@opentdf/sdk 0.11.0 → 0.12.0-beta.112

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/README.md +17 -16
  2. package/dist/cjs/src/opentdf.js +21 -5
  3. package/dist/cjs/src/platform.js +23 -10
  4. package/dist/cjs/src/version.js +1 -1
  5. package/dist/cjs/tdf3/src/crypto/core/ec.js +88 -0
  6. package/dist/cjs/tdf3/src/crypto/core/key-format.js +359 -0
  7. package/dist/cjs/tdf3/src/crypto/core/keys.js +85 -0
  8. package/dist/cjs/tdf3/src/crypto/core/rsa.js +120 -0
  9. package/dist/cjs/tdf3/src/crypto/core/signing.js +178 -0
  10. package/dist/cjs/tdf3/src/crypto/core/symmetric.js +205 -0
  11. package/dist/cjs/tdf3/src/crypto/index.js +69 -1051
  12. package/dist/types/src/opentdf.d.ts +2 -0
  13. package/dist/types/src/opentdf.d.ts.map +1 -1
  14. package/dist/types/src/version.d.ts +1 -1
  15. package/dist/types/tdf3/src/crypto/core/ec.d.ts +11 -0
  16. package/dist/types/tdf3/src/crypto/core/ec.d.ts.map +1 -0
  17. package/dist/types/tdf3/src/crypto/core/key-format.d.ts +41 -0
  18. package/dist/types/tdf3/src/crypto/core/key-format.d.ts.map +1 -0
  19. package/dist/types/tdf3/src/crypto/core/keys.d.ts +27 -0
  20. package/dist/types/tdf3/src/crypto/core/keys.d.ts.map +1 -0
  21. package/dist/types/tdf3/src/crypto/core/rsa.d.ts +35 -0
  22. package/dist/types/tdf3/src/crypto/core/rsa.d.ts.map +1 -0
  23. package/dist/types/tdf3/src/crypto/core/signing.d.ts +10 -0
  24. package/dist/types/tdf3/src/crypto/core/signing.d.ts.map +1 -0
  25. package/dist/types/tdf3/src/crypto/core/symmetric.d.ts +68 -0
  26. package/dist/types/tdf3/src/crypto/core/symmetric.d.ts.map +1 -0
  27. package/dist/types/tdf3/src/crypto/index.d.ts +11 -164
  28. package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -1
  29. package/dist/web/src/opentdf.js +21 -5
  30. package/dist/web/src/platform.js +23 -10
  31. package/dist/web/src/version.js +1 -1
  32. package/dist/web/tdf3/src/crypto/core/ec.js +84 -0
  33. package/dist/web/tdf3/src/crypto/core/key-format.js +348 -0
  34. package/dist/web/tdf3/src/crypto/core/keys.js +78 -0
  35. package/dist/web/tdf3/src/crypto/core/rsa.js +112 -0
  36. package/dist/web/tdf3/src/crypto/core/signing.js +174 -0
  37. package/dist/web/tdf3/src/crypto/core/symmetric.js +192 -0
  38. package/dist/web/tdf3/src/crypto/index.js +13 -994
  39. package/package.json +1 -1
  40. package/src/opentdf.ts +22 -4
  41. package/src/platform.ts +23 -9
  42. package/src/version.ts +1 -1
  43. package/tdf3/src/crypto/core/ec.ts +118 -0
  44. package/tdf3/src/crypto/core/key-format.ts +420 -0
  45. package/tdf3/src/crypto/core/keys.ts +86 -0
  46. package/tdf3/src/crypto/core/rsa.ts +144 -0
  47. package/tdf3/src/crypto/core/signing.ts +214 -0
  48. package/tdf3/src/crypto/core/symmetric.ts +265 -0
  49. package/tdf3/src/crypto/index.ts +71 -1239
@@ -203,6 +203,8 @@ export declare class OpenTDF {
203
203
  defaultReadOptions: Omit<ReadOptions, 'source'>;
204
204
  /** The DPoP keys for this instance, if any. */
205
205
  readonly dpopKeys: Promise<KeyPair>;
206
+ /** Resolves once DPoP keys have been bound to the auth provider. Await before using PlatformClient. */
207
+ readonly ready: Promise<void>;
206
208
  /** The CryptoService implementation for this instance. */
207
209
  readonly cryptoService: CryptoService;
208
210
  /** The TDF3 client for encrypting and decrypting ZTDF files. */
@@ -1 +1 @@
1
- {"version":3,"file":"opentdf.d.ts","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,YAAY,EAAE,MAAM,qBAAqB,CAAC;AAExD,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAuC,KAAK,MAAM,EAAE,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAE,KAAK,aAAa,EAAE,KAAK,OAAO,EAAE,MAAM,oCAAoC,CAAC;AAEtF,OAAO,EACL,KAAK,SAAS,EACd,eAAe,EACf,yBAAyB,EAC1B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EACL,KAAK,qBAAqB,EAG1B,oBAAoB,EACrB,MAAM,aAAa,CAAC;AACrB,OAAO,EAAE,KAAK,QAAQ,EAAE,MAAM,gCAAgC,CAAC;AAC/D,OAAO,EAAE,KAAK,OAAO,EAAE,MAAM,+BAA+B,CAAC;AAC7D,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,SAAS,EACd,KAAK,qBAAqB,EAC3B,MAAM,8CAA8C,CAAC;AACtD,OAAO,EAAE,KAAK,eAAe,EAAE,MAAM,kCAAkC,CAAC;AACxE,OAAO,EAIL,KAAK,kBAAkB,EACxB,MAAM,oBAAoB,CAAC;AAI5B,OAAO,EACL,KAAK,SAAS,EACd,KAAK,aAAa,EAClB,KAAK,qBAAqB,EAC1B,KAAK,kBAAkB,EACvB,KAAK,qBAAqB,EAC1B,KAAK,eAAe,EACpB,KAAK,QAAQ,EACb,KAAK,OAAO,EACZ,KAAK,OAAO,EACZ,KAAK,SAAS,EACd,oBAAoB,GACrB,CAAC;AAEF,sDAAsD;AACtD,MAAM,MAAM,IAAI,GAAG;IACjB,CAAC,KAAK,EAAE,MAAM,GAAG,SAAS,GAAG,aAAa,CAAC;CAC5C,CAAC;AAEF,8EAA8E;AAC9E,MAAM,MAAM,mBAAmB,GAAG;IAChC,yDAAyD;IACzD,IAAI,EAAE,MAAM,EAAE,CAAC;CAChB,CAAC;AAEF,iFAAiF;AACjF,MAAM,MAAM,aAAa,GAAG;IAC1B,wEAAwE;IACxE,aAAa,CAAC,EAAE,OAAO,CAAC;IAExB,uEAAuE;IACvE,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IAEtB;;;OAGG;IACH,SAAS,CAAC,EAAE,MAAM,CAAC;IAEnB,kFAAkF;IAClF,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAE5B,oEAAoE;IACpE,OAAO,CAAC,EAAE,IAAI,CAAC;IAEf,gCAAgC;IAChC,MAAM,EAAE,MAAM,CAAC;CAChB,CAAC;AAEF,iCAAiC;AACjC,MAAM,MAAM,QAAQ,GAAG,MAAM,CAAC;AAE9B,0CAA0C;AAC1C,MAAM,MAAM,QAAQ,GAAG,GAAG,MAAM,IAAI,MAAM,EAAE,CAAC;AAE7C,6EAA6E;AAC7E,MAAM,MAAM,SAAS,GAAG;IACtB,0DAA0D;IAC1D,GAAG,EAAE,MAAM,CAAC;IACZ;;;OAGG;IACH,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,iBAAiB,GAAG,aAAa,GAAG;IAC9C,wCAAwC;IACxC,gBAAgB,CAAC,EAAE,eAAe,EAAE,CAAC;IAErC,qCAAqC;IACrC,QAAQ,CAAC,EAAE,QAAQ,CAAC;IAEpB,4DAA4D;IAC5D,QAAQ,CAAC,EAAE,QAAQ,CAAC;IAEpB,2EAA2E;IAC3E,SAAS,CAAC,EAAE,SAAS,EAAE,CAAC;IAExB;;;OAGG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB,yDAAyD;IACzD,oBAAoB,CAAC,EAAE,qBAAqB,CAAC;IAE7C,kCAAkC;IAClC,cAAc,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC;CACpC,CAAC;AAEF,kCAAkC;AAClC,MAAM,MAAM,gBAAgB,GAAG,iBAAiB,CAAC;AAEjD,uDAAuD;AACvD,MAAM,MAAM,WAAW,GAAG;IACxB,6BAA6B;IAC7B,MAAM,EAAE,MAAM,CAAC;IACf,wBAAwB;IACxB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,wDAAwD;IACxD,mBAAmB,CAAC,EAAE,MAAM,EAAE,CAAC;IAC/B,iDAAiD;IACjD,eAAe,CAAC,EAAE,OAAO,CAAC;IAC1B,4DAA4D;IAC5D,yBAAyB,CAAC,EAAE,MAAM,EAAE,CAAC;IACrC,wDAAwD;IACxD,yBAAyB,CAAC,EAAE,yBAAyB,CAAC;IACtD,iDAAiD;IACjD,QAAQ,CAAC,EAAE,OAAO,CAAC;IAEnB,gFAAgF;IAChF,gBAAgB,CAAC,EAAE,MAAM,CAAC;IAE1B,iDAAiD;IACjD,oBAAoB,CAAC,EAAE,qBAAqB,CAAC;CAC9C,CAAC;AAEF,8EAA8E;AAC9E,MAAM,MAAM,cAAc,GAAG;IAC3B,+BAA+B;IAC/B,cAAc,CAAC,EAAE,MAAM,CAAC;IAExB,oBAAoB;IACpB,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB,qEAAqE;IACrE,YAAY,EAAE,YAAY,CAAC;IAE3B,oDAAoD;IACpD,oBAAoB,CAAC,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IAErD,oDAAoD;IACpD,kBAAkB,CAAC,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;IAEjD,6CAA6C;IAC7C,WAAW,CAAC,EAAE,OAAO,CAAC;IAEtB;;;;OAIG;IACH,QAAQ,CAAC,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IAE5B;;;;OAIG;IACH,aAAa,CAAC,EAAE,aAAa,CAAC;CAC/B,CAAC;AAEF,mCAAmC;AACnC,MAAM,MAAM,eAAe,GAAG,cAAc,CAAC,UAAU,CAAC,GAAG;IACzD,iFAAiF;IACjF,QAAQ,CAAC,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IAC5B,wBAAwB;IACxB,QAAQ,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;CAC9B,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,SAAS,GAAG;IACtB;;OAEG;IACH,OAAO,EAAE,MAAM,OAAO,CAAC,eAAe,CAAC,CAAC;IACxC;;OAEG;IACH,KAAK,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;IAE3B;;OAEG;IACH,QAAQ,EAAE,MAAM,OAAO,CAAC,QAAQ,CAAC,CAAC;IAElC;;OAEG;IACH,UAAU,EAAE,MAAM,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC;IAEpC;;OAEG;IACH,WAAW,EAAE,MAAM,OAAO,CAAC,mBAAmB,CAAC,CAAC;CACjD,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,qBAAa,OAAO;IAClB,uBAAuB;IACvB,QAAQ,CAAC,WAAW,EAAE,MAAM,CAAC;IAC7B,kCAAkC;IAClC,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,kDAAkD;IAClD,QAAQ,CAAC,YAAY,EAAE,YAAY,CAAC;IACpC,4CAA4C;IAC5C,QAAQ,CAAC,WAAW,EAAE,OAAO,CAAC;IAC9B,gDAAgD;IAChD,oBAAoB,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IACpD,+CAA+C;IAC/C,kBAAkB,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;IAChD,+CAA+C;IAC/C,QAAQ,CAAC,QAAQ,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IACpC,0DAA0D;IAC1D,QAAQ,CAAC,aAAa,EAAE,aAAa,CAAC;IACtC,gEAAgE;IAChE,QAAQ,CAAC,UAAU,EAAE,UAAU,CAAC;gBAEpB,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,WAAW,EACX,aAAa,GACd,EAAE,cAAc;IA0BjB,gCAAgC;IAC1B,SAAS,CAAC,IAAI,EAAE,gBAAgB,GAAG,OAAO,CAAC,eAAe,CAAC;IAIjE;;;OAGG;IACG,UAAU,CAAC,IAAI,EAAE,iBAAiB,GAAG,OAAO,CAAC,eAAe,CAAC;IAwBnE,sDAAsD;IACtD,IAAI,CAAC,IAAI,EAAE,WAAW,GAAG,SAAS;IAKlC,2BAA2B;IACrB,IAAI,CAAC,IAAI,EAAE,WAAW,GAAG,OAAO,CAAC,eAAe,CAAC;IAKvD,8DAA8D;IAC9D,KAAK;CAGN"}
1
+ {"version":3,"file":"opentdf.d.ts","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,YAAY,EAAE,MAAM,qBAAqB,CAAC;AAExD,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAuC,KAAK,MAAM,EAAE,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAE,KAAK,aAAa,EAAE,KAAK,OAAO,EAAE,MAAM,oCAAoC,CAAC;AAEtF,OAAO,EACL,KAAK,SAAS,EACd,eAAe,EACf,yBAAyB,EAC1B,MAAM,2BAA2B,CAAC;AACnC,OAAO,EACL,KAAK,qBAAqB,EAG1B,oBAAoB,EACrB,MAAM,aAAa,CAAC;AACrB,OAAO,EAAE,KAAK,QAAQ,EAAE,MAAM,gCAAgC,CAAC;AAC/D,OAAO,EAAE,KAAK,OAAO,EAAE,MAAM,+BAA+B,CAAC;AAC7D,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,SAAS,EACd,KAAK,qBAAqB,EAC3B,MAAM,8CAA8C,CAAC;AACtD,OAAO,EAAE,KAAK,eAAe,EAAE,MAAM,kCAAkC,CAAC;AACxE,OAAO,EAIL,KAAK,kBAAkB,EACxB,MAAM,oBAAoB,CAAC;AAI5B,OAAO,EACL,KAAK,SAAS,EACd,KAAK,aAAa,EAClB,KAAK,qBAAqB,EAC1B,KAAK,kBAAkB,EACvB,KAAK,qBAAqB,EAC1B,KAAK,eAAe,EACpB,KAAK,QAAQ,EACb,KAAK,OAAO,EACZ,KAAK,OAAO,EACZ,KAAK,SAAS,EACd,oBAAoB,GACrB,CAAC;AAEF,sDAAsD;AACtD,MAAM,MAAM,IAAI,GAAG;IACjB,CAAC,KAAK,EAAE,MAAM,GAAG,SAAS,GAAG,aAAa,CAAC;CAC5C,CAAC;AAEF,8EAA8E;AAC9E,MAAM,MAAM,mBAAmB,GAAG;IAChC,yDAAyD;IACzD,IAAI,EAAE,MAAM,EAAE,CAAC;CAChB,CAAC;AAEF,iFAAiF;AACjF,MAAM,MAAM,aAAa,GAAG;IAC1B,wEAAwE;IACxE,aAAa,CAAC,EAAE,OAAO,CAAC;IAExB,uEAAuE;IACvE,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;IAEtB;;;OAGG;IACH,SAAS,CAAC,EAAE,MAAM,CAAC;IAEnB,kFAAkF;IAClF,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAE5B,oEAAoE;IACpE,OAAO,CAAC,EAAE,IAAI,CAAC;IAEf,gCAAgC;IAChC,MAAM,EAAE,MAAM,CAAC;CAChB,CAAC;AAEF,iCAAiC;AACjC,MAAM,MAAM,QAAQ,GAAG,MAAM,CAAC;AAE9B,0CAA0C;AAC1C,MAAM,MAAM,QAAQ,GAAG,GAAG,MAAM,IAAI,MAAM,EAAE,CAAC;AAE7C,6EAA6E;AAC7E,MAAM,MAAM,SAAS,GAAG;IACtB,0DAA0D;IAC1D,GAAG,EAAE,MAAM,CAAC;IACZ;;;OAGG;IACH,GAAG,CAAC,EAAE,MAAM,CAAC;CACd,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,iBAAiB,GAAG,aAAa,GAAG;IAC9C,wCAAwC;IACxC,gBAAgB,CAAC,EAAE,eAAe,EAAE,CAAC;IAErC,qCAAqC;IACrC,QAAQ,CAAC,EAAE,QAAQ,CAAC;IAEpB,4DAA4D;IAC5D,QAAQ,CAAC,EAAE,QAAQ,CAAC;IAEpB,2EAA2E;IAC3E,SAAS,CAAC,EAAE,SAAS,EAAE,CAAC;IAExB;;;OAGG;IACH,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB,yDAAyD;IACzD,oBAAoB,CAAC,EAAE,qBAAqB,CAAC;IAE7C,kCAAkC;IAClC,cAAc,CAAC,EAAE,OAAO,GAAG,OAAO,CAAC;CACpC,CAAC;AAEF,kCAAkC;AAClC,MAAM,MAAM,gBAAgB,GAAG,iBAAiB,CAAC;AAEjD,uDAAuD;AACvD,MAAM,MAAM,WAAW,GAAG;IACxB,6BAA6B;IAC7B,MAAM,EAAE,MAAM,CAAC;IACf,wBAAwB;IACxB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,wDAAwD;IACxD,mBAAmB,CAAC,EAAE,MAAM,EAAE,CAAC;IAC/B,iDAAiD;IACjD,eAAe,CAAC,EAAE,OAAO,CAAC;IAC1B,4DAA4D;IAC5D,yBAAyB,CAAC,EAAE,MAAM,EAAE,CAAC;IACrC,wDAAwD;IACxD,yBAAyB,CAAC,EAAE,yBAAyB,CAAC;IACtD,iDAAiD;IACjD,QAAQ,CAAC,EAAE,OAAO,CAAC;IAEnB,gFAAgF;IAChF,gBAAgB,CAAC,EAAE,MAAM,CAAC;IAE1B,iDAAiD;IACjD,oBAAoB,CAAC,EAAE,qBAAqB,CAAC;CAC9C,CAAC;AAEF,8EAA8E;AAC9E,MAAM,MAAM,cAAc,GAAG;IAC3B,+BAA+B;IAC/B,cAAc,CAAC,EAAE,MAAM,CAAC;IAExB,oBAAoB;IACpB,WAAW,CAAC,EAAE,MAAM,CAAC;IAErB,qEAAqE;IACrE,YAAY,EAAE,YAAY,CAAC;IAE3B,oDAAoD;IACpD,oBAAoB,CAAC,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IAErD,oDAAoD;IACpD,kBAAkB,CAAC,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;IAEjD,6CAA6C;IAC7C,WAAW,CAAC,EAAE,OAAO,CAAC;IAEtB;;;;OAIG;IACH,QAAQ,CAAC,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IAE5B;;;;OAIG;IACH,aAAa,CAAC,EAAE,aAAa,CAAC;CAC/B,CAAC;AAEF,mCAAmC;AACnC,MAAM,MAAM,eAAe,GAAG,cAAc,CAAC,UAAU,CAAC,GAAG;IACzD,iFAAiF;IACjF,QAAQ,CAAC,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IAC5B,wBAAwB;IACxB,QAAQ,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,CAAC;CAC9B,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,SAAS,GAAG;IACtB;;OAEG;IACH,OAAO,EAAE,MAAM,OAAO,CAAC,eAAe,CAAC,CAAC;IACxC;;OAEG;IACH,KAAK,EAAE,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC;IAE3B;;OAEG;IACH,QAAQ,EAAE,MAAM,OAAO,CAAC,QAAQ,CAAC,CAAC;IAElC;;OAEG;IACH,UAAU,EAAE,MAAM,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC;IAEpC;;OAEG;IACH,WAAW,EAAE,MAAM,OAAO,CAAC,mBAAmB,CAAC,CAAC;CACjD,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,qBAAa,OAAO;IAClB,uBAAuB;IACvB,QAAQ,CAAC,WAAW,EAAE,MAAM,CAAC;IAC7B,kCAAkC;IAClC,QAAQ,CAAC,cAAc,EAAE,MAAM,CAAC;IAChC,kDAAkD;IAClD,QAAQ,CAAC,YAAY,EAAE,YAAY,CAAC;IACpC,4CAA4C;IAC5C,QAAQ,CAAC,WAAW,EAAE,OAAO,CAAC;IAC9B,gDAAgD;IAChD,oBAAoB,EAAE,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IACpD,+CAA+C;IAC/C,kBAAkB,EAAE,IAAI,CAAC,WAAW,EAAE,QAAQ,CAAC,CAAC;IAChD,+CAA+C;IAC/C,QAAQ,CAAC,QAAQ,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;IACpC,uGAAuG;IACvG,QAAQ,CAAC,KAAK,EAAE,OAAO,CAAC,IAAI,CAAC,CAAC;IAC9B,0DAA0D;IAC1D,QAAQ,CAAC,aAAa,EAAE,aAAa,CAAC;IACtC,gEAAgE;IAChE,QAAQ,CAAC,UAAU,EAAE,UAAU,CAAC;gBAEpB,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,WAAW,EACX,aAAa,GACd,EAAE,cAAc;IA0CjB,gCAAgC;IAC1B,SAAS,CAAC,IAAI,EAAE,gBAAgB,GAAG,OAAO,CAAC,eAAe,CAAC;IAIjE;;;OAGG;IACG,UAAU,CAAC,IAAI,EAAE,iBAAiB,GAAG,OAAO,CAAC,eAAe,CAAC;IAwBnE,sDAAsD;IACtD,IAAI,CAAC,IAAI,EAAE,WAAW,GAAG,SAAS;IAKlC,2BAA2B;IACrB,IAAI,CAAC,IAAI,EAAE,WAAW,GAAG,OAAO,CAAC,eAAe,CAAC;IAKvD,8DAA8D;IAC9D,KAAK;CAGN"}
@@ -1,7 +1,7 @@
1
1
  /**
2
2
  * Exposes the released version number of the `@opentdf/sdk` package
3
3
  */
4
- export declare const version = "0.11.0";
4
+ export declare const version = "0.12.0";
5
5
  /**
6
6
  * A string name used to label requests as coming from this library client.
7
7
  */
@@ -0,0 +1,11 @@
1
+ import { type ECCurve, type HkdfParams, type KeyPair, type PrivateKey, type PublicKey, type SymmetricKey } from '../declarations.js';
2
+ /**
3
+ * Generate an EC key pair for ECDH key agreement.
4
+ */
5
+ export declare function generateECKeyPair(curve?: ECCurve): Promise<KeyPair>;
6
+ /**
7
+ * Perform ECDH key agreement followed by HKDF key derivation.
8
+ * Returns opaque symmetric key for symmetric encryption.
9
+ */
10
+ export declare function deriveKeyFromECDH(privateKey: PrivateKey, publicKey: PublicKey, hkdfParams: HkdfParams): Promise<SymmetricKey>;
11
+ //# sourceMappingURL=ec.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"ec.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/ec.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,UAAU,EAEf,KAAK,OAAO,EACZ,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,YAAY,EAClB,MAAM,oBAAoB,CAAC;AAoB5B;;GAEG;AACH,wBAAsB,iBAAiB,CAAC,KAAK,GAAE,OAAiB,GAAG,OAAO,CAAC,OAAO,CAAC,CA4BlF;AAED;;;GAGG;AACH,wBAAsB,iBAAiB,CACrC,UAAU,EAAE,UAAU,EACtB,SAAS,EAAE,SAAS,EACpB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,YAAY,CAAC,CAgDvB"}
@@ -0,0 +1,41 @@
1
+ import { type KeyOptions, type PrivateKey, type PublicKey, type PublicKeyInfo } from '../declarations.js';
2
+ /**
3
+ * Extract PEM public key from X.509 certificate or return PEM key as-is.
4
+ */
5
+ export declare function extractPublicKeyPem(certOrPem: string, jwaAlgorithm?: string): Promise<string>;
6
+ /**
7
+ * Import and validate a PEM public key, returning algorithm info.
8
+ * Uses JWK export for robust key parameter detection.
9
+ */
10
+ export declare function parsePublicKeyPem(pem: string): Promise<PublicKeyInfo>;
11
+ /**
12
+ * Convert a JWK (JSON Web Key) to PEM format.
13
+ */
14
+ export declare function jwkToPublicKeyPem(jwk: JsonWebKey): Promise<string>;
15
+ /**
16
+ * Convert a PEM public key to JWK format.
17
+ * Returns only public key components (no private key data).
18
+ */
19
+ export declare function publicKeyPemToJwk(publicKeyPem: string): Promise<JsonWebKey>;
20
+ /**
21
+ * Import a PEM public key as an opaque key.
22
+ */
23
+ export declare function importPublicKey(pem: string, options: KeyOptions): Promise<PublicKey>;
24
+ /**
25
+ * Import a PEM private key as an opaque key.
26
+ */
27
+ export declare function importPrivateKey(pem: string, options: KeyOptions): Promise<PrivateKey>;
28
+ /**
29
+ * Export an opaque public key to PEM format.
30
+ */
31
+ export declare function exportPublicKeyPem(key: PublicKey): Promise<string>;
32
+ /**
33
+ * Export an opaque private key to PEM format.
34
+ * ONLY USE FOR TESTING/DEVELOPMENT. Private keys should NOT be exportable in secure environments.
35
+ */
36
+ export declare function exportPrivateKeyPem(key: PrivateKey): Promise<string>;
37
+ /**
38
+ * Export an opaque public key to JWK format.
39
+ */
40
+ export declare function exportPublicKeyJwk(key: PublicKey): Promise<JsonWebKey>;
41
+ //# sourceMappingURL=key-format.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"key-format.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/key-format.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,KAAK,UAAU,EAEf,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,aAAa,EACnB,MAAM,oBAAoB,CAAC;AAc5B;;GAEG;AACH,wBAAsB,mBAAmB,CACvC,SAAS,EAAE,MAAM,EACjB,YAAY,CAAC,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,CAqBjB;AAiDD;;;GAGG;AACH,wBAAsB,iBAAiB,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,aAAa,CAAC,CAmD3E;AAED;;GAEG;AACH,wBAAsB,iBAAiB,CAAC,GAAG,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC,CAqBxE;AAED;;;GAGG;AACH,wBAAsB,iBAAiB,CAAC,YAAY,EAAE,MAAM,GAAG,OAAO,CAAC,UAAU,CAAC,CAoCjF;AAED;;GAEG;AACH,wBAAsB,eAAe,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU,GAAG,OAAO,CAAC,SAAS,CAAC,CA6D1F;AAED;;GAEG;AACH,wBAAsB,gBAAgB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAqG5F;AAED;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,CAIxE;AAED;;;GAGG;AACH,wBAAsB,mBAAmB,CAAC,GAAG,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC,CAI1E;AAED;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,UAAU,CAAC,CAG5E"}
@@ -0,0 +1,27 @@
1
+ import { type KeyAlgorithm, type PrivateKey, type PublicKey, type SymmetricKey } from '../declarations.js';
2
+ /**
3
+ * Wrap a CryptoKey as an opaque PublicKey.
4
+ * @internal
5
+ */
6
+ export declare function wrapPublicKey(key: CryptoKey, algorithm: KeyAlgorithm): PublicKey;
7
+ /**
8
+ * Wrap a CryptoKey as an opaque PrivateKey.
9
+ * @internal
10
+ */
11
+ export declare function wrapPrivateKey(key: CryptoKey, algorithm: KeyAlgorithm): PrivateKey;
12
+ /**
13
+ * Unwrap an opaque key to get the internal CryptoKey.
14
+ * @internal
15
+ */
16
+ export declare function unwrapKey(key: PublicKey | PrivateKey): CryptoKey;
17
+ /**
18
+ * Wrap raw key bytes as an opaque SymmetricKey.
19
+ * @internal
20
+ */
21
+ export declare function wrapSymmetricKey(keyBytes: Uint8Array): SymmetricKey;
22
+ /**
23
+ * Unwrap an opaque SymmetricKey to get raw bytes.
24
+ * @internal
25
+ */
26
+ export declare function unwrapSymmetricKey(key: SymmetricKey): Uint8Array;
27
+ //# sourceMappingURL=keys.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"keys.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/keys.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,YAAY,EACjB,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,YAAY,EAClB,MAAM,oBAAoB,CAAC;AAE5B;;;GAGG;AACH,wBAAgB,aAAa,CAAC,GAAG,EAAE,SAAS,EAAE,SAAS,EAAE,YAAY,GAAG,SAAS,CAoBhF;AAED;;;GAGG;AACH,wBAAgB,cAAc,CAAC,GAAG,EAAE,SAAS,EAAE,SAAS,EAAE,YAAY,GAAG,UAAU,CAoBlF;AAED;;;GAGG;AACH,wBAAgB,SAAS,CAAC,GAAG,EAAE,SAAS,GAAG,UAAU,GAAG,SAAS,CAEhE;AAED;;;GAGG;AACH,wBAAgB,gBAAgB,CAAC,QAAQ,EAAE,UAAU,GAAG,YAAY,CAMnE;AAED;;;GAGG;AACH,wBAAgB,kBAAkB,CAAC,GAAG,EAAE,YAAY,GAAG,UAAU,CAEhE"}
@@ -0,0 +1,35 @@
1
+ import { Binary } from '../../binary.js';
2
+ import { type KeyPair, type PrivateKey, type PublicKey, type SymmetricKey } from '../declarations.js';
3
+ /**
4
+ * Get a DOMString representing the algorithm to use for an
5
+ * asymmetric key generation.
6
+ */
7
+ export declare function rsaOaepSha1(modulusLength?: number): RsaHashedKeyGenParams;
8
+ export declare function rsaPkcs1Sha256(modulusLength?: number): RsaHashedKeyGenParams;
9
+ /**
10
+ * Generate an RSA key pair
11
+ * @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
12
+ * @param size in bits
13
+ */
14
+ export declare function generateKeyPair(size?: number): Promise<KeyPair>;
15
+ /**
16
+ * Generate an RSA key pair suitable for signatures
17
+ * @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
18
+ */
19
+ export declare function generateSigningKeyPair(): Promise<KeyPair>;
20
+ /**
21
+ * Encrypt using a public key (RSA-OAEP).
22
+ * Accepts Binary or SymmetricKey for key wrapping.
23
+ * @param payload Payload to encrypt (Binary) or symmetric key to wrap (SymmetricKey)
24
+ * @param publicKey Opaque public key
25
+ * @return Encrypted payload
26
+ */
27
+ export declare function encryptWithPublicKey(payload: Binary | SymmetricKey, publicKey: PublicKey): Promise<Binary>;
28
+ /**
29
+ * Decrypt a public-key encrypted payload with a private key
30
+ * @param encryptedPayload Payload to decrypt
31
+ * @param privateKey Opaque private key
32
+ * @return Decrypted payload
33
+ */
34
+ export declare function decryptWithPrivateKey(encryptedPayload: Binary, privateKey: PrivateKey): Promise<Binary>;
35
+ //# sourceMappingURL=rsa.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"rsa.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/rsa.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AACzC,OAAO,EAEL,KAAK,OAAO,EAEZ,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,YAAY,EAClB,MAAM,oBAAoB,CAAC;AAO5B;;;GAGG;AACH,wBAAgB,WAAW,CACzB,aAAa,GAAE,MAAqC,GACnD,qBAAqB,CAavB;AAED,wBAAgB,cAAc,CAC5B,aAAa,GAAE,MAAqC,GACnD,qBAAqB,CAavB;AAED;;;;GAIG;AACH,wBAAsB,eAAe,CAAC,IAAI,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAqBrE;AAED;;;GAGG;AACH,wBAAsB,sBAAsB,IAAI,OAAO,CAAC,OAAO,CAAC,CAS/D;AAED;;;;;;GAMG;AACH,wBAAsB,oBAAoB,CACxC,OAAO,EAAE,MAAM,GAAG,YAAY,EAC9B,SAAS,EAAE,SAAS,GACnB,OAAO,CAAC,MAAM,CAAC,CAejB;AAED;;;;;GAKG;AACH,wBAAsB,qBAAqB,CACzC,gBAAgB,EAAE,MAAM,EACxB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,MAAM,CAAC,CAWjB"}
@@ -0,0 +1,10 @@
1
+ import { type AsymmetricSigningAlgorithm, type PrivateKey, type PublicKey } from '../declarations.js';
2
+ /**
3
+ * Sign data with an asymmetric private key.
4
+ */
5
+ export declare function sign(data: Uint8Array, privateKey: PrivateKey, algorithm: AsymmetricSigningAlgorithm): Promise<Uint8Array>;
6
+ /**
7
+ * Verify signature with an asymmetric public key.
8
+ */
9
+ export declare function verify(data: Uint8Array, signature: Uint8Array, publicKey: PublicKey, algorithm: AsymmetricSigningAlgorithm): Promise<boolean>;
10
+ //# sourceMappingURL=signing.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"signing.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/signing.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,0BAA0B,EAC/B,KAAK,UAAU,EACf,KAAK,SAAS,EACf,MAAM,oBAAoB,CAAC;AA0K5B;;GAEG;AACH,wBAAsB,IAAI,CACxB,IAAI,EAAE,UAAU,EAChB,UAAU,EAAE,UAAU,EACtB,SAAS,EAAE,0BAA0B,GACpC,OAAO,CAAC,UAAU,CAAC,CAWrB;AAED;;GAEG;AACH,wBAAsB,MAAM,CAC1B,IAAI,EAAE,UAAU,EAChB,SAAS,EAAE,UAAU,EACrB,SAAS,EAAE,SAAS,EACpB,SAAS,EAAE,0BAA0B,GACpC,OAAO,CAAC,OAAO,CAAC,CAWlB"}
@@ -0,0 +1,68 @@
1
+ import { type AlgorithmUrn } from '../../ciphers/algorithms.js';
2
+ import { Binary } from '../../binary.js';
3
+ import { type DecryptResult, type EncryptResult, type HashAlgorithm, type SymmetricKey } from '../declarations.js';
4
+ /**
5
+ * Generate a random symmetric key (opaque).
6
+ * @param length - Key length in bytes (default 32 for AES-256)
7
+ * @return Opaque symmetric key
8
+ */
9
+ export declare function generateKey(length?: number): Promise<SymmetricKey>;
10
+ export declare function randomBytes(byteLength: number): Promise<Uint8Array>;
11
+ /**
12
+ * Returns a promise to the encryption key as a binary string.
13
+ *
14
+ * Note: This function should almost never fail as it includes a fallback
15
+ * if for some reason the native generate key fails.
16
+ *
17
+ * @param length The key length, defaults to 256
18
+ *
19
+ * @returns The hex string.
20
+ */
21
+ export declare function randomBytesAsHex(length: number): Promise<string>;
22
+ /**
23
+ * Decrypt content synchronously
24
+ * @param payload The payload to decrypt
25
+ * @param key The symmetric encryption key (opaque)
26
+ * @param iv The initialization vector
27
+ * @param algorithm The algorithm to use for encryption
28
+ * @param authTag The authentication tag for authenticated crypto.
29
+ */
30
+ export declare function decrypt(payload: Binary, key: SymmetricKey, iv: Binary, algorithm?: AlgorithmUrn, authTag?: Binary): Promise<DecryptResult>;
31
+ /**
32
+ * Encrypt content synchronously
33
+ * @param payload The payload to encrypt
34
+ * @param key The encryption key
35
+ * @param iv The initialization vector
36
+ * @param algorithm The algorithm to use for encryption
37
+ */
38
+ export declare function encrypt(payload: Binary | SymmetricKey, key: SymmetricKey, iv: Binary, algorithm?: AlgorithmUrn): Promise<EncryptResult>;
39
+ /**
40
+ * Create an ArrayBuffer from a hex string.
41
+ * https://developers.google.com/web/updates/2012/06/How-to-convert-ArrayBuffer-to-and-from-String?hl=en
42
+ * @param hex - Hex string
43
+ */
44
+ export declare function hex2Ab(hex: string): ArrayBuffer;
45
+ /**
46
+ * Compute hash digest.
47
+ */
48
+ export declare function digest(algorithm: HashAlgorithm, data: Uint8Array): Promise<Uint8Array>;
49
+ /**
50
+ * Compute HMAC-SHA256 of data with a symmetric key.
51
+ */
52
+ export declare function hmac(data: Uint8Array, key: SymmetricKey): Promise<Uint8Array>;
53
+ /**
54
+ * Verify HMAC-SHA256.
55
+ * Standalone utility — not part of CryptoService interface.
56
+ */
57
+ export declare function verifyHmac(data: Uint8Array, signature: Uint8Array, key: SymmetricKey): Promise<boolean>;
58
+ /**
59
+ * Import raw key bytes as an opaque symmetric key.
60
+ * Used for external keys (e.g., unwrapped from KAS).
61
+ */
62
+ export declare function importSymmetricKey(keyBytes: Uint8Array): Promise<SymmetricKey>;
63
+ /**
64
+ * Merge symmetric key shares back into the original key using XOR.
65
+ * Key bytes are extracted internally for merging.
66
+ */
67
+ export declare function mergeSymmetricKeys(shares: SymmetricKey[]): Promise<SymmetricKey>;
68
+ //# sourceMappingURL=symmetric.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"symmetric.d.ts","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/symmetric.ts"],"names":[],"mappings":"AAAA,OAAO,EAAc,KAAK,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC5E,OAAO,EAAE,MAAM,EAAE,MAAM,iBAAiB,CAAC;AACzC,OAAO,EACL,KAAK,aAAa,EAClB,KAAK,aAAa,EAClB,KAAK,aAAa,EAClB,KAAK,YAAY,EAClB,MAAM,oBAAoB,CAAC;AAQ5B;;;;GAIG;AACH,wBAAsB,WAAW,CAAC,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC,CAGxE;AAED,wBAAsB,WAAW,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,UAAU,CAAC,CAIzE;AAED;;;;;;;;;GASG;AACH,wBAAsB,gBAAgB,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAKtE;AAED;;;;;;;GAOG;AACH,wBAAgB,OAAO,CACrB,OAAO,EAAE,MAAM,EACf,GAAG,EAAE,YAAY,EACjB,EAAE,EAAE,MAAM,EACV,SAAS,CAAC,EAAE,YAAY,EACxB,OAAO,CAAC,EAAE,MAAM,GACf,OAAO,CAAC,aAAa,CAAC,CAExB;AAED;;;;;;GAMG;AACH,wBAAgB,OAAO,CACrB,OAAO,EAAE,MAAM,GAAG,YAAY,EAC9B,GAAG,EAAE,YAAY,EACjB,EAAE,EAAE,MAAM,EACV,SAAS,CAAC,EAAE,YAAY,GACvB,OAAO,CAAC,aAAa,CAAC,CAExB;AAsGD;;;;GAIG;AACH,wBAAgB,MAAM,CAAC,GAAG,EAAE,MAAM,GAAG,WAAW,CAS/C;AAED;;GAEG;AACH,wBAAsB,MAAM,CAAC,SAAS,EAAE,aAAa,EAAE,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAQ5F;AAED;;GAEG;AACH,wBAAsB,IAAI,CAAC,IAAI,EAAE,UAAU,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,UAAU,CAAC,CAYnF;AAED;;;GAGG;AACH,wBAAsB,UAAU,CAC9B,IAAI,EAAE,UAAU,EAChB,SAAS,EAAE,UAAU,EACrB,GAAG,EAAE,YAAY,GAChB,OAAO,CAAC,OAAO,CAAC,CAUlB;AAED;;;GAGG;AACH,wBAAsB,kBAAkB,CAAC,QAAQ,EAAE,UAAU,GAAG,OAAO,CAAC,YAAY,CAAC,CAEpF;AAED;;;GAGG;AACH,wBAAsB,kBAAkB,CAAC,MAAM,EAAE,YAAY,EAAE,GAAG,OAAO,CAAC,YAAY,CAAC,CAItF"}
@@ -3,178 +3,25 @@
3
3
  *
4
4
  * @private
5
5
  */
6
- import { Binary } from '../binary.js';
7
- import { type AsymmetricSigningAlgorithm, type CryptoService, type DecryptResult, type ECCurve, type EncryptResult, type HashAlgorithm, type HkdfParams, type KeyOptions, type KeyPair, type PrivateKey, type PublicKey, type PublicKeyInfo, type SymmetricKey } from './declarations.js';
8
- import { AlgorithmUrn } from '../ciphers/algorithms.js';
6
+ import { type CryptoService, type SymmetricKey } from './declarations.js';
7
+ import { decrypt, digest, encrypt, generateKey, hex2Ab, hmac, importSymmetricKey, mergeSymmetricKeys, randomBytes, randomBytesAsHex, verifyHmac } from './core/symmetric.js';
8
+ import { decryptWithPrivateKey, encryptWithPublicKey, generateKeyPair, generateSigningKeyPair, rsaOaepSha1, rsaPkcs1Sha256 } from './core/rsa.js';
9
+ import { deriveKeyFromECDH, generateECKeyPair } from './core/ec.js';
10
+ import { sign, verify } from './core/signing.js';
11
+ import { exportPrivateKeyPem, exportPublicKeyJwk, exportPublicKeyPem, extractPublicKeyPem, importPrivateKey, importPublicKey, jwkToPublicKeyPem, parsePublicKeyPem, publicKeyPemToJwk } from './core/key-format.js';
9
12
  export declare const isSupported: boolean;
10
13
  export declare const method = "http://www.w3.org/2001/04/xmlenc#aes256-cbc";
11
14
  export declare const name = "BrowserNativeCryptoService";
12
- /**
13
- * Get a DOMString representing the algorithm to use for an
14
- * asymmetric key generation.
15
- */
16
- export declare function rsaOaepSha1(modulusLength?: number): RsaHashedKeyGenParams;
17
- export declare function rsaPkcs1Sha256(modulusLength?: number): RsaHashedKeyGenParams;
18
- /**
19
- * Generate a random symmetric key (opaque).
20
- * @param length - Key length in bytes (default 32 for AES-256)
21
- * @return Opaque symmetric key
22
- */
23
- export declare function generateKey(length?: number): Promise<SymmetricKey>;
24
- /**
25
- * Generate an RSA key pair
26
- * @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
27
- * @param size in bits
28
- */
29
- export declare function generateKeyPair(size?: number): Promise<KeyPair>;
30
- /**
31
- * Generate an RSA key pair suitable for signatures
32
- * @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
33
- */
34
- export declare function generateSigningKeyPair(): Promise<KeyPair>;
35
- /**
36
- * Encrypt using a public key (RSA-OAEP).
37
- * Accepts Binary or SymmetricKey for key wrapping.
38
- * @param payload Payload to encrypt (Binary) or symmetric key to wrap (SymmetricKey)
39
- * @param publicKey Opaque public key
40
- * @return Encrypted payload
41
- */
42
- export declare function encryptWithPublicKey(payload: Binary | SymmetricKey, publicKey: PublicKey): Promise<Binary>;
43
- export declare function randomBytes(byteLength: number): Promise<Uint8Array>;
44
- /**
45
- * Returns a promise to the encryption key as a binary string.
46
- *
47
- * Note: This function should almost never fail as it includes a fallback
48
- * if for some reason the native generate key fails.
49
- *
50
- * @param length The key length, defaults to 256
51
- *
52
- * @returns The hex string.
53
- */
54
- export declare function randomBytesAsHex(length: number): Promise<string>;
55
- /**
56
- * Decrypt a public-key encrypted payload with a private key
57
- * @param encryptedPayload Payload to decrypt
58
- * @param privateKey Opaque private key
59
- * @return Decrypted payload
60
- */
61
- export declare function decryptWithPrivateKey(encryptedPayload: Binary, privateKey: PrivateKey): Promise<Binary>;
62
- /**
63
- * Decrypt content synchronously
64
- * @param payload The payload to decrypt
65
- * @param key The symmetric encryption key (opaque)
66
- * @param iv The initialization vector
67
- * @param algorithm The algorithm to use for encryption
68
- * @param authTag The authentication tag for authenticated crypto.
69
- */
70
- export declare function decrypt(payload: Binary, key: SymmetricKey, iv: Binary, algorithm?: AlgorithmUrn, authTag?: Binary): Promise<DecryptResult>;
71
- /**
72
- * Encrypt content synchronously
73
- * @param payload The payload to encrypt
74
- * @param key The encryption key
75
- * @param iv The initialization vector
76
- * @param algorithm The algorithm to use for encryption
77
- */
78
- export declare function encrypt(payload: Binary | SymmetricKey, key: SymmetricKey, iv: Binary, algorithm?: AlgorithmUrn): Promise<EncryptResult>;
79
- /**
80
- * Create a SHA256 hash. Code refrenced from MDN:
81
- * https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/digest
82
- * @param content String content
83
- * @return Hex hash
84
- */
85
- /**
86
- * Create an ArrayBuffer from a hex string.
87
- * https://developers.google.com/web/updates/2012/06/How-to-convert-ArrayBuffer-to-and-from-String?hl=en
88
- * @param hex - Hex string
89
- */
90
- export declare function hex2Ab(hex: string): ArrayBuffer;
91
- /**
92
- * Sign data with an asymmetric private key.
93
- */
94
- export declare function sign(data: Uint8Array, privateKey: PrivateKey, algorithm: AsymmetricSigningAlgorithm): Promise<Uint8Array>;
95
- /**
96
- * Verify signature with an asymmetric public key.
97
- */
98
- export declare function verify(data: Uint8Array, signature: Uint8Array, publicKey: PublicKey, algorithm: AsymmetricSigningAlgorithm): Promise<boolean>;
99
- /**
100
- * Compute hash digest.
101
- */
102
- export declare function digest(algorithm: HashAlgorithm, data: Uint8Array): Promise<Uint8Array>;
103
- /**
104
- * Extract PEM public key from X.509 certificate or return PEM key as-is.
105
- *
106
- * @param certOrPem - A PEM-encoded X.509 certificate or public key
107
- * @param jwaAlgorithm - JWA algorithm hint for certificate parsing (RS256, RS512, ES256, ES384, ES512).
108
- * If not provided for a certificate, will attempt to auto-detect from OIDs.
109
- */
110
- export declare function extractPublicKeyPem(certOrPem: string, jwaAlgorithm?: string): Promise<string>;
111
- /**
112
- * Generate an EC key pair for ECDH key agreement.
113
- */
114
- export declare function generateECKeyPair(curve?: ECCurve): Promise<KeyPair>;
115
- /**
116
- * Perform ECDH key agreement followed by HKDF key derivation.
117
- * Returns opaque symmetric key for symmetric encryption.
118
- */
119
- export declare function deriveKeyFromECDH(privateKey: PrivateKey, publicKey: PublicKey, hkdfParams: HkdfParams): Promise<SymmetricKey>;
120
- /**
121
- * Compute HMAC-SHA256 of data with a symmetric key.
122
- */
123
- export declare function hmac(data: Uint8Array, key: SymmetricKey): Promise<Uint8Array>;
124
- /**
125
- * Verify HMAC-SHA256. Standalone utility — not part of CryptoService interface.
126
- */
127
- export declare function verifyHmac(data: Uint8Array, signature: Uint8Array, key: SymmetricKey): Promise<boolean>;
128
- /**
129
- * Import and validate a PEM public key, returning algorithm info.
130
- * Uses JWK export for robust key parameter detection.
131
- */
132
- export declare function parsePublicKeyPem(pem: string): Promise<PublicKeyInfo>;
133
- /**
134
- * Convert a JWK (JSON Web Key) to PEM format.
135
- */
136
- export declare function jwkToPublicKeyPem(jwk: JsonWebKey): Promise<string>;
137
- /**
138
- * Convert a PEM public key to JWK format.
139
- * Returns only public key components (no private key data).
140
- */
141
- export declare function publicKeyPemToJwk(publicKeyPem: string): Promise<JsonWebKey>;
142
- /**
143
- * Import a PEM public key as an opaque key.
144
- */
145
- export declare function importPublicKey(pem: string, options: KeyOptions): Promise<PublicKey>;
146
- /**
147
- * Import a PEM private key as an opaque key.
148
- */
149
- export declare function importPrivateKey(pem: string, options: KeyOptions): Promise<PrivateKey>;
150
- /**
151
- * Export an opaque public key to PEM format.
152
- */
153
- export declare function exportPublicKeyPem(key: PublicKey): Promise<string>;
154
- /**
155
- * Export an opaque private key to PEM format.
156
- * ONLY USE FOR TESTING/DEVELOPMENT. Private keys should NOT be exportable in secure environments.
157
- */
158
- export declare function exportPrivateKeyPem(key: PrivateKey): Promise<string>;
159
- /**
160
- * Export an opaque public key to JWK format.
161
- */
162
- export declare function exportPublicKeyJwk(key: PublicKey): Promise<JsonWebKey>;
163
- /**
164
- * Import raw key bytes as an opaque symmetric key.
165
- * Used for external keys (e.g., unwrapped from KAS).
166
- */
167
- export declare function importSymmetricKey(keyBytes: Uint8Array): Promise<SymmetricKey>;
168
15
  /**
169
16
  * Split a symmetric key into N shares using XOR secret sharing.
170
17
  * Key bytes are extracted internally for splitting.
171
18
  * HSM implementations cannot extract bytes and should throw ConfigurationError.
19
+ *
20
+ * NOTE: This wrapper lives in index.ts (instead of core/symmetric.ts) because it
21
+ * needs DefaultCryptoService for keySplit() randomness. Moving it to core/symmetric
22
+ * would require importing DefaultCryptoService and create a circular dependency.
172
23
  */
173
24
  export declare function splitSymmetricKey(key: SymmetricKey, numShares: number): Promise<SymmetricKey[]>;
174
- /**
175
- * Merge symmetric key shares back into the original key using XOR.
176
- * Key bytes are extracted internally for merging.
177
- */
178
- export declare function mergeSymmetricKeys(shares: SymmetricKey[]): Promise<SymmetricKey>;
25
+ export { decrypt, decryptWithPrivateKey, deriveKeyFromECDH, digest, encrypt, encryptWithPublicKey, exportPrivateKeyPem, exportPublicKeyJwk, exportPublicKeyPem, extractPublicKeyPem, generateECKeyPair, generateKey, generateKeyPair, generateSigningKeyPair, hex2Ab, hmac, importPrivateKey, importPublicKey, importSymmetricKey, jwkToPublicKeyPem, mergeSymmetricKeys, parsePublicKeyPem, publicKeyPemToJwk, randomBytes, randomBytesAsHex, rsaOaepSha1, rsaPkcs1Sha256, sign, verify, verifyHmac, };
179
26
  export declare const DefaultCryptoService: CryptoService;
180
27
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../tdf3/src/crypto/index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAGH,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EACL,KAAK,0BAA0B,EAC/B,KAAK,aAAa,EAClB,KAAK,aAAa,EAClB,KAAK,OAAO,EACZ,KAAK,aAAa,EAClB,KAAK,aAAa,EAClB,KAAK,UAAU,EAEf,KAAK,UAAU,EACf,KAAK,OAAO,EAEZ,KAAK,UAAU,EACf,KAAK,SAAS,EACd,KAAK,aAAa,EAClB,KAAK,YAAY,EAClB,MAAM,mBAAmB,CAAC;AAK3B,OAAO,EAAE,YAAY,EAAE,MAAM,0BAA0B,CAAC;AAYxD,eAAO,MAAM,WAAW,SAA4C,CAAC;AAErE,eAAO,MAAM,MAAM,gDAAgD,CAAC;AACpE,eAAO,MAAM,IAAI,+BAA+B,CAAC;AAEjD;;;GAGG;AACH,wBAAgB,WAAW,CACzB,aAAa,GAAE,MAAqC,GACnD,qBAAqB,CAYvB;AAED,wBAAgB,cAAc,CAC5B,aAAa,GAAE,MAAqC,GACnD,qBAAqB,CAYvB;AAED;;;;GAIG;AACH,wBAAsB,WAAW,CAAC,MAAM,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC,CAGxE;AAsFD;;;;GAIG;AACH,wBAAsB,eAAe,CAAC,IAAI,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAqBrE;AAED;;;GAGG;AACH,wBAAsB,sBAAsB,IAAI,OAAO,CAAC,OAAO,CAAC,CAS/D;AAED;;;;;;GAMG;AACH,wBAAsB,oBAAoB,CACxC,OAAO,EAAE,MAAM,GAAG,YAAY,EAC9B,SAAS,EAAE,SAAS,GACnB,OAAO,CAAC,MAAM,CAAC,CAejB;AAED,wBAAsB,WAAW,CAAC,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,UAAU,CAAC,CAIzE;AAED;;;;;;;;;GASG;AACH,wBAAsB,gBAAgB,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAKtE;AAED;;;;;GAKG;AACH,wBAAsB,qBAAqB,CACzC,gBAAgB,EAAE,MAAM,EACxB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,MAAM,CAAC,CAWjB;AAED;;;;;;;GAOG;AACH,wBAAgB,OAAO,CACrB,OAAO,EAAE,MAAM,EACf,GAAG,EAAE,YAAY,EACjB,EAAE,EAAE,MAAM,EACV,SAAS,CAAC,EAAE,YAAY,EACxB,OAAO,CAAC,EAAE,MAAM,GACf,OAAO,CAAC,aAAa,CAAC,CAExB;AAED;;;;;;GAMG;AACH,wBAAgB,OAAO,CACrB,OAAO,EAAE,MAAM,GAAG,YAAY,EAC9B,GAAG,EAAE,YAAY,EACjB,EAAE,EAAE,MAAM,EACV,SAAS,CAAC,EAAE,YAAY,GACvB,OAAO,CAAC,aAAa,CAAC,CAExB;AA0GD;;;;;GAKG;AAEH;;;;GAIG;AACH,wBAAgB,MAAM,CAAC,GAAG,EAAE,MAAM,GAAG,WAAW,CAS/C;AAyKD;;GAEG;AACH,wBAAsB,IAAI,CACxB,IAAI,EAAE,UAAU,EAChB,UAAU,EAAE,UAAU,EACtB,SAAS,EAAE,0BAA0B,GACpC,OAAO,CAAC,UAAU,CAAC,CAWrB;AAED;;GAEG;AACH,wBAAsB,MAAM,CAC1B,IAAI,EAAE,UAAU,EAChB,SAAS,EAAE,UAAU,EACrB,SAAS,EAAE,SAAS,EACpB,SAAS,EAAE,0BAA0B,GACpC,OAAO,CAAC,OAAO,CAAC,CAWlB;AAED;;GAEG;AACH,wBAAsB,MAAM,CAAC,SAAS,EAAE,aAAa,EAAE,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAS5F;AAED;;;;;;GAMG;AACH,wBAAsB,mBAAmB,CACvC,SAAS,EAAE,MAAM,EACjB,YAAY,CAAC,EAAE,MAAM,GACpB,OAAO,CAAC,MAAM,CAAC,CAqBjB;AAkBD;;GAEG;AACH,wBAAsB,iBAAiB,CAAC,KAAK,GAAE,OAAiB,GAAG,OAAO,CAAC,OAAO,CAAC,CA4BlF;AAiCD;;;GAGG;AACH,wBAAsB,iBAAiB,CACrC,UAAU,EAAE,UAAU,EACtB,SAAS,EAAE,SAAS,EACpB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,YAAY,CAAC,CA+CvB;AAED;;GAEG;AACH,wBAAsB,IAAI,CAAC,IAAI,EAAE,UAAU,EAAE,GAAG,EAAE,YAAY,GAAG,OAAO,CAAC,UAAU,CAAC,CAanF;AAED;;GAEG;AACH,wBAAsB,UAAU,CAC9B,IAAI,EAAE,UAAU,EAChB,SAAS,EAAE,UAAU,EACrB,GAAG,EAAE,YAAY,GAChB,OAAO,CAAC,OAAO,CAAC,CAUlB;AAuBD;;;GAGG;AACH,wBAAsB,iBAAiB,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,aAAa,CAAC,CAmD3E;AAED;;GAEG;AACH,wBAAsB,iBAAiB,CAAC,GAAG,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC,CAqBxE;AAED;;;GAGG;AACH,wBAAsB,iBAAiB,CAAC,YAAY,EAAE,MAAM,GAAG,OAAO,CAAC,UAAU,CAAC,CAoCjF;AAMD;;GAEG;AACH,wBAAsB,eAAe,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU,GAAG,OAAO,CAAC,SAAS,CAAC,CA8D1F;AAED;;GAEG;AACH,wBAAsB,gBAAgB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC,CAqG5F;AAMD;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,CAIxE;AAED;;;GAGG;AACH,wBAAsB,mBAAmB,CAAC,GAAG,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC,CAI1E;AAED;;GAEG;AACH,wBAAsB,kBAAkB,CAAC,GAAG,EAAE,SAAS,GAAG,OAAO,CAAC,UAAU,CAAC,CAG5E;AAED;;;GAGG;AACH,wBAAsB,kBAAkB,CAAC,QAAQ,EAAE,UAAU,GAAG,OAAO,CAAC,YAAY,CAAC,CAEpF;AAED;;;;GAIG;AACH,wBAAsB,iBAAiB,CACrC,GAAG,EAAE,YAAY,EACjB,SAAS,EAAE,MAAM,GAChB,OAAO,CAAC,YAAY,EAAE,CAAC,CAIzB;AAED;;;GAGG;AACH,wBAAsB,kBAAkB,CAAC,MAAM,EAAE,YAAY,EAAE,GAAG,OAAO,CAAC,YAAY,CAAC,CAItF;AAED,eAAO,MAAM,oBAAoB,EAAE,aA6BlC,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../tdf3/src/crypto/index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,KAAK,aAAa,EAAE,KAAK,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAC1E,OAAO,EACL,OAAO,EACP,MAAM,EACN,OAAO,EACP,WAAW,EACX,MAAM,EACN,IAAI,EACJ,kBAAkB,EAClB,kBAAkB,EAClB,WAAW,EACX,gBAAgB,EAChB,UAAU,EACX,MAAM,qBAAqB,CAAC;AAG7B,OAAO,EACL,qBAAqB,EACrB,oBAAoB,EACpB,eAAe,EACf,sBAAsB,EACtB,WAAW,EACX,cAAc,EACf,MAAM,eAAe,CAAC;AACvB,OAAO,EAAE,iBAAiB,EAAE,iBAAiB,EAAE,MAAM,cAAc,CAAC;AACpE,OAAO,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,mBAAmB,CAAC;AACjD,OAAO,EACL,mBAAmB,EACnB,kBAAkB,EAClB,kBAAkB,EAClB,mBAAmB,EACnB,gBAAgB,EAChB,eAAe,EACf,iBAAiB,EACjB,iBAAiB,EACjB,iBAAiB,EAClB,MAAM,sBAAsB,CAAC;AAE9B,eAAO,MAAM,WAAW,SAA4C,CAAC;AACrE,eAAO,MAAM,MAAM,gDAAgD,CAAC;AACpE,eAAO,MAAM,IAAI,+BAA+B,CAAC;AAEjD;;;;;;;;GAQG;AACH,wBAAsB,iBAAiB,CACrC,GAAG,EAAE,YAAY,EACjB,SAAS,EAAE,MAAM,GAChB,OAAO,CAAC,YAAY,EAAE,CAAC,CAIzB;AAED,OAAO,EACL,OAAO,EACP,qBAAqB,EACrB,iBAAiB,EACjB,MAAM,EACN,OAAO,EACP,oBAAoB,EACpB,mBAAmB,EACnB,kBAAkB,EAClB,kBAAkB,EAClB,mBAAmB,EACnB,iBAAiB,EACjB,WAAW,EACX,eAAe,EACf,sBAAsB,EACtB,MAAM,EACN,IAAI,EACJ,gBAAgB,EAChB,eAAe,EACf,kBAAkB,EAClB,iBAAiB,EACjB,kBAAkB,EAClB,iBAAiB,EACjB,iBAAiB,EACjB,WAAW,EACX,gBAAgB,EAChB,WAAW,EACX,cAAc,EACd,IAAI,EACJ,MAAM,EACN,UAAU,GACX,CAAC;AAEF,eAAO,MAAM,oBAAoB,EAAE,aA6BlC,CAAC"}
@@ -43,7 +43,7 @@ export class OpenTDF {
43
43
  this.authProvider = authProvider;
44
44
  this.defaultCreateOptions = defaultCreateOptions || {};
45
45
  this.defaultReadOptions = defaultReadOptions || {};
46
- this.dpopEnabled = !!disableDPoP;
46
+ this.dpopEnabled = !disableDPoP;
47
47
  if (platformUrl) {
48
48
  this.platformUrl = platformUrl;
49
49
  }
@@ -52,16 +52,32 @@ export class OpenTDF {
52
52
  }
53
53
  this.policyEndpoint = policyEndpoint || '';
54
54
  this.cryptoService = cryptoService ?? DefaultCryptoService;
55
+ // Use CryptoService for key generation (returns opaque KeyPair)
56
+ this.dpopKeys = dpopKeys ?? this.cryptoService.generateSigningKeyPair();
55
57
  this.tdf3Client = new TDF3Client({
56
58
  authProvider,
57
- dpopKeys,
59
+ dpopEnabled: this.dpopEnabled,
60
+ dpopKeys: this.dpopEnabled ? this.dpopKeys : undefined,
58
61
  kasEndpoint: this.platformUrl || 'https://disallow.all.invalid',
59
62
  platformUrl,
60
63
  policyEndpoint,
61
64
  cryptoService: this.cryptoService,
62
65
  });
63
- // Use CryptoService for key generation (returns opaque KeyPair)
64
- this.dpopKeys = dpopKeys ?? this.cryptoService.generateSigningKeyPair();
66
+ // Eagerly bind DPoP keys to the auth provider so PlatformClient
67
+ // can make gRPC calls without waiting for a TDF operation first.
68
+ // Note: TDF3Client.createSessionKeys() also calls updateClientPublicKey
69
+ // with the same keys, but the duplicate call is benign —
70
+ // refreshTokenClaimsWithClientPubkeyIfNeeded short-circuits when
71
+ // the signing key hasn't changed.
72
+ this.ready = this.dpopEnabled
73
+ ? this.dpopKeys.then((keys) => authProvider.updateClientPublicKey(keys))
74
+ : Promise.resolve();
75
+ // Prevent unhandled rejection if caller doesn't await ready.
76
+ // The error will still surface via TDF3Client's own key binding
77
+ // when encrypt/decrypt is called.
78
+ this.ready.catch((err) => {
79
+ console.warn('OpenTDF: DPoP key binding failed during initialization:', err);
80
+ });
65
81
  }
66
82
  /** Creates a new TDF stream. */
67
83
  async createTDF(opts) {
@@ -251,4 +267,4 @@ class ZTDFReader {
251
267
  return this.requiredObligations ?? { fqns: [] };
252
268
  }
253
269
  }
254
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"opentdf.js","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,kBAAkB,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AACnE,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAW,UAAU,EAAE,cAAc,EAAe,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEnE,OAAO,KAAK,oBAAoB,MAAM,6BAA6B,CAAC;AAMpE,OAAO,EAEL,eAAe,EACf,qBAAqB,EACrB,oBAAoB,GACrB,MAAM,aAAa,CAAC;AASrB,OAAO,EACL,iBAAiB,EAEjB,aAAa,GAEd,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAG9C,OAAO,EAWL,oBAAoB,GACrB,CAAC;AAuLF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAM,OAAO,OAAO;IAoBlB,YAAY,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,WAAW,EACX,aAAa,GACE;QACf,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,oBAAoB,GAAG,oBAAoB,IAAI,EAAE,CAAC;QACvD,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,IAAI,EAAE,CAAC;QACnD,IAAI,CAAC,WAAW,GAAG,CAAC,CAAC,WAAW,CAAC;QACjC,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QACjC,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,IAAI,CACV,uHAAuH,CACxH,CAAC;QACJ,CAAC;QACD,IAAI,CAAC,cAAc,GAAG,cAAc,IAAI,EAAE,CAAC;QAC3C,IAAI,CAAC,aAAa,GAAG,aAAa,IAAI,oBAAoB,CAAC;QAC3D,IAAI,CAAC,UAAU,GAAG,IAAI,UAAU,CAAC;YAC/B,YAAY;YACZ,QAAQ;YACR,WAAW,EAAE,IAAI,CAAC,WAAW,IAAI,8BAA8B;YAC/D,WAAW;YACX,cAAc;YACd,aAAa,EAAE,IAAI,CAAC,aAAa;SAClC,CAAC,CAAC;QACH,gEAAgE;QAChE,IAAI,CAAC,QAAQ,GAAG,QAAQ,IAAI,IAAI,CAAC,aAAa,CAAC,sBAAsB,EAAE,CAAC;IAC1E,CAAC;IAED,gCAAgC;IAChC,KAAK,CAAC,SAAS,CAAC,IAAsB;QACpC,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,UAAU,CAAC,IAAuB;QACtC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,oBAAoB,EAAE,GAAG,IAAI,EAAE,CAAC;QACjD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC;YAC9C,MAAM,EAAE,MAAM,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC;YAEzC,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;YACvC,aAAa,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa;YACnC,kBAAkB,EAAE,IAAI,CAAC,kBAAkB;YAC3C,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,KAAK,EAAE;gBACL,UAAU,EAAE,IAAI,CAAC,UAAU;aAC5B;YACD,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;YAC/C,cAAc,EAAE,IAAI,CAAC,cAAc;SACpC,CAAC,CAAC;QACH,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,sDAAsD;IACtD,IAAI,CAAC,IAAiB;QACpB,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,kBAAkB,EAAE,GAAG,IAAI,EAAE,CAAC;QAC/C,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,IAAI,CAAC,IAAiB;QAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC/B,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,8DAA8D;IAC9D,KAAK;QACH,gDAAgD;IAClD,CAAC;CACF;AAED,oDAAoD;AACpD,MAAM,iBAAiB;IAGrB,YACW,KAAc,EACd,IAAiB;QADjB,UAAK,GAAL,KAAK,CAAS;QACd,SAAI,GAAJ,IAAI,CAAa;QAH5B,UAAK,GAAkF,MAAM,CAAC;QAK5F,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACrC,CAAC;IAED,sDAAsD;IACtD,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,MAAM,IAAI,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,WAAW,CAAC;QACzB,MAAM,OAAO,GAAG,MAAM,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QACnC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;YACrD,IAAI,CAAC,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC;QACjD,CAAC;QACD,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;YAC7C,IAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;YACtB,OAAO,IAAI,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACpB,MAAM,IAAI,gBAAgB,CAAC,6CAA6C,MAAM,EAAE,CAAC,CAAC;IACpF,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,OAAO;QACX,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,6CAA6C;IAC7C,KAAK,CAAC,UAAU;QACd,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,UAAU,EAAE,CAAC;IAC7B,CAAC;IAED,2CAA2C;IAC3C,KAAK,CAAC,QAAQ;QACZ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,QAAQ,EAAE,CAAC;IAC3B,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,KAAK;QACT,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,OAAO;QACT,CAAC;QACD,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,iCAAiC;YACjC,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;YACpB,OAAO;QACT,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,SAAS,CAAC;QACvB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,KAAK,EAAE,CAAC,IAAI,CAAC,GAAG,EAAE;YAC9B,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACtB,CAAC,CAAC,CAAC;IACL,CAAC;IAED,KAAK,CAAC,WAAW;QACf,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,WAAW,EAAE,CAAC;IAC9B,CAAC;CACF;AAED,+BAA+B;AAC/B,MAAM,UAAU;IAId,YACW,MAAkB,EAClB,IAAiB,EACjB,MAAe;QAFf,WAAM,GAAN,MAAM,CAAY;QAClB,SAAI,GAAJ,IAAI,CAAa;QACjB,WAAM,GAAN,MAAM,CAAS;QAExB,IAAI,CAAC,QAAQ,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,EACJ,yBAAyB,EACzB,QAAQ,EAAE,kBAAkB,EAC5B,oBAAoB,GACrB,GAAG,IAAI,CAAC,IAAI,CAAC;QAEd,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YAC3F,MAAM,IAAI,kBAAkB,CAAC,2DAA2D,CAAC,CAAC;QAC5F,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC;QAE5C,MAAM,EAAE,YAAY,EAAE,aAAa,EAAE,GAAG,IAAI,CAAC,MAAM,CAAC;QACpD,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,SAAsC,CAAC;QAE3C,IAAI,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,MAAM,IAAI,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;YACvE,SAAS,GAAG,IAAI,eAAe,CAC7B,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,EAAE,EACnC,IAAI,CAAC,IAAI,CAAC,eAAe,CAC1B,CAAC;QACJ,CAAC;aAAM,IAAI,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACjC,SAAS,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,YAAY,CAAC,CAAC;QAC/E,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,MAAM,SAAS,GAAG,MAAM,iBAAiB,CACvC;YACE,SAAS;YACT,YAAY;YACZ,OAAO,EAAE,IAAI,CAAC,MAAM;YACpB,gBAAgB,EAAE,CAAC;YACnB,aAAa;YACb,QAAQ;YACR,uBAAuB,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,uBAAuB;YACzE,aAAa,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC;YAC7B,eAAe,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,eAAe;YACzD,yBAAyB;YACzB,kBAAkB;YAClB,oBAAoB;YACpB,sBAAsB,EAAE,IAAI,CAAC,IAAI,CAAC,yBAAyB,IAAI,EAAE;SAClE,EACD,QAAQ,CACT,CAAC;QACF,IAAI,CAAC,mBAAmB,GAAG;YACzB,IAAI,EAAE,SAAS,CAAC,WAAW,EAAE;SAC9B,CAAC;QACF,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACrD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,KAAK,CAAC,KAAK;QACT,yDAAyD;IAC3D,CAAC;IAED,4CAA4C;IAC5C,KAAK,CAAC,QAAQ;QACZ,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,OAAO,QAAQ,CAAC,QAAQ,CAAC;IAC3B,CAAC;IAED,8CAA8C;IAC9C,KAAK,CAAC,UAAU;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;QACvC,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAW,CAAC;QAChD,OAAO,MAAM,EAAE,IAAI,EAAE,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;IACpE,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,OAAO,IAAI,CAAC,mBAAmB,CAAC;QAClC,CAAC;QACD,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,mBAAmB,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;IAClD,CAAC;CACF"}
270
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"opentdf.js","sourceRoot":"","sources":["../../../src/opentdf.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,kBAAkB,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AACnE,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,EAAW,UAAU,EAAE,cAAc,EAAe,MAAM,eAAe,CAAC;AACjF,OAAO,EAAE,MAAM,IAAI,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEnE,OAAO,KAAK,oBAAoB,MAAM,6BAA6B,CAAC;AAMpE,OAAO,EAEL,eAAe,EACf,qBAAqB,EACrB,oBAAoB,GACrB,MAAM,aAAa,CAAC;AASrB,OAAO,EACL,iBAAiB,EAEjB,aAAa,GAEd,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,MAAM,EAAE,MAAM,sBAAsB,CAAC;AAG9C,OAAO,EAWL,oBAAoB,GACrB,CAAC;AAuLF;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAM,OAAO,OAAO;IAsBlB,YAAY,EACV,YAAY,EACZ,QAAQ,EACR,oBAAoB,EACpB,kBAAkB,EAClB,WAAW,EACX,cAAc,EACd,WAAW,EACX,aAAa,GACE;QACf,IAAI,CAAC,YAAY,GAAG,YAAY,CAAC;QACjC,IAAI,CAAC,oBAAoB,GAAG,oBAAoB,IAAI,EAAE,CAAC;QACvD,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,IAAI,EAAE,CAAC;QACnD,IAAI,CAAC,WAAW,GAAG,CAAC,WAAW,CAAC;QAChC,IAAI,WAAW,EAAE,CAAC;YAChB,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;QACjC,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,IAAI,CACV,uHAAuH,CACxH,CAAC;QACJ,CAAC;QACD,IAAI,CAAC,cAAc,GAAG,cAAc,IAAI,EAAE,CAAC;QAC3C,IAAI,CAAC,aAAa,GAAG,aAAa,IAAI,oBAAoB,CAAC;QAC3D,gEAAgE;QAChE,IAAI,CAAC,QAAQ,GAAG,QAAQ,IAAI,IAAI,CAAC,aAAa,CAAC,sBAAsB,EAAE,CAAC;QACxE,IAAI,CAAC,UAAU,GAAG,IAAI,UAAU,CAAC;YAC/B,YAAY;YACZ,WAAW,EAAE,IAAI,CAAC,WAAW;YAC7B,QAAQ,EAAE,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS;YACtD,WAAW,EAAE,IAAI,CAAC,WAAW,IAAI,8BAA8B;YAC/D,WAAW;YACX,cAAc;YACd,aAAa,EAAE,IAAI,CAAC,aAAa;SAClC,CAAC,CAAC;QACH,gEAAgE;QAChE,iEAAiE;QACjE,wEAAwE;QACxE,yDAAyD;QACzD,iEAAiE;QACjE,kCAAkC;QAClC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,WAAW;YAC3B,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,YAAY,CAAC,qBAAqB,CAAC,IAAI,CAAC,CAAC;YACxE,CAAC,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC;QACtB,6DAA6D;QAC7D,gEAAgE;QAChE,kCAAkC;QAClC,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;YACvB,OAAO,CAAC,IAAI,CAAC,yDAAyD,EAAE,GAAG,CAAC,CAAC;QAC/E,CAAC,CAAC,CAAC;IACL,CAAC;IAED,gCAAgC;IAChC,KAAK,CAAC,SAAS,CAAC,IAAsB;QACpC,OAAO,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,UAAU,CAAC,IAAuB;QACtC,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,oBAAoB,EAAE,GAAG,IAAI,EAAE,CAAC;QACjD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,OAAO,CAAC;YAC9C,MAAM,EAAE,MAAM,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC;YAEzC,gBAAgB,EAAE,IAAI,CAAC,gBAAgB;YACvC,aAAa,EAAE,CAAC,CAAC,IAAI,CAAC,aAAa;YACnC,kBAAkB,EAAE,IAAI,CAAC,kBAAkB;YAC3C,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,KAAK,EAAE;gBACL,UAAU,EAAE,IAAI,CAAC,UAAU;aAC5B;YACD,SAAS,EAAE,IAAI,CAAC,SAAS;YACzB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,oBAAoB,EAAE,IAAI,CAAC,oBAAoB;YAC/C,cAAc,EAAE,IAAI,CAAC,cAAc;SACpC,CAAC,CAAC;QACH,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,sDAAsD;IACtD,IAAI,CAAC,IAAiB;QACpB,IAAI,GAAG,EAAE,GAAG,IAAI,CAAC,kBAAkB,EAAE,GAAG,IAAI,EAAE,CAAC;QAC/C,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED,2BAA2B;IAC3B,KAAK,CAAC,IAAI,CAAC,IAAiB;QAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC/B,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,8DAA8D;IAC9D,KAAK;QACH,gDAAgD;IAClD,CAAC;CACF;AAED,oDAAoD;AACpD,MAAM,iBAAiB;IAGrB,YACW,KAAc,EACd,IAAiB;QADjB,UAAK,GAAL,KAAK,CAAS;QACd,SAAI,GAAJ,IAAI,CAAa;QAH5B,UAAK,GAAkF,MAAM,CAAC;QAK5F,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;IACrC,CAAC;IAED,sDAAsD;IACtD,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,MAAM,IAAI,kBAAkB,CAAC,kBAAkB,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,WAAW,CAAC;QACzB,MAAM,OAAO,GAAG,MAAM,UAAU,CAAC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;QACnC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;YACrD,IAAI,CAAC,IAAI,CAAC,WAAW,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC;QACjD,CAAC;QACD,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;YAC7C,IAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;YACtB,OAAO,IAAI,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,UAAU,EAAE,IAAI,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACpB,MAAM,IAAI,gBAAgB,CAAC,6CAA6C,MAAM,EAAE,CAAC,CAAC;IACpF,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,OAAO;QACX,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,OAAO,EAAE,CAAC;IAC1B,CAAC;IAED,6CAA6C;IAC7C,KAAK,CAAC,UAAU;QACd,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,UAAU,EAAE,CAAC;IAC7B,CAAC;IAED,2CAA2C;IAC3C,KAAK,CAAC,QAAQ;QACZ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,QAAQ,EAAE,CAAC;IAC3B,CAAC;IAED,4BAA4B;IAC5B,KAAK,CAAC,KAAK;QACT,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,OAAO;QACT,CAAC;QACD,IAAI,IAAI,CAAC,KAAK,KAAK,MAAM,EAAE,CAAC;YAC1B,iCAAiC;YACjC,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;YACpB,OAAO;QACT,CAAC;QACD,IAAI,CAAC,KAAK,GAAG,SAAS,CAAC;QACvB,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,KAAK,EAAE,CAAC,IAAI,CAAC,GAAG,EAAE;YAC9B,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC;QACtB,CAAC,CAAC,CAAC;IACL,CAAC;IAED,KAAK,CAAC,WAAW;QACf,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACnC,OAAO,MAAM,CAAC,WAAW,EAAE,CAAC;IAC9B,CAAC;CACF;AAED,+BAA+B;AAC/B,MAAM,UAAU;IAId,YACW,MAAkB,EAClB,IAAiB,EACjB,MAAe;QAFf,WAAM,GAAN,MAAM,CAAY;QAClB,SAAI,GAAJ,IAAI,CAAa;QACjB,WAAM,GAAN,MAAM,CAAS;QAExB,IAAI,CAAC,QAAQ,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;IACxC,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,OAAO;QACX,MAAM,EACJ,yBAAyB,EACzB,QAAQ,EAAE,kBAAkB,EAC5B,oBAAoB,GACrB,GAAG,IAAI,CAAC,IAAI,CAAC;QAEd,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YAC3F,MAAM,IAAI,kBAAkB,CAAC,2DAA2D,CAAC,CAAC;QAC5F,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,QAAQ,CAAC;QAE5C,MAAM,EAAE,YAAY,EAAE,aAAa,EAAE,GAAG,IAAI,CAAC,MAAM,CAAC;QACpD,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,CAAC,CAAC;QAC3D,CAAC;QAED,IAAI,SAAsC,CAAC;QAE3C,IAAI,IAAI,CAAC,IAAI,CAAC,mBAAmB,EAAE,MAAM,IAAI,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,CAAC;YACvE,SAAS,GAAG,IAAI,eAAe,CAC7B,IAAI,CAAC,IAAI,CAAC,mBAAmB,IAAI,EAAE,EACnC,IAAI,CAAC,IAAI,CAAC,eAAe,CAC1B,CAAC;QACJ,CAAC;aAAM,IAAI,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;YACjC,SAAS,GAAG,MAAM,qBAAqB,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,YAAY,CAAC,CAAC;QAC/E,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,MAAM,SAAS,GAAG,MAAM,iBAAiB,CACvC;YACE,SAAS;YACT,YAAY;YACZ,OAAO,EAAE,IAAI,CAAC,MAAM;YACpB,gBAAgB,EAAE,CAAC;YACnB,aAAa;YACb,QAAQ;YACR,uBAAuB,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,uBAAuB;YACzE,aAAa,EAAE,KAAK,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC;YAC7B,eAAe,EAAE,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,eAAe;YACzD,yBAAyB;YACzB,kBAAkB;YAClB,oBAAoB;YACpB,sBAAsB,EAAE,IAAI,CAAC,IAAI,CAAC,yBAAyB,IAAI,EAAE;SAClE,EACD,QAAQ,CACT,CAAC;QACF,IAAI,CAAC,mBAAmB,GAAG;YACzB,IAAI,EAAE,SAAS,CAAC,WAAW,EAAE;SAC9B,CAAC;QACF,MAAM,MAAM,GAAoB,SAAS,CAAC,MAAM,CAAC;QACjD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QACrD,MAAM,CAAC,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;QACtD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,KAAK,CAAC,KAAK;QACT,yDAAyD;IAC3D,CAAC;IAED,4CAA4C;IAC5C,KAAK,CAAC,QAAQ;QACZ,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC;QACrC,OAAO,QAAQ,CAAC,QAAQ,CAAC;IAC3B,CAAC;IAED,8CAA8C;IAC9C,KAAK,CAAC,UAAU;QACd,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,QAAQ,EAAE,CAAC;QACvC,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;QACxE,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAW,CAAC;QAChD,OAAO,MAAM,EAAE,IAAI,EAAE,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;IACpE,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,WAAW;QACf,IAAI,IAAI,CAAC,mBAAmB,EAAE,CAAC;YAC7B,OAAO,IAAI,CAAC,mBAAmB,CAAC;QAClC,CAAC;QACD,MAAM,IAAI,CAAC,OAAO,EAAE,CAAC;QACrB,OAAO,IAAI,CAAC,mBAAmB,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;IAClD,CAAC;CACF"}