react-native-quick-crypto 0.7.3 → 1.0.0-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/QuickCrypto.podspec +34 -0
- package/README.md +13 -46
- package/android/CMakeLists.txt +32 -64
- package/android/build.gradle +52 -125
- package/android/gradle.properties +4 -4
- package/android/src/main/cpp/cpp-adapter.cpp +9 -54
- package/android/src/main/java/com/margelo/nitro/quickcrypto/QuickCryptoPackage.java +38 -0
- package/cpp/random/HybridRandom.cpp +34 -0
- package/cpp/random/HybridRandom.hpp +44 -0
- package/cpp/utils/Utils.hpp +9 -0
- package/ios/QuickCryptoOnLoad.mm +19 -0
- package/lib/commonjs/index.js +39 -39
- package/lib/commonjs/index.js.map +1 -1
- package/lib/commonjs/random.js +26 -12
- package/lib/commonjs/random.js.map +1 -1
- package/lib/commonjs/{NativeQuickCrypto/rsa.js → specs/random.nitro.js} +1 -1
- package/lib/commonjs/{NativeQuickCrypto/aes.js.map → specs/random.nitro.js.map} +1 -1
- package/lib/commonjs/utils/conversion.js +22 -0
- package/lib/commonjs/utils/conversion.js.map +1 -0
- package/lib/commonjs/utils/index.js +12 -0
- package/lib/commonjs/utils/index.js.map +1 -0
- package/lib/commonjs/utils/types.js +2 -0
- package/lib/{module/NativeQuickCrypto/aes.js.map → commonjs/utils/types.js.map} +1 -1
- package/lib/module/index.js +38 -38
- package/lib/module/index.js.map +1 -1
- package/lib/module/random.js +26 -12
- package/lib/module/random.js.map +1 -1
- package/lib/module/specs/random.nitro.js +4 -0
- package/lib/module/{NativeQuickCrypto/rsa.js.map → specs/random.nitro.js.map} +1 -1
- package/lib/module/utils/conversion.js +16 -0
- package/lib/module/utils/conversion.js.map +1 -0
- package/lib/module/utils/index.js +8 -0
- package/lib/module/utils/index.js.map +1 -0
- package/lib/module/utils/types.js +2 -0
- package/lib/{commonjs/NativeQuickCrypto/rsa.js.map → module/utils/types.js.map} +1 -1
- package/lib/tsconfig.tsbuildinfo +1 -0
- package/lib/typescript/index.d.ts +10 -141
- package/lib/typescript/index.d.ts.map +1 -1
- package/lib/typescript/random.d.ts +4 -5
- package/lib/typescript/random.d.ts.map +1 -1
- package/lib/typescript/specs/random.nitro.d.ts +9 -0
- package/lib/typescript/specs/random.nitro.d.ts.map +1 -0
- package/lib/typescript/utils/conversion.d.ts +4 -0
- package/lib/typescript/utils/conversion.d.ts.map +1 -0
- package/lib/typescript/utils/index.d.ts +6 -0
- package/lib/typescript/utils/index.d.ts.map +1 -0
- package/lib/typescript/utils/types.d.ts +5 -0
- package/lib/typescript/utils/types.d.ts.map +1 -0
- package/nitrogen/generated/android/QuickCrypto+autolinking.cmake +45 -0
- package/nitrogen/generated/android/QuickCrypto+autolinking.gradle +26 -0
- package/nitrogen/generated/ios/QuickCrypto+autolinking.rb +57 -0
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Bridge.cpp +9 -0
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Bridge.hpp +25 -0
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Umbrella.hpp +29 -0
- package/nitrogen/generated/shared/c++/HybridRandomSpec.cpp +23 -0
- package/nitrogen/generated/shared/c++/HybridRandomSpec.hpp +62 -0
- package/package.json +50 -106
- package/src/index.ts +38 -48
- package/src/random.ts +51 -48
- package/src/specs/random.nitro.ts +14 -0
- package/src/utils/conversion.ts +16 -0
- package/src/utils/index.ts +6 -0
- package/src/utils/types.ts +15 -0
- package/LICENSE +0 -27
- package/android/src/main/java/com/margelo/quickcrypto/QuickCryptoModule.java +0 -70
- package/android/src/main/java/com/margelo/quickcrypto/QuickCryptoPackage.java +0 -25
- package/cpp/Cipher/MGLCipherHostObject.cpp +0 -663
- package/cpp/Cipher/MGLCipherHostObject.h +0 -90
- package/cpp/Cipher/MGLCreateCipherInstaller.cpp +0 -75
- package/cpp/Cipher/MGLCreateCipherInstaller.h +0 -22
- package/cpp/Cipher/MGLCreateDecipherInstaller.cpp +0 -77
- package/cpp/Cipher/MGLCreateDecipherInstaller.h +0 -17
- package/cpp/Cipher/MGLGenerateKeyPairInstaller.cpp +0 -134
- package/cpp/Cipher/MGLGenerateKeyPairInstaller.h +0 -35
- package/cpp/Cipher/MGLGenerateKeyPairSyncInstaller.cpp +0 -63
- package/cpp/Cipher/MGLGenerateKeyPairSyncInstaller.h +0 -37
- package/cpp/Cipher/MGLPublicCipher.h +0 -124
- package/cpp/Cipher/MGLPublicCipherInstaller.h +0 -107
- package/cpp/Cipher/MGLRsa.cpp +0 -573
- package/cpp/Cipher/MGLRsa.h +0 -109
- package/cpp/HMAC/MGLHmacHostObject.cpp +0 -95
- package/cpp/HMAC/MGLHmacHostObject.h +0 -39
- package/cpp/HMAC/MGLHmacInstaller.cpp +0 -43
- package/cpp/HMAC/MGLHmacInstaller.h +0 -20
- package/cpp/Hash/MGLHashHostObject.cpp +0 -147
- package/cpp/Hash/MGLHashHostObject.h +0 -53
- package/cpp/Hash/MGLHashInstaller.cpp +0 -44
- package/cpp/Hash/MGLHashInstaller.h +0 -20
- package/cpp/JSIUtils/MGLJSIMacros.h +0 -110
- package/cpp/JSIUtils/MGLJSIUtils.h +0 -41
- package/cpp/JSIUtils/MGLSmartHostObject.cpp +0 -43
- package/cpp/JSIUtils/MGLSmartHostObject.h +0 -46
- package/cpp/JSIUtils/MGLThreadAwareHostObject.cpp +0 -24
- package/cpp/JSIUtils/MGLThreadAwareHostObject.h +0 -43
- package/cpp/JSIUtils/MGLTypedArray.cpp +0 -325
- package/cpp/JSIUtils/MGLTypedArray.h +0 -160
- package/cpp/MGLKeys.cpp +0 -1426
- package/cpp/MGLKeys.h +0 -203
- package/cpp/MGLQuickCryptoHostObject.cpp +0 -127
- package/cpp/MGLQuickCryptoHostObject.h +0 -30
- package/cpp/Random/MGLRandomHostObject.cpp +0 -96
- package/cpp/Random/MGLRandomHostObject.h +0 -27
- package/cpp/Sig/MGLSignHostObjects.cpp +0 -757
- package/cpp/Sig/MGLSignHostObjects.h +0 -128
- package/cpp/Sig/MGLSignInstaller.cpp +0 -24
- package/cpp/Sig/MGLSignInstaller.h +0 -29
- package/cpp/Sig/MGLVerifyInstaller.cpp +0 -24
- package/cpp/Sig/MGLVerifyInstaller.h +0 -22
- package/cpp/Utils/MGLDispatchQueue.cpp +0 -75
- package/cpp/Utils/MGLDispatchQueue.h +0 -55
- package/cpp/Utils/MGLUtils.cpp +0 -295
- package/cpp/Utils/MGLUtils.h +0 -358
- package/cpp/Utils/base64.h +0 -320
- package/cpp/Utils/logs.h +0 -38
- package/cpp/Utils/node.h +0 -13
- package/cpp/fastpbkdf2/MGLPbkdf2HostObject.cpp +0 -164
- package/cpp/fastpbkdf2/MGLPbkdf2HostObject.h +0 -29
- package/cpp/fastpbkdf2/fastpbkdf2.c +0 -352
- package/cpp/fastpbkdf2/fastpbkdf2.h +0 -68
- package/cpp/webcrypto/MGLWebCrypto.cpp +0 -125
- package/cpp/webcrypto/MGLWebCrypto.h +0 -32
- package/cpp/webcrypto/crypto_aes.cpp +0 -516
- package/cpp/webcrypto/crypto_aes.h +0 -79
- package/cpp/webcrypto/crypto_ec.cpp +0 -424
- package/cpp/webcrypto/crypto_ec.h +0 -78
- package/cpp/webcrypto/crypto_keygen.cpp +0 -86
- package/cpp/webcrypto/crypto_keygen.h +0 -38
- package/ios/QuickCrypto.xcodeproj/project.pbxproj +0 -274
- package/ios/QuickCryptoModule.h +0 -5
- package/ios/QuickCryptoModule.mm +0 -42
- package/lib/commonjs/Cipher.js +0 -502
- package/lib/commonjs/Cipher.js.map +0 -1
- package/lib/commonjs/Hash.js +0 -99
- package/lib/commonjs/Hash.js.map +0 -1
- package/lib/commonjs/Hashnames.js +0 -87
- package/lib/commonjs/Hashnames.js.map +0 -1
- package/lib/commonjs/Hmac.js +0 -79
- package/lib/commonjs/Hmac.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/Cipher.js +0 -30
- package/lib/commonjs/NativeQuickCrypto/Cipher.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/NativeQuickCrypto.js +0 -52
- package/lib/commonjs/NativeQuickCrypto/NativeQuickCrypto.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/aes.js +0 -6
- package/lib/commonjs/NativeQuickCrypto/hash.js +0 -2
- package/lib/commonjs/NativeQuickCrypto/hash.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/hmac.js +0 -2
- package/lib/commonjs/NativeQuickCrypto/hmac.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/keygen.js +0 -6
- package/lib/commonjs/NativeQuickCrypto/keygen.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/pbkdf2.js +0 -2
- package/lib/commonjs/NativeQuickCrypto/pbkdf2.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/random.js +0 -2
- package/lib/commonjs/NativeQuickCrypto/random.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/sig.js +0 -19
- package/lib/commonjs/NativeQuickCrypto/sig.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/webcrypto.js +0 -6
- package/lib/commonjs/NativeQuickCrypto/webcrypto.js.map +0 -1
- package/lib/commonjs/Utils.js +0 -608
- package/lib/commonjs/Utils.js.map +0 -1
- package/lib/commonjs/aes.js +0 -281
- package/lib/commonjs/aes.js.map +0 -1
- package/lib/commonjs/constants.js +0 -85
- package/lib/commonjs/constants.js.map +0 -1
- package/lib/commonjs/ec.js +0 -276
- package/lib/commonjs/ec.js.map +0 -1
- package/lib/commonjs/keygen.js +0 -56
- package/lib/commonjs/keygen.js.map +0 -1
- package/lib/commonjs/keys.js +0 -492
- package/lib/commonjs/keys.js.map +0 -1
- package/lib/commonjs/pbkdf2.js +0 -90
- package/lib/commonjs/pbkdf2.js.map +0 -1
- package/lib/commonjs/rsa.js +0 -248
- package/lib/commonjs/rsa.js.map +0 -1
- package/lib/commonjs/sig.js +0 -129
- package/lib/commonjs/sig.js.map +0 -1
- package/lib/commonjs/subtle.js +0 -448
- package/lib/commonjs/subtle.js.map +0 -1
- package/lib/commonjs/webcrypto.js +0 -14
- package/lib/commonjs/webcrypto.js.map +0 -1
- package/lib/module/Cipher.js +0 -491
- package/lib/module/Cipher.js.map +0 -1
- package/lib/module/Hash.js +0 -93
- package/lib/module/Hash.js.map +0 -1
- package/lib/module/Hashnames.js +0 -85
- package/lib/module/Hashnames.js.map +0 -1
- package/lib/module/Hmac.js +0 -74
- package/lib/module/Hmac.js.map +0 -1
- package/lib/module/NativeQuickCrypto/Cipher.js +0 -26
- package/lib/module/NativeQuickCrypto/Cipher.js.map +0 -1
- package/lib/module/NativeQuickCrypto/NativeQuickCrypto.js +0 -49
- package/lib/module/NativeQuickCrypto/NativeQuickCrypto.js.map +0 -1
- package/lib/module/NativeQuickCrypto/aes.js +0 -4
- package/lib/module/NativeQuickCrypto/hash.js +0 -2
- package/lib/module/NativeQuickCrypto/hash.js.map +0 -1
- package/lib/module/NativeQuickCrypto/hmac.js +0 -2
- package/lib/module/NativeQuickCrypto/hmac.js.map +0 -1
- package/lib/module/NativeQuickCrypto/keygen.js +0 -4
- package/lib/module/NativeQuickCrypto/keygen.js.map +0 -1
- package/lib/module/NativeQuickCrypto/pbkdf2.js +0 -2
- package/lib/module/NativeQuickCrypto/pbkdf2.js.map +0 -1
- package/lib/module/NativeQuickCrypto/random.js +0 -2
- package/lib/module/NativeQuickCrypto/random.js.map +0 -1
- package/lib/module/NativeQuickCrypto/rsa.js +0 -4
- package/lib/module/NativeQuickCrypto/sig.js +0 -17
- package/lib/module/NativeQuickCrypto/sig.js.map +0 -1
- package/lib/module/NativeQuickCrypto/webcrypto.js +0 -4
- package/lib/module/NativeQuickCrypto/webcrypto.js.map +0 -1
- package/lib/module/Utils.js +0 -539
- package/lib/module/Utils.js.map +0 -1
- package/lib/module/aes.js +0 -274
- package/lib/module/aes.js.map +0 -1
- package/lib/module/constants.js +0 -81
- package/lib/module/constants.js.map +0 -1
- package/lib/module/ec.js +0 -267
- package/lib/module/ec.js.map +0 -1
- package/lib/module/keygen.js +0 -49
- package/lib/module/keygen.js.map +0 -1
- package/lib/module/keys.js +0 -477
- package/lib/module/keys.js.map +0 -1
- package/lib/module/pbkdf2.js +0 -84
- package/lib/module/pbkdf2.js.map +0 -1
- package/lib/module/rsa.js +0 -242
- package/lib/module/rsa.js.map +0 -1
- package/lib/module/sig.js +0 -124
- package/lib/module/sig.js.map +0 -1
- package/lib/module/subtle.js +0 -443
- package/lib/module/subtle.js.map +0 -1
- package/lib/module/webcrypto.js +0 -10
- package/lib/module/webcrypto.js.map +0 -1
- package/lib/typescript/Cipher.d.ts +0 -81
- package/lib/typescript/Cipher.d.ts.map +0 -1
- package/lib/typescript/Hash.d.ts +0 -44
- package/lib/typescript/Hash.d.ts.map +0 -1
- package/lib/typescript/Hashnames.d.ts +0 -11
- package/lib/typescript/Hashnames.d.ts.map +0 -1
- package/lib/typescript/Hmac.d.ts +0 -37
- package/lib/typescript/Hmac.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/Cipher.d.ts +0 -44
- package/lib/typescript/NativeQuickCrypto/Cipher.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/NativeQuickCrypto.d.ts +0 -33
- package/lib/typescript/NativeQuickCrypto/NativeQuickCrypto.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/aes.d.ts +0 -5
- package/lib/typescript/NativeQuickCrypto/aes.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/hash.d.ts +0 -7
- package/lib/typescript/NativeQuickCrypto/hash.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/hmac.d.ts +0 -6
- package/lib/typescript/NativeQuickCrypto/hmac.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/keygen.d.ts +0 -4
- package/lib/typescript/NativeQuickCrypto/keygen.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/pbkdf2.d.ts +0 -5
- package/lib/typescript/NativeQuickCrypto/pbkdf2.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/random.d.ts +0 -5
- package/lib/typescript/NativeQuickCrypto/random.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/rsa.d.ts +0 -5
- package/lib/typescript/NativeQuickCrypto/rsa.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/sig.d.ts +0 -23
- package/lib/typescript/NativeQuickCrypto/sig.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/webcrypto.d.ts +0 -39
- package/lib/typescript/NativeQuickCrypto/webcrypto.d.ts.map +0 -1
- package/lib/typescript/Utils.d.ts +0 -48
- package/lib/typescript/Utils.d.ts.map +0 -1
- package/lib/typescript/aes.d.ts +0 -22
- package/lib/typescript/aes.d.ts.map +0 -1
- package/lib/typescript/constants.d.ts +0 -76
- package/lib/typescript/constants.d.ts.map +0 -1
- package/lib/typescript/ec.d.ts +0 -7
- package/lib/typescript/ec.d.ts.map +0 -1
- package/lib/typescript/keygen.d.ts +0 -6
- package/lib/typescript/keygen.d.ts.map +0 -1
- package/lib/typescript/keys.d.ts +0 -206
- package/lib/typescript/keys.d.ts.map +0 -1
- package/lib/typescript/pbkdf2.d.ts +0 -12
- package/lib/typescript/pbkdf2.d.ts.map +0 -1
- package/lib/typescript/rsa.d.ts +0 -12
- package/lib/typescript/rsa.d.ts.map +0 -1
- package/lib/typescript/sig.d.ts +0 -21
- package/lib/typescript/sig.d.ts.map +0 -1
- package/lib/typescript/subtle.d.ts +0 -15
- package/lib/typescript/subtle.d.ts.map +0 -1
- package/lib/typescript/webcrypto.d.ts +0 -9
- package/lib/typescript/webcrypto.d.ts.map +0 -1
- package/react-native-quick-crypto.podspec +0 -40
- package/src/Cipher.ts +0 -832
- package/src/Hash.ts +0 -132
- package/src/Hashnames.ts +0 -93
- package/src/Hmac.ts +0 -106
- package/src/NativeQuickCrypto/Cipher.ts +0 -102
- package/src/NativeQuickCrypto/NativeQuickCrypto.ts +0 -102
- package/src/NativeQuickCrypto/aes.ts +0 -14
- package/src/NativeQuickCrypto/hash.ts +0 -10
- package/src/NativeQuickCrypto/hmac.ts +0 -9
- package/src/NativeQuickCrypto/keygen.ts +0 -7
- package/src/NativeQuickCrypto/pbkdf2.ts +0 -16
- package/src/NativeQuickCrypto/random.ts +0 -12
- package/src/NativeQuickCrypto/rsa.ts +0 -12
- package/src/NativeQuickCrypto/sig.ts +0 -44
- package/src/NativeQuickCrypto/webcrypto.ts +0 -72
- package/src/Utils.ts +0 -777
- package/src/aes.ts +0 -402
- package/src/constants.ts +0 -79
- package/src/ec.ts +0 -375
- package/src/keygen.ts +0 -80
- package/src/keys.ts +0 -787
- package/src/pbkdf2.ts +0 -169
- package/src/rsa.ts +0 -370
- package/src/sig.ts +0 -164
- package/src/subtle.ts +0 -639
- package/src/webcrypto.ts +0 -8
- /package/android/src/main/{AndroidManifestNew.xml → AndroidManifest.xml} +0 -0
package/lib/commonjs/aes.js
DELETED
|
@@ -1,281 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
|
|
3
|
-
Object.defineProperty(exports, "__esModule", {
|
|
4
|
-
value: true
|
|
5
|
-
});
|
|
6
|
-
exports.kAesKeyLengths = exports.getAlgorithmName = exports.aesImportKey = exports.aesGenerateKey = exports.aesCipher = exports.AESKeyVariant = void 0;
|
|
7
|
-
var _NativeQuickCrypto = require("./NativeQuickCrypto/NativeQuickCrypto");
|
|
8
|
-
var _Utils = require("./Utils");
|
|
9
|
-
var _keys = require("./keys");
|
|
10
|
-
var _keygen = require("./keygen");
|
|
11
|
-
// needs to match the values in cpp/webcrypto/crypto_aes.{h,cpp}
|
|
12
|
-
let AESKeyVariant = exports.AESKeyVariant = /*#__PURE__*/function (AESKeyVariant) {
|
|
13
|
-
AESKeyVariant[AESKeyVariant["AES_CTR_128"] = 0] = "AES_CTR_128";
|
|
14
|
-
AESKeyVariant[AESKeyVariant["AES_CTR_192"] = 1] = "AES_CTR_192";
|
|
15
|
-
AESKeyVariant[AESKeyVariant["AES_CTR_256"] = 2] = "AES_CTR_256";
|
|
16
|
-
AESKeyVariant[AESKeyVariant["AES_CBC_128"] = 3] = "AES_CBC_128";
|
|
17
|
-
AESKeyVariant[AESKeyVariant["AES_CBC_192"] = 4] = "AES_CBC_192";
|
|
18
|
-
AESKeyVariant[AESKeyVariant["AES_CBC_256"] = 5] = "AES_CBC_256";
|
|
19
|
-
AESKeyVariant[AESKeyVariant["AES_GCM_128"] = 6] = "AES_GCM_128";
|
|
20
|
-
AESKeyVariant[AESKeyVariant["AES_GCM_192"] = 7] = "AES_GCM_192";
|
|
21
|
-
AESKeyVariant[AESKeyVariant["AES_GCM_256"] = 8] = "AES_GCM_256";
|
|
22
|
-
AESKeyVariant[AESKeyVariant["AES_KW_128"] = 9] = "AES_KW_128";
|
|
23
|
-
AESKeyVariant[AESKeyVariant["AES_KW_192"] = 10] = "AES_KW_192";
|
|
24
|
-
AESKeyVariant[AESKeyVariant["AES_KW_256"] = 11] = "AES_KW_256";
|
|
25
|
-
return AESKeyVariant;
|
|
26
|
-
}({});
|
|
27
|
-
const kMaxCounterLength = 128;
|
|
28
|
-
const kTagLengths = [32, 64, 96, 104, 112, 120, 128];
|
|
29
|
-
const kAesKeyLengths = exports.kAesKeyLengths = [128, 192, 256];
|
|
30
|
-
const getAlgorithmName = (name, length) => {
|
|
31
|
-
if (length === undefined) throw (0, _Utils.lazyDOMException)(`Invalid algorithm length: ${length}`, 'SyntaxError');
|
|
32
|
-
switch (name) {
|
|
33
|
-
case 'AES-CBC':
|
|
34
|
-
return `A${length}CBC`;
|
|
35
|
-
case 'AES-CTR':
|
|
36
|
-
return `A${length}CTR`;
|
|
37
|
-
case 'AES-GCM':
|
|
38
|
-
return `A${length}GCM`;
|
|
39
|
-
case 'AES-KW':
|
|
40
|
-
return `A${length}KW`;
|
|
41
|
-
default:
|
|
42
|
-
throw (0, _Utils.lazyDOMException)(`invalid algorithm name: ${name}`, 'SyntaxError');
|
|
43
|
-
}
|
|
44
|
-
};
|
|
45
|
-
exports.getAlgorithmName = getAlgorithmName;
|
|
46
|
-
function validateKeyLength(length) {
|
|
47
|
-
if (length !== 128 && length !== 192 && length !== 256) throw (0, _Utils.lazyDOMException)(`Invalid key length: ${length}`, 'DataError');
|
|
48
|
-
}
|
|
49
|
-
function getVariant(name, length) {
|
|
50
|
-
switch (name) {
|
|
51
|
-
case 'AES-CBC':
|
|
52
|
-
switch (length) {
|
|
53
|
-
case 128:
|
|
54
|
-
return AESKeyVariant.AES_CBC_128;
|
|
55
|
-
case 192:
|
|
56
|
-
return AESKeyVariant.AES_CBC_192;
|
|
57
|
-
case 256:
|
|
58
|
-
return AESKeyVariant.AES_CBC_256;
|
|
59
|
-
}
|
|
60
|
-
// @ts-ignore
|
|
61
|
-
break;
|
|
62
|
-
case 'AES-CTR':
|
|
63
|
-
switch (length) {
|
|
64
|
-
case 128:
|
|
65
|
-
return AESKeyVariant.AES_CTR_128;
|
|
66
|
-
case 192:
|
|
67
|
-
return AESKeyVariant.AES_CTR_192;
|
|
68
|
-
case 256:
|
|
69
|
-
return AESKeyVariant.AES_CTR_256;
|
|
70
|
-
}
|
|
71
|
-
// @ts-ignore
|
|
72
|
-
break;
|
|
73
|
-
case 'AES-GCM':
|
|
74
|
-
switch (length) {
|
|
75
|
-
case 128:
|
|
76
|
-
return AESKeyVariant.AES_GCM_128;
|
|
77
|
-
case 192:
|
|
78
|
-
return AESKeyVariant.AES_GCM_192;
|
|
79
|
-
case 256:
|
|
80
|
-
return AESKeyVariant.AES_GCM_256;
|
|
81
|
-
}
|
|
82
|
-
// @ts-ignore
|
|
83
|
-
break;
|
|
84
|
-
case 'AES-KW':
|
|
85
|
-
switch (length) {
|
|
86
|
-
case 128:
|
|
87
|
-
return AESKeyVariant.AES_KW_128;
|
|
88
|
-
case 192:
|
|
89
|
-
return AESKeyVariant.AES_KW_192;
|
|
90
|
-
case 256:
|
|
91
|
-
return AESKeyVariant.AES_KW_256;
|
|
92
|
-
}
|
|
93
|
-
// @ts-ignore
|
|
94
|
-
break;
|
|
95
|
-
}
|
|
96
|
-
|
|
97
|
-
// @ts-ignore
|
|
98
|
-
throw (0, _Utils.lazyDOMException)(`Error getting variant ${name} at length: ${length}`, 'DataError');
|
|
99
|
-
}
|
|
100
|
-
function asyncAesCtrCipher(mode, key, data, {
|
|
101
|
-
counter,
|
|
102
|
-
length
|
|
103
|
-
}) {
|
|
104
|
-
(0, _Utils.validateByteLength)(counter, 'algorithm.counter', 16);
|
|
105
|
-
// The length must specify an integer between 1 and 128. While
|
|
106
|
-
// there is no default, this should typically be 64.
|
|
107
|
-
if (length === 0 || length > kMaxCounterLength) {
|
|
108
|
-
throw (0, _Utils.lazyDOMException)('AES-CTR algorithm.length must be between 1 and 128', 'OperationError');
|
|
109
|
-
}
|
|
110
|
-
return _NativeQuickCrypto.NativeQuickCrypto.webcrypto.aesCipher(mode, key.keyObject.handle, data, getVariant('AES-CTR', key.algorithm.length), (0, _Utils.bufferLikeToArrayBuffer)(counter), length);
|
|
111
|
-
}
|
|
112
|
-
function asyncAesCbcCipher(mode, key, data, {
|
|
113
|
-
iv
|
|
114
|
-
}) {
|
|
115
|
-
(0, _Utils.validateByteLength)(iv, 'algorithm.iv', 16);
|
|
116
|
-
return _NativeQuickCrypto.NativeQuickCrypto.webcrypto.aesCipher(mode, key.keyObject.handle, data, getVariant('AES-CBC', key.algorithm.length), (0, _Utils.bufferLikeToArrayBuffer)(iv));
|
|
117
|
-
}
|
|
118
|
-
|
|
119
|
-
// function asyncAesKwCipher(
|
|
120
|
-
// mode: CipherOrWrapMode,
|
|
121
|
-
// key: CryptoKey,
|
|
122
|
-
// data: BufferLike
|
|
123
|
-
// ): Promise<ArrayBuffer> {
|
|
124
|
-
// return NativeQuickCrypto.webcrypto.aesCipher(
|
|
125
|
-
// mode,
|
|
126
|
-
// key.keyObject.handle,
|
|
127
|
-
// data,
|
|
128
|
-
// getVariant('AES-KW', key.algorithm.length)
|
|
129
|
-
// );
|
|
130
|
-
// }
|
|
131
|
-
|
|
132
|
-
function asyncAesGcmCipher(mode, key, data, {
|
|
133
|
-
iv,
|
|
134
|
-
additionalData,
|
|
135
|
-
tagLength = 128
|
|
136
|
-
}) {
|
|
137
|
-
if (!kTagLengths.includes(tagLength)) {
|
|
138
|
-
throw (0, _Utils.lazyDOMException)(`${tagLength} is not a valid AES-GCM tag length`, 'OperationError');
|
|
139
|
-
}
|
|
140
|
-
(0, _Utils.validateMaxBufferLength)(iv, 'algorithm.iv');
|
|
141
|
-
if (additionalData !== undefined) {
|
|
142
|
-
(0, _Utils.validateMaxBufferLength)(additionalData, 'algorithm.additionalData');
|
|
143
|
-
}
|
|
144
|
-
const tagByteLength = Math.floor(tagLength / 8);
|
|
145
|
-
let length;
|
|
146
|
-
let tag = new ArrayBuffer(0);
|
|
147
|
-
switch (mode) {
|
|
148
|
-
case _keys.CipherOrWrapMode.kWebCryptoCipherDecrypt:
|
|
149
|
-
{
|
|
150
|
-
// const slice = ArrayBuffer.isView(data)
|
|
151
|
-
// ? DataView.prototype.buffer.slice
|
|
152
|
-
// : ArrayBuffer.prototype.slice;
|
|
153
|
-
tag = data.slice(-tagByteLength);
|
|
154
|
-
|
|
155
|
-
// Refs: https://www.w3.org/TR/WebCryptoAPI/#aes-gcm-operations
|
|
156
|
-
//
|
|
157
|
-
// > If *plaintext* has a length less than *tagLength* bits, then `throw`
|
|
158
|
-
// > an `OperationError`.
|
|
159
|
-
if (tagByteLength > tag.byteLength) {
|
|
160
|
-
throw (0, _Utils.lazyDOMException)('The provided data is too small.', 'OperationError');
|
|
161
|
-
}
|
|
162
|
-
data = data.slice(0, -tagByteLength);
|
|
163
|
-
break;
|
|
164
|
-
}
|
|
165
|
-
case _keys.CipherOrWrapMode.kWebCryptoCipherEncrypt:
|
|
166
|
-
length = tagByteLength;
|
|
167
|
-
break;
|
|
168
|
-
}
|
|
169
|
-
return _NativeQuickCrypto.NativeQuickCrypto.webcrypto.aesCipher(mode, key.keyObject.handle, data, getVariant('AES-GCM', key.algorithm.length), (0, _Utils.bufferLikeToArrayBuffer)(iv), length, (0, _Utils.bufferLikeToArrayBuffer)(tag), (0, _Utils.bufferLikeToArrayBuffer)(additionalData || new ArrayBuffer(0)));
|
|
170
|
-
}
|
|
171
|
-
const aesCipher = (mode, key, data, algorithm) => {
|
|
172
|
-
switch (algorithm.name) {
|
|
173
|
-
case 'AES-CTR':
|
|
174
|
-
return asyncAesCtrCipher(mode, key, data, algorithm);
|
|
175
|
-
case 'AES-CBC':
|
|
176
|
-
return asyncAesCbcCipher(mode, key, data, algorithm);
|
|
177
|
-
case 'AES-GCM':
|
|
178
|
-
return asyncAesGcmCipher(mode, key, data, algorithm);
|
|
179
|
-
// case 'AES-KW':
|
|
180
|
-
// return asyncAesKwCipher(mode, key, data);
|
|
181
|
-
}
|
|
182
|
-
throw new Error(`aesCipher: Unknown algorithm ${algorithm.name}`);
|
|
183
|
-
};
|
|
184
|
-
exports.aesCipher = aesCipher;
|
|
185
|
-
const aesGenerateKey = async (algorithm, extractable, keyUsages) => {
|
|
186
|
-
const {
|
|
187
|
-
name,
|
|
188
|
-
length
|
|
189
|
-
} = algorithm;
|
|
190
|
-
if (!name) {
|
|
191
|
-
throw (0, _Utils.lazyDOMException)('Algorithm name is undefined', 'SyntaxError');
|
|
192
|
-
}
|
|
193
|
-
if (!kAesKeyLengths.includes(length)) {
|
|
194
|
-
throw (0, _Utils.lazyDOMException)('AES key length must be 128, 192, or 256 bits', 'OperationError');
|
|
195
|
-
}
|
|
196
|
-
const checkUsages = ['wrapKey', 'unwrapKey'];
|
|
197
|
-
if (name !== 'AES-KW') {
|
|
198
|
-
checkUsages.push('encrypt', 'decrypt');
|
|
199
|
-
}
|
|
200
|
-
// const usagesSet = new SafeSet(keyUsages);
|
|
201
|
-
if ((0, _Utils.hasAnyNotIn)(keyUsages, checkUsages)) {
|
|
202
|
-
throw (0, _Utils.lazyDOMException)(`Unsupported key usage for an AES key: ${keyUsages}`, 'SyntaxError');
|
|
203
|
-
}
|
|
204
|
-
const [err, key] = await (0, _keygen.generateKeyPromise)('aes', {
|
|
205
|
-
length
|
|
206
|
-
});
|
|
207
|
-
if (err) {
|
|
208
|
-
throw (0, _Utils.lazyDOMException)(`aesGenerateKey (generateKeyPromise) failed: [${err.message}]`, {
|
|
209
|
-
name: 'OperationError',
|
|
210
|
-
cause: err
|
|
211
|
-
});
|
|
212
|
-
}
|
|
213
|
-
return new _keys.CryptoKey(key, {
|
|
214
|
-
name,
|
|
215
|
-
length
|
|
216
|
-
}, Array.from(keyUsages), extractable);
|
|
217
|
-
};
|
|
218
|
-
exports.aesGenerateKey = aesGenerateKey;
|
|
219
|
-
const aesImportKey = async (algorithm, format, keyData, extractable, keyUsages) => {
|
|
220
|
-
const {
|
|
221
|
-
name
|
|
222
|
-
} = algorithm;
|
|
223
|
-
const checkUsages = ['wrapKey', 'unwrapKey'];
|
|
224
|
-
if (name !== 'AES-KW') {
|
|
225
|
-
checkUsages.push('encrypt', 'decrypt');
|
|
226
|
-
}
|
|
227
|
-
|
|
228
|
-
// const usagesSet = new SafeSet(keyUsages);
|
|
229
|
-
if ((0, _Utils.hasAnyNotIn)(keyUsages, checkUsages)) {
|
|
230
|
-
throw (0, _Utils.lazyDOMException)('Unsupported key usage for an AES key', 'SyntaxError');
|
|
231
|
-
}
|
|
232
|
-
let keyObject;
|
|
233
|
-
let length;
|
|
234
|
-
switch (format) {
|
|
235
|
-
case 'raw':
|
|
236
|
-
{
|
|
237
|
-
const data = keyData;
|
|
238
|
-
validateKeyLength(data.byteLength * 8);
|
|
239
|
-
keyObject = (0, _keys.createSecretKey)(keyData);
|
|
240
|
-
break;
|
|
241
|
-
}
|
|
242
|
-
case 'jwk':
|
|
243
|
-
{
|
|
244
|
-
const data = keyData;
|
|
245
|
-
if (!data.kty) throw (0, _Utils.lazyDOMException)('Invalid keyData', 'DataError');
|
|
246
|
-
if (data.kty !== 'oct') throw (0, _Utils.lazyDOMException)('Invalid JWK "kty" Parameter', 'DataError');
|
|
247
|
-
if (keyUsages.length > 0 && data.use !== undefined && data.use !== 'enc') {
|
|
248
|
-
throw (0, _Utils.lazyDOMException)('Invalid JWK "use" Parameter', 'DataError');
|
|
249
|
-
}
|
|
250
|
-
(0, _Utils.validateKeyOps)(data.key_ops, keyUsages);
|
|
251
|
-
if (data.ext !== undefined && data.ext === false && extractable === true) {
|
|
252
|
-
throw (0, _Utils.lazyDOMException)('JWK "ext" Parameter and extractable mismatch', 'DataError');
|
|
253
|
-
}
|
|
254
|
-
const handle = _NativeQuickCrypto.NativeQuickCrypto.webcrypto.createKeyObjectHandle();
|
|
255
|
-
handle.initJwk(data);
|
|
256
|
-
({
|
|
257
|
-
length
|
|
258
|
-
} = handle.keyDetail());
|
|
259
|
-
validateKeyLength(length);
|
|
260
|
-
if (data.alg !== undefined) {
|
|
261
|
-
if (data.alg !== getAlgorithmName(algorithm.name, length)) throw (0, _Utils.lazyDOMException)('JWK "alg" does not match the requested algorithm', 'DataError');
|
|
262
|
-
}
|
|
263
|
-
keyObject = new _keys.SecretKeyObject(handle);
|
|
264
|
-
break;
|
|
265
|
-
}
|
|
266
|
-
default:
|
|
267
|
-
throw (0, _Utils.lazyDOMException)(`Unable to import AES key with format ${format}`, 'NotSupportedError');
|
|
268
|
-
}
|
|
269
|
-
if (length === undefined) {
|
|
270
|
-
({
|
|
271
|
-
length
|
|
272
|
-
} = keyObject.handle.keyDetail());
|
|
273
|
-
validateKeyLength(length);
|
|
274
|
-
}
|
|
275
|
-
return new _keys.CryptoKey(keyObject, {
|
|
276
|
-
name,
|
|
277
|
-
length
|
|
278
|
-
}, keyUsages, extractable);
|
|
279
|
-
};
|
|
280
|
-
exports.aesImportKey = aesImportKey;
|
|
281
|
-
//# sourceMappingURL=aes.js.map
|
package/lib/commonjs/aes.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"names":["_NativeQuickCrypto","require","_Utils","_keys","_keygen","AESKeyVariant","exports","kMaxCounterLength","kTagLengths","kAesKeyLengths","getAlgorithmName","name","length","undefined","lazyDOMException","validateKeyLength","getVariant","AES_CBC_128","AES_CBC_192","AES_CBC_256","AES_CTR_128","AES_CTR_192","AES_CTR_256","AES_GCM_128","AES_GCM_192","AES_GCM_256","AES_KW_128","AES_KW_192","AES_KW_256","asyncAesCtrCipher","mode","key","data","counter","validateByteLength","NativeQuickCrypto","webcrypto","aesCipher","keyObject","handle","algorithm","bufferLikeToArrayBuffer","asyncAesCbcCipher","iv","asyncAesGcmCipher","additionalData","tagLength","includes","validateMaxBufferLength","tagByteLength","Math","floor","tag","ArrayBuffer","CipherOrWrapMode","kWebCryptoCipherDecrypt","slice","byteLength","kWebCryptoCipherEncrypt","Error","aesGenerateKey","extractable","keyUsages","checkUsages","push","hasAnyNotIn","err","generateKeyPromise","message","cause","CryptoKey","Array","from","aesImportKey","format","keyData","createSecretKey","kty","use","validateKeyOps","key_ops","ext","createKeyObjectHandle","initJwk","keyDetail","alg","SecretKeyObject"],"sourceRoot":"../../src","sources":["aes.ts"],"mappings":";;;;;;AAAA,IAAAA,kBAAA,GAAAC,OAAA;AACA,IAAAC,MAAA,GAAAD,OAAA;AASA,IAAAE,KAAA,GAAAF,OAAA;AAkBA,IAAAG,OAAA,GAAAH,OAAA;AAEA;AAAA,IACYI,aAAa,GAAAC,OAAA,CAAAD,aAAA,0BAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAA,OAAbA,aAAa;AAAA;AAezB,MAAME,iBAAiB,GAAG,GAAG;AAC7B,MAAMC,WAAwB,GAAG,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC;AAC1D,MAAMC,cAAc,GAAAH,OAAA,CAAAG,cAAA,GAAG,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC;AAEtC,MAAMC,gBAAgB,GAAGA,CAACC,IAAY,EAAEC,MAAe,KAAK;EACjE,IAAIA,MAAM,KAAKC,SAAS,EACtB,MAAM,IAAAC,uBAAgB,EACnB,6BAA4BF,MAAO,EAAC,EACrC,aACF,CAAC;EACH,QAAQD,IAAI;IACV,KAAK,SAAS;MACZ,OAAQ,IAAGC,MAAO,KAAI;IACxB,KAAK,SAAS;MACZ,OAAQ,IAAGA,MAAO,KAAI;IACxB,KAAK,SAAS;MACZ,OAAQ,IAAGA,MAAO,KAAI;IACxB,KAAK,QAAQ;MACX,OAAQ,IAAGA,MAAO,IAAG;IACvB;MACE,MAAM,IAAAE,uBAAgB,EAAE,2BAA0BH,IAAK,EAAC,EAAE,aAAa,CAAC;EAC5E;AACF,CAAC;AAACL,OAAA,CAAAI,gBAAA,GAAAA,gBAAA;AAEF,SAASK,iBAAiBA,CAACH,MAAe,EAAE;EAC1C,IAAIA,MAAM,KAAK,GAAG,IAAIA,MAAM,KAAK,GAAG,IAAIA,MAAM,KAAK,GAAG,EACpD,MAAM,IAAAE,uBAAgB,EAAE,uBAAsBF,MAAO,EAAC,EAAE,WAAW,CAAC;AACxE;AAEA,SAASI,UAAUA,CAACL,IAAkB,EAAEC,MAAiB,EAAiB;EACxE,QAAQD,IAAI;IACV,KAAK,SAAS;MACZ,QAAQC,MAAM;QACZ,KAAK,GAAG;UACN,OAAOP,aAAa,CAACY,WAAW;QAClC,KAAK,GAAG;UACN,OAAOZ,aAAa,CAACa,WAAW;QAClC,KAAK,GAAG;UACN,OAAOb,aAAa,CAACc,WAAW;MACpC;MACA;MACA;IACF,KAAK,SAAS;MACZ,QAAQP,MAAM;QACZ,KAAK,GAAG;UACN,OAAOP,aAAa,CAACe,WAAW;QAClC,KAAK,GAAG;UACN,OAAOf,aAAa,CAACgB,WAAW;QAClC,KAAK,GAAG;UACN,OAAOhB,aAAa,CAACiB,WAAW;MACpC;MACA;MACA;IACF,KAAK,SAAS;MACZ,QAAQV,MAAM;QACZ,KAAK,GAAG;UACN,OAAOP,aAAa,CAACkB,WAAW;QAClC,KAAK,GAAG;UACN,OAAOlB,aAAa,CAACmB,WAAW;QAClC,KAAK,GAAG;UACN,OAAOnB,aAAa,CAACoB,WAAW;MACpC;MACA;MACA;IACF,KAAK,QAAQ;MACX,QAAQb,MAAM;QACZ,KAAK,GAAG;UACN,OAAOP,aAAa,CAACqB,UAAU;QACjC,KAAK,GAAG;UACN,OAAOrB,aAAa,CAACsB,UAAU;QACjC,KAAK,GAAG;UACN,OAAOtB,aAAa,CAACuB,UAAU;MACnC;MACA;MACA;EACJ;;EAEA;EACA,MAAM,IAAAd,uBAAgB,EACnB,yBAAwBH,IAAK,eAAcC,MAAO,EAAC,EACpD,WACF,CAAC;AACH;AAEA,SAASiB,iBAAiBA,CACxBC,IAAsB,EACtBC,GAAc,EACdC,IAAiB,EACjB;EAAEC,OAAO;EAAErB;AAAqB,CAAC,EACX;EACtB,IAAAsB,yBAAkB,EAACD,OAAO,EAAE,mBAAmB,EAAE,EAAE,CAAC;EACpD;EACA;EACA,IAAIrB,MAAM,KAAK,CAAC,IAAIA,MAAM,GAAGL,iBAAiB,EAAE;IAC9C,MAAM,IAAAO,uBAAgB,EACpB,oDAAoD,EACpD,gBACF,CAAC;EACH;EAEA,OAAOqB,oCAAiB,CAACC,SAAS,CAACC,SAAS,CAC1CP,IAAI,EACJC,GAAG,CAACO,SAAS,CAACC,MAAM,EACpBP,IAAI,EACJhB,UAAU,CAAC,SAAS,EAAEe,GAAG,CAACS,SAAS,CAAC5B,MAAmB,CAAC,EACxD,IAAA6B,8BAAuB,EAACR,OAAO,CAAC,EAChCrB,MACF,CAAC;AACH;AAEA,SAAS8B,iBAAiBA,CACxBZ,IAAsB,EACtBC,GAAc,EACdC,IAAiB,EACjB;EAAEW;AAAiB,CAAC,EACE;EACtB,IAAAT,yBAAkB,EAACS,EAAE,EAAE,cAAc,EAAE,EAAE,CAAC;EAC1C,OAAOR,oCAAiB,CAACC,SAAS,CAACC,SAAS,CAC1CP,IAAI,EACJC,GAAG,CAACO,SAAS,CAACC,MAAM,EACpBP,IAAI,EACJhB,UAAU,CAAC,SAAS,EAAEe,GAAG,CAACS,SAAS,CAAC5B,MAAmB,CAAC,EACxD,IAAA6B,8BAAuB,EAACE,EAAE,CAC5B,CAAC;AACH;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,SAASC,iBAAiBA,CACxBd,IAAsB,EACtBC,GAAc,EACdC,IAAiB,EACjB;EAAEW,EAAE;EAAEE,cAAc;EAAEC,SAAS,GAAG;AAAkB,CAAC,EACrD;EACA,IAAI,CAACtC,WAAW,CAACuC,QAAQ,CAACD,SAAS,CAAC,EAAE;IACpC,MAAM,IAAAhC,uBAAgB,EACnB,GAAEgC,SAAU,oCAAmC,EAChD,gBACF,CAAC;EACH;EAEA,IAAAE,8BAAuB,EAACL,EAAE,EAAE,cAAc,CAAC;EAE3C,IAAIE,cAAc,KAAKhC,SAAS,EAAE;IAChC,IAAAmC,8BAAuB,EAACH,cAAc,EAAE,0BAA0B,CAAC;EACrE;EAEA,MAAMI,aAAa,GAAGC,IAAI,CAACC,KAAK,CAACL,SAAS,GAAG,CAAC,CAAC;EAC/C,IAAIlC,MAA0B;EAC9B,IAAIwC,GAAG,GAAG,IAAIC,WAAW,CAAC,CAAC,CAAC;EAC5B,QAAQvB,IAAI;IACV,KAAKwB,sBAAgB,CAACC,uBAAuB;MAAE;QAC7C;QACA;QACA;QACAH,GAAG,GAAGpB,IAAI,CAACwB,KAAK,CAAC,CAACP,aAAa,CAAC;;QAEhC;QACA;QACA;QACA;QACA,IAAIA,aAAa,GAAGG,GAAG,CAACK,UAAU,EAAE;UAClC,MAAM,IAAA3C,uBAAgB,EACpB,iCAAiC,EACjC,gBACF,CAAC;QACH;QAEAkB,IAAI,GAAGA,IAAI,CAACwB,KAAK,CAAC,CAAC,EAAE,CAACP,aAAa,CAAC;QACpC;MACF;IACA,KAAKK,sBAAgB,CAACI,uBAAuB;MAC3C9C,MAAM,GAAGqC,aAAa;MACtB;EACJ;EAEA,OAAOd,oCAAiB,CAACC,SAAS,CAACC,SAAS,CAC1CP,IAAI,EACJC,GAAG,CAACO,SAAS,CAACC,MAAM,EACpBP,IAAI,EACJhB,UAAU,CAAC,SAAS,EAAEe,GAAG,CAACS,SAAS,CAAC5B,MAAmB,CAAC,EACxD,IAAA6B,8BAAuB,EAACE,EAAE,CAAC,EAC3B/B,MAAM,EACN,IAAA6B,8BAAuB,EAACW,GAAG,CAAC,EAC5B,IAAAX,8BAAuB,EAACI,cAAc,IAAI,IAAIQ,WAAW,CAAC,CAAC,CAAC,CAC9D,CAAC;AACH;AAEO,MAAMhB,SAAS,GAAGA,CACvBP,IAAsB,EACtBC,GAAc,EACdC,IAAiB,EACjBQ,SAA+B,KACN;EACzB,QAAQA,SAAS,CAAC7B,IAAI;IACpB,KAAK,SAAS;MACZ,OAAOkB,iBAAiB,CAACC,IAAI,EAAEC,GAAG,EAAEC,IAAI,EAAEQ,SAAS,CAAC;IACtD,KAAK,SAAS;MACZ,OAAOE,iBAAiB,CAACZ,IAAI,EAAEC,GAAG,EAAEC,IAAI,EAAEQ,SAAS,CAAC;IACtD,KAAK,SAAS;MACZ,OAAOI,iBAAiB,CAACd,IAAI,EAAEC,GAAG,EAAEC,IAAI,EAAEQ,SAAS,CAAC;IACtD;IACA;EACF;EACA,MAAM,IAAImB,KAAK,CAAE,gCAA+BnB,SAAS,CAAC7B,IAAK,EAAC,CAAC;AACnE,CAAC;AAACL,OAAA,CAAA+B,SAAA,GAAAA,SAAA;AAEK,MAAMuB,cAAc,GAAG,MAAAA,CAC5BpB,SAA0B,EAC1BqB,WAAoB,EACpBC,SAAqB,KACE;EACvB,MAAM;IAAEnD,IAAI;IAAEC;EAAO,CAAC,GAAG4B,SAAS;EAClC,IAAI,CAAC7B,IAAI,EAAE;IACT,MAAM,IAAAG,uBAAgB,EAAC,6BAA6B,EAAE,aAAa,CAAC;EACtE;EACA,IAAI,CAACL,cAAc,CAACsC,QAAQ,CAACnC,MAAM,CAAC,EAAE;IACpC,MAAM,IAAAE,uBAAgB,EACpB,8CAA8C,EAC9C,gBACF,CAAC;EACH;EAEA,MAAMiD,WAAW,GAAG,CAAC,SAAS,EAAE,WAAW,CAAC;EAC5C,IAAIpD,IAAI,KAAK,QAAQ,EAAE;IACrBoD,WAAW,CAACC,IAAI,CAAC,SAAS,EAAE,SAAS,CAAC;EACxC;EACA;EACA,IAAI,IAAAC,kBAAW,EAACH,SAAS,EAAEC,WAAW,CAAC,EAAE;IACvC,MAAM,IAAAjD,uBAAgB,EACnB,yCAAwCgD,SAAU,EAAC,EACpD,aACF,CAAC;EACH;EAEA,MAAM,CAACI,GAAG,EAAEnC,GAAG,CAAC,GAAG,MAAM,IAAAoC,0BAAkB,EAAC,KAAK,EAAE;IAAEvD;EAAO,CAAC,CAAC;EAC9D,IAAIsD,GAAG,EAAE;IACP,MAAM,IAAApD,uBAAgB,EACnB,gDAA+CoD,GAAG,CAACE,OAAQ,GAAE,EAC9D;MACEzD,IAAI,EAAE,gBAAgB;MACtB0D,KAAK,EAAEH;IACT,CACF,CAAC;EACH;EAEA,OAAO,IAAII,eAAS,CAClBvC,GAAG,EACH;IAAEpB,IAAI;IAAEC;EAAO,CAAC,EAChB2D,KAAK,CAACC,IAAI,CAACV,SAAS,CAAC,EACrBD,WACF,CAAC;AACH,CAAC;AAACvD,OAAA,CAAAsD,cAAA,GAAAA,cAAA;AAEK,MAAMa,YAAY,GAAG,MAAAA,CAC1BjC,SAA0B,EAC1BkC,MAAoB,EACpBC,OAAyB,EACzBd,WAAoB,EACpBC,SAAqB,KACE;EACvB,MAAM;IAAEnD;EAAK,CAAC,GAAG6B,SAAS;EAC1B,MAAMuB,WAAW,GAAG,CAAC,SAAS,EAAE,WAAW,CAAC;EAC5C,IAAIpD,IAAI,KAAK,QAAQ,EAAE;IACrBoD,WAAW,CAACC,IAAI,CAAC,SAAS,EAAE,SAAS,CAAC;EACxC;;EAEA;EACA,IAAI,IAAAC,kBAAW,EAACH,SAAS,EAAEC,WAAW,CAAC,EAAE;IACvC,MAAM,IAAAjD,uBAAgB,EACpB,sCAAsC,EACtC,aACF,CAAC;EACH;EAEA,IAAIwB,SAA0B;EAC9B,IAAI1B,MAA0B;EAE9B,QAAQ8D,MAAM;IACZ,KAAK,KAAK;MAAE;QACV,MAAM1C,IAAI,GAAG2C,OAAqB;QAClC5D,iBAAiB,CAACiB,IAAI,CAACyB,UAAU,GAAG,CAAC,CAAC;QACtCnB,SAAS,GAAG,IAAAsC,qBAAe,EAACD,OAAO,CAAC;QACpC;MACF;IACA,KAAK,KAAK;MAAE;QACV,MAAM3C,IAAI,GAAG2C,OAAc;QAE3B,IAAI,CAAC3C,IAAI,CAAC6C,GAAG,EAAE,MAAM,IAAA/D,uBAAgB,EAAC,iBAAiB,EAAE,WAAW,CAAC;QAErE,IAAIkB,IAAI,CAAC6C,GAAG,KAAK,KAAK,EACpB,MAAM,IAAA/D,uBAAgB,EAAC,6BAA6B,EAAE,WAAW,CAAC;QAEpE,IACEgD,SAAS,CAAClD,MAAM,GAAG,CAAC,IACpBoB,IAAI,CAAC8C,GAAG,KAAKjE,SAAS,IACtBmB,IAAI,CAAC8C,GAAG,KAAK,KAAK,EAClB;UACA,MAAM,IAAAhE,uBAAgB,EAAC,6BAA6B,EAAE,WAAW,CAAC;QACpE;QAEA,IAAAiE,qBAAc,EAAC/C,IAAI,CAACgD,OAAO,EAAElB,SAAS,CAAC;QAEvC,IACE9B,IAAI,CAACiD,GAAG,KAAKpE,SAAS,IACtBmB,IAAI,CAACiD,GAAG,KAAK,KAAK,IAClBpB,WAAW,KAAK,IAAI,EACpB;UACA,MAAM,IAAA/C,uBAAgB,EACpB,8CAA8C,EAC9C,WACF,CAAC;QACH;QAEA,MAAMyB,MAAM,GAAGJ,oCAAiB,CAACC,SAAS,CAAC8C,qBAAqB,CAAC,CAAC;QAClE3C,MAAM,CAAC4C,OAAO,CAACnD,IAAI,CAAC;QAEpB,CAAC;UAAEpB;QAAO,CAAC,GAAG2B,MAAM,CAAC6C,SAAS,CAAC,CAAC;QAChCrE,iBAAiB,CAACH,MAAM,CAAC;QAEzB,IAAIoB,IAAI,CAACqD,GAAG,KAAKxE,SAAS,EAAE;UAC1B,IAAImB,IAAI,CAACqD,GAAG,KAAK3E,gBAAgB,CAAC8B,SAAS,CAAC7B,IAAI,EAAEC,MAAM,CAAC,EACvD,MAAM,IAAAE,uBAAgB,EACpB,kDAAkD,EAClD,WACF,CAAC;QACL;QAEAwB,SAAS,GAAG,IAAIgD,qBAAe,CAAC/C,MAAM,CAAC;QACvC;MACF;IACA;MACE,MAAM,IAAAzB,uBAAgB,EACnB,wCAAuC4D,MAAO,EAAC,EAChD,mBACF,CAAC;EACL;EAEA,IAAI9D,MAAM,KAAKC,SAAS,EAAE;IACxB,CAAC;MAAED;IAAO,CAAC,GAAG0B,SAAS,CAACC,MAAM,CAAC6C,SAAS,CAAC,CAAC;IAC1CrE,iBAAiB,CAACH,MAAM,CAAC;EAC3B;EAEA,OAAO,IAAI0D,eAAS,CAAChC,SAAS,EAAE;IAAE3B,IAAI;IAAEC;EAAO,CAAC,EAAEkD,SAAS,EAAED,WAAW,CAAC;AAC3E,CAAC;AAACvD,OAAA,CAAAmE,YAAA,GAAAA,YAAA","ignoreList":[]}
|
|
@@ -1,85 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
|
|
3
|
-
Object.defineProperty(exports, "__esModule", {
|
|
4
|
-
value: true
|
|
5
|
-
});
|
|
6
|
-
exports.constants = void 0;
|
|
7
|
-
// Taken by printing node.crypto.constants
|
|
8
|
-
// Node declares them as enums on v8 directly
|
|
9
|
-
// Whenever the API gets updated (or some dependency like OpenSSL) I guess we will have to revisit these
|
|
10
|
-
const constants = exports.constants = {
|
|
11
|
-
OPENSSL_VERSION_NUMBER: 269488367,
|
|
12
|
-
SSL_OP_ALL: 2147485780,
|
|
13
|
-
SSL_OP_ALLOW_NO_DHE_KEX: 1024,
|
|
14
|
-
SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: 262144,
|
|
15
|
-
SSL_OP_CIPHER_SERVER_PREFERENCE: 4194304,
|
|
16
|
-
SSL_OP_CISCO_ANYCONNECT: 32768,
|
|
17
|
-
SSL_OP_COOKIE_EXCHANGE: 8192,
|
|
18
|
-
SSL_OP_CRYPTOPRO_TLSEXT_BUG: 2147483648,
|
|
19
|
-
SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS: 2048,
|
|
20
|
-
SSL_OP_EPHEMERAL_RSA: 0,
|
|
21
|
-
SSL_OP_LEGACY_SERVER_CONNECT: 4,
|
|
22
|
-
SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER: 0,
|
|
23
|
-
SSL_OP_MICROSOFT_SESS_ID_BUG: 0,
|
|
24
|
-
SSL_OP_MSIE_SSLV2_RSA_PADDING: 0,
|
|
25
|
-
SSL_OP_NETSCAPE_CA_DN_BUG: 0,
|
|
26
|
-
SSL_OP_NETSCAPE_CHALLENGE_BUG: 0,
|
|
27
|
-
SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG: 0,
|
|
28
|
-
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG: 0,
|
|
29
|
-
SSL_OP_NO_COMPRESSION: 131072,
|
|
30
|
-
SSL_OP_NO_ENCRYPT_THEN_MAC: 524288,
|
|
31
|
-
SSL_OP_NO_QUERY_MTU: 4096,
|
|
32
|
-
SSL_OP_NO_RENEGOTIATION: 1073741824,
|
|
33
|
-
SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: 65536,
|
|
34
|
-
SSL_OP_NO_SSLv2: 0,
|
|
35
|
-
SSL_OP_NO_SSLv3: 33554432,
|
|
36
|
-
SSL_OP_NO_TICKET: 16384,
|
|
37
|
-
SSL_OP_NO_TLSv1: 67108864,
|
|
38
|
-
SSL_OP_NO_TLSv1_1: 268435456,
|
|
39
|
-
SSL_OP_NO_TLSv1_2: 134217728,
|
|
40
|
-
SSL_OP_NO_TLSv1_3: 536870912,
|
|
41
|
-
SSL_OP_PKCS1_CHECK_1: 0,
|
|
42
|
-
SSL_OP_PKCS1_CHECK_2: 0,
|
|
43
|
-
SSL_OP_PRIORITIZE_CHACHA: 2097152,
|
|
44
|
-
SSL_OP_SINGLE_DH_USE: 0,
|
|
45
|
-
SSL_OP_SINGLE_ECDH_USE: 0,
|
|
46
|
-
SSL_OP_SSLEAY_080_CLIENT_DH_BUG: 0,
|
|
47
|
-
SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG: 0,
|
|
48
|
-
SSL_OP_TLS_BLOCK_PADDING_BUG: 0,
|
|
49
|
-
SSL_OP_TLS_D5_BUG: 0,
|
|
50
|
-
SSL_OP_TLS_ROLLBACK_BUG: 8388608,
|
|
51
|
-
ENGINE_METHOD_RSA: 1,
|
|
52
|
-
ENGINE_METHOD_DSA: 2,
|
|
53
|
-
ENGINE_METHOD_DH: 4,
|
|
54
|
-
ENGINE_METHOD_RAND: 8,
|
|
55
|
-
ENGINE_METHOD_EC: 2048,
|
|
56
|
-
ENGINE_METHOD_CIPHERS: 64,
|
|
57
|
-
ENGINE_METHOD_DIGESTS: 128,
|
|
58
|
-
ENGINE_METHOD_PKEY_METHS: 512,
|
|
59
|
-
ENGINE_METHOD_PKEY_ASN1_METHS: 1024,
|
|
60
|
-
ENGINE_METHOD_ALL: 65535,
|
|
61
|
-
ENGINE_METHOD_NONE: 0,
|
|
62
|
-
DH_CHECK_P_NOT_SAFE_PRIME: 2,
|
|
63
|
-
DH_CHECK_P_NOT_PRIME: 1,
|
|
64
|
-
DH_UNABLE_TO_CHECK_GENERATOR: 4,
|
|
65
|
-
DH_NOT_SUITABLE_GENERATOR: 8,
|
|
66
|
-
ALPN_ENABLED: 1,
|
|
67
|
-
RSA_PKCS1_PADDING: 1,
|
|
68
|
-
RSA_SSLV23_PADDING: 2,
|
|
69
|
-
RSA_NO_PADDING: 3,
|
|
70
|
-
RSA_PKCS1_OAEP_PADDING: 4,
|
|
71
|
-
RSA_X931_PADDING: 5,
|
|
72
|
-
RSA_PKCS1_PSS_PADDING: 6,
|
|
73
|
-
RSA_PSS_SALTLEN_DIGEST: -1,
|
|
74
|
-
RSA_PSS_SALTLEN_MAX_SIGN: -2,
|
|
75
|
-
RSA_PSS_SALTLEN_AUTO: -2,
|
|
76
|
-
defaultCoreCipherList: 'TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA256:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!SRP:!CAMELLIA',
|
|
77
|
-
TLS1_VERSION: 769,
|
|
78
|
-
TLS1_1_VERSION: 770,
|
|
79
|
-
TLS1_2_VERSION: 771,
|
|
80
|
-
TLS1_3_VERSION: 772,
|
|
81
|
-
POINT_CONVERSION_COMPRESSED: 2,
|
|
82
|
-
POINT_CONVERSION_UNCOMPRESSED: 4,
|
|
83
|
-
POINT_CONVERSION_HYBRID: 6
|
|
84
|
-
};
|
|
85
|
-
//# sourceMappingURL=constants.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"names":["constants","exports","OPENSSL_VERSION_NUMBER","SSL_OP_ALL","SSL_OP_ALLOW_NO_DHE_KEX","SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION","SSL_OP_CIPHER_SERVER_PREFERENCE","SSL_OP_CISCO_ANYCONNECT","SSL_OP_COOKIE_EXCHANGE","SSL_OP_CRYPTOPRO_TLSEXT_BUG","SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS","SSL_OP_EPHEMERAL_RSA","SSL_OP_LEGACY_SERVER_CONNECT","SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER","SSL_OP_MICROSOFT_SESS_ID_BUG","SSL_OP_MSIE_SSLV2_RSA_PADDING","SSL_OP_NETSCAPE_CA_DN_BUG","SSL_OP_NETSCAPE_CHALLENGE_BUG","SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG","SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG","SSL_OP_NO_COMPRESSION","SSL_OP_NO_ENCRYPT_THEN_MAC","SSL_OP_NO_QUERY_MTU","SSL_OP_NO_RENEGOTIATION","SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION","SSL_OP_NO_SSLv2","SSL_OP_NO_SSLv3","SSL_OP_NO_TICKET","SSL_OP_NO_TLSv1","SSL_OP_NO_TLSv1_1","SSL_OP_NO_TLSv1_2","SSL_OP_NO_TLSv1_3","SSL_OP_PKCS1_CHECK_1","SSL_OP_PKCS1_CHECK_2","SSL_OP_PRIORITIZE_CHACHA","SSL_OP_SINGLE_DH_USE","SSL_OP_SINGLE_ECDH_USE","SSL_OP_SSLEAY_080_CLIENT_DH_BUG","SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG","SSL_OP_TLS_BLOCK_PADDING_BUG","SSL_OP_TLS_D5_BUG","SSL_OP_TLS_ROLLBACK_BUG","ENGINE_METHOD_RSA","ENGINE_METHOD_DSA","ENGINE_METHOD_DH","ENGINE_METHOD_RAND","ENGINE_METHOD_EC","ENGINE_METHOD_CIPHERS","ENGINE_METHOD_DIGESTS","ENGINE_METHOD_PKEY_METHS","ENGINE_METHOD_PKEY_ASN1_METHS","ENGINE_METHOD_ALL","ENGINE_METHOD_NONE","DH_CHECK_P_NOT_SAFE_PRIME","DH_CHECK_P_NOT_PRIME","DH_UNABLE_TO_CHECK_GENERATOR","DH_NOT_SUITABLE_GENERATOR","ALPN_ENABLED","RSA_PKCS1_PADDING","RSA_SSLV23_PADDING","RSA_NO_PADDING","RSA_PKCS1_OAEP_PADDING","RSA_X931_PADDING","RSA_PKCS1_PSS_PADDING","RSA_PSS_SALTLEN_DIGEST","RSA_PSS_SALTLEN_MAX_SIGN","RSA_PSS_SALTLEN_AUTO","defaultCoreCipherList","TLS1_VERSION","TLS1_1_VERSION","TLS1_2_VERSION","TLS1_3_VERSION","POINT_CONVERSION_COMPRESSED","POINT_CONVERSION_UNCOMPRESSED","POINT_CONVERSION_HYBRID"],"sourceRoot":"../../src","sources":["constants.ts"],"mappings":";;;;;;AAAA;AACA;AACA;AACO,MAAMA,SAAS,GAAAC,OAAA,CAAAD,SAAA,GAAG;EACvBE,sBAAsB,EAAE,SAAS;EACjCC,UAAU,EAAE,UAAU;EACtBC,uBAAuB,EAAE,IAAI;EAC7BC,wCAAwC,EAAE,MAAM;EAChDC,+BAA+B,EAAE,OAAO;EACxCC,uBAAuB,EAAE,KAAK;EAC9BC,sBAAsB,EAAE,IAAI;EAC5BC,2BAA2B,EAAE,UAAU;EACvCC,kCAAkC,EAAE,IAAI;EACxCC,oBAAoB,EAAE,CAAC;EACvBC,4BAA4B,EAAE,CAAC;EAC/BC,iCAAiC,EAAE,CAAC;EACpCC,4BAA4B,EAAE,CAAC;EAC/BC,6BAA6B,EAAE,CAAC;EAChCC,yBAAyB,EAAE,CAAC;EAC5BC,6BAA6B,EAAE,CAAC;EAChCC,sCAAsC,EAAE,CAAC;EACzCC,uCAAuC,EAAE,CAAC;EAC1CC,qBAAqB,EAAE,MAAM;EAC7BC,0BAA0B,EAAE,MAAM;EAClCC,mBAAmB,EAAE,IAAI;EACzBC,uBAAuB,EAAE,UAAU;EACnCC,6CAA6C,EAAE,KAAK;EACpDC,eAAe,EAAE,CAAC;EAClBC,eAAe,EAAE,QAAQ;EACzBC,gBAAgB,EAAE,KAAK;EACvBC,eAAe,EAAE,QAAQ;EACzBC,iBAAiB,EAAE,SAAS;EAC5BC,iBAAiB,EAAE,SAAS;EAC5BC,iBAAiB,EAAE,SAAS;EAC5BC,oBAAoB,EAAE,CAAC;EACvBC,oBAAoB,EAAE,CAAC;EACvBC,wBAAwB,EAAE,OAAO;EACjCC,oBAAoB,EAAE,CAAC;EACvBC,sBAAsB,EAAE,CAAC;EACzBC,+BAA+B,EAAE,CAAC;EAClCC,kCAAkC,EAAE,CAAC;EACrCC,4BAA4B,EAAE,CAAC;EAC/BC,iBAAiB,EAAE,CAAC;EACpBC,uBAAuB,EAAE,OAAO;EAChCC,iBAAiB,EAAE,CAAC;EACpBC,iBAAiB,EAAE,CAAC;EACpBC,gBAAgB,EAAE,CAAC;EACnBC,kBAAkB,EAAE,CAAC;EACrBC,gBAAgB,EAAE,IAAI;EACtBC,qBAAqB,EAAE,EAAE;EACzBC,qBAAqB,EAAE,GAAG;EAC1BC,wBAAwB,EAAE,GAAG;EAC7BC,6BAA6B,EAAE,IAAI;EACnCC,iBAAiB,EAAE,KAAK;EACxBC,kBAAkB,EAAE,CAAC;EACrBC,yBAAyB,EAAE,CAAC;EAC5BC,oBAAoB,EAAE,CAAC;EACvBC,4BAA4B,EAAE,CAAC;EAC/BC,yBAAyB,EAAE,CAAC;EAC5BC,YAAY,EAAE,CAAC;EACfC,iBAAiB,EAAE,CAAC;EACpBC,kBAAkB,EAAE,CAAC;EACrBC,cAAc,EAAE,CAAC;EACjBC,sBAAsB,EAAE,CAAC;EACzBC,gBAAgB,EAAE,CAAC;EACnBC,qBAAqB,EAAE,CAAC;EACxBC,sBAAsB,EAAE,CAAC,CAAC;EAC1BC,wBAAwB,EAAE,CAAC,CAAC;EAC5BC,oBAAoB,EAAE,CAAC,CAAC;EACxBC,qBAAqB,EACnB,kaAAka;EACpaC,YAAY,EAAE,GAAG;EACjBC,cAAc,EAAE,GAAG;EACnBC,cAAc,EAAE,GAAG;EACnBC,cAAc,EAAE,GAAG;EACnBC,2BAA2B,EAAE,CAAC;EAC9BC,6BAA6B,EAAE,CAAC;EAChCC,uBAAuB,EAAE;AAC3B,CAAC","ignoreList":[]}
|
package/lib/commonjs/ec.js
DELETED
|
@@ -1,276 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
|
|
3
|
-
Object.defineProperty(exports, "__esModule", {
|
|
4
|
-
value: true
|
|
5
|
-
});
|
|
6
|
-
exports.ecExportKey = ecExportKey;
|
|
7
|
-
exports.ecGenerateKey = void 0;
|
|
8
|
-
exports.ecImportKey = ecImportKey;
|
|
9
|
-
exports.ecdsaSignVerify = void 0;
|
|
10
|
-
var _Cipher = require("./Cipher");
|
|
11
|
-
var _NativeQuickCrypto = require("./NativeQuickCrypto/NativeQuickCrypto");
|
|
12
|
-
var _sig = require("./NativeQuickCrypto/sig");
|
|
13
|
-
var _Utils = require("./Utils");
|
|
14
|
-
var _keys = require("./keys");
|
|
15
|
-
// const {
|
|
16
|
-
// ArrayPrototypeIncludes,
|
|
17
|
-
// ObjectKeys,
|
|
18
|
-
// SafeSet,
|
|
19
|
-
// } = primordials;
|
|
20
|
-
|
|
21
|
-
// const {
|
|
22
|
-
// ECKeyExportJob,
|
|
23
|
-
// KeyObjectHandle,
|
|
24
|
-
// SignJob,
|
|
25
|
-
// kCryptoJobAsync,
|
|
26
|
-
// kKeyTypePrivate,
|
|
27
|
-
// kSignJobModeSign,
|
|
28
|
-
// kSignJobModeVerify,
|
|
29
|
-
// kSigEncP1363,
|
|
30
|
-
// } = internalBinding('crypto');
|
|
31
|
-
|
|
32
|
-
// const {
|
|
33
|
-
// getUsagesUnion,
|
|
34
|
-
// hasAnyNotIn,
|
|
35
|
-
// jobPromise,
|
|
36
|
-
// normalizeHashName,
|
|
37
|
-
// validateKeyOps,
|
|
38
|
-
// kHandle,
|
|
39
|
-
// kKeyObject,
|
|
40
|
-
// kNamedCurveAliases,
|
|
41
|
-
// } = require('internal/crypto/util');
|
|
42
|
-
|
|
43
|
-
// const {
|
|
44
|
-
// lazyDOMException,
|
|
45
|
-
// promisify,
|
|
46
|
-
// } = require('internal/util');
|
|
47
|
-
|
|
48
|
-
// const {
|
|
49
|
-
// generateKeyPair: _generateKeyPair,
|
|
50
|
-
// } = require('internal/crypto/keygen');
|
|
51
|
-
|
|
52
|
-
// const {
|
|
53
|
-
// InternalCryptoKey,
|
|
54
|
-
// PrivateKeyObject,
|
|
55
|
-
// PublicKeyObject,
|
|
56
|
-
// createPrivateKey,
|
|
57
|
-
// createPublicKey,
|
|
58
|
-
// } = require('internal/crypto/keys');
|
|
59
|
-
|
|
60
|
-
// const generateKeyPair = promisify(_generateKeyPair);
|
|
61
|
-
|
|
62
|
-
function verifyAcceptableEcKeyUse(name, isPublic, usages) {
|
|
63
|
-
let checkSet;
|
|
64
|
-
switch (name) {
|
|
65
|
-
case 'ECDH':
|
|
66
|
-
checkSet = isPublic ? [] : ['deriveKey', 'deriveBits'];
|
|
67
|
-
break;
|
|
68
|
-
case 'ECDSA':
|
|
69
|
-
checkSet = isPublic ? ['verify'] : ['sign'];
|
|
70
|
-
break;
|
|
71
|
-
default:
|
|
72
|
-
throw (0, _Utils.lazyDOMException)('The algorithm is not supported', 'NotSupportedError');
|
|
73
|
-
}
|
|
74
|
-
if ((0, _Utils.hasAnyNotIn)(usages, checkSet)) {
|
|
75
|
-
throw (0, _Utils.lazyDOMException)(`Unsupported key usage for a ${name} key`, 'SyntaxError');
|
|
76
|
-
}
|
|
77
|
-
}
|
|
78
|
-
function createECPublicKeyRaw(namedCurve, keyData) {
|
|
79
|
-
if (!namedCurve) {
|
|
80
|
-
throw new Error('Invalid namedCurve');
|
|
81
|
-
}
|
|
82
|
-
const handle = _NativeQuickCrypto.NativeQuickCrypto.webcrypto.createKeyObjectHandle();
|
|
83
|
-
if (!handle.initECRaw(_keys.kNamedCurveAliases[namedCurve], keyData)) {
|
|
84
|
-
console.log('keyData', (0, _Utils.ab2str)(keyData));
|
|
85
|
-
throw new Error('Invalid keyData 1');
|
|
86
|
-
}
|
|
87
|
-
return new _keys.PublicKeyObject(handle);
|
|
88
|
-
}
|
|
89
|
-
function ecExportKey(key, format) {
|
|
90
|
-
return _NativeQuickCrypto.NativeQuickCrypto.webcrypto.ecExportKey(format, key.keyObject.handle);
|
|
91
|
-
}
|
|
92
|
-
function ecImportKey(format, keyData, algorithm, extractable, keyUsages) {
|
|
93
|
-
const {
|
|
94
|
-
name,
|
|
95
|
-
namedCurve
|
|
96
|
-
} = algorithm;
|
|
97
|
-
|
|
98
|
-
// if (!ArrayPrototypeIncludes(ObjectKeys(kNamedCurveAliases), namedCurve)) {
|
|
99
|
-
// throw lazyDOMException('Unrecognized namedCurve', 'NotSupportedError');
|
|
100
|
-
// }
|
|
101
|
-
|
|
102
|
-
let keyObject;
|
|
103
|
-
// const usagesSet = new SafeSet(keyUsages);
|
|
104
|
-
switch (format) {
|
|
105
|
-
// case 'spki': {
|
|
106
|
-
// // verifyAcceptableEcKeyUse(name, true, usagesSet);
|
|
107
|
-
// try {
|
|
108
|
-
// keyObject = createPublicKey({
|
|
109
|
-
// key: keyData,
|
|
110
|
-
// format: 'der',
|
|
111
|
-
// type: 'spki',
|
|
112
|
-
// });
|
|
113
|
-
// } catch (err) {
|
|
114
|
-
// throw new Error(`Invalid keyData 2: ${err}`);
|
|
115
|
-
// }
|
|
116
|
-
// break;
|
|
117
|
-
// }
|
|
118
|
-
// case 'pkcs8': {
|
|
119
|
-
// // verifyAcceptableEcKeyUse(name, false, usagesSet);
|
|
120
|
-
// try {
|
|
121
|
-
// keyObject = createPrivateKey({
|
|
122
|
-
// key: keyData,
|
|
123
|
-
// format: 'der',
|
|
124
|
-
// type: 'pkcs8',
|
|
125
|
-
// });
|
|
126
|
-
// } catch (err) {
|
|
127
|
-
// throw new Error(`Invalid keyData 3 ${err}`);
|
|
128
|
-
// }
|
|
129
|
-
// break;
|
|
130
|
-
// }
|
|
131
|
-
case 'jwk':
|
|
132
|
-
{
|
|
133
|
-
const data = keyData;
|
|
134
|
-
if (!data.kty) throw (0, _Utils.lazyDOMException)('Invalid keyData 4', 'DataError');
|
|
135
|
-
if (data.kty !== 'EC') throw (0, _Utils.lazyDOMException)('Invalid JWK "kty" Parameter', 'DataError');
|
|
136
|
-
if (data.crv !== namedCurve) throw (0, _Utils.lazyDOMException)('JWK "crv" does not match the requested algorithm', 'DataError');
|
|
137
|
-
verifyAcceptableEcKeyUse(name, data.d === undefined, keyUsages);
|
|
138
|
-
if (keyUsages.length > 0 && data.use !== undefined) {
|
|
139
|
-
const checkUse = name === 'ECDH' ? 'enc' : 'sig';
|
|
140
|
-
if (data.use !== checkUse) throw (0, _Utils.lazyDOMException)('Invalid JWK "use" Parameter', 'DataError');
|
|
141
|
-
}
|
|
142
|
-
(0, _Utils.validateKeyOps)(data.key_ops, keyUsages);
|
|
143
|
-
if (data.ext !== undefined && data.ext === false && extractable === true) {
|
|
144
|
-
throw (0, _Utils.lazyDOMException)('JWK "ext" Parameter and extractable mismatch', 'DataError');
|
|
145
|
-
}
|
|
146
|
-
if (algorithm.name === 'ECDSA' && data.alg !== undefined) {
|
|
147
|
-
let algNamedCurve;
|
|
148
|
-
switch (data.alg) {
|
|
149
|
-
case 'ES256':
|
|
150
|
-
algNamedCurve = 'P-256';
|
|
151
|
-
break;
|
|
152
|
-
case 'ES384':
|
|
153
|
-
algNamedCurve = 'P-384';
|
|
154
|
-
break;
|
|
155
|
-
case 'ES512':
|
|
156
|
-
algNamedCurve = 'P-521';
|
|
157
|
-
break;
|
|
158
|
-
}
|
|
159
|
-
if (algNamedCurve !== namedCurve) throw (0, _Utils.lazyDOMException)('JWK "alg" does not match the requested algorithm', 'DataError');
|
|
160
|
-
}
|
|
161
|
-
const handle = _NativeQuickCrypto.NativeQuickCrypto.webcrypto.createKeyObjectHandle();
|
|
162
|
-
const type = handle.initJwk(data, namedCurve);
|
|
163
|
-
if (type === undefined) throw (0, _Utils.lazyDOMException)('Invalid JWK', 'DataError');
|
|
164
|
-
keyObject = type === _keys.KeyType.Private ? new _keys.PrivateKeyObject(handle) : new _keys.PublicKeyObject(handle);
|
|
165
|
-
break;
|
|
166
|
-
}
|
|
167
|
-
case 'raw':
|
|
168
|
-
{
|
|
169
|
-
const data = keyData;
|
|
170
|
-
verifyAcceptableEcKeyUse(name, true, keyUsages);
|
|
171
|
-
let buffer = typeof data === 'string' ? (0, _Utils.binaryLikeToArrayBuffer)(data) : (0, _Utils.bufferLikeToArrayBuffer)(data);
|
|
172
|
-
keyObject = createECPublicKeyRaw(namedCurve, buffer);
|
|
173
|
-
break;
|
|
174
|
-
}
|
|
175
|
-
default:
|
|
176
|
-
{
|
|
177
|
-
throw new Error(`Unknown EC import format: ${format}`);
|
|
178
|
-
}
|
|
179
|
-
}
|
|
180
|
-
switch (algorithm.name) {
|
|
181
|
-
case 'ECDSA':
|
|
182
|
-
// Fall through
|
|
183
|
-
case 'ECDH':
|
|
184
|
-
if (keyObject.asymmetricKeyType !== 'ec') throw new Error('Invalid key type');
|
|
185
|
-
break;
|
|
186
|
-
}
|
|
187
|
-
|
|
188
|
-
// if (!keyObject[kHandle].checkEcKeyData()) {
|
|
189
|
-
// throw new Error('Invalid keyData 5');
|
|
190
|
-
// }
|
|
191
|
-
|
|
192
|
-
// const { namedCurve: checkNamedCurve } = keyObject[kHandle].keyDetail({});
|
|
193
|
-
// if (kNamedCurveAliases[namedCurve] !== checkNamedCurve)
|
|
194
|
-
// throw new Error('Named curve mismatch');
|
|
195
|
-
|
|
196
|
-
return new _keys.CryptoKey(keyObject, {
|
|
197
|
-
name,
|
|
198
|
-
namedCurve
|
|
199
|
-
}, keyUsages, extractable);
|
|
200
|
-
}
|
|
201
|
-
const ecdsaSignVerify = (key, data, {
|
|
202
|
-
hash
|
|
203
|
-
}, signature) => {
|
|
204
|
-
const mode = signature === undefined ? _sig.SignMode.kSignJobModeSign : _sig.SignMode.kSignJobModeVerify;
|
|
205
|
-
const type = mode === _sig.SignMode.kSignJobModeSign ? 'private' : 'public';
|
|
206
|
-
if (key.type !== type) throw (0, _Utils.lazyDOMException)(`Key must be a ${type} key`, 'InvalidAccessError');
|
|
207
|
-
const hashname = (0, _Utils.normalizeHashName)(hash);
|
|
208
|
-
return _NativeQuickCrypto.NativeQuickCrypto.webcrypto.signVerify(mode, key.keyObject.handle,
|
|
209
|
-
// three undefined args because C++ uses `GetPublicOrPrivateKeyFromJs` & friends
|
|
210
|
-
undefined, undefined, undefined, (0, _Utils.bufferLikeToArrayBuffer)(data), hashname, undefined,
|
|
211
|
-
// salt length, not used with ECDSA
|
|
212
|
-
undefined,
|
|
213
|
-
// pss padding, not used with ECDSA
|
|
214
|
-
_sig.DSASigEnc.kSigEncP1363, (0, _Utils.bufferLikeToArrayBuffer)(signature || new ArrayBuffer(0)));
|
|
215
|
-
};
|
|
216
|
-
exports.ecdsaSignVerify = ecdsaSignVerify;
|
|
217
|
-
const ecGenerateKey = async (algorithm, extractable, keyUsages) => {
|
|
218
|
-
const {
|
|
219
|
-
name,
|
|
220
|
-
namedCurve
|
|
221
|
-
} = algorithm;
|
|
222
|
-
if (!Object.keys(_keys.kNamedCurveAliases).includes(namedCurve || '')) {
|
|
223
|
-
throw (0, _Utils.lazyDOMException)(`Unrecognized namedCurve '${namedCurve}'`, 'NotSupportedError');
|
|
224
|
-
}
|
|
225
|
-
|
|
226
|
-
// const usageSet = new SafeSet(keyUsages);
|
|
227
|
-
switch (name) {
|
|
228
|
-
case 'ECDSA':
|
|
229
|
-
const checkUsages = ['sign', 'verify'];
|
|
230
|
-
if ((0, _Utils.hasAnyNotIn)(keyUsages, checkUsages)) {
|
|
231
|
-
throw (0, _Utils.lazyDOMException)('Unsupported key usage for an ECDSA key', 'SyntaxError');
|
|
232
|
-
}
|
|
233
|
-
break;
|
|
234
|
-
case 'ECDH':
|
|
235
|
-
if ((0, _Utils.hasAnyNotIn)(keyUsages, ['deriveKey', 'deriveBits'])) {
|
|
236
|
-
throw (0, _Utils.lazyDOMException)('Unsupported key usage for an ECDH key', 'SyntaxError');
|
|
237
|
-
}
|
|
238
|
-
// Fall through
|
|
239
|
-
}
|
|
240
|
-
const options = {
|
|
241
|
-
namedCurve
|
|
242
|
-
};
|
|
243
|
-
const [err, keypair] = await (0, _Cipher.generateKeyPairPromise)('ec', options);
|
|
244
|
-
if (err) {
|
|
245
|
-
throw (0, _Utils.lazyDOMException)('ecGenerateKey (generateKeyPairPromise) failed', {
|
|
246
|
-
name: 'OperationError',
|
|
247
|
-
cause: err
|
|
248
|
-
});
|
|
249
|
-
}
|
|
250
|
-
let publicUsages = [];
|
|
251
|
-
let privateUsages = [];
|
|
252
|
-
switch (name) {
|
|
253
|
-
case 'ECDSA':
|
|
254
|
-
publicUsages = (0, _Utils.getUsagesUnion)(keyUsages, 'verify');
|
|
255
|
-
privateUsages = (0, _Utils.getUsagesUnion)(keyUsages, 'sign');
|
|
256
|
-
break;
|
|
257
|
-
case 'ECDH':
|
|
258
|
-
publicUsages = [];
|
|
259
|
-
privateUsages = (0, _Utils.getUsagesUnion)(keyUsages, 'deriveKey', 'deriveBits');
|
|
260
|
-
break;
|
|
261
|
-
}
|
|
262
|
-
const keyAlgorithm = {
|
|
263
|
-
name,
|
|
264
|
-
namedCurve
|
|
265
|
-
};
|
|
266
|
-
const pub = new _keys.PublicKeyObject(keypair?.publicKey);
|
|
267
|
-
const publicKey = new _keys.CryptoKey(pub, keyAlgorithm, publicUsages, true);
|
|
268
|
-
const priv = new _keys.PrivateKeyObject(keypair?.privateKey);
|
|
269
|
-
const privateKey = new _keys.CryptoKey(priv, keyAlgorithm, privateUsages, extractable);
|
|
270
|
-
return {
|
|
271
|
-
publicKey,
|
|
272
|
-
privateKey
|
|
273
|
-
};
|
|
274
|
-
};
|
|
275
|
-
exports.ecGenerateKey = ecGenerateKey;
|
|
276
|
-
//# sourceMappingURL=ec.js.map
|