package/lib/cjs/api/app-binder/GetVersionCommandTypes.js.map +1 -1
  17. package/lib/cjs/api/app-binder/InitCommandTypes.js +2 -0
  18. package/lib/cjs/api/app-binder/InitCommandTypes.js.map +7 -0
  19. package/lib/cjs/api/app-binder/KeypairFromBytes.js +2 -0
  20. package/lib/cjs/api/app-binder/KeypairFromBytes.js.map +7 -0
  21. package/lib/cjs/api/app-binder/LKRPTypes.js +2 -0
  22. package/lib/cjs/api/app-binder/LKRPTypes.js.map +7 -0
  23. package/lib/cjs/api/app-binder/ParseStreamBlockCommandCommandTypes.js +2 -0
  24. package/lib/cjs/api/app-binder/ParseStreamBlockCommandCommandTypes.js.map +7 -0
  25. package/lib/cjs/api/app-binder/ParseStreamBlockHeaderCommandTypes.js +2 -0
  26. package/lib/cjs/api/app-binder/ParseStreamBlockHeaderCommandTypes.js.map +7 -0
  27. package/lib/cjs/api/app-binder/ParseStreamBlockSignatureTypes.js +2 -0
  28. package/lib/cjs/api/app-binder/ParseStreamBlockSignatureTypes.js.map +7 -0
  29. package/lib/cjs/api/app-binder/SetTrustedMemberTypes.js +2 -0
  30. package/lib/cjs/api/app-binder/SetTrustedMemberTypes.js.map +7 -0
  31. package/lib/cjs/api/app-binder/SignBlockCommandTypes.js +2 -0
  32. package/lib/cjs/api/app-binder/SignBlockCommandTypes.js.map +7 -0
  33. package/lib/cjs/api/app-binder/SignBlockHeaderCommandTypes.js +2 -0
  34. package/lib/cjs/api/app-binder/SignBlockHeaderCommandTypes.js.map +7 -0
  35. package/lib/cjs/api/app-binder/SignBlockSignatureCommandTypes.js +2 -0
  36. package/lib/cjs/api/app-binder/SignBlockSignatureCommandTypes.js.map +7 -0
  37. package/lib/cjs/api/app-binder/SignBlockSingleCommandTypes.js +2 -0
  38. package/lib/cjs/api/app-binder/SignBlockSingleCommandTypes.js.map +7 -0
  39. package/lib/cjs/api/index.js +1 -1
  40. package/lib/cjs/api/index.js.map +2 -2
  41. package/lib/cjs/internal/DefaultLedgerKeyringProtocol.js +1 -1
  42. package/lib/cjs/internal/DefaultLedgerKeyringProtocol.js.map +3 -3
  43. package/lib/cjs/internal/app-binder/LedgerKeyringProtocolBinder.js +1 -1
  44. package/lib/cjs/internal/app-binder/LedgerKeyringProtocolBinder.js.map +3 -3
  45. package/lib/cjs/internal/app-binder/command/GetAppNameCommand.js +1 -1
  46. package/lib/cjs/internal/app-binder/command/GetAppNameCommand.js.map +2 -2
  47. package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.js +1 -1
  48. package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.js.map +3 -3
  49. package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.test.js +2 -2
  50. package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.test.js.map +3 -3
  51. package/lib/cjs/internal/app-binder/command/GetVersionCommand.js.map +2 -2
  52. package/lib/cjs/internal/app-binder/command/InitCommand.js +1 -1
  53. package/lib/cjs/internal/app-binder/command/InitCommand.js.map +2 -2
  54. package/lib/cjs/internal/app-binder/command/InitCommand.test.js +1 -1
  55. package/lib/cjs/internal/app-binder/command/InitCommand.test.js.map +2 -2
  56. package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.js +1 -1
  57. package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.js.map +2 -2
  58. package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.test.js +1 -1
  59. package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.test.js.map +2 -2
  60. package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.js.map +2 -2
  61. package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.test.js +1 -1
  62. package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.test.js.map +2 -2
  63. package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.js +1 -1
  64. package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.js.map +2 -2
  65. package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.test.js.map +2 -2
  66. package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.js +1 -1
  67. package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.js.map +3 -3
  68. package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.test.js.map +2 -2
  69. package/lib/cjs/internal/app-binder/command/SignBlockHeader.js +1 -1
  70. package/lib/cjs/internal/app-binder/command/SignBlockHeader.js.map +3 -3
  71. package/lib/cjs/internal/app-binder/command/SignBlockHeader.test.js +1 -1
  72. package/lib/cjs/internal/app-binder/command/SignBlockHeader.test.js.map +3 -3
  73. package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.js +1 -1
  74. package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.js.map +2 -2
  75. package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.test.js +1 -1
  76. package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.test.js.map +2 -2
  77. package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.js +1 -1
  78. package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.js.map +2 -2
  79. package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.test.js +1 -1
  80. package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.test.js.map +2 -2
  81. package/lib/cjs/internal/app-binder/device-action/AddToTrustchainDeviceAction.js +1 -1
  82. package/lib/cjs/internal/app-binder/device-action/AddToTrustchainDeviceAction.js.map +3 -3
  83. package/lib/cjs/internal/app-binder/device-action/AuthenticateDeviceAction.js +2 -0
  84. package/lib/cjs/internal/app-binder/device-action/AuthenticateDeviceAction.js.map +7 -0
  85. package/lib/cjs/internal/app-binder/task/InitTask.js +1 -1
  86. package/lib/cjs/internal/app-binder/task/InitTask.js.map +3 -3
  87. package/lib/cjs/internal/app-binder/task/ParseStreamToDeviceTask.js +1 -1
  88. package/lib/cjs/internal/app-binder/task/ParseStreamToDeviceTask.js.map +3 -3
  89. package/lib/cjs/internal/app-binder/task/SignBlockTask.js +1 -1
  90. package/lib/cjs/internal/app-binder/task/SignBlockTask.js.map +3 -3
  91. package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.js +1 -1
  92. package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.js.map +3 -3
  93. package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.test.js +1 -1
  94. package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.test.js.map +3 -3
  95. package/lib/cjs/internal/app-binder/task/utils/TrustedProperties.js +1 -1
  96. package/lib/cjs/internal/app-binder/task/utils/TrustedProperties.js.map +3 -3
  97. package/lib/cjs/internal/di.js +1 -1
  98. package/lib/cjs/internal/di.js.map +3 -3
  99. package/lib/cjs/internal/externalTypes.js +1 -1
  100. package/lib/cjs/internal/externalTypes.js.map +2 -2
  101. package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.js +1 -1
  102. package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.js.map +3 -3
  103. package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js +1 -1
  104. package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js.map +3 -3
  105. package/lib/cjs/internal/lkrp-datasource/data/LKRPDataSource.js +1 -1
  106. package/lib/cjs/internal/lkrp-datasource/data/LKRPDataSource.js.map +1 -1
  107. package/lib/cjs/internal/use-cases/authentication/AuthenticateUseCase.js +1 -1
  108. package/lib/cjs/internal/use-cases/authentication/AuthenticateUseCase.js.map +3 -3
  109. package/lib/cjs/internal/use-cases/di/useCasesModule.js +1 -1
  110. package/lib/cjs/internal/use-cases/di/useCasesModule.js.map +3 -3
  111. package/lib/cjs/internal/use-cases/di/useCasesTypes.js +1 -1
  112. package/lib/cjs/internal/use-cases/di/useCasesTypes.js.map +2 -2
  113. package/lib/cjs/internal/utils/LKRPBlock.js +4 -4
  114. package/lib/cjs/internal/utils/LKRPBlock.js.map +3 -3
  115. package/lib/cjs/internal/utils/LKRPBlock.test.js +3 -3
  116. package/lib/cjs/internal/utils/LKRPBlock.test.js.map +3 -3
  117. package/lib/cjs/internal/utils/LKRPBlockStream.js +2 -2
  118. package/lib/cjs/internal/utils/LKRPBlockStream.js.map +3 -3
  119. package/lib/cjs/internal/utils/LKRPBlockStream.test.js +3 -3
  120. package/lib/cjs/internal/utils/LKRPBlockStream.test.js.map +3 -3
  121. package/lib/cjs/internal/utils/LKRPCommand.js +2 -2
  122. package/lib/cjs/internal/utils/LKRPCommand.js.map +3 -3
  123. package/lib/cjs/internal/utils/LKRPCommand.test.js +1 -1
  124. package/lib/cjs/internal/utils/LKRPCommand.test.js.map +3 -3
  125. package/lib/cjs/internal/utils/TLVBuilder.js +2 -0
  126. package/lib/cjs/internal/utils/TLVBuilder.js.map +7 -0
  127. package/lib/cjs/internal/utils/TLVParser.js +1 -1
  128. package/lib/cjs/internal/utils/TLVParser.js.map +3 -3
  129. package/lib/cjs/internal/utils/TLVParser.test.js +1 -1
  130. package/lib/cjs/internal/utils/TLVParser.test.js.map +3 -3
  131. package/lib/cjs/internal/{models/Tags.js → utils/TLVTags.js} +1 -1
  132. package/lib/cjs/internal/{models/Tags.js.map → utils/TLVTags.js.map} +2 -2
  133. package/lib/cjs/internal/utils/crypto.js +2 -0
  134. package/lib/cjs/internal/utils/crypto.js.map +7 -0
  135. package/lib/cjs/internal/utils/hex.js +2 -0
  136. package/lib/cjs/internal/utils/hex.js.map +7 -0
  137. package/lib/cjs/internal/utils/required.js +1 -1
  138. package/lib/cjs/internal/utils/required.js.map +2 -2
  139. package/lib/cjs/internal/utils/types.js +2 -0
  140. package/lib/cjs/internal/utils/types.js.map +7 -0
  141. package/lib/cjs/package.json +2 -3
  142. package/lib/esm/api/LedgerKeyringProtocolBuilder.js +1 -1
  143. package/lib/esm/api/LedgerKeyringProtocolBuilder.js.map +3 -3
  144. package/lib/esm/api/app-binder/AddToTrustchainDeviceActionTypes.js +0 -1
  145. package/lib/esm/api/app-binder/AddToTrustchainDeviceActionTypes.js.map +4 -4
  146. package/lib/esm/api/app-binder/AuthenticateDeviceActionTypes.js +0 -1
  147. package/lib/esm/api/app-binder/AuthenticateDeviceActionTypes.js.map +4 -4
  148. package/lib/esm/api/app-binder/Errors.js +2 -0
  149. package/lib/esm/api/app-binder/Errors.js.map +7 -0
  150. package/lib/esm/api/app-binder/GetAppNameCommandTypes.js +1 -0
  151. package/lib/esm/api/app-binder/GetSeedIdCommandTypes.js +1 -0
  152. package/lib/esm/api/app-binder/InitCommandTypes.js +1 -0
  153. package/lib/esm/api/app-binder/KeypairFromBytes.js +2 -0
  154. package/lib/esm/api/app-binder/KeypairFromBytes.js.map +7 -0
  155. package/lib/esm/api/app-binder/LKRPTypes.js +2 -0
  156. package/lib/esm/api/app-binder/LKRPTypes.js.map +7 -0
  157. package/lib/esm/api/app-binder/ParseStreamBlockCommandCommandTypes.js +1 -0
  158. package/lib/esm/api/app-binder/ParseStreamBlockHeaderCommandTypes.js +1 -0
  159. package/lib/esm/api/app-binder/ParseStreamBlockSignatureTypes.js +1 -0
  160. package/lib/esm/api/app-binder/SetTrustedMemberTypes.js +1 -0
  161. package/lib/esm/api/app-binder/SetTrustedMemberTypes.js.map +7 -0
  162. package/lib/esm/api/app-binder/SignBlockCommandTypes.js +1 -0
  163. package/lib/esm/api/app-binder/SignBlockCommandTypes.js.map +7 -0
  164. package/lib/esm/api/app-binder/SignBlockHeaderCommandTypes.js +1 -0
  165. package/lib/esm/api/app-binder/SignBlockHeaderCommandTypes.js.map +7 -0
  166. package/lib/esm/api/app-binder/SignBlockSignatureCommandTypes.js +1 -0
  167. package/lib/esm/api/app-binder/SignBlockSignatureCommandTypes.js.map +7 -0
  168. package/lib/esm/api/app-binder/SignBlockSingleCommandTypes.js +1 -0
  169. package/lib/esm/api/app-binder/SignBlockSingleCommandTypes.js.map +7 -0
  170. package/lib/esm/api/index.js +1 -1
  171. package/lib/esm/api/index.js.map +2 -2
  172. package/lib/esm/internal/DefaultLedgerKeyringProtocol.js +1 -1
  173. package/lib/esm/internal/DefaultLedgerKeyringProtocol.js.map +3 -3
  174. package/lib/esm/internal/app-binder/LedgerKeyringProtocolBinder.js +1 -1
  175. package/lib/esm/internal/app-binder/LedgerKeyringProtocolBinder.js.map +3 -3
  176. package/lib/esm/internal/app-binder/command/GetAppNameCommand.js +1 -1
  177. package/lib/esm/internal/app-binder/command/GetAppNameCommand.js.map +2 -2
  178. package/lib/esm/internal/app-binder/command/GetSeedIdCommand.js +1 -1
  179. package/lib/esm/internal/app-binder/command/GetSeedIdCommand.js.map +3 -3
  180. package/lib/esm/internal/app-binder/command/GetSeedIdCommand.test.js +1 -1
  181. package/lib/esm/internal/app-binder/command/GetSeedIdCommand.test.js.map +3 -3
  182. package/lib/esm/internal/app-binder/command/GetVersionCommand.js.map +2 -2
  183. package/lib/esm/internal/app-binder/command/InitCommand.js +1 -1
  184. package/lib/esm/internal/app-binder/command/InitCommand.js.map +2 -2
  185. package/lib/esm/internal/app-binder/command/InitCommand.test.js +1 -1
  186. package/lib/esm/internal/app-binder/command/InitCommand.test.js.map +2 -2
  187. package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.js +1 -1
  188. package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.js.map +2 -2
  189. package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.test.js +1 -1
  190. package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.test.js.map +2 -2
  191. package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.js.map +2 -2
  192. package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.test.js +1 -1
  193. package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.test.js.map +2 -2
  194. package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.js +1 -1
  195. package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.js.map +2 -2
  196. package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.test.js.map +2 -2
  197. package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.js +1 -1
  198. package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.js.map +2 -2
  199. package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.test.js +1 -1
  200. package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.test.js.map +2 -2
  201. package/lib/esm/internal/app-binder/command/SignBlockHeader.js +1 -1
  202. package/lib/esm/internal/app-binder/command/SignBlockHeader.js.map +3 -3
  203. package/lib/esm/internal/app-binder/command/SignBlockHeader.test.js +1 -1
  204. package/lib/esm/internal/app-binder/command/SignBlockHeader.test.js.map +3 -3
  205. package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.js +1 -1
  206. package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.js.map +2 -2
  207. package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.test.js +1 -1
  208. package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.test.js.map +2 -2
  209. package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.js +1 -1
  210. package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.js.map +2 -2
  211. package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.test.js +1 -1
  212. package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.test.js.map +2 -2
  213. package/lib/esm/internal/app-binder/device-action/AddToTrustchainDeviceAction.js +1 -1
  214. package/lib/esm/internal/app-binder/device-action/AddToTrustchainDeviceAction.js.map +3 -3
  215. package/lib/esm/internal/app-binder/device-action/AuthenticateDeviceAction.js +2 -0
  216. package/lib/esm/internal/app-binder/device-action/AuthenticateDeviceAction.js.map +7 -0
  217. package/lib/esm/internal/app-binder/task/InitTask.js +1 -1
  218. package/lib/esm/internal/app-binder/task/InitTask.js.map +3 -3
  219. package/lib/esm/internal/app-binder/task/ParseStreamToDeviceTask.js +1 -1
  220. package/lib/esm/internal/app-binder/task/ParseStreamToDeviceTask.js.map +3 -3
  221. package/lib/esm/internal/app-binder/task/SignBlockTask.js +1 -1
  222. package/lib/esm/internal/app-binder/task/SignBlockTask.js.map +3 -3
  223. package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.js +1 -1
  224. package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.js.map +3 -3
  225. package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.test.js +1 -1
  226. package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.test.js.map +3 -3
  227. package/lib/esm/internal/app-binder/task/utils/TrustedProperties.js +1 -1
  228. package/lib/esm/internal/app-binder/task/utils/TrustedProperties.js.map +3 -3
  229. package/lib/esm/internal/di.js +1 -1
  230. package/lib/esm/internal/di.js.map +3 -3
  231. package/lib/esm/internal/externalTypes.js +1 -1
  232. package/lib/esm/internal/externalTypes.js.map +2 -2
  233. package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.js +1 -1
  234. package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.js.map +3 -3
  235. package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js +1 -1
  236. package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js.map +3 -3
  237. package/lib/esm/internal/use-cases/authentication/AuthenticateUseCase.js +1 -1
  238. package/lib/esm/internal/use-cases/authentication/AuthenticateUseCase.js.map +3 -3
  239. package/lib/esm/internal/use-cases/di/useCasesModule.js +1 -1
  240. package/lib/esm/internal/use-cases/di/useCasesModule.js.map +3 -3
  241. package/lib/esm/internal/use-cases/di/useCasesTypes.js +1 -1
  242. package/lib/esm/internal/use-cases/di/useCasesTypes.js.map +2 -2
  243. package/lib/esm/internal/utils/LKRPBlock.js +3 -3
  244. package/lib/esm/internal/utils/LKRPBlock.js.map +3 -3
  245. package/lib/esm/internal/utils/LKRPBlock.test.js +2 -2
  246. package/lib/esm/internal/utils/LKRPBlock.test.js.map +3 -3
  247. package/lib/esm/internal/utils/LKRPBlockStream.js +2 -2
  248. package/lib/esm/internal/utils/LKRPBlockStream.js.map +3 -3
  249. package/lib/esm/internal/utils/LKRPBlockStream.test.js +3 -3
  250. package/lib/esm/internal/utils/LKRPBlockStream.test.js.map +3 -3
  251. package/lib/esm/internal/utils/LKRPCommand.js +2 -2
  252. package/lib/esm/internal/utils/LKRPCommand.js.map +3 -3
  253. package/lib/esm/internal/utils/LKRPCommand.test.js +1 -1
  254. package/lib/esm/internal/utils/LKRPCommand.test.js.map +3 -3
  255. package/lib/esm/internal/utils/TLVBuilder.js +2 -0
  256. package/lib/esm/internal/utils/TLVBuilder.js.map +7 -0
  257. package/lib/esm/internal/utils/TLVParser.js +1 -1
  258. package/lib/esm/internal/utils/TLVParser.js.map +3 -3
  259. package/lib/esm/internal/utils/TLVParser.test.js +1 -1
  260. package/lib/esm/internal/utils/TLVParser.test.js.map +3 -3
  261. package/lib/esm/internal/{models/Tags.js → utils/TLVTags.js} +1 -1
  262. package/lib/esm/internal/{models/Tags.js.map → utils/TLVTags.js.map} +1 -1
  263. package/lib/esm/internal/utils/crypto.js +2 -0
  264. package/lib/esm/internal/utils/crypto.js.map +7 -0
  265. package/lib/esm/internal/utils/hex.js +2 -0
  266. package/lib/esm/internal/utils/hex.js.map +7 -0
  267. package/lib/esm/internal/utils/required.js +1 -1
  268. package/lib/esm/internal/utils/required.js.map +2 -2
  269. package/lib/esm/internal/utils/types.js +1 -0
  270. package/lib/esm/internal/utils/types.js.map +7 -0
  271. package/lib/esm/package.json +2 -3
  272. package/lib/types/api/LedgerKeyringProtocol.d.ts +5 -4
  273. package/lib/types/api/LedgerKeyringProtocol.d.ts.map +1 -1
  274. package/lib/types/api/LedgerKeyringProtocolBuilder.d.ts +6 -12
  275. package/lib/types/api/LedgerKeyringProtocolBuilder.d.ts.map +1 -1
  276. package/lib/types/api/app-binder/AddToTrustchainDeviceActionTypes.d.ts +11 -25
  277. package/lib/types/api/app-binder/AddToTrustchainDeviceActionTypes.d.ts.map +1 -1
  278. package/lib/types/api/app-binder/AuthenticateDeviceActionTypes.d.ts +31 -27
  279. package/lib/types/api/app-binder/AuthenticateDeviceActionTypes.d.ts.map +1 -1
  280. package/lib/types/api/app-binder/Errors.d.ts +27 -0
  281. package/lib/types/api/app-binder/Errors.d.ts.map +1 -0
  282. package/lib/types/api/app-binder/GetAppNameCommandTypes.d.ts +5 -0
  283. package/lib/types/api/app-binder/GetAppNameCommandTypes.d.ts.map +1 -0
  284. package/lib/types/api/app-binder/GetSeedIdCommandTypes.d.ts +14 -0
  285. package/lib/types/api/app-binder/GetSeedIdCommandTypes.d.ts.map +1 -0
  286. package/lib/types/api/app-binder/GetVersionCommandTypes.d.ts +1 -0
  287. package/lib/types/api/app-binder/GetVersionCommandTypes.d.ts.map +1 -1
  288. package/lib/types/api/app-binder/InitCommandTypes.d.ts +5 -0
  289. package/lib/types/api/app-binder/InitCommandTypes.d.ts.map +1 -0
  290. package/lib/types/api/app-binder/KeypairFromBytes.d.ts +11 -0
  291. package/lib/types/api/app-binder/KeypairFromBytes.d.ts.map +1 -0
  292. package/lib/types/api/{model/Permissions.d.ts → app-binder/LKRPTypes.d.ts} +15 -1
  293. package/lib/types/api/app-binder/LKRPTypes.d.ts.map +1 -0
  294. package/lib/types/api/app-binder/ParseStreamBlockCommandCommandTypes.d.ts +6 -0
  295. package/lib/types/api/app-binder/ParseStreamBlockCommandCommandTypes.d.ts.map +1 -0
  296. package/lib/types/api/app-binder/ParseStreamBlockHeaderCommandTypes.d.ts +5 -0
  297. package/lib/types/api/app-binder/ParseStreamBlockHeaderCommandTypes.d.ts.map +1 -0
  298. package/lib/types/api/app-binder/ParseStreamBlockSignatureTypes.d.ts +5 -0
  299. package/lib/types/api/app-binder/ParseStreamBlockSignatureTypes.d.ts.map +1 -0
  300. package/lib/types/api/app-binder/SetTrustedMemberTypes.d.ts +6 -0
  301. package/lib/types/api/app-binder/SetTrustedMemberTypes.d.ts.map +1 -0
  302. package/lib/types/api/app-binder/SignBlockCommandTypes.d.ts +9 -0
  303. package/lib/types/api/app-binder/SignBlockCommandTypes.d.ts.map +1 -0
  304. package/lib/types/api/app-binder/SignBlockHeaderCommandTypes.d.ts +5 -0
  305. package/lib/types/api/app-binder/SignBlockHeaderCommandTypes.d.ts.map +1 -0
  306. package/lib/types/api/app-binder/SignBlockSignatureCommandTypes.d.ts +6 -0
  307. package/lib/types/api/app-binder/SignBlockSignatureCommandTypes.d.ts.map +1 -0
  308. package/lib/types/api/app-binder/SignBlockSingleCommandTypes.d.ts +5 -0
  309. package/lib/types/api/app-binder/SignBlockSingleCommandTypes.d.ts.map +1 -0
  310. package/lib/types/api/index.d.ts +2 -10
  311. package/lib/types/api/index.d.ts.map +1 -1
  312. package/lib/types/internal/DefaultLedgerKeyringProtocol.d.ts +9 -12
  313. package/lib/types/internal/DefaultLedgerKeyringProtocol.d.ts.map +1 -1
  314. package/lib/types/internal/app-binder/LedgerKeyringProtocolBinder.d.ts +8 -14
  315. package/lib/types/internal/app-binder/LedgerKeyringProtocolBinder.d.ts.map +1 -1
  316. package/lib/types/internal/app-binder/command/GetAppNameCommand.d.ts +1 -4
  317. package/lib/types/internal/app-binder/command/GetAppNameCommand.d.ts.map +1 -1
  318. package/lib/types/internal/app-binder/command/GetSeedIdCommand.d.ts +1 -13
  319. package/lib/types/internal/app-binder/command/GetSeedIdCommand.d.ts.map +1 -1
  320. package/lib/types/internal/app-binder/command/GetVersionCommand.d.ts +1 -2
  321. package/lib/types/internal/app-binder/command/GetVersionCommand.d.ts.map +1 -1
  322. package/lib/types/internal/app-binder/command/InitCommand.d.ts +1 -4
  323. package/lib/types/internal/app-binder/command/InitCommand.d.ts.map +1 -1
  324. package/lib/types/internal/app-binder/command/ParseBlockSignatureCommand.d.ts +1 -4
  325. package/lib/types/internal/app-binder/command/ParseBlockSignatureCommand.d.ts.map +1 -1
  326. package/lib/types/internal/app-binder/command/ParseStreamBlockCommand.d.ts +1 -5
  327. package/lib/types/internal/app-binder/command/ParseStreamBlockCommand.d.ts.map +1 -1
  328. package/lib/types/internal/app-binder/command/ParseStreamBlockHeader.d.ts +1 -4
  329. package/lib/types/internal/app-binder/command/ParseStreamBlockHeader.d.ts.map +1 -1
  330. package/lib/types/internal/app-binder/command/SetTrustedMemberCommand.d.ts +1 -5
  331. package/lib/types/internal/app-binder/command/SetTrustedMemberCommand.d.ts.map +1 -1
  332. package/lib/types/internal/app-binder/command/SignBlockHeader.d.ts +1 -6
  333. package/lib/types/internal/app-binder/command/SignBlockHeader.d.ts.map +1 -1
  334. package/lib/types/internal/app-binder/command/SignBlockSignatureCommand.d.ts +1 -5
  335. package/lib/types/internal/app-binder/command/SignBlockSignatureCommand.d.ts.map +1 -1
  336. package/lib/types/internal/app-binder/command/SignBlockSingleCommand.d.ts +1 -4
  337. package/lib/types/internal/app-binder/command/SignBlockSingleCommand.d.ts.map +1 -1
  338. package/lib/types/internal/app-binder/device-action/AddToTrustchainDeviceAction.d.ts +6 -10
  339. package/lib/types/internal/app-binder/device-action/AddToTrustchainDeviceAction.d.ts.map +1 -1
  340. package/lib/types/internal/app-binder/device-action/AuthenticateDeviceAction.d.ts +42 -0
  341. package/lib/types/internal/app-binder/device-action/AuthenticateDeviceAction.d.ts.map +1 -0
  342. package/lib/types/internal/app-binder/task/InitTask.d.ts +3 -5
  343. package/lib/types/internal/app-binder/task/InitTask.d.ts.map +1 -1
  344. package/lib/types/internal/app-binder/task/ParseStreamToDeviceTask.d.ts +3 -3
  345. package/lib/types/internal/app-binder/task/ParseStreamToDeviceTask.d.ts.map +1 -1
  346. package/lib/types/internal/app-binder/task/SignBlockTask.d.ts +13 -15
  347. package/lib/types/internal/app-binder/task/SignBlockTask.d.ts.map +1 -1
  348. package/lib/types/internal/app-binder/task/SignChallengeWithKeypairTask.d.ts +5 -6
  349. package/lib/types/internal/app-binder/task/SignChallengeWithKeypairTask.d.ts.map +1 -1
  350. package/lib/types/internal/app-binder/task/utils/TrustedProperties.d.ts +2 -2
  351. package/lib/types/internal/app-binder/task/utils/TrustedProperties.d.ts.map +1 -1
  352. package/lib/types/internal/di.d.ts +3 -7
  353. package/lib/types/internal/di.d.ts.map +1 -1
  354. package/lib/types/internal/externalTypes.d.ts +1 -2
  355. package/lib/types/internal/externalTypes.d.ts.map +1 -1
  356. package/lib/types/internal/lkrp-datasource/data/HttpLKRPDataSource.d.ts +10 -8
  357. package/lib/types/internal/lkrp-datasource/data/HttpLKRPDataSource.d.ts.map +1 -1
  358. package/lib/types/internal/lkrp-datasource/data/LKRPDataSource.d.ts +8 -8
  359. package/lib/types/internal/lkrp-datasource/data/LKRPDataSource.d.ts.map +1 -1
  360. package/lib/types/internal/use-cases/authentication/AuthenticateUseCase.d.ts +2 -15
  361. package/lib/types/internal/use-cases/authentication/AuthenticateUseCase.d.ts.map +1 -1
  362. package/lib/types/internal/use-cases/di/useCasesModule.d.ts.map +1 -1
  363. package/lib/types/internal/use-cases/di/useCasesTypes.d.ts +0 -2
  364. package/lib/types/internal/use-cases/di/useCasesTypes.d.ts.map +1 -1
  365. package/lib/types/internal/utils/LKRPBlock.d.ts +2 -2
  366. package/lib/types/internal/utils/LKRPBlock.d.ts.map +1 -1
  367. package/lib/types/internal/utils/LKRPBlockStream.d.ts +8 -8
  368. package/lib/types/internal/utils/LKRPBlockStream.d.ts.map +1 -1
  369. package/lib/types/internal/utils/LKRPCommand.d.ts +3 -4
  370. package/lib/types/internal/utils/LKRPCommand.d.ts.map +1 -1
  371. package/lib/types/internal/utils/TLVBuilder.d.ts +15 -0
  372. package/lib/types/internal/utils/TLVBuilder.d.ts.map +1 -0
  373. package/lib/types/internal/utils/TLVParser.d.ts +3 -4
  374. package/lib/types/internal/utils/TLVParser.d.ts.map +1 -1
  375. package/lib/types/internal/{models/Tags.d.ts → utils/TLVTags.d.ts} +1 -1
  376. package/lib/types/internal/utils/TLVTags.d.ts.map +1 -0
  377. package/lib/types/internal/utils/crypto.d.ts +19 -0
  378. package/lib/types/internal/utils/crypto.d.ts.map +1 -0
  379. package/lib/types/internal/utils/hex.d.ts +3 -0
  380. package/lib/types/internal/utils/hex.d.ts.map +1 -0
  381. package/lib/types/internal/utils/required.d.ts +1 -1
  382. package/lib/types/internal/utils/required.d.ts.map +1 -1
  383. package/lib/types/internal/{models/LKRPCommandTypes.d.ts → utils/types.d.ts} +29 -6
  384. package/lib/types/internal/utils/types.d.ts.map +1 -0
  385. package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
  386. package/package.json +5 -6
  387. package/lib/cjs/api/crypto/CryptoService.js +0 -2
  388. package/lib/cjs/api/crypto/CryptoService.js.map +0 -7
  389. package/lib/cjs/api/crypto/Key.js +0 -2
  390. package/lib/cjs/api/crypto/Key.js.map +0 -7
  391. package/lib/cjs/api/crypto/KeyPair.js +0 -2
  392. package/lib/cjs/api/crypto/KeyPair.js.map +0 -7
  393. package/lib/cjs/api/crypto/noble/NobleCryptoService.js +0 -2
  394. package/lib/cjs/api/crypto/noble/NobleCryptoService.js.map +0 -7
  395. package/lib/cjs/api/crypto/noble/NobleCryptoService.test.js +0 -2
  396. package/lib/cjs/api/crypto/noble/NobleCryptoService.test.js.map +0 -7
  397. package/lib/cjs/api/crypto/noble/NobleKey.js +0 -2
  398. package/lib/cjs/api/crypto/noble/NobleKey.js.map +0 -7
  399. package/lib/cjs/api/crypto/noble/NobleKey.test.js +0 -2
  400. package/lib/cjs/api/crypto/noble/NobleKey.test.js.map +0 -7
  401. package/lib/cjs/api/crypto/noble/NobleKeyPair.js +0 -2
  402. package/lib/cjs/api/crypto/noble/NobleKeyPair.js.map +0 -7
  403. package/lib/cjs/api/crypto/noble/NobleKeyPair.test.js +0 -2
  404. package/lib/cjs/api/crypto/noble/NobleKeyPair.test.js.map +0 -7
  405. package/lib/cjs/api/model/Env.js +0 -2
  406. package/lib/cjs/api/model/Env.js.map +0 -7
  407. package/lib/cjs/api/model/Errors.js +0 -2
  408. package/lib/cjs/api/model/Errors.js.map +0 -7
  409. package/lib/cjs/api/model/JWT.js +0 -2
  410. package/lib/cjs/api/model/JWT.js.map +0 -7
  411. package/lib/cjs/api/model/Permissions.js +0 -2
  412. package/lib/cjs/api/model/Permissions.js.map +0 -7
  413. package/lib/cjs/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js +0 -2
  414. package/lib/cjs/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js.map +0 -7
  415. package/lib/cjs/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js +0 -2
  416. package/lib/cjs/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js.map +0 -7
  417. package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.js +0 -2
  418. package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.js.map +0 -7
  419. package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.js +0 -2
  420. package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.js.map +0 -7
  421. package/lib/cjs/internal/app-binder/task/AuthenticateTask.js +0 -2
  422. package/lib/cjs/internal/app-binder/task/AuthenticateTask.js.map +0 -7
  423. package/lib/cjs/internal/app-binder/task/ExtractEncryptionKeyTask.js +0 -2
  424. package/lib/cjs/internal/app-binder/task/ExtractEncryptionKeyTask.js.map +0 -7
  425. package/lib/cjs/internal/models/LKRPBlockTypes.js +0 -2
  426. package/lib/cjs/internal/models/LKRPBlockTypes.js.map +0 -7
  427. package/lib/cjs/internal/models/LKRPCommandTypes.js +0 -2
  428. package/lib/cjs/internal/models/LKRPCommandTypes.js.map +0 -7
  429. package/lib/cjs/internal/models/Types.js +0 -2
  430. package/lib/cjs/internal/models/Types.js.map +0 -7
  431. package/lib/cjs/internal/use-cases/authentication/DecryptDataUseCase.js +0 -2
  432. package/lib/cjs/internal/use-cases/authentication/DecryptDataUseCase.js.map +0 -7
  433. package/lib/cjs/internal/use-cases/authentication/EncryptDataUseCase.js +0 -2
  434. package/lib/cjs/internal/use-cases/authentication/EncryptDataUseCase.js.map +0 -7
  435. package/lib/cjs/internal/utils/Trustchain.js +0 -2
  436. package/lib/cjs/internal/utils/Trustchain.js.map +0 -7
  437. package/lib/esm/api/crypto/CryptoService.js +0 -2
  438. package/lib/esm/api/crypto/CryptoService.js.map +0 -7
  439. package/lib/esm/api/crypto/Key.js +0 -2
  440. package/lib/esm/api/crypto/Key.js.map +0 -7
  441. package/lib/esm/api/crypto/KeyPair.js +0 -2
  442. package/lib/esm/api/crypto/KeyPair.js.map +0 -7
  443. package/lib/esm/api/crypto/noble/NobleCryptoService.js +0 -2
  444. package/lib/esm/api/crypto/noble/NobleCryptoService.js.map +0 -7
  445. package/lib/esm/api/crypto/noble/NobleCryptoService.test.js +0 -2
  446. package/lib/esm/api/crypto/noble/NobleCryptoService.test.js.map +0 -7
  447. package/lib/esm/api/crypto/noble/NobleKey.js +0 -2
  448. package/lib/esm/api/crypto/noble/NobleKey.js.map +0 -7
  449. package/lib/esm/api/crypto/noble/NobleKey.test.js +0 -2
  450. package/lib/esm/api/crypto/noble/NobleKey.test.js.map +0 -7
  451. package/lib/esm/api/crypto/noble/NobleKeyPair.js +0 -2
  452. package/lib/esm/api/crypto/noble/NobleKeyPair.js.map +0 -7
  453. package/lib/esm/api/crypto/noble/NobleKeyPair.test.js +0 -2
  454. package/lib/esm/api/crypto/noble/NobleKeyPair.test.js.map +0 -7
  455. package/lib/esm/api/model/Env.js +0 -2
  456. package/lib/esm/api/model/Env.js.map +0 -7
  457. package/lib/esm/api/model/Errors.js +0 -2
  458. package/lib/esm/api/model/Errors.js.map +0 -7
  459. package/lib/esm/api/model/JWT.js +0 -1
  460. package/lib/esm/api/model/Permissions.js +0 -2
  461. package/lib/esm/api/model/Permissions.js.map +0 -7
  462. package/lib/esm/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js +0 -2
  463. package/lib/esm/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js.map +0 -7
  464. package/lib/esm/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js +0 -2
  465. package/lib/esm/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js.map +0 -7
  466. package/lib/esm/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.js +0 -1
  467. package/lib/esm/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.js +0 -1
  468. package/lib/esm/internal/app-binder/task/AuthenticateTask.js +0 -2
  469. package/lib/esm/internal/app-binder/task/AuthenticateTask.js.map +0 -7
  470. package/lib/esm/internal/app-binder/task/ExtractEncryptionKeyTask.js +0 -2
  471. package/lib/esm/internal/app-binder/task/ExtractEncryptionKeyTask.js.map +0 -7
  472. package/lib/esm/internal/models/LKRPBlockTypes.js +0 -1
  473. package/lib/esm/internal/models/LKRPCommandTypes.js +0 -1
  474. package/lib/esm/internal/models/Types.js +0 -1
  475. package/lib/esm/internal/use-cases/authentication/DecryptDataUseCase.js +0 -2
  476. package/lib/esm/internal/use-cases/authentication/DecryptDataUseCase.js.map +0 -7
  477. package/lib/esm/internal/use-cases/authentication/EncryptDataUseCase.js +0 -2
  478. package/lib/esm/internal/use-cases/authentication/EncryptDataUseCase.js.map +0 -7
  479. package/lib/esm/internal/utils/Trustchain.js +0 -2
  480. package/lib/esm/internal/utils/Trustchain.js.map +0 -7
  481. package/lib/types/api/crypto/CryptoService.d.ts +0 -22
  482. package/lib/types/api/crypto/CryptoService.d.ts.map +0 -1
  483. package/lib/types/api/crypto/Key.d.ts +0 -7
  484. package/lib/types/api/crypto/Key.d.ts.map +0 -1
  485. package/lib/types/api/crypto/KeyPair.d.ts +0 -13
  486. package/lib/types/api/crypto/KeyPair.d.ts.map +0 -1
  487. package/lib/types/api/crypto/noble/NobleCryptoService.d.ts +0 -13
  488. package/lib/types/api/crypto/noble/NobleCryptoService.d.ts.map +0 -1
  489. package/lib/types/api/crypto/noble/NobleCryptoService.test.d.ts +0 -2
  490. package/lib/types/api/crypto/noble/NobleCryptoService.test.d.ts.map +0 -1
  491. package/lib/types/api/crypto/noble/NobleKey.d.ts +0 -11
  492. package/lib/types/api/crypto/noble/NobleKey.d.ts.map +0 -1
  493. package/lib/types/api/crypto/noble/NobleKey.test.d.ts +0 -2
  494. package/lib/types/api/crypto/noble/NobleKey.test.d.ts.map +0 -1
  495. package/lib/types/api/crypto/noble/NobleKeyPair.d.ts +0 -18
  496. package/lib/types/api/crypto/noble/NobleKeyPair.d.ts.map +0 -1
  497. package/lib/types/api/crypto/noble/NobleKeyPair.test.d.ts +0 -2
  498. package/lib/types/api/crypto/noble/NobleKeyPair.test.d.ts.map +0 -1
  499. package/lib/types/api/model/Env.d.ts +0 -5
  500. package/lib/types/api/model/Env.d.ts.map +0 -1
  501. package/lib/types/api/model/Errors.d.ts +0 -53
  502. package/lib/types/api/model/Errors.d.ts.map +0 -1
  503. package/lib/types/api/model/JWT.d.ts +0 -9
  504. package/lib/types/api/model/JWT.d.ts.map +0 -1
  505. package/lib/types/api/model/Permissions.d.ts.map +0 -1
  506. package/lib/types/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.d.ts +0 -32
  507. package/lib/types/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.d.ts.map +0 -1
  508. package/lib/types/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.d.ts +0 -33
  509. package/lib/types/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.d.ts.map +0 -1
  510. package/lib/types/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.d.ts +0 -22
  511. package/lib/types/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.d.ts.map +0 -1
  512. package/lib/types/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.d.ts +0 -19
  513. package/lib/types/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.d.ts.map +0 -1
  514. package/lib/types/internal/app-binder/task/AuthenticateTask.d.ts +0 -9
  515. package/lib/types/internal/app-binder/task/AuthenticateTask.d.ts.map +0 -1
  516. package/lib/types/internal/app-binder/task/ExtractEncryptionKeyTask.d.ts +0 -8
  517. package/lib/types/internal/app-binder/task/ExtractEncryptionKeyTask.d.ts.map +0 -1
  518. package/lib/types/internal/models/LKRPBlockTypes.d.ts +0 -11
  519. package/lib/types/internal/models/LKRPBlockTypes.d.ts.map +0 -1
  520. package/lib/types/internal/models/LKRPCommandTypes.d.ts.map +0 -1
  521. package/lib/types/internal/models/Tags.d.ts.map +0 -1
  522. package/lib/types/internal/models/Types.d.ts +0 -10
  523. package/lib/types/internal/models/Types.d.ts.map +0 -1
  524. package/lib/types/internal/use-cases/authentication/DecryptDataUseCase.d.ts +0 -7
  525. package/lib/types/internal/use-cases/authentication/DecryptDataUseCase.d.ts.map +0 -1
  526. package/lib/types/internal/use-cases/authentication/EncryptDataUseCase.d.ts +0 -7
  527. package/lib/types/internal/use-cases/authentication/EncryptDataUseCase.d.ts.map +0 -1
  528. package/lib/types/internal/utils/Trustchain.d.ts +0 -14
  529. package/lib/types/internal/utils/Trustchain.d.ts.map +0 -1
  530. /package/lib/esm/api/{model/JWT.js.map → app-binder/GetAppNameCommandTypes.js.map} +0 -0
  531. /package/lib/esm/{internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.js.map → api/app-binder/GetSeedIdCommandTypes.js.map} +0 -0
  532. /package/lib/esm/{internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.js.map → api/app-binder/InitCommandTypes.js.map} +0 -0
  533. /package/lib/esm/{internal/models/LKRPBlockTypes.js.map → api/app-binder/ParseStreamBlockCommandCommandTypes.js.map} +0 -0
  534. /package/lib/esm/{internal/models/LKRPCommandTypes.js.map → api/app-binder/ParseStreamBlockHeaderCommandTypes.js.map} +0 -0
  535. /package/lib/esm/{internal/models/Types.js.map → api/app-binder/ParseStreamBlockSignatureTypes.js.map} +0 -0
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../src/internal/utils/required.ts"],
4
- "sourcesContent": ["import { Maybe } from \"purify-ts\";\n\nimport { LKRPMissingDataError } from \"@api/model/Errors\";\n\nexport function required<T>(prop: T | undefined | null, errorMsg: string) {\n return Maybe.fromNullable(prop).toEither(new LKRPMissingDataError(errorMsg));\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,cAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAsB,qBAEtBC,EAAqC,6BAE9B,SAASH,EAAYI,EAA4BC,EAAkB,CACxE,OAAO,QAAM,aAAaD,CAAI,EAAE,SAAS,IAAI,uBAAqBC,CAAQ,CAAC,CAC7E",
4
+ "sourcesContent": ["import { Maybe } from \"purify-ts\";\n\nimport { LKRPMissingDataError } from \"@api/app-binder/Errors\";\n\nexport function required<T>(prop: T | undefined | null, errorMsg: string) {\n return Maybe.fromNullable(prop).toEither(new LKRPMissingDataError(errorMsg));\n}\n"],
5
+ "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,cAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAsB,qBAEtBC,EAAqC,kCAE9B,SAASH,EAAYI,EAA4BC,EAAkB,CACxE,OAAO,QAAM,aAAaD,CAAI,EAAE,SAAS,IAAI,uBAAqBC,CAAQ,CAAC,CAC7E",
6
6
  "names": ["required_exports", "__export", "required", "__toCommonJS", "import_purify_ts", "import_Errors", "prop", "errorMsg"]
7
7
  }
@@ -0,0 +1,2 @@
1
+ "use strict";var a=Object.defineProperty;var y=Object.getOwnPropertyDescriptor;var p=Object.getOwnPropertyNames;var d=Object.prototype.hasOwnProperty;var m=(r,e,n,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of p(e))!d.call(r,t)&&t!==n&&a(r,t,{get:()=>e[t],enumerable:!(i=y(e,t))||i.enumerable});return r};var o=r=>m(a({},"__esModule",{value:!0}),r);var s={};module.exports=o(s);
2
+ //# sourceMappingURL=types.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../src/internal/utils/types.ts"],
4
+ "sourcesContent": ["import { type LKRPBlockStream } from \"./LKRPBlockStream\";\nimport { type LKRPCommand } from \"./LKRPCommand\";\nimport { type CommandTags } from \"./TLVTags\";\n\nexport type Trustchain = {\n [path: string]: LKRPBlockStream;\n};\n\nexport type PublishedKey = {\n privateKey: Uint8Array;\n chainCode: Uint8Array;\n};\n\nexport type EncryptedPublishedKey = {\n encryptedXpriv: Uint8Array;\n initializationVector: Uint8Array;\n ephemeralPublicKey: Uint8Array;\n};\n\nexport type LKRPBlockData = {\n parent: string;\n issuer: Uint8Array;\n commands: LKRPCommand[];\n signature: Uint8Array;\n};\n\nexport type LKRPBlockParsedData = LKRPBlockData & { header: Uint8Array };\n\nexport type LKRPCommandData = Seed | AddMember | PublishKey | Derive;\n\ntype Seed = {\n type: CommandTags.Seed;\n topic: Uint8Array;\n protocolVersion: number;\n groupKey: Uint8Array;\n initializationVector: Uint8Array;\n encryptedXpriv: Uint8Array;\n ephemeralPublicKey: Uint8Array;\n};\n\ntype AddMember = {\n type: CommandTags.AddMember;\n name: string;\n publicKey: Uint8Array;\n permissions: number;\n};\n\ntype PublishKey = {\n type: CommandTags.PublishKey;\n initializationVector: Uint8Array;\n encryptedXpriv: Uint8Array;\n recipient: Uint8Array;\n ephemeralPublicKey: Uint8Array;\n};\n\ntype Derive = {\n type: CommandTags.Derive;\n path: string;\n groupKey: Uint8Array;\n initializationVector: Uint8Array;\n encryptedXpriv: Uint8Array;\n ephemeralPublicKey: Uint8Array;\n};\n\nexport type UnsignedCommandData =\n | AddMemberUnsignedData\n | PublishKeyUnsignedData\n | DeriveUnsignedData;\n\nexport type AddMemberUnsignedData = AddMember;\ntype PublishKeyUnsignedData = Pick<PublishKey, \"type\" | \"recipient\">;\ntype DeriveUnsignedData = Pick<Derive, \"type\" | \"path\">;\n\nexport type ParsedTrustedProperties = {\n iv: Uint8Array;\n issuer: Uint8Array;\n xpriv: Uint8Array;\n ephemeralPublicKey: Uint8Array;\n commandIv: Uint8Array;\n groupKey: Uint8Array;\n newMember: Uint8Array;\n};\n\nexport type EncryptedCommand =\n | EncryptedDeriveCommand\n | AddMemberUnsignedData\n | EncryptedPublishKeyCommand;\n\nexport type EncryptedDeriveCommand = DeriveUnsignedData &\n Pick<\n ParsedTrustedProperties,\n \"iv\" | \"xpriv\" | \"ephemeralPublicKey\" | \"commandIv\" | \"groupKey\"\n >;\nexport type EncryptedPublishKeyCommand = PublishKeyUnsignedData &\n Pick<\n ParsedTrustedProperties,\n \"iv\" | \"xpriv\" | \"ephemeralPublicKey\" | \"commandIv\"\n >;\n"],
5
+ "mappings": "+WAAA,IAAAA,EAAA,kBAAAC,EAAAD",
6
+ "names": ["types_exports", "__toCommonJS"]
7
+ }
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@ledgerhq/device-trusted-app-kit-ledger-keyring-protocol",
3
- "version": "0.1.0",
3
+ "version": "0.0.0",
4
4
  "license": "Apache-2.0",
5
5
  "private": false,
6
6
  "exports": {
@@ -38,12 +38,11 @@
38
38
  "@ledgerhq/device-management-kit": "workspace:*",
39
39
  "@ledgerhq/signer-utils": "workspace:*",
40
40
  "@noble/ciphers": "^1.3.0",
41
- "@noble/curves": "^1.9.7",
42
41
  "@noble/hashes": "^1.8.0",
42
+ "@noble/secp256k1": "^2.3.0",
43
43
  "inversify": "catalog:",
44
44
  "purify-ts": "catalog:",
45
45
  "reflect-metadata": "catalog:",
46
- "rxjs": "catalog:",
47
46
  "xstate": "catalog:"
48
47
  },
49
48
  "devDependencies": {
@@ -1,2 +1,2 @@
1
- import{NobleCryptoService as r}from"./crypto/noble/NobleCryptoService";import{DefaultLedgerKeyringProtocol as t}from"../internal/DefaultLedgerKeyringProtocol";class p{dmk;applicationId;env;baseUrl;cryptoService=new r;constructor(e){this.dmk=e.dmk,this.applicationId=e.applicationId,this.env=e.env,this.baseUrl=e.baseUrl}withCryptoService(e){return this.cryptoService=e,this}build(){return new t({dmk:this.dmk,applicationId:this.applicationId,cryptoService:this.cryptoService,env:this.env,baseUrl:this.baseUrl})}}export{p as LedgerKeyringProtocolBuilder};
1
+ import{DefaultLedgerKeyringProtocol as s}from"../internal/DefaultLedgerKeyringProtocol";class n{dmk;sessionId;baseUrl;constructor({dmk:e,sessionId:i,baseUrl:r}){this.dmk=e,this.sessionId=i,this.baseUrl=r}build(){return new s({dmk:this.dmk,sessionId:this.sessionId,baseUrl:this.baseUrl})}}export{n as LedgerKeyringProtocolBuilder};
2
2
  //# sourceMappingURL=LedgerKeyringProtocolBuilder.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../src/api/LedgerKeyringProtocolBuilder.ts"],
4
- "sourcesContent": ["import { type DeviceManagementKit } from \"@ledgerhq/device-management-kit\";\n\nimport { type CryptoService } from \"@api/crypto/CryptoService\";\nimport { NobleCryptoService } from \"@api/crypto/noble/NobleCryptoService\";\nimport { type LedgerKeyringProtocol } from \"@api/LedgerKeyringProtocol\";\nimport { type LKRPEnv } from \"@api/model/Env\";\nimport { DefaultLedgerKeyringProtocol } from \"@internal/DefaultLedgerKeyringProtocol\";\n\nexport class LedgerKeyringProtocolBuilder {\n private readonly dmk: DeviceManagementKit;\n private readonly applicationId: number;\n private readonly env?: LKRPEnv;\n private readonly baseUrl?: string;\n private cryptoService: CryptoService = new NobleCryptoService();\n\n constructor(args: {\n dmk: DeviceManagementKit;\n applicationId: number;\n env?: LKRPEnv;\n baseUrl?: string;\n }) {\n this.dmk = args.dmk;\n this.applicationId = args.applicationId;\n this.env = args.env;\n this.baseUrl = args.baseUrl;\n }\n\n withCryptoService(service: CryptoService): LedgerKeyringProtocolBuilder {\n this.cryptoService = service;\n return this;\n }\n\n build(): LedgerKeyringProtocol {\n return new DefaultLedgerKeyringProtocol({\n dmk: this.dmk,\n applicationId: this.applicationId,\n cryptoService: this.cryptoService,\n env: this.env,\n baseUrl: this.baseUrl,\n });\n }\n}\n"],
5
- "mappings": "AAGA,OAAS,sBAAAA,MAA0B,uCAGnC,OAAS,gCAAAC,MAAoC,yCAEtC,MAAMC,CAA6B,CACvB,IACA,cACA,IACA,QACT,cAA+B,IAAIF,EAE3C,YAAYG,EAKT,CACD,KAAK,IAAMA,EAAK,IAChB,KAAK,cAAgBA,EAAK,cAC1B,KAAK,IAAMA,EAAK,IAChB,KAAK,QAAUA,EAAK,OACtB,CAEA,kBAAkBC,EAAsD,CACtE,YAAK,cAAgBA,EACd,IACT,CAEA,OAA+B,CAC7B,OAAO,IAAIH,EAA6B,CACtC,IAAK,KAAK,IACV,cAAe,KAAK,cACpB,cAAe,KAAK,cACpB,IAAK,KAAK,IACV,QAAS,KAAK,OAChB,CAAC,CACH,CACF",
6
- "names": ["NobleCryptoService", "DefaultLedgerKeyringProtocol", "LedgerKeyringProtocolBuilder", "args", "service"]
4
+ "sourcesContent": ["import {\n type DeviceManagementKit,\n type DeviceSessionId,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { type LedgerKeyringProtocol } from \"@api/LedgerKeyringProtocol\";\nimport { DefaultLedgerKeyringProtocol } from \"@internal/DefaultLedgerKeyringProtocol\";\n\nexport class LedgerKeyringProtocolBuilder {\n private readonly dmk: DeviceManagementKit;\n private readonly sessionId: DeviceSessionId;\n private readonly baseUrl: string;\n\n constructor({\n dmk,\n sessionId,\n baseUrl,\n }: {\n dmk: DeviceManagementKit;\n sessionId: DeviceSessionId;\n baseUrl: string;\n }) {\n this.dmk = dmk;\n this.sessionId = sessionId;\n this.baseUrl = baseUrl;\n }\n\n build(): LedgerKeyringProtocol {\n return new DefaultLedgerKeyringProtocol({\n dmk: this.dmk,\n sessionId: this.sessionId,\n baseUrl: this.baseUrl,\n });\n }\n}\n"],
5
+ "mappings": "AAMA,OAAS,gCAAAA,MAAoC,yCAEtC,MAAMC,CAA6B,CACvB,IACA,UACA,QAEjB,YAAY,CACV,IAAAC,EACA,UAAAC,EACA,QAAAC,CACF,EAIG,CACD,KAAK,IAAMF,EACX,KAAK,UAAYC,EACjB,KAAK,QAAUC,CACjB,CAEA,OAA+B,CAC7B,OAAO,IAAIJ,EAA6B,CACtC,IAAK,KAAK,IACV,UAAW,KAAK,UAChB,QAAS,KAAK,OAChB,CAAC,CACH,CACF",
6
+ "names": ["DefaultLedgerKeyringProtocol", "LedgerKeyringProtocolBuilder", "dmk", "sessionId", "baseUrl"]
7
7
  }
@@ -1,2 +1 @@
1
- var t=(e=>(e.AddMember="lkrp-add-member",e))(t||{}),o=(r=>(r.Initialize="lkrp-init-transaction",r.ParseStream="lkrp-parse-stream",r.AddMember="lkrp-add-member",r))(o||{});export{t as AddToTrustchainDAState,o as AddToTrustchaineDAStep};
2
1
  //# sourceMappingURL=AddToTrustchainDeviceActionTypes.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
- "sources": ["../../../../src/api/app-binder/AddToTrustchainDeviceActionTypes.ts"],
4
- "sourcesContent": ["import {\n type OpenAppDAError,\n type UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { type Either } from \"purify-ts\";\n\nimport { type CryptoService } from \"@api/crypto/CryptoService\";\nimport { type KeyPair } from \"@api/crypto/KeyPair\";\nimport {\n type LKRPDataSourceError,\n type LKRPMissingDataError,\n type LKRPOutdatedTrustchainError,\n type LKRPParsingError,\n type LKRPTrustchainNotReady,\n type LKRPUnknownError,\n} from \"@api/model/Errors\";\nimport { type JWT } from \"@api/model/JWT\";\nimport { type Permissions } from \"@api/model/Permissions\";\nimport { type LKRPDeviceCommandError } from \"@internal/app-binder/command/utils/ledgerKeyringProtocolErrors\";\nimport { type LKRPDataSource } from \"@internal/lkrp-datasource/data/LKRPDataSource\";\nimport { type Trustchain } from \"@internal/utils/Trustchain\";\n\nexport type AddToTrustchainDAOutput = undefined;\n\nexport type AddToTrustchainDAInput = Either<\n LKRPMissingDataError,\n {\n readonly lkrpDataSource: LKRPDataSource;\n readonly cryptoService: CryptoService;\n readonly keypair: KeyPair;\n readonly jwt: JWT;\n readonly appId: number;\n readonly trustchain: Trustchain;\n readonly clientName: string;\n readonly permissions: Permissions;\n }\n>;\n\nexport type AddToTrustchainDAError =\n | LKRPDeviceCommandError\n | LKRPDataSourceError\n | LKRPParsingError\n | LKRPMissingDataError\n | LKRPOutdatedTrustchainError\n | LKRPTrustchainNotReady\n | OpenAppDAError\n | LKRPUnknownError;\n\nexport type AddToTrustchainDAIntermediateValue =\n | {\n requiredUserInteraction: UserInteractionRequired.None;\n step?:\n | AddToTrustchaineDAStep.Initialize\n | AddToTrustchaineDAStep.ParseStream;\n }\n | {\n requiredUserInteraction: AddToTrustchainDAState.AddMember;\n step: AddToTrustchaineDAStep.AddMember;\n };\n\nexport enum AddToTrustchainDAState {\n AddMember = \"lkrp-add-member\",\n}\n\nexport enum AddToTrustchaineDAStep {\n Initialize = \"lkrp-init-transaction\",\n ParseStream = \"lkrp-parse-stream\",\n AddMember = \"lkrp-add-member\",\n}\n\nexport type AddToTrustchainDAInternalState = Either<\n AddToTrustchainDAError,\n {\n readonly sessionKeypair: KeyPair | null;\n }\n>;\n"],
5
- "mappings": "AA4DO,IAAKA,OACVA,EAAA,UAAY,kBADFA,OAAA,IAIAC,OACVA,EAAA,WAAa,wBACbA,EAAA,YAAc,oBACdA,EAAA,UAAY,kBAHFA,OAAA",
6
- "names": ["AddToTrustchainDAState", "AddToTrustchaineDAStep"]
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
7
  }
@@ -1,2 +1 @@
1
- var r=(e=>(e.Authenticate="lkrp-authenticate",e))(r||{}),n=(t=>(t.OpenApp="lkrp.steps.openApp",t.Authenticate="lkrp.steps.authenticate",t.GetTrustchain="lkrp.steps.getTrustchain",t.ExtractEncryptionKey="lkrp.steps.extractEncryptionKey",t))(n||{});export{r as AuthenticateDAState,n as AuthenticateDAStep};
2
1
  //# sourceMappingURL=AuthenticateDeviceActionTypes.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
- "sources": ["../../../../src/api/app-binder/AuthenticateDeviceActionTypes.ts"],
4
- "sourcesContent": ["import {\n type ExecuteDeviceActionReturnType,\n type OpenAppDAError,\n type OpenAppDARequiredInteraction,\n type UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\n\nimport {\n type LKRPDataSourceError,\n type LKRPMissingDataError,\n type LKRPParsingError,\n type LKRPTrustchainNotReady,\n type LKRPUnauthorizedError,\n type LKRPUnknownError,\n} from \"@api/model/Errors\";\nimport { type JWT } from \"@api/model/JWT\";\nimport { type LKRPDeviceCommandError } from \"@internal/app-binder/command/utils/ledgerKeyringProtocolErrors\";\n\nimport {\n type AddToTrustchainDAError,\n type AddToTrustchainDAIntermediateValue,\n} from \"./AddToTrustchainDeviceActionTypes\";\n\nexport type AuthenticateDAReturnType = ExecuteDeviceActionReturnType<\n AuthenticateDAOutput,\n AuthenticateDAError,\n AuthenticateDAIntermediateValue\n>;\n\nexport type AuthenticateDAOutput = {\n readonly jwt: JWT;\n readonly trustchainId: string;\n readonly applicationPath: string;\n readonly encryptionKey: Uint8Array;\n};\n\nexport type AuthenticateDAError =\n | LKRPUnauthorizedError\n | AddToTrustchainDAError\n | LKRPDeviceCommandError\n | LKRPDataSourceError\n | LKRPParsingError\n | LKRPMissingDataError\n | LKRPTrustchainNotReady\n | OpenAppDAError\n | LKRPUnknownError;\n\nexport type AuthenticateDAIntermediateValue =\n | {\n requiredUserInteraction: OpenAppDARequiredInteraction;\n step: AuthenticateDAStep.OpenApp;\n }\n | {\n requiredUserInteraction: AuthenticateDAState.Authenticate;\n step: AuthenticateDAStep.Authenticate;\n }\n | {\n requiredUserInteraction: UserInteractionRequired.None;\n step?:\n | AuthenticateDAStep.Authenticate\n | AuthenticateDAStep.GetTrustchain\n | AuthenticateDAStep.ExtractEncryptionKey;\n }\n | AddToTrustchainDAIntermediateValue;\n\nexport enum AuthenticateDAState {\n Authenticate = \"lkrp-authenticate\",\n}\nexport enum AuthenticateDAStep {\n OpenApp = \"lkrp.steps.openApp\",\n Authenticate = \"lkrp.steps.authenticate\",\n GetTrustchain = \"lkrp.steps.getTrustchain\",\n ExtractEncryptionKey = \"lkrp.steps.extractEncryptionKey\",\n}\n"],
5
- "mappings": "AAiEO,IAAKA,OACVA,EAAA,aAAe,oBADLA,OAAA,IAGAC,OACVA,EAAA,QAAU,qBACVA,EAAA,aAAe,0BACfA,EAAA,cAAgB,2BAChBA,EAAA,qBAAuB,kCAJbA,OAAA",
6
- "names": ["AuthenticateDAState", "AuthenticateDAStep"]
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
7
  }
@@ -0,0 +1,2 @@
1
+ import{GeneralDmkError as n}from"@ledgerhq/device-management-kit";class t extends n{constructor(r){super(r);this.err=r}_tag="LKRPHttpRequestError"}class a extends t{constructor(r){super(r);this.err=r}_tag="LKRPUnauthorizedError"}class d extends n{constructor(r){super(r);this.err=r}_tag="LKRPParsingError"}class u extends n{constructor(r){super(r);this.err=r}_tag="LKRPMissingDataError"}class c extends n{constructor(r){super(r);this.err=r}_tag="LKRPUnhandledState"}export{t as LKRPHttpRequestError,u as LKRPMissingDataError,d as LKRPParsingError,a as LKRPUnauthorizedError,c as LKRPUnhandledState};
2
+ //# sourceMappingURL=Errors.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../src/api/app-binder/Errors.ts"],
4
+ "sourcesContent": ["import { GeneralDmkError } from \"@ledgerhq/device-management-kit\";\n\nexport class LKRPHttpRequestError extends GeneralDmkError {\n override _tag = \"LKRPHttpRequestError\";\n constructor(readonly err?: unknown) {\n super(err);\n }\n}\n\nexport class LKRPUnauthorizedError extends LKRPHttpRequestError {\n override _tag = \"LKRPUnauthorizedError\";\n constructor(override err?: unknown) {\n super(err);\n }\n}\n\nexport class LKRPParsingError extends GeneralDmkError {\n override readonly _tag = \"LKRPParsingError\";\n constructor(readonly err?: unknown) {\n super(err);\n }\n}\n\nexport class LKRPMissingDataError extends GeneralDmkError {\n override readonly _tag = \"LKRPMissingDataError\";\n constructor(readonly err?: unknown) {\n super(err);\n }\n}\n\nexport class LKRPUnhandledState extends GeneralDmkError {\n override readonly _tag = \"LKRPUnhandledState\";\n constructor(readonly err?: unknown) {\n super(err);\n }\n}\n"],
5
+ "mappings": "AAAA,OAAS,mBAAAA,MAAuB,kCAEzB,MAAMC,UAA6BD,CAAgB,CAExD,YAAqBE,EAAe,CAClC,MAAMA,CAAG,EADU,SAAAA,CAErB,CAHS,KAAO,sBAIlB,CAEO,MAAMC,UAA8BF,CAAqB,CAE9D,YAAqBC,EAAe,CAClC,MAAMA,CAAG,EADU,SAAAA,CAErB,CAHS,KAAO,uBAIlB,CAEO,MAAME,UAAyBJ,CAAgB,CAEpD,YAAqBE,EAAe,CAClC,MAAMA,CAAG,EADU,SAAAA,CAErB,CAHkB,KAAO,kBAI3B,CAEO,MAAMG,UAA6BL,CAAgB,CAExD,YAAqBE,EAAe,CAClC,MAAMA,CAAG,EADU,SAAAA,CAErB,CAHkB,KAAO,sBAI3B,CAEO,MAAMI,UAA2BN,CAAgB,CAEtD,YAAqBE,EAAe,CAClC,MAAMA,CAAG,EADU,SAAAA,CAErB,CAHkB,KAAO,oBAI3B",
6
+ "names": ["GeneralDmkError", "LKRPHttpRequestError", "err", "LKRPUnauthorizedError", "LKRPParsingError", "LKRPMissingDataError", "LKRPUnhandledState"]
7
+ }
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=GetAppNameCommandTypes.js.map
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=GetSeedIdCommandTypes.js.map
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=InitCommandTypes.js.map
@@ -0,0 +1,2 @@
1
+ import{getPublicKey as i,getSharedSecret as y,signAsync as a}from"@noble/secp256k1";import{CryptoUtils as n}from"../../internal/utils/crypto";import{bytesToHex as o}from"../../internal/utils/hex";class u{constructor(r,e=i(r)){this.privateKey=r;this.publicKey=e}pubKeyToU8a(){return this.publicKey}pubKeyToHex(){return o(this.publicKey)}async sign(r){const{r:e,s:t}=await a(r,this.privateKey);return n.derEncode(e,t)}ecdh(r,e=!0){return y(this.privateKey,r,e)}}export{u as KeypairFromBytes};
2
+ //# sourceMappingURL=KeypairFromBytes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../src/api/app-binder/KeypairFromBytes.ts"],
4
+ "sourcesContent": ["import { getPublicKey, getSharedSecret, signAsync } from \"@noble/secp256k1\";\n\nimport { type Keypair } from \"@api/index\";\nimport { CryptoUtils } from \"@internal/utils/crypto\";\nimport { bytesToHex } from \"@internal/utils/hex\";\n\nexport class KeypairFromBytes implements Keypair {\n constructor(\n private readonly privateKey: Uint8Array,\n private readonly publicKey = getPublicKey(privateKey),\n ) {}\n\n pubKeyToU8a(): Uint8Array {\n return this.publicKey;\n }\n\n pubKeyToHex(): string {\n return bytesToHex(this.publicKey);\n }\n\n async sign(message: Uint8Array): Promise<Uint8Array> {\n const { r, s } = await signAsync(message, this.privateKey);\n return CryptoUtils.derEncode(r, s);\n }\n\n ecdh(publicKey: Uint8Array, isCompressed = true): Uint8Array {\n return getSharedSecret(this.privateKey, publicKey, isCompressed);\n }\n}\n"],
5
+ "mappings": "AAAA,OAAS,gBAAAA,EAAc,mBAAAC,EAAiB,aAAAC,MAAiB,mBAGzD,OAAS,eAAAC,MAAmB,yBAC5B,OAAS,cAAAC,MAAkB,sBAEpB,MAAMC,CAAoC,CAC/C,YACmBC,EACAC,EAAYP,EAAaM,CAAU,EACpD,CAFiB,gBAAAA,EACA,eAAAC,CAChB,CAEH,aAA0B,CACxB,OAAO,KAAK,SACd,CAEA,aAAsB,CACpB,OAAOH,EAAW,KAAK,SAAS,CAClC,CAEA,MAAM,KAAKI,EAA0C,CACnD,KAAM,CAAE,EAAAC,EAAG,EAAAC,CAAE,EAAI,MAAMR,EAAUM,EAAS,KAAK,UAAU,EACzD,OAAOL,EAAY,UAAUM,EAAGC,CAAC,CACnC,CAEA,KAAKH,EAAuBI,EAAe,GAAkB,CAC3D,OAAOV,EAAgB,KAAK,WAAYM,EAAWI,CAAY,CACjE,CACF",
6
+ "names": ["getPublicKey", "getSharedSecret", "signAsync", "CryptoUtils", "bytesToHex", "KeypairFromBytes", "privateKey", "publicKey", "message", "r", "s", "isCompressed"]
7
+ }
@@ -0,0 +1,2 @@
1
+ var r=(t=>(t[t.OWNER=4294967295]="OWNER",t[t.CAN_ENCRYPT=1]="CAN_ENCRYPT",t[t.CAN_DERIVE=2]="CAN_DERIVE",t[t.CAN_ADD_BLOCK=4]="CAN_ADD_BLOCK",t))(r||{});export{r as Permissions};
2
+ //# sourceMappingURL=LKRPTypes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": ["../../../../src/api/app-binder/LKRPTypes.ts"],
4
+ "sourcesContent": ["export interface Keypair {\n pubKeyToU8a(): Uint8Array;\n pubKeyToHex(): string;\n sign(message: Uint8Array): Promise<Uint8Array>;\n ecdh(publicKey: Uint8Array): Uint8Array;\n}\n\nexport type JWT = {\n access_token: string;\n permissions: {\n [trustchainId: string]: {\n [path: string]: string[];\n };\n };\n};\n\n/**\n * https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/5865144361/ARCH+LKRP+-+v2+specifications#Member-permissions\n */\nexport enum Permissions {\n OWNER = 0xffffffff, // Owners of the stream have access to everything\n CAN_ENCRYPT = 1, // The member can have access to the stream private key\n CAN_DERIVE = 1 << 1, // The member can have access to the stream chain code (if a member have access to the private key and the chain code it is able to derive sub-streams)\n CAN_ADD_BLOCK = 1 << 2, // The member is authorized to issue blocks in the current stream\n}\n"],
5
+ "mappings": "AAmBO,IAAKA,OACVA,IAAA,MAAQ,YAAR,QACAA,IAAA,YAAc,GAAd,cACAA,IAAA,WAAa,GAAb,aACAA,IAAA,cAAgB,GAAhB,gBAJUA,OAAA",
6
+ "names": ["Permissions"]
7
+ }
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=ParseStreamBlockCommandCommandTypes.js.map
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=ParseStreamBlockHeaderCommandTypes.js.map
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=ParseStreamBlockSignatureTypes.js.map
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=SetTrustedMemberTypes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
+ }
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=SignBlockCommandTypes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
+ }
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=SignBlockHeaderCommandTypes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
+ }
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=SignBlockSignatureCommandTypes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
+ }
@@ -0,0 +1 @@
1
+ //# sourceMappingURL=SignBlockSingleCommandTypes.js.map
@@ -0,0 +1,7 @@
1
+ {
2
+ "version": 3,
3
+ "sources": [],
4
+ "sourcesContent": [],
5
+ "mappings": "",
6
+ "names": []
7
+ }
@@ -1,2 +1,2 @@
1
- export*from"./app-binder/AuthenticateDeviceActionTypes";export*from"./crypto/CryptoService";export*from"./crypto/Key";export*from"./crypto/KeyPair";export*from"./crypto/noble/NobleCryptoService";export*from"./crypto/noble/NobleKey";export*from"./crypto/noble/NobleKeyPair";export*from"./model/Env";export*from"./model/Errors";export*from"./model/JWT";export*from"./model/Permissions";export*from"./LedgerKeyringProtocol";export*from"./LedgerKeyringProtocolBuilder";export*from"../internal/externalTypes";
1
+ export*from"./app-binder/AuthenticateDeviceActionTypes";export*from"./app-binder/KeypairFromBytes";export*from"./app-binder/LKRPTypes";export*from"./LedgerKeyringProtocol";export*from"./LedgerKeyringProtocolBuilder";export*from"../internal/externalTypes";
2
2
  //# sourceMappingURL=index.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../src/api/index.ts"],
4
- "sourcesContent": ["export * from \"./app-binder/AuthenticateDeviceActionTypes\";\nexport * from \"./crypto/CryptoService\";\nexport * from \"./crypto/Key\";\nexport * from \"./crypto/KeyPair\";\nexport * from \"./crypto/noble/NobleCryptoService\";\nexport * from \"./crypto/noble/NobleKey\";\nexport * from \"./crypto/noble/NobleKeyPair\";\nexport * from \"./model/Env\";\nexport * from \"./model/Errors\";\nexport * from \"./model/JWT\";\nexport * from \"./model/Permissions\";\nexport * from \"@api/LedgerKeyringProtocol\";\nexport * from \"@api/LedgerKeyringProtocolBuilder\";\nexport * from \"@internal/externalTypes\";\n"],
5
- "mappings": "AAAA,WAAc,6CACd,WAAc,yBACd,WAAc,eACd,WAAc,mBACd,WAAc,oCACd,WAAc,0BACd,WAAc,8BACd,WAAc,cACd,WAAc,iBACd,WAAc,cACd,WAAc,sBACd,WAAc,6BACd,WAAc,oCACd,WAAc",
4
+ "sourcesContent": ["export * from \"./app-binder/AuthenticateDeviceActionTypes\";\nexport * from \"./app-binder/KeypairFromBytes\";\nexport * from \"./app-binder/LKRPTypes\";\nexport * from \"@api/LedgerKeyringProtocol\";\nexport * from \"@api/LedgerKeyringProtocolBuilder\";\nexport * from \"@internal/externalTypes\";\n"],
5
+ "mappings": "AAAA,WAAc,6CACd,WAAc,gCACd,WAAc,yBACd,WAAc,6BACd,WAAc,oCACd,WAAc",
6
6
  "names": []
7
7
  }
@@ -1,2 +1,2 @@
1
- import{makeContainer as i}from"./di";import{useCasesTypes as r}from"./use-cases/di/useCasesTypes";class y{name;_container;constructor({dmk:e,applicationId:t,cryptoService:a,env:n,baseUrl:o}){this.name="Ledger Keyring Protocol",this._container=i({dmk:e,applicationId:t,cryptoService:a,env:n,baseUrl:o})}authenticate(e){return this._container.get(r.AuthenticateUseCase).execute(e)}encryptData(e,t){return this._container.get(r.EncryptDataUseCase).execute(e,t)}decryptData(e,t){return this._container.get(r.DecryptDataUseCase).execute(e,t)}}export{y as DefaultLedgerKeyringProtocol};
1
+ import{ByteArrayBuilder as f,ByteArrayParser as h}from"@ledgerhq/device-management-kit";import{Maybe as c,Nothing as A}from"purify-ts";import{KeypairFromBytes as l}from"../api/app-binder/KeypairFromBytes";import{makeContainer as K}from"./di";import{AES_BLOCK_SIZE as u,CryptoUtils as n}from"./utils/crypto";import{useCasesTypes as U}from"./use-cases/di/useCasesTypes";class P{name;_container;constructor({dmk:r,sessionId:a,baseUrl:e}){this.name="Ledger Keyring Protocol",this._container=K({dmk:r,sessionId:a,baseUrl:e})}authenticate(r,a,e,t,o,i){return this._container.get(U.AuthenticateUseCase).execute(r,a,e,t,o,i)}encryptData(r,a){const e=new l(r),t=n.randomKeypair(),o=e.ecdh(t.pubKeyToU8a()).slice(1),i=n.hmac(new Uint8Array,o),s=n.randomBytes(16),y=n.encrypt(i,s,a),m=y.subarray(0,-u),p=y.subarray(-u);return new f().add8BitUIntToData(0).addBufferToData(t.pubKeyToU8a()).addBufferToData(s).addBufferToData(p).addBufferToData(m).build()}decryptData(r,a){const e=new h(a);return e.extract8BitUInt()!==0?A:c.sequence([c.fromNullable(e.extractFieldByLength(33)),c.fromNullable(e.extractFieldByLength(16)),c.fromNullable(e.extractFieldByLength(16)),c.fromNullable(e.extractFieldByLength(e.getUnparsedRemainingLength()))]).map(t=>{const o=t[0],i=t[1],s=t[2],y=t[3],p=new l(r).ecdh(o).slice(1),d=n.hmac(new Uint8Array,p),g=new Uint8Array([...y,...s]);return n.decrypt(d,i,g)})}}export{P as DefaultLedgerKeyringProtocol};
2
2
  //# sourceMappingURL=DefaultLedgerKeyringProtocol.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../src/internal/DefaultLedgerKeyringProtocol.ts"],
4
- "sourcesContent": ["import { type DeviceManagementKit } from \"@ledgerhq/device-management-kit\";\nimport { type Container } from \"inversify\";\n\nimport { type AuthenticateDAReturnType } from \"@api/app-binder/AuthenticateDeviceActionTypes\";\nimport { type CryptoService } from \"@api/crypto/CryptoService\";\nimport { type LedgerKeyringProtocol } from \"@api/LedgerKeyringProtocol\";\nimport { type LKRPEnv } from \"@api/model/Env\";\nimport { makeContainer } from \"@internal/di\";\n\nimport {\n type AuthenticateUseCase,\n type AuthenticateUsecaseInput,\n} from \"./use-cases/authentication/AuthenticateUseCase\";\nimport { type DecryptDataUseCase } from \"./use-cases/authentication/DecryptDataUseCase\";\nimport { type EncryptDataUseCase } from \"./use-cases/authentication/EncryptDataUseCase\";\nimport { useCasesTypes } from \"./use-cases/di/useCasesTypes\";\n\ntype DefaultLedgerKeyringProtocolConstructorArgs = {\n dmk: DeviceManagementKit;\n applicationId: number;\n cryptoService: CryptoService;\n env?: LKRPEnv;\n baseUrl?: string;\n};\n\nexport class DefaultLedgerKeyringProtocol implements LedgerKeyringProtocol {\n name: string;\n private _container: Container;\n\n constructor({\n dmk,\n applicationId,\n cryptoService,\n env,\n baseUrl,\n }: DefaultLedgerKeyringProtocolConstructorArgs) {\n this.name = \"Ledger Keyring Protocol\";\n this._container = makeContainer({\n dmk,\n applicationId,\n cryptoService,\n env,\n baseUrl,\n });\n }\n\n authenticate(input: AuthenticateUsecaseInput): AuthenticateDAReturnType {\n return this._container\n .get<AuthenticateUseCase>(useCasesTypes.AuthenticateUseCase)\n .execute(input);\n }\n\n encryptData(\n encryptionKey: Uint8Array,\n data: Uint8Array,\n ): Promise<Uint8Array> {\n return this._container\n .get<EncryptDataUseCase>(useCasesTypes.EncryptDataUseCase)\n .execute(encryptionKey, data);\n }\n\n decryptData(\n encryptionKey: Uint8Array,\n data: Uint8Array,\n ): Promise<Uint8Array> {\n return this._container\n .get<DecryptDataUseCase>(useCasesTypes.DecryptDataUseCase)\n .execute(encryptionKey, data);\n }\n}\n"],
5
- "mappings": "AAOA,OAAS,iBAAAA,MAAqB,eAQ9B,OAAS,iBAAAC,MAAqB,+BAUvB,MAAMC,CAA8D,CACzE,KACQ,WAER,YAAY,CACV,IAAAC,EACA,cAAAC,EACA,cAAAC,EACA,IAAAC,EACA,QAAAC,CACF,EAAgD,CAC9C,KAAK,KAAO,0BACZ,KAAK,WAAaP,EAAc,CAC9B,IAAAG,EACA,cAAAC,EACA,cAAAC,EACA,IAAAC,EACA,QAAAC,CACF,CAAC,CACH,CAEA,aAAaC,EAA2D,CACtE,OAAO,KAAK,WACT,IAAyBP,EAAc,mBAAmB,EAC1D,QAAQO,CAAK,CAClB,CAEA,YACEC,EACAC,EACqB,CACrB,OAAO,KAAK,WACT,IAAwBT,EAAc,kBAAkB,EACxD,QAAQQ,EAAeC,CAAI,CAChC,CAEA,YACED,EACAC,EACqB,CACrB,OAAO,KAAK,WACT,IAAwBT,EAAc,kBAAkB,EACxD,QAAQQ,EAAeC,CAAI,CAChC,CACF",
6
- "names": ["makeContainer", "useCasesTypes", "DefaultLedgerKeyringProtocol", "dmk", "applicationId", "cryptoService", "env", "baseUrl", "input", "encryptionKey", "data"]
4
+ "sourcesContent": ["import {\n type DeviceManagementKit,\n type DeviceSessionId,\n} from \"@ledgerhq/device-management-kit\";\nimport {\n ByteArrayBuilder,\n ByteArrayParser,\n} from \"@ledgerhq/device-management-kit\";\nimport { type Container } from \"inversify\";\nimport { Maybe, Nothing } from \"purify-ts\";\n\nimport { type AuthenticateDAReturnType } from \"@api/app-binder/AuthenticateDeviceActionTypes\";\nimport { KeypairFromBytes } from \"@api/app-binder/KeypairFromBytes\";\nimport {\n type JWT,\n type Keypair,\n type Permissions,\n} from \"@api/app-binder/LKRPTypes\";\nimport { type LedgerKeyringProtocol } from \"@api/LedgerKeyringProtocol\";\nimport { makeContainer } from \"@internal/di\";\nimport { AES_BLOCK_SIZE, CryptoUtils } from \"@internal/utils/crypto\";\n\nimport { type AuthenticateUseCase } from \"./use-cases/authentication/AuthenticateUseCase\";\nimport { useCasesTypes } from \"./use-cases/di/useCasesTypes\";\n\ntype DefaultLedgerKeyringProtocolConstructorArgs = {\n dmk: DeviceManagementKit;\n sessionId: DeviceSessionId;\n baseUrl: string;\n};\n\nexport class DefaultLedgerKeyringProtocol implements LedgerKeyringProtocol {\n name: string;\n private _container: Container;\n\n constructor({\n dmk,\n sessionId,\n baseUrl,\n }: DefaultLedgerKeyringProtocolConstructorArgs) {\n this.name = \"Ledger Keyring Protocol\";\n this._container = makeContainer({ dmk, sessionId, baseUrl });\n }\n\n authenticate(\n keypair: Keypair,\n applicationId: number,\n clientName: string,\n permissions: Permissions,\n trustchainId?: string,\n jwt?: JWT,\n ): AuthenticateDAReturnType {\n return this._container\n .get<AuthenticateUseCase>(useCasesTypes.AuthenticateUseCase)\n .execute(\n keypair,\n applicationId,\n clientName,\n permissions,\n trustchainId,\n jwt,\n );\n }\n\n // TODO Better return type for error management instead of exceptions\n encryptData(encryptionKey: Uint8Array, data: Uint8Array): Uint8Array {\n // TODO move implem in a use case\n\n // Derive the shared secret using ECDH with an ephemeral keypair\n const privateKey = new KeypairFromBytes(encryptionKey);\n const ephemeralKeypair = CryptoUtils.randomKeypair();\n const sharedSecret = privateKey\n .ecdh(ephemeralKeypair.pubKeyToU8a())\n .slice(1);\n\n // Key derivation using HMAC-SHA256\n const key = CryptoUtils.hmac(new Uint8Array(), sharedSecret);\n\n // Generate a random IV (nonce)\n const iv = CryptoUtils.randomBytes(16);\n\n // Encrypt data\n const ciphertext = CryptoUtils.encrypt(key, iv, data);\n const encryptedData = ciphertext.subarray(0, -AES_BLOCK_SIZE);\n const tag = ciphertext.subarray(-AES_BLOCK_SIZE);\n\n // Serialize the result\n return new ByteArrayBuilder()\n .add8BitUIntToData(0) // Version of the format\n .addBufferToData(ephemeralKeypair.pubKeyToU8a())\n .addBufferToData(iv)\n .addBufferToData(tag)\n .addBufferToData(encryptedData)\n .build();\n }\n\n decryptData(encryptionKey: Uint8Array, data: Uint8Array): Maybe<Uint8Array> {\n // TODO move implem in a use case\n\n const parser = new ByteArrayParser(data);\n if (parser.extract8BitUInt() !== 0) {\n // Unsupported serialization version\n return Nothing;\n }\n return Maybe.sequence([\n Maybe.fromNullable(parser.extractFieldByLength(33)),\n Maybe.fromNullable(parser.extractFieldByLength(16)),\n Maybe.fromNullable(parser.extractFieldByLength(16)),\n Maybe.fromNullable(\n parser.extractFieldByLength(parser.getUnparsedRemainingLength()),\n ),\n ]).map((parsed) => {\n const ephemeralPublicKey = parsed[0]!;\n const iv = parsed[1]!;\n const tag = parsed[2]!;\n const encryptedData = parsed[3]!;\n\n // Derive the shared secret using ECDH with an ephemeral keypair\n const privateKey = new KeypairFromBytes(encryptionKey);\n const sharedSecret = privateKey.ecdh(ephemeralPublicKey).slice(1);\n\n // Key derivation using HMAC-SHA256\n const key = CryptoUtils.hmac(new Uint8Array(), sharedSecret);\n\n // Decrypt the data\n const ciphertext = new Uint8Array([...encryptedData, ...tag]);\n const cleartext = CryptoUtils.decrypt(key, iv, ciphertext);\n return cleartext;\n });\n }\n}\n"],
5
+ "mappings": "AAIA,OACE,oBAAAA,EACA,mBAAAC,MACK,kCAEP,OAAS,SAAAC,EAAO,WAAAC,MAAe,YAG/B,OAAS,oBAAAC,MAAwB,mCAOjC,OAAS,iBAAAC,MAAqB,eAC9B,OAAS,kBAAAC,EAAgB,eAAAC,MAAmB,yBAG5C,OAAS,iBAAAC,MAAqB,+BAQvB,MAAMC,CAA8D,CACzE,KACQ,WAER,YAAY,CACV,IAAAC,EACA,UAAAC,EACA,QAAAC,CACF,EAAgD,CAC9C,KAAK,KAAO,0BACZ,KAAK,WAAaP,EAAc,CAAE,IAAAK,EAAK,UAAAC,EAAW,QAAAC,CAAQ,CAAC,CAC7D,CAEA,aACEC,EACAC,EACAC,EACAC,EACAC,EACAC,EAC0B,CAC1B,OAAO,KAAK,WACT,IAAyBV,EAAc,mBAAmB,EAC1D,QACCK,EACAC,EACAC,EACAC,EACAC,EACAC,CACF,CACJ,CAGA,YAAYC,EAA2BC,EAA8B,CAInE,MAAMC,EAAa,IAAIjB,EAAiBe,CAAa,EAC/CG,EAAmBf,EAAY,cAAc,EAC7CgB,EAAeF,EAClB,KAAKC,EAAiB,YAAY,CAAC,EACnC,MAAM,CAAC,EAGJE,EAAMjB,EAAY,KAAK,IAAI,WAAcgB,CAAY,EAGrDE,EAAKlB,EAAY,YAAY,EAAE,EAG/BmB,EAAanB,EAAY,QAAQiB,EAAKC,EAAIL,CAAI,EAC9CO,EAAgBD,EAAW,SAAS,EAAG,CAACpB,CAAc,EACtDsB,EAAMF,EAAW,SAAS,CAACpB,CAAc,EAG/C,OAAO,IAAIN,EAAiB,EACzB,kBAAkB,CAAC,EACnB,gBAAgBsB,EAAiB,YAAY,CAAC,EAC9C,gBAAgBG,CAAE,EAClB,gBAAgBG,CAAG,EACnB,gBAAgBD,CAAa,EAC7B,MAAM,CACX,CAEA,YAAYR,EAA2BC,EAAqC,CAG1E,MAAMS,EAAS,IAAI5B,EAAgBmB,CAAI,EACvC,OAAIS,EAAO,gBAAgB,IAAM,EAExB1B,EAEFD,EAAM,SAAS,CACpBA,EAAM,aAAa2B,EAAO,qBAAqB,EAAE,CAAC,EAClD3B,EAAM,aAAa2B,EAAO,qBAAqB,EAAE,CAAC,EAClD3B,EAAM,aAAa2B,EAAO,qBAAqB,EAAE,CAAC,EAClD3B,EAAM,aACJ2B,EAAO,qBAAqBA,EAAO,2BAA2B,CAAC,CACjE,CACF,CAAC,EAAE,IAAKC,GAAW,CACjB,MAAMC,EAAqBD,EAAO,CAAC,EAC7BL,EAAKK,EAAO,CAAC,EACbF,EAAME,EAAO,CAAC,EACdH,EAAgBG,EAAO,CAAC,EAIxBP,EADa,IAAInB,EAAiBe,CAAa,EACrB,KAAKY,CAAkB,EAAE,MAAM,CAAC,EAG1DP,EAAMjB,EAAY,KAAK,IAAI,WAAcgB,CAAY,EAGrDG,EAAa,IAAI,WAAW,CAAC,GAAGC,EAAe,GAAGC,CAAG,CAAC,EAE5D,OADkBrB,EAAY,QAAQiB,EAAKC,EAAIC,CAAU,CAE3D,CAAC,CACH,CACF",
6
+ "names": ["ByteArrayBuilder", "ByteArrayParser", "Maybe", "Nothing", "KeypairFromBytes", "makeContainer", "AES_BLOCK_SIZE", "CryptoUtils", "useCasesTypes", "DefaultLedgerKeyringProtocol", "dmk", "sessionId", "baseUrl", "keypair", "applicationId", "clientName", "permissions", "trustchainId", "jwt", "encryptionKey", "data", "privateKey", "ephemeralKeypair", "sharedSecret", "key", "iv", "ciphertext", "encryptedData", "tag", "parser", "parsed", "ephemeralPublicKey"]
7
7
  }
@@ -1,2 +1,2 @@
1
- var d=Object.defineProperty;var y=Object.getOwnPropertyDescriptor;var u=(n,e,r,i)=>{for(var t=i>1?void 0:i?y(e,r):e,c=n.length-1,s;c>=0;c--)(s=n[c])&&(t=(i?s(e,r,t):s(t))||t);return i&&t&&d(e,r,t),t},o=(n,e)=>(r,i)=>e(r,i,n);import{SendCommandInAppDeviceAction as h,UserInteractionRequired as D}from"@ledgerhq/device-management-kit";import{inject as p,injectable as k}from"inversify";import{externalTypes as m}from"../externalTypes";import{lkrpDatasourceTypes as v}from"../lkrp-datasource/di/lkrpDatasourceTypes";import{GetVersionCommand as l}from"./command/GetVersionCommand";import{AuthenticateWithDeviceDeviceAction as A}from"./device-action/AuthenticateWithDeviceDeviceAction";import{AuthenticateWithKeypairDeviceAction as S}from"./device-action/AuthenticateWithKeypairDeviceAction";let a=class{constructor(e,r,i,t){this.dmk=e;this.applicationId=r;this.cryptoService=i;this.lkrpDataSource=t}authenticateWithKeypair(e){return new S({input:{lkrpDataSource:this.lkrpDataSource,appId:this.applicationId,cryptoService:this.cryptoService,keypair:e.keypair,trustchainId:e.trustchainId}}).execute()}authenticateWithDevice(e){return this.dmk.executeDeviceAction({sessionId:e.sessionId,deviceAction:new A({input:{lkrpDataSource:this.lkrpDataSource,appId:this.applicationId,cryptoService:this.cryptoService,clientName:e.clientName,permissions:e.permissions,keypair:e.keypair}})})}getVersion(e){return this.dmk.executeDeviceAction({sessionId:e.sessionId,deviceAction:new h({input:{command:new l,appName:"Ledger Sync",requiredUserInteraction:D.None,skipOpenApp:e.skipOpenApp}})})}getAppName(){throw new Error("Not implemented")}getSeedId(){throw new Error("Not implemented")}init(){throw new Error("Not implemented")}parseStream(){throw new Error("Not implemented")}signBlock(){throw new Error("Not implemented")}setTrustedMember(){throw new Error("Not implemented")}};a=u([k(),o(0,p(m.Dmk)),o(1,p(m.ApplicationId)),o(2,p(m.CryptoService)),o(3,p(v.LKRPDataSource))],a);export{a as LedgerKeyringProtocolBinder};
1
+ var d=Object.defineProperty;var l=Object.getOwnPropertyDescriptor;var c=(r,e,i,t)=>{for(var n=t>1?void 0:t?l(e,i):e,s=r.length-1,m;s>=0;s--)(m=r[s])&&(n=(t?m(e,i,n):m(n))||n);return t&&n&&d(e,i,n),n},o=(r,e)=>(i,t)=>e(i,t,r);import{SendCommandInAppDeviceAction as w,UserInteractionRequired as k}from"@ledgerhq/device-management-kit";import{inject as a,injectable as D}from"inversify";import{externalTypes as u}from"../externalTypes";import{lkrpDatasourceTypes as h}from"../lkrp-datasource/di/lkrpDatasourceTypes";import{GetVersionCommand as A}from"./command/GetVersionCommand";import{AuthenticateDeviceAction as I}from"./device-action/AuthenticateDeviceAction";let p=class{constructor(e,i,t){this.dmk=e;this.sessionId=i;this.lkrpDataSource=t}authenticate(e){return this.dmk.executeDeviceAction({sessionId:this.sessionId,deviceAction:new I({input:{lkrpDataSource:this.lkrpDataSource,applicationId:e.applicationId,clientName:e.clientName,permissions:e.permissions,keypair:e.keypair,trustchainId:e.trustchainId??null,jwt:e.jwt??null}})})}getVersion(e){return this.dmk.executeDeviceAction({sessionId:this.sessionId,deviceAction:new w({input:{command:new A,appName:"Ledger Sync",requiredUserInteraction:k.None,skipOpenApp:e.skipOpenApp}})})}getAppName(){throw new Error("Not implemented")}getSeedId(){throw new Error("Not implemented")}init(){throw new Error("Not implemented")}parseStream(){throw new Error("Not implemented")}signBlock(){throw new Error("Not implemented")}setTrustedMember(){throw new Error("Not implemented")}};p=c([D(),o(0,a(u.Dmk)),o(1,a(u.SessionId)),o(2,a(h.LKRPDataSource))],p);export{p as LedgerKeyringProtocolBinder};
2
2
  //# sourceMappingURL=LedgerKeyringProtocolBinder.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../src/internal/app-binder/LedgerKeyringProtocolBinder.ts"],
4
- "sourcesContent": ["import {\n DeviceManagementKit,\n type DeviceSessionId,\n SendCommandInAppDeviceAction,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\n\nimport { AuthenticateDAReturnType } from \"@api/app-binder/AuthenticateDeviceActionTypes\";\nimport { GetVersionDAReturnType } from \"@api/app-binder/GetVersionDeviceActionTypes\";\nimport { type CryptoService } from \"@api/crypto/CryptoService\";\nimport { KeyPair } from \"@api/crypto/KeyPair\";\nimport { Permissions } from \"@api/model/Permissions\";\nimport { externalTypes } from \"@internal/externalTypes\";\nimport { type LKRPDataSource } from \"@internal/lkrp-datasource/data/LKRPDataSource\";\nimport { lkrpDatasourceTypes } from \"@internal/lkrp-datasource/di/lkrpDatasourceTypes\";\n\nimport { GetVersionCommand } from \"./command/GetVersionCommand\";\nimport { AuthenticateWithDeviceDeviceAction } from \"./device-action/AuthenticateWithDeviceDeviceAction\";\nimport { AuthenticateWithKeypairDeviceAction } from \"./device-action/AuthenticateWithKeypairDeviceAction\";\n\n@injectable()\nexport class LedgerKeyringProtocolBinder {\n constructor(\n @inject(externalTypes.Dmk) private readonly dmk: DeviceManagementKit,\n\n @inject(externalTypes.ApplicationId)\n private readonly applicationId: number,\n\n @inject(externalTypes.CryptoService)\n private readonly cryptoService: CryptoService,\n\n @inject(lkrpDatasourceTypes.LKRPDataSource)\n private readonly lkrpDataSource: LKRPDataSource,\n ) {}\n\n authenticateWithKeypair(args: {\n keypair: KeyPair;\n trustchainId: string;\n }): AuthenticateDAReturnType {\n return new AuthenticateWithKeypairDeviceAction({\n input: {\n lkrpDataSource: this.lkrpDataSource,\n appId: this.applicationId,\n cryptoService: this.cryptoService,\n keypair: args.keypair,\n trustchainId: args.trustchainId,\n },\n }).execute();\n }\n\n authenticateWithDevice(args: {\n keypair: KeyPair;\n clientName: string;\n permissions: Permissions;\n sessionId: DeviceSessionId;\n }): AuthenticateDAReturnType {\n return this.dmk.executeDeviceAction({\n sessionId: args.sessionId,\n deviceAction: new AuthenticateWithDeviceDeviceAction({\n input: {\n lkrpDataSource: this.lkrpDataSource,\n appId: this.applicationId,\n cryptoService: this.cryptoService,\n clientName: args.clientName,\n permissions: args.permissions,\n keypair: args.keypair,\n },\n }),\n });\n }\n\n getVersion(args: {\n skipOpenApp: boolean;\n sessionId: DeviceSessionId;\n }): GetVersionDAReturnType {\n return this.dmk.executeDeviceAction({\n sessionId: args.sessionId,\n deviceAction: new SendCommandInAppDeviceAction({\n input: {\n command: new GetVersionCommand(),\n appName: \"Ledger Sync\",\n requiredUserInteraction: UserInteractionRequired.None,\n skipOpenApp: args.skipOpenApp,\n },\n }),\n });\n }\n\n getAppName(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n getSeedId(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n init(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n parseStream(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n signBlock(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n setTrustedMember(): unknown {\n throw new Error(\"Not implemented\");\n }\n}\n"],
5
- "mappings": "iOAAA,OAGE,gCAAAA,EACA,2BAAAC,MACK,kCACP,OAAS,UAAAC,EAAQ,cAAAC,MAAkB,YAOnC,OAAS,iBAAAC,MAAqB,0BAE9B,OAAS,uBAAAC,MAA2B,mDAEpC,OAAS,qBAAAC,MAAyB,8BAClC,OAAS,sCAAAC,MAA0C,qDACnD,OAAS,uCAAAC,MAA2C,sDAG7C,IAAMC,EAAN,KAAkC,CACvC,YAC8CC,EAG3BC,EAGAC,EAGAC,EACjB,CAV4C,SAAAH,EAG3B,mBAAAC,EAGA,mBAAAC,EAGA,oBAAAC,CAChB,CAEH,wBAAwBC,EAGK,CAC3B,OAAO,IAAIC,EAAoC,CAC7C,MAAO,CACL,eAAgB,KAAK,eACrB,MAAO,KAAK,cACZ,cAAe,KAAK,cACpB,QAASD,EAAK,QACd,aAAcA,EAAK,YACrB,CACF,CAAC,EAAE,QAAQ,CACb,CAEA,uBAAuBA,EAKM,CAC3B,OAAO,KAAK,IAAI,oBAAoB,CAClC,UAAWA,EAAK,UAChB,aAAc,IAAIE,EAAmC,CACnD,MAAO,CACL,eAAgB,KAAK,eACrB,MAAO,KAAK,cACZ,cAAe,KAAK,cACpB,WAAYF,EAAK,WACjB,YAAaA,EAAK,YAClB,QAASA,EAAK,OAChB,CACF,CAAC,CACH,CAAC,CACH,CAEA,WAAWA,EAGgB,CACzB,OAAO,KAAK,IAAI,oBAAoB,CAClC,UAAWA,EAAK,UAChB,aAAc,IAAIG,EAA6B,CAC7C,MAAO,CACL,QAAS,IAAIC,EACb,QAAS,cACT,wBAAyBC,EAAwB,KACjD,YAAaL,EAAK,WACpB,CACF,CAAC,CACH,CAAC,CACH,CAEA,YAAsB,CACpB,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,WAAqB,CACnB,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,MAAgB,CACd,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,aAAuB,CACrB,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,WAAqB,CACnB,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,kBAA4B,CAC1B,MAAM,IAAI,MAAM,iBAAiB,CACnC,CACF,EA1FaL,EAANW,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAc,GAAG,GAExBF,EAAA,EAAAC,EAAOC,EAAc,aAAa,GAGlCF,EAAA,EAAAC,EAAOC,EAAc,aAAa,GAGlCF,EAAA,EAAAC,EAAOE,EAAoB,cAAc,IAVjChB",
6
- "names": ["SendCommandInAppDeviceAction", "UserInteractionRequired", "inject", "injectable", "externalTypes", "lkrpDatasourceTypes", "GetVersionCommand", "AuthenticateWithDeviceDeviceAction", "AuthenticateWithKeypairDeviceAction", "LedgerKeyringProtocolBinder", "dmk", "applicationId", "cryptoService", "lkrpDataSource", "args", "AuthenticateWithKeypairDeviceAction", "AuthenticateWithDeviceDeviceAction", "SendCommandInAppDeviceAction", "GetVersionCommand", "UserInteractionRequired", "__decorateClass", "injectable", "__decorateParam", "inject", "externalTypes", "lkrpDatasourceTypes"]
4
+ "sourcesContent": ["import {\n DeviceManagementKit,\n type DeviceSessionId,\n SendCommandInAppDeviceAction,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { inject, injectable } from \"inversify\";\n\nimport { AuthenticateDAReturnType } from \"@api/app-binder/AuthenticateDeviceActionTypes\";\nimport { GetVersionDAReturnType } from \"@api/app-binder/GetVersionDeviceActionTypes\";\nimport { JWT, Keypair, Permissions } from \"@api/app-binder/LKRPTypes\";\nimport { externalTypes } from \"@internal/externalTypes\";\nimport { type LKRPDataSource } from \"@internal/lkrp-datasource/data/LKRPDataSource\";\nimport { lkrpDatasourceTypes } from \"@internal/lkrp-datasource/di/lkrpDatasourceTypes\";\n\nimport { GetVersionCommand } from \"./command/GetVersionCommand\";\nimport { AuthenticateDeviceAction } from \"./device-action/AuthenticateDeviceAction\";\n\n@injectable()\nexport class LedgerKeyringProtocolBinder {\n constructor(\n @inject(externalTypes.Dmk) private readonly dmk: DeviceManagementKit,\n\n @inject(externalTypes.SessionId)\n private readonly sessionId: DeviceSessionId,\n\n @inject(lkrpDatasourceTypes.LKRPDataSource)\n private readonly lkrpDataSource: LKRPDataSource,\n ) {}\n\n authenticate(args: {\n keypair: Keypair;\n applicationId: number;\n clientName: string;\n permissions: Permissions;\n trustchainId?: string;\n jwt?: JWT;\n }): AuthenticateDAReturnType {\n return this.dmk.executeDeviceAction({\n sessionId: this.sessionId,\n deviceAction: new AuthenticateDeviceAction({\n input: {\n lkrpDataSource: this.lkrpDataSource,\n applicationId: args.applicationId,\n clientName: args.clientName,\n permissions: args.permissions,\n keypair: args.keypair,\n trustchainId: args.trustchainId ?? null,\n jwt: args.jwt ?? null,\n },\n }),\n });\n }\n\n getVersion(args: { skipOpenApp: boolean }): GetVersionDAReturnType {\n return this.dmk.executeDeviceAction({\n sessionId: this.sessionId,\n deviceAction: new SendCommandInAppDeviceAction({\n input: {\n command: new GetVersionCommand(),\n appName: \"Ledger Sync\",\n requiredUserInteraction: UserInteractionRequired.None,\n skipOpenApp: args.skipOpenApp,\n },\n }),\n });\n }\n\n getAppName(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n getSeedId(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n init(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n parseStream(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n signBlock(): unknown {\n throw new Error(\"Not implemented\");\n }\n\n setTrustedMember(): unknown {\n throw new Error(\"Not implemented\");\n }\n}\n"],
5
+ "mappings": "iOAAA,OAGE,gCAAAA,EACA,2BAAAC,MACK,kCACP,OAAS,UAAAC,EAAQ,cAAAC,MAAkB,YAKnC,OAAS,iBAAAC,MAAqB,0BAE9B,OAAS,uBAAAC,MAA2B,mDAEpC,OAAS,qBAAAC,MAAyB,8BAClC,OAAS,4BAAAC,MAAgC,2CAGlC,IAAMC,EAAN,KAAkC,CACvC,YAC8CC,EAG3BC,EAGAC,EACjB,CAP4C,SAAAF,EAG3B,eAAAC,EAGA,oBAAAC,CAChB,CAEH,aAAaC,EAOgB,CAC3B,OAAO,KAAK,IAAI,oBAAoB,CAClC,UAAW,KAAK,UAChB,aAAc,IAAIC,EAAyB,CACzC,MAAO,CACL,eAAgB,KAAK,eACrB,cAAeD,EAAK,cACpB,WAAYA,EAAK,WACjB,YAAaA,EAAK,YAClB,QAASA,EAAK,QACd,aAAcA,EAAK,cAAgB,KACnC,IAAKA,EAAK,KAAO,IACnB,CACF,CAAC,CACH,CAAC,CACH,CAEA,WAAWA,EAAwD,CACjE,OAAO,KAAK,IAAI,oBAAoB,CAClC,UAAW,KAAK,UAChB,aAAc,IAAIE,EAA6B,CAC7C,MAAO,CACL,QAAS,IAAIC,EACb,QAAS,cACT,wBAAyBC,EAAwB,KACjD,YAAaJ,EAAK,WACpB,CACF,CAAC,CACH,CAAC,CACH,CAEA,YAAsB,CACpB,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,WAAqB,CACnB,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,MAAgB,CACd,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,aAAuB,CACrB,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,WAAqB,CACnB,MAAM,IAAI,MAAM,iBAAiB,CACnC,CAEA,kBAA4B,CAC1B,MAAM,IAAI,MAAM,iBAAiB,CACnC,CACF,EAxEaJ,EAANS,EAAA,CADNC,EAAW,EAGPC,EAAA,EAAAC,EAAOC,EAAc,GAAG,GAExBF,EAAA,EAAAC,EAAOC,EAAc,SAAS,GAG9BF,EAAA,EAAAC,EAAOE,EAAoB,cAAc,IAPjCd",
6
+ "names": ["SendCommandInAppDeviceAction", "UserInteractionRequired", "inject", "injectable", "externalTypes", "lkrpDatasourceTypes", "GetVersionCommand", "AuthenticateDeviceAction", "LedgerKeyringProtocolBinder", "dmk", "sessionId", "lkrpDataSource", "args", "AuthenticateDeviceAction", "SendCommandInAppDeviceAction", "GetVersionCommand", "UserInteractionRequired", "__decorateClass", "injectable", "__decorateParam", "inject", "externalTypes", "lkrpDatasourceTypes"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{ApduBuilder as t,ApduParser as m,CommandResultFactory as o,InvalidStatusWordError as n}from"@ledgerhq/device-management-kit";import{CommandErrorHelper as d}from"@ledgerhq/signer-utils";import{Maybe as a}from"purify-ts";import{LEDGER_SYNC_ERRORS as s,LedgerKeyringProtocolErrorFactory as i}from"./utils/ledgerKeyringProtocolErrors";class C{errorHelper=new d(s,i);getApdu(){const e={cla:224,ins:3,p1:0,p2:0};return new t(e).build()}parseResponse(e){return a.fromNullable(this.errorHelper.getError(e)).orDefaultLazy(()=>{const r=new m(e).encodeToString(e.data);return r?o({data:{name:r}}):o({error:new n("Name is missing")})})}}export{C as GetAppNameCommand};
1
+ import{ApduBuilder as t,ApduParser as m,CommandResultFactory as o,InvalidStatusWordError as n}from"@ledgerhq/device-management-kit";import{CommandErrorHelper as a}from"@ledgerhq/signer-utils";import{Maybe as d}from"purify-ts";import{LEDGER_SYNC_ERRORS as s,LedgerKeyringProtocolErrorFactory as i}from"./utils/ledgerKeyringProtocolErrors";class C{errorHelper=new a(s,i);getApdu(){const e={cla:224,ins:3,p1:0,p2:0};return new t(e).build()}parseResponse(e){return d.fromNullable(this.errorHelper.getError(e)).orDefaultLazy(()=>{const r=new m(e).encodeToString(e.data);return r?o({data:{name:r}}):o({error:new n("Name is missing")})})}}export{C as GetAppNameCommand};
2
2
  //# sourceMappingURL=GetAppNameCommand.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/command/GetAppNameCommand.ts"],
4
- "sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n LEDGER_SYNC_ERRORS,\n type LedgerKeyringProtocolErrorCodes,\n LedgerKeyringProtocolErrorFactory,\n} from \"./utils/ledgerKeyringProtocolErrors\";\n\nexport type GetAppNameCommandResponse = {\n readonly name: string;\n};\n\nexport type GetAppNameCommandArgs = undefined;\n\nexport class GetAppNameCommand\n implements\n Command<\n GetAppNameCommandResponse,\n GetAppNameCommandArgs,\n LedgerKeyringProtocolErrorCodes\n >\n{\n private readonly errorHelper = new CommandErrorHelper<\n GetAppNameCommandResponse,\n LedgerKeyringProtocolErrorCodes\n >(LEDGER_SYNC_ERRORS, LedgerKeyringProtocolErrorFactory);\n\n getApdu(): Apdu {\n const getAppNameArgs: ApduBuilderArgs = {\n cla: 0xe0,\n ins: 0x03,\n p1: 0x00,\n p2: 0x00,\n };\n\n const builder = new ApduBuilder(getAppNameArgs);\n return builder.build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<GetAppNameCommandResponse, LedgerKeyringProtocolErrorCodes> {\n return Maybe.fromNullable(\n this.errorHelper.getError(apduResponse),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(apduResponse);\n\n const name = parser.encodeToString(apduResponse.data);\n\n if (!name) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(`Name is missing`),\n });\n }\n\n return CommandResultFactory({\n data: { name },\n });\n });\n }\n}\n"],
5
- "mappings": "AAAA,OAEE,eAAAA,EAEA,cAAAC,EAIA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,yBACnC,OAAS,SAAAC,MAAa,YAEtB,OACE,sBAAAC,EAEA,qCAAAC,MACK,sCAQA,MAAMC,CAOb,CACmB,YAAc,IAAIJ,EAGjCE,EAAoBC,CAAiC,EAEvD,SAAgB,CACd,MAAME,EAAkC,CACtC,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,EAGA,OADgB,IAAIT,EAAYS,CAAc,EAC/B,MAAM,CACvB,CAEA,cACEC,EAC2E,CAC3E,OAAOL,EAAM,aACX,KAAK,YAAY,SAASK,CAAY,CACxC,EAAE,cAAc,IAAM,CAGpB,MAAMC,EAFS,IAAIV,EAAWS,CAAY,EAEtB,eAAeA,EAAa,IAAI,EAEpD,OAAKC,EAMET,EAAqB,CAC1B,KAAM,CAAE,KAAAS,CAAK,CACf,CAAC,EAPQT,EAAqB,CAC1B,MAAO,IAAIC,EAAuB,iBAAiB,CACrD,CAAC,CAML,CAAC,CACH,CACF",
4
+ "sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n type GetAppNameCommandArgs,\n type GetAppNameCommandResponse,\n} from \"@api/app-binder/GetAppNameCommandTypes\";\n\nimport {\n LEDGER_SYNC_ERRORS,\n type LedgerKeyringProtocolErrorCodes,\n LedgerKeyringProtocolErrorFactory,\n} from \"./utils/ledgerKeyringProtocolErrors\";\n\nexport class GetAppNameCommand\n implements\n Command<\n GetAppNameCommandResponse,\n GetAppNameCommandArgs,\n LedgerKeyringProtocolErrorCodes\n >\n{\n private readonly errorHelper = new CommandErrorHelper<\n GetAppNameCommandResponse,\n LedgerKeyringProtocolErrorCodes\n >(LEDGER_SYNC_ERRORS, LedgerKeyringProtocolErrorFactory);\n\n getApdu(): Apdu {\n const getAppNameArgs: ApduBuilderArgs = {\n cla: 0xe0,\n ins: 0x03,\n p1: 0x00,\n p2: 0x00,\n };\n\n const builder = new ApduBuilder(getAppNameArgs);\n return builder.build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<GetAppNameCommandResponse, LedgerKeyringProtocolErrorCodes> {\n return Maybe.fromNullable(\n this.errorHelper.getError(apduResponse),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(apduResponse);\n\n const name = parser.encodeToString(apduResponse.data);\n\n if (!name) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(`Name is missing`),\n });\n }\n\n return CommandResultFactory({\n data: { name },\n });\n });\n }\n}\n"],
5
+ "mappings": "AAAA,OAEE,eAAAA,EAEA,cAAAC,EAIA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,yBACnC,OAAS,SAAAC,MAAa,YAOtB,OACE,sBAAAC,EAEA,qCAAAC,MACK,sCAEA,MAAMC,CAOb,CACmB,YAAc,IAAIJ,EAGjCE,EAAoBC,CAAiC,EAEvD,SAAgB,CACd,MAAME,EAAkC,CACtC,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,EAGA,OADgB,IAAIT,EAAYS,CAAc,EAC/B,MAAM,CACvB,CAEA,cACEC,EAC2E,CAC3E,OAAOL,EAAM,aACX,KAAK,YAAY,SAASK,CAAY,CACxC,EAAE,cAAc,IAAM,CAGpB,MAAMC,EAFS,IAAIV,EAAWS,CAAY,EAEtB,eAAeA,EAAa,IAAI,EAEpD,OAAKC,EAMET,EAAqB,CAC1B,KAAM,CAAE,KAAAS,CAAK,CACf,CAAC,EAPQT,EAAqB,CAC1B,MAAO,IAAIC,EAAuB,iBAAiB,CACrD,CAAC,CAML,CAAC,CACH,CACF",
6
6
  "names": ["ApduBuilder", "ApduParser", "CommandResultFactory", "InvalidStatusWordError", "CommandErrorHelper", "Maybe", "LEDGER_SYNC_ERRORS", "LedgerKeyringProtocolErrorFactory", "GetAppNameCommand", "getAppNameArgs", "apduResponse", "name"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{ApduBuilder as g,ApduParser as m,bufferToHexaString as n,CommandResultFactory as o,InvalidStatusWordError as l}from"@ledgerhq/device-management-kit";import{CommandErrorHelper as c}from"@ledgerhq/signer-utils";import{Maybe as a}from"purify-ts";import{eitherSeqRecord as s}from"../../utils/eitherSeqRecord";import{LEDGER_SYNC_ERRORS as u,LedgerKeyringProtocolErrorFactory as p}from"./utils/ledgerKeyringProtocolErrors";class B{constructor(i){this.args=i}errorHelper=new c(u,p);getApdu(){const{challengeTLV:i}=this.args,r={cla:224,ins:5,p1:0,p2:0};return new g(r).addHexaStringToData(i).build()}parseResponse(i){return a.fromNullable(this.errorHelper.getError(i)).orDefaultLazy(()=>{const r=new m(i),t=(e,d)=>a.fromNullable(e).toEither(new l(d));return s({credential:()=>s({version:()=>t(r.extract8BitUInt(),"Version is missing"),curveId:()=>t(r.extract8BitUInt(),"Curve ID is missing"),signAlgorithm:()=>t(r.extract8BitUInt(),"Sign algorithm is missing"),publicKey:()=>t(r.extract8BitUInt(),"Public key length is missing").chain(e=>t(r.extractFieldByLength(e),"Public key is missing")).map(e=>n(e,!1))}),signature:()=>t(r.extract8BitUInt(),"Signature length is missing").chain(e=>t(r.extractFieldByLength(e),"Signature is missing")).map(e=>n(e,!1)),attestation:()=>s({id:()=>t(r.extractFieldByLength(1),"Attestation Id is missing"),version:()=>t(r.extract8BitUInt(),"Attestation version is missing"),curveId:()=>t(r.extract8BitUInt(),"Attestation curve ID is missing"),signAlgorithm:()=>t(r.extract8BitUInt(),"Attestation sign algorithm is missing"),publicKey:()=>t(r.extract8BitUInt(),"Attestation key length is missing").chain(e=>t(r.extractFieldByLength(e),"Attestation key is missing")),signature:()=>t(r.extract8BitUInt(),"Attestation signature length is missing").chain(e=>t(r.extractFieldByLength(e),"Attestation signature is missing"))}).map(e=>n(Uint8Array.from([...e.id,e.version,e.curveId,e.signAlgorithm,e.publicKey.length,...e.publicKey,e.signature.length,...e.signature]),!1))}).caseOf({Left:e=>o({error:e}),Right:e=>o({data:e})})})}}export{B as GetSeedIdCommand};
1
+ import{ApduBuilder as a,ApduParser as g,CommandResultFactory as o,InvalidStatusWordError as l}from"@ledgerhq/device-management-kit";import{CommandErrorHelper as c}from"@ledgerhq/signer-utils";import{Maybe as d}from"purify-ts";import{eitherSeqRecord as n}from"../../utils/eitherSeqRecord";import{bytesToHex as s}from"../../utils/hex";import{LEDGER_SYNC_ERRORS as p,LedgerKeyringProtocolErrorFactory as u}from"./utils/ledgerKeyringProtocolErrors";class S{constructor(i){this.args=i}errorHelper=new c(p,u);getApdu(){const{challengeTLV:i}=this.args,t={cla:224,ins:5,p1:0,p2:0};return new a(t).addHexaStringToData(i).build()}parseResponse(i){return d.fromNullable(this.errorHelper.getError(i)).orDefaultLazy(()=>{const t=new g(i),r=(e,m)=>d.fromNullable(e).toEither(new l(m));return n({credential:()=>n({version:()=>r(t.extract8BitUInt(),"Version is missing"),curveId:()=>r(t.extract8BitUInt(),"Curve ID is missing"),signAlgorithm:()=>r(t.extract8BitUInt(),"Sign algorithm is missing"),publicKey:()=>r(t.extract8BitUInt(),"Public key length is missing").chain(e=>r(t.extractFieldByLength(e),"Public key is missing")).map(s)}),signature:()=>r(t.extract8BitUInt(),"Signature length is missing").chain(e=>r(t.extractFieldByLength(e),"Signature is missing")).map(s),attestation:()=>n({id:()=>r(t.extractFieldByLength(1),"Attestation Id is missing"),version:()=>r(t.extract8BitUInt(),"Attestation version is missing"),curveId:()=>r(t.extract8BitUInt(),"Attestation curve ID is missing"),signAlgorithm:()=>r(t.extract8BitUInt(),"Attestation sign algorithm is missing"),publicKey:()=>r(t.extract8BitUInt(),"Attestation key length is missing").chain(e=>r(t.extractFieldByLength(e),"Attestation key is missing")),signature:()=>r(t.extract8BitUInt(),"Attestation signature length is missing").chain(e=>r(t.extractFieldByLength(e),"Attestation signature is missing"))}).map(e=>s(Uint8Array.from([...e.id,e.version,e.curveId,e.signAlgorithm,e.publicKey.length,...e.publicKey,e.signature.length,...e.signature])))}).caseOf({Left:e=>o({error:e}),Right:e=>o({data:e})})})}}export{S as GetSeedIdCommand};
2
2
  //# sourceMappingURL=GetSeedIdCommand.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/command/GetSeedIdCommand.ts"],
4
- "sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n bufferToHexaString,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport { eitherSeqRecord } from \"@internal/utils/eitherSeqRecord\";\n\nimport {\n LEDGER_SYNC_ERRORS,\n type LedgerKeyringProtocolErrorCodes,\n LedgerKeyringProtocolErrorFactory,\n} from \"./utils/ledgerKeyringProtocolErrors\";\n\nexport type GetSeedIdCommandResponse = {\n readonly credential: {\n readonly version: number;\n readonly curveId: number;\n readonly signAlgorithm: number;\n readonly publicKey: string;\n };\n readonly signature: string;\n readonly attestation: string;\n};\n\nexport type GetSeedIdCommandArgs = {\n readonly challengeTLV: string;\n};\n\nexport class GetSeedIdCommand\n implements\n Command<\n GetSeedIdCommandResponse,\n GetSeedIdCommandArgs,\n LedgerKeyringProtocolErrorCodes\n >\n{\n private readonly errorHelper = new CommandErrorHelper<\n GetSeedIdCommandResponse,\n LedgerKeyringProtocolErrorCodes\n >(LEDGER_SYNC_ERRORS, LedgerKeyringProtocolErrorFactory);\n\n constructor(private readonly args: GetSeedIdCommandArgs) {}\n getApdu(): Apdu {\n const { challengeTLV } = this.args;\n const getSeedIdArgs: ApduBuilderArgs = {\n cla: 0xe0,\n ins: 0x05,\n p1: 0x00,\n p2: 0x00,\n };\n\n return new ApduBuilder(getSeedIdArgs)\n .addHexaStringToData(challengeTLV)\n .build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<GetSeedIdCommandResponse, LedgerKeyringProtocolErrorCodes> {\n return Maybe.fromNullable(\n this.errorHelper.getError(apduResponse),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(apduResponse);\n\n const required = <T>(value: T | undefined, errorMsg: string) =>\n Maybe.fromNullable(value).toEither(\n new InvalidStatusWordError(errorMsg),\n );\n\n return eitherSeqRecord({\n credential: () =>\n eitherSeqRecord({\n version: () =>\n required(parser.extract8BitUInt(), \"Version is missing\"),\n curveId: () =>\n required(parser.extract8BitUInt(), \"Curve ID is missing\"),\n signAlgorithm: () =>\n required(parser.extract8BitUInt(), \"Sign algorithm is missing\"),\n publicKey: () =>\n required(parser.extract8BitUInt(), \"Public key length is missing\")\n .chain((length) =>\n required(\n parser.extractFieldByLength(length),\n \"Public key is missing\",\n ),\n )\n .map((str) => bufferToHexaString(str, false)),\n }),\n\n signature: () =>\n required(parser.extract8BitUInt(), \"Signature length is missing\")\n .chain((length) =>\n required(\n parser.extractFieldByLength(length),\n \"Signature is missing\",\n ),\n )\n .map((str) => bufferToHexaString(str, false)),\n\n attestation: () =>\n eitherSeqRecord({\n id: () =>\n required(\n parser.extractFieldByLength(0x01),\n \"Attestation Id is missing\",\n ),\n version: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation version is missing\",\n ),\n curveId: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation curve ID is missing\",\n ),\n signAlgorithm: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation sign algorithm is missing\",\n ),\n publicKey: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation key length is missing\",\n ).chain((length) =>\n required(\n parser.extractFieldByLength(length),\n \"Attestation key is missing\",\n ),\n ),\n signature: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation signature length is missing\",\n ).chain((length) =>\n required(\n parser.extractFieldByLength(length),\n \"Attestation signature is missing\",\n ),\n ),\n }).map((attestation) =>\n bufferToHexaString(\n Uint8Array.from([\n ...attestation.id,\n attestation.version,\n attestation.curveId,\n attestation.signAlgorithm,\n attestation.publicKey.length,\n ...attestation.publicKey,\n attestation.signature.length,\n ...attestation.signature,\n ]),\n false,\n ),\n ),\n }).caseOf({\n Left: (error) => CommandResultFactory({ error }),\n Right: (data) => CommandResultFactory({ data }),\n });\n });\n }\n}\n"],
5
- "mappings": "AAAA,OAEE,eAAAA,EAEA,cAAAC,EAEA,sBAAAC,EAGA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,yBACnC,OAAS,SAAAC,MAAa,YAEtB,OAAS,mBAAAC,MAAuB,kCAEhC,OACE,sBAAAC,EAEA,qCAAAC,MACK,sCAiBA,MAAMC,CAOb,CAME,YAA6BC,EAA4B,CAA5B,UAAAA,CAA6B,CALzC,YAAc,IAAIN,EAGjCG,EAAoBC,CAAiC,EAGvD,SAAgB,CACd,KAAM,CAAE,aAAAG,CAAa,EAAI,KAAK,KACxBC,EAAiC,CACrC,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,EAEA,OAAO,IAAIb,EAAYa,CAAa,EACjC,oBAAoBD,CAAY,EAChC,MAAM,CACX,CAEA,cACEE,EAC0E,CAC1E,OAAOR,EAAM,aACX,KAAK,YAAY,SAASQ,CAAY,CACxC,EAAE,cAAc,IAAM,CACpB,MAAMC,EAAS,IAAId,EAAWa,CAAY,EAEpCE,EAAW,CAAIC,EAAsBC,IACzCZ,EAAM,aAAaW,CAAK,EAAE,SACxB,IAAIb,EAAuBc,CAAQ,CACrC,EAEF,OAAOX,EAAgB,CACrB,WAAY,IACVA,EAAgB,CACd,QAAS,IACPS,EAASD,EAAO,gBAAgB,EAAG,oBAAoB,EACzD,QAAS,IACPC,EAASD,EAAO,gBAAgB,EAAG,qBAAqB,EAC1D,cAAe,IACbC,EAASD,EAAO,gBAAgB,EAAG,2BAA2B,EAChE,UAAW,IACTC,EAASD,EAAO,gBAAgB,EAAG,8BAA8B,EAC9D,MAAOI,GACNH,EACED,EAAO,qBAAqBI,CAAM,EAClC,uBACF,CACF,EACC,IAAKC,GAAQlB,EAAmBkB,EAAK,EAAK,CAAC,CAClD,CAAC,EAEH,UAAW,IACTJ,EAASD,EAAO,gBAAgB,EAAG,6BAA6B,EAC7D,MAAOI,GACNH,EACED,EAAO,qBAAqBI,CAAM,EAClC,sBACF,CACF,EACC,IAAKC,GAAQlB,EAAmBkB,EAAK,EAAK,CAAC,EAEhD,YAAa,IACXb,EAAgB,CACd,GAAI,IACFS,EACED,EAAO,qBAAqB,CAAI,EAChC,2BACF,EACF,QAAS,IACPC,EACED,EAAO,gBAAgB,EACvB,gCACF,EACF,QAAS,IACPC,EACED,EAAO,gBAAgB,EACvB,iCACF,EACF,cAAe,IACbC,EACED,EAAO,gBAAgB,EACvB,uCACF,EACF,UAAW,IACTC,EACED,EAAO,gBAAgB,EACvB,mCACF,EAAE,MAAOI,GACPH,EACED,EAAO,qBAAqBI,CAAM,EAClC,4BACF,CACF,EACF,UAAW,IACTH,EACED,EAAO,gBAAgB,EACvB,yCACF,EAAE,MAAOI,GACPH,EACED,EAAO,qBAAqBI,CAAM,EAClC,kCACF,CACF,CACJ,CAAC,EAAE,IAAKE,GACNnB,EACE,WAAW,KAAK,CACd,GAAGmB,EAAY,GACfA,EAAY,QACZA,EAAY,QACZA,EAAY,cACZA,EAAY,UAAU,OACtB,GAAGA,EAAY,UACfA,EAAY,UAAU,OACtB,GAAGA,EAAY,SACjB,CAAC,EACD,EACF,CACF,CACJ,CAAC,EAAE,OAAO,CACR,KAAOC,GAAUnB,EAAqB,CAAE,MAAAmB,CAAM,CAAC,EAC/C,MAAQC,GAASpB,EAAqB,CAAE,KAAAoB,CAAK,CAAC,CAChD,CAAC,CACH,CAAC,CACH,CACF",
6
- "names": ["ApduBuilder", "ApduParser", "bufferToHexaString", "CommandResultFactory", "InvalidStatusWordError", "CommandErrorHelper", "Maybe", "eitherSeqRecord", "LEDGER_SYNC_ERRORS", "LedgerKeyringProtocolErrorFactory", "GetSeedIdCommand", "args", "challengeTLV", "getSeedIdArgs", "apduResponse", "parser", "required", "value", "errorMsg", "length", "str", "attestation", "error", "data"]
4
+ "sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n type GetSeedIdCommandArgs,\n type GetSeedIdCommandResponse,\n} from \"@api/app-binder/GetSeedIdCommandTypes\";\nimport { eitherSeqRecord } from \"@internal/utils/eitherSeqRecord\";\nimport { bytesToHex } from \"@internal/utils/hex\";\n\nimport {\n LEDGER_SYNC_ERRORS,\n type LedgerKeyringProtocolErrorCodes,\n LedgerKeyringProtocolErrorFactory,\n} from \"./utils/ledgerKeyringProtocolErrors\";\n\nexport class GetSeedIdCommand\n implements\n Command<\n GetSeedIdCommandResponse,\n GetSeedIdCommandArgs,\n LedgerKeyringProtocolErrorCodes\n >\n{\n private readonly errorHelper = new CommandErrorHelper<\n GetSeedIdCommandResponse,\n LedgerKeyringProtocolErrorCodes\n >(LEDGER_SYNC_ERRORS, LedgerKeyringProtocolErrorFactory);\n\n constructor(private readonly args: GetSeedIdCommandArgs) {}\n getApdu(): Apdu {\n const { challengeTLV } = this.args;\n const getSeedIdArgs: ApduBuilderArgs = {\n cla: 0xe0,\n ins: 0x05,\n p1: 0x00,\n p2: 0x00,\n };\n\n return new ApduBuilder(getSeedIdArgs)\n .addHexaStringToData(challengeTLV)\n .build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<GetSeedIdCommandResponse, LedgerKeyringProtocolErrorCodes> {\n return Maybe.fromNullable(\n this.errorHelper.getError(apduResponse),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(apduResponse);\n\n const required = <T>(value: T | undefined, errorMsg: string) =>\n Maybe.fromNullable(value).toEither(\n new InvalidStatusWordError(errorMsg),\n );\n\n return eitherSeqRecord({\n credential: () =>\n eitherSeqRecord({\n version: () =>\n required(parser.extract8BitUInt(), \"Version is missing\"),\n curveId: () =>\n required(parser.extract8BitUInt(), \"Curve ID is missing\"),\n signAlgorithm: () =>\n required(parser.extract8BitUInt(), \"Sign algorithm is missing\"),\n publicKey: () =>\n required(parser.extract8BitUInt(), \"Public key length is missing\")\n .chain((length) =>\n required(\n parser.extractFieldByLength(length),\n \"Public key is missing\",\n ),\n )\n .map(bytesToHex),\n }),\n\n signature: () =>\n required(parser.extract8BitUInt(), \"Signature length is missing\")\n .chain((length) =>\n required(\n parser.extractFieldByLength(length),\n \"Signature is missing\",\n ),\n )\n .map(bytesToHex),\n\n attestation: () =>\n eitherSeqRecord({\n id: () =>\n required(\n parser.extractFieldByLength(0x01),\n \"Attestation Id is missing\",\n ),\n version: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation version is missing\",\n ),\n curveId: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation curve ID is missing\",\n ),\n signAlgorithm: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation sign algorithm is missing\",\n ),\n publicKey: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation key length is missing\",\n ).chain((length) =>\n required(\n parser.extractFieldByLength(length),\n \"Attestation key is missing\",\n ),\n ),\n signature: () =>\n required(\n parser.extract8BitUInt(),\n \"Attestation signature length is missing\",\n ).chain((length) =>\n required(\n parser.extractFieldByLength(length),\n \"Attestation signature is missing\",\n ),\n ),\n }).map((attestation) =>\n bytesToHex(\n Uint8Array.from([\n ...attestation.id,\n attestation.version,\n attestation.curveId,\n attestation.signAlgorithm,\n attestation.publicKey.length,\n ...attestation.publicKey,\n attestation.signature.length,\n ...attestation.signature,\n ]),\n ),\n ),\n }).caseOf({\n Left: (error) => CommandResultFactory({ error }),\n Right: (data) => CommandResultFactory({ data }),\n });\n });\n }\n}\n"],
5
+ "mappings": "AAAA,OAEE,eAAAA,EAEA,cAAAC,EAIA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,yBACnC,OAAS,SAAAC,MAAa,YAMtB,OAAS,mBAAAC,MAAuB,kCAChC,OAAS,cAAAC,MAAkB,sBAE3B,OACE,sBAAAC,EAEA,qCAAAC,MACK,sCAEA,MAAMC,CAOb,CAME,YAA6BC,EAA4B,CAA5B,UAAAA,CAA6B,CALzC,YAAc,IAAIP,EAGjCI,EAAoBC,CAAiC,EAGvD,SAAgB,CACd,KAAM,CAAE,aAAAG,CAAa,EAAI,KAAK,KACxBC,EAAiC,CACrC,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,EAEA,OAAO,IAAIb,EAAYa,CAAa,EACjC,oBAAoBD,CAAY,EAChC,MAAM,CACX,CAEA,cACEE,EAC0E,CAC1E,OAAOT,EAAM,aACX,KAAK,YAAY,SAASS,CAAY,CACxC,EAAE,cAAc,IAAM,CACpB,MAAMC,EAAS,IAAId,EAAWa,CAAY,EAEpCE,EAAW,CAAIC,EAAsBC,IACzCb,EAAM,aAAaY,CAAK,EAAE,SACxB,IAAId,EAAuBe,CAAQ,CACrC,EAEF,OAAOZ,EAAgB,CACrB,WAAY,IACVA,EAAgB,CACd,QAAS,IACPU,EAASD,EAAO,gBAAgB,EAAG,oBAAoB,EACzD,QAAS,IACPC,EAASD,EAAO,gBAAgB,EAAG,qBAAqB,EAC1D,cAAe,IACbC,EAASD,EAAO,gBAAgB,EAAG,2BAA2B,EAChE,UAAW,IACTC,EAASD,EAAO,gBAAgB,EAAG,8BAA8B,EAC9D,MAAOI,GACNH,EACED,EAAO,qBAAqBI,CAAM,EAClC,uBACF,CACF,EACC,IAAIZ,CAAU,CACrB,CAAC,EAEH,UAAW,IACTS,EAASD,EAAO,gBAAgB,EAAG,6BAA6B,EAC7D,MAAOI,GACNH,EACED,EAAO,qBAAqBI,CAAM,EAClC,sBACF,CACF,EACC,IAAIZ,CAAU,EAEnB,YAAa,IACXD,EAAgB,CACd,GAAI,IACFU,EACED,EAAO,qBAAqB,CAAI,EAChC,2BACF,EACF,QAAS,IACPC,EACED,EAAO,gBAAgB,EACvB,gCACF,EACF,QAAS,IACPC,EACED,EAAO,gBAAgB,EACvB,iCACF,EACF,cAAe,IACbC,EACED,EAAO,gBAAgB,EACvB,uCACF,EACF,UAAW,IACTC,EACED,EAAO,gBAAgB,EACvB,mCACF,EAAE,MAAOI,GACPH,EACED,EAAO,qBAAqBI,CAAM,EAClC,4BACF,CACF,EACF,UAAW,IACTH,EACED,EAAO,gBAAgB,EACvB,yCACF,EAAE,MAAOI,GACPH,EACED,EAAO,qBAAqBI,CAAM,EAClC,kCACF,CACF,CACJ,CAAC,EAAE,IAAKC,GACNb,EACE,WAAW,KAAK,CACd,GAAGa,EAAY,GACfA,EAAY,QACZA,EAAY,QACZA,EAAY,cACZA,EAAY,UAAU,OACtB,GAAGA,EAAY,UACfA,EAAY,UAAU,OACtB,GAAGA,EAAY,SACjB,CAAC,CACH,CACF,CACJ,CAAC,EAAE,OAAO,CACR,KAAOC,GAAUnB,EAAqB,CAAE,MAAAmB,CAAM,CAAC,EAC/C,MAAQC,GAASpB,EAAqB,CAAE,KAAAoB,CAAK,CAAC,CAChD,CAAC,CACH,CAAC,CACH,CACF",
6
+ "names": ["ApduBuilder", "ApduParser", "CommandResultFactory", "InvalidStatusWordError", "CommandErrorHelper", "Maybe", "eitherSeqRecord", "bytesToHex", "LEDGER_SYNC_ERRORS", "LedgerKeyringProtocolErrorFactory", "GetSeedIdCommand", "args", "challengeTLV", "getSeedIdArgs", "apduResponse", "parser", "required", "value", "errorMsg", "length", "attestation", "error", "data"]
7
7
  }
@@ -1,4 +1,4 @@
1
- import{CommandResultFactory as n,InvalidStatusWordError as c}from"@ledgerhq/device-management-kit";import{hexaStringToBuffer as a}from"@ledgerhq/device-management-kit";import{GetSeedIdCommand as s}from"./GetSeedIdCommand";describe("GetSeedIdCommand",()=>{const o="01020304";it("should build the correct APDU",()=>{const t=new s({challengeTLV:o}).getApdu(),e=a(o);expect(t.getRawApdu()).toEqual(Uint8Array.from([224,5,0,0,e.length,...e]))}),it("should parse the response correctly",()=>{const r=new s({challengeTLV:o}),t=a(`
1
+ import{CommandResultFactory as n,InvalidStatusWordError as c}from"@ledgerhq/device-management-kit";import{hexToBytes as a}from"../../utils/hex";import{GetSeedIdCommand as s}from"./GetSeedIdCommand";describe("GetSeedIdCommand",()=>{const o="01020304";it("should build the correct APDU",()=>{const t=new s({challengeTLV:o}).getApdu(),e=a(o);expect(t.getRawApdu()).toEqual(Uint8Array.from([224,5,0,0,e.length,...e]))}),it("should parse the response correctly",()=>{const r=new s({challengeTLV:o}),t=a(`
2
2
  01 02 03
3
3
  06
4
4
  05 06 07 08 09 0a
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/command/GetSeedIdCommand.test.ts"],
4
- "sourcesContent": ["import {\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { hexaStringToBuffer } from \"@ledgerhq/device-management-kit\";\n\nimport { GetSeedIdCommand } from \"./GetSeedIdCommand\";\n\ndescribe(\"GetSeedIdCommand\", () => {\n const mockedChallenge = \"01020304\";\n\n it(\"should build the correct APDU\", () => {\n // GIVEN\n const command = new GetSeedIdCommand({\n challengeTLV: mockedChallenge,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n const challengeBytes = hexaStringToBuffer(mockedChallenge)!;\n expect(apdu.getRawApdu()).toEqual(\n Uint8Array.from([\n 0xe0, // CLA\n 0x05, // INS\n 0x00, // P1\n 0x00, // P2\n challengeBytes.length, // Lc\n ...challengeBytes, // CData\n ]),\n );\n });\n\n it(\"should parse the response correctly\", () => {\n // GIVEN\n const command = new GetSeedIdCommand({\n challengeTLV: mockedChallenge,\n });\n const mockedResponse = hexaStringToBuffer(\n `\n 01 02 03\n 06\n 05 06 07 08 09 0a\n 05\n 16 17 18 19 1a\n 1b\n 01 02 03\n 07\n 20 21 22 23 24 25 26\n 05\n 2e 2f 30 31 32\n 12 13 14\n `.replace(/\\s+/g, \"\"), // (the last three bytes should be ignored)\n )!;\n\n // WHEN\n const result = command.parseResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data: mockedResponse,\n });\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n data: {\n credential: {\n version: 1,\n curveId: 2,\n signAlgorithm: 3,\n publicKey: \"05060708090a\",\n },\n signature: \"161718191a\",\n attestation: \"1b0102030720212223242526052e2f303132\",\n },\n }),\n );\n });\n\n it(\"should parsing error response\", () => {\n // GIVEN\n const command = new GetSeedIdCommand({\n challengeTLV: mockedChallenge,\n });\n const mockedResponse = hexaStringToBuffer(\n `\n 01 02 03\n 06\n 05\n 05\n 16 17 18 19 1a\n 1b\n 01 02 03\n 07\n 20 21 22 23 24 25 26\n 05\n 2e 2f 30 31 32\n `.replace(/\\s+/g, \"\"),\n )!;\n\n // WHEN\n const result = command.parseResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data: mockedResponse,\n });\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n // eslint-disable-next-line @typescript-eslint/no-unsafe-assignment\n error: expect.any(InvalidStatusWordError), // (That's not an assignment to `any` maybe an eslint bug)\n }),\n );\n });\n});\n"],
5
- "mappings": "AAAA,OACE,wBAAAA,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,kCAEnC,OAAS,oBAAAC,MAAwB,qBAEjC,SAAS,mBAAoB,IAAM,CACjC,MAAMC,EAAkB,WAExB,GAAG,gCAAiC,IAAM,CAOxC,MAAMC,EALU,IAAIF,EAAiB,CACnC,aAAcC,CAChB,CAAC,EAGoB,QAAQ,EAGvBE,EAAiBJ,EAAmBE,CAAe,EACzD,OAAOC,EAAK,WAAW,CAAC,EAAE,QACxB,WAAW,KAAK,CACd,IACA,EACA,EACA,EACAC,EAAe,OACf,GAAGA,CACL,CAAC,CACH,CACF,CAAC,EAED,GAAG,sCAAuC,IAAM,CAE9C,MAAMC,EAAU,IAAIJ,EAAiB,CACnC,aAAcC,CAChB,CAAC,EACKI,EAAiBN,EACrB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,QAaE,QAAQ,OAAQ,EAAE,CACtB,EAGMO,EAASF,EAAQ,cAAc,CACnC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAMC,CACR,CAAC,EAGD,OAAOC,CAAM,EAAE,cACbT,EAAqB,CACnB,KAAM,CACJ,WAAY,CACV,QAAS,EACT,QAAS,EACT,cAAe,EACf,UAAW,cACb,EACA,UAAW,aACX,YAAa,sCACf,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,gCAAiC,IAAM,CAExC,MAAMO,EAAU,IAAIJ,EAAiB,CACnC,aAAcC,CAChB,CAAC,EACKI,EAAiBN,EACrB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,QAYE,QAAQ,OAAQ,EAAE,CACtB,EAGMO,EAASF,EAAQ,cAAc,CACnC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAMC,CACR,CAAC,EAGD,OAAOC,CAAM,EAAE,cACbT,EAAqB,CAEnB,MAAO,OAAO,IAAIC,CAAsB,CAC1C,CAAC,CACH,CACF,CAAC,CACH,CAAC",
6
- "names": ["CommandResultFactory", "InvalidStatusWordError", "hexaStringToBuffer", "GetSeedIdCommand", "mockedChallenge", "apdu", "challengeBytes", "command", "mockedResponse", "result"]
4
+ "sourcesContent": ["import {\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { hexToBytes } from \"@internal/utils/hex\";\n\nimport { GetSeedIdCommand } from \"./GetSeedIdCommand\";\n\ndescribe(\"GetSeedIdCommand\", () => {\n const mockedChallenge = \"01020304\";\n\n it(\"should build the correct APDU\", () => {\n // GIVEN\n const command = new GetSeedIdCommand({\n challengeTLV: mockedChallenge,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n const challengeBytes = hexToBytes(mockedChallenge);\n expect(apdu.getRawApdu()).toEqual(\n Uint8Array.from([\n 0xe0, // CLA\n 0x05, // INS\n 0x00, // P1\n 0x00, // P2\n challengeBytes.length, // Lc\n ...challengeBytes, // CData\n ]),\n );\n });\n\n it(\"should parse the response correctly\", () => {\n // GIVEN\n const command = new GetSeedIdCommand({\n challengeTLV: mockedChallenge,\n });\n const mockedResponse = hexToBytes(\n `\n 01 02 03\n 06\n 05 06 07 08 09 0a\n 05\n 16 17 18 19 1a\n 1b\n 01 02 03\n 07\n 20 21 22 23 24 25 26\n 05\n 2e 2f 30 31 32\n 12 13 14\n `.replace(/\\s+/g, \"\"), // (the last three bytes should be ignored)\n );\n\n // WHEN\n const result = command.parseResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data: mockedResponse,\n });\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n data: {\n credential: {\n version: 1,\n curveId: 2,\n signAlgorithm: 3,\n publicKey: \"05060708090a\",\n },\n signature: \"161718191a\",\n attestation: \"1b0102030720212223242526052e2f303132\",\n },\n }),\n );\n });\n\n it(\"should parsing error response\", () => {\n // GIVEN\n const command = new GetSeedIdCommand({\n challengeTLV: mockedChallenge,\n });\n const mockedResponse = hexToBytes(\n `\n 01 02 03\n 06\n 05\n 05\n 16 17 18 19 1a\n 1b\n 01 02 03\n 07\n 20 21 22 23 24 25 26\n 05\n 2e 2f 30 31 32\n `.replace(/\\s+/g, \"\"),\n );\n\n // WHEN\n const result = command.parseResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data: mockedResponse,\n });\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n // eslint-disable-next-line @typescript-eslint/no-unsafe-assignment\n error: expect.any(InvalidStatusWordError), // (That's not an assignment to `any` maybe an eslint bug)\n }),\n );\n });\n});\n"],
5
+ "mappings": "AAAA,OACE,wBAAAA,EACA,0BAAAC,MACK,kCAEP,OAAS,cAAAC,MAAkB,sBAE3B,OAAS,oBAAAC,MAAwB,qBAEjC,SAAS,mBAAoB,IAAM,CACjC,MAAMC,EAAkB,WAExB,GAAG,gCAAiC,IAAM,CAOxC,MAAMC,EALU,IAAIF,EAAiB,CACnC,aAAcC,CAChB,CAAC,EAGoB,QAAQ,EAGvBE,EAAiBJ,EAAWE,CAAe,EACjD,OAAOC,EAAK,WAAW,CAAC,EAAE,QACxB,WAAW,KAAK,CACd,IACA,EACA,EACA,EACAC,EAAe,OACf,GAAGA,CACL,CAAC,CACH,CACF,CAAC,EAED,GAAG,sCAAuC,IAAM,CAE9C,MAAMC,EAAU,IAAIJ,EAAiB,CACnC,aAAcC,CAChB,CAAC,EACKI,EAAiBN,EACrB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,QAaE,QAAQ,OAAQ,EAAE,CACtB,EAGMO,EAASF,EAAQ,cAAc,CACnC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAMC,CACR,CAAC,EAGD,OAAOC,CAAM,EAAE,cACbT,EAAqB,CACnB,KAAM,CACJ,WAAY,CACV,QAAS,EACT,QAAS,EACT,cAAe,EACf,UAAW,cACb,EACA,UAAW,aACX,YAAa,sCACf,CACF,CAAC,CACH,CACF,CAAC,EAED,GAAG,gCAAiC,IAAM,CAExC,MAAMO,EAAU,IAAIJ,EAAiB,CACnC,aAAcC,CAChB,CAAC,EACKI,EAAiBN,EACrB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,QAYE,QAAQ,OAAQ,EAAE,CACtB,EAGMO,EAASF,EAAQ,cAAc,CACnC,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAMC,CACR,CAAC,EAGD,OAAOC,CAAM,EAAE,cACbT,EAAqB,CAEnB,MAAO,OAAO,IAAIC,CAAsB,CAC1C,CAAC,CACH,CACF,CAAC,CACH,CAAC",
6
+ "names": ["CommandResultFactory", "InvalidStatusWordError", "hexToBytes", "GetSeedIdCommand", "mockedChallenge", "apdu", "challengeBytes", "command", "mockedResponse", "result"]
7
7
  }
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/command/GetVersionCommand.ts"],
4
- "sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport { type GetVersionCommandResponse } from \"@api/app-binder/GetVersionCommandTypes\";\n\nimport {\n LEDGER_SYNC_ERRORS,\n type LedgerKeyringProtocolErrorCodes,\n LedgerKeyringProtocolErrorFactory,\n} from \"./utils/ledgerKeyringProtocolErrors\";\n\nexport type GetVersionCommandArgs = undefined;\n\nexport class GetVersionCommand\n implements\n Command<\n GetVersionCommandResponse,\n GetVersionCommandArgs,\n LedgerKeyringProtocolErrorCodes\n >\n{\n private readonly errorHelper = new CommandErrorHelper<\n GetVersionCommandResponse,\n LedgerKeyringProtocolErrorCodes\n >(LEDGER_SYNC_ERRORS, LedgerKeyringProtocolErrorFactory);\n\n getApdu(): Apdu {\n const getVersionArgs: ApduBuilderArgs = {\n cla: 0xe0,\n ins: 0x03,\n p1: 0x00,\n p2: 0x00,\n };\n\n const builder = new ApduBuilder(getVersionArgs);\n return builder.build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<GetVersionCommandResponse, LedgerKeyringProtocolErrorCodes> {\n return Maybe.fromNullable(\n this.errorHelper.getError(apduResponse),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(apduResponse);\n\n const version = parser.encodeToString(apduResponse.data);\n\n if (!version) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(`Version is missing`),\n });\n }\n\n return CommandResultFactory({\n data: { version },\n });\n });\n }\n}\n"],
5
- "mappings": "AAAA,OAEE,eAAAA,EAEA,cAAAC,EAIA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,yBACnC,OAAS,SAAAC,MAAa,YAItB,OACE,sBAAAC,EAEA,qCAAAC,MACK,sCAIA,MAAMC,CAOb,CACmB,YAAc,IAAIJ,EAGjCE,EAAoBC,CAAiC,EAEvD,SAAgB,CACd,MAAME,EAAkC,CACtC,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,EAGA,OADgB,IAAIT,EAAYS,CAAc,EAC/B,MAAM,CACvB,CAEA,cACEC,EAC2E,CAC3E,OAAOL,EAAM,aACX,KAAK,YAAY,SAASK,CAAY,CACxC,EAAE,cAAc,IAAM,CAGpB,MAAMC,EAFS,IAAIV,EAAWS,CAAY,EAEnB,eAAeA,EAAa,IAAI,EAEvD,OAAKC,EAMET,EAAqB,CAC1B,KAAM,CAAE,QAAAS,CAAQ,CAClB,CAAC,EAPQT,EAAqB,CAC1B,MAAO,IAAIC,EAAuB,oBAAoB,CACxD,CAAC,CAML,CAAC,CACH,CACF",
4
+ "sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n type ApduBuilderArgs,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n type GetVersionCommandArgs,\n type GetVersionCommandResponse,\n} from \"@api/app-binder/GetVersionCommandTypes\";\n\nimport {\n LEDGER_SYNC_ERRORS,\n type LedgerKeyringProtocolErrorCodes,\n LedgerKeyringProtocolErrorFactory,\n} from \"./utils/ledgerKeyringProtocolErrors\";\n\nexport class GetVersionCommand\n implements\n Command<\n GetVersionCommandResponse,\n GetVersionCommandArgs,\n LedgerKeyringProtocolErrorCodes\n >\n{\n private readonly errorHelper = new CommandErrorHelper<\n GetVersionCommandResponse,\n LedgerKeyringProtocolErrorCodes\n >(LEDGER_SYNC_ERRORS, LedgerKeyringProtocolErrorFactory);\n\n getApdu(): Apdu {\n const getVersionArgs: ApduBuilderArgs = {\n cla: 0xe0,\n ins: 0x03,\n p1: 0x00,\n p2: 0x00,\n };\n\n const builder = new ApduBuilder(getVersionArgs);\n return builder.build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<GetVersionCommandResponse, LedgerKeyringProtocolErrorCodes> {\n return Maybe.fromNullable(\n this.errorHelper.getError(apduResponse),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(apduResponse);\n\n const version = parser.encodeToString(apduResponse.data);\n\n if (!version) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(`Version is missing`),\n });\n }\n\n return CommandResultFactory({\n data: { version },\n });\n });\n }\n}\n"],
5
+ "mappings": "AAAA,OAEE,eAAAA,EAEA,cAAAC,EAIA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,yBACnC,OAAS,SAAAC,MAAa,YAOtB,OACE,sBAAAC,EAEA,qCAAAC,MACK,sCAEA,MAAMC,CAOb,CACmB,YAAc,IAAIJ,EAGjCE,EAAoBC,CAAiC,EAEvD,SAAgB,CACd,MAAME,EAAkC,CACtC,IAAK,IACL,IAAK,EACL,GAAI,EACJ,GAAI,CACN,EAGA,OADgB,IAAIT,EAAYS,CAAc,EAC/B,MAAM,CACvB,CAEA,cACEC,EAC2E,CAC3E,OAAOL,EAAM,aACX,KAAK,YAAY,SAASK,CAAY,CACxC,EAAE,cAAc,IAAM,CAGpB,MAAMC,EAFS,IAAIV,EAAWS,CAAY,EAEnB,eAAeA,EAAa,IAAI,EAEvD,OAAKC,EAMET,EAAqB,CAC1B,KAAM,CAAE,QAAAS,CAAQ,CAClB,CAAC,EAPQT,EAAqB,CAC1B,MAAO,IAAIC,EAAuB,oBAAoB,CACxD,CAAC,CAML,CAAC,CACH,CACF",
6
6
  "names": ["ApduBuilder", "ApduParser", "CommandResultFactory", "InvalidStatusWordError", "CommandErrorHelper", "Maybe", "LEDGER_SYNC_ERRORS", "LedgerKeyringProtocolErrorFactory", "GetVersionCommand", "getVersionArgs", "apduResponse", "version"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{ApduBuilder as o,ApduParser as t,CommandResultFactory as e,InvalidStatusWordError as n}from"@ledgerhq/device-management-kit";import{CommandErrorHelper as d}from"@ledgerhq/signer-utils";import{Maybe as a}from"purify-ts";import{LEDGER_SYNC_ERRORS as m,LedgerKeyringProtocolErrorFactory as p}from"./utils/ledgerKeyringProtocolErrors";class C{constructor(r){this.args=r}errorHelper=new d(m,p);getApdu(){const{publicKey:r}=this.args;return new o({cla:224,ins:6,p1:0,p2:0}).addBufferToData(r).build()}parseResponse(r){return a.fromNullable(this.errorHelper.getError(r)).orDefaultLazy(()=>new t(r).getUnparsedRemainingLength()!==0?e({error:new n("Unexpected response data for SetTrustedMemberCommand")}):e({data:void 0}))}}export{C as InitCommand};
1
+ import{ApduBuilder as o,ApduParser as t,CommandResultFactory as e,InvalidStatusWordError as n}from"@ledgerhq/device-management-kit";import{CommandErrorHelper as d}from"@ledgerhq/signer-utils";import{Maybe as m}from"purify-ts";import{LEDGER_SYNC_ERRORS as a,LedgerKeyringProtocolErrorFactory as s}from"./utils/ledgerKeyringProtocolErrors";class C{constructor(r){this.args=r}errorHelper=new d(a,s);getApdu(){const{publicKey:r}=this.args;return new o({cla:224,ins:6,p1:0,p2:0}).addBufferToData(r).build()}parseResponse(r){return m.fromNullable(this.errorHelper.getError(r)).orDefaultLazy(()=>new t(r).getUnparsedRemainingLength()!==0?e({error:new n("Unexpected response data for SetTrustedMemberCommand")}):e({data:void 0}))}}export{C as InitCommand};
2
2
  //# sourceMappingURL=InitCommand.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/command/InitCommand.ts"],
4
- "sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n LEDGER_SYNC_ERRORS,\n type LedgerKeyringProtocolErrorCodes,\n LedgerKeyringProtocolErrorFactory,\n} from \"./utils/ledgerKeyringProtocolErrors\";\n\nexport type InitCommandResponse = void;\n\nexport type InitCommandArgs = {\n publicKey: Uint8Array;\n};\n\nexport class InitCommand\n implements\n Command<\n InitCommandResponse,\n InitCommandArgs,\n LedgerKeyringProtocolErrorCodes\n >\n{\n constructor(private readonly args: InitCommandArgs) {}\n\n private readonly errorHelper = new CommandErrorHelper<\n void,\n LedgerKeyringProtocolErrorCodes\n >(LEDGER_SYNC_ERRORS, LedgerKeyringProtocolErrorFactory);\n\n getApdu(): Apdu {\n const { publicKey } = this.args;\n\n return new ApduBuilder({ cla: 0xe0, ins: 0x06, p1: 0x00, p2: 0x00 })\n .addBufferToData(publicKey)\n .build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<InitCommandResponse, LedgerKeyringProtocolErrorCodes> {\n return Maybe.fromNullable(\n this.errorHelper.getError(apduResponse),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(apduResponse);\n if (parser.getUnparsedRemainingLength() !== 0) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n \"Unexpected response data for SetTrustedMemberCommand\",\n ),\n });\n }\n return CommandResultFactory({ data: undefined });\n });\n }\n}\n"],
5
- "mappings": "AAAA,OAEE,eAAAA,EACA,cAAAC,EAIA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,yBACnC,OAAS,SAAAC,MAAa,YAEtB,OACE,sBAAAC,EAEA,qCAAAC,MACK,sCAQA,MAAMC,CAOb,CACE,YAA6BC,EAAuB,CAAvB,UAAAA,CAAwB,CAEpC,YAAc,IAAIL,EAGjCE,EAAoBC,CAAiC,EAEvD,SAAgB,CACd,KAAM,CAAE,UAAAG,CAAU,EAAI,KAAK,KAE3B,OAAO,IAAIV,EAAY,CAAE,IAAK,IAAM,IAAK,EAAM,GAAI,EAAM,GAAI,CAAK,CAAC,EAChE,gBAAgBU,CAAS,EACzB,MAAM,CACX,CAEA,cACEC,EACqE,CACrE,OAAON,EAAM,aACX,KAAK,YAAY,SAASM,CAAY,CACxC,EAAE,cAAc,IACC,IAAIV,EAAWU,CAAY,EAC/B,2BAA2B,IAAM,EACnCT,EAAqB,CAC1B,MAAO,IAAIC,EACT,sDACF,CACF,CAAC,EAEID,EAAqB,CAAE,KAAM,MAAU,CAAC,CAChD,CACH,CACF",
4
+ "sourcesContent": ["import {\n type Apdu,\n ApduBuilder,\n ApduParser,\n type ApduResponse,\n type Command,\n type CommandResult,\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { CommandErrorHelper } from \"@ledgerhq/signer-utils\";\nimport { Maybe } from \"purify-ts\";\n\nimport {\n type InitCommandArgs,\n type InitCommandResponse,\n} from \"@api/app-binder/InitCommandTypes\";\n\nimport {\n LEDGER_SYNC_ERRORS,\n type LedgerKeyringProtocolErrorCodes,\n LedgerKeyringProtocolErrorFactory,\n} from \"./utils/ledgerKeyringProtocolErrors\";\n\nexport class InitCommand\n implements\n Command<\n InitCommandResponse,\n InitCommandArgs,\n LedgerKeyringProtocolErrorCodes\n >\n{\n constructor(private readonly args: InitCommandArgs) {}\n\n private readonly errorHelper = new CommandErrorHelper<\n void,\n LedgerKeyringProtocolErrorCodes\n >(LEDGER_SYNC_ERRORS, LedgerKeyringProtocolErrorFactory);\n\n getApdu(): Apdu {\n const { publicKey } = this.args;\n\n return new ApduBuilder({ cla: 0xe0, ins: 0x06, p1: 0x00, p2: 0x00 })\n .addBufferToData(publicKey)\n .build();\n }\n\n parseResponse(\n apduResponse: ApduResponse,\n ): CommandResult<InitCommandResponse, LedgerKeyringProtocolErrorCodes> {\n return Maybe.fromNullable(\n this.errorHelper.getError(apduResponse),\n ).orDefaultLazy(() => {\n const parser = new ApduParser(apduResponse);\n if (parser.getUnparsedRemainingLength() !== 0) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n \"Unexpected response data for SetTrustedMemberCommand\",\n ),\n });\n }\n return CommandResultFactory({ data: undefined });\n });\n }\n}\n"],
5
+ "mappings": "AAAA,OAEE,eAAAA,EACA,cAAAC,EAIA,wBAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,sBAAAC,MAA0B,yBACnC,OAAS,SAAAC,MAAa,YAOtB,OACE,sBAAAC,EAEA,qCAAAC,MACK,sCAEA,MAAMC,CAOb,CACE,YAA6BC,EAAuB,CAAvB,UAAAA,CAAwB,CAEpC,YAAc,IAAIL,EAGjCE,EAAoBC,CAAiC,EAEvD,SAAgB,CACd,KAAM,CAAE,UAAAG,CAAU,EAAI,KAAK,KAE3B,OAAO,IAAIV,EAAY,CAAE,IAAK,IAAM,IAAK,EAAM,GAAI,EAAM,GAAI,CAAK,CAAC,EAChE,gBAAgBU,CAAS,EACzB,MAAM,CACX,CAEA,cACEC,EACqE,CACrE,OAAON,EAAM,aACX,KAAK,YAAY,SAASM,CAAY,CACxC,EAAE,cAAc,IACC,IAAIV,EAAWU,CAAY,EAC/B,2BAA2B,IAAM,EACnCT,EAAqB,CAC1B,MAAO,IAAIC,EACT,sDACF,CACF,CAAC,EAEID,EAAqB,CAAE,KAAM,MAAU,CAAC,CAChD,CACH,CACF",
6
6
  "names": ["ApduBuilder", "ApduParser", "CommandResultFactory", "InvalidStatusWordError", "CommandErrorHelper", "Maybe", "LEDGER_SYNC_ERRORS", "LedgerKeyringProtocolErrorFactory", "InitCommand", "args", "publicKey", "apduResponse"]
7
7
  }