@inco/js 0.8.0-devnet-13 → 0.8.0-devnet-22
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +18 -76
- package/dist/cjs/advancedacl/session-key.d.ts +1 -1
- package/dist/cjs/advancedacl/session-key.js +3 -2
- package/dist/cjs/attestedcompute/attested-compute.js +5 -2
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +5 -1
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +14 -4
- package/dist/cjs/binary.d.ts +2 -4
- package/dist/cjs/binary.js +11 -6
- package/dist/cjs/encryption/index.d.ts +1 -1
- package/dist/cjs/encryption/index.js +17 -16
- package/dist/cjs/generated/abis/lightning.d.ts +70 -17
- package/dist/cjs/generated/abis/lightning.js +44 -19
- package/dist/cjs/generated/abis/test-elist.d.ts +10 -2
- package/dist/cjs/generated/abis/test-elist.js +8 -3
- package/dist/cjs/generated/abis/verifier.d.ts +78 -4
- package/dist/cjs/generated/abis/verifier.js +49 -4
- package/dist/cjs/generated/lightning.d.ts +60 -0
- package/dist/cjs/generated/lightning.js +64 -1
- package/dist/cjs/generated/local-node.d.ts +4 -4
- package/dist/cjs/generated/local-node.js +4 -4
- package/dist/cjs/index.d.ts +1 -1
- package/dist/cjs/index.js +11 -2
- package/dist/cjs/kms/quorumClient.d.ts +5 -13
- package/dist/cjs/kms/quorumClient.js +74 -259
- package/dist/cjs/kms/quorumConsistency.d.ts +58 -0
- package/dist/cjs/kms/quorumConsistency.js +200 -0
- package/dist/cjs/kms/signatureVerification.d.ts +35 -0
- package/dist/cjs/kms/signatureVerification.js +88 -0
- package/dist/cjs/kms/thresholdPromises.d.ts +4 -3
- package/dist/cjs/kms/thresholdPromises.js +25 -15
- package/dist/cjs/lite/hadu.d.ts +1 -1
- package/dist/cjs/lite/hadu.js +3 -3
- package/dist/cjs/lite/index.d.ts +0 -2
- package/dist/cjs/lite/index.js +1 -15
- package/dist/cjs/lite/lightning.d.ts +1 -1
- package/dist/cjs/lite/lightning.js +14 -33
- package/dist/esm/advancedacl/session-key.d.ts +1 -1
- package/dist/esm/advancedacl/session-key.js +3 -2
- package/dist/esm/attestedcompute/attested-compute.js +6 -3
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +5 -1
- package/dist/esm/attesteddecrypt/attested-decrypt.js +15 -5
- package/dist/esm/binary.d.ts +2 -4
- package/dist/esm/binary.js +11 -6
- package/dist/esm/encryption/index.d.ts +1 -1
- package/dist/esm/encryption/index.js +2 -2
- package/dist/esm/generated/abis/lightning.d.ts +70 -17
- package/dist/esm/generated/abis/lightning.js +44 -19
- package/dist/esm/generated/abis/test-elist.d.ts +10 -2
- package/dist/esm/generated/abis/test-elist.js +8 -3
- package/dist/esm/generated/abis/verifier.d.ts +78 -4
- package/dist/esm/generated/abis/verifier.js +49 -4
- package/dist/esm/generated/lightning.d.ts +60 -0
- package/dist/esm/generated/lightning.js +64 -1
- package/dist/esm/generated/local-node.d.ts +4 -4
- package/dist/esm/generated/local-node.js +4 -4
- package/dist/esm/index.d.ts +1 -1
- package/dist/esm/index.js +2 -2
- package/dist/esm/kms/quorumClient.d.ts +5 -13
- package/dist/esm/kms/quorumClient.js +74 -259
- package/dist/esm/kms/quorumConsistency.d.ts +58 -0
- package/dist/esm/kms/quorumConsistency.js +193 -0
- package/dist/esm/kms/signatureVerification.d.ts +35 -0
- package/dist/esm/kms/signatureVerification.js +84 -0
- package/dist/esm/kms/thresholdPromises.d.ts +4 -3
- package/dist/esm/kms/thresholdPromises.js +25 -15
- package/dist/esm/lite/hadu.d.ts +1 -1
- package/dist/esm/lite/hadu.js +2 -2
- package/dist/esm/lite/index.d.ts +0 -2
- package/dist/esm/lite/index.js +1 -3
- package/dist/esm/lite/lightning.d.ts +1 -1
- package/dist/esm/lite/lightning.js +8 -27
- package/dist/types/advancedacl/session-key.d.ts +1 -1
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +5 -1
- package/dist/types/binary.d.ts +2 -4
- package/dist/types/encryption/index.d.ts +1 -1
- package/dist/types/generated/abis/lightning.d.ts +70 -17
- package/dist/types/generated/abis/test-elist.d.ts +10 -2
- package/dist/types/generated/abis/verifier.d.ts +78 -4
- package/dist/types/generated/lightning.d.ts +60 -0
- package/dist/types/generated/local-node.d.ts +4 -4
- package/dist/types/index.d.ts +1 -1
- package/dist/types/kms/quorumClient.d.ts +5 -13
- package/dist/types/kms/quorumConsistency.d.ts +58 -0
- package/dist/types/kms/signatureVerification.d.ts +35 -0
- package/dist/types/kms/thresholdPromises.d.ts +4 -3
- package/dist/types/lite/hadu.d.ts +1 -1
- package/dist/types/lite/index.d.ts +0 -2
- package/dist/types/lite/lightning.d.ts +1 -1
- package/package.json +12 -12
|
@@ -2,9 +2,10 @@ import type { Address } from 'viem';
|
|
|
2
2
|
import type { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/types.js';
|
|
3
3
|
import type { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
4
4
|
import type { AttestedComputeRequest, AttestedDecryptRequest, AttestedRevealRequest } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
|
|
5
|
-
import type { XwingKeypair } from '../lite/
|
|
5
|
+
import type { XwingKeypair } from '../lite/xwing.js';
|
|
6
6
|
import type { BackoffConfig } from '../retry.js';
|
|
7
7
|
import { type KmsClient } from './client.js';
|
|
8
|
+
import type { ViemClient } from './signatureVerification.js';
|
|
8
9
|
export declare class KmsQuorumClient {
|
|
9
10
|
private readonly kmss;
|
|
10
11
|
private readonly threshold;
|
|
@@ -29,9 +30,9 @@ export declare class KmsQuorumClient {
|
|
|
29
30
|
* @throws {Error} If KMS clients array is empty or threshold is invalid
|
|
30
31
|
*/
|
|
31
32
|
static fromKmsClients(kmsClients: KmsClient[], threshold: number): KmsQuorumClient;
|
|
32
|
-
attestedDecrypt(request: AttestedDecryptRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
|
|
33
|
-
attestedCompute(request: AttestedComputeRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
|
|
34
|
-
attestedReveal(request: AttestedRevealRequest, backoffConfig?: Partial<BackoffConfig
|
|
33
|
+
attestedDecrypt(request: AttestedDecryptRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair, executorAddress?: Address, client?: ViemClient): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
|
|
34
|
+
attestedCompute(request: AttestedComputeRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair, executorAddress?: Address, client?: ViemClient): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
|
|
35
|
+
attestedReveal(request: AttestedRevealRequest, backoffConfig?: Partial<BackoffConfig>, executorAddress?: Address, client?: ViemClient): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
|
|
35
36
|
/**
|
|
36
37
|
* Generic method to execute a KMS operation across all clients with retry and threshold logic.
|
|
37
38
|
* Returns results with both the response and signer address.
|
|
@@ -48,13 +49,4 @@ export declare class KmsQuorumClient {
|
|
|
48
49
|
private buildPlaintextAttestation;
|
|
49
50
|
private buildAggregatedAttestations;
|
|
50
51
|
private buildAggregatedComputeAttestation;
|
|
51
|
-
private verifyResponseConsistency;
|
|
52
|
-
private verifyComputeResponseConsistency;
|
|
53
|
-
/**
|
|
54
|
-
* Verifies that two plaintext byte arrays are identical.
|
|
55
|
-
* Uses constant-time comparison to prevent timing side-channel attacks.
|
|
56
|
-
*/
|
|
57
|
-
private verifyPlaintextBytesConsistency;
|
|
58
|
-
private verifyPlaintextConsistency;
|
|
59
|
-
private verifyCiphertextConsistency;
|
|
60
52
|
}
|
|
@@ -1,18 +1,19 @@
|
|
|
1
1
|
import { bytesToBigInt, bytesToHex, parseHex, } from '../binary.js';
|
|
2
2
|
import { bigintToPlaintext, encryptionSchemes, } from '../encryption/encryption.js';
|
|
3
3
|
import { getHandleType } from '../handle.js';
|
|
4
|
-
import { decrypt } from '../lite/xwing.js';
|
|
5
4
|
import { retryWithBackoff } from '../retry.js';
|
|
6
5
|
import { getKmsClient } from './client.js';
|
|
6
|
+
import { verifyComputeResponseConsistency, verifyDecryptResponseConsistency, } from './quorumConsistency.js';
|
|
7
|
+
import { verifyPlaintextAttestationSignatures, verifyReencryptionAttestationSignatures, } from './signatureVerification.js';
|
|
7
8
|
import { executeWithThreshold } from './thresholdPromises.js';
|
|
8
9
|
/**
|
|
9
|
-
* Checks if the threshold is at least a majority of signers and
|
|
10
|
+
* Checks if the threshold is at least a majority of signers and throws an error if not.
|
|
11
|
+
* This is important to ensure that the quorum client provides the expected security guarantees.
|
|
10
12
|
*/
|
|
11
13
|
function checkMajorityThreshold(threshold, signerCount) {
|
|
12
14
|
const majority = Math.floor(signerCount / 2) + 1;
|
|
13
15
|
if (threshold < majority) {
|
|
14
|
-
|
|
15
|
-
`A threshold below majority weakens quorum security guarantees.`);
|
|
16
|
+
throw new Error(`Threshold (${threshold}) must be at least a majority (${majority}) of ${signerCount} signers to ensure security guarantees.`);
|
|
16
17
|
}
|
|
17
18
|
}
|
|
18
19
|
export class KmsQuorumClient {
|
|
@@ -68,7 +69,6 @@ export class KmsQuorumClient {
|
|
|
68
69
|
if (threshold < 1 || threshold > urls.length) {
|
|
69
70
|
throw new Error(`Threshold must be between 1 and ${urls.length} (number of URLs)`);
|
|
70
71
|
}
|
|
71
|
-
checkMajorityThreshold(threshold, urls.length);
|
|
72
72
|
const attesters = urls.map((url, index) => {
|
|
73
73
|
return { url, signer: signers[index] };
|
|
74
74
|
});
|
|
@@ -89,41 +89,31 @@ export class KmsQuorumClient {
|
|
|
89
89
|
if (threshold < 1 || threshold > kmsClients.length) {
|
|
90
90
|
throw new Error(`Threshold must be between 1 and ${kmsClients.length} (number of KMS clients)`);
|
|
91
91
|
}
|
|
92
|
-
checkMajorityThreshold(threshold, kmsClients.length);
|
|
93
92
|
return new KmsQuorumClient(kmsClients, threshold);
|
|
94
93
|
}
|
|
95
|
-
async attestedDecrypt(request, backoffConfig, reencryptKeypair) {
|
|
94
|
+
async attestedDecrypt(request, backoffConfig, reencryptKeypair, executorAddress, client) {
|
|
96
95
|
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
97
96
|
return await kms.client.attestedDecrypt(request);
|
|
98
97
|
}, backoffConfig);
|
|
99
|
-
// Extract responses and signers
|
|
100
|
-
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
101
|
-
const signers = thresholdResults.map((r) => r.signer);
|
|
102
98
|
// Verify that responses are consistent across quorum (plaintext or ciphertext)
|
|
103
|
-
const reference = await this.
|
|
104
|
-
return this.buildAggregatedAttestations(reference,
|
|
99
|
+
const { reference, winningResults } = await verifyDecryptResponseConsistency(thresholdResults, this.threshold, reencryptKeypair);
|
|
100
|
+
return this.buildAggregatedAttestations(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
|
|
105
101
|
}
|
|
106
|
-
async attestedCompute(request, backoffConfig, reencryptKeypair) {
|
|
102
|
+
async attestedCompute(request, backoffConfig, reencryptKeypair, executorAddress, client) {
|
|
107
103
|
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
108
104
|
return await kms.client.attestedCompute(request);
|
|
109
105
|
}, backoffConfig);
|
|
110
|
-
// Extract responses and signers
|
|
111
|
-
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
112
|
-
const signers = thresholdResults.map((r) => r.signer);
|
|
113
106
|
// Verify that responses are consistent across quorum
|
|
114
|
-
const reference = await
|
|
115
|
-
return this.buildAggregatedComputeAttestation(reference,
|
|
107
|
+
const { reference, winningResults } = await verifyComputeResponseConsistency(thresholdResults, this.threshold, request, reencryptKeypair);
|
|
108
|
+
return this.buildAggregatedComputeAttestation(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
|
|
116
109
|
}
|
|
117
|
-
async attestedReveal(request, backoffConfig) {
|
|
110
|
+
async attestedReveal(request, backoffConfig, executorAddress, client) {
|
|
118
111
|
const thresholdResults = await this.executeKmsOperationWithThreshold(async (kms) => {
|
|
119
112
|
return await kms.client.attestedReveal(request);
|
|
120
113
|
}, backoffConfig);
|
|
121
|
-
// Extract responses and signers
|
|
122
|
-
const thresholdResponses = thresholdResults.map((r) => r.response);
|
|
123
|
-
const signers = thresholdResults.map((r) => r.signer);
|
|
124
114
|
// Verify that responses are consistent across quorum (plaintext only for reveal)
|
|
125
|
-
const reference = await this.
|
|
126
|
-
return this.buildAggregatedAttestations(reference,
|
|
115
|
+
const { reference, winningResults } = await verifyDecryptResponseConsistency(thresholdResults, this.threshold);
|
|
116
|
+
return this.buildAggregatedAttestations(reference, winningResults.map((r) => r.response), winningResults.map((r) => r.signer), executorAddress, client);
|
|
127
117
|
}
|
|
128
118
|
/**
|
|
129
119
|
* Generic method to execute a KMS operation across all clients with retry and threshold logic.
|
|
@@ -186,9 +176,10 @@ export class KmsQuorumClient {
|
|
|
186
176
|
covalidatorSignatures,
|
|
187
177
|
};
|
|
188
178
|
}
|
|
189
|
-
buildAggregatedAttestations(reference, thresholdResponses, signers) {
|
|
179
|
+
async buildAggregatedAttestations(reference, thresholdResponses, signers, executorAddress, client) {
|
|
190
180
|
const attestationCount = reference.decryptionAttestations.length;
|
|
191
|
-
|
|
181
|
+
const results = [];
|
|
182
|
+
for (let i = 0; i < attestationCount; i++) {
|
|
192
183
|
const refAtt = reference.decryptionAttestations[i];
|
|
193
184
|
if (!refAtt.value) {
|
|
194
185
|
throw new Error('No value in attestation');
|
|
@@ -197,42 +188,56 @@ export class KmsQuorumClient {
|
|
|
197
188
|
const signatures = thresholdResponses.map((resp) => resp.decryptionAttestations[i].signature);
|
|
198
189
|
const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
|
|
199
190
|
if (refAtt.value.case === 'plaintext') {
|
|
200
|
-
|
|
191
|
+
// Verify covalidator signatures over the plaintext attestation
|
|
192
|
+
// executorAddress and client are only undefined when using a non-real client (e.g. in tests)
|
|
193
|
+
if (executorAddress && client) {
|
|
194
|
+
await verifyPlaintextAttestationSignatures(refAtt.handle, refAtt.value.value.value, covalidatorSignatures, executorAddress, client);
|
|
195
|
+
}
|
|
196
|
+
results.push(this.buildPlaintextAttestation(refAtt, covalidatorSignatures));
|
|
201
197
|
}
|
|
202
198
|
else if (refAtt.value.case === 'reencryption') {
|
|
203
|
-
// Collect encrypted signatures and
|
|
204
|
-
const encryptedSignatures =
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
199
|
+
// Collect per-covalidator encrypted signatures and ciphertexts
|
|
200
|
+
const encryptedSignatures = [];
|
|
201
|
+
const perCovalidatorCiphertexts = [];
|
|
202
|
+
for (const resp of thresholdResponses) {
|
|
203
|
+
const attValue = resp.decryptionAttestations[i].value;
|
|
204
|
+
if (attValue?.case === 'reencryption') {
|
|
205
|
+
encryptedSignatures.push(attValue.value.encryptedSignature);
|
|
206
|
+
perCovalidatorCiphertexts.push(attValue.value.userCiphertext);
|
|
208
207
|
}
|
|
209
208
|
else {
|
|
210
|
-
throw new Error(`Expected reencryption attestation but received '${
|
|
209
|
+
throw new Error(`Expected reencryption attestation but received '${attValue?.case}'`);
|
|
211
210
|
}
|
|
212
|
-
}
|
|
211
|
+
}
|
|
213
212
|
const encryptedCovalidatorSignatures = this.collectAndSortSignatures(encryptedSignatures, signers);
|
|
213
|
+
const sortedCiphertexts = this.collectAndSortSignatures(perCovalidatorCiphertexts, signers);
|
|
214
|
+
// executorAddress and client are only undefined when using a non-real client (e.g. in tests)
|
|
215
|
+
if (executorAddress && client) {
|
|
216
|
+
await verifyReencryptionAttestationSignatures(refAtt.handle, sortedCiphertexts, encryptedCovalidatorSignatures, covalidatorSignatures, executorAddress, client);
|
|
217
|
+
}
|
|
214
218
|
const reencryption = refAtt.value.value;
|
|
215
219
|
const ct = reencryption.userCiphertext;
|
|
216
|
-
const
|
|
217
|
-
|
|
220
|
+
const handleType = getHandleType(parseHex(refAtt.handle));
|
|
221
|
+
results.push({
|
|
218
222
|
handle: refAtt.handle,
|
|
219
223
|
encryptedPlaintext: {
|
|
220
224
|
ciphertext: {
|
|
221
225
|
value: bytesToHex(ct),
|
|
222
|
-
scheme:
|
|
223
|
-
type:
|
|
226
|
+
scheme: encryptionSchemes.xwing, // EncryptionScheme: XWING
|
|
227
|
+
type: handleType,
|
|
224
228
|
},
|
|
225
229
|
},
|
|
226
230
|
encryptedSignatures: encryptedCovalidatorSignatures,
|
|
227
231
|
covalidatorSignatures,
|
|
228
|
-
};
|
|
232
|
+
});
|
|
229
233
|
}
|
|
230
234
|
else {
|
|
231
235
|
throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
|
|
232
236
|
}
|
|
233
|
-
}
|
|
237
|
+
}
|
|
238
|
+
return results;
|
|
234
239
|
}
|
|
235
|
-
buildAggregatedComputeAttestation(reference, thresholdResponses, signers) {
|
|
240
|
+
async buildAggregatedComputeAttestation(reference, thresholdResponses, signers, executorAddress, client) {
|
|
236
241
|
const refAtt = reference.decryptionAttestation;
|
|
237
242
|
if (!refAtt) {
|
|
238
243
|
throw new Error('No decryption attestation in reference response');
|
|
@@ -241,43 +246,58 @@ export class KmsQuorumClient {
|
|
|
241
246
|
throw new Error('No value in reference attestation');
|
|
242
247
|
}
|
|
243
248
|
// Collect signatures and sort by signer address
|
|
244
|
-
//
|
|
249
|
+
// All responses are guaranteed to have decryption attestations by verifyComputeResponseConsistency
|
|
245
250
|
const signatures = [];
|
|
246
251
|
for (const resp of thresholdResponses) {
|
|
247
252
|
const att = resp.decryptionAttestation;
|
|
248
|
-
if (att)
|
|
249
|
-
|
|
250
|
-
|
|
253
|
+
if (!att)
|
|
254
|
+
throw new Error('Missing decryption attestation in winning response');
|
|
255
|
+
signatures.push(att.signature);
|
|
251
256
|
}
|
|
252
257
|
const covalidatorSignatures = this.collectAndSortSignatures(signatures, signers);
|
|
253
258
|
if (refAtt.value.case === 'plaintext') {
|
|
259
|
+
// Verify covalidator signatures over the plaintext attestation
|
|
260
|
+
// executorAddress and client are only undefined when using a non-real client (e.g. in tests)
|
|
261
|
+
if (executorAddress && client) {
|
|
262
|
+
await verifyPlaintextAttestationSignatures(refAtt.handle, refAtt.value.value.value, covalidatorSignatures, executorAddress, client);
|
|
263
|
+
}
|
|
254
264
|
return this.buildPlaintextAttestation(refAtt, covalidatorSignatures);
|
|
255
265
|
}
|
|
256
266
|
if (refAtt.value.case === 'reencryption') {
|
|
267
|
+
// Reencryption envelope signatures are verified per-covalidator via
|
|
268
|
+
// isValidReencryptionAttestation on-chain (each has a unique digest).
|
|
257
269
|
const reencryption = refAtt.value.value;
|
|
258
270
|
const ct = reencryption.userCiphertext;
|
|
259
271
|
if (!ct) {
|
|
260
272
|
throw new Error('No ciphertext in reencryption');
|
|
261
273
|
}
|
|
262
|
-
const
|
|
263
|
-
// Collect encrypted signatures and
|
|
264
|
-
const encryptedSignatures =
|
|
274
|
+
const handleType = getHandleType(parseHex(refAtt.handle));
|
|
275
|
+
// Collect per-covalidator encrypted signatures and ciphertexts
|
|
276
|
+
const encryptedSignatures = [];
|
|
277
|
+
const perCovalidatorCiphertexts = [];
|
|
278
|
+
for (const resp of thresholdResponses) {
|
|
265
279
|
if (resp.decryptionAttestation?.value.case === 'reencryption') {
|
|
266
|
-
const
|
|
267
|
-
|
|
280
|
+
const reenc = resp.decryptionAttestation.value.value;
|
|
281
|
+
encryptedSignatures.push(reenc.encryptedSignature);
|
|
282
|
+
perCovalidatorCiphertexts.push(reenc.userCiphertext);
|
|
268
283
|
}
|
|
269
284
|
else {
|
|
270
285
|
throw new Error(`Expected reencryption attestation but received '${resp.decryptionAttestation?.value.case}'`);
|
|
271
286
|
}
|
|
272
|
-
}
|
|
287
|
+
}
|
|
273
288
|
const encryptedCovalidatorSignatures = this.collectAndSortSignatures(encryptedSignatures, signers);
|
|
289
|
+
const sortedCiphertexts = this.collectAndSortSignatures(perCovalidatorCiphertexts, signers);
|
|
290
|
+
// executorAddress and client are only undefined when using a non-real client (e.g. in tests)
|
|
291
|
+
if (executorAddress && client) {
|
|
292
|
+
await verifyReencryptionAttestationSignatures(refAtt.handle, sortedCiphertexts, encryptedCovalidatorSignatures, covalidatorSignatures, executorAddress, client);
|
|
293
|
+
}
|
|
274
294
|
return {
|
|
275
295
|
handle: refAtt.handle,
|
|
276
296
|
encryptedPlaintext: {
|
|
277
297
|
ciphertext: {
|
|
278
298
|
value: bytesToHex(ct),
|
|
279
|
-
scheme: encryptionSchemes.xwing, // EncryptionScheme:
|
|
280
|
-
type:
|
|
299
|
+
scheme: encryptionSchemes.xwing, // EncryptionScheme: XWING
|
|
300
|
+
type: handleType,
|
|
281
301
|
},
|
|
282
302
|
},
|
|
283
303
|
encryptedSignatures: encryptedCovalidatorSignatures,
|
|
@@ -286,210 +306,5 @@ export class KmsQuorumClient {
|
|
|
286
306
|
}
|
|
287
307
|
throw new Error(`Unexpected attestation type: ${refAtt.value.case}, expected 'plaintext' or 'reencryption'`);
|
|
288
308
|
}
|
|
289
|
-
async verifyResponseConsistency(thresholdResponses, reencryptKeypair) {
|
|
290
|
-
if (thresholdResponses.length === 0) {
|
|
291
|
-
throw new Error('No responses collected to verify');
|
|
292
|
-
}
|
|
293
|
-
const reference = thresholdResponses[0];
|
|
294
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
295
|
-
if (thresholdResponses[r].decryptionAttestations.length !==
|
|
296
|
-
reference.decryptionAttestations.length) {
|
|
297
|
-
throw new Error('Inconsistent number of decryption attestations across KMS responses');
|
|
298
|
-
}
|
|
299
|
-
}
|
|
300
|
-
for (let i = 0; i < reference.decryptionAttestations.length; i++) {
|
|
301
|
-
const refAtt = reference.decryptionAttestations[i];
|
|
302
|
-
if (!refAtt.value) {
|
|
303
|
-
throw new Error('No value in reference attestation');
|
|
304
|
-
}
|
|
305
|
-
const refCase = refAtt.value.case;
|
|
306
|
-
// Verify that all responses have the same case (plaintext or reencryption)
|
|
307
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
308
|
-
const att = thresholdResponses[r].decryptionAttestations[i];
|
|
309
|
-
if (!att.value) {
|
|
310
|
-
throw new Error('No value in attestation');
|
|
311
|
-
}
|
|
312
|
-
if (att.value.case !== refCase) {
|
|
313
|
-
throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
|
|
314
|
-
}
|
|
315
|
-
}
|
|
316
|
-
// Verify consistency based on the case
|
|
317
|
-
if (refCase === 'plaintext') {
|
|
318
|
-
this.verifyPlaintextConsistency(i, reference, thresholdResponses);
|
|
319
|
-
}
|
|
320
|
-
else if (refCase === 'reencryption') {
|
|
321
|
-
await this.verifyCiphertextConsistency(i, reference, thresholdResponses, reencryptKeypair);
|
|
322
|
-
}
|
|
323
|
-
else {
|
|
324
|
-
throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
|
|
325
|
-
}
|
|
326
|
-
}
|
|
327
|
-
return reference;
|
|
328
|
-
}
|
|
329
|
-
async verifyComputeResponseConsistency(thresholdResponses, request, reencryptKeypair) {
|
|
330
|
-
if (thresholdResponses.length === 0) {
|
|
331
|
-
throw new Error('No responses collected to verify');
|
|
332
|
-
}
|
|
333
|
-
const reference = thresholdResponses[0];
|
|
334
|
-
const refAtt = reference.decryptionAttestation;
|
|
335
|
-
if (!refAtt) {
|
|
336
|
-
throw new Error('No decryption attestation in reference response');
|
|
337
|
-
}
|
|
338
|
-
if (!refAtt.value) {
|
|
339
|
-
throw new Error('No value in reference attestation');
|
|
340
|
-
}
|
|
341
|
-
const refCase = refAtt.value.case;
|
|
342
|
-
// Precompute reference values based on the case
|
|
343
|
-
let refBytes;
|
|
344
|
-
let refReencryption;
|
|
345
|
-
let refCt;
|
|
346
|
-
let refFheType;
|
|
347
|
-
if (refCase === 'plaintext') {
|
|
348
|
-
refBytes = refAtt.value.value.value;
|
|
349
|
-
}
|
|
350
|
-
else if (refCase === 'reencryption') {
|
|
351
|
-
refReencryption = refAtt.value.value;
|
|
352
|
-
refCt = refReencryption.userCiphertext;
|
|
353
|
-
if (!refCt) {
|
|
354
|
-
throw new Error('No ciphertext in reference reencryption');
|
|
355
|
-
}
|
|
356
|
-
refFheType = getHandleType(parseHex(refAtt.handle));
|
|
357
|
-
}
|
|
358
|
-
else {
|
|
359
|
-
throw new Error(`Unexpected attestation type: ${refCase}, expected 'plaintext' or 'reencryption'`);
|
|
360
|
-
}
|
|
361
|
-
// If no reencryptPubKey is provided in the request (or it's empty), reject reencryption attestations
|
|
362
|
-
const hasReencryptPubKey = request?.reencryptPubKey && request.reencryptPubKey.length > 0;
|
|
363
|
-
if (refCase === 'reencryption' && !hasReencryptPubKey) {
|
|
364
|
-
throw new Error("Unexpected attestation type: reencryption, expected 'plaintext'");
|
|
365
|
-
}
|
|
366
|
-
// Verify that all responses have a decryption attestation and are consistent
|
|
367
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
368
|
-
const att = thresholdResponses[r].decryptionAttestation;
|
|
369
|
-
if (!att) {
|
|
370
|
-
throw new Error('No decryption attestation in response');
|
|
371
|
-
}
|
|
372
|
-
if (!att.value) {
|
|
373
|
-
throw new Error('No value in attestation');
|
|
374
|
-
}
|
|
375
|
-
if (att.value.case !== refCase) {
|
|
376
|
-
throw new Error(`Inconsistent attestation types: reference has '${refCase}' but response ${r} has '${att.value.case}'`);
|
|
377
|
-
}
|
|
378
|
-
// Verify handles match
|
|
379
|
-
if (att.handle !== refAtt.handle) {
|
|
380
|
-
throw new Error('Handles differ across KMS responses');
|
|
381
|
-
}
|
|
382
|
-
// Verify consistency based on the case
|
|
383
|
-
if (refCase === 'plaintext') {
|
|
384
|
-
if (!refBytes) {
|
|
385
|
-
throw new Error('No reference plaintext bytes to compare');
|
|
386
|
-
}
|
|
387
|
-
if (att.value.case !== 'plaintext') {
|
|
388
|
-
throw new Error('Expected plaintext attestation but received non-plaintext');
|
|
389
|
-
}
|
|
390
|
-
const bytes = att.value.value.value;
|
|
391
|
-
this.verifyPlaintextBytesConsistency(refBytes, bytes);
|
|
392
|
-
}
|
|
393
|
-
else if (refCase === 'reencryption') {
|
|
394
|
-
if (!refCt || refFheType === undefined) {
|
|
395
|
-
throw new Error('No reference reencryption data to compare');
|
|
396
|
-
}
|
|
397
|
-
if (att.value.case !== 'reencryption') {
|
|
398
|
-
throw new Error('Expected reencryption attestation but received non-reencryption');
|
|
399
|
-
}
|
|
400
|
-
const reencryption = att.value.value;
|
|
401
|
-
const ct = reencryption.userCiphertext;
|
|
402
|
-
if (!ct) {
|
|
403
|
-
throw new Error('No ciphertext in reencryption');
|
|
404
|
-
}
|
|
405
|
-
const fheType = getHandleType(parseHex(att.handle));
|
|
406
|
-
// Verify FHE type matches
|
|
407
|
-
if (fheType !== refFheType) {
|
|
408
|
-
throw new Error('FHE types differ across KMS responses');
|
|
409
|
-
}
|
|
410
|
-
// Verify handles match
|
|
411
|
-
if (att.handle !== refAtt.handle) {
|
|
412
|
-
throw new Error('Handles differ across KMS responses');
|
|
413
|
-
}
|
|
414
|
-
// If keypair provided, decrypt and verify plaintext consistency
|
|
415
|
-
if (reencryptKeypair) {
|
|
416
|
-
const refPlaintext = await decrypt(reencryptKeypair, refCt);
|
|
417
|
-
const plaintext = await decrypt(reencryptKeypair, ct);
|
|
418
|
-
this.verifyPlaintextBytesConsistency(refPlaintext, plaintext);
|
|
419
|
-
}
|
|
420
|
-
}
|
|
421
|
-
}
|
|
422
|
-
return reference;
|
|
423
|
-
}
|
|
424
|
-
/**
|
|
425
|
-
* Verifies that two plaintext byte arrays are identical.
|
|
426
|
-
* Uses constant-time comparison to prevent timing side-channel attacks.
|
|
427
|
-
*/
|
|
428
|
-
verifyPlaintextBytesConsistency(refBytes, bytes) {
|
|
429
|
-
if (refBytes.length !== bytes.length) {
|
|
430
|
-
throw new Error('Plaintexts length differ across KMS responses');
|
|
431
|
-
}
|
|
432
|
-
// Compare all bytes before deciding to throw, preventing timing side-channel
|
|
433
|
-
let mismatch = 0;
|
|
434
|
-
for (let b = 0; b < refBytes.length; b++) {
|
|
435
|
-
mismatch |= refBytes[b] ^ bytes[b];
|
|
436
|
-
}
|
|
437
|
-
if (mismatch !== 0) {
|
|
438
|
-
throw new Error('Plaintexts differ across KMS responses');
|
|
439
|
-
}
|
|
440
|
-
}
|
|
441
|
-
verifyPlaintextConsistency(index, reference, thresholdResponses) {
|
|
442
|
-
const refAtt = reference.decryptionAttestations[index];
|
|
443
|
-
if (refAtt.value?.case !== 'plaintext') {
|
|
444
|
-
throw new Error('Expected plaintext attestation');
|
|
445
|
-
}
|
|
446
|
-
const refBytes = refAtt.value.value.value;
|
|
447
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
448
|
-
const att = thresholdResponses[r].decryptionAttestations[index];
|
|
449
|
-
if (att.value?.case !== 'plaintext') {
|
|
450
|
-
throw new Error('Expected plaintext attestation but received non-plaintext');
|
|
451
|
-
}
|
|
452
|
-
const bytes = att.value.value.value;
|
|
453
|
-
this.verifyPlaintextBytesConsistency(refBytes, bytes);
|
|
454
|
-
}
|
|
455
|
-
}
|
|
456
|
-
async verifyCiphertextConsistency(index, reference, thresholdResponses, reencryptKeypair) {
|
|
457
|
-
const refAtt = reference.decryptionAttestations[index];
|
|
458
|
-
if (refAtt.value?.case !== 'reencryption') {
|
|
459
|
-
throw new Error('Expected reencryption attestation');
|
|
460
|
-
}
|
|
461
|
-
const refReencryption = refAtt.value.value;
|
|
462
|
-
const refCt = refReencryption.userCiphertext;
|
|
463
|
-
if (!refCt) {
|
|
464
|
-
throw new Error('No ciphertext in reference reencryption');
|
|
465
|
-
}
|
|
466
|
-
const refFheType = getHandleType(parseHex(refAtt.handle));
|
|
467
|
-
for (let r = 1; r < thresholdResponses.length; r++) {
|
|
468
|
-
const att = thresholdResponses[r].decryptionAttestations[index];
|
|
469
|
-
if (att.value?.case !== 'reencryption') {
|
|
470
|
-
throw new Error('Expected reencryption attestation but received non-reencryption');
|
|
471
|
-
}
|
|
472
|
-
const reencryption = att.value.value;
|
|
473
|
-
const ct = reencryption.userCiphertext;
|
|
474
|
-
if (!ct) {
|
|
475
|
-
throw new Error('No ciphertext in reencryption');
|
|
476
|
-
}
|
|
477
|
-
const fheType = getHandleType(parseHex(att.handle));
|
|
478
|
-
// Verify FHE type matches
|
|
479
|
-
if (fheType !== refFheType) {
|
|
480
|
-
throw new Error('FHE types differ across KMS responses');
|
|
481
|
-
}
|
|
482
|
-
// Verify handles match
|
|
483
|
-
if (att.handle !== refAtt.handle) {
|
|
484
|
-
throw new Error('Handles differ across KMS responses');
|
|
485
|
-
}
|
|
486
|
-
// If keypair provided, decrypt and verify plaintext consistency
|
|
487
|
-
if (reencryptKeypair) {
|
|
488
|
-
const refPlaintext = await decrypt(reencryptKeypair, refCt);
|
|
489
|
-
const plaintext = await decrypt(reencryptKeypair, ct);
|
|
490
|
-
this.verifyPlaintextBytesConsistency(refPlaintext, plaintext);
|
|
491
|
-
}
|
|
492
|
-
}
|
|
493
|
-
}
|
|
494
309
|
}
|
|
495
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":"AAKA,OAAO,EACL,aAAa,EACb,UAAU,EACV,QAAQ,GAET,MAAM,cAAc,CAAC;AAMtB,OAAO,EACL,iBAAiB,EACjB,iBAAiB,GAClB,MAAM,6BAA6B,CAAC;AAUrC,OAAO,EAAE,aAAa,EAAE,MAAM,cAAc,CAAC;AAE7C,OAAO,EAAE,OAAO,EAAE,MAAM,kBAAkB,CAAC;AAE3C,OAAO,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AAC/C,OAAO,EAAE,YAAY,EAAkB,MAAM,aAAa,CAAC;AAC3D,OAAO,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAC;AAO9D;;GAEG;AACH,SAAS,sBAAsB,CAAC,SAAiB,EAAE,WAAmB;IACpE,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,IAAI,SAAS,GAAG,QAAQ,EAAE,CAAC;QACzB,OAAO,CAAC,IAAI,CACV,gCAAgC,SAAS,4BAA4B,QAAQ,QAAQ,WAAW,YAAY;YAC1G,gEAAgE,CACnE,CAAC;IACJ,CAAC;AACH,CAAC;AAED,MAAM,OAAO,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAE7D,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,YAAY,CAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;QAE/C,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC;QAErD,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B;QAO/B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,+EAA+E;QAC/E,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,yBAAyB,CACpD,kBAAkB,EAClB,gBAAgB,CACjB,CAAC;QAEF,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B;QAK/B,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAmC,CAC7C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,qDAAqD;QACrD,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAC3D,kBAAkB,EAClB,OAAO,EACP,gBAAgB,CACjB,CAAC;QAEF,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC;QAOtC,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,gCAAgC;QAChC,MAAM,kBAAkB,GAAG,gBAAgB,CAAC,GAAG,CAC7C,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAkC,CAC5C,CAAC;QACF,MAAM,OAAO,GAAG,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;QAEtD,iFAAiF;QACjF,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,yBAAyB,CAAC,kBAAkB,CAAC,CAAC;QAE3E,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,kBAAkB,EAClB,OAAO,CACR,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,gBAAgB,CAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,oBAAoB,CAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,aAAa,CAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,iBAAiB,CACjC,iBAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACuC,CAAC;IACjE,CAAC;IAEO,2BAA2B,CACjC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB;QAKlB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,OAAO,IAAI,KAAK,CAAC,gBAAgB,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAC9D,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;YACvE,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,0DAA0D;gBAC1D,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;oBAC1D,IAAI,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACjE,MAAM,YAAY,GAAG,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC;wBAChE,OAAO,YAAY,CAAC,kBAAkB,CAAC;oBACzC,CAAC;yBAAM,CAAC;wBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,GAAG,CAChG,CAAC;oBACJ,CAAC;gBACH,CAAC,CAAC,CAAC;gBAEH,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;gBAEF,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBACvD,OAAO;oBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,UAAU,CAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,CAAC,EAAE,0BAA0B;4BACrC,IAAI,EAAE,OAAO;yBACd;qBACqD;oBACxD,mBAAmB,EAAE,8BAA8B;oBACnD,qBAAqB;iBACgD,CAAC;YAC1E,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC,CAAC,CAAC;IACL,CAAC;IAEO,iCAAiC,CACvC,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB;QAIlB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,gDAAgD;QAChD,2FAA2F;QAC3F,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,GAAG,EAAE,CAAC;gBACR,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;YACjC,CAAC;QACH,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;YACzC,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;YAEvD,0DAA0D;YAC1D,MAAM,mBAAmB,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE;gBAC1D,IAAI,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC9D,MAAM,YAAY,GAAG,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,KAAK,CAAC;oBAC7D,OAAO,YAAY,CAAC,kBAAkB,CAAC;gBACzC,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,GAAG,CAC7F,CAAC;gBACJ,CAAC;YACH,CAAC,CAAC,CAAC;YAEH,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;YAEF,OAAO;gBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;gBAClC,kBAAkB,EAAE;oBAClB,UAAU,EAAE;wBACV,KAAK,EAAE,UAAU,CAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iBAAiB,CAAC,KAAK,EAAE,0BAA0B;wBAC3D,IAAI,EAAE,OAAO;qBACd;iBACqD;gBACxD,mBAAmB,EAAE,8BAA8B;gBACnD,qBAAqB;aACgD,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,yBAAyB,CACrC,kBAAwE,EACxE,gBAA+B;QAE/B,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QAExC,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,IACE,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,MAAM;gBACnD,SAAS,CAAC,sBAAsB,CAAC,MAAM,EACvC,CAAC;gBACD,MAAM,IAAI,KAAK,CACb,qEAAqE,CACtE,CAAC;YACJ,CAAC;QACH,CAAC;QAED,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACjE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YAEnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;YACvD,CAAC;YAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;YAElC,2EAA2E;YAC3E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;gBACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;gBAC5D,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;oBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;gBAC7C,CAAC;gBACD,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,0BAA0B,CAAC,CAAC,EAAE,SAAS,EAAE,kBAAkB,CAAC,CAAC;YACpE,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,MAAM,IAAI,CAAC,2BAA2B,CACpC,CAAC,EACD,SAAS,EACT,kBAAkB,EAClB,gBAAgB,CACjB,CAAC;YACJ,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAEO,KAAK,CAAC,gCAAgC,CAC5C,kBAA6C,EAC7C,OAAgC,EAChC,gBAA+B;QAE/B,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;QACtD,CAAC;QAED,MAAM,SAAS,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC;QACxC,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAE/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC;QAElC,gDAAgD;QAChD,IAAI,QAAgC,CAAC;QACrC,IAAI,eAAgC,CAAC;QACrC,IAAI,KAA6B,CAAC;QAClC,IAAI,UAAwD,CAAC;QAE7D,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;YAC5B,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QACtC,CAAC;aAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;YACtC,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,KAAK,EAAE,CAAC;gBACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;YAC7D,CAAC;YAED,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;QACtD,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,KAAK,CACb,gCAAgC,OAAO,0CAA0C,CAClF,CAAC;QACJ,CAAC;QAED,qGAAqG;QACrG,MAAM,kBAAkB,GACtB,OAAO,EAAE,eAAe,IAAI,OAAO,CAAC,eAAe,CAAC,MAAM,GAAG,CAAC,CAAC;QACjE,IAAI,OAAO,KAAK,cAAc,IAAI,CAAC,kBAAkB,EAAE,CAAC;YACtD,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;QACJ,CAAC;QAED,6EAA6E;QAC7E,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,qBAAqB,CAAC;YACxD,IAAI,CAAC,GAAG,EAAE,CAAC;gBACT,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,OAAO,EAAE,CAAC;gBAC/B,MAAM,IAAI,KAAK,CACb,kDAAkD,OAAO,kBAAkB,CAAC,SAAS,GAAG,CAAC,KAAK,CAAC,IAAI,GAAG,CACvG,CAAC;YACJ,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,uCAAuC;YACvC,IAAI,OAAO,KAAK,WAAW,EAAE,CAAC;gBAC5B,IAAI,CAAC,QAAQ,EAAE,CAAC;oBACd,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;gBAC7D,CAAC;gBAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;oBACnC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;gBACJ,CAAC;gBAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;gBACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;YACxD,CAAC;iBAAM,IAAI,OAAO,KAAK,cAAc,EAAE,CAAC;gBACtC,IAAI,CAAC,KAAK,IAAI,UAAU,KAAK,SAAS,EAAE,CAAC;oBACvC,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;gBAC/D,CAAC;gBAED,IAAI,GAAG,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBACtC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;gBACJ,CAAC;gBAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;gBACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,IAAI,CAAC,EAAE,EAAE,CAAC;oBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;gBACnD,CAAC;gBACD,MAAM,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;gBAEpD,0BAA0B;gBAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;oBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;gBAC3D,CAAC;gBAED,uBAAuB;gBACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;oBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;gBACzD,CAAC;gBAED,gEAAgE;gBAChE,IAAI,gBAAgB,EAAE,CAAC;oBACrB,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;oBAC5D,MAAM,SAAS,GAAG,MAAM,OAAO,CAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;oBACtD,IAAI,CAAC,+BAA+B,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;gBAChE,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;OAGG;IACK,+BAA+B,CACrC,QAAoB,EACpB,KAAiB;QAEjB,IAAI,QAAQ,CAAC,MAAM,KAAK,KAAK,CAAC,MAAM,EAAE,CAAC;YACrC,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;QACnE,CAAC;QACD,6EAA6E;QAC7E,IAAI,QAAQ,GAAG,CAAC,CAAC;QACjB,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACzC,QAAQ,IAAI,QAAQ,CAAC,CAAC,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;QACrC,CAAC;QACD,IAAI,QAAQ,KAAK,CAAC,EAAE,CAAC;YACnB,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;QAC5D,CAAC;IACH,CAAC;IAEO,0BAA0B,CAChC,KAAa,EACb,SAA2D,EAC3D,kBAAwE;QAExE,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,WAAW,EAAE,CAAC;gBACpC,MAAM,IAAI,KAAK,CACb,2DAA2D,CAC5D,CAAC;YACJ,CAAC;YAED,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;YACpC,IAAI,CAAC,+BAA+B,CAAC,QAAQ,EAAE,KAAK,CAAC,CAAC;QACxD,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,2BAA2B,CACvC,KAAa,EACb,SAA2D,EAC3D,kBAAwE,EACxE,gBAA+B;QAE/B,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;QACvD,IAAI,MAAM,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;YAC1C,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,MAAM,eAAe,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;QAC3C,MAAM,KAAK,GAAG,eAAe,CAAC,cAAc,CAAC;QAC7C,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;QAC7D,CAAC;QAED,MAAM,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;QAE1D,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACnD,MAAM,GAAG,GAAG,kBAAkB,CAAC,CAAC,CAAC,CAAC,sBAAsB,CAAC,KAAK,CAAC,CAAC;YAChE,IAAI,GAAG,CAAC,KAAK,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;gBACvC,MAAM,IAAI,KAAK,CACb,iEAAiE,CAClE,CAAC;YACJ,CAAC;YAED,MAAM,YAAY,GAAG,GAAG,CAAC,KAAK,CAAC,KAAK,CAAC;YACrC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YACD,MAAM,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC;YAEpD,0BAA0B;YAC1B,IAAI,OAAO,KAAK,UAAU,EAAE,CAAC;gBAC3B,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;YAC3D,CAAC;YAED,uBAAuB;YACvB,IAAI,GAAG,CAAC,MAAM,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC;gBACjC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACzD,CAAC;YAED,gEAAgE;YAChE,IAAI,gBAAgB,EAAE,CAAC;gBACrB,MAAM,YAAY,GAAG,MAAM,OAAO,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;gBAC5D,MAAM,SAAS,GAAG,MAAM,OAAO,CAAC,gBAAgB,EAAE,EAAE,CAAC,CAAC;gBACtD,IAAI,CAAC,+BAA+B,CAAC,YAAY,EAAE,SAAS,CAAC,CAAC;YAChE,CAAC;QACH,CAAC;IACH,CAAC;CACF"}
|
|
310
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"quorumClient.js","sourceRoot":"","sources":["../../../src/kms/quorumClient.ts"],"names":[],"mappings":"AAKA,OAAO,EACL,aAAa,EACb,UAAU,EACV,QAAQ,GAET,MAAM,cAAc,CAAC;AAMtB,OAAO,EACL,iBAAiB,EACjB,iBAAiB,GAClB,MAAM,6BAA6B,CAAC;AAUrC,OAAO,EAAE,aAAa,EAAE,MAAM,cAAc,CAAC;AAG7C,OAAO,EAAE,gBAAgB,EAAE,MAAM,aAAa,CAAC;AAC/C,OAAO,EAAE,YAAY,EAAkB,MAAM,aAAa,CAAC;AAC3D,OAAO,EACL,gCAAgC,EAChC,gCAAgC,GACjC,MAAM,wBAAwB,CAAC;AAEhC,OAAO,EACL,oCAAoC,EACpC,uCAAuC,GACxC,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAC;AAO9D;;;GAGG;AACH,SAAS,sBAAsB,CAAC,SAAiB,EAAE,WAAmB;IACpE,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,GAAG,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,IAAI,SAAS,GAAG,QAAQ,EAAE,CAAC;QACzB,MAAM,IAAI,KAAK,CACb,cAAc,SAAS,kCAAkC,QAAQ,QAAQ,WAAW,yCAAyC,CAC9H,CAAC;IACJ,CAAC;AACH,CAAC;AAED,MAAM,OAAO,eAAe;IACT,IAAI,CAAQ;IACZ,SAAS,CAAS;IAQnC,iBAAiB;IACjB,YACE,kBAAoE,EACpE,SAAiB;QAEjB,IAAI,kBAAkB,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,kBAAkB,CAAC,MAAM,EAAE,CAAC;YAC3D,MAAM,IAAI,KAAK,CACb,mCAAmC,kBAAkB,CAAC,MAAM,EAAE,CAC/D,CAAC;QACJ,CAAC;QAED,sBAAsB,CAAC,SAAS,EAAE,kBAAkB,CAAC,MAAM,CAAC,CAAC;QAE7D,2FAA2F;QAC3F,IACE,kBAAkB,CAAC,MAAM,GAAG,CAAC;YAC7B,iBAAiB,IAAI,kBAAkB,CAAC,CAAC,CAAC,EAC1C,CAAC;YACD,0BAA0B;YAC1B,MAAM,UAAU,GAAG,kBAAiC,CAAC;YACrD,IAAI,CAAC,IAAI,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;gBACtC,MAAM;gBACN,MAAM,EAAE,MAAM,CAAC,aAAa;aAC7B,CAAC,CAAC,CAAC;QACN,CAAC;aAAM,CAAC;YACN,iDAAiD;YACjD,MAAM,SAAS,GAAG,kBAGf,CAAC;YACJ,IAAI,CAAC,IAAI,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC,QAAQ,EAAE,EAAE;gBACrC,OAAO;oBACL,MAAM,EAAE,YAAY,CAAC,QAAQ,CAAC,GAAG,EAAE,QAAQ,CAAC,MAAM,CAAC;oBACnD,MAAM,EAAE,QAAQ,CAAC,MAAM;iBACxB,CAAC;YACJ,CAAC,CAAC,CAAC;QACL,CAAC;QACD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAC;IAC7B,CAAC;IAED;;;;;;;;OAQG;IACH,MAAM,CAAC,QAAQ,CACb,IAAc,EACd,OAAkB,EAClB,SAAiB;QAEjB,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YACtB,MAAM,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC;QAClD,CAAC;QACD,IAAI,OAAO,CAAC,MAAM,KAAK,IAAI,CAAC,MAAM,EAAE,CAAC;YACnC,MAAM,IAAI,KAAK,CACb,yBAAyB,OAAO,CAAC,MAAM,mCAAmC,IAAI,CAAC,MAAM,GAAG,CACzF,CAAC;QACJ,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;YAC7C,MAAM,IAAI,KAAK,CACb,mCAAmC,IAAI,CAAC,MAAM,mBAAmB,CAClE,CAAC;QACJ,CAAC;QAED,MAAM,SAAS,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,KAAK,EAAE,EAAE;YACxC,OAAO,EAAE,GAAG,EAAE,MAAM,EAAE,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,OAAO,IAAI,eAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IACnD,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,cAAc,CACnB,UAAuB,EACvB,SAAiB;QAEjB,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;QAED,IAAI,SAAS,GAAG,CAAC,IAAI,SAAS,GAAG,UAAU,CAAC,MAAM,EAAE,CAAC;YACnD,MAAM,IAAI,KAAK,CACb,mCAAmC,UAAU,CAAC,MAAM,0BAA0B,CAC/E,CAAC;QACJ,CAAC;QAED,OAAO,IAAI,eAAe,CAAC,UAAU,EAAE,SAAS,CAAC,CAAC;IACpD,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,+EAA+E;QAC/E,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,gCAAgC,CACpC,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,gBAAgB,CACjB,CAAC;QAEJ,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,eAAe,CACnB,OAA+B,EAC/B,aAAsC,EACtC,gBAA+B,EAC/B,eAAyB,EACzB,MAAmB;QAKnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,eAAe,CAAC,OAAO,CAAC,CAAC;QACnD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,qDAAqD;QACrD,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,gCAAgC,CACpC,gBAGE,EACF,IAAI,CAAC,SAAS,EACd,OAAO,EACP,gBAAgB,CACjB,CAAC;QAEJ,OAAO,IAAI,CAAC,iCAAiC,CAC3C,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED,KAAK,CAAC,cAAc,CAClB,OAA8B,EAC9B,aAAsC,EACtC,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAClE,KAAK,EAAE,GAAG,EAAE,EAAE;YACZ,OAAO,MAAM,GAAG,CAAC,MAAM,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAClD,CAAC,EACD,aAAa,CACd,CAAC;QAEF,iFAAiF;QACjF,MAAM,EAAE,SAAS,EAAE,cAAc,EAAE,GACjC,MAAM,gCAAgC,CACpC,gBAGE,EACF,IAAI,CAAC,SAAS,CACf,CAAC;QAEJ,OAAO,IAAI,CAAC,2BAA2B,CACrC,SAAS,EACT,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,EACrC,cAAc,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,EACnC,eAAe,EACf,MAAM,CACP,CAAC;IACJ,CAAC;IAED;;;OAGG;IACK,KAAK,CAAC,gCAAgC,CAC5C,SAA2C,EAC3C,aAAsC;QAEtC,iEAAiE;QACjE,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,KAAK,EAAE,GAAG,EAAE,KAAK,EAAE,EAAE;YAClD,IAAI,CAAC;gBACH,MAAM,QAAQ,GAAG,MAAM,gBAAgB,CAAC,KAAK,IAAI,EAAE;oBACjD,OAAO,MAAM,SAAS,CAAC,GAAG,CAAC,CAAC;gBAC9B,CAAC,EAAE,aAAa,CAAC,CAAC;gBAClB,OAAO,EAAE,QAAQ,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,CAAC;YAC1C,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,MAAM,IAAI,KAAK,CAAC,cAAc,KAAK,YAAY,KAAK,EAAE,CAAC,CAAC;YAC1D,CAAC;QACH,CAAC,CAAC,CAAC;QAEH,OAAO,MAAM,oBAAoB,CAG9B,QAAQ,EAAE,IAAI,CAAC,SAAS,CAAC,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACK,wBAAwB,CAC9B,UAAwB,EACxB,OAAkB;QAElB,MAAM,qBAAqB,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,CAAC,CAAC;YAChE,SAAS;YACT,MAAM,EAAE,OAAO,CAAC,GAAG,CAAC;SACrB,CAAC,CAAC,CAAC;QAEJ,+EAA+E;QAC/E,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YAClC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC,CAAC;YACjC,IAAI,OAAO,GAAG,OAAO;gBAAE,OAAO,CAAC,CAAC;YAChC,OAAO,CAAC,CAAC;QACX,CAAC,CAAC,CAAC;QAEH,4BAA4B;QAC5B,OAAO,qBAAqB,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;IAC7D,CAAC;IAED;;OAEG;IACK,yBAAyB,CAC/B,qBAAiD,EACjD,qBAAmC;QAEnC,IACE,CAAC,qBAAqB,CAAC,KAAK;YAC5B,qBAAqB,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAChD,CAAC;YACD,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;QACpD,CAAC;QAED,MAAM,cAAc,GAAG,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,CAAC;QAC/D,MAAM,MAAM,GAAG,qBAAqB,CAAC,MAAmB,CAAC;QACzD,MAAM,UAAU,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;QACzC,MAAM,WAAW,GAAG,aAAa,CAAC,cAAc,CAAC,CAAC;QAClD,MAAM,SAAS,GAAG,iBAAiB,CACjC,iBAAiB,CAAC,KAAK,EACvB,UAA8B,EAC9B,WAAW,CACZ,CAAC;QAEF,OAAO;YACL,MAAM;YACN,SAAS;YACT,qBAAqB;SACuC,CAAC;IACjE,CAAC;IAEO,KAAK,CAAC,2BAA2B,CACvC,SAA2D,EAC3D,kBAAwE,EACxE,OAAkB,EAClB,eAAyB,EACzB,MAAmB;QAOnB,MAAM,gBAAgB,GAAG,SAAS,CAAC,sBAAsB,CAAC,MAAM,CAAC;QACjE,MAAM,OAAO,GAGP,EAAE,CAAC;QAET,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,gBAAgB,EAAE,CAAC,EAAE,EAAE,CAAC;YAC1C,MAAM,MAAM,GAAG,SAAS,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC;YACnD,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;gBAClB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;YAC7C,CAAC;YAED,gDAAgD;YAChD,MAAM,UAAU,GAAG,kBAAkB,CAAC,GAAG,CACvC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,SAAS,CACnD,CAAC;YACF,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;YAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;gBACtC,+DAA+D;gBAC/D,6FAA6F;gBAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;oBAC9B,MAAM,oCAAoC,CACxC,MAAM,CAAC,MAAM,EACb,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;gBACJ,CAAC;gBACD,OAAO,CAAC,IAAI,CACV,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAC9D,CAAC;YACJ,CAAC;iBAAM,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;gBAChD,+DAA+D;gBAC/D,MAAM,mBAAmB,GAAiB,EAAE,CAAC;gBAC7C,MAAM,yBAAyB,GAAiB,EAAE,CAAC;gBACnD,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;oBACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC;oBACtD,IAAI,QAAQ,EAAE,IAAI,KAAK,cAAc,EAAE,CAAC;wBACtC,mBAAmB,CAAC,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;wBAC5D,yBAAyB,CAAC,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;oBAChE,CAAC;yBAAM,CAAC;wBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,QAAQ,EAAE,IAAI,GAAG,CACrE,CAAC;oBACJ,CAAC;gBACH,CAAC;gBAED,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;gBAEF,MAAM,iBAAiB,GAAG,IAAI,CAAC,wBAAwB,CACrD,yBAAyB,EACzB,OAAO,CACR,CAAC;gBAEF,6FAA6F;gBAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;oBAC9B,MAAM,uCAAuC,CAC3C,MAAM,CAAC,MAAM,EACb,iBAAiB,EACjB,8BAA8B,EAC9B,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;gBACJ,CAAC;gBAED,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;gBACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;gBACvC,MAAM,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;gBAC1D,OAAO,CAAC,IAAI,CAAC;oBACX,MAAM,EAAE,MAAM,CAAC,MAAmB;oBAClC,kBAAkB,EAAE;wBAClB,UAAU,EAAE;4BACV,KAAK,EAAE,UAAU,CAAC,EAAE,CAAC;4BACrB,MAAM,EAAE,iBAAiB,CAAC,KAAK,EAAE,0BAA0B;4BAC3D,IAAI,EAAE,UAA8B;yBACrC;qBACqD;oBACxD,mBAAmB,EAAE,8BAA8B;oBACnD,qBAAqB;iBAItB,CAAC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACN,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,KAAK,CAAC,iCAAiC,CAC7C,SAAkC,EAClC,kBAA6C,EAC7C,OAAkB,EAClB,eAAyB,EACzB,MAAmB;QAKnB,MAAM,MAAM,GAAG,SAAS,CAAC,qBAAqB,CAAC;QAC/C,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;QACrE,CAAC;QAED,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;QACvD,CAAC;QAED,gDAAgD;QAChD,mGAAmG;QACnG,MAAM,UAAU,GAAiB,EAAE,CAAC;QACpC,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;YACtC,MAAM,GAAG,GAAG,IAAI,CAAC,qBAAqB,CAAC;YACvC,IAAI,CAAC,GAAG;gBACN,MAAM,IAAI,KAAK,CAAC,oDAAoD,CAAC,CAAC;YACxE,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;QACjC,CAAC;QACD,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CACzD,UAAU,EACV,OAAO,CACR,CAAC;QAEF,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,WAAW,EAAE,CAAC;YACtC,+DAA+D;YAC/D,6FAA6F;YAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,oCAAoC,CACxC,MAAM,CAAC,MAAM,EACb,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,KAAK,EACxB,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YACD,OAAO,IAAI,CAAC,yBAAyB,CAAC,MAAM,EAAE,qBAAqB,CAAC,CAAC;QACvE,CAAC;QAED,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;YACzC,oEAAoE;YACpE,sEAAsE;YAEtE,MAAM,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC;YACxC,MAAM,EAAE,GAAG,YAAY,CAAC,cAAc,CAAC;YACvC,IAAI,CAAC,EAAE,EAAE,CAAC;gBACR,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;YACnD,CAAC;YAED,MAAM,UAAU,GAAG,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC;YAE1D,+DAA+D;YAC/D,MAAM,mBAAmB,GAAiB,EAAE,CAAC;YAC7C,MAAM,yBAAyB,GAAiB,EAAE,CAAC;YACnD,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;gBACtC,IAAI,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;oBAC9D,MAAM,KAAK,GAAG,IAAI,CAAC,qBAAqB,CAAC,KAAK,CAAC,KAAK,CAAC;oBACrD,mBAAmB,CAAC,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC;oBACnD,yBAAyB,CAAC,IAAI,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;gBACvD,CAAC;qBAAM,CAAC;oBACN,MAAM,IAAI,KAAK,CACb,mDAAmD,IAAI,CAAC,qBAAqB,EAAE,KAAK,CAAC,IAAI,GAAG,CAC7F,CAAC;gBACJ,CAAC;YACH,CAAC;YAED,MAAM,8BAA8B,GAAG,IAAI,CAAC,wBAAwB,CAClE,mBAAmB,EACnB,OAAO,CACR,CAAC;YAEF,MAAM,iBAAiB,GAAG,IAAI,CAAC,wBAAwB,CACrD,yBAAyB,EACzB,OAAO,CACR,CAAC;YAEF,6FAA6F;YAC7F,IAAI,eAAe,IAAI,MAAM,EAAE,CAAC;gBAC9B,MAAM,uCAAuC,CAC3C,MAAM,CAAC,MAAM,EACb,iBAAiB,EACjB,8BAA8B,EAC9B,qBAAqB,EACrB,eAAe,EACf,MAAM,CACP,CAAC;YACJ,CAAC;YAED,OAAO;gBACL,MAAM,EAAE,MAAM,CAAC,MAAmB;gBAClC,kBAAkB,EAAE;oBAClB,UAAU,EAAE;wBACV,KAAK,EAAE,UAAU,CAAC,EAAE,CAAC;wBACrB,MAAM,EAAE,iBAAiB,CAAC,KAAK,EAAE,0BAA0B;wBAC3D,IAAI,EAAE,UAA8B;qBACrC;iBACqD;gBACxD,mBAAmB,EAAE,8BAA8B;gBACnD,qBAAqB;aACgD,CAAC;QAC1E,CAAC;QAED,MAAM,IAAI,KAAK,CACb,gCAAgC,MAAM,CAAC,KAAK,CAAC,IAAI,0CAA0C,CAC5F,CAAC;IACJ,CAAC;CACF"}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
import type { Address } from 'viem';
|
|
2
|
+
import type { AttestedComputeRequest, AttestedComputeResponse, AttestedDecryptResponse, AttestedRevealResponse, DecryptionAttestation as ProtoDecryptionAttestation } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
|
|
3
|
+
import type { XwingKeypair } from '../lite/xwing.js';
|
|
4
|
+
/**
|
|
5
|
+
* Computes a canonical key for a single attestation.
|
|
6
|
+
* For plaintext/reencryption+keypair, the key is handle:hex(value).
|
|
7
|
+
* For reencryption without a keypair (XWing ciphertexts are non-deterministic),
|
|
8
|
+
* falls back to handle:op-type as a structural stand-in.
|
|
9
|
+
*/
|
|
10
|
+
export declare function computeAttestationKey(att: ProtoDecryptionAttestation, reencryptKeypair?: XwingKeypair): Promise<string>;
|
|
11
|
+
/**
|
|
12
|
+
* Validates that all responses in a winning bucket have the same attestation
|
|
13
|
+
* count and types as the quorum-elected reference (bucket[0]).
|
|
14
|
+
*/
|
|
15
|
+
export declare function validateDecryptResponseStructure<T extends AttestedDecryptResponse | AttestedRevealResponse>(bucket: Array<{
|
|
16
|
+
response: T;
|
|
17
|
+
signer: Address;
|
|
18
|
+
}>): void;
|
|
19
|
+
/**
|
|
20
|
+
* Validates that all responses in a winning bucket have a decryption
|
|
21
|
+
* attestation with the same case as the quorum-elected reference (bucket[0]),
|
|
22
|
+
* and that the case is consistent with the request's reencryptPubKey.
|
|
23
|
+
*/
|
|
24
|
+
export declare function validateComputeResponseStructure(bucket: Array<{
|
|
25
|
+
response: AttestedComputeResponse;
|
|
26
|
+
signer: Address;
|
|
27
|
+
}>, request?: AttestedComputeRequest): void;
|
|
28
|
+
/**
|
|
29
|
+
* Verifies decrypt/reveal response consistency using hash-bucket voting.
|
|
30
|
+
* Collects all N responses, buckets them by content key, and returns the
|
|
31
|
+
* winning bucket (the first one with >= threshold votes).
|
|
32
|
+
*
|
|
33
|
+
* This is robust against a faulty first-responding node: even if responses[0]
|
|
34
|
+
* disagrees, a quorum of agreeing responses will form a winning bucket.
|
|
35
|
+
*/
|
|
36
|
+
export declare function verifyDecryptResponseConsistency<T extends AttestedDecryptResponse | AttestedRevealResponse>(allResults: Array<{
|
|
37
|
+
response: T;
|
|
38
|
+
signer: Address;
|
|
39
|
+
}>, threshold: number, reencryptKeypair?: XwingKeypair): Promise<{
|
|
40
|
+
reference: T;
|
|
41
|
+
winningResults: Array<{
|
|
42
|
+
response: T;
|
|
43
|
+
signer: Address;
|
|
44
|
+
}>;
|
|
45
|
+
}>;
|
|
46
|
+
/**
|
|
47
|
+
* Verifies compute response consistency using hash-bucket voting.
|
|
48
|
+
*/
|
|
49
|
+
export declare function verifyComputeResponseConsistency(allResults: Array<{
|
|
50
|
+
response: AttestedComputeResponse;
|
|
51
|
+
signer: Address;
|
|
52
|
+
}>, threshold: number, request?: AttestedComputeRequest, reencryptKeypair?: XwingKeypair): Promise<{
|
|
53
|
+
reference: AttestedComputeResponse;
|
|
54
|
+
winningResults: Array<{
|
|
55
|
+
response: AttestedComputeResponse;
|
|
56
|
+
signer: Address;
|
|
57
|
+
}>;
|
|
58
|
+
}>;
|