@shapeshiftoss/hdwallet-native 1.55.2 → 1.55.4-alpha.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter.js +22 -61
- package/dist/adapter.js.map +1 -1
- package/dist/arkeo.d.ts +1 -1
- package/dist/arkeo.d.ts.map +1 -1
- package/dist/arkeo.js +54 -124
- package/dist/arkeo.js.map +1 -1
- package/dist/binance.d.ts +1 -1
- package/dist/binance.d.ts.map +1 -1
- package/dist/binance.js +123 -195
- package/dist/binance.js.map +1 -1
- package/dist/bitcoin.d.ts +1 -2
- package/dist/bitcoin.d.ts.map +1 -1
- package/dist/bitcoin.js +219 -285
- package/dist/bitcoin.js.map +1 -1
- package/dist/cosmos.d.ts +1 -1
- package/dist/cosmos.d.ts.map +1 -1
- package/dist/cosmos.js +54 -124
- package/dist/cosmos.js.map +1 -1
- package/dist/crypto/CryptoHelper.js +106 -172
- package/dist/crypto/CryptoHelper.js.map +1 -1
- package/dist/crypto/EncryptedWallet.js +64 -123
- package/dist/crypto/EncryptedWallet.js.map +1 -1
- package/dist/crypto/classes/cipherString.js +18 -19
- package/dist/crypto/classes/cipherString.js.map +1 -1
- package/dist/crypto/classes/encryptedObject.js +7 -7
- package/dist/crypto/classes/encryptedObject.js.map +1 -1
- package/dist/crypto/classes/encryptionType.js +2 -5
- package/dist/crypto/classes/encryptionType.js.map +1 -1
- package/dist/crypto/classes/index.js +4 -11
- package/dist/crypto/classes/index.js.map +1 -1
- package/dist/crypto/classes/symmetricCryptoKey.js +13 -11
- package/dist/crypto/classes/symmetricCryptoKey.js.map +1 -1
- package/dist/crypto/engines/index.js +2 -18
- package/dist/crypto/engines/index.js.map +1 -1
- package/dist/crypto/engines/types.js +2 -5
- package/dist/crypto/engines/types.js.map +1 -1
- package/dist/crypto/engines/web-crypto.js +39 -84
- package/dist/crypto/engines/web-crypto.js.map +1 -1
- package/dist/crypto/index.js +3 -32
- package/dist/crypto/index.js.map +1 -1
- package/dist/crypto/isolation/adapters/binance.d.ts.map +1 -1
- package/dist/crypto/isolation/adapters/binance.js +12 -51
- package/dist/crypto/isolation/adapters/binance.js.map +1 -1
- package/dist/crypto/isolation/adapters/bip32.d.ts +2 -9
- package/dist/crypto/isolation/adapters/bip32.d.ts.map +1 -1
- package/dist/crypto/isolation/adapters/bip32.js +65 -108
- package/dist/crypto/isolation/adapters/bip32.js.map +1 -1
- package/dist/crypto/isolation/adapters/bitcoin.d.ts +4 -13
- package/dist/crypto/isolation/adapters/bitcoin.d.ts.map +1 -1
- package/dist/crypto/isolation/adapters/bitcoin.js +41 -84
- package/dist/crypto/isolation/adapters/bitcoin.js.map +1 -1
- package/dist/crypto/isolation/adapters/cosmos.d.ts +0 -1
- package/dist/crypto/isolation/adapters/cosmos.d.ts.map +1 -1
- package/dist/crypto/isolation/adapters/cosmos.js +9 -24
- package/dist/crypto/isolation/adapters/cosmos.js.map +1 -1
- package/dist/crypto/isolation/adapters/cosmosDirect.js +35 -77
- package/dist/crypto/isolation/adapters/cosmosDirect.js.map +1 -1
- package/dist/crypto/isolation/adapters/ethereum.js +49 -90
- package/dist/crypto/isolation/adapters/ethereum.js.map +1 -1
- package/dist/crypto/isolation/adapters/fio.d.ts +0 -1
- package/dist/crypto/isolation/adapters/fio.d.ts.map +1 -1
- package/dist/crypto/isolation/adapters/fio.js +24 -67
- package/dist/crypto/isolation/adapters/fio.js.map +1 -1
- package/dist/crypto/isolation/adapters/index.js +7 -20
- package/dist/crypto/isolation/adapters/index.js.map +1 -1
- package/dist/crypto/isolation/core/bip32/index.js +22 -51
- package/dist/crypto/isolation/core/bip32/index.js.map +1 -1
- package/dist/crypto/isolation/core/bip32/interfaces.js +2 -29
- package/dist/crypto/isolation/core/bip32/interfaces.js.map +1 -1
- package/dist/crypto/isolation/core/bip32/types.d.ts +2 -2
- package/dist/crypto/isolation/core/bip32/types.js +5 -8
- package/dist/crypto/isolation/core/bip32/types.js.map +1 -1
- package/dist/crypto/isolation/core/bip39/index.js +1 -17
- package/dist/crypto/isolation/core/bip39/index.js.map +1 -1
- package/dist/crypto/isolation/core/bip39/interfaces.js +1 -2
- package/dist/crypto/isolation/core/digest/algorithms.d.ts.map +1 -1
- package/dist/crypto/isolation/core/digest/algorithms.js +17 -26
- package/dist/crypto/isolation/core/digest/algorithms.js.map +1 -1
- package/dist/crypto/isolation/core/digest/index.js +2 -18
- package/dist/crypto/isolation/core/digest/index.js.map +1 -1
- package/dist/crypto/isolation/core/digest/types.d.ts +20 -20
- package/dist/crypto/isolation/core/digest/types.d.ts.map +1 -1
- package/dist/crypto/isolation/core/digest/types.js +23 -26
- package/dist/crypto/isolation/core/digest/types.js.map +1 -1
- package/dist/crypto/isolation/core/index.js +5 -32
- package/dist/crypto/isolation/core/index.js.map +1 -1
- package/dist/crypto/isolation/core/secp256k1/index.js +2 -18
- package/dist/crypto/isolation/core/secp256k1/index.js.map +1 -1
- package/dist/crypto/isolation/core/secp256k1/interfaces.js +1 -2
- package/dist/crypto/isolation/core/secp256k1/types.d.ts +81 -81
- package/dist/crypto/isolation/core/secp256k1/types.d.ts.map +1 -1
- package/dist/crypto/isolation/core/secp256k1/types.js +119 -157
- package/dist/crypto/isolation/core/secp256k1/types.js.map +1 -1
- package/dist/crypto/isolation/engines/default/bip32.d.ts +0 -1
- package/dist/crypto/isolation/engines/default/bip32.d.ts.map +1 -1
- package/dist/crypto/isolation/engines/default/bip32.js +102 -176
- package/dist/crypto/isolation/engines/default/bip32.js.map +1 -1
- package/dist/crypto/isolation/engines/default/bip39.js +24 -68
- package/dist/crypto/isolation/engines/default/bip39.js.map +1 -1
- package/dist/crypto/isolation/engines/default/index.js +3 -32
- package/dist/crypto/isolation/engines/default/index.js.map +1 -1
- package/dist/crypto/isolation/engines/default/revocable.d.ts +1 -1
- package/dist/crypto/isolation/engines/default/revocable.d.ts.map +1 -1
- package/dist/crypto/isolation/engines/default/revocable.js +30 -51
- package/dist/crypto/isolation/engines/default/revocable.js.map +1 -1
- package/dist/crypto/isolation/engines/dummy/bip32.js +63 -121
- package/dist/crypto/isolation/engines/dummy/bip32.js.map +1 -1
- package/dist/crypto/isolation/engines/dummy/bip39.js +55 -97
- package/dist/crypto/isolation/engines/dummy/bip39.js.map +1 -1
- package/dist/crypto/isolation/engines/dummy/index.js +3 -30
- package/dist/crypto/isolation/engines/dummy/index.js.map +1 -1
- package/dist/crypto/isolation/engines/dummy/types.js +1 -5
- package/dist/crypto/isolation/engines/dummy/types.js.map +1 -1
- package/dist/crypto/isolation/engines/index.js +2 -28
- package/dist/crypto/isolation/engines/index.js.map +1 -1
- package/dist/crypto/isolation/index.js +3 -29
- package/dist/crypto/isolation/index.js.map +1 -1
- package/dist/crypto/isolation/types.d.ts +1 -2
- package/dist/crypto/isolation/types.d.ts.map +1 -1
- package/dist/crypto/isolation/types.js +43 -49
- package/dist/crypto/isolation/types.js.map +1 -1
- package/dist/crypto/utils.js +7 -14
- package/dist/crypto/utils.js.map +1 -1
- package/dist/ethereum.d.ts +1 -1
- package/dist/ethereum.d.ts.map +1 -1
- package/dist/ethereum.js +92 -161
- package/dist/ethereum.js.map +1 -1
- package/dist/fio.d.ts +3 -3
- package/dist/fio.d.ts.map +1 -1
- package/dist/fio.js +204 -283
- package/dist/fio.js.map +1 -1
- package/dist/index.js +3 -32
- package/dist/index.js.map +1 -1
- package/dist/kava.d.ts +1 -1
- package/dist/kava.d.ts.map +1 -1
- package/dist/kava.js +50 -120
- package/dist/kava.js.map +1 -1
- package/dist/native.d.ts +40 -41
- package/dist/native.d.ts.map +1 -1
- package/dist/native.js +176 -304
- package/dist/native.js.map +1 -1
- package/dist/networks.js +16 -34
- package/dist/networks.js.map +1 -1
- package/dist/osmosis.d.ts +1 -1
- package/dist/osmosis.d.ts.map +1 -1
- package/dist/osmosis.js +54 -124
- package/dist/osmosis.js.map +1 -1
- package/dist/secret.d.ts +1 -1
- package/dist/secret.d.ts.map +1 -1
- package/dist/secret.js +50 -120
- package/dist/secret.js.map +1 -1
- package/dist/terra.d.ts +1 -1
- package/dist/terra.d.ts.map +1 -1
- package/dist/terra.js +50 -120
- package/dist/terra.js.map +1 -1
- package/dist/thorchain.d.ts +1 -1
- package/dist/thorchain.d.ts.map +1 -1
- package/dist/thorchain.js +54 -124
- package/dist/thorchain.js.map +1 -1
- package/dist/util.js +16 -55
- package/dist/util.js.map +1 -1
- package/package.json +3 -3
|
@@ -1,97 +1,46 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
26
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
27
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
28
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
29
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
30
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
31
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
32
|
-
});
|
|
33
|
-
};
|
|
34
|
-
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
35
|
-
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
36
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
37
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
38
|
-
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
39
|
-
};
|
|
40
|
-
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
41
|
-
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
42
|
-
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
43
|
-
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
44
|
-
};
|
|
45
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
46
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
47
|
-
};
|
|
48
|
-
var _EncryptedWallet_engine, _EncryptedWallet_helper, _EncryptedWallet_deviceId, _EncryptedWallet_email, _EncryptedWallet_encryptedWallet, _EncryptedWallet_key, _EncryptedWallet_password;
|
|
49
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
50
|
-
exports.EncryptedWallet = void 0;
|
|
51
|
-
const core = __importStar(require("@shapeshiftoss/hdwallet-core"));
|
|
52
|
-
const bip39 = __importStar(require("bip39"));
|
|
53
|
-
const classes_1 = require("./classes");
|
|
54
|
-
const CryptoHelper_1 = __importDefault(require("./CryptoHelper"));
|
|
55
|
-
const utils = __importStar(require("./utils"));
|
|
56
|
-
class EncryptedWallet {
|
|
1
|
+
import * as core from "@shapeshiftoss/hdwallet-core";
|
|
2
|
+
import * as bip39 from "bip39";
|
|
3
|
+
import { CipherString } from "./classes";
|
|
4
|
+
import CryptoHelper from "./CryptoHelper";
|
|
5
|
+
import * as utils from "./utils";
|
|
6
|
+
export class EncryptedWallet {
|
|
7
|
+
#engine;
|
|
8
|
+
#helper;
|
|
9
|
+
#deviceId;
|
|
10
|
+
#email;
|
|
11
|
+
#encryptedWallet;
|
|
12
|
+
#key;
|
|
13
|
+
#password;
|
|
57
14
|
constructor(engine) {
|
|
58
|
-
_EncryptedWallet_engine.set(this, void 0);
|
|
59
|
-
_EncryptedWallet_helper.set(this, void 0);
|
|
60
|
-
_EncryptedWallet_deviceId.set(this, void 0);
|
|
61
|
-
_EncryptedWallet_email.set(this, void 0);
|
|
62
|
-
_EncryptedWallet_encryptedWallet.set(this, void 0);
|
|
63
|
-
_EncryptedWallet_key.set(this, void 0);
|
|
64
|
-
_EncryptedWallet_password.set(this, void 0);
|
|
65
15
|
if (!engine) {
|
|
66
16
|
throw new Error("Missing cryptography engine");
|
|
67
17
|
}
|
|
68
|
-
|
|
69
|
-
|
|
18
|
+
this.#engine = engine;
|
|
19
|
+
this.#helper = new CryptoHelper(this.#engine);
|
|
70
20
|
}
|
|
71
21
|
/**
|
|
72
22
|
* Whether or not the wallet has been initialized with an email and password
|
|
73
23
|
*/
|
|
74
24
|
get isInitialized() {
|
|
75
|
-
return Boolean(
|
|
25
|
+
return Boolean(this.#email && this.#password && this.#key);
|
|
76
26
|
}
|
|
77
27
|
/**
|
|
78
28
|
* The email provided to the `init` function
|
|
79
29
|
*/
|
|
80
30
|
get email() {
|
|
81
|
-
return
|
|
31
|
+
return this.#email;
|
|
82
32
|
}
|
|
83
33
|
/**
|
|
84
34
|
* A hash derived from the email and password to be used for authentication
|
|
85
35
|
*/
|
|
86
36
|
get passwordHash() {
|
|
87
|
-
|
|
88
|
-
return (_a = __classPrivateFieldGet(this, _EncryptedWallet_key, "f")) === null || _a === void 0 ? void 0 : _a.hashKeyB64;
|
|
37
|
+
return this.#key?.hashKeyB64;
|
|
89
38
|
}
|
|
90
39
|
/**
|
|
91
40
|
* A string representation of the encrypted seed phrase
|
|
92
41
|
*/
|
|
93
42
|
get encryptedWallet() {
|
|
94
|
-
return
|
|
43
|
+
return this.#encryptedWallet;
|
|
95
44
|
}
|
|
96
45
|
/**
|
|
97
46
|
* Set the encrypted wallet by providing a string representation
|
|
@@ -100,85 +49,77 @@ class EncryptedWallet {
|
|
|
100
49
|
set encryptedWallet(wallet) {
|
|
101
50
|
if (wallet === undefined)
|
|
102
51
|
throw new Error("Invalid cipher string");
|
|
103
|
-
|
|
52
|
+
this.#encryptedWallet = new CipherString(wallet).encryptedString;
|
|
104
53
|
}
|
|
105
54
|
/**
|
|
106
55
|
* Get an ID based on the mnemonic
|
|
107
56
|
* Calling `decrypt` will set this value after decryption is successful
|
|
108
57
|
*/
|
|
109
58
|
get deviceId() {
|
|
110
|
-
return
|
|
59
|
+
return this.#deviceId;
|
|
111
60
|
}
|
|
112
61
|
/**
|
|
113
62
|
* Initialize the wallet with and email and password
|
|
114
63
|
*
|
|
115
64
|
* This cannot be done in the constructor because it performs async operations
|
|
116
65
|
*/
|
|
117
|
-
init(email, password, encryptedWallet) {
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
return this;
|
|
132
|
-
});
|
|
66
|
+
async init(email, password, encryptedWallet) {
|
|
67
|
+
if (!(email && typeof email === "string" && email.length > 0)) {
|
|
68
|
+
throw new Error("Invalid email address");
|
|
69
|
+
}
|
|
70
|
+
if (!(password && typeof password === "string" && password.length > 0)) {
|
|
71
|
+
throw new Error("Invalid password");
|
|
72
|
+
}
|
|
73
|
+
this.#email = email.normalize("NFKC").trim().toLowerCase();
|
|
74
|
+
this.#password = password.normalize("NFKC");
|
|
75
|
+
this.#key = await this.#helper.makeKey(this.#password, this.#email);
|
|
76
|
+
if (encryptedWallet) {
|
|
77
|
+
this.encryptedWallet = encryptedWallet;
|
|
78
|
+
}
|
|
79
|
+
return this;
|
|
133
80
|
}
|
|
134
81
|
/**
|
|
135
82
|
* Generate a new mnemonic and encrypt it with the email and password
|
|
136
83
|
*/
|
|
137
|
-
createWallet(mnemonic) {
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
|
|
148
|
-
return this;
|
|
149
|
-
});
|
|
84
|
+
async createWallet(mnemonic) {
|
|
85
|
+
if (!this.isInitialized)
|
|
86
|
+
throw new Error("Wallet is not initialized");
|
|
87
|
+
mnemonic = mnemonic ?? (await this.#helper.generateMnemonic());
|
|
88
|
+
if (!bip39.validateMnemonic(mnemonic)) {
|
|
89
|
+
throw new Error("Invalid mnemonic");
|
|
90
|
+
}
|
|
91
|
+
if (!this.#key)
|
|
92
|
+
throw new Error("Wallet does not contain a key");
|
|
93
|
+
this.#encryptedWallet = (await this.#helper.aesEncrypt(core.toArrayBuffer(utils.fromUtf8ToArray(mnemonic)), this.#key)).toString();
|
|
94
|
+
return this;
|
|
150
95
|
}
|
|
151
96
|
/**
|
|
152
97
|
* Decrypt the encrypted wallet
|
|
153
98
|
* @throws {Error} if the wallet hasn't been initialized or doesn't have an encryptedWallet
|
|
154
99
|
*/
|
|
155
|
-
decrypt(encryptedWallet =
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
throw new Error("Decryption failed");
|
|
169
|
-
});
|
|
100
|
+
async decrypt(encryptedWallet = this.#encryptedWallet) {
|
|
101
|
+
if (!this.isInitialized)
|
|
102
|
+
throw new Error("Wallet is not initialized");
|
|
103
|
+
if (!encryptedWallet)
|
|
104
|
+
throw new Error("Wallet does not contain an encrypted wallet");
|
|
105
|
+
if (!this.#key)
|
|
106
|
+
throw new Error("Wallet does not contain a key");
|
|
107
|
+
const decrypted = await this.#helper.decrypt(new CipherString(encryptedWallet), this.#key);
|
|
108
|
+
if (typeof decrypted === "string" && decrypted.length > 0) {
|
|
109
|
+
this.#deviceId = await this.#helper.getDeviceId(decrypted);
|
|
110
|
+
return decrypted;
|
|
111
|
+
}
|
|
112
|
+
throw new Error("Decryption failed");
|
|
170
113
|
}
|
|
171
114
|
/**
|
|
172
115
|
* Clear all private data to allow it to be garbage collected
|
|
173
116
|
*/
|
|
174
117
|
reset() {
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
|
|
179
|
-
|
|
118
|
+
this.#deviceId = undefined;
|
|
119
|
+
this.#email = undefined;
|
|
120
|
+
this.#encryptedWallet = undefined;
|
|
121
|
+
this.#key = undefined;
|
|
122
|
+
this.#password = undefined;
|
|
180
123
|
}
|
|
181
124
|
}
|
|
182
|
-
exports.EncryptedWallet = EncryptedWallet;
|
|
183
|
-
_EncryptedWallet_engine = new WeakMap(), _EncryptedWallet_helper = new WeakMap(), _EncryptedWallet_deviceId = new WeakMap(), _EncryptedWallet_email = new WeakMap(), _EncryptedWallet_encryptedWallet = new WeakMap(), _EncryptedWallet_key = new WeakMap(), _EncryptedWallet_password = new WeakMap();
|
|
184
125
|
//# sourceMappingURL=EncryptedWallet.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"EncryptedWallet.js","sourceRoot":"","sources":["../../src/crypto/EncryptedWallet.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"EncryptedWallet.js","sourceRoot":"","sources":["../../src/crypto/EncryptedWallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,IAAI,MAAM,8BAA8B,CAAC;AACrD,OAAO,KAAK,KAAK,MAAM,OAAO,CAAC;AAE/B,OAAO,EAAE,YAAY,EAAsB,MAAM,WAAW,CAAC;AAC7D,OAAO,YAAY,MAAM,gBAAgB,CAAC;AAE1C,OAAO,KAAK,KAAK,MAAM,SAAS,CAAC;AAEjC,MAAM,OAAO,eAAe;IACjB,OAAO,CAAe;IACtB,OAAO,CAAe;IAC/B,SAAS,CAAqB;IAC9B,MAAM,CAAqB;IAC3B,gBAAgB,CAAqB;IACrC,IAAI,CAAiC;IACrC,SAAS,CAAqB;IAE9B,YAAY,MAAoB;QAC9B,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;QACD,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,IAAI,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,IAAI,aAAa;QACf,OAAO,OAAO,CAAC,IAAI,CAAC,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,IAAI,CAAC,IAAI,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACH,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAI,YAAY;QACd,OAAO,IAAI,CAAC,IAAI,EAAE,UAAU,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,eAAe;QACjB,OAAO,IAAI,CAAC,gBAAgB,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,IAAI,eAAe,CAAC,MAA0B;QAC5C,IAAI,MAAM,KAAK,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QACnE,IAAI,CAAC,gBAAgB,GAAG,IAAI,YAAY,CAAC,MAAM,CAAC,CAAC,eAAe,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,QAAQ;QACV,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,IAAI,CAAC,KAAa,EAAE,QAAgB,EAAE,eAAwB;QAClE,IAAI,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;YAC9D,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAC3C,CAAC;QACD,IAAI,CAAC,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,IAAI,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;YACvE,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QACtC,CAAC;QAED,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QAC3D,IAAI,CAAC,SAAS,GAAG,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;QAC5C,IAAI,CAAC,IAAI,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpE,IAAI,eAAe,EAAE,CAAC;YACpB,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACzC,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,YAAY,CAAC,QAAiB;QAClC,IAAI,CAAC,IAAI,CAAC,aAAa;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACtE,QAAQ,GAAG,QAAQ,IAAI,CAAC,MAAM,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC,CAAC;QAE/D,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,CAAC;YACtC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QACtC,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACjE,IAAI,CAAC,gBAAgB,GAAG,CACtB,MAAM,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,CAAC,CAC9F,CAAC,QAAQ,EAAE,CAAC;QAEb,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,OAAO,CAAC,eAAe,GAAG,IAAI,CAAC,gBAAgB;QACnD,IAAI,CAAC,IAAI,CAAC,aAAa;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACtE,IAAI,CAAC,eAAe;YAAE,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACrF,IAAI,CAAC,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACjE,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,YAAY,CAAC,eAAe,CAAC,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;QAE3F,IAAI,OAAO,SAAS,KAAK,QAAQ,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1D,IAAI,CAAC,SAAS,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC;YAC3D,OAAO,SAAS,CAAC;QACnB,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED;;OAEG;IACH,KAAK;QACH,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,MAAM,GAAG,SAAS,CAAC;QACxB,IAAI,CAAC,gBAAgB,GAAG,SAAS,CAAC;QAClC,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC;QACtB,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;CACF"}
|
|
@@ -1,15 +1,15 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.CipherString = void 0;
|
|
4
1
|
/*
|
|
5
2
|
Copied from portis: packages/portis-crypto/src/models/cipherString.ts
|
|
6
3
|
*/
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
class CipherString {
|
|
4
|
+
import { fromB64ToArray, fromBufferToB64 } from "../utils";
|
|
5
|
+
import { EncryptedObject } from "./encryptedObject";
|
|
6
|
+
import { EncryptionType } from "./encryptionType";
|
|
7
|
+
export class CipherString {
|
|
8
|
+
encryptionType = EncryptionType.AesCbc256_HmacSha256_B64;
|
|
9
|
+
data;
|
|
10
|
+
iv;
|
|
11
|
+
mac;
|
|
11
12
|
constructor(cipher) {
|
|
12
|
-
this.encryptionType = encryptionType_1.EncryptionType.AesCbc256_HmacSha256_B64;
|
|
13
13
|
let data, iv, mac;
|
|
14
14
|
if (typeof cipher === "string") {
|
|
15
15
|
try {
|
|
@@ -21,24 +21,24 @@ class CipherString {
|
|
|
21
21
|
throw new Error("Invalid cipher string");
|
|
22
22
|
}
|
|
23
23
|
}
|
|
24
|
-
else if (cipher instanceof
|
|
24
|
+
else if (cipher instanceof EncryptedObject) {
|
|
25
25
|
try {
|
|
26
26
|
this.encryptionType = cipher.key.encType;
|
|
27
27
|
if (cipher.iv)
|
|
28
|
-
iv =
|
|
28
|
+
iv = fromBufferToB64(cipher.iv);
|
|
29
29
|
if (cipher.data)
|
|
30
|
-
data =
|
|
30
|
+
data = fromBufferToB64(cipher.data);
|
|
31
31
|
if (cipher.mac)
|
|
32
|
-
mac =
|
|
32
|
+
mac = fromBufferToB64(cipher.mac);
|
|
33
33
|
}
|
|
34
|
-
catch
|
|
34
|
+
catch {
|
|
35
35
|
throw new Error("Invalid encryption object");
|
|
36
36
|
}
|
|
37
37
|
}
|
|
38
38
|
else {
|
|
39
39
|
throw new Error("Invalid cipher data. You must provide a string or Encrypted Object");
|
|
40
40
|
}
|
|
41
|
-
if (!
|
|
41
|
+
if (!EncryptionType[this.encryptionType]) {
|
|
42
42
|
throw new Error("Unsupported encryption method");
|
|
43
43
|
}
|
|
44
44
|
if (!data)
|
|
@@ -55,13 +55,12 @@ class CipherString {
|
|
|
55
55
|
return `${this.encryptionType}.${[this.data, this.iv, this.mac].join("|")}`;
|
|
56
56
|
}
|
|
57
57
|
toEncryptedObject(key) {
|
|
58
|
-
return new
|
|
59
|
-
data:
|
|
60
|
-
iv:
|
|
61
|
-
mac:
|
|
58
|
+
return new EncryptedObject({
|
|
59
|
+
data: fromB64ToArray(this.data),
|
|
60
|
+
iv: fromB64ToArray(this.iv),
|
|
61
|
+
mac: fromB64ToArray(this.mac),
|
|
62
62
|
key,
|
|
63
63
|
});
|
|
64
64
|
}
|
|
65
65
|
}
|
|
66
|
-
exports.CipherString = CipherString;
|
|
67
66
|
//# sourceMappingURL=cipherString.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"cipherString.js","sourceRoot":"","sources":["../../../src/crypto/classes/cipherString.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"cipherString.js","sourceRoot":"","sources":["../../../src/crypto/classes/cipherString.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,UAAU,CAAC;AAC3D,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAGlD,MAAM,OAAO,YAAY;IACd,cAAc,GAAmB,cAAc,CAAC,wBAAwB,CAAC;IAClF,IAAI,CAAS;IACb,EAAE,CAAS;IACX,GAAG,CAAS;IAEZ,YAAY,MAAgC;QAC1C,IAAI,IAAwB,EAAE,EAAsB,EAAE,GAAuB,CAAC;QAC9E,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBACjC,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;gBACxC,CAAC,IAAI,EAAE,EAAE,EAAE,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACzC,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;YAC3C,CAAC;QACH,CAAC;aAAM,IAAI,MAAM,YAAY,eAAe,EAAE,CAAC;YAC7C,IAAI,CAAC;gBACH,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC;gBACzC,IAAI,MAAM,CAAC,EAAE;oBAAE,EAAE,GAAG,eAAe,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBAC/C,IAAI,MAAM,CAAC,IAAI;oBAAE,IAAI,GAAG,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;gBACrD,IAAI,MAAM,CAAC,GAAG;oBAAE,GAAG,GAAG,eAAe,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YACpD,CAAC;YAAC,MAAM,CAAC;gBACP,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oEAAoE,CAAC,CAAC;QACxF,CAAC;QAED,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACxD,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,eAAe,CAAC,CAAC;QAC1C,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,GAAG;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACvD,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,IAAI,eAAe;QACjB,OAAO,GAAG,IAAI,CAAC,cAAc,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC9E,CAAC;IAED,iBAAiB,CAAC,GAAuB;QACvC,OAAO,IAAI,eAAe,CAAC;YACzB,IAAI,EAAE,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC;YAC/B,EAAE,EAAE,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC;YAC3B,GAAG,EAAE,cAAc,CAAC,IAAI,CAAC,GAAG,CAAC;YAC7B,GAAG;SACJ,CAAC,CAAC;IACL,CAAC;CACF"}
|
|
@@ -1,11 +1,12 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.EncryptedObject = void 0;
|
|
4
1
|
/*
|
|
5
2
|
Copied from portis: packages/portis-crypto/src/models/encryptedObject.ts
|
|
6
3
|
*/
|
|
7
|
-
|
|
8
|
-
class EncryptedObject {
|
|
4
|
+
import { CipherString } from "./cipherString";
|
|
5
|
+
export class EncryptedObject {
|
|
6
|
+
key;
|
|
7
|
+
iv;
|
|
8
|
+
data;
|
|
9
|
+
mac;
|
|
9
10
|
constructor({ key, iv, data, mac, }) {
|
|
10
11
|
this.key = key;
|
|
11
12
|
this.iv = iv;
|
|
@@ -13,8 +14,7 @@ class EncryptedObject {
|
|
|
13
14
|
this.mac = mac;
|
|
14
15
|
}
|
|
15
16
|
toString() {
|
|
16
|
-
return new
|
|
17
|
+
return new CipherString(this).encryptedString;
|
|
17
18
|
}
|
|
18
19
|
}
|
|
19
|
-
exports.EncryptedObject = EncryptedObject;
|
|
20
20
|
//# sourceMappingURL=encryptedObject.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"encryptedObject.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptedObject.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"encryptedObject.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptedObject.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AAG9C,MAAM,OAAO,eAAe;IAC1B,GAAG,CAAqB;IACxB,EAAE,CAAc;IAChB,IAAI,CAAc;IAClB,GAAG,CAAc;IAEjB,YAAY,EACV,GAAG,EACH,EAAE,EACF,IAAI,EACJ,GAAG,GAMJ;QACC,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,QAAQ;QACN,OAAO,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,eAAe,CAAC;IAChD,CAAC;CACF"}
|
|
@@ -1,11 +1,8 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.EncryptionType = void 0;
|
|
4
1
|
/*
|
|
5
2
|
Copied from portis: packages/portis-crypto/src/enums/encryptionType.ts
|
|
6
3
|
*/
|
|
7
|
-
var EncryptionType;
|
|
4
|
+
export var EncryptionType;
|
|
8
5
|
(function (EncryptionType) {
|
|
9
6
|
EncryptionType[EncryptionType["AesCbc256_HmacSha256_B64"] = 2] = "AesCbc256_HmacSha256_B64";
|
|
10
|
-
})(EncryptionType || (
|
|
7
|
+
})(EncryptionType || (EncryptionType = {}));
|
|
11
8
|
//# sourceMappingURL=encryptionType.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"encryptionType.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptionType.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"encryptionType.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptionType.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,MAAM,CAAN,IAAY,cAEX;AAFD,WAAY,cAAc;IACxB,2FAA4B,CAAA;AAC9B,CAAC,EAFW,cAAc,KAAd,cAAc,QAEzB"}
|
|
@@ -1,12 +1,5 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
Object.defineProperty(exports, "CipherString", { enumerable: true, get: function () { return cipherString_1.CipherString; } });
|
|
6
|
-
var encryptedObject_1 = require("./encryptedObject");
|
|
7
|
-
Object.defineProperty(exports, "EncryptedObject", { enumerable: true, get: function () { return encryptedObject_1.EncryptedObject; } });
|
|
8
|
-
var encryptionType_1 = require("./encryptionType");
|
|
9
|
-
Object.defineProperty(exports, "EncryptionType", { enumerable: true, get: function () { return encryptionType_1.EncryptionType; } });
|
|
10
|
-
var symmetricCryptoKey_1 = require("./symmetricCryptoKey");
|
|
11
|
-
Object.defineProperty(exports, "SymmetricCryptoKey", { enumerable: true, get: function () { return symmetricCryptoKey_1.SymmetricCryptoKey; } });
|
|
1
|
+
export { CipherString } from "./cipherString";
|
|
2
|
+
export { EncryptedObject } from "./encryptedObject";
|
|
3
|
+
export { EncryptionType } from "./encryptionType";
|
|
4
|
+
export { SymmetricCryptoKey } from "./symmetricCryptoKey";
|
|
12
5
|
//# sourceMappingURL=index.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/classes/index.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/classes/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AAC9C,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAClD,OAAO,EAAE,kBAAkB,EAAE,MAAM,sBAAsB,CAAC"}
|
|
@@ -1,14 +1,17 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.SymmetricCryptoKey = void 0;
|
|
4
1
|
/*
|
|
5
2
|
Copied from portis: packages/portis-crypto/src/models/symmetricCryptoKey.ts
|
|
6
3
|
*/
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
class SymmetricCryptoKey {
|
|
4
|
+
import { fromBufferToB64 } from "../utils";
|
|
5
|
+
import { EncryptionType } from "./encryptionType";
|
|
6
|
+
export class SymmetricCryptoKey {
|
|
7
|
+
hashKey;
|
|
8
|
+
encKey;
|
|
9
|
+
macKey;
|
|
10
|
+
encType = EncryptionType.AesCbc256_HmacSha256_B64;
|
|
11
|
+
hashKeyB64;
|
|
12
|
+
encKeyB64;
|
|
13
|
+
macKeyB64;
|
|
10
14
|
constructor(hashKey, encKey, mac) {
|
|
11
|
-
this.encType = encryptionType_1.EncryptionType.AesCbc256_HmacSha256_B64;
|
|
12
15
|
if (hashKey == null)
|
|
13
16
|
throw new Error("Required parameter [hashKey] was not provided");
|
|
14
17
|
if (encKey == null)
|
|
@@ -20,10 +23,9 @@ class SymmetricCryptoKey {
|
|
|
20
23
|
this.hashKey = hashKey;
|
|
21
24
|
this.encKey = encKey;
|
|
22
25
|
this.macKey = mac;
|
|
23
|
-
this.hashKeyB64 =
|
|
24
|
-
this.encKeyB64 =
|
|
25
|
-
this.macKeyB64 =
|
|
26
|
+
this.hashKeyB64 = fromBufferToB64(this.hashKey);
|
|
27
|
+
this.encKeyB64 = fromBufferToB64(this.encKey);
|
|
28
|
+
this.macKeyB64 = fromBufferToB64(this.macKey);
|
|
26
29
|
}
|
|
27
30
|
}
|
|
28
|
-
exports.SymmetricCryptoKey = SymmetricCryptoKey;
|
|
29
31
|
//# sourceMappingURL=symmetricCryptoKey.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"symmetricCryptoKey.js","sourceRoot":"","sources":["../../../src/crypto/classes/symmetricCryptoKey.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"symmetricCryptoKey.js","sourceRoot":"","sources":["../../../src/crypto/classes/symmetricCryptoKey.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,eAAe,EAAE,MAAM,UAAU,CAAC;AAC3C,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAElD,MAAM,OAAO,kBAAkB;IAC7B,OAAO,CAAc;IACrB,MAAM,CAAc;IACpB,MAAM,CAAqB;IAC3B,OAAO,GAAmB,cAAc,CAAC,wBAAwB,CAAC;IAElE,UAAU,CAAS;IACnB,SAAS,CAAS;IAClB,SAAS,CAAS;IAElB,YAAY,OAAoB,EAAE,MAAmB,EAAE,GAAgB;QACrE,IAAI,OAAO,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACtF,IAAI,MAAM,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;QACpF,IAAI,GAAG,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAE9E,IAAI,OAAO,CAAC,UAAU,KAAK,EAAE,IAAI,MAAM,CAAC,UAAU,KAAK,EAAE,IAAI,GAAG,CAAC,UAAU,KAAK,EAAE;YAChF,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAE3C,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,MAAM,GAAG,GAAG,CAAC;QAElB,IAAI,CAAC,UAAU,GAAG,eAAe,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,SAAS,GAAG,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAChD,CAAC;CACF"}
|
|
@@ -1,19 +1,3 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
-
};
|
|
16
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
-
__exportStar(require("./types"), exports);
|
|
18
|
-
__exportStar(require("./web-crypto"), exports);
|
|
1
|
+
export * from "./types";
|
|
2
|
+
export * from "./web-crypto";
|
|
19
3
|
//# sourceMappingURL=index.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/engines/index.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/engines/index.ts"],"names":[],"mappings":"AAAA,cAAc,SAAS,CAAC;AACxB,cAAc,cAAc,CAAC"}
|
|
@@ -1,9 +1,6 @@
|
|
|
1
|
-
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.DigestAlgorithm = void 0;
|
|
4
|
-
var DigestAlgorithm;
|
|
1
|
+
export var DigestAlgorithm;
|
|
5
2
|
(function (DigestAlgorithm) {
|
|
6
3
|
DigestAlgorithm[DigestAlgorithm["SHA256"] = 0] = "SHA256";
|
|
7
4
|
DigestAlgorithm[DigestAlgorithm["SHA512"] = 1] = "SHA512";
|
|
8
|
-
})(DigestAlgorithm || (
|
|
5
|
+
})(DigestAlgorithm || (DigestAlgorithm = {}));
|
|
9
6
|
//# sourceMappingURL=types.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/crypto/engines/types.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/crypto/engines/types.ts"],"names":[],"mappings":"AAYA,MAAM,CAAN,IAAY,eAGX;AAHD,WAAY,eAAe;IACzB,yDAAM,CAAA;IACN,yDAAM,CAAA;AACR,CAAC,EAHW,eAAe,KAAf,eAAe,QAG1B"}
|