@solibo/solibo-sdk 1.0.47 → 1.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (45) hide show
  1. package/KmLogging-logging.mjs +110 -110
  2. package/Kotlin-DateTime-library-kotlinx-datetime.mjs +1562 -1562
  3. package/KotlinBigInteger-bignum.mjs +1198 -1198
  4. package/MultiplatformSettings-multiplatform-settings.mjs +17 -17
  5. package/Stately-stately-concurrency.mjs +5 -5
  6. package/cryptography-kotlin-cryptography-bigint.mjs +33 -33
  7. package/cryptography-kotlin-cryptography-core.mjs +52 -52
  8. package/cryptography-kotlin-cryptography-provider-base.mjs +8 -8
  9. package/cryptography-kotlin-cryptography-provider-webcrypto.mjs +175 -175
  10. package/cryptography-kotlin-cryptography-random.mjs +26 -26
  11. package/cryptography-kotlin-cryptography-serialization-asn1-modules.mjs +204 -204
  12. package/cryptography-kotlin-cryptography-serialization-asn1.mjs +340 -340
  13. package/cryptography-kotlin-cryptography-serialization-pem.mjs +16 -16
  14. package/index.js +2 -1
  15. package/kotlin-kotlin-stdlib.mjs +2908 -2340
  16. package/kotlin-kotlin-stdlib.mjs.map +1 -1
  17. package/kotlinx-atomicfu.mjs +13 -13
  18. package/kotlinx-coroutines-core.mjs +2141 -2112
  19. package/kotlinx-coroutines-core.mjs.map +1 -1
  20. package/kotlinx-io-kotlinx-io-bytestring.mjs +32 -32
  21. package/kotlinx-io-kotlinx-io-core.mjs +454 -454
  22. package/kotlinx-serialization-kotlinx-serialization-core.mjs +1829 -1829
  23. package/kotlinx-serialization-kotlinx-serialization-core.mjs.map +1 -1
  24. package/kotlinx-serialization-kotlinx-serialization-json.mjs +1383 -1383
  25. package/ktor-ktor-client-auth.mjs +463 -463
  26. package/ktor-ktor-client-content-negotiation.mjs +184 -184
  27. package/ktor-ktor-client-core.mjs +4292 -4284
  28. package/ktor-ktor-client-logging.mjs +1083 -1083
  29. package/ktor-ktor-client-mock.mjs +288 -0
  30. package/ktor-ktor-client-mock.mjs.map +1 -1
  31. package/ktor-ktor-events.mjs +6 -6
  32. package/ktor-ktor-http-cio.mjs +480 -480
  33. package/ktor-ktor-http.mjs +995 -991
  34. package/ktor-ktor-http.mjs.map +1 -1
  35. package/ktor-ktor-io.mjs +1090 -1090
  36. package/ktor-ktor-serialization-kotlinx-json.mjs +7 -7
  37. package/ktor-ktor-serialization-kotlinx.mjs +234 -234
  38. package/ktor-ktor-serialization.mjs +108 -108
  39. package/ktor-ktor-utils.mjs +871 -871
  40. package/ktor-ktor-websockets.mjs +742 -742
  41. package/package.json +1 -1
  42. package/solibo-sdk-sdk-home-api.mjs +54019 -54000
  43. package/solibo-sdk-sdk.d.mts +51 -0
  44. package/solibo-sdk-sdk.mjs +3361 -2493
  45. package/solibo-sdk-sdk.mjs.map +1 -1
@@ -166,8 +166,8 @@ function WebCryptoCryptographyProvider() {
166
166
  WebCryptoCryptographyProvider_instance = this;
167
167
  CryptographyProvider.call(this);
168
168
  }
169
- protoOf(WebCryptoCryptographyProvider).ko6 = function (identifier) {
170
- var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().bob_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().cob_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().dob_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().eob_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
169
+ protoOf(WebCryptoCryptographyProvider).no8 = function (identifier) {
170
+ var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().eod_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().fod_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().god_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().hod_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
171
171
  return (tmp == null ? true : isInterface(tmp, CryptographyAlgorithm)) ? tmp : THROW_CCE();
172
172
  };
173
173
  var WebCryptoCryptographyProvider_instance;
@@ -190,17 +190,17 @@ function _init_properties_WebCryptoCryptographyProvider_kt__i22tls() {
190
190
  }
191
191
  function AesKey(key) {
192
192
  WebCryptoEncodableKey.call(this, key, AesKeyProcessor_getInstance());
193
- this.hob_1 = key;
193
+ this.kod_1 = key;
194
194
  }
195
195
  function WebCryptoAes(algorithmName, keyWrapper) {
196
- this.iob_1 = algorithmName;
197
- this.job_1 = keyWrapper;
196
+ this.lod_1 = algorithmName;
197
+ this.mod_1 = keyWrapper;
198
198
  }
199
199
  function AesKeyProcessor() {
200
200
  AesKeyProcessor_instance = this;
201
201
  WebCryptoKeyProcessor.call(this);
202
202
  }
203
- protoOf(AesKeyProcessor).kob = function (format) {
203
+ protoOf(AesKeyProcessor).nod = function (format) {
204
204
  var tmp;
205
205
  switch (format.a1_1) {
206
206
  case 0:
@@ -215,14 +215,14 @@ protoOf(AesKeyProcessor).kob = function (format) {
215
215
  }
216
216
  return tmp;
217
217
  };
218
- protoOf(AesKeyProcessor).lob = function (format) {
219
- return this.kob(format instanceof Format ? format : THROW_CCE());
218
+ protoOf(AesKeyProcessor).ood = function (format) {
219
+ return this.nod(format instanceof Format ? format : THROW_CCE());
220
220
  };
221
- protoOf(AesKeyProcessor).mob = function (algorithm, format, key) {
221
+ protoOf(AesKeyProcessor).pod = function (algorithm, format, key) {
222
222
  return key;
223
223
  };
224
- protoOf(AesKeyProcessor).nob = function (algorithm, format, key) {
225
- return this.mob(algorithm, format instanceof Format ? format : THROW_CCE(), key);
224
+ protoOf(AesKeyProcessor).qod = function (algorithm, format, key) {
225
+ return this.pod(algorithm, format instanceof Format ? format : THROW_CCE(), key);
226
226
  };
227
227
  var AesKeyProcessor_instance;
228
228
  function AesKeyProcessor_getInstance() {
@@ -304,10 +304,10 @@ function WebCryptoAesGcm_getInstance() {
304
304
  }
305
305
  function Companion() {
306
306
  Companion_instance_3 = this;
307
- this.bob_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
308
- this.cob_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
309
- this.dob_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
310
- this.eob_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
307
+ this.eod_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
308
+ this.fod_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
309
+ this.god_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
310
+ this.hod_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
311
311
  }
312
312
  var Companion_instance_3;
313
313
  function Companion_getInstance_11() {
@@ -317,52 +317,52 @@ function Companion_getInstance_11() {
317
317
  }
318
318
  function WebCryptoDigest(algorithm, id) {
319
319
  Companion_getInstance_11();
320
- this.oob_1 = algorithm;
321
- this.pob_1 = id;
320
+ this.rod_1 = algorithm;
321
+ this.sod_1 = id;
322
322
  }
323
- protoOf(WebCryptoDigest).qob = function () {
323
+ protoOf(WebCryptoDigest).tod = function () {
324
324
  return this;
325
325
  };
326
- protoOf(WebCryptoDigest).bo7 = function (data, $completion) {
327
- return WebCrypto_getInstance().sob(this.oob_1, data, $completion);
326
+ protoOf(WebCryptoDigest).eo9 = function (data, $completion) {
327
+ return WebCrypto_getInstance().vod(this.rod_1, data, $completion);
328
328
  };
329
- protoOf(WebCryptoDigest).ao7 = function () {
329
+ protoOf(WebCryptoDigest).do9 = function () {
330
330
  nonBlocking();
331
331
  };
332
- protoOf(WebCryptoDigest).co7 = function (data) {
332
+ protoOf(WebCryptoDigest).fo9 = function (data) {
333
333
  nonBlocking();
334
334
  };
335
335
  function EcPublicKey(publicKey) {
336
336
  WebCryptoEncodableKey.call(this, publicKey, EcPublicKeyProcessor_getInstance());
337
- this.vob_1 = publicKey;
337
+ this.yod_1 = publicKey;
338
338
  }
339
339
  function EcPrivateKey_0(privateKey) {
340
340
  WebCryptoEncodableKey.call(this, privateKey, EcPrivateKeyProcessor_getInstance());
341
- this.yob_1 = privateKey;
341
+ this.boe_1 = privateKey;
342
342
  }
343
343
  function WebCryptoEc$keyPairWrapper$lambda($keyPairWrapper, this$0) {
344
344
  return function (it) {
345
- return $keyPairWrapper(this$0.coc_1.aoc_1(it.publicKey), this$0.doc_1.aoc_1(it.privateKey));
345
+ return $keyPairWrapper(this$0.foe_1.doe_1(it.publicKey), this$0.goe_1.doe_1(it.privateKey));
346
346
  };
347
347
  }
348
348
  function WebCryptoEc(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
349
- this.boc_1 = algorithmName;
350
- this.coc_1 = publicKeyWrapper;
351
- this.doc_1 = privateKeyWrapper;
349
+ this.eoe_1 = algorithmName;
350
+ this.foe_1 = publicKeyWrapper;
351
+ this.goe_1 = privateKeyWrapper;
352
352
  var tmp = this;
353
- var tmp0 = this.coc_1.zob_1;
353
+ var tmp0 = this.foe_1.coe_1;
354
354
  // Inline function 'kotlin.collections.plus' call
355
- var elements = this.doc_1.zob_1;
355
+ var elements = this.goe_1.coe_1;
356
356
  // Inline function 'kotlin.js.asDynamic' call
357
- tmp.eoc_1 = tmp0.concat(elements);
357
+ tmp.hoe_1 = tmp0.concat(elements);
358
358
  var tmp_0 = this;
359
- tmp_0.foc_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
359
+ tmp_0.ioe_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
360
360
  }
361
361
  function EcPublicKeyProcessor() {
362
362
  EcPublicKeyProcessor_instance = this;
363
363
  WebCryptoKeyProcessor.call(this);
364
364
  }
365
- protoOf(EcPublicKeyProcessor).goc = function (format) {
365
+ protoOf(EcPublicKeyProcessor).joe = function (format) {
366
366
  var tmp;
367
367
  if (equals(format, JWK_getInstance())) {
368
368
  tmp = 'jwk';
@@ -375,10 +375,10 @@ protoOf(EcPublicKeyProcessor).goc = function (format) {
375
375
  }
376
376
  return tmp;
377
377
  };
378
- protoOf(EcPublicKeyProcessor).lob = function (format) {
379
- return this.goc(format instanceof Format_0 ? format : THROW_CCE());
378
+ protoOf(EcPublicKeyProcessor).ood = function (format) {
379
+ return this.joe(format instanceof Format_0 ? format : THROW_CCE());
380
380
  };
381
- protoOf(EcPublicKeyProcessor).hoc = function (algorithm, format, key) {
381
+ protoOf(EcPublicKeyProcessor).koe = function (algorithm, format, key) {
382
382
  var tmp;
383
383
  if (equals(format, JWK_getInstance())) {
384
384
  tmp = key;
@@ -387,14 +387,14 @@ protoOf(EcPublicKeyProcessor).hoc = function (algorithm, format, key) {
387
387
  } else if (equals(format, DER_getInstance())) {
388
388
  tmp = key;
389
389
  } else if (equals(format, PEM_getInstance())) {
390
- tmp = unwrapPem(Companion_getInstance_10().woa_1, key);
390
+ tmp = unwrapPem(Companion_getInstance_10().zoc_1, key);
391
391
  } else {
392
392
  noWhenBranchMatchedException();
393
393
  }
394
394
  return tmp;
395
395
  };
396
- protoOf(EcPublicKeyProcessor).nob = function (algorithm, format, key) {
397
- return this.hoc(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
396
+ protoOf(EcPublicKeyProcessor).qod = function (algorithm, format, key) {
397
+ return this.koe(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
398
398
  };
399
399
  var EcPublicKeyProcessor_instance;
400
400
  function EcPublicKeyProcessor_getInstance() {
@@ -406,7 +406,7 @@ function EcPrivateKeyProcessor() {
406
406
  EcPrivateKeyProcessor_instance = this;
407
407
  WebCryptoKeyProcessor.call(this);
408
408
  }
409
- protoOf(EcPrivateKeyProcessor).ioc = function (format) {
409
+ protoOf(EcPrivateKeyProcessor).loe = function (format) {
410
410
  var tmp;
411
411
  if (equals(format, JWK_getInstance_0())) {
412
412
  tmp = 'jwk';
@@ -417,43 +417,43 @@ protoOf(EcPrivateKeyProcessor).ioc = function (format) {
417
417
  }
418
418
  return tmp;
419
419
  };
420
- protoOf(EcPrivateKeyProcessor).lob = function (format) {
421
- return this.ioc(format instanceof Format_1 ? format : THROW_CCE());
420
+ protoOf(EcPrivateKeyProcessor).ood = function (format) {
421
+ return this.loe(format instanceof Format_1 ? format : THROW_CCE());
422
422
  };
423
- protoOf(EcPrivateKeyProcessor).joc = function (algorithm, format, key) {
423
+ protoOf(EcPrivateKeyProcessor).moe = function (algorithm, format, key) {
424
424
  var tmp;
425
425
  if (equals(format, JWK_getInstance_0())) {
426
426
  tmp = key;
427
427
  } else if (equals(format, RAW_getInstance())) {
428
428
  var namedCurve = get_ecKeyAlgorithmNamedCurve(algorithm);
429
429
  var tmp_0;
430
- if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.vo6())) {
430
+ if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.yo8())) {
431
431
  tmp_0 = get_secp256r1(Companion_instance_1);
432
- } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.wo6())) {
432
+ } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.zo8())) {
433
433
  tmp_0 = get_secp384r1(Companion_instance_1);
434
- } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.xo6())) {
434
+ } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.ao9())) {
435
435
  tmp_0 = get_secp521r1(Companion_instance_1);
436
436
  } else {
437
437
  var message = 'Unknown curve: ' + namedCurve;
438
438
  throw IllegalStateException_init_$Create$(toString(message));
439
439
  }
440
440
  var curveId = tmp_0;
441
- tmp = wrapPrivateKeyInfo(0, new EcKeyAlgorithmIdentifier(_EcParameters___init__impl__i4ww9z(curveId)), Default_getInstance().yt(Companion_instance_2.g63(), new EcPrivateKey(1, key)));
441
+ tmp = wrapPrivateKeyInfo(0, new EcKeyAlgorithmIdentifier(_EcParameters___init__impl__i4ww9z(curveId)), Default_getInstance().hu(Companion_instance_2.t63(), new EcPrivateKey(1, key)));
442
442
  } else if (equals(format, Generic_getInstance())) {
443
443
  tmp = key;
444
444
  } else if (equals(format, Generic_getInstance_0())) {
445
- tmp = unwrapPem(Companion_getInstance_10().xoa_1, key);
445
+ tmp = unwrapPem(Companion_getInstance_10().aod_1, key);
446
446
  } else if (equals(format, SEC1_getInstance())) {
447
447
  tmp = convertEcPrivateKeyFromSec1ToPkcs8(key);
448
448
  } else if (equals(format, SEC1_getInstance_0())) {
449
- tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().aob_1, key));
449
+ tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().dod_1, key));
450
450
  } else {
451
451
  noWhenBranchMatchedException();
452
452
  }
453
453
  return tmp;
454
454
  };
455
- protoOf(EcPrivateKeyProcessor).nob = function (algorithm, format, key) {
456
- return this.joc(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
455
+ protoOf(EcPrivateKeyProcessor).qod = function (algorithm, format, key) {
456
+ return this.moe(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
457
457
  };
458
458
  var EcPrivateKeyProcessor_instance;
459
459
  function EcPrivateKeyProcessor_getInstance() {
@@ -462,8 +462,8 @@ function EcPrivateKeyProcessor_getInstance() {
462
462
  return EcPrivateKeyProcessor_instance;
463
463
  }
464
464
  function EcdhKeyPair(publicKey, privateKey) {
465
- this.koc_1 = publicKey;
466
- this.loc_1 = privateKey;
465
+ this.noe_1 = publicKey;
466
+ this.ooe_1 = privateKey;
467
467
  }
468
468
  function EcdhPublicKey(publicKey) {
469
469
  EcPublicKey.call(this, publicKey);
@@ -513,8 +513,8 @@ function WebCryptoEcdh_getInstance() {
513
513
  return WebCryptoEcdh_instance;
514
514
  }
515
515
  function EcdsaKeyPair(publicKey, privateKey) {
516
- this.moc_1 = publicKey;
517
- this.noc_1 = privateKey;
516
+ this.poe_1 = publicKey;
517
+ this.qoe_1 = privateKey;
518
518
  }
519
519
  function EcdsaPublicKey(publicKey) {
520
520
  EcPublicKey.call(this, publicKey);
@@ -571,10 +571,10 @@ function WebCryptoHkdf_getInstance() {
571
571
  }
572
572
  function HmacKey(key) {
573
573
  WebCryptoEncodableKey.call(this, key, HmacKeyProcessor_getInstance());
574
- this.qoc_1 = key;
574
+ this.toe_1 = key;
575
575
  }
576
- protoOf(HmacKey).roc = function () {
577
- return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.qoc_1);
576
+ protoOf(HmacKey).uoe = function () {
577
+ return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.toe_1);
578
578
  };
579
579
  function WebCryptoHmac$HmacKey$_init_$ref_enwl2t() {
580
580
  var l = function (p0) {
@@ -590,10 +590,10 @@ function WebCryptoHmac() {
590
590
  // Inline function 'kotlin.js.unsafeCast' call
591
591
  // Inline function 'kotlin.js.asDynamic' call
592
592
  var tmp_0 = ['sign', 'verify'];
593
- tmp.soc_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
593
+ tmp.voe_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
594
594
  }
595
- protoOf(WebCryptoHmac).toc = function (digest) {
596
- return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.soc_1);
595
+ protoOf(WebCryptoHmac).woe = function (digest) {
596
+ return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.voe_1);
597
597
  };
598
598
  var WebCryptoHmac_instance;
599
599
  function WebCryptoHmac_getInstance() {
@@ -605,7 +605,7 @@ function HmacKeyProcessor() {
605
605
  HmacKeyProcessor_instance = this;
606
606
  WebCryptoKeyProcessor.call(this);
607
607
  }
608
- protoOf(HmacKeyProcessor).uoc = function (format) {
608
+ protoOf(HmacKeyProcessor).xoe = function (format) {
609
609
  var tmp;
610
610
  switch (format.a1_1) {
611
611
  case 0:
@@ -620,14 +620,14 @@ protoOf(HmacKeyProcessor).uoc = function (format) {
620
620
  }
621
621
  return tmp;
622
622
  };
623
- protoOf(HmacKeyProcessor).lob = function (format) {
624
- return this.uoc(format instanceof Format_2 ? format : THROW_CCE());
623
+ protoOf(HmacKeyProcessor).ood = function (format) {
624
+ return this.xoe(format instanceof Format_2 ? format : THROW_CCE());
625
625
  };
626
- protoOf(HmacKeyProcessor).voc = function (algorithm, format, key) {
626
+ protoOf(HmacKeyProcessor).yoe = function (algorithm, format, key) {
627
627
  return key;
628
628
  };
629
- protoOf(HmacKeyProcessor).nob = function (algorithm, format, key) {
630
- return this.voc(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
629
+ protoOf(HmacKeyProcessor).qod = function (algorithm, format, key) {
630
+ return this.yoe(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
631
631
  };
632
632
  var HmacKeyProcessor_instance;
633
633
  function HmacKeyProcessor_getInstance() {
@@ -643,35 +643,35 @@ function WebCryptoPbkdf2_getInstance() {
643
643
  }
644
644
  function RsaPublicKey(publicKey) {
645
645
  WebCryptoEncodableKey.call(this, publicKey, RsaPublicKeyProcessor_getInstance());
646
- this.yoc_1 = publicKey;
646
+ this.bof_1 = publicKey;
647
647
  }
648
648
  function RsaPrivateKey(privateKey) {
649
649
  WebCryptoEncodableKey.call(this, privateKey, RsaPrivateKeyProcessor_getInstance());
650
- this.bod_1 = privateKey;
650
+ this.eof_1 = privateKey;
651
651
  }
652
652
  function WebCryptoRsa$keyPairWrapper$lambda($keyPairWrapper, this$0) {
653
653
  return function (it) {
654
- return $keyPairWrapper(this$0.dod_1.aoc_1(it.publicKey), this$0.eod_1.aoc_1(it.privateKey));
654
+ return $keyPairWrapper(this$0.gof_1.doe_1(it.publicKey), this$0.hof_1.doe_1(it.privateKey));
655
655
  };
656
656
  }
657
657
  function WebCryptoRsa(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
658
- this.cod_1 = algorithmName;
659
- this.dod_1 = publicKeyWrapper;
660
- this.eod_1 = privateKeyWrapper;
658
+ this.fof_1 = algorithmName;
659
+ this.gof_1 = publicKeyWrapper;
660
+ this.hof_1 = privateKeyWrapper;
661
661
  var tmp = this;
662
- var tmp0 = this.dod_1.zob_1;
662
+ var tmp0 = this.gof_1.coe_1;
663
663
  // Inline function 'kotlin.collections.plus' call
664
- var elements = this.eod_1.zob_1;
664
+ var elements = this.hof_1.coe_1;
665
665
  // Inline function 'kotlin.js.asDynamic' call
666
- tmp.fod_1 = tmp0.concat(elements);
666
+ tmp.iof_1 = tmp0.concat(elements);
667
667
  var tmp_0 = this;
668
- tmp_0.god_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
668
+ tmp_0.jof_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
669
669
  }
670
670
  function RsaPublicKeyProcessor() {
671
671
  RsaPublicKeyProcessor_instance = this;
672
672
  WebCryptoKeyProcessor.call(this);
673
673
  }
674
- protoOf(RsaPublicKeyProcessor).hod = function (format) {
674
+ protoOf(RsaPublicKeyProcessor).kof = function (format) {
675
675
  var tmp;
676
676
  if (equals(format, JWK_getInstance_1())) {
677
677
  tmp = 'jwk';
@@ -682,28 +682,28 @@ protoOf(RsaPublicKeyProcessor).hod = function (format) {
682
682
  }
683
683
  return tmp;
684
684
  };
685
- protoOf(RsaPublicKeyProcessor).lob = function (format) {
686
- return this.hod(format instanceof Format_3 ? format : THROW_CCE());
685
+ protoOf(RsaPublicKeyProcessor).ood = function (format) {
686
+ return this.kof(format instanceof Format_3 ? format : THROW_CCE());
687
687
  };
688
- protoOf(RsaPublicKeyProcessor).iod = function (algorithm, format, key) {
688
+ protoOf(RsaPublicKeyProcessor).lof = function (algorithm, format, key) {
689
689
  var tmp;
690
690
  if (equals(format, JWK_getInstance_1())) {
691
691
  tmp = key;
692
692
  } else if (equals(format, Generic_getInstance_1())) {
693
693
  tmp = key;
694
694
  } else if (equals(format, Generic_getInstance_2())) {
695
- tmp = unwrapPem(Companion_getInstance_10().woa_1, key);
695
+ tmp = unwrapPem(Companion_getInstance_10().zoc_1, key);
696
696
  } else if (equals(format, PKCS1_getInstance())) {
697
697
  tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, key);
698
698
  } else if (equals(format, PKCS1_getInstance_0())) {
699
- tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().yoa_1, key));
699
+ tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().bod_1, key));
700
700
  } else {
701
701
  noWhenBranchMatchedException();
702
702
  }
703
703
  return tmp;
704
704
  };
705
- protoOf(RsaPublicKeyProcessor).nob = function (algorithm, format, key) {
706
- return this.iod(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
705
+ protoOf(RsaPublicKeyProcessor).qod = function (algorithm, format, key) {
706
+ return this.lof(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
707
707
  };
708
708
  var RsaPublicKeyProcessor_instance;
709
709
  function RsaPublicKeyProcessor_getInstance() {
@@ -715,7 +715,7 @@ function RsaPrivateKeyProcessor() {
715
715
  RsaPrivateKeyProcessor_instance = this;
716
716
  WebCryptoKeyProcessor.call(this);
717
717
  }
718
- protoOf(RsaPrivateKeyProcessor).jod = function (format) {
718
+ protoOf(RsaPrivateKeyProcessor).mof = function (format) {
719
719
  var tmp;
720
720
  if (equals(format, JWK_getInstance_2())) {
721
721
  tmp = 'jwk';
@@ -726,28 +726,28 @@ protoOf(RsaPrivateKeyProcessor).jod = function (format) {
726
726
  }
727
727
  return tmp;
728
728
  };
729
- protoOf(RsaPrivateKeyProcessor).lob = function (format) {
730
- return this.jod(format instanceof Format_4 ? format : THROW_CCE());
729
+ protoOf(RsaPrivateKeyProcessor).ood = function (format) {
730
+ return this.mof(format instanceof Format_4 ? format : THROW_CCE());
731
731
  };
732
- protoOf(RsaPrivateKeyProcessor).kod = function (algorithm, format, key) {
732
+ protoOf(RsaPrivateKeyProcessor).nof = function (algorithm, format, key) {
733
733
  var tmp;
734
734
  if (equals(format, JWK_getInstance_2())) {
735
735
  tmp = key;
736
736
  } else if (equals(format, Generic_getInstance_3())) {
737
737
  tmp = key;
738
738
  } else if (equals(format, Generic_getInstance_4())) {
739
- tmp = unwrapPem(Companion_getInstance_10().xoa_1, key);
739
+ tmp = unwrapPem(Companion_getInstance_10().aod_1, key);
740
740
  } else if (equals(format, PKCS1_getInstance_1())) {
741
741
  tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, key);
742
742
  } else if (equals(format, PKCS1_getInstance_2())) {
743
- tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().zoa_1, key));
743
+ tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().cod_1, key));
744
744
  } else {
745
745
  noWhenBranchMatchedException();
746
746
  }
747
747
  return tmp;
748
748
  };
749
- protoOf(RsaPrivateKeyProcessor).nob = function (algorithm, format, key) {
750
- return this.kod(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
749
+ protoOf(RsaPrivateKeyProcessor).qod = function (algorithm, format, key) {
750
+ return this.nof(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
751
751
  };
752
752
  var RsaPrivateKeyProcessor_instance;
753
753
  function RsaPrivateKeyProcessor_getInstance() {
@@ -756,8 +756,8 @@ function RsaPrivateKeyProcessor_getInstance() {
756
756
  return RsaPrivateKeyProcessor_instance;
757
757
  }
758
758
  function RsaOaepKeyPair(publicKey, privateKey) {
759
- this.lod_1 = publicKey;
760
- this.mod_1 = privateKey;
759
+ this.oof_1 = publicKey;
760
+ this.pof_1 = privateKey;
761
761
  }
762
762
  function RsaOaepPublicKey(publicKey) {
763
763
  RsaPublicKey.call(this, publicKey);
@@ -807,8 +807,8 @@ function WebCryptoRsaOaep_getInstance() {
807
807
  return WebCryptoRsaOaep_instance;
808
808
  }
809
809
  function RsaPkcs1KeyPair(publicKey, privateKey) {
810
- this.nod_1 = publicKey;
811
- this.ood_1 = privateKey;
810
+ this.qof_1 = publicKey;
811
+ this.rof_1 = privateKey;
812
812
  }
813
813
  function RsaPkcs1PublicKey(publicKey) {
814
814
  RsaPublicKey.call(this, publicKey);
@@ -858,8 +858,8 @@ function WebCryptoRsaPkcs1_getInstance() {
858
858
  return WebCryptoRsaPkcs1_instance;
859
859
  }
860
860
  function RsaPssKeyPair(publicKey, privateKey) {
861
- this.pod_1 = publicKey;
862
- this.qod_1 = privateKey;
861
+ this.sof_1 = publicKey;
862
+ this.tof_1 = privateKey;
863
863
  }
864
864
  function RsaPssPublicKey(publicKey) {
865
865
  RsaPublicKey.call(this, publicKey);
@@ -919,7 +919,7 @@ function hashAlgorithmName(_this__u8e3s4) {
919
919
  } else if (equals(_this__u8e3s4, SHA512_getInstance())) {
920
920
  tmp = 'SHA-512';
921
921
  } else {
922
- throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.go6_1);
922
+ throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.jo8_1);
923
923
  }
924
924
  return tmp;
925
925
  }
@@ -927,26 +927,26 @@ function nonBlocking() {
927
927
  throw IllegalStateException_init_$Create$('Only non-blocking(suspend) calls are supported in WebCrypto');
928
928
  }
929
929
  function WebCryptoEncodableKey(key, keyProcessor) {
930
- this.rod_1 = key;
931
- this.sod_1 = keyProcessor;
930
+ this.uof_1 = key;
931
+ this.vof_1 = keyProcessor;
932
932
  }
933
933
  function $decodeFromByteArrayCOROUTINE$(_this__u8e3s4, format, bytes, resultContinuation) {
934
934
  CoroutineImpl.call(this, resultContinuation);
935
- this.boe_1 = _this__u8e3s4;
936
- this.coe_1 = format;
937
- this.doe_1 = bytes;
935
+ this.eog_1 = _this__u8e3s4;
936
+ this.fog_1 = format;
937
+ this.gog_1 = bytes;
938
938
  }
939
- protoOf($decodeFromByteArrayCOROUTINE$).q9 = function () {
940
- var suspendResult = this.k9_1;
939
+ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
940
+ var suspendResult = this.n9_1;
941
941
  $sm: do
942
942
  try {
943
- var tmp = this.i9_1;
943
+ var tmp = this.l9_1;
944
944
  switch (tmp) {
945
945
  case 0:
946
- this.j9_1 = 2;
947
- this.eoe_1 = this.boe_1.hoe_1.aoc_1;
948
- this.i9_1 = 1;
949
- suspendResult = WebCrypto_getInstance().ioe(this.boe_1.goe_1.lob(this.coe_1), this.boe_1.goe_1.nob(this.boe_1.foe_1, this.coe_1, this.doe_1), this.boe_1.foe_1, true, this.boe_1.hoe_1.zob_1, this);
946
+ this.m9_1 = 2;
947
+ this.hog_1 = this.eog_1.kog_1.doe_1;
948
+ this.l9_1 = 1;
949
+ suspendResult = WebCrypto_getInstance().mog(this.eog_1.jog_1.ood(this.fog_1), this.eog_1.jog_1.qod(this.eog_1.iog_1, this.fog_1, this.gog_1), this.eog_1.iog_1, true, this.eog_1.kog_1.coe_1, this);
950
950
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
951
951
  return suspendResult;
952
952
  }
@@ -954,52 +954,52 @@ protoOf($decodeFromByteArrayCOROUTINE$).q9 = function () {
954
954
  continue $sm;
955
955
  case 1:
956
956
  var ARGUMENT = suspendResult;
957
- return this.eoe_1(ARGUMENT);
957
+ return this.hog_1(ARGUMENT);
958
958
  case 2:
959
- throw this.l9_1;
959
+ throw this.o9_1;
960
960
  }
961
961
  } catch ($p) {
962
962
  var e = $p;
963
- if (this.j9_1 === 2) {
963
+ if (this.m9_1 === 2) {
964
964
  throw e;
965
965
  } else {
966
- this.i9_1 = this.j9_1;
967
- this.l9_1 = e;
966
+ this.l9_1 = this.m9_1;
967
+ this.o9_1 = e;
968
968
  }
969
969
  }
970
970
  while (true);
971
971
  };
972
972
  function WebCryptoKeyDecoder(algorithm, keyProcessor, keyWrapper) {
973
- this.foe_1 = algorithm;
974
- this.goe_1 = keyProcessor;
975
- this.hoe_1 = keyWrapper;
973
+ this.iog_1 = algorithm;
974
+ this.jog_1 = keyProcessor;
975
+ this.kog_1 = keyWrapper;
976
976
  }
977
- protoOf(WebCryptoKeyDecoder).yo6 = function (format, bytes, $completion) {
977
+ protoOf(WebCryptoKeyDecoder).bo9 = function (format, bytes, $completion) {
978
978
  var tmp = new $decodeFromByteArrayCOROUTINE$(this, format, bytes, $completion);
979
- tmp.k9_1 = Unit_instance;
980
- tmp.l9_1 = null;
981
- return tmp.q9();
979
+ tmp.n9_1 = Unit_instance;
980
+ tmp.o9_1 = null;
981
+ return tmp.t9();
982
982
  };
983
- protoOf(WebCryptoKeyDecoder).zo6 = function (format, bytes) {
983
+ protoOf(WebCryptoKeyDecoder).co9 = function (format, bytes) {
984
984
  nonBlocking();
985
985
  };
986
986
  function WebCryptoKeyProcessor() {
987
987
  }
988
988
  function WebCryptoKeyWrapper(usages, wrap) {
989
- this.zob_1 = usages;
990
- this.aoc_1 = wrap;
989
+ this.coe_1 = usages;
990
+ this.doe_1 = wrap;
991
991
  }
992
992
  function WebCryptoSignatureGenerator(algorithm, key) {
993
- this.joe_1 = algorithm;
994
- this.koe_1 = key;
993
+ this.nog_1 = algorithm;
994
+ this.oog_1 = key;
995
995
  }
996
- protoOf(WebCryptoSignatureGenerator).go7 = function (data, $completion) {
997
- return WebCrypto_getInstance().loe(this.joe_1, this.koe_1, data, $completion);
996
+ protoOf(WebCryptoSignatureGenerator).jo9 = function (data, $completion) {
997
+ return WebCrypto_getInstance().pog(this.nog_1, this.oog_1, data, $completion);
998
998
  };
999
- protoOf(WebCryptoSignatureGenerator).fo7 = function () {
999
+ protoOf(WebCryptoSignatureGenerator).io9 = function () {
1000
1000
  nonBlocking();
1001
1001
  };
1002
- protoOf(WebCryptoSignatureGenerator).ho7 = function (data) {
1002
+ protoOf(WebCryptoSignatureGenerator).ko9 = function (data) {
1003
1003
  nonBlocking();
1004
1004
  };
1005
1005
  function get_initHook() {
@@ -1007,7 +1007,7 @@ function get_initHook() {
1007
1007
  }
1008
1008
  var initHook_0;
1009
1009
  function initHook$init$() {
1010
- CryptographySystem_getInstance().so6(get_defaultProvider(), 100);
1010
+ CryptographySystem_getInstance().vo8(get_defaultProvider(), 100);
1011
1011
  return Unit_instance;
1012
1012
  }
1013
1013
  function get_ecKeyAlgorithmNamedCurve(_this__u8e3s4) {
@@ -1046,20 +1046,20 @@ function getCrypto() {
1046
1046
  }
1047
1047
  function $digestCOROUTINE$(_this__u8e3s4, algorithmName, data, resultContinuation) {
1048
1048
  CoroutineImpl.call(this, resultContinuation);
1049
- this.uoe_1 = _this__u8e3s4;
1050
- this.voe_1 = algorithmName;
1051
- this.woe_1 = data;
1049
+ this.yog_1 = _this__u8e3s4;
1050
+ this.zog_1 = algorithmName;
1051
+ this.aoh_1 = data;
1052
1052
  }
1053
- protoOf($digestCOROUTINE$).q9 = function () {
1054
- var suspendResult = this.k9_1;
1053
+ protoOf($digestCOROUTINE$).t9 = function () {
1054
+ var suspendResult = this.n9_1;
1055
1055
  $sm: do
1056
1056
  try {
1057
- var tmp = this.i9_1;
1057
+ var tmp = this.l9_1;
1058
1058
  switch (tmp) {
1059
1059
  case 0:
1060
- this.j9_1 = 2;
1061
- this.i9_1 = 1;
1062
- suspendResult = await_0(this.uoe_1.rob_1.digest(this.voe_1, this.woe_1), this);
1060
+ this.m9_1 = 2;
1061
+ this.l9_1 = 1;
1062
+ suspendResult = await_0(this.yog_1.uod_1.digest(this.zog_1, this.aoh_1), this);
1063
1063
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
1064
1064
  return suspendResult;
1065
1065
  }
@@ -1069,36 +1069,36 @@ protoOf($digestCOROUTINE$).q9 = function () {
1069
1069
  var ARGUMENT = suspendResult;
1070
1070
  return toByteArray(ARGUMENT);
1071
1071
  case 2:
1072
- throw this.l9_1;
1072
+ throw this.o9_1;
1073
1073
  }
1074
1074
  } catch ($p) {
1075
1075
  var e = $p;
1076
- if (this.j9_1 === 2) {
1076
+ if (this.m9_1 === 2) {
1077
1077
  throw e;
1078
1078
  } else {
1079
- this.i9_1 = this.j9_1;
1080
- this.l9_1 = e;
1079
+ this.l9_1 = this.m9_1;
1080
+ this.o9_1 = e;
1081
1081
  }
1082
1082
  }
1083
1083
  while (true);
1084
1084
  };
1085
1085
  function $signCOROUTINE$(_this__u8e3s4, algorithm, key, data, resultContinuation) {
1086
1086
  CoroutineImpl.call(this, resultContinuation);
1087
- this.fof_1 = _this__u8e3s4;
1088
- this.gof_1 = algorithm;
1089
- this.hof_1 = key;
1090
- this.iof_1 = data;
1087
+ this.joh_1 = _this__u8e3s4;
1088
+ this.koh_1 = algorithm;
1089
+ this.loh_1 = key;
1090
+ this.moh_1 = data;
1091
1091
  }
1092
- protoOf($signCOROUTINE$).q9 = function () {
1093
- var suspendResult = this.k9_1;
1092
+ protoOf($signCOROUTINE$).t9 = function () {
1093
+ var suspendResult = this.n9_1;
1094
1094
  $sm: do
1095
1095
  try {
1096
- var tmp = this.i9_1;
1096
+ var tmp = this.l9_1;
1097
1097
  switch (tmp) {
1098
1098
  case 0:
1099
- this.j9_1 = 2;
1100
- this.i9_1 = 1;
1101
- suspendResult = await_0(this.fof_1.rob_1.sign(this.gof_1, this.hof_1, this.iof_1), this);
1099
+ this.m9_1 = 2;
1100
+ this.l9_1 = 1;
1101
+ suspendResult = await_0(this.joh_1.uod_1.sign(this.koh_1, this.loh_1, this.moh_1), this);
1102
1102
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
1103
1103
  return suspendResult;
1104
1104
  }
@@ -1108,38 +1108,38 @@ protoOf($signCOROUTINE$).q9 = function () {
1108
1108
  var ARGUMENT = suspendResult;
1109
1109
  return toByteArray(ARGUMENT);
1110
1110
  case 2:
1111
- throw this.l9_1;
1111
+ throw this.o9_1;
1112
1112
  }
1113
1113
  } catch ($p) {
1114
1114
  var e = $p;
1115
- if (this.j9_1 === 2) {
1115
+ if (this.m9_1 === 2) {
1116
1116
  throw e;
1117
1117
  } else {
1118
- this.i9_1 = this.j9_1;
1119
- this.l9_1 = e;
1118
+ this.l9_1 = this.m9_1;
1119
+ this.o9_1 = e;
1120
1120
  }
1121
1121
  }
1122
1122
  while (true);
1123
1123
  };
1124
1124
  function WebCrypto() {
1125
1125
  WebCrypto_instance = this;
1126
- this.rob_1 = getSubtleCrypto();
1126
+ this.uod_1 = getSubtleCrypto();
1127
1127
  }
1128
- protoOf(WebCrypto).sob = function (algorithmName, data, $completion) {
1128
+ protoOf(WebCrypto).vod = function (algorithmName, data, $completion) {
1129
1129
  var tmp = new $digestCOROUTINE$(this, algorithmName, data, $completion);
1130
- tmp.k9_1 = Unit_instance;
1131
- tmp.l9_1 = null;
1132
- return tmp.q9();
1130
+ tmp.n9_1 = Unit_instance;
1131
+ tmp.o9_1 = null;
1132
+ return tmp.t9();
1133
1133
  };
1134
- protoOf(WebCrypto).loe = function (algorithm, key, data, $completion) {
1134
+ protoOf(WebCrypto).pog = function (algorithm, key, data, $completion) {
1135
1135
  var tmp = new $signCOROUTINE$(this, algorithm, key, data, $completion);
1136
- tmp.k9_1 = Unit_instance;
1137
- tmp.l9_1 = null;
1138
- return tmp.q9();
1136
+ tmp.n9_1 = Unit_instance;
1137
+ tmp.o9_1 = null;
1138
+ return tmp.t9();
1139
1139
  };
1140
- protoOf(WebCrypto).ioe = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
1140
+ protoOf(WebCrypto).mog = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
1141
1141
  var key = format === 'jwk' ? JSON.parse(decodeToString(keyData)) : keyData;
1142
- return await_0(this.rob_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
1142
+ return await_0(this.uod_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
1143
1143
  };
1144
1144
  var WebCrypto_instance;
1145
1145
  function WebCrypto_getInstance() {
@@ -1156,7 +1156,7 @@ function await_0(_this__u8e3s4, $completion) {
1156
1156
  var safe = SafeContinuation_init_$Create$(intercepted($completion));
1157
1157
  var tmp = await$lambda(safe);
1158
1158
  _this__u8e3s4.then(tmp, await$lambda_0(safe));
1159
- return safe.aa();
1159
+ return safe.da();
1160
1160
  }
1161
1161
  function await$lambda($continuation) {
1162
1162
  return function (it) {
@@ -1164,7 +1164,7 @@ function await$lambda($continuation) {
1164
1164
  var this_0 = $continuation;
1165
1165
  // Inline function 'kotlin.Companion.success' call
1166
1166
  var tmp$ret$0 = _Result___init__impl__xyqfz8(it);
1167
- this_0.t9(tmp$ret$0);
1167
+ this_0.w9(tmp$ret$0);
1168
1168
  return null;
1169
1169
  };
1170
1170
  }
@@ -1174,7 +1174,7 @@ function await$lambda_0($continuation) {
1174
1174
  var this_0 = $continuation;
1175
1175
  // Inline function 'kotlin.Companion.failure' call
1176
1176
  var tmp$ret$0 = _Result___init__impl__xyqfz8(createFailure(it));
1177
- this_0.t9(tmp$ret$0);
1177
+ this_0.w9(tmp$ret$0);
1178
1178
  return null;
1179
1179
  };
1180
1180
  }