@inco/js 0.8.0-devnet-5 → 0.9.0-devnet-test-2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +11 -10
- package/dist/cjs/advancedacl/session-key.js +7 -11
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +2 -2
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +6 -6
- package/dist/cjs/encryption/encryption.d.ts +10 -10
- package/dist/cjs/encryption/encryption.js +5 -5
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +98 -12
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +36 -11
- package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/cjs/kms/quorumClient.d.ts +5 -4
- package/dist/cjs/kms/quorumClient.js +33 -30
- package/dist/cjs/lite/index.d.ts +1 -1
- package/dist/cjs/lite/index.js +15 -2
- package/dist/cjs/lite/lightning.d.ts +33 -24
- package/dist/cjs/lite/lightning.js +67 -38
- package/dist/cjs/lite/xwing.d.ts +123 -0
- package/dist/cjs/lite/xwing.js +275 -0
- package/dist/cjs/reencryption/types.d.ts +2 -2
- package/dist/esm/advancedacl/session-key.d.ts +11 -10
- package/dist/esm/advancedacl/session-key.js +7 -11
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +2 -2
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/esm/attesteddecrypt/attested-decrypt.js +4 -4
- package/dist/esm/encryption/encryption.d.ts +10 -10
- package/dist/esm/encryption/encryption.js +5 -5
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +97 -11
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +35 -10
- package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/esm/kms/quorumClient.d.ts +5 -4
- package/dist/esm/kms/quorumClient.js +33 -30
- package/dist/esm/lite/index.d.ts +1 -1
- package/dist/esm/lite/index.js +2 -2
- package/dist/esm/lite/lightning.d.ts +33 -24
- package/dist/esm/lite/lightning.js +67 -38
- package/dist/esm/lite/xwing.d.ts +123 -0
- package/dist/esm/lite/xwing.js +263 -0
- package/dist/esm/reencryption/types.d.ts +2 -2
- package/dist/types/advancedacl/session-key.d.ts +11 -10
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/types/encryption/encryption.d.ts +10 -10
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/types/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/types/kms/quorumClient.d.ts +5 -4
- package/dist/types/lite/index.d.ts +1 -1
- package/dist/types/lite/lightning.d.ts +33 -24
- package/dist/types/lite/xwing.d.ts +123 -0
- package/dist/types/reencryption/types.d.ts +2 -2
- package/package.json +6 -6
- package/dist/cjs/lite/ecies.d.ts +0 -26
- package/dist/cjs/lite/ecies.js +0 -146
- package/dist/esm/lite/ecies.d.ts +0 -26
- package/dist/esm/lite/ecies.js +0 -134
- package/dist/types/lite/ecies.d.ts +0 -26
|
@@ -0,0 +1,275 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.TEST_NETWORK_XWING_PUBKEY = exports.TEST_NETWORK_SEED_KEY = exports.XWING_PUBLIC_KEY_SIZE = void 0;
|
|
4
|
+
exports.deriveXwingKeypairFromSeed = deriveXwingKeypairFromSeed;
|
|
5
|
+
exports.generateXwingKeypair = generateXwingKeypair;
|
|
6
|
+
exports.decodeXwingPublicKey = decodeXwingPublicKey;
|
|
7
|
+
exports.decodeXwingPrivateKey = decodeXwingPrivateKey;
|
|
8
|
+
exports.encodeXwingPublicKey = encodeXwingPublicKey;
|
|
9
|
+
exports.encrypt = encrypt;
|
|
10
|
+
exports.decrypt = decrypt;
|
|
11
|
+
exports.getXwingEncryptor = getXwingEncryptor;
|
|
12
|
+
exports.getXwingDecryptor = getXwingDecryptor;
|
|
13
|
+
const chacha20poly1305_1 = require("@hpke/chacha20poly1305");
|
|
14
|
+
const core_1 = require("@hpke/core");
|
|
15
|
+
const hybridkem_x_wing_1 = require("@hpke/hybridkem-x-wing");
|
|
16
|
+
const binary_js_1 = require("../binary.js");
|
|
17
|
+
const encryption_js_1 = require("../encryption/encryption.js");
|
|
18
|
+
const handle_js_1 = require("../handle.js");
|
|
19
|
+
const schema_js_1 = require("../schema.js");
|
|
20
|
+
const hadu_js_1 = require("./hadu.js");
|
|
21
|
+
// Get X-Wing key sizes from the library
|
|
22
|
+
const xwingKem = new hybridkem_x_wing_1.XWing();
|
|
23
|
+
/**
|
|
24
|
+
* X-Wing public key size in bytes.
|
|
25
|
+
* Combining ML-KEM-768 (1184 bytes) and X25519 (32 bytes).
|
|
26
|
+
*/
|
|
27
|
+
exports.XWING_PUBLIC_KEY_SIZE = xwingKem.publicKeySize;
|
|
28
|
+
// Test network private key for testing
|
|
29
|
+
exports.TEST_NETWORK_SEED_KEY = '0x0000000000000000000000000000000000000000000000000000000000000000';
|
|
30
|
+
// Test network X-Wing public key (1216 bytes)
|
|
31
|
+
// Generated from Go with seed of all zeros using HPKE layer: hpke.KEM_XWING.Scheme().DeriveKeyPair(seed)
|
|
32
|
+
// This matches the key used in covalidator's GetXwingPrivateKeyForTesting() via DeriveXwingPrivateKey
|
|
33
|
+
exports.TEST_NETWORK_XWING_PUBKEY = '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';
|
|
34
|
+
/**
|
|
35
|
+
* Create HPKE cipher suite with X-Wing KEM, HKDF-SHA256, and ChaCha20-Poly1305 AEAD.
|
|
36
|
+
* This configuration provides post-quantum security with hybrid classical/PQ encryption.
|
|
37
|
+
* Workaround: Manually calls setup on the XWing KEM due to a bug in @hpke/hybridkem-x-wing@0.6.1
|
|
38
|
+
* where encap() calls getRandomValues before calling _setup().
|
|
39
|
+
*/
|
|
40
|
+
async function createXwingSuite() {
|
|
41
|
+
const kem = new hybridkem_x_wing_1.XWing();
|
|
42
|
+
// Workaround: Call setup to initialize _api before encap() is called
|
|
43
|
+
// @ts-expect-error _setup is private but must be called to initialize crypto API
|
|
44
|
+
await kem._setup();
|
|
45
|
+
return new core_1.CipherSuite({
|
|
46
|
+
kem,
|
|
47
|
+
kdf: new core_1.HkdfSha256(),
|
|
48
|
+
aead: new chacha20poly1305_1.Chacha20Poly1305(),
|
|
49
|
+
});
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Derive X-Wing keypair from a 32-byte seed (deterministic).
|
|
53
|
+
* This matches the Go implementation in covalidator/encoding/xwing.go
|
|
54
|
+
*
|
|
55
|
+
* @param seed - 32-byte seed for deterministic key derivation
|
|
56
|
+
* @returns X-Wing keypair with cached public key bytes
|
|
57
|
+
*/
|
|
58
|
+
async function deriveXwingKeypairFromSeed(seed) {
|
|
59
|
+
if (seed.length !== 32) {
|
|
60
|
+
throw new Error(`Invalid X-Wing seed length: expected 32 bytes, got ${seed.length}`);
|
|
61
|
+
}
|
|
62
|
+
const suite = await createXwingSuite();
|
|
63
|
+
// Create a fresh ArrayBuffer copy to avoid SharedArrayBuffer issues
|
|
64
|
+
const seedCopy = new Uint8Array(seed);
|
|
65
|
+
const keyPair = await suite.kem.deriveKeyPair(seedCopy.buffer);
|
|
66
|
+
const publicKeyBytes = new Uint8Array(await suite.kem.serializePublicKey(keyPair.publicKey));
|
|
67
|
+
return {
|
|
68
|
+
scheme: encryption_js_1.encryptionSchemes.xwing,
|
|
69
|
+
publicKey: keyPair.publicKey,
|
|
70
|
+
privateKey: keyPair.privateKey,
|
|
71
|
+
encodePublicKey() {
|
|
72
|
+
return publicKeyBytes;
|
|
73
|
+
},
|
|
74
|
+
};
|
|
75
|
+
}
|
|
76
|
+
/**
|
|
77
|
+
* Generate a random X-Wing keypair.
|
|
78
|
+
*
|
|
79
|
+
* @returns X-Wing keypair with cached public key bytes
|
|
80
|
+
*/
|
|
81
|
+
async function generateXwingKeypair() {
|
|
82
|
+
const suite = await createXwingSuite();
|
|
83
|
+
const keyPair = await suite.kem.generateKeyPair();
|
|
84
|
+
const publicKeyBytes = new Uint8Array(await suite.kem.serializePublicKey(keyPair.publicKey));
|
|
85
|
+
return {
|
|
86
|
+
scheme: encryption_js_1.encryptionSchemes.xwing,
|
|
87
|
+
publicKey: keyPair.publicKey,
|
|
88
|
+
privateKey: keyPair.privateKey,
|
|
89
|
+
encodePublicKey() {
|
|
90
|
+
return publicKeyBytes;
|
|
91
|
+
},
|
|
92
|
+
};
|
|
93
|
+
}
|
|
94
|
+
/**
|
|
95
|
+
* Decode X-Wing public key from bytes.
|
|
96
|
+
*
|
|
97
|
+
* @param pubKeyBytes - 1216-byte X-Wing public key
|
|
98
|
+
* @returns CryptoKey for encryption operations
|
|
99
|
+
*/
|
|
100
|
+
async function decodeXwingPublicKey(pubKeyBytes) {
|
|
101
|
+
const suite = await createXwingSuite();
|
|
102
|
+
if (pubKeyBytes.length !== suite.kem.publicKeySize) {
|
|
103
|
+
throw new Error(`Invalid X-Wing public key length: expected ${exports.XWING_PUBLIC_KEY_SIZE} bytes, got ${pubKeyBytes.length}`);
|
|
104
|
+
}
|
|
105
|
+
// Create a fresh ArrayBuffer copy to avoid SharedArrayBuffer issues
|
|
106
|
+
const pubKeyCopy = new Uint8Array(pubKeyBytes);
|
|
107
|
+
return await suite.kem.deserializePublicKey(pubKeyCopy.buffer);
|
|
108
|
+
}
|
|
109
|
+
/**
|
|
110
|
+
* Decode X-Wing private key from 32-byte seed.
|
|
111
|
+
* Alias for deriveXwingKeypairFromSeed for consistency with Go API.
|
|
112
|
+
*
|
|
113
|
+
* @param seed - 32-byte seed
|
|
114
|
+
* @returns X-Wing keypair
|
|
115
|
+
*/
|
|
116
|
+
async function decodeXwingPrivateKey(seed) {
|
|
117
|
+
return await deriveXwingKeypairFromSeed(seed);
|
|
118
|
+
}
|
|
119
|
+
/**
|
|
120
|
+
* Encode X-Wing public key to bytes.
|
|
121
|
+
*
|
|
122
|
+
* @param publicKey - CryptoKey containing X-Wing public key
|
|
123
|
+
* @returns 1216-byte serialized public key
|
|
124
|
+
*/
|
|
125
|
+
async function encodeXwingPublicKey(publicKey) {
|
|
126
|
+
const suite = await createXwingSuite();
|
|
127
|
+
return new Uint8Array(await suite.kem.serializePublicKey(publicKey));
|
|
128
|
+
}
|
|
129
|
+
/**
|
|
130
|
+
* Encrypt using X-Wing HPKE (RFC 9180) with ChaCha20-Poly1305 AEAD.
|
|
131
|
+
*
|
|
132
|
+
* Output format: encappedKey (1184 bytes) || ciphertext (variable length)
|
|
133
|
+
*
|
|
134
|
+
* @param pubKeyA - Recipient's public key
|
|
135
|
+
* @param msg - Message to encrypt
|
|
136
|
+
* @param aad - Additional authenticated data (default: empty)
|
|
137
|
+
* @param info - Context info for key derivation (default: empty)
|
|
138
|
+
* @returns Encrypted data (encappedKey || ciphertext)
|
|
139
|
+
*/
|
|
140
|
+
async function encrypt(pubKeyA, msg, aad = new Uint8Array(0), info = new Uint8Array(0)) {
|
|
141
|
+
const suite = await createXwingSuite();
|
|
142
|
+
// Create fresh ArrayBuffer copies to avoid SharedArrayBuffer issues
|
|
143
|
+
const infoCopy = new Uint8Array(info);
|
|
144
|
+
const sender = await suite.createSenderContext({
|
|
145
|
+
recipientPublicKey: pubKeyA,
|
|
146
|
+
info: infoCopy.buffer,
|
|
147
|
+
});
|
|
148
|
+
const msgCopy = new Uint8Array(msg);
|
|
149
|
+
const aadCopy = new Uint8Array(aad);
|
|
150
|
+
const ciphertext = await sender.seal(msgCopy.buffer, aadCopy.buffer);
|
|
151
|
+
const encappedKey = sender.enc;
|
|
152
|
+
// Concatenate encappedKey and ciphertext
|
|
153
|
+
const result = new Uint8Array(encappedKey.byteLength + ciphertext.byteLength);
|
|
154
|
+
result.set(new Uint8Array(encappedKey), 0);
|
|
155
|
+
result.set(new Uint8Array(ciphertext), encappedKey.byteLength);
|
|
156
|
+
return result;
|
|
157
|
+
}
|
|
158
|
+
/**
|
|
159
|
+
* Decrypt using X-Wing HPKE (RFC 9180) with ChaCha20-Poly1305 AEAD.
|
|
160
|
+
*
|
|
161
|
+
* Input format: encappedKey (1184 bytes) || ciphertext (variable length)
|
|
162
|
+
*
|
|
163
|
+
* @param privKeyA - Recipient's private key
|
|
164
|
+
* @param encryptedData - Encrypted data (encappedKey || ciphertext)
|
|
165
|
+
* @param aad - Additional authenticated data (default: empty)
|
|
166
|
+
* @param info - Context info for key derivation (default: empty)
|
|
167
|
+
* @returns Decrypted plaintext
|
|
168
|
+
*/
|
|
169
|
+
async function decrypt(privKeyA, encryptedData, aad = new Uint8Array(0), info = new Uint8Array(0)) {
|
|
170
|
+
const suite = await createXwingSuite();
|
|
171
|
+
// X-Wing encapsulated key size from the KEM
|
|
172
|
+
const encappedKeySize = suite.kem.encSize;
|
|
173
|
+
if (encryptedData.length < encappedKeySize) {
|
|
174
|
+
throw new Error(`Invalid X-Wing encrypted data length: expected at least ${encappedKeySize} bytes, got ${encryptedData.length}`);
|
|
175
|
+
}
|
|
176
|
+
// Split encappedKey and ciphertext
|
|
177
|
+
const encappedKey = encryptedData.slice(0, encappedKeySize);
|
|
178
|
+
const ciphertext = encryptedData.slice(encappedKeySize);
|
|
179
|
+
// Create fresh ArrayBuffer copies to avoid SharedArrayBuffer issues
|
|
180
|
+
const infoCopy = new Uint8Array(info);
|
|
181
|
+
const encCopy = new Uint8Array(encappedKey);
|
|
182
|
+
const recipient = await suite.createRecipientContext({
|
|
183
|
+
recipientKey: privKeyA.privateKey,
|
|
184
|
+
enc: encCopy.buffer,
|
|
185
|
+
info: infoCopy.buffer,
|
|
186
|
+
});
|
|
187
|
+
const ctCopy = new Uint8Array(ciphertext);
|
|
188
|
+
const aadCopy = new Uint8Array(aad);
|
|
189
|
+
const plaintext = await recipient.open(ctCopy.buffer, aadCopy.buffer);
|
|
190
|
+
return new Uint8Array(plaintext);
|
|
191
|
+
}
|
|
192
|
+
/**
|
|
193
|
+
* Create an X-Wing encryptor for encrypting inputs.
|
|
194
|
+
* Follows the same pattern as ECIES encryptor in ecies.ts.
|
|
195
|
+
*
|
|
196
|
+
* The encryptor:
|
|
197
|
+
* 1. Encodes the plaintext with its context (HADU encoding)
|
|
198
|
+
* 2. Encrypts using X-Wing HPKE
|
|
199
|
+
* 3. Computes prehandle and handle for tracking
|
|
200
|
+
* 4. Returns the encrypted ciphertext with metadata
|
|
201
|
+
*
|
|
202
|
+
* @param args - X-Wing encryptor arguments (recipient's public key)
|
|
203
|
+
* @returns Encryptor function
|
|
204
|
+
*/
|
|
205
|
+
function getXwingEncryptor({ pubKeyA, }) {
|
|
206
|
+
return async ({ plaintext, context, }) => {
|
|
207
|
+
if (plaintext.scheme !== encryption_js_1.encryptionSchemes.xwing) {
|
|
208
|
+
throw new Error(`Plaintext with scheme ${(0, encryption_js_1.getEncryptionSchemeName)(plaintext.scheme)} cannot be encrypted with X-Wing`);
|
|
209
|
+
}
|
|
210
|
+
// Encode plaintext with context (HADU encoding)
|
|
211
|
+
const inputCiphertextPayloadBytes = Buffer.from((0, hadu_js_1.encodeInput)({ plaintext, context }));
|
|
212
|
+
// Encrypt with X-Wing HPKE (empty AAD and info)
|
|
213
|
+
const aad = new Uint8Array(0);
|
|
214
|
+
const info = new Uint8Array(0);
|
|
215
|
+
const ct = await encrypt(pubKeyA, inputCiphertextPayloadBytes, aad, info);
|
|
216
|
+
// Compute prehandle and handle for ciphertext tracking
|
|
217
|
+
const prehandle = (0, handle_js_1.computePrehandle)({
|
|
218
|
+
ciphertext: ct,
|
|
219
|
+
handleType: plaintext.type,
|
|
220
|
+
indexHandle: 0,
|
|
221
|
+
handleVersion: 0,
|
|
222
|
+
});
|
|
223
|
+
const handle = (0, handle_js_1.computeHandle)({
|
|
224
|
+
prehandle,
|
|
225
|
+
context: context,
|
|
226
|
+
});
|
|
227
|
+
return {
|
|
228
|
+
prehandle: (0, binary_js_1.asBytes32)(prehandle),
|
|
229
|
+
handle: (0, binary_js_1.asBytes32)(handle),
|
|
230
|
+
context,
|
|
231
|
+
ciphertext: {
|
|
232
|
+
scheme: encryption_js_1.encryptionSchemes.xwing,
|
|
233
|
+
type: plaintext.type,
|
|
234
|
+
// Prepend handle as checksum for early mismatch detection
|
|
235
|
+
value: (0, encryption_js_1.encodeCiphertextInput)(context.version, (0, binary_js_1.bytesToHex)(handle), (0, binary_js_1.bytesToHex)(ct)),
|
|
236
|
+
},
|
|
237
|
+
};
|
|
238
|
+
};
|
|
239
|
+
}
|
|
240
|
+
/**
|
|
241
|
+
* Create an X-Wing decryptor for decrypting inputs.
|
|
242
|
+
* Follows the same pattern as ECIES decryptor in ecies.ts.
|
|
243
|
+
*
|
|
244
|
+
* The decryptor:
|
|
245
|
+
* 1. Removes the prepended handle from the ciphertext
|
|
246
|
+
* 2. Decrypts using X-Wing HPKE
|
|
247
|
+
* 3. Decodes the HADU-encoded payload
|
|
248
|
+
* 4. Extracts and returns the plaintext
|
|
249
|
+
*
|
|
250
|
+
* @param args - X-Wing decryptor arguments (recipient's private key)
|
|
251
|
+
* @returns Decryptor function
|
|
252
|
+
*/
|
|
253
|
+
function getXwingDecryptor({ privKeyA, }) {
|
|
254
|
+
return async ({ scheme, value, }) => {
|
|
255
|
+
if (scheme !== encryption_js_1.encryptionSchemes.xwing) {
|
|
256
|
+
throw new Error(`Ciphertext with scheme ${(0, encryption_js_1.getEncryptionSchemeName)(scheme)} cannot be decrypted with X-Wing`);
|
|
257
|
+
}
|
|
258
|
+
// Remove the prepended handle
|
|
259
|
+
const { ciphertext } = (0, encryption_js_1.decodeCiphertextInput)(value);
|
|
260
|
+
// Decrypt with X-Wing HPKE (empty AAD and info)
|
|
261
|
+
const aad = new Uint8Array(0);
|
|
262
|
+
const info = new Uint8Array(0);
|
|
263
|
+
const ptBuf = await decrypt(privKeyA, (0, binary_js_1.bytesFromHexString)(ciphertext), aad, info);
|
|
264
|
+
// Decode HADU-encoded payload
|
|
265
|
+
const payload = (0, hadu_js_1.decodeInput)(ptBuf);
|
|
266
|
+
const computable = payload.value;
|
|
267
|
+
if (computable.case !== 'scalar') {
|
|
268
|
+
throw new Error(`Decrypted plaintext is not a scalar, cannot currently be decrypted. This feature may be implemented on request.`);
|
|
269
|
+
}
|
|
270
|
+
// Extract and return plaintext
|
|
271
|
+
const typ = (0, schema_js_1.parse)(encryption_js_1.SupportedFheType, computable.value.type);
|
|
272
|
+
return (0, encryption_js_1.bytesToPlaintext)(computable.value.value, encryption_js_1.encryptionSchemes.xwing, typ);
|
|
273
|
+
};
|
|
274
|
+
}
|
|
275
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"xwing.js","sourceRoot":"","sources":["../../../src/lite/xwing.ts"],"names":[],"mappings":";;;AAiFA,gEA0BC;AAOD,oDAeC;AAQD,oDAaC;AASD,sDAIC;AAQD,oDAKC;AA6BD,0BA4BC;AAaD,0BAoCC;AAeD,8CAsDC;AAeD,8CA4CC;AA1ZD,6DAA0D;AAC1D,qCAAqD;AACrD,6DAA+C;AAC/C,4CAAyE;AACzE,+DAcqC;AACrC,4CAA+D;AAE/D,4CAAqC;AACrC,uCAAqD;AAErD,wCAAwC;AACxC,MAAM,QAAQ,GAAG,IAAI,wBAAK,EAAE,CAAC;AAE7B;;;GAGG;AACU,QAAA,qBAAqB,GAAG,QAAQ,CAAC,aAAa,CAAC;AAE5D,uCAAuC;AAC1B,QAAA,qBAAqB,GAChC,oEAAoE,CAAC;AAEvE,8CAA8C;AAC9C,yGAAyG;AACzG,sGAAsG;AACzF,QAAA,yBAAyB,GACpC,o4EAAo4E,CAAC;AAev4E;;;;;GAKG;AACH,KAAK,UAAU,gBAAgB;IAC7B,MAAM,GAAG,GAAG,IAAI,wBAAK,EAAE,CAAC;IACxB,qEAAqE;IACrE,iFAAiF;IACjF,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;IACnB,OAAO,IAAI,kBAAW,CAAC;QACrB,GAAG;QACH,GAAG,EAAE,IAAI,iBAAU,EAAE;QACrB,IAAI,EAAE,IAAI,mCAAgB,EAAE;KAC7B,CAAC,CAAC;AACL,CAAC;AAED;;;;;;GAMG;AACI,KAAK,UAAU,0BAA0B,CAC9C,IAAgB;IAEhB,IAAI,IAAI,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QACvB,MAAM,IAAI,KAAK,CACb,sDAAsD,IAAI,CAAC,MAAM,EAAE,CACpE,CAAC;IACJ,CAAC;IAED,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IAEtC,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/D,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,SAAS,CAAC,CACtD,CAAC;IAEF,OAAO;QACL,MAAM,EAAE,iCAAiB,CAAC,KAAK;QAC/B,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;QAC9B,eAAe;YACb,OAAO,cAAc,CAAC;QACxB,CAAC;KACF,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACI,KAAK,UAAU,oBAAoB;IACxC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,eAAe,EAAE,CAAC;IAClD,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,SAAS,CAAC,CACtD,CAAC;IAEF,OAAO;QACL,MAAM,EAAE,iCAAiB,CAAC,KAAK;QAC/B,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;QAC9B,eAAe;YACb,OAAO,cAAc,CAAC;QACxB,CAAC;KACF,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,oBAAoB,CACxC,WAAuB;IAEvB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,IAAI,WAAW,CAAC,MAAM,KAAK,KAAK,CAAC,GAAG,CAAC,aAAa,EAAE,CAAC;QACnD,MAAM,IAAI,KAAK,CACb,8CAA8C,6BAAqB,eAAe,WAAW,CAAC,MAAM,EAAE,CACvG,CAAC;IACJ,CAAC;IACD,oEAAoE;IACpE,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC;IAE/C,OAAO,MAAM,KAAK,CAAC,GAAG,CAAC,oBAAoB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACjE,CAAC;AAED;;;;;;GAMG;AACI,KAAK,UAAU,qBAAqB,CACzC,IAAgB;IAEhB,OAAO,MAAM,0BAA0B,CAAC,IAAI,CAAC,CAAC;AAChD,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,oBAAoB,CACxC,SAAoB;IAEpB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,OAAO,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC,CAAC;AACvE,CAAC;AAkBD;;;;;;;;;;GAUG;AACI,KAAK,UAAU,OAAO,CAC3B,OAAkB,EAClB,GAAe,EACf,MAAkB,IAAI,UAAU,CAAC,CAAC,CAAC,EACnC,OAAmB,IAAI,UAAU,CAAC,CAAC,CAAC;IAEpC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IAEvC,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IAEtC,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,mBAAmB,CAAC;QAC7C,kBAAkB,EAAE,OAAO;QAC3B,IAAI,EAAE,QAAQ,CAAC,MAAM;KACtB,CAAC,CAAC;IAEH,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IACpC,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IAEpC,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IACrE,MAAM,WAAW,GAAG,MAAM,CAAC,GAAG,CAAC;IAE/B,yCAAyC;IACzC,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC,CAAC;IAC9E,MAAM,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,CAAC;IAC3C,MAAM,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,UAAU,CAAC,EAAE,WAAW,CAAC,UAAU,CAAC,CAAC;IAE/D,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;;;;;;;;;GAUG;AACI,KAAK,UAAU,OAAO,CAC3B,QAAsB,EACtB,aAAyB,EACzB,MAAkB,IAAI,UAAU,CAAC,CAAC,CAAC,EACnC,OAAmB,IAAI,UAAU,CAAC,CAAC,CAAC;IAEpC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IAEvC,4CAA4C;IAC5C,MAAM,eAAe,GAAG,KAAK,CAAC,GAAG,CAAC,OAAO,CAAC;IAC1C,IAAI,aAAa,CAAC,MAAM,GAAG,eAAe,EAAE,CAAC;QAC3C,MAAM,IAAI,KAAK,CACb,2DAA2D,eAAe,eAAe,aAAa,CAAC,MAAM,EAAE,CAChH,CAAC;IACJ,CAAC;IAED,mCAAmC;IACnC,MAAM,WAAW,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,eAAe,CAAC,CAAC;IAC5D,MAAM,UAAU,GAAG,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;IAExD,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IACtC,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC;IAE5C,MAAM,SAAS,GAAG,MAAM,KAAK,CAAC,sBAAsB,CAAC;QACnD,YAAY,EAAE,QAAQ,CAAC,UAAU;QACjC,GAAG,EAAE,OAAO,CAAC,MAAM;QACnB,IAAI,EAAE,QAAQ,CAAC,MAAM;KACtB,CAAC,CAAC;IAEH,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;IAC1C,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IAEpC,MAAM,SAAS,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IAEtE,OAAO,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC;AACnC,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,SAAgB,iBAAiB,CAAC,EAChC,OAAO,GACY;IACnB,OAAO,KAAK,EAA8B,EACxC,SAAS,EACT,OAAO,GACgC,EAEvC,EAAE;QACF,IAAI,SAAS,CAAC,MAAM,KAAK,iCAAiB,CAAC,KAAK,EAAE,CAAC;YACjD,MAAM,IAAI,KAAK,CACb,yBAAyB,IAAA,uCAAuB,EAAC,SAAS,CAAC,MAAM,CAAC,kCAAkC,CACrG,CAAC;QACJ,CAAC;QAED,gDAAgD;QAChD,MAAM,2BAA2B,GAAG,MAAM,CAAC,IAAI,CAC7C,IAAA,qBAAW,EAAC,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC,CACpC,CAAC;QAEF,gDAAgD;QAChD,MAAM,GAAG,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,EAAE,GAAG,MAAM,OAAO,CAAC,OAAO,EAAE,2BAA2B,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC;QAE1E,uDAAuD;QACvD,MAAM,SAAS,GAAG,IAAA,4BAAgB,EAAC;YACjC,UAAU,EAAE,EAAE;YACd,UAAU,EAAE,SAAS,CAAC,IAAI;YAC1B,WAAW,EAAE,CAAC;YACd,aAAa,EAAE,CAAC;SACjB,CAAC,CAAC;QAEH,MAAM,MAAM,GAAG,IAAA,yBAAa,EAAC;YAC3B,SAAS;YACT,OAAO,EAAE,OAAO;SACjB,CAAC,CAAC;QAEH,OAAO;YACL,SAAS,EAAE,IAAA,qBAAS,EAAC,SAAS,CAAC;YAC/B,MAAM,EAAE,IAAA,qBAAS,EAAC,MAAM,CAAC;YACzB,OAAO;YACP,UAAU,EAAE;gBACV,MAAM,EAAE,iCAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,SAAS,CAAC,IAAI;gBACpB,0DAA0D;gBAC1D,KAAK,EAAE,IAAA,qCAAqB,EAC1B,OAAO,CAAC,OAAO,EACf,IAAA,sBAAU,EAAC,MAAM,CAAC,EAClB,IAAA,sBAAU,EAAC,EAAE,CAAC,CACf;aACF;SACF,CAAC;IACJ,CAAC,CAAC;AACJ,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,SAAgB,iBAAiB,CAAC,EAChC,QAAQ,GACW;IACnB,OAAO,KAAK,EAA8B,EACxC,MAAM,EACN,KAAK,GACwB,EAAwC,EAAE;QACvE,IAAI,MAAM,KAAK,iCAAiB,CAAC,KAAK,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CACb,0BAA0B,IAAA,uCAAuB,EAAC,MAAM,CAAC,kCAAkC,CAC5F,CAAC;QACJ,CAAC;QAED,8BAA8B;QAC9B,MAAM,EAAE,UAAU,EAAE,GAAG,IAAA,qCAAqB,EAAC,KAAK,CAAC,CAAC;QAEpD,gDAAgD;QAChD,MAAM,GAAG,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,KAAK,GAAG,MAAM,OAAO,CACzB,QAAQ,EACR,IAAA,8BAAkB,EAAC,UAAU,CAAC,EAC9B,GAAG,EACH,IAAI,CACL,CAAC;QAEF,8BAA8B;QAC9B,MAAM,OAAO,GAAG,IAAA,qBAAW,EAAC,KAAK,CAAC,CAAC;QACnC,MAAM,UAAU,GAAG,OAAO,CAAC,KAAK,CAAC;QAEjC,IAAI,UAAU,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CACb,iHAAiH,CAClH,CAAC;QACJ,CAAC;QAED,+BAA+B;QAC/B,MAAM,GAAG,GAAG,IAAA,iBAAK,EAAC,gCAAgB,EAAE,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAC3D,OAAO,IAAA,gCAAgB,EACrB,UAAU,CAAC,KAAK,CAAC,KAAK,EACtB,iCAAiB,CAAC,KAAK,EACvB,GAAG,CAC2B,CAAC;IACnC,CAAC,CAAC;AACJ,CAAC"}
|
|
@@ -2,7 +2,7 @@ import { Address } from 'viem';
|
|
|
2
2
|
import { HexString } from '../binary.js';
|
|
3
3
|
import { CiphertextOf, EncryptionScheme, PlaintextOf, SupportedFheType } from '../encryption/encryption.js';
|
|
4
4
|
import { Handle } from '../handle.js';
|
|
5
|
-
import type {
|
|
5
|
+
import type { XwingKeypair } from '../lite/xwing.js';
|
|
6
6
|
import type { BackoffConfig } from '../retry.js';
|
|
7
7
|
export type Reencryptor<S extends EncryptionScheme> = <T extends SupportedFheType>(args: ReencryptFnArgs<S, T>, backoffConfig?: Partial<BackoffConfig>) => Promise<PlaintextOf<S, T>>;
|
|
8
8
|
export interface ReencryptorArgs {
|
|
@@ -12,7 +12,7 @@ export type ReencryptFnArgs<S extends EncryptionScheme, T extends SupportedFheTy
|
|
|
12
12
|
handle: Handle;
|
|
13
13
|
ciphertext?: CiphertextOf<S, T>;
|
|
14
14
|
};
|
|
15
|
-
export type SupportedEphemeralKeypairs =
|
|
15
|
+
export type SupportedEphemeralKeypairs = XwingKeypair;
|
|
16
16
|
export interface PubKeyEncodable {
|
|
17
17
|
encodePublicKey(): Uint8Array;
|
|
18
18
|
}
|
|
@@ -1,9 +1,10 @@
|
|
|
1
1
|
import { type Account, type Address, type Chain, type Hex, PublicClient, type Transport, type WalletClient } from 'viem';
|
|
2
|
+
import type { PrivateKeyAccount } from 'viem/accounts';
|
|
2
3
|
import { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/index.js';
|
|
3
4
|
import { SupportedChainId } from '../chain.js';
|
|
4
|
-
import {
|
|
5
|
+
import { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
5
6
|
import { HexString } from '../index.js';
|
|
6
|
-
import type {
|
|
7
|
+
import type { XwingKeypair } from '../lite/index.js';
|
|
7
8
|
import { BackoffConfig } from '../retry.js';
|
|
8
9
|
import type { AllowanceVoucher, AllowanceVoucherWithSig } from './types.js';
|
|
9
10
|
import { AttestedComputeOP } from '../attestedcompute/types.js';
|
|
@@ -33,7 +34,7 @@ export declare function grantSessionKeyCustomVerifier({ chainId, incoLiteAddress
|
|
|
33
34
|
export declare function updateActiveVouchersSessionNonce(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>): Promise<`0x${string}`>;
|
|
34
35
|
export interface SessionKeyAttestedComputeArgs {
|
|
35
36
|
chainId: SupportedChainId;
|
|
36
|
-
|
|
37
|
+
ephemeralAccount: PrivateKeyAccount;
|
|
37
38
|
kmsQuorumClient: KmsQuorumClient;
|
|
38
39
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
39
40
|
lhsHandle: HexString;
|
|
@@ -44,19 +45,19 @@ export interface SessionKeyAttestedComputeArgs {
|
|
|
44
45
|
ethClient?: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account> | undefined;
|
|
45
46
|
executorAddress?: HexString | undefined;
|
|
46
47
|
reencryptPubKey?: Uint8Array | undefined;
|
|
47
|
-
reencryptKeypair?:
|
|
48
|
+
reencryptKeypair?: XwingKeypair | undefined;
|
|
48
49
|
}
|
|
49
|
-
export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient,
|
|
50
|
+
export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }: SessionKeyAttestedComputeArgs): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
|
|
50
51
|
export interface SessionKeyAttestedDecryptArgs {
|
|
51
52
|
chainId: SupportedChainId;
|
|
52
|
-
|
|
53
|
+
ephemeralAccount: PrivateKeyAccount;
|
|
53
54
|
kmsQuorumClient: KmsQuorumClient;
|
|
54
55
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
55
56
|
handles: HexString[];
|
|
56
57
|
requesterArgData?: Hex | undefined;
|
|
57
58
|
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
58
59
|
reencryptPubKey?: Uint8Array | undefined;
|
|
59
|
-
reencryptKeypair?:
|
|
60
|
+
reencryptKeypair?: XwingKeypair | undefined;
|
|
60
61
|
ethClient?: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account> | undefined;
|
|
61
62
|
executorAddress?: HexString | undefined;
|
|
62
63
|
}
|
|
@@ -69,7 +70,7 @@ export interface SessionKeyAttestedDecryptArgs {
|
|
|
69
70
|
* chainId,
|
|
70
71
|
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
71
72
|
* allowanceVoucherWithSig: voucher,
|
|
72
|
-
*
|
|
73
|
+
* ephemeralAccount,
|
|
73
74
|
* handles,
|
|
74
75
|
* });
|
|
75
76
|
* console.log(attestations[0].plaintext.value);
|
|
@@ -81,7 +82,7 @@ export interface SessionKeyAttestedDecryptArgs {
|
|
|
81
82
|
* chainId,
|
|
82
83
|
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
83
84
|
* allowanceVoucherWithSig: voucher,
|
|
84
|
-
*
|
|
85
|
+
* ephemeralAccount,
|
|
85
86
|
* handles,
|
|
86
87
|
* reencryptPubKey: recipientPubKey,
|
|
87
88
|
* });
|
|
@@ -90,4 +91,4 @@ export interface SessionKeyAttestedDecryptArgs {
|
|
|
90
91
|
* );
|
|
91
92
|
* ```
|
|
92
93
|
*/
|
|
93
|
-
export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles,
|
|
94
|
+
export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
@@ -1,7 +1,5 @@
|
|
|
1
1
|
import { create } from '@bufbuild/protobuf';
|
|
2
2
|
import { bytesToHex, encodeAbiParameters, getContract, hexToBytes, toFunctionSelector, } from 'viem';
|
|
3
|
-
import { privateKeyToAccount } from 'viem/accounts';
|
|
4
|
-
import { bigintToPlaintext, encryptionSchemes, } from '../encryption/encryption.js';
|
|
5
3
|
import { abiHelperAbi, advancedAccessControlAbi, } from '../generated/abis/lightning-preview.js';
|
|
6
4
|
import { incoLightningAbi, sessionVerifierAbi, } from '../generated/abis/lightning.js';
|
|
7
5
|
import { incoVerifierAbi } from '../generated/abis/verifier.js';
|
|
@@ -11,7 +9,6 @@ import { createEIP712Payload } from '../reencryption/index.js';
|
|
|
11
9
|
import { decryptEncryptedAttestations, fetchEip712DomainVersion, } from '../attesteddecrypt/attested-decrypt.js';
|
|
12
10
|
import { AttestedComputeRequestSchema, AttestedDecryptRequestSchema, } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
|
|
13
11
|
import { AllowanceProofSchema, AllowanceVoucherSchema, HandleWithProofSchema, IncoLiteAdvancedACLProofSchema, } from '../generated/es/inco/kms/lite/v1/types_pb.js';
|
|
14
|
-
import { getHandleType } from '../handle.js';
|
|
15
12
|
// Given a sharer's wallet client, an incoLite contract address, and a
|
|
16
13
|
// (verifyingContract, callFunction, sharerArgData) tuple, this function
|
|
17
14
|
// creates an AllowanceVoucher.
|
|
@@ -119,10 +116,9 @@ export async function updateActiveVouchersSessionNonce(incoLiteAddress, sharerWa
|
|
|
119
116
|
}
|
|
120
117
|
// The sessionKeyAttestedCompute function is a decryptor that uses a session key
|
|
121
118
|
// to compute on a handle.
|
|
122
|
-
export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient,
|
|
123
|
-
const requesterAccount =
|
|
119
|
+
export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }) {
|
|
120
|
+
const requesterAccount = ephemeralAccount;
|
|
124
121
|
const rhsPlaintextBig = BigInt(rhsPlaintext);
|
|
125
|
-
const rhsValueBytes = bigintToPlaintext(encryptionSchemes.ecies, getHandleType(lhsHandle), rhsPlaintextBig);
|
|
126
122
|
const eip712DomainVersion = await fetchEip712DomainVersion(executorAddress, DEFAULT_ATTESTED_COMPUTE_DOMAIN_VERSION, ethClient);
|
|
127
123
|
// Sign the EIP712 attesting that the requester has access to the private key
|
|
128
124
|
// corresponding to the ephemeral public key.
|
|
@@ -193,7 +189,7 @@ export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, b
|
|
|
193
189
|
* chainId,
|
|
194
190
|
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
195
191
|
* allowanceVoucherWithSig: voucher,
|
|
196
|
-
*
|
|
192
|
+
* ephemeralAccount,
|
|
197
193
|
* handles,
|
|
198
194
|
* });
|
|
199
195
|
* console.log(attestations[0].plaintext.value);
|
|
@@ -205,7 +201,7 @@ export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, b
|
|
|
205
201
|
* chainId,
|
|
206
202
|
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
207
203
|
* allowanceVoucherWithSig: voucher,
|
|
208
|
-
*
|
|
204
|
+
* ephemeralAccount,
|
|
209
205
|
* handles,
|
|
210
206
|
* reencryptPubKey: recipientPubKey,
|
|
211
207
|
* });
|
|
@@ -214,8 +210,8 @@ export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, b
|
|
|
214
210
|
* );
|
|
215
211
|
* ```
|
|
216
212
|
*/
|
|
217
|
-
export async function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles,
|
|
218
|
-
const requesterAccount =
|
|
213
|
+
export async function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }) {
|
|
214
|
+
const requesterAccount = ephemeralAccount;
|
|
219
215
|
const eip712DomainVersion = await fetchEip712DomainVersion(executorAddress, DEFAULT_ATTESTED_DECRYPT_DOMAIN_VERSION, ethClient);
|
|
220
216
|
// Sign the EIP712 attesting that the requester has access to the private key
|
|
221
217
|
// corresponding to the ephemeral public key.
|
|
@@ -338,4 +334,4 @@ async function getIncoVerifier(incoLiteAddress, walletClient) {
|
|
|
338
334
|
client: walletClient,
|
|
339
335
|
});
|
|
340
336
|
}
|
|
341
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAC5C,OAAO,EAGL,UAAU,EAEV,mBAAmB,EACnB,WAAW,EAEX,UAAU,EAEV,kBAAkB,GAGnB,MAAM,MAAM,CAAC;AACd,OAAO,EAAE,mBAAmB,EAAE,MAAM,eAAe,CAAC;AAMpD,OAAO,EACL,iBAAiB,EAEjB,iBAAiB,GAElB,MAAM,6BAA6B,CAAC;AACrC,OAAO,EACL,YAAY,EACZ,wBAAwB,GACzB,MAAM,wCAAwC,CAAC;AAChD,OAAO,EACL,gBAAgB,EAChB,kBAAkB,GACnB,MAAM,gCAAgC,CAAC;AACxC,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,EAAE,eAAe,EAAa,MAAM,aAAa,CAAC;AAOzD,OAAO,EACL,4BAA4B,EAC5B,4BAA4B,EAC5B,uCAAuC,EACvC,uCAAuC,GACxC,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,mBAAmB,EAAE,MAAM,0BAA0B,CAAC;AAK/D,OAAO,EACL,4BAA4B,EAC5B,wBAAwB,GACzB,MAAM,wCAAwC,CAAC;AAChD,OAAO,EACL,4BAA4B,EAC5B,4BAA4B,GAC7B,MAAM,oDAAoD,CAAC;AAC5D,OAAO,EACL,oBAAoB,EACpB,sBAAsB,EACtB,qBAAqB,EACrB,8BAA8B,GAC/B,MAAM,8CAA8C,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,MAAM,cAAc,CAAC;AAkB7C,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AAC/B,MAAM,CAAC,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAsCD,mDAAmD;AACnD,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,mBAAmB,CAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,kBAAkB,CAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,6BAA6B,CAAC,EAClD,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,kBAAkB,EAClB,aAAa,GACqB;IAClC,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,kBAAkB,CAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AAwCD,gFAAgF;AAChF,0BAA0B;AAC1B,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,eAAe,EACf,gBAAgB,EAChB,uBAAuB,EACvB,gBAAgB,EAChB,SAAS,EACT,eAAe,EACf,eAAe,EACf,gBAAgB,GACc;IAI9B,MAAM,gBAAgB,GAAG,mBAAmB,CAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAC7C,MAAM,aAAa,GAAG,iBAAiB,CACrC,iBAAiB,CAAC,KAAK,EACvB,aAAa,CAAC,SAAS,CAAM,EAC7B,eAAe,CAChB,CAAC;IAEF,MAAM,mBAAmB,GAAG,MAAM,wBAAwB,CACxD,eAAe,EACf,uCAAuC,EACvC,SAAS,CACV,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;YACzC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,eAAe,CAAC,eAAe,CAAC;YAC9C,SAAS,EAAE,UAAU,CACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,UAAU,EAAE,CACrD;SACF;QACD,UAAU,EAAE,4BAA4B;QACxC,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,MAAM,CAC3D,4BAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,UAAU,EAAE;QACrE,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,eAAe,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC1C,eAAe,EAAE,UAAU,CAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,MAAM,CAAC,8BAA8B,EAAE;oBAC5C,cAAc,EAAE,MAAM,CAAC,oBAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,MAAM,CAAC,sBAAsB,EAAE;4BACtC,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,UAAU,CACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,UAAU,CAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,6DAA6D;wBAC7D,gBAAgB,EAAE,gBAAgB;4BAChC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC;4BAC9B,CAAC,CAAC,IAAI,UAAU,EAAE;qBACrB,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,mFAAmF;IACnF,IAAI,eAAe,IAAI,gBAAgB,EAAE,CAAC;QACxC,MAAM,CAAC,oBAAoB,CAAC,GAAG,MAAM,4BAA4B,CAC/D,CAAC,QAAQ,CAAC,EACV,gBAAgB,CACjB,CAAC;QACF,OAAO,oBAGN,CAAC;IACJ,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAoCD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,eAAe,EACf,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,gBAAgB,EAChB,aAAa,EACb,eAAe,EACf,gBAAgB,EAChB,SAAS,EACT,eAAe,GACe;IAM9B,MAAM,gBAAgB,GAAG,mBAAmB,CAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IAEF,MAAM,mBAAmB,GAAG,MAAM,wBAAwB,CACxD,eAAe,EACf,uCAAuC,EACvC,SAAS,CACV,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;YACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;YAChB,SAAS,EAAE,UAAU,CACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CACxD;SACF;QACD,UAAU,EAAE,4BAA4B;QACxC,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,MAAM,CAAC,qBAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,MAAM,CAAC,8BAA8B,EAAE;wBAC5C,cAAc,EAAE,MAAM,CAAC,oBAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,MAAM,CAAC,sBAAsB,EAAE;gCACtC,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,UAAU,CACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,UAAU,CAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,6DAA6D;4BAC7D,gBAAgB,EAAE,gBAAgB;gCAChC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC;gCAC9B,CAAC,CAAC,IAAI,UAAU,EAAE;yBACrB,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,MAAM,CAC3D,4BAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,UAAU,CAAC,eAAe,CAAC;QAC5C,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;KACzE,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,oFAAoF;IACpF,IAAI,eAAe,KAAK,SAAS,IAAI,gBAAgB,EAAE,CAAC;QACtD,QAAQ,GAAG,MAAM,4BAA4B,CAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;IAC5E,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,wBAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,YAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,kBAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,wBAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,gBAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,eAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
|
|
337
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAC5C,OAAO,EAGL,UAAU,EAEV,mBAAmB,EACnB,WAAW,EAEX,UAAU,EAEV,kBAAkB,GAGnB,MAAM,MAAM,CAAC;AAWd,OAAO,EACL,YAAY,EACZ,wBAAwB,GACzB,MAAM,wCAAwC,CAAC;AAChD,OAAO,EACL,gBAAgB,EAChB,kBAAkB,GACnB,MAAM,gCAAgC,CAAC;AACxC,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,EAAE,eAAe,EAAa,MAAM,aAAa,CAAC;AAOzD,OAAO,EACL,4BAA4B,EAC5B,4BAA4B,EAC5B,uCAAuC,EACvC,uCAAuC,GACxC,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,mBAAmB,EAAE,MAAM,0BAA0B,CAAC;AAK/D,OAAO,EACL,4BAA4B,EAC5B,wBAAwB,GACzB,MAAM,wCAAwC,CAAC;AAChD,OAAO,EACL,4BAA4B,EAC5B,4BAA4B,GAC7B,MAAM,oDAAoD,CAAC;AAC5D,OAAO,EACL,oBAAoB,EACpB,sBAAsB,EACtB,qBAAqB,EACrB,8BAA8B,GAC/B,MAAM,8CAA8C,CAAC;AAkBtD,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AAC/B,MAAM,CAAC,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAsCD,mDAAmD;AACnD,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,mBAAmB,CAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,kBAAkB,CAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,6BAA6B,CAAC,EAClD,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,kBAAkB,EAClB,aAAa,GACqB;IAClC,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,kBAAkB,CAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AAwCD,gFAAgF;AAChF,0BAA0B;AAC1B,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,eAAe,EACf,gBAAgB,EAChB,uBAAuB,EACvB,gBAAgB,EAChB,SAAS,EACT,eAAe,EACf,eAAe,EACf,gBAAgB,GACc;IAI9B,MAAM,gBAAgB,GAAG,gBAAgB,CAAC;IAC1C,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAE7C,MAAM,mBAAmB,GAAG,MAAM,wBAAwB,CACxD,eAAe,EACf,uCAAuC,EACvC,SAAS,CACV,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;YACzC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,eAAe,CAAC,eAAe,CAAC;YAC9C,SAAS,EAAE,UAAU,CACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,UAAU,EAAE,CACrD;SACF;QACD,UAAU,EAAE,4BAA4B;QACxC,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,MAAM,CAC3D,4BAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,UAAU,EAAE;QACrE,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,eAAe,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC1C,eAAe,EAAE,UAAU,CAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,MAAM,CAAC,8BAA8B,EAAE;oBAC5C,cAAc,EAAE,MAAM,CAAC,oBAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,MAAM,CAAC,sBAAsB,EAAE;4BACtC,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,UAAU,CACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,UAAU,CAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,6DAA6D;wBAC7D,gBAAgB,EAAE,gBAAgB;4BAChC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC;4BAC9B,CAAC,CAAC,IAAI,UAAU,EAAE;qBACrB,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,mFAAmF;IACnF,IAAI,eAAe,IAAI,gBAAgB,EAAE,CAAC;QACxC,MAAM,CAAC,oBAAoB,CAAC,GAAG,MAAM,4BAA4B,CAC/D,CAAC,QAAQ,CAAC,EACV,gBAAgB,CACjB,CAAC;QACF,OAAO,oBAGN,CAAC;IACJ,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAoCD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,eAAe,EACf,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,gBAAgB,EAChB,aAAa,EACb,eAAe,EACf,gBAAgB,EAChB,SAAS,EACT,eAAe,GACe;IAM9B,MAAM,gBAAgB,GAAG,gBAAgB,CAAC;IAE1C,MAAM,mBAAmB,GAAG,MAAM,wBAAwB,CACxD,eAAe,EACf,uCAAuC,EACvC,SAAS,CACV,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;YACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;YAChB,SAAS,EAAE,UAAU,CACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CACxD;SACF;QACD,UAAU,EAAE,4BAA4B;QACxC,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,MAAM,CAAC,qBAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,MAAM,CAAC,8BAA8B,EAAE;wBAC5C,cAAc,EAAE,MAAM,CAAC,oBAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,MAAM,CAAC,sBAAsB,EAAE;gCACtC,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,UAAU,CACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,UAAU,CAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,6DAA6D;4BAC7D,gBAAgB,EAAE,gBAAgB;gCAChC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC;gCAC9B,CAAC,CAAC,IAAI,UAAU,EAAE;yBACrB,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,MAAM,CAC3D,4BAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,UAAU,CAAC,eAAe,CAAC;QAC5C,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;KACzE,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,oFAAoF;IACpF,IAAI,eAAe,KAAK,SAAS,IAAI,gBAAgB,EAAE,CAAC;QACtD,QAAQ,GAAG,MAAM,4BAA4B,CAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;IAC5E,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,wBAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,YAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,kBAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,wBAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,gBAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,eAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
|
|
@@ -2,9 +2,9 @@ import type { Account, Chain, Transport, WalletClient } from 'viem';
|
|
|
2
2
|
import { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/types.js';
|
|
3
3
|
import { HexString } from '../binary.js';
|
|
4
4
|
import { SupportedChainId } from '../chain.js';
|
|
5
|
-
import type {
|
|
5
|
+
import type { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
6
6
|
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
7
|
-
import type {
|
|
7
|
+
import type { XwingKeypair } from '../lite/xwing.js';
|
|
8
8
|
import type { BackoffConfig } from '../retry.js';
|
|
9
9
|
import { AttestedComputeOP } from './types.js';
|
|
10
10
|
export declare const ATTESTED_COMPUTE_DOMAIN_NAME = "IncoAttestedCompute";
|
|
@@ -38,8 +38,8 @@ export declare function attestedCompute<T extends SupportedFheType>({ executorAd
|
|
|
38
38
|
kmsQuorumClient: KmsQuorumClient;
|
|
39
39
|
chainId: SupportedChainId;
|
|
40
40
|
reencryptPubKey: Uint8Array;
|
|
41
|
-
reencryptKeypair:
|
|
42
|
-
}): Promise<DecryptionAttestation<
|
|
41
|
+
reencryptKeypair: XwingKeypair;
|
|
42
|
+
}): Promise<DecryptionAttestation<EncryptionScheme, T>>;
|
|
43
43
|
export declare function attestedCompute<T extends SupportedFheType>({ executorAddress, lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsQuorumClient, chainId, reencryptPubKey, }: {
|
|
44
44
|
executorAddress: HexString;
|
|
45
45
|
lhsHandle: HexString;
|
|
@@ -51,7 +51,7 @@ export declare function attestedCompute<T extends SupportedFheType>({ executorAd
|
|
|
51
51
|
chainId: SupportedChainId;
|
|
52
52
|
reencryptPubKey: Uint8Array;
|
|
53
53
|
reencryptKeypair?: never;
|
|
54
|
-
}): Promise<EncryptedDecryptionAttestation<
|
|
54
|
+
}): Promise<EncryptedDecryptionAttestation<EncryptionScheme, T>>;
|
|
55
55
|
export declare function attestedCompute<T extends SupportedFheType>({ executorAddress, lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsQuorumClient, chainId, }: {
|
|
56
56
|
executorAddress: HexString;
|
|
57
57
|
lhsHandle: HexString;
|
|
@@ -63,4 +63,4 @@ export declare function attestedCompute<T extends SupportedFheType>({ executorAd
|
|
|
63
63
|
chainId: SupportedChainId;
|
|
64
64
|
reencryptPubKey?: never;
|
|
65
65
|
reencryptKeypair?: never;
|
|
66
|
-
}): Promise<DecryptionAttestation<
|
|
66
|
+
}): Promise<DecryptionAttestation<EncryptionScheme, T>>;
|
|
@@ -51,7 +51,7 @@ export async function attestedCompute({ executorAddress, lhsHandle, op, rhsPlain
|
|
|
51
51
|
},
|
|
52
52
|
},
|
|
53
53
|
});
|
|
54
|
-
let decryptionAttestation = await kmsQuorumClient.attestedCompute(attestedComputeRequest, backoffConfig);
|
|
54
|
+
let decryptionAttestation = await kmsQuorumClient.attestedCompute(attestedComputeRequest, backoffConfig, reencryptKeypair);
|
|
55
55
|
if (reencryptPubKey && reencryptKeypair) {
|
|
56
56
|
const [decryptedAttestation] = await decryptEncryptedAttestations([decryptionAttestation], reencryptKeypair);
|
|
57
57
|
return decryptedAttestation;
|
|
@@ -65,4 +65,4 @@ export async function attestedCompute({ executorAddress, lhsHandle, op, rhsPlain
|
|
|
65
65
|
throw new AttestedComputeError('Failed to perform attested compute', error);
|
|
66
66
|
}
|
|
67
67
|
}
|
|
68
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
68
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import type { Account, Chain, PublicClient, Transport, WalletClient } from 'viem';
|
|
2
2
|
import { type HexString } from '../binary.js';
|
|
3
3
|
import { type SupportedChainId } from '../chain.js';
|
|
4
|
-
import {
|
|
4
|
+
import { EncryptionScheme, type SupportedFheType } from '../encryption/encryption.js';
|
|
5
5
|
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
6
|
-
import type {
|
|
6
|
+
import type { XwingKeypair } from '../lite/xwing.js';
|
|
7
7
|
import type { BackoffConfig } from '../retry.js';
|
|
8
8
|
import { type DecryptionAttestation, type EncryptedDecryptionAttestation } from './types.js';
|
|
9
9
|
export declare const ATTESTED_DECRYPT_DOMAIN_NAME = "IncoAttestedDecrypt";
|
|
@@ -34,7 +34,7 @@ export declare function attestedDecrypt({ handles, backoffConfig, chainId, kmsQu
|
|
|
34
34
|
chainId: SupportedChainId;
|
|
35
35
|
kmsQuorumClient: KmsQuorumClient;
|
|
36
36
|
executorAddress: HexString;
|
|
37
|
-
}): Promise<Array<DecryptionAttestation<
|
|
37
|
+
}): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
38
38
|
/**
|
|
39
39
|
* Decrypt multiple handles in a single attested request.
|
|
40
40
|
* Returns an array of attestations aligned with the response ordering.
|
|
@@ -49,10 +49,10 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
|
|
|
49
49
|
walletClient: WalletClient<Transport, Chain, Account>;
|
|
50
50
|
chainId: SupportedChainId;
|
|
51
51
|
reencryptPubKey: Uint8Array;
|
|
52
|
-
reencryptKeypair:
|
|
52
|
+
reencryptKeypair: XwingKeypair;
|
|
53
53
|
kmsQuorumClient: KmsQuorumClient;
|
|
54
54
|
executorAddress: HexString;
|
|
55
|
-
}): Promise<Array<DecryptionAttestation<
|
|
55
|
+
}): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
56
56
|
/**
|
|
57
57
|
* Decrypt multiple handles in a single attested request.
|
|
58
58
|
* Returns an array of attestations aligned with the response ordering.
|
|
@@ -70,7 +70,7 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
|
|
|
70
70
|
reencryptKeypair?: never;
|
|
71
71
|
kmsQuorumClient: KmsQuorumClient;
|
|
72
72
|
executorAddress: HexString;
|
|
73
|
-
}): Promise<Array<EncryptedDecryptionAttestation<
|
|
73
|
+
}): Promise<Array<EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
74
74
|
/**
|
|
75
75
|
* Decrypt multiple handles in a single attested request.
|
|
76
76
|
* Returns an array of attestations aligned with the response ordering.
|
|
@@ -88,9 +88,9 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
|
|
|
88
88
|
reencryptKeypair?: never;
|
|
89
89
|
kmsQuorumClient: KmsQuorumClient;
|
|
90
90
|
executorAddress: HexString;
|
|
91
|
-
}): Promise<Array<DecryptionAttestation<
|
|
91
|
+
}): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
92
92
|
export declare function fetchEip712DomainVersion(executorAddress: HexString | undefined, defaultVersion: string, walletClient?: WalletClient<Transport, Chain, Account> | PublicClient<Transport, Chain>): Promise<string>;
|
|
93
|
-
export declare function decryptEncryptedAttestations(attestations: Array<DecryptionAttestation<
|
|
93
|
+
export declare function decryptEncryptedAttestations(attestations: Array<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>, reencryptKeypair: XwingKeypair): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
94
94
|
/**
|
|
95
95
|
* Validates a handle format.
|
|
96
96
|
* @param handle - The handle to validate
|