diff --git a/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto.d.ts b/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto.d.ts new file mode 100644 index 0000000..1804301 --- /dev/null +++ b/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto.d.ts @@ -0,0 +1,75 @@ +/* tslint:disable */ +/* eslint-disable */ +export function main(): void; +export function array_buffer_to_base64(buffer: Uint8Array): string; +export function base64_to_array_buffer(base64_str: string): Uint8Array; +export function hash_sha256(data: Uint8Array): Uint8Array; +export function hash_sha384(data: Uint8Array): Uint8Array; +export class EnhancedSecureCryptoUtils { + free(): void; + constructor(); + generate_secure_password(): string; + generate_salt(): Uint8Array; + encrypt_data(data: string, password: string): string; + decrypt_data(encrypted_data: string, password: string): string; + generate_ecdsa_keypair(): any; + sign_data(private_key_bytes: Uint8Array, data: string): Uint8Array; + verify_signature(public_key_bytes: Uint8Array, signature: Uint8Array, data: string): boolean; + calculate_key_fingerprint(key_data: Uint8Array): string; + generate_verification_code(): string; + generate_mutual_auth_challenge(): any; + sanitize_message(message: string): string; +} + +export type InitInput = RequestInfo | URL | Response | BufferSource | WebAssembly.Module; + +export interface InitOutput { + readonly memory: WebAssembly.Memory; + readonly main: () => void; + readonly __wbg_enhancedsecurecryptoutils_free: (a: number, b: number) => void; + readonly enhancedsecurecryptoutils_new: () => number; + readonly enhancedsecurecryptoutils_generate_secure_password: (a: number) => [number, number]; + readonly enhancedsecurecryptoutils_generate_salt: (a: number) => [number, number]; + readonly enhancedsecurecryptoutils_encrypt_data: (a: number, b: number, c: number, d: number, e: number) => [number, number, number, number]; + readonly enhancedsecurecryptoutils_decrypt_data: (a: number, b: number, c: number, d: number, e: number) => [number, number, number, number]; + readonly enhancedsecurecryptoutils_generate_ecdsa_keypair: (a: number) => [number, number, number]; + readonly enhancedsecurecryptoutils_sign_data: (a: number, b: number, c: number, d: number, e: number) => [number, number, number, number]; + readonly enhancedsecurecryptoutils_verify_signature: (a: number, b: number, c: number, d: number, e: number, f: number, g: number) => [number, number, number]; + readonly enhancedsecurecryptoutils_calculate_key_fingerprint: (a: number, b: number, c: number) => [number, number]; + readonly enhancedsecurecryptoutils_generate_verification_code: (a: number) => [number, number]; + readonly enhancedsecurecryptoutils_generate_mutual_auth_challenge: (a: number) => [number, number, number]; + readonly enhancedsecurecryptoutils_sanitize_message: (a: number, b: number, c: number) => [number, number, number, number]; + readonly array_buffer_to_base64: (a: number, b: number) => [number, number]; + readonly base64_to_array_buffer: (a: number, b: number) => [number, number, number, number]; + readonly hash_sha256: (a: number, b: number) => [number, number]; + readonly hash_sha384: (a: number, b: number) => [number, number]; + readonly __wbindgen_exn_store: (a: number) => void; + readonly __externref_table_alloc: () => number; + readonly __wbindgen_export_2: WebAssembly.Table; + readonly __wbindgen_free: (a: number, b: number, c: number) => void; + readonly __wbindgen_malloc: (a: number, b: number) => number; + readonly __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number; + readonly __externref_table_dealloc: (a: number) => void; + readonly __wbindgen_start: () => void; +} + +export type SyncInitInput = BufferSource | WebAssembly.Module; +/** +* Instantiates the given `module`, which can either be bytes or +* a precompiled `WebAssembly.Module`. +* +* @param {{ module: SyncInitInput }} module - Passing `SyncInitInput` directly is deprecated. +* +* @returns {InitOutput} +*/ +export function initSync(module: { module: SyncInitInput } | SyncInitInput): InitOutput; + +/** +* If `module_or_path` is {RequestInfo} or {URL}, makes a request and +* for everything else, calls `WebAssembly.instantiate` directly. +* +* @param {{ module_or_path: InitInput | Promise }} module_or_path - Passing `InitInput` directly is deprecated. +* +* @returns {Promise} +*/ +export default function __wbg_init (module_or_path?: { module_or_path: InitInput | Promise } | InitInput | Promise): Promise; diff --git a/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto.js b/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto.js new file mode 100644 index 0000000..af42cdc --- /dev/null +++ b/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto.js @@ -0,0 +1,677 @@ +import * as __wbg_star0 from 'env'; + +let wasm; + +function addToExternrefTable0(obj) { + const idx = wasm.__externref_table_alloc(); + wasm.__wbindgen_export_2.set(idx, obj); + return idx; +} + +function handleError(f, args) { + try { + return f.apply(this, args); + } catch (e) { + const idx = addToExternrefTable0(e); + wasm.__wbindgen_exn_store(idx); + } +} + +function logError(f, args) { + try { + return f.apply(this, args); + } catch (e) { + let error = (function () { + try { + return e instanceof Error ? `${e.message}\n\nStack:\n${e.stack}` : e.toString(); + } catch(_) { + return ""; + } + }()); + console.error("wasm-bindgen: imported JS function that was not marked as `catch` threw an error:", error); + throw e; + } +} + +const cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } ); + +if (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }; + +let cachedUint8ArrayMemory0 = null; + +function getUint8ArrayMemory0() { + if (cachedUint8ArrayMemory0 === null || cachedUint8ArrayMemory0.byteLength === 0) { + cachedUint8ArrayMemory0 = new Uint8Array(wasm.memory.buffer); + } + return cachedUint8ArrayMemory0; +} + +function getStringFromWasm0(ptr, len) { + ptr = ptr >>> 0; + return cachedTextDecoder.decode(getUint8ArrayMemory0().subarray(ptr, ptr + len)); +} + +function getArrayU8FromWasm0(ptr, len) { + ptr = ptr >>> 0; + return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len); +} + +function _assertBoolean(n) { + if (typeof(n) !== 'boolean') { + throw new Error(`expected a boolean argument, found ${typeof(n)}`); + } +} + +let WASM_VECTOR_LEN = 0; + +const cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } ); + +const encodeString = (typeof cachedTextEncoder.encodeInto === 'function' + ? function (arg, view) { + return cachedTextEncoder.encodeInto(arg, view); +} + : function (arg, view) { + const buf = cachedTextEncoder.encode(arg); + view.set(buf); + return { + read: arg.length, + written: buf.length + }; +}); + +function passStringToWasm0(arg, malloc, realloc) { + + if (typeof(arg) !== 'string') throw new Error(`expected a string argument, found ${typeof(arg)}`); + + if (realloc === undefined) { + const buf = cachedTextEncoder.encode(arg); + const ptr = malloc(buf.length, 1) >>> 0; + getUint8ArrayMemory0().subarray(ptr, ptr + buf.length).set(buf); + WASM_VECTOR_LEN = buf.length; + return ptr; + } + + let len = arg.length; + let ptr = malloc(len, 1) >>> 0; + + const mem = getUint8ArrayMemory0(); + + let offset = 0; + + for (; offset < len; offset++) { + const code = arg.charCodeAt(offset); + if (code > 0x7F) break; + mem[ptr + offset] = code; + } + + if (offset !== len) { + if (offset !== 0) { + arg = arg.slice(offset); + } + ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0; + const view = getUint8ArrayMemory0().subarray(ptr + offset, ptr + len); + const ret = encodeString(arg, view); + if (ret.read !== arg.length) throw new Error('failed to pass whole string'); + offset += ret.written; + ptr = realloc(ptr, len, offset, 1) >>> 0; + } + + WASM_VECTOR_LEN = offset; + return ptr; +} + +let cachedDataViewMemory0 = null; + +function getDataViewMemory0() { + if (cachedDataViewMemory0 === null || cachedDataViewMemory0.buffer.detached === true || (cachedDataViewMemory0.buffer.detached === undefined && cachedDataViewMemory0.buffer !== wasm.memory.buffer)) { + cachedDataViewMemory0 = new DataView(wasm.memory.buffer); + } + return cachedDataViewMemory0; +} + +function isLikeNone(x) { + return x === undefined || x === null; +} + +export function main() { + wasm.main(); +} + +function _assertNum(n) { + if (typeof(n) !== 'number') throw new Error(`expected a number argument, found ${typeof(n)}`); +} + +function takeFromExternrefTable0(idx) { + const value = wasm.__wbindgen_export_2.get(idx); + wasm.__externref_table_dealloc(idx); + return value; +} + +function passArray8ToWasm0(arg, malloc) { + const ptr = malloc(arg.length * 1, 1) >>> 0; + getUint8ArrayMemory0().set(arg, ptr / 1); + WASM_VECTOR_LEN = arg.length; + return ptr; +} +/** + * @param {Uint8Array} buffer + * @returns {string} + */ +export function array_buffer_to_base64(buffer) { + let deferred2_0; + let deferred2_1; + try { + const ptr0 = passArray8ToWasm0(buffer, wasm.__wbindgen_malloc); + const len0 = WASM_VECTOR_LEN; + const ret = wasm.array_buffer_to_base64(ptr0, len0); + deferred2_0 = ret[0]; + deferred2_1 = ret[1]; + return getStringFromWasm0(ret[0], ret[1]); + } finally { + wasm.__wbindgen_free(deferred2_0, deferred2_1, 1); + } +} + +/** + * @param {string} base64_str + * @returns {Uint8Array} + */ +export function base64_to_array_buffer(base64_str) { + const ptr0 = passStringToWasm0(base64_str, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len0 = WASM_VECTOR_LEN; + const ret = wasm.base64_to_array_buffer(ptr0, len0); + if (ret[3]) { + throw takeFromExternrefTable0(ret[2]); + } + var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice(); + wasm.__wbindgen_free(ret[0], ret[1] * 1, 1); + return v2; +} + +/** + * @param {Uint8Array} data + * @returns {Uint8Array} + */ +export function hash_sha256(data) { + const ptr0 = passArray8ToWasm0(data, wasm.__wbindgen_malloc); + const len0 = WASM_VECTOR_LEN; + const ret = wasm.hash_sha256(ptr0, len0); + var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice(); + wasm.__wbindgen_free(ret[0], ret[1] * 1, 1); + return v2; +} + +/** + * @param {Uint8Array} data + * @returns {Uint8Array} + */ +export function hash_sha384(data) { + const ptr0 = passArray8ToWasm0(data, wasm.__wbindgen_malloc); + const len0 = WASM_VECTOR_LEN; + const ret = wasm.hash_sha384(ptr0, len0); + var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice(); + wasm.__wbindgen_free(ret[0], ret[1] * 1, 1); + return v2; +} + +const EnhancedSecureCryptoUtilsFinalization = (typeof FinalizationRegistry === 'undefined') + ? { register: () => {}, unregister: () => {} } + : new FinalizationRegistry(ptr => wasm.__wbg_enhancedsecurecryptoutils_free(ptr >>> 0, 1)); + +export class EnhancedSecureCryptoUtils { + + __destroy_into_raw() { + const ptr = this.__wbg_ptr; + this.__wbg_ptr = 0; + EnhancedSecureCryptoUtilsFinalization.unregister(this); + return ptr; + } + + free() { + const ptr = this.__destroy_into_raw(); + wasm.__wbg_enhancedsecurecryptoutils_free(ptr, 0); + } + constructor() { + const ret = wasm.enhancedsecurecryptoutils_new(); + this.__wbg_ptr = ret >>> 0; + EnhancedSecureCryptoUtilsFinalization.register(this, this.__wbg_ptr, this); + return this; + } + /** + * @returns {string} + */ + generate_secure_password() { + let deferred1_0; + let deferred1_1; + try { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ret = wasm.enhancedsecurecryptoutils_generate_secure_password(this.__wbg_ptr); + deferred1_0 = ret[0]; + deferred1_1 = ret[1]; + return getStringFromWasm0(ret[0], ret[1]); + } finally { + wasm.__wbindgen_free(deferred1_0, deferred1_1, 1); + } + } + /** + * @returns {Uint8Array} + */ + generate_salt() { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ret = wasm.enhancedsecurecryptoutils_generate_salt(this.__wbg_ptr); + var v1 = getArrayU8FromWasm0(ret[0], ret[1]).slice(); + wasm.__wbindgen_free(ret[0], ret[1] * 1, 1); + return v1; + } + /** + * @param {string} data + * @param {string} password + * @returns {string} + */ + encrypt_data(data, password) { + let deferred4_0; + let deferred4_1; + try { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ptr0 = passStringToWasm0(data, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len0 = WASM_VECTOR_LEN; + const ptr1 = passStringToWasm0(password, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len1 = WASM_VECTOR_LEN; + const ret = wasm.enhancedsecurecryptoutils_encrypt_data(this.__wbg_ptr, ptr0, len0, ptr1, len1); + var ptr3 = ret[0]; + var len3 = ret[1]; + if (ret[3]) { + ptr3 = 0; len3 = 0; + throw takeFromExternrefTable0(ret[2]); + } + deferred4_0 = ptr3; + deferred4_1 = len3; + return getStringFromWasm0(ptr3, len3); + } finally { + wasm.__wbindgen_free(deferred4_0, deferred4_1, 1); + } + } + /** + * @param {string} encrypted_data + * @param {string} password + * @returns {string} + */ + decrypt_data(encrypted_data, password) { + let deferred4_0; + let deferred4_1; + try { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ptr0 = passStringToWasm0(encrypted_data, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len0 = WASM_VECTOR_LEN; + const ptr1 = passStringToWasm0(password, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len1 = WASM_VECTOR_LEN; + const ret = wasm.enhancedsecurecryptoutils_decrypt_data(this.__wbg_ptr, ptr0, len0, ptr1, len1); + var ptr3 = ret[0]; + var len3 = ret[1]; + if (ret[3]) { + ptr3 = 0; len3 = 0; + throw takeFromExternrefTable0(ret[2]); + } + deferred4_0 = ptr3; + deferred4_1 = len3; + return getStringFromWasm0(ptr3, len3); + } finally { + wasm.__wbindgen_free(deferred4_0, deferred4_1, 1); + } + } + /** + * @returns {any} + */ + generate_ecdsa_keypair() { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ret = wasm.enhancedsecurecryptoutils_generate_ecdsa_keypair(this.__wbg_ptr); + if (ret[2]) { + throw takeFromExternrefTable0(ret[1]); + } + return takeFromExternrefTable0(ret[0]); + } + /** + * @param {Uint8Array} private_key_bytes + * @param {string} data + * @returns {Uint8Array} + */ + sign_data(private_key_bytes, data) { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ptr0 = passArray8ToWasm0(private_key_bytes, wasm.__wbindgen_malloc); + const len0 = WASM_VECTOR_LEN; + const ptr1 = passStringToWasm0(data, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len1 = WASM_VECTOR_LEN; + const ret = wasm.enhancedsecurecryptoutils_sign_data(this.__wbg_ptr, ptr0, len0, ptr1, len1); + if (ret[3]) { + throw takeFromExternrefTable0(ret[2]); + } + var v3 = getArrayU8FromWasm0(ret[0], ret[1]).slice(); + wasm.__wbindgen_free(ret[0], ret[1] * 1, 1); + return v3; + } + /** + * @param {Uint8Array} public_key_bytes + * @param {Uint8Array} signature + * @param {string} data + * @returns {boolean} + */ + verify_signature(public_key_bytes, signature, data) { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ptr0 = passArray8ToWasm0(public_key_bytes, wasm.__wbindgen_malloc); + const len0 = WASM_VECTOR_LEN; + const ptr1 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc); + const len1 = WASM_VECTOR_LEN; + const ptr2 = passStringToWasm0(data, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len2 = WASM_VECTOR_LEN; + const ret = wasm.enhancedsecurecryptoutils_verify_signature(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2); + if (ret[2]) { + throw takeFromExternrefTable0(ret[1]); + } + return ret[0] !== 0; + } + /** + * @param {Uint8Array} key_data + * @returns {string} + */ + calculate_key_fingerprint(key_data) { + let deferred2_0; + let deferred2_1; + try { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ptr0 = passArray8ToWasm0(key_data, wasm.__wbindgen_malloc); + const len0 = WASM_VECTOR_LEN; + const ret = wasm.enhancedsecurecryptoutils_calculate_key_fingerprint(this.__wbg_ptr, ptr0, len0); + deferred2_0 = ret[0]; + deferred2_1 = ret[1]; + return getStringFromWasm0(ret[0], ret[1]); + } finally { + wasm.__wbindgen_free(deferred2_0, deferred2_1, 1); + } + } + /** + * @returns {string} + */ + generate_verification_code() { + let deferred1_0; + let deferred1_1; + try { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ret = wasm.enhancedsecurecryptoutils_generate_verification_code(this.__wbg_ptr); + deferred1_0 = ret[0]; + deferred1_1 = ret[1]; + return getStringFromWasm0(ret[0], ret[1]); + } finally { + wasm.__wbindgen_free(deferred1_0, deferred1_1, 1); + } + } + /** + * @returns {any} + */ + generate_mutual_auth_challenge() { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ret = wasm.enhancedsecurecryptoutils_generate_mutual_auth_challenge(this.__wbg_ptr); + if (ret[2]) { + throw takeFromExternrefTable0(ret[1]); + } + return takeFromExternrefTable0(ret[0]); + } + /** + * @param {string} message + * @returns {string} + */ + sanitize_message(message) { + let deferred3_0; + let deferred3_1; + try { + if (this.__wbg_ptr == 0) throw new Error('Attempt to use a moved value'); + _assertNum(this.__wbg_ptr); + const ptr0 = passStringToWasm0(message, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len0 = WASM_VECTOR_LEN; + const ret = wasm.enhancedsecurecryptoutils_sanitize_message(this.__wbg_ptr, ptr0, len0); + var ptr2 = ret[0]; + var len2 = ret[1]; + if (ret[3]) { + ptr2 = 0; len2 = 0; + throw takeFromExternrefTable0(ret[2]); + } + deferred3_0 = ptr2; + deferred3_1 = len2; + return getStringFromWasm0(ptr2, len2); + } finally { + wasm.__wbindgen_free(deferred3_0, deferred3_1, 1); + } + } +} + +async function __wbg_load(module, imports) { + if (typeof Response === 'function' && module instanceof Response) { + if (typeof WebAssembly.instantiateStreaming === 'function') { + try { + return await WebAssembly.instantiateStreaming(module, imports); + + } catch (e) { + if (module.headers.get('Content-Type') != 'application/wasm') { + console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve Wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n", e); + + } else { + throw e; + } + } + } + + const bytes = await module.arrayBuffer(); + return await WebAssembly.instantiate(bytes, imports); + + } else { + const instance = await WebAssembly.instantiate(module, imports); + + if (instance instanceof WebAssembly.Instance) { + return { instance, module }; + + } else { + return instance; + } + } +} + +function __wbg_get_imports() { + const imports = {}; + imports.wbg = {}; + imports.wbg.__wbg_call_672a4d21634d4a24 = function() { return handleError(function (arg0, arg1) { + const ret = arg0.call(arg1); + return ret; + }, arguments) }; + imports.wbg.__wbg_crypto_12576cd66246998b = function() { return handleError(function (arg0) { + const ret = arg0.crypto; + return ret; + }, arguments) }; + imports.wbg.__wbg_error_7534b8e9a36f1ab4 = function() { return logError(function (arg0, arg1) { + let deferred0_0; + let deferred0_1; + try { + deferred0_0 = arg0; + deferred0_1 = arg1; + console.error(getStringFromWasm0(arg0, arg1)); + } finally { + wasm.__wbindgen_free(deferred0_0, deferred0_1, 1); + } + }, arguments) }; + imports.wbg.__wbg_getRandomValues_5754b82ca6952f9b = function() { return handleError(function (arg0, arg1, arg2) { + const ret = arg0.getRandomValues(getArrayU8FromWasm0(arg1, arg2)); + return ret; + }, arguments) }; + imports.wbg.__wbg_instanceof_Window_def73ea0955fc569 = function() { return logError(function (arg0) { + let result; + try { + result = arg0 instanceof Window; + } catch (_) { + result = false; + } + const ret = result; + _assertBoolean(ret); + return ret; + }, arguments) }; + imports.wbg.__wbg_new_405e22f390576ce2 = function() { return logError(function () { + const ret = new Object(); + return ret; + }, arguments) }; + imports.wbg.__wbg_new_78feb108b6472713 = function() { return logError(function () { + const ret = new Array(); + return ret; + }, arguments) }; + imports.wbg.__wbg_new_8a6f238a6ece86ea = function() { return logError(function () { + const ret = new Error(); + return ret; + }, arguments) }; + imports.wbg.__wbg_newnoargs_105ed471475aaf50 = function() { return logError(function (arg0, arg1) { + const ret = new Function(getStringFromWasm0(arg0, arg1)); + return ret; + }, arguments) }; + imports.wbg.__wbg_set_37837023f3d740e8 = function() { return logError(function (arg0, arg1, arg2) { + arg0[arg1 >>> 0] = arg2; + }, arguments) }; + imports.wbg.__wbg_set_3fda3bac07393de4 = function() { return logError(function (arg0, arg1, arg2) { + arg0[arg1] = arg2; + }, arguments) }; + imports.wbg.__wbg_stack_0ed75d68575b0f3c = function() { return logError(function (arg0, arg1) { + const ret = arg1.stack; + const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc); + const len1 = WASM_VECTOR_LEN; + getDataViewMemory0().setInt32(arg0 + 4 * 1, len1, true); + getDataViewMemory0().setInt32(arg0 + 4 * 0, ptr1, true); + }, arguments) }; + imports.wbg.__wbg_static_accessor_GLOBAL_88a902d13a557d07 = function() { return logError(function () { + const ret = typeof global === 'undefined' ? null : global; + return isLikeNone(ret) ? 0 : addToExternrefTable0(ret); + }, arguments) }; + imports.wbg.__wbg_static_accessor_GLOBAL_THIS_56578be7e9f832b0 = function() { return logError(function () { + const ret = typeof globalThis === 'undefined' ? null : globalThis; + return isLikeNone(ret) ? 0 : addToExternrefTable0(ret); + }, arguments) }; + imports.wbg.__wbg_static_accessor_SELF_37c5d418e4bf5819 = function() { return logError(function () { + const ret = typeof self === 'undefined' ? null : self; + return isLikeNone(ret) ? 0 : addToExternrefTable0(ret); + }, arguments) }; + imports.wbg.__wbg_static_accessor_WINDOW_5de37043a91a9c40 = function() { return logError(function () { + const ret = typeof window === 'undefined' ? null : window; + return isLikeNone(ret) ? 0 : addToExternrefTable0(ret); + }, arguments) }; + imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) { + const ret = BigInt.asUintN(64, arg0); + return ret; + }; + imports.wbg.__wbindgen_error_new = function(arg0, arg1) { + const ret = new Error(getStringFromWasm0(arg0, arg1)); + return ret; + }; + imports.wbg.__wbindgen_init_externref_table = function() { + const table = wasm.__wbindgen_export_2; + const offset = table.grow(4); + table.set(0, undefined); + table.set(offset + 0, undefined); + table.set(offset + 1, null); + table.set(offset + 2, true); + table.set(offset + 3, false); + ; + }; + imports.wbg.__wbindgen_is_undefined = function(arg0) { + const ret = arg0 === undefined; + _assertBoolean(ret); + return ret; + }; + imports.wbg.__wbindgen_number_new = function(arg0) { + const ret = arg0; + return ret; + }; + imports.wbg.__wbindgen_string_new = function(arg0, arg1) { + const ret = getStringFromWasm0(arg0, arg1); + return ret; + }; + imports.wbg.__wbindgen_throw = function(arg0, arg1) { + throw new Error(getStringFromWasm0(arg0, arg1)); + }; + imports['env'] = __wbg_star0; + + return imports; +} + +function __wbg_init_memory(imports, memory) { + +} + +function __wbg_finalize_init(instance, module) { + wasm = instance.exports; + __wbg_init.__wbindgen_wasm_module = module; + cachedDataViewMemory0 = null; + cachedUint8ArrayMemory0 = null; + + + wasm.__wbindgen_start(); + return wasm; +} + +function initSync(module) { + if (wasm !== undefined) return wasm; + + + if (typeof module !== 'undefined') { + if (Object.getPrototypeOf(module) === Object.prototype) { + ({module} = module) + } else { + console.warn('using deprecated parameters for `initSync()`; pass a single object instead') + } + } + + const imports = __wbg_get_imports(); + + __wbg_init_memory(imports); + + if (!(module instanceof WebAssembly.Module)) { + module = new WebAssembly.Module(module); + } + + const instance = new WebAssembly.Instance(module, imports); + + return __wbg_finalize_init(instance, module); +} + +async function __wbg_init(module_or_path) { + if (wasm !== undefined) return wasm; + + + if (typeof module_or_path !== 'undefined') { + if (Object.getPrototypeOf(module_or_path) === Object.prototype) { + ({module_or_path} = module_or_path) + } else { + console.warn('using deprecated parameters for the initialization function; pass a single object instead') + } + } + + if (typeof module_or_path === 'undefined') { + module_or_path = new URL('enhanced_secure_crypto_bg.wasm', import.meta.url); + } + const imports = __wbg_get_imports(); + + if (typeof module_or_path === 'string' || (typeof Request === 'function' && module_or_path instanceof Request) || (typeof URL === 'function' && module_or_path instanceof URL)) { + module_or_path = fetch(module_or_path); + } + + __wbg_init_memory(imports); + + const { instance, module } = await __wbg_load(await module_or_path, imports); + + return __wbg_finalize_init(instance, module); +} + +export { initSync }; +export default __wbg_init; diff --git a/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto_bg.wasm b/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto_bg.wasm new file mode 100644 index 0000000..456aeea Binary files /dev/null and b/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto_bg.wasm differ diff --git a/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto_bg.wasm.d.ts b/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto_bg.wasm.d.ts new file mode 100644 index 0000000..5a795d3 --- /dev/null +++ b/src/enhanced-secure-crypto/pkg/enhanced_secure_crypto_bg.wasm.d.ts @@ -0,0 +1,29 @@ +/* tslint:disable */ +/* eslint-disable */ +export const memory: WebAssembly.Memory; +export const main: () => void; +export const __wbg_enhancedsecurecryptoutils_free: (a: number, b: number) => void; +export const enhancedsecurecryptoutils_new: () => number; +export const enhancedsecurecryptoutils_generate_secure_password: (a: number) => [number, number]; +export const enhancedsecurecryptoutils_generate_salt: (a: number) => [number, number]; +export const enhancedsecurecryptoutils_encrypt_data: (a: number, b: number, c: number, d: number, e: number) => [number, number, number, number]; +export const enhancedsecurecryptoutils_decrypt_data: (a: number, b: number, c: number, d: number, e: number) => [number, number, number, number]; +export const enhancedsecurecryptoutils_generate_ecdsa_keypair: (a: number) => [number, number, number]; +export const enhancedsecurecryptoutils_sign_data: (a: number, b: number, c: number, d: number, e: number) => [number, number, number, number]; +export const enhancedsecurecryptoutils_verify_signature: (a: number, b: number, c: number, d: number, e: number, f: number, g: number) => [number, number, number]; +export const enhancedsecurecryptoutils_calculate_key_fingerprint: (a: number, b: number, c: number) => [number, number]; +export const enhancedsecurecryptoutils_generate_verification_code: (a: number) => [number, number]; +export const enhancedsecurecryptoutils_generate_mutual_auth_challenge: (a: number) => [number, number, number]; +export const enhancedsecurecryptoutils_sanitize_message: (a: number, b: number, c: number) => [number, number, number, number]; +export const array_buffer_to_base64: (a: number, b: number) => [number, number]; +export const base64_to_array_buffer: (a: number, b: number) => [number, number, number, number]; +export const hash_sha256: (a: number, b: number) => [number, number]; +export const hash_sha384: (a: number, b: number) => [number, number]; +export const __wbindgen_exn_store: (a: number) => void; +export const __externref_table_alloc: () => number; +export const __wbindgen_export_2: WebAssembly.Table; +export const __wbindgen_free: (a: number, b: number, c: number) => void; +export const __wbindgen_malloc: (a: number, b: number) => number; +export const __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number; +export const __externref_table_dealloc: (a: number) => void; +export const __wbindgen_start: () => void; diff --git a/src/enhanced-secure-crypto/pkg/package.json b/src/enhanced-secure-crypto/pkg/package.json new file mode 100644 index 0000000..e265b3b --- /dev/null +++ b/src/enhanced-secure-crypto/pkg/package.json @@ -0,0 +1,15 @@ +{ + "name": "enhanced-secure-crypto", + "type": "module", + "version": "0.1.0", + "files": [ + "enhanced_secure_crypto_bg.wasm", + "enhanced_secure_crypto.js", + "enhanced_secure_crypto.d.ts" + ], + "main": "enhanced_secure_crypto.js", + "types": "enhanced_secure_crypto.d.ts", + "sideEffects": [ + "./snippets/*" + ] +} \ No newline at end of file