simple-crypto-utils 1.0.0 → 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +3 -27
- package/dist/crypto/decrypt.d.ts +0 -1
- package/dist/crypto/decrypt.d.ts.map +0 -1
- package/dist/crypto/decrypt.js +0 -2
- package/dist/crypto/decrypt.js.map +0 -1
- package/dist/crypto/encrypt.d.ts +0 -1
- package/dist/crypto/encrypt.d.ts.map +0 -1
- package/dist/crypto/encrypt.js +0 -2
- package/dist/crypto/encrypt.js.map +0 -1
- package/dist/crypto/signMessage.d.ts +0 -1
- package/dist/crypto/signMessage.d.ts.map +0 -1
- package/dist/crypto/signMessage.js +0 -2
- package/dist/crypto/signMessage.js.map +0 -1
- package/dist/crypto/verifyMessage.d.ts +0 -1
- package/dist/crypto/verifyMessage.d.ts.map +0 -1
- package/dist/crypto/verifyMessage.js +0 -2
- package/dist/crypto/verifyMessage.js.map +0 -1
- package/dist/crypto-asymmetricaly/file/decryptFile.d.ts +0 -2
- package/dist/crypto-asymmetricaly/file/decryptFile.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/file/decryptFile.js +0 -93
- package/dist/crypto-asymmetricaly/file/decryptFile.js.map +0 -1
- package/dist/crypto-asymmetricaly/file/encryptFile.d.ts +0 -3
- package/dist/crypto-asymmetricaly/file/encryptFile.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/file/encryptFile.js +0 -110
- package/dist/crypto-asymmetricaly/file/encryptFile.js.map +0 -1
- package/dist/crypto-asymmetricaly/index.d.ts +0 -5
- package/dist/crypto-asymmetricaly/index.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/index.js +0 -5
- package/dist/crypto-asymmetricaly/index.js.map +0 -1
- package/dist/crypto-asymmetricaly/keys/generateRSA.d.ts +0 -5
- package/dist/crypto-asymmetricaly/keys/generateRSA.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/keys/generateRSA.js +0 -24
- package/dist/crypto-asymmetricaly/keys/generateRSA.js.map +0 -1
- package/dist/crypto-asymmetricaly/rsa/unwrapKey.d.ts +0 -1
- package/dist/crypto-asymmetricaly/rsa/unwrapKey.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/rsa/unwrapKey.js +0 -2
- package/dist/crypto-asymmetricaly/rsa/unwrapKey.js.map +0 -1
- package/dist/crypto-asymmetricaly/rsa/wrapKey.d.ts +0 -1
- package/dist/crypto-asymmetricaly/rsa/wrapKey.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/rsa/wrapKey.js +0 -2
- package/dist/crypto-asymmetricaly/rsa/wrapKey.js.map +0 -1
- package/dist/crypto-asymmetricaly/string/decryptString.d.ts +0 -2
- package/dist/crypto-asymmetricaly/string/decryptString.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/string/decryptString.js +0 -47
- package/dist/crypto-asymmetricaly/string/decryptString.js.map +0 -1
- package/dist/crypto-asymmetricaly/string/encryptString.d.ts +0 -7
- package/dist/crypto-asymmetricaly/string/encryptString.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/string/encryptString.js +0 -26
- package/dist/crypto-asymmetricaly/string/encryptString.js.map +0 -1
- package/dist/crypto-asymmetricaly/string/generateAES.d.ts +0 -5
- package/dist/crypto-asymmetricaly/string/generateAES.d.ts.map +0 -1
- package/dist/crypto-asymmetricaly/string/generateAES.js +0 -7
- package/dist/crypto-asymmetricaly/string/generateAES.js.map +0 -1
- package/dist/crypto-symmetricaly/decrypt.d.ts +0 -2
- package/dist/crypto-symmetricaly/decrypt.d.ts.map +0 -1
- package/dist/crypto-symmetricaly/decrypt.js +0 -14
- package/dist/crypto-symmetricaly/decrypt.js.map +0 -1
- package/dist/crypto-symmetricaly/encrypt.d.ts +0 -2
- package/dist/crypto-symmetricaly/encrypt.d.ts.map +0 -1
- package/dist/crypto-symmetricaly/encrypt.js +0 -16
- package/dist/crypto-symmetricaly/encrypt.js.map +0 -1
- package/dist/crypto-symmetricaly/index.d.ts +0 -3
- package/dist/crypto-symmetricaly/index.d.ts.map +0 -1
- package/dist/crypto-symmetricaly/index.js +0 -3
- package/dist/crypto-symmetricaly/index.js.map +0 -1
- package/dist/crypto-symmetricaly/signMessage.d.ts +0 -1
- package/dist/crypto-symmetricaly/signMessage.d.ts.map +0 -1
- package/dist/crypto-symmetricaly/signMessage.js +0 -2
- package/dist/crypto-symmetricaly/signMessage.js.map +0 -1
- package/dist/crypto-symmetricaly/verifyMessage.d.ts +0 -1
- package/dist/crypto-symmetricaly/verifyMessage.d.ts.map +0 -1
- package/dist/crypto-symmetricaly/verifyMessage.js +0 -2
- package/dist/crypto-symmetricaly/verifyMessage.js.map +0 -1
- package/dist/hash/hash.d.ts +0 -2
- package/dist/hash/hash.d.ts.map +0 -1
- package/dist/hash/hash.js +0 -7
- package/dist/hash/hash.js.map +0 -1
- package/dist/hash/hashHmac.d.ts +0 -2
- package/dist/hash/hashHmac.d.ts.map +0 -1
- package/dist/hash/hashHmac.js +0 -5
- package/dist/hash/hashHmac.js.map +0 -1
- package/dist/hash/index.d.ts +0 -4
- package/dist/hash/index.d.ts.map +0 -1
- package/dist/hash/index.js +0 -4
- package/dist/hash/index.js.map +0 -1
- package/dist/hash/verifyHmac.d.ts +0 -2
- package/dist/hash/verifyHmac.d.ts.map +0 -1
- package/dist/hash/verifyHmac.js +0 -10
- package/dist/hash/verifyHmac.js.map +0 -1
- package/dist/index.d.ts.map +0 -1
- package/dist/index.js.map +0 -1
- package/dist/otp/TOTP.d.ts +0 -10
- package/dist/otp/TOTP.d.ts.map +0 -1
- package/dist/otp/TOTP.js +0 -33
- package/dist/otp/TOTP.js.map +0 -1
- package/dist/otp/generate.d.ts +0 -2
- package/dist/otp/generate.d.ts.map +0 -1
- package/dist/otp/generate.js +0 -7
- package/dist/otp/generate.js.map +0 -1
- package/dist/otp/generateOTP.d.ts +0 -1
- package/dist/otp/generateOTP.d.ts.map +0 -1
- package/dist/otp/generateOTP.js +0 -2
- package/dist/otp/generateOTP.js.map +0 -1
- package/dist/otp/hash.d.ts +0 -2
- package/dist/otp/hash.d.ts.map +0 -1
- package/dist/otp/hash.js +0 -5
- package/dist/otp/hash.js.map +0 -1
- package/dist/otp/index.d.ts +0 -3
- package/dist/otp/index.d.ts.map +0 -1
- package/dist/otp/index.js +0 -3
- package/dist/otp/index.js.map +0 -1
- package/dist/otp/verifyOTP.d.ts +0 -1
- package/dist/otp/verifyOTP.d.ts.map +0 -1
- package/dist/otp/verifyOTP.js +0 -2
- package/dist/otp/verifyOTP.js.map +0 -1
- package/dist/password/generate.d.ts +0 -15
- package/dist/password/generate.d.ts.map +0 -1
- package/dist/password/generate.js +0 -44
- package/dist/password/generate.js.map +0 -1
- package/dist/password/generatePassword.d.ts +0 -2
- package/dist/password/generatePassword.d.ts.map +0 -1
- package/dist/password/generatePassword.js +0 -10
- package/dist/password/generatePassword.js.map +0 -1
- package/dist/password/hash.d.ts +0 -2
- package/dist/password/hash.d.ts.map +0 -1
- package/dist/password/hash.js +0 -12
- package/dist/password/hash.js.map +0 -1
- package/dist/password/hashPassword.d.ts +0 -1
- package/dist/password/hashPassword.d.ts.map +0 -1
- package/dist/password/hashPassword.js +0 -2
- package/dist/password/hashPassword.js.map +0 -1
- package/dist/password/index.d.ts +0 -4
- package/dist/password/index.d.ts.map +0 -1
- package/dist/password/index.js +0 -4
- package/dist/password/index.js.map +0 -1
- package/dist/password/validatePassword.d.ts +0 -1
- package/dist/password/validatePassword.d.ts.map +0 -1
- package/dist/password/validatePassword.js +0 -2
- package/dist/password/validatePassword.js.map +0 -1
- package/dist/password/verify.d.ts +0 -2
- package/dist/password/verify.d.ts.map +0 -1
- package/dist/password/verify.js +0 -33
- package/dist/password/verify.js.map +0 -1
- package/dist/password/verifyPassword.d.ts +0 -1
- package/dist/password/verifyPassword.d.ts.map +0 -1
- package/dist/password/verifyPassword.js +0 -2
- package/dist/password/verifyPassword.js.map +0 -1
- package/dist/signature/index.d.ts +0 -46
- package/dist/signature/index.d.ts.map +0 -1
- package/dist/signature/index.js +0 -51
- package/dist/signature/index.js.map +0 -1
- package/dist/signature/serialize.d.ts +0 -4
- package/dist/signature/serialize.d.ts.map +0 -1
- package/dist/signature/serialize.js +0 -33
- package/dist/signature/serialize.js.map +0 -1
- package/dist/signature/sign.d.ts +0 -3
- package/dist/signature/sign.d.ts.map +0 -1
- package/dist/signature/sign.js +0 -26
- package/dist/signature/sign.js.map +0 -1
- package/dist/signature/types.d.ts +0 -16
- package/dist/signature/types.d.ts.map +0 -1
- package/dist/signature/types.js +0 -2
- package/dist/signature/types.js.map +0 -1
- package/dist/signature/verify.d.ts +0 -3
- package/dist/signature/verify.d.ts.map +0 -1
- package/dist/signature/verify.js +0 -26
- package/dist/signature/verify.js.map +0 -1
- package/dist/test-minimal.d.ts +0 -1
- package/dist/test-minimal.d.ts.map +0 -1
- package/dist/test-minimal.js +0 -4
- package/dist/test-minimal.js.map +0 -1
- package/dist/test.d.ts +0 -2
- package/dist/test.d.ts.map +0 -1
- package/dist/test.js +0 -33
- package/dist/test.js.map +0 -1
- package/dist/token/generateRandomToken.d.ts +0 -1
- package/dist/token/generateRandomToken.d.ts.map +0 -1
- package/dist/token/generateRandomToken.js +0 -2
- package/dist/token/generateRandomToken.js.map +0 -1
- package/dist/token/generateUUID.d.ts +0 -1
- package/dist/token/generateUUID.d.ts.map +0 -1
- package/dist/token/generateUUID.js +0 -2
- package/dist/token/generateUUID.js.map +0 -1
- package/dist/token/hashToken.d.ts +0 -1
- package/dist/token/hashToken.d.ts.map +0 -1
- package/dist/token/hashToken.js +0 -2
- package/dist/token/hashToken.js.map +0 -1
- package/dist/utlis/constants.d.ts +0 -4
- package/dist/utlis/constants.d.ts.map +0 -1
- package/dist/utlis/constants.js +0 -4
- package/dist/utlis/constants.js.map +0 -1
- package/dist/utlis/entropyScore.d.ts +0 -1
- package/dist/utlis/entropyScore.d.ts.map +0 -1
- package/dist/utlis/entropyScore.js +0 -2
- package/dist/utlis/entropyScore.js.map +0 -1
- package/dist/utlis/generateRandomBytes.d.ts +0 -2
- package/dist/utlis/generateRandomBytes.d.ts.map +0 -1
- package/dist/utlis/generateRandomBytes.js +0 -9
- package/dist/utlis/generateRandomBytes.js.map +0 -1
- package/dist/utlis/maskSensitive.d.ts +0 -1
- package/dist/utlis/maskSensitive.d.ts.map +0 -1
- package/dist/utlis/maskSensitive.js +0 -2
- package/dist/utlis/maskSensitive.js.map +0 -1
- package/dist/utlis/safeCompare.d.ts +0 -1
- package/dist/utlis/safeCompare.d.ts.map +0 -1
- package/dist/utlis/safeCompare.js +0 -2
- package/dist/utlis/safeCompare.js.map +0 -1
- package/dist/uuid/generate.d.ts +0 -2
- package/dist/uuid/generate.d.ts.map +0 -1
- package/dist/uuid/generate.js +0 -5
- package/dist/uuid/generate.js.map +0 -1
- package/dist/uuid/hashToken.d.ts +0 -1
- package/dist/uuid/hashToken.d.ts.map +0 -1
- package/dist/uuid/hashToken.js +0 -6
- package/dist/uuid/hashToken.js.map +0 -1
- package/dist/uuid/index.d.ts +0 -2
- package/dist/uuid/index.d.ts.map +0 -1
- package/dist/uuid/index.js +0 -2
- package/dist/uuid/index.js.map +0 -1
package/package.json
CHANGED
|
@@ -1,37 +1,13 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "simple-crypto-utils",
|
|
3
|
-
"version": "1.0.
|
|
3
|
+
"version": "1.0.1",
|
|
4
4
|
"description": "A TypeScript cryptography utility library for educational purposes only. Not intended for production use.",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"exports": {
|
|
7
7
|
".": {
|
|
8
8
|
"types": "./dist/index.d.ts",
|
|
9
|
-
"import": "./dist/index.
|
|
9
|
+
"import": "./dist/index.js",
|
|
10
10
|
"require": "./dist/index.cjs"
|
|
11
|
-
},
|
|
12
|
-
"./crypto": {
|
|
13
|
-
"import": "./dist/crypto/index.mjs",
|
|
14
|
-
"require": "./dist/crypto/index.cjs"
|
|
15
|
-
},
|
|
16
|
-
"./hash": {
|
|
17
|
-
"import": "./dist/hash/index.mjs",
|
|
18
|
-
"require": "./dist/hash/index.cjs"
|
|
19
|
-
},
|
|
20
|
-
"./otp": {
|
|
21
|
-
"import": "./dist/otp/index.mjs",
|
|
22
|
-
"require": "./dist/otp/index.cjs"
|
|
23
|
-
},
|
|
24
|
-
"./password": {
|
|
25
|
-
"import": "./dist/password/index.mjs",
|
|
26
|
-
"require": "./dist/password/index.cjs"
|
|
27
|
-
},
|
|
28
|
-
"./signature": {
|
|
29
|
-
"import": "./dist/signature/index.mjs",
|
|
30
|
-
"require": "./dist/signature/index.cjs"
|
|
31
|
-
},
|
|
32
|
-
"./uuid": {
|
|
33
|
-
"import": "./dist/signature/index.mjs",
|
|
34
|
-
"require": "./dist/signature/index.cjs"
|
|
35
11
|
}
|
|
36
12
|
},
|
|
37
13
|
"types": "./dist/index.d.ts",
|
|
@@ -40,7 +16,7 @@
|
|
|
40
16
|
],
|
|
41
17
|
"scripts": {
|
|
42
18
|
"clean": "rm -rf dist",
|
|
43
|
-
"build": "tsup src/index.ts --format cjs
|
|
19
|
+
"build": "tsup src/index.ts --format esm,cjs --dts --clean",
|
|
44
20
|
"test": "echo \"No tests yet\" && exit 0"
|
|
45
21
|
},
|
|
46
22
|
"keywords": [
|
package/dist/crypto/decrypt.d.ts
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
//# sourceMappingURL=decrypt.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"decrypt.d.ts","sourceRoot":"","sources":["../../src/crypto/decrypt.ts"],"names":[],"mappings":""}
|
package/dist/crypto/decrypt.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"decrypt.js","sourceRoot":"","sources":["../../src/crypto/decrypt.ts"],"names":[],"mappings":""}
|
package/dist/crypto/encrypt.d.ts
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
//# sourceMappingURL=encrypt.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"encrypt.d.ts","sourceRoot":"","sources":["../../src/crypto/encrypt.ts"],"names":[],"mappings":""}
|
package/dist/crypto/encrypt.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"encrypt.js","sourceRoot":"","sources":["../../src/crypto/encrypt.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
//# sourceMappingURL=signMessage.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"signMessage.d.ts","sourceRoot":"","sources":["../../src/crypto/signMessage.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"signMessage.js","sourceRoot":"","sources":["../../src/crypto/signMessage.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
//# sourceMappingURL=verifyMessage.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"verifyMessage.d.ts","sourceRoot":"","sources":["../../src/crypto/verifyMessage.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"verifyMessage.js","sourceRoot":"","sources":["../../src/crypto/verifyMessage.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"decryptFile.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/file/decryptFile.ts"],"names":[],"mappings":"AAWA,wBAAsB,WAAW,CAC/B,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,UAAU,EAAE,MAAM,iBA4HnB"}
|
|
@@ -1,93 +0,0 @@
|
|
|
1
|
-
import { createReadStream, createWriteStream } from "fs";
|
|
2
|
-
import { createDecipheriv, privateDecrypt, constants } from "crypto";
|
|
3
|
-
import { pipeline } from "stream/promises";
|
|
4
|
-
import { open } from "fs/promises";
|
|
5
|
-
export async function decryptFile(inputPath, outputPath, privateKey) {
|
|
6
|
-
// 1️⃣ Open file handle (doesn't load into memory)
|
|
7
|
-
const fileHandle = await open(inputPath, "r");
|
|
8
|
-
try {
|
|
9
|
-
// 2️⃣ Read only the first 4 bytes to get header length
|
|
10
|
-
const headerLengthBuf = Buffer.alloc(4);
|
|
11
|
-
const { bytesRead: lengthBytesRead } = await fileHandle.read(headerLengthBuf, 0, 4, 0);
|
|
12
|
-
if (lengthBytesRead < 4) {
|
|
13
|
-
throw new Error(`File is too small (${lengthBytesRead} bytes). Expected at least 4 bytes for header length.`);
|
|
14
|
-
}
|
|
15
|
-
const headerLength = headerLengthBuf.readUInt32BE(0);
|
|
16
|
-
console.log("Header length:", headerLength);
|
|
17
|
-
// 3️⃣ Validate header length is reasonable
|
|
18
|
-
if (headerLength > 10000) {
|
|
19
|
-
throw new Error(`Header length suspiciously large (${headerLength} bytes). File may be corrupted.`);
|
|
20
|
-
}
|
|
21
|
-
// 4️⃣ Read only the header (not the entire file!)
|
|
22
|
-
const headerBuf = Buffer.alloc(headerLength);
|
|
23
|
-
const { bytesRead: headerBytesRead } = await fileHandle.read(headerBuf, 0, headerLength, 4);
|
|
24
|
-
if (headerBytesRead < headerLength) {
|
|
25
|
-
throw new Error(`File is too short to contain the header. Expected ${headerLength} bytes, got ${headerBytesRead}`);
|
|
26
|
-
}
|
|
27
|
-
// 5️⃣ Parse header JSON
|
|
28
|
-
const headerJson = headerBuf.toString("utf8");
|
|
29
|
-
console.log("Header JSON:", headerJson);
|
|
30
|
-
let header;
|
|
31
|
-
try {
|
|
32
|
-
header = JSON.parse(headerJson);
|
|
33
|
-
}
|
|
34
|
-
catch (e) {
|
|
35
|
-
throw new Error(`Failed to parse header JSON: ${e}`);
|
|
36
|
-
}
|
|
37
|
-
// 6️⃣ Validate header fields
|
|
38
|
-
if (!header.encryptedKey || !header.iv || !header.authTag) {
|
|
39
|
-
throw new Error("Invalid header: missing required fields");
|
|
40
|
-
}
|
|
41
|
-
// 7️⃣ Extract buffers from base64
|
|
42
|
-
const encryptedKeyBuf = Buffer.from(header.encryptedKey, "base64");
|
|
43
|
-
const iv = Buffer.from(header.iv, "base64");
|
|
44
|
-
const authTag = Buffer.from(header.authTag, "base64");
|
|
45
|
-
console.log("Encrypted key length:", encryptedKeyBuf.length);
|
|
46
|
-
console.log("IV length:", iv.length);
|
|
47
|
-
console.log("Auth tag length:", authTag.length);
|
|
48
|
-
// 8️⃣ Validate buffer sizes
|
|
49
|
-
if (iv.length !== 12) {
|
|
50
|
-
throw new Error(`Invalid IV length: expected 12 bytes, got ${iv.length}`);
|
|
51
|
-
}
|
|
52
|
-
if (authTag.length !== 16) {
|
|
53
|
-
throw new Error(`Invalid auth tag length: expected 16 bytes, got ${authTag.length}`);
|
|
54
|
-
}
|
|
55
|
-
// 9️⃣ Decrypt AES key with RSA private key
|
|
56
|
-
let aesKey;
|
|
57
|
-
try {
|
|
58
|
-
aesKey = privateDecrypt({
|
|
59
|
-
key: privateKey,
|
|
60
|
-
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
61
|
-
oaepHash: "sha256",
|
|
62
|
-
}, encryptedKeyBuf);
|
|
63
|
-
}
|
|
64
|
-
catch (e) {
|
|
65
|
-
throw new Error(`Failed to decrypt AES key: ${e}`);
|
|
66
|
-
}
|
|
67
|
-
// Validate AES key length
|
|
68
|
-
if (aesKey.length !== 32) {
|
|
69
|
-
throw new Error(`Invalid AES key length: expected 32 bytes, got ${aesKey.length}`);
|
|
70
|
-
}
|
|
71
|
-
// 🔟 Create decipher
|
|
72
|
-
const decipher = createDecipheriv("aes-256-gcm", aesKey, iv);
|
|
73
|
-
decipher.setAuthTag(authTag);
|
|
74
|
-
// 1️⃣1️⃣ Stream encrypted content (after header) → decipher → output
|
|
75
|
-
// This streams the data, never loading the full file into memory
|
|
76
|
-
const inputStream = createReadStream(inputPath, {
|
|
77
|
-
start: 4 + headerLength,
|
|
78
|
-
});
|
|
79
|
-
const outputStream = createWriteStream(outputPath);
|
|
80
|
-
try {
|
|
81
|
-
await pipeline(inputStream, decipher, outputStream);
|
|
82
|
-
console.log("✅ File decrypted successfully");
|
|
83
|
-
}
|
|
84
|
-
catch (e) {
|
|
85
|
-
throw new Error(`Decryption failed (authentication error): ${e}`);
|
|
86
|
-
}
|
|
87
|
-
}
|
|
88
|
-
finally {
|
|
89
|
-
// Always close the file handle
|
|
90
|
-
await fileHandle.close();
|
|
91
|
-
}
|
|
92
|
-
}
|
|
93
|
-
//# sourceMappingURL=decryptFile.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"decryptFile.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/file/decryptFile.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,IAAI,CAAC;AACzD,OAAO,EAAE,gBAAgB,EAAE,cAAc,EAAE,SAAS,EAAE,MAAM,QAAQ,CAAC;AACrE,OAAO,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAC3C,OAAO,EAAE,IAAI,EAAE,MAAM,aAAa,CAAC;AAQnC,MAAM,CAAC,KAAK,UAAU,WAAW,CAC/B,SAAiB,EACjB,UAAkB,EAClB,UAAkB;IAElB,kDAAkD;IAClD,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,SAAS,EAAE,GAAG,CAAC,CAAC;IAE9C,IAAI,CAAC;QACH,uDAAuD;QACvD,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QACxC,MAAM,EAAE,SAAS,EAAE,eAAe,EAAE,GAAG,MAAM,UAAU,CAAC,IAAI,CAC1D,eAAe,EACf,CAAC,EACD,CAAC,EACD,CAAC,CACF,CAAC;QAEF,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;YACxB,MAAM,IAAI,KAAK,CACb,sBAAsB,eAAe,uDAAuD,CAC7F,CAAC;QACJ,CAAC;QAED,MAAM,YAAY,GAAG,eAAe,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;QACrD,OAAO,CAAC,GAAG,CAAC,gBAAgB,EAAE,YAAY,CAAC,CAAC;QAE5C,2CAA2C;QAC3C,IAAI,YAAY,GAAG,KAAK,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CACb,qCAAqC,YAAY,iCAAiC,CACnF,CAAC;QACJ,CAAC;QAED,kDAAkD;QAClD,MAAM,SAAS,GAAG,MAAM,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC;QAC7C,MAAM,EAAE,SAAS,EAAE,eAAe,EAAE,GAAG,MAAM,UAAU,CAAC,IAAI,CAC1D,SAAS,EACT,CAAC,EACD,YAAY,EACZ,CAAC,CACF,CAAC;QAEF,IAAI,eAAe,GAAG,YAAY,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,qDAAqD,YAAY,eAAe,eAAe,EAAE,CAClG,CAAC;QACJ,CAAC;QAED,wBAAwB;QACxB,MAAM,UAAU,GAAG,SAAS,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QAC9C,OAAO,CAAC,GAAG,CAAC,cAAc,EAAE,UAAU,CAAC,CAAC;QAExC,IAAI,MAAkB,CAAC;QACvB,IAAI,CAAC;YACH,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;QAClC,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,EAAE,CAAC,CAAC;QACvD,CAAC;QAED,6BAA6B;QAC7B,IAAI,CAAC,MAAM,CAAC,YAAY,IAAI,CAAC,MAAM,CAAC,EAAE,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;YAC1D,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,kCAAkC;QAClC,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC;QACnE,MAAM,EAAE,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,EAAE,QAAQ,CAAC,CAAC;QAC5C,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAEtD,OAAO,CAAC,GAAG,CAAC,uBAAuB,EAAE,eAAe,CAAC,MAAM,CAAC,CAAC;QAC7D,OAAO,CAAC,GAAG,CAAC,YAAY,EAAE,EAAE,CAAC,MAAM,CAAC,CAAC;QACrC,OAAO,CAAC,GAAG,CAAC,kBAAkB,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;QAEhD,4BAA4B;QAC5B,IAAI,EAAE,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;YACrB,MAAM,IAAI,KAAK,CAAC,6CAA6C,EAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QAC5E,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;YAC1B,MAAM,IAAI,KAAK,CACb,mDAAmD,OAAO,CAAC,MAAM,EAAE,CACpE,CAAC;QACJ,CAAC;QAED,2CAA2C;QAC3C,IAAI,MAAc,CAAC;QACnB,IAAI,CAAC;YACH,MAAM,GAAG,cAAc,CACrB;gBACE,GAAG,EAAE,UAAU;gBACf,OAAO,EAAE,SAAS,CAAC,sBAAsB;gBACzC,QAAQ,EAAE,QAAQ;aACnB,EACD,eAAe,CAChB,CAAC;QACJ,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,EAAE,CAAC,CAAC;QACrD,CAAC;QAED,0BAA0B;QAC1B,IAAI,MAAM,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CACb,kDAAkD,MAAM,CAAC,MAAM,EAAE,CAClE,CAAC;QACJ,CAAC;QAED,qBAAqB;QACrB,MAAM,QAAQ,GAAG,gBAAgB,CAAC,aAAa,EAAE,MAAM,EAAE,EAAE,CAAC,CAAC;QAC7D,QAAQ,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAE7B,qEAAqE;QACrE,iEAAiE;QACjE,MAAM,WAAW,GAAG,gBAAgB,CAAC,SAAS,EAAE;YAC9C,KAAK,EAAE,CAAC,GAAG,YAAY;SACxB,CAAC,CAAC;QACH,MAAM,YAAY,GAAG,iBAAiB,CAAC,UAAU,CAAC,CAAC;QAEnD,IAAI,CAAC;YACH,MAAM,QAAQ,CAAC,WAAW,EAAE,QAAQ,EAAE,YAAY,CAAC,CAAC;YACpD,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,CAAC;QAC/C,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,EAAE,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;YAAS,CAAC;QACT,+BAA+B;QAC/B,MAAM,UAAU,CAAC,KAAK,EAAE,CAAC;IAC3B,CAAC;AACH,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"encryptFile.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/file/encryptFile.ts"],"names":[],"mappings":"AAoBA,wBAAsB,WAAW,CAC/B,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,SAAS,EAAE,MAAM,iBAelB;AAoED,wBAAsB,gBAAgB,CACpC,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,SAAS,EAAE,MAAM,iBAyDlB"}
|
|
@@ -1,110 +0,0 @@
|
|
|
1
|
-
import { createReadStream, createWriteStream, readFileSync, writeFileSync, statSync, } from "fs";
|
|
2
|
-
import { createCipheriv, publicEncrypt, randomBytes, constants } from "crypto";
|
|
3
|
-
import { pipeline } from "stream/promises";
|
|
4
|
-
import { tmpdir } from "os";
|
|
5
|
-
import { join } from "path";
|
|
6
|
-
// Memory-efficient version for large files
|
|
7
|
-
export async function encryptFile(inputPath, outputPath, publicKey) {
|
|
8
|
-
const LARGE_FILE_THRESHOLD = 100 * 1024 * 1024; // 100 MB
|
|
9
|
-
const fileSize = statSync(inputPath).size;
|
|
10
|
-
if (fileSize > LARGE_FILE_THRESHOLD) {
|
|
11
|
-
console.log(`Large file detected (${(fileSize / 1024 / 1024).toFixed(2)} MB), using streaming...`);
|
|
12
|
-
return encryptFileStreaming(inputPath, outputPath, publicKey);
|
|
13
|
-
}
|
|
14
|
-
else {
|
|
15
|
-
return encryptFileSmall(inputPath, outputPath, publicKey);
|
|
16
|
-
}
|
|
17
|
-
}
|
|
18
|
-
// Streaming version - never loads full file into memory
|
|
19
|
-
async function encryptFileStreaming(inputPath, outputPath, publicKey) {
|
|
20
|
-
// 1️⃣ Generate AES key + IV
|
|
21
|
-
const aesKey = randomBytes(32);
|
|
22
|
-
const iv = randomBytes(12);
|
|
23
|
-
// 2️⃣ Encrypt AES key with RSA
|
|
24
|
-
const encryptedKeyBuf = publicEncrypt({
|
|
25
|
-
key: publicKey,
|
|
26
|
-
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
27
|
-
oaepHash: "sha256",
|
|
28
|
-
}, aesKey);
|
|
29
|
-
// 3️⃣ Encrypt to temporary file
|
|
30
|
-
const tempPath = join(tmpdir(), `temp-encrypt-${Date.now()}.tmp`);
|
|
31
|
-
const tempStream = createWriteStream(tempPath);
|
|
32
|
-
const cipher = createCipheriv("aes-256-gcm", aesKey, iv);
|
|
33
|
-
const inputStream = createReadStream(inputPath);
|
|
34
|
-
await pipeline(inputStream, cipher, tempStream);
|
|
35
|
-
// 4️⃣ Get authTag
|
|
36
|
-
const authTag = cipher.getAuthTag();
|
|
37
|
-
// 5️⃣ Create header
|
|
38
|
-
const header = {
|
|
39
|
-
encryptedKey: encryptedKeyBuf.toString("base64"),
|
|
40
|
-
iv: iv.toString("base64"),
|
|
41
|
-
authTag: authTag.toString("base64"),
|
|
42
|
-
};
|
|
43
|
-
const headerJson = Buffer.from(JSON.stringify(header), "utf8");
|
|
44
|
-
const headerLengthBuf = Buffer.alloc(4);
|
|
45
|
-
headerLengthBuf.writeUInt32BE(headerJson.length, 0);
|
|
46
|
-
// 6️⃣ Stream temp file to final output (memory-efficient)
|
|
47
|
-
const outputStream = createWriteStream(outputPath);
|
|
48
|
-
// Write header first
|
|
49
|
-
outputStream.write(headerLengthBuf);
|
|
50
|
-
outputStream.write(headerJson);
|
|
51
|
-
// Stream encrypted data
|
|
52
|
-
const tempReadStream = createReadStream(tempPath);
|
|
53
|
-
await pipeline(tempReadStream, outputStream);
|
|
54
|
-
// 7️⃣ Clean up temp file
|
|
55
|
-
try {
|
|
56
|
-
const { unlinkSync } = await import("fs");
|
|
57
|
-
unlinkSync(tempPath);
|
|
58
|
-
}
|
|
59
|
-
catch (e) {
|
|
60
|
-
console.warn("Could not delete temp file:", tempPath);
|
|
61
|
-
}
|
|
62
|
-
console.log("✅ File encrypted successfully (streaming mode)");
|
|
63
|
-
console.log("Header length:", headerJson.length);
|
|
64
|
-
}
|
|
65
|
-
// Original version - good for files < 100 MB
|
|
66
|
-
export async function encryptFileSmall(inputPath, outputPath, publicKey) {
|
|
67
|
-
// 1️⃣ Generate AES key + IV
|
|
68
|
-
const aesKey = randomBytes(32);
|
|
69
|
-
const iv = randomBytes(12);
|
|
70
|
-
// 2️⃣ Encrypt AES key with RSA
|
|
71
|
-
const encryptedKeyBuf = publicEncrypt({
|
|
72
|
-
key: publicKey,
|
|
73
|
-
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
74
|
-
oaepHash: "sha256",
|
|
75
|
-
}, aesKey);
|
|
76
|
-
// 3️⃣ Encrypt to temporary file first to get authTag
|
|
77
|
-
const tempPath = join(tmpdir(), `temp-encrypt-${Date.now()}.tmp`);
|
|
78
|
-
const tempStream = createWriteStream(tempPath);
|
|
79
|
-
const cipher = createCipheriv("aes-256-gcm", aesKey, iv);
|
|
80
|
-
const inputStream = createReadStream(inputPath);
|
|
81
|
-
await pipeline(inputStream, cipher, tempStream);
|
|
82
|
-
// 4️⃣ Get authTag after encryption is complete
|
|
83
|
-
const authTag = cipher.getAuthTag();
|
|
84
|
-
// 5️⃣ Now create the final header with the real authTag
|
|
85
|
-
const header = {
|
|
86
|
-
encryptedKey: encryptedKeyBuf.toString("base64"),
|
|
87
|
-
iv: iv.toString("base64"),
|
|
88
|
-
authTag: authTag.toString("base64"),
|
|
89
|
-
};
|
|
90
|
-
const headerJson = Buffer.from(JSON.stringify(header), "utf8");
|
|
91
|
-
const headerLengthBuf = Buffer.alloc(4);
|
|
92
|
-
headerLengthBuf.writeUInt32BE(headerJson.length, 0);
|
|
93
|
-
// 6️⃣ Read the encrypted data from temp file
|
|
94
|
-
const encryptedData = readFileSync(tempPath);
|
|
95
|
-
// 7️⃣ Write final file: header length + header + encrypted data
|
|
96
|
-
const finalData = Buffer.concat([headerLengthBuf, headerJson, encryptedData]);
|
|
97
|
-
writeFileSync(outputPath, finalData);
|
|
98
|
-
// 8️⃣ Clean up temp file
|
|
99
|
-
try {
|
|
100
|
-
const { unlinkSync } = await import("fs");
|
|
101
|
-
unlinkSync(tempPath);
|
|
102
|
-
}
|
|
103
|
-
catch (e) {
|
|
104
|
-
console.warn("Could not delete temp file:", tempPath);
|
|
105
|
-
}
|
|
106
|
-
console.log("✅ File encrypted successfully");
|
|
107
|
-
console.log("Header length:", headerJson.length);
|
|
108
|
-
console.log("Auth tag:", authTag.toString("base64"));
|
|
109
|
-
}
|
|
110
|
-
//# sourceMappingURL=encryptFile.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"encryptFile.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/file/encryptFile.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,gBAAgB,EAChB,iBAAiB,EACjB,YAAY,EACZ,aAAa,EACb,QAAQ,GACT,MAAM,IAAI,CAAC;AACZ,OAAO,EAAE,cAAc,EAAE,aAAa,EAAE,WAAW,EAAE,SAAS,EAAE,MAAM,QAAQ,CAAC;AAC/E,OAAO,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAC3C,OAAO,EAAE,MAAM,EAAE,MAAM,IAAI,CAAC;AAC5B,OAAO,EAAE,IAAI,EAAE,MAAM,MAAM,CAAC;AAS5B,2CAA2C;AAC3C,MAAM,CAAC,KAAK,UAAU,WAAW,CAC/B,SAAiB,EACjB,UAAkB,EAClB,SAAiB;IAEjB,MAAM,oBAAoB,GAAG,GAAG,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,SAAS;IACzD,MAAM,QAAQ,GAAG,QAAQ,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC;IAE1C,IAAI,QAAQ,GAAG,oBAAoB,EAAE,CAAC;QACpC,OAAO,CAAC,GAAG,CACT,wBAAwB,CAAC,QAAQ,GAAG,IAAI,GAAG,IAAI,CAAC,CAAC,OAAO,CACtD,CAAC,CACF,0BAA0B,CAC5B,CAAC;QACF,OAAO,oBAAoB,CAAC,SAAS,EAAE,UAAU,EAAE,SAAS,CAAC,CAAC;IAChE,CAAC;SAAM,CAAC;QACN,OAAO,gBAAgB,CAAC,SAAS,EAAE,UAAU,EAAE,SAAS,CAAC,CAAC;IAC5D,CAAC;AACH,CAAC;AAED,wDAAwD;AACxD,KAAK,UAAU,oBAAoB,CACjC,SAAiB,EACjB,UAAkB,EAClB,SAAiB;IAEjB,4BAA4B;IAC5B,MAAM,MAAM,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC/B,MAAM,EAAE,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAE3B,+BAA+B;IAC/B,MAAM,eAAe,GAAG,aAAa,CACnC;QACE,GAAG,EAAE,SAAS;QACd,OAAO,EAAE,SAAS,CAAC,sBAAsB;QACzC,QAAQ,EAAE,QAAQ;KACnB,EACD,MAAM,CACP,CAAC;IAEF,gCAAgC;IAChC,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,EAAE,EAAE,gBAAgB,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;IAClE,MAAM,UAAU,GAAG,iBAAiB,CAAC,QAAQ,CAAC,CAAC;IAC/C,MAAM,MAAM,GAAG,cAAc,CAAC,aAAa,EAAE,MAAM,EAAE,EAAE,CAAC,CAAC;IACzD,MAAM,WAAW,GAAG,gBAAgB,CAAC,SAAS,CAAC,CAAC;IAEhD,MAAM,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;IAEhD,kBAAkB;IAClB,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;IAEpC,oBAAoB;IACpB,MAAM,MAAM,GAAe;QACzB,YAAY,EAAE,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAChD,EAAE,EAAE,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC;QACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC;KACpC,CAAC;IAEF,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,MAAM,CAAC,CAAC;IAC/D,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACxC,eAAe,CAAC,aAAa,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAEpD,0DAA0D;IAC1D,MAAM,YAAY,GAAG,iBAAiB,CAAC,UAAU,CAAC,CAAC;IAEnD,qBAAqB;IACrB,YAAY,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;IACpC,YAAY,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC;IAE/B,wBAAwB;IACxB,MAAM,cAAc,GAAG,gBAAgB,CAAC,QAAQ,CAAC,CAAC;IAClD,MAAM,QAAQ,CAAC,cAAc,EAAE,YAAY,CAAC,CAAC;IAE7C,yBAAyB;IACzB,IAAI,CAAC;QACH,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;QAC1C,UAAU,CAAC,QAAQ,CAAC,CAAC;IACvB,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,IAAI,CAAC,6BAA6B,EAAE,QAAQ,CAAC,CAAC;IACxD,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,gDAAgD,CAAC,CAAC;IAC9D,OAAO,CAAC,GAAG,CAAC,gBAAgB,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC;AACnD,CAAC;AAED,6CAA6C;AAC7C,MAAM,CAAC,KAAK,UAAU,gBAAgB,CACpC,SAAiB,EACjB,UAAkB,EAClB,SAAiB;IAEjB,4BAA4B;IAC5B,MAAM,MAAM,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC/B,MAAM,EAAE,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAE3B,+BAA+B;IAC/B,MAAM,eAAe,GAAG,aAAa,CACnC;QACE,GAAG,EAAE,SAAS;QACd,OAAO,EAAE,SAAS,CAAC,sBAAsB;QACzC,QAAQ,EAAE,QAAQ;KACnB,EACD,MAAM,CACP,CAAC;IAEF,qDAAqD;IACrD,MAAM,QAAQ,GAAG,IAAI,CAAC,MAAM,EAAE,EAAE,gBAAgB,IAAI,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC;IAClE,MAAM,UAAU,GAAG,iBAAiB,CAAC,QAAQ,CAAC,CAAC;IAE/C,MAAM,MAAM,GAAG,cAAc,CAAC,aAAa,EAAE,MAAM,EAAE,EAAE,CAAC,CAAC;IACzD,MAAM,WAAW,GAAG,gBAAgB,CAAC,SAAS,CAAC,CAAC;IAEhD,MAAM,QAAQ,CAAC,WAAW,EAAE,MAAM,EAAE,UAAU,CAAC,CAAC;IAEhD,+CAA+C;IAC/C,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;IAEpC,wDAAwD;IACxD,MAAM,MAAM,GAAe;QACzB,YAAY,EAAE,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAChD,EAAE,EAAE,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC;QACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC;KACpC,CAAC;IAEF,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,EAAE,MAAM,CAAC,CAAC;IAC/D,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACxC,eAAe,CAAC,aAAa,CAAC,UAAU,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAEpD,6CAA6C;IAC7C,MAAM,aAAa,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAC;IAE7C,gEAAgE;IAChE,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,eAAe,EAAE,UAAU,EAAE,aAAa,CAAC,CAAC,CAAC;IAC9E,aAAa,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IAErC,yBAAyB;IACzB,IAAI,CAAC;QACH,MAAM,EAAE,UAAU,EAAE,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,CAAC;QAC1C,UAAU,CAAC,QAAQ,CAAC,CAAC;IACvB,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,CAAC,IAAI,CAAC,6BAA6B,EAAE,QAAQ,CAAC,CAAC;IACxD,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,CAAC;IAC7C,OAAO,CAAC,GAAG,CAAC,gBAAgB,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC;IACjD,OAAO,CAAC,GAAG,CAAC,WAAW,EAAE,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC;AACvD,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/crypto-asymmetricaly/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AACxD,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC;AACvD,OAAO,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/crypto-asymmetricaly/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AACxD,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC;AACvD,OAAO,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"generateRSA.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/keys/generateRSA.ts"],"names":[],"mappings":"AAEA,wBAAgB,kBAAkB,IAAI,OAAO,CAAC;IAC5C,SAAS,EAAE,MAAM,CAAC;IAClB,UAAU,EAAE,MAAM,CAAC;CACpB,CAAC,CAwBD"}
|
|
@@ -1,24 +0,0 @@
|
|
|
1
|
-
import { generateKeyPair } from "crypto";
|
|
2
|
-
export function generateRSAKeyPair() {
|
|
3
|
-
return new Promise((resolve, reject) => {
|
|
4
|
-
generateKeyPair("rsa", {
|
|
5
|
-
modulusLength: 2048,
|
|
6
|
-
publicKeyEncoding: {
|
|
7
|
-
type: "spki",
|
|
8
|
-
format: "pem",
|
|
9
|
-
},
|
|
10
|
-
privateKeyEncoding: {
|
|
11
|
-
type: "pkcs8",
|
|
12
|
-
format: "pem",
|
|
13
|
-
},
|
|
14
|
-
}, (err, publicKey, privateKey) => {
|
|
15
|
-
if (err)
|
|
16
|
-
return reject(err);
|
|
17
|
-
resolve({
|
|
18
|
-
publicKey,
|
|
19
|
-
privateKey,
|
|
20
|
-
});
|
|
21
|
-
});
|
|
22
|
-
});
|
|
23
|
-
}
|
|
24
|
-
//# sourceMappingURL=generateRSA.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"generateRSA.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/keys/generateRSA.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,MAAM,QAAQ,CAAC;AAEzC,MAAM,UAAU,kBAAkB;IAIhC,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,MAAM,EAAE,EAAE;QACrC,eAAe,CACb,KAAK,EACL;YACE,aAAa,EAAE,IAAI;YACnB,iBAAiB,EAAE;gBACjB,IAAI,EAAE,MAAM;gBACZ,MAAM,EAAE,KAAK;aACd;YACD,kBAAkB,EAAE;gBAClB,IAAI,EAAE,OAAO;gBACb,MAAM,EAAE,KAAK;aACd;SACF,EACD,CAAC,GAAG,EAAE,SAAS,EAAE,UAAU,EAAE,EAAE;YAC7B,IAAI,GAAG;gBAAE,OAAO,MAAM,CAAC,GAAG,CAAC,CAAC;YAC5B,OAAO,CAAC;gBACN,SAAS;gBACT,UAAU;aACX,CAAC,CAAC;QACL,CAAC,CACF,CAAC;IACJ,CAAC,CAAC,CAAC;AACL,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
//# sourceMappingURL=unwrapKey.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"unwrapKey.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/rsa/unwrapKey.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"unwrapKey.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/rsa/unwrapKey.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
//# sourceMappingURL=wrapKey.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"wrapKey.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/rsa/wrapKey.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"wrapKey.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/rsa/wrapKey.ts"],"names":[],"mappings":""}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"decryptString.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/decryptString.ts"],"names":[],"mappings":"AAIA,wBAAgB,aAAa,CAC3B,aAAa,EAAE,MAAM,EACrB,YAAY,EAAE,MAAM,EACpB,EAAE,EAAE,MAAM,EACV,OAAO,EAAE,MAAM,EACf,UAAU,EAAE,MAAM,GACjB,MAAM,CAsDR"}
|
|
@@ -1,47 +0,0 @@
|
|
|
1
|
-
// decryptString.ts
|
|
2
|
-
import { Buffer } from "buffer";
|
|
3
|
-
import { createDecipheriv, privateDecrypt, constants } from "crypto";
|
|
4
|
-
export function decryptString(encryptedData, encryptedKey, iv, authTag, privateKey) {
|
|
5
|
-
// Decode from base64
|
|
6
|
-
const encryptedDataBuf = Buffer.from(encryptedData, "base64");
|
|
7
|
-
const encryptedKeyBuf = Buffer.from(encryptedKey, "base64"); // ✅ FIXED: removed .substring(0, 12)
|
|
8
|
-
const ivBuf = Buffer.from(iv, "base64");
|
|
9
|
-
const authTagBuf = Buffer.from(authTag, "base64");
|
|
10
|
-
// Validate buffer sizes
|
|
11
|
-
if (ivBuf.length !== 12) {
|
|
12
|
-
throw new Error(`Invalid IV length: expected 12 bytes, got ${ivBuf.length}`);
|
|
13
|
-
}
|
|
14
|
-
if (authTagBuf.length !== 16) {
|
|
15
|
-
throw new Error(`Invalid auth tag length: expected 16 bytes, got ${authTagBuf.length}`);
|
|
16
|
-
}
|
|
17
|
-
// Decrypt the AES key using RSA private key
|
|
18
|
-
let aesKey;
|
|
19
|
-
try {
|
|
20
|
-
aesKey = privateDecrypt({
|
|
21
|
-
key: privateKey,
|
|
22
|
-
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
23
|
-
oaepHash: "sha256",
|
|
24
|
-
}, encryptedKeyBuf);
|
|
25
|
-
}
|
|
26
|
-
catch (e) {
|
|
27
|
-
throw new Error(`Failed to decrypt AES key: ${e}`);
|
|
28
|
-
}
|
|
29
|
-
// Validate AES key length
|
|
30
|
-
if (aesKey.length !== 32) {
|
|
31
|
-
throw new Error(`Invalid AES key length: expected 32 bytes, got ${aesKey.length}`);
|
|
32
|
-
}
|
|
33
|
-
// Decrypt the data using AES-256-GCM
|
|
34
|
-
const decipher = createDecipheriv("aes-256-gcm", aesKey, ivBuf);
|
|
35
|
-
decipher.setAuthTag(authTagBuf);
|
|
36
|
-
try {
|
|
37
|
-
const decrypted = Buffer.concat([
|
|
38
|
-
decipher.update(encryptedDataBuf),
|
|
39
|
-
decipher.final(),
|
|
40
|
-
]);
|
|
41
|
-
return decrypted.toString("utf8");
|
|
42
|
-
}
|
|
43
|
-
catch (e) {
|
|
44
|
-
throw new Error(`Decryption failed (authentication error): ${e}`);
|
|
45
|
-
}
|
|
46
|
-
}
|
|
47
|
-
//# sourceMappingURL=decryptString.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"decryptString.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/decryptString.ts"],"names":[],"mappings":"AAAA,mBAAmB;AACnB,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,cAAc,EAAE,SAAS,EAAE,MAAM,QAAQ,CAAC;AAErE,MAAM,UAAU,aAAa,CAC3B,aAAqB,EACrB,YAAoB,EACpB,EAAU,EACV,OAAe,EACf,UAAkB;IAElB,qBAAqB;IACrB,MAAM,gBAAgB,GAAG,MAAM,CAAC,IAAI,CAAC,aAAa,EAAE,QAAQ,CAAC,CAAC;IAC9D,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,CAAC,qCAAqC;IAClG,MAAM,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,EAAE,EAAE,QAAQ,CAAC,CAAC;IACxC,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;IAElD,wBAAwB;IACxB,IAAI,KAAK,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QACxB,MAAM,IAAI,KAAK,CACb,6CAA6C,KAAK,CAAC,MAAM,EAAE,CAC5D,CAAC;IACJ,CAAC;IACD,IAAI,UAAU,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QAC7B,MAAM,IAAI,KAAK,CACb,mDAAmD,UAAU,CAAC,MAAM,EAAE,CACvE,CAAC;IACJ,CAAC;IAED,4CAA4C;IAC5C,IAAI,MAAc,CAAC;IACnB,IAAI,CAAC;QACH,MAAM,GAAG,cAAc,CACrB;YACE,GAAG,EAAE,UAAU;YACf,OAAO,EAAE,SAAS,CAAC,sBAAsB;YACzC,QAAQ,EAAE,QAAQ;SACnB,EACD,eAAe,CAChB,CAAC;IACJ,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,EAAE,CAAC,CAAC;IACrD,CAAC;IAED,0BAA0B;IAC1B,IAAI,MAAM,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QACzB,MAAM,IAAI,KAAK,CACb,kDAAkD,MAAM,CAAC,MAAM,EAAE,CAClE,CAAC;IACJ,CAAC;IAED,qCAAqC;IACrC,MAAM,QAAQ,GAAG,gBAAgB,CAAC,aAAa,EAAE,MAAM,EAAE,KAAK,CAAC,CAAC;IAChE,QAAQ,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC;IAEhC,IAAI,CAAC;QACH,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC;YAC9B,QAAQ,CAAC,MAAM,CAAC,gBAAgB,CAAC;YACjC,QAAQ,CAAC,KAAK,EAAE;SACjB,CAAC,CAAC;QACH,OAAO,SAAS,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IACpC,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,EAAE,CAAC,CAAC;IACpE,CAAC;AACH,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"encryptString.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/encryptString.ts"],"names":[],"mappings":"AAIA,wBAAgB,aAAa,CAC3B,IAAI,EAAE,MAAM,EACZ,SAAS,EAAE,MAAM,GAChB;IACD,aAAa,EAAE,MAAM,CAAC;IACtB,YAAY,EAAE,MAAM,CAAC;IACrB,EAAE,EAAE,MAAM,CAAC;IACX,OAAO,EAAE,MAAM,CAAC;CACjB,CA2BA"}
|
|
@@ -1,26 +0,0 @@
|
|
|
1
|
-
// encryptString.ts
|
|
2
|
-
import { createCipheriv, publicEncrypt, constants } from "crypto";
|
|
3
|
-
import { generateAESKey } from "./generateAES";
|
|
4
|
-
export function encryptString(data, publicKey) {
|
|
5
|
-
const { key, iv } = generateAESKey();
|
|
6
|
-
// Encrypt the data with AES-256-GCM
|
|
7
|
-
const cipher = createCipheriv("aes-256-gcm", key, iv);
|
|
8
|
-
const encryptedBuffer = Buffer.concat([
|
|
9
|
-
cipher.update(data, "utf8"),
|
|
10
|
-
cipher.final(),
|
|
11
|
-
]);
|
|
12
|
-
const authTag = cipher.getAuthTag();
|
|
13
|
-
// Encrypt the AES key with RSA public key
|
|
14
|
-
const encryptedKey = publicEncrypt({
|
|
15
|
-
key: publicKey,
|
|
16
|
-
padding: constants.RSA_PKCS1_OAEP_PADDING,
|
|
17
|
-
oaepHash: "sha256",
|
|
18
|
-
}, key);
|
|
19
|
-
return {
|
|
20
|
-
encryptedData: encryptedBuffer.toString("base64"),
|
|
21
|
-
encryptedKey: encryptedKey.toString("base64"),
|
|
22
|
-
iv: iv.toString("base64"),
|
|
23
|
-
authTag: authTag.toString("base64"),
|
|
24
|
-
};
|
|
25
|
-
}
|
|
26
|
-
//# sourceMappingURL=encryptString.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"encryptString.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/encryptString.ts"],"names":[],"mappings":"AAAA,mBAAmB;AACnB,OAAO,EAAe,cAAc,EAAE,aAAa,EAAE,SAAS,EAAE,MAAM,QAAQ,CAAC;AAC/E,OAAO,EAAE,cAAc,EAAE,MAAM,eAAe,CAAC;AAE/C,MAAM,UAAU,aAAa,CAC3B,IAAY,EACZ,SAAiB;IAOjB,MAAM,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,cAAc,EAAE,CAAC;IAErC,oCAAoC;IACpC,MAAM,MAAM,GAAG,cAAc,CAAC,aAAa,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;IACtD,MAAM,eAAe,GAAG,MAAM,CAAC,MAAM,CAAC;QACpC,MAAM,CAAC,MAAM,CAAC,IAAI,EAAE,MAAM,CAAC;QAC3B,MAAM,CAAC,KAAK,EAAE;KACf,CAAC,CAAC;IACH,MAAM,OAAO,GAAG,MAAM,CAAC,UAAU,EAAE,CAAC;IAEpC,0CAA0C;IAC1C,MAAM,YAAY,GAAG,aAAa,CAChC;QACE,GAAG,EAAE,SAAS;QACd,OAAO,EAAE,SAAS,CAAC,sBAAsB;QACzC,QAAQ,EAAE,QAAQ;KACnB,EACD,GAAG,CACJ,CAAC;IAEF,OAAO;QACL,aAAa,EAAE,eAAe,CAAC,QAAQ,CAAC,QAAQ,CAAC;QACjD,YAAY,EAAE,YAAY,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAC7C,EAAE,EAAE,EAAE,CAAC,QAAQ,CAAC,QAAQ,CAAC;QACzB,OAAO,EAAE,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAC;KACpC,CAAC;AACJ,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"generateAES.d.ts","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/generateAES.ts"],"names":[],"mappings":"AAEA,wBAAgB,cAAc,IAAI;IAAE,GAAG,EAAE,MAAM,CAAC;IAAC,EAAE,EAAE,MAAM,CAAA;CAAE,CAI5D"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"generateAES.js","sourceRoot":"","sources":["../../../src/crypto-asymmetricaly/string/generateAES.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,QAAQ,CAAC;AAErC,MAAM,UAAU,cAAc;IAC5B,MAAM,GAAG,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC5B,MAAM,EAAE,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAC3B,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,CAAC;AACrB,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"decrypt.d.ts","sourceRoot":"","sources":["../../src/crypto-symmetricaly/decrypt.ts"],"names":[],"mappings":"AAQA,wBAAgB,OAAO,CAAC,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,UAcvD"}
|
|
@@ -1,14 +0,0 @@
|
|
|
1
|
-
import { scryptSync, createDecipheriv, } from "crypto";
|
|
2
|
-
// Decrypt
|
|
3
|
-
export function decrypt(encHex, password) {
|
|
4
|
-
const data = Buffer.from(encHex, "hex");
|
|
5
|
-
const salt = data.subarray(0, 16);
|
|
6
|
-
const iv = data.subarray(16, 28);
|
|
7
|
-
const tag = data.subarray(28, 44);
|
|
8
|
-
const encrypted = data.subarray(44);
|
|
9
|
-
const key = scryptSync(password, salt, 32);
|
|
10
|
-
const decipher = createDecipheriv("aes-256-gcm", key, iv);
|
|
11
|
-
decipher.setAuthTag(tag);
|
|
12
|
-
return Buffer.concat([decipher.update(encrypted), decipher.final()]).toString("utf8");
|
|
13
|
-
}
|
|
14
|
-
//# sourceMappingURL=decrypt.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"decrypt.js","sourceRoot":"","sources":["../../src/crypto-symmetricaly/decrypt.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,UAAU,EAEV,gBAAgB,GACjB,MAAM,QAAQ,CAAC;AAEhB,UAAU;AACV,MAAM,UAAU,OAAO,CAAC,MAAc,EAAE,QAAgB;IACtD,MAAM,IAAI,GAAG,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACxC,MAAM,IAAI,GAAG,IAAI,CAAC,QAAQ,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAClC,MAAM,EAAE,GAAG,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC;IACjC,MAAM,GAAG,GAAG,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC;IAClC,MAAM,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;IAEpC,MAAM,GAAG,GAAG,UAAU,CAAC,QAAQ,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC;IAC3C,MAAM,QAAQ,GAAG,gBAAgB,CAAC,aAAa,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;IAC1D,QAAQ,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;IAEzB,OAAO,MAAM,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,QAAQ,CAC3E,MAAM,CACP,CAAC;AACJ,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"encrypt.d.ts","sourceRoot":"","sources":["../../src/crypto-symmetricaly/encrypt.ts"],"names":[],"mappings":"AAQA,wBAAgB,OAAO,CAAC,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,UAarD"}
|