simple-crypto-utils 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/crypto/decrypt.d.ts +1 -0
- package/dist/crypto/decrypt.d.ts.map +1 -0
- package/dist/crypto/decrypt.js +2 -0
- package/dist/crypto/decrypt.js.map +1 -0
- package/dist/crypto/encrypt.d.ts +1 -0
- package/dist/crypto/encrypt.d.ts.map +1 -0
- package/dist/crypto/encrypt.js +2 -0
- package/dist/crypto/encrypt.js.map +1 -0
- package/dist/crypto/signMessage.d.ts +1 -0
- package/dist/crypto/signMessage.d.ts.map +1 -0
- package/dist/crypto/signMessage.js +2 -0
- package/dist/crypto/signMessage.js.map +1 -0
- package/dist/crypto/verifyMessage.d.ts +1 -0
- package/dist/crypto/verifyMessage.d.ts.map +1 -0
- package/dist/crypto/verifyMessage.js +2 -0
- package/dist/crypto/verifyMessage.js.map +1 -0
- package/dist/crypto-asymmetricaly/file/decryptFile.d.ts +2 -0
- package/dist/crypto-asymmetricaly/file/decryptFile.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/file/decryptFile.js +93 -0
- package/dist/crypto-asymmetricaly/file/decryptFile.js.map +1 -0
- package/dist/crypto-asymmetricaly/file/encryptFile.d.ts +3 -0
- package/dist/crypto-asymmetricaly/file/encryptFile.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/file/encryptFile.js +110 -0
- package/dist/crypto-asymmetricaly/file/encryptFile.js.map +1 -0
- package/dist/crypto-asymmetricaly/index.d.ts +5 -0
- package/dist/crypto-asymmetricaly/index.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/index.js +5 -0
- package/dist/crypto-asymmetricaly/index.js.map +1 -0
- package/dist/crypto-asymmetricaly/keys/generateRSA.d.ts +5 -0
- package/dist/crypto-asymmetricaly/keys/generateRSA.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/keys/generateRSA.js +24 -0
- package/dist/crypto-asymmetricaly/keys/generateRSA.js.map +1 -0
- package/dist/crypto-asymmetricaly/rsa/unwrapKey.d.ts +1 -0
- package/dist/crypto-asymmetricaly/rsa/unwrapKey.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/rsa/unwrapKey.js +2 -0
- package/dist/crypto-asymmetricaly/rsa/unwrapKey.js.map +1 -0
- package/dist/crypto-asymmetricaly/rsa/wrapKey.d.ts +1 -0
- package/dist/crypto-asymmetricaly/rsa/wrapKey.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/rsa/wrapKey.js +2 -0
- package/dist/crypto-asymmetricaly/rsa/wrapKey.js.map +1 -0
- package/dist/crypto-asymmetricaly/string/decryptString.d.ts +2 -0
- package/dist/crypto-asymmetricaly/string/decryptString.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/string/decryptString.js +47 -0
- package/dist/crypto-asymmetricaly/string/decryptString.js.map +1 -0
- package/dist/crypto-asymmetricaly/string/encryptString.d.ts +7 -0
- package/dist/crypto-asymmetricaly/string/encryptString.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/string/encryptString.js +26 -0
- package/dist/crypto-asymmetricaly/string/encryptString.js.map +1 -0
- package/dist/crypto-asymmetricaly/string/generateAES.d.ts +5 -0
- package/dist/crypto-asymmetricaly/string/generateAES.d.ts.map +1 -0
- package/dist/crypto-asymmetricaly/string/generateAES.js +7 -0
- package/dist/crypto-asymmetricaly/string/generateAES.js.map +1 -0
- package/dist/crypto-symmetricaly/decrypt.d.ts +2 -0
- package/dist/crypto-symmetricaly/decrypt.d.ts.map +1 -0
- package/dist/crypto-symmetricaly/decrypt.js +14 -0
- package/dist/crypto-symmetricaly/decrypt.js.map +1 -0
- package/dist/crypto-symmetricaly/encrypt.d.ts +2 -0
- package/dist/crypto-symmetricaly/encrypt.d.ts.map +1 -0
- package/dist/crypto-symmetricaly/encrypt.js +16 -0
- package/dist/crypto-symmetricaly/encrypt.js.map +1 -0
- package/dist/crypto-symmetricaly/index.d.ts +3 -0
- package/dist/crypto-symmetricaly/index.d.ts.map +1 -0
- package/dist/crypto-symmetricaly/index.js +3 -0
- package/dist/crypto-symmetricaly/index.js.map +1 -0
- package/dist/crypto-symmetricaly/signMessage.d.ts +1 -0
- package/dist/crypto-symmetricaly/signMessage.d.ts.map +1 -0
- package/dist/crypto-symmetricaly/signMessage.js +2 -0
- package/dist/crypto-symmetricaly/signMessage.js.map +1 -0
- package/dist/crypto-symmetricaly/verifyMessage.d.ts +1 -0
- package/dist/crypto-symmetricaly/verifyMessage.d.ts.map +1 -0
- package/dist/crypto-symmetricaly/verifyMessage.js +2 -0
- package/dist/crypto-symmetricaly/verifyMessage.js.map +1 -0
- package/dist/hash/hash.d.ts +2 -0
- package/dist/hash/hash.d.ts.map +1 -0
- package/dist/hash/hash.js +7 -0
- package/dist/hash/hash.js.map +1 -0
- package/dist/hash/hashHmac.d.ts +2 -0
- package/dist/hash/hashHmac.d.ts.map +1 -0
- package/dist/hash/hashHmac.js +5 -0
- package/dist/hash/hashHmac.js.map +1 -0
- package/dist/hash/index.d.ts +4 -0
- package/dist/hash/index.d.ts.map +1 -0
- package/dist/hash/index.js +4 -0
- package/dist/hash/index.js.map +1 -0
- package/dist/hash/verifyHmac.d.ts +2 -0
- package/dist/hash/verifyHmac.d.ts.map +1 -0
- package/dist/hash/verifyHmac.js +10 -0
- package/dist/hash/verifyHmac.js.map +1 -0
- package/dist/index.cjs +1569 -0
- package/dist/index.d.cts +350 -0
- package/dist/index.d.ts +350 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +1546 -0
- package/dist/index.js.map +1 -0
- package/dist/otp/TOTP.d.ts +10 -0
- package/dist/otp/TOTP.d.ts.map +1 -0
- package/dist/otp/TOTP.js +33 -0
- package/dist/otp/TOTP.js.map +1 -0
- package/dist/otp/generate.d.ts +2 -0
- package/dist/otp/generate.d.ts.map +1 -0
- package/dist/otp/generate.js +7 -0
- package/dist/otp/generate.js.map +1 -0
- package/dist/otp/generateOTP.d.ts +1 -0
- package/dist/otp/generateOTP.d.ts.map +1 -0
- package/dist/otp/generateOTP.js +2 -0
- package/dist/otp/generateOTP.js.map +1 -0
- package/dist/otp/hash.d.ts +2 -0
- package/dist/otp/hash.d.ts.map +1 -0
- package/dist/otp/hash.js +5 -0
- package/dist/otp/hash.js.map +1 -0
- package/dist/otp/index.d.ts +3 -0
- package/dist/otp/index.d.ts.map +1 -0
- package/dist/otp/index.js +3 -0
- package/dist/otp/index.js.map +1 -0
- package/dist/otp/verifyOTP.d.ts +1 -0
- package/dist/otp/verifyOTP.d.ts.map +1 -0
- package/dist/otp/verifyOTP.js +2 -0
- package/dist/otp/verifyOTP.js.map +1 -0
- package/dist/password/generate.d.ts +15 -0
- package/dist/password/generate.d.ts.map +1 -0
- package/dist/password/generate.js +44 -0
- package/dist/password/generate.js.map +1 -0
- package/dist/password/generatePassword.d.ts +2 -0
- package/dist/password/generatePassword.d.ts.map +1 -0
- package/dist/password/generatePassword.js +10 -0
- package/dist/password/generatePassword.js.map +1 -0
- package/dist/password/hash.d.ts +2 -0
- package/dist/password/hash.d.ts.map +1 -0
- package/dist/password/hash.js +12 -0
- package/dist/password/hash.js.map +1 -0
- package/dist/password/hashPassword.d.ts +1 -0
- package/dist/password/hashPassword.d.ts.map +1 -0
- package/dist/password/hashPassword.js +2 -0
- package/dist/password/hashPassword.js.map +1 -0
- package/dist/password/index.d.ts +4 -0
- package/dist/password/index.d.ts.map +1 -0
- package/dist/password/index.js +4 -0
- package/dist/password/index.js.map +1 -0
- package/dist/password/validatePassword.d.ts +1 -0
- package/dist/password/validatePassword.d.ts.map +1 -0
- package/dist/password/validatePassword.js +2 -0
- package/dist/password/validatePassword.js.map +1 -0
- package/dist/password/verify.d.ts +2 -0
- package/dist/password/verify.d.ts.map +1 -0
- package/dist/password/verify.js +33 -0
- package/dist/password/verify.js.map +1 -0
- package/dist/password/verifyPassword.d.ts +1 -0
- package/dist/password/verifyPassword.d.ts.map +1 -0
- package/dist/password/verifyPassword.js +2 -0
- package/dist/password/verifyPassword.js.map +1 -0
- package/dist/signature/index.d.ts +46 -0
- package/dist/signature/index.d.ts.map +1 -0
- package/dist/signature/index.js +51 -0
- package/dist/signature/index.js.map +1 -0
- package/dist/signature/serialize.d.ts +4 -0
- package/dist/signature/serialize.d.ts.map +1 -0
- package/dist/signature/serialize.js +33 -0
- package/dist/signature/serialize.js.map +1 -0
- package/dist/signature/sign.d.ts +3 -0
- package/dist/signature/sign.d.ts.map +1 -0
- package/dist/signature/sign.js +26 -0
- package/dist/signature/sign.js.map +1 -0
- package/dist/signature/types.d.ts +16 -0
- package/dist/signature/types.d.ts.map +1 -0
- package/dist/signature/types.js +2 -0
- package/dist/signature/types.js.map +1 -0
- package/dist/signature/verify.d.ts +3 -0
- package/dist/signature/verify.d.ts.map +1 -0
- package/dist/signature/verify.js +26 -0
- package/dist/signature/verify.js.map +1 -0
- package/dist/test-minimal.d.ts +1 -0
- package/dist/test-minimal.d.ts.map +1 -0
- package/dist/test-minimal.js +4 -0
- package/dist/test-minimal.js.map +1 -0
- package/dist/test.d.ts +2 -0
- package/dist/test.d.ts.map +1 -0
- package/dist/test.js +33 -0
- package/dist/test.js.map +1 -0
- package/dist/token/generateRandomToken.d.ts +1 -0
- package/dist/token/generateRandomToken.d.ts.map +1 -0
- package/dist/token/generateRandomToken.js +2 -0
- package/dist/token/generateRandomToken.js.map +1 -0
- package/dist/token/generateUUID.d.ts +1 -0
- package/dist/token/generateUUID.d.ts.map +1 -0
- package/dist/token/generateUUID.js +2 -0
- package/dist/token/generateUUID.js.map +1 -0
- package/dist/token/hashToken.d.ts +1 -0
- package/dist/token/hashToken.d.ts.map +1 -0
- package/dist/token/hashToken.js +2 -0
- package/dist/token/hashToken.js.map +1 -0
- package/dist/utlis/constants.d.ts +4 -0
- package/dist/utlis/constants.d.ts.map +1 -0
- package/dist/utlis/constants.js +4 -0
- package/dist/utlis/constants.js.map +1 -0
- package/dist/utlis/entropyScore.d.ts +1 -0
- package/dist/utlis/entropyScore.d.ts.map +1 -0
- package/dist/utlis/entropyScore.js +2 -0
- package/dist/utlis/entropyScore.js.map +1 -0
- package/dist/utlis/generateRandomBytes.d.ts +2 -0
- package/dist/utlis/generateRandomBytes.d.ts.map +1 -0
- package/dist/utlis/generateRandomBytes.js +9 -0
- package/dist/utlis/generateRandomBytes.js.map +1 -0
- package/dist/utlis/maskSensitive.d.ts +1 -0
- package/dist/utlis/maskSensitive.d.ts.map +1 -0
- package/dist/utlis/maskSensitive.js +2 -0
- package/dist/utlis/maskSensitive.js.map +1 -0
- package/dist/utlis/safeCompare.d.ts +1 -0
- package/dist/utlis/safeCompare.d.ts.map +1 -0
- package/dist/utlis/safeCompare.js +2 -0
- package/dist/utlis/safeCompare.js.map +1 -0
- package/dist/uuid/generate.d.ts +2 -0
- package/dist/uuid/generate.d.ts.map +1 -0
- package/dist/uuid/generate.js +5 -0
- package/dist/uuid/generate.js.map +1 -0
- package/dist/uuid/hashToken.d.ts +1 -0
- package/dist/uuid/hashToken.d.ts.map +1 -0
- package/dist/uuid/hashToken.js +6 -0
- package/dist/uuid/hashToken.js.map +1 -0
- package/dist/uuid/index.d.ts +2 -0
- package/dist/uuid/index.d.ts.map +1 -0
- package/dist/uuid/index.js +2 -0
- package/dist/uuid/index.js.map +1 -0
- package/license +18 -0
- package/package.json +74 -0
- package/readme.md +697 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=decrypt.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"decrypt.d.ts","sourceRoot":"","sources":["../../src/crypto/decrypt.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"decrypt.js","sourceRoot":"","sources":["../../src/crypto/decrypt.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=encrypt.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"encrypt.d.ts","sourceRoot":"","sources":["../../src/crypto/encrypt.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"encrypt.js","sourceRoot":"","sources":["../../src/crypto/encrypt.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=signMessage.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"signMessage.d.ts","sourceRoot":"","sources":["../../src/crypto/signMessage.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"signMessage.js","sourceRoot":"","sources":["../../src/crypto/signMessage.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=verifyMessage.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"verifyMessage.d.ts","sourceRoot":"","sources":["../../src/crypto/verifyMessage.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"verifyMessage.js","sourceRoot":"","sources":["../../src/crypto/verifyMessage.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"decryptFile.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/file/decryptFile.ts"],"names":[],"mappings":"AAWA,wBAAsB,WAAW,CAC/B,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,UAAU,EAAE,MAAM,iBA4HnB"}
|
|
@@ -0,0 +1,93 @@
|
|
|
1
|
+
import { createReadStream, createWriteStream } from "fs";
|
|
2
|
+
import { createDecipheriv, privateDecrypt, constants } from "crypto";
|
|
3
|
+
import { pipeline } from "stream/promises";
|
|
4
|
+
import { open } from "fs/promises";
|
|
5
|
+
export async function decryptFile(inputPath, outputPath, privateKey) {
|
|
6
|
+
// 1️⃣ Open file handle (doesn't load into memory)
|
|
7
|
+
const fileHandle = await open(inputPath, "r");
|
|
8
|
+
try {
|
|
9
|
+
// 2️⃣ Read only the first 4 bytes to get header length
|
|
10
|
+
const headerLengthBuf = Buffer.alloc(4);
|
|
11
|
+
const { bytesRead: lengthBytesRead } = await fileHandle.read(headerLengthBuf, 0, 4, 0);
|
|
12
|
+
if (lengthBytesRead < 4) {
|
|
13
|
+
throw new Error(`File is too small (${lengthBytesRead} bytes). Expected at least 4 bytes for header length.`);
|
|
14
|
+
}
|
|
15
|
+
const headerLength = headerLengthBuf.readUInt32BE(0);
|
|
16
|
+
console.log("Header length:", headerLength);
|
|
17
|
+
// 3️⃣ Validate header length is reasonable
|
|
18
|
+
if (headerLength > 10000) {
|
|
19
|
+
throw new Error(`Header length suspiciously large (${headerLength} bytes). File may be corrupted.`);
|
|
20
|
+
}
|
|
21
|
+
// 4️⃣ Read only the header (not the entire file!)
|
|
22
|
+
const headerBuf = Buffer.alloc(headerLength);
|
|
23
|
+
const { bytesRead: headerBytesRead } = await fileHandle.read(headerBuf, 0, headerLength, 4);
|
|
24
|
+
if (headerBytesRead < headerLength) {
|
|
25
|
+
throw new Error(`File is too short to contain the header. Expected ${headerLength} bytes, got ${headerBytesRead}`);
|
|
26
|
+
}
|
|
27
|
+
// 5️⃣ Parse header JSON
|
|
28
|
+
const headerJson = headerBuf.toString("utf8");
|
|
29
|
+
console.log("Header JSON:", headerJson);
|
|
30
|
+
let header;
|
|
31
|
+
try {
|
|
32
|
+
header = JSON.parse(headerJson);
|
|
33
|
+
}
|
|
34
|
+
catch (e) {
|
|
35
|
+
throw new Error(`Failed to parse header JSON: ${e}`);
|
|
36
|
+
}
|
|
37
|
+
// 6️⃣ Validate header fields
|
|
38
|
+
if (!header.encryptedKey || !header.iv || !header.authTag) {
|
|
39
|
+
throw new Error("Invalid header: missing required fields");
|
|
40
|
+
}
|
|
41
|
+
// 7️⃣ Extract buffers from base64
|
|
42
|
+
const encryptedKeyBuf = Buffer.from(header.encryptedKey, "base64");
|
|
43
|
+
const iv = Buffer.from(header.iv, "base64");
|
|
44
|
+
const authTag = Buffer.from(header.authTag, "base64");
|
|
45
|
+
console.log("Encrypted key length:", encryptedKeyBuf.length);
|
|
46
|
+
console.log("IV length:", iv.length);
|
|
47
|
+
console.log("Auth tag length:", authTag.length);
|
|
48
|
+
// 8️⃣ Validate buffer sizes
|
|
49
|
+
if (iv.length !== 12) {
|
|
50
|
+
throw new Error(`Invalid IV length: expected 12 bytes, got ${iv.length}`);
|
|
51
|
+
}
|
|
52
|
+
if (authTag.length !== 16) {
|
|
53
|
+
throw new Error(`Invalid auth tag length: expected 16 bytes, got ${authTag.length}`);
|
|
54
|
+
}
|
|
55
|
+
// 9️⃣ Decrypt AES key with RSA private key
|
|
56
|
+
let aesKey;
|
|
57
|
+
try {
|
|
58
|
+
aesKey = privateDecrypt({
|
|
59
|
+
key: privateKey,
|
|
60
|
+
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
61
|
+
oaepHash: "sha256",
|
|
62
|
+
}, encryptedKeyBuf);
|
|
63
|
+
}
|
|
64
|
+
catch (e) {
|
|
65
|
+
throw new Error(`Failed to decrypt AES key: ${e}`);
|
|
66
|
+
}
|
|
67
|
+
// Validate AES key length
|
|
68
|
+
if (aesKey.length !== 32) {
|
|
69
|
+
throw new Error(`Invalid AES key length: expected 32 bytes, got ${aesKey.length}`);
|
|
70
|
+
}
|
|
71
|
+
// 🔟 Create decipher
|
|
72
|
+
const decipher = createDecipheriv("aes-256-gcm", aesKey, iv);
|
|
73
|
+
decipher.setAuthTag(authTag);
|
|
74
|
+
// 1️⃣1️⃣ Stream encrypted content (after header) → decipher → output
|
|
75
|
+
// This streams the data, never loading the full file into memory
|
|
76
|
+
const inputStream = createReadStream(inputPath, {
|
|
77
|
+
start: 4 + headerLength,
|
|
78
|
+
});
|
|
79
|
+
const outputStream = createWriteStream(outputPath);
|
|
80
|
+
try {
|
|
81
|
+
await pipeline(inputStream, decipher, outputStream);
|
|
82
|
+
console.log("✅ File decrypted successfully");
|
|
83
|
+
}
|
|
84
|
+
catch (e) {
|
|
85
|
+
throw new Error(`Decryption failed (authentication error): ${e}`);
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
finally {
|
|
89
|
+
// Always close the file handle
|
|
90
|
+
await fileHandle.close();
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
//# sourceMappingURL=decryptFile.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"decryptFile.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/file/decryptFile.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,IAAI,CAAC;AACzD,OAAO,EAAE,gBAAgB,EAAE,cAAc,EAAE,SAAS,EAAE,MAAM,QAAQ,CAAC;AACrE,OAAO,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAC3C,OAAO,EAAE,IAAI,EAAE,MAAM,aAAa,CAAC;AAQnC,MAAM,CAAC,KAAK,UAAU,WAAW,CAC/B,SAAiB,EACjB,UAAkB,EAClB,UAAkB;IAElB,kDAAkD;IAClD,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,SAAS,EAAE,GAAG,CAAC,CAAC;IAE9C,IAAI,CAAC;QACH,uDAAuD;QACvD,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QACxC,MAAM,EAAE,SAAS,EAAE,eAAe,EAAE,GAAG,MAAM,UAAU,CAAC,IAAI,CAC1D,eAAe,EACf,CAAC,EACD,CAAC,EACD,CAAC,CACF,CAAC;QAEF,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;YACxB,MAAM,IAAI,KAAK,CACb,sBAAsB,eAAe,uDAAuD,CAC7F,CAAC;QACJ,CAAC;QAED,MAAM,YAAY,GAAG,eAAe,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;QACrD,OAAO,CAAC,GAAG,CAAC,gBAAgB,EAAE,YAAY,CAAC,CAAC;QAE5C,2CAA2C;QAC3C,IAAI,YAAY,GAAG,KAAK,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CACb,qCAAqC,YAAY,iCAAiC,CACnF,CAAC;QACJ,CAAC;QAED,kDAAkD;QAClD,MAAM,SAAS,GAAG,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC;QAC7C,MAAM,EAAE,SAAS,EAAE,eAAe,EAAE,GAAG,MAAM,UAAU,CAAC,IAAI,CAC1D,SAAS,EACT,CAAC,EACD,YAAY,EACZ,CAAC,CACF,CAAC;QAEF,IAAI,eAAe,GAAG,YAAY,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,qDAAqD,YAAY,eAAe,eAAe,EAAE,CAClG,CAAC;QACJ,CAAC;QAED,wBAAwB;QACxB,MAAM,UAAU,GAAG,SAAS,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAC9C,OAAO,CAAC,GAAG,CAAC,cAAc,EAAE,UAAU,CAAC,CAAC;QAExC,IAAI,MAAkB,CAAC;QACvB,IAAI,CAAC;YACH,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;QAClC,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,EAAE,CAAC,CAAC;QACvD,CAAC;QAED,6BAA6B;QAC7B,IAAI,CAAC,MAAM,CAAC,YAAY,IAAI,CAAC,MAAM,CAAC,EAAE,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YAC1D,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,kCAAkC;QAClC,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC;QACnE,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,EAAE,QAAQ,CAAC,CAAC;QAC5C,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAEtD,OAAO,CAAC,GAAG,CAAC,uBAAuB,EAAE,eAAe,CAAC,MAAM,CAAC,CAAC;QAC7D,OAAO,CAAC,GAAG,CAAC,YAAY,EAAE,EAAE,CAAC,MAAM,CAAC,CAAC;QACrC,OAAO,CAAC,GAAG,CAAC,kBAAkB,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;QAEhD,4BAA4B;QAC5B,IAAI,EAAE,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;YACrB,MAAM,IAAI,KAAK,CAAC,6CAA6C,EAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QAC5E,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;YAC1B,MAAM,IAAI,KAAK,CACb,mDAAmD,OAAO,CAAC,MAAM,EAAE,CACpE,CAAC;QACJ,CAAC;QAED,2CAA2C;QAC3C,IAAI,MAAc,CAAC;QACnB,IAAI,CAAC;YACH,MAAM,GAAG,cAAc,CACrB;gBACE,GAAG,EAAE,UAAU;gBACf,OAAO,EAAE,SAAS,CAAC,sBAAsB;gBACzC,QAAQ,EAAE,QAAQ;aACnB,EACD,eAAe,CAChB,CAAC;QACJ,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,EAAE,CAAC,CAAC;QACrD,CAAC;QAED,0BAA0B;QAC1B,IAAI,MAAM,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CACb,kDAAkD,MAAM,CAAC,MAAM,EAAE,CAClE,CAAC;QACJ,CAAC;QAED,qBAAqB;QACrB,MAAM,QAAQ,GAAG,gBAAgB,CAAC,aAAa,EAAE,MAAM,EAAE,EAAE,CAAC,CAAC;QAC7D,QAAQ,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAE7B,qEAAqE;QACrE,iEAAiE;QACjE,MAAM,WAAW,GAAG,gBAAgB,CAAC,SAAS,EAAE;YAC9C,KAAK,EAAE,CAAC,GAAG,YAAY;SACxB,CAAC,CAAC;QACH,MAAM,YAAY,GAAG,iBAAiB,CAAC,UAAU,CAAC,CAAC;QAEnD,IAAI,CAAC;YACH,MAAM,QAAQ,CAAC,WAAW,EAAE,QAAQ,EAAE,YAAY,CAAC,CAAC;YACpD,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,CAAC;QAC/C,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,EAAE,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;YAAS,CAAC;QACT,+BAA+B;QAC/B,MAAM,UAAU,CAAC,KAAK,EAAE,CAAC;IAC3B,CAAC;AACH,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"encryptFile.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/file/encryptFile.ts"],"names":[],"mappings":"AAoBA,wBAAsB,WAAW,CAC/B,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,SAAS,EAAE,MAAM,iBAelB;AAoED,wBAAsB,gBAAgB,CACpC,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,SAAS,EAAE,MAAM,iBAyDlB"}
|
|
@@ -0,0 +1,110 @@
|
|
|
1
|
+
import { createReadStream, createWriteStream, readFileSync, writeFileSync, statSync, } from "fs";
|
|
2
|
+
import { createCipheriv, publicEncrypt, randomBytes, constants } from "crypto";
|
|
3
|
+
import { pipeline } from "stream/promises";
|
|
4
|
+
import { tmpdir } from "os";
|
|
5
|
+
import { join } from "path";
|
|
6
|
+
// Memory-efficient version for large files
|
|
7
|
+
export async function encryptFile(inputPath, outputPath, publicKey) {
|
|
8
|
+
const LARGE_FILE_THRESHOLD = 100 * 1024 * 1024; // 100 MB
|
|
9
|
+
const fileSize = statSync(inputPath).size;
|
|
10
|
+
if (fileSize > LARGE_FILE_THRESHOLD) {
|
|
11
|
+
console.log(`Large file detected (${(fileSize / 1024 / 1024).toFixed(2)} MB), using streaming...`);
|
|
12
|
+
return encryptFileStreaming(inputPath, outputPath, publicKey);
|
|
13
|
+
}
|
|
14
|
+
else {
|
|
15
|
+
return encryptFileSmall(inputPath, outputPath, publicKey);
|
|
16
|
+
}
|
|
17
|
+
}
|
|
18
|
+
// Streaming version - never loads full file into memory
|
|
19
|
+
async function encryptFileStreaming(inputPath, outputPath, publicKey) {
|
|
20
|
+
// 1️⃣ Generate AES key + IV
|
|
21
|
+
const aesKey = randomBytes(32);
|
|
22
|
+
const iv = randomBytes(12);
|
|
23
|
+
// 2️⃣ Encrypt AES key with RSA
|
|
24
|
+
const encryptedKeyBuf = publicEncrypt({
|
|
25
|
+
key: publicKey,
|
|
26
|
+
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
27
|
+
oaepHash: "sha256",
|
|
28
|
+
}, aesKey);
|
|
29
|
+
// 3️⃣ Encrypt to temporary file
|
|
30
|
+
const tempPath = join(tmpdir(), `temp-encrypt-${Date.now()}.tmp`);
|
|
31
|
+
const tempStream = createWriteStream(tempPath);
|
|
32
|
+
const cipher = createCipheriv("aes-256-gcm", aesKey, iv);
|
|
33
|
+
const inputStream = createReadStream(inputPath);
|
|
34
|
+
await pipeline(inputStream, cipher, tempStream);
|
|
35
|
+
// 4️⃣ Get authTag
|
|
36
|
+
const authTag = cipher.getAuthTag();
|
|
37
|
+
// 5️⃣ Create header
|
|
38
|
+
const header = {
|
|
39
|
+
encryptedKey: encryptedKeyBuf.toString("base64"),
|
|
40
|
+
iv: iv.toString("base64"),
|
|
41
|
+
authTag: authTag.toString("base64"),
|
|
42
|
+
};
|
|
43
|
+
const headerJson = Buffer.from(JSON.stringify(header), "utf8");
|
|
44
|
+
const headerLengthBuf = Buffer.alloc(4);
|
|
45
|
+
headerLengthBuf.writeUInt32BE(headerJson.length, 0);
|
|
46
|
+
// 6️⃣ Stream temp file to final output (memory-efficient)
|
|
47
|
+
const outputStream = createWriteStream(outputPath);
|
|
48
|
+
// Write header first
|
|
49
|
+
outputStream.write(headerLengthBuf);
|
|
50
|
+
outputStream.write(headerJson);
|
|
51
|
+
// Stream encrypted data
|
|
52
|
+
const tempReadStream = createReadStream(tempPath);
|
|
53
|
+
await pipeline(tempReadStream, outputStream);
|
|
54
|
+
// 7️⃣ Clean up temp file
|
|
55
|
+
try {
|
|
56
|
+
const { unlinkSync } = await import("fs");
|
|
57
|
+
unlinkSync(tempPath);
|
|
58
|
+
}
|
|
59
|
+
catch (e) {
|
|
60
|
+
console.warn("Could not delete temp file:", tempPath);
|
|
61
|
+
}
|
|
62
|
+
console.log("✅ File encrypted successfully (streaming mode)");
|
|
63
|
+
console.log("Header length:", headerJson.length);
|
|
64
|
+
}
|
|
65
|
+
// Original version - good for files < 100 MB
|
|
66
|
+
export async function encryptFileSmall(inputPath, outputPath, publicKey) {
|
|
67
|
+
// 1️⃣ Generate AES key + IV
|
|
68
|
+
const aesKey = randomBytes(32);
|
|
69
|
+
const iv = randomBytes(12);
|
|
70
|
+
// 2️⃣ Encrypt AES key with RSA
|
|
71
|
+
const encryptedKeyBuf = publicEncrypt({
|
|
72
|
+
key: publicKey,
|
|
73
|
+
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
74
|
+
oaepHash: "sha256",
|
|
75
|
+
}, aesKey);
|
|
76
|
+
// 3️⃣ Encrypt to temporary file first to get authTag
|
|
77
|
+
const tempPath = join(tmpdir(), `temp-encrypt-${Date.now()}.tmp`);
|
|
78
|
+
const tempStream = createWriteStream(tempPath);
|
|
79
|
+
const cipher = createCipheriv("aes-256-gcm", aesKey, iv);
|
|
80
|
+
const inputStream = createReadStream(inputPath);
|
|
81
|
+
await pipeline(inputStream, cipher, tempStream);
|
|
82
|
+
// 4️⃣ Get authTag after encryption is complete
|
|
83
|
+
const authTag = cipher.getAuthTag();
|
|
84
|
+
// 5️⃣ Now create the final header with the real authTag
|
|
85
|
+
const header = {
|
|
86
|
+
encryptedKey: encryptedKeyBuf.toString("base64"),
|
|
87
|
+
iv: iv.toString("base64"),
|
|
88
|
+
authTag: authTag.toString("base64"),
|
|
89
|
+
};
|
|
90
|
+
const headerJson = Buffer.from(JSON.stringify(header), "utf8");
|
|
91
|
+
const headerLengthBuf = Buffer.alloc(4);
|
|
92
|
+
headerLengthBuf.writeUInt32BE(headerJson.length, 0);
|
|
93
|
+
// 6️⃣ Read the encrypted data from temp file
|
|
94
|
+
const encryptedData = readFileSync(tempPath);
|
|
95
|
+
// 7️⃣ Write final file: header length + header + encrypted data
|
|
96
|
+
const finalData = Buffer.concat([headerLengthBuf, headerJson, encryptedData]);
|
|
97
|
+
writeFileSync(outputPath, finalData);
|
|
98
|
+
// 8️⃣ Clean up temp file
|
|
99
|
+
try {
|
|
100
|
+
const { unlinkSync } = await import("fs");
|
|
101
|
+
unlinkSync(tempPath);
|
|
102
|
+
}
|
|
103
|
+
catch (e) {
|
|
104
|
+
console.warn("Could not delete temp file:", tempPath);
|
|
105
|
+
}
|
|
106
|
+
console.log("✅ File encrypted successfully");
|
|
107
|
+
console.log("Header length:", headerJson.length);
|
|
108
|
+
console.log("Auth tag:", authTag.toString("base64"));
|
|
109
|
+
}
|
|
110
|
+
//# sourceMappingURL=encryptFile.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"encryptFile.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/file/encryptFile.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,gBAAgB,EAChB,iBAAiB,EACjB,YAAY,EACZ,aAAa,EACb,QAAQ,GACT,MAAM,IAAI,CAAC;AACZ,OAAO,EAAE,cAAc,EAAE,aAAa,EAAE,WAAW,EAAE,SAAS,EAAE,MAAM,QAAQ,CAAC;AAC/E,OAAO,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAC3C,OAAO,EAAE,MAAM,EAAE,MAAM,IAAI,CAAC;AAC5B,OAAO,EAAE,IAAI,EAAE,MAAM,MAAM,CAAC;AAS5B,2CAA2C;AAC3C,MAAM,CAAC,KAAK,UAAU,WAAW,CAC/B,SAAiB,EACjB,UAAkB,EAClB,SAAiB;IAEjB,MAAM,oBAAoB,GAAG,GAAG,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,SAAS;IACzD,MAAM,QAAQ,GAAG,QAAQ,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC;IAE1C,IAAI,QAAQ,GAAG,oBAAoB,EAAE,CAAC;QACpC,OAAO,CAAC,GAAG,CACT,wBAAwB,CAAC,QAAQ,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,OAAO,CACtD,CAAC,CACF,0BAA0B,CAC5B,CAAC;QACF,OAAO,oBAAoB,CAAC,SAAS,EAAE,UAAU,EAAE,SAAS,CAAC,CAAC;IAChE,CAAC;SAAM,CAAC;QACN,OAAO,gBAAgB,CAAC,SAAS,EAAE,UAAU,EAAE,SAAS,CAAC,CAAC;IAC5D,CAAC;AACH,CAAC;AAED,wDAAwD;AACxD,KAAK,UAAU,oBAAoB,CACjC,SAAiB,EACjB,UAAkB,EAClB,SAAiB;IAEjB,4BAA4B;IAC5B,MAAM,MAAM,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC/B,MAAM,EAAE,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAE3B,+BAA+B;IAC/B,MAAM,eAAe,GAAG,aAAa,CACnC;QACE,GAAG,EAAE,SAAS;QACd,OAAO,EAAE,SAAS,CAAC,sBAAsB;QACzC,QAAQ,EAAE,QAAQ;KACnB,EACD,MAAM,CACP,CAAC;IAEF,gCAAgC;IAChC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,EAAE,EAAE,gBAAgB,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;IAClE,MAAM,UAAU,GAAG,iBAAiB,CAAC,QAAQ,CAAC,CAAC;IAC/C,MAAM,MAAM,GAAG,cAAc,CAAC,aAAa,EAAE,MAAM,EAAE,EAAE,CAAC,CAAC;IACzD,MAAM,WAAW,GAAG,gBAAgB,CAAC,SAAS,CAAC,CAAC;IAEhD,MAAM,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;IAEhD,kBAAkB;IAClB,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;IAEpC,oBAAoB;IACpB,MAAM,MAAM,GAAe;QACzB,YAAY,EAAE,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAChD,EAAE,EAAE,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC;QACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC;KACpC,CAAC;IAEF,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,MAAM,CAAC,CAAC;IAC/D,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACxC,eAAe,CAAC,aAAa,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAEpD,0DAA0D;IAC1D,MAAM,YAAY,GAAG,iBAAiB,CAAC,UAAU,CAAC,CAAC;IAEnD,qBAAqB;IACrB,YAAY,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;IACpC,YAAY,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;IAE/B,wBAAwB;IACxB,MAAM,cAAc,GAAG,gBAAgB,CAAC,QAAQ,CAAC,CAAC;IAClD,MAAM,QAAQ,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC;IAE7C,yBAAyB;IACzB,IAAI,CAAC;QACH,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;QAC1C,UAAU,CAAC,QAAQ,CAAC,CAAC;IACvB,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,IAAI,CAAC,6BAA6B,EAAE,QAAQ,CAAC,CAAC;IACxD,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;IAC9D,OAAO,CAAC,GAAG,CAAC,gBAAgB,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC;AACnD,CAAC;AAED,6CAA6C;AAC7C,MAAM,CAAC,KAAK,UAAU,gBAAgB,CACpC,SAAiB,EACjB,UAAkB,EAClB,SAAiB;IAEjB,4BAA4B;IAC5B,MAAM,MAAM,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC/B,MAAM,EAAE,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAE3B,+BAA+B;IAC/B,MAAM,eAAe,GAAG,aAAa,CACnC;QACE,GAAG,EAAE,SAAS;QACd,OAAO,EAAE,SAAS,CAAC,sBAAsB;QACzC,QAAQ,EAAE,QAAQ;KACnB,EACD,MAAM,CACP,CAAC;IAEF,qDAAqD;IACrD,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,EAAE,EAAE,gBAAgB,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;IAClE,MAAM,UAAU,GAAG,iBAAiB,CAAC,QAAQ,CAAC,CAAC;IAE/C,MAAM,MAAM,GAAG,cAAc,CAAC,aAAa,EAAE,MAAM,EAAE,EAAE,CAAC,CAAC;IACzD,MAAM,WAAW,GAAG,gBAAgB,CAAC,SAAS,CAAC,CAAC;IAEhD,MAAM,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;IAEhD,+CAA+C;IAC/C,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;IAEpC,wDAAwD;IACxD,MAAM,MAAM,GAAe;QACzB,YAAY,EAAE,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAChD,EAAE,EAAE,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC;QACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC;KACpC,CAAC;IAEF,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,MAAM,CAAC,CAAC;IAC/D,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACxC,eAAe,CAAC,aAAa,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAEpD,6CAA6C;IAC7C,MAAM,aAAa,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAC;IAE7C,gEAAgE;IAChE,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,eAAe,EAAE,UAAU,EAAE,aAAa,CAAC,CAAC,CAAC;IAC9E,aAAa,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IAErC,yBAAyB;IACzB,IAAI,CAAC;QACH,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;QAC1C,UAAU,CAAC,QAAQ,CAAC,CAAC;IACvB,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,IAAI,CAAC,6BAA6B,EAAE,QAAQ,CAAC,CAAC;IACxD,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,CAAC;IAC7C,OAAO,CAAC,GAAG,CAAC,gBAAgB,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC;IACjD,OAAO,CAAC,GAAG,CAAC,WAAW,EAAE,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC;AACvD,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/crypto-asymmetricaly/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AACxD,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC;AACvD,OAAO,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/crypto-asymmetricaly/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AACxD,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC;AACvD,OAAO,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"generateRSA.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/keys/generateRSA.ts"],"names":[],"mappings":"AAEA,wBAAgB,kBAAkB,IAAI,OAAO,CAAC;IAC5C,SAAS,EAAE,MAAM,CAAC;IAClB,UAAU,EAAE,MAAM,CAAC;CACpB,CAAC,CAwBD"}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
import { generateKeyPair } from "crypto";
|
|
2
|
+
export function generateRSAKeyPair() {
|
|
3
|
+
return new Promise((resolve, reject) => {
|
|
4
|
+
generateKeyPair("rsa", {
|
|
5
|
+
modulusLength: 2048,
|
|
6
|
+
publicKeyEncoding: {
|
|
7
|
+
type: "spki",
|
|
8
|
+
format: "pem",
|
|
9
|
+
},
|
|
10
|
+
privateKeyEncoding: {
|
|
11
|
+
type: "pkcs8",
|
|
12
|
+
format: "pem",
|
|
13
|
+
},
|
|
14
|
+
}, (err, publicKey, privateKey) => {
|
|
15
|
+
if (err)
|
|
16
|
+
return reject(err);
|
|
17
|
+
resolve({
|
|
18
|
+
publicKey,
|
|
19
|
+
privateKey,
|
|
20
|
+
});
|
|
21
|
+
});
|
|
22
|
+
});
|
|
23
|
+
}
|
|
24
|
+
//# sourceMappingURL=generateRSA.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"generateRSA.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/keys/generateRSA.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,QAAQ,CAAC;AAEzC,MAAM,UAAU,kBAAkB;IAIhC,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;QACrC,eAAe,CACb,KAAK,EACL;YACE,aAAa,EAAE,IAAI;YACnB,iBAAiB,EAAE;gBACjB,IAAI,EAAE,MAAM;gBACZ,MAAM,EAAE,KAAK;aACd;YACD,kBAAkB,EAAE;gBAClB,IAAI,EAAE,OAAO;gBACb,MAAM,EAAE,KAAK;aACd;SACF,EACD,CAAC,GAAG,EAAE,SAAS,EAAE,UAAU,EAAE,EAAE;YAC7B,IAAI,GAAG;gBAAE,OAAO,MAAM,CAAC,GAAG,CAAC,CAAC;YAC5B,OAAO,CAAC;gBACN,SAAS;gBACT,UAAU;aACX,CAAC,CAAC;QACL,CAAC,CACF,CAAC;IACJ,CAAC,CAAC,CAAC;AACL,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=unwrapKey.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"unwrapKey.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/rsa/unwrapKey.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"unwrapKey.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/rsa/unwrapKey.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=wrapKey.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"wrapKey.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/rsa/wrapKey.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"wrapKey.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/rsa/wrapKey.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"decryptString.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/decryptString.ts"],"names":[],"mappings":"AAIA,wBAAgB,aAAa,CAC3B,aAAa,EAAE,MAAM,EACrB,YAAY,EAAE,MAAM,EACpB,EAAE,EAAE,MAAM,EACV,OAAO,EAAE,MAAM,EACf,UAAU,EAAE,MAAM,GACjB,MAAM,CAsDR"}
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
// decryptString.ts
|
|
2
|
+
import { Buffer } from "buffer";
|
|
3
|
+
import { createDecipheriv, privateDecrypt, constants } from "crypto";
|
|
4
|
+
export function decryptString(encryptedData, encryptedKey, iv, authTag, privateKey) {
|
|
5
|
+
// Decode from base64
|
|
6
|
+
const encryptedDataBuf = Buffer.from(encryptedData, "base64");
|
|
7
|
+
const encryptedKeyBuf = Buffer.from(encryptedKey, "base64"); // ✅ FIXED: removed .substring(0, 12)
|
|
8
|
+
const ivBuf = Buffer.from(iv, "base64");
|
|
9
|
+
const authTagBuf = Buffer.from(authTag, "base64");
|
|
10
|
+
// Validate buffer sizes
|
|
11
|
+
if (ivBuf.length !== 12) {
|
|
12
|
+
throw new Error(`Invalid IV length: expected 12 bytes, got ${ivBuf.length}`);
|
|
13
|
+
}
|
|
14
|
+
if (authTagBuf.length !== 16) {
|
|
15
|
+
throw new Error(`Invalid auth tag length: expected 16 bytes, got ${authTagBuf.length}`);
|
|
16
|
+
}
|
|
17
|
+
// Decrypt the AES key using RSA private key
|
|
18
|
+
let aesKey;
|
|
19
|
+
try {
|
|
20
|
+
aesKey = privateDecrypt({
|
|
21
|
+
key: privateKey,
|
|
22
|
+
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
23
|
+
oaepHash: "sha256",
|
|
24
|
+
}, encryptedKeyBuf);
|
|
25
|
+
}
|
|
26
|
+
catch (e) {
|
|
27
|
+
throw new Error(`Failed to decrypt AES key: ${e}`);
|
|
28
|
+
}
|
|
29
|
+
// Validate AES key length
|
|
30
|
+
if (aesKey.length !== 32) {
|
|
31
|
+
throw new Error(`Invalid AES key length: expected 32 bytes, got ${aesKey.length}`);
|
|
32
|
+
}
|
|
33
|
+
// Decrypt the data using AES-256-GCM
|
|
34
|
+
const decipher = createDecipheriv("aes-256-gcm", aesKey, ivBuf);
|
|
35
|
+
decipher.setAuthTag(authTagBuf);
|
|
36
|
+
try {
|
|
37
|
+
const decrypted = Buffer.concat([
|
|
38
|
+
decipher.update(encryptedDataBuf),
|
|
39
|
+
decipher.final(),
|
|
40
|
+
]);
|
|
41
|
+
return decrypted.toString("utf8");
|
|
42
|
+
}
|
|
43
|
+
catch (e) {
|
|
44
|
+
throw new Error(`Decryption failed (authentication error): ${e}`);
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
//# sourceMappingURL=decryptString.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"decryptString.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/decryptString.ts"],"names":[],"mappings":"AAAA,mBAAmB;AACnB,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,cAAc,EAAE,SAAS,EAAE,MAAM,QAAQ,CAAC;AAErE,MAAM,UAAU,aAAa,CAC3B,aAAqB,EACrB,YAAoB,EACpB,EAAU,EACV,OAAe,EACf,UAAkB;IAElB,qBAAqB;IACrB,MAAM,gBAAgB,GAAG,MAAM,CAAC,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IAC9D,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,CAAC,qCAAqC;IAClG,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,EAAE,EAAE,QAAQ,CAAC,CAAC;IACxC,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;IAElD,wBAAwB;IACxB,IAAI,KAAK,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QACxB,MAAM,IAAI,KAAK,CACb,6CAA6C,KAAK,CAAC,MAAM,EAAE,CAC5D,CAAC;IACJ,CAAC;IACD,IAAI,UAAU,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QAC7B,MAAM,IAAI,KAAK,CACb,mDAAmD,UAAU,CAAC,MAAM,EAAE,CACvE,CAAC;IACJ,CAAC;IAED,4CAA4C;IAC5C,IAAI,MAAc,CAAC;IACnB,IAAI,CAAC;QACH,MAAM,GAAG,cAAc,CACrB;YACE,GAAG,EAAE,UAAU;YACf,OAAO,EAAE,SAAS,CAAC,sBAAsB;YACzC,QAAQ,EAAE,QAAQ;SACnB,EACD,eAAe,CAChB,CAAC;IACJ,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED,0BAA0B;IAC1B,IAAI,MAAM,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QACzB,MAAM,IAAI,KAAK,CACb,kDAAkD,MAAM,CAAC,MAAM,EAAE,CAClE,CAAC;IACJ,CAAC;IAED,qCAAqC;IACrC,MAAM,QAAQ,GAAG,gBAAgB,CAAC,aAAa,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;IAChE,QAAQ,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC;IAEhC,IAAI,CAAC;QACH,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC;YAC9B,QAAQ,CAAC,MAAM,CAAC,gBAAgB,CAAC;YACjC,QAAQ,CAAC,KAAK,EAAE;SACjB,CAAC,CAAC;QACH,OAAO,SAAS,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IACpC,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,EAAE,CAAC,CAAC;IACpE,CAAC;AACH,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"encryptString.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/encryptString.ts"],"names":[],"mappings":"AAIA,wBAAgB,aAAa,CAC3B,IAAI,EAAE,MAAM,EACZ,SAAS,EAAE,MAAM,GAChB;IACD,aAAa,EAAE,MAAM,CAAC;IACtB,YAAY,EAAE,MAAM,CAAC;IACrB,EAAE,EAAE,MAAM,CAAC;IACX,OAAO,EAAE,MAAM,CAAC;CACjB,CA2BA"}
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
// encryptString.ts
|
|
2
|
+
import { createCipheriv, publicEncrypt, constants } from "crypto";
|
|
3
|
+
import { generateAESKey } from "./generateAES";
|
|
4
|
+
export function encryptString(data, publicKey) {
|
|
5
|
+
const { key, iv } = generateAESKey();
|
|
6
|
+
// Encrypt the data with AES-256-GCM
|
|
7
|
+
const cipher = createCipheriv("aes-256-gcm", key, iv);
|
|
8
|
+
const encryptedBuffer = Buffer.concat([
|
|
9
|
+
cipher.update(data, "utf8"),
|
|
10
|
+
cipher.final(),
|
|
11
|
+
]);
|
|
12
|
+
const authTag = cipher.getAuthTag();
|
|
13
|
+
// Encrypt the AES key with RSA public key
|
|
14
|
+
const encryptedKey = publicEncrypt({
|
|
15
|
+
key: publicKey,
|
|
16
|
+
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
17
|
+
oaepHash: "sha256",
|
|
18
|
+
}, key);
|
|
19
|
+
return {
|
|
20
|
+
encryptedData: encryptedBuffer.toString("base64"),
|
|
21
|
+
encryptedKey: encryptedKey.toString("base64"),
|
|
22
|
+
iv: iv.toString("base64"),
|
|
23
|
+
authTag: authTag.toString("base64"),
|
|
24
|
+
};
|
|
25
|
+
}
|
|
26
|
+
//# sourceMappingURL=encryptString.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"encryptString.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/encryptString.ts"],"names":[],"mappings":"AAAA,mBAAmB;AACnB,OAAO,EAAe,cAAc,EAAE,aAAa,EAAE,SAAS,EAAE,MAAM,QAAQ,CAAC;AAC/E,OAAO,EAAE,cAAc,EAAE,MAAM,eAAe,CAAC;AAE/C,MAAM,UAAU,aAAa,CAC3B,IAAY,EACZ,SAAiB;IAOjB,MAAM,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,cAAc,EAAE,CAAC;IAErC,oCAAoC;IACpC,MAAM,MAAM,GAAG,cAAc,CAAC,aAAa,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;IACtD,MAAM,eAAe,GAAG,MAAM,CAAC,MAAM,CAAC;QACpC,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC;QAC3B,MAAM,CAAC,KAAK,EAAE;KACf,CAAC,CAAC;IACH,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;IAEpC,0CAA0C;IAC1C,MAAM,YAAY,GAAG,aAAa,CAChC;QACE,GAAG,EAAE,SAAS;QACd,OAAO,EAAE,SAAS,CAAC,sBAAsB;QACzC,QAAQ,EAAE,QAAQ;KACnB,EACD,GAAG,CACJ,CAAC;IAEF,OAAO;QACL,aAAa,EAAE,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC;QACjD,YAAY,EAAE,YAAY,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAC7C,EAAE,EAAE,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC;QACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC;KACpC,CAAC;AACJ,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"generateAES.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/generateAES.ts"],"names":[],"mappings":"AAEA,wBAAgB,cAAc,IAAI;IAAE,GAAG,EAAE,MAAM,CAAC;IAAC,EAAE,EAAE,MAAM,CAAA;CAAE,CAI5D"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"generateAES.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/generateAES.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,QAAQ,CAAC;AAErC,MAAM,UAAU,cAAc;IAC5B,MAAM,GAAG,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC5B,MAAM,EAAE,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC3B,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC;AACrB,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"decrypt.d.ts","sourceRoot":"","sources":["../../src/crypto-symmetricaly/decrypt.ts"],"names":[],"mappings":"AAQA,wBAAgB,OAAO,CAAC,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,UAcvD"}
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
import { scryptSync, createDecipheriv, } from "crypto";
|
|
2
|
+
// Decrypt
|
|
3
|
+
export function decrypt(encHex, password) {
|
|
4
|
+
const data = Buffer.from(encHex, "hex");
|
|
5
|
+
const salt = data.subarray(0, 16);
|
|
6
|
+
const iv = data.subarray(16, 28);
|
|
7
|
+
const tag = data.subarray(28, 44);
|
|
8
|
+
const encrypted = data.subarray(44);
|
|
9
|
+
const key = scryptSync(password, salt, 32);
|
|
10
|
+
const decipher = createDecipheriv("aes-256-gcm", key, iv);
|
|
11
|
+
decipher.setAuthTag(tag);
|
|
12
|
+
return Buffer.concat([decipher.update(encrypted), decipher.final()]).toString("utf8");
|
|
13
|
+
}
|
|
14
|
+
//# sourceMappingURL=decrypt.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"decrypt.js","sourceRoot":"","sources":["../../src/crypto-symmetricaly/decrypt.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,UAAU,EAEV,gBAAgB,GACjB,MAAM,QAAQ,CAAC;AAEhB,UAAU;AACV,MAAM,UAAU,OAAO,CAAC,MAAc,EAAE,QAAgB;IACtD,MAAM,IAAI,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACxC,MAAM,IAAI,GAAG,IAAI,CAAC,QAAQ,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAClC,MAAM,EAAE,GAAG,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC;IACjC,MAAM,GAAG,GAAG,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC;IAClC,MAAM,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;IAEpC,MAAM,GAAG,GAAG,UAAU,CAAC,QAAQ,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC;IAC3C,MAAM,QAAQ,GAAG,gBAAgB,CAAC,aAAa,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;IAC1D,QAAQ,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;IAEzB,OAAO,MAAM,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,QAAQ,CAC3E,MAAM,CACP,CAAC;AACJ,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"encrypt.d.ts","sourceRoot":"","sources":["../../src/crypto-symmetricaly/encrypt.ts"],"names":[],"mappings":"AAQA,wBAAgB,OAAO,CAAC,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,UAarD"}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
import { randomBytes, scryptSync, createCipheriv, } from "crypto";
|
|
2
|
+
// Encrypt
|
|
3
|
+
export function encrypt(text, password) {
|
|
4
|
+
const salt = randomBytes(16); // random salt
|
|
5
|
+
const key = scryptSync(password, salt, 32); // derive 32-byte key
|
|
6
|
+
const iv = randomBytes(12); // 96-bit IV for GCM
|
|
7
|
+
const cipher = createCipheriv("aes-256-gcm", key, iv);
|
|
8
|
+
const encrypted = Buffer.concat([
|
|
9
|
+
cipher.update(text, "utf8"),
|
|
10
|
+
cipher.final(),
|
|
11
|
+
]);
|
|
12
|
+
const tag = cipher.getAuthTag();
|
|
13
|
+
// Return everything needed to decrypt
|
|
14
|
+
return Buffer.concat([salt, iv, tag, encrypted]).toString("hex");
|
|
15
|
+
}
|
|
16
|
+
//# sourceMappingURL=encrypt.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"encrypt.js","sourceRoot":"","sources":["../../src/crypto-symmetricaly/encrypt.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,WAAW,EACX,UAAU,EACV,cAAc,GAEf,MAAM,QAAQ,CAAC;AAEhB,UAAU;AACV,MAAM,UAAU,OAAO,CAAC,IAAY,EAAE,QAAgB;IACpD,MAAM,IAAI,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC,CAAC,cAAc;IAC5C,MAAM,GAAG,GAAG,UAAU,CAAC,QAAQ,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC,CAAC,qBAAqB;IACjE,MAAM,EAAE,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC,CAAC,oBAAoB;IAChD,MAAM,MAAM,GAAG,cAAc,CAAC,aAAa,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;IACtD,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC;QAC9B,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC;QAC3B,MAAM,CAAC,KAAK,EAAE;KACf,CAAC,CAAC;IACH,MAAM,GAAG,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;IAEhC,sCAAsC;IACtC,OAAO,MAAM,CAAC,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE,EAAE,GAAG,EAAE,SAAS,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;AACnE,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/crypto-symmetricaly/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AACpC,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/crypto-symmetricaly/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AACpC,OAAO,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
//# sourceMappingURL=signMessage.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"signMessage.d.ts","sourceRoot":"","sources":["../../src/crypto-symmetricaly/signMessage.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"signMessage.js","sourceRoot":"","sources":["../../src/crypto-symmetricaly/signMessage.ts"],"names":[],"mappings":""}
|