@aws-crypto/raw-keyring
Advanced tools
Comparing version 0.1.0-preview.2 to 0.1.0-preview.3
@@ -5,3 +5,3 @@ import { CryptographicMaterial, // eslint-disable-line no-unused-vars | ||
AwsEsdkJsKeyUsage, // eslint-disable-line no-unused-vars | ||
KeyringTrace } from '@aws-crypto/material-management'; | ||
KeyringTrace, EncryptionContext } from '@aws-crypto/material-management'; | ||
import { WrappingSuiteIdentifier } from './raw_aes_algorithm_suite'; | ||
@@ -16,2 +16,3 @@ export declare class NodeRawAesMaterial implements Readonly<CryptographicMaterial<NodeRawAesMaterial>> { | ||
keyringTrace: KeyringTrace[]; | ||
encryptionContext: EncryptionContext; | ||
constructor(suiteId: WrappingSuiteIdentifier); | ||
@@ -32,2 +33,3 @@ hasValidKey(): boolean; | ||
validUsages: ReadonlyArray<AwsEsdkJsKeyUsage>; | ||
encryptionContext: EncryptionContext; | ||
constructor(suiteId: WrappingSuiteIdentifier); | ||
@@ -34,0 +36,0 @@ hasValidKey(): boolean; |
@@ -28,2 +28,3 @@ "use strict"; | ||
this.keyringTrace = []; | ||
this.encryptionContext = Object.freeze({}); | ||
/* Precondition: NodeRawAesMaterial suiteId must be RawAesWrappingSuiteIdentifier. */ | ||
@@ -50,2 +51,3 @@ material_management_1.needs(raw_aes_algorithm_suite_1.RawAesWrappingSuiteIdentifier[suiteId], 'suiteId not supported.'); | ||
this.keyringTrace = []; | ||
this.encryptionContext = Object.freeze({}); | ||
/* Precondition: WebCryptoAlgorithmSuite suiteId must be RawAesWrappingSuiteIdentifier. */ | ||
@@ -71,2 +73,2 @@ material_management_1.needs(raw_aes_algorithm_suite_1.RawAesWrappingSuiteIdentifier[suiteId], 'suiteId not supported.'); | ||
material_management_1.frozenClass(WebCryptoRawAesMaterial); | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
//# sourceMappingURL=data:application/json;base64,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 |
import { EncryptionMaterial, // eslint-disable-line no-unused-vars | ||
DecryptionMaterial, // eslint-disable-line no-unused-vars | ||
SupportedAlgorithmSuites, // eslint-disable-line no-unused-vars | ||
EncryptionContext, EncryptedDataKey } from '@aws-crypto/material-management'; | ||
SupportedAlgorithmSuites, EncryptedDataKey } from '@aws-crypto/material-management'; | ||
export interface RawKeyRing<S extends SupportedAlgorithmSuites> { | ||
@@ -12,9 +11,9 @@ keyNamespace: string; | ||
} | ||
export declare function _onEncrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(randomBytes: (bytes: number) => Promise<Uint8Array>): (this: K, material: EncryptionMaterial<S>, context?: EncryptionContext | undefined) => Promise<EncryptionMaterial<S>>; | ||
export declare function _onDecrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(): (this: K, material: DecryptionMaterial<S>, encryptedDataKeys: EncryptedDataKey[], context?: EncryptionContext | undefined) => Promise<DecryptionMaterial<S>>; | ||
export declare function _onEncrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(randomBytes: (bytes: number) => Promise<Uint8Array>): (this: K, material: EncryptionMaterial<S>) => Promise<EncryptionMaterial<S>>; | ||
export declare function _onDecrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(): (this: K, material: DecryptionMaterial<S>, encryptedDataKeys: EncryptedDataKey[]) => Promise<DecryptionMaterial<S>>; | ||
export interface WrapKey<S extends SupportedAlgorithmSuites> { | ||
(material: EncryptionMaterial<S>, context?: EncryptionContext): Promise<EncryptionMaterial<S>>; | ||
(material: EncryptionMaterial<S>): Promise<EncryptionMaterial<S>>; | ||
} | ||
export interface UnwrapKey<S extends SupportedAlgorithmSuites> { | ||
(material: DecryptionMaterial<S>, edk: EncryptedDataKey, context?: EncryptionContext): Promise<DecryptionMaterial<S>>; | ||
(material: DecryptionMaterial<S>, edk: EncryptedDataKey): Promise<DecryptionMaterial<S>>; | ||
} | ||
@@ -21,0 +20,0 @@ export interface FilterEncryptedDataKey { |
@@ -19,3 +19,3 @@ "use strict"; | ||
function _onEncrypt(randomBytes) { | ||
return async function _onEncrypt(material, context) { | ||
return async function _onEncrypt(material) { | ||
if (!material.hasUnencryptedDataKey) { | ||
@@ -30,3 +30,3 @@ const trace = { | ||
} | ||
return this._wrapKey(material, context); | ||
return this._wrapKey(material); | ||
}; | ||
@@ -36,3 +36,3 @@ } | ||
function _onDecrypt() { | ||
return async function _onDecrypt(material, encryptedDataKeys, context) { | ||
return async function _onDecrypt(material, encryptedDataKeys) { | ||
/* Check for early return (Postcondition): If the material is already valid, attempting to decrypt is a bad idea. */ | ||
@@ -47,3 +47,3 @@ if (material.hasValidKey()) | ||
try { | ||
return await this._unwrapKey(material, edk, context); | ||
return await this._unwrapKey(material, edk); | ||
} | ||
@@ -61,2 +61,2 @@ catch (e) { | ||
exports._onDecrypt = _onDecrypt; | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
//# sourceMappingURL=data:application/json;base64,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 |
@@ -5,3 +5,3 @@ import { CryptographicMaterial, // eslint-disable-line no-unused-vars | ||
AwsEsdkJsKeyUsage, // eslint-disable-line no-unused-vars | ||
KeyringTrace } from '@aws-crypto/material-management'; | ||
KeyringTrace, EncryptionContext } from '@aws-crypto/material-management'; | ||
import { WrappingSuiteIdentifier } from './raw_aes_algorithm_suite'; | ||
@@ -16,2 +16,3 @@ export declare class NodeRawAesMaterial implements Readonly<CryptographicMaterial<NodeRawAesMaterial>> { | ||
keyringTrace: KeyringTrace[]; | ||
encryptionContext: EncryptionContext; | ||
constructor(suiteId: WrappingSuiteIdentifier); | ||
@@ -32,2 +33,3 @@ hasValidKey(): boolean; | ||
validUsages: ReadonlyArray<AwsEsdkJsKeyUsage>; | ||
encryptionContext: EncryptionContext; | ||
constructor(suiteId: WrappingSuiteIdentifier); | ||
@@ -34,0 +36,0 @@ hasValidKey(): boolean; |
@@ -29,2 +29,3 @@ /* | ||
this.keyringTrace = []; | ||
this.encryptionContext = Object.freeze({}); | ||
/* Precondition: NodeRawAesMaterial suiteId must be RawAesWrappingSuiteIdentifier. */ | ||
@@ -50,2 +51,3 @@ needs(RawAesWrappingSuiteIdentifier[suiteId], 'suiteId not supported.'); | ||
this.keyringTrace = []; | ||
this.encryptionContext = Object.freeze({}); | ||
/* Precondition: WebCryptoAlgorithmSuite suiteId must be RawAesWrappingSuiteIdentifier. */ | ||
@@ -70,2 +72,2 @@ needs(RawAesWrappingSuiteIdentifier[suiteId], 'suiteId not supported.'); | ||
frozenClass(WebCryptoRawAesMaterial); | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
//# sourceMappingURL=data:application/json;base64,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 |
import { EncryptionMaterial, // eslint-disable-line no-unused-vars | ||
DecryptionMaterial, // eslint-disable-line no-unused-vars | ||
SupportedAlgorithmSuites, // eslint-disable-line no-unused-vars | ||
EncryptionContext, EncryptedDataKey } from '@aws-crypto/material-management'; | ||
SupportedAlgorithmSuites, EncryptedDataKey } from '@aws-crypto/material-management'; | ||
export interface RawKeyRing<S extends SupportedAlgorithmSuites> { | ||
@@ -12,9 +11,9 @@ keyNamespace: string; | ||
} | ||
export declare function _onEncrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(randomBytes: (bytes: number) => Promise<Uint8Array>): (this: K, material: EncryptionMaterial<S>, context?: EncryptionContext | undefined) => Promise<EncryptionMaterial<S>>; | ||
export declare function _onDecrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(): (this: K, material: DecryptionMaterial<S>, encryptedDataKeys: EncryptedDataKey[], context?: EncryptionContext | undefined) => Promise<DecryptionMaterial<S>>; | ||
export declare function _onEncrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(randomBytes: (bytes: number) => Promise<Uint8Array>): (this: K, material: EncryptionMaterial<S>) => Promise<EncryptionMaterial<S>>; | ||
export declare function _onDecrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(): (this: K, material: DecryptionMaterial<S>, encryptedDataKeys: EncryptedDataKey[]) => Promise<DecryptionMaterial<S>>; | ||
export interface WrapKey<S extends SupportedAlgorithmSuites> { | ||
(material: EncryptionMaterial<S>, context?: EncryptionContext): Promise<EncryptionMaterial<S>>; | ||
(material: EncryptionMaterial<S>): Promise<EncryptionMaterial<S>>; | ||
} | ||
export interface UnwrapKey<S extends SupportedAlgorithmSuites> { | ||
(material: DecryptionMaterial<S>, edk: EncryptedDataKey, context?: EncryptionContext): Promise<DecryptionMaterial<S>>; | ||
(material: DecryptionMaterial<S>, edk: EncryptedDataKey): Promise<DecryptionMaterial<S>>; | ||
} | ||
@@ -21,0 +20,0 @@ export interface FilterEncryptedDataKey { |
@@ -18,3 +18,3 @@ /* | ||
export function _onEncrypt(randomBytes) { | ||
return async function _onEncrypt(material, context) { | ||
return async function _onEncrypt(material) { | ||
if (!material.hasUnencryptedDataKey) { | ||
@@ -29,7 +29,7 @@ const trace = { | ||
} | ||
return this._wrapKey(material, context); | ||
return this._wrapKey(material); | ||
}; | ||
} | ||
export function _onDecrypt() { | ||
return async function _onDecrypt(material, encryptedDataKeys, context) { | ||
return async function _onDecrypt(material, encryptedDataKeys) { | ||
/* Check for early return (Postcondition): If the material is already valid, attempting to decrypt is a bad idea. */ | ||
@@ -44,3 +44,3 @@ if (material.hasValidKey()) | ||
try { | ||
return await this._unwrapKey(material, edk, context); | ||
return await this._unwrapKey(material, edk); | ||
} | ||
@@ -57,2 +57,2 @@ catch (e) { | ||
} | ||
//# sourceMappingURL=data:application/json;base64,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 | ||
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoicmF3X2tleXJpbmdfZGVjb3JhdG9ycy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy9yYXdfa2V5cmluZ19kZWNvcmF0b3JzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOzs7Ozs7Ozs7Ozs7O0dBYUc7QUFFSCxPQUFPLEVBSVMscUNBQXFDO0FBQ25ELGdCQUFnQixFQUVqQixNQUFNLGlDQUFpQyxDQUFBO0FBVXhDLE1BQU0sVUFBVSxVQUFVLENBQ3hCLFdBQW1EO0lBRW5ELE9BQU8sS0FBSyxVQUFVLFVBQVUsQ0FFOUIsUUFBK0I7UUFFL0IsSUFBSSxDQUFDLFFBQVEsQ0FBQyxxQkFBcUIsRUFBRTtZQUNuQyxNQUFNLEtBQUssR0FBaUI7Z0JBQzFCLE9BQU8sRUFBRSxJQUFJLENBQUMsT0FBTztnQkFDckIsWUFBWSxFQUFFLElBQUksQ0FBQyxZQUFZO2dCQUMvQixLQUFLLEVBQUUsZ0JBQWdCLENBQUMsK0JBQStCO2FBQ3hELENBQUE7WUFDRCxNQUFNLEdBQUcsR0FBRyxNQUFNLFdBQVcsQ0FBQyxRQUFRLENBQUMsS0FBSyxDQUFDLGNBQWMsQ0FBQyxDQUFBO1lBQzVELFFBQVEsQ0FBQyxxQkFBcUIsQ0FBQyxHQUFHLEVBQUUsS0FBSyxDQUFDLENBQUE7U0FDM0M7UUFDRCxPQUFPLElBQUksQ0FBQyxRQUFRLENBQUMsUUFBUSxDQUFDLENBQUE7SUFDaEMsQ0FBQyxDQUFBO0FBQ0gsQ0FBQztBQUVELE1BQU0sVUFBVSxVQUFVO0lBQ3hCLE9BQU8sS0FBSyxVQUFVLFVBQVUsQ0FFOUIsUUFBK0IsRUFDL0IsaUJBQXFDO1FBRXJDLG9IQUFvSDtRQUNwSCxJQUFJLFFBQVEsQ0FBQyxXQUFXLEVBQUU7WUFBRSxPQUFPLFFBQVEsQ0FBQTtRQUMzQyxNQUFNLElBQUksR0FBRyxpQkFBaUIsQ0FBQyxNQUFNLENBQUMsSUFBSSxDQUFDLE9BQU8sRUFBRSxJQUFJLENBQUMsQ0FBQTtRQUN6RCw4R0FBOEc7UUFDOUcsSUFBSSxDQUFDLElBQUksQ0FBQyxNQUFNO1lBQUUsT0FBTyxRQUFRLENBQUE7UUFFakMsS0FBSyxNQUFNLEdBQUcsSUFBSSxJQUFJLEVBQUU7WUFDdEIsSUFBSTtnQkFDRixPQUFPLE1BQU0sSUFBSSxDQUFDLFVBQVUsQ0FBQyxRQUFRLEVBQUUsR0FBRyxDQUFDLENBQUE7YUFDNUM7WUFBQyxPQUFPLENBQUMsRUFBRTtnQkFDViw2Q0FBNkM7Z0JBQzdDLHdEQUF3RDtnQkFDeEQsMERBQTBEO2dCQUMxRCwyQkFBMkI7YUFDNUI7U0FDRjtRQUVELE9BQU8sUUFBUSxDQUFBO0lBQ2pCLENBQUMsQ0FBQTtBQUNILENBQUMifQ== |
@@ -6,2 +6,13 @@ # Change Log | ||
# [0.1.0-preview.3](/compare/@aws-crypto/raw-keyring@0.1.0-preview.2...@aws-crypto/raw-keyring@0.1.0-preview.3) (2019-08-08) | ||
### Bug Fixes | ||
* Encryption Context changes (#148) 5a7e9ca, closes #148 #54 | ||
# [0.1.0-preview.2](/compare/@aws-crypto/raw-keyring@0.1.0-preview.1...@aws-crypto/raw-keyring@0.1.0-preview.2) (2019-07-24) | ||
@@ -8,0 +19,0 @@ |
{ | ||
"name": "@aws-crypto/raw-keyring", | ||
"version": "0.1.0-preview.2", | ||
"version": "0.1.0-preview.3", | ||
"scripts": { | ||
@@ -19,4 +19,4 @@ "prepublishOnly": "npm run build", | ||
"dependencies": { | ||
"@aws-crypto/material-management": "^0.2.0-preview.2", | ||
"@aws-crypto/serialize": "^0.1.0-preview.2", | ||
"@aws-crypto/material-management": "^0.2.0-preview.3", | ||
"@aws-crypto/serialize": "^0.1.0-preview.3", | ||
"tslib": "^1.9.3" | ||
@@ -53,3 +53,3 @@ }, | ||
}, | ||
"gitHead": "970dbfad262186db90bd9ad2eba7a36d8a54ca18" | ||
"gitHead": "698180f30c85ef77a5739ebadd676d4b41ad441f" | ||
} |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
385175
657