{"version":3,"sources":["../node_modules/public-encrypt/mgf.js","../node_modules/public-encrypt/xor.js","../node_modules/public-encrypt/withPublic.js","../node_modules/public-encrypt/browser.js","../node_modules/public-encrypt/publicEncrypt.js","../node_modules/public-encrypt/privateDecrypt.js"],"names":["createHash","require","Buffer","i2ops","c","out","allocUnsafe","writeUInt32BE","module","exports","seed","len","t","alloc","i","length","concat","update","digest","slice","a","b","BN","paddedMsg","key","from","toRed","mont","modulus","redPow","publicExponent","fromRed","toArray","publicEncrypt","privateDecrypt","privateEncrypt","buf","publicDecrypt","parseKeys","randomBytes","mgf","xor","withPublic","crt","publicKey","msg","reverse","padding","k","byteLength","mLen","iHash","hLen","hLen2","Error","ps","dblen","maskedDb","maskedSeed","oaep","num","cache","cur","nonZero","pkcs1","cmp","privateKey","enc","zBuffer","db","dif","Math","min","compare","p1","status","toString"],"mappings":"2FAAA,IAAIA,EAAaC,EAAQ,KACrBC,EAASD,EAAQ,IAAeC,OAapC,SAASC,EAAOC,GACd,IAAIC,EAAMH,EAAOI,YAAY,GAE7B,OADAD,EAAIE,cAAcH,EAAG,GACdC,EAdTG,EAAOC,QAAU,SAAUC,EAAMC,GAI/B,IAHA,IAEIP,EAFAQ,EAAIV,EAAOW,MAAM,GACjBC,EAAI,EAEDF,EAAEG,OAASJ,GAChBP,EAAID,EAAMW,KACVF,EAAIV,EAAOc,OAAO,CAACJ,EAAGZ,EAAW,QAAQiB,OAAOP,GAAMO,OAAOb,GAAGc,WAElE,OAAON,EAAEO,MAAM,EAAGR,K,kBCXpBH,EAAOC,QAAU,SAAcW,EAAGC,GAGhC,IAFA,IAAIV,EAAMS,EAAEL,OACRD,GAAK,IACAA,EAAIH,GACXS,EAAEN,IAAMO,EAAEP,GAEZ,OAAOM,I,oBCNT,IAAIE,EAAKrB,EAAQ,IACbC,EAASD,EAAQ,IAAeC,OAUpCM,EAAOC,QARP,SAAqBc,EAAWC,GAC9B,OAAOtB,EAAOuB,KAAKF,EAChBG,MAAMJ,EAAGK,KAAKH,EAAII,UAClBC,OAAO,IAAIP,EAAGE,EAAIM,iBAClBC,UACAC,a,oBCRLvB,EAAQwB,cAAgBhC,EAAQ,KAChCQ,EAAQyB,eAAiBjC,EAAQ,KAEjCQ,EAAQ0B,eAAiB,SAAyBX,EAAKY,GACrD,OAAO3B,EAAQwB,cAAcT,EAAKY,GAAK,IAGzC3B,EAAQ4B,cAAgB,SAAwBb,EAAKY,GACnD,OAAO3B,EAAQyB,eAAeV,EAAKY,GAAK,K,oBCR1C,IAAIE,EAAYrC,EAAQ,KACpBsC,EAActC,EAAQ,KACtBD,EAAaC,EAAQ,KACrBuC,EAAMvC,EAAQ,KACdwC,EAAMxC,EAAQ,KACdqB,EAAKrB,EAAQ,IACbyC,EAAazC,EAAQ,KACrB0C,EAAM1C,EAAQ,KACdC,EAASD,EAAQ,IAAeC,OAEpCM,EAAOC,QAAU,SAAwBmC,EAAWC,EAAKC,GACvD,IAAIC,EAEFA,EADEH,EAAUG,QACFH,EAAUG,QACXD,EACC,EAEA,EAEZ,IACIvB,EADAC,EAAMc,EAAUM,GAEpB,GAAgB,IAAZG,EACFxB,EAkBJ,SAAeC,EAAKqB,GAClB,IAAIG,EAAIxB,EAAII,QAAQqB,aAChBC,EAAOL,EAAI9B,OACXoC,EAAQnD,EAAW,QAAQiB,OAAOf,EAAOW,MAAM,IAAIK,SACnDkC,EAAOD,EAAMpC,OACbsC,EAAQ,EAAID,EAChB,GAAIF,EAAOF,EAAIK,EAAQ,EACrB,MAAM,IAAIC,MAAM,oBAElB,IAAIC,EAAKrD,EAAOW,MAAMmC,EAAIE,EAAOG,EAAQ,GACrCG,EAAQR,EAAII,EAAO,EACnB1C,EAAO6B,EAAYa,GACnBK,EAAWhB,EAAIvC,EAAOc,OAAO,CAACmC,EAAOI,EAAIrD,EAAOW,MAAM,EAAG,GAAIgC,GAAMW,GAAQhB,EAAI9B,EAAM8C,IACrFE,EAAajB,EAAI/B,EAAM8B,EAAIiB,EAAUL,IACzC,OAAO,IAAI9B,EAAGpB,EAAOc,OAAO,CAACd,EAAOW,MAAM,GAAI6C,EAAYD,GAAWT,IAhCvDW,CAAKnC,EAAKqB,QACjB,GAAgB,IAAZE,EACTxB,EAgCJ,SAAgBC,EAAKqB,EAAKC,GACxB,IAKIS,EALAL,EAAOL,EAAI9B,OACXiC,EAAIxB,EAAII,QAAQqB,aACpB,GAAIC,EAAOF,EAAI,GACb,MAAM,IAAIM,MAAM,oBAIhBC,EADET,EACG5C,EAAOW,MAAMmC,EAAIE,EAAO,EAAG,KAMpC,SAAkBvC,GAChB,IAIIiD,EAJAvD,EAAMH,EAAOI,YAAYK,GACzBG,EAAI,EACJ+C,EAAQtB,EAAkB,EAAN5B,GACpBmD,EAAM,EAEV,KAAOhD,EAAIH,GACLmD,IAAQD,EAAM9C,SAChB8C,EAAQtB,EAAkB,EAAN5B,GACpBmD,EAAM,IAERF,EAAMC,EAAMC,QAEVzD,EAAIS,KAAO8C,GAGf,OAAOvD,EApBA0D,CAAQf,EAAIE,EAAO,GAE1B,OAAO,IAAI5B,EAAGpB,EAAOc,OAAO,CAACd,EAAOuB,KAAK,CAAC,EAAGqB,EAAU,EAAI,IAAKS,EAAIrD,EAAOW,MAAM,GAAIgC,GAAMG,IA5C7EgB,CAAMxC,EAAKqB,EAAKC,OACvB,IAAgB,IAAZC,EAMT,MAAM,IAAIO,MAAM,mBAJhB,IADA/B,EAAY,IAAID,EAAGuB,IACLoB,IAAIzC,EAAII,UAAY,EAChC,MAAM,IAAI0B,MAAM,6BAKpB,OAAIR,EACKH,EAAIpB,EAAWC,GAEfkB,EAAWnB,EAAWC,K,oBCpCjC,IAAIc,EAAYrC,EAAQ,KACpBuC,EAAMvC,EAAQ,KACdwC,EAAMxC,EAAQ,KACdqB,EAAKrB,EAAQ,IACb0C,EAAM1C,EAAQ,KACdD,EAAaC,EAAQ,KACrByC,EAAazC,EAAQ,KACrBC,EAASD,EAAQ,IAAeC,OAEpCM,EAAOC,QAAU,SAAyByD,EAAYC,EAAKrB,GACzD,IAAIC,EAEFA,EADEmB,EAAWnB,QACHmB,EAAWnB,QACZD,EACC,EAEA,EAGZ,IAKID,EALArB,EAAMc,EAAU4B,GAChBlB,EAAIxB,EAAII,QAAQqB,aACpB,GAAIkB,EAAIpD,OAASiC,GAAK,IAAI1B,EAAG6C,GAAKF,IAAIzC,EAAII,UAAY,EACpD,MAAM,IAAI0B,MAAM,oBAIhBT,EADEC,EACIJ,EAAW,IAAIpB,EAAG6C,GAAM3C,GAExBmB,EAAIwB,EAAK3C,GAEjB,IAAI4C,EAAUlE,EAAOW,MAAMmC,EAAIH,EAAI9B,QAEnC,GADA8B,EAAM3C,EAAOc,OAAO,CAACoD,EAASvB,GAAMG,GACpB,IAAZD,EACF,OAUJ,SAAevB,EAAKqB,GAClB,IAAIG,EAAIxB,EAAII,QAAQqB,aAChBE,EAAQnD,EAAW,QAAQiB,OAAOf,EAAOW,MAAM,IAAIK,SACnDkC,EAAOD,EAAMpC,OACjB,GAAe,IAAX8B,EAAI,GACN,MAAM,IAAIS,MAAM,oBAElB,IAAII,EAAab,EAAI1B,MAAM,EAAGiC,EAAO,GACjCK,EAAWZ,EAAI1B,MAAMiC,EAAO,GAC5B1C,EAAO+B,EAAIiB,EAAYlB,EAAIiB,EAAUL,IACrCiB,EAAK5B,EAAIgB,EAAUjB,EAAI9B,EAAMsC,EAAII,EAAO,IAC5C,GAoCF,SAAkBhC,EAAGC,GACnBD,EAAIlB,EAAOuB,KAAKL,GAChBC,EAAInB,EAAOuB,KAAKJ,GAChB,IAAIiD,EAAM,EACN3D,EAAMS,EAAEL,OACRK,EAAEL,SAAWM,EAAEN,SACjBuD,IACA3D,EAAM4D,KAAKC,IAAIpD,EAAEL,OAAQM,EAAEN,SAE7B,IAAID,GAAK,EACT,OAASA,EAAIH,GACX2D,GAAQlD,EAAEN,GAAKO,EAAEP,GAEnB,OAAOwD,EAjDHG,CAAQtB,EAAOkB,EAAGlD,MAAM,EAAGiC,IAC7B,MAAM,IAAIE,MAAM,oBAElB,IAAIxC,EAAIsC,EACR,KAAiB,IAAViB,EAAGvD,IACRA,IAEF,GAAgB,IAAZuD,EAAGvD,KACL,MAAM,IAAIwC,MAAM,oBAElB,OAAOe,EAAGlD,MAAML,GA/BP6C,CAAKnC,EAAKqB,GACZ,GAAgB,IAAZE,EACT,OAgCJ,SAAgBvB,EAAKqB,EAAKC,GACxB,IAAI4B,EAAK7B,EAAI1B,MAAM,EAAG,GAClBL,EAAI,EACJ6D,EAAS,EACb,KAAoB,IAAb9B,EAAI/B,MACT,GAAIA,GAAK+B,EAAI9B,OAAQ,CACnB4D,IACA,MAGJ,IAAIpB,EAAKV,EAAI1B,MAAM,EAAGL,EAAI,IAEE,SAAvB4D,EAAGE,SAAS,SAAsB9B,GAAoC,SAAvB4B,EAAGE,SAAS,QAAqB9B,IACnF6B,IAEEpB,EAAGxC,OAAS,GACd4D,IAEF,GAAIA,EACF,MAAM,IAAIrB,MAAM,oBAElB,OAAOT,EAAI1B,MAAML,GArDRkD,CAAMxC,EAAKqB,EAAKC,GAClB,GAAgB,IAAZC,EACT,OAAOF,EAEP,MAAM,IAAIS,MAAM","file":"static/js/public-encrypt.4e84572e.chunk.js","sourcesContent":["var createHash = require('create-hash')\nvar Buffer = require('safe-buffer').Buffer\n\nmodule.exports = function (seed, len) {\n var t = Buffer.alloc(0)\n var i = 0\n var c\n while (t.length < len) {\n c = i2ops(i++)\n t = Buffer.concat([t, createHash('sha1').update(seed).update(c).digest()])\n }\n return t.slice(0, len)\n}\n\nfunction i2ops (c) {\n var out = Buffer.allocUnsafe(4)\n out.writeUInt32BE(c, 0)\n return out\n}\n","module.exports = function xor (a, b) {\n var len = a.length\n var i = -1\n while (++i < len) {\n a[i] ^= b[i]\n }\n return a\n}\n","var BN = require('bn.js')\nvar Buffer = require('safe-buffer').Buffer\n\nfunction withPublic (paddedMsg, key) {\n return Buffer.from(paddedMsg\n .toRed(BN.mont(key.modulus))\n .redPow(new BN(key.publicExponent))\n .fromRed()\n .toArray())\n}\n\nmodule.exports = withPublic\n","exports.publicEncrypt = require('./publicEncrypt')\nexports.privateDecrypt = require('./privateDecrypt')\n\nexports.privateEncrypt = function privateEncrypt (key, buf) {\n return exports.publicEncrypt(key, buf, true)\n}\n\nexports.publicDecrypt = function publicDecrypt (key, buf) {\n return exports.privateDecrypt(key, buf, true)\n}\n","var parseKeys = require('parse-asn1')\nvar randomBytes = require('randombytes')\nvar createHash = require('create-hash')\nvar mgf = require('./mgf')\nvar xor = require('./xor')\nvar BN = require('bn.js')\nvar withPublic = require('./withPublic')\nvar crt = require('browserify-rsa')\nvar Buffer = require('safe-buffer').Buffer\n\nmodule.exports = function publicEncrypt (publicKey, msg, reverse) {\n var padding\n if (publicKey.padding) {\n padding = publicKey.padding\n } else if (reverse) {\n padding = 1\n } else {\n padding = 4\n }\n var key = parseKeys(publicKey)\n var paddedMsg\n if (padding === 4) {\n paddedMsg = oaep(key, msg)\n } else if (padding === 1) {\n paddedMsg = pkcs1(key, msg, reverse)\n } else if (padding === 3) {\n paddedMsg = new BN(msg)\n if (paddedMsg.cmp(key.modulus) >= 0) {\n throw new Error('data too long for modulus')\n }\n } else {\n throw new Error('unknown padding')\n }\n if (reverse) {\n return crt(paddedMsg, key)\n } else {\n return withPublic(paddedMsg, key)\n }\n}\n\nfunction oaep (key, msg) {\n var k = key.modulus.byteLength()\n var mLen = msg.length\n var iHash = createHash('sha1').update(Buffer.alloc(0)).digest()\n var hLen = iHash.length\n var hLen2 = 2 * hLen\n if (mLen > k - hLen2 - 2) {\n throw new Error('message too long')\n }\n var ps = Buffer.alloc(k - mLen - hLen2 - 2)\n var dblen = k - hLen - 1\n var seed = randomBytes(hLen)\n var maskedDb = xor(Buffer.concat([iHash, ps, Buffer.alloc(1, 1), msg], dblen), mgf(seed, dblen))\n var maskedSeed = xor(seed, mgf(maskedDb, hLen))\n return new BN(Buffer.concat([Buffer.alloc(1), maskedSeed, maskedDb], k))\n}\nfunction pkcs1 (key, msg, reverse) {\n var mLen = msg.length\n var k = key.modulus.byteLength()\n if (mLen > k - 11) {\n throw new Error('message too long')\n }\n var ps\n if (reverse) {\n ps = Buffer.alloc(k - mLen - 3, 0xff)\n } else {\n ps = nonZero(k - mLen - 3)\n }\n return new BN(Buffer.concat([Buffer.from([0, reverse ? 1 : 2]), ps, Buffer.alloc(1), msg], k))\n}\nfunction nonZero (len) {\n var out = Buffer.allocUnsafe(len)\n var i = 0\n var cache = randomBytes(len * 2)\n var cur = 0\n var num\n while (i < len) {\n if (cur === cache.length) {\n cache = randomBytes(len * 2)\n cur = 0\n }\n num = cache[cur++]\n if (num) {\n out[i++] = num\n }\n }\n return out\n}\n","var parseKeys = require('parse-asn1')\nvar mgf = require('./mgf')\nvar xor = require('./xor')\nvar BN = require('bn.js')\nvar crt = require('browserify-rsa')\nvar createHash = require('create-hash')\nvar withPublic = require('./withPublic')\nvar Buffer = require('safe-buffer').Buffer\n\nmodule.exports = function privateDecrypt (privateKey, enc, reverse) {\n var padding\n if (privateKey.padding) {\n padding = privateKey.padding\n } else if (reverse) {\n padding = 1\n } else {\n padding = 4\n }\n\n var key = parseKeys(privateKey)\n var k = key.modulus.byteLength()\n if (enc.length > k || new BN(enc).cmp(key.modulus) >= 0) {\n throw new Error('decryption error')\n }\n var msg\n if (reverse) {\n msg = withPublic(new BN(enc), key)\n } else {\n msg = crt(enc, key)\n }\n var zBuffer = Buffer.alloc(k - msg.length)\n msg = Buffer.concat([zBuffer, msg], k)\n if (padding === 4) {\n return oaep(key, msg)\n } else if (padding === 1) {\n return pkcs1(key, msg, reverse)\n } else if (padding === 3) {\n return msg\n } else {\n throw new Error('unknown padding')\n }\n}\n\nfunction oaep (key, msg) {\n var k = key.modulus.byteLength()\n var iHash = createHash('sha1').update(Buffer.alloc(0)).digest()\n var hLen = iHash.length\n if (msg[0] !== 0) {\n throw new Error('decryption error')\n }\n var maskedSeed = msg.slice(1, hLen + 1)\n var maskedDb = msg.slice(hLen + 1)\n var seed = xor(maskedSeed, mgf(maskedDb, hLen))\n var db = xor(maskedDb, mgf(seed, k - hLen - 1))\n if (compare(iHash, db.slice(0, hLen))) {\n throw new Error('decryption error')\n }\n var i = hLen\n while (db[i] === 0) {\n i++\n }\n if (db[i++] !== 1) {\n throw new Error('decryption error')\n }\n return db.slice(i)\n}\n\nfunction pkcs1 (key, msg, reverse) {\n var p1 = msg.slice(0, 2)\n var i = 2\n var status = 0\n while (msg[i++] !== 0) {\n if (i >= msg.length) {\n status++\n break\n }\n }\n var ps = msg.slice(2, i - 1)\n\n if ((p1.toString('hex') !== '0002' && !reverse) || (p1.toString('hex') !== '0001' && reverse)) {\n status++\n }\n if (ps.length < 8) {\n status++\n }\n if (status) {\n throw new Error('decryption error')\n }\n return msg.slice(i)\n}\nfunction compare (a, b) {\n a = Buffer.from(a)\n b = Buffer.from(b)\n var dif = 0\n var len = a.length\n if (a.length !== b.length) {\n dif++\n len = Math.min(a.length, b.length)\n }\n var i = -1\n while (++i < len) {\n dif += (a[i] ^ b[i])\n }\n return dif\n}\n"],"sourceRoot":""}