From 968f8b2bc40ee1092c01d7d5bfadd6e9bf0a7bc9 Mon Sep 17 00:00:00 2001 From: devlamnt176 Date: Thu, 10 Oct 2024 23:27:49 +0700 Subject: [PATCH 01/10] TODO Aes Algorithm --- LICENSE | 21 +- README.md | 5 +- android/build.gradle | 2 + android/gradle/wrapper/gradle-wrapper.jar | Bin 0 -> 43462 bytes .../gradle/wrapper/gradle-wrapper.properties | 7 + android/gradlew | 249 ++++++++++++++++++ android/gradlew.bat | 92 +++++++ .../flutter_crypto_algorithm/AesAlgorithm.kt | 35 +++ .../flutter_crypto_algorithm/CryptoHelper.kt | 57 ++++ .../FlutterCryptoAlgorithmPlugin.kt | 107 ++++++-- example/ios/Flutter/Debug.xcconfig | 1 + example/ios/Flutter/Release.xcconfig | 1 + example/ios/Podfile | 44 ++++ ios/flutter_crypto_algorithm.podspec | 3 + pubspec.yaml | 6 +- 15 files changed, 604 insertions(+), 26 deletions(-) create mode 100644 android/gradle/wrapper/gradle-wrapper.jar create mode 100644 android/gradle/wrapper/gradle-wrapper.properties create mode 100755 android/gradlew create mode 100644 android/gradlew.bat create mode 100644 android/src/main/kotlin/com/example/flutter_crypto_algorithm/AesAlgorithm.kt create mode 100644 android/src/main/kotlin/com/example/flutter_crypto_algorithm/CryptoHelper.kt create mode 100644 example/ios/Podfile diff --git a/LICENSE b/LICENSE index ba75c69..6dd70ce 100644 --- a/LICENSE +++ b/LICENSE @@ -1 +1,20 @@ -TODO: Add your license here. +MIT License + +Copyright (c) 2024 LamNguyen176 +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. \ No newline at end of file diff --git a/README.md b/README.md index e35381d..0b32cff 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,10 @@ # flutter_crypto_algorithm -A new Flutter plugin project. +[![](https://img.shields.io/badge/native_language-Kotlin_&_Swift-green)](https://pub.dev/packages/flutter_crypto_algorithm) +[![](https://img.shields.io/badge/license-MIT-8A2BE2)](https://github.com/LamNguyen17/flutter_crypto_algorithm/blob/master/LICENSE) +[![](https://img.shields.io/badge/author-Forest_Nguyen-f59642)](https://github.com/LamNguyen17) +A Flutter package for secure encryption algorithms, providing efficient tools for data protection and encryption operations ## Getting Started This project is a starting point for a Flutter diff --git a/android/build.gradle b/android/build.gradle index 878bef0..27c9af5 100644 --- a/android/build.gradle +++ b/android/build.gradle @@ -50,6 +50,8 @@ android { } dependencies { + implementation 'org.jetbrains.kotlinx:kotlinx-coroutines-core:1.7.1' + implementation 'org.jetbrains.kotlinx:kotlinx-coroutines-android:1.7.1' testImplementation 'org.jetbrains.kotlin:kotlin-test' testImplementation 'org.mockito:mockito-core:5.0.0' } diff --git a/android/gradle/wrapper/gradle-wrapper.jar b/android/gradle/wrapper/gradle-wrapper.jar new file mode 100644 index 0000000000000000000000000000000000000000..d64cd4917707c1f8861d8cb53dd15194d4248596 GIT binary patch literal 43462 zcma&NWl&^owk(X(xVyW%ySuwf;qI=D6|RlDJ2cR^yEKh!@I- zp9QeisK*rlxC>+~7Dk4IxIRsKBHqdR9b3+fyL=ynHmIDe&|>O*VlvO+%z5;9Z$|DJ zb4dO}-R=MKr^6EKJiOrJdLnCJn>np?~vU-1sSFgPu;pthGwf}bG z(1db%xwr#x)r+`4AGu$j7~u2MpVs3VpLp|mx&;>`0p0vH6kF+D2CY0fVdQOZ@h;A` z{infNyvmFUiu*XG}RNMNwXrbec_*a3N=2zJ|Wh5z* z5rAX$JJR{#zP>KY**>xHTuw?|-Rg|o24V)74HcfVT;WtQHXlE+_4iPE8QE#DUm%x0 zEKr75ur~W%w#-My3Tj`hH6EuEW+8K-^5P62$7Sc5OK+22qj&Pd1;)1#4tKihi=~8C zHiQSst0cpri6%OeaR`PY>HH_;CPaRNty%WTm4{wDK8V6gCZlG@U3$~JQZ;HPvDJcT1V{ z?>H@13MJcCNe#5z+MecYNi@VT5|&UiN1D4ATT+%M+h4c$t;C#UAs3O_q=GxK0}8%8 z8J(_M9bayxN}69ex4dzM_P3oh@ZGREjVvn%%r7=xjkqxJP4kj}5tlf;QosR=%4L5y zWhgejO=vao5oX%mOHbhJ8V+SG&K5dABn6!WiKl{|oPkq(9z8l&Mm%(=qGcFzI=eLu zWc_oCLyf;hVlB@dnwY98?75B20=n$>u3b|NB28H0u-6Rpl((%KWEBOfElVWJx+5yg z#SGqwza7f}$z;n~g%4HDU{;V{gXIhft*q2=4zSezGK~nBgu9-Q*rZ#2f=Q}i2|qOp z!!y4p)4o=LVUNhlkp#JL{tfkhXNbB=Ox>M=n6soptJw-IDI|_$is2w}(XY>a=H52d z3zE$tjPUhWWS+5h=KVH&uqQS=$v3nRs&p$%11b%5qtF}S2#Pc`IiyBIF4%A!;AVoI zXU8-Rpv!DQNcF~(qQnyyMy=-AN~U>#&X1j5BLDP{?K!%h!;hfJI>$mdLSvktEr*89 zdJHvby^$xEX0^l9g$xW-d?J;L0#(`UT~zpL&*cEh$L|HPAu=P8`OQZV!-}l`noSp_ zQ-1$q$R-gDL)?6YaM!=8H=QGW$NT2SeZlb8PKJdc=F-cT@j7Xags+Pr*jPtlHFnf- zh?q<6;)27IdPc^Wdy-mX%2s84C1xZq9Xms+==F4);O`VUASmu3(RlgE#0+#giLh-& zcxm3_e}n4{%|X zJp{G_j+%`j_q5}k{eW&TlP}J2wtZ2^<^E(O)4OQX8FDp6RJq!F{(6eHWSD3=f~(h} zJXCf7=r<16X{pHkm%yzYI_=VDP&9bmI1*)YXZeB}F? z(%QsB5fo*FUZxK$oX~X^69;x~j7ms8xlzpt-T15e9}$4T-pC z6PFg@;B-j|Ywajpe4~bk#S6(fO^|mm1hKOPfA%8-_iGCfICE|=P_~e;Wz6my&)h_~ zkv&_xSAw7AZ%ThYF(4jADW4vg=oEdJGVOs>FqamoL3Np8>?!W#!R-0%2Bg4h?kz5I zKV-rKN2n(vUL%D<4oj@|`eJ>0i#TmYBtYmfla;c!ATW%;xGQ0*TW@PTlGG><@dxUI zg>+3SiGdZ%?5N=8uoLA|$4isK$aJ%i{hECP$bK{J#0W2gQ3YEa zZQ50Stn6hqdfxJ*9#NuSLwKFCUGk@c=(igyVL;;2^wi4o30YXSIb2g_ud$ zgpCr@H0qWtk2hK8Q|&wx)}4+hTYlf;$a4#oUM=V@Cw#!$(nOFFpZ;0lc!qd=c$S}Z zGGI-0jg~S~cgVT=4Vo)b)|4phjStD49*EqC)IPwyeKBLcN;Wu@Aeph;emROAwJ-0< z_#>wVm$)ygH|qyxZaet&(Vf%pVdnvKWJn9`%DAxj3ot;v>S$I}jJ$FLBF*~iZ!ZXE zkvui&p}fI0Y=IDX)mm0@tAd|fEHl~J&K}ZX(Mm3cm1UAuwJ42+AO5@HwYfDH7ipIc zmI;1J;J@+aCNG1M`Btf>YT>~c&3j~Qi@Py5JT6;zjx$cvOQW@3oQ>|}GH?TW-E z1R;q^QFjm5W~7f}c3Ww|awg1BAJ^slEV~Pk`Kd`PS$7;SqJZNj->it4DW2l15}xP6 zoCl$kyEF%yJni0(L!Z&14m!1urXh6Btj_5JYt1{#+H8w?5QI%% zo-$KYWNMJVH?Hh@1n7OSu~QhSswL8x0=$<8QG_zepi_`y_79=nK=_ZP_`Em2UI*tyQoB+r{1QYZCpb?2OrgUw#oRH$?^Tj!Req>XiE#~B|~ z+%HB;=ic+R@px4Ld8mwpY;W^A%8%l8$@B@1m5n`TlKI6bz2mp*^^^1mK$COW$HOfp zUGTz-cN9?BGEp}5A!mDFjaiWa2_J2Iq8qj0mXzk; z66JBKRP{p%wN7XobR0YjhAuW9T1Gw3FDvR5dWJ8ElNYF94eF3ebu+QwKjtvVu4L zI9ip#mQ@4uqVdkl-TUQMb^XBJVLW(-$s;Nq;@5gr4`UfLgF$adIhd?rHOa%D);whv z=;krPp~@I+-Z|r#s3yCH+c1US?dnm+C*)r{m+86sTJusLdNu^sqLrfWed^ndHXH`m zd3#cOe3>w-ga(Dus_^ppG9AC>Iq{y%%CK+Cro_sqLCs{VLuK=dev>OL1dis4(PQ5R zcz)>DjEkfV+MO;~>VUlYF00SgfUo~@(&9$Iy2|G0T9BSP?&T22>K46D zL*~j#yJ?)^*%J3!16f)@Y2Z^kS*BzwfAQ7K96rFRIh>#$*$_Io;z>ux@}G98!fWR@ zGTFxv4r~v)Gsd|pF91*-eaZ3Qw1MH$K^7JhWIdX%o$2kCbvGDXy)a?@8T&1dY4`;L z4Kn+f%SSFWE_rpEpL9bnlmYq`D!6F%di<&Hh=+!VI~j)2mfil03T#jJ_s?}VV0_hp z7T9bWxc>Jm2Z0WMU?`Z$xE74Gu~%s{mW!d4uvKCx@WD+gPUQ zV0vQS(Ig++z=EHN)BR44*EDSWIyT~R4$FcF*VEY*8@l=218Q05D2$|fXKFhRgBIEE zdDFB}1dKkoO^7}{5crKX!p?dZWNz$m>1icsXG2N+((x0OIST9Zo^DW_tytvlwXGpn zs8?pJXjEG;T@qrZi%#h93?FP$!&P4JA(&H61tqQi=opRzNpm zkrG}$^t9&XduK*Qa1?355wd8G2CI6QEh@Ua>AsD;7oRUNLPb76m4HG3K?)wF~IyS3`fXuNM>${?wmB zpVz;?6_(Fiadfd{vUCBM*_kt$+F3J+IojI;9L(gc9n3{sEZyzR9o!_mOwFC#tQ{Q~ zP3-`#uK#tP3Q7~Q;4H|wjZHO8h7e4IuBxl&vz2w~D8)w=Wtg31zpZhz%+kzSzL*dV zwp@{WU4i;hJ7c2f1O;7Mz6qRKeASoIv0_bV=i@NMG*l<#+;INk-^`5w@}Dj~;k=|}qM1vq_P z|GpBGe_IKq|LNy9SJhKOQ$c=5L{Dv|Q_lZl=-ky*BFBJLW9&y_C|!vyM~rQx=!vun z?rZJQB5t}Dctmui5i31C_;_}CEn}_W%>oSXtt>@kE1=JW*4*v4tPp;O6 zmAk{)m!)}34pTWg8{i>($%NQ(Tl;QC@J@FfBoc%Gr&m560^kgSfodAFrIjF}aIw)X zoXZ`@IsMkc8_=w%-7`D6Y4e*CG8k%Ud=GXhsTR50jUnm+R*0A(O3UKFg0`K;qp1bl z7``HN=?39ic_kR|^R^~w-*pa?Vj#7|e9F1iRx{GN2?wK!xR1GW!qa=~pjJb-#u1K8 zeR?Y2i-pt}yJq;SCiVHODIvQJX|ZJaT8nO+(?HXbLefulKKgM^B(UIO1r+S=7;kLJ zcH}1J=Px2jsh3Tec&v8Jcbng8;V-`#*UHt?hB(pmOipKwf3Lz8rG$heEB30Sg*2rx zV<|KN86$soN(I!BwO`1n^^uF2*x&vJ$2d$>+`(romzHP|)K_KkO6Hc>_dwMW-M(#S zK(~SiXT1@fvc#U+?|?PniDRm01)f^#55;nhM|wi?oG>yBsa?~?^xTU|fX-R(sTA+5 zaq}-8Tx7zrOy#3*JLIIVsBmHYLdD}!0NP!+ITW+Thn0)8SS!$@)HXwB3tY!fMxc#1 zMp3H?q3eD?u&Njx4;KQ5G>32+GRp1Ee5qMO0lZjaRRu&{W<&~DoJNGkcYF<5(Ab+J zgO>VhBl{okDPn78<%&e2mR{jwVCz5Og;*Z;;3%VvoGo_;HaGLWYF7q#jDX=Z#Ml`H z858YVV$%J|e<1n`%6Vsvq7GmnAV0wW4$5qQ3uR@1i>tW{xrl|ExywIc?fNgYlA?C5 zh$ezAFb5{rQu6i7BSS5*J-|9DQ{6^BVQ{b*lq`xS@RyrsJN?-t=MTMPY;WYeKBCNg z^2|pN!Q^WPJuuO4!|P@jzt&tY1Y8d%FNK5xK(!@`jO2aEA*4 zkO6b|UVBipci?){-Ke=+1;mGlND8)6+P;8sq}UXw2hn;fc7nM>g}GSMWu&v&fqh

iViYT=fZ(|3Ox^$aWPp4a8h24tD<|8-!aK0lHgL$N7Efw}J zVIB!7=T$U`ao1?upi5V4Et*-lTG0XvExbf!ya{cua==$WJyVG(CmA6Of*8E@DSE%L z`V^$qz&RU$7G5mg;8;=#`@rRG`-uS18$0WPN@!v2d{H2sOqP|!(cQ@ zUHo!d>>yFArLPf1q`uBvY32miqShLT1B@gDL4XoVTK&@owOoD)OIHXrYK-a1d$B{v zF^}8D3Y^g%^cnvScOSJR5QNH+BI%d|;J;wWM3~l>${fb8DNPg)wrf|GBP8p%LNGN# z3EaIiItgwtGgT&iYCFy9-LG}bMI|4LdmmJt@V@% zb6B)1kc=T)(|L@0;wr<>=?r04N;E&ef+7C^`wPWtyQe(*pD1pI_&XHy|0gIGHMekd zF_*M4yi6J&Z4LQj65)S zXwdM{SwUo%3SbPwFsHgqF@V|6afT|R6?&S;lw=8% z3}@9B=#JI3@B*#4s!O))~z zc>2_4Q_#&+5V`GFd?88^;c1i7;Vv_I*qt!_Yx*n=;rj!82rrR2rQ8u5(Ejlo{15P% zs~!{%XJ>FmJ})H^I9bn^Re&38H{xA!0l3^89k(oU;bZWXM@kn$#aoS&Y4l^-WEn-fH39Jb9lA%s*WsKJQl?n9B7_~P z-XM&WL7Z!PcoF6_D>V@$CvUIEy=+Z&0kt{szMk=f1|M+r*a43^$$B^MidrT0J;RI` z(?f!O<8UZkm$_Ny$Hth1J#^4ni+im8M9mr&k|3cIgwvjAgjH z8`N&h25xV#v*d$qBX5jkI|xOhQn!>IYZK7l5#^P4M&twe9&Ey@@GxYMxBZq2e7?`q z$~Szs0!g{2fGcp9PZEt|rdQ6bhAgpcLHPz?f-vB?$dc*!9OL?Q8mn7->bFD2Si60* z!O%y)fCdMSV|lkF9w%x~J*A&srMyYY3{=&$}H zGQ4VG_?$2X(0|vT0{=;W$~icCI{b6W{B!Q8xdGhF|D{25G_5_+%s(46lhvNLkik~R z>nr(&C#5wwOzJZQo9m|U<;&Wk!_#q|V>fsmj1g<6%hB{jGoNUPjgJslld>xmODzGjYc?7JSuA?A_QzjDw5AsRgi@Y|Z0{F{!1=!NES-#*f^s4l0Hu zz468))2IY5dmD9pa*(yT5{EyP^G>@ZWumealS-*WeRcZ}B%gxq{MiJ|RyX-^C1V=0 z@iKdrGi1jTe8Ya^x7yyH$kBNvM4R~`fbPq$BzHum-3Zo8C6=KW@||>zsA8-Y9uV5V z#oq-f5L5}V<&wF4@X@<3^C%ptp6+Ce)~hGl`kwj)bsAjmo_GU^r940Z-|`<)oGnh7 zFF0Tde3>ui?8Yj{sF-Z@)yQd~CGZ*w-6p2U<8}JO-sRsVI5dBji`01W8A&3$?}lxBaC&vn0E$c5tW* zX>5(zzZ=qn&!J~KdsPl;P@bmA-Pr8T*)eh_+Dv5=Ma|XSle6t(k8qcgNyar{*ReQ8 zTXwi=8vr>!3Ywr+BhggHDw8ke==NTQVMCK`$69fhzEFB*4+H9LIvdt-#IbhZvpS}} zO3lz;P?zr0*0$%-Rq_y^k(?I{Mk}h@w}cZpMUp|ucs55bcloL2)($u%mXQw({Wzc~ z;6nu5MkjP)0C(@%6Q_I_vsWrfhl7Zpoxw#WoE~r&GOSCz;_ro6i(^hM>I$8y>`!wW z*U^@?B!MMmb89I}2(hcE4zN2G^kwyWCZp5JG>$Ez7zP~D=J^LMjSM)27_0B_X^C(M z`fFT+%DcKlu?^)FCK>QzSnV%IsXVcUFhFdBP!6~se&xxrIxsvySAWu++IrH;FbcY$ z2DWTvSBRfLwdhr0nMx+URA$j3i7_*6BWv#DXfym?ZRDcX9C?cY9sD3q)uBDR3uWg= z(lUIzB)G$Hr!){>E{s4Dew+tb9kvToZp-1&c?y2wn@Z~(VBhqz`cB;{E4(P3N2*nJ z_>~g@;UF2iG{Kt(<1PyePTKahF8<)pozZ*xH~U-kfoAayCwJViIrnqwqO}7{0pHw$ zs2Kx?s#vQr7XZ264>5RNKSL8|Ty^=PsIx^}QqOOcfpGUU4tRkUc|kc7-!Ae6!+B{o~7nFpm3|G5^=0#Bnm6`V}oSQlrX(u%OWnC zoLPy&Q;1Jui&7ST0~#+}I^&?vcE*t47~Xq#YwvA^6^} z`WkC)$AkNub|t@S!$8CBlwbV~?yp&@9h{D|3z-vJXgzRC5^nYm+PyPcgRzAnEi6Q^gslXYRv4nycsy-SJu?lMps-? zV`U*#WnFsdPLL)Q$AmD|0`UaC4ND07+&UmOu!eHruzV|OUox<+Jl|Mr@6~C`T@P%s zW7sgXLF2SSe9Fl^O(I*{9wsFSYb2l%-;&Pi^dpv!{)C3d0AlNY6!4fgmSgj_wQ*7Am7&$z;Jg&wgR-Ih;lUvWS|KTSg!&s_E9_bXBkZvGiC6bFKDWZxsD$*NZ#_8bl zG1P-#@?OQzED7@jlMJTH@V!6k;W>auvft)}g zhoV{7$q=*;=l{O>Q4a@ ziMjf_u*o^PsO)#BjC%0^h>Xp@;5$p{JSYDt)zbb}s{Kbt!T*I@Pk@X0zds6wsefuU zW$XY%yyRGC94=6mf?x+bbA5CDQ2AgW1T-jVAJbm7K(gp+;v6E0WI#kuACgV$r}6L? zd|Tj?^%^*N&b>Dd{Wr$FS2qI#Ucs1yd4N+RBUQiSZGujH`#I)mG&VKoDh=KKFl4=G z&MagXl6*<)$6P}*Tiebpz5L=oMaPrN+caUXRJ`D?=K9!e0f{@D&cZLKN?iNP@X0aF zE(^pl+;*T5qt?1jRC=5PMgV!XNITRLS_=9{CJExaQj;lt!&pdzpK?8p>%Mb+D z?yO*uSung=-`QQ@yX@Hyd4@CI^r{2oiu`%^bNkz+Nkk!IunjwNC|WcqvX~k=><-I3 zDQdbdb|!v+Iz01$w@aMl!R)koD77Xp;eZwzSl-AT zr@Vu{=xvgfq9akRrrM)}=!=xcs+U1JO}{t(avgz`6RqiiX<|hGG1pmop8k6Q+G_mv zJv|RfDheUp2L3=^C=4aCBMBn0aRCU(DQwX-W(RkRwmLeuJYF<0urcaf(=7)JPg<3P zQs!~G)9CT18o!J4{zX{_e}4eS)U-E)0FAt}wEI(c0%HkxgggW;(1E=>J17_hsH^sP z%lT0LGgbUXHx-K*CI-MCrP66UP0PvGqM$MkeLyqHdbgP|_Cm!7te~b8p+e6sQ_3k| zVcwTh6d83ltdnR>D^)BYQpDKlLk3g0Hdcgz2}%qUs9~~Rie)A-BV1mS&naYai#xcZ z(d{8=-LVpTp}2*y)|gR~;qc7fp26}lPcLZ#=JpYcn3AT9(UIdOyg+d(P5T7D&*P}# zQCYplZO5|7+r19%9e`v^vfSS1sbX1c%=w1;oyruXB%Kl$ACgKQ6=qNWLsc=28xJjg zwvsI5-%SGU|3p>&zXVl^vVtQT3o-#$UT9LI@Npz~6=4!>mc431VRNN8od&Ul^+G_kHC`G=6WVWM z%9eWNyy(FTO|A+@x}Ou3CH)oi;t#7rAxdIXfNFwOj_@Y&TGz6P_sqiB`Q6Lxy|Q{`|fgmRG(k+!#b*M+Z9zFce)f-7;?Km5O=LHV9f9_87; zF7%R2B+$?@sH&&-$@tzaPYkw0;=i|;vWdI|Wl3q_Zu>l;XdIw2FjV=;Mq5t1Q0|f< zs08j54Bp`3RzqE=2enlkZxmX6OF+@|2<)A^RNQpBd6o@OXl+i)zO%D4iGiQNuXd+zIR{_lb96{lc~bxsBveIw6umhShTX+3@ZJ=YHh@ zWY3(d0azg;7oHn>H<>?4@*RQbi>SmM=JrHvIG(~BrvI)#W(EAeO6fS+}mxxcc+X~W6&YVl86W9WFSS}Vz-f9vS?XUDBk)3TcF z8V?$4Q)`uKFq>xT=)Y9mMFVTUk*NIA!0$?RP6Ig0TBmUFrq*Q-Agq~DzxjStQyJ({ zBeZ;o5qUUKg=4Hypm|}>>L=XKsZ!F$yNTDO)jt4H0gdQ5$f|d&bnVCMMXhNh)~mN z@_UV6D7MVlsWz+zM+inZZp&P4fj=tm6fX)SG5H>OsQf_I8c~uGCig$GzuwViK54bcgL;VN|FnyQl>Ed7(@>=8$a_UKIz|V6CeVSd2(P z0Uu>A8A+muM%HLFJQ9UZ5c)BSAv_zH#1f02x?h9C}@pN@6{>UiAp>({Fn(T9Q8B z^`zB;kJ5b`>%dLm+Ol}ty!3;8f1XDSVX0AUe5P#@I+FQ-`$(a;zNgz)4x5hz$Hfbg z!Q(z26wHLXko(1`;(BAOg_wShpX0ixfWq3ponndY+u%1gyX)_h=v1zR#V}#q{au6; z!3K=7fQwnRfg6FXtNQmP>`<;!N137paFS%y?;lb1@BEdbvQHYC{976l`cLqn;b8lp zIDY>~m{gDj(wfnK!lpW6pli)HyLEiUrNc%eXTil|F2s(AY+LW5hkKb>TQ3|Q4S9rr zpDs4uK_co6XPsn_z$LeS{K4jFF`2>U`tbgKdyDne`xmR<@6AA+_hPNKCOR-Zqv;xk zu5!HsBUb^!4uJ7v0RuH-7?l?}b=w5lzzXJ~gZcxRKOovSk@|#V+MuX%Y+=;14i*%{)_gSW9(#4%)AV#3__kac1|qUy!uyP{>?U#5wYNq}y$S9pCc zFc~4mgSC*G~j0u#qqp9 z${>3HV~@->GqEhr_Xwoxq?Hjn#=s2;i~g^&Hn|aDKpA>Oc%HlW(KA1?BXqpxB;Ydx)w;2z^MpjJ(Qi(X!$5RC z*P{~%JGDQqojV>2JbEeCE*OEu!$XJ>bWA9Oa_Hd;y)F%MhBRi*LPcdqR8X`NQ&1L# z5#9L*@qxrx8n}LfeB^J{%-?SU{FCwiWyHp682F+|pa+CQa3ZLzBqN1{)h4d6+vBbV zC#NEbQLC;}me3eeYnOG*nXOJZEU$xLZ1<1Y=7r0(-U0P6-AqwMAM`a(Ed#7vJkn6plb4eI4?2y3yOTGmmDQ!z9`wzbf z_OY#0@5=bnep;MV0X_;;SJJWEf^E6Bd^tVJ9znWx&Ks8t*B>AM@?;D4oWUGc z!H*`6d7Cxo6VuyS4Eye&L1ZRhrRmN6Lr`{NL(wDbif|y&z)JN>Fl5#Wi&mMIr5i;x zBx}3YfF>>8EC(fYnmpu~)CYHuHCyr5*`ECap%t@y=jD>!_%3iiE|LN$mK9>- zHdtpy8fGZtkZF?%TW~29JIAfi2jZT8>OA7=h;8T{{k?c2`nCEx9$r zS+*&vt~2o^^J+}RDG@+9&M^K*z4p{5#IEVbz`1%`m5c2};aGt=V?~vIM}ZdPECDI)47|CWBCfDWUbxBCnmYivQ*0Nu_xb*C>~C9(VjHM zxe<*D<#dQ8TlpMX2c@M<9$w!RP$hpG4cs%AI){jp*Sj|*`m)5(Bw*A0$*i-(CA5#%>a)$+jI2C9r6|(>J8InryENI z$NohnxDUB;wAYDwrb*!N3noBTKPpPN}~09SEL18tkG zxgz(RYU_;DPT{l?Q$+eaZaxnsWCA^ds^0PVRkIM%bOd|G2IEBBiz{&^JtNsODs;5z zICt_Zj8wo^KT$7Bg4H+y!Df#3mbl%%?|EXe!&(Vmac1DJ*y~3+kRKAD=Ovde4^^%~ zw<9av18HLyrf*_>Slp;^i`Uy~`mvBjZ|?Ad63yQa#YK`4+c6;pW4?XIY9G1(Xh9WO8{F-Aju+nS9Vmv=$Ac0ienZ+p9*O%NG zMZKy5?%Z6TAJTE?o5vEr0r>f>hb#2w2U3DL64*au_@P!J!TL`oH2r*{>ffu6|A7tv zL4juf$DZ1MW5ZPsG!5)`k8d8c$J$o;%EIL0va9&GzWvkS%ZsGb#S(?{!UFOZ9<$a| zY|a+5kmD5N&{vRqkgY>aHsBT&`rg|&kezoD)gP0fsNYHsO#TRc_$n6Lf1Z{?+DLziXlHrq4sf(!>O{?Tj;Eh@%)+nRE_2VxbN&&%%caU#JDU%vL3}Cb zsb4AazPI{>8H&d=jUaZDS$-0^AxE@utGs;-Ez_F(qC9T=UZX=>ok2k2 ziTn{K?y~a5reD2A)P${NoI^>JXn>`IeArow(41c-Wm~)wiryEP(OS{YXWi7;%dG9v zI?mwu1MxD{yp_rrk!j^cKM)dc4@p4Ezyo%lRN|XyD}}>v=Xoib0gOcdXrQ^*61HNj z=NP|pd>@yfvr-=m{8$3A8TQGMTE7g=z!%yt`8`Bk-0MMwW~h^++;qyUP!J~ykh1GO z(FZ59xuFR$(WE;F@UUyE@Sp>`aVNjyj=Ty>_Vo}xf`e7`F;j-IgL5`1~-#70$9_=uBMq!2&1l zomRgpD58@)YYfvLtPW}{C5B35R;ZVvB<<#)x%srmc_S=A7F@DW8>QOEGwD6suhwCg z>Pa+YyULhmw%BA*4yjDp|2{!T98~<6Yfd(wo1mQ!KWwq0eg+6)o1>W~f~kL<-S+P@$wx*zeI|1t7z#Sxr5 zt6w+;YblPQNplq4Z#T$GLX#j6yldXAqj>4gAnnWtBICUnA&-dtnlh=t0Ho_vEKwV` z)DlJi#!@nkYV#$!)@>udAU*hF?V`2$Hf=V&6PP_|r#Iv*J$9)pF@X3`k;5})9^o4y z&)~?EjX5yX12O(BsFy-l6}nYeuKkiq`u9145&3Ssg^y{5G3Pse z9w(YVa0)N-fLaBq1`P!_#>SS(8fh_5!f{UrgZ~uEdeMJIz7DzI5!NHHqQtm~#CPij z?=N|J>nPR6_sL7!f4hD_|KH`vf8(Wpnj-(gPWH+ZvID}%?~68SwhPTC3u1_cB`otq z)U?6qo!ZLi5b>*KnYHWW=3F!p%h1;h{L&(Q&{qY6)_qxNfbP6E3yYpW!EO+IW3?@J z);4>g4gnl^8klu7uA>eGF6rIGSynacogr)KUwE_R4E5Xzi*Qir@b-jy55-JPC8c~( zo!W8y9OGZ&`xmc8;=4-U9=h{vCqfCNzYirONmGbRQlR`WWlgnY+1wCXbMz&NT~9*| z6@FrzP!LX&{no2!Ln_3|I==_4`@}V?4a;YZKTdw;vT<+K+z=uWbW(&bXEaWJ^W8Td z-3&1bY^Z*oM<=M}LVt>_j+p=2Iu7pZmbXrhQ_k)ysE9yXKygFNw$5hwDn(M>H+e1&9BM5!|81vd%r%vEm zqxY3?F@fb6O#5UunwgAHR9jp_W2zZ}NGp2%mTW@(hz7$^+a`A?mb8|_G*GNMJ) zjqegXQio=i@AINre&%ofexAr95aop5C+0MZ0m-l=MeO8m3epm7U%vZB8+I+C*iNFM z#T3l`gknX;D$-`2XT^Cg*vrv=RH+P;_dfF++cP?B_msQI4j+lt&rX2)3GaJx%W*Nn zkML%D{z5tpHH=dksQ*gzc|}gzW;lwAbxoR07VNgS*-c3d&8J|;@3t^ zVUz*J*&r7DFRuFVDCJDK8V9NN5hvpgGjwx+5n)qa;YCKe8TKtdnh{I7NU9BCN!0dq zczrBk8pE{{@vJa9ywR@mq*J=v+PG;?fwqlJVhijG!3VmIKs>9T6r7MJpC)m!Tc#>g zMtVsU>wbwFJEfwZ{vB|ZlttNe83)$iz`~#8UJ^r)lJ@HA&G#}W&ZH*;k{=TavpjWE z7hdyLZPf*X%Gm}i`Y{OGeeu^~nB8=`{r#TUrM-`;1cBvEd#d!kPqIgYySYhN-*1;L z^byj%Yi}Gx)Wnkosi337BKs}+5H5dth1JA{Ir-JKN$7zC)*}hqeoD(WfaUDPT>0`- z(6sa0AoIqASwF`>hP}^|)a_j2s^PQn*qVC{Q}htR z5-)duBFXT_V56-+UohKXlq~^6uf!6sA#ttk1o~*QEy_Y-S$gAvq47J9Vtk$5oA$Ct zYhYJ@8{hsC^98${!#Ho?4y5MCa7iGnfz}b9jE~h%EAAv~Qxu)_rAV;^cygV~5r_~?l=B`zObj7S=H=~$W zPtI_m%g$`kL_fVUk9J@>EiBH zOO&jtn~&`hIFMS5S`g8w94R4H40mdNUH4W@@XQk1sr17b{@y|JB*G9z1|CrQjd+GX z6+KyURG3;!*BQrentw{B2R&@2&`2}n(z-2&X7#r!{yg@Soy}cRD~j zj9@UBW+N|4HW4AWapy4wfUI- zZ`gSL6DUlgj*f1hSOGXG0IVH8HxK?o2|3HZ;KW{K+yPAlxtb)NV_2AwJm|E)FRs&& z=c^e7bvUsztY|+f^k7NXs$o1EUq>cR7C0$UKi6IooHWlK_#?IWDkvywnzg&ThWo^? z2O_N{5X39#?eV9l)xI(>@!vSB{DLt*oY!K1R8}_?%+0^C{d9a%N4 zoxHVT1&Lm|uDX%$QrBun5e-F`HJ^T$ zmzv)p@4ZHd_w9!%Hf9UYNvGCw2TTTbrj9pl+T9%-_-}L(tES>Or-}Z4F*{##n3~L~TuxjirGuIY#H7{%$E${?p{Q01 zi6T`n;rbK1yIB9jmQNycD~yZq&mbIsFWHo|ZAChSFPQa<(%d8mGw*V3fh|yFoxOOiWJd(qvVb!Z$b88cg->N=qO*4k~6;R==|9ihg&riu#P~s4Oap9O7f%crSr^rljeIfXDEg>wi)&v*a%7zpz<9w z*r!3q9J|390x`Zk;g$&OeN&ctp)VKRpDSV@kU2Q>jtok($Y-*x8_$2piTxun81@vt z!Vj?COa0fg2RPXMSIo26T=~0d`{oGP*eV+$!0I<(4azk&Vj3SiG=Q!6mX0p$z7I}; z9BJUFgT-K9MQQ-0@Z=^7R<{bn2Fm48endsSs`V7_@%8?Bxkqv>BDoVcj?K#dV#uUP zL1ND~?D-|VGKe3Rw_7-Idpht>H6XRLh*U7epS6byiGvJpr%d}XwfusjH9g;Z98H`x zyde%%5mhGOiL4wljCaWCk-&uE4_OOccb9c!ZaWt4B(wYl!?vyzl%7n~QepN&eFUrw zFIOl9c({``6~QD+43*_tzP{f2x41h(?b43^y6=iwyB)2os5hBE!@YUS5?N_tXd=h( z)WE286Fbd>R4M^P{!G)f;h<3Q>Fipuy+d2q-)!RyTgt;wr$(?9ox3;q+{E*ZQHhOn;lM`cjnu9 zXa48ks-v(~b*;MAI<>YZH(^NV8vjb34beE<_cwKlJoR;k6lJNSP6v}uiyRD?|0w+X@o1ONrH8a$fCxXpf? z?$DL0)7|X}Oc%h^zrMKWc-NS9I0Utu@>*j}b@tJ=ixQSJ={4@854wzW@E>VSL+Y{i z#0b=WpbCZS>kUCO_iQz)LoE>P5LIG-hv9E+oG}DtlIDF>$tJ1aw9^LuhLEHt?BCj& z(O4I8v1s#HUi5A>nIS-JK{v!7dJx)^Yg%XjNmlkWAq2*cv#tHgz`Y(bETc6CuO1VkN^L-L3j_x<4NqYb5rzrLC-7uOv z!5e`GZt%B782C5-fGnn*GhDF$%(qP<74Z}3xx+{$4cYKy2ikxI7B2N+2r07DN;|-T->nU&!=Cm#rZt%O_5c&1Z%nlWq3TKAW0w zQqemZw_ue--2uKQsx+niCUou?HjD`xhEjjQd3%rrBi82crq*~#uA4+>vR<_S{~5ce z-2EIl?~s z1=GVL{NxP1N3%=AOaC}j_Fv=ur&THz zyO!d9kHq|c73kpq`$+t+8Bw7MgeR5~`d7ChYyGCBWSteTB>8WAU(NPYt2Dk`@#+}= zI4SvLlyk#pBgVigEe`?NG*vl7V6m+<}%FwPV=~PvvA)=#ths==DRTDEYh4V5}Cf$z@#;< zyWfLY_5sP$gc3LLl2x+Ii)#b2nhNXJ{R~vk`s5U7Nyu^3yFg&D%Txwj6QezMX`V(x z=C`{76*mNb!qHHs)#GgGZ_7|vkt9izl_&PBrsu@}L`X{95-2jf99K)0=*N)VxBX2q z((vkpP2RneSIiIUEnGb?VqbMb=Zia+rF~+iqslydE34cSLJ&BJW^3knX@M;t*b=EA zNvGzv41Ld_T+WT#XjDB840vovUU^FtN_)G}7v)1lPetgpEK9YS^OWFkPoE{ovj^=@ zO9N$S=G$1ecndT_=5ehth2Lmd1II-PuT~C9`XVePw$y8J#dpZ?Tss<6wtVglm(Ok7 z3?^oi@pPio6l&!z8JY(pJvG=*pI?GIOu}e^EB6QYk$#FJQ%^AIK$I4epJ+9t?KjqA+bkj&PQ*|vLttme+`9G=L% ziadyMw_7-M)hS(3E$QGNCu|o23|%O+VN7;Qggp?PB3K-iSeBa2b}V4_wY`G1Jsfz4 z9|SdB^;|I8E8gWqHKx!vj_@SMY^hLEIbSMCuE?WKq=c2mJK z8LoG-pnY!uhqFv&L?yEuxo{dpMTsmCn)95xanqBrNPTgXP((H$9N${Ow~Is-FBg%h z53;|Y5$MUN)9W2HBe2TD`ct^LHI<(xWrw}$qSoei?}s)&w$;&!14w6B6>Yr6Y8b)S z0r71`WmAvJJ`1h&poLftLUS6Ir zC$bG9!Im_4Zjse)#K=oJM9mHW1{%l8sz$1o?ltdKlLTxWWPB>Vk22czVt|1%^wnN@*!l)}?EgtvhC>vlHm^t+ogpgHI1_$1ox9e;>0!+b(tBrmXRB`PY1vp-R**8N7 zGP|QqI$m(Rdu#=(?!(N}G9QhQ%o!aXE=aN{&wtGP8|_qh+7a_j_sU5|J^)vxq;# zjvzLn%_QPHZZIWu1&mRAj;Sa_97p_lLq_{~j!M9N^1yp3U_SxRqK&JnR%6VI#^E12 z>CdOVI^_9aPK2eZ4h&^{pQs}xsijXgFYRIxJ~N7&BB9jUR1fm!(xl)mvy|3e6-B3j zJn#ajL;bFTYJ2+Q)tDjx=3IklO@Q+FFM}6UJr6km7hj7th9n_&JR7fnqC!hTZoM~T zBeaVFp%)0cbPhejX<8pf5HyRUj2>aXnXBqDJe73~J%P(2C?-RT{c3NjE`)om! zl$uewSgWkE66$Kb34+QZZvRn`fob~Cl9=cRk@Es}KQm=?E~CE%spXaMO6YmrMl%9Q zlA3Q$3|L1QJ4?->UjT&CBd!~ru{Ih^in&JXO=|<6J!&qp zRe*OZ*cj5bHYlz!!~iEKcuE|;U4vN1rk$xq6>bUWD*u(V@8sG^7>kVuo(QL@Ki;yL zWC!FT(q{E8#on>%1iAS0HMZDJg{Z{^!De(vSIq&;1$+b)oRMwA3nc3mdTSG#3uYO_ z>+x;7p4I;uHz?ZB>dA-BKl+t-3IB!jBRgdvAbW!aJ(Q{aT>+iz?91`C-xbe)IBoND z9_Xth{6?(y3rddwY$GD65IT#f3<(0o#`di{sh2gm{dw*#-Vnc3r=4==&PU^hCv$qd zjw;>i&?L*Wq#TxG$mFIUf>eK+170KG;~+o&1;Tom9}}mKo23KwdEM6UonXgc z!6N(@k8q@HPw{O8O!lAyi{rZv|DpgfU{py+j(X_cwpKqcalcqKIr0kM^%Br3SdeD> zHSKV94Yxw;pjzDHo!Q?8^0bb%L|wC;4U^9I#pd5O&eexX+Im{ z?jKnCcsE|H?{uGMqVie_C~w7GX)kYGWAg%-?8|N_1#W-|4F)3YTDC+QSq1s!DnOML3@d`mG%o2YbYd#jww|jD$gotpa)kntakp#K;+yo-_ZF9qrNZw<%#C zuPE@#3RocLgPyiBZ+R_-FJ_$xP!RzWm|aN)S+{$LY9vvN+IW~Kf3TsEIvP+B9Mtm! zpfNNxObWQpLoaO&cJh5>%slZnHl_Q~(-Tfh!DMz(dTWld@LG1VRF`9`DYKhyNv z2pU|UZ$#_yUx_B_|MxUq^glT}O5Xt(Vm4Mr02><%C)@v;vPb@pT$*yzJ4aPc_FZ3z z3}PLoMBIM>q_9U2rl^sGhk1VUJ89=*?7|v`{!Z{6bqFMq(mYiA?%KbsI~JwuqVA9$H5vDE+VocjX+G^%bieqx->s;XWlKcuv(s%y%D5Xbc9+ zc(_2nYS1&^yL*ey664&4`IoOeDIig}y-E~_GS?m;D!xv5-xwz+G`5l6V+}CpeJDi^ z%4ed$qowm88=iYG+(`ld5Uh&>Dgs4uPHSJ^TngXP_V6fPyl~>2bhi20QB%lSd#yYn zO05?KT1z@?^-bqO8Cg`;ft>ilejsw@2%RR7;`$Vs;FmO(Yr3Fp`pHGr@P2hC%QcA|X&N2Dn zYf`MqXdHi%cGR@%y7Rg7?d3?an){s$zA{!H;Ie5exE#c~@NhQUFG8V=SQh%UxUeiV zd7#UcYqD=lk-}sEwlpu&H^T_V0{#G?lZMxL7ih_&{(g)MWBnCZxtXg znr#}>U^6!jA%e}@Gj49LWG@*&t0V>Cxc3?oO7LSG%~)Y5}f7vqUUnQ;STjdDU}P9IF9d9<$;=QaXc zL1^X7>fa^jHBu_}9}J~#-oz3Oq^JmGR#?GO7b9a(=R@fw@}Q{{@`Wy1vIQ#Bw?>@X z-_RGG@wt|%u`XUc%W{J z>iSeiz8C3H7@St3mOr_mU+&bL#Uif;+Xw-aZdNYUpdf>Rvu0i0t6k*}vwU`XNO2he z%miH|1tQ8~ZK!zmL&wa3E;l?!!XzgV#%PMVU!0xrDsNNZUWKlbiOjzH-1Uoxm8E#r`#2Sz;-o&qcqB zC-O_R{QGuynW14@)7&@yw1U}uP(1cov)twxeLus0s|7ayrtT8c#`&2~Fiu2=R;1_4bCaD=*E@cYI>7YSnt)nQc zohw5CsK%m?8Ack)qNx`W0_v$5S}nO|(V|RZKBD+btO?JXe|~^Qqur%@eO~<8-L^9d z=GA3-V14ng9L29~XJ>a5k~xT2152zLhM*@zlp2P5Eu}bywkcqR;ISbas&#T#;HZSf z2m69qTV(V@EkY(1Dk3`}j)JMo%ZVJ*5eB zYOjIisi+igK0#yW*gBGj?@I{~mUOvRFQR^pJbEbzFxTubnrw(Muk%}jI+vXmJ;{Q6 zrSobKD>T%}jV4Ub?L1+MGOD~0Ir%-`iTnWZN^~YPrcP5y3VMAzQ+&en^VzKEb$K!Q z<7Dbg&DNXuow*eD5yMr+#08nF!;%4vGrJI++5HdCFcGLfMW!KS*Oi@=7hFwDG!h2< zPunUEAF+HncQkbfFj&pbzp|MU*~60Z(|Ik%Tn{BXMN!hZOosNIseT?R;A`W?=d?5X zK(FB=9mZusYahp|K-wyb={rOpdn=@;4YI2W0EcbMKyo~-#^?h`BA9~o285%oY zfifCh5Lk$SY@|2A@a!T2V+{^!psQkx4?x0HSV`(w9{l75QxMk!)U52Lbhn{8ol?S) zCKo*7R(z!uk<6*qO=wh!Pul{(qq6g6xW;X68GI_CXp`XwO zxuSgPRAtM8K7}5E#-GM!*ydOOG_{A{)hkCII<|2=ma*71ci_-}VPARm3crFQjLYV! z9zbz82$|l01mv`$WahE2$=fAGWkd^X2kY(J7iz}WGS z@%MyBEO=A?HB9=^?nX`@nh;7;laAjs+fbo!|K^mE!tOB>$2a_O0y-*uaIn8k^6Y zSbuv;5~##*4Y~+y7Z5O*3w4qgI5V^17u*ZeupVGH^nM&$qmAk|anf*>r zWc5CV;-JY-Z@Uq1Irpb^O`L_7AGiqd*YpGUShb==os$uN3yYvb`wm6d=?T*it&pDk zo`vhw)RZX|91^^Wa_ti2zBFyWy4cJu#g)_S6~jT}CC{DJ_kKpT`$oAL%b^!2M;JgT zM3ZNbUB?}kP(*YYvXDIH8^7LUxz5oE%kMhF!rnPqv!GiY0o}NR$OD=ITDo9r%4E>E0Y^R(rS^~XjWyVI6 zMOR5rPXhTp*G*M&X#NTL`Hu*R+u*QNoiOKg4CtNPrjgH>c?Hi4MUG#I917fx**+pJfOo!zFM&*da&G_x)L(`k&TPI*t3e^{crd zX<4I$5nBQ8Ax_lmNRa~E*zS-R0sxkz`|>7q_?*e%7bxqNm3_eRG#1ae3gtV9!fQpY z+!^a38o4ZGy9!J5sylDxZTx$JmG!wg7;>&5H1)>f4dXj;B+@6tMlL=)cLl={jLMxY zbbf1ax3S4>bwB9-$;SN2?+GULu;UA-35;VY*^9Blx)Jwyb$=U!D>HhB&=jSsd^6yw zL)?a|>GxU!W}ocTC(?-%z3!IUhw^uzc`Vz_g>-tv)(XA#JK^)ZnC|l1`@CdX1@|!| z_9gQ)7uOf?cR@KDp97*>6X|;t@Y`k_N@)aH7gY27)COv^P3ya9I{4z~vUjLR9~z1Z z5=G{mVtKH*&$*t0@}-i_v|3B$AHHYale7>E+jP`ClqG%L{u;*ff_h@)al?RuL7tOO z->;I}>%WI{;vbLP3VIQ^iA$4wl6@0sDj|~112Y4OFjMs`13!$JGkp%b&E8QzJw_L5 zOnw9joc0^;O%OpF$Qp)W1HI!$4BaXX84`%@#^dk^hFp^pQ@rx4g(8Xjy#!X%+X5Jd@fs3amGT`}mhq#L97R>OwT5-m|h#yT_-v@(k$q7P*9X~T*3)LTdzP!*B} z+SldbVWrrwQo9wX*%FyK+sRXTa@O?WM^FGWOE?S`R(0P{<6p#f?0NJvnBia?k^fX2 zNQs7K-?EijgHJY}&zsr;qJ<*PCZUd*x|dD=IQPUK_nn)@X4KWtqoJNHkT?ZWL_hF? zS8lp2(q>;RXR|F;1O}EE#}gCrY~#n^O`_I&?&z5~7N;zL0)3Tup`%)oHMK-^r$NT% zbFg|o?b9w(q@)6w5V%si<$!U<#}s#x@0aX-hP>zwS#9*75VXA4K*%gUc>+yzupTDBOKH8WR4V0pM(HrfbQ&eJ79>HdCvE=F z|J>s;;iDLB^3(9}?biKbxf1$lI!*Z%*0&8UUq}wMyPs_hclyQQi4;NUY+x2qy|0J; zhn8;5)4ED1oHwg+VZF|80<4MrL97tGGXc5Sw$wAI#|2*cvQ=jB5+{AjMiDHmhUC*a zlmiZ`LAuAn_}hftXh;`Kq0zblDk8?O-`tnilIh|;3lZp@F_osJUV9`*R29M?7H{Fy z`nfVEIDIWXmU&YW;NjU8)EJpXhxe5t+scf|VXM!^bBlwNh)~7|3?fWwo_~ZFk(22% zTMesYw+LNx3J-_|DM~`v93yXe=jPD{q;li;5PD?Dyk+b? zo21|XpT@)$BM$%F=P9J19Vi&1#{jM3!^Y&fr&_`toi`XB1!n>sbL%U9I5<7!@?t)~ z;&H%z>bAaQ4f$wIzkjH70;<8tpUoxzKrPhn#IQfS%9l5=Iu))^XC<58D!-O z{B+o5R^Z21H0T9JQ5gNJnqh#qH^na|z92=hONIM~@_iuOi|F>jBh-?aA20}Qx~EpDGElELNn~|7WRXRFnw+Wdo`|# zBpU=Cz3z%cUJ0mx_1($X<40XEIYz(`noWeO+x#yb_pwj6)R(__%@_Cf>txOQ74wSJ z0#F3(zWWaR-jMEY$7C*3HJrohc79>MCUu26mfYN)f4M~4gD`}EX4e}A!U}QV8!S47 z6y-U-%+h`1n`*pQuKE%Av0@)+wBZr9mH}@vH@i{v(m-6QK7Ncf17x_D=)32`FOjjo zg|^VPf5c6-!FxN{25dvVh#fog=NNpXz zfB$o+0jbRkHH{!TKhE709f+jI^$3#v1Nmf80w`@7-5$1Iv_`)W^px8P-({xwb;D0y z7LKDAHgX<84?l!I*Dvi2#D@oAE^J|g$3!)x1Ua;_;<@#l1fD}lqU2_tS^6Ht$1Wl} zBESo7o^)9-Tjuz$8YQSGhfs{BQV6zW7dA?0b(Dbt=UnQs&4zHfe_sj{RJ4uS-vQpC zX;Bbsuju4%!o8?&m4UZU@~ZZjeFF6ex2ss5_60_JS_|iNc+R0GIjH1@Z z=rLT9%B|WWgOrR7IiIwr2=T;Ne?30M!@{%Qf8o`!>=s<2CBpCK_TWc(DX51>e^xh8 z&@$^b6CgOd7KXQV&Y4%}_#uN*mbanXq(2=Nj`L7H7*k(6F8s6{FOw@(DzU`4-*77{ zF+dxpv}%mFpYK?>N_2*#Y?oB*qEKB}VoQ@bzm>ptmVS_EC(#}Lxxx730trt0G)#$b zE=wVvtqOct1%*9}U{q<)2?{+0TzZzP0jgf9*)arV)*e!f`|jgT{7_9iS@e)recI#z zbzolURQ+TOzE!ymqvBY7+5NnAbWxvMLsLTwEbFqW=CPyCsmJ}P1^V30|D5E|p3BC5 z)3|qgw@ra7aXb-wsa|l^in~1_fm{7bS9jhVRkYVO#U{qMp z)Wce+|DJ}4<2gp8r0_xfZpMo#{Hl2MfjLcZdRB9(B(A(f;+4s*FxV{1F|4d`*sRNd zp4#@sEY|?^FIJ;tmH{@keZ$P(sLh5IdOk@k^0uB^BWr@pk6mHy$qf&~rI>P*a;h0C{%oA*i!VjWn&D~O#MxN&f@1Po# zKN+ zrGrkSjcr?^R#nGl<#Q722^wbYcgW@{+6CBS<1@%dPA8HC!~a`jTz<`g_l5N1M@9wn9GOAZ>nqNgq!yOCbZ@1z`U_N`Z>}+1HIZxk*5RDc&rd5{3qjRh8QmT$VyS;jK z;AF+r6XnnCp=wQYoG|rT2@8&IvKq*IB_WvS%nt%e{MCFm`&W*#LXc|HrD?nVBo=(8*=Aq?u$sDA_sC_RPDUiQ+wnIJET8vx$&fxkW~kP9qXKt zozR)@xGC!P)CTkjeWvXW5&@2?)qt)jiYWWBU?AUtzAN}{JE1I)dfz~7$;}~BmQF`k zpn11qmObXwRB8&rnEG*#4Xax3XBkKlw(;tb?Np^i+H8m(Wyz9k{~ogba@laiEk;2! zV*QV^6g6(QG%vX5Um#^sT&_e`B1pBW5yVth~xUs#0}nv?~C#l?W+9Lsb_5)!71rirGvY zTIJ$OPOY516Y|_014sNv+Z8cc5t_V=i>lWV=vNu#!58y9Zl&GsMEW#pPYPYGHQ|;vFvd*9eM==$_=vc7xnyz0~ zY}r??$<`wAO?JQk@?RGvkWVJlq2dk9vB(yV^vm{=NVI8dhsX<)O(#nr9YD?I?(VmQ z^r7VfUBn<~p3()8yOBjm$#KWx!5hRW)5Jl7wY@ky9lNM^jaT##8QGVsYeaVywmpv>X|Xj7gWE1Ezai&wVLt3p)k4w~yrskT-!PR!kiyQlaxl(( zXhF%Q9x}1TMt3~u@|#wWm-Vq?ZerK={8@~&@9r5JW}r#45#rWii};t`{5#&3$W)|@ zbAf2yDNe0q}NEUvq_Quq3cTjcw z@H_;$hu&xllCI9CFDLuScEMg|x{S7GdV8<&Mq=ezDnRZAyX-8gv97YTm0bg=d)(>N z+B2FcqvI9>jGtnK%eO%y zoBPkJTk%y`8TLf4)IXPBn`U|9>O~WL2C~C$z~9|0m*YH<-vg2CD^SX#&)B4ngOSG$ zV^wmy_iQk>dfN@Pv(ckfy&#ak@MLC7&Q6Ro#!ezM*VEh`+b3Jt%m(^T&p&WJ2Oqvj zs-4nq0TW6cv~(YI$n0UkfwN}kg3_fp?(ijSV#tR9L0}l2qjc7W?i*q01=St0eZ=4h zyGQbEw`9OEH>NMuIe)hVwYHsGERWOD;JxEiO7cQv%pFCeR+IyhwQ|y@&^24k+|8fD zLiOWFNJ2&vu2&`Jv96_z-Cd5RLgmeY3*4rDOQo?Jm`;I_(+ejsPM03!ly!*Cu}Cco zrQSrEDHNyzT(D5s1rZq!8#?f6@v6dB7a-aWs(Qk>N?UGAo{gytlh$%_IhyL7h?DLXDGx zgxGEBQoCAWo-$LRvM=F5MTle`M})t3vVv;2j0HZY&G z22^iGhV@uaJh(XyyY%} zd4iH_UfdV#T=3n}(Lj^|n;O4|$;xhu*8T3hR1mc_A}fK}jfZ7LX~*n5+`8N2q#rI$ z@<_2VANlYF$vIH$ zl<)+*tIWW78IIINA7Rr7i{<;#^yzxoLNkXL)eSs=%|P>$YQIh+ea_3k z_s7r4%j7%&*NHSl?R4k%1>Z=M9o#zxY!n8sL5>BO-ZP;T3Gut>iLS@U%IBrX6BA3k z)&@q}V8a{X<5B}K5s(c(LQ=%v1ocr`t$EqqY0EqVjr65usa=0bkf|O#ky{j3)WBR(((L^wmyHRzoWuL2~WTC=`yZ zn%VX`L=|Ok0v7?s>IHg?yArBcync5rG#^+u)>a%qjES%dRZoIyA8gQ;StH z1Ao7{<&}6U=5}4v<)1T7t!J_CL%U}CKNs-0xWoTTeqj{5{?Be$L0_tk>M9o8 zo371}S#30rKZFM{`H_(L`EM9DGp+Mifk&IP|C2Zu_)Ghr4Qtpmkm1osCf@%Z$%t+7 zYH$Cr)Ro@3-QDeQJ8m+x6%;?YYT;k6Z0E-?kr>x33`H%*ueBD7Zx~3&HtWn0?2Wt} zTG}*|v?{$ajzt}xPzV%lL1t-URi8*Zn)YljXNGDb>;!905Td|mpa@mHjIH%VIiGx- zd@MqhpYFu4_?y5N4xiHn3vX&|e6r~Xt> zZG`aGq|yTNjv;9E+Txuoa@A(9V7g?1_T5FzRI;!=NP1Kqou1z5?%X~Wwb{trRfd>i z8&y^H)8YnKyA_Fyx>}RNmQIczT?w2J4SNvI{5J&}Wto|8FR(W;Qw#b1G<1%#tmYzQ zQ2mZA-PAdi%RQOhkHy9Ea#TPSw?WxwL@H@cbkZwIq0B!@ns}niALidmn&W?!Vd4Gj zO7FiuV4*6Mr^2xlFSvM;Cp_#r8UaqIzHJQg_z^rEJw&OMm_8NGAY2)rKvki|o1bH~ z$2IbfVeY2L(^*rMRU1lM5Y_sgrDS`Z??nR2lX;zyR=c%UyGb*%TC-Dil?SihkjrQy~TMv6;BMs7P8il`H7DmpVm@rJ;b)hW)BL)GjS154b*xq-NXq2cwE z^;VP7ua2pxvCmxrnqUYQMH%a%nHmwmI33nJM(>4LznvY*k&C0{8f*%?zggpDgkuz&JBx{9mfb@wegEl2v!=}Sq2Gaty0<)UrOT0{MZtZ~j5y&w zXlYa_jY)I_+VA-^#mEox#+G>UgvM!Ac8zI<%JRXM_73Q!#i3O|)lOP*qBeJG#BST0 zqohi)O!|$|2SeJQo(w6w7%*92S})XfnhrH_Z8qe!G5>CglP=nI7JAOW?(Z29;pXJ9 zR9`KzQ=WEhy*)WH>$;7Cdz|>*i>=##0bB)oU0OR>>N<21e4rMCHDemNi2LD>Nc$;& zQRFthpWniC1J6@Zh~iJCoLOxN`oCKD5Q4r%ynwgUKPlIEd#?QViIqovY|czyK8>6B zSP%{2-<;%;1`#0mG^B(8KbtXF;Nf>K#Di72UWE4gQ%(_26Koiad)q$xRL~?pN71ZZ zujaaCx~jXjygw;rI!WB=xrOJO6HJ!!w}7eiivtCg5K|F6$EXa)=xUC za^JXSX98W`7g-tm@uo|BKj39Dl;sg5ta;4qjo^pCh~{-HdLl6qI9Ix6f$+qiZ$}s= zNguKrU;u+T@ko(Vr1>)Q%h$?UKXCY>3se%&;h2osl2D zE4A9bd7_|^njDd)6cI*FupHpE3){4NQ*$k*cOWZ_?CZ>Z4_fl@n(mMnYK62Q1d@+I zr&O))G4hMihgBqRIAJkLdk(p(D~X{-oBUA+If@B}j& zsHbeJ3RzTq96lB7d($h$xTeZ^gP0c{t!Y0c)aQE;$FY2!mACg!GDEMKXFOPI^)nHZ z`aSPJpvV0|bbrzhWWkuPURlDeN%VT8tndV8?d)eN*i4I@u zVKl^6{?}A?P)Fsy?3oi#clf}L18t;TjNI2>eI&(ezDK7RyqFxcv%>?oxUlonv(px) z$vnPzRH`y5A(x!yOIfL0bmgeMQB$H5wenx~!ujQK*nUBW;@Em&6Xv2%s(~H5WcU2R z;%Nw<$tI)a`Ve!>x+qegJnQsN2N7HaKzrFqM>`6R*gvh%O*-%THt zrB$Nk;lE;z{s{r^PPm5qz(&lM{sO*g+W{sK+m3M_z=4=&CC>T`{X}1Vg2PEfSj2x_ zmT*(x;ov%3F?qoEeeM>dUn$a*?SIGyO8m806J1W1o+4HRhc2`9$s6hM#qAm zChQ87b~GEw{ADfs+5}FJ8+|bIlIv(jT$Ap#hSHoXdd9#w<#cA<1Rkq^*EEkknUd4& zoIWIY)sAswy6fSERVm&!SO~#iN$OgOX*{9@_BWFyJTvC%S++ilSfCrO(?u=Dc?CXZ zzCG&0yVR{Z`|ZF0eEApWEo#s9osV>F{uK{QA@BES#&;#KsScf>y zvs?vIbI>VrT<*!;XmQS=bhq%46-aambZ(8KU-wOO2=en~D}MCToB_u;Yz{)1ySrPZ z@=$}EvjTdzTWU7c0ZI6L8=yP+YRD_eMMos}b5vY^S*~VZysrkq<`cK3>>v%uy7jgq z0ilW9KjVDHLv0b<1K_`1IkbTOINs0=m-22c%M~l=^S}%hbli-3?BnNq?b`hx^HX2J zIe6ECljRL0uBWb`%{EA=%!i^4sMcj+U_TaTZRb+~GOk z^ZW!nky0n*Wb*r+Q|9H@ml@Z5gU&W`(z4-j!OzC1wOke`TRAYGZVl$PmQ16{3196( zO*?`--I}Qf(2HIwb2&1FB^!faPA2=sLg(@6P4mN)>Dc3i(B0;@O-y2;lM4akD>@^v z=u>*|!s&9zem70g7zfw9FXl1bpJW(C#5w#uy5!V?Q(U35A~$dR%LDVnq@}kQm13{} zd53q3N(s$Eu{R}k2esbftfjfOITCL;jWa$}(mmm}d(&7JZ6d3%IABCapFFYjdEjdK z&4Edqf$G^MNAtL=uCDRs&Fu@FXRgX{*0<(@c3|PNHa>L%zvxWS={L8%qw`STm+=Rd zA}FLspESSIpE_^41~#5yI2bJ=9`oc;GIL!JuW&7YetZ?0H}$$%8rW@*J37L-~Rsx!)8($nI4 zZhcZ2^=Y+p4YPl%j!nFJA|*M^gc(0o$i3nlphe+~-_m}jVkRN{spFs(o0ajW@f3K{ zDV!#BwL322CET$}Y}^0ixYj2w>&Xh12|R8&yEw|wLDvF!lZ#dOTHM9pK6@Nm-@9Lnng4ZHBgBSrr7KI8YCC9DX5Kg|`HsiwJHg2(7#nS;A{b3tVO?Z% za{m5b3rFV6EpX;=;n#wltDv1LE*|g5pQ+OY&*6qCJZc5oDS6Z6JD#6F)bWxZSF@q% z+1WV;m!lRB!n^PC>RgQCI#D1br_o^#iPk>;K2hB~0^<~)?p}LG%kigm@moD#q3PE+ zA^Qca)(xnqw6x>XFhV6ku9r$E>bWNrVH9fum0?4s?Rn2LG{Vm_+QJHse6xa%nzQ?k zKug4PW~#Gtb;#5+9!QBgyB@q=sk9=$S{4T>wjFICStOM?__fr+Kei1 z3j~xPqW;W@YkiUM;HngG!;>@AITg}vAE`M2Pj9Irl4w1fo4w<|Bu!%rh%a(Ai^Zhi zs92>v5;@Y(Zi#RI*ua*h`d_7;byQSa*v9E{2x$<-_=5Z<7{%)}4XExANcz@rK69T0x3%H<@frW>RA8^swA+^a(FxK| zFl3LD*ImHN=XDUkrRhp6RY5$rQ{bRgSO*(vEHYV)3Mo6Jy3puiLmU&g82p{qr0F?ohmbz)f2r{X2|T2 z$4fdQ=>0BeKbiVM!e-lIIs8wVTuC_m7}y4A_%ikI;Wm5$9j(^Y z(cD%U%k)X>_>9~t8;pGzL6L-fmQO@K; zo&vQzMlgY95;1BSkngY)e{`n0!NfVgf}2mB3t}D9@*N;FQ{HZ3Pb%BK6;5#-O|WI( zb6h@qTLU~AbVW#_6?c!?Dj65Now7*pU{h!1+eCV^KCuPAGs28~3k@ueL5+u|Z-7}t z9|lskE`4B7W8wMs@xJa{#bsCGDFoRSNSnmNYB&U7 zVGKWe%+kFB6kb)e;TyHfqtU6~fRg)f|>=5(N36)0+C z`hv65J<$B}WUc!wFAb^QtY31yNleq4dzmG`1wHTj=c*=hay9iD071Hc?oYoUk|M*_ zU1GihAMBsM@5rUJ(qS?9ZYJ6@{bNqJ`2Mr+5#hKf?doa?F|+^IR!8lq9)wS3tF_9n zW_?hm)G(M+MYb?V9YoX^_mu5h-LP^TL^!Q9Z7|@sO(rg_4+@=PdI)WL(B7`!K^ND- z-uIuVDCVEdH_C@c71YGYT^_Scf_dhB8Z2Xy6vGtBSlYud9vggOqv^L~F{BraSE_t} zIkP+Hp2&nH^-MNEs}^`oMLy11`PQW$T|K(`Bu*(f@)mv1-qY(_YG&J2M2<7k;;RK~ zL{Fqj9yCz8(S{}@c)S!65aF<=&eLI{hAMErCx&>i7OeDN>okvegO87OaG{Jmi<|}D zaT@b|0X{d@OIJ7zvT>r+eTzgLq~|Dpu)Z&db-P4z*`M$UL51lf>FLlq6rfG)%doyp z)3kk_YIM!03eQ8Vu_2fg{+osaEJPtJ-s36R+5_AEG12`NG)IQ#TF9c@$99%0iye+ zUzZ57=m2)$D(5Nx!n)=5Au&O0BBgwxIBaeI(mro$#&UGCr<;C{UjJVAbVi%|+WP(a zL$U@TYCxJ=1{Z~}rnW;7UVb7+ZnzgmrogDxhjLGo>c~MiJAWs&&;AGg@%U?Y^0JhL ze(x6Z74JG6FlOFK(T}SXQfhr}RIFl@QXKnIcXYF)5|V~e-}suHILKT-k|<*~Ij|VF zC;t@=uj=hot~*!C68G8hTA%8SzOfETOXQ|3FSaIEjvBJp(A)7SWUi5!Eu#yWgY+;n zlm<$+UDou*V+246_o#V4kMdto8hF%%Lki#zPh}KYXmMf?hrN0;>Mv%`@{0Qn`Ujp) z=lZe+13>^Q!9zT);H<(#bIeRWz%#*}sgUX9P|9($kexOyKIOc`dLux}c$7It4u|Rl z6SSkY*V~g_B-hMPo_ak>>z@AVQ(_N)VY2kB3IZ0G(iDUYw+2d7W^~(Jq}KY=JnWS( z#rzEa&0uNhJ>QE8iiyz;n2H|SV#Og+wEZv=f2%1ELX!SX-(d3tEj$5$1}70Mp<&eI zCkfbByL7af=qQE@5vDVxx1}FSGt_a1DoE3SDI+G)mBAna)KBG4p8Epxl9QZ4BfdAN zFnF|Y(umr;gRgG6NLQ$?ZWgllEeeq~z^ZS7L?<(~O&$5|y)Al^iMKy}&W+eMm1W z7EMU)u^ke(A1#XCV>CZ71}P}0x)4wtHO8#JRG3MA-6g=`ZM!FcICCZ{IEw8Dm2&LQ z1|r)BUG^0GzI6f946RrBlfB1Vs)~8toZf~7)+G;pv&XiUO(%5bm)pl=p>nV^o*;&T z;}@oZSibzto$arQgfkp|z4Z($P>dTXE{4O=vY0!)kDO* zGF8a4wq#VaFpLfK!iELy@?-SeRrdz%F*}hjKcA*y@mj~VD3!it9lhRhX}5YOaR9$} z3mS%$2Be7{l(+MVx3 z(4?h;P!jnRmX9J9sYN#7i=iyj_5q7n#X(!cdqI2lnr8T$IfOW<_v`eB!d9xY1P=2q&WtOXY=D9QYteP)De?S4}FK6#6Ma z=E*V+#s8>L;8aVroK^6iKo=MH{4yEZ_>N-N z`(|;aOATba1^asjxlILk<4}f~`39dBFlxj>Dw(hMYKPO3EEt1@S`1lxFNM+J@uB7T zZ8WKjz7HF1-5&2=l=fqF-*@>n5J}jIxdDwpT?oKM3s8Nr`x8JnN-kCE?~aM1H!hAE z%%w(3kHfGwMnMmNj(SU(w42OrC-euI>Dsjk&jz3ts}WHqmMpzQ3vZrsXrZ|}+MHA7 z068obeXZTsO*6RS@o3x80E4ok``rV^Y3hr&C1;|ZZ0|*EKO`$lECUYG2gVFtUTw)R z4Um<0ZzlON`zTdvVdL#KFoMFQX*a5wM0Czp%wTtfK4Sjs)P**RW&?lP$(<}q%r68Z zS53Y!d@&~ne9O)A^tNrXHhXBkj~$8j%pT1%%mypa9AW5E&s9)rjF4@O3ytH{0z6riz|@< zB~UPh*wRFg2^7EbQrHf0y?E~dHlkOxof_a?M{LqQ^C!i2dawHTPYUE=X@2(3<=OOxs8qn_(y>pU>u^}3y&df{JarR0@VJn0f+U%UiF=$Wyq zQvnVHESil@d|8&R<%}uidGh7@u^(%?$#|&J$pvFC-n8&A>utA=n3#)yMkz+qnG3wd zP7xCnF|$9Dif@N~L)Vde3hW8W!UY0BgT2v(wzp;tlLmyk2%N|0jfG$%<;A&IVrOI< z!L)o>j>;dFaqA3pL}b-Je(bB@VJ4%!JeX@3x!i{yIeIso^=n?fDX`3bU=eG7sTc%g%ye8$v8P@yKE^XD=NYxTb zbf!Mk=h|otpqjFaA-vs5YOF-*GwWPc7VbaOW&stlANnCN8iftFMMrUdYNJ_Bnn5Vt zxfz@Ah|+4&P;reZxp;MmEI7C|FOv8NKUm8njF7Wb6Gi7DeODLl&G~}G4be&*Hi0Qw z5}77vL0P+7-B%UL@3n1&JPxW^d@vVwp?u#gVcJqY9#@-3X{ok#UfW3<1fb%FT`|)V~ggq z(3AUoUS-;7)^hCjdT0Kf{i}h)mBg4qhtHHBti=~h^n^OTH5U*XMgDLIR@sre`AaB$ zg)IGBET_4??m@cx&c~bA80O7B8CHR7(LX7%HThkeC*@vi{-pL%e)yXp!B2InafbDF zjPXf1mko3h59{lT6EEbxKO1Z5GF71)WwowO6kY|6tjSVSWdQ}NsK2x{>i|MKZK8%Q zfu&_0D;CO-Jg0#YmyfctyJ!mRJp)e#@O0mYdp|8x;G1%OZQ3Q847YWTyy|%^cpA;m zze0(5p{tMu^lDkpe?HynyO?a1$_LJl2L&mpeKu%8YvgRNr=%2z${%WThHG=vrWY@4 zsA`OP#O&)TetZ>s%h!=+CE15lOOls&nvC~$Qz0Ph7tHiP;O$i|eDwpT{cp>+)0-|; zY$|bB+Gbel>5aRN3>c0x)4U=|X+z+{ zn*_p*EQoquRL+=+p;=lm`d71&1NqBz&_ph)MXu(Nv6&XE7(RsS)^MGj5Q?Fwude-(sq zjJ>aOq!7!EN>@(fK7EE#;i_BGvli`5U;r!YA{JRodLBc6-`n8K+Fjgwb%sX;j=qHQ z7&Tr!)!{HXoO<2BQrV9Sw?JRaLXV8HrsNevvnf>Y-6|{T!pYLl7jp$-nEE z#X!4G4L#K0qG_4Z;Cj6=;b|Be$hi4JvMH!-voxqx^@8cXp`B??eFBz2lLD8RRaRGh zn7kUfy!YV~p(R|p7iC1Rdgt$_24i0cd-S8HpG|`@my70g^y`gu%#Tf_L21-k?sRRZHK&at(*ED0P8iw{7?R$9~OF$Ko;Iu5)ur5<->x!m93Eb zFYpIx60s=Wxxw=`$aS-O&dCO_9?b1yKiPCQmSQb>T)963`*U+Ydj5kI(B(B?HNP8r z*bfSBpSu)w(Z3j7HQoRjUG(+d=IaE~tv}y14zHHs|0UcN52fT8V_<@2ep_ee{QgZG zmgp8iv4V{k;~8@I%M3<#B;2R>Ef(Gg_cQM7%}0s*^)SK6!Ym+~P^58*wnwV1BW@eG z4sZLqsUvBbFsr#8u7S1r4teQ;t)Y@jnn_m5jS$CsW1um!p&PqAcc8!zyiXHVta9QC zY~wCwCF0U%xiQPD_INKtTb;A|Zf29(mu9NI;E zc-e>*1%(LSXB`g}kd`#}O;veb<(sk~RWL|f3ljxCnEZDdNSTDV6#Td({6l&y4IjKF z^}lIUq*ZUqgTPumD)RrCN{M^jhY>E~1pn|KOZ5((%F)G|*ZQ|r4zIbrEiV%42hJV8 z3xS)=!X1+=olbdGJ=yZil?oXLct8FM{(6ikLL3E%=q#O6(H$p~gQu6T8N!plf!96| z&Q3=`L~>U0zZh;z(pGR2^S^{#PrPxTRHD1RQOON&f)Siaf`GLj#UOk&(|@0?zm;Sx ztsGt8=29-MZs5CSf1l1jNFtNt5rFNZxJPvkNu~2}7*9468TWm>nN9TP&^!;J{-h)_ z7WsHH9|F%I`Pb!>KAS3jQWKfGivTVkMJLO-HUGM_a4UQ_%RgL6WZvrW+Z4ujZn;y@ zz9$=oO!7qVTaQAA^BhX&ZxS*|5dj803M=k&2%QrXda`-Q#IoZL6E(g+tN!6CA!CP* zCpWtCujIea)ENl0liwVfj)Nc<9mV%+e@=d`haoZ*`B7+PNjEbXBkv=B+Pi^~L#EO$D$ZqTiD8f<5$eyb54-(=3 zh)6i8i|jp(@OnRrY5B8t|LFXFQVQ895n*P16cEKTrT*~yLH6Z4e*bZ5otpRDri&+A zfNbK1D5@O=sm`fN=WzWyse!za5n%^+6dHPGX#8DyIK>?9qyX}2XvBWVqbP%%D)7$= z=#$WulZlZR<{m#gU7lwqK4WS1Ne$#_P{b17qe$~UOXCl>5b|6WVh;5vVnR<%d+Lnp z$uEmML38}U4vaW8>shm6CzB(Wei3s#NAWE3)a2)z@i{4jTn;;aQS)O@l{rUM`J@K& l00vQ5JBs~;vo!vr%%-k{2_Fq1Mn4QF81S)AQ99zk{{c4yR+0b! literal 0 HcmV?d00001 diff --git a/android/gradle/wrapper/gradle-wrapper.properties b/android/gradle/wrapper/gradle-wrapper.properties new file mode 100644 index 0000000..1af9e09 --- /dev/null +++ b/android/gradle/wrapper/gradle-wrapper.properties @@ -0,0 +1,7 @@ +distributionBase=GRADLE_USER_HOME +distributionPath=wrapper/dists +distributionUrl=https\://services.gradle.org/distributions/gradle-8.5-bin.zip +networkTimeout=10000 +validateDistributionUrl=true +zipStoreBase=GRADLE_USER_HOME +zipStorePath=wrapper/dists diff --git a/android/gradlew b/android/gradlew new file mode 100755 index 0000000..1aa94a4 --- /dev/null +++ b/android/gradlew @@ -0,0 +1,249 @@ +#!/bin/sh + +# +# Copyright © 2015-2021 the original authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# https://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +############################################################################## +# +# Gradle start up script for POSIX generated by Gradle. +# +# Important for running: +# +# (1) You need a POSIX-compliant shell to run this script. If your /bin/sh is +# noncompliant, but you have some other compliant shell such as ksh or +# bash, then to run this script, type that shell name before the whole +# command line, like: +# +# ksh Gradle +# +# Busybox and similar reduced shells will NOT work, because this script +# requires all of these POSIX shell features: +# * functions; +# * expansions «$var», «${var}», «${var:-default}», «${var+SET}», +# «${var#prefix}», «${var%suffix}», and «$( cmd )»; +# * compound commands having a testable exit status, especially «case»; +# * various built-in commands including «command», «set», and «ulimit». +# +# Important for patching: +# +# (2) This script targets any POSIX shell, so it avoids extensions provided +# by Bash, Ksh, etc; in particular arrays are avoided. +# +# The "traditional" practice of packing multiple parameters into a +# space-separated string is a well documented source of bugs and security +# problems, so this is (mostly) avoided, by progressively accumulating +# options in "$@", and eventually passing that to Java. +# +# Where the inherited environment variables (DEFAULT_JVM_OPTS, JAVA_OPTS, +# and GRADLE_OPTS) rely on word-splitting, this is performed explicitly; +# see the in-line comments for details. +# +# There are tweaks for specific operating systems such as AIX, CygWin, +# Darwin, MinGW, and NonStop. +# +# (3) This script is generated from the Groovy template +# https://github.com/gradle/gradle/blob/HEAD/subprojects/plugins/src/main/resources/org/gradle/api/internal/plugins/unixStartScript.txt +# within the Gradle project. +# +# You can find Gradle at https://github.com/gradle/gradle/. +# +############################################################################## + +# Attempt to set APP_HOME + +# Resolve links: $0 may be a link +app_path=$0 + +# Need this for daisy-chained symlinks. +while + APP_HOME=${app_path%"${app_path##*/}"} # leaves a trailing /; empty if no leading path + [ -h "$app_path" ] +do + ls=$( ls -ld "$app_path" ) + link=${ls#*' -> '} + case $link in #( + /*) app_path=$link ;; #( + *) app_path=$APP_HOME$link ;; + esac +done + +# This is normally unused +# shellcheck disable=SC2034 +APP_BASE_NAME=${0##*/} +# Discard cd standard output in case $CDPATH is set (https://github.com/gradle/gradle/issues/25036) +APP_HOME=$( cd "${APP_HOME:-./}" > /dev/null && pwd -P ) || exit + +# Use the maximum available, or set MAX_FD != -1 to use that value. +MAX_FD=maximum + +warn () { + echo "$*" +} >&2 + +die () { + echo + echo "$*" + echo + exit 1 +} >&2 + +# OS specific support (must be 'true' or 'false'). +cygwin=false +msys=false +darwin=false +nonstop=false +case "$( uname )" in #( + CYGWIN* ) cygwin=true ;; #( + Darwin* ) darwin=true ;; #( + MSYS* | MINGW* ) msys=true ;; #( + NONSTOP* ) nonstop=true ;; +esac + +CLASSPATH=$APP_HOME/gradle/wrapper/gradle-wrapper.jar + + +# Determine the Java command to use to start the JVM. +if [ -n "$JAVA_HOME" ] ; then + if [ -x "$JAVA_HOME/jre/sh/java" ] ; then + # IBM's JDK on AIX uses strange locations for the executables + JAVACMD=$JAVA_HOME/jre/sh/java + else + JAVACMD=$JAVA_HOME/bin/java + fi + if [ ! -x "$JAVACMD" ] ; then + die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME + +Please set the JAVA_HOME variable in your environment to match the +location of your Java installation." + fi +else + JAVACMD=java + if ! command -v java >/dev/null 2>&1 + then + die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. + +Please set the JAVA_HOME variable in your environment to match the +location of your Java installation." + fi +fi + +# Increase the maximum file descriptors if we can. +if ! "$cygwin" && ! "$darwin" && ! "$nonstop" ; then + case $MAX_FD in #( + max*) + # In POSIX sh, ulimit -H is undefined. That's why the result is checked to see if it worked. + # shellcheck disable=SC2039,SC3045 + MAX_FD=$( ulimit -H -n ) || + warn "Could not query maximum file descriptor limit" + esac + case $MAX_FD in #( + '' | soft) :;; #( + *) + # In POSIX sh, ulimit -n is undefined. That's why the result is checked to see if it worked. + # shellcheck disable=SC2039,SC3045 + ulimit -n "$MAX_FD" || + warn "Could not set maximum file descriptor limit to $MAX_FD" + esac +fi + +# Collect all arguments for the java command, stacking in reverse order: +# * args from the command line +# * the main class name +# * -classpath +# * -D...appname settings +# * --module-path (only if needed) +# * DEFAULT_JVM_OPTS, JAVA_OPTS, and GRADLE_OPTS environment variables. + +# For Cygwin or MSYS, switch paths to Windows format before running java +if "$cygwin" || "$msys" ; then + APP_HOME=$( cygpath --path --mixed "$APP_HOME" ) + CLASSPATH=$( cygpath --path --mixed "$CLASSPATH" ) + + JAVACMD=$( cygpath --unix "$JAVACMD" ) + + # Now convert the arguments - kludge to limit ourselves to /bin/sh + for arg do + if + case $arg in #( + -*) false ;; # don't mess with options #( + /?*) t=${arg#/} t=/${t%%/*} # looks like a POSIX filepath + [ -e "$t" ] ;; #( + *) false ;; + esac + then + arg=$( cygpath --path --ignore --mixed "$arg" ) + fi + # Roll the args list around exactly as many times as the number of + # args, so each arg winds up back in the position where it started, but + # possibly modified. + # + # NB: a `for` loop captures its iteration list before it begins, so + # changing the positional parameters here affects neither the number of + # iterations, nor the values presented in `arg`. + shift # remove old arg + set -- "$@" "$arg" # push replacement arg + done +fi + + +# Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. +DEFAULT_JVM_OPTS='"-Xmx64m" "-Xms64m"' + +# Collect all arguments for the java command: +# * DEFAULT_JVM_OPTS, JAVA_OPTS, JAVA_OPTS, and optsEnvironmentVar are not allowed to contain shell fragments, +# and any embedded shellness will be escaped. +# * For example: A user cannot expect ${Hostname} to be expanded, as it is an environment variable and will be +# treated as '${Hostname}' itself on the command line. + +set -- \ + "-Dorg.gradle.appname=$APP_BASE_NAME" \ + -classpath "$CLASSPATH" \ + org.gradle.wrapper.GradleWrapperMain \ + "$@" + +# Stop when "xargs" is not available. +if ! command -v xargs >/dev/null 2>&1 +then + die "xargs is not available" +fi + +# Use "xargs" to parse quoted args. +# +# With -n1 it outputs one arg per line, with the quotes and backslashes removed. +# +# In Bash we could simply go: +# +# readarray ARGS < <( xargs -n1 <<<"$var" ) && +# set -- "${ARGS[@]}" "$@" +# +# but POSIX shell has neither arrays nor command substitution, so instead we +# post-process each arg (as a line of input to sed) to backslash-escape any +# character that might be a shell metacharacter, then use eval to reverse +# that process (while maintaining the separation between arguments), and wrap +# the whole thing up as a single "set" statement. +# +# This will of course break if any of these variables contains a newline or +# an unmatched quote. +# + +eval "set -- $( + printf '%s\n' "$DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS" | + xargs -n1 | + sed ' s~[^-[:alnum:]+,./:=@_]~\\&~g; ' | + tr '\n' ' ' + )" '"$@"' + +exec "$JAVACMD" "$@" diff --git a/android/gradlew.bat b/android/gradlew.bat new file mode 100644 index 0000000..6689b85 --- /dev/null +++ b/android/gradlew.bat @@ -0,0 +1,92 @@ +@rem +@rem Copyright 2015 the original author or authors. +@rem +@rem Licensed under the Apache License, Version 2.0 (the "License"); +@rem you may not use this file except in compliance with the License. +@rem You may obtain a copy of the License at +@rem +@rem https://www.apache.org/licenses/LICENSE-2.0 +@rem +@rem Unless required by applicable law or agreed to in writing, software +@rem distributed under the License is distributed on an "AS IS" BASIS, +@rem WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +@rem See the License for the specific language governing permissions and +@rem limitations under the License. +@rem + +@if "%DEBUG%"=="" @echo off +@rem ########################################################################## +@rem +@rem Gradle startup script for Windows +@rem +@rem ########################################################################## + +@rem Set local scope for the variables with windows NT shell +if "%OS%"=="Windows_NT" setlocal + +set DIRNAME=%~dp0 +if "%DIRNAME%"=="" set DIRNAME=. +@rem This is normally unused +set APP_BASE_NAME=%~n0 +set APP_HOME=%DIRNAME% + +@rem Resolve any "." and ".." in APP_HOME to make it shorter. +for %%i in ("%APP_HOME%") do set APP_HOME=%%~fi + +@rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. +set DEFAULT_JVM_OPTS="-Xmx64m" "-Xms64m" + +@rem Find java.exe +if defined JAVA_HOME goto findJavaFromJavaHome + +set JAVA_EXE=java.exe +%JAVA_EXE% -version >NUL 2>&1 +if %ERRORLEVEL% equ 0 goto execute + +echo. +echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. +echo. +echo Please set the JAVA_HOME variable in your environment to match the +echo location of your Java installation. + +goto fail + +:findJavaFromJavaHome +set JAVA_HOME=%JAVA_HOME:"=% +set JAVA_EXE=%JAVA_HOME%/bin/java.exe + +if exist "%JAVA_EXE%" goto execute + +echo. +echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME% +echo. +echo Please set the JAVA_HOME variable in your environment to match the +echo location of your Java installation. + +goto fail + +:execute +@rem Setup the command line + +set CLASSPATH=%APP_HOME%\gradle\wrapper\gradle-wrapper.jar + + +@rem Execute Gradle +"%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -classpath "%CLASSPATH%" org.gradle.wrapper.GradleWrapperMain %* + +:end +@rem End local scope for the variables with windows NT shell +if %ERRORLEVEL% equ 0 goto mainEnd + +:fail +rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of +rem the _cmd.exe /c_ return code! +set EXIT_CODE=%ERRORLEVEL% +if %EXIT_CODE% equ 0 set EXIT_CODE=1 +if not ""=="%GRADLE_EXIT_CONSOLE%" exit %EXIT_CODE% +exit /b %EXIT_CODE% + +:mainEnd +if "%OS%"=="Windows_NT" endlocal + +:omega diff --git a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/AesAlgorithm.kt b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/AesAlgorithm.kt new file mode 100644 index 0000000..62a1864 --- /dev/null +++ b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/AesAlgorithm.kt @@ -0,0 +1,35 @@ +package com.example.flutter_crypto_algorithm + +import javax.crypto.* +import android.util.* + +class AesAlgorithm { + private val cryptoHelper = CryptoHelper() + + fun encrypt(value: String, privateKey: String, ivKey: String?): String { + val ivSpec = cryptoHelper.genIvKey(ivKey) + val secretKey = cryptoHelper.genSecretKey(CryptoHelper.AES.ALGORITHM, privateKey) + val cipher = Cipher.getInstance(CryptoHelper.AES.TRANSFORMATION) + cipher.init(Cipher.ENCRYPT_MODE, secretKey, ivSpec) + val encryptedBytes = cipher.doFinal(value.toByteArray()) + return Base64.encodeToString(encryptedBytes, Base64.DEFAULT) + } + + fun decrypt(value: String, privateKey: String, ivKey: String?): String { + return try { + val ivSpec = cryptoHelper.genIvKey(ivKey) + val secretKey = cryptoHelper.genSecretKey(CryptoHelper.AES.ALGORITHM, privateKey) + val decodedBytes = Base64.decode(value, Base64.DEFAULT) + val cipher = Cipher.getInstance(CryptoHelper.AES.TRANSFORMATION) + cipher.init(Cipher.DECRYPT_MODE, secretKey, ivSpec) + val decryptedBytes = cipher.doFinal(decodedBytes) + String(decryptedBytes, Charsets.UTF_8) + } catch (e: BadPaddingException) { + CryptoHelper.CONSTANTS.DECRYPTION_ERR_VALID_KEY + } catch (e: IllegalBlockSizeException) { + CryptoHelper.CONSTANTS.DECRYPTION_ERR_INCORRECT_BLOCK_SIZE + } catch (e: Exception) { + CryptoHelper.CONSTANTS.DECRYPTION_ERR_UNEXPECTED_ERROR + } + } +} \ No newline at end of file diff --git a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/CryptoHelper.kt b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/CryptoHelper.kt new file mode 100644 index 0000000..03f44b4 --- /dev/null +++ b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/CryptoHelper.kt @@ -0,0 +1,57 @@ +package com.example.flutter_crypto_algorithm + +import android.util.Base64 +import javax.crypto.KeyGenerator +import javax.crypto.SecretKey +import javax.crypto.spec.* + +class CryptoHelper { + enum class CryptoType { + ENCRYPT, + DECRYPT, + } + + object CONSTANTS { + const val ERR_VALID_KEY = "Invalid key or corrupted data" + const val ERR_INCORRECT_BLOCK_SIZE = "Incorrect block size" + const val ERR_UNEXPECTED_ERROR = "Unexpected error" + const val KEY_256 = 256 + } + + object AES { + const val ALGORITHM = "AES" + const val TRANSFORMATION = "AES/CBC/PKCS5PADDING" + val EMPTY_IV_SPEC = IvParameterSpec(ByteArray(16) { 0x00.toByte() }) + val EMPTY_SECRET_KEY = SecretKeySpec(ByteArray(32) { 0x00 }, "AES") + } + + private fun genExactlyCharacterLengthKey(key: String, length: Int): String { + val bytes = key.toByteArray(Charsets.UTF_8) + val hexString = bytes.joinToString("") { "%02x".format(it) } + val hexLength = hexString.take(length).padEnd(length, '0'); + return hexLength; + } + + fun genSecretKey(algorithmType: String, secretKey: String?): SecretKey? { + return when (algorithmType) { + AES.ALGORITHM -> { + if (secretKey != null) { + val transform = genExactlyCharacterLengthKey(secretKey, 32) + SecretKeySpec(transform.toByteArray(), AES.ALGORITHM) + } else { + AES.EMPTY_SECRET_KEY + } + } + else -> AES.EMPTY_SECRET_KEY + } + } + + fun genIvKey(ivKey: String?): IvParameterSpec { + return if (ivKey != null) { + val transform = genExactlyCharacterLengthKey(ivKey, 16) + IvParameterSpec(transform.toByteArray()) + } else { + AES.EMPTY_IV_SPEC + } + } +} \ No newline at end of file diff --git a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/FlutterCryptoAlgorithmPlugin.kt b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/FlutterCryptoAlgorithmPlugin.kt index db8861b..ca03aad 100644 --- a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/FlutterCryptoAlgorithmPlugin.kt +++ b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/FlutterCryptoAlgorithmPlugin.kt @@ -7,29 +7,92 @@ import io.flutter.plugin.common.MethodCall import io.flutter.plugin.common.MethodChannel import io.flutter.plugin.common.MethodChannel.MethodCallHandler import io.flutter.plugin.common.MethodChannel.Result +import kotlinx.coroutines.* -/** FlutterCryptoAlgorithmPlugin */ -class FlutterCryptoAlgorithmPlugin: FlutterPlugin, MethodCallHandler { - /// The MethodChannel that will the communication between Flutter and native Android - /// - /// This local reference serves to register the plugin with the Flutter Engine and unregister it - /// when the Flutter Engine is detached from the Activity - private lateinit var channel : MethodChannel - - override fun onAttachedToEngine(flutterPluginBinding: FlutterPlugin.FlutterPluginBinding) { - channel = MethodChannel(flutterPluginBinding.binaryMessenger, "flutter_crypto_algorithm") - channel.setMethodCallHandler(this) - } - - override fun onMethodCall(call: MethodCall, result: Result) { - if (call.method == "getPlatformVersion") { - result.success("Android ${android.os.Build.VERSION.RELEASE}") - } else { - result.notImplemented() +class FlutterCryptoAlgorithmPlugin : FlutterPlugin, MethodCallHandler { + private lateinit var channel: MethodChannel + private lateinit var aesAlgorithm: AesAlgorithm + private lateinit var cryptoHelper: CryptoHelper + + private companion object { + const val CRYPTO_CHANNEL = "flutter_crypto_algorithm" + const val ENCRYPT_METHOD = "encrypt" + const val DECRYPT_METHOD = "decrypt" } - } - override fun onDetachedFromEngine(binding: FlutterPlugin.FlutterPluginBinding) { - channel.setMethodCallHandler(null) - } + private val activityScope = CoroutineScope(Dispatchers.Main + SupervisorJob()) + + override fun onAttachedToEngine(flutterPluginBinding: FlutterPlugin.FlutterPluginBinding) { + aesAlgorithm = AesAlgorithm() + cryptoHelper = CryptoHelper() + channel = MethodChannel(flutterPluginBinding.binaryMessenger, CRYPTO_CHANNEL) + channel.setMethodCallHandler(this) + } + + override fun onMethodCall(call: MethodCall, result: Result) { + when (call.method) { + ENCRYPT_METHOD -> { + val value = call.argument("value") + val privateKey = call.argument("privateKey") + val ivKey = call.argument("ivKey") + if (value != null && privateKey != null && ivKey != null) { + activityScope.launch { + flow { + cryptoHelper.encrypt(value, privateKey, ivKey) + }.flowOn(Dispatchers.IO).catch { + result.error( + CryptoHelper.Constants.ERR_VALID_KEY, + "Data to encrypt is null", + null + ) + }.collect { encryptData -> + result.success(encryptData) + } + } + } else { + result.error( + CryptoHelper.Constants.ERR_VALID_KEY, + "Data to encrypt is null", + null + ) + } + } + + DECRYPT_METHOD -> { + val value = call.argument("value") + val privateKey = call.argument("privateKey") + val ivKey = call.argument("ivKey") + if (value != null && privateKey != null && ivKey != null) { + activityScope.launch { + flow { + cryptoHelper.decrypt(value, privateKey, ivKey) + }.flowOn(Dispatchers.IO).catch { + result.error( + CryptoHelper.Constants.ERR_VALID_KEY, + "Data to decrypt is null", + null + ) + }.collect { decryptData -> + result.success(decryptData) + } + } + } else { + result.error( + CryptoHelper.Constants.ERR_VALID_KEY, + "Data to decrypt is null", + null + ) + } + } + + "getPlatformVersion" -> result.success("Android ${android.os.Build.VERSION.RELEASE}") + else -> result.notImplemented() + } + } + + override fun onDetachedFromEngine(binding: FlutterPlugin.FlutterPluginBinding) { + channel.setMethodCallHandler(null) + // Cancel the CoroutineScope to avoid memory leaks + activityScope.cancel() + } } diff --git a/example/ios/Flutter/Debug.xcconfig b/example/ios/Flutter/Debug.xcconfig index 592ceee..ec97fc6 100644 --- a/example/ios/Flutter/Debug.xcconfig +++ b/example/ios/Flutter/Debug.xcconfig @@ -1 +1,2 @@ +#include? "Pods/Target Support Files/Pods-Runner/Pods-Runner.debug.xcconfig" #include "Generated.xcconfig" diff --git a/example/ios/Flutter/Release.xcconfig b/example/ios/Flutter/Release.xcconfig index 592ceee..c4855bf 100644 --- a/example/ios/Flutter/Release.xcconfig +++ b/example/ios/Flutter/Release.xcconfig @@ -1 +1,2 @@ +#include? "Pods/Target Support Files/Pods-Runner/Pods-Runner.release.xcconfig" #include "Generated.xcconfig" diff --git a/example/ios/Podfile b/example/ios/Podfile new file mode 100644 index 0000000..d97f17e --- /dev/null +++ b/example/ios/Podfile @@ -0,0 +1,44 @@ +# Uncomment this line to define a global platform for your project +# platform :ios, '12.0' + +# CocoaPods analytics sends network stats synchronously affecting flutter build latency. +ENV['COCOAPODS_DISABLE_STATS'] = 'true' + +project 'Runner', { + 'Debug' => :debug, + 'Profile' => :release, + 'Release' => :release, +} + +def flutter_root + generated_xcode_build_settings_path = File.expand_path(File.join('..', 'Flutter', 'Generated.xcconfig'), __FILE__) + unless File.exist?(generated_xcode_build_settings_path) + raise "#{generated_xcode_build_settings_path} must exist. If you're running pod install manually, make sure flutter pub get is executed first" + end + + File.foreach(generated_xcode_build_settings_path) do |line| + matches = line.match(/FLUTTER_ROOT\=(.*)/) + return matches[1].strip if matches + end + raise "FLUTTER_ROOT not found in #{generated_xcode_build_settings_path}. Try deleting Generated.xcconfig, then run flutter pub get" +end + +require File.expand_path(File.join('packages', 'flutter_tools', 'bin', 'podhelper'), flutter_root) + +flutter_ios_podfile_setup + +target 'Runner' do + use_frameworks! + use_modular_headers! + + flutter_install_all_ios_pods File.dirname(File.realpath(__FILE__)) + target 'RunnerTests' do + inherit! :search_paths + end +end + +post_install do |installer| + installer.pods_project.targets.each do |target| + flutter_additional_ios_build_settings(target) + end +end diff --git a/ios/flutter_crypto_algorithm.podspec b/ios/flutter_crypto_algorithm.podspec index 67cfbd1..07ff264 100644 --- a/ios/flutter_crypto_algorithm.podspec +++ b/ios/flutter_crypto_algorithm.podspec @@ -20,4 +20,7 @@ A new Flutter plugin project. # Flutter.framework does not contain a i386 slice. s.pod_target_xcconfig = { 'DEFINES_MODULE' => 'YES', 'EXCLUDED_ARCHS[sdk=iphonesimulator*]' => 'i386' } s.swift_version = '5.0' + # Flutter Setup dependency ios + s.dependency "CryptoSwift", "1.8.3" + s.dependency "RxSwift", "6.7.1" end diff --git a/pubspec.yaml b/pubspec.yaml index 2446ad3..2bd95b1 100644 --- a/pubspec.yaml +++ b/pubspec.yaml @@ -1,7 +1,9 @@ name: flutter_crypto_algorithm -description: "A new Flutter plugin project." +description: "A Flutter package for secure encryption algorithms, providing efficient tools for data protection and encryption operations" version: 0.0.1 -homepage: +repository: https://github.com/LamNguyen17/flutter_crypto_algorithm +issue_tracker: https://github.com/LamNguyen17/flutter_crypto_algorithm/issues +homepage: https://github.com/LamNguyen17/flutter_crypto_algorithm environment: sdk: '>=3.3.4 <4.0.0' From 3b066773956de731c4b5543f8f60178393e888e5 Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 11:13:59 +0700 Subject: [PATCH 02/10] add github action --- .github/workflows/flutter.yml | 72 +++++++++++++++ README.md | 9 ++ .../flutter_crypto_algorithm/AesAlgorithm.kt | 6 +- .../flutter_crypto_algorithm/CryptoHelper.kt | 7 +- .../FlutterCryptoAlgorithmPlugin.kt | 26 +++--- coverage/lcov.info | 24 +++++ example/lib/main.dart | 87 +++++++++++++++---- lib/flutter_crypto_algorithm.dart | 11 ++- ...utter_crypto_algorithm_method_channel.dart | 26 +++++- ...r_crypto_algorithm_platform_interface.dart | 8 +- 10 files changed, 229 insertions(+), 47 deletions(-) create mode 100644 .github/workflows/flutter.yml create mode 100644 coverage/lcov.info diff --git a/.github/workflows/flutter.yml b/.github/workflows/flutter.yml new file mode 100644 index 0000000..a9f240e --- /dev/null +++ b/.github/workflows/flutter.yml @@ -0,0 +1,72 @@ +name: Flutter CI + +on: + push: + branches: + - aes-algorithm # Adjust this to your default branch if necessary + pull_request: + branches: + - aes-algorithm + +jobs: + build_android: + runs-on: ubuntu-latest + + steps: + - name: Check out the repository + uses: actions/checkout@v2 + + - name: Set up Flutter + uses: subosito/flutter-action@v2 + with: + flutter-version: '3.19.6' # Specify the Flutter version, e.g., '2.10.0' + + - name: Install dependencies + run: flutter pub get + + - name: Run tests + run: flutter test + + - name: Upload coverage to Codecov + uses: codecov/codecov-action@v2 + with: + files: ./coverage/lcov.info + flags: flutter + name: code-coverage-report + token: 2f59bcbb-7263-4e0c-9a37-e710e39705bb # Add this to your GitHub secrets + fail_ci_if_error: true + + - name: Build APK + run: flutter build apk --release # Build APK for Android + + # Optionally, you can add a step to upload the APK as an artifact + - name: Upload APK artifact + uses: actions/upload-artifact@v2 + with: + name: my_app_apk + path: build/app/outputs/flutter-apk/app-release.apk + + build_ios: + runs-on: macos-latest + + steps: + - name: Check out the repository + uses: actions/checkout@v2 + + - name: Set up Flutter + uses: subosito/flutter-action@v2 + with: + flutter-version: '3.19.6' + + - name: Install dependencies + run: flutter pub get + + - name: Build iOS + run: flutter build ios --release --no-codesign # Build iOS without code signing + + # Optionally, you can add a step to upload the iOS build as an artifact + - name: Upload iOS artifact + uses: actions/upload-artifact@v2 + with: + name: my_app_ios + path: build/ios/iphoneos/*.app # Adjust the path according to your iOS build output \ No newline at end of file diff --git a/README.md b/README.md index 0b32cff..55af38e 100644 --- a/README.md +++ b/README.md @@ -5,6 +5,15 @@ [![](https://img.shields.io/badge/author-Forest_Nguyen-f59642)](https://github.com/LamNguyen17) A Flutter package for secure encryption algorithms, providing efficient tools for data protection and encryption operations + +## Installation +Run this command: +With Flutter: +```sh +flutter pub add encryption_algorithm +``` + + ## Getting Started This project is a starting point for a Flutter diff --git a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/AesAlgorithm.kt b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/AesAlgorithm.kt index 62a1864..2527de5 100644 --- a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/AesAlgorithm.kt +++ b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/AesAlgorithm.kt @@ -25,11 +25,11 @@ class AesAlgorithm { val decryptedBytes = cipher.doFinal(decodedBytes) String(decryptedBytes, Charsets.UTF_8) } catch (e: BadPaddingException) { - CryptoHelper.CONSTANTS.DECRYPTION_ERR_VALID_KEY + CryptoHelper.CONSTANTS.ERR_VALID_KEY } catch (e: IllegalBlockSizeException) { - CryptoHelper.CONSTANTS.DECRYPTION_ERR_INCORRECT_BLOCK_SIZE + CryptoHelper.CONSTANTS.ERR_INCORRECT_BLOCK_SIZE } catch (e: Exception) { - CryptoHelper.CONSTANTS.DECRYPTION_ERR_UNEXPECTED_ERROR + CryptoHelper.CONSTANTS.ERR_UNEXPECTED_ERROR } } } \ No newline at end of file diff --git a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/CryptoHelper.kt b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/CryptoHelper.kt index 03f44b4..81f9569 100644 --- a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/CryptoHelper.kt +++ b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/CryptoHelper.kt @@ -6,11 +6,6 @@ import javax.crypto.SecretKey import javax.crypto.spec.* class CryptoHelper { - enum class CryptoType { - ENCRYPT, - DECRYPT, - } - object CONSTANTS { const val ERR_VALID_KEY = "Invalid key or corrupted data" const val ERR_INCORRECT_BLOCK_SIZE = "Incorrect block size" @@ -32,7 +27,7 @@ class CryptoHelper { return hexLength; } - fun genSecretKey(algorithmType: String, secretKey: String?): SecretKey? { + fun genSecretKey(algorithmType: String, secretKey: String?): SecretKey { return when (algorithmType) { AES.ALGORITHM -> { if (secretKey != null) { diff --git a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/FlutterCryptoAlgorithmPlugin.kt b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/FlutterCryptoAlgorithmPlugin.kt index ca03aad..0785894 100644 --- a/android/src/main/kotlin/com/example/flutter_crypto_algorithm/FlutterCryptoAlgorithmPlugin.kt +++ b/android/src/main/kotlin/com/example/flutter_crypto_algorithm/FlutterCryptoAlgorithmPlugin.kt @@ -8,6 +8,8 @@ import io.flutter.plugin.common.MethodChannel import io.flutter.plugin.common.MethodChannel.MethodCallHandler import io.flutter.plugin.common.MethodChannel.Result import kotlinx.coroutines.* +import kotlinx.coroutines.flow.* +import kotlinx.coroutines.launch class FlutterCryptoAlgorithmPlugin : FlutterPlugin, MethodCallHandler { private lateinit var channel: MethodChannel @@ -34,14 +36,15 @@ class FlutterCryptoAlgorithmPlugin : FlutterPlugin, MethodCallHandler { ENCRYPT_METHOD -> { val value = call.argument("value") val privateKey = call.argument("privateKey") - val ivKey = call.argument("ivKey") - if (value != null && privateKey != null && ivKey != null) { + val ivKey = call.argument("ivKey") ?: "" + if (value != null && privateKey != null) { activityScope.launch { flow { - cryptoHelper.encrypt(value, privateKey, ivKey) + val encryptedData = aesAlgorithm.encrypt(value, privateKey, ivKey) + emit(encryptedData) }.flowOn(Dispatchers.IO).catch { result.error( - CryptoHelper.Constants.ERR_VALID_KEY, + CryptoHelper.CONSTANTS.ERR_VALID_KEY, "Data to encrypt is null", null ) @@ -51,7 +54,7 @@ class FlutterCryptoAlgorithmPlugin : FlutterPlugin, MethodCallHandler { } } else { result.error( - CryptoHelper.Constants.ERR_VALID_KEY, + CryptoHelper.CONSTANTS.ERR_VALID_KEY, "Data to encrypt is null", null ) @@ -61,14 +64,15 @@ class FlutterCryptoAlgorithmPlugin : FlutterPlugin, MethodCallHandler { DECRYPT_METHOD -> { val value = call.argument("value") val privateKey = call.argument("privateKey") - val ivKey = call.argument("ivKey") - if (value != null && privateKey != null && ivKey != null) { + val ivKey = call.argument("ivKey") ?: "" + if (value != null && privateKey != null) { activityScope.launch { flow { - cryptoHelper.decrypt(value, privateKey, ivKey) + val decryptData = aesAlgorithm.decrypt(value, privateKey, ivKey) + emit(decryptData) }.flowOn(Dispatchers.IO).catch { result.error( - CryptoHelper.Constants.ERR_VALID_KEY, + CryptoHelper.CONSTANTS.ERR_VALID_KEY, "Data to decrypt is null", null ) @@ -78,14 +82,12 @@ class FlutterCryptoAlgorithmPlugin : FlutterPlugin, MethodCallHandler { } } else { result.error( - CryptoHelper.Constants.ERR_VALID_KEY, + CryptoHelper.CONSTANTS.ERR_VALID_KEY, "Data to decrypt is null", null ) } } - - "getPlatformVersion" -> result.success("Android ${android.os.Build.VERSION.RELEASE}") else -> result.notImplemented() } } diff --git a/coverage/lcov.info b/coverage/lcov.info new file mode 100644 index 0000000..120a23c --- /dev/null +++ b/coverage/lcov.info @@ -0,0 +1,24 @@ +SF:lib/flutter_crypto_algorithm.dart +DA:5,1 +DA:6,2 +LF:2 +LH:2 +end_of_record +SF:lib/flutter_crypto_algorithm_platform_interface.dart +DA:7,6 +DA:9,6 +DA:11,3 +DA:16,2 +DA:21,1 +DA:22,2 +DA:26,0 +DA:27,0 +LF:8 +LH:6 +end_of_record +SF:lib/flutter_crypto_algorithm_method_channel.dart +DA:12,1 +DA:14,2 +LF:2 +LH:2 +end_of_record diff --git a/example/lib/main.dart b/example/lib/main.dart index 72fdc28..0ad1322 100644 --- a/example/lib/main.dart +++ b/example/lib/main.dart @@ -1,7 +1,7 @@ -import 'package:flutter/material.dart'; import 'dart:async'; - +import 'package:flutter/material.dart'; import 'package:flutter/services.dart'; + import 'package:flutter_crypto_algorithm/flutter_crypto_algorithm.dart'; void main() { @@ -16,34 +16,36 @@ class MyApp extends StatefulWidget { } class _MyAppState extends State { - String _platformVersion = 'Unknown'; + String _encrypt = 'Unknown'; + String _decrypt = 'Unknown'; final _flutterCryptoAlgorithmPlugin = FlutterCryptoAlgorithm(); @override void initState() { super.initState(); - initPlatformState(); + crypto(); } // Platform messages are asynchronous, so we initialize in an async method. - Future initPlatformState() async { - String platformVersion; - // Platform messages may fail, so we use a try/catch PlatformException. - // We also handle the message potentially returning null. + Future crypto() async { + String encrypt; + String decrypt; try { - platformVersion = - await _flutterCryptoAlgorithmPlugin.getPlatformVersion() ?? 'Unknown platform version'; + encrypt = + await _flutterCryptoAlgorithmPlugin.encrypt('Hello123', 'Hello') ?? + 'Unknown encrypt'; + decrypt = await _flutterCryptoAlgorithmPlugin.decrypt(encrypt, 'Hello') ?? + 'Unknown decrypt'; } on PlatformException { - platformVersion = 'Failed to get platform version.'; + encrypt = 'Failed encrypt.'; + decrypt = 'Failed decrypt.'; } - // If the widget was removed from the tree while the asynchronous platform - // message was in flight, we want to discard the reply rather than calling - // setState to update our non-existent appearance. if (!mounted) return; setState(() { - _platformVersion = platformVersion; + _encrypt = encrypt; + _decrypt = decrypt; }); } @@ -52,12 +54,61 @@ class _MyAppState extends State { return MaterialApp( home: Scaffold( appBar: AppBar( - title: const Text('Plugin example app'), + title: const Text('Flutter Crypto Algorithm'), ), - body: Center( - child: Text('Running on: $_platformVersion\n'), + body: SingleChildScrollView( + child: Column( + children: [ + Section(title: 'AES', children: [ + _buildText('Encrypt: ', _encrypt), + _buildText('Decrypt: ', _decrypt), + ]), + ], + ), ), ), ); } + + Widget _buildText(String label, String value) { + return Text.rich( + overflow: TextOverflow.ellipsis, + maxLines: 2, + TextSpan( + text: label, + style: const TextStyle(fontSize: 16, fontWeight: FontWeight.bold, color: Colors.red), + children: [ + TextSpan( + text: value, + style: const TextStyle( + fontSize: 16, fontWeight: FontWeight.normal, color: Colors.black), + ), + ], + ), + ); + } +} + +class Section extends StatelessWidget { + final String title; + final List children; + + const Section({super.key, required this.title, required this.children}); + + @override + Widget build(BuildContext context) { + return Padding( + padding: const EdgeInsets.all(16.0), + child: Column( + crossAxisAlignment: CrossAxisAlignment.start, + children: [ + Text( + title, + style: const TextStyle(fontSize: 20, fontWeight: FontWeight.bold), + ), + ...children, + ], + ), + ); + } } diff --git a/lib/flutter_crypto_algorithm.dart b/lib/flutter_crypto_algorithm.dart index 8e59380..8781e8c 100644 --- a/lib/flutter_crypto_algorithm.dart +++ b/lib/flutter_crypto_algorithm.dart @@ -1,8 +1,13 @@ - import 'flutter_crypto_algorithm_platform_interface.dart'; class FlutterCryptoAlgorithm { - Future getPlatformVersion() { - return FlutterCryptoAlgorithmPlatform.instance.getPlatformVersion(); + Future encrypt(String value, String privateKey, {String? ivKey}) { + return FlutterCryptoAlgorithmPlatform.instance + .encrypt(value, privateKey, ivKey); + } + + Future decrypt(String value, String privateKey, {String? ivKey}) { + return FlutterCryptoAlgorithmPlatform.instance + .decrypt(value, privateKey, ivKey); } } diff --git a/lib/flutter_crypto_algorithm_method_channel.dart b/lib/flutter_crypto_algorithm_method_channel.dart index 3e7de76..e133a75 100644 --- a/lib/flutter_crypto_algorithm_method_channel.dart +++ b/lib/flutter_crypto_algorithm_method_channel.dart @@ -10,8 +10,28 @@ class MethodChannelFlutterCryptoAlgorithm extends FlutterCryptoAlgorithmPlatform final methodChannel = const MethodChannel('flutter_crypto_algorithm'); @override - Future getPlatformVersion() async { - final version = await methodChannel.invokeMethod('getPlatformVersion'); - return version; + Future encrypt(String value, String privateKey, String? ivKey) async { + try { + return await methodChannel.invokeMethod('encrypt', { + 'value': value, + 'privateKey': privateKey, + 'ivKey': ivKey, + }); + } catch (e) { + return null; + } + } + + @override + Future decrypt(String value, String privateKey, String? ivKey) async { + try { + return await methodChannel.invokeMethod('decrypt', { + 'value': value, + 'privateKey': privateKey, + 'ivKey': ivKey, + }); + } catch (e) { + return null; + } } } diff --git a/lib/flutter_crypto_algorithm_platform_interface.dart b/lib/flutter_crypto_algorithm_platform_interface.dart index ecb4d5e..acdc807 100644 --- a/lib/flutter_crypto_algorithm_platform_interface.dart +++ b/lib/flutter_crypto_algorithm_platform_interface.dart @@ -23,7 +23,11 @@ abstract class FlutterCryptoAlgorithmPlatform extends PlatformInterface { _instance = instance; } - Future getPlatformVersion() { - throw UnimplementedError('platformVersion() has not been implemented.'); + Future encrypt(String value, String privateKey, String? ivKey) { + throw UnimplementedError('encrypt(value, privateKey, ivKey?) has not been implemented.'); + } + + Future decrypt(String value, String privateKey, String? ivKey) { + throw UnimplementedError('decrypt(value, privateKey, ivKey?) has not been implemented.'); } } From 45f858c776a45b30ab586209a4e7c56bee59d637 Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 11:20:00 +0700 Subject: [PATCH 03/10] add github action --- .github/workflows/flutter.yml | 84 ++++++++++------------------------- 1 file changed, 24 insertions(+), 60 deletions(-) diff --git a/.github/workflows/flutter.yml b/.github/workflows/flutter.yml index a9f240e..80f93e5 100644 --- a/.github/workflows/flutter.yml +++ b/.github/workflows/flutter.yml @@ -9,64 +9,28 @@ on: - aes-algorithm jobs: - build_android: + build: runs-on: ubuntu-latest - - steps: - - name: Check out the repository - uses: actions/checkout@v2 - - - name: Set up Flutter - uses: subosito/flutter-action@v2 - with: - flutter-version: '3.19.6' # Specify the Flutter version, e.g., '2.10.0' - - - name: Install dependencies - run: flutter pub get - - - name: Run tests - run: flutter test - - - name: Upload coverage to Codecov - uses: codecov/codecov-action@v2 - with: - files: ./coverage/lcov.info - flags: flutter - name: code-coverage-report - token: 2f59bcbb-7263-4e0c-9a37-e710e39705bb # Add this to your GitHub secrets - fail_ci_if_error: true - - - name: Build APK - run: flutter build apk --release # Build APK for Android - - # Optionally, you can add a step to upload the APK as an artifact - - name: Upload APK artifact - uses: actions/upload-artifact@v2 - with: - name: my_app_apk - path: build/app/outputs/flutter-apk/app-release.apk - - build_ios: - runs-on: macos-latest - - steps: - - name: Check out the repository - uses: actions/checkout@v2 - - - name: Set up Flutter - uses: subosito/flutter-action@v2 - with: - flutter-version: '3.19.6' - - - name: Install dependencies - run: flutter pub get - - - name: Build iOS - run: flutter build ios --release --no-codesign # Build iOS without code signing - - # Optionally, you can add a step to upload the iOS build as an artifact - - name: Upload iOS artifact - uses: actions/upload-artifact@v2 - with: - name: my_app_ios - path: build/ios/iphoneos/*.app # Adjust the path according to your iOS build output \ No newline at end of file + steps: + - name: Check out the repository + uses: actions/checkout@v2 + + - name: Set up Flutter + uses: subosito/flutter-action@v2 + with: + flutter-version: '3.19.6' # Specify the Flutter version, e.g., 'stable' + + - name: Install dependencies + run: flutter pub get + + - name: Run tests + run: flutter test + + - name: Upload coverage to Codecov + uses: codecov/codecov-action@v2 + with: + files: ./coverage/lcov.info + flags: flutter + name: code-coverage-report + token: 2f59bcbb-7263-4e0c-9a37-e710e39705bb # Add this to your GitHub secrets + fail_ci_if_error: true \ No newline at end of file From 24da4a4773338aaaafdc0b057e795455ce2e9c86 Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 11:24:21 +0700 Subject: [PATCH 04/10] change update github ci --- .github/workflows/flutter.yml | 39 ++++++++++++++++++----------------- 1 file changed, 20 insertions(+), 19 deletions(-) diff --git a/.github/workflows/flutter.yml b/.github/workflows/flutter.yml index 80f93e5..5420cfa 100644 --- a/.github/workflows/flutter.yml +++ b/.github/workflows/flutter.yml @@ -11,26 +11,27 @@ on: jobs: build: runs-on: ubuntu-latest - steps: - - name: Check out the repository - uses: actions/checkout@v2 - - name: Set up Flutter - uses: subosito/flutter-action@v2 - with: - flutter-version: '3.19.6' # Specify the Flutter version, e.g., 'stable' + steps: + - name: Check out the repository + uses: actions/checkout@v2 - - name: Install dependencies - run: flutter pub get + - name: Set up Flutter + uses: subosito/flutter-action@v2 + with: + flutter-version: '3.19.6' # Specify the Flutter version, e.g., '2.10.0' - - name: Run tests - run: flutter test + - name: Install dependencies + run: flutter pub get - - name: Upload coverage to Codecov - uses: codecov/codecov-action@v2 - with: - files: ./coverage/lcov.info - flags: flutter - name: code-coverage-report - token: 2f59bcbb-7263-4e0c-9a37-e710e39705bb # Add this to your GitHub secrets - fail_ci_if_error: true \ No newline at end of file + - name: Run tests + run: flutter test + + - name: Upload coverage to Codecov + uses: codecov/codecov-action@v2 + with: + files: ./coverage/lcov.info + flags: flutter + name: code-coverage-report + token: 2f59bcbb-7263-4e0c-9a37-e710e39705bb # Add this to your GitHub secrets + fail_ci_if_error: true From daf304a4fbe3ddd9ec683097d0ef8e3e00c8247a Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 12:13:04 +0700 Subject: [PATCH 05/10] write tesing AES(#aes-algorithn) --- .github/workflows/flutter.yml | 4 +-- coverage/lcov.info | 22 +++++++++----- .../plugin_integration_test.dart | 5 ++-- example/lib/main.dart | 29 +++++++++++-------- ..._crypto_algorithm_method_channel_test.dart | 15 ++++++++-- test/flutter_crypto_algorithm_test.dart | 17 +++++++++-- 6 files changed, 63 insertions(+), 29 deletions(-) diff --git a/.github/workflows/flutter.yml b/.github/workflows/flutter.yml index 5420cfa..9ef3d58 100644 --- a/.github/workflows/flutter.yml +++ b/.github/workflows/flutter.yml @@ -24,8 +24,8 @@ jobs: - name: Install dependencies run: flutter pub get - - name: Run tests - run: flutter test + - name: Run tests & generate coverage + run: flutter test --coverage - name: Upload coverage to Codecov uses: codecov/codecov-action@v2 diff --git a/coverage/lcov.info b/coverage/lcov.info index 120a23c..2c413c4 100644 --- a/coverage/lcov.info +++ b/coverage/lcov.info @@ -1,8 +1,12 @@ SF:lib/flutter_crypto_algorithm.dart +DA:4,1 DA:5,1 -DA:6,2 -LF:2 -LH:2 +DA:6,1 +DA:9,1 +DA:10,1 +DA:11,1 +LF:6 +LH:6 end_of_record SF:lib/flutter_crypto_algorithm_platform_interface.dart DA:7,6 @@ -13,12 +17,16 @@ DA:21,1 DA:22,2 DA:26,0 DA:27,0 -LF:8 +DA:30,0 +DA:31,0 +LF:10 LH:6 end_of_record SF:lib/flutter_crypto_algorithm_method_channel.dart DA:12,1 -DA:14,2 -LF:2 -LH:2 +DA:15,3 +DA:25,1 +DA:28,3 +LF:4 +LH:4 end_of_record diff --git a/example/integration_test/plugin_integration_test.dart b/example/integration_test/plugin_integration_test.dart index e523f54..17cded5 100644 --- a/example/integration_test/plugin_integration_test.dart +++ b/example/integration_test/plugin_integration_test.dart @@ -17,9 +17,10 @@ void main() { testWidgets('getPlatformVersion test', (WidgetTester tester) async { final FlutterCryptoAlgorithm plugin = FlutterCryptoAlgorithm(); - final String? version = await plugin.getPlatformVersion(); + final String? encryptData = await plugin.encrypt('Hello123', 'Hello'); + // final String? version = await plugin.getPlatformVersion(); // The version string depends on the host platform running the test, so // just assert that some non-empty string is returned. - expect(version?.isNotEmpty, true); + expect(encryptData?.isNotEmpty, true); }); } diff --git a/example/lib/main.dart b/example/lib/main.dart index 0ad1322..6a2b62a 100644 --- a/example/lib/main.dart +++ b/example/lib/main.dart @@ -43,6 +43,8 @@ class _MyAppState extends State { if (!mounted) return; + print('encrypt: $encrypt'); + setState(() { _encrypt = encrypt; _decrypt = decrypt; @@ -72,20 +74,23 @@ class _MyAppState extends State { Widget _buildText(String label, String value) { return Text.rich( - overflow: TextOverflow.ellipsis, - maxLines: 2, + overflow: TextOverflow.ellipsis, + maxLines: 2, + TextSpan( + text: label, + style: const TextStyle( + fontSize: 16, fontWeight: FontWeight.bold, color: Colors.red), + children: [ TextSpan( - text: label, - style: const TextStyle(fontSize: 16, fontWeight: FontWeight.bold, color: Colors.red), - children: [ - TextSpan( - text: value, - style: const TextStyle( - fontSize: 16, fontWeight: FontWeight.normal, color: Colors.black), - ), - ], + text: value, + style: const TextStyle( + fontSize: 16, + fontWeight: FontWeight.normal, + color: Colors.black), ), - ); + ], + ), + ); } } diff --git a/test/flutter_crypto_algorithm_method_channel_test.dart b/test/flutter_crypto_algorithm_method_channel_test.dart index c3a9931..7b9d494 100644 --- a/test/flutter_crypto_algorithm_method_channel_test.dart +++ b/test/flutter_crypto_algorithm_method_channel_test.dart @@ -12,7 +12,12 @@ void main() { TestDefaultBinaryMessengerBinding.instance.defaultBinaryMessenger.setMockMethodCallHandler( channel, (MethodCall methodCall) async { - return '42'; + switch (methodCall.method) { + case 'encrypt': + return 'IVVM1yR+Cn2Bbxo7RnkAQw=='; + case 'decrypt': + return 'Hello123'; + } }, ); }); @@ -21,7 +26,11 @@ void main() { TestDefaultBinaryMessengerBinding.instance.defaultBinaryMessenger.setMockMethodCallHandler(channel, null); }); - test('getPlatformVersion', () async { - expect(await platform.getPlatformVersion(), '42'); + test('encrypt', () async { + expect(await platform.encrypt('Hello123', 'Hello', null), 'IVVM1yR+Cn2Bbxo7RnkAQw=='); + }); + + test('decrypt', () async { + expect(await platform.decrypt('IVVM1yR+Cn2Bbxo7RnkAQw==', 'Hello', null), 'Hello123'); }); } diff --git a/test/flutter_crypto_algorithm_test.dart b/test/flutter_crypto_algorithm_test.dart index 7bc1d32..9c92a8d 100644 --- a/test/flutter_crypto_algorithm_test.dart +++ b/test/flutter_crypto_algorithm_test.dart @@ -9,7 +9,10 @@ class MockFlutterCryptoAlgorithmPlatform implements FlutterCryptoAlgorithmPlatform { @override - Future getPlatformVersion() => Future.value('42'); + Future encrypt(String value, String privateKey, String? ivKey) => Future.value('IVVM1yR+Cn2Bbxo7RnkAQw=='); + + @override + Future decrypt(String value, String privateKey, String? ivKey) => Future.value('Hello123'); } void main() { @@ -19,11 +22,19 @@ void main() { expect(initialPlatform, isInstanceOf()); }); - test('getPlatformVersion', () async { + test('encrypt', () async { + FlutterCryptoAlgorithm flutterCryptoAlgorithmPlugin = FlutterCryptoAlgorithm(); + MockFlutterCryptoAlgorithmPlatform fakePlatform = MockFlutterCryptoAlgorithmPlatform(); + FlutterCryptoAlgorithmPlatform.instance = fakePlatform; + + expect(await flutterCryptoAlgorithmPlugin.encrypt('Hello123', 'Hello'), 'IVVM1yR+Cn2Bbxo7RnkAQw=='); + }); + + test('decrypt', () async { FlutterCryptoAlgorithm flutterCryptoAlgorithmPlugin = FlutterCryptoAlgorithm(); MockFlutterCryptoAlgorithmPlatform fakePlatform = MockFlutterCryptoAlgorithmPlatform(); FlutterCryptoAlgorithmPlatform.instance = fakePlatform; - expect(await flutterCryptoAlgorithmPlugin.getPlatformVersion(), '42'); + expect(await flutterCryptoAlgorithmPlugin.decrypt('IVVM1yR+Cn2Bbxo7RnkAQw==', 'Hello'), 'Hello123'); }); } From de15fe2b4e20396cd7948ea01a24edae790e47cc Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 12:22:13 +0700 Subject: [PATCH 06/10] remove throw UnimplementedError(#aes-algorithm) --- lib/flutter_crypto_algorithm_platform_interface.dart | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/lib/flutter_crypto_algorithm_platform_interface.dart b/lib/flutter_crypto_algorithm_platform_interface.dart index acdc807..ea5a4ae 100644 --- a/lib/flutter_crypto_algorithm_platform_interface.dart +++ b/lib/flutter_crypto_algorithm_platform_interface.dart @@ -23,11 +23,7 @@ abstract class FlutterCryptoAlgorithmPlatform extends PlatformInterface { _instance = instance; } - Future encrypt(String value, String privateKey, String? ivKey) { - throw UnimplementedError('encrypt(value, privateKey, ivKey?) has not been implemented.'); - } + Future encrypt(String value, String privateKey, String? ivKey); - Future decrypt(String value, String privateKey, String? ivKey) { - throw UnimplementedError('decrypt(value, privateKey, ivKey?) has not been implemented.'); - } + Future decrypt(String value, String privateKey, String? ivKey); } From 32f0426000f4f03abd506edbd130250176bc1f66 Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 13:13:53 +0700 Subject: [PATCH 07/10] add cache pub-cache --- .github/workflows/flutter.yml | 9 +++++++++ README.md | 7 ++++--- 2 files changed, 13 insertions(+), 3 deletions(-) diff --git a/.github/workflows/flutter.yml b/.github/workflows/flutter.yml index 9ef3d58..d290864 100644 --- a/.github/workflows/flutter.yml +++ b/.github/workflows/flutter.yml @@ -21,6 +21,15 @@ jobs: with: flutter-version: '3.19.6' # Specify the Flutter version, e.g., '2.10.0' + - name: Cache Flutter dependencies + uses: actions/cache@v3 + with: + path: | + ~/.pub-cache + key: ${{ runner.os }}-pub-cache-${{ hashFiles('pubspec.yaml') }} + restore-keys: | + ${{ runner.os }}-pub-cache- + - name: Install dependencies run: flutter pub get diff --git a/README.md b/README.md index 55af38e..4cf073e 100644 --- a/README.md +++ b/README.md @@ -1,8 +1,9 @@ # flutter_crypto_algorithm -[![](https://img.shields.io/badge/native_language-Kotlin_&_Swift-green)](https://pub.dev/packages/flutter_crypto_algorithm) -[![](https://img.shields.io/badge/license-MIT-8A2BE2)](https://github.com/LamNguyen17/flutter_crypto_algorithm/blob/master/LICENSE) -[![](https://img.shields.io/badge/author-Forest_Nguyen-f59642)](https://github.com/LamNguyen17) +[![Native language](https://img.shields.io/badge/native_language-Kotlin_&_Swift-green)](https://pub.dev/packages/flutter_crypto_algorithm) +[![Code cov](https://codecov.io/gh/LamNguyen17/flutter_crypto_algorithm/branch/master/graph/badge.svg)](https://app.codecov.io/github/LamNguyen17/flutter_crypto_algorithm/blob/master/lib) +[![License](https://img.shields.io/badge/license-MIT-8A2BE2)](https://github.com/LamNguyen17/flutter_crypto_algorithm/blob/master/LICENSE) +[![Author](https://img.shields.io/badge/author-Forest_Nguyen-f59642)](https://github.com/LamNguyen17) A Flutter package for secure encryption algorithms, providing efficient tools for data protection and encryption operations From a2d166c1cc3564b1e344762cea5dbe8b1cb8cc2d Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 16:05:13 +0700 Subject: [PATCH 08/10] update source method channel source IOS(#aes-algorithm) --- .github/workflows/flutter.yml | 12 +- README.md | 120 +++++++++++++++++- coverage/lcov.info | 24 ++-- .../plugin_integration_test.dart | 2 +- example/ios/Podfile.lock | 39 ++++++ example/ios/Runner.xcodeproj/project.pbxproj | 112 ++++++++++++++++ .../xcshareddata/xcschemes/Runner.xcscheme | 7 + .../contents.xcworkspacedata | 3 + example/ios/Runner/Base.lproj/Main.storyboard | 13 +- example/lib/main.dart | 10 +- ios/Classes/AesAlgorithm.swift | 37 ++++++ ios/Classes/CryptoHelper.swift | 58 +++++++++ .../FlutterCryptoAlgorithmPlugin.swift | 99 +++++++++++++-- lib/flutter_crypto_algorithm.dart | 2 +- ...utter_crypto_algorithm_method_channel.dart | 13 +- test/flutter_crypto_algorithm_test.dart | 10 +- 16 files changed, 506 insertions(+), 55 deletions(-) create mode 100644 example/ios/Podfile.lock create mode 100644 ios/Classes/AesAlgorithm.swift create mode 100644 ios/Classes/CryptoHelper.swift diff --git a/.github/workflows/flutter.yml b/.github/workflows/flutter.yml index d290864..7419cb6 100644 --- a/.github/workflows/flutter.yml +++ b/.github/workflows/flutter.yml @@ -1,12 +1,12 @@ name: Flutter CI on: - push: - branches: - - aes-algorithm # Adjust this to your default branch if necessary +# push: +# branches: +# - master pull_request: branches: - - aes-algorithm + - master jobs: build: @@ -19,7 +19,7 @@ jobs: - name: Set up Flutter uses: subosito/flutter-action@v2 with: - flutter-version: '3.19.6' # Specify the Flutter version, e.g., '2.10.0' + flutter-version: '3.19.6' - name: Cache Flutter dependencies uses: actions/cache@v3 @@ -42,5 +42,5 @@ jobs: files: ./coverage/lcov.info flags: flutter name: code-coverage-report - token: 2f59bcbb-7263-4e0c-9a37-e710e39705bb # Add this to your GitHub secrets + token: 2f59bcbb-7263-4e0c-9a37-e710e39705bb fail_ci_if_error: true diff --git a/README.md b/README.md index 4cf073e..fa272a8 100644 --- a/README.md +++ b/README.md @@ -8,12 +8,128 @@ A Flutter package for secure encryption algorithms, providing efficient tools for data protection and encryption operations ## Installation -Run this command: -With Flutter: +Run this command with Flutter: ```sh flutter pub add encryption_algorithm ``` +## Usage +### Methods +#### 🚀 AES +```dart +import 'package:flutter_crypto_algorithm/flutter_crypto_algorithm.dart'; +``` +```dart +void main() { + runApp(const MyApp()); +} + +class MyApp extends StatefulWidget { + const MyApp({super.key}); + + @override + State createState() => _MyAppState(); +} + +class _MyAppState extends State { + String _encrypt = ''; + String _decrypt = ''; + final _crypto = Crypto(); + + @override + void initState() { + super.initState(); + crypto(); + } + + // Platform messages are asynchronous, so we initialize in an async method. + Future crypto() async { + String encrypt; + String decrypt; + try { + encrypt = + await _crypto.encrypt('Hello123', 'Hello') ?? + 'Unknown encrypt'; + decrypt = await _crypto.decrypt(encrypt, 'Hello') ?? + 'Unknown decrypt'; + } on PlatformException { + encrypt = 'Failed encrypt.'; + decrypt = 'Failed decrypt.'; + } + if (!mounted) return; + setState(() { + _encrypt = encrypt; + _decrypt = decrypt; + }); + } + + @override + Widget build(BuildContext context) { + return MaterialApp( + home: Scaffold( + appBar: AppBar( + title: const Text('Flutter Crypto Algorithm'), + ), + body: SingleChildScrollView( + child: Column( + children: [ + Section(title: 'AES', children: [ + _buildText('Encrypt: ', _encrypt), + _buildText('Decrypt: ', _decrypt), + ]), + ], + ), + ), + ), + ); + } + + Widget _buildText(String label, String value) { + return Text.rich( + overflow: TextOverflow.ellipsis, + maxLines: 2, + TextSpan( + text: label, + style: const TextStyle( + fontSize: 16, fontWeight: FontWeight.bold, color: Colors.red), + children: [ + TextSpan( + text: value, + style: const TextStyle( + fontSize: 16, + fontWeight: FontWeight.normal, + color: Colors.black), + ), + ], + ), + ); + } +} + +class Section extends StatelessWidget { + final String title; + final List children; + + const Section({super.key, required this.title, required this.children}); + + @override + Widget build(BuildContext context) { + return Padding( + padding: const EdgeInsets.all(16.0), + child: Column( + crossAxisAlignment: CrossAxisAlignment.start, + children: [ + Text( + title, + style: const TextStyle(fontSize: 20, fontWeight: FontWeight.bold), + ), + ...children, + ], + ), + ); + } +} +``` ## Getting Started diff --git a/coverage/lcov.info b/coverage/lcov.info index 2c413c4..28ba097 100644 --- a/coverage/lcov.info +++ b/coverage/lcov.info @@ -15,18 +15,20 @@ DA:11,3 DA:16,2 DA:21,1 DA:22,2 -DA:26,0 -DA:27,0 -DA:30,0 -DA:31,0 -LF:10 +LF:6 LH:6 end_of_record SF:lib/flutter_crypto_algorithm_method_channel.dart -DA:12,1 -DA:15,3 -DA:25,1 -DA:28,3 -LF:4 -LH:4 +DA:13,1 +DA:17,3 +DA:18,1 +DA:19,1 +DA:20,0 +DA:27,1 +DA:31,3 +DA:32,1 +DA:33,1 +DA:34,0 +LF:10 +LH:8 end_of_record diff --git a/example/integration_test/plugin_integration_test.dart b/example/integration_test/plugin_integration_test.dart index 17cded5..c738a5e 100644 --- a/example/integration_test/plugin_integration_test.dart +++ b/example/integration_test/plugin_integration_test.dart @@ -16,7 +16,7 @@ void main() { IntegrationTestWidgetsFlutterBinding.ensureInitialized(); testWidgets('getPlatformVersion test', (WidgetTester tester) async { - final FlutterCryptoAlgorithm plugin = FlutterCryptoAlgorithm(); + final Crypto plugin = Crypto(); final String? encryptData = await plugin.encrypt('Hello123', 'Hello'); // final String? version = await plugin.getPlatformVersion(); // The version string depends on the host platform running the test, so diff --git a/example/ios/Podfile.lock b/example/ios/Podfile.lock new file mode 100644 index 0000000..c4e6496 --- /dev/null +++ b/example/ios/Podfile.lock @@ -0,0 +1,39 @@ +PODS: + - CryptoSwift (1.8.3) + - Flutter (1.0.0) + - flutter_crypto_algorithm (0.0.1): + - CryptoSwift (= 1.8.3) + - Flutter + - RxSwift (= 6.7.1) + - integration_test (0.0.1): + - Flutter + - RxSwift (6.7.1) + +DEPENDENCIES: + - Flutter (from `Flutter`) + - flutter_crypto_algorithm (from `.symlinks/plugins/flutter_crypto_algorithm/ios`) + - integration_test (from `.symlinks/plugins/integration_test/ios`) + +SPEC REPOS: + trunk: + - CryptoSwift + - RxSwift + +EXTERNAL SOURCES: + Flutter: + :path: Flutter + flutter_crypto_algorithm: + :path: ".symlinks/plugins/flutter_crypto_algorithm/ios" + integration_test: + :path: ".symlinks/plugins/integration_test/ios" + +SPEC CHECKSUMS: + CryptoSwift: 967f37cea5a3294d9cce358f78861652155be483 + Flutter: e0871f40cf51350855a761d2e70bf5af5b9b5de7 + flutter_crypto_algorithm: e0b5068b94eb0b67f3e86413a9a4bcc166650d5b + integration_test: 13825b8a9334a850581300559b8839134b124670 + RxSwift: b9a93a26031785159e11abd40d1a55bcb8057e52 + +PODFILE CHECKSUM: 819463e6a0290f5a72f145ba7cde16e8b6ef0796 + +COCOAPODS: 1.15.2 diff --git a/example/ios/Runner.xcodeproj/project.pbxproj b/example/ios/Runner.xcodeproj/project.pbxproj index 83b3385..ac8050c 100644 --- a/example/ios/Runner.xcodeproj/project.pbxproj +++ b/example/ios/Runner.xcodeproj/project.pbxproj @@ -11,9 +11,11 @@ 331C808B294A63AB00263BE5 /* RunnerTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 331C807B294A618700263BE5 /* RunnerTests.swift */; }; 3B3967161E833CAA004F5970 /* AppFrameworkInfo.plist in Resources */ = {isa = PBXBuildFile; fileRef = 3B3967151E833CAA004F5970 /* AppFrameworkInfo.plist */; }; 74858FAF1ED2DC5600515810 /* AppDelegate.swift in Sources */ = {isa = PBXBuildFile; fileRef = 74858FAE1ED2DC5600515810 /* AppDelegate.swift */; }; + 7A527D5497784DEDACAC9248 /* Pods_Runner.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 07B9FF9AB471833D8CBA33F5 /* Pods_Runner.framework */; }; 97C146FC1CF9000F007C117D /* Main.storyboard in Resources */ = {isa = PBXBuildFile; fileRef = 97C146FA1CF9000F007C117D /* Main.storyboard */; }; 97C146FE1CF9000F007C117D /* Assets.xcassets in Resources */ = {isa = PBXBuildFile; fileRef = 97C146FD1CF9000F007C117D /* Assets.xcassets */; }; 97C147011CF9000F007C117D /* LaunchScreen.storyboard in Resources */ = {isa = PBXBuildFile; fileRef = 97C146FF1CF9000F007C117D /* LaunchScreen.storyboard */; }; + B26EBC66CECBEE9F86850458 /* Pods_RunnerTests.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 96C2C2DECC7F545D5D9B160D /* Pods_RunnerTests.framework */; }; /* End PBXBuildFile section */ /* Begin PBXContainerItemProxy section */ @@ -40,14 +42,18 @@ /* End PBXCopyFilesBuildPhase section */ /* Begin PBXFileReference section */ + 07B9FF9AB471833D8CBA33F5 /* Pods_Runner.framework */ = {isa = PBXFileReference; explicitFileType = wrapper.framework; includeInIndex = 0; path = Pods_Runner.framework; sourceTree = BUILT_PRODUCTS_DIR; }; 1498D2321E8E86230040F4C2 /* GeneratedPluginRegistrant.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = GeneratedPluginRegistrant.h; sourceTree = ""; }; 1498D2331E8E89220040F4C2 /* GeneratedPluginRegistrant.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = GeneratedPluginRegistrant.m; sourceTree = ""; }; 331C807B294A618700263BE5 /* RunnerTests.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = RunnerTests.swift; sourceTree = ""; }; 331C8081294A63A400263BE5 /* RunnerTests.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = RunnerTests.xctest; sourceTree = BUILT_PRODUCTS_DIR; }; 3B3967151E833CAA004F5970 /* AppFrameworkInfo.plist */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.plist.xml; name = AppFrameworkInfo.plist; path = Flutter/AppFrameworkInfo.plist; sourceTree = ""; }; + 5268A135E6281D556367B266 /* Pods-Runner.profile.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-Runner.profile.xcconfig"; path = "Target Support Files/Pods-Runner/Pods-Runner.profile.xcconfig"; sourceTree = ""; }; + 5E649F149B2BB34D39D7C221 /* Pods-Runner.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-Runner.release.xcconfig"; path = "Target Support Files/Pods-Runner/Pods-Runner.release.xcconfig"; sourceTree = ""; }; 74858FAD1ED2DC5600515810 /* Runner-Bridging-Header.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = "Runner-Bridging-Header.h"; sourceTree = ""; }; 74858FAE1ED2DC5600515810 /* AppDelegate.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = AppDelegate.swift; sourceTree = ""; }; 7AFA3C8E1D35360C0083082E /* Release.xcconfig */ = {isa = PBXFileReference; lastKnownFileType = text.xcconfig; name = Release.xcconfig; path = Flutter/Release.xcconfig; sourceTree = ""; }; + 96C2C2DECC7F545D5D9B160D /* Pods_RunnerTests.framework */ = {isa = PBXFileReference; explicitFileType = wrapper.framework; includeInIndex = 0; path = Pods_RunnerTests.framework; sourceTree = BUILT_PRODUCTS_DIR; }; 9740EEB21CF90195004384FC /* Debug.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; name = Debug.xcconfig; path = Flutter/Debug.xcconfig; sourceTree = ""; }; 9740EEB31CF90195004384FC /* Generated.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; name = Generated.xcconfig; path = Flutter/Generated.xcconfig; sourceTree = ""; }; 97C146EE1CF9000F007C117D /* Runner.app */ = {isa = PBXFileReference; explicitFileType = wrapper.application; includeInIndex = 0; path = Runner.app; sourceTree = BUILT_PRODUCTS_DIR; }; @@ -55,13 +61,26 @@ 97C146FD1CF9000F007C117D /* Assets.xcassets */ = {isa = PBXFileReference; lastKnownFileType = folder.assetcatalog; path = Assets.xcassets; sourceTree = ""; }; 97C147001CF9000F007C117D /* Base */ = {isa = PBXFileReference; lastKnownFileType = file.storyboard; name = Base; path = Base.lproj/LaunchScreen.storyboard; sourceTree = ""; }; 97C147021CF9000F007C117D /* Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = Info.plist; sourceTree = ""; }; + C52C87975794A5A9B04C1229 /* Pods-RunnerTests.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-RunnerTests.release.xcconfig"; path = "Target Support Files/Pods-RunnerTests/Pods-RunnerTests.release.xcconfig"; sourceTree = ""; }; + DE8D221F96FCC502A23CFF56 /* Pods-RunnerTests.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-RunnerTests.debug.xcconfig"; path = "Target Support Files/Pods-RunnerTests/Pods-RunnerTests.debug.xcconfig"; sourceTree = ""; }; + EA6F942AA36D9DBDF62C33E1 /* Pods-Runner.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-Runner.debug.xcconfig"; path = "Target Support Files/Pods-Runner/Pods-Runner.debug.xcconfig"; sourceTree = ""; }; + EB91AC448C84DB87BE82625E /* Pods-RunnerTests.profile.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-RunnerTests.profile.xcconfig"; path = "Target Support Files/Pods-RunnerTests/Pods-RunnerTests.profile.xcconfig"; sourceTree = ""; }; /* End PBXFileReference section */ /* Begin PBXFrameworksBuildPhase section */ + 5F03FF1F8FCC64FEEA535523 /* Frameworks */ = { + isa = PBXFrameworksBuildPhase; + buildActionMask = 2147483647; + files = ( + B26EBC66CECBEE9F86850458 /* Pods_RunnerTests.framework in Frameworks */, + ); + runOnlyForDeploymentPostprocessing = 0; + }; 97C146EB1CF9000F007C117D /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( + 7A527D5497784DEDACAC9248 /* Pods_Runner.framework in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; @@ -94,6 +113,8 @@ 97C146F01CF9000F007C117D /* Runner */, 97C146EF1CF9000F007C117D /* Products */, 331C8082294A63A400263BE5 /* RunnerTests */, + C7EAEA6A2A36B86B97DA8A07 /* Pods */, + B74C51CD52D83462C0698897 /* Frameworks */, ); sourceTree = ""; }; @@ -121,6 +142,29 @@ path = Runner; sourceTree = ""; }; + B74C51CD52D83462C0698897 /* Frameworks */ = { + isa = PBXGroup; + children = ( + 07B9FF9AB471833D8CBA33F5 /* Pods_Runner.framework */, + 96C2C2DECC7F545D5D9B160D /* Pods_RunnerTests.framework */, + ); + name = Frameworks; + sourceTree = ""; + }; + C7EAEA6A2A36B86B97DA8A07 /* Pods */ = { + isa = PBXGroup; + children = ( + EA6F942AA36D9DBDF62C33E1 /* Pods-Runner.debug.xcconfig */, + 5E649F149B2BB34D39D7C221 /* Pods-Runner.release.xcconfig */, + 5268A135E6281D556367B266 /* Pods-Runner.profile.xcconfig */, + DE8D221F96FCC502A23CFF56 /* Pods-RunnerTests.debug.xcconfig */, + C52C87975794A5A9B04C1229 /* Pods-RunnerTests.release.xcconfig */, + EB91AC448C84DB87BE82625E /* Pods-RunnerTests.profile.xcconfig */, + ); + name = Pods; + path = Pods; + sourceTree = ""; + }; /* End PBXGroup section */ /* Begin PBXNativeTarget section */ @@ -128,8 +172,10 @@ isa = PBXNativeTarget; buildConfigurationList = 331C8087294A63A400263BE5 /* Build configuration list for PBXNativeTarget "RunnerTests" */; buildPhases = ( + 5FA17AECB70E993CB5B7A72A /* [CP] Check Pods Manifest.lock */, 331C807D294A63A400263BE5 /* Sources */, 331C807F294A63A400263BE5 /* Resources */, + 5F03FF1F8FCC64FEEA535523 /* Frameworks */, ); buildRules = ( ); @@ -145,12 +191,14 @@ isa = PBXNativeTarget; buildConfigurationList = 97C147051CF9000F007C117D /* Build configuration list for PBXNativeTarget "Runner" */; buildPhases = ( + D94AD727B417D3BC7D991EA1 /* [CP] Check Pods Manifest.lock */, 9740EEB61CF901F6004384FC /* Run Script */, 97C146EA1CF9000F007C117D /* Sources */, 97C146EB1CF9000F007C117D /* Frameworks */, 97C146EC1CF9000F007C117D /* Resources */, 9705A1C41CF9048500538489 /* Embed Frameworks */, 3B06AD1E1E4923F5004D2608 /* Thin Binary */, + C85E79AEDC6253378385178D /* [CP] Embed Pods Frameworks */, ); buildRules = ( ); @@ -238,6 +286,28 @@ shellPath = /bin/sh; shellScript = "/bin/sh \"$FLUTTER_ROOT/packages/flutter_tools/bin/xcode_backend.sh\" embed_and_thin"; }; + 5FA17AECB70E993CB5B7A72A /* [CP] Check Pods Manifest.lock */ = { + isa = PBXShellScriptBuildPhase; + buildActionMask = 2147483647; + files = ( + ); + inputFileListPaths = ( + ); + inputPaths = ( + "${PODS_PODFILE_DIR_PATH}/Podfile.lock", + "${PODS_ROOT}/Manifest.lock", + ); + name = "[CP] Check Pods Manifest.lock"; + outputFileListPaths = ( + ); + outputPaths = ( + "$(DERIVED_FILE_DIR)/Pods-RunnerTests-checkManifestLockResult.txt", + ); + runOnlyForDeploymentPostprocessing = 0; + shellPath = /bin/sh; + shellScript = "diff \"${PODS_PODFILE_DIR_PATH}/Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [ $? != 0 ] ; then\n # print error to STDERR\n echo \"error: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\" >&2\n exit 1\nfi\n# This output is used by Xcode 'outputs' to avoid re-running this script phase.\necho \"SUCCESS\" > \"${SCRIPT_OUTPUT_FILE_0}\"\n"; + showEnvVarsInLog = 0; + }; 9740EEB61CF901F6004384FC /* Run Script */ = { isa = PBXShellScriptBuildPhase; alwaysOutOfDate = 1; @@ -253,6 +323,45 @@ shellPath = /bin/sh; shellScript = "/bin/sh \"$FLUTTER_ROOT/packages/flutter_tools/bin/xcode_backend.sh\" build"; }; + C85E79AEDC6253378385178D /* [CP] Embed Pods Frameworks */ = { + isa = PBXShellScriptBuildPhase; + buildActionMask = 2147483647; + files = ( + ); + inputFileListPaths = ( + "${PODS_ROOT}/Target Support Files/Pods-Runner/Pods-Runner-frameworks-${CONFIGURATION}-input-files.xcfilelist", + ); + name = "[CP] Embed Pods Frameworks"; + outputFileListPaths = ( + "${PODS_ROOT}/Target Support Files/Pods-Runner/Pods-Runner-frameworks-${CONFIGURATION}-output-files.xcfilelist", + ); + runOnlyForDeploymentPostprocessing = 0; + shellPath = /bin/sh; + shellScript = "\"${PODS_ROOT}/Target Support Files/Pods-Runner/Pods-Runner-frameworks.sh\"\n"; + showEnvVarsInLog = 0; + }; + D94AD727B417D3BC7D991EA1 /* [CP] Check Pods Manifest.lock */ = { + isa = PBXShellScriptBuildPhase; + buildActionMask = 2147483647; + files = ( + ); + inputFileListPaths = ( + ); + inputPaths = ( + "${PODS_PODFILE_DIR_PATH}/Podfile.lock", + "${PODS_ROOT}/Manifest.lock", + ); + name = "[CP] Check Pods Manifest.lock"; + outputFileListPaths = ( + ); + outputPaths = ( + "$(DERIVED_FILE_DIR)/Pods-Runner-checkManifestLockResult.txt", + ); + runOnlyForDeploymentPostprocessing = 0; + shellPath = /bin/sh; + shellScript = "diff \"${PODS_PODFILE_DIR_PATH}/Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [ $? != 0 ] ; then\n # print error to STDERR\n echo \"error: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\" >&2\n exit 1\nfi\n# This output is used by Xcode 'outputs' to avoid re-running this script phase.\necho \"SUCCESS\" > \"${SCRIPT_OUTPUT_FILE_0}\"\n"; + showEnvVarsInLog = 0; + }; /* End PBXShellScriptBuildPhase section */ /* Begin PBXSourcesBuildPhase section */ @@ -379,6 +488,7 @@ }; 331C8088294A63A400263BE5 /* Debug */ = { isa = XCBuildConfiguration; + baseConfigurationReference = DE8D221F96FCC502A23CFF56 /* Pods-RunnerTests.debug.xcconfig */; buildSettings = { BUNDLE_LOADER = "$(TEST_HOST)"; CODE_SIGN_STYLE = Automatic; @@ -396,6 +506,7 @@ }; 331C8089294A63A400263BE5 /* Release */ = { isa = XCBuildConfiguration; + baseConfigurationReference = C52C87975794A5A9B04C1229 /* Pods-RunnerTests.release.xcconfig */; buildSettings = { BUNDLE_LOADER = "$(TEST_HOST)"; CODE_SIGN_STYLE = Automatic; @@ -411,6 +522,7 @@ }; 331C808A294A63A400263BE5 /* Profile */ = { isa = XCBuildConfiguration; + baseConfigurationReference = EB91AC448C84DB87BE82625E /* Pods-RunnerTests.profile.xcconfig */; buildSettings = { BUNDLE_LOADER = "$(TEST_HOST)"; CODE_SIGN_STYLE = Automatic; diff --git a/example/ios/Runner.xcodeproj/xcshareddata/xcschemes/Runner.xcscheme b/example/ios/Runner.xcodeproj/xcshareddata/xcschemes/Runner.xcscheme index 8e3ca5d..497328a 100644 --- a/example/ios/Runner.xcodeproj/xcshareddata/xcschemes/Runner.xcscheme +++ b/example/ios/Runner.xcodeproj/xcshareddata/xcschemes/Runner.xcscheme @@ -70,6 +70,13 @@ ReferencedContainer = "container:Runner.xcodeproj"> + + + + + + diff --git a/example/ios/Runner/Base.lproj/Main.storyboard b/example/ios/Runner/Base.lproj/Main.storyboard index f3c2851..7e6915b 100644 --- a/example/ios/Runner/Base.lproj/Main.storyboard +++ b/example/ios/Runner/Base.lproj/Main.storyboard @@ -1,8 +1,10 @@ - - + + + - + + @@ -14,13 +16,14 @@ - + - + + diff --git a/example/lib/main.dart b/example/lib/main.dart index 6a2b62a..68657f6 100644 --- a/example/lib/main.dart +++ b/example/lib/main.dart @@ -16,9 +16,9 @@ class MyApp extends StatefulWidget { } class _MyAppState extends State { - String _encrypt = 'Unknown'; - String _decrypt = 'Unknown'; - final _flutterCryptoAlgorithmPlugin = FlutterCryptoAlgorithm(); + String _encrypt = ''; + String _decrypt = ''; + final _crypto = Crypto(); @override void initState() { @@ -32,9 +32,9 @@ class _MyAppState extends State { String decrypt; try { encrypt = - await _flutterCryptoAlgorithmPlugin.encrypt('Hello123', 'Hello') ?? + await _crypto.encrypt('Hello123', 'Hello') ?? 'Unknown encrypt'; - decrypt = await _flutterCryptoAlgorithmPlugin.decrypt(encrypt, 'Hello') ?? + decrypt = await _crypto.decrypt(encrypt, 'Hello') ?? 'Unknown decrypt'; } on PlatformException { encrypt = 'Failed encrypt.'; diff --git a/ios/Classes/AesAlgorithm.swift b/ios/Classes/AesAlgorithm.swift new file mode 100644 index 0000000..3639cac --- /dev/null +++ b/ios/Classes/AesAlgorithm.swift @@ -0,0 +1,37 @@ +import Foundation +import CryptoSwift + +class AesAlgorithm { + private let cryptoHelper = CryptoHelper() + + func encrypt(value: String, privateKey: String, ivKey: String?) -> String? { + let iv = cryptoHelper.genAESIvKey(ivKey: ivKey) + let key = cryptoHelper.genAESSecretKey(secretKey: privateKey) + + do { + let aes = try AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs5) + let encryptedBytes = try aes.encrypt(Array(value.utf8)) + let encryptedData = Data(encryptedBytes) + return encryptedData.base64EncodedString() + } catch { + print("Encryption error: \(error)") + return nil + } + } + + func decrypt(value: String, privateKey: String, ivKey: String?) -> String { + let iv = cryptoHelper.genAESIvKey(ivKey: ivKey) + let key = cryptoHelper.genAESSecretKey(secretKey: privateKey) + do { + let aes = try AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs5) + if let data = Data(base64Encoded: value) { + let decryptedBytes = try aes.decrypt([UInt8](data)) + return String(bytes: decryptedBytes, encoding: .utf8) ?? CryptoHelper.errValidKey + } else { + return CryptoHelper.errValidKey + } + } catch { + return CryptoHelper.errUnexpectedError + } + } +} \ No newline at end of file diff --git a/ios/Classes/CryptoHelper.swift b/ios/Classes/CryptoHelper.swift new file mode 100644 index 0000000..4f63a6a --- /dev/null +++ b/ios/Classes/CryptoHelper.swift @@ -0,0 +1,58 @@ +import Foundation +import CryptoSwift + +class CryptoHelper { + enum CryptoType { + case encrypt + case decrypt + } + struct Aes { + static let algorithm = "AES" + static let emptyIvSpec = Array(repeating: 0x00, count: 16) + static let emptySecretKey = Array(repeating: 0x00, count: 32) + } + internal static let errValuePrivateKeyNull = "Value and privateKey must not be null or empty" + internal static let errValuePrivateRequired = "Value and privateKey are required" + internal static let errValidKey = "Invalid key or corrupted data" + internal static let errIncorrectBlockSize = "Incorrect block size" + internal static let errUnexpectedError = "Unexpected error" + + private func genExactlyCharacterLengthKey(key: String, length: Int) -> String { + let bytes = Array(key.utf8) + let hexString = bytes.map { String(format: "%02x", $0) }.joined() + let hexLength = hexString.prefix(length).padding(toLength: length, withPad: "0", startingAt: 0) + return String(hexLength) + } + + func genSecretKey(algorithmType: String, secretKey: String?) -> Array { + switch algorithmType { + case CryptoHelper.Aes.algorithm: + if let secretKey = secretKey { + let transform = genExactlyCharacterLengthKey(key: secretKey, length: 32) + return Array(transform.utf8) + } else { + return Aes.emptySecretKey + } + default: + return Aes.emptySecretKey + } + } + + func genAESSecretKey(secretKey: String?) -> Array { + if let secretKey = secretKey { + let transform = genExactlyCharacterLengthKey(key: secretKey, length: 32) + return Array(transform.utf8) + } else { + return Aes.emptySecretKey + } + } + + func genAESIvKey(ivKey: String?) -> Array { + if let ivKey = ivKey { + let transform = genExactlyCharacterLengthKey(key: ivKey, length: 16) + return Array(transform.utf8) + } else { + return Aes.emptyIvSpec + } + } +} diff --git a/ios/Classes/FlutterCryptoAlgorithmPlugin.swift b/ios/Classes/FlutterCryptoAlgorithmPlugin.swift index abf8664..18a20ff 100644 --- a/ios/Classes/FlutterCryptoAlgorithmPlugin.swift +++ b/ios/Classes/FlutterCryptoAlgorithmPlugin.swift @@ -1,19 +1,92 @@ import Flutter import UIKit +import RxSwift -public class FlutterCryptoAlgorithmPlugin: NSObject, FlutterPlugin { - public static func register(with registrar: FlutterPluginRegistrar) { - let channel = FlutterMethodChannel(name: "flutter_crypto_algorithm", binaryMessenger: registrar.messenger()) - let instance = FlutterCryptoAlgorithmPlugin() - registrar.addMethodCallDelegate(instance, channel: channel) - } +let CRYPTO_CHANNEL = "flutter_crypto_algorithm" +let ENCRYPT_METHOD = "encrypt" +let DECRYPT_METHOD = "decrypt" - public func handle(_ call: FlutterMethodCall, result: @escaping FlutterResult) { - switch call.method { - case "getPlatformVersion": - result("iOS " + UIDevice.current.systemVersion) - default: - result(FlutterMethodNotImplemented) +public class FlutterCryptoAlgorithmPlugin: NSObject, FlutterPlugin { + private let disposeBag = DisposeBag() // For RxSwift memory management + private let cryptoHelper = CryptoHelper() + private let aesAlgorithm = AesAlgorithm() + + public static func register(with registrar: FlutterPluginRegistrar) { + let channel = FlutterMethodChannel(name: CRYPTO_CHANNEL, binaryMessenger: registrar.messenger()) + let instance = FlutterCryptoAlgorithmPlugin() + registrar.addMethodCallDelegate(instance, channel: channel) + } + + private func cryptoMethod(_ algorithmType: String, _ cryptoType: CryptoHelper.CryptoType, _ call: FlutterMethodCall, _ result: @escaping FlutterResult) { + if let arguments = call.arguments as? [String: Any] { + if let value = arguments["value"] as? String, !value.isEmpty, + let privateKey = arguments["privateKey"] as? String, !privateKey.isEmpty { + let ivKey = arguments["ivKey"] as? String + activityLaunch(algorithmType: algorithmType, cryptoType: cryptoType, + value: value, privateKey: privateKey, ivKey: ivKey, result: result) + } else { + result(NSError(domain: CryptoHelper.errValuePrivateKeyNull, code: 0, userInfo: nil)) + } + } else { + result(NSError(domain: CryptoHelper.errValuePrivateRequired, code: 0, userInfo: nil)) + } + } + + public func handle(_ call: FlutterMethodCall, result: @escaping FlutterResult) { + switch call.method { + case ENCRYPT_METHOD: + cryptoMethod(CryptoHelper.Aes.algorithm, CryptoHelper.CryptoType.encrypt, call, result) + case DECRYPT_METHOD: + cryptoMethod(CryptoHelper.Aes.algorithm, CryptoHelper.CryptoType.decrypt, call, result) + default: + result(FlutterMethodNotImplemented) + } + } + + private func activityLaunch(algorithmType: String, cryptoType: CryptoHelper.CryptoType, value: String, privateKey: String, ivKey: String?, result: @escaping FlutterResult) { + Observable.just(value) + .flatMap { data -> Observable in + switch algorithmType { + case CryptoHelper.Aes.algorithm: + switch cryptoType { + case CryptoHelper.CryptoType.encrypt: + return Observable.create { observer in + guard let encryptedData = self.aesAlgorithm.encrypt(value: data, privateKey: privateKey, ivKey: ivKey) else { + observer.onError(NSError(domain: CryptoHelper.errValidKey, code: 0, userInfo: nil)) + return Disposables.create() + } + observer.onNext(encryptedData) + observer.onCompleted() + return Disposables.create() + } + case CryptoHelper.CryptoType.decrypt: + return Observable.create { observer in + let decryptedData = self.aesAlgorithm.decrypt(value: data, privateKey: privateKey, ivKey: ivKey) + if decryptedData == CryptoHelper.errValidKey || + decryptedData == CryptoHelper.errIncorrectBlockSize || + decryptedData == CryptoHelper.errUnexpectedError { + observer.onError(NSError(domain: CryptoHelper.errValidKey, code: 0, userInfo: [NSLocalizedDescriptionKey: decryptedData])) + } else { + observer.onNext(decryptedData) + observer.onCompleted() + } + return Disposables.create() + } + } + default: + return Observable.error(NSError(domain: CryptoHelper.errValidKey, code: 0, userInfo: nil)) + } + } + .subscribe(on: ConcurrentDispatchQueueScheduler(qos: .userInitiated)) + .observe(on: MainScheduler.instance) // Observe result on main thread + .subscribe( + onNext: { data in + result(data) + }, + onError: { error in + result(error.localizedDescription) + } + ) + .disposed(by: disposeBag) } - } } diff --git a/lib/flutter_crypto_algorithm.dart b/lib/flutter_crypto_algorithm.dart index 8781e8c..34ee3da 100644 --- a/lib/flutter_crypto_algorithm.dart +++ b/lib/flutter_crypto_algorithm.dart @@ -1,6 +1,6 @@ import 'flutter_crypto_algorithm_platform_interface.dart'; -class FlutterCryptoAlgorithm { +class Crypto { Future encrypt(String value, String privateKey, {String? ivKey}) { return FlutterCryptoAlgorithmPlatform.instance .encrypt(value, privateKey, ivKey); diff --git a/lib/flutter_crypto_algorithm_method_channel.dart b/lib/flutter_crypto_algorithm_method_channel.dart index e133a75..7a8a59d 100644 --- a/lib/flutter_crypto_algorithm_method_channel.dart +++ b/lib/flutter_crypto_algorithm_method_channel.dart @@ -4,18 +4,20 @@ import 'package:flutter/services.dart'; import 'flutter_crypto_algorithm_platform_interface.dart'; /// An implementation of [FlutterCryptoAlgorithmPlatform] that uses method channels. -class MethodChannelFlutterCryptoAlgorithm extends FlutterCryptoAlgorithmPlatform { +class MethodChannelFlutterCryptoAlgorithm + extends FlutterCryptoAlgorithmPlatform { /// The method channel used to interact with the native platform. @visibleForTesting final methodChannel = const MethodChannel('flutter_crypto_algorithm'); @override - Future encrypt(String value, String privateKey, String? ivKey) async { + Future encrypt( + String value, String privateKey, String? ivKey) async { try { return await methodChannel.invokeMethod('encrypt', { 'value': value, 'privateKey': privateKey, - 'ivKey': ivKey, + if (ivKey != null) 'ivKey': ivKey }); } catch (e) { return null; @@ -23,12 +25,13 @@ class MethodChannelFlutterCryptoAlgorithm extends FlutterCryptoAlgorithmPlatform } @override - Future decrypt(String value, String privateKey, String? ivKey) async { + Future decrypt( + String value, String privateKey, String? ivKey) async { try { return await methodChannel.invokeMethod('decrypt', { 'value': value, 'privateKey': privateKey, - 'ivKey': ivKey, + if (ivKey != null) 'ivKey': ivKey }); } catch (e) { return null; diff --git a/test/flutter_crypto_algorithm_test.dart b/test/flutter_crypto_algorithm_test.dart index 9c92a8d..edc09e6 100644 --- a/test/flutter_crypto_algorithm_test.dart +++ b/test/flutter_crypto_algorithm_test.dart @@ -23,18 +23,16 @@ void main() { }); test('encrypt', () async { - FlutterCryptoAlgorithm flutterCryptoAlgorithmPlugin = FlutterCryptoAlgorithm(); + Crypto crypto = Crypto(); MockFlutterCryptoAlgorithmPlatform fakePlatform = MockFlutterCryptoAlgorithmPlatform(); FlutterCryptoAlgorithmPlatform.instance = fakePlatform; - - expect(await flutterCryptoAlgorithmPlugin.encrypt('Hello123', 'Hello'), 'IVVM1yR+Cn2Bbxo7RnkAQw=='); + expect(await crypto.encrypt('Hello123', 'Hello'), 'IVVM1yR+Cn2Bbxo7RnkAQw=='); }); test('decrypt', () async { - FlutterCryptoAlgorithm flutterCryptoAlgorithmPlugin = FlutterCryptoAlgorithm(); + Crypto crypto = Crypto(); MockFlutterCryptoAlgorithmPlatform fakePlatform = MockFlutterCryptoAlgorithmPlatform(); FlutterCryptoAlgorithmPlatform.instance = fakePlatform; - - expect(await flutterCryptoAlgorithmPlugin.decrypt('IVVM1yR+Cn2Bbxo7RnkAQw==', 'Hello'), 'Hello123'); + expect(await crypto.decrypt('IVVM1yR+Cn2Bbxo7RnkAQw==', 'Hello'), 'Hello123'); }); } From 5c57a08ffb21361b032f99ec92a7a68f2423038e Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 16:16:16 +0700 Subject: [PATCH 09/10] update version(#aes-algorithm) --- .github/workflows/flutter.yml | 14 ++++++++------ pubspec.yaml | 2 +- 2 files changed, 9 insertions(+), 7 deletions(-) diff --git a/.github/workflows/flutter.yml b/.github/workflows/flutter.yml index 7419cb6..edd0ee7 100644 --- a/.github/workflows/flutter.yml +++ b/.github/workflows/flutter.yml @@ -1,12 +1,12 @@ name: Flutter CI on: -# push: -# branches: -# - master - pull_request: + push: branches: - master +# pull_request: +# branches: +# - master jobs: build: @@ -26,9 +26,11 @@ jobs: with: path: | ~/.pub-cache - key: ${{ runner.os }}-pub-cache-${{ hashFiles('pubspec.yaml') }} + flutter/bin/cache + # key: ${{ runner.os }}-pub-cache-${{ hashFiles('pubspec.yaml') }} + key: ${{ runner.os }}-flutter-${{ hashFiles('pubspec.yaml', 'pubspec.lock') }} restore-keys: | - ${{ runner.os }}-pub-cache- + ${{ runner.os }}-flutter- - name: Install dependencies run: flutter pub get diff --git a/pubspec.yaml b/pubspec.yaml index 2bd95b1..9c50f77 100644 --- a/pubspec.yaml +++ b/pubspec.yaml @@ -1,6 +1,6 @@ name: flutter_crypto_algorithm description: "A Flutter package for secure encryption algorithms, providing efficient tools for data protection and encryption operations" -version: 0.0.1 +version: 0.1.0 repository: https://github.com/LamNguyen17/flutter_crypto_algorithm issue_tracker: https://github.com/LamNguyen17/flutter_crypto_algorithm/issues homepage: https://github.com/LamNguyen17/flutter_crypto_algorithm From 3ddbea8eb0a81451a3040ad8777e5ba17d11e78e Mon Sep 17 00:00:00 2001 From: LamNguyen176 Date: Fri, 11 Oct 2024 16:19:44 +0700 Subject: [PATCH 10/10] update coverage pull request(#aes-algorithm) --- .github/workflows/flutter.yml | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/.github/workflows/flutter.yml b/.github/workflows/flutter.yml index edd0ee7..51fc4a5 100644 --- a/.github/workflows/flutter.yml +++ b/.github/workflows/flutter.yml @@ -1,12 +1,9 @@ name: Flutter CI on: - push: + pull_request: branches: - master -# pull_request: -# branches: -# - master jobs: build: