@sphereon/ssi-sdk-ext.x509-utils 0.28.0 → 0.28.1-feature.esm.cjs.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +777 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.cts +173 -0
- package/dist/index.d.ts +171 -5
- package/dist/index.js +750 -21
- package/dist/index.js.map +1 -1
- package/package.json +24 -12
- package/src/x509/crypto.ts +11 -5
- package/src/x509/rsa-key.ts +7 -1
- package/src/x509/rsa-signer.ts +8 -4
- package/src/x509/x509-utils.ts +7 -4
- package/src/x509/x509-validator.ts +6 -3
- package/dist/index.d.ts.map +0 -1
- package/dist/types/index.d.ts +0 -14
- package/dist/types/index.d.ts.map +0 -1
- package/dist/types/index.js +0 -9
- package/dist/types/index.js.map +0 -1
- package/dist/x509/crypto.d.ts +0 -2
- package/dist/x509/crypto.d.ts.map +0 -1
- package/dist/x509/crypto.js +0 -28
- package/dist/x509/crypto.js.map +0 -1
- package/dist/x509/index.d.ts +0 -5
- package/dist/x509/index.d.ts.map +0 -1
- package/dist/x509/index.js +0 -21
- package/dist/x509/index.js.map +0 -1
- package/dist/x509/rsa-key.d.ts +0 -10
- package/dist/x509/rsa-key.d.ts.map +0 -1
- package/dist/x509/rsa-key.js +0 -102
- package/dist/x509/rsa-key.js.map +0 -1
- package/dist/x509/rsa-signer.d.ts +0 -24
- package/dist/x509/rsa-signer.d.ts.map +0 -1
- package/dist/x509/rsa-signer.js +0 -105
- package/dist/x509/rsa-signer.js.map +0 -1
- package/dist/x509/x509-utils.d.ts +0 -31
- package/dist/x509/x509-utils.d.ts.map +0 -1
- package/dist/x509/x509-utils.js +0 -215
- package/dist/x509/x509-utils.js.map +0 -1
- package/dist/x509/x509-validator.d.ts +0 -97
- package/dist/x509/x509-validator.d.ts.map +0 -1
- package/dist/x509/x509-validator.js +0 -489
- package/dist/x509/x509-validator.js.map +0 -1
package/dist/x509/rsa-key.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"rsa-key.js","sourceRoot":"","sources":["../../src/x509/rsa-key.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,iDAAkC;AAElC,qCAAuC;AAEvC,6CAAuC;AAMvC,MAAM,KAAK,GAAG,CAAC,GAAe,EAAc,EAAE;;IAC5C,IAAI,GAAG,CAAC,OAAO,IAAI,GAAG,CAAC,OAAO,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC1C,OAAO,GAAG,CAAC,OAAqB,CAAA;IAClC,CAAC;IACD,IAAI,GAAG,CAAC,GAAG,EAAE,CAAC;QACZ,MAAM,MAAM,GAAe,EAAE,CAAA;QAC7B,IAAI,GAAG,CAAC,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAA;QAC/B,CAAC;aAAM,IAAI,GAAG,CAAC,GAAG,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;YACnC,MAAM,CAAC,IAAI,CAAC,SAAS,EAAE,SAAS,CAAC,CAAA;QACnC,CAAC;QACD,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACtB,OAAO,MAAM,CAAA;QACf,CAAC;IACH,CAAC;IACD,IAAI,GAAG,CAAC,GAAG,KAAK,KAAK,EAAE,CAAC;QACtB,IAAI,GAAG,CAAC,CAAC,EAAE,CAAC;YACV,OAAO,CAAA,MAAA,MAAA,GAAG,CAAC,GAAG,0CAAE,WAAW,EAAE,0CAAE,QAAQ,CAAC,MAAM,CAAC,EAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAA;QAC1E,CAAC;QACD,OAAO,CAAA,MAAA,MAAA,GAAG,CAAC,GAAG,0CAAE,WAAW,EAAE,0CAAE,QAAQ,CAAC,MAAM,CAAC,EAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAA;IAC5E,CAAC;IACD,oGAAoG;IACpG,OAAO,GAAG,CAAC,CAAC,IAAI,GAAG,CAAC,GAAG,KAAK,KAAK,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,SAAS,EAAE,QAAQ,EAAE,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAA;AAC3F,CAAC,CAAA;AAEM,MAAM,+BAA+B,GAAG,CAAC,UAAkB,EAAE,EAAE;IACpE,MAAM,GAAG,GAAG,UAAU,CAAC,WAAW,EAAE,CAAA;IACpC,IAAI,MAAkD,CAAA;IACtD,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;QACzB,MAAM,GAAG,mBAAmB,CAAA;IAC9B,CAAC;SAAM,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;QAChC,MAAM,GAAG,SAAS,CAAA;IACpB,CAAC;SAAM,CAAC;QACN,MAAM,KAAK,CAAC,sCAAsC,UAAU,EAAE,CAAC,CAAA;IACjE,CAAC;IAED,MAAM,aAAa,GAAG,OAAO,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,EAAmB,CAAA;IAChE,OAAO,EAAE,MAAM,EAAE,aAAa,EAAE,CAAA;AAClC,CAAC,CAAA;AAbY,QAAA,+BAA+B,mCAa3C;AAEM,MAAM,wBAAwB,GAAG,CACtC,GAAe,EACf,MAAkD,EAClD,aAA6B,EACT,EAAE;IACtB,MAAM,QAAQ,GAAG,aAAa,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,CAAC,CAAC,CAAC,OAAO,GAAG,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS,CAAA;IAEpG,MAAM,YAAY,GAA0B,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,CAAA;IAC5E,OAAO,MAAM,IAAA,qBAAY,EAAC,KAAK,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAiB,EAAE,YAAY,EAAE,KAAK,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC,CAAA;AAC9G,CAAC,CAAA,CAAA;AATY,QAAA,wBAAwB,4BASpC;AAEM,MAAM,mBAAmB,GAAG,CACjC,MAAkD,EAClD,aAA6B,EAC7B,aAAsB,EACL,EAAE;IACnB,MAAM,QAAQ,GAAG,aAAa,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAA;IAE1D,MAAM,MAAM,GAA0B;QACpC,IAAI,EAAE,MAAM;QACZ,IAAI,EAAE,QAAQ;QACd,aAAa,EAAE,aAAa,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,IAAI;QACnD,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;KAC1C,CAAA;IACD,MAAM,QAAQ,GAAe,MAAM,KAAK,SAAS,IAAI,MAAM,KAAK,mBAAmB,CAAC,CAAC,CAAC,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,SAAS,CAAC,CAAA;IAEjI,MAAM,OAAO,GAAG,MAAM,IAAA,qBAAY,EAAC,KAAK,CAAC,CAAC,MAAM,CAAC,WAAW,CAAC,MAAM,EAAE,IAAI,EAAE,QAAQ,CAAC,CAAA;IACpF,MAAM,KAAK,GAAG,MAAM,IAAA,qBAAY,EAAC,KAAK,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,OAAO,CAAC,UAAU,CAAC,CAAA;IAErF,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,KAAK,CAAC,CAAA;IACxC,OAAO,IAAA,qBAAQ,EAAC,GAAG,CAAC,QAAQ,CAAC,UAAU,EAAE,WAAW,CAAC,EAAE,iBAAiB,CAAC,CAAA;AAC3E,CAAC,CAAA,CAAA;AApBY,QAAA,mBAAmB,uBAoB/B"}
|
|
@@ -1,24 +0,0 @@
|
|
|
1
|
-
import { HashAlgorithm, KeyVisibility } from '../types';
|
|
2
|
-
import { RSAEncryptionSchemes, RSASignatureSchemes } from './rsa-key';
|
|
3
|
-
export declare class RSASigner {
|
|
4
|
-
private readonly hashAlgorithm;
|
|
5
|
-
private readonly jwk;
|
|
6
|
-
private key;
|
|
7
|
-
private readonly scheme;
|
|
8
|
-
/**
|
|
9
|
-
*
|
|
10
|
-
* @param key Either in PEM or JWK format (no raw hex keys here!)
|
|
11
|
-
* @param opts The algorithm and signature/encryption schemes
|
|
12
|
-
*/
|
|
13
|
-
constructor(key: string | JsonWebKey, opts?: {
|
|
14
|
-
hashAlgorithm?: HashAlgorithm;
|
|
15
|
-
scheme?: RSAEncryptionSchemes | RSASignatureSchemes;
|
|
16
|
-
visibility?: KeyVisibility;
|
|
17
|
-
});
|
|
18
|
-
private getImportParams;
|
|
19
|
-
private getKey;
|
|
20
|
-
private bufferToString;
|
|
21
|
-
sign(data: Uint8Array): Promise<string>;
|
|
22
|
-
verify(data: string | Uint8Array, signature: string): Promise<boolean>;
|
|
23
|
-
}
|
|
24
|
-
//# sourceMappingURL=rsa-signer.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"rsa-signer.d.ts","sourceRoot":"","sources":["../../src/x509/rsa-signer.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,aAAa,EAAE,aAAa,EAAE,MAAM,UAAU,CAAA;AAEvD,OAAO,EAA4B,oBAAoB,EAAE,mBAAmB,EAAE,MAAM,WAAW,CAAA;AAG/F,qBAAa,SAAS;IACpB,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAe;IAC7C,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAY;IAEhC,OAAO,CAAC,GAAG,CAAuB;IAClC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAA4C;IAEnE;;;;OAIG;gBAED,GAAG,EAAE,MAAM,GAAG,UAAU,EACxB,IAAI,CAAC,EAAE;QAAE,aAAa,CAAC,EAAE,aAAa,CAAC;QAAC,MAAM,CAAC,EAAE,oBAAoB,GAAG,mBAAmB,CAAC;QAAC,UAAU,CAAC,EAAE,aAAa,CAAA;KAAE;IAY3H,OAAO,CAAC,eAAe;YAOT,MAAM;IAOpB,OAAO,CAAC,cAAc;IAKT,IAAI,CAAC,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,MAAM,CAAC;IAYvC,MAAM,CAAC,IAAI,EAAE,MAAM,GAAG,UAAU,EAAE,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC;CAgBpF"}
|
package/dist/x509/rsa-signer.js
DELETED
|
@@ -1,105 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
26
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
27
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
28
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
29
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
30
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
31
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
32
|
-
});
|
|
33
|
-
};
|
|
34
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
35
|
-
exports.RSASigner = void 0;
|
|
36
|
-
const u8a = __importStar(require("uint8arrays"));
|
|
37
|
-
const crypto_1 = require("./crypto");
|
|
38
|
-
const rsa_key_1 = require("./rsa-key");
|
|
39
|
-
const x509_utils_1 = require("./x509-utils");
|
|
40
|
-
class RSASigner {
|
|
41
|
-
/**
|
|
42
|
-
*
|
|
43
|
-
* @param key Either in PEM or JWK format (no raw hex keys here!)
|
|
44
|
-
* @param opts The algorithm and signature/encryption schemes
|
|
45
|
-
*/
|
|
46
|
-
constructor(key, opts) {
|
|
47
|
-
var _a, _b;
|
|
48
|
-
if (typeof key === 'string') {
|
|
49
|
-
this.jwk = (0, x509_utils_1.PEMToJwk)(key, opts === null || opts === void 0 ? void 0 : opts.visibility);
|
|
50
|
-
}
|
|
51
|
-
else {
|
|
52
|
-
this.jwk = key;
|
|
53
|
-
}
|
|
54
|
-
this.hashAlgorithm = (_a = opts === null || opts === void 0 ? void 0 : opts.hashAlgorithm) !== null && _a !== void 0 ? _a : 'SHA-256';
|
|
55
|
-
this.scheme = (_b = opts === null || opts === void 0 ? void 0 : opts.scheme) !== null && _b !== void 0 ? _b : 'RSA-PSS';
|
|
56
|
-
}
|
|
57
|
-
getImportParams() {
|
|
58
|
-
if (this.scheme === 'RSA-PSS') {
|
|
59
|
-
return { name: this.scheme, saltLength: 32 };
|
|
60
|
-
}
|
|
61
|
-
return { name: this.scheme /*, hash: this.hashAlgorithm*/ };
|
|
62
|
-
}
|
|
63
|
-
getKey() {
|
|
64
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
65
|
-
if (!this.key) {
|
|
66
|
-
this.key = yield (0, rsa_key_1.cryptoSubtleImportRSAKey)(this.jwk, this.scheme, this.hashAlgorithm);
|
|
67
|
-
}
|
|
68
|
-
return this.key;
|
|
69
|
-
});
|
|
70
|
-
}
|
|
71
|
-
bufferToString(buf) {
|
|
72
|
-
const uint8Array = new Uint8Array(buf);
|
|
73
|
-
return u8a.toString(uint8Array, 'base64url'); // Needs to be base64url for JsonWebSignature2020. Don't change!
|
|
74
|
-
}
|
|
75
|
-
sign(data) {
|
|
76
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
77
|
-
const input = data;
|
|
78
|
-
const key = yield this.getKey();
|
|
79
|
-
const signature = this.bufferToString(yield (0, crypto_1.globalCrypto)(false).subtle.sign(this.getImportParams(), key, input));
|
|
80
|
-
if (!signature) {
|
|
81
|
-
throw Error('Could not sign input data');
|
|
82
|
-
}
|
|
83
|
-
// base64url signature
|
|
84
|
-
return signature;
|
|
85
|
-
});
|
|
86
|
-
}
|
|
87
|
-
verify(data, signature) {
|
|
88
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
89
|
-
const jws = signature.includes('.') ? signature.split('.')[2] : signature;
|
|
90
|
-
const input = typeof data == 'string' ? u8a.fromString(data, 'utf-8') : data;
|
|
91
|
-
let key = yield this.getKey();
|
|
92
|
-
if (!key.usages.includes('verify')) {
|
|
93
|
-
const verifyJwk = Object.assign({}, this.jwk);
|
|
94
|
-
delete verifyJwk.d;
|
|
95
|
-
delete verifyJwk.use;
|
|
96
|
-
delete verifyJwk.key_ops;
|
|
97
|
-
key = yield (0, rsa_key_1.cryptoSubtleImportRSAKey)(verifyJwk, this.scheme, this.hashAlgorithm);
|
|
98
|
-
}
|
|
99
|
-
const verificationResult = yield (0, crypto_1.globalCrypto)(false).subtle.verify(this.getImportParams(), key, u8a.fromString(jws, 'base64url'), input);
|
|
100
|
-
return verificationResult;
|
|
101
|
-
});
|
|
102
|
-
}
|
|
103
|
-
}
|
|
104
|
-
exports.RSASigner = RSASigner;
|
|
105
|
-
//# sourceMappingURL=rsa-signer.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"rsa-signer.js","sourceRoot":"","sources":["../../src/x509/rsa-signer.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,iDAAkC;AAElC,qCAAuC;AACvC,uCAA+F;AAC/F,6CAAuC;AAEvC,MAAa,SAAS;IAOpB;;;;OAIG;IACH,YACE,GAAwB,EACxB,IAAyH;;QAEzH,IAAI,OAAO,GAAG,KAAK,QAAQ,EAAE,CAAC;YAC5B,IAAI,CAAC,GAAG,GAAG,IAAA,qBAAQ,EAAC,GAAG,EAAE,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,UAAU,CAAC,CAAA;QAC5C,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,GAAG,GAAG,GAAG,CAAA;QAChB,CAAC;QAED,IAAI,CAAC,aAAa,GAAG,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,aAAa,mCAAI,SAAS,CAAA;QACrD,IAAI,CAAC,MAAM,GAAG,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,MAAM,mCAAI,SAAS,CAAA;IACzC,CAAC;IAEO,eAAe;QACrB,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;YAC9B,OAAO,EAAE,IAAI,EAAE,IAAI,CAAC,MAAM,EAAE,UAAU,EAAE,EAAE,EAAE,CAAA;QAC9C,CAAC;QACD,OAAO,EAAE,IAAI,EAAE,IAAI,CAAC,MAAM,CAAC,8BAA8B,EAAE,CAAA;IAC7D,CAAC;IAEa,MAAM;;YAClB,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;gBACd,IAAI,CAAC,GAAG,GAAG,MAAM,IAAA,kCAAwB,EAAC,IAAI,CAAC,GAAG,EAAE,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,aAAa,CAAC,CAAA;YACtF,CAAC;YACD,OAAO,IAAI,CAAC,GAAG,CAAA;QACjB,CAAC;KAAA;IAEO,cAAc,CAAC,GAAgB;QACrC,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAA;QACtC,OAAO,GAAG,CAAC,QAAQ,CAAC,UAAU,EAAE,WAAW,CAAC,CAAA,CAAC,gEAAgE;IAC/G,CAAC;IAEY,IAAI,CAAC,IAAgB;;YAChC,MAAM,KAAK,GAAG,IAAI,CAAA;YAClB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,EAAE,CAAA;YAC/B,MAAM,SAAS,GAAG,IAAI,CAAC,cAAc,CAAC,MAAM,IAAA,qBAAY,EAAC,KAAK,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,eAAe,EAAE,EAAE,GAAG,EAAE,KAAK,CAAC,CAAC,CAAA;YAChH,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,2BAA2B,CAAC,CAAA;YAC1C,CAAC;YAED,uBAAuB;YACvB,OAAO,SAAS,CAAA;QAClB,CAAC;KAAA;IAEY,MAAM,CAAC,IAAyB,EAAE,SAAiB;;YAC9D,MAAM,GAAG,GAAG,SAAS,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAA;YAEzE,MAAM,KAAK,GAAG,OAAO,IAAI,IAAI,QAAQ,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC,IAAI,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,CAAA;YAE5E,IAAI,GAAG,GAAG,MAAM,IAAI,CAAC,MAAM,EAAE,CAAA;YAC7B,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC;gBACnC,MAAM,SAAS,qBAAQ,IAAI,CAAC,GAAG,CAAE,CAAA;gBACjC,OAAO,SAAS,CAAC,CAAC,CAAA;gBAClB,OAAO,SAAS,CAAC,GAAG,CAAA;gBACpB,OAAO,SAAS,CAAC,OAAO,CAAA;gBACxB,GAAG,GAAG,MAAM,IAAA,kCAAwB,EAAC,SAAS,EAAE,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,aAAa,CAAC,CAAA;YAClF,CAAC;YACD,MAAM,kBAAkB,GAAG,MAAM,IAAA,qBAAY,EAAC,KAAK,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,EAAE,EAAE,GAAG,EAAE,GAAG,CAAC,UAAU,CAAC,GAAG,EAAE,WAAW,CAAC,EAAE,KAAK,CAAC,CAAA;YACxI,OAAO,kBAAkB,CAAA;QAC3B,CAAC;KAAA;CACF;AAzED,8BAyEC"}
|
|
@@ -1,31 +0,0 @@
|
|
|
1
|
-
import { X509Certificate } from '@peculiar/x509';
|
|
2
|
-
import { Certificate } from 'pkijs';
|
|
3
|
-
import { KeyVisibility } from '../types';
|
|
4
|
-
export declare function pemCertChainTox5c(cert: string, maxDepth?: number): string[];
|
|
5
|
-
export declare function x5cToPemCertChain(x5c: string[], maxDepth?: number): string;
|
|
6
|
-
export declare const pemOrDerToX509Certificate: (cert: string | Uint8Array | X509Certificate) => Certificate;
|
|
7
|
-
export declare const areCertificatesEqual: (cert1: Certificate, cert2: Certificate) => boolean;
|
|
8
|
-
export declare const toKeyObject: (PEM: string, visibility?: KeyVisibility) => {
|
|
9
|
-
pem: string;
|
|
10
|
-
jwk: JsonWebKey;
|
|
11
|
-
keyHex: string;
|
|
12
|
-
keyType: KeyVisibility;
|
|
13
|
-
};
|
|
14
|
-
export declare const jwkToPEM: (jwk: JsonWebKey, visibility?: KeyVisibility) => string;
|
|
15
|
-
export declare const PEMToJwk: (pem: string, visibility?: KeyVisibility) => JsonWebKey;
|
|
16
|
-
export declare const privateKeyHexFromPEM: (PEM: string) => string;
|
|
17
|
-
export declare const hexKeyFromPEMBasedJwk: (jwk: JsonWebKey, visibility?: KeyVisibility) => string;
|
|
18
|
-
export declare const publicKeyHexFromPEM: (PEM: string) => string;
|
|
19
|
-
export declare const PEMToHex: (PEM: string, headerKey?: string) => string;
|
|
20
|
-
export declare function PEMToBinary(pem: string): Uint8Array;
|
|
21
|
-
/**
|
|
22
|
-
* Converts a base64 encoded string to hex string, removing any non-base64 characters, including newlines
|
|
23
|
-
* @param input The input in base64, with optional newlines
|
|
24
|
-
* @param inputEncoding
|
|
25
|
-
*/
|
|
26
|
-
export declare const base64ToHex: (input: string, inputEncoding?: "base64" | "base64pad" | "base64url" | "base64urlpad") => string;
|
|
27
|
-
export declare const hexToBase64: (input: number | object | string, targetEncoding?: "base64" | "base64pad" | "base64url" | "base64urlpad") => string;
|
|
28
|
-
export declare const hexToPEM: (hex: string, type: KeyVisibility) => string;
|
|
29
|
-
export declare function PEMToDer(pem: string): string;
|
|
30
|
-
export declare function derToPEM(cert: string, headerKey?: 'PUBLIC KEY' | 'RSA PRIVATE KEY' | 'PRIVATE KEY' | 'CERTIFICATE'): string;
|
|
31
|
-
//# sourceMappingURL=x509-utils.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"x509-utils.d.ts","sourceRoot":"","sources":["../../src/x509/x509-utils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,gBAAgB,CAAA;AAChD,OAAO,EAAE,WAAW,EAAE,MAAM,OAAO,CAAA;AAInC,OAAO,EAAE,aAAa,EAAE,MAAM,UAAU,CAAA;AAIxC,wBAAgB,iBAAiB,CAAC,IAAI,EAAE,MAAM,EAAE,QAAQ,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,CAuB3E;AAED,wBAAgB,iBAAiB,CAAC,GAAG,EAAE,MAAM,EAAE,EAAE,QAAQ,CAAC,EAAE,MAAM,GAAG,MAAM,CAU1E;AAED,eAAO,MAAM,yBAAyB,SAAU,MAAM,GAAG,UAAU,GAAG,eAAe,KAAG,WAcvF,CAAA;AAED,eAAO,MAAM,oBAAoB,UAAW,WAAW,SAAS,WAAW,KAAG,OAE7E,CAAA;AAED,eAAO,MAAM,WAAW,QAAS,MAAM,eAAc,aAAa;;;;;CAWjE,CAAA;AAED,eAAO,MAAM,QAAQ,QAAS,UAAU,eAAc,aAAa,KAAc,MAEhF,CAAA;AAED,eAAO,MAAM,QAAQ,QAAS,MAAM,eAAc,aAAa,KAAc,UAE5E,CAAA;AACD,eAAO,MAAM,oBAAoB,QAAS,MAAM,WAE/C,CAAA;AAED,eAAO,MAAM,qBAAqB,QAAS,UAAU,eAAc,aAAa,KAAc,MAM7F,CAAA;AAED,eAAO,MAAM,mBAAmB,QAAS,MAAM,WAU9C,CAAA;AAED,eAAO,MAAM,QAAQ,QAAS,MAAM,cAAc,MAAM,KAAG,MAc1D,CAAA;AAED,wBAAgB,WAAW,CAAC,GAAG,EAAE,MAAM,GAAG,UAAU,CAOnD;AAED;;;;GAIG;AACH,eAAO,MAAM,WAAW,UAAW,MAAM,kBAAkB,QAAQ,GAAG,WAAW,GAAG,WAAW,GAAG,cAAc,WAG/G,CAAA;AAED,eAAO,MAAM,WAAW,UAAW,MAAM,GAAG,MAAM,GAAG,MAAM,mBAAmB,QAAQ,GAAG,WAAW,GAAG,WAAW,GAAG,cAAc,KAAG,MAMrI,CAAA;AAED,eAAO,MAAM,QAAQ,QAAS,MAAM,QAAQ,aAAa,KAAG,MAa3D,CAAA;AAED,wBAAgB,QAAQ,CAAC,GAAG,EAAE,MAAM,GAAG,MAAM,CAE5C;AAED,wBAAgB,QAAQ,CAAC,IAAI,EAAE,MAAM,EAAE,SAAS,CAAC,EAAE,YAAY,GAAG,iBAAiB,GAAG,aAAa,GAAG,aAAa,GAAG,MAAM,CAW3H"}
|
package/dist/x509/x509-utils.js
DELETED
|
@@ -1,215 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
26
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
27
|
-
};
|
|
28
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
-
exports.hexToPEM = exports.hexToBase64 = exports.base64ToHex = exports.PEMToHex = exports.publicKeyHexFromPEM = exports.hexKeyFromPEMBasedJwk = exports.privateKeyHexFromPEM = exports.PEMToJwk = exports.jwkToPEM = exports.toKeyObject = exports.areCertificatesEqual = exports.pemOrDerToX509Certificate = void 0;
|
|
30
|
-
exports.pemCertChainTox5c = pemCertChainTox5c;
|
|
31
|
-
exports.x5cToPemCertChain = x5cToPemCertChain;
|
|
32
|
-
exports.PEMToBinary = PEMToBinary;
|
|
33
|
-
exports.PEMToDer = PEMToDer;
|
|
34
|
-
exports.derToPEM = derToPEM;
|
|
35
|
-
const pkijs_1 = require("pkijs");
|
|
36
|
-
const u8a = __importStar(require("uint8arrays"));
|
|
37
|
-
// @ts-ignore
|
|
38
|
-
const keyto_1 = __importDefault(require("@trust/keyto"));
|
|
39
|
-
// Based on (MIT licensed):
|
|
40
|
-
// https://github.com/hildjj/node-posh/blob/master/lib/index.js
|
|
41
|
-
function pemCertChainTox5c(cert, maxDepth) {
|
|
42
|
-
if (!maxDepth) {
|
|
43
|
-
maxDepth = 0;
|
|
44
|
-
}
|
|
45
|
-
/*
|
|
46
|
-
* Convert a PEM-encoded certificate to the version used in the x5c element
|
|
47
|
-
* of a [JSON Web Key](http://tools.ietf.org/html/draft-ietf-jose-json-web-key).
|
|
48
|
-
*
|
|
49
|
-
* `cert` PEM-encoded certificate chain
|
|
50
|
-
* `maxdepth` The maximum number of certificates to use from the chain.
|
|
51
|
-
*/
|
|
52
|
-
const intermediate = cert
|
|
53
|
-
.replace(/-----[^\n]+\n?/gm, ',')
|
|
54
|
-
.replace(/\n/g, '')
|
|
55
|
-
.replace(/\r/g, '');
|
|
56
|
-
let x5c = intermediate.split(',').filter(function (c) {
|
|
57
|
-
return c.length > 0;
|
|
58
|
-
});
|
|
59
|
-
if (maxDepth > 0) {
|
|
60
|
-
x5c = x5c.splice(0, maxDepth);
|
|
61
|
-
}
|
|
62
|
-
return x5c;
|
|
63
|
-
}
|
|
64
|
-
function x5cToPemCertChain(x5c, maxDepth) {
|
|
65
|
-
if (!maxDepth) {
|
|
66
|
-
maxDepth = 0;
|
|
67
|
-
}
|
|
68
|
-
const length = maxDepth === 0 ? x5c.length : Math.min(maxDepth, x5c.length);
|
|
69
|
-
let pem = '';
|
|
70
|
-
for (let i = 0; i < length; i++) {
|
|
71
|
-
pem += derToPEM(x5c[i], 'CERTIFICATE');
|
|
72
|
-
}
|
|
73
|
-
return pem;
|
|
74
|
-
}
|
|
75
|
-
const pemOrDerToX509Certificate = (cert) => {
|
|
76
|
-
let DER = typeof cert === 'string' ? cert : undefined;
|
|
77
|
-
if (typeof cert === 'object' && !(cert instanceof Uint8Array)) {
|
|
78
|
-
// X509Certificate object
|
|
79
|
-
return pkijs_1.Certificate.fromBER(cert.rawData);
|
|
80
|
-
}
|
|
81
|
-
else if (typeof cert !== 'string') {
|
|
82
|
-
return pkijs_1.Certificate.fromBER(cert);
|
|
83
|
-
}
|
|
84
|
-
else if (cert.includes('CERTIFICATE')) {
|
|
85
|
-
DER = PEMToDer(cert);
|
|
86
|
-
}
|
|
87
|
-
if (!DER) {
|
|
88
|
-
throw Error('Invalid cert input value supplied. PEM, DER, Bytes and X509Certificate object are supported');
|
|
89
|
-
}
|
|
90
|
-
return pkijs_1.Certificate.fromBER(u8a.fromString(DER, 'base64pad'));
|
|
91
|
-
};
|
|
92
|
-
exports.pemOrDerToX509Certificate = pemOrDerToX509Certificate;
|
|
93
|
-
const areCertificatesEqual = (cert1, cert2) => {
|
|
94
|
-
return cert1.signatureValue.isEqual(cert2.signatureValue);
|
|
95
|
-
};
|
|
96
|
-
exports.areCertificatesEqual = areCertificatesEqual;
|
|
97
|
-
const toKeyObject = (PEM, visibility = 'public') => {
|
|
98
|
-
const jwk = (0, exports.PEMToJwk)(PEM, visibility);
|
|
99
|
-
const keyVisibility = jwk.d ? 'private' : 'public';
|
|
100
|
-
const keyHex = keyVisibility === 'private' ? (0, exports.privateKeyHexFromPEM)(PEM) : (0, exports.publicKeyHexFromPEM)(PEM);
|
|
101
|
-
return {
|
|
102
|
-
pem: (0, exports.hexToPEM)(keyHex, visibility),
|
|
103
|
-
jwk,
|
|
104
|
-
keyHex,
|
|
105
|
-
keyType: keyVisibility,
|
|
106
|
-
};
|
|
107
|
-
};
|
|
108
|
-
exports.toKeyObject = toKeyObject;
|
|
109
|
-
const jwkToPEM = (jwk, visibility = 'public') => {
|
|
110
|
-
return keyto_1.default.from(jwk, 'jwk').toString('pem', visibility === 'public' ? 'public_pkcs8' : 'private_pkcs8');
|
|
111
|
-
};
|
|
112
|
-
exports.jwkToPEM = jwkToPEM;
|
|
113
|
-
const PEMToJwk = (pem, visibility = 'public') => {
|
|
114
|
-
return keyto_1.default.from(pem, 'pem').toJwk(visibility);
|
|
115
|
-
};
|
|
116
|
-
exports.PEMToJwk = PEMToJwk;
|
|
117
|
-
const privateKeyHexFromPEM = (PEM) => {
|
|
118
|
-
return (0, exports.PEMToHex)(PEM);
|
|
119
|
-
};
|
|
120
|
-
exports.privateKeyHexFromPEM = privateKeyHexFromPEM;
|
|
121
|
-
const hexKeyFromPEMBasedJwk = (jwk, visibility = 'public') => {
|
|
122
|
-
if (visibility === 'private') {
|
|
123
|
-
return (0, exports.privateKeyHexFromPEM)((0, exports.jwkToPEM)(jwk, 'private'));
|
|
124
|
-
}
|
|
125
|
-
else {
|
|
126
|
-
return (0, exports.publicKeyHexFromPEM)((0, exports.jwkToPEM)(jwk, 'public'));
|
|
127
|
-
}
|
|
128
|
-
};
|
|
129
|
-
exports.hexKeyFromPEMBasedJwk = hexKeyFromPEMBasedJwk;
|
|
130
|
-
const publicKeyHexFromPEM = (PEM) => {
|
|
131
|
-
const hex = (0, exports.PEMToHex)(PEM);
|
|
132
|
-
if (PEM.includes('CERTIFICATE')) {
|
|
133
|
-
throw Error('Cannot directly deduce public Key from PEM Certificate yet');
|
|
134
|
-
}
|
|
135
|
-
else if (!PEM.includes('PRIVATE')) {
|
|
136
|
-
return hex;
|
|
137
|
-
}
|
|
138
|
-
const publicJwk = (0, exports.PEMToJwk)(PEM, 'public');
|
|
139
|
-
const publicPEM = (0, exports.jwkToPEM)(publicJwk, 'public');
|
|
140
|
-
return (0, exports.PEMToHex)(publicPEM);
|
|
141
|
-
};
|
|
142
|
-
exports.publicKeyHexFromPEM = publicKeyHexFromPEM;
|
|
143
|
-
const PEMToHex = (PEM, headerKey) => {
|
|
144
|
-
if (PEM.indexOf('-----BEGIN ') == -1) {
|
|
145
|
-
throw Error(`PEM header not found: ${headerKey}`);
|
|
146
|
-
}
|
|
147
|
-
let strippedPem;
|
|
148
|
-
if (headerKey) {
|
|
149
|
-
strippedPem = PEM.replace(new RegExp('^[^]*-----BEGIN ' + headerKey + '-----'), '');
|
|
150
|
-
strippedPem = strippedPem.replace(new RegExp('-----END ' + headerKey + '-----[^]*$'), '');
|
|
151
|
-
}
|
|
152
|
-
else {
|
|
153
|
-
strippedPem = PEM.replace(/^[^]*-----BEGIN [^-]+-----/, '');
|
|
154
|
-
strippedPem = strippedPem.replace(/-----END [^-]+-----[^]*$/, '');
|
|
155
|
-
}
|
|
156
|
-
return (0, exports.base64ToHex)(strippedPem, 'base64pad');
|
|
157
|
-
};
|
|
158
|
-
exports.PEMToHex = PEMToHex;
|
|
159
|
-
function PEMToBinary(pem) {
|
|
160
|
-
const pemContents = pem
|
|
161
|
-
.replace(/^[^]*-----BEGIN [^-]+-----/, '')
|
|
162
|
-
.replace(/-----END [^-]+-----[^]*$/, '')
|
|
163
|
-
.replace(/\s/g, '');
|
|
164
|
-
return u8a.fromString(pemContents, 'base64pad');
|
|
165
|
-
}
|
|
166
|
-
/**
|
|
167
|
-
* Converts a base64 encoded string to hex string, removing any non-base64 characters, including newlines
|
|
168
|
-
* @param input The input in base64, with optional newlines
|
|
169
|
-
* @param inputEncoding
|
|
170
|
-
*/
|
|
171
|
-
const base64ToHex = (input, inputEncoding) => {
|
|
172
|
-
const base64NoNewlines = input.replace(/[^0-9A-Za-z_\-~\/+=]*/g, '');
|
|
173
|
-
return u8a.toString(u8a.fromString(base64NoNewlines, inputEncoding ? inputEncoding : 'base64pad'), 'base16');
|
|
174
|
-
};
|
|
175
|
-
exports.base64ToHex = base64ToHex;
|
|
176
|
-
const hexToBase64 = (input, targetEncoding) => {
|
|
177
|
-
let hex = typeof input === 'string' ? input : input.toString(16);
|
|
178
|
-
if (hex.length % 2 === 1) {
|
|
179
|
-
hex = `0${hex}`;
|
|
180
|
-
}
|
|
181
|
-
return u8a.toString(u8a.fromString(hex, 'base16'), targetEncoding ? targetEncoding : 'base64pad');
|
|
182
|
-
};
|
|
183
|
-
exports.hexToBase64 = hexToBase64;
|
|
184
|
-
const hexToPEM = (hex, type) => {
|
|
185
|
-
const base64 = (0, exports.hexToBase64)(hex, 'base64pad');
|
|
186
|
-
const headerKey = type === 'private' ? 'RSA PRIVATE KEY' : 'PUBLIC KEY';
|
|
187
|
-
if (type === 'private') {
|
|
188
|
-
const pem = derToPEM(base64, headerKey);
|
|
189
|
-
try {
|
|
190
|
-
(0, exports.PEMToJwk)(pem); // We only use it to test the private key
|
|
191
|
-
return pem;
|
|
192
|
-
}
|
|
193
|
-
catch (error) {
|
|
194
|
-
return derToPEM(base64, 'PRIVATE KEY');
|
|
195
|
-
}
|
|
196
|
-
}
|
|
197
|
-
return derToPEM(base64, headerKey);
|
|
198
|
-
};
|
|
199
|
-
exports.hexToPEM = hexToPEM;
|
|
200
|
-
function PEMToDer(pem) {
|
|
201
|
-
return pem.replace(/(-----(BEGIN|END) CERTIFICATE-----|[\n\r])/g, '');
|
|
202
|
-
}
|
|
203
|
-
function derToPEM(cert, headerKey) {
|
|
204
|
-
const key = headerKey !== null && headerKey !== void 0 ? headerKey : 'CERTIFICATE';
|
|
205
|
-
if (cert.includes(key)) {
|
|
206
|
-
// Was already in PEM it seems
|
|
207
|
-
return cert;
|
|
208
|
-
}
|
|
209
|
-
const matches = cert.match(/.{1,64}/g);
|
|
210
|
-
if (!matches) {
|
|
211
|
-
throw Error('Invalid cert input value supplied');
|
|
212
|
-
}
|
|
213
|
-
return `-----BEGIN ${key}-----\n${matches.join('\n')}\n-----END ${key}-----\n`;
|
|
214
|
-
}
|
|
215
|
-
//# sourceMappingURL=x509-utils.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"x509-utils.js","sourceRoot":"","sources":["../../src/x509/x509-utils.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AASA,8CAuBC;AAED,8CAUC;AAkFD,kCAOC;AAmCD,4BAEC;AAED,4BAWC;AAtLD,iCAAmC;AACnC,iDAAkC;AAClC,aAAa;AACb,yDAAgC;AAGhC,2BAA2B;AAC3B,+DAA+D;AAC/D,SAAgB,iBAAiB,CAAC,IAAY,EAAE,QAAiB;IAC/D,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,QAAQ,GAAG,CAAC,CAAA;IACd,CAAC;IACD;;;;;;OAMG;IAEH,MAAM,YAAY,GAAG,IAAI;SACtB,OAAO,CAAC,kBAAkB,EAAE,GAAG,CAAC;SAChC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC;SAClB,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;IACrB,IAAI,GAAG,GAAG,YAAY,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,UAAU,CAAC;QAClD,OAAO,CAAC,CAAC,MAAM,GAAG,CAAC,CAAA;IACrB,CAAC,CAAC,CAAA;IACF,IAAI,QAAQ,GAAG,CAAC,EAAE,CAAC;QACjB,GAAG,GAAG,GAAG,CAAC,MAAM,CAAC,CAAC,EAAE,QAAQ,CAAC,CAAA;IAC/B,CAAC;IACD,OAAO,GAAG,CAAA;AACZ,CAAC;AAED,SAAgB,iBAAiB,CAAC,GAAa,EAAE,QAAiB;IAChE,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,QAAQ,GAAG,CAAC,CAAA;IACd,CAAC;IACD,MAAM,MAAM,GAAG,QAAQ,KAAK,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,QAAQ,EAAE,GAAG,CAAC,MAAM,CAAC,CAAA;IAC3E,IAAI,GAAG,GAAG,EAAE,CAAA;IACZ,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;QAChC,GAAG,IAAI,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,aAAa,CAAC,CAAA;IACxC,CAAC;IACD,OAAO,GAAG,CAAA;AACZ,CAAC;AAEM,MAAM,yBAAyB,GAAG,CAAC,IAA2C,EAAe,EAAE;IACpG,IAAI,GAAG,GAAuB,OAAO,IAAI,KAAK,QAAQ,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAA;IACzE,IAAI,OAAO,IAAI,KAAK,QAAQ,IAAI,CAAC,CAAC,IAAI,YAAY,UAAU,CAAC,EAAE,CAAC;QAC9D,yBAAyB;QACzB,OAAO,mBAAW,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;IAC1C,CAAC;SAAM,IAAI,OAAO,IAAI,KAAK,QAAQ,EAAE,CAAC;QACpC,OAAO,mBAAW,CAAC,OAAO,CAAC,IAAI,CAAC,CAAA;IAClC,CAAC;SAAM,IAAI,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;QACxC,GAAG,GAAG,QAAQ,CAAC,IAAI,CAAC,CAAA;IACtB,CAAC;IACD,IAAI,CAAC,GAAG,EAAE,CAAC;QACT,MAAM,KAAK,CAAC,6FAA6F,CAAC,CAAA;IAC5G,CAAC;IACD,OAAO,mBAAW,CAAC,OAAO,CAAC,GAAG,CAAC,UAAU,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC,CAAA;AAC9D,CAAC,CAAA;AAdY,QAAA,yBAAyB,6BAcrC;AAEM,MAAM,oBAAoB,GAAG,CAAC,KAAkB,EAAE,KAAkB,EAAW,EAAE;IACtF,OAAO,KAAK,CAAC,cAAc,CAAC,OAAO,CAAC,KAAK,CAAC,cAAc,CAAC,CAAA;AAC3D,CAAC,CAAA;AAFY,QAAA,oBAAoB,wBAEhC;AAEM,MAAM,WAAW,GAAG,CAAC,GAAW,EAAE,aAA4B,QAAQ,EAAE,EAAE;IAC/E,MAAM,GAAG,GAAG,IAAA,gBAAQ,EAAC,GAAG,EAAE,UAAU,CAAC,CAAA;IACrC,MAAM,aAAa,GAAkB,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAA;IACjE,MAAM,MAAM,GAAG,aAAa,KAAK,SAAS,CAAC,CAAC,CAAC,IAAA,4BAAoB,EAAC,GAAG,CAAC,CAAC,CAAC,CAAC,IAAA,2BAAmB,EAAC,GAAG,CAAC,CAAA;IAEjG,OAAO;QACL,GAAG,EAAE,IAAA,gBAAQ,EAAC,MAAM,EAAE,UAAU,CAAC;QACjC,GAAG;QACH,MAAM;QACN,OAAO,EAAE,aAAa;KACvB,CAAA;AACH,CAAC,CAAA;AAXY,QAAA,WAAW,eAWvB;AAEM,MAAM,QAAQ,GAAG,CAAC,GAAe,EAAE,aAA4B,QAAQ,EAAU,EAAE;IACxF,OAAO,eAAK,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,QAAQ,CAAC,KAAK,EAAE,UAAU,KAAK,QAAQ,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC,CAAC,eAAe,CAAC,CAAA;AAC3G,CAAC,CAAA;AAFY,QAAA,QAAQ,YAEpB;AAEM,MAAM,QAAQ,GAAG,CAAC,GAAW,EAAE,aAA4B,QAAQ,EAAc,EAAE;IACxF,OAAO,eAAK,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAA;AACjD,CAAC,CAAA;AAFY,QAAA,QAAQ,YAEpB;AACM,MAAM,oBAAoB,GAAG,CAAC,GAAW,EAAE,EAAE;IAClD,OAAO,IAAA,gBAAQ,EAAC,GAAG,CAAC,CAAA;AACtB,CAAC,CAAA;AAFY,QAAA,oBAAoB,wBAEhC;AAEM,MAAM,qBAAqB,GAAG,CAAC,GAAe,EAAE,aAA4B,QAAQ,EAAU,EAAE;IACrG,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;QAC7B,OAAO,IAAA,4BAAoB,EAAC,IAAA,gBAAQ,EAAC,GAAG,EAAE,SAAS,CAAC,CAAC,CAAA;IACvD,CAAC;SAAM,CAAC;QACN,OAAO,IAAA,2BAAmB,EAAC,IAAA,gBAAQ,EAAC,GAAG,EAAE,QAAQ,CAAC,CAAC,CAAA;IACrD,CAAC;AACH,CAAC,CAAA;AANY,QAAA,qBAAqB,yBAMjC;AAEM,MAAM,mBAAmB,GAAG,CAAC,GAAW,EAAE,EAAE;IACjD,MAAM,GAAG,GAAG,IAAA,gBAAQ,EAAC,GAAG,CAAC,CAAA;IACzB,IAAI,GAAG,CAAC,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;QAChC,MAAM,KAAK,CAAC,4DAA4D,CAAC,CAAA;IAC3E,CAAC;SAAM,IAAI,CAAC,GAAG,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;QACpC,OAAO,GAAG,CAAA;IACZ,CAAC;IACD,MAAM,SAAS,GAAG,IAAA,gBAAQ,EAAC,GAAG,EAAE,QAAQ,CAAC,CAAA;IACzC,MAAM,SAAS,GAAG,IAAA,gBAAQ,EAAC,SAAS,EAAE,QAAQ,CAAC,CAAA;IAC/C,OAAO,IAAA,gBAAQ,EAAC,SAAS,CAAC,CAAA;AAC5B,CAAC,CAAA;AAVY,QAAA,mBAAmB,uBAU/B;AAEM,MAAM,QAAQ,GAAG,CAAC,GAAW,EAAE,SAAkB,EAAU,EAAE;IAClE,IAAI,GAAG,CAAC,OAAO,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC,EAAE,CAAC;QACrC,MAAM,KAAK,CAAC,yBAAyB,SAAS,EAAE,CAAC,CAAA;IACnD,CAAC;IAED,IAAI,WAAmB,CAAA;IACvB,IAAI,SAAS,EAAE,CAAC;QACd,WAAW,GAAG,GAAG,CAAC,OAAO,CAAC,IAAI,MAAM,CAAC,kBAAkB,GAAG,SAAS,GAAG,OAAO,CAAC,EAAE,EAAE,CAAC,CAAA;QACnF,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,IAAI,MAAM,CAAC,WAAW,GAAG,SAAS,GAAG,YAAY,CAAC,EAAE,EAAE,CAAC,CAAA;IAC3F,CAAC;SAAM,CAAC;QACN,WAAW,GAAG,GAAG,CAAC,OAAO,CAAC,4BAA4B,EAAE,EAAE,CAAC,CAAA;QAC3D,WAAW,GAAG,WAAW,CAAC,OAAO,CAAC,0BAA0B,EAAE,EAAE,CAAC,CAAA;IACnE,CAAC;IACD,OAAO,IAAA,mBAAW,EAAC,WAAW,EAAE,WAAW,CAAC,CAAA;AAC9C,CAAC,CAAA;AAdY,QAAA,QAAQ,YAcpB;AAED,SAAgB,WAAW,CAAC,GAAW;IACrC,MAAM,WAAW,GAAG,GAAG;SACpB,OAAO,CAAC,4BAA4B,EAAE,EAAE,CAAC;SACzC,OAAO,CAAC,0BAA0B,EAAE,EAAE,CAAC;SACvC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;IAErB,OAAO,GAAG,CAAC,UAAU,CAAC,WAAW,EAAE,WAAW,CAAC,CAAA;AACjD,CAAC;AAED;;;;GAIG;AACI,MAAM,WAAW,GAAG,CAAC,KAAa,EAAE,aAAqE,EAAE,EAAE;IAClH,MAAM,gBAAgB,GAAG,KAAK,CAAC,OAAO,CAAC,wBAAwB,EAAE,EAAE,CAAC,CAAA;IACpE,OAAO,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,gBAAgB,EAAE,aAAa,CAAC,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,WAAW,CAAC,EAAE,QAAQ,CAAC,CAAA;AAC9G,CAAC,CAAA;AAHY,QAAA,WAAW,eAGvB;AAEM,MAAM,WAAW,GAAG,CAAC,KAA+B,EAAE,cAAsE,EAAU,EAAE;IAC7I,IAAI,GAAG,GAAG,OAAO,KAAK,KAAK,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAA;IAChE,IAAI,GAAG,CAAC,MAAM,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC;QACzB,GAAG,GAAG,IAAI,GAAG,EAAE,CAAA;IACjB,CAAC;IACD,OAAO,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,UAAU,CAAC,GAAG,EAAE,QAAQ,CAAC,EAAE,cAAc,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC,CAAC,WAAW,CAAC,CAAA;AACnG,CAAC,CAAA;AANY,QAAA,WAAW,eAMvB;AAEM,MAAM,QAAQ,GAAG,CAAC,GAAW,EAAE,IAAmB,EAAU,EAAE;IACnE,MAAM,MAAM,GAAG,IAAA,mBAAW,EAAC,GAAG,EAAE,WAAW,CAAC,CAAA;IAC5C,MAAM,SAAS,GAAG,IAAI,KAAK,SAAS,CAAC,CAAC,CAAC,iBAAiB,CAAC,CAAC,CAAC,YAAY,CAAA;IACvE,IAAI,IAAI,KAAK,SAAS,EAAE,CAAC;QACvB,MAAM,GAAG,GAAG,QAAQ,CAAC,MAAM,EAAE,SAAS,CAAC,CAAA;QACvC,IAAI,CAAC;YACH,IAAA,gBAAQ,EAAC,GAAG,CAAC,CAAA,CAAC,yCAAyC;YACvD,OAAO,GAAG,CAAA;QACZ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,QAAQ,CAAC,MAAM,EAAE,aAAa,CAAC,CAAA;QACxC,CAAC;IACH,CAAC;IACD,OAAO,QAAQ,CAAC,MAAM,EAAE,SAAS,CAAC,CAAA;AACpC,CAAC,CAAA;AAbY,QAAA,QAAQ,YAapB;AAED,SAAgB,QAAQ,CAAC,GAAW;IAClC,OAAO,GAAG,CAAC,OAAO,CAAC,6CAA6C,EAAE,EAAE,CAAC,CAAA;AACvE,CAAC;AAED,SAAgB,QAAQ,CAAC,IAAY,EAAE,SAA4E;IACjH,MAAM,GAAG,GAAG,SAAS,aAAT,SAAS,cAAT,SAAS,GAAI,aAAa,CAAA;IACtC,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;QACvB,8BAA8B;QAC9B,OAAO,IAAI,CAAA;IACb,CAAC;IACD,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAA;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,KAAK,CAAC,mCAAmC,CAAC,CAAA;IAClD,CAAC;IACD,OAAO,cAAc,GAAG,UAAU,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,GAAG,SAAS,CAAA;AAChF,CAAC"}
|
|
@@ -1,97 +0,0 @@
|
|
|
1
|
-
import { SubjectPublicKeyInfo } from '@peculiar/asn1-x509';
|
|
2
|
-
import { AlgorithmProvider, X509Certificate } from '@peculiar/x509';
|
|
3
|
-
import { JWK } from '@sphereon/ssi-types';
|
|
4
|
-
import { Certificate } from 'pkijs';
|
|
5
|
-
export type DNInfo = {
|
|
6
|
-
DN: string;
|
|
7
|
-
attributes: Record<string, string>;
|
|
8
|
-
};
|
|
9
|
-
export type CertificateInfo = {
|
|
10
|
-
certificate?: any;
|
|
11
|
-
notBefore: Date;
|
|
12
|
-
notAfter: Date;
|
|
13
|
-
publicKeyJWK?: any;
|
|
14
|
-
issuer: {
|
|
15
|
-
dn: DNInfo;
|
|
16
|
-
};
|
|
17
|
-
subject: {
|
|
18
|
-
dn: DNInfo;
|
|
19
|
-
subjectAlternativeNames: SubjectAlternativeName[];
|
|
20
|
-
};
|
|
21
|
-
};
|
|
22
|
-
export type X509ValidationResult = {
|
|
23
|
-
error: boolean;
|
|
24
|
-
critical: boolean;
|
|
25
|
-
message: string;
|
|
26
|
-
detailMessage?: string;
|
|
27
|
-
verificationTime: Date;
|
|
28
|
-
certificateChain?: Array<CertificateInfo>;
|
|
29
|
-
trustAnchor?: CertificateInfo;
|
|
30
|
-
client?: {
|
|
31
|
-
clientId: string;
|
|
32
|
-
clientIdScheme: ClientIdScheme;
|
|
33
|
-
};
|
|
34
|
-
};
|
|
35
|
-
export declare const getCertificateInfo: (certificate: Certificate, opts?: {
|
|
36
|
-
sanTypeFilter: SubjectAlternativeGeneralName | SubjectAlternativeGeneralName[];
|
|
37
|
-
}) => Promise<CertificateInfo>;
|
|
38
|
-
export type X509CertificateChainValidationOpts = {
|
|
39
|
-
allowNoTrustAnchorsFound?: boolean;
|
|
40
|
-
trustRootWhenNoAnchors?: boolean;
|
|
41
|
-
allowSingleNoCAChainElement?: boolean;
|
|
42
|
-
blindlyTrustedAnchors?: string[];
|
|
43
|
-
disallowReversedChain?: boolean;
|
|
44
|
-
client?: {
|
|
45
|
-
clientId: string;
|
|
46
|
-
clientIdScheme: ClientIdScheme;
|
|
47
|
-
};
|
|
48
|
-
};
|
|
49
|
-
export declare const validateX509CertificateChain: ({ chain: pemOrDerChain, trustAnchors, verificationTime, opts, }: {
|
|
50
|
-
chain: (Uint8Array | string)[];
|
|
51
|
-
trustAnchors?: string[];
|
|
52
|
-
verificationTime?: Date;
|
|
53
|
-
opts?: X509CertificateChainValidationOpts;
|
|
54
|
-
}) => Promise<X509ValidationResult>;
|
|
55
|
-
export declare const getX509AlgorithmProvider: () => AlgorithmProvider;
|
|
56
|
-
export type ParsedCertificate = {
|
|
57
|
-
publicKeyInfo: SubjectPublicKeyInfo;
|
|
58
|
-
publicKeyJwk?: JWK;
|
|
59
|
-
publicKeyRaw: Uint8Array;
|
|
60
|
-
publicKeyAlgorithm: Algorithm;
|
|
61
|
-
certificateInfo: CertificateInfo;
|
|
62
|
-
certificate: Certificate;
|
|
63
|
-
x509Certificate: X509Certificate;
|
|
64
|
-
};
|
|
65
|
-
export declare const parseCertificate: (rawCert: string | Uint8Array) => Promise<ParsedCertificate>;
|
|
66
|
-
export declare const getIssuerDN: (cert: Certificate) => DNInfo;
|
|
67
|
-
export declare const getSubjectDN: (cert: Certificate) => DNInfo;
|
|
68
|
-
export declare const getCertificateSubjectPublicKeyJWK: (pemOrDerCert: string | Uint8Array | Certificate) => Promise<JWK>;
|
|
69
|
-
/**
|
|
70
|
-
* otherName [0] OtherName,
|
|
71
|
-
* rfc822Name [1] IA5String,
|
|
72
|
-
* dNSName [2] IA5String,
|
|
73
|
-
* x400Address [3] ORAddress,
|
|
74
|
-
* directoryName [4] Name,
|
|
75
|
-
* ediPartyName [5] EDIPartyName,
|
|
76
|
-
* uniformResourceIdentifier [6] IA5String,
|
|
77
|
-
* iPAddress [7] OCTET STRING,
|
|
78
|
-
* registeredID [8] OBJECT IDENTIFIER }
|
|
79
|
-
*/
|
|
80
|
-
export declare enum SubjectAlternativeGeneralName {
|
|
81
|
-
rfc822Name = 1,// email
|
|
82
|
-
dnsName = 2,
|
|
83
|
-
uniformResourceIdentifier = 6,
|
|
84
|
-
ipAddress = 7
|
|
85
|
-
}
|
|
86
|
-
export interface SubjectAlternativeName {
|
|
87
|
-
value: string;
|
|
88
|
-
type: SubjectAlternativeGeneralName;
|
|
89
|
-
}
|
|
90
|
-
export type ClientIdScheme = 'x509_san_dns' | 'x509_san_uri';
|
|
91
|
-
export declare const assertCertificateMatchesClientIdScheme: (certificate: Certificate, clientId: string, clientIdScheme: ClientIdScheme) => void;
|
|
92
|
-
export declare const validateCertificateChainMatchesClientIdScheme: (certificate: Certificate, clientId: string, clientIdScheme: ClientIdScheme) => Promise<X509ValidationResult>;
|
|
93
|
-
export declare const getSubjectAlternativeNames: (certificate: Certificate, opts?: {
|
|
94
|
-
typeFilter?: SubjectAlternativeGeneralName | SubjectAlternativeGeneralName[];
|
|
95
|
-
clientIdSchemeFilter?: ClientIdScheme;
|
|
96
|
-
}) => SubjectAlternativeName[];
|
|
97
|
-
//# sourceMappingURL=x509-validator.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"x509-validator.d.ts","sourceRoot":"","sources":["../../src/x509/x509-validator.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,oBAAoB,EAAE,MAAM,qBAAqB,CAAA;AAC1D,OAAO,EAAE,iBAAiB,EAAE,eAAe,EAAE,MAAM,gBAAgB,CAAA;AAEnE,OAAO,EAAE,GAAG,EAAE,MAAM,qBAAqB,CAAA;AAEzC,OAAO,EAAkC,WAAW,EAAyD,MAAM,OAAO,CAAA;AAM1H,MAAM,MAAM,MAAM,GAAG;IACnB,EAAE,EAAE,MAAM,CAAA;IACV,UAAU,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAA;CACnC,CAAA;AAED,MAAM,MAAM,eAAe,GAAG;IAC5B,WAAW,CAAC,EAAE,GAAG,CAAA;IACjB,SAAS,EAAE,IAAI,CAAA;IACf,QAAQ,EAAE,IAAI,CAAA;IACd,YAAY,CAAC,EAAE,GAAG,CAAA;IAClB,MAAM,EAAE;QACN,EAAE,EAAE,MAAM,CAAA;KACX,CAAA;IACD,OAAO,EAAE;QACP,EAAE,EAAE,MAAM,CAAA;QACV,uBAAuB,EAAE,sBAAsB,EAAE,CAAA;KAClD,CAAA;CACF,CAAA;AAED,MAAM,MAAM,oBAAoB,GAAG;IACjC,KAAK,EAAE,OAAO,CAAA;IACd,QAAQ,EAAE,OAAO,CAAA;IACjB,OAAO,EAAE,MAAM,CAAA;IACf,aAAa,CAAC,EAAE,MAAM,CAAA;IACtB,gBAAgB,EAAE,IAAI,CAAA;IACtB,gBAAgB,CAAC,EAAE,KAAK,CAAC,eAAe,CAAC,CAAA;IACzC,WAAW,CAAC,EAAE,eAAe,CAAA;IAC7B,MAAM,CAAC,EAAE;QAEP,QAAQ,EAAE,MAAM,CAAA;QAChB,cAAc,EAAE,cAAc,CAAA;KAC/B,CAAA;CACF,CAAA;AAQD,eAAO,MAAM,kBAAkB,gBAChB,WAAW,SACjB;IACL,aAAa,EAAE,6BAA6B,GAAG,6BAA6B,EAAE,CAAA;CAC/E,KACA,OAAO,CAAC,eAAe,CAgBzB,CAAA;AAED,MAAM,MAAM,kCAAkC,GAAG;IAE/C,wBAAwB,CAAC,EAAE,OAAO,CAAA;IAGlC,sBAAsB,CAAC,EAAE,OAAO,CAAA;IAEhC,2BAA2B,CAAC,EAAE,OAAO,CAAA;IAGrC,qBAAqB,CAAC,EAAE,MAAM,EAAE,CAAA;IAEhC,qBAAqB,CAAC,EAAE,OAAO,CAAA;IAE/B,MAAM,CAAC,EAAE;QAEP,QAAQ,EAAE,MAAM,CAAA;QAChB,cAAc,EAAE,cAAc,CAAA;KAC/B,CAAA;CACF,CAAA;AAED,eAAO,MAAM,4BAA4B,oEAYtC;IACD,KAAK,EAAE,CAAC,UAAU,GAAG,MAAM,CAAC,EAAE,CAAA;IAC9B,YAAY,CAAC,EAAE,MAAM,EAAE,CAAA;IACvB,gBAAgB,CAAC,EAAE,IAAI,CAAA;IACvB,IAAI,CAAC,EAAE,kCAAkC,CAAA;CAC1C,KAAG,OAAO,CAAC,oBAAoB,CAS/B,CAAA;AAiLD,eAAO,MAAM,wBAAwB,QAAO,iBAE3C,CAAA;AAED,MAAM,MAAM,iBAAiB,GAAG;IAC9B,aAAa,EAAE,oBAAoB,CAAA;IACnC,YAAY,CAAC,EAAE,GAAG,CAAA;IAClB,YAAY,EAAE,UAAU,CAAA;IACxB,kBAAkB,EAAE,SAAS,CAAA;IAC7B,eAAe,EAAE,eAAe,CAAA;IAChC,WAAW,EAAE,WAAW,CAAA;IACxB,eAAe,EAAE,eAAe,CAAA;CACjC,CAAA;AAED,eAAO,MAAM,gBAAgB,YAAmB,MAAM,GAAG,UAAU,KAAG,OAAO,CAAC,iBAAiB,CAsB9F,CAAA;AAwJD,eAAO,MAAM,WAAW,SAAU,WAAW,KAAG,MAK/C,CAAA;AAED,eAAO,MAAM,YAAY,SAAU,WAAW,KAAG,MAKhD,CAAA;AAgBD,eAAO,MAAM,iCAAiC,iBAAwB,MAAM,GAAG,UAAU,GAAG,WAAW,KAAG,OAAO,CAAC,GAAG,CA4BpH,CAAA;AAED;;;;;;;;;;GAUG;AACH,oBAAY,6BAA6B;IACvC,UAAU,IAAI,CAAE,QAAQ;IACxB,OAAO,IAAI;IACX,yBAAyB,IAAI;IAC7B,SAAS,IAAI;CACd;AAED,MAAM,WAAW,sBAAsB;IACrC,KAAK,EAAE,MAAM,CAAA;IACb,IAAI,EAAE,6BAA6B,CAAA;CACpC;AAED,MAAM,MAAM,cAAc,GAAG,cAAc,GAAG,cAAc,CAAA;AAE5D,eAAO,MAAM,sCAAsC,gBAAiB,WAAW,YAAY,MAAM,kBAAkB,cAAc,KAAG,IAUnI,CAAA;AAED,eAAO,MAAM,6CAA6C,gBAC3C,WAAW,YACd,MAAM,kBACA,cAAc,KAC7B,OAAO,CAAC,oBAAoB,CAoB9B,CAAA;AAED,eAAO,MAAM,0BAA0B,gBACxB,WAAW,SACjB;IACL,UAAU,CAAC,EAAE,6BAA6B,GAAG,6BAA6B,EAAE,CAAA;IAE5E,oBAAoB,CAAC,EAAE,cAAc,CAAA;CACtC,KACA,sBAAsB,EAsBxB,CAAA"}
|