@aws-crypto/material-management
Advanced tools
Comparing version
@@ -1,2 +0,8 @@ | ||
import { MixedBackendCryptoKey, SupportedAlgorithmSuites, AwsEsdkJsCryptoKey, AwsEsdkJsKeyUsage, EncryptionContext } from './types'; | ||
import { MixedBackendCryptoKey, // eslint-disable-line no-unused-vars | ||
SupportedAlgorithmSuites, // eslint-disable-line no-unused-vars | ||
AwsEsdkJsCryptoKey, // eslint-disable-line no-unused-vars | ||
AwsEsdkJsKeyUsage, // eslint-disable-line no-unused-vars | ||
EncryptionContext, // eslint-disable-line no-unused-vars | ||
AwsEsdkKeyObject, // eslint-disable-line no-unused-vars | ||
AwsEsdkCreateSecretKey } from './types'; | ||
import { EncryptedDataKey } from './encrypted_data_key'; | ||
@@ -7,2 +13,9 @@ import { SignatureKey, VerificationKey } from './signature_key'; | ||
import { WebCryptoAlgorithmSuite } from './web_crypto_algorithms'; | ||
interface AwsEsdkKeyObjectInstanceOf { | ||
new (): AwsEsdkKeyObject; | ||
} | ||
export declare const supportsKeyObject: boolean | { | ||
KeyObject: AwsEsdkKeyObjectInstanceOf; | ||
createSecretKey: AwsEsdkCreateSecretKey; | ||
}; | ||
export interface FunctionalCryptographicMaterial { | ||
@@ -13,7 +26,6 @@ hasValidKey: () => boolean; | ||
suite: SupportedAlgorithmSuites; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => T; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => T; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => T; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -40,7 +52,6 @@ encryptionContext: Readonly<EncryptionContext>; | ||
suite: NodeAlgorithmSuite; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => NodeEncryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => NodeEncryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => NodeEncryptionMaterial; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -57,7 +68,6 @@ encryptedDataKeys: EncryptedDataKey[]; | ||
suite: NodeAlgorithmSuite; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => NodeDecryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => NodeDecryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => NodeDecryptionMaterial; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -72,7 +82,6 @@ setVerificationKey: (key: VerificationKey) => NodeDecryptionMaterial; | ||
suite: WebCryptoAlgorithmSuite; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => WebCryptoEncryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => WebCryptoEncryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => WebCryptoEncryptionMaterial; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -93,7 +102,6 @@ encryptedDataKeys: EncryptedDataKey[]; | ||
suite: WebCryptoAlgorithmSuite; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => WebCryptoDecryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => WebCryptoDecryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => WebCryptoDecryptionMaterial; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -112,3 +120,3 @@ setVerificationKey: (key: VerificationKey) => WebCryptoDecryptionMaterial; | ||
export declare function isDecryptionMaterial(obj: any): obj is WebCryptoDecryptionMaterial | NodeDecryptionMaterial; | ||
export declare function decorateCryptographicMaterial<T extends CryptographicMaterial<T>>(material: T, setFlags: KeyringTraceFlag): T; | ||
export declare function decorateCryptographicMaterial<T extends CryptographicMaterial<T>>(material: T, setFlag: KeyringTraceFlag): T; | ||
export declare function decorateEncryptionMaterial<T extends EncryptionMaterial<T>>(material: T): T; | ||
@@ -121,2 +129,5 @@ export declare function decorateDecryptionMaterial<T extends DecryptionMaterial<T>>(material: T): T; | ||
export declare function subtleFunctionForMaterial<T extends WebCryptoMaterial<T>>(material: T): "encrypt" | "decrypt"; | ||
export declare function unwrapDataKey(dataKey: Uint8Array | AwsEsdkKeyObject): Uint8Array; | ||
export declare function wrapWithKeyObjectIfSupported(dataKey: Uint8Array | AwsEsdkKeyObject): Uint8Array | AwsEsdkKeyObject; | ||
export {}; | ||
//# sourceMappingURL=cryptographic_material.d.ts.map |
@@ -24,2 +24,13 @@ "use strict"; | ||
const needs_1 = require("./needs"); | ||
exports.supportsKeyObject = (function () { | ||
try { | ||
const { KeyObject, createSecretKey } = require('crypto'); | ||
if (!KeyObject || !createSecretKey) | ||
return false; | ||
return { KeyObject, createSecretKey }; | ||
} | ||
catch (ex) { | ||
return false; | ||
} | ||
})(); | ||
/* | ||
@@ -41,33 +52,34 @@ * This public interface to the CryptographicMaterial object is provided for | ||
*/ | ||
let timingSafeEqual; | ||
try { | ||
/* It is possible for `require` to return an empty object, or an object | ||
* that does not implement `timingSafeEqual`. | ||
* in this case I need a fallback | ||
*/ | ||
const { timingSafeEqual: nodeTimingSafeEqual } = require('crypto'); | ||
timingSafeEqual = nodeTimingSafeEqual || portableTimingSafeEqual; | ||
} | ||
catch (e) { | ||
timingSafeEqual = portableTimingSafeEqual; | ||
} | ||
/* https://codahale.com/a-lesson-in-timing-attacks/ */ | ||
function portableTimingSafeEqual(a, b) { | ||
/* It is *possible* that a runtime could optimize this constant time function. | ||
* Adding `eval` should prevent the optimization, but this is no grantee. | ||
* If you copy this function for your own use, make sure to educate yourself. | ||
* Side channel attacks are pernicious and subtle. | ||
*/ | ||
eval(''); // eslint-disable-line no-eval | ||
/* Check for early return (Postcondition) UNTESTED: Size is well-know information. | ||
* and does not leak information about contents. | ||
*/ | ||
if (a.byteLength !== b.byteLength) | ||
return false; | ||
let diff = 0; | ||
for (let i = 0; i < b.length; i++) { | ||
diff |= a[i] ^ b[i]; | ||
const timingSafeEqual = (function () { | ||
try { | ||
/* It is possible for `require` to return an empty object, or an object | ||
* that does not implement `timingSafeEqual`. | ||
* in this case I need a fallback | ||
*/ | ||
const { timingSafeEqual: nodeTimingSafeEqual } = require('crypto'); | ||
return nodeTimingSafeEqual || portableTimingSafeEqual; | ||
} | ||
return (diff === 0); | ||
} | ||
catch (e) { | ||
return portableTimingSafeEqual; | ||
} | ||
/* https://codahale.com/a-lesson-in-timing-attacks/ */ | ||
function portableTimingSafeEqual(a, b) { | ||
/* It is *possible* that a runtime could optimize this constant time function. | ||
* Adding `eval` should prevent the optimization, but this is no grantee. | ||
* If you copy this function for your own use, make sure to educate yourself. | ||
* Side channel attacks are pernicious and subtle. | ||
*/ | ||
eval(''); // eslint-disable-line no-eval | ||
/* Check for early return (Postcondition) UNTESTED: Size is well-know information. | ||
* and does not leak information about contents. | ||
*/ | ||
if (a.byteLength !== b.byteLength) | ||
return false; | ||
let diff = 0; | ||
for (let i = 0; i < b.length; i++) { | ||
diff |= a[i] ^ b[i]; | ||
} | ||
return (diff === 0); | ||
} | ||
})(); | ||
class NodeEncryptionMaterial { | ||
@@ -173,3 +185,14 @@ constructor(suite, encryptionContext) { | ||
exports.isDecryptionMaterial = isDecryptionMaterial; | ||
function decorateCryptographicMaterial(material, setFlags) { | ||
function decorateCryptographicMaterial(material, setFlag) { | ||
/* Precondition: setFlag must be in the set of KeyringTraceFlag.SET_FLAGS. */ | ||
needs_1.needs(setFlag & keyring_trace_1.KeyringTraceFlag.SET_FLAGS, 'Invalid setFlag'); | ||
/* When a KeyringTraceFlag is passed to setUnencryptedDataKey, | ||
* it must be valid for the type of material. | ||
* It is invalid to claim that EncryptionMaterial were decrypted. | ||
*/ | ||
const deniedSetFlags = (keyring_trace_1.KeyringTraceFlag.SET_FLAGS ^ setFlag) | (setFlag === keyring_trace_1.KeyringTraceFlag.WRAPPING_KEY_GENERATED_DATA_KEY | ||
? keyring_trace_1.KeyringTraceFlag.DECRYPT_FLAGS | ||
: setFlag === keyring_trace_1.KeyringTraceFlag.WRAPPING_KEY_DECRYPTED_DATA_KEY | ||
? keyring_trace_1.KeyringTraceFlag.ENCRYPT_FLAGS | ||
: 0); | ||
let unencryptedDataKeyZeroed = false; | ||
@@ -183,24 +206,9 @@ let unencryptedDataKey; | ||
const setUnencryptedDataKey = (dataKey, trace) => { | ||
/* Precondition: unencryptedDataKey must not be set. Modifying the unencryptedDataKey is denied */ | ||
needs_1.needs(!unencryptedDataKey, 'unencryptedDataKey has already been set'); | ||
/* Precondition: dataKey must be Binary Data */ | ||
needs_1.needs(dataKey instanceof Uint8Array, 'dataKey must be a Uint8Array'); | ||
/* Precondition: dataKey should have an ArrayBuffer that *only* stores the key. | ||
* This is a simple check to make sure that the key is not stored on | ||
* a large potentially shared ArrayBuffer. | ||
* If this was the case, it may be possible to find or manipulate. | ||
*/ | ||
needs_1.needs(dataKey.byteOffset === 0, 'Unencrypted Master Key must be an isolated buffer.'); | ||
/* Precondition: The data key length must agree with algorithm specification. | ||
* If this is not the case, it either means ciphertext was tampered | ||
* with or the keyring implementation is not setting the length properly. | ||
*/ | ||
needs_1.needs(dataKey.byteLength === material.suite.keyLengthBytes, 'Key length does not agree with the algorithm specification.'); | ||
/* Precondition: Trace must be set, and the flag must indicate that the data key was generated. */ | ||
needs_1.needs(trace && trace.keyName && trace.keyNamespace, 'Malformed KeyringTrace'); | ||
/* Precondition: On set the required KeyringTraceFlag must be set. */ | ||
needs_1.needs(trace.flags & setFlags, 'Required KeyringTraceFlag not set'); | ||
/* Avoid making unnecessary copies of the dataKey. */ | ||
const tempUdk = dataKey instanceof Uint8Array ? dataKey : unwrapDataKey(dataKey); | ||
/* All security conditions are tested here and failures will throw. */ | ||
verifyUnencryptedDataKeyForSet(tempUdk, trace); | ||
unencryptedDataKey = wrapWithKeyObjectIfSupported(dataKey); | ||
udkForVerification = new Uint8Array(tempUdk); | ||
material.keyringTrace.push(trace); | ||
unencryptedDataKey = dataKey; | ||
udkForVerification = new Uint8Array(dataKey); | ||
return material; | ||
@@ -215,4 +223,8 @@ }; | ||
needs_1.needs(!unencryptedDataKeyZeroed, 'unencryptedDataKey has been zeroed.'); | ||
/* Precondition: The unencryptedDataKey must not have been modified. */ | ||
needs_1.needs(timingSafeEqual(udkForVerification, unencryptedDataKey), 'unencryptedDataKey has been corrupted.'); | ||
/* Precondition: The unencryptedDataKey must not have been modified. | ||
* If the unencryptedDataKey is a KeyObject, | ||
* then the security around modification is handled in C. | ||
* Do not duplicate the secret just to check... | ||
*/ | ||
needs_1.needs(!(unencryptedDataKey instanceof Uint8Array) || timingSafeEqual(udkForVerification, unwrapDataKey(unencryptedDataKey)), 'unencryptedDataKey has been corrupted.'); | ||
return unencryptedDataKey; | ||
@@ -244,2 +256,8 @@ }; | ||
} | ||
/* The KeyObject manages its own ref counter. | ||
* Once there are no more users, it will clean the memory. | ||
*/ | ||
if (!(unencryptedDataKey instanceof Uint8Array)) { | ||
unencryptedDataKey = new Uint8Array(); | ||
} | ||
unencryptedDataKey.fill(0); | ||
@@ -255,17 +273,2 @@ udkForVerification.fill(0); | ||
}; | ||
Object.defineProperty(material, 'unencryptedDataKeyLength', { | ||
get: () => { | ||
/* Precondition: The unencryptedDataKey must be set to have a length. */ | ||
needs_1.needs(unencryptedDataKey, 'unencryptedDataKey has not been set'); | ||
/* Precondition: the unencryptedDataKey must not be Zeroed out. | ||
* returning information about the data key, | ||
* while not the worst thing may indicate misuse. | ||
* Checking the algorithm specification is the proper way | ||
* to do this | ||
*/ | ||
needs_1.needs(!unencryptedDataKeyZeroed, 'unencryptedDataKey has been zeroed.'); | ||
return unencryptedDataKey.byteLength; | ||
}, | ||
enumerable: true | ||
}); | ||
immutable_class_1.readOnlyProperty(material, 'setUnencryptedDataKey', setUnencryptedDataKey); | ||
@@ -275,5 +278,31 @@ immutable_class_1.readOnlyProperty(material, 'getUnencryptedDataKey', getUnencryptedDataKey); | ||
return material; | ||
function verifyUnencryptedDataKeyForSet(dataKey, trace) { | ||
/* Precondition: unencryptedDataKey must not be set. Modifying the unencryptedDataKey is denied */ | ||
needs_1.needs(!unencryptedDataKey, 'unencryptedDataKey has already been set'); | ||
/* Precondition: dataKey must be Binary Data */ | ||
needs_1.needs(dataKey instanceof Uint8Array, 'dataKey must be a Uint8Array'); | ||
/* Precondition: dataKey should have an ArrayBuffer that *only* stores the key. | ||
* This is a simple check to make sure that the key is not stored on | ||
* a large potentially shared ArrayBuffer. | ||
* If this was the case, it may be possible to find or manipulate. | ||
*/ | ||
needs_1.needs(dataKey.byteOffset === 0, 'Unencrypted Master Key must be an isolated buffer.'); | ||
/* Precondition: The data key length must agree with algorithm specification. | ||
* If this is not the case, it either means ciphertext was tampered | ||
* with or the keyring implementation is not setting the length properly. | ||
*/ | ||
needs_1.needs(dataKey.byteLength === material.suite.keyLengthBytes, 'Key length does not agree with the algorithm specification.'); | ||
/* Precondition: Trace must be set, and the flag must indicate that the data key was generated. */ | ||
needs_1.needs(trace && trace.keyName && trace.keyNamespace, 'Malformed KeyringTrace'); | ||
/* Precondition: On set the required KeyringTraceFlag must be set. */ | ||
needs_1.needs(trace.flags & setFlag, 'Required KeyringTraceFlag not set'); | ||
/* Precondition: Only valid flags are allowed. | ||
* An unencrypted data key can not be both generated and decrypted. | ||
*/ | ||
needs_1.needs(!(trace.flags & deniedSetFlags), 'Invalid KeyringTraceFlags set.'); | ||
} | ||
} | ||
exports.decorateCryptographicMaterial = decorateCryptographicMaterial; | ||
function decorateEncryptionMaterial(material) { | ||
const deniedEncryptFlags = keyring_trace_1.KeyringTraceFlag.SET_FLAGS | keyring_trace_1.KeyringTraceFlag.DECRYPT_FLAGS; | ||
const encryptedDataKeys = []; | ||
@@ -294,13 +323,13 @@ let signatureKey; | ||
needs_1.needs(flags & keyring_trace_1.KeyringTraceFlag.WRAPPING_KEY_ENCRYPTED_DATA_KEY, 'Encrypted data key flag must be set.'); | ||
/* When the unencrypted data key is first set, a given wrapping key may or may not also encrypt that key. | ||
* This means that the first EDK that is added may already have a trace. | ||
* The flags for the EDK and the existing trace should be merged iif this is the first EDK | ||
* and the only existing trace corresponds to this EDK. | ||
/* Precondition: flags must not include a setFlag or a decrypt flag. | ||
* The setFlag is reserved for setting the unencrypted data key | ||
* and must only occur once in the set of KeyringTrace flags. | ||
* The two setFlags in use are: | ||
* KeyringTraceFlag.WRAPPING_KEY_DECRYPTED_DATA_KEY | ||
* KeyringTraceFlag.WRAPPING_KEY_GENERATED_DATA_KEY | ||
* | ||
* KeyringTraceFlag.WRAPPING_KEY_VERIFIED_ENC_CTX is reserved for the decrypt path | ||
*/ | ||
if (firstEdkAndTraceMatch(encryptedDataKeys, material.keyringTrace, edk)) { | ||
material.keyringTrace[0].flags |= flags; | ||
} | ||
else { | ||
material.keyringTrace.push({ keyName: edk.providerInfo, keyNamespace: edk.providerId, flags }); | ||
} | ||
needs_1.needs(!(flags & deniedEncryptFlags), 'Invalid flag for EncryptedDataKey.'); | ||
material.keyringTrace.push({ keyName: edk.providerInfo, keyNamespace: edk.providerId, flags }); | ||
encryptedDataKeys.push(edk); | ||
@@ -344,9 +373,2 @@ return material; | ||
exports.decorateEncryptionMaterial = decorateEncryptionMaterial; | ||
/* Verify that the this is the first EDK and that it matches the 1 and only 1 trace. */ | ||
function firstEdkAndTraceMatch(edks, traces, edk) { | ||
return edks.length === 0 && | ||
traces.length === 1 && | ||
edk.providerId === traces[0].keyNamespace && | ||
edk.providerInfo === traces[0].keyName; | ||
} | ||
function decorateDecryptionMaterial(material) { | ||
@@ -490,2 +512,27 @@ // Verification Key | ||
exports.subtleFunctionForMaterial = subtleFunctionForMaterial; | ||
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cryptographic_material.js","sourceRoot":"","sources":["../../src/cryptographic_material.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;;;GAaG;;AAGH,6DAAuD;AACvD,mDAA+D;AAC/D,uDAAiE;AACjE,mDAAgE,CAAC,qCAAqC;AACtG,uDAAsD;AACtD,mEAAiE;AACjE,mCAA+B;AAE/B;;;;;;;;;;;;;;;GAeG;AAEH,IAAI,eAA0D,CAAA;AAC9D,IAAI;IACF;;;OAGG;IACH,MAAM,EAAE,eAAe,EAAE,mBAAmB,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAA;IAClE,eAAe,GAAG,mBAAmB,IAAI,uBAAuB,CAAA;CACjE;AAAC,OAAO,CAAC,EAAE;IACV,eAAe,GAAG,uBAAuB,CAAA;CAC1C;AACD,sDAAsD;AACtD,SAAS,uBAAuB,CAAE,CAAa,EAAE,CAAa;IAC5D;;;;OAIG;IACH,IAAI,CAAC,EAAE,CAAC,CAAA,CAAC,8BAA8B;IACvC;;OAEG;IACH,IAAI,CAAC,CAAC,UAAU,KAAK,CAAC,CAAC,UAAU;QAAE,OAAO,KAAK,CAAA;IAE/C,IAAI,IAAI,GAAG,CAAC,CAAA;IACZ,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;QACjC,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAA;KACpB;IACD,OAAO,CAAC,IAAI,KAAK,CAAC,CAAC,CAAA;AACrB,CAAC;AAoCD,MAAa,sBAAsB;IAejC,YAAa,KAAyB,EAAE,iBAAoC;QAN5E,iBAAY,GAAmB,EAAE,CAAA;QAO/B,4EAA4E;QAC5E,aAAK,CAAC,KAAK,YAAY,oCAAkB,EAAE,oCAAoC,CAAC,CAAA;QAChF,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,oGAAoG;QACpG,aAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,QAAQ,GAAG,gCAAgB,CAAC,+BAA+B,CAAA;QACjE,6BAA6B,CAAyB,IAAI,EAAE,QAAQ,CAAC,CAAA;QACrE,0BAA0B,CAAyB,IAAI,CAAC,CAAA;QACxD,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,sBAAsB,CAAC,SAAS,CAAC,CAAA;QAC7D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,CAAA;IACnC,CAAC;CACF;AAhCD,wDAgCC;AACD,6BAAW,CAAC,sBAAsB,CAAC,CAAA;AAEnC,MAAa,sBAAsB;IAajC,YAAa,KAAyB,EAAE,iBAAoC;QAJ5E,iBAAY,GAAmB,EAAE,CAAA;QAK/B,4EAA4E;QAC5E,aAAK,CAAC,KAAK,YAAY,oCAAkB,EAAE,oCAAoC,CAAC,CAAA;QAChF,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,oGAAoG;QACpG,aAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,QAAQ,GAAG,gCAAgB,CAAC,+BAA+B,CAAA;QACjE,6BAA6B,CAAyB,IAAI,EAAE,QAAQ,CAAC,CAAA;QACrE,0BAA0B,CAAyB,IAAI,CAAC,CAAA;QACxD,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,sBAAsB,CAAC,SAAS,CAAC,CAAA;QAC7D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,CAAA;IACnC,CAAC;CACF;AA9BD,wDA8BC;AACD,6BAAW,CAAC,sBAAsB,CAAC,CAAA;AAEnC,MAAa,2BAA2B;IAoBtC,YAAa,KAA8B,EAAE,iBAAoC;QAVjF,iBAAY,GAAmB,EAAE,CAAA;QAW/B,sFAAsF;QACtF,aAAK,CAAC,KAAK,YAAY,+CAAuB,EAAE,yCAAyC,CAAC,CAAA;QAC1F,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,MAAM,CAAsB,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC,CAAA;QAC/E,yGAAyG;QACzG,aAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,OAAO,GAAG,gCAAgB,CAAC,+BAA+B,CAAA;QAChE,6BAA6B,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACzE,0BAA0B,CAA8B,IAAI,CAAC,CAAA;QAC7D,yBAAyB,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,2BAA2B,CAAC,SAAS,CAAC,CAAA;QAClE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,YAAY,CAAA;IACxD,CAAC;CACF;AAvCD,kEAuCC;AACD,6BAAW,CAAC,2BAA2B,CAAC,CAAA;AAExC,MAAa,2BAA2B;IAkBtC,YAAa,KAA8B,EAAE,iBAAoC;QARjF,iBAAY,GAAmB,EAAE,CAAA;QAS/B,sFAAsF;QACtF,aAAK,CAAC,KAAK,YAAY,+CAAuB,EAAE,yCAAyC,CAAC,CAAA;QAC1F,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,MAAM,CAAsB,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC,CAAA;QAC/E,yGAAyG;QACzG,aAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,OAAO,GAAG,gCAAgB,CAAC,+BAA+B,CAAA;QAChE,6BAA6B,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACzE,0BAA0B,CAA8B,IAAI,CAAC,CAAA;QAC7D,yBAAyB,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,2BAA2B,CAAC,SAAS,CAAC,CAAA;QAClE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,YAAY,CAAA;IAC1B,CAAC;CACF;AArCD,kEAqCC;AACD,6BAAW,CAAC,2BAA2B,CAAC,CAAA;AAExC,SAAgB,oBAAoB,CAAE,GAAQ;IAC5C,OAAO,CAAC,GAAG,YAAY,2BAA2B,CAAC,IAAI,CAAC,GAAG,YAAY,sBAAsB,CAAC,CAAA;AAChG,CAAC;AAFD,oDAEC;AAED,SAAgB,oBAAoB,CAAE,GAAQ;IAC5C,OAAO,CAAC,GAAG,YAAY,2BAA2B,CAAC,IAAI,CAAC,GAAG,YAAY,sBAAsB,CAAC,CAAA;AAChG,CAAC;AAFD,oDAEC;AAED,SAAgB,6BAA6B,CAAsC,QAAW,EAAE,QAA0B;IACxH,IAAI,wBAAwB,GAAG,KAAK,CAAA;IACpC,IAAI,kBAA8B,CAAA;IAClC,mEAAmE;IACnE,uDAAuD;IACvD,0DAA0D;IAC1D,oDAAoD;IACpD,IAAI,kBAA8B,CAAA;IAElC,MAAM,qBAAqB,GAAG,CAAC,OAAmB,EAAE,KAAmB,EAAE,EAAE;QACzE,mGAAmG;QACnG,aAAK,CAAC,CAAC,kBAAkB,EAAE,yCAAyC,CAAC,CAAA;QACrE,+CAA+C;QAC/C,aAAK,CAAC,OAAO,YAAY,UAAU,EAAE,8BAA8B,CAAC,CAAA;QACpE;;;;WAIG;QACH,aAAK,CAAC,OAAO,CAAC,UAAU,KAAK,CAAC,EAAE,oDAAoD,CAAC,CAAA;QACrF;;;WAGG;QACH,aAAK,CAAC,OAAO,CAAC,UAAU,KAAK,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,6DAA6D,CAAC,CAAA;QAE1H,kGAAkG;QAClG,aAAK,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,YAAY,EAAE,wBAAwB,CAAC,CAAA;QAC7E,qEAAqE;QACrE,aAAK,CAAC,KAAK,CAAC,KAAK,GAAG,QAAQ,EAAE,mCAAmC,CAAC,CAAA;QAClE,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;QAEjC,kBAAkB,GAAG,OAAO,CAAA;QAC5B,kBAAkB,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAA;QAE5C,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,MAAM,qBAAqB,GAAG,GAAe,EAAE;QAC7C,2EAA2E;QAC3E,aAAK,CAAC,kBAAkB,EAAE,qCAAqC,CAAC,CAAA;QAChE;;WAEG;QACH,aAAK,CAAC,CAAC,wBAAwB,EAAE,qCAAqC,CAAC,CAAA;QACvE,uEAAuE;QACvE,aAAK,CAAC,eAAe,CAAC,kBAAkB,EAAE,kBAAkB,CAAC,EAAE,wCAAwC,CAAC,CAAA;QACxG,OAAO,kBAAkB,CAAA;IAC3B,CAAC,CAAA;IACD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,uBAAuB,EAAE;QACvD,8DAA8D;QAC9D,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,kBAAkB,IAAI,CAAC,wBAAwB;QAC5D,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IACF,MAAM,sBAAsB,GAAG,GAAG,EAAE;QAClC;;;;;;WAMG;QACH,IAAI,UAAU,GAAG,CAAC,CAAA;QAClB,gGAAgG;QAChG,IAAI,CAAC,kBAAkB,EAAE;YACvB,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;YACrC,UAAU,IAAI,CAAC,CAAA;SAChB;QACD,gGAAgG;QAChG,IAAI,CAAC,kBAAkB,EAAE;YACvB,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;YACrC,UAAU,IAAI,CAAC,CAAA;SAChB;QACD,kBAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;QAC1B,kBAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;QAC1B,wBAAwB,GAAG,IAAI,CAAA;QAE/B;;;WAGG;QACH,aAAK,CAAC,UAAU,KAAK,CAAC,IAAI,UAAU,KAAK,CAAC,EAAE,8DAA8D,CAAC,CAAA;QAC3G,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,0BAA0B,EAAE;QAC1D,GAAG,EAAE,GAAG,EAAE;YACR,wEAAwE;YACxE,aAAK,CAAC,kBAAkB,EAAE,qCAAqC,CAAC,CAAA;YAChE;;;;;eAKG;YACH,aAAK,CAAC,CAAC,wBAAwB,EAAE,qCAAqC,CAAC,CAAA;YACvE,OAAO,kBAAkB,CAAC,UAAU,CAAA;QACtC,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,kCAAgB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,qBAAqB,CAAC,CAAA;IAC1E,kCAAgB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,qBAAqB,CAAC,CAAA;IAC1E,kCAAgB,CAAC,QAAQ,EAAE,wBAAwB,EAAE,sBAAsB,CAAC,CAAA;IAE5E,OAAO,QAAQ,CAAA;AACjB,CAAC;AAxGD,sEAwGC;AAED,SAAgB,0BAA0B,CAAmC,QAAW;IACtF,MAAM,iBAAiB,GAAuB,EAAE,CAAA;IAChD,IAAI,YAA8C,CAAA;IAElD,MAAM,mBAAmB,GAAG,CAAC,GAAqB,EAAE,KAAuB,EAAE,EAAE;QAC7E;;;WAGG;QACH,aAAK,CAAC,QAAQ,CAAC,qBAAqB,EAAE,+BAA+B,CAAC,CAAA;QACtE;;;WAGG;QACH,aAAK,CAAC,GAAG,YAAY,qCAAgB,EAAE,0CAA0C,CAAC,CAAA;QAElF,mEAAmE;QACnE,aAAK,CAAC,KAAK,GAAG,gCAAgB,CAAC,+BAA+B,EAAE,sCAAsC,CAAC,CAAA;QACvG;;;;WAIG;QACH,IAAI,qBAAqB,CAAC,iBAAiB,EAAE,QAAQ,CAAC,YAAY,EAAE,GAAG,CAAC,EAAE;YACxE,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,KAAK,IAAI,KAAK,CAAA;SACxC;aAAM;YACL,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,GAAG,CAAC,YAAY,EAAE,YAAY,EAAE,GAAG,CAAC,UAAU,EAAE,KAAK,EAAE,CAAC,CAAA;SAC/F;QAED,iBAAiB,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;QAC3B,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,kCAAgB,CAAC,QAAQ,EAAE,qBAAqB,EAAE,mBAAmB,CAAC,CAAA;IACtE,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,mBAAmB,EAAE;QACnD,qDAAqD;QACrD,0BAA0B;QAC1B,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,GAAG,iBAAiB,CAAC;QACjC,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IACF,MAAM,eAAe,GAAG,CAAC,GAAiB,EAAE,EAAE;QAC5C;;;WAGG;QACH,aAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,sDAAsD,CAAC,CAAA;QAC5F,wFAAwF;QACxF,aAAK,CAAC,CAAC,YAAY,EAAE,qCAAqC,CAAC,CAAA;QAC3D,+CAA+C;QAC/C,aAAK,CAAC,GAAG,YAAY,4BAAY,EAAE,6BAA6B,CAAC,CAAA;QACjE,YAAY,GAAG,GAAG,CAAA;QAClB,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,kCAAgB,CAAC,QAAQ,EAAE,iBAAiB,EAAE,eAAe,CAAC,CAAA;IAC9D,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,cAAc,EAAE;QAC9C,GAAG,EAAE,GAAG,EAAE;YACR;;;eAGG;YACH,aAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,KAAK,CAAC,CAAC,YAAY,EAAE,wCAAwC,CAAC,CAAA;YACnG,OAAO,YAAY,CAAA;QACrB,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAnED,gEAmEC;AAED,uFAAuF;AACvF,SAAS,qBAAqB,CAAE,IAAwB,EAAE,MAAsB,EAAE,GAAqB;IACrG,OAAO,IAAI,CAAC,MAAM,KAAK,CAAC;QACxB,MAAM,CAAC,MAAM,KAAK,CAAC;QACnB,GAAG,CAAC,UAAU,KAAK,MAAM,CAAC,CAAC,CAAC,CAAC,YAAY;QACzC,GAAG,CAAC,YAAY,KAAK,MAAM,CAAC,CAAC,CAAC,CAAC,OAAO,CAAA;AACxC,CAAC;AAED,SAAgB,0BAA0B,CAAmC,QAAW;IACtF,mBAAmB;IACnB,IAAI,eAAoD,CAAA;IACxD,MAAM,kBAAkB,GAAG,CAAC,GAAoB,EAAE,EAAE;QAClD;;;WAGG;QACH,aAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,sDAAsD,CAAC,CAAA;QAC5F,8FAA8F;QAC9F,aAAK,CAAC,CAAC,eAAe,EAAE,wCAAwC,CAAC,CAAA;QACjE,kDAAkD;QAClD,aAAK,CAAC,GAAG,YAAY,+BAAe,EAAE,6BAA6B,CAAC,CAAA;QACpE,eAAe,GAAG,GAAG,CAAA;QACrB,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,kCAAgB,CAAC,QAAQ,EAAE,oBAAoB,EAAE,kBAAkB,CAAC,CAAA;IACpE,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,iBAAiB,EAAE;QACjD,GAAG,EAAE,GAAG,EAAE;YACR;;;eAGG;YACH,aAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,KAAK,CAAC,CAAC,eAAe,EAAE,wCAAwC,CAAC,CAAA;YACtG,OAAO,eAAe,CAAA;QACxB,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AA9BD,gEA8BC;AAED,SAAgB,yBAAyB,CAAkC,QAAW,EAAE,QAA0B;IAChH,IAAI,SAAuE,CAAA;IAE3E,MAAM,YAAY,GAAG,CAAC,OAAiD,EAAE,KAAmB,EAAE,EAAE;QAC9F,iFAAiF;QACjF,aAAK,CAAC,CAAC,SAAS,EAAE,2BAA2B,CAAC,CAAA;QAC9C,qDAAqD;QACrD,aAAK,CAAC,WAAW,CAAC,OAAO,CAAC,IAAI,uBAAuB,CAAC,OAAO,CAAC,EAAE,2BAA2B,CAAC,CAAA;QAC5F,+EAA+E;QAC/E,aAAK,CAAC,gBAAgB,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,oCAAoC,CAAC,CAAA;QAEhF;;WAEG;QACH,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE;YACnC,iGAAiG;YACjG,aAAK,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,YAAY,EAAE,wBAAwB,CAAC,CAAA;YAC7E,uFAAuF;YACvF,aAAK,CAAC,KAAK,CAAC,KAAK,GAAG,QAAQ,EAAE,mCAAmC,CAAC,CAAA;YAClE;;;;;eAKG;YACH,QAAQ,CAAC,sBAAsB,EAAE,CAAA;YACjC,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;SAClC;QAED,IAAI,WAAW,CAAC,OAAO,CAAC,EAAE;YACxB,SAAS,GAAG,OAAO,CAAA;SACpB;aAAM;YACL,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;YAC3D,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,CAAC,CAAA;SACvE;QAED,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,kCAAgB,CAAC,QAAQ,EAAE,cAAc,EAAE,YAAY,CAAC,CAAA;IACxD,MAAM,YAAY,GAAG,GAAG,EAAE;QACxB,sEAAsE;QACtE,aAAK,CAAC,SAAS,EAAE,wBAAwB,CAAC,CAAA;QAC1C,kDAAkD;QAClD,wDAAwD;QACxD,OAA2D,SAAS,CAAA;IACtE,CAAC,CAAA;IACD,kCAAgB,CAAC,QAAQ,EAAE,cAAc,EAAE,YAAY,CAAC,CAAA;IAExD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,cAAc,EAAE;QAC9C,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,SAAS;QACtB,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAvDD,8DAuDC;AAED,SAAgB,WAAW,CAAE,OAAY;IACvC,OAAO,OAAO;QACZ,WAAW,IAAI,OAAO;QACtB,MAAM,IAAI,OAAO;QACjB,WAAW,IAAI,OAAO;QACtB,QAAQ,IAAI,OAAO;QACnB,aAAa,IAAI,OAAO,CAAA;AAC5B,CAAC;AAPD,kCAOC;AAED,SAAgB,gBAAgB,CAC9B,OAAiD,EACjD,QAAW;IAEX,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,EAAE;QACzB,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;QAC3D,OAAO,gBAAgB,CAAC,iBAAiB,EAAE,QAAQ,CAAC;YAClD,gBAAgB,CAAC,oBAAoB,EAAE,QAAQ,CAAC,CAAA;KACnD;IAED,MAAM,EAAE,KAAK,EAAE,WAAW,EAAE,GAAG,QAAQ,CAAA;IACvC,MAAM,EAAE,UAAU,EAAE,SAAS,EAAE,GAAG,EAAE,GAAG,KAAK,CAAA;IAE5C;;;OAGG;IAEH,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,WAAW,EAAE,GAAG,OAAO,CAAA;IACxD,4CAA4C;IAC5C,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,SAAS,CAAA;IAElC,4BAA4B;IAC5B,OAAO,IAAI,KAAK,QAAQ;QACtB,uBAAuB;QACvB,CAAC,CAAC,GAAG,IAAI,IAAI,KAAK,GAAG,CAAC;YACrB,CAAC,IAAI,KAAK,UAAU,IAAI,MAAM,KAAK,SAAS,CAAC,CAAC;QAC/C;;WAEG;QACH,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;QACzC,8EAA8E;QAC9E,CAAC,WAAW,CAAA;AAChB,CAAC;AAjCD,4CAiCC;AAED,SAAS,uBAAuB,CAAE,OAAY;IAC5C,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;IAC3D,OAAO,WAAW,CAAC,iBAAiB,CAAC,IAAI,WAAW,CAAC,oBAAoB,CAAC,CAAA;AAC5E,CAAC;AAED,SAAgB,mBAAmB,CAAkC,QAAW;IAC9E,MAAM,EAAE,KAAK,EAAE,GAAG,QAAQ,CAAA;IAC1B,IAAI,KAAK,CAAC,GAAG;QAAE,OAAO,WAAW,CAAA;IACjC,OAAO,yBAAyB,CAAC,QAAQ,CAAC,CAAA;AAC5C,CAAC;AAJD,kDAIC;AAED,SAAgB,yBAAyB,CAAkC,QAAW;IACpF,IAAI,QAAQ,YAAY,2BAA2B;QAAE,OAAO,SAAS,CAAA;IACrE,IAAI,QAAQ,YAAY,2BAA2B;QAAE,OAAO,SAAS,CAAA;IAErE,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAA;AACzC,CAAC;AALD,8DAKC"} | ||
function unwrapDataKey(dataKey) { | ||
if (dataKey instanceof Uint8Array) | ||
return dataKey; | ||
if (exports.supportsKeyObject && dataKey instanceof exports.supportsKeyObject.KeyObject) | ||
return dataKey.export(); | ||
throw new Error('Unsupported dataKey type'); | ||
} | ||
exports.unwrapDataKey = unwrapDataKey; | ||
function wrapWithKeyObjectIfSupported(dataKey) { | ||
if (exports.supportsKeyObject) { | ||
if (dataKey instanceof Uint8Array) { | ||
const ko = exports.supportsKeyObject.createSecretKey(dataKey); | ||
/* Postcondition: Zero the secret. It is now inside the KeyObject. */ | ||
dataKey.fill(0); | ||
return ko; | ||
} | ||
if (dataKey instanceof exports.supportsKeyObject.KeyObject) | ||
return dataKey; | ||
} | ||
else if (dataKey instanceof Uint8Array) { | ||
return dataKey; | ||
} | ||
throw new Error('Unsupported dataKey type'); | ||
} | ||
exports.wrapWithKeyObjectIfSupported = wrapWithKeyObjectIfSupported; | ||
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cryptographic_material.js","sourceRoot":"","sources":["../../src/cryptographic_material.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;;;GAaG;;AAWH,6DAAuD;AACvD,mDAA+D;AAC/D,uDAAiE;AACjE,mDAAgE,CAAC,qCAAqC;AACtG,uDAAsD;AACtD,mEAAiE;AACjE,mCAA+B;AAYlB,QAAA,iBAAiB,GAAG,CAAC;IAChC,IAAI;QACF,MAAM,EAAE,SAAS,EAAE,eAAe,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAkB,CAAA;QACzE,IAAI,CAAC,SAAS,IAAI,CAAC,eAAe;YAAE,OAAO,KAAK,CAAA;QAEhD,OAAO,EAAE,SAAS,EAAE,eAAe,EAAE,CAAA;KACtC;IAAC,OAAO,EAAE,EAAE;QACX,OAAO,KAAK,CAAA;KACb;AACH,CAAC,CAAC,EAAE,CAAA;AAEJ;;;;;;;;;;;;;;;GAeG;AAEH,MAAM,eAAe,GAA8C,CAAC;IAClE,IAAI;QACF;;;WAGG;QACH,MAAM,EAAE,eAAe,EAAE,mBAAmB,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAA;QAClE,OAAO,mBAAmB,IAAI,uBAAuB,CAAA;KACtD;IAAC,OAAO,CAAC,EAAE;QACV,OAAO,uBAAuB,CAAA;KAC/B;IACD,sDAAsD;IACtD,SAAS,uBAAuB,CAAE,CAAa,EAAE,CAAa;QAC5D;;;;YAII;QACJ,IAAI,CAAC,EAAE,CAAC,CAAA,CAAC,8BAA8B;QACvC;;YAEI;QACJ,IAAI,CAAC,CAAC,UAAU,KAAK,CAAC,CAAC,UAAU;YAAE,OAAO,KAAK,CAAA;QAE/C,IAAI,IAAI,GAAG,CAAC,CAAA;QACZ,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;YACjC,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAA;SACpB;QACD,OAAO,CAAC,IAAI,KAAK,CAAC,CAAC,CAAA;IACrB,CAAC;AACH,CAAC,CAAC,EAAE,CAAA;AAmCJ,MAAa,sBAAsB;IAcjC,YAAa,KAAyB,EAAE,iBAAoC;QAN5E,iBAAY,GAAmB,EAAE,CAAA;QAO/B,4EAA4E;QAC5E,aAAK,CAAC,KAAK,YAAY,oCAAkB,EAAE,oCAAoC,CAAC,CAAA;QAChF,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,oGAAoG;QACpG,aAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,QAAQ,GAAG,gCAAgB,CAAC,+BAA+B,CAAA;QACjE,6BAA6B,CAAyB,IAAI,EAAE,QAAQ,CAAC,CAAA;QACrE,0BAA0B,CAAyB,IAAI,CAAC,CAAA;QACxD,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,sBAAsB,CAAC,SAAS,CAAC,CAAA;QAC7D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,CAAA;IACnC,CAAC;CACF;AA/BD,wDA+BC;AACD,6BAAW,CAAC,sBAAsB,CAAC,CAAA;AAEnC,MAAa,sBAAsB;IAYjC,YAAa,KAAyB,EAAE,iBAAoC;QAJ5E,iBAAY,GAAmB,EAAE,CAAA;QAK/B,4EAA4E;QAC5E,aAAK,CAAC,KAAK,YAAY,oCAAkB,EAAE,oCAAoC,CAAC,CAAA;QAChF,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,oGAAoG;QACpG,aAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,QAAQ,GAAG,gCAAgB,CAAC,+BAA+B,CAAA;QACjE,6BAA6B,CAAyB,IAAI,EAAE,QAAQ,CAAC,CAAA;QACrE,0BAA0B,CAAyB,IAAI,CAAC,CAAA;QACxD,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,sBAAsB,CAAC,SAAS,CAAC,CAAA;QAC7D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,CAAA;IACnC,CAAC;CACF;AA7BD,wDA6BC;AACD,6BAAW,CAAC,sBAAsB,CAAC,CAAA;AAEnC,MAAa,2BAA2B;IAmBtC,YAAa,KAA8B,EAAE,iBAAoC;QAVjF,iBAAY,GAAmB,EAAE,CAAA;QAW/B,sFAAsF;QACtF,aAAK,CAAC,KAAK,YAAY,+CAAuB,EAAE,yCAAyC,CAAC,CAAA;QAC1F,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,MAAM,CAAsB,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC,CAAA;QAC/E,yGAAyG;QACzG,aAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,OAAO,GAAG,gCAAgB,CAAC,+BAA+B,CAAA;QAChE,6BAA6B,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACzE,0BAA0B,CAA8B,IAAI,CAAC,CAAA;QAC7D,yBAAyB,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,2BAA2B,CAAC,SAAS,CAAC,CAAA;QAClE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,YAAY,CAAA;IACxD,CAAC;CACF;AAtCD,kEAsCC;AACD,6BAAW,CAAC,2BAA2B,CAAC,CAAA;AAExC,MAAa,2BAA2B;IAiBtC,YAAa,KAA8B,EAAE,iBAAoC;QARjF,iBAAY,GAAmB,EAAE,CAAA;QAS/B,sFAAsF;QACtF,aAAK,CAAC,KAAK,YAAY,+CAAuB,EAAE,yCAAyC,CAAC,CAAA;QAC1F,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,MAAM,CAAsB,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC,CAAA;QAC/E,yGAAyG;QACzG,aAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,OAAO,GAAG,gCAAgB,CAAC,+BAA+B,CAAA;QAChE,6BAA6B,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACzE,0BAA0B,CAA8B,IAAI,CAAC,CAAA;QAC7D,yBAAyB,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,2BAA2B,CAAC,SAAS,CAAC,CAAA;QAClE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,YAAY,CAAA;IAC1B,CAAC;CACF;AApCD,kEAoCC;AACD,6BAAW,CAAC,2BAA2B,CAAC,CAAA;AAExC,SAAgB,oBAAoB,CAAE,GAAQ;IAC5C,OAAO,CAAC,GAAG,YAAY,2BAA2B,CAAC,IAAI,CAAC,GAAG,YAAY,sBAAsB,CAAC,CAAA;AAChG,CAAC;AAFD,oDAEC;AAED,SAAgB,oBAAoB,CAAE,GAAQ;IAC5C,OAAO,CAAC,GAAG,YAAY,2BAA2B,CAAC,IAAI,CAAC,GAAG,YAAY,sBAAsB,CAAC,CAAA;AAChG,CAAC;AAFD,oDAEC;AAED,SAAgB,6BAA6B,CAAsC,QAAW,EAAE,OAAyB;IACvH,6EAA6E;IAC7E,aAAK,CAAC,OAAO,GAAG,gCAAgB,CAAC,SAAS,EAAE,iBAAiB,CAAC,CAAA;IAC9D;;;OAGG;IACH,MAAM,cAAc,GAAG,CAAC,gCAAgB,CAAC,SAAS,GAAG,OAAO,CAAC,GAAG,CAC9D,OAAO,KAAK,gCAAgB,CAAC,+BAA+B;QAC1D,CAAC,CAAC,gCAAgB,CAAC,aAAa;QAChC,CAAC,CAAC,OAAO,KAAK,gCAAgB,CAAC,+BAA+B;YAC5D,CAAC,CAAC,gCAAgB,CAAC,aAAa;YAChC,CAAC,CAAC,CAAC,CAAC,CAAA;IAEV,IAAI,wBAAwB,GAAG,KAAK,CAAA;IACpC,IAAI,kBAAiD,CAAA;IACrD,mEAAmE;IACnE,uDAAuD;IACvD,0DAA0D;IAC1D,oDAAoD;IACpD,IAAI,kBAA8B,CAAA;IAElC,MAAM,qBAAqB,GAAG,CAAC,OAAoC,EAAE,KAAmB,EAAE,EAAE;QAC1F,qDAAqD;QACrD,MAAM,OAAO,GAAG,OAAO,YAAY,UAAU,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,aAAa,CAAC,OAAO,CAAC,CAAA;QAChF,sEAAsE;QACtE,8BAA8B,CAAC,OAAO,EAAE,KAAK,CAAC,CAAA;QAC9C,kBAAkB,GAAG,4BAA4B,CAAC,OAAO,CAAC,CAAA;QAC1D,kBAAkB,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAA;QAC5C,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;QAEjC,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,MAAM,qBAAqB,GAAG,GAAgC,EAAE;QAC9D,2EAA2E;QAC3E,aAAK,CAAC,kBAAkB,EAAE,qCAAqC,CAAC,CAAA;QAChE;;WAEG;QACH,aAAK,CAAC,CAAC,wBAAwB,EAAE,qCAAqC,CAAC,CAAA;QACvE;;;;WAIG;QACH,aAAK,CAAC,CAAC,CAAC,kBAAkB,YAAY,UAAU,CAAC,IAAI,eAAe,CAAC,kBAAkB,EAAE,aAAa,CAAC,kBAAkB,CAAC,CAAC,EAAE,wCAAwC,CAAC,CAAA;QACtK,OAAO,kBAAkB,CAAA;IAC3B,CAAC,CAAA;IACD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,uBAAuB,EAAE;QACvD,8DAA8D;QAC9D,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,kBAAkB,IAAI,CAAC,wBAAwB;QAC5D,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IACF,MAAM,sBAAsB,GAAG,GAAG,EAAE;QAClC;;;;;;WAMG;QACH,IAAI,UAAU,GAAG,CAAC,CAAA;QAClB,gGAAgG;QAChG,IAAI,CAAC,kBAAkB,EAAE;YACvB,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;YACrC,UAAU,IAAI,CAAC,CAAA;SAChB;QACD,gGAAgG;QAChG,IAAI,CAAC,kBAAkB,EAAE;YACvB,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;YACrC,UAAU,IAAI,CAAC,CAAA;SAChB;QACD;;WAEG;QACH,IAAI,CAAC,CAAC,kBAAkB,YAAY,UAAU,CAAC,EAAE;YAC/C,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;SACtC;QACD,kBAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;QAC1B,kBAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;QAC1B,wBAAwB,GAAG,IAAI,CAAA;QAE/B;;;WAGG;QACH,aAAK,CAAC,UAAU,KAAK,CAAC,IAAI,UAAU,KAAK,CAAC,EAAE,8DAA8D,CAAC,CAAA;QAC3G,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,kCAAgB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,qBAAqB,CAAC,CAAA;IAC1E,kCAAgB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,qBAAqB,CAAC,CAAA;IAC1E,kCAAgB,CAAC,QAAQ,EAAE,wBAAwB,EAAE,sBAAsB,CAAC,CAAA;IAE5E,OAAO,QAAQ,CAAA;IAEf,SAAS,8BAA8B,CAAE,OAAmB,EAAE,KAAmB;QAC/E,mGAAmG;QACnG,aAAK,CAAC,CAAC,kBAAkB,EAAE,yCAAyC,CAAC,CAAA;QACrE,+CAA+C;QAC/C,aAAK,CAAC,OAAO,YAAY,UAAU,EAAE,8BAA8B,CAAC,CAAA;QACpE;;;;WAIG;QACH,aAAK,CAAC,OAAO,CAAC,UAAU,KAAK,CAAC,EAAE,oDAAoD,CAAC,CAAA;QACrF;;;WAGG;QACH,aAAK,CAAC,OAAO,CAAC,UAAU,KAAK,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,6DAA6D,CAAC,CAAA;QAE1H,kGAAkG;QAClG,aAAK,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,YAAY,EAAE,wBAAwB,CAAC,CAAA;QAC7E,qEAAqE;QACrE,aAAK,CAAC,KAAK,CAAC,KAAK,GAAG,OAAO,EAAE,mCAAmC,CAAC,CAAA;QACjE;;WAEG;QACH,aAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,GAAG,cAAc,CAAC,EAAE,gCAAgC,CAAC,CAAA;IAC1E,CAAC;AACH,CAAC;AA1HD,sEA0HC;AAED,SAAgB,0BAA0B,CAAmC,QAAW;IACtF,MAAM,kBAAkB,GAAG,gCAAgB,CAAC,SAAS,GAAG,gCAAgB,CAAC,aAAa,CAAA;IACtF,MAAM,iBAAiB,GAAuB,EAAE,CAAA;IAChD,IAAI,YAA8C,CAAA;IAElD,MAAM,mBAAmB,GAAG,CAAC,GAAqB,EAAE,KAAuB,EAAE,EAAE;QAC7E;;;WAGG;QACH,aAAK,CAAC,QAAQ,CAAC,qBAAqB,EAAE,+BAA+B,CAAC,CAAA;QACtE;;;WAGG;QACH,aAAK,CAAC,GAAG,YAAY,qCAAgB,EAAE,0CAA0C,CAAC,CAAA;QAElF,mEAAmE;QACnE,aAAK,CAAC,KAAK,GAAG,gCAAgB,CAAC,+BAA+B,EAAE,sCAAsC,CAAC,CAAA;QAEvG;;;;;;;;WAQG;QACH,aAAK,CAAC,CAAC,CAAC,KAAK,GAAG,kBAAkB,CAAC,EAAE,oCAAoC,CAAC,CAAA;QAC1E,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,GAAG,CAAC,YAAY,EAAE,YAAY,EAAE,GAAG,CAAC,UAAU,EAAE,KAAK,EAAE,CAAC,CAAA;QAE9F,iBAAiB,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;QAC3B,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,kCAAgB,CAAC,QAAQ,EAAE,qBAAqB,EAAE,mBAAmB,CAAC,CAAA;IACtE,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,mBAAmB,EAAE;QACnD,qDAAqD;QACrD,0BAA0B;QAC1B,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,GAAG,iBAAiB,CAAC;QACjC,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IACF,MAAM,eAAe,GAAG,CAAC,GAAiB,EAAE,EAAE;QAC5C;;;WAGG;QACH,aAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,sDAAsD,CAAC,CAAA;QAC5F,wFAAwF;QACxF,aAAK,CAAC,CAAC,YAAY,EAAE,qCAAqC,CAAC,CAAA;QAC3D,+CAA+C;QAC/C,aAAK,CAAC,GAAG,YAAY,4BAAY,EAAE,6BAA6B,CAAC,CAAA;QACjE,YAAY,GAAG,GAAG,CAAA;QAClB,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,kCAAgB,CAAC,QAAQ,EAAE,iBAAiB,EAAE,eAAe,CAAC,CAAA;IAC9D,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,cAAc,EAAE;QAC9C,GAAG,EAAE,GAAG,EAAE;YACR;;;eAGG;YACH,aAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,KAAK,CAAC,CAAC,YAAY,EAAE,wCAAwC,CAAC,CAAA;YACnG,OAAO,YAAY,CAAA;QACrB,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAtED,gEAsEC;AAED,SAAgB,0BAA0B,CAAmC,QAAW;IACtF,mBAAmB;IACnB,IAAI,eAAoD,CAAA;IACxD,MAAM,kBAAkB,GAAG,CAAC,GAAoB,EAAE,EAAE;QAClD;;;WAGG;QACH,aAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,sDAAsD,CAAC,CAAA;QAC5F,8FAA8F;QAC9F,aAAK,CAAC,CAAC,eAAe,EAAE,wCAAwC,CAAC,CAAA;QACjE,kDAAkD;QAClD,aAAK,CAAC,GAAG,YAAY,+BAAe,EAAE,6BAA6B,CAAC,CAAA;QACpE,eAAe,GAAG,GAAG,CAAA;QACrB,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,kCAAgB,CAAC,QAAQ,EAAE,oBAAoB,EAAE,kBAAkB,CAAC,CAAA;IACpE,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,iBAAiB,EAAE;QACjD,GAAG,EAAE,GAAG,EAAE;YACR;;;eAGG;YACH,aAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,KAAK,CAAC,CAAC,eAAe,EAAE,wCAAwC,CAAC,CAAA;YACtG,OAAO,eAAe,CAAA;QACxB,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AA9BD,gEA8BC;AAED,SAAgB,yBAAyB,CAAkC,QAAW,EAAE,QAA0B;IAChH,IAAI,SAAuE,CAAA;IAE3E,MAAM,YAAY,GAAG,CAAC,OAAiD,EAAE,KAAmB,EAAE,EAAE;QAC9F,iFAAiF;QACjF,aAAK,CAAC,CAAC,SAAS,EAAE,2BAA2B,CAAC,CAAA;QAC9C,qDAAqD;QACrD,aAAK,CAAC,WAAW,CAAC,OAAO,CAAC,IAAI,uBAAuB,CAAC,OAAO,CAAC,EAAE,2BAA2B,CAAC,CAAA;QAC5F,+EAA+E;QAC/E,aAAK,CAAC,gBAAgB,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,oCAAoC,CAAC,CAAA;QAEhF;;WAEG;QACH,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE;YACnC,iGAAiG;YACjG,aAAK,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,YAAY,EAAE,wBAAwB,CAAC,CAAA;YAC7E,uFAAuF;YACvF,aAAK,CAAC,KAAK,CAAC,KAAK,GAAG,QAAQ,EAAE,mCAAmC,CAAC,CAAA;YAClE;;;;;eAKG;YACH,QAAQ,CAAC,sBAAsB,EAAE,CAAA;YACjC,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;SAClC;QAED,IAAI,WAAW,CAAC,OAAO,CAAC,EAAE;YACxB,SAAS,GAAG,OAAO,CAAA;SACpB;aAAM;YACL,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;YAC3D,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,CAAC,CAAA;SACvE;QAED,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,kCAAgB,CAAC,QAAQ,EAAE,cAAc,EAAE,YAAY,CAAC,CAAA;IACxD,MAAM,YAAY,GAAG,GAAG,EAAE;QACxB,sEAAsE;QACtE,aAAK,CAAC,SAAS,EAAE,wBAAwB,CAAC,CAAA;QAC1C,kDAAkD;QAClD,wDAAwD;QACxD,OAA2D,SAAS,CAAA;IACtE,CAAC,CAAA;IACD,kCAAgB,CAAC,QAAQ,EAAE,cAAc,EAAE,YAAY,CAAC,CAAA;IAExD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,cAAc,EAAE;QAC9C,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,SAAS;QACtB,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAvDD,8DAuDC;AAED,SAAgB,WAAW,CAAE,OAAY;IACvC,OAAO,OAAO;QACZ,WAAW,IAAI,OAAO;QACtB,MAAM,IAAI,OAAO;QACjB,WAAW,IAAI,OAAO;QACtB,QAAQ,IAAI,OAAO;QACnB,aAAa,IAAI,OAAO,CAAA;AAC5B,CAAC;AAPD,kCAOC;AAED,SAAgB,gBAAgB,CAC9B,OAAiD,EACjD,QAAW;IAEX,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,EAAE;QACzB,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;QAC3D,OAAO,gBAAgB,CAAC,iBAAiB,EAAE,QAAQ,CAAC;YAClD,gBAAgB,CAAC,oBAAoB,EAAE,QAAQ,CAAC,CAAA;KACnD;IAED,MAAM,EAAE,KAAK,EAAE,WAAW,EAAE,GAAG,QAAQ,CAAA;IACvC,MAAM,EAAE,UAAU,EAAE,SAAS,EAAE,GAAG,EAAE,GAAG,KAAK,CAAA;IAE5C;;;OAGG;IAEH,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,WAAW,EAAE,GAAG,OAAO,CAAA;IACxD,4CAA4C;IAC5C,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,SAAS,CAAA;IAElC,4BAA4B;IAC5B,OAAO,IAAI,KAAK,QAAQ;QACtB,uBAAuB;QACvB,CAAC,CAAC,GAAG,IAAI,IAAI,KAAK,GAAG,CAAC;YACrB,CAAC,IAAI,KAAK,UAAU,IAAI,MAAM,KAAK,SAAS,CAAC,CAAC;QAC/C;;WAEG;QACH,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;QACzC,8EAA8E;QAC9E,CAAC,WAAW,CAAA;AAChB,CAAC;AAjCD,4CAiCC;AAED,SAAS,uBAAuB,CAAE,OAAY;IAC5C,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;IAC3D,OAAO,WAAW,CAAC,iBAAiB,CAAC,IAAI,WAAW,CAAC,oBAAoB,CAAC,CAAA;AAC5E,CAAC;AAED,SAAgB,mBAAmB,CAAkC,QAAW;IAC9E,MAAM,EAAE,KAAK,EAAE,GAAG,QAAQ,CAAA;IAC1B,IAAI,KAAK,CAAC,GAAG;QAAE,OAAO,WAAW,CAAA;IACjC,OAAO,yBAAyB,CAAC,QAAQ,CAAC,CAAA;AAC5C,CAAC;AAJD,kDAIC;AAED,SAAgB,yBAAyB,CAAkC,QAAW;IACpF,IAAI,QAAQ,YAAY,2BAA2B;QAAE,OAAO,SAAS,CAAA;IACrE,IAAI,QAAQ,YAAY,2BAA2B;QAAE,OAAO,SAAS,CAAA;IAErE,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAA;AACzC,CAAC;AALD,8DAKC;AAED,SAAgB,aAAa,CAAE,OAAoC;IACjE,IAAI,OAAO,YAAY,UAAU;QAAE,OAAO,OAAO,CAAA;IACjD,IAAI,yBAAiB,IAAI,OAAO,YAAY,yBAAiB,CAAC,SAAS;QAAE,OAAO,OAAO,CAAC,MAAM,EAAE,CAAA;IAEhG,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAA;AAC7C,CAAC;AALD,sCAKC;AAED,SAAgB,4BAA4B,CAAE,OAAoC;IAChF,IAAI,yBAAiB,EAAE;QACrB,IAAI,OAAO,YAAY,UAAU,EAAE;YACjC,MAAM,EAAE,GAAG,yBAAiB,CAAC,eAAe,CAAC,OAAO,CAAC,CAAA;YACrD,sEAAsE;YACtE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;YACf,OAAO,EAAE,CAAA;SACV;QACD,IAAI,OAAO,YAAY,yBAAiB,CAAC,SAAS;YAAE,OAAO,OAAO,CAAA;KACnE;SAAM,IAAI,OAAO,YAAY,UAAU,EAAE;QACxC,OAAO,OAAO,CAAA;KACf;IACD,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAA;AAC7C,CAAC;AAbD,oEAaC"} |
@@ -16,2 +16,3 @@ export { AlgorithmSuiteIdentifier, AlgorithmSuiteName, AlgorithmSuite } from './algorithm_suites'; | ||
export { isEncryptionMaterial, isDecryptionMaterial } from './cryptographic_material'; | ||
export { unwrapDataKey, wrapWithKeyObjectIfSupported } from './cryptographic_material'; | ||
export { CryptographicMaterial, decorateCryptographicMaterial, decorateWebCryptoMaterial, WebCryptoMaterial } from './cryptographic_material'; | ||
@@ -22,3 +23,4 @@ export { SignatureKey, VerificationKey } from './signature_key'; | ||
export { needs } from './needs'; | ||
export { cloneMaterial } from './clone_cryptographic_material'; | ||
export * from './types'; | ||
//# sourceMappingURL=index.d.ts.map |
@@ -48,4 +48,7 @@ "use strict"; | ||
var cryptographic_material_5 = require("./cryptographic_material"); | ||
exports.decorateCryptographicMaterial = cryptographic_material_5.decorateCryptographicMaterial; | ||
exports.decorateWebCryptoMaterial = cryptographic_material_5.decorateWebCryptoMaterial; | ||
exports.unwrapDataKey = cryptographic_material_5.unwrapDataKey; | ||
exports.wrapWithKeyObjectIfSupported = cryptographic_material_5.wrapWithKeyObjectIfSupported; | ||
var cryptographic_material_6 = require("./cryptographic_material"); | ||
exports.decorateCryptographicMaterial = cryptographic_material_6.decorateCryptographicMaterial; | ||
exports.decorateWebCryptoMaterial = cryptographic_material_6.decorateWebCryptoMaterial; | ||
var signature_key_1 = require("./signature_key"); | ||
@@ -63,2 +66,4 @@ exports.SignatureKey = signature_key_1.SignatureKey; | ||
exports.needs = needs_1.needs; | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
var clone_cryptographic_material_1 = require("./clone_cryptographic_material"); | ||
exports.cloneMaterial = clone_cryptographic_material_1.cloneMaterial; | ||
//# sourceMappingURL=data:application/json;base64,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 |
@@ -53,4 +53,7 @@ /** | ||
*/ | ||
WRAPPING_KEY_VERIFIED_ENC_CTX = 16 | ||
WRAPPING_KEY_VERIFIED_ENC_CTX = 16, | ||
ENCRYPT_FLAGS = 10, | ||
SET_FLAGS = 5, | ||
DECRYPT_FLAGS = 20 | ||
} | ||
//# sourceMappingURL=keyring_trace.d.ts.map |
@@ -39,3 +39,21 @@ "use strict"; | ||
KeyringTraceFlag[KeyringTraceFlag["WRAPPING_KEY_VERIFIED_ENC_CTX"] = 16] = "WRAPPING_KEY_VERIFIED_ENC_CTX"; | ||
/* KeyringTraceFlags are organized here. | ||
* The three groupings are set, encrypt, and decrypt. | ||
* An unencrypted data key is set and is required to have a SET_FLAG. | ||
* For the encrypt path, the unencrypted data key must be generated. | ||
* For the decrypt path, the unencrypted data key must be decrypted. | ||
* | ||
* A encrypted data key must be encrypted | ||
* and the encryption context may be signed. | ||
* | ||
* When an encrypted data key is decrypted, | ||
* the encryption context may be verified. | ||
* | ||
* This organization is to keep a KeyringTrace for an encrypted data key | ||
* for listing the WRAPPING_KEY_VERIFIED_ENC_CTX flag. | ||
*/ | ||
KeyringTraceFlag[KeyringTraceFlag["ENCRYPT_FLAGS"] = 10] = "ENCRYPT_FLAGS"; | ||
KeyringTraceFlag[KeyringTraceFlag["SET_FLAGS"] = 5] = "SET_FLAGS"; | ||
KeyringTraceFlag[KeyringTraceFlag["DECRYPT_FLAGS"] = 20] = "DECRYPT_FLAGS"; | ||
})(KeyringTraceFlag = exports.KeyringTraceFlag || (exports.KeyringTraceFlag = {})); | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
//# sourceMappingURL=data:application/json;base64,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 |
@@ -85,2 +85,3 @@ "use strict"; | ||
children.unshift(this.generator); | ||
let childKeyringErrors = []; | ||
for (const keyring of children) { | ||
@@ -94,11 +95,23 @@ /* Check for early return (Postcondition): Do not attempt to decrypt once I have a valid key. */ | ||
catch (e) { | ||
// there should be some debug here? or wrap? | ||
// Failures onDecrypt should not short-circuit the process | ||
// If the caller does not have access they may have access | ||
// through another Keyring. | ||
/* Failures onDecrypt should not short-circuit the process | ||
* If the caller does not have access they may have access | ||
* through another Keyring. | ||
*/ | ||
childKeyringErrors.push(e); | ||
} | ||
} | ||
/* Postcondition: A child keyring must provide a valid data key or no child keyring must have raised an error. | ||
* If I have a data key, | ||
* decrypt errors can be ignored. | ||
* However, if I was unable to decrypt a data key AND I have errors, | ||
* these errors should bubble up. | ||
* Otherwise, the only error customers will see is that | ||
* the material does not have an unencrypted data key. | ||
* So I return a concatenated Error message | ||
*/ | ||
needs_1.needs(material.hasValidKey() || (!material.hasValidKey() && !childKeyringErrors.length), childKeyringErrors | ||
.reduce((m, e, i) => `${m} Error #${i + 1} \n ${e.stack} \n`, 'Unable to decrypt data key and one or more child keyrings had an error. \n ')); | ||
return material; | ||
}; | ||
} | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibXVsdGlfa2V5cmluZy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy9tdWx0aV9rZXlyaW5nLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQTs7Ozs7Ozs7Ozs7OztHQWFHOztBQUVILHVEQUFvRTtBQUNwRSx1Q0FJa0I7QUFFbEIsbUNBQStCO0FBSy9CLE1BQWEsZ0JBQWlCLFNBQVEscUJBQVc7SUFHL0MsWUFBYSxLQUE0QztRQUN2RCxLQUFLLEVBQUUsQ0FBQTtRQUdULGVBQVUsR0FBRyxxQkFBcUIsRUFBc0IsQ0FBQTtRQUN4RCxlQUFVLEdBQUcscUJBQXFCLEVBQXNCLENBQUE7UUFIdEQsa0JBQWtCLENBQUMsSUFBSSxFQUFFLHFCQUFXLEVBQUUsS0FBSyxDQUFDLENBQUE7SUFDOUMsQ0FBQztDQUdGO0FBVEQsNENBU0M7QUFDRCxnQ0FBYyxDQUFDLGdCQUFnQixDQUFDLENBQUE7QUFFaEMsTUFBYSxxQkFBc0IsU0FBUSwwQkFBZ0I7SUFJekQsWUFBYSxLQUFpRDtRQUM1RCxLQUFLLEVBQUUsQ0FBQTtRQUdULGVBQVUsR0FBRyxxQkFBcUIsRUFBMkIsQ0FBQTtRQUM3RCxlQUFVLEdBQUcscUJBQXFCLEVBQTJCLENBQUE7UUFIM0Qsa0JBQWtCLENBQUMsSUFBSSxFQUFFLDBCQUFnQixFQUFFLEtBQUssQ0FBQyxDQUFBO0lBQ25ELENBQUM7Q0FHRjtBQVZELHNEQVVDO0FBQ0QsZ0NBQWMsQ0FBQyxxQkFBcUIsQ0FBQyxDQUFBO0FBRXJDLFNBQVMsa0JBQWtCLENBQ3pCLEdBQXFCLEVBQ3JCLFdBQWdCLEVBQ2hCLEVBQUUsU0FBUyxFQUFFLFFBQVEsR0FBRyxFQUFFLEVBQXdCO0lBRWxELG9EQUFvRDtJQUNwRCxhQUFLLENBQUMsU0FBUyxJQUFJLFFBQVEsQ0FBQyxNQUFNLEVBQUUscUNBQXFDLENBQUMsQ0FBQTtJQUMxRSxnREFBZ0Q7SUFDaEQsYUFBSyxDQUFDLENBQUMsQ0FBQyxTQUFTLEtBQUssU0FBUyxZQUFZLFdBQVcsRUFBRSw2QkFBNkIsQ0FBQyxDQUFBO0lBQ3RGLGtEQUFrRDtJQUNsRCxhQUFLLENBQUMsUUFBUSxDQUFDLEtBQUssQ0FBQyxFQUFFLENBQUMsRUFBRSxDQUFDLEVBQUUsWUFBWSxXQUFXLENBQUMsRUFBRSx5QkFBeUIsQ0FBQyxDQUFBO0lBRWpGLGtDQUFnQixDQUFDLEdBQUcsRUFBRSxVQUFVLEVBQUUsTUFBTSxDQUFDLE1BQU0sQ0FBQyxRQUFRLENBQUMsS0FBSyxFQUFFLENBQUMsQ0FBQyxDQUFBO0lBQ2xFLGtDQUFnQixDQUFDLEdBQUcsRUFBRSxXQUFXLEVBQUUsU0FBUyxDQUFDLENBQUE7QUFDL0MsQ0FBQztBQUVELFNBQVMscUJBQXFCO0lBQzVCLE9BQU8sS0FBSyxVQUFVLFVBQVUsQ0FFOUIsUUFBK0I7UUFFL0I7Ozs7OztXQU1HO1FBQ0gsYUFBSyxDQUFDLENBQUMsUUFBUSxDQUFDLHFCQUFxQixDQUFDLENBQUMsQ0FBQyxJQUFJLENBQUMsU0FBUyxDQUFDLENBQUMsQ0FBQyxJQUFJLEVBQUUsMEVBQTBFLENBQUMsQ0FBQTtRQUUxSSxNQUFNLFNBQVMsR0FBRyxJQUFJLENBQUMsU0FBUztZQUM5QixDQUFDLENBQUMsTUFBTSxJQUFJLENBQUMsU0FBUyxDQUFDLFNBQVMsQ0FBQyxRQUFRLENBQUM7WUFDMUMsQ0FBQyxDQUFDLFFBQVEsQ0FBQTtRQUVaLHlFQUF5RTtRQUN6RSxhQUFLLENBQUMsU0FBUyxDQUFDLHFCQUFxQixFQUFFLCtDQUErQyxDQUFDLENBQUE7UUFFdkY7Ozs7O1dBS0c7UUFDSCxLQUFLLE1BQU0sT0FBTyxJQUFJLElBQUksQ0FBQyxRQUFRLEVBQUU7WUFDbkMsTUFBTSxPQUFPLENBQUMsU0FBUyxDQUFDLFNBQVMsQ0FBQyxDQUFBO1NBQ25DO1FBRUQsNEVBQTRFO1FBQzVFLDBFQUEwRTtRQUMxRSxtQkFBbUI7UUFDbkIsT0FBTyxTQUFTLENBQUE7SUFDbEIsQ0FBQyxDQUFBO0FBQ0gsQ0FBQztBQUVELFNBQVMscUJBQXFCO0lBQzVCLE9BQU8sS0FBSyxVQUFVLFVBQVUsQ0FFOUIsUUFBK0IsRUFDL0IsaUJBQXFDO1FBRXJDLE1BQU0sUUFBUSxHQUFHLElBQUksQ0FBQyxRQUFRLENBQUMsS0FBSyxFQUFFLENBQUE7UUFDdEMsSUFBSSxJQUFJLENBQUMsU0FBUztZQUFFLFFBQVEsQ0FBQyxPQUFPLENBQUMsSUFBSSxDQUFDLFNBQVMsQ0FBQyxDQUFBO1FBRXBELElBQUksa0JBQWtCLEdBQVksRUFBRSxDQUFBO1FBRXBDLEtBQUssTUFBTSxPQUFPLElBQUksUUFBUSxFQUFFO1lBQ2hDLGdHQUFnRztZQUM5RixJQUFJLFFBQVEsQ0FBQyxXQUFXLEVBQUU7Z0JBQUUsT0FBTyxRQUFRLENBQUE7WUFFM0MsSUFBSTtnQkFDRixNQUFNLE9BQU8sQ0FBQyxTQUFTLENBQUMsUUFBUSxFQUFFLGlCQUFpQixDQUFDLENBQUE7YUFDckQ7WUFBQyxPQUFPLENBQUMsRUFBRTtnQkFDWjs7O21CQUdHO2dCQUNELGtCQUFrQixDQUFDLElBQUksQ0FBQyxDQUFDLENBQUMsQ0FBQTthQUMzQjtTQUNGO1FBRUQ7Ozs7Ozs7O1dBUUc7UUFDSCxhQUFLLENBQUMsUUFBUSxDQUFDLFdBQVcsRUFBRSxJQUFJLENBQUMsQ0FBQyxRQUFRLENBQUMsV0FBVyxFQUFFLElBQUksQ0FBQyxrQkFBa0IsQ0FBQyxNQUFNLENBQUMsRUFDbkYsa0JBQWtCO2FBQ2pCLE1BQU0sQ0FBQyxDQUFDLENBQUMsRUFBRSxDQUFDLEVBQUUsQ0FBQyxFQUFFLEVBQUUsQ0FBQyxHQUFHLENBQUMsV0FBVyxDQUFDLEdBQUcsQ0FBQyxPQUFPLENBQUMsQ0FBQyxLQUFLLEtBQUssRUFDMUQsNkVBQTZFLENBQUMsQ0FBQyxDQUFBO1FBRXJGLE9BQU8sUUFBUSxDQUFBO0lBQ2pCLENBQUMsQ0FBQTtBQUNILENBQUMifQ== |
@@ -0,1 +1,2 @@ | ||
/// <reference types="node" /> | ||
import { NodeAlgorithmSuite } from './node_algorithms'; | ||
@@ -37,2 +38,24 @@ import { WebCryptoAlgorithmSuite } from './web_crypto_algorithms'; | ||
export declare type DecryptionMaterial<Suite> = Suite extends NodeAlgorithmSuite ? NodeDecryptionMaterial : Suite extends WebCryptoAlgorithmSuite ? WebCryptoDecryptionMaterial : never; | ||
export declare type AwsEsdkKeyObjectType = 'secret' | 'public' | 'private'; | ||
export declare type AwsEsdkKeyFormat = 'pem' | 'der'; | ||
export declare type AwsEsdkKeyType = 'rsa' | 'dsa' | 'ec'; | ||
export interface AwsEsdkKeyExportOptions<T extends AwsEsdkKeyFormat> { | ||
type: 'pkcs1' | 'spki' | 'pkcs8' | 'sec1'; | ||
format: T; | ||
cipher?: string; | ||
passphrase?: string | Buffer; | ||
} | ||
export interface AwsEsdkKeyObject { | ||
asymmetricKeyType?: AwsEsdkKeyType; | ||
/** | ||
* For asymmetric keys, this property represents the size of the embedded key in | ||
* bytes. This property is `undefined` for symmetric keys. | ||
*/ | ||
asymmetricKeySize?: number; | ||
export(options: AwsEsdkKeyExportOptions<'pem'>): string | Buffer; | ||
export(options?: AwsEsdkKeyExportOptions<'der'>): Buffer; | ||
symmetricSize?: number; | ||
type: AwsEsdkKeyObjectType; | ||
} | ||
export declare type AwsEsdkCreateSecretKey = (key: Uint8Array) => AwsEsdkKeyObject; | ||
//# sourceMappingURL=types.d.ts.map |
@@ -1,2 +0,8 @@ | ||
import { MixedBackendCryptoKey, SupportedAlgorithmSuites, AwsEsdkJsCryptoKey, AwsEsdkJsKeyUsage, EncryptionContext } from './types'; | ||
import { MixedBackendCryptoKey, // eslint-disable-line no-unused-vars | ||
SupportedAlgorithmSuites, // eslint-disable-line no-unused-vars | ||
AwsEsdkJsCryptoKey, // eslint-disable-line no-unused-vars | ||
AwsEsdkJsKeyUsage, // eslint-disable-line no-unused-vars | ||
EncryptionContext, // eslint-disable-line no-unused-vars | ||
AwsEsdkKeyObject, // eslint-disable-line no-unused-vars | ||
AwsEsdkCreateSecretKey } from './types'; | ||
import { EncryptedDataKey } from './encrypted_data_key'; | ||
@@ -7,2 +13,9 @@ import { SignatureKey, VerificationKey } from './signature_key'; | ||
import { WebCryptoAlgorithmSuite } from './web_crypto_algorithms'; | ||
interface AwsEsdkKeyObjectInstanceOf { | ||
new (): AwsEsdkKeyObject; | ||
} | ||
export declare const supportsKeyObject: boolean | { | ||
KeyObject: AwsEsdkKeyObjectInstanceOf; | ||
createSecretKey: AwsEsdkCreateSecretKey; | ||
}; | ||
export interface FunctionalCryptographicMaterial { | ||
@@ -13,7 +26,6 @@ hasValidKey: () => boolean; | ||
suite: SupportedAlgorithmSuites; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => T; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => T; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => T; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -40,7 +52,6 @@ encryptionContext: Readonly<EncryptionContext>; | ||
suite: NodeAlgorithmSuite; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => NodeEncryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => NodeEncryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => NodeEncryptionMaterial; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -57,7 +68,6 @@ encryptedDataKeys: EncryptedDataKey[]; | ||
suite: NodeAlgorithmSuite; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => NodeDecryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => NodeDecryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => NodeDecryptionMaterial; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -72,7 +82,6 @@ setVerificationKey: (key: VerificationKey) => NodeDecryptionMaterial; | ||
suite: WebCryptoAlgorithmSuite; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => WebCryptoEncryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => WebCryptoEncryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => WebCryptoEncryptionMaterial; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -93,7 +102,6 @@ encryptedDataKeys: EncryptedDataKey[]; | ||
suite: WebCryptoAlgorithmSuite; | ||
setUnencryptedDataKey: (dataKey: Uint8Array, trace: KeyringTrace) => WebCryptoDecryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array; | ||
setUnencryptedDataKey: (dataKey: Uint8Array | AwsEsdkKeyObject, trace: KeyringTrace) => WebCryptoDecryptionMaterial; | ||
getUnencryptedDataKey: () => Uint8Array | AwsEsdkKeyObject; | ||
zeroUnencryptedDataKey: () => WebCryptoDecryptionMaterial; | ||
hasUnencryptedDataKey: boolean; | ||
unencryptedDataKeyLength: number; | ||
keyringTrace: KeyringTrace[]; | ||
@@ -112,3 +120,3 @@ setVerificationKey: (key: VerificationKey) => WebCryptoDecryptionMaterial; | ||
export declare function isDecryptionMaterial(obj: any): obj is WebCryptoDecryptionMaterial | NodeDecryptionMaterial; | ||
export declare function decorateCryptographicMaterial<T extends CryptographicMaterial<T>>(material: T, setFlags: KeyringTraceFlag): T; | ||
export declare function decorateCryptographicMaterial<T extends CryptographicMaterial<T>>(material: T, setFlag: KeyringTraceFlag): T; | ||
export declare function decorateEncryptionMaterial<T extends EncryptionMaterial<T>>(material: T): T; | ||
@@ -121,2 +129,5 @@ export declare function decorateDecryptionMaterial<T extends DecryptionMaterial<T>>(material: T): T; | ||
export declare function subtleFunctionForMaterial<T extends WebCryptoMaterial<T>>(material: T): "encrypt" | "decrypt"; | ||
export declare function unwrapDataKey(dataKey: Uint8Array | AwsEsdkKeyObject): Uint8Array; | ||
export declare function wrapWithKeyObjectIfSupported(dataKey: Uint8Array | AwsEsdkKeyObject): Uint8Array | AwsEsdkKeyObject; | ||
export {}; | ||
//# sourceMappingURL=cryptographic_material.d.ts.map |
@@ -22,2 +22,13 @@ /* | ||
import { needs } from './needs'; | ||
export const supportsKeyObject = (function () { | ||
try { | ||
const { KeyObject, createSecretKey } = require('crypto'); | ||
if (!KeyObject || !createSecretKey) | ||
return false; | ||
return { KeyObject, createSecretKey }; | ||
} | ||
catch (ex) { | ||
return false; | ||
} | ||
})(); | ||
/* | ||
@@ -39,33 +50,34 @@ * This public interface to the CryptographicMaterial object is provided for | ||
*/ | ||
let timingSafeEqual; | ||
try { | ||
/* It is possible for `require` to return an empty object, or an object | ||
* that does not implement `timingSafeEqual`. | ||
* in this case I need a fallback | ||
*/ | ||
const { timingSafeEqual: nodeTimingSafeEqual } = require('crypto'); | ||
timingSafeEqual = nodeTimingSafeEqual || portableTimingSafeEqual; | ||
} | ||
catch (e) { | ||
timingSafeEqual = portableTimingSafeEqual; | ||
} | ||
/* https://codahale.com/a-lesson-in-timing-attacks/ */ | ||
function portableTimingSafeEqual(a, b) { | ||
/* It is *possible* that a runtime could optimize this constant time function. | ||
* Adding `eval` should prevent the optimization, but this is no grantee. | ||
* If you copy this function for your own use, make sure to educate yourself. | ||
* Side channel attacks are pernicious and subtle. | ||
*/ | ||
eval(''); // eslint-disable-line no-eval | ||
/* Check for early return (Postcondition) UNTESTED: Size is well-know information. | ||
* and does not leak information about contents. | ||
*/ | ||
if (a.byteLength !== b.byteLength) | ||
return false; | ||
let diff = 0; | ||
for (let i = 0; i < b.length; i++) { | ||
diff |= a[i] ^ b[i]; | ||
const timingSafeEqual = (function () { | ||
try { | ||
/* It is possible for `require` to return an empty object, or an object | ||
* that does not implement `timingSafeEqual`. | ||
* in this case I need a fallback | ||
*/ | ||
const { timingSafeEqual: nodeTimingSafeEqual } = require('crypto'); | ||
return nodeTimingSafeEqual || portableTimingSafeEqual; | ||
} | ||
return (diff === 0); | ||
} | ||
catch (e) { | ||
return portableTimingSafeEqual; | ||
} | ||
/* https://codahale.com/a-lesson-in-timing-attacks/ */ | ||
function portableTimingSafeEqual(a, b) { | ||
/* It is *possible* that a runtime could optimize this constant time function. | ||
* Adding `eval` should prevent the optimization, but this is no grantee. | ||
* If you copy this function for your own use, make sure to educate yourself. | ||
* Side channel attacks are pernicious and subtle. | ||
*/ | ||
eval(''); // eslint-disable-line no-eval | ||
/* Check for early return (Postcondition) UNTESTED: Size is well-know information. | ||
* and does not leak information about contents. | ||
*/ | ||
if (a.byteLength !== b.byteLength) | ||
return false; | ||
let diff = 0; | ||
for (let i = 0; i < b.length; i++) { | ||
diff |= a[i] ^ b[i]; | ||
} | ||
return (diff === 0); | ||
} | ||
})(); | ||
export class NodeEncryptionMaterial { | ||
@@ -165,3 +177,14 @@ constructor(suite, encryptionContext) { | ||
} | ||
export function decorateCryptographicMaterial(material, setFlags) { | ||
export function decorateCryptographicMaterial(material, setFlag) { | ||
/* Precondition: setFlag must be in the set of KeyringTraceFlag.SET_FLAGS. */ | ||
needs(setFlag & KeyringTraceFlag.SET_FLAGS, 'Invalid setFlag'); | ||
/* When a KeyringTraceFlag is passed to setUnencryptedDataKey, | ||
* it must be valid for the type of material. | ||
* It is invalid to claim that EncryptionMaterial were decrypted. | ||
*/ | ||
const deniedSetFlags = (KeyringTraceFlag.SET_FLAGS ^ setFlag) | (setFlag === KeyringTraceFlag.WRAPPING_KEY_GENERATED_DATA_KEY | ||
? KeyringTraceFlag.DECRYPT_FLAGS | ||
: setFlag === KeyringTraceFlag.WRAPPING_KEY_DECRYPTED_DATA_KEY | ||
? KeyringTraceFlag.ENCRYPT_FLAGS | ||
: 0); | ||
let unencryptedDataKeyZeroed = false; | ||
@@ -175,24 +198,9 @@ let unencryptedDataKey; | ||
const setUnencryptedDataKey = (dataKey, trace) => { | ||
/* Precondition: unencryptedDataKey must not be set. Modifying the unencryptedDataKey is denied */ | ||
needs(!unencryptedDataKey, 'unencryptedDataKey has already been set'); | ||
/* Precondition: dataKey must be Binary Data */ | ||
needs(dataKey instanceof Uint8Array, 'dataKey must be a Uint8Array'); | ||
/* Precondition: dataKey should have an ArrayBuffer that *only* stores the key. | ||
* This is a simple check to make sure that the key is not stored on | ||
* a large potentially shared ArrayBuffer. | ||
* If this was the case, it may be possible to find or manipulate. | ||
*/ | ||
needs(dataKey.byteOffset === 0, 'Unencrypted Master Key must be an isolated buffer.'); | ||
/* Precondition: The data key length must agree with algorithm specification. | ||
* If this is not the case, it either means ciphertext was tampered | ||
* with or the keyring implementation is not setting the length properly. | ||
*/ | ||
needs(dataKey.byteLength === material.suite.keyLengthBytes, 'Key length does not agree with the algorithm specification.'); | ||
/* Precondition: Trace must be set, and the flag must indicate that the data key was generated. */ | ||
needs(trace && trace.keyName && trace.keyNamespace, 'Malformed KeyringTrace'); | ||
/* Precondition: On set the required KeyringTraceFlag must be set. */ | ||
needs(trace.flags & setFlags, 'Required KeyringTraceFlag not set'); | ||
/* Avoid making unnecessary copies of the dataKey. */ | ||
const tempUdk = dataKey instanceof Uint8Array ? dataKey : unwrapDataKey(dataKey); | ||
/* All security conditions are tested here and failures will throw. */ | ||
verifyUnencryptedDataKeyForSet(tempUdk, trace); | ||
unencryptedDataKey = wrapWithKeyObjectIfSupported(dataKey); | ||
udkForVerification = new Uint8Array(tempUdk); | ||
material.keyringTrace.push(trace); | ||
unencryptedDataKey = dataKey; | ||
udkForVerification = new Uint8Array(dataKey); | ||
return material; | ||
@@ -207,4 +215,8 @@ }; | ||
needs(!unencryptedDataKeyZeroed, 'unencryptedDataKey has been zeroed.'); | ||
/* Precondition: The unencryptedDataKey must not have been modified. */ | ||
needs(timingSafeEqual(udkForVerification, unencryptedDataKey), 'unencryptedDataKey has been corrupted.'); | ||
/* Precondition: The unencryptedDataKey must not have been modified. | ||
* If the unencryptedDataKey is a KeyObject, | ||
* then the security around modification is handled in C. | ||
* Do not duplicate the secret just to check... | ||
*/ | ||
needs(!(unencryptedDataKey instanceof Uint8Array) || timingSafeEqual(udkForVerification, unwrapDataKey(unencryptedDataKey)), 'unencryptedDataKey has been corrupted.'); | ||
return unencryptedDataKey; | ||
@@ -236,2 +248,8 @@ }; | ||
} | ||
/* The KeyObject manages its own ref counter. | ||
* Once there are no more users, it will clean the memory. | ||
*/ | ||
if (!(unencryptedDataKey instanceof Uint8Array)) { | ||
unencryptedDataKey = new Uint8Array(); | ||
} | ||
unencryptedDataKey.fill(0); | ||
@@ -247,17 +265,2 @@ udkForVerification.fill(0); | ||
}; | ||
Object.defineProperty(material, 'unencryptedDataKeyLength', { | ||
get: () => { | ||
/* Precondition: The unencryptedDataKey must be set to have a length. */ | ||
needs(unencryptedDataKey, 'unencryptedDataKey has not been set'); | ||
/* Precondition: the unencryptedDataKey must not be Zeroed out. | ||
* returning information about the data key, | ||
* while not the worst thing may indicate misuse. | ||
* Checking the algorithm specification is the proper way | ||
* to do this | ||
*/ | ||
needs(!unencryptedDataKeyZeroed, 'unencryptedDataKey has been zeroed.'); | ||
return unencryptedDataKey.byteLength; | ||
}, | ||
enumerable: true | ||
}); | ||
readOnlyProperty(material, 'setUnencryptedDataKey', setUnencryptedDataKey); | ||
@@ -267,4 +270,30 @@ readOnlyProperty(material, 'getUnencryptedDataKey', getUnencryptedDataKey); | ||
return material; | ||
function verifyUnencryptedDataKeyForSet(dataKey, trace) { | ||
/* Precondition: unencryptedDataKey must not be set. Modifying the unencryptedDataKey is denied */ | ||
needs(!unencryptedDataKey, 'unencryptedDataKey has already been set'); | ||
/* Precondition: dataKey must be Binary Data */ | ||
needs(dataKey instanceof Uint8Array, 'dataKey must be a Uint8Array'); | ||
/* Precondition: dataKey should have an ArrayBuffer that *only* stores the key. | ||
* This is a simple check to make sure that the key is not stored on | ||
* a large potentially shared ArrayBuffer. | ||
* If this was the case, it may be possible to find or manipulate. | ||
*/ | ||
needs(dataKey.byteOffset === 0, 'Unencrypted Master Key must be an isolated buffer.'); | ||
/* Precondition: The data key length must agree with algorithm specification. | ||
* If this is not the case, it either means ciphertext was tampered | ||
* with or the keyring implementation is not setting the length properly. | ||
*/ | ||
needs(dataKey.byteLength === material.suite.keyLengthBytes, 'Key length does not agree with the algorithm specification.'); | ||
/* Precondition: Trace must be set, and the flag must indicate that the data key was generated. */ | ||
needs(trace && trace.keyName && trace.keyNamespace, 'Malformed KeyringTrace'); | ||
/* Precondition: On set the required KeyringTraceFlag must be set. */ | ||
needs(trace.flags & setFlag, 'Required KeyringTraceFlag not set'); | ||
/* Precondition: Only valid flags are allowed. | ||
* An unencrypted data key can not be both generated and decrypted. | ||
*/ | ||
needs(!(trace.flags & deniedSetFlags), 'Invalid KeyringTraceFlags set.'); | ||
} | ||
} | ||
export function decorateEncryptionMaterial(material) { | ||
const deniedEncryptFlags = KeyringTraceFlag.SET_FLAGS | KeyringTraceFlag.DECRYPT_FLAGS; | ||
const encryptedDataKeys = []; | ||
@@ -285,13 +314,13 @@ let signatureKey; | ||
needs(flags & KeyringTraceFlag.WRAPPING_KEY_ENCRYPTED_DATA_KEY, 'Encrypted data key flag must be set.'); | ||
/* When the unencrypted data key is first set, a given wrapping key may or may not also encrypt that key. | ||
* This means that the first EDK that is added may already have a trace. | ||
* The flags for the EDK and the existing trace should be merged iif this is the first EDK | ||
* and the only existing trace corresponds to this EDK. | ||
/* Precondition: flags must not include a setFlag or a decrypt flag. | ||
* The setFlag is reserved for setting the unencrypted data key | ||
* and must only occur once in the set of KeyringTrace flags. | ||
* The two setFlags in use are: | ||
* KeyringTraceFlag.WRAPPING_KEY_DECRYPTED_DATA_KEY | ||
* KeyringTraceFlag.WRAPPING_KEY_GENERATED_DATA_KEY | ||
* | ||
* KeyringTraceFlag.WRAPPING_KEY_VERIFIED_ENC_CTX is reserved for the decrypt path | ||
*/ | ||
if (firstEdkAndTraceMatch(encryptedDataKeys, material.keyringTrace, edk)) { | ||
material.keyringTrace[0].flags |= flags; | ||
} | ||
else { | ||
material.keyringTrace.push({ keyName: edk.providerInfo, keyNamespace: edk.providerId, flags }); | ||
} | ||
needs(!(flags & deniedEncryptFlags), 'Invalid flag for EncryptedDataKey.'); | ||
material.keyringTrace.push({ keyName: edk.providerInfo, keyNamespace: edk.providerId, flags }); | ||
encryptedDataKeys.push(edk); | ||
@@ -334,9 +363,2 @@ return material; | ||
} | ||
/* Verify that the this is the first EDK and that it matches the 1 and only 1 trace. */ | ||
function firstEdkAndTraceMatch(edks, traces, edk) { | ||
return edks.length === 0 && | ||
traces.length === 1 && | ||
edk.providerId === traces[0].keyNamespace && | ||
edk.providerInfo === traces[0].keyName; | ||
} | ||
export function decorateDecryptionMaterial(material) { | ||
@@ -474,2 +496,25 @@ // Verification Key | ||
} | ||
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cryptographic_material.js","sourceRoot":"","sources":["../../src/cryptographic_material.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;GAaG;AAGH,OAAO,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAA;AACvD,OAAO,EAAE,YAAY,EAAE,eAAe,EAAE,MAAM,iBAAiB,CAAA;AAC/D,OAAO,EAAE,WAAW,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAA;AACjE,OAAO,EAAgB,gBAAgB,EAAE,MAAM,iBAAiB,CAAA,CAAC,qCAAqC;AACtG,OAAO,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAA;AACtD,OAAO,EAAE,uBAAuB,EAAE,MAAM,yBAAyB,CAAA;AACjE,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAA;AAE/B;;;;;;;;;;;;;;;GAeG;AAEH,IAAI,eAA0D,CAAA;AAC9D,IAAI;IACF;;;OAGG;IACH,MAAM,EAAE,eAAe,EAAE,mBAAmB,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAA;IAClE,eAAe,GAAG,mBAAmB,IAAI,uBAAuB,CAAA;CACjE;AAAC,OAAO,CAAC,EAAE;IACV,eAAe,GAAG,uBAAuB,CAAA;CAC1C;AACD,sDAAsD;AACtD,SAAS,uBAAuB,CAAE,CAAa,EAAE,CAAa;IAC5D;;;;OAIG;IACH,IAAI,CAAC,EAAE,CAAC,CAAA,CAAC,8BAA8B;IACvC;;OAEG;IACH,IAAI,CAAC,CAAC,UAAU,KAAK,CAAC,CAAC,UAAU;QAAE,OAAO,KAAK,CAAA;IAE/C,IAAI,IAAI,GAAG,CAAC,CAAA;IACZ,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;QACjC,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAA;KACpB;IACD,OAAO,CAAC,IAAI,KAAK,CAAC,CAAC,CAAA;AACrB,CAAC;AAoCD,MAAM,OAAO,sBAAsB;IAejC,YAAa,KAAyB,EAAE,iBAAoC;QAN5E,iBAAY,GAAmB,EAAE,CAAA;QAO/B,4EAA4E;QAC5E,KAAK,CAAC,KAAK,YAAY,kBAAkB,EAAE,oCAAoC,CAAC,CAAA;QAChF,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,oGAAoG;QACpG,KAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,QAAQ,GAAG,gBAAgB,CAAC,+BAA+B,CAAA;QACjE,6BAA6B,CAAyB,IAAI,EAAE,QAAQ,CAAC,CAAA;QACrE,0BAA0B,CAAyB,IAAI,CAAC,CAAA;QACxD,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,sBAAsB,CAAC,SAAS,CAAC,CAAA;QAC7D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,CAAA;IACnC,CAAC;CACF;AACD,WAAW,CAAC,sBAAsB,CAAC,CAAA;AAEnC,MAAM,OAAO,sBAAsB;IAajC,YAAa,KAAyB,EAAE,iBAAoC;QAJ5E,iBAAY,GAAmB,EAAE,CAAA;QAK/B,4EAA4E;QAC5E,KAAK,CAAC,KAAK,YAAY,kBAAkB,EAAE,oCAAoC,CAAC,CAAA;QAChF,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,oGAAoG;QACpG,KAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,QAAQ,GAAG,gBAAgB,CAAC,+BAA+B,CAAA;QACjE,6BAA6B,CAAyB,IAAI,EAAE,QAAQ,CAAC,CAAA;QACrE,0BAA0B,CAAyB,IAAI,CAAC,CAAA;QACxD,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,sBAAsB,CAAC,SAAS,CAAC,CAAA;QAC7D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,CAAA;IACnC,CAAC;CACF;AACD,WAAW,CAAC,sBAAsB,CAAC,CAAA;AAEnC,MAAM,OAAO,2BAA2B;IAoBtC,YAAa,KAA8B,EAAE,iBAAoC;QAVjF,iBAAY,GAAmB,EAAE,CAAA;QAW/B,sFAAsF;QACtF,KAAK,CAAC,KAAK,YAAY,uBAAuB,EAAE,yCAAyC,CAAC,CAAA;QAC1F,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,MAAM,CAAsB,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC,CAAA;QAC/E,yGAAyG;QACzG,KAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,OAAO,GAAG,gBAAgB,CAAC,+BAA+B,CAAA;QAChE,6BAA6B,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACzE,0BAA0B,CAA8B,IAAI,CAAC,CAAA;QAC7D,yBAAyB,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,2BAA2B,CAAC,SAAS,CAAC,CAAA;QAClE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,YAAY,CAAA;IACxD,CAAC;CACF;AACD,WAAW,CAAC,2BAA2B,CAAC,CAAA;AAExC,MAAM,OAAO,2BAA2B;IAkBtC,YAAa,KAA8B,EAAE,iBAAoC;QARjF,iBAAY,GAAmB,EAAE,CAAA;QAS/B,sFAAsF;QACtF,KAAK,CAAC,KAAK,YAAY,uBAAuB,EAAE,yCAAyC,CAAC,CAAA;QAC1F,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,MAAM,CAAsB,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC,CAAA;QAC/E,yGAAyG;QACzG,KAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,OAAO,GAAG,gBAAgB,CAAC,+BAA+B,CAAA;QAChE,6BAA6B,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACzE,0BAA0B,CAA8B,IAAI,CAAC,CAAA;QAC7D,yBAAyB,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,2BAA2B,CAAC,SAAS,CAAC,CAAA;QAClE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,YAAY,CAAA;IAC1B,CAAC;CACF;AACD,WAAW,CAAC,2BAA2B,CAAC,CAAA;AAExC,MAAM,UAAU,oBAAoB,CAAE,GAAQ;IAC5C,OAAO,CAAC,GAAG,YAAY,2BAA2B,CAAC,IAAI,CAAC,GAAG,YAAY,sBAAsB,CAAC,CAAA;AAChG,CAAC;AAED,MAAM,UAAU,oBAAoB,CAAE,GAAQ;IAC5C,OAAO,CAAC,GAAG,YAAY,2BAA2B,CAAC,IAAI,CAAC,GAAG,YAAY,sBAAsB,CAAC,CAAA;AAChG,CAAC;AAED,MAAM,UAAU,6BAA6B,CAAsC,QAAW,EAAE,QAA0B;IACxH,IAAI,wBAAwB,GAAG,KAAK,CAAA;IACpC,IAAI,kBAA8B,CAAA;IAClC,mEAAmE;IACnE,uDAAuD;IACvD,0DAA0D;IAC1D,oDAAoD;IACpD,IAAI,kBAA8B,CAAA;IAElC,MAAM,qBAAqB,GAAG,CAAC,OAAmB,EAAE,KAAmB,EAAE,EAAE;QACzE,mGAAmG;QACnG,KAAK,CAAC,CAAC,kBAAkB,EAAE,yCAAyC,CAAC,CAAA;QACrE,+CAA+C;QAC/C,KAAK,CAAC,OAAO,YAAY,UAAU,EAAE,8BAA8B,CAAC,CAAA;QACpE;;;;WAIG;QACH,KAAK,CAAC,OAAO,CAAC,UAAU,KAAK,CAAC,EAAE,oDAAoD,CAAC,CAAA;QACrF;;;WAGG;QACH,KAAK,CAAC,OAAO,CAAC,UAAU,KAAK,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,6DAA6D,CAAC,CAAA;QAE1H,kGAAkG;QAClG,KAAK,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,YAAY,EAAE,wBAAwB,CAAC,CAAA;QAC7E,qEAAqE;QACrE,KAAK,CAAC,KAAK,CAAC,KAAK,GAAG,QAAQ,EAAE,mCAAmC,CAAC,CAAA;QAClE,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;QAEjC,kBAAkB,GAAG,OAAO,CAAA;QAC5B,kBAAkB,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAA;QAE5C,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,MAAM,qBAAqB,GAAG,GAAe,EAAE;QAC7C,2EAA2E;QAC3E,KAAK,CAAC,kBAAkB,EAAE,qCAAqC,CAAC,CAAA;QAChE;;WAEG;QACH,KAAK,CAAC,CAAC,wBAAwB,EAAE,qCAAqC,CAAC,CAAA;QACvE,uEAAuE;QACvE,KAAK,CAAC,eAAe,CAAC,kBAAkB,EAAE,kBAAkB,CAAC,EAAE,wCAAwC,CAAC,CAAA;QACxG,OAAO,kBAAkB,CAAA;IAC3B,CAAC,CAAA;IACD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,uBAAuB,EAAE;QACvD,8DAA8D;QAC9D,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,kBAAkB,IAAI,CAAC,wBAAwB;QAC5D,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IACF,MAAM,sBAAsB,GAAG,GAAG,EAAE;QAClC;;;;;;WAMG;QACH,IAAI,UAAU,GAAG,CAAC,CAAA;QAClB,gGAAgG;QAChG,IAAI,CAAC,kBAAkB,EAAE;YACvB,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;YACrC,UAAU,IAAI,CAAC,CAAA;SAChB;QACD,gGAAgG;QAChG,IAAI,CAAC,kBAAkB,EAAE;YACvB,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;YACrC,UAAU,IAAI,CAAC,CAAA;SAChB;QACD,kBAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;QAC1B,kBAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;QAC1B,wBAAwB,GAAG,IAAI,CAAA;QAE/B;;;WAGG;QACH,KAAK,CAAC,UAAU,KAAK,CAAC,IAAI,UAAU,KAAK,CAAC,EAAE,8DAA8D,CAAC,CAAA;QAC3G,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,0BAA0B,EAAE;QAC1D,GAAG,EAAE,GAAG,EAAE;YACR,wEAAwE;YACxE,KAAK,CAAC,kBAAkB,EAAE,qCAAqC,CAAC,CAAA;YAChE;;;;;eAKG;YACH,KAAK,CAAC,CAAC,wBAAwB,EAAE,qCAAqC,CAAC,CAAA;YACvE,OAAO,kBAAkB,CAAC,UAAU,CAAA;QACtC,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,gBAAgB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,qBAAqB,CAAC,CAAA;IAC1E,gBAAgB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,qBAAqB,CAAC,CAAA;IAC1E,gBAAgB,CAAC,QAAQ,EAAE,wBAAwB,EAAE,sBAAsB,CAAC,CAAA;IAE5E,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,MAAM,UAAU,0BAA0B,CAAmC,QAAW;IACtF,MAAM,iBAAiB,GAAuB,EAAE,CAAA;IAChD,IAAI,YAA8C,CAAA;IAElD,MAAM,mBAAmB,GAAG,CAAC,GAAqB,EAAE,KAAuB,EAAE,EAAE;QAC7E;;;WAGG;QACH,KAAK,CAAC,QAAQ,CAAC,qBAAqB,EAAE,+BAA+B,CAAC,CAAA;QACtE;;;WAGG;QACH,KAAK,CAAC,GAAG,YAAY,gBAAgB,EAAE,0CAA0C,CAAC,CAAA;QAElF,mEAAmE;QACnE,KAAK,CAAC,KAAK,GAAG,gBAAgB,CAAC,+BAA+B,EAAE,sCAAsC,CAAC,CAAA;QACvG;;;;WAIG;QACH,IAAI,qBAAqB,CAAC,iBAAiB,EAAE,QAAQ,CAAC,YAAY,EAAE,GAAG,CAAC,EAAE;YACxE,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,KAAK,IAAI,KAAK,CAAA;SACxC;aAAM;YACL,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,GAAG,CAAC,YAAY,EAAE,YAAY,EAAE,GAAG,CAAC,UAAU,EAAE,KAAK,EAAE,CAAC,CAAA;SAC/F;QAED,iBAAiB,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;QAC3B,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,gBAAgB,CAAC,QAAQ,EAAE,qBAAqB,EAAE,mBAAmB,CAAC,CAAA;IACtE,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,mBAAmB,EAAE;QACnD,qDAAqD;QACrD,0BAA0B;QAC1B,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,GAAG,iBAAiB,CAAC;QACjC,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IACF,MAAM,eAAe,GAAG,CAAC,GAAiB,EAAE,EAAE;QAC5C;;;WAGG;QACH,KAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,sDAAsD,CAAC,CAAA;QAC5F,wFAAwF;QACxF,KAAK,CAAC,CAAC,YAAY,EAAE,qCAAqC,CAAC,CAAA;QAC3D,+CAA+C;QAC/C,KAAK,CAAC,GAAG,YAAY,YAAY,EAAE,6BAA6B,CAAC,CAAA;QACjE,YAAY,GAAG,GAAG,CAAA;QAClB,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,gBAAgB,CAAC,QAAQ,EAAE,iBAAiB,EAAE,eAAe,CAAC,CAAA;IAC9D,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,cAAc,EAAE;QAC9C,GAAG,EAAE,GAAG,EAAE;YACR;;;eAGG;YACH,KAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,KAAK,CAAC,CAAC,YAAY,EAAE,wCAAwC,CAAC,CAAA;YACnG,OAAO,YAAY,CAAA;QACrB,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,uFAAuF;AACvF,SAAS,qBAAqB,CAAE,IAAwB,EAAE,MAAsB,EAAE,GAAqB;IACrG,OAAO,IAAI,CAAC,MAAM,KAAK,CAAC;QACxB,MAAM,CAAC,MAAM,KAAK,CAAC;QACnB,GAAG,CAAC,UAAU,KAAK,MAAM,CAAC,CAAC,CAAC,CAAC,YAAY;QACzC,GAAG,CAAC,YAAY,KAAK,MAAM,CAAC,CAAC,CAAC,CAAC,OAAO,CAAA;AACxC,CAAC;AAED,MAAM,UAAU,0BAA0B,CAAmC,QAAW;IACtF,mBAAmB;IACnB,IAAI,eAAoD,CAAA;IACxD,MAAM,kBAAkB,GAAG,CAAC,GAAoB,EAAE,EAAE;QAClD;;;WAGG;QACH,KAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,sDAAsD,CAAC,CAAA;QAC5F,8FAA8F;QAC9F,KAAK,CAAC,CAAC,eAAe,EAAE,wCAAwC,CAAC,CAAA;QACjE,kDAAkD;QAClD,KAAK,CAAC,GAAG,YAAY,eAAe,EAAE,6BAA6B,CAAC,CAAA;QACpE,eAAe,GAAG,GAAG,CAAA;QACrB,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,gBAAgB,CAAC,QAAQ,EAAE,oBAAoB,EAAE,kBAAkB,CAAC,CAAA;IACpE,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,iBAAiB,EAAE;QACjD,GAAG,EAAE,GAAG,EAAE;YACR;;;eAGG;YACH,KAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,KAAK,CAAC,CAAC,eAAe,EAAE,wCAAwC,CAAC,CAAA;YACtG,OAAO,eAAe,CAAA;QACxB,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAkC,QAAW,EAAE,QAA0B;IAChH,IAAI,SAAuE,CAAA;IAE3E,MAAM,YAAY,GAAG,CAAC,OAAiD,EAAE,KAAmB,EAAE,EAAE;QAC9F,iFAAiF;QACjF,KAAK,CAAC,CAAC,SAAS,EAAE,2BAA2B,CAAC,CAAA;QAC9C,qDAAqD;QACrD,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,IAAI,uBAAuB,CAAC,OAAO,CAAC,EAAE,2BAA2B,CAAC,CAAA;QAC5F,+EAA+E;QAC/E,KAAK,CAAC,gBAAgB,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,oCAAoC,CAAC,CAAA;QAEhF;;WAEG;QACH,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE;YACnC,iGAAiG;YACjG,KAAK,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,YAAY,EAAE,wBAAwB,CAAC,CAAA;YAC7E,uFAAuF;YACvF,KAAK,CAAC,KAAK,CAAC,KAAK,GAAG,QAAQ,EAAE,mCAAmC,CAAC,CAAA;YAClE;;;;;eAKG;YACH,QAAQ,CAAC,sBAAsB,EAAE,CAAA;YACjC,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;SAClC;QAED,IAAI,WAAW,CAAC,OAAO,CAAC,EAAE;YACxB,SAAS,GAAG,OAAO,CAAA;SACpB;aAAM;YACL,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;YAC3D,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,CAAC,CAAA;SACvE;QAED,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,gBAAgB,CAAC,QAAQ,EAAE,cAAc,EAAE,YAAY,CAAC,CAAA;IACxD,MAAM,YAAY,GAAG,GAAG,EAAE;QACxB,sEAAsE;QACtE,KAAK,CAAC,SAAS,EAAE,wBAAwB,CAAC,CAAA;QAC1C,kDAAkD;QAClD,wDAAwD;QACxD,OAA2D,SAAS,CAAA;IACtE,CAAC,CAAA;IACD,gBAAgB,CAAC,QAAQ,EAAE,cAAc,EAAE,YAAY,CAAC,CAAA;IAExD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,cAAc,EAAE;QAC9C,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,SAAS;QACtB,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,MAAM,UAAU,WAAW,CAAE,OAAY;IACvC,OAAO,OAAO;QACZ,WAAW,IAAI,OAAO;QACtB,MAAM,IAAI,OAAO;QACjB,WAAW,IAAI,OAAO;QACtB,QAAQ,IAAI,OAAO;QACnB,aAAa,IAAI,OAAO,CAAA;AAC5B,CAAC;AAED,MAAM,UAAU,gBAAgB,CAC9B,OAAiD,EACjD,QAAW;IAEX,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,EAAE;QACzB,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;QAC3D,OAAO,gBAAgB,CAAC,iBAAiB,EAAE,QAAQ,CAAC;YAClD,gBAAgB,CAAC,oBAAoB,EAAE,QAAQ,CAAC,CAAA;KACnD;IAED,MAAM,EAAE,KAAK,EAAE,WAAW,EAAE,GAAG,QAAQ,CAAA;IACvC,MAAM,EAAE,UAAU,EAAE,SAAS,EAAE,GAAG,EAAE,GAAG,KAAK,CAAA;IAE5C;;;OAGG;IAEH,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,WAAW,EAAE,GAAG,OAAO,CAAA;IACxD,4CAA4C;IAC5C,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,SAAS,CAAA;IAElC,4BAA4B;IAC5B,OAAO,IAAI,KAAK,QAAQ;QACtB,uBAAuB;QACvB,CAAC,CAAC,GAAG,IAAI,IAAI,KAAK,GAAG,CAAC;YACrB,CAAC,IAAI,KAAK,UAAU,IAAI,MAAM,KAAK,SAAS,CAAC,CAAC;QAC/C;;WAEG;QACH,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;QACzC,8EAA8E;QAC9E,CAAC,WAAW,CAAA;AAChB,CAAC;AAED,SAAS,uBAAuB,CAAE,OAAY;IAC5C,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;IAC3D,OAAO,WAAW,CAAC,iBAAiB,CAAC,IAAI,WAAW,CAAC,oBAAoB,CAAC,CAAA;AAC5E,CAAC;AAED,MAAM,UAAU,mBAAmB,CAAkC,QAAW;IAC9E,MAAM,EAAE,KAAK,EAAE,GAAG,QAAQ,CAAA;IAC1B,IAAI,KAAK,CAAC,GAAG;QAAE,OAAO,WAAW,CAAA;IACjC,OAAO,yBAAyB,CAAC,QAAQ,CAAC,CAAA;AAC5C,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAkC,QAAW;IACpF,IAAI,QAAQ,YAAY,2BAA2B;QAAE,OAAO,SAAS,CAAA;IACrE,IAAI,QAAQ,YAAY,2BAA2B;QAAE,OAAO,SAAS,CAAA;IAErE,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAA;AACzC,CAAC"} | ||
export function unwrapDataKey(dataKey) { | ||
if (dataKey instanceof Uint8Array) | ||
return dataKey; | ||
if (supportsKeyObject && dataKey instanceof supportsKeyObject.KeyObject) | ||
return dataKey.export(); | ||
throw new Error('Unsupported dataKey type'); | ||
} | ||
export function wrapWithKeyObjectIfSupported(dataKey) { | ||
if (supportsKeyObject) { | ||
if (dataKey instanceof Uint8Array) { | ||
const ko = supportsKeyObject.createSecretKey(dataKey); | ||
/* Postcondition: Zero the secret. It is now inside the KeyObject. */ | ||
dataKey.fill(0); | ||
return ko; | ||
} | ||
if (dataKey instanceof supportsKeyObject.KeyObject) | ||
return dataKey; | ||
} | ||
else if (dataKey instanceof Uint8Array) { | ||
return dataKey; | ||
} | ||
throw new Error('Unsupported dataKey type'); | ||
} | ||
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"cryptographic_material.js","sourceRoot":"","sources":["../../src/cryptographic_material.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;GAaG;AAWH,OAAO,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAA;AACvD,OAAO,EAAE,YAAY,EAAE,eAAe,EAAE,MAAM,iBAAiB,CAAA;AAC/D,OAAO,EAAE,WAAW,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAA;AACjE,OAAO,EAAgB,gBAAgB,EAAE,MAAM,iBAAiB,CAAA,CAAC,qCAAqC;AACtG,OAAO,EAAE,kBAAkB,EAAE,MAAM,mBAAmB,CAAA;AACtD,OAAO,EAAE,uBAAuB,EAAE,MAAM,yBAAyB,CAAA;AACjE,OAAO,EAAE,KAAK,EAAE,MAAM,SAAS,CAAA;AAY/B,MAAM,CAAC,MAAM,iBAAiB,GAAG,CAAC;IAChC,IAAI;QACF,MAAM,EAAE,SAAS,EAAE,eAAe,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAkB,CAAA;QACzE,IAAI,CAAC,SAAS,IAAI,CAAC,eAAe;YAAE,OAAO,KAAK,CAAA;QAEhD,OAAO,EAAE,SAAS,EAAE,eAAe,EAAE,CAAA;KACtC;IAAC,OAAO,EAAE,EAAE;QACX,OAAO,KAAK,CAAA;KACb;AACH,CAAC,CAAC,EAAE,CAAA;AAEJ;;;;;;;;;;;;;;;GAeG;AAEH,MAAM,eAAe,GAA8C,CAAC;IAClE,IAAI;QACF;;;WAGG;QACH,MAAM,EAAE,eAAe,EAAE,mBAAmB,EAAE,GAAG,OAAO,CAAC,QAAQ,CAAC,CAAA;QAClE,OAAO,mBAAmB,IAAI,uBAAuB,CAAA;KACtD;IAAC,OAAO,CAAC,EAAE;QACV,OAAO,uBAAuB,CAAA;KAC/B;IACD,sDAAsD;IACtD,SAAS,uBAAuB,CAAE,CAAa,EAAE,CAAa;QAC5D;;;;YAII;QACJ,IAAI,CAAC,EAAE,CAAC,CAAA,CAAC,8BAA8B;QACvC;;YAEI;QACJ,IAAI,CAAC,CAAC,UAAU,KAAK,CAAC,CAAC,UAAU;YAAE,OAAO,KAAK,CAAA;QAE/C,IAAI,IAAI,GAAG,CAAC,CAAA;QACZ,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE;YACjC,IAAI,IAAI,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAA;SACpB;QACD,OAAO,CAAC,IAAI,KAAK,CAAC,CAAC,CAAA;IACrB,CAAC;AACH,CAAC,CAAC,EAAE,CAAA;AAmCJ,MAAM,OAAO,sBAAsB;IAcjC,YAAa,KAAyB,EAAE,iBAAoC;QAN5E,iBAAY,GAAmB,EAAE,CAAA;QAO/B,4EAA4E;QAC5E,KAAK,CAAC,KAAK,YAAY,kBAAkB,EAAE,oCAAoC,CAAC,CAAA;QAChF,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,oGAAoG;QACpG,KAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,QAAQ,GAAG,gBAAgB,CAAC,+BAA+B,CAAA;QACjE,6BAA6B,CAAyB,IAAI,EAAE,QAAQ,CAAC,CAAA;QACrE,0BAA0B,CAAyB,IAAI,CAAC,CAAA;QACxD,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,sBAAsB,CAAC,SAAS,CAAC,CAAA;QAC7D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,CAAA;IACnC,CAAC;CACF;AACD,WAAW,CAAC,sBAAsB,CAAC,CAAA;AAEnC,MAAM,OAAO,sBAAsB;IAYjC,YAAa,KAAyB,EAAE,iBAAoC;QAJ5E,iBAAY,GAAmB,EAAE,CAAA;QAK/B,4EAA4E;QAC5E,KAAK,CAAC,KAAK,YAAY,kBAAkB,EAAE,oCAAoC,CAAC,CAAA;QAChF,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,oGAAoG;QACpG,KAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,QAAQ,GAAG,gBAAgB,CAAC,+BAA+B,CAAA;QACjE,6BAA6B,CAAyB,IAAI,EAAE,QAAQ,CAAC,CAAA;QACrE,0BAA0B,CAAyB,IAAI,CAAC,CAAA;QACxD,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,sBAAsB,CAAC,SAAS,CAAC,CAAA;QAC7D,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,CAAA;IACnC,CAAC;CACF;AACD,WAAW,CAAC,sBAAsB,CAAC,CAAA;AAEnC,MAAM,OAAO,2BAA2B;IAmBtC,YAAa,KAA8B,EAAE,iBAAoC;QAVjF,iBAAY,GAAmB,EAAE,CAAA;QAW/B,sFAAsF;QACtF,KAAK,CAAC,KAAK,YAAY,uBAAuB,EAAE,yCAAyC,CAAC,CAAA;QAC1F,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,MAAM,CAAsB,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC,CAAA;QAC/E,yGAAyG;QACzG,KAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,OAAO,GAAG,gBAAgB,CAAC,+BAA+B,CAAA;QAChE,6BAA6B,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACzE,0BAA0B,CAA8B,IAAI,CAAC,CAAA;QAC7D,yBAAyB,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,2BAA2B,CAAC,SAAS,CAAC,CAAA;QAClE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,qBAAqB,IAAI,IAAI,CAAC,YAAY,CAAA;IACxD,CAAC;CACF;AACD,WAAW,CAAC,2BAA2B,CAAC,CAAA;AAExC,MAAM,OAAO,2BAA2B;IAiBtC,YAAa,KAA8B,EAAE,iBAAoC;QARjF,iBAAY,GAAmB,EAAE,CAAA;QAS/B,sFAAsF;QACtF,KAAK,CAAC,KAAK,YAAY,uBAAuB,EAAE,yCAAyC,CAAC,CAAA;QAC1F,IAAI,CAAC,KAAK,GAAG,KAAK,CAAA;QAClB,IAAI,CAAC,WAAW,GAAG,MAAM,CAAC,MAAM,CAAsB,CAAC,WAAW,EAAE,SAAS,CAAC,CAAC,CAAA;QAC/E,yGAAyG;QACzG,KAAK,CAAC,iBAAiB,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,gCAAgC,CAAC,CAAA;QACnG,IAAI,CAAC,iBAAiB,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,GAAG,iBAAiB,EAAE,CAAC,CAAA;QAChE,wEAAwE;QACxE,MAAM,OAAO,GAAG,gBAAgB,CAAC,+BAA+B,CAAA;QAChE,6BAA6B,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACzE,0BAA0B,CAA8B,IAAI,CAAC,CAAA;QAC7D,yBAAyB,CAA8B,IAAI,EAAE,OAAO,CAAC,CAAA;QACrE,MAAM,CAAC,cAAc,CAAC,IAAI,EAAE,2BAA2B,CAAC,SAAS,CAAC,CAAA;QAClE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAA;IACrB,CAAC;IACD,WAAW;QACT,OAAO,IAAI,CAAC,YAAY,CAAA;IAC1B,CAAC;CACF;AACD,WAAW,CAAC,2BAA2B,CAAC,CAAA;AAExC,MAAM,UAAU,oBAAoB,CAAE,GAAQ;IAC5C,OAAO,CAAC,GAAG,YAAY,2BAA2B,CAAC,IAAI,CAAC,GAAG,YAAY,sBAAsB,CAAC,CAAA;AAChG,CAAC;AAED,MAAM,UAAU,oBAAoB,CAAE,GAAQ;IAC5C,OAAO,CAAC,GAAG,YAAY,2BAA2B,CAAC,IAAI,CAAC,GAAG,YAAY,sBAAsB,CAAC,CAAA;AAChG,CAAC;AAED,MAAM,UAAU,6BAA6B,CAAsC,QAAW,EAAE,OAAyB;IACvH,6EAA6E;IAC7E,KAAK,CAAC,OAAO,GAAG,gBAAgB,CAAC,SAAS,EAAE,iBAAiB,CAAC,CAAA;IAC9D;;;OAGG;IACH,MAAM,cAAc,GAAG,CAAC,gBAAgB,CAAC,SAAS,GAAG,OAAO,CAAC,GAAG,CAC9D,OAAO,KAAK,gBAAgB,CAAC,+BAA+B;QAC1D,CAAC,CAAC,gBAAgB,CAAC,aAAa;QAChC,CAAC,CAAC,OAAO,KAAK,gBAAgB,CAAC,+BAA+B;YAC5D,CAAC,CAAC,gBAAgB,CAAC,aAAa;YAChC,CAAC,CAAC,CAAC,CAAC,CAAA;IAEV,IAAI,wBAAwB,GAAG,KAAK,CAAA;IACpC,IAAI,kBAAiD,CAAA;IACrD,mEAAmE;IACnE,uDAAuD;IACvD,0DAA0D;IAC1D,oDAAoD;IACpD,IAAI,kBAA8B,CAAA;IAElC,MAAM,qBAAqB,GAAG,CAAC,OAAoC,EAAE,KAAmB,EAAE,EAAE;QAC1F,qDAAqD;QACrD,MAAM,OAAO,GAAG,OAAO,YAAY,UAAU,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,aAAa,CAAC,OAAO,CAAC,CAAA;QAChF,sEAAsE;QACtE,8BAA8B,CAAC,OAAO,EAAE,KAAK,CAAC,CAAA;QAC9C,kBAAkB,GAAG,4BAA4B,CAAC,OAAO,CAAC,CAAA;QAC1D,kBAAkB,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAA;QAC5C,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;QAEjC,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,MAAM,qBAAqB,GAAG,GAAgC,EAAE;QAC9D,2EAA2E;QAC3E,KAAK,CAAC,kBAAkB,EAAE,qCAAqC,CAAC,CAAA;QAChE;;WAEG;QACH,KAAK,CAAC,CAAC,wBAAwB,EAAE,qCAAqC,CAAC,CAAA;QACvE;;;;WAIG;QACH,KAAK,CAAC,CAAC,CAAC,kBAAkB,YAAY,UAAU,CAAC,IAAI,eAAe,CAAC,kBAAkB,EAAE,aAAa,CAAC,kBAAkB,CAAC,CAAC,EAAE,wCAAwC,CAAC,CAAA;QACtK,OAAO,kBAAkB,CAAA;IAC3B,CAAC,CAAA;IACD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,uBAAuB,EAAE;QACvD,8DAA8D;QAC9D,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,kBAAkB,IAAI,CAAC,wBAAwB;QAC5D,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IACF,MAAM,sBAAsB,GAAG,GAAG,EAAE;QAClC;;;;;;WAMG;QACH,IAAI,UAAU,GAAG,CAAC,CAAA;QAClB,gGAAgG;QAChG,IAAI,CAAC,kBAAkB,EAAE;YACvB,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;YACrC,UAAU,IAAI,CAAC,CAAA;SAChB;QACD,gGAAgG;QAChG,IAAI,CAAC,kBAAkB,EAAE;YACvB,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;YACrC,UAAU,IAAI,CAAC,CAAA;SAChB;QACD;;WAEG;QACH,IAAI,CAAC,CAAC,kBAAkB,YAAY,UAAU,CAAC,EAAE;YAC/C,kBAAkB,GAAG,IAAI,UAAU,EAAE,CAAA;SACtC;QACD,kBAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;QAC1B,kBAAkB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;QAC1B,wBAAwB,GAAG,IAAI,CAAA;QAE/B;;;WAGG;QACH,KAAK,CAAC,UAAU,KAAK,CAAC,IAAI,UAAU,KAAK,CAAC,EAAE,8DAA8D,CAAC,CAAA;QAC3G,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,gBAAgB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,qBAAqB,CAAC,CAAA;IAC1E,gBAAgB,CAAC,QAAQ,EAAE,uBAAuB,EAAE,qBAAqB,CAAC,CAAA;IAC1E,gBAAgB,CAAC,QAAQ,EAAE,wBAAwB,EAAE,sBAAsB,CAAC,CAAA;IAE5E,OAAO,QAAQ,CAAA;IAEf,SAAS,8BAA8B,CAAE,OAAmB,EAAE,KAAmB;QAC/E,mGAAmG;QACnG,KAAK,CAAC,CAAC,kBAAkB,EAAE,yCAAyC,CAAC,CAAA;QACrE,+CAA+C;QAC/C,KAAK,CAAC,OAAO,YAAY,UAAU,EAAE,8BAA8B,CAAC,CAAA;QACpE;;;;WAIG;QACH,KAAK,CAAC,OAAO,CAAC,UAAU,KAAK,CAAC,EAAE,oDAAoD,CAAC,CAAA;QACrF;;;WAGG;QACH,KAAK,CAAC,OAAO,CAAC,UAAU,KAAK,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,6DAA6D,CAAC,CAAA;QAE1H,kGAAkG;QAClG,KAAK,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,YAAY,EAAE,wBAAwB,CAAC,CAAA;QAC7E,qEAAqE;QACrE,KAAK,CAAC,KAAK,CAAC,KAAK,GAAG,OAAO,EAAE,mCAAmC,CAAC,CAAA;QACjE;;WAEG;QACH,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,GAAG,cAAc,CAAC,EAAE,gCAAgC,CAAC,CAAA;IAC1E,CAAC;AACH,CAAC;AAED,MAAM,UAAU,0BAA0B,CAAmC,QAAW;IACtF,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,SAAS,GAAG,gBAAgB,CAAC,aAAa,CAAA;IACtF,MAAM,iBAAiB,GAAuB,EAAE,CAAA;IAChD,IAAI,YAA8C,CAAA;IAElD,MAAM,mBAAmB,GAAG,CAAC,GAAqB,EAAE,KAAuB,EAAE,EAAE;QAC7E;;;WAGG;QACH,KAAK,CAAC,QAAQ,CAAC,qBAAqB,EAAE,+BAA+B,CAAC,CAAA;QACtE;;;WAGG;QACH,KAAK,CAAC,GAAG,YAAY,gBAAgB,EAAE,0CAA0C,CAAC,CAAA;QAElF,mEAAmE;QACnE,KAAK,CAAC,KAAK,GAAG,gBAAgB,CAAC,+BAA+B,EAAE,sCAAsC,CAAC,CAAA;QAEvG;;;;;;;;WAQG;QACH,KAAK,CAAC,CAAC,CAAC,KAAK,GAAG,kBAAkB,CAAC,EAAE,oCAAoC,CAAC,CAAA;QAC1E,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,OAAO,EAAE,GAAG,CAAC,YAAY,EAAE,YAAY,EAAE,GAAG,CAAC,UAAU,EAAE,KAAK,EAAE,CAAC,CAAA;QAE9F,iBAAiB,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;QAC3B,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,gBAAgB,CAAC,QAAQ,EAAE,qBAAqB,EAAE,mBAAmB,CAAC,CAAA;IACtE,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,mBAAmB,EAAE;QACnD,qDAAqD;QACrD,0BAA0B;QAC1B,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,GAAG,iBAAiB,CAAC;QACjC,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IACF,MAAM,eAAe,GAAG,CAAC,GAAiB,EAAE,EAAE;QAC5C;;;WAGG;QACH,KAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,sDAAsD,CAAC,CAAA;QAC5F,wFAAwF;QACxF,KAAK,CAAC,CAAC,YAAY,EAAE,qCAAqC,CAAC,CAAA;QAC3D,+CAA+C;QAC/C,KAAK,CAAC,GAAG,YAAY,YAAY,EAAE,6BAA6B,CAAC,CAAA;QACjE,YAAY,GAAG,GAAG,CAAA;QAClB,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,gBAAgB,CAAC,QAAQ,EAAE,iBAAiB,EAAE,eAAe,CAAC,CAAA;IAC9D,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,cAAc,EAAE;QAC9C,GAAG,EAAE,GAAG,EAAE;YACR;;;eAGG;YACH,KAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,KAAK,CAAC,CAAC,YAAY,EAAE,wCAAwC,CAAC,CAAA;YACnG,OAAO,YAAY,CAAA;QACrB,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,MAAM,UAAU,0BAA0B,CAAmC,QAAW;IACtF,mBAAmB;IACnB,IAAI,eAAoD,CAAA;IACxD,MAAM,kBAAkB,GAAG,CAAC,GAAoB,EAAE,EAAE;QAClD;;;WAGG;QACH,KAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,EAAE,sDAAsD,CAAC,CAAA;QAC5F,8FAA8F;QAC9F,KAAK,CAAC,CAAC,eAAe,EAAE,wCAAwC,CAAC,CAAA;QACjE,kDAAkD;QAClD,KAAK,CAAC,GAAG,YAAY,eAAe,EAAE,6BAA6B,CAAC,CAAA;QACpE,eAAe,GAAG,GAAG,CAAA;QACrB,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IACD,gBAAgB,CAAC,QAAQ,EAAE,oBAAoB,EAAE,kBAAkB,CAAC,CAAA;IACpE,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,iBAAiB,EAAE;QACjD,GAAG,EAAE,GAAG,EAAE;YACR;;;eAGG;YACH,KAAK,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,KAAK,CAAC,CAAC,eAAe,EAAE,wCAAwC,CAAC,CAAA;YACtG,OAAO,eAAe,CAAA;QACxB,CAAC;QACD,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAkC,QAAW,EAAE,QAA0B;IAChH,IAAI,SAAuE,CAAA;IAE3E,MAAM,YAAY,GAAG,CAAC,OAAiD,EAAE,KAAmB,EAAE,EAAE;QAC9F,iFAAiF;QACjF,KAAK,CAAC,CAAC,SAAS,EAAE,2BAA2B,CAAC,CAAA;QAC9C,qDAAqD;QACrD,KAAK,CAAC,WAAW,CAAC,OAAO,CAAC,IAAI,uBAAuB,CAAC,OAAO,CAAC,EAAE,2BAA2B,CAAC,CAAA;QAC5F,+EAA+E;QAC/E,KAAK,CAAC,gBAAgB,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,oCAAoC,CAAC,CAAA;QAEhF;;WAEG;QACH,IAAI,CAAC,QAAQ,CAAC,qBAAqB,EAAE;YACnC,iGAAiG;YACjG,KAAK,CAAC,KAAK,IAAI,KAAK,CAAC,OAAO,IAAI,KAAK,CAAC,YAAY,EAAE,wBAAwB,CAAC,CAAA;YAC7E,uFAAuF;YACvF,KAAK,CAAC,KAAK,CAAC,KAAK,GAAG,QAAQ,EAAE,mCAAmC,CAAC,CAAA;YAClE;;;;;eAKG;YACH,QAAQ,CAAC,sBAAsB,EAAE,CAAA;YACjC,QAAQ,CAAC,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,CAAA;SAClC;QAED,IAAI,WAAW,CAAC,OAAO,CAAC,EAAE;YACxB,SAAS,GAAG,OAAO,CAAA;SACpB;aAAM;YACL,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;YAC3D,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,CAAC,CAAA;SACvE;QAED,OAAO,QAAQ,CAAA;IACjB,CAAC,CAAA;IAED,gBAAgB,CAAC,QAAQ,EAAE,cAAc,EAAE,YAAY,CAAC,CAAA;IACxD,MAAM,YAAY,GAAG,GAAG,EAAE;QACxB,sEAAsE;QACtE,KAAK,CAAC,SAAS,EAAE,wBAAwB,CAAC,CAAA;QAC1C,kDAAkD;QAClD,wDAAwD;QACxD,OAA2D,SAAS,CAAA;IACtE,CAAC,CAAA;IACD,gBAAgB,CAAC,QAAQ,EAAE,cAAc,EAAE,YAAY,CAAC,CAAA;IAExD,MAAM,CAAC,cAAc,CAAC,QAAQ,EAAE,cAAc,EAAE;QAC9C,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC,CAAC,SAAS;QACtB,UAAU,EAAE,IAAI;KACjB,CAAC,CAAA;IAEF,OAAO,QAAQ,CAAA;AACjB,CAAC;AAED,MAAM,UAAU,WAAW,CAAE,OAAY;IACvC,OAAO,OAAO;QACZ,WAAW,IAAI,OAAO;QACtB,MAAM,IAAI,OAAO;QACjB,WAAW,IAAI,OAAO;QACtB,QAAQ,IAAI,OAAO;QACnB,aAAa,IAAI,OAAO,CAAA;AAC5B,CAAC;AAED,MAAM,UAAU,gBAAgB,CAC9B,OAAiD,EACjD,QAAW;IAEX,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,EAAE;QACzB,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;QAC3D,OAAO,gBAAgB,CAAC,iBAAiB,EAAE,QAAQ,CAAC;YAClD,gBAAgB,CAAC,oBAAoB,EAAE,QAAQ,CAAC,CAAA;KACnD;IAED,MAAM,EAAE,KAAK,EAAE,WAAW,EAAE,GAAG,QAAQ,CAAA;IACvC,MAAM,EAAE,UAAU,EAAE,SAAS,EAAE,GAAG,EAAE,GAAG,KAAK,CAAA;IAE5C;;;OAGG;IAEH,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,WAAW,EAAE,GAAG,OAAO,CAAA;IACxD,4CAA4C;IAC5C,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,GAAG,SAAS,CAAA;IAElC,4BAA4B;IAC5B,OAAO,IAAI,KAAK,QAAQ;QACtB,uBAAuB;QACvB,CAAC,CAAC,GAAG,IAAI,IAAI,KAAK,GAAG,CAAC;YACrB,CAAC,IAAI,KAAK,UAAU,IAAI,MAAM,KAAK,SAAS,CAAC,CAAC;QAC/C;;WAEG;QACH,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;QACzC,8EAA8E;QAC9E,CAAC,WAAW,CAAA;AAChB,CAAC;AAED,SAAS,uBAAuB,CAAE,OAAY;IAC5C,MAAM,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,GAAG,OAAO,CAAA;IAC3D,OAAO,WAAW,CAAC,iBAAiB,CAAC,IAAI,WAAW,CAAC,oBAAoB,CAAC,CAAA;AAC5E,CAAC;AAED,MAAM,UAAU,mBAAmB,CAAkC,QAAW;IAC9E,MAAM,EAAE,KAAK,EAAE,GAAG,QAAQ,CAAA;IAC1B,IAAI,KAAK,CAAC,GAAG;QAAE,OAAO,WAAW,CAAA;IACjC,OAAO,yBAAyB,CAAC,QAAQ,CAAC,CAAA;AAC5C,CAAC;AAED,MAAM,UAAU,yBAAyB,CAAkC,QAAW;IACpF,IAAI,QAAQ,YAAY,2BAA2B;QAAE,OAAO,SAAS,CAAA;IACrE,IAAI,QAAQ,YAAY,2BAA2B;QAAE,OAAO,SAAS,CAAA;IAErE,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAA;AACzC,CAAC;AAED,MAAM,UAAU,aAAa,CAAE,OAAoC;IACjE,IAAI,OAAO,YAAY,UAAU;QAAE,OAAO,OAAO,CAAA;IACjD,IAAI,iBAAiB,IAAI,OAAO,YAAY,iBAAiB,CAAC,SAAS;QAAE,OAAO,OAAO,CAAC,MAAM,EAAE,CAAA;IAEhG,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAA;AAC7C,CAAC;AAED,MAAM,UAAU,4BAA4B,CAAE,OAAoC;IAChF,IAAI,iBAAiB,EAAE;QACrB,IAAI,OAAO,YAAY,UAAU,EAAE;YACjC,MAAM,EAAE,GAAG,iBAAiB,CAAC,eAAe,CAAC,OAAO,CAAC,CAAA;YACrD,sEAAsE;YACtE,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAA;YACf,OAAO,EAAE,CAAA;SACV;QACD,IAAI,OAAO,YAAY,iBAAiB,CAAC,SAAS;YAAE,OAAO,OAAO,CAAA;KACnE;SAAM,IAAI,OAAO,YAAY,UAAU,EAAE;QACxC,OAAO,OAAO,CAAA;KACf;IACD,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAA;AAC7C,CAAC"} |
@@ -16,2 +16,3 @@ export { AlgorithmSuiteIdentifier, AlgorithmSuiteName, AlgorithmSuite } from './algorithm_suites'; | ||
export { isEncryptionMaterial, isDecryptionMaterial } from './cryptographic_material'; | ||
export { unwrapDataKey, wrapWithKeyObjectIfSupported } from './cryptographic_material'; | ||
export { CryptographicMaterial, decorateCryptographicMaterial, decorateWebCryptoMaterial, WebCryptoMaterial } from './cryptographic_material'; | ||
@@ -22,3 +23,4 @@ export { SignatureKey, VerificationKey } from './signature_key'; | ||
export { needs } from './needs'; | ||
export { cloneMaterial } from './clone_cryptographic_material'; | ||
export * from './types'; | ||
//# sourceMappingURL=index.d.ts.map |
@@ -25,2 +25,3 @@ /* | ||
export { isEncryptionMaterial, isDecryptionMaterial } from './cryptographic_material'; | ||
export { unwrapDataKey, wrapWithKeyObjectIfSupported } from './cryptographic_material'; | ||
export { decorateCryptographicMaterial, decorateWebCryptoMaterial } from './cryptographic_material'; | ||
@@ -31,2 +32,3 @@ export { SignatureKey, VerificationKey } from './signature_key'; | ||
export { needs } from './needs'; | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
export { cloneMaterial } from './clone_cryptographic_material'; | ||
//# sourceMappingURL=data:application/json;base64,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 |
@@ -53,4 +53,7 @@ /** | ||
*/ | ||
WRAPPING_KEY_VERIFIED_ENC_CTX = 16 | ||
WRAPPING_KEY_VERIFIED_ENC_CTX = 16, | ||
ENCRYPT_FLAGS = 10, | ||
SET_FLAGS = 5, | ||
DECRYPT_FLAGS = 20 | ||
} | ||
//# sourceMappingURL=keyring_trace.d.ts.map |
@@ -37,3 +37,21 @@ /* | ||
KeyringTraceFlag[KeyringTraceFlag["WRAPPING_KEY_VERIFIED_ENC_CTX"] = 16] = "WRAPPING_KEY_VERIFIED_ENC_CTX"; | ||
/* KeyringTraceFlags are organized here. | ||
* The three groupings are set, encrypt, and decrypt. | ||
* An unencrypted data key is set and is required to have a SET_FLAG. | ||
* For the encrypt path, the unencrypted data key must be generated. | ||
* For the decrypt path, the unencrypted data key must be decrypted. | ||
* | ||
* A encrypted data key must be encrypted | ||
* and the encryption context may be signed. | ||
* | ||
* When an encrypted data key is decrypted, | ||
* the encryption context may be verified. | ||
* | ||
* This organization is to keep a KeyringTrace for an encrypted data key | ||
* for listing the WRAPPING_KEY_VERIFIED_ENC_CTX flag. | ||
*/ | ||
KeyringTraceFlag[KeyringTraceFlag["ENCRYPT_FLAGS"] = 10] = "ENCRYPT_FLAGS"; | ||
KeyringTraceFlag[KeyringTraceFlag["SET_FLAGS"] = 5] = "SET_FLAGS"; | ||
KeyringTraceFlag[KeyringTraceFlag["DECRYPT_FLAGS"] = 20] = "DECRYPT_FLAGS"; | ||
})(KeyringTraceFlag || (KeyringTraceFlag = {})); | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
//# sourceMappingURL=data:application/json;base64,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 |
@@ -82,2 +82,3 @@ /* | ||
children.unshift(this.generator); | ||
let childKeyringErrors = []; | ||
for (const keyring of children) { | ||
@@ -91,11 +92,23 @@ /* Check for early return (Postcondition): Do not attempt to decrypt once I have a valid key. */ | ||
catch (e) { | ||
// there should be some debug here? or wrap? | ||
// Failures onDecrypt should not short-circuit the process | ||
// If the caller does not have access they may have access | ||
// through another Keyring. | ||
/* Failures onDecrypt should not short-circuit the process | ||
* If the caller does not have access they may have access | ||
* through another Keyring. | ||
*/ | ||
childKeyringErrors.push(e); | ||
} | ||
} | ||
/* Postcondition: A child keyring must provide a valid data key or no child keyring must have raised an error. | ||
* If I have a data key, | ||
* decrypt errors can be ignored. | ||
* However, if I was unable to decrypt a data key AND I have errors, | ||
* these errors should bubble up. | ||
* Otherwise, the only error customers will see is that | ||
* the material does not have an unencrypted data key. | ||
* So I return a concatenated Error message | ||
*/ | ||
needs(material.hasValidKey() || (!material.hasValidKey() && !childKeyringErrors.length), childKeyringErrors | ||
.reduce((m, e, i) => `${m} Error #${i + 1} \n ${e.stack} \n`, 'Unable to decrypt data key and one or more child keyrings had an error. \n ')); | ||
return material; | ||
}; | ||
} | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
//# sourceMappingURL=data:application/json;base64,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 |
@@ -0,1 +1,2 @@ | ||
/// <reference types="node" /> | ||
import { NodeAlgorithmSuite } from './node_algorithms'; | ||
@@ -37,2 +38,24 @@ import { WebCryptoAlgorithmSuite } from './web_crypto_algorithms'; | ||
export declare type DecryptionMaterial<Suite> = Suite extends NodeAlgorithmSuite ? NodeDecryptionMaterial : Suite extends WebCryptoAlgorithmSuite ? WebCryptoDecryptionMaterial : never; | ||
export declare type AwsEsdkKeyObjectType = 'secret' | 'public' | 'private'; | ||
export declare type AwsEsdkKeyFormat = 'pem' | 'der'; | ||
export declare type AwsEsdkKeyType = 'rsa' | 'dsa' | 'ec'; | ||
export interface AwsEsdkKeyExportOptions<T extends AwsEsdkKeyFormat> { | ||
type: 'pkcs1' | 'spki' | 'pkcs8' | 'sec1'; | ||
format: T; | ||
cipher?: string; | ||
passphrase?: string | Buffer; | ||
} | ||
export interface AwsEsdkKeyObject { | ||
asymmetricKeyType?: AwsEsdkKeyType; | ||
/** | ||
* For asymmetric keys, this property represents the size of the embedded key in | ||
* bytes. This property is `undefined` for symmetric keys. | ||
*/ | ||
asymmetricKeySize?: number; | ||
export(options: AwsEsdkKeyExportOptions<'pem'>): string | Buffer; | ||
export(options?: AwsEsdkKeyExportOptions<'der'>): Buffer; | ||
symmetricSize?: number; | ||
type: AwsEsdkKeyObjectType; | ||
} | ||
export declare type AwsEsdkCreateSecretKey = (key: Uint8Array) => AwsEsdkKeyObject; | ||
//# sourceMappingURL=types.d.ts.map |
@@ -6,2 +6,21 @@ # Change Log | ||
# [0.2.0-preview.4](/compare/@aws-crypto/material-management@0.2.0-preview.3...@aws-crypto/material-management@0.2.0-preview.4) (2019-09-20) | ||
### Bug Fixes | ||
* Better error messageing (#212) 7198100, closes #212 #152 | ||
* Better timingSafeEqual definition (#203) 12d1661, closes #203 | ||
* KeyringTraceFlag requirements and data key caching (#210) 7dfa1ae, closes #210 | ||
### Features | ||
* Remove unencryptedDataKeyLength (#201) bd160c0, closes #201 | ||
* Suport Node.js crypto KeyObjects (#200) 77ad031, closes #200 #74 | ||
# [0.2.0-preview.3](/compare/@aws-crypto/material-management@0.2.0-preview.2...@aws-crypto/material-management@0.2.0-preview.3) (2019-08-08) | ||
@@ -8,0 +27,0 @@ |
{ | ||
"name": "@aws-crypto/material-management", | ||
"version": "0.2.0-preview.3", | ||
"version": "0.2.0-preview.4", | ||
"scripts": { | ||
@@ -52,3 +52,3 @@ "prepublishOnly": "npm run build", | ||
}, | ||
"gitHead": "698180f30c85ef77a5739ebadd676d4b41ad441f" | ||
"gitHead": "b3e278777e164258f0f40f5ec5d260f1c0d21a9b" | ||
} |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
652998
6.32%115
5.5%4400
10.33%