@secrecy/lib 1.6.0 → 1.6.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/BaseClient-ca94a07f.d.ts +405 -0
- package/dist/BaseClient.cjs +2 -0
- package/dist/BaseClient.cjs.map +1 -0
- package/dist/BaseClient.d.ts +16 -111
- package/dist/BaseClient.js +2 -506
- package/dist/BaseClient.js.map +1 -0
- package/dist/PopupTools.cjs +2 -0
- package/dist/PopupTools.cjs.map +1 -0
- package/dist/PopupTools.d.ts +5 -4
- package/dist/PopupTools.js +2 -195
- package/dist/PopupTools.js.map +1 -0
- package/dist/ZeusThunder.cjs +2 -0
- package/dist/ZeusThunder.cjs.map +1 -0
- package/dist/ZeusThunder.d.ts +6 -2
- package/dist/ZeusThunder.js +2 -65
- package/dist/ZeusThunder.js.map +1 -0
- package/dist/cache.cjs +2 -0
- package/dist/cache.cjs.map +1 -0
- package/dist/cache.d.ts +22 -4
- package/dist/cache.js +2 -4
- package/dist/cache.js.map +1 -0
- package/dist/client/SecrecyAppClient.cjs +2 -0
- package/dist/client/SecrecyAppClient.cjs.map +1 -0
- package/dist/client/SecrecyAppClient.d.ts +16 -17
- package/dist/client/SecrecyAppClient.js +2 -226
- package/dist/client/SecrecyAppClient.js.map +1 -0
- package/dist/client/SecrecyCloudClient.cjs +2 -0
- package/dist/client/SecrecyCloudClient.cjs.map +1 -0
- package/dist/client/SecrecyCloudClient.d.ts +16 -89
- package/dist/client/SecrecyCloudClient.js +2 -1405
- package/dist/client/SecrecyCloudClient.js.map +1 -0
- package/dist/client/SecrecyDbClient.cjs +2 -0
- package/dist/client/SecrecyDbClient.cjs.map +1 -0
- package/dist/client/SecrecyDbClient.d.ts +16 -48
- package/dist/client/SecrecyDbClient.js +2 -419
- package/dist/client/SecrecyDbClient.js.map +1 -0
- package/dist/client/SecrecyMailClient.cjs +2 -0
- package/dist/client/SecrecyMailClient.cjs.map +1 -0
- package/dist/client/SecrecyMailClient.d.ts +16 -42
- package/dist/client/SecrecyMailClient.js +2 -1022
- package/dist/client/SecrecyMailClient.js.map +1 -0
- package/dist/client/SecrecyPayClient.cjs +2 -0
- package/dist/client/SecrecyPayClient.cjs.map +1 -0
- package/dist/client/SecrecyPayClient.d.ts +16 -28
- package/dist/client/SecrecyPayClient.js +2 -68
- package/dist/client/SecrecyPayClient.js.map +1 -0
- package/dist/client/SecrecyWalletClient.cjs +2 -0
- package/dist/client/SecrecyWalletClient.cjs.map +1 -0
- package/dist/client/SecrecyWalletClient.d.ts +16 -30
- package/dist/client/SecrecyWalletClient.js +2 -73
- package/dist/client/SecrecyWalletClient.js.map +1 -0
- package/dist/client/convert/file.cjs +2 -0
- package/dist/client/convert/file.cjs.map +1 -0
- package/dist/client/convert/file.d.ts +11 -5
- package/dist/client/convert/file.js +2 -33
- package/dist/client/convert/file.js.map +1 -0
- package/dist/client/convert/mail.cjs +2 -0
- package/dist/client/convert/mail.cjs.map +1 -0
- package/dist/client/convert/mail.d.ts +13 -3
- package/dist/client/convert/mail.js +2 -42
- package/dist/client/convert/mail.js.map +1 -0
- package/dist/client/convert/node.cjs +2 -0
- package/dist/client/convert/node.cjs.map +1 -0
- package/dist/client/convert/node.d.ts +18 -9
- package/dist/client/convert/node.js +2 -87
- package/dist/client/convert/node.js.map +1 -0
- package/dist/client/helpers.cjs +2 -0
- package/dist/client/helpers.cjs.map +1 -0
- package/dist/client/helpers.d.ts +16 -28
- package/dist/client/helpers.js +2 -119
- package/dist/client/helpers.js.map +1 -0
- package/dist/client/index.cjs +2 -0
- package/dist/client/index.cjs.map +1 -0
- package/dist/client/index.d.ts +16 -34
- package/dist/client/index.js +2 -46
- package/dist/client/index.js.map +1 -0
- package/dist/client/storage.cjs +2 -0
- package/dist/client/storage.cjs.map +1 -0
- package/dist/client/storage.d.ts +6 -3
- package/dist/client/storage.js +2 -12
- package/dist/client/storage.js.map +1 -0
- package/dist/client/types/File.cjs +1 -0
- package/dist/client/types/File.cjs.map +1 -0
- package/dist/client/types/File.d.ts +9 -5
- package/dist/client/types/File.js +1 -3
- package/dist/client/types/File.js.map +1 -0
- package/dist/client/types/Inputs.cjs +1 -0
- package/dist/client/types/Inputs.cjs.map +1 -0
- package/dist/client/types/Inputs.d.ts +6 -4
- package/dist/client/types/Inputs.js +1 -3
- package/dist/client/types/Inputs.js.map +1 -0
- package/dist/client/types/Node.cjs +1 -0
- package/dist/client/types/Node.cjs.map +1 -0
- package/dist/client/types/Node.d.ts +9 -56
- package/dist/client/types/Node.js +1 -3
- package/dist/client/types/Node.js.map +1 -0
- package/dist/client/types/UserAppNotifications.cjs +1 -0
- package/dist/client/types/UserAppNotifications.cjs.map +1 -0
- package/dist/client/types/UserAppNotifications.d.ts +3 -1
- package/dist/client/types/UserAppNotifications.js +1 -3
- package/dist/client/types/UserAppNotifications.js.map +1 -0
- package/dist/client/types/UserAppSettings.cjs +1 -0
- package/dist/client/types/UserAppSettings.cjs.map +1 -0
- package/dist/client/types/UserAppSettings.d.ts +3 -1
- package/dist/client/types/UserAppSettings.js +1 -3
- package/dist/client/types/UserAppSettings.js.map +1 -0
- package/dist/client/types/index.cjs +2 -0
- package/dist/client/types/index.cjs.map +1 -0
- package/dist/client/types/index.d.ts +86 -30
- package/dist/client/types/index.js +2 -8
- package/dist/client/types/index.js.map +1 -0
- package/dist/client/types/selectors.cjs +2 -0
- package/dist/client/types/selectors.cjs.map +1 -0
- package/dist/client/types/selectors.d.ts +7 -5
- package/dist/client/types/selectors.js +2 -135
- package/dist/client/types/selectors.js.map +1 -0
- package/dist/crypto/file.cjs +2 -0
- package/dist/crypto/file.cjs.map +1 -0
- package/dist/crypto/file.d.ts +8 -6
- package/dist/crypto/file.js +2 -195
- package/dist/crypto/file.js.map +1 -0
- package/dist/crypto/index.cjs +2 -0
- package/dist/crypto/index.cjs.map +1 -0
- package/dist/crypto/index.d.ts +11 -9
- package/dist/crypto/index.js +2 -45
- package/dist/crypto/index.js.map +1 -0
- package/dist/error.cjs +1 -0
- package/dist/error.cjs.map +1 -0
- package/dist/error.d.ts +13 -11
- package/dist/error.js +1 -3
- package/dist/error.js.map +1 -0
- package/dist/index.cjs +2 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.ts +19 -14
- package/dist/index.js +2 -10
- package/dist/index.js.map +1 -0
- package/dist/minify/index.cjs +2 -0
- package/dist/minify/index.cjs.map +1 -0
- package/dist/minify/index.d.ts +4 -2
- package/dist/minify/index.js +2 -23
- package/dist/minify/index.js.map +1 -0
- package/dist/minify/lz4.cjs +3 -0
- package/dist/minify/lz4.cjs.map +1 -0
- package/dist/minify/lz4.d.ts +7 -5
- package/dist/minify/lz4.js +2 -538
- package/dist/minify/lz4.js.map +1 -0
- package/dist/sodium.cjs +2 -0
- package/dist/sodium.cjs.map +1 -0
- package/dist/sodium.d.ts +5 -3
- package/dist/sodium.js +2 -6
- package/dist/sodium.js.map +1 -0
- package/dist/utils/encoders.cjs +2 -0
- package/dist/utils/encoders.cjs.map +1 -0
- package/dist/utils/encoders.d.ts +6 -4
- package/dist/utils/encoders.js +2 -18
- package/dist/utils/encoders.js.map +1 -0
- package/dist/utils/store-buddy.cjs +2 -0
- package/dist/utils/store-buddy.cjs.map +1 -0
- package/dist/utils/store-buddy.d.ts +4 -3
- package/dist/utils/store-buddy.js +2 -58
- package/dist/utils/store-buddy.js.map +1 -0
- package/dist/utils/time.cjs +2 -0
- package/dist/utils/time.cjs.map +1 -0
- package/dist/utils/time.d.ts +4 -2
- package/dist/utils/time.js +2 -12
- package/dist/utils/time.js.map +1 -0
- package/dist/utils/utils.cjs +2 -0
- package/dist/utils/utils.cjs.map +1 -0
- package/dist/utils/utils.d.ts +6 -4
- package/dist/utils/utils.js +2 -47
- package/dist/utils/utils.js.map +1 -0
- package/dist/worker/md5.cjs +2 -0
- package/dist/worker/md5.cjs.map +1 -0
- package/dist/worker/md5.d.ts +3 -1
- package/dist/worker/md5.js +2 -24
- package/dist/worker/md5.js.map +1 -0
- package/dist/worker/sodium.cjs +2 -0
- package/dist/worker/sodium.cjs.map +1 -0
- package/dist/worker/sodium.d.ts +6 -3
- package/dist/worker/sodium.js +2 -118
- package/dist/worker/sodium.js.map +1 -0
- package/dist/worker/workerCodes.cjs +254 -0
- package/dist/worker/workerCodes.cjs.map +1 -0
- package/dist/worker/workerCodes.d.ts +4 -2
- package/dist/worker/workerCodes.js +4 -5
- package/dist/worker/workerCodes.js.map +1 -0
- package/dist/zeus/const.cjs +2 -0
- package/dist/zeus/const.cjs.map +1 -0
- package/dist/zeus/const.d.ts +5 -3
- package/dist/zeus/const.js +2 -1846
- package/dist/zeus/const.js.map +1 -0
- package/dist/zeus/index.cjs +5 -0
- package/dist/zeus/index.cjs.map +1 -0
- package/dist/zeus/index.d.ts +91 -89
- package/dist/zeus/index.js +5 -642
- package/dist/zeus/index.js.map +1 -0
- package/package.json +2 -2
package/dist/worker/sodium.js
CHANGED
|
@@ -1,118 +1,2 @@
|
|
|
1
|
-
import
|
|
2
|
-
|
|
3
|
-
// const ensureNonDetachedUniqueBuffers = (
|
|
4
|
-
// values: Transferable[]
|
|
5
|
-
// ): Set<Transferable> =>
|
|
6
|
-
// new Set(
|
|
7
|
-
// values.filter(v => {
|
|
8
|
-
// if (v instanceof ArrayBuffer) {
|
|
9
|
-
// return v.byteLength === 0;
|
|
10
|
-
// } else {
|
|
11
|
-
// return true;
|
|
12
|
-
// }
|
|
13
|
-
// })
|
|
14
|
-
// );
|
|
15
|
-
|
|
16
|
-
export async function encrypt(key, dataToEncrypt, progress, signal) {
|
|
17
|
-
return new Promise((resolve, reject) => {
|
|
18
|
-
progress?.({
|
|
19
|
-
current: 0,
|
|
20
|
-
percent: 0,
|
|
21
|
-
total: dataToEncrypt.byteLength
|
|
22
|
-
});
|
|
23
|
-
const worker = new Worker(URL.createObjectURL(new Blob([workerSodiumScript], {
|
|
24
|
-
type: "text/javascript"
|
|
25
|
-
})));
|
|
26
|
-
worker.addEventListener("error", reject);
|
|
27
|
-
worker.addEventListener("messageerror", reject);
|
|
28
|
-
worker.addEventListener("message", _ref => {
|
|
29
|
-
let {
|
|
30
|
-
data
|
|
31
|
-
} = _ref;
|
|
32
|
-
switch (data.event) {
|
|
33
|
-
case "ready":
|
|
34
|
-
{
|
|
35
|
-
const postData = {
|
|
36
|
-
event: "encrypt",
|
|
37
|
-
data: dataToEncrypt,
|
|
38
|
-
key
|
|
39
|
-
};
|
|
40
|
-
worker.postMessage(postData, [postData.data.buffer]
|
|
41
|
-
// // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.
|
|
42
|
-
// ensureNonDetachedUniqueBuffers([postData.data.buffer])
|
|
43
|
-
);
|
|
44
|
-
|
|
45
|
-
break;
|
|
46
|
-
}
|
|
47
|
-
case "encrypt-progress":
|
|
48
|
-
{
|
|
49
|
-
if (signal?.aborted) {
|
|
50
|
-
const abortError = new Error("Aborted");
|
|
51
|
-
abortError.name = "AbortError";
|
|
52
|
-
worker.terminate();
|
|
53
|
-
reject(abortError);
|
|
54
|
-
}
|
|
55
|
-
progress?.(data.data);
|
|
56
|
-
break;
|
|
57
|
-
}
|
|
58
|
-
case "encrypt-result":
|
|
59
|
-
{
|
|
60
|
-
worker.terminate();
|
|
61
|
-
return resolve(data.data);
|
|
62
|
-
}
|
|
63
|
-
}
|
|
64
|
-
});
|
|
65
|
-
});
|
|
66
|
-
}
|
|
67
|
-
export async function decrypt(key, dataToDecrypt, progress, signal) {
|
|
68
|
-
return new Promise((resolve, reject) => {
|
|
69
|
-
progress?.({
|
|
70
|
-
current: 0,
|
|
71
|
-
percent: 0,
|
|
72
|
-
total: dataToDecrypt.byteLength
|
|
73
|
-
});
|
|
74
|
-
const worker = new Worker(URL.createObjectURL(new Blob([workerSodiumScript], {
|
|
75
|
-
type: "text/javascript"
|
|
76
|
-
})));
|
|
77
|
-
worker.addEventListener("error", reject);
|
|
78
|
-
worker.addEventListener("messageerror", reject);
|
|
79
|
-
worker.addEventListener("message", _ref2 => {
|
|
80
|
-
let {
|
|
81
|
-
data
|
|
82
|
-
} = _ref2;
|
|
83
|
-
switch (data.event) {
|
|
84
|
-
case "ready":
|
|
85
|
-
{
|
|
86
|
-
const postData = {
|
|
87
|
-
event: "decrypt",
|
|
88
|
-
key,
|
|
89
|
-
data: dataToDecrypt
|
|
90
|
-
};
|
|
91
|
-
worker.postMessage(postData, [postData.data.buffer]
|
|
92
|
-
// // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.
|
|
93
|
-
// ensureNonDetachedUniqueBuffers([postData.data.buffer])
|
|
94
|
-
);
|
|
95
|
-
|
|
96
|
-
break;
|
|
97
|
-
}
|
|
98
|
-
case "decrypt-progress":
|
|
99
|
-
{
|
|
100
|
-
if (signal?.aborted) {
|
|
101
|
-
const abortError = new Error("Aborted");
|
|
102
|
-
abortError.name = "AbortError";
|
|
103
|
-
worker.terminate();
|
|
104
|
-
reject(abortError);
|
|
105
|
-
}
|
|
106
|
-
progress?.(data.data);
|
|
107
|
-
break;
|
|
108
|
-
}
|
|
109
|
-
case "decrypt-result":
|
|
110
|
-
{
|
|
111
|
-
worker.terminate();
|
|
112
|
-
return resolve(data.data);
|
|
113
|
-
}
|
|
114
|
-
}
|
|
115
|
-
});
|
|
116
|
-
});
|
|
117
|
-
}
|
|
118
|
-
//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"names":["workerSodiumScript","encrypt","key","dataToEncrypt","progress","signal","Promise","resolve","reject","current","percent","total","byteLength","worker","Worker","URL","createObjectURL","Blob","type","addEventListener","data","event","postData","postMessage","buffer","aborted","abortError","Error","name","terminate","decrypt","dataToDecrypt"],"sources":["../../src/worker/sodium.ts"],"sourcesContent":["import type { EncryptedFile, Progress } from \"../crypto/file.js\";\nimport { workerSodiumScript } from \"./workerCodes.js\";\n\n// const ensureNonDetachedUniqueBuffers = (\n//   values: Transferable[]\n// ): Set<Transferable> =>\n//   new Set(\n//     values.filter(v => {\n//       if (v instanceof ArrayBuffer) {\n//         return v.byteLength === 0;\n//       } else {\n//         return true;\n//       }\n//     })\n//   );\n\nexport async function encrypt(\n  key: Uint8Array,\n  dataToEncrypt: Uint8Array,\n  progress?: (progress: Progress) => Promise<void>,\n  signal?: AbortSignal\n): Promise<EncryptedFile> {\n  return new Promise((resolve, reject) => {\n    progress?.({\n      current: 0,\n      percent: 0,\n      total: dataToEncrypt.byteLength\n    });\n    const worker = new Worker(\n      URL.createObjectURL(\n        new Blob([workerSodiumScript], { type: \"text/javascript\" })\n      )\n    );\n    worker.addEventListener(\"error\", reject);\n    worker.addEventListener(\"messageerror\", reject);\n    worker.addEventListener(\"message\", ({ data }) => {\n      switch (data.event) {\n        case \"ready\": {\n          const postData = {\n            event: \"encrypt\",\n            data: dataToEncrypt,\n            key\n          };\n          worker.postMessage(\n            postData,\n            [postData.data.buffer]\n            // // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.\n            // ensureNonDetachedUniqueBuffers([postData.data.buffer])\n          );\n          break;\n        }\n        case \"encrypt-progress\": {\n          if (signal?.aborted) {\n            const abortError = new Error(\"Aborted\");\n            abortError.name = \"AbortError\";\n            worker.terminate();\n            reject(abortError);\n          }\n          progress?.(data.data);\n          break;\n        }\n        case \"encrypt-result\": {\n          worker.terminate();\n          return resolve(data.data);\n        }\n      }\n    });\n  });\n}\n\nexport async function decrypt(\n  key: Uint8Array,\n  dataToDecrypt: Uint8Array,\n  progress?: (progress: Progress) => Promise<void>,\n  signal?: AbortSignal\n): Promise<Uint8Array> {\n  return new Promise((resolve, reject) => {\n    progress?.({\n      current: 0,\n      percent: 0,\n      total: dataToDecrypt.byteLength\n    });\n    const worker = new Worker(\n      URL.createObjectURL(\n        new Blob([workerSodiumScript], { type: \"text/javascript\" })\n      )\n    );\n    worker.addEventListener(\"error\", reject);\n    worker.addEventListener(\"messageerror\", reject);\n\n    worker.addEventListener(\"message\", ({ data }) => {\n      switch (data.event) {\n        case \"ready\": {\n          const postData = {\n            event: \"decrypt\",\n            key,\n            data: dataToDecrypt\n          };\n          worker.postMessage(\n            postData,\n            [postData.data.buffer]\n            // // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.\n            // ensureNonDetachedUniqueBuffers([postData.data.buffer])\n          );\n          break;\n        }\n        case \"decrypt-progress\": {\n          if (signal?.aborted) {\n            const abortError = new Error(\"Aborted\");\n            abortError.name = \"AbortError\";\n            worker.terminate();\n            reject(abortError);\n          }\n          progress?.(data.data);\n          break;\n        }\n        case \"decrypt-result\": {\n          worker.terminate();\n          return resolve(data.data);\n        }\n      }\n    });\n  });\n}\n"],"mappings":"AACA,SAASA,kBAAkB,QAAQ,kBAAkB;;AAErD;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,OAAO,eAAeC,OAAO,CAC3BC,GAAe,EACfC,aAAyB,EACzBC,QAAgD,EAChDC,MAAoB,EACI;EACxB,OAAO,IAAIC,OAAO,CAAC,CAACC,OAAO,EAAEC,MAAM,KAAK;IACtCJ,QAAQ,GAAG;MACTK,OAAO,EAAE,CAAC;MACVC,OAAO,EAAE,CAAC;MACVC,KAAK,EAAER,aAAa,CAACS;IACvB,CAAC,CAAC;IACF,MAAMC,MAAM,GAAG,IAAIC,MAAM,CACvBC,GAAG,CAACC,eAAe,CACjB,IAAIC,IAAI,CAAC,CAACjB,kBAAkB,CAAC,EAAE;MAAEkB,IAAI,EAAE;IAAkB,CAAC,CAAC,CAC5D,CACF;IACDL,MAAM,CAACM,gBAAgB,CAAC,OAAO,EAAEX,MAAM,CAAC;IACxCK,MAAM,CAACM,gBAAgB,CAAC,cAAc,EAAEX,MAAM,CAAC;IAC/CK,MAAM,CAACM,gBAAgB,CAAC,SAAS,EAAE,QAAc;MAAA,IAAb;QAAEC;MAAK,CAAC;MAC1C,QAAQA,IAAI,CAACC,KAAK;QAChB,KAAK,OAAO;UAAE;YACZ,MAAMC,QAAQ,GAAG;cACfD,KAAK,EAAE,SAAS;cAChBD,IAAI,EAAEjB,aAAa;cACnBD;YACF,CAAC;YACDW,MAAM,CAACU,WAAW,CAChBD,QAAQ,EACR,CAACA,QAAQ,CAACF,IAAI,CAACI,MAAM;YACrB;YACA;YAAA,CACD;;YACD;UACF;QACA,KAAK,kBAAkB;UAAE;YACvB,IAAInB,MAAM,EAAEoB,OAAO,EAAE;cACnB,MAAMC,UAAU,GAAG,IAAIC,KAAK,CAAC,SAAS,CAAC;cACvCD,UAAU,CAACE,IAAI,GAAG,YAAY;cAC9Bf,MAAM,CAACgB,SAAS,EAAE;cAClBrB,MAAM,CAACkB,UAAU,CAAC;YACpB;YACAtB,QAAQ,GAAGgB,IAAI,CAACA,IAAI,CAAC;YACrB;UACF;QACA,KAAK,gBAAgB;UAAE;YACrBP,MAAM,CAACgB,SAAS,EAAE;YAClB,OAAOtB,OAAO,CAACa,IAAI,CAACA,IAAI,CAAC;UAC3B;MAAC;IAEL,CAAC,CAAC;EACJ,CAAC,CAAC;AACJ;AAEA,OAAO,eAAeU,OAAO,CAC3B5B,GAAe,EACf6B,aAAyB,EACzB3B,QAAgD,EAChDC,MAAoB,EACC;EACrB,OAAO,IAAIC,OAAO,CAAC,CAACC,OAAO,EAAEC,MAAM,KAAK;IACtCJ,QAAQ,GAAG;MACTK,OAAO,EAAE,CAAC;MACVC,OAAO,EAAE,CAAC;MACVC,KAAK,EAAEoB,aAAa,CAACnB;IACvB,CAAC,CAAC;IACF,MAAMC,MAAM,GAAG,IAAIC,MAAM,CACvBC,GAAG,CAACC,eAAe,CACjB,IAAIC,IAAI,CAAC,CAACjB,kBAAkB,CAAC,EAAE;MAAEkB,IAAI,EAAE;IAAkB,CAAC,CAAC,CAC5D,CACF;IACDL,MAAM,CAACM,gBAAgB,CAAC,OAAO,EAAEX,MAAM,CAAC;IACxCK,MAAM,CAACM,gBAAgB,CAAC,cAAc,EAAEX,MAAM,CAAC;IAE/CK,MAAM,CAACM,gBAAgB,CAAC,SAAS,EAAE,SAAc;MAAA,IAAb;QAAEC;MAAK,CAAC;MAC1C,QAAQA,IAAI,CAACC,KAAK;QAChB,KAAK,OAAO;UAAE;YACZ,MAAMC,QAAQ,GAAG;cACfD,KAAK,EAAE,SAAS;cAChBnB,GAAG;cACHkB,IAAI,EAAEW;YACR,CAAC;YACDlB,MAAM,CAACU,WAAW,CAChBD,QAAQ,EACR,CAACA,QAAQ,CAACF,IAAI,CAACI,MAAM;YACrB;YACA;YAAA,CACD;;YACD;UACF;QACA,KAAK,kBAAkB;UAAE;YACvB,IAAInB,MAAM,EAAEoB,OAAO,EAAE;cACnB,MAAMC,UAAU,GAAG,IAAIC,KAAK,CAAC,SAAS,CAAC;cACvCD,UAAU,CAACE,IAAI,GAAG,YAAY;cAC9Bf,MAAM,CAACgB,SAAS,EAAE;cAClBrB,MAAM,CAACkB,UAAU,CAAC;YACpB;YACAtB,QAAQ,GAAGgB,IAAI,CAACA,IAAI,CAAC;YACrB;UACF;QACA,KAAK,gBAAgB;UAAE;YACrBP,MAAM,CAACgB,SAAS,EAAE;YAClB,OAAOtB,OAAO,CAACa,IAAI,CAACA,IAAI,CAAC;UAC3B;MAAC;IAEL,CAAC,CAAC;EACJ,CAAC,CAAC;AACJ"}
|
|
1
|
+
import{workerSodiumScript as d}from"./workerCodes.js";async function y(s,o,a,i){return new Promise((c,t)=>{a?.({current:0,percent:0,total:o.byteLength});const e=new Worker(URL.createObjectURL(new Blob([d],{type:"text/javascript"})));e.addEventListener("error",t),e.addEventListener("messageerror",t),e.addEventListener("message",({data:n})=>{switch(n.event){case"ready":{const r={event:"encrypt",data:o,key:s};e.postMessage(r,[r.data.buffer]);break}case"encrypt-progress":{if(i?.aborted){const r=new Error("Aborted");r.name="AbortError",e.terminate(),t(r)}a?.(n.data);break}case"encrypt-result":return e.terminate(),c(n.data)}})})}async function b(s,o,a,i){return new Promise((c,t)=>{a?.({current:0,percent:0,total:o.byteLength});const e=new Worker(URL.createObjectURL(new Blob([d],{type:"text/javascript"})));e.addEventListener("error",t),e.addEventListener("messageerror",t),e.addEventListener("message",({data:n})=>{switch(n.event){case"ready":{const r={event:"decrypt",key:s,data:o};e.postMessage(r,[r.data.buffer]);break}case"decrypt-progress":{if(i?.aborted){const r=new Error("Aborted");r.name="AbortError",e.terminate(),t(r)}a?.(n.data);break}case"decrypt-result":return e.terminate(),c(n.data)}})})}export{b as decrypt,y as encrypt};
|
|
2
|
+
//# sourceMappingURL=sodium.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/worker/sodium.ts"],"sourcesContent":["import type { EncryptedFile, Progress } from \"../crypto/file.js\";\nimport { workerSodiumScript } from \"./workerCodes.js\";\n\n// const ensureNonDetachedUniqueBuffers = (\n// values: Transferable[]\n// ): Set<Transferable> =>\n// new Set(\n// values.filter(v => {\n// if (v instanceof ArrayBuffer) {\n// return v.byteLength === 0;\n// } else {\n// return true;\n// }\n// })\n// );\n\nexport async function encrypt(\n key: Uint8Array,\n dataToEncrypt: Uint8Array,\n progress?: (progress: Progress) => Promise<void>,\n signal?: AbortSignal\n): Promise<EncryptedFile> {\n return new Promise((resolve, reject) => {\n progress?.({\n current: 0,\n percent: 0,\n total: dataToEncrypt.byteLength\n });\n const worker = new Worker(\n URL.createObjectURL(\n new Blob([workerSodiumScript], { type: \"text/javascript\" })\n )\n );\n worker.addEventListener(\"error\", reject);\n worker.addEventListener(\"messageerror\", reject);\n worker.addEventListener(\"message\", ({ data }) => {\n switch (data.event) {\n case \"ready\": {\n const postData = {\n event: \"encrypt\",\n data: dataToEncrypt,\n key\n };\n worker.postMessage(\n postData,\n [postData.data.buffer]\n // // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.\n // ensureNonDetachedUniqueBuffers([postData.data.buffer])\n );\n break;\n }\n case \"encrypt-progress\": {\n if (signal?.aborted) {\n const abortError = new Error(\"Aborted\");\n abortError.name = \"AbortError\";\n worker.terminate();\n reject(abortError);\n }\n progress?.(data.data);\n break;\n }\n case \"encrypt-result\": {\n worker.terminate();\n return resolve(data.data);\n }\n }\n });\n });\n}\n\nexport async function decrypt(\n key: Uint8Array,\n dataToDecrypt: Uint8Array,\n progress?: (progress: Progress) => Promise<void>,\n signal?: AbortSignal\n): Promise<Uint8Array> {\n return new Promise((resolve, reject) => {\n progress?.({\n current: 0,\n percent: 0,\n total: dataToDecrypt.byteLength\n });\n const worker = new Worker(\n URL.createObjectURL(\n new Blob([workerSodiumScript], { type: \"text/javascript\" })\n )\n );\n worker.addEventListener(\"error\", reject);\n worker.addEventListener(\"messageerror\", reject);\n\n worker.addEventListener(\"message\", ({ data }) => {\n switch (data.event) {\n case \"ready\": {\n const postData = {\n event: \"decrypt\",\n key,\n data: dataToDecrypt\n };\n worker.postMessage(\n postData,\n [postData.data.buffer]\n // // @ts-expect-error - Typescript expects the transfer list to be an Array, but it can actually be any iterable.\n // ensureNonDetachedUniqueBuffers([postData.data.buffer])\n );\n break;\n }\n case \"decrypt-progress\": {\n if (signal?.aborted) {\n const abortError = new Error(\"Aborted\");\n abortError.name = \"AbortError\";\n worker.terminate();\n reject(abortError);\n }\n progress?.(data.data);\n break;\n }\n case \"decrypt-result\": {\n worker.terminate();\n return resolve(data.data);\n }\n }\n });\n });\n}\n"],"mappings":"AACA,OAAS,sBAAAA,MAA0B,mBAenC,eAAsBC,EACpBC,EACAC,EACAC,EACAC,EACwB,CACxB,OAAO,IAAI,QAAQ,CAACC,EAASC,IAAW,CACtCH,IAAW,CACT,QAAS,EACT,QAAS,EACT,MAAOD,EAAc,UACvB,CAAC,EACD,MAAMK,EAAS,IAAI,OACjB,IAAI,gBACF,IAAI,KAAK,CAACR,CAAkB,EAAG,CAAE,KAAM,iBAAkB,CAAC,CAC5D,CACF,EACAQ,EAAO,iBAAiB,QAASD,CAAM,EACvCC,EAAO,iBAAiB,eAAgBD,CAAM,EAC9CC,EAAO,iBAAiB,UAAW,CAAC,CAAE,KAAAC,CAAK,IAAM,CAC/C,OAAQA,EAAK,MAAO,CAClB,IAAK,QAAS,CACZ,MAAMC,EAAW,CACf,MAAO,UACP,KAAMP,EACN,IAAAD,CACF,EACAM,EAAO,YACLE,EACA,CAACA,EAAS,KAAK,MAAM,CAGvB,EACA,KACF,CACA,IAAK,mBAAoB,CACvB,GAAIL,GAAQ,QAAS,CACnB,MAAMM,EAAa,IAAI,MAAM,SAAS,EACtCA,EAAW,KAAO,aAClBH,EAAO,UAAU,EACjBD,EAAOI,CAAU,CACnB,CACAP,IAAWK,EAAK,IAAI,EACpB,KACF,CACA,IAAK,iBACH,OAAAD,EAAO,UAAU,EACVF,EAAQG,EAAK,IAAI,CAE5B,CACF,CAAC,CACH,CAAC,CACH,CAEA,eAAsBG,EACpBV,EACAW,EACAT,EACAC,EACqB,CACrB,OAAO,IAAI,QAAQ,CAACC,EAASC,IAAW,CACtCH,IAAW,CACT,QAAS,EACT,QAAS,EACT,MAAOS,EAAc,UACvB,CAAC,EACD,MAAML,EAAS,IAAI,OACjB,IAAI,gBACF,IAAI,KAAK,CAACR,CAAkB,EAAG,CAAE,KAAM,iBAAkB,CAAC,CAC5D,CACF,EACAQ,EAAO,iBAAiB,QAASD,CAAM,EACvCC,EAAO,iBAAiB,eAAgBD,CAAM,EAE9CC,EAAO,iBAAiB,UAAW,CAAC,CAAE,KAAAC,CAAK,IAAM,CAC/C,OAAQA,EAAK,MAAO,CAClB,IAAK,QAAS,CACZ,MAAMC,EAAW,CACf,MAAO,UACP,IAAAR,EACA,KAAMW,CACR,EACAL,EAAO,YACLE,EACA,CAACA,EAAS,KAAK,MAAM,CAGvB,EACA,KACF,CACA,IAAK,mBAAoB,CACvB,GAAIL,GAAQ,QAAS,CACnB,MAAMM,EAAa,IAAI,MAAM,SAAS,EACtCA,EAAW,KAAO,aAClBH,EAAO,UAAU,EACjBD,EAAOI,CAAU,CACnB,CACAP,IAAWK,EAAK,IAAI,EACpB,KACF,CACA,IAAK,iBACH,OAAAD,EAAO,UAAU,EACVF,EAAQG,EAAK,IAAI,CAE5B,CACF,CAAC,CACH,CAAC,CACH","names":["workerSodiumScript","encrypt","key","dataToEncrypt","progress","signal","resolve","reject","worker","data","postData","abortError","decrypt","dataToDecrypt"]}
|
|
@@ -0,0 +1,254 @@
|
|
|
1
|
+
"use strict";Object.defineProperty(exports, "__esModule", {value: true});const e=`let sodium;
|
|
2
|
+
|
|
3
|
+
self.sodium = {
|
|
4
|
+
onload: (sod) => {
|
|
5
|
+
sodium = sod
|
|
6
|
+
postMessage({ event: "ready" })
|
|
7
|
+
}
|
|
8
|
+
};
|
|
9
|
+
|
|
10
|
+
importScripts('https://cdn.jsdelivr.net/gh/jedisct1/libsodium.js@master/dist/browsers/sodium.js');
|
|
11
|
+
importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');
|
|
12
|
+
|
|
13
|
+
function* chunks(arr, n) {
|
|
14
|
+
for (let i = 0; i < arr.length; i += n) {
|
|
15
|
+
yield arr.slice(i, i + n);
|
|
16
|
+
}
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
function assert(c, message) {
|
|
20
|
+
if (!c) {
|
|
21
|
+
throw new Error(message);
|
|
22
|
+
}
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
function encrypt(key) {
|
|
26
|
+
let destroyed = false;
|
|
27
|
+
const {
|
|
28
|
+
state,
|
|
29
|
+
header
|
|
30
|
+
} = sodium.crypto_secretstream_xchacha20poly1305_init_push(key);
|
|
31
|
+
|
|
32
|
+
const encrypt = (tag, plaintext) => {
|
|
33
|
+
assert(destroyed === false, "state already destroyed");
|
|
34
|
+
|
|
35
|
+
return sodium.crypto_secretstream_xchacha20poly1305_push(
|
|
36
|
+
state,
|
|
37
|
+
plaintext,
|
|
38
|
+
null,
|
|
39
|
+
tag
|
|
40
|
+
);
|
|
41
|
+
};
|
|
42
|
+
|
|
43
|
+
function destroy() {
|
|
44
|
+
assert(destroyed === false, "state already destroyed");
|
|
45
|
+
destroyed = true;
|
|
46
|
+
}
|
|
47
|
+
|
|
48
|
+
return {
|
|
49
|
+
encrypt,
|
|
50
|
+
destroy,
|
|
51
|
+
header
|
|
52
|
+
};
|
|
53
|
+
}
|
|
54
|
+
|
|
55
|
+
function decrypt(header, key) {
|
|
56
|
+
assert(
|
|
57
|
+
header.byteLength >=
|
|
58
|
+
sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES,
|
|
59
|
+
"header must be at least HEADERBYTES (" + sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES + ") long"
|
|
60
|
+
);
|
|
61
|
+
assert(
|
|
62
|
+
key.byteLength >= sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES,
|
|
63
|
+
"key must be at least KEYBYTES (" + sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES + ") long"
|
|
64
|
+
);
|
|
65
|
+
|
|
66
|
+
let destroyed = false;
|
|
67
|
+
const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(
|
|
68
|
+
header,
|
|
69
|
+
key
|
|
70
|
+
);
|
|
71
|
+
|
|
72
|
+
const decrypt = ciphertext => {
|
|
73
|
+
assert(destroyed === false, "state already destroyed");
|
|
74
|
+
|
|
75
|
+
return sodium.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext);
|
|
76
|
+
};
|
|
77
|
+
|
|
78
|
+
function destroy() {
|
|
79
|
+
assert(destroyed === false, "state already destroyed");
|
|
80
|
+
destroyed = true;
|
|
81
|
+
}
|
|
82
|
+
|
|
83
|
+
return {
|
|
84
|
+
decrypt,
|
|
85
|
+
destroy
|
|
86
|
+
};
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
const CHUNK_SIZE = 8192;
|
|
90
|
+
|
|
91
|
+
async function encryptSecretstream(key, data, progress) {
|
|
92
|
+
const { encrypt: crypt, destroy, header } = encrypt(key);
|
|
93
|
+
const cryptedChunk =
|
|
94
|
+
CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;
|
|
95
|
+
const max =
|
|
96
|
+
Math.ceil(data.byteLength / CHUNK_SIZE) * cryptedChunk + header.byteLength;
|
|
97
|
+
|
|
98
|
+
progress?.({
|
|
99
|
+
percent: 0,
|
|
100
|
+
total: max,
|
|
101
|
+
current: 0
|
|
102
|
+
});
|
|
103
|
+
const final = new Uint8Array(max);
|
|
104
|
+
const sparkEncrypted = new SparkMD5.ArrayBuffer();
|
|
105
|
+
const spark = new SparkMD5.ArrayBuffer();
|
|
106
|
+
|
|
107
|
+
final.set(header);
|
|
108
|
+
sparkEncrypted.append(header);
|
|
109
|
+
let total = header.byteLength;
|
|
110
|
+
progress?.({
|
|
111
|
+
percent: total / max,
|
|
112
|
+
total: max,
|
|
113
|
+
current: total
|
|
114
|
+
});
|
|
115
|
+
let lastPercent = total / max;
|
|
116
|
+
|
|
117
|
+
for (const chunk of chunks(data, CHUNK_SIZE)) {
|
|
118
|
+
spark.append(chunk);
|
|
119
|
+
const tag =
|
|
120
|
+
chunk.length < CHUNK_SIZE
|
|
121
|
+
? sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL
|
|
122
|
+
: sodium.crypto_secretstream_xchacha20poly1305_TAG_MESSAGE;
|
|
123
|
+
const crypted = crypt(tag, chunk);
|
|
124
|
+
sparkEncrypted.append(crypted);
|
|
125
|
+
final.set(crypted, total);
|
|
126
|
+
total += crypted.byteLength;
|
|
127
|
+
const percent = total / max;
|
|
128
|
+
if (percent > lastPercent + 0.01) {
|
|
129
|
+
progress?.({
|
|
130
|
+
percent,
|
|
131
|
+
total: max,
|
|
132
|
+
current: total
|
|
133
|
+
});
|
|
134
|
+
lastPercent = percent;
|
|
135
|
+
}
|
|
136
|
+
}
|
|
137
|
+
|
|
138
|
+
destroy();
|
|
139
|
+
progress?.({
|
|
140
|
+
percent: 1,
|
|
141
|
+
total,
|
|
142
|
+
current: total
|
|
143
|
+
});
|
|
144
|
+
return {
|
|
145
|
+
data: final.slice(0, total),
|
|
146
|
+
md5Encrypted: sparkEncrypted.end(),
|
|
147
|
+
md5: spark.end()
|
|
148
|
+
};
|
|
149
|
+
}
|
|
150
|
+
|
|
151
|
+
async function decryptSecretstream(key, data, progress) {
|
|
152
|
+
const header = data.slice(
|
|
153
|
+
0,
|
|
154
|
+
sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES
|
|
155
|
+
);
|
|
156
|
+
data = data.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES);
|
|
157
|
+
|
|
158
|
+
const { decrypt: decryptt, destroy } = decrypt(header, key);
|
|
159
|
+
const chunkSize =
|
|
160
|
+
CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;
|
|
161
|
+
const max = Math.ceil(data.byteLength / chunkSize) * CHUNK_SIZE;
|
|
162
|
+
|
|
163
|
+
progress?.({
|
|
164
|
+
percent: 0,
|
|
165
|
+
total: max,
|
|
166
|
+
current: 0
|
|
167
|
+
});
|
|
168
|
+
const final = new Uint8Array(max);
|
|
169
|
+
let total = 0;
|
|
170
|
+
let lastPercent = total / max;
|
|
171
|
+
|
|
172
|
+
for (const chunk of chunks(data, chunkSize)) {
|
|
173
|
+
const tmp = decryptt(chunk);
|
|
174
|
+
final.set(tmp.message, total);
|
|
175
|
+
total += tmp.message.byteLength;
|
|
176
|
+
|
|
177
|
+
const percent = total / max;
|
|
178
|
+
if (percent > lastPercent + 0.01) {
|
|
179
|
+
progress?.({
|
|
180
|
+
percent,
|
|
181
|
+
total: max,
|
|
182
|
+
current: total
|
|
183
|
+
});
|
|
184
|
+
lastPercent = percent;
|
|
185
|
+
}
|
|
186
|
+
}
|
|
187
|
+
|
|
188
|
+
destroy();
|
|
189
|
+
progress?.({
|
|
190
|
+
percent: 1,
|
|
191
|
+
total,
|
|
192
|
+
current: total
|
|
193
|
+
});
|
|
194
|
+
return final.slice(0, total);
|
|
195
|
+
}
|
|
196
|
+
|
|
197
|
+
self.onmessage = async ({ data }) => {
|
|
198
|
+
switch (data.event) {
|
|
199
|
+
case "encrypt": {
|
|
200
|
+
postMessage({ event: "working" })
|
|
201
|
+
postMessage({
|
|
202
|
+
event: "encrypt-result",
|
|
203
|
+
data: await encryptSecretstream(data.key, data.data, progress => postMessage({
|
|
204
|
+
event: "encrypt-progress",
|
|
205
|
+
data: progress
|
|
206
|
+
}))
|
|
207
|
+
});
|
|
208
|
+
postMessage({ event: "ready" })
|
|
209
|
+
break;
|
|
210
|
+
}
|
|
211
|
+
case "decrypt": {
|
|
212
|
+
postMessage({ event: "working" })
|
|
213
|
+
postMessage({
|
|
214
|
+
event: "decrypt-result",
|
|
215
|
+
data: await decryptSecretstream(data.key, data.data, progress => postMessage({
|
|
216
|
+
event: "decrypt-progress",
|
|
217
|
+
data: progress
|
|
218
|
+
}))
|
|
219
|
+
});
|
|
220
|
+
postMessage({ event: "ready" })
|
|
221
|
+
break;
|
|
222
|
+
}
|
|
223
|
+
}
|
|
224
|
+
}`,t= exports.workerMd5Script =`importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');
|
|
225
|
+
|
|
226
|
+
function* chunks(arr, n) {
|
|
227
|
+
for (let i = 0; i < arr.length; i += n) {
|
|
228
|
+
yield arr.slice(i, i + n);
|
|
229
|
+
}
|
|
230
|
+
}
|
|
231
|
+
|
|
232
|
+
const CHUNK_SIZE = 8192;
|
|
233
|
+
|
|
234
|
+
function md5(data) {
|
|
235
|
+
const spark = new SparkMD5.ArrayBuffer();
|
|
236
|
+
for (const chunk of chunks(data, CHUNK_SIZE)) {
|
|
237
|
+
spark.append(chunk);
|
|
238
|
+
}
|
|
239
|
+
return spark.end();
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
|
|
243
|
+
self.onmessage = ({ data }) => {
|
|
244
|
+
switch (data.event) {
|
|
245
|
+
case "md5": {
|
|
246
|
+
postMessage({
|
|
247
|
+
event: "md5-result",
|
|
248
|
+
data: md5(data.data)
|
|
249
|
+
});
|
|
250
|
+
break;
|
|
251
|
+
}
|
|
252
|
+
}
|
|
253
|
+
}`;exports.workerMd5Script = t; exports.workerSodiumScript = e;
|
|
254
|
+
//# sourceMappingURL=workerCodes.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/worker/workerCodes.ts"],"names":["workerSodiumScript","workerMd5Script"],"mappings":"AAAO,MAAMA,EAAqB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,GAiOrBC,EAAkB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA","sourcesContent":["export const workerSodiumScript = `let sodium;\n\nself.sodium = {\n onload: (sod) => {\n sodium = sod\n postMessage({ event: \"ready\" })\n }\n};\n\nimportScripts('https://cdn.jsdelivr.net/gh/jedisct1/libsodium.js@master/dist/browsers/sodium.js');\nimportScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nfunction assert(c, message) {\n if (!c) {\n throw new Error(message);\n }\n}\n\nfunction encrypt(key) {\n let destroyed = false;\n const {\n state,\n header\n } = sodium.crypto_secretstream_xchacha20poly1305_init_push(key);\n\n const encrypt = (tag, plaintext) => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_push(\n state,\n plaintext,\n null,\n tag\n );\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n encrypt,\n destroy,\n header\n };\n}\n\nfunction decrypt(header, key) {\n assert(\n header.byteLength >=\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES,\n \"header must be at least HEADERBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES + \") long\"\n );\n assert(\n key.byteLength >= sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES,\n \"key must be at least KEYBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES + \") long\"\n );\n\n let destroyed = false;\n const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(\n header,\n key\n );\n\n const decrypt = ciphertext => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext);\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n decrypt,\n destroy\n };\n}\n\nconst CHUNK_SIZE = 8192;\n\nasync function encryptSecretstream(key, data, progress) {\n const { encrypt: crypt, destroy, header } = encrypt(key);\n const cryptedChunk =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max =\n Math.ceil(data.byteLength / CHUNK_SIZE) * cryptedChunk + header.byteLength;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n const sparkEncrypted = new SparkMD5.ArrayBuffer();\n const spark = new SparkMD5.ArrayBuffer();\n\n final.set(header);\n sparkEncrypted.append(header);\n let total = header.byteLength;\n progress?.({\n percent: total / max,\n total: max,\n current: total\n });\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n const tag =\n chunk.length < CHUNK_SIZE\n ? sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL\n : sodium.crypto_secretstream_xchacha20poly1305_TAG_MESSAGE;\n const crypted = crypt(tag, chunk);\n sparkEncrypted.append(crypted);\n final.set(crypted, total);\n total += crypted.byteLength;\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return {\n data: final.slice(0, total),\n md5Encrypted: sparkEncrypted.end(),\n md5: spark.end()\n };\n}\n\nasync function decryptSecretstream(key, data, progress) {\n const header = data.slice(\n 0,\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES\n );\n data = data.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES);\n\n const { decrypt: decryptt, destroy } = decrypt(header, key);\n const chunkSize =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max = Math.ceil(data.byteLength / chunkSize) * CHUNK_SIZE;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n let total = 0;\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, chunkSize)) {\n const tmp = decryptt(chunk);\n final.set(tmp.message, total);\n total += tmp.message.byteLength;\n\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return final.slice(0, total);\n}\n\nself.onmessage = async ({ data }) => {\n switch (data.event) {\n case \"encrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"encrypt-result\",\n data: await encryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"encrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n case \"decrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"decrypt-result\",\n data: await decryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"decrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n }\n}`;\n\nexport const workerMd5Script = `importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nconst CHUNK_SIZE = 8192;\n\nfunction md5(data) {\n const spark = new SparkMD5.ArrayBuffer();\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n }\n return spark.end();\n}\n\n\nself.onmessage = ({ data }) => {\n switch (data.event) {\n case \"md5\": {\n postMessage({\n event: \"md5-result\",\n data: md5(data.data)\n });\n break;\n }\n }\n}`;\n"]}
|
|
@@ -1,2 +1,4 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
1
|
+
declare const workerSodiumScript = "let sodium;\n\nself.sodium = {\n onload: (sod) => {\n sodium = sod\n postMessage({ event: \"ready\" })\n }\n};\n\nimportScripts('https://cdn.jsdelivr.net/gh/jedisct1/libsodium.js@master/dist/browsers/sodium.js');\nimportScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nfunction assert(c, message) {\n if (!c) {\n throw new Error(message);\n }\n}\n\nfunction encrypt(key) {\n let destroyed = false;\n const {\n state,\n header\n } = sodium.crypto_secretstream_xchacha20poly1305_init_push(key);\n\n const encrypt = (tag, plaintext) => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_push(\n state,\n plaintext,\n null,\n tag\n );\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n encrypt,\n destroy,\n header\n };\n}\n\nfunction decrypt(header, key) {\n assert(\n header.byteLength >=\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES,\n \"header must be at least HEADERBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES + \") long\"\n );\n assert(\n key.byteLength >= sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES,\n \"key must be at least KEYBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES + \") long\"\n );\n\n let destroyed = false;\n const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(\n header,\n key\n );\n\n const decrypt = ciphertext => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext);\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n decrypt,\n destroy\n };\n}\n\nconst CHUNK_SIZE = 8192;\n\nasync function encryptSecretstream(key, data, progress) {\n const { encrypt: crypt, destroy, header } = encrypt(key);\n const cryptedChunk =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max =\n Math.ceil(data.byteLength / CHUNK_SIZE) * cryptedChunk + header.byteLength;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n const sparkEncrypted = new SparkMD5.ArrayBuffer();\n const spark = new SparkMD5.ArrayBuffer();\n\n final.set(header);\n sparkEncrypted.append(header);\n let total = header.byteLength;\n progress?.({\n percent: total / max,\n total: max,\n current: total\n });\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n const tag =\n chunk.length < CHUNK_SIZE\n ? sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL\n : sodium.crypto_secretstream_xchacha20poly1305_TAG_MESSAGE;\n const crypted = crypt(tag, chunk);\n sparkEncrypted.append(crypted);\n final.set(crypted, total);\n total += crypted.byteLength;\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return {\n data: final.slice(0, total),\n md5Encrypted: sparkEncrypted.end(),\n md5: spark.end()\n };\n}\n\nasync function decryptSecretstream(key, data, progress) {\n const header = data.slice(\n 0,\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES\n );\n data = data.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES);\n\n const { decrypt: decryptt, destroy } = decrypt(header, key);\n const chunkSize =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max = Math.ceil(data.byteLength / chunkSize) * CHUNK_SIZE;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n let total = 0;\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, chunkSize)) {\n const tmp = decryptt(chunk);\n final.set(tmp.message, total);\n total += tmp.message.byteLength;\n\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return final.slice(0, total);\n}\n\nself.onmessage = async ({ data }) => {\n switch (data.event) {\n case \"encrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"encrypt-result\",\n data: await encryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"encrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n case \"decrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"decrypt-result\",\n data: await decryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"decrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n }\n}";
|
|
2
|
+
declare const workerMd5Script = "importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nconst CHUNK_SIZE = 8192;\n\nfunction md5(data) {\n const spark = new SparkMD5.ArrayBuffer();\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n }\n return spark.end();\n}\n\n\nself.onmessage = ({ data }) => {\n switch (data.event) {\n case \"md5\": {\n postMessage({\n event: \"md5-result\",\n data: md5(data.data)\n });\n break;\n }\n }\n}";
|
|
3
|
+
|
|
4
|
+
export { workerMd5Script, workerSodiumScript };
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
|
|
1
|
+
const e=`let sodium;
|
|
2
2
|
|
|
3
3
|
self.sodium = {
|
|
4
4
|
onload: (sod) => {
|
|
@@ -221,8 +221,7 @@ self.onmessage = async ({ data }) => {
|
|
|
221
221
|
break;
|
|
222
222
|
}
|
|
223
223
|
}
|
|
224
|
-
}
|
|
225
|
-
export const workerMd5Script = `importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');
|
|
224
|
+
}`,t=`importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');
|
|
226
225
|
|
|
227
226
|
function* chunks(arr, n) {
|
|
228
227
|
for (let i = 0; i < arr.length; i += n) {
|
|
@@ -251,5 +250,5 @@ self.onmessage = ({ data }) => {
|
|
|
251
250
|
break;
|
|
252
251
|
}
|
|
253
252
|
}
|
|
254
|
-
}`;
|
|
255
|
-
//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"names":["workerSodiumScript","workerMd5Script"],"sources":["../../src/worker/workerCodes.ts"],"sourcesContent":["export const workerSodiumScript = `let sodium;\n\nself.sodium = {\n  onload: (sod) => {\n    sodium = sod\n    postMessage({ event: \"ready\" })\n  }\n};\n\nimportScripts('https://cdn.jsdelivr.net/gh/jedisct1/libsodium.js@master/dist/browsers/sodium.js');\nimportScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n  for (let i = 0; i < arr.length; i += n) {\n    yield arr.slice(i, i + n);\n  }\n}\n\nfunction assert(c, message) {\n  if (!c) {\n    throw new Error(message);\n  }\n}\n\nfunction encrypt(key) {\n  let destroyed = false;\n  const {\n    state,\n    header\n  } = sodium.crypto_secretstream_xchacha20poly1305_init_push(key);\n\n  const encrypt = (tag, plaintext) => {\n    assert(destroyed === false, \"state already destroyed\");\n\n    return sodium.crypto_secretstream_xchacha20poly1305_push(\n      state,\n      plaintext,\n      null,\n      tag\n    );\n  };\n\n  function destroy() {\n    assert(destroyed === false, \"state already destroyed\");\n    destroyed = true;\n  }\n\n  return {\n    encrypt,\n    destroy,\n    header\n  };\n}\n\nfunction decrypt(header, key) {\n  assert(\n    header.byteLength >=\n      sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES,\n    \"header must be at least HEADERBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES + \") long\"\n  );\n  assert(\n    key.byteLength >= sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES,\n    \"key must be at least KEYBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES + \") long\"\n  );\n\n  let destroyed = false;\n  const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(\n    header,\n    key\n  );\n\n  const decrypt = ciphertext => {\n    assert(destroyed === false, \"state already destroyed\");\n\n    return sodium.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext);\n  };\n\n  function destroy() {\n    assert(destroyed === false, \"state already destroyed\");\n    destroyed = true;\n  }\n\n  return {\n    decrypt,\n    destroy\n  };\n}\n\nconst CHUNK_SIZE = 8192;\n\nasync function encryptSecretstream(key, data, progress) {\n  const { encrypt: crypt, destroy, header } = encrypt(key);\n  const cryptedChunk =\n    CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n  const max =\n    Math.ceil(data.byteLength / CHUNK_SIZE) * cryptedChunk + header.byteLength;\n\n  progress?.({\n    percent: 0,\n    total: max,\n    current: 0\n  });\n  const final = new Uint8Array(max);\n  const sparkEncrypted = new SparkMD5.ArrayBuffer();\n  const spark = new SparkMD5.ArrayBuffer();\n\n  final.set(header);\n  sparkEncrypted.append(header);\n  let total = header.byteLength;\n  progress?.({\n    percent: total / max,\n    total: max,\n    current: total\n  });\n  let lastPercent = total / max;\n\n  for (const chunk of chunks(data, CHUNK_SIZE)) {\n    spark.append(chunk);\n    const tag =\n      chunk.length < CHUNK_SIZE\n        ? sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL\n        : sodium.crypto_secretstream_xchacha20poly1305_TAG_MESSAGE;\n    const crypted = crypt(tag, chunk);\n    sparkEncrypted.append(crypted);\n    final.set(crypted, total);\n    total += crypted.byteLength;\n    const percent = total / max;\n    if (percent > lastPercent + 0.01) {\n      progress?.({\n        percent,\n        total: max,\n        current: total\n      });\n      lastPercent = percent;\n    }\n  }\n\n  destroy();\n  progress?.({\n    percent: 1,\n    total,\n    current: total\n  });\n  return {\n    data: final.slice(0, total),\n    md5Encrypted: sparkEncrypted.end(),\n    md5: spark.end()\n  };\n}\n\nasync function decryptSecretstream(key, data, progress) {\n  const header = data.slice(\n    0,\n    sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES\n  );\n  data = data.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES);\n\n  const { decrypt: decryptt, destroy } = decrypt(header, key);\n  const chunkSize =\n    CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n  const max = Math.ceil(data.byteLength / chunkSize) * CHUNK_SIZE;\n\n  progress?.({\n    percent: 0,\n    total: max,\n    current: 0\n  });\n  const final = new Uint8Array(max);\n  let total = 0;\n  let lastPercent = total / max;\n\n  for (const chunk of chunks(data, chunkSize)) {\n    const tmp = decryptt(chunk);\n    final.set(tmp.message, total);\n    total += tmp.message.byteLength;\n\n    const percent = total / max;\n    if (percent > lastPercent + 0.01) {\n      progress?.({\n        percent,\n        total: max,\n        current: total\n      });\n      lastPercent = percent;\n    }\n  }\n\n  destroy();\n  progress?.({\n    percent: 1,\n    total,\n    current: total\n  });\n  return final.slice(0, total);\n}\n\nself.onmessage = async ({ data }) => {\n  switch (data.event) {\n    case \"encrypt\": {\n      postMessage({ event: \"working\" })\n      postMessage({\n        event: \"encrypt-result\",\n        data: await encryptSecretstream(data.key, data.data, progress => postMessage({\n          event: \"encrypt-progress\",\n          data: progress\n        }))\n      });\n      postMessage({ event: \"ready\" })\n      break;\n    }\n    case \"decrypt\": {\n      postMessage({ event: \"working\" })\n      postMessage({\n        event: \"decrypt-result\",\n        data: await decryptSecretstream(data.key, data.data, progress => postMessage({\n          event: \"decrypt-progress\",\n          data: progress\n        }))\n      });\n      postMessage({ event: \"ready\" })\n      break;\n    }\n  }\n}`;\n\nexport const workerMd5Script = `importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n  for (let i = 0; i < arr.length; i += n) {\n    yield arr.slice(i, i + n);\n  }\n}\n\nconst CHUNK_SIZE = 8192;\n\nfunction md5(data) {\n  const spark = new SparkMD5.ArrayBuffer();\n  for (const chunk of chunks(data, CHUNK_SIZE)) {\n    spark.append(chunk);\n  }\n  return spark.end();\n}\n\n\nself.onmessage = ({ data }) => {\n  switch (data.event) {\n    case \"md5\": {\n      postMessage({\n        event: \"md5-result\",\n        data: md5(data.data)\n      });\n      break;\n    }\n  }\n}`;\n"],"mappings":"AAAA,OAAO,MAAMA,kBAAkB,GAAI;AACnC;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,EAAE;AAEF,OAAO,MAAMC,eAAe,GAAI;AAChC;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA,EAAE"}
|
|
253
|
+
}`;export{t as workerMd5Script,e as workerSodiumScript};
|
|
254
|
+
//# sourceMappingURL=workerCodes.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../src/worker/workerCodes.ts"],"sourcesContent":["export const workerSodiumScript = `let sodium;\n\nself.sodium = {\n onload: (sod) => {\n sodium = sod\n postMessage({ event: \"ready\" })\n }\n};\n\nimportScripts('https://cdn.jsdelivr.net/gh/jedisct1/libsodium.js@master/dist/browsers/sodium.js');\nimportScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nfunction assert(c, message) {\n if (!c) {\n throw new Error(message);\n }\n}\n\nfunction encrypt(key) {\n let destroyed = false;\n const {\n state,\n header\n } = sodium.crypto_secretstream_xchacha20poly1305_init_push(key);\n\n const encrypt = (tag, plaintext) => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_push(\n state,\n plaintext,\n null,\n tag\n );\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n encrypt,\n destroy,\n header\n };\n}\n\nfunction decrypt(header, key) {\n assert(\n header.byteLength >=\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES,\n \"header must be at least HEADERBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES + \") long\"\n );\n assert(\n key.byteLength >= sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES,\n \"key must be at least KEYBYTES (\" + sodium.crypto_secretstream_xchacha20poly1305_KEYBYTES + \") long\"\n );\n\n let destroyed = false;\n const state = sodium.crypto_secretstream_xchacha20poly1305_init_pull(\n header,\n key\n );\n\n const decrypt = ciphertext => {\n assert(destroyed === false, \"state already destroyed\");\n\n return sodium.crypto_secretstream_xchacha20poly1305_pull(state, ciphertext);\n };\n\n function destroy() {\n assert(destroyed === false, \"state already destroyed\");\n destroyed = true;\n }\n\n return {\n decrypt,\n destroy\n };\n}\n\nconst CHUNK_SIZE = 8192;\n\nasync function encryptSecretstream(key, data, progress) {\n const { encrypt: crypt, destroy, header } = encrypt(key);\n const cryptedChunk =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max =\n Math.ceil(data.byteLength / CHUNK_SIZE) * cryptedChunk + header.byteLength;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n const sparkEncrypted = new SparkMD5.ArrayBuffer();\n const spark = new SparkMD5.ArrayBuffer();\n\n final.set(header);\n sparkEncrypted.append(header);\n let total = header.byteLength;\n progress?.({\n percent: total / max,\n total: max,\n current: total\n });\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n const tag =\n chunk.length < CHUNK_SIZE\n ? sodium.crypto_secretstream_xchacha20poly1305_TAG_FINAL\n : sodium.crypto_secretstream_xchacha20poly1305_TAG_MESSAGE;\n const crypted = crypt(tag, chunk);\n sparkEncrypted.append(crypted);\n final.set(crypted, total);\n total += crypted.byteLength;\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return {\n data: final.slice(0, total),\n md5Encrypted: sparkEncrypted.end(),\n md5: spark.end()\n };\n}\n\nasync function decryptSecretstream(key, data, progress) {\n const header = data.slice(\n 0,\n sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES\n );\n data = data.slice(sodium.crypto_secretstream_xchacha20poly1305_HEADERBYTES);\n\n const { decrypt: decryptt, destroy } = decrypt(header, key);\n const chunkSize =\n CHUNK_SIZE + sodium.crypto_secretstream_xchacha20poly1305_ABYTES;\n const max = Math.ceil(data.byteLength / chunkSize) * CHUNK_SIZE;\n\n progress?.({\n percent: 0,\n total: max,\n current: 0\n });\n const final = new Uint8Array(max);\n let total = 0;\n let lastPercent = total / max;\n\n for (const chunk of chunks(data, chunkSize)) {\n const tmp = decryptt(chunk);\n final.set(tmp.message, total);\n total += tmp.message.byteLength;\n\n const percent = total / max;\n if (percent > lastPercent + 0.01) {\n progress?.({\n percent,\n total: max,\n current: total\n });\n lastPercent = percent;\n }\n }\n\n destroy();\n progress?.({\n percent: 1,\n total,\n current: total\n });\n return final.slice(0, total);\n}\n\nself.onmessage = async ({ data }) => {\n switch (data.event) {\n case \"encrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"encrypt-result\",\n data: await encryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"encrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n case \"decrypt\": {\n postMessage({ event: \"working\" })\n postMessage({\n event: \"decrypt-result\",\n data: await decryptSecretstream(data.key, data.data, progress => postMessage({\n event: \"decrypt-progress\",\n data: progress\n }))\n });\n postMessage({ event: \"ready\" })\n break;\n }\n }\n}`;\n\nexport const workerMd5Script = `importScripts('https://cdnjs.cloudflare.com/ajax/libs/spark-md5/3.0.0/spark-md5.min.js');\n\nfunction* chunks(arr, n) {\n for (let i = 0; i < arr.length; i += n) {\n yield arr.slice(i, i + n);\n }\n}\n\nconst CHUNK_SIZE = 8192;\n\nfunction md5(data) {\n const spark = new SparkMD5.ArrayBuffer();\n for (const chunk of chunks(data, CHUNK_SIZE)) {\n spark.append(chunk);\n }\n return spark.end();\n}\n\n\nself.onmessage = ({ data }) => {\n switch (data.event) {\n case \"md5\": {\n postMessage({\n event: \"md5-result\",\n data: md5(data.data)\n });\n break;\n }\n }\n}`;\n"],"mappings":"AAAO,MAAMA,EAAqB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,GAiOrBC,EAAkB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;","names":["workerSodiumScript","workerMd5Script"]}
|