@ledgerhq/device-trusted-app-kit-ledger-keyring-protocol 0.0.0-multisig-20250822145545 → 0.0.0-web-ble-29-08---20250829104351

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (467) hide show
  1. package/lib/cjs/api/LedgerKeyringProtocol.js +1 -1
  2. package/lib/cjs/api/LedgerKeyringProtocol.js.map +1 -1
  3. package/lib/cjs/api/LedgerKeyringProtocolBuilder.js +1 -1
  4. package/lib/cjs/api/LedgerKeyringProtocolBuilder.js.map +3 -3
  5. package/lib/cjs/api/app-binder/AddToTrustchainDeviceActionTypes.js.map +2 -2
  6. package/lib/cjs/api/app-binder/AuthenticateDeviceActionTypes.js.map +1 -1
  7. package/lib/cjs/api/{model → app-binder}/Errors.js.map +1 -1
  8. package/lib/cjs/api/app-binder/GetAppNameCommandTypes.js +2 -0
  9. package/lib/cjs/api/app-binder/GetAppNameCommandTypes.js.map +7 -0
  10. package/lib/cjs/api/app-binder/GetSeedIdCommandTypes.js +2 -0
  11. package/lib/cjs/api/app-binder/GetSeedIdCommandTypes.js.map +7 -0
  12. package/lib/cjs/api/app-binder/GetVersionCommandTypes.js +1 -1
  13. package/lib/cjs/api/app-binder/GetVersionCommandTypes.js.map +1 -1
  14. package/lib/cjs/api/app-binder/InitCommandTypes.js +2 -0
  15. package/lib/cjs/api/app-binder/InitCommandTypes.js.map +7 -0
  16. package/lib/cjs/api/app-binder/KeypairFromBytes.js +2 -0
  17. package/lib/cjs/api/app-binder/KeypairFromBytes.js.map +7 -0
  18. package/lib/cjs/api/app-binder/LKRPTypes.js +2 -0
  19. package/lib/cjs/api/app-binder/LKRPTypes.js.map +7 -0
  20. package/lib/cjs/api/app-binder/ParseStreamBlockCommandCommandTypes.js +2 -0
  21. package/lib/cjs/api/app-binder/ParseStreamBlockCommandCommandTypes.js.map +7 -0
  22. package/lib/cjs/api/app-binder/ParseStreamBlockHeaderCommandTypes.js +2 -0
  23. package/lib/cjs/api/app-binder/ParseStreamBlockHeaderCommandTypes.js.map +7 -0
  24. package/lib/cjs/api/app-binder/ParseStreamBlockSignatureTypes.js +2 -0
  25. package/lib/cjs/api/app-binder/ParseStreamBlockSignatureTypes.js.map +7 -0
  26. package/lib/cjs/api/app-binder/SetTrustedMemberTypes.js +2 -0
  27. package/lib/cjs/api/app-binder/SetTrustedMemberTypes.js.map +7 -0
  28. package/lib/cjs/api/app-binder/SignBlockCommandTypes.js +2 -0
  29. package/lib/cjs/api/app-binder/SignBlockCommandTypes.js.map +7 -0
  30. package/lib/cjs/api/app-binder/SignBlockHeaderCommandTypes.js +2 -0
  31. package/lib/cjs/api/app-binder/SignBlockHeaderCommandTypes.js.map +7 -0
  32. package/lib/cjs/api/app-binder/SignBlockSignatureCommandTypes.js +2 -0
  33. package/lib/cjs/api/app-binder/SignBlockSignatureCommandTypes.js.map +7 -0
  34. package/lib/cjs/api/app-binder/SignBlockSingleCommandTypes.js +2 -0
  35. package/lib/cjs/api/app-binder/SignBlockSingleCommandTypes.js.map +7 -0
  36. package/lib/cjs/api/index.js +1 -1
  37. package/lib/cjs/api/index.js.map +2 -2
  38. package/lib/cjs/internal/DefaultLedgerKeyringProtocol.js +1 -1
  39. package/lib/cjs/internal/DefaultLedgerKeyringProtocol.js.map +3 -3
  40. package/lib/cjs/internal/app-binder/LedgerKeyringProtocolBinder.js +1 -1
  41. package/lib/cjs/internal/app-binder/LedgerKeyringProtocolBinder.js.map +3 -3
  42. package/lib/cjs/internal/app-binder/command/GetAppNameCommand.js +1 -1
  43. package/lib/cjs/internal/app-binder/command/GetAppNameCommand.js.map +2 -2
  44. package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.js +1 -1
  45. package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.js.map +3 -3
  46. package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.test.js +2 -2
  47. package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.test.js.map +3 -3
  48. package/lib/cjs/internal/app-binder/command/GetVersionCommand.js.map +2 -2
  49. package/lib/cjs/internal/app-binder/command/InitCommand.js +1 -1
  50. package/lib/cjs/internal/app-binder/command/InitCommand.js.map +2 -2
  51. package/lib/cjs/internal/app-binder/command/InitCommand.test.js +1 -1
  52. package/lib/cjs/internal/app-binder/command/InitCommand.test.js.map +2 -2
  53. package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.js +1 -1
  54. package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.js.map +2 -2
  55. package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.test.js +1 -1
  56. package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.test.js.map +2 -2
  57. package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.js.map +2 -2
  58. package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.test.js +1 -1
  59. package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.test.js.map +2 -2
  60. package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.js +1 -1
  61. package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.js.map +2 -2
  62. package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.test.js.map +2 -2
  63. package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.js +1 -1
  64. package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.js.map +2 -2
  65. package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.test.js.map +2 -2
  66. package/lib/cjs/internal/app-binder/command/SignBlockHeader.js +1 -1
  67. package/lib/cjs/internal/app-binder/command/SignBlockHeader.js.map +2 -2
  68. package/lib/cjs/internal/app-binder/command/SignBlockHeader.test.js +1 -1
  69. package/lib/cjs/internal/app-binder/command/SignBlockHeader.test.js.map +2 -2
  70. package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.js +1 -1
  71. package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.js.map +2 -2
  72. package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.test.js +1 -1
  73. package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.test.js.map +2 -2
  74. package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.js +1 -1
  75. package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.js.map +2 -2
  76. package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.test.js +1 -1
  77. package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.test.js.map +2 -2
  78. package/lib/cjs/internal/app-binder/device-action/AddToTrustchainDeviceAction.js +1 -1
  79. package/lib/cjs/internal/app-binder/device-action/AddToTrustchainDeviceAction.js.map +3 -3
  80. package/lib/cjs/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js +1 -1
  81. package/lib/cjs/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js.map +2 -2
  82. package/lib/cjs/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js +1 -1
  83. package/lib/cjs/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js.map +2 -2
  84. package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.js +1 -1
  85. package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.js.map +1 -1
  86. package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.js +1 -1
  87. package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.js.map +1 -1
  88. package/lib/cjs/internal/app-binder/task/ExtractEncryptionKeyTask.js +1 -1
  89. package/lib/cjs/internal/app-binder/task/ExtractEncryptionKeyTask.js.map +3 -3
  90. package/lib/cjs/internal/app-binder/task/InitTask.js +1 -1
  91. package/lib/cjs/internal/app-binder/task/InitTask.js.map +3 -3
  92. package/lib/cjs/internal/app-binder/task/ParseStreamToDeviceTask.js +1 -1
  93. package/lib/cjs/internal/app-binder/task/ParseStreamToDeviceTask.js.map +3 -3
  94. package/lib/cjs/internal/app-binder/task/SignBlockTask.js +1 -1
  95. package/lib/cjs/internal/app-binder/task/SignBlockTask.js.map +3 -3
  96. package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.js +1 -1
  97. package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.js.map +3 -3
  98. package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.test.js +1 -1
  99. package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.test.js.map +3 -3
  100. package/lib/cjs/internal/app-binder/task/utils/TrustedProperties.js +1 -1
  101. package/lib/cjs/internal/app-binder/task/utils/TrustedProperties.js.map +2 -2
  102. package/lib/cjs/internal/di.js +1 -1
  103. package/lib/cjs/internal/di.js.map +3 -3
  104. package/lib/cjs/internal/externalTypes.js +1 -1
  105. package/lib/cjs/internal/externalTypes.js.map +2 -2
  106. package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.js +1 -1
  107. package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.js.map +2 -2
  108. package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js +1 -1
  109. package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js.map +2 -2
  110. package/lib/cjs/internal/lkrp-datasource/data/LKRPDataSource.js.map +1 -1
  111. package/lib/cjs/internal/use-cases/authentication/AuthenticateUseCase.js +1 -1
  112. package/lib/cjs/internal/use-cases/authentication/AuthenticateUseCase.js.map +2 -2
  113. package/lib/cjs/internal/use-cases/authentication/DecryptDataUseCase.js +1 -1
  114. package/lib/cjs/internal/use-cases/authentication/DecryptDataUseCase.js.map +3 -3
  115. package/lib/cjs/internal/use-cases/authentication/EncryptDataUseCase.js +1 -1
  116. package/lib/cjs/internal/use-cases/authentication/EncryptDataUseCase.js.map +3 -3
  117. package/lib/cjs/internal/utils/LKRPBlock.js +4 -4
  118. package/lib/cjs/internal/utils/LKRPBlock.js.map +3 -3
  119. package/lib/cjs/internal/utils/LKRPBlock.test.js +3 -3
  120. package/lib/cjs/internal/utils/LKRPBlock.test.js.map +3 -3
  121. package/lib/cjs/internal/utils/LKRPBlockStream.js +2 -2
  122. package/lib/cjs/internal/utils/LKRPBlockStream.js.map +3 -3
  123. package/lib/cjs/internal/utils/LKRPBlockStream.test.js +2 -2
  124. package/lib/cjs/internal/utils/LKRPBlockStream.test.js.map +3 -3
  125. package/lib/cjs/internal/utils/LKRPCommand.js +2 -2
  126. package/lib/cjs/internal/utils/LKRPCommand.js.map +3 -3
  127. package/lib/cjs/internal/utils/LKRPCommand.test.js +1 -1
  128. package/lib/cjs/internal/utils/LKRPCommand.test.js.map +2 -2
  129. package/lib/cjs/internal/utils/TLVBuilder.js +2 -0
  130. package/lib/cjs/internal/utils/TLVBuilder.js.map +7 -0
  131. package/lib/cjs/internal/utils/TLVParser.js +1 -1
  132. package/lib/cjs/internal/utils/TLVParser.js.map +3 -3
  133. package/lib/cjs/internal/utils/TLVParser.test.js +1 -1
  134. package/lib/cjs/internal/utils/TLVParser.test.js.map +2 -2
  135. package/lib/cjs/internal/utils/crypto.js +2 -0
  136. package/lib/cjs/internal/utils/crypto.js.map +7 -0
  137. package/lib/cjs/internal/utils/hex.js +2 -0
  138. package/lib/cjs/internal/utils/hex.js.map +7 -0
  139. package/lib/cjs/internal/utils/required.js +1 -1
  140. package/lib/cjs/internal/utils/required.js.map +2 -2
  141. package/lib/cjs/package.json +2 -2
  142. package/lib/esm/api/LedgerKeyringProtocolBuilder.js +1 -1
  143. package/lib/esm/api/LedgerKeyringProtocolBuilder.js.map +3 -3
  144. package/lib/esm/api/app-binder/AddToTrustchainDeviceActionTypes.js.map +2 -2
  145. package/lib/esm/api/app-binder/AuthenticateDeviceActionTypes.js.map +1 -1
  146. package/lib/esm/api/{model → app-binder}/Errors.js.map +1 -1
  147. package/lib/esm/api/app-binder/GetAppNameCommandTypes.js +1 -0
  148. package/lib/esm/api/app-binder/GetSeedIdCommandTypes.js +1 -0
  149. package/lib/esm/api/app-binder/GetSeedIdCommandTypes.js.map +7 -0
  150. package/lib/esm/api/app-binder/InitCommandTypes.js +1 -0
  151. package/lib/esm/api/app-binder/InitCommandTypes.js.map +7 -0
  152. package/lib/esm/api/app-binder/KeypairFromBytes.js +2 -0
  153. package/lib/esm/api/app-binder/KeypairFromBytes.js.map +7 -0
  154. package/lib/esm/api/app-binder/LKRPTypes.js +2 -0
  155. package/lib/esm/api/app-binder/LKRPTypes.js.map +7 -0
  156. package/lib/esm/api/app-binder/ParseStreamBlockCommandCommandTypes.js +1 -0
  157. package/lib/esm/api/app-binder/ParseStreamBlockCommandCommandTypes.js.map +7 -0
  158. package/lib/esm/api/app-binder/ParseStreamBlockHeaderCommandTypes.js +1 -0
  159. package/lib/esm/api/app-binder/ParseStreamBlockHeaderCommandTypes.js.map +7 -0
  160. package/lib/esm/api/app-binder/ParseStreamBlockSignatureTypes.js +1 -0
  161. package/lib/esm/api/app-binder/ParseStreamBlockSignatureTypes.js.map +7 -0
  162. package/lib/esm/api/app-binder/SetTrustedMemberTypes.js +1 -0
  163. package/lib/esm/api/app-binder/SetTrustedMemberTypes.js.map +7 -0
  164. package/lib/esm/api/app-binder/SignBlockCommandTypes.js +1 -0
  165. package/lib/esm/api/app-binder/SignBlockCommandTypes.js.map +7 -0
  166. package/lib/esm/api/app-binder/SignBlockHeaderCommandTypes.js +1 -0
  167. package/lib/esm/api/app-binder/SignBlockHeaderCommandTypes.js.map +7 -0
  168. package/lib/esm/api/app-binder/SignBlockSignatureCommandTypes.js +1 -0
  169. package/lib/esm/api/app-binder/SignBlockSignatureCommandTypes.js.map +7 -0
  170. package/lib/esm/api/app-binder/SignBlockSingleCommandTypes.js +1 -0
  171. package/lib/esm/api/app-binder/SignBlockSingleCommandTypes.js.map +7 -0
  172. package/lib/esm/api/index.js +1 -1
  173. package/lib/esm/api/index.js.map +2 -2
  174. package/lib/esm/internal/DefaultLedgerKeyringProtocol.js +1 -1
  175. package/lib/esm/internal/DefaultLedgerKeyringProtocol.js.map +3 -3
  176. package/lib/esm/internal/app-binder/LedgerKeyringProtocolBinder.js +1 -1
  177. package/lib/esm/internal/app-binder/LedgerKeyringProtocolBinder.js.map +3 -3
  178. package/lib/esm/internal/app-binder/command/GetAppNameCommand.js +1 -1
  179. package/lib/esm/internal/app-binder/command/GetAppNameCommand.js.map +2 -2
  180. package/lib/esm/internal/app-binder/command/GetSeedIdCommand.js +1 -1
  181. package/lib/esm/internal/app-binder/command/GetSeedIdCommand.js.map +3 -3
  182. package/lib/esm/internal/app-binder/command/GetSeedIdCommand.test.js +1 -1
  183. package/lib/esm/internal/app-binder/command/GetSeedIdCommand.test.js.map +3 -3
  184. package/lib/esm/internal/app-binder/command/GetVersionCommand.js.map +2 -2
  185. package/lib/esm/internal/app-binder/command/InitCommand.js +1 -1
  186. package/lib/esm/internal/app-binder/command/InitCommand.js.map +2 -2
  187. package/lib/esm/internal/app-binder/command/InitCommand.test.js +1 -1
  188. package/lib/esm/internal/app-binder/command/InitCommand.test.js.map +2 -2
  189. package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.js +1 -1
  190. package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.js.map +2 -2
  191. package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.test.js +1 -1
  192. package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.test.js.map +2 -2
  193. package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.js.map +2 -2
  194. package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.test.js +1 -1
  195. package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.test.js.map +2 -2
  196. package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.js +1 -1
  197. package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.js.map +2 -2
  198. package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.test.js.map +2 -2
  199. package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.js +1 -1
  200. package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.js.map +2 -2
  201. package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.test.js +1 -1
  202. package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.test.js.map +2 -2
  203. package/lib/esm/internal/app-binder/command/SignBlockHeader.js +1 -1
  204. package/lib/esm/internal/app-binder/command/SignBlockHeader.js.map +2 -2
  205. package/lib/esm/internal/app-binder/command/SignBlockHeader.test.js +1 -1
  206. package/lib/esm/internal/app-binder/command/SignBlockHeader.test.js.map +2 -2
  207. package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.js +1 -1
  208. package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.js.map +2 -2
  209. package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.test.js +1 -1
  210. package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.test.js.map +2 -2
  211. package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.js +1 -1
  212. package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.js.map +2 -2
  213. package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.test.js +1 -1
  214. package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.test.js.map +2 -2
  215. package/lib/esm/internal/app-binder/device-action/AddToTrustchainDeviceAction.js +1 -1
  216. package/lib/esm/internal/app-binder/device-action/AddToTrustchainDeviceAction.js.map +3 -3
  217. package/lib/esm/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js +1 -1
  218. package/lib/esm/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js.map +2 -2
  219. package/lib/esm/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js +1 -1
  220. package/lib/esm/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js.map +2 -2
  221. package/lib/esm/internal/app-binder/task/ExtractEncryptionKeyTask.js +1 -1
  222. package/lib/esm/internal/app-binder/task/ExtractEncryptionKeyTask.js.map +3 -3
  223. package/lib/esm/internal/app-binder/task/InitTask.js +1 -1
  224. package/lib/esm/internal/app-binder/task/InitTask.js.map +3 -3
  225. package/lib/esm/internal/app-binder/task/ParseStreamToDeviceTask.js +1 -1
  226. package/lib/esm/internal/app-binder/task/ParseStreamToDeviceTask.js.map +3 -3
  227. package/lib/esm/internal/app-binder/task/SignBlockTask.js +1 -1
  228. package/lib/esm/internal/app-binder/task/SignBlockTask.js.map +3 -3
  229. package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.js +1 -1
  230. package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.js.map +3 -3
  231. package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.test.js +1 -1
  232. package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.test.js.map +3 -3
  233. package/lib/esm/internal/app-binder/task/utils/TrustedProperties.js +1 -1
  234. package/lib/esm/internal/app-binder/task/utils/TrustedProperties.js.map +2 -2
  235. package/lib/esm/internal/di.js +1 -1
  236. package/lib/esm/internal/di.js.map +3 -3
  237. package/lib/esm/internal/externalTypes.js +1 -1
  238. package/lib/esm/internal/externalTypes.js.map +2 -2
  239. package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.js +1 -1
  240. package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.js.map +2 -2
  241. package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js +1 -1
  242. package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js.map +2 -2
  243. package/lib/esm/internal/use-cases/authentication/AuthenticateUseCase.js +1 -1
  244. package/lib/esm/internal/use-cases/authentication/AuthenticateUseCase.js.map +2 -2
  245. package/lib/esm/internal/use-cases/authentication/DecryptDataUseCase.js +1 -1
  246. package/lib/esm/internal/use-cases/authentication/DecryptDataUseCase.js.map +3 -3
  247. package/lib/esm/internal/use-cases/authentication/EncryptDataUseCase.js +1 -1
  248. package/lib/esm/internal/use-cases/authentication/EncryptDataUseCase.js.map +3 -3
  249. package/lib/esm/internal/utils/LKRPBlock.js +3 -3
  250. package/lib/esm/internal/utils/LKRPBlock.js.map +3 -3
  251. package/lib/esm/internal/utils/LKRPBlock.test.js +2 -2
  252. package/lib/esm/internal/utils/LKRPBlock.test.js.map +3 -3
  253. package/lib/esm/internal/utils/LKRPBlockStream.js +2 -2
  254. package/lib/esm/internal/utils/LKRPBlockStream.js.map +3 -3
  255. package/lib/esm/internal/utils/LKRPBlockStream.test.js +1 -1
  256. package/lib/esm/internal/utils/LKRPBlockStream.test.js.map +3 -3
  257. package/lib/esm/internal/utils/LKRPCommand.js +2 -2
  258. package/lib/esm/internal/utils/LKRPCommand.js.map +3 -3
  259. package/lib/esm/internal/utils/LKRPCommand.test.js +1 -1
  260. package/lib/esm/internal/utils/LKRPCommand.test.js.map +2 -2
  261. package/lib/esm/internal/utils/TLVBuilder.js +2 -0
  262. package/lib/esm/internal/utils/TLVBuilder.js.map +7 -0
  263. package/lib/esm/internal/utils/TLVParser.js +1 -1
  264. package/lib/esm/internal/utils/TLVParser.js.map +3 -3
  265. package/lib/esm/internal/utils/TLVParser.test.js +1 -1
  266. package/lib/esm/internal/utils/TLVParser.test.js.map +2 -2
  267. package/lib/esm/internal/utils/crypto.js +2 -0
  268. package/lib/esm/internal/utils/crypto.js.map +7 -0
  269. package/lib/esm/internal/utils/hex.js +2 -0
  270. package/lib/esm/internal/utils/hex.js.map +7 -0
  271. package/lib/esm/internal/utils/required.js +1 -1
  272. package/lib/esm/internal/utils/required.js.map +2 -2
  273. package/lib/esm/package.json +2 -2
  274. package/lib/types/api/LedgerKeyringProtocol.d.ts +2 -2
  275. package/lib/types/api/LedgerKeyringProtocol.d.ts.map +1 -1
  276. package/lib/types/api/LedgerKeyringProtocolBuilder.d.ts +1 -4
  277. package/lib/types/api/LedgerKeyringProtocolBuilder.d.ts.map +1 -1
  278. package/lib/types/api/app-binder/AddToTrustchainDeviceActionTypes.d.ts +4 -8
  279. package/lib/types/api/app-binder/AddToTrustchainDeviceActionTypes.d.ts.map +1 -1
  280. package/lib/types/api/app-binder/AuthenticateDeviceActionTypes.d.ts +2 -2
  281. package/lib/types/api/app-binder/AuthenticateDeviceActionTypes.d.ts.map +1 -1
  282. package/lib/types/api/app-binder/Errors.d.ts.map +1 -0
  283. package/lib/types/api/app-binder/GetAppNameCommandTypes.d.ts +5 -0
  284. package/lib/types/api/app-binder/GetAppNameCommandTypes.d.ts.map +1 -0
  285. package/lib/types/api/app-binder/GetSeedIdCommandTypes.d.ts +14 -0
  286. package/lib/types/api/app-binder/GetSeedIdCommandTypes.d.ts.map +1 -0
  287. package/lib/types/api/app-binder/GetVersionCommandTypes.d.ts +1 -0
  288. package/lib/types/api/app-binder/GetVersionCommandTypes.d.ts.map +1 -1
  289. package/lib/types/api/app-binder/InitCommandTypes.d.ts +5 -0
  290. package/lib/types/api/app-binder/InitCommandTypes.d.ts.map +1 -0
  291. package/lib/types/api/app-binder/KeypairFromBytes.d.ts +11 -0
  292. package/lib/types/api/app-binder/KeypairFromBytes.d.ts.map +1 -0
  293. package/lib/types/api/{model/Permissions.d.ts → app-binder/LKRPTypes.d.ts} +19 -1
  294. package/lib/types/api/app-binder/LKRPTypes.d.ts.map +1 -0
  295. package/lib/types/api/app-binder/ParseStreamBlockCommandCommandTypes.d.ts +6 -0
  296. package/lib/types/api/app-binder/ParseStreamBlockCommandCommandTypes.d.ts.map +1 -0
  297. package/lib/types/api/app-binder/ParseStreamBlockHeaderCommandTypes.d.ts +5 -0
  298. package/lib/types/api/app-binder/ParseStreamBlockHeaderCommandTypes.d.ts.map +1 -0
  299. package/lib/types/api/app-binder/ParseStreamBlockSignatureTypes.d.ts +5 -0
  300. package/lib/types/api/app-binder/ParseStreamBlockSignatureTypes.d.ts.map +1 -0
  301. package/lib/types/api/app-binder/SetTrustedMemberTypes.d.ts +6 -0
  302. package/lib/types/api/app-binder/SetTrustedMemberTypes.d.ts.map +1 -0
  303. package/lib/types/api/app-binder/SignBlockCommandTypes.d.ts +9 -0
  304. package/lib/types/api/app-binder/SignBlockCommandTypes.d.ts.map +1 -0
  305. package/lib/types/api/app-binder/SignBlockHeaderCommandTypes.d.ts +6 -0
  306. package/lib/types/api/app-binder/SignBlockHeaderCommandTypes.d.ts.map +1 -0
  307. package/lib/types/api/app-binder/SignBlockSignatureCommandTypes.d.ts +6 -0
  308. package/lib/types/api/app-binder/SignBlockSignatureCommandTypes.d.ts.map +1 -0
  309. package/lib/types/api/app-binder/SignBlockSingleCommandTypes.d.ts +5 -0
  310. package/lib/types/api/app-binder/SignBlockSingleCommandTypes.d.ts.map +1 -0
  311. package/lib/types/api/index.d.ts +2 -10
  312. package/lib/types/api/index.d.ts.map +1 -1
  313. package/lib/types/internal/DefaultLedgerKeyringProtocol.d.ts +4 -6
  314. package/lib/types/internal/DefaultLedgerKeyringProtocol.d.ts.map +1 -1
  315. package/lib/types/internal/app-binder/LedgerKeyringProtocolBinder.d.ts +4 -7
  316. package/lib/types/internal/app-binder/LedgerKeyringProtocolBinder.d.ts.map +1 -1
  317. package/lib/types/internal/app-binder/command/GetAppNameCommand.d.ts +1 -4
  318. package/lib/types/internal/app-binder/command/GetAppNameCommand.d.ts.map +1 -1
  319. package/lib/types/internal/app-binder/command/GetSeedIdCommand.d.ts +1 -13
  320. package/lib/types/internal/app-binder/command/GetSeedIdCommand.d.ts.map +1 -1
  321. package/lib/types/internal/app-binder/command/GetVersionCommand.d.ts +1 -2
  322. package/lib/types/internal/app-binder/command/GetVersionCommand.d.ts.map +1 -1
  323. package/lib/types/internal/app-binder/command/InitCommand.d.ts +1 -4
  324. package/lib/types/internal/app-binder/command/InitCommand.d.ts.map +1 -1
  325. package/lib/types/internal/app-binder/command/ParseBlockSignatureCommand.d.ts +1 -4
  326. package/lib/types/internal/app-binder/command/ParseBlockSignatureCommand.d.ts.map +1 -1
  327. package/lib/types/internal/app-binder/command/ParseStreamBlockCommand.d.ts +1 -5
  328. package/lib/types/internal/app-binder/command/ParseStreamBlockCommand.d.ts.map +1 -1
  329. package/lib/types/internal/app-binder/command/ParseStreamBlockHeader.d.ts +1 -4
  330. package/lib/types/internal/app-binder/command/ParseStreamBlockHeader.d.ts.map +1 -1
  331. package/lib/types/internal/app-binder/command/SetTrustedMemberCommand.d.ts +1 -5
  332. package/lib/types/internal/app-binder/command/SetTrustedMemberCommand.d.ts.map +1 -1
  333. package/lib/types/internal/app-binder/command/SignBlockHeader.d.ts +1 -5
  334. package/lib/types/internal/app-binder/command/SignBlockHeader.d.ts.map +1 -1
  335. package/lib/types/internal/app-binder/command/SignBlockSignatureCommand.d.ts +1 -5
  336. package/lib/types/internal/app-binder/command/SignBlockSignatureCommand.d.ts.map +1 -1
  337. package/lib/types/internal/app-binder/command/SignBlockSingleCommand.d.ts +1 -4
  338. package/lib/types/internal/app-binder/command/SignBlockSingleCommand.d.ts.map +1 -1
  339. package/lib/types/internal/app-binder/device-action/AddToTrustchainDeviceAction.d.ts +4 -8
  340. package/lib/types/internal/app-binder/device-action/AddToTrustchainDeviceAction.d.ts.map +1 -1
  341. package/lib/types/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.d.ts +2 -5
  342. package/lib/types/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.d.ts.map +1 -1
  343. package/lib/types/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.d.ts +2 -5
  344. package/lib/types/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.d.ts.map +1 -1
  345. package/lib/types/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.d.ts +2 -5
  346. package/lib/types/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.d.ts.map +1 -1
  347. package/lib/types/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.d.ts +2 -5
  348. package/lib/types/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.d.ts.map +1 -1
  349. package/lib/types/internal/app-binder/task/ExtractEncryptionKeyTask.d.ts +7 -4
  350. package/lib/types/internal/app-binder/task/ExtractEncryptionKeyTask.d.ts.map +1 -1
  351. package/lib/types/internal/app-binder/task/InitTask.d.ts +3 -5
  352. package/lib/types/internal/app-binder/task/InitTask.d.ts.map +1 -1
  353. package/lib/types/internal/app-binder/task/ParseStreamToDeviceTask.d.ts +1 -1
  354. package/lib/types/internal/app-binder/task/ParseStreamToDeviceTask.d.ts.map +1 -1
  355. package/lib/types/internal/app-binder/task/SignBlockTask.d.ts +8 -11
  356. package/lib/types/internal/app-binder/task/SignBlockTask.d.ts.map +1 -1
  357. package/lib/types/internal/app-binder/task/SignChallengeWithKeypairTask.d.ts +3 -5
  358. package/lib/types/internal/app-binder/task/SignChallengeWithKeypairTask.d.ts.map +1 -1
  359. package/lib/types/internal/app-binder/task/utils/TrustedProperties.d.ts +1 -1
  360. package/lib/types/internal/app-binder/task/utils/TrustedProperties.d.ts.map +1 -1
  361. package/lib/types/internal/di.d.ts +1 -3
  362. package/lib/types/internal/di.d.ts.map +1 -1
  363. package/lib/types/internal/externalTypes.d.ts +0 -1
  364. package/lib/types/internal/externalTypes.d.ts.map +1 -1
  365. package/lib/types/internal/lkrp-datasource/data/HttpLKRPDataSource.d.ts +2 -2
  366. package/lib/types/internal/lkrp-datasource/data/HttpLKRPDataSource.d.ts.map +1 -1
  367. package/lib/types/internal/lkrp-datasource/data/LKRPDataSource.d.ts +2 -2
  368. package/lib/types/internal/lkrp-datasource/data/LKRPDataSource.d.ts.map +1 -1
  369. package/lib/types/internal/use-cases/authentication/AuthenticateUseCase.d.ts +2 -3
  370. package/lib/types/internal/use-cases/authentication/AuthenticateUseCase.d.ts.map +1 -1
  371. package/lib/types/internal/use-cases/authentication/DecryptDataUseCase.d.ts +1 -4
  372. package/lib/types/internal/use-cases/authentication/DecryptDataUseCase.d.ts.map +1 -1
  373. package/lib/types/internal/use-cases/authentication/EncryptDataUseCase.d.ts +1 -4
  374. package/lib/types/internal/use-cases/authentication/EncryptDataUseCase.d.ts.map +1 -1
  375. package/lib/types/internal/utils/LKRPBlock.d.ts +1 -1
  376. package/lib/types/internal/utils/LKRPBlock.d.ts.map +1 -1
  377. package/lib/types/internal/utils/LKRPBlockStream.d.ts +3 -4
  378. package/lib/types/internal/utils/LKRPBlockStream.d.ts.map +1 -1
  379. package/lib/types/internal/utils/LKRPCommand.d.ts +1 -1
  380. package/lib/types/internal/utils/LKRPCommand.d.ts.map +1 -1
  381. package/lib/types/internal/utils/TLVBuilder.d.ts +15 -0
  382. package/lib/types/internal/utils/TLVBuilder.d.ts.map +1 -0
  383. package/lib/types/internal/utils/TLVParser.d.ts +1 -1
  384. package/lib/types/internal/utils/TLVParser.d.ts.map +1 -1
  385. package/lib/types/internal/utils/crypto.d.ts +19 -0
  386. package/lib/types/internal/utils/crypto.d.ts.map +1 -0
  387. package/lib/types/internal/utils/hex.d.ts +3 -0
  388. package/lib/types/internal/utils/hex.d.ts.map +1 -0
  389. package/lib/types/internal/utils/required.d.ts +1 -1
  390. package/lib/types/internal/utils/required.d.ts.map +1 -1
  391. package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
  392. package/package.json +5 -5
  393. package/lib/cjs/api/crypto/CryptoService.js +0 -2
  394. package/lib/cjs/api/crypto/CryptoService.js.map +0 -7
  395. package/lib/cjs/api/crypto/Key.js +0 -2
  396. package/lib/cjs/api/crypto/Key.js.map +0 -7
  397. package/lib/cjs/api/crypto/KeyPair.js +0 -2
  398. package/lib/cjs/api/crypto/KeyPair.js.map +0 -7
  399. package/lib/cjs/api/crypto/noble/NobleCryptoService.js +0 -2
  400. package/lib/cjs/api/crypto/noble/NobleCryptoService.js.map +0 -7
  401. package/lib/cjs/api/crypto/noble/NobleCryptoService.test.js +0 -2
  402. package/lib/cjs/api/crypto/noble/NobleCryptoService.test.js.map +0 -7
  403. package/lib/cjs/api/crypto/noble/NobleKey.js +0 -2
  404. package/lib/cjs/api/crypto/noble/NobleKey.js.map +0 -7
  405. package/lib/cjs/api/crypto/noble/NobleKey.test.js +0 -2
  406. package/lib/cjs/api/crypto/noble/NobleKey.test.js.map +0 -7
  407. package/lib/cjs/api/crypto/noble/NobleKeyPair.js +0 -2
  408. package/lib/cjs/api/crypto/noble/NobleKeyPair.js.map +0 -7
  409. package/lib/cjs/api/crypto/noble/NobleKeyPair.test.js +0 -2
  410. package/lib/cjs/api/crypto/noble/NobleKeyPair.test.js.map +0 -7
  411. package/lib/cjs/api/model/Env.js +0 -2
  412. package/lib/cjs/api/model/Env.js.map +0 -7
  413. package/lib/cjs/api/model/JWT.js +0 -2
  414. package/lib/cjs/api/model/JWT.js.map +0 -7
  415. package/lib/cjs/api/model/Permissions.js +0 -2
  416. package/lib/cjs/api/model/Permissions.js.map +0 -7
  417. package/lib/esm/api/crypto/CryptoService.js +0 -2
  418. package/lib/esm/api/crypto/CryptoService.js.map +0 -7
  419. package/lib/esm/api/crypto/Key.js +0 -2
  420. package/lib/esm/api/crypto/Key.js.map +0 -7
  421. package/lib/esm/api/crypto/KeyPair.js +0 -2
  422. package/lib/esm/api/crypto/KeyPair.js.map +0 -7
  423. package/lib/esm/api/crypto/noble/NobleCryptoService.js +0 -2
  424. package/lib/esm/api/crypto/noble/NobleCryptoService.js.map +0 -7
  425. package/lib/esm/api/crypto/noble/NobleCryptoService.test.js +0 -2
  426. package/lib/esm/api/crypto/noble/NobleCryptoService.test.js.map +0 -7
  427. package/lib/esm/api/crypto/noble/NobleKey.js +0 -2
  428. package/lib/esm/api/crypto/noble/NobleKey.js.map +0 -7
  429. package/lib/esm/api/crypto/noble/NobleKey.test.js +0 -2
  430. package/lib/esm/api/crypto/noble/NobleKey.test.js.map +0 -7
  431. package/lib/esm/api/crypto/noble/NobleKeyPair.js +0 -2
  432. package/lib/esm/api/crypto/noble/NobleKeyPair.js.map +0 -7
  433. package/lib/esm/api/crypto/noble/NobleKeyPair.test.js +0 -2
  434. package/lib/esm/api/crypto/noble/NobleKeyPair.test.js.map +0 -7
  435. package/lib/esm/api/model/Env.js +0 -2
  436. package/lib/esm/api/model/Env.js.map +0 -7
  437. package/lib/esm/api/model/JWT.js +0 -1
  438. package/lib/esm/api/model/Permissions.js +0 -2
  439. package/lib/esm/api/model/Permissions.js.map +0 -7
  440. package/lib/types/api/crypto/CryptoService.d.ts +0 -22
  441. package/lib/types/api/crypto/CryptoService.d.ts.map +0 -1
  442. package/lib/types/api/crypto/Key.d.ts +0 -7
  443. package/lib/types/api/crypto/Key.d.ts.map +0 -1
  444. package/lib/types/api/crypto/KeyPair.d.ts +0 -12
  445. package/lib/types/api/crypto/KeyPair.d.ts.map +0 -1
  446. package/lib/types/api/crypto/noble/NobleCryptoService.d.ts +0 -13
  447. package/lib/types/api/crypto/noble/NobleCryptoService.d.ts.map +0 -1
  448. package/lib/types/api/crypto/noble/NobleCryptoService.test.d.ts +0 -2
  449. package/lib/types/api/crypto/noble/NobleCryptoService.test.d.ts.map +0 -1
  450. package/lib/types/api/crypto/noble/NobleKey.d.ts +0 -11
  451. package/lib/types/api/crypto/noble/NobleKey.d.ts.map +0 -1
  452. package/lib/types/api/crypto/noble/NobleKey.test.d.ts +0 -2
  453. package/lib/types/api/crypto/noble/NobleKey.test.d.ts.map +0 -1
  454. package/lib/types/api/crypto/noble/NobleKeyPair.d.ts +0 -17
  455. package/lib/types/api/crypto/noble/NobleKeyPair.d.ts.map +0 -1
  456. package/lib/types/api/crypto/noble/NobleKeyPair.test.d.ts +0 -2
  457. package/lib/types/api/crypto/noble/NobleKeyPair.test.d.ts.map +0 -1
  458. package/lib/types/api/model/Env.d.ts +0 -5
  459. package/lib/types/api/model/Env.d.ts.map +0 -1
  460. package/lib/types/api/model/Errors.d.ts.map +0 -1
  461. package/lib/types/api/model/JWT.d.ts +0 -9
  462. package/lib/types/api/model/JWT.d.ts.map +0 -1
  463. package/lib/types/api/model/Permissions.d.ts.map +0 -1
  464. /package/lib/cjs/api/{model → app-binder}/Errors.js +0 -0
  465. /package/lib/esm/api/{model → app-binder}/Errors.js +0 -0
  466. /package/lib/esm/api/{model/JWT.js.map → app-binder/GetAppNameCommandTypes.js.map} +0 -0
  467. /package/lib/types/api/{model → app-binder}/Errors.d.ts +0 -0
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@ledgerhq/device-trusted-app-kit-ledger-keyring-protocol",
3
- "version": "0.0.0-multisig-20250822145545",
3
+ "version": "0.0.0-web-ble-29-08---20250829104351",
4
4
  "license": "Apache-2.0",
5
5
  "private": false,
6
6
  "exports": {
@@ -20,20 +20,20 @@
20
20
  ],
21
21
  "dependencies": {
22
22
  "@noble/ciphers": "^1.3.0",
23
- "@noble/curves": "^1.9.7",
24
23
  "@noble/hashes": "^1.8.0",
24
+ "@noble/secp256k1": "^2.3.0",
25
25
  "inversify": "7.5.1",
26
26
  "purify-ts": "2.1.0",
27
27
  "reflect-metadata": "0.2.2",
28
28
  "rxjs": "7.8.2",
29
29
  "xstate": "5.19.2",
30
- "@ledgerhq/device-management-kit": "0.0.0-multisig-20250822145545",
31
- "@ledgerhq/signer-utils": "0.0.0-multisig-20250822145545"
30
+ "@ledgerhq/device-management-kit": "0.0.0-web-ble-29-08---20250829104351",
31
+ "@ledgerhq/signer-utils": "0.0.0-web-ble-29-08---20250829104351"
32
32
  },
33
33
  "devDependencies": {
34
34
  "@ledgerhq/eslint-config-dsdk": "0.0.2",
35
- "@ledgerhq/prettier-config-dsdk": "0.0.2",
36
35
  "@ledgerhq/ldmk-tool": "0.0.1",
36
+ "@ledgerhq/prettier-config-dsdk": "0.0.2",
37
37
  "@ledgerhq/tsconfig-dsdk": "1.0.1",
38
38
  "@ledgerhq/vitest-config-dmk": "0.0.0"
39
39
  },
@@ -1,2 +0,0 @@
1
- "use strict";var a=Object.defineProperty;var p=Object.getOwnPropertyDescriptor;var K=Object.getOwnPropertyNames;var A=Object.prototype.hasOwnProperty;var c=(t,r)=>{for(var e in r)a(t,e,{get:r[e],enumerable:!0})},P=(t,r,e,i)=>{if(r&&typeof r=="object"||typeof r=="function")for(let y of K(r))!A.call(t,y)&&y!==e&&a(t,y,{get:()=>r[y],enumerable:!(i=p(r,y))||i.enumerable});return t};var U=t=>P(a({},"__esModule",{value:!0}),t);var s={};c(s,{Curve:()=>m,EncryptionAlgo:()=>o,HashAlgo:()=>n});module.exports=U(s);var m=(e=>(e[e.K256=0]="K256",e[e.P256=1]="P256",e))(m||{}),o=(r=>(r[r.AES256_GCM=0]="AES256_GCM",r))(o||{}),n=(r=>(r[r.SHA256=0]="SHA256",r))(n||{});0&&(module.exports={Curve,EncryptionAlgo,HashAlgo});
2
- //# sourceMappingURL=CryptoService.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/crypto/CryptoService.ts"],
4
- "sourcesContent": ["import { type Key } from \"./Key\";\nimport { type KeyPair } from \"./KeyPair\";\n\nexport enum Curve {\n K256, // secp256k1\n P256, // P-256\n}\n\nexport enum EncryptionAlgo {\n AES256_GCM,\n}\n\nexport enum HashAlgo {\n SHA256,\n}\n\nexport interface CryptoService {\n // Generate a random buffer\n randomBytes(len: number): Uint8Array;\n\n // Compute a hash\n hash(bytes: Uint8Array, algo: HashAlgo): Uint8Array;\n\n // Compute a HMAC\n hmac(key: Uint8Array, message: Uint8Array, algo: HashAlgo): Uint8Array;\n\n // Generate a new random keypair\n createKeyPair(curve: Curve): Promise<KeyPair>;\n\n // Import a keypair\n importKeyPair(privateKey: Uint8Array, curve: Curve): KeyPair;\n\n // Generate a new random symmetric key\n createSymmetricKey(algo: EncryptionAlgo): Promise<Key>;\n\n // Import a symmetric key\n importSymmetricKey(keyMaterial: Uint8Array, algo: EncryptionAlgo): Key;\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,WAAAE,EAAA,mBAAAC,EAAA,aAAAC,IAAA,eAAAC,EAAAL,GAGO,IAAKE,OACVA,IAAA,eACAA,IAAA,eAFUA,OAAA,IAKAC,OACVA,IAAA,2BADUA,OAAA,IAIAC,OACVA,IAAA,mBADUA,OAAA",
6
- "names": ["CryptoService_exports", "__export", "Curve", "EncryptionAlgo", "HashAlgo", "__toCommonJS"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var i=Object.defineProperty;var y=Object.getOwnPropertyDescriptor;var A=Object.getOwnPropertyNames;var o=Object.prototype.hasOwnProperty;var c=(t,r)=>{for(var a in r)i(t,a,{get:r[a],enumerable:!0})},p=(t,r,a,n)=>{if(r&&typeof r=="object"||typeof r=="function")for(let e of A(r))!o.call(t,e)&&e!==a&&i(t,e,{get:()=>r[e],enumerable:!(n=y(r,e))||n.enumerable});return t};var U=t=>p(i({},"__esModule",{value:!0}),t);var S={};c(S,{AES256_BLOCK_SIZE:()=>s,AES256_KEY_SIZE:()=>E});module.exports=U(S);const E=32,s=16;0&&(module.exports={AES256_BLOCK_SIZE,AES256_KEY_SIZE});
2
- //# sourceMappingURL=Key.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/crypto/Key.ts"],
4
- "sourcesContent": ["export const AES256_KEY_SIZE = 32;\nexport const AES256_BLOCK_SIZE = 16;\n\nexport interface Key {\n encrypt(iv: Uint8Array, data: Uint8Array): Promise<Uint8Array>;\n decrypt(iv: Uint8Array, encryptedData: Uint8Array): Promise<Uint8Array>;\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,uBAAAE,EAAA,oBAAAC,IAAA,eAAAC,EAAAJ,GAAO,MAAMG,EAAkB,GAClBD,EAAoB",
6
- "names": ["Key_exports", "__export", "AES256_BLOCK_SIZE", "AES256_KEY_SIZE", "__toCommonJS"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var a=Object.defineProperty;var o=Object.getOwnPropertyDescriptor;var A=Object.getOwnPropertyNames;var P=Object.prototype.hasOwnProperty;var U=(i,r)=>{for(var e in r)a(i,e,{get:r[e],enumerable:!0})},s=(i,r,e,n)=>{if(r&&typeof r=="object"||typeof r=="function")for(let t of A(r))!P.call(i,t)&&t!==e&&a(i,t,{get:()=>r[t],enumerable:!(n=o(r,t))||n.enumerable});return i};var c=i=>s(a({},"__esModule",{value:!0}),i);var u={};U(u,{SigFormat:()=>y});module.exports=c(u);var y=(e=>(e[e.COMPACT=0]="COMPACT",e[e.DER=1]="DER",e))(y||{});0&&(module.exports={SigFormat});
2
- //# sourceMappingURL=KeyPair.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/crypto/KeyPair.ts"],
4
- "sourcesContent": ["export enum SigFormat {\n COMPACT,\n DER,\n}\n\nexport interface KeyPair {\n sign(data: Uint8Array, format?: SigFormat): Promise<Uint8Array>;\n verify(\n data: Uint8Array,\n signature: Uint8Array,\n format?: SigFormat,\n ): Promise<boolean>;\n deriveSharedSecret(peerPublicKey: Uint8Array): Promise<Uint8Array>;\n getPublicKey(): Uint8Array;\n getPublicKeyToHex(): string;\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,eAAAE,IAAA,eAAAC,EAAAH,GAAO,IAAKE,OACVA,IAAA,qBACAA,IAAA,aAFUA,OAAA",
6
- "names": ["KeyPair_exports", "__export", "SigFormat", "__toCommonJS"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var a=Object.defineProperty;var h=Object.getOwnPropertyDescriptor;var A=Object.getOwnPropertyNames;var u=Object.prototype.hasOwnProperty;var l=(t,r)=>{for(var e in r)a(t,e,{get:r[e],enumerable:!0})},f=(t,r,e,o)=>{if(r&&typeof r=="object"||typeof r=="function")for(let i of A(r))!u.call(t,i)&&i!==e&&a(t,i,{get:()=>r[i],enumerable:!(o=h(r,i))||o.enumerable});return t};var K=t=>f(a({},"__esModule",{value:!0}),t);var g={};l(g,{NobleCryptoService:()=>U});module.exports=K(g);var s=require("@noble/ciphers/webcrypto"),c=require("@noble/hashes/hmac"),y=require("@noble/hashes/sha256"),m=require("../../crypto/CryptoService"),n=require("./NobleKey"),p=require("./NobleKeyPair");class U{randomBytes(r){return(0,s.randomBytes)(r)}hash(r,e){switch(e){case m.HashAlgo.SHA256:return(0,y.sha256)(r);default:throw new Error("Unsupported hash algorithm",e)}}hmac(r,e,o){switch(o){case m.HashAlgo.SHA256:return(0,c.hmac)(y.sha256,r,e);default:throw new Error("Unsupported hash algorithm",o)}}async createKeyPair(r){return await p.NobleKeyPair.generate(r)}importKeyPair(r,e){return p.NobleKeyPair.from(r,e)}async createSymmetricKey(r){return await n.NobleKey.generate(r)}importSymmetricKey(r,e){return n.NobleKey.from(r,e)}}0&&(module.exports={NobleCryptoService});
2
- //# sourceMappingURL=NobleCryptoService.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleCryptoService.ts"],
4
- "sourcesContent": ["import { randomBytes } from \"@noble/ciphers/webcrypto\";\nimport { hmac } from \"@noble/hashes/hmac\";\nimport { sha256 } from \"@noble/hashes/sha256\";\n\nimport {\n type CryptoService,\n type Curve,\n type EncryptionAlgo,\n HashAlgo,\n} from \"@api/crypto/CryptoService\";\nimport { type Key } from \"@api/crypto/Key\";\nimport { type KeyPair } from \"@api/crypto/KeyPair\";\n\nimport { NobleKey } from \"./NobleKey\";\nimport { NobleKeyPair } from \"./NobleKeyPair\";\n\nexport class NobleCryptoService implements CryptoService {\n randomBytes(len: number): Uint8Array {\n return randomBytes(len);\n }\n\n hash(bytes: Uint8Array, algo: HashAlgo): Uint8Array {\n switch (algo) {\n case HashAlgo.SHA256:\n return sha256(bytes);\n default:\n throw new Error(\"Unsupported hash algorithm\", algo);\n }\n }\n\n hmac(key: Uint8Array, message: Uint8Array, algo: HashAlgo): Uint8Array {\n switch (algo) {\n case HashAlgo.SHA256:\n return hmac(sha256, key, message);\n default:\n throw new Error(\"Unsupported hash algorithm\", algo);\n }\n }\n\n async createKeyPair(curve: Curve): Promise<KeyPair> {\n return await NobleKeyPair.generate(curve);\n }\n\n importKeyPair(privateKey: Uint8Array, curve: Curve): KeyPair {\n return NobleKeyPair.from(privateKey, curve);\n }\n\n async createSymmetricKey(algo: EncryptionAlgo): Promise<Key> {\n return await NobleKey.generate(algo);\n }\n\n importSymmetricKey(keyMaterial: Uint8Array, algo: EncryptionAlgo): Key {\n return NobleKey.from(keyMaterial, algo);\n }\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,wBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAA4B,oCAC5BC,EAAqB,8BACrBC,EAAuB,gCAEvBC,EAKO,qCAIPC,EAAyB,sBACzBC,EAA6B,0BAEtB,MAAMP,CAA4C,CACvD,YAAYQ,EAAyB,CACnC,SAAO,eAAYA,CAAG,CACxB,CAEA,KAAKC,EAAmBC,EAA4B,CAClD,OAAQA,EAAM,CACZ,KAAK,WAAS,OACZ,SAAO,UAAOD,CAAK,EACrB,QACE,MAAM,IAAI,MAAM,6BAA8BC,CAAI,CACtD,CACF,CAEA,KAAKC,EAAiBC,EAAqBF,EAA4B,CACrE,OAAQA,EAAM,CACZ,KAAK,WAAS,OACZ,SAAO,QAAK,SAAQC,EAAKC,CAAO,EAClC,QACE,MAAM,IAAI,MAAM,6BAA8BF,CAAI,CACtD,CACF,CAEA,MAAM,cAAcG,EAAgC,CAClD,OAAO,MAAM,eAAa,SAASA,CAAK,CAC1C,CAEA,cAAcC,EAAwBD,EAAuB,CAC3D,OAAO,eAAa,KAAKC,EAAYD,CAAK,CAC5C,CAEA,MAAM,mBAAmBH,EAAoC,CAC3D,OAAO,MAAM,WAAS,SAASA,CAAI,CACrC,CAEA,mBAAmBK,EAAyBL,EAA2B,CACrE,OAAO,WAAS,KAAKK,EAAaL,CAAI,CACxC,CACF",
6
- "names": ["NobleCryptoService_exports", "__export", "NobleCryptoService", "__toCommonJS", "import_webcrypto", "import_hmac", "import_sha256", "import_CryptoService", "import_NobleKey", "import_NobleKeyPair", "len", "bytes", "algo", "key", "message", "curve", "privateKey", "keyMaterial"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var c=require("@ledgerhq/device-management-kit"),o=require("../../crypto/CryptoService"),n=require("./NobleCryptoService"),a=require("./NobleKey"),i=require("./NobleKeyPair");describe("NobleCryptoService",()=>{let r;beforeEach(()=>{r=new n.NobleCryptoService}),it("should generate random bytes of correct length",()=>{const t=r.randomBytes(32);expect(t.length).toBe(32)}),it("should hash data correctly with SHA256",()=>{const e=new TextEncoder().encode("test"),t=r.hash(e,o.HashAlgo.SHA256);expect(t).toEqual((0,c.hexaStringToBuffer)("9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08"))}),it("should compute HMAC correctly with SHA256",()=>{const e=new Uint8Array(32).fill(97),t=new TextEncoder().encode("test message"),s=r.hmac(e,t,o.HashAlgo.SHA256);expect(s).toEqual((0,c.hexaStringToBuffer)("0b19ad8fef1660f7a191465effeea922079633ada962f52cb60103d9935cc460"))}),it("should create a key pair",async()=>{const e=await r.createKeyPair(o.Curve.K256);expect(e instanceof i.NobleKeyPair).toBeTruthy()}),it("should import a key pair",()=>{const e=new Uint8Array(32).fill(1),t=r.importKeyPair(e,o.Curve.K256);expect(t instanceof i.NobleKeyPair).toBeTruthy()}),it("should create a symmetric key",async()=>{const e=await r.createSymmetricKey(o.EncryptionAlgo.AES256_GCM);expect(e instanceof a.NobleKey).toBeTruthy()}),it("should import a symmetric key",()=>{const e=new Uint8Array(32).fill(1),t=r.importSymmetricKey(e,o.EncryptionAlgo.AES256_GCM);expect(t instanceof a.NobleKey).toBeTruthy()})});
2
- //# sourceMappingURL=NobleCryptoService.test.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleCryptoService.test.ts"],
4
- "sourcesContent": ["import { hexaStringToBuffer } from \"@ledgerhq/device-management-kit\";\n\nimport { Curve, EncryptionAlgo, HashAlgo } from \"@api/crypto/CryptoService\";\n\nimport { NobleCryptoService } from \"./NobleCryptoService\";\nimport { NobleKey } from \"./NobleKey\";\nimport { NobleKeyPair } from \"./NobleKeyPair\";\n\ndescribe(\"NobleCryptoService\", () => {\n let cryptoService: NobleCryptoService;\n\n beforeEach(() => {\n cryptoService = new NobleCryptoService();\n });\n\n it(\"should generate random bytes of correct length\", () => {\n const length = 32;\n const bytes = cryptoService.randomBytes(length);\n expect(bytes.length).toBe(length);\n });\n\n it(\"should hash data correctly with SHA256\", () => {\n const data = new TextEncoder().encode(\"test\");\n const hashResult = cryptoService.hash(data, HashAlgo.SHA256);\n expect(hashResult).toEqual(\n hexaStringToBuffer(\n \"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08\",\n )!,\n );\n });\n\n it(\"should compute HMAC correctly with SHA256\", () => {\n const key = new Uint8Array(32).fill(0x61);\n const message = new TextEncoder().encode(\"test message\");\n const hmacResult = cryptoService.hmac(key, message, HashAlgo.SHA256);\n expect(hmacResult).toEqual(\n hexaStringToBuffer(\n \"0b19ad8fef1660f7a191465effeea922079633ada962f52cb60103d9935cc460\",\n )!,\n );\n });\n\n it(\"should create a key pair\", async () => {\n const keyPair = await cryptoService.createKeyPair(Curve.K256);\n expect(keyPair instanceof NobleKeyPair).toBeTruthy();\n });\n\n it(\"should import a key pair\", () => {\n const privateKey = new Uint8Array(32).fill(1);\n const keyPair = cryptoService.importKeyPair(privateKey, Curve.K256);\n expect(keyPair instanceof NobleKeyPair).toBeTruthy();\n });\n\n it(\"should create a symmetric key\", async () => {\n const symmetricKey = await cryptoService.createSymmetricKey(\n EncryptionAlgo.AES256_GCM,\n );\n expect(symmetricKey instanceof NobleKey).toBeTruthy();\n });\n\n it(\"should import a symmetric key\", () => {\n const keyMaterial = new Uint8Array(32).fill(1);\n const symmetricKey = cryptoService.importSymmetricKey(\n keyMaterial,\n EncryptionAlgo.AES256_GCM,\n );\n expect(symmetricKey instanceof NobleKey).toBeTruthy();\n });\n});\n"],
5
- "mappings": "aAAA,IAAAA,EAAmC,2CAEnCC,EAAgD,qCAEhDC,EAAmC,gCACnCC,EAAyB,sBACzBC,EAA6B,0BAE7B,SAAS,qBAAsB,IAAM,CACnC,IAAIC,EAEJ,WAAW,IAAM,CACfA,EAAgB,IAAI,oBACtB,CAAC,EAED,GAAG,iDAAkD,IAAM,CAEzD,MAAMC,EAAQD,EAAc,YAAY,EAAM,EAC9C,OAAOC,EAAM,MAAM,EAAE,KAAK,EAAM,CAClC,CAAC,EAED,GAAG,yCAA0C,IAAM,CACjD,MAAMC,EAAO,IAAI,YAAY,EAAE,OAAO,MAAM,EACtCC,EAAaH,EAAc,KAAKE,EAAM,WAAS,MAAM,EAC3D,OAAOC,CAAU,EAAE,WACjB,sBACE,kEACF,CACF,CACF,CAAC,EAED,GAAG,4CAA6C,IAAM,CACpD,MAAMC,EAAM,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EAClCC,EAAU,IAAI,YAAY,EAAE,OAAO,cAAc,EACjDC,EAAaN,EAAc,KAAKI,EAAKC,EAAS,WAAS,MAAM,EACnE,OAAOC,CAAU,EAAE,WACjB,sBACE,kEACF,CACF,CACF,CAAC,EAED,GAAG,2BAA4B,SAAY,CACzC,MAAMC,EAAU,MAAMP,EAAc,cAAc,QAAM,IAAI,EAC5D,OAAOO,aAAmB,cAAY,EAAE,WAAW,CACrD,CAAC,EAED,GAAG,2BAA4B,IAAM,CACnC,MAAMC,EAAa,IAAI,WAAW,EAAE,EAAE,KAAK,CAAC,EACtCD,EAAUP,EAAc,cAAcQ,EAAY,QAAM,IAAI,EAClE,OAAOD,aAAmB,cAAY,EAAE,WAAW,CACrD,CAAC,EAED,GAAG,gCAAiC,SAAY,CAC9C,MAAME,EAAe,MAAMT,EAAc,mBACvC,iBAAe,UACjB,EACA,OAAOS,aAAwB,UAAQ,EAAE,WAAW,CACtD,CAAC,EAED,GAAG,gCAAiC,IAAM,CACxC,MAAMC,EAAc,IAAI,WAAW,EAAE,EAAE,KAAK,CAAC,EACvCD,EAAeT,EAAc,mBACjCU,EACA,iBAAe,UACjB,EACA,OAAOD,aAAwB,UAAQ,EAAE,WAAW,CACtD,CAAC,CACH,CAAC",
6
- "names": ["import_device_management_kit", "import_CryptoService", "import_NobleCryptoService", "import_NobleKey", "import_NobleKeyPair", "cryptoService", "bytes", "data", "hashResult", "key", "message", "hmacResult", "keyPair", "privateKey", "symmetricKey", "keyMaterial"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var p=Object.defineProperty;var m=Object.getOwnPropertyDescriptor;var A=Object.getOwnPropertyNames;var E=Object.prototype.hasOwnProperty;var h=(e,r)=>{for(var t in r)p(e,t,{get:r[t],enumerable:!0})},U=(e,r,t,y)=>{if(r&&typeof r=="object"||typeof r=="function")for(let n of A(r))!E.call(e,n)&&n!==t&&p(e,n,{get:()=>r[n],enumerable:!(y=m(r,n))||y.enumerable});return e};var l=e=>U(p({},"__esModule",{value:!0}),e);var S={};h(S,{NobleKey:()=>c});module.exports=l(S);var s=require("@noble/ciphers/aes"),a=require("@noble/ciphers/webcrypto"),i=require("../../crypto/CryptoService"),o=require("../../crypto/Key");class c{constructor(r){this.key=r}static async generate(r=i.EncryptionAlgo.AES256_GCM){if(r!==i.EncryptionAlgo.AES256_GCM)throw new Error(`Unsupported encryption algorithm ${r}`);return new c((0,a.randomBytes)(o.AES256_KEY_SIZE))}static from(r,t=i.EncryptionAlgo.AES256_GCM){if(t!==i.EncryptionAlgo.AES256_GCM)throw new Error(`Unsupported encryption algorithm ${t}`);return new c(r)}async encrypt(r,t){return(0,s.gcm)(this.key,r.slice(0,o.AES256_BLOCK_SIZE)).encrypt(t)}async decrypt(r,t){return(0,s.gcm)(this.key,r.slice(0,o.AES256_BLOCK_SIZE)).decrypt(t)}}0&&(module.exports={NobleKey});
2
- //# sourceMappingURL=NobleKey.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleKey.ts"],
4
- "sourcesContent": ["import { gcm } from \"@noble/ciphers/aes\";\nimport { randomBytes } from \"@noble/ciphers/webcrypto\";\n\nimport { EncryptionAlgo } from \"@api/crypto/CryptoService\";\nimport { AES256_BLOCK_SIZE, AES256_KEY_SIZE, type Key } from \"@api/crypto/Key\";\n\nexport class NobleKey implements Key {\n static async generate(\n algo: EncryptionAlgo = EncryptionAlgo.AES256_GCM,\n ): Promise<NobleKey> {\n if (algo !== EncryptionAlgo.AES256_GCM) {\n throw new Error(`Unsupported encryption algorithm ${algo}`);\n }\n return new NobleKey(randomBytes(AES256_KEY_SIZE));\n }\n\n static from(\n keyMaterial: Uint8Array,\n algo: EncryptionAlgo = EncryptionAlgo.AES256_GCM,\n ): NobleKey {\n if (algo !== EncryptionAlgo.AES256_GCM) {\n throw new Error(`Unsupported encryption algorithm ${algo}`);\n }\n return new NobleKey(keyMaterial);\n }\n\n private constructor(private key: Uint8Array) {}\n\n async encrypt(iv: Uint8Array, data: Uint8Array): Promise<Uint8Array> {\n const cipher = gcm(this.key, iv.slice(0, AES256_BLOCK_SIZE));\n return cipher.encrypt(data);\n }\n\n async decrypt(\n iv: Uint8Array,\n encryptedData: Uint8Array,\n ): Promise<Uint8Array> {\n const cipher = gcm(this.key, iv.slice(0, AES256_BLOCK_SIZE));\n return cipher.decrypt(encryptedData);\n }\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,cAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAoB,8BACpBC,EAA4B,oCAE5BC,EAA+B,qCAC/BC,EAA6D,2BAEtD,MAAML,CAAwB,CAoB3B,YAAoBM,EAAiB,CAAjB,SAAAA,CAAkB,CAnB9C,aAAa,SACXC,EAAuB,iBAAe,WACnB,CACnB,GAAIA,IAAS,iBAAe,WAC1B,MAAM,IAAI,MAAM,oCAAoCA,CAAI,EAAE,EAE5D,OAAO,IAAIP,KAAS,eAAY,iBAAe,CAAC,CAClD,CAEA,OAAO,KACLQ,EACAD,EAAuB,iBAAe,WAC5B,CACV,GAAIA,IAAS,iBAAe,WAC1B,MAAM,IAAI,MAAM,oCAAoCA,CAAI,EAAE,EAE5D,OAAO,IAAIP,EAASQ,CAAW,CACjC,CAIA,MAAM,QAAQC,EAAgBC,EAAuC,CAEnE,SADe,OAAI,KAAK,IAAKD,EAAG,MAAM,EAAG,mBAAiB,CAAC,EAC7C,QAAQC,CAAI,CAC5B,CAEA,MAAM,QACJD,EACAE,EACqB,CAErB,SADe,OAAI,KAAK,IAAKF,EAAG,MAAM,EAAG,mBAAiB,CAAC,EAC7C,QAAQE,CAAa,CACrC,CACF",
6
- "names": ["NobleKey_exports", "__export", "NobleKey", "__toCommonJS", "import_aes", "import_webcrypto", "import_CryptoService", "import_Key", "key", "algo", "keyMaterial", "iv", "data", "encryptedData"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var c=require("../../crypto/Key"),o=require("./NobleKey");describe("NobleKey",()=>{const t=new TextEncoder().encode("Test Data");it("should encrypt and decrypt data correctly",async()=>{const n=await o.NobleKey.generate(),e=new Uint8Array(c.AES256_BLOCK_SIZE).fill(2),a=await n.encrypt(e,t),r=await n.decrypt(e,a);expect(a).not.toEqual(t),expect(r).toEqual(t)}),it("should encrypt and decrypt data from key material",async()=>{const n=new Uint8Array(c.AES256_KEY_SIZE).fill(1),e=o.NobleKey.from(n),a=new Uint8Array(c.AES256_BLOCK_SIZE).fill(2),r=await e.encrypt(a,t),y=await e.decrypt(a,r);expect(r).not.toEqual(t),expect(y).toEqual(t)})});
2
- //# sourceMappingURL=NobleKey.test.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleKey.test.ts"],
4
- "sourcesContent": ["import { AES256_BLOCK_SIZE, AES256_KEY_SIZE } from \"@api/crypto/Key\";\n\nimport { NobleKey } from \"./NobleKey\";\n\ndescribe(\"NobleKey\", () => {\n const testData = new TextEncoder().encode(\"Test Data\");\n\n it(\"should encrypt and decrypt data correctly\", async () => {\n const key = await NobleKey.generate();\n const iv = new Uint8Array(AES256_BLOCK_SIZE).fill(0x02);\n const encryptedData = await key.encrypt(iv, testData);\n const decryptedData = await key.decrypt(iv, encryptedData);\n\n expect(encryptedData).not.toEqual(testData);\n expect(decryptedData).toEqual(testData);\n });\n\n it(\"should encrypt and decrypt data from key material\", async () => {\n const keyMaterial = new Uint8Array(AES256_KEY_SIZE).fill(0x01);\n const key = NobleKey.from(keyMaterial);\n const iv = new Uint8Array(AES256_BLOCK_SIZE).fill(0x02);\n const encryptedData = await key.encrypt(iv, testData);\n const decryptedData = await key.decrypt(iv, encryptedData);\n\n expect(encryptedData).not.toEqual(testData);\n expect(decryptedData).toEqual(testData);\n });\n});\n"],
5
- "mappings": "aAAA,IAAAA,EAAmD,2BAEnDC,EAAyB,sBAEzB,SAAS,WAAY,IAAM,CACzB,MAAMC,EAAW,IAAI,YAAY,EAAE,OAAO,WAAW,EAErD,GAAG,4CAA6C,SAAY,CAC1D,MAAMC,EAAM,MAAM,WAAS,SAAS,EAC9BC,EAAK,IAAI,WAAW,mBAAiB,EAAE,KAAK,CAAI,EAChDC,EAAgB,MAAMF,EAAI,QAAQC,EAAIF,CAAQ,EAC9CI,EAAgB,MAAMH,EAAI,QAAQC,EAAIC,CAAa,EAEzD,OAAOA,CAAa,EAAE,IAAI,QAAQH,CAAQ,EAC1C,OAAOI,CAAa,EAAE,QAAQJ,CAAQ,CACxC,CAAC,EAED,GAAG,oDAAqD,SAAY,CAClE,MAAMK,EAAc,IAAI,WAAW,iBAAe,EAAE,KAAK,CAAI,EACvDJ,EAAM,WAAS,KAAKI,CAAW,EAC/BH,EAAK,IAAI,WAAW,mBAAiB,EAAE,KAAK,CAAI,EAChDC,EAAgB,MAAMF,EAAI,QAAQC,EAAIF,CAAQ,EAC9CI,EAAgB,MAAMH,EAAI,QAAQC,EAAIC,CAAa,EAEzD,OAAOA,CAAa,EAAE,IAAI,QAAQH,CAAQ,EAC1C,OAAOI,CAAa,EAAE,QAAQJ,CAAQ,CACxC,CAAC,CACH,CAAC",
6
- "names": ["import_Key", "import_NobleKey", "testData", "key", "iv", "encryptedData", "decryptedData", "keyMaterial"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var s=Object.defineProperty;var m=Object.getOwnPropertyDescriptor;var v=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var g=(a,r)=>{for(var e in r)s(a,e,{get:r[e],enumerable:!0})},f=(a,r,e,t)=>{if(r&&typeof r=="object"||typeof r=="function")for(let i of v(r))!l.call(a,i)&&i!==e&&s(a,i,{get:()=>r[i],enumerable:!(t=m(r,i))||t.enumerable});return a};var K=a=>f(s({},"__esModule",{value:!0}),a);var b={};g(b,{NobleKeyPair:()=>n});module.exports=K(b);var u=require("@ledgerhq/device-management-kit"),y=require("@noble/curves/nist.js"),p=require("@noble/curves/secp256k1.js"),c=require("../../crypto/CryptoService"),o=require("../../crypto/KeyPair");class n{constructor(r,e,t){this.curve=r;this.privateKey=e;this.publicKey=t}static async generate(r){const e=n.getCurve(r),{secretKey:t,publicKey:i}=e.keygen();return new n(e,t,i)}static from(r,e){const t=n.getCurve(e),i=t.getPublicKey(r);return new n(t,r,i)}static getCurve(r){switch(r){case c.Curve.K256:return p.secp256k1;case c.Curve.P256:return y.p256;default:throw new Error(`Unsupported curve ${r}`)}}async sign(r,e){return this.curve.sign(r,this.privateKey).toBytes(e===o.SigFormat.DER?"der":"compact")}async verify(r,e,t){return this.curve.verify(e,r,this.publicKey,{format:t===o.SigFormat.DER?"der":"compact"})}async deriveSharedSecret(r,e=!0){return this.curve.getSharedSecret(this.privateKey,r,e)}getPublicKey(){return this.publicKey}getPublicKeyToHex(){return(0,u.bufferToHexaString)(this.publicKey,!1)}}0&&(module.exports={NobleKeyPair});
2
- //# sourceMappingURL=NobleKeyPair.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleKeyPair.ts"],
4
- "sourcesContent": ["import { bufferToHexaString } from \"@ledgerhq/device-management-kit\";\nimport type { CurveFn } from \"@noble/curves/abstract/weierstrass.js\";\nimport { p256 } from \"@noble/curves/nist.js\";\nimport { secp256k1 } from \"@noble/curves/secp256k1.js\";\n\nimport { Curve } from \"@api/crypto/CryptoService\";\nimport { type KeyPair, SigFormat } from \"@api/crypto/KeyPair\";\n\nexport class NobleKeyPair implements KeyPair {\n static async generate(curve: Curve): Promise<NobleKeyPair> {\n const curveImpl = NobleKeyPair.getCurve(curve);\n const { secretKey, publicKey } = curveImpl.keygen();\n return new NobleKeyPair(curveImpl, secretKey, publicKey);\n }\n\n static from(privateKey: Uint8Array, curve: Curve): NobleKeyPair {\n const curveImpl = NobleKeyPair.getCurve(curve);\n const publicKey = curveImpl.getPublicKey(privateKey);\n return new NobleKeyPair(curveImpl, privateKey, publicKey);\n }\n\n private static getCurve(curve: Curve): CurveFn {\n switch (curve) {\n case Curve.K256:\n return secp256k1;\n case Curve.P256:\n return p256;\n default:\n throw new Error(`Unsupported curve ${curve}`);\n }\n }\n\n private constructor(\n private curve: CurveFn,\n private privateKey: Uint8Array,\n private publicKey: Uint8Array,\n ) {}\n\n async sign(data: Uint8Array, format?: SigFormat): Promise<Uint8Array> {\n return this.curve\n .sign(data, this.privateKey)\n .toBytes(format === SigFormat.DER ? \"der\" : \"compact\");\n }\n\n async verify(\n data: Uint8Array,\n signature: Uint8Array,\n format?: SigFormat,\n ): Promise<boolean> {\n return this.curve.verify(signature, data, this.publicKey, {\n format: format === SigFormat.DER ? \"der\" : \"compact\",\n });\n }\n\n async deriveSharedSecret(\n peerPublicKey: Uint8Array,\n isCompressed: boolean = true,\n ): Promise<Uint8Array> {\n return this.curve.getSharedSecret(\n this.privateKey,\n peerPublicKey,\n isCompressed,\n );\n }\n\n getPublicKey(): Uint8Array {\n return this.publicKey;\n }\n\n getPublicKeyToHex(): string {\n return bufferToHexaString(this.publicKey, false);\n }\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,kBAAAE,IAAA,eAAAC,EAAAH,GAAA,IAAAI,EAAmC,2CAEnCC,EAAqB,iCACrBC,EAA0B,sCAE1BC,EAAsB,qCACtBC,EAAwC,+BAEjC,MAAMN,CAAgC,CAwBnC,YACEO,EACAC,EACAC,EACR,CAHQ,WAAAF,EACA,gBAAAC,EACA,eAAAC,CACP,CA3BH,aAAa,SAASF,EAAqC,CACzD,MAAMG,EAAYV,EAAa,SAASO,CAAK,EACvC,CAAE,UAAAI,EAAW,UAAAF,CAAU,EAAIC,EAAU,OAAO,EAClD,OAAO,IAAIV,EAAaU,EAAWC,EAAWF,CAAS,CACzD,CAEA,OAAO,KAAKD,EAAwBD,EAA4B,CAC9D,MAAMG,EAAYV,EAAa,SAASO,CAAK,EACvCE,EAAYC,EAAU,aAAaF,CAAU,EACnD,OAAO,IAAIR,EAAaU,EAAWF,EAAYC,CAAS,CAC1D,CAEA,OAAe,SAASF,EAAuB,CAC7C,OAAQA,EAAO,CACb,KAAK,QAAM,KACT,OAAO,YACT,KAAK,QAAM,KACT,OAAO,OACT,QACE,MAAM,IAAI,MAAM,qBAAqBA,CAAK,EAAE,CAChD,CACF,CAQA,MAAM,KAAKK,EAAkBC,EAAyC,CACpE,OAAO,KAAK,MACT,KAAKD,EAAM,KAAK,UAAU,EAC1B,QAAQC,IAAW,YAAU,IAAM,MAAQ,SAAS,CACzD,CAEA,MAAM,OACJD,EACAE,EACAD,EACkB,CAClB,OAAO,KAAK,MAAM,OAAOC,EAAWF,EAAM,KAAK,UAAW,CACxD,OAAQC,IAAW,YAAU,IAAM,MAAQ,SAC7C,CAAC,CACH,CAEA,MAAM,mBACJE,EACAC,EAAwB,GACH,CACrB,OAAO,KAAK,MAAM,gBAChB,KAAK,WACLD,EACAC,CACF,CACF,CAEA,cAA2B,CACzB,OAAO,KAAK,SACd,CAEA,mBAA4B,CAC1B,SAAO,sBAAmB,KAAK,UAAW,EAAK,CACjD,CACF",
6
- "names": ["NobleKeyPair_exports", "__export", "NobleKeyPair", "__toCommonJS", "import_device_management_kit", "import_nist", "import_secp256k1", "import_CryptoService", "import_KeyPair", "curve", "privateKey", "publicKey", "curveImpl", "secretKey", "data", "format", "signature", "peerPublicKey", "isCompressed"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var a=require("../../crypto/CryptoService"),n=require("../../crypto/KeyPair"),r=require("./NobleKeyPair");describe("NobleKeyPair",()=>{const c=new TextEncoder().encode("Test Data");it("should generate a key pair with correct public key",async()=>{const e=(await r.NobleKeyPair.generate(a.Curve.K256)).getPublicKey();expect(e).toBeDefined(),expect(e.byteLength).toBeGreaterThan(0)}),it("should create a key pair from a private key",()=>{const t=new Uint8Array(32).fill(1),e=r.NobleKeyPair.from(t,a.Curve.K256);expect(e.getPublicKey()).toBeDefined()}),it("should sign and verify data correctly",async()=>{const t=await r.NobleKeyPair.generate(a.Curve.K256),e=await t.sign(c),i=await t.verify(c,e);expect(i).toBeTruthy()}),it("should sign and verify data correctly, in DER format",async()=>{const t=await r.NobleKeyPair.generate(a.Curve.K256),e=await t.sign(c,n.SigFormat.DER),i=await t.verify(c,e,n.SigFormat.DER);expect(i).toBeTruthy()}),it("should derive a shared secret with another public key",async()=>{const t=await r.NobleKeyPair.generate(a.Curve.K256),e=await r.NobleKeyPair.generate(a.Curve.K256),i=await t.deriveSharedSecret(e.getPublicKey()),o=await e.deriveSharedSecret(t.getPublicKey());expect(i).toBeDefined(),expect(i.byteLength).toBeGreaterThan(0),expect(i).toStrictEqual(o)}),it("should convert public key to hex string",async()=>{const e=(await r.NobleKeyPair.generate(a.Curve.K256)).getPublicKeyToHex();expect(typeof e).toBe("string"),expect(e.length).toBeGreaterThan(0)})});
2
- //# sourceMappingURL=NobleKeyPair.test.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleKeyPair.test.ts"],
4
- "sourcesContent": ["import { Curve } from \"@api/crypto/CryptoService\";\nimport { SigFormat } from \"@api/crypto/KeyPair\";\n\nimport { NobleKeyPair } from \"./NobleKeyPair\";\n\ndescribe(\"NobleKeyPair\", () => {\n const testData = new TextEncoder().encode(\"Test Data\");\n\n it(\"should generate a key pair with correct public key\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const publicKey = keyPair.getPublicKey();\n expect(publicKey).toBeDefined();\n expect(publicKey.byteLength).toBeGreaterThan(0);\n });\n\n it(\"should create a key pair from a private key\", () => {\n const privateKey = new Uint8Array(32).fill(1);\n const keyPair = NobleKeyPair.from(privateKey, Curve.K256);\n expect(keyPair.getPublicKey()).toBeDefined();\n });\n\n it(\"should sign and verify data correctly\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const signature = await keyPair.sign(testData);\n const isVerified = await keyPair.verify(testData, signature);\n expect(isVerified).toBeTruthy();\n });\n\n it(\"should sign and verify data correctly, in DER format\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const signature = await keyPair.sign(testData, SigFormat.DER);\n const isVerified = await keyPair.verify(testData, signature, SigFormat.DER);\n expect(isVerified).toBeTruthy();\n });\n\n it(\"should derive a shared secret with another public key\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const otherKeyPair = await NobleKeyPair.generate(Curve.K256);\n const sharedSecret1 = await keyPair.deriveSharedSecret(\n otherKeyPair.getPublicKey(),\n );\n const sharedSecret2 = await otherKeyPair.deriveSharedSecret(\n keyPair.getPublicKey(),\n );\n\n expect(sharedSecret1).toBeDefined();\n expect(sharedSecret1.byteLength).toBeGreaterThan(0);\n expect(sharedSecret1).toStrictEqual(sharedSecret2);\n });\n\n it(\"should convert public key to hex string\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const hexPublicKey = keyPair.getPublicKeyToHex();\n expect(typeof hexPublicKey).toBe(\"string\");\n expect(hexPublicKey.length).toBeGreaterThan(0);\n });\n});\n"],
5
- "mappings": "aAAA,IAAAA,EAAsB,qCACtBC,EAA0B,+BAE1BC,EAA6B,0BAE7B,SAAS,eAAgB,IAAM,CAC7B,MAAMC,EAAW,IAAI,YAAY,EAAE,OAAO,WAAW,EAErD,GAAG,qDAAsD,SAAY,CAEnE,MAAMC,GADU,MAAM,eAAa,SAAS,QAAM,IAAI,GAC5B,aAAa,EACvC,OAAOA,CAAS,EAAE,YAAY,EAC9B,OAAOA,EAAU,UAAU,EAAE,gBAAgB,CAAC,CAChD,CAAC,EAED,GAAG,8CAA+C,IAAM,CACtD,MAAMC,EAAa,IAAI,WAAW,EAAE,EAAE,KAAK,CAAC,EACtCC,EAAU,eAAa,KAAKD,EAAY,QAAM,IAAI,EACxD,OAAOC,EAAQ,aAAa,CAAC,EAAE,YAAY,CAC7C,CAAC,EAED,GAAG,wCAAyC,SAAY,CACtD,MAAMA,EAAU,MAAM,eAAa,SAAS,QAAM,IAAI,EAChDC,EAAY,MAAMD,EAAQ,KAAKH,CAAQ,EACvCK,EAAa,MAAMF,EAAQ,OAAOH,EAAUI,CAAS,EAC3D,OAAOC,CAAU,EAAE,WAAW,CAChC,CAAC,EAED,GAAG,uDAAwD,SAAY,CACrE,MAAMF,EAAU,MAAM,eAAa,SAAS,QAAM,IAAI,EAChDC,EAAY,MAAMD,EAAQ,KAAKH,EAAU,YAAU,GAAG,EACtDK,EAAa,MAAMF,EAAQ,OAAOH,EAAUI,EAAW,YAAU,GAAG,EAC1E,OAAOC,CAAU,EAAE,WAAW,CAChC,CAAC,EAED,GAAG,wDAAyD,SAAY,CACtE,MAAMF,EAAU,MAAM,eAAa,SAAS,QAAM,IAAI,EAChDG,EAAe,MAAM,eAAa,SAAS,QAAM,IAAI,EACrDC,EAAgB,MAAMJ,EAAQ,mBAClCG,EAAa,aAAa,CAC5B,EACME,EAAgB,MAAMF,EAAa,mBACvCH,EAAQ,aAAa,CACvB,EAEA,OAAOI,CAAa,EAAE,YAAY,EAClC,OAAOA,EAAc,UAAU,EAAE,gBAAgB,CAAC,EAClD,OAAOA,CAAa,EAAE,cAAcC,CAAa,CACnD,CAAC,EAED,GAAG,0CAA2C,SAAY,CAExD,MAAMC,GADU,MAAM,eAAa,SAAS,QAAM,IAAI,GACzB,kBAAkB,EAC/C,OAAO,OAAOA,CAAY,EAAE,KAAK,QAAQ,EACzC,OAAOA,EAAa,MAAM,EAAE,gBAAgB,CAAC,CAC/C,CAAC,CACH,CAAC",
6
- "names": ["import_CryptoService", "import_KeyPair", "import_NobleKeyPair", "testData", "publicKey", "privateKey", "keyPair", "signature", "isVerified", "otherKeyPair", "sharedSecret1", "sharedSecret2", "hexPublicKey"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var r=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var d=Object.getOwnPropertyNames;var i=Object.prototype.hasOwnProperty;var m=(g,e)=>{for(var o in e)r(g,o,{get:e[o],enumerable:!0})},s=(g,e,o,t)=>{if(e&&typeof e=="object"||typeof e=="function")for(let p of d(e))!i.call(g,p)&&p!==o&&r(g,p,{get:()=>e[p],enumerable:!(t=a(e,p))||t.enumerable});return g};var u=g=>s(r({},"__esModule",{value:!0}),g);var x={};m(x,{LKRPEnv:()=>G});module.exports=u(x);var G=(o=>(o.PROD="prod",o.STAGING="staging",o))(G||{});0&&(module.exports={LKRPEnv});
2
- //# sourceMappingURL=Env.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/model/Env.ts"],
4
- "sourcesContent": ["export enum LKRPEnv {\n PROD = \"prod\",\n STAGING = \"staging\",\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,aAAAE,IAAA,eAAAC,EAAAH,GAAO,IAAKE,OACVA,EAAA,KAAO,OACPA,EAAA,QAAU,UAFAA,OAAA",
6
- "names": ["Env_exports", "__export", "LKRPEnv", "__toCommonJS"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var r=Object.defineProperty;var g=Object.getOwnPropertyDescriptor;var p=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var c=(t,s,e,n)=>{if(s&&typeof s=="object"||typeof s=="function")for(let i of p(s))!a.call(t,i)&&i!==e&&r(t,i,{get:()=>s[i],enumerable:!(n=g(s,i))||n.enumerable});return t};var o=t=>c(r({},"__esModule",{value:!0}),t);var h={};module.exports=o(h);
2
- //# sourceMappingURL=JWT.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/model/JWT.ts"],
4
- "sourcesContent": ["export type JWT = {\n access_token: string;\n permissions: {\n [trustchainId: string]: {\n [path: string]: string[];\n };\n };\n};\n"],
5
- "mappings": "+WAAA,IAAAA,EAAA,kBAAAC,EAAAD",
6
- "names": ["JWT_exports", "__toCommonJS"]
7
- }
@@ -1,2 +0,0 @@
1
- "use strict";var E=Object.defineProperty;var R=Object.getOwnPropertyDescriptor;var x=Object.getOwnPropertyNames;var O=Object.prototype.hasOwnProperty;var p=(N,C)=>{for(var A in C)E(N,A,{get:C[A],enumerable:!0})},t=(N,C,A,_)=>{if(C&&typeof C=="object"||typeof C=="function")for(let f of x(C))!O.call(N,f)&&f!==A&&E(N,f,{get:()=>C[f],enumerable:!(_=R(C,f))||_.enumerable});return N};var u=N=>t(E({},"__esModule",{value:!0}),N);var B={};p(B,{Permissions:()=>D});module.exports=u(B);var D=(f=>(f[f.OWNER=4294967295]="OWNER",f[f.CAN_ENCRYPT=1]="CAN_ENCRYPT",f[f.CAN_DERIVE=2]="CAN_DERIVE",f[f.CAN_ADD_BLOCK=4]="CAN_ADD_BLOCK",f))(D||{});0&&(module.exports={Permissions});
2
- //# sourceMappingURL=Permissions.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/model/Permissions.ts"],
4
- "sourcesContent": ["/**\n * https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/5865144361/ARCH+LKRP+-+v2+specifications#Member-permissions\n */\nexport enum Permissions {\n OWNER = 0xffffffff, // Owners of the stream have access to everything\n CAN_ENCRYPT = 1, // The member can have access to the stream private key\n CAN_DERIVE = 1 << 1, // The member can have access to the stream chain code (if a member have access to the private key and the chain code it is able to derive sub-streams)\n CAN_ADD_BLOCK = 1 << 2, // The member is authorized to issue blocks in the current stream\n}\n"],
5
- "mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iBAAAE,IAAA,eAAAC,EAAAH,GAGO,IAAKE,OACVA,IAAA,MAAQ,YAAR,QACAA,IAAA,YAAc,GAAd,cACAA,IAAA,WAAa,GAAb,aACAA,IAAA,cAAgB,GAAhB,gBAJUA,OAAA",
6
- "names": ["Permissions_exports", "__export", "Permissions", "__toCommonJS"]
7
- }
@@ -1,2 +0,0 @@
1
- var t=(e=>(e[e.K256=0]="K256",e[e.P256=1]="P256",e))(t||{}),y=(r=>(r[r.AES256_GCM=0]="AES256_GCM",r))(y||{}),a=(r=>(r[r.SHA256=0]="SHA256",r))(a||{});export{t as Curve,y as EncryptionAlgo,a as HashAlgo};
2
- //# sourceMappingURL=CryptoService.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/crypto/CryptoService.ts"],
4
- "sourcesContent": ["import { type Key } from \"./Key\";\nimport { type KeyPair } from \"./KeyPair\";\n\nexport enum Curve {\n K256, // secp256k1\n P256, // P-256\n}\n\nexport enum EncryptionAlgo {\n AES256_GCM,\n}\n\nexport enum HashAlgo {\n SHA256,\n}\n\nexport interface CryptoService {\n // Generate a random buffer\n randomBytes(len: number): Uint8Array;\n\n // Compute a hash\n hash(bytes: Uint8Array, algo: HashAlgo): Uint8Array;\n\n // Compute a HMAC\n hmac(key: Uint8Array, message: Uint8Array, algo: HashAlgo): Uint8Array;\n\n // Generate a new random keypair\n createKeyPair(curve: Curve): Promise<KeyPair>;\n\n // Import a keypair\n importKeyPair(privateKey: Uint8Array, curve: Curve): KeyPair;\n\n // Generate a new random symmetric key\n createSymmetricKey(algo: EncryptionAlgo): Promise<Key>;\n\n // Import a symmetric key\n importSymmetricKey(keyMaterial: Uint8Array, algo: EncryptionAlgo): Key;\n}\n"],
5
- "mappings": "AAGO,IAAKA,OACVA,IAAA,eACAA,IAAA,eAFUA,OAAA,IAKAC,OACVA,IAAA,2BADUA,OAAA,IAIAC,OACVA,IAAA,mBADUA,OAAA",
6
- "names": ["Curve", "EncryptionAlgo", "HashAlgo"]
7
- }
@@ -1,2 +0,0 @@
1
- const r=32,t=16;export{t as AES256_BLOCK_SIZE,r as AES256_KEY_SIZE};
2
- //# sourceMappingURL=Key.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/crypto/Key.ts"],
4
- "sourcesContent": ["export const AES256_KEY_SIZE = 32;\nexport const AES256_BLOCK_SIZE = 16;\n\nexport interface Key {\n encrypt(iv: Uint8Array, data: Uint8Array): Promise<Uint8Array>;\n decrypt(iv: Uint8Array, encryptedData: Uint8Array): Promise<Uint8Array>;\n}\n"],
5
- "mappings": "AAAO,MAAMA,EAAkB,GAClBC,EAAoB",
6
- "names": ["AES256_KEY_SIZE", "AES256_BLOCK_SIZE"]
7
- }
@@ -1,2 +0,0 @@
1
- var e=(r=>(r[r.COMPACT=0]="COMPACT",r[r.DER=1]="DER",r))(e||{});export{e as SigFormat};
2
- //# sourceMappingURL=KeyPair.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/crypto/KeyPair.ts"],
4
- "sourcesContent": ["export enum SigFormat {\n COMPACT,\n DER,\n}\n\nexport interface KeyPair {\n sign(data: Uint8Array, format?: SigFormat): Promise<Uint8Array>;\n verify(\n data: Uint8Array,\n signature: Uint8Array,\n format?: SigFormat,\n ): Promise<boolean>;\n deriveSharedSecret(peerPublicKey: Uint8Array): Promise<Uint8Array>;\n getPublicKey(): Uint8Array;\n getPublicKeyToHex(): string;\n}\n"],
5
- "mappings": "AAAO,IAAKA,OACVA,IAAA,qBACAA,IAAA,aAFUA,OAAA",
6
- "names": ["SigFormat"]
7
- }
@@ -1,2 +0,0 @@
1
- import{randomBytes as m}from"@noble/ciphers/webcrypto";import{hmac as n}from"@noble/hashes/hmac";import{sha256 as o}from"@noble/hashes/sha256";import{HashAlgo as i}from"../../crypto/CryptoService";import{NobleKey as a}from"./NobleKey";import{NobleKeyPair as y}from"./NobleKeyPair";class f{randomBytes(r){return m(r)}hash(r,e){switch(e){case i.SHA256:return o(r);default:throw new Error("Unsupported hash algorithm",e)}}hmac(r,e,t){switch(t){case i.SHA256:return n(o,r,e);default:throw new Error("Unsupported hash algorithm",t)}}async createKeyPair(r){return await y.generate(r)}importKeyPair(r,e){return y.from(r,e)}async createSymmetricKey(r){return await a.generate(r)}importSymmetricKey(r,e){return a.from(r,e)}}export{f as NobleCryptoService};
2
- //# sourceMappingURL=NobleCryptoService.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleCryptoService.ts"],
4
- "sourcesContent": ["import { randomBytes } from \"@noble/ciphers/webcrypto\";\nimport { hmac } from \"@noble/hashes/hmac\";\nimport { sha256 } from \"@noble/hashes/sha256\";\n\nimport {\n type CryptoService,\n type Curve,\n type EncryptionAlgo,\n HashAlgo,\n} from \"@api/crypto/CryptoService\";\nimport { type Key } from \"@api/crypto/Key\";\nimport { type KeyPair } from \"@api/crypto/KeyPair\";\n\nimport { NobleKey } from \"./NobleKey\";\nimport { NobleKeyPair } from \"./NobleKeyPair\";\n\nexport class NobleCryptoService implements CryptoService {\n randomBytes(len: number): Uint8Array {\n return randomBytes(len);\n }\n\n hash(bytes: Uint8Array, algo: HashAlgo): Uint8Array {\n switch (algo) {\n case HashAlgo.SHA256:\n return sha256(bytes);\n default:\n throw new Error(\"Unsupported hash algorithm\", algo);\n }\n }\n\n hmac(key: Uint8Array, message: Uint8Array, algo: HashAlgo): Uint8Array {\n switch (algo) {\n case HashAlgo.SHA256:\n return hmac(sha256, key, message);\n default:\n throw new Error(\"Unsupported hash algorithm\", algo);\n }\n }\n\n async createKeyPair(curve: Curve): Promise<KeyPair> {\n return await NobleKeyPair.generate(curve);\n }\n\n importKeyPair(privateKey: Uint8Array, curve: Curve): KeyPair {\n return NobleKeyPair.from(privateKey, curve);\n }\n\n async createSymmetricKey(algo: EncryptionAlgo): Promise<Key> {\n return await NobleKey.generate(algo);\n }\n\n importSymmetricKey(keyMaterial: Uint8Array, algo: EncryptionAlgo): Key {\n return NobleKey.from(keyMaterial, algo);\n }\n}\n"],
5
- "mappings": "AAAA,OAAS,eAAAA,MAAmB,2BAC5B,OAAS,QAAAC,MAAY,qBACrB,OAAS,UAAAC,MAAc,uBAEvB,OAIE,YAAAC,MACK,4BAIP,OAAS,YAAAC,MAAgB,aACzB,OAAS,gBAAAC,MAAoB,iBAEtB,MAAMC,CAA4C,CACvD,YAAYC,EAAyB,CACnC,OAAOP,EAAYO,CAAG,CACxB,CAEA,KAAKC,EAAmBC,EAA4B,CAClD,OAAQA,EAAM,CACZ,KAAKN,EAAS,OACZ,OAAOD,EAAOM,CAAK,EACrB,QACE,MAAM,IAAI,MAAM,6BAA8BC,CAAI,CACtD,CACF,CAEA,KAAKC,EAAiBC,EAAqBF,EAA4B,CACrE,OAAQA,EAAM,CACZ,KAAKN,EAAS,OACZ,OAAOF,EAAKC,EAAQQ,EAAKC,CAAO,EAClC,QACE,MAAM,IAAI,MAAM,6BAA8BF,CAAI,CACtD,CACF,CAEA,MAAM,cAAcG,EAAgC,CAClD,OAAO,MAAMP,EAAa,SAASO,CAAK,CAC1C,CAEA,cAAcC,EAAwBD,EAAuB,CAC3D,OAAOP,EAAa,KAAKQ,EAAYD,CAAK,CAC5C,CAEA,MAAM,mBAAmBH,EAAoC,CAC3D,OAAO,MAAML,EAAS,SAASK,CAAI,CACrC,CAEA,mBAAmBK,EAAyBL,EAA2B,CACrE,OAAOL,EAAS,KAAKU,EAAaL,CAAI,CACxC,CACF",
6
- "names": ["randomBytes", "hmac", "sha256", "HashAlgo", "NobleKey", "NobleKeyPair", "NobleCryptoService", "len", "bytes", "algo", "key", "message", "curve", "privateKey", "keyMaterial"]
7
- }
@@ -1,2 +0,0 @@
1
- import{hexaStringToBuffer as r}from"@ledgerhq/device-management-kit";import{Curve as c,EncryptionAlgo as a,HashAlgo as i}from"../../crypto/CryptoService";import{NobleCryptoService as l}from"./NobleCryptoService";import{NobleKey as n}from"./NobleKey";import{NobleKeyPair as s}from"./NobleKeyPair";describe("NobleCryptoService",()=>{let o;beforeEach(()=>{o=new l}),it("should generate random bytes of correct length",()=>{const t=o.randomBytes(32);expect(t.length).toBe(32)}),it("should hash data correctly with SHA256",()=>{const e=new TextEncoder().encode("test"),t=o.hash(e,i.SHA256);expect(t).toEqual(r("9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08"))}),it("should compute HMAC correctly with SHA256",()=>{const e=new Uint8Array(32).fill(97),t=new TextEncoder().encode("test message"),y=o.hmac(e,t,i.SHA256);expect(y).toEqual(r("0b19ad8fef1660f7a191465effeea922079633ada962f52cb60103d9935cc460"))}),it("should create a key pair",async()=>{const e=await o.createKeyPair(c.K256);expect(e instanceof s).toBeTruthy()}),it("should import a key pair",()=>{const e=new Uint8Array(32).fill(1),t=o.importKeyPair(e,c.K256);expect(t instanceof s).toBeTruthy()}),it("should create a symmetric key",async()=>{const e=await o.createSymmetricKey(a.AES256_GCM);expect(e instanceof n).toBeTruthy()}),it("should import a symmetric key",()=>{const e=new Uint8Array(32).fill(1),t=o.importSymmetricKey(e,a.AES256_GCM);expect(t instanceof n).toBeTruthy()})});
2
- //# sourceMappingURL=NobleCryptoService.test.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleCryptoService.test.ts"],
4
- "sourcesContent": ["import { hexaStringToBuffer } from \"@ledgerhq/device-management-kit\";\n\nimport { Curve, EncryptionAlgo, HashAlgo } from \"@api/crypto/CryptoService\";\n\nimport { NobleCryptoService } from \"./NobleCryptoService\";\nimport { NobleKey } from \"./NobleKey\";\nimport { NobleKeyPair } from \"./NobleKeyPair\";\n\ndescribe(\"NobleCryptoService\", () => {\n let cryptoService: NobleCryptoService;\n\n beforeEach(() => {\n cryptoService = new NobleCryptoService();\n });\n\n it(\"should generate random bytes of correct length\", () => {\n const length = 32;\n const bytes = cryptoService.randomBytes(length);\n expect(bytes.length).toBe(length);\n });\n\n it(\"should hash data correctly with SHA256\", () => {\n const data = new TextEncoder().encode(\"test\");\n const hashResult = cryptoService.hash(data, HashAlgo.SHA256);\n expect(hashResult).toEqual(\n hexaStringToBuffer(\n \"9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08\",\n )!,\n );\n });\n\n it(\"should compute HMAC correctly with SHA256\", () => {\n const key = new Uint8Array(32).fill(0x61);\n const message = new TextEncoder().encode(\"test message\");\n const hmacResult = cryptoService.hmac(key, message, HashAlgo.SHA256);\n expect(hmacResult).toEqual(\n hexaStringToBuffer(\n \"0b19ad8fef1660f7a191465effeea922079633ada962f52cb60103d9935cc460\",\n )!,\n );\n });\n\n it(\"should create a key pair\", async () => {\n const keyPair = await cryptoService.createKeyPair(Curve.K256);\n expect(keyPair instanceof NobleKeyPair).toBeTruthy();\n });\n\n it(\"should import a key pair\", () => {\n const privateKey = new Uint8Array(32).fill(1);\n const keyPair = cryptoService.importKeyPair(privateKey, Curve.K256);\n expect(keyPair instanceof NobleKeyPair).toBeTruthy();\n });\n\n it(\"should create a symmetric key\", async () => {\n const symmetricKey = await cryptoService.createSymmetricKey(\n EncryptionAlgo.AES256_GCM,\n );\n expect(symmetricKey instanceof NobleKey).toBeTruthy();\n });\n\n it(\"should import a symmetric key\", () => {\n const keyMaterial = new Uint8Array(32).fill(1);\n const symmetricKey = cryptoService.importSymmetricKey(\n keyMaterial,\n EncryptionAlgo.AES256_GCM,\n );\n expect(symmetricKey instanceof NobleKey).toBeTruthy();\n });\n});\n"],
5
- "mappings": "AAAA,OAAS,sBAAAA,MAA0B,kCAEnC,OAAS,SAAAC,EAAO,kBAAAC,EAAgB,YAAAC,MAAgB,4BAEhD,OAAS,sBAAAC,MAA0B,uBACnC,OAAS,YAAAC,MAAgB,aACzB,OAAS,gBAAAC,MAAoB,iBAE7B,SAAS,qBAAsB,IAAM,CACnC,IAAIC,EAEJ,WAAW,IAAM,CACfA,EAAgB,IAAIH,CACtB,CAAC,EAED,GAAG,iDAAkD,IAAM,CAEzD,MAAMI,EAAQD,EAAc,YAAY,EAAM,EAC9C,OAAOC,EAAM,MAAM,EAAE,KAAK,EAAM,CAClC,CAAC,EAED,GAAG,yCAA0C,IAAM,CACjD,MAAMC,EAAO,IAAI,YAAY,EAAE,OAAO,MAAM,EACtCC,EAAaH,EAAc,KAAKE,EAAMN,EAAS,MAAM,EAC3D,OAAOO,CAAU,EAAE,QACjBV,EACE,kEACF,CACF,CACF,CAAC,EAED,GAAG,4CAA6C,IAAM,CACpD,MAAMW,EAAM,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EAClCC,EAAU,IAAI,YAAY,EAAE,OAAO,cAAc,EACjDC,EAAaN,EAAc,KAAKI,EAAKC,EAAST,EAAS,MAAM,EACnE,OAAOU,CAAU,EAAE,QACjBb,EACE,kEACF,CACF,CACF,CAAC,EAED,GAAG,2BAA4B,SAAY,CACzC,MAAMc,EAAU,MAAMP,EAAc,cAAcN,EAAM,IAAI,EAC5D,OAAOa,aAAmBR,CAAY,EAAE,WAAW,CACrD,CAAC,EAED,GAAG,2BAA4B,IAAM,CACnC,MAAMS,EAAa,IAAI,WAAW,EAAE,EAAE,KAAK,CAAC,EACtCD,EAAUP,EAAc,cAAcQ,EAAYd,EAAM,IAAI,EAClE,OAAOa,aAAmBR,CAAY,EAAE,WAAW,CACrD,CAAC,EAED,GAAG,gCAAiC,SAAY,CAC9C,MAAMU,EAAe,MAAMT,EAAc,mBACvCL,EAAe,UACjB,EACA,OAAOc,aAAwBX,CAAQ,EAAE,WAAW,CACtD,CAAC,EAED,GAAG,gCAAiC,IAAM,CACxC,MAAMY,EAAc,IAAI,WAAW,EAAE,EAAE,KAAK,CAAC,EACvCD,EAAeT,EAAc,mBACjCU,EACAf,EAAe,UACjB,EACA,OAAOc,aAAwBX,CAAQ,EAAE,WAAW,CACtD,CAAC,CACH,CAAC",
6
- "names": ["hexaStringToBuffer", "Curve", "EncryptionAlgo", "HashAlgo", "NobleCryptoService", "NobleKey", "NobleKeyPair", "cryptoService", "bytes", "data", "hashResult", "key", "message", "hmacResult", "keyPair", "privateKey", "symmetricKey", "keyMaterial"]
7
- }
@@ -1,2 +0,0 @@
1
- import{gcm as i}from"@noble/ciphers/aes";import{randomBytes as c}from"@noble/ciphers/webcrypto";import{EncryptionAlgo as e}from"../../crypto/CryptoService";import{AES256_BLOCK_SIZE as o,AES256_KEY_SIZE as p}from"../../crypto/Key";class n{constructor(r){this.key=r}static async generate(r=e.AES256_GCM){if(r!==e.AES256_GCM)throw new Error(`Unsupported encryption algorithm ${r}`);return new n(c(p))}static from(r,t=e.AES256_GCM){if(t!==e.AES256_GCM)throw new Error(`Unsupported encryption algorithm ${t}`);return new n(r)}async encrypt(r,t){return i(this.key,r.slice(0,o)).encrypt(t)}async decrypt(r,t){return i(this.key,r.slice(0,o)).decrypt(t)}}export{n as NobleKey};
2
- //# sourceMappingURL=NobleKey.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleKey.ts"],
4
- "sourcesContent": ["import { gcm } from \"@noble/ciphers/aes\";\nimport { randomBytes } from \"@noble/ciphers/webcrypto\";\n\nimport { EncryptionAlgo } from \"@api/crypto/CryptoService\";\nimport { AES256_BLOCK_SIZE, AES256_KEY_SIZE, type Key } from \"@api/crypto/Key\";\n\nexport class NobleKey implements Key {\n static async generate(\n algo: EncryptionAlgo = EncryptionAlgo.AES256_GCM,\n ): Promise<NobleKey> {\n if (algo !== EncryptionAlgo.AES256_GCM) {\n throw new Error(`Unsupported encryption algorithm ${algo}`);\n }\n return new NobleKey(randomBytes(AES256_KEY_SIZE));\n }\n\n static from(\n keyMaterial: Uint8Array,\n algo: EncryptionAlgo = EncryptionAlgo.AES256_GCM,\n ): NobleKey {\n if (algo !== EncryptionAlgo.AES256_GCM) {\n throw new Error(`Unsupported encryption algorithm ${algo}`);\n }\n return new NobleKey(keyMaterial);\n }\n\n private constructor(private key: Uint8Array) {}\n\n async encrypt(iv: Uint8Array, data: Uint8Array): Promise<Uint8Array> {\n const cipher = gcm(this.key, iv.slice(0, AES256_BLOCK_SIZE));\n return cipher.encrypt(data);\n }\n\n async decrypt(\n iv: Uint8Array,\n encryptedData: Uint8Array,\n ): Promise<Uint8Array> {\n const cipher = gcm(this.key, iv.slice(0, AES256_BLOCK_SIZE));\n return cipher.decrypt(encryptedData);\n }\n}\n"],
5
- "mappings": "AAAA,OAAS,OAAAA,MAAW,qBACpB,OAAS,eAAAC,MAAmB,2BAE5B,OAAS,kBAAAC,MAAsB,4BAC/B,OAAS,qBAAAC,EAAmB,mBAAAC,MAAiC,kBAEtD,MAAMC,CAAwB,CAoB3B,YAAoBC,EAAiB,CAAjB,SAAAA,CAAkB,CAnB9C,aAAa,SACXC,EAAuBL,EAAe,WACnB,CACnB,GAAIK,IAASL,EAAe,WAC1B,MAAM,IAAI,MAAM,oCAAoCK,CAAI,EAAE,EAE5D,OAAO,IAAIF,EAASJ,EAAYG,CAAe,CAAC,CAClD,CAEA,OAAO,KACLI,EACAD,EAAuBL,EAAe,WAC5B,CACV,GAAIK,IAASL,EAAe,WAC1B,MAAM,IAAI,MAAM,oCAAoCK,CAAI,EAAE,EAE5D,OAAO,IAAIF,EAASG,CAAW,CACjC,CAIA,MAAM,QAAQC,EAAgBC,EAAuC,CAEnE,OADeV,EAAI,KAAK,IAAKS,EAAG,MAAM,EAAGN,CAAiB,CAAC,EAC7C,QAAQO,CAAI,CAC5B,CAEA,MAAM,QACJD,EACAE,EACqB,CAErB,OADeX,EAAI,KAAK,IAAKS,EAAG,MAAM,EAAGN,CAAiB,CAAC,EAC7C,QAAQQ,CAAa,CACrC,CACF",
6
- "names": ["gcm", "randomBytes", "EncryptionAlgo", "AES256_BLOCK_SIZE", "AES256_KEY_SIZE", "NobleKey", "key", "algo", "keyMaterial", "iv", "data", "encryptedData"]
7
- }
@@ -1,2 +0,0 @@
1
- import{AES256_BLOCK_SIZE as r,AES256_KEY_SIZE as i}from"../../crypto/Key";import{NobleKey as o}from"./NobleKey";describe("NobleKey",()=>{const t=new TextEncoder().encode("Test Data");it("should encrypt and decrypt data correctly",async()=>{const c=await o.generate(),e=new Uint8Array(r).fill(2),a=await c.encrypt(e,t),n=await c.decrypt(e,a);expect(a).not.toEqual(t),expect(n).toEqual(t)}),it("should encrypt and decrypt data from key material",async()=>{const c=new Uint8Array(i).fill(1),e=o.from(c),a=new Uint8Array(r).fill(2),n=await e.encrypt(a,t),y=await e.decrypt(a,n);expect(n).not.toEqual(t),expect(y).toEqual(t)})});
2
- //# sourceMappingURL=NobleKey.test.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleKey.test.ts"],
4
- "sourcesContent": ["import { AES256_BLOCK_SIZE, AES256_KEY_SIZE } from \"@api/crypto/Key\";\n\nimport { NobleKey } from \"./NobleKey\";\n\ndescribe(\"NobleKey\", () => {\n const testData = new TextEncoder().encode(\"Test Data\");\n\n it(\"should encrypt and decrypt data correctly\", async () => {\n const key = await NobleKey.generate();\n const iv = new Uint8Array(AES256_BLOCK_SIZE).fill(0x02);\n const encryptedData = await key.encrypt(iv, testData);\n const decryptedData = await key.decrypt(iv, encryptedData);\n\n expect(encryptedData).not.toEqual(testData);\n expect(decryptedData).toEqual(testData);\n });\n\n it(\"should encrypt and decrypt data from key material\", async () => {\n const keyMaterial = new Uint8Array(AES256_KEY_SIZE).fill(0x01);\n const key = NobleKey.from(keyMaterial);\n const iv = new Uint8Array(AES256_BLOCK_SIZE).fill(0x02);\n const encryptedData = await key.encrypt(iv, testData);\n const decryptedData = await key.decrypt(iv, encryptedData);\n\n expect(encryptedData).not.toEqual(testData);\n expect(decryptedData).toEqual(testData);\n });\n});\n"],
5
- "mappings": "AAAA,OAAS,qBAAAA,EAAmB,mBAAAC,MAAuB,kBAEnD,OAAS,YAAAC,MAAgB,aAEzB,SAAS,WAAY,IAAM,CACzB,MAAMC,EAAW,IAAI,YAAY,EAAE,OAAO,WAAW,EAErD,GAAG,4CAA6C,SAAY,CAC1D,MAAMC,EAAM,MAAMF,EAAS,SAAS,EAC9BG,EAAK,IAAI,WAAWL,CAAiB,EAAE,KAAK,CAAI,EAChDM,EAAgB,MAAMF,EAAI,QAAQC,EAAIF,CAAQ,EAC9CI,EAAgB,MAAMH,EAAI,QAAQC,EAAIC,CAAa,EAEzD,OAAOA,CAAa,EAAE,IAAI,QAAQH,CAAQ,EAC1C,OAAOI,CAAa,EAAE,QAAQJ,CAAQ,CACxC,CAAC,EAED,GAAG,oDAAqD,SAAY,CAClE,MAAMK,EAAc,IAAI,WAAWP,CAAe,EAAE,KAAK,CAAI,EACvDG,EAAMF,EAAS,KAAKM,CAAW,EAC/BH,EAAK,IAAI,WAAWL,CAAiB,EAAE,KAAK,CAAI,EAChDM,EAAgB,MAAMF,EAAI,QAAQC,EAAIF,CAAQ,EAC9CI,EAAgB,MAAMH,EAAI,QAAQC,EAAIC,CAAa,EAEzD,OAAOA,CAAa,EAAE,IAAI,QAAQH,CAAQ,EAC1C,OAAOI,CAAa,EAAE,QAAQJ,CAAQ,CACxC,CAAC,CACH,CAAC",
6
- "names": ["AES256_BLOCK_SIZE", "AES256_KEY_SIZE", "NobleKey", "testData", "key", "iv", "encryptedData", "decryptedData", "keyMaterial"]
7
- }
@@ -1,2 +0,0 @@
1
- import{bufferToHexaString as c}from"@ledgerhq/device-management-kit";import{p256 as o}from"@noble/curves/nist.js";import{secp256k1 as u}from"@noble/curves/secp256k1.js";import{Curve as n}from"../../crypto/CryptoService";import{SigFormat as s}from"../../crypto/KeyPair";class i{constructor(r,e,t){this.curve=r;this.privateKey=e;this.publicKey=t}static async generate(r){const e=i.getCurve(r),{secretKey:t,publicKey:a}=e.keygen();return new i(e,t,a)}static from(r,e){const t=i.getCurve(e),a=t.getPublicKey(r);return new i(t,r,a)}static getCurve(r){switch(r){case n.K256:return u;case n.P256:return o;default:throw new Error(`Unsupported curve ${r}`)}}async sign(r,e){return this.curve.sign(r,this.privateKey).toBytes(e===s.DER?"der":"compact")}async verify(r,e,t){return this.curve.verify(e,r,this.publicKey,{format:t===s.DER?"der":"compact"})}async deriveSharedSecret(r,e=!0){return this.curve.getSharedSecret(this.privateKey,r,e)}getPublicKey(){return this.publicKey}getPublicKeyToHex(){return c(this.publicKey,!1)}}export{i as NobleKeyPair};
2
- //# sourceMappingURL=NobleKeyPair.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleKeyPair.ts"],
4
- "sourcesContent": ["import { bufferToHexaString } from \"@ledgerhq/device-management-kit\";\nimport type { CurveFn } from \"@noble/curves/abstract/weierstrass.js\";\nimport { p256 } from \"@noble/curves/nist.js\";\nimport { secp256k1 } from \"@noble/curves/secp256k1.js\";\n\nimport { Curve } from \"@api/crypto/CryptoService\";\nimport { type KeyPair, SigFormat } from \"@api/crypto/KeyPair\";\n\nexport class NobleKeyPair implements KeyPair {\n static async generate(curve: Curve): Promise<NobleKeyPair> {\n const curveImpl = NobleKeyPair.getCurve(curve);\n const { secretKey, publicKey } = curveImpl.keygen();\n return new NobleKeyPair(curveImpl, secretKey, publicKey);\n }\n\n static from(privateKey: Uint8Array, curve: Curve): NobleKeyPair {\n const curveImpl = NobleKeyPair.getCurve(curve);\n const publicKey = curveImpl.getPublicKey(privateKey);\n return new NobleKeyPair(curveImpl, privateKey, publicKey);\n }\n\n private static getCurve(curve: Curve): CurveFn {\n switch (curve) {\n case Curve.K256:\n return secp256k1;\n case Curve.P256:\n return p256;\n default:\n throw new Error(`Unsupported curve ${curve}`);\n }\n }\n\n private constructor(\n private curve: CurveFn,\n private privateKey: Uint8Array,\n private publicKey: Uint8Array,\n ) {}\n\n async sign(data: Uint8Array, format?: SigFormat): Promise<Uint8Array> {\n return this.curve\n .sign(data, this.privateKey)\n .toBytes(format === SigFormat.DER ? \"der\" : \"compact\");\n }\n\n async verify(\n data: Uint8Array,\n signature: Uint8Array,\n format?: SigFormat,\n ): Promise<boolean> {\n return this.curve.verify(signature, data, this.publicKey, {\n format: format === SigFormat.DER ? \"der\" : \"compact\",\n });\n }\n\n async deriveSharedSecret(\n peerPublicKey: Uint8Array,\n isCompressed: boolean = true,\n ): Promise<Uint8Array> {\n return this.curve.getSharedSecret(\n this.privateKey,\n peerPublicKey,\n isCompressed,\n );\n }\n\n getPublicKey(): Uint8Array {\n return this.publicKey;\n }\n\n getPublicKeyToHex(): string {\n return bufferToHexaString(this.publicKey, false);\n }\n}\n"],
5
- "mappings": "AAAA,OAAS,sBAAAA,MAA0B,kCAEnC,OAAS,QAAAC,MAAY,wBACrB,OAAS,aAAAC,MAAiB,6BAE1B,OAAS,SAAAC,MAAa,4BACtB,OAAuB,aAAAC,MAAiB,sBAEjC,MAAMC,CAAgC,CAwBnC,YACEC,EACAC,EACAC,EACR,CAHQ,WAAAF,EACA,gBAAAC,EACA,eAAAC,CACP,CA3BH,aAAa,SAASF,EAAqC,CACzD,MAAMG,EAAYJ,EAAa,SAASC,CAAK,EACvC,CAAE,UAAAI,EAAW,UAAAF,CAAU,EAAIC,EAAU,OAAO,EAClD,OAAO,IAAIJ,EAAaI,EAAWC,EAAWF,CAAS,CACzD,CAEA,OAAO,KAAKD,EAAwBD,EAA4B,CAC9D,MAAMG,EAAYJ,EAAa,SAASC,CAAK,EACvCE,EAAYC,EAAU,aAAaF,CAAU,EACnD,OAAO,IAAIF,EAAaI,EAAWF,EAAYC,CAAS,CAC1D,CAEA,OAAe,SAASF,EAAuB,CAC7C,OAAQA,EAAO,CACb,KAAKH,EAAM,KACT,OAAOD,EACT,KAAKC,EAAM,KACT,OAAOF,EACT,QACE,MAAM,IAAI,MAAM,qBAAqBK,CAAK,EAAE,CAChD,CACF,CAQA,MAAM,KAAKK,EAAkBC,EAAyC,CACpE,OAAO,KAAK,MACT,KAAKD,EAAM,KAAK,UAAU,EAC1B,QAAQC,IAAWR,EAAU,IAAM,MAAQ,SAAS,CACzD,CAEA,MAAM,OACJO,EACAE,EACAD,EACkB,CAClB,OAAO,KAAK,MAAM,OAAOC,EAAWF,EAAM,KAAK,UAAW,CACxD,OAAQC,IAAWR,EAAU,IAAM,MAAQ,SAC7C,CAAC,CACH,CAEA,MAAM,mBACJU,EACAC,EAAwB,GACH,CACrB,OAAO,KAAK,MAAM,gBAChB,KAAK,WACLD,EACAC,CACF,CACF,CAEA,cAA2B,CACzB,OAAO,KAAK,SACd,CAEA,mBAA4B,CAC1B,OAAOf,EAAmB,KAAK,UAAW,EAAK,CACjD,CACF",
6
- "names": ["bufferToHexaString", "p256", "secp256k1", "Curve", "SigFormat", "NobleKeyPair", "curve", "privateKey", "publicKey", "curveImpl", "secretKey", "data", "format", "signature", "peerPublicKey", "isCompressed"]
7
- }
@@ -1,2 +0,0 @@
1
- import{Curve as r}from"../../crypto/CryptoService";import{SigFormat as n}from"../../crypto/KeyPair";import{NobleKeyPair as i}from"./NobleKeyPair";describe("NobleKeyPair",()=>{const c=new TextEncoder().encode("Test Data");it("should generate a key pair with correct public key",async()=>{const e=(await i.generate(r.K256)).getPublicKey();expect(e).toBeDefined(),expect(e.byteLength).toBeGreaterThan(0)}),it("should create a key pair from a private key",()=>{const t=new Uint8Array(32).fill(1),e=i.from(t,r.K256);expect(e.getPublicKey()).toBeDefined()}),it("should sign and verify data correctly",async()=>{const t=await i.generate(r.K256),e=await t.sign(c),a=await t.verify(c,e);expect(a).toBeTruthy()}),it("should sign and verify data correctly, in DER format",async()=>{const t=await i.generate(r.K256),e=await t.sign(c,n.DER),a=await t.verify(c,e,n.DER);expect(a).toBeTruthy()}),it("should derive a shared secret with another public key",async()=>{const t=await i.generate(r.K256),e=await i.generate(r.K256),a=await t.deriveSharedSecret(e.getPublicKey()),o=await e.deriveSharedSecret(t.getPublicKey());expect(a).toBeDefined(),expect(a.byteLength).toBeGreaterThan(0),expect(a).toStrictEqual(o)}),it("should convert public key to hex string",async()=>{const e=(await i.generate(r.K256)).getPublicKeyToHex();expect(typeof e).toBe("string"),expect(e.length).toBeGreaterThan(0)})});
2
- //# sourceMappingURL=NobleKeyPair.test.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../../src/api/crypto/noble/NobleKeyPair.test.ts"],
4
- "sourcesContent": ["import { Curve } from \"@api/crypto/CryptoService\";\nimport { SigFormat } from \"@api/crypto/KeyPair\";\n\nimport { NobleKeyPair } from \"./NobleKeyPair\";\n\ndescribe(\"NobleKeyPair\", () => {\n const testData = new TextEncoder().encode(\"Test Data\");\n\n it(\"should generate a key pair with correct public key\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const publicKey = keyPair.getPublicKey();\n expect(publicKey).toBeDefined();\n expect(publicKey.byteLength).toBeGreaterThan(0);\n });\n\n it(\"should create a key pair from a private key\", () => {\n const privateKey = new Uint8Array(32).fill(1);\n const keyPair = NobleKeyPair.from(privateKey, Curve.K256);\n expect(keyPair.getPublicKey()).toBeDefined();\n });\n\n it(\"should sign and verify data correctly\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const signature = await keyPair.sign(testData);\n const isVerified = await keyPair.verify(testData, signature);\n expect(isVerified).toBeTruthy();\n });\n\n it(\"should sign and verify data correctly, in DER format\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const signature = await keyPair.sign(testData, SigFormat.DER);\n const isVerified = await keyPair.verify(testData, signature, SigFormat.DER);\n expect(isVerified).toBeTruthy();\n });\n\n it(\"should derive a shared secret with another public key\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const otherKeyPair = await NobleKeyPair.generate(Curve.K256);\n const sharedSecret1 = await keyPair.deriveSharedSecret(\n otherKeyPair.getPublicKey(),\n );\n const sharedSecret2 = await otherKeyPair.deriveSharedSecret(\n keyPair.getPublicKey(),\n );\n\n expect(sharedSecret1).toBeDefined();\n expect(sharedSecret1.byteLength).toBeGreaterThan(0);\n expect(sharedSecret1).toStrictEqual(sharedSecret2);\n });\n\n it(\"should convert public key to hex string\", async () => {\n const keyPair = await NobleKeyPair.generate(Curve.K256);\n const hexPublicKey = keyPair.getPublicKeyToHex();\n expect(typeof hexPublicKey).toBe(\"string\");\n expect(hexPublicKey.length).toBeGreaterThan(0);\n });\n});\n"],
5
- "mappings": "AAAA,OAAS,SAAAA,MAAa,4BACtB,OAAS,aAAAC,MAAiB,sBAE1B,OAAS,gBAAAC,MAAoB,iBAE7B,SAAS,eAAgB,IAAM,CAC7B,MAAMC,EAAW,IAAI,YAAY,EAAE,OAAO,WAAW,EAErD,GAAG,qDAAsD,SAAY,CAEnE,MAAMC,GADU,MAAMF,EAAa,SAASF,EAAM,IAAI,GAC5B,aAAa,EACvC,OAAOI,CAAS,EAAE,YAAY,EAC9B,OAAOA,EAAU,UAAU,EAAE,gBAAgB,CAAC,CAChD,CAAC,EAED,GAAG,8CAA+C,IAAM,CACtD,MAAMC,EAAa,IAAI,WAAW,EAAE,EAAE,KAAK,CAAC,EACtCC,EAAUJ,EAAa,KAAKG,EAAYL,EAAM,IAAI,EACxD,OAAOM,EAAQ,aAAa,CAAC,EAAE,YAAY,CAC7C,CAAC,EAED,GAAG,wCAAyC,SAAY,CACtD,MAAMA,EAAU,MAAMJ,EAAa,SAASF,EAAM,IAAI,EAChDO,EAAY,MAAMD,EAAQ,KAAKH,CAAQ,EACvCK,EAAa,MAAMF,EAAQ,OAAOH,EAAUI,CAAS,EAC3D,OAAOC,CAAU,EAAE,WAAW,CAChC,CAAC,EAED,GAAG,uDAAwD,SAAY,CACrE,MAAMF,EAAU,MAAMJ,EAAa,SAASF,EAAM,IAAI,EAChDO,EAAY,MAAMD,EAAQ,KAAKH,EAAUF,EAAU,GAAG,EACtDO,EAAa,MAAMF,EAAQ,OAAOH,EAAUI,EAAWN,EAAU,GAAG,EAC1E,OAAOO,CAAU,EAAE,WAAW,CAChC,CAAC,EAED,GAAG,wDAAyD,SAAY,CACtE,MAAMF,EAAU,MAAMJ,EAAa,SAASF,EAAM,IAAI,EAChDS,EAAe,MAAMP,EAAa,SAASF,EAAM,IAAI,EACrDU,EAAgB,MAAMJ,EAAQ,mBAClCG,EAAa,aAAa,CAC5B,EACME,EAAgB,MAAMF,EAAa,mBACvCH,EAAQ,aAAa,CACvB,EAEA,OAAOI,CAAa,EAAE,YAAY,EAClC,OAAOA,EAAc,UAAU,EAAE,gBAAgB,CAAC,EAClD,OAAOA,CAAa,EAAE,cAAcC,CAAa,CACnD,CAAC,EAED,GAAG,0CAA2C,SAAY,CAExD,MAAMC,GADU,MAAMV,EAAa,SAASF,EAAM,IAAI,GACzB,kBAAkB,EAC/C,OAAO,OAAOY,CAAY,EAAE,KAAK,QAAQ,EACzC,OAAOA,EAAa,MAAM,EAAE,gBAAgB,CAAC,CAC/C,CAAC,CACH,CAAC",
6
- "names": ["Curve", "SigFormat", "NobleKeyPair", "testData", "publicKey", "privateKey", "keyPair", "signature", "isVerified", "otherKeyPair", "sharedSecret1", "sharedSecret2", "hexPublicKey"]
7
- }
@@ -1,2 +0,0 @@
1
- var g=(e=>(e.PROD="prod",e.STAGING="staging",e))(g||{});export{g as LKRPEnv};
2
- //# sourceMappingURL=Env.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/model/Env.ts"],
4
- "sourcesContent": ["export enum LKRPEnv {\n PROD = \"prod\",\n STAGING = \"staging\",\n}\n"],
5
- "mappings": "AAAO,IAAKA,OACVA,EAAA,KAAO,OACPA,EAAA,QAAU,UAFAA,OAAA",
6
- "names": ["LKRPEnv"]
7
- }
@@ -1 +0,0 @@
1
- //# sourceMappingURL=JWT.js.map
@@ -1,2 +0,0 @@
1
- var C=(f=>(f[f.OWNER=4294967295]="OWNER",f[f.CAN_ENCRYPT=1]="CAN_ENCRYPT",f[f.CAN_DERIVE=2]="CAN_DERIVE",f[f.CAN_ADD_BLOCK=4]="CAN_ADD_BLOCK",f))(C||{});export{C as Permissions};
2
- //# sourceMappingURL=Permissions.js.map
@@ -1,7 +0,0 @@
1
- {
2
- "version": 3,
3
- "sources": ["../../../../src/api/model/Permissions.ts"],
4
- "sourcesContent": ["/**\n * https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/5865144361/ARCH+LKRP+-+v2+specifications#Member-permissions\n */\nexport enum Permissions {\n OWNER = 0xffffffff, // Owners of the stream have access to everything\n CAN_ENCRYPT = 1, // The member can have access to the stream private key\n CAN_DERIVE = 1 << 1, // The member can have access to the stream chain code (if a member have access to the private key and the chain code it is able to derive sub-streams)\n CAN_ADD_BLOCK = 1 << 2, // The member is authorized to issue blocks in the current stream\n}\n"],
5
- "mappings": "AAGO,IAAKA,OACVA,IAAA,MAAQ,YAAR,QACAA,IAAA,YAAc,GAAd,cACAA,IAAA,WAAa,GAAb,aACAA,IAAA,cAAgB,GAAhB,gBAJUA,OAAA",
6
- "names": ["Permissions"]
7
- }
@@ -1,22 +0,0 @@
1
- import { type Key } from "./Key";
2
- import { type KeyPair } from "./KeyPair";
3
- export declare enum Curve {
4
- K256 = 0,// secp256k1
5
- P256 = 1
6
- }
7
- export declare enum EncryptionAlgo {
8
- AES256_GCM = 0
9
- }
10
- export declare enum HashAlgo {
11
- SHA256 = 0
12
- }
13
- export interface CryptoService {
14
- randomBytes(len: number): Uint8Array;
15
- hash(bytes: Uint8Array, algo: HashAlgo): Uint8Array;
16
- hmac(key: Uint8Array, message: Uint8Array, algo: HashAlgo): Uint8Array;
17
- createKeyPair(curve: Curve): Promise<KeyPair>;
18
- importKeyPair(privateKey: Uint8Array, curve: Curve): KeyPair;
19
- createSymmetricKey(algo: EncryptionAlgo): Promise<Key>;
20
- importSymmetricKey(keyMaterial: Uint8Array, algo: EncryptionAlgo): Key;
21
- }
22
- //# sourceMappingURL=CryptoService.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"CryptoService.d.ts","sourceRoot":"","sources":["../../../../src/api/crypto/CryptoService.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,GAAG,EAAE,MAAM,OAAO,CAAC;AACjC,OAAO,EAAE,KAAK,OAAO,EAAE,MAAM,WAAW,CAAC;AAEzC,oBAAY,KAAK;IACf,IAAI,IAAA,CAAE,YAAY;IAClB,IAAI,IAAA;CACL;AAED,oBAAY,cAAc;IACxB,UAAU,IAAA;CACX;AAED,oBAAY,QAAQ;IAClB,MAAM,IAAA;CACP;AAED,MAAM,WAAW,aAAa;IAE5B,WAAW,CAAC,GAAG,EAAE,MAAM,GAAG,UAAU,CAAC;IAGrC,IAAI,CAAC,KAAK,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,GAAG,UAAU,CAAC;IAGpD,IAAI,CAAC,GAAG,EAAE,UAAU,EAAE,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,GAAG,UAAU,CAAC;IAGvE,aAAa,CAAC,KAAK,EAAE,KAAK,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;IAG9C,aAAa,CAAC,UAAU,EAAE,UAAU,EAAE,KAAK,EAAE,KAAK,GAAG,OAAO,CAAC;IAG7D,kBAAkB,CAAC,IAAI,EAAE,cAAc,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC;IAGvD,kBAAkB,CAAC,WAAW,EAAE,UAAU,EAAE,IAAI,EAAE,cAAc,GAAG,GAAG,CAAC;CACxE"}
@@ -1,7 +0,0 @@
1
- export declare const AES256_KEY_SIZE = 32;
2
- export declare const AES256_BLOCK_SIZE = 16;
3
- export interface Key {
4
- encrypt(iv: Uint8Array, data: Uint8Array): Promise<Uint8Array>;
5
- decrypt(iv: Uint8Array, encryptedData: Uint8Array): Promise<Uint8Array>;
6
- }
7
- //# sourceMappingURL=Key.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"Key.d.ts","sourceRoot":"","sources":["../../../../src/api/crypto/Key.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,eAAe,KAAK,CAAC;AAClC,eAAO,MAAM,iBAAiB,KAAK,CAAC;AAEpC,MAAM,WAAW,GAAG;IAClB,OAAO,CAAC,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC;IAC/D,OAAO,CAAC,EAAE,EAAE,UAAU,EAAE,aAAa,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC;CACzE"}
@@ -1,12 +0,0 @@
1
- export declare enum SigFormat {
2
- COMPACT = 0,
3
- DER = 1
4
- }
5
- export interface KeyPair {
6
- sign(data: Uint8Array, format?: SigFormat): Promise<Uint8Array>;
7
- verify(data: Uint8Array, signature: Uint8Array, format?: SigFormat): Promise<boolean>;
8
- deriveSharedSecret(peerPublicKey: Uint8Array): Promise<Uint8Array>;
9
- getPublicKey(): Uint8Array;
10
- getPublicKeyToHex(): string;
11
- }
12
- //# sourceMappingURL=KeyPair.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"KeyPair.d.ts","sourceRoot":"","sources":["../../../../src/api/crypto/KeyPair.ts"],"names":[],"mappings":"AAAA,oBAAY,SAAS;IACnB,OAAO,IAAA;IACP,GAAG,IAAA;CACJ;AAED,MAAM,WAAW,OAAO;IACtB,IAAI,CAAC,IAAI,EAAE,UAAU,EAAE,MAAM,CAAC,EAAE,SAAS,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC;IAChE,MAAM,CACJ,IAAI,EAAE,UAAU,EAChB,SAAS,EAAE,UAAU,EACrB,MAAM,CAAC,EAAE,SAAS,GACjB,OAAO,CAAC,OAAO,CAAC,CAAC;IACpB,kBAAkB,CAAC,aAAa,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAAC;IACnE,YAAY,IAAI,UAAU,CAAC;IAC3B,iBAAiB,IAAI,MAAM,CAAC;CAC7B"}
@@ -1,13 +0,0 @@
1
- import { type CryptoService, type Curve, type EncryptionAlgo, HashAlgo } from "../../crypto/CryptoService";
2
- import { type Key } from "../../crypto/Key";
3
- import { type KeyPair } from "../../crypto/KeyPair";
4
- export declare class NobleCryptoService implements CryptoService {
5
- randomBytes(len: number): Uint8Array;
6
- hash(bytes: Uint8Array, algo: HashAlgo): Uint8Array;
7
- hmac(key: Uint8Array, message: Uint8Array, algo: HashAlgo): Uint8Array;
8
- createKeyPair(curve: Curve): Promise<KeyPair>;
9
- importKeyPair(privateKey: Uint8Array, curve: Curve): KeyPair;
10
- createSymmetricKey(algo: EncryptionAlgo): Promise<Key>;
11
- importSymmetricKey(keyMaterial: Uint8Array, algo: EncryptionAlgo): Key;
12
- }
13
- //# sourceMappingURL=NobleCryptoService.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"NobleCryptoService.d.ts","sourceRoot":"","sources":["../../../../../src/api/crypto/noble/NobleCryptoService.ts"],"names":[],"mappings":"AAIA,OAAO,EACL,KAAK,aAAa,EAClB,KAAK,KAAK,EACV,KAAK,cAAc,EACnB,QAAQ,EACT,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,KAAK,GAAG,EAAE,MAAM,iBAAiB,CAAC;AAC3C,OAAO,EAAE,KAAK,OAAO,EAAE,MAAM,qBAAqB,CAAC;AAKnD,qBAAa,kBAAmB,YAAW,aAAa;IACtD,WAAW,CAAC,GAAG,EAAE,MAAM,GAAG,UAAU;IAIpC,IAAI,CAAC,KAAK,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,GAAG,UAAU;IASnD,IAAI,CAAC,GAAG,EAAE,UAAU,EAAE,OAAO,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,GAAG,UAAU;IAShE,aAAa,CAAC,KAAK,EAAE,KAAK,GAAG,OAAO,CAAC,OAAO,CAAC;IAInD,aAAa,CAAC,UAAU,EAAE,UAAU,EAAE,KAAK,EAAE,KAAK,GAAG,OAAO;IAItD,kBAAkB,CAAC,IAAI,EAAE,cAAc,GAAG,OAAO,CAAC,GAAG,CAAC;IAI5D,kBAAkB,CAAC,WAAW,EAAE,UAAU,EAAE,IAAI,EAAE,cAAc,GAAG,GAAG;CAGvE"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=NobleCryptoService.test.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"NobleCryptoService.test.d.ts","sourceRoot":"","sources":["../../../../../src/api/crypto/noble/NobleCryptoService.test.ts"],"names":[],"mappings":""}
@@ -1,11 +0,0 @@
1
- import { EncryptionAlgo } from "../../crypto/CryptoService";
2
- import { type Key } from "../../crypto/Key";
3
- export declare class NobleKey implements Key {
4
- private key;
5
- static generate(algo?: EncryptionAlgo): Promise<NobleKey>;
6
- static from(keyMaterial: Uint8Array, algo?: EncryptionAlgo): NobleKey;
7
- private constructor();
8
- encrypt(iv: Uint8Array, data: Uint8Array): Promise<Uint8Array>;
9
- decrypt(iv: Uint8Array, encryptedData: Uint8Array): Promise<Uint8Array>;
10
- }
11
- //# sourceMappingURL=NobleKey.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"NobleKey.d.ts","sourceRoot":"","sources":["../../../../../src/api/crypto/noble/NobleKey.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,cAAc,EAAE,MAAM,2BAA2B,CAAC;AAC3D,OAAO,EAAsC,KAAK,GAAG,EAAE,MAAM,iBAAiB,CAAC;AAE/E,qBAAa,QAAS,YAAW,GAAG;IAoBd,OAAO,CAAC,GAAG;WAnBlB,QAAQ,CACnB,IAAI,GAAE,cAA0C,GAC/C,OAAO,CAAC,QAAQ,CAAC;IAOpB,MAAM,CAAC,IAAI,CACT,WAAW,EAAE,UAAU,EACvB,IAAI,GAAE,cAA0C,GAC/C,QAAQ;IAOX,OAAO;IAED,OAAO,CAAC,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IAK9D,OAAO,CACX,EAAE,EAAE,UAAU,EACd,aAAa,EAAE,UAAU,GACxB,OAAO,CAAC,UAAU,CAAC;CAIvB"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=NobleKey.test.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"NobleKey.test.d.ts","sourceRoot":"","sources":["../../../../../src/api/crypto/noble/NobleKey.test.ts"],"names":[],"mappings":""}