@opentdf/sdk 0.8.0-beta.71 → 0.8.0-beta.75
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +5 -30
- package/dist/cjs/src/{nanotdf-crypto → crypto}/ciphers.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/decrypt.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/digest.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/ecdsaSignature.js +2 -2
- package/dist/cjs/src/{nanotdf-crypto → crypto}/encrypt.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/enums.js +1 -1
- package/dist/cjs/src/crypto/exportCryptoKey.js +20 -0
- package/dist/cjs/src/{nanotdf-crypto → crypto}/generateKeyPair.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/generateRandomNumber.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/index.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/keyAgreement.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/pemPublicToCrypto.js +1 -1
- package/dist/cjs/src/opentdf.js +9 -260
- package/dist/cjs/src/utils.js +2 -2
- package/dist/cjs/tdf3/index.js +7 -8
- package/dist/cjs/tdf3/src/models/key-access.js +4 -4
- package/dist/cjs/tdf3/src/tdf.js +4 -4
- package/dist/types/src/crypto/ciphers.d.ts.map +1 -0
- package/dist/types/src/crypto/decrypt.d.ts.map +1 -0
- package/dist/types/src/crypto/digest.d.ts.map +1 -0
- package/dist/types/src/crypto/ecdsaSignature.d.ts.map +1 -0
- package/dist/types/src/crypto/encrypt.d.ts.map +1 -0
- package/dist/types/src/crypto/enums.d.ts.map +1 -0
- package/dist/types/src/crypto/exportCryptoKey.d.ts.map +1 -0
- package/dist/types/src/crypto/generateKeyPair.d.ts.map +1 -0
- package/dist/types/src/crypto/generateRandomNumber.d.ts.map +1 -0
- package/dist/types/src/crypto/index.d.ts.map +1 -0
- package/dist/types/src/crypto/keyAgreement.d.ts.map +1 -0
- package/dist/types/src/crypto/pemPublicToCrypto.d.ts.map +1 -0
- package/dist/types/src/opentdf.d.ts +1 -65
- package/dist/types/src/opentdf.d.ts.map +1 -1
- package/dist/types/tdf3/index.d.ts +4 -3
- package/dist/types/tdf3/index.d.ts.map +1 -1
- package/dist/web/src/crypto/ciphers.js +14 -0
- package/dist/web/src/{nanotdf-crypto → crypto}/decrypt.js +1 -1
- package/dist/web/src/crypto/digest.js +4 -0
- package/dist/web/src/{nanotdf-crypto → crypto}/ecdsaSignature.js +2 -2
- package/dist/web/src/{nanotdf-crypto → crypto}/encrypt.js +1 -1
- package/dist/web/src/{nanotdf-crypto → crypto}/enums.js +1 -1
- package/dist/web/src/crypto/exportCryptoKey.js +17 -0
- package/dist/web/src/crypto/generateKeyPair.js +10 -0
- package/dist/web/src/crypto/generateRandomNumber.js +9 -0
- package/dist/web/src/crypto/index.js +11 -0
- package/dist/web/src/{nanotdf-crypto → crypto}/keyAgreement.js +1 -1
- package/dist/web/src/{nanotdf-crypto → crypto}/pemPublicToCrypto.js +1 -1
- package/dist/web/src/opentdf.js +8 -255
- package/dist/web/src/utils.js +2 -2
- package/dist/web/tdf3/index.js +4 -3
- package/dist/web/tdf3/src/models/key-access.js +4 -4
- package/dist/web/tdf3/src/tdf.js +4 -4
- package/package.json +1 -6
- package/src/{nanotdf-crypto → crypto}/ecdsaSignature.ts +1 -1
- package/src/opentdf.ts +6 -343
- package/src/utils.ts +1 -1
- package/tdf3/index.ts +2 -12
- package/tdf3/src/models/key-access.ts +3 -3
- package/tdf3/src/tdf.ts +3 -3
- package/dist/cjs/src/nanoclients.js +0 -292
- package/dist/cjs/src/nanoindex.js +0 -47
- package/dist/cjs/src/nanotdf/Client.js +0 -315
- package/dist/cjs/src/nanotdf/NanoTDF.js +0 -94
- package/dist/cjs/src/nanotdf/browser-entry.js +0 -19
- package/dist/cjs/src/nanotdf/constants.js +0 -5
- package/dist/cjs/src/nanotdf/decrypt.js +0 -17
- package/dist/cjs/src/nanotdf/encrypt-dataset.js +0 -38
- package/dist/cjs/src/nanotdf/encrypt.js +0 -132
- package/dist/cjs/src/nanotdf/enum/CipherEnum.js +0 -13
- package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +0 -15
- package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +0 -8
- package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +0 -11
- package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +0 -10
- package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +0 -11
- package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +0 -28
- package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +0 -11
- package/dist/cjs/src/nanotdf/index.js +0 -25
- package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +0 -3
- package/dist/cjs/src/nanotdf/models/Ciphers.js +0 -61
- package/dist/cjs/src/nanotdf/models/DefaultParams.js +0 -27
- package/dist/cjs/src/nanotdf/models/EcCurves.js +0 -39
- package/dist/cjs/src/nanotdf/models/Header.js +0 -255
- package/dist/cjs/src/nanotdf/models/Payload.js +0 -158
- package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +0 -73
- package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +0 -82
- package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +0 -38
- package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +0 -62
- package/dist/cjs/src/nanotdf/models/ResourceLocator.js +0 -211
- package/dist/cjs/src/nanotdf/models/Signature.js +0 -77
- package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +0 -20
- package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +0 -38
- package/dist/cjs/src/types/index.js +0 -3
- package/dist/types/src/nanoclients.d.ts +0 -106
- package/dist/types/src/nanoclients.d.ts.map +0 -1
- package/dist/types/src/nanoindex.d.ts +0 -5
- package/dist/types/src/nanoindex.d.ts.map +0 -1
- package/dist/types/src/nanotdf/Client.d.ts +0 -91
- package/dist/types/src/nanotdf/Client.d.ts.map +0 -1
- package/dist/types/src/nanotdf/NanoTDF.d.ts +0 -24
- package/dist/types/src/nanotdf/NanoTDF.d.ts.map +0 -1
- package/dist/types/src/nanotdf/browser-entry.d.ts +0 -17
- package/dist/types/src/nanotdf/browser-entry.d.ts.map +0 -1
- package/dist/types/src/nanotdf/constants.d.ts +0 -2
- package/dist/types/src/nanotdf/constants.d.ts.map +0 -1
- package/dist/types/src/nanotdf/decrypt.d.ts +0 -9
- package/dist/types/src/nanotdf/decrypt.d.ts.map +0 -1
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts +0 -11
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +0 -1
- package/dist/types/src/nanotdf/encrypt.d.ts +0 -13
- package/dist/types/src/nanotdf/encrypt.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +0 -10
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +0 -12
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +0 -5
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +0 -8
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +0 -7
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +0 -8
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +0 -20
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +0 -1
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +0 -8
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +0 -1
- package/dist/types/src/nanotdf/index.d.ts +0 -9
- package/dist/types/src/nanotdf/index.d.ts.map +0 -1
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +0 -17
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Ciphers.d.ts +0 -14
- package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts +0 -21
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/EcCurves.d.ts +0 -15
- package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Header.d.ts +0 -73
- package/dist/types/src/nanotdf/models/Header.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Payload.d.ts +0 -47
- package/dist/types/src/nanotdf/models/Payload.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +0 -52
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +0 -35
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +0 -11
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +0 -31
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +0 -65
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Signature.d.ts +0 -33
- package/dist/types/src/nanotdf/models/Signature.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/digest.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/enums.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/index.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +0 -1
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +0 -99
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +0 -1
- package/dist/types/src/types/index.d.ts +0 -45
- package/dist/types/src/types/index.d.ts.map +0 -1
- package/dist/web/src/nanoclients.js +0 -287
- package/dist/web/src/nanoindex.js +0 -5
- package/dist/web/src/nanotdf/Client.js +0 -310
- package/dist/web/src/nanotdf/NanoTDF.js +0 -89
- package/dist/web/src/nanotdf/browser-entry.js +0 -14
- package/dist/web/src/nanotdf/constants.js +0 -2
- package/dist/web/src/nanotdf/decrypt.js +0 -14
- package/dist/web/src/nanotdf/encrypt-dataset.js +0 -32
- package/dist/web/src/nanotdf/encrypt.js +0 -126
- package/dist/web/src/nanotdf/enum/CipherEnum.js +0 -11
- package/dist/web/src/nanotdf/enum/CurveNameEnum.js +0 -13
- package/dist/web/src/nanotdf/enum/EncodingEnum.js +0 -6
- package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +0 -9
- package/dist/web/src/nanotdf/enum/ProtocolEnum.js +0 -8
- package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +0 -9
- package/dist/web/src/nanotdf/helpers/calculateByCurve.js +0 -24
- package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +0 -8
- package/dist/web/src/nanotdf/index.js +0 -11
- package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +0 -2
- package/dist/web/src/nanotdf/models/Ciphers.js +0 -54
- package/dist/web/src/nanotdf/models/DefaultParams.js +0 -22
- package/dist/web/src/nanotdf/models/EcCurves.js +0 -32
- package/dist/web/src/nanotdf/models/Header.js +0 -250
- package/dist/web/src/nanotdf/models/Payload.js +0 -156
- package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +0 -71
- package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +0 -77
- package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +0 -33
- package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +0 -57
- package/dist/web/src/nanotdf/models/ResourceLocator.js +0 -206
- package/dist/web/src/nanotdf/models/Signature.js +0 -74
- package/dist/web/src/nanotdf-crypto/ciphers.js +0 -14
- package/dist/web/src/nanotdf-crypto/digest.js +0 -4
- package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +0 -17
- package/dist/web/src/nanotdf-crypto/generateKeyPair.js +0 -10
- package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +0 -9
- package/dist/web/src/nanotdf-crypto/index.js +0 -11
- package/dist/web/src/tdf/NanoTDF/NanoTDF.js +0 -35
- package/dist/web/src/types/index.js +0 -2
- package/src/nanoclients.ts +0 -406
- package/src/nanoindex.ts +0 -4
- package/src/nanotdf/Client.ts +0 -425
- package/src/nanotdf/NanoTDF.ts +0 -120
- package/src/nanotdf/browser-entry.ts +0 -20
- package/src/nanotdf/constants.ts +0 -1
- package/src/nanotdf/decrypt.ts +0 -19
- package/src/nanotdf/encrypt-dataset.ts +0 -51
- package/src/nanotdf/encrypt.ts +0 -196
- package/src/nanotdf/enum/CipherEnum.ts +0 -10
- package/src/nanotdf/enum/CurveNameEnum.ts +0 -12
- package/src/nanotdf/enum/EncodingEnum.ts +0 -5
- package/src/nanotdf/enum/PolicyTypeEnum.ts +0 -8
- package/src/nanotdf/enum/ProtocolEnum.ts +0 -7
- package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +0 -8
- package/src/nanotdf/helpers/calculateByCurve.ts +0 -26
- package/src/nanotdf/helpers/getHkdfSalt.ts +0 -13
- package/src/nanotdf/index.ts +0 -10
- package/src/nanotdf/interfaces/PolicyInterface.ts +0 -27
- package/src/nanotdf/models/Ciphers.ts +0 -67
- package/src/nanotdf/models/DefaultParams.ts +0 -24
- package/src/nanotdf/models/EcCurves.ts +0 -40
- package/src/nanotdf/models/Header.ts +0 -322
- package/src/nanotdf/models/Payload.ts +0 -196
- package/src/nanotdf/models/Policy/AbstractPolicy.ts +0 -90
- package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +0 -101
- package/src/nanotdf/models/Policy/PolicyFactory.ts +0 -48
- package/src/nanotdf/models/Policy/RemotePolicy.ts +0 -74
- package/src/nanotdf/models/ResourceLocator.ts +0 -212
- package/src/nanotdf/models/Signature.ts +0 -85
- package/src/tdf/NanoTDF/NanoTDF.ts +0 -120
- package/src/types/index.ts +0 -55
- /package/dist/types/src/{nanotdf-crypto → crypto}/ciphers.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/decrypt.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/digest.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/ecdsaSignature.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/encrypt.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/enums.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/exportCryptoKey.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/generateKeyPair.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/generateRandomNumber.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/index.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/keyAgreement.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/pemPublicToCrypto.d.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/ciphers.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/decrypt.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/digest.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/encrypt.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/enums.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/exportCryptoKey.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/generateKeyPair.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/generateRandomNumber.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/index.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/keyAgreement.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/pemPublicToCrypto.ts +0 -0
|
@@ -1,315 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
const protobuf_1 = require("@bufbuild/protobuf");
|
|
7
|
-
const kas_pb_js_1 = require("../platform/kas/kas_pb.js");
|
|
8
|
-
const index_js_1 = require("../nanotdf-crypto/index.js");
|
|
9
|
-
const getHkdfSalt_js_1 = __importDefault(require("./helpers/getHkdfSalt.js"));
|
|
10
|
-
const DefaultParams_js_1 = __importDefault(require("./models/DefaultParams.js"));
|
|
11
|
-
const access_js_1 = require("../access.js");
|
|
12
|
-
const access_rpc_js_1 = require("../../src/access/access-rpc.js");
|
|
13
|
-
const providers_js_1 = require("../auth/providers.js");
|
|
14
|
-
const errors_js_1 = require("../errors.js");
|
|
15
|
-
const utils_js_1 = require("../utils.js");
|
|
16
|
-
function toJWSAlg(c) {
|
|
17
|
-
const { algorithm } = c;
|
|
18
|
-
switch (algorithm.name) {
|
|
19
|
-
case 'RSASSA-PKCS1-v1_5':
|
|
20
|
-
case 'RSA-PSS':
|
|
21
|
-
case 'RSA-OAEP': {
|
|
22
|
-
const r = algorithm;
|
|
23
|
-
switch (r.modulusLength) {
|
|
24
|
-
case 2048:
|
|
25
|
-
return 'RS256';
|
|
26
|
-
case 3072:
|
|
27
|
-
return 'RS384';
|
|
28
|
-
case 4096:
|
|
29
|
-
return 'RS512';
|
|
30
|
-
}
|
|
31
|
-
break;
|
|
32
|
-
}
|
|
33
|
-
case 'ECDSA':
|
|
34
|
-
case 'ECDH': {
|
|
35
|
-
return 'ES256';
|
|
36
|
-
}
|
|
37
|
-
}
|
|
38
|
-
throw new errors_js_1.ConfigurationError(`unsupported key algorithm ${JSON.stringify(algorithm)}`);
|
|
39
|
-
}
|
|
40
|
-
async function generateEphemeralKeyPair() {
|
|
41
|
-
const { publicKey, privateKey } = await (0, index_js_1.generateKeyPair)();
|
|
42
|
-
if (!privateKey || !publicKey) {
|
|
43
|
-
throw Error('Key pair generation failed');
|
|
44
|
-
}
|
|
45
|
-
return { publicKey, privateKey };
|
|
46
|
-
}
|
|
47
|
-
async function generateSignerKeyPair() {
|
|
48
|
-
return crypto.subtle.generateKey({
|
|
49
|
-
name: 'RSASSA-PKCS1-v1_5',
|
|
50
|
-
hash: 'SHA-256',
|
|
51
|
-
modulusLength: 2048,
|
|
52
|
-
publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
|
|
53
|
-
}, true, ['sign', 'verify']);
|
|
54
|
-
}
|
|
55
|
-
/**
|
|
56
|
-
* A Client encapsulates sessions interacting with TDF3 and nanoTDF backends, KAS and any
|
|
57
|
-
* plugin-based sessions like identity and further attribute control. Most importantly, it is responsible
|
|
58
|
-
* for local key and token management, including the ephemeral public/private keypairs
|
|
59
|
-
* used for encrypting and decrypting information.
|
|
60
|
-
*
|
|
61
|
-
* @link https://developer.mozilla.org/en-US/docs/Web/API/CryptoKeyPair
|
|
62
|
-
*
|
|
63
|
-
* @example
|
|
64
|
-
* import { Client, clientAuthProvider, decrypt, encrypt } from '@opentdf/sdk/nanotdf`
|
|
65
|
-
*
|
|
66
|
-
* const OIDC_ENDPOINT = 'http://localhost:65432/auth/';
|
|
67
|
-
* const KAS_URL = 'http://localhost:65432/kas';
|
|
68
|
-
*
|
|
69
|
-
* let client = new Client(
|
|
70
|
-
* await clientAuthProvider({
|
|
71
|
-
* clientId: 'tdf-client',
|
|
72
|
-
* clientSecret: '123-456',
|
|
73
|
-
* oidcOrigin: OIDC_ENDPOINT,
|
|
74
|
-
* }),
|
|
75
|
-
* KAS_URL
|
|
76
|
-
* );
|
|
77
|
-
*
|
|
78
|
-
* // t=1
|
|
79
|
-
* let nanoTDFEncrypted = await encrypt('some string', client.unwrappedKey);
|
|
80
|
-
* let nanoTDFDecrypted = await decrypt(nanoTDFEncrypted, client.unwrappedKey);
|
|
81
|
-
* nanoTDFDecrypted.toString() // 'some string'
|
|
82
|
-
*
|
|
83
|
-
*/
|
|
84
|
-
class Client {
|
|
85
|
-
/**
|
|
86
|
-
* Create new NanoTDF Client
|
|
87
|
-
*
|
|
88
|
-
* The Ephemeral Key Pair can either be provided or will be generate when fetching the entity object. Once set it
|
|
89
|
-
* cannot be changed. If a new ephemeral key is desired it a new client should be initialized.
|
|
90
|
-
* There is no performance impact for creating a new client IFF the ephemeral key pair is provided.
|
|
91
|
-
*/
|
|
92
|
-
constructor(optsOrOldAuthProvider, kasUrl, ephemeralKeyPair, dpopEnabled = false) {
|
|
93
|
-
this.dissems = [];
|
|
94
|
-
this.dataAttributes = [];
|
|
95
|
-
const enwrapAuthProvider = (a) => {
|
|
96
|
-
return {
|
|
97
|
-
updateClientPublicKey: async (signingKey) => {
|
|
98
|
-
await a.updateClientPublicKey(signingKey);
|
|
99
|
-
},
|
|
100
|
-
withCreds: async (httpReq) => {
|
|
101
|
-
const signer = await this.requestSignerKeyPair;
|
|
102
|
-
if (!signer) {
|
|
103
|
-
throw new errors_js_1.ConfigurationError('failed to find or generate signer session key');
|
|
104
|
-
}
|
|
105
|
-
await a.updateClientPublicKey(signer);
|
|
106
|
-
return a.withCreds(httpReq);
|
|
107
|
-
},
|
|
108
|
-
};
|
|
109
|
-
};
|
|
110
|
-
if ((0, providers_js_1.isAuthProvider)(optsOrOldAuthProvider)) {
|
|
111
|
-
this.authProvider = enwrapAuthProvider(optsOrOldAuthProvider);
|
|
112
|
-
if (!kasUrl) {
|
|
113
|
-
throw new errors_js_1.ConfigurationError('please specify kasEndpoint');
|
|
114
|
-
}
|
|
115
|
-
// TODO Disallow http KAS. For now just log as error
|
|
116
|
-
(0, utils_js_1.validateSecureUrl)(kasUrl);
|
|
117
|
-
this.kasUrl = kasUrl;
|
|
118
|
-
this.dpopEnabled = dpopEnabled;
|
|
119
|
-
if (ephemeralKeyPair) {
|
|
120
|
-
this.ephemeralKeyPair = Promise.resolve(ephemeralKeyPair);
|
|
121
|
-
}
|
|
122
|
-
else {
|
|
123
|
-
this.ephemeralKeyPair = generateEphemeralKeyPair();
|
|
124
|
-
}
|
|
125
|
-
this.iv = 1;
|
|
126
|
-
}
|
|
127
|
-
else {
|
|
128
|
-
const { allowedKases, fulfillableObligationFQNs = [], ignoreAllowList, authProvider, dpopEnabled, dpopKeys, ephemeralKeyPair, kasEndpoint, platformUrl, } = optsOrOldAuthProvider;
|
|
129
|
-
this.authProvider = enwrapAuthProvider(authProvider);
|
|
130
|
-
// TODO Disallow http KAS. For now just log as error
|
|
131
|
-
(0, utils_js_1.validateSecureUrl)(kasEndpoint);
|
|
132
|
-
this.kasUrl = kasEndpoint;
|
|
133
|
-
this.platformUrl = platformUrl;
|
|
134
|
-
if (allowedKases?.length || ignoreAllowList) {
|
|
135
|
-
this.allowedKases = new access_js_1.OriginAllowList(allowedKases || [], ignoreAllowList);
|
|
136
|
-
}
|
|
137
|
-
this.fulfillableObligationFQNs = fulfillableObligationFQNs;
|
|
138
|
-
this.dpopEnabled = !!dpopEnabled;
|
|
139
|
-
if (dpopKeys) {
|
|
140
|
-
this.requestSignerKeyPair = dpopKeys;
|
|
141
|
-
}
|
|
142
|
-
else {
|
|
143
|
-
this.requestSignerKeyPair = generateSignerKeyPair();
|
|
144
|
-
}
|
|
145
|
-
if (ephemeralKeyPair) {
|
|
146
|
-
this.ephemeralKeyPair = ephemeralKeyPair;
|
|
147
|
-
}
|
|
148
|
-
else {
|
|
149
|
-
this.ephemeralKeyPair = generateEphemeralKeyPair();
|
|
150
|
-
}
|
|
151
|
-
this.iv = 1;
|
|
152
|
-
}
|
|
153
|
-
}
|
|
154
|
-
/**
|
|
155
|
-
* Add attribute to the TDF file/data
|
|
156
|
-
*
|
|
157
|
-
* @param attribute The attribute that decides the access control of the TDF.
|
|
158
|
-
*/
|
|
159
|
-
addAttribute(attribute) {
|
|
160
|
-
this.dataAttributes.push(attribute);
|
|
161
|
-
}
|
|
162
|
-
/**
|
|
163
|
-
* Rewrap key
|
|
164
|
-
*
|
|
165
|
-
* @important the `fetchEntityObject` method must be called prior to
|
|
166
|
-
* @param nanoTdfHeader the full header for the nanotdf
|
|
167
|
-
* @param kasRewrapUrl key access server's rewrap endpoint
|
|
168
|
-
* @param magicNumberVersion nanotdf container version
|
|
169
|
-
* @param clientVersion version of the client, as SemVer
|
|
170
|
-
*/
|
|
171
|
-
async rewrapKey(nanoTdfHeader, kasRewrapUrl, magicNumberVersion, clientVersion) {
|
|
172
|
-
let allowedKases = this.allowedKases;
|
|
173
|
-
if (!allowedKases) {
|
|
174
|
-
allowedKases = await (0, access_js_1.fetchKeyAccessServers)(this.platformUrl, this.authProvider);
|
|
175
|
-
}
|
|
176
|
-
if (!allowedKases.allows(kasRewrapUrl)) {
|
|
177
|
-
throw new errors_js_1.UnsafeUrlError(`request URL ∉ ${allowedKases.origins};`, kasRewrapUrl);
|
|
178
|
-
}
|
|
179
|
-
const ephemeralKeyPair = await this.ephemeralKeyPair;
|
|
180
|
-
const requestSignerKeyPair = await this.requestSignerKeyPair;
|
|
181
|
-
// Ensure the ephemeral key pair has been set or generated (see fetchEntityObject)
|
|
182
|
-
if (!ephemeralKeyPair?.privateKey) {
|
|
183
|
-
throw new errors_js_1.ConfigurationError('Ephemeral key has not been set or generated');
|
|
184
|
-
}
|
|
185
|
-
if (!requestSignerKeyPair?.privateKey) {
|
|
186
|
-
throw new errors_js_1.ConfigurationError('Signer key has not been set or generated');
|
|
187
|
-
}
|
|
188
|
-
const unsignedRequest = (0, protobuf_1.create)(kas_pb_js_1.UnsignedRewrapRequestSchema, {
|
|
189
|
-
clientPublicKey: await (0, utils_js_1.cryptoPublicToPem)(ephemeralKeyPair.publicKey),
|
|
190
|
-
requests: [
|
|
191
|
-
(0, protobuf_1.create)(kas_pb_js_1.UnsignedRewrapRequest_WithPolicyRequestSchema, {
|
|
192
|
-
keyAccessObjects: [
|
|
193
|
-
{
|
|
194
|
-
keyAccessObjectId: 'kao-0', // only one kao, no bulk
|
|
195
|
-
keyAccessObject: {
|
|
196
|
-
header: new Uint8Array(nanoTdfHeader),
|
|
197
|
-
kasUrl: '',
|
|
198
|
-
protocol: Client.KAS_PROTOCOL,
|
|
199
|
-
keyType: Client.KEY_ACCESS_REMOTE,
|
|
200
|
-
},
|
|
201
|
-
},
|
|
202
|
-
],
|
|
203
|
-
algorithm: DefaultParams_js_1.default.defaultECAlgorithm,
|
|
204
|
-
}),
|
|
205
|
-
],
|
|
206
|
-
keyAccess: {
|
|
207
|
-
header: new Uint8Array(nanoTdfHeader),
|
|
208
|
-
kasUrl: '',
|
|
209
|
-
protocol: Client.KAS_PROTOCOL,
|
|
210
|
-
keyType: Client.KEY_ACCESS_REMOTE,
|
|
211
|
-
},
|
|
212
|
-
algorithm: DefaultParams_js_1.default.defaultECAlgorithm,
|
|
213
|
-
});
|
|
214
|
-
const requestBodyStr = (0, protobuf_1.toJsonString)(kas_pb_js_1.UnsignedRewrapRequestSchema, unsignedRequest);
|
|
215
|
-
const jwtPayload = { requestBody: requestBodyStr };
|
|
216
|
-
const signedRequestToken = await (0, providers_js_1.reqSignature)(jwtPayload, requestSignerKeyPair.privateKey, {
|
|
217
|
-
alg: toJWSAlg(requestSignerKeyPair.publicKey),
|
|
218
|
-
});
|
|
219
|
-
// Wrapped
|
|
220
|
-
const rewrapResp = await (0, access_js_1.fetchWrappedKey)(kasRewrapUrl, signedRequestToken, this.authProvider, this.fulfillableObligationFQNs);
|
|
221
|
-
// Upgrade any V1 responses to V2
|
|
222
|
-
(0, utils_js_1.upgradeRewrapResponseV1)(rewrapResp);
|
|
223
|
-
const result = rewrapResp.responses?.[0]?.results?.[0];
|
|
224
|
-
if (!result) {
|
|
225
|
-
// This should not happen - KAS should always return at least one response and one result
|
|
226
|
-
// or the upgradeRewrapResponseV1 should have created them
|
|
227
|
-
throw new errors_js_1.DecryptError('KAS rewrap response missing expected response or result');
|
|
228
|
-
}
|
|
229
|
-
const requiredObligations = (0, utils_js_1.getRequiredObligationFQNs)(rewrapResp);
|
|
230
|
-
let entityWrappedKey;
|
|
231
|
-
switch (result.result.case) {
|
|
232
|
-
case 'kasWrappedKey': {
|
|
233
|
-
entityWrappedKey = result.result.value;
|
|
234
|
-
break;
|
|
235
|
-
}
|
|
236
|
-
case 'error': {
|
|
237
|
-
(0, access_rpc_js_1.handleRpcRewrapErrorString)(result.result.value, (0, utils_js_1.getPlatformUrlFromKasEndpoint)(kasRewrapUrl), requiredObligations);
|
|
238
|
-
}
|
|
239
|
-
default: {
|
|
240
|
-
throw new errors_js_1.DecryptError('KAS rewrap response missing wrapped key');
|
|
241
|
-
}
|
|
242
|
-
}
|
|
243
|
-
// Extract the iv and ciphertext
|
|
244
|
-
const ivLength = clientVersion == Client.SDK_INITIAL_RELEASE ? Client.INITIAL_RELEASE_IV_SIZE : Client.IV_SIZE;
|
|
245
|
-
const iv = entityWrappedKey.subarray(0, ivLength);
|
|
246
|
-
const encryptedSharedKey = entityWrappedKey.subarray(ivLength);
|
|
247
|
-
let kasPublicKey;
|
|
248
|
-
try {
|
|
249
|
-
// Let us import public key as a cert or public key
|
|
250
|
-
kasPublicKey = await (0, utils_js_1.pemToCryptoPublicKey)(rewrapResp.sessionPublicKey);
|
|
251
|
-
}
|
|
252
|
-
catch (cause) {
|
|
253
|
-
throw new errors_js_1.ConfigurationError(`internal: [${kasRewrapUrl}] PEM Public Key to crypto public key failed. Is PEM formatted correctly?`, cause);
|
|
254
|
-
}
|
|
255
|
-
let hkdfSalt;
|
|
256
|
-
try {
|
|
257
|
-
// Get the hkdf salt params
|
|
258
|
-
hkdfSalt = await (0, getHkdfSalt_js_1.default)(magicNumberVersion);
|
|
259
|
-
}
|
|
260
|
-
catch (e) {
|
|
261
|
-
throw new errors_js_1.TdfError('salting hkdf failed', e);
|
|
262
|
-
}
|
|
263
|
-
const { privateKey } = await this.ephemeralKeyPair;
|
|
264
|
-
// Get the unwrapping key
|
|
265
|
-
let unwrappingKey;
|
|
266
|
-
try {
|
|
267
|
-
unwrappingKey = await (0, index_js_1.keyAgreement)(
|
|
268
|
-
// Ephemeral private key
|
|
269
|
-
privateKey, kasPublicKey, hkdfSalt);
|
|
270
|
-
}
|
|
271
|
-
catch (e) {
|
|
272
|
-
if (e.name == 'InvalidAccessError' || e.name == 'OperationError') {
|
|
273
|
-
throw new errors_js_1.DecryptError('unable to solve key agreement', e);
|
|
274
|
-
}
|
|
275
|
-
else if (e.name == 'NotSupported') {
|
|
276
|
-
throw new errors_js_1.ConfigurationError('unable to unwrap key from kas', e);
|
|
277
|
-
}
|
|
278
|
-
throw new errors_js_1.TdfError('unable to reach agreement', e);
|
|
279
|
-
}
|
|
280
|
-
const authTagLength = 8 * (encryptedSharedKey.byteLength - 32);
|
|
281
|
-
let decryptedKey;
|
|
282
|
-
try {
|
|
283
|
-
// Decrypt the wrapped key
|
|
284
|
-
decryptedKey = await crypto.subtle.decrypt({ name: 'AES-GCM', iv, tagLength: authTagLength }, unwrappingKey, encryptedSharedKey);
|
|
285
|
-
}
|
|
286
|
-
catch (cause) {
|
|
287
|
-
throw new errors_js_1.DecryptError(`unable to decrypt key. Are you using the right KAS? Is the salt correct?`, cause);
|
|
288
|
-
}
|
|
289
|
-
// UnwrappedKey
|
|
290
|
-
let unwrappedKey;
|
|
291
|
-
try {
|
|
292
|
-
unwrappedKey = await crypto.subtle.importKey('raw', decryptedKey, 'AES-GCM',
|
|
293
|
-
// @security This allows the key to be used in `exportKey` and `wrapKey`
|
|
294
|
-
// https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/exportKey
|
|
295
|
-
// https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/wrapKey
|
|
296
|
-
true,
|
|
297
|
-
// Want to use the key to encrypt and decrypt. Signing key will be used later.
|
|
298
|
-
['encrypt', 'decrypt']);
|
|
299
|
-
}
|
|
300
|
-
catch (cause) {
|
|
301
|
-
throw new errors_js_1.DecryptError('Unable to import raw key.', cause);
|
|
302
|
-
}
|
|
303
|
-
return {
|
|
304
|
-
requiredObligations,
|
|
305
|
-
unwrappedKey: unwrappedKey,
|
|
306
|
-
};
|
|
307
|
-
}
|
|
308
|
-
}
|
|
309
|
-
Client.KEY_ACCESS_REMOTE = 'remote';
|
|
310
|
-
Client.KAS_PROTOCOL = 'kas';
|
|
311
|
-
Client.SDK_INITIAL_RELEASE = '0.0.0';
|
|
312
|
-
Client.INITIAL_RELEASE_IV_SIZE = 3;
|
|
313
|
-
Client.IV_SIZE = 12;
|
|
314
|
-
exports.default = Client;
|
|
315
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"Client.js","sourceRoot":"","sources":["../../../../src/nanotdf/Client.ts"],"names":[],"mappings":";;;;;AAAA,iDAA0D;AAC1D,yDAGmC;AACnC,yDAA2E;AAC3E,8EAAmD;AACnD,iFAAsD;AACtD,4CAKsB;AACtB,kEAA4E;AAC5E,uDAAkF;AAClF,4CAA0F;AAC1F,0CAOqB;AAmBrB,SAAS,QAAQ,CAAC,CAAY;IAC5B,MAAM,EAAE,SAAS,EAAE,GAAG,CAAC,CAAC;IACxB,QAAQ,SAAS,CAAC,IAAI,EAAE,CAAC;QACvB,KAAK,mBAAmB,CAAC;QACzB,KAAK,SAAS,CAAC;QACf,KAAK,UAAU,CAAC,CAAC,CAAC;YAChB,MAAM,CAAC,GAAG,SAAkC,CAAC;YAC7C,QAAQ,CAAC,CAAC,aAAa,EAAE,CAAC;gBACxB,KAAK,IAAI;oBACP,OAAO,OAAO,CAAC;gBACjB,KAAK,IAAI;oBACP,OAAO,OAAO,CAAC;gBACjB,KAAK,IAAI;oBACP,OAAO,OAAO,CAAC;YACnB,CAAC;YACD,MAAM;QACR,CAAC;QACD,KAAK,OAAO,CAAC;QACb,KAAK,MAAM,CAAC,CAAC,CAAC;YACZ,OAAO,OAAO,CAAC;QACjB,CAAC;IACH,CAAC;IACD,MAAM,IAAI,8BAAkB,CAAC,6BAA6B,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,EAAE,CAAC,CAAC;AACzF,CAAC;AAED,KAAK,UAAU,wBAAwB;IACrC,MAAM,EAAE,SAAS,EAAE,UAAU,EAAE,GAAG,MAAM,IAAA,0BAAe,GAAE,CAAC;IAC1D,IAAI,CAAC,UAAU,IAAI,CAAC,SAAS,EAAE,CAAC;QAC9B,MAAM,KAAK,CAAC,4BAA4B,CAAC,CAAC;IAC5C,CAAC;IACD,OAAO,EAAE,SAAS,EAAE,UAAU,EAAE,CAAC;AACnC,CAAC;AAED,KAAK,UAAU,qBAAqB;IAClC,OAAO,MAAM,CAAC,MAAM,CAAC,WAAW,CAC9B;QACE,IAAI,EAAE,mBAAmB;QACzB,IAAI,EAAE,SAAS;QACf,aAAa,EAAE,IAAI;QACnB,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;KACnD,EACD,IAAI,EACJ,CAAC,MAAM,EAAE,QAAQ,CAAC,CACnB,CAAC;AACJ,CAAC;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAqB,MAAM;IAwBzB;;;;;;OAMG;IACH,YACE,qBAAkD,EAClD,MAAe,EACf,gBAAgC,EAChC,WAAW,GAAG,KAAK;QAjBrB,YAAO,GAAa,EAAE,CAAC;QACvB,mBAAc,GAAa,EAAE,CAAC;QAkB5B,MAAM,kBAAkB,GAAG,CAAC,CAAe,EAAgB,EAAE;YAC3D,OAAO;gBACL,qBAAqB,EAAE,KAAK,EAAE,UAAU,EAAE,EAAE;oBAC1C,MAAM,CAAC,CAAC,qBAAqB,CAAC,UAAU,CAAC,CAAC;gBAC5C,CAAC;gBACD,SAAS,EAAE,KAAK,EAAE,OAAO,EAAE,EAAE;oBAC3B,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC;oBAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;wBACZ,MAAM,IAAI,8BAAkB,CAAC,+CAA+C,CAAC,CAAC;oBAChF,CAAC;oBACD,MAAM,CAAC,CAAC,qBAAqB,CAAC,MAAM,CAAC,CAAC;oBACtC,OAAO,CAAC,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;gBAC9B,CAAC;aACF,CAAC;QACJ,CAAC,CAAC;QACF,IAAI,IAAA,6BAAc,EAAC,qBAAqB,CAAC,EAAE,CAAC;YAC1C,IAAI,CAAC,YAAY,GAAG,kBAAkB,CAAC,qBAAqB,CAAC,CAAC;YAC9D,IAAI,CAAC,MAAM,EAAE,CAAC;gBACZ,MAAM,IAAI,8BAAkB,CAAC,4BAA4B,CAAC,CAAC;YAC7D,CAAC;YACD,oDAAoD;YACpD,IAAA,4BAAiB,EAAC,MAAM,CAAC,CAAC;YAC1B,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;YACrB,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;YAE/B,IAAI,gBAAgB,EAAE,CAAC;gBACrB,IAAI,CAAC,gBAAgB,GAAG,OAAO,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC;YAC5D,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;YACrD,CAAC;YACD,IAAI,CAAC,EAAE,GAAG,CAAC,CAAC;QACd,CAAC;aAAM,CAAC;YACN,MAAM,EACJ,YAAY,EACZ,yBAAyB,GAAG,EAAE,EAC9B,eAAe,EACf,YAAY,EACZ,WAAW,EACX,QAAQ,EACR,gBAAgB,EAChB,WAAW,EACX,WAAW,GACZ,GAAG,qBAAqB,CAAC;YAC1B,IAAI,CAAC,YAAY,GAAG,kBAAkB,CAAC,YAAY,CAAC,CAAC;YACrD,oDAAoD;YACpD,IAAA,4BAAiB,EAAC,WAAW,CAAC,CAAC;YAC/B,IAAI,CAAC,MAAM,GAAG,WAAW,CAAC;YAC1B,IAAI,CAAC,WAAW,GAAG,WAAW,CAAC;YAC/B,IAAI,YAAY,EAAE,MAAM,IAAI,eAAe,EAAE,CAAC;gBAC5C,IAAI,CAAC,YAAY,GAAG,IAAI,2BAAe,CAAC,YAAY,IAAI,EAAE,EAAE,eAAe,CAAC,CAAC;YAC/E,CAAC;YACD,IAAI,CAAC,yBAAyB,GAAG,yBAAyB,CAAC;YAC3D,IAAI,CAAC,WAAW,GAAG,CAAC,CAAC,WAAW,CAAC;YACjC,IAAI,QAAQ,EAAE,CAAC;gBACb,IAAI,CAAC,oBAAoB,GAAG,QAAQ,CAAC;YACvC,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,oBAAoB,GAAG,qBAAqB,EAAE,CAAC;YACtD,CAAC;YAED,IAAI,gBAAgB,EAAE,CAAC;gBACrB,IAAI,CAAC,gBAAgB,GAAG,gBAAgB,CAAC;YAC3C,CAAC;iBAAM,CAAC;gBACN,IAAI,CAAC,gBAAgB,GAAG,wBAAwB,EAAE,CAAC;YACrD,CAAC;YACD,IAAI,CAAC,EAAE,GAAG,CAAC,CAAC;QACd,CAAC;IACH,CAAC;IAED;;;;OAIG;IACH,YAAY,CAAC,SAAiB;QAC5B,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IACtC,CAAC;IAED;;;;;;;;OAQG;IACH,KAAK,CAAC,SAAS,CACb,aAA8B,EAC9B,YAAoB,EACpB,kBAAmC,EACnC,aAAqB;QAErB,IAAI,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC;QAErC,IAAI,CAAC,YAAY,EAAE,CAAC;YAClB,YAAY,GAAG,MAAM,IAAA,iCAAqB,EAAC,IAAI,CAAC,WAAW,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;QAClF,CAAC;QAED,IAAI,CAAC,YAAY,CAAC,MAAM,CAAC,YAAY,CAAC,EAAE,CAAC;YACvC,MAAM,IAAI,0BAAc,CAAC,iBAAiB,YAAY,CAAC,OAAO,GAAG,EAAE,YAAY,CAAC,CAAC;QACnF,CAAC;QAED,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC;QACrD,MAAM,oBAAoB,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC;QAE7D,kFAAkF;QAClF,IAAI,CAAC,gBAAgB,EAAE,UAAU,EAAE,CAAC;YAClC,MAAM,IAAI,8BAAkB,CAAC,6CAA6C,CAAC,CAAC;QAC9E,CAAC;QAED,IAAI,CAAC,oBAAoB,EAAE,UAAU,EAAE,CAAC;YACtC,MAAM,IAAI,8BAAkB,CAAC,0CAA0C,CAAC,CAAC;QAC3E,CAAC;QAED,MAAM,eAAe,GAAG,IAAA,iBAAM,EAAC,uCAA2B,EAAE;YAC1D,eAAe,EAAE,MAAM,IAAA,4BAAiB,EAAC,gBAAgB,CAAC,SAAS,CAAC;YACpE,QAAQ,EAAE;gBACR,IAAA,iBAAM,EAAC,yDAA6C,EAAE;oBACpD,gBAAgB,EAAE;wBAChB;4BACE,iBAAiB,EAAE,OAAO,EAAE,wBAAwB;4BACpD,eAAe,EAAE;gCACf,MAAM,EAAE,IAAI,UAAU,CAAC,aAAa,CAAC;gCACrC,MAAM,EAAE,EAAE;gCACV,QAAQ,EAAE,MAAM,CAAC,YAAY;gCAC7B,OAAO,EAAE,MAAM,CAAC,iBAAiB;6BAClC;yBACF;qBACF;oBACD,SAAS,EAAE,0BAAa,CAAC,kBAAkB;iBAC5C,CAAC;aACH;YACD,SAAS,EAAE;gBACT,MAAM,EAAE,IAAI,UAAU,CAAC,aAAa,CAAC;gBACrC,MAAM,EAAE,EAAE;gBACV,QAAQ,EAAE,MAAM,CAAC,YAAY;gBAC7B,OAAO,EAAE,MAAM,CAAC,iBAAiB;aAClC;YACD,SAAS,EAAE,0BAAa,CAAC,kBAAkB;SAC5C,CAAC,CAAC;QAEH,MAAM,cAAc,GAAG,IAAA,uBAAY,EAAC,uCAA2B,EAAE,eAAe,CAAC,CAAC;QAElF,MAAM,UAAU,GAAG,EAAE,WAAW,EAAE,cAAc,EAAE,CAAC;QAEnD,MAAM,kBAAkB,GAAG,MAAM,IAAA,2BAAY,EAAC,UAAU,EAAE,oBAAoB,CAAC,UAAU,EAAE;YACzF,GAAG,EAAE,QAAQ,CAAC,oBAAoB,CAAC,SAAS,CAAC;SAC9C,CAAC,CAAC;QAEH,UAAU;QACV,MAAM,UAAU,GAAG,MAAM,IAAA,2BAAe,EACtC,YAAY,EACZ,kBAAkB,EAClB,IAAI,CAAC,YAAY,EACjB,IAAI,CAAC,yBAAyB,CAC/B,CAAC;QACF,iCAAiC;QACjC,IAAA,kCAAuB,EAAC,UAAU,CAAC,CAAC;QAEpC,MAAM,MAAM,GAAG,UAAU,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC,EAAE,OAAO,EAAE,CAAC,CAAC,CAAC,CAAC;QACvD,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,yFAAyF;YACzF,0DAA0D;YAC1D,MAAM,IAAI,wBAAY,CAAC,yDAAyD,CAAC,CAAC;QACpF,CAAC;QAED,MAAM,mBAAmB,GAAG,IAAA,oCAAyB,EAAC,UAAU,CAAC,CAAC;QAElE,IAAI,gBAA6C,CAAC;QAClD,QAAQ,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,CAAC;YAC3B,KAAK,eAAe,CAAC,CAAC,CAAC;gBACrB,gBAAgB,GAAG,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC;gBACvC,MAAM;YACR,CAAC;YACD,KAAK,OAAO,CAAC,CAAC,CAAC;gBACb,IAAA,0CAA0B,EACxB,MAAM,CAAC,MAAM,CAAC,KAAK,EACnB,IAAA,wCAA6B,EAAC,YAAY,CAAC,EAC3C,mBAAmB,CACpB,CAAC;YACJ,CAAC;YACD,OAAO,CAAC,CAAC,CAAC;gBACR,MAAM,IAAI,wBAAY,CAAC,yCAAyC,CAAC,CAAC;YACpE,CAAC;QACH,CAAC;QAED,gCAAgC;QAChC,MAAM,QAAQ,GACZ,aAAa,IAAI,MAAM,CAAC,mBAAmB,CAAC,CAAC,CAAC,MAAM,CAAC,uBAAuB,CAAC,CAAC,CAAC,MAAM,CAAC,OAAO,CAAC;QAChG,MAAM,EAAE,GAAG,gBAAgB,CAAC,QAAQ,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAC;QAClD,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;QAE/D,IAAI,YAAY,CAAC;QACjB,IAAI,CAAC;YACH,mDAAmD;YACnD,YAAY,GAAG,MAAM,IAAA,+BAAoB,EAAC,UAAU,CAAC,gBAAgB,CAAC,CAAC;QACzE,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,8BAAkB,CAC1B,cAAc,YAAY,2EAA2E,EACrG,KAAK,CACN,CAAC;QACJ,CAAC;QAED,IAAI,QAAQ,CAAC;QACb,IAAI,CAAC;YACH,2BAA2B;YAC3B,QAAQ,GAAG,MAAM,IAAA,wBAAW,EAAC,kBAAkB,CAAC,CAAC;QACnD,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,oBAAQ,CAAC,qBAAqB,EAAE,CAAC,CAAC,CAAC;QAC/C,CAAC;QACD,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC;QAEnD,yBAAyB;QACzB,IAAI,aAAa,CAAC;QAClB,IAAI,CAAC;YACH,aAAa,GAAG,MAAM,IAAA,uBAAY;YAChC,wBAAwB;YACxB,UAAU,EACV,YAAY,EACZ,QAAQ,CACT,CAAC;QACJ,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,IAAI,CAAC,CAAC,IAAI,IAAI,oBAAoB,IAAI,CAAC,CAAC,IAAI,IAAI,gBAAgB,EAAE,CAAC;gBACjE,MAAM,IAAI,wBAAY,CAAC,+BAA+B,EAAE,CAAC,CAAC,CAAC;YAC7D,CAAC;iBAAM,IAAI,CAAC,CAAC,IAAI,IAAI,cAAc,EAAE,CAAC;gBACpC,MAAM,IAAI,8BAAkB,CAAC,+BAA+B,EAAE,CAAC,CAAC,CAAC;YACnE,CAAC;YACD,MAAM,IAAI,oBAAQ,CAAC,2BAA2B,EAAE,CAAC,CAAC,CAAC;QACrD,CAAC;QAED,MAAM,aAAa,GAAG,CAAC,GAAG,CAAC,kBAAkB,CAAC,UAAU,GAAG,EAAE,CAAC,CAAC;QAC/D,IAAI,YAAY,CAAC;QACjB,IAAI,CAAC;YACH,0BAA0B;YAC1B,YAAY,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CACxC,EAAE,IAAI,EAAE,SAAS,EAAE,EAAE,EAAE,SAAS,EAAE,aAAa,EAAE,EACjD,aAAa,EACb,kBAAkB,CACnB,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,wBAAY,CACpB,0EAA0E,EAC1E,KAAK,CACN,CAAC;QACJ,CAAC;QAED,eAAe;QACf,IAAI,YAAY,CAAC;QACjB,IAAI,CAAC;YACH,YAAY,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC1C,KAAK,EACL,YAAY,EACZ,SAAS;YACT,wEAAwE;YACxE,0EAA0E;YAC1E,wEAAwE;YACxE,IAAI;YACJ,8EAA8E;YAC9E,CAAC,SAAS,EAAE,SAAS,CAAC,CACvB,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,IAAI,wBAAY,CAAC,2BAA2B,EAAE,KAAK,CAAC,CAAC;QAC7D,CAAC;QAED,OAAO;YACL,mBAAmB;YACnB,YAAY,EAAE,YAAY;SAC3B,CAAC;IACJ,CAAC;;AAhTe,wBAAiB,GAAG,QAAQ,AAAX,CAAY;AAC7B,mBAAY,GAAG,KAAK,AAAR,CAAS;AACrB,0BAAmB,GAAG,OAAO,AAAV,CAAW;AAC9B,8BAAuB,GAAG,CAAC,AAAJ,CAAK;AAC5B,cAAO,GAAG,EAAE,AAAL,CAAM;kBALV,MAAM"}
|
|
@@ -1,94 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
const index_js_1 = require("../encodings/index.js");
|
|
7
|
-
const Header_js_1 = __importDefault(require("./models/Header.js"));
|
|
8
|
-
const Payload_js_1 = __importDefault(require("./models/Payload.js"));
|
|
9
|
-
const Signature_js_1 = __importDefault(require("./models/Signature.js"));
|
|
10
|
-
const EncodingEnum_js_1 = __importDefault(require("./enum/EncodingEnum.js"));
|
|
11
|
-
const errors_js_1 = require("../errors.js");
|
|
12
|
-
// Defaults when none set during encryption
|
|
13
|
-
class NanoTDF {
|
|
14
|
-
static from(content, encoding, legacyTDF = false) {
|
|
15
|
-
// If we don't assign an empty array buffer then TS reports buffer as unassigned
|
|
16
|
-
let buffer;
|
|
17
|
-
if (typeof content === 'string') {
|
|
18
|
-
if (!encoding || encoding === EncodingEnum_js_1.default.Base64) {
|
|
19
|
-
buffer = index_js_1.base64.decodeArrayBuffer(content);
|
|
20
|
-
}
|
|
21
|
-
else {
|
|
22
|
-
throw new errors_js_1.ConfigurationError(`Unsupported encoding: ${encoding}`);
|
|
23
|
-
}
|
|
24
|
-
}
|
|
25
|
-
// Handle Uint8Array types
|
|
26
|
-
else if (ArrayBuffer.isView(content) || content instanceof ArrayBuffer) {
|
|
27
|
-
buffer = content;
|
|
28
|
-
}
|
|
29
|
-
else {
|
|
30
|
-
throw new errors_js_1.ConfigurationError(`unsupported content type`);
|
|
31
|
-
}
|
|
32
|
-
const dataView = new Uint8Array(buffer);
|
|
33
|
-
let offset = 0;
|
|
34
|
-
// Header
|
|
35
|
-
const { header, offset: headerOffset } = Header_js_1.default.parse(dataView.subarray(offset));
|
|
36
|
-
offset += headerOffset;
|
|
37
|
-
// Payload
|
|
38
|
-
const { payload, offset: payloadOffset } = Payload_js_1.default.parse(header, dataView.subarray(offset), legacyTDF);
|
|
39
|
-
offset += payloadOffset;
|
|
40
|
-
// Signature
|
|
41
|
-
const { signature, offset: signatureOffset } = Signature_js_1.default.parse(header, dataView.subarray(offset));
|
|
42
|
-
offset += signatureOffset;
|
|
43
|
-
// Singature checking
|
|
44
|
-
if (!header.hasSignature && signature.length > 0) {
|
|
45
|
-
throw new errors_js_1.InvalidFileError("Found signature when there shouldn't be one");
|
|
46
|
-
}
|
|
47
|
-
if (header.hasSignature && signature.length === 0) {
|
|
48
|
-
throw new errors_js_1.InvalidFileError('Could not find signature');
|
|
49
|
-
}
|
|
50
|
-
return new NanoTDF(header, payload, signature);
|
|
51
|
-
}
|
|
52
|
-
constructor(header, payload, signature) {
|
|
53
|
-
this.header = header;
|
|
54
|
-
this.payload = payload;
|
|
55
|
-
this.signature = signature;
|
|
56
|
-
}
|
|
57
|
-
/**
|
|
58
|
-
* Return the content of nano tdf as binary buffer
|
|
59
|
-
*/
|
|
60
|
-
toBuffer() {
|
|
61
|
-
let offset = 0;
|
|
62
|
-
const lengthOfSignature = this.signature && this.signature.length ? this.signature.length : 0;
|
|
63
|
-
const lengthOfTDF = this.header.length + this.payload.length + lengthOfSignature;
|
|
64
|
-
const buffer = new ArrayBuffer(lengthOfTDF);
|
|
65
|
-
// Write the header
|
|
66
|
-
const headerBufferView = new Uint8Array(buffer, 0, this.header.length);
|
|
67
|
-
this.header.copyToBuffer(headerBufferView);
|
|
68
|
-
offset += headerBufferView.length;
|
|
69
|
-
// Write the payload
|
|
70
|
-
const payloadBufferView = new Uint8Array(buffer, offset, this.payload.length);
|
|
71
|
-
this.payload.copyToBuffer(payloadBufferView);
|
|
72
|
-
offset += payloadBufferView.length;
|
|
73
|
-
// Write the signature
|
|
74
|
-
if (this.header.hasSignature && this.signature) {
|
|
75
|
-
const signatureBufferView = new Uint8Array(buffer, offset, lengthOfSignature);
|
|
76
|
-
this.signature.copyToBuffer(signatureBufferView);
|
|
77
|
-
}
|
|
78
|
-
return buffer;
|
|
79
|
-
}
|
|
80
|
-
/**
|
|
81
|
-
* Return the content of nano tdf as base64 string
|
|
82
|
-
*/
|
|
83
|
-
toBase64() {
|
|
84
|
-
const arrayBuffer = this.toBuffer();
|
|
85
|
-
return index_js_1.base64.encodeArrayBuffer(arrayBuffer);
|
|
86
|
-
}
|
|
87
|
-
}
|
|
88
|
-
// Add encodings to the NanoTDF class for easy access
|
|
89
|
-
NanoTDF.Encodings = EncodingEnum_js_1.default;
|
|
90
|
-
NanoTDF.Header = Header_js_1.default;
|
|
91
|
-
NanoTDF.Payload = Payload_js_1.default;
|
|
92
|
-
NanoTDF.Signature = Signature_js_1.default;
|
|
93
|
-
exports.default = NanoTDF;
|
|
94
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,19 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
/* globals window */
|
|
7
|
-
/**
|
|
8
|
-
* This file is used for:
|
|
9
|
-
*
|
|
10
|
-
* - es5 browser version of nanoTDF and add it to the window as NanoTDF
|
|
11
|
-
*
|
|
12
|
-
* This is not used for:
|
|
13
|
-
*
|
|
14
|
-
* - es6 web development (use node modules)
|
|
15
|
-
* - node applications
|
|
16
|
-
*/
|
|
17
|
-
const NanoTDF_js_1 = __importDefault(require("./NanoTDF.js"));
|
|
18
|
-
window.NanoTDF = NanoTDF_js_1.default;
|
|
19
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYnJvd3Nlci1lbnRyeS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uL3NyYy9uYW5vdGRmL2Jyb3dzZXItZW50cnkudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7QUFBQSxvQkFBb0I7QUFDcEI7Ozs7Ozs7OztHQVNHO0FBQ0gsOERBQW1DO0FBUW5DLE1BQU0sQ0FBQyxPQUFPLEdBQUcsb0JBQU8sQ0FBQyJ9
|
|
@@ -1,5 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.GMAC_BINDING_LEN = void 0;
|
|
4
|
-
exports.GMAC_BINDING_LEN = 8;
|
|
5
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY29uc3RhbnRzLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vc3JjL25hbm90ZGYvY29uc3RhbnRzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7OztBQUFhLFFBQUEsZ0JBQWdCLEdBQUcsQ0FBQyxDQUFDIn0=
|
|
@@ -1,17 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.default = decrypt;
|
|
4
|
-
const index_js_1 = require("../nanotdf-crypto/index.js");
|
|
5
|
-
/**
|
|
6
|
-
* Decrypt nanotdf with a crypto key
|
|
7
|
-
*
|
|
8
|
-
* @param key Crypto key used to decrypt nanotdf
|
|
9
|
-
* @param nanotdf NanoTDF to decrypt
|
|
10
|
-
*/
|
|
11
|
-
async function decrypt(key, nanotdf) {
|
|
12
|
-
// console.log(`Decrypting for content: ${nanotdf}`, nanotdf.header.authTagLength);
|
|
13
|
-
return await (0, index_js_1.decrypt)(key, nanotdf.payload.ciphertextWithAuthTag, nanotdf.payload.iv,
|
|
14
|
-
// Auth tag length in bits
|
|
15
|
-
nanotdf.header.authTagLength);
|
|
16
|
-
}
|
|
17
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,38 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.default = encryptDataset;
|
|
7
|
-
const NanoTDF_js_1 = __importDefault(require("./NanoTDF.js"));
|
|
8
|
-
const DefaultParams_js_1 = __importDefault(require("./models/DefaultParams.js"));
|
|
9
|
-
const Payload_js_1 = __importDefault(require("./models/Payload.js"));
|
|
10
|
-
const Ciphers_js_1 = require("./models/Ciphers.js");
|
|
11
|
-
const encrypt_js_1 = __importDefault(require("../nanotdf-crypto/encrypt.js"));
|
|
12
|
-
/**
|
|
13
|
-
* Encrypt the plain data into nanotdf buffer
|
|
14
|
-
*
|
|
15
|
-
* @param symmetricKey Key to encrypt the payload
|
|
16
|
-
* @param header NanoTDF header
|
|
17
|
-
* @param iv IV to be used for encrypting the payload
|
|
18
|
-
* @param data The data to be encrypted
|
|
19
|
-
*/
|
|
20
|
-
async function encryptDataset(symmetricKey, header, iv, data) {
|
|
21
|
-
// Auth tag length for policy and payload
|
|
22
|
-
const authTagLengthInBytes = (0, Ciphers_js_1.getBitLength)(DefaultParams_js_1.default.symmetricCipher) / 8;
|
|
23
|
-
// Encrypt the payload
|
|
24
|
-
let payloadAsBuffer;
|
|
25
|
-
if (typeof data === 'string') {
|
|
26
|
-
payloadAsBuffer = new TextEncoder().encode(data);
|
|
27
|
-
}
|
|
28
|
-
else {
|
|
29
|
-
payloadAsBuffer = data;
|
|
30
|
-
}
|
|
31
|
-
const encryptedPayload = await (0, encrypt_js_1.default)(symmetricKey, new Uint8Array(payloadAsBuffer), iv, authTagLengthInBytes * 8);
|
|
32
|
-
// Create payload
|
|
33
|
-
const payload = new Payload_js_1.default(iv.slice(-3), new Uint8Array(encryptedPayload.slice(0, -authTagLengthInBytes)), new Uint8Array(encryptedPayload.slice(-authTagLengthInBytes)));
|
|
34
|
-
// Create a nanotdf.
|
|
35
|
-
const nanoTDF = new NanoTDF_js_1.default(header, payload);
|
|
36
|
-
return nanoTDF.toBuffer();
|
|
37
|
-
}
|
|
38
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZW5jcnlwdC1kYXRhc2V0LmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vc3JjL25hbm90ZGYvZW5jcnlwdC1kYXRhc2V0LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7O0FBZUEsaUNBbUNDO0FBbERELDhEQUFtQztBQUVuQyxpRkFBc0Q7QUFDdEQscUVBQTBDO0FBQzFDLG9EQUE2RTtBQUM3RSw4RUFBbUQ7QUFFbkQ7Ozs7Ozs7R0FPRztBQUNZLEtBQUssVUFBVSxjQUFjLENBQzFDLFlBQXVCLEVBQ3ZCLE1BQWMsRUFDZCxFQUFjLEVBQ2QsSUFBOEI7SUFFOUIseUNBQXlDO0lBQ3pDLE1BQU0sb0JBQW9CLEdBQUcsSUFBQSx5QkFBc0IsRUFBQywwQkFBYSxDQUFDLGVBQWUsQ0FBQyxHQUFHLENBQUMsQ0FBQztJQUV2RixzQkFBc0I7SUFDdEIsSUFBSSxlQUFlLENBQUM7SUFDcEIsSUFBSSxPQUFPLElBQUksS0FBSyxRQUFRLEVBQUUsQ0FBQztRQUM3QixlQUFlLEdBQUcsSUFBSSxXQUFXLEVBQUUsQ0FBQyxNQUFNLENBQUMsSUFBSSxDQUFDLENBQUM7SUFDbkQsQ0FBQztTQUFNLENBQUM7UUFDTixlQUFlLEdBQUcsSUFBSSxDQUFDO0lBQ3pCLENBQUM7SUFFRCxNQUFNLGdCQUFnQixHQUFHLE1BQU0sSUFBQSxvQkFBTyxFQUNwQyxZQUFZLEVBQ1osSUFBSSxVQUFVLENBQUMsZUFBZSxDQUFDLEVBQy9CLEVBQUUsRUFDRixvQkFBb0IsR0FBRyxDQUFDLENBQ3pCLENBQUM7SUFFRixpQkFBaUI7SUFDakIsTUFBTSxPQUFPLEdBQUcsSUFBSSxvQkFBTyxDQUN6QixFQUFFLENBQUMsS0FBSyxDQUFDLENBQUMsQ0FBQyxDQUFDLEVBQ1osSUFBSSxVQUFVLENBQUMsZ0JBQWdCLENBQUMsS0FBSyxDQUFDLENBQUMsRUFBRSxDQUFDLG9CQUFvQixDQUFDLENBQUMsRUFDaEUsSUFBSSxVQUFVLENBQUMsZ0JBQWdCLENBQUMsS0FBSyxDQUFDLENBQUMsb0JBQW9CLENBQUMsQ0FBQyxDQUM5RCxDQUFDO0lBRUYsb0JBQW9CO0lBQ3BCLE1BQU0sT0FBTyxHQUFHLElBQUksb0JBQU8sQ0FBQyxNQUFNLEVBQUUsT0FBTyxDQUFDLENBQUM7SUFFN0MsT0FBTyxPQUFPLENBQUMsUUFBUSxFQUFFLENBQUM7QUFDNUIsQ0FBQyJ9
|