@solibo/solibo-sdk 1.0.35 → 1.0.36

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -185,8 +185,8 @@
185
185
  WebCryptoCryptographyProvider_instance = this;
186
186
  CryptographyProvider.call(this);
187
187
  }
188
- protoOf(WebCryptoCryptographyProvider).lny = function (identifier) {
189
- var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().co3_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().do3_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().eo3_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().fo3_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
188
+ protoOf(WebCryptoCryptographyProvider).fo3 = function (identifier) {
189
+ var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().wo7_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().xo7_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().yo7_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().zo7_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
190
190
  return (tmp == null ? true : isInterface(tmp, CryptographyAlgorithm)) ? tmp : THROW_CCE();
191
191
  };
192
192
  var WebCryptoCryptographyProvider_instance;
@@ -209,17 +209,17 @@
209
209
  }
210
210
  function AesKey(key) {
211
211
  WebCryptoEncodableKey.call(this, key, AesKeyProcessor_getInstance());
212
- this.io3_1 = key;
212
+ this.co8_1 = key;
213
213
  }
214
214
  function WebCryptoAes(algorithmName, keyWrapper) {
215
- this.jo3_1 = algorithmName;
216
- this.ko3_1 = keyWrapper;
215
+ this.do8_1 = algorithmName;
216
+ this.eo8_1 = keyWrapper;
217
217
  }
218
218
  function AesKeyProcessor() {
219
219
  AesKeyProcessor_instance = this;
220
220
  WebCryptoKeyProcessor.call(this);
221
221
  }
222
- protoOf(AesKeyProcessor).lo3 = function (format) {
222
+ protoOf(AesKeyProcessor).fo8 = function (format) {
223
223
  var tmp;
224
224
  switch (format.a1_1) {
225
225
  case 0:
@@ -234,14 +234,14 @@
234
234
  }
235
235
  return tmp;
236
236
  };
237
- protoOf(AesKeyProcessor).mo3 = function (format) {
238
- return this.lo3(format instanceof Format ? format : THROW_CCE());
237
+ protoOf(AesKeyProcessor).go8 = function (format) {
238
+ return this.fo8(format instanceof Format ? format : THROW_CCE());
239
239
  };
240
- protoOf(AesKeyProcessor).no3 = function (algorithm, format, key) {
240
+ protoOf(AesKeyProcessor).ho8 = function (algorithm, format, key) {
241
241
  return key;
242
242
  };
243
- protoOf(AesKeyProcessor).oo3 = function (algorithm, format, key) {
244
- return this.no3(algorithm, format instanceof Format ? format : THROW_CCE(), key);
243
+ protoOf(AesKeyProcessor).io8 = function (algorithm, format, key) {
244
+ return this.ho8(algorithm, format instanceof Format ? format : THROW_CCE(), key);
245
245
  };
246
246
  var AesKeyProcessor_instance;
247
247
  function AesKeyProcessor_getInstance() {
@@ -323,10 +323,10 @@
323
323
  }
324
324
  function Companion() {
325
325
  Companion_instance_3 = this;
326
- this.co3_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
327
- this.do3_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
328
- this.eo3_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
329
- this.fo3_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
326
+ this.wo7_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
327
+ this.xo7_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
328
+ this.yo7_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
329
+ this.zo7_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
330
330
  }
331
331
  var Companion_instance_3;
332
332
  function Companion_getInstance_11() {
@@ -336,52 +336,52 @@
336
336
  }
337
337
  function WebCryptoDigest(algorithm, id) {
338
338
  Companion_getInstance_11();
339
- this.po3_1 = algorithm;
340
- this.qo3_1 = id;
339
+ this.jo8_1 = algorithm;
340
+ this.ko8_1 = id;
341
341
  }
342
- protoOf(WebCryptoDigest).ro3 = function () {
342
+ protoOf(WebCryptoDigest).lo8 = function () {
343
343
  return this;
344
344
  };
345
- protoOf(WebCryptoDigest).cnz = function (data, $completion) {
346
- return WebCrypto_getInstance().to3(this.po3_1, data, $completion);
345
+ protoOf(WebCryptoDigest).wo3 = function (data, $completion) {
346
+ return WebCrypto_getInstance().no8(this.jo8_1, data, $completion);
347
347
  };
348
- protoOf(WebCryptoDigest).bnz = function () {
348
+ protoOf(WebCryptoDigest).vo3 = function () {
349
349
  nonBlocking();
350
350
  };
351
- protoOf(WebCryptoDigest).dnz = function (data) {
351
+ protoOf(WebCryptoDigest).xo3 = function (data) {
352
352
  nonBlocking();
353
353
  };
354
354
  function EcPublicKey(publicKey) {
355
355
  WebCryptoEncodableKey.call(this, publicKey, EcPublicKeyProcessor_getInstance());
356
- this.wo3_1 = publicKey;
356
+ this.qo8_1 = publicKey;
357
357
  }
358
358
  function EcPrivateKey_0(privateKey) {
359
359
  WebCryptoEncodableKey.call(this, privateKey, EcPrivateKeyProcessor_getInstance());
360
- this.zo3_1 = privateKey;
360
+ this.to8_1 = privateKey;
361
361
  }
362
362
  function WebCryptoEc$keyPairWrapper$lambda($keyPairWrapper, this$0) {
363
363
  return function (it) {
364
- return $keyPairWrapper(this$0.do4_1.bo4_1(it.publicKey), this$0.eo4_1.bo4_1(it.privateKey));
364
+ return $keyPairWrapper(this$0.xo8_1.vo8_1(it.publicKey), this$0.yo8_1.vo8_1(it.privateKey));
365
365
  };
366
366
  }
367
367
  function WebCryptoEc(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
368
- this.co4_1 = algorithmName;
369
- this.do4_1 = publicKeyWrapper;
370
- this.eo4_1 = privateKeyWrapper;
368
+ this.wo8_1 = algorithmName;
369
+ this.xo8_1 = publicKeyWrapper;
370
+ this.yo8_1 = privateKeyWrapper;
371
371
  var tmp = this;
372
- var tmp0 = this.do4_1.ao4_1;
372
+ var tmp0 = this.xo8_1.uo8_1;
373
373
  // Inline function 'kotlin.collections.plus' call
374
- var elements = this.eo4_1.ao4_1;
374
+ var elements = this.yo8_1.uo8_1;
375
375
  // Inline function 'kotlin.js.asDynamic' call
376
- tmp.fo4_1 = tmp0.concat(elements);
376
+ tmp.zo8_1 = tmp0.concat(elements);
377
377
  var tmp_0 = this;
378
- tmp_0.go4_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
378
+ tmp_0.ao9_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
379
379
  }
380
380
  function EcPublicKeyProcessor() {
381
381
  EcPublicKeyProcessor_instance = this;
382
382
  WebCryptoKeyProcessor.call(this);
383
383
  }
384
- protoOf(EcPublicKeyProcessor).ho4 = function (format) {
384
+ protoOf(EcPublicKeyProcessor).bo9 = function (format) {
385
385
  var tmp;
386
386
  if (equals(format, JWK_getInstance())) {
387
387
  tmp = 'jwk';
@@ -394,10 +394,10 @@
394
394
  }
395
395
  return tmp;
396
396
  };
397
- protoOf(EcPublicKeyProcessor).mo3 = function (format) {
398
- return this.ho4(format instanceof Format_0 ? format : THROW_CCE());
397
+ protoOf(EcPublicKeyProcessor).go8 = function (format) {
398
+ return this.bo9(format instanceof Format_0 ? format : THROW_CCE());
399
399
  };
400
- protoOf(EcPublicKeyProcessor).io4 = function (algorithm, format, key) {
400
+ protoOf(EcPublicKeyProcessor).co9 = function (algorithm, format, key) {
401
401
  var tmp;
402
402
  if (equals(format, JWK_getInstance())) {
403
403
  tmp = key;
@@ -406,14 +406,14 @@
406
406
  } else if (equals(format, DER_getInstance())) {
407
407
  tmp = key;
408
408
  } else if (equals(format, PEM_getInstance())) {
409
- tmp = unwrapPem(Companion_getInstance_10().xo2_1, key);
409
+ tmp = unwrapPem(Companion_getInstance_10().ro7_1, key);
410
410
  } else {
411
411
  noWhenBranchMatchedException();
412
412
  }
413
413
  return tmp;
414
414
  };
415
- protoOf(EcPublicKeyProcessor).oo3 = function (algorithm, format, key) {
416
- return this.io4(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
415
+ protoOf(EcPublicKeyProcessor).io8 = function (algorithm, format, key) {
416
+ return this.co9(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
417
417
  };
418
418
  var EcPublicKeyProcessor_instance;
419
419
  function EcPublicKeyProcessor_getInstance() {
@@ -425,7 +425,7 @@
425
425
  EcPrivateKeyProcessor_instance = this;
426
426
  WebCryptoKeyProcessor.call(this);
427
427
  }
428
- protoOf(EcPrivateKeyProcessor).jo4 = function (format) {
428
+ protoOf(EcPrivateKeyProcessor).do9 = function (format) {
429
429
  var tmp;
430
430
  if (equals(format, JWK_getInstance_0())) {
431
431
  tmp = 'jwk';
@@ -436,21 +436,21 @@
436
436
  }
437
437
  return tmp;
438
438
  };
439
- protoOf(EcPrivateKeyProcessor).mo3 = function (format) {
440
- return this.jo4(format instanceof Format_1 ? format : THROW_CCE());
439
+ protoOf(EcPrivateKeyProcessor).go8 = function (format) {
440
+ return this.do9(format instanceof Format_1 ? format : THROW_CCE());
441
441
  };
442
- protoOf(EcPrivateKeyProcessor).ko4 = function (algorithm, format, key) {
442
+ protoOf(EcPrivateKeyProcessor).eo9 = function (algorithm, format, key) {
443
443
  var tmp;
444
444
  if (equals(format, JWK_getInstance_0())) {
445
445
  tmp = key;
446
446
  } else if (equals(format, RAW_getInstance())) {
447
447
  var namedCurve = get_ecKeyAlgorithmNamedCurve(algorithm);
448
448
  var tmp_0;
449
- if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.wny())) {
449
+ if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.qo3())) {
450
450
  tmp_0 = get_secp256r1(Companion_instance);
451
- } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.xny())) {
451
+ } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.ro3())) {
452
452
  tmp_0 = get_secp384r1(Companion_instance);
453
- } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.yny())) {
453
+ } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.so3())) {
454
454
  tmp_0 = get_secp521r1(Companion_instance);
455
455
  } else {
456
456
  var message = 'Unknown curve: ' + namedCurve;
@@ -461,18 +461,18 @@
461
461
  } else if (equals(format, Generic_getInstance())) {
462
462
  tmp = key;
463
463
  } else if (equals(format, Generic_getInstance_0())) {
464
- tmp = unwrapPem(Companion_getInstance_10().yo2_1, key);
464
+ tmp = unwrapPem(Companion_getInstance_10().so7_1, key);
465
465
  } else if (equals(format, SEC1_getInstance())) {
466
466
  tmp = convertEcPrivateKeyFromSec1ToPkcs8(key);
467
467
  } else if (equals(format, SEC1_getInstance_0())) {
468
- tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().bo3_1, key));
468
+ tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().vo7_1, key));
469
469
  } else {
470
470
  noWhenBranchMatchedException();
471
471
  }
472
472
  return tmp;
473
473
  };
474
- protoOf(EcPrivateKeyProcessor).oo3 = function (algorithm, format, key) {
475
- return this.ko4(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
474
+ protoOf(EcPrivateKeyProcessor).io8 = function (algorithm, format, key) {
475
+ return this.eo9(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
476
476
  };
477
477
  var EcPrivateKeyProcessor_instance;
478
478
  function EcPrivateKeyProcessor_getInstance() {
@@ -481,8 +481,8 @@
481
481
  return EcPrivateKeyProcessor_instance;
482
482
  }
483
483
  function EcdhKeyPair(publicKey, privateKey) {
484
- this.lo4_1 = publicKey;
485
- this.mo4_1 = privateKey;
484
+ this.fo9_1 = publicKey;
485
+ this.go9_1 = privateKey;
486
486
  }
487
487
  function EcdhPublicKey(publicKey) {
488
488
  EcPublicKey.call(this, publicKey);
@@ -532,8 +532,8 @@
532
532
  return WebCryptoEcdh_instance;
533
533
  }
534
534
  function EcdsaKeyPair(publicKey, privateKey) {
535
- this.no4_1 = publicKey;
536
- this.oo4_1 = privateKey;
535
+ this.ho9_1 = publicKey;
536
+ this.io9_1 = privateKey;
537
537
  }
538
538
  function EcdsaPublicKey(publicKey) {
539
539
  EcPublicKey.call(this, publicKey);
@@ -590,10 +590,10 @@
590
590
  }
591
591
  function HmacKey(key) {
592
592
  WebCryptoEncodableKey.call(this, key, HmacKeyProcessor_getInstance());
593
- this.ro4_1 = key;
593
+ this.lo9_1 = key;
594
594
  }
595
- protoOf(HmacKey).so4 = function () {
596
- return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.ro4_1);
595
+ protoOf(HmacKey).mo9 = function () {
596
+ return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.lo9_1);
597
597
  };
598
598
  function WebCryptoHmac$HmacKey$_init_$ref_enwl2t() {
599
599
  var l = function (p0) {
@@ -609,10 +609,10 @@
609
609
  // Inline function 'kotlin.js.unsafeCast' call
610
610
  // Inline function 'kotlin.js.asDynamic' call
611
611
  var tmp_0 = ['sign', 'verify'];
612
- tmp.to4_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
612
+ tmp.no9_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
613
613
  }
614
- protoOf(WebCryptoHmac).uo4 = function (digest) {
615
- return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.to4_1);
614
+ protoOf(WebCryptoHmac).oo9 = function (digest) {
615
+ return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.no9_1);
616
616
  };
617
617
  var WebCryptoHmac_instance;
618
618
  function WebCryptoHmac_getInstance() {
@@ -624,7 +624,7 @@
624
624
  HmacKeyProcessor_instance = this;
625
625
  WebCryptoKeyProcessor.call(this);
626
626
  }
627
- protoOf(HmacKeyProcessor).vo4 = function (format) {
627
+ protoOf(HmacKeyProcessor).po9 = function (format) {
628
628
  var tmp;
629
629
  switch (format.a1_1) {
630
630
  case 0:
@@ -639,14 +639,14 @@
639
639
  }
640
640
  return tmp;
641
641
  };
642
- protoOf(HmacKeyProcessor).mo3 = function (format) {
643
- return this.vo4(format instanceof Format_2 ? format : THROW_CCE());
642
+ protoOf(HmacKeyProcessor).go8 = function (format) {
643
+ return this.po9(format instanceof Format_2 ? format : THROW_CCE());
644
644
  };
645
- protoOf(HmacKeyProcessor).wo4 = function (algorithm, format, key) {
645
+ protoOf(HmacKeyProcessor).qo9 = function (algorithm, format, key) {
646
646
  return key;
647
647
  };
648
- protoOf(HmacKeyProcessor).oo3 = function (algorithm, format, key) {
649
- return this.wo4(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
648
+ protoOf(HmacKeyProcessor).io8 = function (algorithm, format, key) {
649
+ return this.qo9(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
650
650
  };
651
651
  var HmacKeyProcessor_instance;
652
652
  function HmacKeyProcessor_getInstance() {
@@ -662,35 +662,35 @@
662
662
  }
663
663
  function RsaPublicKey(publicKey) {
664
664
  WebCryptoEncodableKey.call(this, publicKey, RsaPublicKeyProcessor_getInstance());
665
- this.zo4_1 = publicKey;
665
+ this.to9_1 = publicKey;
666
666
  }
667
667
  function RsaPrivateKey(privateKey) {
668
668
  WebCryptoEncodableKey.call(this, privateKey, RsaPrivateKeyProcessor_getInstance());
669
- this.co5_1 = privateKey;
669
+ this.wo9_1 = privateKey;
670
670
  }
671
671
  function WebCryptoRsa$keyPairWrapper$lambda($keyPairWrapper, this$0) {
672
672
  return function (it) {
673
- return $keyPairWrapper(this$0.eo5_1.bo4_1(it.publicKey), this$0.fo5_1.bo4_1(it.privateKey));
673
+ return $keyPairWrapper(this$0.yo9_1.vo8_1(it.publicKey), this$0.zo9_1.vo8_1(it.privateKey));
674
674
  };
675
675
  }
676
676
  function WebCryptoRsa(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
677
- this.do5_1 = algorithmName;
678
- this.eo5_1 = publicKeyWrapper;
679
- this.fo5_1 = privateKeyWrapper;
677
+ this.xo9_1 = algorithmName;
678
+ this.yo9_1 = publicKeyWrapper;
679
+ this.zo9_1 = privateKeyWrapper;
680
680
  var tmp = this;
681
- var tmp0 = this.eo5_1.ao4_1;
681
+ var tmp0 = this.yo9_1.uo8_1;
682
682
  // Inline function 'kotlin.collections.plus' call
683
- var elements = this.fo5_1.ao4_1;
683
+ var elements = this.zo9_1.uo8_1;
684
684
  // Inline function 'kotlin.js.asDynamic' call
685
- tmp.go5_1 = tmp0.concat(elements);
685
+ tmp.aoa_1 = tmp0.concat(elements);
686
686
  var tmp_0 = this;
687
- tmp_0.ho5_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
687
+ tmp_0.boa_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
688
688
  }
689
689
  function RsaPublicKeyProcessor() {
690
690
  RsaPublicKeyProcessor_instance = this;
691
691
  WebCryptoKeyProcessor.call(this);
692
692
  }
693
- protoOf(RsaPublicKeyProcessor).io5 = function (format) {
693
+ protoOf(RsaPublicKeyProcessor).coa = function (format) {
694
694
  var tmp;
695
695
  if (equals(format, JWK_getInstance_1())) {
696
696
  tmp = 'jwk';
@@ -701,28 +701,28 @@
701
701
  }
702
702
  return tmp;
703
703
  };
704
- protoOf(RsaPublicKeyProcessor).mo3 = function (format) {
705
- return this.io5(format instanceof Format_3 ? format : THROW_CCE());
704
+ protoOf(RsaPublicKeyProcessor).go8 = function (format) {
705
+ return this.coa(format instanceof Format_3 ? format : THROW_CCE());
706
706
  };
707
- protoOf(RsaPublicKeyProcessor).jo5 = function (algorithm, format, key) {
707
+ protoOf(RsaPublicKeyProcessor).doa = function (algorithm, format, key) {
708
708
  var tmp;
709
709
  if (equals(format, JWK_getInstance_1())) {
710
710
  tmp = key;
711
711
  } else if (equals(format, Generic_getInstance_1())) {
712
712
  tmp = key;
713
713
  } else if (equals(format, Generic_getInstance_2())) {
714
- tmp = unwrapPem(Companion_getInstance_10().xo2_1, key);
714
+ tmp = unwrapPem(Companion_getInstance_10().ro7_1, key);
715
715
  } else if (equals(format, PKCS1_getInstance())) {
716
716
  tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, key);
717
717
  } else if (equals(format, PKCS1_getInstance_0())) {
718
- tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().zo2_1, key));
718
+ tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().to7_1, key));
719
719
  } else {
720
720
  noWhenBranchMatchedException();
721
721
  }
722
722
  return tmp;
723
723
  };
724
- protoOf(RsaPublicKeyProcessor).oo3 = function (algorithm, format, key) {
725
- return this.jo5(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
724
+ protoOf(RsaPublicKeyProcessor).io8 = function (algorithm, format, key) {
725
+ return this.doa(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
726
726
  };
727
727
  var RsaPublicKeyProcessor_instance;
728
728
  function RsaPublicKeyProcessor_getInstance() {
@@ -734,7 +734,7 @@
734
734
  RsaPrivateKeyProcessor_instance = this;
735
735
  WebCryptoKeyProcessor.call(this);
736
736
  }
737
- protoOf(RsaPrivateKeyProcessor).ko5 = function (format) {
737
+ protoOf(RsaPrivateKeyProcessor).eoa = function (format) {
738
738
  var tmp;
739
739
  if (equals(format, JWK_getInstance_2())) {
740
740
  tmp = 'jwk';
@@ -745,28 +745,28 @@
745
745
  }
746
746
  return tmp;
747
747
  };
748
- protoOf(RsaPrivateKeyProcessor).mo3 = function (format) {
749
- return this.ko5(format instanceof Format_4 ? format : THROW_CCE());
748
+ protoOf(RsaPrivateKeyProcessor).go8 = function (format) {
749
+ return this.eoa(format instanceof Format_4 ? format : THROW_CCE());
750
750
  };
751
- protoOf(RsaPrivateKeyProcessor).lo5 = function (algorithm, format, key) {
751
+ protoOf(RsaPrivateKeyProcessor).foa = function (algorithm, format, key) {
752
752
  var tmp;
753
753
  if (equals(format, JWK_getInstance_2())) {
754
754
  tmp = key;
755
755
  } else if (equals(format, Generic_getInstance_3())) {
756
756
  tmp = key;
757
757
  } else if (equals(format, Generic_getInstance_4())) {
758
- tmp = unwrapPem(Companion_getInstance_10().yo2_1, key);
758
+ tmp = unwrapPem(Companion_getInstance_10().so7_1, key);
759
759
  } else if (equals(format, PKCS1_getInstance_1())) {
760
760
  tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, key);
761
761
  } else if (equals(format, PKCS1_getInstance_2())) {
762
- tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().ao3_1, key));
762
+ tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().uo7_1, key));
763
763
  } else {
764
764
  noWhenBranchMatchedException();
765
765
  }
766
766
  return tmp;
767
767
  };
768
- protoOf(RsaPrivateKeyProcessor).oo3 = function (algorithm, format, key) {
769
- return this.lo5(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
768
+ protoOf(RsaPrivateKeyProcessor).io8 = function (algorithm, format, key) {
769
+ return this.foa(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
770
770
  };
771
771
  var RsaPrivateKeyProcessor_instance;
772
772
  function RsaPrivateKeyProcessor_getInstance() {
@@ -775,8 +775,8 @@
775
775
  return RsaPrivateKeyProcessor_instance;
776
776
  }
777
777
  function RsaOaepKeyPair(publicKey, privateKey) {
778
- this.mo5_1 = publicKey;
779
- this.no5_1 = privateKey;
778
+ this.goa_1 = publicKey;
779
+ this.hoa_1 = privateKey;
780
780
  }
781
781
  function RsaOaepPublicKey(publicKey) {
782
782
  RsaPublicKey.call(this, publicKey);
@@ -826,8 +826,8 @@
826
826
  return WebCryptoRsaOaep_instance;
827
827
  }
828
828
  function RsaPkcs1KeyPair(publicKey, privateKey) {
829
- this.oo5_1 = publicKey;
830
- this.po5_1 = privateKey;
829
+ this.ioa_1 = publicKey;
830
+ this.joa_1 = privateKey;
831
831
  }
832
832
  function RsaPkcs1PublicKey(publicKey) {
833
833
  RsaPublicKey.call(this, publicKey);
@@ -877,8 +877,8 @@
877
877
  return WebCryptoRsaPkcs1_instance;
878
878
  }
879
879
  function RsaPssKeyPair(publicKey, privateKey) {
880
- this.qo5_1 = publicKey;
881
- this.ro5_1 = privateKey;
880
+ this.koa_1 = publicKey;
881
+ this.loa_1 = privateKey;
882
882
  }
883
883
  function RsaPssPublicKey(publicKey) {
884
884
  RsaPublicKey.call(this, publicKey);
@@ -938,7 +938,7 @@
938
938
  } else if (equals(_this__u8e3s4, SHA512_getInstance())) {
939
939
  tmp = 'SHA-512';
940
940
  } else {
941
- throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.hny_1);
941
+ throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.bo3_1);
942
942
  }
943
943
  return tmp;
944
944
  }
@@ -946,14 +946,14 @@
946
946
  throw IllegalStateException_init_$Create$('Only non-blocking(suspend) calls are supported in WebCrypto');
947
947
  }
948
948
  function WebCryptoEncodableKey(key, keyProcessor) {
949
- this.so5_1 = key;
950
- this.to5_1 = keyProcessor;
949
+ this.moa_1 = key;
950
+ this.noa_1 = keyProcessor;
951
951
  }
952
952
  function $decodeFromByteArrayCOROUTINE$(_this__u8e3s4, format, bytes, resultContinuation) {
953
953
  CoroutineImpl.call(this, resultContinuation);
954
- this.co6_1 = _this__u8e3s4;
955
- this.do6_1 = format;
956
- this.eo6_1 = bytes;
954
+ this.woa_1 = _this__u8e3s4;
955
+ this.xoa_1 = format;
956
+ this.yoa_1 = bytes;
957
957
  }
958
958
  protoOf($decodeFromByteArrayCOROUTINE$).q9 = function () {
959
959
  var suspendResult = this.k9_1;
@@ -963,9 +963,9 @@
963
963
  switch (tmp) {
964
964
  case 0:
965
965
  this.j9_1 = 2;
966
- this.fo6_1 = this.co6_1.io6_1.bo4_1;
966
+ this.zoa_1 = this.woa_1.cob_1.vo8_1;
967
967
  this.i9_1 = 1;
968
- suspendResult = WebCrypto_getInstance().jo6(this.co6_1.ho6_1.mo3(this.do6_1), this.co6_1.ho6_1.oo3(this.co6_1.go6_1, this.do6_1, this.eo6_1), this.co6_1.go6_1, true, this.co6_1.io6_1.ao4_1, this);
968
+ suspendResult = WebCrypto_getInstance().dob(this.woa_1.bob_1.go8(this.xoa_1), this.woa_1.bob_1.io8(this.woa_1.aob_1, this.xoa_1, this.yoa_1), this.woa_1.aob_1, true, this.woa_1.cob_1.uo8_1, this);
969
969
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
970
970
  return suspendResult;
971
971
  }
@@ -973,7 +973,7 @@
973
973
  continue $sm;
974
974
  case 1:
975
975
  var ARGUMENT = suspendResult;
976
- return this.fo6_1(ARGUMENT);
976
+ return this.zoa_1(ARGUMENT);
977
977
  case 2:
978
978
  throw this.l9_1;
979
979
  }
@@ -989,36 +989,36 @@
989
989
  while (true);
990
990
  };
991
991
  function WebCryptoKeyDecoder(algorithm, keyProcessor, keyWrapper) {
992
- this.go6_1 = algorithm;
993
- this.ho6_1 = keyProcessor;
994
- this.io6_1 = keyWrapper;
992
+ this.aob_1 = algorithm;
993
+ this.bob_1 = keyProcessor;
994
+ this.cob_1 = keyWrapper;
995
995
  }
996
- protoOf(WebCryptoKeyDecoder).zny = function (format, bytes, $completion) {
996
+ protoOf(WebCryptoKeyDecoder).to3 = function (format, bytes, $completion) {
997
997
  var tmp = new $decodeFromByteArrayCOROUTINE$(this, format, bytes, $completion);
998
998
  tmp.k9_1 = Unit_instance;
999
999
  tmp.l9_1 = null;
1000
1000
  return tmp.q9();
1001
1001
  };
1002
- protoOf(WebCryptoKeyDecoder).anz = function (format, bytes) {
1002
+ protoOf(WebCryptoKeyDecoder).uo3 = function (format, bytes) {
1003
1003
  nonBlocking();
1004
1004
  };
1005
1005
  function WebCryptoKeyProcessor() {
1006
1006
  }
1007
1007
  function WebCryptoKeyWrapper(usages, wrap) {
1008
- this.ao4_1 = usages;
1009
- this.bo4_1 = wrap;
1008
+ this.uo8_1 = usages;
1009
+ this.vo8_1 = wrap;
1010
1010
  }
1011
1011
  function WebCryptoSignatureGenerator(algorithm, key) {
1012
- this.ko6_1 = algorithm;
1013
- this.lo6_1 = key;
1012
+ this.eob_1 = algorithm;
1013
+ this.fob_1 = key;
1014
1014
  }
1015
- protoOf(WebCryptoSignatureGenerator).hnz = function (data, $completion) {
1016
- return WebCrypto_getInstance().mo6(this.ko6_1, this.lo6_1, data, $completion);
1015
+ protoOf(WebCryptoSignatureGenerator).bo4 = function (data, $completion) {
1016
+ return WebCrypto_getInstance().gob(this.eob_1, this.fob_1, data, $completion);
1017
1017
  };
1018
- protoOf(WebCryptoSignatureGenerator).gnz = function () {
1018
+ protoOf(WebCryptoSignatureGenerator).ao4 = function () {
1019
1019
  nonBlocking();
1020
1020
  };
1021
- protoOf(WebCryptoSignatureGenerator).inz = function (data) {
1021
+ protoOf(WebCryptoSignatureGenerator).co4 = function (data) {
1022
1022
  nonBlocking();
1023
1023
  };
1024
1024
  function get_initHook() {
@@ -1026,7 +1026,7 @@
1026
1026
  }
1027
1027
  var initHook;
1028
1028
  function initHook$init$() {
1029
- CryptographySystem_getInstance().tny(get_defaultProvider(), 100);
1029
+ CryptographySystem_getInstance().no3(get_defaultProvider(), 100);
1030
1030
  return Unit_instance;
1031
1031
  }
1032
1032
  function get_ecKeyAlgorithmNamedCurve(_this__u8e3s4) {
@@ -1065,9 +1065,9 @@
1065
1065
  }
1066
1066
  function $digestCOROUTINE$(_this__u8e3s4, algorithmName, data, resultContinuation) {
1067
1067
  CoroutineImpl.call(this, resultContinuation);
1068
- this.vo6_1 = _this__u8e3s4;
1069
- this.wo6_1 = algorithmName;
1070
- this.xo6_1 = data;
1068
+ this.pob_1 = _this__u8e3s4;
1069
+ this.qob_1 = algorithmName;
1070
+ this.rob_1 = data;
1071
1071
  }
1072
1072
  protoOf($digestCOROUTINE$).q9 = function () {
1073
1073
  var suspendResult = this.k9_1;
@@ -1078,7 +1078,7 @@
1078
1078
  case 0:
1079
1079
  this.j9_1 = 2;
1080
1080
  this.i9_1 = 1;
1081
- suspendResult = await_0(this.vo6_1.so3_1.digest(this.wo6_1, this.xo6_1), this);
1081
+ suspendResult = await_0(this.pob_1.mo8_1.digest(this.qob_1, this.rob_1), this);
1082
1082
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
1083
1083
  return suspendResult;
1084
1084
  }
@@ -1103,10 +1103,10 @@
1103
1103
  };
1104
1104
  function $signCOROUTINE$(_this__u8e3s4, algorithm, key, data, resultContinuation) {
1105
1105
  CoroutineImpl.call(this, resultContinuation);
1106
- this.go7_1 = _this__u8e3s4;
1107
- this.ho7_1 = algorithm;
1108
- this.io7_1 = key;
1109
- this.jo7_1 = data;
1106
+ this.aoc_1 = _this__u8e3s4;
1107
+ this.boc_1 = algorithm;
1108
+ this.coc_1 = key;
1109
+ this.doc_1 = data;
1110
1110
  }
1111
1111
  protoOf($signCOROUTINE$).q9 = function () {
1112
1112
  var suspendResult = this.k9_1;
@@ -1117,7 +1117,7 @@
1117
1117
  case 0:
1118
1118
  this.j9_1 = 2;
1119
1119
  this.i9_1 = 1;
1120
- suspendResult = await_0(this.go7_1.so3_1.sign(this.ho7_1, this.io7_1, this.jo7_1), this);
1120
+ suspendResult = await_0(this.aoc_1.mo8_1.sign(this.boc_1, this.coc_1, this.doc_1), this);
1121
1121
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
1122
1122
  return suspendResult;
1123
1123
  }
@@ -1142,23 +1142,23 @@
1142
1142
  };
1143
1143
  function WebCrypto() {
1144
1144
  WebCrypto_instance = this;
1145
- this.so3_1 = getSubtleCrypto();
1145
+ this.mo8_1 = getSubtleCrypto();
1146
1146
  }
1147
- protoOf(WebCrypto).to3 = function (algorithmName, data, $completion) {
1147
+ protoOf(WebCrypto).no8 = function (algorithmName, data, $completion) {
1148
1148
  var tmp = new $digestCOROUTINE$(this, algorithmName, data, $completion);
1149
1149
  tmp.k9_1 = Unit_instance;
1150
1150
  tmp.l9_1 = null;
1151
1151
  return tmp.q9();
1152
1152
  };
1153
- protoOf(WebCrypto).mo6 = function (algorithm, key, data, $completion) {
1153
+ protoOf(WebCrypto).gob = function (algorithm, key, data, $completion) {
1154
1154
  var tmp = new $signCOROUTINE$(this, algorithm, key, data, $completion);
1155
1155
  tmp.k9_1 = Unit_instance;
1156
1156
  tmp.l9_1 = null;
1157
1157
  return tmp.q9();
1158
1158
  };
1159
- protoOf(WebCrypto).jo6 = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
1159
+ protoOf(WebCrypto).dob = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
1160
1160
  var key = format === 'jwk' ? JSON.parse(decodeToString(keyData)) : keyData;
1161
- return await_0(this.so3_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
1161
+ return await_0(this.mo8_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
1162
1162
  };
1163
1163
  var WebCrypto_instance;
1164
1164
  function WebCrypto_getInstance() {