@opentdf/sdk 0.11.0 → 0.12.0-beta.112
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +17 -16
- package/dist/cjs/src/opentdf.js +21 -5
- package/dist/cjs/src/platform.js +23 -10
- package/dist/cjs/src/version.js +1 -1
- package/dist/cjs/tdf3/src/crypto/core/ec.js +88 -0
- package/dist/cjs/tdf3/src/crypto/core/key-format.js +359 -0
- package/dist/cjs/tdf3/src/crypto/core/keys.js +85 -0
- package/dist/cjs/tdf3/src/crypto/core/rsa.js +120 -0
- package/dist/cjs/tdf3/src/crypto/core/signing.js +178 -0
- package/dist/cjs/tdf3/src/crypto/core/symmetric.js +205 -0
- package/dist/cjs/tdf3/src/crypto/index.js +69 -1051
- package/dist/types/src/opentdf.d.ts +2 -0
- package/dist/types/src/opentdf.d.ts.map +1 -1
- package/dist/types/src/version.d.ts +1 -1
- package/dist/types/tdf3/src/crypto/core/ec.d.ts +11 -0
- package/dist/types/tdf3/src/crypto/core/ec.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/key-format.d.ts +41 -0
- package/dist/types/tdf3/src/crypto/core/key-format.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/keys.d.ts +27 -0
- package/dist/types/tdf3/src/crypto/core/keys.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/rsa.d.ts +35 -0
- package/dist/types/tdf3/src/crypto/core/rsa.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/signing.d.ts +10 -0
- package/dist/types/tdf3/src/crypto/core/signing.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/core/symmetric.d.ts +68 -0
- package/dist/types/tdf3/src/crypto/core/symmetric.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/index.d.ts +11 -164
- package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -1
- package/dist/web/src/opentdf.js +21 -5
- package/dist/web/src/platform.js +23 -10
- package/dist/web/src/version.js +1 -1
- package/dist/web/tdf3/src/crypto/core/ec.js +84 -0
- package/dist/web/tdf3/src/crypto/core/key-format.js +348 -0
- package/dist/web/tdf3/src/crypto/core/keys.js +78 -0
- package/dist/web/tdf3/src/crypto/core/rsa.js +112 -0
- package/dist/web/tdf3/src/crypto/core/signing.js +174 -0
- package/dist/web/tdf3/src/crypto/core/symmetric.js +192 -0
- package/dist/web/tdf3/src/crypto/index.js +13 -994
- package/package.json +1 -1
- package/src/opentdf.ts +22 -4
- package/src/platform.ts +23 -9
- package/src/version.ts +1 -1
- package/tdf3/src/crypto/core/ec.ts +118 -0
- package/tdf3/src/crypto/core/key-format.ts +420 -0
- package/tdf3/src/crypto/core/keys.ts +86 -0
- package/tdf3/src/crypto/core/rsa.ts +144 -0
- package/tdf3/src/crypto/core/signing.ts +214 -0
- package/tdf3/src/crypto/core/symmetric.ts +265 -0
- package/tdf3/src/crypto/index.ts +71 -1239
|
@@ -203,6 +203,8 @@ export declare class OpenTDF {
|
|
|
203
203
|
defaultReadOptions: Omit<ReadOptions, 'source'>;
|
|
204
204
|
/** The DPoP keys for this instance, if any. */
|
|
205
205
|
readonly dpopKeys: Promise<KeyPair>;
|
|
206
|
+
/** Resolves once DPoP keys have been bound to the auth provider. Await before using PlatformClient. */
|
|
207
|
+
readonly ready: Promise<void>;
|
|
206
208
|
/** The CryptoService implementation for this instance. */
|
|
207
209
|
readonly cryptoService: CryptoService;
|
|
208
210
|
/** The TDF3 client for encrypting and decrypting ZTDF files. */
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"opentdf.d.ts","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,YAAY,EAAE,MAAM,qBAAqB,CAAC;AAExD,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAuC,KAAK,MAAM,EAAE,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAE,KAAK,aAAa,EAAE,KAAK,OAAO,EAAE,MAAM,oCAAoC,CAAC;AAEtF,OAAO,EACL,KAAK,SAAS,EACd,eAAe,EACf,yBAAyB,EAC1B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EACL,KAAK,qBAAqB,EAG1B,oBAAoB,EACrB,MAAM,aAAa,CAAC;AACrB,OAAO,EAAE,KAAK,QAAQ,EAAE,MAAM,gCAAgC,CAAC;AAC/D,OAAO,EAAE,KAAK,OAAO,EAAE,MAAM,+BAA+B,CAAC;AAC7D,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,SAAS,EACd,KAAK,qBAAqB,EAC3B,MAAM,8CAA8C,CAAC;AACtD,OAAO,EAAE,KAAK,eAAe,EAAE,MAAM,kCAAkC,CAAC;AACxE,OAAO,EAIL,KAAK,kBAAkB,EACxB,MAAM,oBAAoB,CAAC;AAI5B,OAAO,EACL,KAAK,SAAS,EACd,KAAK,aAAa,EAClB,KAAK,qBAAqB,EAC1B,KAAK,kBAAkB,EACvB,KAAK,qBAAqB,EAC1B,KAAK,eAAe,EACpB,KAAK,QAAQ,EACb,KAAK,OAAO,EACZ,KAAK,OAAO,EACZ,KAAK,SAAS,EACd,oBAAoB,GACrB,CAAC;AAEF,sDAAsD;AACtD,MAAM,MAAM,IAAI,GAAG;IACjB,CAAC,KAAK,EAAE,MAAM,GAAG,SAAS,GAAG,aAAa,CAAC;CAC5C,CAAC;AAEF,8EAA8E;AAC9E,MAAM,MAAM,mBAAmB,GAAG;IAChC,yDAAyD;IACzD,IAAI,EAAE,MAAM,EAAE,CAAC;CAChB,CAAC;AAEF,iFAAiF;AACjF,MAAM,MAAM,aAAa,GAAG;IAC1B,wEAAwE;IACxE,aAAa,CAAC,EAAE,OAAO,CAAC;IAExB,uEAAuE;IACvE,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IAEtB;;;OAGG;IACH,SAAS,CAAC,EAAE,MAAM,CAAC;IAEnB,kFAAkF;IAClF,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAE5B,oEAAoE;IACpE,OAAO,CAAC,EAAE,IAAI,CAAC;IAEf,gCAAgC;IAChC,MAAM,EAAE,MAAM,CAAC;CAChB,CAAC;AAEF,iCAAiC;AACjC,MAAM,MAAM,QAAQ,GAAG,MAAM,CAAC;AAE9B,0CAA0C;AAC1C,MAAM,MAAM,QAAQ,GAAG,GAAG,MAAM,IAAI,MAAM,EAAE,CAAC;AAE7C,6EAA6E;AAC7E,MAAM,MAAM,SAAS,GAAG;IACtB,0DAA0D;IAC1D,GAAG,EAAE,MAAM,CAAC;IACZ;;;OAGG;IACH,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,iBAAiB,GAAG,aAAa,GAAG;IAC9C,wCAAwC;IACxC,gBAAgB,CAAC,EAAE,eAAe,EAAE,CAAC;IAErC,qCAAqC;IACrC,QAAQ,CAAC,EAAE,QAAQ,CAAC;IAEpB,4DAA4D;IAC5D,QAAQ,CAAC,EAAE,QAAQ,CAAC;IAEpB,2EAA2E;IAC3E,SAAS,CAAC,EAAE,SAAS,EAAE,CAAC;IAExB;;;OAGG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB,yDAAyD;IACzD,oBAAoB,CAAC,EAAE,qBAAqB,CAAC;IAE7C,kCAAkC;IAClC,cAAc,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC;CACpC,CAAC;AAEF,kCAAkC;AAClC,MAAM,MAAM,gBAAgB,GAAG,iBAAiB,CAAC;AAEjD,uDAAuD;AACvD,MAAM,MAAM,WAAW,GAAG;IACxB,6BAA6B;IAC7B,MAAM,EAAE,MAAM,CAAC;IACf,wBAAwB;IACxB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,wDAAwD;IACxD,mBAAmB,CAAC,EAAE,MAAM,EAAE,CAAC;IAC/B,iDAAiD;IACjD,eAAe,CAAC,EAAE,OAAO,CAAC;IAC1B,4DAA4D;IAC5D,yBAAyB,CAAC,EAAE,MAAM,EAAE,CAAC;IACrC,wDAAwD;IACxD,yBAAyB,CAAC,EAAE,yBAAyB,CAAC;IACtD,iDAAiD;IACjD,QAAQ,CAAC,EAAE,OAAO,CAAC;IAEnB,gFAAgF;IAChF,gBAAgB,CAAC,EAAE,MAAM,CAAC;IAE1B,iDAAiD;IACjD,oBAAoB,CAAC,EAAE,qBAAqB,CAAC;CAC9C,CAAC;AAEF,8EAA8E;AAC9E,MAAM,MAAM,cAAc,GAAG;IAC3B,+BAA+B;IAC/B,cAAc,CAAC,EAAE,MAAM,CAAC;IAExB,oBAAoB;IACpB,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB,qEAAqE;IACrE,YAAY,EAAE,YAAY,CAAC;IAE3B,oDAAoD;IACpD,oBAAoB,CAAC,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IAErD,oDAAoD;IACpD,kBAAkB,CAAC,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;IAEjD,6CAA6C;IAC7C,WAAW,CAAC,EAAE,OAAO,CAAC;IAEtB;;;;OAIG;IACH,QAAQ,CAAC,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IAE5B;;;;OAIG;IACH,aAAa,CAAC,EAAE,aAAa,CAAC;CAC/B,CAAC;AAEF,mCAAmC;AACnC,MAAM,MAAM,eAAe,GAAG,cAAc,CAAC,UAAU,CAAC,GAAG;IACzD,iFAAiF;IACjF,QAAQ,CAAC,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IAC5B,wBAAwB;IACxB,QAAQ,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;CAC9B,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,SAAS,GAAG;IACtB;;OAEG;IACH,OAAO,EAAE,MAAM,OAAO,CAAC,eAAe,CAAC,CAAC;IACxC;;OAEG;IACH,KAAK,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;IAE3B;;OAEG;IACH,QAAQ,EAAE,MAAM,OAAO,CAAC,QAAQ,CAAC,CAAC;IAElC;;OAEG;IACH,UAAU,EAAE,MAAM,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC;IAEpC;;OAEG;IACH,WAAW,EAAE,MAAM,OAAO,CAAC,mBAAmB,CAAC,CAAC;CACjD,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,qBAAa,OAAO;IAClB,uBAAuB;IACvB,QAAQ,CAAC,WAAW,EAAE,MAAM,CAAC;IAC7B,kCAAkC;IAClC,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,kDAAkD;IAClD,QAAQ,CAAC,YAAY,EAAE,YAAY,CAAC;IACpC,4CAA4C;IAC5C,QAAQ,CAAC,WAAW,EAAE,OAAO,CAAC;IAC9B,gDAAgD;IAChD,oBAAoB,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IACpD,+CAA+C;IAC/C,kBAAkB,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;IAChD,+CAA+C;IAC/C,QAAQ,CAAC,QAAQ,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IACpC,0DAA0D;IAC1D,QAAQ,CAAC,aAAa,EAAE,aAAa,CAAC;IACtC,gEAAgE;IAChE,QAAQ,CAAC,UAAU,EAAE,UAAU,CAAC;gBAEpB,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,WAAW,EACX,aAAa,GACd,EAAE,cAAc;
|
|
1
|
+
{"version":3,"file":"opentdf.d.ts","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,YAAY,EAAE,MAAM,qBAAqB,CAAC;AAExD,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAuC,KAAK,MAAM,EAAE,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAE,KAAK,aAAa,EAAE,KAAK,OAAO,EAAE,MAAM,oCAAoC,CAAC;AAEtF,OAAO,EACL,KAAK,SAAS,EACd,eAAe,EACf,yBAAyB,EAC1B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EACL,KAAK,qBAAqB,EAG1B,oBAAoB,EACrB,MAAM,aAAa,CAAC;AACrB,OAAO,EAAE,KAAK,QAAQ,EAAE,MAAM,gCAAgC,CAAC;AAC/D,OAAO,EAAE,KAAK,OAAO,EAAE,MAAM,+BAA+B,CAAC;AAC7D,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,SAAS,EACd,KAAK,qBAAqB,EAC3B,MAAM,8CAA8C,CAAC;AACtD,OAAO,EAAE,KAAK,eAAe,EAAE,MAAM,kCAAkC,CAAC;AACxE,OAAO,EAIL,KAAK,kBAAkB,EACxB,MAAM,oBAAoB,CAAC;AAI5B,OAAO,EACL,KAAK,SAAS,EACd,KAAK,aAAa,EAClB,KAAK,qBAAqB,EAC1B,KAAK,kBAAkB,EACvB,KAAK,qBAAqB,EAC1B,KAAK,eAAe,EACpB,KAAK,QAAQ,EACb,KAAK,OAAO,EACZ,KAAK,OAAO,EACZ,KAAK,SAAS,EACd,oBAAoB,GACrB,CAAC;AAEF,sDAAsD;AACtD,MAAM,MAAM,IAAI,GAAG;IACjB,CAAC,KAAK,EAAE,MAAM,GAAG,SAAS,GAAG,aAAa,CAAC;CAC5C,CAAC;AAEF,8EAA8E;AAC9E,MAAM,MAAM,mBAAmB,GAAG;IAChC,yDAAyD;IACzD,IAAI,EAAE,MAAM,EAAE,CAAC;CAChB,CAAC;AAEF,iFAAiF;AACjF,MAAM,MAAM,aAAa,GAAG;IAC1B,wEAAwE;IACxE,aAAa,CAAC,EAAE,OAAO,CAAC;IAExB,uEAAuE;IACvE,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IAEtB;;;OAGG;IACH,SAAS,CAAC,EAAE,MAAM,CAAC;IAEnB,kFAAkF;IAClF,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAE5B,oEAAoE;IACpE,OAAO,CAAC,EAAE,IAAI,CAAC;IAEf,gCAAgC;IAChC,MAAM,EAAE,MAAM,CAAC;CAChB,CAAC;AAEF,iCAAiC;AACjC,MAAM,MAAM,QAAQ,GAAG,MAAM,CAAC;AAE9B,0CAA0C;AAC1C,MAAM,MAAM,QAAQ,GAAG,GAAG,MAAM,IAAI,MAAM,EAAE,CAAC;AAE7C,6EAA6E;AAC7E,MAAM,MAAM,SAAS,GAAG;IACtB,0DAA0D;IAC1D,GAAG,EAAE,MAAM,CAAC;IACZ;;;OAGG;IACH,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,iBAAiB,GAAG,aAAa,GAAG;IAC9C,wCAAwC;IACxC,gBAAgB,CAAC,EAAE,eAAe,EAAE,CAAC;IAErC,qCAAqC;IACrC,QAAQ,CAAC,EAAE,QAAQ,CAAC;IAEpB,4DAA4D;IAC5D,QAAQ,CAAC,EAAE,QAAQ,CAAC;IAEpB,2EAA2E;IAC3E,SAAS,CAAC,EAAE,SAAS,EAAE,CAAC;IAExB;;;OAGG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB,yDAAyD;IACzD,oBAAoB,CAAC,EAAE,qBAAqB,CAAC;IAE7C,kCAAkC;IAClC,cAAc,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC;CACpC,CAAC;AAEF,kCAAkC;AAClC,MAAM,MAAM,gBAAgB,GAAG,iBAAiB,CAAC;AAEjD,uDAAuD;AACvD,MAAM,MAAM,WAAW,GAAG;IACxB,6BAA6B;IAC7B,MAAM,EAAE,MAAM,CAAC;IACf,wBAAwB;IACxB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,wDAAwD;IACxD,mBAAmB,CAAC,EAAE,MAAM,EAAE,CAAC;IAC/B,iDAAiD;IACjD,eAAe,CAAC,EAAE,OAAO,CAAC;IAC1B,4DAA4D;IAC5D,yBAAyB,CAAC,EAAE,MAAM,EAAE,CAAC;IACrC,wDAAwD;IACxD,yBAAyB,CAAC,EAAE,yBAAyB,CAAC;IACtD,iDAAiD;IACjD,QAAQ,CAAC,EAAE,OAAO,CAAC;IAEnB,gFAAgF;IAChF,gBAAgB,CAAC,EAAE,MAAM,CAAC;IAE1B,iDAAiD;IACjD,oBAAoB,CAAC,EAAE,qBAAqB,CAAC;CAC9C,CAAC;AAEF,8EAA8E;AAC9E,MAAM,MAAM,cAAc,GAAG;IAC3B,+BAA+B;IAC/B,cAAc,CAAC,EAAE,MAAM,CAAC;IAExB,oBAAoB;IACpB,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB,qEAAqE;IACrE,YAAY,EAAE,YAAY,CAAC;IAE3B,oDAAoD;IACpD,oBAAoB,CAAC,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IAErD,oDAAoD;IACpD,kBAAkB,CAAC,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;IAEjD,6CAA6C;IAC7C,WAAW,CAAC,EAAE,OAAO,CAAC;IAEtB;;;;OAIG;IACH,QAAQ,CAAC,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IAE5B;;;;OAIG;IACH,aAAa,CAAC,EAAE,aAAa,CAAC;CAC/B,CAAC;AAEF,mCAAmC;AACnC,MAAM,MAAM,eAAe,GAAG,cAAc,CAAC,UAAU,CAAC,GAAG;IACzD,iFAAiF;IACjF,QAAQ,CAAC,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IAC5B,wBAAwB;IACxB,QAAQ,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;CAC9B,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,SAAS,GAAG;IACtB;;OAEG;IACH,OAAO,EAAE,MAAM,OAAO,CAAC,eAAe,CAAC,CAAC;IACxC;;OAEG;IACH,KAAK,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;IAE3B;;OAEG;IACH,QAAQ,EAAE,MAAM,OAAO,CAAC,QAAQ,CAAC,CAAC;IAElC;;OAEG;IACH,UAAU,EAAE,MAAM,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC;IAEpC;;OAEG;IACH,WAAW,EAAE,MAAM,OAAO,CAAC,mBAAmB,CAAC,CAAC;CACjD,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,qBAAa,OAAO;IAClB,uBAAuB;IACvB,QAAQ,CAAC,WAAW,EAAE,MAAM,CAAC;IAC7B,kCAAkC;IAClC,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,kDAAkD;IAClD,QAAQ,CAAC,YAAY,EAAE,YAAY,CAAC;IACpC,4CAA4C;IAC5C,QAAQ,CAAC,WAAW,EAAE,OAAO,CAAC;IAC9B,gDAAgD;IAChD,oBAAoB,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IACpD,+CAA+C;IAC/C,kBAAkB,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;IAChD,+CAA+C;IAC/C,QAAQ,CAAC,QAAQ,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IACpC,uGAAuG;IACvG,QAAQ,CAAC,KAAK,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC;IAC9B,0DAA0D;IAC1D,QAAQ,CAAC,aAAa,EAAE,aAAa,CAAC;IACtC,gEAAgE;IAChE,QAAQ,CAAC,UAAU,EAAE,UAAU,CAAC;gBAEpB,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,WAAW,EACX,aAAa,GACd,EAAE,cAAc;IA0CjB,gCAAgC;IAC1B,SAAS,CAAC,IAAI,EAAE,gBAAgB,GAAG,OAAO,CAAC,eAAe,CAAC;IAIjE;;;OAGG;IACG,UAAU,CAAC,IAAI,EAAE,iBAAiB,GAAG,OAAO,CAAC,eAAe,CAAC;IAwBnE,sDAAsD;IACtD,IAAI,CAAC,IAAI,EAAE,WAAW,GAAG,SAAS;IAKlC,2BAA2B;IACrB,IAAI,CAAC,IAAI,EAAE,WAAW,GAAG,OAAO,CAAC,eAAe,CAAC;IAKvD,8DAA8D;IAC9D,KAAK;CAGN"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { type ECCurve, type HkdfParams, type KeyPair, type PrivateKey, type PublicKey, type SymmetricKey } from '../declarations.js';
|
|
2
|
+
/**
|
|
3
|
+
* Generate an EC key pair for ECDH key agreement.
|
|
4
|
+
*/
|
|
5
|
+
export declare function generateECKeyPair(curve?: ECCurve): Promise<KeyPair>;
|
|
6
|
+
/**
|
|
7
|
+
* Perform ECDH key agreement followed by HKDF key derivation.
|
|
8
|
+
* Returns opaque symmetric key for symmetric encryption.
|
|
9
|
+
*/
|
|
10
|
+
export declare function deriveKeyFromECDH(privateKey: PrivateKey, publicKey: PublicKey, hkdfParams: HkdfParams): Promise<SymmetricKey>;
|
|
11
|
+
//# sourceMappingURL=ec.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ec.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/ec.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,UAAU,EAEf,KAAK,OAAO,EACZ,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,YAAY,EAClB,MAAM,oBAAoB,CAAC;AAoB5B;;GAEG;AACH,wBAAsB,iBAAiB,CAAC,KAAK,GAAE,OAAiB,GAAG,OAAO,CAAC,OAAO,CAAC,CA4BlF;AAED;;;GAGG;AACH,wBAAsB,iBAAiB,CACrC,UAAU,EAAE,UAAU,EACtB,SAAS,EAAE,SAAS,EACpB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,YAAY,CAAC,CAgDvB"}
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
import { type KeyOptions, type PrivateKey, type PublicKey, type PublicKeyInfo } from '../declarations.js';
|
|
2
|
+
/**
|
|
3
|
+
* Extract PEM public key from X.509 certificate or return PEM key as-is.
|
|
4
|
+
*/
|
|
5
|
+
export declare function extractPublicKeyPem(certOrPem: string, jwaAlgorithm?: string): Promise<string>;
|
|
6
|
+
/**
|
|
7
|
+
* Import and validate a PEM public key, returning algorithm info.
|
|
8
|
+
* Uses JWK export for robust key parameter detection.
|
|
9
|
+
*/
|
|
10
|
+
export declare function parsePublicKeyPem(pem: string): Promise<PublicKeyInfo>;
|
|
11
|
+
/**
|
|
12
|
+
* Convert a JWK (JSON Web Key) to PEM format.
|
|
13
|
+
*/
|
|
14
|
+
export declare function jwkToPublicKeyPem(jwk: JsonWebKey): Promise<string>;
|
|
15
|
+
/**
|
|
16
|
+
* Convert a PEM public key to JWK format.
|
|
17
|
+
* Returns only public key components (no private key data).
|
|
18
|
+
*/
|
|
19
|
+
export declare function publicKeyPemToJwk(publicKeyPem: string): Promise<JsonWebKey>;
|
|
20
|
+
/**
|
|
21
|
+
* Import a PEM public key as an opaque key.
|
|
22
|
+
*/
|
|
23
|
+
export declare function importPublicKey(pem: string, options: KeyOptions): Promise<PublicKey>;
|
|
24
|
+
/**
|
|
25
|
+
* Import a PEM private key as an opaque key.
|
|
26
|
+
*/
|
|
27
|
+
export declare function importPrivateKey(pem: string, options: KeyOptions): Promise<PrivateKey>;
|
|
28
|
+
/**
|
|
29
|
+
* Export an opaque public key to PEM format.
|
|
30
|
+
*/
|
|
31
|
+
export declare function exportPublicKeyPem(key: PublicKey): Promise<string>;
|
|
32
|
+
/**
|
|
33
|
+
* Export an opaque private key to PEM format.
|
|
34
|
+
* ONLY USE FOR TESTING/DEVELOPMENT. Private keys should NOT be exportable in secure environments.
|
|
35
|
+
*/
|
|
36
|
+
export declare function exportPrivateKeyPem(key: PrivateKey): Promise<string>;
|
|
37
|
+
/**
|
|
38
|
+
* Export an opaque public key to JWK format.
|
|
39
|
+
*/
|
|
40
|
+
export declare function exportPublicKeyJwk(key: PublicKey): Promise<JsonWebKey>;
|
|
41
|
+
//# sourceMappingURL=key-format.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"key-format.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/key-format.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,KAAK,UAAU,EAEf,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,aAAa,EACnB,MAAM,oBAAoB,CAAC;AAc5B;;GAEG;AACH,wBAAsB,mBAAmB,CACvC,SAAS,EAAE,MAAM,EACjB,YAAY,CAAC,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,CAqBjB;AAiDD;;;GAGG;AACH,wBAAsB,iBAAiB,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,aAAa,CAAC,CAmD3E;AAED;;GAEG;AACH,wBAAsB,iBAAiB,CAAC,GAAG,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC,CAqBxE;AAED;;;GAGG;AACH,wBAAsB,iBAAiB,CAAC,YAAY,EAAE,MAAM,GAAG,OAAO,CAAC,UAAU,CAAC,CAoCjF;AAED;;GAEG;AACH,wBAAsB,eAAe,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU,GAAG,OAAO,CAAC,SAAS,CAAC,CA6D1F;AAED;;GAEG;AACH,wBAAsB,gBAAgB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAqG5F;AAED;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,CAIxE;AAED;;;GAGG;AACH,wBAAsB,mBAAmB,CAAC,GAAG,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC,CAI1E;AAED;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,UAAU,CAAC,CAG5E"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
import { type KeyAlgorithm, type PrivateKey, type PublicKey, type SymmetricKey } from '../declarations.js';
|
|
2
|
+
/**
|
|
3
|
+
* Wrap a CryptoKey as an opaque PublicKey.
|
|
4
|
+
* @internal
|
|
5
|
+
*/
|
|
6
|
+
export declare function wrapPublicKey(key: CryptoKey, algorithm: KeyAlgorithm): PublicKey;
|
|
7
|
+
/**
|
|
8
|
+
* Wrap a CryptoKey as an opaque PrivateKey.
|
|
9
|
+
* @internal
|
|
10
|
+
*/
|
|
11
|
+
export declare function wrapPrivateKey(key: CryptoKey, algorithm: KeyAlgorithm): PrivateKey;
|
|
12
|
+
/**
|
|
13
|
+
* Unwrap an opaque key to get the internal CryptoKey.
|
|
14
|
+
* @internal
|
|
15
|
+
*/
|
|
16
|
+
export declare function unwrapKey(key: PublicKey | PrivateKey): CryptoKey;
|
|
17
|
+
/**
|
|
18
|
+
* Wrap raw key bytes as an opaque SymmetricKey.
|
|
19
|
+
* @internal
|
|
20
|
+
*/
|
|
21
|
+
export declare function wrapSymmetricKey(keyBytes: Uint8Array): SymmetricKey;
|
|
22
|
+
/**
|
|
23
|
+
* Unwrap an opaque SymmetricKey to get raw bytes.
|
|
24
|
+
* @internal
|
|
25
|
+
*/
|
|
26
|
+
export declare function unwrapSymmetricKey(key: SymmetricKey): Uint8Array;
|
|
27
|
+
//# sourceMappingURL=keys.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"keys.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/keys.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,YAAY,EACjB,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,YAAY,EAClB,MAAM,oBAAoB,CAAC;AAE5B;;;GAGG;AACH,wBAAgB,aAAa,CAAC,GAAG,EAAE,SAAS,EAAE,SAAS,EAAE,YAAY,GAAG,SAAS,CAoBhF;AAED;;;GAGG;AACH,wBAAgB,cAAc,CAAC,GAAG,EAAE,SAAS,EAAE,SAAS,EAAE,YAAY,GAAG,UAAU,CAoBlF;AAED;;;GAGG;AACH,wBAAgB,SAAS,CAAC,GAAG,EAAE,SAAS,GAAG,UAAU,GAAG,SAAS,CAEhE;AAED;;;GAGG;AACH,wBAAgB,gBAAgB,CAAC,QAAQ,EAAE,UAAU,GAAG,YAAY,CAMnE;AAED;;;GAGG;AACH,wBAAgB,kBAAkB,CAAC,GAAG,EAAE,YAAY,GAAG,UAAU,CAEhE"}
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
import { Binary } from '../../binary.js';
|
|
2
|
+
import { type KeyPair, type PrivateKey, type PublicKey, type SymmetricKey } from '../declarations.js';
|
|
3
|
+
/**
|
|
4
|
+
* Get a DOMString representing the algorithm to use for an
|
|
5
|
+
* asymmetric key generation.
|
|
6
|
+
*/
|
|
7
|
+
export declare function rsaOaepSha1(modulusLength?: number): RsaHashedKeyGenParams;
|
|
8
|
+
export declare function rsaPkcs1Sha256(modulusLength?: number): RsaHashedKeyGenParams;
|
|
9
|
+
/**
|
|
10
|
+
* Generate an RSA key pair
|
|
11
|
+
* @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
|
|
12
|
+
* @param size in bits
|
|
13
|
+
*/
|
|
14
|
+
export declare function generateKeyPair(size?: number): Promise<KeyPair>;
|
|
15
|
+
/**
|
|
16
|
+
* Generate an RSA key pair suitable for signatures
|
|
17
|
+
* @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
|
|
18
|
+
*/
|
|
19
|
+
export declare function generateSigningKeyPair(): Promise<KeyPair>;
|
|
20
|
+
/**
|
|
21
|
+
* Encrypt using a public key (RSA-OAEP).
|
|
22
|
+
* Accepts Binary or SymmetricKey for key wrapping.
|
|
23
|
+
* @param payload Payload to encrypt (Binary) or symmetric key to wrap (SymmetricKey)
|
|
24
|
+
* @param publicKey Opaque public key
|
|
25
|
+
* @return Encrypted payload
|
|
26
|
+
*/
|
|
27
|
+
export declare function encryptWithPublicKey(payload: Binary | SymmetricKey, publicKey: PublicKey): Promise<Binary>;
|
|
28
|
+
/**
|
|
29
|
+
* Decrypt a public-key encrypted payload with a private key
|
|
30
|
+
* @param encryptedPayload Payload to decrypt
|
|
31
|
+
* @param privateKey Opaque private key
|
|
32
|
+
* @return Decrypted payload
|
|
33
|
+
*/
|
|
34
|
+
export declare function decryptWithPrivateKey(encryptedPayload: Binary, privateKey: PrivateKey): Promise<Binary>;
|
|
35
|
+
//# sourceMappingURL=rsa.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"rsa.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/rsa.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AACzC,OAAO,EAEL,KAAK,OAAO,EAEZ,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,YAAY,EAClB,MAAM,oBAAoB,CAAC;AAO5B;;;GAGG;AACH,wBAAgB,WAAW,CACzB,aAAa,GAAE,MAAqC,GACnD,qBAAqB,CAavB;AAED,wBAAgB,cAAc,CAC5B,aAAa,GAAE,MAAqC,GACnD,qBAAqB,CAavB;AAED;;;;GAIG;AACH,wBAAsB,eAAe,CAAC,IAAI,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAqBrE;AAED;;;GAGG;AACH,wBAAsB,sBAAsB,IAAI,OAAO,CAAC,OAAO,CAAC,CAS/D;AAED;;;;;;GAMG;AACH,wBAAsB,oBAAoB,CACxC,OAAO,EAAE,MAAM,GAAG,YAAY,EAC9B,SAAS,EAAE,SAAS,GACnB,OAAO,CAAC,MAAM,CAAC,CAejB;AAED;;;;;GAKG;AACH,wBAAsB,qBAAqB,CACzC,gBAAgB,EAAE,MAAM,EACxB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,MAAM,CAAC,CAWjB"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { type AsymmetricSigningAlgorithm, type PrivateKey, type PublicKey } from '../declarations.js';
|
|
2
|
+
/**
|
|
3
|
+
* Sign data with an asymmetric private key.
|
|
4
|
+
*/
|
|
5
|
+
export declare function sign(data: Uint8Array, privateKey: PrivateKey, algorithm: AsymmetricSigningAlgorithm): Promise<Uint8Array>;
|
|
6
|
+
/**
|
|
7
|
+
* Verify signature with an asymmetric public key.
|
|
8
|
+
*/
|
|
9
|
+
export declare function verify(data: Uint8Array, signature: Uint8Array, publicKey: PublicKey, algorithm: AsymmetricSigningAlgorithm): Promise<boolean>;
|
|
10
|
+
//# sourceMappingURL=signing.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"signing.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/signing.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,0BAA0B,EAC/B,KAAK,UAAU,EACf,KAAK,SAAS,EACf,MAAM,oBAAoB,CAAC;AA0K5B;;GAEG;AACH,wBAAsB,IAAI,CACxB,IAAI,EAAE,UAAU,EAChB,UAAU,EAAE,UAAU,EACtB,SAAS,EAAE,0BAA0B,GACpC,OAAO,CAAC,UAAU,CAAC,CAWrB;AAED;;GAEG;AACH,wBAAsB,MAAM,CAC1B,IAAI,EAAE,UAAU,EAChB,SAAS,EAAE,UAAU,EACrB,SAAS,EAAE,SAAS,EACpB,SAAS,EAAE,0BAA0B,GACpC,OAAO,CAAC,OAAO,CAAC,CAWlB"}
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
import { type AlgorithmUrn } from '../../ciphers/algorithms.js';
|
|
2
|
+
import { Binary } from '../../binary.js';
|
|
3
|
+
import { type DecryptResult, type EncryptResult, type HashAlgorithm, type SymmetricKey } from '../declarations.js';
|
|
4
|
+
/**
|
|
5
|
+
* Generate a random symmetric key (opaque).
|
|
6
|
+
* @param length - Key length in bytes (default 32 for AES-256)
|
|
7
|
+
* @return Opaque symmetric key
|
|
8
|
+
*/
|
|
9
|
+
export declare function generateKey(length?: number): Promise<SymmetricKey>;
|
|
10
|
+
export declare function randomBytes(byteLength: number): Promise<Uint8Array>;
|
|
11
|
+
/**
|
|
12
|
+
* Returns a promise to the encryption key as a binary string.
|
|
13
|
+
*
|
|
14
|
+
* Note: This function should almost never fail as it includes a fallback
|
|
15
|
+
* if for some reason the native generate key fails.
|
|
16
|
+
*
|
|
17
|
+
* @param length The key length, defaults to 256
|
|
18
|
+
*
|
|
19
|
+
* @returns The hex string.
|
|
20
|
+
*/
|
|
21
|
+
export declare function randomBytesAsHex(length: number): Promise<string>;
|
|
22
|
+
/**
|
|
23
|
+
* Decrypt content synchronously
|
|
24
|
+
* @param payload The payload to decrypt
|
|
25
|
+
* @param key The symmetric encryption key (opaque)
|
|
26
|
+
* @param iv The initialization vector
|
|
27
|
+
* @param algorithm The algorithm to use for encryption
|
|
28
|
+
* @param authTag The authentication tag for authenticated crypto.
|
|
29
|
+
*/
|
|
30
|
+
export declare function decrypt(payload: Binary, key: SymmetricKey, iv: Binary, algorithm?: AlgorithmUrn, authTag?: Binary): Promise<DecryptResult>;
|
|
31
|
+
/**
|
|
32
|
+
* Encrypt content synchronously
|
|
33
|
+
* @param payload The payload to encrypt
|
|
34
|
+
* @param key The encryption key
|
|
35
|
+
* @param iv The initialization vector
|
|
36
|
+
* @param algorithm The algorithm to use for encryption
|
|
37
|
+
*/
|
|
38
|
+
export declare function encrypt(payload: Binary | SymmetricKey, key: SymmetricKey, iv: Binary, algorithm?: AlgorithmUrn): Promise<EncryptResult>;
|
|
39
|
+
/**
|
|
40
|
+
* Create an ArrayBuffer from a hex string.
|
|
41
|
+
* https://developers.google.com/web/updates/2012/06/How-to-convert-ArrayBuffer-to-and-from-String?hl=en
|
|
42
|
+
* @param hex - Hex string
|
|
43
|
+
*/
|
|
44
|
+
export declare function hex2Ab(hex: string): ArrayBuffer;
|
|
45
|
+
/**
|
|
46
|
+
* Compute hash digest.
|
|
47
|
+
*/
|
|
48
|
+
export declare function digest(algorithm: HashAlgorithm, data: Uint8Array): Promise<Uint8Array>;
|
|
49
|
+
/**
|
|
50
|
+
* Compute HMAC-SHA256 of data with a symmetric key.
|
|
51
|
+
*/
|
|
52
|
+
export declare function hmac(data: Uint8Array, key: SymmetricKey): Promise<Uint8Array>;
|
|
53
|
+
/**
|
|
54
|
+
* Verify HMAC-SHA256.
|
|
55
|
+
* Standalone utility — not part of CryptoService interface.
|
|
56
|
+
*/
|
|
57
|
+
export declare function verifyHmac(data: Uint8Array, signature: Uint8Array, key: SymmetricKey): Promise<boolean>;
|
|
58
|
+
/**
|
|
59
|
+
* Import raw key bytes as an opaque symmetric key.
|
|
60
|
+
* Used for external keys (e.g., unwrapped from KAS).
|
|
61
|
+
*/
|
|
62
|
+
export declare function importSymmetricKey(keyBytes: Uint8Array): Promise<SymmetricKey>;
|
|
63
|
+
/**
|
|
64
|
+
* Merge symmetric key shares back into the original key using XOR.
|
|
65
|
+
* Key bytes are extracted internally for merging.
|
|
66
|
+
*/
|
|
67
|
+
export declare function mergeSymmetricKeys(shares: SymmetricKey[]): Promise<SymmetricKey>;
|
|
68
|
+
//# sourceMappingURL=symmetric.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"symmetric.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/symmetric.ts"],"names":[],"mappings":"AAAA,OAAO,EAAc,KAAK,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC5E,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AACzC,OAAO,EACL,KAAK,aAAa,EAClB,KAAK,aAAa,EAClB,KAAK,aAAa,EAClB,KAAK,YAAY,EAClB,MAAM,oBAAoB,CAAC;AAQ5B;;;;GAIG;AACH,wBAAsB,WAAW,CAAC,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC,CAGxE;AAED,wBAAsB,WAAW,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,UAAU,CAAC,CAIzE;AAED;;;;;;;;;GASG;AACH,wBAAsB,gBAAgB,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAKtE;AAED;;;;;;;GAOG;AACH,wBAAgB,OAAO,CACrB,OAAO,EAAE,MAAM,EACf,GAAG,EAAE,YAAY,EACjB,EAAE,EAAE,MAAM,EACV,SAAS,CAAC,EAAE,YAAY,EACxB,OAAO,CAAC,EAAE,MAAM,GACf,OAAO,CAAC,aAAa,CAAC,CAExB;AAED;;;;;;GAMG;AACH,wBAAgB,OAAO,CACrB,OAAO,EAAE,MAAM,GAAG,YAAY,EAC9B,GAAG,EAAE,YAAY,EACjB,EAAE,EAAE,MAAM,EACV,SAAS,CAAC,EAAE,YAAY,GACvB,OAAO,CAAC,aAAa,CAAC,CAExB;AAsGD;;;;GAIG;AACH,wBAAgB,MAAM,CAAC,GAAG,EAAE,MAAM,GAAG,WAAW,CAS/C;AAED;;GAEG;AACH,wBAAsB,MAAM,CAAC,SAAS,EAAE,aAAa,EAAE,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAQ5F;AAED;;GAEG;AACH,wBAAsB,IAAI,CAAC,IAAI,EAAE,UAAU,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,UAAU,CAAC,CAYnF;AAED;;;GAGG;AACH,wBAAsB,UAAU,CAC9B,IAAI,EAAE,UAAU,EAChB,SAAS,EAAE,UAAU,EACrB,GAAG,EAAE,YAAY,GAChB,OAAO,CAAC,OAAO,CAAC,CAUlB;AAED;;;GAGG;AACH,wBAAsB,kBAAkB,CAAC,QAAQ,EAAE,UAAU,GAAG,OAAO,CAAC,YAAY,CAAC,CAEpF;AAED;;;GAGG;AACH,wBAAsB,kBAAkB,CAAC,MAAM,EAAE,YAAY,EAAE,GAAG,OAAO,CAAC,YAAY,CAAC,CAItF"}
|
|
@@ -3,178 +3,25 @@
|
|
|
3
3
|
*
|
|
4
4
|
* @private
|
|
5
5
|
*/
|
|
6
|
-
import {
|
|
7
|
-
import {
|
|
8
|
-
import {
|
|
6
|
+
import { type CryptoService, type SymmetricKey } from './declarations.js';
|
|
7
|
+
import { decrypt, digest, encrypt, generateKey, hex2Ab, hmac, importSymmetricKey, mergeSymmetricKeys, randomBytes, randomBytesAsHex, verifyHmac } from './core/symmetric.js';
|
|
8
|
+
import { decryptWithPrivateKey, encryptWithPublicKey, generateKeyPair, generateSigningKeyPair, rsaOaepSha1, rsaPkcs1Sha256 } from './core/rsa.js';
|
|
9
|
+
import { deriveKeyFromECDH, generateECKeyPair } from './core/ec.js';
|
|
10
|
+
import { sign, verify } from './core/signing.js';
|
|
11
|
+
import { exportPrivateKeyPem, exportPublicKeyJwk, exportPublicKeyPem, extractPublicKeyPem, importPrivateKey, importPublicKey, jwkToPublicKeyPem, parsePublicKeyPem, publicKeyPemToJwk } from './core/key-format.js';
|
|
9
12
|
export declare const isSupported: boolean;
|
|
10
13
|
export declare const method = "http://www.w3.org/2001/04/xmlenc#aes256-cbc";
|
|
11
14
|
export declare const name = "BrowserNativeCryptoService";
|
|
12
|
-
/**
|
|
13
|
-
* Get a DOMString representing the algorithm to use for an
|
|
14
|
-
* asymmetric key generation.
|
|
15
|
-
*/
|
|
16
|
-
export declare function rsaOaepSha1(modulusLength?: number): RsaHashedKeyGenParams;
|
|
17
|
-
export declare function rsaPkcs1Sha256(modulusLength?: number): RsaHashedKeyGenParams;
|
|
18
|
-
/**
|
|
19
|
-
* Generate a random symmetric key (opaque).
|
|
20
|
-
* @param length - Key length in bytes (default 32 for AES-256)
|
|
21
|
-
* @return Opaque symmetric key
|
|
22
|
-
*/
|
|
23
|
-
export declare function generateKey(length?: number): Promise<SymmetricKey>;
|
|
24
|
-
/**
|
|
25
|
-
* Generate an RSA key pair
|
|
26
|
-
* @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
|
|
27
|
-
* @param size in bits
|
|
28
|
-
*/
|
|
29
|
-
export declare function generateKeyPair(size?: number): Promise<KeyPair>;
|
|
30
|
-
/**
|
|
31
|
-
* Generate an RSA key pair suitable for signatures
|
|
32
|
-
* @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
|
|
33
|
-
*/
|
|
34
|
-
export declare function generateSigningKeyPair(): Promise<KeyPair>;
|
|
35
|
-
/**
|
|
36
|
-
* Encrypt using a public key (RSA-OAEP).
|
|
37
|
-
* Accepts Binary or SymmetricKey for key wrapping.
|
|
38
|
-
* @param payload Payload to encrypt (Binary) or symmetric key to wrap (SymmetricKey)
|
|
39
|
-
* @param publicKey Opaque public key
|
|
40
|
-
* @return Encrypted payload
|
|
41
|
-
*/
|
|
42
|
-
export declare function encryptWithPublicKey(payload: Binary | SymmetricKey, publicKey: PublicKey): Promise<Binary>;
|
|
43
|
-
export declare function randomBytes(byteLength: number): Promise<Uint8Array>;
|
|
44
|
-
/**
|
|
45
|
-
* Returns a promise to the encryption key as a binary string.
|
|
46
|
-
*
|
|
47
|
-
* Note: This function should almost never fail as it includes a fallback
|
|
48
|
-
* if for some reason the native generate key fails.
|
|
49
|
-
*
|
|
50
|
-
* @param length The key length, defaults to 256
|
|
51
|
-
*
|
|
52
|
-
* @returns The hex string.
|
|
53
|
-
*/
|
|
54
|
-
export declare function randomBytesAsHex(length: number): Promise<string>;
|
|
55
|
-
/**
|
|
56
|
-
* Decrypt a public-key encrypted payload with a private key
|
|
57
|
-
* @param encryptedPayload Payload to decrypt
|
|
58
|
-
* @param privateKey Opaque private key
|
|
59
|
-
* @return Decrypted payload
|
|
60
|
-
*/
|
|
61
|
-
export declare function decryptWithPrivateKey(encryptedPayload: Binary, privateKey: PrivateKey): Promise<Binary>;
|
|
62
|
-
/**
|
|
63
|
-
* Decrypt content synchronously
|
|
64
|
-
* @param payload The payload to decrypt
|
|
65
|
-
* @param key The symmetric encryption key (opaque)
|
|
66
|
-
* @param iv The initialization vector
|
|
67
|
-
* @param algorithm The algorithm to use for encryption
|
|
68
|
-
* @param authTag The authentication tag for authenticated crypto.
|
|
69
|
-
*/
|
|
70
|
-
export declare function decrypt(payload: Binary, key: SymmetricKey, iv: Binary, algorithm?: AlgorithmUrn, authTag?: Binary): Promise<DecryptResult>;
|
|
71
|
-
/**
|
|
72
|
-
* Encrypt content synchronously
|
|
73
|
-
* @param payload The payload to encrypt
|
|
74
|
-
* @param key The encryption key
|
|
75
|
-
* @param iv The initialization vector
|
|
76
|
-
* @param algorithm The algorithm to use for encryption
|
|
77
|
-
*/
|
|
78
|
-
export declare function encrypt(payload: Binary | SymmetricKey, key: SymmetricKey, iv: Binary, algorithm?: AlgorithmUrn): Promise<EncryptResult>;
|
|
79
|
-
/**
|
|
80
|
-
* Create a SHA256 hash. Code refrenced from MDN:
|
|
81
|
-
* https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/digest
|
|
82
|
-
* @param content String content
|
|
83
|
-
* @return Hex hash
|
|
84
|
-
*/
|
|
85
|
-
/**
|
|
86
|
-
* Create an ArrayBuffer from a hex string.
|
|
87
|
-
* https://developers.google.com/web/updates/2012/06/How-to-convert-ArrayBuffer-to-and-from-String?hl=en
|
|
88
|
-
* @param hex - Hex string
|
|
89
|
-
*/
|
|
90
|
-
export declare function hex2Ab(hex: string): ArrayBuffer;
|
|
91
|
-
/**
|
|
92
|
-
* Sign data with an asymmetric private key.
|
|
93
|
-
*/
|
|
94
|
-
export declare function sign(data: Uint8Array, privateKey: PrivateKey, algorithm: AsymmetricSigningAlgorithm): Promise<Uint8Array>;
|
|
95
|
-
/**
|
|
96
|
-
* Verify signature with an asymmetric public key.
|
|
97
|
-
*/
|
|
98
|
-
export declare function verify(data: Uint8Array, signature: Uint8Array, publicKey: PublicKey, algorithm: AsymmetricSigningAlgorithm): Promise<boolean>;
|
|
99
|
-
/**
|
|
100
|
-
* Compute hash digest.
|
|
101
|
-
*/
|
|
102
|
-
export declare function digest(algorithm: HashAlgorithm, data: Uint8Array): Promise<Uint8Array>;
|
|
103
|
-
/**
|
|
104
|
-
* Extract PEM public key from X.509 certificate or return PEM key as-is.
|
|
105
|
-
*
|
|
106
|
-
* @param certOrPem - A PEM-encoded X.509 certificate or public key
|
|
107
|
-
* @param jwaAlgorithm - JWA algorithm hint for certificate parsing (RS256, RS512, ES256, ES384, ES512).
|
|
108
|
-
* If not provided for a certificate, will attempt to auto-detect from OIDs.
|
|
109
|
-
*/
|
|
110
|
-
export declare function extractPublicKeyPem(certOrPem: string, jwaAlgorithm?: string): Promise<string>;
|
|
111
|
-
/**
|
|
112
|
-
* Generate an EC key pair for ECDH key agreement.
|
|
113
|
-
*/
|
|
114
|
-
export declare function generateECKeyPair(curve?: ECCurve): Promise<KeyPair>;
|
|
115
|
-
/**
|
|
116
|
-
* Perform ECDH key agreement followed by HKDF key derivation.
|
|
117
|
-
* Returns opaque symmetric key for symmetric encryption.
|
|
118
|
-
*/
|
|
119
|
-
export declare function deriveKeyFromECDH(privateKey: PrivateKey, publicKey: PublicKey, hkdfParams: HkdfParams): Promise<SymmetricKey>;
|
|
120
|
-
/**
|
|
121
|
-
* Compute HMAC-SHA256 of data with a symmetric key.
|
|
122
|
-
*/
|
|
123
|
-
export declare function hmac(data: Uint8Array, key: SymmetricKey): Promise<Uint8Array>;
|
|
124
|
-
/**
|
|
125
|
-
* Verify HMAC-SHA256. Standalone utility — not part of CryptoService interface.
|
|
126
|
-
*/
|
|
127
|
-
export declare function verifyHmac(data: Uint8Array, signature: Uint8Array, key: SymmetricKey): Promise<boolean>;
|
|
128
|
-
/**
|
|
129
|
-
* Import and validate a PEM public key, returning algorithm info.
|
|
130
|
-
* Uses JWK export for robust key parameter detection.
|
|
131
|
-
*/
|
|
132
|
-
export declare function parsePublicKeyPem(pem: string): Promise<PublicKeyInfo>;
|
|
133
|
-
/**
|
|
134
|
-
* Convert a JWK (JSON Web Key) to PEM format.
|
|
135
|
-
*/
|
|
136
|
-
export declare function jwkToPublicKeyPem(jwk: JsonWebKey): Promise<string>;
|
|
137
|
-
/**
|
|
138
|
-
* Convert a PEM public key to JWK format.
|
|
139
|
-
* Returns only public key components (no private key data).
|
|
140
|
-
*/
|
|
141
|
-
export declare function publicKeyPemToJwk(publicKeyPem: string): Promise<JsonWebKey>;
|
|
142
|
-
/**
|
|
143
|
-
* Import a PEM public key as an opaque key.
|
|
144
|
-
*/
|
|
145
|
-
export declare function importPublicKey(pem: string, options: KeyOptions): Promise<PublicKey>;
|
|
146
|
-
/**
|
|
147
|
-
* Import a PEM private key as an opaque key.
|
|
148
|
-
*/
|
|
149
|
-
export declare function importPrivateKey(pem: string, options: KeyOptions): Promise<PrivateKey>;
|
|
150
|
-
/**
|
|
151
|
-
* Export an opaque public key to PEM format.
|
|
152
|
-
*/
|
|
153
|
-
export declare function exportPublicKeyPem(key: PublicKey): Promise<string>;
|
|
154
|
-
/**
|
|
155
|
-
* Export an opaque private key to PEM format.
|
|
156
|
-
* ONLY USE FOR TESTING/DEVELOPMENT. Private keys should NOT be exportable in secure environments.
|
|
157
|
-
*/
|
|
158
|
-
export declare function exportPrivateKeyPem(key: PrivateKey): Promise<string>;
|
|
159
|
-
/**
|
|
160
|
-
* Export an opaque public key to JWK format.
|
|
161
|
-
*/
|
|
162
|
-
export declare function exportPublicKeyJwk(key: PublicKey): Promise<JsonWebKey>;
|
|
163
|
-
/**
|
|
164
|
-
* Import raw key bytes as an opaque symmetric key.
|
|
165
|
-
* Used for external keys (e.g., unwrapped from KAS).
|
|
166
|
-
*/
|
|
167
|
-
export declare function importSymmetricKey(keyBytes: Uint8Array): Promise<SymmetricKey>;
|
|
168
15
|
/**
|
|
169
16
|
* Split a symmetric key into N shares using XOR secret sharing.
|
|
170
17
|
* Key bytes are extracted internally for splitting.
|
|
171
18
|
* HSM implementations cannot extract bytes and should throw ConfigurationError.
|
|
19
|
+
*
|
|
20
|
+
* NOTE: This wrapper lives in index.ts (instead of core/symmetric.ts) because it
|
|
21
|
+
* needs DefaultCryptoService for keySplit() randomness. Moving it to core/symmetric
|
|
22
|
+
* would require importing DefaultCryptoService and create a circular dependency.
|
|
172
23
|
*/
|
|
173
24
|
export declare function splitSymmetricKey(key: SymmetricKey, numShares: number): Promise<SymmetricKey[]>;
|
|
174
|
-
|
|
175
|
-
* Merge symmetric key shares back into the original key using XOR.
|
|
176
|
-
* Key bytes are extracted internally for merging.
|
|
177
|
-
*/
|
|
178
|
-
export declare function mergeSymmetricKeys(shares: SymmetricKey[]): Promise<SymmetricKey>;
|
|
25
|
+
export { decrypt, decryptWithPrivateKey, deriveKeyFromECDH, digest, encrypt, encryptWithPublicKey, exportPrivateKeyPem, exportPublicKeyJwk, exportPublicKeyPem, extractPublicKeyPem, generateECKeyPair, generateKey, generateKeyPair, generateSigningKeyPair, hex2Ab, hmac, importPrivateKey, importPublicKey, importSymmetricKey, jwkToPublicKeyPem, mergeSymmetricKeys, parsePublicKeyPem, publicKeyPemToJwk, randomBytes, randomBytesAsHex, rsaOaepSha1, rsaPkcs1Sha256, sign, verify, verifyHmac, };
|
|
179
26
|
export declare const DefaultCryptoService: CryptoService;
|
|
180
27
|
//# sourceMappingURL=index.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../tdf3/src/crypto/index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../tdf3/src/crypto/index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,KAAK,aAAa,EAAE,KAAK,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAC1E,OAAO,EACL,OAAO,EACP,MAAM,EACN,OAAO,EACP,WAAW,EACX,MAAM,EACN,IAAI,EACJ,kBAAkB,EAClB,kBAAkB,EAClB,WAAW,EACX,gBAAgB,EAChB,UAAU,EACX,MAAM,qBAAqB,CAAC;AAG7B,OAAO,EACL,qBAAqB,EACrB,oBAAoB,EACpB,eAAe,EACf,sBAAsB,EACtB,WAAW,EACX,cAAc,EACf,MAAM,eAAe,CAAC;AACvB,OAAO,EAAE,iBAAiB,EAAE,iBAAiB,EAAE,MAAM,cAAc,CAAC;AACpE,OAAO,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,mBAAmB,CAAC;AACjD,OAAO,EACL,mBAAmB,EACnB,kBAAkB,EAClB,kBAAkB,EAClB,mBAAmB,EACnB,gBAAgB,EAChB,eAAe,EACf,iBAAiB,EACjB,iBAAiB,EACjB,iBAAiB,EAClB,MAAM,sBAAsB,CAAC;AAE9B,eAAO,MAAM,WAAW,SAA4C,CAAC;AACrE,eAAO,MAAM,MAAM,gDAAgD,CAAC;AACpE,eAAO,MAAM,IAAI,+BAA+B,CAAC;AAEjD;;;;;;;;GAQG;AACH,wBAAsB,iBAAiB,CACrC,GAAG,EAAE,YAAY,EACjB,SAAS,EAAE,MAAM,GAChB,OAAO,CAAC,YAAY,EAAE,CAAC,CAIzB;AAED,OAAO,EACL,OAAO,EACP,qBAAqB,EACrB,iBAAiB,EACjB,MAAM,EACN,OAAO,EACP,oBAAoB,EACpB,mBAAmB,EACnB,kBAAkB,EAClB,kBAAkB,EAClB,mBAAmB,EACnB,iBAAiB,EACjB,WAAW,EACX,eAAe,EACf,sBAAsB,EACtB,MAAM,EACN,IAAI,EACJ,gBAAgB,EAChB,eAAe,EACf,kBAAkB,EAClB,iBAAiB,EACjB,kBAAkB,EAClB,iBAAiB,EACjB,iBAAiB,EACjB,WAAW,EACX,gBAAgB,EAChB,WAAW,EACX,cAAc,EACd,IAAI,EACJ,MAAM,EACN,UAAU,GACX,CAAC;AAEF,eAAO,MAAM,oBAAoB,EAAE,aA6BlC,CAAC"}
|
package/dist/web/src/opentdf.js
CHANGED
|
@@ -43,7 +43,7 @@ export class OpenTDF {
|
|
|
43
43
|
this.authProvider = authProvider;
|
|
44
44
|
this.defaultCreateOptions = defaultCreateOptions || {};
|
|
45
45
|
this.defaultReadOptions = defaultReadOptions || {};
|
|
46
|
-
this.dpopEnabled =
|
|
46
|
+
this.dpopEnabled = !disableDPoP;
|
|
47
47
|
if (platformUrl) {
|
|
48
48
|
this.platformUrl = platformUrl;
|
|
49
49
|
}
|
|
@@ -52,16 +52,32 @@ export class OpenTDF {
|
|
|
52
52
|
}
|
|
53
53
|
this.policyEndpoint = policyEndpoint || '';
|
|
54
54
|
this.cryptoService = cryptoService ?? DefaultCryptoService;
|
|
55
|
+
// Use CryptoService for key generation (returns opaque KeyPair)
|
|
56
|
+
this.dpopKeys = dpopKeys ?? this.cryptoService.generateSigningKeyPair();
|
|
55
57
|
this.tdf3Client = new TDF3Client({
|
|
56
58
|
authProvider,
|
|
57
|
-
|
|
59
|
+
dpopEnabled: this.dpopEnabled,
|
|
60
|
+
dpopKeys: this.dpopEnabled ? this.dpopKeys : undefined,
|
|
58
61
|
kasEndpoint: this.platformUrl || 'https://disallow.all.invalid',
|
|
59
62
|
platformUrl,
|
|
60
63
|
policyEndpoint,
|
|
61
64
|
cryptoService: this.cryptoService,
|
|
62
65
|
});
|
|
63
|
-
//
|
|
64
|
-
|
|
66
|
+
// Eagerly bind DPoP keys to the auth provider so PlatformClient
|
|
67
|
+
// can make gRPC calls without waiting for a TDF operation first.
|
|
68
|
+
// Note: TDF3Client.createSessionKeys() also calls updateClientPublicKey
|
|
69
|
+
// with the same keys, but the duplicate call is benign —
|
|
70
|
+
// refreshTokenClaimsWithClientPubkeyIfNeeded short-circuits when
|
|
71
|
+
// the signing key hasn't changed.
|
|
72
|
+
this.ready = this.dpopEnabled
|
|
73
|
+
? this.dpopKeys.then((keys) => authProvider.updateClientPublicKey(keys))
|
|
74
|
+
: Promise.resolve();
|
|
75
|
+
// Prevent unhandled rejection if caller doesn't await ready.
|
|
76
|
+
// The error will still surface via TDF3Client's own key binding
|
|
77
|
+
// when encrypt/decrypt is called.
|
|
78
|
+
this.ready.catch((err) => {
|
|
79
|
+
console.warn('OpenTDF: DPoP key binding failed during initialization:', err);
|
|
80
|
+
});
|
|
65
81
|
}
|
|
66
82
|
/** Creates a new TDF stream. */
|
|
67
83
|
async createTDF(opts) {
|
|
@@ -251,4 +267,4 @@ class ZTDFReader {
|
|
|
251
267
|
return this.requiredObligations ?? { fqns: [] };
|
|
252
268
|
}
|
|
253
269
|
}
|
|
254
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"opentdf.js","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,kBAAkB,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AACnE,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAW,UAAU,EAAE,cAAc,EAAe,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEnE,OAAO,KAAK,oBAAoB,MAAM,6BAA6B,CAAC;AAMpE,OAAO,EAEL,eAAe,EACf,qBAAqB,EACrB,oBAAoB,GACrB,MAAM,aAAa,CAAC;AASrB,OAAO,EACL,iBAAiB,EAEjB,aAAa,GAEd,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAG9C,OAAO,EAWL,oBAAoB,GACrB,CAAC;AAuLF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAM,OAAO,OAAO;IAoBlB,YAAY,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,WAAW,EACX,aAAa,GACE;QACf,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,oBAAoB,GAAG,oBAAoB,IAAI,EAAE,CAAC;QACvD,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,IAAI,EAAE,CAAC;QACnD,IAAI,CAAC,WAAW,GAAG,CAAC,CAAC,WAAW,CAAC;QACjC,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QACjC,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,IAAI,CACV,uHAAuH,CACxH,CAAC;QACJ,CAAC;QACD,IAAI,CAAC,cAAc,GAAG,cAAc,IAAI,EAAE,CAAC;QAC3C,IAAI,CAAC,aAAa,GAAG,aAAa,IAAI,oBAAoB,CAAC;QAC3D,IAAI,CAAC,UAAU,GAAG,IAAI,UAAU,CAAC;YAC/B,YAAY;YACZ,QAAQ;YACR,WAAW,EAAE,IAAI,CAAC,WAAW,IAAI,8BAA8B;YAC/D,WAAW;YACX,cAAc;YACd,aAAa,EAAE,IAAI,CAAC,aAAa;SAClC,CAAC,CAAC;QACH,gEAAgE;QAChE,IAAI,CAAC,QAAQ,GAAG,QAAQ,IAAI,IAAI,CAAC,aAAa,CAAC,sBAAsB,EAAE,CAAC;IAC1E,CAAC;IAED,gCAAgC;IAChC,KAAK,CAAC,SAAS,CAAC,IAAsB;QACpC,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,UAAU,CAAC,IAAuB;QACtC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,oBAAoB,EAAE,GAAG,IAAI,EAAE,CAAC;QACjD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC;YAC9C,MAAM,EAAE,MAAM,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC;YAEzC,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;YACvC,aAAa,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa;YACnC,kBAAkB,EAAE,IAAI,CAAC,kBAAkB;YAC3C,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,KAAK,EAAE;gBACL,UAAU,EAAE,IAAI,CAAC,UAAU;aAC5B;YACD,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;YAC/C,cAAc,EAAE,IAAI,CAAC,cAAc;SACpC,CAAC,CAAC;QACH,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,sDAAsD;IACtD,IAAI,CAAC,IAAiB;QACpB,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,kBAAkB,EAAE,GAAG,IAAI,EAAE,CAAC;QAC/C,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,IAAI,CAAC,IAAiB;QAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC/B,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,8DAA8D;IAC9D,KAAK;QACH,gDAAgD;IAClD,CAAC;CACF;AAED,oDAAoD;AACpD,MAAM,iBAAiB;IAGrB,YACW,KAAc,EACd,IAAiB;QADjB,UAAK,GAAL,KAAK,CAAS;QACd,SAAI,GAAJ,IAAI,CAAa;QAH5B,UAAK,GAAkF,MAAM,CAAC;QAK5F,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACrC,CAAC;IAED,sDAAsD;IACtD,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,MAAM,IAAI,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,WAAW,CAAC;QACzB,MAAM,OAAO,GAAG,MAAM,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QACnC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;YACrD,IAAI,CAAC,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC;QACjD,CAAC;QACD,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;YAC7C,IAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;YACtB,OAAO,IAAI,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACpB,MAAM,IAAI,gBAAgB,CAAC,6CAA6C,MAAM,EAAE,CAAC,CAAC;IACpF,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,OAAO;QACX,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,6CAA6C;IAC7C,KAAK,CAAC,UAAU;QACd,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,UAAU,EAAE,CAAC;IAC7B,CAAC;IAED,2CAA2C;IAC3C,KAAK,CAAC,QAAQ;QACZ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,QAAQ,EAAE,CAAC;IAC3B,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,KAAK;QACT,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,OAAO;QACT,CAAC;QACD,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,iCAAiC;YACjC,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;YACpB,OAAO;QACT,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,SAAS,CAAC;QACvB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,KAAK,EAAE,CAAC,IAAI,CAAC,GAAG,EAAE;YAC9B,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACtB,CAAC,CAAC,CAAC;IACL,CAAC;IAED,KAAK,CAAC,WAAW;QACf,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,WAAW,EAAE,CAAC;IAC9B,CAAC;CACF;AAED,+BAA+B;AAC/B,MAAM,UAAU;IAId,YACW,MAAkB,EAClB,IAAiB,EACjB,MAAe;QAFf,WAAM,GAAN,MAAM,CAAY;QAClB,SAAI,GAAJ,IAAI,CAAa;QACjB,WAAM,GAAN,MAAM,CAAS;QAExB,IAAI,CAAC,QAAQ,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,EACJ,yBAAyB,EACzB,QAAQ,EAAE,kBAAkB,EAC5B,oBAAoB,GACrB,GAAG,IAAI,CAAC,IAAI,CAAC;QAEd,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YAC3F,MAAM,IAAI,kBAAkB,CAAC,2DAA2D,CAAC,CAAC;QAC5F,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC;QAE5C,MAAM,EAAE,YAAY,EAAE,aAAa,EAAE,GAAG,IAAI,CAAC,MAAM,CAAC;QACpD,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,SAAsC,CAAC;QAE3C,IAAI,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,MAAM,IAAI,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;YACvE,SAAS,GAAG,IAAI,eAAe,CAC7B,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,EAAE,EACnC,IAAI,CAAC,IAAI,CAAC,eAAe,CAC1B,CAAC;QACJ,CAAC;aAAM,IAAI,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACjC,SAAS,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,YAAY,CAAC,CAAC;QAC/E,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,MAAM,SAAS,GAAG,MAAM,iBAAiB,CACvC;YACE,SAAS;YACT,YAAY;YACZ,OAAO,EAAE,IAAI,CAAC,MAAM;YACpB,gBAAgB,EAAE,CAAC;YACnB,aAAa;YACb,QAAQ;YACR,uBAAuB,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,uBAAuB;YACzE,aAAa,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC;YAC7B,eAAe,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,eAAe;YACzD,yBAAyB;YACzB,kBAAkB;YAClB,oBAAoB;YACpB,sBAAsB,EAAE,IAAI,CAAC,IAAI,CAAC,yBAAyB,IAAI,EAAE;SAClE,EACD,QAAQ,CACT,CAAC;QACF,IAAI,CAAC,mBAAmB,GAAG;YACzB,IAAI,EAAE,SAAS,CAAC,WAAW,EAAE;SAC9B,CAAC;QACF,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACrD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,KAAK,CAAC,KAAK;QACT,yDAAyD;IAC3D,CAAC;IAED,4CAA4C;IAC5C,KAAK,CAAC,QAAQ;QACZ,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,OAAO,QAAQ,CAAC,QAAQ,CAAC;IAC3B,CAAC;IAED,8CAA8C;IAC9C,KAAK,CAAC,UAAU;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;QACvC,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAW,CAAC;QAChD,OAAO,MAAM,EAAE,IAAI,EAAE,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;IACpE,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,OAAO,IAAI,CAAC,mBAAmB,CAAC;QAClC,CAAC;QACD,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,mBAAmB,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;IAClD,CAAC;CACF"}
|
|
270
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"opentdf.js","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,kBAAkB,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AACnE,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAW,UAAU,EAAE,cAAc,EAAe,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEnE,OAAO,KAAK,oBAAoB,MAAM,6BAA6B,CAAC;AAMpE,OAAO,EAEL,eAAe,EACf,qBAAqB,EACrB,oBAAoB,GACrB,MAAM,aAAa,CAAC;AASrB,OAAO,EACL,iBAAiB,EAEjB,aAAa,GAEd,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAG9C,OAAO,EAWL,oBAAoB,GACrB,CAAC;AAuLF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAM,OAAO,OAAO;IAsBlB,YAAY,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,WAAW,EACX,aAAa,GACE;QACf,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,oBAAoB,GAAG,oBAAoB,IAAI,EAAE,CAAC;QACvD,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,IAAI,EAAE,CAAC;QACnD,IAAI,CAAC,WAAW,GAAG,CAAC,WAAW,CAAC;QAChC,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QACjC,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,IAAI,CACV,uHAAuH,CACxH,CAAC;QACJ,CAAC;QACD,IAAI,CAAC,cAAc,GAAG,cAAc,IAAI,EAAE,CAAC;QAC3C,IAAI,CAAC,aAAa,GAAG,aAAa,IAAI,oBAAoB,CAAC;QAC3D,gEAAgE;QAChE,IAAI,CAAC,QAAQ,GAAG,QAAQ,IAAI,IAAI,CAAC,aAAa,CAAC,sBAAsB,EAAE,CAAC;QACxE,IAAI,CAAC,UAAU,GAAG,IAAI,UAAU,CAAC;YAC/B,YAAY;YACZ,WAAW,EAAE,IAAI,CAAC,WAAW;YAC7B,QAAQ,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS;YACtD,WAAW,EAAE,IAAI,CAAC,WAAW,IAAI,8BAA8B;YAC/D,WAAW;YACX,cAAc;YACd,aAAa,EAAE,IAAI,CAAC,aAAa;SAClC,CAAC,CAAC;QACH,gEAAgE;QAChE,iEAAiE;QACjE,wEAAwE;QACxE,yDAAyD;QACzD,iEAAiE;QACjE,kCAAkC;QAClC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,WAAW;YAC3B,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;YACxE,CAAC,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;QACtB,6DAA6D;QAC7D,gEAAgE;QAChE,kCAAkC;QAClC,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;YACvB,OAAO,CAAC,IAAI,CAAC,yDAAyD,EAAE,GAAG,CAAC,CAAC;QAC/E,CAAC,CAAC,CAAC;IACL,CAAC;IAED,gCAAgC;IAChC,KAAK,CAAC,SAAS,CAAC,IAAsB;QACpC,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,UAAU,CAAC,IAAuB;QACtC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,oBAAoB,EAAE,GAAG,IAAI,EAAE,CAAC;QACjD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC;YAC9C,MAAM,EAAE,MAAM,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC;YAEzC,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;YACvC,aAAa,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa;YACnC,kBAAkB,EAAE,IAAI,CAAC,kBAAkB;YAC3C,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,KAAK,EAAE;gBACL,UAAU,EAAE,IAAI,CAAC,UAAU;aAC5B;YACD,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;YAC/C,cAAc,EAAE,IAAI,CAAC,cAAc;SACpC,CAAC,CAAC;QACH,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,sDAAsD;IACtD,IAAI,CAAC,IAAiB;QACpB,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,kBAAkB,EAAE,GAAG,IAAI,EAAE,CAAC;QAC/C,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,IAAI,CAAC,IAAiB;QAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC/B,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,8DAA8D;IAC9D,KAAK;QACH,gDAAgD;IAClD,CAAC;CACF;AAED,oDAAoD;AACpD,MAAM,iBAAiB;IAGrB,YACW,KAAc,EACd,IAAiB;QADjB,UAAK,GAAL,KAAK,CAAS;QACd,SAAI,GAAJ,IAAI,CAAa;QAH5B,UAAK,GAAkF,MAAM,CAAC;QAK5F,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACrC,CAAC;IAED,sDAAsD;IACtD,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,MAAM,IAAI,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,WAAW,CAAC;QACzB,MAAM,OAAO,GAAG,MAAM,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QACnC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;YACrD,IAAI,CAAC,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC;QACjD,CAAC;QACD,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;YAC7C,IAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;YACtB,OAAO,IAAI,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACpB,MAAM,IAAI,gBAAgB,CAAC,6CAA6C,MAAM,EAAE,CAAC,CAAC;IACpF,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,OAAO;QACX,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,6CAA6C;IAC7C,KAAK,CAAC,UAAU;QACd,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,UAAU,EAAE,CAAC;IAC7B,CAAC;IAED,2CAA2C;IAC3C,KAAK,CAAC,QAAQ;QACZ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,QAAQ,EAAE,CAAC;IAC3B,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,KAAK;QACT,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,OAAO;QACT,CAAC;QACD,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,iCAAiC;YACjC,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;YACpB,OAAO;QACT,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,SAAS,CAAC;QACvB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,KAAK,EAAE,CAAC,IAAI,CAAC,GAAG,EAAE;YAC9B,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACtB,CAAC,CAAC,CAAC;IACL,CAAC;IAED,KAAK,CAAC,WAAW;QACf,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,WAAW,EAAE,CAAC;IAC9B,CAAC;CACF;AAED,+BAA+B;AAC/B,MAAM,UAAU;IAId,YACW,MAAkB,EAClB,IAAiB,EACjB,MAAe;QAFf,WAAM,GAAN,MAAM,CAAY;QAClB,SAAI,GAAJ,IAAI,CAAa;QACjB,WAAM,GAAN,MAAM,CAAS;QAExB,IAAI,CAAC,QAAQ,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,EACJ,yBAAyB,EACzB,QAAQ,EAAE,kBAAkB,EAC5B,oBAAoB,GACrB,GAAG,IAAI,CAAC,IAAI,CAAC;QAEd,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YAC3F,MAAM,IAAI,kBAAkB,CAAC,2DAA2D,CAAC,CAAC;QAC5F,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC;QAE5C,MAAM,EAAE,YAAY,EAAE,aAAa,EAAE,GAAG,IAAI,CAAC,MAAM,CAAC;QACpD,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,SAAsC,CAAC;QAE3C,IAAI,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,MAAM,IAAI,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;YACvE,SAAS,GAAG,IAAI,eAAe,CAC7B,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,EAAE,EACnC,IAAI,CAAC,IAAI,CAAC,eAAe,CAC1B,CAAC;QACJ,CAAC;aAAM,IAAI,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACjC,SAAS,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,YAAY,CAAC,CAAC;QAC/E,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,MAAM,SAAS,GAAG,MAAM,iBAAiB,CACvC;YACE,SAAS;YACT,YAAY;YACZ,OAAO,EAAE,IAAI,CAAC,MAAM;YACpB,gBAAgB,EAAE,CAAC;YACnB,aAAa;YACb,QAAQ;YACR,uBAAuB,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,uBAAuB;YACzE,aAAa,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC;YAC7B,eAAe,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,eAAe;YACzD,yBAAyB;YACzB,kBAAkB;YAClB,oBAAoB;YACpB,sBAAsB,EAAE,IAAI,CAAC,IAAI,CAAC,yBAAyB,IAAI,EAAE;SAClE,EACD,QAAQ,CACT,CAAC;QACF,IAAI,CAAC,mBAAmB,GAAG;YACzB,IAAI,EAAE,SAAS,CAAC,WAAW,EAAE;SAC9B,CAAC;QACF,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACrD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,KAAK,CAAC,KAAK;QACT,yDAAyD;IAC3D,CAAC;IAED,4CAA4C;IAC5C,KAAK,CAAC,QAAQ;QACZ,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,OAAO,QAAQ,CAAC,QAAQ,CAAC;IAC3B,CAAC;IAED,8CAA8C;IAC9C,KAAK,CAAC,UAAU;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;QACvC,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAW,CAAC;QAChD,OAAO,MAAM,EAAE,IAAI,EAAE,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;IACpE,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,OAAO,IAAI,CAAC,mBAAmB,CAAC;QAClC,CAAC;QACD,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,mBAAmB,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;IAClD,CAAC;CACF"}
|