@solibo/solibo-sdk 1.0.35 → 1.0.36
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/KmLogging-logging.js +99 -99
- package/KotlinBigInteger-bignum.js +1114 -1114
- package/MultiplatformSettings-multiplatform-settings.js +16 -16
- package/Stately-stately-concurrency.js +4 -4
- package/cryptography-kotlin-cryptography-bigint.js +27 -27
- package/cryptography-kotlin-cryptography-core.js +47 -47
- package/cryptography-kotlin-cryptography-provider-base.js +4 -4
- package/cryptography-kotlin-cryptography-provider-webcrypto.js +135 -135
- package/cryptography-kotlin-cryptography-random.js +15 -15
- package/cryptography-kotlin-cryptography-serialization-asn1-modules.js +112 -112
- package/cryptography-kotlin-cryptography-serialization-asn1.js +240 -240
- package/cryptography-kotlin-cryptography-serialization-pem.js +15 -15
- package/index.d.ts +4 -0
- package/index.js +4 -0
- package/kotlin-kotlin-stdlib.js +16 -16
- package/kotlin-kotlin-stdlib.js.map +1 -1
- package/kotlinx-coroutines-core.js +7 -7
- package/kotlinx-coroutines-core.js.map +1 -1
- package/ktor-ktor-client-auth.js +224 -224
- package/ktor-ktor-client-logging.js +516 -516
- package/ktor-ktor-websockets.js +2 -2
- package/package.json +1 -1
- package/solibo-sdk-sdk-home-api.js +24544 -22917
- package/solibo-sdk-sdk-home-api.js.map +1 -1
- package/solibo-sdk-sdk.d.ts +89 -3
- package/solibo-sdk-sdk.js +1365 -1365
|
@@ -185,8 +185,8 @@
|
|
|
185
185
|
WebCryptoCryptographyProvider_instance = this;
|
|
186
186
|
CryptographyProvider.call(this);
|
|
187
187
|
}
|
|
188
|
-
protoOf(WebCryptoCryptographyProvider).
|
|
189
|
-
var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().
|
|
188
|
+
protoOf(WebCryptoCryptographyProvider).fo3 = function (identifier) {
|
|
189
|
+
var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().wo7_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().xo7_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().yo7_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().zo7_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
|
|
190
190
|
return (tmp == null ? true : isInterface(tmp, CryptographyAlgorithm)) ? tmp : THROW_CCE();
|
|
191
191
|
};
|
|
192
192
|
var WebCryptoCryptographyProvider_instance;
|
|
@@ -209,17 +209,17 @@
|
|
|
209
209
|
}
|
|
210
210
|
function AesKey(key) {
|
|
211
211
|
WebCryptoEncodableKey.call(this, key, AesKeyProcessor_getInstance());
|
|
212
|
-
this.
|
|
212
|
+
this.co8_1 = key;
|
|
213
213
|
}
|
|
214
214
|
function WebCryptoAes(algorithmName, keyWrapper) {
|
|
215
|
-
this.
|
|
216
|
-
this.
|
|
215
|
+
this.do8_1 = algorithmName;
|
|
216
|
+
this.eo8_1 = keyWrapper;
|
|
217
217
|
}
|
|
218
218
|
function AesKeyProcessor() {
|
|
219
219
|
AesKeyProcessor_instance = this;
|
|
220
220
|
WebCryptoKeyProcessor.call(this);
|
|
221
221
|
}
|
|
222
|
-
protoOf(AesKeyProcessor).
|
|
222
|
+
protoOf(AesKeyProcessor).fo8 = function (format) {
|
|
223
223
|
var tmp;
|
|
224
224
|
switch (format.a1_1) {
|
|
225
225
|
case 0:
|
|
@@ -234,14 +234,14 @@
|
|
|
234
234
|
}
|
|
235
235
|
return tmp;
|
|
236
236
|
};
|
|
237
|
-
protoOf(AesKeyProcessor).
|
|
238
|
-
return this.
|
|
237
|
+
protoOf(AesKeyProcessor).go8 = function (format) {
|
|
238
|
+
return this.fo8(format instanceof Format ? format : THROW_CCE());
|
|
239
239
|
};
|
|
240
|
-
protoOf(AesKeyProcessor).
|
|
240
|
+
protoOf(AesKeyProcessor).ho8 = function (algorithm, format, key) {
|
|
241
241
|
return key;
|
|
242
242
|
};
|
|
243
|
-
protoOf(AesKeyProcessor).
|
|
244
|
-
return this.
|
|
243
|
+
protoOf(AesKeyProcessor).io8 = function (algorithm, format, key) {
|
|
244
|
+
return this.ho8(algorithm, format instanceof Format ? format : THROW_CCE(), key);
|
|
245
245
|
};
|
|
246
246
|
var AesKeyProcessor_instance;
|
|
247
247
|
function AesKeyProcessor_getInstance() {
|
|
@@ -323,10 +323,10 @@
|
|
|
323
323
|
}
|
|
324
324
|
function Companion() {
|
|
325
325
|
Companion_instance_3 = this;
|
|
326
|
-
this.
|
|
327
|
-
this.
|
|
328
|
-
this.
|
|
329
|
-
this.
|
|
326
|
+
this.wo7_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
|
|
327
|
+
this.xo7_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
|
|
328
|
+
this.yo7_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
|
|
329
|
+
this.zo7_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
|
|
330
330
|
}
|
|
331
331
|
var Companion_instance_3;
|
|
332
332
|
function Companion_getInstance_11() {
|
|
@@ -336,52 +336,52 @@
|
|
|
336
336
|
}
|
|
337
337
|
function WebCryptoDigest(algorithm, id) {
|
|
338
338
|
Companion_getInstance_11();
|
|
339
|
-
this.
|
|
340
|
-
this.
|
|
339
|
+
this.jo8_1 = algorithm;
|
|
340
|
+
this.ko8_1 = id;
|
|
341
341
|
}
|
|
342
|
-
protoOf(WebCryptoDigest).
|
|
342
|
+
protoOf(WebCryptoDigest).lo8 = function () {
|
|
343
343
|
return this;
|
|
344
344
|
};
|
|
345
|
-
protoOf(WebCryptoDigest).
|
|
346
|
-
return WebCrypto_getInstance().
|
|
345
|
+
protoOf(WebCryptoDigest).wo3 = function (data, $completion) {
|
|
346
|
+
return WebCrypto_getInstance().no8(this.jo8_1, data, $completion);
|
|
347
347
|
};
|
|
348
|
-
protoOf(WebCryptoDigest).
|
|
348
|
+
protoOf(WebCryptoDigest).vo3 = function () {
|
|
349
349
|
nonBlocking();
|
|
350
350
|
};
|
|
351
|
-
protoOf(WebCryptoDigest).
|
|
351
|
+
protoOf(WebCryptoDigest).xo3 = function (data) {
|
|
352
352
|
nonBlocking();
|
|
353
353
|
};
|
|
354
354
|
function EcPublicKey(publicKey) {
|
|
355
355
|
WebCryptoEncodableKey.call(this, publicKey, EcPublicKeyProcessor_getInstance());
|
|
356
|
-
this.
|
|
356
|
+
this.qo8_1 = publicKey;
|
|
357
357
|
}
|
|
358
358
|
function EcPrivateKey_0(privateKey) {
|
|
359
359
|
WebCryptoEncodableKey.call(this, privateKey, EcPrivateKeyProcessor_getInstance());
|
|
360
|
-
this.
|
|
360
|
+
this.to8_1 = privateKey;
|
|
361
361
|
}
|
|
362
362
|
function WebCryptoEc$keyPairWrapper$lambda($keyPairWrapper, this$0) {
|
|
363
363
|
return function (it) {
|
|
364
|
-
return $keyPairWrapper(this$0.
|
|
364
|
+
return $keyPairWrapper(this$0.xo8_1.vo8_1(it.publicKey), this$0.yo8_1.vo8_1(it.privateKey));
|
|
365
365
|
};
|
|
366
366
|
}
|
|
367
367
|
function WebCryptoEc(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
|
|
368
|
-
this.
|
|
369
|
-
this.
|
|
370
|
-
this.
|
|
368
|
+
this.wo8_1 = algorithmName;
|
|
369
|
+
this.xo8_1 = publicKeyWrapper;
|
|
370
|
+
this.yo8_1 = privateKeyWrapper;
|
|
371
371
|
var tmp = this;
|
|
372
|
-
var tmp0 = this.
|
|
372
|
+
var tmp0 = this.xo8_1.uo8_1;
|
|
373
373
|
// Inline function 'kotlin.collections.plus' call
|
|
374
|
-
var elements = this.
|
|
374
|
+
var elements = this.yo8_1.uo8_1;
|
|
375
375
|
// Inline function 'kotlin.js.asDynamic' call
|
|
376
|
-
tmp.
|
|
376
|
+
tmp.zo8_1 = tmp0.concat(elements);
|
|
377
377
|
var tmp_0 = this;
|
|
378
|
-
tmp_0.
|
|
378
|
+
tmp_0.ao9_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
|
|
379
379
|
}
|
|
380
380
|
function EcPublicKeyProcessor() {
|
|
381
381
|
EcPublicKeyProcessor_instance = this;
|
|
382
382
|
WebCryptoKeyProcessor.call(this);
|
|
383
383
|
}
|
|
384
|
-
protoOf(EcPublicKeyProcessor).
|
|
384
|
+
protoOf(EcPublicKeyProcessor).bo9 = function (format) {
|
|
385
385
|
var tmp;
|
|
386
386
|
if (equals(format, JWK_getInstance())) {
|
|
387
387
|
tmp = 'jwk';
|
|
@@ -394,10 +394,10 @@
|
|
|
394
394
|
}
|
|
395
395
|
return tmp;
|
|
396
396
|
};
|
|
397
|
-
protoOf(EcPublicKeyProcessor).
|
|
398
|
-
return this.
|
|
397
|
+
protoOf(EcPublicKeyProcessor).go8 = function (format) {
|
|
398
|
+
return this.bo9(format instanceof Format_0 ? format : THROW_CCE());
|
|
399
399
|
};
|
|
400
|
-
protoOf(EcPublicKeyProcessor).
|
|
400
|
+
protoOf(EcPublicKeyProcessor).co9 = function (algorithm, format, key) {
|
|
401
401
|
var tmp;
|
|
402
402
|
if (equals(format, JWK_getInstance())) {
|
|
403
403
|
tmp = key;
|
|
@@ -406,14 +406,14 @@
|
|
|
406
406
|
} else if (equals(format, DER_getInstance())) {
|
|
407
407
|
tmp = key;
|
|
408
408
|
} else if (equals(format, PEM_getInstance())) {
|
|
409
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
409
|
+
tmp = unwrapPem(Companion_getInstance_10().ro7_1, key);
|
|
410
410
|
} else {
|
|
411
411
|
noWhenBranchMatchedException();
|
|
412
412
|
}
|
|
413
413
|
return tmp;
|
|
414
414
|
};
|
|
415
|
-
protoOf(EcPublicKeyProcessor).
|
|
416
|
-
return this.
|
|
415
|
+
protoOf(EcPublicKeyProcessor).io8 = function (algorithm, format, key) {
|
|
416
|
+
return this.co9(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
|
|
417
417
|
};
|
|
418
418
|
var EcPublicKeyProcessor_instance;
|
|
419
419
|
function EcPublicKeyProcessor_getInstance() {
|
|
@@ -425,7 +425,7 @@
|
|
|
425
425
|
EcPrivateKeyProcessor_instance = this;
|
|
426
426
|
WebCryptoKeyProcessor.call(this);
|
|
427
427
|
}
|
|
428
|
-
protoOf(EcPrivateKeyProcessor).
|
|
428
|
+
protoOf(EcPrivateKeyProcessor).do9 = function (format) {
|
|
429
429
|
var tmp;
|
|
430
430
|
if (equals(format, JWK_getInstance_0())) {
|
|
431
431
|
tmp = 'jwk';
|
|
@@ -436,21 +436,21 @@
|
|
|
436
436
|
}
|
|
437
437
|
return tmp;
|
|
438
438
|
};
|
|
439
|
-
protoOf(EcPrivateKeyProcessor).
|
|
440
|
-
return this.
|
|
439
|
+
protoOf(EcPrivateKeyProcessor).go8 = function (format) {
|
|
440
|
+
return this.do9(format instanceof Format_1 ? format : THROW_CCE());
|
|
441
441
|
};
|
|
442
|
-
protoOf(EcPrivateKeyProcessor).
|
|
442
|
+
protoOf(EcPrivateKeyProcessor).eo9 = function (algorithm, format, key) {
|
|
443
443
|
var tmp;
|
|
444
444
|
if (equals(format, JWK_getInstance_0())) {
|
|
445
445
|
tmp = key;
|
|
446
446
|
} else if (equals(format, RAW_getInstance())) {
|
|
447
447
|
var namedCurve = get_ecKeyAlgorithmNamedCurve(algorithm);
|
|
448
448
|
var tmp_0;
|
|
449
|
-
if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.
|
|
449
|
+
if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.qo3())) {
|
|
450
450
|
tmp_0 = get_secp256r1(Companion_instance);
|
|
451
|
-
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.
|
|
451
|
+
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.ro3())) {
|
|
452
452
|
tmp_0 = get_secp384r1(Companion_instance);
|
|
453
|
-
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.
|
|
453
|
+
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance_0.so3())) {
|
|
454
454
|
tmp_0 = get_secp521r1(Companion_instance);
|
|
455
455
|
} else {
|
|
456
456
|
var message = 'Unknown curve: ' + namedCurve;
|
|
@@ -461,18 +461,18 @@
|
|
|
461
461
|
} else if (equals(format, Generic_getInstance())) {
|
|
462
462
|
tmp = key;
|
|
463
463
|
} else if (equals(format, Generic_getInstance_0())) {
|
|
464
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
464
|
+
tmp = unwrapPem(Companion_getInstance_10().so7_1, key);
|
|
465
465
|
} else if (equals(format, SEC1_getInstance())) {
|
|
466
466
|
tmp = convertEcPrivateKeyFromSec1ToPkcs8(key);
|
|
467
467
|
} else if (equals(format, SEC1_getInstance_0())) {
|
|
468
|
-
tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().
|
|
468
|
+
tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().vo7_1, key));
|
|
469
469
|
} else {
|
|
470
470
|
noWhenBranchMatchedException();
|
|
471
471
|
}
|
|
472
472
|
return tmp;
|
|
473
473
|
};
|
|
474
|
-
protoOf(EcPrivateKeyProcessor).
|
|
475
|
-
return this.
|
|
474
|
+
protoOf(EcPrivateKeyProcessor).io8 = function (algorithm, format, key) {
|
|
475
|
+
return this.eo9(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
|
|
476
476
|
};
|
|
477
477
|
var EcPrivateKeyProcessor_instance;
|
|
478
478
|
function EcPrivateKeyProcessor_getInstance() {
|
|
@@ -481,8 +481,8 @@
|
|
|
481
481
|
return EcPrivateKeyProcessor_instance;
|
|
482
482
|
}
|
|
483
483
|
function EcdhKeyPair(publicKey, privateKey) {
|
|
484
|
-
this.
|
|
485
|
-
this.
|
|
484
|
+
this.fo9_1 = publicKey;
|
|
485
|
+
this.go9_1 = privateKey;
|
|
486
486
|
}
|
|
487
487
|
function EcdhPublicKey(publicKey) {
|
|
488
488
|
EcPublicKey.call(this, publicKey);
|
|
@@ -532,8 +532,8 @@
|
|
|
532
532
|
return WebCryptoEcdh_instance;
|
|
533
533
|
}
|
|
534
534
|
function EcdsaKeyPair(publicKey, privateKey) {
|
|
535
|
-
this.
|
|
536
|
-
this.
|
|
535
|
+
this.ho9_1 = publicKey;
|
|
536
|
+
this.io9_1 = privateKey;
|
|
537
537
|
}
|
|
538
538
|
function EcdsaPublicKey(publicKey) {
|
|
539
539
|
EcPublicKey.call(this, publicKey);
|
|
@@ -590,10 +590,10 @@
|
|
|
590
590
|
}
|
|
591
591
|
function HmacKey(key) {
|
|
592
592
|
WebCryptoEncodableKey.call(this, key, HmacKeyProcessor_getInstance());
|
|
593
|
-
this.
|
|
593
|
+
this.lo9_1 = key;
|
|
594
594
|
}
|
|
595
|
-
protoOf(HmacKey).
|
|
596
|
-
return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.
|
|
595
|
+
protoOf(HmacKey).mo9 = function () {
|
|
596
|
+
return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.lo9_1);
|
|
597
597
|
};
|
|
598
598
|
function WebCryptoHmac$HmacKey$_init_$ref_enwl2t() {
|
|
599
599
|
var l = function (p0) {
|
|
@@ -609,10 +609,10 @@
|
|
|
609
609
|
// Inline function 'kotlin.js.unsafeCast' call
|
|
610
610
|
// Inline function 'kotlin.js.asDynamic' call
|
|
611
611
|
var tmp_0 = ['sign', 'verify'];
|
|
612
|
-
tmp.
|
|
612
|
+
tmp.no9_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
|
|
613
613
|
}
|
|
614
|
-
protoOf(WebCryptoHmac).
|
|
615
|
-
return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.
|
|
614
|
+
protoOf(WebCryptoHmac).oo9 = function (digest) {
|
|
615
|
+
return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.no9_1);
|
|
616
616
|
};
|
|
617
617
|
var WebCryptoHmac_instance;
|
|
618
618
|
function WebCryptoHmac_getInstance() {
|
|
@@ -624,7 +624,7 @@
|
|
|
624
624
|
HmacKeyProcessor_instance = this;
|
|
625
625
|
WebCryptoKeyProcessor.call(this);
|
|
626
626
|
}
|
|
627
|
-
protoOf(HmacKeyProcessor).
|
|
627
|
+
protoOf(HmacKeyProcessor).po9 = function (format) {
|
|
628
628
|
var tmp;
|
|
629
629
|
switch (format.a1_1) {
|
|
630
630
|
case 0:
|
|
@@ -639,14 +639,14 @@
|
|
|
639
639
|
}
|
|
640
640
|
return tmp;
|
|
641
641
|
};
|
|
642
|
-
protoOf(HmacKeyProcessor).
|
|
643
|
-
return this.
|
|
642
|
+
protoOf(HmacKeyProcessor).go8 = function (format) {
|
|
643
|
+
return this.po9(format instanceof Format_2 ? format : THROW_CCE());
|
|
644
644
|
};
|
|
645
|
-
protoOf(HmacKeyProcessor).
|
|
645
|
+
protoOf(HmacKeyProcessor).qo9 = function (algorithm, format, key) {
|
|
646
646
|
return key;
|
|
647
647
|
};
|
|
648
|
-
protoOf(HmacKeyProcessor).
|
|
649
|
-
return this.
|
|
648
|
+
protoOf(HmacKeyProcessor).io8 = function (algorithm, format, key) {
|
|
649
|
+
return this.qo9(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
|
|
650
650
|
};
|
|
651
651
|
var HmacKeyProcessor_instance;
|
|
652
652
|
function HmacKeyProcessor_getInstance() {
|
|
@@ -662,35 +662,35 @@
|
|
|
662
662
|
}
|
|
663
663
|
function RsaPublicKey(publicKey) {
|
|
664
664
|
WebCryptoEncodableKey.call(this, publicKey, RsaPublicKeyProcessor_getInstance());
|
|
665
|
-
this.
|
|
665
|
+
this.to9_1 = publicKey;
|
|
666
666
|
}
|
|
667
667
|
function RsaPrivateKey(privateKey) {
|
|
668
668
|
WebCryptoEncodableKey.call(this, privateKey, RsaPrivateKeyProcessor_getInstance());
|
|
669
|
-
this.
|
|
669
|
+
this.wo9_1 = privateKey;
|
|
670
670
|
}
|
|
671
671
|
function WebCryptoRsa$keyPairWrapper$lambda($keyPairWrapper, this$0) {
|
|
672
672
|
return function (it) {
|
|
673
|
-
return $keyPairWrapper(this$0.
|
|
673
|
+
return $keyPairWrapper(this$0.yo9_1.vo8_1(it.publicKey), this$0.zo9_1.vo8_1(it.privateKey));
|
|
674
674
|
};
|
|
675
675
|
}
|
|
676
676
|
function WebCryptoRsa(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
|
|
677
|
-
this.
|
|
678
|
-
this.
|
|
679
|
-
this.
|
|
677
|
+
this.xo9_1 = algorithmName;
|
|
678
|
+
this.yo9_1 = publicKeyWrapper;
|
|
679
|
+
this.zo9_1 = privateKeyWrapper;
|
|
680
680
|
var tmp = this;
|
|
681
|
-
var tmp0 = this.
|
|
681
|
+
var tmp0 = this.yo9_1.uo8_1;
|
|
682
682
|
// Inline function 'kotlin.collections.plus' call
|
|
683
|
-
var elements = this.
|
|
683
|
+
var elements = this.zo9_1.uo8_1;
|
|
684
684
|
// Inline function 'kotlin.js.asDynamic' call
|
|
685
|
-
tmp.
|
|
685
|
+
tmp.aoa_1 = tmp0.concat(elements);
|
|
686
686
|
var tmp_0 = this;
|
|
687
|
-
tmp_0.
|
|
687
|
+
tmp_0.boa_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
|
|
688
688
|
}
|
|
689
689
|
function RsaPublicKeyProcessor() {
|
|
690
690
|
RsaPublicKeyProcessor_instance = this;
|
|
691
691
|
WebCryptoKeyProcessor.call(this);
|
|
692
692
|
}
|
|
693
|
-
protoOf(RsaPublicKeyProcessor).
|
|
693
|
+
protoOf(RsaPublicKeyProcessor).coa = function (format) {
|
|
694
694
|
var tmp;
|
|
695
695
|
if (equals(format, JWK_getInstance_1())) {
|
|
696
696
|
tmp = 'jwk';
|
|
@@ -701,28 +701,28 @@
|
|
|
701
701
|
}
|
|
702
702
|
return tmp;
|
|
703
703
|
};
|
|
704
|
-
protoOf(RsaPublicKeyProcessor).
|
|
705
|
-
return this.
|
|
704
|
+
protoOf(RsaPublicKeyProcessor).go8 = function (format) {
|
|
705
|
+
return this.coa(format instanceof Format_3 ? format : THROW_CCE());
|
|
706
706
|
};
|
|
707
|
-
protoOf(RsaPublicKeyProcessor).
|
|
707
|
+
protoOf(RsaPublicKeyProcessor).doa = function (algorithm, format, key) {
|
|
708
708
|
var tmp;
|
|
709
709
|
if (equals(format, JWK_getInstance_1())) {
|
|
710
710
|
tmp = key;
|
|
711
711
|
} else if (equals(format, Generic_getInstance_1())) {
|
|
712
712
|
tmp = key;
|
|
713
713
|
} else if (equals(format, Generic_getInstance_2())) {
|
|
714
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
714
|
+
tmp = unwrapPem(Companion_getInstance_10().ro7_1, key);
|
|
715
715
|
} else if (equals(format, PKCS1_getInstance())) {
|
|
716
716
|
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, key);
|
|
717
717
|
} else if (equals(format, PKCS1_getInstance_0())) {
|
|
718
|
-
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().
|
|
718
|
+
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().to7_1, key));
|
|
719
719
|
} else {
|
|
720
720
|
noWhenBranchMatchedException();
|
|
721
721
|
}
|
|
722
722
|
return tmp;
|
|
723
723
|
};
|
|
724
|
-
protoOf(RsaPublicKeyProcessor).
|
|
725
|
-
return this.
|
|
724
|
+
protoOf(RsaPublicKeyProcessor).io8 = function (algorithm, format, key) {
|
|
725
|
+
return this.doa(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
|
|
726
726
|
};
|
|
727
727
|
var RsaPublicKeyProcessor_instance;
|
|
728
728
|
function RsaPublicKeyProcessor_getInstance() {
|
|
@@ -734,7 +734,7 @@
|
|
|
734
734
|
RsaPrivateKeyProcessor_instance = this;
|
|
735
735
|
WebCryptoKeyProcessor.call(this);
|
|
736
736
|
}
|
|
737
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
737
|
+
protoOf(RsaPrivateKeyProcessor).eoa = function (format) {
|
|
738
738
|
var tmp;
|
|
739
739
|
if (equals(format, JWK_getInstance_2())) {
|
|
740
740
|
tmp = 'jwk';
|
|
@@ -745,28 +745,28 @@
|
|
|
745
745
|
}
|
|
746
746
|
return tmp;
|
|
747
747
|
};
|
|
748
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
749
|
-
return this.
|
|
748
|
+
protoOf(RsaPrivateKeyProcessor).go8 = function (format) {
|
|
749
|
+
return this.eoa(format instanceof Format_4 ? format : THROW_CCE());
|
|
750
750
|
};
|
|
751
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
751
|
+
protoOf(RsaPrivateKeyProcessor).foa = function (algorithm, format, key) {
|
|
752
752
|
var tmp;
|
|
753
753
|
if (equals(format, JWK_getInstance_2())) {
|
|
754
754
|
tmp = key;
|
|
755
755
|
} else if (equals(format, Generic_getInstance_3())) {
|
|
756
756
|
tmp = key;
|
|
757
757
|
} else if (equals(format, Generic_getInstance_4())) {
|
|
758
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
758
|
+
tmp = unwrapPem(Companion_getInstance_10().so7_1, key);
|
|
759
759
|
} else if (equals(format, PKCS1_getInstance_1())) {
|
|
760
760
|
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, key);
|
|
761
761
|
} else if (equals(format, PKCS1_getInstance_2())) {
|
|
762
|
-
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().
|
|
762
|
+
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().uo7_1, key));
|
|
763
763
|
} else {
|
|
764
764
|
noWhenBranchMatchedException();
|
|
765
765
|
}
|
|
766
766
|
return tmp;
|
|
767
767
|
};
|
|
768
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
769
|
-
return this.
|
|
768
|
+
protoOf(RsaPrivateKeyProcessor).io8 = function (algorithm, format, key) {
|
|
769
|
+
return this.foa(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
|
|
770
770
|
};
|
|
771
771
|
var RsaPrivateKeyProcessor_instance;
|
|
772
772
|
function RsaPrivateKeyProcessor_getInstance() {
|
|
@@ -775,8 +775,8 @@
|
|
|
775
775
|
return RsaPrivateKeyProcessor_instance;
|
|
776
776
|
}
|
|
777
777
|
function RsaOaepKeyPair(publicKey, privateKey) {
|
|
778
|
-
this.
|
|
779
|
-
this.
|
|
778
|
+
this.goa_1 = publicKey;
|
|
779
|
+
this.hoa_1 = privateKey;
|
|
780
780
|
}
|
|
781
781
|
function RsaOaepPublicKey(publicKey) {
|
|
782
782
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -826,8 +826,8 @@
|
|
|
826
826
|
return WebCryptoRsaOaep_instance;
|
|
827
827
|
}
|
|
828
828
|
function RsaPkcs1KeyPair(publicKey, privateKey) {
|
|
829
|
-
this.
|
|
830
|
-
this.
|
|
829
|
+
this.ioa_1 = publicKey;
|
|
830
|
+
this.joa_1 = privateKey;
|
|
831
831
|
}
|
|
832
832
|
function RsaPkcs1PublicKey(publicKey) {
|
|
833
833
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -877,8 +877,8 @@
|
|
|
877
877
|
return WebCryptoRsaPkcs1_instance;
|
|
878
878
|
}
|
|
879
879
|
function RsaPssKeyPair(publicKey, privateKey) {
|
|
880
|
-
this.
|
|
881
|
-
this.
|
|
880
|
+
this.koa_1 = publicKey;
|
|
881
|
+
this.loa_1 = privateKey;
|
|
882
882
|
}
|
|
883
883
|
function RsaPssPublicKey(publicKey) {
|
|
884
884
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -938,7 +938,7 @@
|
|
|
938
938
|
} else if (equals(_this__u8e3s4, SHA512_getInstance())) {
|
|
939
939
|
tmp = 'SHA-512';
|
|
940
940
|
} else {
|
|
941
|
-
throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.
|
|
941
|
+
throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.bo3_1);
|
|
942
942
|
}
|
|
943
943
|
return tmp;
|
|
944
944
|
}
|
|
@@ -946,14 +946,14 @@
|
|
|
946
946
|
throw IllegalStateException_init_$Create$('Only non-blocking(suspend) calls are supported in WebCrypto');
|
|
947
947
|
}
|
|
948
948
|
function WebCryptoEncodableKey(key, keyProcessor) {
|
|
949
|
-
this.
|
|
950
|
-
this.
|
|
949
|
+
this.moa_1 = key;
|
|
950
|
+
this.noa_1 = keyProcessor;
|
|
951
951
|
}
|
|
952
952
|
function $decodeFromByteArrayCOROUTINE$(_this__u8e3s4, format, bytes, resultContinuation) {
|
|
953
953
|
CoroutineImpl.call(this, resultContinuation);
|
|
954
|
-
this.
|
|
955
|
-
this.
|
|
956
|
-
this.
|
|
954
|
+
this.woa_1 = _this__u8e3s4;
|
|
955
|
+
this.xoa_1 = format;
|
|
956
|
+
this.yoa_1 = bytes;
|
|
957
957
|
}
|
|
958
958
|
protoOf($decodeFromByteArrayCOROUTINE$).q9 = function () {
|
|
959
959
|
var suspendResult = this.k9_1;
|
|
@@ -963,9 +963,9 @@
|
|
|
963
963
|
switch (tmp) {
|
|
964
964
|
case 0:
|
|
965
965
|
this.j9_1 = 2;
|
|
966
|
-
this.
|
|
966
|
+
this.zoa_1 = this.woa_1.cob_1.vo8_1;
|
|
967
967
|
this.i9_1 = 1;
|
|
968
|
-
suspendResult = WebCrypto_getInstance().
|
|
968
|
+
suspendResult = WebCrypto_getInstance().dob(this.woa_1.bob_1.go8(this.xoa_1), this.woa_1.bob_1.io8(this.woa_1.aob_1, this.xoa_1, this.yoa_1), this.woa_1.aob_1, true, this.woa_1.cob_1.uo8_1, this);
|
|
969
969
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
970
970
|
return suspendResult;
|
|
971
971
|
}
|
|
@@ -973,7 +973,7 @@
|
|
|
973
973
|
continue $sm;
|
|
974
974
|
case 1:
|
|
975
975
|
var ARGUMENT = suspendResult;
|
|
976
|
-
return this.
|
|
976
|
+
return this.zoa_1(ARGUMENT);
|
|
977
977
|
case 2:
|
|
978
978
|
throw this.l9_1;
|
|
979
979
|
}
|
|
@@ -989,36 +989,36 @@
|
|
|
989
989
|
while (true);
|
|
990
990
|
};
|
|
991
991
|
function WebCryptoKeyDecoder(algorithm, keyProcessor, keyWrapper) {
|
|
992
|
-
this.
|
|
993
|
-
this.
|
|
994
|
-
this.
|
|
992
|
+
this.aob_1 = algorithm;
|
|
993
|
+
this.bob_1 = keyProcessor;
|
|
994
|
+
this.cob_1 = keyWrapper;
|
|
995
995
|
}
|
|
996
|
-
protoOf(WebCryptoKeyDecoder).
|
|
996
|
+
protoOf(WebCryptoKeyDecoder).to3 = function (format, bytes, $completion) {
|
|
997
997
|
var tmp = new $decodeFromByteArrayCOROUTINE$(this, format, bytes, $completion);
|
|
998
998
|
tmp.k9_1 = Unit_instance;
|
|
999
999
|
tmp.l9_1 = null;
|
|
1000
1000
|
return tmp.q9();
|
|
1001
1001
|
};
|
|
1002
|
-
protoOf(WebCryptoKeyDecoder).
|
|
1002
|
+
protoOf(WebCryptoKeyDecoder).uo3 = function (format, bytes) {
|
|
1003
1003
|
nonBlocking();
|
|
1004
1004
|
};
|
|
1005
1005
|
function WebCryptoKeyProcessor() {
|
|
1006
1006
|
}
|
|
1007
1007
|
function WebCryptoKeyWrapper(usages, wrap) {
|
|
1008
|
-
this.
|
|
1009
|
-
this.
|
|
1008
|
+
this.uo8_1 = usages;
|
|
1009
|
+
this.vo8_1 = wrap;
|
|
1010
1010
|
}
|
|
1011
1011
|
function WebCryptoSignatureGenerator(algorithm, key) {
|
|
1012
|
-
this.
|
|
1013
|
-
this.
|
|
1012
|
+
this.eob_1 = algorithm;
|
|
1013
|
+
this.fob_1 = key;
|
|
1014
1014
|
}
|
|
1015
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1016
|
-
return WebCrypto_getInstance().
|
|
1015
|
+
protoOf(WebCryptoSignatureGenerator).bo4 = function (data, $completion) {
|
|
1016
|
+
return WebCrypto_getInstance().gob(this.eob_1, this.fob_1, data, $completion);
|
|
1017
1017
|
};
|
|
1018
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1018
|
+
protoOf(WebCryptoSignatureGenerator).ao4 = function () {
|
|
1019
1019
|
nonBlocking();
|
|
1020
1020
|
};
|
|
1021
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1021
|
+
protoOf(WebCryptoSignatureGenerator).co4 = function (data) {
|
|
1022
1022
|
nonBlocking();
|
|
1023
1023
|
};
|
|
1024
1024
|
function get_initHook() {
|
|
@@ -1026,7 +1026,7 @@
|
|
|
1026
1026
|
}
|
|
1027
1027
|
var initHook;
|
|
1028
1028
|
function initHook$init$() {
|
|
1029
|
-
CryptographySystem_getInstance().
|
|
1029
|
+
CryptographySystem_getInstance().no3(get_defaultProvider(), 100);
|
|
1030
1030
|
return Unit_instance;
|
|
1031
1031
|
}
|
|
1032
1032
|
function get_ecKeyAlgorithmNamedCurve(_this__u8e3s4) {
|
|
@@ -1065,9 +1065,9 @@
|
|
|
1065
1065
|
}
|
|
1066
1066
|
function $digestCOROUTINE$(_this__u8e3s4, algorithmName, data, resultContinuation) {
|
|
1067
1067
|
CoroutineImpl.call(this, resultContinuation);
|
|
1068
|
-
this.
|
|
1069
|
-
this.
|
|
1070
|
-
this.
|
|
1068
|
+
this.pob_1 = _this__u8e3s4;
|
|
1069
|
+
this.qob_1 = algorithmName;
|
|
1070
|
+
this.rob_1 = data;
|
|
1071
1071
|
}
|
|
1072
1072
|
protoOf($digestCOROUTINE$).q9 = function () {
|
|
1073
1073
|
var suspendResult = this.k9_1;
|
|
@@ -1078,7 +1078,7 @@
|
|
|
1078
1078
|
case 0:
|
|
1079
1079
|
this.j9_1 = 2;
|
|
1080
1080
|
this.i9_1 = 1;
|
|
1081
|
-
suspendResult = await_0(this.
|
|
1081
|
+
suspendResult = await_0(this.pob_1.mo8_1.digest(this.qob_1, this.rob_1), this);
|
|
1082
1082
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
1083
1083
|
return suspendResult;
|
|
1084
1084
|
}
|
|
@@ -1103,10 +1103,10 @@
|
|
|
1103
1103
|
};
|
|
1104
1104
|
function $signCOROUTINE$(_this__u8e3s4, algorithm, key, data, resultContinuation) {
|
|
1105
1105
|
CoroutineImpl.call(this, resultContinuation);
|
|
1106
|
-
this.
|
|
1107
|
-
this.
|
|
1108
|
-
this.
|
|
1109
|
-
this.
|
|
1106
|
+
this.aoc_1 = _this__u8e3s4;
|
|
1107
|
+
this.boc_1 = algorithm;
|
|
1108
|
+
this.coc_1 = key;
|
|
1109
|
+
this.doc_1 = data;
|
|
1110
1110
|
}
|
|
1111
1111
|
protoOf($signCOROUTINE$).q9 = function () {
|
|
1112
1112
|
var suspendResult = this.k9_1;
|
|
@@ -1117,7 +1117,7 @@
|
|
|
1117
1117
|
case 0:
|
|
1118
1118
|
this.j9_1 = 2;
|
|
1119
1119
|
this.i9_1 = 1;
|
|
1120
|
-
suspendResult = await_0(this.
|
|
1120
|
+
suspendResult = await_0(this.aoc_1.mo8_1.sign(this.boc_1, this.coc_1, this.doc_1), this);
|
|
1121
1121
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
1122
1122
|
return suspendResult;
|
|
1123
1123
|
}
|
|
@@ -1142,23 +1142,23 @@
|
|
|
1142
1142
|
};
|
|
1143
1143
|
function WebCrypto() {
|
|
1144
1144
|
WebCrypto_instance = this;
|
|
1145
|
-
this.
|
|
1145
|
+
this.mo8_1 = getSubtleCrypto();
|
|
1146
1146
|
}
|
|
1147
|
-
protoOf(WebCrypto).
|
|
1147
|
+
protoOf(WebCrypto).no8 = function (algorithmName, data, $completion) {
|
|
1148
1148
|
var tmp = new $digestCOROUTINE$(this, algorithmName, data, $completion);
|
|
1149
1149
|
tmp.k9_1 = Unit_instance;
|
|
1150
1150
|
tmp.l9_1 = null;
|
|
1151
1151
|
return tmp.q9();
|
|
1152
1152
|
};
|
|
1153
|
-
protoOf(WebCrypto).
|
|
1153
|
+
protoOf(WebCrypto).gob = function (algorithm, key, data, $completion) {
|
|
1154
1154
|
var tmp = new $signCOROUTINE$(this, algorithm, key, data, $completion);
|
|
1155
1155
|
tmp.k9_1 = Unit_instance;
|
|
1156
1156
|
tmp.l9_1 = null;
|
|
1157
1157
|
return tmp.q9();
|
|
1158
1158
|
};
|
|
1159
|
-
protoOf(WebCrypto).
|
|
1159
|
+
protoOf(WebCrypto).dob = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
|
|
1160
1160
|
var key = format === 'jwk' ? JSON.parse(decodeToString(keyData)) : keyData;
|
|
1161
|
-
return await_0(this.
|
|
1161
|
+
return await_0(this.mo8_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
|
|
1162
1162
|
};
|
|
1163
1163
|
var WebCrypto_instance;
|
|
1164
1164
|
function WebCrypto_getInstance() {
|