@shapeshiftoss/hdwallet-native 1.55.4-alpha.1 → 1.55.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter.js +61 -22
- package/dist/adapter.js.map +1 -1
- package/dist/arkeo.js +123 -54
- package/dist/arkeo.js.map +1 -1
- package/dist/binance.js +194 -123
- package/dist/binance.js.map +1 -1
- package/dist/bitcoin.js +284 -219
- package/dist/bitcoin.js.map +1 -1
- package/dist/cosmos.js +123 -54
- package/dist/cosmos.js.map +1 -1
- package/dist/crypto/CryptoHelper.js +172 -106
- package/dist/crypto/CryptoHelper.js.map +1 -1
- package/dist/crypto/EncryptedWallet.js +123 -64
- package/dist/crypto/EncryptedWallet.js.map +1 -1
- package/dist/crypto/classes/cipherString.js +19 -18
- package/dist/crypto/classes/cipherString.js.map +1 -1
- package/dist/crypto/classes/encryptedObject.js +7 -7
- package/dist/crypto/classes/encryptedObject.js.map +1 -1
- package/dist/crypto/classes/encryptionType.js +5 -2
- package/dist/crypto/classes/encryptionType.js.map +1 -1
- package/dist/crypto/classes/index.js +11 -4
- package/dist/crypto/classes/index.js.map +1 -1
- package/dist/crypto/classes/symmetricCryptoKey.js +11 -13
- package/dist/crypto/classes/symmetricCryptoKey.js.map +1 -1
- package/dist/crypto/engines/index.js +18 -2
- package/dist/crypto/engines/index.js.map +1 -1
- package/dist/crypto/engines/types.js +5 -2
- package/dist/crypto/engines/types.js.map +1 -1
- package/dist/crypto/engines/web-crypto.js +84 -39
- package/dist/crypto/engines/web-crypto.js.map +1 -1
- package/dist/crypto/index.js +32 -3
- package/dist/crypto/index.js.map +1 -1
- package/dist/crypto/isolation/adapters/binance.js +51 -12
- package/dist/crypto/isolation/adapters/binance.js.map +1 -1
- package/dist/crypto/isolation/adapters/bip32.js +108 -65
- package/dist/crypto/isolation/adapters/bip32.js.map +1 -1
- package/dist/crypto/isolation/adapters/bitcoin.js +84 -41
- package/dist/crypto/isolation/adapters/bitcoin.js.map +1 -1
- package/dist/crypto/isolation/adapters/cosmos.js +24 -9
- package/dist/crypto/isolation/adapters/cosmos.js.map +1 -1
- package/dist/crypto/isolation/adapters/cosmosDirect.js +77 -35
- package/dist/crypto/isolation/adapters/cosmosDirect.js.map +1 -1
- package/dist/crypto/isolation/adapters/ethereum.js +90 -49
- package/dist/crypto/isolation/adapters/ethereum.js.map +1 -1
- package/dist/crypto/isolation/adapters/fio.js +67 -24
- package/dist/crypto/isolation/adapters/fio.js.map +1 -1
- package/dist/crypto/isolation/adapters/index.js +20 -7
- package/dist/crypto/isolation/adapters/index.js.map +1 -1
- package/dist/crypto/isolation/core/bip32/index.js +50 -22
- package/dist/crypto/isolation/core/bip32/index.js.map +1 -1
- package/dist/crypto/isolation/core/bip32/interfaces.js +28 -2
- package/dist/crypto/isolation/core/bip32/interfaces.js.map +1 -1
- package/dist/crypto/isolation/core/bip32/types.js +8 -5
- package/dist/crypto/isolation/core/bip32/types.js.map +1 -1
- package/dist/crypto/isolation/core/bip39/index.js +17 -1
- package/dist/crypto/isolation/core/bip39/index.js.map +1 -1
- package/dist/crypto/isolation/core/bip39/interfaces.js +2 -1
- package/dist/crypto/isolation/core/digest/algorithms.js +32 -23
- package/dist/crypto/isolation/core/digest/algorithms.js.map +1 -1
- package/dist/crypto/isolation/core/digest/index.js +18 -2
- package/dist/crypto/isolation/core/digest/index.js.map +1 -1
- package/dist/crypto/isolation/core/digest/types.js +26 -23
- package/dist/crypto/isolation/core/digest/types.js.map +1 -1
- package/dist/crypto/isolation/core/index.js +32 -5
- package/dist/crypto/isolation/core/index.js.map +1 -1
- package/dist/crypto/isolation/core/secp256k1/index.js +18 -2
- package/dist/crypto/isolation/core/secp256k1/index.js.map +1 -1
- package/dist/crypto/isolation/core/secp256k1/interfaces.js +2 -1
- package/dist/crypto/isolation/core/secp256k1/types.js +157 -119
- package/dist/crypto/isolation/core/secp256k1/types.js.map +1 -1
- package/dist/crypto/isolation/engines/default/bip32.js +176 -102
- package/dist/crypto/isolation/engines/default/bip32.js.map +1 -1
- package/dist/crypto/isolation/engines/default/bip39.js +68 -24
- package/dist/crypto/isolation/engines/default/bip39.js.map +1 -1
- package/dist/crypto/isolation/engines/default/index.js +32 -3
- package/dist/crypto/isolation/engines/default/index.js.map +1 -1
- package/dist/crypto/isolation/engines/default/revocable.js +51 -30
- package/dist/crypto/isolation/engines/default/revocable.js.map +1 -1
- package/dist/crypto/isolation/engines/dummy/bip32.js +121 -63
- package/dist/crypto/isolation/engines/dummy/bip32.js.map +1 -1
- package/dist/crypto/isolation/engines/dummy/bip39.js +97 -55
- package/dist/crypto/isolation/engines/dummy/bip39.js.map +1 -1
- package/dist/crypto/isolation/engines/dummy/index.js +30 -3
- package/dist/crypto/isolation/engines/dummy/index.js.map +1 -1
- package/dist/crypto/isolation/engines/dummy/types.js +5 -1
- package/dist/crypto/isolation/engines/dummy/types.js.map +1 -1
- package/dist/crypto/isolation/engines/index.js +28 -2
- package/dist/crypto/isolation/engines/index.js.map +1 -1
- package/dist/crypto/isolation/index.js +29 -3
- package/dist/crypto/isolation/index.js.map +1 -1
- package/dist/crypto/isolation/types.js +49 -43
- package/dist/crypto/isolation/types.js.map +1 -1
- package/dist/crypto/utils.js +13 -7
- package/dist/crypto/utils.js.map +1 -1
- package/dist/ethereum.js +160 -92
- package/dist/ethereum.js.map +1 -1
- package/dist/fio.js +282 -204
- package/dist/fio.js.map +1 -1
- package/dist/index.js +32 -3
- package/dist/index.js.map +1 -1
- package/dist/kava.js +119 -50
- package/dist/kava.js.map +1 -1
- package/dist/native.js +304 -176
- package/dist/native.js.map +1 -1
- package/dist/networks.js +33 -16
- package/dist/networks.js.map +1 -1
- package/dist/osmosis.js +123 -54
- package/dist/osmosis.js.map +1 -1
- package/dist/secret.js +119 -50
- package/dist/secret.js.map +1 -1
- package/dist/terra.js +119 -50
- package/dist/terra.js.map +1 -1
- package/dist/thorchain.js +123 -54
- package/dist/thorchain.js.map +1 -1
- package/dist/util.js +54 -16
- package/dist/util.js.map +1 -1
- package/package.json +3 -3
|
@@ -1,46 +1,97 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
+
}) : function(o, v) {
|
|
16
|
+
o["default"] = v;
|
|
17
|
+
});
|
|
18
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
+
if (mod && mod.__esModule) return mod;
|
|
20
|
+
var result = {};
|
|
21
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
+
__setModuleDefault(result, mod);
|
|
23
|
+
return result;
|
|
24
|
+
};
|
|
25
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
26
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
27
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
28
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
29
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
30
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
31
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
32
|
+
});
|
|
33
|
+
};
|
|
34
|
+
var __classPrivateFieldSet = (this && this.__classPrivateFieldSet) || function (receiver, state, value, kind, f) {
|
|
35
|
+
if (kind === "m") throw new TypeError("Private method is not writable");
|
|
36
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a setter");
|
|
37
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot write private member to an object whose class did not declare it");
|
|
38
|
+
return (kind === "a" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;
|
|
39
|
+
};
|
|
40
|
+
var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
|
|
41
|
+
if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
|
|
42
|
+
if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
|
|
43
|
+
return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
|
|
44
|
+
};
|
|
45
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
46
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
47
|
+
};
|
|
48
|
+
var _EncryptedWallet_engine, _EncryptedWallet_helper, _EncryptedWallet_deviceId, _EncryptedWallet_email, _EncryptedWallet_encryptedWallet, _EncryptedWallet_key, _EncryptedWallet_password;
|
|
49
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
50
|
+
exports.EncryptedWallet = void 0;
|
|
51
|
+
const core = __importStar(require("@shapeshiftoss/hdwallet-core"));
|
|
52
|
+
const bip39 = __importStar(require("bip39"));
|
|
53
|
+
const classes_1 = require("./classes");
|
|
54
|
+
const CryptoHelper_1 = __importDefault(require("./CryptoHelper"));
|
|
55
|
+
const utils = __importStar(require("./utils"));
|
|
56
|
+
class EncryptedWallet {
|
|
14
57
|
constructor(engine) {
|
|
58
|
+
_EncryptedWallet_engine.set(this, void 0);
|
|
59
|
+
_EncryptedWallet_helper.set(this, void 0);
|
|
60
|
+
_EncryptedWallet_deviceId.set(this, void 0);
|
|
61
|
+
_EncryptedWallet_email.set(this, void 0);
|
|
62
|
+
_EncryptedWallet_encryptedWallet.set(this, void 0);
|
|
63
|
+
_EncryptedWallet_key.set(this, void 0);
|
|
64
|
+
_EncryptedWallet_password.set(this, void 0);
|
|
15
65
|
if (!engine) {
|
|
16
66
|
throw new Error("Missing cryptography engine");
|
|
17
67
|
}
|
|
18
|
-
this
|
|
19
|
-
this
|
|
68
|
+
__classPrivateFieldSet(this, _EncryptedWallet_engine, engine, "f");
|
|
69
|
+
__classPrivateFieldSet(this, _EncryptedWallet_helper, new CryptoHelper_1.default(__classPrivateFieldGet(this, _EncryptedWallet_engine, "f")), "f");
|
|
20
70
|
}
|
|
21
71
|
/**
|
|
22
72
|
* Whether or not the wallet has been initialized with an email and password
|
|
23
73
|
*/
|
|
24
74
|
get isInitialized() {
|
|
25
|
-
return Boolean(this
|
|
75
|
+
return Boolean(__classPrivateFieldGet(this, _EncryptedWallet_email, "f") && __classPrivateFieldGet(this, _EncryptedWallet_password, "f") && __classPrivateFieldGet(this, _EncryptedWallet_key, "f"));
|
|
26
76
|
}
|
|
27
77
|
/**
|
|
28
78
|
* The email provided to the `init` function
|
|
29
79
|
*/
|
|
30
80
|
get email() {
|
|
31
|
-
return this
|
|
81
|
+
return __classPrivateFieldGet(this, _EncryptedWallet_email, "f");
|
|
32
82
|
}
|
|
33
83
|
/**
|
|
34
84
|
* A hash derived from the email and password to be used for authentication
|
|
35
85
|
*/
|
|
36
86
|
get passwordHash() {
|
|
37
|
-
|
|
87
|
+
var _a;
|
|
88
|
+
return (_a = __classPrivateFieldGet(this, _EncryptedWallet_key, "f")) === null || _a === void 0 ? void 0 : _a.hashKeyB64;
|
|
38
89
|
}
|
|
39
90
|
/**
|
|
40
91
|
* A string representation of the encrypted seed phrase
|
|
41
92
|
*/
|
|
42
93
|
get encryptedWallet() {
|
|
43
|
-
return this
|
|
94
|
+
return __classPrivateFieldGet(this, _EncryptedWallet_encryptedWallet, "f");
|
|
44
95
|
}
|
|
45
96
|
/**
|
|
46
97
|
* Set the encrypted wallet by providing a string representation
|
|
@@ -49,77 +100,85 @@ export class EncryptedWallet {
|
|
|
49
100
|
set encryptedWallet(wallet) {
|
|
50
101
|
if (wallet === undefined)
|
|
51
102
|
throw new Error("Invalid cipher string");
|
|
52
|
-
this
|
|
103
|
+
__classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, new classes_1.CipherString(wallet).encryptedString, "f");
|
|
53
104
|
}
|
|
54
105
|
/**
|
|
55
106
|
* Get an ID based on the mnemonic
|
|
56
107
|
* Calling `decrypt` will set this value after decryption is successful
|
|
57
108
|
*/
|
|
58
109
|
get deviceId() {
|
|
59
|
-
return this
|
|
110
|
+
return __classPrivateFieldGet(this, _EncryptedWallet_deviceId, "f");
|
|
60
111
|
}
|
|
61
112
|
/**
|
|
62
113
|
* Initialize the wallet with and email and password
|
|
63
114
|
*
|
|
64
115
|
* This cannot be done in the constructor because it performs async operations
|
|
65
116
|
*/
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
117
|
+
init(email, password, encryptedWallet) {
|
|
118
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
119
|
+
if (!(email && typeof email === "string" && email.length > 0)) {
|
|
120
|
+
throw new Error("Invalid email address");
|
|
121
|
+
}
|
|
122
|
+
if (!(password && typeof password === "string" && password.length > 0)) {
|
|
123
|
+
throw new Error("Invalid password");
|
|
124
|
+
}
|
|
125
|
+
__classPrivateFieldSet(this, _EncryptedWallet_email, email.normalize("NFKC").trim().toLowerCase(), "f");
|
|
126
|
+
__classPrivateFieldSet(this, _EncryptedWallet_password, password.normalize("NFKC"), "f");
|
|
127
|
+
__classPrivateFieldSet(this, _EncryptedWallet_key, yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").makeKey(__classPrivateFieldGet(this, _EncryptedWallet_password, "f"), __classPrivateFieldGet(this, _EncryptedWallet_email, "f")), "f");
|
|
128
|
+
if (encryptedWallet) {
|
|
129
|
+
this.encryptedWallet = encryptedWallet;
|
|
130
|
+
}
|
|
131
|
+
return this;
|
|
132
|
+
});
|
|
80
133
|
}
|
|
81
134
|
/**
|
|
82
135
|
* Generate a new mnemonic and encrypt it with the email and password
|
|
83
136
|
*/
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
137
|
+
createWallet(mnemonic) {
|
|
138
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
139
|
+
if (!this.isInitialized)
|
|
140
|
+
throw new Error("Wallet is not initialized");
|
|
141
|
+
mnemonic = mnemonic !== null && mnemonic !== void 0 ? mnemonic : (yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").generateMnemonic());
|
|
142
|
+
if (!bip39.validateMnemonic(mnemonic)) {
|
|
143
|
+
throw new Error("Invalid mnemonic");
|
|
144
|
+
}
|
|
145
|
+
if (!__classPrivateFieldGet(this, _EncryptedWallet_key, "f"))
|
|
146
|
+
throw new Error("Wallet does not contain a key");
|
|
147
|
+
__classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, (yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").aesEncrypt(core.toArrayBuffer(utils.fromUtf8ToArray(mnemonic)), __classPrivateFieldGet(this, _EncryptedWallet_key, "f"))).toString(), "f");
|
|
148
|
+
return this;
|
|
149
|
+
});
|
|
95
150
|
}
|
|
96
151
|
/**
|
|
97
152
|
* Decrypt the encrypted wallet
|
|
98
153
|
* @throws {Error} if the wallet hasn't been initialized or doesn't have an encryptedWallet
|
|
99
154
|
*/
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
155
|
+
decrypt() {
|
|
156
|
+
return __awaiter(this, arguments, void 0, function* (encryptedWallet = __classPrivateFieldGet(this, _EncryptedWallet_encryptedWallet, "f")) {
|
|
157
|
+
if (!this.isInitialized)
|
|
158
|
+
throw new Error("Wallet is not initialized");
|
|
159
|
+
if (!encryptedWallet)
|
|
160
|
+
throw new Error("Wallet does not contain an encrypted wallet");
|
|
161
|
+
if (!__classPrivateFieldGet(this, _EncryptedWallet_key, "f"))
|
|
162
|
+
throw new Error("Wallet does not contain a key");
|
|
163
|
+
const decrypted = yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").decrypt(new classes_1.CipherString(encryptedWallet), __classPrivateFieldGet(this, _EncryptedWallet_key, "f"));
|
|
164
|
+
if (typeof decrypted === "string" && decrypted.length > 0) {
|
|
165
|
+
__classPrivateFieldSet(this, _EncryptedWallet_deviceId, yield __classPrivateFieldGet(this, _EncryptedWallet_helper, "f").getDeviceId(decrypted), "f");
|
|
166
|
+
return decrypted;
|
|
167
|
+
}
|
|
168
|
+
throw new Error("Decryption failed");
|
|
169
|
+
});
|
|
113
170
|
}
|
|
114
171
|
/**
|
|
115
172
|
* Clear all private data to allow it to be garbage collected
|
|
116
173
|
*/
|
|
117
174
|
reset() {
|
|
118
|
-
this
|
|
119
|
-
this
|
|
120
|
-
this
|
|
121
|
-
this
|
|
122
|
-
this
|
|
175
|
+
__classPrivateFieldSet(this, _EncryptedWallet_deviceId, undefined, "f");
|
|
176
|
+
__classPrivateFieldSet(this, _EncryptedWallet_email, undefined, "f");
|
|
177
|
+
__classPrivateFieldSet(this, _EncryptedWallet_encryptedWallet, undefined, "f");
|
|
178
|
+
__classPrivateFieldSet(this, _EncryptedWallet_key, undefined, "f");
|
|
179
|
+
__classPrivateFieldSet(this, _EncryptedWallet_password, undefined, "f");
|
|
123
180
|
}
|
|
124
181
|
}
|
|
182
|
+
exports.EncryptedWallet = EncryptedWallet;
|
|
183
|
+
_EncryptedWallet_engine = new WeakMap(), _EncryptedWallet_helper = new WeakMap(), _EncryptedWallet_deviceId = new WeakMap(), _EncryptedWallet_email = new WeakMap(), _EncryptedWallet_encryptedWallet = new WeakMap(), _EncryptedWallet_key = new WeakMap(), _EncryptedWallet_password = new WeakMap();
|
|
125
184
|
//# sourceMappingURL=EncryptedWallet.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"EncryptedWallet.js","sourceRoot":"","sources":["../../src/crypto/EncryptedWallet.ts"],"names":[],"mappings":"AAAA,
|
|
1
|
+
{"version":3,"file":"EncryptedWallet.js","sourceRoot":"","sources":["../../src/crypto/EncryptedWallet.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,mEAAqD;AACrD,6CAA+B;AAE/B,uCAA6D;AAC7D,kEAA0C;AAE1C,+CAAiC;AAEjC,MAAa,eAAe;IAS1B,YAAY,MAAoB;QARvB,0CAAsB;QACtB,0CAAsB;QAC/B,4CAA8B;QAC9B,yCAA2B;QAC3B,mDAAqC;QACrC,uCAAqC;QACrC,4CAA8B;QAG5B,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;QACD,uBAAA,IAAI,2BAAW,MAAM,MAAA,CAAC;QACtB,uBAAA,IAAI,2BAAW,IAAI,sBAAY,CAAC,uBAAA,IAAI,+BAAQ,CAAC,MAAA,CAAC;IAChD,CAAC;IAED;;OAEG;IACH,IAAI,aAAa;QACf,OAAO,OAAO,CAAC,uBAAA,IAAI,8BAAO,IAAI,uBAAA,IAAI,iCAAU,IAAI,uBAAA,IAAI,4BAAK,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACH,IAAI,KAAK;QACP,OAAO,uBAAA,IAAI,8BAAO,CAAC;IACrB,CAAC;IAED;;OAEG;IACH,IAAI,YAAY;;QACd,OAAO,MAAA,uBAAA,IAAI,4BAAK,0CAAE,UAAU,CAAC;IAC/B,CAAC;IAED;;OAEG;IACH,IAAI,eAAe;QACjB,OAAO,uBAAA,IAAI,wCAAiB,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACH,IAAI,eAAe,CAAC,MAA0B;QAC5C,IAAI,MAAM,KAAK,SAAS;YAAE,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QACnE,uBAAA,IAAI,oCAAoB,IAAI,sBAAY,CAAC,MAAM,CAAC,CAAC,eAAe,MAAA,CAAC;IACnE,CAAC;IAED;;;OAGG;IACH,IAAI,QAAQ;QACV,OAAO,uBAAA,IAAI,iCAAU,CAAC;IACxB,CAAC;IAED;;;;OAIG;IACG,IAAI,CAAC,KAAa,EAAE,QAAgB,EAAE,eAAwB;;YAClE,IAAI,CAAC,CAAC,KAAK,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;gBAC9D,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;YAC3C,CAAC;YACD,IAAI,CAAC,CAAC,QAAQ,IAAI,OAAO,QAAQ,KAAK,QAAQ,IAAI,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,EAAE,CAAC;gBACvE,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;YACtC,CAAC;YAED,uBAAA,IAAI,0BAAU,KAAK,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,MAAA,CAAC;YAC3D,uBAAA,IAAI,6BAAa,QAAQ,CAAC,SAAS,CAAC,MAAM,CAAC,MAAA,CAAC;YAC5C,uBAAA,IAAI,wBAAQ,MAAM,uBAAA,IAAI,+BAAQ,CAAC,OAAO,CAAC,uBAAA,IAAI,iCAAU,EAAE,uBAAA,IAAI,8BAAO,CAAC,MAAA,CAAC;YAEpE,IAAI,eAAe,EAAE,CAAC;gBACpB,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;YACzC,CAAC;YAED,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED;;OAEG;IACG,YAAY,CAAC,QAAiB;;YAClC,IAAI,CAAC,IAAI,CAAC,aAAa;gBAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YACtE,QAAQ,GAAG,QAAQ,aAAR,QAAQ,cAAR,QAAQ,GAAI,CAAC,MAAM,uBAAA,IAAI,+BAAQ,CAAC,gBAAgB,EAAE,CAAC,CAAC;YAE/D,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACtC,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;YACtC,CAAC;YAED,IAAI,CAAC,uBAAA,IAAI,4BAAK;gBAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACjE,uBAAA,IAAI,oCAAoB,CACtB,MAAM,uBAAA,IAAI,+BAAQ,CAAC,UAAU,CAAC,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,QAAQ,CAAC,CAAC,EAAE,uBAAA,IAAI,4BAAK,CAAC,CAC9F,CAAC,QAAQ,EAAE,MAAA,CAAC;YAEb,OAAO,IAAI,CAAC;QACd,CAAC;KAAA;IAED;;;OAGG;IACG,OAAO;6DAAC,eAAe,GAAG,uBAAA,IAAI,wCAAiB;YACnD,IAAI,CAAC,IAAI,CAAC,aAAa;gBAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YACtE,IAAI,CAAC,eAAe;gBAAE,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;YACrF,IAAI,CAAC,uBAAA,IAAI,4BAAK;gBAAE,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACjE,MAAM,SAAS,GAAG,MAAM,uBAAA,IAAI,+BAAQ,CAAC,OAAO,CAAC,IAAI,sBAAY,CAAC,eAAe,CAAC,EAAE,uBAAA,IAAI,4BAAK,CAAC,CAAC;YAE3F,IAAI,OAAO,SAAS,KAAK,QAAQ,IAAI,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC1D,uBAAA,IAAI,6BAAa,MAAM,uBAAA,IAAI,+BAAQ,CAAC,WAAW,CAAC,SAAS,CAAC,MAAA,CAAC;gBAC3D,OAAO,SAAS,CAAC;YACnB,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;QACvC,CAAC;KAAA;IAED;;OAEG;IACH,KAAK;QACH,uBAAA,IAAI,6BAAa,SAAS,MAAA,CAAC;QAC3B,uBAAA,IAAI,0BAAU,SAAS,MAAA,CAAC;QACxB,uBAAA,IAAI,oCAAoB,SAAS,MAAA,CAAC;QAClC,uBAAA,IAAI,wBAAQ,SAAS,MAAA,CAAC;QACtB,uBAAA,IAAI,6BAAa,SAAS,MAAA,CAAC;IAC7B,CAAC;CACF;AApID,0CAoIC"}
|
|
@@ -1,15 +1,15 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.CipherString = void 0;
|
|
1
4
|
/*
|
|
2
5
|
Copied from portis: packages/portis-crypto/src/models/cipherString.ts
|
|
3
6
|
*/
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
encryptionType = EncryptionType.AesCbc256_HmacSha256_B64;
|
|
9
|
-
data;
|
|
10
|
-
iv;
|
|
11
|
-
mac;
|
|
7
|
+
const utils_1 = require("../utils");
|
|
8
|
+
const encryptedObject_1 = require("./encryptedObject");
|
|
9
|
+
const encryptionType_1 = require("./encryptionType");
|
|
10
|
+
class CipherString {
|
|
12
11
|
constructor(cipher) {
|
|
12
|
+
this.encryptionType = encryptionType_1.EncryptionType.AesCbc256_HmacSha256_B64;
|
|
13
13
|
let data, iv, mac;
|
|
14
14
|
if (typeof cipher === "string") {
|
|
15
15
|
try {
|
|
@@ -21,24 +21,24 @@ export class CipherString {
|
|
|
21
21
|
throw new Error("Invalid cipher string");
|
|
22
22
|
}
|
|
23
23
|
}
|
|
24
|
-
else if (cipher instanceof EncryptedObject) {
|
|
24
|
+
else if (cipher instanceof encryptedObject_1.EncryptedObject) {
|
|
25
25
|
try {
|
|
26
26
|
this.encryptionType = cipher.key.encType;
|
|
27
27
|
if (cipher.iv)
|
|
28
|
-
iv = fromBufferToB64(cipher.iv);
|
|
28
|
+
iv = (0, utils_1.fromBufferToB64)(cipher.iv);
|
|
29
29
|
if (cipher.data)
|
|
30
|
-
data = fromBufferToB64(cipher.data);
|
|
30
|
+
data = (0, utils_1.fromBufferToB64)(cipher.data);
|
|
31
31
|
if (cipher.mac)
|
|
32
|
-
mac = fromBufferToB64(cipher.mac);
|
|
32
|
+
mac = (0, utils_1.fromBufferToB64)(cipher.mac);
|
|
33
33
|
}
|
|
34
|
-
catch {
|
|
34
|
+
catch (_a) {
|
|
35
35
|
throw new Error("Invalid encryption object");
|
|
36
36
|
}
|
|
37
37
|
}
|
|
38
38
|
else {
|
|
39
39
|
throw new Error("Invalid cipher data. You must provide a string or Encrypted Object");
|
|
40
40
|
}
|
|
41
|
-
if (!EncryptionType[this.encryptionType]) {
|
|
41
|
+
if (!encryptionType_1.EncryptionType[this.encryptionType]) {
|
|
42
42
|
throw new Error("Unsupported encryption method");
|
|
43
43
|
}
|
|
44
44
|
if (!data)
|
|
@@ -55,12 +55,13 @@ export class CipherString {
|
|
|
55
55
|
return `${this.encryptionType}.${[this.data, this.iv, this.mac].join("|")}`;
|
|
56
56
|
}
|
|
57
57
|
toEncryptedObject(key) {
|
|
58
|
-
return new EncryptedObject({
|
|
59
|
-
data: fromB64ToArray(this.data),
|
|
60
|
-
iv: fromB64ToArray(this.iv),
|
|
61
|
-
mac: fromB64ToArray(this.mac),
|
|
58
|
+
return new encryptedObject_1.EncryptedObject({
|
|
59
|
+
data: (0, utils_1.fromB64ToArray)(this.data),
|
|
60
|
+
iv: (0, utils_1.fromB64ToArray)(this.iv),
|
|
61
|
+
mac: (0, utils_1.fromB64ToArray)(this.mac),
|
|
62
62
|
key,
|
|
63
63
|
});
|
|
64
64
|
}
|
|
65
65
|
}
|
|
66
|
+
exports.CipherString = CipherString;
|
|
66
67
|
//# sourceMappingURL=cipherString.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"cipherString.js","sourceRoot":"","sources":["../../../src/crypto/classes/cipherString.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,
|
|
1
|
+
{"version":3,"file":"cipherString.js","sourceRoot":"","sources":["../../../src/crypto/classes/cipherString.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,oCAA2D;AAC3D,uDAAoD;AACpD,qDAAkD;AAGlD,MAAa,YAAY;IAMvB,YAAY,MAAgC;QALnC,mBAAc,GAAmB,+BAAc,CAAC,wBAAwB,CAAC;QAMhF,IAAI,IAAwB,EAAE,EAAsB,EAAE,GAAuB,CAAC;QAC9E,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE,CAAC;YAC/B,IAAI,CAAC;gBACH,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;gBACjC,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC;gBACxC,CAAC,IAAI,EAAE,EAAE,EAAE,GAAG,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YACzC,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;YAC3C,CAAC;QACH,CAAC;aAAM,IAAI,MAAM,YAAY,iCAAe,EAAE,CAAC;YAC7C,IAAI,CAAC;gBACH,IAAI,CAAC,cAAc,GAAG,MAAM,CAAC,GAAG,CAAC,OAAO,CAAC;gBACzC,IAAI,MAAM,CAAC,EAAE;oBAAE,EAAE,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,EAAE,CAAC,CAAC;gBAC/C,IAAI,MAAM,CAAC,IAAI;oBAAE,IAAI,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,IAAI,CAAC,CAAC;gBACrD,IAAI,MAAM,CAAC,GAAG;oBAAE,GAAG,GAAG,IAAA,uBAAe,EAAC,MAAM,CAAC,GAAG,CAAC,CAAC;YACpD,CAAC;YAAC,WAAM,CAAC;gBACP,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;YAC/C,CAAC;QACH,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CAAC,oEAAoE,CAAC,CAAC;QACxF,CAAC;QAED,IAAI,CAAC,+BAAc,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;YACzC,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;QACnD,CAAC;QACD,IAAI,CAAC,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACxD,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,eAAe,CAAC,CAAC;QAC1C,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,GAAG;YAAE,MAAM,IAAI,KAAK,CAAC,2BAA2B,CAAC,CAAC;QACvD,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,IAAI,eAAe;QACjB,OAAO,GAAG,IAAI,CAAC,cAAc,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,EAAE,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;IAC9E,CAAC;IAED,iBAAiB,CAAC,GAAuB;QACvC,OAAO,IAAI,iCAAe,CAAC;YACzB,IAAI,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,IAAI,CAAC;YAC/B,EAAE,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,EAAE,CAAC;YAC3B,GAAG,EAAE,IAAA,sBAAc,EAAC,IAAI,CAAC,GAAG,CAAC;YAC7B,GAAG;SACJ,CAAC,CAAC;IACL,CAAC;CACF;AApDD,oCAoDC"}
|
|
@@ -1,12 +1,11 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.EncryptedObject = void 0;
|
|
1
4
|
/*
|
|
2
5
|
Copied from portis: packages/portis-crypto/src/models/encryptedObject.ts
|
|
3
6
|
*/
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
key;
|
|
7
|
-
iv;
|
|
8
|
-
data;
|
|
9
|
-
mac;
|
|
7
|
+
const cipherString_1 = require("./cipherString");
|
|
8
|
+
class EncryptedObject {
|
|
10
9
|
constructor({ key, iv, data, mac, }) {
|
|
11
10
|
this.key = key;
|
|
12
11
|
this.iv = iv;
|
|
@@ -14,7 +13,8 @@ export class EncryptedObject {
|
|
|
14
13
|
this.mac = mac;
|
|
15
14
|
}
|
|
16
15
|
toString() {
|
|
17
|
-
return new CipherString(this).encryptedString;
|
|
16
|
+
return new cipherString_1.CipherString(this).encryptedString;
|
|
18
17
|
}
|
|
19
18
|
}
|
|
19
|
+
exports.EncryptedObject = EncryptedObject;
|
|
20
20
|
//# sourceMappingURL=encryptedObject.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"encryptedObject.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptedObject.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,
|
|
1
|
+
{"version":3,"file":"encryptedObject.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptedObject.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,iDAA8C;AAG9C,MAAa,eAAe;IAM1B,YAAY,EACV,GAAG,EACH,EAAE,EACF,IAAI,EACJ,GAAG,GAMJ;QACC,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;QACjB,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,QAAQ;QACN,OAAO,IAAI,2BAAY,CAAC,IAAI,CAAC,CAAC,eAAe,CAAC;IAChD,CAAC;CACF;AA1BD,0CA0BC"}
|
|
@@ -1,8 +1,11 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.EncryptionType = void 0;
|
|
1
4
|
/*
|
|
2
5
|
Copied from portis: packages/portis-crypto/src/enums/encryptionType.ts
|
|
3
6
|
*/
|
|
4
|
-
|
|
7
|
+
var EncryptionType;
|
|
5
8
|
(function (EncryptionType) {
|
|
6
9
|
EncryptionType[EncryptionType["AesCbc256_HmacSha256_B64"] = 2] = "AesCbc256_HmacSha256_B64";
|
|
7
|
-
})(EncryptionType || (EncryptionType = {}));
|
|
10
|
+
})(EncryptionType || (exports.EncryptionType = EncryptionType = {}));
|
|
8
11
|
//# sourceMappingURL=encryptionType.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"encryptionType.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptionType.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,
|
|
1
|
+
{"version":3,"file":"encryptionType.js","sourceRoot":"","sources":["../../../src/crypto/classes/encryptionType.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,IAAY,cAEX;AAFD,WAAY,cAAc;IACxB,2FAA4B,CAAA;AAC9B,CAAC,EAFW,cAAc,8BAAd,cAAc,QAEzB"}
|
|
@@ -1,5 +1,12 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.SymmetricCryptoKey = exports.EncryptionType = exports.EncryptedObject = exports.CipherString = void 0;
|
|
4
|
+
var cipherString_1 = require("./cipherString");
|
|
5
|
+
Object.defineProperty(exports, "CipherString", { enumerable: true, get: function () { return cipherString_1.CipherString; } });
|
|
6
|
+
var encryptedObject_1 = require("./encryptedObject");
|
|
7
|
+
Object.defineProperty(exports, "EncryptedObject", { enumerable: true, get: function () { return encryptedObject_1.EncryptedObject; } });
|
|
8
|
+
var encryptionType_1 = require("./encryptionType");
|
|
9
|
+
Object.defineProperty(exports, "EncryptionType", { enumerable: true, get: function () { return encryptionType_1.EncryptionType; } });
|
|
10
|
+
var symmetricCryptoKey_1 = require("./symmetricCryptoKey");
|
|
11
|
+
Object.defineProperty(exports, "SymmetricCryptoKey", { enumerable: true, get: function () { return symmetricCryptoKey_1.SymmetricCryptoKey; } });
|
|
5
12
|
//# sourceMappingURL=index.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/classes/index.ts"],"names":[],"mappings":"AAAA,
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/classes/index.ts"],"names":[],"mappings":";;;AAAA,+CAA8C;AAArC,4GAAA,YAAY,OAAA;AACrB,qDAAoD;AAA3C,kHAAA,eAAe,OAAA;AACxB,mDAAkD;AAAzC,gHAAA,cAAc,OAAA;AACvB,2DAA0D;AAAjD,wHAAA,kBAAkB,OAAA"}
|
|
@@ -1,17 +1,14 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.SymmetricCryptoKey = void 0;
|
|
1
4
|
/*
|
|
2
5
|
Copied from portis: packages/portis-crypto/src/models/symmetricCryptoKey.ts
|
|
3
6
|
*/
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
hashKey;
|
|
8
|
-
encKey;
|
|
9
|
-
macKey;
|
|
10
|
-
encType = EncryptionType.AesCbc256_HmacSha256_B64;
|
|
11
|
-
hashKeyB64;
|
|
12
|
-
encKeyB64;
|
|
13
|
-
macKeyB64;
|
|
7
|
+
const utils_1 = require("../utils");
|
|
8
|
+
const encryptionType_1 = require("./encryptionType");
|
|
9
|
+
class SymmetricCryptoKey {
|
|
14
10
|
constructor(hashKey, encKey, mac) {
|
|
11
|
+
this.encType = encryptionType_1.EncryptionType.AesCbc256_HmacSha256_B64;
|
|
15
12
|
if (hashKey == null)
|
|
16
13
|
throw new Error("Required parameter [hashKey] was not provided");
|
|
17
14
|
if (encKey == null)
|
|
@@ -23,9 +20,10 @@ export class SymmetricCryptoKey {
|
|
|
23
20
|
this.hashKey = hashKey;
|
|
24
21
|
this.encKey = encKey;
|
|
25
22
|
this.macKey = mac;
|
|
26
|
-
this.hashKeyB64 = fromBufferToB64(this.hashKey);
|
|
27
|
-
this.encKeyB64 = fromBufferToB64(this.encKey);
|
|
28
|
-
this.macKeyB64 = fromBufferToB64(this.macKey);
|
|
23
|
+
this.hashKeyB64 = (0, utils_1.fromBufferToB64)(this.hashKey);
|
|
24
|
+
this.encKeyB64 = (0, utils_1.fromBufferToB64)(this.encKey);
|
|
25
|
+
this.macKeyB64 = (0, utils_1.fromBufferToB64)(this.macKey);
|
|
29
26
|
}
|
|
30
27
|
}
|
|
28
|
+
exports.SymmetricCryptoKey = SymmetricCryptoKey;
|
|
31
29
|
//# sourceMappingURL=symmetricCryptoKey.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"symmetricCryptoKey.js","sourceRoot":"","sources":["../../../src/crypto/classes/symmetricCryptoKey.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,
|
|
1
|
+
{"version":3,"file":"symmetricCryptoKey.js","sourceRoot":"","sources":["../../../src/crypto/classes/symmetricCryptoKey.ts"],"names":[],"mappings":";;;AAAA;;GAEG;AACH,oCAA2C;AAC3C,qDAAkD;AAElD,MAAa,kBAAkB;IAU7B,YAAY,OAAoB,EAAE,MAAmB,EAAE,GAAgB;QANvE,YAAO,GAAmB,+BAAc,CAAC,wBAAwB,CAAC;QAOhE,IAAI,OAAO,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACtF,IAAI,MAAM,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;QACpF,IAAI,GAAG,IAAI,IAAI;YAAE,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAE9E,IAAI,OAAO,CAAC,UAAU,KAAK,EAAE,IAAI,MAAM,CAAC,UAAU,KAAK,EAAE,IAAI,GAAG,CAAC,UAAU,KAAK,EAAE;YAChF,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC,CAAC;QAE3C,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;QACvB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC;QACrB,IAAI,CAAC,MAAM,GAAG,GAAG,CAAC;QAElB,IAAI,CAAC,UAAU,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAChD,IAAI,CAAC,SAAS,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAC9C,IAAI,CAAC,SAAS,GAAG,IAAA,uBAAe,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAChD,CAAC;CACF;AA1BD,gDA0BC"}
|
|
@@ -1,3 +1,19 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
1
|
+
"use strict";
|
|
2
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
+
if (k2 === undefined) k2 = k;
|
|
4
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
+
}
|
|
8
|
+
Object.defineProperty(o, k2, desc);
|
|
9
|
+
}) : (function(o, m, k, k2) {
|
|
10
|
+
if (k2 === undefined) k2 = k;
|
|
11
|
+
o[k2] = m[k];
|
|
12
|
+
}));
|
|
13
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
+
};
|
|
16
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
+
__exportStar(require("./types"), exports);
|
|
18
|
+
__exportStar(require("./web-crypto"), exports);
|
|
3
19
|
//# sourceMappingURL=index.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/engines/index.ts"],"names":[],"mappings":"AAAA,
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/crypto/engines/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,0CAAwB;AACxB,+CAA6B"}
|
|
@@ -1,6 +1,9 @@
|
|
|
1
|
-
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.DigestAlgorithm = void 0;
|
|
4
|
+
var DigestAlgorithm;
|
|
2
5
|
(function (DigestAlgorithm) {
|
|
3
6
|
DigestAlgorithm[DigestAlgorithm["SHA256"] = 0] = "SHA256";
|
|
4
7
|
DigestAlgorithm[DigestAlgorithm["SHA512"] = 1] = "SHA512";
|
|
5
|
-
})(DigestAlgorithm || (DigestAlgorithm = {}));
|
|
8
|
+
})(DigestAlgorithm || (exports.DigestAlgorithm = DigestAlgorithm = {}));
|
|
6
9
|
//# sourceMappingURL=types.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/crypto/engines/types.ts"],"names":[],"mappings":"AAYA,
|
|
1
|
+
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../../src/crypto/engines/types.ts"],"names":[],"mappings":";;;AAYA,IAAY,eAGX;AAHD,WAAY,eAAe;IACzB,yDAAM,CAAA;IACN,yDAAM,CAAA;AACR,CAAC,EAHW,eAAe,+BAAf,eAAe,QAG1B"}
|