@bitgo-beta/sdk-lib-mpc 8.2.1-alpha.356 → 8.2.1-alpha.358
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/package.json +3 -3
- package/dist/src/curves/constant.d.ts +0 -2
- package/dist/src/curves/constant.d.ts.map +0 -1
- package/dist/src/curves/constant.js +0 -6
- package/dist/src/curves/ed25519.d.ts +0 -20
- package/dist/src/curves/ed25519.d.ts.map +0 -1
- package/dist/src/curves/ed25519.js +0 -72
- package/dist/src/curves/ed25519Bip32HdTree.d.ts +0 -10
- package/dist/src/curves/ed25519Bip32HdTree.d.ts.map +0 -1
- package/dist/src/curves/ed25519Bip32HdTree.js +0 -85
- package/dist/src/curves/index.d.ts +0 -8
- package/dist/src/curves/index.d.ts.map +0 -1
- package/dist/src/curves/index.js +0 -24
- package/dist/src/curves/secp256k1.d.ts +0 -18
- package/dist/src/curves/secp256k1.d.ts.map +0 -1
- package/dist/src/curves/secp256k1.js +0 -61
- package/dist/src/curves/secp256k1Bip32HdTree.d.ts +0 -8
- package/dist/src/curves/secp256k1Bip32HdTree.d.ts.map +0 -1
- package/dist/src/curves/secp256k1Bip32HdTree.js +0 -54
- package/dist/src/curves/types.d.ts +0 -35
- package/dist/src/curves/types.d.ts.map +0 -1
- package/dist/src/curves/types.js +0 -3
- package/dist/src/curves/util.d.ts +0 -4
- package/dist/src/curves/util.d.ts.map +0 -1
- package/dist/src/curves/util.js +0 -42
- package/dist/src/hashCommitment.d.ts +0 -16
- package/dist/src/hashCommitment.d.ts.map +0 -1
- package/dist/src/hashCommitment.js +0 -44
- package/dist/src/index.d.ts +0 -9
- package/dist/src/index.d.ts.map +0 -1
- package/dist/src/index.js +0 -48
- package/dist/src/openssl/index.d.ts +0 -2
- package/dist/src/openssl/index.d.ts.map +0 -1
- package/dist/src/openssl/index.js +0 -18
- package/dist/src/openssl/openssl.d.ts +0 -8
- package/dist/src/openssl/openssl.d.ts.map +0 -1
- package/dist/src/openssl/openssl.js +0 -37
- package/dist/src/safePrime.d.ts +0 -3
- package/dist/src/safePrime.d.ts.map +0 -1
- package/dist/src/safePrime.js +0 -19
- package/dist/src/schnorrProof.d.ts +0 -21
- package/dist/src/schnorrProof.d.ts.map +0 -1
- package/dist/src/schnorrProof.js +0 -61
- package/dist/src/shamir/index.d.ts +0 -3
- package/dist/src/shamir/index.d.ts.map +0 -1
- package/dist/src/shamir/index.js +0 -19
- package/dist/src/shamir/shamir.d.ts +0 -38
- package/dist/src/shamir/shamir.d.ts.map +0 -1
- package/dist/src/shamir/shamir.js +0 -136
- package/dist/src/shamir/types.d.ts +0 -5
- package/dist/src/shamir/types.d.ts.map +0 -1
- package/dist/src/shamir/types.js +0 -3
- package/dist/src/tss/ecdsa/index.d.ts +0 -6
- package/dist/src/tss/ecdsa/index.d.ts.map +0 -1
- package/dist/src/tss/ecdsa/index.js +0 -42
- package/dist/src/tss/ecdsa/paillierproof.d.ts +0 -24
- package/dist/src/tss/ecdsa/paillierproof.d.ts.map +0 -1
- package/dist/src/tss/ecdsa/paillierproof.js +0 -86
- package/dist/src/tss/ecdsa/primes.d.ts +0 -2
- package/dist/src/tss/ecdsa/primes.d.ts.map +0 -1
- package/dist/src/tss/ecdsa/primes.js +0 -1846
- package/dist/src/tss/ecdsa/rangeproof.d.ts +0 -79
- package/dist/src/tss/ecdsa/rangeproof.d.ts.map +0 -1
- package/dist/src/tss/ecdsa/rangeproof.js +0 -394
- package/dist/src/tss/ecdsa/types.d.ts +0 -142
- package/dist/src/tss/ecdsa/types.d.ts.map +0 -1
- package/dist/src/tss/ecdsa/types.js +0 -130
- package/dist/src/tss/ecdsa/zkVProof.d.ts +0 -24
- package/dist/src/tss/ecdsa/zkVProof.d.ts.map +0 -1
- package/dist/src/tss/ecdsa/zkVProof.js +0 -70
- package/dist/src/tss/ecdsa-dkls/commsLayer.d.ts +0 -42
- package/dist/src/tss/ecdsa-dkls/commsLayer.d.ts.map +0 -1
- package/dist/src/tss/ecdsa-dkls/commsLayer.js +0 -235
- package/dist/src/tss/ecdsa-dkls/dkg.d.ts +0 -57
- package/dist/src/tss/ecdsa-dkls/dkg.d.ts.map +0 -1
- package/dist/src/tss/ecdsa-dkls/dkg.js +0 -321
- package/dist/src/tss/ecdsa-dkls/dsg.d.ts +0 -47
- package/dist/src/tss/ecdsa-dkls/dsg.d.ts.map +0 -1
- package/dist/src/tss/ecdsa-dkls/dsg.js +0 -266
- package/dist/src/tss/ecdsa-dkls/index.d.ts +0 -6
- package/dist/src/tss/ecdsa-dkls/index.d.ts.map +0 -1
- package/dist/src/tss/ecdsa-dkls/index.js +0 -42
- package/dist/src/tss/ecdsa-dkls/types.d.ts +0 -118
- package/dist/src/tss/ecdsa-dkls/types.d.ts.map +0 -1
- package/dist/src/tss/ecdsa-dkls/types.js +0 -165
- package/dist/src/tss/ecdsa-dkls/util.d.ts +0 -26
- package/dist/src/tss/ecdsa-dkls/util.d.ts.map +0 -1
- package/dist/src/tss/ecdsa-dkls/util.js +0 -276
- package/dist/src/tss/index.d.ts +0 -3
- package/dist/src/tss/index.d.ts.map +0 -1
- package/dist/src/tss/index.js +0 -19
- package/dist/src/types.d.ts +0 -13
- package/dist/src/types.d.ts.map +0 -1
- package/dist/src/types.js +0 -3
- package/dist/src/util.d.ts +0 -58
- package/dist/src/util.d.ts.map +0 -1
- package/dist/src/util.js +0 -164
|
@@ -1,235 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
-
var ownKeys = function(o) {
|
|
20
|
-
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
-
var ar = [];
|
|
22
|
-
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
-
return ar;
|
|
24
|
-
};
|
|
25
|
-
return ownKeys(o);
|
|
26
|
-
};
|
|
27
|
-
return function (mod) {
|
|
28
|
-
if (mod && mod.__esModule) return mod;
|
|
29
|
-
var result = {};
|
|
30
|
-
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
-
__setModuleDefault(result, mod);
|
|
32
|
-
return result;
|
|
33
|
-
};
|
|
34
|
-
})();
|
|
35
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
-
exports.detachSignData = detachSignData;
|
|
37
|
-
exports.encryptAndDetachSignData = encryptAndDetachSignData;
|
|
38
|
-
exports.decryptAndVerifySignedData = decryptAndVerifySignedData;
|
|
39
|
-
exports.verifySignedData = verifySignedData;
|
|
40
|
-
exports.decryptAndVerifyIncomingMessages = decryptAndVerifyIncomingMessages;
|
|
41
|
-
exports.encryptAndAuthOutgoingMessages = encryptAndAuthOutgoingMessages;
|
|
42
|
-
const pgp = __importStar(require("openpgp"));
|
|
43
|
-
/**
|
|
44
|
-
* Detach signs a binary and encodes it in base64
|
|
45
|
-
* @param data binary to encode in base64 and sign
|
|
46
|
-
* @param privateArmor private key to sign with
|
|
47
|
-
*/
|
|
48
|
-
async function detachSignData(data, privateArmor) {
|
|
49
|
-
const message = await pgp.createMessage({ binary: data });
|
|
50
|
-
const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });
|
|
51
|
-
const signature = await pgp.sign({
|
|
52
|
-
message,
|
|
53
|
-
signingKeys: privateKey,
|
|
54
|
-
format: 'armored',
|
|
55
|
-
detached: true,
|
|
56
|
-
config: {
|
|
57
|
-
rejectCurves: new Set(),
|
|
58
|
-
showVersion: false,
|
|
59
|
-
showComment: false,
|
|
60
|
-
},
|
|
61
|
-
});
|
|
62
|
-
return {
|
|
63
|
-
message: data.toString('base64'),
|
|
64
|
-
signature: signature,
|
|
65
|
-
};
|
|
66
|
-
}
|
|
67
|
-
/**
|
|
68
|
-
* Encrypts and detach signs a binary
|
|
69
|
-
* @param data binary to encrypt and sign
|
|
70
|
-
* @param publicArmor public key to encrypt with
|
|
71
|
-
* @param privateArmor private key to sign with
|
|
72
|
-
*/
|
|
73
|
-
async function encryptAndDetachSignData(data, publicArmor, privateArmor) {
|
|
74
|
-
const message = await pgp.createMessage({ binary: data });
|
|
75
|
-
const publicKey = await pgp.readKey({ armoredKey: publicArmor });
|
|
76
|
-
const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });
|
|
77
|
-
const encryptedMessage = await pgp.encrypt({
|
|
78
|
-
message,
|
|
79
|
-
encryptionKeys: publicKey,
|
|
80
|
-
format: 'armored',
|
|
81
|
-
config: {
|
|
82
|
-
rejectCurves: new Set(),
|
|
83
|
-
showVersion: false,
|
|
84
|
-
showComment: false,
|
|
85
|
-
},
|
|
86
|
-
date: null,
|
|
87
|
-
});
|
|
88
|
-
const signature = await pgp.sign({
|
|
89
|
-
message,
|
|
90
|
-
signingKeys: privateKey,
|
|
91
|
-
format: 'armored',
|
|
92
|
-
detached: true,
|
|
93
|
-
config: {
|
|
94
|
-
rejectCurves: new Set(),
|
|
95
|
-
showVersion: false,
|
|
96
|
-
showComment: false,
|
|
97
|
-
},
|
|
98
|
-
});
|
|
99
|
-
return {
|
|
100
|
-
encryptedMessage: encryptedMessage,
|
|
101
|
-
signature: signature,
|
|
102
|
-
};
|
|
103
|
-
}
|
|
104
|
-
/**
|
|
105
|
-
* Decrypts and verifies signature on a binary
|
|
106
|
-
* @param encryptedAndSignedMessage message to decrypt and verify
|
|
107
|
-
* @param publicArmor public key to verify signature with
|
|
108
|
-
* @param privateArmor private key to decrypt with
|
|
109
|
-
*/
|
|
110
|
-
async function decryptAndVerifySignedData(encryptedAndSignedMessage, publicArmor, privateArmor) {
|
|
111
|
-
const publicKey = await pgp.readKey({ armoredKey: publicArmor });
|
|
112
|
-
const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });
|
|
113
|
-
const decryptedMessage = await pgp.decrypt({
|
|
114
|
-
message: await pgp.readMessage({ armoredMessage: encryptedAndSignedMessage.encryptedMessage }),
|
|
115
|
-
decryptionKeys: [privateKey],
|
|
116
|
-
config: {
|
|
117
|
-
rejectCurves: new Set(),
|
|
118
|
-
showVersion: false,
|
|
119
|
-
showComment: false,
|
|
120
|
-
},
|
|
121
|
-
format: 'binary',
|
|
122
|
-
date: null,
|
|
123
|
-
});
|
|
124
|
-
const verificationResult = await pgp.verify({
|
|
125
|
-
message: await pgp.createMessage({ binary: decryptedMessage.data }),
|
|
126
|
-
signature: await pgp.readSignature({ armoredSignature: encryptedAndSignedMessage.signature }),
|
|
127
|
-
verificationKeys: publicKey,
|
|
128
|
-
date: null,
|
|
129
|
-
});
|
|
130
|
-
await verificationResult.signatures[0].verified;
|
|
131
|
-
return Buffer.from(decryptedMessage.data).toString('base64');
|
|
132
|
-
}
|
|
133
|
-
/**
|
|
134
|
-
* Verifies signature on a binary (message passed should be encoded in base64).
|
|
135
|
-
* @param signedMessage message to verify
|
|
136
|
-
* @param publicArmor public key to verify signature with
|
|
137
|
-
*/
|
|
138
|
-
async function verifySignedData(signedMessage, publicArmor) {
|
|
139
|
-
const publicKey = await pgp.readKey({ armoredKey: publicArmor });
|
|
140
|
-
const verificationResult = await pgp.verify({
|
|
141
|
-
message: await pgp.createMessage({ binary: Buffer.from(signedMessage.message, 'base64') }),
|
|
142
|
-
signature: await pgp.readSignature({ armoredSignature: signedMessage.signature }),
|
|
143
|
-
verificationKeys: publicKey,
|
|
144
|
-
date: null,
|
|
145
|
-
});
|
|
146
|
-
try {
|
|
147
|
-
await verificationResult.signatures[0].verified;
|
|
148
|
-
return true;
|
|
149
|
-
}
|
|
150
|
-
catch (e) {
|
|
151
|
-
return false;
|
|
152
|
-
}
|
|
153
|
-
}
|
|
154
|
-
/**
|
|
155
|
-
* Decrypts and verifies p2p messages + verifies broadcast messages
|
|
156
|
-
* @param messages message to decrypt and verify
|
|
157
|
-
* @param pubVerificationGpgKeys public keys to verify signatures with
|
|
158
|
-
* @param prvDecryptionGpgKeys private keys to decrypt with
|
|
159
|
-
*/
|
|
160
|
-
async function decryptAndVerifyIncomingMessages(messages, pubVerificationGpgKeys, prvDecryptionGpgKeys) {
|
|
161
|
-
return {
|
|
162
|
-
p2pMessages: await Promise.all(messages.p2pMessages.map(async (m) => {
|
|
163
|
-
const pubGpgKey = pubVerificationGpgKeys.find((k) => k.partyId === m.from);
|
|
164
|
-
const prvGpgKey = prvDecryptionGpgKeys.find((k) => k.partyId === m.to);
|
|
165
|
-
if (!pubGpgKey) {
|
|
166
|
-
throw Error(`No public key provided for sender with ID: ${m.from}`);
|
|
167
|
-
}
|
|
168
|
-
if (!prvGpgKey) {
|
|
169
|
-
throw Error(`No private key provided for recepient with ID: ${m.to}`);
|
|
170
|
-
}
|
|
171
|
-
return {
|
|
172
|
-
to: m.to,
|
|
173
|
-
from: m.from,
|
|
174
|
-
payload: await decryptAndVerifySignedData(m.payload, pubGpgKey.gpgKey, prvGpgKey.gpgKey),
|
|
175
|
-
commitment: m.commitment,
|
|
176
|
-
};
|
|
177
|
-
})),
|
|
178
|
-
broadcastMessages: await Promise.all(messages.broadcastMessages.map(async (m) => {
|
|
179
|
-
const pubGpgKey = pubVerificationGpgKeys.find((k) => k.partyId === m.from);
|
|
180
|
-
if (!pubGpgKey) {
|
|
181
|
-
throw Error(`No public key provided for sender with ID: ${m.from}`);
|
|
182
|
-
}
|
|
183
|
-
if (!(await verifySignedData(m.payload, pubGpgKey.gpgKey))) {
|
|
184
|
-
throw Error(`Failed to authenticate broadcast message from party: ${m.from}`);
|
|
185
|
-
}
|
|
186
|
-
return {
|
|
187
|
-
from: m.from,
|
|
188
|
-
payload: m.payload.message,
|
|
189
|
-
};
|
|
190
|
-
})),
|
|
191
|
-
};
|
|
192
|
-
}
|
|
193
|
-
/**
|
|
194
|
-
* Encrypts and signs p2p messages + signs broadcast messages
|
|
195
|
-
* @param messages messages to encrypt and sign
|
|
196
|
-
* @param pubEncryptionGpgKey public keys to encrypt data to
|
|
197
|
-
* @param prvAuthenticationGpgKey private keys to sign with
|
|
198
|
-
*/
|
|
199
|
-
async function encryptAndAuthOutgoingMessages(messages, pubEncryptionGpgKeys, prvAuthenticationGpgKeys) {
|
|
200
|
-
return {
|
|
201
|
-
p2pMessages: await Promise.all(messages.p2pMessages.map(async (m) => {
|
|
202
|
-
const pubGpgKey = pubEncryptionGpgKeys.find((k) => k.partyId === m.to);
|
|
203
|
-
const prvGpgKey = prvAuthenticationGpgKeys.find((k) => k.partyId === m.from);
|
|
204
|
-
if (!pubGpgKey) {
|
|
205
|
-
throw Error(`No public key provided for recipient with ID: ${m.to}`);
|
|
206
|
-
}
|
|
207
|
-
if (!prvGpgKey) {
|
|
208
|
-
throw Error(`No private key provided for sender with ID: ${m.from}`);
|
|
209
|
-
}
|
|
210
|
-
return {
|
|
211
|
-
to: m.to,
|
|
212
|
-
from: m.from,
|
|
213
|
-
payload: await encryptAndDetachSignData(Buffer.from(m.payload, 'base64'), pubGpgKey.gpgKey, prvGpgKey.gpgKey),
|
|
214
|
-
commitment: m.commitment,
|
|
215
|
-
};
|
|
216
|
-
})),
|
|
217
|
-
broadcastMessages: await Promise.all(messages.broadcastMessages.map(async (m) => {
|
|
218
|
-
const prvGpgKey = prvAuthenticationGpgKeys.find((k) => k.partyId === m.from);
|
|
219
|
-
if (!prvGpgKey) {
|
|
220
|
-
throw Error(`No private key provided for sender with ID: ${m.from}`);
|
|
221
|
-
}
|
|
222
|
-
return {
|
|
223
|
-
from: m.from,
|
|
224
|
-
payload: await detachSignData(Buffer.from(m.payload, 'base64'), prvGpgKey.gpgKey),
|
|
225
|
-
signatureR: m.signatureR
|
|
226
|
-
? {
|
|
227
|
-
message: m.signatureR,
|
|
228
|
-
signature: '',
|
|
229
|
-
}
|
|
230
|
-
: undefined,
|
|
231
|
-
};
|
|
232
|
-
})),
|
|
233
|
-
};
|
|
234
|
-
}
|
|
235
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"commsLayer.js","sourceRoot":"","sources":["../../../../src/tss/ecdsa-dkls/commsLayer.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAQA,wCAkBC;AAQD,4DAkCC;AAQD,gEA0BC;AAOD,4CAcC;AAQD,4EAwCC;AAQD,wEA2CC;AA7ND,6CAA+B;AAE/B;;;;GAIG;AACI,KAAK,UAAU,cAAc,CAAC,IAAY,EAAE,YAAoB;IACrE,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;IAC1D,MAAM,UAAU,GAAG,MAAM,GAAG,CAAC,cAAc,CAAC,EAAE,UAAU,EAAE,YAAY,EAAE,CAAC,CAAC;IAC1E,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,IAAI,CAAC;QAC/B,OAAO;QACP,WAAW,EAAE,UAAU;QACvB,MAAM,EAAE,SAAS;QACjB,QAAQ,EAAE,IAAI;QACd,MAAM,EAAE;YACN,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,WAAW,EAAE,KAAK;YAClB,WAAW,EAAE,KAAK;SACnB;KACF,CAAC,CAAC;IACH,OAAO;QACL,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAChC,SAAS,EAAE,SAAS;KACrB,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,wBAAwB,CAC5C,IAAY,EACZ,WAAmB,EACnB,YAAoB;IAEpB,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;IAC1D,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC,EAAE,UAAU,EAAE,WAAW,EAAE,CAAC,CAAC;IACjE,MAAM,UAAU,GAAG,MAAM,GAAG,CAAC,cAAc,CAAC,EAAE,UAAU,EAAE,YAAY,EAAE,CAAC,CAAC;IAC1E,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC;QACzC,OAAO;QACP,cAAc,EAAE,SAAS;QACzB,MAAM,EAAE,SAAS;QACjB,MAAM,EAAE;YACN,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,WAAW,EAAE,KAAK;YAClB,WAAW,EAAE,KAAK;SACnB;QACD,IAAI,EAAE,IAA4B;KACnC,CAAC,CAAC;IACH,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,IAAI,CAAC;QAC/B,OAAO;QACP,WAAW,EAAE,UAAU;QACvB,MAAM,EAAE,SAAS;QACjB,QAAQ,EAAE,IAAI;QACd,MAAM,EAAE;YACN,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,WAAW,EAAE,KAAK;YAClB,WAAW,EAAE,KAAK;SACnB;KACF,CAAC,CAAC;IACH,OAAO;QACL,gBAAgB,EAAE,gBAAgB;QAClC,SAAS,EAAE,SAAS;KACrB,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,0BAA0B,CAC9C,yBAAyC,EACzC,WAAmB,EACnB,YAAoB;IAEpB,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC,EAAE,UAAU,EAAE,WAAW,EAAE,CAAC,CAAC;IACjE,MAAM,UAAU,GAAG,MAAM,GAAG,CAAC,cAAc,CAAC,EAAE,UAAU,EAAE,YAAY,EAAE,CAAC,CAAC;IAC1E,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC;QACzC,OAAO,EAAE,MAAM,GAAG,CAAC,WAAW,CAAC,EAAE,cAAc,EAAE,yBAAyB,CAAC,gBAAgB,EAAE,CAAC;QAC9F,cAAc,EAAE,CAAC,UAAU,CAAC;QAC5B,MAAM,EAAE;YACN,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,WAAW,EAAE,KAAK;YAClB,WAAW,EAAE,KAAK;SACnB;QACD,MAAM,EAAE,QAAQ;QAChB,IAAI,EAAE,IAA4B;KACnC,CAAC,CAAC;IACH,MAAM,kBAAkB,GAAG,MAAM,GAAG,CAAC,MAAM,CAAC;QAC1C,OAAO,EAAE,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,MAAM,EAAE,gBAAgB,CAAC,IAAI,EAAE,CAAC;QACnE,SAAS,EAAE,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,gBAAgB,EAAE,yBAAyB,CAAC,SAAS,EAAE,CAAC;QAC7F,gBAAgB,EAAE,SAAS;QAC3B,IAAI,EAAE,IAA4B;KACnC,CAAC,CAAC;IACH,MAAM,kBAAkB,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC;IAChD,OAAO,MAAM,CAAC,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;AAC/D,CAAC;AAED;;;;GAIG;AACI,KAAK,UAAU,gBAAgB,CAAC,aAA0B,EAAE,WAAmB;IACpF,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC,EAAE,UAAU,EAAE,WAAW,EAAE,CAAC,CAAC;IACjE,MAAM,kBAAkB,GAAG,MAAM,GAAG,CAAC,MAAM,CAAC;QAC1C,OAAO,EAAE,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,CAAC;QAC1F,SAAS,EAAE,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,gBAAgB,EAAE,aAAa,CAAC,SAAS,EAAE,CAAC;QACjF,gBAAgB,EAAE,SAAS;QAC3B,IAAI,EAAE,IAA4B;KACnC,CAAC,CAAC;IACH,IAAI,CAAC;QACH,MAAM,kBAAkB,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC;QAChD,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,gCAAgC,CACpD,QAAyB,EACzB,sBAAqC,EACrC,oBAAmC;IAEnC,OAAO;QACL,WAAW,EAAE,MAAM,OAAO,CAAC,GAAG,CAC5B,QAAQ,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,EAAE,EAAE;YACnC,MAAM,SAAS,GAAG,sBAAsB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC;YAC3E,MAAM,SAAS,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;YACvE,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,8CAA8C,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YACtE,CAAC;YACD,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,kDAAkD,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;YACxE,CAAC;YACD,OAAO;gBACL,EAAE,EAAE,CAAC,CAAC,EAAE;gBACR,IAAI,EAAE,CAAC,CAAC,IAAI;gBACZ,OAAO,EAAE,MAAM,0BAA0B,CAAC,CAAC,CAAC,OAAO,EAAE,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC;gBACxF,UAAU,EAAE,CAAC,CAAC,UAAU;aACzB,CAAC;QACJ,CAAC,CAAC,CACH;QACD,iBAAiB,EAAE,MAAM,OAAO,CAAC,GAAG,CAClC,QAAQ,CAAC,iBAAiB,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,EAAE,EAAE;YACzC,MAAM,SAAS,GAAG,sBAAsB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC;YAC3E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,8CAA8C,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YACtE,CAAC;YACD,IAAI,CAAC,CAAC,MAAM,gBAAgB,CAAC,CAAC,CAAC,OAAO,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC;gBAC3D,MAAM,KAAK,CAAC,wDAAwD,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YAChF,CAAC;YACD,OAAO;gBACL,IAAI,EAAE,CAAC,CAAC,IAAI;gBACZ,OAAO,EAAE,CAAC,CAAC,OAAO,CAAC,OAAO;aAC3B,CAAC;QACJ,CAAC,CAAC,CACH;KACF,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,8BAA8B,CAClD,QAA4B,EAC5B,oBAAmC,EACnC,wBAAuC;IAEvC,OAAO;QACL,WAAW,EAAE,MAAM,OAAO,CAAC,GAAG,CAC5B,QAAQ,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,EAAE,EAAE;YACnC,MAAM,SAAS,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;YACvE,MAAM,SAAS,GAAG,wBAAwB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC;YAC7E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,iDAAiD,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;YACvE,CAAC;YACD,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,+CAA+C,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YACvE,CAAC;YACD,OAAO;gBACL,EAAE,EAAE,CAAC,CAAC,EAAE;gBACR,IAAI,EAAE,CAAC,CAAC,IAAI;gBACZ,OAAO,EAAE,MAAM,wBAAwB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC;gBAC7G,UAAU,EAAE,CAAC,CAAC,UAAU;aACzB,CAAC;QACJ,CAAC,CAAC,CACH;QACD,iBAAiB,EAAE,MAAM,OAAO,CAAC,GAAG,CAClC,QAAQ,CAAC,iBAAiB,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,EAAE,EAAE;YACzC,MAAM,SAAS,GAAG,wBAAwB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC;YAC7E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,+CAA+C,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YACvE,CAAC;YACD,OAAO;gBACL,IAAI,EAAE,CAAC,CAAC,IAAI;gBACZ,OAAO,EAAE,MAAM,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,SAAS,CAAC,MAAM,CAAC;gBACjF,UAAU,EAAE,CAAC,CAAC,UAAU;oBACtB,CAAC,CAAC;wBACE,OAAO,EAAE,CAAC,CAAC,UAAU;wBACrB,SAAS,EAAE,EAAE;qBACd;oBACH,CAAC,CAAC,SAAS;aACd,CAAC;QACJ,CAAC,CAAC,CACH;KACF,CAAC;AACJ,CAAC","sourcesContent":["import { SerializedMessages, AuthEncMessage, AuthEncMessages, PartyGpgKey, AuthMessage } from './types';\nimport * as pgp from 'openpgp';\n\n/**\n * Detach signs a binary and encodes it in base64\n * @param data binary to encode in base64 and sign\n * @param privateArmor private key to sign with\n */\nexport async function detachSignData(data: Buffer, privateArmor: string): Promise<AuthMessage> {\n  const message = await pgp.createMessage({ binary: data });\n  const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });\n  const signature = await pgp.sign({\n    message,\n    signingKeys: privateKey,\n    format: 'armored',\n    detached: true,\n    config: {\n      rejectCurves: new Set(),\n      showVersion: false,\n      showComment: false,\n    },\n  });\n  return {\n    message: data.toString('base64'),\n    signature: signature,\n  };\n}\n\n/**\n * Encrypts and detach signs a binary\n * @param data binary to encrypt and sign\n * @param publicArmor public key to encrypt with\n * @param privateArmor private key to sign with\n */\nexport async function encryptAndDetachSignData(\n  data: Buffer,\n  publicArmor: string,\n  privateArmor: string\n): Promise<AuthEncMessage> {\n  const message = await pgp.createMessage({ binary: data });\n  const publicKey = await pgp.readKey({ armoredKey: publicArmor });\n  const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });\n  const encryptedMessage = await pgp.encrypt({\n    message,\n    encryptionKeys: publicKey,\n    format: 'armored',\n    config: {\n      rejectCurves: new Set(),\n      showVersion: false,\n      showComment: false,\n    },\n    date: null as unknown as undefined,\n  });\n  const signature = await pgp.sign({\n    message,\n    signingKeys: privateKey,\n    format: 'armored',\n    detached: true,\n    config: {\n      rejectCurves: new Set(),\n      showVersion: false,\n      showComment: false,\n    },\n  });\n  return {\n    encryptedMessage: encryptedMessage,\n    signature: signature,\n  };\n}\n\n/**\n * Decrypts and verifies signature on a binary\n * @param encryptedAndSignedMessage message to decrypt and verify\n * @param publicArmor public key to verify signature with\n * @param privateArmor private key to decrypt with\n */\nexport async function decryptAndVerifySignedData(\n  encryptedAndSignedMessage: AuthEncMessage,\n  publicArmor: string,\n  privateArmor: string\n): Promise<string> {\n  const publicKey = await pgp.readKey({ armoredKey: publicArmor });\n  const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });\n  const decryptedMessage = await pgp.decrypt({\n    message: await pgp.readMessage({ armoredMessage: encryptedAndSignedMessage.encryptedMessage }),\n    decryptionKeys: [privateKey],\n    config: {\n      rejectCurves: new Set(),\n      showVersion: false,\n      showComment: false,\n    },\n    format: 'binary',\n    date: null as unknown as undefined,\n  });\n  const verificationResult = await pgp.verify({\n    message: await pgp.createMessage({ binary: decryptedMessage.data }),\n    signature: await pgp.readSignature({ armoredSignature: encryptedAndSignedMessage.signature }),\n    verificationKeys: publicKey,\n    date: null as unknown as undefined,\n  });\n  await verificationResult.signatures[0].verified;\n  return Buffer.from(decryptedMessage.data).toString('base64');\n}\n\n/**\n * Verifies signature on a binary (message passed should be encoded in base64).\n * @param signedMessage message to verify\n * @param publicArmor public key to verify signature with\n */\nexport async function verifySignedData(signedMessage: AuthMessage, publicArmor: string): Promise<boolean> {\n  const publicKey = await pgp.readKey({ armoredKey: publicArmor });\n  const verificationResult = await pgp.verify({\n    message: await pgp.createMessage({ binary: Buffer.from(signedMessage.message, 'base64') }),\n    signature: await pgp.readSignature({ armoredSignature: signedMessage.signature }),\n    verificationKeys: publicKey,\n    date: null as unknown as undefined,\n  });\n  try {\n    await verificationResult.signatures[0].verified;\n    return true;\n  } catch (e) {\n    return false;\n  }\n}\n\n/**\n * Decrypts and verifies p2p messages + verifies broadcast messages\n * @param messages message to decrypt and verify\n * @param pubVerificationGpgKeys public keys to verify signatures with\n * @param prvDecryptionGpgKeys private keys to decrypt with\n */\nexport async function decryptAndVerifyIncomingMessages(\n  messages: AuthEncMessages,\n  pubVerificationGpgKeys: PartyGpgKey[],\n  prvDecryptionGpgKeys: PartyGpgKey[]\n): Promise<SerializedMessages> {\n  return {\n    p2pMessages: await Promise.all(\n      messages.p2pMessages.map(async (m) => {\n        const pubGpgKey = pubVerificationGpgKeys.find((k) => k.partyId === m.from);\n        const prvGpgKey = prvDecryptionGpgKeys.find((k) => k.partyId === m.to);\n        if (!pubGpgKey) {\n          throw Error(`No public key provided for sender with ID: ${m.from}`);\n        }\n        if (!prvGpgKey) {\n          throw Error(`No private key provided for recepient with ID: ${m.to}`);\n        }\n        return {\n          to: m.to,\n          from: m.from,\n          payload: await decryptAndVerifySignedData(m.payload, pubGpgKey.gpgKey, prvGpgKey.gpgKey),\n          commitment: m.commitment,\n        };\n      })\n    ),\n    broadcastMessages: await Promise.all(\n      messages.broadcastMessages.map(async (m) => {\n        const pubGpgKey = pubVerificationGpgKeys.find((k) => k.partyId === m.from);\n        if (!pubGpgKey) {\n          throw Error(`No public key provided for sender with ID: ${m.from}`);\n        }\n        if (!(await verifySignedData(m.payload, pubGpgKey.gpgKey))) {\n          throw Error(`Failed to authenticate broadcast message from party: ${m.from}`);\n        }\n        return {\n          from: m.from,\n          payload: m.payload.message,\n        };\n      })\n    ),\n  };\n}\n\n/**\n * Encrypts and signs p2p messages + signs broadcast messages\n * @param messages messages to encrypt and sign\n * @param pubEncryptionGpgKey public keys to encrypt data to\n * @param prvAuthenticationGpgKey private keys to sign with\n */\nexport async function encryptAndAuthOutgoingMessages(\n  messages: SerializedMessages,\n  pubEncryptionGpgKeys: PartyGpgKey[],\n  prvAuthenticationGpgKeys: PartyGpgKey[]\n): Promise<AuthEncMessages> {\n  return {\n    p2pMessages: await Promise.all(\n      messages.p2pMessages.map(async (m) => {\n        const pubGpgKey = pubEncryptionGpgKeys.find((k) => k.partyId === m.to);\n        const prvGpgKey = prvAuthenticationGpgKeys.find((k) => k.partyId === m.from);\n        if (!pubGpgKey) {\n          throw Error(`No public key provided for recipient with ID: ${m.to}`);\n        }\n        if (!prvGpgKey) {\n          throw Error(`No private key provided for sender with ID: ${m.from}`);\n        }\n        return {\n          to: m.to,\n          from: m.from,\n          payload: await encryptAndDetachSignData(Buffer.from(m.payload, 'base64'), pubGpgKey.gpgKey, prvGpgKey.gpgKey),\n          commitment: m.commitment,\n        };\n      })\n    ),\n    broadcastMessages: await Promise.all(\n      messages.broadcastMessages.map(async (m) => {\n        const prvGpgKey = prvAuthenticationGpgKeys.find((k) => k.partyId === m.from);\n        if (!prvGpgKey) {\n          throw Error(`No private key provided for sender with ID: ${m.from}`);\n        }\n        return {\n          from: m.from,\n          payload: await detachSignData(Buffer.from(m.payload, 'base64'), prvGpgKey.gpgKey),\n          signatureR: m.signatureR\n            ? {\n                message: m.signatureR,\n                signature: '',\n              }\n            : undefined,\n        };\n      })\n    ),\n  };\n}\n"]}
|
|
@@ -1,57 +0,0 @@
|
|
|
1
|
-
import type { KeygenSession, Keyshare } from '@silencelaboratories/dkls-wasm-ll-node';
|
|
2
|
-
import { DeserializedBroadcastMessage, DeserializedMessages, DkgState, RetrofitData } from './types';
|
|
3
|
-
type NodeWasmer = typeof import('@silencelaboratories/dkls-wasm-ll-node');
|
|
4
|
-
type WebWasmer = typeof import('@silencelaboratories/dkls-wasm-ll-web');
|
|
5
|
-
type BundlerWasmer = typeof import('@silencelaboratories/dkls-wasm-ll-bundler');
|
|
6
|
-
type DklsWasm = NodeWasmer | WebWasmer | BundlerWasmer;
|
|
7
|
-
export interface DkgSessionData {
|
|
8
|
-
dkgSessionBytes: Uint8Array;
|
|
9
|
-
dkgState: DkgState;
|
|
10
|
-
chainCodeCommitment?: Uint8Array;
|
|
11
|
-
keyShareBuff?: Buffer;
|
|
12
|
-
}
|
|
13
|
-
export declare class Dkg {
|
|
14
|
-
protected dkgSession: KeygenSession | undefined;
|
|
15
|
-
protected dkgSessionBytes: Uint8Array;
|
|
16
|
-
protected dkgKeyShare: Keyshare;
|
|
17
|
-
protected keyShareBuff: Buffer;
|
|
18
|
-
protected n: number;
|
|
19
|
-
protected t: number;
|
|
20
|
-
protected seed: Buffer | undefined;
|
|
21
|
-
protected chainCodeCommitment: Uint8Array | undefined;
|
|
22
|
-
protected partyIdx: number;
|
|
23
|
-
protected dkgState: DkgState;
|
|
24
|
-
protected dklsKeyShareRetrofitObject: Keyshare | undefined;
|
|
25
|
-
protected retrofitData: RetrofitData | undefined;
|
|
26
|
-
protected dklsWasm: DklsWasm | null;
|
|
27
|
-
constructor(n: number, t: number, partyIdx: number, seed?: Buffer, retrofitData?: RetrofitData, dklsWasm?: BundlerWasmer);
|
|
28
|
-
private loadDklsWasm;
|
|
29
|
-
private getDklsWasm;
|
|
30
|
-
private _restoreSession;
|
|
31
|
-
private _createDKLsRetrofitKeyShare;
|
|
32
|
-
private _deserializeState;
|
|
33
|
-
initDkg(): Promise<DeserializedBroadcastMessage>;
|
|
34
|
-
getKeyShare(): Buffer;
|
|
35
|
-
getReducedKeyShare(): Buffer;
|
|
36
|
-
handleIncomingMessages(messagesForIthRound: DeserializedMessages): DeserializedMessages;
|
|
37
|
-
/**
|
|
38
|
-
* Get the current session data that can be used to restore the session later
|
|
39
|
-
* @returns The current session data
|
|
40
|
-
*/
|
|
41
|
-
getSessionData(): DkgSessionData;
|
|
42
|
-
/**
|
|
43
|
-
* Restore a DKG session from previous session data
|
|
44
|
-
* Note: This should not be used for Round 1 as that's the initialization phase
|
|
45
|
-
* @param n Number of parties
|
|
46
|
-
* @param t Threshold
|
|
47
|
-
* @param partyIdx Party index
|
|
48
|
-
* @param sessionData Previous session data
|
|
49
|
-
* @param seed Optional seed
|
|
50
|
-
* @param retrofitData Optional retrofit data
|
|
51
|
-
* @param dklsWasm Optional DKLS wasm instance
|
|
52
|
-
* @returns A new DKG instance with the restored session
|
|
53
|
-
*/
|
|
54
|
-
static restoreSession(n: number, t: number, partyIdx: number, sessionData: DkgSessionData, seed?: Buffer, retrofitData?: RetrofitData, dklsWasm?: BundlerWasmer): Promise<Dkg>;
|
|
55
|
-
}
|
|
56
|
-
export {};
|
|
57
|
-
//# sourceMappingURL=dkg.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"dkg.d.ts","sourceRoot":"","sources":["../../../../src/tss/ecdsa-dkls/dkg.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,QAAQ,EAAW,MAAM,wCAAwC,CAAC;AAI/F,OAAO,EAAE,4BAA4B,EAAE,oBAAoB,EAAE,QAAQ,EAAmB,YAAY,EAAE,MAAM,SAAS,CAAC;AAEtH,KAAK,UAAU,GAAG,cAAc,wCAAwC,CAAC,CAAC;AAC1E,KAAK,SAAS,GAAG,cAAc,uCAAuC,CAAC,CAAC;AACxE,KAAK,aAAa,GAAG,cAAc,2CAA2C,CAAC,CAAC;AAEhF,KAAK,QAAQ,GAAG,UAAU,GAAG,SAAS,GAAG,aAAa,CAAC;AAEvD,MAAM,WAAW,cAAc;IAC7B,eAAe,EAAE,UAAU,CAAC;IAC5B,QAAQ,EAAE,QAAQ,CAAC;IACnB,mBAAmB,CAAC,EAAE,UAAU,CAAC;IACjC,YAAY,CAAC,EAAE,MAAM,CAAC;CACvB;AAED,qBAAa,GAAG;IACd,SAAS,CAAC,UAAU,EAAE,aAAa,GAAG,SAAS,CAAC;IAChD,SAAS,CAAC,eAAe,EAAE,UAAU,CAAC;IACtC,SAAS,CAAC,WAAW,EAAE,QAAQ,CAAC;IAChC,SAAS,CAAC,YAAY,EAAE,MAAM,CAAC;IAC/B,SAAS,CAAC,CAAC,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,CAAC,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,IAAI,EAAE,MAAM,GAAG,SAAS,CAAC;IACnC,SAAS,CAAC,mBAAmB,EAAE,UAAU,GAAG,SAAS,CAAC;IACtD,SAAS,CAAC,QAAQ,EAAE,MAAM,CAAC;IAC3B,SAAS,CAAC,QAAQ,EAAE,QAAQ,CAA0B;IACtD,SAAS,CAAC,0BAA0B,EAAE,QAAQ,GAAG,SAAS,CAAC;IAC3D,SAAS,CAAC,YAAY,EAAE,YAAY,GAAG,SAAS,CAAC;IACjD,SAAS,CAAC,QAAQ,EAAE,QAAQ,GAAG,IAAI,CAAC;gBAGlC,CAAC,EAAE,MAAM,EACT,CAAC,EAAE,MAAM,EACT,QAAQ,EAAE,MAAM,EAChB,IAAI,CAAC,EAAE,MAAM,EACb,YAAY,CAAC,EAAE,YAAY,EAC3B,QAAQ,CAAC,EAAE,aAAa;YAWZ,YAAY;IAM1B,OAAO,CAAC,WAAW;IAQnB,OAAO,CAAC,eAAe;IAMvB,OAAO,CAAC,2BAA2B;IAkCnC,OAAO,CAAC,iBAAiB;IA2BnB,OAAO,IAAI,OAAO,CAAC,4BAA4B,CAAC;IA+CtD,WAAW,IAAI,MAAM;IAOrB,kBAAkB,IAAI,MAAM;IAgB5B,sBAAsB,CAAC,mBAAmB,EAAE,oBAAoB,GAAG,oBAAoB;IAqFvF;;;OAGG;IACH,cAAc,IAAI,cAAc;IAiBhC;;;;;;;;;;;OAWG;WACU,cAAc,CACzB,CAAC,EAAE,MAAM,EACT,CAAC,EAAE,MAAM,EACT,QAAQ,EAAE,MAAM,EAChB,WAAW,EAAE,cAAc,EAC3B,IAAI,CAAC,EAAE,MAAM,EACb,YAAY,CAAC,EAAE,YAAY,EAC3B,QAAQ,CAAC,EAAE,aAAa,GACvB,OAAO,CAAC,GAAG,CAAC;CAqBhB"}
|