@ledgerhq/device-trusted-app-kit-ledger-keyring-protocol 0.0.0-web-ble-29-08---20250829104351 → 0.0.0-wrong-error-when-in-experimental-provider-20251021161219
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/api/LedgerKeyringProtocol.js +1 -1
- package/lib/cjs/api/LedgerKeyringProtocol.js.map +1 -1
- package/lib/cjs/api/LedgerKeyringProtocolBuilder.js +1 -1
- package/lib/cjs/api/LedgerKeyringProtocolBuilder.js.map +3 -3
- package/lib/cjs/api/app-binder/AddToTrustchainDeviceActionTypes.js.map +2 -2
- package/lib/cjs/api/app-binder/AuthenticateDeviceActionTypes.js.map +1 -1
- package/lib/cjs/api/app-binder/GetVersionCommandTypes.js +1 -1
- package/lib/cjs/api/app-binder/GetVersionCommandTypes.js.map +1 -1
- package/lib/cjs/api/crypto/CryptoService.js +2 -0
- package/lib/cjs/api/crypto/CryptoService.js.map +7 -0
- package/lib/cjs/api/crypto/Key.js +2 -0
- package/lib/cjs/api/crypto/Key.js.map +7 -0
- package/lib/cjs/api/crypto/KeyPair.js +2 -0
- package/lib/cjs/api/crypto/KeyPair.js.map +7 -0
- package/lib/cjs/api/crypto/noble/NobleCryptoService.js +2 -0
- package/lib/cjs/api/crypto/noble/NobleCryptoService.js.map +7 -0
- package/lib/cjs/api/crypto/noble/NobleCryptoService.test.js +2 -0
- package/lib/cjs/api/crypto/noble/NobleCryptoService.test.js.map +7 -0
- package/lib/cjs/api/crypto/noble/NobleKey.js +2 -0
- package/lib/cjs/api/crypto/noble/NobleKey.js.map +7 -0
- package/lib/cjs/api/crypto/noble/NobleKey.test.js +2 -0
- package/lib/cjs/api/crypto/noble/NobleKey.test.js.map +7 -0
- package/lib/cjs/api/crypto/noble/NobleKeyPair.js +2 -0
- package/lib/cjs/api/crypto/noble/NobleKeyPair.js.map +7 -0
- package/lib/cjs/api/crypto/noble/NobleKeyPair.test.js +2 -0
- package/lib/cjs/api/crypto/noble/NobleKeyPair.test.js.map +7 -0
- package/lib/cjs/api/index.js +1 -1
- package/lib/cjs/api/index.js.map +2 -2
- package/lib/cjs/api/model/Env.js +2 -0
- package/lib/cjs/api/model/Env.js.map +7 -0
- package/lib/cjs/api/{app-binder → model}/Errors.js.map +1 -1
- package/lib/cjs/api/model/JWT.js +2 -0
- package/lib/cjs/api/model/JWT.js.map +7 -0
- package/lib/cjs/api/model/Permissions.js +2 -0
- package/lib/cjs/api/model/Permissions.js.map +7 -0
- package/lib/cjs/internal/DefaultLedgerKeyringProtocol.js +1 -1
- package/lib/cjs/internal/DefaultLedgerKeyringProtocol.js.map +3 -3
- package/lib/cjs/internal/app-binder/LedgerKeyringProtocolBinder.js +1 -1
- package/lib/cjs/internal/app-binder/LedgerKeyringProtocolBinder.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/GetAppNameCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetAppNameCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.test.js +2 -2
- package/lib/cjs/internal/app-binder/command/GetSeedIdCommand.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/command/GetVersionCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/InitCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/InitCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/InitCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/InitCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/ParseBlockSignatureCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/ParseStreamBlockCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.js +1 -1
- package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ParseStreamBlockHeader.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SetTrustedMemberCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignBlockHeader.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignBlockHeader.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignBlockHeader.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignBlockHeader.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignBlockSignatureCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.test.js +1 -1
- package/lib/cjs/internal/app-binder/command/SignBlockSingleCommand.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/AddToTrustchainDeviceAction.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/AddToTrustchainDeviceAction.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js.map +2 -2
- package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.js.map +1 -1
- package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.js.map +1 -1
- package/lib/cjs/internal/app-binder/task/ExtractEncryptionKeyTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/ExtractEncryptionKeyTask.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/InitTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/InitTask.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/ParseStreamToDeviceTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/ParseStreamToDeviceTask.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/SignBlockTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/SignBlockTask.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/SignChallengeWithKeypairTask.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/utils/TrustedProperties.js +1 -1
- package/lib/cjs/internal/app-binder/task/utils/TrustedProperties.js.map +2 -2
- package/lib/cjs/internal/di.js +1 -1
- package/lib/cjs/internal/di.js.map +3 -3
- package/lib/cjs/internal/externalTypes.js +1 -1
- package/lib/cjs/internal/externalTypes.js.map +2 -2
- package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.js +1 -1
- package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.js.map +2 -2
- package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js +1 -1
- package/lib/cjs/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js.map +2 -2
- package/lib/cjs/internal/lkrp-datasource/data/LKRPDataSource.js.map +1 -1
- package/lib/cjs/internal/use-cases/authentication/AuthenticateUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/authentication/AuthenticateUseCase.js.map +2 -2
- package/lib/cjs/internal/use-cases/authentication/DecryptDataUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/authentication/DecryptDataUseCase.js.map +3 -3
- package/lib/cjs/internal/use-cases/authentication/EncryptDataUseCase.js +1 -1
- package/lib/cjs/internal/use-cases/authentication/EncryptDataUseCase.js.map +3 -3
- package/lib/cjs/internal/utils/LKRPBlock.js +4 -4
- package/lib/cjs/internal/utils/LKRPBlock.js.map +3 -3
- package/lib/cjs/internal/utils/LKRPBlock.test.js +3 -3
- package/lib/cjs/internal/utils/LKRPBlock.test.js.map +3 -3
- package/lib/cjs/internal/utils/LKRPBlockStream.js +2 -2
- package/lib/cjs/internal/utils/LKRPBlockStream.js.map +3 -3
- package/lib/cjs/internal/utils/LKRPBlockStream.test.js +2 -2
- package/lib/cjs/internal/utils/LKRPBlockStream.test.js.map +3 -3
- package/lib/cjs/internal/utils/LKRPCommand.js +2 -2
- package/lib/cjs/internal/utils/LKRPCommand.js.map +3 -3
- package/lib/cjs/internal/utils/LKRPCommand.test.js +2 -2
- package/lib/cjs/internal/utils/LKRPCommand.test.js.map +3 -3
- package/lib/cjs/internal/utils/TLVParser.js +1 -1
- package/lib/cjs/internal/utils/TLVParser.js.map +3 -3
- package/lib/cjs/internal/utils/TLVParser.test.js +1 -1
- package/lib/cjs/internal/utils/TLVParser.test.js.map +2 -2
- package/lib/cjs/internal/utils/required.js +1 -1
- package/lib/cjs/internal/utils/required.js.map +2 -2
- package/lib/cjs/package.json +2 -2
- package/lib/esm/api/LedgerKeyringProtocolBuilder.js +1 -1
- package/lib/esm/api/LedgerKeyringProtocolBuilder.js.map +3 -3
- package/lib/esm/api/app-binder/AddToTrustchainDeviceActionTypes.js.map +2 -2
- package/lib/esm/api/app-binder/AuthenticateDeviceActionTypes.js.map +1 -1
- package/lib/esm/api/crypto/CryptoService.js +2 -0
- package/lib/esm/api/crypto/CryptoService.js.map +7 -0
- package/lib/esm/api/crypto/Key.js +2 -0
- package/lib/esm/api/crypto/Key.js.map +7 -0
- package/lib/esm/api/crypto/KeyPair.js +2 -0
- package/lib/esm/api/crypto/KeyPair.js.map +7 -0
- package/lib/esm/api/crypto/noble/NobleCryptoService.js +2 -0
- package/lib/esm/api/crypto/noble/NobleCryptoService.js.map +7 -0
- package/lib/esm/api/crypto/noble/NobleCryptoService.test.js +2 -0
- package/lib/esm/api/crypto/noble/NobleCryptoService.test.js.map +7 -0
- package/lib/esm/api/crypto/noble/NobleKey.js +2 -0
- package/lib/esm/api/crypto/noble/NobleKey.js.map +7 -0
- package/lib/esm/api/crypto/noble/NobleKey.test.js +2 -0
- package/lib/esm/api/crypto/noble/NobleKey.test.js.map +7 -0
- package/lib/esm/api/crypto/noble/NobleKeyPair.js +2 -0
- package/lib/esm/api/crypto/noble/NobleKeyPair.js.map +7 -0
- package/lib/esm/api/crypto/noble/NobleKeyPair.test.js +2 -0
- package/lib/esm/api/crypto/noble/NobleKeyPair.test.js.map +7 -0
- package/lib/esm/api/index.js +1 -1
- package/lib/esm/api/index.js.map +2 -2
- package/lib/esm/api/model/Env.js +2 -0
- package/lib/esm/api/model/Env.js.map +7 -0
- package/lib/esm/api/{app-binder → model}/Errors.js.map +1 -1
- package/lib/esm/api/model/JWT.js +1 -0
- package/lib/esm/api/model/Permissions.js +2 -0
- package/lib/esm/api/model/Permissions.js.map +7 -0
- package/lib/esm/internal/DefaultLedgerKeyringProtocol.js +1 -1
- package/lib/esm/internal/DefaultLedgerKeyringProtocol.js.map +3 -3
- package/lib/esm/internal/app-binder/LedgerKeyringProtocolBinder.js +1 -1
- package/lib/esm/internal/app-binder/LedgerKeyringProtocolBinder.js.map +3 -3
- package/lib/esm/internal/app-binder/command/GetAppNameCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetAppNameCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/GetSeedIdCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/GetSeedIdCommand.js.map +3 -3
- package/lib/esm/internal/app-binder/command/GetSeedIdCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/GetSeedIdCommand.test.js.map +3 -3
- package/lib/esm/internal/app-binder/command/GetVersionCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/InitCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/InitCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/InitCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/InitCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/ParseBlockSignatureCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/ParseStreamBlockCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.js +1 -1
- package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ParseStreamBlockHeader.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SetTrustedMemberCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignBlockHeader.js +1 -1
- package/lib/esm/internal/app-binder/command/SignBlockHeader.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignBlockHeader.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignBlockHeader.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignBlockSignatureCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.js +1 -1
- package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.js.map +2 -2
- package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.test.js +1 -1
- package/lib/esm/internal/app-binder/command/SignBlockSingleCommand.test.js.map +2 -2
- package/lib/esm/internal/app-binder/device-action/AddToTrustchainDeviceAction.js +1 -1
- package/lib/esm/internal/app-binder/device-action/AddToTrustchainDeviceAction.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js +1 -1
- package/lib/esm/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.js.map +2 -2
- package/lib/esm/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js +1 -1
- package/lib/esm/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.js.map +2 -2
- package/lib/esm/internal/app-binder/task/ExtractEncryptionKeyTask.js +1 -1
- package/lib/esm/internal/app-binder/task/ExtractEncryptionKeyTask.js.map +3 -3
- package/lib/esm/internal/app-binder/task/InitTask.js +1 -1
- package/lib/esm/internal/app-binder/task/InitTask.js.map +3 -3
- package/lib/esm/internal/app-binder/task/ParseStreamToDeviceTask.js +1 -1
- package/lib/esm/internal/app-binder/task/ParseStreamToDeviceTask.js.map +3 -3
- package/lib/esm/internal/app-binder/task/SignBlockTask.js +1 -1
- package/lib/esm/internal/app-binder/task/SignBlockTask.js.map +3 -3
- package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.js +1 -1
- package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.js.map +3 -3
- package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/SignChallengeWithKeypairTask.test.js.map +3 -3
- package/lib/esm/internal/app-binder/task/utils/TrustedProperties.js +1 -1
- package/lib/esm/internal/app-binder/task/utils/TrustedProperties.js.map +2 -2
- package/lib/esm/internal/di.js +1 -1
- package/lib/esm/internal/di.js.map +3 -3
- package/lib/esm/internal/externalTypes.js +1 -1
- package/lib/esm/internal/externalTypes.js.map +2 -2
- package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.js +1 -1
- package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.js.map +2 -2
- package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js +1 -1
- package/lib/esm/internal/lkrp-datasource/data/HttpLKRPDataSource.test.js.map +2 -2
- package/lib/esm/internal/use-cases/authentication/AuthenticateUseCase.js +1 -1
- package/lib/esm/internal/use-cases/authentication/AuthenticateUseCase.js.map +2 -2
- package/lib/esm/internal/use-cases/authentication/DecryptDataUseCase.js +1 -1
- package/lib/esm/internal/use-cases/authentication/DecryptDataUseCase.js.map +3 -3
- package/lib/esm/internal/use-cases/authentication/EncryptDataUseCase.js +1 -1
- package/lib/esm/internal/use-cases/authentication/EncryptDataUseCase.js.map +3 -3
- package/lib/esm/internal/utils/LKRPBlock.js +3 -3
- package/lib/esm/internal/utils/LKRPBlock.js.map +3 -3
- package/lib/esm/internal/utils/LKRPBlock.test.js +2 -2
- package/lib/esm/internal/utils/LKRPBlock.test.js.map +3 -3
- package/lib/esm/internal/utils/LKRPBlockStream.js +2 -2
- package/lib/esm/internal/utils/LKRPBlockStream.js.map +3 -3
- package/lib/esm/internal/utils/LKRPBlockStream.test.js +1 -1
- package/lib/esm/internal/utils/LKRPBlockStream.test.js.map +3 -3
- package/lib/esm/internal/utils/LKRPCommand.js +2 -2
- package/lib/esm/internal/utils/LKRPCommand.js.map +3 -3
- package/lib/esm/internal/utils/LKRPCommand.test.js +2 -2
- package/lib/esm/internal/utils/LKRPCommand.test.js.map +3 -3
- package/lib/esm/internal/utils/TLVParser.js +1 -1
- package/lib/esm/internal/utils/TLVParser.js.map +3 -3
- package/lib/esm/internal/utils/TLVParser.test.js +1 -1
- package/lib/esm/internal/utils/TLVParser.test.js.map +2 -2
- package/lib/esm/internal/utils/required.js +1 -1
- package/lib/esm/internal/utils/required.js.map +2 -2
- package/lib/esm/package.json +2 -2
- package/lib/types/api/LedgerKeyringProtocol.d.ts +2 -2
- package/lib/types/api/LedgerKeyringProtocol.d.ts.map +1 -1
- package/lib/types/api/LedgerKeyringProtocolBuilder.d.ts +4 -1
- package/lib/types/api/LedgerKeyringProtocolBuilder.d.ts.map +1 -1
- package/lib/types/api/app-binder/AddToTrustchainDeviceActionTypes.d.ts +8 -4
- package/lib/types/api/app-binder/AddToTrustchainDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/app-binder/AuthenticateDeviceActionTypes.d.ts +2 -2
- package/lib/types/api/app-binder/AuthenticateDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/app-binder/GetVersionCommandTypes.d.ts +0 -1
- package/lib/types/api/app-binder/GetVersionCommandTypes.d.ts.map +1 -1
- package/lib/types/api/crypto/CryptoService.d.ts +22 -0
- package/lib/types/api/crypto/CryptoService.d.ts.map +1 -0
- package/lib/types/api/crypto/Key.d.ts +7 -0
- package/lib/types/api/crypto/Key.d.ts.map +1 -0
- package/lib/types/api/crypto/KeyPair.d.ts +13 -0
- package/lib/types/api/crypto/KeyPair.d.ts.map +1 -0
- package/lib/types/api/crypto/noble/NobleCryptoService.d.ts +13 -0
- package/lib/types/api/crypto/noble/NobleCryptoService.d.ts.map +1 -0
- package/lib/types/api/crypto/noble/NobleCryptoService.test.d.ts +2 -0
- package/lib/types/api/crypto/noble/NobleCryptoService.test.d.ts.map +1 -0
- package/lib/types/api/crypto/noble/NobleKey.d.ts +11 -0
- package/lib/types/api/crypto/noble/NobleKey.d.ts.map +1 -0
- package/lib/types/api/crypto/noble/NobleKey.test.d.ts +2 -0
- package/lib/types/api/crypto/noble/NobleKey.test.d.ts.map +1 -0
- package/lib/types/api/crypto/noble/NobleKeyPair.d.ts +18 -0
- package/lib/types/api/crypto/noble/NobleKeyPair.d.ts.map +1 -0
- package/lib/types/api/crypto/noble/NobleKeyPair.test.d.ts +2 -0
- package/lib/types/api/crypto/noble/NobleKeyPair.test.d.ts.map +1 -0
- package/lib/types/api/index.d.ts +10 -2
- package/lib/types/api/index.d.ts.map +1 -1
- package/lib/types/api/model/Env.d.ts +5 -0
- package/lib/types/api/model/Env.d.ts.map +1 -0
- package/lib/types/api/model/Errors.d.ts.map +1 -0
- package/lib/types/api/model/JWT.d.ts +9 -0
- package/lib/types/api/model/JWT.d.ts.map +1 -0
- package/lib/types/api/{app-binder/LKRPTypes.d.ts → model/Permissions.d.ts} +1 -19
- package/lib/types/api/model/Permissions.d.ts.map +1 -0
- package/lib/types/internal/DefaultLedgerKeyringProtocol.d.ts +6 -4
- package/lib/types/internal/DefaultLedgerKeyringProtocol.d.ts.map +1 -1
- package/lib/types/internal/app-binder/LedgerKeyringProtocolBinder.d.ts +7 -4
- package/lib/types/internal/app-binder/LedgerKeyringProtocolBinder.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetAppNameCommand.d.ts +4 -1
- package/lib/types/internal/app-binder/command/GetAppNameCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetSeedIdCommand.d.ts +13 -1
- package/lib/types/internal/app-binder/command/GetSeedIdCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/GetVersionCommand.d.ts +2 -1
- package/lib/types/internal/app-binder/command/GetVersionCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/InitCommand.d.ts +4 -1
- package/lib/types/internal/app-binder/command/InitCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/ParseBlockSignatureCommand.d.ts +4 -1
- package/lib/types/internal/app-binder/command/ParseBlockSignatureCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/ParseStreamBlockCommand.d.ts +5 -1
- package/lib/types/internal/app-binder/command/ParseStreamBlockCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/ParseStreamBlockHeader.d.ts +4 -1
- package/lib/types/internal/app-binder/command/ParseStreamBlockHeader.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SetTrustedMemberCommand.d.ts +5 -1
- package/lib/types/internal/app-binder/command/SetTrustedMemberCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SignBlockHeader.d.ts +5 -1
- package/lib/types/internal/app-binder/command/SignBlockHeader.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SignBlockSignatureCommand.d.ts +5 -1
- package/lib/types/internal/app-binder/command/SignBlockSignatureCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/SignBlockSingleCommand.d.ts +4 -1
- package/lib/types/internal/app-binder/command/SignBlockSingleCommand.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/AddToTrustchainDeviceAction.d.ts +8 -4
- package/lib/types/internal/app-binder/device-action/AddToTrustchainDeviceAction.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.d.ts +5 -2
- package/lib/types/internal/app-binder/device-action/AuthenticateWithDeviceDeviceAction.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.d.ts +5 -2
- package/lib/types/internal/app-binder/device-action/AuthenticateWithKeypairDeviceAction.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.d.ts +5 -2
- package/lib/types/internal/app-binder/device-action/models/AuthenticateWithDeviceDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.d.ts +5 -2
- package/lib/types/internal/app-binder/device-action/models/AuthenticateWithKeypairDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/ExtractEncryptionKeyTask.d.ts +4 -7
- package/lib/types/internal/app-binder/task/ExtractEncryptionKeyTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/InitTask.d.ts +5 -3
- package/lib/types/internal/app-binder/task/InitTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/ParseStreamToDeviceTask.d.ts +1 -1
- package/lib/types/internal/app-binder/task/ParseStreamToDeviceTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/SignBlockTask.d.ts +11 -8
- package/lib/types/internal/app-binder/task/SignBlockTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/SignChallengeWithKeypairTask.d.ts +5 -3
- package/lib/types/internal/app-binder/task/SignChallengeWithKeypairTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/utils/TrustedProperties.d.ts +1 -1
- package/lib/types/internal/app-binder/task/utils/TrustedProperties.d.ts.map +1 -1
- package/lib/types/internal/di.d.ts +3 -1
- package/lib/types/internal/di.d.ts.map +1 -1
- package/lib/types/internal/externalTypes.d.ts +1 -0
- package/lib/types/internal/externalTypes.d.ts.map +1 -1
- package/lib/types/internal/lkrp-datasource/data/HttpLKRPDataSource.d.ts +2 -2
- package/lib/types/internal/lkrp-datasource/data/HttpLKRPDataSource.d.ts.map +1 -1
- package/lib/types/internal/lkrp-datasource/data/LKRPDataSource.d.ts +2 -2
- package/lib/types/internal/lkrp-datasource/data/LKRPDataSource.d.ts.map +1 -1
- package/lib/types/internal/use-cases/authentication/AuthenticateUseCase.d.ts +3 -2
- package/lib/types/internal/use-cases/authentication/AuthenticateUseCase.d.ts.map +1 -1
- package/lib/types/internal/use-cases/authentication/DecryptDataUseCase.d.ts +4 -1
- package/lib/types/internal/use-cases/authentication/DecryptDataUseCase.d.ts.map +1 -1
- package/lib/types/internal/use-cases/authentication/EncryptDataUseCase.d.ts +4 -1
- package/lib/types/internal/use-cases/authentication/EncryptDataUseCase.d.ts.map +1 -1
- package/lib/types/internal/utils/LKRPBlock.d.ts +1 -1
- package/lib/types/internal/utils/LKRPBlock.d.ts.map +1 -1
- package/lib/types/internal/utils/LKRPBlockStream.d.ts +4 -3
- package/lib/types/internal/utils/LKRPBlockStream.d.ts.map +1 -1
- package/lib/types/internal/utils/LKRPCommand.d.ts +1 -1
- package/lib/types/internal/utils/LKRPCommand.d.ts.map +1 -1
- package/lib/types/internal/utils/TLVParser.d.ts +1 -1
- package/lib/types/internal/utils/TLVParser.d.ts.map +1 -1
- package/lib/types/internal/utils/required.d.ts +1 -1
- package/lib/types/internal/utils/required.d.ts.map +1 -1
- package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
- package/package.json +6 -6
- package/lib/cjs/api/app-binder/GetAppNameCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/GetAppNameCommandTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/GetSeedIdCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/GetSeedIdCommandTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/InitCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/InitCommandTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/KeypairFromBytes.js +0 -2
- package/lib/cjs/api/app-binder/KeypairFromBytes.js.map +0 -7
- package/lib/cjs/api/app-binder/LKRPTypes.js +0 -2
- package/lib/cjs/api/app-binder/LKRPTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/ParseStreamBlockCommandCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/ParseStreamBlockCommandCommandTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/ParseStreamBlockHeaderCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/ParseStreamBlockHeaderCommandTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/ParseStreamBlockSignatureTypes.js +0 -2
- package/lib/cjs/api/app-binder/ParseStreamBlockSignatureTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/SetTrustedMemberTypes.js +0 -2
- package/lib/cjs/api/app-binder/SetTrustedMemberTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/SignBlockCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/SignBlockCommandTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/SignBlockHeaderCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/SignBlockHeaderCommandTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/SignBlockSignatureCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/SignBlockSignatureCommandTypes.js.map +0 -7
- package/lib/cjs/api/app-binder/SignBlockSingleCommandTypes.js +0 -2
- package/lib/cjs/api/app-binder/SignBlockSingleCommandTypes.js.map +0 -7
- package/lib/cjs/internal/utils/TLVBuilder.js +0 -2
- package/lib/cjs/internal/utils/TLVBuilder.js.map +0 -7
- package/lib/cjs/internal/utils/crypto.js +0 -2
- package/lib/cjs/internal/utils/crypto.js.map +0 -7
- package/lib/cjs/internal/utils/hex.js +0 -2
- package/lib/cjs/internal/utils/hex.js.map +0 -7
- package/lib/esm/api/app-binder/GetAppNameCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/GetSeedIdCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/GetSeedIdCommandTypes.js.map +0 -7
- package/lib/esm/api/app-binder/InitCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/InitCommandTypes.js.map +0 -7
- package/lib/esm/api/app-binder/KeypairFromBytes.js +0 -2
- package/lib/esm/api/app-binder/KeypairFromBytes.js.map +0 -7
- package/lib/esm/api/app-binder/LKRPTypes.js +0 -2
- package/lib/esm/api/app-binder/LKRPTypes.js.map +0 -7
- package/lib/esm/api/app-binder/ParseStreamBlockCommandCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/ParseStreamBlockCommandCommandTypes.js.map +0 -7
- package/lib/esm/api/app-binder/ParseStreamBlockHeaderCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/ParseStreamBlockHeaderCommandTypes.js.map +0 -7
- package/lib/esm/api/app-binder/ParseStreamBlockSignatureTypes.js +0 -1
- package/lib/esm/api/app-binder/ParseStreamBlockSignatureTypes.js.map +0 -7
- package/lib/esm/api/app-binder/SetTrustedMemberTypes.js +0 -1
- package/lib/esm/api/app-binder/SetTrustedMemberTypes.js.map +0 -7
- package/lib/esm/api/app-binder/SignBlockCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/SignBlockCommandTypes.js.map +0 -7
- package/lib/esm/api/app-binder/SignBlockHeaderCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/SignBlockHeaderCommandTypes.js.map +0 -7
- package/lib/esm/api/app-binder/SignBlockSignatureCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/SignBlockSignatureCommandTypes.js.map +0 -7
- package/lib/esm/api/app-binder/SignBlockSingleCommandTypes.js +0 -1
- package/lib/esm/api/app-binder/SignBlockSingleCommandTypes.js.map +0 -7
- package/lib/esm/internal/utils/TLVBuilder.js +0 -2
- package/lib/esm/internal/utils/TLVBuilder.js.map +0 -7
- package/lib/esm/internal/utils/crypto.js +0 -2
- package/lib/esm/internal/utils/crypto.js.map +0 -7
- package/lib/esm/internal/utils/hex.js +0 -2
- package/lib/esm/internal/utils/hex.js.map +0 -7
- package/lib/types/api/app-binder/Errors.d.ts.map +0 -1
- package/lib/types/api/app-binder/GetAppNameCommandTypes.d.ts +0 -5
- package/lib/types/api/app-binder/GetAppNameCommandTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/GetSeedIdCommandTypes.d.ts +0 -14
- package/lib/types/api/app-binder/GetSeedIdCommandTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/InitCommandTypes.d.ts +0 -5
- package/lib/types/api/app-binder/InitCommandTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/KeypairFromBytes.d.ts +0 -11
- package/lib/types/api/app-binder/KeypairFromBytes.d.ts.map +0 -1
- package/lib/types/api/app-binder/LKRPTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/ParseStreamBlockCommandCommandTypes.d.ts +0 -6
- package/lib/types/api/app-binder/ParseStreamBlockCommandCommandTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/ParseStreamBlockHeaderCommandTypes.d.ts +0 -5
- package/lib/types/api/app-binder/ParseStreamBlockHeaderCommandTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/ParseStreamBlockSignatureTypes.d.ts +0 -5
- package/lib/types/api/app-binder/ParseStreamBlockSignatureTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/SetTrustedMemberTypes.d.ts +0 -6
- package/lib/types/api/app-binder/SetTrustedMemberTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/SignBlockCommandTypes.d.ts +0 -9
- package/lib/types/api/app-binder/SignBlockCommandTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/SignBlockHeaderCommandTypes.d.ts +0 -6
- package/lib/types/api/app-binder/SignBlockHeaderCommandTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/SignBlockSignatureCommandTypes.d.ts +0 -6
- package/lib/types/api/app-binder/SignBlockSignatureCommandTypes.d.ts.map +0 -1
- package/lib/types/api/app-binder/SignBlockSingleCommandTypes.d.ts +0 -5
- package/lib/types/api/app-binder/SignBlockSingleCommandTypes.d.ts.map +0 -1
- package/lib/types/internal/utils/TLVBuilder.d.ts +0 -15
- package/lib/types/internal/utils/TLVBuilder.d.ts.map +0 -1
- package/lib/types/internal/utils/crypto.d.ts +0 -19
- package/lib/types/internal/utils/crypto.d.ts.map +0 -1
- package/lib/types/internal/utils/hex.d.ts +0 -3
- package/lib/types/internal/utils/hex.d.ts.map +0 -1
- /package/lib/cjs/api/{app-binder → model}/Errors.js +0 -0
- /package/lib/esm/api/{app-binder → model}/Errors.js +0 -0
- /package/lib/esm/api/{app-binder/GetAppNameCommandTypes.js.map → model/JWT.js.map} +0 -0
- /package/lib/types/api/{app-binder → model}/Errors.d.ts +0 -0
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import{
|
|
1
|
+
import{bufferToHexaString as p,hexaStringToBuffer as u}from"@ledgerhq/device-management-kit";import{Either as y,Just as c,Maybe as f,MaybeAsync as b,Nothing as n,Right as P}from"purify-ts";import{EncryptionAlgo as g}from"../../api/crypto/CryptoService";import{CommandTags as h}from"../models/Tags";import{LKRPBlock as m}from"./LKRPBlock";import{TLVParser as d}from"./TLVParser";class l{constructor(e,a){this.bytes=e;this.blocks=a?c(P(a)):n}validation=n;blocks=n;path=n;static fromHex(e){return new l(u(e)??new Uint8Array)}static fromData(e,a){const t=[];let r=a??p(crypto.getRandomValues(new Uint8Array(32)),!1);for(const s of e){const i=m.fromData({...s,parent:r});r=i.hash(),t.push(i)}const o=t.reduce((s,i)=>new Uint8Array([...s,...i.toU8A()]),new Uint8Array);return new l(o,t)}toU8A(){return this.bytes}toString(){return p(this.bytes,!1)}parse(){return this.blocks.orDefaultLazy(()=>{const e=new d(this.bytes),a=[];for(;!e.state.isDone;){const r=e.state.offset,o=e.parseBlockData().map(s=>{const i=e.state.offset;return new m(this.bytes.slice(r,i),s)});if(a.push(o),o.isLeft())break}const t=y.sequence(a);return this.blocks=c(t),t})}toHuman(){return this.parse().map(e=>e.map(a=>a.toHuman())).chain(y.sequence).map(e=>e.join(`
|
|
2
2
|
|
|
3
|
-
`))}async validate(
|
|
3
|
+
`))}async validate(e){return this.validation.orDefaultLazy(async()=>this.parse().map(t=>t.map(r=>r.parse().map(({parent:o})=>({parent:o,hash:()=>r.hash()})))).chain(y.sequence).toMaybe().map(async t=>{if(e&&t[0]&&e!==t[0].parent)return!1;for await(const[r,o]of t.entries()){const s=t[r+1];if(s&&o.hash()!==s.parent)return!1}return!0}).orDefault(Promise.resolve(!1)))}getPath(){return this.path.ifNothing(()=>{this.path=this.parse().toMaybe().chainNullable(e=>e[0]).chain(e=>e.parse().toMaybe()).chainNullable(({commands:e})=>e[0]).chain(e=>e.parse().toMaybe()).chain(e=>{switch(e.type){case h.Derive:return c(e.path);case h.Seed:return c("m/0'");default:return n}})}),this.path}getMemberBlock(e){return this.parse().toMaybe().chain(a=>{for(const t of a){const r=t.parse();if(r.isRight()){const o=r.extract();for(const s of o.commands){const i=s.getPublicKey();if(i.isJust()&&i.extract()===e)return f.of(o)}}}return n})}hasMember(e){return this.getMemberBlock(e).isJust()}async getPublishedKey(e,a){return b.liftMaybe(this.getMemberBlock(a.getPublicKeyToHex()).chain(t=>{for(const r of t.commands){const o=r.getEncryptedPublishedKey();if(o.isJust())return o}return n})).map(async t=>{const r=(await a.deriveSharedSecret(t.ephemeralPublicKey)).slice(1),s=await e.importSymmetricKey(r,g.AES256_GCM).decrypt(t.initializationVector,t.encryptedXpriv);return{privateKey:s.slice(0,32),chainCode:s.slice(32)}})}}export{l as LKRPBlockStream};
|
|
4
4
|
//# sourceMappingURL=LKRPBlockStream.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../src/internal/utils/LKRPBlockStream.ts"],
|
|
4
|
-
"sourcesContent": ["import { Either, Just, Maybe, Nothing, Right } from \"purify-ts\";\n\nimport { type
|
|
5
|
-
"mappings": "AAAA,OAAS,
|
|
6
|
-
"names": ["
|
|
4
|
+
"sourcesContent": ["import {\n bufferToHexaString,\n hexaStringToBuffer,\n} from \"@ledgerhq/device-management-kit\";\nimport { Either, Just, Maybe, MaybeAsync, Nothing, Right } from \"purify-ts\";\n\nimport { type CryptoService, EncryptionAlgo } from \"@api/crypto/CryptoService\";\nimport { type KeyPair } from \"@api/crypto/KeyPair\";\nimport { type LKRPParsingError } from \"@api/model/Errors\";\nimport { type LKRPBlockData } from \"@internal/models/LKRPBlockTypes\";\nimport { CommandTags } from \"@internal/models/Tags\";\nimport {\n type EncryptedPublishedKey,\n type PublishedKey,\n} from \"@internal/models/Types\";\n\nimport { LKRPBlock } from \"./LKRPBlock\";\nimport { TLVParser } from \"./TLVParser\";\n\nexport class LKRPBlockStream {\n private validation: Maybe<Promise<boolean>> = Nothing;\n private blocks: Maybe<Either<LKRPParsingError, LKRPBlock[]>> = Nothing;\n private path: Maybe<string> = Nothing;\n\n constructor(\n private readonly bytes: Uint8Array,\n blocks?: LKRPBlock[],\n ) {\n this.blocks = blocks ? Just(Right(blocks)) : Nothing;\n }\n\n static fromHex(hex: string): LKRPBlockStream {\n return new LKRPBlockStream(hexaStringToBuffer(hex) ?? new Uint8Array());\n }\n\n static fromData(\n blocksData: Omit<LKRPBlockData, \"parent\">[],\n parentHash?: string,\n ): LKRPBlockStream {\n const blocks: LKRPBlock[] = [];\n let hash =\n parentHash ??\n bufferToHexaString(crypto.getRandomValues(new Uint8Array(32)), false);\n\n for (const blockData of blocksData) {\n const block = LKRPBlock.fromData({\n ...blockData,\n parent: hash,\n });\n hash = block.hash();\n blocks.push(block);\n }\n const bytes = blocks.reduce(\n (acc, block) => new Uint8Array([...acc, ...block.toU8A()]),\n new Uint8Array(),\n );\n return new LKRPBlockStream(bytes, blocks);\n }\n\n toU8A(): Uint8Array {\n return this.bytes;\n }\n\n toString(): string {\n return bufferToHexaString(this.bytes, false);\n }\n\n parse(): Either<LKRPParsingError, LKRPBlock[]> {\n return this.blocks.orDefaultLazy(() => {\n const parser = new TLVParser(this.bytes);\n const parsed: Either<LKRPParsingError, LKRPBlock>[] = [];\n while (!parser.state.isDone) {\n const start = parser.state.offset;\n const block = parser.parseBlockData().map((data) => {\n const end = parser.state.offset;\n return new LKRPBlock(this.bytes.slice(start, end), data);\n });\n parsed.push(block);\n if (block.isLeft()) break;\n }\n const blocks = Either.sequence(parsed);\n this.blocks = Just(blocks);\n return blocks;\n });\n }\n\n toHuman(): Either<LKRPParsingError, string> {\n return this.parse()\n .map((blocks) => blocks.map((block) => block.toHuman()))\n .chain(Either.sequence)\n .map((blocks) => blocks.join(\"\\n\\n\"));\n }\n\n async validate(streamParentHash?: string): Promise<boolean> {\n return this.validation.orDefaultLazy(async () => {\n const validation = this.parse()\n .map((blocks) =>\n blocks.map((block) =>\n block\n .parse()\n .map(({ parent }) => ({ parent, hash: () => block.hash() })),\n ),\n )\n .chain(Either.sequence)\n .toMaybe()\n .map(async (blocks) => {\n if (\n streamParentHash &&\n blocks[0] &&\n streamParentHash !== blocks[0].parent\n ) {\n return false;\n }\n\n for await (const [index, block] of blocks.entries()) {\n const nextBlock = blocks[index + 1];\n if (nextBlock && block.hash() !== nextBlock.parent) {\n return false;\n }\n }\n return true;\n })\n .orDefault(Promise.resolve(false));\n\n return validation;\n });\n }\n\n getPath(): Maybe<string> {\n this.path.ifNothing(() => {\n this.path = this.parse()\n .toMaybe()\n .chainNullable((blocks) => blocks[0])\n .chain((block) => block.parse().toMaybe())\n .chainNullable(({ commands }) => commands[0])\n .chain((command) => command.parse().toMaybe())\n .chain((data) => {\n switch (data.type) {\n case CommandTags.Derive:\n return Just(data.path);\n case CommandTags.Seed:\n return Just(\"m/0'\");\n default:\n return Nothing;\n }\n });\n });\n return this.path;\n }\n\n getMemberBlock(member: string): Maybe<LKRPBlockData> {\n return this.parse()\n .toMaybe()\n .chain((blocks) => {\n for (const block of blocks) {\n const parsedBlock = block.parse();\n if (parsedBlock.isRight()) {\n const blockData = parsedBlock.extract();\n for (const command of blockData.commands) {\n const pubkey = command.getPublicKey();\n if (pubkey.isJust() && pubkey.extract() === member) {\n return Maybe.of(blockData);\n }\n }\n }\n }\n return Nothing;\n });\n }\n\n hasMember(member: string): boolean {\n return this.getMemberBlock(member).isJust();\n }\n\n async getPublishedKey(\n cryptoService: CryptoService,\n keypair: KeyPair,\n ): Promise<Maybe<PublishedKey>> {\n return MaybeAsync.liftMaybe(\n this.getMemberBlock(keypair.getPublicKeyToHex()).chain(\n (block): Maybe<EncryptedPublishedKey> => {\n for (const command of block.commands) {\n const key = command.getEncryptedPublishedKey();\n if (key.isJust()) {\n return key;\n }\n }\n return Nothing;\n },\n ),\n ).map(async (published) => {\n const secret = (\n await keypair.deriveSharedSecret(published.ephemeralPublicKey)\n ).slice(1);\n const key = cryptoService.importSymmetricKey(\n secret,\n EncryptionAlgo.AES256_GCM,\n );\n const xpriv = await key.decrypt(\n published.initializationVector,\n published.encryptedXpriv,\n );\n return { privateKey: xpriv.slice(0, 32), chainCode: xpriv.slice(32) };\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,sBAAAA,EACA,sBAAAC,MACK,kCACP,OAAS,UAAAC,EAAQ,QAAAC,EAAM,SAAAC,EAAO,cAAAC,EAAY,WAAAC,EAAS,SAAAC,MAAa,YAEhE,OAA6B,kBAAAC,MAAsB,4BAInD,OAAS,eAAAC,MAAmB,wBAM5B,OAAS,aAAAC,MAAiB,cAC1B,OAAS,aAAAC,MAAiB,cAEnB,MAAMC,CAAgB,CAK3B,YACmBC,EACjBC,EACA,CAFiB,WAAAD,EAGjB,KAAK,OAASC,EAASX,EAAKI,EAAMO,CAAM,CAAC,EAAIR,CAC/C,CATQ,WAAsCA,EACtC,OAAuDA,EACvD,KAAsBA,EAS9B,OAAO,QAAQS,EAA8B,CAC3C,OAAO,IAAIH,EAAgBX,EAAmBc,CAAG,GAAK,IAAI,UAAY,CACxE,CAEA,OAAO,SACLC,EACAC,EACiB,CACjB,MAAMH,EAAsB,CAAC,EAC7B,IAAII,EACFD,GACAjB,EAAmB,OAAO,gBAAgB,IAAI,WAAW,EAAE,CAAC,EAAG,EAAK,EAEtE,UAAWmB,KAAaH,EAAY,CAClC,MAAMI,EAAQV,EAAU,SAAS,CAC/B,GAAGS,EACH,OAAQD,CACV,CAAC,EACDA,EAAOE,EAAM,KAAK,EAClBN,EAAO,KAAKM,CAAK,CACnB,CACA,MAAMP,EAAQC,EAAO,OACnB,CAACO,EAAKD,IAAU,IAAI,WAAW,CAAC,GAAGC,EAAK,GAAGD,EAAM,MAAM,CAAC,CAAC,EACzD,IAAI,UACN,EACA,OAAO,IAAIR,EAAgBC,EAAOC,CAAM,CAC1C,CAEA,OAAoB,CAClB,OAAO,KAAK,KACd,CAEA,UAAmB,CACjB,OAAOd,EAAmB,KAAK,MAAO,EAAK,CAC7C,CAEA,OAA+C,CAC7C,OAAO,KAAK,OAAO,cAAc,IAAM,CACrC,MAAMsB,EAAS,IAAIX,EAAU,KAAK,KAAK,EACjCY,EAAgD,CAAC,EACvD,KAAO,CAACD,EAAO,MAAM,QAAQ,CAC3B,MAAME,EAAQF,EAAO,MAAM,OACrBF,EAAQE,EAAO,eAAe,EAAE,IAAKG,GAAS,CAClD,MAAMC,EAAMJ,EAAO,MAAM,OACzB,OAAO,IAAIZ,EAAU,KAAK,MAAM,MAAMc,EAAOE,CAAG,EAAGD,CAAI,CACzD,CAAC,EAED,GADAF,EAAO,KAAKH,CAAK,EACbA,EAAM,OAAO,EAAG,KACtB,CACA,MAAMN,EAASZ,EAAO,SAASqB,CAAM,EACrC,YAAK,OAASpB,EAAKW,CAAM,EAClBA,CACT,CAAC,CACH,CAEA,SAA4C,CAC1C,OAAO,KAAK,MAAM,EACf,IAAKA,GAAWA,EAAO,IAAKM,GAAUA,EAAM,QAAQ,CAAC,CAAC,EACtD,MAAMlB,EAAO,QAAQ,EACrB,IAAKY,GAAWA,EAAO,KAAK;AAAA;AAAA,CAAM,CAAC,CACxC,CAEA,MAAM,SAASa,EAA6C,CAC1D,OAAO,KAAK,WAAW,cAAc,SAChB,KAAK,MAAM,EAC3B,IAAKb,GACJA,EAAO,IAAKM,GACVA,EACG,MAAM,EACN,IAAI,CAAC,CAAE,OAAAQ,CAAO,KAAO,CAAE,OAAAA,EAAQ,KAAM,IAAMR,EAAM,KAAK,CAAE,EAAE,CAC/D,CACF,EACC,MAAMlB,EAAO,QAAQ,EACrB,QAAQ,EACR,IAAI,MAAOY,GAAW,CACrB,GACEa,GACAb,EAAO,CAAC,GACRa,IAAqBb,EAAO,CAAC,EAAE,OAE/B,MAAO,GAGT,eAAiB,CAACe,EAAOT,CAAK,IAAKN,EAAO,QAAQ,EAAG,CACnD,MAAMgB,EAAYhB,EAAOe,EAAQ,CAAC,EAClC,GAAIC,GAAaV,EAAM,KAAK,IAAMU,EAAU,OAC1C,MAAO,EAEX,CACA,MAAO,EACT,CAAC,EACA,UAAU,QAAQ,QAAQ,EAAK,CAAC,CAGpC,CACH,CAEA,SAAyB,CACvB,YAAK,KAAK,UAAU,IAAM,CACxB,KAAK,KAAO,KAAK,MAAM,EACpB,QAAQ,EACR,cAAehB,GAAWA,EAAO,CAAC,CAAC,EACnC,MAAOM,GAAUA,EAAM,MAAM,EAAE,QAAQ,CAAC,EACxC,cAAc,CAAC,CAAE,SAAAW,CAAS,IAAMA,EAAS,CAAC,CAAC,EAC3C,MAAOC,GAAYA,EAAQ,MAAM,EAAE,QAAQ,CAAC,EAC5C,MAAOP,GAAS,CACf,OAAQA,EAAK,KAAM,CACjB,KAAKhB,EAAY,OACf,OAAON,EAAKsB,EAAK,IAAI,EACvB,KAAKhB,EAAY,KACf,OAAON,EAAK,MAAM,EACpB,QACE,OAAOG,CACX,CACF,CAAC,CACL,CAAC,EACM,KAAK,IACd,CAEA,eAAe2B,EAAsC,CACnD,OAAO,KAAK,MAAM,EACf,QAAQ,EACR,MAAOnB,GAAW,CACjB,UAAWM,KAASN,EAAQ,CAC1B,MAAMoB,EAAcd,EAAM,MAAM,EAChC,GAAIc,EAAY,QAAQ,EAAG,CACzB,MAAMf,EAAYe,EAAY,QAAQ,EACtC,UAAWF,KAAWb,EAAU,SAAU,CACxC,MAAMgB,EAASH,EAAQ,aAAa,EACpC,GAAIG,EAAO,OAAO,GAAKA,EAAO,QAAQ,IAAMF,EAC1C,OAAO7B,EAAM,GAAGe,CAAS,CAE7B,CACF,CACF,CACA,OAAOb,CACT,CAAC,CACL,CAEA,UAAU2B,EAAyB,CACjC,OAAO,KAAK,eAAeA,CAAM,EAAE,OAAO,CAC5C,CAEA,MAAM,gBACJG,EACAC,EAC8B,CAC9B,OAAOhC,EAAW,UAChB,KAAK,eAAegC,EAAQ,kBAAkB,CAAC,EAAE,MAC9CjB,GAAwC,CACvC,UAAWY,KAAWZ,EAAM,SAAU,CACpC,MAAMkB,EAAMN,EAAQ,yBAAyB,EAC7C,GAAIM,EAAI,OAAO,EACb,OAAOA,CAEX,CACA,OAAOhC,CACT,CACF,CACF,EAAE,IAAI,MAAOiC,GAAc,CACzB,MAAMC,GACJ,MAAMH,EAAQ,mBAAmBE,EAAU,kBAAkB,GAC7D,MAAM,CAAC,EAKHE,EAAQ,MAJFL,EAAc,mBACxBI,EACAhC,EAAe,UACjB,EACwB,QACtB+B,EAAU,qBACVA,EAAU,cACZ,EACA,MAAO,CAAE,WAAYE,EAAM,MAAM,EAAG,EAAE,EAAG,UAAWA,EAAM,MAAM,EAAE,CAAE,CACtE,CAAC,CACH,CACF",
|
|
6
|
+
"names": ["bufferToHexaString", "hexaStringToBuffer", "Either", "Just", "Maybe", "MaybeAsync", "Nothing", "Right", "EncryptionAlgo", "CommandTags", "LKRPBlock", "TLVParser", "LKRPBlockStream", "bytes", "blocks", "hex", "blocksData", "parentHash", "hash", "blockData", "block", "acc", "parser", "parsed", "start", "data", "end", "streamParentHash", "parent", "index", "nextBlock", "commands", "command", "member", "parsedBlock", "pubkey", "cryptoService", "keypair", "key", "published", "secret", "xpriv"]
|
|
7
7
|
}
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import{Just as p,Left as l,Right as s}from"purify-ts";import{LKRPParsingError as u}from"../../api/
|
|
1
|
+
import{hexaStringToBuffer as c}from"@ledgerhq/device-management-kit";import{Just as p,Left as l,Right as s}from"purify-ts";import{LKRPParsingError as u}from"../../api/model/Errors";import{CommandTags as r}from"../models/Tags";import{LKRPBlock as m}from"./LKRPBlock";import{LKRPBlockStream as d}from"./LKRPBlockStream";import{LKRPCommand as o}from"./LKRPCommand";describe("LKRPBlockStream",()=>{describe("toString",()=>{it("should return the hex representation of the block stream",()=>{const e="0102030405060708",a=d.fromHex(e);expect(a.toString()).toBe(e)})}),describe("toU8A",()=>{it("should return the bytes of the block stream",()=>{const e=new Uint8Array([1,2,3,4,5,6,7,8]),a=new d(e);expect(a.toU8A()).toBe(e)})}),describe("toHuman",()=>{it("should return a human-readable representation of the block stream",()=>{const a=d.fromHex(t).toHuman();expect(a).toStrictEqual(s(["Parent: 7ba5eefac6605547fc50188ba7880311d3d1240a7ae32e6eaac7499434091c45","Issuer: 0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021","Commands:"," Derive(0x15):"," path: m/0'/16'/0'"," groupKey: 02839a288f6a76090b64312281d2e7d6b02c4ddf64ed5e7693471b1b445f819508"," initializationVector: a66c5a4486e870287caa53bbd609af00"," encryptedXpriv: 0f43341d6f9099a5180fb304a2889b3b0468f05fb0b931d22211753b3411567abb21981b64261e95bcd44a3512af7c87bbb5a4b6b680c03b5f09e8d9c56a9cb1c0788993a3d9d5c140a2462cb1930d19"," ephemeralPublicKey: 02fbe26c32ab991c1b107156e22fc158c335e0aeedc171381c9d77743c66f41171"," AddMember(0x11):"," name: debug-d4c61d"," publicKey: 03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812"," permissions: 4294967295"," PublishKey(0x12):"," initializationVector: 4d305eae5b70b69cf657f3b9f7db5863"," encryptedXpriv: 898de535f87f7ac775b09c80827d14efddeeaa9a2b106bfd7fcc91942dc36d6a1751793ba7ec0792ba936f5f1d858bc1fc54ca1a70e8d28a5b0bf33b5e926f3add372c802b3b9da64bc06e26b9349db5"," recipient: 03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812"," ephemeralPublicKey: 023db66b974b871c6caafdf486c6895518303b140d389e787d2c3b5527c2df50f4","Signature: 3044022056ab426bd75696cbe9538cb42271e8796ba1576dfe3e2634f0a6f1a636821e5002205e41ae68ebd8fbff404340a4f0124af25e948aa52500de192d15ff4f8ee92c02","","Parent: 154d99eb867cfeef249d573fc2e1f3d307c1e49ec1f66e9af1c9dbd219143211","Issuer: 0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021","Commands:"," AddMember(0x11):"," name: debug-80a289"," publicKey: 0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db"," permissions: 4294967295"," PublishKey(0x12):"," initializationVector: 27bdb34fb6028128bfc919f4db7d1378"," encryptedXpriv: e792b83f26fac0de46ee8f1a07e53b0e508d9373aa2e8047f0a764204ab0f06a2fffa9c29599f5d3fe42fefabd9827867157bd14ec7e2bd8ef83c6f9371d7b48d28d9a4499f8ed626ce75fcec0a0b33f"," recipient: 0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db"," ephemeralPublicKey: 027d40157737671bb04eaca2756b8ec58020ff5c893b10cbfb25b48014c5252dc4","Signature: 30440220718d20c9996893639da807b8a9675d944abdc8fded97f73159beba5004fa17f102203338b74a9e6a2e696ea3658d3af4fce95ffa0f74c11b2c3d37b0ca1b577657e8"].join(`
|
|
2
2
|
`)))})}),describe("parse",()=>{it("should parse the block stream correctly",()=>{const e=d.fromHex(t),a=e.parse();e.toHuman(),expect(a).toStrictEqual(s([m.fromData(f),m.fromData(i)]))}),it("should fail if the block stream data is invalid",()=>{const a=d.fromHex("00").parse();expect(a).toStrictEqual(l(new u("Invalid end of TLV, expected length")))})}),describe("fromData",()=>{it("should create a BlockStream from data",()=>{const e=[{...f,parent:void 0},{...i,parent:void 0}],a=d.fromData(e,f.parent);expect(a.toString()).toBe(t)}),it("should assign a random parent hash if not provided",()=>{const e=[{...f,parent:void 0},{...i,parent:void 0}],b=d.fromData(e).parse().map(n=>n[0]?.hash()).caseOf({Left:()=>{},Right:n=>n});expect(typeof b).toBe("string"),expect(b?.length).toBe(64),expect(b).not.toBe(f.parent)})}),describe("validate",()=>{it("should validate the block stream",async()=>{const e=d.fromHex(t),a=await e.validate(f.parent),b=await e.validate(f.parent);expect(a).toBe(!0),expect(b).toBe(!0)}),it("should fail validation if the parent hash does not match",async()=>{const e=d.fromHex(t.replace(i.parent,f.parent)),a=await e.validate("0123455678"),b=await e.validate();expect(a).toBe(!1),expect(b).toBe(!1)})}),describe("getPath",()=>{it("should return the path of the block stream",()=>{const a=d.fromHex(t).getPath();expect(a).toEqual(p("m/0'/16'/0'"))})})});const t=`
|
|
3
3
|
01 01 01
|
|
4
4
|
02 20 7b a5 ee fa c6 60 55 47 fc 50 18 8b a7 88 03 11 d3 d1 24 0a 7a e3 2e 6e aa c7 49 94 34 09 1c 45
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../src/internal/utils/LKRPBlockStream.test.ts"],
|
|
4
|
-
"sourcesContent": ["import { Just, Left, Right } from \"purify-ts\";\n\nimport { LKRPParsingError } from \"@api/app-binder/Errors\";\nimport { CommandTags } from \"@internal/models/Tags\";\n\nimport { hexToBytes } from \"./hex\";\nimport { LKRPBlock } from \"./LKRPBlock\";\nimport { LKRPBlockStream } from \"./LKRPBlockStream\";\nimport { LKRPCommand } from \"./LKRPCommand\";\n\ndescribe(\"LKRPBlockStream\", () => {\n describe(\"toString\", () => {\n it(\"should return the hex representation of the block stream\", () => {\n // WHEN\n const hex = \"0102030405060708\";\n const stream = LKRPBlockStream.fromHex(hex);\n // THEN\n expect(stream.toString()).toBe(hex);\n });\n });\n\n describe(\"toU8A\", () => {\n it(\"should return the bytes of the block stream\", () => {\n // WHEN\n const bytes = new Uint8Array([1, 2, 3, 4, 5, 6, 7, 8]);\n const stream = new LKRPBlockStream(bytes);\n // THEN\n expect(stream.toU8A()).toBe(bytes);\n });\n });\n\n describe(\"toHuman\", () => {\n it(\"should return a human-readable representation of the block stream\", () => {\n // GIVEN\n const stream = LKRPBlockStream.fromHex(mockedHex);\n\n // WHEN\n const humanReadable = stream.toHuman();\n\n // THEN\n expect(humanReadable).toStrictEqual(\n Right(\n [\n \"Parent: 7ba5eefac6605547fc50188ba7880311d3d1240a7ae32e6eaac7499434091c45\",\n \"Issuer: 0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021\",\n \"Commands:\",\n \" Derive(0x15):\",\n \" path: m/0'/16'/0'\",\n \" groupKey: 02839a288f6a76090b64312281d2e7d6b02c4ddf64ed5e7693471b1b445f819508\",\n \" initializationVector: a66c5a4486e870287caa53bbd609af00\",\n \" encryptedXpriv: 0f43341d6f9099a5180fb304a2889b3b0468f05fb0b931d22211753b3411567abb21981b64261e95bcd44a3512af7c87bbb5a4b6b680c03b5f09e8d9c56a9cb1c0788993a3d9d5c140a2462cb1930d19\",\n \" ephemeralPublicKey: 02fbe26c32ab991c1b107156e22fc158c335e0aeedc171381c9d77743c66f41171\",\n \" AddMember(0x11):\",\n \" name: debug-d4c61d\",\n \" publicKey: 03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812\",\n \" permissions: 4294967295\",\n \" PublishKey(0x12):\",\n \" initializationVector: 4d305eae5b70b69cf657f3b9f7db5863\",\n \" encryptedXpriv: 898de535f87f7ac775b09c80827d14efddeeaa9a2b106bfd7fcc91942dc36d6a1751793ba7ec0792ba936f5f1d858bc1fc54ca1a70e8d28a5b0bf33b5e926f3add372c802b3b9da64bc06e26b9349db5\",\n \" recipient: 03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812\",\n \" ephemeralPublicKey: 023db66b974b871c6caafdf486c6895518303b140d389e787d2c3b5527c2df50f4\",\n \"Signature: 3044022056ab426bd75696cbe9538cb42271e8796ba1576dfe3e2634f0a6f1a636821e5002205e41ae68ebd8fbff404340a4f0124af25e948aa52500de192d15ff4f8ee92c02\",\n \"\",\n \"Parent: 154d99eb867cfeef249d573fc2e1f3d307c1e49ec1f66e9af1c9dbd219143211\",\n \"Issuer: 0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021\",\n \"Commands:\",\n \" AddMember(0x11):\",\n \" name: debug-80a289\",\n \" publicKey: 0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db\",\n \" permissions: 4294967295\",\n \" PublishKey(0x12):\",\n \" initializationVector: 27bdb34fb6028128bfc919f4db7d1378\",\n \" encryptedXpriv: e792b83f26fac0de46ee8f1a07e53b0e508d9373aa2e8047f0a764204ab0f06a2fffa9c29599f5d3fe42fefabd9827867157bd14ec7e2bd8ef83c6f9371d7b48d28d9a4499f8ed626ce75fcec0a0b33f\",\n \" recipient: 0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db\",\n \" ephemeralPublicKey: 027d40157737671bb04eaca2756b8ec58020ff5c893b10cbfb25b48014c5252dc4\",\n \"Signature: 30440220718d20c9996893639da807b8a9675d944abdc8fded97f73159beba5004fa17f102203338b74a9e6a2e696ea3658d3af4fce95ffa0f74c11b2c3d37b0ca1b577657e8\",\n ].join(\"\\n\"),\n ),\n );\n });\n });\n\n describe(\"parse\", () => {\n it(\"should parse the block stream correctly\", () => {\n // GIVEN\n const stream = LKRPBlockStream.fromHex(mockedHex);\n\n // WHEN\n const parsedData = stream.parse();\n stream.toHuman(); // Run toHuman to force the parsing of the commands\n\n // THEN\n expect(parsedData).toStrictEqual(\n Right([\n LKRPBlock.fromData(mockedBlockData1),\n LKRPBlock.fromData(mockedBlockData2),\n ]),\n );\n });\n\n it(\"should fail if the block stream data is invalid\", () => {\n // GIVEN\n const invalidStream = LKRPBlockStream.fromHex(\"00\");\n // WHEN\n const parsedData = invalidStream.parse();\n\n // THEN\n expect(parsedData).toStrictEqual(\n Left(new LKRPParsingError(\"Invalid end of TLV, expected length\")),\n );\n });\n });\n\n describe(\"fromData\", () => {\n it(\"should create a BlockStream from data\", () => {\n // GIVEN\n const mockedBlockData = [\n { ...mockedBlockData1, parent: undefined },\n { ...mockedBlockData2, parent: undefined },\n ];\n\n // WHEN\n const stream = LKRPBlockStream.fromData(\n mockedBlockData,\n mockedBlockData1.parent,\n );\n\n // THEN\n expect(stream.toString()).toBe(mockedHex);\n });\n\n it(\"should assign a random parent hash if not provided\", () => {\n // GIVEN\n const mockedBlockData = [\n { ...mockedBlockData1, parent: undefined },\n { ...mockedBlockData2, parent: undefined },\n ];\n // WHEN\n const stream = LKRPBlockStream.fromData(mockedBlockData);\n const hash = stream\n .parse()\n .map((blocks) => blocks[0]?.hash())\n .caseOf({ Left: () => undefined, Right: (h) => h });\n\n // THEN\n expect(typeof hash).toBe(\"string\");\n expect(hash?.length).toBe(64); // 32 bytes in hex\n expect(hash).not.toBe(mockedBlockData1.parent);\n });\n });\n\n describe(\"validate\", () => {\n it(\"should validate the block stream\", async () => {\n // GIVEN\n const stream = LKRPBlockStream.fromHex(mockedHex);\n\n // WHEN\n const withParentHash = await stream.validate(mockedBlockData1.parent);\n const withoutParentHash = await stream.validate(mockedBlockData1.parent);\n\n // THEN\n expect(withParentHash).toBe(true);\n expect(withoutParentHash).toBe(true);\n });\n\n it(\"should fail validation if the parent hash does not match\", async () => {\n // GIVEN\n const invalidStream = LKRPBlockStream.fromHex(\n mockedHex.replace(mockedBlockData2.parent, mockedBlockData1.parent),\n );\n\n // WHEN\n const wrongBlock1 = await invalidStream.validate(\"0123455678\");\n const wrongBlock2 = await invalidStream.validate();\n\n // THEN\n expect(wrongBlock1).toBe(false);\n expect(wrongBlock2).toBe(false);\n });\n });\n\n describe(\"getPath\", () => {\n it(\"should return the path of the block stream\", () => {\n // GIVEN\n const stream = LKRPBlockStream.fromHex(mockedHex);\n\n // WHEN\n const path = stream.getPath();\n\n // THEN\n expect(path).toEqual(Just(\"m/0'/16'/0'\"));\n });\n });\n});\n\nconst mockedHex = `\n 01 01 01\n 02 20 7b a5 ee fa c6 60 55 47 fc 50 18 8b a7 88 03 11 d3 d1 24 0a 7a e3 2e 6e aa c7 49 94 34 09 1c 45\n 06 21 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21\n 01 01 03\n 15 b8\n 05 0c 80 00 00 00 80 00 00 10 80 00 00 00\n 06 21 02 83 9a 28 8f 6a 76 09 0b 64 31 22 81 d2 e7 d6 b0 2c 4d df 64 ed 5e 76 93 47 1b 1b 44 5f 81 95 08\n 05 10 a6 6c 5a 44 86 e8 70 28 7c aa 53 bb d6 09 af 00\n 05 50 0f 43 34 1d 6f 90 99 a5 18 0f b3 04 a2 88 9b 3b 04 68 f0 5f b0 b9 31 d2 22 11 75 3b 34 11 56 7a bb 21 98 1b 64 26 1e 95 bc d4 4a 35 12 af 7c 87 bb b5 a4 b6 b6 80 c0 3b 5f 09 e8 d9 c5 6a 9c b1 c0 78 89 93 a3 d9 d5 c1 40 a2 46 2c b1 93 0d 19\n 06 21 02 fb e2 6c 32 ab 99 1c 1b 10 71 56 e2 2f c1 58 c3 35 e0 ae ed c1 71 38 1c 9d 77 74 3c 66 f4 11 71\n 11 37\n 04 0c 64 65 62 75 67 2d 64 34 63 36 31 64\n 06 21 03 d4 c6 1d da 2a af 76 29 54 fc e9 73 96 d9 be 03 99 e1 dc 75 c3 b7 90 c7 a3 4d de 85 96 a1 18 12\n 01 04 ff ff ff ff\n 12 aa\n 05 10 4d 30 5e ae 5b 70 b6 9c f6 57 f3 b9 f7 db 58 63\n 05 50 89 8d e5 35 f8 7f 7a c7 75 b0 9c 80 82 7d 14 ef dd ee aa 9a 2b 10 6b fd 7f cc 91 94 2d c3 6d 6a 17 51 79 3b a7 ec 07 92 ba 93 6f 5f 1d 85 8b c1 fc 54 ca 1a 70 e8 d2 8a 5b 0b f3 3b 5e 92 6f 3a dd 37 2c 80 2b 3b 9d a6 4b c0 6e 26 b9 34 9d b5\n 06 21 03 d4 c6 1d da 2a af 76 29 54 fc e9 73 96 d9 be 03 99 e1 dc 75 c3 b7 90 c7 a3 4d de 85 96 a1 18 12\n 06 21 02 3d b6 6b 97 4b 87 1c 6c aa fd f4 86 c6 89 55 18 30 3b 14 0d 38 9e 78 7d 2c 3b 55 27 c2 df 50 f4\n 03 46 30 44 02 20 56 ab 42 6b d7 56 96 cb e9 53 8c b4 22 71 e8 79 6b a1 57 6d fe 3e 26 34 f0 a6 f1 a6 36 82 1e 50 02 20 5e 41 ae 68 eb d8 fb ff 40 43 40 a4 f0 12 4a f2 5e 94 8a a5 25 00 de 19 2d 15 ff 4f 8e e9 2c 02\n\n 01 01 01\n 02 20 15 4d 99 eb 86 7c fe ef 24 9d 57 3f c2 e1 f3 d3 07 c1 e4 9e c1 f6 6e 9a f1 c9 db d2 19 14 32 11 \n 06 21 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21\n 01 01 02\n 11 37\n 04 0c 64 65 62 75 67 2d 38 30 61 32 38 39\n 06 21 02 80 a2 89 18 36 9e 12 c8 6f eb 32 1c d1 00 fe 6d 95 8e 55 a0 bb 57 05 76 ef 71 8e 7a 37 92 04 db\n 01 04 ff ff ff ff\n 12 aa\n 05 10 27 bd b3 4f b6 02 81 28 bf c9 19 f4 db 7d 13 78\n 05 50 e7 92 b8 3f 26 fa c0 de 46 ee 8f 1a 07 e5 3b 0e 50 8d 93 73 aa 2e 80 47 f0 a7 64 20 4a b0 f0 6a 2f ff a9 c2 95 99 f5 d3 fe 42 fe fa bd 98 27 86 71 57 bd 14 ec 7e 2b d8 ef 83 c6 f9 37 1d 7b 48 d2 8d 9a 44 99 f8 ed 62 6c e7 5f ce c0 a0 b3 3f\n 06 21 02 80 a2 89 18 36 9e 12 c8 6f eb 32 1c d1 00 fe 6d 95 8e 55 a0 bb 57 05 76 ef 71 8e 7a 37 92 04 db\n 06 21 02 7d 40 15 77 37 67 1b b0 4e ac a2 75 6b 8e c5 80 20 ff 5c 89 3b 10 cb fb 25 b4 80 14 c5 25 2d c4\n 03 46 30 44 02 20 71 8d 20 c9 99 68 93 63 9d a8 07 b8 a9 67 5d 94 4a bd c8 fd ed 97 f7 31 59 be ba 50 04 fa 17 f1 02 20 33 38 b7 4a 9e 6a 2e 69 6e a3 65 8d 3a f4 fc e9 5f fa 0f 74 c1 1b 2c 3d 37 b0 ca 1b 57 76 57 e8 \n`.replace(/\\s/g, \"\");\n\nconst mockedBlockData1 = {\n parent: \"7ba5eefac6605547fc50188ba7880311d3d1240a7ae32e6eaac7499434091c45\",\n issuer: hexToBytes(\n \"0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021\",\n ),\n commands: [\n LKRPCommand.fromData({\n type: CommandTags.Derive,\n path: \"m/0'/16'/0'\",\n groupKey: hexToBytes(\n \"02839a288f6a76090b64312281d2e7d6b02c4ddf64ed5e7693471b1b445f819508\",\n ),\n initializationVector: hexToBytes(\"a66c5a4486e870287caa53bbd609af00\"),\n encryptedXpriv: hexToBytes(\n \"0f43341d6f9099a5180fb304a2889b3b0468f05fb0b931d22211753b3411567abb21981b64261e95bcd44a3512af7c87bbb5a4b6b680c03b5f09e8d9c56a9cb1c0788993a3d9d5c140a2462cb1930d19\",\n ),\n ephemeralPublicKey: hexToBytes(\n \"02fbe26c32ab991c1b107156e22fc158c335e0aeedc171381c9d77743c66f41171\",\n ),\n }),\n LKRPCommand.fromData({\n type: CommandTags.AddMember,\n name: \"debug-d4c61d\",\n publicKey: hexToBytes(\n \"03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812\",\n ),\n permissions: 0xffffffff,\n }),\n LKRPCommand.fromData({\n type: CommandTags.PublishKey,\n initializationVector: hexToBytes(\"4d305eae5b70b69cf657f3b9f7db5863\"),\n encryptedXpriv: hexToBytes(\n \"898de535f87f7ac775b09c80827d14efddeeaa9a2b106bfd7fcc91942dc36d6a1751793ba7ec0792ba936f5f1d858bc1fc54ca1a70e8d28a5b0bf33b5e926f3add372c802b3b9da64bc06e26b9349db5\",\n ),\n recipient: hexToBytes(\n \"03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812\",\n ),\n ephemeralPublicKey: hexToBytes(\n \"023db66b974b871c6caafdf486c6895518303b140d389e787d2c3b5527c2df50f4\",\n ),\n }),\n ],\n signature: hexToBytes(\n \"3044022056ab426bd75696cbe9538cb42271e8796ba1576dfe3e2634f0a6f1a636821e5002205e41ae68ebd8fbff404340a4f0124af25e948aa52500de192d15ff4f8ee92c02\",\n ),\n};\nconst mockedBlockData2 = {\n parent: \"154d99eb867cfeef249d573fc2e1f3d307c1e49ec1f66e9af1c9dbd219143211\",\n issuer: hexToBytes(\n \"0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021\",\n ),\n commands: [\n LKRPCommand.fromData({\n type: CommandTags.AddMember,\n name: \"debug-80a289\",\n publicKey: hexToBytes(\n \"0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db\",\n ),\n permissions: 0xffffffff,\n }),\n LKRPCommand.fromData({\n type: CommandTags.PublishKey,\n initializationVector: hexToBytes(\"27bdb34fb6028128bfc919f4db7d1378\"),\n encryptedXpriv: hexToBytes(\n \"e792b83f26fac0de46ee8f1a07e53b0e508d9373aa2e8047f0a764204ab0f06a2fffa9c29599f5d3fe42fefabd9827867157bd14ec7e2bd8ef83c6f9371d7b48d28d9a4499f8ed626ce75fcec0a0b33f\",\n ),\n recipient: hexToBytes(\n \"0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db\",\n ),\n ephemeralPublicKey: hexToBytes(\n \"027d40157737671bb04eaca2756b8ec58020ff5c893b10cbfb25b48014c5252dc4\",\n ),\n }),\n ],\n signature: hexToBytes(\n \"30440220718d20c9996893639da807b8a9675d944abdc8fded97f73159beba5004fa17f102203338b74a9e6a2e696ea3658d3af4fce95ffa0f74c11b2c3d37b0ca1b577657e8\",\n ),\n};\n"],
|
|
5
|
-
"mappings": "AAAA,OAAS,
|
|
6
|
-
"names": ["Just", "Left", "Right", "LKRPParsingError", "CommandTags", "
|
|
4
|
+
"sourcesContent": ["import { hexaStringToBuffer } from \"@ledgerhq/device-management-kit\";\nimport { Just, Left, Right } from \"purify-ts\";\n\nimport { LKRPParsingError } from \"@api/model/Errors\";\nimport { CommandTags } from \"@internal/models/Tags\";\n\nimport { LKRPBlock } from \"./LKRPBlock\";\nimport { LKRPBlockStream } from \"./LKRPBlockStream\";\nimport { LKRPCommand } from \"./LKRPCommand\";\n\ndescribe(\"LKRPBlockStream\", () => {\n describe(\"toString\", () => {\n it(\"should return the hex representation of the block stream\", () => {\n // WHEN\n const hex = \"0102030405060708\";\n const stream = LKRPBlockStream.fromHex(hex);\n // THEN\n expect(stream.toString()).toBe(hex);\n });\n });\n\n describe(\"toU8A\", () => {\n it(\"should return the bytes of the block stream\", () => {\n // WHEN\n const bytes = new Uint8Array([1, 2, 3, 4, 5, 6, 7, 8]);\n const stream = new LKRPBlockStream(bytes);\n // THEN\n expect(stream.toU8A()).toBe(bytes);\n });\n });\n\n describe(\"toHuman\", () => {\n it(\"should return a human-readable representation of the block stream\", () => {\n // GIVEN\n const stream = LKRPBlockStream.fromHex(mockedHex);\n\n // WHEN\n const humanReadable = stream.toHuman();\n\n // THEN\n expect(humanReadable).toStrictEqual(\n Right(\n [\n \"Parent: 7ba5eefac6605547fc50188ba7880311d3d1240a7ae32e6eaac7499434091c45\",\n \"Issuer: 0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021\",\n \"Commands:\",\n \" Derive(0x15):\",\n \" path: m/0'/16'/0'\",\n \" groupKey: 02839a288f6a76090b64312281d2e7d6b02c4ddf64ed5e7693471b1b445f819508\",\n \" initializationVector: a66c5a4486e870287caa53bbd609af00\",\n \" encryptedXpriv: 0f43341d6f9099a5180fb304a2889b3b0468f05fb0b931d22211753b3411567abb21981b64261e95bcd44a3512af7c87bbb5a4b6b680c03b5f09e8d9c56a9cb1c0788993a3d9d5c140a2462cb1930d19\",\n \" ephemeralPublicKey: 02fbe26c32ab991c1b107156e22fc158c335e0aeedc171381c9d77743c66f41171\",\n \" AddMember(0x11):\",\n \" name: debug-d4c61d\",\n \" publicKey: 03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812\",\n \" permissions: 4294967295\",\n \" PublishKey(0x12):\",\n \" initializationVector: 4d305eae5b70b69cf657f3b9f7db5863\",\n \" encryptedXpriv: 898de535f87f7ac775b09c80827d14efddeeaa9a2b106bfd7fcc91942dc36d6a1751793ba7ec0792ba936f5f1d858bc1fc54ca1a70e8d28a5b0bf33b5e926f3add372c802b3b9da64bc06e26b9349db5\",\n \" recipient: 03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812\",\n \" ephemeralPublicKey: 023db66b974b871c6caafdf486c6895518303b140d389e787d2c3b5527c2df50f4\",\n \"Signature: 3044022056ab426bd75696cbe9538cb42271e8796ba1576dfe3e2634f0a6f1a636821e5002205e41ae68ebd8fbff404340a4f0124af25e948aa52500de192d15ff4f8ee92c02\",\n \"\",\n \"Parent: 154d99eb867cfeef249d573fc2e1f3d307c1e49ec1f66e9af1c9dbd219143211\",\n \"Issuer: 0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021\",\n \"Commands:\",\n \" AddMember(0x11):\",\n \" name: debug-80a289\",\n \" publicKey: 0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db\",\n \" permissions: 4294967295\",\n \" PublishKey(0x12):\",\n \" initializationVector: 27bdb34fb6028128bfc919f4db7d1378\",\n \" encryptedXpriv: e792b83f26fac0de46ee8f1a07e53b0e508d9373aa2e8047f0a764204ab0f06a2fffa9c29599f5d3fe42fefabd9827867157bd14ec7e2bd8ef83c6f9371d7b48d28d9a4499f8ed626ce75fcec0a0b33f\",\n \" recipient: 0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db\",\n \" ephemeralPublicKey: 027d40157737671bb04eaca2756b8ec58020ff5c893b10cbfb25b48014c5252dc4\",\n \"Signature: 30440220718d20c9996893639da807b8a9675d944abdc8fded97f73159beba5004fa17f102203338b74a9e6a2e696ea3658d3af4fce95ffa0f74c11b2c3d37b0ca1b577657e8\",\n ].join(\"\\n\"),\n ),\n );\n });\n });\n\n describe(\"parse\", () => {\n it(\"should parse the block stream correctly\", () => {\n // GIVEN\n const stream = LKRPBlockStream.fromHex(mockedHex);\n\n // WHEN\n const parsedData = stream.parse();\n stream.toHuman(); // Run toHuman to force the parsing of the commands\n\n // THEN\n expect(parsedData).toStrictEqual(\n Right([\n LKRPBlock.fromData(mockedBlockData1),\n LKRPBlock.fromData(mockedBlockData2),\n ]),\n );\n });\n\n it(\"should fail if the block stream data is invalid\", () => {\n // GIVEN\n const invalidStream = LKRPBlockStream.fromHex(\"00\");\n // WHEN\n const parsedData = invalidStream.parse();\n\n // THEN\n expect(parsedData).toStrictEqual(\n Left(new LKRPParsingError(\"Invalid end of TLV, expected length\")),\n );\n });\n });\n\n describe(\"fromData\", () => {\n it(\"should create a BlockStream from data\", () => {\n // GIVEN\n const mockedBlockData = [\n { ...mockedBlockData1, parent: undefined },\n { ...mockedBlockData2, parent: undefined },\n ];\n\n // WHEN\n const stream = LKRPBlockStream.fromData(\n mockedBlockData,\n mockedBlockData1.parent,\n );\n\n // THEN\n expect(stream.toString()).toBe(mockedHex);\n });\n\n it(\"should assign a random parent hash if not provided\", () => {\n // GIVEN\n const mockedBlockData = [\n { ...mockedBlockData1, parent: undefined },\n { ...mockedBlockData2, parent: undefined },\n ];\n // WHEN\n const stream = LKRPBlockStream.fromData(mockedBlockData);\n const hash = stream\n .parse()\n .map((blocks) => blocks[0]?.hash())\n .caseOf({ Left: () => undefined, Right: (h) => h });\n\n // THEN\n expect(typeof hash).toBe(\"string\");\n expect(hash?.length).toBe(64); // 32 bytes in hex\n expect(hash).not.toBe(mockedBlockData1.parent);\n });\n });\n\n describe(\"validate\", () => {\n it(\"should validate the block stream\", async () => {\n // GIVEN\n const stream = LKRPBlockStream.fromHex(mockedHex);\n\n // WHEN\n const withParentHash = await stream.validate(mockedBlockData1.parent);\n const withoutParentHash = await stream.validate(mockedBlockData1.parent);\n\n // THEN\n expect(withParentHash).toBe(true);\n expect(withoutParentHash).toBe(true);\n });\n\n it(\"should fail validation if the parent hash does not match\", async () => {\n // GIVEN\n const invalidStream = LKRPBlockStream.fromHex(\n mockedHex.replace(mockedBlockData2.parent, mockedBlockData1.parent),\n );\n\n // WHEN\n const wrongBlock1 = await invalidStream.validate(\"0123455678\");\n const wrongBlock2 = await invalidStream.validate();\n\n // THEN\n expect(wrongBlock1).toBe(false);\n expect(wrongBlock2).toBe(false);\n });\n });\n\n describe(\"getPath\", () => {\n it(\"should return the path of the block stream\", () => {\n // GIVEN\n const stream = LKRPBlockStream.fromHex(mockedHex);\n\n // WHEN\n const path = stream.getPath();\n\n // THEN\n expect(path).toEqual(Just(\"m/0'/16'/0'\"));\n });\n });\n});\n\nconst mockedHex = `\n 01 01 01\n 02 20 7b a5 ee fa c6 60 55 47 fc 50 18 8b a7 88 03 11 d3 d1 24 0a 7a e3 2e 6e aa c7 49 94 34 09 1c 45\n 06 21 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21\n 01 01 03\n 15 b8\n 05 0c 80 00 00 00 80 00 00 10 80 00 00 00\n 06 21 02 83 9a 28 8f 6a 76 09 0b 64 31 22 81 d2 e7 d6 b0 2c 4d df 64 ed 5e 76 93 47 1b 1b 44 5f 81 95 08\n 05 10 a6 6c 5a 44 86 e8 70 28 7c aa 53 bb d6 09 af 00\n 05 50 0f 43 34 1d 6f 90 99 a5 18 0f b3 04 a2 88 9b 3b 04 68 f0 5f b0 b9 31 d2 22 11 75 3b 34 11 56 7a bb 21 98 1b 64 26 1e 95 bc d4 4a 35 12 af 7c 87 bb b5 a4 b6 b6 80 c0 3b 5f 09 e8 d9 c5 6a 9c b1 c0 78 89 93 a3 d9 d5 c1 40 a2 46 2c b1 93 0d 19\n 06 21 02 fb e2 6c 32 ab 99 1c 1b 10 71 56 e2 2f c1 58 c3 35 e0 ae ed c1 71 38 1c 9d 77 74 3c 66 f4 11 71\n 11 37\n 04 0c 64 65 62 75 67 2d 64 34 63 36 31 64\n 06 21 03 d4 c6 1d da 2a af 76 29 54 fc e9 73 96 d9 be 03 99 e1 dc 75 c3 b7 90 c7 a3 4d de 85 96 a1 18 12\n 01 04 ff ff ff ff\n 12 aa\n 05 10 4d 30 5e ae 5b 70 b6 9c f6 57 f3 b9 f7 db 58 63\n 05 50 89 8d e5 35 f8 7f 7a c7 75 b0 9c 80 82 7d 14 ef dd ee aa 9a 2b 10 6b fd 7f cc 91 94 2d c3 6d 6a 17 51 79 3b a7 ec 07 92 ba 93 6f 5f 1d 85 8b c1 fc 54 ca 1a 70 e8 d2 8a 5b 0b f3 3b 5e 92 6f 3a dd 37 2c 80 2b 3b 9d a6 4b c0 6e 26 b9 34 9d b5\n 06 21 03 d4 c6 1d da 2a af 76 29 54 fc e9 73 96 d9 be 03 99 e1 dc 75 c3 b7 90 c7 a3 4d de 85 96 a1 18 12\n 06 21 02 3d b6 6b 97 4b 87 1c 6c aa fd f4 86 c6 89 55 18 30 3b 14 0d 38 9e 78 7d 2c 3b 55 27 c2 df 50 f4\n 03 46 30 44 02 20 56 ab 42 6b d7 56 96 cb e9 53 8c b4 22 71 e8 79 6b a1 57 6d fe 3e 26 34 f0 a6 f1 a6 36 82 1e 50 02 20 5e 41 ae 68 eb d8 fb ff 40 43 40 a4 f0 12 4a f2 5e 94 8a a5 25 00 de 19 2d 15 ff 4f 8e e9 2c 02\n\n 01 01 01\n 02 20 15 4d 99 eb 86 7c fe ef 24 9d 57 3f c2 e1 f3 d3 07 c1 e4 9e c1 f6 6e 9a f1 c9 db d2 19 14 32 11 \n 06 21 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21\n 01 01 02\n 11 37\n 04 0c 64 65 62 75 67 2d 38 30 61 32 38 39\n 06 21 02 80 a2 89 18 36 9e 12 c8 6f eb 32 1c d1 00 fe 6d 95 8e 55 a0 bb 57 05 76 ef 71 8e 7a 37 92 04 db\n 01 04 ff ff ff ff\n 12 aa\n 05 10 27 bd b3 4f b6 02 81 28 bf c9 19 f4 db 7d 13 78\n 05 50 e7 92 b8 3f 26 fa c0 de 46 ee 8f 1a 07 e5 3b 0e 50 8d 93 73 aa 2e 80 47 f0 a7 64 20 4a b0 f0 6a 2f ff a9 c2 95 99 f5 d3 fe 42 fe fa bd 98 27 86 71 57 bd 14 ec 7e 2b d8 ef 83 c6 f9 37 1d 7b 48 d2 8d 9a 44 99 f8 ed 62 6c e7 5f ce c0 a0 b3 3f\n 06 21 02 80 a2 89 18 36 9e 12 c8 6f eb 32 1c d1 00 fe 6d 95 8e 55 a0 bb 57 05 76 ef 71 8e 7a 37 92 04 db\n 06 21 02 7d 40 15 77 37 67 1b b0 4e ac a2 75 6b 8e c5 80 20 ff 5c 89 3b 10 cb fb 25 b4 80 14 c5 25 2d c4\n 03 46 30 44 02 20 71 8d 20 c9 99 68 93 63 9d a8 07 b8 a9 67 5d 94 4a bd c8 fd ed 97 f7 31 59 be ba 50 04 fa 17 f1 02 20 33 38 b7 4a 9e 6a 2e 69 6e a3 65 8d 3a f4 fc e9 5f fa 0f 74 c1 1b 2c 3d 37 b0 ca 1b 57 76 57 e8 \n`.replace(/\\s/g, \"\");\n\nconst mockedBlockData1 = {\n parent: \"7ba5eefac6605547fc50188ba7880311d3d1240a7ae32e6eaac7499434091c45\",\n issuer: hexaStringToBuffer(\n \"0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021\",\n )!,\n commands: [\n LKRPCommand.fromData({\n type: CommandTags.Derive,\n path: \"m/0'/16'/0'\",\n groupKey: hexaStringToBuffer(\n \"02839a288f6a76090b64312281d2e7d6b02c4ddf64ed5e7693471b1b445f819508\",\n )!,\n initializationVector: hexaStringToBuffer(\n \"a66c5a4486e870287caa53bbd609af00\",\n )!,\n encryptedXpriv: hexaStringToBuffer(\n \"0f43341d6f9099a5180fb304a2889b3b0468f05fb0b931d22211753b3411567abb21981b64261e95bcd44a3512af7c87bbb5a4b6b680c03b5f09e8d9c56a9cb1c0788993a3d9d5c140a2462cb1930d19\",\n )!,\n ephemeralPublicKey: hexaStringToBuffer(\n \"02fbe26c32ab991c1b107156e22fc158c335e0aeedc171381c9d77743c66f41171\",\n )!,\n }),\n LKRPCommand.fromData({\n type: CommandTags.AddMember,\n name: \"debug-d4c61d\",\n publicKey: hexaStringToBuffer(\n \"03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812\",\n )!,\n permissions: 0xffffffff,\n }),\n LKRPCommand.fromData({\n type: CommandTags.PublishKey,\n initializationVector: hexaStringToBuffer(\n \"4d305eae5b70b69cf657f3b9f7db5863\",\n )!,\n encryptedXpriv: hexaStringToBuffer(\n \"898de535f87f7ac775b09c80827d14efddeeaa9a2b106bfd7fcc91942dc36d6a1751793ba7ec0792ba936f5f1d858bc1fc54ca1a70e8d28a5b0bf33b5e926f3add372c802b3b9da64bc06e26b9349db5\",\n )!,\n recipient: hexaStringToBuffer(\n \"03d4c61dda2aaf762954fce97396d9be0399e1dc75c3b790c7a34dde8596a11812\",\n )!,\n ephemeralPublicKey: hexaStringToBuffer(\n \"023db66b974b871c6caafdf486c6895518303b140d389e787d2c3b5527c2df50f4\",\n )!,\n }),\n ],\n signature: hexaStringToBuffer(\n \"3044022056ab426bd75696cbe9538cb42271e8796ba1576dfe3e2634f0a6f1a636821e5002205e41ae68ebd8fbff404340a4f0124af25e948aa52500de192d15ff4f8ee92c02\",\n )!,\n};\nconst mockedBlockData2 = {\n parent: \"154d99eb867cfeef249d573fc2e1f3d307c1e49ec1f66e9af1c9dbd219143211\",\n issuer: hexaStringToBuffer(\n \"0102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021\",\n )!,\n commands: [\n LKRPCommand.fromData({\n type: CommandTags.AddMember,\n name: \"debug-80a289\",\n publicKey: hexaStringToBuffer(\n \"0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db\",\n )!,\n permissions: 0xffffffff,\n }),\n LKRPCommand.fromData({\n type: CommandTags.PublishKey,\n initializationVector: hexaStringToBuffer(\n \"27bdb34fb6028128bfc919f4db7d1378\",\n )!,\n encryptedXpriv: hexaStringToBuffer(\n \"e792b83f26fac0de46ee8f1a07e53b0e508d9373aa2e8047f0a764204ab0f06a2fffa9c29599f5d3fe42fefabd9827867157bd14ec7e2bd8ef83c6f9371d7b48d28d9a4499f8ed626ce75fcec0a0b33f\",\n )!,\n recipient: hexaStringToBuffer(\n \"0280a28918369e12c86feb321cd100fe6d958e55a0bb570576ef718e7a379204db\",\n )!,\n ephemeralPublicKey: hexaStringToBuffer(\n \"027d40157737671bb04eaca2756b8ec58020ff5c893b10cbfb25b48014c5252dc4\",\n )!,\n }),\n ],\n signature: hexaStringToBuffer(\n \"30440220718d20c9996893639da807b8a9675d944abdc8fded97f73159beba5004fa17f102203338b74a9e6a2e696ea3658d3af4fce95ffa0f74c11b2c3d37b0ca1b577657e8\",\n )!,\n};\n"],
|
|
5
|
+
"mappings": "AAAA,OAAS,sBAAAA,MAA0B,kCACnC,OAAS,QAAAC,EAAM,QAAAC,EAAM,SAAAC,MAAa,YAElC,OAAS,oBAAAC,MAAwB,oBACjC,OAAS,eAAAC,MAAmB,wBAE5B,OAAS,aAAAC,MAAiB,cAC1B,OAAS,mBAAAC,MAAuB,oBAChC,OAAS,eAAAC,MAAmB,gBAE5B,SAAS,kBAAmB,IAAM,CAChC,SAAS,WAAY,IAAM,CACzB,GAAG,2DAA4D,IAAM,CAEnE,MAAMC,EAAM,mBACNC,EAASH,EAAgB,QAAQE,CAAG,EAE1C,OAAOC,EAAO,SAAS,CAAC,EAAE,KAAKD,CAAG,CACpC,CAAC,CACH,CAAC,EAED,SAAS,QAAS,IAAM,CACtB,GAAG,8CAA+C,IAAM,CAEtD,MAAME,EAAQ,IAAI,WAAW,CAAC,EAAG,EAAG,EAAG,EAAG,EAAG,EAAG,EAAG,CAAC,CAAC,EAC/CD,EAAS,IAAIH,EAAgBI,CAAK,EAExC,OAAOD,EAAO,MAAM,CAAC,EAAE,KAAKC,CAAK,CACnC,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,oEAAqE,IAAM,CAK5E,MAAMC,EAHSL,EAAgB,QAAQM,CAAS,EAGnB,QAAQ,EAGrC,OAAOD,CAAa,EAAE,cACpBT,EACE,CACE,2EACA,6EACA,YACA,kBACA,wBACA,mFACA,6DACA,uLACA,6FACA,qBACA,yBACA,oFACA,8BACA,sBACA,6DACA,uLACA,oFACA,6FACA,0JACA,GACA,2EACA,6EACA,YACA,qBACA,yBACA,oFACA,8BACA,sBACA,6DACA,uLACA,oFACA,6FACA,yJACF,EAAE,KAAK;AAAA,CAAI,CACb,CACF,CACF,CAAC,CACH,CAAC,EAED,SAAS,QAAS,IAAM,CACtB,GAAG,0CAA2C,IAAM,CAElD,MAAMO,EAASH,EAAgB,QAAQM,CAAS,EAG1CC,EAAaJ,EAAO,MAAM,EAChCA,EAAO,QAAQ,EAGf,OAAOI,CAAU,EAAE,cACjBX,EAAM,CACJG,EAAU,SAASS,CAAgB,EACnCT,EAAU,SAASU,CAAgB,CACrC,CAAC,CACH,CACF,CAAC,EAED,GAAG,kDAAmD,IAAM,CAI1D,MAAMF,EAFgBP,EAAgB,QAAQ,IAAI,EAEjB,MAAM,EAGvC,OAAOO,CAAU,EAAE,cACjBZ,EAAK,IAAIE,EAAiB,qCAAqC,CAAC,CAClE,CACF,CAAC,CACH,CAAC,EAED,SAAS,WAAY,IAAM,CACzB,GAAG,wCAAyC,IAAM,CAEhD,MAAMa,EAAkB,CACtB,CAAE,GAAGF,EAAkB,OAAQ,MAAU,EACzC,CAAE,GAAGC,EAAkB,OAAQ,MAAU,CAC3C,EAGMN,EAASH,EAAgB,SAC7BU,EACAF,EAAiB,MACnB,EAGA,OAAOL,EAAO,SAAS,CAAC,EAAE,KAAKG,CAAS,CAC1C,CAAC,EAED,GAAG,qDAAsD,IAAM,CAE7D,MAAMI,EAAkB,CACtB,CAAE,GAAGF,EAAkB,OAAQ,MAAU,EACzC,CAAE,GAAGC,EAAkB,OAAQ,MAAU,CAC3C,EAGME,EADSX,EAAgB,SAASU,CAAe,EAEpD,MAAM,EACN,IAAKE,GAAWA,EAAO,CAAC,GAAG,KAAK,CAAC,EACjC,OAAO,CAAE,KAAM,IAAG,GAAc,MAAQC,GAAMA,CAAE,CAAC,EAGpD,OAAO,OAAOF,CAAI,EAAE,KAAK,QAAQ,EACjC,OAAOA,GAAM,MAAM,EAAE,KAAK,EAAE,EAC5B,OAAOA,CAAI,EAAE,IAAI,KAAKH,EAAiB,MAAM,CAC/C,CAAC,CACH,CAAC,EAED,SAAS,WAAY,IAAM,CACzB,GAAG,mCAAoC,SAAY,CAEjD,MAAML,EAASH,EAAgB,QAAQM,CAAS,EAG1CQ,EAAiB,MAAMX,EAAO,SAASK,EAAiB,MAAM,EAC9DO,EAAoB,MAAMZ,EAAO,SAASK,EAAiB,MAAM,EAGvE,OAAOM,CAAc,EAAE,KAAK,EAAI,EAChC,OAAOC,CAAiB,EAAE,KAAK,EAAI,CACrC,CAAC,EAED,GAAG,2DAA4D,SAAY,CAEzE,MAAMC,EAAgBhB,EAAgB,QACpCM,EAAU,QAAQG,EAAiB,OAAQD,EAAiB,MAAM,CACpE,EAGMS,EAAc,MAAMD,EAAc,SAAS,YAAY,EACvDE,EAAc,MAAMF,EAAc,SAAS,EAGjD,OAAOC,CAAW,EAAE,KAAK,EAAK,EAC9B,OAAOC,CAAW,EAAE,KAAK,EAAK,CAChC,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,6CAA8C,IAAM,CAKrD,MAAMC,EAHSnB,EAAgB,QAAQM,CAAS,EAG5B,QAAQ,EAG5B,OAAOa,CAAI,EAAE,QAAQzB,EAAK,aAAa,CAAC,CAC1C,CAAC,CACH,CAAC,CACH,CAAC,EAED,MAAMY,EAAY;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAoChB,QAAQ,MAAO,EAAE,EAEbE,EAAmB,CACvB,OAAQ,mEACR,OAAQf,EACN,oEACF,EACA,SAAU,CACRQ,EAAY,SAAS,CACnB,KAAMH,EAAY,OAClB,KAAM,cACN,SAAUL,EACR,oEACF,EACA,qBAAsBA,EACpB,kCACF,EACA,eAAgBA,EACd,kKACF,EACA,mBAAoBA,EAClB,oEACF,CACF,CAAC,EACDQ,EAAY,SAAS,CACnB,KAAMH,EAAY,UAClB,KAAM,eACN,UAAWL,EACT,oEACF,EACA,YAAa,UACf,CAAC,EACDQ,EAAY,SAAS,CACnB,KAAMH,EAAY,WAClB,qBAAsBL,EACpB,kCACF,EACA,eAAgBA,EACd,kKACF,EACA,UAAWA,EACT,oEACF,EACA,mBAAoBA,EAClB,oEACF,CACF,CAAC,CACH,EACA,UAAWA,EACT,8IACF,CACF,EACMgB,EAAmB,CACvB,OAAQ,mEACR,OAAQhB,EACN,oEACF,EACA,SAAU,CACRQ,EAAY,SAAS,CACnB,KAAMH,EAAY,UAClB,KAAM,eACN,UAAWL,EACT,oEACF,EACA,YAAa,UACf,CAAC,EACDQ,EAAY,SAAS,CACnB,KAAMH,EAAY,WAClB,qBAAsBL,EACpB,kCACF,EACA,eAAgBA,EACd,kKACF,EACA,UAAWA,EACT,oEACF,EACA,mBAAoBA,EAClB,oEACF,CACF,CAAC,CACH,EACA,UAAWA,EACT,8IACF,CACF",
|
|
6
|
+
"names": ["hexaStringToBuffer", "Just", "Left", "Right", "LKRPParsingError", "CommandTags", "LKRPBlock", "LKRPBlockStream", "LKRPCommand", "hex", "stream", "bytes", "humanReadable", "mockedHex", "parsedData", "mockedBlockData1", "mockedBlockData2", "mockedBlockData", "hash", "blocks", "h", "withParentHash", "withoutParentHash", "invalidStream", "wrongBlock1", "wrongBlock2", "path"]
|
|
7
7
|
}
|
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
import{Just as
|
|
2
|
-
`))}getPublicKey(){switch(this.bytes[0]){case
|
|
1
|
+
import{bufferToHexaString as y,ByteArrayBuilder as a,hexaStringToBuffer as f}from"@ledgerhq/device-management-kit";import{Just as c,Maybe as p,Nothing as s,Right as b}from"purify-ts";import{CommandTags as n,GeneralTags as r}from"../models/Tags";import{derivationPathAsBytes as u}from"./derivationPath";import{TLVParser as l}from"./TLVParser";class m{constructor(e,t){this.bytes=e;this.data=t?c(b(t)):s}data;static fromHex(e){return new m(f(e)??new Uint8Array)}static fromData(e){const t=new a;switch(e.type){case n.Seed:t.encodeInTLVFromBuffer(r.Bytes,e.topic).encodeInTLVFromUInt16(r.Int,e.protocolVersion).encodeInTLVFromBuffer(r.PublicKey,e.groupKey).encodeInTLVFromBuffer(r.Bytes,e.initializationVector).encodeInTLVFromBuffer(r.Bytes,e.encryptedXpriv).encodeInTLVFromBuffer(r.PublicKey,e.ephemeralPublicKey);break;case n.AddMember:{const o=new ArrayBuffer(4);new DataView(o).setUint32(0,e.permissions),t.encodeInTLVFromAscii(r.String,e.name).encodeInTLVFromBuffer(r.PublicKey,e.publicKey).encodeInTLVFromBuffer(r.Int,new Uint8Array(o));break}case n.PublishKey:t.encodeInTLVFromBuffer(r.Bytes,e.initializationVector).encodeInTLVFromBuffer(r.Bytes,e.encryptedXpriv).encodeInTLVFromBuffer(r.PublicKey,e.recipient).encodeInTLVFromBuffer(r.PublicKey,e.ephemeralPublicKey);break;case n.Derive:t.encodeInTLVFromBuffer(r.Bytes,u(e.path)).encodeInTLVFromBuffer(r.PublicKey,e.groupKey).encodeInTLVFromBuffer(r.Bytes,e.initializationVector).encodeInTLVFromBuffer(r.Bytes,e.encryptedXpriv).encodeInTLVFromBuffer(r.PublicKey,e.ephemeralPublicKey);break}const i=t.build();return new m(new Uint8Array([e.type,i.length,...i]),e)}static bytesFromUnsignedData(e){const t=new a;switch(e.type){case n.AddMember:{const o=new ArrayBuffer(4);new DataView(o).setUint32(0,e.permissions),t.encodeInTLVFromAscii(r.String,e.name).encodeInTLVFromBuffer(r.PublicKey,e.publicKey).encodeInTLVFromBuffer(r.Int,new Uint8Array(o));break}case n.PublishKey:t.encodeInTLVFromBuffer(r.Bytes,new Uint8Array).encodeInTLVFromBuffer(r.Bytes,new Uint8Array).encodeInTLVFromBuffer(r.PublicKey,e.recipient).encodeInTLVFromBuffer(r.PublicKey,new Uint8Array);break;case n.Derive:t.encodeInTLVFromBuffer(r.Bytes,u(e.path));break}const i=t.build();return new Uint8Array([e.type,i.length,...i])}toString(){return y(this.bytes,!1)}toU8A(){return this.bytes}parse(){return this.data.orDefaultLazy(()=>{const e=new l(this.bytes).parseCommandData();return this.data=c(e),e})}toHuman(){return this.parse().map(e=>Object.entries(e).map(([t,i])=>t==="type"?`${n[i]}(0x${i?.toString(16).padStart(2,"0")}):`:` ${t}: ${i instanceof Uint8Array?y(i,!1):i}`).join(`
|
|
2
|
+
`))}getPublicKey(){switch(this.bytes[0]){case n.AddMember:case n.PublishKey:return this.parse().toMaybe().chain(e=>{switch(e.type){case n.AddMember:return c(e.publicKey);case n.PublishKey:return c(e.recipient);default:return s}}).map(e=>y(e,!1));default:return s}}getEncryptedPublishedKey(){switch(this.bytes[0]){case n.Seed:case n.Derive:case n.PublishKey:return this.parse().toMaybe().chain(e=>{switch(e.type){case n.Seed:case n.Derive:case n.PublishKey:return p.of({...e});default:return s}});default:return s}}}export{m as LKRPCommand};
|
|
3
3
|
//# sourceMappingURL=LKRPCommand.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../src/internal/utils/LKRPCommand.ts"],
|
|
4
|
-
"sourcesContent": ["import { type Either, Just, Maybe, Nothing, Right } from \"purify-ts\";\n\nimport { type LKRPParsingError } from \"@api/
|
|
5
|
-
"mappings": "AAAA,OAAsB,
|
|
6
|
-
"names": ["
|
|
4
|
+
"sourcesContent": ["import {\n bufferToHexaString,\n ByteArrayBuilder,\n hexaStringToBuffer,\n} from \"@ledgerhq/device-management-kit\";\nimport { type Either, Just, Maybe, Nothing, Right } from \"purify-ts\";\n\nimport { type LKRPParsingError } from \"@api/model/Errors\";\nimport {\n type LKRPCommandData,\n type UnsignedCommandData,\n} from \"@internal/models/LKRPCommandTypes\";\nimport { CommandTags, GeneralTags } from \"@internal/models/Tags\";\nimport { type EncryptedPublishedKey } from \"@internal/models/Types\";\n\nimport { derivationPathAsBytes } from \"./derivationPath\";\nimport { TLVParser } from \"./TLVParser\";\n\nexport class LKRPCommand {\n private data: Maybe<Either<LKRPParsingError, LKRPCommandData>>;\n\n constructor(\n private bytes: Uint8Array,\n data?: LKRPCommandData,\n ) {\n this.data = data ? Just(Right(data)) : Nothing;\n }\n\n static fromHex(hex: string): LKRPCommand {\n return new LKRPCommand(hexaStringToBuffer(hex) ?? new Uint8Array());\n }\n\n static fromData(data: LKRPCommandData): LKRPCommand {\n const tlv = new ByteArrayBuilder();\n switch (data.type) {\n case CommandTags.Seed:\n tlv\n .encodeInTLVFromBuffer(GeneralTags.Bytes, data.topic)\n .encodeInTLVFromUInt16(GeneralTags.Int, data.protocolVersion)\n .encodeInTLVFromBuffer(GeneralTags.PublicKey, data.groupKey)\n .encodeInTLVFromBuffer(GeneralTags.Bytes, data.initializationVector)\n .encodeInTLVFromBuffer(GeneralTags.Bytes, data.encryptedXpriv)\n .encodeInTLVFromBuffer(\n GeneralTags.PublicKey,\n data.ephemeralPublicKey,\n );\n break;\n\n case CommandTags.AddMember: {\n const permissions = new ArrayBuffer(4);\n new DataView(permissions).setUint32(0, data.permissions);\n tlv\n .encodeInTLVFromAscii(GeneralTags.String, data.name)\n .encodeInTLVFromBuffer(GeneralTags.PublicKey, data.publicKey)\n .encodeInTLVFromBuffer(GeneralTags.Int, new Uint8Array(permissions));\n break;\n }\n\n case CommandTags.PublishKey:\n tlv\n .encodeInTLVFromBuffer(GeneralTags.Bytes, data.initializationVector)\n .encodeInTLVFromBuffer(GeneralTags.Bytes, data.encryptedXpriv)\n .encodeInTLVFromBuffer(GeneralTags.PublicKey, data.recipient)\n .encodeInTLVFromBuffer(\n GeneralTags.PublicKey,\n data.ephemeralPublicKey,\n );\n break;\n\n case CommandTags.Derive:\n tlv\n .encodeInTLVFromBuffer(\n GeneralTags.Bytes,\n derivationPathAsBytes(data.path),\n )\n .encodeInTLVFromBuffer(GeneralTags.PublicKey, data.groupKey)\n .encodeInTLVFromBuffer(GeneralTags.Bytes, data.initializationVector)\n .encodeInTLVFromBuffer(GeneralTags.Bytes, data.encryptedXpriv)\n .encodeInTLVFromBuffer(\n GeneralTags.PublicKey,\n data.ephemeralPublicKey,\n );\n break;\n }\n\n const bytes = tlv.build();\n return new LKRPCommand(\n new Uint8Array([data.type, bytes.length, ...bytes]),\n data,\n );\n }\n\n static bytesFromUnsignedData(data: UnsignedCommandData): Uint8Array {\n const tlv = new ByteArrayBuilder();\n switch (data.type) {\n case CommandTags.AddMember: {\n // NOTE: encode the permission bytes array with DataView because\n // ByteArrayBuilder.encodeInTLVFromUInt32 doesn't seem to work with negative numbers\n // ByteArrayBuilder.add32BitIntToData doesn't seem to work with number > 0x7fffffff\n const permissions = new ArrayBuffer(4);\n new DataView(permissions).setUint32(0, data.permissions);\n tlv\n .encodeInTLVFromAscii(GeneralTags.String, data.name)\n .encodeInTLVFromBuffer(GeneralTags.PublicKey, data.publicKey)\n .encodeInTLVFromBuffer(GeneralTags.Int, new Uint8Array(permissions));\n break;\n }\n\n case CommandTags.PublishKey:\n tlv\n .encodeInTLVFromBuffer(GeneralTags.Bytes, new Uint8Array()) // Empty IV\n .encodeInTLVFromBuffer(GeneralTags.Bytes, new Uint8Array()) // Empty encryptedXpriv\n .encodeInTLVFromBuffer(GeneralTags.PublicKey, data.recipient)\n .encodeInTLVFromBuffer(GeneralTags.PublicKey, new Uint8Array()); // Empty ephemeralPublicKey\n break;\n\n case CommandTags.Derive:\n tlv.encodeInTLVFromBuffer(\n GeneralTags.Bytes,\n derivationPathAsBytes(data.path),\n );\n break;\n }\n\n const bytes = tlv.build();\n return new Uint8Array([data.type, bytes.length, ...bytes]);\n }\n\n toString(): string {\n return bufferToHexaString(this.bytes, false);\n }\n\n toU8A(): Uint8Array {\n return this.bytes;\n }\n\n parse(): Either<LKRPParsingError, LKRPCommandData> {\n return this.data.orDefaultLazy(() => {\n const data = new TLVParser(this.bytes).parseCommandData();\n this.data = Just(data);\n return data;\n });\n }\n\n toHuman(): Either<LKRPParsingError, string> {\n return this.parse().map((data) =>\n Object.entries(data)\n .map(([key, value]) => {\n if (key === \"type\") {\n return `${CommandTags[value as CommandTags]}(0x${value?.toString(16).padStart(2, \"0\")}):`;\n }\n return ` ${key}: ${value instanceof Uint8Array ? bufferToHexaString(value, false) : value}`;\n })\n .join(\"\\n\"),\n );\n }\n\n getPublicKey(): Maybe<string> {\n switch (this.bytes[0]) {\n case CommandTags.AddMember:\n case CommandTags.PublishKey:\n return this.parse()\n .toMaybe()\n .chain((data) => {\n switch (data.type) {\n case CommandTags.AddMember:\n return Just(data.publicKey);\n case CommandTags.PublishKey:\n return Just(data.recipient);\n default:\n return Nothing;\n }\n })\n .map((str) => bufferToHexaString(str, false));\n\n default:\n return Nothing;\n }\n }\n\n getEncryptedPublishedKey(): Maybe<EncryptedPublishedKey> {\n switch (this.bytes[0]) {\n case CommandTags.Seed:\n case CommandTags.Derive:\n case CommandTags.PublishKey:\n return this.parse()\n .toMaybe()\n .chain((data) => {\n switch (data.type) {\n case CommandTags.Seed:\n case CommandTags.Derive:\n case CommandTags.PublishKey:\n return Maybe.of({ ...data });\n default:\n return Nothing;\n }\n });\n default:\n return Nothing;\n }\n }\n}\n"],
|
|
5
|
+
"mappings": "AAAA,OACE,sBAAAA,EACA,oBAAAC,EACA,sBAAAC,MACK,kCACP,OAAsB,QAAAC,EAAM,SAAAC,EAAO,WAAAC,EAAS,SAAAC,MAAa,YAOzD,OAAS,eAAAC,EAAa,eAAAC,MAAmB,wBAGzC,OAAS,yBAAAC,MAA6B,mBACtC,OAAS,aAAAC,MAAiB,cAEnB,MAAMC,CAAY,CAGvB,YACUC,EACRC,EACA,CAFQ,WAAAD,EAGR,KAAK,KAAOC,EAAOV,EAAKG,EAAMO,CAAI,CAAC,EAAIR,CACzC,CAPQ,KASR,OAAO,QAAQS,EAA0B,CACvC,OAAO,IAAIH,EAAYT,EAAmBY,CAAG,GAAK,IAAI,UAAY,CACpE,CAEA,OAAO,SAASD,EAAoC,CAClD,MAAME,EAAM,IAAId,EAChB,OAAQY,EAAK,KAAM,CACjB,KAAKN,EAAY,KACfQ,EACG,sBAAsBP,EAAY,MAAOK,EAAK,KAAK,EACnD,sBAAsBL,EAAY,IAAKK,EAAK,eAAe,EAC3D,sBAAsBL,EAAY,UAAWK,EAAK,QAAQ,EAC1D,sBAAsBL,EAAY,MAAOK,EAAK,oBAAoB,EAClE,sBAAsBL,EAAY,MAAOK,EAAK,cAAc,EAC5D,sBACCL,EAAY,UACZK,EAAK,kBACP,EACF,MAEF,KAAKN,EAAY,UAAW,CAC1B,MAAMS,EAAc,IAAI,YAAY,CAAC,EACrC,IAAI,SAASA,CAAW,EAAE,UAAU,EAAGH,EAAK,WAAW,EACvDE,EACG,qBAAqBP,EAAY,OAAQK,EAAK,IAAI,EAClD,sBAAsBL,EAAY,UAAWK,EAAK,SAAS,EAC3D,sBAAsBL,EAAY,IAAK,IAAI,WAAWQ,CAAW,CAAC,EACrE,KACF,CAEA,KAAKT,EAAY,WACfQ,EACG,sBAAsBP,EAAY,MAAOK,EAAK,oBAAoB,EAClE,sBAAsBL,EAAY,MAAOK,EAAK,cAAc,EAC5D,sBAAsBL,EAAY,UAAWK,EAAK,SAAS,EAC3D,sBACCL,EAAY,UACZK,EAAK,kBACP,EACF,MAEF,KAAKN,EAAY,OACfQ,EACG,sBACCP,EAAY,MACZC,EAAsBI,EAAK,IAAI,CACjC,EACC,sBAAsBL,EAAY,UAAWK,EAAK,QAAQ,EAC1D,sBAAsBL,EAAY,MAAOK,EAAK,oBAAoB,EAClE,sBAAsBL,EAAY,MAAOK,EAAK,cAAc,EAC5D,sBACCL,EAAY,UACZK,EAAK,kBACP,EACF,KACJ,CAEA,MAAMD,EAAQG,EAAI,MAAM,EACxB,OAAO,IAAIJ,EACT,IAAI,WAAW,CAACE,EAAK,KAAMD,EAAM,OAAQ,GAAGA,CAAK,CAAC,EAClDC,CACF,CACF,CAEA,OAAO,sBAAsBA,EAAuC,CAClE,MAAME,EAAM,IAAId,EAChB,OAAQY,EAAK,KAAM,CACjB,KAAKN,EAAY,UAAW,CAI1B,MAAMS,EAAc,IAAI,YAAY,CAAC,EACrC,IAAI,SAASA,CAAW,EAAE,UAAU,EAAGH,EAAK,WAAW,EACvDE,EACG,qBAAqBP,EAAY,OAAQK,EAAK,IAAI,EAClD,sBAAsBL,EAAY,UAAWK,EAAK,SAAS,EAC3D,sBAAsBL,EAAY,IAAK,IAAI,WAAWQ,CAAW,CAAC,EACrE,KACF,CAEA,KAAKT,EAAY,WACfQ,EACG,sBAAsBP,EAAY,MAAO,IAAI,UAAY,EACzD,sBAAsBA,EAAY,MAAO,IAAI,UAAY,EACzD,sBAAsBA,EAAY,UAAWK,EAAK,SAAS,EAC3D,sBAAsBL,EAAY,UAAW,IAAI,UAAY,EAChE,MAEF,KAAKD,EAAY,OACfQ,EAAI,sBACFP,EAAY,MACZC,EAAsBI,EAAK,IAAI,CACjC,EACA,KACJ,CAEA,MAAMD,EAAQG,EAAI,MAAM,EACxB,OAAO,IAAI,WAAW,CAACF,EAAK,KAAMD,EAAM,OAAQ,GAAGA,CAAK,CAAC,CAC3D,CAEA,UAAmB,CACjB,OAAOZ,EAAmB,KAAK,MAAO,EAAK,CAC7C,CAEA,OAAoB,CAClB,OAAO,KAAK,KACd,CAEA,OAAmD,CACjD,OAAO,KAAK,KAAK,cAAc,IAAM,CACnC,MAAMa,EAAO,IAAIH,EAAU,KAAK,KAAK,EAAE,iBAAiB,EACxD,YAAK,KAAOP,EAAKU,CAAI,EACdA,CACT,CAAC,CACH,CAEA,SAA4C,CAC1C,OAAO,KAAK,MAAM,EAAE,IAAKA,GACvB,OAAO,QAAQA,CAAI,EAChB,IAAI,CAAC,CAACI,EAAKC,CAAK,IACXD,IAAQ,OACH,GAAGV,EAAYW,CAAoB,CAAC,MAAMA,GAAO,SAAS,EAAE,EAAE,SAAS,EAAG,GAAG,CAAC,KAEhF,KAAKD,CAAG,KAAKC,aAAiB,WAAalB,EAAmBkB,EAAO,EAAK,EAAIA,CAAK,EAC3F,EACA,KAAK;AAAA,CAAI,CACd,CACF,CAEA,cAA8B,CAC5B,OAAQ,KAAK,MAAM,CAAC,EAAG,CACrB,KAAKX,EAAY,UACjB,KAAKA,EAAY,WACf,OAAO,KAAK,MAAM,EACf,QAAQ,EACR,MAAOM,GAAS,CACf,OAAQA,EAAK,KAAM,CACjB,KAAKN,EAAY,UACf,OAAOJ,EAAKU,EAAK,SAAS,EAC5B,KAAKN,EAAY,WACf,OAAOJ,EAAKU,EAAK,SAAS,EAC5B,QACE,OAAOR,CACX,CACF,CAAC,EACA,IAAKc,GAAQnB,EAAmBmB,EAAK,EAAK,CAAC,EAEhD,QACE,OAAOd,CACX,CACF,CAEA,0BAAyD,CACvD,OAAQ,KAAK,MAAM,CAAC,EAAG,CACrB,KAAKE,EAAY,KACjB,KAAKA,EAAY,OACjB,KAAKA,EAAY,WACf,OAAO,KAAK,MAAM,EACf,QAAQ,EACR,MAAOM,GAAS,CACf,OAAQA,EAAK,KAAM,CACjB,KAAKN,EAAY,KACjB,KAAKA,EAAY,OACjB,KAAKA,EAAY,WACf,OAAOH,EAAM,GAAG,CAAE,GAAGS,CAAK,CAAC,EAC7B,QACE,OAAOR,CACX,CACF,CAAC,EACL,QACE,OAAOA,CACX,CACF,CACF",
|
|
6
|
+
"names": ["bufferToHexaString", "ByteArrayBuilder", "hexaStringToBuffer", "Just", "Maybe", "Nothing", "Right", "CommandTags", "GeneralTags", "derivationPathAsBytes", "TLVParser", "LKRPCommand", "bytes", "data", "hex", "tlv", "permissions", "key", "value", "str"]
|
|
7
7
|
}
|
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
import{Just as
|
|
2
|
-
`)))}),it("should fail for invalid command bytes format",()=>{const
|
|
1
|
+
import{Just as a,Left as d,Nothing as m,Right as f}from"purify-ts";import{LKRPParsingError as s}from"../../api/model/Errors";import{Permissions as c}from"../../api/model/Permissions";import{CommandTags as r,GeneralTags as e}from"../models/Tags";import{LKRPCommand as n}from"./LKRPCommand";describe("LKRPCommand",()=>{describe("fromData",()=>{it("should encode add member permissions correctly",()=>{const x=Uint8Array.from([2,191,92,13,155,240,244,149,22,40,90,210,3,146,196,196,184,113,20,246,196,140,132,115,6,222,31,231,243,147,78,67,193]),t=n.fromData({type:r.AddMember,name:"OWNER",publicKey:x,permissions:c.OWNER}),o=n.fromData({type:r.AddMember,name:"READER",publicKey:x,permissions:c.CAN_ENCRYPT}),i=n.fromData({type:r.AddMember,name:"DAPP",publicKey:x,permissions:c.OWNER&~c.CAN_ADD_BLOCK});expect(t.toString()).toBe(["11 30","04 05 4f 57 4e 45 52","06 21 02 bf 5c 0d 9b f0 f4 95 16 28 5a d2 03 92 c4 c4 b8 71 14 f6 c4 8c 84 73 06 de 1f e7 f3 93 4e 43 c1","01 04 ff ff ff ff"].join("").replace(/ /g,"")),expect(o.toString()).toBe(["11 31","04 06 52 45 41 44 45 52","06 21 02 bf 5c 0d 9b f0 f4 95 16 28 5a d2 03 92 c4 c4 b8 71 14 f6 c4 8c 84 73 06 de 1f e7 f3 93 4e 43 c1","01 04 00 00 00 01"].join("").replace(/ /g,"")),expect(i.toString()).toBe(["11 2f","04 04 44 41 50 50","06 21 02 bf 5c 0d 9b f0 f4 95 16 28 5a d2 03 92 c4 c4 b8 71 14 f6 c4 8c 84 73 06 de 1f e7 f3 93 4e 43 c1","01 04 ff ff ff fb"].join("").replace(/ /g,""))})}),describe("bytesFromUnsignedData",()=>{it("should encode add member permissions correctly",()=>{const x=Uint8Array.from([2,191,92,13,155,240,244,149,22,40,90,210,3,146,196,196,184,113,20,246,196,140,132,115,6,222,31,231,243,147,78,67,193]),t=n.bytesFromUnsignedData({type:r.AddMember,name:"OWNER",publicKey:x,permissions:c.OWNER}),o=n.bytesFromUnsignedData({type:r.AddMember,name:"READER",publicKey:x,permissions:c.CAN_ENCRYPT}),i=n.bytesFromUnsignedData({type:r.AddMember,name:"DAPP",publicKey:x,permissions:c.OWNER&~c.CAN_ADD_BLOCK});expect(t).toEqual(Uint8Array.from([[17,48],[4,5,79,87,78,69,82],[6,33,2,191,92,13,155,240,244,149,22,40,90,210,3,146,196,196,184,113,20,246,196,140,132,115,6,222,31,231,243,147,78,67,193],[1,4,255,255,255,255]].flat())),expect(o).toEqual(Uint8Array.from([[17,49],[4,6,82,69,65,68,69,82],[6,33,2,191,92,13,155,240,244,149,22,40,90,210,3,146,196,196,184,113,20,246,196,140,132,115,6,222,31,231,243,147,78,67,193],[1,4,0,0,0,1]].flat())),expect(i).toEqual(Uint8Array.from([[17,47],[4,4,68,65,80,80],[6,33,2,191,92,13,155,240,244,149,22,40,90,210,3,146,196,196,184,113,20,246,196,140,132,115,6,222,31,231,243,147,78,67,193],[1,4,255,255,255,251]].flat()))})}),describe("toString",()=>{it("should return the hex of the bytes of the command",()=>{const x="0102030405060708",t=n.fromHex(x);expect(t.toString()).toBe(x)})}),describe("toU8A",()=>{it("should return the bytes of the command",()=>{const x=new Uint8Array([1,2,3,4,5,6,7,8]),t=new n(x);expect(t.toU8A()).toBe(x)})}),describe("parse",()=>{it("should parse the command data correctly",()=>{const x=new Uint8Array([e.Bytes,3,1,2,3,e.Int,2,1,2,e.PublicKey,3,2,4,6,e.Bytes,3,3,5,7,e.Bytes,3,4,8,16,e.PublicKey,3,10,11,12]),t=new n(new Uint8Array([r.Seed,x.length,...x]));expect(t.parse()).toStrictEqual(f({type:r.Seed,topic:new Uint8Array([1,2,3]),protocolVersion:258,groupKey:new Uint8Array([2,4,6]),initializationVector:new Uint8Array([3,5,7]),encryptedXpriv:new Uint8Array([4,8,16]),ephemeralPublicKey:new Uint8Array([10,11,12])}))}),it("should fail with invalid command bytes",()=>{const x=new n(new Uint8Array([r.Seed,1,1]));expect(x.parse()).toStrictEqual(d(new s("Invalid end of TLV, expected length")))})}),describe("getPublicKey",()=>{it("should return the public key for AddMember command",()=>{const x=new Uint8Array([e.String,3,65,66,67,e.PublicKey,3,4,5,6,e.Int,1,1]),t=new n(new Uint8Array([r.AddMember,x.length,...x]));expect(t.getPublicKey()).toStrictEqual(a("040506"))}),it("should return the public key for PublishKey commands",()=>{const x=new Uint8Array([e.Bytes,3,1,2,3,e.Bytes,3,4,5,6,e.PublicKey,3,7,8,9,e.PublicKey,3,10,11,12]),t=new n(new Uint8Array([r.PublishKey,x.length,...x]));expect(t.getPublicKey()).toEqual(a("070809"))}),it("should return undefined for other command types",()=>{const x=new n(new Uint8Array([r.Seed]));expect(x.getPublicKey()).toEqual(m)})}),describe("toHuman",()=>{it("should return a string representation of the command",()=>{const x=new Uint8Array([e.Bytes,3,1,2,3,e.Bytes,3,4,5,6,e.PublicKey,3,7,8,9,e.PublicKey,3,10,11,12]),t=new n(new Uint8Array([r.PublishKey,x.length,...x]));expect(t.toHuman()).toStrictEqual(f(["PublishKey(0x12):"," initializationVector: 010203"," encryptedXpriv: 040506"," recipient: 070809"," ephemeralPublicKey: 0a0b0c"].join(`
|
|
2
|
+
`)))}),it("should fail for invalid command bytes format",()=>{const x=new n(new Uint8Array([r.Seed,1,1]));expect(x.toHuman()).toStrictEqual(d(new s("Invalid end of TLV, expected length")))})})});
|
|
3
3
|
//# sourceMappingURL=LKRPCommand.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../src/internal/utils/LKRPCommand.test.ts"],
|
|
4
|
-
"sourcesContent": ["import { Just, Left, Nothing, Right } from \"purify-ts\";\n\nimport { LKRPParsingError } from \"@api/app-binder/Errors\";\nimport { CommandTags, GeneralTags } from \"@internal/models/Tags\";\n\nimport { LKRPCommand } from \"./LKRPCommand\";\n\ndescribe(\"LKRPCommand\", () => {\n describe(\"toString\", () => {\n it(\"should return the hex of the bytes of the command\", () => {\n // WHEN\n const hex = \"0102030405060708\";\n const command = LKRPCommand.fromHex(hex);\n // THEN\n expect(command.toString()).toBe(hex);\n });\n });\n\n describe(\"toU8A\", () => {\n it(\"should return the bytes of the command\", () => {\n // WHEN\n const bytes = new Uint8Array([1, 2, 3, 4, 5, 6, 7, 8]);\n const command = new LKRPCommand(bytes);\n // THEN\n expect(command.toU8A()).toBe(bytes);\n });\n });\n\n describe(\"parse\", () => {\n it(\"should parse the command data correctly\", () => {\n // GIVEN\n const value = new Uint8Array([\n ...[GeneralTags.Bytes, 3, 0x01, 0x02, 0x03], // Topic\n ...[GeneralTags.Int, 2, 0x01, 0x02], // Protocol Version\n ...[GeneralTags.PublicKey, 3, 0x02, 0x04, 0x06], // Group Key\n ...[GeneralTags.Bytes, 3, 0x03, 0x05, 0x07], // Initialization Vector\n ...[GeneralTags.Bytes, 3, 0x04, 0x08, 0x10], // Encrypted xpriv\n ...[GeneralTags.PublicKey, 3, 0x0a, 0x0b, 0x0c], // Ephemeral Public Key\n ]);\n // WHEN\n const command = new LKRPCommand(\n new Uint8Array([CommandTags.Seed, value.length, ...value]),\n );\n // THEN\n expect(command.parse()).toStrictEqual(\n Right({\n type: CommandTags.Seed,\n topic: new Uint8Array([0x01, 0x02, 0x03]),\n protocolVersion: 258,\n groupKey: new Uint8Array([0x02, 0x04, 0x06]),\n initializationVector: new Uint8Array([0x03, 0x05, 0x07]),\n encryptedXpriv: new Uint8Array([0x04, 0x08, 0x10]),\n ephemeralPublicKey: new Uint8Array([0x0a, 0x0b, 0x0c]),\n }),\n );\n });\n\n it(\"should fail with invalid command bytes\", () => {\n // WHEN\n const command = new LKRPCommand(\n new Uint8Array([CommandTags.Seed, 1, ...[0x01]]),\n );\n // THEN\n expect(command.parse()).toStrictEqual(\n Left(new LKRPParsingError(\"Invalid end of TLV, expected length\")),\n );\n });\n });\n\n describe(\"getPublicKey\", () => {\n it(\"should return the public key for AddMember command\", () => {\n // GIVEN\n const addMemberValue = new Uint8Array([\n ...[GeneralTags.String, 3, 0x41, 0x42, 0x43], // Name \"ABC\"\n ...[GeneralTags.PublicKey, 3, 0x04, 0x05, 0x06], // Public Key\n ...[GeneralTags.Int, 1, 0x01], // Permissions\n ]);\n\n // WHEN\n const addMemberCmd = new LKRPCommand(\n new Uint8Array([\n CommandTags.AddMember,\n addMemberValue.length,\n ...addMemberValue,\n ]),\n );\n\n // THEN\n expect(addMemberCmd.getPublicKey()).toStrictEqual(Just(\"040506\"));\n });\n\n it(\"should return the public key for PublishKey commands\", () => {\n // GIVEN\n const publishKeyValue = new Uint8Array([\n ...[GeneralTags.Bytes, 3, 0x01, 0x02, 0x03], // Initialization Vector\n ...[GeneralTags.Bytes, 3, 0x04, 0x05, 0x06], // Encrypted xpriv\n ...[GeneralTags.PublicKey, 3, 0x07, 0x08, 0x09], // Recipient\n ...[GeneralTags.PublicKey, 3, 0x0a, 0x0b, 0x0c], // Ephemeral Public Key\n ]);\n // WHEN\n const publishKeyCmd = new LKRPCommand(\n new Uint8Array([\n CommandTags.PublishKey,\n publishKeyValue.length,\n ...publishKeyValue,\n ]),\n );\n // THEN\n expect(publishKeyCmd.getPublicKey()).toEqual(Just(\"070809\"));\n });\n\n it(\"should return undefined for other command types\", () => {\n // WHEN\n const command = new LKRPCommand(new Uint8Array([CommandTags.Seed]));\n // THEN\n expect(command.getPublicKey()).toEqual(Nothing);\n });\n });\n\n describe(\"toHuman\", () => {\n it(\"should return a string representation of the command\", () => {\n // GIVEN\n const value = new Uint8Array([\n ...[GeneralTags.Bytes, 3, 0x01, 0x02, 0x03], // Initialization Vector\n ...[GeneralTags.Bytes, 3, 0x04, 0x05, 0x06], // Encrypted xpriv\n ...[GeneralTags.PublicKey, 3, 0x07, 0x08, 0x09], // Recipient\n ...[GeneralTags.PublicKey, 3, 0x0a, 0x0b, 0x0c], // Ephemeral Public Key\n ]);\n // WHEN\n const command = new LKRPCommand(\n new Uint8Array([CommandTags.PublishKey, value.length, ...value]),\n );\n // THEN\n expect(command.toHuman()).toStrictEqual(\n Right(\n [\n `PublishKey(0x12):`,\n ` initializationVector: 010203`,\n ` encryptedXpriv: 040506`,\n ` recipient: 070809`,\n ` ephemeralPublicKey: 0a0b0c`,\n ].join(\"\\n\"),\n ),\n );\n });\n\n it(\"should fail for invalid command bytes format\", () => {\n // WHEN\n const command = new LKRPCommand(\n new Uint8Array([CommandTags.Seed, 1, ...[0x01]]),\n );\n // THEN\n expect(command.toHuman()).toStrictEqual(\n Left(new LKRPParsingError(\"Invalid end of TLV, expected length\")),\n );\n });\n });\n});\n"],
|
|
5
|
-
"mappings": "AAAA,OAAS,QAAAA,EAAM,QAAAC,EAAM,WAAAC,EAAS,SAAAC,MAAa,YAE3C,OAAS,oBAAAC,MAAwB,
|
|
6
|
-
"names": ["Just", "Left", "Nothing", "Right", "LKRPParsingError", "CommandTags", "GeneralTags", "LKRPCommand", "hex", "command", "bytes", "value", "addMemberValue", "addMemberCmd", "publishKeyValue", "publishKeyCmd"]
|
|
4
|
+
"sourcesContent": ["import { Just, Left, Nothing, Right } from \"purify-ts\";\n\nimport { LKRPParsingError } from \"@api/model/Errors\";\nimport { Permissions } from \"@api/model/Permissions\";\nimport { CommandTags, GeneralTags } from \"@internal/models/Tags\";\n\nimport { LKRPCommand } from \"./LKRPCommand\";\n\ndescribe(\"LKRPCommand\", () => {\n describe(\"fromData\", () => {\n it(\"should encode add member permissions correctly\", () => {\n // GIVEN\n const publicKey = Uint8Array.from([\n 0x02, 0xbf, 0x5c, 0x0d, 0x9b, 0xf0, 0xf4, 0x95, 0x16, 0x28, 0x5a, 0xd2,\n 0x03, 0x92, 0xc4, 0xc4, 0xb8, 0x71, 0x14, 0xf6, 0xc4, 0x8c, 0x84, 0x73,\n 0x06, 0xde, 0x1f, 0xe7, 0xf3, 0x93, 0x4e, 0x43, 0xc1,\n ]);\n // WHEN\n const addOwner = LKRPCommand.fromData({\n type: CommandTags.AddMember,\n name: \"OWNER\",\n publicKey,\n permissions: Permissions.OWNER,\n });\n const addReader = LKRPCommand.fromData({\n type: CommandTags.AddMember,\n name: \"READER\",\n publicKey,\n permissions: Permissions.CAN_ENCRYPT,\n });\n const dapp = LKRPCommand.fromData({\n type: CommandTags.AddMember,\n name: \"DAPP\",\n publicKey,\n permissions: Permissions.OWNER & ~Permissions.CAN_ADD_BLOCK,\n });\n // THEN\n expect(addOwner.toString()).toBe(\n [\n \"11 30\", // header\n \"04 05 4f 57 4e 45 52\", // name\n \"06 21 02 bf 5c 0d 9b f0 f4 95 16 28 5a d2 03 92 c4 c4 b8 71 14 f6 c4 8c 84 73 06 de 1f e7 f3 93 4e 43 c1\", // public key\n \"01 04 ff ff ff ff\", // permissions (OWNER)\n ]\n .join(\"\")\n .replace(/ /g, \"\"),\n );\n expect(addReader.toString()).toBe(\n [\n \"11 31\", // header\n \"04 06 52 45 41 44 45 52\", // name\n \"06 21 02 bf 5c 0d 9b f0 f4 95 16 28 5a d2 03 92 c4 c4 b8 71 14 f6 c4 8c 84 73 06 de 1f e7 f3 93 4e 43 c1\", // public key\n \"01 04 00 00 00 01\", // permissions (CAN_ENCRYPT)\n ]\n .join(\"\")\n .replace(/ /g, \"\"),\n );\n expect(dapp.toString()).toBe(\n [\n \"11 2f\", // header\n \"04 04 44 41 50 50\", // name\n \"06 21 02 bf 5c 0d 9b f0 f4 95 16 28 5a d2 03 92 c4 c4 b8 71 14 f6 c4 8c 84 73 06 de 1f e7 f3 93 4e 43 c1\", // public key\n \"01 04 ff ff ff fb\", // permissions (OWNER & ~CAN_ADD_BLOCK)\n ]\n .join(\"\")\n .replace(/ /g, \"\"),\n );\n });\n });\n\n describe(\"bytesFromUnsignedData\", () => {\n it(\"should encode add member permissions correctly\", () => {\n // GIVEN\n const publicKey = Uint8Array.from([\n 0x02, 0xbf, 0x5c, 0x0d, 0x9b, 0xf0, 0xf4, 0x95, 0x16, 0x28, 0x5a, 0xd2,\n 0x03, 0x92, 0xc4, 0xc4, 0xb8, 0x71, 0x14, 0xf6, 0xc4, 0x8c, 0x84, 0x73,\n 0x06, 0xde, 0x1f, 0xe7, 0xf3, 0x93, 0x4e, 0x43, 0xc1,\n ]);\n // WHEN\n const addOwner = LKRPCommand.bytesFromUnsignedData({\n type: CommandTags.AddMember,\n name: \"OWNER\",\n publicKey,\n permissions: Permissions.OWNER,\n });\n const addReader = LKRPCommand.bytesFromUnsignedData({\n type: CommandTags.AddMember,\n name: \"READER\",\n publicKey,\n permissions: Permissions.CAN_ENCRYPT,\n });\n const dapp = LKRPCommand.bytesFromUnsignedData({\n type: CommandTags.AddMember,\n name: \"DAPP\",\n publicKey,\n permissions: Permissions.OWNER & ~Permissions.CAN_ADD_BLOCK,\n });\n // THEN\n expect(addOwner).toEqual(\n Uint8Array.from(\n [\n [0x11, 0x30], // header\n [0x04, 0x05, 0x4f, 0x57, 0x4e, 0x45, 0x52], // name\n [\n // public key\n 0x06, 0x21, 0x02, 0xbf, 0x5c, 0x0d, 0x9b, 0xf0, 0xf4, 0x95, 0x16,\n 0x28, 0x5a, 0xd2, 0x03, 0x92, 0xc4, 0xc4, 0xb8, 0x71, 0x14, 0xf6,\n 0xc4, 0x8c, 0x84, 0x73, 0x06, 0xde, 0x1f, 0xe7, 0xf3, 0x93, 0x4e,\n 0x43, 0xc1,\n ],\n [0x01, 0x04, 0xff, 0xff, 0xff, 0xff], // permissions (OWNER)\n ].flat(),\n ),\n );\n expect(addReader).toEqual(\n Uint8Array.from(\n [\n [0x11, 0x31], // header\n [0x04, 0x06, 0x52, 0x45, 0x41, 0x44, 0x45, 0x52], // name\n [\n // public key\n 0x06, 0x21, 0x02, 0xbf, 0x5c, 0x0d, 0x9b, 0xf0, 0xf4, 0x95, 0x16,\n 0x28, 0x5a, 0xd2, 0x03, 0x92, 0xc4, 0xc4, 0xb8, 0x71, 0x14, 0xf6,\n 0xc4, 0x8c, 0x84, 0x73, 0x06, 0xde, 0x1f, 0xe7, 0xf3, 0x93, 0x4e,\n 0x43, 0xc1,\n ],\n [0x01, 0x04, 0x00, 0x00, 0x00, 0x01], // permissions (CAN_ENCRYPT)\n ].flat(),\n ),\n );\n expect(dapp).toEqual(\n Uint8Array.from(\n [\n [0x11, 0x2f], // header\n [0x04, 0x04, 0x44, 0x41, 0x50, 0x50], // name\n [\n // public key\n 0x06, 0x21, 0x02, 0xbf, 0x5c, 0x0d, 0x9b, 0xf0, 0xf4, 0x95, 0x16,\n 0x28, 0x5a, 0xd2, 0x03, 0x92, 0xc4, 0xc4, 0xb8, 0x71, 0x14, 0xf6,\n 0xc4, 0x8c, 0x84, 0x73, 0x06, 0xde, 0x1f, 0xe7, 0xf3, 0x93, 0x4e,\n 0x43, 0xc1,\n ],\n [0x01, 0x04, 0xff, 0xff, 0xff, 0xfb], // permissions (OWNER & ~CAN_ADD_BLOCK)\n ].flat(),\n ),\n );\n });\n });\n\n describe(\"toString\", () => {\n it(\"should return the hex of the bytes of the command\", () => {\n // WHEN\n const hex = \"0102030405060708\";\n const command = LKRPCommand.fromHex(hex);\n // THEN\n expect(command.toString()).toBe(hex);\n });\n });\n\n describe(\"toU8A\", () => {\n it(\"should return the bytes of the command\", () => {\n // WHEN\n const bytes = new Uint8Array([1, 2, 3, 4, 5, 6, 7, 8]);\n const command = new LKRPCommand(bytes);\n // THEN\n expect(command.toU8A()).toBe(bytes);\n });\n });\n\n describe(\"parse\", () => {\n it(\"should parse the command data correctly\", () => {\n // GIVEN\n const value = new Uint8Array([\n ...[GeneralTags.Bytes, 3, 0x01, 0x02, 0x03], // Topic\n ...[GeneralTags.Int, 2, 0x01, 0x02], // Protocol Version\n ...[GeneralTags.PublicKey, 3, 0x02, 0x04, 0x06], // Group Key\n ...[GeneralTags.Bytes, 3, 0x03, 0x05, 0x07], // Initialization Vector\n ...[GeneralTags.Bytes, 3, 0x04, 0x08, 0x10], // Encrypted xpriv\n ...[GeneralTags.PublicKey, 3, 0x0a, 0x0b, 0x0c], // Ephemeral Public Key\n ]);\n // WHEN\n const command = new LKRPCommand(\n new Uint8Array([CommandTags.Seed, value.length, ...value]),\n );\n // THEN\n expect(command.parse()).toStrictEqual(\n Right({\n type: CommandTags.Seed,\n topic: new Uint8Array([0x01, 0x02, 0x03]),\n protocolVersion: 258,\n groupKey: new Uint8Array([0x02, 0x04, 0x06]),\n initializationVector: new Uint8Array([0x03, 0x05, 0x07]),\n encryptedXpriv: new Uint8Array([0x04, 0x08, 0x10]),\n ephemeralPublicKey: new Uint8Array([0x0a, 0x0b, 0x0c]),\n }),\n );\n });\n\n it(\"should fail with invalid command bytes\", () => {\n // WHEN\n const command = new LKRPCommand(\n new Uint8Array([CommandTags.Seed, 1, ...[0x01]]),\n );\n // THEN\n expect(command.parse()).toStrictEqual(\n Left(new LKRPParsingError(\"Invalid end of TLV, expected length\")),\n );\n });\n });\n\n describe(\"getPublicKey\", () => {\n it(\"should return the public key for AddMember command\", () => {\n // GIVEN\n const addMemberValue = new Uint8Array([\n ...[GeneralTags.String, 3, 0x41, 0x42, 0x43], // Name \"ABC\"\n ...[GeneralTags.PublicKey, 3, 0x04, 0x05, 0x06], // Public Key\n ...[GeneralTags.Int, 1, 0x01], // Permissions\n ]);\n\n // WHEN\n const addMemberCmd = new LKRPCommand(\n new Uint8Array([\n CommandTags.AddMember,\n addMemberValue.length,\n ...addMemberValue,\n ]),\n );\n\n // THEN\n expect(addMemberCmd.getPublicKey()).toStrictEqual(Just(\"040506\"));\n });\n\n it(\"should return the public key for PublishKey commands\", () => {\n // GIVEN\n const publishKeyValue = new Uint8Array([\n ...[GeneralTags.Bytes, 3, 0x01, 0x02, 0x03], // Initialization Vector\n ...[GeneralTags.Bytes, 3, 0x04, 0x05, 0x06], // Encrypted xpriv\n ...[GeneralTags.PublicKey, 3, 0x07, 0x08, 0x09], // Recipient\n ...[GeneralTags.PublicKey, 3, 0x0a, 0x0b, 0x0c], // Ephemeral Public Key\n ]);\n // WHEN\n const publishKeyCmd = new LKRPCommand(\n new Uint8Array([\n CommandTags.PublishKey,\n publishKeyValue.length,\n ...publishKeyValue,\n ]),\n );\n // THEN\n expect(publishKeyCmd.getPublicKey()).toEqual(Just(\"070809\"));\n });\n\n it(\"should return undefined for other command types\", () => {\n // WHEN\n const command = new LKRPCommand(new Uint8Array([CommandTags.Seed]));\n // THEN\n expect(command.getPublicKey()).toEqual(Nothing);\n });\n });\n\n describe(\"toHuman\", () => {\n it(\"should return a string representation of the command\", () => {\n // GIVEN\n const value = new Uint8Array([\n ...[GeneralTags.Bytes, 3, 0x01, 0x02, 0x03], // Initialization Vector\n ...[GeneralTags.Bytes, 3, 0x04, 0x05, 0x06], // Encrypted xpriv\n ...[GeneralTags.PublicKey, 3, 0x07, 0x08, 0x09], // Recipient\n ...[GeneralTags.PublicKey, 3, 0x0a, 0x0b, 0x0c], // Ephemeral Public Key\n ]);\n // WHEN\n const command = new LKRPCommand(\n new Uint8Array([CommandTags.PublishKey, value.length, ...value]),\n );\n // THEN\n expect(command.toHuman()).toStrictEqual(\n Right(\n [\n `PublishKey(0x12):`,\n ` initializationVector: 010203`,\n ` encryptedXpriv: 040506`,\n ` recipient: 070809`,\n ` ephemeralPublicKey: 0a0b0c`,\n ].join(\"\\n\"),\n ),\n );\n });\n\n it(\"should fail for invalid command bytes format\", () => {\n // WHEN\n const command = new LKRPCommand(\n new Uint8Array([CommandTags.Seed, 1, ...[0x01]]),\n );\n // THEN\n expect(command.toHuman()).toStrictEqual(\n Left(new LKRPParsingError(\"Invalid end of TLV, expected length\")),\n );\n });\n });\n});\n"],
|
|
5
|
+
"mappings": "AAAA,OAAS,QAAAA,EAAM,QAAAC,EAAM,WAAAC,EAAS,SAAAC,MAAa,YAE3C,OAAS,oBAAAC,MAAwB,oBACjC,OAAS,eAAAC,MAAmB,yBAC5B,OAAS,eAAAC,EAAa,eAAAC,MAAmB,wBAEzC,OAAS,eAAAC,MAAmB,gBAE5B,SAAS,cAAe,IAAM,CAC5B,SAAS,WAAY,IAAM,CACzB,GAAG,iDAAkD,IAAM,CAEzD,MAAMC,EAAY,WAAW,KAAK,CAChC,EAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAClE,EAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAClE,EAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAClD,CAAC,EAEKC,EAAWF,EAAY,SAAS,CACpC,KAAMF,EAAY,UAClB,KAAM,QACN,UAAAG,EACA,YAAaJ,EAAY,KAC3B,CAAC,EACKM,EAAYH,EAAY,SAAS,CACrC,KAAMF,EAAY,UAClB,KAAM,SACN,UAAAG,EACA,YAAaJ,EAAY,WAC3B,CAAC,EACKO,EAAOJ,EAAY,SAAS,CAChC,KAAMF,EAAY,UAClB,KAAM,OACN,UAAAG,EACA,YAAaJ,EAAY,MAAQ,CAACA,EAAY,aAChD,CAAC,EAED,OAAOK,EAAS,SAAS,CAAC,EAAE,KAC1B,CACE,QACA,uBACA,2GACA,mBACF,EACG,KAAK,EAAE,EACP,QAAQ,KAAM,EAAE,CACrB,EACA,OAAOC,EAAU,SAAS,CAAC,EAAE,KAC3B,CACE,QACA,0BACA,2GACA,mBACF,EACG,KAAK,EAAE,EACP,QAAQ,KAAM,EAAE,CACrB,EACA,OAAOC,EAAK,SAAS,CAAC,EAAE,KACtB,CACE,QACA,oBACA,2GACA,mBACF,EACG,KAAK,EAAE,EACP,QAAQ,KAAM,EAAE,CACrB,CACF,CAAC,CACH,CAAC,EAED,SAAS,wBAAyB,IAAM,CACtC,GAAG,iDAAkD,IAAM,CAEzD,MAAMH,EAAY,WAAW,KAAK,CAChC,EAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAAM,IAClE,EAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAAM,IAAM,IAAM,IAAM,IAClE,EAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAAM,GAAM,GAClD,CAAC,EAEKC,EAAWF,EAAY,sBAAsB,CACjD,KAAMF,EAAY,UAClB,KAAM,QACN,UAAAG,EACA,YAAaJ,EAAY,KAC3B,CAAC,EACKM,EAAYH,EAAY,sBAAsB,CAClD,KAAMF,EAAY,UAClB,KAAM,SACN,UAAAG,EACA,YAAaJ,EAAY,WAC3B,CAAC,EACKO,EAAOJ,EAAY,sBAAsB,CAC7C,KAAMF,EAAY,UAClB,KAAM,OACN,UAAAG,EACA,YAAaJ,EAAY,MAAQ,CAACA,EAAY,aAChD,CAAC,EAED,OAAOK,CAAQ,EAAE,QACf,WAAW,KACT,CACE,CAAC,GAAM,EAAI,EACX,CAAC,EAAM,EAAM,GAAM,GAAM,GAAM,GAAM,EAAI,EACzC,CAEE,EAAM,GAAM,EAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAC5D,GAAM,GAAM,IAAM,EAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAC5D,IAAM,IAAM,IAAM,IAAM,EAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAC5D,GAAM,GACR,EACA,CAAC,EAAM,EAAM,IAAM,IAAM,IAAM,GAAI,CACrC,EAAE,KAAK,CACT,CACF,EACA,OAAOC,CAAS,EAAE,QAChB,WAAW,KACT,CACE,CAAC,GAAM,EAAI,EACX,CAAC,EAAM,EAAM,GAAM,GAAM,GAAM,GAAM,GAAM,EAAI,EAC/C,CAEE,EAAM,GAAM,EAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAC5D,GAAM,GAAM,IAAM,EAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAC5D,IAAM,IAAM,IAAM,IAAM,EAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAC5D,GAAM,GACR,EACA,CAAC,EAAM,EAAM,EAAM,EAAM,EAAM,CAAI,CACrC,EAAE,KAAK,CACT,CACF,EACA,OAAOC,CAAI,EAAE,QACX,WAAW,KACT,CACE,CAAC,GAAM,EAAI,EACX,CAAC,EAAM,EAAM,GAAM,GAAM,GAAM,EAAI,EACnC,CAEE,EAAM,GAAM,EAAM,IAAM,GAAM,GAAM,IAAM,IAAM,IAAM,IAAM,GAC5D,GAAM,GAAM,IAAM,EAAM,IAAM,IAAM,IAAM,IAAM,IAAM,GAAM,IAC5D,IAAM,IAAM,IAAM,IAAM,EAAM,IAAM,GAAM,IAAM,IAAM,IAAM,GAC5D,GAAM,GACR,EACA,CAAC,EAAM,EAAM,IAAM,IAAM,IAAM,GAAI,CACrC,EAAE,KAAK,CACT,CACF,CACF,CAAC,CACH,CAAC,EAED,SAAS,WAAY,IAAM,CACzB,GAAG,oDAAqD,IAAM,CAE5D,MAAMC,EAAM,mBACNC,EAAUN,EAAY,QAAQK,CAAG,EAEvC,OAAOC,EAAQ,SAAS,CAAC,EAAE,KAAKD,CAAG,CACrC,CAAC,CACH,CAAC,EAED,SAAS,QAAS,IAAM,CACtB,GAAG,yCAA0C,IAAM,CAEjD,MAAME,EAAQ,IAAI,WAAW,CAAC,EAAG,EAAG,EAAG,EAAG,EAAG,EAAG,EAAG,CAAC,CAAC,EAC/CD,EAAU,IAAIN,EAAYO,CAAK,EAErC,OAAOD,EAAQ,MAAM,CAAC,EAAE,KAAKC,CAAK,CACpC,CAAC,CACH,CAAC,EAED,SAAS,QAAS,IAAM,CACtB,GAAG,0CAA2C,IAAM,CAElD,MAAMC,EAAQ,IAAI,WAAW,CACvBT,EAAY,MAAO,EAAG,EAAM,EAAM,EAClCA,EAAY,IAAK,EAAG,EAAM,EAC1BA,EAAY,UAAW,EAAG,EAAM,EAAM,EACtCA,EAAY,MAAO,EAAG,EAAM,EAAM,EAClCA,EAAY,MAAO,EAAG,EAAM,EAAM,GAClCA,EAAY,UAAW,EAAG,GAAM,GAAM,EAC5C,CAAC,EAEKO,EAAU,IAAIN,EAClB,IAAI,WAAW,CAACF,EAAY,KAAMU,EAAM,OAAQ,GAAGA,CAAK,CAAC,CAC3D,EAEA,OAAOF,EAAQ,MAAM,CAAC,EAAE,cACtBX,EAAM,CACJ,KAAMG,EAAY,KAClB,MAAO,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxC,gBAAiB,IACjB,SAAU,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EAC3C,qBAAsB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACvD,eAAgB,IAAI,WAAW,CAAC,EAAM,EAAM,EAAI,CAAC,EACjD,mBAAoB,IAAI,WAAW,CAAC,GAAM,GAAM,EAAI,CAAC,CACvD,CAAC,CACH,CACF,CAAC,EAED,GAAG,yCAA0C,IAAM,CAEjD,MAAMQ,EAAU,IAAIN,EAClB,IAAI,WAAW,CAACF,EAAY,KAAM,EAAO,CAAK,CAAC,CACjD,EAEA,OAAOQ,EAAQ,MAAM,CAAC,EAAE,cACtBb,EAAK,IAAIG,EAAiB,qCAAqC,CAAC,CAClE,CACF,CAAC,CACH,CAAC,EAED,SAAS,eAAgB,IAAM,CAC7B,GAAG,qDAAsD,IAAM,CAE7D,MAAMa,EAAiB,IAAI,WAAW,CAChCV,EAAY,OAAQ,EAAG,GAAM,GAAM,GACnCA,EAAY,UAAW,EAAG,EAAM,EAAM,EACtCA,EAAY,IAAK,EAAG,CAC1B,CAAC,EAGKW,EAAe,IAAIV,EACvB,IAAI,WAAW,CACbF,EAAY,UACZW,EAAe,OACf,GAAGA,CACL,CAAC,CACH,EAGA,OAAOC,EAAa,aAAa,CAAC,EAAE,cAAclB,EAAK,QAAQ,CAAC,CAClE,CAAC,EAED,GAAG,uDAAwD,IAAM,CAE/D,MAAMmB,EAAkB,IAAI,WAAW,CACjCZ,EAAY,MAAO,EAAG,EAAM,EAAM,EAClCA,EAAY,MAAO,EAAG,EAAM,EAAM,EAClCA,EAAY,UAAW,EAAG,EAAM,EAAM,EACtCA,EAAY,UAAW,EAAG,GAAM,GAAM,EAC5C,CAAC,EAEKa,EAAgB,IAAIZ,EACxB,IAAI,WAAW,CACbF,EAAY,WACZa,EAAgB,OAChB,GAAGA,CACL,CAAC,CACH,EAEA,OAAOC,EAAc,aAAa,CAAC,EAAE,QAAQpB,EAAK,QAAQ,CAAC,CAC7D,CAAC,EAED,GAAG,kDAAmD,IAAM,CAE1D,MAAMc,EAAU,IAAIN,EAAY,IAAI,WAAW,CAACF,EAAY,IAAI,CAAC,CAAC,EAElE,OAAOQ,EAAQ,aAAa,CAAC,EAAE,QAAQZ,CAAO,CAChD,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,uDAAwD,IAAM,CAE/D,MAAMc,EAAQ,IAAI,WAAW,CACvBT,EAAY,MAAO,EAAG,EAAM,EAAM,EAClCA,EAAY,MAAO,EAAG,EAAM,EAAM,EAClCA,EAAY,UAAW,EAAG,EAAM,EAAM,EACtCA,EAAY,UAAW,EAAG,GAAM,GAAM,EAC5C,CAAC,EAEKO,EAAU,IAAIN,EAClB,IAAI,WAAW,CAACF,EAAY,WAAYU,EAAM,OAAQ,GAAGA,CAAK,CAAC,CACjE,EAEA,OAAOF,EAAQ,QAAQ,CAAC,EAAE,cACxBX,EACE,CACE,oBACA,iCACA,2BACA,sBACA,8BACF,EAAE,KAAK;AAAA,CAAI,CACb,CACF,CACF,CAAC,EAED,GAAG,+CAAgD,IAAM,CAEvD,MAAMW,EAAU,IAAIN,EAClB,IAAI,WAAW,CAACF,EAAY,KAAM,EAAO,CAAK,CAAC,CACjD,EAEA,OAAOQ,EAAQ,QAAQ,CAAC,EAAE,cACxBb,EAAK,IAAIG,EAAiB,qCAAqC,CAAC,CAClE,CACF,CAAC,CACH,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["Just", "Left", "Nothing", "Right", "LKRPParsingError", "Permissions", "CommandTags", "GeneralTags", "LKRPCommand", "publicKey", "addOwner", "addReader", "dapp", "hex", "command", "bytes", "value", "addMemberValue", "addMemberCmd", "publishKeyValue", "publishKeyCmd"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{Left as a,Right as t}from"purify-ts";import{LKRPParsingError as s}from"../../api/
|
|
1
|
+
import{bufferToHexaString as c}from"@ledgerhq/device-management-kit";import{Left as a,Right as t}from"purify-ts";import{LKRPParsingError as s}from"../../api/model/Errors";import{CommandTags as p,GeneralTags as i}from"../models/Tags";import{derivationPathAsString as d}from"./derivationPath";import{eitherSeqRecord as h}from"./eitherSeqRecord";import{LKRPCommand as g}from"./LKRPCommand";const y=3;class w{bytes;parser;offset=0;constructor(e){this.bytes=e,this.parser=this.parseTLV(e)}get state(){return{offset:this.offset,isDone:this.offset>=this.bytes.length}}parse(){return this.parser.next().value}tlvEncoded(e){const r=this.offset;return e().map(()=>this.bytes.slice(r,this.offset))}parseNull(){return this.parse().chain(e=>e.tag!==i.Null?a(new s("Expected null")):t(e.value))}parseInt(){return this.parse().chain(e=>e.tag!==i.Int?a(new s("Expected a number")):t(e.value))}parseHash(){return this.parse().chain(e=>e.tag!==i.Hash?a(new s("Expected a hash")):t(e.value))}parseSignature(){return this.parse().chain(e=>e.tag!==i.Signature?a(new s("Expected a signature")):t(e.value))}parseString(){return this.parse().chain(e=>e.tag!==i.String?a(new s("Expected a string")):t(e.value))}parseBytes(){return this.parse().chain(e=>e.tag!==i.Bytes?a(new s("Expected bytes")):t(e.value))}parsePublicKey(){return this.parse().chain(e=>e.tag!==i.PublicKey?a(new s("Expected a public key")):t(e.value))}parseCommandBytes(){return this.parse().chain(({tag:e,value:r})=>e<16||e>63||!(r instanceof Uint8Array)?a(new s(`Invalid command type: 0x${e.toString(16).padStart(2,"0")}`)):t(r))}parseCommandData(){const e=this.parseCommandBytes(),r=this.offset;return e.chain(n=>{const o=n[0];switch(this.offset-=n.length-2,o){case p.Seed:return h({type:o,topic:()=>this.parseBytes(),protocolVersion:()=>this.parseInt(),groupKey:()=>this.parsePublicKey(),initializationVector:()=>this.parseBytes(),encryptedXpriv:()=>this.parseBytes(),ephemeralPublicKey:()=>this.parsePublicKey()});case p.AddMember:return h({type:o,name:()=>this.parseString(),publicKey:()=>this.parsePublicKey(),permissions:()=>this.parseInt()});case p.PublishKey:return h({type:o,initializationVector:()=>this.parseBytes(),encryptedXpriv:()=>this.parseBytes(),recipient:()=>this.parsePublicKey(),ephemeralPublicKey:()=>this.parsePublicKey()});case p.Derive:return h({type:o,path:()=>this.parseBytes().map(d),groupKey:()=>this.parsePublicKey(),initializationVector:()=>this.parseBytes(),encryptedXpriv:()=>this.parseBytes(),ephemeralPublicKey:()=>this.parsePublicKey()});default:return a(new s(`Unsupported command type: 0x${o?.toString(16).padStart(2,"0")}`))}}).chain(n=>this.offset===r?t(n):a(new s("Command was parsed incorrectly")))}parseCommands(){return this.parse().chain(e=>e.tag!==i.Int?a(new s("Expected a command count")):t(e.value)).chain(e=>{const r=[];for(let n=0;n<e;n++){const o=this.parseCommandBytes();if(o.isLeft())return o;o.ifRight(l=>r.push(new g(l)))}return t(r)})}parseBlockData(){const e=this.offset;return this.parseInt().chain(r=>h({parent:()=>this.parseHash().map(n=>c(n,!1)),issuer:()=>this.parsePublicKey(),header:()=>t(this.bytes.slice(e,this.offset+y)),commands:()=>this.parseCommands(),signature:()=>this.tlvEncoded(()=>this.parseSignature())}))}*parseTLV(e){for(;;){const r=e[this.offset];if(typeof r>"u")return a(new s("Unexpected end of TLV"));this.offset++;const n=e[this.offset];if(typeof n>"u")return a(new s("Invalid end of TLV, expected length"));this.offset++;const o=this.offset+n,l=e.slice(this.offset,o);if(o>e.length)return a(new s("Invalid end of TLV value"));switch(this.offset=o,r){case i.Null:yield n>0?a(new s("Invalid null length")):t({tag:r,value:null});break;case i.Int:{const u=new DataView(l.buffer);switch(l.length){case 1:yield t({tag:r,value:u.getUint8(0)});break;case 2:yield t({tag:r,value:u.getUint16(0,!1)});break;case 4:yield t({tag:r,value:u.getUint32(0,!1)});break;default:yield a(new s("Unsupported integer length"))}}break;case i.String:yield l.length===0?a(new s("Empty string value")):t({tag:r,value:new TextDecoder().decode(l)});break;case i.Hash:case i.Signature:case i.Bytes:case i.PublicKey:yield t({tag:r,value:l});break;default:yield t({tag:r,value:new Uint8Array([r,n,...l])});break}}}}export{w as TLVParser};
|
|
2
2
|
//# sourceMappingURL=TLVParser.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../src/internal/utils/TLVParser.ts"],
|
|
4
|
-
"sourcesContent": ["import { type Either, Left, Right } from \"purify-ts\";\n\nimport { LKRPParsingError } from \"@api/app-binder/Errors\";\nimport { type LKRPBlockParsedData } from \"@internal/models/LKRPBlockTypes\";\nimport { type LKRPCommandData } from \"@internal/models/LKRPCommandTypes\";\nimport { CommandTags, GeneralTags } from \"@internal/models/Tags\";\n\nimport { derivationPathAsString } from \"./derivationPath\";\nimport { eitherSeqRecord } from \"./eitherSeqRecord\";\nimport { bytesToHex } from \"./hex\";\nimport { LKRPCommand } from \"./LKRPCommand\";\n\ntype ParserValue = Either<\n LKRPParsingError,\n | { tag: GeneralTags.Null; value: null }\n | { tag: GeneralTags.Int; value: number }\n | { tag: GeneralTags.Hash; value: Uint8Array }\n | { tag: GeneralTags.Signature; value: Uint8Array }\n | { tag: GeneralTags.String; value: string }\n | { tag: GeneralTags.Bytes; value: Uint8Array }\n | { tag: GeneralTags.PublicKey; value: Uint8Array }\n | { tag: CommandTags; value: Uint8Array }\n | {\n tag: Exclude<number, GeneralTags | CommandTags>;\n value: null | number | Uint8Array;\n }\n>;\n\ntype Parser = Generator<ParserValue, ParserValue, void>;\n\nconst COMMAND_COUNT_LENGTH = 3;\n\nexport class TLVParser {\n private readonly bytes: Uint8Array;\n private readonly parser: Parser;\n private offset = 0;\n\n constructor(bytes: Uint8Array) {\n this.bytes = bytes;\n this.parser = this.parseTLV(bytes);\n }\n\n get state() {\n return {\n offset: this.offset,\n isDone: this.offset >= this.bytes.length,\n };\n }\n\n parse(): ParserValue {\n return this.parser.next().value;\n }\n\n tlvEncoded(\n fn: () => Either<LKRPParsingError, unknown>,\n ): Either<LKRPParsingError, Uint8Array> {\n const start = this.offset;\n return fn().map(() => this.bytes.slice(start, this.offset));\n }\n\n parseNull(): Either<LKRPParsingError, null> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Null\n ? Left(new LKRPParsingError(\"Expected null\"))\n : Right(next.value),\n );\n }\n\n parseInt(): Either<LKRPParsingError, number> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Int\n ? Left(new LKRPParsingError(\"Expected a number\"))\n : Right(next.value),\n );\n }\n\n parseHash(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Hash\n ? Left(new LKRPParsingError(\"Expected a hash\"))\n : Right(next.value),\n );\n }\n\n parseSignature(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Signature\n ? Left(new LKRPParsingError(\"Expected a signature\"))\n : Right(next.value),\n );\n }\n\n parseString(): Either<LKRPParsingError, string> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.String\n ? Left(new LKRPParsingError(\"Expected a string\"))\n : Right(next.value),\n );\n }\n\n parseBytes(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Bytes\n ? Left(new LKRPParsingError(\"Expected bytes\"))\n : Right(next.value),\n );\n }\n\n parsePublicKey(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.PublicKey\n ? Left(new LKRPParsingError(\"Expected a public key\"))\n : Right(next.value),\n );\n }\n\n parseCommandBytes(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain(({ tag, value }) =>\n tag < 0x10 || tag > 0x3f || !(value instanceof Uint8Array)\n ? Left(\n new LKRPParsingError(\n `Invalid command type: 0x${tag.toString(16).padStart(2, \"0\")}`,\n ),\n )\n : Right(value),\n );\n }\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#Commands\n parseCommandData(): Either<LKRPParsingError, LKRPCommandData> {\n const bytes = this.parseCommandBytes();\n const end = this.offset;\n\n return bytes\n .chain<LKRPParsingError, LKRPCommandData>((value) => {\n const type = value[0];\n this.offset -= value.length - 2; // Adjust offset to the start of the command\n switch (type) {\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#Seed-(0x10)\n case CommandTags.Seed:\n return eitherSeqRecord({\n type,\n topic: () => this.parseBytes(),\n protocolVersion: () => this.parseInt(),\n groupKey: () => this.parsePublicKey(),\n initializationVector: () => this.parseBytes(),\n encryptedXpriv: () => this.parseBytes(),\n ephemeralPublicKey: () => this.parsePublicKey(),\n });\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#AddMember-(0x11)\n case CommandTags.AddMember:\n return eitherSeqRecord({\n type,\n name: () => this.parseString(),\n publicKey: () => this.parsePublicKey(),\n permissions: () => this.parseInt(),\n });\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#PublishKey-(0x12)\n case CommandTags.PublishKey:\n return eitherSeqRecord({\n type,\n initializationVector: () => this.parseBytes(),\n encryptedXpriv: () => this.parseBytes(),\n recipient: () => this.parsePublicKey(),\n ephemeralPublicKey: () => this.parsePublicKey(),\n });\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#Derive-(0x15)\n case CommandTags.Derive:\n return eitherSeqRecord({\n type,\n path: () => this.parseBytes().map(derivationPathAsString),\n groupKey: () => this.parsePublicKey(),\n initializationVector: () => this.parseBytes(),\n encryptedXpriv: () => this.parseBytes(),\n ephemeralPublicKey: () => this.parsePublicKey(),\n });\n\n default:\n return Left(\n new LKRPParsingError(\n `Unsupported command type: 0x${type?.toString(16).padStart(2, \"0\")}`,\n ),\n );\n }\n })\n .chain((data) =>\n this.offset === end\n ? Right(data)\n : Left(new LKRPParsingError(\"Command was parsed incorrectly\")),\n );\n }\n\n parseCommands(): Either<LKRPParsingError, LKRPCommand[]> {\n return this.parse()\n .chain((next) =>\n next.tag !== GeneralTags.Int\n ? Left(new LKRPParsingError(\"Expected a command count\"))\n : Right(next.value),\n )\n .chain((count) => {\n const commands: LKRPCommand[] = [];\n for (let i = 0; i < count; i++) {\n const command = this.parseCommandBytes();\n if (command.isLeft()) return command;\n command.ifRight((value) => commands.push(new LKRPCommand(value)));\n }\n return Right(commands);\n });\n }\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#Block\n parseBlockData(): Either<LKRPParsingError, LKRPBlockParsedData> {\n const startOffset = this.offset;\n return this.parseInt().chain((_version) =>\n eitherSeqRecord({\n parent: () => this.parseHash().map(bytesToHex),\n issuer: () => this.parsePublicKey(),\n header: () =>\n Right(\n this.bytes.slice(startOffset, this.offset + COMMAND_COUNT_LENGTH),\n ),\n commands: () => this.parseCommands(),\n signature: () => this.tlvEncoded(() => this.parseSignature()),\n }),\n );\n }\n\n private *parseTLV(bytes: Uint8Array): Parser {\n while (true) {\n const tag = bytes[this.offset];\n if (typeof tag === \"undefined\") {\n return Left(new LKRPParsingError(\"Unexpected end of TLV\"));\n }\n this.offset++;\n const length = bytes[this.offset];\n if (typeof length === \"undefined\") {\n return Left(\n new LKRPParsingError(\"Invalid end of TLV, expected length\"),\n );\n }\n this.offset++;\n const valueEnd = this.offset + length;\n const value = bytes.slice(this.offset, valueEnd);\n if (valueEnd > bytes.length) {\n return Left(new LKRPParsingError(\"Invalid end of TLV value\"));\n }\n this.offset = valueEnd;\n\n switch (tag) {\n case GeneralTags.Null:\n yield length > 0\n ? Left(new LKRPParsingError(\"Invalid null length\"))\n : Right({ tag, value: null });\n break;\n\n case GeneralTags.Int:\n {\n const dataView = new DataView(value.buffer);\n switch (value.length) {\n case 1:\n yield Right({ tag, value: dataView.getUint8(0) });\n break;\n case 2:\n yield Right({ tag, value: dataView.getUint16(0, false) }); // Big-endian\n break;\n case 4:\n yield Right({ tag, value: dataView.getUint32(0, false) }); // Big-endian\n break;\n default:\n yield Left(new LKRPParsingError(\"Unsupported integer length\"));\n }\n }\n break;\n\n case GeneralTags.String:\n yield value.length === 0\n ? Left(new LKRPParsingError(\"Empty string value\"))\n : Right({ tag, value: new TextDecoder().decode(value) });\n break;\n\n case GeneralTags.Hash:\n case GeneralTags.Signature:\n case GeneralTags.Bytes:\n case GeneralTags.PublicKey:\n yield Right({ tag, value });\n break;\n\n default:\n yield Right({ tag, value: new Uint8Array([tag, length, ...value]) });\n break;\n }\n }\n }\n}\n"],
|
|
5
|
-
"mappings": "AAAA,OAAsB,
|
|
6
|
-
"names": ["Left", "Right", "LKRPParsingError", "CommandTags", "GeneralTags", "derivationPathAsString", "eitherSeqRecord", "
|
|
4
|
+
"sourcesContent": ["import { bufferToHexaString } from \"@ledgerhq/device-management-kit\";\nimport { type Either, Left, Right } from \"purify-ts\";\n\nimport { LKRPParsingError } from \"@api/model/Errors\";\nimport { type LKRPBlockParsedData } from \"@internal/models/LKRPBlockTypes\";\nimport { type LKRPCommandData } from \"@internal/models/LKRPCommandTypes\";\nimport { CommandTags, GeneralTags } from \"@internal/models/Tags\";\n\nimport { derivationPathAsString } from \"./derivationPath\";\nimport { eitherSeqRecord } from \"./eitherSeqRecord\";\nimport { LKRPCommand } from \"./LKRPCommand\";\n\ntype ParserValue = Either<\n LKRPParsingError,\n | { tag: GeneralTags.Null; value: null }\n | { tag: GeneralTags.Int; value: number }\n | { tag: GeneralTags.Hash; value: Uint8Array }\n | { tag: GeneralTags.Signature; value: Uint8Array }\n | { tag: GeneralTags.String; value: string }\n | { tag: GeneralTags.Bytes; value: Uint8Array }\n | { tag: GeneralTags.PublicKey; value: Uint8Array }\n | { tag: CommandTags; value: Uint8Array }\n | {\n tag: Exclude<number, GeneralTags | CommandTags>;\n value: null | number | Uint8Array;\n }\n>;\n\ntype Parser = Generator<ParserValue, ParserValue, void>;\n\nconst COMMAND_COUNT_LENGTH = 3;\n\nexport class TLVParser {\n private readonly bytes: Uint8Array;\n private readonly parser: Parser;\n private offset = 0;\n\n constructor(bytes: Uint8Array) {\n this.bytes = bytes;\n this.parser = this.parseTLV(bytes);\n }\n\n get state() {\n return {\n offset: this.offset,\n isDone: this.offset >= this.bytes.length,\n };\n }\n\n parse(): ParserValue {\n return this.parser.next().value;\n }\n\n tlvEncoded(\n fn: () => Either<LKRPParsingError, unknown>,\n ): Either<LKRPParsingError, Uint8Array> {\n const start = this.offset;\n return fn().map(() => this.bytes.slice(start, this.offset));\n }\n\n parseNull(): Either<LKRPParsingError, null> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Null\n ? Left(new LKRPParsingError(\"Expected null\"))\n : Right(next.value),\n );\n }\n\n parseInt(): Either<LKRPParsingError, number> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Int\n ? Left(new LKRPParsingError(\"Expected a number\"))\n : Right(next.value),\n );\n }\n\n parseHash(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Hash\n ? Left(new LKRPParsingError(\"Expected a hash\"))\n : Right(next.value),\n );\n }\n\n parseSignature(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Signature\n ? Left(new LKRPParsingError(\"Expected a signature\"))\n : Right(next.value),\n );\n }\n\n parseString(): Either<LKRPParsingError, string> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.String\n ? Left(new LKRPParsingError(\"Expected a string\"))\n : Right(next.value),\n );\n }\n\n parseBytes(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.Bytes\n ? Left(new LKRPParsingError(\"Expected bytes\"))\n : Right(next.value),\n );\n }\n\n parsePublicKey(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain((next) =>\n next.tag !== GeneralTags.PublicKey\n ? Left(new LKRPParsingError(\"Expected a public key\"))\n : Right(next.value),\n );\n }\n\n parseCommandBytes(): Either<LKRPParsingError, Uint8Array> {\n return this.parse().chain(({ tag, value }) =>\n tag < 0x10 || tag > 0x3f || !(value instanceof Uint8Array)\n ? Left(\n new LKRPParsingError(\n `Invalid command type: 0x${tag.toString(16).padStart(2, \"0\")}`,\n ),\n )\n : Right(value),\n );\n }\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#Commands\n parseCommandData(): Either<LKRPParsingError, LKRPCommandData> {\n const bytes = this.parseCommandBytes();\n const end = this.offset;\n\n return bytes\n .chain<LKRPParsingError, LKRPCommandData>((value) => {\n const type = value[0];\n this.offset -= value.length - 2; // Adjust offset to the start of the command\n switch (type) {\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#Seed-(0x10)\n case CommandTags.Seed:\n return eitherSeqRecord({\n type,\n topic: () => this.parseBytes(),\n protocolVersion: () => this.parseInt(),\n groupKey: () => this.parsePublicKey(),\n initializationVector: () => this.parseBytes(),\n encryptedXpriv: () => this.parseBytes(),\n ephemeralPublicKey: () => this.parsePublicKey(),\n });\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#AddMember-(0x11)\n case CommandTags.AddMember:\n return eitherSeqRecord({\n type,\n name: () => this.parseString(),\n publicKey: () => this.parsePublicKey(),\n permissions: () => this.parseInt(),\n });\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#PublishKey-(0x12)\n case CommandTags.PublishKey:\n return eitherSeqRecord({\n type,\n initializationVector: () => this.parseBytes(),\n encryptedXpriv: () => this.parseBytes(),\n recipient: () => this.parsePublicKey(),\n ephemeralPublicKey: () => this.parsePublicKey(),\n });\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#Derive-(0x15)\n case CommandTags.Derive:\n return eitherSeqRecord({\n type,\n path: () => this.parseBytes().map(derivationPathAsString),\n groupKey: () => this.parsePublicKey(),\n initializationVector: () => this.parseBytes(),\n encryptedXpriv: () => this.parseBytes(),\n ephemeralPublicKey: () => this.parsePublicKey(),\n });\n\n default:\n return Left(\n new LKRPParsingError(\n `Unsupported command type: 0x${type?.toString(16).padStart(2, \"0\")}`,\n ),\n );\n }\n })\n .chain((data) =>\n this.offset === end\n ? Right(data)\n : Left(new LKRPParsingError(\"Command was parsed incorrectly\")),\n );\n }\n\n parseCommands(): Either<LKRPParsingError, LKRPCommand[]> {\n return this.parse()\n .chain((next) =>\n next.tag !== GeneralTags.Int\n ? Left(new LKRPParsingError(\"Expected a command count\"))\n : Right(next.value),\n )\n .chain((count) => {\n const commands: LKRPCommand[] = [];\n for (let i = 0; i < count; i++) {\n const command = this.parseCommandBytes();\n if (command.isLeft()) return command;\n command.ifRight((value) => commands.push(new LKRPCommand(value)));\n }\n return Right(commands);\n });\n }\n\n // https://ledgerhq.atlassian.net/wiki/spaces/TA/pages/4105207815/ARCH+LKRP+-+v1+specifications#Block\n parseBlockData(): Either<LKRPParsingError, LKRPBlockParsedData> {\n const startOffset = this.offset;\n return this.parseInt().chain((_version) =>\n eitherSeqRecord({\n parent: () =>\n this.parseHash().map((buf) => bufferToHexaString(buf, false)),\n issuer: () => this.parsePublicKey(),\n header: () =>\n Right(\n this.bytes.slice(startOffset, this.offset + COMMAND_COUNT_LENGTH),\n ),\n commands: () => this.parseCommands(),\n signature: () => this.tlvEncoded(() => this.parseSignature()),\n }),\n );\n }\n\n private *parseTLV(bytes: Uint8Array): Parser {\n while (true) {\n const tag = bytes[this.offset];\n if (typeof tag === \"undefined\") {\n return Left(new LKRPParsingError(\"Unexpected end of TLV\"));\n }\n this.offset++;\n const length = bytes[this.offset];\n if (typeof length === \"undefined\") {\n return Left(\n new LKRPParsingError(\"Invalid end of TLV, expected length\"),\n );\n }\n this.offset++;\n const valueEnd = this.offset + length;\n const value = bytes.slice(this.offset, valueEnd);\n if (valueEnd > bytes.length) {\n return Left(new LKRPParsingError(\"Invalid end of TLV value\"));\n }\n this.offset = valueEnd;\n\n switch (tag) {\n case GeneralTags.Null:\n yield length > 0\n ? Left(new LKRPParsingError(\"Invalid null length\"))\n : Right({ tag, value: null });\n break;\n\n case GeneralTags.Int:\n {\n const dataView = new DataView(value.buffer);\n switch (value.length) {\n case 1:\n yield Right({ tag, value: dataView.getUint8(0) });\n break;\n case 2:\n yield Right({ tag, value: dataView.getUint16(0, false) }); // Big-endian\n break;\n case 4:\n yield Right({ tag, value: dataView.getUint32(0, false) }); // Big-endian\n break;\n default:\n yield Left(new LKRPParsingError(\"Unsupported integer length\"));\n }\n }\n break;\n\n case GeneralTags.String:\n yield value.length === 0\n ? Left(new LKRPParsingError(\"Empty string value\"))\n : Right({ tag, value: new TextDecoder().decode(value) });\n break;\n\n case GeneralTags.Hash:\n case GeneralTags.Signature:\n case GeneralTags.Bytes:\n case GeneralTags.PublicKey:\n yield Right({ tag, value });\n break;\n\n default:\n yield Right({ tag, value: new Uint8Array([tag, length, ...value]) });\n break;\n }\n }\n }\n}\n"],
|
|
5
|
+
"mappings": "AAAA,OAAS,sBAAAA,MAA0B,kCACnC,OAAsB,QAAAC,EAAM,SAAAC,MAAa,YAEzC,OAAS,oBAAAC,MAAwB,oBAGjC,OAAS,eAAAC,EAAa,eAAAC,MAAmB,wBAEzC,OAAS,0BAAAC,MAA8B,mBACvC,OAAS,mBAAAC,MAAuB,oBAChC,OAAS,eAAAC,MAAmB,gBAoB5B,MAAMC,EAAuB,EAEtB,MAAMC,CAAU,CACJ,MACA,OACT,OAAS,EAEjB,YAAYC,EAAmB,CAC7B,KAAK,MAAQA,EACb,KAAK,OAAS,KAAK,SAASA,CAAK,CACnC,CAEA,IAAI,OAAQ,CACV,MAAO,CACL,OAAQ,KAAK,OACb,OAAQ,KAAK,QAAU,KAAK,MAAM,MACpC,CACF,CAEA,OAAqB,CACnB,OAAO,KAAK,OAAO,KAAK,EAAE,KAC5B,CAEA,WACEC,EACsC,CACtC,MAAMC,EAAQ,KAAK,OACnB,OAAOD,EAAG,EAAE,IAAI,IAAM,KAAK,MAAM,MAAMC,EAAO,KAAK,MAAM,CAAC,CAC5D,CAEA,WAA4C,CAC1C,OAAO,KAAK,MAAM,EAAE,MAAOC,GACzBA,EAAK,MAAQT,EAAY,KACrBJ,EAAK,IAAIE,EAAiB,eAAe,CAAC,EAC1CD,EAAMY,EAAK,KAAK,CACtB,CACF,CAEA,UAA6C,CAC3C,OAAO,KAAK,MAAM,EAAE,MAAOA,GACzBA,EAAK,MAAQT,EAAY,IACrBJ,EAAK,IAAIE,EAAiB,mBAAmB,CAAC,EAC9CD,EAAMY,EAAK,KAAK,CACtB,CACF,CAEA,WAAkD,CAChD,OAAO,KAAK,MAAM,EAAE,MAAOA,GACzBA,EAAK,MAAQT,EAAY,KACrBJ,EAAK,IAAIE,EAAiB,iBAAiB,CAAC,EAC5CD,EAAMY,EAAK,KAAK,CACtB,CACF,CAEA,gBAAuD,CACrD,OAAO,KAAK,MAAM,EAAE,MAAOA,GACzBA,EAAK,MAAQT,EAAY,UACrBJ,EAAK,IAAIE,EAAiB,sBAAsB,CAAC,EACjDD,EAAMY,EAAK,KAAK,CACtB,CACF,CAEA,aAAgD,CAC9C,OAAO,KAAK,MAAM,EAAE,MAAOA,GACzBA,EAAK,MAAQT,EAAY,OACrBJ,EAAK,IAAIE,EAAiB,mBAAmB,CAAC,EAC9CD,EAAMY,EAAK,KAAK,CACtB,CACF,CAEA,YAAmD,CACjD,OAAO,KAAK,MAAM,EAAE,MAAOA,GACzBA,EAAK,MAAQT,EAAY,MACrBJ,EAAK,IAAIE,EAAiB,gBAAgB,CAAC,EAC3CD,EAAMY,EAAK,KAAK,CACtB,CACF,CAEA,gBAAuD,CACrD,OAAO,KAAK,MAAM,EAAE,MAAOA,GACzBA,EAAK,MAAQT,EAAY,UACrBJ,EAAK,IAAIE,EAAiB,uBAAuB,CAAC,EAClDD,EAAMY,EAAK,KAAK,CACtB,CACF,CAEA,mBAA0D,CACxD,OAAO,KAAK,MAAM,EAAE,MAAM,CAAC,CAAE,IAAAC,EAAK,MAAAC,CAAM,IACtCD,EAAM,IAAQA,EAAM,IAAQ,EAAEC,aAAiB,YAC3Cf,EACE,IAAIE,EACF,2BAA2BY,EAAI,SAAS,EAAE,EAAE,SAAS,EAAG,GAAG,CAAC,EAC9D,CACF,EACAb,EAAMc,CAAK,CACjB,CACF,CAGA,kBAA8D,CAC5D,MAAML,EAAQ,KAAK,kBAAkB,EAC/BM,EAAM,KAAK,OAEjB,OAAON,EACJ,MAA0CK,GAAU,CACnD,MAAME,EAAOF,EAAM,CAAC,EAEpB,OADA,KAAK,QAAUA,EAAM,OAAS,EACtBE,EAAM,CAEZ,KAAKd,EAAY,KACf,OAAOG,EAAgB,CACrB,KAAAW,EACA,MAAO,IAAM,KAAK,WAAW,EAC7B,gBAAiB,IAAM,KAAK,SAAS,EACrC,SAAU,IAAM,KAAK,eAAe,EACpC,qBAAsB,IAAM,KAAK,WAAW,EAC5C,eAAgB,IAAM,KAAK,WAAW,EACtC,mBAAoB,IAAM,KAAK,eAAe,CAChD,CAAC,EAGH,KAAKd,EAAY,UACf,OAAOG,EAAgB,CACrB,KAAAW,EACA,KAAM,IAAM,KAAK,YAAY,EAC7B,UAAW,IAAM,KAAK,eAAe,EACrC,YAAa,IAAM,KAAK,SAAS,CACnC,CAAC,EAGH,KAAKd,EAAY,WACf,OAAOG,EAAgB,CACrB,KAAAW,EACA,qBAAsB,IAAM,KAAK,WAAW,EAC5C,eAAgB,IAAM,KAAK,WAAW,EACtC,UAAW,IAAM,KAAK,eAAe,EACrC,mBAAoB,IAAM,KAAK,eAAe,CAChD,CAAC,EAGH,KAAKd,EAAY,OACf,OAAOG,EAAgB,CACrB,KAAAW,EACA,KAAM,IAAM,KAAK,WAAW,EAAE,IAAIZ,CAAsB,EACxD,SAAU,IAAM,KAAK,eAAe,EACpC,qBAAsB,IAAM,KAAK,WAAW,EAC5C,eAAgB,IAAM,KAAK,WAAW,EACtC,mBAAoB,IAAM,KAAK,eAAe,CAChD,CAAC,EAEH,QACE,OAAOL,EACL,IAAIE,EACF,+BAA+Be,GAAM,SAAS,EAAE,EAAE,SAAS,EAAG,GAAG,CAAC,EACpE,CACF,CACJ,CACF,CAAC,EACA,MAAOC,GACN,KAAK,SAAWF,EACZf,EAAMiB,CAAI,EACVlB,EAAK,IAAIE,EAAiB,gCAAgC,CAAC,CACjE,CACJ,CAEA,eAAyD,CACvD,OAAO,KAAK,MAAM,EACf,MAAOW,GACNA,EAAK,MAAQT,EAAY,IACrBJ,EAAK,IAAIE,EAAiB,0BAA0B,CAAC,EACrDD,EAAMY,EAAK,KAAK,CACtB,EACC,MAAOM,GAAU,CAChB,MAAMC,EAA0B,CAAC,EACjC,QAASC,EAAI,EAAGA,EAAIF,EAAOE,IAAK,CAC9B,MAAMC,EAAU,KAAK,kBAAkB,EACvC,GAAIA,EAAQ,OAAO,EAAG,OAAOA,EAC7BA,EAAQ,QAASP,GAAUK,EAAS,KAAK,IAAIb,EAAYQ,CAAK,CAAC,CAAC,CAClE,CACA,OAAOd,EAAMmB,CAAQ,CACvB,CAAC,CACL,CAGA,gBAAgE,CAC9D,MAAMG,EAAc,KAAK,OACzB,OAAO,KAAK,SAAS,EAAE,MAAOC,GAC5BlB,EAAgB,CACd,OAAQ,IACN,KAAK,UAAU,EAAE,IAAKmB,GAAQ1B,EAAmB0B,EAAK,EAAK,CAAC,EAC9D,OAAQ,IAAM,KAAK,eAAe,EAClC,OAAQ,IACNxB,EACE,KAAK,MAAM,MAAMsB,EAAa,KAAK,OAASf,CAAoB,CAClE,EACF,SAAU,IAAM,KAAK,cAAc,EACnC,UAAW,IAAM,KAAK,WAAW,IAAM,KAAK,eAAe,CAAC,CAC9D,CAAC,CACH,CACF,CAEA,CAAS,SAASE,EAA2B,CAC3C,OAAa,CACX,MAAMI,EAAMJ,EAAM,KAAK,MAAM,EAC7B,GAAI,OAAOI,EAAQ,IACjB,OAAOd,EAAK,IAAIE,EAAiB,uBAAuB,CAAC,EAE3D,KAAK,SACL,MAAMwB,EAAShB,EAAM,KAAK,MAAM,EAChC,GAAI,OAAOgB,EAAW,IACpB,OAAO1B,EACL,IAAIE,EAAiB,qCAAqC,CAC5D,EAEF,KAAK,SACL,MAAMyB,EAAW,KAAK,OAASD,EACzBX,EAAQL,EAAM,MAAM,KAAK,OAAQiB,CAAQ,EAC/C,GAAIA,EAAWjB,EAAM,OACnB,OAAOV,EAAK,IAAIE,EAAiB,0BAA0B,CAAC,EAI9D,OAFA,KAAK,OAASyB,EAENb,EAAK,CACX,KAAKV,EAAY,KACf,MAAMsB,EAAS,EACX1B,EAAK,IAAIE,EAAiB,qBAAqB,CAAC,EAChDD,EAAM,CAAE,IAAAa,EAAK,MAAO,IAAK,CAAC,EAC9B,MAEF,KAAKV,EAAY,IACf,CACE,MAAMwB,EAAW,IAAI,SAASb,EAAM,MAAM,EAC1C,OAAQA,EAAM,OAAQ,CACpB,IAAK,GACH,MAAMd,EAAM,CAAE,IAAAa,EAAK,MAAOc,EAAS,SAAS,CAAC,CAAE,CAAC,EAChD,MACF,IAAK,GACH,MAAM3B,EAAM,CAAE,IAAAa,EAAK,MAAOc,EAAS,UAAU,EAAG,EAAK,CAAE,CAAC,EACxD,MACF,IAAK,GACH,MAAM3B,EAAM,CAAE,IAAAa,EAAK,MAAOc,EAAS,UAAU,EAAG,EAAK,CAAE,CAAC,EACxD,MACF,QACE,MAAM5B,EAAK,IAAIE,EAAiB,4BAA4B,CAAC,CACjE,CACF,CACA,MAEF,KAAKE,EAAY,OACf,MAAMW,EAAM,SAAW,EACnBf,EAAK,IAAIE,EAAiB,oBAAoB,CAAC,EAC/CD,EAAM,CAAE,IAAAa,EAAK,MAAO,IAAI,YAAY,EAAE,OAAOC,CAAK,CAAE,CAAC,EACzD,MAEF,KAAKX,EAAY,KACjB,KAAKA,EAAY,UACjB,KAAKA,EAAY,MACjB,KAAKA,EAAY,UACf,MAAMH,EAAM,CAAE,IAAAa,EAAK,MAAAC,CAAM,CAAC,EAC1B,MAEF,QACE,MAAMd,EAAM,CAAE,IAAAa,EAAK,MAAO,IAAI,WAAW,CAACA,EAAKY,EAAQ,GAAGX,CAAK,CAAC,CAAE,CAAC,EACnE,KACJ,CACF,CACF,CACF",
|
|
6
|
+
"names": ["bufferToHexaString", "Left", "Right", "LKRPParsingError", "CommandTags", "GeneralTags", "derivationPathAsString", "eitherSeqRecord", "LKRPCommand", "COMMAND_COUNT_LENGTH", "TLVParser", "bytes", "fn", "start", "next", "tag", "value", "end", "type", "data", "count", "commands", "i", "command", "startOffset", "_version", "buf", "length", "valueEnd", "dataView"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{Left as s,Right as o}from"purify-ts";import{LKRPParsingError as i}from"../../api/
|
|
1
|
+
import{Left as s,Right as o}from"purify-ts";import{LKRPParsingError as i}from"../../api/model/Errors";import{CommandTags as r,GeneralTags as e}from"../models/Tags";import{LKRPCommand as d}from"./LKRPCommand";import{TLVParser as n}from"./TLVParser";describe("TLVParser",()=>{describe("Block Data Parsing",()=>{describe("parseCommands",()=>{it("should parse has many commands has specified by the command count value",()=>{const a=new n(new Uint8Array([e.Int,1,2,r.AddMember,3,e.Int,1,1,r.Seed,3,e.Int,1,2])).parseCommands();expect(a).toStrictEqual(o([new d(new Uint8Array([r.AddMember,3,e.Int,1,1])),new d(new Uint8Array([r.Seed,3,e.Int,1,2]))]))})}),describe("parseBlockData",()=>{it("should parse a valid block data",()=>{const a=new n(Uint8Array.from([[e.Int,1,1],[e.Hash,3,1,2,3],[e.PublicKey,3,4,5,6],[e.Int,1,2],[r.AddMember,3,e.Int,1,1],[r.Seed,3,e.Int,1,2],[e.Signature,3,7,8,9]].flat())).parseBlockData();expect(a).toStrictEqual(o({parent:"010203",issuer:new Uint8Array([4,5,6]),header:Uint8Array.from([[e.Int,1,1],[e.Hash,3,1,2,3],[e.PublicKey,3,4,5,6],[e.Int,1,2]].flat()),commands:[new d(new Uint8Array([r.AddMember,3,e.Int,1,1])),new d(new Uint8Array([r.Seed,3,e.Int,1,2]))],signature:Uint8Array.from([e.Signature,3,7,8,9])}))}),it("should fail if the block data is invalid",()=>{const a=new n(new Uint8Array([])).parseBlockData();expect(a).toEqual(s(new i("Unexpected end of TLV")))})})}),describe("Command Data Parsing",()=>{describe("parseCommandBytes",()=>{it("should parse a valid command bytes",()=>{const a=new n(new Uint8Array([r.AddMember,3,1,2,3])).parseCommandBytes();expect(a).toEqual(o(new Uint8Array([r.AddMember,3,1,2,3])))}),it("should fail if the tag is not a command",()=>{const a=new n(new Uint8Array([e.Int,1,1])).parseCommandBytes();expect(a).toEqual(s(new i("Invalid command type: 0x01")))})}),describe("Parse Seed Command Data",()=>{it("should parse a valid seed command data",()=>{const t=new Uint8Array([e.Bytes,3,1,2,3,e.Int,2,1,2,e.PublicKey,3,2,4,6,e.Bytes,3,3,5,7,e.Bytes,3,4,8,16,e.PublicKey,3,10,11,12]),x=new n(new Uint8Array([r.Seed,t.length,...t])).parseCommandData();expect(x).toStrictEqual(o({type:r.Seed,topic:new Uint8Array([1,2,3]),protocolVersion:258,groupKey:new Uint8Array([2,4,6]),initializationVector:new Uint8Array([3,5,7]),encryptedXpriv:new Uint8Array([4,8,16]),ephemeralPublicKey:new Uint8Array([10,11,12])}))}),it("should fail if the command data is invalid",()=>{const t=new Uint8Array([e.Signature,3,1,2,3]),a=new Uint8Array([e.Bytes,3,1,2,3]),x=new n(new Uint8Array([r.Seed,t.length,...t])),p=new n(new Uint8Array([r.Seed,a.length,...a])),c=x.parseCommandData(),l=p.parseCommandData();expect(c).toEqual(s(new i("Expected bytes"))),expect(l).toEqual(s(new i("Unexpected end of TLV")))})}),describe("Parse AddMember Command Data",()=>{it("should parse a valid add member command data",()=>{const t=new Uint8Array([e.String,5,65,108,105,99,101,e.PublicKey,3,1,2,3,e.Int,1,1]),x=new n(new Uint8Array([r.AddMember,t.length,...t])).parseCommandData();expect(x).toStrictEqual(o({type:r.AddMember,name:"Alice",publicKey:new Uint8Array([1,2,3]),permissions:1}))}),it("should fail if the command data is invalid",()=>{const t=new Uint8Array([e.Bytes,3,1,2,3]),a=new Uint8Array([e.String,5,65,108,105,99,101]),x=new n(new Uint8Array([r.AddMember,t.length,...t])),p=new n(new Uint8Array([r.AddMember,a.length,...a])),c=x.parseCommandData(),l=p.parseCommandData();expect(c).toEqual(s(new i("Expected a string"))),expect(l).toEqual(s(new i("Unexpected end of TLV")))})}),describe("Parse PublishKey Command Data",()=>{it("should parse a valid publish key command data",()=>{const t=new Uint8Array([e.Bytes,3,1,2,3,e.Bytes,3,4,5,6,e.PublicKey,3,3,5,7,e.PublicKey,3,8,9,10]),x=new n(new Uint8Array([r.PublishKey,t.length,...t])).parseCommandData();expect(x).toStrictEqual(o({type:r.PublishKey,initializationVector:new Uint8Array([1,2,3]),encryptedXpriv:new Uint8Array([4,5,6]),recipient:new Uint8Array([3,5,7]),ephemeralPublicKey:new Uint8Array([8,9,10])}))}),it("should fail if the command data is invalid",()=>{const t=new Uint8Array([e.Int,2,1,2]),a=new Uint8Array([e.Bytes,3,1,2,3]),x=new n(new Uint8Array([r.PublishKey,t.length,...t])),p=new n(new Uint8Array([r.PublishKey,a.length,...a])),c=x.parseCommandData(),l=p.parseCommandData();expect(c).toEqual(s(new i("Expected bytes"))),expect(l).toEqual(s(new i("Unexpected end of TLV")))})}),describe("Parse Derive Command Data",()=>{it("should parse a valid derive command data",()=>{const t=new Uint8Array([e.Bytes,4,0,0,0,1,e.PublicKey,3,4,5,6,e.Bytes,3,3,5,7,e.Bytes,3,8,9,10,e.PublicKey,3,10,11,12]),x=new n(new Uint8Array([r.Derive,t.length,...t])).parseCommandData();expect(x).toStrictEqual(o({type:r.Derive,path:"m/1",groupKey:new Uint8Array([4,5,6]),initializationVector:new Uint8Array([3,5,7]),encryptedXpriv:new Uint8Array([8,9,10]),ephemeralPublicKey:new Uint8Array([10,11,12])}))}),it("should fail if the command data is invalid",()=>{const t=new Uint8Array([e.Int,2,1,2]),a=new Uint8Array([e.Bytes,3,1,2,3]),x=new n(new Uint8Array([r.Derive,t.length,...t])),p=new n(new Uint8Array([r.Derive,a.length,...a])),c=x.parseCommandData(),l=p.parseCommandData();expect(c).toEqual(s(new i("Expected bytes"))),expect(l).toEqual(s(new i("Unexpected end of TLV")))})}),it("should fail on unsupported command type",()=>{const a=new n(new Uint8Array([63,1,1])).parseCommandData();expect(a).toEqual(s(new i("Unsupported command type: 0x3f")))})}),describe("General Types Parsing",()=>{describe("parse",()=>{it("should parse a valid TLV structure",()=>{const t=new n(new Uint8Array([e.Int,1,1,e.Bytes,0])),a=t.parse(),x=t.parse();expect(a).toEqual(o({tag:e.Int,value:1})),expect(x).toEqual(o({tag:e.Bytes,value:new Uint8Array([])}))}),it("should fail on invalid TLV structure",()=>{const t=new n(new Uint8Array([])),a=new n(new Uint8Array([e.Int])),x=new n(new Uint8Array([e.Int,2])),p=t.parse(),c=a.parse(),l=x.parse();expect(p).toEqual(s(new i("Unexpected end of TLV"))),expect(c).toEqual(s(new i("Invalid end of TLV, expected length"))),expect(l).toEqual(s(new i("Invalid end of TLV value")))})}),describe("parseNull",()=>{it("should parse a null value",()=>{const a=new n(new Uint8Array([e.Null,0])).parseNull();expect(a).toEqual(o(null))}),it("should fail if the tag is not null",()=>{const a=new n(new Uint8Array([e.Int,1,1])).parseNull();expect(a).toEqual(s(new i("Expected null")))}),it("should fail if the format is invalid",()=>{const a=new n(new Uint8Array([e.Null,1,2])).parseNull();expect(a).toEqual(s(new i("Invalid null length")))})}),describe("parseInt",()=>{it("should parse big endian integer values",()=>{const t=new n(new Uint8Array([e.Int,1,1,e.Int,2,1,0,e.Int,4,1,0,0,0])),a=t.parseInt(),x=t.parseInt(),p=t.parseInt();expect(a).toEqual(o(1)),expect(x).toEqual(o(256)),expect(p).toEqual(o(16777216))}),it("should fail if the tag is not an integer",()=>{const a=new n(new Uint8Array([e.Bytes,1,1])).parseInt();expect(a).toEqual(s(new i("Expected a number")))}),it("should fail if the integer is not 1, 2, or 4 bytes",()=>{const a=new n(new Uint8Array([e.Int,3,1,2,3])).parseInt();expect(a).toEqual(s(new i("Unsupported integer length")))})}),describe("parseHash",()=>{it("should parse a hash value",()=>{const a=new n(new Uint8Array([e.Hash,3,1,2,3])).parseHash();expect(a).toEqual(o(new Uint8Array([1,2,3])))}),it("should fail if the tag is not a hash",()=>{const a=new n(new Uint8Array([e.Int,1,1])).parseHash();expect(a).toEqual(s(new i("Expected a hash")))})}),describe("parseSignature",()=>{it("should parse a signature value",()=>{const a=new n(new Uint8Array([e.Signature,3,1,2,3])).parseSignature();expect(a).toEqual(o(new Uint8Array([1,2,3])))}),it("should fail if the tag is not a signature",()=>{const a=new n(new Uint8Array([e.Int,1,1])).parseSignature();expect(a).toEqual(s(new i("Expected a signature")))})}),describe("parseString",()=>{it("should parse a string value",()=>{const a=new n(new Uint8Array([e.String,5,72,101,108,108,111])).parseString();expect(a).toEqual(o("Hello"))}),it("should fail if the tag is not a string",()=>{const a=new n(new Uint8Array([e.Int,1,1])).parseString();expect(a).toEqual(s(new i("Expected a string")))})}),describe("parseBytes",()=>{it("should parse a bytes value",()=>{const a=new n(new Uint8Array([e.Bytes,3,1,2,3])).parseBytes();expect(a).toEqual(o(new Uint8Array([1,2,3])))}),it("should fail if the tag is not bytes",()=>{const a=new n(new Uint8Array([e.Int,1,1])).parseBytes();expect(a).toEqual(s(new i("Expected bytes")))})}),describe("parsePublicKey",()=>{it("should parse a public key value",()=>{const a=new n(new Uint8Array([e.PublicKey,3,1,2,3])).parsePublicKey();expect(a).toEqual(o(new Uint8Array([1,2,3])))}),it("should fail if the tag is not a public key",()=>{const a=new n(new Uint8Array([e.Int,1,1])).parsePublicKey();expect(a).toEqual(s(new i("Expected a public key")))})})})});
|
|
2
2
|
//# sourceMappingURL=TLVParser.test.js.map
|