Socket
Socket
Sign inDemoInstall

@aws-crypto/raw-keyring

Package Overview
Dependencies
Maintainers
3
Versions
24
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-crypto/raw-keyring - npm Package Compare versions

Comparing version 0.1.0-preview.2 to 0.1.0-preview.3

4

build/main/raw_aes_material.d.ts

@@ -5,3 +5,3 @@ import { CryptographicMaterial, // eslint-disable-line no-unused-vars

AwsEsdkJsKeyUsage, // eslint-disable-line no-unused-vars
KeyringTrace } from '@aws-crypto/material-management';
KeyringTrace, EncryptionContext } from '@aws-crypto/material-management';
import { WrappingSuiteIdentifier } from './raw_aes_algorithm_suite';

@@ -16,2 +16,3 @@ export declare class NodeRawAesMaterial implements Readonly<CryptographicMaterial<NodeRawAesMaterial>> {

keyringTrace: KeyringTrace[];
encryptionContext: EncryptionContext;
constructor(suiteId: WrappingSuiteIdentifier);

@@ -32,2 +33,3 @@ hasValidKey(): boolean;

validUsages: ReadonlyArray<AwsEsdkJsKeyUsage>;
encryptionContext: EncryptionContext;
constructor(suiteId: WrappingSuiteIdentifier);

@@ -34,0 +36,0 @@ hasValidKey(): boolean;

@@ -28,2 +28,3 @@ "use strict";

this.keyringTrace = [];
this.encryptionContext = Object.freeze({});
/* Precondition: NodeRawAesMaterial suiteId must be RawAesWrappingSuiteIdentifier. */

@@ -50,2 +51,3 @@ material_management_1.needs(raw_aes_algorithm_suite_1.RawAesWrappingSuiteIdentifier[suiteId], 'suiteId not supported.');

this.keyringTrace = [];
this.encryptionContext = Object.freeze({});
/* Precondition: WebCryptoAlgorithmSuite suiteId must be RawAesWrappingSuiteIdentifier. */

@@ -71,2 +73,2 @@ material_management_1.needs(raw_aes_algorithm_suite_1.RawAesWrappingSuiteIdentifier[suiteId], 'suiteId not supported.');

material_management_1.frozenClass(WebCryptoRawAesMaterial);
//# sourceMappingURL=data:application/json;base64,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
//# sourceMappingURL=data:application/json;base64,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
import { EncryptionMaterial, // eslint-disable-line no-unused-vars
DecryptionMaterial, // eslint-disable-line no-unused-vars
SupportedAlgorithmSuites, // eslint-disable-line no-unused-vars
EncryptionContext, EncryptedDataKey } from '@aws-crypto/material-management';
SupportedAlgorithmSuites, EncryptedDataKey } from '@aws-crypto/material-management';
export interface RawKeyRing<S extends SupportedAlgorithmSuites> {

@@ -12,9 +11,9 @@ keyNamespace: string;

}
export declare function _onEncrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(randomBytes: (bytes: number) => Promise<Uint8Array>): (this: K, material: EncryptionMaterial<S>, context?: EncryptionContext | undefined) => Promise<EncryptionMaterial<S>>;
export declare function _onDecrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(): (this: K, material: DecryptionMaterial<S>, encryptedDataKeys: EncryptedDataKey[], context?: EncryptionContext | undefined) => Promise<DecryptionMaterial<S>>;
export declare function _onEncrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(randomBytes: (bytes: number) => Promise<Uint8Array>): (this: K, material: EncryptionMaterial<S>) => Promise<EncryptionMaterial<S>>;
export declare function _onDecrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(): (this: K, material: DecryptionMaterial<S>, encryptedDataKeys: EncryptedDataKey[]) => Promise<DecryptionMaterial<S>>;
export interface WrapKey<S extends SupportedAlgorithmSuites> {
(material: EncryptionMaterial<S>, context?: EncryptionContext): Promise<EncryptionMaterial<S>>;
(material: EncryptionMaterial<S>): Promise<EncryptionMaterial<S>>;
}
export interface UnwrapKey<S extends SupportedAlgorithmSuites> {
(material: DecryptionMaterial<S>, edk: EncryptedDataKey, context?: EncryptionContext): Promise<DecryptionMaterial<S>>;
(material: DecryptionMaterial<S>, edk: EncryptedDataKey): Promise<DecryptionMaterial<S>>;
}

@@ -21,0 +20,0 @@ export interface FilterEncryptedDataKey {

@@ -19,3 +19,3 @@ "use strict";

function _onEncrypt(randomBytes) {
return async function _onEncrypt(material, context) {
return async function _onEncrypt(material) {
if (!material.hasUnencryptedDataKey) {

@@ -30,3 +30,3 @@ const trace = {

}
return this._wrapKey(material, context);
return this._wrapKey(material);
};

@@ -36,3 +36,3 @@ }

function _onDecrypt() {
return async function _onDecrypt(material, encryptedDataKeys, context) {
return async function _onDecrypt(material, encryptedDataKeys) {
/* Check for early return (Postcondition): If the material is already valid, attempting to decrypt is a bad idea. */

@@ -47,3 +47,3 @@ if (material.hasValidKey())

try {
return await this._unwrapKey(material, edk, context);
return await this._unwrapKey(material, edk);
}

@@ -61,2 +61,2 @@ catch (e) {

exports._onDecrypt = _onDecrypt;
//# sourceMappingURL=data:application/json;base64,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
//# sourceMappingURL=data:application/json;base64,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

@@ -5,3 +5,3 @@ import { CryptographicMaterial, // eslint-disable-line no-unused-vars

AwsEsdkJsKeyUsage, // eslint-disable-line no-unused-vars
KeyringTrace } from '@aws-crypto/material-management';
KeyringTrace, EncryptionContext } from '@aws-crypto/material-management';
import { WrappingSuiteIdentifier } from './raw_aes_algorithm_suite';

@@ -16,2 +16,3 @@ export declare class NodeRawAesMaterial implements Readonly<CryptographicMaterial<NodeRawAesMaterial>> {

keyringTrace: KeyringTrace[];
encryptionContext: EncryptionContext;
constructor(suiteId: WrappingSuiteIdentifier);

@@ -32,2 +33,3 @@ hasValidKey(): boolean;

validUsages: ReadonlyArray<AwsEsdkJsKeyUsage>;
encryptionContext: EncryptionContext;
constructor(suiteId: WrappingSuiteIdentifier);

@@ -34,0 +36,0 @@ hasValidKey(): boolean;

@@ -29,2 +29,3 @@ /*

this.keyringTrace = [];
this.encryptionContext = Object.freeze({});
/* Precondition: NodeRawAesMaterial suiteId must be RawAesWrappingSuiteIdentifier. */

@@ -50,2 +51,3 @@ needs(RawAesWrappingSuiteIdentifier[suiteId], 'suiteId not supported.');

this.keyringTrace = [];
this.encryptionContext = Object.freeze({});
/* Precondition: WebCryptoAlgorithmSuite suiteId must be RawAesWrappingSuiteIdentifier. */

@@ -70,2 +72,2 @@ needs(RawAesWrappingSuiteIdentifier[suiteId], 'suiteId not supported.');

frozenClass(WebCryptoRawAesMaterial);
//# sourceMappingURL=data:application/json;base64,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
//# sourceMappingURL=data:application/json;base64,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
import { EncryptionMaterial, // eslint-disable-line no-unused-vars
DecryptionMaterial, // eslint-disable-line no-unused-vars
SupportedAlgorithmSuites, // eslint-disable-line no-unused-vars
EncryptionContext, EncryptedDataKey } from '@aws-crypto/material-management';
SupportedAlgorithmSuites, EncryptedDataKey } from '@aws-crypto/material-management';
export interface RawKeyRing<S extends SupportedAlgorithmSuites> {

@@ -12,9 +11,9 @@ keyNamespace: string;

}
export declare function _onEncrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(randomBytes: (bytes: number) => Promise<Uint8Array>): (this: K, material: EncryptionMaterial<S>, context?: EncryptionContext | undefined) => Promise<EncryptionMaterial<S>>;
export declare function _onDecrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(): (this: K, material: DecryptionMaterial<S>, encryptedDataKeys: EncryptedDataKey[], context?: EncryptionContext | undefined) => Promise<DecryptionMaterial<S>>;
export declare function _onEncrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(randomBytes: (bytes: number) => Promise<Uint8Array>): (this: K, material: EncryptionMaterial<S>) => Promise<EncryptionMaterial<S>>;
export declare function _onDecrypt<S extends SupportedAlgorithmSuites, K extends RawKeyRing<S>>(): (this: K, material: DecryptionMaterial<S>, encryptedDataKeys: EncryptedDataKey[]) => Promise<DecryptionMaterial<S>>;
export interface WrapKey<S extends SupportedAlgorithmSuites> {
(material: EncryptionMaterial<S>, context?: EncryptionContext): Promise<EncryptionMaterial<S>>;
(material: EncryptionMaterial<S>): Promise<EncryptionMaterial<S>>;
}
export interface UnwrapKey<S extends SupportedAlgorithmSuites> {
(material: DecryptionMaterial<S>, edk: EncryptedDataKey, context?: EncryptionContext): Promise<DecryptionMaterial<S>>;
(material: DecryptionMaterial<S>, edk: EncryptedDataKey): Promise<DecryptionMaterial<S>>;
}

@@ -21,0 +20,0 @@ export interface FilterEncryptedDataKey {

@@ -18,3 +18,3 @@ /*

export function _onEncrypt(randomBytes) {
return async function _onEncrypt(material, context) {
return async function _onEncrypt(material) {
if (!material.hasUnencryptedDataKey) {

@@ -29,7 +29,7 @@ const trace = {

}
return this._wrapKey(material, context);
return this._wrapKey(material);
};
}
export function _onDecrypt() {
return async function _onDecrypt(material, encryptedDataKeys, context) {
return async function _onDecrypt(material, encryptedDataKeys) {
/* Check for early return (Postcondition): If the material is already valid, attempting to decrypt is a bad idea. */

@@ -44,3 +44,3 @@ if (material.hasValidKey())

try {
return await this._unwrapKey(material, edk, context);
return await this._unwrapKey(material, edk);
}

@@ -57,2 +57,2 @@ catch (e) {

}
//# sourceMappingURL=data:application/json;base64,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
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoicmF3X2tleXJpbmdfZGVjb3JhdG9ycy5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy9yYXdfa2V5cmluZ19kZWNvcmF0b3JzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOzs7Ozs7Ozs7Ozs7O0dBYUc7QUFFSCxPQUFPLEVBSVMscUNBQXFDO0FBQ25ELGdCQUFnQixFQUVqQixNQUFNLGlDQUFpQyxDQUFBO0FBVXhDLE1BQU0sVUFBVSxVQUFVLENBQ3hCLFdBQW1EO0lBRW5ELE9BQU8sS0FBSyxVQUFVLFVBQVUsQ0FFOUIsUUFBK0I7UUFFL0IsSUFBSSxDQUFDLFFBQVEsQ0FBQyxxQkFBcUIsRUFBRTtZQUNuQyxNQUFNLEtBQUssR0FBaUI7Z0JBQzFCLE9BQU8sRUFBRSxJQUFJLENBQUMsT0FBTztnQkFDckIsWUFBWSxFQUFFLElBQUksQ0FBQyxZQUFZO2dCQUMvQixLQUFLLEVBQUUsZ0JBQWdCLENBQUMsK0JBQStCO2FBQ3hELENBQUE7WUFDRCxNQUFNLEdBQUcsR0FBRyxNQUFNLFdBQVcsQ0FBQyxRQUFRLENBQUMsS0FBSyxDQUFDLGNBQWMsQ0FBQyxDQUFBO1lBQzVELFFBQVEsQ0FBQyxxQkFBcUIsQ0FBQyxHQUFHLEVBQUUsS0FBSyxDQUFDLENBQUE7U0FDM0M7UUFDRCxPQUFPLElBQUksQ0FBQyxRQUFRLENBQUMsUUFBUSxDQUFDLENBQUE7SUFDaEMsQ0FBQyxDQUFBO0FBQ0gsQ0FBQztBQUVELE1BQU0sVUFBVSxVQUFVO0lBQ3hCLE9BQU8sS0FBSyxVQUFVLFVBQVUsQ0FFOUIsUUFBK0IsRUFDL0IsaUJBQXFDO1FBRXJDLG9IQUFvSDtRQUNwSCxJQUFJLFFBQVEsQ0FBQyxXQUFXLEVBQUU7WUFBRSxPQUFPLFFBQVEsQ0FBQTtRQUMzQyxNQUFNLElBQUksR0FBRyxpQkFBaUIsQ0FBQyxNQUFNLENBQUMsSUFBSSxDQUFDLE9BQU8sRUFBRSxJQUFJLENBQUMsQ0FBQTtRQUN6RCw4R0FBOEc7UUFDOUcsSUFBSSxDQUFDLElBQUksQ0FBQyxNQUFNO1lBQUUsT0FBTyxRQUFRLENBQUE7UUFFakMsS0FBSyxNQUFNLEdBQUcsSUFBSSxJQUFJLEVBQUU7WUFDdEIsSUFBSTtnQkFDRixPQUFPLE1BQU0sSUFBSSxDQUFDLFVBQVUsQ0FBQyxRQUFRLEVBQUUsR0FBRyxDQUFDLENBQUE7YUFDNUM7WUFBQyxPQUFPLENBQUMsRUFBRTtnQkFDViw2Q0FBNkM7Z0JBQzdDLHdEQUF3RDtnQkFDeEQsMERBQTBEO2dCQUMxRCwyQkFBMkI7YUFDNUI7U0FDRjtRQUVELE9BQU8sUUFBUSxDQUFBO0lBQ2pCLENBQUMsQ0FBQTtBQUNILENBQUMifQ==

@@ -6,2 +6,13 @@ # Change Log

# [0.1.0-preview.3](/compare/@aws-crypto/raw-keyring@0.1.0-preview.2...@aws-crypto/raw-keyring@0.1.0-preview.3) (2019-08-08)
### Bug Fixes
* Encryption Context changes (#148) 5a7e9ca, closes #148 #54
# [0.1.0-preview.2](/compare/@aws-crypto/raw-keyring@0.1.0-preview.1...@aws-crypto/raw-keyring@0.1.0-preview.2) (2019-07-24)

@@ -8,0 +19,0 @@

{
"name": "@aws-crypto/raw-keyring",
"version": "0.1.0-preview.2",
"version": "0.1.0-preview.3",
"scripts": {

@@ -19,4 +19,4 @@ "prepublishOnly": "npm run build",

"dependencies": {
"@aws-crypto/material-management": "^0.2.0-preview.2",
"@aws-crypto/serialize": "^0.1.0-preview.2",
"@aws-crypto/material-management": "^0.2.0-preview.3",
"@aws-crypto/serialize": "^0.1.0-preview.3",
"tslib": "^1.9.3"

@@ -53,3 +53,3 @@ },

},
"gitHead": "970dbfad262186db90bd9ad2eba7a36d8a54ca18"
"gitHead": "698180f30c85ef77a5739ebadd676d4b41ad441f"
}

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc