@solibo/solibo-sdk 1.1.110 → 1.1.111
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/KmLogging-logging.mjs +112 -112
- package/KmLogging-logging.mjs.map +1 -1
- package/Kotlin-DateTime-library-kotlinx-datetime.mjs +1629 -1629
- package/Kotlin-DateTime-library-kotlinx-datetime.mjs.map +1 -1
- package/KotlinBigInteger-bignum.mjs +1381 -1381
- package/KotlinBigInteger-bignum.mjs.map +1 -1
- package/MultiplatformSettings-multiplatform-settings-test.mjs +22 -22
- package/MultiplatformSettings-multiplatform-settings-test.mjs.map +1 -1
- package/MultiplatformSettings-multiplatform-settings.mjs +18 -18
- package/Stately-stately-concurrency.mjs +5 -5
- package/cryptography-kotlin-cryptography-bigint.mjs +45 -45
- package/cryptography-kotlin-cryptography-bigint.mjs.map +1 -1
- package/cryptography-kotlin-cryptography-core.mjs +110 -108
- package/cryptography-kotlin-cryptography-core.mjs.map +1 -1
- package/cryptography-kotlin-cryptography-provider-base.mjs +15 -15
- package/cryptography-kotlin-cryptography-provider-webcrypto.mjs +208 -207
- package/cryptography-kotlin-cryptography-provider-webcrypto.mjs.map +1 -1
- package/cryptography-kotlin-cryptography-random.mjs +28 -28
- package/cryptography-kotlin-cryptography-random.mjs.map +1 -1
- package/cryptography-kotlin-cryptography-serialization-asn1-modules.mjs +228 -228
- package/cryptography-kotlin-cryptography-serialization-asn1-modules.mjs.map +1 -1
- package/cryptography-kotlin-cryptography-serialization-asn1.mjs +388 -390
- package/cryptography-kotlin-cryptography-serialization-asn1.mjs.map +1 -1
- package/cryptography-kotlin-cryptography-serialization-pem.mjs +29 -29
- package/cryptography-kotlin-cryptography-serialization-pem.mjs.map +1 -1
- package/kotlin-kotlin-stdlib.mjs +1540 -1724
- package/kotlin-kotlin-stdlib.mjs.map +1 -0
- package/kotlinx-atomicfu.mjs +13 -13
- package/kotlinx-atomicfu.mjs.map +1 -1
- package/kotlinx-coroutines-core.mjs +2482 -2464
- package/kotlinx-coroutines-core.mjs.map +1 -1
- package/kotlinx-io-kotlinx-io-bytestring.mjs +42 -42
- package/kotlinx-io-kotlinx-io-bytestring.mjs.map +1 -1
- package/kotlinx-io-kotlinx-io-core.mjs +629 -625
- package/kotlinx-io-kotlinx-io-core.mjs.map +1 -1
- package/kotlinx-serialization-kotlinx-serialization-core.mjs +1984 -1993
- package/kotlinx-serialization-kotlinx-serialization-core.mjs.map +1 -1
- package/kotlinx-serialization-kotlinx-serialization-json.mjs +1501 -1500
- package/kotlinx-serialization-kotlinx-serialization-json.mjs.map +1 -1
- package/ktor-ktor-client-auth.mjs +294 -293
- package/ktor-ktor-client-auth.mjs.map +1 -1
- package/ktor-ktor-client-content-negotiation.mjs +142 -142
- package/ktor-ktor-client-content-negotiation.mjs.map +1 -1
- package/ktor-ktor-client-core.mjs +3239 -3062
- package/ktor-ktor-client-core.mjs.map +1 -1
- package/ktor-ktor-client-logging.mjs +677 -685
- package/ktor-ktor-client-logging.mjs.map +1 -1
- package/ktor-ktor-client-mock.mjs +66 -66
- package/ktor-ktor-client-mock.mjs.map +1 -1
- package/ktor-ktor-events.mjs +8 -8
- package/ktor-ktor-events.mjs.map +1 -1
- package/ktor-ktor-http-cio.mjs +379 -379
- package/ktor-ktor-http-cio.mjs.map +1 -1
- package/ktor-ktor-http.mjs +1130 -1133
- package/ktor-ktor-http.mjs.map +1 -1
- package/ktor-ktor-io.mjs +670 -670
- package/ktor-ktor-io.mjs.map +1 -1
- package/ktor-ktor-serialization-kotlinx-json.mjs +9 -9
- package/ktor-ktor-serialization-kotlinx.mjs +147 -146
- package/ktor-ktor-serialization-kotlinx.mjs.map +1 -1
- package/ktor-ktor-serialization.mjs +64 -65
- package/ktor-ktor-serialization.mjs.map +1 -1
- package/ktor-ktor-utils.mjs +1598 -1032
- package/ktor-ktor-utils.mjs.map +1 -1
- package/ktor-ktor-websockets.mjs +430 -432
- package/ktor-ktor-websockets.mjs.map +1 -1
- package/package.json +1 -1
- package/solibo-sdk-sdk-home-api.mjs +49962 -49836
- package/solibo-sdk-sdk-home-api.mjs.map +1 -1
- package/solibo-sdk-sdk.d.mts +156 -153
- package/solibo-sdk-sdk.mjs +5014 -4995
- package/solibo-sdk-sdk.mjs.map +1 -1
|
@@ -1,54 +1,54 @@
|
|
|
1
1
|
import {
|
|
2
2
|
CryptographyProviderwgv0x40nzvjc as CryptographyProvider,
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
3
|
+
Companion_getInstance1cxo8h1vzex81 as Companion_getInstance,
|
|
4
|
+
Companion_getInstance2f1kstzejxw2x as Companion_getInstance_0,
|
|
5
|
+
Companion_getInstance3pr8w4ei0fhv3 as Companion_getInstance_1,
|
|
6
|
+
Companion_getInstance2wlpzrae2doj7 as Companion_getInstance_2,
|
|
7
|
+
Companion_getInstance2cw88nbawvd9v as Companion_getInstance_3,
|
|
8
|
+
Companion_getInstance2wnal83xzu0fl as Companion_getInstance_4,
|
|
9
|
+
Companion_getInstance2osa452643r99 as Companion_getInstance_5,
|
|
10
|
+
Companion_getInstance1o04fn6rh6zvb as Companion_getInstance_6,
|
|
11
|
+
Companion_getInstanceo43rur1xu5np as Companion_getInstance_7,
|
|
12
|
+
Companion_getInstanced6e3fczvqpj1 as Companion_getInstance_8,
|
|
13
|
+
Companion_getInstanceiih0uuzbcy0m as Companion_getInstance_9,
|
|
14
|
+
SHA512_getInstance17cfdxfm78pe3 as SHA512_getInstance,
|
|
15
|
+
SHA384_getInstance2hzdeyyr6gwyq as SHA384_getInstance,
|
|
16
|
+
SHA256_getInstance2tj74poar8hy9 as SHA256_getInstance,
|
|
17
|
+
SHA1_getInstancep0n71z58awl7 as SHA1_getInstance,
|
|
18
18
|
CryptographyAlgorithmhhdrgo7p9qei as CryptographyAlgorithm,
|
|
19
19
|
Format3dwngdi37q0un as Format,
|
|
20
20
|
Hashera1nteuzom60c as Hasher,
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
21
|
+
DER_getInstancemljyqyfv6dhp as DER_getInstance,
|
|
22
|
+
PEM_getInstance1b97tztv2fbqo as PEM_getInstance,
|
|
23
|
+
Uncompressed_getInstance34vz27g6ekgkp as Uncompressed_getInstance,
|
|
24
|
+
Compressed_getInstance3oc51dt5hnmlp as Compressed_getInstance,
|
|
25
|
+
JWK_getInstance349jixszdtsix as JWK_getInstance,
|
|
26
26
|
Format1u440c2w9z1t5 as Format_0,
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
27
|
+
RAW_getInstance9609tih9b7i7 as RAW_getInstance,
|
|
28
|
+
Generic_getInstance3kcsixshz938n as Generic_getInstance,
|
|
29
|
+
Generic_getInstance1ms4b411z04f8 as Generic_getInstance_0,
|
|
30
|
+
SEC1_getInstancercl4xwqtkjwx as SEC1_getInstance,
|
|
31
|
+
SEC1_getInstance3h8fyqzbq0rb3 as SEC1_getInstance_0,
|
|
32
|
+
JWK_getInstance3h12c78ox7458 as JWK_getInstance_0,
|
|
33
33
|
Format2r6rz6bygg1d5 as Format_1,
|
|
34
|
-
|
|
35
|
-
|
|
34
|
+
Companion_instance1ehfax4sfgrtr as Companion_instance,
|
|
35
|
+
_Curve___get_name__impl__klrusc30c3bfi58sicg as _Curve___get_name__impl__klrusc,
|
|
36
36
|
Format1jug7lc3rg0qd as Format_2,
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
37
|
+
Generic_getInstance1b47o0g82iueq as Generic_getInstance_1,
|
|
38
|
+
Generic_getInstance1jzesbx6362el as Generic_getInstance_2,
|
|
39
|
+
PKCS1_getInstance3g6bvwapkfo2j as PKCS1_getInstance,
|
|
40
|
+
PKCS1_getInstanceqguams8ef8jk as PKCS1_getInstance_0,
|
|
41
|
+
JWK_getInstance102qicexcrekz as JWK_getInstance_1,
|
|
42
42
|
Format2v29dvc3oaj5k as Format_3,
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
43
|
+
Generic_getInstance3cvf09iecawaj as Generic_getInstance_3,
|
|
44
|
+
Generic_getInstance2o29w13d9vvhh as Generic_getInstance_4,
|
|
45
|
+
PKCS1_getInstance20h2peea51keb as PKCS1_getInstance_1,
|
|
46
|
+
PKCS1_getInstance1dlzix2wmoe07 as PKCS1_getInstance_2,
|
|
47
|
+
JWK_getInstance1mvyhlfrr5lq5 as JWK_getInstance_2,
|
|
48
48
|
Format1i0i1l8xjk06m as Format_4,
|
|
49
49
|
KeyDecoder1aj9ibfkm03tn as KeyDecoder,
|
|
50
50
|
SignatureGenerator3tx2fdhty5h2c as SignatureGenerator,
|
|
51
|
-
|
|
51
|
+
CryptographySystem_getInstance31dacmuk88jna as CryptographySystem_getInstance,
|
|
52
52
|
} from './cryptography-kotlin-cryptography-core.mjs';
|
|
53
53
|
import {
|
|
54
54
|
equals2au1ep9vhcato as equals,
|
|
@@ -62,20 +62,20 @@ import {
|
|
|
62
62
|
noWhenBranchMatchedException2a6r7ubxgky5j as noWhenBranchMatchedException,
|
|
63
63
|
initMetadataForCompanion1wyw17z38v6ac as initMetadataForCompanion,
|
|
64
64
|
toString1pkumu07cwy4m as toString,
|
|
65
|
-
IllegalStateException_init_$Create$
|
|
65
|
+
IllegalStateException_init_$Create$1h4bcfod21ri0 as IllegalStateException_init_$Create$,
|
|
66
66
|
CoroutineImpl2sn3kjnwmfr10 as CoroutineImpl,
|
|
67
67
|
get_COROUTINE_SUSPENDED3ujt3p13qm4iy as get_COROUTINE_SUSPENDED,
|
|
68
68
|
initMetadataForCoroutine1i7lbatuf5bnt as initMetadataForCoroutine,
|
|
69
|
-
|
|
70
|
-
IllegalArgumentException_init_$Create$
|
|
69
|
+
Unit_instancev9v8hjid95df as Unit_instance,
|
|
70
|
+
IllegalArgumentException_init_$Create$i4126l9nkbuo as IllegalArgumentException_init_$Create$,
|
|
71
71
|
decodeToString1x4faah2liw2p as decodeToString,
|
|
72
72
|
intercepted2ogpsikxxj4u0 as intercepted,
|
|
73
|
-
SafeContinuation_init_$Create$
|
|
74
|
-
|
|
75
|
-
|
|
73
|
+
SafeContinuation_init_$Create$rm3s1127i79n as SafeContinuation_init_$Create$,
|
|
74
|
+
Companion_instance1xjg859pd52fi as Companion_instance_0,
|
|
75
|
+
_Result___init__impl__xyqfz823vatsdepqb9n as _Result___init__impl__xyqfz8,
|
|
76
76
|
createFailure8paxfkfa5dc7 as createFailure,
|
|
77
77
|
} from './kotlin-kotlin-stdlib.mjs';
|
|
78
|
-
import {
|
|
78
|
+
import { Companion_getInstance16d0hyg62ver5 as Companion_getInstance_10 } from './cryptography-kotlin-cryptography-serialization-pem.mjs';
|
|
79
79
|
import {
|
|
80
80
|
unwrapPem161z0z59ia531 as unwrapPem,
|
|
81
81
|
convertEcPrivateKeyFromSec1ToPkcs81ruidkpvnvcm1 as convertEcPrivateKeyFromSec1ToPkcs8,
|
|
@@ -83,18 +83,18 @@ import {
|
|
|
83
83
|
wrapSubjectPublicKeyInfo1w2wxg0b5ey1b as wrapSubjectPublicKeyInfo,
|
|
84
84
|
} from './cryptography-kotlin-cryptography-provider-base.mjs';
|
|
85
85
|
import {
|
|
86
|
-
|
|
87
|
-
|
|
86
|
+
Companion_instance9m9gj3vs5va4 as Companion_instance_1,
|
|
87
|
+
Default_getInstance2lfduf5pvubju as Default_getInstance,
|
|
88
88
|
} from './cryptography-kotlin-cryptography-serialization-asn1.mjs';
|
|
89
89
|
import {
|
|
90
90
|
get_secp521r13hkek2jcv829c as get_secp521r1,
|
|
91
91
|
get_secp384r13mvgyp383nadu as get_secp384r1,
|
|
92
92
|
get_secp256r12zskpql6xanyk as get_secp256r1,
|
|
93
|
-
|
|
93
|
+
_EcParameters___init__impl__i4ww9zm37r760ei2sv as _EcParameters___init__impl__i4ww9z,
|
|
94
94
|
EcKeyAlgorithmIdentifierwk35bb676c3o as EcKeyAlgorithmIdentifier,
|
|
95
|
-
|
|
95
|
+
Companion_instance1k2bfcu0t72fc as Companion_instance_2,
|
|
96
96
|
EcPrivateKey2terz948ch7xt as EcPrivateKey,
|
|
97
|
-
|
|
97
|
+
RsaKeyAlgorithmIdentifier_instance3s60qxz6bz8xk as RsaKeyAlgorithmIdentifier_instance,
|
|
98
98
|
} from './cryptography-kotlin-cryptography-serialization-asn1-modules.mjs';
|
|
99
99
|
//region block: imports
|
|
100
100
|
//endregion
|
|
@@ -106,11 +106,11 @@ initMetadataForClass(WebCryptoAes, 'WebCryptoAes', VOID, VOID, [CryptographyAlgo
|
|
|
106
106
|
initMetadataForClass(WebCryptoKeyProcessor, 'WebCryptoKeyProcessor');
|
|
107
107
|
initMetadataForObject(AesKeyProcessor, 'AesKeyProcessor', VOID, WebCryptoKeyProcessor);
|
|
108
108
|
initMetadataForClass(AesCbcKey, 'AesCbcKey', VOID, AesKey, VOID, [1]);
|
|
109
|
-
initMetadataForObject(WebCryptoAesCbc, 'WebCryptoAesCbc', VOID, WebCryptoAes, [
|
|
109
|
+
initMetadataForObject(WebCryptoAesCbc, 'WebCryptoAesCbc', VOID, WebCryptoAes, [CryptographyAlgorithm]);
|
|
110
110
|
initMetadataForClass(AesCtrKey, 'AesCtrKey', VOID, AesKey, VOID, [1]);
|
|
111
|
-
initMetadataForObject(WebCryptoAesCtr, 'WebCryptoAesCtr', VOID, WebCryptoAes, [
|
|
111
|
+
initMetadataForObject(WebCryptoAesCtr, 'WebCryptoAesCtr', VOID, WebCryptoAes, [CryptographyAlgorithm]);
|
|
112
112
|
initMetadataForClass(AesGcmKey, 'AesGcmKey', VOID, AesKey, VOID, [1]);
|
|
113
|
-
initMetadataForObject(WebCryptoAesGcm, 'WebCryptoAesGcm', VOID, WebCryptoAes, [
|
|
113
|
+
initMetadataForObject(WebCryptoAesGcm, 'WebCryptoAesGcm', VOID, WebCryptoAes, [CryptographyAlgorithm]);
|
|
114
114
|
initMetadataForCompanion(Companion);
|
|
115
115
|
initMetadataForClass(WebCryptoDigest, 'WebCryptoDigest', VOID, VOID, [CryptographyAlgorithm, Hasher], [1]);
|
|
116
116
|
initMetadataForClass(EcPublicKey, 'EcPublicKey', VOID, WebCryptoEncodableKey, VOID, [1]);
|
|
@@ -121,11 +121,11 @@ initMetadataForObject(EcPrivateKeyProcessor, 'EcPrivateKeyProcessor', VOID, WebC
|
|
|
121
121
|
initMetadataForClass(EcdhKeyPair, 'EcdhKeyPair');
|
|
122
122
|
initMetadataForClass(EcdhPublicKey, 'EcdhPublicKey', VOID, EcPublicKey, VOID, [1]);
|
|
123
123
|
initMetadataForClass(EcdhPrivateKey, 'EcdhPrivateKey', VOID, EcPrivateKey_0, VOID, [1]);
|
|
124
|
-
initMetadataForObject(WebCryptoEcdh, 'WebCryptoEcdh', VOID, WebCryptoEc, [
|
|
124
|
+
initMetadataForObject(WebCryptoEcdh, 'WebCryptoEcdh', VOID, WebCryptoEc, [CryptographyAlgorithm]);
|
|
125
125
|
initMetadataForClass(EcdsaKeyPair, 'EcdsaKeyPair');
|
|
126
126
|
initMetadataForClass(EcdsaPublicKey, 'EcdsaPublicKey', VOID, EcPublicKey, VOID, [1]);
|
|
127
127
|
initMetadataForClass(EcdsaPrivateKey, 'EcdsaPrivateKey', VOID, EcPrivateKey_0, VOID, [1]);
|
|
128
|
-
initMetadataForObject(WebCryptoEcdsa, 'WebCryptoEcdsa', VOID, WebCryptoEc, [
|
|
128
|
+
initMetadataForObject(WebCryptoEcdsa, 'WebCryptoEcdsa', VOID, WebCryptoEc, [CryptographyAlgorithm]);
|
|
129
129
|
initMetadataForObject(WebCryptoHkdf, 'WebCryptoHkdf', VOID, VOID, [CryptographyAlgorithm]);
|
|
130
130
|
initMetadataForClass(HmacKey, 'HmacKey', VOID, WebCryptoEncodableKey, VOID, [1]);
|
|
131
131
|
initMetadataForObject(WebCryptoHmac, 'WebCryptoHmac', VOID, VOID, [CryptographyAlgorithm]);
|
|
@@ -139,15 +139,15 @@ initMetadataForObject(RsaPrivateKeyProcessor, 'RsaPrivateKeyProcessor', VOID, We
|
|
|
139
139
|
initMetadataForClass(RsaOaepKeyPair, 'RsaOaepKeyPair');
|
|
140
140
|
initMetadataForClass(RsaOaepPublicKey, 'RsaOaepPublicKey', VOID, RsaPublicKey, VOID, [1]);
|
|
141
141
|
initMetadataForClass(RsaOaepPrivateKey, 'RsaOaepPrivateKey', VOID, RsaPrivateKey, VOID, [1]);
|
|
142
|
-
initMetadataForObject(WebCryptoRsaOaep, 'WebCryptoRsaOaep', VOID, WebCryptoRsa, [
|
|
142
|
+
initMetadataForObject(WebCryptoRsaOaep, 'WebCryptoRsaOaep', VOID, WebCryptoRsa, [CryptographyAlgorithm]);
|
|
143
143
|
initMetadataForClass(RsaPkcs1KeyPair, 'RsaPkcs1KeyPair');
|
|
144
144
|
initMetadataForClass(RsaPkcs1PublicKey, 'RsaPkcs1PublicKey', VOID, RsaPublicKey, VOID, [1]);
|
|
145
145
|
initMetadataForClass(RsaPkcs1PrivateKey, 'RsaPkcs1PrivateKey', VOID, RsaPrivateKey, VOID, [1]);
|
|
146
|
-
initMetadataForObject(WebCryptoRsaPkcs1, 'WebCryptoRsaPkcs1', VOID, WebCryptoRsa, [
|
|
146
|
+
initMetadataForObject(WebCryptoRsaPkcs1, 'WebCryptoRsaPkcs1', VOID, WebCryptoRsa, [CryptographyAlgorithm]);
|
|
147
147
|
initMetadataForClass(RsaPssKeyPair, 'RsaPssKeyPair');
|
|
148
148
|
initMetadataForClass(RsaPssPublicKey, 'RsaPssPublicKey', VOID, RsaPublicKey, VOID, [1]);
|
|
149
149
|
initMetadataForClass(RsaPssPrivateKey, 'RsaPssPrivateKey', VOID, RsaPrivateKey, VOID, [1]);
|
|
150
|
-
initMetadataForObject(WebCryptoRsaPss, 'WebCryptoRsaPss', VOID, WebCryptoRsa, [
|
|
150
|
+
initMetadataForObject(WebCryptoRsaPss, 'WebCryptoRsaPss', VOID, WebCryptoRsa, [CryptographyAlgorithm]);
|
|
151
151
|
initMetadataForCoroutine($decodeFromByteArrayCOROUTINE$, CoroutineImpl);
|
|
152
152
|
initMetadataForClass(WebCryptoKeyDecoder, 'WebCryptoKeyDecoder', VOID, VOID, [KeyDecoder], [2]);
|
|
153
153
|
initMetadataForClass(WebCryptoKeyWrapper, 'WebCryptoKeyWrapper');
|
|
@@ -166,8 +166,8 @@ function WebCryptoCryptographyProvider() {
|
|
|
166
166
|
WebCryptoCryptographyProvider_instance = this;
|
|
167
167
|
CryptographyProvider.call(this);
|
|
168
168
|
}
|
|
169
|
-
protoOf(WebCryptoCryptographyProvider).
|
|
170
|
-
var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().
|
|
169
|
+
protoOf(WebCryptoCryptographyProvider).ppn = function (identifier) {
|
|
170
|
+
var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().hps_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().ips_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().jps_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().kps_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
|
|
171
171
|
return (tmp == null ? true : isInterface(tmp, CryptographyAlgorithm)) ? tmp : THROW_CCE();
|
|
172
172
|
};
|
|
173
173
|
var WebCryptoCryptographyProvider_instance;
|
|
@@ -190,17 +190,17 @@ function _init_properties_WebCryptoCryptographyProvider_kt__i22tls() {
|
|
|
190
190
|
}
|
|
191
191
|
function AesKey(key) {
|
|
192
192
|
WebCryptoEncodableKey.call(this, key, AesKeyProcessor_getInstance());
|
|
193
|
-
this.
|
|
193
|
+
this.nps_1 = key;
|
|
194
194
|
}
|
|
195
195
|
function WebCryptoAes(algorithmName, keyWrapper) {
|
|
196
|
-
this.
|
|
197
|
-
this.
|
|
196
|
+
this.ops_1 = algorithmName;
|
|
197
|
+
this.pps_1 = keyWrapper;
|
|
198
198
|
}
|
|
199
199
|
function AesKeyProcessor() {
|
|
200
200
|
AesKeyProcessor_instance = this;
|
|
201
201
|
WebCryptoKeyProcessor.call(this);
|
|
202
202
|
}
|
|
203
|
-
protoOf(AesKeyProcessor).
|
|
203
|
+
protoOf(AesKeyProcessor).qps = function (format) {
|
|
204
204
|
var tmp;
|
|
205
205
|
switch (format.a1_1) {
|
|
206
206
|
case 0:
|
|
@@ -215,14 +215,14 @@ protoOf(AesKeyProcessor).apr = function (format) {
|
|
|
215
215
|
}
|
|
216
216
|
return tmp;
|
|
217
217
|
};
|
|
218
|
-
protoOf(AesKeyProcessor).
|
|
219
|
-
return this.
|
|
218
|
+
protoOf(AesKeyProcessor).rps = function (format) {
|
|
219
|
+
return this.qps(format instanceof Format ? format : THROW_CCE());
|
|
220
220
|
};
|
|
221
|
-
protoOf(AesKeyProcessor).
|
|
221
|
+
protoOf(AesKeyProcessor).sps = function (algorithm, format, key) {
|
|
222
222
|
return key;
|
|
223
223
|
};
|
|
224
|
-
protoOf(AesKeyProcessor).
|
|
225
|
-
return this.
|
|
224
|
+
protoOf(AesKeyProcessor).tps = function (algorithm, format, key) {
|
|
225
|
+
return this.sps(algorithm, format instanceof Format ? format : THROW_CCE(), key);
|
|
226
226
|
};
|
|
227
227
|
var AesKeyProcessor_instance;
|
|
228
228
|
function AesKeyProcessor_getInstance() {
|
|
@@ -304,10 +304,10 @@ function WebCryptoAesGcm_getInstance() {
|
|
|
304
304
|
}
|
|
305
305
|
function Companion() {
|
|
306
306
|
Companion_instance_3 = this;
|
|
307
|
-
this.
|
|
308
|
-
this.
|
|
309
|
-
this.
|
|
310
|
-
this.
|
|
307
|
+
this.hps_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
|
|
308
|
+
this.ips_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
|
|
309
|
+
this.jps_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
|
|
310
|
+
this.kps_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
|
|
311
311
|
}
|
|
312
312
|
var Companion_instance_3;
|
|
313
313
|
function Companion_getInstance_11() {
|
|
@@ -317,52 +317,52 @@ function Companion_getInstance_11() {
|
|
|
317
317
|
}
|
|
318
318
|
function WebCryptoDigest(algorithm, id) {
|
|
319
319
|
Companion_getInstance_11();
|
|
320
|
-
this.
|
|
321
|
-
this.
|
|
320
|
+
this.ups_1 = algorithm;
|
|
321
|
+
this.vps_1 = id;
|
|
322
322
|
}
|
|
323
|
-
protoOf(WebCryptoDigest).
|
|
323
|
+
protoOf(WebCryptoDigest).wps = function () {
|
|
324
324
|
return this;
|
|
325
325
|
};
|
|
326
|
-
protoOf(WebCryptoDigest).
|
|
327
|
-
return WebCrypto_getInstance().
|
|
326
|
+
protoOf(WebCryptoDigest).gpo = function (data, $completion) {
|
|
327
|
+
return WebCrypto_getInstance().yps(this.ups_1, data, $completion);
|
|
328
328
|
};
|
|
329
|
-
protoOf(WebCryptoDigest).
|
|
329
|
+
protoOf(WebCryptoDigest).fpo = function () {
|
|
330
330
|
nonBlocking();
|
|
331
331
|
};
|
|
332
|
-
protoOf(WebCryptoDigest).
|
|
332
|
+
protoOf(WebCryptoDigest).hpo = function (data) {
|
|
333
333
|
nonBlocking();
|
|
334
334
|
};
|
|
335
335
|
function EcPublicKey(publicKey) {
|
|
336
336
|
WebCryptoEncodableKey.call(this, publicKey, EcPublicKeyProcessor_getInstance());
|
|
337
|
-
this.
|
|
337
|
+
this.bpt_1 = publicKey;
|
|
338
338
|
}
|
|
339
339
|
function EcPrivateKey_0(privateKey) {
|
|
340
340
|
WebCryptoEncodableKey.call(this, privateKey, EcPrivateKeyProcessor_getInstance());
|
|
341
|
-
this.
|
|
341
|
+
this.ept_1 = privateKey;
|
|
342
342
|
}
|
|
343
343
|
function WebCryptoEc$keyPairWrapper$lambda($keyPairWrapper, this$0) {
|
|
344
344
|
return function (it) {
|
|
345
|
-
return $keyPairWrapper(this$0.
|
|
345
|
+
return $keyPairWrapper(this$0.ipt_1.gpt_1(it.publicKey), this$0.jpt_1.gpt_1(it.privateKey));
|
|
346
346
|
};
|
|
347
347
|
}
|
|
348
348
|
function WebCryptoEc(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
|
|
349
|
-
this.
|
|
350
|
-
this.
|
|
351
|
-
this.
|
|
349
|
+
this.hpt_1 = algorithmName;
|
|
350
|
+
this.ipt_1 = publicKeyWrapper;
|
|
351
|
+
this.jpt_1 = privateKeyWrapper;
|
|
352
352
|
var tmp = this;
|
|
353
|
-
var tmp0 = this.
|
|
353
|
+
var tmp0 = this.ipt_1.fpt_1;
|
|
354
354
|
// Inline function 'kotlin.collections.plus' call
|
|
355
|
-
var elements = this.
|
|
355
|
+
var elements = this.jpt_1.fpt_1;
|
|
356
356
|
// Inline function 'kotlin.js.asDynamic' call
|
|
357
|
-
tmp.
|
|
357
|
+
tmp.kpt_1 = tmp0.concat(elements);
|
|
358
358
|
var tmp_0 = this;
|
|
359
|
-
tmp_0.
|
|
359
|
+
tmp_0.lpt_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
|
|
360
360
|
}
|
|
361
361
|
function EcPublicKeyProcessor() {
|
|
362
362
|
EcPublicKeyProcessor_instance = this;
|
|
363
363
|
WebCryptoKeyProcessor.call(this);
|
|
364
364
|
}
|
|
365
|
-
protoOf(EcPublicKeyProcessor).
|
|
365
|
+
protoOf(EcPublicKeyProcessor).mpt = function (format) {
|
|
366
366
|
var tmp;
|
|
367
367
|
if (equals(format, JWK_getInstance())) {
|
|
368
368
|
tmp = 'jwk';
|
|
@@ -375,10 +375,10 @@ protoOf(EcPublicKeyProcessor).wpr = function (format) {
|
|
|
375
375
|
}
|
|
376
376
|
return tmp;
|
|
377
377
|
};
|
|
378
|
-
protoOf(EcPublicKeyProcessor).
|
|
379
|
-
return this.
|
|
378
|
+
protoOf(EcPublicKeyProcessor).rps = function (format) {
|
|
379
|
+
return this.mpt(format instanceof Format_0 ? format : THROW_CCE());
|
|
380
380
|
};
|
|
381
|
-
protoOf(EcPublicKeyProcessor).
|
|
381
|
+
protoOf(EcPublicKeyProcessor).npt = function (algorithm, format, key) {
|
|
382
382
|
var tmp;
|
|
383
383
|
if (equals(format, JWK_getInstance())) {
|
|
384
384
|
tmp = key;
|
|
@@ -387,14 +387,14 @@ protoOf(EcPublicKeyProcessor).xpr = function (algorithm, format, key) {
|
|
|
387
387
|
} else if (equals(format, DER_getInstance())) {
|
|
388
388
|
tmp = key;
|
|
389
389
|
} else if (equals(format, PEM_getInstance())) {
|
|
390
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
390
|
+
tmp = unwrapPem(Companion_getInstance_10().cps_1, key);
|
|
391
391
|
} else {
|
|
392
392
|
noWhenBranchMatchedException();
|
|
393
393
|
}
|
|
394
394
|
return tmp;
|
|
395
395
|
};
|
|
396
|
-
protoOf(EcPublicKeyProcessor).
|
|
397
|
-
return this.
|
|
396
|
+
protoOf(EcPublicKeyProcessor).tps = function (algorithm, format, key) {
|
|
397
|
+
return this.npt(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
|
|
398
398
|
};
|
|
399
399
|
var EcPublicKeyProcessor_instance;
|
|
400
400
|
function EcPublicKeyProcessor_getInstance() {
|
|
@@ -406,7 +406,7 @@ function EcPrivateKeyProcessor() {
|
|
|
406
406
|
EcPrivateKeyProcessor_instance = this;
|
|
407
407
|
WebCryptoKeyProcessor.call(this);
|
|
408
408
|
}
|
|
409
|
-
protoOf(EcPrivateKeyProcessor).
|
|
409
|
+
protoOf(EcPrivateKeyProcessor).opt = function (format) {
|
|
410
410
|
var tmp;
|
|
411
411
|
if (equals(format, JWK_getInstance_0())) {
|
|
412
412
|
tmp = 'jwk';
|
|
@@ -417,43 +417,44 @@ protoOf(EcPrivateKeyProcessor).ypr = function (format) {
|
|
|
417
417
|
}
|
|
418
418
|
return tmp;
|
|
419
419
|
};
|
|
420
|
-
protoOf(EcPrivateKeyProcessor).
|
|
421
|
-
return this.
|
|
420
|
+
protoOf(EcPrivateKeyProcessor).rps = function (format) {
|
|
421
|
+
return this.opt(format instanceof Format_1 ? format : THROW_CCE());
|
|
422
422
|
};
|
|
423
|
-
protoOf(EcPrivateKeyProcessor).
|
|
423
|
+
protoOf(EcPrivateKeyProcessor).ppt = function (algorithm, format, key) {
|
|
424
424
|
var tmp;
|
|
425
425
|
if (equals(format, JWK_getInstance_0())) {
|
|
426
426
|
tmp = key;
|
|
427
427
|
} else if (equals(format, RAW_getInstance())) {
|
|
428
428
|
var namedCurve = get_ecKeyAlgorithmNamedCurve(algorithm);
|
|
429
429
|
var tmp_0;
|
|
430
|
-
if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.
|
|
430
|
+
if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.apo())) {
|
|
431
431
|
tmp_0 = get_secp256r1(Companion_instance_1);
|
|
432
|
-
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.
|
|
432
|
+
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.bpo())) {
|
|
433
433
|
tmp_0 = get_secp384r1(Companion_instance_1);
|
|
434
|
-
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.
|
|
434
|
+
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.cpo())) {
|
|
435
435
|
tmp_0 = get_secp521r1(Companion_instance_1);
|
|
436
436
|
} else {
|
|
437
|
+
// Inline function 'kotlin.error' call
|
|
437
438
|
var message = 'Unknown curve: ' + namedCurve;
|
|
438
439
|
throw IllegalStateException_init_$Create$(toString(message));
|
|
439
440
|
}
|
|
440
441
|
var curveId = tmp_0;
|
|
441
|
-
tmp = wrapPrivateKeyInfo(0, new EcKeyAlgorithmIdentifier(_EcParameters___init__impl__i4ww9z(curveId)), Default_getInstance().
|
|
442
|
+
tmp = wrapPrivateKeyInfo(0, new EcKeyAlgorithmIdentifier(_EcParameters___init__impl__i4ww9z(curveId)), Default_getInstance().gu(Companion_instance_2.x1g(), new EcPrivateKey(1, key)));
|
|
442
443
|
} else if (equals(format, Generic_getInstance())) {
|
|
443
444
|
tmp = key;
|
|
444
445
|
} else if (equals(format, Generic_getInstance_0())) {
|
|
445
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
446
|
+
tmp = unwrapPem(Companion_getInstance_10().dps_1, key);
|
|
446
447
|
} else if (equals(format, SEC1_getInstance())) {
|
|
447
448
|
tmp = convertEcPrivateKeyFromSec1ToPkcs8(key);
|
|
448
449
|
} else if (equals(format, SEC1_getInstance_0())) {
|
|
449
|
-
tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().
|
|
450
|
+
tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().gps_1, key));
|
|
450
451
|
} else {
|
|
451
452
|
noWhenBranchMatchedException();
|
|
452
453
|
}
|
|
453
454
|
return tmp;
|
|
454
455
|
};
|
|
455
|
-
protoOf(EcPrivateKeyProcessor).
|
|
456
|
-
return this.
|
|
456
|
+
protoOf(EcPrivateKeyProcessor).tps = function (algorithm, format, key) {
|
|
457
|
+
return this.ppt(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
|
|
457
458
|
};
|
|
458
459
|
var EcPrivateKeyProcessor_instance;
|
|
459
460
|
function EcPrivateKeyProcessor_getInstance() {
|
|
@@ -462,8 +463,8 @@ function EcPrivateKeyProcessor_getInstance() {
|
|
|
462
463
|
return EcPrivateKeyProcessor_instance;
|
|
463
464
|
}
|
|
464
465
|
function EcdhKeyPair(publicKey, privateKey) {
|
|
465
|
-
this.
|
|
466
|
-
this.
|
|
466
|
+
this.qpt_1 = publicKey;
|
|
467
|
+
this.rpt_1 = privateKey;
|
|
467
468
|
}
|
|
468
469
|
function EcdhPublicKey(publicKey) {
|
|
469
470
|
EcPublicKey.call(this, publicKey);
|
|
@@ -513,8 +514,8 @@ function WebCryptoEcdh_getInstance() {
|
|
|
513
514
|
return WebCryptoEcdh_instance;
|
|
514
515
|
}
|
|
515
516
|
function EcdsaKeyPair(publicKey, privateKey) {
|
|
516
|
-
this.
|
|
517
|
-
this.
|
|
517
|
+
this.spt_1 = publicKey;
|
|
518
|
+
this.tpt_1 = privateKey;
|
|
518
519
|
}
|
|
519
520
|
function EcdsaPublicKey(publicKey) {
|
|
520
521
|
EcPublicKey.call(this, publicKey);
|
|
@@ -571,10 +572,10 @@ function WebCryptoHkdf_getInstance() {
|
|
|
571
572
|
}
|
|
572
573
|
function HmacKey(key) {
|
|
573
574
|
WebCryptoEncodableKey.call(this, key, HmacKeyProcessor_getInstance());
|
|
574
|
-
this.
|
|
575
|
+
this.wpt_1 = key;
|
|
575
576
|
}
|
|
576
|
-
protoOf(HmacKey).
|
|
577
|
-
return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.
|
|
577
|
+
protoOf(HmacKey).xpt = function () {
|
|
578
|
+
return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.wpt_1);
|
|
578
579
|
};
|
|
579
580
|
function WebCryptoHmac$HmacKey$_init_$ref_enwl2t() {
|
|
580
581
|
var l = function (p0) {
|
|
@@ -590,10 +591,10 @@ function WebCryptoHmac() {
|
|
|
590
591
|
// Inline function 'kotlin.js.unsafeCast' call
|
|
591
592
|
// Inline function 'kotlin.js.asDynamic' call
|
|
592
593
|
var tmp_0 = ['sign', 'verify'];
|
|
593
|
-
tmp.
|
|
594
|
+
tmp.ypt_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
|
|
594
595
|
}
|
|
595
|
-
protoOf(WebCryptoHmac).
|
|
596
|
-
return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.
|
|
596
|
+
protoOf(WebCryptoHmac).zpt = function (digest) {
|
|
597
|
+
return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.ypt_1);
|
|
597
598
|
};
|
|
598
599
|
var WebCryptoHmac_instance;
|
|
599
600
|
function WebCryptoHmac_getInstance() {
|
|
@@ -605,7 +606,7 @@ function HmacKeyProcessor() {
|
|
|
605
606
|
HmacKeyProcessor_instance = this;
|
|
606
607
|
WebCryptoKeyProcessor.call(this);
|
|
607
608
|
}
|
|
608
|
-
protoOf(HmacKeyProcessor).
|
|
609
|
+
protoOf(HmacKeyProcessor).apu = function (format) {
|
|
609
610
|
var tmp;
|
|
610
611
|
switch (format.a1_1) {
|
|
611
612
|
case 0:
|
|
@@ -620,14 +621,14 @@ protoOf(HmacKeyProcessor).kps = function (format) {
|
|
|
620
621
|
}
|
|
621
622
|
return tmp;
|
|
622
623
|
};
|
|
623
|
-
protoOf(HmacKeyProcessor).
|
|
624
|
-
return this.
|
|
624
|
+
protoOf(HmacKeyProcessor).rps = function (format) {
|
|
625
|
+
return this.apu(format instanceof Format_2 ? format : THROW_CCE());
|
|
625
626
|
};
|
|
626
|
-
protoOf(HmacKeyProcessor).
|
|
627
|
+
protoOf(HmacKeyProcessor).bpu = function (algorithm, format, key) {
|
|
627
628
|
return key;
|
|
628
629
|
};
|
|
629
|
-
protoOf(HmacKeyProcessor).
|
|
630
|
-
return this.
|
|
630
|
+
protoOf(HmacKeyProcessor).tps = function (algorithm, format, key) {
|
|
631
|
+
return this.bpu(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
|
|
631
632
|
};
|
|
632
633
|
var HmacKeyProcessor_instance;
|
|
633
634
|
function HmacKeyProcessor_getInstance() {
|
|
@@ -643,35 +644,35 @@ function WebCryptoPbkdf2_getInstance() {
|
|
|
643
644
|
}
|
|
644
645
|
function RsaPublicKey(publicKey) {
|
|
645
646
|
WebCryptoEncodableKey.call(this, publicKey, RsaPublicKeyProcessor_getInstance());
|
|
646
|
-
this.
|
|
647
|
+
this.epu_1 = publicKey;
|
|
647
648
|
}
|
|
648
649
|
function RsaPrivateKey(privateKey) {
|
|
649
650
|
WebCryptoEncodableKey.call(this, privateKey, RsaPrivateKeyProcessor_getInstance());
|
|
650
|
-
this.
|
|
651
|
+
this.hpu_1 = privateKey;
|
|
651
652
|
}
|
|
652
653
|
function WebCryptoRsa$keyPairWrapper$lambda($keyPairWrapper, this$0) {
|
|
653
654
|
return function (it) {
|
|
654
|
-
return $keyPairWrapper(this$0.
|
|
655
|
+
return $keyPairWrapper(this$0.jpu_1.gpt_1(it.publicKey), this$0.kpu_1.gpt_1(it.privateKey));
|
|
655
656
|
};
|
|
656
657
|
}
|
|
657
658
|
function WebCryptoRsa(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
|
|
658
|
-
this.
|
|
659
|
-
this.
|
|
660
|
-
this.
|
|
659
|
+
this.ipu_1 = algorithmName;
|
|
660
|
+
this.jpu_1 = publicKeyWrapper;
|
|
661
|
+
this.kpu_1 = privateKeyWrapper;
|
|
661
662
|
var tmp = this;
|
|
662
|
-
var tmp0 = this.
|
|
663
|
+
var tmp0 = this.jpu_1.fpt_1;
|
|
663
664
|
// Inline function 'kotlin.collections.plus' call
|
|
664
|
-
var elements = this.
|
|
665
|
+
var elements = this.kpu_1.fpt_1;
|
|
665
666
|
// Inline function 'kotlin.js.asDynamic' call
|
|
666
|
-
tmp.
|
|
667
|
+
tmp.lpu_1 = tmp0.concat(elements);
|
|
667
668
|
var tmp_0 = this;
|
|
668
|
-
tmp_0.
|
|
669
|
+
tmp_0.mpu_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
|
|
669
670
|
}
|
|
670
671
|
function RsaPublicKeyProcessor() {
|
|
671
672
|
RsaPublicKeyProcessor_instance = this;
|
|
672
673
|
WebCryptoKeyProcessor.call(this);
|
|
673
674
|
}
|
|
674
|
-
protoOf(RsaPublicKeyProcessor).
|
|
675
|
+
protoOf(RsaPublicKeyProcessor).npu = function (format) {
|
|
675
676
|
var tmp;
|
|
676
677
|
if (equals(format, JWK_getInstance_1())) {
|
|
677
678
|
tmp = 'jwk';
|
|
@@ -682,28 +683,28 @@ protoOf(RsaPublicKeyProcessor).xps = function (format) {
|
|
|
682
683
|
}
|
|
683
684
|
return tmp;
|
|
684
685
|
};
|
|
685
|
-
protoOf(RsaPublicKeyProcessor).
|
|
686
|
-
return this.
|
|
686
|
+
protoOf(RsaPublicKeyProcessor).rps = function (format) {
|
|
687
|
+
return this.npu(format instanceof Format_3 ? format : THROW_CCE());
|
|
687
688
|
};
|
|
688
|
-
protoOf(RsaPublicKeyProcessor).
|
|
689
|
+
protoOf(RsaPublicKeyProcessor).opu = function (algorithm, format, key) {
|
|
689
690
|
var tmp;
|
|
690
691
|
if (equals(format, JWK_getInstance_1())) {
|
|
691
692
|
tmp = key;
|
|
692
693
|
} else if (equals(format, Generic_getInstance_1())) {
|
|
693
694
|
tmp = key;
|
|
694
695
|
} else if (equals(format, Generic_getInstance_2())) {
|
|
695
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
696
|
+
tmp = unwrapPem(Companion_getInstance_10().cps_1, key);
|
|
696
697
|
} else if (equals(format, PKCS1_getInstance())) {
|
|
697
698
|
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, key);
|
|
698
699
|
} else if (equals(format, PKCS1_getInstance_0())) {
|
|
699
|
-
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().
|
|
700
|
+
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().eps_1, key));
|
|
700
701
|
} else {
|
|
701
702
|
noWhenBranchMatchedException();
|
|
702
703
|
}
|
|
703
704
|
return tmp;
|
|
704
705
|
};
|
|
705
|
-
protoOf(RsaPublicKeyProcessor).
|
|
706
|
-
return this.
|
|
706
|
+
protoOf(RsaPublicKeyProcessor).tps = function (algorithm, format, key) {
|
|
707
|
+
return this.opu(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
|
|
707
708
|
};
|
|
708
709
|
var RsaPublicKeyProcessor_instance;
|
|
709
710
|
function RsaPublicKeyProcessor_getInstance() {
|
|
@@ -715,7 +716,7 @@ function RsaPrivateKeyProcessor() {
|
|
|
715
716
|
RsaPrivateKeyProcessor_instance = this;
|
|
716
717
|
WebCryptoKeyProcessor.call(this);
|
|
717
718
|
}
|
|
718
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
719
|
+
protoOf(RsaPrivateKeyProcessor).ppu = function (format) {
|
|
719
720
|
var tmp;
|
|
720
721
|
if (equals(format, JWK_getInstance_2())) {
|
|
721
722
|
tmp = 'jwk';
|
|
@@ -726,28 +727,28 @@ protoOf(RsaPrivateKeyProcessor).zps = function (format) {
|
|
|
726
727
|
}
|
|
727
728
|
return tmp;
|
|
728
729
|
};
|
|
729
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
730
|
-
return this.
|
|
730
|
+
protoOf(RsaPrivateKeyProcessor).rps = function (format) {
|
|
731
|
+
return this.ppu(format instanceof Format_4 ? format : THROW_CCE());
|
|
731
732
|
};
|
|
732
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
733
|
+
protoOf(RsaPrivateKeyProcessor).qpu = function (algorithm, format, key) {
|
|
733
734
|
var tmp;
|
|
734
735
|
if (equals(format, JWK_getInstance_2())) {
|
|
735
736
|
tmp = key;
|
|
736
737
|
} else if (equals(format, Generic_getInstance_3())) {
|
|
737
738
|
tmp = key;
|
|
738
739
|
} else if (equals(format, Generic_getInstance_4())) {
|
|
739
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
740
|
+
tmp = unwrapPem(Companion_getInstance_10().dps_1, key);
|
|
740
741
|
} else if (equals(format, PKCS1_getInstance_1())) {
|
|
741
742
|
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, key);
|
|
742
743
|
} else if (equals(format, PKCS1_getInstance_2())) {
|
|
743
|
-
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().
|
|
744
|
+
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().fps_1, key));
|
|
744
745
|
} else {
|
|
745
746
|
noWhenBranchMatchedException();
|
|
746
747
|
}
|
|
747
748
|
return tmp;
|
|
748
749
|
};
|
|
749
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
750
|
-
return this.
|
|
750
|
+
protoOf(RsaPrivateKeyProcessor).tps = function (algorithm, format, key) {
|
|
751
|
+
return this.qpu(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
|
|
751
752
|
};
|
|
752
753
|
var RsaPrivateKeyProcessor_instance;
|
|
753
754
|
function RsaPrivateKeyProcessor_getInstance() {
|
|
@@ -756,8 +757,8 @@ function RsaPrivateKeyProcessor_getInstance() {
|
|
|
756
757
|
return RsaPrivateKeyProcessor_instance;
|
|
757
758
|
}
|
|
758
759
|
function RsaOaepKeyPair(publicKey, privateKey) {
|
|
759
|
-
this.
|
|
760
|
-
this.
|
|
760
|
+
this.rpu_1 = publicKey;
|
|
761
|
+
this.spu_1 = privateKey;
|
|
761
762
|
}
|
|
762
763
|
function RsaOaepPublicKey(publicKey) {
|
|
763
764
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -807,8 +808,8 @@ function WebCryptoRsaOaep_getInstance() {
|
|
|
807
808
|
return WebCryptoRsaOaep_instance;
|
|
808
809
|
}
|
|
809
810
|
function RsaPkcs1KeyPair(publicKey, privateKey) {
|
|
810
|
-
this.
|
|
811
|
-
this.
|
|
811
|
+
this.tpu_1 = publicKey;
|
|
812
|
+
this.upu_1 = privateKey;
|
|
812
813
|
}
|
|
813
814
|
function RsaPkcs1PublicKey(publicKey) {
|
|
814
815
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -858,8 +859,8 @@ function WebCryptoRsaPkcs1_getInstance() {
|
|
|
858
859
|
return WebCryptoRsaPkcs1_instance;
|
|
859
860
|
}
|
|
860
861
|
function RsaPssKeyPair(publicKey, privateKey) {
|
|
861
|
-
this.
|
|
862
|
-
this.
|
|
862
|
+
this.vpu_1 = publicKey;
|
|
863
|
+
this.wpu_1 = privateKey;
|
|
863
864
|
}
|
|
864
865
|
function RsaPssPublicKey(publicKey) {
|
|
865
866
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -919,7 +920,7 @@ function hashAlgorithmName(_this__u8e3s4) {
|
|
|
919
920
|
} else if (equals(_this__u8e3s4, SHA512_getInstance())) {
|
|
920
921
|
tmp = 'SHA-512';
|
|
921
922
|
} else {
|
|
922
|
-
throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.
|
|
923
|
+
throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.lpn_1);
|
|
923
924
|
}
|
|
924
925
|
return tmp;
|
|
925
926
|
}
|
|
@@ -927,14 +928,14 @@ function nonBlocking() {
|
|
|
927
928
|
throw IllegalStateException_init_$Create$('Only non-blocking(suspend) calls are supported in WebCrypto');
|
|
928
929
|
}
|
|
929
930
|
function WebCryptoEncodableKey(key, keyProcessor) {
|
|
930
|
-
this.
|
|
931
|
-
this.
|
|
931
|
+
this.xpu_1 = key;
|
|
932
|
+
this.ypu_1 = keyProcessor;
|
|
932
933
|
}
|
|
933
934
|
function $decodeFromByteArrayCOROUTINE$(_this__u8e3s4, format, bytes, resultContinuation) {
|
|
934
935
|
CoroutineImpl.call(this, resultContinuation);
|
|
935
|
-
this.
|
|
936
|
-
this.
|
|
937
|
-
this.
|
|
936
|
+
this.hpv_1 = _this__u8e3s4;
|
|
937
|
+
this.ipv_1 = format;
|
|
938
|
+
this.jpv_1 = bytes;
|
|
938
939
|
}
|
|
939
940
|
protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
|
|
940
941
|
var suspendResult = this.n9_1;
|
|
@@ -944,9 +945,9 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
|
|
|
944
945
|
switch (tmp) {
|
|
945
946
|
case 0:
|
|
946
947
|
this.m9_1 = 2;
|
|
947
|
-
this.
|
|
948
|
+
this.kpv_1 = this.hpv_1.npv_1.gpt_1;
|
|
948
949
|
this.l9_1 = 1;
|
|
949
|
-
suspendResult = WebCrypto_getInstance().
|
|
950
|
+
suspendResult = WebCrypto_getInstance().opv(this.hpv_1.mpv_1.rps(this.ipv_1), this.hpv_1.mpv_1.tps(this.hpv_1.lpv_1, this.ipv_1, this.jpv_1), this.hpv_1.lpv_1, true, this.hpv_1.npv_1.fpt_1, this);
|
|
950
951
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
951
952
|
return suspendResult;
|
|
952
953
|
}
|
|
@@ -954,7 +955,7 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
|
|
|
954
955
|
continue $sm;
|
|
955
956
|
case 1:
|
|
956
957
|
var ARGUMENT = suspendResult;
|
|
957
|
-
return this.
|
|
958
|
+
return this.kpv_1(ARGUMENT);
|
|
958
959
|
case 2:
|
|
959
960
|
throw this.o9_1;
|
|
960
961
|
}
|
|
@@ -970,44 +971,44 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
|
|
|
970
971
|
while (true);
|
|
971
972
|
};
|
|
972
973
|
function WebCryptoKeyDecoder(algorithm, keyProcessor, keyWrapper) {
|
|
973
|
-
this.
|
|
974
|
-
this.
|
|
975
|
-
this.
|
|
974
|
+
this.lpv_1 = algorithm;
|
|
975
|
+
this.mpv_1 = keyProcessor;
|
|
976
|
+
this.npv_1 = keyWrapper;
|
|
976
977
|
}
|
|
977
|
-
protoOf(WebCryptoKeyDecoder).
|
|
978
|
+
protoOf(WebCryptoKeyDecoder).dpo = function (format, bytes, $completion) {
|
|
978
979
|
var tmp = new $decodeFromByteArrayCOROUTINE$(this, format, bytes, $completion);
|
|
979
980
|
tmp.n9_1 = Unit_instance;
|
|
980
981
|
tmp.o9_1 = null;
|
|
981
982
|
return tmp.t9();
|
|
982
983
|
};
|
|
983
|
-
protoOf(WebCryptoKeyDecoder).
|
|
984
|
+
protoOf(WebCryptoKeyDecoder).epo = function (format, bytes) {
|
|
984
985
|
nonBlocking();
|
|
985
986
|
};
|
|
986
987
|
function WebCryptoKeyProcessor() {
|
|
987
988
|
}
|
|
988
989
|
function WebCryptoKeyWrapper(usages, wrap) {
|
|
989
|
-
this.
|
|
990
|
-
this.
|
|
990
|
+
this.fpt_1 = usages;
|
|
991
|
+
this.gpt_1 = wrap;
|
|
991
992
|
}
|
|
992
993
|
function WebCryptoSignatureGenerator(algorithm, key) {
|
|
993
|
-
this.
|
|
994
|
-
this.
|
|
994
|
+
this.ppv_1 = algorithm;
|
|
995
|
+
this.qpv_1 = key;
|
|
995
996
|
}
|
|
996
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
997
|
-
return WebCrypto_getInstance().
|
|
997
|
+
protoOf(WebCryptoSignatureGenerator).lpo = function (data, $completion) {
|
|
998
|
+
return WebCrypto_getInstance().rpv(this.ppv_1, this.qpv_1, data, $completion);
|
|
998
999
|
};
|
|
999
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1000
|
+
protoOf(WebCryptoSignatureGenerator).kpo = function () {
|
|
1000
1001
|
nonBlocking();
|
|
1001
1002
|
};
|
|
1002
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1003
|
+
protoOf(WebCryptoSignatureGenerator).mpo = function (data) {
|
|
1003
1004
|
nonBlocking();
|
|
1004
1005
|
};
|
|
1005
1006
|
function get_initHook() {
|
|
1006
|
-
return
|
|
1007
|
+
return initHook;
|
|
1007
1008
|
}
|
|
1008
|
-
var
|
|
1009
|
+
var initHook;
|
|
1009
1010
|
function initHook$init$() {
|
|
1010
|
-
CryptographySystem_getInstance().
|
|
1011
|
+
CryptographySystem_getInstance().xpn(get_defaultProvider(), 100);
|
|
1011
1012
|
return Unit_instance;
|
|
1012
1013
|
}
|
|
1013
1014
|
function get_ecKeyAlgorithmNamedCurve(_this__u8e3s4) {
|
|
@@ -1028,27 +1029,27 @@ function ecKeyAlgorithmNamedCurve(algorithm) {
|
|
|
1028
1029
|
function getSubtleCrypto() {
|
|
1029
1030
|
var tmp0_safe_receiver = getCrypto();
|
|
1030
1031
|
var tmp0 = tmp0_safe_receiver == null ? null : tmp0_safe_receiver.subtle;
|
|
1031
|
-
var tmp$ret$
|
|
1032
|
+
var tmp$ret$0;
|
|
1032
1033
|
$l$block: {
|
|
1033
1034
|
// Inline function 'kotlin.requireNotNull' call
|
|
1034
1035
|
if (tmp0 == null) {
|
|
1035
1036
|
var message = 'WebCrypto API is not available. Check Secure Contexts definition (https://developer.mozilla.org/en-US/docs/Web/Security/Secure_Contexts) or report an issue';
|
|
1036
1037
|
throw IllegalArgumentException_init_$Create$(toString(message));
|
|
1037
1038
|
} else {
|
|
1038
|
-
tmp$ret$
|
|
1039
|
+
tmp$ret$0 = tmp0;
|
|
1039
1040
|
break $l$block;
|
|
1040
1041
|
}
|
|
1041
1042
|
}
|
|
1042
|
-
return tmp$ret$
|
|
1043
|
+
return tmp$ret$0;
|
|
1043
1044
|
}
|
|
1044
1045
|
function getCrypto() {
|
|
1045
1046
|
return globalThis ? globalThis.crypto : window.crypto || window.msCrypto;
|
|
1046
1047
|
}
|
|
1047
1048
|
function $digestCOROUTINE$(_this__u8e3s4, algorithmName, data, resultContinuation) {
|
|
1048
1049
|
CoroutineImpl.call(this, resultContinuation);
|
|
1049
|
-
this.
|
|
1050
|
-
this.
|
|
1051
|
-
this.
|
|
1050
|
+
this.apw_1 = _this__u8e3s4;
|
|
1051
|
+
this.bpw_1 = algorithmName;
|
|
1052
|
+
this.cpw_1 = data;
|
|
1052
1053
|
}
|
|
1053
1054
|
protoOf($digestCOROUTINE$).t9 = function () {
|
|
1054
1055
|
var suspendResult = this.n9_1;
|
|
@@ -1059,7 +1060,7 @@ protoOf($digestCOROUTINE$).t9 = function () {
|
|
|
1059
1060
|
case 0:
|
|
1060
1061
|
this.m9_1 = 2;
|
|
1061
1062
|
this.l9_1 = 1;
|
|
1062
|
-
suspendResult = await_0(this.
|
|
1063
|
+
suspendResult = await_0(this.apw_1.xps_1.digest(this.bpw_1, this.cpw_1), this);
|
|
1063
1064
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
1064
1065
|
return suspendResult;
|
|
1065
1066
|
}
|
|
@@ -1084,10 +1085,10 @@ protoOf($digestCOROUTINE$).t9 = function () {
|
|
|
1084
1085
|
};
|
|
1085
1086
|
function $signCOROUTINE$(_this__u8e3s4, algorithm, key, data, resultContinuation) {
|
|
1086
1087
|
CoroutineImpl.call(this, resultContinuation);
|
|
1087
|
-
this.
|
|
1088
|
-
this.
|
|
1089
|
-
this.
|
|
1090
|
-
this.
|
|
1088
|
+
this.lpw_1 = _this__u8e3s4;
|
|
1089
|
+
this.mpw_1 = algorithm;
|
|
1090
|
+
this.npw_1 = key;
|
|
1091
|
+
this.opw_1 = data;
|
|
1091
1092
|
}
|
|
1092
1093
|
protoOf($signCOROUTINE$).t9 = function () {
|
|
1093
1094
|
var suspendResult = this.n9_1;
|
|
@@ -1098,7 +1099,7 @@ protoOf($signCOROUTINE$).t9 = function () {
|
|
|
1098
1099
|
case 0:
|
|
1099
1100
|
this.m9_1 = 2;
|
|
1100
1101
|
this.l9_1 = 1;
|
|
1101
|
-
suspendResult = await_0(this.
|
|
1102
|
+
suspendResult = await_0(this.lpw_1.xps_1.sign(this.mpw_1, this.npw_1, this.opw_1), this);
|
|
1102
1103
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
1103
1104
|
return suspendResult;
|
|
1104
1105
|
}
|
|
@@ -1123,23 +1124,23 @@ protoOf($signCOROUTINE$).t9 = function () {
|
|
|
1123
1124
|
};
|
|
1124
1125
|
function WebCrypto() {
|
|
1125
1126
|
WebCrypto_instance = this;
|
|
1126
|
-
this.
|
|
1127
|
+
this.xps_1 = getSubtleCrypto();
|
|
1127
1128
|
}
|
|
1128
|
-
protoOf(WebCrypto).
|
|
1129
|
+
protoOf(WebCrypto).yps = function (algorithmName, data, $completion) {
|
|
1129
1130
|
var tmp = new $digestCOROUTINE$(this, algorithmName, data, $completion);
|
|
1130
1131
|
tmp.n9_1 = Unit_instance;
|
|
1131
1132
|
tmp.o9_1 = null;
|
|
1132
1133
|
return tmp.t9();
|
|
1133
1134
|
};
|
|
1134
|
-
protoOf(WebCrypto).
|
|
1135
|
+
protoOf(WebCrypto).rpv = function (algorithm, key, data, $completion) {
|
|
1135
1136
|
var tmp = new $signCOROUTINE$(this, algorithm, key, data, $completion);
|
|
1136
1137
|
tmp.n9_1 = Unit_instance;
|
|
1137
1138
|
tmp.o9_1 = null;
|
|
1138
1139
|
return tmp.t9();
|
|
1139
1140
|
};
|
|
1140
|
-
protoOf(WebCrypto).
|
|
1141
|
+
protoOf(WebCrypto).opv = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
|
|
1141
1142
|
var key = format === 'jwk' ? JSON.parse(decodeToString(keyData)) : keyData;
|
|
1142
|
-
return await_0(this.
|
|
1143
|
+
return await_0(this.xps_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
|
|
1143
1144
|
};
|
|
1144
1145
|
var WebCrypto_instance;
|
|
1145
1146
|
function WebCrypto_getInstance() {
|
|
@@ -1163,8 +1164,8 @@ function await$lambda($continuation) {
|
|
|
1163
1164
|
// Inline function 'kotlin.coroutines.resume' call
|
|
1164
1165
|
var this_0 = $continuation;
|
|
1165
1166
|
// Inline function 'kotlin.Companion.success' call
|
|
1166
|
-
var tmp$ret$
|
|
1167
|
-
this_0.w9(tmp$ret$
|
|
1167
|
+
var tmp$ret$1 = _Result___init__impl__xyqfz8(it);
|
|
1168
|
+
this_0.w9(tmp$ret$1);
|
|
1168
1169
|
return null;
|
|
1169
1170
|
};
|
|
1170
1171
|
}
|
|
@@ -1173,8 +1174,8 @@ function await$lambda_0($continuation) {
|
|
|
1173
1174
|
// Inline function 'kotlin.coroutines.resumeWithException' call
|
|
1174
1175
|
var this_0 = $continuation;
|
|
1175
1176
|
// Inline function 'kotlin.Companion.failure' call
|
|
1176
|
-
var tmp$ret$
|
|
1177
|
-
this_0.w9(tmp$ret$
|
|
1177
|
+
var tmp$ret$1 = _Result___init__impl__xyqfz8(createFailure(it));
|
|
1178
|
+
this_0.w9(tmp$ret$1);
|
|
1178
1179
|
return null;
|
|
1179
1180
|
};
|
|
1180
1181
|
}
|
|
@@ -1183,12 +1184,12 @@ WebCryptoHkdf_instance = new WebCryptoHkdf();
|
|
|
1183
1184
|
WebCryptoPbkdf2_instance = new WebCryptoPbkdf2();
|
|
1184
1185
|
//endregion
|
|
1185
1186
|
//region block: eager init
|
|
1186
|
-
|
|
1187
|
+
initHook = initHook$init$();
|
|
1187
1188
|
//endregion
|
|
1188
1189
|
//region block: exports
|
|
1189
|
-
var
|
|
1190
|
+
var initHook_0 = {get: get_initHook};
|
|
1190
1191
|
export {
|
|
1191
|
-
|
|
1192
|
+
initHook_0 as initHook,
|
|
1192
1193
|
};
|
|
1193
1194
|
//endregion
|
|
1194
1195
|
|