@opentdf/sdk 0.8.0-beta.74 → 0.8.0-rc.73
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +30 -5
- package/dist/cjs/src/nanoclients.js +292 -0
- package/dist/cjs/src/nanoindex.js +47 -0
- package/dist/cjs/src/nanotdf/Client.js +315 -0
- package/dist/cjs/src/nanotdf/NanoTDF.js +94 -0
- package/dist/cjs/src/nanotdf/browser-entry.js +19 -0
- package/dist/cjs/src/nanotdf/constants.js +5 -0
- package/dist/cjs/src/nanotdf/decrypt.js +17 -0
- package/dist/cjs/src/nanotdf/encrypt-dataset.js +38 -0
- package/dist/cjs/src/nanotdf/encrypt.js +132 -0
- package/dist/cjs/src/nanotdf/enum/CipherEnum.js +13 -0
- package/dist/cjs/src/nanotdf/enum/CurveNameEnum.js +15 -0
- package/dist/cjs/src/nanotdf/enum/EncodingEnum.js +8 -0
- package/dist/cjs/src/nanotdf/enum/PolicyTypeEnum.js +11 -0
- package/dist/cjs/src/nanotdf/enum/ProtocolEnum.js +10 -0
- package/dist/cjs/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +11 -0
- package/dist/cjs/src/nanotdf/helpers/calculateByCurve.js +28 -0
- package/dist/cjs/src/nanotdf/helpers/getHkdfSalt.js +11 -0
- package/dist/cjs/src/nanotdf/index.js +25 -0
- package/dist/cjs/src/nanotdf/interfaces/PolicyInterface.js +3 -0
- package/dist/cjs/src/nanotdf/models/Ciphers.js +61 -0
- package/dist/cjs/src/nanotdf/models/DefaultParams.js +27 -0
- package/dist/cjs/src/nanotdf/models/EcCurves.js +39 -0
- package/dist/cjs/src/nanotdf/models/Header.js +255 -0
- package/dist/cjs/src/nanotdf/models/Payload.js +158 -0
- package/dist/cjs/src/nanotdf/models/Policy/AbstractPolicy.js +73 -0
- package/dist/cjs/src/nanotdf/models/Policy/EmbeddedPolicy.js +82 -0
- package/dist/cjs/src/nanotdf/models/Policy/PolicyFactory.js +38 -0
- package/dist/cjs/src/nanotdf/models/Policy/RemotePolicy.js +62 -0
- package/dist/cjs/src/nanotdf/models/ResourceLocator.js +211 -0
- package/dist/cjs/src/nanotdf/models/Signature.js +77 -0
- package/dist/cjs/src/{crypto → nanotdf-crypto}/ciphers.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/decrypt.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/digest.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/ecdsaSignature.js +2 -2
- package/dist/cjs/src/{crypto → nanotdf-crypto}/encrypt.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/enums.js +1 -1
- package/dist/cjs/src/nanotdf-crypto/exportCryptoKey.js +20 -0
- package/dist/cjs/src/{crypto → nanotdf-crypto}/generateKeyPair.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/generateRandomNumber.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/index.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/keyAgreement.js +1 -1
- package/dist/cjs/src/{crypto → nanotdf-crypto}/pemPublicToCrypto.js +1 -1
- package/dist/cjs/src/opentdf.js +260 -9
- package/dist/cjs/src/tdf/NanoTDF/NanoTDF.js +38 -0
- package/dist/cjs/src/types/index.js +3 -0
- package/dist/cjs/src/utils.js +2 -2
- package/dist/cjs/tdf3/index.js +8 -7
- package/dist/cjs/tdf3/src/models/key-access.js +4 -4
- package/dist/cjs/tdf3/src/tdf.js +4 -4
- package/dist/types/src/nanoclients.d.ts +106 -0
- package/dist/types/src/nanoclients.d.ts.map +1 -0
- package/dist/types/src/nanoindex.d.ts +5 -0
- package/dist/types/src/nanoindex.d.ts.map +1 -0
- package/dist/types/src/nanotdf/Client.d.ts +91 -0
- package/dist/types/src/nanotdf/Client.d.ts.map +1 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts +24 -0
- package/dist/types/src/nanotdf/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts +17 -0
- package/dist/types/src/nanotdf/browser-entry.d.ts.map +1 -0
- package/dist/types/src/nanotdf/constants.d.ts +2 -0
- package/dist/types/src/nanotdf/constants.d.ts.map +1 -0
- package/dist/types/src/nanotdf/decrypt.d.ts +9 -0
- package/dist/types/src/nanotdf/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts +11 -0
- package/dist/types/src/nanotdf/encrypt-dataset.d.ts.map +1 -0
- package/dist/types/src/nanotdf/encrypt.d.ts +13 -0
- package/dist/types/src/nanotdf/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts +10 -0
- package/dist/types/src/nanotdf/enum/CipherEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts +12 -0
- package/dist/types/src/nanotdf/enum/CurveNameEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts +5 -0
- package/dist/types/src/nanotdf/enum/EncodingEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/PolicyTypeEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts +7 -0
- package/dist/types/src/nanotdf/enum/ProtocolEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts +8 -0
- package/dist/types/src/nanotdf/enum/ResourceLocatorIdentifierEnum.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts +20 -0
- package/dist/types/src/nanotdf/helpers/calculateByCurve.d.ts.map +1 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts +8 -0
- package/dist/types/src/nanotdf/helpers/getHkdfSalt.d.ts.map +1 -0
- package/dist/types/src/nanotdf/index.d.ts +9 -0
- package/dist/types/src/nanotdf/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts +17 -0
- package/dist/types/src/nanotdf/interfaces/PolicyInterface.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts +14 -0
- package/dist/types/src/nanotdf/models/Ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts +21 -0
- package/dist/types/src/nanotdf/models/DefaultParams.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts +15 -0
- package/dist/types/src/nanotdf/models/EcCurves.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Header.d.ts +73 -0
- package/dist/types/src/nanotdf/models/Header.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts +47 -0
- package/dist/types/src/nanotdf/models/Payload.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts +52 -0
- package/dist/types/src/nanotdf/models/Policy/AbstractPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts +35 -0
- package/dist/types/src/nanotdf/models/Policy/EmbeddedPolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts +11 -0
- package/dist/types/src/nanotdf/models/Policy/PolicyFactory.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts +31 -0
- package/dist/types/src/nanotdf/models/Policy/RemotePolicy.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts +65 -0
- package/dist/types/src/nanotdf/models/ResourceLocator.d.ts.map +1 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts +33 -0
- package/dist/types/src/nanotdf/models/Signature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ciphers.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/decrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/digest.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/ecdsaSignature.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/encrypt.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/enums.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/exportCryptoKey.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateKeyPair.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/generateRandomNumber.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/index.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/keyAgreement.d.ts.map +1 -0
- package/dist/types/src/nanotdf-crypto/pemPublicToCrypto.d.ts.map +1 -0
- package/dist/types/src/opentdf.d.ts +65 -1
- package/dist/types/src/opentdf.d.ts.map +1 -1
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts +99 -0
- package/dist/types/src/tdf/NanoTDF/NanoTDF.d.ts.map +1 -0
- package/dist/types/src/types/index.d.ts +45 -0
- package/dist/types/src/types/index.d.ts.map +1 -0
- package/dist/types/tdf3/index.d.ts +3 -4
- package/dist/types/tdf3/index.d.ts.map +1 -1
- package/dist/web/src/nanoclients.js +287 -0
- package/dist/web/src/nanoindex.js +5 -0
- package/dist/web/src/nanotdf/Client.js +310 -0
- package/dist/web/src/nanotdf/NanoTDF.js +89 -0
- package/dist/web/src/nanotdf/browser-entry.js +14 -0
- package/dist/web/src/nanotdf/constants.js +2 -0
- package/dist/web/src/nanotdf/decrypt.js +14 -0
- package/dist/web/src/nanotdf/encrypt-dataset.js +32 -0
- package/dist/web/src/nanotdf/encrypt.js +126 -0
- package/dist/web/src/nanotdf/enum/CipherEnum.js +11 -0
- package/dist/web/src/nanotdf/enum/CurveNameEnum.js +13 -0
- package/dist/web/src/nanotdf/enum/EncodingEnum.js +6 -0
- package/dist/web/src/nanotdf/enum/PolicyTypeEnum.js +9 -0
- package/dist/web/src/nanotdf/enum/ProtocolEnum.js +8 -0
- package/dist/web/src/nanotdf/enum/ResourceLocatorIdentifierEnum.js +9 -0
- package/dist/web/src/nanotdf/helpers/calculateByCurve.js +24 -0
- package/dist/web/src/nanotdf/helpers/getHkdfSalt.js +8 -0
- package/dist/web/src/nanotdf/index.js +11 -0
- package/dist/web/src/nanotdf/interfaces/PolicyInterface.js +2 -0
- package/dist/web/src/nanotdf/models/Ciphers.js +54 -0
- package/dist/web/src/nanotdf/models/DefaultParams.js +22 -0
- package/dist/web/src/nanotdf/models/EcCurves.js +32 -0
- package/dist/web/src/nanotdf/models/Header.js +250 -0
- package/dist/web/src/nanotdf/models/Payload.js +156 -0
- package/dist/web/src/nanotdf/models/Policy/AbstractPolicy.js +71 -0
- package/dist/web/src/nanotdf/models/Policy/EmbeddedPolicy.js +77 -0
- package/dist/web/src/nanotdf/models/Policy/PolicyFactory.js +33 -0
- package/dist/web/src/nanotdf/models/Policy/RemotePolicy.js +57 -0
- package/dist/web/src/nanotdf/models/ResourceLocator.js +206 -0
- package/dist/web/src/nanotdf/models/Signature.js +74 -0
- package/dist/web/src/nanotdf-crypto/ciphers.js +14 -0
- package/dist/web/src/{crypto → nanotdf-crypto}/decrypt.js +1 -1
- package/dist/web/src/nanotdf-crypto/digest.js +4 -0
- package/dist/web/src/{crypto → nanotdf-crypto}/ecdsaSignature.js +2 -2
- package/dist/web/src/{crypto → nanotdf-crypto}/encrypt.js +1 -1
- package/dist/web/src/{crypto → nanotdf-crypto}/enums.js +1 -1
- package/dist/web/src/nanotdf-crypto/exportCryptoKey.js +17 -0
- package/dist/web/src/nanotdf-crypto/generateKeyPair.js +10 -0
- package/dist/web/src/nanotdf-crypto/generateRandomNumber.js +9 -0
- package/dist/web/src/nanotdf-crypto/index.js +11 -0
- package/dist/web/src/{crypto → nanotdf-crypto}/keyAgreement.js +1 -1
- package/dist/web/src/{crypto → nanotdf-crypto}/pemPublicToCrypto.js +1 -1
- package/dist/web/src/opentdf.js +255 -8
- package/dist/web/src/tdf/NanoTDF/NanoTDF.js +35 -0
- package/dist/web/src/types/index.js +2 -0
- package/dist/web/src/utils.js +2 -2
- package/dist/web/tdf3/index.js +3 -4
- package/dist/web/tdf3/src/models/key-access.js +4 -4
- package/dist/web/tdf3/src/tdf.js +4 -4
- package/package.json +6 -1
- package/src/nanoclients.ts +406 -0
- package/src/nanoindex.ts +4 -0
- package/src/nanotdf/Client.ts +425 -0
- package/src/nanotdf/NanoTDF.ts +120 -0
- package/src/nanotdf/browser-entry.ts +20 -0
- package/src/nanotdf/constants.ts +1 -0
- package/src/nanotdf/decrypt.ts +19 -0
- package/src/nanotdf/encrypt-dataset.ts +51 -0
- package/src/nanotdf/encrypt.ts +196 -0
- package/src/nanotdf/enum/CipherEnum.ts +10 -0
- package/src/nanotdf/enum/CurveNameEnum.ts +12 -0
- package/src/nanotdf/enum/EncodingEnum.ts +5 -0
- package/src/nanotdf/enum/PolicyTypeEnum.ts +8 -0
- package/src/nanotdf/enum/ProtocolEnum.ts +7 -0
- package/src/nanotdf/enum/ResourceLocatorIdentifierEnum.ts +8 -0
- package/src/nanotdf/helpers/calculateByCurve.ts +26 -0
- package/src/nanotdf/helpers/getHkdfSalt.ts +13 -0
- package/src/nanotdf/index.ts +10 -0
- package/src/nanotdf/interfaces/PolicyInterface.ts +27 -0
- package/src/nanotdf/models/Ciphers.ts +67 -0
- package/src/nanotdf/models/DefaultParams.ts +24 -0
- package/src/nanotdf/models/EcCurves.ts +40 -0
- package/src/nanotdf/models/Header.ts +322 -0
- package/src/nanotdf/models/Payload.ts +196 -0
- package/src/nanotdf/models/Policy/AbstractPolicy.ts +90 -0
- package/src/nanotdf/models/Policy/EmbeddedPolicy.ts +101 -0
- package/src/nanotdf/models/Policy/PolicyFactory.ts +48 -0
- package/src/nanotdf/models/Policy/RemotePolicy.ts +74 -0
- package/src/nanotdf/models/ResourceLocator.ts +212 -0
- package/src/nanotdf/models/Signature.ts +85 -0
- package/src/{crypto → nanotdf-crypto}/ecdsaSignature.ts +1 -1
- package/src/opentdf.ts +343 -6
- package/src/tdf/NanoTDF/NanoTDF.ts +120 -0
- package/src/types/index.ts +55 -0
- package/src/utils.ts +1 -1
- package/tdf3/index.ts +12 -2
- package/tdf3/src/models/key-access.ts +3 -3
- package/tdf3/src/tdf.ts +3 -3
- package/dist/cjs/src/crypto/exportCryptoKey.js +0 -20
- package/dist/types/src/crypto/ciphers.d.ts.map +0 -1
- package/dist/types/src/crypto/decrypt.d.ts.map +0 -1
- package/dist/types/src/crypto/digest.d.ts.map +0 -1
- package/dist/types/src/crypto/ecdsaSignature.d.ts.map +0 -1
- package/dist/types/src/crypto/encrypt.d.ts.map +0 -1
- package/dist/types/src/crypto/enums.d.ts.map +0 -1
- package/dist/types/src/crypto/exportCryptoKey.d.ts.map +0 -1
- package/dist/types/src/crypto/generateKeyPair.d.ts.map +0 -1
- package/dist/types/src/crypto/generateRandomNumber.d.ts.map +0 -1
- package/dist/types/src/crypto/index.d.ts.map +0 -1
- package/dist/types/src/crypto/keyAgreement.d.ts.map +0 -1
- package/dist/types/src/crypto/pemPublicToCrypto.d.ts.map +0 -1
- package/dist/web/src/crypto/ciphers.js +0 -14
- package/dist/web/src/crypto/digest.js +0 -4
- package/dist/web/src/crypto/exportCryptoKey.js +0 -17
- package/dist/web/src/crypto/generateKeyPair.js +0 -10
- package/dist/web/src/crypto/generateRandomNumber.js +0 -9
- package/dist/web/src/crypto/index.js +0 -11
- /package/dist/types/src/{crypto → nanotdf-crypto}/ciphers.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/decrypt.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/digest.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/ecdsaSignature.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/encrypt.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/enums.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/exportCryptoKey.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/generateKeyPair.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/generateRandomNumber.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/index.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/keyAgreement.d.ts +0 -0
- /package/dist/types/src/{crypto → nanotdf-crypto}/pemPublicToCrypto.d.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/ciphers.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/decrypt.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/digest.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/encrypt.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/enums.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/exportCryptoKey.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/generateKeyPair.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/generateRandomNumber.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/index.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/keyAgreement.ts +0 -0
- /package/src/{crypto → nanotdf-crypto}/pemPublicToCrypto.ts +0 -0
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const AbstractPolicy_js_1 = __importDefault(require("./AbstractPolicy.js"));
|
|
7
|
+
const ResourceLocator_js_1 = __importDefault(require("../ResourceLocator.js"));
|
|
8
|
+
const PolicyTypeEnum_js_1 = __importDefault(require("../../enum/PolicyTypeEnum.js"));
|
|
9
|
+
/**
|
|
10
|
+
* Set remote policy body
|
|
11
|
+
*
|
|
12
|
+
* If the policy type is set to use a Remote Policy, then the Resource Locator object described in Section 3.4.1 is
|
|
13
|
+
* used to describe the remote policy.
|
|
14
|
+
*/
|
|
15
|
+
class RemotePolicy extends AbstractPolicy_js_1.default {
|
|
16
|
+
static parse(buff, useEcdsaBinding) {
|
|
17
|
+
let offset = 0;
|
|
18
|
+
const resource = ResourceLocator_js_1.default.parse(buff);
|
|
19
|
+
offset += resource.offset;
|
|
20
|
+
const { binding, newOffset: bindingOffset } = this.parseBinding(buff, useEcdsaBinding, offset);
|
|
21
|
+
offset = bindingOffset;
|
|
22
|
+
return {
|
|
23
|
+
policy: new RemotePolicy(PolicyTypeEnum_js_1.default.Remote, binding, resource),
|
|
24
|
+
offset,
|
|
25
|
+
};
|
|
26
|
+
}
|
|
27
|
+
constructor(type, binding, resource) {
|
|
28
|
+
super(type, binding);
|
|
29
|
+
this.type = PolicyTypeEnum_js_1.default.Remote;
|
|
30
|
+
this.type = PolicyTypeEnum_js_1.default.Remote;
|
|
31
|
+
this.remotePolicy = resource;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Length of policy
|
|
35
|
+
*
|
|
36
|
+
* @returns { number } length
|
|
37
|
+
*/
|
|
38
|
+
getLength() {
|
|
39
|
+
return (
|
|
40
|
+
// Type length
|
|
41
|
+
1 +
|
|
42
|
+
// Resource locator length
|
|
43
|
+
this.remotePolicy.length +
|
|
44
|
+
// Binding length
|
|
45
|
+
this.binding.length);
|
|
46
|
+
}
|
|
47
|
+
/**
|
|
48
|
+
* Return the content of the policy
|
|
49
|
+
*/
|
|
50
|
+
toBuffer() {
|
|
51
|
+
const target = new Uint8Array(this.getLength());
|
|
52
|
+
target.set([PolicyTypeEnum_js_1.default.Remote], 0);
|
|
53
|
+
// Write the remote policy location
|
|
54
|
+
const resourceLocatorAsBuf = this.remotePolicy.toBuffer();
|
|
55
|
+
target.set(resourceLocatorAsBuf, 1);
|
|
56
|
+
// Write the binding.
|
|
57
|
+
target.set(this.binding, resourceLocatorAsBuf.length + 1);
|
|
58
|
+
return target;
|
|
59
|
+
}
|
|
60
|
+
}
|
|
61
|
+
exports.default = RemotePolicy;
|
|
62
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,211 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const errors_js_1 = require("../../errors.js");
|
|
7
|
+
const ProtocolEnum_js_1 = __importDefault(require("../enum/ProtocolEnum.js"));
|
|
8
|
+
const ResourceLocatorIdentifierEnum_js_1 = __importDefault(require("../enum/ResourceLocatorIdentifierEnum.js"));
|
|
9
|
+
/**
|
|
10
|
+
*
|
|
11
|
+
* The Resource Locator is a way for the nanotdf to represent references to external resources in as succinct a format
|
|
12
|
+
* as possible.
|
|
13
|
+
*
|
|
14
|
+
* | Section | Minimum Length (B) | Maximum Length (B) |
|
|
15
|
+
* |---------------|--------------------|--------------------|
|
|
16
|
+
* | Protocol Enum | 1 | 1 |
|
|
17
|
+
* | Body Length | 1 | 1 |
|
|
18
|
+
* | Body | 1 | 255 |
|
|
19
|
+
* | Identifier | 0 | n |
|
|
20
|
+
*
|
|
21
|
+
* @link https://github.com/virtru/nanotdf/blob/master/spec/index.md#3312-kas
|
|
22
|
+
* @link https://github.com/virtru/nanotdf/blob/master/spec/index.md#341-resource-locator
|
|
23
|
+
*/
|
|
24
|
+
class ResourceLocator {
|
|
25
|
+
constructor(protocol, lengthOfBody, body, offset, id, idType = ResourceLocatorIdentifierEnum_js_1.default.None) {
|
|
26
|
+
this.protocol = protocol;
|
|
27
|
+
this.lengthOfBody = lengthOfBody;
|
|
28
|
+
this.body = body;
|
|
29
|
+
this.offset = offset;
|
|
30
|
+
this.id = id;
|
|
31
|
+
this.idType = idType;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Construct a new URL or URL + identifier pair, for use with NanoTDF envelopes.
|
|
35
|
+
* @param url The URL to encrypt; `http` and `https` schemes are supported
|
|
36
|
+
* @param identifier An optional identifier.
|
|
37
|
+
* For KAS URLs, this is usually a public key identifier (kid). Limit 32 characters
|
|
38
|
+
* @returns a value representing the URL and identifier, if present.
|
|
39
|
+
* This method throws an Error if the URL is invalid or of the wrong schema,
|
|
40
|
+
* or if the identifier is an unsupported value.
|
|
41
|
+
*/
|
|
42
|
+
static fromURL(url, identifier) {
|
|
43
|
+
const [protocolStr, body] = url.split('://');
|
|
44
|
+
let protocol;
|
|
45
|
+
// Validate and set protocol identifier byte
|
|
46
|
+
switch (protocolStr.toLowerCase()) {
|
|
47
|
+
case 'http':
|
|
48
|
+
protocol = ProtocolEnum_js_1.default.Http;
|
|
49
|
+
break;
|
|
50
|
+
case 'https':
|
|
51
|
+
protocol = ProtocolEnum_js_1.default.Https;
|
|
52
|
+
break;
|
|
53
|
+
default:
|
|
54
|
+
throw new errors_js_1.ConfigurationError(`resource locator protocol [${protocolStr}] unsupported`);
|
|
55
|
+
}
|
|
56
|
+
// Set identifier padded length and protocol identifier byte
|
|
57
|
+
const identifierType = (() => {
|
|
58
|
+
if (!identifier) {
|
|
59
|
+
return ResourceLocatorIdentifierEnum_js_1.default.None;
|
|
60
|
+
}
|
|
61
|
+
const identifierLength = new TextEncoder().encode(identifier).length;
|
|
62
|
+
if (identifierLength <= 2) {
|
|
63
|
+
return ResourceLocatorIdentifierEnum_js_1.default.TwoBytes;
|
|
64
|
+
}
|
|
65
|
+
else if (identifierLength <= 8) {
|
|
66
|
+
return ResourceLocatorIdentifierEnum_js_1.default.EightBytes;
|
|
67
|
+
}
|
|
68
|
+
else if (identifierLength <= 32) {
|
|
69
|
+
return ResourceLocatorIdentifierEnum_js_1.default.ThirtyTwoBytes;
|
|
70
|
+
}
|
|
71
|
+
throw new errors_js_1.ConfigurationError(`unsupported identifier length: ${identifier.length}`);
|
|
72
|
+
})();
|
|
73
|
+
// Create buffer to hold protocol, body length, body, and identifier
|
|
74
|
+
const lengthOfBody = new TextEncoder().encode(body).length;
|
|
75
|
+
if (lengthOfBody == 0) {
|
|
76
|
+
throw new errors_js_1.ConfigurationError('url body empty');
|
|
77
|
+
}
|
|
78
|
+
const identifierLength = identifierType.valueOf();
|
|
79
|
+
const offset = ResourceLocator.BODY_OFFSET + lengthOfBody + identifierLength;
|
|
80
|
+
return new ResourceLocator(protocol, lengthOfBody, body, offset, identifier, identifierType);
|
|
81
|
+
}
|
|
82
|
+
static parse(buff) {
|
|
83
|
+
// Protocol
|
|
84
|
+
const protocolAndIdentifierType = buff[ResourceLocator.PROTOCOL_OFFSET];
|
|
85
|
+
// Length of body
|
|
86
|
+
const lengthOfBody = buff[ResourceLocator.LENGTH_OFFSET];
|
|
87
|
+
if (lengthOfBody == 0) {
|
|
88
|
+
throw new errors_js_1.InvalidFileError('url body empty');
|
|
89
|
+
}
|
|
90
|
+
// Body as utf8 string
|
|
91
|
+
const decoder = new TextDecoder();
|
|
92
|
+
let offset = ResourceLocator.BODY_OFFSET + lengthOfBody;
|
|
93
|
+
if (offset > buff.length) {
|
|
94
|
+
throw new errors_js_1.InvalidFileError('url parser: out of bounds error');
|
|
95
|
+
}
|
|
96
|
+
const body = decoder.decode(buff.subarray(ResourceLocator.BODY_OFFSET, offset));
|
|
97
|
+
const protocol = protocolAndIdentifierType & 0xf;
|
|
98
|
+
switch (protocol) {
|
|
99
|
+
case ProtocolEnum_js_1.default.Http:
|
|
100
|
+
case ProtocolEnum_js_1.default.Https:
|
|
101
|
+
break;
|
|
102
|
+
default:
|
|
103
|
+
throw new errors_js_1.InvalidFileError(`url parser: unsupported protocol type [${protocol}]`);
|
|
104
|
+
}
|
|
105
|
+
// identifier
|
|
106
|
+
const identifierTypeNibble = protocolAndIdentifierType & 0xf0;
|
|
107
|
+
let identifierType = ResourceLocatorIdentifierEnum_js_1.default.None;
|
|
108
|
+
if (identifierTypeNibble === ResourceLocator.IDENTIFIER_2_BYTE) {
|
|
109
|
+
identifierType = ResourceLocatorIdentifierEnum_js_1.default.TwoBytes;
|
|
110
|
+
}
|
|
111
|
+
else if (identifierTypeNibble === ResourceLocator.IDENTIFIER_8_BYTE) {
|
|
112
|
+
identifierType = ResourceLocatorIdentifierEnum_js_1.default.EightBytes;
|
|
113
|
+
}
|
|
114
|
+
else if (identifierTypeNibble === ResourceLocator.IDENTIFIER_32_BYTE) {
|
|
115
|
+
identifierType = ResourceLocatorIdentifierEnum_js_1.default.ThirtyTwoBytes;
|
|
116
|
+
}
|
|
117
|
+
else if (identifierTypeNibble !== ResourceLocator.IDENTIFIER_0_BYTE) {
|
|
118
|
+
throw new errors_js_1.InvalidFileError(`url parser: unsupported fragment type [${identifierTypeNibble}]`);
|
|
119
|
+
}
|
|
120
|
+
let identifier = undefined;
|
|
121
|
+
switch (identifierType) {
|
|
122
|
+
case ResourceLocatorIdentifierEnum_js_1.default.None:
|
|
123
|
+
// noop
|
|
124
|
+
break;
|
|
125
|
+
case ResourceLocatorIdentifierEnum_js_1.default.TwoBytes:
|
|
126
|
+
case ResourceLocatorIdentifierEnum_js_1.default.EightBytes:
|
|
127
|
+
case ResourceLocatorIdentifierEnum_js_1.default.ThirtyTwoBytes: {
|
|
128
|
+
const kidStart = offset;
|
|
129
|
+
offset = kidStart + identifierType.valueOf();
|
|
130
|
+
if (offset > buff.length) {
|
|
131
|
+
throw new errors_js_1.InvalidFileError('url parser: out of bounds error');
|
|
132
|
+
}
|
|
133
|
+
const kidSubarray = buff.subarray(kidStart, offset);
|
|
134
|
+
// Remove padding (assuming the padding is null bytes, 0x00)
|
|
135
|
+
const zeroIndex = kidSubarray.indexOf(0);
|
|
136
|
+
if (zeroIndex >= 0) {
|
|
137
|
+
const trimmedSubarray = kidSubarray.subarray(0, zeroIndex);
|
|
138
|
+
identifier = decoder.decode(trimmedSubarray);
|
|
139
|
+
}
|
|
140
|
+
else {
|
|
141
|
+
identifier = decoder.decode(kidSubarray);
|
|
142
|
+
}
|
|
143
|
+
break;
|
|
144
|
+
}
|
|
145
|
+
}
|
|
146
|
+
return new ResourceLocator(protocol, lengthOfBody, body, offset, identifier, identifierType);
|
|
147
|
+
}
|
|
148
|
+
/**
|
|
149
|
+
* Length
|
|
150
|
+
*
|
|
151
|
+
* @returns { number } Length of resource locator
|
|
152
|
+
*/
|
|
153
|
+
get length() {
|
|
154
|
+
return this.offset;
|
|
155
|
+
}
|
|
156
|
+
get url() {
|
|
157
|
+
switch (this.protocol) {
|
|
158
|
+
case ProtocolEnum_js_1.default.Http:
|
|
159
|
+
return 'http://' + this.body;
|
|
160
|
+
case ProtocolEnum_js_1.default.Https:
|
|
161
|
+
return 'https://' + this.body;
|
|
162
|
+
default:
|
|
163
|
+
throw new errors_js_1.ConfigurationError(`resource locator protocol unsupported [${this.protocol}]`);
|
|
164
|
+
}
|
|
165
|
+
}
|
|
166
|
+
/**
|
|
167
|
+
* Return the contents of the Resource Locator in buffer
|
|
168
|
+
*/
|
|
169
|
+
toBuffer() {
|
|
170
|
+
const target = new Uint8Array(ResourceLocator.BODY_OFFSET + this.body.length + this.idType);
|
|
171
|
+
let idTypeNibble = 0;
|
|
172
|
+
switch (this.idType) {
|
|
173
|
+
case ResourceLocatorIdentifierEnum_js_1.default.TwoBytes:
|
|
174
|
+
idTypeNibble = ResourceLocator.IDENTIFIER_2_BYTE;
|
|
175
|
+
break;
|
|
176
|
+
case ResourceLocatorIdentifierEnum_js_1.default.EightBytes:
|
|
177
|
+
idTypeNibble = ResourceLocator.IDENTIFIER_8_BYTE;
|
|
178
|
+
break;
|
|
179
|
+
case ResourceLocatorIdentifierEnum_js_1.default.ThirtyTwoBytes:
|
|
180
|
+
idTypeNibble = ResourceLocator.IDENTIFIER_32_BYTE;
|
|
181
|
+
break;
|
|
182
|
+
}
|
|
183
|
+
target.set([this.protocol | idTypeNibble], ResourceLocator.PROTOCOL_OFFSET);
|
|
184
|
+
target.set([this.lengthOfBody], ResourceLocator.LENGTH_OFFSET);
|
|
185
|
+
target.set(new TextEncoder().encode(this.body), ResourceLocator.BODY_OFFSET);
|
|
186
|
+
if (this.id) {
|
|
187
|
+
target.set(new TextEncoder().encode(this.id), ResourceLocator.BODY_OFFSET + this.body.length);
|
|
188
|
+
}
|
|
189
|
+
return target;
|
|
190
|
+
}
|
|
191
|
+
/**
|
|
192
|
+
* Get Identifier
|
|
193
|
+
*
|
|
194
|
+
* Returns the identifier of the ResourceLocator or an empty string if no identifier is present.
|
|
195
|
+
* @returns { string } Identifier of the resource locator.
|
|
196
|
+
*/
|
|
197
|
+
get identifier() {
|
|
198
|
+
return this.id ?? '';
|
|
199
|
+
}
|
|
200
|
+
}
|
|
201
|
+
ResourceLocator.PROTOCOL_OFFSET = 0;
|
|
202
|
+
ResourceLocator.PROTOCOL_LENGTH = 1;
|
|
203
|
+
ResourceLocator.LENGTH_OFFSET = 1;
|
|
204
|
+
ResourceLocator.LENGTH_LENGTH = 1;
|
|
205
|
+
ResourceLocator.BODY_OFFSET = 2;
|
|
206
|
+
ResourceLocator.IDENTIFIER_0_BYTE = 0 << 4; // 0
|
|
207
|
+
ResourceLocator.IDENTIFIER_2_BYTE = 1 << 4; // 16
|
|
208
|
+
ResourceLocator.IDENTIFIER_8_BYTE = 2 << 4; // 32
|
|
209
|
+
ResourceLocator.IDENTIFIER_32_BYTE = 3 << 4; // 48
|
|
210
|
+
exports.default = ResourceLocator;
|
|
211
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,77 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const calculateByCurve_js_1 = require("../helpers/calculateByCurve.js");
|
|
4
|
+
const errors_js_1 = require("../../errors.js");
|
|
5
|
+
/**
|
|
6
|
+
* NanoTDF Signature
|
|
7
|
+
*
|
|
8
|
+
* The signature section is an optional section that contains an ECDSA signature used to cryptographically bind the Header and Payload to a creator of the nanotdf. The key used for signing is the private key of the creator of the nanotdf. The ECC Params used for the signature are described in Section 3.3.1.4.2. The private key used for this signature is distinctly different than the ephemeral private key. This is a persistent key belonging to an individual, entity, or device that creates nanotdfs. The signature is used to authenticate the entire nanotdf and contains both the public key related to the creators private key and the resulting signature. The structure of this section:
|
|
9
|
+
*
|
|
10
|
+
* | Section | Minimum Length (B) | Maximum Length (B) |
|
|
11
|
+
* |------------|--------------------|--------------------|
|
|
12
|
+
* | Public Key | 33 | 67 |
|
|
13
|
+
* | Signature | 64 | 132 |
|
|
14
|
+
*
|
|
15
|
+
* @link https://github.com/virtru/nanotdf/blob/master/spec/index.md#333-signature
|
|
16
|
+
*/
|
|
17
|
+
class Signature {
|
|
18
|
+
static parse(header, buff) {
|
|
19
|
+
let offset = 0;
|
|
20
|
+
/**
|
|
21
|
+
* Parse the public key
|
|
22
|
+
*
|
|
23
|
+
* This section contains the compressed public key of the private key used to sign the message.
|
|
24
|
+
*/
|
|
25
|
+
// TODO: Resolve where offset is missing 1 byte
|
|
26
|
+
const publicKeyLength = (0, calculateByCurve_js_1.lengthOfPublicKey)(header.signatureCurveName) + 1;
|
|
27
|
+
const publicKey = buff.subarray(offset, offset + publicKeyLength);
|
|
28
|
+
offset += publicKeyLength;
|
|
29
|
+
/**
|
|
30
|
+
* Parse signature
|
|
31
|
+
*
|
|
32
|
+
* This section contains the encoded `r` and `s` values of the ECDSA signature.
|
|
33
|
+
*
|
|
34
|
+
* ECDSA signatures are big endian encodings of the `r` and `s` values of an ECDSA signature.The length of `r` and `s`
|
|
35
|
+
* values is determined by the ECC Mode used for the signature. The encoding for the signature is the big endian
|
|
36
|
+
* encodings of R and S concatenated to each other. For example, `r = 1` and `s = 2` for an ECDSA signature of a
|
|
37
|
+
* ecp256k1 key would be (line breaks and spaces are added for easier visualization):
|
|
38
|
+
*
|
|
39
|
+
* ```
|
|
40
|
+
* 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|
41
|
+
* 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01
|
|
42
|
+
* 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|
43
|
+
* 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02
|
|
44
|
+
* ```
|
|
45
|
+
*
|
|
46
|
+
* @link https://github.com/virtru/nanotdf/blob/master/spec/index.md#52-ecdsa-signature-encoding
|
|
47
|
+
*/
|
|
48
|
+
const signatureLength = (0, calculateByCurve_js_1.lengthOfSignature)(header.signatureCurveName);
|
|
49
|
+
const signature = buff.subarray(offset, offset + signatureLength);
|
|
50
|
+
offset += signatureLength;
|
|
51
|
+
return { signature: new Signature(publicKey, signature), offset };
|
|
52
|
+
}
|
|
53
|
+
constructor(publicKey, signature) {
|
|
54
|
+
this.publicKey = publicKey;
|
|
55
|
+
this.signature = signature;
|
|
56
|
+
}
|
|
57
|
+
/**
|
|
58
|
+
* Length
|
|
59
|
+
*
|
|
60
|
+
* @returns { number } Length of signature
|
|
61
|
+
*/
|
|
62
|
+
get length() {
|
|
63
|
+
return this.publicKey.length + this.signature.length;
|
|
64
|
+
}
|
|
65
|
+
/**
|
|
66
|
+
* Copy the contents of the signature to buffer
|
|
67
|
+
*/
|
|
68
|
+
copyToBuffer(target) {
|
|
69
|
+
if (this.length > target.length) {
|
|
70
|
+
throw new errors_js_1.ConfigurationError('Invalid buffer size to copy signature');
|
|
71
|
+
}
|
|
72
|
+
target.set(this.publicKey, 0);
|
|
73
|
+
target.set(this.signature, this.publicKey.length);
|
|
74
|
+
}
|
|
75
|
+
}
|
|
76
|
+
exports.default = Signature;
|
|
77
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -14,4 +14,4 @@ for (const cipherKey in Ciphers) {
|
|
|
14
14
|
cipherKeys.push(cipherKey);
|
|
15
15
|
}
|
|
16
16
|
exports.supportedCiphers = cipherKeys;
|
|
17
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
17
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2lwaGVycy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uL3NyYy9uYW5vdGRmLWNyeXB0by9jaXBoZXJzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7OztBQUFBLElBQVksT0FFWDtBQUZELFdBQVksT0FBTztJQUNqQiw2QkFBa0IsQ0FBQTtBQUNwQixDQUFDLEVBRlcsT0FBTyx1QkFBUCxPQUFPLFFBRWxCO0FBRUQsSUFBWSxnQkFFWDtBQUZELFdBQVksZ0JBQWdCO0lBQzFCLDZEQUFZLENBQUE7QUFDZCxDQUFDLEVBRlcsZ0JBQWdCLGdDQUFoQixnQkFBZ0IsUUFFM0I7QUFFRCxNQUFNLFVBQVUsR0FBRyxFQUFFLENBQUM7QUFDdEIsS0FBSyxNQUFNLFNBQVMsSUFBSSxPQUFPLEVBQUUsQ0FBQztJQUNoQyxVQUFVLENBQUMsSUFBSSxDQUFDLFNBQVMsQ0FBQyxDQUFDO0FBQzdCLENBQUM7QUFDWSxRQUFBLGdCQUFnQixHQUFHLFVBQVUsQ0FBQyJ9
|
|
@@ -21,4 +21,4 @@ async function decrypt(key, ciphertext, iv, tagLength) {
|
|
|
21
21
|
tagLength: tagLength || ciphers_js_1.CipherTagLengths.AesGcm,
|
|
22
22
|
}, key, ciphertext);
|
|
23
23
|
}
|
|
24
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
24
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZGVjcnlwdC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uL3NyYy9uYW5vdGRmLWNyeXB0by9kZWNyeXB0LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBY0EsMEJBZUM7QUE3QkQsNkNBQXlEO0FBRXpEOzs7Ozs7Ozs7OztHQVdHO0FBQ1ksS0FBSyxVQUFVLE9BQU8sQ0FDbkMsR0FBYyxFQUNkLFVBQXNCLEVBQ3RCLEVBQWMsRUFDZCxTQUFrQjtJQUVsQixPQUFPLE1BQU0sQ0FBQyxNQUFNLENBQUMsT0FBTyxDQUMxQjtRQUNFLElBQUksRUFBRSxvQkFBTyxDQUFDLE1BQU07UUFDcEIsRUFBRTtRQUNGLFNBQVMsRUFBRSxTQUFTLElBQUksNkJBQWdCLENBQUMsTUFBTTtLQUNoRCxFQUNELEdBQUcsRUFDSCxVQUFVLENBQ1gsQ0FBQztBQUNKLENBQUMifQ==
|
|
@@ -4,4 +4,4 @@ exports.default = digest;
|
|
|
4
4
|
function digest(hashType, data) {
|
|
5
5
|
return crypto.subtle.digest(hashType, data);
|
|
6
6
|
}
|
|
7
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
7
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZGlnZXN0LmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vc3JjL25hbm90ZGYtY3J5cHRvL2RpZ2VzdC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiOztBQUFBLHlCQUtDO0FBTEQsU0FBd0IsTUFBTSxDQUM1QixRQUE2QixFQUM3QixJQUFxQjtJQUVyQixPQUFPLE1BQU0sQ0FBQyxNQUFNLENBQUMsTUFBTSxDQUFDLFFBQVEsRUFBRSxJQUFJLENBQUMsQ0FBQztBQUM5QyxDQUFDIn0=
|
|
@@ -4,7 +4,7 @@ exports.computeECDSASig = computeECDSASig;
|
|
|
4
4
|
exports.verifyECDSASignature = verifyECDSASignature;
|
|
5
5
|
exports.extractRSValuesFromSignature = extractRSValuesFromSignature;
|
|
6
6
|
const errors_js_1 = require("../errors.js");
|
|
7
|
-
const enums_js_1 = require("
|
|
7
|
+
const enums_js_1 = require("./../nanotdf-crypto/enums.js");
|
|
8
8
|
/**
|
|
9
9
|
* Computes an ECDSA signature for the given data using the provided private key.
|
|
10
10
|
*
|
|
@@ -79,4 +79,4 @@ function concatAndCompareUint8Arrays(arr1, arr2, arr3) {
|
|
|
79
79
|
}
|
|
80
80
|
return true;
|
|
81
81
|
}
|
|
82
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
82
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZWNkc2FTaWduYXR1cmUuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi9zcmMvbmFub3RkZi1jcnlwdG8vZWNkc2FTaWduYXR1cmUudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFhQSwwQ0FhQztBQWFELG9EQWVDO0FBU0Qsb0VBa0JDO0FBakZELDRDQUFrRDtBQUNsRCwyREFBNkQ7QUFFN0Q7Ozs7Ozs7OztHQVNHO0FBQ0ksS0FBSyxVQUFVLGVBQWUsQ0FDbkMsVUFBcUIsRUFDckIsSUFBZ0I7SUFFaEIsTUFBTSxTQUFTLEdBQUcsTUFBTSxNQUFNLENBQUMsTUFBTSxDQUFDLElBQUksQ0FDeEM7UUFDRSxJQUFJLEVBQUUsd0JBQWEsQ0FBQyxLQUFLO1FBQ3pCLElBQUksRUFBRSxFQUFFLElBQUksRUFBRSxTQUFTLEVBQUU7S0FDMUIsRUFDRCxVQUFVLEVBQ1YsSUFBSSxDQUNMLENBQUM7SUFDRixPQUFPLFNBQVMsQ0FBQztBQUNuQixDQUFDO0FBRUQ7Ozs7Ozs7Ozs7R0FVRztBQUNJLEtBQUssVUFBVSxvQkFBb0IsQ0FDeEMsU0FBb0IsRUFDcEIsU0FBcUIsRUFDckIsSUFBZ0I7SUFFaEIsTUFBTSxPQUFPLEdBQUcsTUFBTSxNQUFNLENBQUMsTUFBTSxDQUFDLE1BQU0sQ0FDeEM7UUFDRSxJQUFJLEVBQUUsd0JBQWEsQ0FBQyxLQUFLO1FBQ3pCLElBQUksRUFBRSxFQUFFLElBQUksRUFBRSxTQUFTLEVBQUU7S0FDMUIsRUFDRCxTQUFTLEVBQ1QsU0FBUyxFQUNULElBQUksQ0FDTCxDQUFDO0lBQ0YsT0FBTyxPQUFPLENBQUM7QUFDakIsQ0FBQztBQUVEOzs7Ozs7R0FNRztBQUNILFNBQWdCLDRCQUE0QixDQUFDLGNBQTBCO0lBSXJFLDhDQUE4QztJQUM5QyxNQUFNLFVBQVUsR0FBRyxJQUFJLENBQUMsS0FBSyxDQUFDLGNBQWMsQ0FBQyxNQUFNLEdBQUcsQ0FBQyxDQUFDLENBQUM7SUFDekQsTUFBTSxNQUFNLEdBQUcsY0FBYyxDQUFDLEtBQUssQ0FBQyxDQUFDLEVBQUUsVUFBVSxDQUFDLENBQUM7SUFDbkQsTUFBTSxNQUFNLEdBQUcsY0FBYyxDQUFDLEtBQUssQ0FBQyxVQUFVLENBQUMsQ0FBQztJQUVoRCxxQkFBcUI7SUFDckIsSUFBSSxDQUFDLDJCQUEyQixDQUFDLE1BQU0sRUFBRSxNQUFNLEVBQUUsY0FBYyxDQUFDLEVBQUUsQ0FBQztRQUNqRSxNQUFNLElBQUksOEJBQWtCLENBQUMseUJBQXlCLENBQUMsQ0FBQztJQUMxRCxDQUFDO0lBRUQsT0FBTztRQUNMLENBQUMsRUFBRSxNQUFNO1FBQ1QsQ0FBQyxFQUFFLE1BQU07S0FDVixDQUFDO0FBQ0osQ0FBQztBQUVELFNBQVMsMkJBQTJCLENBQ2xDLElBQWdCLEVBQ2hCLElBQWdCLEVBQ2hCLElBQWdCO0lBRWhCLG9FQUFvRTtJQUNwRSxNQUFNLFlBQVksR0FBRyxJQUFJLFVBQVUsQ0FBQyxJQUFJLENBQUMsTUFBTSxHQUFHLElBQUksQ0FBQyxNQUFNLENBQUMsQ0FBQztJQUUvRCx3Q0FBd0M7SUFDeEMsWUFBWSxDQUFDLEdBQUcsQ0FBQyxJQUFJLEVBQUUsQ0FBQyxDQUFDLENBQUM7SUFDMUIsWUFBWSxDQUFDLEdBQUcsQ0FBQyxJQUFJLEVBQUUsSUFBSSxDQUFDLE1BQU0sQ0FBQyxDQUFDO0lBRXBDLG9DQUFvQztJQUNwQyxJQUFJLFlBQVksQ0FBQyxNQUFNLEtBQUssSUFBSSxDQUFDLE1BQU0sRUFBRSxDQUFDO1FBQ3hDLE9BQU8sS0FBSyxDQUFDO0lBQ2YsQ0FBQztJQUVELHVCQUF1QjtJQUN2QixLQUFLLElBQUksQ0FBQyxHQUFHLENBQUMsRUFBRSxDQUFDLEdBQUcsWUFBWSxDQUFDLE1BQU0sRUFBRSxDQUFDLEVBQUUsRUFBRSxDQUFDO1FBQzdDLElBQUksWUFBWSxDQUFDLENBQUMsQ0FBQyxLQUFLLElBQUksQ0FBQyxDQUFDLENBQUMsRUFBRSxDQUFDO1lBQ2hDLE9BQU8sS0FBSyxDQUFDO1FBQ2YsQ0FBQztJQUNILENBQUM7SUFFRCxPQUFPLElBQUksQ0FBQztBQUNkLENBQUMifQ==
|
|
@@ -21,4 +21,4 @@ async function encrypt(key, plaintext, iv, tagLength) {
|
|
|
21
21
|
tagLength: tagLength || ciphers_js_1.CipherTagLengths.AesGcm,
|
|
22
22
|
}, key, plaintext);
|
|
23
23
|
}
|
|
24
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
24
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZW5jcnlwdC5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uLy4uL3NyYy9uYW5vdGRmLWNyeXB0by9lbmNyeXB0LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7O0FBY0EsMEJBZUM7QUE3QkQsNkNBQXlEO0FBRXpEOzs7Ozs7Ozs7OztHQVdHO0FBQ1ksS0FBSyxVQUFVLE9BQU8sQ0FDbkMsR0FBYyxFQUNkLFNBQXFCLEVBQ3JCLEVBQWMsRUFDZCxTQUFrQjtJQUVsQixPQUFPLE1BQU0sQ0FBQyxNQUFNLENBQUMsT0FBTyxDQUMxQjtRQUNFLElBQUksRUFBRSxvQkFBTyxDQUFDLE1BQU07UUFDcEIsRUFBRTtRQUNGLFNBQVMsRUFBRSxTQUFTLElBQUksNkJBQWdCLENBQUMsTUFBTTtLQUNoRCxFQUNELEdBQUcsRUFDSCxTQUFTLENBQ1YsQ0FBQztBQUNKLENBQUMifQ==
|
|
@@ -49,4 +49,4 @@ var KeyUsageType;
|
|
|
49
49
|
KeyUsageType["UnwrapKey"] = "unwrapKey";
|
|
50
50
|
KeyUsageType["WrapKey"] = "wrapKey";
|
|
51
51
|
})(KeyUsageType || (exports.KeyUsageType = KeyUsageType = {}));
|
|
52
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
52
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.default = exportCryptoKey;
|
|
4
|
+
/**
|
|
5
|
+
*
|
|
6
|
+
* Export to PEM format to binary buffer
|
|
7
|
+
* - key {CryptoKey} default: "undefined" CryptoKey generated by WebCrypto API
|
|
8
|
+
*/
|
|
9
|
+
async function exportCryptoKey(key) {
|
|
10
|
+
const exportedKey = await crypto.subtle.exportKey('raw', key);
|
|
11
|
+
const keyBuffer = new Uint8Array(exportedKey);
|
|
12
|
+
const len = keyBuffer.byteLength;
|
|
13
|
+
const xPoint = keyBuffer.slice(0, (1 + len) >>> 1); // drop `y`
|
|
14
|
+
xPoint[0] = 0x2 | (keyBuffer[len - 1] & 0x01); // encode sign of `y` in first bit
|
|
15
|
+
// Copy to Arraybuffer
|
|
16
|
+
const compressedPubKeyBuf = new ArrayBuffer(xPoint.byteLength);
|
|
17
|
+
new Uint8Array(compressedPubKeyBuf).set(new Uint8Array(xPoint));
|
|
18
|
+
return compressedPubKeyBuf;
|
|
19
|
+
}
|
|
20
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -10,4 +10,4 @@ async function generateKeyPair({ type: name, curve: namedCurve, keyUsages, isExt
|
|
|
10
10
|
}) {
|
|
11
11
|
return crypto.subtle.generateKey({ name, namedCurve }, isExtractable, keyUsages);
|
|
12
12
|
}
|
|
13
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
13
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -9,4 +9,4 @@ function generateRandomNumber(length) {
|
|
|
9
9
|
crypto.getRandomValues(byteArray);
|
|
10
10
|
return byteArray;
|
|
11
11
|
}
|
|
12
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
12
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiZ2VuZXJhdGVSYW5kb21OdW1iZXIuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi9zcmMvbmFub3RkZi1jcnlwdG8vZ2VuZXJhdGVSYW5kb21OdW1iZXIudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7QUFHQSxvREFJQztBQVBEOztHQUVHO0FBQ0gsU0FBZ0Isb0JBQW9CLENBQUMsTUFBYztJQUNqRCxNQUFNLFNBQVMsR0FBRyxJQUFJLFVBQVUsQ0FBQyxNQUFNLENBQUMsQ0FBQztJQUN6QyxNQUFNLENBQUMsZUFBZSxDQUFDLFNBQVMsQ0FBQyxDQUFDO0lBQ2xDLE9BQU8sU0FBUyxDQUFDO0FBQ25CLENBQUMifQ==
|
|
@@ -57,4 +57,4 @@ var pemPublicToCrypto_js_1 = require("./pemPublicToCrypto.js");
|
|
|
57
57
|
Object.defineProperty(exports, "pemPublicToCrypto", { enumerable: true, get: function () { return pemPublicToCrypto_js_1.pemPublicToCrypto; } });
|
|
58
58
|
Object.defineProperty(exports, "pemCertToCrypto", { enumerable: true, get: function () { return pemPublicToCrypto_js_1.pemCertToCrypto; } });
|
|
59
59
|
exports.enums = __importStar(require("./enums.js"));
|
|
60
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
60
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -90,4 +90,4 @@ async function keyAgreement(privateKey, publicKey, options = {
|
|
|
90
90
|
}, isExtractable, keyUsages);
|
|
91
91
|
return symmetricKey;
|
|
92
92
|
}
|
|
93
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
93
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -208,4 +208,4 @@ async function pemCertToCrypto(pem, options = {
|
|
|
208
208
|
}
|
|
209
209
|
return key;
|
|
210
210
|
}
|
|
211
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
211
|
+
//# sourceMappingURL=data:application/json;base64,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
|