@solibo/solibo-sdk 1.1.12 → 1.1.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -166,8 +166,8 @@ function WebCryptoCryptographyProvider() {
166
166
  WebCryptoCryptographyProvider_instance = this;
167
167
  CryptographyProvider.call(this);
168
168
  }
169
- protoOf(WebCryptoCryptographyProvider).eow = function (identifier) {
170
- var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().vp0_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().wp0_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().xp0_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().yp0_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
169
+ protoOf(WebCryptoCryptographyProvider).qox = function (identifier) {
170
+ var tmp = equals(identifier, SHA1_getInstance()) ? Companion_getInstance_11().hp2_1 : equals(identifier, SHA256_getInstance()) ? Companion_getInstance_11().ip2_1 : equals(identifier, SHA384_getInstance()) ? Companion_getInstance_11().jp2_1 : equals(identifier, SHA512_getInstance()) ? Companion_getInstance_11().kp2_1 : equals(identifier, Companion_getInstance_9()) ? WebCryptoHmac_getInstance() : equals(identifier, Companion_getInstance_8()) ? WebCryptoAesCbc_getInstance() : equals(identifier, Companion_getInstance_7()) ? WebCryptoAesCtr_getInstance() : equals(identifier, Companion_getInstance_6()) ? WebCryptoAesGcm_getInstance() : equals(identifier, Companion_getInstance_5()) ? WebCryptoRsaOaep_getInstance() : equals(identifier, Companion_getInstance_4()) ? WebCryptoRsaPss_getInstance() : equals(identifier, Companion_getInstance_3()) ? WebCryptoRsaPkcs1_getInstance() : equals(identifier, Companion_getInstance_2()) ? WebCryptoEcdsa_getInstance() : equals(identifier, Companion_getInstance_1()) ? WebCryptoEcdh_getInstance() : equals(identifier, Companion_getInstance_0()) ? WebCryptoPbkdf2_instance : equals(identifier, Companion_getInstance()) ? WebCryptoHkdf_instance : null;
171
171
  return (tmp == null ? true : isInterface(tmp, CryptographyAlgorithm)) ? tmp : THROW_CCE();
172
172
  };
173
173
  var WebCryptoCryptographyProvider_instance;
@@ -190,17 +190,17 @@ function _init_properties_WebCryptoCryptographyProvider_kt__i22tls() {
190
190
  }
191
191
  function AesKey(key) {
192
192
  WebCryptoEncodableKey.call(this, key, AesKeyProcessor_getInstance());
193
- this.bp1_1 = key;
193
+ this.np2_1 = key;
194
194
  }
195
195
  function WebCryptoAes(algorithmName, keyWrapper) {
196
- this.cp1_1 = algorithmName;
197
- this.dp1_1 = keyWrapper;
196
+ this.op2_1 = algorithmName;
197
+ this.pp2_1 = keyWrapper;
198
198
  }
199
199
  function AesKeyProcessor() {
200
200
  AesKeyProcessor_instance = this;
201
201
  WebCryptoKeyProcessor.call(this);
202
202
  }
203
- protoOf(AesKeyProcessor).ep1 = function (format) {
203
+ protoOf(AesKeyProcessor).qp2 = function (format) {
204
204
  var tmp;
205
205
  switch (format.a1_1) {
206
206
  case 0:
@@ -215,14 +215,14 @@ protoOf(AesKeyProcessor).ep1 = function (format) {
215
215
  }
216
216
  return tmp;
217
217
  };
218
- protoOf(AesKeyProcessor).fp1 = function (format) {
219
- return this.ep1(format instanceof Format ? format : THROW_CCE());
218
+ protoOf(AesKeyProcessor).rp2 = function (format) {
219
+ return this.qp2(format instanceof Format ? format : THROW_CCE());
220
220
  };
221
- protoOf(AesKeyProcessor).gp1 = function (algorithm, format, key) {
221
+ protoOf(AesKeyProcessor).sp2 = function (algorithm, format, key) {
222
222
  return key;
223
223
  };
224
- protoOf(AesKeyProcessor).hp1 = function (algorithm, format, key) {
225
- return this.gp1(algorithm, format instanceof Format ? format : THROW_CCE(), key);
224
+ protoOf(AesKeyProcessor).tp2 = function (algorithm, format, key) {
225
+ return this.sp2(algorithm, format instanceof Format ? format : THROW_CCE(), key);
226
226
  };
227
227
  var AesKeyProcessor_instance;
228
228
  function AesKeyProcessor_getInstance() {
@@ -304,10 +304,10 @@ function WebCryptoAesGcm_getInstance() {
304
304
  }
305
305
  function Companion() {
306
306
  Companion_instance_3 = this;
307
- this.vp0_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
308
- this.wp0_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
309
- this.xp0_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
310
- this.yp0_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
307
+ this.hp2_1 = new WebCryptoDigest('SHA-1', SHA1_getInstance());
308
+ this.ip2_1 = new WebCryptoDigest('SHA-256', SHA256_getInstance());
309
+ this.jp2_1 = new WebCryptoDigest('SHA-384', SHA384_getInstance());
310
+ this.kp2_1 = new WebCryptoDigest('SHA-512', SHA512_getInstance());
311
311
  }
312
312
  var Companion_instance_3;
313
313
  function Companion_getInstance_11() {
@@ -317,52 +317,52 @@ function Companion_getInstance_11() {
317
317
  }
318
318
  function WebCryptoDigest(algorithm, id) {
319
319
  Companion_getInstance_11();
320
- this.ip1_1 = algorithm;
321
- this.jp1_1 = id;
320
+ this.up2_1 = algorithm;
321
+ this.vp2_1 = id;
322
322
  }
323
- protoOf(WebCryptoDigest).kp1 = function () {
323
+ protoOf(WebCryptoDigest).wp2 = function () {
324
324
  return this;
325
325
  };
326
- protoOf(WebCryptoDigest).vow = function (data, $completion) {
327
- return WebCrypto_getInstance().mp1(this.ip1_1, data, $completion);
326
+ protoOf(WebCryptoDigest).hoy = function (data, $completion) {
327
+ return WebCrypto_getInstance().yp2(this.up2_1, data, $completion);
328
328
  };
329
- protoOf(WebCryptoDigest).uow = function () {
329
+ protoOf(WebCryptoDigest).goy = function () {
330
330
  nonBlocking();
331
331
  };
332
- protoOf(WebCryptoDigest).wow = function (data) {
332
+ protoOf(WebCryptoDigest).ioy = function (data) {
333
333
  nonBlocking();
334
334
  };
335
335
  function EcPublicKey(publicKey) {
336
336
  WebCryptoEncodableKey.call(this, publicKey, EcPublicKeyProcessor_getInstance());
337
- this.pp1_1 = publicKey;
337
+ this.bp3_1 = publicKey;
338
338
  }
339
339
  function EcPrivateKey_0(privateKey) {
340
340
  WebCryptoEncodableKey.call(this, privateKey, EcPrivateKeyProcessor_getInstance());
341
- this.sp1_1 = privateKey;
341
+ this.ep3_1 = privateKey;
342
342
  }
343
343
  function WebCryptoEc$keyPairWrapper$lambda($keyPairWrapper, this$0) {
344
344
  return function (it) {
345
- return $keyPairWrapper(this$0.wp1_1.up1_1(it.publicKey), this$0.xp1_1.up1_1(it.privateKey));
345
+ return $keyPairWrapper(this$0.ip3_1.gp3_1(it.publicKey), this$0.jp3_1.gp3_1(it.privateKey));
346
346
  };
347
347
  }
348
348
  function WebCryptoEc(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
349
- this.vp1_1 = algorithmName;
350
- this.wp1_1 = publicKeyWrapper;
351
- this.xp1_1 = privateKeyWrapper;
349
+ this.hp3_1 = algorithmName;
350
+ this.ip3_1 = publicKeyWrapper;
351
+ this.jp3_1 = privateKeyWrapper;
352
352
  var tmp = this;
353
- var tmp0 = this.wp1_1.tp1_1;
353
+ var tmp0 = this.ip3_1.fp3_1;
354
354
  // Inline function 'kotlin.collections.plus' call
355
- var elements = this.xp1_1.tp1_1;
355
+ var elements = this.jp3_1.fp3_1;
356
356
  // Inline function 'kotlin.js.asDynamic' call
357
- tmp.yp1_1 = tmp0.concat(elements);
357
+ tmp.kp3_1 = tmp0.concat(elements);
358
358
  var tmp_0 = this;
359
- tmp_0.zp1_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
359
+ tmp_0.lp3_1 = WebCryptoEc$keyPairWrapper$lambda(keyPairWrapper, this);
360
360
  }
361
361
  function EcPublicKeyProcessor() {
362
362
  EcPublicKeyProcessor_instance = this;
363
363
  WebCryptoKeyProcessor.call(this);
364
364
  }
365
- protoOf(EcPublicKeyProcessor).ap2 = function (format) {
365
+ protoOf(EcPublicKeyProcessor).mp3 = function (format) {
366
366
  var tmp;
367
367
  if (equals(format, JWK_getInstance())) {
368
368
  tmp = 'jwk';
@@ -375,10 +375,10 @@ protoOf(EcPublicKeyProcessor).ap2 = function (format) {
375
375
  }
376
376
  return tmp;
377
377
  };
378
- protoOf(EcPublicKeyProcessor).fp1 = function (format) {
379
- return this.ap2(format instanceof Format_0 ? format : THROW_CCE());
378
+ protoOf(EcPublicKeyProcessor).rp2 = function (format) {
379
+ return this.mp3(format instanceof Format_0 ? format : THROW_CCE());
380
380
  };
381
- protoOf(EcPublicKeyProcessor).bp2 = function (algorithm, format, key) {
381
+ protoOf(EcPublicKeyProcessor).np3 = function (algorithm, format, key) {
382
382
  var tmp;
383
383
  if (equals(format, JWK_getInstance())) {
384
384
  tmp = key;
@@ -387,14 +387,14 @@ protoOf(EcPublicKeyProcessor).bp2 = function (algorithm, format, key) {
387
387
  } else if (equals(format, DER_getInstance())) {
388
388
  tmp = key;
389
389
  } else if (equals(format, PEM_getInstance())) {
390
- tmp = unwrapPem(Companion_getInstance_10().qp0_1, key);
390
+ tmp = unwrapPem(Companion_getInstance_10().cp2_1, key);
391
391
  } else {
392
392
  noWhenBranchMatchedException();
393
393
  }
394
394
  return tmp;
395
395
  };
396
- protoOf(EcPublicKeyProcessor).hp1 = function (algorithm, format, key) {
397
- return this.bp2(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
396
+ protoOf(EcPublicKeyProcessor).tp2 = function (algorithm, format, key) {
397
+ return this.np3(algorithm, format instanceof Format_0 ? format : THROW_CCE(), key);
398
398
  };
399
399
  var EcPublicKeyProcessor_instance;
400
400
  function EcPublicKeyProcessor_getInstance() {
@@ -406,7 +406,7 @@ function EcPrivateKeyProcessor() {
406
406
  EcPrivateKeyProcessor_instance = this;
407
407
  WebCryptoKeyProcessor.call(this);
408
408
  }
409
- protoOf(EcPrivateKeyProcessor).cp2 = function (format) {
409
+ protoOf(EcPrivateKeyProcessor).op3 = function (format) {
410
410
  var tmp;
411
411
  if (equals(format, JWK_getInstance_0())) {
412
412
  tmp = 'jwk';
@@ -417,21 +417,21 @@ protoOf(EcPrivateKeyProcessor).cp2 = function (format) {
417
417
  }
418
418
  return tmp;
419
419
  };
420
- protoOf(EcPrivateKeyProcessor).fp1 = function (format) {
421
- return this.cp2(format instanceof Format_1 ? format : THROW_CCE());
420
+ protoOf(EcPrivateKeyProcessor).rp2 = function (format) {
421
+ return this.op3(format instanceof Format_1 ? format : THROW_CCE());
422
422
  };
423
- protoOf(EcPrivateKeyProcessor).dp2 = function (algorithm, format, key) {
423
+ protoOf(EcPrivateKeyProcessor).pp3 = function (algorithm, format, key) {
424
424
  var tmp;
425
425
  if (equals(format, JWK_getInstance_0())) {
426
426
  tmp = key;
427
427
  } else if (equals(format, RAW_getInstance())) {
428
428
  var namedCurve = get_ecKeyAlgorithmNamedCurve(algorithm);
429
429
  var tmp_0;
430
- if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.pow())) {
430
+ if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.boy())) {
431
431
  tmp_0 = get_secp256r1(Companion_instance_1);
432
- } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.qow())) {
432
+ } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.coy())) {
433
433
  tmp_0 = get_secp384r1(Companion_instance_1);
434
- } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.row())) {
434
+ } else if (namedCurve === _Curve___get_name__impl__klrusc(Companion_instance.doy())) {
435
435
  tmp_0 = get_secp521r1(Companion_instance_1);
436
436
  } else {
437
437
  var message = 'Unknown curve: ' + namedCurve;
@@ -442,18 +442,18 @@ protoOf(EcPrivateKeyProcessor).dp2 = function (algorithm, format, key) {
442
442
  } else if (equals(format, Generic_getInstance())) {
443
443
  tmp = key;
444
444
  } else if (equals(format, Generic_getInstance_0())) {
445
- tmp = unwrapPem(Companion_getInstance_10().rp0_1, key);
445
+ tmp = unwrapPem(Companion_getInstance_10().dp2_1, key);
446
446
  } else if (equals(format, SEC1_getInstance())) {
447
447
  tmp = convertEcPrivateKeyFromSec1ToPkcs8(key);
448
448
  } else if (equals(format, SEC1_getInstance_0())) {
449
- tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().up0_1, key));
449
+ tmp = convertEcPrivateKeyFromSec1ToPkcs8(unwrapPem(Companion_getInstance_10().gp2_1, key));
450
450
  } else {
451
451
  noWhenBranchMatchedException();
452
452
  }
453
453
  return tmp;
454
454
  };
455
- protoOf(EcPrivateKeyProcessor).hp1 = function (algorithm, format, key) {
456
- return this.dp2(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
455
+ protoOf(EcPrivateKeyProcessor).tp2 = function (algorithm, format, key) {
456
+ return this.pp3(algorithm, format instanceof Format_1 ? format : THROW_CCE(), key);
457
457
  };
458
458
  var EcPrivateKeyProcessor_instance;
459
459
  function EcPrivateKeyProcessor_getInstance() {
@@ -462,8 +462,8 @@ function EcPrivateKeyProcessor_getInstance() {
462
462
  return EcPrivateKeyProcessor_instance;
463
463
  }
464
464
  function EcdhKeyPair(publicKey, privateKey) {
465
- this.ep2_1 = publicKey;
466
- this.fp2_1 = privateKey;
465
+ this.qp3_1 = publicKey;
466
+ this.rp3_1 = privateKey;
467
467
  }
468
468
  function EcdhPublicKey(publicKey) {
469
469
  EcPublicKey.call(this, publicKey);
@@ -513,8 +513,8 @@ function WebCryptoEcdh_getInstance() {
513
513
  return WebCryptoEcdh_instance;
514
514
  }
515
515
  function EcdsaKeyPair(publicKey, privateKey) {
516
- this.gp2_1 = publicKey;
517
- this.hp2_1 = privateKey;
516
+ this.sp3_1 = publicKey;
517
+ this.tp3_1 = privateKey;
518
518
  }
519
519
  function EcdsaPublicKey(publicKey) {
520
520
  EcPublicKey.call(this, publicKey);
@@ -571,10 +571,10 @@ function WebCryptoHkdf_getInstance() {
571
571
  }
572
572
  function HmacKey(key) {
573
573
  WebCryptoEncodableKey.call(this, key, HmacKeyProcessor_getInstance());
574
- this.kp2_1 = key;
574
+ this.wp3_1 = key;
575
575
  }
576
- protoOf(HmacKey).lp2 = function () {
577
- return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.kp2_1);
576
+ protoOf(HmacKey).xp3 = function () {
577
+ return new WebCryptoSignatureGenerator(Algorithm('HMAC'), this.wp3_1);
578
578
  };
579
579
  function WebCryptoHmac$HmacKey$_init_$ref_enwl2t() {
580
580
  var l = function (p0) {
@@ -590,10 +590,10 @@ function WebCryptoHmac() {
590
590
  // Inline function 'kotlin.js.unsafeCast' call
591
591
  // Inline function 'kotlin.js.asDynamic' call
592
592
  var tmp_0 = ['sign', 'verify'];
593
- tmp.mp2_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
593
+ tmp.yp3_1 = new WebCryptoKeyWrapper(tmp_0, WebCryptoHmac$HmacKey$_init_$ref_enwl2t());
594
594
  }
595
- protoOf(WebCryptoHmac).np2 = function (digest) {
596
- return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.mp2_1);
595
+ protoOf(WebCryptoHmac).zp3 = function (digest) {
596
+ return new WebCryptoKeyDecoder(HmacKeyAlgorithm(hashAlgorithmName(digest), null), HmacKeyProcessor_getInstance(), this.yp3_1);
597
597
  };
598
598
  var WebCryptoHmac_instance;
599
599
  function WebCryptoHmac_getInstance() {
@@ -605,7 +605,7 @@ function HmacKeyProcessor() {
605
605
  HmacKeyProcessor_instance = this;
606
606
  WebCryptoKeyProcessor.call(this);
607
607
  }
608
- protoOf(HmacKeyProcessor).op2 = function (format) {
608
+ protoOf(HmacKeyProcessor).ap4 = function (format) {
609
609
  var tmp;
610
610
  switch (format.a1_1) {
611
611
  case 0:
@@ -620,14 +620,14 @@ protoOf(HmacKeyProcessor).op2 = function (format) {
620
620
  }
621
621
  return tmp;
622
622
  };
623
- protoOf(HmacKeyProcessor).fp1 = function (format) {
624
- return this.op2(format instanceof Format_2 ? format : THROW_CCE());
623
+ protoOf(HmacKeyProcessor).rp2 = function (format) {
624
+ return this.ap4(format instanceof Format_2 ? format : THROW_CCE());
625
625
  };
626
- protoOf(HmacKeyProcessor).pp2 = function (algorithm, format, key) {
626
+ protoOf(HmacKeyProcessor).bp4 = function (algorithm, format, key) {
627
627
  return key;
628
628
  };
629
- protoOf(HmacKeyProcessor).hp1 = function (algorithm, format, key) {
630
- return this.pp2(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
629
+ protoOf(HmacKeyProcessor).tp2 = function (algorithm, format, key) {
630
+ return this.bp4(algorithm, format instanceof Format_2 ? format : THROW_CCE(), key);
631
631
  };
632
632
  var HmacKeyProcessor_instance;
633
633
  function HmacKeyProcessor_getInstance() {
@@ -643,35 +643,35 @@ function WebCryptoPbkdf2_getInstance() {
643
643
  }
644
644
  function RsaPublicKey(publicKey) {
645
645
  WebCryptoEncodableKey.call(this, publicKey, RsaPublicKeyProcessor_getInstance());
646
- this.sp2_1 = publicKey;
646
+ this.ep4_1 = publicKey;
647
647
  }
648
648
  function RsaPrivateKey(privateKey) {
649
649
  WebCryptoEncodableKey.call(this, privateKey, RsaPrivateKeyProcessor_getInstance());
650
- this.vp2_1 = privateKey;
650
+ this.hp4_1 = privateKey;
651
651
  }
652
652
  function WebCryptoRsa$keyPairWrapper$lambda($keyPairWrapper, this$0) {
653
653
  return function (it) {
654
- return $keyPairWrapper(this$0.xp2_1.up1_1(it.publicKey), this$0.yp2_1.up1_1(it.privateKey));
654
+ return $keyPairWrapper(this$0.jp4_1.gp3_1(it.publicKey), this$0.kp4_1.gp3_1(it.privateKey));
655
655
  };
656
656
  }
657
657
  function WebCryptoRsa(algorithmName, publicKeyWrapper, privateKeyWrapper, keyPairWrapper) {
658
- this.wp2_1 = algorithmName;
659
- this.xp2_1 = publicKeyWrapper;
660
- this.yp2_1 = privateKeyWrapper;
658
+ this.ip4_1 = algorithmName;
659
+ this.jp4_1 = publicKeyWrapper;
660
+ this.kp4_1 = privateKeyWrapper;
661
661
  var tmp = this;
662
- var tmp0 = this.xp2_1.tp1_1;
662
+ var tmp0 = this.jp4_1.fp3_1;
663
663
  // Inline function 'kotlin.collections.plus' call
664
- var elements = this.yp2_1.tp1_1;
664
+ var elements = this.kp4_1.fp3_1;
665
665
  // Inline function 'kotlin.js.asDynamic' call
666
- tmp.zp2_1 = tmp0.concat(elements);
666
+ tmp.lp4_1 = tmp0.concat(elements);
667
667
  var tmp_0 = this;
668
- tmp_0.ap3_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
668
+ tmp_0.mp4_1 = WebCryptoRsa$keyPairWrapper$lambda(keyPairWrapper, this);
669
669
  }
670
670
  function RsaPublicKeyProcessor() {
671
671
  RsaPublicKeyProcessor_instance = this;
672
672
  WebCryptoKeyProcessor.call(this);
673
673
  }
674
- protoOf(RsaPublicKeyProcessor).bp3 = function (format) {
674
+ protoOf(RsaPublicKeyProcessor).np4 = function (format) {
675
675
  var tmp;
676
676
  if (equals(format, JWK_getInstance_1())) {
677
677
  tmp = 'jwk';
@@ -682,28 +682,28 @@ protoOf(RsaPublicKeyProcessor).bp3 = function (format) {
682
682
  }
683
683
  return tmp;
684
684
  };
685
- protoOf(RsaPublicKeyProcessor).fp1 = function (format) {
686
- return this.bp3(format instanceof Format_3 ? format : THROW_CCE());
685
+ protoOf(RsaPublicKeyProcessor).rp2 = function (format) {
686
+ return this.np4(format instanceof Format_3 ? format : THROW_CCE());
687
687
  };
688
- protoOf(RsaPublicKeyProcessor).cp3 = function (algorithm, format, key) {
688
+ protoOf(RsaPublicKeyProcessor).op4 = function (algorithm, format, key) {
689
689
  var tmp;
690
690
  if (equals(format, JWK_getInstance_1())) {
691
691
  tmp = key;
692
692
  } else if (equals(format, Generic_getInstance_1())) {
693
693
  tmp = key;
694
694
  } else if (equals(format, Generic_getInstance_2())) {
695
- tmp = unwrapPem(Companion_getInstance_10().qp0_1, key);
695
+ tmp = unwrapPem(Companion_getInstance_10().cp2_1, key);
696
696
  } else if (equals(format, PKCS1_getInstance())) {
697
697
  tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, key);
698
698
  } else if (equals(format, PKCS1_getInstance_0())) {
699
- tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().sp0_1, key));
699
+ tmp = wrapSubjectPublicKeyInfo(RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().ep2_1, key));
700
700
  } else {
701
701
  noWhenBranchMatchedException();
702
702
  }
703
703
  return tmp;
704
704
  };
705
- protoOf(RsaPublicKeyProcessor).hp1 = function (algorithm, format, key) {
706
- return this.cp3(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
705
+ protoOf(RsaPublicKeyProcessor).tp2 = function (algorithm, format, key) {
706
+ return this.op4(algorithm, format instanceof Format_3 ? format : THROW_CCE(), key);
707
707
  };
708
708
  var RsaPublicKeyProcessor_instance;
709
709
  function RsaPublicKeyProcessor_getInstance() {
@@ -715,7 +715,7 @@ function RsaPrivateKeyProcessor() {
715
715
  RsaPrivateKeyProcessor_instance = this;
716
716
  WebCryptoKeyProcessor.call(this);
717
717
  }
718
- protoOf(RsaPrivateKeyProcessor).dp3 = function (format) {
718
+ protoOf(RsaPrivateKeyProcessor).pp4 = function (format) {
719
719
  var tmp;
720
720
  if (equals(format, JWK_getInstance_2())) {
721
721
  tmp = 'jwk';
@@ -726,28 +726,28 @@ protoOf(RsaPrivateKeyProcessor).dp3 = function (format) {
726
726
  }
727
727
  return tmp;
728
728
  };
729
- protoOf(RsaPrivateKeyProcessor).fp1 = function (format) {
730
- return this.dp3(format instanceof Format_4 ? format : THROW_CCE());
729
+ protoOf(RsaPrivateKeyProcessor).rp2 = function (format) {
730
+ return this.pp4(format instanceof Format_4 ? format : THROW_CCE());
731
731
  };
732
- protoOf(RsaPrivateKeyProcessor).ep3 = function (algorithm, format, key) {
732
+ protoOf(RsaPrivateKeyProcessor).qp4 = function (algorithm, format, key) {
733
733
  var tmp;
734
734
  if (equals(format, JWK_getInstance_2())) {
735
735
  tmp = key;
736
736
  } else if (equals(format, Generic_getInstance_3())) {
737
737
  tmp = key;
738
738
  } else if (equals(format, Generic_getInstance_4())) {
739
- tmp = unwrapPem(Companion_getInstance_10().rp0_1, key);
739
+ tmp = unwrapPem(Companion_getInstance_10().dp2_1, key);
740
740
  } else if (equals(format, PKCS1_getInstance_1())) {
741
741
  tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, key);
742
742
  } else if (equals(format, PKCS1_getInstance_2())) {
743
- tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().tp0_1, key));
743
+ tmp = wrapPrivateKeyInfo(0, RsaKeyAlgorithmIdentifier_instance, unwrapPem(Companion_getInstance_10().fp2_1, key));
744
744
  } else {
745
745
  noWhenBranchMatchedException();
746
746
  }
747
747
  return tmp;
748
748
  };
749
- protoOf(RsaPrivateKeyProcessor).hp1 = function (algorithm, format, key) {
750
- return this.ep3(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
749
+ protoOf(RsaPrivateKeyProcessor).tp2 = function (algorithm, format, key) {
750
+ return this.qp4(algorithm, format instanceof Format_4 ? format : THROW_CCE(), key);
751
751
  };
752
752
  var RsaPrivateKeyProcessor_instance;
753
753
  function RsaPrivateKeyProcessor_getInstance() {
@@ -756,8 +756,8 @@ function RsaPrivateKeyProcessor_getInstance() {
756
756
  return RsaPrivateKeyProcessor_instance;
757
757
  }
758
758
  function RsaOaepKeyPair(publicKey, privateKey) {
759
- this.fp3_1 = publicKey;
760
- this.gp3_1 = privateKey;
759
+ this.rp4_1 = publicKey;
760
+ this.sp4_1 = privateKey;
761
761
  }
762
762
  function RsaOaepPublicKey(publicKey) {
763
763
  RsaPublicKey.call(this, publicKey);
@@ -807,8 +807,8 @@ function WebCryptoRsaOaep_getInstance() {
807
807
  return WebCryptoRsaOaep_instance;
808
808
  }
809
809
  function RsaPkcs1KeyPair(publicKey, privateKey) {
810
- this.hp3_1 = publicKey;
811
- this.ip3_1 = privateKey;
810
+ this.tp4_1 = publicKey;
811
+ this.up4_1 = privateKey;
812
812
  }
813
813
  function RsaPkcs1PublicKey(publicKey) {
814
814
  RsaPublicKey.call(this, publicKey);
@@ -858,8 +858,8 @@ function WebCryptoRsaPkcs1_getInstance() {
858
858
  return WebCryptoRsaPkcs1_instance;
859
859
  }
860
860
  function RsaPssKeyPair(publicKey, privateKey) {
861
- this.jp3_1 = publicKey;
862
- this.kp3_1 = privateKey;
861
+ this.vp4_1 = publicKey;
862
+ this.wp4_1 = privateKey;
863
863
  }
864
864
  function RsaPssPublicKey(publicKey) {
865
865
  RsaPublicKey.call(this, publicKey);
@@ -919,7 +919,7 @@ function hashAlgorithmName(_this__u8e3s4) {
919
919
  } else if (equals(_this__u8e3s4, SHA512_getInstance())) {
920
920
  tmp = 'SHA-512';
921
921
  } else {
922
- throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.aow_1);
922
+ throw IllegalStateException_init_$Create$('Unsupported hash algorithm: ' + _this__u8e3s4.mox_1);
923
923
  }
924
924
  return tmp;
925
925
  }
@@ -927,14 +927,14 @@ function nonBlocking() {
927
927
  throw IllegalStateException_init_$Create$('Only non-blocking(suspend) calls are supported in WebCrypto');
928
928
  }
929
929
  function WebCryptoEncodableKey(key, keyProcessor) {
930
- this.lp3_1 = key;
931
- this.mp3_1 = keyProcessor;
930
+ this.xp4_1 = key;
931
+ this.yp4_1 = keyProcessor;
932
932
  }
933
933
  function $decodeFromByteArrayCOROUTINE$(_this__u8e3s4, format, bytes, resultContinuation) {
934
934
  CoroutineImpl.call(this, resultContinuation);
935
- this.vp3_1 = _this__u8e3s4;
936
- this.wp3_1 = format;
937
- this.xp3_1 = bytes;
935
+ this.hp5_1 = _this__u8e3s4;
936
+ this.ip5_1 = format;
937
+ this.jp5_1 = bytes;
938
938
  }
939
939
  protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
940
940
  var suspendResult = this.n9_1;
@@ -944,9 +944,9 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
944
944
  switch (tmp) {
945
945
  case 0:
946
946
  this.m9_1 = 2;
947
- this.yp3_1 = this.vp3_1.bp4_1.up1_1;
947
+ this.kp5_1 = this.hp5_1.np5_1.gp3_1;
948
948
  this.l9_1 = 1;
949
- suspendResult = WebCrypto_getInstance().cp4(this.vp3_1.ap4_1.fp1(this.wp3_1), this.vp3_1.ap4_1.hp1(this.vp3_1.zp3_1, this.wp3_1, this.xp3_1), this.vp3_1.zp3_1, true, this.vp3_1.bp4_1.tp1_1, this);
949
+ suspendResult = WebCrypto_getInstance().op5(this.hp5_1.mp5_1.rp2(this.ip5_1), this.hp5_1.mp5_1.tp2(this.hp5_1.lp5_1, this.ip5_1, this.jp5_1), this.hp5_1.lp5_1, true, this.hp5_1.np5_1.fp3_1, this);
950
950
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
951
951
  return suspendResult;
952
952
  }
@@ -954,7 +954,7 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
954
954
  continue $sm;
955
955
  case 1:
956
956
  var ARGUMENT = suspendResult;
957
- return this.yp3_1(ARGUMENT);
957
+ return this.kp5_1(ARGUMENT);
958
958
  case 2:
959
959
  throw this.o9_1;
960
960
  }
@@ -970,36 +970,36 @@ protoOf($decodeFromByteArrayCOROUTINE$).t9 = function () {
970
970
  while (true);
971
971
  };
972
972
  function WebCryptoKeyDecoder(algorithm, keyProcessor, keyWrapper) {
973
- this.zp3_1 = algorithm;
974
- this.ap4_1 = keyProcessor;
975
- this.bp4_1 = keyWrapper;
973
+ this.lp5_1 = algorithm;
974
+ this.mp5_1 = keyProcessor;
975
+ this.np5_1 = keyWrapper;
976
976
  }
977
- protoOf(WebCryptoKeyDecoder).sow = function (format, bytes, $completion) {
977
+ protoOf(WebCryptoKeyDecoder).eoy = function (format, bytes, $completion) {
978
978
  var tmp = new $decodeFromByteArrayCOROUTINE$(this, format, bytes, $completion);
979
979
  tmp.n9_1 = Unit_instance;
980
980
  tmp.o9_1 = null;
981
981
  return tmp.t9();
982
982
  };
983
- protoOf(WebCryptoKeyDecoder).tow = function (format, bytes) {
983
+ protoOf(WebCryptoKeyDecoder).foy = function (format, bytes) {
984
984
  nonBlocking();
985
985
  };
986
986
  function WebCryptoKeyProcessor() {
987
987
  }
988
988
  function WebCryptoKeyWrapper(usages, wrap) {
989
- this.tp1_1 = usages;
990
- this.up1_1 = wrap;
989
+ this.fp3_1 = usages;
990
+ this.gp3_1 = wrap;
991
991
  }
992
992
  function WebCryptoSignatureGenerator(algorithm, key) {
993
- this.dp4_1 = algorithm;
994
- this.ep4_1 = key;
993
+ this.pp5_1 = algorithm;
994
+ this.qp5_1 = key;
995
995
  }
996
- protoOf(WebCryptoSignatureGenerator).aox = function (data, $completion) {
997
- return WebCrypto_getInstance().fp4(this.dp4_1, this.ep4_1, data, $completion);
996
+ protoOf(WebCryptoSignatureGenerator).moy = function (data, $completion) {
997
+ return WebCrypto_getInstance().rp5(this.pp5_1, this.qp5_1, data, $completion);
998
998
  };
999
- protoOf(WebCryptoSignatureGenerator).zow = function () {
999
+ protoOf(WebCryptoSignatureGenerator).loy = function () {
1000
1000
  nonBlocking();
1001
1001
  };
1002
- protoOf(WebCryptoSignatureGenerator).box = function (data) {
1002
+ protoOf(WebCryptoSignatureGenerator).noy = function (data) {
1003
1003
  nonBlocking();
1004
1004
  };
1005
1005
  function get_initHook() {
@@ -1007,7 +1007,7 @@ function get_initHook() {
1007
1007
  }
1008
1008
  var initHook_0;
1009
1009
  function initHook$init$() {
1010
- CryptographySystem_getInstance().mow(get_defaultProvider(), 100);
1010
+ CryptographySystem_getInstance().yox(get_defaultProvider(), 100);
1011
1011
  return Unit_instance;
1012
1012
  }
1013
1013
  function get_ecKeyAlgorithmNamedCurve(_this__u8e3s4) {
@@ -1046,9 +1046,9 @@ function getCrypto() {
1046
1046
  }
1047
1047
  function $digestCOROUTINE$(_this__u8e3s4, algorithmName, data, resultContinuation) {
1048
1048
  CoroutineImpl.call(this, resultContinuation);
1049
- this.op4_1 = _this__u8e3s4;
1050
- this.pp4_1 = algorithmName;
1051
- this.qp4_1 = data;
1049
+ this.ap6_1 = _this__u8e3s4;
1050
+ this.bp6_1 = algorithmName;
1051
+ this.cp6_1 = data;
1052
1052
  }
1053
1053
  protoOf($digestCOROUTINE$).t9 = function () {
1054
1054
  var suspendResult = this.n9_1;
@@ -1059,7 +1059,7 @@ protoOf($digestCOROUTINE$).t9 = function () {
1059
1059
  case 0:
1060
1060
  this.m9_1 = 2;
1061
1061
  this.l9_1 = 1;
1062
- suspendResult = await_0(this.op4_1.lp1_1.digest(this.pp4_1, this.qp4_1), this);
1062
+ suspendResult = await_0(this.ap6_1.xp2_1.digest(this.bp6_1, this.cp6_1), this);
1063
1063
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
1064
1064
  return suspendResult;
1065
1065
  }
@@ -1084,10 +1084,10 @@ protoOf($digestCOROUTINE$).t9 = function () {
1084
1084
  };
1085
1085
  function $signCOROUTINE$(_this__u8e3s4, algorithm, key, data, resultContinuation) {
1086
1086
  CoroutineImpl.call(this, resultContinuation);
1087
- this.zp4_1 = _this__u8e3s4;
1088
- this.ap5_1 = algorithm;
1089
- this.bp5_1 = key;
1090
- this.cp5_1 = data;
1087
+ this.lp6_1 = _this__u8e3s4;
1088
+ this.mp6_1 = algorithm;
1089
+ this.np6_1 = key;
1090
+ this.op6_1 = data;
1091
1091
  }
1092
1092
  protoOf($signCOROUTINE$).t9 = function () {
1093
1093
  var suspendResult = this.n9_1;
@@ -1098,7 +1098,7 @@ protoOf($signCOROUTINE$).t9 = function () {
1098
1098
  case 0:
1099
1099
  this.m9_1 = 2;
1100
1100
  this.l9_1 = 1;
1101
- suspendResult = await_0(this.zp4_1.lp1_1.sign(this.ap5_1, this.bp5_1, this.cp5_1), this);
1101
+ suspendResult = await_0(this.lp6_1.xp2_1.sign(this.mp6_1, this.np6_1, this.op6_1), this);
1102
1102
  if (suspendResult === get_COROUTINE_SUSPENDED()) {
1103
1103
  return suspendResult;
1104
1104
  }
@@ -1123,23 +1123,23 @@ protoOf($signCOROUTINE$).t9 = function () {
1123
1123
  };
1124
1124
  function WebCrypto() {
1125
1125
  WebCrypto_instance = this;
1126
- this.lp1_1 = getSubtleCrypto();
1126
+ this.xp2_1 = getSubtleCrypto();
1127
1127
  }
1128
- protoOf(WebCrypto).mp1 = function (algorithmName, data, $completion) {
1128
+ protoOf(WebCrypto).yp2 = function (algorithmName, data, $completion) {
1129
1129
  var tmp = new $digestCOROUTINE$(this, algorithmName, data, $completion);
1130
1130
  tmp.n9_1 = Unit_instance;
1131
1131
  tmp.o9_1 = null;
1132
1132
  return tmp.t9();
1133
1133
  };
1134
- protoOf(WebCrypto).fp4 = function (algorithm, key, data, $completion) {
1134
+ protoOf(WebCrypto).rp5 = function (algorithm, key, data, $completion) {
1135
1135
  var tmp = new $signCOROUTINE$(this, algorithm, key, data, $completion);
1136
1136
  tmp.n9_1 = Unit_instance;
1137
1137
  tmp.o9_1 = null;
1138
1138
  return tmp.t9();
1139
1139
  };
1140
- protoOf(WebCrypto).cp4 = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
1140
+ protoOf(WebCrypto).op5 = function (format, keyData, algorithm, extractable, keyUsages, $completion) {
1141
1141
  var key = format === 'jwk' ? JSON.parse(decodeToString(keyData)) : keyData;
1142
- return await_0(this.lp1_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
1142
+ return await_0(this.xp2_1.importKey(format, key, algorithm, extractable, keyUsages), $completion);
1143
1143
  };
1144
1144
  var WebCrypto_instance;
1145
1145
  function WebCrypto_getInstance() {