@opentdf/sdk 0.9.0-beta.91 → 0.9.0-beta.93
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/src/access/access-fetch.js +1 -2
- package/dist/cjs/src/access/access-rpc.js +1 -3
- package/dist/cjs/src/access.js +1 -14
- package/dist/cjs/src/auth/auth.js +13 -10
- package/dist/cjs/src/auth/dpop.js +121 -0
- package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +37 -3
- package/dist/cjs/src/auth/oidc-externaljwt-provider.js +37 -3
- package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +37 -3
- package/dist/cjs/src/auth/oidc.js +10 -8
- package/dist/cjs/src/auth/providers.js +35 -12
- package/dist/cjs/src/crypto/index.js +16 -2
- package/dist/cjs/src/crypto/pemPublicToCrypto.js +17 -11
- package/dist/cjs/src/opentdf.js +40 -10
- package/dist/cjs/tdf3/index.js +4 -2
- package/dist/cjs/tdf3/src/assertions.js +71 -31
- package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +1 -1
- package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +4 -2
- package/dist/cjs/tdf3/src/client/index.js +23 -33
- package/dist/cjs/tdf3/src/crypto/crypto-utils.js +12 -5
- package/dist/cjs/tdf3/src/crypto/declarations.js +1 -1
- package/dist/cjs/tdf3/src/crypto/index.js +849 -88
- package/dist/cjs/tdf3/src/crypto/jose/jwt-claims-set.js +11 -0
- package/dist/cjs/tdf3/src/crypto/jose/validate-crit.js +8 -0
- package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/buffer_utils.js +41 -0
- package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/epoch.js +6 -0
- package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/is_object.js +21 -0
- package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.js +112 -0
- package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/secs.js +60 -0
- package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/validate_crit.js +38 -0
- package/dist/cjs/tdf3/src/crypto/jose/vendor/util/errors.js +135 -0
- package/dist/cjs/tdf3/src/crypto/jwt.js +183 -0
- package/dist/cjs/tdf3/src/crypto/salt.js +14 -8
- package/dist/cjs/tdf3/src/models/encryption-information.js +17 -20
- package/dist/cjs/tdf3/src/models/key-access.js +43 -63
- package/dist/cjs/tdf3/src/tdf.js +75 -75
- package/dist/cjs/tdf3/src/utils/index.js +5 -39
- package/dist/types/src/access/access-fetch.d.ts.map +1 -1
- package/dist/types/src/access/access-rpc.d.ts.map +1 -1
- package/dist/types/src/access.d.ts +0 -5
- package/dist/types/src/access.d.ts.map +1 -1
- package/dist/types/src/auth/auth.d.ts +9 -6
- package/dist/types/src/auth/auth.d.ts.map +1 -1
- package/dist/types/src/auth/dpop.d.ts +60 -0
- package/dist/types/src/auth/dpop.d.ts.map +1 -0
- package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts +3 -2
- package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts.map +1 -1
- package/dist/types/src/auth/oidc-externaljwt-provider.d.ts +3 -2
- package/dist/types/src/auth/oidc-externaljwt-provider.d.ts.map +1 -1
- package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts +3 -2
- package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts.map +1 -1
- package/dist/types/src/auth/oidc.d.ts +6 -4
- package/dist/types/src/auth/oidc.d.ts.map +1 -1
- package/dist/types/src/auth/providers.d.ts +5 -4
- package/dist/types/src/auth/providers.d.ts.map +1 -1
- package/dist/types/src/crypto/index.d.ts +2 -1
- package/dist/types/src/crypto/index.d.ts.map +1 -1
- package/dist/types/src/crypto/pemPublicToCrypto.d.ts +18 -0
- package/dist/types/src/crypto/pemPublicToCrypto.d.ts.map +1 -1
- package/dist/types/src/opentdf.d.ts +13 -4
- package/dist/types/src/opentdf.d.ts.map +1 -1
- package/dist/types/tdf3/index.d.ts +3 -3
- package/dist/types/tdf3/index.d.ts.map +1 -1
- package/dist/types/tdf3/src/assertions.d.ts +23 -8
- package/dist/types/tdf3/src/assertions.d.ts.map +1 -1
- package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts +3 -3
- package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts.map +1 -1
- package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts +4 -4
- package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts.map +1 -1
- package/dist/types/tdf3/src/client/builders.d.ts +2 -2
- package/dist/types/tdf3/src/client/builders.d.ts.map +1 -1
- package/dist/types/tdf3/src/client/index.d.ts +6 -5
- package/dist/types/tdf3/src/client/index.d.ts.map +1 -1
- package/dist/types/tdf3/src/crypto/crypto-utils.d.ts +14 -4
- package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -1
- package/dist/types/tdf3/src/crypto/declarations.d.ts +283 -18
- package/dist/types/tdf3/src/crypto/declarations.d.ts.map +1 -1
- package/dist/types/tdf3/src/crypto/index.d.ts +105 -28
- package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -1
- package/dist/types/tdf3/src/crypto/jose/jwt-claims-set.d.ts +3 -0
- package/dist/types/tdf3/src/crypto/jose/jwt-claims-set.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jose/validate-crit.d.ts +5 -0
- package/dist/types/tdf3/src/crypto/jose/validate-crit.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/buffer_utils.d.ts +6 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/buffer_utils.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/epoch.d.ts +3 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/epoch.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/is_object.d.ts +3 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/is_object.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.d.ts +3 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/secs.d.ts +3 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/secs.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/validate_crit.d.ts +3 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/lib/validate_crit.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/util/errors.d.ts +76 -0
- package/dist/types/tdf3/src/crypto/jose/vendor/util/errors.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/jwt.d.ts +76 -0
- package/dist/types/tdf3/src/crypto/jwt.d.ts.map +1 -0
- package/dist/types/tdf3/src/crypto/salt.d.ts +6 -1
- package/dist/types/tdf3/src/crypto/salt.d.ts.map +1 -1
- package/dist/types/tdf3/src/models/encryption-information.d.ts +4 -4
- package/dist/types/tdf3/src/models/encryption-information.d.ts.map +1 -1
- package/dist/types/tdf3/src/models/key-access.d.ts +8 -5
- package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -1
- package/dist/types/tdf3/src/tdf.d.ts +8 -8
- package/dist/types/tdf3/src/tdf.d.ts.map +1 -1
- package/dist/types/tdf3/src/utils/index.d.ts +4 -3
- package/dist/types/tdf3/src/utils/index.d.ts.map +1 -1
- package/dist/web/src/access/access-fetch.js +3 -4
- package/dist/web/src/access/access-rpc.js +3 -5
- package/dist/web/src/access.js +1 -13
- package/dist/web/src/auth/auth.js +13 -10
- package/dist/web/src/auth/dpop.js +118 -0
- package/dist/web/src/auth/oidc-clientcredentials-provider.js +4 -3
- package/dist/web/src/auth/oidc-externaljwt-provider.js +4 -3
- package/dist/web/src/auth/oidc-refreshtoken-provider.js +4 -3
- package/dist/web/src/auth/oidc.js +11 -9
- package/dist/web/src/auth/providers.js +13 -12
- package/dist/web/src/crypto/index.js +4 -2
- package/dist/web/src/crypto/pemPublicToCrypto.js +11 -9
- package/dist/web/src/opentdf.js +7 -10
- package/dist/web/tdf3/index.js +3 -2
- package/dist/web/tdf3/src/assertions.js +71 -31
- package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +1 -1
- package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +4 -2
- package/dist/web/tdf3/src/client/index.js +25 -35
- package/dist/web/tdf3/src/crypto/crypto-utils.js +12 -5
- package/dist/web/tdf3/src/crypto/declarations.js +1 -1
- package/dist/web/tdf3/src/crypto/index.js +830 -84
- package/dist/web/tdf3/src/crypto/jose/jwt-claims-set.js +5 -0
- package/dist/web/tdf3/src/crypto/jose/validate-crit.js +3 -0
- package/dist/web/tdf3/src/crypto/jose/vendor/lib/buffer_utils.js +35 -0
- package/dist/web/tdf3/src/crypto/jose/vendor/lib/epoch.js +4 -0
- package/dist/web/tdf3/src/crypto/jose/vendor/lib/is_object.js +19 -0
- package/dist/web/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.js +107 -0
- package/dist/web/tdf3/src/crypto/jose/vendor/lib/secs.js +58 -0
- package/dist/web/tdf3/src/crypto/jose/vendor/lib/validate_crit.js +36 -0
- package/dist/web/tdf3/src/crypto/jose/vendor/util/errors.js +117 -0
- package/dist/web/tdf3/src/crypto/jwt.js +174 -0
- package/dist/web/tdf3/src/crypto/salt.js +13 -7
- package/dist/web/tdf3/src/models/encryption-information.js +11 -14
- package/dist/web/tdf3/src/models/key-access.js +44 -31
- package/dist/web/tdf3/src/tdf.js +71 -71
- package/dist/web/tdf3/src/utils/index.js +5 -6
- package/package.json +11 -4
- package/src/access/access-fetch.ts +2 -8
- package/src/access/access-rpc.ts +0 -7
- package/src/access.ts +0 -17
- package/src/auth/auth.ts +21 -12
- package/src/auth/dpop.ts +222 -0
- package/src/auth/oidc-clientcredentials-provider.ts +23 -15
- package/src/auth/oidc-externaljwt-provider.ts +23 -15
- package/src/auth/oidc-refreshtoken-provider.ts +23 -15
- package/src/auth/oidc.ts +21 -10
- package/src/auth/providers.ts +46 -29
- package/src/crypto/index.ts +21 -1
- package/src/crypto/pemPublicToCrypto.ts +11 -9
- package/src/opentdf.ts +19 -14
- package/tdf3/index.ts +32 -5
- package/tdf3/src/assertions.ts +99 -30
- package/tdf3/src/ciphers/aes-gcm-cipher.ts +7 -2
- package/tdf3/src/ciphers/symmetric-cipher-base.ts +7 -4
- package/tdf3/src/client/builders.ts +2 -2
- package/tdf3/src/client/index.ts +60 -59
- package/tdf3/src/crypto/crypto-utils.ts +15 -8
- package/tdf3/src/crypto/declarations.ts +338 -22
- package/tdf3/src/crypto/index.ts +1021 -118
- package/tdf3/src/crypto/jose/jwt-claims-set.ts +10 -0
- package/tdf3/src/crypto/jose/validate-crit.ts +9 -0
- package/tdf3/src/crypto/jose/vendor/lib/buffer_utils.ts +34 -0
- package/tdf3/src/crypto/jose/vendor/lib/epoch.ts +3 -0
- package/tdf3/src/crypto/jose/vendor/lib/is_object.ts +18 -0
- package/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.ts +106 -0
- package/tdf3/src/crypto/jose/vendor/lib/secs.ts +57 -0
- package/tdf3/src/crypto/jose/vendor/lib/validate_crit.ts +35 -0
- package/tdf3/src/crypto/jose/vendor/util/errors.ts +101 -0
- package/tdf3/src/crypto/jwt.ts +256 -0
- package/tdf3/src/crypto/salt.ts +16 -8
- package/tdf3/src/models/encryption-information.ts +14 -21
- package/tdf3/src/models/key-access.ts +57 -41
- package/tdf3/src/tdf.ts +110 -93
- package/tdf3/src/utils/index.ts +5 -6
|
@@ -11,17 +11,32 @@ exports.rsaPkcs1Sha256 = rsaPkcs1Sha256;
|
|
|
11
11
|
exports.generateKey = generateKey;
|
|
12
12
|
exports.generateKeyPair = generateKeyPair;
|
|
13
13
|
exports.generateSigningKeyPair = generateSigningKeyPair;
|
|
14
|
-
exports.cryptoToPemPair = cryptoToPemPair;
|
|
15
14
|
exports.encryptWithPublicKey = encryptWithPublicKey;
|
|
16
|
-
exports.generateInitializationVector = generateInitializationVector;
|
|
17
15
|
exports.randomBytes = randomBytes;
|
|
18
16
|
exports.randomBytesAsHex = randomBytesAsHex;
|
|
19
17
|
exports.decryptWithPrivateKey = decryptWithPrivateKey;
|
|
20
18
|
exports.decrypt = decrypt;
|
|
21
19
|
exports.encrypt = encrypt;
|
|
22
|
-
exports.sha256 = sha256;
|
|
23
|
-
exports.hmac = hmac;
|
|
24
20
|
exports.hex2Ab = hex2Ab;
|
|
21
|
+
exports.sign = sign;
|
|
22
|
+
exports.verify = verify;
|
|
23
|
+
exports.digest = digest;
|
|
24
|
+
exports.extractPublicKeyPem = extractPublicKeyPem;
|
|
25
|
+
exports.generateECKeyPair = generateECKeyPair;
|
|
26
|
+
exports.deriveKeyFromECDH = deriveKeyFromECDH;
|
|
27
|
+
exports.hmac = hmac;
|
|
28
|
+
exports.verifyHmac = verifyHmac;
|
|
29
|
+
exports.parsePublicKeyPem = parsePublicKeyPem;
|
|
30
|
+
exports.jwkToPublicKeyPem = jwkToPublicKeyPem;
|
|
31
|
+
exports.publicKeyPemToJwk = publicKeyPemToJwk;
|
|
32
|
+
exports.importPublicKey = importPublicKey;
|
|
33
|
+
exports.importPrivateKey = importPrivateKey;
|
|
34
|
+
exports.exportPublicKeyPem = exportPublicKeyPem;
|
|
35
|
+
exports.exportPrivateKeyPem = exportPrivateKeyPem;
|
|
36
|
+
exports.exportPublicKeyJwk = exportPublicKeyJwk;
|
|
37
|
+
exports.importSymmetricKey = importSymmetricKey;
|
|
38
|
+
exports.splitSymmetricKey = splitSymmetricKey;
|
|
39
|
+
exports.mergeSymmetricKeys = mergeSymmetricKeys;
|
|
25
40
|
const index_js_1 = require("../ciphers/index.js");
|
|
26
41
|
const binary_js_1 = require("../binary.js");
|
|
27
42
|
const declarations_js_1 = require("./declarations.js");
|
|
@@ -29,8 +44,12 @@ const errors_js_1 = require("../../../src/errors.js");
|
|
|
29
44
|
const crypto_utils_js_1 = require("./crypto-utils.js");
|
|
30
45
|
const hex_js_1 = require("../../../src/encodings/hex.js");
|
|
31
46
|
const base64_js_1 = require("../../../src/encodings/base64.js");
|
|
47
|
+
const jose_1 = require("jose");
|
|
48
|
+
const pemPublicToCrypto_js_1 = require("../../../src/crypto/pemPublicToCrypto.js");
|
|
49
|
+
const keysplit_js_1 = require("../utils/keysplit.js");
|
|
32
50
|
// Used to pass into native crypto functions
|
|
33
|
-
const
|
|
51
|
+
const ENC_DEC_METHODS = ['encrypt', 'decrypt'];
|
|
52
|
+
const SIGN_VERIFY_METHODS = ['sign', 'verify'];
|
|
34
53
|
exports.isSupported = typeof globalThis?.crypto !== 'undefined';
|
|
35
54
|
exports.method = 'http://www.w3.org/2001/04/xmlenc#aes256-cbc';
|
|
36
55
|
exports.name = 'BrowserNativeCryptoService';
|
|
@@ -65,11 +84,93 @@ function rsaPkcs1Sha256(modulusLength = declarations_js_1.MIN_ASYMMETRIC_KEY_SIZ
|
|
|
65
84
|
};
|
|
66
85
|
}
|
|
67
86
|
/**
|
|
68
|
-
* Generate a random
|
|
69
|
-
* @
|
|
87
|
+
* Generate a random symmetric key (opaque).
|
|
88
|
+
* @param length - Key length in bytes (default 32 for AES-256)
|
|
89
|
+
* @return Opaque symmetric key
|
|
70
90
|
*/
|
|
71
91
|
async function generateKey(length) {
|
|
72
|
-
|
|
92
|
+
const keyBytes = await randomBytes(length || 32);
|
|
93
|
+
return wrapSymmetricKey(keyBytes);
|
|
94
|
+
}
|
|
95
|
+
// ============================================================
|
|
96
|
+
// Opaque Key Wrapping/Unwrapping Helpers
|
|
97
|
+
// ============================================================
|
|
98
|
+
/**
|
|
99
|
+
* Wrap a CryptoKey as an opaque PublicKey.
|
|
100
|
+
* @internal
|
|
101
|
+
*/
|
|
102
|
+
function wrapPublicKey(key, algorithm) {
|
|
103
|
+
const result = {
|
|
104
|
+
_brand: 'PublicKey',
|
|
105
|
+
algorithm,
|
|
106
|
+
_internal: key,
|
|
107
|
+
};
|
|
108
|
+
if (algorithm.startsWith('rsa:')) {
|
|
109
|
+
result.modulusBits = parseInt(algorithm.split(':')[1], 10);
|
|
110
|
+
}
|
|
111
|
+
else if (algorithm.startsWith('ec:')) {
|
|
112
|
+
const curvePart = algorithm.split(':')[1];
|
|
113
|
+
result.curve =
|
|
114
|
+
curvePart === 'secp256r1'
|
|
115
|
+
? 'P-256'
|
|
116
|
+
: curvePart === 'secp384r1'
|
|
117
|
+
? 'P-384'
|
|
118
|
+
: curvePart === 'secp521r1'
|
|
119
|
+
? 'P-521'
|
|
120
|
+
: undefined;
|
|
121
|
+
}
|
|
122
|
+
return result;
|
|
123
|
+
}
|
|
124
|
+
/**
|
|
125
|
+
* Wrap a CryptoKey as an opaque PrivateKey.
|
|
126
|
+
* @internal
|
|
127
|
+
*/
|
|
128
|
+
function wrapPrivateKey(key, algorithm) {
|
|
129
|
+
const result = {
|
|
130
|
+
_brand: 'PrivateKey',
|
|
131
|
+
algorithm,
|
|
132
|
+
_internal: key,
|
|
133
|
+
};
|
|
134
|
+
if (algorithm.startsWith('rsa:')) {
|
|
135
|
+
result.modulusBits = parseInt(algorithm.split(':')[1], 10);
|
|
136
|
+
}
|
|
137
|
+
else if (algorithm.startsWith('ec:')) {
|
|
138
|
+
const curvePart = algorithm.split(':')[1];
|
|
139
|
+
result.curve =
|
|
140
|
+
curvePart === 'secp256r1'
|
|
141
|
+
? 'P-256'
|
|
142
|
+
: curvePart === 'secp384r1'
|
|
143
|
+
? 'P-384'
|
|
144
|
+
: curvePart === 'secp521r1'
|
|
145
|
+
? 'P-521'
|
|
146
|
+
: undefined;
|
|
147
|
+
}
|
|
148
|
+
return result;
|
|
149
|
+
}
|
|
150
|
+
/**
|
|
151
|
+
* Unwrap an opaque key to get the internal CryptoKey.
|
|
152
|
+
* @internal
|
|
153
|
+
*/
|
|
154
|
+
function unwrapKey(key) {
|
|
155
|
+
return key._internal;
|
|
156
|
+
}
|
|
157
|
+
/**
|
|
158
|
+
* Wrap raw key bytes as an opaque SymmetricKey.
|
|
159
|
+
* @internal
|
|
160
|
+
*/
|
|
161
|
+
function wrapSymmetricKey(keyBytes) {
|
|
162
|
+
return {
|
|
163
|
+
_brand: 'SymmetricKey',
|
|
164
|
+
length: keyBytes.length * 8, // bits
|
|
165
|
+
_internal: keyBytes,
|
|
166
|
+
};
|
|
167
|
+
}
|
|
168
|
+
/**
|
|
169
|
+
* Unwrap an opaque SymmetricKey to get raw bytes.
|
|
170
|
+
* @internal
|
|
171
|
+
*/
|
|
172
|
+
function unwrapSymmetricKey(key) {
|
|
173
|
+
return key._internal;
|
|
73
174
|
}
|
|
74
175
|
/**
|
|
75
176
|
* Generate an RSA key pair
|
|
@@ -77,61 +178,60 @@ async function generateKey(length) {
|
|
|
77
178
|
* @param size in bits
|
|
78
179
|
*/
|
|
79
180
|
async function generateKeyPair(size) {
|
|
80
|
-
const
|
|
81
|
-
|
|
181
|
+
const keySize = size || declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS;
|
|
182
|
+
const algoDomString = rsaOaepSha1(keySize);
|
|
183
|
+
const keyPair = await crypto.subtle.generateKey(algoDomString, true, ENC_DEC_METHODS);
|
|
184
|
+
// Map to supported algorithm sizes
|
|
185
|
+
let algorithm;
|
|
186
|
+
if (keySize === 2048) {
|
|
187
|
+
algorithm = 'rsa:2048';
|
|
188
|
+
}
|
|
189
|
+
else if (keySize === 4096) {
|
|
190
|
+
algorithm = 'rsa:4096';
|
|
191
|
+
}
|
|
192
|
+
else {
|
|
193
|
+
throw new errors_js_1.ConfigurationError(`Unsupported RSA key size: ${keySize}. Only 2048 and 4096 are supported.`);
|
|
194
|
+
}
|
|
195
|
+
return {
|
|
196
|
+
publicKey: wrapPublicKey(keyPair.publicKey, algorithm),
|
|
197
|
+
privateKey: wrapPrivateKey(keyPair.privateKey, algorithm),
|
|
198
|
+
};
|
|
82
199
|
}
|
|
83
200
|
/**
|
|
84
201
|
* Generate an RSA key pair suitable for signatures
|
|
85
202
|
* @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
|
|
86
203
|
*/
|
|
87
204
|
async function generateSigningKeyPair() {
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
modulusLength: 2048,
|
|
92
|
-
publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
|
|
93
|
-
}, true, ['sign', 'verify']);
|
|
94
|
-
}
|
|
95
|
-
async function cryptoToPemPair(keysMaybe) {
|
|
96
|
-
const keys = keysMaybe;
|
|
97
|
-
if (!keys.privateKey || !keys.publicKey) {
|
|
98
|
-
// These are only ever generated here, so this should not happen
|
|
99
|
-
throw new Error('internal: invalid keys');
|
|
100
|
-
}
|
|
101
|
-
const [exPublic, exPrivate] = await Promise.all([
|
|
102
|
-
crypto.subtle.exportKey('spki', keys.publicKey),
|
|
103
|
-
crypto.subtle.exportKey('pkcs8', keys.privateKey),
|
|
104
|
-
]);
|
|
205
|
+
const rsaParams = rsaPkcs1Sha256(2048);
|
|
206
|
+
const keyPair = await crypto.subtle.generateKey(rsaParams, true, SIGN_VERIFY_METHODS);
|
|
207
|
+
const algorithm = 'rsa:2048';
|
|
105
208
|
return {
|
|
106
|
-
publicKey: (
|
|
107
|
-
privateKey: (
|
|
209
|
+
publicKey: wrapPublicKey(keyPair.publicKey, algorithm),
|
|
210
|
+
privateKey: wrapPrivateKey(keyPair.privateKey, algorithm),
|
|
108
211
|
};
|
|
109
212
|
}
|
|
110
213
|
/**
|
|
111
|
-
* Encrypt using a public key
|
|
112
|
-
*
|
|
113
|
-
* @param
|
|
214
|
+
* Encrypt using a public key (RSA-OAEP).
|
|
215
|
+
* Accepts Binary or SymmetricKey for key wrapping.
|
|
216
|
+
* @param payload Payload to encrypt (Binary) or symmetric key to wrap (SymmetricKey)
|
|
217
|
+
* @param publicKey Opaque public key
|
|
114
218
|
* @return Encrypted payload
|
|
115
219
|
*/
|
|
116
220
|
async function encryptWithPublicKey(payload, publicKey) {
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
221
|
+
let payloadBuffer;
|
|
222
|
+
// Handle SymmetricKey unwrapping
|
|
223
|
+
if ('_brand' in payload && payload._brand === 'SymmetricKey') {
|
|
224
|
+
// Pass Uint8Array directly — Web Crypto respects byteOffset/byteLength on typed array views.
|
|
225
|
+
payloadBuffer = unwrapSymmetricKey(payload);
|
|
226
|
+
}
|
|
227
|
+
else {
|
|
228
|
+
// Binary payload
|
|
229
|
+
payloadBuffer = payload.asArrayBuffer();
|
|
230
|
+
}
|
|
231
|
+
const cryptoKey = unwrapKey(publicKey);
|
|
232
|
+
const result = await crypto.subtle.encrypt({ name: 'RSA-OAEP' }, cryptoKey, payloadBuffer);
|
|
127
233
|
return binary_js_1.Binary.fromArrayBuffer(result);
|
|
128
234
|
}
|
|
129
|
-
/**
|
|
130
|
-
* Generate a 16-byte initialization vector
|
|
131
|
-
*/
|
|
132
|
-
async function generateInitializationVector(length) {
|
|
133
|
-
return randomBytesAsHex(length || 16);
|
|
134
|
-
}
|
|
135
235
|
async function randomBytes(byteLength) {
|
|
136
236
|
const r = new Uint8Array(byteLength);
|
|
137
237
|
crypto.getRandomValues(r);
|
|
@@ -156,25 +256,20 @@ async function randomBytesAsHex(length) {
|
|
|
156
256
|
/**
|
|
157
257
|
* Decrypt a public-key encrypted payload with a private key
|
|
158
258
|
* @param encryptedPayload Payload to decrypt
|
|
159
|
-
* @param privateKey
|
|
259
|
+
* @param privateKey Opaque private key
|
|
160
260
|
* @return Decrypted payload
|
|
161
261
|
*/
|
|
162
262
|
async function decryptWithPrivateKey(encryptedPayload, privateKey) {
|
|
163
263
|
console.assert(typeof encryptedPayload === 'object', 'encryptedPayload must be object');
|
|
164
|
-
|
|
165
|
-
const
|
|
166
|
-
// Web Crypto APIs don't work with PEM formatted strings
|
|
167
|
-
const keyDataString = (0, crypto_utils_js_1.removePemFormatting)(privateKey);
|
|
168
|
-
const keyData = (0, base64_js_1.decodeArrayBuffer)(keyDataString);
|
|
169
|
-
const key = await crypto.subtle.importKey('pkcs8', keyData, algoDomString, false, ['decrypt']);
|
|
170
|
-
const payload = await crypto.subtle.decrypt({ name: 'RSA-OAEP' }, key, encryptedPayload.asArrayBuffer());
|
|
264
|
+
const cryptoKey = unwrapKey(privateKey);
|
|
265
|
+
const payload = await crypto.subtle.decrypt({ name: 'RSA-OAEP' }, cryptoKey, encryptedPayload.asArrayBuffer());
|
|
171
266
|
const bufferView = new Uint8Array(payload);
|
|
172
267
|
return binary_js_1.Binary.fromArrayBuffer(bufferView.buffer);
|
|
173
268
|
}
|
|
174
269
|
/**
|
|
175
270
|
* Decrypt content synchronously
|
|
176
271
|
* @param payload The payload to decrypt
|
|
177
|
-
* @param key The encryption key
|
|
272
|
+
* @param key The symmetric encryption key (opaque)
|
|
178
273
|
* @param iv The initialization vector
|
|
179
274
|
* @param algorithm The algorithm to use for encryption
|
|
180
275
|
* @param authTag The authentication tag for authenticated crypto.
|
|
@@ -196,9 +291,20 @@ async function _doEncrypt(payload, key, iv, algorithm) {
|
|
|
196
291
|
console.assert(payload != null);
|
|
197
292
|
console.assert(key != null);
|
|
198
293
|
console.assert(iv != null);
|
|
199
|
-
|
|
294
|
+
// Handle both Binary and SymmetricKey payloads
|
|
295
|
+
let payloadBuffer;
|
|
296
|
+
if ('_brand' in payload && payload._brand === 'SymmetricKey') {
|
|
297
|
+
// Pass Uint8Array directly — Web Crypto respects byteOffset/byteLength on typed array views.
|
|
298
|
+
payloadBuffer = unwrapSymmetricKey(payload);
|
|
299
|
+
}
|
|
300
|
+
else {
|
|
301
|
+
// Binary payload
|
|
302
|
+
payloadBuffer = payload.asArrayBuffer();
|
|
303
|
+
}
|
|
200
304
|
const algoDomString = getSymmetricAlgoDomString(iv, algorithm);
|
|
201
|
-
|
|
305
|
+
// Unwrap symmetric key to get raw bytes
|
|
306
|
+
const keyBytes = unwrapSymmetricKey(key);
|
|
307
|
+
const importedKey = await _importKey(keyBytes, algoDomString);
|
|
202
308
|
const encrypted = await crypto.subtle.encrypt(algoDomString, importedKey, payloadBuffer);
|
|
203
309
|
if (algoDomString.name === 'AES-GCM') {
|
|
204
310
|
return {
|
|
@@ -224,7 +330,9 @@ async function _doDecrypt(payload, key, iv, algorithm, authTag) {
|
|
|
224
330
|
payloadBuffer = gcmPayload.buffer;
|
|
225
331
|
}
|
|
226
332
|
const algoDomString = getSymmetricAlgoDomString(iv, algorithm);
|
|
227
|
-
|
|
333
|
+
// Unwrap symmetric key to get raw bytes
|
|
334
|
+
const keyBytes = unwrapSymmetricKey(key);
|
|
335
|
+
const importedKey = await _importKey(keyBytes, algoDomString);
|
|
228
336
|
algoDomString.iv = iv.asArrayBuffer();
|
|
229
337
|
const decrypted = await crypto.subtle
|
|
230
338
|
.decrypt(algoDomString, importedKey, payloadBuffer)
|
|
@@ -237,8 +345,8 @@ async function _doDecrypt(payload, key, iv, algorithm, authTag) {
|
|
|
237
345
|
});
|
|
238
346
|
return { payload: binary_js_1.Binary.fromArrayBuffer(decrypted) };
|
|
239
347
|
}
|
|
240
|
-
function _importKey(
|
|
241
|
-
return crypto.subtle.importKey('raw',
|
|
348
|
+
function _importKey(keyBytes, algorithm) {
|
|
349
|
+
return crypto.subtle.importKey('raw', keyBytes, algorithm, true, ENC_DEC_METHODS);
|
|
242
350
|
}
|
|
243
351
|
/**
|
|
244
352
|
* Get a DOMString representing the algorithm to use for a crypto
|
|
@@ -262,27 +370,6 @@ function getSymmetricAlgoDomString(iv, algorithm) {
|
|
|
262
370
|
* @param content String content
|
|
263
371
|
* @return Hex hash
|
|
264
372
|
*/
|
|
265
|
-
async function sha256(content) {
|
|
266
|
-
const buffer = new TextEncoder().encode(content);
|
|
267
|
-
const hashBuffer = await crypto.subtle.digest('SHA-256', buffer);
|
|
268
|
-
return (0, hex_js_1.encodeArrayBuffer)(hashBuffer);
|
|
269
|
-
}
|
|
270
|
-
/**
|
|
271
|
-
* Create an HMAC SHA256 hash
|
|
272
|
-
* @param key Key string
|
|
273
|
-
* @param content Content string
|
|
274
|
-
* @return Hex hash
|
|
275
|
-
*/
|
|
276
|
-
async function hmac(key, content) {
|
|
277
|
-
const contentBuffer = new TextEncoder().encode(content);
|
|
278
|
-
const keyBuffer = hex2Ab(key);
|
|
279
|
-
const cryptoKey = await crypto.subtle.importKey('raw', keyBuffer, {
|
|
280
|
-
name: 'HMAC',
|
|
281
|
-
hash: { name: 'SHA-256' },
|
|
282
|
-
}, true, ['sign', 'verify']);
|
|
283
|
-
const hashBuffer = await crypto.subtle.sign('HMAC', cryptoKey, contentBuffer);
|
|
284
|
-
return (0, hex_js_1.encodeArrayBuffer)(hashBuffer);
|
|
285
|
-
}
|
|
286
373
|
/**
|
|
287
374
|
* Create an ArrayBuffer from a hex string.
|
|
288
375
|
* https://developers.google.com/web/updates/2012/06/How-to-convert-ArrayBuffer-to-and-from-String?hl=en
|
|
@@ -296,20 +383,694 @@ function hex2Ab(hex) {
|
|
|
296
383
|
}
|
|
297
384
|
return buffer;
|
|
298
385
|
}
|
|
386
|
+
/**
|
|
387
|
+
* Get the Web Crypto algorithm parameters for a signing algorithm.
|
|
388
|
+
*/
|
|
389
|
+
function getSigningAlgorithmParams(algorithm) {
|
|
390
|
+
switch (algorithm) {
|
|
391
|
+
case 'RS256':
|
|
392
|
+
return {
|
|
393
|
+
importParams: { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' },
|
|
394
|
+
signParams: 'RSASSA-PKCS1-v1_5',
|
|
395
|
+
};
|
|
396
|
+
case 'ES256':
|
|
397
|
+
return {
|
|
398
|
+
importParams: { name: 'ECDSA', namedCurve: 'P-256' },
|
|
399
|
+
signParams: { name: 'ECDSA', hash: 'SHA-256' },
|
|
400
|
+
};
|
|
401
|
+
case 'ES384':
|
|
402
|
+
return {
|
|
403
|
+
importParams: { name: 'ECDSA', namedCurve: 'P-384' },
|
|
404
|
+
signParams: { name: 'ECDSA', hash: 'SHA-384' },
|
|
405
|
+
};
|
|
406
|
+
case 'ES512':
|
|
407
|
+
return {
|
|
408
|
+
importParams: { name: 'ECDSA', namedCurve: 'P-521' },
|
|
409
|
+
signParams: { name: 'ECDSA', hash: 'SHA-512' },
|
|
410
|
+
};
|
|
411
|
+
default:
|
|
412
|
+
throw new errors_js_1.ConfigurationError(`Unsupported signing algorithm: ${algorithm}`);
|
|
413
|
+
}
|
|
414
|
+
}
|
|
415
|
+
/**
|
|
416
|
+
* Convert IEEE P1363 signature format (used by WebCrypto ECDSA) to DER format (used by JWT).
|
|
417
|
+
* RS256 signatures don't need conversion.
|
|
418
|
+
*/
|
|
419
|
+
function ieeeP1363ToDer(signature, algorithm) {
|
|
420
|
+
if (algorithm === 'RS256') {
|
|
421
|
+
return signature;
|
|
422
|
+
}
|
|
423
|
+
// IEEE P1363: r || s where each is padded to key size
|
|
424
|
+
const halfLen = signature.length / 2;
|
|
425
|
+
const r = signature.slice(0, halfLen);
|
|
426
|
+
const s = signature.slice(halfLen);
|
|
427
|
+
// Remove leading zeros but keep one if the high bit is set
|
|
428
|
+
const trimLeadingZeros = (arr) => {
|
|
429
|
+
let i = 0;
|
|
430
|
+
while (i < arr.length - 1 && arr[i] === 0)
|
|
431
|
+
i++;
|
|
432
|
+
return arr.slice(i);
|
|
433
|
+
};
|
|
434
|
+
let rTrimmed = trimLeadingZeros(r);
|
|
435
|
+
let sTrimmed = trimLeadingZeros(s);
|
|
436
|
+
// Add leading zero if high bit is set (to keep positive in DER)
|
|
437
|
+
if (rTrimmed[0] & 0x80) {
|
|
438
|
+
const padded = new Uint8Array(rTrimmed.length + 1);
|
|
439
|
+
padded.set(rTrimmed, 1);
|
|
440
|
+
rTrimmed = padded;
|
|
441
|
+
}
|
|
442
|
+
if (sTrimmed[0] & 0x80) {
|
|
443
|
+
const padded = new Uint8Array(sTrimmed.length + 1);
|
|
444
|
+
padded.set(sTrimmed, 1);
|
|
445
|
+
sTrimmed = padded;
|
|
446
|
+
}
|
|
447
|
+
// DER SEQUENCE: 0x30 [length] [r INTEGER] [s INTEGER]
|
|
448
|
+
// INTEGER: 0x02 [length] [value]
|
|
449
|
+
const rDer = new Uint8Array([0x02, rTrimmed.length, ...rTrimmed]);
|
|
450
|
+
const sDer = new Uint8Array([0x02, sTrimmed.length, ...sTrimmed]);
|
|
451
|
+
const seqLen = rDer.length + sDer.length;
|
|
452
|
+
// DER length: short-form for < 128, long-form (0x81 nn) for 128-255.
|
|
453
|
+
// ECDSA sequences never exceed 255 bytes for any supported curve.
|
|
454
|
+
const lenBytes = seqLen < 128 ? new Uint8Array([seqLen]) : new Uint8Array([0x81, seqLen]);
|
|
455
|
+
const result = new Uint8Array(1 + lenBytes.length + seqLen);
|
|
456
|
+
result[0] = 0x30;
|
|
457
|
+
result.set(lenBytes, 1);
|
|
458
|
+
result.set(rDer, 1 + lenBytes.length);
|
|
459
|
+
result.set(sDer, 1 + lenBytes.length + rDer.length);
|
|
460
|
+
return result;
|
|
461
|
+
}
|
|
462
|
+
/**
|
|
463
|
+
* Convert DER signature format (used by JWT) to IEEE P1363 format (used by WebCrypto ECDSA).
|
|
464
|
+
* RS256 signatures don't need conversion.
|
|
465
|
+
*/
|
|
466
|
+
function derToIeeeP1363(signature, algorithm) {
|
|
467
|
+
if (algorithm === 'RS256') {
|
|
468
|
+
return signature;
|
|
469
|
+
}
|
|
470
|
+
// Determine the expected component length based on algorithm
|
|
471
|
+
let componentLen;
|
|
472
|
+
switch (algorithm) {
|
|
473
|
+
case 'ES256':
|
|
474
|
+
componentLen = 32;
|
|
475
|
+
break;
|
|
476
|
+
case 'ES384':
|
|
477
|
+
componentLen = 48;
|
|
478
|
+
break;
|
|
479
|
+
case 'ES512':
|
|
480
|
+
componentLen = 66;
|
|
481
|
+
break;
|
|
482
|
+
default:
|
|
483
|
+
throw new errors_js_1.ConfigurationError(`Unsupported algorithm for DER conversion: ${algorithm}`);
|
|
484
|
+
}
|
|
485
|
+
// Parse DER: SEQUENCE { INTEGER r, INTEGER s }
|
|
486
|
+
if (signature[0] !== 0x30) {
|
|
487
|
+
throw new errors_js_1.ConfigurationError('Invalid DER signature: expected SEQUENCE');
|
|
488
|
+
}
|
|
489
|
+
// Skip SEQUENCE tag, then parse DER length (short- or long-form).
|
|
490
|
+
let offset = 1;
|
|
491
|
+
if (signature[offset] & 0x80) {
|
|
492
|
+
// Long-form: low 7 bits = number of subsequent length bytes.
|
|
493
|
+
const lenBytesCount = signature[offset] & 0x7f;
|
|
494
|
+
if (lenBytesCount === 0 || lenBytesCount > 4) {
|
|
495
|
+
throw new errors_js_1.ConfigurationError('Invalid DER signature: invalid long-form length');
|
|
496
|
+
}
|
|
497
|
+
offset += 1 + lenBytesCount;
|
|
498
|
+
if (offset > signature.length) {
|
|
499
|
+
throw new errors_js_1.ConfigurationError('Invalid DER signature: length bytes exceed signature length');
|
|
500
|
+
}
|
|
501
|
+
}
|
|
502
|
+
else {
|
|
503
|
+
// Short-form: single length byte.
|
|
504
|
+
offset += 1;
|
|
505
|
+
}
|
|
506
|
+
// Parse r INTEGER
|
|
507
|
+
if (signature[offset] !== 0x02) {
|
|
508
|
+
throw new errors_js_1.ConfigurationError('Invalid DER signature: expected INTEGER for r');
|
|
509
|
+
}
|
|
510
|
+
const rLen = signature[offset + 1];
|
|
511
|
+
offset += 2;
|
|
512
|
+
let r = signature.slice(offset, offset + rLen);
|
|
513
|
+
offset += rLen;
|
|
514
|
+
// Parse s INTEGER
|
|
515
|
+
if (signature[offset] !== 0x02) {
|
|
516
|
+
throw new errors_js_1.ConfigurationError('Invalid DER signature: expected INTEGER for s');
|
|
517
|
+
}
|
|
518
|
+
const sLen = signature[offset + 1];
|
|
519
|
+
offset += 2;
|
|
520
|
+
let s = signature.slice(offset, offset + sLen);
|
|
521
|
+
// Remove leading zero padding if present
|
|
522
|
+
if (r[0] === 0 && r.length > componentLen) {
|
|
523
|
+
r = r.slice(1);
|
|
524
|
+
}
|
|
525
|
+
if (s[0] === 0 && s.length > componentLen) {
|
|
526
|
+
s = s.slice(1);
|
|
527
|
+
}
|
|
528
|
+
// Pad to component length
|
|
529
|
+
const result = new Uint8Array(componentLen * 2);
|
|
530
|
+
result.set(r, componentLen - r.length);
|
|
531
|
+
result.set(s, componentLen * 2 - s.length);
|
|
532
|
+
return result;
|
|
533
|
+
}
|
|
534
|
+
/**
|
|
535
|
+
* Sign data with an asymmetric private key.
|
|
536
|
+
*/
|
|
537
|
+
async function sign(data, privateKey, algorithm) {
|
|
538
|
+
const { signParams } = getSigningAlgorithmParams(algorithm);
|
|
539
|
+
// Unwrap the internal CryptoKey
|
|
540
|
+
const key = unwrapKey(privateKey);
|
|
541
|
+
// Sign the data
|
|
542
|
+
const signature = await crypto.subtle.sign(signParams, key, data);
|
|
543
|
+
// Convert from IEEE P1363 to DER for EC algorithms
|
|
544
|
+
return ieeeP1363ToDer(new Uint8Array(signature), algorithm);
|
|
545
|
+
}
|
|
546
|
+
/**
|
|
547
|
+
* Verify signature with an asymmetric public key.
|
|
548
|
+
*/
|
|
549
|
+
async function verify(data, signature, publicKey, algorithm) {
|
|
550
|
+
const { signParams } = getSigningAlgorithmParams(algorithm);
|
|
551
|
+
// Unwrap the internal CryptoKey
|
|
552
|
+
const key = unwrapKey(publicKey);
|
|
553
|
+
// Convert from DER to IEEE P1363 for EC algorithms
|
|
554
|
+
const ieeeSignature = derToIeeeP1363(signature, algorithm);
|
|
555
|
+
// Verify the signature
|
|
556
|
+
return crypto.subtle.verify(signParams, key, ieeeSignature, data);
|
|
557
|
+
}
|
|
558
|
+
/**
|
|
559
|
+
* Compute hash digest.
|
|
560
|
+
*/
|
|
561
|
+
async function digest(algorithm, data) {
|
|
562
|
+
// Validate algorithm and map to Web Crypto name
|
|
563
|
+
const validAlgorithms = ['SHA-256', 'SHA-384', 'SHA-512'];
|
|
564
|
+
if (!validAlgorithms.includes(algorithm)) {
|
|
565
|
+
throw new errors_js_1.ConfigurationError(`Unsupported hash algorithm: ${algorithm}`);
|
|
566
|
+
}
|
|
567
|
+
const hashBuffer = await crypto.subtle.digest(algorithm, data);
|
|
568
|
+
return new Uint8Array(hashBuffer);
|
|
569
|
+
}
|
|
570
|
+
/**
|
|
571
|
+
* Extract PEM public key from X.509 certificate or return PEM key as-is.
|
|
572
|
+
*
|
|
573
|
+
* @param certOrPem - A PEM-encoded X.509 certificate or public key
|
|
574
|
+
* @param jwaAlgorithm - JWA algorithm hint for certificate parsing (RS256, RS512, ES256, ES384, ES512).
|
|
575
|
+
* If not provided for a certificate, will attempt to auto-detect from OIDs.
|
|
576
|
+
*/
|
|
577
|
+
async function extractPublicKeyPem(certOrPem, jwaAlgorithm) {
|
|
578
|
+
// If it's a certificate, extract the public key
|
|
579
|
+
if (certOrPem.includes('-----BEGIN CERTIFICATE-----')) {
|
|
580
|
+
let alg = jwaAlgorithm;
|
|
581
|
+
if (!alg) {
|
|
582
|
+
// Auto-detect algorithm from certificate OIDs
|
|
583
|
+
const certBody = certOrPem.replace(/-----(BEGIN|END) CERTIFICATE-----|\s/g, '');
|
|
584
|
+
const certBytes = (0, base64_js_1.decodeArrayBuffer)(certBody);
|
|
585
|
+
const hex = (0, hex_js_1.encodeArrayBuffer)(certBytes);
|
|
586
|
+
alg = (0, pemPublicToCrypto_js_1.toJwsAlg)(hex);
|
|
587
|
+
}
|
|
588
|
+
const cert = await (0, jose_1.importX509)(certOrPem, alg, { extractable: true });
|
|
589
|
+
return (0, jose_1.exportSPKI)(cert);
|
|
590
|
+
}
|
|
591
|
+
// If it's already a PEM public key, return as-is
|
|
592
|
+
if (certOrPem.includes('-----BEGIN PUBLIC KEY-----')) {
|
|
593
|
+
return certOrPem;
|
|
594
|
+
}
|
|
595
|
+
throw new errors_js_1.ConfigurationError('Input must be a PEM-encoded certificate or public key');
|
|
596
|
+
}
|
|
597
|
+
/**
|
|
598
|
+
* Map ECCurve to Web Crypto named curve.
|
|
599
|
+
*/
|
|
600
|
+
function curveToNamedCurve(curve) {
|
|
601
|
+
switch (curve) {
|
|
602
|
+
case 'P-256':
|
|
603
|
+
return 'P-256';
|
|
604
|
+
case 'P-384':
|
|
605
|
+
return 'P-384';
|
|
606
|
+
case 'P-521':
|
|
607
|
+
return 'P-521';
|
|
608
|
+
default:
|
|
609
|
+
throw new errors_js_1.ConfigurationError(`Unsupported curve: ${curve}`);
|
|
610
|
+
}
|
|
611
|
+
}
|
|
612
|
+
/**
|
|
613
|
+
* Generate an EC key pair for ECDH key agreement.
|
|
614
|
+
*/
|
|
615
|
+
async function generateECKeyPair(curve = 'P-256') {
|
|
616
|
+
const namedCurve = curveToNamedCurve(curve);
|
|
617
|
+
// Generate key pair for ECDH key agreement
|
|
618
|
+
const keyPair = await crypto.subtle.generateKey({ name: 'ECDH', namedCurve }, true, [
|
|
619
|
+
'deriveBits',
|
|
620
|
+
]);
|
|
621
|
+
// Map to KeyAlgorithm literal type
|
|
622
|
+
let algorithm;
|
|
623
|
+
switch (namedCurve) {
|
|
624
|
+
case 'P-256':
|
|
625
|
+
algorithm = 'ec:secp256r1';
|
|
626
|
+
break;
|
|
627
|
+
case 'P-384':
|
|
628
|
+
algorithm = 'ec:secp384r1';
|
|
629
|
+
break;
|
|
630
|
+
case 'P-521':
|
|
631
|
+
algorithm = 'ec:secp521r1';
|
|
632
|
+
break;
|
|
633
|
+
default:
|
|
634
|
+
throw new errors_js_1.ConfigurationError(`Unsupported curve: ${namedCurve}`);
|
|
635
|
+
}
|
|
636
|
+
return {
|
|
637
|
+
publicKey: wrapPublicKey(keyPair.publicKey, algorithm),
|
|
638
|
+
privateKey: wrapPrivateKey(keyPair.privateKey, algorithm),
|
|
639
|
+
};
|
|
640
|
+
}
|
|
641
|
+
/**
|
|
642
|
+
* Supported EC curves.
|
|
643
|
+
*/
|
|
644
|
+
const SUPPORTED_EC_CURVES = ['P-256', 'P-384', 'P-521'];
|
|
645
|
+
/**
|
|
646
|
+
* Decode base64url string and return byte length.
|
|
647
|
+
* Uses the existing base64 decoder which handles both standard and URL-safe encoding.
|
|
648
|
+
*/
|
|
649
|
+
function base64urlByteLength(base64url) {
|
|
650
|
+
// Add padding if needed (base64url omits padding)
|
|
651
|
+
const padding = (4 - (base64url.length % 4)) % 4;
|
|
652
|
+
const padded = base64url + '='.repeat(padding);
|
|
653
|
+
return (0, base64_js_1.decodeArrayBuffer)(padded).byteLength;
|
|
654
|
+
}
|
|
655
|
+
/**
|
|
656
|
+
* Extract EC curve from a public key by parsing ASN.1 OIDs.
|
|
657
|
+
* Reuses the existing guessCurveName function that checks for curve OIDs.
|
|
658
|
+
*/
|
|
659
|
+
function extractEcCurveFromPublicKey(keyData) {
|
|
660
|
+
// Convert to hex for OID parsing
|
|
661
|
+
const hexKey = (0, hex_js_1.encodeArrayBuffer)(keyData);
|
|
662
|
+
// Use existing OID parser (returns 'P-256', 'P-384', or 'P-521')
|
|
663
|
+
const curveName = (0, pemPublicToCrypto_js_1.guessCurveName)(hexKey);
|
|
664
|
+
return curveName;
|
|
665
|
+
}
|
|
666
|
+
/**
|
|
667
|
+
* Perform ECDH key agreement followed by HKDF key derivation.
|
|
668
|
+
* Returns opaque symmetric key for symmetric encryption.
|
|
669
|
+
*/
|
|
670
|
+
async function deriveKeyFromECDH(privateKey, publicKey, hkdfParams) {
|
|
671
|
+
// Unwrap the internal CryptoKeys
|
|
672
|
+
const privateKeyCrypto = unwrapKey(privateKey);
|
|
673
|
+
const publicKeyCrypto = unwrapKey(publicKey);
|
|
674
|
+
// Get curve from key metadata
|
|
675
|
+
const curve = publicKey.curve;
|
|
676
|
+
if (!curve) {
|
|
677
|
+
throw new errors_js_1.ConfigurationError('EC curve not found on public key');
|
|
678
|
+
}
|
|
679
|
+
// Determine bits based on curve
|
|
680
|
+
const curveBits = {
|
|
681
|
+
'P-256': 256,
|
|
682
|
+
'P-384': 384,
|
|
683
|
+
'P-521': 528, // P-521 derives 528 bits (66 bytes)
|
|
684
|
+
};
|
|
685
|
+
const bits = curveBits[curve];
|
|
686
|
+
// Perform ECDH to get shared secret
|
|
687
|
+
const sharedSecret = await crypto.subtle.deriveBits({ name: 'ECDH', public: publicKeyCrypto }, privateKeyCrypto, bits);
|
|
688
|
+
// Import shared secret as HKDF key material
|
|
689
|
+
const hkdfKey = await crypto.subtle.importKey('raw', sharedSecret, 'HKDF', false, ['deriveKey']);
|
|
690
|
+
// Derive the final key using HKDF
|
|
691
|
+
const keyLength = hkdfParams.keyLength ?? 256;
|
|
692
|
+
const derivedKey = await crypto.subtle.deriveKey({
|
|
693
|
+
name: 'HKDF',
|
|
694
|
+
hash: hkdfParams.hash,
|
|
695
|
+
salt: hkdfParams.salt,
|
|
696
|
+
info: hkdfParams.info ?? new Uint8Array(0),
|
|
697
|
+
}, hkdfKey, { name: 'AES-GCM', length: keyLength }, true, ['encrypt', 'decrypt']);
|
|
698
|
+
// Export the derived key as raw bytes and wrap as SymmetricKey
|
|
699
|
+
const keyBytes = await crypto.subtle.exportKey('raw', derivedKey);
|
|
700
|
+
return wrapSymmetricKey(new Uint8Array(keyBytes));
|
|
701
|
+
}
|
|
702
|
+
/**
|
|
703
|
+
* Compute HMAC-SHA256 of data with a symmetric key.
|
|
704
|
+
*/
|
|
705
|
+
async function hmac(data, key) {
|
|
706
|
+
// Unwrap symmetric key to get raw bytes
|
|
707
|
+
const keyBytes = unwrapSymmetricKey(key);
|
|
708
|
+
const cryptoKey = await crypto.subtle.importKey('raw', keyBytes, { name: 'HMAC', hash: 'SHA-256' }, false, ['sign']);
|
|
709
|
+
const signature = await crypto.subtle.sign('HMAC', cryptoKey, data);
|
|
710
|
+
return new Uint8Array(signature);
|
|
711
|
+
}
|
|
712
|
+
/**
|
|
713
|
+
* Verify HMAC-SHA256. Standalone utility — not part of CryptoService interface.
|
|
714
|
+
*/
|
|
715
|
+
async function verifyHmac(data, signature, key) {
|
|
716
|
+
const keyBytes = unwrapSymmetricKey(key);
|
|
717
|
+
const cryptoKey = await crypto.subtle.importKey('raw', keyBytes, { name: 'HMAC', hash: 'SHA-256' }, false, ['verify']);
|
|
718
|
+
return crypto.subtle.verify('HMAC', cryptoKey, signature, data);
|
|
719
|
+
}
|
|
720
|
+
/**
|
|
721
|
+
* Extract RSA modulus bit length by importing key and exporting as JWK.
|
|
722
|
+
* Uses Web Crypto's built-in ASN.1 parsing for robustness.
|
|
723
|
+
*/
|
|
724
|
+
async function extractRsaModulusBitLength(keyData) {
|
|
725
|
+
const key = await crypto.subtle.importKey('spki', keyData, { name: 'RSA-OAEP', hash: 'SHA-256' }, true, // extractable
|
|
726
|
+
['encrypt']);
|
|
727
|
+
const jwk = await crypto.subtle.exportKey('jwk', key);
|
|
728
|
+
if (!jwk.n) {
|
|
729
|
+
throw new errors_js_1.ConfigurationError('Invalid RSA key: missing modulus');
|
|
730
|
+
}
|
|
731
|
+
// JWK 'n' is base64url-encoded modulus
|
|
732
|
+
// Decode and count bytes, multiply by 8 for bits
|
|
733
|
+
return base64urlByteLength(jwk.n) * 8;
|
|
734
|
+
}
|
|
735
|
+
/**
|
|
736
|
+
* Import and validate a PEM public key, returning algorithm info.
|
|
737
|
+
* Uses JWK export for robust key parameter detection.
|
|
738
|
+
*/
|
|
739
|
+
async function parsePublicKeyPem(pem) {
|
|
740
|
+
// First extract public key if it's a certificate
|
|
741
|
+
let publicKeyPem = pem;
|
|
742
|
+
if (pem.includes('-----BEGIN CERTIFICATE-----')) {
|
|
743
|
+
publicKeyPem = await extractPublicKeyPem(pem);
|
|
744
|
+
}
|
|
745
|
+
if (!publicKeyPem.includes('-----BEGIN PUBLIC KEY-----')) {
|
|
746
|
+
throw new errors_js_1.ConfigurationError('Input must be a PEM-encoded public key or certificate');
|
|
747
|
+
}
|
|
748
|
+
const keyData = (0, base64_js_1.decodeArrayBuffer)((0, crypto_utils_js_1.removePemFormatting)(publicKeyPem));
|
|
749
|
+
// Try RSA first - use JWK export to get modulus size
|
|
750
|
+
try {
|
|
751
|
+
const modulusBits = await extractRsaModulusBitLength(keyData);
|
|
752
|
+
let algorithm;
|
|
753
|
+
if (modulusBits < declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS) {
|
|
754
|
+
throw new errors_js_1.ConfigurationError(`RSA key size ${modulusBits} bits is below the minimum of ${declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS} bits`);
|
|
755
|
+
}
|
|
756
|
+
else if (modulusBits <= 2048) {
|
|
757
|
+
algorithm = 'rsa:2048';
|
|
758
|
+
}
|
|
759
|
+
else if (modulusBits <= 4096) {
|
|
760
|
+
algorithm = 'rsa:4096';
|
|
761
|
+
}
|
|
762
|
+
else {
|
|
763
|
+
throw new errors_js_1.ConfigurationError(`Unsupported RSA key size: ${modulusBits} bits`);
|
|
764
|
+
}
|
|
765
|
+
return { algorithm, pem: publicKeyPem };
|
|
766
|
+
}
|
|
767
|
+
catch (e) {
|
|
768
|
+
// If it's our own ConfigurationError, rethrow
|
|
769
|
+
if (e instanceof errors_js_1.ConfigurationError) {
|
|
770
|
+
throw e;
|
|
771
|
+
}
|
|
772
|
+
// Not an RSA key, try EC next
|
|
773
|
+
}
|
|
774
|
+
// Try EC - parse curve from OID
|
|
775
|
+
try {
|
|
776
|
+
const detectedCurve = extractEcCurveFromPublicKey(keyData);
|
|
777
|
+
const curveMap = {
|
|
778
|
+
'P-256': 'ec:secp256r1',
|
|
779
|
+
'P-384': 'ec:secp384r1',
|
|
780
|
+
'P-521': 'ec:secp521r1',
|
|
781
|
+
};
|
|
782
|
+
return { algorithm: curveMap[detectedCurve], pem: publicKeyPem };
|
|
783
|
+
}
|
|
784
|
+
catch {
|
|
785
|
+
// Not a valid EC key
|
|
786
|
+
}
|
|
787
|
+
throw new errors_js_1.ConfigurationError('Unable to determine public key algorithm - unsupported key type');
|
|
788
|
+
}
|
|
789
|
+
/**
|
|
790
|
+
* Convert a JWK (JSON Web Key) to PEM format.
|
|
791
|
+
*/
|
|
792
|
+
async function jwkToPublicKeyPem(jwk) {
|
|
793
|
+
let key;
|
|
794
|
+
if (jwk.kty === 'RSA') {
|
|
795
|
+
// RSA key
|
|
796
|
+
key = await crypto.subtle.importKey('jwk', jwk, { name: 'RSA-OAEP', hash: 'SHA-256' }, true, [
|
|
797
|
+
'encrypt',
|
|
798
|
+
]);
|
|
799
|
+
}
|
|
800
|
+
else if (jwk.kty === 'EC') {
|
|
801
|
+
// EC key
|
|
802
|
+
const crv = jwk.crv;
|
|
803
|
+
if (!crv || !['P-256', 'P-384', 'P-521'].includes(crv)) {
|
|
804
|
+
throw new errors_js_1.ConfigurationError(`Unsupported EC curve: ${crv}`);
|
|
805
|
+
}
|
|
806
|
+
key = await crypto.subtle.importKey('jwk', jwk, { name: 'ECDH', namedCurve: crv }, true, []);
|
|
807
|
+
}
|
|
808
|
+
else {
|
|
809
|
+
throw new errors_js_1.ConfigurationError(`Unsupported JWK key type: ${jwk.kty}`);
|
|
810
|
+
}
|
|
811
|
+
const spkiBuffer = await crypto.subtle.exportKey('spki', key);
|
|
812
|
+
return (0, crypto_utils_js_1.formatAsPem)(spkiBuffer, 'PUBLIC KEY');
|
|
813
|
+
}
|
|
814
|
+
/**
|
|
815
|
+
* Convert a PEM public key to JWK format.
|
|
816
|
+
* Returns only public key components (no private key data).
|
|
817
|
+
*/
|
|
818
|
+
async function publicKeyPemToJwk(publicKeyPem) {
|
|
819
|
+
const keyDataBase64 = (0, crypto_utils_js_1.removePemFormatting)(publicKeyPem);
|
|
820
|
+
const keyBuffer = (0, base64_js_1.decodeArrayBuffer)(keyDataBase64);
|
|
821
|
+
const hex = (0, hex_js_1.encodeArrayBuffer)(keyBuffer);
|
|
822
|
+
// Detect key type using OID
|
|
823
|
+
const algorithmName = (0, pemPublicToCrypto_js_1.guessAlgorithmName)(hex);
|
|
824
|
+
if (algorithmName === 'ECDH' || algorithmName === 'ECDSA') {
|
|
825
|
+
// EC key - detect curve from OID
|
|
826
|
+
const namedCurve = (0, pemPublicToCrypto_js_1.guessCurveName)(hex);
|
|
827
|
+
const key = await crypto.subtle.importKey('spki', keyBuffer, { name: 'ECDSA', namedCurve }, true, ['verify']);
|
|
828
|
+
const jwk = await crypto.subtle.exportKey('jwk', key);
|
|
829
|
+
// Return only public key components
|
|
830
|
+
const { kty, crv, x, y } = jwk;
|
|
831
|
+
return { kty, crv, x, y };
|
|
832
|
+
}
|
|
833
|
+
else {
|
|
834
|
+
// RSA key
|
|
835
|
+
const key = await crypto.subtle.importKey('spki', keyBuffer, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, true, ['verify']);
|
|
836
|
+
const jwk = await crypto.subtle.exportKey('jwk', key);
|
|
837
|
+
// Return only public key components
|
|
838
|
+
const { kty, e, n } = jwk;
|
|
839
|
+
return { kty, e, n };
|
|
840
|
+
}
|
|
841
|
+
}
|
|
842
|
+
// ============================================================
|
|
843
|
+
// Key Import Functions (PEM → Opaque)
|
|
844
|
+
// ============================================================
|
|
845
|
+
/**
|
|
846
|
+
* Import a PEM public key as an opaque key.
|
|
847
|
+
*/
|
|
848
|
+
async function importPublicKey(pem, options) {
|
|
849
|
+
const { usage = 'encrypt', extractable = true, algorithmHint } = options;
|
|
850
|
+
// Detect algorithm from PEM; also normalises certificates → plain SPKI PEM.
|
|
851
|
+
const keyInfo = await parsePublicKeyPem(pem);
|
|
852
|
+
const algorithm = algorithmHint || keyInfo.algorithm;
|
|
853
|
+
// Use keyInfo.pem (normalised SPKI) not the original pem, which may be a certificate.
|
|
854
|
+
// Passing raw X.509 DER bytes to crypto.subtle.importKey('spki') would throw DataError.
|
|
855
|
+
const keyData = (0, crypto_utils_js_1.removePemFormatting)(keyInfo.pem);
|
|
856
|
+
const keyBuffer = (0, base64_js_1.decodeArrayBuffer)(keyData);
|
|
857
|
+
// Determine Web Crypto algorithm and usages based on key type and usage
|
|
858
|
+
let cryptoAlgorithm;
|
|
859
|
+
let keyUsages;
|
|
860
|
+
if (algorithm.startsWith('rsa:')) {
|
|
861
|
+
if (usage === 'encrypt') {
|
|
862
|
+
cryptoAlgorithm = rsaOaepSha1();
|
|
863
|
+
keyUsages = ['encrypt'];
|
|
864
|
+
}
|
|
865
|
+
else if (usage === 'sign') {
|
|
866
|
+
cryptoAlgorithm = { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' };
|
|
867
|
+
keyUsages = ['verify'];
|
|
868
|
+
}
|
|
869
|
+
else {
|
|
870
|
+
throw new errors_js_1.ConfigurationError('RSA keys only support usage: encrypt or sign');
|
|
871
|
+
}
|
|
872
|
+
}
|
|
873
|
+
else if (algorithm.startsWith('ec:')) {
|
|
874
|
+
const curve = algorithm.split(':')[1];
|
|
875
|
+
const namedCurve = curve === 'secp256r1'
|
|
876
|
+
? 'P-256'
|
|
877
|
+
: curve === 'secp384r1'
|
|
878
|
+
? 'P-384'
|
|
879
|
+
: curve === 'secp521r1'
|
|
880
|
+
? 'P-521'
|
|
881
|
+
: (() => {
|
|
882
|
+
throw new errors_js_1.ConfigurationError(`Unsupported EC curve: ${curve}`);
|
|
883
|
+
})();
|
|
884
|
+
if (usage === 'derive') {
|
|
885
|
+
cryptoAlgorithm = { name: 'ECDH', namedCurve };
|
|
886
|
+
keyUsages = [];
|
|
887
|
+
}
|
|
888
|
+
else if (usage === 'sign') {
|
|
889
|
+
cryptoAlgorithm = { name: 'ECDSA', namedCurve };
|
|
890
|
+
keyUsages = ['verify'];
|
|
891
|
+
}
|
|
892
|
+
else {
|
|
893
|
+
throw new errors_js_1.ConfigurationError('EC keys only support usage: derive or sign');
|
|
894
|
+
}
|
|
895
|
+
}
|
|
896
|
+
else {
|
|
897
|
+
throw new errors_js_1.ConfigurationError(`Unsupported algorithm: ${algorithm}`);
|
|
898
|
+
}
|
|
899
|
+
// Import as CryptoKey
|
|
900
|
+
const cryptoKey = await crypto.subtle.importKey('spki', keyBuffer, cryptoAlgorithm, extractable, keyUsages);
|
|
901
|
+
return wrapPublicKey(cryptoKey, algorithm);
|
|
902
|
+
}
|
|
903
|
+
/**
|
|
904
|
+
* Import a PEM private key as an opaque key.
|
|
905
|
+
*/
|
|
906
|
+
async function importPrivateKey(pem, options) {
|
|
907
|
+
const { usage = 'encrypt', extractable = true, algorithmHint } = options;
|
|
908
|
+
// Detect algorithm from PEM structure (similar to public key detection)
|
|
909
|
+
// For now, use algorithmHint if provided, otherwise detect from key structure
|
|
910
|
+
let algorithm;
|
|
911
|
+
const keyData = (0, crypto_utils_js_1.removePemFormatting)(pem);
|
|
912
|
+
const keyBuffer = (0, base64_js_1.decodeArrayBuffer)(keyData);
|
|
913
|
+
if (algorithmHint) {
|
|
914
|
+
algorithm = algorithmHint;
|
|
915
|
+
}
|
|
916
|
+
else {
|
|
917
|
+
// PKCS#8 PrivateKeyInfo embeds the same AlgorithmIdentifier OIDs as SPKI,
|
|
918
|
+
// so guessAlgorithmName / guessCurveName work on private key bytes too.
|
|
919
|
+
const hex = (0, hex_js_1.encodeArrayBuffer)(keyBuffer);
|
|
920
|
+
const algorithmName = (0, pemPublicToCrypto_js_1.guessAlgorithmName)(hex); // throws on unrecognised OID
|
|
921
|
+
if (algorithmName === 'ECDH' || algorithmName === 'ECDSA') {
|
|
922
|
+
const namedCurve = (0, pemPublicToCrypto_js_1.guessCurveName)(hex);
|
|
923
|
+
const curveMap = {
|
|
924
|
+
'P-256': 'ec:secp256r1',
|
|
925
|
+
'P-384': 'ec:secp384r1',
|
|
926
|
+
'P-521': 'ec:secp521r1',
|
|
927
|
+
};
|
|
928
|
+
const mapped = curveMap[namedCurve];
|
|
929
|
+
if (!mapped)
|
|
930
|
+
throw new errors_js_1.ConfigurationError(`Unsupported EC curve in private key: ${namedCurve}`);
|
|
931
|
+
algorithm = mapped;
|
|
932
|
+
}
|
|
933
|
+
else {
|
|
934
|
+
// RSA — determine key size by importing and reading modulus length from JWK
|
|
935
|
+
const tempKey = await crypto.subtle.importKey('pkcs8', keyBuffer, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, true, ['sign']);
|
|
936
|
+
const jwk = await crypto.subtle.exportKey('jwk', tempKey);
|
|
937
|
+
if (!jwk.n) {
|
|
938
|
+
throw new errors_js_1.ConfigurationError('Invalid RSA private key: missing modulus');
|
|
939
|
+
}
|
|
940
|
+
const modulusBits = base64urlByteLength(jwk.n) * 8;
|
|
941
|
+
if (modulusBits < declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS) {
|
|
942
|
+
throw new errors_js_1.ConfigurationError(`RSA key size ${modulusBits} bits is below the minimum of ${declarations_js_1.MIN_ASYMMETRIC_KEY_SIZE_BITS} bits`);
|
|
943
|
+
}
|
|
944
|
+
algorithm = modulusBits <= 2048 ? 'rsa:2048' : 'rsa:4096';
|
|
945
|
+
}
|
|
946
|
+
}
|
|
947
|
+
// Determine Web Crypto algorithm and usages
|
|
948
|
+
let cryptoAlgorithm;
|
|
949
|
+
let keyUsages;
|
|
950
|
+
if (algorithm.startsWith('rsa:')) {
|
|
951
|
+
if (usage === 'encrypt') {
|
|
952
|
+
cryptoAlgorithm = rsaOaepSha1();
|
|
953
|
+
keyUsages = ['decrypt'];
|
|
954
|
+
}
|
|
955
|
+
else if (usage === 'sign') {
|
|
956
|
+
cryptoAlgorithm = { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' };
|
|
957
|
+
keyUsages = ['sign'];
|
|
958
|
+
}
|
|
959
|
+
else {
|
|
960
|
+
throw new errors_js_1.ConfigurationError('RSA keys only support usage: encrypt or sign');
|
|
961
|
+
}
|
|
962
|
+
}
|
|
963
|
+
else if (algorithm.startsWith('ec:')) {
|
|
964
|
+
const curve = algorithm.split(':')[1];
|
|
965
|
+
const namedCurve = curve === 'secp256r1'
|
|
966
|
+
? 'P-256'
|
|
967
|
+
: curve === 'secp384r1'
|
|
968
|
+
? 'P-384'
|
|
969
|
+
: curve === 'secp521r1'
|
|
970
|
+
? 'P-521'
|
|
971
|
+
: (() => {
|
|
972
|
+
throw new errors_js_1.ConfigurationError(`Unsupported EC curve: ${curve}`);
|
|
973
|
+
})();
|
|
974
|
+
if (usage === 'derive') {
|
|
975
|
+
cryptoAlgorithm = { name: 'ECDH', namedCurve };
|
|
976
|
+
keyUsages = ['deriveBits'];
|
|
977
|
+
}
|
|
978
|
+
else if (usage === 'sign') {
|
|
979
|
+
cryptoAlgorithm = { name: 'ECDSA', namedCurve };
|
|
980
|
+
keyUsages = ['sign'];
|
|
981
|
+
}
|
|
982
|
+
else {
|
|
983
|
+
throw new errors_js_1.ConfigurationError('EC keys only support usage: derive or sign');
|
|
984
|
+
}
|
|
985
|
+
}
|
|
986
|
+
else {
|
|
987
|
+
throw new errors_js_1.ConfigurationError(`Unsupported algorithm: ${algorithm}`);
|
|
988
|
+
}
|
|
989
|
+
// Import as CryptoKey
|
|
990
|
+
const cryptoKey = await crypto.subtle.importKey('pkcs8', keyBuffer, cryptoAlgorithm, extractable, keyUsages);
|
|
991
|
+
return wrapPrivateKey(cryptoKey, algorithm);
|
|
992
|
+
}
|
|
993
|
+
// ============================================================
|
|
994
|
+
// Key Export Functions (Opaque → PEM/JWK)
|
|
995
|
+
// ============================================================
|
|
996
|
+
/**
|
|
997
|
+
* Export an opaque public key to PEM format.
|
|
998
|
+
*/
|
|
999
|
+
async function exportPublicKeyPem(key) {
|
|
1000
|
+
const cryptoKey = unwrapKey(key);
|
|
1001
|
+
const keyBuffer = await crypto.subtle.exportKey('spki', cryptoKey);
|
|
1002
|
+
return (0, crypto_utils_js_1.formatAsPem)(keyBuffer, 'PUBLIC KEY');
|
|
1003
|
+
}
|
|
1004
|
+
/**
|
|
1005
|
+
* Export an opaque private key to PEM format.
|
|
1006
|
+
* ONLY USE FOR TESTING/DEVELOPMENT. Private keys should NOT be exportable in secure environments.
|
|
1007
|
+
*/
|
|
1008
|
+
async function exportPrivateKeyPem(key) {
|
|
1009
|
+
const cryptoKey = unwrapKey(key);
|
|
1010
|
+
const keyBuffer = await crypto.subtle.exportKey('pkcs8', cryptoKey);
|
|
1011
|
+
return (0, crypto_utils_js_1.formatAsPem)(keyBuffer, 'PRIVATE KEY');
|
|
1012
|
+
}
|
|
1013
|
+
/**
|
|
1014
|
+
* Export an opaque public key to JWK format.
|
|
1015
|
+
*/
|
|
1016
|
+
async function exportPublicKeyJwk(key) {
|
|
1017
|
+
const cryptoKey = unwrapKey(key);
|
|
1018
|
+
return await crypto.subtle.exportKey('jwk', cryptoKey);
|
|
1019
|
+
}
|
|
1020
|
+
/**
|
|
1021
|
+
* Import raw key bytes as an opaque symmetric key.
|
|
1022
|
+
* Used for external keys (e.g., unwrapped from KAS).
|
|
1023
|
+
*/
|
|
1024
|
+
async function importSymmetricKey(keyBytes) {
|
|
1025
|
+
return wrapSymmetricKey(keyBytes);
|
|
1026
|
+
}
|
|
1027
|
+
/**
|
|
1028
|
+
* Split a symmetric key into N shares using XOR secret sharing.
|
|
1029
|
+
* Key bytes are extracted internally for splitting.
|
|
1030
|
+
* HSM implementations cannot extract bytes and should throw ConfigurationError.
|
|
1031
|
+
*/
|
|
1032
|
+
async function splitSymmetricKey(key, numShares) {
|
|
1033
|
+
const keyBytes = unwrapSymmetricKey(key);
|
|
1034
|
+
const splits = await (0, keysplit_js_1.keySplit)(keyBytes, numShares, exports.DefaultCryptoService);
|
|
1035
|
+
return splits.map(wrapSymmetricKey);
|
|
1036
|
+
}
|
|
1037
|
+
/**
|
|
1038
|
+
* Merge symmetric key shares back into the original key using XOR.
|
|
1039
|
+
* Key bytes are extracted internally for merging.
|
|
1040
|
+
*/
|
|
1041
|
+
async function mergeSymmetricKeys(shares) {
|
|
1042
|
+
const splitBytes = shares.map(unwrapSymmetricKey);
|
|
1043
|
+
const merged = (0, keysplit_js_1.keyMerge)(splitBytes);
|
|
1044
|
+
return wrapSymmetricKey(merged);
|
|
1045
|
+
}
|
|
299
1046
|
exports.DefaultCryptoService = {
|
|
300
1047
|
name: exports.name,
|
|
301
1048
|
method: exports.method,
|
|
302
|
-
cryptoToPemPair,
|
|
303
1049
|
decrypt,
|
|
304
1050
|
decryptWithPrivateKey,
|
|
1051
|
+
deriveKeyFromECDH,
|
|
1052
|
+
digest,
|
|
305
1053
|
encrypt,
|
|
306
1054
|
encryptWithPublicKey,
|
|
307
|
-
|
|
1055
|
+
exportPublicKeyJwk,
|
|
1056
|
+
exportPrivateKeyPem,
|
|
1057
|
+
exportPublicKeyPem,
|
|
1058
|
+
extractPublicKeyPem,
|
|
1059
|
+
generateECKeyPair,
|
|
308
1060
|
generateKey,
|
|
309
1061
|
generateKeyPair,
|
|
310
1062
|
generateSigningKeyPair,
|
|
311
|
-
|
|
1063
|
+
importPrivateKey,
|
|
1064
|
+
importPublicKey,
|
|
1065
|
+
importSymmetricKey,
|
|
1066
|
+
jwkToPublicKeyPem,
|
|
1067
|
+
mergeSymmetricKeys,
|
|
1068
|
+
parsePublicKeyPem,
|
|
312
1069
|
randomBytes,
|
|
313
|
-
|
|
1070
|
+
hmac,
|
|
1071
|
+
verifyHmac,
|
|
1072
|
+
sign,
|
|
1073
|
+
splitSymmetricKey,
|
|
1074
|
+
verify,
|
|
314
1075
|
};
|
|
315
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../tdf3/src/crypto/index.ts"],"names":[],"mappings":";AAAA;;;;GAIG;;;AA4BH,kCAcC;AAED,wCAcC;AAMD,kCAEC;AAOD,0CAGC;AAMD,wDAWC;AAED,0CAeC;AAQD,oDAmBC;AAKD,oEAEC;AAED,kCAIC;AAYD,4CAKC;AAQD,sDAqBC;AAUD,0BAQC;AASD,0BAOC;AAmGD,wBAIC;AAQD,oBAeC;AAOD,wBASC;AAlXD,kDAAiD;AACjD,4CAAsC;AACtC,uDAM2B;AAC3B,sDAA0E;AAC1E,uDAAqE;AACrE,0DAA+E;AAC/E,gEAAqF;AAGrF,4CAA4C;AAC5C,MAAM,OAAO,GAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AACtC,QAAA,WAAW,GAAG,OAAO,UAAU,EAAE,MAAM,KAAK,WAAW,CAAC;AAExD,QAAA,MAAM,GAAG,6CAA6C,CAAC;AACvD,QAAA,IAAI,GAAG,4BAA4B,CAAC;AAEjD;;;GAGG;AACH,SAAgB,WAAW,CACzB,gBAAwB,8CAA4B;IAEpD,IAAI,CAAC,aAAa,IAAI,aAAa,GAAG,8CAA4B,EAAE,CAAC;QACnE,MAAM,IAAI,8BAAkB,CAAC,4BAA4B,CAAC,CAAC;IAC7D,CAAC;IACD,OAAO;QACL,IAAI,EAAE,UAAU;QAChB,IAAI,EAAE;YACJ,IAAI,EAAE,OAAO;SACd;QACD,aAAa;QACb,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,EAAE,iCAAiC;KACtF,CAAC;AACJ,CAAC;AAED,SAAgB,cAAc,CAC5B,gBAAwB,8CAA4B;IAEpD,IAAI,CAAC,aAAa,IAAI,aAAa,GAAG,8CAA4B,EAAE,CAAC;QACnE,MAAM,IAAI,8BAAkB,CAAC,4BAA4B,CAAC,CAAC;IAC7D,CAAC;IACD,OAAO;QACL,IAAI,EAAE,mBAAmB;QACzB,IAAI,EAAE;YACJ,IAAI,EAAE,SAAS;SAChB;QACD,aAAa;QACb,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,EAAE,iCAAiC;KACtF,CAAC;AACJ,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,WAAW,CAAC,MAAe;IAC/C,OAAO,gBAAgB,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;AACxC,CAAC;AAED;;;;GAIG;AACI,KAAK,UAAU,eAAe,CAAC,IAAa;IACjD,MAAM,aAAa,GAAG,WAAW,CAAC,IAAI,IAAI,8CAA4B,CAAC,CAAC;IACxE,OAAO,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,aAAa,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;AACjE,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,sBAAsB;IAC1C,OAAO,MAAM,CAAC,MAAM,CAAC,WAAW,CAC9B;QACE,IAAI,EAAE,mBAAmB;QACzB,IAAI,EAAE,SAAS;QACf,aAAa,EAAE,IAAI;QACnB,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;KACnD,EACD,IAAI,EACJ,CAAC,MAAM,EAAE,QAAQ,CAAC,CACnB,CAAC;AACJ,CAAC;AAEM,KAAK,UAAU,eAAe,CAAC,SAAkB;IACtD,MAAM,IAAI,GAAG,SAA0B,CAAC;IACxC,IAAI,CAAC,IAAI,CAAC,UAAU,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;QACxC,gEAAgE;QAChE,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;IAC5C,CAAC;IAED,MAAM,CAAC,QAAQ,EAAE,SAAS,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;QAC9C,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,CAAC,SAAS,CAAC;QAC/C,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC;KAClD,CAAC,CAAC;IACH,OAAO;QACL,SAAS,EAAE,IAAA,6BAAW,EAAC,QAAQ,EAAE,YAAY,CAAC;QAC9C,UAAU,EAAE,IAAA,6BAAW,EAAC,SAAS,EAAE,aAAa,CAAC;KAClD,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,oBAAoB,CAAC,OAAe,EAAE,SAAiB;IAC3E,OAAO,CAAC,MAAM,CAAC,OAAO,OAAO,KAAK,QAAQ,CAAC,CAAC;IAC5C,OAAO,CAAC,MAAM,CAAC,OAAO,SAAS,KAAK,QAAQ,CAAC,CAAC;IAE9C,MAAM,aAAa,GAAG,WAAW,EAAE,CAAC;IAEpC,wDAAwD;IACxD,SAAS,GAAG,IAAA,qCAAmB,EAAC,SAAS,CAAC,CAAC;IAE3C,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,SAAS,CAAC,CAAC;IAC1C,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,EAAE,aAAa,EAAE,KAAK,EAAE;QACvF,SAAS;KACV,CAAC,CAAC;IACH,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CACxC,EAAE,IAAI,EAAE,UAAU,EAAE,EACpB,SAAS,EACT,OAAO,CAAC,aAAa,EAAE,CACxB,CAAC;IACF,OAAO,kBAAM,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;AACxC,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,4BAA4B,CAAC,MAAe;IAChE,OAAO,gBAAgB,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;AACxC,CAAC;AAEM,KAAK,UAAU,WAAW,CAAC,UAAkB;IAClD,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;IACrC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAC1B,OAAO,CAAC,CAAC;AACX,CAAC;AAED;;;;;;;;;GASG;AACI,KAAK,UAAU,gBAAgB,CAAC,MAAc;IACnD,qDAAqD;IACrD,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC;IACjC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAC1B,OAAO,IAAA,0BAAS,EAAC,CAAC,CAAC,MAAM,CAAC,CAAC;AAC7B,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,qBAAqB,CACzC,gBAAwB,EACxB,UAAkB;IAElB,OAAO,CAAC,MAAM,CAAC,OAAO,gBAAgB,KAAK,QAAQ,EAAE,iCAAiC,CAAC,CAAC;IACxF,OAAO,CAAC,MAAM,CAAC,OAAO,UAAU,KAAK,QAAQ,EAAE,2BAA2B,CAAC,CAAC;IAE5E,MAAM,aAAa,GAAG,WAAW,EAAE,CAAC;IAEpC,wDAAwD;IACxD,MAAM,aAAa,GAAG,IAAA,qCAAmB,EAAC,UAAU,CAAC,CAAC;IACtD,MAAM,OAAO,GAAG,IAAA,6BAAY,EAAC,aAAa,CAAC,CAAC;IAE5C,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,OAAO,EAAE,aAAa,EAAE,KAAK,EAAE,CAAC,SAAS,CAAC,CAAC,CAAC;IAC/F,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CACzC,EAAE,IAAI,EAAE,UAAU,EAAE,EACpB,GAAG,EACH,gBAAgB,CAAC,aAAa,EAAE,CACjC,CAAC;IACF,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAC;IAC3C,OAAO,kBAAM,CAAC,eAAe,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACnD,CAAC;AAED;;;;;;;GAOG;AACH,SAAgB,OAAO,CACrB,OAAe,EACf,GAAW,EACX,EAAU,EACV,SAAwB,EACxB,OAAgB;IAEhB,OAAO,UAAU,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO,CAAC,CAAC;AAC1D,CAAC;AAED;;;;;;GAMG;AACH,SAAgB,OAAO,CACrB,OAAe,EACf,GAAW,EACX,EAAU,EACV,SAAwB;IAExB,OAAO,UAAU,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,SAAS,CAAC,CAAC;AACjD,CAAC;AAED,KAAK,UAAU,UAAU,CACvB,OAAe,EACf,GAAW,EACX,EAAU,EACV,SAAwB;IAExB,OAAO,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,CAAC;IAChC,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC;IAC5B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IAE3B,MAAM,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;IAC9C,MAAM,aAAa,GAAG,yBAAyB,CAAC,EAAE,EAAE,SAAS,CAAC,CAAC;IAE/D,MAAM,WAAW,GAAG,MAAM,UAAU,CAAC,GAAG,EAAE,aAAa,CAAC,CAAC;IACzD,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,aAAa,EAAE,WAAW,EAAE,aAAa,CAAC,CAAC;IACzF,IAAI,aAAa,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACrC,OAAO;YACL,OAAO,EAAE,kBAAM,CAAC,eAAe,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YACxD,OAAO,EAAE,kBAAM,CAAC,eAAe,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;SACtD,CAAC;IACJ,CAAC;IACD,OAAO;QACL,OAAO,EAAE,kBAAM,CAAC,eAAe,CAAC,SAAS,CAAC;KAC3C,CAAC;AACJ,CAAC;AAED,KAAK,UAAU,UAAU,CACvB,OAAe,EACf,GAAW,EACX,EAAU,EACV,SAAwB,EACxB,OAAgB;IAEhB,OAAO,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,CAAC;IAChC,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC;IAC5B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IAE3B,IAAI,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;IAE5C,wDAAwD;IACxD,IAAI,OAAO,EAAE,CAAC;QACZ,MAAM,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;QAC9C,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,aAAa,CAAC,UAAU,GAAG,aAAa,CAAC,UAAU,CAAC,CAAC;QACvF,UAAU,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAC;QACjD,UAAU,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;QACxE,aAAa,GAAG,UAAU,CAAC,MAAM,CAAC;IACpC,CAAC;IAED,MAAM,aAAa,GAAG,yBAAyB,CAAC,EAAE,EAAE,SAAS,CAAC,CAAC;IAE/D,MAAM,WAAW,GAAG,MAAM,UAAU,CAAC,GAAG,EAAE,aAAa,CAAC,CAAC;IACzD,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,aAAa,EAAE,CAAC;IAEtC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM;SAClC,OAAO,CAAC,aAAa,EAAE,WAAW,EAAE,aAAa,CAAC;QACnD,sEAAsE;SACrE,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;QACb,IAAI,GAAG,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;YAClC,MAAM,IAAI,wBAAY,CAAC,GAAG,CAAC,CAAC;QAC9B,CAAC;QAED,MAAM,GAAG,CAAC;IACZ,CAAC,CAAC,CAAC;IACL,OAAO,EAAE,OAAO,EAAE,kBAAM,CAAC,eAAe,CAAC,SAAS,CAAC,EAAE,CAAC;AACxD,CAAC;AAED,SAAS,UAAU,CAAC,GAAW,EAAE,SAAsC;IACrE,OAAO,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,aAAa,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;AACvF,CAAC;AAED;;;;;GAKG;AACH,SAAS,yBAAyB,CAChC,EAAU,EACV,SAAwB;IAExB,IAAI,eAAe,GAAG,SAAS,CAAC;IAChC,IAAI,SAAS,KAAK,qBAAU,CAAC,WAAW,EAAE,CAAC;QACzC,eAAe,GAAG,SAAS,CAAC;IAC9B,CAAC;IAED,OAAO;QACL,IAAI,EAAE,eAAe;QACrB,EAAE,EAAE,EAAE,CAAC,aAAa,EAAE;KACvB,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,MAAM,CAAC,OAAe;IAC1C,MAAM,MAAM,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;IACjD,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;IACjE,OAAO,IAAA,0BAAS,EAAC,UAAU,CAAC,CAAC;AAC/B,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,IAAI,CAAC,GAAW,EAAE,OAAe;IACrD,MAAM,aAAa,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;IACxD,MAAM,SAAS,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;IAC9B,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,KAAK,EACL,SAAS,EACT;QACE,IAAI,EAAE,MAAM;QACZ,IAAI,EAAE,EAAE,IAAI,EAAE,SAAS,EAAE;KAC1B,EACD,IAAI,EACJ,CAAC,MAAM,EAAE,QAAQ,CAAC,CACnB,CAAC;IACF,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,SAAS,EAAE,aAAa,CAAC,CAAC;IAC9E,OAAO,IAAA,0BAAS,EAAC,UAAU,CAAC,CAAC;AAC/B,CAAC;AAED;;;;GAIG;AACH,SAAgB,MAAM,CAAC,GAAW;IAChC,MAAM,MAAM,GAAG,IAAI,WAAW,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;IAC/C,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC;IAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;QACvC,UAAU,CAAC,CAAC,GAAG,CAAC,CAAC,GAAG,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,MAAM,CAAC;AAChB,CAAC;AAEY,QAAA,oBAAoB,GAAkB;IACjD,IAAI,EAAJ,YAAI;IACJ,MAAM,EAAN,cAAM;IACN,eAAe;IACf,OAAO;IACP,qBAAqB;IACrB,OAAO;IACP,oBAAoB;IACpB,4BAA4B;IAC5B,WAAW;IACX,eAAe;IACf,sBAAsB;IACtB,IAAI;IACJ,WAAW;IACX,MAAM;CACP,CAAC"}
|
|
1076
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../tdf3/src/crypto/index.ts"],"names":[],"mappings":";AAAA;;;;GAIG;;;AA8CH,kCAcC;AAED,wCAcC;AAOD,kCAGC;AA2FD,0CAqBC;AAMD,wDASC;AASD,oDAkBC;AAED,kCAIC;AAYD,4CAKC;AAQD,sDAcC;AAUD,0BAQC;AASD,0BAOC;AAsHD,wBASC;AA4KD,oBAeC;AAKD,wBAgBC;AAKD,wBASC;AASD,kDAwBC;AAqBD,8CA4BC;AAqCD,8CAmDC;AAKD,oBAaC;AAKD,gCAcC;AA2BD,8CAmDC;AAKD,8CAqBC;AAMD,8CAoCC;AASD,0CA8DC;AAKD,4CAqGC;AASD,gDAIC;AAMD,kDAIC;AAKD,gDAGC;AAMD,gDAEC;AAOD,8CAOC;AAMD,gDAIC;AA3uCD,kDAAiD;AACjD,4CAAsC;AACtC,uDAgB2B;AAC3B,sDAA0E;AAC1E,uDAAqE;AACrE,0DAA+E;AAC/E,gEAAqF;AAErF,+BAA8C;AAC9C,mFAIkD;AAClD,sDAA0D;AAE1D,4CAA4C;AAC5C,MAAM,eAAe,GAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC3D,MAAM,mBAAmB,GAAe,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;AAC9C,QAAA,WAAW,GAAG,OAAO,UAAU,EAAE,MAAM,KAAK,WAAW,CAAC;AAExD,QAAA,MAAM,GAAG,6CAA6C,CAAC;AACvD,QAAA,IAAI,GAAG,4BAA4B,CAAC;AAEjD;;;GAGG;AACH,SAAgB,WAAW,CACzB,gBAAwB,8CAA4B;IAEpD,IAAI,CAAC,aAAa,IAAI,aAAa,GAAG,8CAA4B,EAAE,CAAC;QACnE,MAAM,IAAI,8BAAkB,CAAC,4BAA4B,CAAC,CAAC;IAC7D,CAAC;IACD,OAAO;QACL,IAAI,EAAE,UAAU;QAChB,IAAI,EAAE;YACJ,IAAI,EAAE,OAAO;SACd;QACD,aAAa;QACb,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,EAAE,iCAAiC;KACtF,CAAC;AACJ,CAAC;AAED,SAAgB,cAAc,CAC5B,gBAAwB,8CAA4B;IAEpD,IAAI,CAAC,aAAa,IAAI,aAAa,GAAG,8CAA4B,EAAE,CAAC;QACnE,MAAM,IAAI,8BAAkB,CAAC,4BAA4B,CAAC,CAAC;IAC7D,CAAC;IACD,OAAO;QACL,IAAI,EAAE,mBAAmB;QACzB,IAAI,EAAE;YACJ,IAAI,EAAE,SAAS;SAChB;QACD,aAAa;QACb,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,EAAE,iCAAiC;KACtF,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACI,KAAK,UAAU,WAAW,CAAC,MAAe;IAC/C,MAAM,QAAQ,GAAG,MAAM,WAAW,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;IACjD,OAAO,gBAAgB,CAAC,QAAQ,CAAC,CAAC;AACpC,CAAC;AAED,+DAA+D;AAC/D,yCAAyC;AACzC,+DAA+D;AAE/D;;;GAGG;AACH,SAAS,aAAa,CAAC,GAAc,EAAE,SAAuB;IAC5D,MAAM,MAAM,GAAQ;QAClB,MAAM,EAAE,WAAW;QACnB,SAAS;QACT,SAAS,EAAE,GAAG;KACf,CAAC;IACF,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,MAAM,CAAC,WAAW,GAAG,QAAQ,CAAC,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAC7D,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,SAAS,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAC1C,MAAM,CAAC,KAAK;YACV,SAAS,KAAK,WAAW;gBACvB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,SAAS,KAAK,WAAW;oBACzB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,SAAS,KAAK,WAAW;wBACzB,CAAC,CAAC,OAAO;wBACT,CAAC,CAAC,SAAS,CAAC;IACtB,CAAC;IACD,OAAO,MAAmB,CAAC;AAC7B,CAAC;AAED;;;GAGG;AACH,SAAS,cAAc,CAAC,GAAc,EAAE,SAAuB;IAC7D,MAAM,MAAM,GAAQ;QAClB,MAAM,EAAE,YAAY;QACpB,SAAS;QACT,SAAS,EAAE,GAAG;KACf,CAAC;IACF,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,MAAM,CAAC,WAAW,GAAG,QAAQ,CAAC,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAC7D,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,SAAS,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAC1C,MAAM,CAAC,KAAK;YACV,SAAS,KAAK,WAAW;gBACvB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,SAAS,KAAK,WAAW;oBACzB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,SAAS,KAAK,WAAW;wBACzB,CAAC,CAAC,OAAO;wBACT,CAAC,CAAC,SAAS,CAAC;IACtB,CAAC;IACD,OAAO,MAAoB,CAAC;AAC9B,CAAC;AAED;;;GAGG;AACH,SAAS,SAAS,CAAC,GAA2B;IAC5C,OAAQ,GAAW,CAAC,SAAS,CAAC;AAChC,CAAC;AAED;;;GAGG;AACH,SAAS,gBAAgB,CAAC,QAAoB;IAC5C,OAAO;QACL,MAAM,EAAE,cAAc;QACtB,MAAM,EAAE,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE,OAAO;QACpC,SAAS,EAAE,QAAQ;KACJ,CAAC;AACpB,CAAC;AAED;;;GAGG;AACH,SAAS,kBAAkB,CAAC,GAAiB;IAC3C,OAAQ,GAAW,CAAC,SAAS,CAAC;AAChC,CAAC;AAED;;;;GAIG;AACI,KAAK,UAAU,eAAe,CAAC,IAAa;IACjD,MAAM,OAAO,GAAG,IAAI,IAAI,8CAA4B,CAAC;IACrD,MAAM,aAAa,GAAG,WAAW,CAAC,OAAO,CAAC,CAAC;IAC3C,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,aAAa,EAAE,IAAI,EAAE,eAAe,CAAC,CAAC;IAEtF,mCAAmC;IACnC,IAAI,SAAuB,CAAC;IAC5B,IAAI,OAAO,KAAK,IAAI,EAAE,CAAC;QACrB,SAAS,GAAG,UAAU,CAAC;IACzB,CAAC;SAAM,IAAI,OAAO,KAAK,IAAI,EAAE,CAAC;QAC5B,SAAS,GAAG,UAAU,CAAC;IACzB,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,8BAAkB,CAC1B,6BAA6B,OAAO,qCAAqC,CAC1E,CAAC;IACJ,CAAC;IAED,OAAO;QACL,SAAS,EAAE,aAAa,CAAC,OAAO,CAAC,SAAS,EAAE,SAAS,CAAC;QACtD,UAAU,EAAE,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,SAAS,CAAC;KAC1D,CAAC;AACJ,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,sBAAsB;IAC1C,MAAM,SAAS,GAAG,cAAc,CAAC,IAAI,CAAC,CAAC;IACvC,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,EAAE,mBAAmB,CAAC,CAAC;IAEtF,MAAM,SAAS,GAAiB,UAAU,CAAC;IAC3C,OAAO;QACL,SAAS,EAAE,aAAa,CAAC,OAAO,CAAC,SAAS,EAAE,SAAS,CAAC;QACtD,UAAU,EAAE,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,SAAS,CAAC;KAC1D,CAAC;AACJ,CAAC;AAED;;;;;;GAMG;AACI,KAAK,UAAU,oBAAoB,CACxC,OAA8B,EAC9B,SAAoB;IAEpB,IAAI,aAA2B,CAAC;IAEhC,iCAAiC;IACjC,IAAI,QAAQ,IAAI,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,cAAc,EAAE,CAAC;QAC7D,6FAA6F;QAC7F,aAAa,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;IAC9C,CAAC;SAAM,CAAC;QACN,iBAAiB;QACjB,aAAa,GAAI,OAAkB,CAAC,aAAa,EAAE,CAAC;IACtD,CAAC;IAED,MAAM,SAAS,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;IACvC,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,EAAE,IAAI,EAAE,UAAU,EAAE,EAAE,SAAS,EAAE,aAAa,CAAC,CAAC;IAC3F,OAAO,kBAAM,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;AACxC,CAAC;AAEM,KAAK,UAAU,WAAW,CAAC,UAAkB;IAClD,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;IACrC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAC1B,OAAO,CAAC,CAAC;AACX,CAAC;AAED;;;;;;;;;GASG;AACI,KAAK,UAAU,gBAAgB,CAAC,MAAc;IACnD,qDAAqD;IACrD,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC;IACjC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAC1B,OAAO,IAAA,0BAAS,EAAC,CAAC,CAAC,MAAM,CAAC,CAAC;AAC7B,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,qBAAqB,CACzC,gBAAwB,EACxB,UAAsB;IAEtB,OAAO,CAAC,MAAM,CAAC,OAAO,gBAAgB,KAAK,QAAQ,EAAE,iCAAiC,CAAC,CAAC;IAExF,MAAM,SAAS,GAAG,SAAS,CAAC,UAAU,CAAC,CAAC;IACxC,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CACzC,EAAE,IAAI,EAAE,UAAU,EAAE,EACpB,SAAS,EACT,gBAAgB,CAAC,aAAa,EAAE,CACjC,CAAC;IACF,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAC;IAC3C,OAAO,kBAAM,CAAC,eAAe,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACnD,CAAC;AAED;;;;;;;GAOG;AACH,SAAgB,OAAO,CACrB,OAAe,EACf,GAAiB,EACjB,EAAU,EACV,SAAwB,EACxB,OAAgB;IAEhB,OAAO,UAAU,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO,CAAC,CAAC;AAC1D,CAAC;AAED;;;;;;GAMG;AACH,SAAgB,OAAO,CACrB,OAA8B,EAC9B,GAAiB,EACjB,EAAU,EACV,SAAwB;IAExB,OAAO,UAAU,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,SAAS,CAAC,CAAC;AACjD,CAAC;AAED,KAAK,UAAU,UAAU,CACvB,OAA8B,EAC9B,GAAiB,EACjB,EAAU,EACV,SAAwB;IAExB,OAAO,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,CAAC;IAChC,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC;IAC5B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IAE3B,+CAA+C;IAC/C,IAAI,aAA2B,CAAC;IAChC,IAAI,QAAQ,IAAI,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,cAAc,EAAE,CAAC;QAC7D,6FAA6F;QAC7F,aAAa,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;IAC9C,CAAC;SAAM,CAAC;QACN,iBAAiB;QACjB,aAAa,GAAI,OAAkB,CAAC,aAAa,EAAE,CAAC;IACtD,CAAC;IAED,MAAM,aAAa,GAAG,yBAAyB,CAAC,EAAE,EAAE,SAAS,CAAC,CAAC;IAE/D,wCAAwC;IACxC,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,WAAW,GAAG,MAAM,UAAU,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;IAC9D,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,aAAa,EAAE,WAAW,EAAE,aAAa,CAAC,CAAC;IACzF,IAAI,aAAa,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACrC,OAAO;YACL,OAAO,EAAE,kBAAM,CAAC,eAAe,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YACxD,OAAO,EAAE,kBAAM,CAAC,eAAe,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;SACtD,CAAC;IACJ,CAAC;IACD,OAAO;QACL,OAAO,EAAE,kBAAM,CAAC,eAAe,CAAC,SAAS,CAAC;KAC3C,CAAC;AACJ,CAAC;AAED,KAAK,UAAU,UAAU,CACvB,OAAe,EACf,GAAiB,EACjB,EAAU,EACV,SAAwB,EACxB,OAAgB;IAEhB,OAAO,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,CAAC;IAChC,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC;IAC5B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IAE3B,IAAI,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;IAE5C,wDAAwD;IACxD,IAAI,OAAO,EAAE,CAAC;QACZ,MAAM,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;QAC9C,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,aAAa,CAAC,UAAU,GAAG,aAAa,CAAC,UAAU,CAAC,CAAC;QACvF,UAAU,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAC;QACjD,UAAU,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;QACxE,aAAa,GAAG,UAAU,CAAC,MAAM,CAAC;IACpC,CAAC;IAED,MAAM,aAAa,GAAG,yBAAyB,CAAC,EAAE,EAAE,SAAS,CAAC,CAAC;IAE/D,wCAAwC;IACxC,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,WAAW,GAAG,MAAM,UAAU,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;IAC9D,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,aAAa,EAAE,CAAC;IAEtC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM;SAClC,OAAO,CAAC,aAAa,EAAE,WAAW,EAAE,aAAa,CAAC;QACnD,sEAAsE;SACrE,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;QACb,IAAI,GAAG,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;YAClC,MAAM,IAAI,wBAAY,CAAC,GAAG,CAAC,CAAC;QAC9B,CAAC;QAED,MAAM,GAAG,CAAC;IACZ,CAAC,CAAC,CAAC;IACL,OAAO,EAAE,OAAO,EAAE,kBAAM,CAAC,eAAe,CAAC,SAAS,CAAC,EAAE,CAAC;AACxD,CAAC;AAED,SAAS,UAAU,CAAC,QAAoB,EAAE,SAAsC;IAC9E,OAAO,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,QAAQ,EAAE,SAAS,EAAE,IAAI,EAAE,eAAe,CAAC,CAAC;AACpF,CAAC;AAED;;;;;GAKG;AACH,SAAS,yBAAyB,CAChC,EAAU,EACV,SAAwB;IAExB,IAAI,eAAe,GAAG,SAAS,CAAC;IAChC,IAAI,SAAS,KAAK,qBAAU,CAAC,WAAW,EAAE,CAAC;QACzC,eAAe,GAAG,SAAS,CAAC;IAC9B,CAAC;IAED,OAAO;QACL,IAAI,EAAE,eAAe;QACrB,EAAE,EAAE,EAAE,CAAC,aAAa,EAAE;KACvB,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AAEH;;;;GAIG;AACH,SAAgB,MAAM,CAAC,GAAW;IAChC,MAAM,MAAM,GAAG,IAAI,WAAW,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;IAC/C,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC;IAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;QACvC,UAAU,CAAC,CAAC,GAAG,CAAC,CAAC,GAAG,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;GAEG;AACH,SAAS,yBAAyB,CAAC,SAAqC;IAItE,QAAQ,SAAS,EAAE,CAAC;QAClB,KAAK,OAAO;YACV,OAAO;gBACL,YAAY,EAAE,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE;gBAC5D,UAAU,EAAE,mBAAmB;aAChC,CAAC;QACJ,KAAK,OAAO;YACV,OAAO;gBACL,YAAY,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE;gBACpD,UAAU,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,IAAI,EAAE,SAAS,EAAiB;aAC9D,CAAC;QACJ,KAAK,OAAO;YACV,OAAO;gBACL,YAAY,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE;gBACpD,UAAU,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,IAAI,EAAE,SAAS,EAAiB;aAC9D,CAAC;QACJ,KAAK,OAAO;YACV,OAAO;gBACL,YAAY,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE;gBACpD,UAAU,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,IAAI,EAAE,SAAS,EAAiB;aAC9D,CAAC;QACJ;YACE,MAAM,IAAI,8BAAkB,CAAC,kCAAkC,SAAS,EAAE,CAAC,CAAC;IAChF,CAAC;AACH,CAAC;AAED;;;GAGG;AACH,SAAS,cAAc,CAAC,SAAqB,EAAE,SAAqC;IAClF,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;QAC1B,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,sDAAsD;IACtD,MAAM,OAAO,GAAG,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC;IACrC,MAAM,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC;IACtC,MAAM,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;IAEnC,2DAA2D;IAC3D,MAAM,gBAAgB,GAAG,CAAC,GAAe,EAAc,EAAE;QACvD,IAAI,CAAC,GAAG,CAAC,CAAC;QACV,OAAO,CAAC,GAAG,GAAG,CAAC,MAAM,GAAG,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC,KAAK,CAAC;YAAE,CAAC,EAAE,CAAC;QAC/C,OAAO,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACtB,CAAC,CAAC;IAEF,IAAI,QAAQ,GAAG,gBAAgB,CAAC,CAAC,CAAC,CAAC;IACnC,IAAI,QAAQ,GAAG,gBAAgB,CAAC,CAAC,CAAC,CAAC;IAEnC,gEAAgE;IAChE,IAAI,QAAQ,CAAC,CAAC,CAAC,GAAG,IAAI,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;QACnD,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;QACxB,QAAQ,GAAG,MAAM,CAAC;IACpB,CAAC;IACD,IAAI,QAAQ,CAAC,CAAC,CAAC,GAAG,IAAI,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;QACnD,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;QACxB,QAAQ,GAAG,MAAM,CAAC;IACpB,CAAC;IAED,sDAAsD;IACtD,iCAAiC;IACjC,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,QAAQ,CAAC,MAAM,EAAE,GAAG,QAAQ,CAAC,CAAC,CAAC;IAClE,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,QAAQ,CAAC,MAAM,EAAE,GAAG,QAAQ,CAAC,CAAC,CAAC;IAElE,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC;IACzC,qEAAqE;IACrE,kEAAkE;IAClE,MAAM,QAAQ,GAAG,MAAM,GAAG,GAAG,CAAC,CAAC,CAAC,IAAI,UAAU,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;IAC1F,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,CAAC,GAAG,QAAQ,CAAC,MAAM,GAAG,MAAM,CAAC,CAAC;IAC5D,MAAM,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC;IACjB,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;IACxB,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,CAAC,CAAC;IACtC,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;IAEpD,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;;GAGG;AACH,SAAS,cAAc,CAAC,SAAqB,EAAE,SAAqC;IAClF,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;QAC1B,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,6DAA6D;IAC7D,IAAI,YAAoB,CAAC;IACzB,QAAQ,SAAS,EAAE,CAAC;QAClB,KAAK,OAAO;YACV,YAAY,GAAG,EAAE,CAAC;YAClB,MAAM;QACR,KAAK,OAAO;YACV,YAAY,GAAG,EAAE,CAAC;YAClB,MAAM;QACR,KAAK,OAAO;YACV,YAAY,GAAG,EAAE,CAAC;YAClB,MAAM;QACR;YACE,MAAM,IAAI,8BAAkB,CAAC,6CAA6C,SAAS,EAAE,CAAC,CAAC;IAC3F,CAAC;IAED,+CAA+C;IAC/C,IAAI,SAAS,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;QAC1B,MAAM,IAAI,8BAAkB,CAAC,0CAA0C,CAAC,CAAC;IAC3E,CAAC;IAED,kEAAkE;IAClE,IAAI,MAAM,GAAG,CAAC,CAAC;IACf,IAAI,SAAS,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,CAAC;QAC7B,6DAA6D;QAC7D,MAAM,aAAa,GAAG,SAAS,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC;QAC/C,IAAI,aAAa,KAAK,CAAC,IAAI,aAAa,GAAG,CAAC,EAAE,CAAC;YAC7C,MAAM,IAAI,8BAAkB,CAAC,iDAAiD,CAAC,CAAC;QAClF,CAAC;QACD,MAAM,IAAI,CAAC,GAAG,aAAa,CAAC;QAC5B,IAAI,MAAM,GAAG,SAAS,CAAC,MAAM,EAAE,CAAC;YAC9B,MAAM,IAAI,8BAAkB,CAAC,6DAA6D,CAAC,CAAC;QAC9F,CAAC;IACH,CAAC;SAAM,CAAC;QACN,kCAAkC;QAClC,MAAM,IAAI,CAAC,CAAC;IACd,CAAC;IAED,kBAAkB;IAClB,IAAI,SAAS,CAAC,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC;QAC/B,MAAM,IAAI,8BAAkB,CAAC,+CAA+C,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;IACnC,MAAM,IAAI,CAAC,CAAC;IACZ,IAAI,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC,CAAC;IAC/C,MAAM,IAAI,IAAI,CAAC;IAEf,kBAAkB;IAClB,IAAI,SAAS,CAAC,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC;QAC/B,MAAM,IAAI,8BAAkB,CAAC,+CAA+C,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;IACnC,MAAM,IAAI,CAAC,CAAC;IACZ,IAAI,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC,CAAC;IAE/C,yCAAyC;IACzC,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,MAAM,GAAG,YAAY,EAAE,CAAC;QAC1C,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACjB,CAAC;IACD,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,MAAM,GAAG,YAAY,EAAE,CAAC;QAC1C,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACjB,CAAC;IAED,0BAA0B;IAC1B,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,YAAY,GAAG,CAAC,CAAC,CAAC;IAChD,MAAM,CAAC,GAAG,CAAC,CAAC,EAAE,YAAY,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC;IACvC,MAAM,CAAC,GAAG,CAAC,CAAC,EAAE,YAAY,GAAG,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC;IAE3C,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,IAAI,CACxB,IAAgB,EAChB,UAAsB,EACtB,SAAqC;IAErC,MAAM,EAAE,UAAU,EAAE,GAAG,yBAAyB,CAAC,SAAS,CAAC,CAAC;IAE5D,gCAAgC;IAChC,MAAM,GAAG,GAAG,SAAS,CAAC,UAAU,CAAC,CAAC;IAElC,gBAAgB;IAChB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC;IAElE,mDAAmD;IACnD,OAAO,cAAc,CAAC,IAAI,UAAU,CAAC,SAAS,CAAC,EAAE,SAAS,CAAC,CAAC;AAC9D,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,MAAM,CAC1B,IAAgB,EAChB,SAAqB,EACrB,SAAoB,EACpB,SAAqC;IAErC,MAAM,EAAE,UAAU,EAAE,GAAG,yBAAyB,CAAC,SAAS,CAAC,CAAC;IAE5D,gCAAgC;IAChC,MAAM,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;IAEjC,mDAAmD;IACnD,MAAM,aAAa,GAAG,cAAc,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IAE3D,uBAAuB;IACvB,OAAO,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,EAAE,aAAa,EAAE,IAAI,CAAC,CAAC;AACpE,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,MAAM,CAAC,SAAwB,EAAE,IAAgB;IACrE,gDAAgD;IAChD,MAAM,eAAe,GAAoB,CAAC,SAAS,EAAE,SAAS,EAAE,SAAS,CAAC,CAAC;IAC3E,IAAI,CAAC,eAAe,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;QACzC,MAAM,IAAI,8BAAkB,CAAC,+BAA+B,SAAS,EAAE,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;IAC/D,OAAO,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;AACpC,CAAC;AAED;;;;;;GAMG;AACI,KAAK,UAAU,mBAAmB,CACvC,SAAiB,EACjB,YAAqB;IAErB,gDAAgD;IAChD,IAAI,SAAS,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;QACtD,IAAI,GAAG,GAAG,YAAY,CAAC;QACvB,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,8CAA8C;YAC9C,MAAM,QAAQ,GAAG,SAAS,CAAC,OAAO,CAAC,uCAAuC,EAAE,EAAE,CAAC,CAAC;YAChF,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,QAAQ,CAAC,CAAC;YACzC,MAAM,GAAG,GAAG,IAAA,0BAAS,EAAC,SAAS,CAAC,CAAC;YACjC,GAAG,GAAG,IAAA,+BAAQ,EAAC,GAAG,CAAC,CAAC;QACtB,CAAC;QACD,MAAM,IAAI,GAAG,MAAM,IAAA,iBAAU,EAAC,SAAS,EAAE,GAAG,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC;QACrE,OAAO,IAAA,iBAAU,EAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED,iDAAiD;IACjD,IAAI,SAAS,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;QACrD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,MAAM,IAAI,8BAAkB,CAAC,uDAAuD,CAAC,CAAC;AACxF,CAAC;AAED;;GAEG;AACH,SAAS,iBAAiB,CAAC,KAAc;IACvC,QAAQ,KAAK,EAAE,CAAC;QACd,KAAK,OAAO;YACV,OAAO,OAAO,CAAC;QACjB,KAAK,OAAO;YACV,OAAO,OAAO,CAAC;QACjB,KAAK,OAAO;YACV,OAAO,OAAO,CAAC;QACjB;YACE,MAAM,IAAI,8BAAkB,CAAC,sBAAsB,KAAK,EAAE,CAAC,CAAC;IAChE,CAAC;AACH,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,iBAAiB,CAAC,QAAiB,OAAO;IAC9D,MAAM,UAAU,GAAG,iBAAiB,CAAC,KAAK,CAAC,CAAC;IAE5C,2CAA2C;IAC3C,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,EAAE,IAAI,EAAE;QAClF,YAAY;KACb,CAAC,CAAC;IAEH,mCAAmC;IACnC,IAAI,SAAuB,CAAC;IAC5B,QAAQ,UAAU,EAAE,CAAC;QACnB,KAAK,OAAO;YACV,SAAS,GAAG,cAAc,CAAC;YAC3B,MAAM;QACR,KAAK,OAAO;YACV,SAAS,GAAG,cAAc,CAAC;YAC3B,MAAM;QACR,KAAK,OAAO;YACV,SAAS,GAAG,cAAc,CAAC;YAC3B,MAAM;QACR;YACE,MAAM,IAAI,8BAAkB,CAAC,sBAAsB,UAAU,EAAE,CAAC,CAAC;IACrE,CAAC;IAED,OAAO;QACL,SAAS,EAAE,aAAa,CAAC,OAAO,CAAC,SAAS,EAAE,SAAS,CAAC;QACtD,UAAU,EAAE,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,SAAS,CAAC;KAC1D,CAAC;AACJ,CAAC;AAED;;GAEG;AACH,MAAM,mBAAmB,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAU,CAAC;AAGjE;;;GAGG;AACH,SAAS,mBAAmB,CAAC,SAAiB;IAC5C,kDAAkD;IAClD,MAAM,OAAO,GAAG,CAAC,CAAC,GAAG,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,MAAM,MAAM,GAAG,SAAS,GAAG,GAAG,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;IAC/C,OAAO,IAAA,6BAAY,EAAC,MAAM,CAAC,CAAC,UAAU,CAAC;AACzC,CAAC;AAED;;;GAGG;AACH,SAAS,2BAA2B,CAAC,OAAoB;IACvD,iCAAiC;IACjC,MAAM,MAAM,GAAG,IAAA,0BAAS,EAAC,OAAO,CAAC,CAAC;IAElC,iEAAiE;IACjE,MAAM,SAAS,GAAG,IAAA,qCAAc,EAAC,MAAM,CAAC,CAAC;IAEzC,OAAO,SAA6B,CAAC;AACvC,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,iBAAiB,CACrC,UAAsB,EACtB,SAAoB,EACpB,UAAsB;IAEtB,iCAAiC;IACjC,MAAM,gBAAgB,GAAG,SAAS,CAAC,UAAU,CAAC,CAAC;IAC/C,MAAM,eAAe,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;IAE7C,8BAA8B;IAC9B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC;IAC9B,IAAI,CAAC,KAAK,EAAE,CAAC;QACX,MAAM,IAAI,8BAAkB,CAAC,kCAAkC,CAAC,CAAC;IACnE,CAAC;IAED,gCAAgC;IAChC,MAAM,SAAS,GAA4B;QACzC,OAAO,EAAE,GAAG;QACZ,OAAO,EAAE,GAAG;QACZ,OAAO,EAAE,GAAG,EAAE,oCAAoC;KACnD,CAAC;IACF,MAAM,IAAI,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC;IAE9B,oCAAoC;IACpC,MAAM,YAAY,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,UAAU,CACjD,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,EAAE,eAAe,EAAE,EACzC,gBAAgB,EAChB,IAAI,CACL,CAAC;IAEF,4CAA4C;IAC5C,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,YAAY,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC,WAAW,CAAC,CAAC,CAAC;IAEjG,kCAAkC;IAClC,MAAM,SAAS,GAAG,UAAU,CAAC,SAAS,IAAI,GAAG,CAAC;IAC9C,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC9C;QACE,IAAI,EAAE,MAAM;QACZ,IAAI,EAAE,UAAU,CAAC,IAAI;QACrB,IAAI,EAAE,UAAU,CAAC,IAAI;QACrB,IAAI,EAAE,UAAU,CAAC,IAAI,IAAI,IAAI,UAAU,CAAC,CAAC,CAAC;KAC3C,EACD,OAAO,EACP,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,EACtC,IAAI,EACJ,CAAC,SAAS,EAAE,SAAS,CAAC,CACvB,CAAC;IAEF,+DAA+D;IAC/D,MAAM,QAAQ,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,UAAU,CAAC,CAAC;IAClE,OAAO,gBAAgB,CAAC,IAAI,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC;AACpD,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,IAAI,CAAC,IAAgB,EAAE,GAAiB;IAC5D,wCAAwC;IACxC,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,KAAK,EACL,QAAQ,EACR,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,EACjC,KAAK,EACL,CAAC,MAAM,CAAC,CACT,CAAC;IAEF,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC;IACpE,OAAO,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC;AACnC,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,UAAU,CAC9B,IAAgB,EAChB,SAAqB,EACrB,GAAiB;IAEjB,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,KAAK,EACL,QAAQ,EACR,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,EACjC,KAAK,EACL,CAAC,QAAQ,CAAC,CACX,CAAC;IACF,OAAO,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,MAAM,EAAE,SAAS,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC;AAClE,CAAC;AAED;;;GAGG;AACH,KAAK,UAAU,0BAA0B,CAAC,OAAoB;IAC5D,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,OAAO,EACP,EAAE,IAAI,EAAE,UAAU,EAAE,IAAI,EAAE,SAAS,EAAE,EACrC,IAAI,EAAE,cAAc;IACpB,CAAC,SAAS,CAAC,CACZ,CAAC;IACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IACtD,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,8BAAkB,CAAC,kCAAkC,CAAC,CAAC;IACnE,CAAC;IACD,uCAAuC;IACvC,iDAAiD;IACjD,OAAO,mBAAmB,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;AACxC,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,iBAAiB,CAAC,GAAW;IACjD,iDAAiD;IACjD,IAAI,YAAY,GAAG,GAAG,CAAC;IACvB,IAAI,GAAG,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;QAChD,YAAY,GAAG,MAAM,mBAAmB,CAAC,GAAG,CAAC,CAAC;IAChD,CAAC;IAED,IAAI,CAAC,YAAY,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;QACzD,MAAM,IAAI,8BAAkB,CAAC,uDAAuD,CAAC,CAAC;IACxF,CAAC;IAED,MAAM,OAAO,GAAG,IAAA,6BAAY,EAAC,IAAA,qCAAmB,EAAC,YAAY,CAAC,CAAC,CAAC;IAEhE,qDAAqD;IACrD,IAAI,CAAC;QACH,MAAM,WAAW,GAAG,MAAM,0BAA0B,CAAC,OAAO,CAAC,CAAC;QAC9D,IAAI,SAAqC,CAAC;QAC1C,IAAI,WAAW,GAAG,8CAA4B,EAAE,CAAC;YAC/C,MAAM,IAAI,8BAAkB,CAC1B,gBAAgB,WAAW,iCAAiC,8CAA4B,OAAO,CAChG,CAAC;QACJ,CAAC;aAAM,IAAI,WAAW,IAAI,IAAI,EAAE,CAAC;YAC/B,SAAS,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,IAAI,WAAW,IAAI,IAAI,EAAE,CAAC;YAC/B,SAAS,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,6BAA6B,WAAW,OAAO,CAAC,CAAC;QAChF,CAAC;QACD,OAAO,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,CAAC;IAC1C,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,8CAA8C;QAC9C,IAAI,CAAC,YAAY,8BAAkB,EAAE,CAAC;YACpC,MAAM,CAAC,CAAC;QACV,CAAC;QACD,8BAA8B;IAChC,CAAC;IAED,gCAAgC;IAChC,IAAI,CAAC;QACH,MAAM,aAAa,GAAG,2BAA2B,CAAC,OAAO,CAAC,CAAC;QAC3D,MAAM,QAAQ,GAAG;YACf,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,cAAc;SACf,CAAC;QACX,OAAO,EAAE,SAAS,EAAE,QAAQ,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,YAAY,EAAE,CAAC;IACnE,CAAC;IAAC,MAAM,CAAC;QACP,qBAAqB;IACvB,CAAC;IAED,MAAM,IAAI,8BAAkB,CAAC,iEAAiE,CAAC,CAAC;AAClG,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,iBAAiB,CAAC,GAAe;IACrD,IAAI,GAAc,CAAC;IAEnB,IAAI,GAAG,CAAC,GAAG,KAAK,KAAK,EAAE,CAAC;QACtB,UAAU;QACV,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,UAAU,EAAE,IAAI,EAAE,SAAS,EAAE,EAAE,IAAI,EAAE;YAC3F,SAAS;SACV,CAAC,CAAC;IACL,CAAC;SAAM,IAAI,GAAG,CAAC,GAAG,KAAK,IAAI,EAAE,CAAC;QAC5B,SAAS;QACT,MAAM,GAAG,GAAG,GAAG,CAAC,GAAG,CAAC;QACpB,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACvD,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,GAAG,EAAE,CAAC,CAAC;QAC/D,CAAC;QACD,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC;IAC/F,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,8BAAkB,CAAC,6BAA6B,GAAG,CAAC,GAAG,EAAE,CAAC,CAAC;IACvE,CAAC;IAED,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IAC9D,OAAO,IAAA,6BAAW,EAAC,UAAU,EAAE,YAAY,CAAC,CAAC;AAC/C,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,iBAAiB,CAAC,YAAoB;IAC1D,MAAM,aAAa,GAAG,IAAA,qCAAmB,EAAC,YAAY,CAAC,CAAC;IACxD,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,aAAa,CAAC,CAAC;IAC9C,MAAM,GAAG,GAAG,IAAA,0BAAS,EAAC,SAAS,CAAC,CAAC;IAEjC,4BAA4B;IAC5B,MAAM,aAAa,GAAG,IAAA,yCAAkB,EAAC,GAAG,CAAC,CAAC;IAE9C,IAAI,aAAa,KAAK,MAAM,IAAI,aAAa,KAAK,OAAO,EAAE,CAAC;QAC1D,iCAAiC;QACjC,MAAM,UAAU,GAAG,IAAA,qCAAc,EAAC,GAAG,CAAC,CAAC;QACvC,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,SAAS,EACT,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,EAC7B,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;QACtD,oCAAoC;QACpC,MAAM,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,GAAG,CAAC;QAC/B,OAAO,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC;IAC5B,CAAC;SAAM,CAAC;QACN,UAAU;QACV,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,SAAS,EACT,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,EAC9C,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;QACtD,oCAAoC;QACpC,MAAM,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,GAAG,CAAC;QAC1B,OAAO,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC;IACvB,CAAC;AACH,CAAC;AAED,+DAA+D;AAC/D,sCAAsC;AACtC,+DAA+D;AAE/D;;GAEG;AACI,KAAK,UAAU,eAAe,CAAC,GAAW,EAAE,OAAmB;IACpE,MAAM,EAAE,KAAK,GAAG,SAAS,EAAE,WAAW,GAAG,IAAI,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAEzE,4EAA4E;IAC5E,MAAM,OAAO,GAAG,MAAM,iBAAiB,CAAC,GAAG,CAAC,CAAC;IAC7C,MAAM,SAAS,GAAG,aAAa,IAAI,OAAO,CAAC,SAAS,CAAC;IAErD,sFAAsF;IACtF,wFAAwF;IACxF,MAAM,OAAO,GAAG,IAAA,qCAAmB,EAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IACjD,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,OAAO,CAAC,CAAC;IAExC,wEAAwE;IACxE,IAAI,eAA0D,CAAC;IAC/D,IAAI,SAAqB,CAAC;IAE1B,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,eAAe,GAAG,WAAW,EAAE,CAAC;YAChC,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC1B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACjE,SAAS,GAAG,CAAC,QAAQ,CAAC,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GACd,KAAK,KAAK,WAAW;YACnB,CAAC,CAAC,OAAO;YACT,CAAC,CAAC,KAAK,KAAK,WAAW;gBACrB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,KAAK,KAAK,WAAW;oBACrB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,CAAC,GAAG,EAAE;wBACJ,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBACjE,CAAC,CAAC,EAAE,CAAC;QAEf,IAAI,KAAK,KAAK,QAAQ,EAAE,CAAC;YACvB,eAAe,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;YAC/C,SAAS,GAAG,EAAE,CAAC;QACjB,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC;YAChD,SAAS,GAAG,CAAC,QAAQ,CAAC,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,4CAA4C,CAAC,CAAC;QAC7E,CAAC;IACH,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;IACtE,CAAC;IAED,sBAAsB;IACtB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,MAAM,EACN,SAAS,EACT,eAAe,EACf,WAAW,EACX,SAAS,CACV,CAAC;IAEF,OAAO,aAAa,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC7C,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,gBAAgB,CAAC,GAAW,EAAE,OAAmB;IACrE,MAAM,EAAE,KAAK,GAAG,SAAS,EAAE,WAAW,GAAG,IAAI,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAEzE,wEAAwE;IACxE,8EAA8E;IAC9E,IAAI,SAAuB,CAAC;IAE5B,MAAM,OAAO,GAAG,IAAA,qCAAmB,EAAC,GAAG,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,IAAA,6BAAY,EAAC,OAAO,CAAC,CAAC;IAExC,IAAI,aAAa,EAAE,CAAC;QAClB,SAAS,GAAG,aAAa,CAAC;IAC5B,CAAC;SAAM,CAAC;QACN,0EAA0E;QAC1E,wEAAwE;QACxE,MAAM,GAAG,GAAG,IAAA,0BAAS,EAAC,SAAS,CAAC,CAAC;QACjC,MAAM,aAAa,GAAG,IAAA,yCAAkB,EAAC,GAAG,CAAC,CAAC,CAAC,6BAA6B;QAC5E,IAAI,aAAa,KAAK,MAAM,IAAI,aAAa,KAAK,OAAO,EAAE,CAAC;YAC1D,MAAM,UAAU,GAAG,IAAA,qCAAc,EAAC,GAAG,CAAC,CAAC;YACvC,MAAM,QAAQ,GAAiC;gBAC7C,OAAO,EAAE,cAAc;gBACvB,OAAO,EAAE,cAAc;gBACvB,OAAO,EAAE,cAAc;aACxB,CAAC;YACF,MAAM,MAAM,GAAG,QAAQ,CAAC,UAAU,CAAC,CAAC;YACpC,IAAI,CAAC,MAAM;gBACT,MAAM,IAAI,8BAAkB,CAAC,wCAAwC,UAAU,EAAE,CAAC,CAAC;YACrF,SAAS,GAAG,MAAM,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,4EAA4E;YAC5E,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC3C,OAAO,EACP,SAAS,EACT,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,EAC9C,IAAI,EACJ,CAAC,MAAM,CAAC,CACT,CAAC;YACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;YAC1D,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,8BAAkB,CAAC,0CAA0C,CAAC,CAAC;YAC3E,CAAC;YACD,MAAM,WAAW,GAAG,mBAAmB,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;YACnD,IAAI,WAAW,GAAG,8CAA4B,EAAE,CAAC;gBAC/C,MAAM,IAAI,8BAAkB,CAC1B,gBAAgB,WAAW,iCAAiC,8CAA4B,OAAO,CAChG,CAAC;YACJ,CAAC;YACD,SAAS,GAAG,WAAW,IAAI,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,UAAU,CAAC;QAC5D,CAAC;IACH,CAAC;IAED,4CAA4C;IAC5C,IAAI,eAA0D,CAAC;IAC/D,IAAI,SAAqB,CAAC;IAE1B,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,eAAe,GAAG,WAAW,EAAE,CAAC;YAChC,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC1B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACjE,SAAS,GAAG,CAAC,MAAM,CAAC,CAAC;QACvB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GACd,KAAK,KAAK,WAAW;YACnB,CAAC,CAAC,OAAO;YACT,CAAC,CAAC,KAAK,KAAK,WAAW;gBACrB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,KAAK,KAAK,WAAW;oBACrB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,CAAC,GAAG,EAAE;wBACJ,MAAM,IAAI,8BAAkB,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBACjE,CAAC,CAAC,EAAE,CAAC;QAEf,IAAI,KAAK,KAAK,QAAQ,EAAE,CAAC;YACvB,eAAe,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;YAC/C,SAAS,GAAG,CAAC,YAAY,CAAC,CAAC;QAC7B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC;YAChD,SAAS,GAAG,CAAC,MAAM,CAAC,CAAC;QACvB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,8BAAkB,CAAC,4CAA4C,CAAC,CAAC;QAC7E,CAAC;IACH,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,8BAAkB,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;IACtE,CAAC;IAED,sBAAsB;IACtB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,OAAO,EACP,SAAS,EACT,eAAe,EACf,WAAW,EACX,SAAS,CACV,CAAC;IAEF,OAAO,cAAc,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC9C,CAAC;AAED,+DAA+D;AAC/D,0CAA0C;AAC1C,+DAA+D;AAE/D;;GAEG;AACI,KAAK,UAAU,kBAAkB,CAAC,GAAc;IACrD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;IACnE,OAAO,IAAA,6BAAW,EAAC,SAAS,EAAE,YAAY,CAAC,CAAC;AAC9C,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,mBAAmB,CAAC,GAAe;IACvD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;IACpE,OAAO,IAAA,6BAAW,EAAC,SAAS,EAAE,aAAa,CAAC,CAAC;AAC/C,CAAC;AAED;;GAEG;AACI,KAAK,UAAU,kBAAkB,CAAC,GAAc;IACrD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,OAAO,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;AACzD,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,kBAAkB,CAAC,QAAoB;IAC3D,OAAO,gBAAgB,CAAC,QAAQ,CAAC,CAAC;AACpC,CAAC;AAED;;;;GAIG;AACI,KAAK,UAAU,iBAAiB,CACrC,GAAiB,EACjB,SAAiB;IAEjB,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,MAAM,GAAG,MAAM,IAAA,sBAAQ,EAAC,QAAQ,EAAE,SAAS,EAAE,4BAAoB,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;AACtC,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,kBAAkB,CAAC,MAAsB;IAC7D,MAAM,UAAU,GAAG,MAAM,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAClD,MAAM,MAAM,GAAG,IAAA,sBAAQ,EAAC,UAAU,CAAC,CAAC;IACpC,OAAO,gBAAgB,CAAC,MAAM,CAAC,CAAC;AAClC,CAAC;AAEY,QAAA,oBAAoB,GAAkB;IACjD,IAAI,EAAJ,YAAI;IACJ,MAAM,EAAN,cAAM;IACN,OAAO;IACP,qBAAqB;IACrB,iBAAiB;IACjB,MAAM;IACN,OAAO;IACP,oBAAoB;IACpB,kBAAkB;IAClB,mBAAmB;IACnB,kBAAkB;IAClB,mBAAmB;IACnB,iBAAiB;IACjB,WAAW;IACX,eAAe;IACf,sBAAsB;IACtB,gBAAgB;IAChB,eAAe;IACf,kBAAkB;IAClB,iBAAiB;IACjB,kBAAkB;IAClB,iBAAiB;IACjB,WAAW;IACX,IAAI;IACJ,UAAU;IACV,IAAI;IACJ,iBAAiB;IACjB,MAAM;CACP,CAAC"}
|