@opentdf/sdk 0.9.0-beta.91 → 0.9.0-beta.93

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (182) hide show
  1. package/dist/cjs/src/access/access-fetch.js +1 -2
  2. package/dist/cjs/src/access/access-rpc.js +1 -3
  3. package/dist/cjs/src/access.js +1 -14
  4. package/dist/cjs/src/auth/auth.js +13 -10
  5. package/dist/cjs/src/auth/dpop.js +121 -0
  6. package/dist/cjs/src/auth/oidc-clientcredentials-provider.js +37 -3
  7. package/dist/cjs/src/auth/oidc-externaljwt-provider.js +37 -3
  8. package/dist/cjs/src/auth/oidc-refreshtoken-provider.js +37 -3
  9. package/dist/cjs/src/auth/oidc.js +10 -8
  10. package/dist/cjs/src/auth/providers.js +35 -12
  11. package/dist/cjs/src/crypto/index.js +16 -2
  12. package/dist/cjs/src/crypto/pemPublicToCrypto.js +17 -11
  13. package/dist/cjs/src/opentdf.js +40 -10
  14. package/dist/cjs/tdf3/index.js +4 -2
  15. package/dist/cjs/tdf3/src/assertions.js +71 -31
  16. package/dist/cjs/tdf3/src/ciphers/aes-gcm-cipher.js +1 -1
  17. package/dist/cjs/tdf3/src/ciphers/symmetric-cipher-base.js +4 -2
  18. package/dist/cjs/tdf3/src/client/index.js +23 -33
  19. package/dist/cjs/tdf3/src/crypto/crypto-utils.js +12 -5
  20. package/dist/cjs/tdf3/src/crypto/declarations.js +1 -1
  21. package/dist/cjs/tdf3/src/crypto/index.js +849 -88
  22. package/dist/cjs/tdf3/src/crypto/jose/jwt-claims-set.js +11 -0
  23. package/dist/cjs/tdf3/src/crypto/jose/validate-crit.js +8 -0
  24. package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/buffer_utils.js +41 -0
  25. package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/epoch.js +6 -0
  26. package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/is_object.js +21 -0
  27. package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.js +112 -0
  28. package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/secs.js +60 -0
  29. package/dist/cjs/tdf3/src/crypto/jose/vendor/lib/validate_crit.js +38 -0
  30. package/dist/cjs/tdf3/src/crypto/jose/vendor/util/errors.js +135 -0
  31. package/dist/cjs/tdf3/src/crypto/jwt.js +183 -0
  32. package/dist/cjs/tdf3/src/crypto/salt.js +14 -8
  33. package/dist/cjs/tdf3/src/models/encryption-information.js +17 -20
  34. package/dist/cjs/tdf3/src/models/key-access.js +43 -63
  35. package/dist/cjs/tdf3/src/tdf.js +75 -75
  36. package/dist/cjs/tdf3/src/utils/index.js +5 -39
  37. package/dist/types/src/access/access-fetch.d.ts.map +1 -1
  38. package/dist/types/src/access/access-rpc.d.ts.map +1 -1
  39. package/dist/types/src/access.d.ts +0 -5
  40. package/dist/types/src/access.d.ts.map +1 -1
  41. package/dist/types/src/auth/auth.d.ts +9 -6
  42. package/dist/types/src/auth/auth.d.ts.map +1 -1
  43. package/dist/types/src/auth/dpop.d.ts +60 -0
  44. package/dist/types/src/auth/dpop.d.ts.map +1 -0
  45. package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts +3 -2
  46. package/dist/types/src/auth/oidc-clientcredentials-provider.d.ts.map +1 -1
  47. package/dist/types/src/auth/oidc-externaljwt-provider.d.ts +3 -2
  48. package/dist/types/src/auth/oidc-externaljwt-provider.d.ts.map +1 -1
  49. package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts +3 -2
  50. package/dist/types/src/auth/oidc-refreshtoken-provider.d.ts.map +1 -1
  51. package/dist/types/src/auth/oidc.d.ts +6 -4
  52. package/dist/types/src/auth/oidc.d.ts.map +1 -1
  53. package/dist/types/src/auth/providers.d.ts +5 -4
  54. package/dist/types/src/auth/providers.d.ts.map +1 -1
  55. package/dist/types/src/crypto/index.d.ts +2 -1
  56. package/dist/types/src/crypto/index.d.ts.map +1 -1
  57. package/dist/types/src/crypto/pemPublicToCrypto.d.ts +18 -0
  58. package/dist/types/src/crypto/pemPublicToCrypto.d.ts.map +1 -1
  59. package/dist/types/src/opentdf.d.ts +13 -4
  60. package/dist/types/src/opentdf.d.ts.map +1 -1
  61. package/dist/types/tdf3/index.d.ts +3 -3
  62. package/dist/types/tdf3/index.d.ts.map +1 -1
  63. package/dist/types/tdf3/src/assertions.d.ts +23 -8
  64. package/dist/types/tdf3/src/assertions.d.ts.map +1 -1
  65. package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts +3 -3
  66. package/dist/types/tdf3/src/ciphers/aes-gcm-cipher.d.ts.map +1 -1
  67. package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts +4 -4
  68. package/dist/types/tdf3/src/ciphers/symmetric-cipher-base.d.ts.map +1 -1
  69. package/dist/types/tdf3/src/client/builders.d.ts +2 -2
  70. package/dist/types/tdf3/src/client/builders.d.ts.map +1 -1
  71. package/dist/types/tdf3/src/client/index.d.ts +6 -5
  72. package/dist/types/tdf3/src/client/index.d.ts.map +1 -1
  73. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts +14 -4
  74. package/dist/types/tdf3/src/crypto/crypto-utils.d.ts.map +1 -1
  75. package/dist/types/tdf3/src/crypto/declarations.d.ts +283 -18
  76. package/dist/types/tdf3/src/crypto/declarations.d.ts.map +1 -1
  77. package/dist/types/tdf3/src/crypto/index.d.ts +105 -28
  78. package/dist/types/tdf3/src/crypto/index.d.ts.map +1 -1
  79. package/dist/types/tdf3/src/crypto/jose/jwt-claims-set.d.ts +3 -0
  80. package/dist/types/tdf3/src/crypto/jose/jwt-claims-set.d.ts.map +1 -0
  81. package/dist/types/tdf3/src/crypto/jose/validate-crit.d.ts +5 -0
  82. package/dist/types/tdf3/src/crypto/jose/validate-crit.d.ts.map +1 -0
  83. package/dist/types/tdf3/src/crypto/jose/vendor/lib/buffer_utils.d.ts +6 -0
  84. package/dist/types/tdf3/src/crypto/jose/vendor/lib/buffer_utils.d.ts.map +1 -0
  85. package/dist/types/tdf3/src/crypto/jose/vendor/lib/epoch.d.ts +3 -0
  86. package/dist/types/tdf3/src/crypto/jose/vendor/lib/epoch.d.ts.map +1 -0
  87. package/dist/types/tdf3/src/crypto/jose/vendor/lib/is_object.d.ts +3 -0
  88. package/dist/types/tdf3/src/crypto/jose/vendor/lib/is_object.d.ts.map +1 -0
  89. package/dist/types/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.d.ts +3 -0
  90. package/dist/types/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.d.ts.map +1 -0
  91. package/dist/types/tdf3/src/crypto/jose/vendor/lib/secs.d.ts +3 -0
  92. package/dist/types/tdf3/src/crypto/jose/vendor/lib/secs.d.ts.map +1 -0
  93. package/dist/types/tdf3/src/crypto/jose/vendor/lib/validate_crit.d.ts +3 -0
  94. package/dist/types/tdf3/src/crypto/jose/vendor/lib/validate_crit.d.ts.map +1 -0
  95. package/dist/types/tdf3/src/crypto/jose/vendor/util/errors.d.ts +76 -0
  96. package/dist/types/tdf3/src/crypto/jose/vendor/util/errors.d.ts.map +1 -0
  97. package/dist/types/tdf3/src/crypto/jwt.d.ts +76 -0
  98. package/dist/types/tdf3/src/crypto/jwt.d.ts.map +1 -0
  99. package/dist/types/tdf3/src/crypto/salt.d.ts +6 -1
  100. package/dist/types/tdf3/src/crypto/salt.d.ts.map +1 -1
  101. package/dist/types/tdf3/src/models/encryption-information.d.ts +4 -4
  102. package/dist/types/tdf3/src/models/encryption-information.d.ts.map +1 -1
  103. package/dist/types/tdf3/src/models/key-access.d.ts +8 -5
  104. package/dist/types/tdf3/src/models/key-access.d.ts.map +1 -1
  105. package/dist/types/tdf3/src/tdf.d.ts +8 -8
  106. package/dist/types/tdf3/src/tdf.d.ts.map +1 -1
  107. package/dist/types/tdf3/src/utils/index.d.ts +4 -3
  108. package/dist/types/tdf3/src/utils/index.d.ts.map +1 -1
  109. package/dist/web/src/access/access-fetch.js +3 -4
  110. package/dist/web/src/access/access-rpc.js +3 -5
  111. package/dist/web/src/access.js +1 -13
  112. package/dist/web/src/auth/auth.js +13 -10
  113. package/dist/web/src/auth/dpop.js +118 -0
  114. package/dist/web/src/auth/oidc-clientcredentials-provider.js +4 -3
  115. package/dist/web/src/auth/oidc-externaljwt-provider.js +4 -3
  116. package/dist/web/src/auth/oidc-refreshtoken-provider.js +4 -3
  117. package/dist/web/src/auth/oidc.js +11 -9
  118. package/dist/web/src/auth/providers.js +13 -12
  119. package/dist/web/src/crypto/index.js +4 -2
  120. package/dist/web/src/crypto/pemPublicToCrypto.js +11 -9
  121. package/dist/web/src/opentdf.js +7 -10
  122. package/dist/web/tdf3/index.js +3 -2
  123. package/dist/web/tdf3/src/assertions.js +71 -31
  124. package/dist/web/tdf3/src/ciphers/aes-gcm-cipher.js +1 -1
  125. package/dist/web/tdf3/src/ciphers/symmetric-cipher-base.js +4 -2
  126. package/dist/web/tdf3/src/client/index.js +25 -35
  127. package/dist/web/tdf3/src/crypto/crypto-utils.js +12 -5
  128. package/dist/web/tdf3/src/crypto/declarations.js +1 -1
  129. package/dist/web/tdf3/src/crypto/index.js +830 -84
  130. package/dist/web/tdf3/src/crypto/jose/jwt-claims-set.js +5 -0
  131. package/dist/web/tdf3/src/crypto/jose/validate-crit.js +3 -0
  132. package/dist/web/tdf3/src/crypto/jose/vendor/lib/buffer_utils.js +35 -0
  133. package/dist/web/tdf3/src/crypto/jose/vendor/lib/epoch.js +4 -0
  134. package/dist/web/tdf3/src/crypto/jose/vendor/lib/is_object.js +19 -0
  135. package/dist/web/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.js +107 -0
  136. package/dist/web/tdf3/src/crypto/jose/vendor/lib/secs.js +58 -0
  137. package/dist/web/tdf3/src/crypto/jose/vendor/lib/validate_crit.js +36 -0
  138. package/dist/web/tdf3/src/crypto/jose/vendor/util/errors.js +117 -0
  139. package/dist/web/tdf3/src/crypto/jwt.js +174 -0
  140. package/dist/web/tdf3/src/crypto/salt.js +13 -7
  141. package/dist/web/tdf3/src/models/encryption-information.js +11 -14
  142. package/dist/web/tdf3/src/models/key-access.js +44 -31
  143. package/dist/web/tdf3/src/tdf.js +71 -71
  144. package/dist/web/tdf3/src/utils/index.js +5 -6
  145. package/package.json +11 -4
  146. package/src/access/access-fetch.ts +2 -8
  147. package/src/access/access-rpc.ts +0 -7
  148. package/src/access.ts +0 -17
  149. package/src/auth/auth.ts +21 -12
  150. package/src/auth/dpop.ts +222 -0
  151. package/src/auth/oidc-clientcredentials-provider.ts +23 -15
  152. package/src/auth/oidc-externaljwt-provider.ts +23 -15
  153. package/src/auth/oidc-refreshtoken-provider.ts +23 -15
  154. package/src/auth/oidc.ts +21 -10
  155. package/src/auth/providers.ts +46 -29
  156. package/src/crypto/index.ts +21 -1
  157. package/src/crypto/pemPublicToCrypto.ts +11 -9
  158. package/src/opentdf.ts +19 -14
  159. package/tdf3/index.ts +32 -5
  160. package/tdf3/src/assertions.ts +99 -30
  161. package/tdf3/src/ciphers/aes-gcm-cipher.ts +7 -2
  162. package/tdf3/src/ciphers/symmetric-cipher-base.ts +7 -4
  163. package/tdf3/src/client/builders.ts +2 -2
  164. package/tdf3/src/client/index.ts +60 -59
  165. package/tdf3/src/crypto/crypto-utils.ts +15 -8
  166. package/tdf3/src/crypto/declarations.ts +338 -22
  167. package/tdf3/src/crypto/index.ts +1021 -118
  168. package/tdf3/src/crypto/jose/jwt-claims-set.ts +10 -0
  169. package/tdf3/src/crypto/jose/validate-crit.ts +9 -0
  170. package/tdf3/src/crypto/jose/vendor/lib/buffer_utils.ts +34 -0
  171. package/tdf3/src/crypto/jose/vendor/lib/epoch.ts +3 -0
  172. package/tdf3/src/crypto/jose/vendor/lib/is_object.ts +18 -0
  173. package/tdf3/src/crypto/jose/vendor/lib/jwt_claims_set.ts +106 -0
  174. package/tdf3/src/crypto/jose/vendor/lib/secs.ts +57 -0
  175. package/tdf3/src/crypto/jose/vendor/lib/validate_crit.ts +35 -0
  176. package/tdf3/src/crypto/jose/vendor/util/errors.ts +101 -0
  177. package/tdf3/src/crypto/jwt.ts +256 -0
  178. package/tdf3/src/crypto/salt.ts +16 -8
  179. package/tdf3/src/models/encryption-information.ts +14 -21
  180. package/tdf3/src/models/key-access.ts +57 -41
  181. package/tdf3/src/tdf.ts +110 -93
  182. package/tdf3/src/utils/index.ts +5 -6
@@ -10,8 +10,12 @@ import { ConfigurationError, DecryptError } from '../../../src/errors.js';
10
10
  import { formatAsPem, removePemFormatting } from './crypto-utils.js';
11
11
  import { encodeArrayBuffer as hexEncode } from '../../../src/encodings/hex.js';
12
12
  import { decodeArrayBuffer as base64Decode } from '../../../src/encodings/base64.js';
13
+ import { exportSPKI, importX509 } from 'jose';
14
+ import { toJwsAlg, guessAlgorithmName, guessCurveName, } from '../../../src/crypto/pemPublicToCrypto.js';
15
+ import { keySplit, keyMerge } from '../utils/keysplit.js';
13
16
  // Used to pass into native crypto functions
14
- const METHODS = ['encrypt', 'decrypt'];
17
+ const ENC_DEC_METHODS = ['encrypt', 'decrypt'];
18
+ const SIGN_VERIFY_METHODS = ['sign', 'verify'];
15
19
  export const isSupported = typeof globalThis?.crypto !== 'undefined';
16
20
  export const method = 'http://www.w3.org/2001/04/xmlenc#aes256-cbc';
17
21
  export const name = 'BrowserNativeCryptoService';
@@ -46,11 +50,93 @@ export function rsaPkcs1Sha256(modulusLength = MIN_ASYMMETRIC_KEY_SIZE_BITS) {
46
50
  };
47
51
  }
48
52
  /**
49
- * Generate a random hex key
50
- * @return New key as a hex string
53
+ * Generate a random symmetric key (opaque).
54
+ * @param length - Key length in bytes (default 32 for AES-256)
55
+ * @return Opaque symmetric key
51
56
  */
52
57
  export async function generateKey(length) {
53
- return randomBytesAsHex(length || 32);
58
+ const keyBytes = await randomBytes(length || 32);
59
+ return wrapSymmetricKey(keyBytes);
60
+ }
61
+ // ============================================================
62
+ // Opaque Key Wrapping/Unwrapping Helpers
63
+ // ============================================================
64
+ /**
65
+ * Wrap a CryptoKey as an opaque PublicKey.
66
+ * @internal
67
+ */
68
+ function wrapPublicKey(key, algorithm) {
69
+ const result = {
70
+ _brand: 'PublicKey',
71
+ algorithm,
72
+ _internal: key,
73
+ };
74
+ if (algorithm.startsWith('rsa:')) {
75
+ result.modulusBits = parseInt(algorithm.split(':')[1], 10);
76
+ }
77
+ else if (algorithm.startsWith('ec:')) {
78
+ const curvePart = algorithm.split(':')[1];
79
+ result.curve =
80
+ curvePart === 'secp256r1'
81
+ ? 'P-256'
82
+ : curvePart === 'secp384r1'
83
+ ? 'P-384'
84
+ : curvePart === 'secp521r1'
85
+ ? 'P-521'
86
+ : undefined;
87
+ }
88
+ return result;
89
+ }
90
+ /**
91
+ * Wrap a CryptoKey as an opaque PrivateKey.
92
+ * @internal
93
+ */
94
+ function wrapPrivateKey(key, algorithm) {
95
+ const result = {
96
+ _brand: 'PrivateKey',
97
+ algorithm,
98
+ _internal: key,
99
+ };
100
+ if (algorithm.startsWith('rsa:')) {
101
+ result.modulusBits = parseInt(algorithm.split(':')[1], 10);
102
+ }
103
+ else if (algorithm.startsWith('ec:')) {
104
+ const curvePart = algorithm.split(':')[1];
105
+ result.curve =
106
+ curvePart === 'secp256r1'
107
+ ? 'P-256'
108
+ : curvePart === 'secp384r1'
109
+ ? 'P-384'
110
+ : curvePart === 'secp521r1'
111
+ ? 'P-521'
112
+ : undefined;
113
+ }
114
+ return result;
115
+ }
116
+ /**
117
+ * Unwrap an opaque key to get the internal CryptoKey.
118
+ * @internal
119
+ */
120
+ function unwrapKey(key) {
121
+ return key._internal;
122
+ }
123
+ /**
124
+ * Wrap raw key bytes as an opaque SymmetricKey.
125
+ * @internal
126
+ */
127
+ function wrapSymmetricKey(keyBytes) {
128
+ return {
129
+ _brand: 'SymmetricKey',
130
+ length: keyBytes.length * 8, // bits
131
+ _internal: keyBytes,
132
+ };
133
+ }
134
+ /**
135
+ * Unwrap an opaque SymmetricKey to get raw bytes.
136
+ * @internal
137
+ */
138
+ function unwrapSymmetricKey(key) {
139
+ return key._internal;
54
140
  }
55
141
  /**
56
142
  * Generate an RSA key pair
@@ -58,61 +144,60 @@ export async function generateKey(length) {
58
144
  * @param size in bits
59
145
  */
60
146
  export async function generateKeyPair(size) {
61
- const algoDomString = rsaOaepSha1(size || MIN_ASYMMETRIC_KEY_SIZE_BITS);
62
- return crypto.subtle.generateKey(algoDomString, true, METHODS);
147
+ const keySize = size || MIN_ASYMMETRIC_KEY_SIZE_BITS;
148
+ const algoDomString = rsaOaepSha1(keySize);
149
+ const keyPair = await crypto.subtle.generateKey(algoDomString, true, ENC_DEC_METHODS);
150
+ // Map to supported algorithm sizes
151
+ let algorithm;
152
+ if (keySize === 2048) {
153
+ algorithm = 'rsa:2048';
154
+ }
155
+ else if (keySize === 4096) {
156
+ algorithm = 'rsa:4096';
157
+ }
158
+ else {
159
+ throw new ConfigurationError(`Unsupported RSA key size: ${keySize}. Only 2048 and 4096 are supported.`);
160
+ }
161
+ return {
162
+ publicKey: wrapPublicKey(keyPair.publicKey, algorithm),
163
+ privateKey: wrapPrivateKey(keyPair.privateKey, algorithm),
164
+ };
63
165
  }
64
166
  /**
65
167
  * Generate an RSA key pair suitable for signatures
66
168
  * @see {@link https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/generateKey}
67
169
  */
68
170
  export async function generateSigningKeyPair() {
69
- return crypto.subtle.generateKey({
70
- name: 'RSASSA-PKCS1-v1_5',
71
- hash: 'SHA-256',
72
- modulusLength: 2048,
73
- publicExponent: new Uint8Array([0x01, 0x00, 0x01]),
74
- }, true, ['sign', 'verify']);
75
- }
76
- export async function cryptoToPemPair(keysMaybe) {
77
- const keys = keysMaybe;
78
- if (!keys.privateKey || !keys.publicKey) {
79
- // These are only ever generated here, so this should not happen
80
- throw new Error('internal: invalid keys');
81
- }
82
- const [exPublic, exPrivate] = await Promise.all([
83
- crypto.subtle.exportKey('spki', keys.publicKey),
84
- crypto.subtle.exportKey('pkcs8', keys.privateKey),
85
- ]);
171
+ const rsaParams = rsaPkcs1Sha256(2048);
172
+ const keyPair = await crypto.subtle.generateKey(rsaParams, true, SIGN_VERIFY_METHODS);
173
+ const algorithm = 'rsa:2048';
86
174
  return {
87
- publicKey: formatAsPem(exPublic, 'PUBLIC KEY'),
88
- privateKey: formatAsPem(exPrivate, 'PRIVATE KEY'),
175
+ publicKey: wrapPublicKey(keyPair.publicKey, algorithm),
176
+ privateKey: wrapPrivateKey(keyPair.privateKey, algorithm),
89
177
  };
90
178
  }
91
179
  /**
92
- * Encrypt using a public key
93
- * @param payload Payload to encrypt
94
- * @param publicKey PEM formatted public key
180
+ * Encrypt using a public key (RSA-OAEP).
181
+ * Accepts Binary or SymmetricKey for key wrapping.
182
+ * @param payload Payload to encrypt (Binary) or symmetric key to wrap (SymmetricKey)
183
+ * @param publicKey Opaque public key
95
184
  * @return Encrypted payload
96
185
  */
97
186
  export async function encryptWithPublicKey(payload, publicKey) {
98
- console.assert(typeof payload === 'object');
99
- console.assert(typeof publicKey === 'string');
100
- const algoDomString = rsaOaepSha1();
101
- // Web Crypto APIs don't work with PEM formatted strings
102
- publicKey = removePemFormatting(publicKey);
103
- const keyBuffer = base64Decode(publicKey);
104
- const cryptoKey = await crypto.subtle.importKey('spki', keyBuffer, algoDomString, false, [
105
- 'encrypt',
106
- ]);
107
- const result = await crypto.subtle.encrypt({ name: 'RSA-OAEP' }, cryptoKey, payload.asArrayBuffer());
187
+ let payloadBuffer;
188
+ // Handle SymmetricKey unwrapping
189
+ if ('_brand' in payload && payload._brand === 'SymmetricKey') {
190
+ // Pass Uint8Array directly — Web Crypto respects byteOffset/byteLength on typed array views.
191
+ payloadBuffer = unwrapSymmetricKey(payload);
192
+ }
193
+ else {
194
+ // Binary payload
195
+ payloadBuffer = payload.asArrayBuffer();
196
+ }
197
+ const cryptoKey = unwrapKey(publicKey);
198
+ const result = await crypto.subtle.encrypt({ name: 'RSA-OAEP' }, cryptoKey, payloadBuffer);
108
199
  return Binary.fromArrayBuffer(result);
109
200
  }
110
- /**
111
- * Generate a 16-byte initialization vector
112
- */
113
- export async function generateInitializationVector(length) {
114
- return randomBytesAsHex(length || 16);
115
- }
116
201
  export async function randomBytes(byteLength) {
117
202
  const r = new Uint8Array(byteLength);
118
203
  crypto.getRandomValues(r);
@@ -137,25 +222,20 @@ export async function randomBytesAsHex(length) {
137
222
  /**
138
223
  * Decrypt a public-key encrypted payload with a private key
139
224
  * @param encryptedPayload Payload to decrypt
140
- * @param privateKey PEM formatted private keynpmv
225
+ * @param privateKey Opaque private key
141
226
  * @return Decrypted payload
142
227
  */
143
228
  export async function decryptWithPrivateKey(encryptedPayload, privateKey) {
144
229
  console.assert(typeof encryptedPayload === 'object', 'encryptedPayload must be object');
145
- console.assert(typeof privateKey === 'string', 'privateKey must be string');
146
- const algoDomString = rsaOaepSha1();
147
- // Web Crypto APIs don't work with PEM formatted strings
148
- const keyDataString = removePemFormatting(privateKey);
149
- const keyData = base64Decode(keyDataString);
150
- const key = await crypto.subtle.importKey('pkcs8', keyData, algoDomString, false, ['decrypt']);
151
- const payload = await crypto.subtle.decrypt({ name: 'RSA-OAEP' }, key, encryptedPayload.asArrayBuffer());
230
+ const cryptoKey = unwrapKey(privateKey);
231
+ const payload = await crypto.subtle.decrypt({ name: 'RSA-OAEP' }, cryptoKey, encryptedPayload.asArrayBuffer());
152
232
  const bufferView = new Uint8Array(payload);
153
233
  return Binary.fromArrayBuffer(bufferView.buffer);
154
234
  }
155
235
  /**
156
236
  * Decrypt content synchronously
157
237
  * @param payload The payload to decrypt
158
- * @param key The encryption key
238
+ * @param key The symmetric encryption key (opaque)
159
239
  * @param iv The initialization vector
160
240
  * @param algorithm The algorithm to use for encryption
161
241
  * @param authTag The authentication tag for authenticated crypto.
@@ -177,9 +257,20 @@ async function _doEncrypt(payload, key, iv, algorithm) {
177
257
  console.assert(payload != null);
178
258
  console.assert(key != null);
179
259
  console.assert(iv != null);
180
- const payloadBuffer = payload.asArrayBuffer();
260
+ // Handle both Binary and SymmetricKey payloads
261
+ let payloadBuffer;
262
+ if ('_brand' in payload && payload._brand === 'SymmetricKey') {
263
+ // Pass Uint8Array directly — Web Crypto respects byteOffset/byteLength on typed array views.
264
+ payloadBuffer = unwrapSymmetricKey(payload);
265
+ }
266
+ else {
267
+ // Binary payload
268
+ payloadBuffer = payload.asArrayBuffer();
269
+ }
181
270
  const algoDomString = getSymmetricAlgoDomString(iv, algorithm);
182
- const importedKey = await _importKey(key, algoDomString);
271
+ // Unwrap symmetric key to get raw bytes
272
+ const keyBytes = unwrapSymmetricKey(key);
273
+ const importedKey = await _importKey(keyBytes, algoDomString);
183
274
  const encrypted = await crypto.subtle.encrypt(algoDomString, importedKey, payloadBuffer);
184
275
  if (algoDomString.name === 'AES-GCM') {
185
276
  return {
@@ -205,7 +296,9 @@ async function _doDecrypt(payload, key, iv, algorithm, authTag) {
205
296
  payloadBuffer = gcmPayload.buffer;
206
297
  }
207
298
  const algoDomString = getSymmetricAlgoDomString(iv, algorithm);
208
- const importedKey = await _importKey(key, algoDomString);
299
+ // Unwrap symmetric key to get raw bytes
300
+ const keyBytes = unwrapSymmetricKey(key);
301
+ const importedKey = await _importKey(keyBytes, algoDomString);
209
302
  algoDomString.iv = iv.asArrayBuffer();
210
303
  const decrypted = await crypto.subtle
211
304
  .decrypt(algoDomString, importedKey, payloadBuffer)
@@ -218,8 +311,8 @@ async function _doDecrypt(payload, key, iv, algorithm, authTag) {
218
311
  });
219
312
  return { payload: Binary.fromArrayBuffer(decrypted) };
220
313
  }
221
- function _importKey(key, algorithm) {
222
- return crypto.subtle.importKey('raw', key.asArrayBuffer(), algorithm, true, METHODS);
314
+ function _importKey(keyBytes, algorithm) {
315
+ return crypto.subtle.importKey('raw', keyBytes, algorithm, true, ENC_DEC_METHODS);
223
316
  }
224
317
  /**
225
318
  * Get a DOMString representing the algorithm to use for a crypto
@@ -243,27 +336,6 @@ function getSymmetricAlgoDomString(iv, algorithm) {
243
336
  * @param content String content
244
337
  * @return Hex hash
245
338
  */
246
- export async function sha256(content) {
247
- const buffer = new TextEncoder().encode(content);
248
- const hashBuffer = await crypto.subtle.digest('SHA-256', buffer);
249
- return hexEncode(hashBuffer);
250
- }
251
- /**
252
- * Create an HMAC SHA256 hash
253
- * @param key Key string
254
- * @param content Content string
255
- * @return Hex hash
256
- */
257
- export async function hmac(key, content) {
258
- const contentBuffer = new TextEncoder().encode(content);
259
- const keyBuffer = hex2Ab(key);
260
- const cryptoKey = await crypto.subtle.importKey('raw', keyBuffer, {
261
- name: 'HMAC',
262
- hash: { name: 'SHA-256' },
263
- }, true, ['sign', 'verify']);
264
- const hashBuffer = await crypto.subtle.sign('HMAC', cryptoKey, contentBuffer);
265
- return hexEncode(hashBuffer);
266
- }
267
339
  /**
268
340
  * Create an ArrayBuffer from a hex string.
269
341
  * https://developers.google.com/web/updates/2012/06/How-to-convert-ArrayBuffer-to-and-from-String?hl=en
@@ -277,20 +349,694 @@ export function hex2Ab(hex) {
277
349
  }
278
350
  return buffer;
279
351
  }
352
+ /**
353
+ * Get the Web Crypto algorithm parameters for a signing algorithm.
354
+ */
355
+ function getSigningAlgorithmParams(algorithm) {
356
+ switch (algorithm) {
357
+ case 'RS256':
358
+ return {
359
+ importParams: { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' },
360
+ signParams: 'RSASSA-PKCS1-v1_5',
361
+ };
362
+ case 'ES256':
363
+ return {
364
+ importParams: { name: 'ECDSA', namedCurve: 'P-256' },
365
+ signParams: { name: 'ECDSA', hash: 'SHA-256' },
366
+ };
367
+ case 'ES384':
368
+ return {
369
+ importParams: { name: 'ECDSA', namedCurve: 'P-384' },
370
+ signParams: { name: 'ECDSA', hash: 'SHA-384' },
371
+ };
372
+ case 'ES512':
373
+ return {
374
+ importParams: { name: 'ECDSA', namedCurve: 'P-521' },
375
+ signParams: { name: 'ECDSA', hash: 'SHA-512' },
376
+ };
377
+ default:
378
+ throw new ConfigurationError(`Unsupported signing algorithm: ${algorithm}`);
379
+ }
380
+ }
381
+ /**
382
+ * Convert IEEE P1363 signature format (used by WebCrypto ECDSA) to DER format (used by JWT).
383
+ * RS256 signatures don't need conversion.
384
+ */
385
+ function ieeeP1363ToDer(signature, algorithm) {
386
+ if (algorithm === 'RS256') {
387
+ return signature;
388
+ }
389
+ // IEEE P1363: r || s where each is padded to key size
390
+ const halfLen = signature.length / 2;
391
+ const r = signature.slice(0, halfLen);
392
+ const s = signature.slice(halfLen);
393
+ // Remove leading zeros but keep one if the high bit is set
394
+ const trimLeadingZeros = (arr) => {
395
+ let i = 0;
396
+ while (i < arr.length - 1 && arr[i] === 0)
397
+ i++;
398
+ return arr.slice(i);
399
+ };
400
+ let rTrimmed = trimLeadingZeros(r);
401
+ let sTrimmed = trimLeadingZeros(s);
402
+ // Add leading zero if high bit is set (to keep positive in DER)
403
+ if (rTrimmed[0] & 0x80) {
404
+ const padded = new Uint8Array(rTrimmed.length + 1);
405
+ padded.set(rTrimmed, 1);
406
+ rTrimmed = padded;
407
+ }
408
+ if (sTrimmed[0] & 0x80) {
409
+ const padded = new Uint8Array(sTrimmed.length + 1);
410
+ padded.set(sTrimmed, 1);
411
+ sTrimmed = padded;
412
+ }
413
+ // DER SEQUENCE: 0x30 [length] [r INTEGER] [s INTEGER]
414
+ // INTEGER: 0x02 [length] [value]
415
+ const rDer = new Uint8Array([0x02, rTrimmed.length, ...rTrimmed]);
416
+ const sDer = new Uint8Array([0x02, sTrimmed.length, ...sTrimmed]);
417
+ const seqLen = rDer.length + sDer.length;
418
+ // DER length: short-form for < 128, long-form (0x81 nn) for 128-255.
419
+ // ECDSA sequences never exceed 255 bytes for any supported curve.
420
+ const lenBytes = seqLen < 128 ? new Uint8Array([seqLen]) : new Uint8Array([0x81, seqLen]);
421
+ const result = new Uint8Array(1 + lenBytes.length + seqLen);
422
+ result[0] = 0x30;
423
+ result.set(lenBytes, 1);
424
+ result.set(rDer, 1 + lenBytes.length);
425
+ result.set(sDer, 1 + lenBytes.length + rDer.length);
426
+ return result;
427
+ }
428
+ /**
429
+ * Convert DER signature format (used by JWT) to IEEE P1363 format (used by WebCrypto ECDSA).
430
+ * RS256 signatures don't need conversion.
431
+ */
432
+ function derToIeeeP1363(signature, algorithm) {
433
+ if (algorithm === 'RS256') {
434
+ return signature;
435
+ }
436
+ // Determine the expected component length based on algorithm
437
+ let componentLen;
438
+ switch (algorithm) {
439
+ case 'ES256':
440
+ componentLen = 32;
441
+ break;
442
+ case 'ES384':
443
+ componentLen = 48;
444
+ break;
445
+ case 'ES512':
446
+ componentLen = 66;
447
+ break;
448
+ default:
449
+ throw new ConfigurationError(`Unsupported algorithm for DER conversion: ${algorithm}`);
450
+ }
451
+ // Parse DER: SEQUENCE { INTEGER r, INTEGER s }
452
+ if (signature[0] !== 0x30) {
453
+ throw new ConfigurationError('Invalid DER signature: expected SEQUENCE');
454
+ }
455
+ // Skip SEQUENCE tag, then parse DER length (short- or long-form).
456
+ let offset = 1;
457
+ if (signature[offset] & 0x80) {
458
+ // Long-form: low 7 bits = number of subsequent length bytes.
459
+ const lenBytesCount = signature[offset] & 0x7f;
460
+ if (lenBytesCount === 0 || lenBytesCount > 4) {
461
+ throw new ConfigurationError('Invalid DER signature: invalid long-form length');
462
+ }
463
+ offset += 1 + lenBytesCount;
464
+ if (offset > signature.length) {
465
+ throw new ConfigurationError('Invalid DER signature: length bytes exceed signature length');
466
+ }
467
+ }
468
+ else {
469
+ // Short-form: single length byte.
470
+ offset += 1;
471
+ }
472
+ // Parse r INTEGER
473
+ if (signature[offset] !== 0x02) {
474
+ throw new ConfigurationError('Invalid DER signature: expected INTEGER for r');
475
+ }
476
+ const rLen = signature[offset + 1];
477
+ offset += 2;
478
+ let r = signature.slice(offset, offset + rLen);
479
+ offset += rLen;
480
+ // Parse s INTEGER
481
+ if (signature[offset] !== 0x02) {
482
+ throw new ConfigurationError('Invalid DER signature: expected INTEGER for s');
483
+ }
484
+ const sLen = signature[offset + 1];
485
+ offset += 2;
486
+ let s = signature.slice(offset, offset + sLen);
487
+ // Remove leading zero padding if present
488
+ if (r[0] === 0 && r.length > componentLen) {
489
+ r = r.slice(1);
490
+ }
491
+ if (s[0] === 0 && s.length > componentLen) {
492
+ s = s.slice(1);
493
+ }
494
+ // Pad to component length
495
+ const result = new Uint8Array(componentLen * 2);
496
+ result.set(r, componentLen - r.length);
497
+ result.set(s, componentLen * 2 - s.length);
498
+ return result;
499
+ }
500
+ /**
501
+ * Sign data with an asymmetric private key.
502
+ */
503
+ export async function sign(data, privateKey, algorithm) {
504
+ const { signParams } = getSigningAlgorithmParams(algorithm);
505
+ // Unwrap the internal CryptoKey
506
+ const key = unwrapKey(privateKey);
507
+ // Sign the data
508
+ const signature = await crypto.subtle.sign(signParams, key, data);
509
+ // Convert from IEEE P1363 to DER for EC algorithms
510
+ return ieeeP1363ToDer(new Uint8Array(signature), algorithm);
511
+ }
512
+ /**
513
+ * Verify signature with an asymmetric public key.
514
+ */
515
+ export async function verify(data, signature, publicKey, algorithm) {
516
+ const { signParams } = getSigningAlgorithmParams(algorithm);
517
+ // Unwrap the internal CryptoKey
518
+ const key = unwrapKey(publicKey);
519
+ // Convert from DER to IEEE P1363 for EC algorithms
520
+ const ieeeSignature = derToIeeeP1363(signature, algorithm);
521
+ // Verify the signature
522
+ return crypto.subtle.verify(signParams, key, ieeeSignature, data);
523
+ }
524
+ /**
525
+ * Compute hash digest.
526
+ */
527
+ export async function digest(algorithm, data) {
528
+ // Validate algorithm and map to Web Crypto name
529
+ const validAlgorithms = ['SHA-256', 'SHA-384', 'SHA-512'];
530
+ if (!validAlgorithms.includes(algorithm)) {
531
+ throw new ConfigurationError(`Unsupported hash algorithm: ${algorithm}`);
532
+ }
533
+ const hashBuffer = await crypto.subtle.digest(algorithm, data);
534
+ return new Uint8Array(hashBuffer);
535
+ }
536
+ /**
537
+ * Extract PEM public key from X.509 certificate or return PEM key as-is.
538
+ *
539
+ * @param certOrPem - A PEM-encoded X.509 certificate or public key
540
+ * @param jwaAlgorithm - JWA algorithm hint for certificate parsing (RS256, RS512, ES256, ES384, ES512).
541
+ * If not provided for a certificate, will attempt to auto-detect from OIDs.
542
+ */
543
+ export async function extractPublicKeyPem(certOrPem, jwaAlgorithm) {
544
+ // If it's a certificate, extract the public key
545
+ if (certOrPem.includes('-----BEGIN CERTIFICATE-----')) {
546
+ let alg = jwaAlgorithm;
547
+ if (!alg) {
548
+ // Auto-detect algorithm from certificate OIDs
549
+ const certBody = certOrPem.replace(/-----(BEGIN|END) CERTIFICATE-----|\s/g, '');
550
+ const certBytes = base64Decode(certBody);
551
+ const hex = hexEncode(certBytes);
552
+ alg = toJwsAlg(hex);
553
+ }
554
+ const cert = await importX509(certOrPem, alg, { extractable: true });
555
+ return exportSPKI(cert);
556
+ }
557
+ // If it's already a PEM public key, return as-is
558
+ if (certOrPem.includes('-----BEGIN PUBLIC KEY-----')) {
559
+ return certOrPem;
560
+ }
561
+ throw new ConfigurationError('Input must be a PEM-encoded certificate or public key');
562
+ }
563
+ /**
564
+ * Map ECCurve to Web Crypto named curve.
565
+ */
566
+ function curveToNamedCurve(curve) {
567
+ switch (curve) {
568
+ case 'P-256':
569
+ return 'P-256';
570
+ case 'P-384':
571
+ return 'P-384';
572
+ case 'P-521':
573
+ return 'P-521';
574
+ default:
575
+ throw new ConfigurationError(`Unsupported curve: ${curve}`);
576
+ }
577
+ }
578
+ /**
579
+ * Generate an EC key pair for ECDH key agreement.
580
+ */
581
+ export async function generateECKeyPair(curve = 'P-256') {
582
+ const namedCurve = curveToNamedCurve(curve);
583
+ // Generate key pair for ECDH key agreement
584
+ const keyPair = await crypto.subtle.generateKey({ name: 'ECDH', namedCurve }, true, [
585
+ 'deriveBits',
586
+ ]);
587
+ // Map to KeyAlgorithm literal type
588
+ let algorithm;
589
+ switch (namedCurve) {
590
+ case 'P-256':
591
+ algorithm = 'ec:secp256r1';
592
+ break;
593
+ case 'P-384':
594
+ algorithm = 'ec:secp384r1';
595
+ break;
596
+ case 'P-521':
597
+ algorithm = 'ec:secp521r1';
598
+ break;
599
+ default:
600
+ throw new ConfigurationError(`Unsupported curve: ${namedCurve}`);
601
+ }
602
+ return {
603
+ publicKey: wrapPublicKey(keyPair.publicKey, algorithm),
604
+ privateKey: wrapPrivateKey(keyPair.privateKey, algorithm),
605
+ };
606
+ }
607
+ /**
608
+ * Supported EC curves.
609
+ */
610
+ const SUPPORTED_EC_CURVES = ['P-256', 'P-384', 'P-521'];
611
+ /**
612
+ * Decode base64url string and return byte length.
613
+ * Uses the existing base64 decoder which handles both standard and URL-safe encoding.
614
+ */
615
+ function base64urlByteLength(base64url) {
616
+ // Add padding if needed (base64url omits padding)
617
+ const padding = (4 - (base64url.length % 4)) % 4;
618
+ const padded = base64url + '='.repeat(padding);
619
+ return base64Decode(padded).byteLength;
620
+ }
621
+ /**
622
+ * Extract EC curve from a public key by parsing ASN.1 OIDs.
623
+ * Reuses the existing guessCurveName function that checks for curve OIDs.
624
+ */
625
+ function extractEcCurveFromPublicKey(keyData) {
626
+ // Convert to hex for OID parsing
627
+ const hexKey = hexEncode(keyData);
628
+ // Use existing OID parser (returns 'P-256', 'P-384', or 'P-521')
629
+ const curveName = guessCurveName(hexKey);
630
+ return curveName;
631
+ }
632
+ /**
633
+ * Perform ECDH key agreement followed by HKDF key derivation.
634
+ * Returns opaque symmetric key for symmetric encryption.
635
+ */
636
+ export async function deriveKeyFromECDH(privateKey, publicKey, hkdfParams) {
637
+ // Unwrap the internal CryptoKeys
638
+ const privateKeyCrypto = unwrapKey(privateKey);
639
+ const publicKeyCrypto = unwrapKey(publicKey);
640
+ // Get curve from key metadata
641
+ const curve = publicKey.curve;
642
+ if (!curve) {
643
+ throw new ConfigurationError('EC curve not found on public key');
644
+ }
645
+ // Determine bits based on curve
646
+ const curveBits = {
647
+ 'P-256': 256,
648
+ 'P-384': 384,
649
+ 'P-521': 528, // P-521 derives 528 bits (66 bytes)
650
+ };
651
+ const bits = curveBits[curve];
652
+ // Perform ECDH to get shared secret
653
+ const sharedSecret = await crypto.subtle.deriveBits({ name: 'ECDH', public: publicKeyCrypto }, privateKeyCrypto, bits);
654
+ // Import shared secret as HKDF key material
655
+ const hkdfKey = await crypto.subtle.importKey('raw', sharedSecret, 'HKDF', false, ['deriveKey']);
656
+ // Derive the final key using HKDF
657
+ const keyLength = hkdfParams.keyLength ?? 256;
658
+ const derivedKey = await crypto.subtle.deriveKey({
659
+ name: 'HKDF',
660
+ hash: hkdfParams.hash,
661
+ salt: hkdfParams.salt,
662
+ info: hkdfParams.info ?? new Uint8Array(0),
663
+ }, hkdfKey, { name: 'AES-GCM', length: keyLength }, true, ['encrypt', 'decrypt']);
664
+ // Export the derived key as raw bytes and wrap as SymmetricKey
665
+ const keyBytes = await crypto.subtle.exportKey('raw', derivedKey);
666
+ return wrapSymmetricKey(new Uint8Array(keyBytes));
667
+ }
668
+ /**
669
+ * Compute HMAC-SHA256 of data with a symmetric key.
670
+ */
671
+ export async function hmac(data, key) {
672
+ // Unwrap symmetric key to get raw bytes
673
+ const keyBytes = unwrapSymmetricKey(key);
674
+ const cryptoKey = await crypto.subtle.importKey('raw', keyBytes, { name: 'HMAC', hash: 'SHA-256' }, false, ['sign']);
675
+ const signature = await crypto.subtle.sign('HMAC', cryptoKey, data);
676
+ return new Uint8Array(signature);
677
+ }
678
+ /**
679
+ * Verify HMAC-SHA256. Standalone utility — not part of CryptoService interface.
680
+ */
681
+ export async function verifyHmac(data, signature, key) {
682
+ const keyBytes = unwrapSymmetricKey(key);
683
+ const cryptoKey = await crypto.subtle.importKey('raw', keyBytes, { name: 'HMAC', hash: 'SHA-256' }, false, ['verify']);
684
+ return crypto.subtle.verify('HMAC', cryptoKey, signature, data);
685
+ }
686
+ /**
687
+ * Extract RSA modulus bit length by importing key and exporting as JWK.
688
+ * Uses Web Crypto's built-in ASN.1 parsing for robustness.
689
+ */
690
+ async function extractRsaModulusBitLength(keyData) {
691
+ const key = await crypto.subtle.importKey('spki', keyData, { name: 'RSA-OAEP', hash: 'SHA-256' }, true, // extractable
692
+ ['encrypt']);
693
+ const jwk = await crypto.subtle.exportKey('jwk', key);
694
+ if (!jwk.n) {
695
+ throw new ConfigurationError('Invalid RSA key: missing modulus');
696
+ }
697
+ // JWK 'n' is base64url-encoded modulus
698
+ // Decode and count bytes, multiply by 8 for bits
699
+ return base64urlByteLength(jwk.n) * 8;
700
+ }
701
+ /**
702
+ * Import and validate a PEM public key, returning algorithm info.
703
+ * Uses JWK export for robust key parameter detection.
704
+ */
705
+ export async function parsePublicKeyPem(pem) {
706
+ // First extract public key if it's a certificate
707
+ let publicKeyPem = pem;
708
+ if (pem.includes('-----BEGIN CERTIFICATE-----')) {
709
+ publicKeyPem = await extractPublicKeyPem(pem);
710
+ }
711
+ if (!publicKeyPem.includes('-----BEGIN PUBLIC KEY-----')) {
712
+ throw new ConfigurationError('Input must be a PEM-encoded public key or certificate');
713
+ }
714
+ const keyData = base64Decode(removePemFormatting(publicKeyPem));
715
+ // Try RSA first - use JWK export to get modulus size
716
+ try {
717
+ const modulusBits = await extractRsaModulusBitLength(keyData);
718
+ let algorithm;
719
+ if (modulusBits < MIN_ASYMMETRIC_KEY_SIZE_BITS) {
720
+ throw new ConfigurationError(`RSA key size ${modulusBits} bits is below the minimum of ${MIN_ASYMMETRIC_KEY_SIZE_BITS} bits`);
721
+ }
722
+ else if (modulusBits <= 2048) {
723
+ algorithm = 'rsa:2048';
724
+ }
725
+ else if (modulusBits <= 4096) {
726
+ algorithm = 'rsa:4096';
727
+ }
728
+ else {
729
+ throw new ConfigurationError(`Unsupported RSA key size: ${modulusBits} bits`);
730
+ }
731
+ return { algorithm, pem: publicKeyPem };
732
+ }
733
+ catch (e) {
734
+ // If it's our own ConfigurationError, rethrow
735
+ if (e instanceof ConfigurationError) {
736
+ throw e;
737
+ }
738
+ // Not an RSA key, try EC next
739
+ }
740
+ // Try EC - parse curve from OID
741
+ try {
742
+ const detectedCurve = extractEcCurveFromPublicKey(keyData);
743
+ const curveMap = {
744
+ 'P-256': 'ec:secp256r1',
745
+ 'P-384': 'ec:secp384r1',
746
+ 'P-521': 'ec:secp521r1',
747
+ };
748
+ return { algorithm: curveMap[detectedCurve], pem: publicKeyPem };
749
+ }
750
+ catch {
751
+ // Not a valid EC key
752
+ }
753
+ throw new ConfigurationError('Unable to determine public key algorithm - unsupported key type');
754
+ }
755
+ /**
756
+ * Convert a JWK (JSON Web Key) to PEM format.
757
+ */
758
+ export async function jwkToPublicKeyPem(jwk) {
759
+ let key;
760
+ if (jwk.kty === 'RSA') {
761
+ // RSA key
762
+ key = await crypto.subtle.importKey('jwk', jwk, { name: 'RSA-OAEP', hash: 'SHA-256' }, true, [
763
+ 'encrypt',
764
+ ]);
765
+ }
766
+ else if (jwk.kty === 'EC') {
767
+ // EC key
768
+ const crv = jwk.crv;
769
+ if (!crv || !['P-256', 'P-384', 'P-521'].includes(crv)) {
770
+ throw new ConfigurationError(`Unsupported EC curve: ${crv}`);
771
+ }
772
+ key = await crypto.subtle.importKey('jwk', jwk, { name: 'ECDH', namedCurve: crv }, true, []);
773
+ }
774
+ else {
775
+ throw new ConfigurationError(`Unsupported JWK key type: ${jwk.kty}`);
776
+ }
777
+ const spkiBuffer = await crypto.subtle.exportKey('spki', key);
778
+ return formatAsPem(spkiBuffer, 'PUBLIC KEY');
779
+ }
780
+ /**
781
+ * Convert a PEM public key to JWK format.
782
+ * Returns only public key components (no private key data).
783
+ */
784
+ export async function publicKeyPemToJwk(publicKeyPem) {
785
+ const keyDataBase64 = removePemFormatting(publicKeyPem);
786
+ const keyBuffer = base64Decode(keyDataBase64);
787
+ const hex = hexEncode(keyBuffer);
788
+ // Detect key type using OID
789
+ const algorithmName = guessAlgorithmName(hex);
790
+ if (algorithmName === 'ECDH' || algorithmName === 'ECDSA') {
791
+ // EC key - detect curve from OID
792
+ const namedCurve = guessCurveName(hex);
793
+ const key = await crypto.subtle.importKey('spki', keyBuffer, { name: 'ECDSA', namedCurve }, true, ['verify']);
794
+ const jwk = await crypto.subtle.exportKey('jwk', key);
795
+ // Return only public key components
796
+ const { kty, crv, x, y } = jwk;
797
+ return { kty, crv, x, y };
798
+ }
799
+ else {
800
+ // RSA key
801
+ const key = await crypto.subtle.importKey('spki', keyBuffer, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, true, ['verify']);
802
+ const jwk = await crypto.subtle.exportKey('jwk', key);
803
+ // Return only public key components
804
+ const { kty, e, n } = jwk;
805
+ return { kty, e, n };
806
+ }
807
+ }
808
+ // ============================================================
809
+ // Key Import Functions (PEM → Opaque)
810
+ // ============================================================
811
+ /**
812
+ * Import a PEM public key as an opaque key.
813
+ */
814
+ export async function importPublicKey(pem, options) {
815
+ const { usage = 'encrypt', extractable = true, algorithmHint } = options;
816
+ // Detect algorithm from PEM; also normalises certificates → plain SPKI PEM.
817
+ const keyInfo = await parsePublicKeyPem(pem);
818
+ const algorithm = algorithmHint || keyInfo.algorithm;
819
+ // Use keyInfo.pem (normalised SPKI) not the original pem, which may be a certificate.
820
+ // Passing raw X.509 DER bytes to crypto.subtle.importKey('spki') would throw DataError.
821
+ const keyData = removePemFormatting(keyInfo.pem);
822
+ const keyBuffer = base64Decode(keyData);
823
+ // Determine Web Crypto algorithm and usages based on key type and usage
824
+ let cryptoAlgorithm;
825
+ let keyUsages;
826
+ if (algorithm.startsWith('rsa:')) {
827
+ if (usage === 'encrypt') {
828
+ cryptoAlgorithm = rsaOaepSha1();
829
+ keyUsages = ['encrypt'];
830
+ }
831
+ else if (usage === 'sign') {
832
+ cryptoAlgorithm = { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' };
833
+ keyUsages = ['verify'];
834
+ }
835
+ else {
836
+ throw new ConfigurationError('RSA keys only support usage: encrypt or sign');
837
+ }
838
+ }
839
+ else if (algorithm.startsWith('ec:')) {
840
+ const curve = algorithm.split(':')[1];
841
+ const namedCurve = curve === 'secp256r1'
842
+ ? 'P-256'
843
+ : curve === 'secp384r1'
844
+ ? 'P-384'
845
+ : curve === 'secp521r1'
846
+ ? 'P-521'
847
+ : (() => {
848
+ throw new ConfigurationError(`Unsupported EC curve: ${curve}`);
849
+ })();
850
+ if (usage === 'derive') {
851
+ cryptoAlgorithm = { name: 'ECDH', namedCurve };
852
+ keyUsages = [];
853
+ }
854
+ else if (usage === 'sign') {
855
+ cryptoAlgorithm = { name: 'ECDSA', namedCurve };
856
+ keyUsages = ['verify'];
857
+ }
858
+ else {
859
+ throw new ConfigurationError('EC keys only support usage: derive or sign');
860
+ }
861
+ }
862
+ else {
863
+ throw new ConfigurationError(`Unsupported algorithm: ${algorithm}`);
864
+ }
865
+ // Import as CryptoKey
866
+ const cryptoKey = await crypto.subtle.importKey('spki', keyBuffer, cryptoAlgorithm, extractable, keyUsages);
867
+ return wrapPublicKey(cryptoKey, algorithm);
868
+ }
869
+ /**
870
+ * Import a PEM private key as an opaque key.
871
+ */
872
+ export async function importPrivateKey(pem, options) {
873
+ const { usage = 'encrypt', extractable = true, algorithmHint } = options;
874
+ // Detect algorithm from PEM structure (similar to public key detection)
875
+ // For now, use algorithmHint if provided, otherwise detect from key structure
876
+ let algorithm;
877
+ const keyData = removePemFormatting(pem);
878
+ const keyBuffer = base64Decode(keyData);
879
+ if (algorithmHint) {
880
+ algorithm = algorithmHint;
881
+ }
882
+ else {
883
+ // PKCS#8 PrivateKeyInfo embeds the same AlgorithmIdentifier OIDs as SPKI,
884
+ // so guessAlgorithmName / guessCurveName work on private key bytes too.
885
+ const hex = hexEncode(keyBuffer);
886
+ const algorithmName = guessAlgorithmName(hex); // throws on unrecognised OID
887
+ if (algorithmName === 'ECDH' || algorithmName === 'ECDSA') {
888
+ const namedCurve = guessCurveName(hex);
889
+ const curveMap = {
890
+ 'P-256': 'ec:secp256r1',
891
+ 'P-384': 'ec:secp384r1',
892
+ 'P-521': 'ec:secp521r1',
893
+ };
894
+ const mapped = curveMap[namedCurve];
895
+ if (!mapped)
896
+ throw new ConfigurationError(`Unsupported EC curve in private key: ${namedCurve}`);
897
+ algorithm = mapped;
898
+ }
899
+ else {
900
+ // RSA — determine key size by importing and reading modulus length from JWK
901
+ const tempKey = await crypto.subtle.importKey('pkcs8', keyBuffer, { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' }, true, ['sign']);
902
+ const jwk = await crypto.subtle.exportKey('jwk', tempKey);
903
+ if (!jwk.n) {
904
+ throw new ConfigurationError('Invalid RSA private key: missing modulus');
905
+ }
906
+ const modulusBits = base64urlByteLength(jwk.n) * 8;
907
+ if (modulusBits < MIN_ASYMMETRIC_KEY_SIZE_BITS) {
908
+ throw new ConfigurationError(`RSA key size ${modulusBits} bits is below the minimum of ${MIN_ASYMMETRIC_KEY_SIZE_BITS} bits`);
909
+ }
910
+ algorithm = modulusBits <= 2048 ? 'rsa:2048' : 'rsa:4096';
911
+ }
912
+ }
913
+ // Determine Web Crypto algorithm and usages
914
+ let cryptoAlgorithm;
915
+ let keyUsages;
916
+ if (algorithm.startsWith('rsa:')) {
917
+ if (usage === 'encrypt') {
918
+ cryptoAlgorithm = rsaOaepSha1();
919
+ keyUsages = ['decrypt'];
920
+ }
921
+ else if (usage === 'sign') {
922
+ cryptoAlgorithm = { name: 'RSASSA-PKCS1-v1_5', hash: 'SHA-256' };
923
+ keyUsages = ['sign'];
924
+ }
925
+ else {
926
+ throw new ConfigurationError('RSA keys only support usage: encrypt or sign');
927
+ }
928
+ }
929
+ else if (algorithm.startsWith('ec:')) {
930
+ const curve = algorithm.split(':')[1];
931
+ const namedCurve = curve === 'secp256r1'
932
+ ? 'P-256'
933
+ : curve === 'secp384r1'
934
+ ? 'P-384'
935
+ : curve === 'secp521r1'
936
+ ? 'P-521'
937
+ : (() => {
938
+ throw new ConfigurationError(`Unsupported EC curve: ${curve}`);
939
+ })();
940
+ if (usage === 'derive') {
941
+ cryptoAlgorithm = { name: 'ECDH', namedCurve };
942
+ keyUsages = ['deriveBits'];
943
+ }
944
+ else if (usage === 'sign') {
945
+ cryptoAlgorithm = { name: 'ECDSA', namedCurve };
946
+ keyUsages = ['sign'];
947
+ }
948
+ else {
949
+ throw new ConfigurationError('EC keys only support usage: derive or sign');
950
+ }
951
+ }
952
+ else {
953
+ throw new ConfigurationError(`Unsupported algorithm: ${algorithm}`);
954
+ }
955
+ // Import as CryptoKey
956
+ const cryptoKey = await crypto.subtle.importKey('pkcs8', keyBuffer, cryptoAlgorithm, extractable, keyUsages);
957
+ return wrapPrivateKey(cryptoKey, algorithm);
958
+ }
959
+ // ============================================================
960
+ // Key Export Functions (Opaque → PEM/JWK)
961
+ // ============================================================
962
+ /**
963
+ * Export an opaque public key to PEM format.
964
+ */
965
+ export async function exportPublicKeyPem(key) {
966
+ const cryptoKey = unwrapKey(key);
967
+ const keyBuffer = await crypto.subtle.exportKey('spki', cryptoKey);
968
+ return formatAsPem(keyBuffer, 'PUBLIC KEY');
969
+ }
970
+ /**
971
+ * Export an opaque private key to PEM format.
972
+ * ONLY USE FOR TESTING/DEVELOPMENT. Private keys should NOT be exportable in secure environments.
973
+ */
974
+ export async function exportPrivateKeyPem(key) {
975
+ const cryptoKey = unwrapKey(key);
976
+ const keyBuffer = await crypto.subtle.exportKey('pkcs8', cryptoKey);
977
+ return formatAsPem(keyBuffer, 'PRIVATE KEY');
978
+ }
979
+ /**
980
+ * Export an opaque public key to JWK format.
981
+ */
982
+ export async function exportPublicKeyJwk(key) {
983
+ const cryptoKey = unwrapKey(key);
984
+ return await crypto.subtle.exportKey('jwk', cryptoKey);
985
+ }
986
+ /**
987
+ * Import raw key bytes as an opaque symmetric key.
988
+ * Used for external keys (e.g., unwrapped from KAS).
989
+ */
990
+ export async function importSymmetricKey(keyBytes) {
991
+ return wrapSymmetricKey(keyBytes);
992
+ }
993
+ /**
994
+ * Split a symmetric key into N shares using XOR secret sharing.
995
+ * Key bytes are extracted internally for splitting.
996
+ * HSM implementations cannot extract bytes and should throw ConfigurationError.
997
+ */
998
+ export async function splitSymmetricKey(key, numShares) {
999
+ const keyBytes = unwrapSymmetricKey(key);
1000
+ const splits = await keySplit(keyBytes, numShares, DefaultCryptoService);
1001
+ return splits.map(wrapSymmetricKey);
1002
+ }
1003
+ /**
1004
+ * Merge symmetric key shares back into the original key using XOR.
1005
+ * Key bytes are extracted internally for merging.
1006
+ */
1007
+ export async function mergeSymmetricKeys(shares) {
1008
+ const splitBytes = shares.map(unwrapSymmetricKey);
1009
+ const merged = keyMerge(splitBytes);
1010
+ return wrapSymmetricKey(merged);
1011
+ }
280
1012
  export const DefaultCryptoService = {
281
1013
  name,
282
1014
  method,
283
- cryptoToPemPair,
284
1015
  decrypt,
285
1016
  decryptWithPrivateKey,
1017
+ deriveKeyFromECDH,
1018
+ digest,
286
1019
  encrypt,
287
1020
  encryptWithPublicKey,
288
- generateInitializationVector,
1021
+ exportPublicKeyJwk,
1022
+ exportPrivateKeyPem,
1023
+ exportPublicKeyPem,
1024
+ extractPublicKeyPem,
1025
+ generateECKeyPair,
289
1026
  generateKey,
290
1027
  generateKeyPair,
291
1028
  generateSigningKeyPair,
292
- hmac,
1029
+ importPrivateKey,
1030
+ importPublicKey,
1031
+ importSymmetricKey,
1032
+ jwkToPublicKeyPem,
1033
+ mergeSymmetricKeys,
1034
+ parsePublicKeyPem,
293
1035
  randomBytes,
294
- sha256,
1036
+ hmac,
1037
+ verifyHmac,
1038
+ sign,
1039
+ splitSymmetricKey,
1040
+ verify,
295
1041
  };
296
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../tdf3/src/crypto/index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,UAAU,EAAE,MAAM,qBAAqB,CAAC;AACjD,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EAIL,4BAA4B,GAE7B,MAAM,mBAAmB,CAAC;AAC3B,OAAO,EAAE,kBAAkB,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAC;AAC1E,OAAO,EAAE,WAAW,EAAE,mBAAmB,EAAE,MAAM,mBAAmB,CAAC;AACrE,OAAO,EAAE,iBAAiB,IAAI,SAAS,EAAE,MAAM,+BAA+B,CAAC;AAC/E,OAAO,EAAE,iBAAiB,IAAI,YAAY,EAAE,MAAM,kCAAkC,CAAC;AAGrF,4CAA4C;AAC5C,MAAM,OAAO,GAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AACnD,MAAM,CAAC,MAAM,WAAW,GAAG,OAAO,UAAU,EAAE,MAAM,KAAK,WAAW,CAAC;AAErE,MAAM,CAAC,MAAM,MAAM,GAAG,6CAA6C,CAAC;AACpE,MAAM,CAAC,MAAM,IAAI,GAAG,4BAA4B,CAAC;AAEjD;;;GAGG;AACH,MAAM,UAAU,WAAW,CACzB,gBAAwB,4BAA4B;IAEpD,IAAI,CAAC,aAAa,IAAI,aAAa,GAAG,4BAA4B,EAAE,CAAC;QACnE,MAAM,IAAI,kBAAkB,CAAC,4BAA4B,CAAC,CAAC;IAC7D,CAAC;IACD,OAAO;QACL,IAAI,EAAE,UAAU;QAChB,IAAI,EAAE;YACJ,IAAI,EAAE,OAAO;SACd;QACD,aAAa;QACb,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,EAAE,iCAAiC;KACtF,CAAC;AACJ,CAAC;AAED,MAAM,UAAU,cAAc,CAC5B,gBAAwB,4BAA4B;IAEpD,IAAI,CAAC,aAAa,IAAI,aAAa,GAAG,4BAA4B,EAAE,CAAC;QACnE,MAAM,IAAI,kBAAkB,CAAC,4BAA4B,CAAC,CAAC;IAC7D,CAAC;IACD,OAAO;QACL,IAAI,EAAE,mBAAmB;QACzB,IAAI,EAAE;YACJ,IAAI,EAAE,SAAS;SAChB;QACD,aAAa;QACb,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,EAAE,iCAAiC;KACtF,CAAC;AACJ,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,WAAW,CAAC,MAAe;IAC/C,OAAO,gBAAgB,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;AACxC,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,IAAa;IACjD,MAAM,aAAa,GAAG,WAAW,CAAC,IAAI,IAAI,4BAA4B,CAAC,CAAC;IACxE,OAAO,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,aAAa,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;AACjE,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,sBAAsB;IAC1C,OAAO,MAAM,CAAC,MAAM,CAAC,WAAW,CAC9B;QACE,IAAI,EAAE,mBAAmB;QACzB,IAAI,EAAE,SAAS;QACf,aAAa,EAAE,IAAI;QACnB,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC;KACnD,EACD,IAAI,EACJ,CAAC,MAAM,EAAE,QAAQ,CAAC,CACnB,CAAC;AACJ,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,SAAkB;IACtD,MAAM,IAAI,GAAG,SAA0B,CAAC;IACxC,IAAI,CAAC,IAAI,CAAC,UAAU,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;QACxC,gEAAgE;QAChE,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;IAC5C,CAAC;IAED,MAAM,CAAC,QAAQ,EAAE,SAAS,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;QAC9C,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,IAAI,CAAC,SAAS,CAAC;QAC/C,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,IAAI,CAAC,UAAU,CAAC;KAClD,CAAC,CAAC;IACH,OAAO;QACL,SAAS,EAAE,WAAW,CAAC,QAAQ,EAAE,YAAY,CAAC;QAC9C,UAAU,EAAE,WAAW,CAAC,SAAS,EAAE,aAAa,CAAC;KAClD,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB,CAAC,OAAe,EAAE,SAAiB;IAC3E,OAAO,CAAC,MAAM,CAAC,OAAO,OAAO,KAAK,QAAQ,CAAC,CAAC;IAC5C,OAAO,CAAC,MAAM,CAAC,OAAO,SAAS,KAAK,QAAQ,CAAC,CAAC;IAE9C,MAAM,aAAa,GAAG,WAAW,EAAE,CAAC;IAEpC,wDAAwD;IACxD,SAAS,GAAG,mBAAmB,CAAC,SAAS,CAAC,CAAC;IAE3C,MAAM,SAAS,GAAG,YAAY,CAAC,SAAS,CAAC,CAAC;IAC1C,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,EAAE,aAAa,EAAE,KAAK,EAAE;QACvF,SAAS;KACV,CAAC,CAAC;IACH,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CACxC,EAAE,IAAI,EAAE,UAAU,EAAE,EACpB,SAAS,EACT,OAAO,CAAC,aAAa,EAAE,CACxB,CAAC;IACF,OAAO,MAAM,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;AACxC,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,4BAA4B,CAAC,MAAe;IAChE,OAAO,gBAAgB,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;AACxC,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,WAAW,CAAC,UAAkB;IAClD,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;IACrC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAC1B,OAAO,CAAC,CAAC;AACX,CAAC;AAED;;;;;;;;;GASG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,MAAc;IACnD,qDAAqD;IACrD,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC;IACjC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAC1B,OAAO,SAAS,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;AAC7B,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,qBAAqB,CACzC,gBAAwB,EACxB,UAAkB;IAElB,OAAO,CAAC,MAAM,CAAC,OAAO,gBAAgB,KAAK,QAAQ,EAAE,iCAAiC,CAAC,CAAC;IACxF,OAAO,CAAC,MAAM,CAAC,OAAO,UAAU,KAAK,QAAQ,EAAE,2BAA2B,CAAC,CAAC;IAE5E,MAAM,aAAa,GAAG,WAAW,EAAE,CAAC;IAEpC,wDAAwD;IACxD,MAAM,aAAa,GAAG,mBAAmB,CAAC,UAAU,CAAC,CAAC;IACtD,MAAM,OAAO,GAAG,YAAY,CAAC,aAAa,CAAC,CAAC;IAE5C,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,OAAO,EAAE,aAAa,EAAE,KAAK,EAAE,CAAC,SAAS,CAAC,CAAC,CAAC;IAC/F,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CACzC,EAAE,IAAI,EAAE,UAAU,EAAE,EACpB,GAAG,EACH,gBAAgB,CAAC,aAAa,EAAE,CACjC,CAAC;IACF,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAC;IAC3C,OAAO,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACnD,CAAC;AAED;;;;;;;GAOG;AACH,MAAM,UAAU,OAAO,CACrB,OAAe,EACf,GAAW,EACX,EAAU,EACV,SAAwB,EACxB,OAAgB;IAEhB,OAAO,UAAU,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO,CAAC,CAAC;AAC1D,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,OAAO,CACrB,OAAe,EACf,GAAW,EACX,EAAU,EACV,SAAwB;IAExB,OAAO,UAAU,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,SAAS,CAAC,CAAC;AACjD,CAAC;AAED,KAAK,UAAU,UAAU,CACvB,OAAe,EACf,GAAW,EACX,EAAU,EACV,SAAwB;IAExB,OAAO,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,CAAC;IAChC,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC;IAC5B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IAE3B,MAAM,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;IAC9C,MAAM,aAAa,GAAG,yBAAyB,CAAC,EAAE,EAAE,SAAS,CAAC,CAAC;IAE/D,MAAM,WAAW,GAAG,MAAM,UAAU,CAAC,GAAG,EAAE,aAAa,CAAC,CAAC;IACzD,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,aAAa,EAAE,WAAW,EAAE,aAAa,CAAC,CAAC;IACzF,IAAI,aAAa,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACrC,OAAO;YACL,OAAO,EAAE,MAAM,CAAC,eAAe,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YACxD,OAAO,EAAE,MAAM,CAAC,eAAe,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;SACtD,CAAC;IACJ,CAAC;IACD,OAAO;QACL,OAAO,EAAE,MAAM,CAAC,eAAe,CAAC,SAAS,CAAC;KAC3C,CAAC;AACJ,CAAC;AAED,KAAK,UAAU,UAAU,CACvB,OAAe,EACf,GAAW,EACX,EAAU,EACV,SAAwB,EACxB,OAAgB;IAEhB,OAAO,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,CAAC;IAChC,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC;IAC5B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IAE3B,IAAI,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;IAE5C,wDAAwD;IACxD,IAAI,OAAO,EAAE,CAAC;QACZ,MAAM,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;QAC9C,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,aAAa,CAAC,UAAU,GAAG,aAAa,CAAC,UAAU,CAAC,CAAC;QACvF,UAAU,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAC;QACjD,UAAU,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;QACxE,aAAa,GAAG,UAAU,CAAC,MAAM,CAAC;IACpC,CAAC;IAED,MAAM,aAAa,GAAG,yBAAyB,CAAC,EAAE,EAAE,SAAS,CAAC,CAAC;IAE/D,MAAM,WAAW,GAAG,MAAM,UAAU,CAAC,GAAG,EAAE,aAAa,CAAC,CAAC;IACzD,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,aAAa,EAAE,CAAC;IAEtC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM;SAClC,OAAO,CAAC,aAAa,EAAE,WAAW,EAAE,aAAa,CAAC;QACnD,sEAAsE;SACrE,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;QACb,IAAI,GAAG,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;YAClC,MAAM,IAAI,YAAY,CAAC,GAAG,CAAC,CAAC;QAC9B,CAAC;QAED,MAAM,GAAG,CAAC;IACZ,CAAC,CAAC,CAAC;IACL,OAAO,EAAE,OAAO,EAAE,MAAM,CAAC,eAAe,CAAC,SAAS,CAAC,EAAE,CAAC;AACxD,CAAC;AAED,SAAS,UAAU,CAAC,GAAW,EAAE,SAAsC;IACrE,OAAO,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,aAAa,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;AACvF,CAAC;AAED;;;;;GAKG;AACH,SAAS,yBAAyB,CAChC,EAAU,EACV,SAAwB;IAExB,IAAI,eAAe,GAAG,SAAS,CAAC;IAChC,IAAI,SAAS,KAAK,UAAU,CAAC,WAAW,EAAE,CAAC;QACzC,eAAe,GAAG,SAAS,CAAC;IAC9B,CAAC;IAED,OAAO;QACL,IAAI,EAAE,eAAe;QACrB,EAAE,EAAE,EAAE,CAAC,aAAa,EAAE;KACvB,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,MAAM,CAAC,OAAe;IAC1C,MAAM,MAAM,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;IACjD,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;IACjE,OAAO,SAAS,CAAC,UAAU,CAAC,CAAC;AAC/B,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,IAAI,CAAC,GAAW,EAAE,OAAe;IACrD,MAAM,aAAa,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;IACxD,MAAM,SAAS,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;IAC9B,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,KAAK,EACL,SAAS,EACT;QACE,IAAI,EAAE,MAAM;QACZ,IAAI,EAAE,EAAE,IAAI,EAAE,SAAS,EAAE;KAC1B,EACD,IAAI,EACJ,CAAC,MAAM,EAAE,QAAQ,CAAC,CACnB,CAAC;IACF,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,SAAS,EAAE,aAAa,CAAC,CAAC;IAC9E,OAAO,SAAS,CAAC,UAAU,CAAC,CAAC;AAC/B,CAAC;AAED;;;;GAIG;AACH,MAAM,UAAU,MAAM,CAAC,GAAW;IAChC,MAAM,MAAM,GAAG,IAAI,WAAW,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;IAC/C,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC;IAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;QACvC,UAAU,CAAC,CAAC,GAAG,CAAC,CAAC,GAAG,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,MAAM,CAAC;AAChB,CAAC;AAED,MAAM,CAAC,MAAM,oBAAoB,GAAkB;IACjD,IAAI;IACJ,MAAM;IACN,eAAe;IACf,OAAO;IACP,qBAAqB;IACrB,OAAO;IACP,oBAAoB;IACpB,4BAA4B;IAC5B,WAAW;IACX,eAAe;IACf,sBAAsB;IACtB,IAAI;IACJ,WAAW;IACX,MAAM;CACP,CAAC"}
1042
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../tdf3/src/crypto/index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,UAAU,EAAE,MAAM,qBAAqB,CAAC;AACjD,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EAWL,4BAA4B,GAK7B,MAAM,mBAAmB,CAAC;AAC3B,OAAO,EAAE,kBAAkB,EAAE,YAAY,EAAE,MAAM,wBAAwB,CAAC;AAC1E,OAAO,EAAE,WAAW,EAAE,mBAAmB,EAAE,MAAM,mBAAmB,CAAC;AACrE,OAAO,EAAE,iBAAiB,IAAI,SAAS,EAAE,MAAM,+BAA+B,CAAC;AAC/E,OAAO,EAAE,iBAAiB,IAAI,YAAY,EAAE,MAAM,kCAAkC,CAAC;AAErF,OAAO,EAAE,UAAU,EAAE,UAAU,EAAE,MAAM,MAAM,CAAC;AAC9C,OAAO,EACL,QAAQ,EACR,kBAAkB,EAClB,cAAc,GACf,MAAM,0CAA0C,CAAC;AAClD,OAAO,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,sBAAsB,CAAC;AAE1D,4CAA4C;AAC5C,MAAM,eAAe,GAAe,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC3D,MAAM,mBAAmB,GAAe,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;AAC3D,MAAM,CAAC,MAAM,WAAW,GAAG,OAAO,UAAU,EAAE,MAAM,KAAK,WAAW,CAAC;AAErE,MAAM,CAAC,MAAM,MAAM,GAAG,6CAA6C,CAAC;AACpE,MAAM,CAAC,MAAM,IAAI,GAAG,4BAA4B,CAAC;AAEjD;;;GAGG;AACH,MAAM,UAAU,WAAW,CACzB,gBAAwB,4BAA4B;IAEpD,IAAI,CAAC,aAAa,IAAI,aAAa,GAAG,4BAA4B,EAAE,CAAC;QACnE,MAAM,IAAI,kBAAkB,CAAC,4BAA4B,CAAC,CAAC;IAC7D,CAAC;IACD,OAAO;QACL,IAAI,EAAE,UAAU;QAChB,IAAI,EAAE;YACJ,IAAI,EAAE,OAAO;SACd;QACD,aAAa;QACb,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,EAAE,iCAAiC;KACtF,CAAC;AACJ,CAAC;AAED,MAAM,UAAU,cAAc,CAC5B,gBAAwB,4BAA4B;IAEpD,IAAI,CAAC,aAAa,IAAI,aAAa,GAAG,4BAA4B,EAAE,CAAC;QACnE,MAAM,IAAI,kBAAkB,CAAC,4BAA4B,CAAC,CAAC;IAC7D,CAAC;IACD,OAAO;QACL,IAAI,EAAE,mBAAmB;QACzB,IAAI,EAAE;YACJ,IAAI,EAAE,SAAS;SAChB;QACD,aAAa;QACb,cAAc,EAAE,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,IAAI,EAAE,IAAI,CAAC,CAAC,EAAE,iCAAiC;KACtF,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,WAAW,CAAC,MAAe;IAC/C,MAAM,QAAQ,GAAG,MAAM,WAAW,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;IACjD,OAAO,gBAAgB,CAAC,QAAQ,CAAC,CAAC;AACpC,CAAC;AAED,+DAA+D;AAC/D,yCAAyC;AACzC,+DAA+D;AAE/D;;;GAGG;AACH,SAAS,aAAa,CAAC,GAAc,EAAE,SAAuB;IAC5D,MAAM,MAAM,GAAQ;QAClB,MAAM,EAAE,WAAW;QACnB,SAAS;QACT,SAAS,EAAE,GAAG;KACf,CAAC;IACF,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,MAAM,CAAC,WAAW,GAAG,QAAQ,CAAC,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAC7D,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,SAAS,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAC1C,MAAM,CAAC,KAAK;YACV,SAAS,KAAK,WAAW;gBACvB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,SAAS,KAAK,WAAW;oBACzB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,SAAS,KAAK,WAAW;wBACzB,CAAC,CAAC,OAAO;wBACT,CAAC,CAAC,SAAS,CAAC;IACtB,CAAC;IACD,OAAO,MAAmB,CAAC;AAC7B,CAAC;AAED;;;GAGG;AACH,SAAS,cAAc,CAAC,GAAc,EAAE,SAAuB;IAC7D,MAAM,MAAM,GAAQ;QAClB,MAAM,EAAE,YAAY;QACpB,SAAS;QACT,SAAS,EAAE,GAAG;KACf,CAAC;IACF,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,MAAM,CAAC,WAAW,GAAG,QAAQ,CAAC,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IAC7D,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,SAAS,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QAC1C,MAAM,CAAC,KAAK;YACV,SAAS,KAAK,WAAW;gBACvB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,SAAS,KAAK,WAAW;oBACzB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,SAAS,KAAK,WAAW;wBACzB,CAAC,CAAC,OAAO;wBACT,CAAC,CAAC,SAAS,CAAC;IACtB,CAAC;IACD,OAAO,MAAoB,CAAC;AAC9B,CAAC;AAED;;;GAGG;AACH,SAAS,SAAS,CAAC,GAA2B;IAC5C,OAAQ,GAAW,CAAC,SAAS,CAAC;AAChC,CAAC;AAED;;;GAGG;AACH,SAAS,gBAAgB,CAAC,QAAoB;IAC5C,OAAO;QACL,MAAM,EAAE,cAAc;QACtB,MAAM,EAAE,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE,OAAO;QACpC,SAAS,EAAE,QAAQ;KACJ,CAAC;AACpB,CAAC;AAED;;;GAGG;AACH,SAAS,kBAAkB,CAAC,GAAiB;IAC3C,OAAQ,GAAW,CAAC,SAAS,CAAC;AAChC,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,IAAa;IACjD,MAAM,OAAO,GAAG,IAAI,IAAI,4BAA4B,CAAC;IACrD,MAAM,aAAa,GAAG,WAAW,CAAC,OAAO,CAAC,CAAC;IAC3C,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,aAAa,EAAE,IAAI,EAAE,eAAe,CAAC,CAAC;IAEtF,mCAAmC;IACnC,IAAI,SAAuB,CAAC;IAC5B,IAAI,OAAO,KAAK,IAAI,EAAE,CAAC;QACrB,SAAS,GAAG,UAAU,CAAC;IACzB,CAAC;SAAM,IAAI,OAAO,KAAK,IAAI,EAAE,CAAC;QAC5B,SAAS,GAAG,UAAU,CAAC;IACzB,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAC1B,6BAA6B,OAAO,qCAAqC,CAC1E,CAAC;IACJ,CAAC;IAED,OAAO;QACL,SAAS,EAAE,aAAa,CAAC,OAAO,CAAC,SAAS,EAAE,SAAS,CAAC;QACtD,UAAU,EAAE,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,SAAS,CAAC;KAC1D,CAAC;AACJ,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,sBAAsB;IAC1C,MAAM,SAAS,GAAG,cAAc,CAAC,IAAI,CAAC,CAAC;IACvC,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,SAAS,EAAE,IAAI,EAAE,mBAAmB,CAAC,CAAC;IAEtF,MAAM,SAAS,GAAiB,UAAU,CAAC;IAC3C,OAAO;QACL,SAAS,EAAE,aAAa,CAAC,OAAO,CAAC,SAAS,EAAE,SAAS,CAAC;QACtD,UAAU,EAAE,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,SAAS,CAAC;KAC1D,CAAC;AACJ,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,oBAAoB,CACxC,OAA8B,EAC9B,SAAoB;IAEpB,IAAI,aAA2B,CAAC;IAEhC,iCAAiC;IACjC,IAAI,QAAQ,IAAI,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,cAAc,EAAE,CAAC;QAC7D,6FAA6F;QAC7F,aAAa,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;IAC9C,CAAC;SAAM,CAAC;QACN,iBAAiB;QACjB,aAAa,GAAI,OAAkB,CAAC,aAAa,EAAE,CAAC;IACtD,CAAC;IAED,MAAM,SAAS,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;IACvC,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,EAAE,IAAI,EAAE,UAAU,EAAE,EAAE,SAAS,EAAE,aAAa,CAAC,CAAC;IAC3F,OAAO,MAAM,CAAC,eAAe,CAAC,MAAM,CAAC,CAAC;AACxC,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,WAAW,CAAC,UAAkB;IAClD,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;IACrC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAC1B,OAAO,CAAC,CAAC;AACX,CAAC;AAED;;;;;;;;;GASG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,MAAc;IACnD,qDAAqD;IACrD,MAAM,CAAC,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC;IACjC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;IAC1B,OAAO,SAAS,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC;AAC7B,CAAC;AAED;;;;;GAKG;AACH,MAAM,CAAC,KAAK,UAAU,qBAAqB,CACzC,gBAAwB,EACxB,UAAsB;IAEtB,OAAO,CAAC,MAAM,CAAC,OAAO,gBAAgB,KAAK,QAAQ,EAAE,iCAAiC,CAAC,CAAC;IAExF,MAAM,SAAS,GAAG,SAAS,CAAC,UAAU,CAAC,CAAC;IACxC,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CACzC,EAAE,IAAI,EAAE,UAAU,EAAE,EACpB,SAAS,EACT,gBAAgB,CAAC,aAAa,EAAE,CACjC,CAAC;IACF,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,OAAO,CAAC,CAAC;IAC3C,OAAO,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACnD,CAAC;AAED;;;;;;;GAOG;AACH,MAAM,UAAU,OAAO,CACrB,OAAe,EACf,GAAiB,EACjB,EAAU,EACV,SAAwB,EACxB,OAAgB;IAEhB,OAAO,UAAU,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,SAAS,EAAE,OAAO,CAAC,CAAC;AAC1D,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,OAAO,CACrB,OAA8B,EAC9B,GAAiB,EACjB,EAAU,EACV,SAAwB;IAExB,OAAO,UAAU,CAAC,OAAO,EAAE,GAAG,EAAE,EAAE,EAAE,SAAS,CAAC,CAAC;AACjD,CAAC;AAED,KAAK,UAAU,UAAU,CACvB,OAA8B,EAC9B,GAAiB,EACjB,EAAU,EACV,SAAwB;IAExB,OAAO,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,CAAC;IAChC,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC;IAC5B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IAE3B,+CAA+C;IAC/C,IAAI,aAA2B,CAAC;IAChC,IAAI,QAAQ,IAAI,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,cAAc,EAAE,CAAC;QAC7D,6FAA6F;QAC7F,aAAa,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;IAC9C,CAAC;SAAM,CAAC;QACN,iBAAiB;QACjB,aAAa,GAAI,OAAkB,CAAC,aAAa,EAAE,CAAC;IACtD,CAAC;IAED,MAAM,aAAa,GAAG,yBAAyB,CAAC,EAAE,EAAE,SAAS,CAAC,CAAC;IAE/D,wCAAwC;IACxC,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,WAAW,GAAG,MAAM,UAAU,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;IAC9D,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,aAAa,EAAE,WAAW,EAAE,aAAa,CAAC,CAAC;IACzF,IAAI,aAAa,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACrC,OAAO;YACL,OAAO,EAAE,MAAM,CAAC,eAAe,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC;YACxD,OAAO,EAAE,MAAM,CAAC,eAAe,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;SACtD,CAAC;IACJ,CAAC;IACD,OAAO;QACL,OAAO,EAAE,MAAM,CAAC,eAAe,CAAC,SAAS,CAAC;KAC3C,CAAC;AACJ,CAAC;AAED,KAAK,UAAU,UAAU,CACvB,OAAe,EACf,GAAiB,EACjB,EAAU,EACV,SAAwB,EACxB,OAAgB;IAEhB,OAAO,CAAC,MAAM,CAAC,OAAO,IAAI,IAAI,CAAC,CAAC;IAChC,OAAO,CAAC,MAAM,CAAC,GAAG,IAAI,IAAI,CAAC,CAAC;IAC5B,OAAO,CAAC,MAAM,CAAC,EAAE,IAAI,IAAI,CAAC,CAAC;IAE3B,IAAI,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;IAE5C,wDAAwD;IACxD,IAAI,OAAO,EAAE,CAAC;QACZ,MAAM,aAAa,GAAG,OAAO,CAAC,aAAa,EAAE,CAAC;QAC9C,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,aAAa,CAAC,UAAU,GAAG,aAAa,CAAC,UAAU,CAAC,CAAC;QACvF,UAAU,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,CAAC,CAAC,CAAC;QACjD,UAAU,CAAC,GAAG,CAAC,IAAI,UAAU,CAAC,aAAa,CAAC,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;QACxE,aAAa,GAAG,UAAU,CAAC,MAAM,CAAC;IACpC,CAAC;IAED,MAAM,aAAa,GAAG,yBAAyB,CAAC,EAAE,EAAE,SAAS,CAAC,CAAC;IAE/D,wCAAwC;IACxC,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,WAAW,GAAG,MAAM,UAAU,CAAC,QAAQ,EAAE,aAAa,CAAC,CAAC;IAC9D,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,aAAa,EAAE,CAAC;IAEtC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM;SAClC,OAAO,CAAC,aAAa,EAAE,WAAW,EAAE,aAAa,CAAC;QACnD,sEAAsE;SACrE,KAAK,CAAC,CAAC,GAAG,EAAE,EAAE;QACb,IAAI,GAAG,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;YAClC,MAAM,IAAI,YAAY,CAAC,GAAG,CAAC,CAAC;QAC9B,CAAC;QAED,MAAM,GAAG,CAAC;IACZ,CAAC,CAAC,CAAC;IACL,OAAO,EAAE,OAAO,EAAE,MAAM,CAAC,eAAe,CAAC,SAAS,CAAC,EAAE,CAAC;AACxD,CAAC;AAED,SAAS,UAAU,CAAC,QAAoB,EAAE,SAAsC;IAC9E,OAAO,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,QAAQ,EAAE,SAAS,EAAE,IAAI,EAAE,eAAe,CAAC,CAAC;AACpF,CAAC;AAED;;;;;GAKG;AACH,SAAS,yBAAyB,CAChC,EAAU,EACV,SAAwB;IAExB,IAAI,eAAe,GAAG,SAAS,CAAC;IAChC,IAAI,SAAS,KAAK,UAAU,CAAC,WAAW,EAAE,CAAC;QACzC,eAAe,GAAG,SAAS,CAAC;IAC9B,CAAC;IAED,OAAO;QACL,IAAI,EAAE,eAAe;QACrB,EAAE,EAAE,EAAE,CAAC,aAAa,EAAE;KACvB,CAAC;AACJ,CAAC;AAED;;;;;GAKG;AAEH;;;;GAIG;AACH,MAAM,UAAU,MAAM,CAAC,GAAW;IAChC,MAAM,MAAM,GAAG,IAAI,WAAW,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;IAC/C,MAAM,UAAU,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC;IAE1C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,GAAG,CAAC,MAAM,EAAE,CAAC,IAAI,CAAC,EAAE,CAAC;QACvC,UAAU,CAAC,CAAC,GAAG,CAAC,CAAC,GAAG,QAAQ,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;IACrD,CAAC;IAED,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;GAEG;AACH,SAAS,yBAAyB,CAAC,SAAqC;IAItE,QAAQ,SAAS,EAAE,CAAC;QAClB,KAAK,OAAO;YACV,OAAO;gBACL,YAAY,EAAE,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE;gBAC5D,UAAU,EAAE,mBAAmB;aAChC,CAAC;QACJ,KAAK,OAAO;YACV,OAAO;gBACL,YAAY,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE;gBACpD,UAAU,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,IAAI,EAAE,SAAS,EAAiB;aAC9D,CAAC;QACJ,KAAK,OAAO;YACV,OAAO;gBACL,YAAY,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE;gBACpD,UAAU,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,IAAI,EAAE,SAAS,EAAiB;aAC9D,CAAC;QACJ,KAAK,OAAO;YACV,OAAO;gBACL,YAAY,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE;gBACpD,UAAU,EAAE,EAAE,IAAI,EAAE,OAAO,EAAE,IAAI,EAAE,SAAS,EAAiB;aAC9D,CAAC;QACJ;YACE,MAAM,IAAI,kBAAkB,CAAC,kCAAkC,SAAS,EAAE,CAAC,CAAC;IAChF,CAAC;AACH,CAAC;AAED;;;GAGG;AACH,SAAS,cAAc,CAAC,SAAqB,EAAE,SAAqC;IAClF,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;QAC1B,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,sDAAsD;IACtD,MAAM,OAAO,GAAG,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC;IACrC,MAAM,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,OAAO,CAAC,CAAC;IACtC,MAAM,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;IAEnC,2DAA2D;IAC3D,MAAM,gBAAgB,GAAG,CAAC,GAAe,EAAc,EAAE;QACvD,IAAI,CAAC,GAAG,CAAC,CAAC;QACV,OAAO,CAAC,GAAG,GAAG,CAAC,MAAM,GAAG,CAAC,IAAI,GAAG,CAAC,CAAC,CAAC,KAAK,CAAC;YAAE,CAAC,EAAE,CAAC;QAC/C,OAAO,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACtB,CAAC,CAAC;IAEF,IAAI,QAAQ,GAAG,gBAAgB,CAAC,CAAC,CAAC,CAAC;IACnC,IAAI,QAAQ,GAAG,gBAAgB,CAAC,CAAC,CAAC,CAAC;IAEnC,gEAAgE;IAChE,IAAI,QAAQ,CAAC,CAAC,CAAC,GAAG,IAAI,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;QACnD,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;QACxB,QAAQ,GAAG,MAAM,CAAC;IACpB,CAAC;IACD,IAAI,QAAQ,CAAC,CAAC,CAAC,GAAG,IAAI,EAAE,CAAC;QACvB,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,QAAQ,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;QACnD,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;QACxB,QAAQ,GAAG,MAAM,CAAC;IACpB,CAAC;IAED,sDAAsD;IACtD,iCAAiC;IACjC,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,QAAQ,CAAC,MAAM,EAAE,GAAG,QAAQ,CAAC,CAAC,CAAC;IAClE,MAAM,IAAI,GAAG,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,QAAQ,CAAC,MAAM,EAAE,GAAG,QAAQ,CAAC,CAAC,CAAC;IAElE,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC;IACzC,qEAAqE;IACrE,kEAAkE;IAClE,MAAM,QAAQ,GAAG,MAAM,GAAG,GAAG,CAAC,CAAC,CAAC,IAAI,UAAU,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,UAAU,CAAC,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC,CAAC;IAC1F,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,CAAC,GAAG,QAAQ,CAAC,MAAM,GAAG,MAAM,CAAC,CAAC;IAC5D,MAAM,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC;IACjB,MAAM,CAAC,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC;IACxB,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,CAAC,CAAC;IACtC,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,QAAQ,CAAC,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC;IAEpD,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;;GAGG;AACH,SAAS,cAAc,CAAC,SAAqB,EAAE,SAAqC;IAClF,IAAI,SAAS,KAAK,OAAO,EAAE,CAAC;QAC1B,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,6DAA6D;IAC7D,IAAI,YAAoB,CAAC;IACzB,QAAQ,SAAS,EAAE,CAAC;QAClB,KAAK,OAAO;YACV,YAAY,GAAG,EAAE,CAAC;YAClB,MAAM;QACR,KAAK,OAAO;YACV,YAAY,GAAG,EAAE,CAAC;YAClB,MAAM;QACR,KAAK,OAAO;YACV,YAAY,GAAG,EAAE,CAAC;YAClB,MAAM;QACR;YACE,MAAM,IAAI,kBAAkB,CAAC,6CAA6C,SAAS,EAAE,CAAC,CAAC;IAC3F,CAAC;IAED,+CAA+C;IAC/C,IAAI,SAAS,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC;QAC1B,MAAM,IAAI,kBAAkB,CAAC,0CAA0C,CAAC,CAAC;IAC3E,CAAC;IAED,kEAAkE;IAClE,IAAI,MAAM,GAAG,CAAC,CAAC;IACf,IAAI,SAAS,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,CAAC;QAC7B,6DAA6D;QAC7D,MAAM,aAAa,GAAG,SAAS,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC;QAC/C,IAAI,aAAa,KAAK,CAAC,IAAI,aAAa,GAAG,CAAC,EAAE,CAAC;YAC7C,MAAM,IAAI,kBAAkB,CAAC,iDAAiD,CAAC,CAAC;QAClF,CAAC;QACD,MAAM,IAAI,CAAC,GAAG,aAAa,CAAC;QAC5B,IAAI,MAAM,GAAG,SAAS,CAAC,MAAM,EAAE,CAAC;YAC9B,MAAM,IAAI,kBAAkB,CAAC,6DAA6D,CAAC,CAAC;QAC9F,CAAC;IACH,CAAC;SAAM,CAAC;QACN,kCAAkC;QAClC,MAAM,IAAI,CAAC,CAAC;IACd,CAAC;IAED,kBAAkB;IAClB,IAAI,SAAS,CAAC,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC;QAC/B,MAAM,IAAI,kBAAkB,CAAC,+CAA+C,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;IACnC,MAAM,IAAI,CAAC,CAAC;IACZ,IAAI,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC,CAAC;IAC/C,MAAM,IAAI,IAAI,CAAC;IAEf,kBAAkB;IAClB,IAAI,SAAS,CAAC,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC;QAC/B,MAAM,IAAI,kBAAkB,CAAC,+CAA+C,CAAC,CAAC;IAChF,CAAC;IACD,MAAM,IAAI,GAAG,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC;IACnC,MAAM,IAAI,CAAC,CAAC;IACZ,IAAI,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI,CAAC,CAAC;IAE/C,yCAAyC;IACzC,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,MAAM,GAAG,YAAY,EAAE,CAAC;QAC1C,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACjB,CAAC;IACD,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,MAAM,GAAG,YAAY,EAAE,CAAC;QAC1C,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACjB,CAAC;IAED,0BAA0B;IAC1B,MAAM,MAAM,GAAG,IAAI,UAAU,CAAC,YAAY,GAAG,CAAC,CAAC,CAAC;IAChD,MAAM,CAAC,GAAG,CAAC,CAAC,EAAE,YAAY,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC;IACvC,MAAM,CAAC,GAAG,CAAC,CAAC,EAAE,YAAY,GAAG,CAAC,GAAG,CAAC,CAAC,MAAM,CAAC,CAAC;IAE3C,OAAO,MAAM,CAAC;AAChB,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,IAAI,CACxB,IAAgB,EAChB,UAAsB,EACtB,SAAqC;IAErC,MAAM,EAAE,UAAU,EAAE,GAAG,yBAAyB,CAAC,SAAS,CAAC,CAAC;IAE5D,gCAAgC;IAChC,MAAM,GAAG,GAAG,SAAS,CAAC,UAAU,CAAC,CAAC;IAElC,gBAAgB;IAChB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,GAAG,EAAE,IAAI,CAAC,CAAC;IAElE,mDAAmD;IACnD,OAAO,cAAc,CAAC,IAAI,UAAU,CAAC,SAAS,CAAC,EAAE,SAAS,CAAC,CAAC;AAC9D,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,MAAM,CAC1B,IAAgB,EAChB,SAAqB,EACrB,SAAoB,EACpB,SAAqC;IAErC,MAAM,EAAE,UAAU,EAAE,GAAG,yBAAyB,CAAC,SAAS,CAAC,CAAC;IAE5D,gCAAgC;IAChC,MAAM,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;IAEjC,mDAAmD;IACnD,MAAM,aAAa,GAAG,cAAc,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;IAE3D,uBAAuB;IACvB,OAAO,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,UAAU,EAAE,GAAG,EAAE,aAAa,EAAE,IAAI,CAAC,CAAC;AACpE,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,MAAM,CAAC,SAAwB,EAAE,IAAgB;IACrE,gDAAgD;IAChD,MAAM,eAAe,GAAoB,CAAC,SAAS,EAAE,SAAS,EAAE,SAAS,CAAC,CAAC;IAC3E,IAAI,CAAC,eAAe,CAAC,QAAQ,CAAC,SAAS,CAAC,EAAE,CAAC;QACzC,MAAM,IAAI,kBAAkB,CAAC,+BAA+B,SAAS,EAAE,CAAC,CAAC;IAC3E,CAAC;IAED,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;IAC/D,OAAO,IAAI,UAAU,CAAC,UAAU,CAAC,CAAC;AACpC,CAAC;AAED;;;;;;GAMG;AACH,MAAM,CAAC,KAAK,UAAU,mBAAmB,CACvC,SAAiB,EACjB,YAAqB;IAErB,gDAAgD;IAChD,IAAI,SAAS,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;QACtD,IAAI,GAAG,GAAG,YAAY,CAAC;QACvB,IAAI,CAAC,GAAG,EAAE,CAAC;YACT,8CAA8C;YAC9C,MAAM,QAAQ,GAAG,SAAS,CAAC,OAAO,CAAC,uCAAuC,EAAE,EAAE,CAAC,CAAC;YAChF,MAAM,SAAS,GAAG,YAAY,CAAC,QAAQ,CAAC,CAAC;YACzC,MAAM,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;YACjC,GAAG,GAAG,QAAQ,CAAC,GAAG,CAAC,CAAC;QACtB,CAAC;QACD,MAAM,IAAI,GAAG,MAAM,UAAU,CAAC,SAAS,EAAE,GAAG,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,CAAC,CAAC;QACrE,OAAO,UAAU,CAAC,IAAI,CAAC,CAAC;IAC1B,CAAC;IAED,iDAAiD;IACjD,IAAI,SAAS,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;QACrD,OAAO,SAAS,CAAC;IACnB,CAAC;IAED,MAAM,IAAI,kBAAkB,CAAC,uDAAuD,CAAC,CAAC;AACxF,CAAC;AAED;;GAEG;AACH,SAAS,iBAAiB,CAAC,KAAc;IACvC,QAAQ,KAAK,EAAE,CAAC;QACd,KAAK,OAAO;YACV,OAAO,OAAO,CAAC;QACjB,KAAK,OAAO;YACV,OAAO,OAAO,CAAC;QACjB,KAAK,OAAO;YACV,OAAO,OAAO,CAAC;QACjB;YACE,MAAM,IAAI,kBAAkB,CAAC,sBAAsB,KAAK,EAAE,CAAC,CAAC;IAChE,CAAC;AACH,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,QAAiB,OAAO;IAC9D,MAAM,UAAU,GAAG,iBAAiB,CAAC,KAAK,CAAC,CAAC;IAE5C,2CAA2C;IAC3C,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,WAAW,CAAC,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,EAAE,IAAI,EAAE;QAClF,YAAY;KACb,CAAC,CAAC;IAEH,mCAAmC;IACnC,IAAI,SAAuB,CAAC;IAC5B,QAAQ,UAAU,EAAE,CAAC;QACnB,KAAK,OAAO;YACV,SAAS,GAAG,cAAc,CAAC;YAC3B,MAAM;QACR,KAAK,OAAO;YACV,SAAS,GAAG,cAAc,CAAC;YAC3B,MAAM;QACR,KAAK,OAAO;YACV,SAAS,GAAG,cAAc,CAAC;YAC3B,MAAM;QACR;YACE,MAAM,IAAI,kBAAkB,CAAC,sBAAsB,UAAU,EAAE,CAAC,CAAC;IACrE,CAAC;IAED,OAAO;QACL,SAAS,EAAE,aAAa,CAAC,OAAO,CAAC,SAAS,EAAE,SAAS,CAAC;QACtD,UAAU,EAAE,cAAc,CAAC,OAAO,CAAC,UAAU,EAAE,SAAS,CAAC;KAC1D,CAAC;AACJ,CAAC;AAED;;GAEG;AACH,MAAM,mBAAmB,GAAG,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAU,CAAC;AAGjE;;;GAGG;AACH,SAAS,mBAAmB,CAAC,SAAiB;IAC5C,kDAAkD;IAClD,MAAM,OAAO,GAAG,CAAC,CAAC,GAAG,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;IACjD,MAAM,MAAM,GAAG,SAAS,GAAG,GAAG,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;IAC/C,OAAO,YAAY,CAAC,MAAM,CAAC,CAAC,UAAU,CAAC;AACzC,CAAC;AAED;;;GAGG;AACH,SAAS,2BAA2B,CAAC,OAAoB;IACvD,iCAAiC;IACjC,MAAM,MAAM,GAAG,SAAS,CAAC,OAAO,CAAC,CAAC;IAElC,iEAAiE;IACjE,MAAM,SAAS,GAAG,cAAc,CAAC,MAAM,CAAC,CAAC;IAEzC,OAAO,SAA6B,CAAC;AACvC,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CACrC,UAAsB,EACtB,SAAoB,EACpB,UAAsB;IAEtB,iCAAiC;IACjC,MAAM,gBAAgB,GAAG,SAAS,CAAC,UAAU,CAAC,CAAC;IAC/C,MAAM,eAAe,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;IAE7C,8BAA8B;IAC9B,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC;IAC9B,IAAI,CAAC,KAAK,EAAE,CAAC;QACX,MAAM,IAAI,kBAAkB,CAAC,kCAAkC,CAAC,CAAC;IACnE,CAAC;IAED,gCAAgC;IAChC,MAAM,SAAS,GAA4B;QACzC,OAAO,EAAE,GAAG;QACZ,OAAO,EAAE,GAAG;QACZ,OAAO,EAAE,GAAG,EAAE,oCAAoC;KACnD,CAAC;IACF,MAAM,IAAI,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC;IAE9B,oCAAoC;IACpC,MAAM,YAAY,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,UAAU,CACjD,EAAE,IAAI,EAAE,MAAM,EAAE,MAAM,EAAE,eAAe,EAAE,EACzC,gBAAgB,EAChB,IAAI,CACL,CAAC;IAEF,4CAA4C;IAC5C,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,YAAY,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC,WAAW,CAAC,CAAC,CAAC;IAEjG,kCAAkC;IAClC,MAAM,SAAS,GAAG,UAAU,CAAC,SAAS,IAAI,GAAG,CAAC;IAC9C,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC9C;QACE,IAAI,EAAE,MAAM;QACZ,IAAI,EAAE,UAAU,CAAC,IAAI;QACrB,IAAI,EAAE,UAAU,CAAC,IAAI;QACrB,IAAI,EAAE,UAAU,CAAC,IAAI,IAAI,IAAI,UAAU,CAAC,CAAC,CAAC;KAC3C,EACD,OAAO,EACP,EAAE,IAAI,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,EACtC,IAAI,EACJ,CAAC,SAAS,EAAE,SAAS,CAAC,CACvB,CAAC;IAEF,+DAA+D;IAC/D,MAAM,QAAQ,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,UAAU,CAAC,CAAC;IAClE,OAAO,gBAAgB,CAAC,IAAI,UAAU,CAAC,QAAQ,CAAC,CAAC,CAAC;AACpD,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,IAAI,CAAC,IAAgB,EAAE,GAAiB;IAC5D,wCAAwC;IACxC,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,KAAK,EACL,QAAQ,EACR,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,EACjC,KAAK,EACL,CAAC,MAAM,CAAC,CACT,CAAC;IAEF,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,MAAM,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC;IACpE,OAAO,IAAI,UAAU,CAAC,SAAS,CAAC,CAAC;AACnC,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,UAAU,CAC9B,IAAgB,EAChB,SAAqB,EACrB,GAAiB;IAEjB,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,KAAK,EACL,QAAQ,EACR,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,EACjC,KAAK,EACL,CAAC,QAAQ,CAAC,CACX,CAAC;IACF,OAAO,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,MAAM,EAAE,SAAS,EAAE,SAAS,EAAE,IAAI,CAAC,CAAC;AAClE,CAAC;AAED;;;GAGG;AACH,KAAK,UAAU,0BAA0B,CAAC,OAAoB;IAC5D,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,OAAO,EACP,EAAE,IAAI,EAAE,UAAU,EAAE,IAAI,EAAE,SAAS,EAAE,EACrC,IAAI,EAAE,cAAc;IACpB,CAAC,SAAS,CAAC,CACZ,CAAC;IACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IACtD,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;QACX,MAAM,IAAI,kBAAkB,CAAC,kCAAkC,CAAC,CAAC;IACnE,CAAC;IACD,uCAAuC;IACvC,iDAAiD;IACjD,OAAO,mBAAmB,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;AACxC,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,GAAW;IACjD,iDAAiD;IACjD,IAAI,YAAY,GAAG,GAAG,CAAC;IACvB,IAAI,GAAG,CAAC,QAAQ,CAAC,6BAA6B,CAAC,EAAE,CAAC;QAChD,YAAY,GAAG,MAAM,mBAAmB,CAAC,GAAG,CAAC,CAAC;IAChD,CAAC;IAED,IAAI,CAAC,YAAY,CAAC,QAAQ,CAAC,4BAA4B,CAAC,EAAE,CAAC;QACzD,MAAM,IAAI,kBAAkB,CAAC,uDAAuD,CAAC,CAAC;IACxF,CAAC;IAED,MAAM,OAAO,GAAG,YAAY,CAAC,mBAAmB,CAAC,YAAY,CAAC,CAAC,CAAC;IAEhE,qDAAqD;IACrD,IAAI,CAAC;QACH,MAAM,WAAW,GAAG,MAAM,0BAA0B,CAAC,OAAO,CAAC,CAAC;QAC9D,IAAI,SAAqC,CAAC;QAC1C,IAAI,WAAW,GAAG,4BAA4B,EAAE,CAAC;YAC/C,MAAM,IAAI,kBAAkB,CAC1B,gBAAgB,WAAW,iCAAiC,4BAA4B,OAAO,CAChG,CAAC;QACJ,CAAC;aAAM,IAAI,WAAW,IAAI,IAAI,EAAE,CAAC;YAC/B,SAAS,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,IAAI,WAAW,IAAI,IAAI,EAAE,CAAC;YAC/B,SAAS,GAAG,UAAU,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,6BAA6B,WAAW,OAAO,CAAC,CAAC;QAChF,CAAC;QACD,OAAO,EAAE,SAAS,EAAE,GAAG,EAAE,YAAY,EAAE,CAAC;IAC1C,CAAC;IAAC,OAAO,CAAC,EAAE,CAAC;QACX,8CAA8C;QAC9C,IAAI,CAAC,YAAY,kBAAkB,EAAE,CAAC;YACpC,MAAM,CAAC,CAAC;QACV,CAAC;QACD,8BAA8B;IAChC,CAAC;IAED,gCAAgC;IAChC,IAAI,CAAC;QACH,MAAM,aAAa,GAAG,2BAA2B,CAAC,OAAO,CAAC,CAAC;QAC3D,MAAM,QAAQ,GAAG;YACf,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,cAAc;YACvB,OAAO,EAAE,cAAc;SACf,CAAC;QACX,OAAO,EAAE,SAAS,EAAE,QAAQ,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,YAAY,EAAE,CAAC;IACnE,CAAC;IAAC,MAAM,CAAC;QACP,qBAAqB;IACvB,CAAC;IAED,MAAM,IAAI,kBAAkB,CAAC,iEAAiE,CAAC,CAAC;AAClG,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,GAAe;IACrD,IAAI,GAAc,CAAC;IAEnB,IAAI,GAAG,CAAC,GAAG,KAAK,KAAK,EAAE,CAAC;QACtB,UAAU;QACV,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,UAAU,EAAE,IAAI,EAAE,SAAS,EAAE,EAAE,IAAI,EAAE;YAC3F,SAAS;SACV,CAAC,CAAC;IACL,CAAC;SAAM,IAAI,GAAG,CAAC,GAAG,KAAK,IAAI,EAAE,CAAC;QAC5B,SAAS;QACT,MAAM,GAAG,GAAG,GAAG,CAAC,GAAG,CAAC;QACpB,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACvD,MAAM,IAAI,kBAAkB,CAAC,yBAAyB,GAAG,EAAE,CAAC,CAAC;QAC/D,CAAC;QACD,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,GAAG,EAAE,EAAE,IAAI,EAAE,EAAE,CAAC,CAAC;IAC/F,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAAC,6BAA6B,GAAG,CAAC,GAAG,EAAE,CAAC,CAAC;IACvE,CAAC;IAED,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC;IAC9D,OAAO,WAAW,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;AAC/C,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,YAAoB;IAC1D,MAAM,aAAa,GAAG,mBAAmB,CAAC,YAAY,CAAC,CAAC;IACxD,MAAM,SAAS,GAAG,YAAY,CAAC,aAAa,CAAC,CAAC;IAC9C,MAAM,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;IAEjC,4BAA4B;IAC5B,MAAM,aAAa,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IAE9C,IAAI,aAAa,KAAK,MAAM,IAAI,aAAa,KAAK,OAAO,EAAE,CAAC;QAC1D,iCAAiC;QACjC,MAAM,UAAU,GAAG,cAAc,CAAC,GAAG,CAAC,CAAC;QACvC,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,SAAS,EACT,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,EAC7B,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;QACtD,oCAAoC;QACpC,MAAM,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,GAAG,CAAC;QAC/B,OAAO,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC;IAC5B,CAAC;SAAM,CAAC;QACN,UAAU;QACV,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CACvC,MAAM,EACN,SAAS,EACT,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,EAC9C,IAAI,EACJ,CAAC,QAAQ,CAAC,CACX,CAAC;QACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;QACtD,oCAAoC;QACpC,MAAM,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,GAAG,CAAC;QAC1B,OAAO,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,CAAC;IACvB,CAAC;AACH,CAAC;AAED,+DAA+D;AAC/D,sCAAsC;AACtC,+DAA+D;AAE/D;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,eAAe,CAAC,GAAW,EAAE,OAAmB;IACpE,MAAM,EAAE,KAAK,GAAG,SAAS,EAAE,WAAW,GAAG,IAAI,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAEzE,4EAA4E;IAC5E,MAAM,OAAO,GAAG,MAAM,iBAAiB,CAAC,GAAG,CAAC,CAAC;IAC7C,MAAM,SAAS,GAAG,aAAa,IAAI,OAAO,CAAC,SAAS,CAAC;IAErD,sFAAsF;IACtF,wFAAwF;IACxF,MAAM,OAAO,GAAG,mBAAmB,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;IACjD,MAAM,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,CAAC;IAExC,wEAAwE;IACxE,IAAI,eAA0D,CAAC;IAC/D,IAAI,SAAqB,CAAC;IAE1B,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,eAAe,GAAG,WAAW,EAAE,CAAC;YAChC,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC1B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACjE,SAAS,GAAG,CAAC,QAAQ,CAAC,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GACd,KAAK,KAAK,WAAW;YACnB,CAAC,CAAC,OAAO;YACT,CAAC,CAAC,KAAK,KAAK,WAAW;gBACrB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,KAAK,KAAK,WAAW;oBACrB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,CAAC,GAAG,EAAE;wBACJ,MAAM,IAAI,kBAAkB,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBACjE,CAAC,CAAC,EAAE,CAAC;QAEf,IAAI,KAAK,KAAK,QAAQ,EAAE,CAAC;YACvB,eAAe,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;YAC/C,SAAS,GAAG,EAAE,CAAC;QACjB,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC;YAChD,SAAS,GAAG,CAAC,QAAQ,CAAC,CAAC;QACzB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,4CAA4C,CAAC,CAAC;QAC7E,CAAC;IACH,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;IACtE,CAAC;IAED,sBAAsB;IACtB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,MAAM,EACN,SAAS,EACT,eAAe,EACf,WAAW,EACX,SAAS,CACV,CAAC;IAEF,OAAO,aAAa,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC7C,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,GAAW,EAAE,OAAmB;IACrE,MAAM,EAAE,KAAK,GAAG,SAAS,EAAE,WAAW,GAAG,IAAI,EAAE,aAAa,EAAE,GAAG,OAAO,CAAC;IAEzE,wEAAwE;IACxE,8EAA8E;IAC9E,IAAI,SAAuB,CAAC;IAE5B,MAAM,OAAO,GAAG,mBAAmB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,SAAS,GAAG,YAAY,CAAC,OAAO,CAAC,CAAC;IAExC,IAAI,aAAa,EAAE,CAAC;QAClB,SAAS,GAAG,aAAa,CAAC;IAC5B,CAAC;SAAM,CAAC;QACN,0EAA0E;QAC1E,wEAAwE;QACxE,MAAM,GAAG,GAAG,SAAS,CAAC,SAAS,CAAC,CAAC;QACjC,MAAM,aAAa,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC,CAAC,6BAA6B;QAC5E,IAAI,aAAa,KAAK,MAAM,IAAI,aAAa,KAAK,OAAO,EAAE,CAAC;YAC1D,MAAM,UAAU,GAAG,cAAc,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,QAAQ,GAAiC;gBAC7C,OAAO,EAAE,cAAc;gBACvB,OAAO,EAAE,cAAc;gBACvB,OAAO,EAAE,cAAc;aACxB,CAAC;YACF,MAAM,MAAM,GAAG,QAAQ,CAAC,UAAU,CAAC,CAAC;YACpC,IAAI,CAAC,MAAM;gBACT,MAAM,IAAI,kBAAkB,CAAC,wCAAwC,UAAU,EAAE,CAAC,CAAC;YACrF,SAAS,GAAG,MAAM,CAAC;QACrB,CAAC;aAAM,CAAC;YACN,4EAA4E;YAC5E,MAAM,OAAO,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC3C,OAAO,EACP,SAAS,EACT,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,EAC9C,IAAI,EACJ,CAAC,MAAM,CAAC,CACT,CAAC;YACF,MAAM,GAAG,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,OAAO,CAAC,CAAC;YAC1D,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,kBAAkB,CAAC,0CAA0C,CAAC,CAAC;YAC3E,CAAC;YACD,MAAM,WAAW,GAAG,mBAAmB,CAAC,GAAG,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC;YACnD,IAAI,WAAW,GAAG,4BAA4B,EAAE,CAAC;gBAC/C,MAAM,IAAI,kBAAkB,CAC1B,gBAAgB,WAAW,iCAAiC,4BAA4B,OAAO,CAChG,CAAC;YACJ,CAAC;YACD,SAAS,GAAG,WAAW,IAAI,IAAI,CAAC,CAAC,CAAC,UAAU,CAAC,CAAC,CAAC,UAAU,CAAC;QAC5D,CAAC;IACH,CAAC;IAED,4CAA4C;IAC5C,IAAI,eAA0D,CAAC;IAC/D,IAAI,SAAqB,CAAC;IAE1B,IAAI,SAAS,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,CAAC;QACjC,IAAI,KAAK,KAAK,SAAS,EAAE,CAAC;YACxB,eAAe,GAAG,WAAW,EAAE,CAAC;YAChC,SAAS,GAAG,CAAC,SAAS,CAAC,CAAC;QAC1B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,mBAAmB,EAAE,IAAI,EAAE,SAAS,EAAE,CAAC;YACjE,SAAS,GAAG,CAAC,MAAM,CAAC,CAAC;QACvB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,8CAA8C,CAAC,CAAC;QAC/E,CAAC;IACH,CAAC;SAAM,IAAI,SAAS,CAAC,UAAU,CAAC,KAAK,CAAC,EAAE,CAAC;QACvC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACtC,MAAM,UAAU,GACd,KAAK,KAAK,WAAW;YACnB,CAAC,CAAC,OAAO;YACT,CAAC,CAAC,KAAK,KAAK,WAAW;gBACrB,CAAC,CAAC,OAAO;gBACT,CAAC,CAAC,KAAK,KAAK,WAAW;oBACrB,CAAC,CAAC,OAAO;oBACT,CAAC,CAAC,CAAC,GAAG,EAAE;wBACJ,MAAM,IAAI,kBAAkB,CAAC,yBAAyB,KAAK,EAAE,CAAC,CAAC;oBACjE,CAAC,CAAC,EAAE,CAAC;QAEf,IAAI,KAAK,KAAK,QAAQ,EAAE,CAAC;YACvB,eAAe,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,UAAU,EAAE,CAAC;YAC/C,SAAS,GAAG,CAAC,YAAY,CAAC,CAAC;QAC7B,CAAC;aAAM,IAAI,KAAK,KAAK,MAAM,EAAE,CAAC;YAC5B,eAAe,GAAG,EAAE,IAAI,EAAE,OAAO,EAAE,UAAU,EAAE,CAAC;YAChD,SAAS,GAAG,CAAC,MAAM,CAAC,CAAC;QACvB,CAAC;aAAM,CAAC;YACN,MAAM,IAAI,kBAAkB,CAAC,4CAA4C,CAAC,CAAC;QAC7E,CAAC;IACH,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAAC,0BAA0B,SAAS,EAAE,CAAC,CAAC;IACtE,CAAC;IAED,sBAAsB;IACtB,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAC7C,OAAO,EACP,SAAS,EACT,eAAe,EACf,WAAW,EACX,SAAS,CACV,CAAC;IAEF,OAAO,cAAc,CAAC,SAAS,EAAE,SAAS,CAAC,CAAC;AAC9C,CAAC;AAED,+DAA+D;AAC/D,0CAA0C;AAC1C,+DAA+D;AAE/D;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,GAAc;IACrD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;IACnE,OAAO,WAAW,CAAC,SAAS,EAAE,YAAY,CAAC,CAAC;AAC9C,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,mBAAmB,CAAC,GAAe;IACvD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,MAAM,SAAS,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO,EAAE,SAAS,CAAC,CAAC;IACpE,OAAO,WAAW,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC;AAC/C,CAAC;AAED;;GAEG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,GAAc;IACrD,MAAM,SAAS,GAAG,SAAS,CAAC,GAAG,CAAC,CAAC;IACjC,OAAO,MAAM,MAAM,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;AACzD,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,QAAoB;IAC3D,OAAO,gBAAgB,CAAC,QAAQ,CAAC,CAAC;AACpC,CAAC;AAED;;;;GAIG;AACH,MAAM,CAAC,KAAK,UAAU,iBAAiB,CACrC,GAAiB,EACjB,SAAiB;IAEjB,MAAM,QAAQ,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;IACzC,MAAM,MAAM,GAAG,MAAM,QAAQ,CAAC,QAAQ,EAAE,SAAS,EAAE,oBAAoB,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,GAAG,CAAC,gBAAgB,CAAC,CAAC;AACtC,CAAC;AAED;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,kBAAkB,CAAC,MAAsB;IAC7D,MAAM,UAAU,GAAG,MAAM,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;IAClD,MAAM,MAAM,GAAG,QAAQ,CAAC,UAAU,CAAC,CAAC;IACpC,OAAO,gBAAgB,CAAC,MAAM,CAAC,CAAC;AAClC,CAAC;AAED,MAAM,CAAC,MAAM,oBAAoB,GAAkB;IACjD,IAAI;IACJ,MAAM;IACN,OAAO;IACP,qBAAqB;IACrB,iBAAiB;IACjB,MAAM;IACN,OAAO;IACP,oBAAoB;IACpB,kBAAkB;IAClB,mBAAmB;IACnB,kBAAkB;IAClB,mBAAmB;IACnB,iBAAiB;IACjB,WAAW;IACX,eAAe;IACf,sBAAsB;IACtB,gBAAgB;IAChB,eAAe;IACf,kBAAkB;IAClB,iBAAiB;IACjB,kBAAkB;IAClB,iBAAiB;IACjB,WAAW;IACX,IAAI;IACJ,UAAU;IACV,IAAI;IACJ,iBAAiB;IACjB,MAAM;CACP,CAAC"}