@solibo/solibo-sdk 1.1.12 → 1.1.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/KmLogging-logging.mjs +99 -99
- package/KotlinBigInteger-bignum.mjs +1114 -1114
- package/MultiplatformSettings-multiplatform-settings.mjs +16 -16
- package/Stately-stately-concurrency.mjs +4 -4
- package/cryptography-kotlin-cryptography-bigint.mjs +27 -27
- package/cryptography-kotlin-cryptography-core.mjs +47 -47
- package/cryptography-kotlin-cryptography-provider-base.mjs +4 -4
- package/cryptography-kotlin-cryptography-provider-webcrypto.mjs +135 -135
- package/cryptography-kotlin-cryptography-random.mjs +15 -15
- package/cryptography-kotlin-cryptography-serialization-asn1-modules.mjs +112 -112
- package/cryptography-kotlin-cryptography-serialization-asn1.mjs +240 -240
- package/cryptography-kotlin-cryptography-serialization-pem.mjs +15 -15
- package/kotlin-kotlin-stdlib.mjs +11 -11
- package/kotlin-kotlin-stdlib.mjs.map +1 -1
- package/kotlinx-coroutines-core.mjs +1 -1
- package/ktor-ktor-client-auth.mjs +224 -224
- package/ktor-ktor-client-logging.mjs +516 -516
- package/ktor-ktor-client-mock.mjs +39 -39
- package/package.json +1 -1
- package/solibo-sdk-sdk-home-api.mjs +18823 -18393
- package/solibo-sdk-sdk-home-api.mjs.map +1 -1
- package/solibo-sdk-sdk.d.mts +42 -15
- package/solibo-sdk-sdk.mjs +2163 -2163
|
@@ -166,8 +166,8 @@ function WebCryptoCryptographyProvider() {
|
|
|
166
166
|
WebCryptoCryptographyProvider_instance = this;
|
|
167
167
|
CryptographyProvider.call(this);
|
|
168
168
|
}
|
|
169
|
-
protoOf(WebCryptoCryptographyProvider).
|
|
170
|
-
var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().
|
|
169
|
+
protoOf(WebCryptoCryptographyProvider).qox = function (identifier) {
|
|
170
|
+
var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().hp2_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().ip2_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().jp2_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().kp2_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
|
|
171
171
|
return (tmp == null ? true : isInterface(tmp, CryptographyAlgorithm)) ? tmp : THROW_CCE();
|
|
172
172
|
};
|
|
173
173
|
var WebCryptoCryptographyProvider_instance;
|
|
@@ -190,17 +190,17 @@ function _init_properties_WebCryptoCryptographyProvider_kt__i22tls() {
|
|
|
190
190
|
}
|
|
191
191
|
function AesKey(key) {
|
|
192
192
|
WebCryptoEncodableKey.call(this, key, AesKeyProcessor_getInstance());
|
|
193
|
-
this.
|
|
193
|
+
this.np2_1 = key;
|
|
194
194
|
}
|
|
195
195
|
function WebCryptoAes(algorithmName, keyWrapper) {
|
|
196
|
-
this.
|
|
197
|
-
this.
|
|
196
|
+
this.op2_1 = algorithmName;
|
|
197
|
+
this.pp2_1 = keyWrapper;
|
|
198
198
|
}
|
|
199
199
|
function AesKeyProcessor() {
|
|
200
200
|
AesKeyProcessor_instance = this;
|
|
201
201
|
WebCryptoKeyProcessor.call(this);
|
|
202
202
|
}
|
|
203
|
-
protoOf(AesKeyProcessor).
|
|
203
|
+
protoOf(AesKeyProcessor).qp2 = function (format) {
|
|
204
204
|
var tmp;
|
|
205
205
|
switch (format.a1_1) {
|
|
206
206
|
case 0:
|
|
@@ -215,14 +215,14 @@ protoOf(AesKeyProcessor).ep1 = function (format) {
|
|
|
215
215
|
}
|
|
216
216
|
return tmp;
|
|
217
217
|
};
|
|
218
|
-
protoOf(AesKeyProcessor).
|
|
219
|
-
return this.
|
|
218
|
+
protoOf(AesKeyProcessor).rp2 = function (format) {
|
|
219
|
+
return this.qp2(format instanceof Format ? format : THROW_CCE());
|
|
220
220
|
};
|
|
221
|
-
protoOf(AesKeyProcessor).
|
|
221
|
+
protoOf(AesKeyProcessor).sp2 = function (algorithm, format, key) {
|
|
222
222
|
return key;
|
|
223
223
|
};
|
|
224
|
-
protoOf(AesKeyProcessor).
|
|
225
|
-
return this.
|
|
224
|
+
protoOf(AesKeyProcessor).tp2 = function (algorithm, format, key) {
|
|
225
|
+
return this.sp2(algorithm, format instanceof Format ? format : THROW_CCE(), key);
|
|
226
226
|
};
|
|
227
227
|
var AesKeyProcessor_instance;
|
|
228
228
|
function AesKeyProcessor_getInstance() {
|
|
@@ -304,10 +304,10 @@ function WebCryptoAesGcm_getInstance() {
|
|
|
304
304
|
}
|
|
305
305
|
function Companion() {
|
|
306
306
|
Companion_instance_3 = this;
|
|
307
|
-
this.
|
|
308
|
-
this.
|
|
309
|
-
this.
|
|
310
|
-
this.
|
|
307
|
+
this.hp2_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
|
|
308
|
+
this.ip2_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
|
|
309
|
+
this.jp2_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
|
|
310
|
+
this.kp2_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
|
|
311
311
|
}
|
|
312
312
|
var Companion_instance_3;
|
|
313
313
|
function Companion_getInstance_11() {
|
|
@@ -317,52 +317,52 @@ function Companion_getInstance_11() {
|
|
|
317
317
|
}
|
|
318
318
|
function WebCryptoDigest(algorithm, id) {
|
|
319
319
|
Companion_getInstance_11();
|
|
320
|
-
this.
|
|
321
|
-
this.
|
|
320
|
+
this.up2_1 = algorithm;
|
|
321
|
+
this.vp2_1 = id;
|
|
322
322
|
}
|
|
323
|
-
protoOf(WebCryptoDigest).
|
|
323
|
+
protoOf(WebCryptoDigest).wp2 = function () {
|
|
324
324
|
return this;
|
|
325
325
|
};
|
|
326
|
-
protoOf(WebCryptoDigest).
|
|
327
|
-
return WebCrypto_getInstance().
|
|
326
|
+
protoOf(WebCryptoDigest).hoy = function (data, $completion) {
|
|
327
|
+
return WebCrypto_getInstance().yp2(this.up2_1, data, $completion);
|
|
328
328
|
};
|
|
329
|
-
protoOf(WebCryptoDigest).
|
|
329
|
+
protoOf(WebCryptoDigest).goy = function () {
|
|
330
330
|
nonBlocking();
|
|
331
331
|
};
|
|
332
|
-
protoOf(WebCryptoDigest).
|
|
332
|
+
protoOf(WebCryptoDigest).ioy = function (data) {
|
|
333
333
|
nonBlocking();
|
|
334
334
|
};
|
|
335
335
|
function EcPublicKey(publicKey) {
|
|
336
336
|
WebCryptoEncodableKey.call(this, publicKey, EcPublicKeyProcessor_getInstance());
|
|
337
|
-
this.
|
|
337
|
+
this.bp3_1 = publicKey;
|
|
338
338
|
}
|
|
339
339
|
function EcPrivateKey_0(privateKey) {
|
|
340
340
|
WebCryptoEncodableKey.call(this, privateKey, EcPrivateKeyProcessor_getInstance());
|
|
341
|
-
this.
|
|
341
|
+
this.ep3_1 = privateKey;
|
|
342
342
|
}
|
|
343
343
|
function WebCryptoEc$keyPairWrapper$lambda($keyPairWrapper, this$0) {
|
|
344
344
|
return function (it) {
|
|
345
|
-
return $keyPairWrapper(this$0.
|
|
345
|
+
return $keyPairWrapper(this$0.ip3_1.gp3_1(it.publicKey), this$0.jp3_1.gp3_1(it.privateKey));
|
|
346
346
|
};
|
|
347
347
|
}
|
|
348
348
|
function WebCryptoEc(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
|
|
349
|
-
this.
|
|
350
|
-
this.
|
|
351
|
-
this.
|
|
349
|
+
this.hp3_1 = algorithmName;
|
|
350
|
+
this.ip3_1 = publicKeyWrapper;
|
|
351
|
+
this.jp3_1 = privateKeyWrapper;
|
|
352
352
|
var tmp = this;
|
|
353
|
-
var tmp0 = this.
|
|
353
|
+
var tmp0 = this.ip3_1.fp3_1;
|
|
354
354
|
// Inline function 'kotlin.collections.plus' call
|
|
355
|
-
var elements = this.
|
|
355
|
+
var elements = this.jp3_1.fp3_1;
|
|
356
356
|
// Inline function 'kotlin.js.asDynamic' call
|
|
357
|
-
tmp.
|
|
357
|
+
tmp.kp3_1 = tmp0.concat(elements);
|
|
358
358
|
var tmp_0 = this;
|
|
359
|
-
tmp_0.
|
|
359
|
+
tmp_0.lp3_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
|
|
360
360
|
}
|
|
361
361
|
function EcPublicKeyProcessor() {
|
|
362
362
|
EcPublicKeyProcessor_instance = this;
|
|
363
363
|
WebCryptoKeyProcessor.call(this);
|
|
364
364
|
}
|
|
365
|
-
protoOf(EcPublicKeyProcessor).
|
|
365
|
+
protoOf(EcPublicKeyProcessor).mp3 = function (format) {
|
|
366
366
|
var tmp;
|
|
367
367
|
if (equals(format, JWK_getInstance())) {
|
|
368
368
|
tmp = 'jwk';
|
|
@@ -375,10 +375,10 @@ protoOf(EcPublicKeyProcessor).ap2 = function (format) {
|
|
|
375
375
|
}
|
|
376
376
|
return tmp;
|
|
377
377
|
};
|
|
378
|
-
protoOf(EcPublicKeyProcessor).
|
|
379
|
-
return this.
|
|
378
|
+
protoOf(EcPublicKeyProcessor).rp2 = function (format) {
|
|
379
|
+
return this.mp3(format instanceof Format_0 ? format : THROW_CCE());
|
|
380
380
|
};
|
|
381
|
-
protoOf(EcPublicKeyProcessor).
|
|
381
|
+
protoOf(EcPublicKeyProcessor).np3 = function (algorithm, format, key) {
|
|
382
382
|
var tmp;
|
|
383
383
|
if (equals(format, JWK_getInstance())) {
|
|
384
384
|
tmp = key;
|
|
@@ -387,14 +387,14 @@ protoOf(EcPublicKeyProcessor).bp2 = function (algorithm, format, key) {
|
|
|
387
387
|
} else if (equals(format, DER_getInstance())) {
|
|
388
388
|
tmp = key;
|
|
389
389
|
} else if (equals(format, PEM_getInstance())) {
|
|
390
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
390
|
+
tmp = unwrapPem(Companion_getInstance_10().cp2_1, key);
|
|
391
391
|
} else {
|
|
392
392
|
noWhenBranchMatchedException();
|
|
393
393
|
}
|
|
394
394
|
return tmp;
|
|
395
395
|
};
|
|
396
|
-
protoOf(EcPublicKeyProcessor).
|
|
397
|
-
return this.
|
|
396
|
+
protoOf(EcPublicKeyProcessor).tp2 = function (algorithm, format, key) {
|
|
397
|
+
return this.np3(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
|
|
398
398
|
};
|
|
399
399
|
var EcPublicKeyProcessor_instance;
|
|
400
400
|
function EcPublicKeyProcessor_getInstance() {
|
|
@@ -406,7 +406,7 @@ function EcPrivateKeyProcessor() {
|
|
|
406
406
|
EcPrivateKeyProcessor_instance = this;
|
|
407
407
|
WebCryptoKeyProcessor.call(this);
|
|
408
408
|
}
|
|
409
|
-
protoOf(EcPrivateKeyProcessor).
|
|
409
|
+
protoOf(EcPrivateKeyProcessor).op3 = function (format) {
|
|
410
410
|
var tmp;
|
|
411
411
|
if (equals(format, JWK_getInstance_0())) {
|
|
412
412
|
tmp = 'jwk';
|
|
@@ -417,21 +417,21 @@ protoOf(EcPrivateKeyProcessor).cp2 = function (format) {
|
|
|
417
417
|
}
|
|
418
418
|
return tmp;
|
|
419
419
|
};
|
|
420
|
-
protoOf(EcPrivateKeyProcessor).
|
|
421
|
-
return this.
|
|
420
|
+
protoOf(EcPrivateKeyProcessor).rp2 = function (format) {
|
|
421
|
+
return this.op3(format instanceof Format_1 ? format : THROW_CCE());
|
|
422
422
|
};
|
|
423
|
-
protoOf(EcPrivateKeyProcessor).
|
|
423
|
+
protoOf(EcPrivateKeyProcessor).pp3 = function (algorithm, format, key) {
|
|
424
424
|
var tmp;
|
|
425
425
|
if (equals(format, JWK_getInstance_0())) {
|
|
426
426
|
tmp = key;
|
|
427
427
|
} else if (equals(format, RAW_getInstance())) {
|
|
428
428
|
var namedCurve = get_ecKeyAlgorithmNamedCurve(algorithm);
|
|
429
429
|
var tmp_0;
|
|
430
|
-
if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.
|
|
430
|
+
if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.boy())) {
|
|
431
431
|
tmp_0 = get_secp256r1(Companion_instance_1);
|
|
432
|
-
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.
|
|
432
|
+
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.coy())) {
|
|
433
433
|
tmp_0 = get_secp384r1(Companion_instance_1);
|
|
434
|
-
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.
|
|
434
|
+
} else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.doy())) {
|
|
435
435
|
tmp_0 = get_secp521r1(Companion_instance_1);
|
|
436
436
|
} else {
|
|
437
437
|
var message = 'Unknown curve: ' + namedCurve;
|
|
@@ -442,18 +442,18 @@ protoOf(EcPrivateKeyProcessor).dp2 = function (algorithm, format, key) {
|
|
|
442
442
|
} else if (equals(format, Generic_getInstance())) {
|
|
443
443
|
tmp = key;
|
|
444
444
|
} else if (equals(format, Generic_getInstance_0())) {
|
|
445
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
445
|
+
tmp = unwrapPem(Companion_getInstance_10().dp2_1, key);
|
|
446
446
|
} else if (equals(format, SEC1_getInstance())) {
|
|
447
447
|
tmp = convertEcPrivateKeyFromSec1ToPkcs8(key);
|
|
448
448
|
} else if (equals(format, SEC1_getInstance_0())) {
|
|
449
|
-
tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().
|
|
449
|
+
tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().gp2_1, key));
|
|
450
450
|
} else {
|
|
451
451
|
noWhenBranchMatchedException();
|
|
452
452
|
}
|
|
453
453
|
return tmp;
|
|
454
454
|
};
|
|
455
|
-
protoOf(EcPrivateKeyProcessor).
|
|
456
|
-
return this.
|
|
455
|
+
protoOf(EcPrivateKeyProcessor).tp2 = function (algorithm, format, key) {
|
|
456
|
+
return this.pp3(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
|
|
457
457
|
};
|
|
458
458
|
var EcPrivateKeyProcessor_instance;
|
|
459
459
|
function EcPrivateKeyProcessor_getInstance() {
|
|
@@ -462,8 +462,8 @@ function EcPrivateKeyProcessor_getInstance() {
|
|
|
462
462
|
return EcPrivateKeyProcessor_instance;
|
|
463
463
|
}
|
|
464
464
|
function EcdhKeyPair(publicKey, privateKey) {
|
|
465
|
-
this.
|
|
466
|
-
this.
|
|
465
|
+
this.qp3_1 = publicKey;
|
|
466
|
+
this.rp3_1 = privateKey;
|
|
467
467
|
}
|
|
468
468
|
function EcdhPublicKey(publicKey) {
|
|
469
469
|
EcPublicKey.call(this, publicKey);
|
|
@@ -513,8 +513,8 @@ function WebCryptoEcdh_getInstance() {
|
|
|
513
513
|
return WebCryptoEcdh_instance;
|
|
514
514
|
}
|
|
515
515
|
function EcdsaKeyPair(publicKey, privateKey) {
|
|
516
|
-
this.
|
|
517
|
-
this.
|
|
516
|
+
this.sp3_1 = publicKey;
|
|
517
|
+
this.tp3_1 = privateKey;
|
|
518
518
|
}
|
|
519
519
|
function EcdsaPublicKey(publicKey) {
|
|
520
520
|
EcPublicKey.call(this, publicKey);
|
|
@@ -571,10 +571,10 @@ function WebCryptoHkdf_getInstance() {
|
|
|
571
571
|
}
|
|
572
572
|
function HmacKey(key) {
|
|
573
573
|
WebCryptoEncodableKey.call(this, key, HmacKeyProcessor_getInstance());
|
|
574
|
-
this.
|
|
574
|
+
this.wp3_1 = key;
|
|
575
575
|
}
|
|
576
|
-
protoOf(HmacKey).
|
|
577
|
-
return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.
|
|
576
|
+
protoOf(HmacKey).xp3 = function () {
|
|
577
|
+
return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.wp3_1);
|
|
578
578
|
};
|
|
579
579
|
function WebCryptoHmac$HmacKey$_init_$ref_enwl2t() {
|
|
580
580
|
var l = function (p0) {
|
|
@@ -590,10 +590,10 @@ function WebCryptoHmac() {
|
|
|
590
590
|
// Inline function 'kotlin.js.unsafeCast' call
|
|
591
591
|
// Inline function 'kotlin.js.asDynamic' call
|
|
592
592
|
var tmp_0 = ['sign', 'verify'];
|
|
593
|
-
tmp.
|
|
593
|
+
tmp.yp3_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
|
|
594
594
|
}
|
|
595
|
-
protoOf(WebCryptoHmac).
|
|
596
|
-
return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.
|
|
595
|
+
protoOf(WebCryptoHmac).zp3 = function (digest) {
|
|
596
|
+
return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.yp3_1);
|
|
597
597
|
};
|
|
598
598
|
var WebCryptoHmac_instance;
|
|
599
599
|
function WebCryptoHmac_getInstance() {
|
|
@@ -605,7 +605,7 @@ function HmacKeyProcessor() {
|
|
|
605
605
|
HmacKeyProcessor_instance = this;
|
|
606
606
|
WebCryptoKeyProcessor.call(this);
|
|
607
607
|
}
|
|
608
|
-
protoOf(HmacKeyProcessor).
|
|
608
|
+
protoOf(HmacKeyProcessor).ap4 = function (format) {
|
|
609
609
|
var tmp;
|
|
610
610
|
switch (format.a1_1) {
|
|
611
611
|
case 0:
|
|
@@ -620,14 +620,14 @@ protoOf(HmacKeyProcessor).op2 = function (format) {
|
|
|
620
620
|
}
|
|
621
621
|
return tmp;
|
|
622
622
|
};
|
|
623
|
-
protoOf(HmacKeyProcessor).
|
|
624
|
-
return this.
|
|
623
|
+
protoOf(HmacKeyProcessor).rp2 = function (format) {
|
|
624
|
+
return this.ap4(format instanceof Format_2 ? format : THROW_CCE());
|
|
625
625
|
};
|
|
626
|
-
protoOf(HmacKeyProcessor).
|
|
626
|
+
protoOf(HmacKeyProcessor).bp4 = function (algorithm, format, key) {
|
|
627
627
|
return key;
|
|
628
628
|
};
|
|
629
|
-
protoOf(HmacKeyProcessor).
|
|
630
|
-
return this.
|
|
629
|
+
protoOf(HmacKeyProcessor).tp2 = function (algorithm, format, key) {
|
|
630
|
+
return this.bp4(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
|
|
631
631
|
};
|
|
632
632
|
var HmacKeyProcessor_instance;
|
|
633
633
|
function HmacKeyProcessor_getInstance() {
|
|
@@ -643,35 +643,35 @@ function WebCryptoPbkdf2_getInstance() {
|
|
|
643
643
|
}
|
|
644
644
|
function RsaPublicKey(publicKey) {
|
|
645
645
|
WebCryptoEncodableKey.call(this, publicKey, RsaPublicKeyProcessor_getInstance());
|
|
646
|
-
this.
|
|
646
|
+
this.ep4_1 = publicKey;
|
|
647
647
|
}
|
|
648
648
|
function RsaPrivateKey(privateKey) {
|
|
649
649
|
WebCryptoEncodableKey.call(this, privateKey, RsaPrivateKeyProcessor_getInstance());
|
|
650
|
-
this.
|
|
650
|
+
this.hp4_1 = privateKey;
|
|
651
651
|
}
|
|
652
652
|
function WebCryptoRsa$keyPairWrapper$lambda($keyPairWrapper, this$0) {
|
|
653
653
|
return function (it) {
|
|
654
|
-
return $keyPairWrapper(this$0.
|
|
654
|
+
return $keyPairWrapper(this$0.jp4_1.gp3_1(it.publicKey), this$0.kp4_1.gp3_1(it.privateKey));
|
|
655
655
|
};
|
|
656
656
|
}
|
|
657
657
|
function WebCryptoRsa(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
|
|
658
|
-
this.
|
|
659
|
-
this.
|
|
660
|
-
this.
|
|
658
|
+
this.ip4_1 = algorithmName;
|
|
659
|
+
this.jp4_1 = publicKeyWrapper;
|
|
660
|
+
this.kp4_1 = privateKeyWrapper;
|
|
661
661
|
var tmp = this;
|
|
662
|
-
var tmp0 = this.
|
|
662
|
+
var tmp0 = this.jp4_1.fp3_1;
|
|
663
663
|
// Inline function 'kotlin.collections.plus' call
|
|
664
|
-
var elements = this.
|
|
664
|
+
var elements = this.kp4_1.fp3_1;
|
|
665
665
|
// Inline function 'kotlin.js.asDynamic' call
|
|
666
|
-
tmp.
|
|
666
|
+
tmp.lp4_1 = tmp0.concat(elements);
|
|
667
667
|
var tmp_0 = this;
|
|
668
|
-
tmp_0.
|
|
668
|
+
tmp_0.mp4_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
|
|
669
669
|
}
|
|
670
670
|
function RsaPublicKeyProcessor() {
|
|
671
671
|
RsaPublicKeyProcessor_instance = this;
|
|
672
672
|
WebCryptoKeyProcessor.call(this);
|
|
673
673
|
}
|
|
674
|
-
protoOf(RsaPublicKeyProcessor).
|
|
674
|
+
protoOf(RsaPublicKeyProcessor).np4 = function (format) {
|
|
675
675
|
var tmp;
|
|
676
676
|
if (equals(format, JWK_getInstance_1())) {
|
|
677
677
|
tmp = 'jwk';
|
|
@@ -682,28 +682,28 @@ protoOf(RsaPublicKeyProcessor).bp3 = function (format) {
|
|
|
682
682
|
}
|
|
683
683
|
return tmp;
|
|
684
684
|
};
|
|
685
|
-
protoOf(RsaPublicKeyProcessor).
|
|
686
|
-
return this.
|
|
685
|
+
protoOf(RsaPublicKeyProcessor).rp2 = function (format) {
|
|
686
|
+
return this.np4(format instanceof Format_3 ? format : THROW_CCE());
|
|
687
687
|
};
|
|
688
|
-
protoOf(RsaPublicKeyProcessor).
|
|
688
|
+
protoOf(RsaPublicKeyProcessor).op4 = function (algorithm, format, key) {
|
|
689
689
|
var tmp;
|
|
690
690
|
if (equals(format, JWK_getInstance_1())) {
|
|
691
691
|
tmp = key;
|
|
692
692
|
} else if (equals(format, Generic_getInstance_1())) {
|
|
693
693
|
tmp = key;
|
|
694
694
|
} else if (equals(format, Generic_getInstance_2())) {
|
|
695
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
695
|
+
tmp = unwrapPem(Companion_getInstance_10().cp2_1, key);
|
|
696
696
|
} else if (equals(format, PKCS1_getInstance())) {
|
|
697
697
|
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, key);
|
|
698
698
|
} else if (equals(format, PKCS1_getInstance_0())) {
|
|
699
|
-
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().
|
|
699
|
+
tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().ep2_1, key));
|
|
700
700
|
} else {
|
|
701
701
|
noWhenBranchMatchedException();
|
|
702
702
|
}
|
|
703
703
|
return tmp;
|
|
704
704
|
};
|
|
705
|
-
protoOf(RsaPublicKeyProcessor).
|
|
706
|
-
return this.
|
|
705
|
+
protoOf(RsaPublicKeyProcessor).tp2 = function (algorithm, format, key) {
|
|
706
|
+
return this.op4(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
|
|
707
707
|
};
|
|
708
708
|
var RsaPublicKeyProcessor_instance;
|
|
709
709
|
function RsaPublicKeyProcessor_getInstance() {
|
|
@@ -715,7 +715,7 @@ function RsaPrivateKeyProcessor() {
|
|
|
715
715
|
RsaPrivateKeyProcessor_instance = this;
|
|
716
716
|
WebCryptoKeyProcessor.call(this);
|
|
717
717
|
}
|
|
718
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
718
|
+
protoOf(RsaPrivateKeyProcessor).pp4 = function (format) {
|
|
719
719
|
var tmp;
|
|
720
720
|
if (equals(format, JWK_getInstance_2())) {
|
|
721
721
|
tmp = 'jwk';
|
|
@@ -726,28 +726,28 @@ protoOf(RsaPrivateKeyProcessor).dp3 = function (format) {
|
|
|
726
726
|
}
|
|
727
727
|
return tmp;
|
|
728
728
|
};
|
|
729
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
730
|
-
return this.
|
|
729
|
+
protoOf(RsaPrivateKeyProcessor).rp2 = function (format) {
|
|
730
|
+
return this.pp4(format instanceof Format_4 ? format : THROW_CCE());
|
|
731
731
|
};
|
|
732
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
732
|
+
protoOf(RsaPrivateKeyProcessor).qp4 = function (algorithm, format, key) {
|
|
733
733
|
var tmp;
|
|
734
734
|
if (equals(format, JWK_getInstance_2())) {
|
|
735
735
|
tmp = key;
|
|
736
736
|
} else if (equals(format, Generic_getInstance_3())) {
|
|
737
737
|
tmp = key;
|
|
738
738
|
} else if (equals(format, Generic_getInstance_4())) {
|
|
739
|
-
tmp = unwrapPem(Companion_getInstance_10().
|
|
739
|
+
tmp = unwrapPem(Companion_getInstance_10().dp2_1, key);
|
|
740
740
|
} else if (equals(format, PKCS1_getInstance_1())) {
|
|
741
741
|
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, key);
|
|
742
742
|
} else if (equals(format, PKCS1_getInstance_2())) {
|
|
743
|
-
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().
|
|
743
|
+
tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().fp2_1, key));
|
|
744
744
|
} else {
|
|
745
745
|
noWhenBranchMatchedException();
|
|
746
746
|
}
|
|
747
747
|
return tmp;
|
|
748
748
|
};
|
|
749
|
-
protoOf(RsaPrivateKeyProcessor).
|
|
750
|
-
return this.
|
|
749
|
+
protoOf(RsaPrivateKeyProcessor).tp2 = function (algorithm, format, key) {
|
|
750
|
+
return this.qp4(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
|
|
751
751
|
};
|
|
752
752
|
var RsaPrivateKeyProcessor_instance;
|
|
753
753
|
function RsaPrivateKeyProcessor_getInstance() {
|
|
@@ -756,8 +756,8 @@ function RsaPrivateKeyProcessor_getInstance() {
|
|
|
756
756
|
return RsaPrivateKeyProcessor_instance;
|
|
757
757
|
}
|
|
758
758
|
function RsaOaepKeyPair(publicKey, privateKey) {
|
|
759
|
-
this.
|
|
760
|
-
this.
|
|
759
|
+
this.rp4_1 = publicKey;
|
|
760
|
+
this.sp4_1 = privateKey;
|
|
761
761
|
}
|
|
762
762
|
function RsaOaepPublicKey(publicKey) {
|
|
763
763
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -807,8 +807,8 @@ function WebCryptoRsaOaep_getInstance() {
|
|
|
807
807
|
return WebCryptoRsaOaep_instance;
|
|
808
808
|
}
|
|
809
809
|
function RsaPkcs1KeyPair(publicKey, privateKey) {
|
|
810
|
-
this.
|
|
811
|
-
this.
|
|
810
|
+
this.tp4_1 = publicKey;
|
|
811
|
+
this.up4_1 = privateKey;
|
|
812
812
|
}
|
|
813
813
|
function RsaPkcs1PublicKey(publicKey) {
|
|
814
814
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -858,8 +858,8 @@ function WebCryptoRsaPkcs1_getInstance() {
|
|
|
858
858
|
return WebCryptoRsaPkcs1_instance;
|
|
859
859
|
}
|
|
860
860
|
function RsaPssKeyPair(publicKey, privateKey) {
|
|
861
|
-
this.
|
|
862
|
-
this.
|
|
861
|
+
this.vp4_1 = publicKey;
|
|
862
|
+
this.wp4_1 = privateKey;
|
|
863
863
|
}
|
|
864
864
|
function RsaPssPublicKey(publicKey) {
|
|
865
865
|
RsaPublicKey.call(this, publicKey);
|
|
@@ -919,7 +919,7 @@ function hashAlgorithmName(_this__u8e3s4) {
|
|
|
919
919
|
} else if (equals(_this__u8e3s4, SHA512_getInstance())) {
|
|
920
920
|
tmp = 'SHA-512';
|
|
921
921
|
} else {
|
|
922
|
-
throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.
|
|
922
|
+
throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.mox_1);
|
|
923
923
|
}
|
|
924
924
|
return tmp;
|
|
925
925
|
}
|
|
@@ -927,14 +927,14 @@ function nonBlocking() {
|
|
|
927
927
|
throw IllegalStateException_init_$Create$('Only non-blocking(suspend) calls are supported in WebCrypto');
|
|
928
928
|
}
|
|
929
929
|
function WebCryptoEncodableKey(key, keyProcessor) {
|
|
930
|
-
this.
|
|
931
|
-
this.
|
|
930
|
+
this.xp4_1 = key;
|
|
931
|
+
this.yp4_1 = keyProcessor;
|
|
932
932
|
}
|
|
933
933
|
function $decodeFromByteArrayCOROUTINE$(_this__u8e3s4, format, bytes, resultContinuation) {
|
|
934
934
|
CoroutineImpl.call(this, resultContinuation);
|
|
935
|
-
this.
|
|
936
|
-
this.
|
|
937
|
-
this.
|
|
935
|
+
this.hp5_1 = _this__u8e3s4;
|
|
936
|
+
this.ip5_1 = format;
|
|
937
|
+
this.jp5_1 = bytes;
|
|
938
938
|
}
|
|
939
939
|
protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
|
|
940
940
|
var suspendResult = this.n9_1;
|
|
@@ -944,9 +944,9 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
|
|
|
944
944
|
switch (tmp) {
|
|
945
945
|
case 0:
|
|
946
946
|
this.m9_1 = 2;
|
|
947
|
-
this.
|
|
947
|
+
this.kp5_1 = this.hp5_1.np5_1.gp3_1;
|
|
948
948
|
this.l9_1 = 1;
|
|
949
|
-
suspendResult = WebCrypto_getInstance().
|
|
949
|
+
suspendResult = WebCrypto_getInstance().op5(this.hp5_1.mp5_1.rp2(this.ip5_1), this.hp5_1.mp5_1.tp2(this.hp5_1.lp5_1, this.ip5_1, this.jp5_1), this.hp5_1.lp5_1, true, this.hp5_1.np5_1.fp3_1, this);
|
|
950
950
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
951
951
|
return suspendResult;
|
|
952
952
|
}
|
|
@@ -954,7 +954,7 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
|
|
|
954
954
|
continue $sm;
|
|
955
955
|
case 1:
|
|
956
956
|
var ARGUMENT = suspendResult;
|
|
957
|
-
return this.
|
|
957
|
+
return this.kp5_1(ARGUMENT);
|
|
958
958
|
case 2:
|
|
959
959
|
throw this.o9_1;
|
|
960
960
|
}
|
|
@@ -970,36 +970,36 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
|
|
|
970
970
|
while (true);
|
|
971
971
|
};
|
|
972
972
|
function WebCryptoKeyDecoder(algorithm, keyProcessor, keyWrapper) {
|
|
973
|
-
this.
|
|
974
|
-
this.
|
|
975
|
-
this.
|
|
973
|
+
this.lp5_1 = algorithm;
|
|
974
|
+
this.mp5_1 = keyProcessor;
|
|
975
|
+
this.np5_1 = keyWrapper;
|
|
976
976
|
}
|
|
977
|
-
protoOf(WebCryptoKeyDecoder).
|
|
977
|
+
protoOf(WebCryptoKeyDecoder).eoy = function (format, bytes, $completion) {
|
|
978
978
|
var tmp = new $decodeFromByteArrayCOROUTINE$(this, format, bytes, $completion);
|
|
979
979
|
tmp.n9_1 = Unit_instance;
|
|
980
980
|
tmp.o9_1 = null;
|
|
981
981
|
return tmp.t9();
|
|
982
982
|
};
|
|
983
|
-
protoOf(WebCryptoKeyDecoder).
|
|
983
|
+
protoOf(WebCryptoKeyDecoder).foy = function (format, bytes) {
|
|
984
984
|
nonBlocking();
|
|
985
985
|
};
|
|
986
986
|
function WebCryptoKeyProcessor() {
|
|
987
987
|
}
|
|
988
988
|
function WebCryptoKeyWrapper(usages, wrap) {
|
|
989
|
-
this.
|
|
990
|
-
this.
|
|
989
|
+
this.fp3_1 = usages;
|
|
990
|
+
this.gp3_1 = wrap;
|
|
991
991
|
}
|
|
992
992
|
function WebCryptoSignatureGenerator(algorithm, key) {
|
|
993
|
-
this.
|
|
994
|
-
this.
|
|
993
|
+
this.pp5_1 = algorithm;
|
|
994
|
+
this.qp5_1 = key;
|
|
995
995
|
}
|
|
996
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
997
|
-
return WebCrypto_getInstance().
|
|
996
|
+
protoOf(WebCryptoSignatureGenerator).moy = function (data, $completion) {
|
|
997
|
+
return WebCrypto_getInstance().rp5(this.pp5_1, this.qp5_1, data, $completion);
|
|
998
998
|
};
|
|
999
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
999
|
+
protoOf(WebCryptoSignatureGenerator).loy = function () {
|
|
1000
1000
|
nonBlocking();
|
|
1001
1001
|
};
|
|
1002
|
-
protoOf(WebCryptoSignatureGenerator).
|
|
1002
|
+
protoOf(WebCryptoSignatureGenerator).noy = function (data) {
|
|
1003
1003
|
nonBlocking();
|
|
1004
1004
|
};
|
|
1005
1005
|
function get_initHook() {
|
|
@@ -1007,7 +1007,7 @@ function get_initHook() {
|
|
|
1007
1007
|
}
|
|
1008
1008
|
var initHook_0;
|
|
1009
1009
|
function initHook$init$() {
|
|
1010
|
-
CryptographySystem_getInstance().
|
|
1010
|
+
CryptographySystem_getInstance().yox(get_defaultProvider(), 100);
|
|
1011
1011
|
return Unit_instance;
|
|
1012
1012
|
}
|
|
1013
1013
|
function get_ecKeyAlgorithmNamedCurve(_this__u8e3s4) {
|
|
@@ -1046,9 +1046,9 @@ function getCrypto() {
|
|
|
1046
1046
|
}
|
|
1047
1047
|
function $digestCOROUTINE$(_this__u8e3s4, algorithmName, data, resultContinuation) {
|
|
1048
1048
|
CoroutineImpl.call(this, resultContinuation);
|
|
1049
|
-
this.
|
|
1050
|
-
this.
|
|
1051
|
-
this.
|
|
1049
|
+
this.ap6_1 = _this__u8e3s4;
|
|
1050
|
+
this.bp6_1 = algorithmName;
|
|
1051
|
+
this.cp6_1 = data;
|
|
1052
1052
|
}
|
|
1053
1053
|
protoOf($digestCOROUTINE$).t9 = function () {
|
|
1054
1054
|
var suspendResult = this.n9_1;
|
|
@@ -1059,7 +1059,7 @@ protoOf($digestCOROUTINE$).t9 = function () {
|
|
|
1059
1059
|
case 0:
|
|
1060
1060
|
this.m9_1 = 2;
|
|
1061
1061
|
this.l9_1 = 1;
|
|
1062
|
-
suspendResult = await_0(this.
|
|
1062
|
+
suspendResult = await_0(this.ap6_1.xp2_1.digest(this.bp6_1, this.cp6_1), this);
|
|
1063
1063
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
1064
1064
|
return suspendResult;
|
|
1065
1065
|
}
|
|
@@ -1084,10 +1084,10 @@ protoOf($digestCOROUTINE$).t9 = function () {
|
|
|
1084
1084
|
};
|
|
1085
1085
|
function $signCOROUTINE$(_this__u8e3s4, algorithm, key, data, resultContinuation) {
|
|
1086
1086
|
CoroutineImpl.call(this, resultContinuation);
|
|
1087
|
-
this.
|
|
1088
|
-
this.
|
|
1089
|
-
this.
|
|
1090
|
-
this.
|
|
1087
|
+
this.lp6_1 = _this__u8e3s4;
|
|
1088
|
+
this.mp6_1 = algorithm;
|
|
1089
|
+
this.np6_1 = key;
|
|
1090
|
+
this.op6_1 = data;
|
|
1091
1091
|
}
|
|
1092
1092
|
protoOf($signCOROUTINE$).t9 = function () {
|
|
1093
1093
|
var suspendResult = this.n9_1;
|
|
@@ -1098,7 +1098,7 @@ protoOf($signCOROUTINE$).t9 = function () {
|
|
|
1098
1098
|
case 0:
|
|
1099
1099
|
this.m9_1 = 2;
|
|
1100
1100
|
this.l9_1 = 1;
|
|
1101
|
-
suspendResult = await_0(this.
|
|
1101
|
+
suspendResult = await_0(this.lp6_1.xp2_1.sign(this.mp6_1, this.np6_1, this.op6_1), this);
|
|
1102
1102
|
if (suspendResult === get_COROUTINE_SUSPENDED()) {
|
|
1103
1103
|
return suspendResult;
|
|
1104
1104
|
}
|
|
@@ -1123,23 +1123,23 @@ protoOf($signCOROUTINE$).t9 = function () {
|
|
|
1123
1123
|
};
|
|
1124
1124
|
function WebCrypto() {
|
|
1125
1125
|
WebCrypto_instance = this;
|
|
1126
|
-
this.
|
|
1126
|
+
this.xp2_1 = getSubtleCrypto();
|
|
1127
1127
|
}
|
|
1128
|
-
protoOf(WebCrypto).
|
|
1128
|
+
protoOf(WebCrypto).yp2 = function (algorithmName, data, $completion) {
|
|
1129
1129
|
var tmp = new $digestCOROUTINE$(this, algorithmName, data, $completion);
|
|
1130
1130
|
tmp.n9_1 = Unit_instance;
|
|
1131
1131
|
tmp.o9_1 = null;
|
|
1132
1132
|
return tmp.t9();
|
|
1133
1133
|
};
|
|
1134
|
-
protoOf(WebCrypto).
|
|
1134
|
+
protoOf(WebCrypto).rp5 = function (algorithm, key, data, $completion) {
|
|
1135
1135
|
var tmp = new $signCOROUTINE$(this, algorithm, key, data, $completion);
|
|
1136
1136
|
tmp.n9_1 = Unit_instance;
|
|
1137
1137
|
tmp.o9_1 = null;
|
|
1138
1138
|
return tmp.t9();
|
|
1139
1139
|
};
|
|
1140
|
-
protoOf(WebCrypto).
|
|
1140
|
+
protoOf(WebCrypto).op5 = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
|
|
1141
1141
|
var key = format === 'jwk' ? JSON.parse(decodeToString(keyData)) : keyData;
|
|
1142
|
-
return await_0(this.
|
|
1142
|
+
return await_0(this.xp2_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
|
|
1143
1143
|
};
|
|
1144
1144
|
var WebCrypto_instance;
|
|
1145
1145
|
function WebCrypto_getInstance() {
|