@bitgo-beta/sdk-lib-mpc 8.2.1-alpha.45 → 8.2.1-alpha.451

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (93) hide show
  1. package/dist/src/curves/ed25519.d.ts +0 -1
  2. package/dist/src/curves/ed25519.d.ts.map +1 -1
  3. package/dist/src/curves/ed25519.js +12 -12
  4. package/dist/src/curves/ed25519Bip32HdTree.js +14 -14
  5. package/dist/src/curves/index.js +6 -2
  6. package/dist/src/curves/secp256k1.d.ts +0 -1
  7. package/dist/src/curves/secp256k1.d.ts.map +1 -1
  8. package/dist/src/curves/secp256k1.js +22 -38
  9. package/dist/src/curves/secp256k1Bip32HdTree.js +10 -10
  10. package/dist/src/curves/types.d.ts +2 -3
  11. package/dist/src/curves/types.d.ts.map +1 -1
  12. package/dist/src/curves/util.d.ts +2 -0
  13. package/dist/src/curves/util.d.ts.map +1 -1
  14. package/dist/src/curves/util.js +34 -3
  15. package/dist/src/hashCommitment.d.ts +0 -1
  16. package/dist/src/hashCommitment.d.ts.map +1 -1
  17. package/dist/src/hashCommitment.js +7 -8
  18. package/dist/src/index.d.ts +1 -1
  19. package/dist/src/index.d.ts.map +1 -1
  20. package/dist/src/index.js +24 -10
  21. package/dist/src/openssl/index.js +6 -2
  22. package/dist/src/openssl/openssl.d.ts +1 -2
  23. package/dist/src/openssl/openssl.d.ts.map +1 -1
  24. package/dist/src/openssl/openssl.js +4 -12
  25. package/dist/src/safePrime.d.ts +3 -0
  26. package/dist/src/safePrime.d.ts.map +1 -0
  27. package/dist/src/safePrime.js +19 -0
  28. package/dist/src/schnorrProof.d.ts +0 -1
  29. package/dist/src/schnorrProof.d.ts.map +1 -1
  30. package/dist/src/schnorrProof.js +8 -9
  31. package/dist/src/shamir/index.js +6 -2
  32. package/dist/src/shamir/shamir.js +2 -2
  33. package/dist/src/shamir/types.d.ts +1 -1
  34. package/dist/src/shamir/types.d.ts.map +1 -1
  35. package/dist/src/tss/ecdsa/index.js +23 -9
  36. package/dist/src/tss/ecdsa/paillierproof.js +10 -10
  37. package/dist/src/tss/ecdsa/rangeproof.d.ts +1 -2
  38. package/dist/src/tss/ecdsa/rangeproof.d.ts.map +1 -1
  39. package/dist/src/tss/ecdsa/rangeproof.js +108 -118
  40. package/dist/src/tss/ecdsa/types.d.ts +28 -17
  41. package/dist/src/tss/ecdsa/types.d.ts.map +1 -1
  42. package/dist/src/tss/ecdsa/types.js +29 -31
  43. package/dist/src/tss/ecdsa/zkVProof.d.ts +0 -1
  44. package/dist/src/tss/ecdsa/zkVProof.d.ts.map +1 -1
  45. package/dist/src/tss/ecdsa/zkVProof.js +9 -10
  46. package/dist/src/tss/ecdsa-dkls/commsLayer.d.ts +69 -0
  47. package/dist/src/tss/ecdsa-dkls/commsLayer.d.ts.map +1 -0
  48. package/dist/src/tss/ecdsa-dkls/commsLayer.js +268 -0
  49. package/dist/src/tss/ecdsa-dkls/dkg.d.ts +62 -0
  50. package/dist/src/tss/ecdsa-dkls/dkg.d.ts.map +1 -0
  51. package/dist/src/tss/ecdsa-dkls/dkg.js +334 -0
  52. package/dist/src/tss/ecdsa-dkls/dsg.d.ts +47 -0
  53. package/dist/src/tss/ecdsa-dkls/dsg.d.ts.map +1 -0
  54. package/dist/src/tss/ecdsa-dkls/dsg.js +271 -0
  55. package/dist/src/tss/ecdsa-dkls/index.d.ts +6 -0
  56. package/dist/src/tss/ecdsa-dkls/index.d.ts.map +1 -0
  57. package/dist/src/tss/ecdsa-dkls/index.js +42 -0
  58. package/dist/src/tss/ecdsa-dkls/types.d.ts +128 -0
  59. package/dist/src/tss/ecdsa-dkls/types.d.ts.map +1 -0
  60. package/dist/src/tss/ecdsa-dkls/types.js +175 -0
  61. package/dist/src/tss/ecdsa-dkls/util.d.ts +26 -0
  62. package/dist/src/tss/ecdsa-dkls/util.d.ts.map +1 -0
  63. package/dist/src/tss/ecdsa-dkls/util.js +276 -0
  64. package/dist/src/tss/eddsa-mps/commsLayer.d.ts +30 -0
  65. package/dist/src/tss/eddsa-mps/commsLayer.d.ts.map +1 -0
  66. package/dist/src/tss/eddsa-mps/commsLayer.js +96 -0
  67. package/dist/src/tss/eddsa-mps/dkg.d.ts +98 -0
  68. package/dist/src/tss/eddsa-mps/dkg.d.ts.map +1 -0
  69. package/dist/src/tss/eddsa-mps/dkg.js +228 -0
  70. package/dist/src/tss/eddsa-mps/index.d.ts +5 -0
  71. package/dist/src/tss/eddsa-mps/index.d.ts.map +1 -0
  72. package/dist/src/tss/eddsa-mps/index.js +41 -0
  73. package/dist/src/tss/eddsa-mps/types.d.ts +44 -0
  74. package/dist/src/tss/eddsa-mps/types.d.ts.map +1 -0
  75. package/dist/src/tss/eddsa-mps/types.js +85 -0
  76. package/dist/src/tss/eddsa-mps/util.d.ts +7 -0
  77. package/dist/src/tss/eddsa-mps/util.d.ts.map +1 -0
  78. package/dist/src/tss/eddsa-mps/util.js +13 -0
  79. package/dist/src/tss/index.d.ts +2 -0
  80. package/dist/src/tss/index.d.ts.map +1 -1
  81. package/dist/src/tss/index.js +8 -2
  82. package/dist/src/types.d.ts +0 -1
  83. package/dist/src/types.d.ts.map +1 -1
  84. package/dist/src/util.d.ts +0 -1
  85. package/dist/src/util.d.ts.map +1 -1
  86. package/dist/src/util.js +21 -22
  87. package/dist/tsconfig.tsbuildinfo +1 -1
  88. package/package.json +28 -5
  89. package/.eslintignore +0 -5
  90. package/CHANGELOG.md +0 -180
  91. package/dist/src/openssl/opensslbytes.d.ts +0 -4
  92. package/dist/src/openssl/opensslbytes.d.ts.map +0 -1
  93. package/dist/src/openssl/opensslbytes.js +0 -20
@@ -0,0 +1,268 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ var desc = Object.getOwnPropertyDescriptor(m, k);
5
+ if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
+ desc = { enumerable: true, get: function() { return m[k]; } };
7
+ }
8
+ Object.defineProperty(o, k2, desc);
9
+ }) : (function(o, m, k, k2) {
10
+ if (k2 === undefined) k2 = k;
11
+ o[k2] = m[k];
12
+ }));
13
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
15
+ }) : function(o, v) {
16
+ o["default"] = v;
17
+ });
18
+ var __importStar = (this && this.__importStar) || (function () {
19
+ var ownKeys = function(o) {
20
+ ownKeys = Object.getOwnPropertyNames || function (o) {
21
+ var ar = [];
22
+ for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
23
+ return ar;
24
+ };
25
+ return ownKeys(o);
26
+ };
27
+ return function (mod) {
28
+ if (mod && mod.__esModule) return mod;
29
+ var result = {};
30
+ if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
31
+ __setModuleDefault(result, mod);
32
+ return result;
33
+ };
34
+ })();
35
+ Object.defineProperty(exports, "__esModule", { value: true });
36
+ exports.SIGNATURE_DATE_TOLERANCE_MS = void 0;
37
+ exports.detachSignData = detachSignData;
38
+ exports.encryptAndDetachSignData = encryptAndDetachSignData;
39
+ exports.decryptAndVerifySignedData = decryptAndVerifySignedData;
40
+ exports.verifySignedData = verifySignedData;
41
+ exports.decryptAndVerifyIncomingMessages = decryptAndVerifyIncomingMessages;
42
+ exports.encryptAndAuthOutgoingMessages = encryptAndAuthOutgoingMessages;
43
+ const pgp = __importStar(require("openpgp"));
44
+ /**
45
+ * Tolerance window for OpenPGP date-based key validity checks (24 hours).
46
+ *
47
+ * Background: OpenPGP.js uses the `date` parameter to check key expiry at a
48
+ * given point in time. We previously passed `date: null` to disable this check
49
+ * entirely (see HSM-706) because OVC cold-signing flows for trust and SMC
50
+ * clients can involve significant clock skew between the signing device and the
51
+ * server — the device may be air-gapped and its clock can drift by hours.
52
+ *
53
+ * Note: this GPG expiry check is not strictly required for replay protection.
54
+ * The DKLS protocol has its own mechanism for preventing replay attacks
55
+ * (session-bound commitments and round-specific message validation), so the
56
+ * OpenPGP date check is a defense-in-depth measure rather than the primary
57
+ * replay mitigation.
58
+ *
59
+ * OpenPGP's `date` parameter shifts the reference time for ALL temporal
60
+ * checks simultaneously (key expiry, self-signature validity, signature
61
+ * freshness). This means a single shifted date cannot independently relax
62
+ * key-expiry checks without breaking self-signature validation on fresh keys.
63
+ *
64
+ * Therefore:
65
+ * - encrypt/decrypt omit `date` (use default = current time) for normal key
66
+ * expiry checking and self-signature validation.
67
+ * - verify uses `now + tolerance` so that signatures from OVC devices whose
68
+ * clocks are up to 24 hours ahead are not rejected as "from the future".
69
+ */
70
+ exports.SIGNATURE_DATE_TOLERANCE_MS = 24 * 60 * 60 * 1000;
71
+ /**
72
+ * Detach signs a binary and encodes it in base64
73
+ * @param data binary to encode in base64 and sign
74
+ * @param privateArmor private key to sign with
75
+ */
76
+ async function detachSignData(data, privateArmor) {
77
+ const message = await pgp.createMessage({ binary: data });
78
+ const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });
79
+ const signature = await pgp.sign({
80
+ message,
81
+ signingKeys: privateKey,
82
+ format: 'armored',
83
+ detached: true,
84
+ config: {
85
+ rejectCurves: new Set(),
86
+ showVersion: false,
87
+ showComment: false,
88
+ },
89
+ });
90
+ return {
91
+ message: data.toString('base64'),
92
+ signature: signature,
93
+ };
94
+ }
95
+ /**
96
+ * Encrypts and detach signs a binary
97
+ * @param data binary to encrypt and sign
98
+ * @param publicArmor public key to encrypt with
99
+ * @param privateArmor private key to sign with
100
+ */
101
+ async function encryptAndDetachSignData(data, publicArmor, privateArmor) {
102
+ const message = await pgp.createMessage({ binary: data });
103
+ const publicKey = await pgp.readKey({ armoredKey: publicArmor });
104
+ const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });
105
+ const encryptedMessage = await pgp.encrypt({
106
+ message,
107
+ encryptionKeys: publicKey,
108
+ format: 'armored',
109
+ config: {
110
+ rejectCurves: new Set(),
111
+ showVersion: false,
112
+ showComment: false,
113
+ },
114
+ });
115
+ const signature = await pgp.sign({
116
+ message,
117
+ signingKeys: privateKey,
118
+ format: 'armored',
119
+ detached: true,
120
+ config: {
121
+ rejectCurves: new Set(),
122
+ showVersion: false,
123
+ showComment: false,
124
+ },
125
+ });
126
+ return {
127
+ encryptedMessage: encryptedMessage,
128
+ signature: signature,
129
+ };
130
+ }
131
+ /**
132
+ * Decrypts and verifies signature on a binary
133
+ * @param encryptedAndSignedMessage message to decrypt and verify
134
+ * @param publicArmor public key to verify signature with
135
+ * @param privateArmor private key to decrypt with
136
+ */
137
+ async function decryptAndVerifySignedData(encryptedAndSignedMessage, publicArmor, privateArmor) {
138
+ const publicKey = await pgp.readKey({ armoredKey: publicArmor });
139
+ const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });
140
+ const decryptedMessage = await pgp.decrypt({
141
+ message: await pgp.readMessage({ armoredMessage: encryptedAndSignedMessage.encryptedMessage }),
142
+ decryptionKeys: [privateKey],
143
+ config: {
144
+ rejectCurves: new Set(),
145
+ showVersion: false,
146
+ showComment: false,
147
+ },
148
+ format: 'binary',
149
+ });
150
+ const verificationResult = await pgp.verify({
151
+ message: await pgp.createMessage({ binary: decryptedMessage.data }),
152
+ signature: await pgp.readSignature({ armoredSignature: encryptedAndSignedMessage.signature }),
153
+ verificationKeys: publicKey,
154
+ date: new Date(Date.now() + exports.SIGNATURE_DATE_TOLERANCE_MS),
155
+ });
156
+ await verificationResult.signatures[0].verified;
157
+ return Buffer.from(decryptedMessage.data).toString('base64');
158
+ }
159
+ /**
160
+ * Verifies signature on a binary (message passed should be encoded in base64).
161
+ * @param signedMessage message to verify
162
+ * @param publicArmor public key to verify signature with
163
+ */
164
+ async function verifySignedData(signedMessage, publicArmor) {
165
+ const publicKey = await pgp.readKey({ armoredKey: publicArmor });
166
+ const verificationResult = await pgp.verify({
167
+ message: await pgp.createMessage({ binary: Buffer.from(signedMessage.message, 'base64') }),
168
+ signature: await pgp.readSignature({ armoredSignature: signedMessage.signature }),
169
+ verificationKeys: publicKey,
170
+ date: new Date(Date.now() + exports.SIGNATURE_DATE_TOLERANCE_MS),
171
+ });
172
+ try {
173
+ await verificationResult.signatures[0].verified;
174
+ return true;
175
+ }
176
+ catch (e) {
177
+ return false;
178
+ }
179
+ }
180
+ /**
181
+ * Decrypts and verifies p2p messages + verifies broadcast messages
182
+ * @param messages message to decrypt and verify
183
+ * @param pubVerificationGpgKeys public keys to verify signatures with
184
+ * @param prvDecryptionGpgKeys private keys to decrypt with
185
+ */
186
+ async function decryptAndVerifyIncomingMessages(messages, pubVerificationGpgKeys, prvDecryptionGpgKeys) {
187
+ return {
188
+ p2pMessages: await Promise.all(messages.p2pMessages.map(async (m) => {
189
+ const pubGpgKey = pubVerificationGpgKeys.find((k) => k.partyId === m.from);
190
+ const prvGpgKey = prvDecryptionGpgKeys.find((k) => k.partyId === m.to);
191
+ if (!pubGpgKey) {
192
+ throw Error(`No public key provided for sender with ID: ${m.from}`);
193
+ }
194
+ if (!prvGpgKey) {
195
+ throw Error(`No private key provided for recepient with ID: ${m.to}`);
196
+ }
197
+ return {
198
+ to: m.to,
199
+ from: m.from,
200
+ payload: await decryptAndVerifySignedData(m.payload, pubGpgKey.gpgKey, prvGpgKey.gpgKey),
201
+ commitment: m.commitment,
202
+ };
203
+ })),
204
+ broadcastMessages: await Promise.all(messages.broadcastMessages.map(async (m) => {
205
+ const pubGpgKey = pubVerificationGpgKeys.find((k) => k.partyId === m.from);
206
+ if (!pubGpgKey) {
207
+ throw Error(`No public key provided for sender with ID: ${m.from}`);
208
+ }
209
+ if (!(await verifySignedData(m.payload, pubGpgKey.gpgKey))) {
210
+ throw Error(`Failed to authenticate broadcast message from party: ${m.from}`);
211
+ }
212
+ if (m.signatureR !== undefined) {
213
+ if (!(await verifySignedData(m.signatureR, pubGpgKey.gpgKey))) {
214
+ throw Error(`Failed to authenticate signatureR in broadcast message from party: ${m.from}`);
215
+ }
216
+ }
217
+ return {
218
+ from: m.from,
219
+ payload: m.payload.message,
220
+ signatureR: m.signatureR?.message,
221
+ };
222
+ })),
223
+ };
224
+ }
225
+ /**
226
+ * Encrypts and signs p2p messages + signs broadcast messages
227
+ * @param messages messages to encrypt and sign
228
+ * @param pubEncryptionGpgKey public keys to encrypt data to
229
+ * @param prvAuthenticationGpgKey private keys to sign with
230
+ */
231
+ async function encryptAndAuthOutgoingMessages(messages, pubEncryptionGpgKeys, prvAuthenticationGpgKeys) {
232
+ return {
233
+ p2pMessages: await Promise.all(messages.p2pMessages.map(async (m) => {
234
+ const pubGpgKey = pubEncryptionGpgKeys.find((k) => k.partyId === m.to);
235
+ const prvGpgKey = prvAuthenticationGpgKeys.find((k) => k.partyId === m.from);
236
+ if (!pubGpgKey) {
237
+ throw Error(`No public key provided for recipient with ID: ${m.to}`);
238
+ }
239
+ if (!prvGpgKey) {
240
+ throw Error(`No private key provided for sender with ID: ${m.from}`);
241
+ }
242
+ return {
243
+ to: m.to,
244
+ from: m.from,
245
+ payload: await encryptAndDetachSignData(Buffer.from(m.payload, 'base64'), pubGpgKey.gpgKey, prvGpgKey.gpgKey),
246
+ commitment: m.commitment,
247
+ };
248
+ })),
249
+ broadcastMessages: await Promise.all(messages.broadcastMessages.map(async (m) => {
250
+ const prvGpgKey = prvAuthenticationGpgKeys.find((k) => k.partyId === m.from);
251
+ if (!prvGpgKey) {
252
+ throw Error(`No private key provided for sender with ID: ${m.from}`);
253
+ }
254
+ const [signedPayload, signedSignatureR] = await Promise.all([
255
+ detachSignData(Buffer.from(m.payload, 'base64'), prvGpgKey.gpgKey),
256
+ m.signatureR
257
+ ? detachSignData(Buffer.from(m.signatureR, 'base64'), prvGpgKey.gpgKey)
258
+ : Promise.resolve(undefined),
259
+ ]);
260
+ return {
261
+ from: m.from,
262
+ payload: signedPayload,
263
+ signatureR: signedSignatureR,
264
+ };
265
+ })),
266
+ };
267
+ }
268
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"commsLayer.js","sourceRoot":"","sources":["../../../../src/tss/ecdsa-dkls/commsLayer.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAoCA,wCAkBC;AAQD,4DAiCC;AAQD,gEAyBC;AAOD,4CAcC;AAQD,4EA8CC;AAQD,wEA4CC;AA9PD,6CAA+B;AAE/B;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACU,QAAA,2BAA2B,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAE/D;;;;GAIG;AACI,KAAK,UAAU,cAAc,CAAC,IAAY,EAAE,YAAoB;IACrE,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;IAC1D,MAAM,UAAU,GAAG,MAAM,GAAG,CAAC,cAAc,CAAC,EAAE,UAAU,EAAE,YAAY,EAAE,CAAC,CAAC;IAC1E,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,IAAI,CAAC;QAC/B,OAAO;QACP,WAAW,EAAE,UAAU;QACvB,MAAM,EAAE,SAAS;QACjB,QAAQ,EAAE,IAAI;QACd,MAAM,EAAE;YACN,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,WAAW,EAAE,KAAK;YAClB,WAAW,EAAE,KAAK;SACnB;KACF,CAAC,CAAC;IACH,OAAO;QACL,OAAO,EAAE,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC;QAChC,SAAS,EAAE,SAAS;KACrB,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,wBAAwB,CAC5C,IAAY,EACZ,WAAmB,EACnB,YAAoB;IAEpB,MAAM,OAAO,GAAG,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,CAAC,CAAC;IAC1D,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC,EAAE,UAAU,EAAE,WAAW,EAAE,CAAC,CAAC;IACjE,MAAM,UAAU,GAAG,MAAM,GAAG,CAAC,cAAc,CAAC,EAAE,UAAU,EAAE,YAAY,EAAE,CAAC,CAAC;IAC1E,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC;QACzC,OAAO;QACP,cAAc,EAAE,SAAS;QACzB,MAAM,EAAE,SAAS;QACjB,MAAM,EAAE;YACN,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,WAAW,EAAE,KAAK;YAClB,WAAW,EAAE,KAAK;SACnB;KACF,CAAC,CAAC;IACH,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,IAAI,CAAC;QAC/B,OAAO;QACP,WAAW,EAAE,UAAU;QACvB,MAAM,EAAE,SAAS;QACjB,QAAQ,EAAE,IAAI;QACd,MAAM,EAAE;YACN,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,WAAW,EAAE,KAAK;YAClB,WAAW,EAAE,KAAK;SACnB;KACF,CAAC,CAAC;IACH,OAAO;QACL,gBAAgB,EAAE,gBAAgB;QAClC,SAAS,EAAE,SAAS;KACrB,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,0BAA0B,CAC9C,yBAAyC,EACzC,WAAmB,EACnB,YAAoB;IAEpB,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC,EAAE,UAAU,EAAE,WAAW,EAAE,CAAC,CAAC;IACjE,MAAM,UAAU,GAAG,MAAM,GAAG,CAAC,cAAc,CAAC,EAAE,UAAU,EAAE,YAAY,EAAE,CAAC,CAAC;IAC1E,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC;QACzC,OAAO,EAAE,MAAM,GAAG,CAAC,WAAW,CAAC,EAAE,cAAc,EAAE,yBAAyB,CAAC,gBAAgB,EAAE,CAAC;QAC9F,cAAc,EAAE,CAAC,UAAU,CAAC;QAC5B,MAAM,EAAE;YACN,YAAY,EAAE,IAAI,GAAG,EAAE;YACvB,WAAW,EAAE,KAAK;YAClB,WAAW,EAAE,KAAK;SACnB;QACD,MAAM,EAAE,QAAQ;KACjB,CAAC,CAAC;IACH,MAAM,kBAAkB,GAAG,MAAM,GAAG,CAAC,MAAM,CAAC;QAC1C,OAAO,EAAE,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,MAAM,EAAE,gBAAgB,CAAC,IAAI,EAAE,CAAC;QACnE,SAAS,EAAE,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,gBAAgB,EAAE,yBAAyB,CAAC,SAAS,EAAE,CAAC;QAC7F,gBAAgB,EAAE,SAAS;QAC3B,IAAI,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,mCAA2B,CAAC;KACzD,CAAC,CAAC;IACH,MAAM,kBAAkB,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC;IAChD,OAAO,MAAM,CAAC,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;AAC/D,CAAC;AAED;;;;GAIG;AACI,KAAK,UAAU,gBAAgB,CAAC,aAA0B,EAAE,WAAmB;IACpF,MAAM,SAAS,GAAG,MAAM,GAAG,CAAC,OAAO,CAAC,EAAE,UAAU,EAAE,WAAW,EAAE,CAAC,CAAC;IACjE,MAAM,kBAAkB,GAAG,MAAM,GAAG,CAAC,MAAM,CAAC;QAC1C,OAAO,EAAE,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,CAAC;QAC1F,SAAS,EAAE,MAAM,GAAG,CAAC,aAAa,CAAC,EAAE,gBAAgB,EAAE,aAAa,CAAC,SAAS,EAAE,CAAC;QACjF,gBAAgB,EAAE,SAAS;QAC3B,IAAI,EAAE,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,mCAA2B,CAAC;KACzD,CAAC,CAAC;IACH,IAAI,CAAC;QACH,MAAM,kBAAkB,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC;QAChD,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,gCAAgC,CACpD,QAAyB,EACzB,sBAAqC,EACrC,oBAAmC;IAEnC,OAAO;QACL,WAAW,EAAE,MAAM,OAAO,CAAC,GAAG,CAC5B,QAAQ,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,EAAE,EAAE;YACnC,MAAM,SAAS,GAAG,sBAAsB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC;YAC3E,MAAM,SAAS,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;YACvE,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,8CAA8C,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YACtE,CAAC;YACD,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,kDAAkD,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;YACxE,CAAC;YACD,OAAO;gBACL,EAAE,EAAE,CAAC,CAAC,EAAE;gBACR,IAAI,EAAE,CAAC,CAAC,IAAI;gBACZ,OAAO,EAAE,MAAM,0BAA0B,CAAC,CAAC,CAAC,OAAO,EAAE,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC;gBACxF,UAAU,EAAE,CAAC,CAAC,UAAU;aACzB,CAAC;QACJ,CAAC,CAAC,CACH;QACD,iBAAiB,EAAE,MAAM,OAAO,CAAC,GAAG,CAClC,QAAQ,CAAC,iBAAiB,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,EAAE,EAAE;YACzC,MAAM,SAAS,GAAG,sBAAsB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC;YAC3E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,8CAA8C,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YACtE,CAAC;YACD,IAAI,CAAC,CAAC,MAAM,gBAAgB,CAAC,CAAC,CAAC,OAAO,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC;gBAC3D,MAAM,KAAK,CAAC,wDAAwD,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YAChF,CAAC;YACD,IAAI,CAAC,CAAC,UAAU,KAAK,SAAS,EAAE,CAAC;gBAC/B,IAAI,CAAC,CAAC,MAAM,gBAAgB,CAAC,CAAC,CAAC,UAAU,EAAE,SAAS,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC;oBAC9D,MAAM,KAAK,CAAC,sEAAsE,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;gBAC9F,CAAC;YACH,CAAC;YACD,OAAO;gBACL,IAAI,EAAE,CAAC,CAAC,IAAI;gBACZ,OAAO,EAAE,CAAC,CAAC,OAAO,CAAC,OAAO;gBAC1B,UAAU,EAAE,CAAC,CAAC,UAAU,EAAE,OAAO;aAClC,CAAC;QACJ,CAAC,CAAC,CACH;KACF,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,8BAA8B,CAClD,QAA4B,EAC5B,oBAAmC,EACnC,wBAAuC;IAEvC,OAAO;QACL,WAAW,EAAE,MAAM,OAAO,CAAC,GAAG,CAC5B,QAAQ,CAAC,WAAW,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,EAAE,EAAE;YACnC,MAAM,SAAS,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;YACvE,MAAM,SAAS,GAAG,wBAAwB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC;YAC7E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,iDAAiD,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;YACvE,CAAC;YACD,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,+CAA+C,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YACvE,CAAC;YACD,OAAO;gBACL,EAAE,EAAE,CAAC,CAAC,EAAE;gBACR,IAAI,EAAE,CAAC,CAAC,IAAI;gBACZ,OAAO,EAAE,MAAM,wBAAwB,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,MAAM,CAAC;gBAC7G,UAAU,EAAE,CAAC,CAAC,UAAU;aACzB,CAAC;QACJ,CAAC,CAAC,CACH;QACD,iBAAiB,EAAE,MAAM,OAAO,CAAC,GAAG,CAClC,QAAQ,CAAC,iBAAiB,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,EAAE,EAAE;YACzC,MAAM,SAAS,GAAG,wBAAwB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,CAAC,CAAC,IAAI,CAAC,CAAC;YAC7E,IAAI,CAAC,SAAS,EAAE,CAAC;gBACf,MAAM,KAAK,CAAC,+CAA+C,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC;YACvE,CAAC;YACD,MAAM,CAAC,aAAa,EAAE,gBAAgB,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;gBAC1D,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,OAAO,EAAE,QAAQ,CAAC,EAAE,SAAS,CAAC,MAAM,CAAC;gBAClE,CAAC,CAAC,UAAU;oBACV,CAAC,CAAC,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,UAAU,EAAE,QAAQ,CAAC,EAAE,SAAS,CAAC,MAAM,CAAC;oBACvE,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC;aAC/B,CAAC,CAAC;YACH,OAAO;gBACL,IAAI,EAAE,CAAC,CAAC,IAAI;gBACZ,OAAO,EAAE,aAAa;gBACtB,UAAU,EAAE,gBAAgB;aAC7B,CAAC;QACJ,CAAC,CAAC,CACH;KACF,CAAC;AACJ,CAAC","sourcesContent":["import { SerializedMessages, AuthEncMessage, AuthEncMessages, PartyGpgKey, AuthMessage } from './types';\nimport * as pgp from 'openpgp';\n\n/**\n * Tolerance window for OpenPGP date-based key validity checks (24 hours).\n *\n * Background: OpenPGP.js uses the `date` parameter to check key expiry at a\n * given point in time. We previously passed `date: null` to disable this check\n * entirely (see HSM-706) because OVC cold-signing flows for trust and SMC\n * clients can involve significant clock skew between the signing device and the\n * server — the device may be air-gapped and its clock can drift by hours.\n *\n * Note: this GPG expiry check is not strictly required for replay protection.\n * The DKLS protocol has its own mechanism for preventing replay attacks\n * (session-bound commitments and round-specific message validation), so the\n * OpenPGP date check is a defense-in-depth measure rather than the primary\n * replay mitigation.\n *\n * OpenPGP's `date` parameter shifts the reference time for ALL temporal\n * checks simultaneously (key expiry, self-signature validity, signature\n * freshness). This means a single shifted date cannot independently relax\n * key-expiry checks without breaking self-signature validation on fresh keys.\n *\n * Therefore:\n * - encrypt/decrypt omit `date` (use default = current time) for normal key\n *   expiry checking and self-signature validation.\n * - verify uses `now + tolerance` so that signatures from OVC devices whose\n *   clocks are up to 24 hours ahead are not rejected as \"from the future\".\n */\nexport const SIGNATURE_DATE_TOLERANCE_MS = 24 * 60 * 60 * 1000;\n\n/**\n * Detach signs a binary and encodes it in base64\n * @param data binary to encode in base64 and sign\n * @param privateArmor private key to sign with\n */\nexport async function detachSignData(data: Buffer, privateArmor: string): Promise<AuthMessage> {\n  const message = await pgp.createMessage({ binary: data });\n  const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });\n  const signature = await pgp.sign({\n    message,\n    signingKeys: privateKey,\n    format: 'armored',\n    detached: true,\n    config: {\n      rejectCurves: new Set(),\n      showVersion: false,\n      showComment: false,\n    },\n  });\n  return {\n    message: data.toString('base64'),\n    signature: signature,\n  };\n}\n\n/**\n * Encrypts and detach signs a binary\n * @param data binary to encrypt and sign\n * @param publicArmor public key to encrypt with\n * @param privateArmor private key to sign with\n */\nexport async function encryptAndDetachSignData(\n  data: Buffer,\n  publicArmor: string,\n  privateArmor: string\n): Promise<AuthEncMessage> {\n  const message = await pgp.createMessage({ binary: data });\n  const publicKey = await pgp.readKey({ armoredKey: publicArmor });\n  const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });\n  const encryptedMessage = await pgp.encrypt({\n    message,\n    encryptionKeys: publicKey,\n    format: 'armored',\n    config: {\n      rejectCurves: new Set(),\n      showVersion: false,\n      showComment: false,\n    },\n  });\n  const signature = await pgp.sign({\n    message,\n    signingKeys: privateKey,\n    format: 'armored',\n    detached: true,\n    config: {\n      rejectCurves: new Set(),\n      showVersion: false,\n      showComment: false,\n    },\n  });\n  return {\n    encryptedMessage: encryptedMessage,\n    signature: signature,\n  };\n}\n\n/**\n * Decrypts and verifies signature on a binary\n * @param encryptedAndSignedMessage message to decrypt and verify\n * @param publicArmor public key to verify signature with\n * @param privateArmor private key to decrypt with\n */\nexport async function decryptAndVerifySignedData(\n  encryptedAndSignedMessage: AuthEncMessage,\n  publicArmor: string,\n  privateArmor: string\n): Promise<string> {\n  const publicKey = await pgp.readKey({ armoredKey: publicArmor });\n  const privateKey = await pgp.readPrivateKey({ armoredKey: privateArmor });\n  const decryptedMessage = await pgp.decrypt({\n    message: await pgp.readMessage({ armoredMessage: encryptedAndSignedMessage.encryptedMessage }),\n    decryptionKeys: [privateKey],\n    config: {\n      rejectCurves: new Set(),\n      showVersion: false,\n      showComment: false,\n    },\n    format: 'binary',\n  });\n  const verificationResult = await pgp.verify({\n    message: await pgp.createMessage({ binary: decryptedMessage.data }),\n    signature: await pgp.readSignature({ armoredSignature: encryptedAndSignedMessage.signature }),\n    verificationKeys: publicKey,\n    date: new Date(Date.now() + SIGNATURE_DATE_TOLERANCE_MS),\n  });\n  await verificationResult.signatures[0].verified;\n  return Buffer.from(decryptedMessage.data).toString('base64');\n}\n\n/**\n * Verifies signature on a binary (message passed should be encoded in base64).\n * @param signedMessage message to verify\n * @param publicArmor public key to verify signature with\n */\nexport async function verifySignedData(signedMessage: AuthMessage, publicArmor: string): Promise<boolean> {\n  const publicKey = await pgp.readKey({ armoredKey: publicArmor });\n  const verificationResult = await pgp.verify({\n    message: await pgp.createMessage({ binary: Buffer.from(signedMessage.message, 'base64') }),\n    signature: await pgp.readSignature({ armoredSignature: signedMessage.signature }),\n    verificationKeys: publicKey,\n    date: new Date(Date.now() + SIGNATURE_DATE_TOLERANCE_MS),\n  });\n  try {\n    await verificationResult.signatures[0].verified;\n    return true;\n  } catch (e) {\n    return false;\n  }\n}\n\n/**\n * Decrypts and verifies p2p messages + verifies broadcast messages\n * @param messages message to decrypt and verify\n * @param pubVerificationGpgKeys public keys to verify signatures with\n * @param prvDecryptionGpgKeys private keys to decrypt with\n */\nexport async function decryptAndVerifyIncomingMessages(\n  messages: AuthEncMessages,\n  pubVerificationGpgKeys: PartyGpgKey[],\n  prvDecryptionGpgKeys: PartyGpgKey[]\n): Promise<SerializedMessages> {\n  return {\n    p2pMessages: await Promise.all(\n      messages.p2pMessages.map(async (m) => {\n        const pubGpgKey = pubVerificationGpgKeys.find((k) => k.partyId === m.from);\n        const prvGpgKey = prvDecryptionGpgKeys.find((k) => k.partyId === m.to);\n        if (!pubGpgKey) {\n          throw Error(`No public key provided for sender with ID: ${m.from}`);\n        }\n        if (!prvGpgKey) {\n          throw Error(`No private key provided for recepient with ID: ${m.to}`);\n        }\n        return {\n          to: m.to,\n          from: m.from,\n          payload: await decryptAndVerifySignedData(m.payload, pubGpgKey.gpgKey, prvGpgKey.gpgKey),\n          commitment: m.commitment,\n        };\n      })\n    ),\n    broadcastMessages: await Promise.all(\n      messages.broadcastMessages.map(async (m) => {\n        const pubGpgKey = pubVerificationGpgKeys.find((k) => k.partyId === m.from);\n        if (!pubGpgKey) {\n          throw Error(`No public key provided for sender with ID: ${m.from}`);\n        }\n        if (!(await verifySignedData(m.payload, pubGpgKey.gpgKey))) {\n          throw Error(`Failed to authenticate broadcast message from party: ${m.from}`);\n        }\n        if (m.signatureR !== undefined) {\n          if (!(await verifySignedData(m.signatureR, pubGpgKey.gpgKey))) {\n            throw Error(`Failed to authenticate signatureR in broadcast message from party: ${m.from}`);\n          }\n        }\n        return {\n          from: m.from,\n          payload: m.payload.message,\n          signatureR: m.signatureR?.message,\n        };\n      })\n    ),\n  };\n}\n\n/**\n * Encrypts and signs p2p messages + signs broadcast messages\n * @param messages messages to encrypt and sign\n * @param pubEncryptionGpgKey public keys to encrypt data to\n * @param prvAuthenticationGpgKey private keys to sign with\n */\nexport async function encryptAndAuthOutgoingMessages(\n  messages: SerializedMessages,\n  pubEncryptionGpgKeys: PartyGpgKey[],\n  prvAuthenticationGpgKeys: PartyGpgKey[]\n): Promise<AuthEncMessages> {\n  return {\n    p2pMessages: await Promise.all(\n      messages.p2pMessages.map(async (m) => {\n        const pubGpgKey = pubEncryptionGpgKeys.find((k) => k.partyId === m.to);\n        const prvGpgKey = prvAuthenticationGpgKeys.find((k) => k.partyId === m.from);\n        if (!pubGpgKey) {\n          throw Error(`No public key provided for recipient with ID: ${m.to}`);\n        }\n        if (!prvGpgKey) {\n          throw Error(`No private key provided for sender with ID: ${m.from}`);\n        }\n        return {\n          to: m.to,\n          from: m.from,\n          payload: await encryptAndDetachSignData(Buffer.from(m.payload, 'base64'), pubGpgKey.gpgKey, prvGpgKey.gpgKey),\n          commitment: m.commitment,\n        };\n      })\n    ),\n    broadcastMessages: await Promise.all(\n      messages.broadcastMessages.map(async (m) => {\n        const prvGpgKey = prvAuthenticationGpgKeys.find((k) => k.partyId === m.from);\n        if (!prvGpgKey) {\n          throw Error(`No private key provided for sender with ID: ${m.from}`);\n        }\n        const [signedPayload, signedSignatureR] = await Promise.all([\n          detachSignData(Buffer.from(m.payload, 'base64'), prvGpgKey.gpgKey),\n          m.signatureR\n            ? detachSignData(Buffer.from(m.signatureR, 'base64'), prvGpgKey.gpgKey)\n            : Promise.resolve(undefined),\n        ]);\n        return {\n          from: m.from,\n          payload: signedPayload,\n          signatureR: signedSignatureR,\n        };\n      })\n    ),\n  };\n}\n"]}
@@ -0,0 +1,62 @@
1
+ import type { KeygenSession, Keyshare } from '@silencelaboratories/dkls-wasm-ll-node';
2
+ import { DeserializedBroadcastMessage, DeserializedMessages, DkgState, RetrofitData } from './types';
3
+ type NodeWasmer = typeof import('@silencelaboratories/dkls-wasm-ll-node');
4
+ type WebWasmer = typeof import('@silencelaboratories/dkls-wasm-ll-web');
5
+ type BundlerWasmer = typeof import('@silencelaboratories/dkls-wasm-ll-bundler');
6
+ type DklsWasm = NodeWasmer | WebWasmer | BundlerWasmer;
7
+ export interface DkgSessionData {
8
+ dkgSessionBytes: Uint8Array;
9
+ dkgState: DkgState;
10
+ chainCodeCommitment?: Uint8Array;
11
+ keyShareBuff?: Buffer;
12
+ }
13
+ export declare class Dkg {
14
+ protected dkgSession: KeygenSession | undefined;
15
+ protected dkgSessionBytes: Uint8Array;
16
+ protected dkgKeyShare: Keyshare;
17
+ protected keyShareBuff: Buffer;
18
+ protected n: number;
19
+ protected t: number;
20
+ protected seed: Buffer | undefined;
21
+ protected chainCodeCommitment: Uint8Array | undefined;
22
+ protected partyIdx: number;
23
+ protected dkgState: DkgState;
24
+ protected dklsKeyShareRetrofitObject: Keyshare | undefined;
25
+ protected retrofitData: RetrofitData | undefined;
26
+ protected dklsWasm: DklsWasm | null;
27
+ constructor(n: number, t: number, partyIdx: number, seed?: Buffer, retrofitData?: RetrofitData, dklsWasm?: BundlerWasmer);
28
+ private loadDklsWasm;
29
+ private getDklsWasm;
30
+ private _restoreSession;
31
+ private _createDKLsRetrofitKeyShare;
32
+ private _deserializeState;
33
+ initDkg(): Promise<DeserializedBroadcastMessage>;
34
+ getKeyShare(): Buffer;
35
+ /**
36
+ * Returns a CBOR-encoded ReducedKeyShare buffer containing the party's private
37
+ * scalar (s_i) in the `prv` field. This buffer is private key material.
38
+ * The caller encrypts it and stores it as `reducedEncryptedPrv` on the key card QR code.
39
+ */
40
+ getReducedKeyShare(): Buffer;
41
+ handleIncomingMessages(messagesForIthRound: DeserializedMessages): DeserializedMessages;
42
+ /**
43
+ * Get the current session data that can be used to restore the session later
44
+ * @returns The current session data
45
+ */
46
+ getSessionData(): DkgSessionData;
47
+ /**
48
+ * Restore a DKG session from previous session data
49
+ * Note: This should not be used for Round 1 as that's the initialization phase
50
+ * @param n Number of parties
51
+ * @param t Threshold
52
+ * @param partyIdx Party index
53
+ * @param sessionData Previous session data
54
+ * @param seed Optional seed
55
+ * @param retrofitData Optional retrofit data
56
+ * @param dklsWasm Optional DKLS wasm instance
57
+ * @returns A new DKG instance with the restored session
58
+ */
59
+ static restoreSession(n: number, t: number, partyIdx: number, sessionData: DkgSessionData, seed?: Buffer, retrofitData?: RetrofitData, dklsWasm?: BundlerWasmer): Promise<Dkg>;
60
+ }
61
+ export {};
62
+ //# sourceMappingURL=dkg.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"dkg.d.ts","sourceRoot":"","sources":["../../../../src/tss/ecdsa-dkls/dkg.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,aAAa,EAAE,QAAQ,EAAW,MAAM,wCAAwC,CAAC;AAK/F,OAAO,EAAE,4BAA4B,EAAE,oBAAoB,EAAE,QAAQ,EAAmB,YAAY,EAAE,MAAM,SAAS,CAAC;AAEtH,KAAK,UAAU,GAAG,cAAc,wCAAwC,CAAC,CAAC;AAC1E,KAAK,SAAS,GAAG,cAAc,uCAAuC,CAAC,CAAC;AACxE,KAAK,aAAa,GAAG,cAAc,2CAA2C,CAAC,CAAC;AAEhF,KAAK,QAAQ,GAAG,UAAU,GAAG,SAAS,GAAG,aAAa,CAAC;AAEvD,MAAM,WAAW,cAAc;IAC7B,eAAe,EAAE,UAAU,CAAC;IAC5B,QAAQ,EAAE,QAAQ,CAAC;IACnB,mBAAmB,CAAC,EAAE,UAAU,CAAC;IACjC,YAAY,CAAC,EAAE,MAAM,CAAC;CACvB;AAED,qBAAa,GAAG;IACd,SAAS,CAAC,UAAU,EAAE,aAAa,GAAG,SAAS,CAAC;IAChD,SAAS,CAAC,eAAe,EAAE,UAAU,CAAC;IACtC,SAAS,CAAC,WAAW,EAAE,QAAQ,CAAC;IAChC,SAAS,CAAC,YAAY,EAAE,MAAM,CAAC;IAC/B,SAAS,CAAC,CAAC,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,CAAC,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,IAAI,EAAE,MAAM,GAAG,SAAS,CAAC;IACnC,SAAS,CAAC,mBAAmB,EAAE,UAAU,GAAG,SAAS,CAAC;IACtD,SAAS,CAAC,QAAQ,EAAE,MAAM,CAAC;IAC3B,SAAS,CAAC,QAAQ,EAAE,QAAQ,CAA0B;IACtD,SAAS,CAAC,0BAA0B,EAAE,QAAQ,GAAG,SAAS,CAAC;IAC3D,SAAS,CAAC,YAAY,EAAE,YAAY,GAAG,SAAS,CAAC;IACjD,SAAS,CAAC,QAAQ,EAAE,QAAQ,GAAG,IAAI,CAAC;gBAGlC,CAAC,EAAE,MAAM,EACT,CAAC,EAAE,MAAM,EACT,QAAQ,EAAE,MAAM,EAChB,IAAI,CAAC,EAAE,MAAM,EACb,YAAY,CAAC,EAAE,YAAY,EAC3B,QAAQ,CAAC,EAAE,aAAa;YAWZ,YAAY;IAM1B,OAAO,CAAC,WAAW;IAQnB,OAAO,CAAC,eAAe;IAMvB,OAAO,CAAC,2BAA2B;IAuCnC,OAAO,CAAC,iBAAiB;IA4BnB,OAAO,IAAI,OAAO,CAAC,4BAA4B,CAAC;IA+CtD,WAAW,IAAI,MAAM;IAOrB;;;;OAIG;IACH,kBAAkB,IAAI,MAAM;IAgB5B,sBAAsB,CAAC,mBAAmB,EAAE,oBAAoB,GAAG,oBAAoB;IAqFvF;;;OAGG;IACH,cAAc,IAAI,cAAc;IAiBhC;;;;;;;;;;;OAWG;WACU,cAAc,CACzB,CAAC,EAAE,MAAM,EACT,CAAC,EAAE,MAAM,EACT,QAAQ,EAAE,MAAM,EAChB,WAAW,EAAE,cAAc,EAC3B,IAAI,CAAC,EAAE,MAAM,EACb,YAAY,CAAC,EAAE,YAAY,EAC3B,QAAQ,CAAC,EAAE,aAAa,GACvB,OAAO,CAAC,GAAG,CAAC;CAwBhB"}