wangguolei

Merge branch 'feature/face_auth' into 'master'

Feature/face auth 分支合并



See merge request !14
Showing 100 changed files with 180 additions and 178 deletions

Too many changes to show.

To preserve performance only 100 of 100+ files are displayed.

Pod::Spec.new do |s|
s.name = "HHVDoctorSDK"
s.version = "3.4.0.03021612"
s.version = "3.4.0.03221146"
s.summary = "和缓视频医生 SDK"
s.description = <<-DESC
... ...
This diff could not be displayed because it is too large.
This diff could not be displayed because it is too large.
... ... @@ -3,5 +3,5 @@
<plist version="1.0">
<dict>
<key>HHBundleVersion</key>
<string>3.4.0.03021612</string></dict>
<string>3.4.0.03221146</string></dict>
</plist>
... ...
... ... @@ -27,6 +27,8 @@ NS_ASSUME_NONNULL_BEGIN
+ (BOOL)canFaceAuth;
+ (void)unInitSDK;
@end
NS_ASSUME_NONNULL_END
... ...
... ... @@ -524,6 +524,17 @@ SWIFT_CLASS_PROPERTY(@property (nonatomic, class, readonly, strong, getter=defau
@interface HHMSDK (SWIFT_EXTENSION(hhVDoctorSDK))
/// 主动发起多人通话
/// \param type 呼叫类型
///
/// \param callee 被呼叫人的信息
///
- (void)startTeamCall:(enum HHCallType)type callee:(HHCallerInfo * _Nonnull)callee;
@end
@interface HHMSDK (SWIFT_EXTENSION(hhVDoctorSDK))
/// 指定人发起呼叫
/// <ul>
/// <li>
... ... @@ -534,17 +545,6 @@ SWIFT_CLASS_PROPERTY(@property (nonatomic, class, readonly, strong, getter=defau
@end
@interface HHMSDK (SWIFT_EXTENSION(hhVDoctorSDK))
/// 主动发起多人通话
/// \param type 呼叫类型
///
/// \param callee 被呼叫人的信息
///
- (void)startTeamCall:(enum HHCallType)type callee:(HHCallerInfo * _Nonnull)callee;
@end
@interface HHMSDK (SWIFT_EXTENSION(hhVDoctorSDK))
/// 发起呼叫
/// \param uuid 呼叫人uuid
... ... @@ -778,11 +778,6 @@ SWIFT_CLASS("_TtC12hhVDoctorSDK11TRTCManager")
@end
@interface TRTCManager (SWIFT_EXTENSION(hhVDoctorSDK)) <TIMMessageListener>
- (void)onNewMessage:(NSArray * _Null_unspecified)msgs;
@end
... ... @@ -792,6 +787,11 @@ SWIFT_CLASS("_TtC12hhVDoctorSDK11TRTCManager")
@end
@interface TRTCManager (SWIFT_EXTENSION(hhVDoctorSDK)) <TIMMessageListener>
- (void)onNewMessage:(NSArray * _Null_unspecified)msgs;
@end
... ...
... ... @@ -34,28 +34,6 @@ public protocol AEAD {
public static func decrypt(_ cipherText: Swift.Array<Swift.UInt8>, key: Swift.Array<Swift.UInt8>, iv: Swift.Array<Swift.UInt8>, authenticationHeader: Swift.Array<Swift.UInt8>, authenticationTag: Swift.Array<Swift.UInt8>) throws -> (plainText: Swift.Array<Swift.UInt8>, success: Swift.Bool)
@objc deinit
}
extension AES {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
extension AES : hhVDoctorSDK.Cryptors {
@inlinable final public func makeEncryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)
}
@inlinable final public func makeDecryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)
}
}
final public class AES {
public enum Error : Swift.Error {
case invalidKeySize
... ... @@ -267,6 +245,28 @@ extension AES : hhVDoctorSDK.Cipher {
return out
}
}
extension AES {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
extension AES : hhVDoctorSDK.Cryptors {
@inlinable final public func makeEncryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)
}
@inlinable final public func makeDecryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)
}
}
extension Array {
@inlinable internal init(reserveCapacity: Swift.Int) {
self = Array<Element>()
... ... @@ -460,9 +460,6 @@ public struct BlockModeOption : Swift.OptionSet {
public typealias Element = hhVDoctorSDK.BlockModeOption
public typealias RawValue = Swift.Int
}
extension Blowfish {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
final public class Blowfish {
public enum Error : Swift.Error {
case dataPaddingRequired
... ... @@ -484,6 +481,9 @@ extension Blowfish : hhVDoctorSDK.Cipher {
final public func encrypt<C>(_ bytes: C) throws -> Swift.Array<Swift.UInt8> where C : Swift.Collection, C.Element == Swift.UInt8, C.Index == Swift.Int
final public func decrypt<C>(_ bytes: C) throws -> Swift.Array<Swift.UInt8> where C : Swift.Collection, C.Element == Swift.UInt8, C.Index == Swift.Int
}
extension Blowfish {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
@_hasMissingDesignatedInitializers public class BusyPics {
public static let `default`: hhVDoctorSDK.BusyPics
public func cacheImgs()
... ... @@ -555,9 +555,6 @@ public struct CFB : hhVDoctorSDK.BlockMode {
public init(iv: Swift.Array<Swift.UInt8>, segmentSize: hhVDoctorSDK.CFB.SegmentSize = .cfb128)
public func worker(blockSize: Swift.Int, cipherOperation: @escaping hhVDoctorSDK.CipherOperationOnBlock, encryptionOperation: @escaping hhVDoctorSDK.CipherOperationOnBlock) throws -> hhVDoctorSDK.CipherModeWorker
}
extension ChaCha20 {
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class ChaCha20 {
public enum Error : Swift.Error {
case invalidKeyOrInitializationVector
... ... @@ -593,6 +590,9 @@ extension ChaCha20 : hhVDoctorSDK.Cryptors {
final public func makeEncryptor() -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable
final public func makeDecryptor() -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable
}
extension ChaCha20 {
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class Checksum {
@usableFromInline
internal static let table32: [Swift.UInt32]
... ... @@ -1626,9 +1626,6 @@ public struct HKDF {
public init(password: Swift.Array<Swift.UInt8>, salt: Swift.Array<Swift.UInt8>? = nil, info: Swift.Array<Swift.UInt8>? = nil, keyLength: Swift.Int? = nil, variant: hhVDoctorSDK.HMAC.Variant = .sha256) throws
public func calculate() throws -> Swift.Array<Swift.UInt8>
}
extension HMAC {
convenience public init(key: Swift.String, variant: hhVDoctorSDK.HMAC.Variant = .md5) throws
}
final public class HMAC : hhVDoctorSDK.Authenticator {
public enum Error : Swift.Error {
case authenticateError
... ... @@ -1651,6 +1648,9 @@ final public class HMAC : hhVDoctorSDK.Authenticator {
final public func authenticate(_ bytes: Swift.Array<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
@objc deinit
}
extension HMAC {
convenience public init(key: Swift.String, variant: hhVDoctorSDK.HMAC.Variant = .md5) throws
}
extension FixedWidthInteger {
@inlinable internal func bytes(totalBytes: Swift.Int = MemoryLayout<Self>.size) -> Swift.Array<Swift.UInt8> {
arrayOfBytes(value: self.littleEndian, length: totalBytes)
... ... @@ -2721,10 +2721,6 @@ final public class Poly1305 : hhVDoctorSDK.Authenticator {
final public func authenticate(_ bytes: Swift.Array<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
@objc deinit
}
extension Rabbit {
convenience public init(key: Swift.String) throws
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class Rabbit {
public enum Error : Swift.Error {
case invalidKeyOrInitializationVector
... ... @@ -2748,6 +2744,10 @@ extension Rabbit : hhVDoctorSDK.Cipher {
final public func encrypt(_ bytes: Swift.ArraySlice<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
final public func decrypt(_ bytes: Swift.ArraySlice<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
}
extension Rabbit {
convenience public init(key: Swift.String) throws
convenience public init(key: Swift.String, iv: Swift.String) throws
}
public enum ReachabilityError : Swift.Error {
case FailedToCreateWithAddress(Darwin.sockaddr_in)
case FailedToCreateWithHostname(Swift.String)
... ... @@ -3354,6 +3354,11 @@ extension TRTCManager : ImSDK.TIMConnListener {
@objc dynamic public func onConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onDisconnect(_ code: Swift.Int32, err: Swift.String!)
}
extension TRTCManager : ImSDK.TIMUserStatusListener {
@objc dynamic public func onForceOffline()
@objc dynamic public func onReConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onUserSigExpired()
}
extension TRTCManager : TXLiteAVSDK_TRTC.TRTCCloudDelegate {
@objc dynamic public func onEnterRoom(_ result: Swift.Int)
@objc dynamic public func onError(_ errCode: TXLiteAVSDK_TRTC.TXLiteAVError, errMsg: Swift.String?, extInfo: [Swift.AnyHashable : Any]?)
... ... @@ -3361,11 +3366,6 @@ extension TRTCManager : TXLiteAVSDK_TRTC.TRTCCloudDelegate {
extension TRTCManager : TXLiteAVSDK_TRTC.TRTCLogDelegate {
@objc dynamic public func onLog(_ log: Swift.String?, logLevel level: TXLiteAVSDK_TRTC.TRTCLogLevel, whichModule module: Swift.String?)
}
extension TRTCManager : ImSDK.TIMUserStatusListener {
@objc dynamic public func onForceOffline()
@objc dynamic public func onReConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onUserSigExpired()
}
extension String {
public func subFrom(_ index: Swift.Int) -> Swift.String
}
... ...
... ... @@ -34,28 +34,6 @@ public protocol AEAD {
public static func decrypt(_ cipherText: Swift.Array<Swift.UInt8>, key: Swift.Array<Swift.UInt8>, iv: Swift.Array<Swift.UInt8>, authenticationHeader: Swift.Array<Swift.UInt8>, authenticationTag: Swift.Array<Swift.UInt8>) throws -> (plainText: Swift.Array<Swift.UInt8>, success: Swift.Bool)
@objc deinit
}
extension AES {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
extension AES : hhVDoctorSDK.Cryptors {
@inlinable final public func makeEncryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)
}
@inlinable final public func makeDecryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)
}
}
final public class AES {
public enum Error : Swift.Error {
case invalidKeySize
... ... @@ -267,6 +245,28 @@ extension AES : hhVDoctorSDK.Cipher {
return out
}
}
extension AES {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
extension AES : hhVDoctorSDK.Cryptors {
@inlinable final public func makeEncryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)
}
@inlinable final public func makeDecryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)
}
}
extension Array {
@inlinable internal init(reserveCapacity: Swift.Int) {
self = Array<Element>()
... ... @@ -460,9 +460,6 @@ public struct BlockModeOption : Swift.OptionSet {
public typealias Element = hhVDoctorSDK.BlockModeOption
public typealias RawValue = Swift.Int
}
extension Blowfish {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
final public class Blowfish {
public enum Error : Swift.Error {
case dataPaddingRequired
... ... @@ -484,6 +481,9 @@ extension Blowfish : hhVDoctorSDK.Cipher {
final public func encrypt<C>(_ bytes: C) throws -> Swift.Array<Swift.UInt8> where C : Swift.Collection, C.Element == Swift.UInt8, C.Index == Swift.Int
final public func decrypt<C>(_ bytes: C) throws -> Swift.Array<Swift.UInt8> where C : Swift.Collection, C.Element == Swift.UInt8, C.Index == Swift.Int
}
extension Blowfish {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
@_hasMissingDesignatedInitializers public class BusyPics {
public static let `default`: hhVDoctorSDK.BusyPics
public func cacheImgs()
... ... @@ -555,9 +555,6 @@ public struct CFB : hhVDoctorSDK.BlockMode {
public init(iv: Swift.Array<Swift.UInt8>, segmentSize: hhVDoctorSDK.CFB.SegmentSize = .cfb128)
public func worker(blockSize: Swift.Int, cipherOperation: @escaping hhVDoctorSDK.CipherOperationOnBlock, encryptionOperation: @escaping hhVDoctorSDK.CipherOperationOnBlock) throws -> hhVDoctorSDK.CipherModeWorker
}
extension ChaCha20 {
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class ChaCha20 {
public enum Error : Swift.Error {
case invalidKeyOrInitializationVector
... ... @@ -593,6 +590,9 @@ extension ChaCha20 : hhVDoctorSDK.Cryptors {
final public func makeEncryptor() -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable
final public func makeDecryptor() -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable
}
extension ChaCha20 {
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class Checksum {
@usableFromInline
internal static let table32: [Swift.UInt32]
... ... @@ -1626,9 +1626,6 @@ public struct HKDF {
public init(password: Swift.Array<Swift.UInt8>, salt: Swift.Array<Swift.UInt8>? = nil, info: Swift.Array<Swift.UInt8>? = nil, keyLength: Swift.Int? = nil, variant: hhVDoctorSDK.HMAC.Variant = .sha256) throws
public func calculate() throws -> Swift.Array<Swift.UInt8>
}
extension HMAC {
convenience public init(key: Swift.String, variant: hhVDoctorSDK.HMAC.Variant = .md5) throws
}
final public class HMAC : hhVDoctorSDK.Authenticator {
public enum Error : Swift.Error {
case authenticateError
... ... @@ -1651,6 +1648,9 @@ final public class HMAC : hhVDoctorSDK.Authenticator {
final public func authenticate(_ bytes: Swift.Array<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
@objc deinit
}
extension HMAC {
convenience public init(key: Swift.String, variant: hhVDoctorSDK.HMAC.Variant = .md5) throws
}
extension FixedWidthInteger {
@inlinable internal func bytes(totalBytes: Swift.Int = MemoryLayout<Self>.size) -> Swift.Array<Swift.UInt8> {
arrayOfBytes(value: self.littleEndian, length: totalBytes)
... ... @@ -2721,10 +2721,6 @@ final public class Poly1305 : hhVDoctorSDK.Authenticator {
final public func authenticate(_ bytes: Swift.Array<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
@objc deinit
}
extension Rabbit {
convenience public init(key: Swift.String) throws
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class Rabbit {
public enum Error : Swift.Error {
case invalidKeyOrInitializationVector
... ... @@ -2748,6 +2744,10 @@ extension Rabbit : hhVDoctorSDK.Cipher {
final public func encrypt(_ bytes: Swift.ArraySlice<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
final public func decrypt(_ bytes: Swift.ArraySlice<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
}
extension Rabbit {
convenience public init(key: Swift.String) throws
convenience public init(key: Swift.String, iv: Swift.String) throws
}
public enum ReachabilityError : Swift.Error {
case FailedToCreateWithAddress(Darwin.sockaddr_in)
case FailedToCreateWithHostname(Swift.String)
... ... @@ -3354,6 +3354,11 @@ extension TRTCManager : ImSDK.TIMConnListener {
@objc dynamic public func onConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onDisconnect(_ code: Swift.Int32, err: Swift.String!)
}
extension TRTCManager : ImSDK.TIMUserStatusListener {
@objc dynamic public func onForceOffline()
@objc dynamic public func onReConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onUserSigExpired()
}
extension TRTCManager : TXLiteAVSDK_TRTC.TRTCCloudDelegate {
@objc dynamic public func onEnterRoom(_ result: Swift.Int)
@objc dynamic public func onError(_ errCode: TXLiteAVSDK_TRTC.TXLiteAVError, errMsg: Swift.String?, extInfo: [Swift.AnyHashable : Any]?)
... ... @@ -3361,11 +3366,6 @@ extension TRTCManager : TXLiteAVSDK_TRTC.TRTCCloudDelegate {
extension TRTCManager : TXLiteAVSDK_TRTC.TRTCLogDelegate {
@objc dynamic public func onLog(_ log: Swift.String?, logLevel level: TXLiteAVSDK_TRTC.TRTCLogLevel, whichModule module: Swift.String?)
}
extension TRTCManager : ImSDK.TIMUserStatusListener {
@objc dynamic public func onForceOffline()
@objc dynamic public func onReConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onUserSigExpired()
}
extension String {
public func subFrom(_ index: Swift.Int) -> Swift.String
}
... ...
... ... @@ -34,28 +34,6 @@ public protocol AEAD {
public static func decrypt(_ cipherText: Swift.Array<Swift.UInt8>, key: Swift.Array<Swift.UInt8>, iv: Swift.Array<Swift.UInt8>, authenticationHeader: Swift.Array<Swift.UInt8>, authenticationTag: Swift.Array<Swift.UInt8>) throws -> (plainText: Swift.Array<Swift.UInt8>, success: Swift.Bool)
@objc deinit
}
extension AES {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
extension AES : hhVDoctorSDK.Cryptors {
@inlinable final public func makeEncryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)
}
@inlinable final public func makeDecryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)
}
}
final public class AES {
public enum Error : Swift.Error {
case invalidKeySize
... ... @@ -267,6 +245,28 @@ extension AES : hhVDoctorSDK.Cipher {
return out
}
}
extension AES {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
extension AES : hhVDoctorSDK.Cryptors {
@inlinable final public func makeEncryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)
}
@inlinable final public func makeDecryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)
}
}
extension Array {
@inlinable internal init(reserveCapacity: Swift.Int) {
self = Array<Element>()
... ... @@ -460,9 +460,6 @@ public struct BlockModeOption : Swift.OptionSet {
public typealias Element = hhVDoctorSDK.BlockModeOption
public typealias RawValue = Swift.Int
}
extension Blowfish {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
final public class Blowfish {
public enum Error : Swift.Error {
case dataPaddingRequired
... ... @@ -484,6 +481,9 @@ extension Blowfish : hhVDoctorSDK.Cipher {
final public func encrypt<C>(_ bytes: C) throws -> Swift.Array<Swift.UInt8> where C : Swift.Collection, C.Element == Swift.UInt8, C.Index == Swift.Int
final public func decrypt<C>(_ bytes: C) throws -> Swift.Array<Swift.UInt8> where C : Swift.Collection, C.Element == Swift.UInt8, C.Index == Swift.Int
}
extension Blowfish {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
@_hasMissingDesignatedInitializers public class BusyPics {
public static let `default`: hhVDoctorSDK.BusyPics
public func cacheImgs()
... ... @@ -555,9 +555,6 @@ public struct CFB : hhVDoctorSDK.BlockMode {
public init(iv: Swift.Array<Swift.UInt8>, segmentSize: hhVDoctorSDK.CFB.SegmentSize = .cfb128)
public func worker(blockSize: Swift.Int, cipherOperation: @escaping hhVDoctorSDK.CipherOperationOnBlock, encryptionOperation: @escaping hhVDoctorSDK.CipherOperationOnBlock) throws -> hhVDoctorSDK.CipherModeWorker
}
extension ChaCha20 {
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class ChaCha20 {
public enum Error : Swift.Error {
case invalidKeyOrInitializationVector
... ... @@ -593,6 +590,9 @@ extension ChaCha20 : hhVDoctorSDK.Cryptors {
final public func makeEncryptor() -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable
final public func makeDecryptor() -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable
}
extension ChaCha20 {
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class Checksum {
@usableFromInline
internal static let table32: [Swift.UInt32]
... ... @@ -1626,9 +1626,6 @@ public struct HKDF {
public init(password: Swift.Array<Swift.UInt8>, salt: Swift.Array<Swift.UInt8>? = nil, info: Swift.Array<Swift.UInt8>? = nil, keyLength: Swift.Int? = nil, variant: hhVDoctorSDK.HMAC.Variant = .sha256) throws
public func calculate() throws -> Swift.Array<Swift.UInt8>
}
extension HMAC {
convenience public init(key: Swift.String, variant: hhVDoctorSDK.HMAC.Variant = .md5) throws
}
final public class HMAC : hhVDoctorSDK.Authenticator {
public enum Error : Swift.Error {
case authenticateError
... ... @@ -1651,6 +1648,9 @@ final public class HMAC : hhVDoctorSDK.Authenticator {
final public func authenticate(_ bytes: Swift.Array<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
@objc deinit
}
extension HMAC {
convenience public init(key: Swift.String, variant: hhVDoctorSDK.HMAC.Variant = .md5) throws
}
extension FixedWidthInteger {
@inlinable internal func bytes(totalBytes: Swift.Int = MemoryLayout<Self>.size) -> Swift.Array<Swift.UInt8> {
arrayOfBytes(value: self.littleEndian, length: totalBytes)
... ... @@ -2721,10 +2721,6 @@ final public class Poly1305 : hhVDoctorSDK.Authenticator {
final public func authenticate(_ bytes: Swift.Array<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
@objc deinit
}
extension Rabbit {
convenience public init(key: Swift.String) throws
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class Rabbit {
public enum Error : Swift.Error {
case invalidKeyOrInitializationVector
... ... @@ -2748,6 +2744,10 @@ extension Rabbit : hhVDoctorSDK.Cipher {
final public func encrypt(_ bytes: Swift.ArraySlice<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
final public func decrypt(_ bytes: Swift.ArraySlice<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
}
extension Rabbit {
convenience public init(key: Swift.String) throws
convenience public init(key: Swift.String, iv: Swift.String) throws
}
public enum ReachabilityError : Swift.Error {
case FailedToCreateWithAddress(Darwin.sockaddr_in)
case FailedToCreateWithHostname(Swift.String)
... ... @@ -3354,6 +3354,11 @@ extension TRTCManager : ImSDK.TIMConnListener {
@objc dynamic public func onConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onDisconnect(_ code: Swift.Int32, err: Swift.String!)
}
extension TRTCManager : ImSDK.TIMUserStatusListener {
@objc dynamic public func onForceOffline()
@objc dynamic public func onReConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onUserSigExpired()
}
extension TRTCManager : TXLiteAVSDK_TRTC.TRTCCloudDelegate {
@objc dynamic public func onEnterRoom(_ result: Swift.Int)
@objc dynamic public func onError(_ errCode: TXLiteAVSDK_TRTC.TXLiteAVError, errMsg: Swift.String?, extInfo: [Swift.AnyHashable : Any]?)
... ... @@ -3361,11 +3366,6 @@ extension TRTCManager : TXLiteAVSDK_TRTC.TRTCCloudDelegate {
extension TRTCManager : TXLiteAVSDK_TRTC.TRTCLogDelegate {
@objc dynamic public func onLog(_ log: Swift.String?, logLevel level: TXLiteAVSDK_TRTC.TRTCLogLevel, whichModule module: Swift.String?)
}
extension TRTCManager : ImSDK.TIMUserStatusListener {
@objc dynamic public func onForceOffline()
@objc dynamic public func onReConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onUserSigExpired()
}
extension String {
public func subFrom(_ index: Swift.Int) -> Swift.String
}
... ...
... ... @@ -34,28 +34,6 @@ public protocol AEAD {
public static func decrypt(_ cipherText: Swift.Array<Swift.UInt8>, key: Swift.Array<Swift.UInt8>, iv: Swift.Array<Swift.UInt8>, authenticationHeader: Swift.Array<Swift.UInt8>, authenticationTag: Swift.Array<Swift.UInt8>) throws -> (plainText: Swift.Array<Swift.UInt8>, success: Swift.Bool)
@objc deinit
}
extension AES {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
extension AES : hhVDoctorSDK.Cryptors {
@inlinable final public func makeEncryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)
}
@inlinable final public func makeDecryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)
}
}
final public class AES {
public enum Error : Swift.Error {
case invalidKeySize
... ... @@ -267,6 +245,28 @@ extension AES : hhVDoctorSDK.Cipher {
return out
}
}
extension AES {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
extension AES : hhVDoctorSDK.Cryptors {
@inlinable final public func makeEncryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)
}
@inlinable final public func makeDecryptor() throws -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable {
let blockSize = blockMode.customBlockSize ?? AES.blockSize
let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt
let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)
if worker is StreamModeWorker {
return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)
}
return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)
}
}
extension Array {
@inlinable internal init(reserveCapacity: Swift.Int) {
self = Array<Element>()
... ... @@ -460,9 +460,6 @@ public struct BlockModeOption : Swift.OptionSet {
public typealias Element = hhVDoctorSDK.BlockModeOption
public typealias RawValue = Swift.Int
}
extension Blowfish {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
final public class Blowfish {
public enum Error : Swift.Error {
case dataPaddingRequired
... ... @@ -484,6 +481,9 @@ extension Blowfish : hhVDoctorSDK.Cipher {
final public func encrypt<C>(_ bytes: C) throws -> Swift.Array<Swift.UInt8> where C : Swift.Collection, C.Element == Swift.UInt8, C.Index == Swift.Int
final public func decrypt<C>(_ bytes: C) throws -> Swift.Array<Swift.UInt8> where C : Swift.Collection, C.Element == Swift.UInt8, C.Index == Swift.Int
}
extension Blowfish {
convenience public init(key: Swift.String, iv: Swift.String, padding: hhVDoctorSDK.Padding = .pkcs7) throws
}
@_hasMissingDesignatedInitializers public class BusyPics {
public static let `default`: hhVDoctorSDK.BusyPics
public func cacheImgs()
... ... @@ -555,9 +555,6 @@ public struct CFB : hhVDoctorSDK.BlockMode {
public init(iv: Swift.Array<Swift.UInt8>, segmentSize: hhVDoctorSDK.CFB.SegmentSize = .cfb128)
public func worker(blockSize: Swift.Int, cipherOperation: @escaping hhVDoctorSDK.CipherOperationOnBlock, encryptionOperation: @escaping hhVDoctorSDK.CipherOperationOnBlock) throws -> hhVDoctorSDK.CipherModeWorker
}
extension ChaCha20 {
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class ChaCha20 {
public enum Error : Swift.Error {
case invalidKeyOrInitializationVector
... ... @@ -593,6 +590,9 @@ extension ChaCha20 : hhVDoctorSDK.Cryptors {
final public func makeEncryptor() -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable
final public func makeDecryptor() -> hhVDoctorSDK.Cryptor & hhVDoctorSDK.Updatable
}
extension ChaCha20 {
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class Checksum {
@usableFromInline
internal static let table32: [Swift.UInt32]
... ... @@ -1626,9 +1626,6 @@ public struct HKDF {
public init(password: Swift.Array<Swift.UInt8>, salt: Swift.Array<Swift.UInt8>? = nil, info: Swift.Array<Swift.UInt8>? = nil, keyLength: Swift.Int? = nil, variant: hhVDoctorSDK.HMAC.Variant = .sha256) throws
public func calculate() throws -> Swift.Array<Swift.UInt8>
}
extension HMAC {
convenience public init(key: Swift.String, variant: hhVDoctorSDK.HMAC.Variant = .md5) throws
}
final public class HMAC : hhVDoctorSDK.Authenticator {
public enum Error : Swift.Error {
case authenticateError
... ... @@ -1651,6 +1648,9 @@ final public class HMAC : hhVDoctorSDK.Authenticator {
final public func authenticate(_ bytes: Swift.Array<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
@objc deinit
}
extension HMAC {
convenience public init(key: Swift.String, variant: hhVDoctorSDK.HMAC.Variant = .md5) throws
}
extension FixedWidthInteger {
@inlinable internal func bytes(totalBytes: Swift.Int = MemoryLayout<Self>.size) -> Swift.Array<Swift.UInt8> {
arrayOfBytes(value: self.littleEndian, length: totalBytes)
... ... @@ -2721,10 +2721,6 @@ final public class Poly1305 : hhVDoctorSDK.Authenticator {
final public func authenticate(_ bytes: Swift.Array<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
@objc deinit
}
extension Rabbit {
convenience public init(key: Swift.String) throws
convenience public init(key: Swift.String, iv: Swift.String) throws
}
final public class Rabbit {
public enum Error : Swift.Error {
case invalidKeyOrInitializationVector
... ... @@ -2748,6 +2744,10 @@ extension Rabbit : hhVDoctorSDK.Cipher {
final public func encrypt(_ bytes: Swift.ArraySlice<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
final public func decrypt(_ bytes: Swift.ArraySlice<Swift.UInt8>) throws -> Swift.Array<Swift.UInt8>
}
extension Rabbit {
convenience public init(key: Swift.String) throws
convenience public init(key: Swift.String, iv: Swift.String) throws
}
public enum ReachabilityError : Swift.Error {
case FailedToCreateWithAddress(Darwin.sockaddr_in)
case FailedToCreateWithHostname(Swift.String)
... ... @@ -3354,6 +3354,11 @@ extension TRTCManager : ImSDK.TIMConnListener {
@objc dynamic public func onConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onDisconnect(_ code: Swift.Int32, err: Swift.String!)
}
extension TRTCManager : ImSDK.TIMUserStatusListener {
@objc dynamic public func onForceOffline()
@objc dynamic public func onReConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onUserSigExpired()
}
extension TRTCManager : TXLiteAVSDK_TRTC.TRTCCloudDelegate {
@objc dynamic public func onEnterRoom(_ result: Swift.Int)
@objc dynamic public func onError(_ errCode: TXLiteAVSDK_TRTC.TXLiteAVError, errMsg: Swift.String?, extInfo: [Swift.AnyHashable : Any]?)
... ... @@ -3361,11 +3366,6 @@ extension TRTCManager : TXLiteAVSDK_TRTC.TRTCCloudDelegate {
extension TRTCManager : TXLiteAVSDK_TRTC.TRTCLogDelegate {
@objc dynamic public func onLog(_ log: Swift.String?, logLevel level: TXLiteAVSDK_TRTC.TRTCLogLevel, whichModule module: Swift.String?)
}
extension TRTCManager : ImSDK.TIMUserStatusListener {
@objc dynamic public func onForceOffline()
@objc dynamic public func onReConnFailed(_ code: Swift.Int32, err: Swift.String!)
@objc dynamic public func onUserSigExpired()
}
extension String {
public func subFrom(_ index: Swift.Int) -> Swift.String
}
... ...
This diff could not be displayed because it is too large.
This diff could not be displayed because it is too large.