@inco/js 0.8.0-devnet-13 → 0.8.0-devnet-22

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (89) hide show
  1. package/README.md +18 -76
  2. package/dist/cjs/advancedacl/session-key.d.ts +1 -1
  3. package/dist/cjs/advancedacl/session-key.js +3 -2
  4. package/dist/cjs/attestedcompute/attested-compute.js +5 -2
  5. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +5 -1
  6. package/dist/cjs/attesteddecrypt/attested-decrypt.js +14 -4
  7. package/dist/cjs/binary.d.ts +2 -4
  8. package/dist/cjs/binary.js +11 -6
  9. package/dist/cjs/encryption/index.d.ts +1 -1
  10. package/dist/cjs/encryption/index.js +17 -16
  11. package/dist/cjs/generated/abis/lightning.d.ts +70 -17
  12. package/dist/cjs/generated/abis/lightning.js +44 -19
  13. package/dist/cjs/generated/abis/test-elist.d.ts +10 -2
  14. package/dist/cjs/generated/abis/test-elist.js +8 -3
  15. package/dist/cjs/generated/abis/verifier.d.ts +78 -4
  16. package/dist/cjs/generated/abis/verifier.js +49 -4
  17. package/dist/cjs/generated/lightning.d.ts +60 -0
  18. package/dist/cjs/generated/lightning.js +64 -1
  19. package/dist/cjs/generated/local-node.d.ts +4 -4
  20. package/dist/cjs/generated/local-node.js +4 -4
  21. package/dist/cjs/index.d.ts +1 -1
  22. package/dist/cjs/index.js +11 -2
  23. package/dist/cjs/kms/quorumClient.d.ts +5 -13
  24. package/dist/cjs/kms/quorumClient.js +74 -259
  25. package/dist/cjs/kms/quorumConsistency.d.ts +58 -0
  26. package/dist/cjs/kms/quorumConsistency.js +200 -0
  27. package/dist/cjs/kms/signatureVerification.d.ts +35 -0
  28. package/dist/cjs/kms/signatureVerification.js +88 -0
  29. package/dist/cjs/kms/thresholdPromises.d.ts +4 -3
  30. package/dist/cjs/kms/thresholdPromises.js +25 -15
  31. package/dist/cjs/lite/hadu.d.ts +1 -1
  32. package/dist/cjs/lite/hadu.js +3 -3
  33. package/dist/cjs/lite/index.d.ts +0 -2
  34. package/dist/cjs/lite/index.js +1 -15
  35. package/dist/cjs/lite/lightning.d.ts +1 -1
  36. package/dist/cjs/lite/lightning.js +14 -33
  37. package/dist/esm/advancedacl/session-key.d.ts +1 -1
  38. package/dist/esm/advancedacl/session-key.js +3 -2
  39. package/dist/esm/attestedcompute/attested-compute.js +6 -3
  40. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +5 -1
  41. package/dist/esm/attesteddecrypt/attested-decrypt.js +15 -5
  42. package/dist/esm/binary.d.ts +2 -4
  43. package/dist/esm/binary.js +11 -6
  44. package/dist/esm/encryption/index.d.ts +1 -1
  45. package/dist/esm/encryption/index.js +2 -2
  46. package/dist/esm/generated/abis/lightning.d.ts +70 -17
  47. package/dist/esm/generated/abis/lightning.js +44 -19
  48. package/dist/esm/generated/abis/test-elist.d.ts +10 -2
  49. package/dist/esm/generated/abis/test-elist.js +8 -3
  50. package/dist/esm/generated/abis/verifier.d.ts +78 -4
  51. package/dist/esm/generated/abis/verifier.js +49 -4
  52. package/dist/esm/generated/lightning.d.ts +60 -0
  53. package/dist/esm/generated/lightning.js +64 -1
  54. package/dist/esm/generated/local-node.d.ts +4 -4
  55. package/dist/esm/generated/local-node.js +4 -4
  56. package/dist/esm/index.d.ts +1 -1
  57. package/dist/esm/index.js +2 -2
  58. package/dist/esm/kms/quorumClient.d.ts +5 -13
  59. package/dist/esm/kms/quorumClient.js +74 -259
  60. package/dist/esm/kms/quorumConsistency.d.ts +58 -0
  61. package/dist/esm/kms/quorumConsistency.js +193 -0
  62. package/dist/esm/kms/signatureVerification.d.ts +35 -0
  63. package/dist/esm/kms/signatureVerification.js +84 -0
  64. package/dist/esm/kms/thresholdPromises.d.ts +4 -3
  65. package/dist/esm/kms/thresholdPromises.js +25 -15
  66. package/dist/esm/lite/hadu.d.ts +1 -1
  67. package/dist/esm/lite/hadu.js +2 -2
  68. package/dist/esm/lite/index.d.ts +0 -2
  69. package/dist/esm/lite/index.js +1 -3
  70. package/dist/esm/lite/lightning.d.ts +1 -1
  71. package/dist/esm/lite/lightning.js +8 -27
  72. package/dist/types/advancedacl/session-key.d.ts +1 -1
  73. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +5 -1
  74. package/dist/types/binary.d.ts +2 -4
  75. package/dist/types/encryption/index.d.ts +1 -1
  76. package/dist/types/generated/abis/lightning.d.ts +70 -17
  77. package/dist/types/generated/abis/test-elist.d.ts +10 -2
  78. package/dist/types/generated/abis/verifier.d.ts +78 -4
  79. package/dist/types/generated/lightning.d.ts +60 -0
  80. package/dist/types/generated/local-node.d.ts +4 -4
  81. package/dist/types/index.d.ts +1 -1
  82. package/dist/types/kms/quorumClient.d.ts +5 -13
  83. package/dist/types/kms/quorumConsistency.d.ts +58 -0
  84. package/dist/types/kms/signatureVerification.d.ts +35 -0
  85. package/dist/types/kms/thresholdPromises.d.ts +4 -3
  86. package/dist/types/lite/hadu.d.ts +1 -1
  87. package/dist/types/lite/index.d.ts +0 -2
  88. package/dist/types/lite/lightning.d.ts +1 -1
  89. package/package.json +12 -12
@@ -2,9 +2,10 @@ import type { Address } from 'viem';
2
2
  import type { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/types.js';
3
3
  import type { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
4
4
  import type { AttestedComputeRequest, AttestedDecryptRequest, AttestedRevealRequest } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
5
- import type { XwingKeypair } from '../lite/index.js';
5
+ import type { XwingKeypair } from '../lite/xwing.js';
6
6
  import type { BackoffConfig } from '../retry.js';
7
7
  import { type KmsClient } from './client.js';
8
+ import type { ViemClient } from './signatureVerification.js';
8
9
  export declare class KmsQuorumClient {
9
10
  private readonly kmss;
10
11
  private readonly threshold;
@@ -29,9 +30,9 @@ export declare class KmsQuorumClient {
29
30
  * @throws {Error} If KMS clients array is empty or threshold is invalid
30
31
  */
31
32
  static fromKmsClients(kmsClients: KmsClient[], threshold: number): KmsQuorumClient;
32
- attestedDecrypt(request: AttestedDecryptRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
33
- attestedCompute(request: AttestedComputeRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
34
- attestedReveal(request: AttestedRevealRequest, backoffConfig?: Partial<BackoffConfig>): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
33
+ attestedDecrypt(request: AttestedDecryptRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair, executorAddress?: Address, client?: ViemClient): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
34
+ attestedCompute(request: AttestedComputeRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair, executorAddress?: Address, client?: ViemClient): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
35
+ attestedReveal(request: AttestedRevealRequest, backoffConfig?: Partial<BackoffConfig>, executorAddress?: Address, client?: ViemClient): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
35
36
  /**
36
37
  * Generic method to execute a KMS operation across all clients with retry and threshold logic.
37
38
  * Returns results with both the response and signer address.
@@ -48,13 +49,4 @@ export declare class KmsQuorumClient {
48
49
  private buildPlaintextAttestation;
49
50
  private buildAggregatedAttestations;
50
51
  private buildAggregatedComputeAttestation;
51
- private verifyResponseConsistency;
52
- private verifyComputeResponseConsistency;
53
- /**
54
- * Verifies that two plaintext byte arrays are identical.
55
- * Uses constant-time comparison to prevent timing side-channel attacks.
56
- */
57
- private verifyPlaintextBytesConsistency;
58
- private verifyPlaintextConsistency;
59
- private verifyCiphertextConsistency;
60
52
  }
@@ -1,18 +1,19 @@
1
1
  import { bytesToBigInt, bytesToHex, parseHex, } from '../binary.js';
2
2
  import { bigintToPlaintext, encryptionSchemes, } from '../encryption/encryption.js';
3
3
  import { getHandleType } from '../handle.js';
4
- import { decrypt } from '../lite/xwing.js';
5
4
  import { retryWithBackoff } from '../retry.js';
6
5
  import { getKmsClient } from './client.js';
6
+ import { verifyComputeResponseConsistency, verifyDecryptResponseConsistency, } from './quorumConsistency.js';
7
+ import { verifyPlaintextAttestationSignatures, verifyReencryptionAttestationSignatures, } from './signatureVerification.js';
7
8
  import { executeWithThreshold } from './thresholdPromises.js';
8
9
  /**
9
- * Checks if the threshold is at least a majority of signers and warns if not.
10
+ * Checks if the threshold is at least a majority of signers and throws an error if not.
11
+ * This is important to ensure that the quorum client provides the expected security guarantees.
10
12
  */
11
13
  function checkMajorityThreshold(threshold, signerCount) {
12
14
  const majority = Math.floor(signerCount / 2) + 1;
13
15
  if (threshold < majority) {
14
- console.warn(`Security warning: threshold (${threshold}) is less than majority (${majority}) of ${signerCount} signers. ` +
15
- `A threshold below majority weakens quorum security guarantees.`);
16
+ throw new Error(`Threshold (${threshold}) must be at least a majority (${majority}) of ${signerCount} signers to ensure security guarantees.`);
16
17
  }
17
18
  }
18
19
  export class KmsQuorumClient {
@@ -68,7 +69,6 @@ export class KmsQuorumClient {
68
69
  if (threshold < 1 || threshold > urls.length) {
69
70
  throw new Error(`Threshold must be between 1 and ${urls.length} (number of URLs)`);
70
71
  }
71
- checkMajorityThreshold(threshold, urls.length);
72
72
  const attesters = urls.map((url, index) => {
73
73
  return { url, signer: signers[index] };
74
74
  });
@@ -89,41 +89,31 @@ export class KmsQuorumClient {
89
89
  if (threshold < 1 || threshold > kmsClients.length) {
90
90
  throw new Error(`Threshold must be between 1 and ${kmsClients.length} (number of KMS clients)`);
91
91
  }
92
- checkMajorityThreshold(threshold, kmsClients.length);
93
92
  return new KmsQuorumClient(kmsClients, threshold);
94
93
  }
95
- async attestedDecrypt(request, backoffConfig, reencryptKeypair) {
94
+ async attestedDecrypt(request, backoffConfig, reencryptKeypair, executorAddress, client) {
96
95
  const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
97
96
  return await kms.client.attestedDecrypt(request);
98
97
  }, backoffConfig);
99
- // Extract responses and signers
100
- const thresholdResponses = thresholdResults.map((r) => r.response);
101
- const signers = thresholdResults.map((r) => r.signer);
102
98
  // Verify that responses are consistent across quorum (plaintext or ciphertext)
103
- const reference = await this.verifyResponseConsistency(thresholdResponses, reencryptKeypair);
104
- return this.buildAggregatedAttestations(reference, thresholdResponses, signers);
99
+ const { reference, winningResults } = await verifyDecryptResponseConsistency(thresholdResults, this.threshold, reencryptKeypair);
100
+ return this.buildAggregatedAttestations(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
105
101
  }
106
- async attestedCompute(request, backoffConfig, reencryptKeypair) {
102
+ async attestedCompute(request, backoffConfig, reencryptKeypair, executorAddress, client) {
107
103
  const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
108
104
  return await kms.client.attestedCompute(request);
109
105
  }, backoffConfig);
110
- // Extract responses and signers
111
- const thresholdResponses = thresholdResults.map((r) => r.response);
112
- const signers = thresholdResults.map((r) => r.signer);
113
106
  // Verify that responses are consistent across quorum
114
- const reference = await this.verifyComputeResponseConsistency(thresholdResponses, request, reencryptKeypair);
115
- return this.buildAggregatedComputeAttestation(reference, thresholdResponses, signers);
107
+ const { reference, winningResults } = await verifyComputeResponseConsistency(thresholdResults, this.threshold, request, reencryptKeypair);
108
+ return this.buildAggregatedComputeAttestation(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
116
109
  }
117
- async attestedReveal(request, backoffConfig) {
110
+ async attestedReveal(request, backoffConfig, executorAddress, client) {
118
111
  const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
119
112
  return await kms.client.attestedReveal(request);
120
113
  }, backoffConfig);
121
- // Extract responses and signers
122
- const thresholdResponses = thresholdResults.map((r) => r.response);
123
- const signers = thresholdResults.map((r) => r.signer);
124
114
  // Verify that responses are consistent across quorum (plaintext only for reveal)
125
- const reference = await this.verifyResponseConsistency(thresholdResponses);
126
- return this.buildAggregatedAttestations(reference, thresholdResponses, signers);
115
+ const { reference, winningResults } = await verifyDecryptResponseConsistency(thresholdResults, this.threshold);
116
+ return this.buildAggregatedAttestations(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
127
117
  }
128
118
  /**
129
119
  * Generic method to execute a KMS operation across all clients with retry and threshold logic.
@@ -186,9 +176,10 @@ export class KmsQuorumClient {
186
176
  covalidatorSignatures,
187
177
  };
188
178
  }
189
- buildAggregatedAttestations(reference, thresholdResponses, signers) {
179
+ async buildAggregatedAttestations(reference, thresholdResponses, signers, executorAddress, client) {
190
180
  const attestationCount = reference.decryptionAttestations.length;
191
- return new Array(attestationCount).fill(undefined).map((_, i) => {
181
+ const results = [];
182
+ for (let i = 0; i < attestationCount; i++) {
192
183
  const refAtt = reference.decryptionAttestations[i];
193
184
  if (!refAtt.value) {
194
185
  throw new Error('No value in attestation');
@@ -197,42 +188,56 @@ export class KmsQuorumClient {
197
188
  const signatures = thresholdResponses.map((resp) => resp.decryptionAttestations[i].signature);
198
189
  const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
199
190
  if (refAtt.value.case === 'plaintext') {
200
- return this.buildPlaintextAttestation(refAtt, covalidatorSignatures);
191
+ // Verify covalidator signatures over the plaintext attestation
192
+ // executorAddress and client are only undefined when using a non-real client (e.g. in tests)
193
+ if (executorAddress && client) {
194
+ await verifyPlaintextAttestationSignatures(refAtt.handle, refAtt.value.value.value, covalidatorSignatures, executorAddress, client);
195
+ }
196
+ results.push(this.buildPlaintextAttestation(refAtt, covalidatorSignatures));
201
197
  }
202
198
  else if (refAtt.value.case === 'reencryption') {
203
- // Collect encrypted signatures and sort by signer address
204
- const encryptedSignatures = thresholdResponses.map((resp) => {
205
- if (resp.decryptionAttestations[i].value.case === 'reencryption') {
206
- const reencryption = resp.decryptionAttestations[i].value.value;
207
- return reencryption.encryptedSignature;
199
+ // Collect per-covalidator encrypted signatures and ciphertexts
200
+ const encryptedSignatures = [];
201
+ const perCovalidatorCiphertexts = [];
202
+ for (const resp of thresholdResponses) {
203
+ const attValue = resp.decryptionAttestations[i].value;
204
+ if (attValue?.case === 'reencryption') {
205
+ encryptedSignatures.push(attValue.value.encryptedSignature);
206
+ perCovalidatorCiphertexts.push(attValue.value.userCiphertext);
208
207
  }
209
208
  else {
210
- throw new Error(`Expected reencryption attestation but received '${resp.decryptionAttestations[i].value.case}'`);
209
+ throw new Error(`Expected reencryption attestation but received '${attValue?.case}'`);
211
210
  }
212
- });
211
+ }
213
212
  const encryptedCovalidatorSignatures = this.collectAndSortSignatures(encryptedSignatures, signers);
213
+ const sortedCiphertexts = this.collectAndSortSignatures(perCovalidatorCiphertexts, signers);
214
+ // executorAddress and client are only undefined when using a non-real client (e.g. in tests)
215
+ if (executorAddress && client) {
216
+ await verifyReencryptionAttestationSignatures(refAtt.handle, sortedCiphertexts, encryptedCovalidatorSignatures, covalidatorSignatures, executorAddress, client);
217
+ }
214
218
  const reencryption = refAtt.value.value;
215
219
  const ct = reencryption.userCiphertext;
216
- const fheType = getHandleType(parseHex(refAtt.handle));
217
- return {
220
+ const handleType = getHandleType(parseHex(refAtt.handle));
221
+ results.push({
218
222
  handle: refAtt.handle,
219
223
  encryptedPlaintext: {
220
224
  ciphertext: {
221
225
  value: bytesToHex(ct),
222
- scheme: 2, // EncryptionScheme: XWING
223
- type: fheType,
226
+ scheme: encryptionSchemes.xwing, // EncryptionScheme: XWING
227
+ type: handleType,
224
228
  },
225
229
  },
226
230
  encryptedSignatures: encryptedCovalidatorSignatures,
227
231
  covalidatorSignatures,
228
- };
232
+ });
229
233
  }
230
234
  else {
231
235
  throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
232
236
  }
233
- });
237
+ }
238
+ return results;
234
239
  }
235
- buildAggregatedComputeAttestation(reference, thresholdResponses, signers) {
240
+ async buildAggregatedComputeAttestation(reference, thresholdResponses, signers, executorAddress, client) {
236
241
  const refAtt = reference.decryptionAttestation;
237
242
  if (!refAtt) {
238
243
  throw new Error('No decryption attestation in reference response');
@@ -241,43 +246,58 @@ export class KmsQuorumClient {
241
246
  throw new Error('No value in reference attestation');
242
247
  }
243
248
  // Collect signatures and sort by signer address
244
- // We know all responses have decryption attestations from verifyComputeResponseConsistency
249
+ // All responses are guaranteed to have decryption attestations by verifyComputeResponseConsistency
245
250
  const signatures = [];
246
251
  for (const resp of thresholdResponses) {
247
252
  const att = resp.decryptionAttestation;
248
- if (att) {
249
- signatures.push(att.signature);
250
- }
253
+ if (!att)
254
+ throw new Error('Missing decryption attestation in winning response');
255
+ signatures.push(att.signature);
251
256
  }
252
257
  const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
253
258
  if (refAtt.value.case === 'plaintext') {
259
+ // Verify covalidator signatures over the plaintext attestation
260
+ // executorAddress and client are only undefined when using a non-real client (e.g. in tests)
261
+ if (executorAddress && client) {
262
+ await verifyPlaintextAttestationSignatures(refAtt.handle, refAtt.value.value.value, covalidatorSignatures, executorAddress, client);
263
+ }
254
264
  return this.buildPlaintextAttestation(refAtt, covalidatorSignatures);
255
265
  }
256
266
  if (refAtt.value.case === 'reencryption') {
267
+ // Reencryption envelope signatures are verified per-covalidator via
268
+ // isValidReencryptionAttestation on-chain (each has a unique digest).
257
269
  const reencryption = refAtt.value.value;
258
270
  const ct = reencryption.userCiphertext;
259
271
  if (!ct) {
260
272
  throw new Error('No ciphertext in reencryption');
261
273
  }
262
- const fheType = getHandleType(parseHex(refAtt.handle));
263
- // Collect encrypted signatures and sort by signer address
264
- const encryptedSignatures = thresholdResponses.map((resp) => {
274
+ const handleType = getHandleType(parseHex(refAtt.handle));
275
+ // Collect per-covalidator encrypted signatures and ciphertexts
276
+ const encryptedSignatures = [];
277
+ const perCovalidatorCiphertexts = [];
278
+ for (const resp of thresholdResponses) {
265
279
  if (resp.decryptionAttestation?.value.case === 'reencryption') {
266
- const reencryption = resp.decryptionAttestation?.value.value;
267
- return reencryption.encryptedSignature;
280
+ const reenc = resp.decryptionAttestation.value.value;
281
+ encryptedSignatures.push(reenc.encryptedSignature);
282
+ perCovalidatorCiphertexts.push(reenc.userCiphertext);
268
283
  }
269
284
  else {
270
285
  throw new Error(`Expected reencryption attestation but received '${resp.decryptionAttestation?.value.case}'`);
271
286
  }
272
- });
287
+ }
273
288
  const encryptedCovalidatorSignatures = this.collectAndSortSignatures(encryptedSignatures, signers);
289
+ const sortedCiphertexts = this.collectAndSortSignatures(perCovalidatorCiphertexts, signers);
290
+ // executorAddress and client are only undefined when using a non-real client (e.g. in tests)
291
+ if (executorAddress && client) {
292
+ await verifyReencryptionAttestationSignatures(refAtt.handle, sortedCiphertexts, encryptedCovalidatorSignatures, covalidatorSignatures, executorAddress, client);
293
+ }
274
294
  return {
275
295
  handle: refAtt.handle,
276
296
  encryptedPlaintext: {
277
297
  ciphertext: {
278
298
  value: bytesToHex(ct),
279
- scheme: encryptionSchemes.xwing, // EncryptionScheme: ECIES
280
- type: fheType,
299
+ scheme: encryptionSchemes.xwing, // EncryptionScheme: XWING
300
+ type: handleType,
281
301
  },
282
302
  },
283
303
  encryptedSignatures: encryptedCovalidatorSignatures,
@@ -286,210 +306,5 @@ export class KmsQuorumClient {
286
306
  }
287
307
  throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
288
308
  }
289
- async verifyResponseConsistency(thresholdResponses, reencryptKeypair) {
290
- if (thresholdResponses.length === 0) {
291
- throw new Error('No responses collected to verify');
292
- }
293
- const reference = thresholdResponses[0];
294
- for (let r = 1; r < thresholdResponses.length; r++) {
295
- if (thresholdResponses[r].decryptionAttestations.length !==
296
- reference.decryptionAttestations.length) {
297
- throw new Error('Inconsistent number of decryption attestations across KMS responses');
298
- }
299
- }
300
- for (let i = 0; i < reference.decryptionAttestations.length; i++) {
301
- const refAtt = reference.decryptionAttestations[i];
302
- if (!refAtt.value) {
303
- throw new Error('No value in reference attestation');
304
- }
305
- const refCase = refAtt.value.case;
306
- // Verify that all responses have the same case (plaintext or reencryption)
307
- for (let r = 1; r < thresholdResponses.length; r++) {
308
- const att = thresholdResponses[r].decryptionAttestations[i];
309
- if (!att.value) {
310
- throw new Error('No value in attestation');
311
- }
312
- if (att.value.case !== refCase) {
313
- throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
314
- }
315
- }
316
- // Verify consistency based on the case
317
- if (refCase === 'plaintext') {
318
- this.verifyPlaintextConsistency(i, reference, thresholdResponses);
319
- }
320
- else if (refCase === 'reencryption') {
321
- await this.verifyCiphertextConsistency(i, reference, thresholdResponses, reencryptKeypair);
322
- }
323
- else {
324
- throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
325
- }
326
- }
327
- return reference;
328
- }
329
- async verifyComputeResponseConsistency(thresholdResponses, request, reencryptKeypair) {
330
- if (thresholdResponses.length === 0) {
331
- throw new Error('No responses collected to verify');
332
- }
333
- const reference = thresholdResponses[0];
334
- const refAtt = reference.decryptionAttestation;
335
- if (!refAtt) {
336
- throw new Error('No decryption attestation in reference response');
337
- }
338
- if (!refAtt.value) {
339
- throw new Error('No value in reference attestation');
340
- }
341
- const refCase = refAtt.value.case;
342
- // Precompute reference values based on the case
343
- let refBytes;
344
- let refReencryption;
345
- let refCt;
346
- let refFheType;
347
- if (refCase === 'plaintext') {
348
- refBytes = refAtt.value.value.value;
349
- }
350
- else if (refCase === 'reencryption') {
351
- refReencryption = refAtt.value.value;
352
- refCt = refReencryption.userCiphertext;
353
- if (!refCt) {
354
- throw new Error('No ciphertext in reference reencryption');
355
- }
356
- refFheType = getHandleType(parseHex(refAtt.handle));
357
- }
358
- else {
359
- throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
360
- }
361
- // If no reencryptPubKey is provided in the request (or it's empty), reject reencryption attestations
362
- const hasReencryptPubKey = request?.reencryptPubKey && request.reencryptPubKey.length > 0;
363
- if (refCase === 'reencryption' && !hasReencryptPubKey) {
364
- throw new Error("Unexpected attestation type: reencryption, expected 'plaintext'");
365
- }
366
- // Verify that all responses have a decryption attestation and are consistent
367
- for (let r = 1; r < thresholdResponses.length; r++) {
368
- const att = thresholdResponses[r].decryptionAttestation;
369
- if (!att) {
370
- throw new Error('No decryption attestation in response');
371
- }
372
- if (!att.value) {
373
- throw new Error('No value in attestation');
374
- }
375
- if (att.value.case !== refCase) {
376
- throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
377
- }
378
- // Verify handles match
379
- if (att.handle !== refAtt.handle) {
380
- throw new Error('Handles differ across KMS responses');
381
- }
382
- // Verify consistency based on the case
383
- if (refCase === 'plaintext') {
384
- if (!refBytes) {
385
- throw new Error('No reference plaintext bytes to compare');
386
- }
387
- if (att.value.case !== 'plaintext') {
388
- throw new Error('Expected plaintext attestation but received non-plaintext');
389
- }
390
- const bytes = att.value.value.value;
391
- this.verifyPlaintextBytesConsistency(refBytes, bytes);
392
- }
393
- else if (refCase === 'reencryption') {
394
- if (!refCt || refFheType === undefined) {
395
- throw new Error('No reference reencryption data to compare');
396
- }
397
- if (att.value.case !== 'reencryption') {
398
- throw new Error('Expected reencryption attestation but received non-reencryption');
399
- }
400
- const reencryption = att.value.value;
401
- const ct = reencryption.userCiphertext;
402
- if (!ct) {
403
- throw new Error('No ciphertext in reencryption');
404
- }
405
- const fheType = getHandleType(parseHex(att.handle));
406
- // Verify FHE type matches
407
- if (fheType !== refFheType) {
408
- throw new Error('FHE types differ across KMS responses');
409
- }
410
- // Verify handles match
411
- if (att.handle !== refAtt.handle) {
412
- throw new Error('Handles differ across KMS responses');
413
- }
414
- // If keypair provided, decrypt and verify plaintext consistency
415
- if (reencryptKeypair) {
416
- const refPlaintext = await decrypt(reencryptKeypair, refCt);
417
- const plaintext = await decrypt(reencryptKeypair, ct);
418
- this.verifyPlaintextBytesConsistency(refPlaintext, plaintext);
419
- }
420
- }
421
- }
422
- return reference;
423
- }
424
- /**
425
- * Verifies that two plaintext byte arrays are identical.
426
- * Uses constant-time comparison to prevent timing side-channel attacks.
427
- */
428
- verifyPlaintextBytesConsistency(refBytes, bytes) {
429
- if (refBytes.length !== bytes.length) {
430
- throw new Error('Plaintexts length differ across KMS responses');
431
- }
432
- // Compare all bytes before deciding to throw, preventing timing side-channel
433
- let mismatch = 0;
434
- for (let b = 0; b < refBytes.length; b++) {
435
- mismatch |= refBytes[b] ^ bytes[b];
436
- }
437
- if (mismatch !== 0) {
438
- throw new Error('Plaintexts differ across KMS responses');
439
- }
440
- }
441
- verifyPlaintextConsistency(index, reference, thresholdResponses) {
442
- const refAtt = reference.decryptionAttestations[index];
443
- if (refAtt.value?.case !== 'plaintext') {
444
- throw new Error('Expected plaintext attestation');
445
- }
446
- const refBytes = refAtt.value.value.value;
447
- for (let r = 1; r < thresholdResponses.length; r++) {
448
- const att = thresholdResponses[r].decryptionAttestations[index];
449
- if (att.value?.case !== 'plaintext') {
450
- throw new Error('Expected plaintext attestation but received non-plaintext');
451
- }
452
- const bytes = att.value.value.value;
453
- this.verifyPlaintextBytesConsistency(refBytes, bytes);
454
- }
455
- }
456
- async verifyCiphertextConsistency(index, reference, thresholdResponses, reencryptKeypair) {
457
- const refAtt = reference.decryptionAttestations[index];
458
- if (refAtt.value?.case !== 'reencryption') {
459
- throw new Error('Expected reencryption attestation');
460
- }
461
- const refReencryption = refAtt.value.value;
462
- const refCt = refReencryption.userCiphertext;
463
- if (!refCt) {
464
- throw new Error('No ciphertext in reference reencryption');
465
- }
466
- const refFheType = getHandleType(parseHex(refAtt.handle));
467
- for (let r = 1; r < thresholdResponses.length; r++) {
468
- const att = thresholdResponses[r].decryptionAttestations[index];
469
- if (att.value?.case !== 'reencryption') {
470
- throw new Error('Expected reencryption attestation but received non-reencryption');
471
- }
472
- const reencryption = att.value.value;
473
- const ct = reencryption.userCiphertext;
474
- if (!ct) {
475
- throw new Error('No ciphertext in reencryption');
476
- }
477
- const fheType = getHandleType(parseHex(att.handle));
478
- // Verify FHE type matches
479
- if (fheType !== refFheType) {
480
- throw new Error('FHE types differ across KMS responses');
481
- }
482
- // Verify handles match
483
- if (att.handle !== refAtt.handle) {
484
- throw new Error('Handles differ across KMS responses');
485
- }
486
- // If keypair provided, decrypt and verify plaintext consistency
487
- if (reencryptKeypair) {
488
- const refPlaintext = await decrypt(reencryptKeypair, refCt);
489
- const plaintext = await decrypt(reencryptKeypair, ct);
490
- this.verifyPlaintextBytesConsistency(refPlaintext, plaintext);
491
- }
492
- }
493
- }
494
309
  }
495
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":"AAKA,OAAO,EACL,aAAa,EACb,UAAU,EACV,QAAQ,GAET,MAAM,cAAc,CAAC;AAMtB,OAAO,EACL,iBAAiB,EACjB,iBAAiB,GAClB,MAAM,6BAA6B,CAAC;AAUrC,OAAO,EAAE,aAAa,EAAE,MAAM,cAAc,CAAC;AAE7C,OAAO,EAAE,OAAO,EAAE,MAAM,kBAAkB,CAAC;AAE3C,OAAO,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AAC/C,OAAO,EAAE,YAAY,EAAkB,MAAM,aAAa,CAAC;AAC3D,OAAO,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAC;AAO9D;;GAEG;AACH,SAAS,sBAAsB,CAAC,SAAiB,EAAE,WAAmB;IACpE,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,IAAI,SAAS,GAAG,QAAQ,EAAE,CAAC;QACzB,OAAO,CAAC,IAAI,CACV,gCAAgC,SAAS,4BAA4B,QAAQ,QAAQ,WAAW,YAAY;YAC1G,gEAAgE,CACnE,CAAC;IACJ,CAAC;AACH,CAAC;AAED,MAAM,OAAO,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAE7D,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,YAAY,CAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QAE/C,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC;QAErD,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B;QAO/B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,+EAA+E;QAC/E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,yBAAyB,CACpD,kBAAkB,EAClB,gBAAgB,CACjB,CAAC;QAEF,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B;QAK/B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,qDAAqD;QACrD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAC3D,kBAAkB,EAClB,OAAO,EACP,gBAAgB,CACjB,CAAC;QAEF,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC;QAOtC,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAkC,CAC5C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,iFAAiF;QACjF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,CAAC;QAE3E,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,gBAAgB,CAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,oBAAoB,CAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,aAAa,CAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,iBAAiB,CACjC,iBAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACuC,CAAC;IACjE,CAAC;IAEO,2BAA2B,CACjC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB;QAKlB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,OAAO,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAC9D,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;YACvE,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,0DAA0D;gBAC1D,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;oBAC1D,IAAI,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACjE,MAAM,YAAY,GAAG,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC;wBAChE,OAAO,YAAY,CAAC,kBAAkB,CAAC;oBACzC,CAAC;yBAAM,CAAC;wBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,GAAG,CAChG,CAAC;oBACJ,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;gBAEF,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBACvD,OAAO;oBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,UAAU,CAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,CAAC,EAAE,0BAA0B;4BACrC,IAAI,EAAE,OAAO;yBACd;qBACqD;oBACxD,mBAAmB,EAAE,8BAA8B;oBACnD,qBAAqB;iBACgD,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,iCAAiC,CACvC,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB;QAIlB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,gDAAgD;QAChD,2FAA2F;QAC3F,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,GAAG,EAAE,CAAC;gBACR,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACjC,CAAC;QACH,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;YACzC,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;YAEvD,0DAA0D;YAC1D,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1D,IAAI,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC9D,MAAM,YAAY,GAAG,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,KAAK,CAAC;oBAC7D,OAAO,YAAY,CAAC,kBAAkB,CAAC;gBACzC,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,GAAG,CAC7F,CAAC;gBACJ,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;YAEF,OAAO;gBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;gBAClC,kBAAkB,EAAE;oBAClB,UAAU,EAAE;wBACV,KAAK,EAAE,UAAU,CAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iBAAiB,CAAC,KAAK,EAAE,0BAA0B;wBAC3D,IAAI,EAAE,OAAO;qBACd;iBACqD;gBACxD,mBAAmB,EAAE,8BAA8B;gBACnD,qBAAqB;aACgD,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,yBAAyB,CACrC,kBAAwE,EACxE,gBAA+B;QAE/B,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QAExC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,IACE,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,MAAM;gBACnD,SAAS,CAAC,sBAAsB,CAAC,MAAM,EACvC,CAAC;gBACD,MAAM,IAAI,KAAK,CACb,qEAAqE,CACtE,CAAC;YACJ,CAAC;QACH,CAAC;QAED,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACjE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YAEnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;YACvD,CAAC;YAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;YAElC,2EAA2E;YAC3E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;gBAC5D,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;oBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;gBAC7C,CAAC;gBACD,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,0BAA0B,CAAC,CAAC,EAAE,SAAS,EAAE,kBAAkB,CAAC,CAAC;YACpE,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,MAAM,IAAI,CAAC,2BAA2B,CACpC,CAAC,EACD,SAAS,EACT,kBAAkB,EAClB,gBAAgB,CACjB,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,KAAK,CAAC,gCAAgC,CAC5C,kBAA6C,EAC7C,OAAgC,EAChC,gBAA+B;QAE/B,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QACxC,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAE/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;QAElC,gDAAgD;QAChD,IAAI,QAAgC,CAAC;QACrC,IAAI,eAAgC,CAAC;QACrC,IAAI,KAA6B,CAAC;QAClC,IAAI,UAAwD,CAAC;QAE7D,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;YAC5B,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QACtC,CAAC;aAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;YACtC,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,KAAK,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;YAC7D,CAAC;YAED,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;QACtD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;QACJ,CAAC;QAED,qGAAqG;QACrG,MAAM,kBAAkB,GACtB,OAAO,EAAE,eAAe,IAAI,OAAO,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC;QACjE,IAAI,OAAO,KAAK,cAAc,IAAI,CAAC,kBAAkB,EAAE,CAAC;YACtD,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;QACJ,CAAC;QAED,6EAA6E;QAC7E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,qBAAqB,CAAC;YACxD,IAAI,CAAC,GAAG,EAAE,CAAC;gBACT,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;gBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;YACJ,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;gBAC7D,CAAC;gBAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;oBACnC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;gBACJ,CAAC;gBAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;gBACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;YACxD,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,IAAI,CAAC,KAAK,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;oBACvC,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBACtC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;gBACJ,CAAC;gBAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;gBACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,IAAI,CAAC,EAAE,EAAE,CAAC;oBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;gBACnD,CAAC;gBACD,MAAM,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;gBAEpD,0BAA0B;gBAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;oBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;gBAC3D,CAAC;gBAED,uBAAuB;gBACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;oBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;gBACzD,CAAC;gBAED,gEAAgE;gBAChE,IAAI,gBAAgB,EAAE,CAAC;oBACrB,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;oBAC5D,MAAM,SAAS,GAAG,MAAM,OAAO,CAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;oBACtD,IAAI,CAAC,+BAA+B,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;OAGG;IACK,+BAA+B,CACrC,QAAoB,EACpB,KAAiB;QAEjB,IAAI,QAAQ,CAAC,MAAM,KAAK,KAAK,CAAC,MAAM,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACnE,CAAC;QACD,6EAA6E;QAC7E,IAAI,QAAQ,GAAG,CAAC,CAAC;QACjB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACzC,QAAQ,IAAI,QAAQ,CAAC,CAAC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;QACrC,CAAC;QACD,IAAI,QAAQ,KAAK,CAAC,EAAE,CAAC;YACnB,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAEO,0BAA0B,CAChC,KAAa,EACb,SAA2D,EAC3D,kBAAwE;QAExE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;gBACpC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;YACJ,CAAC;YAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;YACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,2BAA2B,CACvC,KAAa,EACb,SAA2D,EAC3D,kBAAwE,EACxE,gBAA+B;QAE/B,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;QAC3C,MAAM,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;QAC7C,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,MAAM,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;QAE1D,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;gBACvC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;YACJ,CAAC;YAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YACD,MAAM,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;YAEpD,0BAA0B;YAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;gBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,gEAAgE;YAChE,IAAI,gBAAgB,EAAE,CAAC;gBACrB,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;gBAC5D,MAAM,SAAS,GAAG,MAAM,OAAO,CAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;gBACtD,IAAI,CAAC,+BAA+B,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
310
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":"AAKA,OAAO,EACL,aAAa,EACb,UAAU,EACV,QAAQ,GAET,MAAM,cAAc,CAAC;AAMtB,OAAO,EACL,iBAAiB,EACjB,iBAAiB,GAClB,MAAM,6BAA6B,CAAC;AAUrC,OAAO,EAAE,aAAa,EAAE,MAAM,cAAc,CAAC;AAG7C,OAAO,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AAC/C,OAAO,EAAE,YAAY,EAAkB,MAAM,aAAa,CAAC;AAC3D,OAAO,EACL,gCAAgC,EAChC,gCAAgC,GACjC,MAAM,wBAAwB,CAAC;AAEhC,OAAO,EACL,oCAAoC,EACpC,uCAAuC,GACxC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAC;AAO9D;;;GAGG;AACH,SAAS,sBAAsB,CAAC,SAAiB,EAAE,WAAmB;IACpE,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,IAAI,SAAS,GAAG,QAAQ,EAAE,CAAC;QACzB,MAAM,IAAI,KAAK,CACb,cAAc,SAAS,kCAAkC,QAAQ,QAAQ,WAAW,yCAAyC,CAC9H,CAAC;IACJ,CAAC;AACH,CAAC;AAED,MAAM,OAAO,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAE7D,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,YAAY,CAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,+EAA+E;QAC/E,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,gCAAgC,CACpC,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,gBAAgB,CACjB,CAAC;QAEJ,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAKnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,qDAAqD;QACrD,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,gCAAgC,CACpC,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,OAAO,EACP,gBAAgB,CACjB,CAAC;QAEJ,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC,EACtC,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,iFAAiF;QACjF,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,gCAAgC,CACpC,gBAGE,EACF,IAAI,CAAC,SAAS,CACf,CAAC;QAEJ,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,gBAAgB,CAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,oBAAoB,CAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,aAAa,CAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,iBAAiB,CACjC,iBAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACuC,CAAC;IACjE,CAAC;IAEO,KAAK,CAAC,2BAA2B,CACvC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB,EAClB,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,MAAM,OAAO,GAGP,EAAE,CAAC;QAET,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,gBAAgB,EAAE,CAAC,EAAE,EAAE,CAAC;YAC1C,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,+DAA+D;gBAC/D,6FAA6F;gBAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;oBAC9B,MAAM,oCAAoC,CACxC,MAAM,CAAC,MAAM,EACb,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;gBACJ,CAAC;gBACD,OAAO,CAAC,IAAI,CACV,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAC9D,CAAC;YACJ,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,+DAA+D;gBAC/D,MAAM,mBAAmB,GAAiB,EAAE,CAAC;gBAC7C,MAAM,yBAAyB,GAAiB,EAAE,CAAC;gBACnD,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;oBACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;oBACtD,IAAI,QAAQ,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;wBACtC,mBAAmB,CAAC,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;wBAC5D,yBAAyB,CAAC,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;oBAChE,CAAC;yBAAM,CAAC;wBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,QAAQ,EAAE,IAAI,GAAG,CACrE,CAAC;oBACJ,CAAC;gBACH,CAAC;gBAED,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;gBAEF,MAAM,iBAAiB,GAAG,IAAI,CAAC,wBAAwB,CACrD,yBAAyB,EACzB,OAAO,CACR,CAAC;gBAEF,6FAA6F;gBAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;oBAC9B,MAAM,uCAAuC,CAC3C,MAAM,CAAC,MAAM,EACb,iBAAiB,EACjB,8BAA8B,EAC9B,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;gBACJ,CAAC;gBAED,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBAC1D,OAAO,CAAC,IAAI,CAAC;oBACX,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,UAAU,CAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,iBAAiB,CAAC,KAAK,EAAE,0BAA0B;4BAC3D,IAAI,EAAE,UAA8B;yBACrC;qBACqD;oBACxD,mBAAmB,EAAE,8BAA8B;oBACnD,qBAAqB;iBAItB,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,KAAK,CAAC,iCAAiC,CAC7C,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB,EAClB,eAAyB,EACzB,MAAmB;QAKnB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,gDAAgD;QAChD,mGAAmG;QACnG,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,CAAC,GAAG;gBACN,MAAM,IAAI,KAAK,CAAC,oDAAoD,CAAC,CAAC;YACxE,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;QACjC,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,+DAA+D;YAC/D,6FAA6F;YAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,oCAAoC,CACxC,MAAM,CAAC,MAAM,EACb,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YACD,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;YACzC,oEAAoE;YACpE,sEAAsE;YAEtE,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;YAE1D,+DAA+D;YAC/D,MAAM,mBAAmB,GAAiB,EAAE,CAAC;YAC7C,MAAM,yBAAyB,GAAiB,EAAE,CAAC;YACnD,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;gBACtC,IAAI,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC9D,MAAM,KAAK,GAAG,IAAI,CAAC,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC;oBACrD,mBAAmB,CAAC,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;oBACnD,yBAAyB,CAAC,IAAI,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;gBACvD,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,GAAG,CAC7F,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;YAEF,MAAM,iBAAiB,GAAG,IAAI,CAAC,wBAAwB,CACrD,yBAAyB,EACzB,OAAO,CACR,CAAC;YAEF,6FAA6F;YAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,uCAAuC,CAC3C,MAAM,CAAC,MAAM,EACb,iBAAiB,EACjB,8BAA8B,EAC9B,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YAED,OAAO;gBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;gBAClC,kBAAkB,EAAE;oBAClB,UAAU,EAAE;wBACV,KAAK,EAAE,UAAU,CAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iBAAiB,CAAC,KAAK,EAAE,0BAA0B;wBAC3D,IAAI,EAAE,UAA8B;qBACrC;iBACqD;gBACxD,mBAAmB,EAAE,8BAA8B;gBACnD,qBAAqB;aACgD,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;IACJ,CAAC;CACF"}
@@ -0,0 +1,58 @@
1
+ import type { Address } from 'viem';
2
+ import type { AttestedComputeRequest, AttestedComputeResponse, AttestedDecryptResponse, AttestedRevealResponse, DecryptionAttestation as ProtoDecryptionAttestation } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
3
+ import type { XwingKeypair } from '../lite/xwing.js';
4
+ /**
5
+ * Computes a canonical key for a single attestation.
6
+ * For plaintext/reencryption+keypair, the key is handle:hex(value).
7
+ * For reencryption without a keypair (XWing ciphertexts are non-deterministic),
8
+ * falls back to handle:op-type as a structural stand-in.
9
+ */
10
+ export declare function computeAttestationKey(att: ProtoDecryptionAttestation, reencryptKeypair?: XwingKeypair): Promise<string>;
11
+ /**
12
+ * Validates that all responses in a winning bucket have the same attestation
13
+ * count and types as the quorum-elected reference (bucket[0]).
14
+ */
15
+ export declare function validateDecryptResponseStructure<T extends AttestedDecryptResponse | AttestedRevealResponse>(bucket: Array<{
16
+ response: T;
17
+ signer: Address;
18
+ }>): void;
19
+ /**
20
+ * Validates that all responses in a winning bucket have a decryption
21
+ * attestation with the same case as the quorum-elected reference (bucket[0]),
22
+ * and that the case is consistent with the request's reencryptPubKey.
23
+ */
24
+ export declare function validateComputeResponseStructure(bucket: Array<{
25
+ response: AttestedComputeResponse;
26
+ signer: Address;
27
+ }>, request?: AttestedComputeRequest): void;
28
+ /**
29
+ * Verifies decrypt/reveal response consistency using hash-bucket voting.
30
+ * Collects all N responses, buckets them by content key, and returns the
31
+ * winning bucket (the first one with >= threshold votes).
32
+ *
33
+ * This is robust against a faulty first-responding node: even if responses[0]
34
+ * disagrees, a quorum of agreeing responses will form a winning bucket.
35
+ */
36
+ export declare function verifyDecryptResponseConsistency<T extends AttestedDecryptResponse | AttestedRevealResponse>(allResults: Array<{
37
+ response: T;
38
+ signer: Address;
39
+ }>, threshold: number, reencryptKeypair?: XwingKeypair): Promise<{
40
+ reference: T;
41
+ winningResults: Array<{
42
+ response: T;
43
+ signer: Address;
44
+ }>;
45
+ }>;
46
+ /**
47
+ * Verifies compute response consistency using hash-bucket voting.
48
+ */
49
+ export declare function verifyComputeResponseConsistency(allResults: Array<{
50
+ response: AttestedComputeResponse;
51
+ signer: Address;
52
+ }>, threshold: number, request?: AttestedComputeRequest, reencryptKeypair?: XwingKeypair): Promise<{
53
+ reference: AttestedComputeResponse;
54
+ winningResults: Array<{
55
+ response: AttestedComputeResponse;
56
+ signer: Address;
57
+ }>;
58
+ }>;