@solibo/solibo-sdk 1.1.110 → 1.1.111

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. package/KmLogging-logging.mjs +112 -112
  2. package/KmLogging-logging.mjs.map +1 -1
  3. package/Kotlin-DateTime-library-kotlinx-datetime.mjs +1629 -1629
  4. package/Kotlin-DateTime-library-kotlinx-datetime.mjs.map +1 -1
  5. package/KotlinBigInteger-bignum.mjs +1381 -1381
  6. package/KotlinBigInteger-bignum.mjs.map +1 -1
  7. package/MultiplatformSettings-multiplatform-settings-test.mjs +22 -22
  8. package/MultiplatformSettings-multiplatform-settings-test.mjs.map +1 -1
  9. package/MultiplatformSettings-multiplatform-settings.mjs +18 -18
  10. package/Stately-stately-concurrency.mjs +5 -5
  11. package/cryptography-kotlin-cryptography-bigint.mjs +45 -45
  12. package/cryptography-kotlin-cryptography-bigint.mjs.map +1 -1
  13. package/cryptography-kotlin-cryptography-core.mjs +110 -108
  14. package/cryptography-kotlin-cryptography-core.mjs.map +1 -1
  15. package/cryptography-kotlin-cryptography-provider-base.mjs +15 -15
  16. package/cryptography-kotlin-cryptography-provider-webcrypto.mjs +208 -207
  17. package/cryptography-kotlin-cryptography-provider-webcrypto.mjs.map +1 -1
  18. package/cryptography-kotlin-cryptography-random.mjs +28 -28
  19. package/cryptography-kotlin-cryptography-random.mjs.map +1 -1
  20. package/cryptography-kotlin-cryptography-serialization-asn1-modules.mjs +228 -228
  21. package/cryptography-kotlin-cryptography-serialization-asn1-modules.mjs.map +1 -1
  22. package/cryptography-kotlin-cryptography-serialization-asn1.mjs +388 -390
  23. package/cryptography-kotlin-cryptography-serialization-asn1.mjs.map +1 -1
  24. package/cryptography-kotlin-cryptography-serialization-pem.mjs +29 -29
  25. package/cryptography-kotlin-cryptography-serialization-pem.mjs.map +1 -1
  26. package/kotlin-kotlin-stdlib.mjs +1540 -1724
  27. package/kotlin-kotlin-stdlib.mjs.map +1 -0
  28. package/kotlinx-atomicfu.mjs +13 -13
  29. package/kotlinx-atomicfu.mjs.map +1 -1
  30. package/kotlinx-coroutines-core.mjs +2482 -2464
  31. package/kotlinx-coroutines-core.mjs.map +1 -1
  32. package/kotlinx-io-kotlinx-io-bytestring.mjs +42 -42
  33. package/kotlinx-io-kotlinx-io-bytestring.mjs.map +1 -1
  34. package/kotlinx-io-kotlinx-io-core.mjs +629 -625
  35. package/kotlinx-io-kotlinx-io-core.mjs.map +1 -1
  36. package/kotlinx-serialization-kotlinx-serialization-core.mjs +1984 -1993
  37. package/kotlinx-serialization-kotlinx-serialization-core.mjs.map +1 -1
  38. package/kotlinx-serialization-kotlinx-serialization-json.mjs +1501 -1500
  39. package/kotlinx-serialization-kotlinx-serialization-json.mjs.map +1 -1
  40. package/ktor-ktor-client-auth.mjs +294 -293
  41. package/ktor-ktor-client-auth.mjs.map +1 -1
  42. package/ktor-ktor-client-content-negotiation.mjs +142 -142
  43. package/ktor-ktor-client-content-negotiation.mjs.map +1 -1
  44. package/ktor-ktor-client-core.mjs +3239 -3062
  45. package/ktor-ktor-client-core.mjs.map +1 -1
  46. package/ktor-ktor-client-logging.mjs +677 -685
  47. package/ktor-ktor-client-logging.mjs.map +1 -1
  48. package/ktor-ktor-client-mock.mjs +66 -66
  49. package/ktor-ktor-client-mock.mjs.map +1 -1
  50. package/ktor-ktor-events.mjs +8 -8
  51. package/ktor-ktor-events.mjs.map +1 -1
  52. package/ktor-ktor-http-cio.mjs +379 -379
  53. package/ktor-ktor-http-cio.mjs.map +1 -1
  54. package/ktor-ktor-http.mjs +1130 -1133
  55. package/ktor-ktor-http.mjs.map +1 -1
  56. package/ktor-ktor-io.mjs +670 -670
  57. package/ktor-ktor-io.mjs.map +1 -1
  58. package/ktor-ktor-serialization-kotlinx-json.mjs +9 -9
  59. package/ktor-ktor-serialization-kotlinx.mjs +147 -146
  60. package/ktor-ktor-serialization-kotlinx.mjs.map +1 -1
  61. package/ktor-ktor-serialization.mjs +64 -65
  62. package/ktor-ktor-serialization.mjs.map +1 -1
  63. package/ktor-ktor-utils.mjs +1598 -1032
  64. package/ktor-ktor-utils.mjs.map +1 -1
  65. package/ktor-ktor-websockets.mjs +430 -432
  66. package/ktor-ktor-websockets.mjs.map +1 -1
  67. package/package.json +1 -1
  68. package/solibo-sdk-sdk-home-api.mjs +49962 -49836
  69. package/solibo-sdk-sdk-home-api.mjs.map +1 -1
  70. package/solibo-sdk-sdk.d.mts +156 -153
  71. package/solibo-sdk-sdk.mjs +5014 -4995
  72. package/solibo-sdk-sdk.mjs.map +1 -1
@@ -1,54 +1,54 @@
1
1
  import {
2
2
  CryptographyProviderwgv0x40nzvjc as CryptographyProvider,
3
- Companion_getInstancebyslzqcunhpa as Companion_getInstance,
4
- Companion_getInstance27u04a1q2cj1l as Companion_getInstance_0,
5
- Companion_getInstance1b33mcojr5zhq as Companion_getInstance_1,
6
- Companion_getInstance3av3p4gc6a7jn as Companion_getInstance_2,
7
- Companion_getInstance3ark4b05maj30 as Companion_getInstance_3,
8
- Companion_getInstancei93icbc9wljv as Companion_getInstance_4,
9
- Companion_getInstance1xf5ipdr52o1p as Companion_getInstance_5,
10
- Companion_getInstance1x88e8a93nrjt as Companion_getInstance_6,
11
- Companion_getInstance29kae6fn9dtdp as Companion_getInstance_7,
12
- Companion_getInstance14mxn5i96muxk as Companion_getInstance_8,
13
- Companion_getInstance1ols9hsmvo0w0 as Companion_getInstance_9,
14
- SHA512_getInstance2nwy6uke6ngga as SHA512_getInstance,
15
- SHA384_getInstance3dym6gio4iqu3 as SHA384_getInstance,
16
- SHA256_getInstanceth9eotqeth9c as SHA256_getInstance,
17
- SHA1_getInstance3jravpw4war2y as SHA1_getInstance,
3
+ Companion_getInstance1cxo8h1vzex81 as Companion_getInstance,
4
+ Companion_getInstance2f1kstzejxw2x as Companion_getInstance_0,
5
+ Companion_getInstance3pr8w4ei0fhv3 as Companion_getInstance_1,
6
+ Companion_getInstance2wlpzrae2doj7 as Companion_getInstance_2,
7
+ Companion_getInstance2cw88nbawvd9v as Companion_getInstance_3,
8
+ Companion_getInstance2wnal83xzu0fl as Companion_getInstance_4,
9
+ Companion_getInstance2osa452643r99 as Companion_getInstance_5,
10
+ Companion_getInstance1o04fn6rh6zvb as Companion_getInstance_6,
11
+ Companion_getInstanceo43rur1xu5np as Companion_getInstance_7,
12
+ Companion_getInstanced6e3fczvqpj1 as Companion_getInstance_8,
13
+ Companion_getInstanceiih0uuzbcy0m as Companion_getInstance_9,
14
+ SHA512_getInstance17cfdxfm78pe3 as SHA512_getInstance,
15
+ SHA384_getInstance2hzdeyyr6gwyq as SHA384_getInstance,
16
+ SHA256_getInstance2tj74poar8hy9 as SHA256_getInstance,
17
+ SHA1_getInstancep0n71z58awl7 as SHA1_getInstance,
18
18
  CryptographyAlgorithmhhdrgo7p9qei as CryptographyAlgorithm,
19
19
  Format3dwngdi37q0un as Format,
20
20
  Hashera1nteuzom60c as Hasher,
21
- DER_getInstancetcz4fdgsag6y as DER_getInstance,
22
- PEM_getInstance2z3eojfgxggki as PEM_getInstance,
23
- Uncompressed_getInstance30v9709kpt3rd as Uncompressed_getInstance,
24
- Compressed_getInstance2bou73k6m6h1m as Compressed_getInstance,
25
- JWK_getInstance2g6m6ouqgdqfw as JWK_getInstance,
21
+ DER_getInstancemljyqyfv6dhp as DER_getInstance,
22
+ PEM_getInstance1b97tztv2fbqo as PEM_getInstance,
23
+ Uncompressed_getInstance34vz27g6ekgkp as Uncompressed_getInstance,
24
+ Compressed_getInstance3oc51dt5hnmlp as Compressed_getInstance,
25
+ JWK_getInstance349jixszdtsix as JWK_getInstance,
26
26
  Format1u440c2w9z1t5 as Format_0,
27
- RAW_getInstance1owkiklujln96 as RAW_getInstance,
28
- Generic_getInstance2fofokuhcjf0m as Generic_getInstance,
29
- Generic_getInstance2z3qu9f7wt665 as Generic_getInstance_0,
30
- SEC1_getInstance1h1itfa9pvqru as SEC1_getInstance,
31
- SEC1_getInstance19ihk9fm1tmnu as SEC1_getInstance_0,
32
- JWK_getInstance1yvqt4fvwl3gg as JWK_getInstance_0,
27
+ RAW_getInstance9609tih9b7i7 as RAW_getInstance,
28
+ Generic_getInstance3kcsixshz938n as Generic_getInstance,
29
+ Generic_getInstance1ms4b411z04f8 as Generic_getInstance_0,
30
+ SEC1_getInstancercl4xwqtkjwx as SEC1_getInstance,
31
+ SEC1_getInstance3h8fyqzbq0rb3 as SEC1_getInstance_0,
32
+ JWK_getInstance3h12c78ox7458 as JWK_getInstance_0,
33
33
  Format2r6rz6bygg1d5 as Format_1,
34
- Companion_instance2xzuy5itlbd7r as Companion_instance,
35
- _Curve___get_name__impl__klrusc2ntyd3phrcyut as _Curve___get_name__impl__klrusc,
34
+ Companion_instance1ehfax4sfgrtr as Companion_instance,
35
+ _Curve___get_name__impl__klrusc30c3bfi58sicg as _Curve___get_name__impl__klrusc,
36
36
  Format1jug7lc3rg0qd as Format_2,
37
- Generic_getInstanced4eii9e2nhqx as Generic_getInstance_1,
38
- Generic_getInstance1ub4kp2qez9cr as Generic_getInstance_2,
39
- PKCS1_getInstance22spptdubofqd as PKCS1_getInstance,
40
- PKCS1_getInstance5evnhy9k9oay as PKCS1_getInstance_0,
41
- JWK_getInstance2h7f972qw3rxx as JWK_getInstance_1,
37
+ Generic_getInstance1b47o0g82iueq as Generic_getInstance_1,
38
+ Generic_getInstance1jzesbx6362el as Generic_getInstance_2,
39
+ PKCS1_getInstance3g6bvwapkfo2j as PKCS1_getInstance,
40
+ PKCS1_getInstanceqguams8ef8jk as PKCS1_getInstance_0,
41
+ JWK_getInstance102qicexcrekz as JWK_getInstance_1,
42
42
  Format2v29dvc3oaj5k as Format_3,
43
- Generic_getInstanceuanw2vo9armh as Generic_getInstance_3,
44
- Generic_getInstance7jxucsv5q1mh as Generic_getInstance_4,
45
- PKCS1_getInstance868e3tfzube as PKCS1_getInstance_1,
46
- PKCS1_getInstance3a4r0yeoubefu as PKCS1_getInstance_2,
47
- JWK_getInstance1fp08shy8nryg as JWK_getInstance_2,
43
+ Generic_getInstance3cvf09iecawaj as Generic_getInstance_3,
44
+ Generic_getInstance2o29w13d9vvhh as Generic_getInstance_4,
45
+ PKCS1_getInstance20h2peea51keb as PKCS1_getInstance_1,
46
+ PKCS1_getInstance1dlzix2wmoe07 as PKCS1_getInstance_2,
47
+ JWK_getInstance1mvyhlfrr5lq5 as JWK_getInstance_2,
48
48
  Format1i0i1l8xjk06m as Format_4,
49
49
  KeyDecoder1aj9ibfkm03tn as KeyDecoder,
50
50
  SignatureGenerator3tx2fdhty5h2c as SignatureGenerator,
51
- CryptographySystem_getInstance1v1h7y5ver0lp as CryptographySystem_getInstance,
51
+ CryptographySystem_getInstance31dacmuk88jna as CryptographySystem_getInstance,
52
52
  } from './cryptography-kotlin-cryptography-core.mjs';
53
53
  import {
54
54
  equals2au1ep9vhcato as equals,
@@ -62,20 +62,20 @@ import {
62
62
  noWhenBranchMatchedException2a6r7ubxgky5j as noWhenBranchMatchedException,
63
63
  initMetadataForCompanion1wyw17z38v6ac as initMetadataForCompanion,
64
64
  toString1pkumu07cwy4m as toString,
65
- IllegalStateException_init_$Create$2429fvs1h56dm as IllegalStateException_init_$Create$,
65
+ IllegalStateException_init_$Create$1h4bcfod21ri0 as IllegalStateException_init_$Create$,
66
66
  CoroutineImpl2sn3kjnwmfr10 as CoroutineImpl,
67
67
  get_COROUTINE_SUSPENDED3ujt3p13qm4iy as get_COROUTINE_SUSPENDED,
68
68
  initMetadataForCoroutine1i7lbatuf5bnt as initMetadataForCoroutine,
69
- Unit_instance28fytmsmm6r23 as Unit_instance,
70
- IllegalArgumentException_init_$Create$1j1aj36nbo0wg as IllegalArgumentException_init_$Create$,
69
+ Unit_instancev9v8hjid95df as Unit_instance,
70
+ IllegalArgumentException_init_$Create$i4126l9nkbuo as IllegalArgumentException_init_$Create$,
71
71
  decodeToString1x4faah2liw2p as decodeToString,
72
72
  intercepted2ogpsikxxj4u0 as intercepted,
73
- SafeContinuation_init_$Create$1psyp4r0sb3mp as SafeContinuation_init_$Create$,
74
- Companion_instance25ullnynvxd0w as Companion_instance_0,
75
- _Result___init__impl__xyqfz83a5421h46yeyh as _Result___init__impl__xyqfz8,
73
+ SafeContinuation_init_$Create$rm3s1127i79n as SafeContinuation_init_$Create$,
74
+ Companion_instance1xjg859pd52fi as Companion_instance_0,
75
+ _Result___init__impl__xyqfz823vatsdepqb9n as _Result___init__impl__xyqfz8,
76
76
  createFailure8paxfkfa5dc7 as createFailure,
77
77
  } from './kotlin-kotlin-stdlib.mjs';
78
- import { Companion_getInstance3pdkh2psd8hnn as Companion_getInstance_10 } from './cryptography-kotlin-cryptography-serialization-pem.mjs';
78
+ import { Companion_getInstance16d0hyg62ver5 as Companion_getInstance_10 } from './cryptography-kotlin-cryptography-serialization-pem.mjs';
79
79
  import {
80
80
  unwrapPem161z0z59ia531 as unwrapPem,
81
81
  convertEcPrivateKeyFromSec1ToPkcs81ruidkpvnvcm1 as convertEcPrivateKeyFromSec1ToPkcs8,
@@ -83,18 +83,18 @@ import {
83
83
  wrapSubjectPublicKeyInfo1w2wxg0b5ey1b as wrapSubjectPublicKeyInfo,
84
84
  } from './cryptography-kotlin-cryptography-provider-base.mjs';
85
85
  import {
86
- Companion_instance3nsfjzff13l9z as Companion_instance_1,
87
- Default_getInstance3bn6zrp4tkdoy as Default_getInstance,
86
+ Companion_instance9m9gj3vs5va4 as Companion_instance_1,
87
+ Default_getInstance2lfduf5pvubju as Default_getInstance,
88
88
  } from './cryptography-kotlin-cryptography-serialization-asn1.mjs';
89
89
  import {
90
90
  get_secp521r13hkek2jcv829c as get_secp521r1,
91
91
  get_secp384r13mvgyp383nadu as get_secp384r1,
92
92
  get_secp256r12zskpql6xanyk as get_secp256r1,
93
- _EcParameters___init__impl__i4ww9zuq3d437583rt as _EcParameters___init__impl__i4ww9z,
93
+ _EcParameters___init__impl__i4ww9zm37r760ei2sv as _EcParameters___init__impl__i4ww9z,
94
94
  EcKeyAlgorithmIdentifierwk35bb676c3o as EcKeyAlgorithmIdentifier,
95
- Companion_instancee26uvkz58yu2 as Companion_instance_2,
95
+ Companion_instance1k2bfcu0t72fc as Companion_instance_2,
96
96
  EcPrivateKey2terz948ch7xt as EcPrivateKey,
97
- RsaKeyAlgorithmIdentifier_instance1snja7vvnuucb as RsaKeyAlgorithmIdentifier_instance,
97
+ RsaKeyAlgorithmIdentifier_instance3s60qxz6bz8xk as RsaKeyAlgorithmIdentifier_instance,
98
98
  } from './cryptography-kotlin-cryptography-serialization-asn1-modules.mjs';
99
99
  //region block: imports
100
100
  //endregion
@@ -106,11 +106,11 @@ initMetadataForClass(WebCryptoAes, 'WebCryptoAes', VOID, VOID, [CryptographyAlgo
106
106
  initMetadataForClass(WebCryptoKeyProcessor, 'WebCryptoKeyProcessor');
107
107
  initMetadataForObject(AesKeyProcessor, 'AesKeyProcessor', VOID, WebCryptoKeyProcessor);
108
108
  initMetadataForClass(AesCbcKey, 'AesCbcKey', VOID, AesKey, VOID, [1]);
109
- initMetadataForObject(WebCryptoAesCbc, 'WebCryptoAesCbc', VOID, WebCryptoAes, [WebCryptoAes, CryptographyAlgorithm]);
109
+ initMetadataForObject(WebCryptoAesCbc, 'WebCryptoAesCbc', VOID, WebCryptoAes, [CryptographyAlgorithm]);
110
110
  initMetadataForClass(AesCtrKey, 'AesCtrKey', VOID, AesKey, VOID, [1]);
111
- initMetadataForObject(WebCryptoAesCtr, 'WebCryptoAesCtr', VOID, WebCryptoAes, [WebCryptoAes, CryptographyAlgorithm]);
111
+ initMetadataForObject(WebCryptoAesCtr, 'WebCryptoAesCtr', VOID, WebCryptoAes, [CryptographyAlgorithm]);
112
112
  initMetadataForClass(AesGcmKey, 'AesGcmKey', VOID, AesKey, VOID, [1]);
113
- initMetadataForObject(WebCryptoAesGcm, 'WebCryptoAesGcm', VOID, WebCryptoAes, [WebCryptoAes, CryptographyAlgorithm]);
113
+ initMetadataForObject(WebCryptoAesGcm, 'WebCryptoAesGcm', VOID, WebCryptoAes, [CryptographyAlgorithm]);
114
114
  initMetadataForCompanion(Companion);
115
115
  initMetadataForClass(WebCryptoDigest, 'WebCryptoDigest', VOID, VOID, [CryptographyAlgorithm, Hasher], [1]);
116
116
  initMetadataForClass(EcPublicKey, 'EcPublicKey', VOID, WebCryptoEncodableKey, VOID, [1]);
@@ -121,11 +121,11 @@ initMetadataForObject(EcPrivateKeyProcessor, 'EcPrivateKeyProcessor', VOID, WebC
121
121
  initMetadataForClass(EcdhKeyPair, 'EcdhKeyPair');
122
122
  initMetadataForClass(EcdhPublicKey, 'EcdhPublicKey', VOID, EcPublicKey, VOID, [1]);
123
123
  initMetadataForClass(EcdhPrivateKey, 'EcdhPrivateKey', VOID, EcPrivateKey_0, VOID, [1]);
124
- initMetadataForObject(WebCryptoEcdh, 'WebCryptoEcdh', VOID, WebCryptoEc, [WebCryptoEc, CryptographyAlgorithm]);
124
+ initMetadataForObject(WebCryptoEcdh, 'WebCryptoEcdh', VOID, WebCryptoEc, [CryptographyAlgorithm]);
125
125
  initMetadataForClass(EcdsaKeyPair, 'EcdsaKeyPair');
126
126
  initMetadataForClass(EcdsaPublicKey, 'EcdsaPublicKey', VOID, EcPublicKey, VOID, [1]);
127
127
  initMetadataForClass(EcdsaPrivateKey, 'EcdsaPrivateKey', VOID, EcPrivateKey_0, VOID, [1]);
128
- initMetadataForObject(WebCryptoEcdsa, 'WebCryptoEcdsa', VOID, WebCryptoEc, [WebCryptoEc, CryptographyAlgorithm]);
128
+ initMetadataForObject(WebCryptoEcdsa, 'WebCryptoEcdsa', VOID, WebCryptoEc, [CryptographyAlgorithm]);
129
129
  initMetadataForObject(WebCryptoHkdf, 'WebCryptoHkdf', VOID, VOID, [CryptographyAlgorithm]);
130
130
  initMetadataForClass(HmacKey, 'HmacKey', VOID, WebCryptoEncodableKey, VOID, [1]);
131
131
  initMetadataForObject(WebCryptoHmac, 'WebCryptoHmac', VOID, VOID, [CryptographyAlgorithm]);
@@ -139,15 +139,15 @@ initMetadataForObject(RsaPrivateKeyProcessor, 'RsaPrivateKeyProcessor', VOID, We
139
139
  initMetadataForClass(RsaOaepKeyPair, 'RsaOaepKeyPair');
140
140
  initMetadataForClass(RsaOaepPublicKey, 'RsaOaepPublicKey', VOID, RsaPublicKey, VOID, [1]);
141
141
  initMetadataForClass(RsaOaepPrivateKey, 'RsaOaepPrivateKey', VOID, RsaPrivateKey, VOID, [1]);
142
- initMetadataForObject(WebCryptoRsaOaep, 'WebCryptoRsaOaep', VOID, WebCryptoRsa, [WebCryptoRsa, CryptographyAlgorithm]);
142
+ initMetadataForObject(WebCryptoRsaOaep, 'WebCryptoRsaOaep', VOID, WebCryptoRsa, [CryptographyAlgorithm]);
143
143
  initMetadataForClass(RsaPkcs1KeyPair, 'RsaPkcs1KeyPair');
144
144
  initMetadataForClass(RsaPkcs1PublicKey, 'RsaPkcs1PublicKey', VOID, RsaPublicKey, VOID, [1]);
145
145
  initMetadataForClass(RsaPkcs1PrivateKey, 'RsaPkcs1PrivateKey', VOID, RsaPrivateKey, VOID, [1]);
146
- initMetadataForObject(WebCryptoRsaPkcs1, 'WebCryptoRsaPkcs1', VOID, WebCryptoRsa, [WebCryptoRsa, CryptographyAlgorithm]);
146
+ initMetadataForObject(WebCryptoRsaPkcs1, 'WebCryptoRsaPkcs1', VOID, WebCryptoRsa, [CryptographyAlgorithm]);
147
147
  initMetadataForClass(RsaPssKeyPair, 'RsaPssKeyPair');
148
148
  initMetadataForClass(RsaPssPublicKey, 'RsaPssPublicKey', VOID, RsaPublicKey, VOID, [1]);
149
149
  initMetadataForClass(RsaPssPrivateKey, 'RsaPssPrivateKey', VOID, RsaPrivateKey, VOID, [1]);
150
- initMetadataForObject(WebCryptoRsaPss, 'WebCryptoRsaPss', VOID, WebCryptoRsa, [WebCryptoRsa, CryptographyAlgorithm]);
150
+ initMetadataForObject(WebCryptoRsaPss, 'WebCryptoRsaPss', VOID, WebCryptoRsa, [CryptographyAlgorithm]);
151
151
  initMetadataForCoroutine($decodeFromByteArrayCOROUTINE$, CoroutineImpl);
152
152
  initMetadataForClass(WebCryptoKeyDecoder, 'WebCryptoKeyDecoder', VOID, VOID, [KeyDecoder], [2]);
153
153
  initMetadataForClass(WebCryptoKeyWrapper, 'WebCryptoKeyWrapper');
@@ -166,8 +166,8 @@ function WebCryptoCryptographyProvider() {
166
166
  WebCryptoCryptographyProvider_instance = this;
167
167
  CryptographyProvider.call(this);
168
168
  }
169
- protoOf(WebCryptoCryptographyProvider).zpl = function (identifier) {
170
- var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().rpq_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().spq_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().tpq_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().upq_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
169
+ protoOf(WebCryptoCryptographyProvider).ppn = function (identifier) {
170
+ var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().hps_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().ips_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().jps_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().kps_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
171
171
  return (tmp == null ? true : isInterface(tmp, CryptographyAlgorithm)) ? tmp : THROW_CCE();
172
172
  };
173
173
  var WebCryptoCryptographyProvider_instance;
@@ -190,17 +190,17 @@ function _init_properties_WebCryptoCryptographyProvider_kt__i22tls() {
190
190
  }
191
191
  function AesKey(key) {
192
192
  WebCryptoEncodableKey.call(this, key, AesKeyProcessor_getInstance());
193
- this.xpq_1 = key;
193
+ this.nps_1 = key;
194
194
  }
195
195
  function WebCryptoAes(algorithmName, keyWrapper) {
196
- this.ypq_1 = algorithmName;
197
- this.zpq_1 = keyWrapper;
196
+ this.ops_1 = algorithmName;
197
+ this.pps_1 = keyWrapper;
198
198
  }
199
199
  function AesKeyProcessor() {
200
200
  AesKeyProcessor_instance = this;
201
201
  WebCryptoKeyProcessor.call(this);
202
202
  }
203
- protoOf(AesKeyProcessor).apr = function (format) {
203
+ protoOf(AesKeyProcessor).qps = function (format) {
204
204
  var tmp;
205
205
  switch (format.a1_1) {
206
206
  case 0:
@@ -215,14 +215,14 @@ protoOf(AesKeyProcessor).apr = function (format) {
215
215
  }
216
216
  return tmp;
217
217
  };
218
- protoOf(AesKeyProcessor).bpr = function (format) {
219
- return this.apr(format instanceof Format ? format : THROW_CCE());
218
+ protoOf(AesKeyProcessor).rps = function (format) {
219
+ return this.qps(format instanceof Format ? format : THROW_CCE());
220
220
  };
221
- protoOf(AesKeyProcessor).cpr = function (algorithm, format, key) {
221
+ protoOf(AesKeyProcessor).sps = function (algorithm, format, key) {
222
222
  return key;
223
223
  };
224
- protoOf(AesKeyProcessor).dpr = function (algorithm, format, key) {
225
- return this.cpr(algorithm, format instanceof Format ? format : THROW_CCE(), key);
224
+ protoOf(AesKeyProcessor).tps = function (algorithm, format, key) {
225
+ return this.sps(algorithm, format instanceof Format ? format : THROW_CCE(), key);
226
226
  };
227
227
  var AesKeyProcessor_instance;
228
228
  function AesKeyProcessor_getInstance() {
@@ -304,10 +304,10 @@ function WebCryptoAesGcm_getInstance() {
304
304
  }
305
305
  function Companion() {
306
306
  Companion_instance_3 = this;
307
- this.rpq_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
308
- this.spq_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
309
- this.tpq_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
310
- this.upq_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
307
+ this.hps_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
308
+ this.ips_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
309
+ this.jps_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
310
+ this.kps_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
311
311
  }
312
312
  var Companion_instance_3;
313
313
  function Companion_getInstance_11() {
@@ -317,52 +317,52 @@ function Companion_getInstance_11() {
317
317
  }
318
318
  function WebCryptoDigest(algorithm, id) {
319
319
  Companion_getInstance_11();
320
- this.epr_1 = algorithm;
321
- this.fpr_1 = id;
320
+ this.ups_1 = algorithm;
321
+ this.vps_1 = id;
322
322
  }
323
- protoOf(WebCryptoDigest).gpr = function () {
323
+ protoOf(WebCryptoDigest).wps = function () {
324
324
  return this;
325
325
  };
326
- protoOf(WebCryptoDigest).qpm = function (data, $completion) {
327
- return WebCrypto_getInstance().ipr(this.epr_1, data, $completion);
326
+ protoOf(WebCryptoDigest).gpo = function (data, $completion) {
327
+ return WebCrypto_getInstance().yps(this.ups_1, data, $completion);
328
328
  };
329
- protoOf(WebCryptoDigest).ppm = function () {
329
+ protoOf(WebCryptoDigest).fpo = function () {
330
330
  nonBlocking();
331
331
  };
332
- protoOf(WebCryptoDigest).rpm = function (data) {
332
+ protoOf(WebCryptoDigest).hpo = function (data) {
333
333
  nonBlocking();
334
334
  };
335
335
  function EcPublicKey(publicKey) {
336
336
  WebCryptoEncodableKey.call(this, publicKey, EcPublicKeyProcessor_getInstance());
337
- this.lpr_1 = publicKey;
337
+ this.bpt_1 = publicKey;
338
338
  }
339
339
  function EcPrivateKey_0(privateKey) {
340
340
  WebCryptoEncodableKey.call(this, privateKey, EcPrivateKeyProcessor_getInstance());
341
- this.opr_1 = privateKey;
341
+ this.ept_1 = privateKey;
342
342
  }
343
343
  function WebCryptoEc$keyPairWrapper$lambda($keyPairWrapper, this$0) {
344
344
  return function (it) {
345
- return $keyPairWrapper(this$0.spr_1.qpr_1(it.publicKey), this$0.tpr_1.qpr_1(it.privateKey));
345
+ return $keyPairWrapper(this$0.ipt_1.gpt_1(it.publicKey), this$0.jpt_1.gpt_1(it.privateKey));
346
346
  };
347
347
  }
348
348
  function WebCryptoEc(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
349
- this.rpr_1 = algorithmName;
350
- this.spr_1 = publicKeyWrapper;
351
- this.tpr_1 = privateKeyWrapper;
349
+ this.hpt_1 = algorithmName;
350
+ this.ipt_1 = publicKeyWrapper;
351
+ this.jpt_1 = privateKeyWrapper;
352
352
  var tmp = this;
353
- var tmp0 = this.spr_1.ppr_1;
353
+ var tmp0 = this.ipt_1.fpt_1;
354
354
  // Inline function 'kotlin.collections.plus' call
355
- var elements = this.tpr_1.ppr_1;
355
+ var elements = this.jpt_1.fpt_1;
356
356
  // Inline function 'kotlin.js.asDynamic' call
357
- tmp.upr_1 = tmp0.concat(elements);
357
+ tmp.kpt_1 = tmp0.concat(elements);
358
358
  var tmp_0 = this;
359
- tmp_0.vpr_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
359
+ tmp_0.lpt_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
360
360
  }
361
361
  function EcPublicKeyProcessor() {
362
362
  EcPublicKeyProcessor_instance = this;
363
363
  WebCryptoKeyProcessor.call(this);
364
364
  }
365
- protoOf(EcPublicKeyProcessor).wpr = function (format) {
365
+ protoOf(EcPublicKeyProcessor).mpt = function (format) {
366
366
  var tmp;
367
367
  if (equals(format, JWK_getInstance())) {
368
368
  tmp = 'jwk';
@@ -375,10 +375,10 @@ protoOf(EcPublicKeyProcessor).wpr = function (format) {
375
375
  }
376
376
  return tmp;
377
377
  };
378
- protoOf(EcPublicKeyProcessor).bpr = function (format) {
379
- return this.wpr(format instanceof Format_0 ? format : THROW_CCE());
378
+ protoOf(EcPublicKeyProcessor).rps = function (format) {
379
+ return this.mpt(format instanceof Format_0 ? format : THROW_CCE());
380
380
  };
381
- protoOf(EcPublicKeyProcessor).xpr = function (algorithm, format, key) {
381
+ protoOf(EcPublicKeyProcessor).npt = function (algorithm, format, key) {
382
382
  var tmp;
383
383
  if (equals(format, JWK_getInstance())) {
384
384
  tmp = key;
@@ -387,14 +387,14 @@ protoOf(EcPublicKeyProcessor).xpr = function (algorithm, format, key) {
387
387
  } else if (equals(format, DER_getInstance())) {
388
388
  tmp = key;
389
389
  } else if (equals(format, PEM_getInstance())) {
390
- tmp = unwrapPem(Companion_getInstance_10().mpq_1, key);
390
+ tmp = unwrapPem(Companion_getInstance_10().cps_1, key);
391
391
  } else {
392
392
  noWhenBranchMatchedException();
393
393
  }
394
394
  return tmp;
395
395
  };
396
- protoOf(EcPublicKeyProcessor).dpr = function (algorithm, format, key) {
397
- return this.xpr(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
396
+ protoOf(EcPublicKeyProcessor).tps = function (algorithm, format, key) {
397
+ return this.npt(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
398
398
  };
399
399
  var EcPublicKeyProcessor_instance;
400
400
  function EcPublicKeyProcessor_getInstance() {
@@ -406,7 +406,7 @@ function EcPrivateKeyProcessor() {
406
406
  EcPrivateKeyProcessor_instance = this;
407
407
  WebCryptoKeyProcessor.call(this);
408
408
  }
409
- protoOf(EcPrivateKeyProcessor).ypr = function (format) {
409
+ protoOf(EcPrivateKeyProcessor).opt = function (format) {
410
410
  var tmp;
411
411
  if (equals(format, JWK_getInstance_0())) {
412
412
  tmp = 'jwk';
@@ -417,43 +417,44 @@ protoOf(EcPrivateKeyProcessor).ypr = function (format) {
417
417
  }
418
418
  return tmp;
419
419
  };
420
- protoOf(EcPrivateKeyProcessor).bpr = function (format) {
421
- return this.ypr(format instanceof Format_1 ? format : THROW_CCE());
420
+ protoOf(EcPrivateKeyProcessor).rps = function (format) {
421
+ return this.opt(format instanceof Format_1 ? format : THROW_CCE());
422
422
  };
423
- protoOf(EcPrivateKeyProcessor).zpr = function (algorithm, format, key) {
423
+ protoOf(EcPrivateKeyProcessor).ppt = function (algorithm, format, key) {
424
424
  var tmp;
425
425
  if (equals(format, JWK_getInstance_0())) {
426
426
  tmp = key;
427
427
  } else if (equals(format, RAW_getInstance())) {
428
428
  var namedCurve = get_ecKeyAlgorithmNamedCurve(algorithm);
429
429
  var tmp_0;
430
- if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.kpm())) {
430
+ if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.apo())) {
431
431
  tmp_0 = get_secp256r1(Companion_instance_1);
432
- } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.lpm())) {
432
+ } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.bpo())) {
433
433
  tmp_0 = get_secp384r1(Companion_instance_1);
434
- } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.mpm())) {
434
+ } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.cpo())) {
435
435
  tmp_0 = get_secp521r1(Companion_instance_1);
436
436
  } else {
437
+ // Inline function 'kotlin.error' call
437
438
  var message = 'Unknown curve: ' + namedCurve;
438
439
  throw IllegalStateException_init_$Create$(toString(message));
439
440
  }
440
441
  var curveId = tmp_0;
441
- tmp = wrapPrivateKeyInfo(0, new EcKeyAlgorithmIdentifier(_EcParameters___init__impl__i4ww9z(curveId)), Default_getInstance().ku(Companion_instance_2.b1h(), new EcPrivateKey(1, key)));
442
+ tmp = wrapPrivateKeyInfo(0, new EcKeyAlgorithmIdentifier(_EcParameters___init__impl__i4ww9z(curveId)), Default_getInstance().gu(Companion_instance_2.x1g(), new EcPrivateKey(1, key)));
442
443
  } else if (equals(format, Generic_getInstance())) {
443
444
  tmp = key;
444
445
  } else if (equals(format, Generic_getInstance_0())) {
445
- tmp = unwrapPem(Companion_getInstance_10().npq_1, key);
446
+ tmp = unwrapPem(Companion_getInstance_10().dps_1, key);
446
447
  } else if (equals(format, SEC1_getInstance())) {
447
448
  tmp = convertEcPrivateKeyFromSec1ToPkcs8(key);
448
449
  } else if (equals(format, SEC1_getInstance_0())) {
449
- tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().qpq_1, key));
450
+ tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().gps_1, key));
450
451
  } else {
451
452
  noWhenBranchMatchedException();
452
453
  }
453
454
  return tmp;
454
455
  };
455
- protoOf(EcPrivateKeyProcessor).dpr = function (algorithm, format, key) {
456
- return this.zpr(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
456
+ protoOf(EcPrivateKeyProcessor).tps = function (algorithm, format, key) {
457
+ return this.ppt(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
457
458
  };
458
459
  var EcPrivateKeyProcessor_instance;
459
460
  function EcPrivateKeyProcessor_getInstance() {
@@ -462,8 +463,8 @@ function EcPrivateKeyProcessor_getInstance() {
462
463
  return EcPrivateKeyProcessor_instance;
463
464
  }
464
465
  function EcdhKeyPair(publicKey, privateKey) {
465
- this.aps_1 = publicKey;
466
- this.bps_1 = privateKey;
466
+ this.qpt_1 = publicKey;
467
+ this.rpt_1 = privateKey;
467
468
  }
468
469
  function EcdhPublicKey(publicKey) {
469
470
  EcPublicKey.call(this, publicKey);
@@ -513,8 +514,8 @@ function WebCryptoEcdh_getInstance() {
513
514
  return WebCryptoEcdh_instance;
514
515
  }
515
516
  function EcdsaKeyPair(publicKey, privateKey) {
516
- this.cps_1 = publicKey;
517
- this.dps_1 = privateKey;
517
+ this.spt_1 = publicKey;
518
+ this.tpt_1 = privateKey;
518
519
  }
519
520
  function EcdsaPublicKey(publicKey) {
520
521
  EcPublicKey.call(this, publicKey);
@@ -571,10 +572,10 @@ function WebCryptoHkdf_getInstance() {
571
572
  }
572
573
  function HmacKey(key) {
573
574
  WebCryptoEncodableKey.call(this, key, HmacKeyProcessor_getInstance());
574
- this.gps_1 = key;
575
+ this.wpt_1 = key;
575
576
  }
576
- protoOf(HmacKey).hps = function () {
577
- return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.gps_1);
577
+ protoOf(HmacKey).xpt = function () {
578
+ return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.wpt_1);
578
579
  };
579
580
  function WebCryptoHmac$HmacKey$_init_$ref_enwl2t() {
580
581
  var l = function (p0) {
@@ -590,10 +591,10 @@ function WebCryptoHmac() {
590
591
  // Inline function 'kotlin.js.unsafeCast' call
591
592
  // Inline function 'kotlin.js.asDynamic' call
592
593
  var tmp_0 = ['sign', 'verify'];
593
- tmp.ips_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
594
+ tmp.ypt_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
594
595
  }
595
- protoOf(WebCryptoHmac).jps = function (digest) {
596
- return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.ips_1);
596
+ protoOf(WebCryptoHmac).zpt = function (digest) {
597
+ return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.ypt_1);
597
598
  };
598
599
  var WebCryptoHmac_instance;
599
600
  function WebCryptoHmac_getInstance() {
@@ -605,7 +606,7 @@ function HmacKeyProcessor() {
605
606
  HmacKeyProcessor_instance = this;
606
607
  WebCryptoKeyProcessor.call(this);
607
608
  }
608
- protoOf(HmacKeyProcessor).kps = function (format) {
609
+ protoOf(HmacKeyProcessor).apu = function (format) {
609
610
  var tmp;
610
611
  switch (format.a1_1) {
611
612
  case 0:
@@ -620,14 +621,14 @@ protoOf(HmacKeyProcessor).kps = function (format) {
620
621
  }
621
622
  return tmp;
622
623
  };
623
- protoOf(HmacKeyProcessor).bpr = function (format) {
624
- return this.kps(format instanceof Format_2 ? format : THROW_CCE());
624
+ protoOf(HmacKeyProcessor).rps = function (format) {
625
+ return this.apu(format instanceof Format_2 ? format : THROW_CCE());
625
626
  };
626
- protoOf(HmacKeyProcessor).lps = function (algorithm, format, key) {
627
+ protoOf(HmacKeyProcessor).bpu = function (algorithm, format, key) {
627
628
  return key;
628
629
  };
629
- protoOf(HmacKeyProcessor).dpr = function (algorithm, format, key) {
630
- return this.lps(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
630
+ protoOf(HmacKeyProcessor).tps = function (algorithm, format, key) {
631
+ return this.bpu(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
631
632
  };
632
633
  var HmacKeyProcessor_instance;
633
634
  function HmacKeyProcessor_getInstance() {
@@ -643,35 +644,35 @@ function WebCryptoPbkdf2_getInstance() {
643
644
  }
644
645
  function RsaPublicKey(publicKey) {
645
646
  WebCryptoEncodableKey.call(this, publicKey, RsaPublicKeyProcessor_getInstance());
646
- this.ops_1 = publicKey;
647
+ this.epu_1 = publicKey;
647
648
  }
648
649
  function RsaPrivateKey(privateKey) {
649
650
  WebCryptoEncodableKey.call(this, privateKey, RsaPrivateKeyProcessor_getInstance());
650
- this.rps_1 = privateKey;
651
+ this.hpu_1 = privateKey;
651
652
  }
652
653
  function WebCryptoRsa$keyPairWrapper$lambda($keyPairWrapper, this$0) {
653
654
  return function (it) {
654
- return $keyPairWrapper(this$0.tps_1.qpr_1(it.publicKey), this$0.ups_1.qpr_1(it.privateKey));
655
+ return $keyPairWrapper(this$0.jpu_1.gpt_1(it.publicKey), this$0.kpu_1.gpt_1(it.privateKey));
655
656
  };
656
657
  }
657
658
  function WebCryptoRsa(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
658
- this.sps_1 = algorithmName;
659
- this.tps_1 = publicKeyWrapper;
660
- this.ups_1 = privateKeyWrapper;
659
+ this.ipu_1 = algorithmName;
660
+ this.jpu_1 = publicKeyWrapper;
661
+ this.kpu_1 = privateKeyWrapper;
661
662
  var tmp = this;
662
- var tmp0 = this.tps_1.ppr_1;
663
+ var tmp0 = this.jpu_1.fpt_1;
663
664
  // Inline function 'kotlin.collections.plus' call
664
- var elements = this.ups_1.ppr_1;
665
+ var elements = this.kpu_1.fpt_1;
665
666
  // Inline function 'kotlin.js.asDynamic' call
666
- tmp.vps_1 = tmp0.concat(elements);
667
+ tmp.lpu_1 = tmp0.concat(elements);
667
668
  var tmp_0 = this;
668
- tmp_0.wps_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
669
+ tmp_0.mpu_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
669
670
  }
670
671
  function RsaPublicKeyProcessor() {
671
672
  RsaPublicKeyProcessor_instance = this;
672
673
  WebCryptoKeyProcessor.call(this);
673
674
  }
674
- protoOf(RsaPublicKeyProcessor).xps = function (format) {
675
+ protoOf(RsaPublicKeyProcessor).npu = function (format) {
675
676
  var tmp;
676
677
  if (equals(format, JWK_getInstance_1())) {
677
678
  tmp = 'jwk';
@@ -682,28 +683,28 @@ protoOf(RsaPublicKeyProcessor).xps = function (format) {
682
683
  }
683
684
  return tmp;
684
685
  };
685
- protoOf(RsaPublicKeyProcessor).bpr = function (format) {
686
- return this.xps(format instanceof Format_3 ? format : THROW_CCE());
686
+ protoOf(RsaPublicKeyProcessor).rps = function (format) {
687
+ return this.npu(format instanceof Format_3 ? format : THROW_CCE());
687
688
  };
688
- protoOf(RsaPublicKeyProcessor).yps = function (algorithm, format, key) {
689
+ protoOf(RsaPublicKeyProcessor).opu = function (algorithm, format, key) {
689
690
  var tmp;
690
691
  if (equals(format, JWK_getInstance_1())) {
691
692
  tmp = key;
692
693
  } else if (equals(format, Generic_getInstance_1())) {
693
694
  tmp = key;
694
695
  } else if (equals(format, Generic_getInstance_2())) {
695
- tmp = unwrapPem(Companion_getInstance_10().mpq_1, key);
696
+ tmp = unwrapPem(Companion_getInstance_10().cps_1, key);
696
697
  } else if (equals(format, PKCS1_getInstance())) {
697
698
  tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, key);
698
699
  } else if (equals(format, PKCS1_getInstance_0())) {
699
- tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().opq_1, key));
700
+ tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().eps_1, key));
700
701
  } else {
701
702
  noWhenBranchMatchedException();
702
703
  }
703
704
  return tmp;
704
705
  };
705
- protoOf(RsaPublicKeyProcessor).dpr = function (algorithm, format, key) {
706
- return this.yps(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
706
+ protoOf(RsaPublicKeyProcessor).tps = function (algorithm, format, key) {
707
+ return this.opu(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
707
708
  };
708
709
  var RsaPublicKeyProcessor_instance;
709
710
  function RsaPublicKeyProcessor_getInstance() {
@@ -715,7 +716,7 @@ function RsaPrivateKeyProcessor() {
715
716
  RsaPrivateKeyProcessor_instance = this;
716
717
  WebCryptoKeyProcessor.call(this);
717
718
  }
718
- protoOf(RsaPrivateKeyProcessor).zps = function (format) {
719
+ protoOf(RsaPrivateKeyProcessor).ppu = function (format) {
719
720
  var tmp;
720
721
  if (equals(format, JWK_getInstance_2())) {
721
722
  tmp = 'jwk';
@@ -726,28 +727,28 @@ protoOf(RsaPrivateKeyProcessor).zps = function (format) {
726
727
  }
727
728
  return tmp;
728
729
  };
729
- protoOf(RsaPrivateKeyProcessor).bpr = function (format) {
730
- return this.zps(format instanceof Format_4 ? format : THROW_CCE());
730
+ protoOf(RsaPrivateKeyProcessor).rps = function (format) {
731
+ return this.ppu(format instanceof Format_4 ? format : THROW_CCE());
731
732
  };
732
- protoOf(RsaPrivateKeyProcessor).apt = function (algorithm, format, key) {
733
+ protoOf(RsaPrivateKeyProcessor).qpu = function (algorithm, format, key) {
733
734
  var tmp;
734
735
  if (equals(format, JWK_getInstance_2())) {
735
736
  tmp = key;
736
737
  } else if (equals(format, Generic_getInstance_3())) {
737
738
  tmp = key;
738
739
  } else if (equals(format, Generic_getInstance_4())) {
739
- tmp = unwrapPem(Companion_getInstance_10().npq_1, key);
740
+ tmp = unwrapPem(Companion_getInstance_10().dps_1, key);
740
741
  } else if (equals(format, PKCS1_getInstance_1())) {
741
742
  tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, key);
742
743
  } else if (equals(format, PKCS1_getInstance_2())) {
743
- tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().ppq_1, key));
744
+ tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().fps_1, key));
744
745
  } else {
745
746
  noWhenBranchMatchedException();
746
747
  }
747
748
  return tmp;
748
749
  };
749
- protoOf(RsaPrivateKeyProcessor).dpr = function (algorithm, format, key) {
750
- return this.apt(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
750
+ protoOf(RsaPrivateKeyProcessor).tps = function (algorithm, format, key) {
751
+ return this.qpu(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
751
752
  };
752
753
  var RsaPrivateKeyProcessor_instance;
753
754
  function RsaPrivateKeyProcessor_getInstance() {
@@ -756,8 +757,8 @@ function RsaPrivateKeyProcessor_getInstance() {
756
757
  return RsaPrivateKeyProcessor_instance;
757
758
  }
758
759
  function RsaOaepKeyPair(publicKey, privateKey) {
759
- this.bpt_1 = publicKey;
760
- this.cpt_1 = privateKey;
760
+ this.rpu_1 = publicKey;
761
+ this.spu_1 = privateKey;
761
762
  }
762
763
  function RsaOaepPublicKey(publicKey) {
763
764
  RsaPublicKey.call(this, publicKey);
@@ -807,8 +808,8 @@ function WebCryptoRsaOaep_getInstance() {
807
808
  return WebCryptoRsaOaep_instance;
808
809
  }
809
810
  function RsaPkcs1KeyPair(publicKey, privateKey) {
810
- this.dpt_1 = publicKey;
811
- this.ept_1 = privateKey;
811
+ this.tpu_1 = publicKey;
812
+ this.upu_1 = privateKey;
812
813
  }
813
814
  function RsaPkcs1PublicKey(publicKey) {
814
815
  RsaPublicKey.call(this, publicKey);
@@ -858,8 +859,8 @@ function WebCryptoRsaPkcs1_getInstance() {
858
859
  return WebCryptoRsaPkcs1_instance;
859
860
  }
860
861
  function RsaPssKeyPair(publicKey, privateKey) {
861
- this.fpt_1 = publicKey;
862
- this.gpt_1 = privateKey;
862
+ this.vpu_1 = publicKey;
863
+ this.wpu_1 = privateKey;
863
864
  }
864
865
  function RsaPssPublicKey(publicKey) {
865
866
  RsaPublicKey.call(this, publicKey);
@@ -919,7 +920,7 @@ function hashAlgorithmName(_this__u8e3s4) {
919
920
  } else if (equals(_this__u8e3s4, SHA512_getInstance())) {
920
921
  tmp = 'SHA-512';
921
922
  } else {
922
- throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.vpl_1);
923
+ throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.lpn_1);
923
924
  }
924
925
  return tmp;
925
926
  }
@@ -927,14 +928,14 @@ function nonBlocking() {
927
928
  throw IllegalStateException_init_$Create$('Only non-blocking(suspend) calls are supported in WebCrypto');
928
929
  }
929
930
  function WebCryptoEncodableKey(key, keyProcessor) {
930
- this.hpt_1 = key;
931
- this.ipt_1 = keyProcessor;
931
+ this.xpu_1 = key;
932
+ this.ypu_1 = keyProcessor;
932
933
  }
933
934
  function $decodeFromByteArrayCOROUTINE$(_this__u8e3s4, format, bytes, resultContinuation) {
934
935
  CoroutineImpl.call(this, resultContinuation);
935
- this.rpt_1 = _this__u8e3s4;
936
- this.spt_1 = format;
937
- this.tpt_1 = bytes;
936
+ this.hpv_1 = _this__u8e3s4;
937
+ this.ipv_1 = format;
938
+ this.jpv_1 = bytes;
938
939
  }
939
940
  protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
940
941
  var suspendResult = this.n9_1;
@@ -944,9 +945,9 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
944
945
  switch (tmp) {
945
946
  case 0:
946
947
  this.m9_1 = 2;
947
- this.upt_1 = this.rpt_1.xpt_1.qpr_1;
948
+ this.kpv_1 = this.hpv_1.npv_1.gpt_1;
948
949
  this.l9_1 = 1;
949
- suspendResult = WebCrypto_getInstance().ypt(this.rpt_1.wpt_1.bpr(this.spt_1), this.rpt_1.wpt_1.dpr(this.rpt_1.vpt_1, this.spt_1, this.tpt_1), this.rpt_1.vpt_1, true, this.rpt_1.xpt_1.ppr_1, this);
950
+ suspendResult = WebCrypto_getInstance().opv(this.hpv_1.mpv_1.rps(this.ipv_1), this.hpv_1.mpv_1.tps(this.hpv_1.lpv_1, this.ipv_1, this.jpv_1), this.hpv_1.lpv_1, true, this.hpv_1.npv_1.fpt_1, this);
950
951
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
951
952
  return suspendResult;
952
953
  }
@@ -954,7 +955,7 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
954
955
  continue $sm;
955
956
  case 1:
956
957
  var ARGUMENT = suspendResult;
957
- return this.upt_1(ARGUMENT);
958
+ return this.kpv_1(ARGUMENT);
958
959
  case 2:
959
960
  throw this.o9_1;
960
961
  }
@@ -970,44 +971,44 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
970
971
  while (true);
971
972
  };
972
973
  function WebCryptoKeyDecoder(algorithm, keyProcessor, keyWrapper) {
973
- this.vpt_1 = algorithm;
974
- this.wpt_1 = keyProcessor;
975
- this.xpt_1 = keyWrapper;
974
+ this.lpv_1 = algorithm;
975
+ this.mpv_1 = keyProcessor;
976
+ this.npv_1 = keyWrapper;
976
977
  }
977
- protoOf(WebCryptoKeyDecoder).npm = function (format, bytes, $completion) {
978
+ protoOf(WebCryptoKeyDecoder).dpo = function (format, bytes, $completion) {
978
979
  var tmp = new $decodeFromByteArrayCOROUTINE$(this, format, bytes, $completion);
979
980
  tmp.n9_1 = Unit_instance;
980
981
  tmp.o9_1 = null;
981
982
  return tmp.t9();
982
983
  };
983
- protoOf(WebCryptoKeyDecoder).opm = function (format, bytes) {
984
+ protoOf(WebCryptoKeyDecoder).epo = function (format, bytes) {
984
985
  nonBlocking();
985
986
  };
986
987
  function WebCryptoKeyProcessor() {
987
988
  }
988
989
  function WebCryptoKeyWrapper(usages, wrap) {
989
- this.ppr_1 = usages;
990
- this.qpr_1 = wrap;
990
+ this.fpt_1 = usages;
991
+ this.gpt_1 = wrap;
991
992
  }
992
993
  function WebCryptoSignatureGenerator(algorithm, key) {
993
- this.zpt_1 = algorithm;
994
- this.apu_1 = key;
994
+ this.ppv_1 = algorithm;
995
+ this.qpv_1 = key;
995
996
  }
996
- protoOf(WebCryptoSignatureGenerator).vpm = function (data, $completion) {
997
- return WebCrypto_getInstance().bpu(this.zpt_1, this.apu_1, data, $completion);
997
+ protoOf(WebCryptoSignatureGenerator).lpo = function (data, $completion) {
998
+ return WebCrypto_getInstance().rpv(this.ppv_1, this.qpv_1, data, $completion);
998
999
  };
999
- protoOf(WebCryptoSignatureGenerator).upm = function () {
1000
+ protoOf(WebCryptoSignatureGenerator).kpo = function () {
1000
1001
  nonBlocking();
1001
1002
  };
1002
- protoOf(WebCryptoSignatureGenerator).wpm = function (data) {
1003
+ protoOf(WebCryptoSignatureGenerator).mpo = function (data) {
1003
1004
  nonBlocking();
1004
1005
  };
1005
1006
  function get_initHook() {
1006
- return initHook_0;
1007
+ return initHook;
1007
1008
  }
1008
- var initHook_0;
1009
+ var initHook;
1009
1010
  function initHook$init$() {
1010
- CryptographySystem_getInstance().hpm(get_defaultProvider(), 100);
1011
+ CryptographySystem_getInstance().xpn(get_defaultProvider(), 100);
1011
1012
  return Unit_instance;
1012
1013
  }
1013
1014
  function get_ecKeyAlgorithmNamedCurve(_this__u8e3s4) {
@@ -1028,27 +1029,27 @@ function ecKeyAlgorithmNamedCurve(algorithm) {
1028
1029
  function getSubtleCrypto() {
1029
1030
  var tmp0_safe_receiver = getCrypto();
1030
1031
  var tmp0 = tmp0_safe_receiver == null ? null : tmp0_safe_receiver.subtle;
1031
- var tmp$ret$1;
1032
+ var tmp$ret$0;
1032
1033
  $l$block: {
1033
1034
  // Inline function 'kotlin.requireNotNull' call
1034
1035
  if (tmp0 == null) {
1035
1036
  var message = 'WebCrypto API is not available. Check Secure Contexts definition (https://developer.mozilla.org/en-US/docs/Web/Security/Secure_Contexts) or report an issue';
1036
1037
  throw IllegalArgumentException_init_$Create$(toString(message));
1037
1038
  } else {
1038
- tmp$ret$1 = tmp0;
1039
+ tmp$ret$0 = tmp0;
1039
1040
  break $l$block;
1040
1041
  }
1041
1042
  }
1042
- return tmp$ret$1;
1043
+ return tmp$ret$0;
1043
1044
  }
1044
1045
  function getCrypto() {
1045
1046
  return globalThis ? globalThis.crypto : window.crypto || window.msCrypto;
1046
1047
  }
1047
1048
  function $digestCOROUTINE$(_this__u8e3s4, algorithmName, data, resultContinuation) {
1048
1049
  CoroutineImpl.call(this, resultContinuation);
1049
- this.kpu_1 = _this__u8e3s4;
1050
- this.lpu_1 = algorithmName;
1051
- this.mpu_1 = data;
1050
+ this.apw_1 = _this__u8e3s4;
1051
+ this.bpw_1 = algorithmName;
1052
+ this.cpw_1 = data;
1052
1053
  }
1053
1054
  protoOf($digestCOROUTINE$).t9 = function () {
1054
1055
  var suspendResult = this.n9_1;
@@ -1059,7 +1060,7 @@ protoOf($digestCOROUTINE$).t9 = function () {
1059
1060
  case 0:
1060
1061
  this.m9_1 = 2;
1061
1062
  this.l9_1 = 1;
1062
- suspendResult = await_0(this.kpu_1.hpr_1.digest(this.lpu_1, this.mpu_1), this);
1063
+ suspendResult = await_0(this.apw_1.xps_1.digest(this.bpw_1, this.cpw_1), this);
1063
1064
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
1064
1065
  return suspendResult;
1065
1066
  }
@@ -1084,10 +1085,10 @@ protoOf($digestCOROUTINE$).t9 = function () {
1084
1085
  };
1085
1086
  function $signCOROUTINE$(_this__u8e3s4, algorithm, key, data, resultContinuation) {
1086
1087
  CoroutineImpl.call(this, resultContinuation);
1087
- this.vpu_1 = _this__u8e3s4;
1088
- this.wpu_1 = algorithm;
1089
- this.xpu_1 = key;
1090
- this.ypu_1 = data;
1088
+ this.lpw_1 = _this__u8e3s4;
1089
+ this.mpw_1 = algorithm;
1090
+ this.npw_1 = key;
1091
+ this.opw_1 = data;
1091
1092
  }
1092
1093
  protoOf($signCOROUTINE$).t9 = function () {
1093
1094
  var suspendResult = this.n9_1;
@@ -1098,7 +1099,7 @@ protoOf($signCOROUTINE$).t9 = function () {
1098
1099
  case 0:
1099
1100
  this.m9_1 = 2;
1100
1101
  this.l9_1 = 1;
1101
- suspendResult = await_0(this.vpu_1.hpr_1.sign(this.wpu_1, this.xpu_1, this.ypu_1), this);
1102
+ suspendResult = await_0(this.lpw_1.xps_1.sign(this.mpw_1, this.npw_1, this.opw_1), this);
1102
1103
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
1103
1104
  return suspendResult;
1104
1105
  }
@@ -1123,23 +1124,23 @@ protoOf($signCOROUTINE$).t9 = function () {
1123
1124
  };
1124
1125
  function WebCrypto() {
1125
1126
  WebCrypto_instance = this;
1126
- this.hpr_1 = getSubtleCrypto();
1127
+ this.xps_1 = getSubtleCrypto();
1127
1128
  }
1128
- protoOf(WebCrypto).ipr = function (algorithmName, data, $completion) {
1129
+ protoOf(WebCrypto).yps = function (algorithmName, data, $completion) {
1129
1130
  var tmp = new $digestCOROUTINE$(this, algorithmName, data, $completion);
1130
1131
  tmp.n9_1 = Unit_instance;
1131
1132
  tmp.o9_1 = null;
1132
1133
  return tmp.t9();
1133
1134
  };
1134
- protoOf(WebCrypto).bpu = function (algorithm, key, data, $completion) {
1135
+ protoOf(WebCrypto).rpv = function (algorithm, key, data, $completion) {
1135
1136
  var tmp = new $signCOROUTINE$(this, algorithm, key, data, $completion);
1136
1137
  tmp.n9_1 = Unit_instance;
1137
1138
  tmp.o9_1 = null;
1138
1139
  return tmp.t9();
1139
1140
  };
1140
- protoOf(WebCrypto).ypt = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
1141
+ protoOf(WebCrypto).opv = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
1141
1142
  var key = format === 'jwk' ? JSON.parse(decodeToString(keyData)) : keyData;
1142
- return await_0(this.hpr_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
1143
+ return await_0(this.xps_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
1143
1144
  };
1144
1145
  var WebCrypto_instance;
1145
1146
  function WebCrypto_getInstance() {
@@ -1163,8 +1164,8 @@ function await$lambda($continuation) {
1163
1164
  // Inline function 'kotlin.coroutines.resume' call
1164
1165
  var this_0 = $continuation;
1165
1166
  // Inline function 'kotlin.Companion.success' call
1166
- var tmp$ret$0 = _Result___init__impl__xyqfz8(it);
1167
- this_0.w9(tmp$ret$0);
1167
+ var tmp$ret$1 = _Result___init__impl__xyqfz8(it);
1168
+ this_0.w9(tmp$ret$1);
1168
1169
  return null;
1169
1170
  };
1170
1171
  }
@@ -1173,8 +1174,8 @@ function await$lambda_0($continuation) {
1173
1174
  // Inline function 'kotlin.coroutines.resumeWithException' call
1174
1175
  var this_0 = $continuation;
1175
1176
  // Inline function 'kotlin.Companion.failure' call
1176
- var tmp$ret$0 = _Result___init__impl__xyqfz8(createFailure(it));
1177
- this_0.w9(tmp$ret$0);
1177
+ var tmp$ret$1 = _Result___init__impl__xyqfz8(createFailure(it));
1178
+ this_0.w9(tmp$ret$1);
1178
1179
  return null;
1179
1180
  };
1180
1181
  }
@@ -1183,12 +1184,12 @@ WebCryptoHkdf_instance = new WebCryptoHkdf();
1183
1184
  WebCryptoPbkdf2_instance = new WebCryptoPbkdf2();
1184
1185
  //endregion
1185
1186
  //region block: eager init
1186
- initHook_0 = initHook$init$();
1187
+ initHook = initHook$init$();
1187
1188
  //endregion
1188
1189
  //region block: exports
1189
- var initHook = {get: get_initHook};
1190
+ var initHook_0 = {get: get_initHook};
1190
1191
  export {
1191
- initHook as initHook,
1192
+ initHook_0 as initHook,
1192
1193
  };
1193
1194
  //endregion
1194
1195