@nivinjoseph/n-sec 4.0.6 → 5.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/.eslintignore +2 -0
  2. package/.eslintrc +335 -0
  3. package/dist/api-security/alg-type.js +2 -0
  4. package/dist/api-security/alg-type.js.map +1 -1
  5. package/dist/api-security/claim.d.ts +2 -3
  6. package/dist/api-security/claim.js +3 -2
  7. package/dist/api-security/claim.js.map +1 -1
  8. package/dist/api-security/claims-identity.js +2 -1
  9. package/dist/api-security/claims-identity.js.map +1 -1
  10. package/dist/api-security/expired-token-exception.d.ts +0 -1
  11. package/dist/api-security/expired-token-exception.js +2 -2
  12. package/dist/api-security/expired-token-exception.js.map +1 -1
  13. package/dist/api-security/invalid-token-exception.d.ts +0 -1
  14. package/dist/api-security/invalid-token-exception.js +3 -3
  15. package/dist/api-security/invalid-token-exception.js.map +1 -1
  16. package/dist/api-security/json-web-token.d.ts +4 -5
  17. package/dist/api-security/json-web-token.js +88 -81
  18. package/dist/api-security/json-web-token.js.map +1 -1
  19. package/dist/api-security/security-token.js +2 -2
  20. package/dist/api-security/security-token.js.map +1 -1
  21. package/dist/crypto/asymmetric-encryption.js +49 -0
  22. package/dist/crypto/asymmetric-encryption.js.map +1 -1
  23. package/dist/crypto/crypto-exception.js +1 -0
  24. package/dist/crypto/crypto-exception.js.map +1 -1
  25. package/dist/crypto/digital-signature.js +51 -0
  26. package/dist/crypto/digital-signature.js.map +1 -1
  27. package/dist/crypto/hash.d.ts +2 -3
  28. package/dist/crypto/hash.js +5 -5
  29. package/dist/crypto/hash.js.map +1 -1
  30. package/dist/crypto/hmac.d.ts +1 -2
  31. package/dist/crypto/hmac.js +4 -4
  32. package/dist/crypto/hmac.js.map +1 -1
  33. package/dist/crypto/symmetric-encryption.d.ts +1 -2
  34. package/dist/crypto/symmetric-encryption.js +15 -20
  35. package/dist/crypto/symmetric-encryption.js.map +1 -1
  36. package/dist/index.js +2 -0
  37. package/dist/index.js.map +1 -1
  38. package/package.json +12 -11
  39. package/src/api-security/claim.ts +5 -5
  40. package/src/api-security/claims-identity.ts +1 -1
  41. package/src/api-security/expired-token-exception.ts +1 -2
  42. package/src/api-security/invalid-token-exception.ts +2 -3
  43. package/src/api-security/json-web-token.ts +80 -79
  44. package/src/crypto/hash.ts +7 -9
  45. package/src/crypto/hmac.ts +4 -5
  46. package/src/crypto/symmetric-encryption.ts +17 -27
  47. package/test/hash.test.ts +42 -41
  48. package/test/hmac.test.ts +24 -23
  49. package/test/json-web-token.test.ts +66 -61
  50. package/test/other.test.ts +3 -3
  51. package/test/symmetric-encryption.test.ts +12 -10
  52. package/tsconfig.json +9 -11
  53. package/dist/crypto/uuid.js.map +0 -1
  54. package/tslint.json +0 -64
@@ -1,32 +1,24 @@
1
1
  "use strict";
2
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
3
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
4
- return new (P || (P = Promise))(function (resolve, reject) {
5
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
6
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
7
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
8
- step((generator = generator.apply(thisArg, _arguments || [])).next());
9
- });
10
- };
11
2
  Object.defineProperty(exports, "__esModule", { value: true });
12
3
  exports.JsonWebToken = void 0;
13
4
  const claim_1 = require("./claim");
14
5
  const n_exception_1 = require("@nivinjoseph/n-exception");
15
6
  const n_defensive_1 = require("@nivinjoseph/n-defensive");
16
- require("@nivinjoseph/n-ext");
17
7
  const invalid_token_exception_1 = require("./invalid-token-exception");
8
+ const alg_type_1 = require("./alg-type");
18
9
  const hmac_1 = require("./../crypto/hmac");
10
+ // import { DigitalSignature } from "./../crypto/digital-signature";
19
11
  const expired_token_exception_1 = require("./expired-token-exception");
12
+ // public
20
13
  class JsonWebToken {
21
14
  constructor(issuer, algType, key, isFullKey, expiry, claims) {
22
- n_defensive_1.given(issuer, "issuer").ensureHasValue().ensure(t => !t.isEmptyOrWhiteSpace());
23
- n_defensive_1.given(algType, "algType").ensureHasValue().ensure(t => t === 1 || t === 2);
24
- n_defensive_1.given(key, "key").ensureHasValue().ensure(t => !t.isEmptyOrWhiteSpace());
25
- n_defensive_1.given(isFullKey, "isFullKey").ensureHasValue();
26
- n_defensive_1.given(expiry, "expiry").ensureHasValue();
27
- n_defensive_1.given(claims, "claims")
28
- .ensureHasValue()
29
- .ensure(t => t.length > 0);
15
+ (0, n_defensive_1.given)(issuer, "issuer").ensureHasValue().ensureIsString();
16
+ (0, n_defensive_1.given)(algType, "algType").ensureHasValue().ensureIsEnum(alg_type_1.AlgType);
17
+ (0, n_defensive_1.given)(key, "key").ensureHasValue().ensureIsString();
18
+ (0, n_defensive_1.given)(isFullKey, "isFullKey").ensureHasValue().ensureIsBoolean();
19
+ (0, n_defensive_1.given)(expiry, "expiry").ensureHasValue().ensureIsNumber();
20
+ (0, n_defensive_1.given)(claims, "claims").ensureHasValue().ensureIsArray()
21
+ .ensure(t => t.isNotEmpty, "cannot be empty");
30
22
  this._issuer = issuer.trim();
31
23
  this._algType = algType;
32
24
  this._key = key.trim();
@@ -41,76 +33,91 @@ class JsonWebToken {
41
33
  get expiry() { return this._expiry; }
42
34
  get isExpired() { return this._expiry <= Date.now(); }
43
35
  get claims() { return this._claims; }
44
- generateToken() {
45
- return __awaiter(this, void 0, void 0, function* () {
46
- if (!this._isfullKey)
47
- throw new n_exception_1.InvalidOperationException("generating token using an instance created from token");
48
- let header = {
49
- iss: this._issuer,
50
- alg: this._algType,
51
- exp: this._expiry
52
- };
53
- let body = {};
54
- this._claims.forEach(t => body[t.type] = t.value);
55
- let headerAndBody = this.toHex(header) + "." + this.toHex(body);
56
- let signature = yield hmac_1.Hmac.create(this._key, headerAndBody);
57
- let token = headerAndBody + "." + signature;
58
- return token;
59
- });
60
- }
61
36
  static fromClaims(issuer, algType, key, expiry, claims) {
62
37
  return new JsonWebToken(issuer, algType, key, true, expiry, claims);
63
38
  }
64
39
  static fromToken(issuer, algType, key, token) {
65
- return __awaiter(this, void 0, void 0, function* () {
66
- n_defensive_1.given(issuer, "issuer").ensureHasValue().ensure(t => !t.isEmptyOrWhiteSpace());
67
- n_defensive_1.given(algType, "algType").ensureHasValue().ensure(t => t === 1 || t === 2);
68
- n_defensive_1.given(key, "key").ensureHasValue().ensure(t => !t.isEmptyOrWhiteSpace());
69
- n_defensive_1.given(token, "token").ensureHasValue().ensure(t => !t.isEmptyOrWhiteSpace());
70
- issuer = issuer.trim();
71
- key = key.trim();
72
- token = token.trim();
73
- let tokenSplitted = token.split(".");
74
- if (tokenSplitted.length !== 3)
75
- throw new invalid_token_exception_1.InvalidTokenException(token, "format is incorrect");
76
- let headerString = tokenSplitted[0];
77
- let bodyString = tokenSplitted[1];
78
- let signature = tokenSplitted[2];
79
- let header = JsonWebToken.toObject(headerString);
80
- let body = JsonWebToken.toObject(bodyString);
81
- if (header.iss === undefined || header.iss === null)
82
- throw new invalid_token_exception_1.InvalidTokenException(token, "iss was not present");
83
- if (header.iss !== issuer)
84
- throw new invalid_token_exception_1.InvalidTokenException(token, `iss was expected to be '${issuer}' but instead was '${header.iss}'`);
85
- if (header.alg === undefined || header.alg === null)
86
- throw new invalid_token_exception_1.InvalidTokenException(token, "alg was not present");
87
- if (header.alg !== algType)
88
- throw new invalid_token_exception_1.InvalidTokenException(token, `alg was expected to be '${algType}' but instead was '${header.alg}'`);
89
- if (header.exp === undefined || header.exp === null)
90
- throw new invalid_token_exception_1.InvalidTokenException(token, "exp was not present");
91
- if (typeof (header.exp) !== "number")
92
- throw new invalid_token_exception_1.InvalidTokenException(token, `exp value '${header.exp}' is invalid`);
93
- if (header.exp <= Date.now())
94
- throw new expired_token_exception_1.ExpiredTokenException(token);
95
- let computedSignature = yield hmac_1.Hmac.create(key, headerString + "." + bodyString);
96
- if (computedSignature !== signature)
97
- throw new invalid_token_exception_1.InvalidTokenException(token, "signature could not be verified");
98
- let claims = new Array();
99
- for (let item in body)
100
- claims.push(new claim_1.Claim(item, body[item]));
101
- return new JsonWebToken(issuer, algType, key, false, header.exp, claims);
102
- });
103
- }
104
- toHex(obj) {
105
- let json = JSON.stringify(obj);
106
- let hex = Buffer.from(json, "utf8").toString("hex");
107
- return hex.toUpperCase();
40
+ (0, n_defensive_1.given)(issuer, "issuer").ensureHasValue();
41
+ (0, n_defensive_1.given)(algType, "algType").ensureHasValue().ensureIsEnum(alg_type_1.AlgType);
42
+ (0, n_defensive_1.given)(key, "key").ensureHasValue();
43
+ (0, n_defensive_1.given)(token, "token").ensureHasValue();
44
+ issuer = issuer.trim();
45
+ key = key.trim();
46
+ token = token.trim();
47
+ const tokenSplitted = token.split(".");
48
+ if (tokenSplitted.length !== 3)
49
+ throw new invalid_token_exception_1.InvalidTokenException(token, "format is incorrect");
50
+ const headerString = tokenSplitted[0];
51
+ const bodyString = tokenSplitted[1];
52
+ const signature = tokenSplitted[2];
53
+ const header = JsonWebToken._toObject(headerString);
54
+ const body = JsonWebToken._toObject(bodyString);
55
+ // eslint-disable-next-line @typescript-eslint/no-unnecessary-condition
56
+ if (header.iss === undefined || header.iss === null)
57
+ throw new invalid_token_exception_1.InvalidTokenException(token, "iss was not present");
58
+ if (header.iss !== issuer)
59
+ throw new invalid_token_exception_1.InvalidTokenException(token, `iss was expected to be '${issuer}' but instead was '${header.iss}'`);
60
+ // eslint-disable-next-line @typescript-eslint/no-unnecessary-condition
61
+ if (header.alg === undefined || header.alg === null)
62
+ throw new invalid_token_exception_1.InvalidTokenException(token, "alg was not present");
63
+ // eslint-disable-next-line @typescript-eslint/no-unnecessary-condition
64
+ if (header.alg !== algType)
65
+ throw new invalid_token_exception_1.InvalidTokenException(token, `alg was expected to be '${algType}' but instead was '${header.alg}'`);
66
+ // eslint-disable-next-line @typescript-eslint/no-unnecessary-condition
67
+ if (header.exp === undefined || header.exp === null)
68
+ throw new invalid_token_exception_1.InvalidTokenException(token, "exp was not present");
69
+ if (typeof header.exp !== "number")
70
+ throw new invalid_token_exception_1.InvalidTokenException(token, `exp value '${header.exp}' is invalid`);
71
+ if (header.exp <= Date.now())
72
+ throw new expired_token_exception_1.ExpiredTokenException(token);
73
+ // if (algType === AlgType.hmac)
74
+ // {
75
+ // let computedSignature = await Hmac.create(key, headerString + "." + bodyString);
76
+ // if (computedSignature !== signature)
77
+ // throw new InvalidTokenException(token, "signature could not be verified");
78
+ // }
79
+ // else
80
+ // {
81
+ // let verification = await DigitalSignature.verify(key, headerString + "." + bodyString, signature);
82
+ // if (!verification)
83
+ // throw new InvalidTokenException(token, "signature could not be verified");
84
+ // }
85
+ const computedSignature = hmac_1.Hmac.create(key, headerString + "." + bodyString);
86
+ if (computedSignature !== signature)
87
+ throw new invalid_token_exception_1.InvalidTokenException(token, "signature could not be verified");
88
+ const claims = new Array();
89
+ for (const item in body)
90
+ claims.push(new claim_1.Claim(item, body[item]));
91
+ return new JsonWebToken(issuer, algType, key, false, header.exp, claims);
108
92
  }
109
- static toObject(hex) {
110
- let json = Buffer.from(hex.toLowerCase(), "hex").toString("utf8");
111
- let obj = JSON.parse(json);
93
+ static _toObject(hex) {
94
+ const json = Buffer.from(hex.toLowerCase(), "hex").toString("utf8");
95
+ const obj = JSON.parse(json);
112
96
  return obj;
113
97
  }
98
+ generateToken() {
99
+ if (!this._isfullKey)
100
+ throw new n_exception_1.InvalidOperationException("generating token using an instance created from token");
101
+ const header = {
102
+ iss: this._issuer,
103
+ alg: this._algType,
104
+ exp: this._expiry
105
+ };
106
+ const body = {};
107
+ this._claims.forEach(t => body[t.type] = t.value);
108
+ const headerAndBody = this._toHex(header) + "." + this._toHex(body);
109
+ // let signature = this._algType === AlgType.hmac
110
+ // ? await Hmac.create(this._key, headerAndBody)
111
+ // : await DigitalSignature.sign(this._key, headerAndBody);
112
+ const signature = hmac_1.Hmac.create(this._key, headerAndBody);
113
+ const token = headerAndBody + "." + signature;
114
+ return token;
115
+ }
116
+ _toHex(obj) {
117
+ const json = JSON.stringify(obj);
118
+ const hex = Buffer.from(json, "utf8").toString("hex");
119
+ return hex.toUpperCase();
120
+ }
114
121
  }
115
122
  exports.JsonWebToken = JsonWebToken;
116
123
  //# sourceMappingURL=json-web-token.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"json-web-token.js","sourceRoot":"","sources":["../../src/api-security/json-web-token.ts"],"names":[],"mappings":";;;;;;;;;;;;AAAA,mCAAgC;AAChC,0DAAqE;AACrE,0DAAiD;AACjD,8BAA4B;AAC5B,uEAAkE;AAElE,2CAAwC;AAExC,uEAAkE;AAIlE,MAAa,YAAY;IAmBrB,YAAoB,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,SAAkB,EAAE,MAAc,EACjG,MAAoB;QAEpB,mBAAK,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAC/E,mBAAK,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;QAC3E,mBAAK,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QACzE,mBAAK,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC,cAAc,EAAE,CAAC;QAC/C,mBAAK,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC;QACzC,mBAAK,CAAC,MAAM,EAAE,QAAQ,CAAC;aAClB,cAAc,EAAE;aAChB,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;QAE/B,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,IAAI,EAAE,CAAC;QAC7B,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAC;QACxB,IAAI,CAAC,IAAI,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACvB,IAAI,CAAC,UAAU,GAAG,SAAS,CAAC;QAC5B,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC;IAC/B,CAAC;IA3BD,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,OAAO,KAAc,OAAO,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC;IACvD,IAAW,GAAG,KAAa,OAAO,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;IAC9C,IAAW,gBAAgB,KAAc,OAAO,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC;IAClE,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,SAAS,KAAc,OAAO,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;IACtE,IAAW,MAAM,KAA2B,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IAuBrD,aAAa;;YAEtB,IAAI,CAAC,IAAI,CAAC,UAAU;gBAChB,MAAM,IAAI,uCAAyB,CAAC,uDAAuD,CAAC,CAAC;YAEjG,IAAI,MAAM,GAAW;gBACjB,GAAG,EAAE,IAAI,CAAC,OAAO;gBACjB,GAAG,EAAE,IAAI,CAAC,QAAQ;gBAClB,GAAG,EAAE,IAAI,CAAC,OAAO;aACpB,CAAC;YAEF,IAAI,IAAI,GAAQ,EAAE,CAAC;YACnB,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC;YAElD,IAAI,aAAa,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,GAAG,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YAMhE,IAAI,SAAS,GAAG,MAAM,WAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,aAAa,CAAC,CAAC;YAE5D,IAAI,KAAK,GAAG,aAAa,GAAG,GAAG,GAAG,SAAS,CAAC;YAC5C,OAAO,KAAK,CAAC;QACjB,CAAC;KAAA;IAGM,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,MAAc,EAClF,MAAoB;QAEpB,OAAO,IAAI,YAAY,CAAC,MAAM,EAAE,OAAO,EAAE,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,CAAC,CAAC;IACxE,CAAC;IAEM,MAAM,CAAO,SAAS,CAAC,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,KAAa;;YAEtF,mBAAK,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;YAC/E,mBAAK,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC;YAC3E,mBAAK,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;YACzE,mBAAK,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;YAE7E,MAAM,GAAG,MAAM,CAAC,IAAI,EAAE,CAAC;YACvB,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;YACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;YAErB,IAAI,aAAa,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACrC,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC;gBAC1B,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;YAElE,IAAI,YAAY,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;YACpC,IAAI,UAAU,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;YAClC,IAAI,SAAS,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;YAEjC,IAAI,MAAM,GAAW,YAAY,CAAC,QAAQ,CAAC,YAAY,CAAW,CAAC;YACnE,IAAI,IAAI,GAAQ,YAAY,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;YAElD,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;gBAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;YAElE,IAAI,MAAM,CAAC,GAAG,KAAK,MAAM;gBACrB,MAAM,IAAI,+CAAqB,CAAC,KAAK,EACjC,2BAA2B,MAAM,sBAAsB,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC;YAE9E,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;gBAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;YAElE,IAAI,MAAM,CAAC,GAAG,KAAK,OAAO;gBACtB,MAAM,IAAI,+CAAqB,CAAC,KAAK,EACjC,2BAA2B,OAAO,sBAAsB,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC;YAE/E,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;gBAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;YAElE,IAAI,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,KAAK,QAAQ;gBAChC,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,cAAc,MAAM,CAAC,GAAG,cAAc,CAAC,CAAC;YAEnF,IAAI,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,GAAG,EAAE;gBACxB,MAAM,IAAI,+CAAqB,CAAC,KAAK,CAAC,CAAC;YAe3C,IAAI,iBAAiB,GAAG,MAAM,WAAI,CAAC,MAAM,CAAC,GAAG,EAAE,YAAY,GAAG,GAAG,GAAG,UAAU,CAAC,CAAC;YAChF,IAAI,iBAAiB,KAAK,SAAS;gBAC/B,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,iCAAiC,CAAC,CAAC;YAE9E,IAAI,MAAM,GAAG,IAAI,KAAK,EAAS,CAAC;YAChC,KAAK,IAAI,IAAI,IAAI,IAAI;gBACjB,MAAM,CAAC,IAAI,CAAC,IAAI,aAAK,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAE7C,OAAO,IAAI,YAAY,CAAC,MAAM,EAAE,OAAO,EAAE,GAAG,EAAE,KAAK,EAAE,MAAM,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;QAC7E,CAAC;KAAA;IAEO,KAAK,CAAC,GAAW;QAErB,IAAI,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;QAC/B,IAAI,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;QACpD,OAAO,GAAG,CAAC,WAAW,EAAE,CAAC;IAC7B,CAAC;IAEO,MAAM,CAAC,QAAQ,CAAC,GAAW;QAE/B,IAAI,IAAI,GAAG,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,KAAK,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAClE,IAAI,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAC3B,OAAO,GAAG,CAAC;IACf,CAAC;CACJ;AA1JD,oCA0JC"}
1
+ {"version":3,"file":"json-web-token.js","sourceRoot":"","sources":["../../src/api-security/json-web-token.ts"],"names":[],"mappings":";;;AAAA,mCAAgC;AAChC,0DAAqE;AACrE,0DAAiD;AACjD,uEAAkE;AAClE,yCAAqC;AACrC,2CAAwC;AACxC,oEAAoE;AACpE,uEAAkE;AAGlE,SAAS;AACT,MAAa,YAAY;IAmBrB,YAAoB,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,SAAkB,EAAE,MAAc,EACjG,MAAoB;QAEpB,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAC1D,IAAA,mBAAK,EAAC,OAAO,EAAE,SAAS,CAAC,CAAC,cAAc,EAAE,CAAC,YAAY,CAAC,kBAAO,CAAC,CAAC;QACjE,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACpD,IAAA,mBAAK,EAAC,SAAS,EAAE,WAAW,CAAC,CAAC,cAAc,EAAE,CAAC,eAAe,EAAE,CAAC;QACjE,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAC1D,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,aAAa,EAAE;aACnD,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,UAAU,EAAE,iBAAiB,CAAC,CAAC;QAElD,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,IAAI,EAAE,CAAC;QAC7B,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAC;QACxB,IAAI,CAAC,IAAI,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACvB,IAAI,CAAC,UAAU,GAAG,SAAS,CAAC;QAC5B,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC;IAC/B,CAAC;IA1BD,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,OAAO,KAAc,OAAO,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC;IACvD,IAAW,GAAG,KAAa,OAAO,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;IAC9C,IAAW,gBAAgB,KAAc,OAAO,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC;IAClE,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,SAAS,KAAc,OAAO,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;IACtE,IAAW,MAAM,KAA2B,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IAsB3D,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,MAAc,EAClF,MAAoB;QAEpB,OAAO,IAAI,YAAY,CAAC,MAAM,EAAE,OAAO,EAAE,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,CAAC,CAAC;IACxE,CAAC;IAEM,MAAM,CAAC,SAAS,CAAC,MAAc,EAAE,OAAgB,EAAE,GAAW,EAAE,KAAa;QAEhF,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC;QACzC,IAAA,mBAAK,EAAC,OAAO,EAAE,SAAS,CAAC,CAAC,cAAc,EAAE,CAAC,YAAY,CAAC,kBAAO,CAAC,CAAC;QACjE,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC;QACnC,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC;QAEvC,MAAM,GAAG,MAAM,CAAC,IAAI,EAAE,CAAC;QACvB,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,aAAa,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACvC,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC;YAC1B,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;QAElE,MAAM,YAAY,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QACpC,MAAM,SAAS,GAAG,aAAa,CAAC,CAAC,CAAC,CAAC;QAEnC,MAAM,MAAM,GAAW,YAAY,CAAC,SAAS,CAAC,YAAY,CAAW,CAAC;QACtE,MAAM,IAAI,GAAQ,YAAY,CAAC,SAAS,CAAC,UAAU,CAAC,CAAC;QAErD,uEAAuE;QACvE,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;YAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;QAElE,IAAI,MAAM,CAAC,GAAG,KAAK,MAAM;YACrB,MAAM,IAAI,+CAAqB,CAAC,KAAK,EACjC,2BAA2B,MAAM,sBAAsB,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC;QAE9E,uEAAuE;QACvE,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;YAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;QAElE,uEAAuE;QACvE,IAAI,MAAM,CAAC,GAAG,KAAK,OAAO;YACtB,MAAM,IAAI,+CAAqB,CAAC,KAAK,EACjC,2BAA2B,OAAO,sBAAsB,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC;QAE/E,uEAAuE;QACvE,IAAI,MAAM,CAAC,GAAG,KAAK,SAAS,IAAI,MAAM,CAAC,GAAG,KAAK,IAAI;YAC/C,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,qBAAqB,CAAC,CAAC;QAElE,IAAI,OAAO,MAAM,CAAC,GAAG,KAAK,QAAQ;YAC9B,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,cAAc,MAAM,CAAC,GAAG,cAAc,CAAC,CAAC;QAEnF,IAAI,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,GAAG,EAAE;YACxB,MAAM,IAAI,+CAAqB,CAAC,KAAK,CAAC,CAAC;QAE3C,gCAAgC;QAChC,IAAI;QACJ,uFAAuF;QACvF,2CAA2C;QAC3C,yFAAyF;QACzF,OAAO;QACP,OAAO;QACP,IAAI;QACJ,yGAAyG;QACzG,yBAAyB;QACzB,uFAAuF;QACvF,QAAQ;QAER,MAAM,iBAAiB,GAAG,WAAI,CAAC,MAAM,CAAC,GAAG,EAAE,YAAY,GAAG,GAAG,GAAG,UAAU,CAAC,CAAC;QAC5E,IAAI,iBAAiB,KAAK,SAAS;YAC/B,MAAM,IAAI,+CAAqB,CAAC,KAAK,EAAE,iCAAiC,CAAC,CAAC;QAE9E,MAAM,MAAM,GAAG,IAAI,KAAK,EAAS,CAAC;QAClC,KAAK,MAAM,IAAI,IAAI,IAAI;YACnB,MAAM,CAAC,IAAI,CAAC,IAAI,aAAK,CAAC,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAE7C,OAAO,IAAI,YAAY,CAAC,MAAM,EAAE,OAAO,EAAE,GAAG,EAAE,KAAK,EAAE,MAAM,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;IAC7E,CAAC;IAEO,MAAM,CAAC,SAAS,CAAC,GAAW;QAEhC,MAAM,IAAI,GAAG,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,WAAW,EAAE,EAAE,KAAK,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QACpE,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAW,CAAC;QACvC,OAAO,GAAG,CAAC;IACf,CAAC;IAEM,aAAa;QAEhB,IAAI,CAAC,IAAI,CAAC,UAAU;YAChB,MAAM,IAAI,uCAAyB,CAAC,uDAAuD,CAAC,CAAC;QAEjG,MAAM,MAAM,GAAW;YACnB,GAAG,EAAE,IAAI,CAAC,OAAO;YACjB,GAAG,EAAE,IAAI,CAAC,QAAQ;YAClB,GAAG,EAAE,IAAI,CAAC,OAAO;SACpB,CAAC;QAEF,MAAM,IAAI,GAAQ,EAAE,CAAC;QACrB,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC;QAElD,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,GAAG,GAAG,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;QAEpE,iDAAiD;QACjD,oDAAoD;QACpD,+DAA+D;QAE/D,MAAM,SAAS,GAAG,WAAI,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,aAAa,CAAC,CAAC;QAExD,MAAM,KAAK,GAAG,aAAa,GAAG,GAAG,GAAG,SAAS,CAAC;QAC9C,OAAO,KAAK,CAAC;IACjB,CAAC;IAEO,MAAM,CAAC,GAAW;QAEtB,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,CAAC;QACjC,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;QACtD,OAAO,GAAG,CAAC,WAAW,EAAE,CAAC;IAC7B,CAAC;CACJ;AA5JD,oCA4JC"}
@@ -4,10 +4,10 @@ exports.SecurityToken = void 0;
4
4
  const n_defensive_1 = require("@nivinjoseph/n-defensive");
5
5
  class SecurityToken {
6
6
  constructor(scheme, token) {
7
- n_defensive_1.given(scheme, "scheme").ensureHasValue().ensureIsString()
7
+ (0, n_defensive_1.given)(scheme, "scheme").ensureHasValue().ensureIsString()
8
8
  .ensure(t => !t.contains(" "), "cannot contain space");
9
9
  this._scheme = scheme;
10
- n_defensive_1.given(token, "token").ensureHasValue().ensureIsString()
10
+ (0, n_defensive_1.given)(token, "token").ensureHasValue().ensureIsString()
11
11
  .ensure(t => !t.contains(" "), "cannot contain space");
12
12
  this._token = token;
13
13
  }
@@ -1 +1 @@
1
- {"version":3,"file":"security-token.js","sourceRoot":"","sources":["../../src/api-security/security-token.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AAEjD,MAAa,aAAa;IAUtB,YAAmB,MAAc,EAAE,KAAa;QAE5C,mBAAK,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE;aACpD,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,sBAAsB,CAAC,CAAC;QAC3D,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QAEtB,mBAAK,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE;aAClD,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,sBAAsB,CAAC,CAAC;QAC3D,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC;IACxB,CAAC;IAbD,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,KAAK,KAAa,OAAO,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC;IAe3C,QAAQ;QAEX,OAAO,GAAG,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;IAC5C,CAAC;CACJ;AA1BD,sCA0BC"}
1
+ {"version":3,"file":"security-token.js","sourceRoot":"","sources":["../../src/api-security/security-token.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AAEjD,MAAa,aAAa;IAUtB,YAAmB,MAAc,EAAE,KAAa;QAE5C,IAAA,mBAAK,EAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE;aACpD,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,sBAAsB,CAAC,CAAC;QAC3D,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QAEtB,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE;aAClD,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,sBAAsB,CAAC,CAAC;QAC3D,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC;IACxB,CAAC;IAbD,IAAW,MAAM,KAAa,OAAO,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC;IACpD,IAAW,KAAK,KAAa,OAAO,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC;IAe3C,QAAQ;QAEX,OAAO,GAAG,IAAI,CAAC,OAAO,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;IAC5C,CAAC;CACJ;AA1BD,sCA0BC"}
@@ -1,2 +1,51 @@
1
1
  "use strict";
2
+ // const ursa = require("ursa");
3
+ // import { given } from "@nivinjoseph/n-defensive";
4
+ // import "@nivinjoseph/n-ext";
5
+ // // public
6
+ // export class AsymmetricEncryption
7
+ // {
8
+ // private constructor() { }
9
+ // public static generateKeyPair(): Promise<string>
10
+ // {
11
+ // const key = ursa.generatePrivateKey();
12
+ // return Promise.resolve(key.toPrivatePem().toString("hex").toUpperCase());
13
+ // }
14
+ // public static getPublicKey(keyPair: string): Promise<string>
15
+ // {
16
+ // given(keyPair, "keyPair").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
17
+ // keyPair = keyPair.trim();
18
+ // const key = ursa.createPrivateKey(Buffer.from(keyPair, "hex"));
19
+ // return Promise.resolve(key.toPublicPem().toString("hex").toUpperCase());
20
+ // }
21
+ // public static encrypt(keyPairOrPublicKey: string, value: string): Promise<string>
22
+ // {
23
+ // given(keyPairOrPublicKey, "keyPairOrPublicKey").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
24
+ // given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
25
+ // keyPairOrPublicKey = keyPairOrPublicKey.trim();
26
+ // value = value.trim();
27
+ // const buf = Buffer.from(keyPairOrPublicKey, "hex");
28
+ // let key;
29
+ // try
30
+ // {
31
+ // key = ursa.createPublicKey(buf);
32
+ // }
33
+ // catch (error)
34
+ // {
35
+ // key = ursa.createPrivateKey(buf);
36
+ // }
37
+ // const encrypted = key.encrypt(Buffer.from(value, "utf8"), "utf8", "hex", ursa.RSA_PKCS1_PADDING);
38
+ // return Promise.resolve(encrypted.toUpperCase());
39
+ // }
40
+ // public static decrypt(keyPair: string, value: string): Promise<string>
41
+ // {
42
+ // given(keyPair, "keyPair").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
43
+ // given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
44
+ // keyPair = keyPair.trim();
45
+ // value = value.trim();
46
+ // const key = ursa.createPrivateKey(Buffer.from(keyPair, "hex"));
47
+ // const decrypted = key.decrypt(Buffer.from(value, "hex"), "hex", "utf8", ursa.RSA_PKCS1_PADDING);
48
+ // return Promise.resolve(decrypted);
49
+ // }
50
+ // }
2
51
  //# sourceMappingURL=asymmetric-encryption.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"asymmetric-encryption.js","sourceRoot":"","sources":["../../src/crypto/asymmetric-encryption.ts"],"names":[],"mappings":""}
1
+ {"version":3,"file":"asymmetric-encryption.js","sourceRoot":"","sources":["../../src/crypto/asymmetric-encryption.ts"],"names":[],"mappings":";AAAA,gCAAgC;AAChC,oDAAoD;AACpD,+BAA+B;AAG/B,YAAY;AACZ,oCAAoC;AACpC,IAAI;AACJ,gCAAgC;AAGhC,uDAAuD;AACvD,QAAQ;AACR,iDAAiD;AACjD,oFAAoF;AACpF,QAAQ;AAER,mEAAmE;AACnE,QAAQ;AACR,6GAA6G;AAE7G,oCAAoC;AAEpC,0EAA0E;AAC1E,mFAAmF;AACnF,QAAQ;AAER,wFAAwF;AACxF,QAAQ;AACR,mIAAmI;AACnI,yGAAyG;AAEzG,0DAA0D;AAC1D,gCAAgC;AAEhC,kEAAkE;AAClE,mBAAmB;AACnB,eAAe;AACf,YAAY;AACZ,+CAA+C;AAC/C,YAAY;AACZ,wBAAwB;AACxB,YAAY;AACZ,gDAAgD;AAChD,YAAY;AACZ,4GAA4G;AAC5G,2DAA2D;AAC3D,QAAQ;AAER,6EAA6E;AAC7E,QAAQ;AACR,6GAA6G;AAC7G,yGAAyG;AAEzG,oCAAoC;AACpC,gCAAgC;AAEhC,0EAA0E;AAC1E,4GAA4G;AAC5G,6CAA6C;AAC7C,QAAQ;AACR,IAAI"}
@@ -2,6 +2,7 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.CryptoException = void 0;
4
4
  const n_exception_1 = require("@nivinjoseph/n-exception");
5
+ // public
5
6
  class CryptoException extends n_exception_1.Exception {
6
7
  }
7
8
  exports.CryptoException = CryptoException;
@@ -1 +1 @@
1
- {"version":3,"file":"crypto-exception.js","sourceRoot":"","sources":["../../src/crypto/crypto-exception.ts"],"names":[],"mappings":";;;AAAA,0DAAqD;AAIrD,MAAa,eAAgB,SAAQ,uBAAS;CAC3C;AADH,0CACG"}
1
+ {"version":3,"file":"crypto-exception.js","sourceRoot":"","sources":["../../src/crypto/crypto-exception.ts"],"names":[],"mappings":";;;AAAA,0DAAqD;AAGrD,SAAS;AACT,MAAa,eAAgB,SAAQ,uBAAS;CAC3C;AADH,0CACG"}
@@ -1,2 +1,53 @@
1
1
  "use strict";
2
+ // const ursa = require("ursa");
3
+ // import { given } from "@nivinjoseph/n-defensive";
4
+ // import "@nivinjoseph/n-ext";
5
+ // import * as Crypto from "crypto";
6
+ // // public
7
+ // export class DigitalSignature
8
+ // {
9
+ // private constructor() { }
10
+ // public static sign(keyPair: string, value: string): Promise<string>
11
+ // {
12
+ // given(keyPair, "keyPair").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
13
+ // given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
14
+ // keyPair = keyPair.trim();
15
+ // value = value.trim();
16
+ // const hash = Crypto.createHash("sha512");
17
+ // hash.update(value, "utf8");
18
+ // const key = ursa.createPrivateKey(Buffer.from(keyPair, "hex"));
19
+ // const signature = key.sign("sha512", hash.digest(), null, "hex");
20
+ // return Promise.resolve(signature.toUpperCase());
21
+ // }
22
+ // public static async verify(keyPairOrPublicKey: string, value: string, signature: string): Promise<boolean>
23
+ // {
24
+ // given(keyPairOrPublicKey, "keyPairOrPublicKey").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
25
+ // given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
26
+ // given(signature, "signature").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
27
+ // keyPairOrPublicKey = keyPairOrPublicKey.trim();
28
+ // value = value.trim();
29
+ // signature = signature.trim();
30
+ // const hash = Crypto.createHash("sha512");
31
+ // hash.update(value, "utf8");
32
+ // try
33
+ // {
34
+ // const buf = Buffer.from(keyPairOrPublicKey, "hex");
35
+ // let key;
36
+ // try
37
+ // {
38
+ // key = ursa.createPublicKey(buf);
39
+ // }
40
+ // catch (error)
41
+ // {
42
+ // key = ursa.createPrivateKey(buf);
43
+ // }
44
+ // const result = key.verify("sha512", hash.digest(), Buffer.from(signature, "hex"));
45
+ // return Promise.resolve(result);
46
+ // }
47
+ // catch (error)
48
+ // {
49
+ // return Promise.resolve(false);
50
+ // }
51
+ // }
52
+ // }
2
53
  //# sourceMappingURL=digital-signature.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"digital-signature.js","sourceRoot":"","sources":["../../src/crypto/digital-signature.ts"],"names":[],"mappings":""}
1
+ {"version":3,"file":"digital-signature.js","sourceRoot":"","sources":["../../src/crypto/digital-signature.ts"],"names":[],"mappings":";AAAA,gCAAgC;AAChC,oDAAoD;AACpD,+BAA+B;AAC/B,oCAAoC;AAGpC,YAAY;AACZ,gCAAgC;AAChC,IAAI;AACJ,gCAAgC;AAGhC,0EAA0E;AAC1E,QAAQ;AACR,6GAA6G;AAC7G,yGAAyG;AAEzG,oCAAoC;AACpC,gCAAgC;AAEhC,oDAAoD;AACpD,sCAAsC;AAEtC,0EAA0E;AAC1E,4EAA4E;AAC5E,2DAA2D;AAC3D,QAAQ;AAER,iHAAiH;AACjH,QAAQ;AACR,mIAAmI;AACnI,yGAAyG;AACzG,iHAAiH;AAEjH,0DAA0D;AAC1D,gCAAgC;AAChC,wCAAwC;AAExC,oDAAoD;AACpD,sCAAsC;AAEtC,eAAe;AACf,YAAY;AACZ,kEAAkE;AAClE,uBAAuB;AACvB,mBAAmB;AACnB,gBAAgB;AAChB,mDAAmD;AACnD,gBAAgB;AAChB,4BAA4B;AAC5B,gBAAgB;AAChB,oDAAoD;AACpD,gBAAgB;AAEhB,iGAAiG;AACjG,8CAA8C;AAC9C,YAAY;AACZ,wBAAwB;AACxB,YAAY;AACZ,6CAA6C;AAC7C,YAAY;AACZ,QAAQ;AACR,IAAI"}
@@ -1,6 +1,5 @@
1
- import "@nivinjoseph/n-ext";
2
1
  export declare class Hash {
3
2
  private constructor();
4
- static create(value: string): Promise<string>;
5
- static createUsingSalt(value: string, salt: string): Promise<string>;
3
+ static create(value: string): string;
4
+ static createUsingSalt(value: string, salt: string): string;
6
5
  }
@@ -2,20 +2,20 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.Hash = void 0;
4
4
  const n_defensive_1 = require("@nivinjoseph/n-defensive");
5
- require("@nivinjoseph/n-ext");
6
5
  const Crypto = require("crypto");
6
+ // public
7
7
  class Hash {
8
8
  constructor() { }
9
9
  static create(value) {
10
- n_defensive_1.given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
10
+ (0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
11
11
  value = value.trim();
12
12
  const hash = Crypto.createHash("sha512");
13
13
  hash.update(value, "utf8");
14
- return Promise.resolve(hash.digest("hex").toUpperCase());
14
+ return hash.digest("hex").toUpperCase();
15
15
  }
16
16
  static createUsingSalt(value, salt) {
17
- n_defensive_1.given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
18
- n_defensive_1.given(salt, "salt").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
17
+ (0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
18
+ (0, n_defensive_1.given)(salt, "salt").ensureHasValue().ensureIsString();
19
19
  value = value.trim();
20
20
  salt = salt.trim();
21
21
  const reverse = (val) => {
@@ -1 +1 @@
1
- {"version":3,"file":"hash.js","sourceRoot":"","sources":["../../src/crypto/hash.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AACjD,8BAA4B;AAC5B,iCAAiC;AAIjC,MAAa,IAAI;IAEb,gBAAwB,CAAC;IAGlB,MAAM,CAAC,MAAM,CAAC,KAAa;QAE9B,mBAAK,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAE9F,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QACzC,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAC3B,OAAO,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC;IAC7D,CAAC;IAEM,MAAM,CAAC,eAAe,CAAC,KAAa,EAAE,IAAY;QAErD,mBAAK,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAC9F,mBAAK,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAE5F,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QACrB,IAAI,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;QAEnB,MAAM,OAAO,GAAG,CAAC,GAAW,EAAE,EAAE;YAE5B,IAAI,GAAG,GAAG,EAAE,CAAC;YACb,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,EAAE;gBAC/B,GAAG,GAAG,GAAG,CAAC,CAAC,CAAC,GAAG,GAAG,CAAC;YACvB,OAAO,GAAG,CAAC;QACf,CAAC,CAAC;QAEF,MAAM,YAAY,GAAG,OAAO,CAAC,KAAK,CAAC,CAAC;QACpC,MAAM,WAAW,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;QAElC,MAAM,WAAW,GAAG,uBAAuB,CAAC,MAAM,CAAC,KAAK,EAAE,IAAI,EAAE,YAAY,EAAE,WAAW,CAAC,CAAC;QAE3F,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;IACpC,CAAC;CACJ;AAvCD,oBAuCC"}
1
+ {"version":3,"file":"hash.js","sourceRoot":"","sources":["../../src/crypto/hash.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AACjD,iCAAiC;AAGjC,SAAS;AACT,MAAa,IAAI;IAEb,gBAAwB,CAAC;IAGlB,MAAM,CAAC,MAAM,CAAC,KAAa;QAE9B,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACxD,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QACzC,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAC3B,OAAO,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC;IAC5C,CAAC;IAEM,MAAM,CAAC,eAAe,CAAC,KAAa,EAAE,IAAY;QAErD,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACxD,IAAA,mBAAK,EAAC,IAAI,EAAE,MAAM,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAEtD,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QACrB,IAAI,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;QAEnB,MAAM,OAAO,GAAG,CAAC,GAAW,EAAU,EAAE;YAEpC,IAAI,GAAG,GAAG,EAAE,CAAC;YACb,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,EAAE;gBAC/B,GAAG,GAAG,GAAG,CAAC,CAAC,CAAC,GAAG,GAAG,CAAC;YACvB,OAAO,GAAG,CAAC;QACf,CAAC,CAAC;QAEF,MAAM,YAAY,GAAG,OAAO,CAAC,KAAK,CAAC,CAAC;QACpC,MAAM,WAAW,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;QAElC,MAAM,WAAW,GAAG,uBAAuB,CAAC,MAAM,CAAC,KAAK,EAAE,IAAI,EAAE,YAAY,EAAE,WAAW,CAAC,CAAC;QAE3F,OAAO,IAAI,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;IACpC,CAAC;CACJ;AAtCD,oBAsCC"}
@@ -1,5 +1,4 @@
1
- import "@nivinjoseph/n-ext";
2
1
  export declare class Hmac {
3
2
  private constructor();
4
- static create(key: string, value: string): Promise<string>;
3
+ static create(key: string, value: string): string;
5
4
  }
@@ -2,18 +2,18 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.Hmac = void 0;
4
4
  const n_defensive_1 = require("@nivinjoseph/n-defensive");
5
- require("@nivinjoseph/n-ext");
6
5
  const Crypto = require("crypto");
6
+ // public
7
7
  class Hmac {
8
8
  constructor() { }
9
9
  static create(key, value) {
10
- n_defensive_1.given(key, "key").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
11
- n_defensive_1.given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
10
+ (0, n_defensive_1.given)(key, "key").ensureHasValue().ensureIsString();
11
+ (0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
12
12
  key = key.trim();
13
13
  value = value.trim();
14
14
  const hmac = Crypto.createHmac("sha256", Buffer.from(key, "hex"));
15
15
  hmac.update(value, "utf8");
16
- return Promise.resolve(hmac.digest("hex").toUpperCase());
16
+ return hmac.digest("hex").toUpperCase();
17
17
  }
18
18
  }
19
19
  exports.Hmac = Hmac;
@@ -1 +1 @@
1
- {"version":3,"file":"hmac.js","sourceRoot":"","sources":["../../src/crypto/hmac.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AACjD,8BAA4B;AAC5B,iCAAiC;AAIjC,MAAa,IAAI;IAEb,gBAAwB,CAAC;IAGlB,MAAM,CAAC,MAAM,CAAC,GAAW,EAAE,KAAa;QAE3C,mBAAK,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAC1F,mBAAK,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAE9F,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,CAAC;QAElE,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAC3B,OAAO,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC;IAC7D,CAAC;CACJ;AAlBD,oBAkBC"}
1
+ {"version":3,"file":"hmac.js","sourceRoot":"","sources":["../../src/crypto/hmac.ts"],"names":[],"mappings":";;;AAAA,0DAAiD;AACjD,iCAAiC;AAGjC,SAAS;AACT,MAAa,IAAI;IAEb,gBAAwB,CAAC;IAGlB,MAAM,CAAC,MAAM,CAAC,GAAW,EAAE,KAAa;QAE3C,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACpD,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAExD,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,IAAI,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,CAAC;QAElE,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;QAC3B,OAAO,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC;IAC5C,CAAC;CACJ;AAlBD,oBAkBC"}
@@ -1,7 +1,6 @@
1
- import "@nivinjoseph/n-ext";
2
1
  export declare class SymmetricEncryption {
3
2
  private constructor();
4
3
  static generateKey(): Promise<string>;
5
4
  static encrypt(key: string, value: string): Promise<string>;
6
- static decrypt(key: string, value: string): Promise<string>;
5
+ static decrypt(key: string, value: string): string;
7
6
  }
@@ -4,7 +4,7 @@ exports.SymmetricEncryption = void 0;
4
4
  const Crypto = require("crypto");
5
5
  const crypto_exception_1 = require("./crypto-exception");
6
6
  const n_defensive_1 = require("@nivinjoseph/n-defensive");
7
- require("@nivinjoseph/n-ext");
7
+ // public
8
8
  class SymmetricEncryption {
9
9
  constructor() { }
10
10
  static generateKey() {
@@ -19,11 +19,11 @@ class SymmetricEncryption {
19
19
  });
20
20
  }
21
21
  static encrypt(key, value) {
22
- n_defensive_1.given(key, "key").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
23
- n_defensive_1.given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
24
- key = key.trim();
25
- value = value.trim();
26
22
  return new Promise((resolve, reject) => {
23
+ (0, n_defensive_1.given)(key, "key").ensureHasValue().ensureIsString();
24
+ (0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
25
+ key = key.trim();
26
+ value = value.trim();
27
27
  Crypto.randomBytes(16, (err, buf) => {
28
28
  if (err) {
29
29
  reject(err);
@@ -44,23 +44,18 @@ class SymmetricEncryption {
44
44
  });
45
45
  }
46
46
  static decrypt(key, value) {
47
- n_defensive_1.given(key, "key").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
48
- n_defensive_1.given(value, "value").ensureHasValue().ensureIsString().ensure(t => !t.isEmptyOrWhiteSpace());
47
+ (0, n_defensive_1.given)(key, "key").ensureHasValue().ensureIsString();
48
+ (0, n_defensive_1.given)(value, "value").ensureHasValue().ensureIsString();
49
49
  key = key.trim();
50
50
  value = value.trim();
51
- try {
52
- const splitted = value.split(".");
53
- if (splitted.length !== 2)
54
- throw new crypto_exception_1.CryptoException("Invalid value.");
55
- const iv = Buffer.from(splitted[1], "hex");
56
- const deCipher = Crypto.createDecipheriv("AES-256-CBC", Buffer.from(key, "hex"), iv);
57
- let decrypted = deCipher.update(splitted[0], "hex", "utf8");
58
- decrypted += deCipher.final("utf8");
59
- return Promise.resolve(decrypted);
60
- }
61
- catch (error) {
62
- return Promise.reject(error);
63
- }
51
+ const splitted = value.split(".");
52
+ if (splitted.length !== 2)
53
+ throw new crypto_exception_1.CryptoException("Invalid value.");
54
+ const iv = Buffer.from(splitted[1], "hex");
55
+ const deCipher = Crypto.createDecipheriv("AES-256-CBC", Buffer.from(key, "hex"), iv);
56
+ let decrypted = deCipher.update(splitted[0], "hex", "utf8");
57
+ decrypted += deCipher.final("utf8");
58
+ return decrypted;
64
59
  }
65
60
  }
66
61
  exports.SymmetricEncryption = SymmetricEncryption;
@@ -1 +1 @@
1
- {"version":3,"file":"symmetric-encryption.js","sourceRoot":"","sources":["../../src/crypto/symmetric-encryption.ts"],"names":[],"mappings":";;;AAAA,iCAAiC;AACjC,yDAAqD;AACrD,0DAAiD;AACjD,8BAA4B;AAI5B,MAAa,mBAAmB;IAE5B,gBAAwB,CAAC;IAGlB,MAAM,CAAC,WAAW;QAErB,OAAO,IAAI,OAAO,CAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAE3C,MAAM,CAAC,WAAW,CAAC,EAAE,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE;gBAEhC,IAAI,GAAG,EACP;oBACI,MAAM,CAAC,GAAG,CAAC,CAAC;oBACZ,OAAO;iBACV;gBAED,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC;YAC/C,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACP,CAAC;IAEM,MAAM,CAAC,OAAO,CAAC,GAAW,EAAE,KAAa;QAE5C,mBAAK,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAC1F,mBAAK,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAE9F,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,OAAO,IAAI,OAAO,CAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAE3C,MAAM,CAAC,WAAW,CAAC,EAAE,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE;gBAEhC,IAAI,GAAG,EACP;oBACI,MAAM,CAAC,GAAG,CAAC,CAAC;oBACZ,OAAO;iBACV;gBAED,IACA;oBACI,MAAM,EAAE,GAAG,GAAG,CAAC;oBACf,MAAM,MAAM,GAAG,MAAM,CAAC,cAAc,CAAC,aAAa,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC;oBACjF,IAAI,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;oBACpD,SAAS,IAAI,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;oBACjC,MAAM,UAAU,GAAG,GAAG,SAAS,IAAI,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;oBACxD,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC,CAAC;iBACrC;gBACD,OAAO,KAAK,EACZ;oBACI,MAAM,CAAC,KAAK,CAAC,CAAC;iBACjB;YACL,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IAGP,CAAC;IAEM,MAAM,CAAC,OAAO,CAAC,GAAW,EAAE,KAAa;QAE5C,mBAAK,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAC1F,mBAAK,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,mBAAmB,EAAE,CAAC,CAAC;QAE9F,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,IACA;YACI,MAAM,QAAQ,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAClC,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC;gBACrB,MAAM,IAAI,kCAAe,CAAC,gBAAgB,CAAC,CAAC;YAEhD,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;YAC3C,MAAM,QAAQ,GAAG,MAAM,CAAC,gBAAgB,CAAC,aAAa,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC;YACrF,IAAI,SAAS,GAAG,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;YAC5D,SAAS,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC;YACpC,OAAO,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC;SACrC;QACD,OAAO,KAAK,EACZ;YACI,OAAO,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;SAChC;IACL,CAAC;CACJ;AApFD,kDAoFC"}
1
+ {"version":3,"file":"symmetric-encryption.js","sourceRoot":"","sources":["../../src/crypto/symmetric-encryption.ts"],"names":[],"mappings":";;;AAAA,iCAAiC;AACjC,yDAAqD;AACrD,0DAAiD;AAGjD,SAAS;AACT,MAAa,mBAAmB;IAE5B,gBAAwB,CAAC;IAGlB,MAAM,CAAC,WAAW;QAErB,OAAO,IAAI,OAAO,CAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAE3C,MAAM,CAAC,WAAW,CAAC,EAAE,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE;gBAEhC,IAAI,GAAG,EACP;oBACI,MAAM,CAAC,GAAG,CAAC,CAAC;oBACZ,OAAO;iBACV;gBAED,OAAO,CAAC,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC;YAC/C,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACP,CAAC;IAEM,MAAM,CAAC,OAAO,CAAC,GAAW,EAAE,KAAa;QAE5C,OAAO,IAAI,OAAO,CAAS,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;YAE3C,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;YACpD,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;YAExD,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;YACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;YAErB,MAAM,CAAC,WAAW,CAAC,EAAE,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE;gBAEhC,IAAI,GAAG,EACP;oBACI,MAAM,CAAC,GAAG,CAAC,CAAC;oBACZ,OAAO;iBACV;gBAED,IACA;oBACI,MAAM,EAAE,GAAG,GAAG,CAAC;oBACf,MAAM,MAAM,GAAG,MAAM,CAAC,cAAc,CAAC,aAAa,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC;oBACjF,IAAI,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;oBACpD,SAAS,IAAI,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;oBACjC,MAAM,UAAU,GAAG,GAAG,SAAS,IAAI,EAAE,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;oBACxD,OAAO,CAAC,UAAU,CAAC,WAAW,EAAE,CAAC,CAAC;iBACrC;gBACD,OAAO,KAAK,EACZ;oBACI,MAAM,CAAC,KAAK,CAAC,CAAC;iBACjB;YACL,CAAC,CAAC,CAAC;QACP,CAAC,CAAC,CAAC;IACP,CAAC;IAEM,MAAM,CAAC,OAAO,CAAC,GAAW,EAAE,KAAa;QAE5C,IAAA,mBAAK,EAAC,GAAG,EAAE,KAAK,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QACpD,IAAA,mBAAK,EAAC,KAAK,EAAE,OAAO,CAAC,CAAC,cAAc,EAAE,CAAC,cAAc,EAAE,CAAC;QAExD,GAAG,GAAG,GAAG,CAAC,IAAI,EAAE,CAAC;QACjB,KAAK,GAAG,KAAK,CAAC,IAAI,EAAE,CAAC;QAErB,MAAM,QAAQ,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAClC,IAAI,QAAQ,CAAC,MAAM,KAAK,CAAC;YACrB,MAAM,IAAI,kCAAe,CAAC,gBAAgB,CAAC,CAAC;QAEhD,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,KAAK,CAAC,CAAC;QAC3C,MAAM,QAAQ,GAAG,MAAM,CAAC,gBAAgB,CAAC,aAAa,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,CAAC;QACrF,IAAI,SAAS,GAAG,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;QAC5D,SAAS,IAAI,QAAQ,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC;QACpC,OAAO,SAAS,CAAC;IACrB,CAAC;CACJ;AA3ED,kDA2EC"}
package/dist/index.js CHANGED
@@ -7,6 +7,8 @@ const hmac_1 = require("./crypto/hmac");
7
7
  Object.defineProperty(exports, "Hmac", { enumerable: true, get: function () { return hmac_1.Hmac; } });
8
8
  const hash_1 = require("./crypto/hash");
9
9
  Object.defineProperty(exports, "Hash", { enumerable: true, get: function () { return hash_1.Hash; } });
10
+ // import { DigitalSignature } from "./crypto/digital-signature";
11
+ // import { AsymmetricEncryption } from "./crypto/asymmetric-encryption";
10
12
  const crypto_exception_1 = require("./crypto/crypto-exception");
11
13
  Object.defineProperty(exports, "CryptoException", { enumerable: true, get: function () { return crypto_exception_1.CryptoException; } });
12
14
  const alg_type_1 = require("./api-security/alg-type");
package/dist/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;AAAA,wEAAoE;AAkBhE,oGAlBK,0CAAmB,OAkBL;AAjBvB,wCAAqC;AAiBZ,qFAjBhB,WAAI,OAiBgB;AAhB7B,wCAAqC;AAgBN,qFAhBtB,WAAI,OAgBsB;AAbnC,gEAA4D;AAexD,gGAfK,kCAAe,OAeL;AAbnB,sDAAkD;AAe9C,wFAfK,kBAAO,OAeL;AAdX,gDAA6C;AAchC,sFAdJ,aAAK,OAcI;AAblB,oEAAgE;AAa5C,+FAbX,gCAAc,OAaW;AAZlC,oFAA+E;AAY3C,sGAZ3B,+CAAqB,OAY2B;AAXzD,oFAA+E;AAWpB,sGAXlD,+CAAqB,OAWkD;AAVhF,kEAA6D;AAUqB,6FAVzE,6BAAY,OAUyE;AAT9F,kEAA8D;AASkC,8FATvF,8BAAa,OASuF"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;AAAA,wEAAoE;AAkBhE,oGAlBK,0CAAmB,OAkBL;AAjBvB,wCAAqC;AAiBZ,qFAjBhB,WAAI,OAiBgB;AAhB7B,wCAAqC;AAgBN,qFAhBtB,WAAI,OAgBsB;AAfnC,iEAAiE;AACjE,yEAAyE;AACzE,gEAA4D;AAexD,gGAfK,kCAAe,OAeL;AAbnB,sDAAkD;AAe9C,wFAfK,kBAAO,OAeL;AAdX,gDAA6C;AAchC,sFAdJ,aAAK,OAcI;AAblB,oEAAgE;AAa5C,+FAbX,gCAAc,OAaW;AAZlC,oFAA+E;AAY3C,sGAZ3B,+CAAqB,OAY2B;AAXzD,oFAA+E;AAWpB,sGAXlD,+CAAqB,OAWkD;AAVhF,kEAA6D;AAUqB,6FAVzE,6BAAY,OAUyE;AAT9F,kEAA8D;AASkC,8FATvF,8BAAa,OASuF"}