react-native-quick-crypto 0.7.3 → 1.0.0-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/QuickCrypto.podspec +34 -0
- package/README.md +13 -46
- package/android/CMakeLists.txt +32 -64
- package/android/build.gradle +52 -125
- package/android/gradle.properties +4 -4
- package/android/src/main/cpp/cpp-adapter.cpp +9 -54
- package/android/src/main/java/com/margelo/nitro/quickcrypto/QuickCryptoPackage.java +38 -0
- package/cpp/random/HybridRandom.cpp +34 -0
- package/cpp/random/HybridRandom.hpp +44 -0
- package/cpp/utils/Utils.hpp +9 -0
- package/ios/QuickCryptoOnLoad.mm +19 -0
- package/lib/commonjs/index.js +39 -39
- package/lib/commonjs/index.js.map +1 -1
- package/lib/commonjs/random.js +26 -12
- package/lib/commonjs/random.js.map +1 -1
- package/lib/commonjs/{NativeQuickCrypto/rsa.js → specs/random.nitro.js} +1 -1
- package/lib/commonjs/{NativeQuickCrypto/aes.js.map → specs/random.nitro.js.map} +1 -1
- package/lib/commonjs/utils/conversion.js +22 -0
- package/lib/commonjs/utils/conversion.js.map +1 -0
- package/lib/commonjs/utils/index.js +12 -0
- package/lib/commonjs/utils/index.js.map +1 -0
- package/lib/commonjs/utils/types.js +2 -0
- package/lib/{module/NativeQuickCrypto/aes.js.map → commonjs/utils/types.js.map} +1 -1
- package/lib/module/index.js +38 -38
- package/lib/module/index.js.map +1 -1
- package/lib/module/random.js +26 -12
- package/lib/module/random.js.map +1 -1
- package/lib/module/specs/random.nitro.js +4 -0
- package/lib/module/{NativeQuickCrypto/rsa.js.map → specs/random.nitro.js.map} +1 -1
- package/lib/module/utils/conversion.js +16 -0
- package/lib/module/utils/conversion.js.map +1 -0
- package/lib/module/utils/index.js +8 -0
- package/lib/module/utils/index.js.map +1 -0
- package/lib/module/utils/types.js +2 -0
- package/lib/{commonjs/NativeQuickCrypto/rsa.js.map → module/utils/types.js.map} +1 -1
- package/lib/tsconfig.tsbuildinfo +1 -0
- package/lib/typescript/index.d.ts +10 -141
- package/lib/typescript/index.d.ts.map +1 -1
- package/lib/typescript/random.d.ts +4 -5
- package/lib/typescript/random.d.ts.map +1 -1
- package/lib/typescript/specs/random.nitro.d.ts +9 -0
- package/lib/typescript/specs/random.nitro.d.ts.map +1 -0
- package/lib/typescript/utils/conversion.d.ts +4 -0
- package/lib/typescript/utils/conversion.d.ts.map +1 -0
- package/lib/typescript/utils/index.d.ts +6 -0
- package/lib/typescript/utils/index.d.ts.map +1 -0
- package/lib/typescript/utils/types.d.ts +5 -0
- package/lib/typescript/utils/types.d.ts.map +1 -0
- package/nitrogen/generated/android/QuickCrypto+autolinking.cmake +45 -0
- package/nitrogen/generated/android/QuickCrypto+autolinking.gradle +26 -0
- package/nitrogen/generated/ios/QuickCrypto+autolinking.rb +57 -0
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Bridge.cpp +9 -0
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Bridge.hpp +25 -0
- package/nitrogen/generated/ios/QuickCrypto-Swift-Cxx-Umbrella.hpp +29 -0
- package/nitrogen/generated/shared/c++/HybridRandomSpec.cpp +23 -0
- package/nitrogen/generated/shared/c++/HybridRandomSpec.hpp +62 -0
- package/package.json +50 -106
- package/src/index.ts +38 -48
- package/src/random.ts +51 -48
- package/src/specs/random.nitro.ts +14 -0
- package/src/utils/conversion.ts +16 -0
- package/src/utils/index.ts +6 -0
- package/src/utils/types.ts +15 -0
- package/LICENSE +0 -27
- package/android/src/main/java/com/margelo/quickcrypto/QuickCryptoModule.java +0 -70
- package/android/src/main/java/com/margelo/quickcrypto/QuickCryptoPackage.java +0 -25
- package/cpp/Cipher/MGLCipherHostObject.cpp +0 -663
- package/cpp/Cipher/MGLCipherHostObject.h +0 -90
- package/cpp/Cipher/MGLCreateCipherInstaller.cpp +0 -75
- package/cpp/Cipher/MGLCreateCipherInstaller.h +0 -22
- package/cpp/Cipher/MGLCreateDecipherInstaller.cpp +0 -77
- package/cpp/Cipher/MGLCreateDecipherInstaller.h +0 -17
- package/cpp/Cipher/MGLGenerateKeyPairInstaller.cpp +0 -134
- package/cpp/Cipher/MGLGenerateKeyPairInstaller.h +0 -35
- package/cpp/Cipher/MGLGenerateKeyPairSyncInstaller.cpp +0 -63
- package/cpp/Cipher/MGLGenerateKeyPairSyncInstaller.h +0 -37
- package/cpp/Cipher/MGLPublicCipher.h +0 -124
- package/cpp/Cipher/MGLPublicCipherInstaller.h +0 -107
- package/cpp/Cipher/MGLRsa.cpp +0 -573
- package/cpp/Cipher/MGLRsa.h +0 -109
- package/cpp/HMAC/MGLHmacHostObject.cpp +0 -95
- package/cpp/HMAC/MGLHmacHostObject.h +0 -39
- package/cpp/HMAC/MGLHmacInstaller.cpp +0 -43
- package/cpp/HMAC/MGLHmacInstaller.h +0 -20
- package/cpp/Hash/MGLHashHostObject.cpp +0 -147
- package/cpp/Hash/MGLHashHostObject.h +0 -53
- package/cpp/Hash/MGLHashInstaller.cpp +0 -44
- package/cpp/Hash/MGLHashInstaller.h +0 -20
- package/cpp/JSIUtils/MGLJSIMacros.h +0 -110
- package/cpp/JSIUtils/MGLJSIUtils.h +0 -41
- package/cpp/JSIUtils/MGLSmartHostObject.cpp +0 -43
- package/cpp/JSIUtils/MGLSmartHostObject.h +0 -46
- package/cpp/JSIUtils/MGLThreadAwareHostObject.cpp +0 -24
- package/cpp/JSIUtils/MGLThreadAwareHostObject.h +0 -43
- package/cpp/JSIUtils/MGLTypedArray.cpp +0 -325
- package/cpp/JSIUtils/MGLTypedArray.h +0 -160
- package/cpp/MGLKeys.cpp +0 -1426
- package/cpp/MGLKeys.h +0 -203
- package/cpp/MGLQuickCryptoHostObject.cpp +0 -127
- package/cpp/MGLQuickCryptoHostObject.h +0 -30
- package/cpp/Random/MGLRandomHostObject.cpp +0 -96
- package/cpp/Random/MGLRandomHostObject.h +0 -27
- package/cpp/Sig/MGLSignHostObjects.cpp +0 -757
- package/cpp/Sig/MGLSignHostObjects.h +0 -128
- package/cpp/Sig/MGLSignInstaller.cpp +0 -24
- package/cpp/Sig/MGLSignInstaller.h +0 -29
- package/cpp/Sig/MGLVerifyInstaller.cpp +0 -24
- package/cpp/Sig/MGLVerifyInstaller.h +0 -22
- package/cpp/Utils/MGLDispatchQueue.cpp +0 -75
- package/cpp/Utils/MGLDispatchQueue.h +0 -55
- package/cpp/Utils/MGLUtils.cpp +0 -295
- package/cpp/Utils/MGLUtils.h +0 -358
- package/cpp/Utils/base64.h +0 -320
- package/cpp/Utils/logs.h +0 -38
- package/cpp/Utils/node.h +0 -13
- package/cpp/fastpbkdf2/MGLPbkdf2HostObject.cpp +0 -164
- package/cpp/fastpbkdf2/MGLPbkdf2HostObject.h +0 -29
- package/cpp/fastpbkdf2/fastpbkdf2.c +0 -352
- package/cpp/fastpbkdf2/fastpbkdf2.h +0 -68
- package/cpp/webcrypto/MGLWebCrypto.cpp +0 -125
- package/cpp/webcrypto/MGLWebCrypto.h +0 -32
- package/cpp/webcrypto/crypto_aes.cpp +0 -516
- package/cpp/webcrypto/crypto_aes.h +0 -79
- package/cpp/webcrypto/crypto_ec.cpp +0 -424
- package/cpp/webcrypto/crypto_ec.h +0 -78
- package/cpp/webcrypto/crypto_keygen.cpp +0 -86
- package/cpp/webcrypto/crypto_keygen.h +0 -38
- package/ios/QuickCrypto.xcodeproj/project.pbxproj +0 -274
- package/ios/QuickCryptoModule.h +0 -5
- package/ios/QuickCryptoModule.mm +0 -42
- package/lib/commonjs/Cipher.js +0 -502
- package/lib/commonjs/Cipher.js.map +0 -1
- package/lib/commonjs/Hash.js +0 -99
- package/lib/commonjs/Hash.js.map +0 -1
- package/lib/commonjs/Hashnames.js +0 -87
- package/lib/commonjs/Hashnames.js.map +0 -1
- package/lib/commonjs/Hmac.js +0 -79
- package/lib/commonjs/Hmac.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/Cipher.js +0 -30
- package/lib/commonjs/NativeQuickCrypto/Cipher.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/NativeQuickCrypto.js +0 -52
- package/lib/commonjs/NativeQuickCrypto/NativeQuickCrypto.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/aes.js +0 -6
- package/lib/commonjs/NativeQuickCrypto/hash.js +0 -2
- package/lib/commonjs/NativeQuickCrypto/hash.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/hmac.js +0 -2
- package/lib/commonjs/NativeQuickCrypto/hmac.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/keygen.js +0 -6
- package/lib/commonjs/NativeQuickCrypto/keygen.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/pbkdf2.js +0 -2
- package/lib/commonjs/NativeQuickCrypto/pbkdf2.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/random.js +0 -2
- package/lib/commonjs/NativeQuickCrypto/random.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/sig.js +0 -19
- package/lib/commonjs/NativeQuickCrypto/sig.js.map +0 -1
- package/lib/commonjs/NativeQuickCrypto/webcrypto.js +0 -6
- package/lib/commonjs/NativeQuickCrypto/webcrypto.js.map +0 -1
- package/lib/commonjs/Utils.js +0 -608
- package/lib/commonjs/Utils.js.map +0 -1
- package/lib/commonjs/aes.js +0 -281
- package/lib/commonjs/aes.js.map +0 -1
- package/lib/commonjs/constants.js +0 -85
- package/lib/commonjs/constants.js.map +0 -1
- package/lib/commonjs/ec.js +0 -276
- package/lib/commonjs/ec.js.map +0 -1
- package/lib/commonjs/keygen.js +0 -56
- package/lib/commonjs/keygen.js.map +0 -1
- package/lib/commonjs/keys.js +0 -492
- package/lib/commonjs/keys.js.map +0 -1
- package/lib/commonjs/pbkdf2.js +0 -90
- package/lib/commonjs/pbkdf2.js.map +0 -1
- package/lib/commonjs/rsa.js +0 -248
- package/lib/commonjs/rsa.js.map +0 -1
- package/lib/commonjs/sig.js +0 -129
- package/lib/commonjs/sig.js.map +0 -1
- package/lib/commonjs/subtle.js +0 -448
- package/lib/commonjs/subtle.js.map +0 -1
- package/lib/commonjs/webcrypto.js +0 -14
- package/lib/commonjs/webcrypto.js.map +0 -1
- package/lib/module/Cipher.js +0 -491
- package/lib/module/Cipher.js.map +0 -1
- package/lib/module/Hash.js +0 -93
- package/lib/module/Hash.js.map +0 -1
- package/lib/module/Hashnames.js +0 -85
- package/lib/module/Hashnames.js.map +0 -1
- package/lib/module/Hmac.js +0 -74
- package/lib/module/Hmac.js.map +0 -1
- package/lib/module/NativeQuickCrypto/Cipher.js +0 -26
- package/lib/module/NativeQuickCrypto/Cipher.js.map +0 -1
- package/lib/module/NativeQuickCrypto/NativeQuickCrypto.js +0 -49
- package/lib/module/NativeQuickCrypto/NativeQuickCrypto.js.map +0 -1
- package/lib/module/NativeQuickCrypto/aes.js +0 -4
- package/lib/module/NativeQuickCrypto/hash.js +0 -2
- package/lib/module/NativeQuickCrypto/hash.js.map +0 -1
- package/lib/module/NativeQuickCrypto/hmac.js +0 -2
- package/lib/module/NativeQuickCrypto/hmac.js.map +0 -1
- package/lib/module/NativeQuickCrypto/keygen.js +0 -4
- package/lib/module/NativeQuickCrypto/keygen.js.map +0 -1
- package/lib/module/NativeQuickCrypto/pbkdf2.js +0 -2
- package/lib/module/NativeQuickCrypto/pbkdf2.js.map +0 -1
- package/lib/module/NativeQuickCrypto/random.js +0 -2
- package/lib/module/NativeQuickCrypto/random.js.map +0 -1
- package/lib/module/NativeQuickCrypto/rsa.js +0 -4
- package/lib/module/NativeQuickCrypto/sig.js +0 -17
- package/lib/module/NativeQuickCrypto/sig.js.map +0 -1
- package/lib/module/NativeQuickCrypto/webcrypto.js +0 -4
- package/lib/module/NativeQuickCrypto/webcrypto.js.map +0 -1
- package/lib/module/Utils.js +0 -539
- package/lib/module/Utils.js.map +0 -1
- package/lib/module/aes.js +0 -274
- package/lib/module/aes.js.map +0 -1
- package/lib/module/constants.js +0 -81
- package/lib/module/constants.js.map +0 -1
- package/lib/module/ec.js +0 -267
- package/lib/module/ec.js.map +0 -1
- package/lib/module/keygen.js +0 -49
- package/lib/module/keygen.js.map +0 -1
- package/lib/module/keys.js +0 -477
- package/lib/module/keys.js.map +0 -1
- package/lib/module/pbkdf2.js +0 -84
- package/lib/module/pbkdf2.js.map +0 -1
- package/lib/module/rsa.js +0 -242
- package/lib/module/rsa.js.map +0 -1
- package/lib/module/sig.js +0 -124
- package/lib/module/sig.js.map +0 -1
- package/lib/module/subtle.js +0 -443
- package/lib/module/subtle.js.map +0 -1
- package/lib/module/webcrypto.js +0 -10
- package/lib/module/webcrypto.js.map +0 -1
- package/lib/typescript/Cipher.d.ts +0 -81
- package/lib/typescript/Cipher.d.ts.map +0 -1
- package/lib/typescript/Hash.d.ts +0 -44
- package/lib/typescript/Hash.d.ts.map +0 -1
- package/lib/typescript/Hashnames.d.ts +0 -11
- package/lib/typescript/Hashnames.d.ts.map +0 -1
- package/lib/typescript/Hmac.d.ts +0 -37
- package/lib/typescript/Hmac.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/Cipher.d.ts +0 -44
- package/lib/typescript/NativeQuickCrypto/Cipher.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/NativeQuickCrypto.d.ts +0 -33
- package/lib/typescript/NativeQuickCrypto/NativeQuickCrypto.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/aes.d.ts +0 -5
- package/lib/typescript/NativeQuickCrypto/aes.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/hash.d.ts +0 -7
- package/lib/typescript/NativeQuickCrypto/hash.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/hmac.d.ts +0 -6
- package/lib/typescript/NativeQuickCrypto/hmac.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/keygen.d.ts +0 -4
- package/lib/typescript/NativeQuickCrypto/keygen.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/pbkdf2.d.ts +0 -5
- package/lib/typescript/NativeQuickCrypto/pbkdf2.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/random.d.ts +0 -5
- package/lib/typescript/NativeQuickCrypto/random.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/rsa.d.ts +0 -5
- package/lib/typescript/NativeQuickCrypto/rsa.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/sig.d.ts +0 -23
- package/lib/typescript/NativeQuickCrypto/sig.d.ts.map +0 -1
- package/lib/typescript/NativeQuickCrypto/webcrypto.d.ts +0 -39
- package/lib/typescript/NativeQuickCrypto/webcrypto.d.ts.map +0 -1
- package/lib/typescript/Utils.d.ts +0 -48
- package/lib/typescript/Utils.d.ts.map +0 -1
- package/lib/typescript/aes.d.ts +0 -22
- package/lib/typescript/aes.d.ts.map +0 -1
- package/lib/typescript/constants.d.ts +0 -76
- package/lib/typescript/constants.d.ts.map +0 -1
- package/lib/typescript/ec.d.ts +0 -7
- package/lib/typescript/ec.d.ts.map +0 -1
- package/lib/typescript/keygen.d.ts +0 -6
- package/lib/typescript/keygen.d.ts.map +0 -1
- package/lib/typescript/keys.d.ts +0 -206
- package/lib/typescript/keys.d.ts.map +0 -1
- package/lib/typescript/pbkdf2.d.ts +0 -12
- package/lib/typescript/pbkdf2.d.ts.map +0 -1
- package/lib/typescript/rsa.d.ts +0 -12
- package/lib/typescript/rsa.d.ts.map +0 -1
- package/lib/typescript/sig.d.ts +0 -21
- package/lib/typescript/sig.d.ts.map +0 -1
- package/lib/typescript/subtle.d.ts +0 -15
- package/lib/typescript/subtle.d.ts.map +0 -1
- package/lib/typescript/webcrypto.d.ts +0 -9
- package/lib/typescript/webcrypto.d.ts.map +0 -1
- package/react-native-quick-crypto.podspec +0 -40
- package/src/Cipher.ts +0 -832
- package/src/Hash.ts +0 -132
- package/src/Hashnames.ts +0 -93
- package/src/Hmac.ts +0 -106
- package/src/NativeQuickCrypto/Cipher.ts +0 -102
- package/src/NativeQuickCrypto/NativeQuickCrypto.ts +0 -102
- package/src/NativeQuickCrypto/aes.ts +0 -14
- package/src/NativeQuickCrypto/hash.ts +0 -10
- package/src/NativeQuickCrypto/hmac.ts +0 -9
- package/src/NativeQuickCrypto/keygen.ts +0 -7
- package/src/NativeQuickCrypto/pbkdf2.ts +0 -16
- package/src/NativeQuickCrypto/random.ts +0 -12
- package/src/NativeQuickCrypto/rsa.ts +0 -12
- package/src/NativeQuickCrypto/sig.ts +0 -44
- package/src/NativeQuickCrypto/webcrypto.ts +0 -72
- package/src/Utils.ts +0 -777
- package/src/aes.ts +0 -402
- package/src/constants.ts +0 -79
- package/src/ec.ts +0 -375
- package/src/keygen.ts +0 -80
- package/src/keys.ts +0 -787
- package/src/pbkdf2.ts +0 -169
- package/src/rsa.ts +0 -370
- package/src/sig.ts +0 -164
- package/src/subtle.ts +0 -639
- package/src/webcrypto.ts +0 -8
- /package/android/src/main/{AndroidManifestNew.xml → AndroidManifest.xml} +0 -0
package/lib/module/aes.js
DELETED
|
@@ -1,274 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
|
|
3
|
-
import { NativeQuickCrypto } from './NativeQuickCrypto/NativeQuickCrypto';
|
|
4
|
-
import { lazyDOMException, hasAnyNotIn, validateKeyOps, validateByteLength, validateMaxBufferLength, bufferLikeToArrayBuffer } from './Utils';
|
|
5
|
-
import { CryptoKey, createSecretKey, SecretKeyObject, CipherOrWrapMode } from './keys';
|
|
6
|
-
import { generateKeyPromise } from './keygen';
|
|
7
|
-
|
|
8
|
-
// needs to match the values in cpp/webcrypto/crypto_aes.{h,cpp}
|
|
9
|
-
export let AESKeyVariant = /*#__PURE__*/function (AESKeyVariant) {
|
|
10
|
-
AESKeyVariant[AESKeyVariant["AES_CTR_128"] = 0] = "AES_CTR_128";
|
|
11
|
-
AESKeyVariant[AESKeyVariant["AES_CTR_192"] = 1] = "AES_CTR_192";
|
|
12
|
-
AESKeyVariant[AESKeyVariant["AES_CTR_256"] = 2] = "AES_CTR_256";
|
|
13
|
-
AESKeyVariant[AESKeyVariant["AES_CBC_128"] = 3] = "AES_CBC_128";
|
|
14
|
-
AESKeyVariant[AESKeyVariant["AES_CBC_192"] = 4] = "AES_CBC_192";
|
|
15
|
-
AESKeyVariant[AESKeyVariant["AES_CBC_256"] = 5] = "AES_CBC_256";
|
|
16
|
-
AESKeyVariant[AESKeyVariant["AES_GCM_128"] = 6] = "AES_GCM_128";
|
|
17
|
-
AESKeyVariant[AESKeyVariant["AES_GCM_192"] = 7] = "AES_GCM_192";
|
|
18
|
-
AESKeyVariant[AESKeyVariant["AES_GCM_256"] = 8] = "AES_GCM_256";
|
|
19
|
-
AESKeyVariant[AESKeyVariant["AES_KW_128"] = 9] = "AES_KW_128";
|
|
20
|
-
AESKeyVariant[AESKeyVariant["AES_KW_192"] = 10] = "AES_KW_192";
|
|
21
|
-
AESKeyVariant[AESKeyVariant["AES_KW_256"] = 11] = "AES_KW_256";
|
|
22
|
-
return AESKeyVariant;
|
|
23
|
-
}({});
|
|
24
|
-
const kMaxCounterLength = 128;
|
|
25
|
-
const kTagLengths = [32, 64, 96, 104, 112, 120, 128];
|
|
26
|
-
export const kAesKeyLengths = [128, 192, 256];
|
|
27
|
-
export const getAlgorithmName = (name, length) => {
|
|
28
|
-
if (length === undefined) throw lazyDOMException(`Invalid algorithm length: ${length}`, 'SyntaxError');
|
|
29
|
-
switch (name) {
|
|
30
|
-
case 'AES-CBC':
|
|
31
|
-
return `A${length}CBC`;
|
|
32
|
-
case 'AES-CTR':
|
|
33
|
-
return `A${length}CTR`;
|
|
34
|
-
case 'AES-GCM':
|
|
35
|
-
return `A${length}GCM`;
|
|
36
|
-
case 'AES-KW':
|
|
37
|
-
return `A${length}KW`;
|
|
38
|
-
default:
|
|
39
|
-
throw lazyDOMException(`invalid algorithm name: ${name}`, 'SyntaxError');
|
|
40
|
-
}
|
|
41
|
-
};
|
|
42
|
-
function validateKeyLength(length) {
|
|
43
|
-
if (length !== 128 && length !== 192 && length !== 256) throw lazyDOMException(`Invalid key length: ${length}`, 'DataError');
|
|
44
|
-
}
|
|
45
|
-
function getVariant(name, length) {
|
|
46
|
-
switch (name) {
|
|
47
|
-
case 'AES-CBC':
|
|
48
|
-
switch (length) {
|
|
49
|
-
case 128:
|
|
50
|
-
return AESKeyVariant.AES_CBC_128;
|
|
51
|
-
case 192:
|
|
52
|
-
return AESKeyVariant.AES_CBC_192;
|
|
53
|
-
case 256:
|
|
54
|
-
return AESKeyVariant.AES_CBC_256;
|
|
55
|
-
}
|
|
56
|
-
// @ts-ignore
|
|
57
|
-
break;
|
|
58
|
-
case 'AES-CTR':
|
|
59
|
-
switch (length) {
|
|
60
|
-
case 128:
|
|
61
|
-
return AESKeyVariant.AES_CTR_128;
|
|
62
|
-
case 192:
|
|
63
|
-
return AESKeyVariant.AES_CTR_192;
|
|
64
|
-
case 256:
|
|
65
|
-
return AESKeyVariant.AES_CTR_256;
|
|
66
|
-
}
|
|
67
|
-
// @ts-ignore
|
|
68
|
-
break;
|
|
69
|
-
case 'AES-GCM':
|
|
70
|
-
switch (length) {
|
|
71
|
-
case 128:
|
|
72
|
-
return AESKeyVariant.AES_GCM_128;
|
|
73
|
-
case 192:
|
|
74
|
-
return AESKeyVariant.AES_GCM_192;
|
|
75
|
-
case 256:
|
|
76
|
-
return AESKeyVariant.AES_GCM_256;
|
|
77
|
-
}
|
|
78
|
-
// @ts-ignore
|
|
79
|
-
break;
|
|
80
|
-
case 'AES-KW':
|
|
81
|
-
switch (length) {
|
|
82
|
-
case 128:
|
|
83
|
-
return AESKeyVariant.AES_KW_128;
|
|
84
|
-
case 192:
|
|
85
|
-
return AESKeyVariant.AES_KW_192;
|
|
86
|
-
case 256:
|
|
87
|
-
return AESKeyVariant.AES_KW_256;
|
|
88
|
-
}
|
|
89
|
-
// @ts-ignore
|
|
90
|
-
break;
|
|
91
|
-
}
|
|
92
|
-
|
|
93
|
-
// @ts-ignore
|
|
94
|
-
throw lazyDOMException(`Error getting variant ${name} at length: ${length}`, 'DataError');
|
|
95
|
-
}
|
|
96
|
-
function asyncAesCtrCipher(mode, key, data, {
|
|
97
|
-
counter,
|
|
98
|
-
length
|
|
99
|
-
}) {
|
|
100
|
-
validateByteLength(counter, 'algorithm.counter', 16);
|
|
101
|
-
// The length must specify an integer between 1 and 128. While
|
|
102
|
-
// there is no default, this should typically be 64.
|
|
103
|
-
if (length === 0 || length > kMaxCounterLength) {
|
|
104
|
-
throw lazyDOMException('AES-CTR algorithm.length must be between 1 and 128', 'OperationError');
|
|
105
|
-
}
|
|
106
|
-
return NativeQuickCrypto.webcrypto.aesCipher(mode, key.keyObject.handle, data, getVariant('AES-CTR', key.algorithm.length), bufferLikeToArrayBuffer(counter), length);
|
|
107
|
-
}
|
|
108
|
-
function asyncAesCbcCipher(mode, key, data, {
|
|
109
|
-
iv
|
|
110
|
-
}) {
|
|
111
|
-
validateByteLength(iv, 'algorithm.iv', 16);
|
|
112
|
-
return NativeQuickCrypto.webcrypto.aesCipher(mode, key.keyObject.handle, data, getVariant('AES-CBC', key.algorithm.length), bufferLikeToArrayBuffer(iv));
|
|
113
|
-
}
|
|
114
|
-
|
|
115
|
-
// function asyncAesKwCipher(
|
|
116
|
-
// mode: CipherOrWrapMode,
|
|
117
|
-
// key: CryptoKey,
|
|
118
|
-
// data: BufferLike
|
|
119
|
-
// ): Promise<ArrayBuffer> {
|
|
120
|
-
// return NativeQuickCrypto.webcrypto.aesCipher(
|
|
121
|
-
// mode,
|
|
122
|
-
// key.keyObject.handle,
|
|
123
|
-
// data,
|
|
124
|
-
// getVariant('AES-KW', key.algorithm.length)
|
|
125
|
-
// );
|
|
126
|
-
// }
|
|
127
|
-
|
|
128
|
-
function asyncAesGcmCipher(mode, key, data, {
|
|
129
|
-
iv,
|
|
130
|
-
additionalData,
|
|
131
|
-
tagLength = 128
|
|
132
|
-
}) {
|
|
133
|
-
if (!kTagLengths.includes(tagLength)) {
|
|
134
|
-
throw lazyDOMException(`${tagLength} is not a valid AES-GCM tag length`, 'OperationError');
|
|
135
|
-
}
|
|
136
|
-
validateMaxBufferLength(iv, 'algorithm.iv');
|
|
137
|
-
if (additionalData !== undefined) {
|
|
138
|
-
validateMaxBufferLength(additionalData, 'algorithm.additionalData');
|
|
139
|
-
}
|
|
140
|
-
const tagByteLength = Math.floor(tagLength / 8);
|
|
141
|
-
let length;
|
|
142
|
-
let tag = new ArrayBuffer(0);
|
|
143
|
-
switch (mode) {
|
|
144
|
-
case CipherOrWrapMode.kWebCryptoCipherDecrypt:
|
|
145
|
-
{
|
|
146
|
-
// const slice = ArrayBuffer.isView(data)
|
|
147
|
-
// ? DataView.prototype.buffer.slice
|
|
148
|
-
// : ArrayBuffer.prototype.slice;
|
|
149
|
-
tag = data.slice(-tagByteLength);
|
|
150
|
-
|
|
151
|
-
// Refs: https://www.w3.org/TR/WebCryptoAPI/#aes-gcm-operations
|
|
152
|
-
//
|
|
153
|
-
// > If *plaintext* has a length less than *tagLength* bits, then `throw`
|
|
154
|
-
// > an `OperationError`.
|
|
155
|
-
if (tagByteLength > tag.byteLength) {
|
|
156
|
-
throw lazyDOMException('The provided data is too small.', 'OperationError');
|
|
157
|
-
}
|
|
158
|
-
data = data.slice(0, -tagByteLength);
|
|
159
|
-
break;
|
|
160
|
-
}
|
|
161
|
-
case CipherOrWrapMode.kWebCryptoCipherEncrypt:
|
|
162
|
-
length = tagByteLength;
|
|
163
|
-
break;
|
|
164
|
-
}
|
|
165
|
-
return NativeQuickCrypto.webcrypto.aesCipher(mode, key.keyObject.handle, data, getVariant('AES-GCM', key.algorithm.length), bufferLikeToArrayBuffer(iv), length, bufferLikeToArrayBuffer(tag), bufferLikeToArrayBuffer(additionalData || new ArrayBuffer(0)));
|
|
166
|
-
}
|
|
167
|
-
export const aesCipher = (mode, key, data, algorithm) => {
|
|
168
|
-
switch (algorithm.name) {
|
|
169
|
-
case 'AES-CTR':
|
|
170
|
-
return asyncAesCtrCipher(mode, key, data, algorithm);
|
|
171
|
-
case 'AES-CBC':
|
|
172
|
-
return asyncAesCbcCipher(mode, key, data, algorithm);
|
|
173
|
-
case 'AES-GCM':
|
|
174
|
-
return asyncAesGcmCipher(mode, key, data, algorithm);
|
|
175
|
-
// case 'AES-KW':
|
|
176
|
-
// return asyncAesKwCipher(mode, key, data);
|
|
177
|
-
}
|
|
178
|
-
throw new Error(`aesCipher: Unknown algorithm ${algorithm.name}`);
|
|
179
|
-
};
|
|
180
|
-
export const aesGenerateKey = async (algorithm, extractable, keyUsages) => {
|
|
181
|
-
const {
|
|
182
|
-
name,
|
|
183
|
-
length
|
|
184
|
-
} = algorithm;
|
|
185
|
-
if (!name) {
|
|
186
|
-
throw lazyDOMException('Algorithm name is undefined', 'SyntaxError');
|
|
187
|
-
}
|
|
188
|
-
if (!kAesKeyLengths.includes(length)) {
|
|
189
|
-
throw lazyDOMException('AES key length must be 128, 192, or 256 bits', 'OperationError');
|
|
190
|
-
}
|
|
191
|
-
const checkUsages = ['wrapKey', 'unwrapKey'];
|
|
192
|
-
if (name !== 'AES-KW') {
|
|
193
|
-
checkUsages.push('encrypt', 'decrypt');
|
|
194
|
-
}
|
|
195
|
-
// const usagesSet = new SafeSet(keyUsages);
|
|
196
|
-
if (hasAnyNotIn(keyUsages, checkUsages)) {
|
|
197
|
-
throw lazyDOMException(`Unsupported key usage for an AES key: ${keyUsages}`, 'SyntaxError');
|
|
198
|
-
}
|
|
199
|
-
const [err, key] = await generateKeyPromise('aes', {
|
|
200
|
-
length
|
|
201
|
-
});
|
|
202
|
-
if (err) {
|
|
203
|
-
throw lazyDOMException(`aesGenerateKey (generateKeyPromise) failed: [${err.message}]`, {
|
|
204
|
-
name: 'OperationError',
|
|
205
|
-
cause: err
|
|
206
|
-
});
|
|
207
|
-
}
|
|
208
|
-
return new CryptoKey(key, {
|
|
209
|
-
name,
|
|
210
|
-
length
|
|
211
|
-
}, Array.from(keyUsages), extractable);
|
|
212
|
-
};
|
|
213
|
-
export const aesImportKey = async (algorithm, format, keyData, extractable, keyUsages) => {
|
|
214
|
-
const {
|
|
215
|
-
name
|
|
216
|
-
} = algorithm;
|
|
217
|
-
const checkUsages = ['wrapKey', 'unwrapKey'];
|
|
218
|
-
if (name !== 'AES-KW') {
|
|
219
|
-
checkUsages.push('encrypt', 'decrypt');
|
|
220
|
-
}
|
|
221
|
-
|
|
222
|
-
// const usagesSet = new SafeSet(keyUsages);
|
|
223
|
-
if (hasAnyNotIn(keyUsages, checkUsages)) {
|
|
224
|
-
throw lazyDOMException('Unsupported key usage for an AES key', 'SyntaxError');
|
|
225
|
-
}
|
|
226
|
-
let keyObject;
|
|
227
|
-
let length;
|
|
228
|
-
switch (format) {
|
|
229
|
-
case 'raw':
|
|
230
|
-
{
|
|
231
|
-
const data = keyData;
|
|
232
|
-
validateKeyLength(data.byteLength * 8);
|
|
233
|
-
keyObject = createSecretKey(keyData);
|
|
234
|
-
break;
|
|
235
|
-
}
|
|
236
|
-
case 'jwk':
|
|
237
|
-
{
|
|
238
|
-
const data = keyData;
|
|
239
|
-
if (!data.kty) throw lazyDOMException('Invalid keyData', 'DataError');
|
|
240
|
-
if (data.kty !== 'oct') throw lazyDOMException('Invalid JWK "kty" Parameter', 'DataError');
|
|
241
|
-
if (keyUsages.length > 0 && data.use !== undefined && data.use !== 'enc') {
|
|
242
|
-
throw lazyDOMException('Invalid JWK "use" Parameter', 'DataError');
|
|
243
|
-
}
|
|
244
|
-
validateKeyOps(data.key_ops, keyUsages);
|
|
245
|
-
if (data.ext !== undefined && data.ext === false && extractable === true) {
|
|
246
|
-
throw lazyDOMException('JWK "ext" Parameter and extractable mismatch', 'DataError');
|
|
247
|
-
}
|
|
248
|
-
const handle = NativeQuickCrypto.webcrypto.createKeyObjectHandle();
|
|
249
|
-
handle.initJwk(data);
|
|
250
|
-
({
|
|
251
|
-
length
|
|
252
|
-
} = handle.keyDetail());
|
|
253
|
-
validateKeyLength(length);
|
|
254
|
-
if (data.alg !== undefined) {
|
|
255
|
-
if (data.alg !== getAlgorithmName(algorithm.name, length)) throw lazyDOMException('JWK "alg" does not match the requested algorithm', 'DataError');
|
|
256
|
-
}
|
|
257
|
-
keyObject = new SecretKeyObject(handle);
|
|
258
|
-
break;
|
|
259
|
-
}
|
|
260
|
-
default:
|
|
261
|
-
throw lazyDOMException(`Unable to import AES key with format ${format}`, 'NotSupportedError');
|
|
262
|
-
}
|
|
263
|
-
if (length === undefined) {
|
|
264
|
-
({
|
|
265
|
-
length
|
|
266
|
-
} = keyObject.handle.keyDetail());
|
|
267
|
-
validateKeyLength(length);
|
|
268
|
-
}
|
|
269
|
-
return new CryptoKey(keyObject, {
|
|
270
|
-
name,
|
|
271
|
-
length
|
|
272
|
-
}, keyUsages, extractable);
|
|
273
|
-
};
|
|
274
|
-
//# sourceMappingURL=aes.js.map
|
package/lib/module/aes.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"names":["NativeQuickCrypto","lazyDOMException","hasAnyNotIn","validateKeyOps","validateByteLength","validateMaxBufferLength","bufferLikeToArrayBuffer","CryptoKey","createSecretKey","SecretKeyObject","CipherOrWrapMode","generateKeyPromise","AESKeyVariant","kMaxCounterLength","kTagLengths","kAesKeyLengths","getAlgorithmName","name","length","undefined","validateKeyLength","getVariant","AES_CBC_128","AES_CBC_192","AES_CBC_256","AES_CTR_128","AES_CTR_192","AES_CTR_256","AES_GCM_128","AES_GCM_192","AES_GCM_256","AES_KW_128","AES_KW_192","AES_KW_256","asyncAesCtrCipher","mode","key","data","counter","webcrypto","aesCipher","keyObject","handle","algorithm","asyncAesCbcCipher","iv","asyncAesGcmCipher","additionalData","tagLength","includes","tagByteLength","Math","floor","tag","ArrayBuffer","kWebCryptoCipherDecrypt","slice","byteLength","kWebCryptoCipherEncrypt","Error","aesGenerateKey","extractable","keyUsages","checkUsages","push","err","message","cause","Array","from","aesImportKey","format","keyData","kty","use","key_ops","ext","createKeyObjectHandle","initJwk","keyDetail","alg"],"sourceRoot":"../../src","sources":["aes.ts"],"mappings":";;AAAA,SAASA,iBAAiB,QAAQ,uCAAuC;AACzE,SACEC,gBAAgB,EAEhBC,WAAW,EACXC,cAAc,EACdC,kBAAkB,EAClBC,uBAAuB,EACvBC,uBAAuB,QAClB,SAAS;AAChB,SAIEC,SAAS,EACTC,eAAe,EACfC,eAAe,EAGfC,gBAAgB,QAQX,QAAQ;AACf,SAASC,kBAAkB,QAAQ,UAAU;;AAE7C;AACA,WAAYC,aAAa,0BAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAbA,aAAa,CAAbA,aAAa;EAAA,OAAbA,aAAa;AAAA;AAezB,MAAMC,iBAAiB,GAAG,GAAG;AAC7B,MAAMC,WAAwB,GAAG,CAAC,EAAE,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC;AACjE,OAAO,MAAMC,cAAc,GAAG,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC;AAE7C,OAAO,MAAMC,gBAAgB,GAAGA,CAACC,IAAY,EAAEC,MAAe,KAAK;EACjE,IAAIA,MAAM,KAAKC,SAAS,EACtB,MAAMlB,gBAAgB,CACnB,6BAA4BiB,MAAO,EAAC,EACrC,aACF,CAAC;EACH,QAAQD,IAAI;IACV,KAAK,SAAS;MACZ,OAAQ,IAAGC,MAAO,KAAI;IACxB,KAAK,SAAS;MACZ,OAAQ,IAAGA,MAAO,KAAI;IACxB,KAAK,SAAS;MACZ,OAAQ,IAAGA,MAAO,KAAI;IACxB,KAAK,QAAQ;MACX,OAAQ,IAAGA,MAAO,IAAG;IACvB;MACE,MAAMjB,gBAAgB,CAAE,2BAA0BgB,IAAK,EAAC,EAAE,aAAa,CAAC;EAC5E;AACF,CAAC;AAED,SAASG,iBAAiBA,CAACF,MAAe,EAAE;EAC1C,IAAIA,MAAM,KAAK,GAAG,IAAIA,MAAM,KAAK,GAAG,IAAIA,MAAM,KAAK,GAAG,EACpD,MAAMjB,gBAAgB,CAAE,uBAAsBiB,MAAO,EAAC,EAAE,WAAW,CAAC;AACxE;AAEA,SAASG,UAAUA,CAACJ,IAAkB,EAAEC,MAAiB,EAAiB;EACxE,QAAQD,IAAI;IACV,KAAK,SAAS;MACZ,QAAQC,MAAM;QACZ,KAAK,GAAG;UACN,OAAON,aAAa,CAACU,WAAW;QAClC,KAAK,GAAG;UACN,OAAOV,aAAa,CAACW,WAAW;QAClC,KAAK,GAAG;UACN,OAAOX,aAAa,CAACY,WAAW;MACpC;MACA;MACA;IACF,KAAK,SAAS;MACZ,QAAQN,MAAM;QACZ,KAAK,GAAG;UACN,OAAON,aAAa,CAACa,WAAW;QAClC,KAAK,GAAG;UACN,OAAOb,aAAa,CAACc,WAAW;QAClC,KAAK,GAAG;UACN,OAAOd,aAAa,CAACe,WAAW;MACpC;MACA;MACA;IACF,KAAK,SAAS;MACZ,QAAQT,MAAM;QACZ,KAAK,GAAG;UACN,OAAON,aAAa,CAACgB,WAAW;QAClC,KAAK,GAAG;UACN,OAAOhB,aAAa,CAACiB,WAAW;QAClC,KAAK,GAAG;UACN,OAAOjB,aAAa,CAACkB,WAAW;MACpC;MACA;MACA;IACF,KAAK,QAAQ;MACX,QAAQZ,MAAM;QACZ,KAAK,GAAG;UACN,OAAON,aAAa,CAACmB,UAAU;QACjC,KAAK,GAAG;UACN,OAAOnB,aAAa,CAACoB,UAAU;QACjC,KAAK,GAAG;UACN,OAAOpB,aAAa,CAACqB,UAAU;MACnC;MACA;MACA;EACJ;;EAEA;EACA,MAAMhC,gBAAgB,CACnB,yBAAwBgB,IAAK,eAAcC,MAAO,EAAC,EACpD,WACF,CAAC;AACH;AAEA,SAASgB,iBAAiBA,CACxBC,IAAsB,EACtBC,GAAc,EACdC,IAAiB,EACjB;EAAEC,OAAO;EAAEpB;AAAqB,CAAC,EACX;EACtBd,kBAAkB,CAACkC,OAAO,EAAE,mBAAmB,EAAE,EAAE,CAAC;EACpD;EACA;EACA,IAAIpB,MAAM,KAAK,CAAC,IAAIA,MAAM,GAAGL,iBAAiB,EAAE;IAC9C,MAAMZ,gBAAgB,CACpB,oDAAoD,EACpD,gBACF,CAAC;EACH;EAEA,OAAOD,iBAAiB,CAACuC,SAAS,CAACC,SAAS,CAC1CL,IAAI,EACJC,GAAG,CAACK,SAAS,CAACC,MAAM,EACpBL,IAAI,EACJhB,UAAU,CAAC,SAAS,EAAEe,GAAG,CAACO,SAAS,CAACzB,MAAmB,CAAC,EACxDZ,uBAAuB,CAACgC,OAAO,CAAC,EAChCpB,MACF,CAAC;AACH;AAEA,SAAS0B,iBAAiBA,CACxBT,IAAsB,EACtBC,GAAc,EACdC,IAAiB,EACjB;EAAEQ;AAAiB,CAAC,EACE;EACtBzC,kBAAkB,CAACyC,EAAE,EAAE,cAAc,EAAE,EAAE,CAAC;EAC1C,OAAO7C,iBAAiB,CAACuC,SAAS,CAACC,SAAS,CAC1CL,IAAI,EACJC,GAAG,CAACK,SAAS,CAACC,MAAM,EACpBL,IAAI,EACJhB,UAAU,CAAC,SAAS,EAAEe,GAAG,CAACO,SAAS,CAACzB,MAAmB,CAAC,EACxDZ,uBAAuB,CAACuC,EAAE,CAC5B,CAAC;AACH;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA,SAASC,iBAAiBA,CACxBX,IAAsB,EACtBC,GAAc,EACdC,IAAiB,EACjB;EAAEQ,EAAE;EAAEE,cAAc;EAAEC,SAAS,GAAG;AAAkB,CAAC,EACrD;EACA,IAAI,CAAClC,WAAW,CAACmC,QAAQ,CAACD,SAAS,CAAC,EAAE;IACpC,MAAM/C,gBAAgB,CACnB,GAAE+C,SAAU,oCAAmC,EAChD,gBACF,CAAC;EACH;EAEA3C,uBAAuB,CAACwC,EAAE,EAAE,cAAc,CAAC;EAE3C,IAAIE,cAAc,KAAK5B,SAAS,EAAE;IAChCd,uBAAuB,CAAC0C,cAAc,EAAE,0BAA0B,CAAC;EACrE;EAEA,MAAMG,aAAa,GAAGC,IAAI,CAACC,KAAK,CAACJ,SAAS,GAAG,CAAC,CAAC;EAC/C,IAAI9B,MAA0B;EAC9B,IAAImC,GAAG,GAAG,IAAIC,WAAW,CAAC,CAAC,CAAC;EAC5B,QAAQnB,IAAI;IACV,KAAKzB,gBAAgB,CAAC6C,uBAAuB;MAAE;QAC7C;QACA;QACA;QACAF,GAAG,GAAGhB,IAAI,CAACmB,KAAK,CAAC,CAACN,aAAa,CAAC;;QAEhC;QACA;QACA;QACA;QACA,IAAIA,aAAa,GAAGG,GAAG,CAACI,UAAU,EAAE;UAClC,MAAMxD,gBAAgB,CACpB,iCAAiC,EACjC,gBACF,CAAC;QACH;QAEAoC,IAAI,GAAGA,IAAI,CAACmB,KAAK,CAAC,CAAC,EAAE,CAACN,aAAa,CAAC;QACpC;MACF;IACA,KAAKxC,gBAAgB,CAACgD,uBAAuB;MAC3CxC,MAAM,GAAGgC,aAAa;MACtB;EACJ;EAEA,OAAOlD,iBAAiB,CAACuC,SAAS,CAACC,SAAS,CAC1CL,IAAI,EACJC,GAAG,CAACK,SAAS,CAACC,MAAM,EACpBL,IAAI,EACJhB,UAAU,CAAC,SAAS,EAAEe,GAAG,CAACO,SAAS,CAACzB,MAAmB,CAAC,EACxDZ,uBAAuB,CAACuC,EAAE,CAAC,EAC3B3B,MAAM,EACNZ,uBAAuB,CAAC+C,GAAG,CAAC,EAC5B/C,uBAAuB,CAACyC,cAAc,IAAI,IAAIO,WAAW,CAAC,CAAC,CAAC,CAC9D,CAAC;AACH;AAEA,OAAO,MAAMd,SAAS,GAAGA,CACvBL,IAAsB,EACtBC,GAAc,EACdC,IAAiB,EACjBM,SAA+B,KACN;EACzB,QAAQA,SAAS,CAAC1B,IAAI;IACpB,KAAK,SAAS;MACZ,OAAOiB,iBAAiB,CAACC,IAAI,EAAEC,GAAG,EAAEC,IAAI,EAAEM,SAAS,CAAC;IACtD,KAAK,SAAS;MACZ,OAAOC,iBAAiB,CAACT,IAAI,EAAEC,GAAG,EAAEC,IAAI,EAAEM,SAAS,CAAC;IACtD,KAAK,SAAS;MACZ,OAAOG,iBAAiB,CAACX,IAAI,EAAEC,GAAG,EAAEC,IAAI,EAAEM,SAAS,CAAC;IACtD;IACA;EACF;EACA,MAAM,IAAIgB,KAAK,CAAE,gCAA+BhB,SAAS,CAAC1B,IAAK,EAAC,CAAC;AACnE,CAAC;AAED,OAAO,MAAM2C,cAAc,GAAG,MAAAA,CAC5BjB,SAA0B,EAC1BkB,WAAoB,EACpBC,SAAqB,KACE;EACvB,MAAM;IAAE7C,IAAI;IAAEC;EAAO,CAAC,GAAGyB,SAAS;EAClC,IAAI,CAAC1B,IAAI,EAAE;IACT,MAAMhB,gBAAgB,CAAC,6BAA6B,EAAE,aAAa,CAAC;EACtE;EACA,IAAI,CAACc,cAAc,CAACkC,QAAQ,CAAC/B,MAAM,CAAC,EAAE;IACpC,MAAMjB,gBAAgB,CACpB,8CAA8C,EAC9C,gBACF,CAAC;EACH;EAEA,MAAM8D,WAAW,GAAG,CAAC,SAAS,EAAE,WAAW,CAAC;EAC5C,IAAI9C,IAAI,KAAK,QAAQ,EAAE;IACrB8C,WAAW,CAACC,IAAI,CAAC,SAAS,EAAE,SAAS,CAAC;EACxC;EACA;EACA,IAAI9D,WAAW,CAAC4D,SAAS,EAAEC,WAAW,CAAC,EAAE;IACvC,MAAM9D,gBAAgB,CACnB,yCAAwC6D,SAAU,EAAC,EACpD,aACF,CAAC;EACH;EAEA,MAAM,CAACG,GAAG,EAAE7B,GAAG,CAAC,GAAG,MAAMzB,kBAAkB,CAAC,KAAK,EAAE;IAAEO;EAAO,CAAC,CAAC;EAC9D,IAAI+C,GAAG,EAAE;IACP,MAAMhE,gBAAgB,CACnB,gDAA+CgE,GAAG,CAACC,OAAQ,GAAE,EAC9D;MACEjD,IAAI,EAAE,gBAAgB;MACtBkD,KAAK,EAAEF;IACT,CACF,CAAC;EACH;EAEA,OAAO,IAAI1D,SAAS,CAClB6B,GAAG,EACH;IAAEnB,IAAI;IAAEC;EAAO,CAAC,EAChBkD,KAAK,CAACC,IAAI,CAACP,SAAS,CAAC,EACrBD,WACF,CAAC;AACH,CAAC;AAED,OAAO,MAAMS,YAAY,GAAG,MAAAA,CAC1B3B,SAA0B,EAC1B4B,MAAoB,EACpBC,OAAyB,EACzBX,WAAoB,EACpBC,SAAqB,KACE;EACvB,MAAM;IAAE7C;EAAK,CAAC,GAAG0B,SAAS;EAC1B,MAAMoB,WAAW,GAAG,CAAC,SAAS,EAAE,WAAW,CAAC;EAC5C,IAAI9C,IAAI,KAAK,QAAQ,EAAE;IACrB8C,WAAW,CAACC,IAAI,CAAC,SAAS,EAAE,SAAS,CAAC;EACxC;;EAEA;EACA,IAAI9D,WAAW,CAAC4D,SAAS,EAAEC,WAAW,CAAC,EAAE;IACvC,MAAM9D,gBAAgB,CACpB,sCAAsC,EACtC,aACF,CAAC;EACH;EAEA,IAAIwC,SAA0B;EAC9B,IAAIvB,MAA0B;EAE9B,QAAQqD,MAAM;IACZ,KAAK,KAAK;MAAE;QACV,MAAMlC,IAAI,GAAGmC,OAAqB;QAClCpD,iBAAiB,CAACiB,IAAI,CAACoB,UAAU,GAAG,CAAC,CAAC;QACtChB,SAAS,GAAGjC,eAAe,CAACgE,OAAO,CAAC;QACpC;MACF;IACA,KAAK,KAAK;MAAE;QACV,MAAMnC,IAAI,GAAGmC,OAAc;QAE3B,IAAI,CAACnC,IAAI,CAACoC,GAAG,EAAE,MAAMxE,gBAAgB,CAAC,iBAAiB,EAAE,WAAW,CAAC;QAErE,IAAIoC,IAAI,CAACoC,GAAG,KAAK,KAAK,EACpB,MAAMxE,gBAAgB,CAAC,6BAA6B,EAAE,WAAW,CAAC;QAEpE,IACE6D,SAAS,CAAC5C,MAAM,GAAG,CAAC,IACpBmB,IAAI,CAACqC,GAAG,KAAKvD,SAAS,IACtBkB,IAAI,CAACqC,GAAG,KAAK,KAAK,EAClB;UACA,MAAMzE,gBAAgB,CAAC,6BAA6B,EAAE,WAAW,CAAC;QACpE;QAEAE,cAAc,CAACkC,IAAI,CAACsC,OAAO,EAAEb,SAAS,CAAC;QAEvC,IACEzB,IAAI,CAACuC,GAAG,KAAKzD,SAAS,IACtBkB,IAAI,CAACuC,GAAG,KAAK,KAAK,IAClBf,WAAW,KAAK,IAAI,EACpB;UACA,MAAM5D,gBAAgB,CACpB,8CAA8C,EAC9C,WACF,CAAC;QACH;QAEA,MAAMyC,MAAM,GAAG1C,iBAAiB,CAACuC,SAAS,CAACsC,qBAAqB,CAAC,CAAC;QAClEnC,MAAM,CAACoC,OAAO,CAACzC,IAAI,CAAC;QAEpB,CAAC;UAAEnB;QAAO,CAAC,GAAGwB,MAAM,CAACqC,SAAS,CAAC,CAAC;QAChC3D,iBAAiB,CAACF,MAAM,CAAC;QAEzB,IAAImB,IAAI,CAAC2C,GAAG,KAAK7D,SAAS,EAAE;UAC1B,IAAIkB,IAAI,CAAC2C,GAAG,KAAKhE,gBAAgB,CAAC2B,SAAS,CAAC1B,IAAI,EAAEC,MAAM,CAAC,EACvD,MAAMjB,gBAAgB,CACpB,kDAAkD,EAClD,WACF,CAAC;QACL;QAEAwC,SAAS,GAAG,IAAIhC,eAAe,CAACiC,MAAM,CAAC;QACvC;MACF;IACA;MACE,MAAMzC,gBAAgB,CACnB,wCAAuCsE,MAAO,EAAC,EAChD,mBACF,CAAC;EACL;EAEA,IAAIrD,MAAM,KAAKC,SAAS,EAAE;IACxB,CAAC;MAAED;IAAO,CAAC,GAAGuB,SAAS,CAACC,MAAM,CAACqC,SAAS,CAAC,CAAC;IAC1C3D,iBAAiB,CAACF,MAAM,CAAC;EAC3B;EAEA,OAAO,IAAIX,SAAS,CAACkC,SAAS,EAAE;IAAExB,IAAI;IAAEC;EAAO,CAAC,EAAE4C,SAAS,EAAED,WAAW,CAAC;AAC3E,CAAC","ignoreList":[]}
|
package/lib/module/constants.js
DELETED
|
@@ -1,81 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
|
|
3
|
-
// Taken by printing node.crypto.constants
|
|
4
|
-
// Node declares them as enums on v8 directly
|
|
5
|
-
// Whenever the API gets updated (or some dependency like OpenSSL) I guess we will have to revisit these
|
|
6
|
-
export const constants = {
|
|
7
|
-
OPENSSL_VERSION_NUMBER: 269488367,
|
|
8
|
-
SSL_OP_ALL: 2147485780,
|
|
9
|
-
SSL_OP_ALLOW_NO_DHE_KEX: 1024,
|
|
10
|
-
SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: 262144,
|
|
11
|
-
SSL_OP_CIPHER_SERVER_PREFERENCE: 4194304,
|
|
12
|
-
SSL_OP_CISCO_ANYCONNECT: 32768,
|
|
13
|
-
SSL_OP_COOKIE_EXCHANGE: 8192,
|
|
14
|
-
SSL_OP_CRYPTOPRO_TLSEXT_BUG: 2147483648,
|
|
15
|
-
SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS: 2048,
|
|
16
|
-
SSL_OP_EPHEMERAL_RSA: 0,
|
|
17
|
-
SSL_OP_LEGACY_SERVER_CONNECT: 4,
|
|
18
|
-
SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER: 0,
|
|
19
|
-
SSL_OP_MICROSOFT_SESS_ID_BUG: 0,
|
|
20
|
-
SSL_OP_MSIE_SSLV2_RSA_PADDING: 0,
|
|
21
|
-
SSL_OP_NETSCAPE_CA_DN_BUG: 0,
|
|
22
|
-
SSL_OP_NETSCAPE_CHALLENGE_BUG: 0,
|
|
23
|
-
SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG: 0,
|
|
24
|
-
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG: 0,
|
|
25
|
-
SSL_OP_NO_COMPRESSION: 131072,
|
|
26
|
-
SSL_OP_NO_ENCRYPT_THEN_MAC: 524288,
|
|
27
|
-
SSL_OP_NO_QUERY_MTU: 4096,
|
|
28
|
-
SSL_OP_NO_RENEGOTIATION: 1073741824,
|
|
29
|
-
SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: 65536,
|
|
30
|
-
SSL_OP_NO_SSLv2: 0,
|
|
31
|
-
SSL_OP_NO_SSLv3: 33554432,
|
|
32
|
-
SSL_OP_NO_TICKET: 16384,
|
|
33
|
-
SSL_OP_NO_TLSv1: 67108864,
|
|
34
|
-
SSL_OP_NO_TLSv1_1: 268435456,
|
|
35
|
-
SSL_OP_NO_TLSv1_2: 134217728,
|
|
36
|
-
SSL_OP_NO_TLSv1_3: 536870912,
|
|
37
|
-
SSL_OP_PKCS1_CHECK_1: 0,
|
|
38
|
-
SSL_OP_PKCS1_CHECK_2: 0,
|
|
39
|
-
SSL_OP_PRIORITIZE_CHACHA: 2097152,
|
|
40
|
-
SSL_OP_SINGLE_DH_USE: 0,
|
|
41
|
-
SSL_OP_SINGLE_ECDH_USE: 0,
|
|
42
|
-
SSL_OP_SSLEAY_080_CLIENT_DH_BUG: 0,
|
|
43
|
-
SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG: 0,
|
|
44
|
-
SSL_OP_TLS_BLOCK_PADDING_BUG: 0,
|
|
45
|
-
SSL_OP_TLS_D5_BUG: 0,
|
|
46
|
-
SSL_OP_TLS_ROLLBACK_BUG: 8388608,
|
|
47
|
-
ENGINE_METHOD_RSA: 1,
|
|
48
|
-
ENGINE_METHOD_DSA: 2,
|
|
49
|
-
ENGINE_METHOD_DH: 4,
|
|
50
|
-
ENGINE_METHOD_RAND: 8,
|
|
51
|
-
ENGINE_METHOD_EC: 2048,
|
|
52
|
-
ENGINE_METHOD_CIPHERS: 64,
|
|
53
|
-
ENGINE_METHOD_DIGESTS: 128,
|
|
54
|
-
ENGINE_METHOD_PKEY_METHS: 512,
|
|
55
|
-
ENGINE_METHOD_PKEY_ASN1_METHS: 1024,
|
|
56
|
-
ENGINE_METHOD_ALL: 65535,
|
|
57
|
-
ENGINE_METHOD_NONE: 0,
|
|
58
|
-
DH_CHECK_P_NOT_SAFE_PRIME: 2,
|
|
59
|
-
DH_CHECK_P_NOT_PRIME: 1,
|
|
60
|
-
DH_UNABLE_TO_CHECK_GENERATOR: 4,
|
|
61
|
-
DH_NOT_SUITABLE_GENERATOR: 8,
|
|
62
|
-
ALPN_ENABLED: 1,
|
|
63
|
-
RSA_PKCS1_PADDING: 1,
|
|
64
|
-
RSA_SSLV23_PADDING: 2,
|
|
65
|
-
RSA_NO_PADDING: 3,
|
|
66
|
-
RSA_PKCS1_OAEP_PADDING: 4,
|
|
67
|
-
RSA_X931_PADDING: 5,
|
|
68
|
-
RSA_PKCS1_PSS_PADDING: 6,
|
|
69
|
-
RSA_PSS_SALTLEN_DIGEST: -1,
|
|
70
|
-
RSA_PSS_SALTLEN_MAX_SIGN: -2,
|
|
71
|
-
RSA_PSS_SALTLEN_AUTO: -2,
|
|
72
|
-
defaultCoreCipherList: 'TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA256:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!SRP:!CAMELLIA',
|
|
73
|
-
TLS1_VERSION: 769,
|
|
74
|
-
TLS1_1_VERSION: 770,
|
|
75
|
-
TLS1_2_VERSION: 771,
|
|
76
|
-
TLS1_3_VERSION: 772,
|
|
77
|
-
POINT_CONVERSION_COMPRESSED: 2,
|
|
78
|
-
POINT_CONVERSION_UNCOMPRESSED: 4,
|
|
79
|
-
POINT_CONVERSION_HYBRID: 6
|
|
80
|
-
};
|
|
81
|
-
//# sourceMappingURL=constants.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"names":["constants","OPENSSL_VERSION_NUMBER","SSL_OP_ALL","SSL_OP_ALLOW_NO_DHE_KEX","SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION","SSL_OP_CIPHER_SERVER_PREFERENCE","SSL_OP_CISCO_ANYCONNECT","SSL_OP_COOKIE_EXCHANGE","SSL_OP_CRYPTOPRO_TLSEXT_BUG","SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS","SSL_OP_EPHEMERAL_RSA","SSL_OP_LEGACY_SERVER_CONNECT","SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER","SSL_OP_MICROSOFT_SESS_ID_BUG","SSL_OP_MSIE_SSLV2_RSA_PADDING","SSL_OP_NETSCAPE_CA_DN_BUG","SSL_OP_NETSCAPE_CHALLENGE_BUG","SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG","SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG","SSL_OP_NO_COMPRESSION","SSL_OP_NO_ENCRYPT_THEN_MAC","SSL_OP_NO_QUERY_MTU","SSL_OP_NO_RENEGOTIATION","SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION","SSL_OP_NO_SSLv2","SSL_OP_NO_SSLv3","SSL_OP_NO_TICKET","SSL_OP_NO_TLSv1","SSL_OP_NO_TLSv1_1","SSL_OP_NO_TLSv1_2","SSL_OP_NO_TLSv1_3","SSL_OP_PKCS1_CHECK_1","SSL_OP_PKCS1_CHECK_2","SSL_OP_PRIORITIZE_CHACHA","SSL_OP_SINGLE_DH_USE","SSL_OP_SINGLE_ECDH_USE","SSL_OP_SSLEAY_080_CLIENT_DH_BUG","SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG","SSL_OP_TLS_BLOCK_PADDING_BUG","SSL_OP_TLS_D5_BUG","SSL_OP_TLS_ROLLBACK_BUG","ENGINE_METHOD_RSA","ENGINE_METHOD_DSA","ENGINE_METHOD_DH","ENGINE_METHOD_RAND","ENGINE_METHOD_EC","ENGINE_METHOD_CIPHERS","ENGINE_METHOD_DIGESTS","ENGINE_METHOD_PKEY_METHS","ENGINE_METHOD_PKEY_ASN1_METHS","ENGINE_METHOD_ALL","ENGINE_METHOD_NONE","DH_CHECK_P_NOT_SAFE_PRIME","DH_CHECK_P_NOT_PRIME","DH_UNABLE_TO_CHECK_GENERATOR","DH_NOT_SUITABLE_GENERATOR","ALPN_ENABLED","RSA_PKCS1_PADDING","RSA_SSLV23_PADDING","RSA_NO_PADDING","RSA_PKCS1_OAEP_PADDING","RSA_X931_PADDING","RSA_PKCS1_PSS_PADDING","RSA_PSS_SALTLEN_DIGEST","RSA_PSS_SALTLEN_MAX_SIGN","RSA_PSS_SALTLEN_AUTO","defaultCoreCipherList","TLS1_VERSION","TLS1_1_VERSION","TLS1_2_VERSION","TLS1_3_VERSION","POINT_CONVERSION_COMPRESSED","POINT_CONVERSION_UNCOMPRESSED","POINT_CONVERSION_HYBRID"],"sourceRoot":"../../src","sources":["constants.ts"],"mappings":";;AAAA;AACA;AACA;AACA,OAAO,MAAMA,SAAS,GAAG;EACvBC,sBAAsB,EAAE,SAAS;EACjCC,UAAU,EAAE,UAAU;EACtBC,uBAAuB,EAAE,IAAI;EAC7BC,wCAAwC,EAAE,MAAM;EAChDC,+BAA+B,EAAE,OAAO;EACxCC,uBAAuB,EAAE,KAAK;EAC9BC,sBAAsB,EAAE,IAAI;EAC5BC,2BAA2B,EAAE,UAAU;EACvCC,kCAAkC,EAAE,IAAI;EACxCC,oBAAoB,EAAE,CAAC;EACvBC,4BAA4B,EAAE,CAAC;EAC/BC,iCAAiC,EAAE,CAAC;EACpCC,4BAA4B,EAAE,CAAC;EAC/BC,6BAA6B,EAAE,CAAC;EAChCC,yBAAyB,EAAE,CAAC;EAC5BC,6BAA6B,EAAE,CAAC;EAChCC,sCAAsC,EAAE,CAAC;EACzCC,uCAAuC,EAAE,CAAC;EAC1CC,qBAAqB,EAAE,MAAM;EAC7BC,0BAA0B,EAAE,MAAM;EAClCC,mBAAmB,EAAE,IAAI;EACzBC,uBAAuB,EAAE,UAAU;EACnCC,6CAA6C,EAAE,KAAK;EACpDC,eAAe,EAAE,CAAC;EAClBC,eAAe,EAAE,QAAQ;EACzBC,gBAAgB,EAAE,KAAK;EACvBC,eAAe,EAAE,QAAQ;EACzBC,iBAAiB,EAAE,SAAS;EAC5BC,iBAAiB,EAAE,SAAS;EAC5BC,iBAAiB,EAAE,SAAS;EAC5BC,oBAAoB,EAAE,CAAC;EACvBC,oBAAoB,EAAE,CAAC;EACvBC,wBAAwB,EAAE,OAAO;EACjCC,oBAAoB,EAAE,CAAC;EACvBC,sBAAsB,EAAE,CAAC;EACzBC,+BAA+B,EAAE,CAAC;EAClCC,kCAAkC,EAAE,CAAC;EACrCC,4BAA4B,EAAE,CAAC;EAC/BC,iBAAiB,EAAE,CAAC;EACpBC,uBAAuB,EAAE,OAAO;EAChCC,iBAAiB,EAAE,CAAC;EACpBC,iBAAiB,EAAE,CAAC;EACpBC,gBAAgB,EAAE,CAAC;EACnBC,kBAAkB,EAAE,CAAC;EACrBC,gBAAgB,EAAE,IAAI;EACtBC,qBAAqB,EAAE,EAAE;EACzBC,qBAAqB,EAAE,GAAG;EAC1BC,wBAAwB,EAAE,GAAG;EAC7BC,6BAA6B,EAAE,IAAI;EACnCC,iBAAiB,EAAE,KAAK;EACxBC,kBAAkB,EAAE,CAAC;EACrBC,yBAAyB,EAAE,CAAC;EAC5BC,oBAAoB,EAAE,CAAC;EACvBC,4BAA4B,EAAE,CAAC;EAC/BC,yBAAyB,EAAE,CAAC;EAC5BC,YAAY,EAAE,CAAC;EACfC,iBAAiB,EAAE,CAAC;EACpBC,kBAAkB,EAAE,CAAC;EACrBC,cAAc,EAAE,CAAC;EACjBC,sBAAsB,EAAE,CAAC;EACzBC,gBAAgB,EAAE,CAAC;EACnBC,qBAAqB,EAAE,CAAC;EACxBC,sBAAsB,EAAE,CAAC,CAAC;EAC1BC,wBAAwB,EAAE,CAAC,CAAC;EAC5BC,oBAAoB,EAAE,CAAC,CAAC;EACxBC,qBAAqB,EACnB,kaAAka;EACpaC,YAAY,EAAE,GAAG;EACjBC,cAAc,EAAE,GAAG;EACnBC,cAAc,EAAE,GAAG;EACnBC,cAAc,EAAE,GAAG;EACnBC,2BAA2B,EAAE,CAAC;EAC9BC,6BAA6B,EAAE,CAAC;EAChCC,uBAAuB,EAAE;AAC3B,CAAC","ignoreList":[]}
|
package/lib/module/ec.js
DELETED
|
@@ -1,267 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
|
|
3
|
-
import { generateKeyPairPromise } from './Cipher';
|
|
4
|
-
import { NativeQuickCrypto } from './NativeQuickCrypto/NativeQuickCrypto';
|
|
5
|
-
import { DSASigEnc, SignMode } from './NativeQuickCrypto/sig';
|
|
6
|
-
import { bufferLikeToArrayBuffer, binaryLikeToArrayBuffer, lazyDOMException, validateKeyOps, hasAnyNotIn, ab2str, getUsagesUnion, normalizeHashName } from './Utils';
|
|
7
|
-
import { kNamedCurveAliases, PublicKeyObject, CryptoKey, PrivateKeyObject, KeyType } from './keys';
|
|
8
|
-
// const {
|
|
9
|
-
// ArrayPrototypeIncludes,
|
|
10
|
-
// ObjectKeys,
|
|
11
|
-
// SafeSet,
|
|
12
|
-
// } = primordials;
|
|
13
|
-
|
|
14
|
-
// const {
|
|
15
|
-
// ECKeyExportJob,
|
|
16
|
-
// KeyObjectHandle,
|
|
17
|
-
// SignJob,
|
|
18
|
-
// kCryptoJobAsync,
|
|
19
|
-
// kKeyTypePrivate,
|
|
20
|
-
// kSignJobModeSign,
|
|
21
|
-
// kSignJobModeVerify,
|
|
22
|
-
// kSigEncP1363,
|
|
23
|
-
// } = internalBinding('crypto');
|
|
24
|
-
|
|
25
|
-
// const {
|
|
26
|
-
// getUsagesUnion,
|
|
27
|
-
// hasAnyNotIn,
|
|
28
|
-
// jobPromise,
|
|
29
|
-
// normalizeHashName,
|
|
30
|
-
// validateKeyOps,
|
|
31
|
-
// kHandle,
|
|
32
|
-
// kKeyObject,
|
|
33
|
-
// kNamedCurveAliases,
|
|
34
|
-
// } = require('internal/crypto/util');
|
|
35
|
-
|
|
36
|
-
// const {
|
|
37
|
-
// lazyDOMException,
|
|
38
|
-
// promisify,
|
|
39
|
-
// } = require('internal/util');
|
|
40
|
-
|
|
41
|
-
// const {
|
|
42
|
-
// generateKeyPair: _generateKeyPair,
|
|
43
|
-
// } = require('internal/crypto/keygen');
|
|
44
|
-
|
|
45
|
-
// const {
|
|
46
|
-
// InternalCryptoKey,
|
|
47
|
-
// PrivateKeyObject,
|
|
48
|
-
// PublicKeyObject,
|
|
49
|
-
// createPrivateKey,
|
|
50
|
-
// createPublicKey,
|
|
51
|
-
// } = require('internal/crypto/keys');
|
|
52
|
-
|
|
53
|
-
// const generateKeyPair = promisify(_generateKeyPair);
|
|
54
|
-
|
|
55
|
-
function verifyAcceptableEcKeyUse(name, isPublic, usages) {
|
|
56
|
-
let checkSet;
|
|
57
|
-
switch (name) {
|
|
58
|
-
case 'ECDH':
|
|
59
|
-
checkSet = isPublic ? [] : ['deriveKey', 'deriveBits'];
|
|
60
|
-
break;
|
|
61
|
-
case 'ECDSA':
|
|
62
|
-
checkSet = isPublic ? ['verify'] : ['sign'];
|
|
63
|
-
break;
|
|
64
|
-
default:
|
|
65
|
-
throw lazyDOMException('The algorithm is not supported', 'NotSupportedError');
|
|
66
|
-
}
|
|
67
|
-
if (hasAnyNotIn(usages, checkSet)) {
|
|
68
|
-
throw lazyDOMException(`Unsupported key usage for a ${name} key`, 'SyntaxError');
|
|
69
|
-
}
|
|
70
|
-
}
|
|
71
|
-
function createECPublicKeyRaw(namedCurve, keyData) {
|
|
72
|
-
if (!namedCurve) {
|
|
73
|
-
throw new Error('Invalid namedCurve');
|
|
74
|
-
}
|
|
75
|
-
const handle = NativeQuickCrypto.webcrypto.createKeyObjectHandle();
|
|
76
|
-
if (!handle.initECRaw(kNamedCurveAliases[namedCurve], keyData)) {
|
|
77
|
-
console.log('keyData', ab2str(keyData));
|
|
78
|
-
throw new Error('Invalid keyData 1');
|
|
79
|
-
}
|
|
80
|
-
return new PublicKeyObject(handle);
|
|
81
|
-
}
|
|
82
|
-
export function ecExportKey(key, format) {
|
|
83
|
-
return NativeQuickCrypto.webcrypto.ecExportKey(format, key.keyObject.handle);
|
|
84
|
-
}
|
|
85
|
-
export function ecImportKey(format, keyData, algorithm, extractable, keyUsages) {
|
|
86
|
-
const {
|
|
87
|
-
name,
|
|
88
|
-
namedCurve
|
|
89
|
-
} = algorithm;
|
|
90
|
-
|
|
91
|
-
// if (!ArrayPrototypeIncludes(ObjectKeys(kNamedCurveAliases), namedCurve)) {
|
|
92
|
-
// throw lazyDOMException('Unrecognized namedCurve', 'NotSupportedError');
|
|
93
|
-
// }
|
|
94
|
-
|
|
95
|
-
let keyObject;
|
|
96
|
-
// const usagesSet = new SafeSet(keyUsages);
|
|
97
|
-
switch (format) {
|
|
98
|
-
// case 'spki': {
|
|
99
|
-
// // verifyAcceptableEcKeyUse(name, true, usagesSet);
|
|
100
|
-
// try {
|
|
101
|
-
// keyObject = createPublicKey({
|
|
102
|
-
// key: keyData,
|
|
103
|
-
// format: 'der',
|
|
104
|
-
// type: 'spki',
|
|
105
|
-
// });
|
|
106
|
-
// } catch (err) {
|
|
107
|
-
// throw new Error(`Invalid keyData 2: ${err}`);
|
|
108
|
-
// }
|
|
109
|
-
// break;
|
|
110
|
-
// }
|
|
111
|
-
// case 'pkcs8': {
|
|
112
|
-
// // verifyAcceptableEcKeyUse(name, false, usagesSet);
|
|
113
|
-
// try {
|
|
114
|
-
// keyObject = createPrivateKey({
|
|
115
|
-
// key: keyData,
|
|
116
|
-
// format: 'der',
|
|
117
|
-
// type: 'pkcs8',
|
|
118
|
-
// });
|
|
119
|
-
// } catch (err) {
|
|
120
|
-
// throw new Error(`Invalid keyData 3 ${err}`);
|
|
121
|
-
// }
|
|
122
|
-
// break;
|
|
123
|
-
// }
|
|
124
|
-
case 'jwk':
|
|
125
|
-
{
|
|
126
|
-
const data = keyData;
|
|
127
|
-
if (!data.kty) throw lazyDOMException('Invalid keyData 4', 'DataError');
|
|
128
|
-
if (data.kty !== 'EC') throw lazyDOMException('Invalid JWK "kty" Parameter', 'DataError');
|
|
129
|
-
if (data.crv !== namedCurve) throw lazyDOMException('JWK "crv" does not match the requested algorithm', 'DataError');
|
|
130
|
-
verifyAcceptableEcKeyUse(name, data.d === undefined, keyUsages);
|
|
131
|
-
if (keyUsages.length > 0 && data.use !== undefined) {
|
|
132
|
-
const checkUse = name === 'ECDH' ? 'enc' : 'sig';
|
|
133
|
-
if (data.use !== checkUse) throw lazyDOMException('Invalid JWK "use" Parameter', 'DataError');
|
|
134
|
-
}
|
|
135
|
-
validateKeyOps(data.key_ops, keyUsages);
|
|
136
|
-
if (data.ext !== undefined && data.ext === false && extractable === true) {
|
|
137
|
-
throw lazyDOMException('JWK "ext" Parameter and extractable mismatch', 'DataError');
|
|
138
|
-
}
|
|
139
|
-
if (algorithm.name === 'ECDSA' && data.alg !== undefined) {
|
|
140
|
-
let algNamedCurve;
|
|
141
|
-
switch (data.alg) {
|
|
142
|
-
case 'ES256':
|
|
143
|
-
algNamedCurve = 'P-256';
|
|
144
|
-
break;
|
|
145
|
-
case 'ES384':
|
|
146
|
-
algNamedCurve = 'P-384';
|
|
147
|
-
break;
|
|
148
|
-
case 'ES512':
|
|
149
|
-
algNamedCurve = 'P-521';
|
|
150
|
-
break;
|
|
151
|
-
}
|
|
152
|
-
if (algNamedCurve !== namedCurve) throw lazyDOMException('JWK "alg" does not match the requested algorithm', 'DataError');
|
|
153
|
-
}
|
|
154
|
-
const handle = NativeQuickCrypto.webcrypto.createKeyObjectHandle();
|
|
155
|
-
const type = handle.initJwk(data, namedCurve);
|
|
156
|
-
if (type === undefined) throw lazyDOMException('Invalid JWK', 'DataError');
|
|
157
|
-
keyObject = type === KeyType.Private ? new PrivateKeyObject(handle) : new PublicKeyObject(handle);
|
|
158
|
-
break;
|
|
159
|
-
}
|
|
160
|
-
case 'raw':
|
|
161
|
-
{
|
|
162
|
-
const data = keyData;
|
|
163
|
-
verifyAcceptableEcKeyUse(name, true, keyUsages);
|
|
164
|
-
let buffer = typeof data === 'string' ? binaryLikeToArrayBuffer(data) : bufferLikeToArrayBuffer(data);
|
|
165
|
-
keyObject = createECPublicKeyRaw(namedCurve, buffer);
|
|
166
|
-
break;
|
|
167
|
-
}
|
|
168
|
-
default:
|
|
169
|
-
{
|
|
170
|
-
throw new Error(`Unknown EC import format: ${format}`);
|
|
171
|
-
}
|
|
172
|
-
}
|
|
173
|
-
switch (algorithm.name) {
|
|
174
|
-
case 'ECDSA':
|
|
175
|
-
// Fall through
|
|
176
|
-
case 'ECDH':
|
|
177
|
-
if (keyObject.asymmetricKeyType !== 'ec') throw new Error('Invalid key type');
|
|
178
|
-
break;
|
|
179
|
-
}
|
|
180
|
-
|
|
181
|
-
// if (!keyObject[kHandle].checkEcKeyData()) {
|
|
182
|
-
// throw new Error('Invalid keyData 5');
|
|
183
|
-
// }
|
|
184
|
-
|
|
185
|
-
// const { namedCurve: checkNamedCurve } = keyObject[kHandle].keyDetail({});
|
|
186
|
-
// if (kNamedCurveAliases[namedCurve] !== checkNamedCurve)
|
|
187
|
-
// throw new Error('Named curve mismatch');
|
|
188
|
-
|
|
189
|
-
return new CryptoKey(keyObject, {
|
|
190
|
-
name,
|
|
191
|
-
namedCurve
|
|
192
|
-
}, keyUsages, extractable);
|
|
193
|
-
}
|
|
194
|
-
export const ecdsaSignVerify = (key, data, {
|
|
195
|
-
hash
|
|
196
|
-
}, signature) => {
|
|
197
|
-
const mode = signature === undefined ? SignMode.kSignJobModeSign : SignMode.kSignJobModeVerify;
|
|
198
|
-
const type = mode === SignMode.kSignJobModeSign ? 'private' : 'public';
|
|
199
|
-
if (key.type !== type) throw lazyDOMException(`Key must be a ${type} key`, 'InvalidAccessError');
|
|
200
|
-
const hashname = normalizeHashName(hash);
|
|
201
|
-
return NativeQuickCrypto.webcrypto.signVerify(mode, key.keyObject.handle,
|
|
202
|
-
// three undefined args because C++ uses `GetPublicOrPrivateKeyFromJs` & friends
|
|
203
|
-
undefined, undefined, undefined, bufferLikeToArrayBuffer(data), hashname, undefined,
|
|
204
|
-
// salt length, not used with ECDSA
|
|
205
|
-
undefined,
|
|
206
|
-
// pss padding, not used with ECDSA
|
|
207
|
-
DSASigEnc.kSigEncP1363, bufferLikeToArrayBuffer(signature || new ArrayBuffer(0)));
|
|
208
|
-
};
|
|
209
|
-
export const ecGenerateKey = async (algorithm, extractable, keyUsages) => {
|
|
210
|
-
const {
|
|
211
|
-
name,
|
|
212
|
-
namedCurve
|
|
213
|
-
} = algorithm;
|
|
214
|
-
if (!Object.keys(kNamedCurveAliases).includes(namedCurve || '')) {
|
|
215
|
-
throw lazyDOMException(`Unrecognized namedCurve '${namedCurve}'`, 'NotSupportedError');
|
|
216
|
-
}
|
|
217
|
-
|
|
218
|
-
// const usageSet = new SafeSet(keyUsages);
|
|
219
|
-
switch (name) {
|
|
220
|
-
case 'ECDSA':
|
|
221
|
-
const checkUsages = ['sign', 'verify'];
|
|
222
|
-
if (hasAnyNotIn(keyUsages, checkUsages)) {
|
|
223
|
-
throw lazyDOMException('Unsupported key usage for an ECDSA key', 'SyntaxError');
|
|
224
|
-
}
|
|
225
|
-
break;
|
|
226
|
-
case 'ECDH':
|
|
227
|
-
if (hasAnyNotIn(keyUsages, ['deriveKey', 'deriveBits'])) {
|
|
228
|
-
throw lazyDOMException('Unsupported key usage for an ECDH key', 'SyntaxError');
|
|
229
|
-
}
|
|
230
|
-
// Fall through
|
|
231
|
-
}
|
|
232
|
-
const options = {
|
|
233
|
-
namedCurve
|
|
234
|
-
};
|
|
235
|
-
const [err, keypair] = await generateKeyPairPromise('ec', options);
|
|
236
|
-
if (err) {
|
|
237
|
-
throw lazyDOMException('ecGenerateKey (generateKeyPairPromise) failed', {
|
|
238
|
-
name: 'OperationError',
|
|
239
|
-
cause: err
|
|
240
|
-
});
|
|
241
|
-
}
|
|
242
|
-
let publicUsages = [];
|
|
243
|
-
let privateUsages = [];
|
|
244
|
-
switch (name) {
|
|
245
|
-
case 'ECDSA':
|
|
246
|
-
publicUsages = getUsagesUnion(keyUsages, 'verify');
|
|
247
|
-
privateUsages = getUsagesUnion(keyUsages, 'sign');
|
|
248
|
-
break;
|
|
249
|
-
case 'ECDH':
|
|
250
|
-
publicUsages = [];
|
|
251
|
-
privateUsages = getUsagesUnion(keyUsages, 'deriveKey', 'deriveBits');
|
|
252
|
-
break;
|
|
253
|
-
}
|
|
254
|
-
const keyAlgorithm = {
|
|
255
|
-
name,
|
|
256
|
-
namedCurve
|
|
257
|
-
};
|
|
258
|
-
const pub = new PublicKeyObject(keypair?.publicKey);
|
|
259
|
-
const publicKey = new CryptoKey(pub, keyAlgorithm, publicUsages, true);
|
|
260
|
-
const priv = new PrivateKeyObject(keypair?.privateKey);
|
|
261
|
-
const privateKey = new CryptoKey(priv, keyAlgorithm, privateUsages, extractable);
|
|
262
|
-
return {
|
|
263
|
-
publicKey,
|
|
264
|
-
privateKey
|
|
265
|
-
};
|
|
266
|
-
};
|
|
267
|
-
//# sourceMappingURL=ec.js.map
|
package/lib/module/ec.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"names":["generateKeyPairPromise","NativeQuickCrypto","DSASigEnc","SignMode","bufferLikeToArrayBuffer","binaryLikeToArrayBuffer","lazyDOMException","validateKeyOps","hasAnyNotIn","ab2str","getUsagesUnion","normalizeHashName","kNamedCurveAliases","PublicKeyObject","CryptoKey","PrivateKeyObject","KeyType","verifyAcceptableEcKeyUse","name","isPublic","usages","checkSet","createECPublicKeyRaw","namedCurve","keyData","Error","handle","webcrypto","createKeyObjectHandle","initECRaw","console","log","ecExportKey","key","format","keyObject","ecImportKey","algorithm","extractable","keyUsages","data","kty","crv","d","undefined","length","use","checkUse","key_ops","ext","alg","algNamedCurve","type","initJwk","Private","buffer","asymmetricKeyType","ecdsaSignVerify","hash","signature","mode","kSignJobModeSign","kSignJobModeVerify","hashname","signVerify","kSigEncP1363","ArrayBuffer","ecGenerateKey","Object","keys","includes","checkUsages","options","err","keypair","cause","publicUsages","privateUsages","keyAlgorithm","pub","publicKey","priv","privateKey"],"sourceRoot":"../../src","sources":["ec.ts"],"mappings":";;AAAA,SAASA,sBAAsB,QAAqC,UAAU;AAC9E,SAASC,iBAAiB,QAAQ,uCAAuC;AACzE,SAASC,SAAS,EAAEC,QAAQ,QAAQ,yBAAyB;AAC7D,SACEC,uBAAuB,EAGvBC,uBAAuB,EACvBC,gBAAgB,EAChBC,cAAc,EACdC,WAAW,EACXC,MAAM,EACNC,cAAc,EACdC,iBAAiB,QACZ,SAAS;AAChB,SAIEC,kBAAkB,EAElBC,eAAe,EAEfC,SAAS,EAGTC,gBAAgB,EAChBC,OAAO,QAEF,QAAQ;AAGf;AACA;AACA;AACA;AACA;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA;AACA;AACA;AACA;;AAEA;AACA;AACA;;AAEA;AACA;AACA;AACA;AACA;AACA;AACA;;AAEA;;AAEA,SAASC,wBAAwBA,CAC/BC,IAAkB,EAClBC,QAAiB,EACjBC,MAAkB,EACZ;EACN,IAAIC,QAAQ;EACZ,QAAQH,IAAI;IACV,KAAK,MAAM;MACTG,QAAQ,GAAGF,QAAQ,GAAG,EAAE,GAAG,CAAC,WAAW,EAAE,YAAY,CAAC;MACtD;IACF,KAAK,OAAO;MACVE,QAAQ,GAAGF,QAAQ,GAAG,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC;MAC3C;IACF;MACE,MAAMb,gBAAgB,CACpB,gCAAgC,EAChC,mBACF,CAAC;EACL;EACA,IAAIE,WAAW,CAACY,MAAM,EAAEC,QAAQ,CAAC,EAAE;IACjC,MAAMf,gBAAgB,CACnB,+BAA8BY,IAAK,MAAK,EACzC,aACF,CAAC;EACH;AACF;AAEA,SAASI,oBAAoBA,CAC3BC,UAAkC,EAClCC,OAAoB,EACH;EACjB,IAAI,CAACD,UAAU,EAAE;IACf,MAAM,IAAIE,KAAK,CAAC,oBAAoB,CAAC;EACvC;EACA,MAAMC,MAAM,GAAGzB,iBAAiB,CAAC0B,SAAS,CAACC,qBAAqB,CAAC,CAAC;EAClE,IAAI,CAACF,MAAM,CAACG,SAAS,CAACjB,kBAAkB,CAACW,UAAU,CAAC,EAAEC,OAAO,CAAC,EAAE;IAC9DM,OAAO,CAACC,GAAG,CAAC,SAAS,EAAEtB,MAAM,CAACe,OAAO,CAAC,CAAC;IACvC,MAAM,IAAIC,KAAK,CAAC,mBAAmB,CAAC;EACtC;EAEA,OAAO,IAAIZ,eAAe,CAACa,MAAM,CAAC;AACpC;AAEA,OAAO,SAASM,WAAWA,CACzBC,GAAc,EACdC,MAA2B,EACd;EACb,OAAOjC,iBAAiB,CAAC0B,SAAS,CAACK,WAAW,CAACE,MAAM,EAAED,GAAG,CAACE,SAAS,CAACT,MAAM,CAAC;AAC9E;AAEA,OAAO,SAASU,WAAWA,CACzBF,MAAoB,EACpBV,OAAsC,EACtCa,SAA0B,EAC1BC,WAAoB,EACpBC,SAAqB,EACV;EACX,MAAM;IAAErB,IAAI;IAAEK;EAAW,CAAC,GAAGc,SAAS;;EAEtC;EACA;EACA;;EAEA,IAAIF,SAAS;EACb;EACA,QAAQD,MAAM;IACZ;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA;IACA,KAAK,KAAK;MAAE;QACV,MAAMM,IAAI,GAAGhB,OAAc;QAE3B,IAAI,CAACgB,IAAI,CAACC,GAAG,EAAE,MAAMnC,gBAAgB,CAAC,mBAAmB,EAAE,WAAW,CAAC;QACvE,IAAIkC,IAAI,CAACC,GAAG,KAAK,IAAI,EACnB,MAAMnC,gBAAgB,CAAC,6BAA6B,EAAE,WAAW,CAAC;QACpE,IAAIkC,IAAI,CAACE,GAAG,KAAKnB,UAAU,EACzB,MAAMjB,gBAAgB,CACpB,kDAAkD,EAClD,WACF,CAAC;QAEHW,wBAAwB,CAACC,IAAI,EAAEsB,IAAI,CAACG,CAAC,KAAKC,SAAS,EAAEL,SAAS,CAAC;QAE/D,IAAIA,SAAS,CAACM,MAAM,GAAG,CAAC,IAAIL,IAAI,CAACM,GAAG,KAAKF,SAAS,EAAE;UAClD,MAAMG,QAAQ,GAAG7B,IAAI,KAAK,MAAM,GAAG,KAAK,GAAG,KAAK;UAChD,IAAIsB,IAAI,CAACM,GAAG,KAAKC,QAAQ,EACvB,MAAMzC,gBAAgB,CAAC,6BAA6B,EAAE,WAAW,CAAC;QACtE;QAEAC,cAAc,CAACiC,IAAI,CAACQ,OAAO,EAAET,SAAS,CAAC;QAEvC,IACEC,IAAI,CAACS,GAAG,KAAKL,SAAS,IACtBJ,IAAI,CAACS,GAAG,KAAK,KAAK,IAClBX,WAAW,KAAK,IAAI,EACpB;UACA,MAAMhC,gBAAgB,CACpB,8CAA8C,EAC9C,WACF,CAAC;QACH;QAEA,IAAI+B,SAAS,CAACnB,IAAI,KAAK,OAAO,IAAIsB,IAAI,CAACU,GAAG,KAAKN,SAAS,EAAE;UACxD,IAAIO,aAAa;UACjB,QAAQX,IAAI,CAACU,GAAG;YACd,KAAK,OAAO;cACVC,aAAa,GAAG,OAAO;cACvB;YACF,KAAK,OAAO;cACVA,aAAa,GAAG,OAAO;cACvB;YACF,KAAK,OAAO;cACVA,aAAa,GAAG,OAAO;cACvB;UACJ;UACA,IAAIA,aAAa,KAAK5B,UAAU,EAC9B,MAAMjB,gBAAgB,CACpB,kDAAkD,EAClD,WACF,CAAC;QACL;QAEA,MAAMoB,MAAM,GAAGzB,iBAAiB,CAAC0B,SAAS,CAACC,qBAAqB,CAAC,CAAC;QAClE,MAAMwB,IAAI,GAAG1B,MAAM,CAAC2B,OAAO,CAACb,IAAI,EAAEjB,UAAU,CAAC;QAC7C,IAAI6B,IAAI,KAAKR,SAAS,EACpB,MAAMtC,gBAAgB,CAAC,aAAa,EAAE,WAAW,CAAC;QACpD6B,SAAS,GACPiB,IAAI,KAAKpC,OAAO,CAACsC,OAAO,GACpB,IAAIvC,gBAAgB,CAACW,MAAM,CAAC,GAC5B,IAAIb,eAAe,CAACa,MAAM,CAAC;QACjC;MACF;IACA,KAAK,KAAK;MAAE;QACV,MAAMc,IAAI,GAAGhB,OAAkC;QAC/CP,wBAAwB,CAACC,IAAI,EAAE,IAAI,EAAEqB,SAAS,CAAC;QAC/C,IAAIgB,MAAM,GACR,OAAOf,IAAI,KAAK,QAAQ,GACpBnC,uBAAuB,CAACmC,IAAI,CAAC,GAC7BpC,uBAAuB,CAACoC,IAAI,CAAC;QACnCL,SAAS,GAAGb,oBAAoB,CAACC,UAAU,EAAEgC,MAAM,CAAC;QACpD;MACF;IACA;MAAS;QACP,MAAM,IAAI9B,KAAK,CAAE,6BAA4BS,MAAO,EAAC,CAAC;MACxD;EACF;EAEA,QAAQG,SAAS,CAACnB,IAAI;IACpB,KAAK,OAAO;IACZ;IACA,KAAK,MAAM;MACT,IAAIiB,SAAS,CAACqB,iBAAiB,KAAK,IAAI,EACtC,MAAM,IAAI/B,KAAK,CAAC,kBAAkB,CAAC;MACrC;EACJ;;EAEA;EACA;EACA;;EAEA;EACA;EACA;;EAEA,OAAO,IAAIX,SAAS,CAACqB,SAAS,EAAE;IAAEjB,IAAI;IAAEK;EAAW,CAAC,EAAEgB,SAAS,EAAED,WAAW,CAAC;AAC/E;AAEA,OAAO,MAAMmB,eAAe,GAAGA,CAC7BxB,GAAc,EACdO,IAAgB,EAChB;EAAEkB;AAAsB,CAAC,EACzBC,SAAsB,KACnB;EACH,MAAMC,IAAc,GAClBD,SAAS,KAAKf,SAAS,GACnBzC,QAAQ,CAAC0D,gBAAgB,GACzB1D,QAAQ,CAAC2D,kBAAkB;EACjC,MAAMV,IAAI,GAAGQ,IAAI,KAAKzD,QAAQ,CAAC0D,gBAAgB,GAAG,SAAS,GAAG,QAAQ;EAEtE,IAAI5B,GAAG,CAACmB,IAAI,KAAKA,IAAI,EACnB,MAAM9C,gBAAgB,CAAE,iBAAgB8C,IAAK,MAAK,EAAE,oBAAoB,CAAC;EAE3E,MAAMW,QAAQ,GAAGpD,iBAAiB,CAAC+C,IAAI,CAAC;EAExC,OAAOzD,iBAAiB,CAAC0B,SAAS,CAACqC,UAAU,CAC3CJ,IAAI,EACJ3B,GAAG,CAACE,SAAS,CAACT,MAAM;EACpB;EACAkB,SAAS,EACTA,SAAS,EACTA,SAAS,EACTxC,uBAAuB,CAACoC,IAAI,CAAC,EAC7BuB,QAAQ,EACRnB,SAAS;EAAE;EACXA,SAAS;EAAE;EACX1C,SAAS,CAAC+D,YAAY,EACtB7D,uBAAuB,CAACuD,SAAS,IAAI,IAAIO,WAAW,CAAC,CAAC,CAAC,CACzD,CAAC;AACH,CAAC;AAED,OAAO,MAAMC,aAAa,GAAG,MAAAA,CAC3B9B,SAA0B,EAC1BC,WAAoB,EACpBC,SAAqB,KACM;EAC3B,MAAM;IAAErB,IAAI;IAAEK;EAAW,CAAC,GAAGc,SAAS;EAEtC,IAAI,CAAC+B,MAAM,CAACC,IAAI,CAACzD,kBAAkB,CAAC,CAAC0D,QAAQ,CAAC/C,UAAU,IAAI,EAAE,CAAC,EAAE;IAC/D,MAAMjB,gBAAgB,CACnB,4BAA2BiB,UAAW,GAAE,EACzC,mBACF,CAAC;EACH;;EAEA;EACA,QAAQL,IAAI;IACV,KAAK,OAAO;MACV,MAAMqD,WAAW,GAAG,CAAC,MAAM,EAAE,QAAQ,CAAC;MACtC,IAAI/D,WAAW,CAAC+B,SAAS,EAAEgC,WAAW,CAAC,EAAE;QACvC,MAAMjE,gBAAgB,CACpB,wCAAwC,EACxC,aACF,CAAC;MACH;MACA;IACF,KAAK,MAAM;MACT,IAAIE,WAAW,CAAC+B,SAAS,EAAE,CAAC,WAAW,EAAE,YAAY,CAAC,CAAC,EAAE;QACvD,MAAMjC,gBAAgB,CACpB,uCAAuC,EACvC,aACF,CAAC;MACH;IACF;EACF;EAEA,MAAMkE,OAA+B,GAAG;IAAEjD;EAAW,CAAC;EACtD,MAAM,CAACkD,GAAG,EAAEC,OAAO,CAAC,GAAG,MAAM1E,sBAAsB,CAAC,IAAI,EAAEwE,OAAO,CAAC;EAElE,IAAIC,GAAG,EAAE;IACP,MAAMnE,gBAAgB,CAAC,+CAA+C,EAAE;MACtEY,IAAI,EAAE,gBAAgB;MACtByD,KAAK,EAAEF;IACT,CAAC,CAAC;EACJ;EAEA,IAAIG,YAAwB,GAAG,EAAE;EACjC,IAAIC,aAAyB,GAAG,EAAE;EAClC,QAAQ3D,IAAI;IACV,KAAK,OAAO;MACV0D,YAAY,GAAGlE,cAAc,CAAC6B,SAAS,EAAE,QAAQ,CAAC;MAClDsC,aAAa,GAAGnE,cAAc,CAAC6B,SAAS,EAAE,MAAM,CAAC;MACjD;IACF,KAAK,MAAM;MACTqC,YAAY,GAAG,EAAE;MACjBC,aAAa,GAAGnE,cAAc,CAAC6B,SAAS,EAAE,WAAW,EAAE,YAAY,CAAC;MACpE;EACJ;EAEA,MAAMuC,YAAY,GAAG;IAAE5D,IAAI;IAAEK;EAAW,CAAC;EAEzC,MAAMwD,GAAG,GAAG,IAAIlE,eAAe,CAAC6D,OAAO,EAAEM,SAA4B,CAAC;EACtE,MAAMA,SAAS,GAAG,IAAIlE,SAAS,CAACiE,GAAG,EAAED,YAAY,EAAEF,YAAY,EAAE,IAAI,CAAC;EAEtE,MAAMK,IAAI,GAAG,IAAIlE,gBAAgB,CAAC2D,OAAO,EAAEQ,UAA6B,CAAC;EACzE,MAAMA,UAAU,GAAG,IAAIpE,SAAS,CAC9BmE,IAAI,EACJH,YAAY,EACZD,aAAa,EACbvC,WACF,CAAC;EAED,OAAO;IAAE0C,SAAS;IAAEE;EAAW,CAAC;AAClC,CAAC","ignoreList":[]}
|