@opentdf/sdk 0.12.0 → 0.13.0-rc.121

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. package/dist/cjs/src/auth/dpop.js +4 -4
  2. package/dist/cjs/src/version.js +1 -1
  3. package/dist/cjs/tdf3/src/crypto/core/ec.js +88 -0
  4. package/dist/cjs/tdf3/src/crypto/core/key-format.js +359 -0
  5. package/dist/cjs/tdf3/src/crypto/core/keys.js +85 -0
  6. package/dist/cjs/tdf3/src/crypto/core/rsa.js +120 -0
  7. package/dist/cjs/tdf3/src/crypto/core/signing.js +178 -0
  8. package/dist/cjs/tdf3/src/crypto/core/symmetric.js +205 -0
  9. package/dist/cjs/tdf3/src/crypto/index.js +69 -1051
  10. package/dist/types/src/version.d.ts +1 -1
  11. package/dist/types/tdf3/src/crypto/core/ec.d.ts +11 -0
  12. package/dist/types/tdf3/src/crypto/core/ec.d.ts.map +1 -0
  13. package/dist/types/tdf3/src/crypto/core/key-format.d.ts +41 -0
  14. package/dist/types/tdf3/src/crypto/core/key-format.d.ts.map +1 -0
  15. package/dist/types/tdf3/src/crypto/core/keys.d.ts +27 -0
  16. package/dist/types/tdf3/src/crypto/core/keys.d.ts.map +1 -0
  17. package/dist/types/tdf3/src/crypto/core/rsa.d.ts +35 -0
  18. package/dist/types/tdf3/src/crypto/core/rsa.d.ts.map +1 -0
  19. package/dist/types/tdf3/src/crypto/core/signing.d.ts +10 -0
  20. package/dist/types/tdf3/src/crypto/core/signing.d.ts.map +1 -0
  21. package/dist/types/tdf3/src/crypto/core/symmetric.d.ts +68 -0
  22. package/dist/types/tdf3/src/crypto/core/symmetric.d.ts.map +1 -0
  23. package/dist/types/tdf3/src/crypto/index.d.ts +11 -164
  24. package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -1
  25. package/dist/web/src/auth/dpop.js +4 -4
  26. package/dist/web/src/version.js +1 -1
  27. package/dist/web/tdf3/src/crypto/core/ec.js +84 -0
  28. package/dist/web/tdf3/src/crypto/core/key-format.js +348 -0
  29. package/dist/web/tdf3/src/crypto/core/keys.js +78 -0
  30. package/dist/web/tdf3/src/crypto/core/rsa.js +112 -0
  31. package/dist/web/tdf3/src/crypto/core/signing.js +174 -0
  32. package/dist/web/tdf3/src/crypto/core/symmetric.js +192 -0
  33. package/dist/web/tdf3/src/crypto/index.js +13 -994
  34. package/package.json +1 -1
  35. package/src/auth/dpop.ts +3 -3
  36. package/src/version.ts +1 -1
  37. package/tdf3/src/crypto/core/ec.ts +118 -0
  38. package/tdf3/src/crypto/core/key-format.ts +420 -0
  39. package/tdf3/src/crypto/core/keys.ts +86 -0
  40. package/tdf3/src/crypto/core/rsa.ts +144 -0
  41. package/tdf3/src/crypto/core/signing.ts +214 -0
  42. package/tdf3/src/crypto/core/symmetric.ts +265 -0
  43. package/tdf3/src/crypto/index.ts +71 -1239
@@ -30,8 +30,8 @@ function b64u(input) {
30
30
  /**
31
31
  * Generates 32 random bytes and encodes them using base64url.
32
32
  */
33
- async function randomBytes(cryptoService) {
34
- return b64u(await cryptoService.randomBytes(32));
33
+ async function randomBytes() {
34
+ return b64u(crypto.getRandomValues(new Uint8Array(32)));
35
35
  }
36
36
  class UnsupportedOperationError extends Error {
37
37
  constructor(message) {
@@ -111,11 +111,11 @@ async function DPoP(keypair, cryptoService, htu, htm, nonce, accessToken, additi
111
111
  }, {
112
112
  ...additional,
113
113
  iat: epochTime(),
114
- jti: await randomBytes(cryptoService),
114
+ jti: await randomBytes(),
115
115
  htm,
116
116
  nonce,
117
117
  htu,
118
118
  ath,
119
119
  }, privateKey, cryptoService);
120
120
  }
121
- //# sourceMappingURL=data:application/json;base64,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
121
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZHBvcC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uL3NyYy9hdXRoL2Rwb3AudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IjtBQUFBLHdEQUF3RDtBQUN4RCx5REFBeUQ7O0FBMEp6RCx1QkFrRUM7QUE5TUQsTUFBTSxPQUFPLEdBQUcsSUFBSSxXQUFXLEVBQUUsQ0FBQztBQUVsQyxTQUFTLEdBQUcsQ0FBQyxLQUFhO0lBQ3hCLE9BQU8sT0FBTyxDQUFDLE1BQU0sQ0FBQyxLQUFLLENBQUMsQ0FBQztBQUMvQixDQUFDO0FBUUQ7O0dBRUc7QUFDSCxLQUFLLFVBQVUsR0FBRyxDQUNoQixNQUErQixFQUMvQixTQUFrQyxFQUNsQyxVQUFzQixFQUN0QixhQUE0QjtJQUU1QixNQUFNLEtBQUssR0FBRyxHQUFHLElBQUksQ0FBQyxHQUFHLENBQUMsSUFBSSxDQUFDLFNBQVMsQ0FBQyxNQUFNLENBQUMsQ0FBQyxDQUFDLElBQUksSUFBSSxDQUFDLEdBQUcsQ0FBQyxJQUFJLENBQUMsU0FBUyxDQUFDLFNBQVMsQ0FBQyxDQUFDLENBQUMsRUFBRSxDQUFDO0lBQzdGLE1BQU0sU0FBUyxHQUFHLE1BQU0sYUFBYSxDQUFDLElBQUksQ0FDeEMsR0FBRyxDQUFDLEtBQUssQ0FBQyxFQUNWLFVBQVUsRUFDVixNQUFNLENBQUMsR0FBaUMsQ0FDekMsQ0FBQztJQUNGLE9BQU8sR0FBRyxLQUFLLElBQUksSUFBSSxDQUFDLFNBQVMsQ0FBQyxFQUFFLENBQUM7QUFDdkMsQ0FBQztBQUVELE1BQU0sVUFBVSxHQUFHLE1BQU0sQ0FBQztBQUMxQixTQUFTLGVBQWUsQ0FBQyxLQUErQjtJQUN0RCxNQUFNLEtBQUssR0FBRyxLQUFLLFlBQVksV0FBVyxDQUFDLENBQUMsQ0FBQyxJQUFJLFVBQVUsQ0FBQyxLQUFLLENBQUMsQ0FBQyxDQUFDLENBQUMsS0FBSyxDQUFDO0lBRTNFLE1BQU0sR0FBRyxHQUFHLEVBQUUsQ0FBQztJQUNmLEtBQUssSUFBSSxDQUFDLEdBQUcsQ0FBQyxFQUFFLENBQUMsR0FBRyxLQUFLLENBQUMsVUFBVSxFQUFFLENBQUMsSUFBSSxVQUFVLEVBQUUsQ0FBQztRQUN0RCxHQUFHLENBQUMsSUFBSSxDQUNOLE1BQU0sQ0FBQyxZQUFZLENBQUMsS0FBSyxDQUFDLElBQUksRUFBRSxLQUFLLENBQUMsUUFBUSxDQUFDLENBQUMsRUFBRSxDQUFDLEdBQUcsVUFBVSxDQUF3QixDQUFDLENBQzFGLENBQUM7SUFDSixDQUFDO0lBQ0QsT0FBTyxJQUFJLENBQUMsR0FBRyxDQUFDLElBQUksQ0FBQyxFQUFFLENBQUMsQ0FBQyxDQUFDLE9BQU8sQ0FBQyxJQUFJLEVBQUUsRUFBRSxDQUFDLENBQUMsT0FBTyxDQUFDLEtBQUssRUFBRSxHQUFHLENBQUMsQ0FBQyxPQUFPLENBQUMsS0FBSyxFQUFFLEdBQUcsQ0FBQyxDQUFDO0FBQ3RGLENBQUM7QUFFRCxTQUFTLElBQUksQ0FBQyxLQUErQjtJQUMzQyxPQUFPLGVBQWUsQ0FBQyxLQUFLLENBQUMsQ0FBQztBQUNoQyxDQUFDO0FBRUQ7O0dBRUc7QUFDSCxLQUFLLFVBQVUsV0FBVztJQUN4QixPQUFPLElBQUksQ0FBQyxNQUFNLENBQUMsZUFBZSxDQUFDLElBQUksVUFBVSxDQUFDLEVBQUUsQ0FBQyxDQUFDLENBQUMsQ0FBQztBQUMxRCxDQUFDO0FBMkNELE1BQU0seUJBQTBCLFNBQVEsS0FBSztJQUMzQyxZQUFZLE9BQWdCO1FBQzFCLEtBQUssQ0FBQyxPQUFPLElBQUkseUJBQXlCLENBQUMsQ0FBQztRQUM1QyxJQUFJLENBQUMsSUFBSSxHQUFHLElBQUksQ0FBQyxXQUFXLENBQUMsSUFBSSxDQUFDO1FBQ2xDLEtBQUssQ0FBQyxpQkFBaUIsRUFBRSxDQUFDLElBQUksRUFBRSxJQUFJLENBQUMsV0FBVyxDQUFDLENBQUM7SUFDcEQsQ0FBQztDQUNGO0FBRUQ7O0dBRUc7QUFDSCxTQUFTLGdDQUFnQyxDQUFDLFNBQWlCO0lBQ3pELElBQUksU0FBUyxDQUFDLFVBQVUsQ0FBQyxNQUFNLENBQUMsRUFBRSxDQUFDO1FBQ2pDLE9BQU8sT0FBTyxDQUFDO0lBQ2pCLENBQUM7SUFDRCxRQUFRLFNBQVMsRUFBRSxDQUFDO1FBQ2xCLEtBQUssY0FBYztZQUNqQixPQUFPLE9BQU8sQ0FBQztRQUNqQixLQUFLLGNBQWM7WUFDakIsT0FBTyxPQUFPLENBQUM7UUFDakIsS0FBSyxjQUFjO1lBQ2pCLE9BQU8sT0FBTyxDQUFDO1FBQ2pCO1lBQ0UsTUFBTSxJQUFJLHlCQUF5QixDQUFDLDhCQUE4QixTQUFTLEVBQUUsQ0FBQyxDQUFDO0lBQ25GLENBQUM7QUFDSCxDQUFDO0FBRUQ7O0dBRUc7QUFDSCxTQUFTLFNBQVM7SUFDaEIsT0FBTyxJQUFJLENBQUMsS0FBSyxDQUFDLElBQUksQ0FBQyxHQUFHLEVBQUUsR0FBRyxJQUFJLENBQUMsQ0FBQztBQUN2QyxDQUFDO0FBRUQ7Ozs7Ozs7Ozs7R0FVRztBQUNZLEtBQUssVUFBVSxJQUFJLENBQ2hDLE9BQWdCLEVBQ2hCLGFBQTRCLEVBQzVCLEdBQVcsRUFDWCxHQUFXLEVBQ1gsS0FBYyxFQUNkLFdBQW9CLEVBQ3BCLFVBQXNDO0lBRXRDLE1BQU0sVUFBVSxHQUFHLE9BQU8sRUFBRSxVQUFVLENBQUM7SUFDdkMsTUFBTSxTQUFTLEdBQUcsT0FBTyxFQUFFLFNBQVMsQ0FBQztJQUVyQyxJQUFJLE9BQU8sR0FBRyxLQUFLLFFBQVEsRUFBRSxDQUFDO1FBQzVCLE1BQU0sSUFBSSxTQUFTLENBQUMsd0JBQXdCLENBQUMsQ0FBQztJQUNoRCxDQUFDO0lBRUQsSUFBSSxPQUFPLEdBQUcsS0FBSyxRQUFRLEVBQUUsQ0FBQztRQUM1QixNQUFNLElBQUksU0FBUyxDQUFDLHdCQUF3QixDQUFDLENBQUM7SUFDaEQsQ0FBQztJQUVELElBQUksS0FBSyxLQUFLLFNBQVMsSUFBSSxPQUFPLEtBQUssS0FBSyxRQUFRLEVBQUUsQ0FBQztRQUNyRCxNQUFNLElBQUksU0FBUyxDQUFDLHVDQUF1QyxDQUFDLENBQUM7SUFDL0QsQ0FBQztJQUVELElBQUksV0FBVyxLQUFLLFNBQVMsSUFBSSxPQUFPLFdBQVcsS0FBSyxRQUFRLEVBQUUsQ0FBQztRQUNqRSxNQUFNLElBQUksU0FBUyxDQUFDLDZDQUE2QyxDQUFDLENBQUM7SUFDckUsQ0FBQztJQUVELElBQ0UsVUFBVSxLQUFLLFNBQVM7UUFDeEIsQ0FBQyxPQUFPLFVBQVUsS0FBSyxRQUFRLElBQUksVUFBVSxLQUFLLElBQUksSUFBSSxLQUFLLENBQUMsT0FBTyxDQUFDLFVBQVUsQ0FBQyxDQUFDLEVBQ3BGLENBQUM7UUFDRCxNQUFNLElBQUksU0FBUyxDQUFDLGdDQUFnQyxDQUFDLENBQUM7SUFDeEQsQ0FBQztJQUVELDRDQUE0QztJQUM1QyxNQUFNLEdBQUcsR0FBRyxnQ0FBZ0MsQ0FBQyxTQUFTLENBQUMsU0FBUyxDQUFDLENBQUM7SUFFbEUsMENBQTBDO0lBQzFDLE1BQU0sR0FBRyxHQUFHLE1BQU0sYUFBYSxDQUFDLGtCQUFrQixDQUFDLFNBQVMsQ0FBQyxDQUFDO0lBRTlELHdDQUF3QztJQUN4QyxJQUFJLEdBQXVCLENBQUM7SUFDNUIsSUFBSSxXQUFXLEVBQUUsQ0FBQztRQUNoQixNQUFNLFFBQVEsR0FBRyxNQUFNLGFBQWEsQ0FBQyxNQUFNLENBQUMsU0FBUyxFQUFFLEdBQUcsQ0FBQyxXQUFXLENBQUMsQ0FBQyxDQUFDO1FBQ3pFLEdBQUcsR0FBRyxJQUFJLENBQUMsUUFBUSxDQUFDLENBQUM7SUFDdkIsQ0FBQztJQUVELE9BQU8sR0FBRyxDQUNSO1FBQ0UsR0FBRztRQUNILEdBQUcsRUFBRSxVQUFVO1FBQ2YsR0FBRztLQUNKLEVBQ0Q7UUFDRSxHQUFHLFVBQVU7UUFDYixHQUFHLEVBQUUsU0FBUyxFQUFFO1FBQ2hCLEdBQUcsRUFBRSxNQUFNLFdBQVcsRUFBRTtRQUN4QixHQUFHO1FBQ0gsS0FBSztRQUNMLEdBQUc7UUFDSCxHQUFHO0tBQ0osRUFDRCxVQUFVLEVBQ1YsYUFBYSxDQUNkLENBQUM7QUFDSixDQUFDIn0=
@@ -4,7 +4,7 @@ exports.tdfSpecVersion = exports.clientType = exports.version = void 0;
4
4
  /**
5
5
  * Exposes the released version number of the `@opentdf/sdk` package
6
6
  */
7
- exports.version = '0.12.0'; // x-release-please-version
7
+ exports.version = '0.13.0'; // x-release-please-version
8
8
  /**
9
9
  * A string name used to label requests as coming from this library client.
10
10
  */
@@ -0,0 +1,88 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.generateECKeyPair = generateECKeyPair;
4
+ exports.deriveKeyFromECDH = deriveKeyFromECDH;
5
+ const errors_js_1 = require("../../../../src/errors.js");
6
+ const keys_js_1 = require("./keys.js");
7
+ /**
8
+ * Map ECCurve to Web Crypto named curve.
9
+ */
10
+ function curveToNamedCurve(curve) {
11
+ switch (curve) {
12
+ case 'P-256':
13
+ return 'P-256';
14
+ case 'P-384':
15
+ return 'P-384';
16
+ case 'P-521':
17
+ return 'P-521';
18
+ default:
19
+ throw new errors_js_1.ConfigurationError(`Unsupported curve: ${curve}`);
20
+ }
21
+ }
22
+ /**
23
+ * Generate an EC key pair for ECDH key agreement.
24
+ */
25
+ async function generateECKeyPair(curve = 'P-256') {
26
+ const namedCurve = curveToNamedCurve(curve);
27
+ // Generate key pair for ECDH key agreement
28
+ const keyPair = await crypto.subtle.generateKey({ name: 'ECDH', namedCurve }, true, [
29
+ 'deriveBits',
30
+ ]);
31
+ // Map to KeyAlgorithm literal type
32
+ let algorithm;
33
+ switch (namedCurve) {
34
+ case 'P-256':
35
+ algorithm = 'ec:secp256r1';
36
+ break;
37
+ case 'P-384':
38
+ algorithm = 'ec:secp384r1';
39
+ break;
40
+ case 'P-521':
41
+ algorithm = 'ec:secp521r1';
42
+ break;
43
+ default:
44
+ throw new errors_js_1.ConfigurationError(`Unsupported curve: ${namedCurve}`);
45
+ }
46
+ return {
47
+ publicKey: (0, keys_js_1.wrapPublicKey)(keyPair.publicKey, algorithm),
48
+ privateKey: (0, keys_js_1.wrapPrivateKey)(keyPair.privateKey, algorithm),
49
+ };
50
+ }
51
+ /**
52
+ * Perform ECDH key agreement followed by HKDF key derivation.
53
+ * Returns opaque symmetric key for symmetric encryption.
54
+ */
55
+ async function deriveKeyFromECDH(privateKey, publicKey, hkdfParams) {
56
+ // Unwrap the internal CryptoKeys
57
+ const privateKeyCrypto = (0, keys_js_1.unwrapKey)(privateKey);
58
+ const publicKeyCrypto = (0, keys_js_1.unwrapKey)(publicKey);
59
+ // Get curve from key metadata
60
+ const curve = publicKey.curve;
61
+ if (!curve) {
62
+ throw new errors_js_1.ConfigurationError('EC curve not found on public key');
63
+ }
64
+ // Determine bits based on curve
65
+ const curveBits = {
66
+ 'P-256': 256,
67
+ 'P-384': 384,
68
+ // P-521 derives 528 bits (66 bytes)
69
+ 'P-521': 528,
70
+ };
71
+ const bits = curveBits[curve];
72
+ // Perform ECDH to get shared secret
73
+ const sharedSecret = await crypto.subtle.deriveBits({ name: 'ECDH', public: publicKeyCrypto }, privateKeyCrypto, bits);
74
+ // Import shared secret as HKDF key material
75
+ const hkdfKey = await crypto.subtle.importKey('raw', sharedSecret, 'HKDF', false, ['deriveKey']);
76
+ // Derive the final key using HKDF
77
+ const keyLength = hkdfParams.keyLength ?? 256;
78
+ const derivedKey = await crypto.subtle.deriveKey({
79
+ name: 'HKDF',
80
+ hash: hkdfParams.hash,
81
+ salt: hkdfParams.salt,
82
+ info: hkdfParams.info ?? new Uint8Array(0),
83
+ }, hkdfKey, { name: 'AES-GCM', length: keyLength }, true, ['encrypt', 'decrypt']);
84
+ // Export the derived key as raw bytes and wrap as SymmetricKey
85
+ const keyBytes = await crypto.subtle.exportKey('raw', derivedKey);
86
+ return (0, keys_js_1.wrapSymmetricKey)(new Uint8Array(keyBytes));
87
+ }
88
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,359 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.extractPublicKeyPem = extractPublicKeyPem;
4
+ exports.parsePublicKeyPem = parsePublicKeyPem;
5
+ exports.jwkToPublicKeyPem = jwkToPublicKeyPem;
6
+ exports.publicKeyPemToJwk = publicKeyPemToJwk;
7
+ exports.importPublicKey = importPublicKey;
8
+ exports.importPrivateKey = importPrivateKey;
9
+ exports.exportPublicKeyPem = exportPublicKeyPem;
10
+ exports.exportPrivateKeyPem = exportPrivateKeyPem;
11
+ exports.exportPublicKeyJwk = exportPublicKeyJwk;
12
+ const declarations_js_1 = require("../declarations.js");
13
+ const errors_js_1 = require("../../../../src/errors.js");
14
+ const crypto_utils_js_1 = require("../crypto-utils.js");
15
+ const hex_js_1 = require("../../../../src/encodings/hex.js");
16
+ const base64_js_1 = require("../../../../src/encodings/base64.js");
17
+ const jose_1 = require("jose");
18
+ const pemPublicToCrypto_js_1 = require("../../../../src/crypto/pemPublicToCrypto.js");
19
+ const keys_js_1 = require("./keys.js");
20
+ const rsa_js_1 = require("./rsa.js");
21
+ /**
22
+ * Extract PEM public key from X.509 certificate or return PEM key as-is.
23
+ */
24
+ async function extractPublicKeyPem(certOrPem, jwaAlgorithm) {
25
+ // If it's a certificate, extract the public key
26
+ if (certOrPem.includes('-----BEGIN CERTIFICATE-----')) {
27
+ let alg = jwaAlgorithm;
28
+ if (!alg) {
29
+ // Auto-detect algorithm from certificate OIDs
30
+ const certBody = certOrPem.replace(/-----(BEGIN|END) CERTIFICATE-----|\s/g, '');
31
+ const certBytes = (0, base64_js_1.decodeArrayBuffer)(certBody);
32
+ const hex = (0, hex_js_1.encodeArrayBuffer)(certBytes);
33
+ alg = (0, pemPublicToCrypto_js_1.toJwsAlg)(hex);
34
+ }
35
+ const cert = await (0, jose_1.importX509)(certOrPem, alg, { extractable: true });
36
+ return (0, jose_1.exportSPKI)(cert);
37
+ }
38
+ // If it's already a PEM public key, return as-is
39
+ if (certOrPem.includes('-----BEGIN PUBLIC KEY-----')) {
40
+ return certOrPem;
41
+ }
42
+ throw new errors_js_1.ConfigurationError('Input must be a PEM-encoded certificate or public key');
43
+ }
44
+ const SUPPORTED_EC_CURVES = ['P-256', 'P-384', 'P-521'];
45
+ /**
46
+ * Decode base64url string and return byte length.
47
+ * Uses the existing base64 decoder which handles both standard and URL-safe encoding.
48
+ */
49
+ function base64urlByteLength(base64url) {
50
+ // Add padding if needed (base64url omits padding)
51
+ const padding = (4 - (base64url.length % 4)) % 4;
52
+ const padded = base64url + '='.repeat(padding);
53
+ return (0, base64_js_1.decodeArrayBuffer)(padded).byteLength;
54
+ }
55
+ /**
56
+ * Extract EC curve from a public key by parsing ASN.1 OIDs.
57
+ * Reuses the existing guessCurveName function that checks for curve OIDs.
58
+ */
59
+ function extractEcCurveFromPublicKey(keyData) {
60
+ // Convert to hex for OID parsing
61
+ const hexKey = (0, hex_js_1.encodeArrayBuffer)(keyData);
62
+ // Use existing OID parser (returns 'P-256', 'P-384', or 'P-521')
63
+ const curveName = (0, pemPublicToCrypto_js_1.guessCurveName)(hexKey);
64
+ return curveName;
65
+ }
66
+ /**
67
+ * Extract RSA modulus bit length by importing key and exporting as JWK.
68
+ * Uses Web Crypto's built-in ASN.1 parsing for robustness.
69
+ */
70
+ async function extractRsaModulusBitLength(keyData) {
71
+ const key = await crypto.subtle.importKey('spki', keyData, { name: 'RSA-OAEP', hash: 'SHA-256' }, true, ['encrypt']);
72
+ const jwk = await crypto.subtle.exportKey('jwk', key);
73
+ if (!jwk.n) {
74
+ throw new errors_js_1.ConfigurationError('Invalid RSA key: missing modulus');
75
+ }
76
+ // JWK 'n' is base64url-encoded modulus
77
+ // Decode and count bytes, multiply by 8 for bits
78
+ return base64urlByteLength(jwk.n) * 8;
79
+ }
80
+ /**
81
+ * Import and validate a PEM public key, returning algorithm info.
82
+ * Uses JWK export for robust key parameter detection.
83
+ */
84
+ async function parsePublicKeyPem(pem) {
85
+ // First extract public key if it's a certificate
86
+ let publicKeyPem = pem;
87
+ if (pem.includes('-----BEGIN CERTIFICATE-----')) {
88
+ publicKeyPem = await extractPublicKeyPem(pem);
89
+ }
90
+ if (!publicKeyPem.includes('-----BEGIN PUBLIC KEY-----')) {
91
+ throw new errors_js_1.ConfigurationError('Input must be a PEM-encoded public key or certificate');
92
+ }
93
+ const keyData = (0, base64_js_1.decodeArrayBuffer)((0, crypto_utils_js_1.removePemFormatting)(publicKeyPem));
94
+ // Try RSA first - use JWK export to get modulus size
95
+ try {
96
+ const modulusBits = await extractRsaModulusBitLength(keyData);
97
+ let algorithm;
98
+ if (modulusBits < declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS) {
99
+ throw new errors_js_1.ConfigurationError(`RSA key size ${modulusBits} bits is below the minimum of ${declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS} bits`);
100
+ }
101
+ else if (modulusBits <= 2048) {
102
+ algorithm = 'rsa:2048';
103
+ }
104
+ else if (modulusBits <= 4096) {
105
+ algorithm = 'rsa:4096';
106
+ }
107
+ else {
108
+ throw new errors_js_1.ConfigurationError(`Unsupported RSA key size: ${modulusBits} bits`);
109
+ }
110
+ return { algorithm, pem: publicKeyPem };
111
+ }
112
+ catch (e) {
113
+ // If it's our own ConfigurationError, rethrow
114
+ if (e instanceof errors_js_1.ConfigurationError) {
115
+ throw e;
116
+ }
117
+ // Not an RSA key, try EC next
118
+ }
119
+ // Try EC - parse curve from OID
120
+ try {
121
+ const detectedCurve = extractEcCurveFromPublicKey(keyData);
122
+ const curveMap = {
123
+ 'P-256': 'ec:secp256r1',
124
+ 'P-384': 'ec:secp384r1',
125
+ 'P-521': 'ec:secp521r1',
126
+ };
127
+ return { algorithm: curveMap[detectedCurve], pem: publicKeyPem };
128
+ }
129
+ catch {
130
+ // Not a valid EC key
131
+ }
132
+ throw new errors_js_1.ConfigurationError('Unable to determine public key algorithm - unsupported key type');
133
+ }
134
+ /**
135
+ * Convert a JWK (JSON Web Key) to PEM format.
136
+ */
137
+ async function jwkToPublicKeyPem(jwk) {
138
+ let key;
139
+ if (jwk.kty === 'RSA') {
140
+ // RSA key
141
+ key = await crypto.subtle.importKey('jwk', jwk, { name: 'RSA-OAEP', hash: 'SHA-256' }, true, [
142
+ 'encrypt',
143
+ ]);
144
+ }
145
+ else if (jwk.kty === 'EC') {
146
+ // EC key
147
+ const crv = jwk.crv;
148
+ if (!crv || !['P-256', 'P-384', 'P-521'].includes(crv)) {
149
+ throw new errors_js_1.ConfigurationError(`Unsupported EC curve: ${crv}`);
150
+ }
151
+ key = await crypto.subtle.importKey('jwk', jwk, { name: 'ECDH', namedCurve: crv }, true, []);
152
+ }
153
+ else {
154
+ throw new errors_js_1.ConfigurationError(`Unsupported JWK key type: ${jwk.kty}`);
155
+ }
156
+ const spkiBuffer = await crypto.subtle.exportKey('spki', key);
157
+ return (0, crypto_utils_js_1.formatAsPem)(spkiBuffer, 'PUBLIC KEY');
158
+ }
159
+ /**
160
+ * Convert a PEM public key to JWK format.
161
+ * Returns only public key components (no private key data).
162
+ */
163
+ async function publicKeyPemToJwk(publicKeyPem) {
164
+ const keyDataBase64 = (0, crypto_utils_js_1.removePemFormatting)(publicKeyPem);
165
+ const keyBuffer = (0, base64_js_1.decodeArrayBuffer)(keyDataBase64);
166
+ const hex = (0, hex_js_1.encodeArrayBuffer)(keyBuffer);
167
+ // Detect key type using OID
168
+ const algorithmName = (0, pemPublicToCrypto_js_1.guessAlgorithmName)(hex);
169
+ if (algorithmName === 'ECDH' || algorithmName === 'ECDSA') {
170
+ // EC key - detect curve from OID
171
+ const namedCurve = (0, pemPublicToCrypto_js_1.guessCurveName)(hex);
172
+ const key = await crypto.subtle.importKey('spki', keyBuffer, { name: 'ECDSA', namedCurve }, true, ['verify']);
173
+ const jwk = await crypto.subtle.exportKey('jwk', key);
174
+ // Return only public key components
175
+ const { kty, crv, x, y } = jwk;
176
+ return { kty, crv, x, y };
177
+ }
178
+ else {
179
+ // RSA key
180
+ const key = await crypto.subtle.importKey('spki', keyBuffer, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, true, ['verify']);
181
+ const jwk = await crypto.subtle.exportKey('jwk', key);
182
+ // Return only public key components
183
+ const { kty, e, n } = jwk;
184
+ return { kty, e, n };
185
+ }
186
+ }
187
+ /**
188
+ * Import a PEM public key as an opaque key.
189
+ */
190
+ async function importPublicKey(pem, options) {
191
+ const { usage = 'encrypt', extractable = true, algorithmHint } = options;
192
+ // Detect algorithm from PEM; also normalises certificates → plain SPKI PEM.
193
+ const keyInfo = await parsePublicKeyPem(pem);
194
+ const algorithm = algorithmHint || keyInfo.algorithm;
195
+ // Use keyInfo.pem (normalised SPKI) not the original pem, which may be a certificate.
196
+ // Passing raw X.509 DER bytes to crypto.subtle.importKey('spki') would throw DataError.
197
+ const keyData = (0, crypto_utils_js_1.removePemFormatting)(keyInfo.pem);
198
+ const keyBuffer = (0, base64_js_1.decodeArrayBuffer)(keyData);
199
+ // Determine Web Crypto algorithm and usages based on key type and usage
200
+ let cryptoAlgorithm;
201
+ let keyUsages;
202
+ if (algorithm.startsWith('rsa:')) {
203
+ if (usage === 'encrypt') {
204
+ cryptoAlgorithm = (0, rsa_js_1.rsaOaepSha1)();
205
+ keyUsages = ['encrypt'];
206
+ }
207
+ else if (usage === 'sign') {
208
+ cryptoAlgorithm = { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' };
209
+ keyUsages = ['verify'];
210
+ }
211
+ else {
212
+ throw new errors_js_1.ConfigurationError('RSA keys only support usage: encrypt or sign');
213
+ }
214
+ }
215
+ else if (algorithm.startsWith('ec:')) {
216
+ const curve = algorithm.split(':')[1];
217
+ const namedCurve = curve === 'secp256r1'
218
+ ? 'P-256'
219
+ : curve === 'secp384r1'
220
+ ? 'P-384'
221
+ : curve === 'secp521r1'
222
+ ? 'P-521'
223
+ : (() => {
224
+ throw new errors_js_1.ConfigurationError(`Unsupported EC curve: ${curve}`);
225
+ })();
226
+ if (usage === 'derive') {
227
+ cryptoAlgorithm = { name: 'ECDH', namedCurve };
228
+ keyUsages = [];
229
+ }
230
+ else if (usage === 'sign') {
231
+ cryptoAlgorithm = { name: 'ECDSA', namedCurve };
232
+ keyUsages = ['verify'];
233
+ }
234
+ else {
235
+ throw new errors_js_1.ConfigurationError('EC keys only support usage: derive or sign');
236
+ }
237
+ }
238
+ else {
239
+ throw new errors_js_1.ConfigurationError(`Unsupported algorithm: ${algorithm}`);
240
+ }
241
+ // Import as CryptoKey
242
+ const cryptoKey = await crypto.subtle.importKey('spki', keyBuffer, cryptoAlgorithm, extractable, keyUsages);
243
+ return (0, keys_js_1.wrapPublicKey)(cryptoKey, algorithm);
244
+ }
245
+ /**
246
+ * Import a PEM private key as an opaque key.
247
+ */
248
+ async function importPrivateKey(pem, options) {
249
+ const { usage = 'encrypt', extractable = true, algorithmHint } = options;
250
+ // Detect algorithm from PEM structure (similar to public key detection)
251
+ // For now, use algorithmHint if provided, otherwise detect from key structure
252
+ let algorithm;
253
+ const keyData = (0, crypto_utils_js_1.removePemFormatting)(pem);
254
+ const keyBuffer = (0, base64_js_1.decodeArrayBuffer)(keyData);
255
+ if (algorithmHint) {
256
+ algorithm = algorithmHint;
257
+ }
258
+ else {
259
+ // PKCS#8 PrivateKeyInfo embeds the same AlgorithmIdentifier OIDs as SPKI,
260
+ // so guessAlgorithmName / guessCurveName work on private key bytes too.
261
+ const hex = (0, hex_js_1.encodeArrayBuffer)(keyBuffer);
262
+ const algorithmName = (0, pemPublicToCrypto_js_1.guessAlgorithmName)(hex); // throws on unrecognised OID
263
+ if (algorithmName === 'ECDH' || algorithmName === 'ECDSA') {
264
+ const namedCurve = (0, pemPublicToCrypto_js_1.guessCurveName)(hex);
265
+ const curveMap = {
266
+ 'P-256': 'ec:secp256r1',
267
+ 'P-384': 'ec:secp384r1',
268
+ 'P-521': 'ec:secp521r1',
269
+ };
270
+ const mapped = curveMap[namedCurve];
271
+ if (!mapped)
272
+ throw new errors_js_1.ConfigurationError(`Unsupported EC curve in private key: ${namedCurve}`);
273
+ algorithm = mapped;
274
+ }
275
+ else {
276
+ // RSA — determine key size by importing and reading modulus length from JWK
277
+ const tempKey = await crypto.subtle.importKey('pkcs8', keyBuffer, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, true, ['sign']);
278
+ const jwk = await crypto.subtle.exportKey('jwk', tempKey);
279
+ if (!jwk.n) {
280
+ throw new errors_js_1.ConfigurationError('Invalid RSA private key: missing modulus');
281
+ }
282
+ const modulusBits = base64urlByteLength(jwk.n) * 8;
283
+ if (modulusBits < declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS) {
284
+ throw new errors_js_1.ConfigurationError(`RSA key size ${modulusBits} bits is below the minimum of ${declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS} bits`);
285
+ }
286
+ algorithm = modulusBits <= 2048 ? 'rsa:2048' : 'rsa:4096';
287
+ }
288
+ }
289
+ // Determine Web Crypto algorithm and usages
290
+ let cryptoAlgorithm;
291
+ let keyUsages;
292
+ if (algorithm.startsWith('rsa:')) {
293
+ if (usage === 'encrypt') {
294
+ cryptoAlgorithm = (0, rsa_js_1.rsaOaepSha1)();
295
+ keyUsages = ['decrypt'];
296
+ }
297
+ else if (usage === 'sign') {
298
+ cryptoAlgorithm = { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' };
299
+ keyUsages = ['sign'];
300
+ }
301
+ else {
302
+ throw new errors_js_1.ConfigurationError('RSA keys only support usage: encrypt or sign');
303
+ }
304
+ }
305
+ else if (algorithm.startsWith('ec:')) {
306
+ const curve = algorithm.split(':')[1];
307
+ const namedCurve = curve === 'secp256r1'
308
+ ? 'P-256'
309
+ : curve === 'secp384r1'
310
+ ? 'P-384'
311
+ : curve === 'secp521r1'
312
+ ? 'P-521'
313
+ : (() => {
314
+ throw new errors_js_1.ConfigurationError(`Unsupported EC curve: ${curve}`);
315
+ })();
316
+ if (usage === 'derive') {
317
+ cryptoAlgorithm = { name: 'ECDH', namedCurve };
318
+ keyUsages = ['deriveBits'];
319
+ }
320
+ else if (usage === 'sign') {
321
+ cryptoAlgorithm = { name: 'ECDSA', namedCurve };
322
+ keyUsages = ['sign'];
323
+ }
324
+ else {
325
+ throw new errors_js_1.ConfigurationError('EC keys only support usage: derive or sign');
326
+ }
327
+ }
328
+ else {
329
+ throw new errors_js_1.ConfigurationError(`Unsupported algorithm: ${algorithm}`);
330
+ }
331
+ // Import as CryptoKey
332
+ const cryptoKey = await crypto.subtle.importKey('pkcs8', keyBuffer, cryptoAlgorithm, extractable, keyUsages);
333
+ return (0, keys_js_1.wrapPrivateKey)(cryptoKey, algorithm);
334
+ }
335
+ /**
336
+ * Export an opaque public key to PEM format.
337
+ */
338
+ async function exportPublicKeyPem(key) {
339
+ const cryptoKey = (0, keys_js_1.unwrapKey)(key);
340
+ const keyBuffer = await crypto.subtle.exportKey('spki', cryptoKey);
341
+ return (0, crypto_utils_js_1.formatAsPem)(keyBuffer, 'PUBLIC KEY');
342
+ }
343
+ /**
344
+ * Export an opaque private key to PEM format.
345
+ * ONLY USE FOR TESTING/DEVELOPMENT. Private keys should NOT be exportable in secure environments.
346
+ */
347
+ async function exportPrivateKeyPem(key) {
348
+ const cryptoKey = (0, keys_js_1.unwrapKey)(key);
349
+ const keyBuffer = await crypto.subtle.exportKey('pkcs8', cryptoKey);
350
+ return (0, crypto_utils_js_1.formatAsPem)(keyBuffer, 'PRIVATE KEY');
351
+ }
352
+ /**
353
+ * Export an opaque public key to JWK format.
354
+ */
355
+ async function exportPublicKeyJwk(key) {
356
+ const cryptoKey = (0, keys_js_1.unwrapKey)(key);
357
+ return await crypto.subtle.exportKey('jwk', cryptoKey);
358
+ }
359
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"key-format.js","sourceRoot":"","sources":["../../../../../../tdf3/src/crypto/core/key-format.ts"],"names":[],"mappings":";;AAwBA,kDAwBC;AAqDD,8CAmDC;AAKD,8CAqBC;AAMD,8CAoCC;AAKD,0CA6DC;AAKD,4CAqGC;AAKD,gDAIC;AAMD,kDAIC;AAKD,gDAGC;AAnaD,wDAO4B;AAC5B,yDAA+D;AAC/D,wDAAsE;AACtE,6DAAkF;AAClF,mEAAwF;AACxF,+BAA8C;AAC9C,sFAIqD;AACrD,uCAAqE;AACrE,qCAAuC;AAEvC;;GAEG;AACI,KAAK,UAAU,mBAAmB,CACvC,SAAiB,EACjB,YAAqB;IAErB,gDAAgD;IAChD,IAAI,SAAS,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;QACtD,IAAI,GAAG,GAAG,YAAY,CAAC;QACvB,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,8CAA8C;YAC9C,MAAM,QAAQ,GAAG,SAAS,CAAC,OAAO,CAAC,uCAAuC,EAAE,EAAE,CAAC,CAAC;YAChF,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,QAAQ,CAAC,CAAC;YACzC,MAAM,GAAG,GAAG,IAAA,0BAAS,EAAC,SAAS,CAAC,CAAC;YACjC,GAAG,GAAG,IAAA,+BAAQ,EAAC,GAAG,CAAC,CAAC;QACtB,CAAC;QACD,MAAM,IAAI,GAAG,MAAM,IAAA,iBAAU,EAAC,SAAS,EAAE,GAAG,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC;QACrE,OAAO,IAAA,iBAAU,EAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED,iDAAiD;IACjD,IAAI,SAAS,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;QACrD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,MAAM,IAAI,8BAAkB,CAAC,uDAAuD,CAAC,CAAC;AACxF,CAAC;AAED,MAAM,mBAAmB,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAU,CAAC;AAGjE;;;GAGG;AACH,SAAS,mBAAmB,CAAC,SAAiB;IAC5C,kDAAkD;IAClD,MAAM,OAAO,GAAG,CAAC,CAAC,GAAG,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,MAAM,MAAM,GAAG,SAAS,GAAG,GAAG,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;IAC/C,OAAO,IAAA,6BAAY,EAAC,MAAM,CAAC,CAAC,UAAU,CAAC;AACzC,CAAC;AAED;;;GAGG;AACH,SAAS,2BAA2B,CAAC,OAAoB;IACvD,iCAAiC;IACjC,MAAM,MAAM,GAAG,IAAA,0BAAS,EAAC,OAAO,CAAC,CAAC;IAClC,iEAAiE;IACjE,MAAM,SAAS,GAAG,IAAA,qCAAc,EAAC,MAAM,CAAC,CAAC;IACzC,OAAO,SAA6B,CAAC;AACvC,CAAC;AAED;;;GAGG;AACH,KAAK,UAAU,0BAA0B,CAAC,OAAoB;IAC5D,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,OAAO,EACP,EAAE,IAAI,EAAE,UAAU,EAAE,IAAI,EAAE,SAAS,EAAE,EACrC,IAAI,EACJ,CAAC,SAAS,CAAC,CACZ,CAAC;IACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IACtD,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,8BAAkB,CAAC,kCAAkC,CAAC,CAAC;IACnE,CAAC;IACD,uCAAuC;IACvC,iDAAiD;IACjD,OAAO,mBAAmB,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;AACxC,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,iBAAiB,CAAC,GAAW;IACjD,iDAAiD;IACjD,IAAI,YAAY,GAAG,GAAG,CAAC;IACvB,IAAI,GAAG,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;QAChD,YAAY,GAAG,MAAM,mBAAmB,CAAC,GAAG,CAAC,CAAC;IAChD,CAAC;IAED,IAAI,CAAC,YAAY,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;QACzD,MAAM,IAAI,8BAAkB,CAAC,uDAAuD,CAAC,CAAC;IACxF,CAAC;IAED,MAAM,OAAO,GAAG,IAAA,6BAAY,EAAC,IAAA,qCAAmB,EAAC,YAAY,CAAC,CAAC,CAAC;IAEhE,qDAAqD;IACrD,IAAI,CAAC;QACH,MAAM,WAAW,GAAG,MAAM,0BAA0B,CAAC,OAAO,CAAC,CAAC;QAC9D,IAAI,SAAqC,CAAC;QAC1C,IAAI,WAAW,GAAG,8CAA4B,EAAE,CAAC;YAC/C,MAAM,IAAI,8BAAkB,CAC1B,gBAAgB,WAAW,iCAAiC,8CAA4B,OAAO,CAChG,CAAC;QACJ,CAAC;aAAM,IAAI,WAAW,IAAI,IAAI,EAAE,CAAC;YAC/B,SAAS,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,IAAI,WAAW,IAAI,IAAI,EAAE,CAAC;YAC/B,SAAS,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,6BAA6B,WAAW,OAAO,CAAC,CAAC;QAChF,CAAC;QACD,OAAO,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,CAAC;IAC1C,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,8CAA8C;QAC9C,IAAI,CAAC,YAAY,8BAAkB,EAAE,CAAC;YACpC,MAAM,CAAC,CAAC;QACV,CAAC;QACD,8BAA8B;IAChC,CAAC;IAED,gCAAgC;IAChC,IAAI,CAAC;QACH,MAAM,aAAa,GAAG,2BAA2B,CAAC,OAAO,CAAC,CAAC;QAC3D,MAAM,QAAQ,GAAG;YACf,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,cAAc;SACf,CAAC;QACX,OAAO,EAAE,SAAS,EAAE,QAAQ,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,YAAY,EAAE,CAAC;IACnE,CAAC;IAAC,MAAM,CAAC;QACP,qBAAqB;IACvB,CAAC;IAED,MAAM,IAAI,8BAAkB,CAAC,iEAAiE,CAAC,CAAC;AAClG,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,iBAAiB,CAAC,GAAe;IACrD,IAAI,GAAc,CAAC;IAEnB,IAAI,GAAG,CAAC,GAAG,KAAK,KAAK,EAAE,CAAC;QACtB,UAAU;QACV,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,UAAU,EAAE,IAAI,EAAE,SAAS,EAAE,EAAE,IAAI,EAAE;YAC3F,SAAS;SACV,CAAC,CAAC;IACL,CAAC;SAAM,IAAI,GAAG,CAAC,GAAG,KAAK,IAAI,EAAE,CAAC;QAC5B,SAAS;QACT,MAAM,GAAG,GAAG,GAAG,CAAC,GAAG,CAAC;QACpB,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACvD,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,GAAG,EAAE,CAAC,CAAC;QAC/D,CAAC;QACD,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC;IAC/F,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,8BAAkB,CAAC,6BAA6B,GAAG,CAAC,GAAG,EAAE,CAAC,CAAC;IACvE,CAAC;IAED,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IAC9D,OAAO,IAAA,6BAAW,EAAC,UAAU,EAAE,YAAY,CAAC,CAAC;AAC/C,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,iBAAiB,CAAC,YAAoB;IAC1D,MAAM,aAAa,GAAG,IAAA,qCAAmB,EAAC,YAAY,CAAC,CAAC;IACxD,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,aAAa,CAAC,CAAC;IAC9C,MAAM,GAAG,GAAG,IAAA,0BAAS,EAAC,SAAS,CAAC,CAAC;IAEjC,4BAA4B;IAC5B,MAAM,aAAa,GAAG,IAAA,yCAAkB,EAAC,GAAG,CAAC,CAAC;IAE9C,IAAI,aAAa,KAAK,MAAM,IAAI,aAAa,KAAK,OAAO,EAAE,CAAC;QAC1D,iCAAiC;QACjC,MAAM,UAAU,GAAG,IAAA,qCAAc,EAAC,GAAG,CAAC,CAAC;QACvC,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,SAAS,EACT,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,EAC7B,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;QACtD,oCAAoC;QACpC,MAAM,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,GAAG,CAAC;QAC/B,OAAO,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC;IAC5B,CAAC;SAAM,CAAC;QACN,UAAU;QACV,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,SAAS,EACT,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,EAC9C,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;QACtD,oCAAoC;QACpC,MAAM,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,GAAG,CAAC;QAC1B,OAAO,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC;IACvB,CAAC;AACH,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,eAAe,CAAC,GAAW,EAAE,OAAmB;IACpE,MAAM,EAAE,KAAK,GAAG,SAAS,EAAE,WAAW,GAAG,IAAI,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAEzE,4EAA4E;IAC5E,MAAM,OAAO,GAAG,MAAM,iBAAiB,CAAC,GAAG,CAAC,CAAC;IAC7C,MAAM,SAAS,GAAG,aAAa,IAAI,OAAO,CAAC,SAAS,CAAC;IACrD,sFAAsF;IACtF,wFAAwF;IACxF,MAAM,OAAO,GAAG,IAAA,qCAAmB,EAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IACjD,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,OAAO,CAAC,CAAC;IAExC,wEAAwE;IACxE,IAAI,eAA0D,CAAC;IAC/D,IAAI,SAAqB,CAAC;IAE1B,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,eAAe,GAAG,IAAA,oBAAW,GAAE,CAAC;YAChC,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC1B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACjE,SAAS,GAAG,CAAC,QAAQ,CAAC,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GACd,KAAK,KAAK,WAAW;YACnB,CAAC,CAAC,OAAO;YACT,CAAC,CAAC,KAAK,KAAK,WAAW;gBACrB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,KAAK,KAAK,WAAW;oBACrB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,CAAC,GAAG,EAAE;wBACJ,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBACjE,CAAC,CAAC,EAAE,CAAC;QAEf,IAAI,KAAK,KAAK,QAAQ,EAAE,CAAC;YACvB,eAAe,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;YAC/C,SAAS,GAAG,EAAE,CAAC;QACjB,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC;YAChD,SAAS,GAAG,CAAC,QAAQ,CAAC,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,4CAA4C,CAAC,CAAC;QAC7E,CAAC;IACH,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;IACtE,CAAC;IAED,sBAAsB;IACtB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,MAAM,EACN,SAAS,EACT,eAAe,EACf,WAAW,EACX,SAAS,CACV,CAAC;IAEF,OAAO,IAAA,uBAAa,EAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC7C,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,gBAAgB,CAAC,GAAW,EAAE,OAAmB;IACrE,MAAM,EAAE,KAAK,GAAG,SAAS,EAAE,WAAW,GAAG,IAAI,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAEzE,wEAAwE;IACxE,8EAA8E;IAC9E,IAAI,SAAuB,CAAC;IAE5B,MAAM,OAAO,GAAG,IAAA,qCAAmB,EAAC,GAAG,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,OAAO,CAAC,CAAC;IAExC,IAAI,aAAa,EAAE,CAAC;QAClB,SAAS,GAAG,aAAa,CAAC;IAC5B,CAAC;SAAM,CAAC;QACN,0EAA0E;QAC1E,wEAAwE;QACxE,MAAM,GAAG,GAAG,IAAA,0BAAS,EAAC,SAAS,CAAC,CAAC;QACjC,MAAM,aAAa,GAAG,IAAA,yCAAkB,EAAC,GAAG,CAAC,CAAC,CAAC,6BAA6B;QAC5E,IAAI,aAAa,KAAK,MAAM,IAAI,aAAa,KAAK,OAAO,EAAE,CAAC;YAC1D,MAAM,UAAU,GAAG,IAAA,qCAAc,EAAC,GAAG,CAAC,CAAC;YACvC,MAAM,QAAQ,GAAiC;gBAC7C,OAAO,EAAE,cAAc;gBACvB,OAAO,EAAE,cAAc;gBACvB,OAAO,EAAE,cAAc;aACxB,CAAC;YACF,MAAM,MAAM,GAAG,QAAQ,CAAC,UAAU,CAAC,CAAC;YACpC,IAAI,CAAC,MAAM;gBACT,MAAM,IAAI,8BAAkB,CAAC,wCAAwC,UAAU,EAAE,CAAC,CAAC;YACrF,SAAS,GAAG,MAAM,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,4EAA4E;YAC5E,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC3C,OAAO,EACP,SAAS,EACT,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,EAC9C,IAAI,EACJ,CAAC,MAAM,CAAC,CACT,CAAC;YACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;YAC1D,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,8BAAkB,CAAC,0CAA0C,CAAC,CAAC;YAC3E,CAAC;YACD,MAAM,WAAW,GAAG,mBAAmB,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;YACnD,IAAI,WAAW,GAAG,8CAA4B,EAAE,CAAC;gBAC/C,MAAM,IAAI,8BAAkB,CAC1B,gBAAgB,WAAW,iCAAiC,8CAA4B,OAAO,CAChG,CAAC;YACJ,CAAC;YACD,SAAS,GAAG,WAAW,IAAI,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,UAAU,CAAC;QAC5D,CAAC;IACH,CAAC;IAED,4CAA4C;IAC5C,IAAI,eAA0D,CAAC;IAC/D,IAAI,SAAqB,CAAC;IAE1B,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,eAAe,GAAG,IAAA,oBAAW,GAAE,CAAC;YAChC,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC1B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACjE,SAAS,GAAG,CAAC,MAAM,CAAC,CAAC;QACvB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GACd,KAAK,KAAK,WAAW;YACnB,CAAC,CAAC,OAAO;YACT,CAAC,CAAC,KAAK,KAAK,WAAW;gBACrB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,KAAK,KAAK,WAAW;oBACrB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,CAAC,GAAG,EAAE;wBACJ,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBACjE,CAAC,CAAC,EAAE,CAAC;QAEf,IAAI,KAAK,KAAK,QAAQ,EAAE,CAAC;YACvB,eAAe,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;YAC/C,SAAS,GAAG,CAAC,YAAY,CAAC,CAAC;QAC7B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC;YAChD,SAAS,GAAG,CAAC,MAAM,CAAC,CAAC;QACvB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,4CAA4C,CAAC,CAAC;QAC7E,CAAC;IACH,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;IACtE,CAAC;IAED,sBAAsB;IACtB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,OAAO,EACP,SAAS,EACT,eAAe,EACf,WAAW,EACX,SAAS,CACV,CAAC;IAEF,OAAO,IAAA,wBAAc,EAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC9C,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,kBAAkB,CAAC,GAAc;IACrD,MAAM,SAAS,GAAG,IAAA,mBAAS,EAAC,GAAG,CAAC,CAAC;IACjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;IACnE,OAAO,IAAA,6BAAW,EAAC,SAAS,EAAE,YAAY,CAAC,CAAC;AAC9C,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,mBAAmB,CAAC,GAAe;IACvD,MAAM,SAAS,GAAG,IAAA,mBAAS,EAAC,GAAG,CAAC,CAAC;IACjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;IACpE,OAAO,IAAA,6BAAW,EAAC,SAAS,EAAE,aAAa,CAAC,CAAC;AAC/C,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,kBAAkB,CAAC,GAAc;IACrD,MAAM,SAAS,GAAG,IAAA,mBAAS,EAAC,GAAG,CAAC,CAAC;IACjC,OAAO,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;AACzD,CAAC"}
@@ -0,0 +1,85 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.wrapPublicKey = wrapPublicKey;
4
+ exports.wrapPrivateKey = wrapPrivateKey;
5
+ exports.unwrapKey = unwrapKey;
6
+ exports.wrapSymmetricKey = wrapSymmetricKey;
7
+ exports.unwrapSymmetricKey = unwrapSymmetricKey;
8
+ /**
9
+ * Wrap a CryptoKey as an opaque PublicKey.
10
+ * @internal
11
+ */
12
+ function wrapPublicKey(key, algorithm) {
13
+ const result = {
14
+ _brand: 'PublicKey',
15
+ algorithm,
16
+ _internal: key,
17
+ };
18
+ if (algorithm.startsWith('rsa:')) {
19
+ result.modulusBits = parseInt(algorithm.split(':')[1], 10);
20
+ }
21
+ else if (algorithm.startsWith('ec:')) {
22
+ const curvePart = algorithm.split(':')[1];
23
+ result.curve =
24
+ curvePart === 'secp256r1'
25
+ ? 'P-256'
26
+ : curvePart === 'secp384r1'
27
+ ? 'P-384'
28
+ : curvePart === 'secp521r1'
29
+ ? 'P-521'
30
+ : undefined;
31
+ }
32
+ return result;
33
+ }
34
+ /**
35
+ * Wrap a CryptoKey as an opaque PrivateKey.
36
+ * @internal
37
+ */
38
+ function wrapPrivateKey(key, algorithm) {
39
+ const result = {
40
+ _brand: 'PrivateKey',
41
+ algorithm,
42
+ _internal: key,
43
+ };
44
+ if (algorithm.startsWith('rsa:')) {
45
+ result.modulusBits = parseInt(algorithm.split(':')[1], 10);
46
+ }
47
+ else if (algorithm.startsWith('ec:')) {
48
+ const curvePart = algorithm.split(':')[1];
49
+ result.curve =
50
+ curvePart === 'secp256r1'
51
+ ? 'P-256'
52
+ : curvePart === 'secp384r1'
53
+ ? 'P-384'
54
+ : curvePart === 'secp521r1'
55
+ ? 'P-521'
56
+ : undefined;
57
+ }
58
+ return result;
59
+ }
60
+ /**
61
+ * Unwrap an opaque key to get the internal CryptoKey.
62
+ * @internal
63
+ */
64
+ function unwrapKey(key) {
65
+ return key._internal;
66
+ }
67
+ /**
68
+ * Wrap raw key bytes as an opaque SymmetricKey.
69
+ * @internal
70
+ */
71
+ function wrapSymmetricKey(keyBytes) {
72
+ return {
73
+ _brand: 'SymmetricKey',
74
+ length: keyBytes.length * 8, // bits
75
+ _internal: keyBytes,
76
+ };
77
+ }
78
+ /**
79
+ * Unwrap an opaque SymmetricKey to get raw bytes.
80
+ * @internal
81
+ */
82
+ function unwrapSymmetricKey(key) {
83
+ return key._internal;
84
+ }
85
+ //# sourceMappingURL=data:application/json;base64,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