@shapeshiftoss/hdwallet-native 1.55.4-alpha.1 → 1.55.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (117) hide show
  1. package/dist/adapter.js +61 -22
  2. package/dist/adapter.js.map +1 -1
  3. package/dist/arkeo.js +123 -54
  4. package/dist/arkeo.js.map +1 -1
  5. package/dist/binance.js +194 -123
  6. package/dist/binance.js.map +1 -1
  7. package/dist/bitcoin.js +284 -219
  8. package/dist/bitcoin.js.map +1 -1
  9. package/dist/cosmos.js +123 -54
  10. package/dist/cosmos.js.map +1 -1
  11. package/dist/crypto/CryptoHelper.js +172 -106
  12. package/dist/crypto/CryptoHelper.js.map +1 -1
  13. package/dist/crypto/EncryptedWallet.js +123 -64
  14. package/dist/crypto/EncryptedWallet.js.map +1 -1
  15. package/dist/crypto/classes/cipherString.js +19 -18
  16. package/dist/crypto/classes/cipherString.js.map +1 -1
  17. package/dist/crypto/classes/encryptedObject.js +7 -7
  18. package/dist/crypto/classes/encryptedObject.js.map +1 -1
  19. package/dist/crypto/classes/encryptionType.js +5 -2
  20. package/dist/crypto/classes/encryptionType.js.map +1 -1
  21. package/dist/crypto/classes/index.js +11 -4
  22. package/dist/crypto/classes/index.js.map +1 -1
  23. package/dist/crypto/classes/symmetricCryptoKey.js +11 -13
  24. package/dist/crypto/classes/symmetricCryptoKey.js.map +1 -1
  25. package/dist/crypto/engines/index.js +18 -2
  26. package/dist/crypto/engines/index.js.map +1 -1
  27. package/dist/crypto/engines/types.js +5 -2
  28. package/dist/crypto/engines/types.js.map +1 -1
  29. package/dist/crypto/engines/web-crypto.js +84 -39
  30. package/dist/crypto/engines/web-crypto.js.map +1 -1
  31. package/dist/crypto/index.js +32 -3
  32. package/dist/crypto/index.js.map +1 -1
  33. package/dist/crypto/isolation/adapters/binance.js +51 -12
  34. package/dist/crypto/isolation/adapters/binance.js.map +1 -1
  35. package/dist/crypto/isolation/adapters/bip32.js +108 -65
  36. package/dist/crypto/isolation/adapters/bip32.js.map +1 -1
  37. package/dist/crypto/isolation/adapters/bitcoin.js +84 -41
  38. package/dist/crypto/isolation/adapters/bitcoin.js.map +1 -1
  39. package/dist/crypto/isolation/adapters/cosmos.js +24 -9
  40. package/dist/crypto/isolation/adapters/cosmos.js.map +1 -1
  41. package/dist/crypto/isolation/adapters/cosmosDirect.js +77 -35
  42. package/dist/crypto/isolation/adapters/cosmosDirect.js.map +1 -1
  43. package/dist/crypto/isolation/adapters/ethereum.js +90 -49
  44. package/dist/crypto/isolation/adapters/ethereum.js.map +1 -1
  45. package/dist/crypto/isolation/adapters/fio.js +67 -24
  46. package/dist/crypto/isolation/adapters/fio.js.map +1 -1
  47. package/dist/crypto/isolation/adapters/index.js +20 -7
  48. package/dist/crypto/isolation/adapters/index.js.map +1 -1
  49. package/dist/crypto/isolation/core/bip32/index.js +50 -22
  50. package/dist/crypto/isolation/core/bip32/index.js.map +1 -1
  51. package/dist/crypto/isolation/core/bip32/interfaces.js +28 -2
  52. package/dist/crypto/isolation/core/bip32/interfaces.js.map +1 -1
  53. package/dist/crypto/isolation/core/bip32/types.js +8 -5
  54. package/dist/crypto/isolation/core/bip32/types.js.map +1 -1
  55. package/dist/crypto/isolation/core/bip39/index.js +17 -1
  56. package/dist/crypto/isolation/core/bip39/index.js.map +1 -1
  57. package/dist/crypto/isolation/core/bip39/interfaces.js +2 -1
  58. package/dist/crypto/isolation/core/digest/algorithms.js +32 -23
  59. package/dist/crypto/isolation/core/digest/algorithms.js.map +1 -1
  60. package/dist/crypto/isolation/core/digest/index.js +18 -2
  61. package/dist/crypto/isolation/core/digest/index.js.map +1 -1
  62. package/dist/crypto/isolation/core/digest/types.js +26 -23
  63. package/dist/crypto/isolation/core/digest/types.js.map +1 -1
  64. package/dist/crypto/isolation/core/index.js +32 -5
  65. package/dist/crypto/isolation/core/index.js.map +1 -1
  66. package/dist/crypto/isolation/core/secp256k1/index.js +18 -2
  67. package/dist/crypto/isolation/core/secp256k1/index.js.map +1 -1
  68. package/dist/crypto/isolation/core/secp256k1/interfaces.js +2 -1
  69. package/dist/crypto/isolation/core/secp256k1/types.js +157 -119
  70. package/dist/crypto/isolation/core/secp256k1/types.js.map +1 -1
  71. package/dist/crypto/isolation/engines/default/bip32.js +176 -102
  72. package/dist/crypto/isolation/engines/default/bip32.js.map +1 -1
  73. package/dist/crypto/isolation/engines/default/bip39.js +68 -24
  74. package/dist/crypto/isolation/engines/default/bip39.js.map +1 -1
  75. package/dist/crypto/isolation/engines/default/index.js +32 -3
  76. package/dist/crypto/isolation/engines/default/index.js.map +1 -1
  77. package/dist/crypto/isolation/engines/default/revocable.js +51 -30
  78. package/dist/crypto/isolation/engines/default/revocable.js.map +1 -1
  79. package/dist/crypto/isolation/engines/dummy/bip32.js +121 -63
  80. package/dist/crypto/isolation/engines/dummy/bip32.js.map +1 -1
  81. package/dist/crypto/isolation/engines/dummy/bip39.js +97 -55
  82. package/dist/crypto/isolation/engines/dummy/bip39.js.map +1 -1
  83. package/dist/crypto/isolation/engines/dummy/index.js +30 -3
  84. package/dist/crypto/isolation/engines/dummy/index.js.map +1 -1
  85. package/dist/crypto/isolation/engines/dummy/types.js +5 -1
  86. package/dist/crypto/isolation/engines/dummy/types.js.map +1 -1
  87. package/dist/crypto/isolation/engines/index.js +28 -2
  88. package/dist/crypto/isolation/engines/index.js.map +1 -1
  89. package/dist/crypto/isolation/index.js +29 -3
  90. package/dist/crypto/isolation/index.js.map +1 -1
  91. package/dist/crypto/isolation/types.js +49 -43
  92. package/dist/crypto/isolation/types.js.map +1 -1
  93. package/dist/crypto/utils.js +13 -7
  94. package/dist/crypto/utils.js.map +1 -1
  95. package/dist/ethereum.js +160 -92
  96. package/dist/ethereum.js.map +1 -1
  97. package/dist/fio.js +282 -204
  98. package/dist/fio.js.map +1 -1
  99. package/dist/index.js +32 -3
  100. package/dist/index.js.map +1 -1
  101. package/dist/kava.js +119 -50
  102. package/dist/kava.js.map +1 -1
  103. package/dist/native.js +304 -176
  104. package/dist/native.js.map +1 -1
  105. package/dist/networks.js +33 -16
  106. package/dist/networks.js.map +1 -1
  107. package/dist/osmosis.js +123 -54
  108. package/dist/osmosis.js.map +1 -1
  109. package/dist/secret.js +119 -50
  110. package/dist/secret.js.map +1 -1
  111. package/dist/terra.js +119 -50
  112. package/dist/terra.js.map +1 -1
  113. package/dist/thorchain.js +123 -54
  114. package/dist/thorchain.js.map +1 -1
  115. package/dist/util.js +54 -16
  116. package/dist/util.js.map +1 -1
  117. package/package.json +3 -3
@@ -1,46 +1,97 @@
1
- import * as core from "@shapeshiftoss/hdwallet-core";
2
- import * as bip39 from "bip39";
3
- import { CipherString } from "./classes";
4
- import CryptoHelper from "./CryptoHelper";
5
- import * as utils from "./utils";
6
- export class EncryptedWallet {
7
- #engine;
8
- #helper;
9
- #deviceId;
10
- #email;
11
- #encryptedWallet;
12
- #key;
13
- #password;
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || function (mod) {
19
+ if (mod && mod.__esModule) return mod;
20
+ var result = {};
21
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
+ __setModuleDefault(result, mod);
23
+ return result;
24
+ };
25
+ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
26
+ function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
27
+ return new (P || (P = Promise))(function (resolve, reject) {
28
+ function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
29
+ function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
30
+ function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
31
+ step((generator = generator.apply(thisArg, _arguments || [])).next());
32
+ });
33
+ };
34
+ var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
35
+ if (kind === "m") throw new TypeError("Private method is not writable");
36
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
37
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
38
+ return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
39
+ };
40
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
41
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
42
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
43
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
44
+ };
45
+ var __importDefault = (this && this.__importDefault) || function (mod) {
46
+ return (mod && mod.__esModule) ? mod : { "default": mod };
47
+ };
48
+ var _EncryptedWallet_engine, _EncryptedWallet_helper, _EncryptedWallet_deviceId, _EncryptedWallet_email, _EncryptedWallet_encryptedWallet, _EncryptedWallet_key, _EncryptedWallet_password;
49
+ Object.defineProperty(exports, "__esModule", { value: true });
50
+ exports.EncryptedWallet = void 0;
51
+ const core = __importStar(require("@shapeshiftoss/hdwallet-core"));
52
+ const bip39 = __importStar(require("bip39"));
53
+ const classes_1 = require("./classes");
54
+ const CryptoHelper_1 = __importDefault(require("./CryptoHelper"));
55
+ const utils = __importStar(require("./utils"));
56
+ class EncryptedWallet {
14
57
  constructor(engine) {
58
+ _EncryptedWallet_engine.set(this, void 0);
59
+ _EncryptedWallet_helper.set(this, void 0);
60
+ _EncryptedWallet_deviceId.set(this, void 0);
61
+ _EncryptedWallet_email.set(this, void 0);
62
+ _EncryptedWallet_encryptedWallet.set(this, void 0);
63
+ _EncryptedWallet_key.set(this, void 0);
64
+ _EncryptedWallet_password.set(this, void 0);
15
65
  if (!engine) {
16
66
  throw new Error("Missing cryptography engine");
17
67
  }
18
- this.#engine = engine;
19
- this.#helper = new CryptoHelper(this.#engine);
68
+ __classPrivateFieldSet(this, _EncryptedWallet_engine, engine, "f");
69
+ __classPrivateFieldSet(this, _EncryptedWallet_helper, new CryptoHelper_1.default(__classPrivateFieldGet(this, _EncryptedWallet_engine, "f")), "f");
20
70
  }
21
71
  /**
22
72
  * Whether or not the wallet has been initialized with an email and password
23
73
  */
24
74
  get isInitialized() {
25
- return Boolean(this.#email && this.#password && this.#key);
75
+ return Boolean(__classPrivateFieldGet(this, _EncryptedWallet_email, "f") && __classPrivateFieldGet(this, _EncryptedWallet_password, "f") && __classPrivateFieldGet(this, _EncryptedWallet_key, "f"));
26
76
  }
27
77
  /**
28
78
  * The email provided to the `init` function
29
79
  */
30
80
  get email() {
31
- return this.#email;
81
+ return __classPrivateFieldGet(this, _EncryptedWallet_email, "f");
32
82
  }
33
83
  /**
34
84
  * A hash derived from the email and password to be used for authentication
35
85
  */
36
86
  get passwordHash() {
37
- return this.#key?.hashKeyB64;
87
+ var _a;
88
+ return (_a = __classPrivateFieldGet(this, _EncryptedWallet_key, "f")) === null || _a === void 0 ? void 0 : _a.hashKeyB64;
38
89
  }
39
90
  /**
40
91
  * A string representation of the encrypted seed phrase
41
92
  */
42
93
  get encryptedWallet() {
43
- return this.#encryptedWallet;
94
+ return __classPrivateFieldGet(this, _EncryptedWallet_encryptedWallet, "f");
44
95
  }
45
96
  /**
46
97
  * Set the encrypted wallet by providing a string representation
@@ -49,77 +100,85 @@ export class EncryptedWallet {
49
100
  set encryptedWallet(wallet) {
50
101
  if (wallet === undefined)
51
102
  throw new Error("Invalid cipher string");
52
- this.#encryptedWallet = new CipherString(wallet).encryptedString;
103
+ __classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, new classes_1.CipherString(wallet).encryptedString, "f");
53
104
  }
54
105
  /**
55
106
  * Get an ID based on the mnemonic
56
107
  * Calling `decrypt` will set this value after decryption is successful
57
108
  */
58
109
  get deviceId() {
59
- return this.#deviceId;
110
+ return __classPrivateFieldGet(this, _EncryptedWallet_deviceId, "f");
60
111
  }
61
112
  /**
62
113
  * Initialize the wallet with and email and password
63
114
  *
64
115
  * This cannot be done in the constructor because it performs async operations
65
116
  */
66
- async init(email, password, encryptedWallet) {
67
- if (!(email && typeof email === "string" && email.length > 0)) {
68
- throw new Error("Invalid email address");
69
- }
70
- if (!(password && typeof password === "string" && password.length > 0)) {
71
- throw new Error("Invalid password");
72
- }
73
- this.#email = email.normalize("NFKC").trim().toLowerCase();
74
- this.#password = password.normalize("NFKC");
75
- this.#key = await this.#helper.makeKey(this.#password, this.#email);
76
- if (encryptedWallet) {
77
- this.encryptedWallet = encryptedWallet;
78
- }
79
- return this;
117
+ init(email, password, encryptedWallet) {
118
+ return __awaiter(this, void 0, void 0, function* () {
119
+ if (!(email && typeof email === "string" && email.length > 0)) {
120
+ throw new Error("Invalid email address");
121
+ }
122
+ if (!(password && typeof password === "string" && password.length > 0)) {
123
+ throw new Error("Invalid password");
124
+ }
125
+ __classPrivateFieldSet(this, _EncryptedWallet_email, email.normalize("NFKC").trim().toLowerCase(), "f");
126
+ __classPrivateFieldSet(this, _EncryptedWallet_password, password.normalize("NFKC"), "f");
127
+ __classPrivateFieldSet(this, _EncryptedWallet_key, yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").makeKey(__classPrivateFieldGet(this, _EncryptedWallet_password, "f"), __classPrivateFieldGet(this, _EncryptedWallet_email, "f")), "f");
128
+ if (encryptedWallet) {
129
+ this.encryptedWallet = encryptedWallet;
130
+ }
131
+ return this;
132
+ });
80
133
  }
81
134
  /**
82
135
  * Generate a new mnemonic and encrypt it with the email and password
83
136
  */
84
- async createWallet(mnemonic) {
85
- if (!this.isInitialized)
86
- throw new Error("Wallet is not initialized");
87
- mnemonic = mnemonic ?? (await this.#helper.generateMnemonic());
88
- if (!bip39.validateMnemonic(mnemonic)) {
89
- throw new Error("Invalid mnemonic");
90
- }
91
- if (!this.#key)
92
- throw new Error("Wallet does not contain a key");
93
- this.#encryptedWallet = (await this.#helper.aesEncrypt(core.toArrayBuffer(utils.fromUtf8ToArray(mnemonic)), this.#key)).toString();
94
- return this;
137
+ createWallet(mnemonic) {
138
+ return __awaiter(this, void 0, void 0, function* () {
139
+ if (!this.isInitialized)
140
+ throw new Error("Wallet is not initialized");
141
+ mnemonic = mnemonic !== null && mnemonic !== void 0 ? mnemonic : (yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").generateMnemonic());
142
+ if (!bip39.validateMnemonic(mnemonic)) {
143
+ throw new Error("Invalid mnemonic");
144
+ }
145
+ if (!__classPrivateFieldGet(this, _EncryptedWallet_key, "f"))
146
+ throw new Error("Wallet does not contain a key");
147
+ __classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, (yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").aesEncrypt(core.toArrayBuffer(utils.fromUtf8ToArray(mnemonic)), __classPrivateFieldGet(this, _EncryptedWallet_key, "f"))).toString(), "f");
148
+ return this;
149
+ });
95
150
  }
96
151
  /**
97
152
  * Decrypt the encrypted wallet
98
153
  * @throws {Error} if the wallet hasn't been initialized or doesn't have an encryptedWallet
99
154
  */
100
- async decrypt(encryptedWallet = this.#encryptedWallet) {
101
- if (!this.isInitialized)
102
- throw new Error("Wallet is not initialized");
103
- if (!encryptedWallet)
104
- throw new Error("Wallet does not contain an encrypted wallet");
105
- if (!this.#key)
106
- throw new Error("Wallet does not contain a key");
107
- const decrypted = await this.#helper.decrypt(new CipherString(encryptedWallet), this.#key);
108
- if (typeof decrypted === "string" && decrypted.length > 0) {
109
- this.#deviceId = await this.#helper.getDeviceId(decrypted);
110
- return decrypted;
111
- }
112
- throw new Error("Decryption failed");
155
+ decrypt() {
156
+ return __awaiter(this, arguments, void 0, function* (encryptedWallet = __classPrivateFieldGet(this, _EncryptedWallet_encryptedWallet, "f")) {
157
+ if (!this.isInitialized)
158
+ throw new Error("Wallet is not initialized");
159
+ if (!encryptedWallet)
160
+ throw new Error("Wallet does not contain an encrypted wallet");
161
+ if (!__classPrivateFieldGet(this, _EncryptedWallet_key, "f"))
162
+ throw new Error("Wallet does not contain a key");
163
+ const decrypted = yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").decrypt(new classes_1.CipherString(encryptedWallet), __classPrivateFieldGet(this, _EncryptedWallet_key, "f"));
164
+ if (typeof decrypted === "string" && decrypted.length > 0) {
165
+ __classPrivateFieldSet(this, _EncryptedWallet_deviceId, yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").getDeviceId(decrypted), "f");
166
+ return decrypted;
167
+ }
168
+ throw new Error("Decryption failed");
169
+ });
113
170
  }
114
171
  /**
115
172
  * Clear all private data to allow it to be garbage collected
116
173
  */
117
174
  reset() {
118
- this.#deviceId = undefined;
119
- this.#email = undefined;
120
- this.#encryptedWallet = undefined;
121
- this.#key = undefined;
122
- this.#password = undefined;
175
+ __classPrivateFieldSet(this, _EncryptedWallet_deviceId, undefined, "f");
176
+ __classPrivateFieldSet(this, _EncryptedWallet_email, undefined, "f");
177
+ __classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, undefined, "f");
178
+ __classPrivateFieldSet(this, _EncryptedWallet_key, undefined, "f");
179
+ __classPrivateFieldSet(this, _EncryptedWallet_password, undefined, "f");
123
180
  }
124
181
  }
182
+ exports.EncryptedWallet = EncryptedWallet;
183
+ _EncryptedWallet_engine = new WeakMap(), _EncryptedWallet_helper = new WeakMap(), _EncryptedWallet_deviceId = new WeakMap(), _EncryptedWallet_email = new WeakMap(), _EncryptedWallet_encryptedWallet = new WeakMap(), _EncryptedWallet_key = new WeakMap(), _EncryptedWallet_password = new WeakMap();
125
184
  //# sourceMappingURL=EncryptedWallet.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"EncryptedWallet.js","sourceRoot":"","sources":["../../src/crypto/EncryptedWallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,IAAI,MAAM,8BAA8B,CAAC;AACrD,OAAO,KAAK,KAAK,MAAM,OAAO,CAAC;AAE/B,OAAO,EAAE,YAAY,EAAsB,MAAM,WAAW,CAAC;AAC7D,OAAO,YAAY,MAAM,gBAAgB,CAAC;AAE1C,OAAO,KAAK,KAAK,MAAM,SAAS,CAAC;AAEjC,MAAM,OAAO,eAAe;IACjB,OAAO,CAAe;IACtB,OAAO,CAAe;IAC/B,SAAS,CAAqB;IAC9B,MAAM,CAAqB;IAC3B,gBAAgB,CAAqB;IACrC,IAAI,CAAiC;IACrC,SAAS,CAAqB;IAE9B,YAAY,MAAoB;QAC9B,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;QACD,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC;QACtB,IAAI,CAAC,OAAO,GAAG,IAAI,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,IAAI,aAAa;QACf,OAAO,OAAO,CAAC,IAAI,CAAC,MAAM,IAAI,IAAI,CAAC,SAAS,IAAI,IAAI,CAAC,IAAI,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACH,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAI,YAAY;QACd,OAAO,IAAI,CAAC,IAAI,EAAE,UAAU,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,eAAe;QACjB,OAAO,IAAI,CAAC,gBAAgB,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,IAAI,eAAe,CAAC,MAA0B;QAC5C,IAAI,MAAM,KAAK,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QACnE,IAAI,CAAC,gBAAgB,GAAG,IAAI,YAAY,CAAC,MAAM,CAAC,CAAC,eAAe,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,QAAQ;QACV,OAAO,IAAI,CAAC,SAAS,CAAC;IACxB,CAAC;IAED;;;;OAIG;IACH,KAAK,CAAC,IAAI,CAAC,KAAa,EAAE,QAAgB,EAAE,eAAwB;QAClE,IAAI,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;YAC9D,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAC3C,CAAC;QACD,IAAI,CAAC,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,IAAI,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;YACvE,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QACtC,CAAC;QAED,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;QAC3D,IAAI,CAAC,SAAS,GAAG,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;QAC5C,IAAI,CAAC,IAAI,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QAEpE,IAAI,eAAe,EAAE,CAAC;YACpB,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;QACzC,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACH,KAAK,CAAC,YAAY,CAAC,QAAiB;QAClC,IAAI,CAAC,IAAI,CAAC,aAAa;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACtE,QAAQ,GAAG,QAAQ,IAAI,CAAC,MAAM,IAAI,CAAC,OAAO,CAAC,gBAAgB,EAAE,CAAC,CAAC;QAE/D,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,CAAC;YACtC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;QACtC,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACjE,IAAI,CAAC,gBAAgB,GAAG,CACtB,MAAM,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,CAAC,CAC9F,CAAC,QAAQ,EAAE,CAAC;QAEb,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,OAAO,CAAC,eAAe,GAAG,IAAI,CAAC,gBAAgB;QACnD,IAAI,CAAC,IAAI,CAAC,aAAa;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACtE,IAAI,CAAC,eAAe;YAAE,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;QACrF,IAAI,CAAC,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACjE,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,OAAO,CAAC,IAAI,YAAY,CAAC,eAAe,CAAC,EAAE,IAAI,CAAC,IAAI,CAAC,CAAC;QAE3F,IAAI,OAAO,SAAS,KAAK,QAAQ,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1D,IAAI,CAAC,SAAS,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,SAAS,CAAC,CAAC;YAC3D,OAAO,SAAS,CAAC;QACnB,CAAC;QACD,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED;;OAEG;IACH,KAAK;QACH,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;QAC3B,IAAI,CAAC,MAAM,GAAG,SAAS,CAAC;QACxB,IAAI,CAAC,gBAAgB,GAAG,SAAS,CAAC;QAClC,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC;QACtB,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;CACF"}
1
+ {"version":3,"file":"EncryptedWallet.js","sourceRoot":"","sources":["../../src/crypto/EncryptedWallet.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mEAAqD;AACrD,6CAA+B;AAE/B,uCAA6D;AAC7D,kEAA0C;AAE1C,+CAAiC;AAEjC,MAAa,eAAe;IAS1B,YAAY,MAAoB;QARvB,0CAAsB;QACtB,0CAAsB;QAC/B,4CAA8B;QAC9B,yCAA2B;QAC3B,mDAAqC;QACrC,uCAAqC;QACrC,4CAA8B;QAG5B,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;QACD,uBAAA,IAAI,2BAAW,MAAM,MAAA,CAAC;QACtB,uBAAA,IAAI,2BAAW,IAAI,sBAAY,CAAC,uBAAA,IAAI,+BAAQ,CAAC,MAAA,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,IAAI,aAAa;QACf,OAAO,OAAO,CAAC,uBAAA,IAAI,8BAAO,IAAI,uBAAA,IAAI,iCAAU,IAAI,uBAAA,IAAI,4BAAK,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACH,IAAI,KAAK;QACP,OAAO,uBAAA,IAAI,8BAAO,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAI,YAAY;;QACd,OAAO,MAAA,uBAAA,IAAI,4BAAK,0CAAE,UAAU,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,eAAe;QACjB,OAAO,uBAAA,IAAI,wCAAiB,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,IAAI,eAAe,CAAC,MAA0B;QAC5C,IAAI,MAAM,KAAK,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QACnE,uBAAA,IAAI,oCAAoB,IAAI,sBAAY,CAAC,MAAM,CAAC,CAAC,eAAe,MAAA,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,QAAQ;QACV,OAAO,uBAAA,IAAI,iCAAU,CAAC;IACxB,CAAC;IAED;;;;OAIG;IACG,IAAI,CAAC,KAAa,EAAE,QAAgB,EAAE,eAAwB;;YAClE,IAAI,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;gBAC9D,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;YAC3C,CAAC;YACD,IAAI,CAAC,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,IAAI,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;gBACvE,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;YACtC,CAAC;YAED,uBAAA,IAAI,0BAAU,KAAK,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,MAAA,CAAC;YAC3D,uBAAA,IAAI,6BAAa,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,MAAA,CAAC;YAC5C,uBAAA,IAAI,wBAAQ,MAAM,uBAAA,IAAI,+BAAQ,CAAC,OAAO,CAAC,uBAAA,IAAI,iCAAU,EAAE,uBAAA,IAAI,8BAAO,CAAC,MAAA,CAAC;YAEpE,IAAI,eAAe,EAAE,CAAC;gBACpB,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;YACzC,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED;;OAEG;IACG,YAAY,CAAC,QAAiB;;YAClC,IAAI,CAAC,IAAI,CAAC,aAAa;gBAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YACtE,QAAQ,GAAG,QAAQ,aAAR,QAAQ,cAAR,QAAQ,GAAI,CAAC,MAAM,uBAAA,IAAI,+BAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAE/D,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACtC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;YACtC,CAAC;YAED,IAAI,CAAC,uBAAA,IAAI,4BAAK;gBAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACjE,uBAAA,IAAI,oCAAoB,CACtB,MAAM,uBAAA,IAAI,+BAAQ,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC,EAAE,uBAAA,IAAI,4BAAK,CAAC,CAC9F,CAAC,QAAQ,EAAE,MAAA,CAAC;YAEb,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED;;;OAGG;IACG,OAAO;6DAAC,eAAe,GAAG,uBAAA,IAAI,wCAAiB;YACnD,IAAI,CAAC,IAAI,CAAC,aAAa;gBAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YACtE,IAAI,CAAC,eAAe;gBAAE,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;YACrF,IAAI,CAAC,uBAAA,IAAI,4BAAK;gBAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACjE,MAAM,SAAS,GAAG,MAAM,uBAAA,IAAI,+BAAQ,CAAC,OAAO,CAAC,IAAI,sBAAY,CAAC,eAAe,CAAC,EAAE,uBAAA,IAAI,4BAAK,CAAC,CAAC;YAE3F,IAAI,OAAO,SAAS,KAAK,QAAQ,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC1D,uBAAA,IAAI,6BAAa,MAAM,uBAAA,IAAI,+BAAQ,CAAC,WAAW,CAAC,SAAS,CAAC,MAAA,CAAC;gBAC3D,OAAO,SAAS,CAAC;YACnB,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;QACvC,CAAC;KAAA;IAED;;OAEG;IACH,KAAK;QACH,uBAAA,IAAI,6BAAa,SAAS,MAAA,CAAC;QAC3B,uBAAA,IAAI,0BAAU,SAAS,MAAA,CAAC;QACxB,uBAAA,IAAI,oCAAoB,SAAS,MAAA,CAAC;QAClC,uBAAA,IAAI,wBAAQ,SAAS,MAAA,CAAC;QACtB,uBAAA,IAAI,6BAAa,SAAS,MAAA,CAAC;IAC7B,CAAC;CACF;AApID,0CAoIC"}
@@ -1,15 +1,15 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.CipherString = void 0;
1
4
  /*
2
5
  Copied from portis: packages/portis-crypto/src/models/cipherString.ts
3
6
  */
4
- import { fromB64ToArray, fromBufferToB64 } from "../utils";
5
- import { EncryptedObject } from "./encryptedObject";
6
- import { EncryptionType } from "./encryptionType";
7
- export class CipherString {
8
- encryptionType = EncryptionType.AesCbc256_HmacSha256_B64;
9
- data;
10
- iv;
11
- mac;
7
+ const utils_1 = require("../utils");
8
+ const encryptedObject_1 = require("./encryptedObject");
9
+ const encryptionType_1 = require("./encryptionType");
10
+ class CipherString {
12
11
  constructor(cipher) {
12
+ this.encryptionType = encryptionType_1.EncryptionType.AesCbc256_HmacSha256_B64;
13
13
  let data, iv, mac;
14
14
  if (typeof cipher === "string") {
15
15
  try {
@@ -21,24 +21,24 @@ export class CipherString {
21
21
  throw new Error("Invalid cipher string");
22
22
  }
23
23
  }
24
- else if (cipher instanceof EncryptedObject) {
24
+ else if (cipher instanceof encryptedObject_1.EncryptedObject) {
25
25
  try {
26
26
  this.encryptionType = cipher.key.encType;
27
27
  if (cipher.iv)
28
- iv = fromBufferToB64(cipher.iv);
28
+ iv = (0, utils_1.fromBufferToB64)(cipher.iv);
29
29
  if (cipher.data)
30
- data = fromBufferToB64(cipher.data);
30
+ data = (0, utils_1.fromBufferToB64)(cipher.data);
31
31
  if (cipher.mac)
32
- mac = fromBufferToB64(cipher.mac);
32
+ mac = (0, utils_1.fromBufferToB64)(cipher.mac);
33
33
  }
34
- catch {
34
+ catch (_a) {
35
35
  throw new Error("Invalid encryption object");
36
36
  }
37
37
  }
38
38
  else {
39
39
  throw new Error("Invalid cipher data. You must provide a string or Encrypted Object");
40
40
  }
41
- if (!EncryptionType[this.encryptionType]) {
41
+ if (!encryptionType_1.EncryptionType[this.encryptionType]) {
42
42
  throw new Error("Unsupported encryption method");
43
43
  }
44
44
  if (!data)
@@ -55,12 +55,13 @@ export class CipherString {
55
55
  return `${this.encryptionType}.${[this.data, this.iv, this.mac].join("|")}`;
56
56
  }
57
57
  toEncryptedObject(key) {
58
- return new EncryptedObject({
59
- data: fromB64ToArray(this.data),
60
- iv: fromB64ToArray(this.iv),
61
- mac: fromB64ToArray(this.mac),
58
+ return new encryptedObject_1.EncryptedObject({
59
+ data: (0, utils_1.fromB64ToArray)(this.data),
60
+ iv: (0, utils_1.fromB64ToArray)(this.iv),
61
+ mac: (0, utils_1.fromB64ToArray)(this.mac),
62
62
  key,
63
63
  });
64
64
  }
65
65
  }
66
+ exports.CipherString = CipherString;
66
67
  //# sourceMappingURL=cipherString.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"cipherString.js","sourceRoot":"","sources":["../../../src/crypto/classes/cipherString.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,MAAM,UAAU,CAAC;AAC3D,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAGlD,MAAM,OAAO,YAAY;IACd,cAAc,GAAmB,cAAc,CAAC,wBAAwB,CAAC;IAClF,IAAI,CAAS;IACb,EAAE,CAAS;IACX,GAAG,CAAS;IAEZ,YAAY,MAAgC;QAC1C,IAAI,IAAwB,EAAE,EAAsB,EAAE,GAAuB,CAAC;QAC9E,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBACjC,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;gBACxC,CAAC,IAAI,EAAE,EAAE,EAAE,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACzC,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;YAC3C,CAAC;QACH,CAAC;aAAM,IAAI,MAAM,YAAY,eAAe,EAAE,CAAC;YAC7C,IAAI,CAAC;gBACH,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC;gBACzC,IAAI,MAAM,CAAC,EAAE;oBAAE,EAAE,GAAG,eAAe,CAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBAC/C,IAAI,MAAM,CAAC,IAAI;oBAAE,IAAI,GAAG,eAAe,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC;gBACrD,IAAI,MAAM,CAAC,GAAG;oBAAE,GAAG,GAAG,eAAe,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YACpD,CAAC;YAAC,MAAM,CAAC;gBACP,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oEAAoE,CAAC,CAAC;QACxF,CAAC;QAED,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACxD,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,eAAe,CAAC,CAAC;QAC1C,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,GAAG;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACvD,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,IAAI,eAAe;QACjB,OAAO,GAAG,IAAI,CAAC,cAAc,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC9E,CAAC;IAED,iBAAiB,CAAC,GAAuB;QACvC,OAAO,IAAI,eAAe,CAAC;YACzB,IAAI,EAAE,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC;YAC/B,EAAE,EAAE,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC;YAC3B,GAAG,EAAE,cAAc,CAAC,IAAI,CAAC,GAAG,CAAC;YAC7B,GAAG;SACJ,CAAC,CAAC;IACL,CAAC;CACF"}
1
+ {"version":3,"file":"cipherString.js","sourceRoot":"","sources":["../../../src/crypto/classes/cipherString.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,oCAA2D;AAC3D,uDAAoD;AACpD,qDAAkD;AAGlD,MAAa,YAAY;IAMvB,YAAY,MAAgC;QALnC,mBAAc,GAAmB,+BAAc,CAAC,wBAAwB,CAAC;QAMhF,IAAI,IAAwB,EAAE,EAAsB,EAAE,GAAuB,CAAC;QAC9E,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBACjC,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;gBACxC,CAAC,IAAI,EAAE,EAAE,EAAE,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACzC,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;YAC3C,CAAC;QACH,CAAC;aAAM,IAAI,MAAM,YAAY,iCAAe,EAAE,CAAC;YAC7C,IAAI,CAAC;gBACH,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC;gBACzC,IAAI,MAAM,CAAC,EAAE;oBAAE,EAAE,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBAC/C,IAAI,MAAM,CAAC,IAAI;oBAAE,IAAI,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;gBACrD,IAAI,MAAM,CAAC,GAAG;oBAAE,GAAG,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YACpD,CAAC;YAAC,WAAM,CAAC;gBACP,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oEAAoE,CAAC,CAAC;QACxF,CAAC;QAED,IAAI,CAAC,+BAAc,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACxD,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,eAAe,CAAC,CAAC;QAC1C,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,GAAG;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACvD,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,IAAI,eAAe;QACjB,OAAO,GAAG,IAAI,CAAC,cAAc,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC9E,CAAC;IAED,iBAAiB,CAAC,GAAuB;QACvC,OAAO,IAAI,iCAAe,CAAC;YACzB,IAAI,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,IAAI,CAAC;YAC/B,EAAE,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,EAAE,CAAC;YAC3B,GAAG,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,GAAG,CAAC;YAC7B,GAAG;SACJ,CAAC,CAAC;IACL,CAAC;CACF;AApDD,oCAoDC"}
@@ -1,12 +1,11 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.EncryptedObject = void 0;
1
4
  /*
2
5
  Copied from portis: packages/portis-crypto/src/models/encryptedObject.ts
3
6
  */
4
- import { CipherString } from "./cipherString";
5
- export class EncryptedObject {
6
- key;
7
- iv;
8
- data;
9
- mac;
7
+ const cipherString_1 = require("./cipherString");
8
+ class EncryptedObject {
10
9
  constructor({ key, iv, data, mac, }) {
11
10
  this.key = key;
12
11
  this.iv = iv;
@@ -14,7 +13,8 @@ export class EncryptedObject {
14
13
  this.mac = mac;
15
14
  }
16
15
  toString() {
17
- return new CipherString(this).encryptedString;
16
+ return new cipherString_1.CipherString(this).encryptedString;
18
17
  }
19
18
  }
19
+ exports.EncryptedObject = EncryptedObject;
20
20
  //# sourceMappingURL=encryptedObject.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"encryptedObject.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptedObject.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AAG9C,MAAM,OAAO,eAAe;IAC1B,GAAG,CAAqB;IACxB,EAAE,CAAc;IAChB,IAAI,CAAc;IAClB,GAAG,CAAc;IAEjB,YAAY,EACV,GAAG,EACH,EAAE,EACF,IAAI,EACJ,GAAG,GAMJ;QACC,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,QAAQ;QACN,OAAO,IAAI,YAAY,CAAC,IAAI,CAAC,CAAC,eAAe,CAAC;IAChD,CAAC;CACF"}
1
+ {"version":3,"file":"encryptedObject.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptedObject.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,iDAA8C;AAG9C,MAAa,eAAe;IAM1B,YAAY,EACV,GAAG,EACH,EAAE,EACF,IAAI,EACJ,GAAG,GAMJ;QACC,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,QAAQ;QACN,OAAO,IAAI,2BAAY,CAAC,IAAI,CAAC,CAAC,eAAe,CAAC;IAChD,CAAC;CACF;AA1BD,0CA0BC"}
@@ -1,8 +1,11 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.EncryptionType = void 0;
1
4
  /*
2
5
  Copied from portis: packages/portis-crypto/src/enums/encryptionType.ts
3
6
  */
4
- export var EncryptionType;
7
+ var EncryptionType;
5
8
  (function (EncryptionType) {
6
9
  EncryptionType[EncryptionType["AesCbc256_HmacSha256_B64"] = 2] = "AesCbc256_HmacSha256_B64";
7
- })(EncryptionType || (EncryptionType = {}));
10
+ })(EncryptionType || (exports.EncryptionType = EncryptionType = {}));
8
11
  //# sourceMappingURL=encryptionType.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"encryptionType.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptionType.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,MAAM,CAAN,IAAY,cAEX;AAFD,WAAY,cAAc;IACxB,2FAA4B,CAAA;AAC9B,CAAC,EAFW,cAAc,KAAd,cAAc,QAEzB"}
1
+ {"version":3,"file":"encryptionType.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptionType.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,IAAY,cAEX;AAFD,WAAY,cAAc;IACxB,2FAA4B,CAAA;AAC9B,CAAC,EAFW,cAAc,8BAAd,cAAc,QAEzB"}
@@ -1,5 +1,12 @@
1
- export { CipherString } from "./cipherString";
2
- export { EncryptedObject } from "./encryptedObject";
3
- export { EncryptionType } from "./encryptionType";
4
- export { SymmetricCryptoKey } from "./symmetricCryptoKey";
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.SymmetricCryptoKey = exports.EncryptionType = exports.EncryptedObject = exports.CipherString = void 0;
4
+ var cipherString_1 = require("./cipherString");
5
+ Object.defineProperty(exports, "CipherString", { enumerable: true, get: function () { return cipherString_1.CipherString; } });
6
+ var encryptedObject_1 = require("./encryptedObject");
7
+ Object.defineProperty(exports, "EncryptedObject", { enumerable: true, get: function () { return encryptedObject_1.EncryptedObject; } });
8
+ var encryptionType_1 = require("./encryptionType");
9
+ Object.defineProperty(exports, "EncryptionType", { enumerable: true, get: function () { return encryptionType_1.EncryptionType; } });
10
+ var symmetricCryptoKey_1 = require("./symmetricCryptoKey");
11
+ Object.defineProperty(exports, "SymmetricCryptoKey", { enumerable: true, get: function () { return symmetricCryptoKey_1.SymmetricCryptoKey; } });
5
12
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/classes/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AAC9C,OAAO,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAClD,OAAO,EAAE,kBAAkB,EAAE,MAAM,sBAAsB,CAAC"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/classes/index.ts"],"names":[],"mappings":";;;AAAA,+CAA8C;AAArC,4GAAA,YAAY,OAAA;AACrB,qDAAoD;AAA3C,kHAAA,eAAe,OAAA;AACxB,mDAAkD;AAAzC,gHAAA,cAAc,OAAA;AACvB,2DAA0D;AAAjD,wHAAA,kBAAkB,OAAA"}
@@ -1,17 +1,14 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.SymmetricCryptoKey = void 0;
1
4
  /*
2
5
  Copied from portis: packages/portis-crypto/src/models/symmetricCryptoKey.ts
3
6
  */
4
- import { fromBufferToB64 } from "../utils";
5
- import { EncryptionType } from "./encryptionType";
6
- export class SymmetricCryptoKey {
7
- hashKey;
8
- encKey;
9
- macKey;
10
- encType = EncryptionType.AesCbc256_HmacSha256_B64;
11
- hashKeyB64;
12
- encKeyB64;
13
- macKeyB64;
7
+ const utils_1 = require("../utils");
8
+ const encryptionType_1 = require("./encryptionType");
9
+ class SymmetricCryptoKey {
14
10
  constructor(hashKey, encKey, mac) {
11
+ this.encType = encryptionType_1.EncryptionType.AesCbc256_HmacSha256_B64;
15
12
  if (hashKey == null)
16
13
  throw new Error("Required parameter [hashKey] was not provided");
17
14
  if (encKey == null)
@@ -23,9 +20,10 @@ export class SymmetricCryptoKey {
23
20
  this.hashKey = hashKey;
24
21
  this.encKey = encKey;
25
22
  this.macKey = mac;
26
- this.hashKeyB64 = fromBufferToB64(this.hashKey);
27
- this.encKeyB64 = fromBufferToB64(this.encKey);
28
- this.macKeyB64 = fromBufferToB64(this.macKey);
23
+ this.hashKeyB64 = (0, utils_1.fromBufferToB64)(this.hashKey);
24
+ this.encKeyB64 = (0, utils_1.fromBufferToB64)(this.encKey);
25
+ this.macKeyB64 = (0, utils_1.fromBufferToB64)(this.macKey);
29
26
  }
30
27
  }
28
+ exports.SymmetricCryptoKey = SymmetricCryptoKey;
31
29
  //# sourceMappingURL=symmetricCryptoKey.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"symmetricCryptoKey.js","sourceRoot":"","sources":["../../../src/crypto/classes/symmetricCryptoKey.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,eAAe,EAAE,MAAM,UAAU,CAAC;AAC3C,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAElD,MAAM,OAAO,kBAAkB;IAC7B,OAAO,CAAc;IACrB,MAAM,CAAc;IACpB,MAAM,CAAqB;IAC3B,OAAO,GAAmB,cAAc,CAAC,wBAAwB,CAAC;IAElE,UAAU,CAAS;IACnB,SAAS,CAAS;IAClB,SAAS,CAAS;IAElB,YAAY,OAAoB,EAAE,MAAmB,EAAE,GAAgB;QACrE,IAAI,OAAO,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACtF,IAAI,MAAM,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;QACpF,IAAI,GAAG,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAE9E,IAAI,OAAO,CAAC,UAAU,KAAK,EAAE,IAAI,MAAM,CAAC,UAAU,KAAK,EAAE,IAAI,GAAG,CAAC,UAAU,KAAK,EAAE;YAChF,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAE3C,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,MAAM,GAAG,GAAG,CAAC;QAElB,IAAI,CAAC,UAAU,GAAG,eAAe,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,SAAS,GAAG,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,eAAe,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAChD,CAAC;CACF"}
1
+ {"version":3,"file":"symmetricCryptoKey.js","sourceRoot":"","sources":["../../../src/crypto/classes/symmetricCryptoKey.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,oCAA2C;AAC3C,qDAAkD;AAElD,MAAa,kBAAkB;IAU7B,YAAY,OAAoB,EAAE,MAAmB,EAAE,GAAgB;QANvE,YAAO,GAAmB,+BAAc,CAAC,wBAAwB,CAAC;QAOhE,IAAI,OAAO,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACtF,IAAI,MAAM,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;QACpF,IAAI,GAAG,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAE9E,IAAI,OAAO,CAAC,UAAU,KAAK,EAAE,IAAI,MAAM,CAAC,UAAU,KAAK,EAAE,IAAI,GAAG,CAAC,UAAU,KAAK,EAAE;YAChF,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAE3C,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,MAAM,GAAG,GAAG,CAAC;QAElB,IAAI,CAAC,UAAU,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,SAAS,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAChD,CAAC;CACF;AA1BD,gDA0BC"}
@@ -1,3 +1,19 @@
1
- export * from "./types";
2
- export * from "./web-crypto";
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
+ };
16
+ Object.defineProperty(exports, "__esModule", { value: true });
17
+ __exportStar(require("./types"), exports);
18
+ __exportStar(require("./web-crypto"), exports);
3
19
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/engines/index.ts"],"names":[],"mappings":"AAAA,cAAc,SAAS,CAAC;AACxB,cAAc,cAAc,CAAC"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/engines/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,0CAAwB;AACxB,+CAA6B"}
@@ -1,6 +1,9 @@
1
- export var DigestAlgorithm;
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.DigestAlgorithm = void 0;
4
+ var DigestAlgorithm;
2
5
  (function (DigestAlgorithm) {
3
6
  DigestAlgorithm[DigestAlgorithm["SHA256"] = 0] = "SHA256";
4
7
  DigestAlgorithm[DigestAlgorithm["SHA512"] = 1] = "SHA512";
5
- })(DigestAlgorithm || (DigestAlgorithm = {}));
8
+ })(DigestAlgorithm || (exports.DigestAlgorithm = DigestAlgorithm = {}));
6
9
  //# sourceMappingURL=types.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/crypto/engines/types.ts"],"names":[],"mappings":"AAYA,MAAM,CAAN,IAAY,eAGX;AAHD,WAAY,eAAe;IACzB,yDAAM,CAAA;IACN,yDAAM,CAAA;AACR,CAAC,EAHW,eAAe,KAAf,eAAe,QAG1B"}
1
+ {"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/crypto/engines/types.ts"],"names":[],"mappings":";;;AAYA,IAAY,eAGX;AAHD,WAAY,eAAe;IACzB,yDAAM,CAAA;IACN,yDAAM,CAAA;AACR,CAAC,EAHW,eAAe,+BAAf,eAAe,QAG1B"}