"use strict"; Object.defineProperty(exports, "__esModule", { value: true }); exports.ecdhAllowed = exports.generateEpk = exports.deriveKey = void 0; const node_crypto_1 = require("node:crypto"); const node_util_1 = require("node:util"); const get_named_curve_js_1 = require("./get_named_curve.js"); const buffer_utils_js_1 = require("../lib/buffer_utils.js"); const errors_js_1 = require("../util/errors.js"); const webcrypto_js_1 = require("./webcrypto.js"); const crypto_key_js_1 = require("../lib/crypto_key.js"); const is_key_object_js_1 = require("./is_key_object.js"); const invalid_key_input_js_1 = require("../lib/invalid_key_input.js"); const is_key_like_js_1 = require("./is_key_like.js"); const generateKeyPair = (0, node_util_1.promisify)(node_crypto_1.generateKeyPair); async function deriveKey(publicKee, privateKee, algorithm, keyLength, apu = new Uint8Array(0), apv = new Uint8Array(0)) { let publicKey; if ((0, webcrypto_js_1.isCryptoKey)(publicKee)) { (0, crypto_key_js_1.checkEncCryptoKey)(publicKee, 'ECDH'); publicKey = node_crypto_1.KeyObject.from(publicKee); } else if ((0, is_key_object_js_1.default)(publicKee)) { publicKey = publicKee; } else { throw new TypeError((0, invalid_key_input_js_1.default)(publicKee, ...is_key_like_js_1.types)); } let privateKey; if ((0, webcrypto_js_1.isCryptoKey)(privateKee)) { (0, crypto_key_js_1.checkEncCryptoKey)(privateKee, 'ECDH', 'deriveBits'); privateKey = node_crypto_1.KeyObject.from(privateKee); } else if ((0, is_key_object_js_1.default)(privateKee)) { privateKey = privateKee; } else { throw new TypeError((0, invalid_key_input_js_1.default)(privateKee, ...is_key_like_js_1.types)); } const value = (0, buffer_utils_js_1.concat)((0, buffer_utils_js_1.lengthAndInput)(buffer_utils_js_1.encoder.encode(algorithm)), (0, buffer_utils_js_1.lengthAndInput)(apu), (0, buffer_utils_js_1.lengthAndInput)(apv), (0, buffer_utils_js_1.uint32be)(keyLength)); const sharedSecret = (0, node_crypto_1.diffieHellman)({ privateKey, publicKey }); return (0, buffer_utils_js_1.concatKdf)(sharedSecret, keyLength, value); } exports.deriveKey = deriveKey; async function generateEpk(kee) { let key; if ((0, webcrypto_js_1.isCryptoKey)(kee)) { key = node_crypto_1.KeyObject.from(kee); } else if ((0, is_key_object_js_1.default)(kee)) { key = kee; } else { throw new TypeError((0, invalid_key_input_js_1.default)(kee, ...is_key_like_js_1.types)); } switch (key.asymmetricKeyType) { case 'x25519': return generateKeyPair('x25519'); case 'x448': { return generateKeyPair('x448'); } case 'ec': { const namedCurve = (0, get_named_curve_js_1.default)(key); return generateKeyPair('ec', { namedCurve }); } default: throw new errors_js_1.JOSENotSupported('Invalid or unsupported EPK'); } } exports.generateEpk = generateEpk; const ecdhAllowed = (key) => ['P-256', 'P-384', 'P-521', 'X25519', 'X448'].includes((0, get_named_curve_js_1.default)(key)); exports.ecdhAllowed = ecdhAllowed;