Comparing version 3.8.0 to 3.9.0
import decrypt from '../flattened/decrypt.js'; | ||
import { JWEInvalid } from '../../util/errors.js'; | ||
import { decoder } from '../../lib/buffer_utils.js'; | ||
export default async function compactDecrypt(jwe, key, options) { | ||
async function compactDecrypt(jwe, key, options) { | ||
if (jwe instanceof Uint8Array) { | ||
@@ -24,1 +24,3 @@ jwe = decoder.decode(jwe); | ||
} | ||
export { compactDecrypt }; | ||
export default compactDecrypt; |
import FlattenedEncrypt from '../flattened/encrypt.js'; | ||
export default class CompactEncrypt { | ||
class CompactEncrypt { | ||
constructor(plaintext) { | ||
@@ -27,1 +27,3 @@ this._flattened = new FlattenedEncrypt(plaintext); | ||
} | ||
export { CompactEncrypt }; | ||
export default CompactEncrypt; |
@@ -17,3 +17,3 @@ import { JOSEAlgNotAllowed, JOSENotSupported, JWEInvalid } from '../../util/errors.js'; | ||
const checkEncOption = validateAlgorithms.bind(undefined, 'contentEncryptionAlgorithms'); | ||
export default async function flattenedDecrypt(jwe, key, options) { | ||
async function flattenedDecrypt(jwe, key, options) { | ||
var _a; | ||
@@ -133,1 +133,3 @@ if (!isObject(jwe)) { | ||
} | ||
export { flattenedDecrypt }; | ||
export default flattenedDecrypt; |
@@ -13,3 +13,3 @@ import ivFactory from '../../lib/iv.js'; | ||
const checkExtensions = validateCrit.bind(undefined, JWEInvalid, new Map()); | ||
export default class FlattenedEncrypt { | ||
class FlattenedEncrypt { | ||
constructor(plaintext) { | ||
@@ -166,1 +166,3 @@ this._plaintext = plaintext; | ||
} | ||
export { FlattenedEncrypt }; | ||
export default FlattenedEncrypt; |
import decrypt from '../flattened/decrypt.js'; | ||
import { JWEDecryptionFailed, JWEInvalid } from '../../util/errors.js'; | ||
import isObject from '../../lib/is_object.js'; | ||
export default async function generalDecrypt(jwe, key, options) { | ||
async function generalDecrypt(jwe, key, options) { | ||
if (!isObject(jwe)) { | ||
@@ -29,1 +29,3 @@ throw new JWEInvalid('General JWE must be an object'); | ||
} | ||
export { generalDecrypt }; | ||
export default generalDecrypt; |
import parseJwk from './parse.js'; | ||
import isObject from '../lib/is_object.js'; | ||
import { JWSInvalid } from '../util/errors.js'; | ||
export default async function EmbeddedJWK(protectedHeader, token) { | ||
async function EmbeddedJWK(protectedHeader, token) { | ||
const joseHeader = { | ||
@@ -18,1 +18,3 @@ ...protectedHeader, | ||
} | ||
export { EmbeddedJWK }; | ||
export default EmbeddedJWK; |
import { encode as base64url } from '../runtime/base64url.js'; | ||
import asJWK from '../runtime/key_to_jwk.js'; | ||
export default async function fromKeyLike(key) { | ||
async function fromKeyLike(key) { | ||
if (key instanceof Uint8Array) { | ||
@@ -12,1 +12,3 @@ return { | ||
} | ||
export { fromKeyLike }; | ||
export default fromKeyLike; |
@@ -5,3 +5,3 @@ import { decode as base64url } from '../runtime/base64url.js'; | ||
import isObject from '../lib/is_object.js'; | ||
export default async function parseJwk(jwk, alg, octAsKeyObject) { | ||
async function parseJwk(jwk, alg, octAsKeyObject) { | ||
if (!isObject(jwk)) { | ||
@@ -35,1 +35,3 @@ throw new TypeError('JWK must be an object'); | ||
} | ||
export { parseJwk }; | ||
export default parseJwk; |
@@ -11,3 +11,3 @@ import { JOSENotSupported, JWKInvalid } from '../util/errors.js'; | ||
}; | ||
export default async function calculateThumbprint(jwk, digestAlgorithm = 'sha256') { | ||
async function calculateThumbprint(jwk, digestAlgorithm = 'sha256') { | ||
if (!isObject(jwk)) { | ||
@@ -44,1 +44,3 @@ throw new TypeError('JWK must be an object'); | ||
} | ||
export { calculateThumbprint }; | ||
export default calculateThumbprint; |
@@ -122,5 +122,7 @@ import parseJWK from '../jwk/parse.js'; | ||
} | ||
export default function createRemoteJWKSet(url, options) { | ||
function createRemoteJWKSet(url, options) { | ||
const set = new RemoteJWKSet(url, options); | ||
return set.getKey.bind(set); | ||
} | ||
export { createRemoteJWKSet }; | ||
export default createRemoteJWKSet; |
import FlattenedSign from '../flattened/sign.js'; | ||
export default class CompactSign { | ||
class CompactSign { | ||
constructor(payload) { | ||
@@ -18,1 +18,3 @@ this._flattened = new FlattenedSign(payload); | ||
} | ||
export { CompactSign }; | ||
export default CompactSign; |
import verify from '../flattened/verify.js'; | ||
import { JWSInvalid } from '../../util/errors.js'; | ||
import { decoder } from '../../lib/buffer_utils.js'; | ||
export default async function compactVerify(jws, key, options) { | ||
async function compactVerify(jws, key, options) { | ||
if (jws instanceof Uint8Array) { | ||
@@ -22,1 +22,3 @@ jws = decoder.decode(jws); | ||
} | ||
export { compactVerify }; | ||
export default compactVerify; |
@@ -9,3 +9,3 @@ import isDisjoint from '../../lib/is_disjoint.js'; | ||
const checkExtensions = validateCrit.bind(undefined, JWSInvalid, new Map([['b64', true]])); | ||
export default class FlattenedSign { | ||
class FlattenedSign { | ||
constructor(payload) { | ||
@@ -80,1 +80,3 @@ this._payload = payload; | ||
} | ||
export { FlattenedSign }; | ||
export default FlattenedSign; |
@@ -12,3 +12,3 @@ import { JOSEAlgNotAllowed, JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js'; | ||
const checkAlgOption = validateAlgorithms.bind(undefined, 'algorithms'); | ||
export default async function flattenedVerify(jws, key, options) { | ||
async function flattenedVerify(jws, key, options) { | ||
var _a; | ||
@@ -98,1 +98,3 @@ if (!isObject(jws)) { | ||
} | ||
export { flattenedVerify }; | ||
export default flattenedVerify; |
@@ -32,3 +32,3 @@ import FlattenedSign from '../flattened/sign.js'; | ||
} | ||
export default class GeneralSign { | ||
class GeneralSign { | ||
constructor(payload) { | ||
@@ -75,1 +75,3 @@ this._signatures = []; | ||
} | ||
export { GeneralSign }; | ||
export default GeneralSign; |
import verify from '../flattened/verify.js'; | ||
import { JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js'; | ||
import isObject from '../../lib/is_object.js'; | ||
export default async function generalVerify(jws, key, options) { | ||
async function generalVerify(jws, key, options) { | ||
if (!isObject(jws)) { | ||
@@ -25,1 +25,3 @@ throw new JWSInvalid('General JWS must be an object'); | ||
} | ||
export { generalVerify }; | ||
export default generalVerify; |
import decrypt from '../jwe/compact/decrypt.js'; | ||
import jwtPayload from '../lib/jwt_claims_set.js'; | ||
import { JWTClaimValidationFailed } from '../util/errors.js'; | ||
export default async function jwtDecrypt(jwt, key, options) { | ||
async function jwtDecrypt(jwt, key, options) { | ||
const decrypted = await decrypt(jwt, key, options); | ||
@@ -20,1 +20,3 @@ const payload = jwtPayload(decrypted.protectedHeader, decrypted.plaintext, options); | ||
} | ||
export { jwtDecrypt }; | ||
export default jwtDecrypt; |
import CompactEncrypt from '../jwe/compact/encrypt.js'; | ||
import { encoder } from '../lib/buffer_utils.js'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class EncryptJWT extends ProduceJWT { | ||
class EncryptJWT extends ProduceJWT { | ||
setProtectedHeader(protectedHeader) { | ||
@@ -69,1 +69,3 @@ if (this._protectedHeader) { | ||
} | ||
export { EncryptJWT }; | ||
export default EncryptJWT; |
@@ -5,3 +5,3 @@ import CompactSign from '../jws/compact/sign.js'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class SignJWT extends ProduceJWT { | ||
class SignJWT extends ProduceJWT { | ||
setProtectedHeader(protectedHeader) { | ||
@@ -21,1 +21,3 @@ this._protectedHeader = protectedHeader; | ||
} | ||
export { SignJWT }; | ||
export default SignJWT; |
@@ -6,3 +6,3 @@ import { decoder } from '../lib/buffer_utils.js'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class UnsecuredJWT extends ProduceJWT { | ||
class UnsecuredJWT extends ProduceJWT { | ||
encode() { | ||
@@ -34,1 +34,3 @@ const header = base64url.encode(JSON.stringify({ alg: 'none' })); | ||
} | ||
export { UnsecuredJWT }; | ||
export default UnsecuredJWT; |
import verify from '../jws/compact/verify.js'; | ||
import jwtPayload from '../lib/jwt_claims_set.js'; | ||
import { JWTInvalid } from '../util/errors.js'; | ||
export default async function jwtVerify(jwt, key, options) { | ||
async function jwtVerify(jwt, key, options) { | ||
var _a; | ||
@@ -13,1 +13,3 @@ const verified = await verify(jwt, key, options); | ||
} | ||
export { jwtVerify }; | ||
export default jwtVerify; |
@@ -5,3 +5,3 @@ import { ok as assert } from 'assert'; | ||
import isObject from '../lib/is_object.js'; | ||
export default function decodeProtectedHeader(token) { | ||
function decodeProtectedHeader(token) { | ||
let protectedB64u; | ||
@@ -33,1 +33,3 @@ if (typeof token === 'string') { | ||
} | ||
export { decodeProtectedHeader }; | ||
export default decodeProtectedHeader; |
import { generateKeyPair as generate } from '../runtime/generate.js'; | ||
export default async function generateKeyPair(alg, options) { | ||
async function generateKeyPair(alg, options) { | ||
return generate(alg, options); | ||
} | ||
export { generateKeyPair }; | ||
export default generateKeyPair; |
import { generateSecret as generate } from '../runtime/generate.js'; | ||
export default async function generateSecret(alg) { | ||
async function generateSecret(alg) { | ||
return generate(alg); | ||
} | ||
export { generateSecret }; | ||
export default generateSecret; |
import runtimeRandom from '../runtime/random.js'; | ||
const random = runtimeRandom; | ||
export { random }; | ||
export default random; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.compactDecrypt = void 0; | ||
const decrypt_js_1 = require("../flattened/decrypt.js"); | ||
@@ -26,2 +27,3 @@ const errors_js_1 = require("../../util/errors.js"); | ||
} | ||
exports.compactDecrypt = compactDecrypt; | ||
exports.default = compactDecrypt; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.CompactEncrypt = void 0; | ||
const encrypt_js_1 = require("../flattened/encrypt.js"); | ||
@@ -29,2 +30,3 @@ class CompactEncrypt { | ||
} | ||
exports.CompactEncrypt = CompactEncrypt; | ||
exports.default = CompactEncrypt; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.flattenedDecrypt = void 0; | ||
const errors_js_1 = require("../../util/errors.js"); | ||
@@ -134,2 +135,3 @@ const is_disjoint_js_1 = require("../../lib/is_disjoint.js"); | ||
} | ||
exports.flattenedDecrypt = flattenedDecrypt; | ||
exports.default = flattenedDecrypt; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.FlattenedEncrypt = void 0; | ||
const iv_js_1 = require("../../lib/iv.js"); | ||
@@ -167,2 +168,3 @@ const base64url_js_1 = require("../../runtime/base64url.js"); | ||
} | ||
exports.FlattenedEncrypt = FlattenedEncrypt; | ||
exports.default = FlattenedEncrypt; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.generalDecrypt = void 0; | ||
const decrypt_js_1 = require("../flattened/decrypt.js"); | ||
@@ -31,2 +32,3 @@ const errors_js_1 = require("../../util/errors.js"); | ||
} | ||
exports.generalDecrypt = generalDecrypt; | ||
exports.default = generalDecrypt; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.EmbeddedJWK = void 0; | ||
const parse_js_1 = require("./parse.js"); | ||
@@ -20,2 +21,3 @@ const is_object_js_1 = require("../lib/is_object.js"); | ||
} | ||
exports.EmbeddedJWK = EmbeddedJWK; | ||
exports.default = EmbeddedJWK; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.fromKeyLike = void 0; | ||
const base64url_js_1 = require("../runtime/base64url.js"); | ||
@@ -14,2 +15,3 @@ const key_to_jwk_js_1 = require("../runtime/key_to_jwk.js"); | ||
} | ||
exports.fromKeyLike = fromKeyLike; | ||
exports.default = fromKeyLike; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.parseJwk = void 0; | ||
const base64url_js_1 = require("../runtime/base64url.js"); | ||
@@ -36,2 +37,3 @@ const jwk_to_key_js_1 = require("../runtime/jwk_to_key.js"); | ||
} | ||
exports.parseJwk = parseJwk; | ||
exports.default = parseJwk; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.calculateThumbprint = void 0; | ||
const errors_js_1 = require("../util/errors.js"); | ||
@@ -45,2 +46,3 @@ const digest_js_1 = require("../runtime/digest.js"); | ||
} | ||
exports.calculateThumbprint = calculateThumbprint; | ||
exports.default = calculateThumbprint; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.createRemoteJWKSet = void 0; | ||
const parse_js_1 = require("../jwk/parse.js"); | ||
@@ -128,2 +129,3 @@ const errors_js_1 = require("../util/errors.js"); | ||
} | ||
exports.createRemoteJWKSet = createRemoteJWKSet; | ||
exports.default = createRemoteJWKSet; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.CompactSign = void 0; | ||
const sign_js_1 = require("../flattened/sign.js"); | ||
@@ -20,2 +21,3 @@ class CompactSign { | ||
} | ||
exports.CompactSign = CompactSign; | ||
exports.default = CompactSign; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.compactVerify = void 0; | ||
const verify_js_1 = require("../flattened/verify.js"); | ||
@@ -24,2 +25,3 @@ const errors_js_1 = require("../../util/errors.js"); | ||
} | ||
exports.compactVerify = compactVerify; | ||
exports.default = compactVerify; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.FlattenedSign = void 0; | ||
const is_disjoint_js_1 = require("../../lib/is_disjoint.js"); | ||
@@ -81,2 +82,3 @@ const errors_js_1 = require("../../util/errors.js"); | ||
} | ||
exports.FlattenedSign = FlattenedSign; | ||
exports.default = FlattenedSign; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.flattenedVerify = void 0; | ||
const errors_js_1 = require("../../util/errors.js"); | ||
@@ -99,2 +100,3 @@ const buffer_utils_js_1 = require("../../lib/buffer_utils.js"); | ||
} | ||
exports.flattenedVerify = flattenedVerify; | ||
exports.default = flattenedVerify; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.GeneralSign = void 0; | ||
const sign_js_1 = require("../flattened/sign.js"); | ||
@@ -76,2 +77,3 @@ const errors_js_1 = require("../../util/errors.js"); | ||
} | ||
exports.GeneralSign = GeneralSign; | ||
exports.default = GeneralSign; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.generalVerify = void 0; | ||
const verify_js_1 = require("../flattened/verify.js"); | ||
@@ -27,2 +28,3 @@ const errors_js_1 = require("../../util/errors.js"); | ||
} | ||
exports.generalVerify = generalVerify; | ||
exports.default = generalVerify; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.jwtDecrypt = void 0; | ||
const decrypt_js_1 = require("../jwe/compact/decrypt.js"); | ||
@@ -22,2 +23,3 @@ const jwt_claims_set_js_1 = require("../lib/jwt_claims_set.js"); | ||
} | ||
exports.jwtDecrypt = jwtDecrypt; | ||
exports.default = jwtDecrypt; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.EncryptJWT = void 0; | ||
const encrypt_js_1 = require("../jwe/compact/encrypt.js"); | ||
@@ -71,2 +72,3 @@ const buffer_utils_js_1 = require("../lib/buffer_utils.js"); | ||
} | ||
exports.EncryptJWT = EncryptJWT; | ||
exports.default = EncryptJWT; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.SignJWT = void 0; | ||
const sign_js_1 = require("../jws/compact/sign.js"); | ||
@@ -22,2 +23,3 @@ const errors_js_1 = require("../util/errors.js"); | ||
} | ||
exports.SignJWT = SignJWT; | ||
exports.default = SignJWT; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.UnsecuredJWT = void 0; | ||
const buffer_utils_js_1 = require("../lib/buffer_utils.js"); | ||
@@ -35,2 +36,3 @@ const base64url = require("../runtime/base64url.js"); | ||
} | ||
exports.UnsecuredJWT = UnsecuredJWT; | ||
exports.default = UnsecuredJWT; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.jwtVerify = void 0; | ||
const verify_js_1 = require("../jws/compact/verify.js"); | ||
@@ -15,2 +16,3 @@ const jwt_claims_set_js_1 = require("../lib/jwt_claims_set.js"); | ||
} | ||
exports.jwtVerify = jwtVerify; | ||
exports.default = jwtVerify; |
@@ -11,3 +11,3 @@ "use strict"; | ||
const generateIv = iv_js_1.default(random_js_1.default); | ||
exports.wrap = async (alg, key, cek, iv) => { | ||
const wrap = async (alg, key, cek, iv) => { | ||
const jweAlgorithm = alg.substr(0, 7); | ||
@@ -21,3 +21,4 @@ iv || (iv = generateIv(jweAlgorithm)); | ||
}; | ||
exports.unwrap = async (alg, key, encryptedKey, iv, tag) => { | ||
exports.wrap = wrap; | ||
const unwrap = async (alg, key, encryptedKey, iv, tag) => { | ||
const jweAlgorithm = alg.substr(0, 7); | ||
@@ -29,1 +30,2 @@ if (webcrypto_js_1.isCryptoKey(key)) { | ||
}; | ||
exports.unwrap = unwrap; |
@@ -14,3 +14,3 @@ "use strict"; | ||
} | ||
exports.wrap = async (alg, key, cek) => { | ||
const wrap = async (alg, key, cek) => { | ||
const size = parseInt(alg.substr(1, 3), 10); | ||
@@ -35,3 +35,4 @@ const algorithm = `aes${size}-wrap`; | ||
}; | ||
exports.unwrap = async (alg, key, encryptedKey) => { | ||
exports.wrap = wrap; | ||
const unwrap = async (alg, key, encryptedKey) => { | ||
const size = parseInt(alg.substr(1, 3), 10); | ||
@@ -56,1 +57,2 @@ const algorithm = `aes${size}-wrap`; | ||
}; | ||
exports.unwrap = unwrap; |
@@ -20,2 +20,3 @@ "use strict"; | ||
exports.encode = encodeImpl; | ||
exports.decode = (input) => Buffer.from(normalize(input), 'base64'); | ||
const decode = (input) => Buffer.from(normalize(input), 'base64'); | ||
exports.decode = decode; |
@@ -44,5 +44,6 @@ "use strict"; | ||
}; | ||
exports.setModulusLength = (keyObject, modulusLength) => { | ||
const setModulusLength = (keyObject, modulusLength) => { | ||
exports.weakMap.set(keyObject, modulusLength); | ||
}; | ||
exports.setModulusLength = setModulusLength; | ||
exports.default = (key, alg) => { | ||
@@ -49,0 +50,0 @@ if (getModulusLength(key) < 2048) { |
@@ -14,3 +14,3 @@ "use strict"; | ||
const concatKdf = buffer_utils_js_1.concatKdf.bind(undefined, digest_js_1.default.bind(undefined, 'sha256')); | ||
exports.deriveKey = async (publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) => { | ||
const deriveKey = async (publicKey, privateKey, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) => { | ||
const value = buffer_utils_js_1.concat(buffer_utils_js_1.lengthAndInput(buffer_utils_js_1.encoder.encode(algorithm)), buffer_utils_js_1.lengthAndInput(apu), buffer_utils_js_1.lengthAndInput(apv), buffer_utils_js_1.uint32be(keyLength)); | ||
@@ -26,3 +26,4 @@ if (webcrypto_js_1.isCryptoKey(publicKey)) { | ||
}; | ||
exports.ephemeralKeyToPublicJWK = function ephemeralKeyToPublicJWK(key) { | ||
exports.deriveKey = deriveKey; | ||
const ephemeralKeyToPublicJWK = function ephemeralKeyToPublicJWK(key) { | ||
if (webcrypto_js_1.isCryptoKey(key)) { | ||
@@ -53,3 +54,4 @@ key = webcrypto_js_1.getKeyObject(key); | ||
}; | ||
exports.generateEpk = async (key) => { | ||
exports.ephemeralKeyToPublicJWK = ephemeralKeyToPublicJWK; | ||
const generateEpk = async (key) => { | ||
if (webcrypto_js_1.isCryptoKey(key)) { | ||
@@ -72,3 +74,4 @@ key = webcrypto_js_1.getKeyObject(key); | ||
}; | ||
exports.publicJwkToEphemeralKey = async (jwk) => { | ||
exports.generateEpk = generateEpk; | ||
const publicJwkToEphemeralKey = async (jwk) => { | ||
let pem; | ||
@@ -114,3 +117,5 @@ switch (jwk.crv) { | ||
}; | ||
exports.publicJwkToEphemeralKey = publicJwkToEphemeralKey; | ||
const curves = ['P-256', 'P-384', 'P-521', 'X25519', 'X448']; | ||
exports.ecdhAllowed = (key) => curves.includes(get_named_curve_js_1.default(key)); | ||
const ecdhAllowed = (key) => curves.includes(get_named_curve_js_1.default(key)); | ||
exports.ecdhAllowed = ecdhAllowed; |
@@ -13,3 +13,3 @@ "use strict"; | ||
const pbkdf2 = util_1.promisify(crypto_1.pbkdf2); | ||
exports.encrypt = async (alg, key, cek, p2c = Math.floor(Math.random() * 2049) + 2048, p2s = random_js_1.default(new Uint8Array(16))) => { | ||
const encrypt = async (alg, key, cek, p2c = Math.floor(Math.random() * 2049) + 2048, p2s = random_js_1.default(new Uint8Array(16))) => { | ||
check_p2s_js_1.default(p2s); | ||
@@ -32,3 +32,4 @@ const salt = buffer_utils_js_1.p2s(alg, p2s); | ||
}; | ||
exports.decrypt = async (alg, key, encryptedKey, p2c, p2s) => { | ||
exports.encrypt = encrypt; | ||
const decrypt = async (alg, key, encryptedKey, p2c, p2s) => { | ||
check_p2s_js_1.default(p2s); | ||
@@ -50,1 +51,2 @@ const salt = buffer_utils_js_1.p2s(alg, p2s); | ||
}; | ||
exports.decrypt = decrypt; |
@@ -40,3 +40,3 @@ "use strict"; | ||
}; | ||
exports.encrypt = async (alg, key, cek) => { | ||
const encrypt = async (alg, key, cek) => { | ||
const padding = resolvePadding(alg); | ||
@@ -50,3 +50,4 @@ const oaepHash = resolveOaepHash(alg); | ||
}; | ||
exports.decrypt = async (alg, key, encryptedKey) => { | ||
exports.encrypt = encrypt; | ||
const decrypt = async (alg, key, encryptedKey) => { | ||
const padding = resolvePadding(alg); | ||
@@ -60,1 +61,2 @@ const oaepHash = resolveOaepHash(alg); | ||
}; | ||
exports.decrypt = decrypt; |
@@ -8,3 +8,5 @@ "use strict"; | ||
const deflateRaw = util_1.promisify(zlib_1.deflateRaw); | ||
exports.inflate = (input) => inflateRaw(input); | ||
exports.deflate = (input) => deflateRaw(input); | ||
const inflate = (input) => inflateRaw(input); | ||
exports.inflate = inflate; | ||
const deflate = (input) => deflateRaw(input); | ||
exports.deflate = deflate; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.decodeProtectedHeader = void 0; | ||
const assert_1 = require("assert"); | ||
@@ -34,2 +35,3 @@ const base64url_js_1 = require("./base64url.js"); | ||
} | ||
exports.decodeProtectedHeader = decodeProtectedHeader; | ||
exports.default = decodeProtectedHeader; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.generateKeyPair = void 0; | ||
const generate_js_1 = require("../runtime/generate.js"); | ||
@@ -7,2 +8,3 @@ async function generateKeyPair(alg, options) { | ||
} | ||
exports.generateKeyPair = generateKeyPair; | ||
exports.default = generateKeyPair; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.generateSecret = void 0; | ||
const generate_js_1 = require("../runtime/generate.js"); | ||
@@ -7,2 +8,3 @@ async function generateSecret(alg) { | ||
} | ||
exports.generateSecret = generateSecret; | ||
exports.default = generateSecret; |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
exports.random = void 0; | ||
const random_js_1 = require("../runtime/random.js"); | ||
const random = random_js_1.default; | ||
exports.random = random; | ||
exports.default = random; |
import decrypt from '../flattened/decrypt.js'; | ||
import { JWEInvalid } from '../../util/errors.js'; | ||
import { decoder } from '../../lib/buffer_utils.js'; | ||
export default async function compactDecrypt(jwe, key, options) { | ||
async function compactDecrypt(jwe, key, options) { | ||
if (jwe instanceof Uint8Array) { | ||
@@ -24,1 +24,3 @@ jwe = decoder.decode(jwe); | ||
} | ||
export { compactDecrypt }; | ||
export default compactDecrypt; |
import FlattenedEncrypt from '../flattened/encrypt.js'; | ||
export default class CompactEncrypt { | ||
class CompactEncrypt { | ||
constructor(plaintext) { | ||
@@ -27,1 +27,3 @@ this._flattened = new FlattenedEncrypt(plaintext); | ||
} | ||
export { CompactEncrypt }; | ||
export default CompactEncrypt; |
@@ -17,3 +17,3 @@ import { JOSEAlgNotAllowed, JOSENotSupported, JWEInvalid } from '../../util/errors.js'; | ||
const checkEncOption = validateAlgorithms.bind(undefined, 'contentEncryptionAlgorithms'); | ||
export default async function flattenedDecrypt(jwe, key, options) { | ||
async function flattenedDecrypt(jwe, key, options) { | ||
var _a; | ||
@@ -133,1 +133,3 @@ if (!isObject(jwe)) { | ||
} | ||
export { flattenedDecrypt }; | ||
export default flattenedDecrypt; |
@@ -13,3 +13,3 @@ import ivFactory from '../../lib/iv.js'; | ||
const checkExtensions = validateCrit.bind(undefined, JWEInvalid, new Map()); | ||
export default class FlattenedEncrypt { | ||
class FlattenedEncrypt { | ||
constructor(plaintext) { | ||
@@ -166,1 +166,3 @@ this._plaintext = plaintext; | ||
} | ||
export { FlattenedEncrypt }; | ||
export default FlattenedEncrypt; |
import decrypt from '../flattened/decrypt.js'; | ||
import { JWEDecryptionFailed, JWEInvalid } from '../../util/errors.js'; | ||
import isObject from '../../lib/is_object.js'; | ||
export default async function generalDecrypt(jwe, key, options) { | ||
async function generalDecrypt(jwe, key, options) { | ||
if (!isObject(jwe)) { | ||
@@ -29,1 +29,3 @@ throw new JWEInvalid('General JWE must be an object'); | ||
} | ||
export { generalDecrypt }; | ||
export default generalDecrypt; |
import parseJwk from './parse.js'; | ||
import isObject from '../lib/is_object.js'; | ||
import { JWSInvalid } from '../util/errors.js'; | ||
export default async function EmbeddedJWK(protectedHeader, token) { | ||
async function EmbeddedJWK(protectedHeader, token) { | ||
const joseHeader = { | ||
@@ -18,1 +18,3 @@ ...protectedHeader, | ||
} | ||
export { EmbeddedJWK }; | ||
export default EmbeddedJWK; |
import { encode as base64url } from '../runtime/base64url.js'; | ||
import asJWK from '../runtime/key_to_jwk.js'; | ||
export default async function fromKeyLike(key) { | ||
async function fromKeyLike(key) { | ||
if (key instanceof Uint8Array) { | ||
@@ -12,1 +12,3 @@ return { | ||
} | ||
export { fromKeyLike }; | ||
export default fromKeyLike; |
@@ -5,3 +5,3 @@ import { decode as base64url } from '../runtime/base64url.js'; | ||
import isObject from '../lib/is_object.js'; | ||
export default async function parseJwk(jwk, alg, octAsKeyObject) { | ||
async function parseJwk(jwk, alg, octAsKeyObject) { | ||
if (!isObject(jwk)) { | ||
@@ -35,1 +35,3 @@ throw new TypeError('JWK must be an object'); | ||
} | ||
export { parseJwk }; | ||
export default parseJwk; |
@@ -11,3 +11,3 @@ import { JOSENotSupported, JWKInvalid } from '../util/errors.js'; | ||
}; | ||
export default async function calculateThumbprint(jwk, digestAlgorithm = 'sha256') { | ||
async function calculateThumbprint(jwk, digestAlgorithm = 'sha256') { | ||
if (!isObject(jwk)) { | ||
@@ -44,1 +44,3 @@ throw new TypeError('JWK must be an object'); | ||
} | ||
export { calculateThumbprint }; | ||
export default calculateThumbprint; |
@@ -122,5 +122,7 @@ import parseJWK from '../jwk/parse.js'; | ||
} | ||
export default function createRemoteJWKSet(url, options) { | ||
function createRemoteJWKSet(url, options) { | ||
const set = new RemoteJWKSet(url, options); | ||
return set.getKey.bind(set); | ||
} | ||
export { createRemoteJWKSet }; | ||
export default createRemoteJWKSet; |
import FlattenedSign from '../flattened/sign.js'; | ||
export default class CompactSign { | ||
class CompactSign { | ||
constructor(payload) { | ||
@@ -18,1 +18,3 @@ this._flattened = new FlattenedSign(payload); | ||
} | ||
export { CompactSign }; | ||
export default CompactSign; |
import verify from '../flattened/verify.js'; | ||
import { JWSInvalid } from '../../util/errors.js'; | ||
import { decoder } from '../../lib/buffer_utils.js'; | ||
export default async function compactVerify(jws, key, options) { | ||
async function compactVerify(jws, key, options) { | ||
if (jws instanceof Uint8Array) { | ||
@@ -22,1 +22,3 @@ jws = decoder.decode(jws); | ||
} | ||
export { compactVerify }; | ||
export default compactVerify; |
@@ -9,3 +9,3 @@ import isDisjoint from '../../lib/is_disjoint.js'; | ||
const checkExtensions = validateCrit.bind(undefined, JWSInvalid, new Map([['b64', true]])); | ||
export default class FlattenedSign { | ||
class FlattenedSign { | ||
constructor(payload) { | ||
@@ -80,1 +80,3 @@ this._payload = payload; | ||
} | ||
export { FlattenedSign }; | ||
export default FlattenedSign; |
@@ -12,3 +12,3 @@ import { JOSEAlgNotAllowed, JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js'; | ||
const checkAlgOption = validateAlgorithms.bind(undefined, 'algorithms'); | ||
export default async function flattenedVerify(jws, key, options) { | ||
async function flattenedVerify(jws, key, options) { | ||
var _a; | ||
@@ -98,1 +98,3 @@ if (!isObject(jws)) { | ||
} | ||
export { flattenedVerify }; | ||
export default flattenedVerify; |
@@ -32,3 +32,3 @@ import FlattenedSign from '../flattened/sign.js'; | ||
} | ||
export default class GeneralSign { | ||
class GeneralSign { | ||
constructor(payload) { | ||
@@ -75,1 +75,3 @@ this._signatures = []; | ||
} | ||
export { GeneralSign }; | ||
export default GeneralSign; |
import verify from '../flattened/verify.js'; | ||
import { JWSInvalid, JWSSignatureVerificationFailed } from '../../util/errors.js'; | ||
import isObject from '../../lib/is_object.js'; | ||
export default async function generalVerify(jws, key, options) { | ||
async function generalVerify(jws, key, options) { | ||
if (!isObject(jws)) { | ||
@@ -25,1 +25,3 @@ throw new JWSInvalid('General JWS must be an object'); | ||
} | ||
export { generalVerify }; | ||
export default generalVerify; |
import decrypt from '../jwe/compact/decrypt.js'; | ||
import jwtPayload from '../lib/jwt_claims_set.js'; | ||
import { JWTClaimValidationFailed } from '../util/errors.js'; | ||
export default async function jwtDecrypt(jwt, key, options) { | ||
async function jwtDecrypt(jwt, key, options) { | ||
const decrypted = await decrypt(jwt, key, options); | ||
@@ -20,1 +20,3 @@ const payload = jwtPayload(decrypted.protectedHeader, decrypted.plaintext, options); | ||
} | ||
export { jwtDecrypt }; | ||
export default jwtDecrypt; |
import CompactEncrypt from '../jwe/compact/encrypt.js'; | ||
import { encoder } from '../lib/buffer_utils.js'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class EncryptJWT extends ProduceJWT { | ||
class EncryptJWT extends ProduceJWT { | ||
setProtectedHeader(protectedHeader) { | ||
@@ -69,1 +69,3 @@ if (this._protectedHeader) { | ||
} | ||
export { EncryptJWT }; | ||
export default EncryptJWT; |
@@ -5,3 +5,3 @@ import CompactSign from '../jws/compact/sign.js'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class SignJWT extends ProduceJWT { | ||
class SignJWT extends ProduceJWT { | ||
setProtectedHeader(protectedHeader) { | ||
@@ -21,1 +21,3 @@ this._protectedHeader = protectedHeader; | ||
} | ||
export { SignJWT }; | ||
export default SignJWT; |
@@ -6,3 +6,3 @@ import { decoder } from '../lib/buffer_utils.js'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class UnsecuredJWT extends ProduceJWT { | ||
class UnsecuredJWT extends ProduceJWT { | ||
encode() { | ||
@@ -34,1 +34,3 @@ const header = base64url.encode(JSON.stringify({ alg: 'none' })); | ||
} | ||
export { UnsecuredJWT }; | ||
export default UnsecuredJWT; |
import verify from '../jws/compact/verify.js'; | ||
import jwtPayload from '../lib/jwt_claims_set.js'; | ||
import { JWTInvalid } from '../util/errors.js'; | ||
export default async function jwtVerify(jwt, key, options) { | ||
async function jwtVerify(jwt, key, options) { | ||
var _a; | ||
@@ -13,1 +13,3 @@ const verified = await verify(jwt, key, options); | ||
} | ||
export { jwtVerify }; | ||
export default jwtVerify; |
@@ -5,3 +5,3 @@ import { ok as assert } from 'assert'; | ||
import isObject from '../lib/is_object.js'; | ||
export default function decodeProtectedHeader(token) { | ||
function decodeProtectedHeader(token) { | ||
let protectedB64u; | ||
@@ -33,1 +33,3 @@ if (typeof token === 'string') { | ||
} | ||
export { decodeProtectedHeader }; | ||
export default decodeProtectedHeader; |
import { generateKeyPair as generate } from '../runtime/generate.js'; | ||
export default async function generateKeyPair(alg, options) { | ||
async function generateKeyPair(alg, options) { | ||
return generate(alg, options); | ||
} | ||
export { generateKeyPair }; | ||
export default generateKeyPair; |
import { generateSecret as generate } from '../runtime/generate.js'; | ||
export default async function generateSecret(alg) { | ||
async function generateSecret(alg) { | ||
return generate(alg); | ||
} | ||
export { generateSecret }; | ||
export default generateSecret; |
import runtimeRandom from '../runtime/random.js'; | ||
const random = runtimeRandom; | ||
export { random }; | ||
export default random; |
import type { KeyLike, DecryptOptions, JWEHeaderParameters, GetKeyFunction, FlattenedJWE, CompactDecryptResult } from '../../types.d'; | ||
export interface CompactDecryptGetKey extends GetKeyFunction<JWEHeaderParameters, FlattenedJWE> { | ||
} | ||
export default function compactDecrypt(jwe: string | Uint8Array, key: KeyLike | CompactDecryptGetKey, options?: DecryptOptions): Promise<CompactDecryptResult>; | ||
declare function compactDecrypt(jwe: string | Uint8Array, key: KeyLike | CompactDecryptGetKey, options?: DecryptOptions): Promise<CompactDecryptResult>; | ||
export { compactDecrypt }; | ||
export default compactDecrypt; | ||
export type { KeyLike, DecryptOptions }; |
import type { KeyLike, JWEKeyManagementHeaderParameters, JWEHeaderParameters, EncryptOptions } from '../../types.d'; | ||
export default class CompactEncrypt { | ||
declare class CompactEncrypt { | ||
private _flattened; | ||
@@ -11,2 +11,4 @@ constructor(plaintext: Uint8Array); | ||
} | ||
export { CompactEncrypt }; | ||
export default CompactEncrypt; | ||
export type { KeyLike, JWEKeyManagementHeaderParameters, JWEHeaderParameters }; |
import type { FlattenedDecryptResult, KeyLike, FlattenedJWE, JWEHeaderParameters, DecryptOptions, GetKeyFunction } from '../../types.d'; | ||
export interface FlattenedDecryptGetKey extends GetKeyFunction<JWEHeaderParameters | undefined, FlattenedJWE> { | ||
} | ||
export default function flattenedDecrypt(jwe: FlattenedJWE, key: KeyLike | FlattenedDecryptGetKey, options?: DecryptOptions): Promise<FlattenedDecryptResult>; | ||
declare function flattenedDecrypt(jwe: FlattenedJWE, key: KeyLike | FlattenedDecryptGetKey, options?: DecryptOptions): Promise<FlattenedDecryptResult>; | ||
export { flattenedDecrypt }; | ||
export default flattenedDecrypt; | ||
export type { KeyLike, FlattenedJWE, JWEHeaderParameters, DecryptOptions }; |
import type { KeyLike, FlattenedJWE, JWEHeaderParameters, JWEKeyManagementHeaderParameters, EncryptOptions } from '../../types.d'; | ||
export default class FlattenedEncrypt { | ||
declare class FlattenedEncrypt { | ||
private _plaintext; | ||
@@ -21,2 +21,4 @@ private _protectedHeader; | ||
} | ||
export { FlattenedEncrypt }; | ||
export default FlattenedEncrypt; | ||
export type { KeyLike, FlattenedJWE, JWEHeaderParameters, JWEKeyManagementHeaderParameters }; |
import type { KeyLike, DecryptOptions, JWEHeaderParameters, GetKeyFunction, FlattenedJWE, GeneralJWE, GeneralDecryptResult } from '../../types.d'; | ||
export interface GeneralDecryptGetKey extends GetKeyFunction<JWEHeaderParameters, FlattenedJWE> { | ||
} | ||
export default function generalDecrypt(jwe: GeneralJWE, key: KeyLike | GeneralDecryptGetKey, options?: DecryptOptions): Promise<GeneralDecryptResult>; | ||
declare function generalDecrypt(jwe: GeneralJWE, key: KeyLike | GeneralDecryptGetKey, options?: DecryptOptions): Promise<GeneralDecryptResult>; | ||
export { generalDecrypt }; | ||
export default generalDecrypt; | ||
export type { KeyLike, GeneralJWE, DecryptOptions }; |
/// <reference types="node" /> | ||
import type { KeyObject } from 'crypto'; | ||
import type { FlattenedJWSInput, JWSHeaderParameters } from '../types.d'; | ||
export default function EmbeddedJWK(protectedHeader: JWSHeaderParameters, token: FlattenedJWSInput): Promise<CryptoKey | KeyObject>; | ||
declare function EmbeddedJWK(protectedHeader: JWSHeaderParameters, token: FlattenedJWSInput): Promise<CryptoKey | KeyObject>; | ||
export { EmbeddedJWK }; | ||
export default EmbeddedJWK; |
import type { JWK, KeyLike } from '../types.d'; | ||
export default function fromKeyLike(key: KeyLike): Promise<JWK>; | ||
declare function fromKeyLike(key: KeyLike): Promise<JWK>; | ||
export { fromKeyLike }; | ||
export default fromKeyLike; | ||
export type { KeyLike, JWK }; |
import type { JWK, KeyLike } from '../types.d'; | ||
export default function parseJwk(jwk: JWK, alg?: string, octAsKeyObject?: boolean): Promise<KeyLike>; | ||
declare function parseJwk(jwk: JWK, alg?: string, octAsKeyObject?: boolean): Promise<KeyLike>; | ||
export { parseJwk }; | ||
export default parseJwk; | ||
export type { KeyLike, JWK }; |
import type { JWK } from '../types.d'; | ||
export default function calculateThumbprint(jwk: JWK, digestAlgorithm?: 'sha256' | 'sha384' | 'sha512'): Promise<string>; | ||
declare function calculateThumbprint(jwk: JWK, digestAlgorithm?: 'sha256' | 'sha384' | 'sha512'): Promise<string>; | ||
export { calculateThumbprint }; | ||
export default calculateThumbprint; | ||
export type { JWK }; |
@@ -10,2 +10,4 @@ /// <reference types="node" /> | ||
} | ||
export default function createRemoteJWKSet(url: URL, options?: RemoteJWKSetOptions): GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput>; | ||
declare function createRemoteJWKSet(url: URL, options?: RemoteJWKSetOptions): GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput>; | ||
export { createRemoteJWKSet }; | ||
export default createRemoteJWKSet; |
import type { JWSHeaderParameters, KeyLike, SignOptions } from '../../types.d'; | ||
export default class CompactSign { | ||
declare class CompactSign { | ||
private _flattened; | ||
@@ -8,2 +8,4 @@ constructor(payload: Uint8Array); | ||
} | ||
export { CompactSign }; | ||
export default CompactSign; | ||
export type { JWSHeaderParameters, KeyLike }; |
import type { CompactVerifyResult, FlattenedJWSInput, GetKeyFunction, JWSHeaderParameters, KeyLike, VerifyOptions } from '../../types.d'; | ||
export interface CompactVerifyGetKey extends GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput> { | ||
} | ||
export default function compactVerify(jws: string | Uint8Array, key: KeyLike | CompactVerifyGetKey, options?: VerifyOptions): Promise<CompactVerifyResult>; | ||
declare function compactVerify(jws: string | Uint8Array, key: KeyLike | CompactVerifyGetKey, options?: VerifyOptions): Promise<CompactVerifyResult>; | ||
export { compactVerify }; | ||
export default compactVerify; | ||
export type { KeyLike, VerifyOptions }; |
import type { KeyLike, FlattenedJWS, JWSHeaderParameters, SignOptions } from '../../types.d'; | ||
export default class FlattenedSign { | ||
declare class FlattenedSign { | ||
private _payload; | ||
@@ -11,2 +11,4 @@ private _protectedHeader; | ||
} | ||
export { FlattenedSign }; | ||
export default FlattenedSign; | ||
export type { KeyLike, FlattenedJWS, JWSHeaderParameters }; |
import type { FlattenedVerifyResult, KeyLike, FlattenedJWSInput, JWSHeaderParameters, VerifyOptions, GetKeyFunction } from '../../types.d'; | ||
export interface FlattenedVerifyGetKey extends GetKeyFunction<JWSHeaderParameters | undefined, FlattenedJWSInput> { | ||
} | ||
export default function flattenedVerify(jws: FlattenedJWSInput, key: KeyLike | FlattenedVerifyGetKey, options?: VerifyOptions): Promise<FlattenedVerifyResult>; | ||
declare function flattenedVerify(jws: FlattenedJWSInput, key: KeyLike | FlattenedVerifyGetKey, options?: VerifyOptions): Promise<FlattenedVerifyResult>; | ||
export { flattenedVerify }; | ||
export default flattenedVerify; | ||
export type { KeyLike, FlattenedJWSInput, GetKeyFunction, JWSHeaderParameters, VerifyOptions }; |
@@ -6,3 +6,3 @@ import type { KeyLike, GeneralJWS, JWSHeaderParameters, SignOptions } from '../../types.d'; | ||
} | ||
export default class GeneralSign { | ||
declare class GeneralSign { | ||
private _payload; | ||
@@ -14,2 +14,4 @@ private _signatures; | ||
} | ||
export { GeneralSign }; | ||
export default GeneralSign; | ||
export type { KeyLike, GeneralJWS, JWSHeaderParameters }; |
import type { GeneralJWSInput, GeneralVerifyResult, FlattenedJWSInput, GetKeyFunction, JWSHeaderParameters, KeyLike, VerifyOptions } from '../../types.d'; | ||
export interface GeneralVerifyGetKey extends GetKeyFunction<JWSHeaderParameters, FlattenedJWSInput> { | ||
} | ||
export default function generalVerify(jws: GeneralJWSInput, key: KeyLike | GeneralVerifyGetKey, options?: VerifyOptions): Promise<GeneralVerifyResult>; | ||
declare function generalVerify(jws: GeneralJWSInput, key: KeyLike | GeneralVerifyGetKey, options?: VerifyOptions): Promise<GeneralVerifyResult>; | ||
export { generalVerify }; | ||
export default generalVerify; | ||
export type { KeyLike, GeneralJWSInput, VerifyOptions }; |
@@ -6,3 +6,5 @@ import type { KeyLike, DecryptOptions, JWTPayload, JWTClaimVerificationOptions, GetKeyFunction, JWEHeaderParameters, FlattenedJWE, JWTDecryptResult } from '../types.d'; | ||
} | ||
export default function jwtDecrypt(jwt: string | Uint8Array, key: KeyLike | JWTDecryptGetKey, options?: JWTDecryptOptions): Promise<JWTDecryptResult>; | ||
declare function jwtDecrypt(jwt: string | Uint8Array, key: KeyLike | JWTDecryptGetKey, options?: JWTDecryptOptions): Promise<JWTDecryptResult>; | ||
export { jwtDecrypt }; | ||
export default jwtDecrypt; | ||
export type { KeyLike, DecryptOptions, JWTPayload, JWTDecryptOptions }; |
import type { EncryptOptions, JWEHeaderParameters, JWEKeyManagementHeaderParameters, JWTPayload, KeyLike } from '../types.d'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class EncryptJWT extends ProduceJWT { | ||
declare class EncryptJWT extends ProduceJWT { | ||
private _cek; | ||
@@ -20,2 +20,4 @@ private _iv; | ||
} | ||
export { EncryptJWT }; | ||
export default EncryptJWT; | ||
export type { JWEHeaderParameters, JWTPayload, KeyLike }; |
import type { JWSHeaderParameters, JWTPayload, KeyLike, SignOptions } from '../types.d'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class SignJWT extends ProduceJWT { | ||
declare class SignJWT extends ProduceJWT { | ||
private _protectedHeader; | ||
@@ -8,2 +8,4 @@ setProtectedHeader(protectedHeader: JWSHeaderParameters): this; | ||
} | ||
export { SignJWT }; | ||
export default SignJWT; | ||
export type { JWSHeaderParameters, JWTPayload, KeyLike }; |
import type { JWSHeaderParameters, JWTClaimVerificationOptions, JWTPayload } from '../types.d'; | ||
import ProduceJWT from '../lib/jwt_producer.js'; | ||
export default class UnsecuredJWT extends ProduceJWT { | ||
declare class UnsecuredJWT extends ProduceJWT { | ||
encode(): string; | ||
@@ -10,2 +10,4 @@ static decode(jwt: string, options?: JWTClaimVerificationOptions): { | ||
} | ||
export { UnsecuredJWT }; | ||
export default UnsecuredJWT; | ||
export type { JWSHeaderParameters, JWTPayload }; |
@@ -6,3 +6,5 @@ import type { KeyLike, VerifyOptions, JWTPayload, JWTClaimVerificationOptions, JWSHeaderParameters, GetKeyFunction, FlattenedJWSInput, JWTVerifyResult } from '../types.d'; | ||
} | ||
export default function jwtVerify(jwt: string | Uint8Array, key: KeyLike | JWTVerifyGetKey, options?: JWTVerifyOptions): Promise<JWTVerifyResult>; | ||
declare function jwtVerify(jwt: string | Uint8Array, key: KeyLike | JWTVerifyGetKey, options?: JWTVerifyOptions): Promise<JWTVerifyResult>; | ||
export { jwtVerify }; | ||
export default jwtVerify; | ||
export type { KeyLike, JWTPayload, JWTVerifyOptions, JWSHeaderParameters, GetKeyFunction }; |
import type { JWSHeaderParameters, JWEHeaderParameters } from '../types.d'; | ||
export declare type ProtectedHeaderParameters = JWSHeaderParameters & JWEHeaderParameters; | ||
export default function decodeProtectedHeader(token: string | object): ProtectedHeaderParameters; | ||
declare function decodeProtectedHeader(token: string | object): ProtectedHeaderParameters; | ||
export { decodeProtectedHeader }; | ||
export default decodeProtectedHeader; |
@@ -6,5 +6,7 @@ import type { KeyLike } from '../types.js'; | ||
} | ||
export default function generateKeyPair(alg: string, options?: GenerateKeyPairOptions): Promise<{ | ||
declare function generateKeyPair(alg: string, options?: GenerateKeyPairOptions): Promise<{ | ||
privateKey: KeyLike; | ||
publicKey: KeyLike; | ||
}>; | ||
export { generateKeyPair }; | ||
export default generateKeyPair; |
import type { KeyLike } from '../types.d'; | ||
export default function generateSecret(alg: string): Promise<KeyLike>; | ||
declare function generateSecret(alg: string): Promise<KeyLike>; | ||
export { generateSecret }; | ||
export default generateSecret; |
@@ -5,2 +5,3 @@ interface GetRandomValuesFunction { | ||
declare const random: GetRandomValuesFunction; | ||
export { random }; | ||
export default random; |
{ | ||
"name": "jose", | ||
"version": "3.8.0", | ||
"version": "3.9.0", | ||
"description": "Universal 'JSON Web Almost Everything' - JWA, JWS, JWE, JWT, JWK with no dependencies", | ||
@@ -5,0 +5,0 @@ "keywords": [ |
@@ -57,27 +57,27 @@ # jose | ||
- JSON Web Tokens (JWT) | ||
- [Signing](docs/classes/_jwt_sign_.signjwt.md#readme) | ||
- [Verification & Claims Set Validation](docs/functions/_jwt_verify_.jwtverify.md#readme) | ||
- [Signing](docs/classes/jwt_sign.signjwt.md#readme) | ||
- [Verification & Claims Set Validation](docs/functions/jwt_verify.jwtverify.md#readme) | ||
- Encrypted JSON Web Tokens | ||
- [Encryption](docs/classes/_jwt_encrypt_.encryptjwt.md#readme) | ||
- [Decryption & Claims Set Validation](docs/functions/_jwt_decrypt_.jwtdecrypt.md#readme) | ||
- [Encryption](docs/classes/jwt_encrypt.encryptjwt.md#readme) | ||
- [Decryption & Claims Set Validation](docs/functions/jwt_decrypt.jwtdecrypt.md#readme) | ||
- JSON Web Encryption (JWE) | ||
- Encryption - [Compact](docs/classes/_jwe_compact_encrypt_.compactencrypt.md#readme), [Flattened](docs/classes/_jwe_flattened_encrypt_.flattenedencrypt.md#readme) | ||
- Decryption - [Compact](docs/functions/_jwe_compact_decrypt_.compactdecrypt.md#readme), [Flattened](docs/functions/_jwe_flattened_decrypt_.flatteneddecrypt.md#readme), [General](docs/functions/_jwe_general_decrypt_.generaldecrypt.md#readme) | ||
- Encryption - [Compact](docs/classes/jwe_compact_encrypt.compactencrypt.md#readme), [Flattened](docs/classes/jwe_flattened_encrypt.flattenedencrypt.md#readme) | ||
- Decryption - [Compact](docs/functions/jwe_compact_decrypt.compactdecrypt.md#readme), [Flattened](docs/functions/jwe_flattened_decrypt.flatteneddecrypt.md#readme), [General](docs/functions/jwe_general_decrypt.generaldecrypt.md#readme) | ||
- JSON Web Signature (JWS) | ||
- Signing - [Compact](docs/classes/_jws_compact_sign_.compactsign.md#readme), [Flattened](docs/classes/_jws_flattened_sign_.flattenedsign.md#readme), [General](docs/classes/_jws_general_sign_.generalsign.md#readme) | ||
- Verification - [Compact](docs/functions/_jws_compact_verify_.compactverify.md#readme), [Flattened](docs/functions/_jws_flattened_verify_.flattenedverify.md#readme), [General](docs/functions/_jws_general_verify_.generalverify.md#readme) | ||
- Signing - [Compact](docs/classes/jws_compact_sign.compactsign.md#readme), [Flattened](docs/classes/jws_flattened_sign.flattenedsign.md#readme), [General](docs/classes/jws_general_sign.generalsign.md#readme) | ||
- Verification - [Compact](docs/functions/jws_compact_verify.compactverify.md#readme), [Flattened](docs/functions/jws_flattened_verify.flattenedverify.md#readme), [General](docs/functions/jws_general_verify.generalverify.md#readme) | ||
- JSON Web Key (JWK) | ||
- [Parsing (JWK to KeyLike)](docs/functions/_jwk_parse_.parsejwk.md#readme) | ||
- [Conversion (KeyLike to JWK)](docs/functions/_jwk_from_key_like_.fromkeylike.md#readme) | ||
- [Thumbprints](docs/functions/_jwk_thumbprint_.calculatethumbprint.md#readme) | ||
- [EmbeddedJWK](docs/functions/_jwk_embedded_.embeddedjwk.md#readme) | ||
- [Parsing (JWK to KeyLike)](docs/functions/jwk_parse.parsejwk.md#readme) | ||
- [Conversion (KeyLike to JWK)](docs/functions/jwk_from_key_like.fromkeylike.md#readme) | ||
- [Thumbprints](docs/functions/jwk_thumbprint.calculatethumbprint.md#readme) | ||
- [EmbeddedJWK](docs/functions/jwk_embedded.embeddedjwk.md#readme) | ||
- JSON Web Key Set (JWKS) | ||
- [Verify using a remote JWKSet](docs/functions/_jwks_remote_.createremotejwkset.md#readme) | ||
- [Verify using a remote JWKSet](docs/functions/jwks_remote.createremotejwkset.md#readme) | ||
- Key Pair or Secret Generation (Generate KeyLike) | ||
- [Asymmetric Key Pair Generation](docs/functions/_util_generate_key_pair_.generatekeypair.md#readme) | ||
- [Symmetric Secret Generation](docs/functions/_util_generate_secret_.generatesecret.md#readme) | ||
- [Asymmetric Key Pair Generation](docs/functions/util_generate_key_pair.generatekeypair.md#readme) | ||
- [Symmetric Secret Generation](docs/functions/util_generate_secret.generatesecret.md#readme) | ||
- Utilities | ||
- [Decoding Token's Protected Header](docs/functions/_util_decode_protected_header_.decodeprotectedheader.md#readme) | ||
- [Unsecured JWT](docs/classes/_jwt_unsecured_.unsecuredjwt.md#readme) | ||
- [JOSE Errors](docs/modules/_util_errors_.md) | ||
- [Decoding Token's Protected Header](docs/functions/util_decode_protected_header.decodeprotectedheader.md#readme) | ||
- [Unsecured JWT](docs/classes/jwt_unsecured.unsecuredjwt.md#readme) | ||
- [JOSE Errors](docs/modules/util_errors.md) | ||
@@ -84,0 +84,0 @@ ## Examples |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
400921
9828