@inco/js 0.8.0-devnet-5 → 0.9.0-devnet-test-2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. package/dist/cjs/advancedacl/session-key.d.ts +11 -10
  2. package/dist/cjs/advancedacl/session-key.js +7 -11
  3. package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
  4. package/dist/cjs/attestedcompute/attested-compute.js +2 -2
  5. package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +8 -8
  6. package/dist/cjs/attesteddecrypt/attested-decrypt.js +6 -6
  7. package/dist/cjs/encryption/encryption.d.ts +10 -10
  8. package/dist/cjs/encryption/encryption.js +5 -5
  9. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
  10. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +98 -12
  11. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
  12. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
  13. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
  14. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +36 -11
  15. package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
  16. package/dist/cjs/kms/quorumClient.d.ts +5 -4
  17. package/dist/cjs/kms/quorumClient.js +33 -30
  18. package/dist/cjs/lite/index.d.ts +1 -1
  19. package/dist/cjs/lite/index.js +15 -2
  20. package/dist/cjs/lite/lightning.d.ts +33 -24
  21. package/dist/cjs/lite/lightning.js +67 -38
  22. package/dist/cjs/lite/xwing.d.ts +123 -0
  23. package/dist/cjs/lite/xwing.js +275 -0
  24. package/dist/cjs/reencryption/types.d.ts +2 -2
  25. package/dist/esm/advancedacl/session-key.d.ts +11 -10
  26. package/dist/esm/advancedacl/session-key.js +7 -11
  27. package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
  28. package/dist/esm/attestedcompute/attested-compute.js +2 -2
  29. package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +8 -8
  30. package/dist/esm/attesteddecrypt/attested-decrypt.js +4 -4
  31. package/dist/esm/encryption/encryption.d.ts +10 -10
  32. package/dist/esm/encryption/encryption.js +5 -5
  33. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
  34. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +97 -11
  35. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
  36. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
  37. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
  38. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +35 -10
  39. package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
  40. package/dist/esm/kms/quorumClient.d.ts +5 -4
  41. package/dist/esm/kms/quorumClient.js +33 -30
  42. package/dist/esm/lite/index.d.ts +1 -1
  43. package/dist/esm/lite/index.js +2 -2
  44. package/dist/esm/lite/lightning.d.ts +33 -24
  45. package/dist/esm/lite/lightning.js +67 -38
  46. package/dist/esm/lite/xwing.d.ts +123 -0
  47. package/dist/esm/lite/xwing.js +263 -0
  48. package/dist/esm/reencryption/types.d.ts +2 -2
  49. package/dist/types/advancedacl/session-key.d.ts +11 -10
  50. package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
  51. package/dist/types/attesteddecrypt/attested-decrypt.d.ts +8 -8
  52. package/dist/types/encryption/encryption.d.ts +10 -10
  53. package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
  54. package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
  55. package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
  56. package/dist/types/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
  57. package/dist/types/kms/quorumClient.d.ts +5 -4
  58. package/dist/types/lite/index.d.ts +1 -1
  59. package/dist/types/lite/lightning.d.ts +33 -24
  60. package/dist/types/lite/xwing.d.ts +123 -0
  61. package/dist/types/reencryption/types.d.ts +2 -2
  62. package/package.json +6 -6
  63. package/dist/cjs/lite/ecies.d.ts +0 -26
  64. package/dist/cjs/lite/ecies.js +0 -146
  65. package/dist/esm/lite/ecies.d.ts +0 -26
  66. package/dist/esm/lite/ecies.js +0 -134
  67. package/dist/types/lite/ecies.d.ts +0 -26
@@ -0,0 +1,275 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.TEST_NETWORK_XWING_PUBKEY = exports.TEST_NETWORK_SEED_KEY = exports.XWING_PUBLIC_KEY_SIZE = void 0;
4
+ exports.deriveXwingKeypairFromSeed = deriveXwingKeypairFromSeed;
5
+ exports.generateXwingKeypair = generateXwingKeypair;
6
+ exports.decodeXwingPublicKey = decodeXwingPublicKey;
7
+ exports.decodeXwingPrivateKey = decodeXwingPrivateKey;
8
+ exports.encodeXwingPublicKey = encodeXwingPublicKey;
9
+ exports.encrypt = encrypt;
10
+ exports.decrypt = decrypt;
11
+ exports.getXwingEncryptor = getXwingEncryptor;
12
+ exports.getXwingDecryptor = getXwingDecryptor;
13
+ const chacha20poly1305_1 = require("@hpke/chacha20poly1305");
14
+ const core_1 = require("@hpke/core");
15
+ const hybridkem_x_wing_1 = require("@hpke/hybridkem-x-wing");
16
+ const binary_js_1 = require("../binary.js");
17
+ const encryption_js_1 = require("../encryption/encryption.js");
18
+ const handle_js_1 = require("../handle.js");
19
+ const schema_js_1 = require("../schema.js");
20
+ const hadu_js_1 = require("./hadu.js");
21
+ // Get X-Wing key sizes from the library
22
+ const xwingKem = new hybridkem_x_wing_1.XWing();
23
+ /**
24
+ * X-Wing public key size in bytes.
25
+ * Combining ML-KEM-768 (1184 bytes) and X25519 (32 bytes).
26
+ */
27
+ exports.XWING_PUBLIC_KEY_SIZE = xwingKem.publicKeySize;
28
+ // Test network private key for testing
29
+ exports.TEST_NETWORK_SEED_KEY = '0x0000000000000000000000000000000000000000000000000000000000000000';
30
+ // Test network X-Wing public key (1216 bytes)
31
+ // Generated from Go with seed of all zeros using HPKE layer: hpke.KEM_XWING.Scheme().DeriveKeyPair(seed)
32
+ // This matches the key used in covalidator's GetXwingPrivateKeyForTesting() via DeriveXwingPrivateKey
33
+ exports.TEST_NETWORK_XWING_PUBKEY = '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';
34
+ /**
35
+ * Create HPKE cipher suite with X-Wing KEM, HKDF-SHA256, and ChaCha20-Poly1305 AEAD.
36
+ * This configuration provides post-quantum security with hybrid classical/PQ encryption.
37
+ * Workaround: Manually calls setup on the XWing KEM due to a bug in @hpke/hybridkem-x-wing@0.6.1
38
+ * where encap() calls getRandomValues before calling _setup().
39
+ */
40
+ async function createXwingSuite() {
41
+ const kem = new hybridkem_x_wing_1.XWing();
42
+ // Workaround: Call setup to initialize _api before encap() is called
43
+ // @ts-expect-error _setup is private but must be called to initialize crypto API
44
+ await kem._setup();
45
+ return new core_1.CipherSuite({
46
+ kem,
47
+ kdf: new core_1.HkdfSha256(),
48
+ aead: new chacha20poly1305_1.Chacha20Poly1305(),
49
+ });
50
+ }
51
+ /**
52
+ * Derive X-Wing keypair from a 32-byte seed (deterministic).
53
+ * This matches the Go implementation in covalidator/encoding/xwing.go
54
+ *
55
+ * @param seed - 32-byte seed for deterministic key derivation
56
+ * @returns X-Wing keypair with cached public key bytes
57
+ */
58
+ async function deriveXwingKeypairFromSeed(seed) {
59
+ if (seed.length !== 32) {
60
+ throw new Error(`Invalid X-Wing seed length: expected 32 bytes, got ${seed.length}`);
61
+ }
62
+ const suite = await createXwingSuite();
63
+ // Create a fresh ArrayBuffer copy to avoid SharedArrayBuffer issues
64
+ const seedCopy = new Uint8Array(seed);
65
+ const keyPair = await suite.kem.deriveKeyPair(seedCopy.buffer);
66
+ const publicKeyBytes = new Uint8Array(await suite.kem.serializePublicKey(keyPair.publicKey));
67
+ return {
68
+ scheme: encryption_js_1.encryptionSchemes.xwing,
69
+ publicKey: keyPair.publicKey,
70
+ privateKey: keyPair.privateKey,
71
+ encodePublicKey() {
72
+ return publicKeyBytes;
73
+ },
74
+ };
75
+ }
76
+ /**
77
+ * Generate a random X-Wing keypair.
78
+ *
79
+ * @returns X-Wing keypair with cached public key bytes
80
+ */
81
+ async function generateXwingKeypair() {
82
+ const suite = await createXwingSuite();
83
+ const keyPair = await suite.kem.generateKeyPair();
84
+ const publicKeyBytes = new Uint8Array(await suite.kem.serializePublicKey(keyPair.publicKey));
85
+ return {
86
+ scheme: encryption_js_1.encryptionSchemes.xwing,
87
+ publicKey: keyPair.publicKey,
88
+ privateKey: keyPair.privateKey,
89
+ encodePublicKey() {
90
+ return publicKeyBytes;
91
+ },
92
+ };
93
+ }
94
+ /**
95
+ * Decode X-Wing public key from bytes.
96
+ *
97
+ * @param pubKeyBytes - 1216-byte X-Wing public key
98
+ * @returns CryptoKey for encryption operations
99
+ */
100
+ async function decodeXwingPublicKey(pubKeyBytes) {
101
+ const suite = await createXwingSuite();
102
+ if (pubKeyBytes.length !== suite.kem.publicKeySize) {
103
+ throw new Error(`Invalid X-Wing public key length: expected ${exports.XWING_PUBLIC_KEY_SIZE} bytes, got ${pubKeyBytes.length}`);
104
+ }
105
+ // Create a fresh ArrayBuffer copy to avoid SharedArrayBuffer issues
106
+ const pubKeyCopy = new Uint8Array(pubKeyBytes);
107
+ return await suite.kem.deserializePublicKey(pubKeyCopy.buffer);
108
+ }
109
+ /**
110
+ * Decode X-Wing private key from 32-byte seed.
111
+ * Alias for deriveXwingKeypairFromSeed for consistency with Go API.
112
+ *
113
+ * @param seed - 32-byte seed
114
+ * @returns X-Wing keypair
115
+ */
116
+ async function decodeXwingPrivateKey(seed) {
117
+ return await deriveXwingKeypairFromSeed(seed);
118
+ }
119
+ /**
120
+ * Encode X-Wing public key to bytes.
121
+ *
122
+ * @param publicKey - CryptoKey containing X-Wing public key
123
+ * @returns 1216-byte serialized public key
124
+ */
125
+ async function encodeXwingPublicKey(publicKey) {
126
+ const suite = await createXwingSuite();
127
+ return new Uint8Array(await suite.kem.serializePublicKey(publicKey));
128
+ }
129
+ /**
130
+ * Encrypt using X-Wing HPKE (RFC 9180) with ChaCha20-Poly1305 AEAD.
131
+ *
132
+ * Output format: encappedKey (1184 bytes) || ciphertext (variable length)
133
+ *
134
+ * @param pubKeyA - Recipient's public key
135
+ * @param msg - Message to encrypt
136
+ * @param aad - Additional authenticated data (default: empty)
137
+ * @param info - Context info for key derivation (default: empty)
138
+ * @returns Encrypted data (encappedKey || ciphertext)
139
+ */
140
+ async function encrypt(pubKeyA, msg, aad = new Uint8Array(0), info = new Uint8Array(0)) {
141
+ const suite = await createXwingSuite();
142
+ // Create fresh ArrayBuffer copies to avoid SharedArrayBuffer issues
143
+ const infoCopy = new Uint8Array(info);
144
+ const sender = await suite.createSenderContext({
145
+ recipientPublicKey: pubKeyA,
146
+ info: infoCopy.buffer,
147
+ });
148
+ const msgCopy = new Uint8Array(msg);
149
+ const aadCopy = new Uint8Array(aad);
150
+ const ciphertext = await sender.seal(msgCopy.buffer, aadCopy.buffer);
151
+ const encappedKey = sender.enc;
152
+ // Concatenate encappedKey and ciphertext
153
+ const result = new Uint8Array(encappedKey.byteLength + ciphertext.byteLength);
154
+ result.set(new Uint8Array(encappedKey), 0);
155
+ result.set(new Uint8Array(ciphertext), encappedKey.byteLength);
156
+ return result;
157
+ }
158
+ /**
159
+ * Decrypt using X-Wing HPKE (RFC 9180) with ChaCha20-Poly1305 AEAD.
160
+ *
161
+ * Input format: encappedKey (1184 bytes) || ciphertext (variable length)
162
+ *
163
+ * @param privKeyA - Recipient's private key
164
+ * @param encryptedData - Encrypted data (encappedKey || ciphertext)
165
+ * @param aad - Additional authenticated data (default: empty)
166
+ * @param info - Context info for key derivation (default: empty)
167
+ * @returns Decrypted plaintext
168
+ */
169
+ async function decrypt(privKeyA, encryptedData, aad = new Uint8Array(0), info = new Uint8Array(0)) {
170
+ const suite = await createXwingSuite();
171
+ // X-Wing encapsulated key size from the KEM
172
+ const encappedKeySize = suite.kem.encSize;
173
+ if (encryptedData.length < encappedKeySize) {
174
+ throw new Error(`Invalid X-Wing encrypted data length: expected at least ${encappedKeySize} bytes, got ${encryptedData.length}`);
175
+ }
176
+ // Split encappedKey and ciphertext
177
+ const encappedKey = encryptedData.slice(0, encappedKeySize);
178
+ const ciphertext = encryptedData.slice(encappedKeySize);
179
+ // Create fresh ArrayBuffer copies to avoid SharedArrayBuffer issues
180
+ const infoCopy = new Uint8Array(info);
181
+ const encCopy = new Uint8Array(encappedKey);
182
+ const recipient = await suite.createRecipientContext({
183
+ recipientKey: privKeyA.privateKey,
184
+ enc: encCopy.buffer,
185
+ info: infoCopy.buffer,
186
+ });
187
+ const ctCopy = new Uint8Array(ciphertext);
188
+ const aadCopy = new Uint8Array(aad);
189
+ const plaintext = await recipient.open(ctCopy.buffer, aadCopy.buffer);
190
+ return new Uint8Array(plaintext);
191
+ }
192
+ /**
193
+ * Create an X-Wing encryptor for encrypting inputs.
194
+ * Follows the same pattern as ECIES encryptor in ecies.ts.
195
+ *
196
+ * The encryptor:
197
+ * 1. Encodes the plaintext with its context (HADU encoding)
198
+ * 2. Encrypts using X-Wing HPKE
199
+ * 3. Computes prehandle and handle for tracking
200
+ * 4. Returns the encrypted ciphertext with metadata
201
+ *
202
+ * @param args - X-Wing encryptor arguments (recipient's public key)
203
+ * @returns Encryptor function
204
+ */
205
+ function getXwingEncryptor({ pubKeyA, }) {
206
+ return async ({ plaintext, context, }) => {
207
+ if (plaintext.scheme !== encryption_js_1.encryptionSchemes.xwing) {
208
+ throw new Error(`Plaintext with scheme ${(0, encryption_js_1.getEncryptionSchemeName)(plaintext.scheme)} cannot be encrypted with X-Wing`);
209
+ }
210
+ // Encode plaintext with context (HADU encoding)
211
+ const inputCiphertextPayloadBytes = Buffer.from((0, hadu_js_1.encodeInput)({ plaintext, context }));
212
+ // Encrypt with X-Wing HPKE (empty AAD and info)
213
+ const aad = new Uint8Array(0);
214
+ const info = new Uint8Array(0);
215
+ const ct = await encrypt(pubKeyA, inputCiphertextPayloadBytes, aad, info);
216
+ // Compute prehandle and handle for ciphertext tracking
217
+ const prehandle = (0, handle_js_1.computePrehandle)({
218
+ ciphertext: ct,
219
+ handleType: plaintext.type,
220
+ indexHandle: 0,
221
+ handleVersion: 0,
222
+ });
223
+ const handle = (0, handle_js_1.computeHandle)({
224
+ prehandle,
225
+ context: context,
226
+ });
227
+ return {
228
+ prehandle: (0, binary_js_1.asBytes32)(prehandle),
229
+ handle: (0, binary_js_1.asBytes32)(handle),
230
+ context,
231
+ ciphertext: {
232
+ scheme: encryption_js_1.encryptionSchemes.xwing,
233
+ type: plaintext.type,
234
+ // Prepend handle as checksum for early mismatch detection
235
+ value: (0, encryption_js_1.encodeCiphertextInput)(context.version, (0, binary_js_1.bytesToHex)(handle), (0, binary_js_1.bytesToHex)(ct)),
236
+ },
237
+ };
238
+ };
239
+ }
240
+ /**
241
+ * Create an X-Wing decryptor for decrypting inputs.
242
+ * Follows the same pattern as ECIES decryptor in ecies.ts.
243
+ *
244
+ * The decryptor:
245
+ * 1. Removes the prepended handle from the ciphertext
246
+ * 2. Decrypts using X-Wing HPKE
247
+ * 3. Decodes the HADU-encoded payload
248
+ * 4. Extracts and returns the plaintext
249
+ *
250
+ * @param args - X-Wing decryptor arguments (recipient's private key)
251
+ * @returns Decryptor function
252
+ */
253
+ function getXwingDecryptor({ privKeyA, }) {
254
+ return async ({ scheme, value, }) => {
255
+ if (scheme !== encryption_js_1.encryptionSchemes.xwing) {
256
+ throw new Error(`Ciphertext with scheme ${(0, encryption_js_1.getEncryptionSchemeName)(scheme)} cannot be decrypted with X-Wing`);
257
+ }
258
+ // Remove the prepended handle
259
+ const { ciphertext } = (0, encryption_js_1.decodeCiphertextInput)(value);
260
+ // Decrypt with X-Wing HPKE (empty AAD and info)
261
+ const aad = new Uint8Array(0);
262
+ const info = new Uint8Array(0);
263
+ const ptBuf = await decrypt(privKeyA, (0, binary_js_1.bytesFromHexString)(ciphertext), aad, info);
264
+ // Decode HADU-encoded payload
265
+ const payload = (0, hadu_js_1.decodeInput)(ptBuf);
266
+ const computable = payload.value;
267
+ if (computable.case !== 'scalar') {
268
+ throw new Error(`Decrypted plaintext is not a scalar, cannot currently be decrypted. This feature may be implemented on request.`);
269
+ }
270
+ // Extract and return plaintext
271
+ const typ = (0, schema_js_1.parse)(encryption_js_1.SupportedFheType, computable.value.type);
272
+ return (0, encryption_js_1.bytesToPlaintext)(computable.value.value, encryption_js_1.encryptionSchemes.xwing, typ);
273
+ };
274
+ }
275
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"xwing.js","sourceRoot":"","sources":["../../../src/lite/xwing.ts"],"names":[],"mappings":";;;AAiFA,gEA0BC;AAOD,oDAeC;AAQD,oDAaC;AASD,sDAIC;AAQD,oDAKC;AA6BD,0BA4BC;AAaD,0BAoCC;AAeD,8CAsDC;AAeD,8CA4CC;AA1ZD,6DAA0D;AAC1D,qCAAqD;AACrD,6DAA+C;AAC/C,4CAAyE;AACzE,+DAcqC;AACrC,4CAA+D;AAE/D,4CAAqC;AACrC,uCAAqD;AAErD,wCAAwC;AACxC,MAAM,QAAQ,GAAG,IAAI,wBAAK,EAAE,CAAC;AAE7B;;;GAGG;AACU,QAAA,qBAAqB,GAAG,QAAQ,CAAC,aAAa,CAAC;AAE5D,uCAAuC;AAC1B,QAAA,qBAAqB,GAChC,oEAAoE,CAAC;AAEvE,8CAA8C;AAC9C,yGAAyG;AACzG,sGAAsG;AACzF,QAAA,yBAAyB,GACpC,o4EAAo4E,CAAC;AAev4E;;;;;GAKG;AACH,KAAK,UAAU,gBAAgB;IAC7B,MAAM,GAAG,GAAG,IAAI,wBAAK,EAAE,CAAC;IACxB,qEAAqE;IACrE,iFAAiF;IACjF,MAAM,GAAG,CAAC,MAAM,EAAE,CAAC;IACnB,OAAO,IAAI,kBAAW,CAAC;QACrB,GAAG;QACH,GAAG,EAAE,IAAI,iBAAU,EAAE;QACrB,IAAI,EAAE,IAAI,mCAAgB,EAAE;KAC7B,CAAC,CAAC;AACL,CAAC;AAED;;;;;;GAMG;AACI,KAAK,UAAU,0BAA0B,CAC9C,IAAgB;IAEhB,IAAI,IAAI,CAAC,MAAM,KAAK,EAAE,EAAE,CAAC;QACvB,MAAM,IAAI,KAAK,CACb,sDAAsD,IAAI,CAAC,MAAM,EAAE,CACpE,CAAC;IACJ,CAAC;IAED,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IAEtC,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;IAC/D,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,SAAS,CAAC,CACtD,CAAC;IAEF,OAAO;QACL,MAAM,EAAE,iCAAiB,CAAC,KAAK;QAC/B,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;QAC9B,eAAe;YACb,OAAO,cAAc,CAAC;QACxB,CAAC;KACF,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACI,KAAK,UAAU,oBAAoB;IACxC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,eAAe,EAAE,CAAC;IAClD,MAAM,cAAc,GAAG,IAAI,UAAU,CACnC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,OAAO,CAAC,SAAS,CAAC,CACtD,CAAC;IAEF,OAAO;QACL,MAAM,EAAE,iCAAiB,CAAC,KAAK;QAC/B,SAAS,EAAE,OAAO,CAAC,SAAS;QAC5B,UAAU,EAAE,OAAO,CAAC,UAAU;QAC9B,eAAe;YACb,OAAO,cAAc,CAAC;QACxB,CAAC;KACF,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,oBAAoB,CACxC,WAAuB;IAEvB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,IAAI,WAAW,CAAC,MAAM,KAAK,KAAK,CAAC,GAAG,CAAC,aAAa,EAAE,CAAC;QACnD,MAAM,IAAI,KAAK,CACb,8CAA8C,6BAAqB,eAAe,WAAW,CAAC,MAAM,EAAE,CACvG,CAAC;IACJ,CAAC;IACD,oEAAoE;IACpE,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC;IAE/C,OAAO,MAAM,KAAK,CAAC,GAAG,CAAC,oBAAoB,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACjE,CAAC;AAED;;;;;;GAMG;AACI,KAAK,UAAU,qBAAqB,CACzC,IAAgB;IAEhB,OAAO,MAAM,0BAA0B,CAAC,IAAI,CAAC,CAAC;AAChD,CAAC;AAED;;;;;GAKG;AACI,KAAK,UAAU,oBAAoB,CACxC,SAAoB;IAEpB,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IACvC,OAAO,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,GAAG,CAAC,kBAAkB,CAAC,SAAS,CAAC,CAAC,CAAC;AACvE,CAAC;AAkBD;;;;;;;;;;GAUG;AACI,KAAK,UAAU,OAAO,CAC3B,OAAkB,EAClB,GAAe,EACf,MAAkB,IAAI,UAAU,CAAC,CAAC,CAAC,EACnC,OAAmB,IAAI,UAAU,CAAC,CAAC,CAAC;IAEpC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IAEvC,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IAEtC,MAAM,MAAM,GAAG,MAAM,KAAK,CAAC,mBAAmB,CAAC;QAC7C,kBAAkB,EAAE,OAAO;QAC3B,IAAI,EAAE,QAAQ,CAAC,MAAM;KACtB,CAAC,CAAC;IAEH,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IACpC,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IAEpC,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IACrE,MAAM,WAAW,GAAG,MAAM,CAAC,GAAG,CAAC;IAE/B,yCAAyC;IACzC,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC,CAAC;IAC9E,MAAM,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC,CAAC,CAAC;IAC3C,MAAM,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,UAAU,CAAC,EAAE,WAAW,CAAC,UAAU,CAAC,CAAC;IAE/D,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;;;;;;;;;GAUG;AACI,KAAK,UAAU,OAAO,CAC3B,QAAsB,EACtB,aAAyB,EACzB,MAAkB,IAAI,UAAU,CAAC,CAAC,CAAC,EACnC,OAAmB,IAAI,UAAU,CAAC,CAAC,CAAC;IAEpC,MAAM,KAAK,GAAG,MAAM,gBAAgB,EAAE,CAAC;IAEvC,4CAA4C;IAC5C,MAAM,eAAe,GAAG,KAAK,CAAC,GAAG,CAAC,OAAO,CAAC;IAC1C,IAAI,aAAa,CAAC,MAAM,GAAG,eAAe,EAAE,CAAC;QAC3C,MAAM,IAAI,KAAK,CACb,2DAA2D,eAAe,eAAe,aAAa,CAAC,MAAM,EAAE,CAChH,CAAC;IACJ,CAAC;IAED,mCAAmC;IACnC,MAAM,WAAW,GAAG,aAAa,CAAC,KAAK,CAAC,CAAC,EAAE,eAAe,CAAC,CAAC;IAC5D,MAAM,UAAU,GAAG,aAAa,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;IAExD,oEAAoE;IACpE,MAAM,QAAQ,GAAG,IAAI,UAAU,CAAC,IAAI,CAAC,CAAC;IACtC,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,WAAW,CAAC,CAAC;IAE5C,MAAM,SAAS,GAAG,MAAM,KAAK,CAAC,sBAAsB,CAAC;QACnD,YAAY,EAAE,QAAQ,CAAC,UAAU;QACjC,GAAG,EAAE,OAAO,CAAC,MAAM;QACnB,IAAI,EAAE,QAAQ,CAAC,MAAM;KACtB,CAAC,CAAC;IAEH,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;IAC1C,MAAM,OAAO,GAAG,IAAI,UAAU,CAAC,GAAG,CAAC,CAAC;IAEpC,MAAM,SAAS,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,CAAC;IAEtE,OAAO,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC;AACnC,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,SAAgB,iBAAiB,CAAC,EAChC,OAAO,GACY;IACnB,OAAO,KAAK,EAA8B,EACxC,SAAS,EACT,OAAO,GACgC,EAEvC,EAAE;QACF,IAAI,SAAS,CAAC,MAAM,KAAK,iCAAiB,CAAC,KAAK,EAAE,CAAC;YACjD,MAAM,IAAI,KAAK,CACb,yBAAyB,IAAA,uCAAuB,EAAC,SAAS,CAAC,MAAM,CAAC,kCAAkC,CACrG,CAAC;QACJ,CAAC;QAED,gDAAgD;QAChD,MAAM,2BAA2B,GAAG,MAAM,CAAC,IAAI,CAC7C,IAAA,qBAAW,EAAC,EAAE,SAAS,EAAE,OAAO,EAAE,CAAC,CACpC,CAAC;QAEF,gDAAgD;QAChD,MAAM,GAAG,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,EAAE,GAAG,MAAM,OAAO,CAAC,OAAO,EAAE,2BAA2B,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC;QAE1E,uDAAuD;QACvD,MAAM,SAAS,GAAG,IAAA,4BAAgB,EAAC;YACjC,UAAU,EAAE,EAAE;YACd,UAAU,EAAE,SAAS,CAAC,IAAI;YAC1B,WAAW,EAAE,CAAC;YACd,aAAa,EAAE,CAAC;SACjB,CAAC,CAAC;QAEH,MAAM,MAAM,GAAG,IAAA,yBAAa,EAAC;YAC3B,SAAS;YACT,OAAO,EAAE,OAAO;SACjB,CAAC,CAAC;QAEH,OAAO;YACL,SAAS,EAAE,IAAA,qBAAS,EAAC,SAAS,CAAC;YAC/B,MAAM,EAAE,IAAA,qBAAS,EAAC,MAAM,CAAC;YACzB,OAAO;YACP,UAAU,EAAE;gBACV,MAAM,EAAE,iCAAiB,CAAC,KAAK;gBAC/B,IAAI,EAAE,SAAS,CAAC,IAAI;gBACpB,0DAA0D;gBAC1D,KAAK,EAAE,IAAA,qCAAqB,EAC1B,OAAO,CAAC,OAAO,EACf,IAAA,sBAAU,EAAC,MAAM,CAAC,EAClB,IAAA,sBAAU,EAAC,EAAE,CAAC,CACf;aACF;SACF,CAAC;IACJ,CAAC,CAAC;AACJ,CAAC;AAED;;;;;;;;;;;;GAYG;AACH,SAAgB,iBAAiB,CAAC,EAChC,QAAQ,GACW;IACnB,OAAO,KAAK,EAA8B,EACxC,MAAM,EACN,KAAK,GACwB,EAAwC,EAAE;QACvE,IAAI,MAAM,KAAK,iCAAiB,CAAC,KAAK,EAAE,CAAC;YACvC,MAAM,IAAI,KAAK,CACb,0BAA0B,IAAA,uCAAuB,EAAC,MAAM,CAAC,kCAAkC,CAC5F,CAAC;QACJ,CAAC;QAED,8BAA8B;QAC9B,MAAM,EAAE,UAAU,EAAE,GAAG,IAAA,qCAAqB,EAAC,KAAK,CAAC,CAAC;QAEpD,gDAAgD;QAChD,MAAM,GAAG,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC9B,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/B,MAAM,KAAK,GAAG,MAAM,OAAO,CACzB,QAAQ,EACR,IAAA,8BAAkB,EAAC,UAAU,CAAC,EAC9B,GAAG,EACH,IAAI,CACL,CAAC;QAEF,8BAA8B;QAC9B,MAAM,OAAO,GAAG,IAAA,qBAAW,EAAC,KAAK,CAAC,CAAC;QACnC,MAAM,UAAU,GAAG,OAAO,CAAC,KAAK,CAAC;QAEjC,IAAI,UAAU,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CACb,iHAAiH,CAClH,CAAC;QACJ,CAAC;QAED,+BAA+B;QAC/B,MAAM,GAAG,GAAG,IAAA,iBAAK,EAAC,gCAAgB,EAAE,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAC3D,OAAO,IAAA,gCAAgB,EACrB,UAAU,CAAC,KAAK,CAAC,KAAK,EACtB,iCAAiB,CAAC,KAAK,EACvB,GAAG,CAC2B,CAAC;IACnC,CAAC,CAAC;AACJ,CAAC"}
@@ -2,7 +2,7 @@ import { Address } from 'viem';
2
2
  import { HexString } from '../binary.js';
3
3
  import { CiphertextOf, EncryptionScheme, PlaintextOf, SupportedFheType } from '../encryption/encryption.js';
4
4
  import { Handle } from '../handle.js';
5
- import type { Secp256k1Keypair } from '../lite/ecies.js';
5
+ import type { XwingKeypair } from '../lite/xwing.js';
6
6
  import type { BackoffConfig } from '../retry.js';
7
7
  export type Reencryptor<S extends EncryptionScheme> = <T extends SupportedFheType>(args: ReencryptFnArgs<S, T>, backoffConfig?: Partial<BackoffConfig>) => Promise<PlaintextOf<S, T>>;
8
8
  export interface ReencryptorArgs {
@@ -12,7 +12,7 @@ export type ReencryptFnArgs<S extends EncryptionScheme, T extends SupportedFheTy
12
12
  handle: Handle;
13
13
  ciphertext?: CiphertextOf<S, T>;
14
14
  };
15
- export type SupportedEphemeralKeypairs = Secp256k1Keypair;
15
+ export type SupportedEphemeralKeypairs = XwingKeypair;
16
16
  export interface PubKeyEncodable {
17
17
  encodePublicKey(): Uint8Array;
18
18
  }
@@ -1,9 +1,10 @@
1
1
  import { type Account, type Address, type Chain, type Hex, PublicClient, type Transport, type WalletClient } from 'viem';
2
+ import type { PrivateKeyAccount } from 'viem/accounts';
2
3
  import { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/index.js';
3
4
  import { SupportedChainId } from '../chain.js';
4
- import { type EciesScheme, SupportedFheType } from '../encryption/encryption.js';
5
+ import { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
5
6
  import { HexString } from '../index.js';
6
- import type { Secp256k1Keypair } from '../lite/index.js';
7
+ import type { XwingKeypair } from '../lite/index.js';
7
8
  import { BackoffConfig } from '../retry.js';
8
9
  import type { AllowanceVoucher, AllowanceVoucherWithSig } from './types.js';
9
10
  import { AttestedComputeOP } from '../attestedcompute/types.js';
@@ -33,7 +34,7 @@ export declare function grantSessionKeyCustomVerifier({ chainId, incoLiteAddress
33
34
  export declare function updateActiveVouchersSessionNonce(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>): Promise<`0x${string}`>;
34
35
  export interface SessionKeyAttestedComputeArgs {
35
36
  chainId: SupportedChainId;
36
- ephemeralKeypair: Secp256k1Keypair;
37
+ ephemeralAccount: PrivateKeyAccount;
37
38
  kmsQuorumClient: KmsQuorumClient;
38
39
  allowanceVoucherWithSig: AllowanceVoucherWithSig;
39
40
  lhsHandle: HexString;
@@ -44,19 +45,19 @@ export interface SessionKeyAttestedComputeArgs {
44
45
  ethClient?: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account> | undefined;
45
46
  executorAddress?: HexString | undefined;
46
47
  reencryptPubKey?: Uint8Array | undefined;
47
- reencryptKeypair?: Secp256k1Keypair | undefined;
48
+ reencryptKeypair?: XwingKeypair | undefined;
48
49
  }
49
- export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralKeypair, allowanceVoucherWithSig, requesterArgData, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }: SessionKeyAttestedComputeArgs): Promise<DecryptionAttestation<EciesScheme, SupportedFheType> | EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>;
50
+ export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }: SessionKeyAttestedComputeArgs): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
50
51
  export interface SessionKeyAttestedDecryptArgs {
51
52
  chainId: SupportedChainId;
52
- ephemeralKeypair: Secp256k1Keypair;
53
+ ephemeralAccount: PrivateKeyAccount;
53
54
  kmsQuorumClient: KmsQuorumClient;
54
55
  allowanceVoucherWithSig: AllowanceVoucherWithSig;
55
56
  handles: HexString[];
56
57
  requesterArgData?: Hex | undefined;
57
58
  backoffConfig?: Partial<BackoffConfig> | undefined;
58
59
  reencryptPubKey?: Uint8Array | undefined;
59
- reencryptKeypair?: Secp256k1Keypair | undefined;
60
+ reencryptKeypair?: XwingKeypair | undefined;
60
61
  ethClient?: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account> | undefined;
61
62
  executorAddress?: HexString | undefined;
62
63
  }
@@ -69,7 +70,7 @@ export interface SessionKeyAttestedDecryptArgs {
69
70
  * chainId,
70
71
  * kmsConnectRpcEndpointOrClient: covalidatorUrl,
71
72
  * allowanceVoucherWithSig: voucher,
72
- * ephemeralKeypair,
73
+ * ephemeralAccount,
73
74
  * handles,
74
75
  * });
75
76
  * console.log(attestations[0].plaintext.value);
@@ -81,7 +82,7 @@ export interface SessionKeyAttestedDecryptArgs {
81
82
  * chainId,
82
83
  * kmsConnectRpcEndpointOrClient: covalidatorUrl,
83
84
  * allowanceVoucherWithSig: voucher,
84
- * ephemeralKeypair,
85
+ * ephemeralAccount,
85
86
  * handles,
86
87
  * reencryptPubKey: recipientPubKey,
87
88
  * });
@@ -90,4 +91,4 @@ export interface SessionKeyAttestedDecryptArgs {
90
91
  * );
91
92
  * ```
92
93
  */
93
- export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralKeypair, allowanceVoucherWithSig, requesterArgData, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType> | EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>>;
94
+ export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
@@ -1,7 +1,5 @@
1
1
  import { create } from '@bufbuild/protobuf';
2
2
  import { bytesToHex, encodeAbiParameters, getContract, hexToBytes, toFunctionSelector, } from 'viem';
3
- import { privateKeyToAccount } from 'viem/accounts';
4
- import { bigintToPlaintext, encryptionSchemes, } from '../encryption/encryption.js';
5
3
  import { abiHelperAbi, advancedAccessControlAbi, } from '../generated/abis/lightning-preview.js';
6
4
  import { incoLightningAbi, sessionVerifierAbi, } from '../generated/abis/lightning.js';
7
5
  import { incoVerifierAbi } from '../generated/abis/verifier.js';
@@ -11,7 +9,6 @@ import { createEIP712Payload } from '../reencryption/index.js';
11
9
  import { decryptEncryptedAttestations, fetchEip712DomainVersion, } from '../attesteddecrypt/attested-decrypt.js';
12
10
  import { AttestedComputeRequestSchema, AttestedDecryptRequestSchema, } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
13
11
  import { AllowanceProofSchema, AllowanceVoucherSchema, HandleWithProofSchema, IncoLiteAdvancedACLProofSchema, } from '../generated/es/inco/kms/lite/v1/types_pb.js';
14
- import { getHandleType } from '../handle.js';
15
12
  // Given a sharer's wallet client, an incoLite contract address, and a
16
13
  // (verifyingContract, callFunction, sharerArgData) tuple, this function
17
14
  // creates an AllowanceVoucher.
@@ -119,10 +116,9 @@ export async function updateActiveVouchersSessionNonce(incoLiteAddress, sharerWa
119
116
  }
120
117
  // The sessionKeyAttestedCompute function is a decryptor that uses a session key
121
118
  // to compute on a handle.
122
- export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralKeypair, allowanceVoucherWithSig, requesterArgData, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }) {
123
- const requesterAccount = privateKeyToAccount(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
119
+ export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }) {
120
+ const requesterAccount = ephemeralAccount;
124
121
  const rhsPlaintextBig = BigInt(rhsPlaintext);
125
- const rhsValueBytes = bigintToPlaintext(encryptionSchemes.ecies, getHandleType(lhsHandle), rhsPlaintextBig);
126
122
  const eip712DomainVersion = await fetchEip712DomainVersion(executorAddress, DEFAULT_ATTESTED_COMPUTE_DOMAIN_VERSION, ethClient);
127
123
  // Sign the EIP712 attesting that the requester has access to the private key
128
124
  // corresponding to the ephemeral public key.
@@ -193,7 +189,7 @@ export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, b
193
189
  * chainId,
194
190
  * kmsConnectRpcEndpointOrClient: covalidatorUrl,
195
191
  * allowanceVoucherWithSig: voucher,
196
- * ephemeralKeypair,
192
+ * ephemeralAccount,
197
193
  * handles,
198
194
  * });
199
195
  * console.log(attestations[0].plaintext.value);
@@ -205,7 +201,7 @@ export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, b
205
201
  * chainId,
206
202
  * kmsConnectRpcEndpointOrClient: covalidatorUrl,
207
203
  * allowanceVoucherWithSig: voucher,
208
- * ephemeralKeypair,
204
+ * ephemeralAccount,
209
205
  * handles,
210
206
  * reencryptPubKey: recipientPubKey,
211
207
  * });
@@ -214,8 +210,8 @@ export async function sessionKeyAttestedCompute({ lhsHandle, op, rhsPlaintext, b
214
210
  * );
215
211
  * ```
216
212
  */
217
- export async function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralKeypair, allowanceVoucherWithSig, requesterArgData, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }) {
218
- const requesterAccount = privateKeyToAccount(`0x${ephemeralKeypair.kp.getPrivate('hex')}`);
213
+ export async function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }) {
214
+ const requesterAccount = ephemeralAccount;
219
215
  const eip712DomainVersion = await fetchEip712DomainVersion(executorAddress, DEFAULT_ATTESTED_DECRYPT_DOMAIN_VERSION, ethClient);
220
216
  // Sign the EIP712 attesting that the requester has access to the private key
221
217
  // corresponding to the ephemeral public key.
@@ -338,4 +334,4 @@ async function getIncoVerifier(incoLiteAddress, walletClient) {
338
334
  client: walletClient,
339
335
  });
340
336
  }
341
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAC5C,OAAO,EAGL,UAAU,EAEV,mBAAmB,EACnB,WAAW,EAEX,UAAU,EAEV,kBAAkB,GAGnB,MAAM,MAAM,CAAC;AACd,OAAO,EAAE,mBAAmB,EAAE,MAAM,eAAe,CAAC;AAMpD,OAAO,EACL,iBAAiB,EAEjB,iBAAiB,GAElB,MAAM,6BAA6B,CAAC;AACrC,OAAO,EACL,YAAY,EACZ,wBAAwB,GACzB,MAAM,wCAAwC,CAAC;AAChD,OAAO,EACL,gBAAgB,EAChB,kBAAkB,GACnB,MAAM,gCAAgC,CAAC;AACxC,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,EAAE,eAAe,EAAa,MAAM,aAAa,CAAC;AAOzD,OAAO,EACL,4BAA4B,EAC5B,4BAA4B,EAC5B,uCAAuC,EACvC,uCAAuC,GACxC,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,mBAAmB,EAAE,MAAM,0BAA0B,CAAC;AAK/D,OAAO,EACL,4BAA4B,EAC5B,wBAAwB,GACzB,MAAM,wCAAwC,CAAC;AAChD,OAAO,EACL,4BAA4B,EAC5B,4BAA4B,GAC7B,MAAM,oDAAoD,CAAC;AAC5D,OAAO,EACL,oBAAoB,EACpB,sBAAsB,EACtB,qBAAqB,EACrB,8BAA8B,GAC/B,MAAM,8CAA8C,CAAC;AACtD,OAAO,EAAE,aAAa,EAAE,MAAM,cAAc,CAAC;AAkB7C,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AAC/B,MAAM,CAAC,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAsCD,mDAAmD;AACnD,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,mBAAmB,CAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,kBAAkB,CAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,6BAA6B,CAAC,EAClD,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,kBAAkB,EAClB,aAAa,GACqB;IAClC,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,kBAAkB,CAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AAwCD,gFAAgF;AAChF,0BAA0B;AAC1B,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,eAAe,EACf,gBAAgB,EAChB,uBAAuB,EACvB,gBAAgB,EAChB,SAAS,EACT,eAAe,EACf,eAAe,EACf,gBAAgB,GACc;IAI9B,MAAM,gBAAgB,GAAG,mBAAmB,CAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IACF,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAC7C,MAAM,aAAa,GAAG,iBAAiB,CACrC,iBAAiB,CAAC,KAAK,EACvB,aAAa,CAAC,SAAS,CAAM,EAC7B,eAAe,CAChB,CAAC;IAEF,MAAM,mBAAmB,GAAG,MAAM,wBAAwB,CACxD,eAAe,EACf,uCAAuC,EACvC,SAAS,CACV,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;YACzC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,eAAe,CAAC,eAAe,CAAC;YAC9C,SAAS,EAAE,UAAU,CACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,UAAU,EAAE,CACrD;SACF;QACD,UAAU,EAAE,4BAA4B;QACxC,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,MAAM,CAC3D,4BAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,UAAU,EAAE;QACrE,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,eAAe,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC1C,eAAe,EAAE,UAAU,CAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,MAAM,CAAC,8BAA8B,EAAE;oBAC5C,cAAc,EAAE,MAAM,CAAC,oBAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,MAAM,CAAC,sBAAsB,EAAE;4BACtC,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,UAAU,CACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,UAAU,CAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,6DAA6D;wBAC7D,gBAAgB,EAAE,gBAAgB;4BAChC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC;4BAC9B,CAAC,CAAC,IAAI,UAAU,EAAE;qBACrB,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,mFAAmF;IACnF,IAAI,eAAe,IAAI,gBAAgB,EAAE,CAAC;QACxC,MAAM,CAAC,oBAAoB,CAAC,GAAG,MAAM,4BAA4B,CAC/D,CAAC,QAAQ,CAAC,EACV,gBAAgB,CACjB,CAAC;QACF,OAAO,oBAGN,CAAC;IACJ,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAoCD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,eAAe,EACf,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,gBAAgB,EAChB,aAAa,EACb,eAAe,EACf,gBAAgB,EAChB,SAAS,EACT,eAAe,GACe;IAM9B,MAAM,gBAAgB,GAAG,mBAAmB,CAC1C,KAAK,gBAAgB,CAAC,EAAE,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAC7C,CAAC;IAEF,MAAM,mBAAmB,GAAG,MAAM,wBAAwB,CACxD,eAAe,EACf,uCAAuC,EACvC,SAAS,CACV,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;YACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;YAChB,SAAS,EAAE,UAAU,CACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CACxD;SACF;QACD,UAAU,EAAE,4BAA4B;QACxC,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,MAAM,CAAC,qBAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,MAAM,CAAC,8BAA8B,EAAE;wBAC5C,cAAc,EAAE,MAAM,CAAC,oBAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,MAAM,CAAC,sBAAsB,EAAE;gCACtC,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,UAAU,CACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,UAAU,CAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,6DAA6D;4BAC7D,gBAAgB,EAAE,gBAAgB;gCAChC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC;gCAC9B,CAAC,CAAC,IAAI,UAAU,EAAE;yBACrB,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,MAAM,CAC3D,4BAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,UAAU,CAAC,eAAe,CAAC;QAC5C,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;KACzE,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,oFAAoF;IACpF,IAAI,eAAe,KAAK,SAAS,IAAI,gBAAgB,EAAE,CAAC;QACtD,QAAQ,GAAG,MAAM,4BAA4B,CAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;IAC5E,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,wBAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,YAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,kBAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,wBAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,gBAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,eAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
337
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"session-key.js","sourceRoot":"","sources":["../../../src/advancedacl/session-key.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAC;AAC5C,OAAO,EAGL,UAAU,EAEV,mBAAmB,EACnB,WAAW,EAEX,UAAU,EAEV,kBAAkB,GAGnB,MAAM,MAAM,CAAC;AAWd,OAAO,EACL,YAAY,EACZ,wBAAwB,GACzB,MAAM,wCAAwC,CAAC;AAChD,OAAO,EACL,gBAAgB,EAChB,kBAAkB,GACnB,MAAM,gCAAgC,CAAC;AACxC,OAAO,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,EAAE,eAAe,EAAa,MAAM,aAAa,CAAC;AAOzD,OAAO,EACL,4BAA4B,EAC5B,4BAA4B,EAC5B,uCAAuC,EACvC,uCAAuC,GACxC,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,mBAAmB,EAAE,MAAM,0BAA0B,CAAC;AAK/D,OAAO,EACL,4BAA4B,EAC5B,wBAAwB,GACzB,MAAM,wCAAwC,CAAC;AAChD,OAAO,EACL,4BAA4B,EAC5B,4BAA4B,GAC7B,MAAM,oDAAoD,CAAC;AAC5D,OAAO,EACL,oBAAoB,EACpB,sBAAsB,EACtB,qBAAqB,EACrB,8BAA8B,GAC/B,MAAM,8CAA8C,CAAC;AAkBtD,sEAAsE;AACtE,wEAAwE;AACxE,+BAA+B;AAC/B,MAAM,CAAC,KAAK,UAAU,sBAAsB,CAC1C,eAAwB,EACxB,kBAA2D,EAC3D,iBAA0B,EAC1B,YAAiB,EACjB,aAAkB;IAElB,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAE5E,0EAA0E;IAC1E,wCAAwC;IACxC,MAAM,YAAY,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,6BAA6B,CAAC;QACrE,kBAAkB,CAAC,OAAO,CAAC,OAAO;KACnC,CAAC,CAAC;IAEH,OAAO;QACL,YAAY;QACZ,iBAAiB;QACjB,YAAY;QACZ,aAAa;KACd,CAAC;AACJ,CAAC;AAsCD,mDAAmD;AACnD,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,EACpC,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,cAAc,EACd,kBAAkB,EAClB,SAAS,GACW;IACpB,MAAM,OAAO,GAAG;QACd,SAAS,EAAE,cAAc;QACzB,SAAS,EAAE,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,CAAC;KAC/C,CAAC;IACb,MAAM,aAAa,GAAG,mBAAmB,CAAC,aAAa,EAAE,EAAE;QACzD,OAAO,CAAC,SAAS;QACjB,OAAO,CAAC,SAAS;KAClB,CAAC,CAAC;IAEH,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,kBAAkB,CAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,6BAA6B,CAAC,EAClD,OAAO,EACP,eAAe,EACf,8BAA8B,EAC9B,kBAAkB,EAClB,aAAa,GACqB;IAClC,MAAM,YAAY,GAAG,MAAM,eAAe,CACxC,eAAe,EACf,kBAAkB,CACnB,CAAC;IAEF,mCAAmC;IACnC,iBAAiB;IACjB,sBAAsB;IACtB,yBAAyB;IACzB,mBAAmB;IACnB,6BAA6B;IAC7B,gBAAgB;IAChB,8BAA8B;IAC9B,MAAM,cAAc,GAAG,MAAM,YAAY,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC9D,MAAM,gBAAgB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IACnD,MAAM,mBAAmB,GAAW,cAAc,CAAC,CAAC,CAAC,CAAC;IAEtD,MAAM,OAAO,GAAG,MAAM,sBAAsB,CAC1C,eAAe,EACf,kBAAkB;IAClB,4EAA4E;IAC5E,6BAA6B;IAC7B,8BAA8B,EAC9B,kBAAkB,CAAC,mBAAmB,EAAE,CAAC,EACzC,aAAa,CACd,CAAC;IACF,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO;QACP,WAAW,EAAE,kBAAkB;QAC/B,iBAAiB,EAAE,sBAAsB,EAAE;QAC3C,OAAO,EAAE,OAAO;QAChB,wEAAwE;QACxE,gEAAgE;QAChE,iBAAiB,EAAE,YAAY,CAAC,OAAO;QACvC,UAAU,EAAE,gBAAgB;QAC5B,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IAEH,uEAAuE;IACvE,WAAW;IACX,MAAM,gBAAgB,GACpB,MAAM,kBAAkB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAExD,OAAO;QACL,MAAM,EAAE,kBAAkB,CAAC,OAAO,CAAC,OAAO;QAC1C,OAAO;QACP,gBAAgB;KACjB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,gCAAgC,CACpD,eAAwB,EACxB,kBAA2D;IAE3D,MAAM,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,EAAE,kBAAkB,CAAC,CAAC;IAC5E,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,KAAK,CAAC,gCAAgC,EAAE,CAAC;IACvE,OAAO,MAAM,CAAC;AAChB,CAAC;AAwCD,gFAAgF;AAChF,0BAA0B;AAC1B,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAA6B,EAC1E,SAAS,EACT,EAAE,EACF,YAAY,EACZ,aAAa,EACb,OAAO,EACP,eAAe,EACf,gBAAgB,EAChB,uBAAuB,EACvB,gBAAgB,EAChB,SAAS,EACT,eAAe,EACf,eAAe,EACf,gBAAgB,GACc;IAI9B,MAAM,gBAAgB,GAAG,gBAAgB,CAAC;IAC1C,MAAM,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC,CAAC;IAE7C,MAAM,mBAAmB,GAAG,MAAM,wBAAwB,CACxD,eAAe,EACf,uCAAuC,EACvC,SAAS,CACV,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,OAAO,EAAE;YAC7B,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,SAAS,EAAE;YACtC,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,SAAS,EAAE;YACzC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,EAAE,EAAE,EAAE;YACN,SAAS,EAAE,SAAS;YACpB,YAAY,EAAE,eAAe,CAAC,eAAe,CAAC;YAC9C,SAAS,EAAE,UAAU,CACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,UAAU,EAAE,CACrD;SACF;QACD,UAAU,EAAE,4BAA4B;QACxC,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAE5E,MAAM,sBAAsB,GAA2B,MAAM,CAC3D,4BAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,IAAI,UAAU,EAAE;QACrE,EAAE,EAAE,EAAE;QACN,SAAS,EAAE,SAAS;QACpB,YAAY,EAAE,eAAe,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC1C,eAAe,EAAE,UAAU,CAAC,eAAe,CAAC;QAC5C,QAAQ,EAAE;YACR,KAAK,EAAE;gBACL,IAAI,EAAE,0BAA0B;gBAChC,KAAK,EAAE,MAAM,CAAC,8BAA8B,EAAE;oBAC5C,cAAc,EAAE,MAAM,CAAC,oBAAoB,EAAE;wBAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;wBACtC,OAAO,EAAE,MAAM,CAAC,sBAAsB,EAAE;4BACtC,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;4BACnD,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;4BACD,aAAa,EAAE,UAAU,CACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;yBACF,CAAC;wBACF,gBAAgB,EAAE,UAAU,CAC1B,uBAAuB,CAAC,gBAAgB,CACzC;wBACD,6DAA6D;wBAC7D,gBAAgB,EAAE,gBAAgB;4BAChC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC;4BAC9B,CAAC,CAAC,IAAI,UAAU,EAAE;qBACrB,CAAC;iBACH,CAAC;aACH;SACF;KACF,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,mFAAmF;IACnF,IAAI,eAAe,IAAI,gBAAgB,EAAE,CAAC;QACxC,MAAM,CAAC,oBAAoB,CAAC,GAAG,MAAM,4BAA4B,CAC/D,CAAC,QAAQ,CAAC,EACV,gBAAgB,CACjB,CAAC;QACF,OAAO,oBAGN,CAAC;IACJ,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAoCD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAM,CAAC,KAAK,UAAU,yBAAyB,CAAC,EAC9C,OAAO,EACP,eAAe,EACf,OAAO,EACP,gBAAgB,EAChB,uBAAuB,EACvB,gBAAgB,EAChB,aAAa,EACb,eAAe,EACf,gBAAgB,EAChB,SAAS,EACT,eAAe,GACe;IAM9B,MAAM,gBAAgB,GAAG,gBAAgB,CAAC;IAE1C,MAAM,mBAAmB,GAAG,MAAM,wBAAwB,CACxD,eAAe,EACf,uCAAuC,EACvC,SAAS,CACV,CAAC;IAEF,6EAA6E;IAC7E,6CAA6C;IAC7C,MAAM,aAAa,GAAG,mBAAmB,CAAC;QACxC,OAAO,EAAE,MAAM,CAAC,OAAO,CAAC;QACxB,WAAW,EAAE,wBAAwB;QACrC,iBAAiB,EAAE;YACjB,EAAE,IAAI,EAAE,SAAS,EAAE,IAAI,EAAE,WAAW,EAAE;YACtC,EAAE,IAAI,EAAE,WAAW,EAAE,IAAI,EAAE,OAAO,EAAE;SACrC;QACD,OAAO,EAAE;YACP,OAAO,EAAE,OAAO;YAChB,SAAS,EAAE,UAAU,CACnB,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC,CACxD;SACF;QACD,UAAU,EAAE,4BAA4B;QACxC,aAAa,EAAE,mBAAmB;KACnC,CAAC,CAAC;IACH,gFAAgF;IAChF,oDAAoD;IACpD,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,aAAa,CAAC,CAAC;IAC5E,MAAM,iBAAiB,GAA2B,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE;QACvE,OAAO,MAAM,CAAC,qBAAqB,EAAE;YACnC,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE;gBACR,KAAK,EAAE;oBACL,IAAI,EAAE,0BAA0B;oBAChC,KAAK,EAAE,MAAM,CAAC,8BAA8B,EAAE;wBAC5C,cAAc,EAAE,MAAM,CAAC,oBAAoB,EAAE;4BAC3C,MAAM,EAAE,uBAAuB,CAAC,MAAM;4BACtC,OAAO,EAAE,MAAM,CAAC,sBAAsB,EAAE;gCACtC,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,iBAAiB,EACf,uBAAuB,CAAC,OAAO,CAAC,iBAAiB;gCACnD,YAAY,EAAE,UAAU,CACtB,uBAAuB,CAAC,OAAO,CAAC,YAAY,CAC7C;gCACD,aAAa,EAAE,UAAU,CACvB,uBAAuB,CAAC,OAAO,CAAC,aAAa,CAC9C;6BACF,CAAC;4BACF,gBAAgB,EAAE,UAAU,CAC1B,uBAAuB,CAAC,gBAAgB,CACzC;4BACD,6DAA6D;4BAC7D,gBAAgB,EAAE,gBAAgB;gCAChC,CAAC,CAAC,UAAU,CAAC,gBAAgB,CAAC;gCAC9B,CAAC,CAAC,IAAI,UAAU,EAAE;yBACrB,CAAC;qBACH,CAAC;iBACH;aACF;SACF,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,MAAM,sBAAsB,GAA2B,MAAM,CAC3D,4BAA4B,EAC5B;QACE,WAAW,EAAE,gBAAgB,CAAC,OAAO;QACrC,iBAAiB,EAAE,iBAAiB;QACpC,eAAe,EAAE,UAAU,CAAC,eAAe,CAAC;QAC5C,eAAe,EAAE,eAAe,CAAC,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,UAAU,CAAC,IAAI,CAAC,EAAE,CAAC;KACzE,CACF,CAAC;IAEF,IAAI,QAAQ,GAAG,MAAM,eAAe,CAAC,eAAe,CAClD,sBAAsB,EACtB,aAAa,CACd,CAAC;IAEF,oFAAoF;IACpF,IAAI,eAAe,KAAK,SAAS,IAAI,gBAAgB,EAAE,CAAC;QACtD,QAAQ,GAAG,MAAM,4BAA4B,CAAC,QAAQ,EAAE,gBAAgB,CAAC,CAAC;IAC5E,CAAC;IAED,OAAO,QAAQ,CAAC;AAClB,CAAC;AAED,8EAA8E;AAC9E,YAAY;AAEZ,gDAAgD;AAChD,SAAS,sBAAsB;IAC7B,2EAA2E;IAC3E,oBAAoB;IACpB,MAAM,sBAAsB,GAAG,wBAAwB,CAAC,IAAI,CAC1D,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,IAAI,KAAK,wBAAwB,CACjD,CAAC;IACF,IAAI,CAAC,sBAAsB,EAAE,CAAC;QAC5B,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IAED,gEAAgE;IAChE,MAAM,qBAAqB,GAAG,sBAAsB,CAAC,MAAM,CAAC,IAAI,CAC9D,CAAC,KAAK,EAAE,EAAE,CAAC,KAAK,CAAC,YAAY,KAAK,yBAAyB,CAC5D,CAAC;IACF,IAAI,CAAC,qBAAqB,EAAE,CAAC;QAC3B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,qBAAqB,CAAC,UAAU,CAAC;AAC1C,CAAC;AAED,uCAAuC;AACvC,EAAE;AACF,0EAA0E;AAC1E,4CAA4C;AAC5C,SAAS,aAAa;IACpB,MAAM,UAAU,GAAG,YAAY,CAAC,IAAI,CAClC,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,YAAY,CACvD,CAAC;IACF,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,KAAK,CAAC,sBAAsB,CAAC,CAAC;IAC1C,CAAC;IAED,MAAM,OAAO,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC;IACtC,IAAI,CAAC,OAAO,EAAE,CAAC;QACb,MAAM,IAAI,KAAK,CAAC,mBAAmB,CAAC,CAAC;IACvC,CAAC;IAED,OAAO,OAAO,CAAC,UAAU,CAAC;AAC5B,CAAC;AAED,+CAA+C;AAC/C,SAAS,mBAAmB;IAC1B,MAAM,aAAa,GAAG,kBAAkB,CAAC,IAAI,CAC3C,CAAC,IAAI,EAAE,EAAE,CAAC,MAAM,IAAI,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,eAAe,CAC1D,CAAC;IACF,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,KAAK,CAAC,yBAAyB,CAAC,CAAC;IAC7C,CAAC;IAED,OAAO,aAAa,CAAC;AACvB,CAAC;AAED,SAAS,cAAc,CACrB,mBAA4B,EAC5B,kBAA2D;IAE3D,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,wBAAwB;QAC7B,MAAM,EAAE,kBAAkB;KAC3B,CAAC,CAAC;AACL,CAAC;AAED,SAAS,gBAAgB,CACvB,eAAwB,EACxB,YAAqD;IAErD,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,eAAe;QACxB,GAAG,EAAE,gBAAgB;QACrB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC;AAED,KAAK,UAAU,eAAe,CAC5B,eAAwB,EACxB,YAAqD;IAErD,MAAM,QAAQ,GAAG,gBAAgB,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;IACjE,MAAM,mBAAmB,GAAG,MAAM,QAAQ,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;IAC/D,OAAO,WAAW,CAAC;QACjB,OAAO,EAAE,mBAAmB;QAC5B,GAAG,EAAE,eAAe;QACpB,MAAM,EAAE,YAAY;KACrB,CAAC,CAAC;AACL,CAAC"}
@@ -2,9 +2,9 @@ import type { Account, Chain, Transport, WalletClient } from 'viem';
2
2
  import { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/types.js';
3
3
  import { HexString } from '../binary.js';
4
4
  import { SupportedChainId } from '../chain.js';
5
- import type { EciesScheme, SupportedFheType } from '../encryption/encryption.js';
5
+ import type { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
6
6
  import { KmsQuorumClient } from '../kms/quorumClient.js';
7
- import type { Secp256k1Keypair } from '../lite/ecies.js';
7
+ import type { XwingKeypair } from '../lite/xwing.js';
8
8
  import type { BackoffConfig } from '../retry.js';
9
9
  import { AttestedComputeOP } from './types.js';
10
10
  export declare const ATTESTED_COMPUTE_DOMAIN_NAME = "IncoAttestedCompute";
@@ -38,8 +38,8 @@ export declare function attestedCompute<T extends SupportedFheType>({ executorAd
38
38
  kmsQuorumClient: KmsQuorumClient;
39
39
  chainId: SupportedChainId;
40
40
  reencryptPubKey: Uint8Array;
41
- reencryptKeypair: Secp256k1Keypair;
42
- }): Promise<DecryptionAttestation<EciesScheme, T>>;
41
+ reencryptKeypair: XwingKeypair;
42
+ }): Promise<DecryptionAttestation<EncryptionScheme, T>>;
43
43
  export declare function attestedCompute<T extends SupportedFheType>({ executorAddress, lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsQuorumClient, chainId, reencryptPubKey, }: {
44
44
  executorAddress: HexString;
45
45
  lhsHandle: HexString;
@@ -51,7 +51,7 @@ export declare function attestedCompute<T extends SupportedFheType>({ executorAd
51
51
  chainId: SupportedChainId;
52
52
  reencryptPubKey: Uint8Array;
53
53
  reencryptKeypair?: never;
54
- }): Promise<EncryptedDecryptionAttestation<EciesScheme, T>>;
54
+ }): Promise<EncryptedDecryptionAttestation<EncryptionScheme, T>>;
55
55
  export declare function attestedCompute<T extends SupportedFheType>({ executorAddress, lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsQuorumClient, chainId, }: {
56
56
  executorAddress: HexString;
57
57
  lhsHandle: HexString;
@@ -63,4 +63,4 @@ export declare function attestedCompute<T extends SupportedFheType>({ executorAd
63
63
  chainId: SupportedChainId;
64
64
  reencryptPubKey?: never;
65
65
  reencryptKeypair?: never;
66
- }): Promise<DecryptionAttestation<EciesScheme, T>>;
66
+ }): Promise<DecryptionAttestation<EncryptionScheme, T>>;
@@ -51,7 +51,7 @@ export async function attestedCompute({ executorAddress, lhsHandle, op, rhsPlain
51
51
  },
52
52
  },
53
53
  });
54
- let decryptionAttestation = await kmsQuorumClient.attestedCompute(attestedComputeRequest, backoffConfig);
54
+ let decryptionAttestation = await kmsQuorumClient.attestedCompute(attestedComputeRequest, backoffConfig, reencryptKeypair);
55
55
  if (reencryptPubKey && reencryptKeypair) {
56
56
  const [decryptedAttestation] = await decryptEncryptedAttestations([decryptionAttestation], reencryptKeypair);
57
57
  return decryptedAttestation;
@@ -65,4 +65,4 @@ export async function attestedCompute({ executorAddress, lhsHandle, op, rhsPlain
65
65
  throw new AttestedComputeError('Failed to perform attested compute', error);
66
66
  }
67
67
  }
68
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYXR0ZXN0ZWQtY29tcHV0ZS5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uLy4uL3NyYy9hdHRlc3RlZGNvbXB1dGUvYXR0ZXN0ZWQtY29tcHV0ZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxPQUFPLEVBQUUsTUFBTSxFQUFFLE1BQU0sb0JBQW9CLENBQUM7QUFFNUMsT0FBTyxFQUFFLFVBQVUsRUFBRSxVQUFVLEVBQUUsTUFBTSxNQUFNLENBQUM7QUFDOUMsT0FBTyxFQUNMLDRCQUE0QixFQUM1Qix3QkFBd0IsRUFDeEIsY0FBYyxHQUNmLE1BQU0sd0NBQXdDLENBQUM7QUFLaEQsT0FBTyxFQUFFLGVBQWUsRUFBYSxNQUFNLGNBQWMsQ0FBQztBQU0xRCxPQUFPLEVBRUwsNEJBQTRCLEdBQzdCLE1BQU0sb0RBQW9ELENBQUM7QUFHNUQsT0FBTyxFQUFFLG1CQUFtQixFQUFFLE1BQU0sMkJBQTJCLENBQUM7QUFFaEUsT0FBTyxFQUFFLG9CQUFvQixFQUFxQixNQUFNLFlBQVksQ0FBQztBQUVyRSxNQUFNLENBQUMsTUFBTSw0QkFBNEIsR0FBRyxxQkFBcUIsQ0FBQztBQUNsRSxNQUFNLENBQUMsTUFBTSx1Q0FBdUMsR0FBRyxHQUFHLENBQUM7QUE4RjNELE1BQU0sQ0FBQyxLQUFLLFVBQVUsZUFBZSxDQUE2QixFQUNoRSxlQUFlLEVBQ2YsU0FBUyxFQUNULEVBQUUsRUFDRixZQUFZLEVBQ1osYUFBYSxFQUNiLFlBQVksRUFDWixlQUFlLEVBQ2YsT0FBTyxFQUNQLGVBQWUsRUFDZixnQkFBZ0IsR0FZakI7SUFJQyxJQUFJLENBQUM7UUFDSCxjQUFjLENBQUMsU0FBUyxDQUFDLENBQUM7UUFFMUIsTUFBTSxlQUFlLEdBQ25CLE9BQU8sWUFBWSxLQUFLLFNBQVM7WUFDL0IsQ0FBQyxDQUFDLFlBQVk7Z0JBQ1osQ0FBQyxDQUFDLEVBQUU7Z0JBQ0osQ0FBQyxDQUFDLEVBQUU7WUFDTixDQUFDLENBQUMsTUFBTSxDQUFDLFlBQVksQ0FBQyxDQUFDO1FBRTNCLE1BQU0sbUJBQW1CLEdBQUcsTUFBTSx3QkFBd0IsQ0FDeEQsZUFBZSxFQUNmLHVDQUF1QyxFQUN2QyxZQUFZLENBQ2IsQ0FBQztRQUVGLHVEQUF1RDtRQUN2RCxNQUFNLGFBQWEsR0FBRyxtQkFBbUIsQ0FBQztZQUN4QyxPQUFPLEVBQUUsTUFBTSxDQUFDLE9BQU8sQ0FBQztZQUN4QixXQUFXLEVBQUUsd0JBQXdCO1lBQ3JDLGlCQUFpQixFQUFFO2dCQUNqQixFQUFFLElBQUksRUFBRSxJQUFJLEVBQUUsSUFBSSxFQUFFLE9BQU8sRUFBRTtnQkFDN0IsRUFBRSxJQUFJLEVBQUUsV0FBVyxFQUFFLElBQUksRUFBRSxTQUFTLEVBQUU7Z0JBQ3RDLEVBQUUsSUFBSSxFQUFFLGNBQWMsRUFBRSxJQUFJLEVBQUUsU0FBUyxFQUFFO2dCQUN6QyxFQUFFLElBQUksRUFBRSxXQUFXLEVBQUUsSUFBSSxFQUFFLE9BQU8sRUFBRTthQUNyQztZQUNELE9BQU8sRUFBRTtnQkFDUCxFQUFFLEVBQUUsRUFBRTtnQkFDTixTQUFTLEVBQUUsU0FBUztnQkFDcEIsWUFBWSxFQUFFLGVBQWUsQ0FBQyxlQUFlLENBQUM7Z0JBQzlDLFNBQVMsRUFBRSxVQUFVLENBQ25CLGVBQWUsQ0FBQyxDQUFDLENBQUMsZUFBZSxDQUFDLENBQUMsQ0FBQyxJQUFJLFVBQVUsRUFBRSxDQUNyRDthQUNGO1lBQ0QsVUFBVSxFQUFFLDRCQUE0QjtZQUN4QyxhQUFhLEVBQUUsbUJBQW1CO1NBQ25DLENBQUMsQ0FBQztRQUVILDBCQUEwQjtRQUMxQixNQUFNLGVBQWUsR0FBRyxNQUFNLFlBQVksQ0FBQyxhQUFhLENBQUMsYUFBYSxDQUFDLENBQUM7UUFFeEUsTUFBTSxzQkFBc0IsR0FBMkIsTUFBTSxDQUMzRCw0QkFBNEIsRUFDNUI7WUFDRSxXQUFXLEVBQUUsWUFBWSxDQUFDLE9BQU8sQ0FBQyxPQUFPO1lBQ3pDLGVBQWUsRUFBRSxlQUFlLENBQUMsQ0FBQyxDQUFDLGVBQWUsQ0FBQyxDQUFDLENBQUMsSUFBSSxVQUFVLEVBQUU7WUFDckUsRUFBRSxFQUFFLEVBQUU7WUFDTixTQUFTLEVBQUUsU0FBUztZQUNwQixZQUFZLEVBQUUsZUFBZSxDQUFDLFFBQVEsQ0FBQyxFQUFFLENBQUM7WUFDMUMsZUFBZSxFQUFFLFVBQVUsQ0FBQyxlQUFlLENBQUM7WUFDNUMsUUFBUSxFQUFFO2dCQUNSLEtBQUssRUFBRTtvQkFDTCxJQUFJLEVBQUUsdUJBQXVCO29CQUM3QixLQUFLLEVBQUUsRUFBRTtpQkFDVjthQUNGO1NBQ0YsQ0FDRixDQUFDO1FBRUYsSUFBSSxxQkFBcUIsR0FBRyxNQUFNLGVBQWUsQ0FBQyxlQUFlLENBQy9ELHNCQUFzQixFQUN0QixhQUFhLENBQ2QsQ0FBQztRQUVGLElBQUksZUFBZSxJQUFJLGdCQUFnQixFQUFFLENBQUM7WUFDeEMsTUFBTSxDQUFDLG9CQUFvQixDQUFDLEdBQUcsTUFBTSw0QkFBNEIsQ0FDL0QsQ0FBQyxxQkFBcUIsQ0FBQyxFQUN2QixnQkFBZ0IsQ0FDakIsQ0FBQztZQUNGLE9BQU8sb0JBQTZELENBQUM7UUFDdkUsQ0FBQztRQUVELE9BQU8scUJBRTJDLENBQUM7SUFDckQsQ0FBQztJQUFDLE9BQU8sS0FBSyxFQUFFLENBQUM7UUFDZixJQUFJLEtBQUssWUFBWSxvQkFBb0IsRUFBRSxDQUFDO1lBQzFDLE1BQU0sS0FBSyxDQUFDO1FBQ2QsQ0FBQztRQUNELE1BQU0sSUFBSSxvQkFBb0IsQ0FBQyxvQ0FBb0MsRUFBRSxLQUFLLENBQUMsQ0FBQztJQUM5RSxDQUFDO0FBQ0gsQ0FBQyJ9
68
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,9 +1,9 @@
1
1
  import type { Account, Chain, PublicClient, Transport, WalletClient } from 'viem';
2
2
  import { type HexString } from '../binary.js';
3
3
  import { type SupportedChainId } from '../chain.js';
4
- import { type EciesScheme, type SupportedFheType } from '../encryption/encryption.js';
4
+ import { EncryptionScheme, type SupportedFheType } from '../encryption/encryption.js';
5
5
  import { KmsQuorumClient } from '../kms/quorumClient.js';
6
- import type { Secp256k1Keypair } from '../lite/ecies.js';
6
+ import type { XwingKeypair } from '../lite/xwing.js';
7
7
  import type { BackoffConfig } from '../retry.js';
8
8
  import { type DecryptionAttestation, type EncryptedDecryptionAttestation } from './types.js';
9
9
  export declare const ATTESTED_DECRYPT_DOMAIN_NAME = "IncoAttestedDecrypt";
@@ -34,7 +34,7 @@ export declare function attestedDecrypt({ handles, backoffConfig, chainId, kmsQu
34
34
  chainId: SupportedChainId;
35
35
  kmsQuorumClient: KmsQuorumClient;
36
36
  executorAddress: HexString;
37
- }): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
37
+ }): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
38
38
  /**
39
39
  * Decrypt multiple handles in a single attested request.
40
40
  * Returns an array of attestations aligned with the response ordering.
@@ -49,10 +49,10 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
49
49
  walletClient: WalletClient<Transport, Chain, Account>;
50
50
  chainId: SupportedChainId;
51
51
  reencryptPubKey: Uint8Array;
52
- reencryptKeypair: Secp256k1Keypair;
52
+ reencryptKeypair: XwingKeypair;
53
53
  kmsQuorumClient: KmsQuorumClient;
54
54
  executorAddress: HexString;
55
- }): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
55
+ }): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
56
56
  /**
57
57
  * Decrypt multiple handles in a single attested request.
58
58
  * Returns an array of attestations aligned with the response ordering.
@@ -70,7 +70,7 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
70
70
  reencryptKeypair?: never;
71
71
  kmsQuorumClient: KmsQuorumClient;
72
72
  executorAddress: HexString;
73
- }): Promise<Array<EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>>;
73
+ }): Promise<Array<EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
74
74
  /**
75
75
  * Decrypt multiple handles in a single attested request.
76
76
  * Returns an array of attestations aligned with the response ordering.
@@ -88,9 +88,9 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
88
88
  reencryptKeypair?: never;
89
89
  kmsQuorumClient: KmsQuorumClient;
90
90
  executorAddress: HexString;
91
- }): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
91
+ }): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
92
92
  export declare function fetchEip712DomainVersion(executorAddress: HexString | undefined, defaultVersion: string, walletClient?: WalletClient<Transport, Chain, Account> | PublicClient<Transport, Chain>): Promise<string>;
93
- export declare function decryptEncryptedAttestations(attestations: Array<DecryptionAttestation<EciesScheme, SupportedFheType> | EncryptedDecryptionAttestation<EciesScheme, SupportedFheType>>, reencryptKeypair: Secp256k1Keypair): Promise<Array<DecryptionAttestation<EciesScheme, SupportedFheType>>>;
93
+ export declare function decryptEncryptedAttestations(attestations: Array<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>, reencryptKeypair: XwingKeypair): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
94
94
  /**
95
95
  * Validates a handle format.
96
96
  * @param handle - The handle to validate