cipher-kit 2.1.3 → 3.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +324 -434
- package/dist/chunk-3A4RTUKO.cjs +509 -0
- package/dist/chunk-3A4RTUKO.cjs.map +1 -0
- package/dist/chunk-7254PEID.cjs +502 -0
- package/dist/chunk-7254PEID.cjs.map +1 -0
- package/dist/chunk-GL32EZRA.js +475 -0
- package/dist/chunk-GL32EZRA.js.map +1 -0
- package/dist/chunk-IY6XGUYO.js +494 -0
- package/dist/chunk-IY6XGUYO.js.map +1 -0
- package/dist/chunk-VCBHSRCS.cjs +523 -0
- package/dist/chunk-VCBHSRCS.cjs.map +1 -0
- package/dist/chunk-X6MX4NDE.js +478 -0
- package/dist/chunk-X6MX4NDE.js.map +1 -0
- package/dist/export-B-3CCZIO.d.cts +389 -0
- package/dist/export-BPo6yPV-.d.ts +389 -0
- package/dist/export-C0_UEEg8.d.ts +396 -0
- package/dist/export-DPuocAr3.d.cts +396 -0
- package/dist/index.cjs +11 -19
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +11 -40
- package/dist/index.d.ts +11 -40
- package/dist/index.js +3 -3
- package/dist/index.js.map +1 -1
- package/dist/node.cjs +39 -35
- package/dist/node.d.cts +3 -3
- package/dist/node.d.ts +3 -3
- package/dist/node.js +2 -2
- package/dist/validate-vDTesb-X.d.cts +195 -0
- package/dist/validate-vDTesb-X.d.ts +195 -0
- package/dist/web-api.cjs +39 -35
- package/dist/web-api.d.cts +2 -3
- package/dist/web-api.d.ts +2 -3
- package/dist/web-api.js +2 -2
- package/package.json +82 -92
- package/dist/chunk-BMX42IZM.cjs +0 -623
- package/dist/chunk-BMX42IZM.cjs.map +0 -1
- package/dist/chunk-HTRGOBZF.cjs +0 -169
- package/dist/chunk-HTRGOBZF.cjs.map +0 -1
- package/dist/chunk-LU7QOSQH.js +0 -141
- package/dist/chunk-LU7QOSQH.js.map +0 -1
- package/dist/chunk-S6SNCTU6.js +0 -485
- package/dist/chunk-S6SNCTU6.js.map +0 -1
- package/dist/chunk-T36BEDPY.js +0 -598
- package/dist/chunk-T36BEDPY.js.map +0 -1
- package/dist/chunk-ZNM5M6RD.cjs +0 -514
- package/dist/chunk-ZNM5M6RD.cjs.map +0 -1
- package/dist/export-BaM_OTFk.d.ts +0 -573
- package/dist/export-CCTGAosO.d.ts +0 -572
- package/dist/export-FYHgb-8E.d.cts +0 -572
- package/dist/export-KFT0YyMg.d.cts +0 -573
- package/dist/validate-lkJAHCeJ.d.cts +0 -399
- package/dist/validate-lkJAHCeJ.d.ts +0 -399
|
@@ -0,0 +1,502 @@
|
|
|
1
|
+
'use strict';
|
|
2
|
+
|
|
3
|
+
var chunkVCBHSRCS_cjs = require('./chunk-VCBHSRCS.cjs');
|
|
4
|
+
|
|
5
|
+
// src/web/kit.ts
|
|
6
|
+
var kit_exports = {};
|
|
7
|
+
chunkVCBHSRCS_cjs.__export(kit_exports, {
|
|
8
|
+
convertBytesToStr: () => convertBytesToStr,
|
|
9
|
+
convertEncoding: () => convertEncoding,
|
|
10
|
+
convertStrToBytes: () => convertStrToBytes,
|
|
11
|
+
createSecretKey: () => createSecretKey,
|
|
12
|
+
decrypt: () => decrypt,
|
|
13
|
+
decryptObj: () => decryptObj,
|
|
14
|
+
encrypt: () => encrypt,
|
|
15
|
+
encryptObj: () => encryptObj,
|
|
16
|
+
generateUuid: () => generateUuid,
|
|
17
|
+
hash: () => hash,
|
|
18
|
+
hashPassword: () => hashPassword,
|
|
19
|
+
isWebSecretKey: () => isWebSecretKey,
|
|
20
|
+
tryConvertBytesToStr: () => tryConvertBytesToStr,
|
|
21
|
+
tryConvertEncoding: () => tryConvertEncoding,
|
|
22
|
+
tryConvertStrToBytes: () => tryConvertStrToBytes,
|
|
23
|
+
tryCreateSecretKey: () => tryCreateSecretKey,
|
|
24
|
+
tryDecrypt: () => tryDecrypt,
|
|
25
|
+
tryDecryptObj: () => tryDecryptObj,
|
|
26
|
+
tryEncrypt: () => tryEncrypt,
|
|
27
|
+
tryEncryptObj: () => tryEncryptObj,
|
|
28
|
+
tryGenerateUuid: () => tryGenerateUuid,
|
|
29
|
+
tryHash: () => tryHash,
|
|
30
|
+
tryHashPassword: () => tryHashPassword,
|
|
31
|
+
tryVerifyPassword: () => tryVerifyPassword,
|
|
32
|
+
verifyPassword: () => verifyPassword
|
|
33
|
+
});
|
|
34
|
+
|
|
35
|
+
// src/web/web-encode.ts
|
|
36
|
+
function $convertStrToBytes2(data, inputEncoding = "utf8") {
|
|
37
|
+
const result = chunkVCBHSRCS_cjs.$convertStrToBytes(data, inputEncoding);
|
|
38
|
+
if (result.error) {
|
|
39
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
40
|
+
message: result.error.message.replace("strToBytes:", "web strToBytes:"),
|
|
41
|
+
description: result.error.description
|
|
42
|
+
});
|
|
43
|
+
}
|
|
44
|
+
return result;
|
|
45
|
+
}
|
|
46
|
+
function $convertBytesToStr2(data, outputEncoding = "utf8") {
|
|
47
|
+
const result = chunkVCBHSRCS_cjs.$convertBytesToStr(data, outputEncoding);
|
|
48
|
+
if (result.error) {
|
|
49
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
50
|
+
message: result.error.message.replace("bytesToStr:", "web bytesToStr:"),
|
|
51
|
+
description: result.error.description
|
|
52
|
+
});
|
|
53
|
+
}
|
|
54
|
+
return result;
|
|
55
|
+
}
|
|
56
|
+
function $convertEncoding(data, from, to) {
|
|
57
|
+
if (!chunkVCBHSRCS_cjs.$isStr(data)) {
|
|
58
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
59
|
+
message: "web convertEncoding: Data must be a non-empty string",
|
|
60
|
+
description: "Received empty or non-string value"
|
|
61
|
+
});
|
|
62
|
+
}
|
|
63
|
+
if (!chunkVCBHSRCS_cjs.ENCODING.includes(from) || !chunkVCBHSRCS_cjs.ENCODING.includes(to)) {
|
|
64
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
65
|
+
message: `web convertEncoding: Unsupported encoding: from ${from} to ${to}`,
|
|
66
|
+
description: "Use base64, base64url, hex, utf8, or latin1"
|
|
67
|
+
});
|
|
68
|
+
}
|
|
69
|
+
const bytes = $convertStrToBytes2(data, from);
|
|
70
|
+
if (bytes.error) return chunkVCBHSRCS_cjs.$err(bytes.error);
|
|
71
|
+
const str = $convertBytesToStr2(bytes.result, to);
|
|
72
|
+
if (str.error) return chunkVCBHSRCS_cjs.$err(str.error);
|
|
73
|
+
return chunkVCBHSRCS_cjs.$ok(str.result);
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
// src/web/web-secret-key.ts
|
|
77
|
+
function $isWebSecretKey(x) {
|
|
78
|
+
const base = chunkVCBHSRCS_cjs.$validateSecretKeyBase(x, "web");
|
|
79
|
+
if (!base) return null;
|
|
80
|
+
if (typeof globalThis.CryptoKey === "undefined" || !(base.obj.key instanceof CryptoKey)) return null;
|
|
81
|
+
if (!chunkVCBHSRCS_cjs.$isObj(base.obj.key.algorithm) || base.obj.key.algorithm.name !== base.algorithm.web || typeof base.obj.key.algorithm.length === "number" && base.obj.key.algorithm.length !== base.algorithm.keyBytes * 8 || !Array.isArray(base.obj.key.usages) || !(base.obj.key.usages.includes("encrypt") && base.obj.key.usages.includes("decrypt"))) {
|
|
82
|
+
return null;
|
|
83
|
+
}
|
|
84
|
+
return x;
|
|
85
|
+
}
|
|
86
|
+
async function $createSecretKey(secret, options) {
|
|
87
|
+
const validated = chunkVCBHSRCS_cjs.$validateCreateSecretKeyOptions(secret, options, "web");
|
|
88
|
+
if (validated.error) return chunkVCBHSRCS_cjs.$err(validated.error);
|
|
89
|
+
const { algorithm, digest, salt, info, encryptAlgo, digestAlgo } = validated;
|
|
90
|
+
try {
|
|
91
|
+
const ikm = await globalThis.crypto.subtle.importKey(
|
|
92
|
+
"raw",
|
|
93
|
+
chunkVCBHSRCS_cjs.textEncoder.encode(secret.normalize("NFKC")),
|
|
94
|
+
"HKDF",
|
|
95
|
+
false,
|
|
96
|
+
["deriveKey"]
|
|
97
|
+
);
|
|
98
|
+
const extractable = options.extractable ?? false;
|
|
99
|
+
const key = await globalThis.crypto.subtle.deriveKey(
|
|
100
|
+
{
|
|
101
|
+
name: "HKDF",
|
|
102
|
+
hash: digestAlgo.web,
|
|
103
|
+
salt: chunkVCBHSRCS_cjs.textEncoder.encode(salt.normalize("NFKC")),
|
|
104
|
+
info: chunkVCBHSRCS_cjs.textEncoder.encode(info.normalize("NFKC"))
|
|
105
|
+
},
|
|
106
|
+
ikm,
|
|
107
|
+
{ name: encryptAlgo.web, length: encryptAlgo.keyBytes * 8 },
|
|
108
|
+
extractable,
|
|
109
|
+
["encrypt", "decrypt"]
|
|
110
|
+
);
|
|
111
|
+
const secretKey = Object.freeze({ platform: "web", digest, algorithm, key, injected: encryptAlgo });
|
|
112
|
+
return chunkVCBHSRCS_cjs.$ok({ result: secretKey });
|
|
113
|
+
} catch (error) {
|
|
114
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
115
|
+
message: "web createSecretKey: Failed to derive key",
|
|
116
|
+
description: chunkVCBHSRCS_cjs.$fmtError(error)
|
|
117
|
+
});
|
|
118
|
+
}
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
// src/web/web-encrypt.ts
|
|
122
|
+
async function $encrypt(data, secretKey, options) {
|
|
123
|
+
if (!chunkVCBHSRCS_cjs.$isStr(data)) {
|
|
124
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
125
|
+
message: "web encrypt: Data must be a non-empty string",
|
|
126
|
+
description: "Received empty or non-string value"
|
|
127
|
+
});
|
|
128
|
+
}
|
|
129
|
+
if (!chunkVCBHSRCS_cjs.$isPlainObj(options)) {
|
|
130
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
131
|
+
message: "web encrypt: Options must be a plain object",
|
|
132
|
+
description: 'Pass an object like { outputEncoding: "base64url" }'
|
|
133
|
+
});
|
|
134
|
+
}
|
|
135
|
+
const outputEncoding = options.outputEncoding ?? "base64url";
|
|
136
|
+
if (!chunkVCBHSRCS_cjs.CIPHER_ENCODING.includes(outputEncoding)) {
|
|
137
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
138
|
+
message: `web encrypt: Unsupported output encoding: ${outputEncoding}`,
|
|
139
|
+
description: "Use base64, base64url, or hex"
|
|
140
|
+
});
|
|
141
|
+
}
|
|
142
|
+
const injectedKey = $isWebSecretKey(secretKey);
|
|
143
|
+
if (!injectedKey) {
|
|
144
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
145
|
+
message: "web encrypt: Invalid secret key",
|
|
146
|
+
description: "Expected a WebSecretKey created by webKit.createSecretKey()"
|
|
147
|
+
});
|
|
148
|
+
}
|
|
149
|
+
const { result, error } = $convertStrToBytes2(data, "utf8");
|
|
150
|
+
if (error) return chunkVCBHSRCS_cjs.$err(error);
|
|
151
|
+
try {
|
|
152
|
+
const iv = globalThis.crypto.getRandomValues(new Uint8Array(chunkVCBHSRCS_cjs.GCM_IV_LENGTH));
|
|
153
|
+
const cipherWithTag = await globalThis.crypto.subtle.encrypt(
|
|
154
|
+
{ name: injectedKey.injected.web, iv },
|
|
155
|
+
injectedKey.key,
|
|
156
|
+
result
|
|
157
|
+
);
|
|
158
|
+
const cipherOnly = cipherWithTag.slice(0, cipherWithTag.byteLength - chunkVCBHSRCS_cjs.GCM_TAG_BYTES);
|
|
159
|
+
const tag = cipherWithTag.slice(cipherWithTag.byteLength - chunkVCBHSRCS_cjs.GCM_TAG_BYTES);
|
|
160
|
+
const ivStr = $convertBytesToStr2(iv, outputEncoding);
|
|
161
|
+
const cipherStr = $convertBytesToStr2(cipherOnly, outputEncoding);
|
|
162
|
+
const tagStr = $convertBytesToStr2(tag, outputEncoding);
|
|
163
|
+
if (ivStr.error || cipherStr.error || tagStr.error) {
|
|
164
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
165
|
+
message: "web encrypt: Failed to encode output",
|
|
166
|
+
description: `Conversion error: ${chunkVCBHSRCS_cjs.$fmtResultErr(ivStr.error || cipherStr.error || tagStr.error)}`
|
|
167
|
+
});
|
|
168
|
+
}
|
|
169
|
+
return chunkVCBHSRCS_cjs.$ok(`${ivStr.result}.${cipherStr.result}.${tagStr.result}.`);
|
|
170
|
+
} catch (error2) {
|
|
171
|
+
return chunkVCBHSRCS_cjs.$err({ message: "web encrypt: Failed to encrypt data", description: chunkVCBHSRCS_cjs.$fmtError(error2) });
|
|
172
|
+
} finally {
|
|
173
|
+
result.fill(0);
|
|
174
|
+
}
|
|
175
|
+
}
|
|
176
|
+
async function $decrypt(encrypted, secretKey, options) {
|
|
177
|
+
if (!chunkVCBHSRCS_cjs.matchEncryptedPattern(encrypted)) {
|
|
178
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
179
|
+
message: "web decrypt: Invalid encrypted data format",
|
|
180
|
+
description: 'Encrypted data must be in the format "iv.cipher.tag."'
|
|
181
|
+
});
|
|
182
|
+
}
|
|
183
|
+
if (!chunkVCBHSRCS_cjs.$isPlainObj(options)) {
|
|
184
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
185
|
+
message: "web decrypt: Options must be a plain object",
|
|
186
|
+
description: 'Pass an object like { inputEncoding: "base64url" }'
|
|
187
|
+
});
|
|
188
|
+
}
|
|
189
|
+
const inputEncoding = options.inputEncoding ?? "base64url";
|
|
190
|
+
if (!chunkVCBHSRCS_cjs.CIPHER_ENCODING.includes(inputEncoding)) {
|
|
191
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
192
|
+
message: `web decrypt: Unsupported input encoding: ${inputEncoding}`,
|
|
193
|
+
description: "Use base64, base64url, or hex"
|
|
194
|
+
});
|
|
195
|
+
}
|
|
196
|
+
const [iv, cipher, tag] = encrypted.split(".", 4);
|
|
197
|
+
const injectedKey = $isWebSecretKey(secretKey);
|
|
198
|
+
if (!injectedKey) {
|
|
199
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
200
|
+
message: "web decrypt: Invalid secret key",
|
|
201
|
+
description: "Expected a WebSecretKey created by webKit.createSecretKey()"
|
|
202
|
+
});
|
|
203
|
+
}
|
|
204
|
+
const ivBytes = $convertStrToBytes2(iv, inputEncoding);
|
|
205
|
+
const cipherBytes = $convertStrToBytes2(cipher, inputEncoding);
|
|
206
|
+
const tagBytes = $convertStrToBytes2(tag, inputEncoding);
|
|
207
|
+
if (ivBytes.error || cipherBytes.error || tagBytes.error) {
|
|
208
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
209
|
+
message: "web decrypt: Failed to decode input",
|
|
210
|
+
description: `Conversion error: ${chunkVCBHSRCS_cjs.$fmtResultErr(ivBytes.error || cipherBytes.error || tagBytes.error)}`
|
|
211
|
+
});
|
|
212
|
+
}
|
|
213
|
+
if (ivBytes.result.byteLength !== chunkVCBHSRCS_cjs.GCM_IV_LENGTH) {
|
|
214
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
215
|
+
message: "web decrypt: Invalid IV length",
|
|
216
|
+
description: `Expected ${chunkVCBHSRCS_cjs.GCM_IV_LENGTH} bytes, got ${ivBytes.result.byteLength}`
|
|
217
|
+
});
|
|
218
|
+
}
|
|
219
|
+
if (tagBytes.result.byteLength !== chunkVCBHSRCS_cjs.GCM_TAG_BYTES) {
|
|
220
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
221
|
+
message: "web decrypt: Invalid auth tag length",
|
|
222
|
+
description: `Expected ${chunkVCBHSRCS_cjs.GCM_TAG_BYTES} bytes, got ${tagBytes.result.byteLength}`
|
|
223
|
+
});
|
|
224
|
+
}
|
|
225
|
+
const cipherWithTag = new Uint8Array(cipherBytes.result.byteLength + tagBytes.result.byteLength);
|
|
226
|
+
cipherWithTag.set(new Uint8Array(cipherBytes.result), 0);
|
|
227
|
+
cipherWithTag.set(new Uint8Array(tagBytes.result), cipherBytes.result.byteLength);
|
|
228
|
+
let decrypted;
|
|
229
|
+
try {
|
|
230
|
+
decrypted = new Uint8Array(
|
|
231
|
+
await globalThis.crypto.subtle.decrypt(
|
|
232
|
+
{ name: injectedKey.injected.web, iv: ivBytes.result },
|
|
233
|
+
injectedKey.key,
|
|
234
|
+
cipherWithTag
|
|
235
|
+
)
|
|
236
|
+
);
|
|
237
|
+
return $convertBytesToStr2(decrypted, "utf8");
|
|
238
|
+
} catch (error) {
|
|
239
|
+
return chunkVCBHSRCS_cjs.$err({ message: "web decrypt: Failed to decrypt data", description: chunkVCBHSRCS_cjs.$fmtError(error) });
|
|
240
|
+
} finally {
|
|
241
|
+
decrypted?.fill(0);
|
|
242
|
+
}
|
|
243
|
+
}
|
|
244
|
+
async function $encryptObj(data, secretKey, options) {
|
|
245
|
+
const { result, error } = chunkVCBHSRCS_cjs.$stringifyObj(data);
|
|
246
|
+
if (error) return chunkVCBHSRCS_cjs.$err(error);
|
|
247
|
+
return await $encrypt(result, secretKey, options);
|
|
248
|
+
}
|
|
249
|
+
async function $decryptObj(encrypted, secretKey, options) {
|
|
250
|
+
const { result, error } = await $decrypt(encrypted, secretKey, options);
|
|
251
|
+
if (error) return chunkVCBHSRCS_cjs.$err(error);
|
|
252
|
+
return chunkVCBHSRCS_cjs.$parseToObj(result);
|
|
253
|
+
}
|
|
254
|
+
|
|
255
|
+
// src/web/web-hash.ts
|
|
256
|
+
async function $hash(data, options = {}) {
|
|
257
|
+
if (!chunkVCBHSRCS_cjs.$isStr(data)) {
|
|
258
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
259
|
+
message: "web hash: Data must be a non-empty string",
|
|
260
|
+
description: "Received empty or non-string value"
|
|
261
|
+
});
|
|
262
|
+
}
|
|
263
|
+
if (!chunkVCBHSRCS_cjs.$isPlainObj(options)) {
|
|
264
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
265
|
+
message: "web hash: Options must be a plain object",
|
|
266
|
+
description: 'Pass an object like { digest: "sha256" }'
|
|
267
|
+
});
|
|
268
|
+
}
|
|
269
|
+
const outputEncoding = options.outputEncoding ?? "base64url";
|
|
270
|
+
if (!chunkVCBHSRCS_cjs.CIPHER_ENCODING.includes(outputEncoding)) {
|
|
271
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
272
|
+
message: `web hash: Unsupported output encoding: ${outputEncoding}`,
|
|
273
|
+
description: "Use base64, base64url, or hex"
|
|
274
|
+
});
|
|
275
|
+
}
|
|
276
|
+
const digest = options.digest ?? "sha256";
|
|
277
|
+
if (!(digest in chunkVCBHSRCS_cjs.DIGEST_ALGORITHMS)) {
|
|
278
|
+
return chunkVCBHSRCS_cjs.$err({
|
|
279
|
+
message: `web hash: Unsupported digest: ${digest}`,
|
|
280
|
+
description: `Supported digests are: ${Object.keys(chunkVCBHSRCS_cjs.DIGEST_ALGORITHMS).join(", ")}`
|
|
281
|
+
});
|
|
282
|
+
}
|
|
283
|
+
const digestAlgo = chunkVCBHSRCS_cjs.DIGEST_ALGORITHMS[digest];
|
|
284
|
+
const { result, error } = $convertStrToBytes2(data, "utf8");
|
|
285
|
+
if (error) return chunkVCBHSRCS_cjs.$err(error);
|
|
286
|
+
try {
|
|
287
|
+
const hashed = await globalThis.crypto.subtle.digest(digestAlgo.web, result);
|
|
288
|
+
return $convertBytesToStr2(hashed, outputEncoding);
|
|
289
|
+
} catch (error2) {
|
|
290
|
+
return chunkVCBHSRCS_cjs.$err({ message: "web hash: Failed to hash data", description: chunkVCBHSRCS_cjs.$fmtError(error2) });
|
|
291
|
+
}
|
|
292
|
+
}
|
|
293
|
+
async function $hashPassword(password, options) {
|
|
294
|
+
const validated = chunkVCBHSRCS_cjs.$validateHashPasswordOptions(password, options, "web");
|
|
295
|
+
if (validated.error) return chunkVCBHSRCS_cjs.$err(validated.error);
|
|
296
|
+
const { digestAlgo, outputEncoding, saltLength, iterations, keyLength } = validated;
|
|
297
|
+
const salt = globalThis.crypto.getRandomValues(new Uint8Array(saltLength));
|
|
298
|
+
let bits;
|
|
299
|
+
try {
|
|
300
|
+
const baseKey = await globalThis.crypto.subtle.importKey(
|
|
301
|
+
"raw",
|
|
302
|
+
chunkVCBHSRCS_cjs.textEncoder.encode(password.normalize("NFKC")),
|
|
303
|
+
"PBKDF2",
|
|
304
|
+
false,
|
|
305
|
+
["deriveBits"]
|
|
306
|
+
);
|
|
307
|
+
bits = await globalThis.crypto.subtle.deriveBits(
|
|
308
|
+
{ name: "PBKDF2", salt, iterations, hash: digestAlgo.web },
|
|
309
|
+
baseKey,
|
|
310
|
+
keyLength * 8
|
|
311
|
+
);
|
|
312
|
+
const saltStr = $convertBytesToStr2(salt, outputEncoding);
|
|
313
|
+
if (saltStr.error) return chunkVCBHSRCS_cjs.$err(saltStr.error);
|
|
314
|
+
const hashedPasswordStr = $convertBytesToStr2(bits, outputEncoding);
|
|
315
|
+
if (hashedPasswordStr.error) return chunkVCBHSRCS_cjs.$err(hashedPasswordStr.error);
|
|
316
|
+
return chunkVCBHSRCS_cjs.$ok({ result: hashedPasswordStr.result, salt: saltStr.result });
|
|
317
|
+
} catch (error) {
|
|
318
|
+
return chunkVCBHSRCS_cjs.$err({ message: "web hashPassword: Failed to hash password", description: chunkVCBHSRCS_cjs.$fmtError(error) });
|
|
319
|
+
} finally {
|
|
320
|
+
salt.fill(0);
|
|
321
|
+
if (bits) new Uint8Array(bits).fill(0);
|
|
322
|
+
}
|
|
323
|
+
}
|
|
324
|
+
async function $verifyPassword(password, hashedPassword, salt, options) {
|
|
325
|
+
const validated = chunkVCBHSRCS_cjs.$validateVerifyPasswordOptions(password, hashedPassword, salt, options, "web");
|
|
326
|
+
if (validated.error) return chunkVCBHSRCS_cjs.$err(validated.error);
|
|
327
|
+
const { digestAlgo, inputEncoding, iterations, keyLength } = validated;
|
|
328
|
+
const saltBytes = $convertStrToBytes2(salt, inputEncoding);
|
|
329
|
+
if (saltBytes.error) return chunkVCBHSRCS_cjs.$err(saltBytes.error);
|
|
330
|
+
const hashedPasswordBytes = $convertStrToBytes2(hashedPassword, inputEncoding);
|
|
331
|
+
if (hashedPasswordBytes.error) return chunkVCBHSRCS_cjs.$err(hashedPasswordBytes.error);
|
|
332
|
+
if (hashedPasswordBytes.result.byteLength !== keyLength) return chunkVCBHSRCS_cjs.$ok(false);
|
|
333
|
+
try {
|
|
334
|
+
const baseKey = await globalThis.crypto.subtle.importKey(
|
|
335
|
+
"raw",
|
|
336
|
+
chunkVCBHSRCS_cjs.textEncoder.encode(password.normalize("NFKC")),
|
|
337
|
+
"PBKDF2",
|
|
338
|
+
false,
|
|
339
|
+
["deriveBits"]
|
|
340
|
+
);
|
|
341
|
+
const bits = new Uint8Array(
|
|
342
|
+
await globalThis.crypto.subtle.deriveBits(
|
|
343
|
+
{ name: "PBKDF2", salt: saltBytes.result, iterations, hash: digestAlgo.web },
|
|
344
|
+
baseKey,
|
|
345
|
+
keyLength * 8
|
|
346
|
+
)
|
|
347
|
+
);
|
|
348
|
+
const expected = hashedPasswordBytes.result;
|
|
349
|
+
const left = new Uint8Array(keyLength);
|
|
350
|
+
const right = new Uint8Array(keyLength);
|
|
351
|
+
left.set(bits);
|
|
352
|
+
right.set(expected);
|
|
353
|
+
let diff = 0;
|
|
354
|
+
for (let i = 0; i < keyLength; i++) {
|
|
355
|
+
diff |= left[i] ^ right[i];
|
|
356
|
+
}
|
|
357
|
+
try {
|
|
358
|
+
return chunkVCBHSRCS_cjs.$ok(diff === 0);
|
|
359
|
+
} finally {
|
|
360
|
+
left.fill(0);
|
|
361
|
+
right.fill(0);
|
|
362
|
+
bits.fill(0);
|
|
363
|
+
}
|
|
364
|
+
} catch (error) {
|
|
365
|
+
return chunkVCBHSRCS_cjs.$err({ message: "web verifyPassword: Verification failed", description: chunkVCBHSRCS_cjs.$fmtError(error) });
|
|
366
|
+
} finally {
|
|
367
|
+
saltBytes.result.fill(0);
|
|
368
|
+
hashedPasswordBytes.result.fill(0);
|
|
369
|
+
}
|
|
370
|
+
}
|
|
371
|
+
|
|
372
|
+
// src/web/kit.ts
|
|
373
|
+
function isWebSecretKey(x) {
|
|
374
|
+
return $isWebSecretKey(x) !== null;
|
|
375
|
+
}
|
|
376
|
+
function tryGenerateUuid() {
|
|
377
|
+
try {
|
|
378
|
+
return chunkVCBHSRCS_cjs.$ok(globalThis.crypto.randomUUID());
|
|
379
|
+
} catch (error) {
|
|
380
|
+
return chunkVCBHSRCS_cjs.$err({ message: "web generateUuid: Failed to generate UUID", description: chunkVCBHSRCS_cjs.$fmtError(error) });
|
|
381
|
+
}
|
|
382
|
+
}
|
|
383
|
+
function generateUuid() {
|
|
384
|
+
return globalThis.crypto.randomUUID();
|
|
385
|
+
}
|
|
386
|
+
async function tryCreateSecretKey(secret, options = {}) {
|
|
387
|
+
return await $createSecretKey(secret, options);
|
|
388
|
+
}
|
|
389
|
+
async function createSecretKey(secret, options = {}) {
|
|
390
|
+
const { result, error } = await $createSecretKey(secret, options);
|
|
391
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
392
|
+
return result;
|
|
393
|
+
}
|
|
394
|
+
async function tryEncrypt(data, secretKey, options = {}) {
|
|
395
|
+
return await $encrypt(data, secretKey, options);
|
|
396
|
+
}
|
|
397
|
+
async function encrypt(data, secretKey, options = {}) {
|
|
398
|
+
const { result, error } = await $encrypt(data, secretKey, options);
|
|
399
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
400
|
+
return result;
|
|
401
|
+
}
|
|
402
|
+
async function tryDecrypt(encrypted, secretKey, options = {}) {
|
|
403
|
+
return await $decrypt(encrypted, secretKey, options);
|
|
404
|
+
}
|
|
405
|
+
async function decrypt(encrypted, secretKey, options = {}) {
|
|
406
|
+
const { result, error } = await $decrypt(encrypted, secretKey, options);
|
|
407
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
408
|
+
return result;
|
|
409
|
+
}
|
|
410
|
+
async function tryEncryptObj(obj, secretKey, options = {}) {
|
|
411
|
+
return await $encryptObj(obj, secretKey, options);
|
|
412
|
+
}
|
|
413
|
+
async function encryptObj(obj, secretKey, options = {}) {
|
|
414
|
+
const { result, error } = await $encryptObj(obj, secretKey, options);
|
|
415
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
416
|
+
return result;
|
|
417
|
+
}
|
|
418
|
+
async function tryDecryptObj(encrypted, secretKey, options = {}) {
|
|
419
|
+
return await $decryptObj(encrypted, secretKey, options);
|
|
420
|
+
}
|
|
421
|
+
async function decryptObj(encrypted, secretKey, options = {}) {
|
|
422
|
+
const { result, error } = await $decryptObj(encrypted, secretKey, options);
|
|
423
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
424
|
+
return result;
|
|
425
|
+
}
|
|
426
|
+
async function tryHash(data, options = {}) {
|
|
427
|
+
return await $hash(data, options);
|
|
428
|
+
}
|
|
429
|
+
async function hash(data, options = {}) {
|
|
430
|
+
const { result, error } = await $hash(data, options);
|
|
431
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
432
|
+
return result;
|
|
433
|
+
}
|
|
434
|
+
async function tryHashPassword(password, options = {}) {
|
|
435
|
+
return await $hashPassword(password, options);
|
|
436
|
+
}
|
|
437
|
+
async function hashPassword(password, options = {}) {
|
|
438
|
+
const { result, salt, error } = await $hashPassword(password, options);
|
|
439
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
440
|
+
return { result, salt };
|
|
441
|
+
}
|
|
442
|
+
async function tryVerifyPassword(password, hashedPassword, salt, options = {}) {
|
|
443
|
+
return await $verifyPassword(password, hashedPassword, salt, options);
|
|
444
|
+
}
|
|
445
|
+
async function verifyPassword(password, hashedPassword, salt, options = {}) {
|
|
446
|
+
const { result, error } = await $verifyPassword(password, hashedPassword, salt, options);
|
|
447
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
448
|
+
return result;
|
|
449
|
+
}
|
|
450
|
+
function tryConvertStrToBytes(data, inputEncoding = "utf8") {
|
|
451
|
+
return $convertStrToBytes2(data, inputEncoding);
|
|
452
|
+
}
|
|
453
|
+
function convertStrToBytes(data, inputEncoding = "utf8") {
|
|
454
|
+
const { result, error } = $convertStrToBytes2(data, inputEncoding);
|
|
455
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
456
|
+
return result;
|
|
457
|
+
}
|
|
458
|
+
function tryConvertBytesToStr(data, outputEncoding = "utf8") {
|
|
459
|
+
return $convertBytesToStr2(data, outputEncoding);
|
|
460
|
+
}
|
|
461
|
+
function convertBytesToStr(data, outputEncoding = "utf8") {
|
|
462
|
+
const { result, error } = $convertBytesToStr2(data, outputEncoding);
|
|
463
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
464
|
+
return result;
|
|
465
|
+
}
|
|
466
|
+
function tryConvertEncoding(data, from, to) {
|
|
467
|
+
return $convertEncoding(data, from, to);
|
|
468
|
+
}
|
|
469
|
+
function convertEncoding(data, from, to) {
|
|
470
|
+
const { result, error } = $convertEncoding(data, from, to);
|
|
471
|
+
if (error) throw new Error(chunkVCBHSRCS_cjs.$fmtResultErr(error));
|
|
472
|
+
return result;
|
|
473
|
+
}
|
|
474
|
+
|
|
475
|
+
exports.convertBytesToStr = convertBytesToStr;
|
|
476
|
+
exports.convertEncoding = convertEncoding;
|
|
477
|
+
exports.convertStrToBytes = convertStrToBytes;
|
|
478
|
+
exports.createSecretKey = createSecretKey;
|
|
479
|
+
exports.decrypt = decrypt;
|
|
480
|
+
exports.decryptObj = decryptObj;
|
|
481
|
+
exports.encrypt = encrypt;
|
|
482
|
+
exports.encryptObj = encryptObj;
|
|
483
|
+
exports.generateUuid = generateUuid;
|
|
484
|
+
exports.hash = hash;
|
|
485
|
+
exports.hashPassword = hashPassword;
|
|
486
|
+
exports.isWebSecretKey = isWebSecretKey;
|
|
487
|
+
exports.kit_exports = kit_exports;
|
|
488
|
+
exports.tryConvertBytesToStr = tryConvertBytesToStr;
|
|
489
|
+
exports.tryConvertEncoding = tryConvertEncoding;
|
|
490
|
+
exports.tryConvertStrToBytes = tryConvertStrToBytes;
|
|
491
|
+
exports.tryCreateSecretKey = tryCreateSecretKey;
|
|
492
|
+
exports.tryDecrypt = tryDecrypt;
|
|
493
|
+
exports.tryDecryptObj = tryDecryptObj;
|
|
494
|
+
exports.tryEncrypt = tryEncrypt;
|
|
495
|
+
exports.tryEncryptObj = tryEncryptObj;
|
|
496
|
+
exports.tryGenerateUuid = tryGenerateUuid;
|
|
497
|
+
exports.tryHash = tryHash;
|
|
498
|
+
exports.tryHashPassword = tryHashPassword;
|
|
499
|
+
exports.tryVerifyPassword = tryVerifyPassword;
|
|
500
|
+
exports.verifyPassword = verifyPassword;
|
|
501
|
+
//# sourceMappingURL=chunk-7254PEID.cjs.map
|
|
502
|
+
//# sourceMappingURL=chunk-7254PEID.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/web/kit.ts","../src/web/web-encode.ts","../src/web/web-secret-key.ts","../src/web/web-encrypt.ts","../src/web/web-hash.ts"],"names":["__export","$convertStrToBytes","$err","$convertBytesToStr","$isStr","ENCODING","$ok","$validateSecretKeyBase","$isObj","$validateCreateSecretKeyOptions","textEncoder","$fmtError","$isPlainObj","CIPHER_ENCODING","GCM_IV_LENGTH","GCM_TAG_BYTES","$fmtResultErr","error","matchEncryptedPattern","$stringifyObj","$parseToObj","DIGEST_ALGORITHMS","$validateHashPasswordOptions","$validateVerifyPasswordOptions"],"mappings":";;;;;AAAA,IAAA,WAAA,GAAA;AAAAA,0BAAA,CAAA,WAAA,EAAA;AAAA,EAAA,iBAAA,EAAA,MAAA,iBAAA;AAAA,EAAA,eAAA,EAAA,MAAA,eAAA;AAAA,EAAA,iBAAA,EAAA,MAAA,iBAAA;AAAA,EAAA,eAAA,EAAA,MAAA,eAAA;AAAA,EAAA,OAAA,EAAA,MAAA,OAAA;AAAA,EAAA,UAAA,EAAA,MAAA,UAAA;AAAA,EAAA,OAAA,EAAA,MAAA,OAAA;AAAA,EAAA,UAAA,EAAA,MAAA,UAAA;AAAA,EAAA,YAAA,EAAA,MAAA,YAAA;AAAA,EAAA,IAAA,EAAA,MAAA,IAAA;AAAA,EAAA,YAAA,EAAA,MAAA,YAAA;AAAA,EAAA,cAAA,EAAA,MAAA,cAAA;AAAA,EAAA,oBAAA,EAAA,MAAA,oBAAA;AAAA,EAAA,kBAAA,EAAA,MAAA,kBAAA;AAAA,EAAA,oBAAA,EAAA,MAAA,oBAAA;AAAA,EAAA,kBAAA,EAAA,MAAA,kBAAA;AAAA,EAAA,UAAA,EAAA,MAAA,UAAA;AAAA,EAAA,aAAA,EAAA,MAAA,aAAA;AAAA,EAAA,UAAA,EAAA,MAAA,UAAA;AAAA,EAAA,aAAA,EAAA,MAAA,aAAA;AAAA,EAAA,eAAA,EAAA,MAAA,eAAA;AAAA,EAAA,OAAA,EAAA,MAAA,OAAA;AAAA,EAAA,eAAA,EAAA,MAAA,eAAA;AAAA,EAAA,iBAAA,EAAA,MAAA,iBAAA;AAAA,EAAA,cAAA,EAAA,MAAA;AAAA,CAAA,CAAA;;;ACaO,SAASC,mBAAAA,CACd,IAAA,EACA,aAAA,GAA0B,MAAA,EACmB;AAC7C,EAAA,MAAM,MAAA,GAASA,oCAAA,CAAkB,IAAA,EAAM,aAAa,CAAA;AACpD,EAAA,IAAI,OAAO,KAAA,EAAO;AAChB,IAAA,OAAOC,sBAAA,CAAK;AAAA,MACV,SAAS,MAAA,CAAO,KAAA,CAAM,OAAA,CAAQ,OAAA,CAAQ,eAAe,iBAAiB,CAAA;AAAA,MACtE,WAAA,EAAa,OAAO,KAAA,CAAM;AAAA,KAC3B,CAAA;AAAA,EACH;AACA,EAAA,OAAO,MAAA;AACT;AAEO,SAASC,mBAAAA,CAAmB,IAAA,EAAgC,cAAA,GAA2B,MAAA,EAAwB;AACpH,EAAA,MAAM,MAAA,GAASA,oCAAA,CAAkB,IAAA,EAAM,cAAc,CAAA;AACrD,EAAA,IAAI,OAAO,KAAA,EAAO;AAChB,IAAA,OAAOD,sBAAA,CAAK;AAAA,MACV,SAAS,MAAA,CAAO,KAAA,CAAM,OAAA,CAAQ,OAAA,CAAQ,eAAe,iBAAiB,CAAA;AAAA,MACtE,WAAA,EAAa,OAAO,KAAA,CAAM;AAAA,KAC3B,CAAA;AAAA,EACH;AACA,EAAA,OAAO,MAAA;AACT;AAEO,SAAS,gBAAA,CAAiB,IAAA,EAAc,IAAA,EAAgB,EAAA,EAA8B;AAC3F,EAAA,IAAI,CAACE,wBAAA,CAAO,IAAI,CAAA,EAAG;AACjB,IAAA,OAAOF,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,sDAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AACA,EAAA,IAAI,CAACG,2BAAS,QAAA,CAAS,IAAI,KAAK,CAACA,0BAAA,CAAS,QAAA,CAAS,EAAE,CAAA,EAAG;AACtD,IAAA,OAAOH,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,CAAA,gDAAA,EAAmD,IAAI,CAAA,IAAA,EAAO,EAAE,CAAA,CAAA;AAAA,MACzE,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,KAAA,GAAQD,mBAAAA,CAAmB,IAAA,EAAM,IAAI,CAAA;AAC3C,EAAA,IAAI,KAAA,CAAM,KAAA,EAAO,OAAOC,sBAAA,CAAK,MAAM,KAAK,CAAA;AAExC,EAAA,MAAM,GAAA,GAAMC,mBAAAA,CAAmB,KAAA,CAAM,MAAA,EAAQ,EAAE,CAAA;AAC/C,EAAA,IAAI,GAAA,CAAI,KAAA,EAAO,OAAOD,sBAAA,CAAK,IAAI,KAAK,CAAA;AAEpC,EAAA,OAAOI,qBAAA,CAAI,IAAI,MAAM,CAAA;AACvB;;;AC3CO,SAAS,gBAAgB,CAAA,EAAiC;AAC/D,EAAA,MAAM,IAAA,GAAOC,wCAAA,CAAuB,CAAA,EAAG,KAAK,CAAA;AAC5C,EAAA,IAAI,CAAC,MAAM,OAAO,IAAA;AAElB,EAAA,IAAI,OAAO,WAAW,SAAA,KAAc,WAAA,IAAe,EAAE,IAAA,CAAK,GAAA,CAAI,GAAA,YAAe,SAAA,CAAA,EAAY,OAAO,IAAA;AAEhG,EAAA,IACE,CAACC,wBAAA,CAAO,IAAA,CAAK,GAAA,CAAI,GAAA,CAAI,SAAS,CAAA,IAC9B,IAAA,CAAK,GAAA,CAAI,GAAA,CAAI,SAAA,CAAU,IAAA,KAAS,KAAK,SAAA,CAAU,GAAA,IAC9C,OAAO,IAAA,CAAK,GAAA,CAAI,GAAA,CAAI,UAAU,MAAA,KAAW,QAAA,IACxC,IAAA,CAAK,GAAA,CAAI,GAAA,CAAI,SAAA,CAAU,WAAW,IAAA,CAAK,SAAA,CAAU,QAAA,GAAW,CAAA,IAC9D,CAAC,KAAA,CAAM,QAAQ,IAAA,CAAK,GAAA,CAAI,GAAA,CAAI,MAAM,CAAA,IAClC,EAAE,KAAK,GAAA,CAAI,GAAA,CAAI,MAAA,CAAO,QAAA,CAAS,SAAS,CAAA,IAAK,IAAA,CAAK,GAAA,CAAI,GAAA,CAAI,MAAA,CAAO,QAAA,CAAS,SAAS,CAAA,CAAA,EACnF;AACA,IAAA,OAAO,IAAA;AAAA,EACT;AACA,EAAA,OAAO,CAAA;AACT;AAEA,eAAsB,gBAAA,CACpB,QACA,OAAA,EAC2C;AAC3C,EAAA,MAAM,SAAA,GAAYC,iDAAA,CAAgC,MAAA,EAAQ,OAAA,EAAS,KAAK,CAAA;AACxE,EAAA,IAAI,SAAA,CAAU,KAAA,EAAO,OAAOP,sBAAA,CAAK,UAAU,KAAK,CAAA;AAEhD,EAAA,MAAM,EAAE,SAAA,EAAW,MAAA,EAAQ,MAAM,IAAA,EAAM,WAAA,EAAa,YAAW,GAAI,SAAA;AAEnE,EAAA,IAAI;AACF,IAAA,MAAM,GAAA,GAAM,MAAM,UAAA,CAAW,MAAA,CAAO,MAAA,CAAO,SAAA;AAAA,MACzC,KAAA;AAAA,MACAQ,6BAAA,CAAY,MAAA,CAAO,MAAA,CAAO,SAAA,CAAU,MAAM,CAAC,CAAA;AAAA,MAC3C,MAAA;AAAA,MACA,KAAA;AAAA,MACA,CAAC,WAAW;AAAA,KACd;AACA,IAAA,MAAM,WAAA,GAAc,QAAQ,WAAA,IAAe,KAAA;AAC3C,IAAA,MAAM,GAAA,GAAM,MAAM,UAAA,CAAW,MAAA,CAAO,MAAA,CAAO,SAAA;AAAA,MACzC;AAAA,QACE,IAAA,EAAM,MAAA;AAAA,QACN,MAAM,UAAA,CAAW,GAAA;AAAA,QACjB,MAAMA,6BAAA,CAAY,MAAA,CAAO,IAAA,CAAK,SAAA,CAAU,MAAM,CAAC,CAAA;AAAA,QAC/C,MAAMA,6BAAA,CAAY,MAAA,CAAO,IAAA,CAAK,SAAA,CAAU,MAAM,CAAC;AAAA,OACjD;AAAA,MACA,GAAA;AAAA,MACA,EAAE,IAAA,EAAM,WAAA,CAAY,KAAK,MAAA,EAAQ,WAAA,CAAY,WAAW,CAAA,EAAE;AAAA,MAC1D,WAAA;AAAA,MACA,CAAC,WAAW,SAAS;AAAA,KACvB;AACA,IAAA,MAAM,SAAA,GAAY,MAAA,CAAO,MAAA,CAAO,EAAE,QAAA,EAAU,KAAA,EAAO,MAAA,EAAQ,SAAA,EAAW,GAAA,EAAK,QAAA,EAAU,WAAA,EAAa,CAAA;AAElG,IAAA,OAAOJ,qBAAA,CAAI,EAAE,MAAA,EAAQ,SAAA,EAAW,CAAA;AAAA,EAClC,SAAS,KAAA,EAAO;AACd,IAAA,OAAOJ,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,2CAAA;AAAA,MACT,WAAA,EAAaS,4BAAU,KAAK;AAAA,KAC7B,CAAA;AAAA,EACH;AACF;;;ACzDA,eAAsB,QAAA,CACpB,IAAA,EACA,SAAA,EACA,OAAA,EACyB;AACzB,EAAA,IAAI,CAACP,wBAAA,CAAO,IAAI,CAAA,EAAG;AACjB,IAAA,OAAOF,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,8CAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,IAAI,CAACU,6BAAA,CAA4B,OAAO,CAAA,EAAG;AACzC,IAAA,OAAOV,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,6CAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,cAAA,GAAiB,QAAQ,cAAA,IAAkB,WAAA;AACjD,EAAA,IAAI,CAACW,iCAAA,CAAgB,QAAA,CAAS,cAAc,CAAA,EAAG;AAC7C,IAAA,OAAOX,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,6CAA6C,cAAc,CAAA,CAAA;AAAA,MACpE,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,WAAA,GAAc,gBAAgB,SAAS,CAAA;AAC7C,EAAA,IAAI,CAAC,WAAA,EAAa;AAChB,IAAA,OAAOA,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,iCAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,EAAE,MAAA,EAAQ,KAAA,EAAM,GAAID,mBAAAA,CAAmB,MAAM,MAAM,CAAA;AACzD,EAAA,IAAI,KAAA,EAAO,OAAOC,sBAAA,CAAK,KAAK,CAAA;AAE5B,EAAA,IAAI;AACF,IAAA,MAAM,KAAK,UAAA,CAAW,MAAA,CAAO,gBAAgB,IAAI,UAAA,CAAWY,+BAAa,CAAC,CAAA;AAC1E,IAAA,MAAM,aAAA,GAAgB,MAAM,UAAA,CAAW,MAAA,CAAO,MAAA,CAAO,OAAA;AAAA,MACnD,EAAE,IAAA,EAAM,WAAA,CAAY,QAAA,CAAS,KAAK,EAAA,EAAG;AAAA,MACrC,WAAA,CAAY,GAAA;AAAA,MACZ;AAAA,KACF;AAEA,IAAA,MAAM,aAAa,aAAA,CAAc,KAAA,CAAM,CAAA,EAAG,aAAA,CAAc,aAAaC,+BAAa,CAAA;AAClF,IAAA,MAAM,GAAA,GAAM,aAAA,CAAc,KAAA,CAAM,aAAA,CAAc,aAAaA,+BAAa,CAAA;AAExE,IAAA,MAAM,KAAA,GAAQZ,mBAAAA,CAAmB,EAAA,EAAI,cAAc,CAAA;AACnD,IAAA,MAAM,SAAA,GAAYA,mBAAAA,CAAmB,UAAA,EAAY,cAAc,CAAA;AAC/D,IAAA,MAAM,MAAA,GAASA,mBAAAA,CAAmB,GAAA,EAAK,cAAc,CAAA;AAErD,IAAA,IAAI,KAAA,CAAM,KAAA,IAAS,SAAA,CAAU,KAAA,IAAS,OAAO,KAAA,EAAO;AAClD,MAAA,OAAOD,sBAAA,CAAK;AAAA,QACV,OAAA,EAAS,sCAAA;AAAA,QACT,WAAA,EAAa,qBAAqBc,+BAAA,CAAc,KAAA,CAAM,SAAS,SAAA,CAAU,KAAA,IAAS,MAAA,CAAO,KAAK,CAAC,CAAA;AAAA,OAChG,CAAA;AAAA,IACH;AAEA,IAAA,OAAOV,qBAAA,CAAI,CAAA,EAAG,KAAA,CAAM,MAAM,CAAA,CAAA,EAAI,UAAU,MAAM,CAAA,CAAA,EAAI,MAAA,CAAO,MAAM,CAAA,CAAA,CAAG,CAAA;AAAA,EACpE,SAASW,MAAAA,EAAO;AACd,IAAA,OAAOf,sBAAA,CAAK,EAAE,OAAA,EAAS,qCAAA,EAAuC,aAAaS,2BAAA,CAAUM,MAAK,GAAG,CAAA;AAAA,EAC/F,CAAA,SAAE;AACA,IAAA,MAAA,CAAO,KAAK,CAAC,CAAA;AAAA,EACf;AACF;AAEA,eAAsB,QAAA,CACpB,SAAA,EACA,SAAA,EACA,OAAA,EACyB;AACzB,EAAA,IAAI,CAACC,uCAAA,CAAsB,SAAS,CAAA,EAAG;AACrC,IAAA,OAAOhB,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,4CAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,IAAI,CAACU,6BAAA,CAA4B,OAAO,CAAA,EAAG;AACzC,IAAA,OAAOV,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,6CAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,aAAA,GAAgB,QAAQ,aAAA,IAAiB,WAAA;AAC/C,EAAA,IAAI,CAACW,iCAAA,CAAgB,QAAA,CAAS,aAAa,CAAA,EAAG;AAC5C,IAAA,OAAOX,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,4CAA4C,aAAa,CAAA,CAAA;AAAA,MAClE,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,CAAC,IAAI,MAAA,EAAQ,GAAG,IAAI,SAAA,CAAU,KAAA,CAAM,KAAK,CAAC,CAAA;AAEhD,EAAA,MAAM,WAAA,GAAc,gBAAgB,SAAS,CAAA;AAC7C,EAAA,IAAI,CAAC,WAAA,EAAa;AAChB,IAAA,OAAOA,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,iCAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,OAAA,GAAUD,mBAAAA,CAAmB,EAAA,EAAI,aAAa,CAAA;AACpD,EAAA,MAAM,WAAA,GAAcA,mBAAAA,CAAmB,MAAA,EAAQ,aAAa,CAAA;AAC5D,EAAA,MAAM,QAAA,GAAWA,mBAAAA,CAAmB,GAAA,EAAK,aAAa,CAAA;AAEtD,EAAA,IAAI,OAAA,CAAQ,KAAA,IAAS,WAAA,CAAY,KAAA,IAAS,SAAS,KAAA,EAAO;AACxD,IAAA,OAAOC,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,qCAAA;AAAA,MACT,WAAA,EAAa,qBAAqBc,+BAAA,CAAc,OAAA,CAAQ,SAAS,WAAA,CAAY,KAAA,IAAS,QAAA,CAAS,KAAK,CAAC,CAAA;AAAA,KACtG,CAAA;AAAA,EACH;AAEA,EAAA,IAAI,OAAA,CAAQ,MAAA,CAAO,UAAA,KAAeF,+BAAA,EAAe;AAC/C,IAAA,OAAOZ,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,gCAAA;AAAA,MACT,aAAa,CAAA,SAAA,EAAYY,+BAAa,CAAA,YAAA,EAAe,OAAA,CAAQ,OAAO,UAAU,CAAA;AAAA,KAC/E,CAAA;AAAA,EACH;AAEA,EAAA,IAAI,QAAA,CAAS,MAAA,CAAO,UAAA,KAAeC,+BAAA,EAAe;AAChD,IAAA,OAAOb,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,sCAAA;AAAA,MACT,aAAa,CAAA,SAAA,EAAYa,+BAAa,CAAA,YAAA,EAAe,QAAA,CAAS,OAAO,UAAU,CAAA;AAAA,KAChF,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,aAAA,GAAgB,IAAI,UAAA,CAAW,WAAA,CAAY,OAAO,UAAA,GAAa,QAAA,CAAS,OAAO,UAAU,CAAA;AAC/F,EAAA,aAAA,CAAc,IAAI,IAAI,UAAA,CAAW,WAAA,CAAY,MAAM,GAAG,CAAC,CAAA;AACvD,EAAA,aAAA,CAAc,GAAA,CAAI,IAAI,UAAA,CAAW,QAAA,CAAS,MAAM,CAAA,EAAG,WAAA,CAAY,OAAO,UAAU,CAAA;AAEhF,EAAA,IAAI,SAAA;AACJ,EAAA,IAAI;AACF,IAAA,SAAA,GAAY,IAAI,UAAA;AAAA,MACd,MAAM,UAAA,CAAW,MAAA,CAAO,MAAA,CAAO,OAAA;AAAA,QAC7B,EAAE,IAAA,EAAM,WAAA,CAAY,SAAS,GAAA,EAAK,EAAA,EAAI,QAAQ,MAAA,EAAO;AAAA,QACrD,WAAA,CAAY,GAAA;AAAA,QACZ;AAAA;AACF,KACF;AAEA,IAAA,OAAOZ,mBAAAA,CAAmB,WAAW,MAAM,CAAA;AAAA,EAC7C,SAAS,KAAA,EAAO;AACd,IAAA,OAAOD,sBAAA,CAAK,EAAE,OAAA,EAAS,qCAAA,EAAuC,aAAaS,2BAAA,CAAU,KAAK,GAAG,CAAA;AAAA,EAC/F,CAAA,SAAE;AACA,IAAA,SAAA,EAAW,KAAK,CAAC,CAAA;AAAA,EACnB;AACF;AAEA,eAAsB,WAAA,CACpB,IAAA,EACA,SAAA,EACA,OAAA,EACyB;AACzB,EAAA,MAAM,EAAE,MAAA,EAAQ,KAAA,EAAM,GAAIQ,gCAAc,IAAI,CAAA;AAC5C,EAAA,IAAI,KAAA,EAAO,OAAOjB,sBAAA,CAAK,KAAK,CAAA;AAC5B,EAAA,OAAO,MAAM,QAAA,CAAS,MAAA,EAAQ,SAAA,EAAW,OAAO,CAAA;AAClD;AAEA,eAAsB,WAAA,CACpB,SAAA,EACA,SAAA,EACA,OAAA,EACgC;AAChC,EAAA,MAAM,EAAE,QAAQ,KAAA,EAAM,GAAI,MAAM,QAAA,CAAS,SAAA,EAAW,WAAW,OAAO,CAAA;AACtE,EAAA,IAAI,KAAA,EAAO,OAAOA,sBAAA,CAAK,KAAK,CAAA;AAC5B,EAAA,OAAOkB,8BAAe,MAAM,CAAA;AAC9B;;;ACrLA,eAAsB,KAAA,CAAM,IAAA,EAAc,OAAA,GAAuB,EAAC,EAA4B;AAC5F,EAAA,IAAI,CAAChB,wBAAA,CAAO,IAAI,CAAA,EAAG;AACjB,IAAA,OAAOF,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,2CAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,IAAI,CAACU,6BAAA,CAAyB,OAAO,CAAA,EAAG;AACtC,IAAA,OAAOV,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,0CAAA;AAAA,MACT,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,cAAA,GAAiB,QAAQ,cAAA,IAAkB,WAAA;AACjD,EAAA,IAAI,CAACW,iCAAA,CAAgB,QAAA,CAAS,cAAc,CAAA,EAAG;AAC7C,IAAA,OAAOX,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,0CAA0C,cAAc,CAAA,CAAA;AAAA,MACjE,WAAA,EAAa;AAAA,KACd,CAAA;AAAA,EACH;AAEA,EAAA,MAAM,MAAA,GAAS,QAAQ,MAAA,IAAU,QAAA;AACjC,EAAA,IAAI,EAAE,UAAUmB,mCAAA,CAAA,EAAoB;AAClC,IAAA,OAAOnB,sBAAA,CAAK;AAAA,MACV,OAAA,EAAS,iCAAiC,MAAM,CAAA,CAAA;AAAA,MAChD,WAAA,EAAa,0BAA0B,MAAA,CAAO,IAAA,CAAKmB,mCAAiB,CAAA,CAAE,IAAA,CAAK,IAAI,CAAC,CAAA;AAAA,KACjF,CAAA;AAAA,EACH;AACA,EAAA,MAAM,UAAA,GAAaA,oCAAkB,MAAM,CAAA;AAE3C,EAAA,MAAM,EAAE,MAAA,EAAQ,KAAA,EAAM,GAAIpB,mBAAAA,CAAmB,MAAM,MAAM,CAAA;AACzD,EAAA,IAAI,KAAA,EAAO,OAAOC,sBAAA,CAAK,KAAK,CAAA;AAE5B,EAAA,IAAI;AACF,IAAA,MAAM,MAAA,GAAS,MAAM,UAAA,CAAW,MAAA,CAAO,OAAO,MAAA,CAAO,UAAA,CAAW,KAAK,MAAM,CAAA;AAC3E,IAAA,OAAOC,mBAAAA,CAAmB,QAAQ,cAAc,CAAA;AAAA,EAClD,SAASc,MAAAA,EAAO;AACd,IAAA,OAAOf,sBAAA,CAAK,EAAE,OAAA,EAAS,+BAAA,EAAiC,aAAaS,2BAAA,CAAUM,MAAK,GAAG,CAAA;AAAA,EACzF;AACF;AAEA,eAAsB,aAAA,CACpB,UACA,OAAA,EACmD;AACnD,EAAA,MAAM,SAAA,GAAYK,8CAAA,CAA6B,QAAA,EAAU,OAAA,EAAS,KAAK,CAAA;AACvE,EAAA,IAAI,SAAA,CAAU,KAAA,EAAO,OAAOpB,sBAAA,CAAK,UAAU,KAAK,CAAA;AAEhD,EAAA,MAAM,EAAE,UAAA,EAAY,cAAA,EAAgB,UAAA,EAAY,UAAA,EAAY,WAAU,GAAI,SAAA;AAE1E,EAAA,MAAM,OAAO,UAAA,CAAW,MAAA,CAAO,gBAAgB,IAAI,UAAA,CAAW,UAAU,CAAC,CAAA;AACzE,EAAA,IAAI,IAAA;AACJ,EAAA,IAAI;AACF,IAAA,MAAM,OAAA,GAAU,MAAM,UAAA,CAAW,MAAA,CAAO,MAAA,CAAO,SAAA;AAAA,MAC7C,KAAA;AAAA,MACAQ,6BAAA,CAAY,MAAA,CAAO,QAAA,CAAS,SAAA,CAAU,MAAM,CAAC,CAAA;AAAA,MAC7C,QAAA;AAAA,MACA,KAAA;AAAA,MACA,CAAC,YAAY;AAAA,KACf;AACA,IAAA,IAAA,GAAO,MAAM,UAAA,CAAW,MAAA,CAAO,MAAA,CAAO,UAAA;AAAA,MACpC,EAAE,IAAA,EAAM,QAAA,EAAU,MAAM,UAAA,EAAY,IAAA,EAAM,WAAW,GAAA,EAAI;AAAA,MACzD,OAAA;AAAA,MACA,SAAA,GAAY;AAAA,KACd;AAEA,IAAA,MAAM,OAAA,GAAUP,mBAAAA,CAAmB,IAAA,EAAM,cAAc,CAAA;AACvD,IAAA,IAAI,OAAA,CAAQ,KAAA,EAAO,OAAOD,sBAAA,CAAK,QAAQ,KAAK,CAAA;AAE5C,IAAA,MAAM,iBAAA,GAAoBC,mBAAAA,CAAmB,IAAA,EAAM,cAAc,CAAA;AACjE,IAAA,IAAI,iBAAA,CAAkB,KAAA,EAAO,OAAOD,sBAAA,CAAK,kBAAkB,KAAK,CAAA;AAEhE,IAAA,OAAOI,qBAAA,CAAI,EAAE,MAAA,EAAQ,iBAAA,CAAkB,QAAQ,IAAA,EAAM,OAAA,CAAQ,QAAQ,CAAA;AAAA,EACvE,SAAS,KAAA,EAAO;AACd,IAAA,OAAOJ,sBAAA,CAAK,EAAE,OAAA,EAAS,2CAAA,EAA6C,aAAaS,2BAAA,CAAU,KAAK,GAAG,CAAA;AAAA,EACrG,CAAA,SAAE;AACA,IAAA,IAAA,CAAK,KAAK,CAAC,CAAA;AACX,IAAA,IAAI,MAAM,IAAI,UAAA,CAAW,IAAI,CAAA,CAAE,KAAK,CAAC,CAAA;AAAA,EACvC;AACF;AAEA,eAAsB,eAAA,CACpB,QAAA,EACA,cAAA,EACA,IAAA,EACA,OAAA,EAC0B;AAC1B,EAAA,MAAM,YAAYY,gDAAA,CAA+B,QAAA,EAAU,cAAA,EAAgB,IAAA,EAAM,SAAS,KAAK,CAAA;AAC/F,EAAA,IAAI,SAAA,CAAU,KAAA,EAAO,OAAOrB,sBAAA,CAAK,UAAU,KAAK,CAAA;AAEhD,EAAA,MAAM,EAAE,UAAA,EAAY,aAAA,EAAe,UAAA,EAAY,WAAU,GAAI,SAAA;AAE7D,EAAA,MAAM,SAAA,GAAYD,mBAAAA,CAAmB,IAAA,EAAM,aAAa,CAAA;AACxD,EAAA,IAAI,SAAA,CAAU,KAAA,EAAO,OAAOC,sBAAA,CAAK,UAAU,KAAK,CAAA;AAEhD,EAAA,MAAM,mBAAA,GAAsBD,mBAAAA,CAAmB,cAAA,EAAgB,aAAa,CAAA;AAC5E,EAAA,IAAI,mBAAA,CAAoB,KAAA,EAAO,OAAOC,sBAAA,CAAK,oBAAoB,KAAK,CAAA;AAEpE,EAAA,IAAI,oBAAoB,MAAA,CAAO,UAAA,KAAe,SAAA,EAAW,OAAOI,sBAAI,KAAK,CAAA;AAEzE,EAAA,IAAI;AACF,IAAA,MAAM,OAAA,GAAU,MAAM,UAAA,CAAW,MAAA,CAAO,MAAA,CAAO,SAAA;AAAA,MAC7C,KAAA;AAAA,MACAI,6BAAA,CAAY,MAAA,CAAO,QAAA,CAAS,SAAA,CAAU,MAAM,CAAC,CAAA;AAAA,MAC7C,QAAA;AAAA,MACA,KAAA;AAAA,MACA,CAAC,YAAY;AAAA,KACf;AAEA,IAAA,MAAM,OAAO,IAAI,UAAA;AAAA,MACf,MAAM,UAAA,CAAW,MAAA,CAAO,MAAA,CAAO,UAAA;AAAA,QAC7B,EAAE,MAAM,QAAA,EAAU,IAAA,EAAM,UAAU,MAAA,EAAQ,UAAA,EAAY,IAAA,EAAM,UAAA,CAAW,GAAA,EAAI;AAAA,QAC3E,OAAA;AAAA,QACA,SAAA,GAAY;AAAA;AACd,KACF;AAEA,IAAA,MAAM,WAAW,mBAAA,CAAoB,MAAA;AACrC,IAAA,MAAM,IAAA,GAAO,IAAI,UAAA,CAAW,SAAS,CAAA;AACrC,IAAA,MAAM,KAAA,GAAQ,IAAI,UAAA,CAAW,SAAS,CAAA;AACtC,IAAA,IAAA,CAAK,IAAI,IAAI,CAAA;AACb,IAAA,KAAA,CAAM,IAAI,QAAQ,CAAA;AAGlB,IAAA,IAAI,IAAA,GAAO,CAAA;AACX,IAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,SAAA,EAAW,CAAA,EAAA,EAAK;AAClC,MAAA,IAAA,IAAS,IAAA,CAAK,CAAC,CAAA,GAAgB,KAAA,CAAM,CAAC,CAAA;AAAA,IACxC;AACA,IAAA,IAAI;AACF,MAAA,OAAOJ,qBAAA,CAAI,SAAS,CAAC,CAAA;AAAA,IACvB,CAAA,SAAE;AACA,MAAA,IAAA,CAAK,KAAK,CAAC,CAAA;AACX,MAAA,KAAA,CAAM,KAAK,CAAC,CAAA;AACZ,MAAA,IAAA,CAAK,KAAK,CAAC,CAAA;AAAA,IACb;AAAA,EACF,SAAS,KAAA,EAAO;AACd,IAAA,OAAOJ,sBAAA,CAAK,EAAE,OAAA,EAAS,yCAAA,EAA2C,aAAaS,2BAAA,CAAU,KAAK,GAAG,CAAA;AAAA,EACnG,CAAA,SAAE;AACA,IAAA,SAAA,CAAU,MAAA,CAAO,KAAK,CAAC,CAAA;AACvB,IAAA,mBAAA,CAAoB,MAAA,CAAO,KAAK,CAAC,CAAA;AAAA,EACnC;AACF;;;AJ1HO,SAAS,eAAe,CAAA,EAA+B;AAC5D,EAAA,OAAO,eAAA,CAAgB,CAAC,CAAA,KAAM,IAAA;AAChC;AAQO,SAAS,eAAA,GAAkC;AAChD,EAAA,IAAI;AACF,IAAA,OAAOL,qBAAA,CAAI,UAAA,CAAW,MAAA,CAAO,UAAA,EAAY,CAAA;AAAA,EAC3C,SAAS,KAAA,EAAO;AACd,IAAA,OAAOJ,sBAAA,CAAK,EAAE,OAAA,EAAS,2CAAA,EAA6C,aAAaS,2BAAA,CAAU,KAAK,GAAG,CAAA;AAAA,EACrG;AACF;AAeO,SAAS,YAAA,GAAuB;AACrC,EAAA,OAAO,UAAA,CAAW,OAAO,UAAA,EAAW;AACtC;AAQA,eAAsB,kBAAA,CACpB,MAAA,EACA,OAAA,GAAkC,EAAC,EACQ;AAC3C,EAAA,OAAO,MAAM,gBAAA,CAAiB,MAAA,EAAQ,OAAO,CAAA;AAC/C;AAoBA,eAAsB,eAAA,CAAgB,MAAA,EAAgB,OAAA,GAAkC,EAAC,EAA0B;AACjH,EAAA,MAAM,EAAE,MAAA,EAAQ,KAAA,KAAU,MAAM,gBAAA,CAAiB,QAAQ,OAAO,CAAA;AAChE,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMK,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQA,eAAsB,UAAA,CACpB,IAAA,EACA,SAAA,EACA,OAAA,GAA0B,EAAC,EACF;AACzB,EAAA,OAAO,MAAM,QAAA,CAAS,IAAA,EAAM,SAAA,EAAW,OAAO,CAAA;AAChD;AAwBA,eAAsB,OAAA,CAAQ,IAAA,EAAc,SAAA,EAAyB,OAAA,GAA0B,EAAC,EAAoB;AAClH,EAAA,MAAM,EAAE,QAAQ,KAAA,EAAM,GAAI,MAAM,QAAA,CAAS,IAAA,EAAM,WAAW,OAAO,CAAA;AACjE,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMA,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQA,eAAsB,UAAA,CACpB,SAAA,EACA,SAAA,EACA,OAAA,GAA0B,EAAC,EACF;AACzB,EAAA,OAAO,MAAM,QAAA,CAAS,SAAA,EAAW,SAAA,EAAW,OAAO,CAAA;AACrD;AAwBA,eAAsB,OAAA,CACpB,SAAA,EACA,SAAA,EACA,OAAA,GAA0B,EAAC,EACV;AACjB,EAAA,MAAM,EAAE,QAAQ,KAAA,EAAM,GAAI,MAAM,QAAA,CAAS,SAAA,EAAW,WAAW,OAAO,CAAA;AACtE,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMA,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQA,eAAsB,aAAA,CACpB,GAAA,EACA,SAAA,EACA,OAAA,GAA0B,EAAC,EACF;AACzB,EAAA,OAAO,MAAM,WAAA,CAAY,GAAA,EAAK,SAAA,EAAW,OAAO,CAAA;AAClD;AAuBA,eAAsB,UAAA,CACpB,GAAA,EACA,SAAA,EACA,OAAA,GAA0B,EAAC,EACV;AACjB,EAAA,MAAM,EAAE,QAAQ,KAAA,EAAM,GAAI,MAAM,WAAA,CAAY,GAAA,EAAK,WAAW,OAAO,CAAA;AACnE,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMA,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQA,eAAsB,aAAA,CACpB,SAAA,EACA,SAAA,EACA,OAAA,GAA0B,EAAC,EACK;AAChC,EAAA,OAAO,MAAM,WAAA,CAAe,SAAA,EAAW,SAAA,EAAW,OAAO,CAAA;AAC3D;AAuBA,eAAsB,UAAA,CACpB,SAAA,EACA,SAAA,EACA,OAAA,GAA0B,EAAC,EACf;AACZ,EAAA,MAAM,EAAE,QAAQ,KAAA,EAAM,GAAI,MAAM,WAAA,CAAe,SAAA,EAAW,WAAW,OAAO,CAAA;AAC5E,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMA,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQA,eAAsB,OAAA,CAAQ,IAAA,EAAc,OAAA,GAAuB,EAAC,EAA4B;AAC9F,EAAA,OAAO,MAAM,KAAA,CAAM,IAAA,EAAM,OAAO,CAAA;AAClC;AAiBA,eAAsB,IAAA,CAAK,IAAA,EAAc,OAAA,GAAuB,EAAC,EAAoB;AACnF,EAAA,MAAM,EAAE,MAAA,EAAQ,KAAA,KAAU,MAAM,KAAA,CAAM,MAAM,OAAO,CAAA;AACnD,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMA,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQA,eAAsB,eAAA,CACpB,QAAA,EACA,OAAA,GAA+B,EAAC,EACmB;AACnD,EAAA,OAAO,MAAM,aAAA,CAAc,QAAA,EAAU,OAAO,CAAA;AAC9C;AAoBA,eAAsB,YAAA,CACpB,QAAA,EACA,OAAA,GAA+B,EAAC,EACW;AAC3C,EAAA,MAAM,EAAE,QAAQ,IAAA,EAAM,KAAA,KAAU,MAAM,aAAA,CAAc,UAAU,OAAO,CAAA;AACrE,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMA,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,EAAE,QAAQ,IAAA,EAAK;AACxB;AAQA,eAAsB,kBACpB,QAAA,EACA,cAAA,EACA,IAAA,EACA,OAAA,GAAiC,EAAC,EACR;AAC1B,EAAA,OAAO,MAAM,eAAA,CAAgB,QAAA,EAAU,cAAA,EAAgB,MAAM,OAAO,CAAA;AACtE;AA6BA,eAAsB,eACpB,QAAA,EACA,cAAA,EACA,IAAA,EACA,OAAA,GAAiC,EAAC,EAChB;AAClB,EAAA,MAAM,EAAE,QAAQ,KAAA,EAAM,GAAI,MAAM,eAAA,CAAgB,QAAA,EAAU,cAAA,EAAgB,IAAA,EAAM,OAAO,CAAA;AACvF,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMA,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQO,SAAS,oBAAA,CACd,IAAA,EACA,aAAA,GAA0B,MAAA,EACmB;AAC7C,EAAA,OAAOf,mBAAAA,CAAmB,MAAM,aAAa,CAAA;AAC/C;AAiBO,SAAS,iBAAA,CAAkB,IAAA,EAAc,aAAA,GAA0B,MAAA,EAAiC;AACzG,EAAA,MAAM,EAAE,MAAA,EAAQ,KAAA,EAAM,GAAIA,mBAAAA,CAAmB,MAAM,aAAa,CAAA;AAChE,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMe,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQO,SAAS,oBAAA,CACd,IAAA,EACA,cAAA,GAA2B,MAAA,EACX;AAChB,EAAA,OAAOb,mBAAAA,CAAmB,MAAM,cAAc,CAAA;AAChD;AAkBO,SAAS,iBAAA,CAAkB,IAAA,EAAgC,cAAA,GAA2B,MAAA,EAAgB;AAC3G,EAAA,MAAM,EAAE,MAAA,EAAQ,KAAA,EAAM,GAAIA,mBAAAA,CAAmB,MAAM,cAAc,CAAA;AACjE,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMa,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT;AAQO,SAAS,kBAAA,CAAmB,IAAA,EAAc,IAAA,EAAgB,EAAA,EAA8B;AAC7F,EAAA,OAAO,gBAAA,CAAiB,IAAA,EAAM,IAAA,EAAM,EAAE,CAAA;AACxC;AAkBO,SAAS,eAAA,CAAgB,IAAA,EAAc,IAAA,EAAgB,EAAA,EAAsB;AAClF,EAAA,MAAM,EAAE,MAAA,EAAQ,KAAA,KAAU,gBAAA,CAAiB,IAAA,EAAM,MAAM,EAAE,CAAA;AACzD,EAAA,IAAI,OAAO,MAAM,IAAI,KAAA,CAAMA,+BAAA,CAAc,KAAK,CAAC,CAAA;AAC/C,EAAA,OAAO,MAAA;AACT","file":"chunk-7254PEID.cjs","sourcesContent":["import { $err, $fmtError, $fmtResultErr, $ok, type Result } from \"@internal/helpers\";\nimport type {\n CreateSecretKeyOptions,\n DecryptOptions,\n Encoding,\n EncryptOptions,\n HashOptions,\n HashPasswordOptions,\n VerifyPasswordOptions,\n} from \"~/helpers/types.js\";\nimport { $convertBytesToStr, $convertEncoding, $convertStrToBytes } from \"./web-encode.js\";\nimport { $decrypt, $decryptObj, $encrypt, $encryptObj } from \"./web-encrypt.js\";\nimport { $hash, $hashPassword, $verifyPassword } from \"./web-hash.js\";\nimport { $createSecretKey, $isWebSecretKey, type WebSecretKey } from \"./web-secret-key.js\";\n\n/**\n * Checks whether a value is a `WebSecretKey` for the Web Crypto platform.\n *\n * @param x - The value to check.\n * @returns `true` if `x` is a `WebSecretKey`.\n *\n * @example\n * ```ts\n * isWebSecretKey(webKey); // true\n * isWebSecretKey({}); // false\n * ```\n */\nexport function isWebSecretKey(x: unknown): x is WebSecretKey {\n return $isWebSecretKey(x) !== null;\n}\n\n/**\n * Generates a UUID (v4) (non-throwing).\n *\n * @returns `Result<string>` with the UUID or error.\n * @see {@link generateUuid} For full parameter/behavior docs.\n */\nexport function tryGenerateUuid(): Result<string> {\n try {\n return $ok(globalThis.crypto.randomUUID());\n } catch (error) {\n return $err({ message: \"web generateUuid: Failed to generate UUID\", description: $fmtError(error) });\n }\n}\n\n/**\n * Generates a cryptographically random UUID (v4).\n *\n * @returns A UUID string.\n * @throws {Error} If UUID generation fails.\n *\n * @example\n * ```ts\n * const uuid = generateUuid();\n * ```\n *\n * @see {@link tryGenerateUuid} Non-throwing variant returning `Result<string>`.\n */\nexport function generateUuid(): string {\n return globalThis.crypto.randomUUID();\n}\n\n/**\n * Derives a `WebSecretKey` from a high-entropy secret (non-throwing).\n *\n * @returns `Promise<Result<{ result: WebSecretKey }>>` with the derived key or error.\n * @see {@link createSecretKey} For full parameter/behavior docs.\n */\nexport async function tryCreateSecretKey(\n secret: string,\n options: CreateSecretKeyOptions = {},\n): Promise<Result<{ result: WebSecretKey }>> {\n return await $createSecretKey(secret, options);\n}\n\n/**\n * Derives a `WebSecretKey` from a high-entropy secret for encryption/decryption.\n *\n * @remarks\n * Uses HKDF via the Web Crypto API to derive a symmetric key from the input string.\n *\n * @param secret - High-entropy secret (min 8 chars). For human-chosen passwords, use {@link hashPassword} instead.\n * @param options - Key derivation options.\n * @returns The derived `WebSecretKey`.\n * @throws {Error} If key derivation fails.\n *\n * @example\n * ```ts\n * const secretKey = await createSecretKey(\"my-32-char-high-entropy-secret!!\");\n * ```\n *\n * @see {@link tryCreateSecretKey} Non-throwing variant returning `Result`.\n */\nexport async function createSecretKey(secret: string, options: CreateSecretKeyOptions = {}): Promise<WebSecretKey> {\n const { result, error } = await $createSecretKey(secret, options);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Encrypts a UTF-8 string (non-throwing).\n *\n * @returns `Promise<Result<string>>` with the ciphertext or error.\n * @see {@link encrypt} For full parameter/behavior docs.\n */\nexport async function tryEncrypt(\n data: string,\n secretKey: WebSecretKey,\n options: EncryptOptions = {},\n): Promise<Result<string>> {\n return await $encrypt(data, secretKey, options);\n}\n\n/**\n * Encrypts a UTF-8 string using the provided `WebSecretKey`.\n *\n * @remarks\n * Output format: `\"iv.cipher.tag.\"` (three dot-separated base64url segments plus trailing dot).\n * Cross-platform compatible — data encrypted on Web can be decrypted on Node and vice versa.\n * AES-GCM uses random 96-bit IVs. Rotate keys before ~2^32 encryptions with the same key to avoid nonce collision.\n *\n * @param data - UTF-8 string to encrypt. Must be a non-empty string (whitespace-only strings are rejected).\n * @param secretKey - The `WebSecretKey` used for encryption.\n * @param options - Encryption options.\n * @returns The encrypted string.\n * @throws {Error} If the input or key is invalid, or encryption fails.\n *\n * @example\n * ```ts\n * const secretKey = await createSecretKey(\"my-secret\");\n * const encrypted = await encrypt(\"Hello, World!\", secretKey);\n * ```\n *\n * @see {@link tryEncrypt} Non-throwing variant returning `Result<string>`.\n */\nexport async function encrypt(data: string, secretKey: WebSecretKey, options: EncryptOptions = {}): Promise<string> {\n const { result, error } = await $encrypt(data, secretKey, options);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Decrypts a ciphertext string (non-throwing).\n *\n * @returns `Promise<Result<string>>` with the plaintext or error.\n * @see {@link decrypt} For full parameter/behavior docs.\n */\nexport async function tryDecrypt(\n encrypted: string,\n secretKey: WebSecretKey,\n options: DecryptOptions = {},\n): Promise<Result<string>> {\n return await $decrypt(encrypted, secretKey, options);\n}\n\n/**\n * Decrypts a ciphertext string using the provided `WebSecretKey`.\n *\n * @remarks\n * Expects input in the format `\"iv.cipher.tag.\"`.\n * Cross-platform compatible — data encrypted on Node can be decrypted on Web and vice versa.\n *\n * @param encrypted - The encrypted string to decrypt.\n * @param secretKey - The `WebSecretKey` used for decryption.\n * @param options - Decryption options.\n * @returns The decrypted UTF-8 string.\n * @throws {Error} If the input or key is invalid, or decryption fails.\n *\n * @example\n * ```ts\n * const secretKey = await createSecretKey(\"my-secret\");\n * const encrypted = await encrypt(\"Hello, World!\", secretKey);\n * const decrypted = await decrypt(encrypted, secretKey); // \"Hello, World!\"\n * ```\n *\n * @see {@link tryDecrypt} Non-throwing variant returning `Result<string>`.\n */\nexport async function decrypt(\n encrypted: string,\n secretKey: WebSecretKey,\n options: DecryptOptions = {},\n): Promise<string> {\n const { result, error } = await $decrypt(encrypted, secretKey, options);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Encrypts a plain object (non-throwing).\n *\n * @returns `Promise<Result<string>>` with the ciphertext or error.\n * @see {@link encryptObj} For full parameter/behavior docs.\n */\nexport async function tryEncryptObj<T extends object = Record<string, unknown>>(\n obj: T,\n secretKey: WebSecretKey,\n options: EncryptOptions = {},\n): Promise<Result<string>> {\n return await $encryptObj(obj, secretKey, options);\n}\n\n/**\n * Encrypts a plain object using the provided `WebSecretKey`.\n *\n * @remarks\n * Only plain objects (POJOs) are accepted; class instances, Maps, Sets, etc. are rejected.\n * Output format: `\"iv.cipher.tag.\"`.\n *\n * @param obj - Plain object to encrypt.\n * @param secretKey - The `WebSecretKey` used for encryption.\n * @param options - Encryption options.\n * @returns The encrypted string.\n * @throws {Error} If the input or key is invalid, or encryption fails.\n *\n * @example\n * ```ts\n * const secretKey = await createSecretKey(\"my-secret\");\n * const encrypted = await encryptObj({ a: 1 }, secretKey);\n * ```\n *\n * @see {@link tryEncryptObj} Non-throwing variant returning `Result<string>`.\n */\nexport async function encryptObj<T extends object = Record<string, unknown>>(\n obj: T,\n secretKey: WebSecretKey,\n options: EncryptOptions = {},\n): Promise<string> {\n const { result, error } = await $encryptObj(obj, secretKey, options);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Decrypts an encrypted JSON string into a plain object (non-throwing).\n *\n * @returns `Promise<Result<{ result: T }>>` with the object or error.\n * @see {@link decryptObj} For full parameter/behavior docs.\n */\nexport async function tryDecryptObj<T extends object = Record<string, unknown>>(\n encrypted: string,\n secretKey: WebSecretKey,\n options: DecryptOptions = {},\n): Promise<Result<{ result: T }>> {\n return await $decryptObj<T>(encrypted, secretKey, options);\n}\n\n/**\n * Decrypts an encrypted JSON string into a plain object.\n *\n * @remarks\n * Expects input in the format `\"iv.cipher.tag.\"`.\n *\n * @param encrypted - The encrypted string.\n * @param secretKey - The `WebSecretKey` used for decryption.\n * @param options - Decryption options.\n * @returns The decrypted object.\n * @throws {Error} If decryption or JSON parsing fails.\n *\n * @example\n * ```ts\n * const secretKey = await createSecretKey(\"my-secret\");\n * const encrypted = await encryptObj({ a: 1 }, secretKey);\n * const obj = await decryptObj<{ a: number }>(encrypted, secretKey); // obj.a === 1\n * ```\n *\n * @see {@link tryDecryptObj} Non-throwing variant returning `Result`.\n */\nexport async function decryptObj<T extends object = Record<string, unknown>>(\n encrypted: string,\n secretKey: WebSecretKey,\n options: DecryptOptions = {},\n): Promise<T> {\n const { result, error } = await $decryptObj<T>(encrypted, secretKey, options);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Hashes a UTF-8 string (non-throwing).\n *\n * @returns `Promise<Result<string>>` with the hash or error.\n * @see {@link hash} For full parameter/behavior docs.\n */\nexport async function tryHash(data: string, options: HashOptions = {}): Promise<Result<string>> {\n return await $hash(data, options);\n}\n\n/**\n * Hashes a UTF-8 string using the specified digest algorithm.\n *\n * @param data - The input string to hash.\n * @param options - Hash options.\n * @returns The hashed string.\n * @throws {Error} If input is invalid or hashing fails.\n *\n * @example\n * ```ts\n * const hashed = await hash(\"my data\");\n * ```\n *\n * @see {@link tryHash} Non-throwing variant returning `Result<string>`.\n */\nexport async function hash(data: string, options: HashOptions = {}): Promise<string> {\n const { result, error } = await $hash(data, options);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Hashes a password using PBKDF2 (non-throwing).\n *\n * @returns `Promise<Result<{ result: string; salt: string }>>` with the hash/salt or error.\n * @see {@link hashPassword} For full parameter/behavior docs.\n */\nexport async function tryHashPassword(\n password: string,\n options: HashPasswordOptions = {},\n): Promise<Result<{ result: string; salt: string }>> {\n return await $hashPassword(password, options);\n}\n\n/**\n * Hashes a password using PBKDF2.\n *\n * @remarks\n * Defaults: `sha512`, 320 000 iterations, 64-byte key, 16-byte random salt.\n *\n * @param password - The password to hash.\n * @param options - Password hashing options.\n * @returns `{ result, salt }` for storage.\n * @throws {Error} If inputs are invalid or hashing fails.\n *\n * @example\n * ```ts\n * const { result, salt } = await hashPassword(\"my-password\");\n * ```\n *\n * @see {@link tryHashPassword} Non-throwing variant returning `Result`.\n */\nexport async function hashPassword(\n password: string,\n options: HashPasswordOptions = {},\n): Promise<{ result: string; salt: string }> {\n const { result, salt, error } = await $hashPassword(password, options);\n if (error) throw new Error($fmtResultErr(error));\n return { result, salt };\n}\n\n/**\n * Verifies a password against a stored PBKDF2 hash (non-throwing).\n *\n * @returns `Promise<Result<boolean>>` — `true` if the password matches, `false` if not, or an error for invalid inputs/options.\n * @see {@link verifyPassword} For full parameter/behavior docs.\n */\nexport async function tryVerifyPassword(\n password: string,\n hashedPassword: string,\n salt: string,\n options: VerifyPasswordOptions = {},\n): Promise<Result<boolean>> {\n return await $verifyPassword(password, hashedPassword, salt, options);\n}\n\n/**\n * Verifies a password against a stored PBKDF2 hash.\n *\n * @remarks\n * Re-derives the key with the same parameters and compares using a full-loop XOR pattern.\n * This is best-effort constant-time; JS JIT optimization may introduce timing variation.\n * The Web Crypto API does not expose a `timingSafeEqual` equivalent.\n * For timing-critical deployments, prefer the Node implementation which uses `crypto.timingSafeEqual`.\n * Throws for invalid inputs/options (bad encoding, wrong parameters, non-decodable salt/hash).\n * Returns `false` for password mismatch or length-mismatched hash.\n *\n * @param password - The plain password to verify.\n * @param hashedPassword - The stored hash (encoded).\n * @param salt - The stored salt (encoded).\n * @param options - Verification options (must match the parameters used to hash).\n * @returns `true` if the password matches, otherwise `false`.\n * @throws {Error} If verification input/options are invalid.\n *\n * @example\n * ```ts\n * const { result, salt } = await hashPassword(\"my-password\");\n * await verifyPassword(\"my-password\", result, salt); // true\n * await verifyPassword(\"wrong-password\", result, salt); // false\n * ```\n *\n * @see {@link tryVerifyPassword} Non-throwing variant returning `Result<boolean>`.\n */\nexport async function verifyPassword(\n password: string,\n hashedPassword: string,\n salt: string,\n options: VerifyPasswordOptions = {},\n): Promise<boolean> {\n const { result, error } = await $verifyPassword(password, hashedPassword, salt, options);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Converts a string to a `Uint8Array` (non-throwing).\n *\n * @returns `Result<{ result: Uint8Array<ArrayBuffer> }>` with the bytes or error.\n * @see {@link convertStrToBytes} For full parameter/behavior docs.\n */\nexport function tryConvertStrToBytes(\n data: string,\n inputEncoding: Encoding = \"utf8\",\n): Result<{ result: Uint8Array<ArrayBuffer> }> {\n return $convertStrToBytes(data, inputEncoding);\n}\n\n/**\n * Converts a string to a `Uint8Array` using the specified encoding.\n *\n * @param data - The input string to convert.\n * @param inputEncoding - Source encoding (default: `'utf8'`).\n * @returns A `Uint8Array` containing the bytes.\n * @throws {Error} If input is invalid or conversion fails.\n *\n * @example\n * ```ts\n * const bytes = convertStrToBytes(\"Hello\", \"utf8\");\n * ```\n *\n * @see {@link tryConvertStrToBytes} Non-throwing variant returning `Result`.\n */\nexport function convertStrToBytes(data: string, inputEncoding: Encoding = \"utf8\"): Uint8Array<ArrayBuffer> {\n const { result, error } = $convertStrToBytes(data, inputEncoding);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Converts a `Uint8Array` or `ArrayBuffer` to a string (non-throwing).\n *\n * @returns `Result<string>` with the encoded string or error.\n * @see {@link convertBytesToStr} For full parameter/behavior docs.\n */\nexport function tryConvertBytesToStr(\n data: Uint8Array | ArrayBuffer,\n outputEncoding: Encoding = \"utf8\",\n): Result<string> {\n return $convertBytesToStr(data, outputEncoding);\n}\n\n/**\n * Converts a `Uint8Array` or `ArrayBuffer` to a string using the specified encoding.\n *\n * @param data - The bytes to convert.\n * @param outputEncoding - Target encoding (default: `'utf8'`).\n * @returns The encoded string.\n * @throws {Error} If input is invalid or conversion fails.\n *\n * @example\n * ```ts\n * const bytes = convertStrToBytes(\"Hello\", \"utf8\");\n * const str = convertBytesToStr(bytes, \"utf8\"); // \"Hello\"\n * ```\n *\n * @see {@link tryConvertBytesToStr} Non-throwing variant returning `Result<string>`.\n */\nexport function convertBytesToStr(data: Uint8Array | ArrayBuffer, outputEncoding: Encoding = \"utf8\"): string {\n const { result, error } = $convertBytesToStr(data, outputEncoding);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n\n/**\n * Converts text between encodings (non-throwing).\n *\n * @returns `Result<string>` with the re-encoded string or error.\n * @see {@link convertEncoding} For full parameter/behavior docs.\n */\nexport function tryConvertEncoding(data: string, from: Encoding, to: Encoding): Result<string> {\n return $convertEncoding(data, from, to);\n}\n\n/**\n * Converts text between encodings.\n *\n * @param data - The input string.\n * @param from - Current encoding of `data`.\n * @param to - Target encoding.\n * @returns The re-encoded string.\n * @throws {Error} If encodings are invalid or conversion fails.\n *\n * @example\n * ```ts\n * const encoded = convertEncoding(\"Hello\", \"utf8\", \"base64url\");\n * ```\n *\n * @see {@link tryConvertEncoding} Non-throwing variant returning `Result<string>`.\n */\nexport function convertEncoding(data: string, from: Encoding, to: Encoding): string {\n const { result, error } = $convertEncoding(data, from, to);\n if (error) throw new Error($fmtResultErr(error));\n return result;\n}\n","import {\n $err,\n $isStr,\n $ok,\n $convertBytesToStr as $sharedBytesToStr,\n $convertStrToBytes as $sharedStrToBytes,\n type Result,\n} from \"@internal/helpers\";\nimport { ENCODING } from \"~/helpers/consts.js\";\nimport type { Encoding } from \"~/helpers/types.js\";\n\nexport { textDecoder, textEncoder } from \"@internal/helpers\";\n\nexport function $convertStrToBytes(\n data: string,\n inputEncoding: Encoding = \"utf8\",\n): Result<{ result: Uint8Array<ArrayBuffer> }> {\n const result = $sharedStrToBytes(data, inputEncoding);\n if (result.error) {\n return $err({\n message: result.error.message.replace(\"strToBytes:\", \"web strToBytes:\"),\n description: result.error.description,\n });\n }\n return result;\n}\n\nexport function $convertBytesToStr(data: Uint8Array | ArrayBuffer, outputEncoding: Encoding = \"utf8\"): Result<string> {\n const result = $sharedBytesToStr(data, outputEncoding);\n if (result.error) {\n return $err({\n message: result.error.message.replace(\"bytesToStr:\", \"web bytesToStr:\"),\n description: result.error.description,\n });\n }\n return result;\n}\n\nexport function $convertEncoding(data: string, from: Encoding, to: Encoding): Result<string> {\n if (!$isStr(data)) {\n return $err({\n message: \"web convertEncoding: Data must be a non-empty string\",\n description: \"Received empty or non-string value\",\n });\n }\n if (!ENCODING.includes(from) || !ENCODING.includes(to)) {\n return $err({\n message: `web convertEncoding: Unsupported encoding: from ${from} to ${to}`,\n description: \"Use base64, base64url, hex, utf8, or latin1\",\n });\n }\n\n const bytes = $convertStrToBytes(data, from);\n if (bytes.error) return $err(bytes.error);\n\n const str = $convertBytesToStr(bytes.result, to);\n if (str.error) return $err(str.error);\n\n return $ok(str.result);\n}\n","import { $err, $fmtError, $ok, type Result } from \"@internal/helpers\";\nimport type { DIGEST_ALGORITHMS, ENCRYPTION_ALGORITHMS } from \"~/helpers/consts.js\";\nimport type { CreateSecretKeyOptions } from \"~/helpers/types.js\";\nimport { $isObj, $validateCreateSecretKeyOptions, $validateSecretKeyBase } from \"~/helpers/validate.js\";\nimport { textEncoder } from \"./web-encode.js\";\n\ndeclare const __brand: unique symbol;\n\nexport type WebSecretKey = {\n readonly platform: \"web\";\n readonly digest: keyof typeof DIGEST_ALGORITHMS;\n readonly algorithm: keyof typeof ENCRYPTION_ALGORITHMS;\n readonly key: CryptoKey;\n readonly injected: (typeof ENCRYPTION_ALGORITHMS)[keyof typeof ENCRYPTION_ALGORITHMS];\n} & { readonly [__brand]: \"secretKey-web\" };\n\nexport function $isWebSecretKey(x: unknown): WebSecretKey | null {\n const base = $validateSecretKeyBase(x, \"web\");\n if (!base) return null;\n\n if (typeof globalThis.CryptoKey === \"undefined\" || !(base.obj.key instanceof CryptoKey)) return null;\n\n if (\n !$isObj(base.obj.key.algorithm) ||\n base.obj.key.algorithm.name !== base.algorithm.web ||\n (typeof base.obj.key.algorithm.length === \"number\" &&\n base.obj.key.algorithm.length !== base.algorithm.keyBytes * 8) ||\n !Array.isArray(base.obj.key.usages) ||\n !(base.obj.key.usages.includes(\"encrypt\") && base.obj.key.usages.includes(\"decrypt\"))\n ) {\n return null;\n }\n return x as WebSecretKey;\n}\n\nexport async function $createSecretKey(\n secret: string,\n options: CreateSecretKeyOptions,\n): Promise<Result<{ result: WebSecretKey }>> {\n const validated = $validateCreateSecretKeyOptions(secret, options, \"web\");\n if (validated.error) return $err(validated.error);\n\n const { algorithm, digest, salt, info, encryptAlgo, digestAlgo } = validated;\n\n try {\n const ikm = await globalThis.crypto.subtle.importKey(\n \"raw\",\n textEncoder.encode(secret.normalize(\"NFKC\")),\n \"HKDF\",\n false,\n [\"deriveKey\"],\n );\n const extractable = options.extractable ?? false;\n const key = await globalThis.crypto.subtle.deriveKey(\n {\n name: \"HKDF\",\n hash: digestAlgo.web,\n salt: textEncoder.encode(salt.normalize(\"NFKC\")),\n info: textEncoder.encode(info.normalize(\"NFKC\")),\n },\n ikm,\n { name: encryptAlgo.web, length: encryptAlgo.keyBytes * 8 },\n extractable,\n [\"encrypt\", \"decrypt\"],\n );\n const secretKey = Object.freeze({ platform: \"web\", digest, algorithm, key, injected: encryptAlgo }) as WebSecretKey;\n\n return $ok({ result: secretKey });\n } catch (error) {\n return $err({\n message: \"web createSecretKey: Failed to derive key\",\n description: $fmtError(error),\n });\n }\n}\n","import {\n $err,\n $fmtError,\n $fmtResultErr,\n $isPlainObj,\n $isStr,\n $ok,\n $parseToObj,\n $stringifyObj,\n type Result,\n} from \"@internal/helpers\";\nimport { CIPHER_ENCODING, GCM_IV_LENGTH, GCM_TAG_BYTES } from \"~/helpers/consts.js\";\nimport type { DecryptOptions, EncryptOptions } from \"~/helpers/types.js\";\nimport { matchEncryptedPattern } from \"~/helpers/validate.js\";\nimport { $convertBytesToStr, $convertStrToBytes } from \"./web-encode.js\";\nimport { $isWebSecretKey, type WebSecretKey } from \"./web-secret-key.js\";\n\nexport async function $encrypt(\n data: string,\n secretKey: WebSecretKey,\n options: EncryptOptions,\n): Promise<Result<string>> {\n if (!$isStr(data)) {\n return $err({\n message: \"web encrypt: Data must be a non-empty string\",\n description: \"Received empty or non-string value\",\n });\n }\n\n if (!$isPlainObj<EncryptOptions>(options)) {\n return $err({\n message: \"web encrypt: Options must be a plain object\",\n description: 'Pass an object like { outputEncoding: \"base64url\" }',\n });\n }\n\n const outputEncoding = options.outputEncoding ?? \"base64url\";\n if (!CIPHER_ENCODING.includes(outputEncoding)) {\n return $err({\n message: `web encrypt: Unsupported output encoding: ${outputEncoding}`,\n description: \"Use base64, base64url, or hex\",\n });\n }\n\n const injectedKey = $isWebSecretKey(secretKey);\n if (!injectedKey) {\n return $err({\n message: \"web encrypt: Invalid secret key\",\n description: \"Expected a WebSecretKey created by webKit.createSecretKey()\",\n });\n }\n\n const { result, error } = $convertStrToBytes(data, \"utf8\");\n if (error) return $err(error);\n\n try {\n const iv = globalThis.crypto.getRandomValues(new Uint8Array(GCM_IV_LENGTH));\n const cipherWithTag = await globalThis.crypto.subtle.encrypt(\n { name: injectedKey.injected.web, iv },\n injectedKey.key,\n result,\n );\n\n const cipherOnly = cipherWithTag.slice(0, cipherWithTag.byteLength - GCM_TAG_BYTES);\n const tag = cipherWithTag.slice(cipherWithTag.byteLength - GCM_TAG_BYTES);\n\n const ivStr = $convertBytesToStr(iv, outputEncoding);\n const cipherStr = $convertBytesToStr(cipherOnly, outputEncoding);\n const tagStr = $convertBytesToStr(tag, outputEncoding);\n\n if (ivStr.error || cipherStr.error || tagStr.error) {\n return $err({\n message: \"web encrypt: Failed to encode output\",\n description: `Conversion error: ${$fmtResultErr(ivStr.error || cipherStr.error || tagStr.error)}`,\n });\n }\n\n return $ok(`${ivStr.result}.${cipherStr.result}.${tagStr.result}.`);\n } catch (error) {\n return $err({ message: \"web encrypt: Failed to encrypt data\", description: $fmtError(error) });\n } finally {\n result.fill(0);\n }\n}\n\nexport async function $decrypt(\n encrypted: string,\n secretKey: WebSecretKey,\n options: DecryptOptions,\n): Promise<Result<string>> {\n if (!matchEncryptedPattern(encrypted)) {\n return $err({\n message: \"web decrypt: Invalid encrypted data format\",\n description: 'Encrypted data must be in the format \"iv.cipher.tag.\"',\n });\n }\n\n if (!$isPlainObj<DecryptOptions>(options)) {\n return $err({\n message: \"web decrypt: Options must be a plain object\",\n description: 'Pass an object like { inputEncoding: \"base64url\" }',\n });\n }\n\n const inputEncoding = options.inputEncoding ?? \"base64url\";\n if (!CIPHER_ENCODING.includes(inputEncoding)) {\n return $err({\n message: `web decrypt: Unsupported input encoding: ${inputEncoding}`,\n description: \"Use base64, base64url, or hex\",\n });\n }\n\n const [iv, cipher, tag] = encrypted.split(\".\", 4) as [string, string, string];\n\n const injectedKey = $isWebSecretKey(secretKey);\n if (!injectedKey) {\n return $err({\n message: \"web decrypt: Invalid secret key\",\n description: \"Expected a WebSecretKey created by webKit.createSecretKey()\",\n });\n }\n\n const ivBytes = $convertStrToBytes(iv, inputEncoding);\n const cipherBytes = $convertStrToBytes(cipher, inputEncoding);\n const tagBytes = $convertStrToBytes(tag, inputEncoding);\n\n if (ivBytes.error || cipherBytes.error || tagBytes.error) {\n return $err({\n message: \"web decrypt: Failed to decode input\",\n description: `Conversion error: ${$fmtResultErr(ivBytes.error || cipherBytes.error || tagBytes.error)}`,\n });\n }\n\n if (ivBytes.result.byteLength !== GCM_IV_LENGTH) {\n return $err({\n message: \"web decrypt: Invalid IV length\",\n description: `Expected ${GCM_IV_LENGTH} bytes, got ${ivBytes.result.byteLength}`,\n });\n }\n\n if (tagBytes.result.byteLength !== GCM_TAG_BYTES) {\n return $err({\n message: \"web decrypt: Invalid auth tag length\",\n description: `Expected ${GCM_TAG_BYTES} bytes, got ${tagBytes.result.byteLength}`,\n });\n }\n\n const cipherWithTag = new Uint8Array(cipherBytes.result.byteLength + tagBytes.result.byteLength);\n cipherWithTag.set(new Uint8Array(cipherBytes.result), 0);\n cipherWithTag.set(new Uint8Array(tagBytes.result), cipherBytes.result.byteLength);\n\n let decrypted: Uint8Array | undefined;\n try {\n decrypted = new Uint8Array(\n await globalThis.crypto.subtle.decrypt(\n { name: injectedKey.injected.web, iv: ivBytes.result },\n injectedKey.key,\n cipherWithTag,\n ),\n );\n\n return $convertBytesToStr(decrypted, \"utf8\");\n } catch (error) {\n return $err({ message: \"web decrypt: Failed to decrypt data\", description: $fmtError(error) });\n } finally {\n decrypted?.fill(0);\n }\n}\n\nexport async function $encryptObj<T extends object = Record<string, unknown>>(\n data: T,\n secretKey: WebSecretKey,\n options: EncryptOptions,\n): Promise<Result<string>> {\n const { result, error } = $stringifyObj(data);\n if (error) return $err(error);\n return await $encrypt(result, secretKey, options);\n}\n\nexport async function $decryptObj<T extends object = Record<string, unknown>>(\n encrypted: string,\n secretKey: WebSecretKey,\n options: DecryptOptions,\n): Promise<Result<{ result: T }>> {\n const { result, error } = await $decrypt(encrypted, secretKey, options);\n if (error) return $err(error);\n return $parseToObj<T>(result);\n}\n","import { $err, $fmtError, $isPlainObj, $isStr, $ok, type Result } from \"@internal/helpers\";\nimport { CIPHER_ENCODING, DIGEST_ALGORITHMS } from \"~/helpers/consts.js\";\nimport type { HashOptions, HashPasswordOptions, VerifyPasswordOptions } from \"~/helpers/types.js\";\nimport { $validateHashPasswordOptions, $validateVerifyPasswordOptions } from \"~/helpers/validate.js\";\nimport { $convertBytesToStr, $convertStrToBytes, textEncoder } from \"./web-encode.js\";\n\nexport async function $hash(data: string, options: HashOptions = {}): Promise<Result<string>> {\n if (!$isStr(data)) {\n return $err({\n message: \"web hash: Data must be a non-empty string\",\n description: \"Received empty or non-string value\",\n });\n }\n\n if (!$isPlainObj<HashOptions>(options)) {\n return $err({\n message: \"web hash: Options must be a plain object\",\n description: 'Pass an object like { digest: \"sha256\" }',\n });\n }\n\n const outputEncoding = options.outputEncoding ?? \"base64url\";\n if (!CIPHER_ENCODING.includes(outputEncoding)) {\n return $err({\n message: `web hash: Unsupported output encoding: ${outputEncoding}`,\n description: \"Use base64, base64url, or hex\",\n });\n }\n\n const digest = options.digest ?? \"sha256\";\n if (!(digest in DIGEST_ALGORITHMS)) {\n return $err({\n message: `web hash: Unsupported digest: ${digest}`,\n description: `Supported digests are: ${Object.keys(DIGEST_ALGORITHMS).join(\", \")}`,\n });\n }\n const digestAlgo = DIGEST_ALGORITHMS[digest];\n\n const { result, error } = $convertStrToBytes(data, \"utf8\");\n if (error) return $err(error);\n\n try {\n const hashed = await globalThis.crypto.subtle.digest(digestAlgo.web, result);\n return $convertBytesToStr(hashed, outputEncoding);\n } catch (error) {\n return $err({ message: \"web hash: Failed to hash data\", description: $fmtError(error) });\n }\n}\n\nexport async function $hashPassword(\n password: string,\n options: HashPasswordOptions,\n): Promise<Result<{ result: string; salt: string }>> {\n const validated = $validateHashPasswordOptions(password, options, \"web\");\n if (validated.error) return $err(validated.error);\n\n const { digestAlgo, outputEncoding, saltLength, iterations, keyLength } = validated;\n\n const salt = globalThis.crypto.getRandomValues(new Uint8Array(saltLength));\n let bits: ArrayBuffer | undefined;\n try {\n const baseKey = await globalThis.crypto.subtle.importKey(\n \"raw\",\n textEncoder.encode(password.normalize(\"NFKC\")),\n \"PBKDF2\",\n false,\n [\"deriveBits\"],\n );\n bits = await globalThis.crypto.subtle.deriveBits(\n { name: \"PBKDF2\", salt, iterations, hash: digestAlgo.web },\n baseKey,\n keyLength * 8,\n );\n\n const saltStr = $convertBytesToStr(salt, outputEncoding);\n if (saltStr.error) return $err(saltStr.error);\n\n const hashedPasswordStr = $convertBytesToStr(bits, outputEncoding);\n if (hashedPasswordStr.error) return $err(hashedPasswordStr.error);\n\n return $ok({ result: hashedPasswordStr.result, salt: saltStr.result });\n } catch (error) {\n return $err({ message: \"web hashPassword: Failed to hash password\", description: $fmtError(error) });\n } finally {\n salt.fill(0);\n if (bits) new Uint8Array(bits).fill(0);\n }\n}\n\nexport async function $verifyPassword(\n password: string,\n hashedPassword: string,\n salt: string,\n options: VerifyPasswordOptions,\n): Promise<Result<boolean>> {\n const validated = $validateVerifyPasswordOptions(password, hashedPassword, salt, options, \"web\");\n if (validated.error) return $err(validated.error);\n\n const { digestAlgo, inputEncoding, iterations, keyLength } = validated;\n\n const saltBytes = $convertStrToBytes(salt, inputEncoding);\n if (saltBytes.error) return $err(saltBytes.error);\n\n const hashedPasswordBytes = $convertStrToBytes(hashedPassword, inputEncoding);\n if (hashedPasswordBytes.error) return $err(hashedPasswordBytes.error);\n\n if (hashedPasswordBytes.result.byteLength !== keyLength) return $ok(false);\n\n try {\n const baseKey = await globalThis.crypto.subtle.importKey(\n \"raw\",\n textEncoder.encode(password.normalize(\"NFKC\")),\n \"PBKDF2\",\n false,\n [\"deriveBits\"],\n );\n\n const bits = new Uint8Array(\n await globalThis.crypto.subtle.deriveBits(\n { name: \"PBKDF2\", salt: saltBytes.result, iterations, hash: digestAlgo.web },\n baseKey,\n keyLength * 8,\n ),\n );\n\n const expected = hashedPasswordBytes.result;\n const left = new Uint8Array(keyLength);\n const right = new Uint8Array(keyLength);\n left.set(bits);\n right.set(expected);\n\n // Best-effort constant-time comparison; JS JIT may introduce timing variation\n let diff = 0;\n for (let i = 0; i < keyLength; i++) {\n diff |= (left[i] as number) ^ (right[i] as number);\n }\n try {\n return $ok(diff === 0);\n } finally {\n left.fill(0);\n right.fill(0);\n bits.fill(0);\n }\n } catch (error) {\n return $err({ message: \"web verifyPassword: Verification failed\", description: $fmtError(error) });\n } finally {\n saltBytes.result.fill(0);\n hashedPasswordBytes.result.fill(0);\n }\n}\n"]}
|