@opentdf/sdk 0.8.0-beta.71 → 0.8.0-beta.75
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +5 -30
- package/dist/cjs/src/{nanotdf-crypto → crypto}/ciphers.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/decrypt.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/digest.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/ecdsaSignature.js +2 -2
- package/dist/cjs/src/{nanotdf-crypto → crypto}/encrypt.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/enums.js +1 -1
- package/dist/cjs/src/crypto/exportCryptoKey.js +20 -0
- package/dist/cjs/src/{nanotdf-crypto → crypto}/generateKeyPair.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/generateRandomNumber.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/index.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/keyAgreement.js +1 -1
- package/dist/cjs/src/{nanotdf-crypto → crypto}/pemPublicToCrypto.js +1 -1
- package/dist/cjs/src/opentdf.js +9 -260
- package/dist/cjs/src/utils.js +2 -2
- package/dist/cjs/tdf3/index.js +7 -8
- package/dist/cjs/tdf3/src/models/key-access.js +4 -4
- package/dist/cjs/tdf3/src/tdf.js +4 -4
- package/dist/types/src/crypto/ciphers.d.ts.map +1 -0
- package/dist/types/src/crypto/decrypt.d.ts.map +1 -0
- package/dist/types/src/crypto/digest.d.ts.map +1 -0
- package/dist/types/src/crypto/ecdsaSignature.d.ts.map +1 -0
- package/dist/types/src/crypto/encrypt.d.ts.map +1 -0
- package/dist/types/src/crypto/enums.d.ts.map +1 -0
- package/dist/types/src/crypto/exportCryptoKey.d.ts.map +1 -0
- package/dist/types/src/crypto/generateKeyPair.d.ts.map +1 -0
- package/dist/types/src/crypto/generateRandomNumber.d.ts.map +1 -0
- package/dist/types/src/crypto/index.d.ts.map +1 -0
- package/dist/types/src/crypto/keyAgreement.d.ts.map +1 -0
- package/dist/types/src/crypto/pemPublicToCrypto.d.ts.map +1 -0
- package/dist/types/src/opentdf.d.ts +1 -65
- package/dist/types/src/opentdf.d.ts.map +1 -1
- package/dist/types/tdf3/index.d.ts +4 -3
- package/dist/types/tdf3/index.d.ts.map +1 -1
- package/dist/web/src/crypto/ciphers.js +14 -0
- package/dist/web/src/{nanotdf-crypto → crypto}/decrypt.js +1 -1
- package/dist/web/src/crypto/digest.js +4 -0
- package/dist/web/src/{nanotdf-crypto → crypto}/ecdsaSignature.js +2 -2
- package/dist/web/src/{nanotdf-crypto → crypto}/encrypt.js +1 -1
- package/dist/web/src/{nanotdf-crypto → crypto}/enums.js +1 -1
- package/dist/web/src/crypto/exportCryptoKey.js +17 -0
- package/dist/web/src/crypto/generateKeyPair.js +10 -0
- package/dist/web/src/crypto/generateRandomNumber.js +9 -0
- package/dist/web/src/crypto/index.js +11 -0
- package/dist/web/src/{nanotdf-crypto → crypto}/keyAgreement.js +1 -1
- package/dist/web/src/{nanotdf-crypto → crypto}/pemPublicToCrypto.js +1 -1
- package/dist/web/src/opentdf.js +8 -255
- package/dist/web/src/utils.js +2 -2
- package/dist/web/tdf3/index.js +4 -3
- package/dist/web/tdf3/src/models/key-access.js +4 -4
- package/dist/web/tdf3/src/tdf.js +4 -4
- package/package.json +1 -6
- package/src/{nanotdf-crypto → crypto}/ecdsaSignature.ts +1 -1
- package/src/opentdf.ts +6 -343
- package/src/utils.ts +1 -1
- package/tdf3/index.ts +2 -12
- package/tdf3/src/models/key-access.ts +3 -3
- package/tdf3/src/tdf.ts +3 -3
- package/dist/cjs/src/nanoclients.js +0 -292
- package/dist/cjs/src/nanoindex.js +0 -47
- package/dist/cjs/src/nanotdf/Client.js +0 -315
- package/dist/cjs/src/nanotdf/NanoTDF.js +0 -94
- package/dist/cjs/src/nanotdf/browser-entry.js +0 -19
- package/dist/cjs/src/nanotdf/constants.js +0 -5
- package/dist/cjs/src/nanotdf/decrypt.js +0 -17
- package/dist/cjs/src/nanotdf/encrypt-dataset.js +0 -38
- package/dist/cjs/src/nanotdf/encrypt.js +0 -132
- package/dist/cjs/src/nanotdf/enum/CipherEnum.js +0 -13
- package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +0 -15
- package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +0 -8
- package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +0 -11
- package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +0 -10
- package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +0 -11
- package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +0 -28
- package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +0 -11
- package/dist/cjs/src/nanotdf/index.js +0 -25
- package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +0 -3
- package/dist/cjs/src/nanotdf/models/Ciphers.js +0 -61
- package/dist/cjs/src/nanotdf/models/DefaultParams.js +0 -27
- package/dist/cjs/src/nanotdf/models/EcCurves.js +0 -39
- package/dist/cjs/src/nanotdf/models/Header.js +0 -255
- package/dist/cjs/src/nanotdf/models/Payload.js +0 -158
- package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +0 -73
- package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +0 -82
- package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +0 -38
- package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +0 -62
- package/dist/cjs/src/nanotdf/models/ResourceLocator.js +0 -211
- package/dist/cjs/src/nanotdf/models/Signature.js +0 -77
- package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +0 -20
- package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +0 -38
- package/dist/cjs/src/types/index.js +0 -3
- package/dist/types/src/nanoclients.d.ts +0 -106
- package/dist/types/src/nanoclients.d.ts.map +0 -1
- package/dist/types/src/nanoindex.d.ts +0 -5
- package/dist/types/src/nanoindex.d.ts.map +0 -1
- package/dist/types/src/nanotdf/Client.d.ts +0 -91
- package/dist/types/src/nanotdf/Client.d.ts.map +0 -1
- package/dist/types/src/nanotdf/NanoTDF.d.ts +0 -24
- package/dist/types/src/nanotdf/NanoTDF.d.ts.map +0 -1
- package/dist/types/src/nanotdf/browser-entry.d.ts +0 -17
- package/dist/types/src/nanotdf/browser-entry.d.ts.map +0 -1
- package/dist/types/src/nanotdf/constants.d.ts +0 -2
- package/dist/types/src/nanotdf/constants.d.ts.map +0 -1
- package/dist/types/src/nanotdf/decrypt.d.ts +0 -9
- package/dist/types/src/nanotdf/decrypt.d.ts.map +0 -1
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts +0 -11
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +0 -1
- package/dist/types/src/nanotdf/encrypt.d.ts +0 -13
- package/dist/types/src/nanotdf/encrypt.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +0 -10
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +0 -12
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +0 -5
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +0 -8
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +0 -7
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +0 -8
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +0 -1
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +0 -20
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +0 -1
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +0 -8
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +0 -1
- package/dist/types/src/nanotdf/index.d.ts +0 -9
- package/dist/types/src/nanotdf/index.d.ts.map +0 -1
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +0 -17
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Ciphers.d.ts +0 -14
- package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts +0 -21
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/EcCurves.d.ts +0 -15
- package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Header.d.ts +0 -73
- package/dist/types/src/nanotdf/models/Header.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Payload.d.ts +0 -47
- package/dist/types/src/nanotdf/models/Payload.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +0 -52
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +0 -35
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +0 -11
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +0 -31
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +0 -65
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +0 -1
- package/dist/types/src/nanotdf/models/Signature.d.ts +0 -33
- package/dist/types/src/nanotdf/models/Signature.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/digest.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/enums.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/index.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +0 -1
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +0 -1
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +0 -99
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +0 -1
- package/dist/types/src/types/index.d.ts +0 -45
- package/dist/types/src/types/index.d.ts.map +0 -1
- package/dist/web/src/nanoclients.js +0 -287
- package/dist/web/src/nanoindex.js +0 -5
- package/dist/web/src/nanotdf/Client.js +0 -310
- package/dist/web/src/nanotdf/NanoTDF.js +0 -89
- package/dist/web/src/nanotdf/browser-entry.js +0 -14
- package/dist/web/src/nanotdf/constants.js +0 -2
- package/dist/web/src/nanotdf/decrypt.js +0 -14
- package/dist/web/src/nanotdf/encrypt-dataset.js +0 -32
- package/dist/web/src/nanotdf/encrypt.js +0 -126
- package/dist/web/src/nanotdf/enum/CipherEnum.js +0 -11
- package/dist/web/src/nanotdf/enum/CurveNameEnum.js +0 -13
- package/dist/web/src/nanotdf/enum/EncodingEnum.js +0 -6
- package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +0 -9
- package/dist/web/src/nanotdf/enum/ProtocolEnum.js +0 -8
- package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +0 -9
- package/dist/web/src/nanotdf/helpers/calculateByCurve.js +0 -24
- package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +0 -8
- package/dist/web/src/nanotdf/index.js +0 -11
- package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +0 -2
- package/dist/web/src/nanotdf/models/Ciphers.js +0 -54
- package/dist/web/src/nanotdf/models/DefaultParams.js +0 -22
- package/dist/web/src/nanotdf/models/EcCurves.js +0 -32
- package/dist/web/src/nanotdf/models/Header.js +0 -250
- package/dist/web/src/nanotdf/models/Payload.js +0 -156
- package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +0 -71
- package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +0 -77
- package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +0 -33
- package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +0 -57
- package/dist/web/src/nanotdf/models/ResourceLocator.js +0 -206
- package/dist/web/src/nanotdf/models/Signature.js +0 -74
- package/dist/web/src/nanotdf-crypto/ciphers.js +0 -14
- package/dist/web/src/nanotdf-crypto/digest.js +0 -4
- package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +0 -17
- package/dist/web/src/nanotdf-crypto/generateKeyPair.js +0 -10
- package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +0 -9
- package/dist/web/src/nanotdf-crypto/index.js +0 -11
- package/dist/web/src/tdf/NanoTDF/NanoTDF.js +0 -35
- package/dist/web/src/types/index.js +0 -2
- package/src/nanoclients.ts +0 -406
- package/src/nanoindex.ts +0 -4
- package/src/nanotdf/Client.ts +0 -425
- package/src/nanotdf/NanoTDF.ts +0 -120
- package/src/nanotdf/browser-entry.ts +0 -20
- package/src/nanotdf/constants.ts +0 -1
- package/src/nanotdf/decrypt.ts +0 -19
- package/src/nanotdf/encrypt-dataset.ts +0 -51
- package/src/nanotdf/encrypt.ts +0 -196
- package/src/nanotdf/enum/CipherEnum.ts +0 -10
- package/src/nanotdf/enum/CurveNameEnum.ts +0 -12
- package/src/nanotdf/enum/EncodingEnum.ts +0 -5
- package/src/nanotdf/enum/PolicyTypeEnum.ts +0 -8
- package/src/nanotdf/enum/ProtocolEnum.ts +0 -7
- package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +0 -8
- package/src/nanotdf/helpers/calculateByCurve.ts +0 -26
- package/src/nanotdf/helpers/getHkdfSalt.ts +0 -13
- package/src/nanotdf/index.ts +0 -10
- package/src/nanotdf/interfaces/PolicyInterface.ts +0 -27
- package/src/nanotdf/models/Ciphers.ts +0 -67
- package/src/nanotdf/models/DefaultParams.ts +0 -24
- package/src/nanotdf/models/EcCurves.ts +0 -40
- package/src/nanotdf/models/Header.ts +0 -322
- package/src/nanotdf/models/Payload.ts +0 -196
- package/src/nanotdf/models/Policy/AbstractPolicy.ts +0 -90
- package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +0 -101
- package/src/nanotdf/models/Policy/PolicyFactory.ts +0 -48
- package/src/nanotdf/models/Policy/RemotePolicy.ts +0 -74
- package/src/nanotdf/models/ResourceLocator.ts +0 -212
- package/src/nanotdf/models/Signature.ts +0 -85
- package/src/tdf/NanoTDF/NanoTDF.ts +0 -120
- package/src/types/index.ts +0 -55
- /package/dist/types/src/{nanotdf-crypto → crypto}/ciphers.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/decrypt.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/digest.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/ecdsaSignature.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/encrypt.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/enums.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/exportCryptoKey.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/generateKeyPair.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/generateRandomNumber.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/index.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/keyAgreement.d.ts +0 -0
- /package/dist/types/src/{nanotdf-crypto → crypto}/pemPublicToCrypto.d.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/ciphers.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/decrypt.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/digest.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/encrypt.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/enums.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/exportCryptoKey.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/generateKeyPair.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/generateRandomNumber.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/index.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/keyAgreement.ts +0 -0
- /package/src/{nanotdf-crypto → crypto}/pemPublicToCrypto.ts +0 -0
|
@@ -1,132 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.default = encrypt;
|
|
7
|
-
const NanoTDF_js_1 = __importDefault(require("./NanoTDF.js"));
|
|
8
|
-
const Header_js_1 = __importDefault(require("./models/Header.js"));
|
|
9
|
-
const ResourceLocator_js_1 = __importDefault(require("./models/ResourceLocator.js"));
|
|
10
|
-
const DefaultParams_js_1 = __importDefault(require("./models/DefaultParams.js"));
|
|
11
|
-
const EmbeddedPolicy_js_1 = __importDefault(require("./models/Policy/EmbeddedPolicy.js"));
|
|
12
|
-
const Payload_js_1 = __importDefault(require("./models/Payload.js"));
|
|
13
|
-
const getHkdfSalt_js_1 = __importDefault(require("./helpers/getHkdfSalt.js"));
|
|
14
|
-
const Ciphers_js_1 = require("./models/Ciphers.js");
|
|
15
|
-
const constants_js_1 = require("./constants.js");
|
|
16
|
-
const enums_js_1 = require("./../nanotdf-crypto/enums.js");
|
|
17
|
-
const index_js_1 = require("../nanotdf-crypto/index.js");
|
|
18
|
-
const ecdsaSignature_js_1 = require("../nanotdf-crypto/ecdsaSignature.js");
|
|
19
|
-
const errors_js_1 = require("../errors.js");
|
|
20
|
-
/**
|
|
21
|
-
* Encrypt the plain data into nanotdf buffer
|
|
22
|
-
*
|
|
23
|
-
* @param policy Policy that will added to the nanotdf
|
|
24
|
-
* @param kasInfo KAS url and public key data
|
|
25
|
-
* @param ephemeralKeyPair SDK ephemeral key pair to generate symmetric key
|
|
26
|
-
* @param iv
|
|
27
|
-
* @param data The data to be encrypted
|
|
28
|
-
* @param ecdsaBinding Flag to enable ECDSA binding
|
|
29
|
-
*/
|
|
30
|
-
async function encrypt(policy, kasInfo, ephemeralKeyPair, iv, data, ecdsaBinding = DefaultParams_js_1.default.ecdsaBinding) {
|
|
31
|
-
// Generate a symmetric key.
|
|
32
|
-
if (!ephemeralKeyPair.privateKey) {
|
|
33
|
-
throw new errors_js_1.ConfigurationError('incomplete ephemeral key');
|
|
34
|
-
}
|
|
35
|
-
const symmetricKey = await (0, index_js_1.keyAgreement)(ephemeralKeyPair.privateKey, await kasInfo.key,
|
|
36
|
-
// Get the hkdf salt params
|
|
37
|
-
await (0, getHkdfSalt_js_1.default)(DefaultParams_js_1.default.magicNumberVersion));
|
|
38
|
-
// Construct the kas locator
|
|
39
|
-
const kasResourceLocator = ResourceLocator_js_1.default.fromURL(kasInfo.url, kasInfo.kid);
|
|
40
|
-
// Auth tag length for policy and payload
|
|
41
|
-
const authTagLengthInBytes = (0, Ciphers_js_1.getBitLength)(DefaultParams_js_1.default.symmetricCipher) / 8;
|
|
42
|
-
// Encrypt the policy
|
|
43
|
-
const policyIV = new Uint8Array(iv.length).fill(0);
|
|
44
|
-
const policyAsBuffer = new TextEncoder().encode(policy);
|
|
45
|
-
const encryptedPolicy = await (0, index_js_1.encrypt)(symmetricKey, policyAsBuffer, policyIV, authTagLengthInBytes * 8);
|
|
46
|
-
let policyBinding;
|
|
47
|
-
// Calculate the policy binding.
|
|
48
|
-
if (ecdsaBinding) {
|
|
49
|
-
const curveName = await getCurveNameFromPrivateKey(ephemeralKeyPair.privateKey);
|
|
50
|
-
const ecdsaPrivateKey = await convertECDHToECDSA(ephemeralKeyPair.privateKey, curveName);
|
|
51
|
-
const ecdsaSignature = await (0, ecdsaSignature_js_1.computeECDSASig)(ecdsaPrivateKey, new Uint8Array(encryptedPolicy));
|
|
52
|
-
const { r, s } = (0, ecdsaSignature_js_1.extractRSValuesFromSignature)(new Uint8Array(ecdsaSignature));
|
|
53
|
-
const rLength = r.length;
|
|
54
|
-
const sLength = s.length;
|
|
55
|
-
policyBinding = new Uint8Array(1 + rLength + 1 + sLength);
|
|
56
|
-
// Set the lengths and values of r and s in policyBinding
|
|
57
|
-
policyBinding[0] = rLength;
|
|
58
|
-
policyBinding.set(r, 1);
|
|
59
|
-
policyBinding[1 + rLength] = sLength;
|
|
60
|
-
policyBinding.set(s, 1 + rLength + 1);
|
|
61
|
-
}
|
|
62
|
-
else {
|
|
63
|
-
const signature = await (0, index_js_1.digest)('SHA-256', new Uint8Array(encryptedPolicy));
|
|
64
|
-
policyBinding = new Uint8Array(signature.slice(-constants_js_1.GMAC_BINDING_LEN));
|
|
65
|
-
}
|
|
66
|
-
// Create embedded policy
|
|
67
|
-
const embeddedPolicy = new EmbeddedPolicy_js_1.default(DefaultParams_js_1.default.policyType, policyBinding, new Uint8Array(encryptedPolicy));
|
|
68
|
-
if (!ephemeralKeyPair.publicKey) {
|
|
69
|
-
throw new errors_js_1.ConfigurationError('incomplete ephemeral key');
|
|
70
|
-
}
|
|
71
|
-
// Create a header
|
|
72
|
-
const pubKeyAsArrayBuffer = await (0, index_js_1.exportCryptoKey)(ephemeralKeyPair.publicKey);
|
|
73
|
-
const header = new Header_js_1.default(DefaultParams_js_1.default.magicNumberVersion, kasResourceLocator, ecdsaBinding, DefaultParams_js_1.default.signatureCurveName, DefaultParams_js_1.default.signature, DefaultParams_js_1.default.signatureCurveName, DefaultParams_js_1.default.symmetricCipher, embeddedPolicy, new Uint8Array(pubKeyAsArrayBuffer));
|
|
74
|
-
// Encrypt the payload
|
|
75
|
-
let payloadAsBuffer;
|
|
76
|
-
if (typeof data === 'string') {
|
|
77
|
-
payloadAsBuffer = new TextEncoder().encode(data);
|
|
78
|
-
}
|
|
79
|
-
else {
|
|
80
|
-
payloadAsBuffer = data;
|
|
81
|
-
}
|
|
82
|
-
const encryptedPayload = await (0, index_js_1.encrypt)(symmetricKey, new Uint8Array(payloadAsBuffer), iv, authTagLengthInBytes * 8);
|
|
83
|
-
// Create payload
|
|
84
|
-
const payload = new Payload_js_1.default(iv.slice(-3), new Uint8Array(encryptedPayload.slice(0, -authTagLengthInBytes)), new Uint8Array(encryptedPayload.slice(-authTagLengthInBytes)));
|
|
85
|
-
// Create a nanotdf.
|
|
86
|
-
const nanoTDF = new NanoTDF_js_1.default(header, payload);
|
|
87
|
-
return nanoTDF.toBuffer();
|
|
88
|
-
}
|
|
89
|
-
/**
|
|
90
|
-
* Retrieves the curve name from a given ECDH private key.
|
|
91
|
-
*
|
|
92
|
-
* This function exports the provided ECDH private key in JWK format and extracts
|
|
93
|
-
* the curve name from the 'crv' property of the JWK.
|
|
94
|
-
*
|
|
95
|
-
* @param {CryptoKey} privateKey - The ECDH private key from which to retrieve the curve name.
|
|
96
|
-
* @returns {Promise<string>} - A promise that resolves to the curve name.
|
|
97
|
-
*
|
|
98
|
-
* @throws {Error} - Throws an error if the curve name is undefined.
|
|
99
|
-
*
|
|
100
|
-
*/
|
|
101
|
-
async function getCurveNameFromPrivateKey(privateKey) {
|
|
102
|
-
// Export the private key
|
|
103
|
-
const keyData = await crypto.subtle.exportKey('jwk', privateKey);
|
|
104
|
-
// The curve name is stored in the 'crv' property of the JWK
|
|
105
|
-
if (!keyData.crv) {
|
|
106
|
-
throw new errors_js_1.ConfigurationError('curve name is undefined (bad private key)');
|
|
107
|
-
}
|
|
108
|
-
return keyData.crv;
|
|
109
|
-
}
|
|
110
|
-
/**
|
|
111
|
-
* Converts an ECDH private key to an ECDSA private key.
|
|
112
|
-
*
|
|
113
|
-
* This function exports the given ECDH private key in PKCS#8 format and then
|
|
114
|
-
* imports it as an ECDSA private key using the specified curve name.
|
|
115
|
-
*
|
|
116
|
-
* @param {CryptoKey} key - The ECDH private key to be converted.
|
|
117
|
-
* @param {string} curveName - The name of the elliptic curve to be used for the ECDSA key.
|
|
118
|
-
* @returns {Promise<CryptoKey>} - A promise that resolves to the converted ECDSA private key.
|
|
119
|
-
*
|
|
120
|
-
* @throws {Error} - Throws an error if the key export or import fails.
|
|
121
|
-
*/
|
|
122
|
-
async function convertECDHToECDSA(key, curveName) {
|
|
123
|
-
// Export the ECDH private key
|
|
124
|
-
const ecdhPrivateKey = await crypto.subtle.exportKey('pkcs8', key);
|
|
125
|
-
// Import the ECDH private key as an ECDSA private key
|
|
126
|
-
const ecdsaPrivateKey = await crypto.subtle.importKey(enums_js_1.KeyFormat.Pkcs8, ecdhPrivateKey, {
|
|
127
|
-
name: enums_js_1.AlgorithmName.ECDSA,
|
|
128
|
-
namedCurve: curveName,
|
|
129
|
-
}, true, [enums_js_1.KeyUsageType.Sign]);
|
|
130
|
-
return ecdsaPrivateKey;
|
|
131
|
-
}
|
|
132
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,13 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
var CipherEnum;
|
|
4
|
-
(function (CipherEnum) {
|
|
5
|
-
CipherEnum[CipherEnum["AES_256_GCM_64"] = 0] = "AES_256_GCM_64";
|
|
6
|
-
CipherEnum[CipherEnum["AES_256_GCM_96"] = 1] = "AES_256_GCM_96";
|
|
7
|
-
CipherEnum[CipherEnum["AES_256_GCM_104"] = 2] = "AES_256_GCM_104";
|
|
8
|
-
CipherEnum[CipherEnum["AES_256_GCM_112"] = 3] = "AES_256_GCM_112";
|
|
9
|
-
CipherEnum[CipherEnum["AES_256_GCM_120"] = 4] = "AES_256_GCM_120";
|
|
10
|
-
CipherEnum[CipherEnum["AES_256_GCM_128"] = 5] = "AES_256_GCM_128";
|
|
11
|
-
})(CipherEnum || (CipherEnum = {}));
|
|
12
|
-
exports.default = CipherEnum;
|
|
13
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiQ2lwaGVyRW51bS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL3NyYy9uYW5vdGRmL2VudW0vQ2lwaGVyRW51bS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQUFBLElBQUssVUFPSjtBQVBELFdBQUssVUFBVTtJQUNiLCtEQUFjLENBQUE7SUFDZCwrREFBYyxDQUFBO0lBQ2QsaUVBQWUsQ0FBQTtJQUNmLGlFQUFlLENBQUE7SUFDZixpRUFBZSxDQUFBO0lBQ2YsaUVBQWUsQ0FBQTtBQUNqQixDQUFDLEVBUEksVUFBVSxLQUFWLFVBQVUsUUFPZDtBQUVELGtCQUFlLFVBQVUsQ0FBQyJ9
|
|
@@ -1,15 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
/**
|
|
4
|
-
* The Signature ECC Mode is used to determine the length of the signature at the end of a nanotdf. This, in
|
|
5
|
-
* combination with the previous HAS_SIGNATURE section, describe the signature of the nanotdf. The following table
|
|
6
|
-
* describes the valid values and the associated ECC Params.
|
|
7
|
-
*/
|
|
8
|
-
var CurveNameEnum;
|
|
9
|
-
(function (CurveNameEnum) {
|
|
10
|
-
CurveNameEnum[CurveNameEnum["SECP256R1"] = 0] = "SECP256R1";
|
|
11
|
-
CurveNameEnum[CurveNameEnum["SECP384R1"] = 1] = "SECP384R1";
|
|
12
|
-
CurveNameEnum[CurveNameEnum["SECP521R1"] = 2] = "SECP521R1";
|
|
13
|
-
})(CurveNameEnum || (CurveNameEnum = {}));
|
|
14
|
-
exports.default = CurveNameEnum;
|
|
15
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiQ3VydmVOYW1lRW51bS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL3NyYy9uYW5vdGRmL2VudW0vQ3VydmVOYW1lRW51bS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQUFBOzs7O0dBSUc7QUFDSCxJQUFLLGFBSUo7QUFKRCxXQUFLLGFBQWE7SUFDaEIsMkRBQVMsQ0FBQTtJQUNULDJEQUFTLENBQUE7SUFDVCwyREFBUyxDQUFBO0FBQ1gsQ0FBQyxFQUpJLGFBQWEsS0FBYixhQUFhLFFBSWpCO0FBRUQsa0JBQWUsYUFBYSxDQUFDIn0=
|
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
var EncodingEnum;
|
|
4
|
-
(function (EncodingEnum) {
|
|
5
|
-
EncodingEnum["Base64"] = "base64";
|
|
6
|
-
})(EncodingEnum || (EncodingEnum = {}));
|
|
7
|
-
exports.default = EncodingEnum;
|
|
8
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiRW5jb2RpbmdFbnVtLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vLi4vc3JjL25hbm90ZGYvZW51bS9FbmNvZGluZ0VudW0udHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFBQSxJQUFLLFlBRUo7QUFGRCxXQUFLLFlBQVk7SUFDZixpQ0FBaUIsQ0FBQTtBQUNuQixDQUFDLEVBRkksWUFBWSxLQUFaLFlBQVksUUFFaEI7QUFFRCxrQkFBZSxZQUFZLENBQUMifQ==
|
|
@@ -1,11 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
var PolicyType;
|
|
4
|
-
(function (PolicyType) {
|
|
5
|
-
PolicyType[PolicyType["Remote"] = 0] = "Remote";
|
|
6
|
-
PolicyType[PolicyType["EmbeddedText"] = 1] = "EmbeddedText";
|
|
7
|
-
PolicyType[PolicyType["EmbeddedEncrypted"] = 2] = "EmbeddedEncrypted";
|
|
8
|
-
PolicyType[PolicyType["EmbeddedEncryptedPKA"] = 3] = "EmbeddedEncryptedPKA";
|
|
9
|
-
})(PolicyType || (PolicyType = {}));
|
|
10
|
-
exports.default = PolicyType;
|
|
11
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiUG9saWN5VHlwZUVudW0uanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi8uLi9zcmMvbmFub3RkZi9lbnVtL1BvbGljeVR5cGVFbnVtLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBQUEsSUFBSyxVQUtKO0FBTEQsV0FBSyxVQUFVO0lBQ2IsK0NBQU0sQ0FBQTtJQUNOLDJEQUFZLENBQUE7SUFDWixxRUFBaUIsQ0FBQTtJQUNqQiwyRUFBb0IsQ0FBQTtBQUN0QixDQUFDLEVBTEksVUFBVSxLQUFWLFVBQVUsUUFLZDtBQUVELGtCQUFlLFVBQVUsQ0FBQyJ9
|
|
@@ -1,10 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
var ProtocolEnum;
|
|
4
|
-
(function (ProtocolEnum) {
|
|
5
|
-
ProtocolEnum[ProtocolEnum["Http"] = 0] = "Http";
|
|
6
|
-
ProtocolEnum[ProtocolEnum["Https"] = 1] = "Https";
|
|
7
|
-
ProtocolEnum[ProtocolEnum["SharedResourceDirectory"] = 15] = "SharedResourceDirectory";
|
|
8
|
-
})(ProtocolEnum || (ProtocolEnum = {}));
|
|
9
|
-
exports.default = ProtocolEnum;
|
|
10
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiUHJvdG9jb2xFbnVtLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vLi4vc3JjL25hbm90ZGYvZW51bS9Qcm90b2NvbEVudW0udHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFBQSxJQUFLLFlBSUo7QUFKRCxXQUFLLFlBQVk7SUFDZiwrQ0FBUSxDQUFBO0lBQ1IsaURBQVMsQ0FBQTtJQUNULHNGQUE2QixDQUFBO0FBQy9CLENBQUMsRUFKSSxZQUFZLEtBQVosWUFBWSxRQUloQjtBQUVELGtCQUFlLFlBQVksQ0FBQyJ9
|
|
@@ -1,11 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
var ResourceLocatorIdentifierEnum;
|
|
4
|
-
(function (ResourceLocatorIdentifierEnum) {
|
|
5
|
-
ResourceLocatorIdentifierEnum[ResourceLocatorIdentifierEnum["None"] = 0] = "None";
|
|
6
|
-
ResourceLocatorIdentifierEnum[ResourceLocatorIdentifierEnum["TwoBytes"] = 2] = "TwoBytes";
|
|
7
|
-
ResourceLocatorIdentifierEnum[ResourceLocatorIdentifierEnum["EightBytes"] = 8] = "EightBytes";
|
|
8
|
-
ResourceLocatorIdentifierEnum[ResourceLocatorIdentifierEnum["ThirtyTwoBytes"] = 32] = "ThirtyTwoBytes";
|
|
9
|
-
})(ResourceLocatorIdentifierEnum || (ResourceLocatorIdentifierEnum = {}));
|
|
10
|
-
exports.default = ResourceLocatorIdentifierEnum;
|
|
11
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiUmVzb3VyY2VMb2NhdG9ySWRlbnRpZmllckVudW0uanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi8uLi9zcmMvbmFub3RkZi9lbnVtL1Jlc291cmNlTG9jYXRvcklkZW50aWZpZXJFbnVtLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBQUEsSUFBSyw2QkFLSjtBQUxELFdBQUssNkJBQTZCO0lBQ2hDLGlGQUFRLENBQUE7SUFDUix5RkFBWSxDQUFBO0lBQ1osNkZBQWMsQ0FBQTtJQUNkLHNHQUFtQixDQUFBO0FBQ3JCLENBQUMsRUFMSSw2QkFBNkIsS0FBN0IsNkJBQTZCLFFBS2pDO0FBRUQsa0JBQWUsNkJBQTZCLENBQUMifQ==
|
|
@@ -1,28 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.lengthOfPublicKey = lengthOfPublicKey;
|
|
4
|
-
exports.lengthOfSignature = lengthOfSignature;
|
|
5
|
-
const EcCurves_js_1 = require("../models/EcCurves.js");
|
|
6
|
-
/**
|
|
7
|
-
* Length of public key
|
|
8
|
-
*
|
|
9
|
-
* @param curveName CurveNameEnum
|
|
10
|
-
* @returns number length of the public key
|
|
11
|
-
*/
|
|
12
|
-
function lengthOfPublicKey(curveName) {
|
|
13
|
-
return Math.ceil((0, EcCurves_js_1.getCurveLength)(curveName) / 8);
|
|
14
|
-
}
|
|
15
|
-
/**
|
|
16
|
-
* Length of signature
|
|
17
|
-
*
|
|
18
|
-
* ECDSA signatures are 2 times longer than the signer's private key for the curve used during the signing process.
|
|
19
|
-
* For example, for 256-bit elliptic curves (like secp256k1 ) the ECDSA signature is 512 bits (64 bytes) and for 521-bit
|
|
20
|
-
* curves (like secp521r1 ) the signature is 1042 bits.
|
|
21
|
-
*
|
|
22
|
-
* @param curveName CurveNameEnum
|
|
23
|
-
* @returns number length of the signature
|
|
24
|
-
*/
|
|
25
|
-
function lengthOfSignature(curveName) {
|
|
26
|
-
return Math.ceil(((0, EcCurves_js_1.getCurveLength)(curveName) * 2) / 8);
|
|
27
|
-
}
|
|
28
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2FsY3VsYXRlQnlDdXJ2ZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL3NyYy9uYW5vdGRmL2hlbHBlcnMvY2FsY3VsYXRlQnlDdXJ2ZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQVNBLDhDQUVDO0FBWUQsOENBRUM7QUF4QkQsdURBQXVEO0FBRXZEOzs7OztHQUtHO0FBQ0gsU0FBZ0IsaUJBQWlCLENBQUMsU0FBd0I7SUFDeEQsT0FBTyxJQUFJLENBQUMsSUFBSSxDQUFDLElBQUEsNEJBQWMsRUFBQyxTQUFTLENBQUMsR0FBRyxDQUFDLENBQUMsQ0FBQztBQUNsRCxDQUFDO0FBRUQ7Ozs7Ozs7OztHQVNHO0FBQ0gsU0FBZ0IsaUJBQWlCLENBQUMsU0FBd0I7SUFDeEQsT0FBTyxJQUFJLENBQUMsSUFBSSxDQUFDLENBQUMsSUFBQSw0QkFBYyxFQUFDLFNBQVMsQ0FBQyxHQUFHLENBQUMsQ0FBQyxHQUFHLENBQUMsQ0FBQyxDQUFDO0FBQ3hELENBQUMifQ==
|
|
@@ -1,11 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.default = getHkdfSalt;
|
|
4
|
-
const index_js_1 = require("../../nanotdf-crypto/index.js");
|
|
5
|
-
async function getHkdfSalt(buffer) {
|
|
6
|
-
return {
|
|
7
|
-
hkdfSalt: await (0, index_js_1.digest)(index_js_1.enums.HashType.Sha256, buffer),
|
|
8
|
-
hkdfHash: index_js_1.enums.HashType.Sha256,
|
|
9
|
-
};
|
|
10
|
-
}
|
|
11
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZ2V0SGtkZlNhbHQuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi8uLi9zcmMvbmFub3RkZi9oZWxwZXJzL2dldEhrZGZTYWx0LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBT0EsOEJBS0M7QUFaRCw0REFBOEQ7QUFPL0MsS0FBSyxVQUFVLFdBQVcsQ0FBQyxNQUF1QjtJQUMvRCxPQUFPO1FBQ0wsUUFBUSxFQUFFLE1BQU0sSUFBQSxpQkFBTSxFQUFDLGdCQUFLLENBQUMsUUFBUSxDQUFDLE1BQU0sRUFBRSxNQUFNLENBQUM7UUFDckQsUUFBUSxFQUFFLGdCQUFLLENBQUMsUUFBUSxDQUFDLE1BQU07S0FDaEMsQ0FBQztBQUNKLENBQUMifQ==
|
|
@@ -1,25 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.DefaultParams = exports.getHkdfSalt = exports.encryptDataset = exports.encrypt = exports.decrypt = exports.NanoTDF = exports.Header = exports.Client = void 0;
|
|
7
|
-
// Don't export named values or the enduser will
|
|
8
|
-
// have to call `const NanoTDF = require('nanotdf').default`
|
|
9
|
-
var Client_js_1 = require("./Client.js");
|
|
10
|
-
Object.defineProperty(exports, "Client", { enumerable: true, get: function () { return __importDefault(Client_js_1).default; } });
|
|
11
|
-
var Header_js_1 = require("./models/Header.js");
|
|
12
|
-
Object.defineProperty(exports, "Header", { enumerable: true, get: function () { return __importDefault(Header_js_1).default; } });
|
|
13
|
-
var NanoTDF_js_1 = require("./NanoTDF.js");
|
|
14
|
-
Object.defineProperty(exports, "NanoTDF", { enumerable: true, get: function () { return __importDefault(NanoTDF_js_1).default; } });
|
|
15
|
-
var decrypt_js_1 = require("./decrypt.js");
|
|
16
|
-
Object.defineProperty(exports, "decrypt", { enumerable: true, get: function () { return __importDefault(decrypt_js_1).default; } });
|
|
17
|
-
var encrypt_js_1 = require("./encrypt.js");
|
|
18
|
-
Object.defineProperty(exports, "encrypt", { enumerable: true, get: function () { return __importDefault(encrypt_js_1).default; } });
|
|
19
|
-
var encrypt_dataset_js_1 = require("./encrypt-dataset.js");
|
|
20
|
-
Object.defineProperty(exports, "encryptDataset", { enumerable: true, get: function () { return __importDefault(encrypt_dataset_js_1).default; } });
|
|
21
|
-
var getHkdfSalt_js_1 = require("./helpers/getHkdfSalt.js");
|
|
22
|
-
Object.defineProperty(exports, "getHkdfSalt", { enumerable: true, get: function () { return __importDefault(getHkdfSalt_js_1).default; } });
|
|
23
|
-
var DefaultParams_js_1 = require("./models/DefaultParams.js");
|
|
24
|
-
Object.defineProperty(exports, "DefaultParams", { enumerable: true, get: function () { return __importDefault(DefaultParams_js_1).default; } });
|
|
25
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,3 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiUG9saWN5SW50ZXJmYWNlLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vLi4vc3JjL25hbm90ZGYvaW50ZXJmYWNlcy9Qb2xpY3lJbnRlcmZhY2UudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IiJ9
|
|
@@ -1,61 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.Aes256Gcm128 = exports.Aes256Gcm120 = exports.Aes256Gcm112 = exports.Aes256Gcm104 = exports.Aes256Gcm96 = exports.Aes256Gcm64 = void 0;
|
|
7
|
-
exports.getBitLength = getBitLength;
|
|
8
|
-
const CipherEnum_js_1 = __importDefault(require("../enum/CipherEnum.js"));
|
|
9
|
-
const errors_js_1 = require("../../errors.js");
|
|
10
|
-
exports.Aes256Gcm64 = {
|
|
11
|
-
name: CipherEnum_js_1.default.AES_256_GCM_64,
|
|
12
|
-
length: 64,
|
|
13
|
-
};
|
|
14
|
-
exports.Aes256Gcm96 = {
|
|
15
|
-
name: CipherEnum_js_1.default.AES_256_GCM_96,
|
|
16
|
-
length: 96,
|
|
17
|
-
};
|
|
18
|
-
exports.Aes256Gcm104 = {
|
|
19
|
-
name: CipherEnum_js_1.default.AES_256_GCM_104,
|
|
20
|
-
length: 104,
|
|
21
|
-
};
|
|
22
|
-
exports.Aes256Gcm112 = {
|
|
23
|
-
name: CipherEnum_js_1.default.AES_256_GCM_112,
|
|
24
|
-
length: 112,
|
|
25
|
-
};
|
|
26
|
-
exports.Aes256Gcm120 = {
|
|
27
|
-
name: CipherEnum_js_1.default.AES_256_GCM_120,
|
|
28
|
-
length: 120,
|
|
29
|
-
};
|
|
30
|
-
exports.Aes256Gcm128 = {
|
|
31
|
-
name: CipherEnum_js_1.default.AES_256_GCM_128,
|
|
32
|
-
length: 128,
|
|
33
|
-
};
|
|
34
|
-
function getBitLength(cipher) {
|
|
35
|
-
switch (cipher) {
|
|
36
|
-
case CipherEnum_js_1.default.AES_256_GCM_64:
|
|
37
|
-
return exports.Aes256Gcm64.length;
|
|
38
|
-
case CipherEnum_js_1.default.AES_256_GCM_96:
|
|
39
|
-
return exports.Aes256Gcm96.length;
|
|
40
|
-
case CipherEnum_js_1.default.AES_256_GCM_104:
|
|
41
|
-
return exports.Aes256Gcm104.length;
|
|
42
|
-
case CipherEnum_js_1.default.AES_256_GCM_112:
|
|
43
|
-
return exports.Aes256Gcm112.length;
|
|
44
|
-
case CipherEnum_js_1.default.AES_256_GCM_120:
|
|
45
|
-
return exports.Aes256Gcm120.length;
|
|
46
|
-
case CipherEnum_js_1.default.AES_256_GCM_128:
|
|
47
|
-
return exports.Aes256Gcm128.length;
|
|
48
|
-
default:
|
|
49
|
-
throw new errors_js_1.UnsupportedFeatureError(`unsupported cipher enum value: [${cipher}]`);
|
|
50
|
-
}
|
|
51
|
-
}
|
|
52
|
-
// export default {
|
|
53
|
-
// Aes256Gcm64,
|
|
54
|
-
// Aes256Gcm96,
|
|
55
|
-
// Aes256Gcm104,
|
|
56
|
-
// Aes256Gcm112,
|
|
57
|
-
// Aes256Gcm120,
|
|
58
|
-
// Aes256Gcm128,
|
|
59
|
-
// getBitLength,
|
|
60
|
-
// };
|
|
61
|
-
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiQ2lwaGVycy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uLy4uL3NyYy9uYW5vdGRmL21vZGVscy9DaXBoZXJzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7OztBQXNDQSxvQ0FpQkM7QUF2REQsMEVBQStDO0FBQy9DLCtDQUEwRDtBQU83QyxRQUFBLFdBQVcsR0FBb0I7SUFDMUMsSUFBSSxFQUFFLHVCQUFVLENBQUMsY0FBYztJQUMvQixNQUFNLEVBQUUsRUFBRTtDQUNYLENBQUM7QUFFVyxRQUFBLFdBQVcsR0FBb0I7SUFDMUMsSUFBSSxFQUFFLHVCQUFVLENBQUMsY0FBYztJQUMvQixNQUFNLEVBQUUsRUFBRTtDQUNYLENBQUM7QUFFVyxRQUFBLFlBQVksR0FBb0I7SUFDM0MsSUFBSSxFQUFFLHVCQUFVLENBQUMsZUFBZTtJQUNoQyxNQUFNLEVBQUUsR0FBRztDQUNaLENBQUM7QUFFVyxRQUFBLFlBQVksR0FBb0I7SUFDM0MsSUFBSSxFQUFFLHVCQUFVLENBQUMsZUFBZTtJQUNoQyxNQUFNLEVBQUUsR0FBRztDQUNaLENBQUM7QUFFVyxRQUFBLFlBQVksR0FBb0I7SUFDM0MsSUFBSSxFQUFFLHVCQUFVLENBQUMsZUFBZTtJQUNoQyxNQUFNLEVBQUUsR0FBRztDQUNaLENBQUM7QUFFVyxRQUFBLFlBQVksR0FBb0I7SUFDM0MsSUFBSSxFQUFFLHVCQUFVLENBQUMsZUFBZTtJQUNoQyxNQUFNLEVBQUUsR0FBRztDQUNaLENBQUM7QUFFRixTQUFnQixZQUFZLENBQUMsTUFBa0I7SUFDN0MsUUFBUSxNQUFNLEVBQUUsQ0FBQztRQUNmLEtBQUssdUJBQVUsQ0FBQyxjQUFjO1lBQzVCLE9BQU8sbUJBQVcsQ0FBQyxNQUFNLENBQUM7UUFDNUIsS0FBSyx1QkFBVSxDQUFDLGNBQWM7WUFDNUIsT0FBTyxtQkFBVyxDQUFDLE1BQU0sQ0FBQztRQUM1QixLQUFLLHVCQUFVLENBQUMsZUFBZTtZQUM3QixPQUFPLG9CQUFZLENBQUMsTUFBTSxDQUFDO1FBQzdCLEtBQUssdUJBQVUsQ0FBQyxlQUFlO1lBQzdCLE9BQU8sb0JBQVksQ0FBQyxNQUFNLENBQUM7UUFDN0IsS0FBSyx1QkFBVSxDQUFDLGVBQWU7WUFDN0IsT0FBTyxvQkFBWSxDQUFDLE1BQU0sQ0FBQztRQUM3QixLQUFLLHVCQUFVLENBQUMsZUFBZTtZQUM3QixPQUFPLG9CQUFZLENBQUMsTUFBTSxDQUFDO1FBQzdCO1lBQ0UsTUFBTSxJQUFJLG1DQUF1QixDQUFDLG1DQUFtQyxNQUFNLEdBQUcsQ0FBQyxDQUFDO0lBQ3BGLENBQUM7QUFDSCxDQUFDO0FBRUQsbUJBQW1CO0FBQ25CLGlCQUFpQjtBQUNqQixpQkFBaUI7QUFDakIsa0JBQWtCO0FBQ2xCLGtCQUFrQjtBQUNsQixrQkFBa0I7QUFDbEIsa0JBQWtCO0FBRWxCLGtCQUFrQjtBQUNsQixLQUFLIn0=
|
|
@@ -1,27 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
const CipherEnum_js_1 = __importDefault(require("../enum/CipherEnum.js"));
|
|
7
|
-
const CurveNameEnum_js_1 = __importDefault(require("../enum/CurveNameEnum.js"));
|
|
8
|
-
const PolicyTypeEnum_js_1 = __importDefault(require("../enum/PolicyTypeEnum.js"));
|
|
9
|
-
const enc = new TextEncoder();
|
|
10
|
-
/**
|
|
11
|
-
* Default encrypt param builders
|
|
12
|
-
*
|
|
13
|
-
* @link https://github.com/virtru/tdf3-cpp/blob/develop/tdf3-src/lib/src/nanotdf_builder_impl.h
|
|
14
|
-
*/
|
|
15
|
-
const DefaultParams = {
|
|
16
|
-
ecdsaBinding: false,
|
|
17
|
-
ephemeralCurveName: CurveNameEnum_js_1.default.SECP256R1,
|
|
18
|
-
magicNumberVersion: enc.encode('L1L'),
|
|
19
|
-
offlineMode: false,
|
|
20
|
-
policyType: PolicyTypeEnum_js_1.default.EmbeddedEncrypted,
|
|
21
|
-
signature: false,
|
|
22
|
-
signatureCurveName: CurveNameEnum_js_1.default.SECP256R1,
|
|
23
|
-
symmetricCipher: CipherEnum_js_1.default.AES_256_GCM_96,
|
|
24
|
-
defaultECAlgorithm: 'ec:secp256r1',
|
|
25
|
-
};
|
|
26
|
-
exports.default = DefaultParams;
|
|
27
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,39 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
-
};
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.Secp521R1 = exports.Secp384R1 = exports.Secp256R1 = void 0;
|
|
7
|
-
exports.getCurveLength = getCurveLength;
|
|
8
|
-
const CurveNameEnum_js_1 = __importDefault(require("../enum/CurveNameEnum.js"));
|
|
9
|
-
const errors_js_1 = require("../../errors.js");
|
|
10
|
-
exports.Secp256R1 = {
|
|
11
|
-
name: CurveNameEnum_js_1.default.SECP256R1,
|
|
12
|
-
length: 256,
|
|
13
|
-
};
|
|
14
|
-
exports.Secp384R1 = {
|
|
15
|
-
name: CurveNameEnum_js_1.default.SECP384R1,
|
|
16
|
-
length: 384,
|
|
17
|
-
};
|
|
18
|
-
exports.Secp521R1 = {
|
|
19
|
-
name: CurveNameEnum_js_1.default.SECP521R1,
|
|
20
|
-
length: 521,
|
|
21
|
-
};
|
|
22
|
-
/**
|
|
23
|
-
* Get size from Curve
|
|
24
|
-
*
|
|
25
|
-
* @param curveName CurveNameEnum name of the curve
|
|
26
|
-
*/
|
|
27
|
-
function getCurveLength(curveName) {
|
|
28
|
-
switch (curveName) {
|
|
29
|
-
case exports.Secp256R1.name:
|
|
30
|
-
return exports.Secp256R1.length;
|
|
31
|
-
case exports.Secp384R1.name:
|
|
32
|
-
return exports.Secp384R1.length;
|
|
33
|
-
case exports.Secp521R1.name:
|
|
34
|
-
return exports.Secp521R1.length;
|
|
35
|
-
default:
|
|
36
|
-
throw new errors_js_1.UnsupportedFeatureError(`unsupported curve name: ${curveName}`);
|
|
37
|
-
}
|
|
38
|
-
}
|
|
39
|
-
//# sourceMappingURL=data:application/json;base64,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
|