@solibo/solibo-sdk 1.0.25 → 1.0.27-SNAPSHOT
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/KmLogging-logging.js +88 -88
- package/Kotlin-DateTime-library-kotlinx-datetime.js +1539 -1539
- package/KotlinBigInteger-bignum.js +1164 -1164
- package/MultiplatformSettings-multiplatform-settings.js +17 -17
- package/Stately-stately-concurrency.js +5 -5
- package/cryptography-kotlin-cryptography-bigint.js +31 -31
- package/cryptography-kotlin-cryptography-core.js +52 -52
- package/cryptography-kotlin-cryptography-provider-base.js +8 -8
- package/cryptography-kotlin-cryptography-provider-webcrypto.js +175 -175
- package/cryptography-kotlin-cryptography-random.js +26 -26
- package/cryptography-kotlin-cryptography-serialization-asn1-modules.js +204 -204
- package/cryptography-kotlin-cryptography-serialization-asn1.js +331 -331
- package/cryptography-kotlin-cryptography-serialization-pem.js +16 -16
- package/kotlin-kotlin-stdlib.js +2014 -2008
- package/kotlin-kotlin-stdlib.js.map +1 -1
- package/kotlinx-atomicfu.js +13 -13
- package/kotlinx-coroutines-core.js +2085 -2085
- package/kotlinx-io-kotlinx-io-bytestring.js +32 -32
- package/kotlinx-io-kotlinx-io-core.js +446 -446
- package/kotlinx-serialization-kotlinx-serialization-core.js +1707 -1707
- package/kotlinx-serialization-kotlinx-serialization-json.js +1351 -1351
- package/ktor-ktor-client-auth.js +465 -465
- package/ktor-ktor-client-auth.js.map +1 -1
- package/ktor-ktor-client-content-negotiation.js +184 -184
- package/ktor-ktor-client-core.js +4088 -4088
- package/ktor-ktor-client-logging.js +1078 -1078
- package/ktor-ktor-events.js +6 -6
- package/ktor-ktor-http-cio.js +473 -473
- package/ktor-ktor-http.js +963 -963
- package/ktor-ktor-io.js +1043 -1043
- package/ktor-ktor-serialization-kotlinx-json.js +6 -6
- package/ktor-ktor-serialization-kotlinx.js +234 -234
- package/ktor-ktor-serialization.js +108 -108
- package/ktor-ktor-utils.js +850 -850
- package/ktor-ktor-websockets.js +740 -740
- package/package.json +1 -1
- package/solibo-sdk-sdk-home-api.js +1483 -1483
- package/solibo-sdk-sdk.d.ts +221 -6
- package/solibo-sdk-sdk.js +3279 -2541
- package/solibo-sdk-sdk.js.map +1 -1
|
@@ -185,8 +185,8 @@
|
|
|
185
185
|
WebCryptoCryptographyProvider_instance = this;
|
|
186
186
|
CryptographyProvider.call(this);
|
|
187
187
|
}
|
|
188
|
-
protoOf(WebCryptoCryptographyProvider).
|
|
189
|
-
var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().
|
|
188
|
+
protoOf(WebCryptoCryptographyProvider).m7s = function (identifier) {
|
|
189
|
+
var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().d7x_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().e7x_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().f7x_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().g7x_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
|
|
190
190
|
return (tmp == null ? true : isInterface(tmp, CryptographyAlgorithm)) ? tmp : THROW_CCE();
|
|
191
191
|
};
|
|
192
192
|
var WebCryptoCryptographyProvider_instance;
|
|
@@ -209,17 +209,17 @@
|
|
|
209
209
|
}
|
|
210
210
|
function AesKey(key) {
|
|
211
211
|
WebCryptoEncodableKey.call(this, key, AesKeyProcessor_getInstance());
|
|
212
|
-
this.
|
|
212
|
+
this.j7x_1 = key;
|
|
213
213
|
}
|
|
214
214
|
function WebCryptoAes(algorithmName, keyWrapper) {
|
|
215
|
-
this.
|
|
216
|
-
this.
|
|
215
|
+
this.k7x_1 = algorithmName;
|
|
216
|
+
this.l7x_1 = keyWrapper;
|
|
217
217
|
}
|
|
218
218
|
function AesKeyProcessor() {
|
|
219
219
|
AesKeyProcessor_instance = this;
|
|
220
220
|
WebCryptoKeyProcessor.call(this);
|
|
221
221
|
}
|
|
222
|
-
protoOf(AesKeyProcessor).
|
|
222
|
+
protoOf(AesKeyProcessor).m7x = function (format) {
|
|
223
223
|
var tmp;
|
|
224
224
|
switch (format.a1_1) {
|
|
225
225
|
case 0:
|
|
@@ -234,14 +234,14 @@
|
|
|
234
234
|
}
|
|
235
235
|
return tmp;
|
|
236
236
|
};
|
|
237
|
-
protoOf(AesKeyProcessor).
|
|
238
|
-
return this.
|
|
237
|
+
protoOf(AesKeyProcessor).n7x = function (format) {
|
|
238
|
+
return this.m7x(format instanceof Format ? format : THROW_CCE());
|
|
239
239
|
};
|
|
240
|
-
protoOf(AesKeyProcessor).
|
|
240
|
+
protoOf(AesKeyProcessor).o7x = function (algorithm, format, key) {
|
|
241
241
|
return key;
|
|
242
242
|
};
|
|
243
|
-
protoOf(AesKeyProcessor).
|
|
244
|
-
return this.
|
|
243
|
+
protoOf(AesKeyProcessor).p7x = function (algorithm, format, key) {
|
|
244
|
+
return this.o7x(algorithm, format instanceof Format ? format : THROW_CCE(), key);
|
|
245
245
|
};
|
|
246
246
|
var AesKeyProcessor_instance;
|
|
247
247
|
function AesKeyProcessor_getInstance() {
|
|
@@ -323,10 +323,10 @@
|
|
|
323
323
|
}
|
|
324
324
|
function Companion() {
|
|
325
325
|
Companion_instance_3 = this;
|
|
326
|
-
this.
|
|
327
|
-
this.
|
|
328
|
-
this.
|
|
329
|
-
this.
|
|
326
|
+
this.d7x_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
|
|
327
|
+
this.e7x_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
|
|
328
|
+
this.f7x_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
|
|
329
|
+
this.g7x_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
|
|
330
330
|
}
|
|
331
331
|
var Companion_instance_3;
|
|
332
332
|
function Companion_getInstance_11() {
|
|
@@ -336,52 +336,52 @@
|
|
|
336
336
|
}
|
|
337
337
|
function WebCryptoDigest(algorithm, id) {
|
|
338
338
|
Companion_getInstance_11();
|
|
339
|
-
this.
|
|
340
|
-
this.
|
|
339
|
+
this.q7x_1 = algorithm;
|
|
340
|
+
this.r7x_1 = id;
|
|
341
341
|
}
|
|
342
|
-
protoOf(WebCryptoDigest).
|
|
342
|
+
protoOf(WebCryptoDigest).s7x = function () {
|
|
343
343
|
return this;
|
|
344
344
|
};
|
|
345
|
-
protoOf(WebCryptoDigest).
|
|
346
|
-
return WebCrypto_getInstance().
|
|
345
|
+
protoOf(WebCryptoDigest).d7t = function (data, $completion) {
|
|
346
|
+
return WebCrypto_getInstance().u7x(this.q7x_1, data, $completion);
|
|
347
347
|
};
|
|
348
|
-
protoOf(WebCryptoDigest).
|
|
348
|
+
protoOf(WebCryptoDigest).c7t = function () {
|
|
349
349
|
nonBlocking();
|
|
350
350
|
};
|
|
351
|
-
protoOf(WebCryptoDigest).
|
|
351
|
+
protoOf(WebCryptoDigest).e7t = function (data) {
|
|
352
352
|
nonBlocking();
|
|
353
353
|
};
|
|
354
354
|
function EcPublicKey(publicKey) {
|
|
355
355
|
WebCryptoEncodableKey.call(this, publicKey, EcPublicKeyProcessor_getInstance());
|
|
356
|
-
this.
|
|
356
|
+
this.x7x_1 = publicKey;
|
|
357
357
|
}
|
|
358
358
|
function EcPrivateKey_0(privateKey) {
|
|
359
359
|
WebCryptoEncodableKey.call(this, privateKey, EcPrivateKeyProcessor_getInstance());
|
|
360
|
-
this.
|
|
360
|
+
this.a7y_1 = privateKey;
|
|
361
361
|
}
|
|
362
362
|
function WebCryptoEc$keyPairWrapper$lambda($keyPairWrapper, this$0) {
|
|
363
363
|
return function (it) {
|
|
364
|
-
return $keyPairWrapper(this$0.
|
|
364
|
+
return $keyPairWrapper(this$0.e7y_1.c7y_1(it.publicKey), this$0.f7y_1.c7y_1(it.privateKey));
|
|
365
365
|
};
|
|
366
366
|
}
|
|
367
367
|
function WebCryptoEc(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
|
|
368
|
-
this.
|
|
369
|
-
this.
|
|
370
|
-
this.
|
|
368
|
+
this.d7y_1 = algorithmName;
|
|
369
|
+
this.e7y_1 = publicKeyWrapper;
|
|
370
|
+
this.f7y_1 = privateKeyWrapper;
|
|
371
371
|
var tmp = this;
|
|
372
|
-
var tmp0 = this.
|
|
372
|
+
var tmp0 = this.e7y_1.b7y_1;
|
|
373
373
|
// Inline function 'kotlin.collections.plus' call
|
|
374
|
-
var elements = this.
|
|
374
|
+
var elements = this.f7y_1.b7y_1;
|
|
375
375
|
// Inline function 'kotlin.js.asDynamic' call
|
|
376
|
-
tmp.
|
|
376
|
+
tmp.g7y_1 = tmp0.concat(elements);
|
|
377
377
|
var tmp_0 = this;
|
|
378
|
-
tmp_0.
|
|
378
|
+
tmp_0.h7y_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
|
|
379
379
|
}
|
|
380
380
|
function EcPublicKeyProcessor() {
|
|
381
381
|
EcPublicKeyProcessor_instance = this;
|
|
382
382
|
WebCryptoKeyProcessor.call(this);
|
|
383
383
|
}
|
|
384
|
-
protoOf(EcPublicKeyProcessor).
|
|
384
|
+
protoOf(EcPublicKeyProcessor).i7y = function (format) {
|
|
385
385
|
var tmp;
|
|
386
386
|
if (equals(format, JWK_getInstance())) {
|
|
387
387
|
tmp = 'jwk';
|
|
@@ -394,10 +394,10 @@
|
|
|
394
394
|
}
|
|
395
395
|
return tmp;
|
|
396
396
|
};
|
|
397
|
-
protoOf(EcPublicKeyProcessor).
|
|
398
|
-
return this.
|
|
397
|
+
protoOf(EcPublicKeyProcessor).n7x = function (format) {
|
|
398
|
+
return this.i7y(format instanceof Format_0 ? format : THROW_CCE());
|
|
399
399
|
};
|
|
400
|
-
protoOf(EcPublicKeyProcessor).
|
|
400
|
+
protoOf(EcPublicKeyProcessor).j7y = function (algorithm, format, key) {
|
|
401
401
|
var tmp;
|
|
402
402
|
if (equals(format, JWK_getInstance())) {
|
|
403
403
|
tmp = key;
|
|
@@ -406,14 +406,14 @@
|
|
|
406
406
|
} else if (equals(format, DER_getInstance())) {
|
|
407
407
|
tmp = key;
|
|
408
408
|
} else if (equals(format, PEM_getInstance())) {
|
|
409
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
409
|
+
tmp = unwrapPem(Companion_getInstance_10().y7w_1, key);
|
|
410
410
|
} else {
|
|
411
411
|
noWhenBranchMatchedException();
|
|
412
412
|
}
|
|
413
413
|
return tmp;
|
|
414
414
|
};
|
|
415
|
-
protoOf(EcPublicKeyProcessor).
|
|
416
|
-
return this.
|
|
415
|
+
protoOf(EcPublicKeyProcessor).p7x = function (algorithm, format, key) {
|
|
416
|
+
return this.j7y(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
|
|
417
417
|
};
|
|
418
418
|
var EcPublicKeyProcessor_instance;
|
|
419
419
|
function EcPublicKeyProcessor_getInstance() {
|
|
@@ -425,7 +425,7 @@
|
|
|
425
425
|
EcPrivateKeyProcessor_instance = this;
|
|
426
426
|
WebCryptoKeyProcessor.call(this);
|
|
427
427
|
}
|
|
428
|
-
protoOf(EcPrivateKeyProcessor).
|
|
428
|
+
protoOf(EcPrivateKeyProcessor).k7y = function (format) {
|
|
429
429
|
var tmp;
|
|
430
430
|
if (equals(format, JWK_getInstance_0())) {
|
|
431
431
|
tmp = 'jwk';
|
|
@@ -436,43 +436,43 @@
|
|
|
436
436
|
}
|
|
437
437
|
return tmp;
|
|
438
438
|
};
|
|
439
|
-
protoOf(EcPrivateKeyProcessor).
|
|
440
|
-
return this.
|
|
439
|
+
protoOf(EcPrivateKeyProcessor).n7x = function (format) {
|
|
440
|
+
return this.k7y(format instanceof Format_1 ? format : THROW_CCE());
|
|
441
441
|
};
|
|
442
|
-
protoOf(EcPrivateKeyProcessor).
|
|
442
|
+
protoOf(EcPrivateKeyProcessor).l7y = function (algorithm, format, key) {
|
|
443
443
|
var tmp;
|
|
444
444
|
if (equals(format, JWK_getInstance_0())) {
|
|
445
445
|
tmp = key;
|
|
446
446
|
} else if (equals(format, RAW_getInstance())) {
|
|
447
447
|
var namedCurve = get_ecKeyAlgorithmNamedCurve(algorithm);
|
|
448
448
|
var tmp_0;
|
|
449
|
-
if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.
|
|
449
|
+
if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.x7s())) {
|
|
450
450
|
tmp_0 = get_secp256r1(Companion_instance);
|
|
451
|
-
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.x7s())) {
|
|
452
|
-
tmp_0 = get_secp384r1(Companion_instance);
|
|
453
451
|
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.y7s())) {
|
|
452
|
+
tmp_0 = get_secp384r1(Companion_instance);
|
|
453
|
+
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.z7s())) {
|
|
454
454
|
tmp_0 = get_secp521r1(Companion_instance);
|
|
455
455
|
} else {
|
|
456
456
|
var message = 'Unknown curve: ' + namedCurve;
|
|
457
457
|
throw IllegalStateException_init_$Create$(toString(message));
|
|
458
458
|
}
|
|
459
459
|
var curveId = tmp_0;
|
|
460
|
-
tmp = wrapPrivateKeyInfo(0, new EcKeyAlgorithmIdentifier(_EcParameters___init__impl__i4ww9z(curveId)), Default_getInstance().
|
|
460
|
+
tmp = wrapPrivateKeyInfo(0, new EcKeyAlgorithmIdentifier(_EcParameters___init__impl__i4ww9z(curveId)), Default_getInstance().d20(Companion_instance_1.r67(), new EcPrivateKey(1, key)));
|
|
461
461
|
} else if (equals(format, Generic_getInstance())) {
|
|
462
462
|
tmp = key;
|
|
463
463
|
} else if (equals(format, Generic_getInstance_0())) {
|
|
464
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
464
|
+
tmp = unwrapPem(Companion_getInstance_10().z7w_1, key);
|
|
465
465
|
} else if (equals(format, SEC1_getInstance())) {
|
|
466
466
|
tmp = convertEcPrivateKeyFromSec1ToPkcs8(key);
|
|
467
467
|
} else if (equals(format, SEC1_getInstance_0())) {
|
|
468
|
-
tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().
|
|
468
|
+
tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().c7x_1, key));
|
|
469
469
|
} else {
|
|
470
470
|
noWhenBranchMatchedException();
|
|
471
471
|
}
|
|
472
472
|
return tmp;
|
|
473
473
|
};
|
|
474
|
-
protoOf(EcPrivateKeyProcessor).
|
|
475
|
-
return this.
|
|
474
|
+
protoOf(EcPrivateKeyProcessor).p7x = function (algorithm, format, key) {
|
|
475
|
+
return this.l7y(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
|
|
476
476
|
};
|
|
477
477
|
var EcPrivateKeyProcessor_instance;
|
|
478
478
|
function EcPrivateKeyProcessor_getInstance() {
|
|
@@ -481,8 +481,8 @@
|
|
|
481
481
|
return EcPrivateKeyProcessor_instance;
|
|
482
482
|
}
|
|
483
483
|
function EcdhKeyPair(publicKey, privateKey) {
|
|
484
|
-
this.
|
|
485
|
-
this.
|
|
484
|
+
this.m7y_1 = publicKey;
|
|
485
|
+
this.n7y_1 = privateKey;
|
|
486
486
|
}
|
|
487
487
|
function EcdhPublicKey(publicKey) {
|
|
488
488
|
EcPublicKey.call(this, publicKey);
|
|
@@ -532,8 +532,8 @@
|
|
|
532
532
|
return WebCryptoEcdh_instance;
|
|
533
533
|
}
|
|
534
534
|
function EcdsaKeyPair(publicKey, privateKey) {
|
|
535
|
-
this.
|
|
536
|
-
this.
|
|
535
|
+
this.o7y_1 = publicKey;
|
|
536
|
+
this.p7y_1 = privateKey;
|
|
537
537
|
}
|
|
538
538
|
function EcdsaPublicKey(publicKey) {
|
|
539
539
|
EcPublicKey.call(this, publicKey);
|
|
@@ -590,10 +590,10 @@
|
|
|
590
590
|
}
|
|
591
591
|
function HmacKey(key) {
|
|
592
592
|
WebCryptoEncodableKey.call(this, key, HmacKeyProcessor_getInstance());
|
|
593
|
-
this.
|
|
593
|
+
this.s7y_1 = key;
|
|
594
594
|
}
|
|
595
|
-
protoOf(HmacKey).
|
|
596
|
-
return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.
|
|
595
|
+
protoOf(HmacKey).t7y = function () {
|
|
596
|
+
return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.s7y_1);
|
|
597
597
|
};
|
|
598
598
|
function WebCryptoHmac$HmacKey$_init_$ref_enwl2t() {
|
|
599
599
|
var l = function (p0) {
|
|
@@ -609,10 +609,10 @@
|
|
|
609
609
|
// Inline function 'kotlin.js.unsafeCast' call
|
|
610
610
|
// Inline function 'kotlin.js.asDynamic' call
|
|
611
611
|
var tmp_0 = ['sign', 'verify'];
|
|
612
|
-
tmp.
|
|
612
|
+
tmp.u7y_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
|
|
613
613
|
}
|
|
614
|
-
protoOf(WebCryptoHmac).
|
|
615
|
-
return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.
|
|
614
|
+
protoOf(WebCryptoHmac).v7y = function (digest) {
|
|
615
|
+
return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.u7y_1);
|
|
616
616
|
};
|
|
617
617
|
var WebCryptoHmac_instance;
|
|
618
618
|
function WebCryptoHmac_getInstance() {
|
|
@@ -624,7 +624,7 @@
|
|
|
624
624
|
HmacKeyProcessor_instance = this;
|
|
625
625
|
WebCryptoKeyProcessor.call(this);
|
|
626
626
|
}
|
|
627
|
-
protoOf(HmacKeyProcessor).
|
|
627
|
+
protoOf(HmacKeyProcessor).w7y = function (format) {
|
|
628
628
|
var tmp;
|
|
629
629
|
switch (format.a1_1) {
|
|
630
630
|
case 0:
|
|
@@ -639,14 +639,14 @@
|
|
|
639
639
|
}
|
|
640
640
|
return tmp;
|
|
641
641
|
};
|
|
642
|
-
protoOf(HmacKeyProcessor).
|
|
643
|
-
return this.
|
|
642
|
+
protoOf(HmacKeyProcessor).n7x = function (format) {
|
|
643
|
+
return this.w7y(format instanceof Format_2 ? format : THROW_CCE());
|
|
644
644
|
};
|
|
645
|
-
protoOf(HmacKeyProcessor).
|
|
645
|
+
protoOf(HmacKeyProcessor).x7y = function (algorithm, format, key) {
|
|
646
646
|
return key;
|
|
647
647
|
};
|
|
648
|
-
protoOf(HmacKeyProcessor).
|
|
649
|
-
return this.
|
|
648
|
+
protoOf(HmacKeyProcessor).p7x = function (algorithm, format, key) {
|
|
649
|
+
return this.x7y(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
|
|
650
650
|
};
|
|
651
651
|
var HmacKeyProcessor_instance;
|
|
652
652
|
function HmacKeyProcessor_getInstance() {
|
|
@@ -662,35 +662,35 @@
|
|
|
662
662
|
}
|
|
663
663
|
function RsaPublicKey(publicKey) {
|
|
664
664
|
WebCryptoEncodableKey.call(this, publicKey, RsaPublicKeyProcessor_getInstance());
|
|
665
|
-
this.
|
|
665
|
+
this.a7z_1 = publicKey;
|
|
666
666
|
}
|
|
667
667
|
function RsaPrivateKey(privateKey) {
|
|
668
668
|
WebCryptoEncodableKey.call(this, privateKey, RsaPrivateKeyProcessor_getInstance());
|
|
669
|
-
this.
|
|
669
|
+
this.d7z_1 = privateKey;
|
|
670
670
|
}
|
|
671
671
|
function WebCryptoRsa$keyPairWrapper$lambda($keyPairWrapper, this$0) {
|
|
672
672
|
return function (it) {
|
|
673
|
-
return $keyPairWrapper(this$0.
|
|
673
|
+
return $keyPairWrapper(this$0.f7z_1.c7y_1(it.publicKey), this$0.g7z_1.c7y_1(it.privateKey));
|
|
674
674
|
};
|
|
675
675
|
}
|
|
676
676
|
function WebCryptoRsa(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
|
|
677
|
-
this.
|
|
678
|
-
this.
|
|
679
|
-
this.
|
|
677
|
+
this.e7z_1 = algorithmName;
|
|
678
|
+
this.f7z_1 = publicKeyWrapper;
|
|
679
|
+
this.g7z_1 = privateKeyWrapper;
|
|
680
680
|
var tmp = this;
|
|
681
|
-
var tmp0 = this.
|
|
681
|
+
var tmp0 = this.f7z_1.b7y_1;
|
|
682
682
|
// Inline function 'kotlin.collections.plus' call
|
|
683
|
-
var elements = this.
|
|
683
|
+
var elements = this.g7z_1.b7y_1;
|
|
684
684
|
// Inline function 'kotlin.js.asDynamic' call
|
|
685
|
-
tmp.
|
|
685
|
+
tmp.h7z_1 = tmp0.concat(elements);
|
|
686
686
|
var tmp_0 = this;
|
|
687
|
-
tmp_0.
|
|
687
|
+
tmp_0.i7z_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
|
|
688
688
|
}
|
|
689
689
|
function RsaPublicKeyProcessor() {
|
|
690
690
|
RsaPublicKeyProcessor_instance = this;
|
|
691
691
|
WebCryptoKeyProcessor.call(this);
|
|
692
692
|
}
|
|
693
|
-
protoOf(RsaPublicKeyProcessor).
|
|
693
|
+
protoOf(RsaPublicKeyProcessor).j7z = function (format) {
|
|
694
694
|
var tmp;
|
|
695
695
|
if (equals(format, JWK_getInstance_1())) {
|
|
696
696
|
tmp = 'jwk';
|
|
@@ -701,28 +701,28 @@
|
|
|
701
701
|
}
|
|
702
702
|
return tmp;
|
|
703
703
|
};
|
|
704
|
-
protoOf(RsaPublicKeyProcessor).
|
|
705
|
-
return this.
|
|
704
|
+
protoOf(RsaPublicKeyProcessor).n7x = function (format) {
|
|
705
|
+
return this.j7z(format instanceof Format_3 ? format : THROW_CCE());
|
|
706
706
|
};
|
|
707
|
-
protoOf(RsaPublicKeyProcessor).
|
|
707
|
+
protoOf(RsaPublicKeyProcessor).k7z = function (algorithm, format, key) {
|
|
708
708
|
var tmp;
|
|
709
709
|
if (equals(format, JWK_getInstance_1())) {
|
|
710
710
|
tmp = key;
|
|
711
711
|
} else if (equals(format, Generic_getInstance_1())) {
|
|
712
712
|
tmp = key;
|
|
713
713
|
} else if (equals(format, Generic_getInstance_2())) {
|
|
714
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
714
|
+
tmp = unwrapPem(Companion_getInstance_10().y7w_1, key);
|
|
715
715
|
} else if (equals(format, PKCS1_getInstance())) {
|
|
716
716
|
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, key);
|
|
717
717
|
} else if (equals(format, PKCS1_getInstance_0())) {
|
|
718
|
-
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().
|
|
718
|
+
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().a7x_1, key));
|
|
719
719
|
} else {
|
|
720
720
|
noWhenBranchMatchedException();
|
|
721
721
|
}
|
|
722
722
|
return tmp;
|
|
723
723
|
};
|
|
724
|
-
protoOf(RsaPublicKeyProcessor).
|
|
725
|
-
return this.
|
|
724
|
+
protoOf(RsaPublicKeyProcessor).p7x = function (algorithm, format, key) {
|
|
725
|
+
return this.k7z(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
|
|
726
726
|
};
|
|
727
727
|
var RsaPublicKeyProcessor_instance;
|
|
728
728
|
function RsaPublicKeyProcessor_getInstance() {
|
|
@@ -734,7 +734,7 @@
|
|
|
734
734
|
RsaPrivateKeyProcessor_instance = this;
|
|
735
735
|
WebCryptoKeyProcessor.call(this);
|
|
736
736
|
}
|
|
737
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
737
|
+
protoOf(RsaPrivateKeyProcessor).l7z = function (format) {
|
|
738
738
|
var tmp;
|
|
739
739
|
if (equals(format, JWK_getInstance_2())) {
|
|
740
740
|
tmp = 'jwk';
|
|
@@ -745,28 +745,28 @@
|
|
|
745
745
|
}
|
|
746
746
|
return tmp;
|
|
747
747
|
};
|
|
748
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
749
|
-
return this.
|
|
748
|
+
protoOf(RsaPrivateKeyProcessor).n7x = function (format) {
|
|
749
|
+
return this.l7z(format instanceof Format_4 ? format : THROW_CCE());
|
|
750
750
|
};
|
|
751
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
751
|
+
protoOf(RsaPrivateKeyProcessor).m7z = function (algorithm, format, key) {
|
|
752
752
|
var tmp;
|
|
753
753
|
if (equals(format, JWK_getInstance_2())) {
|
|
754
754
|
tmp = key;
|
|
755
755
|
} else if (equals(format, Generic_getInstance_3())) {
|
|
756
756
|
tmp = key;
|
|
757
757
|
} else if (equals(format, Generic_getInstance_4())) {
|
|
758
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
758
|
+
tmp = unwrapPem(Companion_getInstance_10().z7w_1, key);
|
|
759
759
|
} else if (equals(format, PKCS1_getInstance_1())) {
|
|
760
760
|
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, key);
|
|
761
761
|
} else if (equals(format, PKCS1_getInstance_2())) {
|
|
762
|
-
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().
|
|
762
|
+
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().b7x_1, key));
|
|
763
763
|
} else {
|
|
764
764
|
noWhenBranchMatchedException();
|
|
765
765
|
}
|
|
766
766
|
return tmp;
|
|
767
767
|
};
|
|
768
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
769
|
-
return this.
|
|
768
|
+
protoOf(RsaPrivateKeyProcessor).p7x = function (algorithm, format, key) {
|
|
769
|
+
return this.m7z(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
|
|
770
770
|
};
|
|
771
771
|
var RsaPrivateKeyProcessor_instance;
|
|
772
772
|
function RsaPrivateKeyProcessor_getInstance() {
|
|
@@ -775,8 +775,8 @@
|
|
|
775
775
|
return RsaPrivateKeyProcessor_instance;
|
|
776
776
|
}
|
|
777
777
|
function RsaOaepKeyPair(publicKey, privateKey) {
|
|
778
|
-
this.
|
|
779
|
-
this.
|
|
778
|
+
this.n7z_1 = publicKey;
|
|
779
|
+
this.o7z_1 = privateKey;
|
|
780
780
|
}
|
|
781
781
|
function RsaOaepPublicKey(publicKey) {
|
|
782
782
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -826,8 +826,8 @@
|
|
|
826
826
|
return WebCryptoRsaOaep_instance;
|
|
827
827
|
}
|
|
828
828
|
function RsaPkcs1KeyPair(publicKey, privateKey) {
|
|
829
|
-
this.
|
|
830
|
-
this.
|
|
829
|
+
this.p7z_1 = publicKey;
|
|
830
|
+
this.q7z_1 = privateKey;
|
|
831
831
|
}
|
|
832
832
|
function RsaPkcs1PublicKey(publicKey) {
|
|
833
833
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -877,8 +877,8 @@
|
|
|
877
877
|
return WebCryptoRsaPkcs1_instance;
|
|
878
878
|
}
|
|
879
879
|
function RsaPssKeyPair(publicKey, privateKey) {
|
|
880
|
-
this.
|
|
881
|
-
this.
|
|
880
|
+
this.r7z_1 = publicKey;
|
|
881
|
+
this.s7z_1 = privateKey;
|
|
882
882
|
}
|
|
883
883
|
function RsaPssPublicKey(publicKey) {
|
|
884
884
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -938,7 +938,7 @@
|
|
|
938
938
|
} else if (equals(_this__u8e3s4, SHA512_getInstance())) {
|
|
939
939
|
tmp = 'SHA-512';
|
|
940
940
|
} else {
|
|
941
|
-
throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.
|
|
941
|
+
throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.i7s_1);
|
|
942
942
|
}
|
|
943
943
|
return tmp;
|
|
944
944
|
}
|
|
@@ -946,26 +946,26 @@
|
|
|
946
946
|
throw IllegalStateException_init_$Create$('Only non-blocking(suspend) calls are supported in WebCrypto');
|
|
947
947
|
}
|
|
948
948
|
function WebCryptoEncodableKey(key, keyProcessor) {
|
|
949
|
-
this.
|
|
950
|
-
this.
|
|
949
|
+
this.t7z_1 = key;
|
|
950
|
+
this.u7z_1 = keyProcessor;
|
|
951
951
|
}
|
|
952
952
|
function $decodeFromByteArrayCOROUTINE$(_this__u8e3s4, format, bytes, resultContinuation) {
|
|
953
953
|
CoroutineImpl.call(this, resultContinuation);
|
|
954
|
-
this.
|
|
955
|
-
this.
|
|
956
|
-
this.
|
|
954
|
+
this.d80_1 = _this__u8e3s4;
|
|
955
|
+
this.e80_1 = format;
|
|
956
|
+
this.f80_1 = bytes;
|
|
957
957
|
}
|
|
958
|
-
protoOf($decodeFromByteArrayCOROUTINE$).
|
|
959
|
-
var suspendResult = this.
|
|
958
|
+
protoOf($decodeFromByteArrayCOROUTINE$).h9 = function () {
|
|
959
|
+
var suspendResult = this.b9_1;
|
|
960
960
|
$sm: do
|
|
961
961
|
try {
|
|
962
|
-
var tmp = this.
|
|
962
|
+
var tmp = this.z8_1;
|
|
963
963
|
switch (tmp) {
|
|
964
964
|
case 0:
|
|
965
|
-
this.
|
|
966
|
-
this.
|
|
967
|
-
this.
|
|
968
|
-
suspendResult = WebCrypto_getInstance().
|
|
965
|
+
this.a9_1 = 2;
|
|
966
|
+
this.g80_1 = this.d80_1.j80_1.c7y_1;
|
|
967
|
+
this.z8_1 = 1;
|
|
968
|
+
suspendResult = WebCrypto_getInstance().k80(this.d80_1.i80_1.n7x(this.e80_1), this.d80_1.i80_1.p7x(this.d80_1.h80_1, this.e80_1, this.f80_1), this.d80_1.h80_1, true, this.d80_1.j80_1.b7y_1, this);
|
|
969
969
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
970
970
|
return suspendResult;
|
|
971
971
|
}
|
|
@@ -973,52 +973,52 @@
|
|
|
973
973
|
continue $sm;
|
|
974
974
|
case 1:
|
|
975
975
|
var ARGUMENT = suspendResult;
|
|
976
|
-
return this.
|
|
976
|
+
return this.g80_1(ARGUMENT);
|
|
977
977
|
case 2:
|
|
978
|
-
throw this.
|
|
978
|
+
throw this.c9_1;
|
|
979
979
|
}
|
|
980
980
|
} catch ($p) {
|
|
981
981
|
var e = $p;
|
|
982
|
-
if (this.
|
|
982
|
+
if (this.a9_1 === 2) {
|
|
983
983
|
throw e;
|
|
984
984
|
} else {
|
|
985
|
-
this.
|
|
986
|
-
this.
|
|
985
|
+
this.z8_1 = this.a9_1;
|
|
986
|
+
this.c9_1 = e;
|
|
987
987
|
}
|
|
988
988
|
}
|
|
989
989
|
while (true);
|
|
990
990
|
};
|
|
991
991
|
function WebCryptoKeyDecoder(algorithm, keyProcessor, keyWrapper) {
|
|
992
|
-
this.
|
|
993
|
-
this.
|
|
994
|
-
this.
|
|
992
|
+
this.h80_1 = algorithm;
|
|
993
|
+
this.i80_1 = keyProcessor;
|
|
994
|
+
this.j80_1 = keyWrapper;
|
|
995
995
|
}
|
|
996
|
-
protoOf(WebCryptoKeyDecoder).
|
|
996
|
+
protoOf(WebCryptoKeyDecoder).a7t = function (format, bytes, $completion) {
|
|
997
997
|
var tmp = new $decodeFromByteArrayCOROUTINE$(this, format, bytes, $completion);
|
|
998
|
-
tmp.
|
|
999
|
-
tmp.
|
|
1000
|
-
return tmp.
|
|
998
|
+
tmp.b9_1 = Unit_instance;
|
|
999
|
+
tmp.c9_1 = null;
|
|
1000
|
+
return tmp.h9();
|
|
1001
1001
|
};
|
|
1002
|
-
protoOf(WebCryptoKeyDecoder).
|
|
1002
|
+
protoOf(WebCryptoKeyDecoder).b7t = function (format, bytes) {
|
|
1003
1003
|
nonBlocking();
|
|
1004
1004
|
};
|
|
1005
1005
|
function WebCryptoKeyProcessor() {
|
|
1006
1006
|
}
|
|
1007
1007
|
function WebCryptoKeyWrapper(usages, wrap) {
|
|
1008
|
-
this.
|
|
1009
|
-
this.
|
|
1008
|
+
this.b7y_1 = usages;
|
|
1009
|
+
this.c7y_1 = wrap;
|
|
1010
1010
|
}
|
|
1011
1011
|
function WebCryptoSignatureGenerator(algorithm, key) {
|
|
1012
|
-
this.
|
|
1013
|
-
this.
|
|
1012
|
+
this.l80_1 = algorithm;
|
|
1013
|
+
this.m80_1 = key;
|
|
1014
1014
|
}
|
|
1015
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1016
|
-
return WebCrypto_getInstance().
|
|
1015
|
+
protoOf(WebCryptoSignatureGenerator).i7t = function (data, $completion) {
|
|
1016
|
+
return WebCrypto_getInstance().n80(this.l80_1, this.m80_1, data, $completion);
|
|
1017
1017
|
};
|
|
1018
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1018
|
+
protoOf(WebCryptoSignatureGenerator).h7t = function () {
|
|
1019
1019
|
nonBlocking();
|
|
1020
1020
|
};
|
|
1021
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1021
|
+
protoOf(WebCryptoSignatureGenerator).j7t = function (data) {
|
|
1022
1022
|
nonBlocking();
|
|
1023
1023
|
};
|
|
1024
1024
|
function get_initHook() {
|
|
@@ -1026,7 +1026,7 @@
|
|
|
1026
1026
|
}
|
|
1027
1027
|
var initHook;
|
|
1028
1028
|
function initHook$init$() {
|
|
1029
|
-
CryptographySystem_getInstance().
|
|
1029
|
+
CryptographySystem_getInstance().u7s(get_defaultProvider(), 100);
|
|
1030
1030
|
return Unit_instance;
|
|
1031
1031
|
}
|
|
1032
1032
|
function get_ecKeyAlgorithmNamedCurve(_this__u8e3s4) {
|
|
@@ -1065,20 +1065,20 @@
|
|
|
1065
1065
|
}
|
|
1066
1066
|
function $digestCOROUTINE$(_this__u8e3s4, algorithmName, data, resultContinuation) {
|
|
1067
1067
|
CoroutineImpl.call(this, resultContinuation);
|
|
1068
|
-
this.
|
|
1069
|
-
this.
|
|
1070
|
-
this.
|
|
1068
|
+
this.w80_1 = _this__u8e3s4;
|
|
1069
|
+
this.x80_1 = algorithmName;
|
|
1070
|
+
this.y80_1 = data;
|
|
1071
1071
|
}
|
|
1072
|
-
protoOf($digestCOROUTINE$).
|
|
1073
|
-
var suspendResult = this.
|
|
1072
|
+
protoOf($digestCOROUTINE$).h9 = function () {
|
|
1073
|
+
var suspendResult = this.b9_1;
|
|
1074
1074
|
$sm: do
|
|
1075
1075
|
try {
|
|
1076
|
-
var tmp = this.
|
|
1076
|
+
var tmp = this.z8_1;
|
|
1077
1077
|
switch (tmp) {
|
|
1078
1078
|
case 0:
|
|
1079
|
-
this.
|
|
1080
|
-
this.
|
|
1081
|
-
suspendResult = await_0(this.
|
|
1079
|
+
this.a9_1 = 2;
|
|
1080
|
+
this.z8_1 = 1;
|
|
1081
|
+
suspendResult = await_0(this.w80_1.t7x_1.digest(this.x80_1, this.y80_1), this);
|
|
1082
1082
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
1083
1083
|
return suspendResult;
|
|
1084
1084
|
}
|
|
@@ -1088,36 +1088,36 @@
|
|
|
1088
1088
|
var ARGUMENT = suspendResult;
|
|
1089
1089
|
return toByteArray(ARGUMENT);
|
|
1090
1090
|
case 2:
|
|
1091
|
-
throw this.
|
|
1091
|
+
throw this.c9_1;
|
|
1092
1092
|
}
|
|
1093
1093
|
} catch ($p) {
|
|
1094
1094
|
var e = $p;
|
|
1095
|
-
if (this.
|
|
1095
|
+
if (this.a9_1 === 2) {
|
|
1096
1096
|
throw e;
|
|
1097
1097
|
} else {
|
|
1098
|
-
this.
|
|
1099
|
-
this.
|
|
1098
|
+
this.z8_1 = this.a9_1;
|
|
1099
|
+
this.c9_1 = e;
|
|
1100
1100
|
}
|
|
1101
1101
|
}
|
|
1102
1102
|
while (true);
|
|
1103
1103
|
};
|
|
1104
1104
|
function $signCOROUTINE$(_this__u8e3s4, algorithm, key, data, resultContinuation) {
|
|
1105
1105
|
CoroutineImpl.call(this, resultContinuation);
|
|
1106
|
-
this.
|
|
1107
|
-
this.
|
|
1108
|
-
this.
|
|
1109
|
-
this.
|
|
1106
|
+
this.h81_1 = _this__u8e3s4;
|
|
1107
|
+
this.i81_1 = algorithm;
|
|
1108
|
+
this.j81_1 = key;
|
|
1109
|
+
this.k81_1 = data;
|
|
1110
1110
|
}
|
|
1111
|
-
protoOf($signCOROUTINE$).
|
|
1112
|
-
var suspendResult = this.
|
|
1111
|
+
protoOf($signCOROUTINE$).h9 = function () {
|
|
1112
|
+
var suspendResult = this.b9_1;
|
|
1113
1113
|
$sm: do
|
|
1114
1114
|
try {
|
|
1115
|
-
var tmp = this.
|
|
1115
|
+
var tmp = this.z8_1;
|
|
1116
1116
|
switch (tmp) {
|
|
1117
1117
|
case 0:
|
|
1118
|
-
this.
|
|
1119
|
-
this.
|
|
1120
|
-
suspendResult = await_0(this.
|
|
1118
|
+
this.a9_1 = 2;
|
|
1119
|
+
this.z8_1 = 1;
|
|
1120
|
+
suspendResult = await_0(this.h81_1.t7x_1.sign(this.i81_1, this.j81_1, this.k81_1), this);
|
|
1121
1121
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
1122
1122
|
return suspendResult;
|
|
1123
1123
|
}
|
|
@@ -1127,38 +1127,38 @@
|
|
|
1127
1127
|
var ARGUMENT = suspendResult;
|
|
1128
1128
|
return toByteArray(ARGUMENT);
|
|
1129
1129
|
case 2:
|
|
1130
|
-
throw this.
|
|
1130
|
+
throw this.c9_1;
|
|
1131
1131
|
}
|
|
1132
1132
|
} catch ($p) {
|
|
1133
1133
|
var e = $p;
|
|
1134
|
-
if (this.
|
|
1134
|
+
if (this.a9_1 === 2) {
|
|
1135
1135
|
throw e;
|
|
1136
1136
|
} else {
|
|
1137
|
-
this.
|
|
1138
|
-
this.
|
|
1137
|
+
this.z8_1 = this.a9_1;
|
|
1138
|
+
this.c9_1 = e;
|
|
1139
1139
|
}
|
|
1140
1140
|
}
|
|
1141
1141
|
while (true);
|
|
1142
1142
|
};
|
|
1143
1143
|
function WebCrypto() {
|
|
1144
1144
|
WebCrypto_instance = this;
|
|
1145
|
-
this.
|
|
1145
|
+
this.t7x_1 = getSubtleCrypto();
|
|
1146
1146
|
}
|
|
1147
|
-
protoOf(WebCrypto).
|
|
1147
|
+
protoOf(WebCrypto).u7x = function (algorithmName, data, $completion) {
|
|
1148
1148
|
var tmp = new $digestCOROUTINE$(this, algorithmName, data, $completion);
|
|
1149
|
-
tmp.
|
|
1150
|
-
tmp.
|
|
1151
|
-
return tmp.
|
|
1149
|
+
tmp.b9_1 = Unit_instance;
|
|
1150
|
+
tmp.c9_1 = null;
|
|
1151
|
+
return tmp.h9();
|
|
1152
1152
|
};
|
|
1153
|
-
protoOf(WebCrypto).
|
|
1153
|
+
protoOf(WebCrypto).n80 = function (algorithm, key, data, $completion) {
|
|
1154
1154
|
var tmp = new $signCOROUTINE$(this, algorithm, key, data, $completion);
|
|
1155
|
-
tmp.
|
|
1156
|
-
tmp.
|
|
1157
|
-
return tmp.
|
|
1155
|
+
tmp.b9_1 = Unit_instance;
|
|
1156
|
+
tmp.c9_1 = null;
|
|
1157
|
+
return tmp.h9();
|
|
1158
1158
|
};
|
|
1159
|
-
protoOf(WebCrypto).
|
|
1159
|
+
protoOf(WebCrypto).k80 = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
|
|
1160
1160
|
var key = format === 'jwk' ? JSON.parse(decodeToString(keyData)) : keyData;
|
|
1161
|
-
return await_0(this.
|
|
1161
|
+
return await_0(this.t7x_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
|
|
1162
1162
|
};
|
|
1163
1163
|
var WebCrypto_instance;
|
|
1164
1164
|
function WebCrypto_getInstance() {
|
|
@@ -1175,7 +1175,7 @@
|
|
|
1175
1175
|
var safe = SafeContinuation_init_$Create$(intercepted($completion));
|
|
1176
1176
|
var tmp = await$lambda(safe);
|
|
1177
1177
|
_this__u8e3s4.then(tmp, await$lambda_0(safe));
|
|
1178
|
-
return safe.
|
|
1178
|
+
return safe.r9();
|
|
1179
1179
|
}
|
|
1180
1180
|
function await$lambda($continuation) {
|
|
1181
1181
|
return function (it) {
|
|
@@ -1183,7 +1183,7 @@
|
|
|
1183
1183
|
var this_0 = $continuation;
|
|
1184
1184
|
// Inline function 'kotlin.Companion.success' call
|
|
1185
1185
|
var tmp$ret$0 = _Result___init__impl__xyqfz8(it);
|
|
1186
|
-
this_0.
|
|
1186
|
+
this_0.k9(tmp$ret$0);
|
|
1187
1187
|
return null;
|
|
1188
1188
|
};
|
|
1189
1189
|
}
|
|
@@ -1193,7 +1193,7 @@
|
|
|
1193
1193
|
var this_0 = $continuation;
|
|
1194
1194
|
// Inline function 'kotlin.Companion.failure' call
|
|
1195
1195
|
var tmp$ret$0 = _Result___init__impl__xyqfz8(createFailure(it));
|
|
1196
|
-
this_0.
|
|
1196
|
+
this_0.k9(tmp$ret$0);
|
|
1197
1197
|
return null;
|
|
1198
1198
|
};
|
|
1199
1199
|
}
|