@shapeshiftoss/hdwallet-native 1.55.2 → 1.55.4-alpha.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (162) hide show
  1. package/dist/adapter.js +22 -61
  2. package/dist/adapter.js.map +1 -1
  3. package/dist/arkeo.d.ts +1 -1
  4. package/dist/arkeo.d.ts.map +1 -1
  5. package/dist/arkeo.js +54 -124
  6. package/dist/arkeo.js.map +1 -1
  7. package/dist/binance.d.ts +1 -1
  8. package/dist/binance.d.ts.map +1 -1
  9. package/dist/binance.js +123 -195
  10. package/dist/binance.js.map +1 -1
  11. package/dist/bitcoin.d.ts +1 -2
  12. package/dist/bitcoin.d.ts.map +1 -1
  13. package/dist/bitcoin.js +219 -285
  14. package/dist/bitcoin.js.map +1 -1
  15. package/dist/cosmos.d.ts +1 -1
  16. package/dist/cosmos.d.ts.map +1 -1
  17. package/dist/cosmos.js +54 -124
  18. package/dist/cosmos.js.map +1 -1
  19. package/dist/crypto/CryptoHelper.js +106 -172
  20. package/dist/crypto/CryptoHelper.js.map +1 -1
  21. package/dist/crypto/EncryptedWallet.js +64 -123
  22. package/dist/crypto/EncryptedWallet.js.map +1 -1
  23. package/dist/crypto/classes/cipherString.js +18 -19
  24. package/dist/crypto/classes/cipherString.js.map +1 -1
  25. package/dist/crypto/classes/encryptedObject.js +7 -7
  26. package/dist/crypto/classes/encryptedObject.js.map +1 -1
  27. package/dist/crypto/classes/encryptionType.js +2 -5
  28. package/dist/crypto/classes/encryptionType.js.map +1 -1
  29. package/dist/crypto/classes/index.js +4 -11
  30. package/dist/crypto/classes/index.js.map +1 -1
  31. package/dist/crypto/classes/symmetricCryptoKey.js +13 -11
  32. package/dist/crypto/classes/symmetricCryptoKey.js.map +1 -1
  33. package/dist/crypto/engines/index.js +2 -18
  34. package/dist/crypto/engines/index.js.map +1 -1
  35. package/dist/crypto/engines/types.js +2 -5
  36. package/dist/crypto/engines/types.js.map +1 -1
  37. package/dist/crypto/engines/web-crypto.js +39 -84
  38. package/dist/crypto/engines/web-crypto.js.map +1 -1
  39. package/dist/crypto/index.js +3 -32
  40. package/dist/crypto/index.js.map +1 -1
  41. package/dist/crypto/isolation/adapters/binance.d.ts.map +1 -1
  42. package/dist/crypto/isolation/adapters/binance.js +12 -51
  43. package/dist/crypto/isolation/adapters/binance.js.map +1 -1
  44. package/dist/crypto/isolation/adapters/bip32.d.ts +2 -9
  45. package/dist/crypto/isolation/adapters/bip32.d.ts.map +1 -1
  46. package/dist/crypto/isolation/adapters/bip32.js +65 -108
  47. package/dist/crypto/isolation/adapters/bip32.js.map +1 -1
  48. package/dist/crypto/isolation/adapters/bitcoin.d.ts +4 -13
  49. package/dist/crypto/isolation/adapters/bitcoin.d.ts.map +1 -1
  50. package/dist/crypto/isolation/adapters/bitcoin.js +41 -84
  51. package/dist/crypto/isolation/adapters/bitcoin.js.map +1 -1
  52. package/dist/crypto/isolation/adapters/cosmos.d.ts +0 -1
  53. package/dist/crypto/isolation/adapters/cosmos.d.ts.map +1 -1
  54. package/dist/crypto/isolation/adapters/cosmos.js +9 -24
  55. package/dist/crypto/isolation/adapters/cosmos.js.map +1 -1
  56. package/dist/crypto/isolation/adapters/cosmosDirect.js +35 -77
  57. package/dist/crypto/isolation/adapters/cosmosDirect.js.map +1 -1
  58. package/dist/crypto/isolation/adapters/ethereum.js +49 -90
  59. package/dist/crypto/isolation/adapters/ethereum.js.map +1 -1
  60. package/dist/crypto/isolation/adapters/fio.d.ts +0 -1
  61. package/dist/crypto/isolation/adapters/fio.d.ts.map +1 -1
  62. package/dist/crypto/isolation/adapters/fio.js +24 -67
  63. package/dist/crypto/isolation/adapters/fio.js.map +1 -1
  64. package/dist/crypto/isolation/adapters/index.js +7 -20
  65. package/dist/crypto/isolation/adapters/index.js.map +1 -1
  66. package/dist/crypto/isolation/core/bip32/index.js +22 -51
  67. package/dist/crypto/isolation/core/bip32/index.js.map +1 -1
  68. package/dist/crypto/isolation/core/bip32/interfaces.js +2 -29
  69. package/dist/crypto/isolation/core/bip32/interfaces.js.map +1 -1
  70. package/dist/crypto/isolation/core/bip32/types.d.ts +2 -2
  71. package/dist/crypto/isolation/core/bip32/types.js +5 -8
  72. package/dist/crypto/isolation/core/bip32/types.js.map +1 -1
  73. package/dist/crypto/isolation/core/bip39/index.js +1 -17
  74. package/dist/crypto/isolation/core/bip39/index.js.map +1 -1
  75. package/dist/crypto/isolation/core/bip39/interfaces.js +1 -2
  76. package/dist/crypto/isolation/core/digest/algorithms.d.ts.map +1 -1
  77. package/dist/crypto/isolation/core/digest/algorithms.js +17 -26
  78. package/dist/crypto/isolation/core/digest/algorithms.js.map +1 -1
  79. package/dist/crypto/isolation/core/digest/index.js +2 -18
  80. package/dist/crypto/isolation/core/digest/index.js.map +1 -1
  81. package/dist/crypto/isolation/core/digest/types.d.ts +20 -20
  82. package/dist/crypto/isolation/core/digest/types.d.ts.map +1 -1
  83. package/dist/crypto/isolation/core/digest/types.js +23 -26
  84. package/dist/crypto/isolation/core/digest/types.js.map +1 -1
  85. package/dist/crypto/isolation/core/index.js +5 -32
  86. package/dist/crypto/isolation/core/index.js.map +1 -1
  87. package/dist/crypto/isolation/core/secp256k1/index.js +2 -18
  88. package/dist/crypto/isolation/core/secp256k1/index.js.map +1 -1
  89. package/dist/crypto/isolation/core/secp256k1/interfaces.js +1 -2
  90. package/dist/crypto/isolation/core/secp256k1/types.d.ts +81 -81
  91. package/dist/crypto/isolation/core/secp256k1/types.d.ts.map +1 -1
  92. package/dist/crypto/isolation/core/secp256k1/types.js +119 -157
  93. package/dist/crypto/isolation/core/secp256k1/types.js.map +1 -1
  94. package/dist/crypto/isolation/engines/default/bip32.d.ts +0 -1
  95. package/dist/crypto/isolation/engines/default/bip32.d.ts.map +1 -1
  96. package/dist/crypto/isolation/engines/default/bip32.js +102 -176
  97. package/dist/crypto/isolation/engines/default/bip32.js.map +1 -1
  98. package/dist/crypto/isolation/engines/default/bip39.js +24 -68
  99. package/dist/crypto/isolation/engines/default/bip39.js.map +1 -1
  100. package/dist/crypto/isolation/engines/default/index.js +3 -32
  101. package/dist/crypto/isolation/engines/default/index.js.map +1 -1
  102. package/dist/crypto/isolation/engines/default/revocable.d.ts +1 -1
  103. package/dist/crypto/isolation/engines/default/revocable.d.ts.map +1 -1
  104. package/dist/crypto/isolation/engines/default/revocable.js +30 -51
  105. package/dist/crypto/isolation/engines/default/revocable.js.map +1 -1
  106. package/dist/crypto/isolation/engines/dummy/bip32.js +63 -121
  107. package/dist/crypto/isolation/engines/dummy/bip32.js.map +1 -1
  108. package/dist/crypto/isolation/engines/dummy/bip39.js +55 -97
  109. package/dist/crypto/isolation/engines/dummy/bip39.js.map +1 -1
  110. package/dist/crypto/isolation/engines/dummy/index.js +3 -30
  111. package/dist/crypto/isolation/engines/dummy/index.js.map +1 -1
  112. package/dist/crypto/isolation/engines/dummy/types.js +1 -5
  113. package/dist/crypto/isolation/engines/dummy/types.js.map +1 -1
  114. package/dist/crypto/isolation/engines/index.js +2 -28
  115. package/dist/crypto/isolation/engines/index.js.map +1 -1
  116. package/dist/crypto/isolation/index.js +3 -29
  117. package/dist/crypto/isolation/index.js.map +1 -1
  118. package/dist/crypto/isolation/types.d.ts +1 -2
  119. package/dist/crypto/isolation/types.d.ts.map +1 -1
  120. package/dist/crypto/isolation/types.js +43 -49
  121. package/dist/crypto/isolation/types.js.map +1 -1
  122. package/dist/crypto/utils.js +7 -14
  123. package/dist/crypto/utils.js.map +1 -1
  124. package/dist/ethereum.d.ts +1 -1
  125. package/dist/ethereum.d.ts.map +1 -1
  126. package/dist/ethereum.js +92 -161
  127. package/dist/ethereum.js.map +1 -1
  128. package/dist/fio.d.ts +3 -3
  129. package/dist/fio.d.ts.map +1 -1
  130. package/dist/fio.js +204 -283
  131. package/dist/fio.js.map +1 -1
  132. package/dist/index.js +3 -32
  133. package/dist/index.js.map +1 -1
  134. package/dist/kava.d.ts +1 -1
  135. package/dist/kava.d.ts.map +1 -1
  136. package/dist/kava.js +50 -120
  137. package/dist/kava.js.map +1 -1
  138. package/dist/native.d.ts +40 -41
  139. package/dist/native.d.ts.map +1 -1
  140. package/dist/native.js +176 -304
  141. package/dist/native.js.map +1 -1
  142. package/dist/networks.js +16 -34
  143. package/dist/networks.js.map +1 -1
  144. package/dist/osmosis.d.ts +1 -1
  145. package/dist/osmosis.d.ts.map +1 -1
  146. package/dist/osmosis.js +54 -124
  147. package/dist/osmosis.js.map +1 -1
  148. package/dist/secret.d.ts +1 -1
  149. package/dist/secret.d.ts.map +1 -1
  150. package/dist/secret.js +50 -120
  151. package/dist/secret.js.map +1 -1
  152. package/dist/terra.d.ts +1 -1
  153. package/dist/terra.d.ts.map +1 -1
  154. package/dist/terra.js +50 -120
  155. package/dist/terra.js.map +1 -1
  156. package/dist/thorchain.d.ts +1 -1
  157. package/dist/thorchain.d.ts.map +1 -1
  158. package/dist/thorchain.js +54 -124
  159. package/dist/thorchain.js.map +1 -1
  160. package/dist/util.js +16 -55
  161. package/dist/util.js.map +1 -1
  162. package/package.json +3 -3
@@ -1,97 +1,46 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
26
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
27
- return new (P || (P = Promise))(function (resolve, reject) {
28
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
29
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
30
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
31
- step((generator = generator.apply(thisArg, _arguments || [])).next());
32
- });
33
- };
34
- var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
35
- if (kind === "m") throw new TypeError("Private method is not writable");
36
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
37
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
38
- return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
39
- };
40
- var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
41
- if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
42
- if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
43
- return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
44
- };
45
- var __importDefault = (this && this.__importDefault) || function (mod) {
46
- return (mod && mod.__esModule) ? mod : { "default": mod };
47
- };
48
- var _EncryptedWallet_engine, _EncryptedWallet_helper, _EncryptedWallet_deviceId, _EncryptedWallet_email, _EncryptedWallet_encryptedWallet, _EncryptedWallet_key, _EncryptedWallet_password;
49
- Object.defineProperty(exports, "__esModule", { value: true });
50
- exports.EncryptedWallet = void 0;
51
- const core = __importStar(require("@shapeshiftoss/hdwallet-core"));
52
- const bip39 = __importStar(require("bip39"));
53
- const classes_1 = require("./classes");
54
- const CryptoHelper_1 = __importDefault(require("./CryptoHelper"));
55
- const utils = __importStar(require("./utils"));
56
- class EncryptedWallet {
1
+ import * as core from "@shapeshiftoss/hdwallet-core";
2
+ import * as bip39 from "bip39";
3
+ import { CipherString } from "./classes";
4
+ import CryptoHelper from "./CryptoHelper";
5
+ import * as utils from "./utils";
6
+ export class EncryptedWallet {
7
+ #engine;
8
+ #helper;
9
+ #deviceId;
10
+ #email;
11
+ #encryptedWallet;
12
+ #key;
13
+ #password;
57
14
  constructor(engine) {
58
- _EncryptedWallet_engine.set(this, void 0);
59
- _EncryptedWallet_helper.set(this, void 0);
60
- _EncryptedWallet_deviceId.set(this, void 0);
61
- _EncryptedWallet_email.set(this, void 0);
62
- _EncryptedWallet_encryptedWallet.set(this, void 0);
63
- _EncryptedWallet_key.set(this, void 0);
64
- _EncryptedWallet_password.set(this, void 0);
65
15
  if (!engine) {
66
16
  throw new Error("Missing cryptography engine");
67
17
  }
68
- __classPrivateFieldSet(this, _EncryptedWallet_engine, engine, "f");
69
- __classPrivateFieldSet(this, _EncryptedWallet_helper, new CryptoHelper_1.default(__classPrivateFieldGet(this, _EncryptedWallet_engine, "f")), "f");
18
+ this.#engine = engine;
19
+ this.#helper = new CryptoHelper(this.#engine);
70
20
  }
71
21
  /**
72
22
  * Whether or not the wallet has been initialized with an email and password
73
23
  */
74
24
  get isInitialized() {
75
- return Boolean(__classPrivateFieldGet(this, _EncryptedWallet_email, "f") && __classPrivateFieldGet(this, _EncryptedWallet_password, "f") && __classPrivateFieldGet(this, _EncryptedWallet_key, "f"));
25
+ return Boolean(this.#email && this.#password && this.#key);
76
26
  }
77
27
  /**
78
28
  * The email provided to the `init` function
79
29
  */
80
30
  get email() {
81
- return __classPrivateFieldGet(this, _EncryptedWallet_email, "f");
31
+ return this.#email;
82
32
  }
83
33
  /**
84
34
  * A hash derived from the email and password to be used for authentication
85
35
  */
86
36
  get passwordHash() {
87
- var _a;
88
- return (_a = __classPrivateFieldGet(this, _EncryptedWallet_key, "f")) === null || _a === void 0 ? void 0 : _a.hashKeyB64;
37
+ return this.#key?.hashKeyB64;
89
38
  }
90
39
  /**
91
40
  * A string representation of the encrypted seed phrase
92
41
  */
93
42
  get encryptedWallet() {
94
- return __classPrivateFieldGet(this, _EncryptedWallet_encryptedWallet, "f");
43
+ return this.#encryptedWallet;
95
44
  }
96
45
  /**
97
46
  * Set the encrypted wallet by providing a string representation
@@ -100,85 +49,77 @@ class EncryptedWallet {
100
49
  set encryptedWallet(wallet) {
101
50
  if (wallet === undefined)
102
51
  throw new Error("Invalid cipher string");
103
- __classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, new classes_1.CipherString(wallet).encryptedString, "f");
52
+ this.#encryptedWallet = new CipherString(wallet).encryptedString;
104
53
  }
105
54
  /**
106
55
  * Get an ID based on the mnemonic
107
56
  * Calling `decrypt` will set this value after decryption is successful
108
57
  */
109
58
  get deviceId() {
110
- return __classPrivateFieldGet(this, _EncryptedWallet_deviceId, "f");
59
+ return this.#deviceId;
111
60
  }
112
61
  /**
113
62
  * Initialize the wallet with and email and password
114
63
  *
115
64
  * This cannot be done in the constructor because it performs async operations
116
65
  */
117
- init(email, password, encryptedWallet) {
118
- return __awaiter(this, void 0, void 0, function* () {
119
- if (!(email && typeof email === "string" && email.length > 0)) {
120
- throw new Error("Invalid email address");
121
- }
122
- if (!(password && typeof password === "string" && password.length > 0)) {
123
- throw new Error("Invalid password");
124
- }
125
- __classPrivateFieldSet(this, _EncryptedWallet_email, email.normalize("NFKC").trim().toLowerCase(), "f");
126
- __classPrivateFieldSet(this, _EncryptedWallet_password, password.normalize("NFKC"), "f");
127
- __classPrivateFieldSet(this, _EncryptedWallet_key, yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").makeKey(__classPrivateFieldGet(this, _EncryptedWallet_password, "f"), __classPrivateFieldGet(this, _EncryptedWallet_email, "f")), "f");
128
- if (encryptedWallet) {
129
- this.encryptedWallet = encryptedWallet;
130
- }
131
- return this;
132
- });
66
+ async init(email, password, encryptedWallet) {
67
+ if (!(email && typeof email === "string" && email.length > 0)) {
68
+ throw new Error("Invalid email address");
69
+ }
70
+ if (!(password && typeof password === "string" && password.length > 0)) {
71
+ throw new Error("Invalid password");
72
+ }
73
+ this.#email = email.normalize("NFKC").trim().toLowerCase();
74
+ this.#password = password.normalize("NFKC");
75
+ this.#key = await this.#helper.makeKey(this.#password, this.#email);
76
+ if (encryptedWallet) {
77
+ this.encryptedWallet = encryptedWallet;
78
+ }
79
+ return this;
133
80
  }
134
81
  /**
135
82
  * Generate a new mnemonic and encrypt it with the email and password
136
83
  */
137
- createWallet(mnemonic) {
138
- return __awaiter(this, void 0, void 0, function* () {
139
- if (!this.isInitialized)
140
- throw new Error("Wallet is not initialized");
141
- mnemonic = mnemonic !== null && mnemonic !== void 0 ? mnemonic : (yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").generateMnemonic());
142
- if (!bip39.validateMnemonic(mnemonic)) {
143
- throw new Error("Invalid mnemonic");
144
- }
145
- if (!__classPrivateFieldGet(this, _EncryptedWallet_key, "f"))
146
- throw new Error("Wallet does not contain a key");
147
- __classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, (yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").aesEncrypt(core.toArrayBuffer(utils.fromUtf8ToArray(mnemonic)), __classPrivateFieldGet(this, _EncryptedWallet_key, "f"))).toString(), "f");
148
- return this;
149
- });
84
+ async createWallet(mnemonic) {
85
+ if (!this.isInitialized)
86
+ throw new Error("Wallet is not initialized");
87
+ mnemonic = mnemonic ?? (await this.#helper.generateMnemonic());
88
+ if (!bip39.validateMnemonic(mnemonic)) {
89
+ throw new Error("Invalid mnemonic");
90
+ }
91
+ if (!this.#key)
92
+ throw new Error("Wallet does not contain a key");
93
+ this.#encryptedWallet = (await this.#helper.aesEncrypt(core.toArrayBuffer(utils.fromUtf8ToArray(mnemonic)), this.#key)).toString();
94
+ return this;
150
95
  }
151
96
  /**
152
97
  * Decrypt the encrypted wallet
153
98
  * @throws {Error} if the wallet hasn't been initialized or doesn't have an encryptedWallet
154
99
  */
155
- decrypt(encryptedWallet = __classPrivateFieldGet(this, _EncryptedWallet_encryptedWallet, "f")) {
156
- return __awaiter(this, void 0, void 0, function* () {
157
- if (!this.isInitialized)
158
- throw new Error("Wallet is not initialized");
159
- if (!encryptedWallet)
160
- throw new Error("Wallet does not contain an encrypted wallet");
161
- if (!__classPrivateFieldGet(this, _EncryptedWallet_key, "f"))
162
- throw new Error("Wallet does not contain a key");
163
- const decrypted = yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").decrypt(new classes_1.CipherString(encryptedWallet), __classPrivateFieldGet(this, _EncryptedWallet_key, "f"));
164
- if (typeof decrypted === "string" && decrypted.length > 0) {
165
- __classPrivateFieldSet(this, _EncryptedWallet_deviceId, yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").getDeviceId(decrypted), "f");
166
- return decrypted;
167
- }
168
- throw new Error("Decryption failed");
169
- });
100
+ async decrypt(encryptedWallet = this.#encryptedWallet) {
101
+ if (!this.isInitialized)
102
+ throw new Error("Wallet is not initialized");
103
+ if (!encryptedWallet)
104
+ throw new Error("Wallet does not contain an encrypted wallet");
105
+ if (!this.#key)
106
+ throw new Error("Wallet does not contain a key");
107
+ const decrypted = await this.#helper.decrypt(new CipherString(encryptedWallet), this.#key);
108
+ if (typeof decrypted === "string" && decrypted.length > 0) {
109
+ this.#deviceId = await this.#helper.getDeviceId(decrypted);
110
+ return decrypted;
111
+ }
112
+ throw new Error("Decryption failed");
170
113
  }
171
114
  /**
172
115
  * Clear all private data to allow it to be garbage collected
173
116
  */
174
117
  reset() {
175
- __classPrivateFieldSet(this, _EncryptedWallet_deviceId, undefined, "f");
176
- __classPrivateFieldSet(this, _EncryptedWallet_email, undefined, "f");
177
- __classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, undefined, "f");
178
- __classPrivateFieldSet(this, _EncryptedWallet_key, undefined, "f");
179
- __classPrivateFieldSet(this, _EncryptedWallet_password, undefined, "f");
118
+ this.#deviceId = undefined;
119
+ this.#email = undefined;
120
+ this.#encryptedWallet = undefined;
121
+ this.#key = undefined;
122
+ this.#password = undefined;
180
123
  }
181
124
  }
182
- exports.EncryptedWallet = EncryptedWallet;
183
- _EncryptedWallet_engine = new WeakMap(), _EncryptedWallet_helper = new WeakMap(), _EncryptedWallet_deviceId = new WeakMap(), _EncryptedWallet_email = new WeakMap(), _EncryptedWallet_encryptedWallet = new WeakMap(), _EncryptedWallet_key = new WeakMap(), _EncryptedWallet_password = new WeakMap();
184
125
  //# sourceMappingURL=EncryptedWallet.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"EncryptedWallet.js","sourceRoot":"","sources":["../../src/crypto/EncryptedWallet.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mEAAqD;AACrD,6CAA+B;AAE/B,uCAA6D;AAC7D,kEAA0C;AAE1C,+CAAiC;AAEjC,MAAa,eAAe;IAS1B,YAAY,MAAoB;QARvB,0CAAsB;QACtB,0CAAsB;QAC/B,4CAA8B;QAC9B,yCAA2B;QAC3B,mDAAqC;QACrC,uCAAqC;QACrC,4CAA8B;QAG5B,IAAI,CAAC,MAAM,EAAE;YACX,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;SAChD;QACD,uBAAA,IAAI,2BAAW,MAAM,MAAA,CAAC;QACtB,uBAAA,IAAI,2BAAW,IAAI,sBAAY,CAAC,uBAAA,IAAI,+BAAQ,CAAC,MAAA,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,IAAI,aAAa;QACf,OAAO,OAAO,CAAC,uBAAA,IAAI,8BAAO,IAAI,uBAAA,IAAI,iCAAU,IAAI,uBAAA,IAAI,4BAAK,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACH,IAAI,KAAK;QACP,OAAO,uBAAA,IAAI,8BAAO,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAI,YAAY;;QACd,OAAO,MAAA,uBAAA,IAAI,4BAAK,0CAAE,UAAU,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,eAAe;QACjB,OAAO,uBAAA,IAAI,wCAAiB,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,IAAI,eAAe,CAAC,MAA0B;QAC5C,IAAI,MAAM,KAAK,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QACnE,uBAAA,IAAI,oCAAoB,IAAI,sBAAY,CAAC,MAAM,CAAC,CAAC,eAAe,MAAA,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,QAAQ;QACV,OAAO,uBAAA,IAAI,iCAAU,CAAC;IACxB,CAAC;IAED;;;;OAIG;IACG,IAAI,CAAC,KAAa,EAAE,QAAgB,EAAE,eAAwB;;YAClE,IAAI,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE;gBAC7D,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;aAC1C;YACD,IAAI,CAAC,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,IAAI,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE;gBACtE,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;aACrC;YAED,uBAAA,IAAI,0BAAU,KAAK,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,MAAA,CAAC;YAC3D,uBAAA,IAAI,6BAAa,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,MAAA,CAAC;YAC5C,uBAAA,IAAI,wBAAQ,MAAM,uBAAA,IAAI,+BAAQ,CAAC,OAAO,CAAC,uBAAA,IAAI,iCAAU,EAAE,uBAAA,IAAI,8BAAO,CAAC,MAAA,CAAC;YAEpE,IAAI,eAAe,EAAE;gBACnB,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;aACxC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED;;OAEG;IACG,YAAY,CAAC,QAAiB;;YAClC,IAAI,CAAC,IAAI,CAAC,aAAa;gBAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YACtE,QAAQ,GAAG,QAAQ,aAAR,QAAQ,cAAR,QAAQ,GAAI,CAAC,MAAM,uBAAA,IAAI,+BAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAE/D,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE;gBACrC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;aACrC;YAED,IAAI,CAAC,uBAAA,IAAI,4BAAK;gBAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACjE,uBAAA,IAAI,oCAAoB,CACtB,MAAM,uBAAA,IAAI,+BAAQ,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC,EAAE,uBAAA,IAAI,4BAAK,CAAC,CAC9F,CAAC,QAAQ,EAAE,MAAA,CAAC;YAEb,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED;;;OAGG;IACG,OAAO,CAAC,eAAe,GAAG,uBAAA,IAAI,wCAAiB;;YACnD,IAAI,CAAC,IAAI,CAAC,aAAa;gBAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YACtE,IAAI,CAAC,eAAe;gBAAE,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;YACrF,IAAI,CAAC,uBAAA,IAAI,4BAAK;gBAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACjE,MAAM,SAAS,GAAG,MAAM,uBAAA,IAAI,+BAAQ,CAAC,OAAO,CAAC,IAAI,sBAAY,CAAC,eAAe,CAAC,EAAE,uBAAA,IAAI,4BAAK,CAAC,CAAC;YAE3F,IAAI,OAAO,SAAS,KAAK,QAAQ,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE;gBACzD,uBAAA,IAAI,6BAAa,MAAM,uBAAA,IAAI,+BAAQ,CAAC,WAAW,CAAC,SAAS,CAAC,MAAA,CAAC;gBAC3D,OAAO,SAAS,CAAC;aAClB;YACD,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;QACvC,CAAC;KAAA;IAED;;OAEG;IACH,KAAK;QACH,uBAAA,IAAI,6BAAa,SAAS,MAAA,CAAC;QAC3B,uBAAA,IAAI,0BAAU,SAAS,MAAA,CAAC;QACxB,uBAAA,IAAI,oCAAoB,SAAS,MAAA,CAAC;QAClC,uBAAA,IAAI,wBAAQ,SAAS,MAAA,CAAC;QACtB,uBAAA,IAAI,6BAAa,SAAS,MAAA,CAAC;IAC7B,CAAC;CACF;AApID,0CAoIC"}
1
+ {"version":3,"file":"EncryptedWallet.js","sourceRoot":"","sources":["../../src/crypto/EncryptedWallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,IAAI,MAAM,8BAA8B,CAAC;AACrD,OAAO,KAAK,KAAK,MAAM,OAAO,CAAC;AAE/B,OAAO,EAAE,YAAY,EAAsB,MAAM,WAAW,CAAC;AAC7D,OAAO,YAAY,MAAM,gBAAgB,CAAC;AAE1C,OAAO,KAAK,KAAK,MAAM,SAAS,CAAC;AAEjC,MAAM,OAAO,eAAe;IACjB,OAAO,CAAe;IACtB,OAAO,CAAe;IAC/B,SAAS,CAAqB;IAC9B,MAAM,CAAqB;IAC3B,gBAAgB,CAAqB;IACrC,IAAI,CAAiC;IACrC,SAAS,CAAqB;IAE9B,YAAY,MAAoB;QAC9B,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;QACD,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,IAAI,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,IAAI,aAAa;QACf,OAAO,OAAO,CAAC,IAAI,CAAC,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,IAAI,CAAC,IAAI,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACH,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAI,YAAY;QACd,OAAO,IAAI,CAAC,IAAI,EAAE,UAAU,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,eAAe;QACjB,OAAO,IAAI,CAAC,gBAAgB,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,IAAI,eAAe,CAAC,MAA0B;QAC5C,IAAI,MAAM,KAAK,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QACnE,IAAI,CAAC,gBAAgB,GAAG,IAAI,YAAY,CAAC,MAAM,CAAC,CAAC,eAAe,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,QAAQ;QACV,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,IAAI,CAAC,KAAa,EAAE,QAAgB,EAAE,eAAwB;QAClE,IAAI,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;YAC9D,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAC3C,CAAC;QACD,IAAI,CAAC,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,IAAI,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;YACvE,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QACtC,CAAC;QAED,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QAC3D,IAAI,CAAC,SAAS,GAAG,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;QAC5C,IAAI,CAAC,IAAI,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpE,IAAI,eAAe,EAAE,CAAC;YACpB,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACzC,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,YAAY,CAAC,QAAiB;QAClC,IAAI,CAAC,IAAI,CAAC,aAAa;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACtE,QAAQ,GAAG,QAAQ,IAAI,CAAC,MAAM,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC,CAAC;QAE/D,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,CAAC;YACtC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QACtC,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACjE,IAAI,CAAC,gBAAgB,GAAG,CACtB,MAAM,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,CAAC,CAC9F,CAAC,QAAQ,EAAE,CAAC;QAEb,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,OAAO,CAAC,eAAe,GAAG,IAAI,CAAC,gBAAgB;QACnD,IAAI,CAAC,IAAI,CAAC,aAAa;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACtE,IAAI,CAAC,eAAe;YAAE,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACrF,IAAI,CAAC,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACjE,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,YAAY,CAAC,eAAe,CAAC,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;QAE3F,IAAI,OAAO,SAAS,KAAK,QAAQ,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1D,IAAI,CAAC,SAAS,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC;YAC3D,OAAO,SAAS,CAAC;QACnB,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED;;OAEG;IACH,KAAK;QACH,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,MAAM,GAAG,SAAS,CAAC;QACxB,IAAI,CAAC,gBAAgB,GAAG,SAAS,CAAC;QAClC,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC;QACtB,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;CACF"}
@@ -1,15 +1,15 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.CipherString = void 0;
4
1
  /*
5
2
  Copied from portis: packages/portis-crypto/src/models/cipherString.ts
6
3
  */
7
- const utils_1 = require("../utils");
8
- const encryptedObject_1 = require("./encryptedObject");
9
- const encryptionType_1 = require("./encryptionType");
10
- class CipherString {
4
+ import { fromB64ToArray, fromBufferToB64 } from "../utils";
5
+ import { EncryptedObject } from "./encryptedObject";
6
+ import { EncryptionType } from "./encryptionType";
7
+ export class CipherString {
8
+ encryptionType = EncryptionType.AesCbc256_HmacSha256_B64;
9
+ data;
10
+ iv;
11
+ mac;
11
12
  constructor(cipher) {
12
- this.encryptionType = encryptionType_1.EncryptionType.AesCbc256_HmacSha256_B64;
13
13
  let data, iv, mac;
14
14
  if (typeof cipher === "string") {
15
15
  try {
@@ -21,24 +21,24 @@ class CipherString {
21
21
  throw new Error("Invalid cipher string");
22
22
  }
23
23
  }
24
- else if (cipher instanceof encryptedObject_1.EncryptedObject) {
24
+ else if (cipher instanceof EncryptedObject) {
25
25
  try {
26
26
  this.encryptionType = cipher.key.encType;
27
27
  if (cipher.iv)
28
- iv = (0, utils_1.fromBufferToB64)(cipher.iv);
28
+ iv = fromBufferToB64(cipher.iv);
29
29
  if (cipher.data)
30
- data = (0, utils_1.fromBufferToB64)(cipher.data);
30
+ data = fromBufferToB64(cipher.data);
31
31
  if (cipher.mac)
32
- mac = (0, utils_1.fromBufferToB64)(cipher.mac);
32
+ mac = fromBufferToB64(cipher.mac);
33
33
  }
34
- catch (_a) {
34
+ catch {
35
35
  throw new Error("Invalid encryption object");
36
36
  }
37
37
  }
38
38
  else {
39
39
  throw new Error("Invalid cipher data. You must provide a string or Encrypted Object");
40
40
  }
41
- if (!encryptionType_1.EncryptionType[this.encryptionType]) {
41
+ if (!EncryptionType[this.encryptionType]) {
42
42
  throw new Error("Unsupported encryption method");
43
43
  }
44
44
  if (!data)
@@ -55,13 +55,12 @@ class CipherString {
55
55
  return `${this.encryptionType}.${[this.data, this.iv, this.mac].join("|")}`;
56
56
  }
57
57
  toEncryptedObject(key) {
58
- return new encryptedObject_1.EncryptedObject({
59
- data: (0, utils_1.fromB64ToArray)(this.data),
60
- iv: (0, utils_1.fromB64ToArray)(this.iv),
61
- mac: (0, utils_1.fromB64ToArray)(this.mac),
58
+ return new EncryptedObject({
59
+ data: fromB64ToArray(this.data),
60
+ iv: fromB64ToArray(this.iv),
61
+ mac: fromB64ToArray(this.mac),
62
62
  key,
63
63
  });
64
64
  }
65
65
  }
66
- exports.CipherString = CipherString;
67
66
  //# sourceMappingURL=cipherString.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"cipherString.js","sourceRoot":"","sources":["../../../src/crypto/classes/cipherString.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,oCAA2D;AAC3D,uDAAoD;AACpD,qDAAkD;AAGlD,MAAa,YAAY;IAMvB,YAAY,MAAgC;QALnC,mBAAc,GAAmB,+BAAc,CAAC,wBAAwB,CAAC;QAMhF,IAAI,IAAwB,EAAE,EAAsB,EAAE,GAAuB,CAAC;QAC9E,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE;YAC9B,IAAI;gBACF,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBACjC,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;gBACxC,CAAC,IAAI,EAAE,EAAE,EAAE,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;aACxC;YAAC,OAAO,CAAC,EAAE;gBACV,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;aAC1C;SACF;aAAM,IAAI,MAAM,YAAY,iCAAe,EAAE;YAC5C,IAAI;gBACF,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC;gBACzC,IAAI,MAAM,CAAC,EAAE;oBAAE,EAAE,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBAC/C,IAAI,MAAM,CAAC,IAAI;oBAAE,IAAI,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;gBACrD,IAAI,MAAM,CAAC,GAAG;oBAAE,GAAG,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,GAAG,CAAC,CAAC;aACnD;YAAC,WAAM;gBACN,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;aAC9C;SACF;aAAM;YACL,MAAM,IAAI,KAAK,CAAC,oEAAoE,CAAC,CAAC;SACvF;QAED,IAAI,CAAC,+BAAc,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE;YACxC,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;SAClD;QACD,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACxD,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,eAAe,CAAC,CAAC;QAC1C,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,GAAG;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACvD,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,IAAI,eAAe;QACjB,OAAO,GAAG,IAAI,CAAC,cAAc,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC9E,CAAC;IAED,iBAAiB,CAAC,GAAuB;QACvC,OAAO,IAAI,iCAAe,CAAC;YACzB,IAAI,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,IAAI,CAAC;YAC/B,EAAE,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,EAAE,CAAC;YAC3B,GAAG,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,GAAG,CAAC;YAC7B,GAAG;SACJ,CAAC,CAAC;IACL,CAAC;CACF;AApDD,oCAoDC"}
1
+ {"version":3,"file":"cipherString.js","sourceRoot":"","sources":["../../../src/crypto/classes/cipherString.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,UAAU,CAAC;AAC3D,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAGlD,MAAM,OAAO,YAAY;IACd,cAAc,GAAmB,cAAc,CAAC,wBAAwB,CAAC;IAClF,IAAI,CAAS;IACb,EAAE,CAAS;IACX,GAAG,CAAS;IAEZ,YAAY,MAAgC;QAC1C,IAAI,IAAwB,EAAE,EAAsB,EAAE,GAAuB,CAAC;QAC9E,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBACjC,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;gBACxC,CAAC,IAAI,EAAE,EAAE,EAAE,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACzC,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;YAC3C,CAAC;QACH,CAAC;aAAM,IAAI,MAAM,YAAY,eAAe,EAAE,CAAC;YAC7C,IAAI,CAAC;gBACH,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC;gBACzC,IAAI,MAAM,CAAC,EAAE;oBAAE,EAAE,GAAG,eAAe,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBAC/C,IAAI,MAAM,CAAC,IAAI;oBAAE,IAAI,GAAG,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;gBACrD,IAAI,MAAM,CAAC,GAAG;oBAAE,GAAG,GAAG,eAAe,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YACpD,CAAC;YAAC,MAAM,CAAC;gBACP,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oEAAoE,CAAC,CAAC;QACxF,CAAC;QAED,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACxD,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,eAAe,CAAC,CAAC;QAC1C,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,GAAG;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACvD,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,IAAI,eAAe;QACjB,OAAO,GAAG,IAAI,CAAC,cAAc,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC9E,CAAC;IAED,iBAAiB,CAAC,GAAuB;QACvC,OAAO,IAAI,eAAe,CAAC;YACzB,IAAI,EAAE,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC;YAC/B,EAAE,EAAE,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC;YAC3B,GAAG,EAAE,cAAc,CAAC,IAAI,CAAC,GAAG,CAAC;YAC7B,GAAG;SACJ,CAAC,CAAC;IACL,CAAC;CACF"}
@@ -1,11 +1,12 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.EncryptedObject = void 0;
4
1
  /*
5
2
  Copied from portis: packages/portis-crypto/src/models/encryptedObject.ts
6
3
  */
7
- const cipherString_1 = require("./cipherString");
8
- class EncryptedObject {
4
+ import { CipherString } from "./cipherString";
5
+ export class EncryptedObject {
6
+ key;
7
+ iv;
8
+ data;
9
+ mac;
9
10
  constructor({ key, iv, data, mac, }) {
10
11
  this.key = key;
11
12
  this.iv = iv;
@@ -13,8 +14,7 @@ class EncryptedObject {
13
14
  this.mac = mac;
14
15
  }
15
16
  toString() {
16
- return new cipherString_1.CipherString(this).encryptedString;
17
+ return new CipherString(this).encryptedString;
17
18
  }
18
19
  }
19
- exports.EncryptedObject = EncryptedObject;
20
20
  //# sourceMappingURL=encryptedObject.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"encryptedObject.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptedObject.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,iDAA8C;AAG9C,MAAa,eAAe;IAM1B,YAAY,EACV,GAAG,EACH,EAAE,EACF,IAAI,EACJ,GAAG,GAMJ;QACC,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,QAAQ;QACN,OAAO,IAAI,2BAAY,CAAC,IAAI,CAAC,CAAC,eAAe,CAAC;IAChD,CAAC;CACF;AA1BD,0CA0BC"}
1
+ {"version":3,"file":"encryptedObject.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptedObject.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AAG9C,MAAM,OAAO,eAAe;IAC1B,GAAG,CAAqB;IACxB,EAAE,CAAc;IAChB,IAAI,CAAc;IAClB,GAAG,CAAc;IAEjB,YAAY,EACV,GAAG,EACH,EAAE,EACF,IAAI,EACJ,GAAG,GAMJ;QACC,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,QAAQ;QACN,OAAO,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,eAAe,CAAC;IAChD,CAAC;CACF"}
@@ -1,11 +1,8 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.EncryptionType = void 0;
4
1
  /*
5
2
  Copied from portis: packages/portis-crypto/src/enums/encryptionType.ts
6
3
  */
7
- var EncryptionType;
4
+ export var EncryptionType;
8
5
  (function (EncryptionType) {
9
6
  EncryptionType[EncryptionType["AesCbc256_HmacSha256_B64"] = 2] = "AesCbc256_HmacSha256_B64";
10
- })(EncryptionType || (exports.EncryptionType = EncryptionType = {}));
7
+ })(EncryptionType || (EncryptionType = {}));
11
8
  //# sourceMappingURL=encryptionType.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"encryptionType.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptionType.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,IAAY,cAEX;AAFD,WAAY,cAAc;IACxB,2FAA4B,CAAA;AAC9B,CAAC,EAFW,cAAc,8BAAd,cAAc,QAEzB"}
1
+ {"version":3,"file":"encryptionType.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptionType.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,MAAM,CAAN,IAAY,cAEX;AAFD,WAAY,cAAc;IACxB,2FAA4B,CAAA;AAC9B,CAAC,EAFW,cAAc,KAAd,cAAc,QAEzB"}
@@ -1,12 +1,5 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.SymmetricCryptoKey = exports.EncryptionType = exports.EncryptedObject = exports.CipherString = void 0;
4
- var cipherString_1 = require("./cipherString");
5
- Object.defineProperty(exports, "CipherString", { enumerable: true, get: function () { return cipherString_1.CipherString; } });
6
- var encryptedObject_1 = require("./encryptedObject");
7
- Object.defineProperty(exports, "EncryptedObject", { enumerable: true, get: function () { return encryptedObject_1.EncryptedObject; } });
8
- var encryptionType_1 = require("./encryptionType");
9
- Object.defineProperty(exports, "EncryptionType", { enumerable: true, get: function () { return encryptionType_1.EncryptionType; } });
10
- var symmetricCryptoKey_1 = require("./symmetricCryptoKey");
11
- Object.defineProperty(exports, "SymmetricCryptoKey", { enumerable: true, get: function () { return symmetricCryptoKey_1.SymmetricCryptoKey; } });
1
+ export { CipherString } from "./cipherString";
2
+ export { EncryptedObject } from "./encryptedObject";
3
+ export { EncryptionType } from "./encryptionType";
4
+ export { SymmetricCryptoKey } from "./symmetricCryptoKey";
12
5
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/classes/index.ts"],"names":[],"mappings":";;;AAAA,+CAA8C;AAArC,4GAAA,YAAY,OAAA;AACrB,qDAAoD;AAA3C,kHAAA,eAAe,OAAA;AACxB,mDAAkD;AAAzC,gHAAA,cAAc,OAAA;AACvB,2DAA0D;AAAjD,wHAAA,kBAAkB,OAAA"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/classes/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AAC9C,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAClD,OAAO,EAAE,kBAAkB,EAAE,MAAM,sBAAsB,CAAC"}
@@ -1,14 +1,17 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.SymmetricCryptoKey = void 0;
4
1
  /*
5
2
  Copied from portis: packages/portis-crypto/src/models/symmetricCryptoKey.ts
6
3
  */
7
- const utils_1 = require("../utils");
8
- const encryptionType_1 = require("./encryptionType");
9
- class SymmetricCryptoKey {
4
+ import { fromBufferToB64 } from "../utils";
5
+ import { EncryptionType } from "./encryptionType";
6
+ export class SymmetricCryptoKey {
7
+ hashKey;
8
+ encKey;
9
+ macKey;
10
+ encType = EncryptionType.AesCbc256_HmacSha256_B64;
11
+ hashKeyB64;
12
+ encKeyB64;
13
+ macKeyB64;
10
14
  constructor(hashKey, encKey, mac) {
11
- this.encType = encryptionType_1.EncryptionType.AesCbc256_HmacSha256_B64;
12
15
  if (hashKey == null)
13
16
  throw new Error("Required parameter [hashKey] was not provided");
14
17
  if (encKey == null)
@@ -20,10 +23,9 @@ class SymmetricCryptoKey {
20
23
  this.hashKey = hashKey;
21
24
  this.encKey = encKey;
22
25
  this.macKey = mac;
23
- this.hashKeyB64 = (0, utils_1.fromBufferToB64)(this.hashKey);
24
- this.encKeyB64 = (0, utils_1.fromBufferToB64)(this.encKey);
25
- this.macKeyB64 = (0, utils_1.fromBufferToB64)(this.macKey);
26
+ this.hashKeyB64 = fromBufferToB64(this.hashKey);
27
+ this.encKeyB64 = fromBufferToB64(this.encKey);
28
+ this.macKeyB64 = fromBufferToB64(this.macKey);
26
29
  }
27
30
  }
28
- exports.SymmetricCryptoKey = SymmetricCryptoKey;
29
31
  //# sourceMappingURL=symmetricCryptoKey.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"symmetricCryptoKey.js","sourceRoot":"","sources":["../../../src/crypto/classes/symmetricCryptoKey.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,oCAA2C;AAC3C,qDAAkD;AAElD,MAAa,kBAAkB;IAU7B,YAAY,OAAoB,EAAE,MAAmB,EAAE,GAAgB;QANvE,YAAO,GAAmB,+BAAc,CAAC,wBAAwB,CAAC;QAOhE,IAAI,OAAO,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACtF,IAAI,MAAM,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;QACpF,IAAI,GAAG,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAE9E,IAAI,OAAO,CAAC,UAAU,KAAK,EAAE,IAAI,MAAM,CAAC,UAAU,KAAK,EAAE,IAAI,GAAG,CAAC,UAAU,KAAK,EAAE;YAChF,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAE3C,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,MAAM,GAAG,GAAG,CAAC;QAElB,IAAI,CAAC,UAAU,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,SAAS,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAChD,CAAC;CACF;AA1BD,gDA0BC"}
1
+ {"version":3,"file":"symmetricCryptoKey.js","sourceRoot":"","sources":["../../../src/crypto/classes/symmetricCryptoKey.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,eAAe,EAAE,MAAM,UAAU,CAAC;AAC3C,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAElD,MAAM,OAAO,kBAAkB;IAC7B,OAAO,CAAc;IACrB,MAAM,CAAc;IACpB,MAAM,CAAqB;IAC3B,OAAO,GAAmB,cAAc,CAAC,wBAAwB,CAAC;IAElE,UAAU,CAAS;IACnB,SAAS,CAAS;IAClB,SAAS,CAAS;IAElB,YAAY,OAAoB,EAAE,MAAmB,EAAE,GAAgB;QACrE,IAAI,OAAO,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACtF,IAAI,MAAM,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;QACpF,IAAI,GAAG,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAE9E,IAAI,OAAO,CAAC,UAAU,KAAK,EAAE,IAAI,MAAM,CAAC,UAAU,KAAK,EAAE,IAAI,GAAG,CAAC,UAAU,KAAK,EAAE;YAChF,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAE3C,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,MAAM,GAAG,GAAG,CAAC;QAElB,IAAI,CAAC,UAAU,GAAG,eAAe,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,SAAS,GAAG,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAChD,CAAC;CACF"}
@@ -1,19 +1,3 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
- for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
- };
16
- Object.defineProperty(exports, "__esModule", { value: true });
17
- __exportStar(require("./types"), exports);
18
- __exportStar(require("./web-crypto"), exports);
1
+ export * from "./types";
2
+ export * from "./web-crypto";
19
3
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/engines/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,0CAAwB;AACxB,+CAA6B"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/engines/index.ts"],"names":[],"mappings":"AAAA,cAAc,SAAS,CAAC;AACxB,cAAc,cAAc,CAAC"}
@@ -1,9 +1,6 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.DigestAlgorithm = void 0;
4
- var DigestAlgorithm;
1
+ export var DigestAlgorithm;
5
2
  (function (DigestAlgorithm) {
6
3
  DigestAlgorithm[DigestAlgorithm["SHA256"] = 0] = "SHA256";
7
4
  DigestAlgorithm[DigestAlgorithm["SHA512"] = 1] = "SHA512";
8
- })(DigestAlgorithm || (exports.DigestAlgorithm = DigestAlgorithm = {}));
5
+ })(DigestAlgorithm || (DigestAlgorithm = {}));
9
6
  //# sourceMappingURL=types.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/crypto/engines/types.ts"],"names":[],"mappings":";;;AAYA,IAAY,eAGX;AAHD,WAAY,eAAe;IACzB,yDAAM,CAAA;IACN,yDAAM,CAAA;AACR,CAAC,EAHW,eAAe,+BAAf,eAAe,QAG1B"}
1
+ {"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/crypto/engines/types.ts"],"names":[],"mappings":"AAYA,MAAM,CAAN,IAAY,eAGX;AAHD,WAAY,eAAe;IACzB,yDAAM,CAAA;IACN,yDAAM,CAAA;AACR,CAAC,EAHW,eAAe,KAAf,eAAe,QAG1B"}