@protontech/openpgp 6.0.0-alpha.0 → 6.0.0-alpha.1.patch.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +6 -6
- package/dist/lightweight/argon2id.min.mjs +1 -1
- package/dist/lightweight/argon2id.min.mjs.map +1 -1
- package/dist/lightweight/argon2id.mjs +1 -1
- package/dist/lightweight/bn.interface.min.mjs +2 -2
- package/dist/lightweight/bn.interface.min.mjs.map +1 -1
- package/dist/lightweight/bn.interface.mjs +3460 -2
- package/dist/lightweight/interface.min.mjs +1 -1
- package/dist/lightweight/interface.min.mjs.map +1 -1
- package/dist/lightweight/interface.mjs +1 -1
- package/dist/lightweight/legacy_ciphers.min.mjs +3 -0
- package/dist/lightweight/legacy_ciphers.min.mjs.map +1 -0
- package/dist/lightweight/legacy_ciphers.mjs +1829 -0
- package/dist/lightweight/native.interface.min.mjs +1 -1
- package/dist/lightweight/native.interface.min.mjs.map +1 -1
- package/dist/lightweight/native.interface.mjs +1 -1
- package/dist/lightweight/noble_curves.min.mjs +11 -11
- package/dist/lightweight/noble_curves.min.mjs.map +1 -1
- package/dist/lightweight/noble_curves.mjs +84 -55
- package/dist/lightweight/noble_hashes.min.mjs +2 -2
- package/dist/lightweight/noble_hashes.min.mjs.map +1 -1
- package/dist/lightweight/noble_hashes.mjs +1 -2
- package/dist/lightweight/openpgp.min.mjs +2 -2
- package/dist/lightweight/openpgp.min.mjs.map +1 -1
- package/dist/lightweight/openpgp.mjs +1373 -3341
- package/dist/lightweight/sha3.min.mjs +3 -3
- package/dist/lightweight/sha3.min.mjs.map +1 -1
- package/dist/lightweight/sha3.mjs +51 -37
- package/dist/node/openpgp.cjs +7887 -8057
- package/dist/node/openpgp.min.cjs +11 -11
- package/dist/node/openpgp.min.cjs.map +1 -1
- package/dist/node/openpgp.min.mjs +11 -11
- package/dist/node/openpgp.min.mjs.map +1 -1
- package/dist/node/openpgp.mjs +7886 -8058
- package/dist/openpgp.js +7940 -8020
- package/dist/openpgp.min.js +11 -11
- package/dist/openpgp.min.js.map +1 -1
- package/dist/openpgp.min.mjs +11 -11
- package/dist/openpgp.min.mjs.map +1 -1
- package/dist/openpgp.mjs +7939 -8021
- package/openpgp.d.ts +58 -43
- package/package.json +32 -34
- package/dist/lightweight/bn.min.mjs +0 -3
- package/dist/lightweight/bn.min.mjs.map +0 -1
- package/dist/lightweight/bn.mjs +0 -3449
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
/*! OpenPGP.js v6.0.0-alpha.0 -
|
|
2
|
-
const e="undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:{},t=Symbol("doneWritingPromise"),r=Symbol("doneWritingResolve"),i=Symbol("doneWritingReject"),n=Symbol("readingIndex");class a extends Array{constructor(){super(),Object.setPrototypeOf(this,a.prototype),this[t]=new Promise(((e,t)=>{this[r]=e,this[i]=t})),this[t].catch((()=>{}))}}function s(e){return e&&e.getReader&&Array.isArray(e)}function o(e){if(!s(e)){const t=e.getWriter(),r=t.releaseLock;return t.releaseLock=()=>{t.closed.catch((function(){})),r.call(t)},t}this.stream=e}a.prototype.getReader=function(){return void 0===this[n]&&(this[n]=0),{read:async()=>(await this[t],this[n]===this.length?{value:void 0,done:!0}:{value:this[this[n]++],done:!1})}},a.prototype.readToEnd=async function(e){await this[t];const r=e(this.slice(this[n]));return this.length=0,r},a.prototype.clone=function(){const e=new a;return e[t]=this[t].then((()=>{e.push(...this)})),e},o.prototype.write=async function(e){this.stream.push(e)},o.prototype.close=async function(){this.stream[r]()},o.prototype.abort=async function(e){return this.stream[i](e),e},o.prototype.releaseLock=function(){};const c=null,u=null,h=null;function y(t){return s(t)?"array":e.ReadableStream&&e.ReadableStream.prototype.isPrototypeOf(t)?"web":!(!t||!t.getReader)&&"web-like"}function l(e){return Uint8Array.prototype.isPrototypeOf(e)}function p(e){if(1===e.length)return e[0];let t=0;for(let r=0;r<e.length;r++){if(!l(e[r]))throw Error("concatUint8Array: Data must be in the form of a Uint8Array");t+=e[r].length}const r=new Uint8Array(t);let i=0;return e.forEach((function(e){r.set(e,i),i+=e.length})),r}"object"==typeof e.process&&e.process.versions;const g=new WeakSet,d=Symbol("externalBuffer");function f(e){if(this.stream=e,e[d]&&(this[d]=e[d].slice()),s(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{},void(this._cancel=()=>{})}let t=y(e);if("node"===t&&(e=h(e)),t){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{t.closed.catch((function(){})),t.releaseLock()},void(this._cancel=t.cancel.bind(t))}let r=!1;this._read=async()=>r||g.has(e)?{value:void 0,done:!0}:(r=!0,{value:e,done:!1}),this._releaseLock=()=>{if(r)try{g.add(e)}catch(e){}}}function m(e){let t=y(e);return"node"===t?h(e):t?e:new ReadableStream({start(t){t.enqueue(e),t.close()}})}function w(e){if(y(e))return e;const t=new a;return(async()=>{const r=B(t);await r.write(e),await r.close()})(),t}function b(e){return e.some((e=>y(e)&&!s(e)))?function(e){e=e.map(m);const t=A((async function(e){await Promise.all(i.map((t=>T(t,e))))}));let r=Promise.resolve();const i=e.map(((i,n)=>E(i,((i,a)=>(r=r.then((()=>k(i,t.writable,{preventClose:n!==e.length-1}))),r)))));return t.readable}(e):e.some((e=>s(e)))?function(e){const t=new a;let r=Promise.resolve();return e.forEach(((i,n)=>(r=r.then((()=>k(i,t,{preventClose:n!==e.length-1}))),r))),t}(e):"string"==typeof e[0]?e.join(""):p(e)}async function k(e,t,{preventClose:r=!1,preventAbort:i=!1,preventCancel:n=!1}={}){if(y(e)&&!s(e)){e=m(e);try{if(e[d]){const r=B(t);for(let t=0;t<e[d].length;t++)await r.ready,await r.write(e[d][t]);r.releaseLock()}await e.pipeTo(t,{preventClose:r,preventAbort:i,preventCancel:n})}catch(e){}return}const a=_(e=w(e)),o=B(t);try{for(;;){await o.ready;const{done:e,value:t}=await a.read();if(e){r||await o.close();break}await o.write(t)}}catch(e){i||await o.abort(e)}finally{a.releaseLock(),o.releaseLock()}}function v(e,t){const r=new TransformStream(t);return k(e,r.writable),r.readable}function A(e){let t,r,i=!1;return{readable:new ReadableStream({start(e){r=e},pull(){t?t():i=!0},cancel:e},{highWaterMark:0}),writable:new WritableStream({write:async function(e){r.enqueue(e),i?i=!1:(await new Promise((e=>{t=e})),t=null)},close:r.close.bind(r),abort:r.error.bind(r)})}}function K(e,t=(()=>{}),r=(()=>{})){if(s(e)){const i=new a;return(async()=>{const n=B(i);try{const i=await x(e),a=t(i),s=r();let o;o=void 0!==a&&void 0!==s?b([a,s]):void 0!==a?a:s,await n.write(o),await n.close()}catch(e){await n.abort(e)}})(),i}if(y(e))return v(e,{async transform(e,r){try{const i=await t(e);void 0!==i&&r.enqueue(i)}catch(e){r.error(e)}},async flush(e){try{const t=await r();void 0!==t&&e.enqueue(t)}catch(t){e.error(t)}}});const i=t(e),n=r();return void 0!==i&&void 0!==n?b([i,n]):void 0!==i?i:n}function E(e,t){if(y(e)&&!s(e)){let r;const i=new TransformStream({start(e){r=e}}),n=k(e,i.writable),a=A((async function(e){r.error(e),await n,await new Promise(setTimeout)}));return t(i.readable,a.writable),a.readable}e=w(e);const r=new a;return t(e,r),r}function S(e,t){let r;const i=E(e,((e,n)=>{const a=_(e);a.remainder=()=>(a.releaseLock(),k(e,n),i),r=t(a)}));return r}function P(e){if(s(e))return e.clone();if(y(e)){const t=function(e){if(s(e))throw Error("ArrayStream cannot be tee()d, use clone() instead");if(y(e)){const t=m(e).tee();return t[0][d]=t[1][d]=e[d],t}return[C(e),C(e)]}(e);return D(e,t[0]),t[1]}return C(e)}function U(e){return s(e)?P(e):y(e)?new ReadableStream({start(t){const r=E(e,(async(e,r)=>{const i=_(e),n=B(r);try{for(;;){await n.ready;const{done:e,value:r}=await i.read();if(e){try{t.close()}catch(e){}return void await n.close()}try{t.enqueue(r)}catch(e){}await n.write(r)}}catch(e){t.error(e),await n.abort(e)}}));D(e,r)}}):C(e)}function D(e,t){Object.entries(Object.getOwnPropertyDescriptors(e.constructor.prototype)).forEach((([r,i])=>{"constructor"!==r&&(i.value?i.value=i.value.bind(t):i.get=i.get.bind(t),Object.defineProperty(e,r,i))}))}function C(e,t=0,r=1/0){if(s(e))throw Error("Not implemented");if(y(e)){if(t>=0&&r>=0){let i=0;return v(e,{transform(e,n){i<r?(i+e.length>=t&&n.enqueue(C(e,Math.max(t-i,0),r-i)),i+=e.length):n.terminate()}})}if(t<0&&(r<0||r===1/0)){let i=[];return K(e,(e=>{e.length>=-t?i=[e]:i.push(e)}),(()=>C(b(i),t,r)))}if(0===t&&r<0){let i;return K(e,(e=>{const n=i?b([i,e]):e;if(n.length>=-r)return i=C(n,r),C(n,t,r);i=n}))}return console.warn(`stream.slice(input, ${t}, ${r}) not implemented efficiently.`),I((async()=>C(await x(e),t,r)))}return e[d]&&(e=b(e[d].concat([e]))),l(e)&&!c?(r===1/0&&(r=e.length),e.subarray(t,r)):e.slice(t,r)}async function x(e,t=b){return s(e)?e.readToEnd(t):y(e)?_(e).readToEnd(t):e}async function T(e,t){if(y(e)){if(e.cancel){const r=await e.cancel(t);return await new Promise(setTimeout),r}if(e.destroy)return e.destroy(t),await new Promise(setTimeout),t}}function I(e){const t=new a;return(async()=>{const r=B(t);try{await r.write(await e()),await r.close()}catch(e){await r.abort(e)}})(),t}function _(e){return new f(e)}function B(e){return new o(e)}f.prototype.read=async function(){if(this[d]&&this[d].length){return{done:!1,value:this[d].shift()}}return this._read()},f.prototype.releaseLock=function(){this[d]&&(this.stream[d]=this[d]),this._releaseLock()},f.prototype.cancel=function(e){return this._cancel(e)},f.prototype.readLine=async function(){let e,t=[];for(;!e;){let{done:r,value:i}=await this.read();if(i+="",r)return t.length?b(t):void 0;const n=i.indexOf("\n")+1;n&&(e=b(t.concat(i.substr(0,n))),t=[]),n!==i.length&&t.push(i.substr(n))}return this.unshift(...t),e},f.prototype.readByte=async function(){const{done:e,value:t}=await this.read();if(e)return;const r=t[0];return this.unshift(C(t,1)),r},f.prototype.readBytes=async function(e){const t=[];let r=0;for(;;){const{done:i,value:n}=await this.read();if(i)return t.length?b(t):void 0;if(t.push(n),r+=n.length,r>=e){const r=b(t);return this.unshift(C(r,e)),C(r,0,e)}}},f.prototype.peekBytes=async function(e){const t=await this.readBytes(e);return this.unshift(t),t},f.prototype.unshift=function(...e){this[d]||(this[d]=[]),1===e.length&&l(e[0])&&this[d].length&&e[0].length&&this[d][0].byteOffset>=e[0].length?this[d][0]=new Uint8Array(this[d][0].buffer,this[d][0].byteOffset-e[0].length,this[d][0].byteLength+e[0].length):this[d].unshift(...e.filter((e=>e&&e.length)))},f.prototype.readToEnd=async function(e=b){const t=[];for(;;){const{done:e,value:r}=await this.read();if(e)break;t.push(r)}return e(t)};const R=Symbol("byValue");var M={curve:{p256:"p256","P-256":"p256",secp256r1:"p256",prime256v1:"p256","1.2.840.10045.3.1.7":"p256","2a8648ce3d030107":"p256","2A8648CE3D030107":"p256",p384:"p384","P-384":"p384",secp384r1:"p384","1.3.132.0.34":"p384","2b81040022":"p384","2B81040022":"p384",p521:"p521","P-521":"p521",secp521r1:"p521","1.3.132.0.35":"p521","2b81040023":"p521","2B81040023":"p521",secp256k1:"secp256k1","1.3.132.0.10":"secp256k1","2b8104000a":"secp256k1","2B8104000A":"secp256k1",ed25519Legacy:"ed25519Legacy",ED25519:"ed25519Legacy",ed25519:"ed25519Legacy",Ed25519:"ed25519Legacy","1.3.6.1.4.1.11591.15.1":"ed25519Legacy","2b06010401da470f01":"ed25519Legacy","2B06010401DA470F01":"ed25519Legacy",curve25519Legacy:"curve25519Legacy",X25519:"curve25519Legacy",cv25519:"curve25519Legacy",curve25519:"curve25519Legacy",Curve25519:"curve25519Legacy","1.3.6.1.4.1.3029.1.5.1":"curve25519Legacy","2b060104019755010501":"curve25519Legacy","2B060104019755010501":"curve25519Legacy",brainpoolP256r1:"brainpoolP256r1","1.3.36.3.3.2.8.1.1.7":"brainpoolP256r1","2b2403030208010107":"brainpoolP256r1","2B2403030208010107":"brainpoolP256r1",brainpoolP384r1:"brainpoolP384r1","1.3.36.3.3.2.8.1.1.11":"brainpoolP384r1","2b240303020801010b":"brainpoolP384r1","2B240303020801010B":"brainpoolP384r1",brainpoolP512r1:"brainpoolP512r1","1.3.36.3.3.2.8.1.1.13":"brainpoolP512r1","2b240303020801010d":"brainpoolP512r1","2B240303020801010D":"brainpoolP512r1"},kdfFlags:{replace_fingerprint:1,replace_kdf_params:2},s2k:{simple:0,salted:1,iterated:3,argon2:4,gnu:101},publicKey:{rsaEncryptSign:1,rsaEncrypt:2,rsaSign:3,elgamal:16,dsa:17,ecdh:18,ecdsa:19,eddsaLegacy:22,aedh:23,aedsa:24,x25519:25,x448:26,ed25519:27,ed448:28,aead:100,hmac:101},symmetric:{idea:1,tripledes:2,cast5:3,blowfish:4,aes128:7,aes192:8,aes256:9,twofish:10},compression:{uncompressed:0,zip:1,zlib:2,bzip2:3},hash:{md5:1,sha1:2,ripemd:3,sha256:8,sha384:9,sha512:10,sha224:11,sha3_256:12,sha3_512:14},webHash:{"SHA-1":2,"SHA-256":8,"SHA-384":9,"SHA-512":10},aead:{eax:1,ocb:2,gcm:3,experimentalGCM:100},packet:{publicKeyEncryptedSessionKey:1,signature:2,symEncryptedSessionKey:3,onePassSignature:4,secretKey:5,publicKey:6,secretSubkey:7,compressedData:8,symmetricallyEncryptedData:9,marker:10,literalData:11,trust:12,userID:13,publicSubkey:14,userAttribute:17,symEncryptedIntegrityProtectedData:18,modificationDetectionCode:19,aeadEncryptedData:20,padding:21},literal:{binary:98,text:116,utf8:117,mime:109},signature:{binary:0,text:1,standalone:2,certGeneric:16,certPersona:17,certCasual:18,certPositive:19,certRevocation:48,subkeyBinding:24,keyBinding:25,key:31,keyRevocation:32,subkeyRevocation:40,timestamp:64,thirdParty:80},signatureSubpacket:{signatureCreationTime:2,signatureExpirationTime:3,exportableCertification:4,trustSignature:5,regularExpression:6,revocable:7,keyExpirationTime:9,placeholderBackwardsCompatibility:10,preferredSymmetricAlgorithms:11,revocationKey:12,issuerKeyID:16,notationData:20,preferredHashAlgorithms:21,preferredCompressionAlgorithms:22,keyServerPreferences:23,preferredKeyServer:24,primaryUserID:25,policyURI:26,keyFlags:27,signersUserID:28,reasonForRevocation:29,features:30,signatureTarget:31,embeddedSignature:32,issuerFingerprint:33,preferredAEADAlgorithms:34,preferredCipherSuites:39},keyFlags:{certifyKeys:1,signData:2,encryptCommunication:4,encryptStorage:8,splitPrivateKey:16,authentication:32,forwardedCommunication:64,sharedPrivateKey:128},armor:{multipartSection:0,multipartLast:1,signed:2,message:3,publicKey:4,privateKey:5,signature:6},reasonForRevocation:{noReason:0,keySuperseded:1,keyCompromised:2,keyRetired:3,userIDInvalid:32},features:{modificationDetection:1,aead:2,v5Keys:4,seipdv2:8},write:function(e,t){if("number"==typeof t&&(t=this.read(e,t)),void 0!==e[t])return e[t];throw Error("Invalid enum value.")},read:function(e,t){if(e[R]||(e[R]=[],Object.entries(e).forEach((([t,r])=>{e[R][r]=t}))),void 0!==e[R][t])return e[R][t];throw Error("Invalid enum value.")}},L={preferredHashAlgorithm:M.hash.sha256,preferredSymmetricAlgorithm:M.symmetric.aes256,preferredCompressionAlgorithm:M.compression.uncompressed,deflateLevel:6,aeadProtect:!1,preferredAEADAlgorithm:M.aead.gcm,aeadChunkSizeByte:12,v6Keys:!1,s2kType:M.s2k.iterated,s2kIterationCountByte:224,s2kArgon2Params:{passes:3,parallelism:4,memoryExponent:16},allowUnauthenticatedMessages:!1,allowUnauthenticatedStream:!1,allowForwardedMessages:!1,minRSABits:2047,passwordCollisionCheck:!1,revocationsExpire:!1,allowInsecureDecryptionWithSigningKeys:!1,allowInsecureVerificationWithReformattedKeys:!1,allowMissingKeyFlags:!1,constantTimePKCS1Decryption:!1,constantTimePKCS1DecryptionSupportedSymmetricAlgorithms:new Set([M.symmetric.aes128,M.symmetric.aes192,M.symmetric.aes256]),ignoreUnsupportedPackets:!0,ignoreMalformedPackets:!1,additionalAllowedPackets:[],showVersion:!1,showComment:!1,versionString:"OpenPGP.js 6.0.0-alpha.0",commentString:"https://openpgpjs.org",maxUserIDLength:5120,knownNotations:[],useEllipticFallback:!0,rejectHashAlgorithms:new Set([M.hash.md5,M.hash.ripemd]),rejectMessageHashAlgorithms:new Set([M.hash.md5,M.hash.ripemd,M.hash.sha1]),rejectPublicKeyAlgorithms:new Set([M.publicKey.elgamal,M.publicKey.dsa]),rejectCurves:new Set([M.curve.secp256k1]),checkEdDSAFaultySignatures:!0};const F=()=>"undefined"!=typeof BigInt;const z=(()=>{try{return"development"===process.env.NODE_ENV}catch(e){}return!1})(),N={isString:function(e){return"string"==typeof e||e instanceof String},nodeRequire:()=>{},isArray:function(e){return e instanceof Array},isUint8Array:l,isStream:y,getBigInteger:async function(){if(F()){const{default:e}=await import("./native.interface.min.mjs");return e}{const{default:e}=await import("./bn.interface.min.mjs");return e}},getNobleCurve:async(e,t)=>{if(!L.useEllipticFallback)throw Error("This curve is only supported in the full build of OpenPGP.js");const{nobleCurves:r}=await import("./noble_curves.min.mjs");switch(e){case M.publicKey.ecdh:case M.publicKey.ecdsa:{const e=r.get(t);if(!e)throw Error("Unsupported curve");return e}case M.publicKey.x448:return r.get("x448");case M.publicKey.ed448:return r.get("ed448");default:throw Error("Unsupported curve")}},readNumber:function(e){let t=0;for(let r=0;r<e.length;r++)t+=256**r*e[e.length-1-r];return t},writeNumber:function(e,t){const r=new Uint8Array(t);for(let i=0;i<t;i++)r[i]=e>>8*(t-i-1)&255;return r},readDate:function(e){const t=N.readNumber(e);return new Date(1e3*t)},writeDate:function(e){const t=Math.floor(e.getTime()/1e3);return N.writeNumber(t,4)},normalizeDate:function(e=Date.now()){return null===e||e===1/0?e:new Date(1e3*Math.floor(+e/1e3))},readMPI:function(e){const t=(e[0]<<8|e[1])+7>>>3;return N.readExactSubarray(e,2,2+t)},readExactSubarray:function(e,t,r){if(e.length<r-t)throw Error("Input array too short");return e.subarray(t,r)},leftPad(e,t){const r=new Uint8Array(t),i=t-e.length;return r.set(e,i),r},uint8ArrayToMPI:function(e){const t=N.uint8ArrayBitLength(e);if(0===t)throw Error("Zero MPI");const r=e.subarray(e.length-Math.ceil(t/8)),i=new Uint8Array([(65280&t)>>8,255&t]);return N.concatUint8Array([i,r])},uint8ArrayBitLength:function(e){let t;for(t=0;t<e.length&&0===e[t];t++);if(t===e.length)return 0;const r=e.subarray(t);return 8*(r.length-1)+N.nbits(r[0])},hexToUint8Array:function(e){const t=new Uint8Array(e.length>>1);for(let r=0;r<e.length>>1;r++)t[r]=parseInt(e.substr(r<<1,2),16);return t},uint8ArrayToHex:function(e){const t="0123456789abcdef";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),r},stringToUint8Array:function(e){return K(e,(e=>{if(!N.isString(e))throw Error("stringToUint8Array: Data must be in the form of a string");const t=new Uint8Array(e.length);for(let r=0;r<e.length;r++)t[r]=e.charCodeAt(r);return t}))},uint8ArrayToString:function(e){const t=[],r=16384,i=(e=new Uint8Array(e)).length;for(let n=0;n<i;n+=r)t.push(String.fromCharCode.apply(String,e.subarray(n,n+r<i?n+r:i)));return t.join("")},encodeUTF8:function(e){const t=new TextEncoder("utf-8");function r(e,r=!1){return t.encode(e,{stream:!r})}return K(e,r,(()=>r("",!0)))},decodeUTF8:function(e){const t=new TextDecoder("utf-8");function r(e,r=!1){return t.decode(e,{stream:!r})}return K(e,r,(()=>r(new Uint8Array,!0)))},concat:b,concatUint8Array:p,equalsUint8Array:function(e,t){if(!N.isUint8Array(e)||!N.isUint8Array(t))throw Error("Data must be in the form of a Uint8Array");if(e.length!==t.length)return!1;for(let r=0;r<e.length;r++)if(e[r]!==t[r])return!1;return!0},writeChecksum:function(e){let t=0;for(let r=0;r<e.length;r++)t=t+e[r]&65535;return N.writeNumber(t,2)},printDebug:function(e){z&&console.log("[OpenPGP.js debug]",e)},printDebugError:function(e){z&&console.error("[OpenPGP.js debug]",e)},nbits:function(e){let t=1,r=e>>>16;return 0!==r&&(e=r,t+=16),r=e>>8,0!==r&&(e=r,t+=8),r=e>>4,0!==r&&(e=r,t+=4),r=e>>2,0!==r&&(e=r,t+=2),r=e>>1,0!==r&&(e=r,t+=1),t},double:function(e){const t=new Uint8Array(e.length),r=e.length-1;for(let i=0;i<r;i++)t[i]=e[i]<<1^e[i+1]>>7;return t[r]=e[r]<<1^135*(e[0]>>7),t},shiftRight:function(e,t){if(t)for(let r=e.length-1;r>=0;r--)e[r]>>=t,r>0&&(e[r]|=e[r-1]<<8-t);return e},getWebCrypto:function(){return void 0!==e&&e.crypto&&e.crypto.subtle},getNodeCrypto:function(){return this.nodeRequire("crypto")},getNodeZlib:function(){return this.nodeRequire("zlib")},getNodeBuffer:function(){return(this.nodeRequire("buffer")||{}).Buffer},getHardwareConcurrency:function(){if("undefined"!=typeof navigator)return navigator.hardwareConcurrency||1;return this.nodeRequire("os").cpus().length},isEmailAddress:function(e){if(!N.isString(e))return!1;return/^(([^<>()[\]\\.,;:\s@"]+(\.[^<>()[\]\\.,;:\s@"]+)*)|(".+"))@((\[[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\])|(([a-zA-Z\-0-9]+\.)+([a-zA-Z]{2,}[0-9]*|xn--[a-zA-Z\-0-9]+)))$/.test(e)},canonicalizeEOL:function(e){let t=!1;return K(e,(e=>{let r;t&&(e=N.concatUint8Array([new Uint8Array([13]),e])),13===e[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;const i=[];for(let t=0;r=e.indexOf(10,t)+1,r;t=r)13!==e[r-2]&&i.push(r);if(!i.length)return e;const n=new Uint8Array(e.length+i.length);let a=0;for(let t=0;t<i.length;t++){const r=e.subarray(i[t-1]||0,i[t]);n.set(r,a),a+=r.length,n[a-1]=13,n[a]=10,a++}return n.set(e.subarray(i[i.length-1]||0),a),n}),(()=>t?new Uint8Array([13]):void 0))},nativeEOL:function(e){let t=!1;return K(e,(e=>{let r;13===(e=t&&10!==e[0]?N.concatUint8Array([new Uint8Array([13]),e]):new Uint8Array(e))[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;let i=0;for(let t=0;t!==e.length;t=r){r=e.indexOf(13,t)+1,r||(r=e.length);const n=r-(10===e[r]?1:0);t&&e.copyWithin(i,t,n),i+=n-t}return e.subarray(0,i)}),(()=>t?new Uint8Array([13]):void 0))},removeTrailingSpaces:function(e){return e.split("\n").map((e=>{let t=e.length-1;for(;t>=0&&(" "===e[t]||"\t"===e[t]||"\r"===e[t]);t--);return e.substr(0,t+1)})).join("\n")},wrapError:function(e,t){if(!t)return Error(e);try{t.message=e+": "+t.message}catch(e){}return t},constructAllowedPackets:function(e){const t={};return e.forEach((e=>{if(!e.tag)throw Error("Invalid input: expected a packet class");t[e.tag]=e})),t},anyPromise:function(e){return new Promise((async(t,r)=>{let i;await Promise.all(e.map((async e=>{try{t(await e)}catch(e){i=e}}))),r(i)}))},selectUint8Array:function(e,t,r){const i=Math.max(t.length,r.length),n=new Uint8Array(i);let a=0;for(let i=0;i<n.length;i++)n[i]=t[i]&256-e|r[i]&255+e,a+=e&i<t.length|1-e&i<r.length;return n.subarray(0,a)},selectUint8:function(e,t,r){return t&256-e|r&255+e},isAES:function(e){return e===M.symmetric.aes128||e===M.symmetric.aes192||e===M.symmetric.aes256}},O=N.getNodeBuffer();let H,j;function q(e){let t=new Uint8Array;return K(e,(e=>{t=N.concatUint8Array([t,e]);const r=[],i=Math.floor(t.length/45),n=45*i,a=H(t.subarray(0,n));for(let e=0;e<i;e++)r.push(a.substr(60*e,60)),r.push("\n");return t=t.subarray(n),r.join("")}),(()=>t.length?H(t)+"\n":""))}function G(e){let t="";return K(e,(e=>{t+=e;let r=0;const i=[" ","\t","\r","\n"];for(let e=0;e<i.length;e++){const n=i[e];for(let e=t.indexOf(n);-1!==e;e=t.indexOf(n,e+1))r++}let n=t.length;for(;n>0&&(n-r)%4!=0;n--)i.includes(t[n])&&r--;const a=j(t.substr(0,n));return t=t.substr(n),a}),(()=>j(t)))}function V(e){return G(e.replace(/-/g,"+").replace(/_/g,"/"))}function W(e,t){let r=q(e).replace(/[\r\n]/g,"");return t&&(r=r.replace(/[+]/g,"-").replace(/[/]/g,"_").replace(/[=]/g,"")),r}function $(e){const t=e.match(/^-----BEGIN PGP (MESSAGE, PART \d+\/\d+|MESSAGE, PART \d+|SIGNED MESSAGE|MESSAGE|PUBLIC KEY BLOCK|PRIVATE KEY BLOCK|SIGNATURE)-----$/m);if(!t)throw Error("Unknown ASCII armor type");return/MESSAGE, PART \d+\/\d+/.test(t[1])?M.armor.multipartSection:/MESSAGE, PART \d+/.test(t[1])?M.armor.multipartLast:/SIGNED MESSAGE/.test(t[1])?M.armor.signed:/MESSAGE/.test(t[1])?M.armor.message:/PUBLIC KEY BLOCK/.test(t[1])?M.armor.publicKey:/PRIVATE KEY BLOCK/.test(t[1])?M.armor.privateKey:/SIGNATURE/.test(t[1])?M.armor.signature:void 0}function X(e,t){let r="";return t.showVersion&&(r+="Version: "+t.versionString+"\n"),t.showComment&&(r+="Comment: "+t.commentString+"\n"),e&&(r+="Comment: "+e+"\n"),r+="\n",r}function Z(e){for(let t=0;t<e.length;t++)/^([^\s:]|[^\s:][^:]*[^\s:]): .+$/.test(e[t])||N.printDebugError(Error("Improperly formatted armor header: "+e[t])),/^(Version|Comment|MessageID|Hash|Charset): .+$/.test(e[t])||N.printDebugError(Error("Unknown header: "+e[t]))}function Y(e){let t=e;const r=e.lastIndexOf("=");return r>=0&&r!==e.length-1&&(t=e.slice(0,r)),t}function Q(e){return new Promise((async(t,r)=>{try{const i=/^-----[^-]+-----$/m,n=/^[ \f\r\t\u00a0\u2000-\u200a\u202f\u205f\u3000]*$/;let a;const s=[];let o,c,u=s,h=[];const y=G(E(e,(async(e,l)=>{const p=_(e);try{for(;;){let e=await p.readLine();if(void 0===e)throw Error("Misformed armored text");if(e=N.removeTrailingSpaces(e.replace(/[\r\n]/g,"")),a)if(o)c||a!==M.armor.signed||(i.test(e)?(h=h.join("\r\n"),c=!0,Z(u),u=[],o=!1):h.push(e.replace(/^- /,"")));else if(i.test(e)&&r(Error("Mandatory blank line missing between armor headers and armor data")),n.test(e)){if(Z(u),o=!0,c||a!==M.armor.signed){t({text:h,data:y,headers:s,type:a});break}}else u.push(e);else i.test(e)&&(a=$(e))}}catch(e){return void r(e)}const g=B(l);try{for(;;){await g.ready;const{done:e,value:t}=await p.read();if(e)throw Error("Misformed armored text");const r=t+"";if(-1!==r.indexOf("=")||-1!==r.indexOf("-")){let e=await p.readToEnd();e.length||(e=""),e=r+e,e=N.removeTrailingSpaces(e.replace(/\r/g,""));const t=e.split(i);if(1===t.length)throw Error("Misformed armored text");const n=Y(t[0].slice(0,-1));await g.write(n);break}await g.write(r)}await g.ready,await g.close()}catch(e){await g.abort(e)}})))}catch(e){r(e)}})).then((async e=>(s(e.data)&&(e.data=await x(e.data)),e)))}function J(e,t,r,i,n,a=L){let s,o;e===M.armor.signed&&(s=t.text,o=t.hash,t=t.data);const c=[];switch(e){case M.armor.multipartSection:c.push("-----BEGIN PGP MESSAGE, PART "+r+"/"+i+"-----\n"),c.push(X(n,a)),c.push(q(t)),c.push("-----END PGP MESSAGE, PART "+r+"/"+i+"-----\n");break;case M.armor.multipartLast:c.push("-----BEGIN PGP MESSAGE, PART "+r+"-----\n"),c.push(X(n,a)),c.push(q(t)),c.push("-----END PGP MESSAGE, PART "+r+"-----\n");break;case M.armor.signed:c.push("-----BEGIN PGP SIGNED MESSAGE-----\n"),c.push(o?`Hash: ${o}\n\n`:"\n"),c.push(s.replace(/^-/gm,"- -")),c.push("\n-----BEGIN PGP SIGNATURE-----\n"),c.push(X(n,a)),c.push(q(t)),c.push("-----END PGP SIGNATURE-----\n");break;case M.armor.message:c.push("-----BEGIN PGP MESSAGE-----\n"),c.push(X(n,a)),c.push(q(t)),c.push("-----END PGP MESSAGE-----\n");break;case M.armor.publicKey:c.push("-----BEGIN PGP PUBLIC KEY BLOCK-----\n"),c.push(X(n,a)),c.push(q(t)),c.push("-----END PGP PUBLIC KEY BLOCK-----\n");break;case M.armor.privateKey:c.push("-----BEGIN PGP PRIVATE KEY BLOCK-----\n"),c.push(X(n,a)),c.push(q(t)),c.push("-----END PGP PRIVATE KEY BLOCK-----\n");break;case M.armor.signature:c.push("-----BEGIN PGP SIGNATURE-----\n"),c.push(X(n,a)),c.push(q(t)),c.push("-----END PGP SIGNATURE-----\n")}return N.concat(c)}O?(H=e=>O.from(e).toString("base64"),j=e=>{const t=O.from(e,"base64");return new Uint8Array(t.buffer,t.byteOffset,t.byteLength)}):(H=e=>btoa(N.uint8ArrayToString(e)),j=e=>N.stringToUint8Array(atob(e)));var ee=function(){var e,t,r=!1;function i(r,i){var n=e[(t[r]+t[i])%255];return 0!==r&&0!==i||(n=0),n}var n,a,s,o,c=!1;function u(){function u(r){var i,n,a;for(n=a=function(r){var i=e[255-t[r]];return 0===r&&(i=0),i}(r),i=0;i<4;i++)a^=n=255&(n<<1|n>>>7);return a^=99}r||function(){e=[],t=[];var i,n,a=1;for(i=0;i<255;i++)e[i]=a,n=128&a,a<<=1,a&=255,128===n&&(a^=27),a^=e[i],t[e[i]]=i;e[255]=e[0],t[0]=0,r=!0}(),n=[],a=[],s=[[],[],[],[]],o=[[],[],[],[]];for(var h=0;h<256;h++){var y=u(h);n[h]=y,a[y]=h,s[0][h]=i(2,y)<<24|y<<16|y<<8|i(3,y),o[0][y]=i(14,h)<<24|i(9,h)<<16|i(13,h)<<8|i(11,h);for(var l=1;l<4;l++)s[l][h]=s[l-1][h]>>>8|s[l-1][h]<<24,o[l][y]=o[l-1][y]>>>8|o[l-1][y]<<24}c=!0}var h=function(e,t){c||u();var r=new Uint32Array(t);r.set(n,512),r.set(a,768);for(var i=0;i<4;i++)r.set(s[i],4096+1024*i>>2),r.set(o[i],8192+1024*i>>2);var h=function(e,t,r){"use asm";var i=0,n=0,a=0,s=0,o=0,c=0,u=0,h=0,y=0,l=0,p=0,g=0,d=0,f=0,m=0,w=0,b=0,k=0,v=0,A=0,K=0;var E=new e.Uint32Array(r),S=new e.Uint8Array(r);function P(e,t,r,o,c,u,h,y){e=e|0;t=t|0;r=r|0;o=o|0;c=c|0;u=u|0;h=h|0;y=y|0;var l=0,p=0,g=0,d=0,f=0,m=0,w=0,b=0;l=r|0x400,p=r|0x800,g=r|0xc00;c=c^E[(e|0)>>2],u=u^E[(e|4)>>2],h=h^E[(e|8)>>2],y=y^E[(e|12)>>2];for(b=16;(b|0)<=o<<4;b=b+16|0){d=E[(r|c>>22&1020)>>2]^E[(l|u>>14&1020)>>2]^E[(p|h>>6&1020)>>2]^E[(g|y<<2&1020)>>2]^E[(e|b|0)>>2],f=E[(r|u>>22&1020)>>2]^E[(l|h>>14&1020)>>2]^E[(p|y>>6&1020)>>2]^E[(g|c<<2&1020)>>2]^E[(e|b|4)>>2],m=E[(r|h>>22&1020)>>2]^E[(l|y>>14&1020)>>2]^E[(p|c>>6&1020)>>2]^E[(g|u<<2&1020)>>2]^E[(e|b|8)>>2],w=E[(r|y>>22&1020)>>2]^E[(l|c>>14&1020)>>2]^E[(p|u>>6&1020)>>2]^E[(g|h<<2&1020)>>2]^E[(e|b|12)>>2];c=d,u=f,h=m,y=w}i=E[(t|c>>22&1020)>>2]<<24^E[(t|u>>14&1020)>>2]<<16^E[(t|h>>6&1020)>>2]<<8^E[(t|y<<2&1020)>>2]^E[(e|b|0)>>2],n=E[(t|u>>22&1020)>>2]<<24^E[(t|h>>14&1020)>>2]<<16^E[(t|y>>6&1020)>>2]<<8^E[(t|c<<2&1020)>>2]^E[(e|b|4)>>2],a=E[(t|h>>22&1020)>>2]<<24^E[(t|y>>14&1020)>>2]<<16^E[(t|c>>6&1020)>>2]<<8^E[(t|u<<2&1020)>>2]^E[(e|b|8)>>2],s=E[(t|y>>22&1020)>>2]<<24^E[(t|c>>14&1020)>>2]<<16^E[(t|u>>6&1020)>>2]<<8^E[(t|h<<2&1020)>>2]^E[(e|b|12)>>2]}function U(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;P(0x0000,0x0800,0x1000,K,e,t,r,i)}function D(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;var a=0;P(0x0400,0x0c00,0x2000,K,e,i,r,t);a=n,n=s,s=a}function C(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;P(0x0000,0x0800,0x1000,K,o^e,c^t,u^r,h^y);o=i,c=n,u=a,h=s}function x(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;var l=0;P(0x0400,0x0c00,0x2000,K,e,y,r,t);l=n,n=s,s=l;i=i^o,n=n^c,a=a^u,s=s^h;o=e,c=t,u=r,h=y}function T(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;P(0x0000,0x0800,0x1000,K,o,c,u,h);o=i=i^e,c=n=n^t,u=a=a^r,h=s=s^y}function I(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;P(0x0000,0x0800,0x1000,K,o,c,u,h);i=i^e,n=n^t,a=a^r,s=s^y;o=e,c=t,u=r,h=y}function _(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;P(0x0000,0x0800,0x1000,K,o,c,u,h);o=i,c=n,u=a,h=s;i=i^e,n=n^t,a=a^r,s=s^y}function B(e,t,r,o){e=e|0;t=t|0;r=r|0;o=o|0;P(0x0000,0x0800,0x1000,K,y,l,p,g);g=~w&g|w&g+1;p=~m&p|m&p+((g|0)==0);l=~f&l|f&l+((p|0)==0);y=~d&y|d&y+((l|0)==0);i=i^e;n=n^t;a=a^r;s=s^o}function R(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;var n=0,a=0,s=0,y=0,l=0,p=0,g=0,d=0,f=0,m=0;e=e^o,t=t^c,r=r^u,i=i^h;n=b|0,a=k|0,s=v|0,y=A|0;for(;(f|0)<128;f=f+1|0){if(n>>>31){l=l^e,p=p^t,g=g^r,d=d^i}n=n<<1|a>>>31,a=a<<1|s>>>31,s=s<<1|y>>>31,y=y<<1;m=i&1;i=i>>>1|r<<31,r=r>>>1|t<<31,t=t>>>1|e<<31,e=e>>>1;if(m)e=e^0xe1000000}o=l,c=p,u=g,h=d}function M(e){e=e|0;K=e}function L(e,t,r,o){e=e|0;t=t|0;r=r|0;o=o|0;i=e,n=t,a=r,s=o}function F(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;o=e,c=t,u=r,h=i}function z(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;y=e,l=t,p=r,g=i}function N(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;d=e,f=t,m=r,w=i}function O(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;g=~w&g|w&i,p=~m&p|m&r,l=~f&l|f&t,y=~d&y|d&e}function H(e){e=e|0;if(e&15)return-1;S[e|0]=i>>>24,S[e|1]=i>>>16&255,S[e|2]=i>>>8&255,S[e|3]=i&255,S[e|4]=n>>>24,S[e|5]=n>>>16&255,S[e|6]=n>>>8&255,S[e|7]=n&255,S[e|8]=a>>>24,S[e|9]=a>>>16&255,S[e|10]=a>>>8&255,S[e|11]=a&255,S[e|12]=s>>>24,S[e|13]=s>>>16&255,S[e|14]=s>>>8&255,S[e|15]=s&255;return 16}function j(e){e=e|0;if(e&15)return-1;S[e|0]=o>>>24,S[e|1]=o>>>16&255,S[e|2]=o>>>8&255,S[e|3]=o&255,S[e|4]=c>>>24,S[e|5]=c>>>16&255,S[e|6]=c>>>8&255,S[e|7]=c&255,S[e|8]=u>>>24,S[e|9]=u>>>16&255,S[e|10]=u>>>8&255,S[e|11]=u&255,S[e|12]=h>>>24,S[e|13]=h>>>16&255,S[e|14]=h>>>8&255,S[e|15]=h&255;return 16}function q(){U(0,0,0,0);b=i,k=n,v=a,A=s}function G(e,t,r){e=e|0;t=t|0;r=r|0;var o=0;if(t&15)return-1;while((r|0)>=16){W[e&7](S[t|0]<<24|S[t|1]<<16|S[t|2]<<8|S[t|3],S[t|4]<<24|S[t|5]<<16|S[t|6]<<8|S[t|7],S[t|8]<<24|S[t|9]<<16|S[t|10]<<8|S[t|11],S[t|12]<<24|S[t|13]<<16|S[t|14]<<8|S[t|15]);S[t|0]=i>>>24,S[t|1]=i>>>16&255,S[t|2]=i>>>8&255,S[t|3]=i&255,S[t|4]=n>>>24,S[t|5]=n>>>16&255,S[t|6]=n>>>8&255,S[t|7]=n&255,S[t|8]=a>>>24,S[t|9]=a>>>16&255,S[t|10]=a>>>8&255,S[t|11]=a&255,S[t|12]=s>>>24,S[t|13]=s>>>16&255,S[t|14]=s>>>8&255,S[t|15]=s&255;o=o+16|0,t=t+16|0,r=r-16|0}return o|0}function V(e,t,r){e=e|0;t=t|0;r=r|0;var i=0;if(t&15)return-1;while((r|0)>=16){$[e&1](S[t|0]<<24|S[t|1]<<16|S[t|2]<<8|S[t|3],S[t|4]<<24|S[t|5]<<16|S[t|6]<<8|S[t|7],S[t|8]<<24|S[t|9]<<16|S[t|10]<<8|S[t|11],S[t|12]<<24|S[t|13]<<16|S[t|14]<<8|S[t|15]);i=i+16|0,t=t+16|0,r=r-16|0}return i|0}var W=[U,D,C,x,T,I,_,B];var $=[C,R];return{set_rounds:M,set_state:L,set_iv:F,set_nonce:z,set_mask:N,set_counter:O,get_state:H,get_iv:j,gcm_init:q,cipher:G,mac:V}}({Uint8Array,Uint32Array},e,t);return h.set_key=function(e,t,i,a,s,c,u,y,l){var p=r.subarray(0,60),g=r.subarray(256,316);p.set([t,i,a,s,c,u,y,l]);for(var d=e,f=1;d<4*e+28;d++){var m=p[d-1];(d%e==0||8===e&&d%e==4)&&(m=n[m>>>24]<<24^n[m>>>16&255]<<16^n[m>>>8&255]<<8^n[255&m]),d%e==0&&(m=m<<8^m>>>24^f<<24,f=f<<1^(128&f?27:0)),p[d]=p[d-e]^m}for(var w=0;w<d;w+=4)for(var b=0;b<4;b++){m=p[d-(4+w)+(4-b)%4];g[w+b]=w<4||w>=d-4?m:o[0][n[m>>>24]]^o[1][n[m>>>16&255]]^o[2][n[m>>>8&255]]^o[3][n[255&m]]}h.set_rounds(e+5)},h};return h.ENC={ECB:0,CBC:2,CFB:4,OFB:6,CTR:7},h.DEC={ECB:1,CBC:3,CFB:5,OFB:6,CTR:7},h.MAC={CBC:0,GCM:1},h.HEAP_DATA=16384,h}();function te(e){return e instanceof Uint8Array}function re(e,t,r,i,n){const a=e.length-t,s=a<n?a:n;return e.set(r.subarray(i,i+s),t),s}function ie(...e){const t=e.reduce(((e,t)=>e+t.length),0),r=new Uint8Array(t);let i=0;for(let t=0;t<e.length;t++)r.set(e[t],i),i+=e[t].length;return r}class ne extends Error{constructor(...e){super(...e)}}class ae extends Error{constructor(...e){super(...e)}}class se extends Error{constructor(...e){super(...e)}}const oe=[],ce=[];class ue{constructor(e,t,r=!0,i,n,a){this.pos=0,this.len=0,this.mode=i,this.pos=0,this.len=0,this.key=e,this.iv=t,this.padding=r,this.acquire_asm(n,a)}acquire_asm(e,t){return void 0!==this.heap&&void 0!==this.asm||(this.heap=e||oe.pop()||function(e,t){const r=e?e.byteLength:t||65536;if(4095&r||r<=0)throw Error("heap size must be a positive integer and a multiple of 4096");return e||new Uint8Array(new ArrayBuffer(r))}().subarray(ee.HEAP_DATA),this.asm=t||ce.pop()||new ee(null,this.heap.buffer),this.reset(this.key,this.iv)),{heap:this.heap,asm:this.asm}}release_asm(){void 0!==this.heap&&void 0!==this.asm&&(oe.push(this.heap),ce.push(this.asm)),this.heap=void 0,this.asm=void 0}reset(e,t){const{asm:r}=this.acquire_asm(),i=e.length;if(16!==i&&24!==i&&32!==i)throw new ae("illegal key size");const n=new DataView(e.buffer,e.byteOffset,e.byteLength);if(r.set_key(i>>2,n.getUint32(0),n.getUint32(4),n.getUint32(8),n.getUint32(12),i>16?n.getUint32(16):0,i>16?n.getUint32(20):0,i>24?n.getUint32(24):0,i>24?n.getUint32(28):0),void 0!==t){if(16!==t.length)throw new ae("illegal iv size");let e=new DataView(t.buffer,t.byteOffset,t.byteLength);r.set_iv(e.getUint32(0),e.getUint32(4),e.getUint32(8),e.getUint32(12))}else r.set_iv(0,0,0,0)}AES_Encrypt_process(e){if(!te(e))throw new TypeError("data isn't of expected type");let{heap:t,asm:r}=this.acquire_asm(),i=ee.ENC[this.mode],n=ee.HEAP_DATA,a=this.pos,s=this.len,o=0,c=e.length||0,u=0,h=0,y=new Uint8Array(s+c&-16);for(;c>0;)h=re(t,a+s,e,o,c),s+=h,o+=h,c-=h,h=r.cipher(i,n+a,s),h&&y.set(t.subarray(a,a+h),u),u+=h,h<s?(a+=h,s-=h):(a=0,s=0);return this.pos=a,this.len=s,y}AES_Encrypt_finish(){let{heap:e,asm:t}=this.acquire_asm(),r=ee.ENC[this.mode],i=ee.HEAP_DATA,n=this.pos,a=this.len,s=16-a%16,o=a;if(this.hasOwnProperty("padding")){if(this.padding){for(let t=0;t<s;++t)e[n+a+t]=s;a+=s,o=a}else if(a%16)throw new ae("data length must be a multiple of the block size")}else a+=s;const c=new Uint8Array(o);return a&&t.cipher(r,i+n,a),o&&c.set(e.subarray(n,n+o)),this.pos=0,this.len=0,this.release_asm(),c}AES_Decrypt_process(e){if(!te(e))throw new TypeError("data isn't of expected type");let{heap:t,asm:r}=this.acquire_asm(),i=ee.DEC[this.mode],n=ee.HEAP_DATA,a=this.pos,s=this.len,o=0,c=e.length||0,u=0,h=s+c&-16,y=0,l=0;this.padding&&(y=s+c-h||16,h-=y);const p=new Uint8Array(h);for(;c>0;)l=re(t,a+s,e,o,c),s+=l,o+=l,c-=l,l=r.cipher(i,n+a,s-(c?0:y)),l&&p.set(t.subarray(a,a+l),u),u+=l,l<s?(a+=l,s-=l):(a=0,s=0);return this.pos=a,this.len=s,p}AES_Decrypt_finish(){let{heap:e,asm:t}=this.acquire_asm(),r=ee.DEC[this.mode],i=ee.HEAP_DATA,n=this.pos,a=this.len,s=a;if(a>0){if(a%16){if(this.hasOwnProperty("padding"))throw new ae("data length must be a multiple of the block size");a+=16-a%16}if(t.cipher(r,i+n,a),this.hasOwnProperty("padding")&&this.padding){let t=e[n+s-1];if(t<1||t>16||t>s)throw new se("bad padding");let r=0;for(let i=t;i>1;i--)r|=t^e[n+s-i];if(r)throw new se("bad padding");s-=t}}const o=new Uint8Array(s);return s>0&&o.set(e.subarray(n,n+s)),this.pos=0,this.len=0,this.release_asm(),o}}class he{static encrypt(e,t,r=!1){return new he(t,r).encrypt(e)}static decrypt(e,t,r=!1){return new he(t,r).decrypt(e)}constructor(e,t=!1,r){this.aes=r||new ue(e,void 0,t,"ECB")}encrypt(e){return ie(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}decrypt(e){return ie(this.aes.AES_Decrypt_process(e),this.aes.AES_Decrypt_finish())}}function ye(e){const t=function(e){const t=new he(e);this.encrypt=function(e){return t.encrypt(e)},this.decrypt=function(e){return t.decrypt(e)}};return t.blockSize=t.prototype.blockSize=16,t.keySize=t.prototype.keySize=e/8,t}function le(e,t,r,i,n,a){const s=[16843776,0,65536,16843780,16842756,66564,4,65536,1024,16843776,16843780,1024,16778244,16842756,16777216,4,1028,16778240,16778240,66560,66560,16842752,16842752,16778244,65540,16777220,16777220,65540,0,1028,66564,16777216,65536,16843780,4,16842752,16843776,16777216,16777216,1024,16842756,65536,66560,16777220,1024,4,16778244,66564,16843780,65540,16842752,16778244,16777220,1028,66564,16843776,1028,16778240,16778240,0,65540,66560,0,16842756],o=[-2146402272,-2147450880,32768,1081376,1048576,32,-2146435040,-2147450848,-2147483616,-2146402272,-2146402304,-2147483648,-2147450880,1048576,32,-2146435040,1081344,1048608,-2147450848,0,-2147483648,32768,1081376,-2146435072,1048608,-2147483616,0,1081344,32800,-2146402304,-2146435072,32800,0,1081376,-2146435040,1048576,-2147450848,-2146435072,-2146402304,32768,-2146435072,-2147450880,32,-2146402272,1081376,32,32768,-2147483648,32800,-2146402304,1048576,-2147483616,1048608,-2147450848,-2147483616,1048608,1081344,0,-2147450880,32800,-2147483648,-2146435040,-2146402272,1081344],c=[520,134349312,0,134348808,134218240,0,131592,134218240,131080,134217736,134217736,131072,134349320,131080,134348800,520,134217728,8,134349312,512,131584,134348800,134348808,131592,134218248,131584,131072,134218248,8,134349320,512,134217728,134349312,134217728,131080,520,131072,134349312,134218240,0,512,131080,134349320,134218240,134217736,512,0,134348808,134218248,131072,134217728,134349320,8,131592,131584,134217736,134348800,134218248,520,134348800,131592,8,134348808,131584],u=[8396801,8321,8321,128,8396928,8388737,8388609,8193,0,8396800,8396800,8396929,129,0,8388736,8388609,1,8192,8388608,8396801,128,8388608,8193,8320,8388737,1,8320,8388736,8192,8396928,8396929,129,8388736,8388609,8396800,8396929,129,0,0,8396800,8320,8388736,8388737,1,8396801,8321,8321,128,8396929,129,1,8192,8388609,8193,8396928,8388737,8193,8320,8388608,8396801,128,8388608,8192,8396928],h=[256,34078976,34078720,1107296512,524288,256,1073741824,34078720,1074266368,524288,33554688,1074266368,1107296512,1107820544,524544,1073741824,33554432,1074266112,1074266112,0,1073742080,1107820800,1107820800,33554688,1107820544,1073742080,0,1107296256,34078976,33554432,1107296256,524544,524288,1107296512,256,33554432,1073741824,34078720,1107296512,1074266368,33554688,1073741824,1107820544,34078976,1074266368,256,33554432,1107820544,1107820800,524544,1107296256,1107820800,34078720,0,1074266112,1107296256,524544,33554688,1073742080,524288,0,1074266112,34078976,1073742080],y=[536870928,541065216,16384,541081616,541065216,16,541081616,4194304,536887296,4210704,4194304,536870928,4194320,536887296,536870912,16400,0,4194320,536887312,16384,4210688,536887312,16,541065232,541065232,0,4210704,541081600,16400,4210688,541081600,536870912,536887296,16,541065232,4210688,541081616,4194304,16400,536870928,4194304,536887296,536870912,16400,536870928,541081616,4210688,541065216,4210704,541081600,0,541065232,16,16384,541065216,4210704,16384,4194320,536887312,0,541081600,536870912,4194320,536887312],l=[2097152,69206018,67110914,0,2048,67110914,2099202,69208064,69208066,2097152,0,67108866,2,67108864,69206018,2050,67110912,2099202,2097154,67110912,67108866,69206016,69208064,2097154,69206016,2048,2050,69208066,2099200,2,67108864,2099200,67108864,2099200,2097152,67110914,67110914,69206018,69206018,2,2097154,67108864,67110912,2097152,69208064,2050,2099202,69208064,2050,67108866,69208066,69206016,2099200,0,2,69208066,0,2099202,69206016,2048,67108866,67110912,2048,2097154],p=[268439616,4096,262144,268701760,268435456,268439616,64,268435456,262208,268697600,268701760,266240,268701696,266304,4096,64,268697600,268435520,268439552,4160,266240,262208,268697664,268701696,4160,0,0,268697664,268435520,268439552,266304,262144,266304,262144,268701696,4096,64,268697664,4096,266304,268439552,64,268435520,268697600,268697664,268435456,262144,268439616,0,268701760,262208,268435520,268697600,268439552,268439616,0,268701760,266240,266240,4160,4160,262208,268435456,268701696];let g,d,f,m,w,b,k,v,A,K,E,S,P,U,D=0,C=t.length;const x=32===e.length?3:9;v=3===x?r?[0,32,2]:[30,-2,-2]:r?[0,32,2,62,30,-2,64,96,2]:[94,62,-2,32,64,2,30,-2,-2],r&&(t=function(e,t){const r=8-e.length%8;let i;if(2===t&&r<8)i=32;else if(1===t)i=r;else{if(t||!(r<8)){if(8===r)return e;throw Error("des: invalid padding")}i=0}const n=new Uint8Array(e.length+r);for(let t=0;t<e.length;t++)n[t]=e[t];for(let t=0;t<r;t++)n[e.length+t]=i;return n}(t,a),C=t.length);let T=new Uint8Array(C),I=0;for(1===i&&(A=n[D++]<<24|n[D++]<<16|n[D++]<<8|n[D++],E=n[D++]<<24|n[D++]<<16|n[D++]<<8|n[D++],D=0);D<C;){for(b=t[D++]<<24|t[D++]<<16|t[D++]<<8|t[D++],k=t[D++]<<24|t[D++]<<16|t[D++]<<8|t[D++],1===i&&(r?(b^=A,k^=E):(K=A,S=E,A=b,E=k)),f=252645135&(b>>>4^k),k^=f,b^=f<<4,f=65535&(b>>>16^k),k^=f,b^=f<<16,f=858993459&(k>>>2^b),b^=f,k^=f<<2,f=16711935&(k>>>8^b),b^=f,k^=f<<8,f=1431655765&(b>>>1^k),k^=f,b^=f<<1,b=b<<1|b>>>31,k=k<<1|k>>>31,d=0;d<x;d+=3){for(P=v[d+1],U=v[d+2],g=v[d];g!==P;g+=U)m=k^e[g],w=(k>>>4|k<<28)^e[g+1],f=b,b=k,k=f^(o[m>>>24&63]|u[m>>>16&63]|y[m>>>8&63]|p[63&m]|s[w>>>24&63]|c[w>>>16&63]|h[w>>>8&63]|l[63&w]);f=b,b=k,k=f}b=b>>>1|b<<31,k=k>>>1|k<<31,f=1431655765&(b>>>1^k),k^=f,b^=f<<1,f=16711935&(k>>>8^b),b^=f,k^=f<<8,f=858993459&(k>>>2^b),b^=f,k^=f<<2,f=65535&(b>>>16^k),k^=f,b^=f<<16,f=252645135&(b>>>4^k),k^=f,b^=f<<4,1===i&&(r?(A=b,E=k):(b^=K,k^=S)),T[I++]=b>>>24,T[I++]=b>>>16&255,T[I++]=b>>>8&255,T[I++]=255&b,T[I++]=k>>>24,T[I++]=k>>>16&255,T[I++]=k>>>8&255,T[I++]=255&k}return r||(T=function(e,t){let r,i=null;if(2===t)r=32;else if(1===t)i=e[e.length-1];else{if(t)throw Error("des: invalid padding");r=0}if(!i){for(i=1;e[e.length-i]===r;)i++;i--}return e.subarray(0,e.length-i)}(T,a)),T}function pe(e){const t=[0,4,536870912,536870916,65536,65540,536936448,536936452,512,516,536871424,536871428,66048,66052,536936960,536936964],r=[0,1,1048576,1048577,67108864,67108865,68157440,68157441,256,257,1048832,1048833,67109120,67109121,68157696,68157697],i=[0,8,2048,2056,16777216,16777224,16779264,16779272,0,8,2048,2056,16777216,16777224,16779264,16779272],n=[0,2097152,134217728,136314880,8192,2105344,134225920,136323072,131072,2228224,134348800,136445952,139264,2236416,134356992,136454144],a=[0,262144,16,262160,0,262144,16,262160,4096,266240,4112,266256,4096,266240,4112,266256],s=[0,1024,32,1056,0,1024,32,1056,33554432,33555456,33554464,33555488,33554432,33555456,33554464,33555488],o=[0,268435456,524288,268959744,2,268435458,524290,268959746,0,268435456,524288,268959744,2,268435458,524290,268959746],c=[0,65536,2048,67584,536870912,536936448,536872960,536938496,131072,196608,133120,198656,537001984,537067520,537004032,537069568],u=[0,262144,0,262144,2,262146,2,262146,33554432,33816576,33554432,33816576,33554434,33816578,33554434,33816578],h=[0,268435456,8,268435464,0,268435456,8,268435464,1024,268436480,1032,268436488,1024,268436480,1032,268436488],y=[0,32,0,32,1048576,1048608,1048576,1048608,8192,8224,8192,8224,1056768,1056800,1056768,1056800],l=[0,16777216,512,16777728,2097152,18874368,2097664,18874880,67108864,83886080,67109376,83886592,69206016,85983232,69206528,85983744],p=[0,4096,134217728,134221824,524288,528384,134742016,134746112,16,4112,134217744,134221840,524304,528400,134742032,134746128],g=[0,4,256,260,0,4,256,260,1,5,257,261,1,5,257,261],d=e.length>8?3:1,f=Array(32*d),m=[0,0,1,1,1,1,1,1,0,1,1,1,1,1,1,0];let w,b,k,v=0,A=0;for(let K=0;K<d;K++){let d=e[v++]<<24|e[v++]<<16|e[v++]<<8|e[v++],K=e[v++]<<24|e[v++]<<16|e[v++]<<8|e[v++];k=252645135&(d>>>4^K),K^=k,d^=k<<4,k=65535&(K>>>-16^d),d^=k,K^=k<<-16,k=858993459&(d>>>2^K),K^=k,d^=k<<2,k=65535&(K>>>-16^d),d^=k,K^=k<<-16,k=1431655765&(d>>>1^K),K^=k,d^=k<<1,k=16711935&(K>>>8^d),d^=k,K^=k<<8,k=1431655765&(d>>>1^K),K^=k,d^=k<<1,k=d<<8|K>>>20&240,d=K<<24|K<<8&16711680|K>>>8&65280|K>>>24&240,K=k;for(let e=0;e<16;e++)m[e]?(d=d<<2|d>>>26,K=K<<2|K>>>26):(d=d<<1|d>>>27,K=K<<1|K>>>27),d&=-15,K&=-15,w=t[d>>>28]|r[d>>>24&15]|i[d>>>20&15]|n[d>>>16&15]|a[d>>>12&15]|s[d>>>8&15]|o[d>>>4&15],b=c[K>>>28]|u[K>>>24&15]|h[K>>>20&15]|y[K>>>16&15]|l[K>>>12&15]|p[K>>>8&15]|g[K>>>4&15],k=65535&(b>>>16^w),f[A++]=w^k,f[A++]=b^k<<16}return f}function ge(e){this.key=[];for(let t=0;t<3;t++)this.key.push(new Uint8Array(e.subarray(8*t,8*t+8)));this.encrypt=function(e){return le(pe(this.key[2]),le(pe(this.key[1]),le(pe(this.key[0]),e,!0,0,null,null),!1,0,null,null),!0,0,null,null)}}function de(){this.BlockSize=8,this.KeySize=16,this.setKey=function(e){if(this.masking=Array(16),this.rotate=Array(16),this.reset(),e.length!==this.KeySize)throw Error("CAST-128: keys must be 16 bytes");return this.keySchedule(e),!0},this.reset=function(){for(let e=0;e<16;e++)this.masking[e]=0,this.rotate[e]=0},this.getBlockSize=function(){return this.BlockSize},this.encrypt=function(e){const t=Array(e.length);for(let a=0;a<e.length;a+=8){let s,o=e[a]<<24|e[a+1]<<16|e[a+2]<<8|e[a+3],c=e[a+4]<<24|e[a+5]<<16|e[a+6]<<8|e[a+7];s=c,c=o^r(c,this.masking[0],this.rotate[0]),o=s,s=c,c=o^i(c,this.masking[1],this.rotate[1]),o=s,s=c,c=o^n(c,this.masking[2],this.rotate[2]),o=s,s=c,c=o^r(c,this.masking[3],this.rotate[3]),o=s,s=c,c=o^i(c,this.masking[4],this.rotate[4]),o=s,s=c,c=o^n(c,this.masking[5],this.rotate[5]),o=s,s=c,c=o^r(c,this.masking[6],this.rotate[6]),o=s,s=c,c=o^i(c,this.masking[7],this.rotate[7]),o=s,s=c,c=o^n(c,this.masking[8],this.rotate[8]),o=s,s=c,c=o^r(c,this.masking[9],this.rotate[9]),o=s,s=c,c=o^i(c,this.masking[10],this.rotate[10]),o=s,s=c,c=o^n(c,this.masking[11],this.rotate[11]),o=s,s=c,c=o^r(c,this.masking[12],this.rotate[12]),o=s,s=c,c=o^i(c,this.masking[13],this.rotate[13]),o=s,s=c,c=o^n(c,this.masking[14],this.rotate[14]),o=s,s=c,c=o^r(c,this.masking[15],this.rotate[15]),o=s,t[a]=c>>>24&255,t[a+1]=c>>>16&255,t[a+2]=c>>>8&255,t[a+3]=255&c,t[a+4]=o>>>24&255,t[a+5]=o>>>16&255,t[a+6]=o>>>8&255,t[a+7]=255&o}return t},this.decrypt=function(e){const t=Array(e.length);for(let a=0;a<e.length;a+=8){let s,o=e[a]<<24|e[a+1]<<16|e[a+2]<<8|e[a+3],c=e[a+4]<<24|e[a+5]<<16|e[a+6]<<8|e[a+7];s=c,c=o^r(c,this.masking[15],this.rotate[15]),o=s,s=c,c=o^n(c,this.masking[14],this.rotate[14]),o=s,s=c,c=o^i(c,this.masking[13],this.rotate[13]),o=s,s=c,c=o^r(c,this.masking[12],this.rotate[12]),o=s,s=c,c=o^n(c,this.masking[11],this.rotate[11]),o=s,s=c,c=o^i(c,this.masking[10],this.rotate[10]),o=s,s=c,c=o^r(c,this.masking[9],this.rotate[9]),o=s,s=c,c=o^n(c,this.masking[8],this.rotate[8]),o=s,s=c,c=o^i(c,this.masking[7],this.rotate[7]),o=s,s=c,c=o^r(c,this.masking[6],this.rotate[6]),o=s,s=c,c=o^n(c,this.masking[5],this.rotate[5]),o=s,s=c,c=o^i(c,this.masking[4],this.rotate[4]),o=s,s=c,c=o^r(c,this.masking[3],this.rotate[3]),o=s,s=c,c=o^n(c,this.masking[2],this.rotate[2]),o=s,s=c,c=o^i(c,this.masking[1],this.rotate[1]),o=s,s=c,c=o^r(c,this.masking[0],this.rotate[0]),o=s,t[a]=c>>>24&255,t[a+1]=c>>>16&255,t[a+2]=c>>>8&255,t[a+3]=255&c,t[a+4]=o>>>24&255,t[a+5]=o>>16&255,t[a+6]=o>>8&255,t[a+7]=255&o}return t};const e=[,,,,];e[0]=[,,,,],e[0][0]=[4,0,13,15,12,14,8],e[0][1]=[5,2,16,18,17,19,10],e[0][2]=[6,3,23,22,21,20,9],e[0][3]=[7,1,26,25,27,24,11],e[1]=[,,,,],e[1][0]=[0,6,21,23,20,22,16],e[1][1]=[1,4,0,2,1,3,18],e[1][2]=[2,5,7,6,5,4,17],e[1][3]=[3,7,10,9,11,8,19],e[2]=[,,,,],e[2][0]=[4,0,13,15,12,14,8],e[2][1]=[5,2,16,18,17,19,10],e[2][2]=[6,3,23,22,21,20,9],e[2][3]=[7,1,26,25,27,24,11],e[3]=[,,,,],e[3][0]=[0,6,21,23,20,22,16],e[3][1]=[1,4,0,2,1,3,18],e[3][2]=[2,5,7,6,5,4,17],e[3][3]=[3,7,10,9,11,8,19];const t=[,,,,];function r(e,t,r){const i=t+e,n=i<<r|i>>>32-r;return(a[0][n>>>24]^a[1][n>>>16&255])-a[2][n>>>8&255]+a[3][255&n]}function i(e,t,r){const i=t^e,n=i<<r|i>>>32-r;return a[0][n>>>24]-a[1][n>>>16&255]+a[2][n>>>8&255]^a[3][255&n]}function n(e,t,r){const i=t-e,n=i<<r|i>>>32-r;return(a[0][n>>>24]+a[1][n>>>16&255]^a[2][n>>>8&255])-a[3][255&n]}t[0]=[,,,,],t[0][0]=[24,25,23,22,18],t[0][1]=[26,27,21,20,22],t[0][2]=[28,29,19,18,25],t[0][3]=[30,31,17,16,28],t[1]=[,,,,],t[1][0]=[3,2,12,13,8],t[1][1]=[1,0,14,15,13],t[1][2]=[7,6,8,9,3],t[1][3]=[5,4,10,11,7],t[2]=[,,,,],t[2][0]=[19,18,28,29,25],t[2][1]=[17,16,30,31,28],t[2][2]=[23,22,24,25,18],t[2][3]=[21,20,26,27,22],t[3]=[,,,,],t[3][0]=[8,9,7,6,3],t[3][1]=[10,11,5,4,7],t[3][2]=[12,13,3,2,8],t[3][3]=[14,15,1,0,13],this.keySchedule=function(r){const i=[,,,,,,,,],n=Array(32);let s;for(let e=0;e<4;e++)s=4*e,i[e]=r[s]<<24|r[s+1]<<16|r[s+2]<<8|r[s+3];const o=[6,7,4,5];let c,u=0;for(let r=0;r<2;r++)for(let r=0;r<4;r++){for(s=0;s<4;s++){const t=e[r][s];c=i[t[1]],c^=a[4][i[t[2]>>>2]>>>24-8*(3&t[2])&255],c^=a[5][i[t[3]>>>2]>>>24-8*(3&t[3])&255],c^=a[6][i[t[4]>>>2]>>>24-8*(3&t[4])&255],c^=a[7][i[t[5]>>>2]>>>24-8*(3&t[5])&255],c^=a[o[s]][i[t[6]>>>2]>>>24-8*(3&t[6])&255],i[t[0]]=c}for(s=0;s<4;s++){const e=t[r][s];c=a[4][i[e[0]>>>2]>>>24-8*(3&e[0])&255],c^=a[5][i[e[1]>>>2]>>>24-8*(3&e[1])&255],c^=a[6][i[e[2]>>>2]>>>24-8*(3&e[2])&255],c^=a[7][i[e[3]>>>2]>>>24-8*(3&e[3])&255],c^=a[4+s][i[e[4]>>>2]>>>24-8*(3&e[4])&255],n[u]=c,u++}}for(let e=0;e<16;e++)this.masking[e]=n[e],this.rotate[e]=31&n[16+e]};const a=[,,,,,,,,];a[0]=[821772500,2678128395,1810681135,1059425402,505495343,2617265619,1610868032,3483355465,3218386727,2294005173,3791863952,2563806837,1852023008,365126098,3269944861,584384398,677919599,3229601881,4280515016,2002735330,1136869587,3744433750,2289869850,2731719981,2714362070,879511577,1639411079,575934255,717107937,2857637483,576097850,2731753936,1725645e3,2810460463,5111599,767152862,2543075244,1251459544,1383482551,3052681127,3089939183,3612463449,1878520045,1510570527,2189125840,2431448366,582008916,3163445557,1265446783,1354458274,3529918736,3202711853,3073581712,3912963487,3029263377,1275016285,4249207360,2905708351,3304509486,1442611557,3585198765,2712415662,2731849581,3248163920,2283946226,208555832,2766454743,1331405426,1447828783,3315356441,3108627284,2957404670,2981538698,3339933917,1669711173,286233437,1465092821,1782121619,3862771680,710211251,980974943,1651941557,430374111,2051154026,704238805,4128970897,3144820574,2857402727,948965521,3333752299,2227686284,718756367,2269778983,2731643755,718440111,2857816721,3616097120,1113355533,2478022182,410092745,1811985197,1944238868,2696854588,1415722873,1682284203,1060277122,1998114690,1503841958,82706478,2315155686,1068173648,845149890,2167947013,1768146376,1993038550,3566826697,3390574031,940016341,3355073782,2328040721,904371731,1205506512,4094660742,2816623006,825647681,85914773,2857843460,1249926541,1417871568,3287612,3211054559,3126306446,1975924523,1353700161,2814456437,2438597621,1800716203,722146342,2873936343,1151126914,4160483941,2877670899,458611604,2866078500,3483680063,770352098,2652916994,3367839148,3940505011,3585973912,3809620402,718646636,2504206814,2914927912,3631288169,2857486607,2860018678,575749918,2857478043,718488780,2069512688,3548183469,453416197,1106044049,3032691430,52586708,3378514636,3459808877,3211506028,1785789304,218356169,3571399134,3759170522,1194783844,1523787992,3007827094,1975193539,2555452411,1341901877,3045838698,3776907964,3217423946,2802510864,2889438986,1057244207,1636348243,3761863214,1462225785,2632663439,481089165,718503062,24497053,3332243209,3344655856,3655024856,3960371065,1195698900,2971415156,3710176158,2115785917,4027663609,3525578417,2524296189,2745972565,3564906415,1372086093,1452307862,2780501478,1476592880,3389271281,18495466,2378148571,901398090,891748256,3279637769,3157290713,2560960102,1447622437,4284372637,216884176,2086908623,1879786977,3588903153,2242455666,2938092967,3559082096,2810645491,758861177,1121993112,215018983,642190776,4169236812,1196255959,2081185372,3508738393,941322904,4124243163,2877523539,1848581667,2205260958,3180453958,2589345134,3694731276,550028657,2519456284,3789985535,2973870856,2093648313,443148163,46942275,2734146937,1117713533,1115362972,1523183689,3717140224,1551984063],a[1]=[522195092,4010518363,1776537470,960447360,4267822970,4005896314,1435016340,1929119313,2913464185,1310552629,3579470798,3724818106,2579771631,1594623892,417127293,2715217907,2696228731,1508390405,3994398868,3925858569,3695444102,4019471449,3129199795,3770928635,3520741761,990456497,4187484609,2783367035,21106139,3840405339,631373633,3783325702,532942976,396095098,3548038825,4267192484,2564721535,2011709262,2039648873,620404603,3776170075,2898526339,3612357925,4159332703,1645490516,223693667,1567101217,3362177881,1029951347,3470931136,3570957959,1550265121,119497089,972513919,907948164,3840628539,1613718692,3594177948,465323573,2659255085,654439692,2575596212,2699288441,3127702412,277098644,624404830,4100943870,2717858591,546110314,2403699828,3655377447,1321679412,4236791657,1045293279,4010672264,895050893,2319792268,494945126,1914543101,2777056443,3894764339,2219737618,311263384,4275257268,3458730721,669096869,3584475730,3835122877,3319158237,3949359204,2005142349,2713102337,2228954793,3769984788,569394103,3855636576,1425027204,108000370,2736431443,3671869269,3043122623,1750473702,2211081108,762237499,3972989403,2798899386,3061857628,2943854345,867476300,964413654,1591880597,1594774276,2179821409,552026980,3026064248,3726140315,2283577634,3110545105,2152310760,582474363,1582640421,1383256631,2043843868,3322775884,1217180674,463797851,2763038571,480777679,2718707717,2289164131,3118346187,214354409,200212307,3810608407,3025414197,2674075964,3997296425,1847405948,1342460550,510035443,4080271814,815934613,833030224,1620250387,1945732119,2703661145,3966000196,1388869545,3456054182,2687178561,2092620194,562037615,1356438536,3409922145,3261847397,1688467115,2150901366,631725691,3840332284,549916902,3455104640,394546491,837744717,2114462948,751520235,2221554606,2415360136,3999097078,2063029875,803036379,2702586305,821456707,3019566164,360699898,4018502092,3511869016,3677355358,2402471449,812317050,49299192,2570164949,3259169295,2816732080,3331213574,3101303564,2156015656,3705598920,3546263921,143268808,3200304480,1638124008,3165189453,3341807610,578956953,2193977524,3638120073,2333881532,807278310,658237817,2969561766,1641658566,11683945,3086995007,148645947,1138423386,4158756760,1981396783,2401016740,3699783584,380097457,2680394679,2803068651,3334260286,441530178,4016580796,1375954390,761952171,891809099,2183123478,157052462,3683840763,1592404427,341349109,2438483839,1417898363,644327628,2233032776,2353769706,2201510100,220455161,1815641738,182899273,2995019788,3627381533,3702638151,2890684138,1052606899,588164016,1681439879,4038439418,2405343923,4229449282,167996282,1336969661,1688053129,2739224926,1543734051,1046297529,1138201970,2121126012,115334942,1819067631,1902159161,1941945968,2206692869,1159982321],a[2]=[2381300288,637164959,3952098751,3893414151,1197506559,916448331,2350892612,2932787856,3199334847,4009478890,3905886544,1373570990,2450425862,4037870920,3778841987,2456817877,286293407,124026297,3001279700,1028597854,3115296800,4208886496,2691114635,2188540206,1430237888,1218109995,3572471700,308166588,570424558,2187009021,2455094765,307733056,1310360322,3135275007,1384269543,2388071438,863238079,2359263624,2801553128,3380786597,2831162807,1470087780,1728663345,4072488799,1090516929,532123132,2389430977,1132193179,2578464191,3051079243,1670234342,1434557849,2711078940,1241591150,3314043432,3435360113,3091448339,1812415473,2198440252,267246943,796911696,3619716990,38830015,1526438404,2806502096,374413614,2943401790,1489179520,1603809326,1920779204,168801282,260042626,2358705581,1563175598,2397674057,1356499128,2217211040,514611088,2037363785,2186468373,4022173083,2792511869,2913485016,1173701892,4200428547,3896427269,1334932762,2455136706,602925377,2835607854,1613172210,41346230,2499634548,2457437618,2188827595,41386358,4172255629,1313404830,2405527007,3801973774,2217704835,873260488,2528884354,2478092616,4012915883,2555359016,2006953883,2463913485,575479328,2218240648,2099895446,660001756,2341502190,3038761536,3888151779,3848713377,3286851934,1022894237,1620365795,3449594689,1551255054,15374395,3570825345,4249311020,4151111129,3181912732,310226346,1133119310,530038928,136043402,2476768958,3107506709,2544909567,1036173560,2367337196,1681395281,1758231547,3641649032,306774401,1575354324,3716085866,1990386196,3114533736,2455606671,1262092282,3124342505,2768229131,4210529083,1833535011,423410938,660763973,2187129978,1639812e3,3508421329,3467445492,310289298,272797111,2188552562,2456863912,310240523,677093832,1013118031,901835429,3892695601,1116285435,3036471170,1337354835,243122523,520626091,277223598,4244441197,4194248841,1766575121,594173102,316590669,742362309,3536858622,4176435350,3838792410,2501204839,1229605004,3115755532,1552908988,2312334149,979407927,3959474601,1148277331,176638793,3614686272,2083809052,40992502,1340822838,2731552767,3535757508,3560899520,1354035053,122129617,7215240,2732932949,3118912700,2718203926,2539075635,3609230695,3725561661,1928887091,2882293555,1988674909,2063640240,2491088897,1459647954,4189817080,2302804382,1113892351,2237858528,1927010603,4002880361,1856122846,1594404395,2944033133,3855189863,3474975698,1643104450,4054590833,3431086530,1730235576,2984608721,3084664418,2131803598,4178205752,267404349,1617849798,1616132681,1462223176,736725533,2327058232,551665188,2945899023,1749386277,2575514597,1611482493,674206544,2201269090,3642560800,728599968,1680547377,2620414464,1388111496,453204106,4156223445,1094905244,2754698257,2201108165,3757000246,2704524545,3922940700,3996465027],a[3]=[2645754912,532081118,2814278639,3530793624,1246723035,1689095255,2236679235,4194438865,2116582143,3859789411,157234593,2045505824,4245003587,1687664561,4083425123,605965023,672431967,1336064205,3376611392,214114848,4258466608,3232053071,489488601,605322005,3998028058,264917351,1912574028,756637694,436560991,202637054,135989450,85393697,2152923392,3896401662,2895836408,2145855233,3535335007,115294817,3147733898,1922296357,3464822751,4117858305,1037454084,2725193275,2127856640,1417604070,1148013728,1827919605,642362335,2929772533,909348033,1346338451,3547799649,297154785,1917849091,4161712827,2883604526,3968694238,1469521537,3780077382,3375584256,1763717519,136166297,4290970789,1295325189,2134727907,2798151366,1566297257,3672928234,2677174161,2672173615,965822077,2780786062,289653839,1133871874,3491843819,35685304,1068898316,418943774,672553190,642281022,2346158704,1954014401,3037126780,4079815205,2030668546,3840588673,672283427,1776201016,359975446,3750173538,555499703,2769985273,1324923,69110472,152125443,3176785106,3822147285,1340634837,798073664,1434183902,15393959,216384236,1303690150,3881221631,3711134124,3960975413,106373927,2578434224,1455997841,1801814300,1578393881,1854262133,3188178946,3258078583,2302670060,1539295533,3505142565,3078625975,2372746020,549938159,3278284284,2620926080,181285381,2865321098,3970029511,68876850,488006234,1728155692,2608167508,836007927,2435231793,919367643,3339422534,3655756360,1457871481,40520939,1380155135,797931188,234455205,2255801827,3990488299,397000196,739833055,3077865373,2871719860,4022553888,772369276,390177364,3853951029,557662966,740064294,1640166671,1699928825,3535942136,622006121,3625353122,68743880,1742502,219489963,1664179233,1577743084,1236991741,410585305,2366487942,823226535,1050371084,3426619607,3586839478,212779912,4147118561,1819446015,1911218849,530248558,3486241071,3252585495,2886188651,3410272728,2342195030,20547779,2982490058,3032363469,3631753222,312714466,1870521650,1493008054,3491686656,615382978,4103671749,2534517445,1932181,2196105170,278426614,6369430,3274544417,2913018367,697336853,2143000447,2946413531,701099306,1558357093,2805003052,3500818408,2321334417,3567135975,216290473,3591032198,23009561,1996984579,3735042806,2024298078,3739440863,569400510,2339758983,3016033873,3097871343,3639523026,3844324983,3256173865,795471839,2951117563,4101031090,4091603803,3603732598,971261452,534414648,428311343,3389027175,2844869880,694888862,1227866773,2456207019,3043454569,2614353370,3749578031,3676663836,459166190,4132644070,1794958188,51825668,2252611902,3084671440,2036672799,3436641603,1099053433,2469121526,3059204941,1323291266,2061838604,1018778475,2233344254,2553501054,334295216,3556750194,1065731521,183467730],a[4]=[2127105028,745436345,2601412319,2788391185,3093987327,500390133,1155374404,389092991,150729210,3891597772,3523549952,1935325696,716645080,946045387,2901812282,1774124410,3869435775,4039581901,3293136918,3438657920,948246080,363898952,3867875531,1286266623,1598556673,68334250,630723836,1104211938,1312863373,613332731,2377784574,1101634306,441780740,3129959883,1917973735,2510624549,3238456535,2544211978,3308894634,1299840618,4076074851,1756332096,3977027158,297047435,3790297736,2265573040,3621810518,1311375015,1667687725,47300608,3299642885,2474112369,201668394,1468347890,576830978,3594690761,3742605952,1958042578,1747032512,3558991340,1408974056,3366841779,682131401,1033214337,1545599232,4265137049,206503691,103024618,2855227313,1337551222,2428998917,2963842932,4015366655,3852247746,2796956967,3865723491,3747938335,247794022,3755824572,702416469,2434691994,397379957,851939612,2314769512,218229120,1380406772,62274761,214451378,3170103466,2276210409,3845813286,28563499,446592073,1693330814,3453727194,29968656,3093872512,220656637,2470637031,77972100,1667708854,1358280214,4064765667,2395616961,325977563,4277240721,4220025399,3605526484,3355147721,811859167,3069544926,3962126810,652502677,3075892249,4132761541,3498924215,1217549313,3250244479,3858715919,3053989961,1538642152,2279026266,2875879137,574252750,3324769229,2651358713,1758150215,141295887,2719868960,3515574750,4093007735,4194485238,1082055363,3417560400,395511885,2966884026,179534037,3646028556,3738688086,1092926436,2496269142,257381841,3772900718,1636087230,1477059743,2499234752,3811018894,2675660129,3285975680,90732309,1684827095,1150307763,1723134115,3237045386,1769919919,1240018934,815675215,750138730,2239792499,1234303040,1995484674,138143821,675421338,1145607174,1936608440,3238603024,2345230278,2105974004,323969391,779555213,3004902369,2861610098,1017501463,2098600890,2628620304,2940611490,2682542546,1171473753,3656571411,3687208071,4091869518,393037935,159126506,1662887367,1147106178,391545844,3452332695,1891500680,3016609650,1851642611,546529401,1167818917,3194020571,2848076033,3953471836,575554290,475796850,4134673196,450035699,2351251534,844027695,1080539133,86184846,1554234488,3692025454,1972511363,2018339607,1491841390,1141460869,1061690759,4244549243,2008416118,2351104703,2868147542,1598468138,722020353,1027143159,212344630,1387219594,1725294528,3745187956,2500153616,458938280,4129215917,1828119673,544571780,3503225445,2297937496,1241802790,267843827,2694610800,1397140384,1558801448,3782667683,1806446719,929573330,2234912681,400817706,616011623,4121520928,3603768725,1761550015,1968522284,4053731006,4192232858,4005120285,872482584,3140537016,3894607381,2287405443,1963876937,3663887957,1584857e3,2975024454,1833426440,4025083860],a[5]=[4143615901,749497569,1285769319,3795025788,2514159847,23610292,3974978748,844452780,3214870880,3751928557,2213566365,1676510905,448177848,3730751033,4086298418,2307502392,871450977,3222878141,4110862042,3831651966,2735270553,1310974780,2043402188,1218528103,2736035353,4274605013,2702448458,3936360550,2693061421,162023535,2827510090,687910808,23484817,3784910947,3371371616,779677500,3503626546,3473927188,4157212626,3500679282,4248902014,2466621104,3899384794,1958663117,925738300,1283408968,3669349440,1840910019,137959847,2679828185,1239142320,1315376211,1547541505,1690155329,739140458,3128809933,3933172616,3876308834,905091803,1548541325,4040461708,3095483362,144808038,451078856,676114313,2861728291,2469707347,993665471,373509091,2599041286,4025009006,4170239449,2149739950,3275793571,3749616649,2794760199,1534877388,572371878,2590613551,1753320020,3467782511,1405125690,4270405205,633333386,3026356924,3475123903,632057672,2846462855,1404951397,3882875879,3915906424,195638627,2385783745,3902872553,1233155085,3355999740,2380578713,2702246304,2144565621,3663341248,3894384975,2502479241,4248018925,3094885567,1594115437,572884632,3385116731,767645374,1331858858,1475698373,3793881790,3532746431,1321687957,619889600,1121017241,3440213920,2070816767,2833025776,1933951238,4095615791,890643334,3874130214,859025556,360630002,925594799,1764062180,3920222280,4078305929,979562269,2810700344,4087740022,1949714515,546639971,1165388173,3069891591,1495988560,922170659,1291546247,2107952832,1813327274,3406010024,3306028637,4241950635,153207855,2313154747,1608695416,1150242611,1967526857,721801357,1220138373,3691287617,3356069787,2112743302,3281662835,1111556101,1778980689,250857638,2298507990,673216130,2846488510,3207751581,3562756981,3008625920,3417367384,2198807050,529510932,3547516680,3426503187,2364944742,102533054,2294910856,1617093527,1204784762,3066581635,1019391227,1069574518,1317995090,1691889997,3661132003,510022745,3238594800,1362108837,1817929911,2184153760,805817662,1953603311,3699844737,120799444,2118332377,207536705,2282301548,4120041617,145305846,2508124933,3086745533,3261524335,1877257368,2977164480,3160454186,2503252186,4221677074,759945014,254147243,2767453419,3801518371,629083197,2471014217,907280572,3900796746,940896768,2751021123,2625262786,3161476951,3661752313,3260732218,1425318020,2977912069,1496677566,3988592072,2140652971,3126511541,3069632175,977771578,1392695845,1698528874,1411812681,1369733098,1343739227,3620887944,1142123638,67414216,3102056737,3088749194,1626167401,2546293654,3941374235,697522451,33404913,143560186,2595682037,994885535,1247667115,3859094837,2699155541,3547024625,4114935275,2968073508,3199963069,2732024527,1237921620,951448369,1898488916,1211705605,2790989240,2233243581,3598044975],a[6]=[2246066201,858518887,1714274303,3485882003,713916271,2879113490,3730835617,539548191,36158695,1298409750,419087104,1358007170,749914897,2989680476,1261868530,2995193822,2690628854,3443622377,3780124940,3796824509,2976433025,4259637129,1551479e3,512490819,1296650241,951993153,2436689437,2460458047,144139966,3136204276,310820559,3068840729,643875328,1969602020,1680088954,2185813161,3283332454,672358534,198762408,896343282,276269502,3014846926,84060815,197145886,376173866,3943890818,3813173521,3545068822,1316698879,1598252827,2633424951,1233235075,859989710,2358460855,3503838400,3409603720,1203513385,1193654839,2792018475,2060853022,207403770,1144516871,3068631394,1121114134,177607304,3785736302,326409831,1929119770,2983279095,4183308101,3474579288,3200513878,3228482096,119610148,1170376745,3378393471,3163473169,951863017,3337026068,3135789130,2907618374,1183797387,2015970143,4045674555,2182986399,2952138740,3928772205,384012900,2454997643,10178499,2879818989,2596892536,111523738,2995089006,451689641,3196290696,235406569,1441906262,3890558523,3013735005,4158569349,1644036924,376726067,1006849064,3664579700,2041234796,1021632941,1374734338,2566452058,371631263,4007144233,490221539,206551450,3140638584,1053219195,1853335209,3412429660,3562156231,735133835,1623211703,3104214392,2738312436,4096837757,3366392578,3110964274,3956598718,3196820781,2038037254,3877786376,2339753847,300912036,3766732888,2372630639,1516443558,4200396704,1574567987,4069441456,4122592016,2699739776,146372218,2748961456,2043888151,35287437,2596680554,655490400,1132482787,110692520,1031794116,2188192751,1324057718,1217253157,919197030,686247489,3261139658,1028237775,3135486431,3059715558,2460921700,986174950,2661811465,4062904701,2752986992,3709736643,367056889,1353824391,731860949,1650113154,1778481506,784341916,357075625,3608602432,1074092588,2480052770,3811426202,92751289,877911070,3600361838,1231880047,480201094,3756190983,3094495953,434011822,87971354,363687820,1717726236,1901380172,3926403882,2481662265,400339184,1490350766,2661455099,1389319756,2558787174,784598401,1983468483,30828846,3550527752,2716276238,3841122214,1765724805,1955612312,1277890269,1333098070,1564029816,2704417615,1026694237,3287671188,1260819201,3349086767,1016692350,1582273796,1073413053,1995943182,694588404,1025494639,3323872702,3551898420,4146854327,453260480,1316140391,1435673405,3038941953,3486689407,1622062951,403978347,817677117,950059133,4246079218,3278066075,1486738320,1417279718,481875527,2549965225,3933690356,760697757,1452955855,3897451437,1177426808,1702951038,4085348628,2447005172,1084371187,3516436277,3068336338,1073369276,1027665953,3284188590,1230553676,1368340146,2226246512,267243139,2274220762,4070734279,2497715176,2423353163,2504755875],a[7]=[3793104909,3151888380,2817252029,895778965,2005530807,3871412763,237245952,86829237,296341424,3851759377,3974600970,2475086196,709006108,1994621201,2972577594,937287164,3734691505,168608556,3189338153,2225080640,3139713551,3033610191,3025041904,77524477,185966941,1208824168,2344345178,1721625922,3354191921,1066374631,1927223579,1971335949,2483503697,1551748602,2881383779,2856329572,3003241482,48746954,1398218158,2050065058,313056748,4255789917,393167848,1912293076,940740642,3465845460,3091687853,2522601570,2197016661,1727764327,364383054,492521376,1291706479,3264136376,1474851438,1685747964,2575719748,1619776915,1814040067,970743798,1561002147,2925768690,2123093554,1880132620,3151188041,697884420,2550985770,2607674513,2659114323,110200136,1489731079,997519150,1378877361,3527870668,478029773,2766872923,1022481122,431258168,1112503832,897933369,2635587303,669726182,3383752315,918222264,163866573,3246985393,3776823163,114105080,1903216136,761148244,3571337562,1690750982,3166750252,1037045171,1888456500,2010454850,642736655,616092351,365016990,1185228132,4174898510,1043824992,2023083429,2241598885,3863320456,3279669087,3674716684,108438443,2132974366,830746235,606445527,4173263986,2204105912,1844756978,2532684181,4245352700,2969441100,3796921661,1335562986,4061524517,2720232303,2679424040,634407289,885462008,3294724487,3933892248,2094100220,339117932,4048830727,3202280980,1458155303,2689246273,1022871705,2464987878,3714515309,353796843,2822958815,4256850100,4052777845,551748367,618185374,3778635579,4020649912,1904685140,3069366075,2670879810,3407193292,2954511620,4058283405,2219449317,3135758300,1120655984,3447565834,1474845562,3577699062,550456716,3466908712,2043752612,881257467,869518812,2005220179,938474677,3305539448,3850417126,1315485940,3318264702,226533026,965733244,321539988,1136104718,804158748,573969341,3708209826,937399083,3290727049,2901666755,1461057207,4013193437,4066861423,3242773476,2421326174,1581322155,3028952165,786071460,3900391652,3918438532,1485433313,4023619836,3708277595,3678951060,953673138,1467089153,1930354364,1533292819,2492563023,1346121658,1685000834,1965281866,3765933717,4190206607,2052792609,3515332758,690371149,3125873887,2180283551,2903598061,3933952357,436236910,289419410,14314871,1242357089,2904507907,1616633776,2666382180,585885352,3471299210,2699507360,1432659641,277164553,3354103607,770115018,2303809295,3741942315,3177781868,2853364978,2269453327,3774259834,987383833,1290892879,225909803,1741533526,890078084,1496906255,1111072499,916028167,243534141,1252605537,2204162171,531204876,290011180,3916834213,102027703,237315147,209093447,1486785922,220223953,2758195998,4175039106,82940208,3127791296,2569425252,518464269,1353887104,3941492737,2377294467,3935040926]}function fe(e){this.cast5=new de,this.cast5.setKey(e),this.encrypt=function(e){return this.cast5.encrypt(e)}}ge.keySize=ge.prototype.keySize=24,ge.blockSize=ge.prototype.blockSize=8,fe.blockSize=fe.prototype.blockSize=8,fe.keySize=fe.prototype.keySize=16;const me=4294967295;function we(e,t){return(e<<t|e>>>32-t)&me}function be(e,t){return e[t]|e[t+1]<<8|e[t+2]<<16|e[t+3]<<24}function ke(e,t,r){e.splice(t,4,255&r,r>>>8&255,r>>>16&255,r>>>24&255)}function ve(e,t){return e>>>8*t&255}function Ae(e){this.tf=function(){let e=null,t=null,r=-1,i=[],n=[[],[],[],[]];function a(e){return n[0][ve(e,0)]^n[1][ve(e,1)]^n[2][ve(e,2)]^n[3][ve(e,3)]}function s(e){return n[0][ve(e,3)]^n[1][ve(e,0)]^n[2][ve(e,1)]^n[3][ve(e,2)]}function o(e,t){let r=a(t[0]),n=s(t[1]);t[2]=we(t[2]^r+n+i[4*e+8]&me,31),t[3]=we(t[3],1)^r+2*n+i[4*e+9]&me,r=a(t[2]),n=s(t[3]),t[0]=we(t[0]^r+n+i[4*e+10]&me,31),t[1]=we(t[1],1)^r+2*n+i[4*e+11]&me}function c(e,t){let r=a(t[0]),n=s(t[1]);t[2]=we(t[2],1)^r+n+i[4*e+10]&me,t[3]=we(t[3]^r+2*n+i[4*e+11]&me,31),r=a(t[2]),n=s(t[3]),t[0]=we(t[0],1)^r+n+i[4*e+8]&me,t[1]=we(t[1]^r+2*n+i[4*e+9]&me,31)}return{name:"twofish",blocksize:16,open:function(t){let r,a,s,o,c;e=t;const u=[],h=[],y=[];let l;const p=[];let g,d,f;const m=[[8,1,7,13,6,15,3,2,0,11,5,9,14,12,10,4],[2,8,11,13,15,7,6,14,3,1,9,4,0,10,12,5]],w=[[14,12,11,8,1,2,3,5,15,4,10,6,7,0,9,13],[1,14,2,11,4,12,3,7,6,13,10,5,15,9,0,8]],b=[[11,10,5,14,6,13,9,0,12,8,15,3,2,4,7,1],[4,12,7,5,1,6,9,10,0,14,13,8,2,11,3,15]],k=[[13,7,15,4,1,2,6,14,9,11,3,0,8,5,12,10],[11,9,5,1,12,3,13,14,6,4,7,15,2,0,8,10]],v=[0,8,1,9,2,10,3,11,4,12,5,13,6,14,7,15],A=[0,9,2,11,4,13,6,15,8,1,10,3,12,5,14,7],K=[[],[]],E=[[],[],[],[]];function S(e){return e^e>>2^[0,90,180,238][3&e]}function P(e){return e^e>>1^e>>2^[0,238,180,90][3&e]}function U(e,t){let r,i,n;for(r=0;r<8;r++)i=t>>>24,t=t<<8&me|e>>>24,e=e<<8&me,n=i<<1,128&i&&(n^=333),t^=i^n<<16,n^=i>>>1,1&i&&(n^=166),t^=n<<24|n<<8;return t}function D(e,t){const r=t>>4,i=15&t,n=m[e][r^i],a=w[e][v[i]^A[r]];return k[e][v[a]^A[n]]<<4|b[e][n^a]}function C(e,t){let r=ve(e,0),i=ve(e,1),n=ve(e,2),a=ve(e,3);switch(l){case 4:r=K[1][r]^ve(t[3],0),i=K[0][i]^ve(t[3],1),n=K[0][n]^ve(t[3],2),a=K[1][a]^ve(t[3],3);case 3:r=K[1][r]^ve(t[2],0),i=K[1][i]^ve(t[2],1),n=K[0][n]^ve(t[2],2),a=K[0][a]^ve(t[2],3);case 2:r=K[0][K[0][r]^ve(t[1],0)]^ve(t[0],0),i=K[0][K[1][i]^ve(t[1],1)]^ve(t[0],1),n=K[1][K[0][n]^ve(t[1],2)]^ve(t[0],2),a=K[1][K[1][a]^ve(t[1],3)]^ve(t[0],3)}return E[0][r]^E[1][i]^E[2][n]^E[3][a]}for(e=e.slice(0,32),r=e.length;16!==r&&24!==r&&32!==r;)e[r++]=0;for(r=0;r<e.length;r+=4)y[r>>2]=be(e,r);for(r=0;r<256;r++)K[0][r]=D(0,r),K[1][r]=D(1,r);for(r=0;r<256;r++)g=K[1][r],d=S(g),f=P(g),E[0][r]=g+(d<<8)+(f<<16)+(f<<24),E[2][r]=d+(f<<8)+(g<<16)+(f<<24),g=K[0][r],d=S(g),f=P(g),E[1][r]=f+(f<<8)+(d<<16)+(g<<24),E[3][r]=d+(g<<8)+(f<<16)+(d<<24);for(l=y.length/2,r=0;r<l;r++)a=y[r+r],u[r]=a,s=y[r+r+1],h[r]=s,p[l-r-1]=U(a,s);for(r=0;r<40;r+=2)a=16843009*r,s=a+16843009,a=C(a,u),s=we(C(s,h),8),i[r]=a+s&me,i[r+1]=we(a+2*s,9);for(r=0;r<256;r++)switch(a=s=o=c=r,l){case 4:a=K[1][a]^ve(p[3],0),s=K[0][s]^ve(p[3],1),o=K[0][o]^ve(p[3],2),c=K[1][c]^ve(p[3],3);case 3:a=K[1][a]^ve(p[2],0),s=K[1][s]^ve(p[2],1),o=K[0][o]^ve(p[2],2),c=K[0][c]^ve(p[2],3);case 2:n[0][r]=E[0][K[0][K[0][a]^ve(p[1],0)]^ve(p[0],0)],n[1][r]=E[1][K[0][K[1][s]^ve(p[1],1)]^ve(p[0],1)],n[2][r]=E[2][K[1][K[0][o]^ve(p[1],2)]^ve(p[0],2)],n[3][r]=E[3][K[1][K[1][c]^ve(p[1],3)]^ve(p[0],3)]}},close:function(){i=[],n=[[],[],[],[]]},encrypt:function(e,n){t=e,r=n;const a=[be(t,r)^i[0],be(t,r+4)^i[1],be(t,r+8)^i[2],be(t,r+12)^i[3]];for(let e=0;e<8;e++)o(e,a);return ke(t,r,a[2]^i[4]),ke(t,r+4,a[3]^i[5]),ke(t,r+8,a[0]^i[6]),ke(t,r+12,a[1]^i[7]),r+=16,t},decrypt:function(e,n){t=e,r=n;const a=[be(t,r)^i[4],be(t,r+4)^i[5],be(t,r+8)^i[6],be(t,r+12)^i[7]];for(let e=7;e>=0;e--)c(e,a);ke(t,r,a[2]^i[0]),ke(t,r+4,a[3]^i[1]),ke(t,r+8,a[0]^i[2]),ke(t,r+12,a[1]^i[3]),r+=16},finalize:function(){return t}}}(),this.tf.open(Array.from(e),0),this.encrypt=function(e){return this.tf.encrypt(Array.from(e),0)}}function Ke(){}function Ee(e){this.bf=new Ke,this.bf.init(e),this.encrypt=function(e){return this.bf.encryptBlock(e)}}Ae.keySize=Ae.prototype.keySize=32,Ae.blockSize=Ae.prototype.blockSize=16,Ke.prototype.BLOCKSIZE=8,Ke.prototype.SBOXES=[[3509652390,2564797868,805139163,3491422135,3101798381,1780907670,3128725573,4046225305,614570311,3012652279,134345442,2240740374,1667834072,1901547113,2757295779,4103290238,227898511,1921955416,1904987480,2182433518,2069144605,3260701109,2620446009,720527379,3318853667,677414384,3393288472,3101374703,2390351024,1614419982,1822297739,2954791486,3608508353,3174124327,2024746970,1432378464,3864339955,2857741204,1464375394,1676153920,1439316330,715854006,3033291828,289532110,2706671279,2087905683,3018724369,1668267050,732546397,1947742710,3462151702,2609353502,2950085171,1814351708,2050118529,680887927,999245976,1800124847,3300911131,1713906067,1641548236,4213287313,1216130144,1575780402,4018429277,3917837745,3693486850,3949271944,596196993,3549867205,258830323,2213823033,772490370,2760122372,1774776394,2652871518,566650946,4142492826,1728879713,2882767088,1783734482,3629395816,2517608232,2874225571,1861159788,326777828,3124490320,2130389656,2716951837,967770486,1724537150,2185432712,2364442137,1164943284,2105845187,998989502,3765401048,2244026483,1075463327,1455516326,1322494562,910128902,469688178,1117454909,936433444,3490320968,3675253459,1240580251,122909385,2157517691,634681816,4142456567,3825094682,3061402683,2540495037,79693498,3249098678,1084186820,1583128258,426386531,1761308591,1047286709,322548459,995290223,1845252383,2603652396,3431023940,2942221577,3202600964,3727903485,1712269319,422464435,3234572375,1170764815,3523960633,3117677531,1434042557,442511882,3600875718,1076654713,1738483198,4213154764,2393238008,3677496056,1014306527,4251020053,793779912,2902807211,842905082,4246964064,1395751752,1040244610,2656851899,3396308128,445077038,3742853595,3577915638,679411651,2892444358,2354009459,1767581616,3150600392,3791627101,3102740896,284835224,4246832056,1258075500,768725851,2589189241,3069724005,3532540348,1274779536,3789419226,2764799539,1660621633,3471099624,4011903706,913787905,3497959166,737222580,2514213453,2928710040,3937242737,1804850592,3499020752,2949064160,2386320175,2390070455,2415321851,4061277028,2290661394,2416832540,1336762016,1754252060,3520065937,3014181293,791618072,3188594551,3933548030,2332172193,3852520463,3043980520,413987798,3465142937,3030929376,4245938359,2093235073,3534596313,375366246,2157278981,2479649556,555357303,3870105701,2008414854,3344188149,4221384143,3956125452,2067696032,3594591187,2921233993,2428461,544322398,577241275,1471733935,610547355,4027169054,1432588573,1507829418,2025931657,3646575487,545086370,48609733,2200306550,1653985193,298326376,1316178497,3007786442,2064951626,458293330,2589141269,3591329599,3164325604,727753846,2179363840,146436021,1461446943,4069977195,705550613,3059967265,3887724982,4281599278,3313849956,1404054877,2845806497,146425753,1854211946],[1266315497,3048417604,3681880366,3289982499,290971e4,1235738493,2632868024,2414719590,3970600049,1771706367,1449415276,3266420449,422970021,1963543593,2690192192,3826793022,1062508698,1531092325,1804592342,2583117782,2714934279,4024971509,1294809318,4028980673,1289560198,2221992742,1669523910,35572830,157838143,1052438473,1016535060,1802137761,1753167236,1386275462,3080475397,2857371447,1040679964,2145300060,2390574316,1461121720,2956646967,4031777805,4028374788,33600511,2920084762,1018524850,629373528,3691585981,3515945977,2091462646,2486323059,586499841,988145025,935516892,3367335476,2599673255,2839830854,265290510,3972581182,2759138881,3795373465,1005194799,847297441,406762289,1314163512,1332590856,1866599683,4127851711,750260880,613907577,1450815602,3165620655,3734664991,3650291728,3012275730,3704569646,1427272223,778793252,1343938022,2676280711,2052605720,1946737175,3164576444,3914038668,3967478842,3682934266,1661551462,3294938066,4011595847,840292616,3712170807,616741398,312560963,711312465,1351876610,322626781,1910503582,271666773,2175563734,1594956187,70604529,3617834859,1007753275,1495573769,4069517037,2549218298,2663038764,504708206,2263041392,3941167025,2249088522,1514023603,1998579484,1312622330,694541497,2582060303,2151582166,1382467621,776784248,2618340202,3323268794,2497899128,2784771155,503983604,4076293799,907881277,423175695,432175456,1378068232,4145222326,3954048622,3938656102,3820766613,2793130115,2977904593,26017576,3274890735,3194772133,1700274565,1756076034,4006520079,3677328699,720338349,1533947780,354530856,688349552,3973924725,1637815568,332179504,3949051286,53804574,2852348879,3044236432,1282449977,3583942155,3416972820,4006381244,1617046695,2628476075,3002303598,1686838959,431878346,2686675385,1700445008,1080580658,1009431731,832498133,3223435511,2605976345,2271191193,2516031870,1648197032,4164389018,2548247927,300782431,375919233,238389289,3353747414,2531188641,2019080857,1475708069,455242339,2609103871,448939670,3451063019,1395535956,2413381860,1841049896,1491858159,885456874,4264095073,4001119347,1565136089,3898914787,1108368660,540939232,1173283510,2745871338,3681308437,4207628240,3343053890,4016749493,1699691293,1103962373,3625875870,2256883143,3830138730,1031889488,3479347698,1535977030,4236805024,3251091107,2132092099,1774941330,1199868427,1452454533,157007616,2904115357,342012276,595725824,1480756522,206960106,497939518,591360097,863170706,2375253569,3596610801,1814182875,2094937945,3421402208,1082520231,3463918190,2785509508,435703966,3908032597,1641649973,2842273706,3305899714,1510255612,2148256476,2655287854,3276092548,4258621189,236887753,3681803219,274041037,1734335097,3815195456,3317970021,1899903192,1026095262,4050517792,356393447,2410691914,3873677099,3682840055],[3913112168,2491498743,4132185628,2489919796,1091903735,1979897079,3170134830,3567386728,3557303409,857797738,1136121015,1342202287,507115054,2535736646,337727348,3213592640,1301675037,2528481711,1895095763,1721773893,3216771564,62756741,2142006736,835421444,2531993523,1442658625,3659876326,2882144922,676362277,1392781812,170690266,3921047035,1759253602,3611846912,1745797284,664899054,1329594018,3901205900,3045908486,2062866102,2865634940,3543621612,3464012697,1080764994,553557557,3656615353,3996768171,991055499,499776247,1265440854,648242737,3940784050,980351604,3713745714,1749149687,3396870395,4211799374,3640570775,1161844396,3125318951,1431517754,545492359,4268468663,3499529547,1437099964,2702547544,3433638243,2581715763,2787789398,1060185593,1593081372,2418618748,4260947970,69676912,2159744348,86519011,2512459080,3838209314,1220612927,3339683548,133810670,1090789135,1078426020,1569222167,845107691,3583754449,4072456591,1091646820,628848692,1613405280,3757631651,526609435,236106946,48312990,2942717905,3402727701,1797494240,859738849,992217954,4005476642,2243076622,3870952857,3732016268,765654824,3490871365,2511836413,1685915746,3888969200,1414112111,2273134842,3281911079,4080962846,172450625,2569994100,980381355,4109958455,2819808352,2716589560,2568741196,3681446669,3329971472,1835478071,660984891,3704678404,4045999559,3422617507,3040415634,1762651403,1719377915,3470491036,2693910283,3642056355,3138596744,1364962596,2073328063,1983633131,926494387,3423689081,2150032023,4096667949,1749200295,3328846651,309677260,2016342300,1779581495,3079819751,111262694,1274766160,443224088,298511866,1025883608,3806446537,1145181785,168956806,3641502830,3584813610,1689216846,3666258015,3200248200,1692713982,2646376535,4042768518,1618508792,1610833997,3523052358,4130873264,2001055236,3610705100,2202168115,4028541809,2961195399,1006657119,2006996926,3186142756,1430667929,3210227297,1314452623,4074634658,4101304120,2273951170,1399257539,3367210612,3027628629,1190975929,2062231137,2333990788,2221543033,2438960610,1181637006,548689776,2362791313,3372408396,3104550113,3145860560,296247880,1970579870,3078560182,3769228297,1714227617,3291629107,3898220290,166772364,1251581989,493813264,448347421,195405023,2709975567,677966185,3703036547,1463355134,2715995803,1338867538,1343315457,2802222074,2684532164,233230375,2599980071,2000651841,3277868038,1638401717,4028070440,3237316320,6314154,819756386,300326615,590932579,1405279636,3267499572,3150704214,2428286686,3959192993,3461946742,1862657033,1266418056,963775037,2089974820,2263052895,1917689273,448879540,3550394620,3981727096,150775221,3627908307,1303187396,508620638,2975983352,2726630617,1817252668,1876281319,1457606340,908771278,3720792119,3617206836,2455994898,1729034894,1080033504],[976866871,3556439503,2881648439,1522871579,1555064734,1336096578,3548522304,2579274686,3574697629,3205460757,3593280638,3338716283,3079412587,564236357,2993598910,1781952180,1464380207,3163844217,3332601554,1699332808,1393555694,1183702653,3581086237,1288719814,691649499,2847557200,2895455976,3193889540,2717570544,1781354906,1676643554,2592534050,3230253752,1126444790,2770207658,2633158820,2210423226,2615765581,2414155088,3127139286,673620729,2805611233,1269405062,4015350505,3341807571,4149409754,1057255273,2012875353,2162469141,2276492801,2601117357,993977747,3918593370,2654263191,753973209,36408145,2530585658,25011837,3520020182,2088578344,530523599,2918365339,1524020338,1518925132,3760827505,3759777254,1202760957,3985898139,3906192525,674977740,4174734889,2031300136,2019492241,3983892565,4153806404,3822280332,352677332,2297720250,60907813,90501309,3286998549,1016092578,2535922412,2839152426,457141659,509813237,4120667899,652014361,1966332200,2975202805,55981186,2327461051,676427537,3255491064,2882294119,3433927263,1307055953,942726286,933058658,2468411793,3933900994,4215176142,1361170020,2001714738,2830558078,3274259782,1222529897,1679025792,2729314320,3714953764,1770335741,151462246,3013232138,1682292957,1483529935,471910574,1539241949,458788160,3436315007,1807016891,3718408830,978976581,1043663428,3165965781,1927990952,4200891579,2372276910,3208408903,3533431907,1412390302,2931980059,4132332400,1947078029,3881505623,4168226417,2941484381,1077988104,1320477388,886195818,18198404,3786409e3,2509781533,112762804,3463356488,1866414978,891333506,18488651,661792760,1628790961,3885187036,3141171499,876946877,2693282273,1372485963,791857591,2686433993,3759982718,3167212022,3472953795,2716379847,445679433,3561995674,3504004811,3574258232,54117162,3331405415,2381918588,3769707343,4154350007,1140177722,4074052095,668550556,3214352940,367459370,261225585,2610173221,4209349473,3468074219,3265815641,314222801,3066103646,3808782860,282218597,3406013506,3773591054,379116347,1285071038,846784868,2669647154,3771962079,3550491691,2305946142,453669953,1268987020,3317592352,3279303384,3744833421,2610507566,3859509063,266596637,3847019092,517658769,3462560207,3443424879,370717030,4247526661,2224018117,4143653529,4112773975,2788324899,2477274417,1456262402,2901442914,1517677493,1846949527,2295493580,3734397586,2176403920,1280348187,1908823572,3871786941,846861322,1172426758,3287448474,3383383037,1655181056,3139813346,901632758,1897031941,2986607138,3066810236,3447102507,1393639104,373351379,950779232,625454576,3124240540,4148612726,2007998917,544563296,2244738638,2330496472,2058025392,1291430526,424198748,50039436,29584100,3605783033,2429876329,2791104160,1057563949,3255363231,3075367218,3463963227,1469046755,985887462]],Ke.prototype.PARRAY=[608135816,2242054355,320440878,57701188,2752067618,698298832,137296536,3964562569,1160258022,953160567,3193202383,887688300,3232508343,3380367581,1065670069,3041331479,2450970073,2306472731],Ke.prototype.NN=16,Ke.prototype._clean=function(e){if(e<0){e=(2147483647&e)+2147483648}return e},Ke.prototype._F=function(e){let t;const r=255&e,i=255&(e>>>=8),n=255&(e>>>=8),a=255&(e>>>=8);return t=this.sboxes[0][a]+this.sboxes[1][n],t^=this.sboxes[2][i],t+=this.sboxes[3][r],t},Ke.prototype._encryptBlock=function(e){let t,r=e[0],i=e[1];for(t=0;t<this.NN;++t){r^=this.parray[t],i=this._F(r)^i;const e=r;r=i,i=e}r^=this.parray[this.NN+0],i^=this.parray[this.NN+1],e[0]=this._clean(i),e[1]=this._clean(r)},Ke.prototype.encryptBlock=function(e){let t;const r=[0,0],i=this.BLOCKSIZE/2;for(t=0;t<this.BLOCKSIZE/2;++t)r[0]=r[0]<<8|255&e[t+0],r[1]=r[1]<<8|255&e[t+i];this._encryptBlock(r);const n=[];for(t=0;t<this.BLOCKSIZE/2;++t)n[t+0]=r[0]>>>24-8*t&255,n[t+i]=r[1]>>>24-8*t&255;return n},Ke.prototype._decryptBlock=function(e){let t,r=e[0],i=e[1];for(t=this.NN+1;t>1;--t){r^=this.parray[t],i=this._F(r)^i;const e=r;r=i,i=e}r^=this.parray[1],i^=this.parray[0],e[0]=this._clean(i),e[1]=this._clean(r)},Ke.prototype.init=function(e){let t,r=0;for(this.parray=[],t=0;t<this.NN+2;++t){let i=0;for(let t=0;t<4;++t)i=i<<8|255&e[r],++r>=e.length&&(r=0);this.parray[t]=this.PARRAY[t]^i}for(this.sboxes=[],t=0;t<4;++t)for(this.sboxes[t]=[],r=0;r<256;++r)this.sboxes[t][r]=this.SBOXES[t][r];const i=[0,0];for(t=0;t<this.NN+2;t+=2)this._encryptBlock(i),this.parray[t+0]=i[0],this.parray[t+1]=i[1];for(t=0;t<4;++t)for(r=0;r<256;r+=2)this._encryptBlock(i),this.sboxes[t][r+0]=i[0],this.sboxes[t][r+1]=i[1]},Ee.keySize=Ee.prototype.keySize=16,Ee.blockSize=Ee.prototype.blockSize=8;const Se=ye(128),Pe=ye(192),Ue=ye(256);var De=/*#__PURE__*/Object.freeze({__proto__:null,aes128:Se,aes192:Pe,aes256:Ue,blowfish:Ee,cast5:fe,des:function(e){this.key=e,this.encrypt=function(e,t){return le(pe(this.key),e,!0,0,null,t)},this.decrypt=function(e,t){return le(pe(this.key),e,!1,0,null,t)}},idea:function(){throw Error("IDEA symmetric-key algorithm not implemented")},tripledes:ge,twofish:Ae});function Ce(e,t){let r=e[0],i=e[1],n=e[2],a=e[3];r=Te(r,i,n,a,t[0],7,-680876936),a=Te(a,r,i,n,t[1],12,-389564586),n=Te(n,a,r,i,t[2],17,606105819),i=Te(i,n,a,r,t[3],22,-1044525330),r=Te(r,i,n,a,t[4],7,-176418897),a=Te(a,r,i,n,t[5],12,1200080426),n=Te(n,a,r,i,t[6],17,-1473231341),i=Te(i,n,a,r,t[7],22,-45705983),r=Te(r,i,n,a,t[8],7,1770035416),a=Te(a,r,i,n,t[9],12,-1958414417),n=Te(n,a,r,i,t[10],17,-42063),i=Te(i,n,a,r,t[11],22,-1990404162),r=Te(r,i,n,a,t[12],7,1804603682),a=Te(a,r,i,n,t[13],12,-40341101),n=Te(n,a,r,i,t[14],17,-1502002290),i=Te(i,n,a,r,t[15],22,1236535329),r=Ie(r,i,n,a,t[1],5,-165796510),a=Ie(a,r,i,n,t[6],9,-1069501632),n=Ie(n,a,r,i,t[11],14,643717713),i=Ie(i,n,a,r,t[0],20,-373897302),r=Ie(r,i,n,a,t[5],5,-701558691),a=Ie(a,r,i,n,t[10],9,38016083),n=Ie(n,a,r,i,t[15],14,-660478335),i=Ie(i,n,a,r,t[4],20,-405537848),r=Ie(r,i,n,a,t[9],5,568446438),a=Ie(a,r,i,n,t[14],9,-1019803690),n=Ie(n,a,r,i,t[3],14,-187363961),i=Ie(i,n,a,r,t[8],20,1163531501),r=Ie(r,i,n,a,t[13],5,-1444681467),a=Ie(a,r,i,n,t[2],9,-51403784),n=Ie(n,a,r,i,t[7],14,1735328473),i=Ie(i,n,a,r,t[12],20,-1926607734),r=_e(r,i,n,a,t[5],4,-378558),a=_e(a,r,i,n,t[8],11,-2022574463),n=_e(n,a,r,i,t[11],16,1839030562),i=_e(i,n,a,r,t[14],23,-35309556),r=_e(r,i,n,a,t[1],4,-1530992060),a=_e(a,r,i,n,t[4],11,1272893353),n=_e(n,a,r,i,t[7],16,-155497632),i=_e(i,n,a,r,t[10],23,-1094730640),r=_e(r,i,n,a,t[13],4,681279174),a=_e(a,r,i,n,t[0],11,-358537222),n=_e(n,a,r,i,t[3],16,-722521979),i=_e(i,n,a,r,t[6],23,76029189),r=_e(r,i,n,a,t[9],4,-640364487),a=_e(a,r,i,n,t[12],11,-421815835),n=_e(n,a,r,i,t[15],16,530742520),i=_e(i,n,a,r,t[2],23,-995338651),r=Be(r,i,n,a,t[0],6,-198630844),a=Be(a,r,i,n,t[7],10,1126891415),n=Be(n,a,r,i,t[14],15,-1416354905),i=Be(i,n,a,r,t[5],21,-57434055),r=Be(r,i,n,a,t[12],6,1700485571),a=Be(a,r,i,n,t[3],10,-1894986606),n=Be(n,a,r,i,t[10],15,-1051523),i=Be(i,n,a,r,t[1],21,-2054922799),r=Be(r,i,n,a,t[8],6,1873313359),a=Be(a,r,i,n,t[15],10,-30611744),n=Be(n,a,r,i,t[6],15,-1560198380),i=Be(i,n,a,r,t[13],21,1309151649),r=Be(r,i,n,a,t[4],6,-145523070),a=Be(a,r,i,n,t[11],10,-1120210379),n=Be(n,a,r,i,t[2],15,718787259),i=Be(i,n,a,r,t[9],21,-343485551),e[0]=Fe(r,e[0]),e[1]=Fe(i,e[1]),e[2]=Fe(n,e[2]),e[3]=Fe(a,e[3])}function xe(e,t,r,i,n,a){return t=Fe(Fe(t,e),Fe(i,a)),Fe(t<<n|t>>>32-n,r)}function Te(e,t,r,i,n,a,s){return xe(t&r|~t&i,e,t,n,a,s)}function Ie(e,t,r,i,n,a,s){return xe(t&i|r&~i,e,t,n,a,s)}function _e(e,t,r,i,n,a,s){return xe(t^r^i,e,t,n,a,s)}function Be(e,t,r,i,n,a,s){return xe(r^(t|~i),e,t,n,a,s)}function Re(e){const t=[];let r;for(r=0;r<64;r+=4)t[r>>2]=e.charCodeAt(r)+(e.charCodeAt(r+1)<<8)+(e.charCodeAt(r+2)<<16)+(e.charCodeAt(r+3)<<24);return t}const Me="0123456789abcdef".split("");function Le(e){let t="",r=0;for(;r<4;r++)t+=Me[e>>8*r+4&15]+Me[e>>8*r&15];return t}function Fe(e,t){return e+t&4294967295}const ze=N.getWebCrypto(),Ne=N.getNodeCrypto(),Oe=Ne&&Ne.getHashes();function He(e){if(Ne&&Oe.includes(e))return async function(t){const r=Ne.createHash(e);return K(t,(e=>{r.update(e)}),(()=>new Uint8Array(r.digest())))}}function je(e,t){const r=async()=>{const{nobleHashes:t}=await import("./noble_hashes.min.mjs"),r=t.get(e);if(!r)throw Error("Unsupported hash");return r};return async function(e){if(s(e)&&(e=await x(e)),N.isStream(e)){const t=(await r()).create();return K(e,(e=>{t.update(e)}),(()=>t.digest()))}if(ze&&t)return new Uint8Array(await ze.digest(t,e));return(await r())(e)}}var qe={md5:He("md5")||async function(e){const t=function(e){const t=e.length,r=[1732584193,-271733879,-1732584194,271733878];let i;for(i=64;i<=e.length;i+=64)Ce(r,Re(e.substring(i-64,i)));e=e.substring(i-64);const n=[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0];for(i=0;i<e.length;i++)n[i>>2]|=e.charCodeAt(i)<<(i%4<<3);if(n[i>>2]|=128<<(i%4<<3),i>55)for(Ce(r,n),i=0;i<16;i++)n[i]=0;return n[14]=8*t,Ce(r,n),r}(N.uint8ArrayToString(e));return N.hexToUint8Array(function(e){for(let t=0;t<e.length;t++)e[t]=Le(e[t]);return e.join("")}(t))},sha1:He("sha1")||je("sha1","SHA-1"),sha224:He("sha224")||je("sha224"),sha256:He("sha256")||je("sha256","SHA-256"),sha384:He("sha384")||je("sha384","SHA-384"),sha512:He("sha512")||je("sha512","SHA-512"),ripemd:He("ripemd160")||je("ripemd160"),sha3_256:He("sha3-256")||je("sha3_256"),sha3_512:He("sha3-512")||je("sha3_512"),digest:function(e,t){switch(e){case M.hash.md5:return this.md5(t);case M.hash.sha1:return this.sha1(t);case M.hash.ripemd:return this.ripemd(t);case M.hash.sha256:return this.sha256(t);case M.hash.sha384:return this.sha384(t);case M.hash.sha512:return this.sha512(t);case M.hash.sha224:return this.sha224(t);case M.hash.sha3_256:return this.sha3_256(t);case M.hash.sha3_512:return this.sha3_512(t);default:throw Error("Unsupported hash function")}},getHashByteLength:function(e){switch(e){case M.hash.md5:return 16;case M.hash.sha1:case M.hash.ripemd:return 20;case M.hash.sha256:return 32;case M.hash.sha384:return 48;case M.hash.sha512:return 64;case M.hash.sha224:return 28;case M.hash.sha3_256:return 32;case M.hash.sha3_512:return 64;default:throw Error("Invalid hash algorithm.")}},getBlockSize:function(e){switch(e){case M.hash.md5:case M.hash.sha1:case M.hash.ripemd:case M.hash.sha224:case M.hash.sha256:return 64;case M.hash.sha384:case M.hash.sha512:return 128;default:throw Error("Invalid hash algorithm.")}}};class Ge{static encrypt(e,t,r){return new Ge(t,r).encrypt(e)}static decrypt(e,t,r){return new Ge(t,r).decrypt(e)}constructor(e,t,r){this.aes=r||new ue(e,t,!0,"CFB"),delete this.aes.padding}encrypt(e){return ie(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}decrypt(e){return ie(this.aes.AES_Decrypt_process(e),this.aes.AES_Decrypt_finish())}}function Ve(e){const t=M.read(M.symmetric,e);return De[t]}const We=N.getWebCrypto(),$e=N.getNodeCrypto(),Xe=$e?$e.getCiphers():[],Ze={idea:Xe.includes("idea-cfb")?"idea-cfb":void 0,tripledes:Xe.includes("des-ede3-cfb")?"des-ede3-cfb":void 0,cast5:Xe.includes("cast5-cfb")?"cast5-cfb":void 0,blowfish:Xe.includes("bf-cfb")?"bf-cfb":void 0,aes128:Xe.includes("aes-128-cfb")?"aes-128-cfb":void 0,aes192:Xe.includes("aes-192-cfb")?"aes-192-cfb":void 0,aes256:Xe.includes("aes-256-cfb")?"aes-256-cfb":void 0};class Ye{constructor(e,t,r){const{blockSize:i}=Ve(e);this.key=t,this.prevBlock=r,this.nextBlock=new Uint8Array(i),this.i=0,this.blockSize=i,this.zeroBlock=new Uint8Array(this.blockSize)}static async isSupported(e){const{keySize:t}=Ve(e);return We.importKey("raw",new Uint8Array(t),"aes-cbc",!1,["encrypt"]).then((()=>!0),(()=>!1))}async _runCBC(e,t){const r="AES-CBC";this.keyRef=this.keyRef||await We.importKey("raw",this.key,r,!1,["encrypt"]);const i=await We.encrypt({name:r,iv:t||this.zeroBlock},this.keyRef,e);return new Uint8Array(i).subarray(0,e.length)}async encryptChunk(e){const t=this.nextBlock.length-this.i,r=e.subarray(0,t);if(this.nextBlock.set(r,this.i),this.i+e.length>=2*this.blockSize){const r=(e.length-t)%this.blockSize,i=N.concatUint8Array([this.nextBlock,e.subarray(t,e.length-r)]),n=N.concatUint8Array([this.prevBlock,i.subarray(0,i.length-this.blockSize)]),a=await this._runCBC(n);return Qe(a,i),this.prevBlock=a.subarray(-this.blockSize).slice(),r>0&&this.nextBlock.set(e.subarray(-r).slice()),this.i=r,a}this.i+=r.length;let i=new Uint8Array;if(this.i===this.nextBlock.length){const t=this.nextBlock;i=await this._runCBC(this.prevBlock),Qe(i,t),this.prevBlock=i.slice(),this.i=0;const n=e.subarray(r.length);this.nextBlock.set(n,this.i),this.i+=n.length}return i}async finish(){let e;if(0===this.i)e=new Uint8Array;else{this.nextBlock=this.nextBlock.subarray(0,this.i);const t=this.nextBlock,r=await this._runCBC(this.prevBlock);Qe(r,t),e=r.subarray(0,t.length)}return this.clearSensitiveData(),e}clearSensitiveData(){this.nextBlock.fill(0),this.prevBlock.fill(0),this.keyRef=null,this.key=null}async encrypt(e){const t=(await this._runCBC(N.concatUint8Array([new Uint8Array(this.blockSize),e]),this.iv)).subarray(0,e.length);return Qe(t,e),this.clearSensitiveData(),t}}function Qe(e,t){const r=Math.min(e.length,t.length);for(let i=0;i<r;i++)e[i]=e[i]^t[i]}var Je=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i){const n=M.read(M.symmetric,e);if($e&&Ze[n])return function(e,t,r,i){const n=M.read(M.symmetric,e),a=new $e.createDecipheriv(Ze[n],t,i);return K(r,(e=>new Uint8Array(a.update(e))))}(e,t,r,i);if(N.isAES(e))return function(e,t,r,i){if(N.isStream(r)){const e=new Ge(t,i);return K(r,(t=>e.aes.AES_Decrypt_process(t)),(()=>e.aes.AES_Decrypt_finish()))}return Ge.decrypt(r,t,i)}(0,t,r,i);const a=new(Ve(e))(t),s=a.blockSize;let o=i,c=new Uint8Array;const u=e=>{e&&(c=N.concatUint8Array([c,e]));const t=new Uint8Array(c.length);let r,i=0;for(;e?c.length>=s:c.length;){const e=a.encrypt(o);for(o=c.subarray(0,s),r=0;r<s;r++)t[i++]=o[r]^e[r];c=c.subarray(s)}return t.subarray(0,i)};return K(r,u,u)},encrypt:async function(e,t,r,i,n){const a=M.read(M.symmetric,e);if(N.getNodeCrypto()&&Ze[a])return function(e,t,r,i){const n=M.read(M.symmetric,e),a=new $e.createCipheriv(Ze[n],t,i);return K(r,(e=>new Uint8Array(a.update(e))))}(e,t,r,i);if(N.isAES(e))return async function(e,t,r,i){if(We&&await Ye.isSupported(e)){const n=new Ye(e,t,i);return N.isStream(r)?K(r,(e=>n.encryptChunk(e)),(()=>n.finish())):n.encrypt(r)}{const e=new Ge(t,i);return K(r,(t=>e.aes.AES_Encrypt_process(t)),(()=>e.aes.AES_Encrypt_finish()))}}(e,t,r,i);const s=new(Ve(e))(t),o=s.blockSize,c=i.slice();let u=new Uint8Array;const h=e=>{e&&(u=N.concatUint8Array([u,e]));const t=new Uint8Array(u.length);let r,i=0;for(;e?u.length>=o:u.length;){const e=s.encrypt(c);for(r=0;r<o;r++)c[r]=u[r]^e[r],t[i++]=c[r];u=u.subarray(o)}return t.subarray(0,i)};return K(r,h,h)}});class et{static encrypt(e,t,r){return new et(t,r).encrypt(e)}static decrypt(e,t,r){return new et(t,r).encrypt(e)}constructor(e,t,r){this.aes=r||new ue(e,void 0,!1,"CTR"),delete this.aes.padding,this.AES_CTR_set_options(t)}encrypt(e){return ie(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}decrypt(e){return ie(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}AES_CTR_set_options(e,t,r){let{asm:i}=this.aes.acquire_asm();if(void 0!==r){if(r<8||r>48)throw new ae("illegal counter size");let e=Math.pow(2,r)-1;i.set_mask(0,0,e/4294967296|0,0|e)}else r=48,i.set_mask(0,0,65535,4294967295);if(void 0===e)throw Error("nonce is required");{let t=e.length;if(!t||t>16)throw new ae("illegal nonce size");let r=new DataView(new ArrayBuffer(16));new Uint8Array(r.buffer).set(e),i.set_nonce(r.getUint32(0),r.getUint32(4),r.getUint32(8),r.getUint32(12))}if(void 0!==t){if(t<0||t>=Math.pow(2,r))throw new ae("illegal counter value");i.set_counter(0,0,t/4294967296|0,0|t)}}}class tt{static encrypt(e,t,r=!0,i){return new tt(t,i,r).encrypt(e)}static decrypt(e,t,r=!0,i){return new tt(t,i,r).decrypt(e)}constructor(e,t,r=!0,i){this.aes=i||new ue(e,t,r,"CBC")}encrypt(e){return ie(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}decrypt(e){return ie(this.aes.AES_Decrypt_process(e),this.aes.AES_Decrypt_finish())}}const rt=N.getWebCrypto(),it=N.getNodeCrypto(),nt=16;function at(e,t){const r=e.length-nt;for(let i=0;i<nt;i++)e[i+r]^=t[i];return e}const st=new Uint8Array(nt);async function ot(e){const t=await async function(e){if(N.getNodeCrypto())return async function(t){const r=new it.createCipheriv("aes-"+8*e.length+"-cbc",e,st).update(t);return new Uint8Array(r)};if(N.getWebCrypto())try{return e=await rt.importKey("raw",e,{name:"AES-CBC",length:8*e.length},!1,["encrypt"]),async function(t){const r=await rt.encrypt({name:"AES-CBC",iv:st,length:8*nt},e,t);return new Uint8Array(r).subarray(0,r.byteLength-nt)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;N.printDebugError("Browser did not support operation: "+t.message)}return async function(t){return tt.encrypt(t,e,!1,st)}}(e),r=N.double(await t(st)),i=N.double(r);return async function(e){return(await t(function(e,t,r){if(e.length&&e.length%nt==0)return at(e,t);const i=new Uint8Array(e.length+(nt-e.length%nt));return i.set(e),i[e.length]=128,at(i,r)}(e,r,i))).subarray(-nt)}}const ct=N.getWebCrypto(),ut=N.getNodeCrypto(),ht=N.getNodeBuffer(),yt=16,lt=yt,pt=yt,gt=new Uint8Array(yt),dt=new Uint8Array(yt);dt[yt-1]=1;const ft=new Uint8Array(yt);async function mt(e){const t=await ot(e);return function(e,r){return t(N.concatUint8Array([e,r]))}}async function wt(e){if(N.getNodeCrypto())return async function(t,r){const i=new ut.createCipheriv("aes-"+8*e.length+"-ctr",e,r),n=ht.concat([i.update(t),i.final()]);return new Uint8Array(n)};if(N.getWebCrypto())try{const t=await ct.importKey("raw",e,{name:"AES-CTR",length:8*e.length},!1,["encrypt"]);return async function(e,r){const i=await ct.encrypt({name:"AES-CTR",counter:r,length:8*yt},t,e);return new Uint8Array(i)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;N.printDebugError("Browser did not support operation: "+t.message)}return async function(t,r){return et.encrypt(t,e,r)}}async function bt(e,t){if(e!==M.symmetric.aes128&&e!==M.symmetric.aes192&&e!==M.symmetric.aes256)throw Error("EAX mode supports only AES cipher");const[r,i]=await Promise.all([mt(t),wt(t)]);return{encrypt:async function(e,t,n){const[a,s]=await Promise.all([r(gt,t),r(dt,n)]),o=await i(e,a),c=await r(ft,o);for(let e=0;e<pt;e++)c[e]^=s[e]^a[e];return N.concatUint8Array([o,c])},decrypt:async function(e,t,n){if(e.length<pt)throw Error("Invalid EAX ciphertext");const a=e.subarray(0,-pt),s=e.subarray(-pt),[o,c,u]=await Promise.all([r(gt,t),r(dt,n),r(ft,a)]),h=u;for(let e=0;e<pt;e++)h[e]^=c[e]^o[e];if(!N.equalsUint8Array(s,h))throw Error("Authentication tag mismatch");return await i(a,o)}}}ft[yt-1]=2,bt.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[8+e]^=t[e];return r},bt.blockLength=yt,bt.ivLength=lt,bt.tagLength=pt;const kt=16,vt=15,At=16;function Kt(e){let t=0;for(let r=1;0==(e&r);r<<=1)t++;return t}function Et(e,t){for(let r=0;r<e.length;r++)e[r]^=t[r];return e}function St(e,t){return Et(e.slice(),t)}const Pt=new Uint8Array(kt),Ut=new Uint8Array([1]);async function Dt(e,t){let r,i,n,a=0;function s(e,t,i,s){const o=t.length/kt|0;!function(e,t){const r=N.nbits(Math.max(e.length,t.length)/kt|0)-1;for(let e=a+1;e<=r;e++)n[e]=N.double(n[e-1]);a=r}(t,s);const c=N.concatUint8Array([Pt.subarray(0,vt-i.length),Ut,i]),u=63&c[kt-1];c[kt-1]&=192;const h=r(c),y=N.concatUint8Array([h,St(h.subarray(0,8),h.subarray(1,9))]),l=N.shiftRight(y.subarray(0+(u>>3),17+(u>>3)),8-(7&u)).subarray(1),p=new Uint8Array(kt),g=new Uint8Array(t.length+At);let d,f=0;for(d=0;d<o;d++)Et(l,n[Kt(d+1)]),g.set(Et(e(St(l,t)),l),f),Et(p,e===r?t:g.subarray(f)),t=t.subarray(kt),f+=kt;if(t.length){Et(l,n.x);const i=r(l);g.set(St(t,i),f);const a=new Uint8Array(kt);a.set(e===r?t:g.subarray(f,-At),0),a[t.length]=128,Et(p,a),f+=t.length}const m=Et(r(Et(Et(p,l),n.$)),function(e){if(!e.length)return Pt;const t=e.length/kt|0,i=new Uint8Array(kt),a=new Uint8Array(kt);for(let s=0;s<t;s++)Et(i,n[Kt(s+1)]),Et(a,r(St(i,e))),e=e.subarray(kt);if(e.length){Et(i,n.x);const t=new Uint8Array(kt);t.set(e,0),t[e.length]=128,Et(t,i),Et(a,r(t))}return a}(s));return g.set(m,f),g}return function(e,t){const a=M.read(M.symmetric,e),s=new De[a](t);r=s.encrypt.bind(s),i=s.decrypt.bind(s);const o=r(Pt),c=N.double(o);n=[],n[0]=N.double(c),n.x=o,n.$=c}(e,t),{encrypt:async function(e,t,i){return s(r,e,t,i)},decrypt:async function(e,t,r){if(e.length<At)throw Error("Invalid OCB ciphertext");const n=e.subarray(-At);e=e.subarray(0,-At);const a=s(i,e,t,r);if(N.equalsUint8Array(n,a.subarray(-At)))return a.subarray(0,-At);throw Error("Authentication tag mismatch")}}}Dt.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[7+e]^=t[e];return r},Dt.blockLength=kt,Dt.ivLength=vt,Dt.tagLength=At;const Ct=68719476704;class xt{static encrypt(e,t,r,i,n){return new xt(t,r,i,n).encrypt(e)}static decrypt(e,t,r,i,n){return new xt(t,r,i,n).decrypt(e)}constructor(e,t,r,i=16,n){this.tagSize=i,this.gamma0=0,this.counter=1,this.aes=n||new ue(e,void 0,!1,"CTR");let{asm:a,heap:s}=this.aes.acquire_asm();if(a.gcm_init(),this.tagSize<4||this.tagSize>16)throw new ae("illegal tagSize value");const o=t.length||0,c=new Uint8Array(16);12!==o?(this._gcm_mac_process(t),s[0]=0,s[1]=0,s[2]=0,s[3]=0,s[4]=0,s[5]=0,s[6]=0,s[7]=0,s[8]=0,s[9]=0,s[10]=0,s[11]=o>>>29,s[12]=o>>>21&255,s[13]=o>>>13&255,s[14]=o>>>5&255,s[15]=o<<3&255,a.mac(ee.MAC.GCM,ee.HEAP_DATA,16),a.get_iv(ee.HEAP_DATA),a.set_iv(0,0,0,0),c.set(s.subarray(0,16))):(c.set(t),c[15]=1);const u=new DataView(c.buffer);if(this.gamma0=u.getUint32(12),a.set_nonce(u.getUint32(0),u.getUint32(4),u.getUint32(8),0),a.set_mask(0,0,0,4294967295),void 0!==r){if(r.length>Ct)throw new ae("illegal adata length");r.length?(this.adata=r,this._gcm_mac_process(r)):this.adata=void 0}else this.adata=void 0;if(this.counter<1||this.counter>4294967295)throw new RangeError("counter must be a positive 32-bit integer");a.set_counter(0,0,0,this.gamma0+this.counter|0)}encrypt(e){return this.AES_GCM_encrypt(e)}decrypt(e){return this.AES_GCM_decrypt(e)}AES_GCM_Encrypt_process(e){let t=0,r=e.length||0,{asm:i,heap:n}=this.aes.acquire_asm(),a=this.counter,s=this.aes.pos,o=this.aes.len,c=0,u=o+r&-16,h=0;if((a-1<<4)+o+r>Ct)throw new RangeError("counter overflow");const y=new Uint8Array(u);for(;r>0;)h=re(n,s+o,e,t,r),o+=h,t+=h,r-=h,h=i.cipher(ee.ENC.CTR,ee.HEAP_DATA+s,o),h=i.mac(ee.MAC.GCM,ee.HEAP_DATA+s,h),h&&y.set(n.subarray(s,s+h),c),a+=h>>>4,c+=h,h<o?(s+=h,o-=h):(s=0,o=0);return this.counter=a,this.aes.pos=s,this.aes.len=o,y}AES_GCM_Encrypt_finish(){let{asm:e,heap:t}=this.aes.acquire_asm(),r=this.counter,i=this.tagSize,n=this.adata,a=this.aes.pos,s=this.aes.len;const o=new Uint8Array(s+i);e.cipher(ee.ENC.CTR,ee.HEAP_DATA+a,s+15&-16),s&&o.set(t.subarray(a,a+s));let c=s;for(;15&c;c++)t[a+c]=0;e.mac(ee.MAC.GCM,ee.HEAP_DATA+a,c);const u=void 0!==n?n.length:0,h=(r-1<<4)+s;return t[0]=0,t[1]=0,t[2]=0,t[3]=u>>>29,t[4]=u>>>21,t[5]=u>>>13&255,t[6]=u>>>5&255,t[7]=u<<3&255,t[8]=t[9]=t[10]=0,t[11]=h>>>29,t[12]=h>>>21&255,t[13]=h>>>13&255,t[14]=h>>>5&255,t[15]=h<<3&255,e.mac(ee.MAC.GCM,ee.HEAP_DATA,16),e.get_iv(ee.HEAP_DATA),e.set_counter(0,0,0,this.gamma0),e.cipher(ee.ENC.CTR,ee.HEAP_DATA,16),o.set(t.subarray(0,i),s),this.counter=1,this.aes.pos=0,this.aes.len=0,o}AES_GCM_Decrypt_process(e){let t=0,r=e.length||0,{asm:i,heap:n}=this.aes.acquire_asm(),a=this.counter,s=this.tagSize,o=this.aes.pos,c=this.aes.len,u=0,h=c+r>s?c+r-s&-16:0,y=c+r-h,l=0;if((a-1<<4)+c+r>Ct)throw new RangeError("counter overflow");const p=new Uint8Array(h);for(;r>y;)l=re(n,o+c,e,t,r-y),c+=l,t+=l,r-=l,l=i.mac(ee.MAC.GCM,ee.HEAP_DATA+o,l),l=i.cipher(ee.DEC.CTR,ee.HEAP_DATA+o,l),l&&p.set(n.subarray(o,o+l),u),a+=l>>>4,u+=l,o=0,c=0;return r>0&&(c+=re(n,0,e,t,r)),this.counter=a,this.aes.pos=o,this.aes.len=c,p}AES_GCM_Decrypt_finish(){let{asm:e,heap:t}=this.aes.acquire_asm(),r=this.tagSize,i=this.adata,n=this.counter,a=this.aes.pos,s=this.aes.len,o=s-r;if(s<r)throw new ne("authentication tag not found");const c=new Uint8Array(o),u=new Uint8Array(t.subarray(a+o,a+s));let h=o;for(;15&h;h++)t[a+h]=0;e.mac(ee.MAC.GCM,ee.HEAP_DATA+a,h),e.cipher(ee.DEC.CTR,ee.HEAP_DATA+a,h),o&&c.set(t.subarray(a,a+o));const y=void 0!==i?i.length:0,l=(n-1<<4)+s-r;t[0]=0,t[1]=0,t[2]=0,t[3]=y>>>29,t[4]=y>>>21,t[5]=y>>>13&255,t[6]=y>>>5&255,t[7]=y<<3&255,t[8]=t[9]=t[10]=0,t[11]=l>>>29,t[12]=l>>>21&255,t[13]=l>>>13&255,t[14]=l>>>5&255,t[15]=l<<3&255,e.mac(ee.MAC.GCM,ee.HEAP_DATA,16),e.get_iv(ee.HEAP_DATA),e.set_counter(0,0,0,this.gamma0),e.cipher(ee.ENC.CTR,ee.HEAP_DATA,16);let p=0;for(let e=0;e<r;++e)p|=u[e]^t[e];if(p)throw new se("data integrity check failed");return this.counter=1,this.aes.pos=0,this.aes.len=0,c}AES_GCM_decrypt(e){const t=this.AES_GCM_Decrypt_process(e),r=this.AES_GCM_Decrypt_finish(),i=new Uint8Array(t.length+r.length);return t.length&&i.set(t),r.length&&i.set(r,t.length),i}AES_GCM_encrypt(e){const t=this.AES_GCM_Encrypt_process(e),r=this.AES_GCM_Encrypt_finish(),i=new Uint8Array(t.length+r.length);return t.length&&i.set(t),r.length&&i.set(r,t.length),i}_gcm_mac_process(e){let{asm:t,heap:r}=this.aes.acquire_asm(),i=0,n=e.length||0,a=0;for(;n>0;){for(a=re(r,0,e,i,n),i+=a,n-=a;15&a;)r[a++]=0;t.mac(ee.MAC.GCM,ee.HEAP_DATA,a)}}}const Tt=N.getWebCrypto(),It=N.getNodeCrypto(),_t=N.getNodeBuffer(),Bt=16,Rt="AES-GCM";async function Mt(e,t){if(e!==M.symmetric.aes128&&e!==M.symmetric.aes192&&e!==M.symmetric.aes256)throw Error("GCM mode supports only AES cipher");if(N.getNodeCrypto())return{encrypt:async function(e,r,i=new Uint8Array){const n=new It.createCipheriv("aes-"+8*t.length+"-gcm",t,r);n.setAAD(i);const a=_t.concat([n.update(e),n.final(),n.getAuthTag()]);return new Uint8Array(a)},decrypt:async function(e,r,i=new Uint8Array){const n=new It.createDecipheriv("aes-"+8*t.length+"-gcm",t,r);n.setAAD(i),n.setAuthTag(e.slice(e.length-Bt,e.length));const a=_t.concat([n.update(e.slice(0,e.length-Bt)),n.final()]);return new Uint8Array(a)}};if(N.getWebCrypto())try{const e=await Tt.importKey("raw",t,{name:Rt},!1,["encrypt","decrypt"]),r=navigator.userAgent.match(/Version\/13\.\d(\.\d)* Safari/)||navigator.userAgent.match(/Version\/(13|14)\.\d(\.\d)* Mobile\/\S* Safari/);return{encrypt:async function(i,n,a=new Uint8Array){if(r&&!i.length)return xt.encrypt(i,t,n,a);const s=await Tt.encrypt({name:Rt,iv:n,additionalData:a,tagLength:8*Bt},e,i);return new Uint8Array(s)},decrypt:async function(i,n,a=new Uint8Array){if(r&&i.length===Bt)return xt.decrypt(i,t,n,a);try{const t=await Tt.decrypt({name:Rt,iv:n,additionalData:a,tagLength:8*Bt},e,i);return new Uint8Array(t)}catch(e){if("OperationError"===e.name)throw Error("Authentication tag mismatch")}}}}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;N.printDebugError("Browser did not support operation: "+e.message)}return{encrypt:async function(e,r,i){return xt.encrypt(e,t,r,i)},decrypt:async function(e,r,i){return xt.decrypt(e,t,r,i)}}}Mt.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[4+e]^=t[e];return r},Mt.blockLength=16,Mt.ivLength=12,Mt.tagLength=Bt;var Lt={cfb:Je,gcm:Mt,experimentalGCM:Mt,eax:bt,ocb:Dt};const Ft=N.getNodeCrypto();function zt(e){const t=new Uint8Array(e);if(Ft){const e=Ft.randomBytes(t.length);t.set(e)}else{if("undefined"==typeof crypto||!crypto.getRandomValues)throw Error("No secure random number generator available.");crypto.getRandomValues(t)}return t}async function Nt(e,t){const r=await N.getBigInteger();if(t.lt(e))throw Error("Illegal parameter value: max <= min");const i=t.sub(e);return new r(zt(i.byteLength()+8)).mod(i).add(e)}var Ot=/*#__PURE__*/Object.freeze({__proto__:null,getRandomBigInteger:Nt,getRandomBytes:zt});async function Ht(e,t,r){const i=await N.getBigInteger(),n=new i(1),a=n.leftShift(new i(e-1)),s=new i(30),o=[1,6,5,4,3,2,1,4,3,2,1,2,1,4,3,2,1,2,1,4,3,2,1,6,5,4,3,2,1,2],c=await Nt(a,a.leftShift(n));let u=c.mod(s).toNumber();do{c.iadd(new i(o[u])),u=(u+o[u])%o.length,c.bitLength()>e&&(c.imod(a.leftShift(n)).iadd(a),u=c.mod(s).toNumber())}while(!await jt(c,t,r));return c}async function jt(e,t,r){return!(t&&!e.dec().gcd(t).isOne())&&(!!await async function(e){const t=await N.getBigInteger();return qt.every((r=>0!==e.mod(new t(r))))}(e)&&(!!await async function(e,t){const r=await N.getBigInteger();return(t=t||new r(2)).modExp(e.dec(),e).isOne()}(e)&&!!await async function(e,t,r){const i=await N.getBigInteger(),n=e.bitLength();t||(t=Math.max(1,n/48|0));const a=e.dec();let s=0;for(;!a.getBit(s);)s++;const o=e.rightShift(new i(s));for(;t>0;t--){let t,n=(r?r():await Nt(new i(2),a)).modExp(o,e);if(!n.isOne()&&!n.equal(a)){for(t=1;t<s;t++){if(n=n.mul(n).mod(e),n.isOne())return!1;if(n.equal(a))break}if(t===s)return!1}}return!0}(e,r)))}const qt=[7,11,13,17,19,23,29,31,37,41,43,47,53,59,61,67,71,73,79,83,89,97,101,103,107,109,113,127,131,137,139,149,151,157,163,167,173,179,181,191,193,197,199,211,223,227,229,233,239,241,251,257,263,269,271,277,281,283,293,307,311,313,317,331,337,347,349,353,359,367,373,379,383,389,397,401,409,419,421,431,433,439,443,449,457,461,463,467,479,487,491,499,503,509,521,523,541,547,557,563,569,571,577,587,593,599,601,607,613,617,619,631,641,643,647,653,659,661,673,677,683,691,701,709,719,727,733,739,743,751,757,761,769,773,787,797,809,811,821,823,827,829,839,853,857,859,863,877,881,883,887,907,911,919,929,937,941,947,953,967,971,977,983,991,997,1009,1013,1019,1021,1031,1033,1039,1049,1051,1061,1063,1069,1087,1091,1093,1097,1103,1109,1117,1123,1129,1151,1153,1163,1171,1181,1187,1193,1201,1213,1217,1223,1229,1231,1237,1249,1259,1277,1279,1283,1289,1291,1297,1301,1303,1307,1319,1321,1327,1361,1367,1373,1381,1399,1409,1423,1427,1429,1433,1439,1447,1451,1453,1459,1471,1481,1483,1487,1489,1493,1499,1511,1523,1531,1543,1549,1553,1559,1567,1571,1579,1583,1597,1601,1607,1609,1613,1619,1621,1627,1637,1657,1663,1667,1669,1693,1697,1699,1709,1721,1723,1733,1741,1747,1753,1759,1777,1783,1787,1789,1801,1811,1823,1831,1847,1861,1867,1871,1873,1877,1879,1889,1901,1907,1913,1931,1933,1949,1951,1973,1979,1987,1993,1997,1999,2003,2011,2017,2027,2029,2039,2053,2063,2069,2081,2083,2087,2089,2099,2111,2113,2129,2131,2137,2141,2143,2153,2161,2179,2203,2207,2213,2221,2237,2239,2243,2251,2267,2269,2273,2281,2287,2293,2297,2309,2311,2333,2339,2341,2347,2351,2357,2371,2377,2381,2383,2389,2393,2399,2411,2417,2423,2437,2441,2447,2459,2467,2473,2477,2503,2521,2531,2539,2543,2549,2551,2557,2579,2591,2593,2609,2617,2621,2633,2647,2657,2659,2663,2671,2677,2683,2687,2689,2693,2699,2707,2711,2713,2719,2729,2731,2741,2749,2753,2767,2777,2789,2791,2797,2801,2803,2819,2833,2837,2843,2851,2857,2861,2879,2887,2897,2903,2909,2917,2927,2939,2953,2957,2963,2969,2971,2999,3001,3011,3019,3023,3037,3041,3049,3061,3067,3079,3083,3089,3109,3119,3121,3137,3163,3167,3169,3181,3187,3191,3203,3209,3217,3221,3229,3251,3253,3257,3259,3271,3299,3301,3307,3313,3319,3323,3329,3331,3343,3347,3359,3361,3371,3373,3389,3391,3407,3413,3433,3449,3457,3461,3463,3467,3469,3491,3499,3511,3517,3527,3529,3533,3539,3541,3547,3557,3559,3571,3581,3583,3593,3607,3613,3617,3623,3631,3637,3643,3659,3671,3673,3677,3691,3697,3701,3709,3719,3727,3733,3739,3761,3767,3769,3779,3793,3797,3803,3821,3823,3833,3847,3851,3853,3863,3877,3881,3889,3907,3911,3917,3919,3923,3929,3931,3943,3947,3967,3989,4001,4003,4007,4013,4019,4021,4027,4049,4051,4057,4073,4079,4091,4093,4099,4111,4127,4129,4133,4139,4153,4157,4159,4177,4201,4211,4217,4219,4229,4231,4241,4243,4253,4259,4261,4271,4273,4283,4289,4297,4327,4337,4339,4349,4357,4363,4373,4391,4397,4409,4421,4423,4441,4447,4451,4457,4463,4481,4483,4493,4507,4513,4517,4519,4523,4547,4549,4561,4567,4583,4591,4597,4603,4621,4637,4639,4643,4649,4651,4657,4663,4673,4679,4691,4703,4721,4723,4729,4733,4751,4759,4783,4787,4789,4793,4799,4801,4813,4817,4831,4861,4871,4877,4889,4903,4909,4919,4931,4933,4937,4943,4951,4957,4967,4969,4973,4987,4993,4999];const Gt=[];function Vt(e,t){const r=e.length;if(r>t-11)throw Error("Message too long");const i=function(e){const t=new Uint8Array(e);let r=0;for(;r<e;){const i=zt(e-r);for(let e=0;e<i.length;e++)0!==i[e]&&(t[r++]=i[e])}return t}(t-r-3),n=new Uint8Array(t);return n[1]=2,n.set(i,2),n.set(e,t-r),n}function Wt(e,t){let r=2,i=1;for(let t=r;t<e.length;t++)i&=0!==e[t],r+=i;const n=r-2,a=e.subarray(r+1),s=0===e[0]&2===e[1]&n>=8&!i;if(t)return N.selectUint8Array(s,a,t);if(s)return a;throw Error("Decryption error")}async function $t(e,t,r){let i;if(t.length!==qe.getHashByteLength(e))throw Error("Invalid hash length");const n=new Uint8Array(Gt[e].length);for(i=0;i<Gt[e].length;i++)n[i]=Gt[e][i];const a=n.length+t.length;if(r<a+11)throw Error("Intended encoded message length too short");const s=new Uint8Array(r-a-3).fill(255),o=new Uint8Array(r);return o[1]=1,o.set(s,2),o.set(n,r-a),o.set(t,r-t.length),o}Gt[1]=[48,32,48,12,6,8,42,134,72,134,247,13,2,5,5,0,4,16],Gt[2]=[48,33,48,9,6,5,43,14,3,2,26,5,0,4,20],Gt[3]=[48,33,48,9,6,5,43,36,3,2,1,5,0,4,20],Gt[8]=[48,49,48,13,6,9,96,134,72,1,101,3,4,2,1,5,0,4,32],Gt[9]=[48,65,48,13,6,9,96,134,72,1,101,3,4,2,2,5,0,4,48],Gt[10]=[48,81,48,13,6,9,96,134,72,1,101,3,4,2,3,5,0,4,64],Gt[11]=[48,45,48,13,6,9,96,134,72,1,101,3,4,2,4,5,0,4,28];var Xt=/*#__PURE__*/Object.freeze({__proto__:null,emeDecode:Wt,emeEncode:Vt,emsaEncode:$t});const Zt=N.getWebCrypto(),Yt=N.getNodeCrypto(),Qt=Yt?N.nodeRequire("asn1.js"):void 0,Jt=Yt?Qt.define("RSAPrivateKey",(function(){this.seq().obj(this.key("version").int(),this.key("modulus").int(),this.key("publicExponent").int(),this.key("privateExponent").int(),this.key("prime1").int(),this.key("prime2").int(),this.key("exponent1").int(),this.key("exponent2").int(),this.key("coefficient").int())})):void 0,er=Yt?Qt.define("RSAPubliceKey",(function(){this.seq().obj(this.key("modulus").int(),this.key("publicExponent").int())})):void 0;var tr=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i,n,a,s,o){return N.getNodeCrypto()?async function(e,t,r,i,n,a,s,o){const{default:c}=await import("./bn.min.mjs").then((function(e){return e.b})),u=new c(n),h=new c(a),y=new c(i),l=y.mod(h.subn(1)),p=y.mod(u.subn(1)),g={version:0,modulus:new c(t),publicExponent:new c(r),privateExponent:new c(i),prime1:new c(a),prime2:new c(n),exponent1:l,exponent2:p,coefficient:new c(s)};let d;if(void 0!==Yt.createPrivateKey){d={key:Jt.encode(g,"der"),format:"der",type:"pkcs1",padding:Yt.constants.RSA_PKCS1_PADDING}}else{d={key:Jt.encode(g,"pem",{label:"RSA PRIVATE KEY"}),padding:Yt.constants.RSA_PKCS1_PADDING}}try{return new Uint8Array(Yt.privateDecrypt(d,e))}catch(e){if(o)return o;throw Error("Decryption error")}}(e,t,r,i,n,a,s,o):async function(e,t,r,i,n,a,s,o){const c=await N.getBigInteger();if(e=new c(e),t=new c(t),r=new c(r),i=new c(i),n=new c(n),a=new c(a),s=new c(s),e.gte(t))throw Error("Data too large.");const u=i.mod(a.dec()),h=i.mod(n.dec()),y=(await Nt(new c(2),t)).mod(t),l=y.modInv(t).modExp(r,t);e=e.mul(l).mod(t);const p=e.modExp(h,n),g=e.modExp(u,a),d=s.mul(g.sub(p)).mod(a);let f=d.mul(n).add(p);return f=f.mul(y).mod(t),Wt(f.toUint8Array("be",t.byteLength()),o)}(e,t,r,i,n,a,s,o)},encrypt:async function(e,t,r){return N.getNodeCrypto()?async function(e,t,r){const{default:i}=await import("./bn.min.mjs").then((function(e){return e.b})),n={modulus:new i(t),publicExponent:new i(r)};let a;if(void 0!==Yt.createPrivateKey){a={key:er.encode(n,"der"),format:"der",type:"pkcs1",padding:Yt.constants.RSA_PKCS1_PADDING}}else{a={key:er.encode(n,"pem",{label:"RSA PUBLIC KEY"}),padding:Yt.constants.RSA_PKCS1_PADDING}}return new Uint8Array(Yt.publicEncrypt(a,e))}(e,t,r):async function(e,t,r){const i=await N.getBigInteger();if(t=new i(t),e=new i(Vt(e,t.byteLength())),r=new i(r),e.gte(t))throw Error("Message size cannot exceed modulus size");return e.modExp(r,t).toUint8Array("be",t.byteLength())}(e,t,r)},generate:async function(e,t){if(t=new(await N.getBigInteger())(t),N.getWebCrypto()){const r={name:"RSASSA-PKCS1-v1_5",modulusLength:e,publicExponent:t.toUint8Array(),hash:{name:"SHA-1"}},i=await Zt.generateKey(r,!0,["sign","verify"]),n=await Zt.exportKey("jwk",i.privateKey);return{n:V(n.n),e:t.toUint8Array(),d:V(n.d),p:V(n.q),q:V(n.p),u:V(n.qi)}}if(N.getNodeCrypto()&&Yt.generateKeyPair&&Jt){const r={modulusLength:e,publicExponent:t.toNumber(),publicKeyEncoding:{type:"pkcs1",format:"der"},privateKeyEncoding:{type:"pkcs1",format:"der"}},i=await new Promise(((e,t)=>{Yt.generateKeyPair("rsa",r,((r,i,n)=>{r?t(r):e(Jt.decode(n,"der"))}))}));return{n:i.modulus.toArrayLike(Uint8Array),e:i.publicExponent.toArrayLike(Uint8Array),d:i.privateExponent.toArrayLike(Uint8Array),p:i.prime2.toArrayLike(Uint8Array),q:i.prime1.toArrayLike(Uint8Array),u:i.coefficient.toArrayLike(Uint8Array)}}let r,i,n;do{i=await Ht(e-(e>>1),t,40),r=await Ht(e>>1,t,40),n=r.mul(i)}while(n.bitLength()!==e);const a=r.dec().imul(i.dec());return i.lt(r)&&([r,i]=[i,r]),{n:n.toUint8Array(),e:t.toUint8Array(),d:t.modInv(a).toUint8Array(),p:r.toUint8Array(),q:i.toUint8Array(),u:r.modInv(i).toUint8Array()}},sign:async function(e,t,r,i,n,a,s,o,c){if(t&&!N.isStream(t))if(N.getWebCrypto())try{return await async function(e,t,r,i,n,a,s,o){const c=await async function(e,t,r,i,n,a){const s=await N.getBigInteger(),o=new s(i),c=new s(n),u=new s(r);let h=u.mod(c.dec()),y=u.mod(o.dec());return y=y.toUint8Array(),h=h.toUint8Array(),{kty:"RSA",n:W(e,!0),e:W(t,!0),d:W(r,!0),p:W(n,!0),q:W(i,!0),dp:W(h,!0),dq:W(y,!0),qi:W(a,!0),ext:!0}}(r,i,n,a,s,o),u={name:"RSASSA-PKCS1-v1_5",hash:{name:e}},h=await Zt.importKey("jwk",c,u,!1,["sign"]);return new Uint8Array(await Zt.sign("RSASSA-PKCS1-v1_5",h,t))}(M.read(M.webHash,e),t,r,i,n,a,s,o)}catch(e){N.printDebugError(e)}else if(N.getNodeCrypto())return async function(e,t,r,i,n,a,s,o){const{default:c}=await import("./bn.min.mjs").then((function(e){return e.b})),u=new c(a),h=new c(s),y=new c(n),l=y.mod(h.subn(1)),p=y.mod(u.subn(1)),g=Yt.createSign(M.read(M.hash,e));g.write(t),g.end();const d={version:0,modulus:new c(r),publicExponent:new c(i),privateExponent:new c(n),prime1:new c(s),prime2:new c(a),exponent1:l,exponent2:p,coefficient:new c(o)};if(void 0!==Yt.createPrivateKey){const e=Jt.encode(d,"der");return new Uint8Array(g.sign({key:e,format:"der",type:"pkcs1"}))}const f=Jt.encode(d,"pem",{label:"RSA PRIVATE KEY"});return new Uint8Array(g.sign(f))}(e,t,r,i,n,a,s,o);return async function(e,t,r,i){const n=await N.getBigInteger();t=new n(t);const a=new n(await $t(e,i,t.byteLength()));if(r=new n(r),a.gte(t))throw Error("Message size cannot exceed modulus size");return a.modExp(r,t).toUint8Array("be",t.byteLength())}(e,r,n,c)},validateParams:async function(e,t,r,i,n,a){const s=await N.getBigInteger();if(e=new s(e),i=new s(i),n=new s(n),!i.mul(n).equal(e))return!1;const o=new s(2);if(a=new s(a),!i.mul(a).mod(n).isOne())return!1;t=new s(t),r=new s(r);const c=new s(Math.floor(e.bitLength()/3)),u=await Nt(o,o.leftShift(c)),h=u.mul(r).mul(t);return!(!h.mod(i.dec()).equal(u)||!h.mod(n.dec()).equal(u))},verify:async function(e,t,r,i,n,a){if(t&&!N.isStream(t))if(N.getWebCrypto())try{return await async function(e,t,r,i,n){const a=function(e,t){return{kty:"RSA",n:W(e,!0),e:W(t,!0),ext:!0}}(i,n),s=await Zt.importKey("jwk",a,{name:"RSASSA-PKCS1-v1_5",hash:{name:e}},!1,["verify"]);return Zt.verify("RSASSA-PKCS1-v1_5",s,r,t)}(M.read(M.webHash,e),t,r,i,n)}catch(e){N.printDebugError(e)}else if(N.getNodeCrypto())return async function(e,t,r,i,n){const{default:a}=await import("./bn.min.mjs").then((function(e){return e.b})),s=Yt.createVerify(M.read(M.hash,e));s.write(t),s.end();const o={modulus:new a(i),publicExponent:new a(n)};let c;if(void 0!==Yt.createPrivateKey){c={key:er.encode(o,"der"),format:"der",type:"pkcs1"}}else c=er.encode(o,"pem",{label:"RSA PUBLIC KEY"});try{return await s.verify(c,r)}catch(e){return!1}}(e,t,r,i,n);return async function(e,t,r,i,n){const a=await N.getBigInteger();if(r=new a(r),t=new a(t),i=new a(i),t.gte(r))throw Error("Signature size cannot exceed modulus size");const s=t.modExp(i,r).toUint8Array("be",r.byteLength()),o=await $t(e,n,r.byteLength());return N.equalsUint8Array(s,o)}(e,r,i,n,a)}});var rr=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i,n){const a=await N.getBigInteger();return e=new a(e),t=new a(t),r=new a(r),i=new a(i),Wt(e.modExp(i,r).modInv(r).imul(t).imod(r).toUint8Array("be",r.byteLength()),n)},encrypt:async function(e,t,r,i){const n=await N.getBigInteger();t=new n(t),r=new n(r),i=new n(i);const a=new n(Vt(e,t.byteLength())),s=await Nt(new n(1),t.dec());return{c1:r.modExp(s,t).toUint8Array(),c2:i.modExp(s,t).imul(a).imod(t).toUint8Array()}},validateParams:async function(e,t,r,i){const n=await N.getBigInteger();e=new n(e),t=new n(t),r=new n(r);const a=new n(1);if(t.lte(a)||t.gte(e))return!1;const s=new n(e.bitLength()),o=new n(1023);if(s.lt(o))return!1;if(!t.modExp(e.dec(),e).isOne())return!1;let c=t;const u=new n(1),h=new n(2).leftShift(new n(17));for(;u.lt(h);){if(c=c.mul(t).imod(e),c.isOne())return!1;u.iinc()}i=new n(i);const y=new n(2),l=await Nt(y.leftShift(s.dec()),y.leftShift(s)),p=e.dec().imul(l).iadd(i);return!!r.equal(t.modExp(p,e))}});const ir="object"==typeof e&&"crypto"in e?e.crypto:void 0,nr={};var ar=function(e){var t,r=new Float64Array(16);if(e)for(t=0;t<e.length;t++)r[t]=e[t];return r},sr=function(){throw Error("no PRNG")},or=new Uint8Array(32);or[0]=9;var cr=ar(),ur=ar([1]),hr=ar([56129,1]),yr=ar([30883,4953,19914,30187,55467,16705,2637,112,59544,30585,16505,36039,65139,11119,27886,20995]),lr=ar([61785,9906,39828,60374,45398,33411,5274,224,53552,61171,33010,6542,64743,22239,55772,9222]),pr=ar([54554,36645,11616,51542,42930,38181,51040,26924,56412,64982,57905,49316,21502,52590,14035,8553]),gr=ar([26200,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214]),dr=ar([41136,18958,6951,50414,58488,44335,6150,12099,55207,15867,153,11085,57099,20417,9344,11139]);function fr(e,t,r,i){e[t]=r>>24&255,e[t+1]=r>>16&255,e[t+2]=r>>8&255,e[t+3]=255&r,e[t+4]=i>>24&255,e[t+5]=i>>16&255,e[t+6]=i>>8&255,e[t+7]=255&i}function mr(e,t,r,i){return function(e,t,r,i,n){var a,s=0;for(a=0;a<n;a++)s|=e[t+a]^r[i+a];return(1&s-1>>>8)-1}(e,t,r,i,32)}function wr(e,t){var r;for(r=0;r<16;r++)e[r]=0|t[r]}function br(e){var t,r,i=1;for(t=0;t<16;t++)r=e[t]+i+65535,i=Math.floor(r/65536),e[t]=r-65536*i;e[0]+=i-1+37*(i-1)}function kr(e,t,r){for(var i,n=~(r-1),a=0;a<16;a++)i=n&(e[a]^t[a]),e[a]^=i,t[a]^=i}function vr(e,t){var r,i,n,a=ar(),s=ar();for(r=0;r<16;r++)s[r]=t[r];for(br(s),br(s),br(s),i=0;i<2;i++){for(a[0]=s[0]-65517,r=1;r<15;r++)a[r]=s[r]-65535-(a[r-1]>>16&1),a[r-1]&=65535;a[15]=s[15]-32767-(a[14]>>16&1),n=a[15]>>16&1,a[14]&=65535,kr(s,a,1-n)}for(r=0;r<16;r++)e[2*r]=255&s[r],e[2*r+1]=s[r]>>8}function Ar(e,t){var r=new Uint8Array(32),i=new Uint8Array(32);return vr(r,e),vr(i,t),mr(r,0,i,0)}function Kr(e){var t=new Uint8Array(32);return vr(t,e),1&t[0]}function Er(e,t){var r;for(r=0;r<16;r++)e[r]=t[2*r]+(t[2*r+1]<<8);e[15]&=32767}function Sr(e,t,r){for(var i=0;i<16;i++)e[i]=t[i]+r[i]}function Pr(e,t,r){for(var i=0;i<16;i++)e[i]=t[i]-r[i]}function Ur(e,t,r){var i,n,a=0,s=0,o=0,c=0,u=0,h=0,y=0,l=0,p=0,g=0,d=0,f=0,m=0,w=0,b=0,k=0,v=0,A=0,K=0,E=0,S=0,P=0,U=0,D=0,C=0,x=0,T=0,I=0,_=0,B=0,R=0,M=r[0],L=r[1],F=r[2],z=r[3],N=r[4],O=r[5],H=r[6],j=r[7],q=r[8],G=r[9],V=r[10],W=r[11],$=r[12],X=r[13],Z=r[14],Y=r[15];a+=(i=t[0])*M,s+=i*L,o+=i*F,c+=i*z,u+=i*N,h+=i*O,y+=i*H,l+=i*j,p+=i*q,g+=i*G,d+=i*V,f+=i*W,m+=i*$,w+=i*X,b+=i*Z,k+=i*Y,s+=(i=t[1])*M,o+=i*L,c+=i*F,u+=i*z,h+=i*N,y+=i*O,l+=i*H,p+=i*j,g+=i*q,d+=i*G,f+=i*V,m+=i*W,w+=i*$,b+=i*X,k+=i*Z,v+=i*Y,o+=(i=t[2])*M,c+=i*L,u+=i*F,h+=i*z,y+=i*N,l+=i*O,p+=i*H,g+=i*j,d+=i*q,f+=i*G,m+=i*V,w+=i*W,b+=i*$,k+=i*X,v+=i*Z,A+=i*Y,c+=(i=t[3])*M,u+=i*L,h+=i*F,y+=i*z,l+=i*N,p+=i*O,g+=i*H,d+=i*j,f+=i*q,m+=i*G,w+=i*V,b+=i*W,k+=i*$,v+=i*X,A+=i*Z,K+=i*Y,u+=(i=t[4])*M,h+=i*L,y+=i*F,l+=i*z,p+=i*N,g+=i*O,d+=i*H,f+=i*j,m+=i*q,w+=i*G,b+=i*V,k+=i*W,v+=i*$,A+=i*X,K+=i*Z,E+=i*Y,h+=(i=t[5])*M,y+=i*L,l+=i*F,p+=i*z,g+=i*N,d+=i*O,f+=i*H,m+=i*j,w+=i*q,b+=i*G,k+=i*V,v+=i*W,A+=i*$,K+=i*X,E+=i*Z,S+=i*Y,y+=(i=t[6])*M,l+=i*L,p+=i*F,g+=i*z,d+=i*N,f+=i*O,m+=i*H,w+=i*j,b+=i*q,k+=i*G,v+=i*V,A+=i*W,K+=i*$,E+=i*X,S+=i*Z,P+=i*Y,l+=(i=t[7])*M,p+=i*L,g+=i*F,d+=i*z,f+=i*N,m+=i*O,w+=i*H,b+=i*j,k+=i*q,v+=i*G,A+=i*V,K+=i*W,E+=i*$,S+=i*X,P+=i*Z,U+=i*Y,p+=(i=t[8])*M,g+=i*L,d+=i*F,f+=i*z,m+=i*N,w+=i*O,b+=i*H,k+=i*j,v+=i*q,A+=i*G,K+=i*V,E+=i*W,S+=i*$,P+=i*X,U+=i*Z,D+=i*Y,g+=(i=t[9])*M,d+=i*L,f+=i*F,m+=i*z,w+=i*N,b+=i*O,k+=i*H,v+=i*j,A+=i*q,K+=i*G,E+=i*V,S+=i*W,P+=i*$,U+=i*X,D+=i*Z,C+=i*Y,d+=(i=t[10])*M,f+=i*L,m+=i*F,w+=i*z,b+=i*N,k+=i*O,v+=i*H,A+=i*j,K+=i*q,E+=i*G,S+=i*V,P+=i*W,U+=i*$,D+=i*X,C+=i*Z,x+=i*Y,f+=(i=t[11])*M,m+=i*L,w+=i*F,b+=i*z,k+=i*N,v+=i*O,A+=i*H,K+=i*j,E+=i*q,S+=i*G,P+=i*V,U+=i*W,D+=i*$,C+=i*X,x+=i*Z,T+=i*Y,m+=(i=t[12])*M,w+=i*L,b+=i*F,k+=i*z,v+=i*N,A+=i*O,K+=i*H,E+=i*j,S+=i*q,P+=i*G,U+=i*V,D+=i*W,C+=i*$,x+=i*X,T+=i*Z,I+=i*Y,w+=(i=t[13])*M,b+=i*L,k+=i*F,v+=i*z,A+=i*N,K+=i*O,E+=i*H,S+=i*j,P+=i*q,U+=i*G,D+=i*V,C+=i*W,x+=i*$,T+=i*X,I+=i*Z,_+=i*Y,b+=(i=t[14])*M,k+=i*L,v+=i*F,A+=i*z,K+=i*N,E+=i*O,S+=i*H,P+=i*j,U+=i*q,D+=i*G,C+=i*V,x+=i*W,T+=i*$,I+=i*X,_+=i*Z,B+=i*Y,k+=(i=t[15])*M,s+=38*(A+=i*F),o+=38*(K+=i*z),c+=38*(E+=i*N),u+=38*(S+=i*O),h+=38*(P+=i*H),y+=38*(U+=i*j),l+=38*(D+=i*q),p+=38*(C+=i*G),g+=38*(x+=i*V),d+=38*(T+=i*W),f+=38*(I+=i*$),m+=38*(_+=i*X),w+=38*(B+=i*Z),b+=38*(R+=i*Y),a=(i=(a+=38*(v+=i*L))+(n=1)+65535)-65536*(n=Math.floor(i/65536)),s=(i=s+n+65535)-65536*(n=Math.floor(i/65536)),o=(i=o+n+65535)-65536*(n=Math.floor(i/65536)),c=(i=c+n+65535)-65536*(n=Math.floor(i/65536)),u=(i=u+n+65535)-65536*(n=Math.floor(i/65536)),h=(i=h+n+65535)-65536*(n=Math.floor(i/65536)),y=(i=y+n+65535)-65536*(n=Math.floor(i/65536)),l=(i=l+n+65535)-65536*(n=Math.floor(i/65536)),p=(i=p+n+65535)-65536*(n=Math.floor(i/65536)),g=(i=g+n+65535)-65536*(n=Math.floor(i/65536)),d=(i=d+n+65535)-65536*(n=Math.floor(i/65536)),f=(i=f+n+65535)-65536*(n=Math.floor(i/65536)),m=(i=m+n+65535)-65536*(n=Math.floor(i/65536)),w=(i=w+n+65535)-65536*(n=Math.floor(i/65536)),b=(i=b+n+65535)-65536*(n=Math.floor(i/65536)),k=(i=k+n+65535)-65536*(n=Math.floor(i/65536)),a=(i=(a+=n-1+37*(n-1))+(n=1)+65535)-65536*(n=Math.floor(i/65536)),s=(i=s+n+65535)-65536*(n=Math.floor(i/65536)),o=(i=o+n+65535)-65536*(n=Math.floor(i/65536)),c=(i=c+n+65535)-65536*(n=Math.floor(i/65536)),u=(i=u+n+65535)-65536*(n=Math.floor(i/65536)),h=(i=h+n+65535)-65536*(n=Math.floor(i/65536)),y=(i=y+n+65535)-65536*(n=Math.floor(i/65536)),l=(i=l+n+65535)-65536*(n=Math.floor(i/65536)),p=(i=p+n+65535)-65536*(n=Math.floor(i/65536)),g=(i=g+n+65535)-65536*(n=Math.floor(i/65536)),d=(i=d+n+65535)-65536*(n=Math.floor(i/65536)),f=(i=f+n+65535)-65536*(n=Math.floor(i/65536)),m=(i=m+n+65535)-65536*(n=Math.floor(i/65536)),w=(i=w+n+65535)-65536*(n=Math.floor(i/65536)),b=(i=b+n+65535)-65536*(n=Math.floor(i/65536)),k=(i=k+n+65535)-65536*(n=Math.floor(i/65536)),a+=n-1+37*(n-1),e[0]=a,e[1]=s,e[2]=o,e[3]=c,e[4]=u,e[5]=h,e[6]=y,e[7]=l,e[8]=p,e[9]=g,e[10]=d,e[11]=f,e[12]=m,e[13]=w,e[14]=b,e[15]=k}function Dr(e,t){Ur(e,t,t)}function Cr(e,t){var r,i=ar();for(r=0;r<16;r++)i[r]=t[r];for(r=253;r>=0;r--)Dr(i,i),2!==r&&4!==r&&Ur(i,i,t);for(r=0;r<16;r++)e[r]=i[r]}function xr(e,t,r){var i,n,a=new Uint8Array(32),s=new Float64Array(80),o=ar(),c=ar(),u=ar(),h=ar(),y=ar(),l=ar();for(n=0;n<31;n++)a[n]=t[n];for(a[31]=127&t[31]|64,a[0]&=248,Er(s,r),n=0;n<16;n++)c[n]=s[n],h[n]=o[n]=u[n]=0;for(o[0]=h[0]=1,n=254;n>=0;--n)kr(o,c,i=a[n>>>3]>>>(7&n)&1),kr(u,h,i),Sr(y,o,u),Pr(o,o,u),Sr(u,c,h),Pr(c,c,h),Dr(h,y),Dr(l,o),Ur(o,u,o),Ur(u,c,y),Sr(y,o,u),Pr(o,o,u),Dr(c,o),Pr(u,h,l),Ur(o,u,hr),Sr(o,o,h),Ur(u,u,o),Ur(o,h,l),Ur(h,c,s),Dr(c,y),kr(o,c,i),kr(u,h,i);for(n=0;n<16;n++)s[n+16]=o[n],s[n+32]=u[n],s[n+48]=c[n],s[n+64]=h[n];var p=s.subarray(32),g=s.subarray(16);return Cr(p,p),Ur(g,g,p),vr(e,g),0}function Tr(e,t){return xr(e,t,or)}var Ir=[1116352408,3609767458,1899447441,602891725,3049323471,3964484399,3921009573,2173295548,961987163,4081628472,1508970993,3053834265,2453635748,2937671579,2870763221,3664609560,3624381080,2734883394,310598401,1164996542,607225278,1323610764,1426881987,3590304994,1925078388,4068182383,2162078206,991336113,2614888103,633803317,3248222580,3479774868,3835390401,2666613458,4022224774,944711139,264347078,2341262773,604807628,2007800933,770255983,1495990901,1249150122,1856431235,1555081692,3175218132,1996064986,2198950837,2554220882,3999719339,2821834349,766784016,2952996808,2566594879,3210313671,3203337956,3336571891,1034457026,3584528711,2466948901,113926993,3758326383,338241895,168717936,666307205,1188179964,773529912,1546045734,1294757372,1522805485,1396182291,2643833823,1695183700,2343527390,1986661051,1014477480,2177026350,1206759142,2456956037,344077627,2730485921,1290863460,2820302411,3158454273,3259730800,3505952657,3345764771,106217008,3516065817,3606008344,3600352804,1432725776,4094571909,1467031594,275423344,851169720,430227734,3100823752,506948616,1363258195,659060556,3750685593,883997877,3785050280,958139571,3318307427,1322822218,3812723403,1537002063,2003034995,1747873779,3602036899,1955562222,1575990012,2024104815,1125592928,2227730452,2716904306,2361852424,442776044,2428436474,593698344,2756734187,3733110249,3204031479,2999351573,3329325298,3815920427,3391569614,3928383900,3515267271,566280711,3940187606,3454069534,4118630271,4000239992,116418474,1914138554,174292421,2731055270,289380356,3203993006,460393269,320620315,685471733,587496836,852142971,1086792851,1017036298,365543100,1126000580,2618297676,1288033470,3409855158,1501505948,4234509866,1607167915,987167468,1816402316,1246189591];function _r(e,t,r,i){for(var n,a,s,o,c,u,h,y,l,p,g,d,f,m,w,b,k,v,A,K,E,S,P,U,D,C,x=new Int32Array(16),T=new Int32Array(16),I=e[0],_=e[1],B=e[2],R=e[3],M=e[4],L=e[5],F=e[6],z=e[7],N=t[0],O=t[1],H=t[2],j=t[3],q=t[4],G=t[5],V=t[6],W=t[7],$=0;i>=128;){for(A=0;A<16;A++)K=8*A+$,x[A]=r[K+0]<<24|r[K+1]<<16|r[K+2]<<8|r[K+3],T[A]=r[K+4]<<24|r[K+5]<<16|r[K+6]<<8|r[K+7];for(A=0;A<80;A++)if(n=I,a=_,s=B,o=R,c=M,u=L,h=F,z,l=N,p=O,g=H,d=j,f=q,m=G,w=V,W,P=65535&(S=W),U=S>>>16,D=65535&(E=z),C=E>>>16,P+=65535&(S=(q>>>14|M<<18)^(q>>>18|M<<14)^(M>>>9|q<<23)),U+=S>>>16,D+=65535&(E=(M>>>14|q<<18)^(M>>>18|q<<14)^(q>>>9|M<<23)),C+=E>>>16,P+=65535&(S=q&G^~q&V),U+=S>>>16,D+=65535&(E=M&L^~M&F),C+=E>>>16,E=Ir[2*A],P+=65535&(S=Ir[2*A+1]),U+=S>>>16,D+=65535&E,C+=E>>>16,E=x[A%16],U+=(S=T[A%16])>>>16,D+=65535&E,C+=E>>>16,D+=(U+=(P+=65535&S)>>>16)>>>16,P=65535&(S=v=65535&P|U<<16),U=S>>>16,D=65535&(E=k=65535&D|(C+=D>>>16)<<16),C=E>>>16,P+=65535&(S=(N>>>28|I<<4)^(I>>>2|N<<30)^(I>>>7|N<<25)),U+=S>>>16,D+=65535&(E=(I>>>28|N<<4)^(N>>>2|I<<30)^(N>>>7|I<<25)),C+=E>>>16,U+=(S=N&O^N&H^O&H)>>>16,D+=65535&(E=I&_^I&B^_&B),C+=E>>>16,y=65535&(D+=(U+=(P+=65535&S)>>>16)>>>16)|(C+=D>>>16)<<16,b=65535&P|U<<16,P=65535&(S=d),U=S>>>16,D=65535&(E=o),C=E>>>16,U+=(S=v)>>>16,D+=65535&(E=k),C+=E>>>16,_=n,B=a,R=s,M=o=65535&(D+=(U+=(P+=65535&S)>>>16)>>>16)|(C+=D>>>16)<<16,L=c,F=u,z=h,I=y,O=l,H=p,j=g,q=d=65535&P|U<<16,G=f,V=m,W=w,N=b,A%16==15)for(K=0;K<16;K++)E=x[K],P=65535&(S=T[K]),U=S>>>16,D=65535&E,C=E>>>16,E=x[(K+9)%16],P+=65535&(S=T[(K+9)%16]),U+=S>>>16,D+=65535&E,C+=E>>>16,k=x[(K+1)%16],P+=65535&(S=((v=T[(K+1)%16])>>>1|k<<31)^(v>>>8|k<<24)^(v>>>7|k<<25)),U+=S>>>16,D+=65535&(E=(k>>>1|v<<31)^(k>>>8|v<<24)^k>>>7),C+=E>>>16,k=x[(K+14)%16],U+=(S=((v=T[(K+14)%16])>>>19|k<<13)^(k>>>29|v<<3)^(v>>>6|k<<26))>>>16,D+=65535&(E=(k>>>19|v<<13)^(v>>>29|k<<3)^k>>>6),C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,x[K]=65535&D|C<<16,T[K]=65535&P|U<<16;P=65535&(S=N),U=S>>>16,D=65535&(E=I),C=E>>>16,E=e[0],U+=(S=t[0])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[0]=I=65535&D|C<<16,t[0]=N=65535&P|U<<16,P=65535&(S=O),U=S>>>16,D=65535&(E=_),C=E>>>16,E=e[1],U+=(S=t[1])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[1]=_=65535&D|C<<16,t[1]=O=65535&P|U<<16,P=65535&(S=H),U=S>>>16,D=65535&(E=B),C=E>>>16,E=e[2],U+=(S=t[2])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[2]=B=65535&D|C<<16,t[2]=H=65535&P|U<<16,P=65535&(S=j),U=S>>>16,D=65535&(E=R),C=E>>>16,E=e[3],U+=(S=t[3])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[3]=R=65535&D|C<<16,t[3]=j=65535&P|U<<16,P=65535&(S=q),U=S>>>16,D=65535&(E=M),C=E>>>16,E=e[4],U+=(S=t[4])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[4]=M=65535&D|C<<16,t[4]=q=65535&P|U<<16,P=65535&(S=G),U=S>>>16,D=65535&(E=L),C=E>>>16,E=e[5],U+=(S=t[5])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[5]=L=65535&D|C<<16,t[5]=G=65535&P|U<<16,P=65535&(S=V),U=S>>>16,D=65535&(E=F),C=E>>>16,E=e[6],U+=(S=t[6])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[6]=F=65535&D|C<<16,t[6]=V=65535&P|U<<16,P=65535&(S=W),U=S>>>16,D=65535&(E=z),C=E>>>16,E=e[7],U+=(S=t[7])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[7]=z=65535&D|C<<16,t[7]=W=65535&P|U<<16,$+=128,i-=128}return i}function Br(e,t,r){var i,n=new Int32Array(8),a=new Int32Array(8),s=new Uint8Array(256),o=r;for(n[0]=1779033703,n[1]=3144134277,n[2]=1013904242,n[3]=2773480762,n[4]=1359893119,n[5]=2600822924,n[6]=528734635,n[7]=1541459225,a[0]=4089235720,a[1]=2227873595,a[2]=4271175723,a[3]=1595750129,a[4]=2917565137,a[5]=725511199,a[6]=4215389547,a[7]=327033209,_r(n,a,t,r),r%=128,i=0;i<r;i++)s[i]=t[o-r+i];for(s[r]=128,s[(r=256-128*(r<112?1:0))-9]=0,fr(s,r-8,o/536870912|0,o<<3),_r(n,a,s,r),i=0;i<8;i++)fr(e,8*i,n[i],a[i]);return 0}function Rr(e,t){var r=ar(),i=ar(),n=ar(),a=ar(),s=ar(),o=ar(),c=ar(),u=ar(),h=ar();Pr(r,e[1],e[0]),Pr(h,t[1],t[0]),Ur(r,r,h),Sr(i,e[0],e[1]),Sr(h,t[0],t[1]),Ur(i,i,h),Ur(n,e[3],t[3]),Ur(n,n,lr),Ur(a,e[2],t[2]),Sr(a,a,a),Pr(s,i,r),Pr(o,a,n),Sr(c,a,n),Sr(u,i,r),Ur(e[0],s,o),Ur(e[1],u,c),Ur(e[2],c,o),Ur(e[3],s,u)}function Mr(e,t,r){var i;for(i=0;i<4;i++)kr(e[i],t[i],r)}function Lr(e,t){var r=ar(),i=ar(),n=ar();Cr(n,t[2]),Ur(r,t[0],n),Ur(i,t[1],n),vr(e,i),e[31]^=Kr(r)<<7}function Fr(e,t,r){var i,n;for(wr(e[0],cr),wr(e[1],ur),wr(e[2],ur),wr(e[3],cr),n=255;n>=0;--n)Mr(e,t,i=r[n/8|0]>>(7&n)&1),Rr(t,e),Rr(e,e),Mr(e,t,i)}function zr(e,t){var r=[ar(),ar(),ar(),ar()];wr(r[0],pr),wr(r[1],gr),wr(r[2],ur),Ur(r[3],pr,gr),Fr(e,r,t)}function Nr(e,t,r){var i,n=new Uint8Array(64),a=[ar(),ar(),ar(),ar()];for(r||sr(t,32),Br(n,t,32),n[0]&=248,n[31]&=127,n[31]|=64,zr(a,n),Lr(e,a),i=0;i<32;i++)t[i+32]=e[i];return 0}var Or=new Float64Array([237,211,245,92,26,99,18,88,214,156,247,162,222,249,222,20,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,16]);function Hr(e,t){var r,i,n,a;for(i=63;i>=32;--i){for(r=0,n=i-32,a=i-12;n<a;++n)t[n]+=r-16*t[i]*Or[n-(i-32)],r=Math.floor((t[n]+128)/256),t[n]-=256*r;t[n]+=r,t[i]=0}for(r=0,n=0;n<32;n++)t[n]+=r-(t[31]>>4)*Or[n],r=t[n]>>8,t[n]&=255;for(n=0;n<32;n++)t[n]-=r*Or[n];for(i=0;i<32;i++)t[i+1]+=t[i]>>8,e[i]=255&t[i]}function jr(e){var t,r=new Float64Array(64);for(t=0;t<64;t++)r[t]=e[t];for(t=0;t<64;t++)e[t]=0;Hr(e,r)}function qr(e,t){var r=ar(),i=ar(),n=ar(),a=ar(),s=ar(),o=ar(),c=ar();return wr(e[2],ur),Er(e[1],t),Dr(n,e[1]),Ur(a,n,yr),Pr(n,n,e[2]),Sr(a,e[2],a),Dr(s,a),Dr(o,s),Ur(c,o,s),Ur(r,c,n),Ur(r,r,a),function(e,t){var r,i=ar();for(r=0;r<16;r++)i[r]=t[r];for(r=250;r>=0;r--)Dr(i,i),1!==r&&Ur(i,i,t);for(r=0;r<16;r++)e[r]=i[r]}(r,r),Ur(r,r,n),Ur(r,r,a),Ur(r,r,a),Ur(e[0],r,a),Dr(i,e[0]),Ur(i,i,a),Ar(i,n)&&Ur(e[0],e[0],dr),Dr(i,e[0]),Ur(i,i,a),Ar(i,n)?-1:(Kr(e[0])===t[31]>>7&&Pr(e[0],cr,e[0]),Ur(e[3],e[0],e[1]),0)}var Gr=64;function Vr(){for(var e=0;e<arguments.length;e++)if(!(arguments[e]instanceof Uint8Array))throw new TypeError("unexpected type, use Uint8Array")}nr.scalarMult=function(e,t){if(Vr(e,t),32!==e.length)throw Error("bad n size");if(32!==t.length)throw Error("bad p size");var r=new Uint8Array(32);return xr(r,e,t),r},nr.box={},nr.box.keyPair=function(){var e=new Uint8Array(32),t=new Uint8Array(32);return function(e,t){sr(t,32),Tr(e,t)}(e,t),{publicKey:e,secretKey:t}},nr.box.keyPair.fromSecretKey=function(e){if(Vr(e),32!==e.length)throw Error("bad secret key size");var t=new Uint8Array(32);return Tr(t,e),{publicKey:t,secretKey:new Uint8Array(e)}},nr.sign=function(e,t){if(Vr(e,t),64!==t.length)throw Error("bad secret key size");var r=new Uint8Array(Gr+e.length);return function(e,t,r,i){var n,a,s=new Uint8Array(64),o=new Uint8Array(64),c=new Uint8Array(64),u=new Float64Array(64),h=[ar(),ar(),ar(),ar()];Br(s,i,32),s[0]&=248,s[31]&=127,s[31]|=64;var y=r+64;for(n=0;n<r;n++)e[64+n]=t[n];for(n=0;n<32;n++)e[32+n]=s[32+n];for(Br(c,e.subarray(32),r+32),jr(c),zr(h,c),Lr(e,h),n=32;n<64;n++)e[n]=i[n];for(Br(o,e,r+64),jr(o),n=0;n<64;n++)u[n]=0;for(n=0;n<32;n++)u[n]=c[n];for(n=0;n<32;n++)for(a=0;a<32;a++)u[n+a]+=o[n]*s[a];Hr(e.subarray(32),u)}(r,e,e.length,t),r},nr.sign.detached=function(e,t){for(var r=nr.sign(e,t),i=new Uint8Array(Gr),n=0;n<i.length;n++)i[n]=r[n];return i},nr.sign.detached.verify=function(e,t,r){if(Vr(e,t,r),t.length!==Gr)throw Error("bad signature size");if(32!==r.length)throw Error("bad public key size");var i,n=new Uint8Array(Gr+e.length),a=new Uint8Array(Gr+e.length);for(i=0;i<Gr;i++)n[i]=t[i];for(i=0;i<e.length;i++)n[i+Gr]=e[i];return function(e,t,r,i){var n,a=new Uint8Array(32),s=new Uint8Array(64),o=[ar(),ar(),ar(),ar()],c=[ar(),ar(),ar(),ar()];if(r<64)return-1;if(qr(c,i))return-1;for(n=0;n<r;n++)e[n]=t[n];for(n=0;n<32;n++)e[n+32]=i[n];if(Br(s,e,r),jr(s),Fr(o,c,s),zr(c,t.subarray(32)),Rr(o,c),Lr(a,o),r-=64,mr(t,0,a,0)){for(n=0;n<r;n++)e[n]=0;return-1}for(n=0;n<r;n++)e[n]=t[n+64];return r}(a,n,n.length,r)>=0},nr.sign.keyPair=function(){var e=new Uint8Array(32),t=new Uint8Array(64);return Nr(e,t),{publicKey:e,secretKey:t}},nr.sign.keyPair.fromSecretKey=function(e){if(Vr(e),64!==e.length)throw Error("bad secret key size");for(var t=new Uint8Array(32),r=0;r<t.length;r++)t[r]=e[32+r];return{publicKey:t,secretKey:new Uint8Array(e)}},nr.sign.keyPair.fromSeed=function(e){if(Vr(e),32!==e.length)throw Error("bad seed size");for(var t=new Uint8Array(32),r=new Uint8Array(64),i=0;i<32;i++)r[i]=e[i];return Nr(t,r,!0),{publicKey:t,secretKey:r}},nr.setPRNG=function(e){sr=e},function(){if(ir&&ir.getRandomValues){nr.setPRNG((function(e,t){var r,i=new Uint8Array(t);for(r=0;r<t;r+=65536)ir.getRandomValues(i.subarray(r,r+Math.min(t-r,65536)));for(r=0;r<t;r++)e[r]=i[r];!function(e){for(var t=0;t<e.length;t++)e[t]=0}(i)}))}}();class Wr{constructor(e){if(e instanceof Wr)this.oid=e.oid;else if(N.isArray(e)||N.isUint8Array(e)){if(6===(e=new Uint8Array(e))[0]){if(e[1]!==e.length-2)throw Error("Length mismatch in DER encoded oid");e=e.subarray(2)}this.oid=e}else this.oid=""}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.oid=e.subarray(1,1+t),1+this.oid.length}throw Error("Invalid oid")}write(){return N.concatUint8Array([new Uint8Array([this.oid.length]),this.oid])}toHex(){return N.uint8ArrayToHex(this.oid)}getName(){const e=this.toHex();if(M.curve[e])return M.write(M.curve,e);throw Error("Unknown curve object identifier.")}}function $r(e){let t,r=0;const i=e[0];return i<192?([r]=e,t=1):i<255?(r=(e[0]-192<<8)+e[1]+192,t=2):255===i&&(r=N.readNumber(e.subarray(1,5)),t=5),{len:r,offset:t}}function Xr(e){return e<192?new Uint8Array([e]):e>191&&e<8384?new Uint8Array([192+(e-192>>8),e-192&255]):N.concatUint8Array([new Uint8Array([255]),N.writeNumber(e,4)])}function Zr(e){if(e<0||e>30)throw Error("Partial Length power must be between 1 and 30");return new Uint8Array([224+e])}function Yr(e){return new Uint8Array([192|e])}function Qr(e,t){return N.concatUint8Array([Yr(e),Xr(t)])}function Jr(e){return[M.packet.literalData,M.packet.compressedData,M.packet.symmetricallyEncryptedData,M.packet.symEncryptedIntegrityProtectedData,M.packet.aeadEncryptedData].includes(e)}async function ei(e,t){const r=_(e);let i,n;try{const s=await r.peekBytes(2);if(!s||s.length<2||0==(128&s[0]))throw Error("Error during parsing. This message / key probably does not conform to a valid OpenPGP format.");const o=await r.readByte();let c,u,h=-1,y=-1;y=0,0!=(64&o)&&(y=1),y?h=63&o:(h=(63&o)>>2,u=3&o);const l=Jr(h);let p,g=null;if(l){if("array"===N.isStream(e)){const e=new a;i=B(e),g=e}else{const e=new TransformStream;i=B(e.writable),g=e.readable}n=t({tag:h,packet:g})}else g=[];do{if(y){const e=await r.readByte();if(p=!1,e<192)c=e;else if(e>=192&&e<224)c=(e-192<<8)+await r.readByte()+192;else if(e>223&&e<255){if(c=1<<(31&e),p=!0,!l)throw new TypeError("This packet type does not support partial lengths.")}else c=await r.readByte()<<24|await r.readByte()<<16|await r.readByte()<<8|await r.readByte()}else switch(u){case 0:c=await r.readByte();break;case 1:c=await r.readByte()<<8|await r.readByte();break;case 2:c=await r.readByte()<<24|await r.readByte()<<16|await r.readByte()<<8|await r.readByte();break;default:c=1/0}if(c>0){let e=0;for(;;){i&&await i.ready;const{done:t,value:n}=await r.read();if(t){if(c===1/0)break;throw Error("Unexpected end of packet")}const a=c===1/0?n:n.subarray(0,c-e);if(i?await i.write(a):g.push(a),e+=n.length,e>=c){r.unshift(n.subarray(c-e+n.length));break}}}}while(p);const d=await r.peekBytes(l?1/0:2);return i?(await i.ready,await i.close()):(g=N.concatUint8Array(g),await t({tag:h,packet:g})),!d||!d.length}catch(e){if(i)return await i.abort(e),!0;throw e}finally{i&&await n,r.releaseLock()}}class ti extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,ti),this.name="UnsupportedError"}}class ri extends ti{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,ti),this.name="UnknownPacketError"}}class ii{constructor(e,t){this.tag=e,this.rawContent=t}write(){return this.rawContent}}const ni=N.getWebCrypto(),ai=N.getNodeCrypto(),si={[M.curve.p256]:"P-256",[M.curve.p384]:"P-384",[M.curve.p521]:"P-521"},oi=ai?ai.getCurves():[],ci=ai?{[M.curve.secp256k1]:oi.includes("secp256k1")?"secp256k1":void 0,[M.curve.p256]:oi.includes("prime256v1")?"prime256v1":void 0,[M.curve.p384]:oi.includes("secp384r1")?"secp384r1":void 0,[M.curve.p521]:oi.includes("secp521r1")?"secp521r1":void 0,[M.curve.ed25519Legacy]:oi.includes("ED25519")?"ED25519":void 0,[M.curve.curve25519Legacy]:oi.includes("X25519")?"X25519":void 0,[M.curve.brainpoolP256r1]:oi.includes("brainpoolP256r1")?"brainpoolP256r1":void 0,[M.curve.brainpoolP384r1]:oi.includes("brainpoolP384r1")?"brainpoolP384r1":void 0,[M.curve.brainpoolP512r1]:oi.includes("brainpoolP512r1")?"brainpoolP512r1":void 0}:{},ui={p256:{oid:[6,8,42,134,72,206,61,3,1,7],keyType:M.publicKey.ecdsa,hash:M.hash.sha256,cipher:M.symmetric.aes128,node:ci.p256,web:si.p256,payloadSize:32,sharedSize:256},p384:{oid:[6,5,43,129,4,0,34],keyType:M.publicKey.ecdsa,hash:M.hash.sha384,cipher:M.symmetric.aes192,node:ci.p384,web:si.p384,payloadSize:48,sharedSize:384},p521:{oid:[6,5,43,129,4,0,35],keyType:M.publicKey.ecdsa,hash:M.hash.sha512,cipher:M.symmetric.aes256,node:ci.p521,web:si.p521,payloadSize:66,sharedSize:528},secp256k1:{oid:[6,5,43,129,4,0,10],keyType:M.publicKey.ecdsa,hash:M.hash.sha256,cipher:M.symmetric.aes128,node:ci.secp256k1,payloadSize:32},ed25519Legacy:{oid:[6,9,43,6,1,4,1,218,71,15,1],keyType:M.publicKey.eddsaLegacy,hash:M.hash.sha512,node:!1,payloadSize:32},curve25519Legacy:{oid:[6,10,43,6,1,4,1,151,85,1,5,1],keyType:M.publicKey.ecdh,hash:M.hash.sha256,cipher:M.symmetric.aes128,node:!1,payloadSize:32},brainpoolP256r1:{oid:[6,9,43,36,3,3,2,8,1,1,7],keyType:M.publicKey.ecdsa,hash:M.hash.sha256,cipher:M.symmetric.aes128,node:ci.brainpoolP256r1,payloadSize:32},brainpoolP384r1:{oid:[6,9,43,36,3,3,2,8,1,1,11],keyType:M.publicKey.ecdsa,hash:M.hash.sha384,cipher:M.symmetric.aes192,node:ci.brainpoolP384r1,payloadSize:48},brainpoolP512r1:{oid:[6,9,43,36,3,3,2,8,1,1,13],keyType:M.publicKey.ecdsa,hash:M.hash.sha512,cipher:M.symmetric.aes256,node:ci.brainpoolP512r1,payloadSize:64}};class hi{constructor(e,t){try{(N.isArray(e)||N.isUint8Array(e))&&(e=new Wr(e)),e instanceof Wr&&(e=e.getName()),this.name=M.write(M.curve,e)}catch(e){throw new ti("Unknown curve")}t=t||ui[this.name],this.keyType=t.keyType,this.oid=t.oid,this.hash=t.hash,this.cipher=t.cipher,this.node=t.node&&ui[this.name],this.web=t.web&&ui[this.name],this.payloadSize=t.payloadSize,this.web&&N.getWebCrypto()?this.type="web":this.node&&N.getNodeCrypto()?this.type="node":this.name===M.curve.curve25519Legacy?this.type="curve25519Legacy":this.name===M.curve.ed25519Legacy&&(this.type="ed25519Legacy")}async genKeyPair(){switch(this.type){case"web":try{return await async function(e){const t=await ni.generateKey({name:"ECDSA",namedCurve:si[e]},!0,["sign","verify"]),r=await ni.exportKey("jwk",t.privateKey),i=await ni.exportKey("jwk",t.publicKey);return{publicKey:pi(i),privateKey:V(r.d)}}(this.name)}catch(e){return N.printDebugError("Browser did not support generating ec key "+e.message),li(this.name)}case"node":return async function(e){const t=ai.createECDH(ci[e]);return await t.generateKeys(),{publicKey:new Uint8Array(t.getPublicKey()),privateKey:new Uint8Array(t.getPrivateKey())}}(this.name);case"curve25519Legacy":{const e=zt(32);e[0]=127&e[0]|64,e[31]&=248;const t=e.slice().reverse(),{publicKey:r}=nr.box.keyPair.fromSecretKey(t);return{publicKey:N.concatUint8Array([new Uint8Array([64]),r]),privateKey:e}}case"ed25519Legacy":{const e=zt(32),t=nr.sign.keyPair.fromSeed(e);return{publicKey:N.concatUint8Array([new Uint8Array([64]),t.publicKey]),privateKey:e}}default:return li(this.name)}}}async function yi(e,t,r,i){const n={p256:!0,p384:!0,p521:!0,secp256k1:!0,curve25519Legacy:e===M.publicKey.ecdh,brainpoolP256r1:!0,brainpoolP384r1:!0,brainpoolP512r1:!0},a=t.getName();if(!n[a])return!1;if(a===M.curve.curve25519Legacy){i=i.slice().reverse();const{publicKey:e}=nr.box.keyPair.fromSecretKey(i);r=new Uint8Array(r);const t=new Uint8Array([64,...e]);return!!N.equalsUint8Array(t,r)}const s=(await N.getNobleCurve(M.publicKey.ecdsa,M.write(M.curve,t.toHex()))).getPublicKey(i,!1);return!!N.equalsUint8Array(s,r)}async function li(e){const t=await N.getNobleCurve(M.publicKey.ecdsa,e),r=t.utils.randomPrivateKey();return{publicKey:t.getPublicKey(r,!1),privateKey:r}}function pi(e){const t=V(e.x),r=V(e.y),i=new Uint8Array(t.length+r.length+1);return i[0]=4,i.set(t,1),i.set(r,t.length+1),i}function gi(e,t,r){const i=e,n=r.slice(1,i+1),a=r.slice(i+1,2*i+1);return{kty:"EC",crv:t,x:W(n,!0),y:W(a,!0),ext:!0}}function di(e,t,r,i){const n=gi(e,t,r);return n.d=W(i,!0),n}const fi=N.getWebCrypto(),mi=N.getNodeCrypto();async function wi(e,t,r,i,n,a){const s=new hi(e);if(r&&!N.isStream(r)){const e={publicKey:i,privateKey:n};switch(s.type){case"web":try{return await async function(e,t,r,i){const n=e.payloadSize,a=di(e.payloadSize,si[e.name],i.publicKey,i.privateKey),s=await fi.importKey("jwk",a,{name:"ECDSA",namedCurve:si[e.name],hash:{name:M.read(M.webHash,e.hash)}},!1,["sign"]),o=new Uint8Array(await fi.sign({name:"ECDSA",namedCurve:si[e.name],hash:{name:M.read(M.webHash,t)}},s,r));return{r:o.slice(0,n),s:o.slice(n,n<<1)}}(s,t,r,e)}catch(e){if("p521"!==s.name&&("DataError"===e.name||"OperationError"===e.name))throw e;N.printDebugError("Browser did not support signing: "+e.message)}break;case"node":{const i=await async function(e,t,r,i){const n=mi.createSign(M.read(M.hash,t));n.write(r),n.end();const a=Ki.encode({version:1,parameters:e.oid,privateKey:Array.from(i.privateKey),publicKey:{unused:0,data:Array.from(i.publicKey)}},"pem",{label:"EC PRIVATE KEY"});return Ai.decode(n.sign(a),"der")}(s,t,r,e);return{r:i.r.toArrayLike(Uint8Array),s:i.s.toArrayLike(Uint8Array)}}}}const o=(await N.getNobleCurve(M.publicKey.ecdsa,s.name)).sign(a,n,{lowS:!1});return{r:o.r.toUint8Array("be",s.payloadSize),s:o.s.toUint8Array("be",s.payloadSize)}}async function bi(e,t,r,i,n,a){const s=new hi(e),o=async()=>0===a[0]&&ki(s,r,a.subarray(1),n);if(i&&!N.isStream(i))switch(s.type){case"web":try{const e=await async function(e,t,{r,s:i},n,a){const s=gi(e.payloadSize,si[e.name],a),o=await fi.importKey("jwk",s,{name:"ECDSA",namedCurve:si[e.name],hash:{name:M.read(M.webHash,e.hash)}},!1,["verify"]),c=N.concatUint8Array([r,i]).buffer;return fi.verify({name:"ECDSA",namedCurve:si[e.name],hash:{name:M.read(M.webHash,t)}},o,c,n)}(s,t,r,i,n);return e||o()}catch(e){if("p521"!==s.name&&("DataError"===e.name||"OperationError"===e.name))throw e;N.printDebugError("Browser did not support verifying: "+e.message)}break;case"node":{const e=await async function(e,t,{r,s:i},n,a){const{default:s}=await import("./bn.min.mjs").then((function(e){return e.b})),o=mi.createVerify(M.read(M.hash,t));o.write(n),o.end();const c=Si.encode({algorithm:{algorithm:[1,2,840,10045,2,1],parameters:e.oid},subjectPublicKey:{unused:0,data:Array.from(a)}},"pem",{label:"PUBLIC KEY"}),u=Ai.encode({r:new s(r),s:new s(i)},"der");try{return o.verify(c,u)}catch(e){return!1}}(s,t,r,i,n);return e||o()}}return await ki(s,r,a,n)||o()}async function ki(e,t,r,i){return(await N.getNobleCurve(M.publicKey.ecdsa,e.name)).verify(N.concatUint8Array([t.r,t.s]),r,i,{lowS:!1})}const vi=mi?N.nodeRequire("asn1.js"):void 0,Ai=mi?vi.define("ECDSASignature",(function(){this.seq().obj(this.key("r").int(),this.key("s").int())})):void 0,Ki=mi?vi.define("ECPrivateKey",(function(){this.seq().obj(this.key("version").int(),this.key("privateKey").octstr(),this.key("parameters").explicit(0).optional().any(),this.key("publicKey").explicit(1).optional().bitstr())})):void 0,Ei=mi?vi.define("AlgorithmIdentifier",(function(){this.seq().obj(this.key("algorithm").objid(),this.key("parameters").optional().any())})):void 0,Si=mi?vi.define("SubjectPublicKeyInfo",(function(){this.seq().obj(this.key("algorithm").use(Ei),this.key("subjectPublicKey").bitstr())})):void 0;var Pi=/*#__PURE__*/Object.freeze({__proto__:null,sign:wi,validateParams:async function(e,t,r){const i=new hi(e);if(i.keyType!==M.publicKey.ecdsa)return!1;switch(i.type){case"web":case"node":{const i=zt(8),n=M.hash.sha256,a=await qe.digest(n,i);try{const s=await wi(e,n,i,t,r,a);return await bi(e,n,s,i,t,a)}catch(e){return!1}}default:return yi(M.publicKey.ecdsa,e,t,r)}},verify:bi});var Ui=/*#__PURE__*/Object.freeze({__proto__:null,sign:async function(e,t,r,i,n,a){if(qe.getHashByteLength(t)<qe.getHashByteLength(M.hash.sha256))throw Error("Hash algorithm too weak for EdDSA.");const s=N.concatUint8Array([n,i.subarray(1)]),o=nr.sign.detached(a,s);if(L.checkEdDSAFaultySignatures&&!nr.sign.detached.verify(a,o,i.subarray(1)))throw Error("Transient signing failure");return{r:o.subarray(0,32),s:o.subarray(32)}},validateParams:async function(e,t,r){if(e.getName()!==M.curve.ed25519Legacy)return!1;const{publicKey:i}=nr.sign.keyPair.fromSeed(r),n=new Uint8Array([64,...i]);return N.equalsUint8Array(t,n)},verify:async function(e,t,{r,s:i},n,a,s){if(qe.getHashByteLength(t)<qe.getHashByteLength(M.hash.sha256))throw Error("Hash algorithm too weak for EdDSA.");const o=N.concatUint8Array([r,i]);return nr.sign.detached.verify(s,o,a.subarray(1))}});function Di(e){switch(e){case M.publicKey.ed25519:return 32;case M.publicKey.ed448:return 57;default:throw Error("Unsupported EdDSA algorithm")}}function Ci(e){switch(e){case M.publicKey.ed25519:return M.hash.sha256;case M.publicKey.ed448:return M.hash.sha512;default:throw Error("Unknown EdDSA algo")}}var xi=/*#__PURE__*/Object.freeze({__proto__:null,generate:async function(e){switch(e){case M.publicKey.ed25519:{const t=zt(Di(e)),{publicKey:r}=nr.sign.keyPair.fromSeed(t);return{A:r,seed:t}}case M.publicKey.ed448:{const e=await N.getNobleCurve(M.publicKey.ed448),t=e.utils.randomPrivateKey();return{A:e.getPublicKey(t),seed:t}}default:throw Error("Unsupported EdDSA algorithm")}},getPayloadSize:Di,getPreferredHashAlgo:Ci,sign:async function(e,t,r,i,n,a){if(qe.getHashByteLength(t)<qe.getHashByteLength(Ci(e)))throw Error("Hash algorithm too weak for EdDSA.");switch(e){case M.publicKey.ed25519:{const e=N.concatUint8Array([n,i]),t=nr.sign.detached(a,e);if(L.checkEdDSAFaultySignatures&&!nr.sign.detached.verify(a,t,i))throw Error("Transient signing failure");return{RS:t}}case M.publicKey.ed448:return{RS:(await N.getNobleCurve(M.publicKey.ed448)).sign(a,n)};default:throw Error("Unsupported EdDSA algorithm")}},validateParams:async function(e,t,r){switch(e){case M.publicKey.ed25519:{const{publicKey:e}=nr.sign.keyPair.fromSeed(r);return N.equalsUint8Array(t,e)}case M.publicKey.ed448:{const e=(await N.getNobleCurve(M.publicKey.ed448)).getPublicKey(r);return N.equalsUint8Array(t,e)}default:return!1}},verify:async function(e,t,{RS:r},i,n,a){if(qe.getHashByteLength(t)<qe.getHashByteLength(Ci(e)))throw Error("Hash algorithm too weak for EdDSA.");switch(e){case M.publicKey.ed25519:return nr.sign.detached.verify(a,r,n);case M.publicKey.ed448:return(await N.getNobleCurve(M.publicKey.ed448)).verify(r,a,n);default:throw Error("Unsupported EdDSA algorithm")}}});function Ti(e,t){const r=new De["aes"+8*e.length](e),i=new Uint32Array([2795939494,2795939494]),n=_i(t);let a=i;const s=n,o=n.length/2,c=new Uint32Array([0,0]);let u=new Uint32Array(4);for(let e=0;e<=5;++e)for(let t=0;t<o;++t)c[1]=o*e+(1+t),u[0]=a[0],u[1]=a[1],u[2]=s[2*t],u[3]=s[2*t+1],u=_i(r.encrypt(Bi(u))),a=u.subarray(0,2),a[0]^=c[0],a[1]^=c[1],s[2*t]=u[2],s[2*t+1]=u[3];return Bi(a,s)}function Ii(e,t){const r=new De["aes"+8*e.length](e),i=new Uint32Array([2795939494,2795939494]),n=_i(t);let a=n.subarray(0,2);const s=n.subarray(2),o=n.length/2-1,c=new Uint32Array([0,0]);let u=new Uint32Array(4);for(let e=5;e>=0;--e)for(let t=o-1;t>=0;--t)c[1]=o*e+(t+1),u[0]=a[0]^c[0],u[1]=a[1]^c[1],u[2]=s[2*t],u[3]=s[2*t+1],u=_i(r.decrypt(Bi(u))),a=u.subarray(0,2),s[2*t]=u[2],s[2*t+1]=u[3];if(a[0]===i[0]&&a[1]===i[1])return Bi(s);throw Error("Key Data Integrity failed")}function _i(e){const{length:t}=e,r=function(e){if(N.isString(e)){const{length:t}=e,r=new ArrayBuffer(t),i=new Uint8Array(r);for(let r=0;r<t;++r)i[r]=e.charCodeAt(r);return r}return new Uint8Array(e).buffer}(e),i=new DataView(r),n=new Uint32Array(t/4);for(let e=0;e<t/4;++e)n[e]=i.getUint32(4*e);return n}function Bi(){let e=0;for(let t=0;t<arguments.length;++t)e+=4*arguments[t].length;const t=new ArrayBuffer(e),r=new DataView(t);let i=0;for(let e=0;e<arguments.length;++e){for(let t=0;t<arguments[e].length;++t)r.setUint32(i+4*t,arguments[e][t]);i+=4*arguments[e].length}return new Uint8Array(t)}var Ri=/*#__PURE__*/Object.freeze({__proto__:null,unwrap:Ii,wrap:Ti});function Mi(e){const t=8-e.length%8,r=new Uint8Array(e.length+t).fill(t);return r.set(e),r}function Li(e){const t=e.length;if(t>0){const r=e[t-1];if(r>=1){const i=e.subarray(t-r),n=new Uint8Array(r).fill(r);if(N.equalsUint8Array(i,n))return e.subarray(0,t-r)}}throw Error("Invalid padding")}var Fi=/*#__PURE__*/Object.freeze({__proto__:null,decode:Li,encode:Mi});const zi=N.getWebCrypto(),Ni=N.getNodeCrypto();function Oi(e,t,r,i){return N.concatUint8Array([t.write(),new Uint8Array([e]),r.write(!0),N.stringToUint8Array("Anonymous Sender "),r.replacementFingerprint||i.subarray(0,20)])}async function Hi(e,t,r,i,n=!1,a=!1){let s;if(n){for(s=0;s<t.length&&0===t[s];s++);t=t.subarray(s)}if(a){for(s=t.length-1;s>=0&&0===t[s];s--);t=t.subarray(0,s+1)}return(await qe.digest(e,N.concatUint8Array([new Uint8Array([0,0,0,1]),t,i]))).subarray(0,r)}async function ji(e,t){switch(e.type){case"curve25519Legacy":{const r=zt(32),{secretKey:i,sharedKey:n}=await qi(e,t,null,r);let{publicKey:a}=nr.box.keyPair.fromSecretKey(i);return a=N.concatUint8Array([new Uint8Array([64]),a]),{publicKey:a,sharedKey:n}}case"web":if(e.web&&N.getWebCrypto())try{return await async function(e,t){const r=gi(e.payloadSize,e.web.web,t);let i=zi.generateKey({name:"ECDH",namedCurve:e.web.web},!0,["deriveKey","deriveBits"]),n=zi.importKey("jwk",r,{name:"ECDH",namedCurve:e.web.web},!1,[]);[i,n]=await Promise.all([i,n]);let a=zi.deriveBits({name:"ECDH",namedCurve:e.web.web,public:n},i.privateKey,e.web.sharedSize),s=zi.exportKey("jwk",i.publicKey);[a,s]=await Promise.all([a,s]);const o=new Uint8Array(a),c=new Uint8Array(pi(s));return{publicKey:c,sharedKey:o}}(e,t)}catch(r){return N.printDebugError(r),Vi(e,t)}break;case"node":return async function(e,t){const r=Ni.createECDH(e.node.node);r.generateKeys();const i=new Uint8Array(r.computeSecret(t)),n=new Uint8Array(r.getPublicKey());return{publicKey:n,sharedKey:i}}(e,t);default:return Vi(e,t)}}async function qi(e,t,r,i){if(i.length!==e.payloadSize){const t=new Uint8Array(e.payloadSize);t.set(i,e.payloadSize-i.length),i=t}switch(e.type){case"curve25519Legacy":{const e=i.slice().reverse();return{secretKey:e,sharedKey:nr.scalarMult(e,t.subarray(1))}}case"web":if(e.web&&N.getWebCrypto())try{return await async function(e,t,r,i){const n=di(e.payloadSize,e.web.web,r,i);let a=zi.importKey("jwk",n,{name:"ECDH",namedCurve:e.web.web},!0,["deriveKey","deriveBits"]);const s=gi(e.payloadSize,e.web.web,t);let o=zi.importKey("jwk",s,{name:"ECDH",namedCurve:e.web.web},!0,[]);[a,o]=await Promise.all([a,o]);let c=zi.deriveBits({name:"ECDH",namedCurve:e.web.web,public:o},a,e.web.sharedSize),u=zi.exportKey("jwk",a);[c,u]=await Promise.all([c,u]);const h=new Uint8Array(c);return{secretKey:V(u.d),sharedKey:h}}(e,t,r,i)}catch(r){return N.printDebugError(r),Gi(e,t,i)}break;case"node":return async function(e,t,r){const i=Ni.createECDH(e.node.node);i.setPrivateKey(r);const n=new Uint8Array(i.computeSecret(t));return{secretKey:new Uint8Array(i.getPrivateKey()),sharedKey:n}}(e,t,i);default:return Gi(e,t,i)}}async function Gi(e,t,r){return{secretKey:r,sharedKey:(await N.getNobleCurve(M.publicKey.ecdh,e.name)).getSharedSecret(r,t).subarray(1)}}async function Vi(e,t){const r=await N.getNobleCurve(M.publicKey.ecdh,e.name),{publicKey:i,privateKey:n}=await e.genKeyPair();return{publicKey:i,sharedKey:r.getSharedSecret(n,t).subarray(1)}}var Wi=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i,n,a,s){const o=new hi(e),{sharedKey:c}=await qi(o,r,n,a),u=Oi(M.publicKey.ecdh,e,t,s),{keySize:h}=Ve(t.cipher);let y;for(let e=0;e<3;e++)try{return Li(Ii(await Hi(t.hash,c,h,u,1===e,2===e),i))}catch(e){y=e}throw y},encrypt:async function(e,t,r,i,n){const a=Mi(r),s=new hi(e),{publicKey:o,sharedKey:c}=await ji(s,i),u=Oi(M.publicKey.ecdh,e,t,n),{keySize:h}=Ve(t.cipher);return{publicKey:o,wrappedKey:Ti(await Hi(t.hash,c,h,u),a)}},validateParams:async function(e,t,r){return yi(M.publicKey.ecdh,e,t,r)}});const $i=N.getWebCrypto(),Xi=N.getNodeCrypto();async function Zi(e,t,r,i,n){const a=M.read(M.webHash,e);if(!a)throw Error("Hash algo not supported with HKDF");const s=$i||Xi.webcrypto.subtle,o=await s.importKey("raw",t,"HKDF",!1,["deriveBits"]),c=await s.deriveBits({name:"HKDF",hash:a,salt:r,info:i},o,8*n);return new Uint8Array(c)}const Yi={x25519:N.encodeUTF8("OpenPGP X25519"),x448:N.encodeUTF8("OpenPGP X448")};var Qi=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i,n){switch(e){case M.publicKey.x25519:{const e=nr.scalarMult(n,t),a=N.concatUint8Array([t,i,e]),{keySize:s}=Ve(M.symmetric.aes128);return Ii(await Zi(M.hash.sha256,a,new Uint8Array,Yi.x25519,s),r)}case M.publicKey.x448:{const e=(await N.getNobleCurve(M.publicKey.x448)).getSharedSecret(n,t),a=N.concatUint8Array([t,i,e]),{keySize:s}=Ve(M.symmetric.aes256);return Ii(await Zi(M.hash.sha512,a,new Uint8Array,Yi.x448,s),r)}default:throw Error("Unsupported ECDH algorithm")}},encrypt:async function(e,t,r){switch(e){case M.publicKey.x25519:{const e=zt(32),i=nr.scalarMult(e,r),{publicKey:n}=nr.box.keyPair.fromSecretKey(e),a=N.concatUint8Array([n,r,i]),{keySize:s}=Ve(M.symmetric.aes128);return{ephemeralPublicKey:n,wrappedKey:Ti(await Zi(M.hash.sha256,a,new Uint8Array,Yi.x25519,s),t)}}case M.publicKey.x448:{const e=await N.getNobleCurve(M.publicKey.x448),i=e.utils.randomPrivateKey(),n=e.getSharedSecret(i,r),a=e.getPublicKey(i),s=N.concatUint8Array([a,r,n]),{keySize:o}=Ve(M.symmetric.aes256);return{ephemeralPublicKey:a,wrappedKey:Ti(await Zi(M.hash.sha512,s,new Uint8Array,Yi.x448,o),t)}}default:throw Error("Unsupported ECDH algorithm")}},generate:async function(e){switch(e){case M.publicKey.x25519:{const e=zt(32),{publicKey:t}=nr.box.keyPair.fromSecretKey(e);return{A:t,k:e}}case M.publicKey.x448:{const e=await N.getNobleCurve(M.publicKey.x448),t=e.utils.randomPrivateKey();return{A:e.getPublicKey(t),k:t}}default:throw Error("Unsupported ECDH algorithm")}},getPayloadSize:function(e){switch(e){case M.publicKey.x25519:return 32;case M.publicKey.x448:return 56;default:throw Error("Unsupported ECDH algorithm")}},validateParams:async function(e,t,r){switch(e){case M.publicKey.x25519:{const{publicKey:e}=nr.box.keyPair.fromSecretKey(r);return N.equalsUint8Array(t,e)}case M.publicKey.x448:{const e=(await N.getNobleCurve(M.publicKey.x448)).getPublicKey(r);return N.equalsUint8Array(t,e)}default:return!1}}}),Ji=/*#__PURE__*/Object.freeze({__proto__:null,CurveWithOID:hi,ecdh:Wi,ecdhX:Qi,ecdsa:Pi,eddsa:xi,eddsaLegacy:Ui,generate:async function(e){const t=new hi(e),{oid:r,hash:i,cipher:n}=t,a=await t.genKeyPair();return{oid:r,Q:a.publicKey,secret:N.leftPad(a.privateKey,t.payloadSize),hash:i,cipher:n}},getPreferredHashAlgo:function(e){return ui[M.write(M.curve,e.toHex())].hash}});var en=/*#__PURE__*/Object.freeze({__proto__:null,sign:async function(e,t,r,i,n,a){const s=await N.getBigInteger(),o=new s(1);let c,u,h,y;i=new s(i),n=new s(n),r=new s(r),a=new s(a),r=r.mod(i),a=a.mod(n);const l=new s(t.subarray(0,n.byteLength())).mod(n);for(;;){if(c=await Nt(o,n),u=r.modExp(c,i).imod(n),u.isZero())continue;const e=a.mul(u).imod(n);if(y=l.add(e).imod(n),h=c.modInv(n).imul(y).imod(n),!h.isZero())break}return{r:u.toUint8Array("be",n.byteLength()),s:h.toUint8Array("be",n.byteLength())}},validateParams:async function(e,t,r,i,n){const a=await N.getBigInteger();e=new a(e),t=new a(t),r=new a(r),i=new a(i);const s=new a(1);if(r.lte(s)||r.gte(e))return!1;if(!e.dec().mod(t).isZero())return!1;if(!r.modExp(t,e).isOne())return!1;const o=new a(t.bitLength()),c=new a(150);if(o.lt(c)||!await jt(t,null,32))return!1;n=new a(n);const u=new a(2),h=await Nt(u.leftShift(o.dec()),u.leftShift(o)),y=t.mul(h).add(n);return!!i.equal(r.modExp(y,e))},verify:async function(e,t,r,i,n,a,s,o){const c=await N.getBigInteger(),u=new c(0);if(t=new c(t),r=new c(r),a=new c(a),s=new c(s),n=new c(n),o=new c(o),t.lte(u)||t.gte(s)||r.lte(u)||r.gte(s))return N.printDebug("invalid DSA Signature"),!1;const h=new c(i.subarray(0,s.byteLength())).imod(s),y=r.modInv(s);if(y.isZero())return N.printDebug("invalid DSA Signature"),!1;n=n.mod(a),o=o.mod(a);const l=h.mul(y).imod(s),p=t.mul(y).imod(s),g=n.modExp(l,a),d=o.modExp(p,a);return g.mul(d).imod(a).imod(s).equal(t)}});const tn=new Set([M.hash.sha1,M.hash.sha256,M.hash.sha512]),rn=N.getWebCrypto(),nn=N.getNodeCrypto();var an={rsa:tr,elgamal:rr,elliptic:Ji,dsa:en,hmac:/*#__PURE__*/Object.freeze({__proto__:null,generate:async function(e){if(!tn.has(e))throw Error("Unsupported hash algorithm.");const t=M.read(M.webHash,e),r=rn||nn.webcrypto.subtle,i=await r.generateKey({name:"HMAC",hash:{name:t}},!0,["sign","verify"]),n=await r.exportKey("raw",i);return new Uint8Array(n)},sign:async function(e,t,r){if(!tn.has(e))throw Error("Unsupported hash algorithm.");const i=M.read(M.webHash,e),n=rn||nn.webcrypto.subtle,a=await n.importKey("raw",t,{name:"HMAC",hash:{name:i}},!1,["sign"]),s=await n.sign("HMAC",a,r);return new Uint8Array(s)},verify:async function(e,t,r,i){if(!tn.has(e))throw Error("Unsupported hash algorithm.");const n=M.read(M.webHash,e),a=rn||nn.webcrypto.subtle,s=await a.importKey("raw",t,{name:"HMAC",hash:{name:n}},!1,["verify"]);return a.verify("HMAC",s,r,i)}})};class sn{constructor(e){if(void 0===e&&(e=new Uint8Array([])),!N.isUint8Array(e))throw Error("data must be in the form of a Uint8Array");this.data=e,this.length=this.data.byteLength}write(){return N.concatUint8Array([new Uint8Array([this.length]),this.data])}read(e){if(e.length>=1){const t=e[0];if(e.length>=t+1)return this.data=e.subarray(1,1+t),this.length=t,1+t}throw Error("Invalid octet string")}}var on=/*#__PURE__*/Object.freeze({__proto__:null,parseSignatureParams:function(e,t){let r=0;switch(e){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.rsaSign:{const e=N.readMPI(t.subarray(r));return r+=e.length+2,{read:r,signatureParams:{s:e}}}case M.publicKey.dsa:case M.publicKey.ecdsa:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const i=N.readMPI(t.subarray(r));return r+=i.length+2,{read:r,signatureParams:{r:e,s:i}}}case M.publicKey.eddsaLegacy:{let e=N.readMPI(t.subarray(r));r+=e.length+2,e=N.leftPad(e,32);let i=N.readMPI(t.subarray(r));return r+=i.length+2,i=N.leftPad(i,32),{read:r,signatureParams:{r:e,s:i}}}case M.publicKey.ed25519:case M.publicKey.ed448:{const i=2*an.elliptic.eddsa.getPayloadSize(e),n=N.readExactSubarray(t,r,r+i);return r+=n.length,{read:r,signatureParams:{RS:n}}}case M.publicKey.hmac:{const e=new sn;return r+=e.read(t.subarray(r)),{read:r,signatureParams:{mac:e}}}default:throw new ti("Unknown signature algorithm.")}},sign:async function(e,t,r,i,n,a){if(!r||!i)throw Error("Missing key parameters");switch(e){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.rsaSign:{const{n:e,e:s}=r,{d:o,p:c,q:u,u:h}=i;return{s:await an.rsa.sign(t,n,e,s,o,c,u,h,a)}}case M.publicKey.dsa:{const{g:e,p:n,q:s}=r,{x:o}=i;return an.dsa.sign(t,a,e,n,s,o)}case M.publicKey.elgamal:throw Error("Signing with Elgamal is not defined in the OpenPGP standard.");case M.publicKey.ecdsa:{const{oid:e,Q:s}=r,{d:o}=i;return an.elliptic.ecdsa.sign(e,t,n,s,o,a)}case M.publicKey.eddsaLegacy:{const{oid:e,Q:s}=r,{seed:o}=i;return an.elliptic.eddsaLegacy.sign(e,t,n,s,o,a)}case M.publicKey.ed25519:case M.publicKey.ed448:{const{A:s}=r,{seed:o}=i;return an.elliptic.eddsa.sign(e,t,n,s,o,a)}case M.publicKey.hmac:{const{cipher:e}=r,{keyMaterial:t}=i,n=await an.hmac.sign(e.getValue(),t,a);return{mac:new sn(n)}}default:throw Error("Unknown signature algorithm.")}},verify:async function(e,t,r,i,n,a,s){switch(e){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.rsaSign:{const{n:e,e:n}=i,o=N.leftPad(r.s,e.length);return an.rsa.verify(t,a,o,e,n,s)}case M.publicKey.dsa:{const{g:e,p:n,q:a,y:o}=i,{r:c,s:u}=r;return an.dsa.verify(t,c,u,s,e,n,a,o)}case M.publicKey.ecdsa:{const{oid:e,Q:n}=i,o=new an.elliptic.CurveWithOID(e).payloadSize,c=N.leftPad(r.r,o),u=N.leftPad(r.s,o);return an.elliptic.ecdsa.verify(e,t,{r:c,s:u},a,n,s)}case M.publicKey.eddsaLegacy:{const{oid:e,Q:n}=i;return an.elliptic.eddsaLegacy.verify(e,t,r,a,n,s)}case M.publicKey.ed25519:case M.publicKey.ed448:{const{A:n}=i;return an.elliptic.eddsa.verify(e,t,r,a,n,s)}case M.publicKey.hmac:{if(!n)throw Error("Cannot verify HMAC signature with symmetric key missing private parameters");const{cipher:e}=i,{keyMaterial:t}=n;return an.hmac.verify(e.getValue(),t,r.mac.data,s)}default:throw Error("Unknown signature algorithm.")}}});class cn{constructor(e){e&&(this.data=e)}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.data=e.subarray(1,1+t),1+this.data.length}throw Error("Invalid symmetric key")}write(){return N.concatUint8Array([new Uint8Array([this.data.length]),this.data])}}class un{constructor(e){if(e){const{version:t,hash:r,cipher:i,replacementFingerprint:n}=e;this.version=t||1,this.hash=r,this.cipher=i,this.replacementFingerprint=n}else this.version=null,this.hash=null,this.cipher=null,this.replacementFingerprint=null}read(e){if(e.length<4||1!==e[1]&&255!==e[1])throw new ti("Cannot read KDFParams");const t=e[0];this.version=e[1],this.hash=e[2],this.cipher=e[3];let r=4;if(255===this.version){const i=t-r+1;this.replacementFingerprint=e.slice(r,r+i),r+=i}return r}write(e){if(!this.version||1===this.version||e)return new Uint8Array([3,1,this.hash,this.cipher]);return N.concatUint8Array([new Uint8Array([3+this.replacementFingerprint.length,this.version,this.hash,this.cipher]),this.replacementFingerprint])}}const hn=e=>class{constructor(e){this.data=void 0===e?null:e}read(t){const r=t[0];return this.data=M.write(e,r),1}write(){return new Uint8Array([this.data])}getName(){return M.read(e,this.data)}getValue(){return this.data}},yn=hn(M.aead),ln=hn(M.symmetric),pn=hn(M.hash);class gn{static fromObject({wrappedKey:e,algorithm:t}){const r=new gn;return r.wrappedKey=e,r.algorithm=t,r}read(e){let t=0,r=e[t++];this.algorithm=r%2?e[t++]:null,r-=r%2,this.wrappedKey=N.readExactSubarray(e,t,t+r),t+=r}write(){return N.concatUint8Array([this.algorithm?new Uint8Array([this.wrappedKey.length+1,this.algorithm]):new Uint8Array([this.wrappedKey.length]),this.wrappedKey])}}async function dn(e,t){const r=zt(32);return{privateParams:{hashSeed:r,keyMaterial:e},publicParams:{cipher:t,digest:await qe.sha256(r)}}}function fn(e){const{keySize:t}=Ve(e);return zt(t)}function mn(e){const t=M.read(M.aead,e);return Lt[t]}function wn(e){try{e.getName()}catch(e){throw new ti("Unknown curve OID")}}function bn(e,t){switch(e){case M.publicKey.ecdsa:case M.publicKey.ecdh:case M.publicKey.eddsaLegacy:return new an.elliptic.CurveWithOID(t).payloadSize;case M.publicKey.ed25519:case M.publicKey.ed448:return an.elliptic.eddsa.getPayloadSize(e);case M.publicKey.x25519:case M.publicKey.x448:return an.elliptic.ecdhX.getPayloadSize(e);default:throw Error("Unknown elliptic algo")}}var kn=/*#__PURE__*/Object.freeze({__proto__:null,generateParams:async function(e,t,r,i){switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:return an.rsa.generate(t,65537).then((({n:e,e:t,d:r,p:i,q:n,u:a})=>({privateParams:{d:r,p:i,q:n,u:a},publicParams:{n:e,e:t}})));case M.publicKey.ecdsa:return an.elliptic.generate(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{d:r},publicParams:{oid:new Wr(e),Q:t}})));case M.publicKey.eddsaLegacy:return an.elliptic.generate(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{seed:r},publicParams:{oid:new Wr(e),Q:t}})));case M.publicKey.ecdh:return an.elliptic.generate(r).then((({oid:e,Q:t,secret:r,hash:i,cipher:n})=>({privateParams:{d:r},publicParams:{oid:new Wr(e),Q:t,kdfParams:new un({hash:i,cipher:n})}})));case M.publicKey.ed25519:case M.publicKey.ed448:return an.elliptic.eddsa.generate(e).then((({A:e,seed:t})=>({privateParams:{seed:t},publicParams:{A:e}})));case M.publicKey.x25519:case M.publicKey.x448:return an.elliptic.ecdhX.generate(e).then((({A:e,k:t})=>({privateParams:{k:t},publicParams:{A:e}})));case M.publicKey.hmac:return dn(await an.hmac.generate(i),new pn(i));case M.publicKey.aead:return dn(fn(i),new ln(i));case M.publicKey.dsa:case M.publicKey.elgamal:throw Error("Unsupported algorithm for key generation.");default:throw Error("Unknown public key algorithm.")}},generateSessionKey:fn,getAEADMode:mn,getCipher:Ve,getCurvePayloadSize:bn,getPreferredCurveHashAlgo:function(e,t){switch(e){case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:return an.elliptic.getPreferredHashAlgo(t);case M.publicKey.ed25519:case M.publicKey.ed448:return an.elliptic.eddsa.getPreferredHashAlgo(e);default:throw Error("Unknown elliptic signing algo")}},getPrefixRandom:async function(e){const{blockSize:t}=Ve(e),r=await zt(t),i=new Uint8Array([r[r.length-2],r[r.length-1]]);return N.concat([r,i])},parseEncSessionKeyParams:function(e,t){let r=0;switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:return{c:N.readMPI(t.subarray(r))};case M.publicKey.elgamal:{const e=N.readMPI(t.subarray(r));r+=e.length+2;return{c1:e,c2:N.readMPI(t.subarray(r))}}case M.publicKey.ecdh:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const i=new cn;return i.read(t.subarray(r)),{V:e,C:i}}case M.publicKey.x25519:case M.publicKey.x448:{const i=bn(e),n=N.readExactSubarray(t,r,r+i);r+=n.length;const a=new gn;return a.read(t.subarray(r)),{ephemeralPublicKey:n,C:a}}case M.publicKey.aead:{const e=new yn;r+=e.read(t.subarray(r));const{ivLength:i}=mn(e.getValue()),n=t.subarray(r,r+i);r+=i;const a=new sn;return r+=a.read(t.subarray(r)),{aeadMode:e,iv:n,c:a}}default:throw new ti("Unknown public key encryption algorithm.")}},parsePrivateKeyParams:function(e,t,r){let i=0;switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:{const e=N.readMPI(t.subarray(i));i+=e.length+2;const r=N.readMPI(t.subarray(i));i+=r.length+2;const n=N.readMPI(t.subarray(i));i+=n.length+2;const a=N.readMPI(t.subarray(i));return i+=a.length+2,{read:i,privateParams:{d:e,p:r,q:n,u:a}}}case M.publicKey.dsa:case M.publicKey.elgamal:{const e=N.readMPI(t.subarray(i));return i+=e.length+2,{read:i,privateParams:{x:e}}}case M.publicKey.ecdsa:case M.publicKey.ecdh:{const n=bn(e,r.oid);let a=N.readMPI(t.subarray(i));return i+=a.length+2,a=N.leftPad(a,n),{read:i,privateParams:{d:a}}}case M.publicKey.eddsaLegacy:{const n=bn(e,r.oid);let a=N.readMPI(t.subarray(i));return i+=a.length+2,a=N.leftPad(a,n),{read:i,privateParams:{seed:a}}}case M.publicKey.ed25519:case M.publicKey.ed448:{const r=bn(e),n=N.readExactSubarray(t,i,i+r);return i+=n.length,{read:i,privateParams:{seed:n}}}case M.publicKey.x25519:case M.publicKey.x448:{const r=bn(e),n=N.readExactSubarray(t,i,i+r);return i+=n.length,{read:i,privateParams:{k:n}}}case M.publicKey.hmac:{const{cipher:e}=r,n=qe.getHashByteLength(e.getValue()),a=t.subarray(i,i+32);i+=32;const s=t.subarray(i,i+n);return i+=n,{read:i,privateParams:{hashSeed:a,keyMaterial:s}}}case M.publicKey.aead:{const{cipher:e}=r,n=t.subarray(i,i+32);i+=32;const{keySize:a}=Ve(e.getValue()),s=t.subarray(i,i+a);return i+=a,{read:i,privateParams:{hashSeed:n,keyMaterial:s}}}default:throw new ti("Unknown public key encryption algorithm.")}},parsePublicKeyParams:function(e,t){let r=0;switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const i=N.readMPI(t.subarray(r));return r+=i.length+2,{read:r,publicParams:{n:e,e:i}}}case M.publicKey.dsa:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const i=N.readMPI(t.subarray(r));r+=i.length+2;const n=N.readMPI(t.subarray(r));r+=n.length+2;const a=N.readMPI(t.subarray(r));return r+=a.length+2,{read:r,publicParams:{p:e,q:i,g:n,y:a}}}case M.publicKey.elgamal:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const i=N.readMPI(t.subarray(r));r+=i.length+2;const n=N.readMPI(t.subarray(r));return r+=n.length+2,{read:r,publicParams:{p:e,g:i,y:n}}}case M.publicKey.ecdsa:{const e=new Wr;r+=e.read(t),wn(e);const i=N.readMPI(t.subarray(r));return r+=i.length+2,{read:r,publicParams:{oid:e,Q:i}}}case M.publicKey.eddsaLegacy:{const e=new Wr;r+=e.read(t),wn(e);let i=N.readMPI(t.subarray(r));return r+=i.length+2,i=N.leftPad(i,33),{read:r,publicParams:{oid:e,Q:i}}}case M.publicKey.ecdh:{const e=new Wr;r+=e.read(t),wn(e);const i=N.readMPI(t.subarray(r));r+=i.length+2;const n=new un;return r+=n.read(t.subarray(r)),{read:r,publicParams:{oid:e,Q:i,kdfParams:n}}}case M.publicKey.ed25519:case M.publicKey.ed448:case M.publicKey.x25519:case M.publicKey.x448:{const i=N.readExactSubarray(t,r,r+bn(e));return r+=i.length,{read:r,publicParams:{A:i}}}case M.publicKey.hmac:case M.publicKey.aead:{const e=new ln;r+=e.read(t);const i=qe.getHashByteLength(M.hash.sha256),n=t.subarray(r,r+i);return r+=i,{read:r,publicParams:{cipher:e,digest:n}}}default:throw new ti("Unknown public key encryption algorithm.")}},publicKeyDecrypt:async function(e,t,r,i,n,a){switch(e){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:{const{c:e}=i,{n,e:s}=t,{d:o,p:c,q:u,u:h}=r;return an.rsa.decrypt(e,n,s,o,c,u,h,a)}case M.publicKey.elgamal:{const{c1:e,c2:n}=i,s=t.p,o=r.x;return an.elgamal.decrypt(e,n,s,o,a)}case M.publicKey.ecdh:{const{oid:e,Q:a,kdfParams:s}=t,{d:o}=r,{V:c,C:u}=i;return an.elliptic.ecdh.decrypt(e,s,c,u.data,a,o,n)}case M.publicKey.x25519:case M.publicKey.x448:{const{A:n}=t,{k:a}=r,{ephemeralPublicKey:s,C:o}=i;if(null!==o.algorithm&&!N.isAES(o.algorithm))throw Error("AES session key expected");return an.elliptic.ecdhX.decrypt(e,s,o.wrappedKey,n,a)}case M.publicKey.aead:{const{cipher:e}=t,n=e.getValue(),{keyMaterial:a}=r,{aeadMode:s,iv:o,c}=i,u=mn(s.getValue());return(await u(n,a)).decrypt(c.data,o,new Uint8Array)}default:throw Error("Unknown public key encryption algorithm.")}},publicKeyEncrypt:async function(e,t,r,i,n,a){switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:{const{n:e,e:t}=r;return{c:await an.rsa.encrypt(n,e,t)}}case M.publicKey.elgamal:{const{p:e,g:t,y:i}=r;return an.elgamal.encrypt(n,e,t,i)}case M.publicKey.ecdh:{const{oid:e,Q:t,kdfParams:i}=r,{publicKey:s,wrappedKey:o}=await an.elliptic.ecdh.encrypt(e,i,n,t,a);return{V:s,C:new cn(o)}}case M.publicKey.x25519:case M.publicKey.x448:{if(!N.isAES(t))throw Error("X25519 and X448 keys can only encrypt AES session keys");const{A:i}=r,{ephemeralPublicKey:a,wrappedKey:s}=await an.elliptic.ecdhX.encrypt(e,n,i);return{ephemeralPublicKey:a,C:gn.fromObject({algorithm:t,wrappedKey:s})}}case M.publicKey.aead:{if(!i)throw Error("Cannot encrypt with symmetric key missing private parameters");const{cipher:e}=r,t=e.getValue(),{keyMaterial:a}=i,s=L.preferredAEADAlgorithm,o=mn(L.preferredAEADAlgorithm),{ivLength:c}=o,u=zt(c),h=await o(t,a),y=await h.encrypt(n,u,new Uint8Array);return{aeadMode:new yn(s),iv:u,c:new sn(y)}}default:return[]}},serializeParams:function(e,t){const r=new Set([M.publicKey.ed25519,M.publicKey.x25519,M.publicKey.ed448,M.publicKey.x448,M.publicKey.aead,M.publicKey.hmac]),i=Object.keys(t).map((i=>{const n=t[i];return N.isUint8Array(n)?r.has(e)?n:N.uint8ArrayToMPI(n):n.write()}));return N.concatUint8Array(i)},validateParams:async function(e,t,r){if(!t||!r)throw Error("Missing key parameters");switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:{const{n:e,e:i}=t,{d:n,p:a,q:s,u:o}=r;return an.rsa.validateParams(e,i,n,a,s,o)}case M.publicKey.dsa:{const{p:e,q:i,g:n,y:a}=t,{x:s}=r;return an.dsa.validateParams(e,i,n,a,s)}case M.publicKey.elgamal:{const{p:e,g:i,y:n}=t,{x:a}=r;return an.elgamal.validateParams(e,i,n,a)}case M.publicKey.ecdsa:case M.publicKey.ecdh:{const i=an.elliptic[M.read(M.publicKey,e)],{oid:n,Q:a}=t,{d:s}=r;return i.validateParams(n,a,s)}case M.publicKey.eddsaLegacy:{const{Q:e,oid:i}=t,{seed:n}=r;return an.elliptic.eddsaLegacy.validateParams(i,e,n)}case M.publicKey.ed25519:case M.publicKey.ed448:{const{A:i}=t,{seed:n}=r;return an.elliptic.eddsa.validateParams(e,i,n)}case M.publicKey.x25519:case M.publicKey.x448:{const{A:i}=t,{k:n}=r;return an.elliptic.ecdhX.validateParams(e,i,n)}case M.publicKey.hmac:{const{cipher:e,digest:i}=t,{hashSeed:n,keyMaterial:a}=r;return qe.getHashByteLength(e.getValue())===a.length&&N.equalsUint8Array(i,await qe.sha256(n))}case M.publicKey.aead:{const{cipher:e,digest:i}=t,{hashSeed:n,keyMaterial:a}=r,{keySize:s}=Ve(e.getValue());return s===a.length&&N.equalsUint8Array(i,await qe.sha256(n))}default:throw Error("Unknown public key algorithm.")}}});const vn={cipher:De,hash:qe,mode:Lt,publicKey:an,signature:on,random:Ot,pkcs1:Xt,pkcs5:Fi,aesKW:Ri};Object.assign(vn,kn);class An extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,An),this.name="Argon2OutOfMemoryError"}}let Kn,En;class Sn{constructor(e=L){const{passes:t,parallelism:r,memoryExponent:i}=e.s2kArgon2Params;this.type="argon2",this.salt=null,this.t=t,this.p=r,this.encodedM=i}generateSalt(){this.salt=vn.random.getRandomBytes(16)}read(e){let t=0;return this.salt=e.subarray(t,t+16),t+=16,this.t=e[t++],this.p=e[t++],this.encodedM=e[t++],t}write(){const e=[new Uint8Array([M.write(M.s2k,this.type)]),this.salt,new Uint8Array([this.t,this.p,this.encodedM])];return N.concatUint8Array(e)}async produceKey(e,t){const r=2<<this.encodedM-1;try{Kn=Kn||(await import("./argon2id.min.mjs")).default,En=En||Kn();const i=await En,n=i({version:19,type:2,password:N.encodeUTF8(e),salt:this.salt,tagLength:t,memorySize:r,parallelism:this.p,passes:this.t});return r>1048576&&(En=Kn(),En.catch((()=>{}))),n}catch(e){throw e.message&&(e.message.includes("Unable to grow instance memory")||e.message.includes("failed to grow memory")||e.message.includes("WebAssembly.Memory.grow")||e.message.includes("Out of memory"))?new An("Could not allocate required memory for Argon2"):e}}}class Pn{constructor(e,t=L){this.algorithm=M.hash.sha256,this.type=M.read(M.s2k,e),this.c=t.s2kIterationCountByte,this.salt=null}generateSalt(){switch(this.type){case"salted":case"iterated":this.salt=vn.random.getRandomBytes(8)}}getCount(){return 16+(15&this.c)<<6+(this.c>>4)}read(e){let t=0;switch(this.algorithm=e[t++],this.type){case"simple":break;case"salted":this.salt=e.subarray(t,t+8),t+=8;break;case"iterated":this.salt=e.subarray(t,t+8),t+=8,this.c=e[t++];break;case"gnu":if("GNU"!==N.uint8ArrayToString(e.subarray(t,t+3)))throw new ti("Unknown s2k type.");t+=3;if(1001!==1e3+e[t++])throw new ti("Unknown s2k gnu protection mode.");this.type="gnu-dummy";break;default:throw new ti("Unknown s2k type.")}return t}write(){if("gnu-dummy"===this.type)return new Uint8Array([101,0,...N.stringToUint8Array("GNU"),1]);const e=[new Uint8Array([M.write(M.s2k,this.type),this.algorithm])];switch(this.type){case"simple":break;case"salted":e.push(this.salt);break;case"iterated":e.push(this.salt),e.push(new Uint8Array([this.c]));break;case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}return N.concatUint8Array(e)}async produceKey(e,t){e=N.encodeUTF8(e);const r=[];let i=0,n=0;for(;i<t;){let t;switch(this.type){case"simple":t=N.concatUint8Array([new Uint8Array(n),e]);break;case"salted":t=N.concatUint8Array([new Uint8Array(n),this.salt,e]);break;case"iterated":{const r=N.concatUint8Array([this.salt,e]);let i=r.length;const a=Math.max(this.getCount(),i);t=new Uint8Array(n+a),t.set(r,n);for(let e=n+i;e<a;e+=i,i*=2)t.copyWithin(e,n,e);break}case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}const a=await vn.hash.digest(this.algorithm,t);r.push(a),i+=a.length,n++}return N.concatUint8Array(r).subarray(0,t)}}const Un=new Set([M.s2k.argon2,M.s2k.iterated]);function Dn(e,t=L){switch(e){case M.s2k.argon2:return new Sn(t);case M.s2k.iterated:case M.s2k.gnu:case M.s2k.salted:case M.s2k.simple:return new Pn(e,t);default:throw new ti("Unsupported S2K type")}}function Cn(e){const{s2kType:t}=e;if(!Un.has(t))throw Error("The provided `config.s2kType` value is not allowed");return Dn(t,e)}var xn=Uint8Array,Tn=Uint16Array,In=Uint32Array,_n=new xn([0,0,0,0,0,0,0,0,1,1,1,1,2,2,2,2,3,3,3,3,4,4,4,4,5,5,5,5,0,0,0,0]),Bn=new xn([0,0,0,0,1,1,2,2,3,3,4,4,5,5,6,6,7,7,8,8,9,9,10,10,11,11,12,12,13,13,0,0]),Rn=new xn([16,17,18,0,8,7,9,6,10,5,11,4,12,3,13,2,14,1,15]),Mn=function(e,t){for(var r=new Tn(31),i=0;i<31;++i)r[i]=t+=1<<e[i-1];var n=new In(r[30]);for(i=1;i<30;++i)for(var a=r[i];a<r[i+1];++a)n[a]=a-r[i]<<5|i;return[r,n]},Ln=Mn(_n,2),Fn=Ln[0],zn=Ln[1];Fn[28]=258,zn[258]=28;for(var Nn=Mn(Bn,0),On=Nn[0],Hn=Nn[1],jn=new Tn(32768),qn=0;qn<32768;++qn){var Gn=(43690&qn)>>>1|(21845&qn)<<1;Gn=(61680&(Gn=(52428&Gn)>>>2|(13107&Gn)<<2))>>>4|(3855&Gn)<<4,jn[qn]=((65280&Gn)>>>8|(255&Gn)<<8)>>>1}var Vn=function(e,t,r){for(var i=e.length,n=0,a=new Tn(t);n<i;++n)e[n]&&++a[e[n]-1];var s,o=new Tn(t);for(n=0;n<t;++n)o[n]=o[n-1]+a[n-1]<<1;if(r){s=new Tn(1<<t);var c=15-t;for(n=0;n<i;++n)if(e[n])for(var u=n<<4|e[n],h=t-e[n],y=o[e[n]-1]++<<h,l=y|(1<<h)-1;y<=l;++y)s[jn[y]>>>c]=u}else for(s=new Tn(i),n=0;n<i;++n)e[n]&&(s[n]=jn[o[e[n]-1]++]>>>15-e[n]);return s},Wn=new xn(288);for(qn=0;qn<144;++qn)Wn[qn]=8;for(qn=144;qn<256;++qn)Wn[qn]=9;for(qn=256;qn<280;++qn)Wn[qn]=7;for(qn=280;qn<288;++qn)Wn[qn]=8;var $n=new xn(32);for(qn=0;qn<32;++qn)$n[qn]=5;var Xn=/*#__PURE__*/Vn(Wn,9,0),Zn=/*#__PURE__*/Vn(Wn,9,1),Yn=/*#__PURE__*/Vn($n,5,0),Qn=/*#__PURE__*/Vn($n,5,1),Jn=function(e){for(var t=e[0],r=1;r<e.length;++r)e[r]>t&&(t=e[r]);return t},ea=function(e,t,r){var i=t/8|0;return(e[i]|e[i+1]<<8)>>(7&t)&r},ta=function(e,t){var r=t/8|0;return(e[r]|e[r+1]<<8|e[r+2]<<16)>>(7&t)},ra=function(e){return(e+7)/8|0},ia=function(e,t,r){(null==t||t<0)&&(t=0),(null==r||r>e.length)&&(r=e.length);var i=new(2==e.BYTES_PER_ELEMENT?Tn:4==e.BYTES_PER_ELEMENT?In:xn)(r-t);return i.set(e.subarray(t,r)),i},na=["unexpected EOF","invalid block type","invalid length/literal","invalid distance","stream finished","no stream handler",,"no callback","invalid UTF-8 data","extra field too long","date not in range 1980-2099","filename too long","stream finishing","invalid zip data"],aa=function(e,t,r){var i=Error(t||na[e]);if(i.code=e,Error.captureStackTrace&&Error.captureStackTrace(i,aa),!r)throw i;return i},sa=function(e,t,r){r<<=7&t;var i=t/8|0;e[i]|=r,e[i+1]|=r>>>8},oa=function(e,t,r){r<<=7&t;var i=t/8|0;e[i]|=r,e[i+1]|=r>>>8,e[i+2]|=r>>>16},ca=function(e,t){for(var r=[],i=0;i<e.length;++i)e[i]&&r.push({s:i,f:e[i]});var n=r.length,a=r.slice();if(!n)return[da,0];if(1==n){var s=new xn(r[0].s+1);return s[r[0].s]=1,[s,1]}r.sort((function(e,t){return e.f-t.f})),r.push({s:-1,f:25001});var o=r[0],c=r[1],u=0,h=1,y=2;for(r[0]={s:-1,f:o.f+c.f,l:o,r:c};h!=n-1;)o=r[r[u].f<r[y].f?u++:y++],c=r[u!=h&&r[u].f<r[y].f?u++:y++],r[h++]={s:-1,f:o.f+c.f,l:o,r:c};var l=a[0].s;for(i=1;i<n;++i)a[i].s>l&&(l=a[i].s);var p=new Tn(l+1),g=ua(r[h-1],p,0);if(g>t){i=0;var d=0,f=g-t,m=1<<f;for(a.sort((function(e,t){return p[t.s]-p[e.s]||e.f-t.f}));i<n;++i){var w=a[i].s;if(!(p[w]>t))break;d+=m-(1<<g-p[w]),p[w]=t}for(d>>>=f;d>0;){var b=a[i].s;p[b]<t?d-=1<<t-p[b]++-1:++i}for(;i>=0&&d;--i){var k=a[i].s;p[k]==t&&(--p[k],++d)}g=t}return[new xn(p),g]},ua=function(e,t,r){return-1==e.s?Math.max(ua(e.l,t,r+1),ua(e.r,t,r+1)):t[e.s]=r},ha=function(e){for(var t=e.length;t&&!e[--t];);for(var r=new Tn(++t),i=0,n=e[0],a=1,s=function(e){r[i++]=e},o=1;o<=t;++o)if(e[o]==n&&o!=t)++a;else{if(!n&&a>2){for(;a>138;a-=138)s(32754);a>2&&(s(a>10?a-11<<5|28690:a-3<<5|12305),a=0)}else if(a>3){for(s(n),--a;a>6;a-=6)s(8304);a>2&&(s(a-3<<5|8208),a=0)}for(;a--;)s(n);a=1,n=e[o]}return[r.subarray(0,i),t]},ya=function(e,t){for(var r=0,i=0;i<t.length;++i)r+=e[i]*t[i];return r},la=function(e,t,r){var i=r.length,n=ra(t+2);e[n]=255&i,e[n+1]=i>>>8,e[n+2]=255^e[n],e[n+3]=255^e[n+1];for(var a=0;a<i;++a)e[n+a+4]=r[a];return 8*(n+4+i)},pa=function(e,t,r,i,n,a,s,o,c,u,h){sa(t,h++,r),++n[256];for(var y=ca(n,15),l=y[0],p=y[1],g=ca(a,15),d=g[0],f=g[1],m=ha(l),w=m[0],b=m[1],k=ha(d),v=k[0],A=k[1],K=new Tn(19),E=0;E<w.length;++E)K[31&w[E]]++;for(E=0;E<v.length;++E)K[31&v[E]]++;for(var S=ca(K,7),P=S[0],U=S[1],D=19;D>4&&!P[Rn[D-1]];--D);var C,x,T,I,_=u+5<<3,B=ya(n,Wn)+ya(a,$n)+s,R=ya(n,l)+ya(a,d)+s+14+3*D+ya(K,P)+(2*K[16]+3*K[17]+7*K[18]);if(_<=B&&_<=R)return la(t,h,e.subarray(c,c+u));if(sa(t,h,1+(R<B)),h+=2,R<B){C=Vn(l,p,0),x=l,T=Vn(d,f,0),I=d;var M=Vn(P,U,0);sa(t,h,b-257),sa(t,h+5,A-1),sa(t,h+10,D-4),h+=14;for(E=0;E<D;++E)sa(t,h+3*E,P[Rn[E]]);h+=3*D;for(var L=[w,v],F=0;F<2;++F){var z=L[F];for(E=0;E<z.length;++E){var N=31&z[E];sa(t,h,M[N]),h+=P[N],N>15&&(sa(t,h,z[E]>>>5&127),h+=z[E]>>>12)}}}else C=Xn,x=Wn,T=Yn,I=$n;for(E=0;E<o;++E)if(i[E]>255){N=i[E]>>>18&31;oa(t,h,C[N+257]),h+=x[N+257],N>7&&(sa(t,h,i[E]>>>23&31),h+=_n[N]);var O=31&i[E];oa(t,h,T[O]),h+=I[O],O>3&&(oa(t,h,i[E]>>>5&8191),h+=Bn[O])}else oa(t,h,C[i[E]]),h+=x[i[E]];return oa(t,h,C[256]),h+x[256]},ga=/*#__PURE__*/new In([65540,131080,131088,131104,262176,1048704,1048832,2114560,2117632]),da=/*#__PURE__*/new xn(0),fa=function(){var e=1,t=0;return{p:function(r){for(var i=e,n=t,a=0|r.length,s=0;s!=a;){for(var o=Math.min(s+2655,a);s<o;++s)n+=i+=r[s];i=(65535&i)+15*(i>>16),n=(65535&n)+15*(n>>16)}e=i,t=n},d:function(){return(255&(e%=65521))<<24|e>>>8<<16|(255&(t%=65521))<<8|t>>>8}}},ma=function(e,t,r,i,n){return function(e,t,r,i,n,a){var s=e.length,o=new xn(i+s+5*(1+Math.ceil(s/7e3))+n),c=o.subarray(i,o.length-n),u=0;if(!t||s<8)for(var h=0;h<=s;h+=65535){var y=h+65535;y>=s&&(c[u>>3]=a),u=la(c,u+1,e.subarray(h,y))}else{for(var l=ga[t-1],p=l>>>13,g=8191&l,d=(1<<r)-1,f=new Tn(32768),m=new Tn(d+1),w=Math.ceil(r/3),b=2*w,k=function(t){return(e[t]^e[t+1]<<w^e[t+2]<<b)&d},v=new In(25e3),A=new Tn(288),K=new Tn(32),E=0,S=0,P=(h=0,0),U=0,D=0;h<s;++h){var C=k(h),x=32767&h,T=m[C];if(f[x]=T,m[C]=x,U<=h){var I=s-h;if((E>7e3||P>24576)&&I>423){u=pa(e,c,0,v,A,K,S,P,D,h-D,u),P=E=S=0,D=h;for(var _=0;_<286;++_)A[_]=0;for(_=0;_<30;++_)K[_]=0}var B=2,R=0,M=g,L=x-T&32767;if(I>2&&C==k(h-L))for(var F=Math.min(p,I)-1,z=Math.min(32767,h),N=Math.min(258,I);L<=z&&--M&&x!=T;){if(e[h+B]==e[h+B-L]){for(var O=0;O<N&&e[h+O]==e[h+O-L];++O);if(O>B){if(B=O,R=L,O>F)break;var H=Math.min(L,O-2),j=0;for(_=0;_<H;++_){var q=h-L+_+32768&32767,G=q-f[q]+32768&32767;G>j&&(j=G,T=q)}}}L+=(x=T)-(T=f[x])+32768&32767}if(R){v[P++]=268435456|zn[B]<<18|Hn[R];var V=31&zn[B],W=31&Hn[R];S+=_n[V]+Bn[W],++A[257+V],++K[W],U=h+B,++E}else v[P++]=e[h],++A[e[h]]}}u=pa(e,c,a,v,A,K,S,P,D,h-D,u),!a&&7&u&&(u=la(c,u+1,da))}return ia(o,0,i+ra(u)+n)}(e,null==t.level?6:t.level,null==t.mem?Math.ceil(1.5*Math.max(8,Math.min(13,Math.log(e.length)))):12+t.mem,r,i,!n)},wa=/*#__PURE__*/function(){function e(e,t){t||"function"!=typeof e||(t=e,e={}),this.ondata=t,this.o=e||{}}return e.prototype.p=function(e,t){this.ondata(ma(e,this.o,0,0,!t),t)},e.prototype.push=function(e,t){this.ondata||aa(5),this.d&&aa(4),this.d=t,this.p(e,t||!1)},e}(),ba=/*#__PURE__*/function(){function e(e){this.s={},this.p=new xn(0),this.ondata=e}return e.prototype.e=function(e){this.ondata||aa(5),this.d&&aa(4);var t=this.p.length,r=new xn(t+e.length);r.set(this.p),r.set(e,t),this.p=r},e.prototype.c=function(e){this.d=this.s.i=e||!1;var t=this.s.b,r=function(e,t,r){var i=e.length;if(!i||r&&r.f&&!r.l)return t||new xn(0);var n=!t||r,a=!r||r.i;r||(r={}),t||(t=new xn(3*i));var s=function(e){var r=t.length;if(e>r){var i=new xn(Math.max(2*r,e));i.set(t),t=i}},o=r.f||0,c=r.p||0,u=r.b||0,h=r.l,y=r.d,l=r.m,p=r.n,g=8*i;do{if(!h){o=ea(e,c,1);var d=ea(e,c+1,3);if(c+=3,!d){var f=e[(U=ra(c)+4)-4]|e[U-3]<<8,m=U+f;if(m>i){a&&aa(0);break}n&&s(u+f),t.set(e.subarray(U,m),u),r.b=u+=f,r.p=c=8*m,r.f=o;continue}if(1==d)h=Zn,y=Qn,l=9,p=5;else if(2==d){var w=ea(e,c,31)+257,b=ea(e,c+10,15)+4,k=w+ea(e,c+5,31)+1;c+=14;for(var v=new xn(k),A=new xn(19),K=0;K<b;++K)A[Rn[K]]=ea(e,c+3*K,7);c+=3*b;var E=Jn(A),S=(1<<E)-1,P=Vn(A,E,1);for(K=0;K<k;){var U,D=P[ea(e,c,S)];if(c+=15&D,(U=D>>>4)<16)v[K++]=U;else{var C=0,x=0;for(16==U?(x=3+ea(e,c,3),c+=2,C=v[K-1]):17==U?(x=3+ea(e,c,7),c+=3):18==U&&(x=11+ea(e,c,127),c+=7);x--;)v[K++]=C}}var T=v.subarray(0,w),I=v.subarray(w);l=Jn(T),p=Jn(I),h=Vn(T,l,1),y=Vn(I,p,1)}else aa(1);if(c>g){a&&aa(0);break}}n&&s(u+131072);for(var _=(1<<l)-1,B=(1<<p)-1,R=c;;R=c){var M=(C=h[ta(e,c)&_])>>>4;if((c+=15&C)>g){a&&aa(0);break}if(C||aa(2),M<256)t[u++]=M;else{if(256==M){R=c,h=null;break}var L=M-254;if(M>264){var F=_n[K=M-257];L=ea(e,c,(1<<F)-1)+Fn[K],c+=F}var z=y[ta(e,c)&B],N=z>>>4;if(z||aa(3),c+=15&z,I=On[N],N>3&&(F=Bn[N],I+=ta(e,c)&(1<<F)-1,c+=F),c>g){a&&aa(0);break}n&&s(u+131072);for(var O=u+L;u<O;u+=4)t[u]=t[u-I],t[u+1]=t[u+1-I],t[u+2]=t[u+2-I],t[u+3]=t[u+3-I];u=O}}r.l=h,r.p=R,r.b=u,r.f=o,h&&(o=1,r.m=l,r.d=y,r.n=p)}while(!o);return u==t.length?t:ia(t,0,u)}(this.p,this.o,this.s);this.ondata(ia(r,t,this.s.b),this.d),this.o=ia(r,this.s.b-32768),this.s.b=this.o.length,this.p=ia(this.p,this.s.p/8|0),this.s.p&=7},e.prototype.push=function(e,t){this.e(e),this.c(t)},e}(),ka=/*#__PURE__*/function(){function e(e,t){this.c=fa(),this.v=1,wa.call(this,e,t)}return e.prototype.push=function(e,t){wa.prototype.push.call(this,e,t)},e.prototype.p=function(e,t){this.c.p(e);var r=ma(e,this.o,this.v&&2,t&&4,!t);this.v&&(function(e,t){var r=t.level,i=0==r?0:r<6?1:9==r?3:2;e[0]=120,e[1]=i<<6|(i?32-2*i:1)}(r,this.o),this.v=0),t&&function(e,t,r){for(;r;++t)e[t]=r,r>>>=8}(r,r.length-4,this.c.d()),this.ondata(r,t)},e}(),va=/*#__PURE__*/function(){function e(e){this.v=1,ba.call(this,e)}return e.prototype.push=function(e,t){if(ba.prototype.e.call(this,e),this.v){if(this.p.length<2&&!t)return;this.p=this.p.subarray(2),this.v=0}t&&(this.p.length<4&&aa(6,"invalid zlib data"),this.p=this.p.subarray(0,-4)),ba.prototype.c.call(this,t)},e}(),Aa="undefined"!=typeof TextDecoder&&/*#__PURE__*/new TextDecoder;try{Aa.decode(da,{stream:!0}),1}catch(e){}var Ka=[0,1,3,7,15,31,63,127,255],Ea=function(e){this.stream=e,this.bitOffset=0,this.curByte=0,this.hasByte=!1};Ea.prototype._ensureByte=function(){this.hasByte||(this.curByte=this.stream.readByte(),this.hasByte=!0)},Ea.prototype.read=function(e){for(var t=0;e>0;){this._ensureByte();var r=8-this.bitOffset;if(e>=r)t<<=r,t|=Ka[r]&this.curByte,this.hasByte=!1,this.bitOffset=0,e-=r;else{t<<=e;var i=r-e;t|=(this.curByte&Ka[e]<<i)>>i,this.bitOffset+=e,e=0}}return t},Ea.prototype.seek=function(e){var t=e%8,r=(e-t)/8;this.bitOffset=t,this.stream.seek(r),this.hasByte=!1},Ea.prototype.pi=function(){var e,t=new Uint8Array(6);for(e=0;e<t.length;e++)t[e]=this.read(8);return function(e){return Array.prototype.map.call(e,(e=>("00"+e.toString(16)).slice(-2))).join("")}(t)};var Sa=Ea,Pa=function(){};Pa.prototype.readByte=function(){throw Error("abstract method readByte() not implemented")},Pa.prototype.read=function(e,t,r){for(var i=0;i<r;){var n=this.readByte();if(n<0)return 0===i?-1:i;e[t++]=n,i++}return i},Pa.prototype.seek=function(e){throw Error("abstract method seek() not implemented")},Pa.prototype.writeByte=function(e){throw Error("abstract method readByte() not implemented")},Pa.prototype.write=function(e,t,r){var i;for(i=0;i<r;i++)this.writeByte(e[t++]);return r},Pa.prototype.flush=function(){};var Ua,Da=Pa,Ca=(Ua=new Uint32Array([0,79764919,159529838,222504665,319059676,398814059,445009330,507990021,638119352,583659535,797628118,726387553,890018660,835552979,1015980042,944750013,1276238704,1221641927,1167319070,1095957929,1595256236,1540665371,1452775106,1381403509,1780037320,1859660671,1671105958,1733955601,2031960084,2111593891,1889500026,1952343757,2552477408,2632100695,2443283854,2506133561,2334638140,2414271883,2191915858,2254759653,3190512472,3135915759,3081330742,3009969537,2905550212,2850959411,2762807018,2691435357,3560074640,3505614887,3719321342,3648080713,3342211916,3287746299,3467911202,3396681109,4063920168,4143685023,4223187782,4286162673,3779000052,3858754371,3904687514,3967668269,881225847,809987520,1023691545,969234094,662832811,591600412,771767749,717299826,311336399,374308984,453813921,533576470,25881363,88864420,134795389,214552010,2023205639,2086057648,1897238633,1976864222,1804852699,1867694188,1645340341,1724971778,1587496639,1516133128,1461550545,1406951526,1302016099,1230646740,1142491917,1087903418,2896545431,2825181984,2770861561,2716262478,3215044683,3143675388,3055782693,3001194130,2326604591,2389456536,2200899649,2280525302,2578013683,2640855108,2418763421,2498394922,3769900519,3832873040,3912640137,3992402750,4088425275,4151408268,4197601365,4277358050,3334271071,3263032808,3476998961,3422541446,3585640067,3514407732,3694837229,3640369242,1762451694,1842216281,1619975040,1682949687,2047383090,2127137669,1938468188,2001449195,1325665622,1271206113,1183200824,1111960463,1543535498,1489069629,1434599652,1363369299,622672798,568075817,748617968,677256519,907627842,853037301,1067152940,995781531,51762726,131386257,177728840,240578815,269590778,349224269,429104020,491947555,4046411278,4126034873,4172115296,4234965207,3794477266,3874110821,3953728444,4016571915,3609705398,3555108353,3735388376,3664026991,3290680682,3236090077,3449943556,3378572211,3174993278,3120533705,3032266256,2961025959,2923101090,2868635157,2813903052,2742672763,2604032198,2683796849,2461293480,2524268063,2284983834,2364738477,2175806836,2238787779,1569362073,1498123566,1409854455,1355396672,1317987909,1246755826,1192025387,1137557660,2072149281,2135122070,1912620623,1992383480,1753615357,1816598090,1627664531,1707420964,295390185,358241886,404320391,483945776,43990325,106832002,186451547,266083308,932423249,861060070,1041341759,986742920,613929101,542559546,756411363,701822548,3316196985,3244833742,3425377559,3370778784,3601682597,3530312978,3744426955,3689838204,3819031489,3881883254,3928223919,4007849240,4037393693,4100235434,4180117107,4259748804,2310601993,2373574846,2151335527,2231098320,2596047829,2659030626,2470359227,2550115596,2947551409,2876312838,2788305887,2733848168,3165939309,3094707162,3040238851,2985771188]),function(){var e=4294967295;this.getCRC=function(){return~e>>>0},this.updateCRC=function(t){e=e<<8^Ua[255&(e>>>24^t)]},this.updateCRCRun=function(t,r){for(;r-- >0;)e=e<<8^Ua[255&(e>>>24^t)]}}),xa=Sa,Ta=Da,Ia=Ca,_a=function(e,t){var r,i=e[t];for(r=t;r>0;r--)e[r]=e[r-1];return e[0]=i,i},Ba={OK:0,LAST_BLOCK:-1,NOT_BZIP_DATA:-2,UNEXPECTED_INPUT_EOF:-3,UNEXPECTED_OUTPUT_EOF:-4,DATA_ERROR:-5,OUT_OF_MEMORY:-6,OBSOLETE_INPUT:-7,END_OF_BLOCK:-8},Ra={};Ra[Ba.LAST_BLOCK]="Bad file checksum",Ra[Ba.NOT_BZIP_DATA]="Not bzip data",Ra[Ba.UNEXPECTED_INPUT_EOF]="Unexpected input EOF",Ra[Ba.UNEXPECTED_OUTPUT_EOF]="Unexpected output EOF",Ra[Ba.DATA_ERROR]="Data error",Ra[Ba.OUT_OF_MEMORY]="Out of memory",Ra[Ba.OBSOLETE_INPUT]="Obsolete (pre 0.9.5) bzip format not supported.";var Ma=function(e,t){var r=Ra[e]||"unknown error";t&&(r+=": "+t);var i=new TypeError(r);throw i.errorCode=e,i},La=function(e,t){this.writePos=this.writeCurrent=this.writeCount=0,this._start_bunzip(e,t)};La.prototype._init_block=function(){return this._get_next_block()?(this.blockCRC=new Ia,!0):(this.writeCount=-1,!1)},La.prototype._start_bunzip=function(e,t){var r=new Uint8Array(4);4===e.read(r,0,4)&&"BZh"===String.fromCharCode(r[0],r[1],r[2])||Ma(Ba.NOT_BZIP_DATA,"bad magic");var i=r[3]-48;(i<1||i>9)&&Ma(Ba.NOT_BZIP_DATA,"level out of range"),this.reader=new xa(e),this.dbufSize=1e5*i,this.nextoutput=0,this.outputStream=t,this.streamCRC=0},La.prototype._get_next_block=function(){var e,t,r,i=this.reader,n=i.pi();if("177245385090"===n)return!1;"314159265359"!==n&&Ma(Ba.NOT_BZIP_DATA),this.targetBlockCRC=i.read(32)>>>0,this.streamCRC=(this.targetBlockCRC^(this.streamCRC<<1|this.streamCRC>>>31))>>>0,i.read(1)&&Ma(Ba.OBSOLETE_INPUT);var a=i.read(24);a>this.dbufSize&&Ma(Ba.DATA_ERROR,"initial position out of bounds");var s=i.read(16),o=new Uint8Array(256),c=0;for(e=0;e<16;e++)if(s&1<<15-e){var u=16*e;for(r=i.read(16),t=0;t<16;t++)r&1<<15-t&&(o[c++]=u+t)}var h=i.read(3);(h<2||h>6)&&Ma(Ba.DATA_ERROR);var y=i.read(15);0===y&&Ma(Ba.DATA_ERROR);var l=new Uint8Array(256);for(e=0;e<h;e++)l[e]=e;var p=new Uint8Array(y);for(e=0;e<y;e++){for(t=0;i.read(1);t++)t>=h&&Ma(Ba.DATA_ERROR);p[e]=_a(l,t)}var g,d=c+2,f=[];for(t=0;t<h;t++){var m,w,b=new Uint8Array(d),k=new Uint16Array(21);for(s=i.read(5),e=0;e<d;e++){for(;(s<1||s>20)&&Ma(Ba.DATA_ERROR),i.read(1);)i.read(1)?s--:s++;b[e]=s}for(m=w=b[0],e=1;e<d;e++)b[e]>w?w=b[e]:b[e]<m&&(m=b[e]);g={},f.push(g),g.permute=new Uint16Array(258),g.limit=new Uint32Array(22),g.base=new Uint32Array(21),g.minLen=m,g.maxLen=w;var v=0;for(e=m;e<=w;e++)for(k[e]=g.limit[e]=0,s=0;s<d;s++)b[s]===e&&(g.permute[v++]=s);for(e=0;e<d;e++)k[b[e]]++;for(v=s=0,e=m;e<w;e++)v+=k[e],g.limit[e]=v-1,v<<=1,s+=k[e],g.base[e+1]=v-s;g.limit[w+1]=Number.MAX_VALUE,g.limit[w]=v+k[w]-1,g.base[m]=0}var A=new Uint32Array(256);for(e=0;e<256;e++)l[e]=e;var K,E=0,S=0,P=0,U=this.dbuf=new Uint32Array(this.dbufSize);for(d=0;;){for(d--||(d=49,P>=y&&Ma(Ba.DATA_ERROR),g=f[p[P++]]),e=g.minLen,t=i.read(e);e>g.maxLen&&Ma(Ba.DATA_ERROR),!(t<=g.limit[e]);e++)t=t<<1|i.read(1);((t-=g.base[e])<0||t>=258)&&Ma(Ba.DATA_ERROR);var D=g.permute[t];if(0!==D&&1!==D){if(E)for(E=0,S+s>this.dbufSize&&Ma(Ba.DATA_ERROR),A[K=o[l[0]]]+=s;s--;)U[S++]=K;if(D>c)break;S>=this.dbufSize&&Ma(Ba.DATA_ERROR),A[K=o[K=_a(l,e=D-1)]]++,U[S++]=K}else E||(E=1,s=0),s+=0===D?E:2*E,E<<=1}for((a<0||a>=S)&&Ma(Ba.DATA_ERROR),t=0,e=0;e<256;e++)r=t+A[e],A[e]=t,t=r;for(e=0;e<S;e++)U[A[K=255&U[e]]]|=e<<8,A[K]++;var C=0,x=0,T=0;return S&&(x=255&(C=U[a]),C>>=8,T=-1),this.writePos=C,this.writeCurrent=x,this.writeCount=S,this.writeRun=T,!0},La.prototype._read_bunzip=function(e,t){var r,i,n;if(this.writeCount<0)return 0;var a=this.dbuf,s=this.writePos,o=this.writeCurrent,c=this.writeCount;this.outputsize;for(var u=this.writeRun;c;){for(c--,i=o,o=255&(s=a[s]),s>>=8,3==u++?(r=o,n=i,o=-1):(r=1,n=o),this.blockCRC.updateCRCRun(n,r);r--;)this.outputStream.writeByte(n),this.nextoutput++;o!=i&&(u=0)}return this.writeCount=c,this.blockCRC.getCRC()!==this.targetBlockCRC&&Ma(Ba.DATA_ERROR,"Bad block CRC (got "+this.blockCRC.getCRC().toString(16)+" expected "+this.targetBlockCRC.toString(16)+")"),this.nextoutput};var Fa=function(e){if("readByte"in e)return e;var t=new Ta;return t.pos=0,t.readByte=function(){return e[this.pos++]},t.seek=function(e){this.pos=e},t.eof=function(){return this.pos>=e.length},t},za=function(e){var t=new Ta,r=!0;if(e)if("number"==typeof e)t.buffer=new Uint8Array(e),r=!1;else{if("writeByte"in e)return e;t.buffer=e,r=!1}else t.buffer=new Uint8Array(16384);return t.pos=0,t.writeByte=function(e){if(r&&this.pos>=this.buffer.length){var t=new Uint8Array(2*this.buffer.length);t.set(this.buffer),this.buffer=t}this.buffer[this.pos++]=e},t.getBuffer=function(){if(this.pos!==this.buffer.length){if(!r)throw new TypeError("outputsize does not match decoded input");var e=new Uint8Array(this.pos);e.set(this.buffer.subarray(0,this.pos)),this.buffer=e}return this.buffer},t._coerced=!0,t};var Na=function(e,t,r){for(var i=Fa(e),n=za(t),a=new La(i,n);!("eof"in i)||!i.eof();)if(a._init_block())a._read_bunzip();else{var s=a.reader.read(32)>>>0;if(s!==a.streamCRC&&Ma(Ba.DATA_ERROR,"Bad stream CRC (got "+a.streamCRC.toString(16)+" expected "+s.toString(16)+")"),!r||!("eof"in i)||i.eof())break;a._start_bunzip(i,n)}if("getBuffer"in n)return n.getBuffer()};class Oa{static get tag(){return M.packet.literalData}constructor(e=new Date){this.format=M.literal.utf8,this.date=N.normalizeDate(e),this.text=null,this.data=null,this.filename=""}setText(e,t=M.literal.utf8){this.format=t,this.text=e,this.data=null}getText(e=!1){return(null===this.text||N.isStream(this.text))&&(this.text=N.decodeUTF8(N.nativeEOL(this.getBytes(e)))),this.text}setBytes(e,t){this.format=t,this.data=e,this.text=null}getBytes(e=!1){return null===this.data&&(this.data=N.canonicalizeEOL(N.encodeUTF8(this.text))),e?U(this.data):this.data}setFilename(e){this.filename=e}getFilename(){return this.filename}async read(e){await S(e,(async e=>{const t=await e.readByte(),r=await e.readByte();this.filename=N.decodeUTF8(await e.readBytes(r)),this.date=N.readDate(await e.readBytes(4));let i=e.remainder();s(i)&&(i=await x(i)),this.setBytes(i,t)}))}writeHeader(){const e=N.encodeUTF8(this.filename),t=new Uint8Array([e.length]),r=new Uint8Array([this.format]),i=N.writeDate(this.date);return N.concatUint8Array([r,t,e,i])}write(){const e=this.writeHeader(),t=this.getBytes();return N.concat([e,t])}}class Ha{constructor(){this.bytes=""}read(e){return this.bytes=N.uint8ArrayToString(e.subarray(0,8)),this.bytes.length}write(){return N.stringToUint8Array(this.bytes)}toHex(){return N.uint8ArrayToHex(N.stringToUint8Array(this.bytes))}equals(e,t=!1){return t&&(e.isWildcard()||this.isWildcard())||this.bytes===e.bytes}isNull(){return""===this.bytes}isWildcard(){return/^0+$/.test(this.toHex())}static mapToHex(e){return e.toHex()}static fromID(e){const t=new Ha;return t.read(N.hexToUint8Array(e)),t}static wildcard(){const e=new Ha;return e.read(new Uint8Array(8)),e}}const ja=Symbol("verified"),qa=new Set([M.signatureSubpacket.issuerKeyID,M.signatureSubpacket.issuerFingerprint,M.signatureSubpacket.embeddedSignature]);class Ga{static get tag(){return M.packet.signature}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.signatureData=null,this.unhashedSubpackets=[],this.signedHashValue=null,this.salt=null,this.created=null,this.signatureExpirationTime=null,this.signatureNeverExpires=!0,this.exportable=null,this.trustLevel=null,this.trustAmount=null,this.regularExpression=null,this.revocable=null,this.keyExpirationTime=null,this.keyNeverExpires=null,this.preferredSymmetricAlgorithms=null,this.revocationKeyClass=null,this.revocationKeyAlgorithm=null,this.revocationKeyFingerprint=null,this.issuerKeyID=new Ha,this.rawNotations=[],this.notations={},this.preferredHashAlgorithms=null,this.preferredCompressionAlgorithms=null,this.keyServerPreferences=null,this.preferredKeyServer=null,this.isPrimaryUserID=null,this.policyURI=null,this.keyFlags=null,this.signersUserID=null,this.reasonForRevocationFlag=null,this.reasonForRevocationString=null,this.features=null,this.signatureTargetPublicKeyAlgorithm=null,this.signatureTargetHashAlgorithm=null,this.signatureTargetHash=null,this.embeddedSignature=null,this.issuerKeyVersion=null,this.issuerFingerprint=null,this.preferredAEADAlgorithms=null,this.preferredCipherSuites=null,this.revoked=null,this[ja]=null}read(e){let t=0;if(this.version=e[t++],4!==this.version&&5!==this.version&&6!==this.version)throw new ti(`Version ${this.version} of the signature packet is unsupported.`);if(this.signatureType=e[t++],this.publicKeyAlgorithm=e[t++],this.hashAlgorithm=e[t++],t+=this.readSubPackets(e.subarray(t,e.length),!0),!this.created)throw Error("Missing signature creation time subpacket.");if(this.signatureData=e.subarray(0,t),t+=this.readSubPackets(e.subarray(t,e.length),!1),this.signedHashValue=e.subarray(t,t+2),t+=2,6===this.version){const r=e[t++];this.salt=e.subarray(t,t+r),t+=r}const r=e.subarray(t,e.length),{read:i,signatureParams:n}=vn.signature.parseSignatureParams(this.publicKeyAlgorithm,r);if(i<r.length)throw Error("Error reading MPIs");this.params=n}writeParams(){return this.params instanceof Promise?I((async()=>vn.serializeParams(this.publicKeyAlgorithm,await this.params))):vn.serializeParams(this.publicKeyAlgorithm,this.params)}write(){const e=[];return e.push(this.signatureData),e.push(this.writeUnhashedSubPackets()),e.push(this.signedHashValue),6===this.version&&(e.push(new Uint8Array([this.salt.length])),e.push(this.salt)),e.push(this.writeParams()),N.concat(e)}async sign(e,t,r=new Date,i=!1){this.version=e.version,this.created=N.normalizeDate(r),this.issuerKeyVersion=e.version,this.issuerFingerprint=e.getFingerprintBytes(),this.issuerKeyID=e.getKeyID();const n=[new Uint8Array([this.version,this.signatureType,this.publicKeyAlgorithm,this.hashAlgorithm])];if(n.push(this.writeHashedSubPackets()),this.unhashedSubpackets=[],this.signatureData=N.concat(n),6===this.version){const e=Wa(this.hashAlgorithm);if(null===this.salt)this.salt=vn.random.getRandomBytes(e);else if(e!==this.salt.length)throw Error("Provided salt does not have the required length")}const a=this.toHash(this.signatureType,t,i),s=await this.hash(this.signatureType,t,a,i);this.signedHashValue=C(P(s),0,2);const o=async()=>vn.signature.sign(this.publicKeyAlgorithm,this.hashAlgorithm,e.publicParams,e.privateParams,a,await x(s));N.isStream(s)?this.params=o():(this.params=await o(),this[ja]=!0)}writeHashedSubPackets(){const e=M.signatureSubpacket,t=[];let r;if(null===this.created)throw Error("Missing signature creation time");t.push(Va(e.signatureCreationTime,!0,N.writeDate(this.created))),null!==this.signatureExpirationTime&&t.push(Va(e.signatureExpirationTime,!0,N.writeNumber(this.signatureExpirationTime,4))),null!==this.exportable&&t.push(Va(e.exportableCertification,!0,new Uint8Array([this.exportable?1:0]))),null!==this.trustLevel&&(r=new Uint8Array([this.trustLevel,this.trustAmount]),t.push(Va(e.trustSignature,!0,r))),null!==this.regularExpression&&t.push(Va(e.regularExpression,!0,this.regularExpression)),null!==this.revocable&&t.push(Va(e.revocable,!0,new Uint8Array([this.revocable?1:0]))),null!==this.keyExpirationTime&&t.push(Va(e.keyExpirationTime,!0,N.writeNumber(this.keyExpirationTime,4))),null!==this.preferredSymmetricAlgorithms&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.preferredSymmetricAlgorithms)),t.push(Va(e.preferredSymmetricAlgorithms,!1,r))),null!==this.revocationKeyClass&&(r=new Uint8Array([this.revocationKeyClass,this.revocationKeyAlgorithm]),r=N.concat([r,this.revocationKeyFingerprint]),t.push(Va(e.revocationKey,!1,r))),!this.issuerKeyID.isNull()&&this.issuerKeyVersion<5&&t.push(Va(e.issuerKeyID,!0,this.issuerKeyID.write())),this.rawNotations.forEach((({name:i,value:n,humanReadable:a,critical:s})=>{r=[new Uint8Array([a?128:0,0,0,0])];const o=N.encodeUTF8(i);r.push(N.writeNumber(o.length,2)),r.push(N.writeNumber(n.length,2)),r.push(o),r.push(n),r=N.concat(r),t.push(Va(e.notationData,s,r))})),null!==this.preferredHashAlgorithms&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.preferredHashAlgorithms)),t.push(Va(e.preferredHashAlgorithms,!1,r))),null!==this.preferredCompressionAlgorithms&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.preferredCompressionAlgorithms)),t.push(Va(e.preferredCompressionAlgorithms,!1,r))),null!==this.keyServerPreferences&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.keyServerPreferences)),t.push(Va(e.keyServerPreferences,!1,r))),null!==this.preferredKeyServer&&t.push(Va(e.preferredKeyServer,!1,N.encodeUTF8(this.preferredKeyServer))),null!==this.isPrimaryUserID&&t.push(Va(e.primaryUserID,!1,new Uint8Array([this.isPrimaryUserID?1:0]))),null!==this.policyURI&&t.push(Va(e.policyURI,!1,N.encodeUTF8(this.policyURI))),null!==this.keyFlags&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.keyFlags)),t.push(Va(e.keyFlags,!0,r))),null!==this.signersUserID&&t.push(Va(e.signersUserID,!1,N.encodeUTF8(this.signersUserID))),null!==this.reasonForRevocationFlag&&(r=N.stringToUint8Array(String.fromCharCode(this.reasonForRevocationFlag)+this.reasonForRevocationString),t.push(Va(e.reasonForRevocation,!0,r))),null!==this.features&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.features)),t.push(Va(e.features,!1,r))),null!==this.signatureTargetPublicKeyAlgorithm&&(r=[new Uint8Array([this.signatureTargetPublicKeyAlgorithm,this.signatureTargetHashAlgorithm])],r.push(N.stringToUint8Array(this.signatureTargetHash)),r=N.concat(r),t.push(Va(e.signatureTarget,!0,r))),null!==this.embeddedSignature&&t.push(Va(e.embeddedSignature,!0,this.embeddedSignature.write())),null!==this.issuerFingerprint&&(r=[new Uint8Array([this.issuerKeyVersion]),this.issuerFingerprint],r=N.concat(r),t.push(Va(e.issuerFingerprint,this.version>=5,r))),null!==this.preferredAEADAlgorithms&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.preferredAEADAlgorithms)),t.push(Va(e.preferredAEADAlgorithms,!1,r))),null!==this.preferredCipherSuites&&(r=new Uint8Array([].concat(...this.preferredCipherSuites)),t.push(Va(e.preferredCipherSuites,!1,r)));const i=N.concat(t),n=N.writeNumber(i.length,6===this.version?4:2);return N.concat([n,i])}writeUnhashedSubPackets(){const e=[];this.unhashedSubpackets.forEach((t=>{e.push(Xr(t.length)),e.push(t)}));const t=N.concat(e),r=N.writeNumber(t.length,6===this.version?4:2);return N.concat([r,t])}readSubPacket(e,t=!0){let r=0;const i=!!(128&e[r]),n=127&e[r];if(t||(this.unhashedSubpackets.push(e.subarray(r,e.length)),qa.has(n)))switch(r++,n){case M.signatureSubpacket.signatureCreationTime:this.created=N.readDate(e.subarray(r,e.length));break;case M.signatureSubpacket.signatureExpirationTime:{const t=N.readNumber(e.subarray(r,e.length));this.signatureNeverExpires=0===t,this.signatureExpirationTime=t;break}case M.signatureSubpacket.exportableCertification:this.exportable=1===e[r++];break;case M.signatureSubpacket.trustSignature:this.trustLevel=e[r++],this.trustAmount=e[r++];break;case M.signatureSubpacket.regularExpression:this.regularExpression=e[r];break;case M.signatureSubpacket.revocable:this.revocable=1===e[r++];break;case M.signatureSubpacket.keyExpirationTime:{const t=N.readNumber(e.subarray(r,e.length));this.keyExpirationTime=t,this.keyNeverExpires=0===t;break}case M.signatureSubpacket.preferredSymmetricAlgorithms:this.preferredSymmetricAlgorithms=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.revocationKey:this.revocationKeyClass=e[r++],this.revocationKeyAlgorithm=e[r++],this.revocationKeyFingerprint=e.subarray(r,r+20);break;case M.signatureSubpacket.issuerKeyID:if(4===this.version)this.issuerKeyID.read(e.subarray(r,e.length));else if(t)throw Error("Unexpected Issuer Key ID subpacket");break;case M.signatureSubpacket.notationData:{const t=!!(128&e[r]);r+=4;const n=N.readNumber(e.subarray(r,r+2));r+=2;const a=N.readNumber(e.subarray(r,r+2));r+=2;const s=N.decodeUTF8(e.subarray(r,r+n)),o=e.subarray(r+n,r+n+a);this.rawNotations.push({name:s,humanReadable:t,value:o,critical:i}),t&&(this.notations[s]=N.decodeUTF8(o));break}case M.signatureSubpacket.preferredHashAlgorithms:this.preferredHashAlgorithms=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.preferredCompressionAlgorithms:this.preferredCompressionAlgorithms=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.keyServerPreferences:this.keyServerPreferences=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.preferredKeyServer:this.preferredKeyServer=N.decodeUTF8(e.subarray(r,e.length));break;case M.signatureSubpacket.primaryUserID:this.isPrimaryUserID=0!==e[r++];break;case M.signatureSubpacket.policyURI:this.policyURI=N.decodeUTF8(e.subarray(r,e.length));break;case M.signatureSubpacket.keyFlags:this.keyFlags=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.signersUserID:this.signersUserID=N.decodeUTF8(e.subarray(r,e.length));break;case M.signatureSubpacket.reasonForRevocation:this.reasonForRevocationFlag=e[r++],this.reasonForRevocationString=N.decodeUTF8(e.subarray(r,e.length));break;case M.signatureSubpacket.features:this.features=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.signatureTarget:{this.signatureTargetPublicKeyAlgorithm=e[r++],this.signatureTargetHashAlgorithm=e[r++];const t=vn.getHashByteLength(this.signatureTargetHashAlgorithm);this.signatureTargetHash=N.uint8ArrayToString(e.subarray(r,r+t));break}case M.signatureSubpacket.embeddedSignature:this.embeddedSignature=new Ga,this.embeddedSignature.read(e.subarray(r,e.length));break;case M.signatureSubpacket.issuerFingerprint:this.issuerKeyVersion=e[r++],this.issuerFingerprint=e.subarray(r,e.length),this.issuerKeyVersion>=5?this.issuerKeyID.read(this.issuerFingerprint):this.issuerKeyID.read(this.issuerFingerprint.subarray(-8));break;case M.signatureSubpacket.preferredAEADAlgorithms:this.preferredAEADAlgorithms=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.preferredCipherSuites:this.preferredCipherSuites=[];for(let t=r;t<e.length;t+=2)this.preferredCipherSuites.push([e[t],e[t+1]]);break;default:{const e=Error("Unknown signature subpacket type "+n);if(i)throw e;N.printDebug(e)}}}readSubPackets(e,t=!0,r){const i=6===this.version?4:2,n=N.readNumber(e.subarray(0,i));let a=i;for(;a<2+n;){const i=$r(e.subarray(a,e.length));a+=i.offset,this.readSubPacket(e.subarray(a,a+i.len),t,r),a+=i.len}return a}toSign(e,t){const r=M.signature;switch(e){case r.binary:return null!==t.text?N.encodeUTF8(t.getText(!0)):t.getBytes(!0);case r.text:{const e=t.getBytes(!0);return N.canonicalizeEOL(e)}case r.standalone:return new Uint8Array(0);case r.certGeneric:case r.certPersona:case r.certCasual:case r.certPositive:case r.certRevocation:{let e,i;if(t.userID)i=180,e=t.userID;else{if(!t.userAttribute)throw Error("Either a userID or userAttribute packet needs to be supplied for certification.");i=209,e=t.userAttribute}const n=e.write();return N.concat([this.toSign(r.key,t),new Uint8Array([i]),N.writeNumber(n.length,4),n])}case r.subkeyBinding:case r.subkeyRevocation:case r.keyBinding:return N.concat([this.toSign(r.key,t),this.toSign(r.key,{key:t.bind})]);case r.key:if(void 0===t.key)throw Error("Key packet is required for this signature.");return t.key.writeForHash(this.version);case r.keyRevocation:return this.toSign(r.key,t);case r.timestamp:return new Uint8Array(0);case r.thirdParty:throw Error("Not implemented");default:throw Error("Unknown signature type.")}}calculateTrailer(e,t){let r=0;return K(P(this.signatureData),(e=>{r+=e.length}),(()=>{const i=[];return 5!==this.version||this.signatureType!==M.signature.binary&&this.signatureType!==M.signature.text||(t?i.push(new Uint8Array(6)):i.push(e.writeHeader())),i.push(new Uint8Array([this.version,255])),5===this.version&&i.push(new Uint8Array(4)),i.push(N.writeNumber(r,4)),N.concat(i)}))}toHash(e,t,r=!1){const i=this.toSign(e,t);return N.concat([this.salt||new Uint8Array,i,this.signatureData,this.calculateTrailer(t,r)])}async hash(e,t,r,i=!1){if(6===this.version&&this.salt.length!==Wa(this.hashAlgorithm))throw Error("Signature salt does not have the expected length");return r||(r=this.toHash(e,t,i)),vn.hash.digest(this.hashAlgorithm,r)}async verify(e,t,r,i=new Date,n=!1,a=L){if(!this.issuerKeyID.equals(e.getKeyID()))throw Error("Signature was not issued by the given public key");if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Public key algorithm used to sign signature does not match issuer key algorithm.");const s=t===M.signature.binary||t===M.signature.text;if(!(this[ja]&&!s)){let i,a;if(this.hashed?a=await this.hashed:(i=this.toHash(t,r,n),a=await this.hash(t,r,i)),a=await x(a),this.signedHashValue[0]!==a[0]||this.signedHashValue[1]!==a[1])throw Error("Signed digest did not match");this.params=await this.params;const s=this.publicKeyAlgorithm===M.publicKey.hmac?e.privateParams:null;if(this[ja]=await vn.signature.verify(this.publicKeyAlgorithm,this.hashAlgorithm,this.params,e.publicParams,s,i,a),!this[ja])throw Error("Signature verification failed")}const o=N.normalizeDate(i);if(o&&this.created>o)throw Error("Signature creation time is in the future");if(o&&o>=this.getExpirationTime())throw Error("Signature is expired");if(a.rejectHashAlgorithms.has(this.hashAlgorithm))throw Error("Insecure hash algorithm: "+M.read(M.hash,this.hashAlgorithm).toUpperCase());if(a.rejectMessageHashAlgorithms.has(this.hashAlgorithm)&&[M.signature.binary,M.signature.text].includes(this.signatureType))throw Error("Insecure message hash algorithm: "+M.read(M.hash,this.hashAlgorithm).toUpperCase());if(this.rawNotations.forEach((({name:e,critical:t})=>{if(t&&a.knownNotations.indexOf(e)<0)throw Error("Unknown critical notation: "+e)})),null!==this.revocationKeyClass)throw Error("This key is intended to be revoked with an authorized key, which OpenPGP.js does not support.")}isExpired(e=new Date){const t=N.normalizeDate(e);return null!==t&&!(this.created<=t&&t<this.getExpirationTime())}getExpirationTime(){return this.signatureNeverExpires?1/0:new Date(this.created.getTime()+1e3*this.signatureExpirationTime)}}function Va(e,t,r){const i=[];return i.push(Xr(r.length+1)),i.push(new Uint8Array([(t?128:0)|e])),i.push(r),N.concat(i)}function Wa(e){switch(e){case M.hash.sha256:return 16;case M.hash.sha384:return 24;case M.hash.sha512:return 32;case M.hash.sha224:case M.hash.sha3_256:return 16;case M.hash.sha3_512:return 32;default:throw Error("Unsupported hash function")}}class $a{static get tag(){return M.packet.onePassSignature}static fromSignaturePacket(e,t){const r=new $a;return r.version=6===e.version?6:3,r.signatureType=e.signatureType,r.hashAlgorithm=e.hashAlgorithm,r.publicKeyAlgorithm=e.publicKeyAlgorithm,r.issuerKeyID=e.issuerKeyID,r.salt=e.salt,r.issuerFingerprint=e.issuerFingerprint,r.flags=t?1:0,r}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.salt=null,this.issuerKeyID=null,this.issuerFingerprint=null,this.flags=null}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new ti(`Version ${this.version} of the one-pass signature packet is unsupported.`);if(this.signatureType=e[t++],this.hashAlgorithm=e[t++],this.publicKeyAlgorithm=e[t++],6===this.version){const r=e[t++];this.salt=e.subarray(t,t+r),t+=r,this.issuerFingerprint=e.subarray(t,t+32),t+=32,this.issuerKeyID=new Ha,this.issuerKeyID.read(this.issuerFingerprint)}else this.issuerKeyID=new Ha,this.issuerKeyID.read(e.subarray(t,t+8)),t+=8;return this.flags=e[t++],this}write(){const e=[new Uint8Array([this.version,this.signatureType,this.hashAlgorithm,this.publicKeyAlgorithm])];return 6===this.version?e.push(new Uint8Array([this.salt.length]),this.salt,this.issuerFingerprint):e.push(this.issuerKeyID.write()),e.push(new Uint8Array([this.flags])),N.concatUint8Array(e)}calculateTrailer(...e){return I((async()=>Ga.prototype.calculateTrailer.apply(await this.correspondingSig,e)))}async verify(){const e=await this.correspondingSig;if(!e||e.constructor.tag!==M.packet.signature)throw Error("Corresponding signature packet missing");if(e.signatureType!==this.signatureType||e.hashAlgorithm!==this.hashAlgorithm||e.publicKeyAlgorithm!==this.publicKeyAlgorithm||!e.issuerKeyID.equals(this.issuerKeyID)||3===this.version&&6===e.version||6===this.version&&6!==e.version||6===this.version&&!N.equalsUint8Array(e.issuerFingerprint,this.issuerFingerprint)||6===this.version&&!N.equalsUint8Array(e.salt,this.salt))throw Error("Corresponding signature packet does not match one-pass signature packet");return e.hashed=this.hashed,e.verify.apply(e,arguments)}}function Xa(e,t){if(!t[e]){let t;try{t=M.read(M.packet,e)}catch(t){throw new ri("Unknown packet type with tag: "+e)}throw Error("Packet not allowed in this context: "+t)}return new t[e]}$a.prototype.hash=Ga.prototype.hash,$a.prototype.toHash=Ga.prototype.toHash,$a.prototype.toSign=Ga.prototype.toSign;class Za extends Array{static async fromBinary(e,t,r=L){const i=new Za;return await i.read(e,t,r),i}async read(e,t,r=L){r.additionalAllowedPackets.length&&(t={...t,...N.constructAllowedPackets(r.additionalAllowedPackets)}),this.stream=E(e,(async(e,i)=>{const n=B(i);try{for(;;){await n.ready;if(await ei(e,(async e=>{try{if(e.tag===M.packet.marker||e.tag===M.packet.trust||e.tag===M.packet.padding)return;const i=Xa(e.tag,t);i.packets=new Za,i.fromStream=N.isStream(e.packet),await i.read(e.packet,r),await n.write(i)}catch(t){if(t instanceof ri){if(!(e.tag<=39))return;await n.abort(t)}const i=!r.ignoreUnsupportedPackets&&t instanceof ti,a=!(r.ignoreMalformedPackets||t instanceof ti);if(i||a||Jr(e.tag))await n.abort(t);else{const t=new ii(e.tag,e.packet);await n.write(t)}N.printDebugError(t)}})))return await n.ready,void await n.close()}}catch(e){await n.abort(e)}}));const i=_(this.stream);for(;;){const{done:e,value:t}=await i.read();if(e?this.stream=null:this.push(t),e||Jr(t.constructor.tag))break}i.releaseLock()}write(){const e=[];for(let t=0;t<this.length;t++){const r=this[t]instanceof ii?this[t].tag:this[t].constructor.tag,i=this[t].write();if(N.isStream(i)&&Jr(this[t].constructor.tag)){let t=[],n=0;const a=512;e.push(Yr(r)),e.push(K(i,(e=>{if(t.push(e),n+=e.length,n>=a){const e=Math.min(Math.log(n)/Math.LN2|0,30),r=2**e,i=N.concat([Zr(e)].concat(t));return t=[i.subarray(1+r)],n=t[0].length,i.subarray(0,1+r)}}),(()=>N.concat([Xr(n)].concat(t)))))}else{if(N.isStream(i)){let t=0;e.push(K(P(i),(e=>{t+=e.length}),(()=>Qr(r,t))))}else e.push(Qr(r,i.length));e.push(i)}}return N.concat(e)}filterByTag(...e){const t=new Za,r=e=>t=>e===t;for(let i=0;i<this.length;i++)e.some(r(this[i].constructor.tag))&&t.push(this[i]);return t}findPacket(e){return this.find((t=>t.constructor.tag===e))}indexOfTag(...e){const t=[],r=this,i=e=>t=>e===t;for(let n=0;n<this.length;n++)e.some(i(r[n].constructor.tag))&&t.push(n);return t}}const Ya=/*#__PURE__*/N.constructAllowedPackets([Oa,$a,Ga]);class Qa{static get tag(){return M.packet.compressedData}constructor(e=L){this.packets=null,this.algorithm=e.preferredCompressionAlgorithm,this.compressed=null,this.deflateLevel=e.deflateLevel}async read(e,t=L){await S(e,(async e=>{this.algorithm=await e.readByte(),this.compressed=e.remainder(),await this.decompress(t)}))}write(){return null===this.compressed&&this.compress(),N.concat([new Uint8Array([this.algorithm]),this.compressed])}async decompress(e=L){const t=M.read(M.compression,this.algorithm),r=as[t];if(!r)throw Error(t+" decompression not supported");this.packets=await Za.fromBinary(r(this.compressed),Ya,e)}compress(){const e=M.read(M.compression,this.algorithm),t=ns[e];if(!t)throw Error(e+" compression not supported");this.compressed=t(this.packets.write(),this.deflateLevel)}}const Ja=N.getNodeZlib();function es(e){return e}function ts(e,t,r={}){return function(i){return!N.isStream(i)||s(i)?I((()=>x(i).then((t=>new Promise(((i,n)=>{e(t,r,((e,t)=>{if(e)return n(e);i(t)}))})))))):h(u(i).pipe(t(r)))}}function rs(e,t){return r=>{if(!N.isStream(r)||s(r))return I((()=>x(r).then((r=>new Promise(((i,n)=>{const a=new e(t);a.ondata=e=>{i(e)};try{a.push(r,!0)}catch(e){n(e)}}))))));const i=r.getReader(),n=new e(t);return new ReadableStream({async start(e){for(n.ondata=async(t,r)=>{e.enqueue(t),r&&e.close()};;){const{done:e,value:t}=await i.read();if(e)return void n.push(new Uint8Array,!0);t.length&&n.push(t)}}})}}function is(e){return function(t){return I((async()=>e(await x(t))))}}const ns=Ja?{zip:/*#__PURE__*/(e,t)=>ts(Ja.deflateRaw,Ja.createDeflateRaw,{level:t})(e),zlib:/*#__PURE__*/(e,t)=>ts(Ja.deflate,Ja.createDeflate,{level:t})(e)}:{zip:/*#__PURE__*/(e,t)=>rs(wa,{level:t})(e),zlib:/*#__PURE__*/(e,t)=>rs(ka,{level:t})(e)},as=Ja?{uncompressed:es,zip:/*#__PURE__*/ts(Ja.inflateRaw,Ja.createInflateRaw),zlib:/*#__PURE__*/ts(Ja.inflate,Ja.createInflate),bzip2:/*#__PURE__*/is(Na)}:{uncompressed:es,zip:/*#__PURE__*/rs(ba),zlib:/*#__PURE__*/rs(va),bzip2:/*#__PURE__*/is(Na)},ss=/*#__PURE__*/N.constructAllowedPackets([Oa,Qa,$a,Ga]);class os{static get tag(){return M.packet.symEncryptedIntegrityProtectedData}static fromObject({version:e,aeadAlgorithm:t}){if(1!==e&&2!==e)throw Error("Unsupported SEIPD version");const r=new os;return r.version=e,2===e&&(r.aeadAlgorithm=t),r}constructor(){this.version=null,this.cipherAlgorithm=null,this.aeadAlgorithm=null,this.chunkSizeByte=null,this.salt=null,this.encrypted=null,this.packets=null}async read(e){await S(e,(async e=>{if(this.version=await e.readByte(),1!==this.version&&2!==this.version)throw new ti(`Version ${this.version} of the SEIP packet is unsupported.`);2===this.version&&(this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte(),this.salt=await e.readBytes(32)),this.encrypted=e.remainder()}))}write(){return 2===this.version?N.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.salt,this.encrypted]):N.concat([new Uint8Array([this.version]),this.encrypted])}async encrypt(e,t,r=L){let i=this.packets.write();if(s(i)&&(i=await x(i)),2===this.version)this.cipherAlgorithm=e,this.salt=vn.random.getRandomBytes(32),this.chunkSizeByte=r.aeadChunkSizeByte,this.encrypted=await cs(this,"encrypt",t,i);else{const{blockSize:n}=vn.getCipher(e),a=await vn.getPrefixRandom(e),s=new Uint8Array([211,20]),o=N.concat([a,i,s]),c=await vn.hash.sha1(U(o)),u=N.concat([o,c]);this.encrypted=await vn.mode.cfb.encrypt(e,t,u,new Uint8Array(n),r)}return!0}async decrypt(e,t,r=L){let i,n=P(this.encrypted);if(s(n)&&(n=await x(n)),2===this.version)i=await cs(this,"decrypt",t,n);else{const{blockSize:a}=vn.getCipher(e),s=await vn.mode.cfb.decrypt(e,t,n,new Uint8Array(a)),o=C(U(s),-20),c=C(s,0,-20),u=Promise.all([x(await vn.hash.sha1(U(c))),x(o)]).then((([e,t])=>{if(!N.equalsUint8Array(e,t))throw Error("Modification detected.");return new Uint8Array})),h=C(c,a+2);i=C(h,0,-2),i=b([i,I((()=>u))]),N.isStream(n)&&r.allowUnauthenticatedStream||(i=await x(i))}return this.packets=await Za.fromBinary(i,ss,r),!0}}async function cs(e,t,r,i){const n=e instanceof os&&2===e.version,a=!n&&e.constructor.tag===M.packet.aeadEncryptedData;if(!n&&!a)throw Error("Unexpected packet type");const s=vn.getAEADMode(e.aeadAlgorithm),o="decrypt"===t?s.tagLength:0,c="encrypt"===t?s.tagLength:0,u=2**(e.chunkSizeByte+6)+o,h=a?8:0,y=new ArrayBuffer(13+h),l=new Uint8Array(y,0,5+h),p=new Uint8Array(y),g=new DataView(y),d=new Uint8Array(y,5,8);l.set([192|e.constructor.tag,e.version,e.cipherAlgorithm,e.aeadAlgorithm,e.chunkSizeByte],0);let f,m,w=0,b=Promise.resolve(),v=0,A=0;if(n){const{keySize:t}=vn.getCipher(e.cipherAlgorithm),{ivLength:i}=s,n=new Uint8Array(y,0,5),a=await Zi(M.hash.sha256,r,e.salt,n,t+i);r=a.subarray(0,t),f=a.subarray(t),f.fill(0,f.length-8),m=new DataView(f.buffer,f.byteOffset,f.byteLength)}else f=e.iv;const K=await s(e.cipherAlgorithm,r);return E(i,(async(r,i)=>{if("array"!==N.isStream(r)){const t=new TransformStream({},{highWaterMark:N.getHardwareConcurrency()*2**(e.chunkSizeByte+6),size:e=>e.length});k(t.readable,i),i=t.writable}const a=_(r),s=B(i);try{for(;;){let e=await a.readBytes(u+o)||new Uint8Array;const r=e.subarray(e.length-o);let i,y,k;if(e=e.subarray(0,e.length-o),n)k=f;else{k=f.slice();for(let e=0;e<8;e++)k[f.length-8+e]^=d[e]}if(!w||e.length?(a.unshift(r),i=K[t](e,k,l),i.catch((()=>{})),A+=e.length-o+c):(g.setInt32(5+h+4,v),i=K[t](r,k,p),i.catch((()=>{})),A+=c,y=!0),v+=e.length-o,b=b.then((()=>i)).then((async e=>{await s.ready,await s.write(e),A-=e.length})).catch((e=>s.abort(e))),(y||A>s.desiredSize)&&await b,y){await s.close();break}n?m.setInt32(f.length-4,++w):g.setInt32(9,++w)}}catch(e){await s.ready.catch((()=>{})),await s.abort(e)}}))}const us=/*#__PURE__*/N.constructAllowedPackets([Oa,Qa,$a,Ga]);class hs{static get tag(){return M.packet.aeadEncryptedData}constructor(){this.version=1,this.cipherAlgorithm=null,this.aeadAlgorithm=M.aead.eax,this.chunkSizeByte=null,this.iv=null,this.encrypted=null,this.packets=null}async read(e){await S(e,(async e=>{const t=await e.readByte();if(1!==t)throw new ti(`Version ${t} of the AEAD-encrypted data packet is not supported.`);this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte();const r=vn.getAEADMode(this.aeadAlgorithm);this.iv=await e.readBytes(r.ivLength),this.encrypted=e.remainder()}))}write(){return N.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.iv,this.encrypted])}async decrypt(e,t,r=L){this.packets=await Za.fromBinary(await cs(this,"decrypt",t,P(this.encrypted)),us,r)}async encrypt(e,t,r=L){this.cipherAlgorithm=e;const{ivLength:i}=vn.getAEADMode(this.aeadAlgorithm);this.iv=vn.random.getRandomBytes(i),this.chunkSizeByte=r.aeadChunkSizeByte;const n=this.packets.write();this.encrypted=await cs(this,"encrypt",t,n)}}class ys{static get tag(){return M.packet.publicKeyEncryptedSessionKey}constructor(){this.version=null,this.publicKeyID=new Ha,this.publicKeyVersion=null,this.publicKeyFingerprint=null,this.publicKeyAlgorithm=null,this.sessionKey=null,this.sessionKeyAlgorithm=null,this.encrypted={}}static fromObject({version:e,encryptionKeyPacket:t,anonymousRecipient:r,sessionKey:i,sessionKeyAlgorithm:n}){const a=new ys;if(3!==e&&6!==e)throw Error("Unsupported PKESK version");return a.version=e,6===e&&(a.publicKeyVersion=r?null:t.version,a.publicKeyFingerprint=r?null:t.getFingerprintBytes()),a.publicKeyID=r?Ha.wildcard():t.getKeyID(),a.publicKeyAlgorithm=t.algorithm,a.sessionKey=i,a.sessionKeyAlgorithm=n,a}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new ti(`Version ${this.version} of the PKESK packet is unsupported.`);if(6===this.version){const r=e[t++];if(r){this.publicKeyVersion=e[t++];const i=r-1;this.publicKeyFingerprint=e.subarray(t,t+i),t+=i,this.publicKeyVersion>=5?this.publicKeyID.read(this.publicKeyFingerprint):this.publicKeyID.read(this.publicKeyFingerprint.subarray(-8))}else this.publicKeyID=Ha.wildcard()}else t+=this.publicKeyID.read(e.subarray(t,t+8));this.publicKeyAlgorithm=e[t++],this.encrypted=vn.parseEncSessionKeyParams(this.publicKeyAlgorithm,e.subarray(t)),3!==this.version||this.publicKeyAlgorithm!==M.publicKey.x25519&&this.publicKeyAlgorithm!==M.publicKey.x448||(this.sessionKeyAlgorithm=M.write(M.symmetric,this.encrypted.C.algorithm))}write(){const e=[new Uint8Array([this.version])];return 6===this.version?null!==this.publicKeyFingerprint?(e.push(new Uint8Array([this.publicKeyFingerprint.length+1,this.publicKeyVersion])),e.push(this.publicKeyFingerprint)):e.push(new Uint8Array([0])):e.push(this.publicKeyID.write()),e.push(new Uint8Array([this.publicKeyAlgorithm]),vn.serializeParams(this.publicKeyAlgorithm,this.encrypted)),N.concatUint8Array(e)}async encrypt(e){const t=M.write(M.publicKey,this.publicKeyAlgorithm),r=ls(this.version,t,this.sessionKeyAlgorithm,this.sessionKey),i=t===M.publicKey.aead?e.privateParams:null;this.encrypted=await vn.publicKeyEncrypt(t,this.sessionKeyAlgorithm,e.publicParams,i,r,e.getFingerprintBytes())}async decrypt(e,t){if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Decryption error");const r=t?ls(this.version,this.publicKeyAlgorithm,t.sessionKeyAlgorithm,t.sessionKey):null,i=await vn.publicKeyDecrypt(this.publicKeyAlgorithm,e.publicParams,e.privateParams,this.encrypted,e.getFingerprintBytes(),r),{sessionKey:n,sessionKeyAlgorithm:a}=function(e,t,r,i){switch(t){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.elgamal:case M.publicKey.ecdh:case M.publicKey.aead:{const t=r.subarray(0,r.length-2),n=r.subarray(r.length-2),a=N.writeChecksum(t.subarray(t.length%8)),s=a[0]===n[0]&a[1]===n[1],o=6===e?{sessionKeyAlgorithm:null,sessionKey:t}:{sessionKeyAlgorithm:t[0],sessionKey:t.subarray(1)};if(i){const t=s&o.sessionKeyAlgorithm===i.sessionKeyAlgorithm&o.sessionKey.length===i.sessionKey.length;return{sessionKey:N.selectUint8Array(t,o.sessionKey,i.sessionKey),sessionKeyAlgorithm:6===e?null:N.selectUint8(t,o.sessionKeyAlgorithm,i.sessionKeyAlgorithm)}}if(s&&(6===e||M.read(M.symmetric,o.sessionKeyAlgorithm)))return o;throw Error("Decryption error")}case M.publicKey.x25519:case M.publicKey.x448:return{sessionKey:r};default:throw Error("Unsupported public key algorithm")}}(this.version,this.publicKeyAlgorithm,i,t);3===this.version&&this.publicKeyAlgorithm!==M.publicKey.x25519&&this.publicKeyAlgorithm!==M.publicKey.x448&&(this.sessionKeyAlgorithm=a),this.sessionKey=n}}function ls(e,t,r,i){switch(t){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.elgamal:case M.publicKey.ecdh:case M.publicKey.aead:return N.concatUint8Array([new Uint8Array(6===e?[]:[r]),i,N.writeChecksum(i.subarray(i.length%8))]);case M.publicKey.x25519:case M.publicKey.x448:return i;default:throw Error("Unsupported public key algorithm")}}class ps{static get tag(){return M.packet.symEncryptedSessionKey}constructor(e=L){this.version=e.aeadProtect?6:4,this.sessionKey=null,this.sessionKeyEncryptionAlgorithm=null,this.sessionKeyAlgorithm=M.symmetric.aes256,this.aeadAlgorithm=M.write(M.aead,e.preferredAEADAlgorithm),this.encrypted=null,this.s2k=null,this.iv=null}read(e){let t=0;if(this.version=e[t++],4!==this.version&&5!==this.version&&6!==this.version)throw new ti(`Version ${this.version} of the SKESK packet is unsupported.`);6===this.version&&t++;const r=e[t++];this.version>=5&&(this.aeadAlgorithm=e[t++],6===this.version&&t++);const i=e[t++];if(this.s2k=Dn(i),t+=this.s2k.read(e.subarray(t,e.length)),this.version>=5){const r=vn.getAEADMode(this.aeadAlgorithm);this.iv=e.subarray(t,t+=r.ivLength)}this.version>=5||t<e.length?(this.encrypted=e.subarray(t,e.length),this.sessionKeyEncryptionAlgorithm=r):this.sessionKeyAlgorithm=r}write(){const e=null===this.encrypted?this.sessionKeyAlgorithm:this.sessionKeyEncryptionAlgorithm;let t;const r=this.s2k.write();if(6===this.version){const i=r.length,n=3+i+this.iv.length;t=N.concatUint8Array([new Uint8Array([this.version,n,e,this.aeadAlgorithm,i]),r,this.iv,this.encrypted])}else 5===this.version?t=N.concatUint8Array([new Uint8Array([this.version,e,this.aeadAlgorithm]),r,this.iv,this.encrypted]):(t=N.concatUint8Array([new Uint8Array([this.version,e]),r]),null!==this.encrypted&&(t=N.concatUint8Array([t,this.encrypted])));return t}async decrypt(e){const t=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm,{blockSize:r,keySize:i}=vn.getCipher(t),n=await this.s2k.produceKey(e,i);if(this.version>=5){const e=vn.getAEADMode(this.aeadAlgorithm),r=new Uint8Array([192|ps.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),a=6===this.version?await Zi(M.hash.sha256,n,new Uint8Array,r,i):n,s=await e(t,a);this.sessionKey=await s.decrypt(this.encrypted,this.iv,r)}else if(null!==this.encrypted){const e=await vn.mode.cfb.decrypt(t,n,this.encrypted,new Uint8Array(r));this.sessionKeyAlgorithm=M.write(M.symmetric,e[0]),this.sessionKey=e.subarray(1,e.length)}else this.sessionKey=n}async encrypt(e,t=L){const r=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm;this.sessionKeyEncryptionAlgorithm=r,this.s2k=Cn(t),this.s2k.generateSalt();const{blockSize:i,keySize:n}=vn.getCipher(r),a=await this.s2k.produceKey(e,n);if(null===this.sessionKey&&(this.sessionKey=vn.generateSessionKey(this.sessionKeyAlgorithm)),this.version>=5){const e=vn.getAEADMode(this.aeadAlgorithm);this.iv=vn.random.getRandomBytes(e.ivLength);const t=new Uint8Array([192|ps.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),i=6===this.version?await Zi(M.hash.sha256,a,new Uint8Array,t,n):a,s=await e(r,i);this.encrypted=await s.encrypt(this.sessionKey,this.iv,t)}else{const e=N.concatUint8Array([new Uint8Array([this.sessionKeyAlgorithm]),this.sessionKey]);this.encrypted=await vn.mode.cfb.encrypt(r,a,e,new Uint8Array(i),t)}}}class gs{static get tag(){return M.packet.publicKey}constructor(e=new Date,t=L){this.version=t.v6Keys?6:4,this.created=N.normalizeDate(e),this.algorithm=null,this.publicParams=null,this.expirationTimeV3=0,this.fingerprint=null,this.keyID=null}static fromSecretKeyPacket(e){const t=new gs,{version:r,created:i,algorithm:n,publicParams:a,keyID:s,fingerprint:o}=e;return t.version=r,t.created=i,t.algorithm=n,t.publicParams=a,t.keyID=s,t.fingerprint=o,t}async read(e){let t=0;if(this.version=e[t++],4===this.version||5===this.version||6===this.version){this.created=N.readDate(e.subarray(t,t+4)),t+=4,this.algorithm=e[t++],this.version>=5&&(t+=4);const{read:r,publicParams:i}=vn.parsePublicKeyParams(this.algorithm,e.subarray(t));if(6===this.version&&i.oid&&(i.oid.getName()===M.curve.curve25519Legacy||i.oid.getName()===M.curve.ed25519Legacy))throw Error("Legacy curve25519 cannot be used with v6 keys");return this.publicParams=i,t+=r,await this.computeFingerprintAndKeyID(),t}throw new ti(`Version ${this.version} of the key packet is unsupported.`)}write(){const e=[];e.push(new Uint8Array([this.version])),e.push(N.writeDate(this.created)),e.push(new Uint8Array([this.algorithm]));const t=vn.serializeParams(this.algorithm,this.publicParams);return this.version>=5&&e.push(N.writeNumber(t.length,4)),e.push(t),N.concatUint8Array(e)}writeForHash(e){const t=this.writePublicKey(),r=149+e,i=e>=5?4:2;return N.concatUint8Array([new Uint8Array([r]),N.writeNumber(t.length,i),t])}isDecrypted(){return null}getCreationTime(){return this.created}getKeyID(){return this.keyID}async computeFingerprintAndKeyID(){if(await this.computeFingerprint(),this.keyID=new Ha,this.version>=5)this.keyID.read(this.fingerprint.subarray(0,8));else{if(4!==this.version)throw Error("Unsupported key version");this.keyID.read(this.fingerprint.subarray(12,20))}}async computeFingerprint(){const e=this.writeForHash(this.version);if(this.version>=5)this.fingerprint=await vn.hash.sha256(e);else{if(4!==this.version)throw Error("Unsupported key version");this.fingerprint=await vn.hash.sha1(e)}}getFingerprintBytes(){return this.fingerprint}getFingerprint(){return N.uint8ArrayToHex(this.getFingerprintBytes())}hasSameFingerprintAs(e){return this.version===e.version&&N.equalsUint8Array(this.writePublicKey(),e.writePublicKey())}getAlgorithmInfo(){const e={};e.algorithm=M.read(M.publicKey,this.algorithm);const t=this.publicParams.n||this.publicParams.p;return t?e.bits=N.uint8ArrayBitLength(t):this.publicParams.oid?e.curve=this.publicParams.oid.getName():this.publicParams.cipher&&(e.symmetric=this.publicParams.cipher.getName()),e}}gs.prototype.readPublicKey=gs.prototype.read,gs.prototype.writePublicKey=gs.prototype.write;const ds=/*#__PURE__*/N.constructAllowedPackets([Oa,Qa,$a,Ga]);class fs{static get tag(){return M.packet.symmetricallyEncryptedData}constructor(){this.encrypted=null,this.packets=null}read(e){this.encrypted=e}write(){return this.encrypted}async decrypt(e,t,r=L){if(!r.allowUnauthenticatedMessages)throw Error("Message is not authenticated.");const{blockSize:i}=vn.getCipher(e),n=await x(P(this.encrypted)),a=await vn.mode.cfb.decrypt(e,t,n.subarray(i+2),n.subarray(2,i+2));this.packets=await Za.fromBinary(a,ds,r)}async encrypt(e,t,r=L){const i=this.packets.write(),{blockSize:n}=vn.getCipher(e),a=await vn.getPrefixRandom(e),s=await vn.mode.cfb.encrypt(e,t,a,new Uint8Array(n),r),o=await vn.mode.cfb.encrypt(e,t,i,s.subarray(2),r);this.encrypted=N.concat([s,o])}}class ms{static get tag(){return M.packet.marker}read(e){return 80===e[0]&&71===e[1]&&80===e[2]}write(){return new Uint8Array([80,71,80])}}class ws extends gs{static get tag(){return M.packet.publicSubkey}constructor(e,t){super(e,t)}static fromSecretSubkeyPacket(e){const t=new ws,{version:r,created:i,algorithm:n,publicParams:a,keyID:s,fingerprint:o}=e;return t.version=r,t.created=i,t.algorithm=n,t.publicParams=a,t.keyID=s,t.fingerprint=o,t}}class bs{static get tag(){return M.packet.userAttribute}constructor(){this.attributes=[]}read(e){let t=0;for(;t<e.length;){const r=$r(e.subarray(t,e.length));t+=r.offset,this.attributes.push(N.uint8ArrayToString(e.subarray(t,t+r.len))),t+=r.len}}write(){const e=[];for(let t=0;t<this.attributes.length;t++)e.push(Xr(this.attributes[t].length)),e.push(N.stringToUint8Array(this.attributes[t]));return N.concatUint8Array(e)}equals(e){return!!(e&&e instanceof bs)&&this.attributes.every((function(t,r){return t===e.attributes[r]}))}}class ks extends gs{static get tag(){return M.packet.secretKey}constructor(e=new Date,t=L){super(e,t),this.keyMaterial=null,this.isEncrypted=null,this.s2kUsage=0,this.s2k=null,this.symmetric=null,this.aead=null,this.privateParams=null}async read(e){let t=await this.readPublicKey(e);const r=t;this.s2kUsage=e[t++],5===this.version&&t++,6===this.version&&this.s2kUsage&&t++;try{if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){this.symmetric=e[t++],253===this.s2kUsage&&(this.aead=e[t++]),6===this.version&&t++;const r=e[t++];if(this.s2k=Dn(r),t+=this.s2k.read(e.subarray(t,e.length)),"gnu-dummy"===this.s2k.type)return}else this.s2kUsage&&(this.symmetric=this.s2kUsage);this.s2kUsage&&(253!==this.s2kUsage||5===this.version?this.iv=e.subarray(t,t+vn.getCipher(this.symmetric).blockSize):this.iv=e.subarray(t,t+vn.getAEADMode(this.aead).ivLength),t+=this.iv.length)}catch(t){if(!this.s2kUsage)throw t;this.unparseableKeyMaterial=e.subarray(r),this.isEncrypted=!0}if(5===this.version&&(t+=4),this.keyMaterial=e.subarray(t),this.isEncrypted=!!this.s2kUsage,!this.isEncrypted){let e;if(6===this.version)e=this.keyMaterial;else if(e=this.keyMaterial.subarray(0,-2),!N.equalsUint8Array(N.writeChecksum(e),this.keyMaterial.subarray(-2)))throw Error("Key checksum mismatch");try{const{read:t,privateParams:r}=vn.parsePrivateKeyParams(this.algorithm,e,this.publicParams);if(t<e.length)throw Error("Error reading MPIs");this.privateParams=r}catch(e){if(e instanceof ti)throw e;throw Error("Error reading MPIs")}}}write(){const e=this.writePublicKey();if(this.unparseableKeyMaterial)return N.concatUint8Array([e,this.unparseableKeyMaterial]);const t=[e];t.push(new Uint8Array([this.s2kUsage]));const r=[];if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){r.push(this.symmetric),253===this.s2kUsage&&r.push(this.aead);const e=this.s2k.write();6===this.version&&r.push(e.length),r.push(...e)}return this.s2kUsage&&"gnu-dummy"!==this.s2k.type&&r.push(...this.iv),(5===this.version||6===this.version&&this.s2kUsage)&&t.push(new Uint8Array([r.length])),t.push(new Uint8Array(r)),this.isDummy()||(this.s2kUsage||(this.keyMaterial=vn.serializeParams(this.algorithm,this.privateParams)),5===this.version&&t.push(N.writeNumber(this.keyMaterial.length,4)),t.push(this.keyMaterial),this.s2kUsage||6===this.version||t.push(N.writeChecksum(this.keyMaterial))),N.concatUint8Array(t)}isDecrypted(){return!1===this.isEncrypted}isMissingSecretKeyMaterial(){return void 0!==this.unparseableKeyMaterial||this.isDummy()}isDummy(){return!(!this.s2k||"gnu-dummy"!==this.s2k.type)}makeDummy(e=L){this.isDummy()||(this.isDecrypted()&&this.clearPrivateParams(),delete this.unparseableKeyMaterial,this.isEncrypted=null,this.keyMaterial=null,this.s2k=Dn(M.s2k.gnu,e),this.s2k.algorithm=0,this.s2k.c=0,this.s2k.type="gnu-dummy",this.s2kUsage=254,this.symmetric=M.symmetric.aes256)}async encrypt(e,t=L){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key packet is already encrypted");if(!e)throw Error("A non-empty passphrase is required for key encryption.");this.s2k=Cn(t),this.s2k.generateSalt();const r=vn.serializeParams(this.algorithm,this.privateParams);this.symmetric=M.symmetric.aes256;const{blockSize:i}=vn.getCipher(this.symmetric);if(t.aeadProtect){this.s2kUsage=253,this.aead=M.aead.eax;const t=vn.getAEADMode(this.aead),n=Yr(this.constructor.tag),a=await vs(this.version,this.s2k,e,this.symmetric,this.aead,n),s=await t(this.symmetric,a);this.iv=5===this.version?vn.random.getRandomBytes(i):vn.random.getRandomBytes(t.ivLength);const o=5===this.version?new Uint8Array:N.concatUint8Array([n,this.writePublicKey()]);this.keyMaterial=await s.encrypt(r,this.iv.subarray(0,t.ivLength),o)}else{this.s2kUsage=254;const n=await vs(this.version,this.s2k,e,this.symmetric);this.iv=vn.random.getRandomBytes(i),this.keyMaterial=await vn.mode.cfb.encrypt(this.symmetric,n,N.concatUint8Array([r,await vn.hash.sha1(r,t)]),this.iv,t)}}async decrypt(e){if(this.isDummy())return!1;if(this.unparseableKeyMaterial)throw Error("Key packet cannot be decrypted: unsupported S2K or cipher algo");if(this.isDecrypted())throw Error("Key packet is already decrypted.");let t;const r=Yr(this.constructor.tag);if(254!==this.s2kUsage&&253!==this.s2kUsage)throw 255===this.s2kUsage?Error("Encrypted private key is authenticated using an insecure two-byte hash"):Error("Private key is encrypted using an insecure S2K function: unsalted MD5");let i;if(t=await vs(this.version,this.s2k,e,this.symmetric,this.aead,r),253===this.s2kUsage){const e=vn.getAEADMode(this.aead),n=await e(this.symmetric,t);try{const t=5===this.version?new Uint8Array:N.concatUint8Array([r,this.writePublicKey()]);i=await n.decrypt(this.keyMaterial,this.iv.subarray(0,e.ivLength),t)}catch(e){if("Authentication tag mismatch"===e.message)throw Error("Incorrect key passphrase: "+e.message);throw e}}else{const e=await vn.mode.cfb.decrypt(this.symmetric,t,this.keyMaterial,this.iv);i=e.subarray(0,-20);const r=await vn.hash.sha1(i);if(!N.equalsUint8Array(r,e.subarray(-20)))throw Error("Incorrect key passphrase")}try{const{privateParams:e}=vn.parsePrivateKeyParams(this.algorithm,i,this.publicParams);this.privateParams=e}catch(e){throw Error("Error reading MPIs")}this.isEncrypted=!1,this.keyMaterial=null,this.s2kUsage=0,this.aead=null,this.symmetric=null}async validate(){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key is not decrypted");let e;try{e=await vn.validateParams(this.algorithm,this.publicParams,this.privateParams)}catch(t){e=!1}if(!e)throw Error("Key is invalid")}async generate(e,t,r){if(6===this.version&&(this.algorithm===M.publicKey.ecdh&&t===M.curve.curve25519Legacy||this.algorithm===M.publicKey.eddsaLegacy))throw Error(`Cannot generate v6 keys of type 'ecc' with curve ${t}. Generate a key of type 'curve25519' instead`);const{privateParams:i,publicParams:n}=await vn.generateParams(this.algorithm,e,t,r);this.privateParams=i,this.publicParams=n,this.isEncrypted=!1}clearPrivateParams(){this.isMissingSecretKeyMaterial()||(Object.keys(this.privateParams).forEach((e=>{this.privateParams[e].fill(0),delete this.privateParams[e]})),this.privateParams=null,this.isEncrypted=!0)}}async function vs(e,t,r,i,n,a){const{keySize:s}=vn.getCipher(i),o=await t.produceKey(r,s);if(!n||5===e)return o;const c=N.concatUint8Array([a,new Uint8Array([e,i,n])]);return Zi(M.hash.sha256,o,new Uint8Array,c,s)}class As{static get tag(){return M.packet.userID}constructor(){this.userID="",this.name="",this.email="",this.comment=""}static fromObject(e){if(N.isString(e)||e.name&&!N.isString(e.name)||e.email&&!N.isEmailAddress(e.email)||e.comment&&!N.isString(e.comment))throw Error("Invalid user ID format");const t=new As;Object.assign(t,e);const r=[];return t.name&&r.push(t.name),t.comment&&r.push(`(${t.comment})`),t.email&&r.push(`<${t.email}>`),t.userID=r.join(" "),t}read(e,t=L){const r=N.decodeUTF8(e);if(r.length>t.maxUserIDLength)throw Error("User ID string is too long");const i=/^(?<name>[^()]+\s+)?(?<comment>\([^()]+\)\s+)?(?<email><\S+@\S+>)$/.exec(r);if(null!==i){const{name:e,comment:t,email:r}=i.groups;this.comment=t?.replace(/^\(|\)|\s$/g,"").trim()||"",this.name=e?.trim()||"",this.email=r.substring(1,r.length-1)}else/^[^\s@]+@[^\s@]+$/.test(r)&&(this.email=r);this.userID=r}write(){return N.encodeUTF8(this.userID)}equals(e){return e&&e.userID===this.userID}}class Ks extends ks{static get tag(){return M.packet.secretSubkey}constructor(e=new Date,t=L){super(e,t)}}class Es{static get tag(){return M.packet.trust}read(){throw new ti("Trust packets are not supported")}write(){throw new ti("Trust packets are not supported")}}class Ss{static get tag(){return M.packet.padding}constructor(){this.padding=null}read(e){}write(){return this.padding}async createPadding(e){this.padding=await vn.random.getRandomBytes(e)}}const Ps=/*#__PURE__*/N.constructAllowedPackets([Ga]);class Us{constructor(e){this.packets=e||new Za}write(){return this.packets.write()}armor(e=L){return J(M.armor.signature,this.write(),void 0,void 0,void 0,e)}getSigningKeyIDs(){return this.packets.map((e=>e.issuerKeyID))}}async function Ds({armoredSignature:e,binarySignature:t,config:r,...i}){r={...L,...r};let n=e||t;if(!n)throw Error("readSignature: must pass options object containing `armoredSignature` or `binarySignature`");if(e&&!N.isString(e))throw Error("readSignature: options.armoredSignature must be a string");if(t&&!N.isUint8Array(t))throw Error("readSignature: options.binarySignature must be a Uint8Array");const a=Object.keys(i);if(a.length>0)throw Error("Unknown option: "+a.join(", "));if(e){const{type:e,data:t}=await Q(n);if(e!==M.armor.signature)throw Error("Armored text not of type signature");n=t}const s=await Za.fromBinary(n,Ps,r);return new Us(s)}async function Cs(e,t){const r=new Ks(e.date,t);return r.packets=null,r.algorithm=M.write(M.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function xs(e,t){const r=new ks(e.date,t);return r.packets=null,r.algorithm=M.write(M.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function Ts(e,t,r,i,n=new Date,a){let s,o;for(let c=e.length-1;c>=0;c--)try{(!s||e[c].created>=s.created)&&(await e[c].verify(t,r,i,n,void 0,a),s=e[c])}catch(e){o=e}if(!s)throw N.wrapError(`Could not find valid ${M.read(M.signature,r)} signature in key ${t.getKeyID().toHex()}`.replace("certGeneric ","self-").replace(/([a-z])([A-Z])/g,((e,t,r)=>t+" "+r.toLowerCase())),o);return s}function Is(e,t,r=new Date){const i=N.normalizeDate(r);if(null!==i){const r=Ls(e,t);return!(e.created<=i&&i<r)}return!1}async function _s(e,t,r,i){const n={};n.key=t,n.bind=e;const a={signatureType:M.signature.subkeyBinding};r.sign?(a.keyFlags=[M.keyFlags.signData],a.embeddedSignature=await Bs(n,null,e,{signatureType:M.signature.keyBinding},r.date,void 0,void 0,void 0,i)):a.keyFlags=r.forwarding?[M.keyFlags.forwardedCommunication]:[M.keyFlags.encryptCommunication|M.keyFlags.encryptStorage],r.keyExpirationTime>0&&(a.keyExpirationTime=r.keyExpirationTime,a.keyNeverExpires=!1);return await Bs(n,null,t,a,r.date,void 0,void 0,void 0,i)}async function Bs(e,t,r,i,n,a,s=[],o=!1,c){if(r.isDummy())throw Error("Cannot sign with a gnu-dummy key.");if(!r.isDecrypted())throw Error("Signing key is not decrypted.");const u=new Ga;return Object.assign(u,i),u.publicKeyAlgorithm=r.algorithm,u.hashAlgorithm=await async function(e,t,r=new Date,i={},n){let a=n.preferredHashAlgorithm,s=a;if(e){const t=await e.getPrimarySelfSignature(r,i,n);t.preferredHashAlgorithms&&([s]=t.preferredHashAlgorithms,a=vn.hash.getHashByteLength(a)<=vn.hash.getHashByteLength(s)?s:a)}switch(t.algorithm){case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:case M.publicKey.ed25519:case M.publicKey.ed448:s=vn.getPreferredCurveHashAlgo(t.algorithm,t.publicParams.oid)}return vn.hash.getHashByteLength(a)<=vn.hash.getHashByteLength(s)?s:a}(t,r,n,a,c),u.rawNotations=s,await u.sign(r,e,n,o),u}async function Rs(e,t,r,i=new Date,n){(e=e[r])&&(t[r].length?await Promise.all(e.map((async function(e){e.isExpired(i)||n&&!await n(e)||t[r].some((function(t){return N.equalsUint8Array(t.writeParams(),e.writeParams())}))||t[r].push(e)}))):t[r]=e)}async function Ms(e,t,r,i,n,a,s=new Date,o){a=a||e;const c=[];return await Promise.all(i.map((async function(e){try{n&&!e.issuerKeyID.equals(n.issuerKeyID)||(await e.verify(a,t,r,o.revocationsExpire?s:null,!1,o),c.push(e.issuerKeyID))}catch(e){}}))),n?(n.revoked=!!c.some((e=>e.equals(n.issuerKeyID)))||(n.revoked||!1),n.revoked):c.length>0}function Ls(e,t){let r;return!1===t.keyNeverExpires&&(r=e.created.getTime()+1e3*t.keyExpirationTime),r?new Date(r):1/0}function Fs(e,t={}){if(e.type=e.type||t.type,e.curve=e.curve||t.curve,e.rsaBits=e.rsaBits||t.rsaBits,e.symmetricHash=e.symmetricHash||t.symmetricHash,e.symmetricCipher=e.symmetricCipher||t.symmetricCipher,e.keyExpirationTime=void 0!==e.keyExpirationTime?e.keyExpirationTime:t.keyExpirationTime,e.passphrase=N.isString(e.passphrase)?e.passphrase:t.passphrase,e.date=e.date||t.date,e.sign=e.sign||!1,e.forwarding=e.forwarding||!1,e.sign&&e.forwarding)throw Error('Incompatible options: "sign" and "forwarding" cannot be set together');switch(e.type){case"ecc":try{e.curve=M.write(M.curve,e.curve)}catch(e){throw Error("Unknown curve")}e.curve!==M.curve.ed25519Legacy&&e.curve!==M.curve.curve25519Legacy&&"ed25519"!==e.curve&&"curve25519"!==e.curve||(e.curve=e.sign?M.curve.ed25519Legacy:M.curve.curve25519Legacy),e.sign?e.algorithm=e.curve===M.curve.ed25519Legacy?M.publicKey.eddsaLegacy:M.publicKey.ecdsa:e.algorithm=M.publicKey.ecdh;break;case"curve25519":e.algorithm=e.sign?M.publicKey.ed25519:M.publicKey.x25519;break;case"curve448":e.algorithm=e.sign?M.publicKey.ed448:M.publicKey.x448;break;case"rsa":e.algorithm=M.publicKey.rsaEncryptSign;break;case"symmetric":if(e.sign){e.algorithm=M.publicKey.hmac;try{e.symmetric=M.write(M.hash,e.symmetricHash)}catch(e){throw Error("Unknown hash algorithm")}}else{e.algorithm=M.publicKey.aead;try{e.symmetric=M.write(M.symmetric,e.symmetricCipher)}catch(e){throw Error("Unknown symmetric algorithm")}}break;default:throw Error("Unsupported key type "+e.type)}return e}function zs(e,t,r){switch(e.algorithm){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:case M.publicKey.dsa:case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:case M.publicKey.ed25519:case M.publicKey.ed448:case M.publicKey.hmac:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||0!=(t.keyFlags[0]&M.keyFlags.signData);default:return!1}}function Ns(e,t,r){switch(e.algorithm){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.elgamal:case M.publicKey.ecdh:case M.publicKey.x25519:case M.publicKey.x448:case M.publicKey.aead:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||0!=(t.keyFlags[0]&M.keyFlags.encryptCommunication)||0!=(t.keyFlags[0]&M.keyFlags.encryptStorage);default:return!1}}function Os(e,t,r){if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");switch(e.algorithm){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.elgamal:case M.publicKey.ecdh:case M.publicKey.x25519:case M.publicKey.x448:return!(!(!t.keyFlags||0!=(t.keyFlags[0]&M.keyFlags.signData))||!r.allowInsecureDecryptionWithSigningKeys)||(!t.keyFlags||0!=(t.keyFlags[0]&M.keyFlags.encryptCommunication)||0!=(t.keyFlags[0]&M.keyFlags.encryptStorage)||r.allowForwardedMessages&&0!=(t.keyFlags[0]&M.keyFlags.forwardedCommunication));default:return!1}}function Hs(e,t){const r=M.write(M.publicKey,e.algorithm),i=e.getAlgorithmInfo();if(t.rejectPublicKeyAlgorithms.has(r))throw Error(i.algorithm+" keys are considered too weak.");switch(r){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:case M.publicKey.rsaEncrypt:if(i.bits<t.minRSABits)throw Error(`RSA keys shorter than ${t.minRSABits} bits are considered too weak.`);break;case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:case M.publicKey.ecdh:if(t.rejectCurves.has(i.curve))throw Error(`Support for ${i.algorithm} keys using curve ${i.curve} is disabled.`)}}class js{constructor(e,t){this.userID=e.constructor.tag===M.packet.userID?e:null,this.userAttribute=e.constructor.tag===M.packet.userAttribute?e:null,this.selfCertifications=[],this.otherCertifications=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new Za;return e.push(this.userID||this.userAttribute),e.push(...this.revocationSignatures),e.push(...this.selfCertifications),e.push(...this.otherCertifications),e}clone(){const e=new js(this.userID||this.userAttribute,this.mainKey);return e.selfCertifications=[...this.selfCertifications],e.otherCertifications=[...this.otherCertifications],e.revocationSignatures=[...this.revocationSignatures],e}async certify(e,t,r){const i=this.mainKey.keyPacket,n={userID:this.userID,userAttribute:this.userAttribute,key:i},a=new js(n.userID||n.userAttribute,this.mainKey);return a.otherCertifications=await Promise.all(e.map((async function(e){if(!e.isPrivate())throw Error("Need private key for signing");if(e.hasSameFingerprintAs(i))throw Error("The user's own key can only be used for self-certifications");const a=await e.getSigningKey(void 0,t,void 0,r);return Bs(n,e,a.keyPacket,{signatureType:M.signature.certGeneric,keyFlags:[M.keyFlags.certifyKeys|M.keyFlags.signData]},t,void 0,void 0,void 0,r)}))),await a.update(this,t,r),a}async isRevoked(e,t,r=new Date,i=L){const n=this.mainKey.keyPacket;return Ms(n,M.signature.certRevocation,{key:n,userID:this.userID,userAttribute:this.userAttribute},this.revocationSignatures,e,t,r,i)}async verifyCertificate(e,t,r=new Date,i){const n=this,a=this.mainKey.keyPacket,s={userID:this.userID,userAttribute:this.userAttribute,key:a},{issuerKeyID:o}=e,c=t.filter((e=>e.getKeys(o).length>0));return 0===c.length?null:(await Promise.all(c.map((async t=>{const a=await t.getSigningKey(o,e.created,void 0,i);if(e.revoked||await n.isRevoked(e,a.keyPacket,r,i))throw Error("User certificate is revoked");try{await e.verify(a.keyPacket,M.signature.certGeneric,s,r,void 0,i)}catch(e){throw N.wrapError("User certificate is invalid",e)}}))),!0)}async verifyAllCertifications(e,t=new Date,r){const i=this,n=this.selfCertifications.concat(this.otherCertifications);return Promise.all(n.map((async n=>({keyID:n.issuerKeyID,valid:await i.verifyCertificate(n,e,t,r).catch((()=>!1))}))))}async verify(e=new Date,t){if(!this.selfCertifications.length)throw Error("No self-certifications found");const r=this,i=this.mainKey.keyPacket,n={userID:this.userID,userAttribute:this.userAttribute,key:i};let a;for(let s=this.selfCertifications.length-1;s>=0;s--)try{const a=this.selfCertifications[s];if(a.revoked||await r.isRevoked(a,void 0,e,t))throw Error("Self-certification is revoked");try{await a.verify(i,M.signature.certGeneric,n,e,void 0,t)}catch(e){throw N.wrapError("Self-certification is invalid",e)}return!0}catch(e){a=e}throw a}async update(e,t,r){const i=this.mainKey.keyPacket,n={userID:this.userID,userAttribute:this.userAttribute,key:i};await Rs(e,this,"selfCertifications",t,(async function(e){try{return await e.verify(i,M.signature.certGeneric,n,t,!1,r),!0}catch(e){return!1}})),await Rs(e,this,"otherCertifications",t),await Rs(e,this,"revocationSignatures",t,(function(e){return Ms(i,M.signature.certRevocation,n,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=M.reasonForRevocation.noReason,string:r=""}={},i=new Date,n=L){const a={userID:this.userID,userAttribute:this.userAttribute,key:e},s=new js(a.userID||a.userAttribute,this.mainKey);return s.revocationSignatures.push(await Bs(a,null,e,{signatureType:M.signature.certRevocation,reasonForRevocationFlag:M.write(M.reasonForRevocation,t),reasonForRevocationString:r},i,void 0,void 0,!1,n)),await s.update(this),s}}class qs{constructor(e,t){this.keyPacket=e,this.bindingSignatures=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new Za;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.bindingSignatures),e}clone(){const e=new qs(this.keyPacket,this.mainKey);return e.bindingSignatures=[...this.bindingSignatures],e.revocationSignatures=[...this.revocationSignatures],e}async isRevoked(e,t,r=new Date,i=L){const n=this.mainKey.keyPacket;return Ms(n,M.signature.subkeyRevocation,{key:n,bind:this.keyPacket},this.revocationSignatures,e,t,r,i)}async verify(e=new Date,t=L){const r=this.mainKey.keyPacket,i={key:r,bind:this.keyPacket},n=await Ts(this.bindingSignatures,r,M.signature.subkeyBinding,i,e,t);if(n.revoked||await this.isRevoked(n,null,e,t))throw Error("Subkey is revoked");if(Is(this.keyPacket,n,e))throw Error("Subkey is expired");return n}async getExpirationTime(e=new Date,t=L){const r=this.mainKey.keyPacket,i={key:r,bind:this.keyPacket};let n;try{n=await Ts(this.bindingSignatures,r,M.signature.subkeyBinding,i,e,t)}catch(e){return null}const a=Ls(this.keyPacket,n),s=n.getExpirationTime();return a<s?a:s}async update(e,t=new Date,r=L){const i=this.mainKey.keyPacket;if(!this.hasSameFingerprintAs(e))throw Error("Subkey update method: fingerprints of subkeys not equal");this.keyPacket.constructor.tag===M.packet.publicSubkey&&e.keyPacket.constructor.tag===M.packet.secretSubkey&&(this.keyPacket=e.keyPacket);const n=this,a={key:i,bind:n.keyPacket};await Rs(e,this,"bindingSignatures",t,(async function(e){for(let t=0;t<n.bindingSignatures.length;t++)if(n.bindingSignatures[t].issuerKeyID.equals(e.issuerKeyID))return e.created>n.bindingSignatures[t].created&&(n.bindingSignatures[t]=e),!1;try{return await e.verify(i,M.signature.subkeyBinding,a,t,void 0,r),!0}catch(e){return!1}})),await Rs(e,this,"revocationSignatures",t,(function(e){return Ms(i,M.signature.subkeyRevocation,a,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=M.reasonForRevocation.noReason,string:r=""}={},i=new Date,n=L){const a={key:e,bind:this.keyPacket},s=new qs(this.keyPacket,this.mainKey);return s.revocationSignatures.push(await Bs(a,null,e,{signatureType:M.signature.subkeyRevocation,reasonForRevocationFlag:M.write(M.reasonForRevocation,t),reasonForRevocationString:r},i,void 0,void 0,!1,n)),await s.update(this),s}hasSameFingerprintAs(e){return this.keyPacket.hasSameFingerprintAs(e.keyPacket||e)}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","isDecrypted"].forEach((e=>{qs.prototype[e]=function(){return this.keyPacket[e]()}}));const Gs=/*#__PURE__*/N.constructAllowedPackets([Ga]),Vs=new Set([M.packet.publicKey,M.packet.privateKey]),Ws=new Set([M.packet.publicKey,M.packet.privateKey,M.packet.publicSubkey,M.packet.privateSubkey]);class $s{packetListToStructure(e,t=new Set){let r,i,n,a;for(const s of e){if(s instanceof ii){Ws.has(s.tag)&&!a&&(a=Vs.has(s.tag)?Vs:Ws);continue}const e=s.constructor.tag;if(a){if(!a.has(e))continue;a=null}if(t.has(e))throw Error("Unexpected packet type: "+e);switch(e){case M.packet.publicKey:case M.packet.secretKey:if(this.keyPacket)throw Error("Key block contains multiple keys");if(this.keyPacket=s,i=this.getKeyID(),!i)throw Error("Missing Key ID");break;case M.packet.userID:case M.packet.userAttribute:r=new js(s,this),this.users.push(r);break;case M.packet.publicSubkey:case M.packet.secretSubkey:r=null,n=new qs(s,this),this.subkeys.push(n);break;case M.packet.signature:switch(s.signatureType){case M.signature.certGeneric:case M.signature.certPersona:case M.signature.certCasual:case M.signature.certPositive:if(!r){N.printDebug("Dropping certification signatures without preceding user packet");continue}s.issuerKeyID.equals(i)?r.selfCertifications.push(s):r.otherCertifications.push(s);break;case M.signature.certRevocation:r?r.revocationSignatures.push(s):this.directSignatures.push(s);break;case M.signature.key:this.directSignatures.push(s);break;case M.signature.subkeyBinding:if(!n){N.printDebug("Dropping subkey binding signature without preceding subkey packet");continue}n.bindingSignatures.push(s);break;case M.signature.keyRevocation:this.revocationSignatures.push(s);break;case M.signature.subkeyRevocation:if(!n){N.printDebug("Dropping subkey revocation signature without preceding subkey packet");continue}n.revocationSignatures.push(s)}}}}toPacketList(){const e=new Za;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.directSignatures),this.users.map((t=>e.push(...t.toPacketList()))),this.subkeys.map((t=>e.push(...t.toPacketList()))),e}clone(e=!1){const t=new this.constructor(this.toPacketList());return e&&t.getKeys().forEach((e=>{if(e.keyPacket=Object.create(Object.getPrototypeOf(e.keyPacket),Object.getOwnPropertyDescriptors(e.keyPacket)),!e.keyPacket.isDecrypted())return;const t={};Object.keys(e.keyPacket.privateParams).forEach((r=>{t[r]=new Uint8Array(e.keyPacket.privateParams[r])})),e.keyPacket.privateParams=t})),t}getSubkeys(e=null){return this.subkeys.filter((t=>!e||t.getKeyID().equals(e,!0)))}getKeys(e=null){const t=[];return e&&!this.getKeyID().equals(e,!0)||t.push(this),t.concat(this.getSubkeys(e))}getKeyIDs(){return this.getKeys().map((e=>e.getKeyID()))}getUserIDs(){return this.users.map((e=>e.userID?e.userID.userID:null)).filter((e=>null!==e))}write(){return this.toPacketList().write()}async getSigningKey(e=null,t=new Date,r={},i=L){await this.verifyPrimaryKey(t,r,i);const n=this.keyPacket,a=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created));let s;for(const r of a)if(!e||r.getKeyID().equals(e))try{await r.verify(t,i);const e={key:n,bind:r.keyPacket},a=await Ts(r.bindingSignatures,n,M.signature.subkeyBinding,e,t,i);if(!zs(r.keyPacket,a,i))continue;if(!a.embeddedSignature)throw Error("Missing embedded signature");return await Ts([a.embeddedSignature],r.keyPacket,M.signature.keyBinding,e,t,i),Hs(r.keyPacket,i),r}catch(e){s=e}try{const a=await this.getPrimarySelfSignature(t,r,i);if((!e||n.getKeyID().equals(e))&&zs(n,a,i))return Hs(n,i),this}catch(e){s=e}throw N.wrapError("Could not find valid signing key packet in key "+this.getKeyID().toHex(),s)}async getEncryptionKey(e,t=new Date,r={},i=L){await this.verifyPrimaryKey(t,r,i);const n=this.keyPacket,a=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created));let s;for(const r of a)if(!e||r.getKeyID().equals(e))try{await r.verify(t,i);const e={key:n,bind:r.keyPacket},a=await Ts(r.bindingSignatures,n,M.signature.subkeyBinding,e,t,i);if(Ns(r.keyPacket,a,i))return Hs(r.keyPacket,i),r}catch(e){s=e}try{const a=await this.getPrimarySelfSignature(t,r,i);if((!e||n.getKeyID().equals(e))&&Ns(n,a,i))return Hs(n,i),this}catch(e){s=e}throw N.wrapError("Could not find valid encryption key packet in key "+this.getKeyID().toHex(),s)}async isRevoked(e,t,r=new Date,i=L){return Ms(this.keyPacket,M.signature.keyRevocation,{key:this.keyPacket},this.revocationSignatures,e,t,r,i)}async verifyPrimaryKey(e=new Date,t={},r=L){const i=this.keyPacket;if(await this.isRevoked(null,null,e,r))throw Error("Primary key is revoked");if(Is(i,await this.getPrimarySelfSignature(e,t,r),e))throw Error("Primary key is expired");if(6!==i.version){const t=await Ts(this.directSignatures,i,M.signature.key,{key:i},e,r).catch((()=>{}));if(t&&Is(i,t,e))throw Error("Primary key is expired")}}async getExpirationTime(e,t=L){let r;try{const i=await this.getPrimarySelfSignature(null,e,t),n=Ls(this.keyPacket,i),a=i.getExpirationTime(),s=6!==this.keyPacket.version&&await Ts(this.directSignatures,this.keyPacket,M.signature.key,{key:this.keyPacket},null,t).catch((()=>{}));if(s){const e=Ls(this.keyPacket,s);r=Math.min(n,a,e)}else r=n<a?n:a}catch(e){r=null}return N.normalizeDate(r)}async getPrimarySelfSignature(e=new Date,t={},r=L){const i=this.keyPacket;if(6===i.version)return Ts(this.directSignatures,i,M.signature.key,{key:i},e,r);const{selfCertification:n}=await this.getPrimaryUser(e,t,r);return n}async getPrimaryUser(e=new Date,t={},r=L){const i=this.keyPacket,n=[];let a;for(let s=0;s<this.users.length;s++)try{const a=this.users[s];if(!a.userID)continue;if(void 0!==t.name&&a.userID.name!==t.name||void 0!==t.email&&a.userID.email!==t.email||void 0!==t.comment&&a.userID.comment!==t.comment)throw Error("Could not find user that matches that user ID");const o={userID:a.userID,key:i},c=await Ts(a.selfCertifications,i,M.signature.certGeneric,o,e,r);n.push({index:s,user:a,selfCertification:c})}catch(e){a=e}if(!n.length)throw a||Error("Could not find primary user");await Promise.all(n.map((async function(t){return t.selfCertification.revoked||t.user.isRevoked(t.selfCertification,null,e,r)})));const s=n.sort((function(e,t){const r=e.selfCertification,i=t.selfCertification;return i.revoked-r.revoked||r.isPrimaryUserID-i.isPrimaryUserID||r.created-i.created})).pop(),{user:o,selfCertification:c}=s;if(c.revoked||await o.isRevoked(c,null,e,r))throw Error("Primary user is revoked");return s}async update(e,t=new Date,r=L){if(!this.hasSameFingerprintAs(e))throw Error("Primary key fingerprints must be equal to update the key");if(!this.isPrivate()&&e.isPrivate()){if(!(this.subkeys.length===e.subkeys.length&&this.subkeys.every((t=>e.subkeys.some((e=>t.hasSameFingerprintAs(e)))))))throw Error("Cannot update public key with private key if subkeys mismatch");return e.update(this,r)}const i=this.clone();return await Rs(e,i,"revocationSignatures",t,(n=>Ms(i.keyPacket,M.signature.keyRevocation,i,[n],null,e.keyPacket,t,r))),await Rs(e,i,"directSignatures",t),await Promise.all(e.users.map((async e=>{const n=i.users.filter((t=>e.userID&&e.userID.equals(t.userID)||e.userAttribute&&e.userAttribute.equals(t.userAttribute)));if(n.length>0)await Promise.all(n.map((i=>i.update(e,t,r))));else{const t=e.clone();t.mainKey=i,i.users.push(t)}}))),await Promise.all(e.subkeys.map((async e=>{const n=i.subkeys.filter((t=>t.hasSameFingerprintAs(e)));if(n.length>0)await Promise.all(n.map((i=>i.update(e,t,r))));else{const t=e.clone();t.mainKey=i,i.subkeys.push(t)}}))),i}async getRevocationCertificate(e=new Date,t=L){const r={key:this.keyPacket},i=await Ts(this.revocationSignatures,this.keyPacket,M.signature.keyRevocation,r,e,t),n=new Za;return n.push(i),J(M.armor.publicKey,n.write(),null,null,"This is a revocation certificate")}async applyRevocationCertificate(e,t=new Date,r=L){const i=await Q(e),n=(await Za.fromBinary(i.data,Gs,r)).findPacket(M.packet.signature);if(!n||n.signatureType!==M.signature.keyRevocation)throw Error("Could not find revocation signature packet");if(!n.issuerKeyID.equals(this.getKeyID()))throw Error("Revocation signature does not match key");try{await n.verify(this.keyPacket,M.signature.keyRevocation,{key:this.keyPacket},t,void 0,r)}catch(e){throw N.wrapError("Could not verify revocation signature",e)}const a=this.clone();return a.revocationSignatures.push(n),a}async signPrimaryUser(e,t,r,i=L){const{index:n,user:a}=await this.getPrimaryUser(t,r,i),s=await a.certify(e,t,i),o=this.clone();return o.users[n]=s,o}async signAllUsers(e,t=new Date,r=L){const i=this.clone();return i.users=await Promise.all(this.users.map((function(i){return i.certify(e,t,r)}))),i}async verifyPrimaryUser(e,t=new Date,r,i=L){const n=this.keyPacket,{user:a}=await this.getPrimaryUser(t,r,i);return e?await a.verifyAllCertifications(e,t,i):[{keyID:n.getKeyID(),valid:await a.verify(t,i).catch((()=>!1))}]}async verifyAllUsers(e,t=new Date,r=L){const i=this.keyPacket,n=[];return await Promise.all(this.users.map((async a=>{const s=e?await a.verifyAllCertifications(e,t,r):[{keyID:i.getKeyID(),valid:await a.verify(t,r).catch((()=>!1))}];n.push(...s.map((e=>({userID:a.userID?a.userID.userID:null,userAttribute:a.userAttribute,keyID:e.keyID,valid:e.valid}))))}))),n}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","hasSameFingerprintAs"].forEach((e=>{$s.prototype[e]=qs.prototype[e]}));class Xs extends $s{constructor(e){if(super(),this.keyPacket=null,this.revocationSignatures=[],this.directSignatures=[],this.users=[],this.subkeys=[],e&&(this.packetListToStructure(e,new Set([M.packet.secretKey,M.packet.secretSubkey])),!this.keyPacket))throw Error("Invalid key: missing public-key packet")}isPrivate(){return!1}toPublic(){return this}armor(e=L){return J(M.armor.publicKey,this.toPacketList().write(),void 0,void 0,void 0,e)}}class Zs extends Xs{constructor(e){if(super(),this.packetListToStructure(e,new Set([M.packet.publicKey,M.packet.publicSubkey])),!this.keyPacket)throw Error("Invalid key: missing private-key packet")}isPrivate(){return!0}toPublic(){const e=new Za,t=this.toPacketList();let r=!1;for(const i of t)if(!r||i.constructor.tag!==M.packet.Signature)switch(r&&(r=!1),i.constructor.tag){case M.packet.secretKey:{if(i.algorithm===M.publicKey.aead||i.algorithm===M.publicKey.hmac)throw Error("Cannot create public key from symmetric private");const t=gs.fromSecretKeyPacket(i);e.push(t);break}case M.packet.secretSubkey:{if(i.algorithm===M.publicKey.aead||i.algorithm===M.publicKey.hmac){r=!0;break}const t=ws.fromSecretSubkeyPacket(i);e.push(t);break}default:e.push(i)}return new Xs(e)}armor(e=L){return J(M.armor.privateKey,this.toPacketList().write(),void 0,void 0,void 0,e)}async getDecryptionKeys(e,t=new Date,r={},i=L){const n=this.keyPacket,a=[];for(let r=0;r<this.subkeys.length;r++)if(!e||this.subkeys[r].getKeyID().equals(e,!0))try{const e={key:n,bind:this.subkeys[r].keyPacket},s=await Ts(this.subkeys[r].bindingSignatures,n,M.signature.subkeyBinding,e,t,i);Os(this.subkeys[r].keyPacket,s,i)&&a.push(this.subkeys[r])}catch(e){}const s=await this.getPrimarySelfSignature(t,r,i);return e&&!n.getKeyID().equals(e,!0)||!Os(n,s,i)||a.push(this),a}isDecrypted(){return this.getKeys().some((({keyPacket:e})=>e.isDecrypted()))}async validate(e=L){if(!this.isPrivate())throw Error("Cannot validate a public key");let t;if(this.keyPacket.isDummy()){const r=await this.getSigningKey(null,null,void 0,{...e,rejectPublicKeyAlgorithms:new Set,minRSABits:0});r&&!r.keyPacket.isDummy()&&(t=r.keyPacket)}else t=this.keyPacket;if(t)return t.validate();{const e=this.getKeys();if(e.map((e=>e.keyPacket.isDummy())).every(Boolean))throw Error("Cannot validate an all-gnu-dummy key");return Promise.all(e.map((async e=>e.keyPacket.validate())))}}clearPrivateParams(){this.getKeys().forEach((({keyPacket:e})=>{e.isDecrypted()&&e.clearPrivateParams()}))}async revoke({flag:e=M.reasonForRevocation.noReason,string:t=""}={},r=new Date,i=L){if(!this.isPrivate())throw Error("Need private key for revoking");const n={key:this.keyPacket},a=this.clone();return a.revocationSignatures.push(await Bs(n,null,this.keyPacket,{signatureType:M.signature.keyRevocation,reasonForRevocationFlag:M.write(M.reasonForRevocation,e),reasonForRevocationString:t},r,void 0,void 0,void 0,i)),a}async addSubkey(e={}){const t={...L,...e.config};if(e.passphrase)throw Error("Subkey could not be encrypted here, please encrypt whole key");if(e.rsaBits<t.minRSABits)throw Error(`rsaBits should be at least ${t.minRSABits}, got: ${e.rsaBits}`);const r=this.keyPacket;if(r.isDummy())throw Error("Cannot add subkey to gnu-dummy primary key");if(!r.isDecrypted())throw Error("Key is not decrypted");const i=r.getAlgorithmInfo();i.type=function(e){switch(M.write(M.publicKey,e)){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:case M.publicKey.dsa:return"rsa";case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:return"ecc";case M.publicKey.ed25519:return"curve25519";case M.publicKey.ed448:return"curve448";default:throw Error("Unsupported algorithm")}}(i.algorithm),i.rsaBits=i.bits||4096,i.curve=i.curve||"curve25519Legacy",e=Fs(e,i);const n=await Cs(e,{...t,v6Keys:6===this.keyPacket.version});Hs(n,t);const a=await _s(n,r,e,t),s=this.toPacketList();return s.push(n,a),new Zs(s)}}const Ys=/*#__PURE__*/N.constructAllowedPackets([gs,ws,ks,Ks,As,bs,Ga]);function Qs(e){for(const t of e)switch(t.constructor.tag){case M.packet.secretKey:return new Zs(e);case M.packet.publicKey:return new Xs(e)}throw Error("No key packet found")}async function Js(e,t,r,i){r.passphrase&&await e.encrypt(r.passphrase,i),await Promise.all(t.map((async function(e,t){const n=r.subkeys[t].passphrase;n&&await e.encrypt(n,i)})));const n=new Za;function a(e,t){return[t,...e.filter((e=>e!==t))]}function s(){const e={};e.keyFlags=[M.keyFlags.certifyKeys|M.keyFlags.signData];const t=a([M.symmetric.aes256,M.symmetric.aes128],i.preferredSymmetricAlgorithm);if(e.preferredSymmetricAlgorithms=t,i.aeadProtect){const r=a([M.aead.gcm,M.aead.eax,M.aead.ocb],i.preferredAEADAlgorithm);e.preferredCipherSuites=r.flatMap((e=>t.map((t=>[t,e]))))}return e.preferredHashAlgorithms=a([M.hash.sha256,M.hash.sha512],i.preferredHashAlgorithm),e.preferredCompressionAlgorithms=a([M.compression.uncompressed,M.compression.zlib,M.compression.zip],i.preferredCompressionAlgorithm),e.features=[0],e.features[0]|=M.features.modificationDetection,i.aeadProtect&&(e.features[0]|=M.features.seipdv2),r.keyExpirationTime>0&&(e.keyExpirationTime=r.keyExpirationTime,e.keyNeverExpires=!1),e}if(n.push(e),6===e.version){const t={key:e},a=s();a.signatureType=M.signature.key;const o=await Bs(t,null,e,a,r.date,void 0,void 0,void 0,i);n.push(o)}await Promise.all(r.userIDs.map((async function(t,n){const a=As.fromObject(t),o={userID:a,key:e},c=6!==e.version?s():{};c.signatureType=M.signature.certGeneric,0===n&&(c.isPrimaryUserID=!0);return{userIDPacket:a,signaturePacket:await Bs(o,null,e,c,r.date,void 0,void 0,void 0,i)}}))).then((e=>{e.forEach((({userIDPacket:e,signaturePacket:t})=>{n.push(e),n.push(t)}))})),await Promise.all(t.map((async function(t,n){const a=r.subkeys[n];return{secretSubkeyPacket:t,subkeySignaturePacket:await _s(t,e,a,i)}}))).then((e=>{e.forEach((({secretSubkeyPacket:e,subkeySignaturePacket:t})=>{n.push(e),n.push(t)}))}));const o={key:e};return n.push(await Bs(o,null,e,{signatureType:M.signature.keyRevocation,reasonForRevocationFlag:M.reasonForRevocation.noReason,reasonForRevocationString:""},r.date,void 0,void 0,void 0,i)),r.passphrase&&e.clearPrivateParams(),await Promise.all(t.map((async function(e,t){r.subkeys[t].passphrase&&e.clearPrivateParams()}))),new Zs(n)}async function eo({armoredKey:e,binaryKey:t,config:r,...i}){if(r={...L,...r},!e&&!t)throw Error("readKey: must pass options object containing `armoredKey` or `binaryKey`");if(e&&!N.isString(e))throw Error("readKey: options.armoredKey must be a string");if(t&&!N.isUint8Array(t))throw Error("readKey: options.binaryKey must be a Uint8Array");const n=Object.keys(i);if(n.length>0)throw Error("Unknown option: "+n.join(", "));let a;if(e){const{type:t,data:r}=await Q(e);if(t!==M.armor.publicKey&&t!==M.armor.privateKey)throw Error("Armored text not of type key");a=r}else a=t;return Qs(await Za.fromBinary(a,Ys,r))}async function to({armoredKey:e,binaryKey:t,config:r,...i}){if(r={...L,...r},!e&&!t)throw Error("readPrivateKey: must pass options object containing `armoredKey` or `binaryKey`");if(e&&!N.isString(e))throw Error("readPrivateKey: options.armoredKey must be a string");if(t&&!N.isUint8Array(t))throw Error("readPrivateKey: options.binaryKey must be a Uint8Array");const n=Object.keys(i);if(n.length>0)throw Error("Unknown option: "+n.join(", "));let a;if(e){const{type:t,data:r}=await Q(e);if(t!==M.armor.privateKey)throw Error("Armored text not of type private key");a=r}else a=t;const s=await Za.fromBinary(a,Ys,r);return new Zs(s)}async function ro({armoredKeys:e,binaryKeys:t,config:r,...i}){r={...L,...r};let n=e||t;if(!n)throw Error("readKeys: must pass options object containing `armoredKeys` or `binaryKeys`");if(e&&!N.isString(e))throw Error("readKeys: options.armoredKeys must be a string");if(t&&!N.isUint8Array(t))throw Error("readKeys: options.binaryKeys must be a Uint8Array");const a=Object.keys(i);if(a.length>0)throw Error("Unknown option: "+a.join(", "));if(e){const{type:t,data:r}=await Q(e);if(t!==M.armor.publicKey&&t!==M.armor.privateKey)throw Error("Armored text not of type key");n=r}const s=[],o=await Za.fromBinary(n,Ys,r),c=o.indexOfTag(M.packet.publicKey,M.packet.secretKey);if(0===c.length)throw Error("No key packet found");for(let e=0;e<c.length;e++){const t=Qs(o.slice(c[e],c[e+1]));s.push(t)}return s}async function io({armoredKeys:e,binaryKeys:t,config:r}){r={...L,...r};let i=e||t;if(!i)throw Error("readPrivateKeys: must pass options object containing `armoredKeys` or `binaryKeys`");if(e&&!N.isString(e))throw Error("readPrivateKeys: options.armoredKeys must be a string");if(t&&!N.isUint8Array(t))throw Error("readPrivateKeys: options.binaryKeys must be a Uint8Array");if(e){const{type:t,data:r}=await Q(e);if(t!==M.armor.privateKey)throw Error("Armored text not of type private key");i=r}const n=[],a=await Za.fromBinary(i,Ys,r),s=a.indexOfTag(M.packet.secretKey);if(0===s.length)throw Error("No secret key packet found");for(let e=0;e<s.length;e++){const t=a.slice(s[e],s[e+1]),r=new Zs(t);n.push(r)}return n}const no=/*#__PURE__*/N.constructAllowedPackets([Oa,Qa,hs,os,fs,ys,ps,$a,Ga]),ao=/*#__PURE__*/N.constructAllowedPackets([ps]),so=/*#__PURE__*/N.constructAllowedPackets([Ga]);class oo{constructor(e){this.packets=e||new Za}getEncryptionKeyIDs(){const e=[];return this.packets.filterByTag(M.packet.publicKeyEncryptedSessionKey).forEach((function(t){e.push(t.publicKeyID)})),e}getSigningKeyIDs(){const e=this.unwrapCompressed(),t=e.packets.filterByTag(M.packet.onePassSignature);if(t.length>0)return t.map((e=>e.issuerKeyID));return e.packets.filterByTag(M.packet.signature).map((e=>e.issuerKeyID))}async decrypt(e,t,r,i=new Date,n=L){const a=this.packets.filterByTag(M.packet.symmetricallyEncryptedData,M.packet.symEncryptedIntegrityProtectedData,M.packet.aeadEncryptedData);if(0===a.length)throw Error("No encrypted data found");const s=a[0],o=s.cipherAlgorithm,c=r||await this.decryptSessionKeys(e,t,o,i,n);let u=null;const h=Promise.all(c.map((async({algorithm:e,data:t})=>{if(!N.isUint8Array(t)||!s.cipherAlgorithm&&!N.isString(e))throw Error("Invalid session key for decryption.");try{const r=s.cipherAlgorithm||M.write(M.symmetric,e);await s.decrypt(r,t,n)}catch(e){N.printDebugError(e),u=e}})));if(T(s.encrypted),s.encrypted=null,await h,!s.packets||!s.packets.length)throw u||Error("Decryption failed.");const y=new oo(s.packets);return s.packets=new Za,y}async decryptSessionKeys(e,t,r,i=new Date,n=L){let a,s=[];if(t){const e=this.packets.filterByTag(M.packet.symEncryptedSessionKey);if(0===e.length)throw Error("No symmetrically encrypted session key packet found.");await Promise.all(t.map((async function(t,r){let i;i=r?await Za.fromBinary(e.write(),ao,n):e,await Promise.all(i.map((async function(e){try{await e.decrypt(t),s.push(e)}catch(e){N.printDebugError(e),e instanceof An&&(a=e)}})))})))}else{if(!e)throw Error("No key or password specified.");{const t=this.packets.filterByTag(M.packet.publicKeyEncryptedSessionKey);if(0===t.length)throw Error("No public key encrypted session key packet found.");await Promise.all(t.map((async function(t){await Promise.all(e.map((async function(e){let o=[M.symmetric.aes256,M.symmetric.aes128,M.symmetric.tripledes,M.symmetric.cast5];try{const t=await e.getPrimarySelfSignature(i,void 0,n);t.preferredSymmetricAlgorithms&&(o=o.concat(t.preferredSymmetricAlgorithms))}catch(e){}const c=(await e.getDecryptionKeys(t.publicKeyID,null,void 0,n)).map((e=>e.keyPacket));await Promise.all(c.map((async function(e){if(!e||e.isDummy())return;if(!e.isDecrypted())throw Error("Decryption key is not decrypted.");if(n.constantTimePKCS1Decryption&&(t.publicKeyAlgorithm===M.publicKey.rsaEncrypt||t.publicKeyAlgorithm===M.publicKey.rsaEncryptSign||t.publicKeyAlgorithm===M.publicKey.rsaSign||t.publicKeyAlgorithm===M.publicKey.elgamal)){const i=t.write();await Promise.all((r?[r]:Array.from(n.constantTimePKCS1DecryptionSupportedSymmetricAlgorithms)).map((async t=>{const r=new ys;r.read(i);const n={sessionKeyAlgorithm:t,sessionKey:vn.generateSessionKey(t)};try{await r.decrypt(e,n),s.push(r)}catch(e){N.printDebugError(e),a=e}})))}else try{await t.decrypt(e);const i=r||t.sessionKeyAlgorithm;if(i&&!o.includes(M.write(M.symmetric,i)))throw Error("A non-preferred symmetric algorithm was used.");s.push(t)}catch(e){N.printDebugError(e),a=e}})))}))),T(t.encrypted),t.encrypted=null})))}}if(s.length>0){if(s.length>1){const e=new Set;s=s.filter((t=>{const r=t.sessionKeyAlgorithm+N.uint8ArrayToString(t.sessionKey);return!e.has(r)&&(e.add(r),!0)}))}return s.map((e=>({data:e.sessionKey,algorithm:e.sessionKeyAlgorithm&&M.read(M.symmetric,e.sessionKeyAlgorithm)})))}throw a||Error("Session key decryption failed.")}getLiteralData(){const e=this.unwrapCompressed().packets.findPacket(M.packet.literalData);return e&&e.getBytes()||null}getFilename(){const e=this.unwrapCompressed().packets.findPacket(M.packet.literalData);return e&&e.getFilename()||null}getText(){const e=this.unwrapCompressed().packets.findPacket(M.packet.literalData);return e?e.getText():null}static async generateSessionKey(e=[],t=new Date,r=[],i=L){const{symmetricAlgo:n,aeadAlgo:a}=await async function(e=[],t=new Date,r=[],i=L){const n=await Promise.all(e.map(((e,n)=>e.getPrimarySelfSignature(t,r[n],i))));if(e.length?n.every((e=>e.features[0]&M.features.seipdv2)):i.aeadProtect){const e={symmetricAlgo:M.symmetric.aes128,aeadAlgo:M.aead.ocb},t={symmetricAlgo:i.preferredSymmetricAlgorithm,aeadAlgo:i.preferredAEADAlgorithm};return n.every((e=>e.preferredCipherSuites&&e.preferredCipherSuites.some((e=>e[0]===t.symmetricAlgo&&e[1]===t.aeadAlgo))))?t:e}const a=M.symmetric.aes128,s=i.preferredSymmetricAlgorithm;return{symmetricAlgo:n.every((e=>e.preferredSymmetricAlgorithms&&e.preferredSymmetricAlgorithms.includes(s)))?s:a,aeadAlgo:void 0}}(e,t,r,i),s=M.read(M.symmetric,n),o=a?M.read(M.aead,a):void 0;await Promise.all(e.map((e=>e.getEncryptionKey().catch((()=>null)).then((e=>{if(e&&(e.keyPacket.algorithm===M.publicKey.x25519||e.keyPacket.algorithm===M.publicKey.x448)&&!o&&!N.isAES(n))throw Error("Could not generate a session key compatible with the given `encryptionKeys`: X22519 and X448 keys can only be used to encrypt AES session keys; change `config.preferredSymmetricAlgorithm` accordingly.")})))));return{data:vn.generateSessionKey(n),algorithm:s,aeadAlgorithm:o}}async encrypt(e,t,r,i=!1,n=[],a=new Date,s=[],o=L){if(r){if(!N.isUint8Array(r.data)||!N.isString(r.algorithm))throw Error("Invalid session key for encryption.")}else if(e&&e.length)r=await oo.generateSessionKey(e,a,s,o);else{if(!t||!t.length)throw Error("No keys, passwords, or session key provided.");r=await oo.generateSessionKey(void 0,void 0,void 0,o)}const{data:c,algorithm:u,aeadAlgorithm:h}=r,y=await oo.encryptSessionKey(c,u,h,e,t,i,n,a,s,o),l=os.fromObject({version:h?2:1,aeadAlgorithm:h?M.write(M.aead,h):null});l.packets=this.packets;const p=M.write(M.symmetric,u);return await l.encrypt(p,c,o),y.packets.push(l),l.packets=new Za,y}static async encryptSessionKey(e,t,r,i,n,a=!1,s=[],o=new Date,c=[],u=L){const h=new Za,y=M.write(M.symmetric,t),l=r&&M.write(M.aead,r);if(i){const t=await Promise.all(i.map((async function(t,r){const i=await t.getEncryptionKey(s[r],o,c,u),n=ys.fromObject({version:l?6:3,encryptionKeyPacket:i.keyPacket,anonymousRecipient:a,sessionKey:e,sessionKeyAlgorithm:y});return await n.encrypt(i.keyPacket),delete n.sessionKey,n})));h.push(...t)}if(n){const t=async function(e,t){try{return await e.decrypt(t),1}catch(e){return 0}},r=(e,t)=>e+t,i=async function(e,a,s,o){const c=new ps(u);if(c.sessionKey=e,c.sessionKeyAlgorithm=a,s&&(c.aeadAlgorithm=s),await c.encrypt(o,u),u.passwordCollisionCheck){if(1!==(await Promise.all(n.map((e=>t(c,e))))).reduce(r))return i(e,a,o)}return delete c.sessionKey,c},a=await Promise.all(n.map((t=>i(e,y,l,t))));h.push(...a)}return new oo(h)}async sign(e=[],t=null,r=[],i=new Date,n=[],a=[],s=L){const o=new Za,c=this.packets.findPacket(M.packet.literalData);if(!c)throw Error("No literal data packet to sign.");const u=await co(c,e,t,r,i,n,a,!1,s),h=u.map(((e,t)=>$a.fromSignaturePacket(e,0===t))).reverse();return o.push(...h),o.push(c),o.push(...u),new oo(o)}compress(e,t=L){if(e===M.compression.uncompressed)return this;const r=new Qa(t);r.algorithm=e,r.packets=this.packets;const i=new Za;return i.push(r),new oo(i)}async signDetached(e=[],t=null,r=[],i=new Date,n=[],a=[],s=L){const o=this.packets.findPacket(M.packet.literalData);if(!o)throw Error("No literal data packet to sign.");return new Us(await co(o,e,t,r,i,n,a,!0,s))}async verify(e,t=new Date,r=L){const i=this.unwrapCompressed(),n=i.packets.filterByTag(M.packet.literalData);if(1!==n.length)throw Error("Can only verify message with one literal data packet.");s(i.packets.stream)&&i.packets.push(...await x(i.packets.stream,(e=>e||[])));const a=i.packets.filterByTag(M.packet.onePassSignature).reverse(),o=i.packets.filterByTag(M.packet.signature);return a.length&&!o.length&&N.isStream(i.packets.stream)&&!s(i.packets.stream)?(await Promise.all(a.map((async e=>{e.correspondingSig=new Promise(((t,r)=>{e.correspondingSigResolve=t,e.correspondingSigReject=r})),e.signatureData=I((async()=>(await e.correspondingSig).signatureData)),e.hashed=x(await e.hash(e.signatureType,n[0],void 0,!1)),e.hashed.catch((()=>{}))}))),i.packets.stream=E(i.packets.stream,(async(e,t)=>{const r=_(e),i=B(t);try{for(let e=0;e<a.length;e++){const{value:t}=await r.read();a[e].correspondingSigResolve(t)}await r.readToEnd(),await i.ready,await i.close()}catch(e){a.forEach((t=>{t.correspondingSigReject(e)})),await i.abort(e)}})),uo(a,n,e,t,!1,r)):uo(o,n,e,t,!1,r)}verifyDetached(e,t,r=new Date,i=L){const n=this.unwrapCompressed().packets.filterByTag(M.packet.literalData);if(1!==n.length)throw Error("Can only verify message with one literal data packet.");return uo(e.packets.filterByTag(M.packet.signature),n,t,r,!0,i)}unwrapCompressed(){const e=this.packets.filterByTag(M.packet.compressedData);return e.length?new oo(e[0].packets):this}async appendSignature(e,t=L){await this.packets.read(N.isUint8Array(e)?e:(await Q(e)).data,so,t)}write(){return this.packets.write()}armor(e=L){return J(M.armor.message,this.write(),null,null,null,e)}}async function co(e,t,r=null,i=[],n=new Date,a=[],s=[],o=!1,c=L){const u=new Za,h=null===e.text?M.signature.binary:M.signature.text;if(await Promise.all(t.map((async(t,r)=>{const u=a[r];if(!t.isPrivate())throw Error("Need private key for signing");const y=await t.getSigningKey(i[r],n,u,c);return Bs(e,t,y.keyPacket,{signatureType:h},n,u,s,o,c)}))).then((e=>{u.push(...e)})),r){const e=r.packets.filterByTag(M.packet.signature);u.push(...e)}return u}async function uo(e,t,r,i=new Date,n=!1,a=L){return Promise.all(e.filter((function(e){return["text","binary"].includes(M.read(M.signature,e.signatureType))})).map((async function(e){return async function(e,t,r,i=new Date,n=!1,a=L){let s,o;for(const t of r){const r=t.getKeys(e.issuerKeyID);if(r.length>0){s=t,o=r[0];break}}const c=e instanceof $a?e.correspondingSig:e,u={keyID:e.issuerKeyID,verified:(async()=>{if(!o)throw Error("Could not find signing key with key ID "+e.issuerKeyID.toHex());await e.verify(o.keyPacket,e.signatureType,t[0],i,n,a);const r=await c;if(o.getCreationTime()>r.created)throw Error("Key is newer than the signature");try{await s.getSigningKey(o.getKeyID(),r.created,void 0,a)}catch(e){if(!a.allowInsecureVerificationWithReformattedKeys||!e.message.match(/Signature creation time is in the future/))throw e;await s.getSigningKey(o.getKeyID(),i,void 0,a)}return!0})(),signature:(async()=>{const e=await c,t=new Za;return e&&t.push(e),new Us(t)})()};return u.signature.catch((()=>{})),u.verified.catch((()=>{})),u}(e,t,r,i,n,a)})))}async function ho({armoredMessage:e,binaryMessage:t,config:r,...i}){r={...L,...r};let n=e||t;if(!n)throw Error("readMessage: must pass options object containing `armoredMessage` or `binaryMessage`");if(e&&!N.isString(e)&&!N.isStream(e))throw Error("readMessage: options.armoredMessage must be a string or stream");if(t&&!N.isUint8Array(t)&&!N.isStream(t))throw Error("readMessage: options.binaryMessage must be a Uint8Array or stream");const a=Object.keys(i);if(a.length>0)throw Error("Unknown option: "+a.join(", "));const s=N.isStream(n);if(e){const{type:e,data:t}=await Q(n);if(e!==M.armor.message)throw Error("Armored text not of type message");n=t}const o=await Za.fromBinary(n,no,r),c=new oo(o);return c.fromStream=s,c}async function yo({text:e,binary:t,filename:r,date:i=new Date,format:n=(void 0!==e?"utf8":"binary"),...a}){const s=void 0!==e?e:t;if(void 0===s)throw Error("createMessage: must pass options object containing `text` or `binary`");if(e&&!N.isString(e)&&!N.isStream(e))throw Error("createMessage: options.text must be a string or stream");if(t&&!N.isUint8Array(t)&&!N.isStream(t))throw Error("createMessage: options.binary must be a Uint8Array or stream");const o=Object.keys(a);if(o.length>0)throw Error("Unknown option: "+o.join(", "));const c=N.isStream(s),u=new Oa(i);void 0!==e?u.setText(s,M.write(M.literal,n)):u.setBytes(s,M.write(M.literal,n)),void 0!==r&&u.setFilename(r);const h=new Za;h.push(u);const y=new oo(h);return y.fromStream=c,y}const lo=/*#__PURE__*/N.constructAllowedPackets([Ga]);class po{constructor(e,t){if(this.text=N.removeTrailingSpaces(e).replace(/\r?\n/g,"\r\n"),t&&!(t instanceof Us))throw Error("Invalid signature input");this.signature=t||new Us(new Za)}getSigningKeyIDs(){const e=[];return this.signature.packets.forEach((function(t){e.push(t.issuerKeyID)})),e}async sign(e,t=null,r=[],i=new Date,n=[],a=[],s=L){const o=new Oa;o.setText(this.text);const c=new Us(await co(o,e,t,r,i,n,a,!0,s));return new po(this.text,c)}verify(e,t=new Date,r=L){const i=this.signature.packets.filterByTag(M.packet.signature),n=new Oa;return n.setText(this.text),uo(i,[n],e,t,!0,r)}getText(){return this.text.replace(/\r\n/g,"\n")}armor(e=L){const t={hash:this.signature.packets.some((e=>6!==e.version))?Array.from(new Set(this.signature.packets.map((e=>M.read(M.hash,e.hashAlgorithm).toUpperCase())))).join():null,text:this.text,data:this.signature.packets.write()};return J(M.armor.signed,t,void 0,void 0,void 0,e)}}async function go({cleartextMessage:e,config:t,...r}){if(t={...L,...t},!e)throw Error("readCleartextMessage: must pass options object containing `cleartextMessage`");if(!N.isString(e))throw Error("readCleartextMessage: options.cleartextMessage must be a string");const i=Object.keys(r);if(i.length>0)throw Error("Unknown option: "+i.join(", "));const n=await Q(e);if(n.type!==M.armor.signed)throw Error("No cleartext signed message.");const a=await Za.fromBinary(n.data,lo,t);!function(e,t){const r=function(e){const r=e=>t=>e.hashAlgorithm===t;for(let i=0;i<t.length;i++)if(t[i].constructor.tag===M.packet.signature&&!e.some(r(t[i])))return!1;return!0},i=[];if(e.forEach((e=>{const t=e.match(/^Hash: (.+)$/);if(!t)throw Error('Only "Hash" header allowed in cleartext signed message');{const e=t[1].replace(/\s/g,"").split(",").map((e=>{try{return M.write(M.hash,e.toLowerCase())}catch(t){throw Error("Unknown hash algorithm in armor header: "+e.toLowerCase())}}));i.push(...e)}})),i.length&&!r(i))throw Error("Hash algorithm mismatch in armor header and signature")}(n.headers,a);const s=new Us(a);return new po(n.text,s)}async function fo({text:e,...t}){if(!e)throw Error("createCleartextMessage: must pass options object containing `text`");if(!N.isString(e))throw Error("createCleartextMessage: options.text must be a string");const r=Object.keys(t);if(r.length>0)throw Error("Unknown option: "+r.join(", "));return new po(e)}async function mo({userIDs:e=[],passphrase:t,type:r,curve:i,rsaBits:n=4096,symmetricHash:a="sha256",symmetricCipher:s="aes256",keyExpirationTime:o=0,date:c=new Date,subkeys:u=[{}],format:h="armored",config:y,...l}){_o(y={...L,...y}),r||i?(r=r||"ecc",i=i||"curve25519Legacy"):(r=y.v6Keys?"curve25519":"ecc",i="curve25519Legacy"),e=Bo(e);const p=Object.keys(l);if(p.length>0)throw Error("Unknown option: "+p.join(", "));if(0===e.length&&!y.v6Keys)throw Error("UserIDs are required for V4 keys");if("rsa"===r&&n<y.minRSABits)throw Error(`rsaBits should be at least ${y.minRSABits}, got: ${n}`);const g={userIDs:e,passphrase:t,type:r,rsaBits:n,curve:i,keyExpirationTime:o,date:c,subkeys:u,symmetricHash:a,symmetricCipher:s};try{const{key:e,revocationCertificate:t}=await async function(e,t){e.sign=!0,(e=Fs(e)).subkeys=e.subkeys.map(((t,r)=>Fs(e.subkeys[r],e)));let r=[xs(e,t)];r=r.concat(e.subkeys.map((e=>Cs(e,t))));const i=await Promise.all(r),n=await Js(i[0],i.slice(1),e,t),a=await n.getRevocationCertificate(e.date,t);return n.revocationSignatures=[],{key:n,revocationCertificate:a}}(g,y);return e.getKeys().forEach((({keyPacket:e})=>Hs(e,y))),{privateKey:Lo(e,h,y),publicKey:"symmetric"!==r?Lo(e.toPublic(),h,y):null,revocationCertificate:t}}catch(e){throw N.wrapError("Error generating keypair",e)}}async function wo({privateKey:e,userIDs:t=[],passphrase:r,keyExpirationTime:i=0,date:n,format:a="armored",config:s,...o}){_o(s={...L,...s}),t=Bo(t);const c=Object.keys(o);if(c.length>0)throw Error("Unknown option: "+c.join(", "));if(0===t.length&&6!==e.keyPacket.version)throw Error("UserIDs are required for V4 keys");const u={privateKey:e,userIDs:t,passphrase:r,keyExpirationTime:i,date:n};try{const{key:e,revocationCertificate:t}=await async function(e,t){e=o(e);const{privateKey:r}=e;if(!r.isPrivate())throw Error("Cannot reformat a public key");if(r.keyPacket.isDummy())throw Error("Cannot reformat a gnu-dummy primary key");if(!r.getKeys().every((({keyPacket:e})=>e.isDecrypted())))throw Error("Key is not decrypted");const i=r.keyPacket;e.subkeys||(e.subkeys=await Promise.all(r.subkeys.map((async e=>{const r=e.keyPacket,n={key:i,bind:r},a=await Ts(e.bindingSignatures,i,M.signature.subkeyBinding,n,null,t).catch((()=>({})));return{sign:a.keyFlags&&a.keyFlags[0]&M.keyFlags.signData,forwarding:a.keyFlags&&a.keyFlags[0]&M.keyFlags.forwardedCommunication}}))));const n=r.subkeys.map((e=>e.keyPacket));if(e.subkeys.length!==n.length)throw Error("Number of subkey options does not match number of subkeys");e.subkeys=e.subkeys.map((t=>o(t,e)));const a=await Js(i,n,e,t),s=await a.getRevocationCertificate(e.date,t);return a.revocationSignatures=[],{key:a,revocationCertificate:s};function o(e,t={}){return e.keyExpirationTime=e.keyExpirationTime||t.keyExpirationTime,e.passphrase=N.isString(e.passphrase)?e.passphrase:t.passphrase,e.date=e.date||t.date,e}}(u,s);return{privateKey:Lo(e,a,s),publicKey:Lo(e.toPublic(),a,s),revocationCertificate:t}}catch(e){throw N.wrapError("Error reformatting keypair",e)}}async function bo({key:e,revocationCertificate:t,reasonForRevocation:r,date:i=new Date,format:n="armored",config:a,...s}){_o(a={...L,...a});const o=Object.keys(s);if(o.length>0)throw Error("Unknown option: "+o.join(", "));try{const s=t?await e.applyRevocationCertificate(t,i,a):await e.revoke(r,i,a);return s.isPrivate()?{privateKey:Lo(s,n,a),publicKey:Lo(s.toPublic(),n,a)}:{privateKey:null,publicKey:Lo(s,n,a)}}catch(e){throw N.wrapError("Error revoking key",e)}}async function ko({privateKey:e,passphrase:t,config:r,...i}){_o(r={...L,...r});const n=Object.keys(i);if(n.length>0)throw Error("Unknown option: "+n.join(", "));if(!e.isPrivate())throw Error("Cannot decrypt a public key");const a=e.clone(!0),s=N.isArray(t)?t:[t];try{return await Promise.all(a.getKeys().map((e=>N.anyPromise(s.map((t=>e.keyPacket.decrypt(t))))))),await a.validate(r),a}catch(e){throw a.clearPrivateParams(),N.wrapError("Error decrypting private key",e)}}async function vo({privateKey:e,passphrase:t,config:r,...i}){_o(r={...L,...r});const n=Object.keys(i);if(n.length>0)throw Error("Unknown option: "+n.join(", "));if(!e.isPrivate())throw Error("Cannot encrypt a public key");const a=e.clone(!0),s=a.getKeys(),o=N.isArray(t)?t:Array(s.length).fill(t);if(o.length!==s.length)throw Error("Invalid number of passphrases given for key encryption");try{return await Promise.all(s.map((async(e,t)=>{const{keyPacket:i}=e;await i.encrypt(o[t],r),i.clearPrivateParams()}))),a}catch(e){throw a.clearPrivateParams(),N.wrapError("Error encrypting private key",e)}}async function Ao({message:e,encryptionKeys:t,signingKeys:r,passwords:i,sessionKey:n,format:a="armored",signature:s=null,wildcard:o=!1,signingKeyIDs:c=[],encryptionKeyIDs:u=[],date:h=new Date,signingUserIDs:y=[],encryptionUserIDs:l=[],signatureNotations:p=[],config:g,...d}){if(_o(g={...L,...g}),Co(e),To(a),t=Bo(t),r=Bo(r),i=Bo(i),c=Bo(c),u=Bo(u),y=Bo(y),l=Bo(l),p=Bo(p),d.detached)throw Error("The `detached` option has been removed from openpgp.encrypt, separately call openpgp.sign instead. Don't forget to remove the `privateKeys` option as well.");if(d.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.encrypt, pass `encryptionKeys` instead");if(d.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.encrypt, pass `signingKeys` instead");if(void 0!==d.armor)throw Error("The `armor` option has been removed from openpgp.encrypt, pass `format` instead.");const f=Object.keys(d);if(f.length>0)throw Error("Unknown option: "+f.join(", "));r||(r=[]);const m=e.fromStream;try{if((r.length||s)&&(e=await e.sign(r,s,c,h,y,p,g)),e=e.compress(await async function(e=[],t=new Date,r=[],i=L){const n=M.compression.uncompressed,a=i.preferredCompressionAlgorithm,s=await Promise.all(e.map((async function(e,n){const s=(await e.getPrimarySelfSignature(t,r[n],i)).preferredCompressionAlgorithms;return!!s&&s.indexOf(a)>=0})));return s.every(Boolean)?a:n}(t,h,l,g),g),e=await e.encrypt(t,i,n,o,u,h,l,g),"object"===a)return e;const d="armored"===a;return Ro(d?e.armor(g):e.write(),m,d?"utf8":"binary")}catch(e){throw N.wrapError("Error encrypting message",e)}}async function Ko({message:e,decryptionKeys:t,passwords:r,sessionKeys:i,verificationKeys:n,expectSigned:a=!1,format:s="utf8",signature:o=null,date:c=new Date,config:u,...h}){if(_o(u={...L,...u}),Co(e),n=Bo(n),t=Bo(t),r=Bo(r),i=Bo(i),h.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.decrypt, pass `decryptionKeys` instead");if(h.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.decrypt, pass `verificationKeys` instead");const y=Object.keys(h);if(y.length>0)throw Error("Unknown option: "+y.join(", "));try{const h=await e.decrypt(t,r,i,c,u);n||(n=[]);const y={};if(y.signatures=o?await h.verifyDetached(o,n,c,u):await h.verify(n,c,u),y.data="binary"===s?h.getLiteralData():h.getText(),y.filename=h.getFilename(),Mo(y,e),a){if(0===n.length)throw Error("Verification keys are required to verify message signatures");if(0===y.signatures.length)throw Error("Message is not signed");y.data=b([y.data,I((async()=>{await N.anyPromise(y.signatures.map((e=>e.verified)))}))])}return y.data=await Ro(y.data,e.fromStream,s),y}catch(e){throw N.wrapError("Error decrypting message",e)}}async function Eo({message:e,signingKeys:t,format:r="armored",detached:i=!1,signingKeyIDs:n=[],date:a=new Date,signingUserIDs:s=[],signatureNotations:o=[],config:c,...u}){if(_o(c={...L,...c}),xo(e),To(r),t=Bo(t),n=Bo(n),s=Bo(s),o=Bo(o),u.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.sign, pass `signingKeys` instead");if(void 0!==u.armor)throw Error("The `armor` option has been removed from openpgp.sign, pass `format` instead.");const h=Object.keys(u);if(h.length>0)throw Error("Unknown option: "+h.join(", "));if(e instanceof po&&"binary"===r)throw Error("Cannot return signed cleartext message in binary format");if(e instanceof po&&i)throw Error("Cannot detach-sign a cleartext message");if(!t||0===t.length)throw Error("No signing keys provided");try{let u;if(u=i?await e.signDetached(t,void 0,n,a,s,o,c):await e.sign(t,void 0,n,a,s,o,c),"object"===r)return u;const h="armored"===r;return u=h?u.armor(c):u.write(),i&&(u=E(e.packets.write(),(async(e,t)=>{await Promise.all([k(u,t),x(e).catch((()=>{}))])}))),Ro(u,e.fromStream,h?"utf8":"binary")}catch(e){throw N.wrapError("Error signing message",e)}}async function So({message:e,verificationKeys:t,expectSigned:r=!1,format:i="utf8",signature:n=null,date:a=new Date,config:s,...o}){if(_o(s={...L,...s}),xo(e),t=Bo(t),o.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.verify, pass `verificationKeys` instead");const c=Object.keys(o);if(c.length>0)throw Error("Unknown option: "+c.join(", "));if(e instanceof po&&"binary"===i)throw Error("Can't return cleartext message data as binary");if(e instanceof po&&n)throw Error("Can't verify detached cleartext signature");try{const o={};if(o.signatures=n?await e.verifyDetached(n,t,a,s):await e.verify(t,a,s),o.data="binary"===i?e.getLiteralData():e.getText(),e.fromStream&&Mo(o,e),r){if(0===o.signatures.length)throw Error("Message is not signed");o.data=b([o.data,I((async()=>{await N.anyPromise(o.signatures.map((e=>e.verified)))}))])}return o.data=await Ro(o.data,e.fromStream,i),o}catch(e){throw N.wrapError("Error verifying signed message",e)}}async function Po({encryptionKeys:e,date:t=new Date,encryptionUserIDs:r=[],config:i,...n}){if(_o(i={...L,...i}),e=Bo(e),r=Bo(r),n.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.generateSessionKey, pass `encryptionKeys` instead");const a=Object.keys(n);if(a.length>0)throw Error("Unknown option: "+a.join(", "));try{return await oo.generateSessionKey(e,t,r,i)}catch(e){throw N.wrapError("Error generating session key",e)}}async function Uo({data:e,algorithm:t,aeadAlgorithm:r,encryptionKeys:i,passwords:n,format:a="armored",wildcard:s=!1,encryptionKeyIDs:o=[],date:c=new Date,encryptionUserIDs:u=[],config:h,...y}){if(_o(h={...L,...h}),function(e,t){if(!N.isUint8Array(e))throw Error("Parameter ["+(t||"data")+"] must be of type Uint8Array")}(e),function(e,t){if(!N.isString(e))throw Error("Parameter ["+(t||"data")+"] must be of type String")}(t,"algorithm"),To(a),i=Bo(i),n=Bo(n),o=Bo(o),u=Bo(u),y.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.encryptSessionKey, pass `encryptionKeys` instead");const l=Object.keys(y);if(l.length>0)throw Error("Unknown option: "+l.join(", "));if(!(i&&0!==i.length||n&&0!==n.length))throw Error("No encryption keys or passwords provided.");try{return Lo(await oo.encryptSessionKey(e,t,r,i,n,s,o,c,u,h),a,h)}catch(e){throw N.wrapError("Error encrypting session key",e)}}async function Do({message:e,decryptionKeys:t,passwords:r,date:i=new Date,config:n,...a}){if(_o(n={...L,...n}),Co(e),t=Bo(t),r=Bo(r),a.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.decryptSessionKeys, pass `decryptionKeys` instead");const s=Object.keys(a);if(s.length>0)throw Error("Unknown option: "+s.join(", "));try{return await e.decryptSessionKeys(t,r,void 0,i,n)}catch(e){throw N.wrapError("Error decrypting session keys",e)}}function Co(e){if(!(e instanceof oo))throw Error("Parameter [message] needs to be of type Message")}function xo(e){if(!(e instanceof po||e instanceof oo))throw Error("Parameter [message] needs to be of type Message or CleartextMessage")}function To(e){if("armored"!==e&&"binary"!==e&&"object"!==e)throw Error("Unsupported format "+e)}const Io=Object.keys(L).length;function _o(e){const t=Object.keys(e);if(t.length!==Io)for(const e of t)if(void 0===L[e])throw Error("Unknown config property: "+e)}function Bo(e){return e&&!N.isArray(e)&&(e=[e]),e}async function Ro(e,t,r="utf8"){return"array"===N.isStream(e)?x(e):"node"===t?(e=u(e),"binary"!==r&&e.setEncoding(r),e):e}function Mo(e,t){e.data=E(t.packets.stream,(async(t,r)=>{await k(e.data,r,{preventClose:!0});const i=B(r);try{await x(t,(e=>e)),await i.close()}catch(e){await i.abort(e)}}))}function Lo(e,t,r){switch(t){case"object":return e;case"armored":return e.armor(r);case"binary":return e.write();default:throw Error("Unsupported format "+t)}}export{hs as AEADEncryptedDataPacket,po as CleartextMessage,Qa as CompressedDataPacket,un as KDFParams,Oa as LiteralDataPacket,ms as MarkerPacket,oo as Message,$a as OnePassSignaturePacket,Za as PacketList,Ss as PaddingPacket,Zs as PrivateKey,Xs as PublicKey,ys as PublicKeyEncryptedSessionKeyPacket,gs as PublicKeyPacket,ws as PublicSubkeyPacket,ks as SecretKeyPacket,Ks as SecretSubkeyPacket,Us as Signature,Ga as SignaturePacket,qs as Subkey,os as SymEncryptedIntegrityProtectedDataPacket,ps as SymEncryptedSessionKeyPacket,fs as SymmetricallyEncryptedDataPacket,Es as TrustPacket,ii as UnparseablePacket,bs as UserAttributePacket,As as UserIDPacket,J as armor,L as config,fo as createCleartextMessage,yo as createMessage,Ko as decrypt,ko as decryptKey,Do as decryptSessionKeys,Ao as encrypt,vo as encryptKey,Uo as encryptSessionKey,M as enums,mo as generateKey,Po as generateSessionKey,go as readCleartextMessage,eo as readKey,ro as readKeys,ho as readMessage,to as readPrivateKey,io as readPrivateKeys,Ds as readSignature,wo as reformatKey,bo as revokeKey,Eo as sign,Q as unarmor,So as verify};
|
|
1
|
+
/*! OpenPGP.js v6.0.0-alpha.1.patch.0 - 2024-03-01 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
|
|
2
|
+
const e="undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:{},t=Symbol("doneWritingPromise"),r=Symbol("doneWritingResolve"),i=Symbol("doneWritingReject"),a=Symbol("readingIndex");class n extends Array{constructor(){super(),Object.setPrototypeOf(this,n.prototype),this[t]=new Promise(((e,t)=>{this[r]=e,this[i]=t})),this[t].catch((()=>{}))}}function s(e){return e&&e.getReader&&Array.isArray(e)}function o(e){if(!s(e)){const t=e.getWriter(),r=t.releaseLock;return t.releaseLock=()=>{t.closed.catch((function(){})),r.call(t)},t}this.stream=e}function c(t){if(s(t))return"array";if(e.ReadableStream&&e.ReadableStream.prototype.isPrototypeOf(t))return"web";if(t&&!(e.ReadableStream&&t instanceof e.ReadableStream)&&"function"==typeof t._read&&"object"==typeof t._readableState)throw Error("Native Node streams are no longer supported: please manually convert the stream to a WebStream, using e.g. `stream.Readable.toWeb`");return!(!t||!t.getReader)&&"web-like"}function u(e){return Uint8Array.prototype.isPrototypeOf(e)}function h(e){if(1===e.length)return e[0];let t=0;for(let r=0;r<e.length;r++){if(!u(e[r]))throw Error("concatUint8Array: Data must be in the form of a Uint8Array");t+=e[r].length}const r=new Uint8Array(t);let i=0;return e.forEach((function(e){r.set(e,i),i+=e.length})),r}n.prototype.getReader=function(){return void 0===this[a]&&(this[a]=0),{read:async()=>(await this[t],this[a]===this.length?{value:void 0,done:!0}:{value:this[this[a]++],done:!1})}},n.prototype.readToEnd=async function(e){await this[t];const r=e(this.slice(this[a]));return this.length=0,r},n.prototype.clone=function(){const e=new n;return e[t]=this[t].then((()=>{e.push(...this)})),e},o.prototype.write=async function(e){this.stream.push(e)},o.prototype.close=async function(){this.stream[r]()},o.prototype.abort=async function(e){return this.stream[i](e),e},o.prototype.releaseLock=function(){},"object"==typeof e.process&&e.process.versions;const y=new WeakSet,l=Symbol("externalBuffer");function p(e){if(this.stream=e,e[l]&&(this[l]=e[l].slice()),s(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{},void(this._cancel=()=>{})}if(c(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{t.closed.catch((function(){})),t.releaseLock()},void(this._cancel=t.cancel.bind(t))}let t=!1;this._read=async()=>t||y.has(e)?{value:void 0,done:!0}:(t=!0,{value:e,done:!1}),this._releaseLock=()=>{if(t)try{y.add(e)}catch(e){}}}function g(e){return c(e)?e:new ReadableStream({start(t){t.enqueue(e),t.close()}})}function d(e){if(c(e))return e;const t=new n;return(async()=>{const r=T(t);await r.write(e),await r.close()})(),t}function f(e){return e.some((e=>c(e)&&!s(e)))?function(e){e=e.map(g);const t=b((async function(e){await Promise.all(i.map((t=>D(t,e))))}));let r=Promise.resolve();const i=e.map(((i,a)=>v(i,((i,n)=>(r=r.then((()=>m(i,t.writable,{preventClose:a!==e.length-1}))),r)))));return t.readable}(e):e.some((e=>s(e)))?function(e){const t=new n;let r=Promise.resolve();return e.forEach(((i,a)=>(r=r.then((()=>m(i,t,{preventClose:a!==e.length-1}))),r))),t}(e):"string"==typeof e[0]?e.join(""):h(e)}async function m(e,t,{preventClose:r=!1,preventAbort:i=!1,preventCancel:a=!1}={}){if(c(e)&&!s(e)){e=g(e);try{if(e[l]){const r=T(t);for(let t=0;t<e[l].length;t++)await r.ready,await r.write(e[l][t]);r.releaseLock()}await e.pipeTo(t,{preventClose:r,preventAbort:i,preventCancel:a})}catch(e){}return}const n=x(e=d(e)),o=T(t);try{for(;;){await o.ready;const{done:e,value:t}=await n.read();if(e){r||await o.close();break}await o.write(t)}}catch(e){i||await o.abort(e)}finally{n.releaseLock(),o.releaseLock()}}function w(e,t){const r=new TransformStream(t);return m(e,r.writable),r.readable}function b(e){let t,r,i=!1;return{readable:new ReadableStream({start(e){r=e},pull(){t?t():i=!0},cancel:e},{highWaterMark:0}),writable:new WritableStream({write:async function(e){r.enqueue(e),i?i=!1:(await new Promise((e=>{t=e})),t=null)},close:r.close.bind(r),abort:r.error.bind(r)})}}function k(e,t=(()=>{}),r=(()=>{})){if(s(e)){const i=new n;return(async()=>{const a=T(i);try{const i=await U(e),n=t(i),s=r();let o;o=void 0!==n&&void 0!==s?f([n,s]):void 0!==n?n:s,await a.write(o),await a.close()}catch(e){await a.abort(e)}})(),i}if(c(e))return w(e,{async transform(e,r){try{const i=await t(e);void 0!==i&&r.enqueue(i)}catch(e){r.error(e)}},async flush(e){try{const t=await r();void 0!==t&&e.enqueue(t)}catch(t){e.error(t)}}});const i=t(e),a=r();return void 0!==i&&void 0!==a?f([i,a]):void 0!==i?i:a}function v(e,t){if(c(e)&&!s(e)){let r;const i=new TransformStream({start(e){r=e}}),a=m(e,i.writable),n=b((async function(e){r.error(e),await a,await new Promise(setTimeout)}));return t(i.readable,n.writable),n.readable}e=d(e);const r=new n;return t(e,r),r}function A(e,t){let r;const i=v(e,((e,a)=>{const n=x(e);n.remainder=()=>(n.releaseLock(),m(e,a),i),r=t(n)}));return r}function K(e){if(s(e))return e.clone();if(c(e)){const t=function(e){if(s(e))throw Error("ArrayStream cannot be tee()d, use clone() instead");if(c(e)){const t=g(e).tee();return t[0][l]=t[1][l]=e[l],t}return[P(e),P(e)]}(e);return S(e,t[0]),t[1]}return P(e)}function E(e){return s(e)?K(e):c(e)?new ReadableStream({start(t){const r=v(e,(async(e,r)=>{const i=x(e),a=T(r);try{for(;;){await a.ready;const{done:e,value:r}=await i.read();if(e){try{t.close()}catch(e){}return void await a.close()}try{t.enqueue(r)}catch(e){}await a.write(r)}}catch(e){t.error(e),await a.abort(e)}}));S(e,r)}}):P(e)}function S(e,t){Object.entries(Object.getOwnPropertyDescriptors(e.constructor.prototype)).forEach((([r,i])=>{"constructor"!==r&&(i.value?i.value=i.value.bind(t):i.get=i.get.bind(t),Object.defineProperty(e,r,i))}))}function P(e,t=0,r=1/0){if(s(e))throw Error("Not implemented");if(c(e)){if(t>=0&&r>=0){let i=0;return w(e,{transform(e,a){i<r?(i+e.length>=t&&a.enqueue(P(e,Math.max(t-i,0),r-i)),i+=e.length):a.terminate()}})}if(t<0&&(r<0||r===1/0)){let i=[];return k(e,(e=>{e.length>=-t?i=[e]:i.push(e)}),(()=>P(f(i),t,r)))}if(0===t&&r<0){let i;return k(e,(e=>{const a=i?f([i,e]):e;if(a.length>=-r)return i=P(a,r),P(a,t,r);i=a}))}return console.warn(`stream.slice(input, ${t}, ${r}) not implemented efficiently.`),C((async()=>P(await U(e),t,r)))}return e[l]&&(e=f(e[l].concat([e]))),u(e)?e.subarray(t,r===1/0?e.length:r):e.slice(t,r)}async function U(e,t=f){return s(e)?e.readToEnd(t):c(e)?x(e).readToEnd(t):e}async function D(e,t){if(c(e)){if(e.cancel){const r=await e.cancel(t);return await new Promise(setTimeout),r}if(e.destroy)return e.destroy(t),await new Promise(setTimeout),t}}function C(e){const t=new n;return(async()=>{const r=T(t);try{await r.write(await e()),await r.close()}catch(e){await r.abort(e)}})(),t}function x(e){return new p(e)}function T(e){return new o(e)}p.prototype.read=async function(){if(this[l]&&this[l].length){return{done:!1,value:this[l].shift()}}return this._read()},p.prototype.releaseLock=function(){this[l]&&(this.stream[l]=this[l]),this._releaseLock()},p.prototype.cancel=function(e){return this._cancel(e)},p.prototype.readLine=async function(){let e,t=[];for(;!e;){let{done:r,value:i}=await this.read();if(i+="",r)return t.length?f(t):void 0;const a=i.indexOf("\n")+1;a&&(e=f(t.concat(i.substr(0,a))),t=[]),a!==i.length&&t.push(i.substr(a))}return this.unshift(...t),e},p.prototype.readByte=async function(){const{done:e,value:t}=await this.read();if(e)return;const r=t[0];return this.unshift(P(t,1)),r},p.prototype.readBytes=async function(e){const t=[];let r=0;for(;;){const{done:i,value:a}=await this.read();if(i)return t.length?f(t):void 0;if(t.push(a),r+=a.length,r>=e){const r=f(t);return this.unshift(P(r,e)),P(r,0,e)}}},p.prototype.peekBytes=async function(e){const t=await this.readBytes(e);return this.unshift(t),t},p.prototype.unshift=function(...e){this[l]||(this[l]=[]),1===e.length&&u(e[0])&&this[l].length&&e[0].length&&this[l][0].byteOffset>=e[0].length?this[l][0]=new Uint8Array(this[l][0].buffer,this[l][0].byteOffset-e[0].length,this[l][0].byteLength+e[0].length):this[l].unshift(...e.filter((e=>e&&e.length)))},p.prototype.readToEnd=async function(e=f){const t=[];for(;;){const{done:e,value:r}=await this.read();if(e)break;t.push(r)}return e(t)};const I=Symbol("byValue");var _={curve:{nistP256:"nistP256",p256:"nistP256",nistP384:"nistP384",p384:"nistP384",nistP521:"nistP521",p521:"nistP521",secp256k1:"secp256k1",ed25519Legacy:"ed25519Legacy",ed25519:"ed25519Legacy",curve25519Legacy:"curve25519Legacy",curve25519:"curve25519Legacy",brainpoolP256r1:"brainpoolP256r1",brainpoolP384r1:"brainpoolP384r1",brainpoolP512r1:"brainpoolP512r1"},kdfFlags:{replace_fingerprint:1,replace_kdf_params:2},s2k:{simple:0,salted:1,iterated:3,argon2:4,gnu:101},publicKey:{rsaEncryptSign:1,rsaEncrypt:2,rsaSign:3,elgamal:16,dsa:17,ecdh:18,ecdsa:19,eddsaLegacy:22,aedh:23,aedsa:24,x25519:25,x448:26,ed25519:27,ed448:28,aead:100,hmac:101},symmetric:{idea:1,tripledes:2,cast5:3,blowfish:4,aes128:7,aes192:8,aes256:9,twofish:10},compression:{uncompressed:0,zip:1,zlib:2,bzip2:3},hash:{md5:1,sha1:2,ripemd:3,sha256:8,sha384:9,sha512:10,sha224:11,sha3_256:12,sha3_512:14},webHash:{"SHA-1":2,"SHA-256":8,"SHA-384":9,"SHA-512":10},aead:{eax:1,ocb:2,gcm:3,experimentalGCM:100},packet:{publicKeyEncryptedSessionKey:1,signature:2,symEncryptedSessionKey:3,onePassSignature:4,secretKey:5,publicKey:6,secretSubkey:7,compressedData:8,symmetricallyEncryptedData:9,marker:10,literalData:11,trust:12,userID:13,publicSubkey:14,userAttribute:17,symEncryptedIntegrityProtectedData:18,modificationDetectionCode:19,aeadEncryptedData:20,padding:21},literal:{binary:98,text:116,utf8:117,mime:109},signature:{binary:0,text:1,standalone:2,certGeneric:16,certPersona:17,certCasual:18,certPositive:19,certRevocation:48,subkeyBinding:24,keyBinding:25,key:31,keyRevocation:32,subkeyRevocation:40,timestamp:64,thirdParty:80},signatureSubpacket:{signatureCreationTime:2,signatureExpirationTime:3,exportableCertification:4,trustSignature:5,regularExpression:6,revocable:7,keyExpirationTime:9,placeholderBackwardsCompatibility:10,preferredSymmetricAlgorithms:11,revocationKey:12,issuerKeyID:16,notationData:20,preferredHashAlgorithms:21,preferredCompressionAlgorithms:22,keyServerPreferences:23,preferredKeyServer:24,primaryUserID:25,policyURI:26,keyFlags:27,signersUserID:28,reasonForRevocation:29,features:30,signatureTarget:31,embeddedSignature:32,issuerFingerprint:33,preferredAEADAlgorithms:34,preferredCipherSuites:39},keyFlags:{certifyKeys:1,signData:2,encryptCommunication:4,encryptStorage:8,splitPrivateKey:16,authentication:32,forwardedCommunication:64,sharedPrivateKey:128},armor:{multipartSection:0,multipartLast:1,signed:2,message:3,publicKey:4,privateKey:5,signature:6},reasonForRevocation:{noReason:0,keySuperseded:1,keyCompromised:2,keyRetired:3,userIDInvalid:32},features:{modificationDetection:1,aead:2,v5Keys:4,seipdv2:8},write:function(e,t){if("number"==typeof t&&(t=this.read(e,t)),void 0!==e[t])return e[t];throw Error("Invalid enum value.")},read:function(e,t){if(e[I]||(e[I]=[],Object.entries(e).forEach((([t,r])=>{e[I][r]=t}))),void 0!==e[I][t])return e[I][t];throw Error("Invalid enum value.")}},B={preferredHashAlgorithm:_.hash.sha256,preferredSymmetricAlgorithm:_.symmetric.aes256,preferredCompressionAlgorithm:_.compression.uncompressed,aeadProtect:!1,parseAEADEncryptedV4KeysAsLegacy:!1,preferredAEADAlgorithm:_.aead.gcm,aeadChunkSizeByte:12,v6Keys:!1,s2kType:_.s2k.iterated,s2kIterationCountByte:224,s2kArgon2Params:{passes:3,parallelism:4,memoryExponent:16},allowUnauthenticatedMessages:!1,allowUnauthenticatedStream:!1,allowForwardedMessages:!1,minRSABits:2047,passwordCollisionCheck:!1,revocationsExpire:!1,allowInsecureDecryptionWithSigningKeys:!1,allowInsecureVerificationWithReformattedKeys:!1,allowMissingKeyFlags:!1,constantTimePKCS1Decryption:!1,constantTimePKCS1DecryptionSupportedSymmetricAlgorithms:new Set([_.symmetric.aes128,_.symmetric.aes192,_.symmetric.aes256]),ignoreUnsupportedPackets:!0,ignoreMalformedPackets:!1,additionalAllowedPackets:[],showVersion:!1,showComment:!1,versionString:"OpenPGP.js 6.0.0-alpha.1.patch.0",commentString:"https://openpgpjs.org",maxUserIDLength:5120,knownNotations:[],useEllipticFallback:!0,rejectHashAlgorithms:new Set([_.hash.md5,_.hash.ripemd]),rejectMessageHashAlgorithms:new Set([_.hash.md5,_.hash.ripemd,_.hash.sha1]),rejectPublicKeyAlgorithms:new Set([_.publicKey.elgamal,_.publicKey.dsa]),rejectCurves:new Set([_.curve.secp256k1]),checkEdDSAFaultySignatures:!0};const M=(()=>{try{return"development"===process.env.NODE_ENV}catch(e){}return!1})(),R={isString:function(e){return"string"==typeof e||e instanceof String},nodeRequire:()=>{},isArray:function(e){return e instanceof Array},isUint8Array:u,isStream:c,getBigInteger:async function(){if("undefined"!=typeof BigInt){const{default:e}=await import("./native.interface.min.mjs");return e}{const{default:e}=await import("./bn.interface.min.mjs");return e}},getNobleCurve:async(e,t)=>{if(!B.useEllipticFallback)throw Error("This curve is only supported in the full build of OpenPGP.js");const{nobleCurves:r}=await import("./noble_curves.min.mjs");switch(e){case _.publicKey.ecdh:case _.publicKey.ecdsa:{const e=r.get(t);if(!e)throw Error("Unsupported curve");return e}case _.publicKey.x448:return r.get("x448");case _.publicKey.ed448:return r.get("ed448");default:throw Error("Unsupported curve")}},readNumber:function(e){let t=0;for(let r=0;r<e.length;r++)t+=256**r*e[e.length-1-r];return t},writeNumber:function(e,t){const r=new Uint8Array(t);for(let i=0;i<t;i++)r[i]=e>>8*(t-i-1)&255;return r},readDate:function(e){const t=R.readNumber(e);return new Date(1e3*t)},writeDate:function(e){const t=Math.floor(e.getTime()/1e3);return R.writeNumber(t,4)},normalizeDate:function(e=Date.now()){return null===e||e===1/0?e:new Date(1e3*Math.floor(+e/1e3))},readMPI:function(e){const t=(e[0]<<8|e[1])+7>>>3;return R.readExactSubarray(e,2,2+t)},readExactSubarray:function(e,t,r){if(e.length<r-t)throw Error("Input array too short");return e.subarray(t,r)},leftPad(e,t){const r=new Uint8Array(t),i=t-e.length;return r.set(e,i),r},uint8ArrayToMPI:function(e){const t=R.uint8ArrayBitLength(e);if(0===t)throw Error("Zero MPI");const r=e.subarray(e.length-Math.ceil(t/8)),i=new Uint8Array([(65280&t)>>8,255&t]);return R.concatUint8Array([i,r])},uint8ArrayBitLength:function(e){let t;for(t=0;t<e.length&&0===e[t];t++);if(t===e.length)return 0;const r=e.subarray(t);return 8*(r.length-1)+R.nbits(r[0])},hexToUint8Array:function(e){const t=new Uint8Array(e.length>>1);for(let r=0;r<e.length>>1;r++)t[r]=parseInt(e.substr(r<<1,2),16);return t},uint8ArrayToHex:function(e){const t="0123456789abcdef";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),r},stringToUint8Array:function(e){return k(e,(e=>{if(!R.isString(e))throw Error("stringToUint8Array: Data must be in the form of a string");const t=new Uint8Array(e.length);for(let r=0;r<e.length;r++)t[r]=e.charCodeAt(r);return t}))},uint8ArrayToString:function(e){const t=[],r=16384,i=(e=new Uint8Array(e)).length;for(let a=0;a<i;a+=r)t.push(String.fromCharCode.apply(String,e.subarray(a,a+r<i?a+r:i)));return t.join("")},encodeUTF8:function(e){const t=new TextEncoder("utf-8");function r(e,r=!1){return t.encode(e,{stream:!r})}return k(e,r,(()=>r("",!0)))},decodeUTF8:function(e){const t=new TextDecoder("utf-8");function r(e,r=!1){return t.decode(e,{stream:!r})}return k(e,r,(()=>r(new Uint8Array,!0)))},concat:f,concatUint8Array:h,equalsUint8Array:function(e,t){if(!R.isUint8Array(e)||!R.isUint8Array(t))throw Error("Data must be in the form of a Uint8Array");if(e.length!==t.length)return!1;for(let r=0;r<e.length;r++)if(e[r]!==t[r])return!1;return!0},writeChecksum:function(e){let t=0;for(let r=0;r<e.length;r++)t=t+e[r]&65535;return R.writeNumber(t,2)},printDebug:function(e){M&&console.log("[OpenPGP.js debug]",e)},printDebugError:function(e){M&&console.error("[OpenPGP.js debug]",e)},nbits:function(e){let t=1,r=e>>>16;return 0!==r&&(e=r,t+=16),r=e>>8,0!==r&&(e=r,t+=8),r=e>>4,0!==r&&(e=r,t+=4),r=e>>2,0!==r&&(e=r,t+=2),r=e>>1,0!==r&&(e=r,t+=1),t},double:function(e){const t=new Uint8Array(e.length),r=e.length-1;for(let i=0;i<r;i++)t[i]=e[i]<<1^e[i+1]>>7;return t[r]=e[r]<<1^135*(e[0]>>7),t},shiftRight:function(e,t){if(t)for(let r=e.length-1;r>=0;r--)e[r]>>=t,r>0&&(e[r]|=e[r-1]<<8-t);return e},getWebCrypto:function(){const t=void 0!==e&&e.crypto&&e.crypto.subtle||this.getNodeCrypto()?.webcrypto.subtle;if(!t)throw Error("The WebCrypto API is not available");return t},getNodeCrypto:function(){return this.nodeRequire("crypto")},getNodeZlib:function(){return this.nodeRequire("zlib")},getNodeBuffer:function(){return(this.nodeRequire("buffer")||{}).Buffer},getHardwareConcurrency:function(){if("undefined"!=typeof navigator)return navigator.hardwareConcurrency||1;return this.nodeRequire("os").cpus().length},isEmailAddress:function(e){if(!R.isString(e))return!1;return/^[a-zA-Z0-9.!#$%&'*+/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$/.test(e)},canonicalizeEOL:function(e){let t=!1;return k(e,(e=>{let r;t&&(e=R.concatUint8Array([new Uint8Array([13]),e])),13===e[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;const i=[];for(let t=0;r=e.indexOf(10,t)+1,r;t=r)13!==e[r-2]&&i.push(r);if(!i.length)return e;const a=new Uint8Array(e.length+i.length);let n=0;for(let t=0;t<i.length;t++){const r=e.subarray(i[t-1]||0,i[t]);a.set(r,n),n+=r.length,a[n-1]=13,a[n]=10,n++}return a.set(e.subarray(i[i.length-1]||0),n),a}),(()=>t?new Uint8Array([13]):void 0))},nativeEOL:function(e){let t=!1;return k(e,(e=>{let r;13===(e=t&&10!==e[0]?R.concatUint8Array([new Uint8Array([13]),e]):new Uint8Array(e))[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;let i=0;for(let t=0;t!==e.length;t=r){r=e.indexOf(13,t)+1,r||(r=e.length);const a=r-(10===e[r]?1:0);t&&e.copyWithin(i,t,a),i+=a-t}return e.subarray(0,i)}),(()=>t?new Uint8Array([13]):void 0))},removeTrailingSpaces:function(e){return e.split("\n").map((e=>{let t=e.length-1;for(;t>=0&&(" "===e[t]||"\t"===e[t]||"\r"===e[t]);t--);return e.substr(0,t+1)})).join("\n")},wrapError:function(e,t){if(!t)return Error(e);try{t.message=e+": "+t.message}catch(e){}return t},constructAllowedPackets:function(e){const t={};return e.forEach((e=>{if(!e.tag)throw Error("Invalid input: expected a packet class");t[e.tag]=e})),t},anyPromise:function(e){return new Promise((async(t,r)=>{let i;await Promise.all(e.map((async e=>{try{t(await e)}catch(e){i=e}}))),r(i)}))},selectUint8Array:function(e,t,r){const i=Math.max(t.length,r.length),a=new Uint8Array(i);let n=0;for(let i=0;i<a.length;i++)a[i]=t[i]&256-e|r[i]&255+e,n+=e&i<t.length|1-e&i<r.length;return a.subarray(0,n)},selectUint8:function(e,t,r){return t&256-e|r&255+e},isAES:function(e){return e===_.symmetric.aes128||e===_.symmetric.aes192||e===_.symmetric.aes256}},L=R.getNodeBuffer();let F,N;function z(e){let t=new Uint8Array;return k(e,(e=>{t=R.concatUint8Array([t,e]);const r=[],i=Math.floor(t.length/45),a=45*i,n=F(t.subarray(0,a));for(let e=0;e<i;e++)r.push(n.substr(60*e,60)),r.push("\n");return t=t.subarray(a),r.join("")}),(()=>t.length?F(t)+"\n":""))}function O(e){let t="";return k(e,(e=>{t+=e;let r=0;const i=[" ","\t","\r","\n"];for(let e=0;e<i.length;e++){const a=i[e];for(let e=t.indexOf(a);-1!==e;e=t.indexOf(a,e+1))r++}let a=t.length;for(;a>0&&(a-r)%4!=0;a--)i.includes(t[a])&&r--;const n=N(t.substr(0,a));return t=t.substr(a),n}),(()=>N(t)))}function H(e){return O(e.replace(/-/g,"+").replace(/_/g,"/"))}function j(e,t){let r=z(e).replace(/[\r\n]/g,"");return t&&(r=r.replace(/[+]/g,"-").replace(/[/]/g,"_").replace(/[=]/g,"")),r}function q(e){const t=e.match(/^-----BEGIN PGP (MESSAGE, PART \d+\/\d+|MESSAGE, PART \d+|SIGNED MESSAGE|MESSAGE|PUBLIC KEY BLOCK|PRIVATE KEY BLOCK|SIGNATURE)-----$/m);if(!t)throw Error("Unknown ASCII armor type");return/MESSAGE, PART \d+\/\d+/.test(t[1])?_.armor.multipartSection:/MESSAGE, PART \d+/.test(t[1])?_.armor.multipartLast:/SIGNED MESSAGE/.test(t[1])?_.armor.signed:/MESSAGE/.test(t[1])?_.armor.message:/PUBLIC KEY BLOCK/.test(t[1])?_.armor.publicKey:/PRIVATE KEY BLOCK/.test(t[1])?_.armor.privateKey:/SIGNATURE/.test(t[1])?_.armor.signature:void 0}function G(e,t){let r="";return t.showVersion&&(r+="Version: "+t.versionString+"\n"),t.showComment&&(r+="Comment: "+t.commentString+"\n"),e&&(r+="Comment: "+e+"\n"),r+="\n",r}function V(e){for(let t=0;t<e.length;t++)/^([^\s:]|[^\s:][^:]*[^\s:]): .+$/.test(e[t])||R.printDebugError(Error("Improperly formatted armor header: "+e[t])),/^(Version|Comment|MessageID|Hash|Charset): .+$/.test(e[t])||R.printDebugError(Error("Unknown header: "+e[t]))}function W(e){let t=e;const r=e.lastIndexOf("=");return r>=0&&r!==e.length-1&&(t=e.slice(0,r)),t}function $(e){return new Promise((async(t,r)=>{try{const i=/^-----[^-]+-----$/m,a=/^[ \f\r\t\u00a0\u2000-\u200a\u202f\u205f\u3000]*$/;let n;const s=[];let o,c,u=s,h=[];const y=O(v(e,(async(e,l)=>{const p=x(e);try{for(;;){let e=await p.readLine();if(void 0===e)throw Error("Misformed armored text");if(e=R.removeTrailingSpaces(e.replace(/[\r\n]/g,"")),n)if(o)c||n!==_.armor.signed||(i.test(e)?(h=h.join("\r\n"),c=!0,V(u),u=[],o=!1):h.push(e.replace(/^- /,"")));else if(i.test(e)&&r(Error("Mandatory blank line missing between armor headers and armor data")),a.test(e)){if(V(u),o=!0,c||n!==_.armor.signed){t({text:h,data:y,headers:s,type:n});break}}else u.push(e);else i.test(e)&&(n=q(e))}}catch(e){return void r(e)}const g=T(l);try{for(;;){await g.ready;const{done:e,value:t}=await p.read();if(e)throw Error("Misformed armored text");const r=t+"";if(-1!==r.indexOf("=")||-1!==r.indexOf("-")){let e=await p.readToEnd();e.length||(e=""),e=r+e,e=R.removeTrailingSpaces(e.replace(/\r/g,""));const t=e.split(i);if(1===t.length)throw Error("Misformed armored text");const a=W(t[0].slice(0,-1));await g.write(a);break}await g.write(r)}await g.ready,await g.close()}catch(e){await g.abort(e)}})))}catch(e){r(e)}})).then((async e=>(s(e.data)&&(e.data=await U(e.data)),e)))}function X(e,t,r,i,a,n=B){let s,o;e===_.armor.signed&&(s=t.text,o=t.hash,t=t.data);const c=[];switch(e){case _.armor.multipartSection:c.push("-----BEGIN PGP MESSAGE, PART "+r+"/"+i+"-----\n"),c.push(G(a,n)),c.push(z(t)),c.push("-----END PGP MESSAGE, PART "+r+"/"+i+"-----\n");break;case _.armor.multipartLast:c.push("-----BEGIN PGP MESSAGE, PART "+r+"-----\n"),c.push(G(a,n)),c.push(z(t)),c.push("-----END PGP MESSAGE, PART "+r+"-----\n");break;case _.armor.signed:c.push("-----BEGIN PGP SIGNED MESSAGE-----\n"),c.push(o?`Hash: ${o}\n\n`:"\n"),c.push(s.replace(/^-/gm,"- -")),c.push("\n-----BEGIN PGP SIGNATURE-----\n"),c.push(G(a,n)),c.push(z(t)),c.push("-----END PGP SIGNATURE-----\n");break;case _.armor.message:c.push("-----BEGIN PGP MESSAGE-----\n"),c.push(G(a,n)),c.push(z(t)),c.push("-----END PGP MESSAGE-----\n");break;case _.armor.publicKey:c.push("-----BEGIN PGP PUBLIC KEY BLOCK-----\n"),c.push(G(a,n)),c.push(z(t)),c.push("-----END PGP PUBLIC KEY BLOCK-----\n");break;case _.armor.privateKey:c.push("-----BEGIN PGP PRIVATE KEY BLOCK-----\n"),c.push(G(a,n)),c.push(z(t)),c.push("-----END PGP PRIVATE KEY BLOCK-----\n");break;case _.armor.signature:c.push("-----BEGIN PGP SIGNATURE-----\n"),c.push(G(a,n)),c.push(z(t)),c.push("-----END PGP SIGNATURE-----\n")}return R.concat(c)}async function Z(e){switch(e){case _.symmetric.aes128:case _.symmetric.aes192:case _.symmetric.aes256:throw Error("Not a legacy cipher");case _.symmetric.cast5:case _.symmetric.blowfish:case _.symmetric.twofish:case _.symmetric.tripledes:{const{legacyCiphers:t}=await import("./legacy_ciphers.min.mjs"),r=t.get(e);if(!r)throw Error("Unsupported cipher algorithm");return r}default:throw Error("Unsupported cipher algorithm")}}function Q(e){switch(e){case _.symmetric.aes128:case _.symmetric.aes192:case _.symmetric.aes256:case _.symmetric.twofish:return 16;case _.symmetric.blowfish:case _.symmetric.cast5:case _.symmetric.tripledes:return 8;default:throw Error("Unsupported cipher")}}function Y(e){switch(e){case _.symmetric.aes128:case _.symmetric.blowfish:case _.symmetric.cast5:return 16;case _.symmetric.aes192:case _.symmetric.tripledes:return 24;case _.symmetric.aes256:case _.symmetric.twofish:return 32;default:throw Error("Unsupported cipher")}}function J(e){return{keySize:Y(e),blockSize:Q(e)}}L?(F=e=>L.from(e).toString("base64"),N=e=>{const t=L.from(e,"base64");return new Uint8Array(t.buffer,t.byteOffset,t.byteLength)}):(F=e=>btoa(R.uint8ArrayToString(e)),N=e=>R.stringToUint8Array(atob(e)));var ee=/*#__PURE__*/Object.freeze({__proto__:null,getCipherParams:J,getLegacyCipher:Z});function te(e,t){let r=e[0],i=e[1],a=e[2],n=e[3];r=ie(r,i,a,n,t[0],7,-680876936),n=ie(n,r,i,a,t[1],12,-389564586),a=ie(a,n,r,i,t[2],17,606105819),i=ie(i,a,n,r,t[3],22,-1044525330),r=ie(r,i,a,n,t[4],7,-176418897),n=ie(n,r,i,a,t[5],12,1200080426),a=ie(a,n,r,i,t[6],17,-1473231341),i=ie(i,a,n,r,t[7],22,-45705983),r=ie(r,i,a,n,t[8],7,1770035416),n=ie(n,r,i,a,t[9],12,-1958414417),a=ie(a,n,r,i,t[10],17,-42063),i=ie(i,a,n,r,t[11],22,-1990404162),r=ie(r,i,a,n,t[12],7,1804603682),n=ie(n,r,i,a,t[13],12,-40341101),a=ie(a,n,r,i,t[14],17,-1502002290),i=ie(i,a,n,r,t[15],22,1236535329),r=ae(r,i,a,n,t[1],5,-165796510),n=ae(n,r,i,a,t[6],9,-1069501632),a=ae(a,n,r,i,t[11],14,643717713),i=ae(i,a,n,r,t[0],20,-373897302),r=ae(r,i,a,n,t[5],5,-701558691),n=ae(n,r,i,a,t[10],9,38016083),a=ae(a,n,r,i,t[15],14,-660478335),i=ae(i,a,n,r,t[4],20,-405537848),r=ae(r,i,a,n,t[9],5,568446438),n=ae(n,r,i,a,t[14],9,-1019803690),a=ae(a,n,r,i,t[3],14,-187363961),i=ae(i,a,n,r,t[8],20,1163531501),r=ae(r,i,a,n,t[13],5,-1444681467),n=ae(n,r,i,a,t[2],9,-51403784),a=ae(a,n,r,i,t[7],14,1735328473),i=ae(i,a,n,r,t[12],20,-1926607734),r=ne(r,i,a,n,t[5],4,-378558),n=ne(n,r,i,a,t[8],11,-2022574463),a=ne(a,n,r,i,t[11],16,1839030562),i=ne(i,a,n,r,t[14],23,-35309556),r=ne(r,i,a,n,t[1],4,-1530992060),n=ne(n,r,i,a,t[4],11,1272893353),a=ne(a,n,r,i,t[7],16,-155497632),i=ne(i,a,n,r,t[10],23,-1094730640),r=ne(r,i,a,n,t[13],4,681279174),n=ne(n,r,i,a,t[0],11,-358537222),a=ne(a,n,r,i,t[3],16,-722521979),i=ne(i,a,n,r,t[6],23,76029189),r=ne(r,i,a,n,t[9],4,-640364487),n=ne(n,r,i,a,t[12],11,-421815835),a=ne(a,n,r,i,t[15],16,530742520),i=ne(i,a,n,r,t[2],23,-995338651),r=se(r,i,a,n,t[0],6,-198630844),n=se(n,r,i,a,t[7],10,1126891415),a=se(a,n,r,i,t[14],15,-1416354905),i=se(i,a,n,r,t[5],21,-57434055),r=se(r,i,a,n,t[12],6,1700485571),n=se(n,r,i,a,t[3],10,-1894986606),a=se(a,n,r,i,t[10],15,-1051523),i=se(i,a,n,r,t[1],21,-2054922799),r=se(r,i,a,n,t[8],6,1873313359),n=se(n,r,i,a,t[15],10,-30611744),a=se(a,n,r,i,t[6],15,-1560198380),i=se(i,a,n,r,t[13],21,1309151649),r=se(r,i,a,n,t[4],6,-145523070),n=se(n,r,i,a,t[11],10,-1120210379),a=se(a,n,r,i,t[2],15,718787259),i=se(i,a,n,r,t[9],21,-343485551),e[0]=he(r,e[0]),e[1]=he(i,e[1]),e[2]=he(a,e[2]),e[3]=he(n,e[3])}function re(e,t,r,i,a,n){return t=he(he(t,e),he(i,n)),he(t<<a|t>>>32-a,r)}function ie(e,t,r,i,a,n,s){return re(t&r|~t&i,e,t,a,n,s)}function ae(e,t,r,i,a,n,s){return re(t&i|r&~i,e,t,a,n,s)}function ne(e,t,r,i,a,n,s){return re(t^r^i,e,t,a,n,s)}function se(e,t,r,i,a,n,s){return re(r^(t|~i),e,t,a,n,s)}function oe(e){const t=[];let r;for(r=0;r<64;r+=4)t[r>>2]=e.charCodeAt(r)+(e.charCodeAt(r+1)<<8)+(e.charCodeAt(r+2)<<16)+(e.charCodeAt(r+3)<<24);return t}const ce="0123456789abcdef".split("");function ue(e){let t="",r=0;for(;r<4;r++)t+=ce[e>>8*r+4&15]+ce[e>>8*r&15];return t}function he(e,t){return e+t&4294967295}const ye=R.getWebCrypto(),le=R.getNodeCrypto(),pe=le&&le.getHashes();function ge(e){if(le&&pe.includes(e))return async function(t){const r=le.createHash(e);return k(t,(e=>{r.update(e)}),(()=>new Uint8Array(r.digest())))}}function de(e,t){const r=async()=>{const{nobleHashes:t}=await import("./noble_hashes.min.mjs"),r=t.get(e);if(!r)throw Error("Unsupported hash");return r};return async function(e){if(s(e)&&(e=await U(e)),R.isStream(e)){const t=(await r()).create();return k(e,(e=>{t.update(e)}),(()=>t.digest()))}if(ye&&t)return new Uint8Array(await ye.digest(t,e));return(await r())(e)}}var fe={md5:ge("md5")||async function(e){const t=function(e){const t=e.length,r=[1732584193,-271733879,-1732584194,271733878];let i;for(i=64;i<=e.length;i+=64)te(r,oe(e.substring(i-64,i)));e=e.substring(i-64);const a=[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0];for(i=0;i<e.length;i++)a[i>>2]|=e.charCodeAt(i)<<(i%4<<3);if(a[i>>2]|=128<<(i%4<<3),i>55)for(te(r,a),i=0;i<16;i++)a[i]=0;return a[14]=8*t,te(r,a),r}(R.uint8ArrayToString(e));return R.hexToUint8Array(function(e){for(let t=0;t<e.length;t++)e[t]=ue(e[t]);return e.join("")}(t))},sha1:ge("sha1")||de("sha1","SHA-1"),sha224:ge("sha224")||de("sha224"),sha256:ge("sha256")||de("sha256","SHA-256"),sha384:ge("sha384")||de("sha384","SHA-384"),sha512:ge("sha512")||de("sha512","SHA-512"),ripemd:ge("ripemd160")||de("ripemd160"),sha3_256:ge("sha3-256")||de("sha3_256"),sha3_512:ge("sha3-512")||de("sha3_512"),digest:function(e,t){switch(e){case _.hash.md5:return this.md5(t);case _.hash.sha1:return this.sha1(t);case _.hash.ripemd:return this.ripemd(t);case _.hash.sha256:return this.sha256(t);case _.hash.sha384:return this.sha384(t);case _.hash.sha512:return this.sha512(t);case _.hash.sha224:return this.sha224(t);case _.hash.sha3_256:return this.sha3_256(t);case _.hash.sha3_512:return this.sha3_512(t);default:throw Error("Unsupported hash function")}},getHashByteLength:function(e){switch(e){case _.hash.md5:return 16;case _.hash.sha1:case _.hash.ripemd:return 20;case _.hash.sha256:return 32;case _.hash.sha384:return 48;case _.hash.sha512:return 64;case _.hash.sha224:return 28;case _.hash.sha3_256:return 32;case _.hash.sha3_512:return 64;default:throw Error("Invalid hash algorithm.")}},getBlockSize:function(e){switch(e){case _.hash.md5:case _.hash.sha1:case _.hash.ripemd:case _.hash.sha224:case _.hash.sha256:return 64;case _.hash.sha384:case _.hash.sha512:return 128;default:throw Error("Invalid hash algorithm.")}}},me=function(){var e,t,r=!1;function i(r,i){var a=e[(t[r]+t[i])%255];return 0!==r&&0!==i||(a=0),a}var a,n,s,o,c=!1;function u(){function u(r){var i,a,n;for(a=n=function(r){var i=e[255-t[r]];return 0===r&&(i=0),i}(r),i=0;i<4;i++)n^=a=255&(a<<1|a>>>7);return n^=99}r||function(){e=[],t=[];var i,a,n=1;for(i=0;i<255;i++)e[i]=n,a=128&n,n<<=1,n&=255,128===a&&(n^=27),n^=e[i],t[e[i]]=i;e[255]=e[0],t[0]=0,r=!0}(),a=[],n=[],s=[[],[],[],[]],o=[[],[],[],[]];for(var h=0;h<256;h++){var y=u(h);a[h]=y,n[y]=h,s[0][h]=i(2,y)<<24|y<<16|y<<8|i(3,y),o[0][y]=i(14,h)<<24|i(9,h)<<16|i(13,h)<<8|i(11,h);for(var l=1;l<4;l++)s[l][h]=s[l-1][h]>>>8|s[l-1][h]<<24,o[l][y]=o[l-1][y]>>>8|o[l-1][y]<<24}c=!0}var h=function(e,t){c||u();var r=new Uint32Array(t);r.set(a,512),r.set(n,768);for(var i=0;i<4;i++)r.set(s[i],4096+1024*i>>2),r.set(o[i],8192+1024*i>>2);var h=function(e,t,r){"use asm";var i=0,a=0,n=0,s=0,o=0,c=0,u=0,h=0,y=0,l=0,p=0,g=0,d=0,f=0,m=0,w=0,b=0,k=0,v=0,A=0,K=0;var E=new e.Uint32Array(r),S=new e.Uint8Array(r);function P(e,t,r,o,c,u,h,y){e=e|0;t=t|0;r=r|0;o=o|0;c=c|0;u=u|0;h=h|0;y=y|0;var l=0,p=0,g=0,d=0,f=0,m=0,w=0,b=0;l=r|0x400,p=r|0x800,g=r|0xc00;c=c^E[(e|0)>>2],u=u^E[(e|4)>>2],h=h^E[(e|8)>>2],y=y^E[(e|12)>>2];for(b=16;(b|0)<=o<<4;b=b+16|0){d=E[(r|c>>22&1020)>>2]^E[(l|u>>14&1020)>>2]^E[(p|h>>6&1020)>>2]^E[(g|y<<2&1020)>>2]^E[(e|b|0)>>2],f=E[(r|u>>22&1020)>>2]^E[(l|h>>14&1020)>>2]^E[(p|y>>6&1020)>>2]^E[(g|c<<2&1020)>>2]^E[(e|b|4)>>2],m=E[(r|h>>22&1020)>>2]^E[(l|y>>14&1020)>>2]^E[(p|c>>6&1020)>>2]^E[(g|u<<2&1020)>>2]^E[(e|b|8)>>2],w=E[(r|y>>22&1020)>>2]^E[(l|c>>14&1020)>>2]^E[(p|u>>6&1020)>>2]^E[(g|h<<2&1020)>>2]^E[(e|b|12)>>2];c=d,u=f,h=m,y=w}i=E[(t|c>>22&1020)>>2]<<24^E[(t|u>>14&1020)>>2]<<16^E[(t|h>>6&1020)>>2]<<8^E[(t|y<<2&1020)>>2]^E[(e|b|0)>>2],a=E[(t|u>>22&1020)>>2]<<24^E[(t|h>>14&1020)>>2]<<16^E[(t|y>>6&1020)>>2]<<8^E[(t|c<<2&1020)>>2]^E[(e|b|4)>>2],n=E[(t|h>>22&1020)>>2]<<24^E[(t|y>>14&1020)>>2]<<16^E[(t|c>>6&1020)>>2]<<8^E[(t|u<<2&1020)>>2]^E[(e|b|8)>>2],s=E[(t|y>>22&1020)>>2]<<24^E[(t|c>>14&1020)>>2]<<16^E[(t|u>>6&1020)>>2]<<8^E[(t|h<<2&1020)>>2]^E[(e|b|12)>>2]}function U(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;P(0x0000,0x0800,0x1000,K,e,t,r,i)}function D(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;var n=0;P(0x0400,0x0c00,0x2000,K,e,i,r,t);n=a,a=s,s=n}function C(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;P(0x0000,0x0800,0x1000,K,o^e,c^t,u^r,h^y);o=i,c=a,u=n,h=s}function x(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;var l=0;P(0x0400,0x0c00,0x2000,K,e,y,r,t);l=a,a=s,s=l;i=i^o,a=a^c,n=n^u,s=s^h;o=e,c=t,u=r,h=y}function T(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;P(0x0000,0x0800,0x1000,K,o,c,u,h);o=i=i^e,c=a=a^t,u=n=n^r,h=s=s^y}function I(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;P(0x0000,0x0800,0x1000,K,o,c,u,h);i=i^e,a=a^t,n=n^r,s=s^y;o=e,c=t,u=r,h=y}function _(e,t,r,y){e=e|0;t=t|0;r=r|0;y=y|0;P(0x0000,0x0800,0x1000,K,o,c,u,h);o=i,c=a,u=n,h=s;i=i^e,a=a^t,n=n^r,s=s^y}function B(e,t,r,o){e=e|0;t=t|0;r=r|0;o=o|0;P(0x0000,0x0800,0x1000,K,y,l,p,g);g=~w&g|w&g+1;p=~m&p|m&p+((g|0)==0);l=~f&l|f&l+((p|0)==0);y=~d&y|d&y+((l|0)==0);i=i^e;a=a^t;n=n^r;s=s^o}function M(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;var a=0,n=0,s=0,y=0,l=0,p=0,g=0,d=0,f=0,m=0;e=e^o,t=t^c,r=r^u,i=i^h;a=b|0,n=k|0,s=v|0,y=A|0;for(;(f|0)<128;f=f+1|0){if(a>>>31){l=l^e,p=p^t,g=g^r,d=d^i}a=a<<1|n>>>31,n=n<<1|s>>>31,s=s<<1|y>>>31,y=y<<1;m=i&1;i=i>>>1|r<<31,r=r>>>1|t<<31,t=t>>>1|e<<31,e=e>>>1;if(m)e=e^0xe1000000}o=l,c=p,u=g,h=d}function R(e){e=e|0;K=e}function L(e,t,r,o){e=e|0;t=t|0;r=r|0;o=o|0;i=e,a=t,n=r,s=o}function F(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;o=e,c=t,u=r,h=i}function N(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;y=e,l=t,p=r,g=i}function z(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;d=e,f=t,m=r,w=i}function O(e,t,r,i){e=e|0;t=t|0;r=r|0;i=i|0;g=~w&g|w&i,p=~m&p|m&r,l=~f&l|f&t,y=~d&y|d&e}function H(e){e=e|0;if(e&15)return-1;S[e|0]=i>>>24,S[e|1]=i>>>16&255,S[e|2]=i>>>8&255,S[e|3]=i&255,S[e|4]=a>>>24,S[e|5]=a>>>16&255,S[e|6]=a>>>8&255,S[e|7]=a&255,S[e|8]=n>>>24,S[e|9]=n>>>16&255,S[e|10]=n>>>8&255,S[e|11]=n&255,S[e|12]=s>>>24,S[e|13]=s>>>16&255,S[e|14]=s>>>8&255,S[e|15]=s&255;return 16}function j(e){e=e|0;if(e&15)return-1;S[e|0]=o>>>24,S[e|1]=o>>>16&255,S[e|2]=o>>>8&255,S[e|3]=o&255,S[e|4]=c>>>24,S[e|5]=c>>>16&255,S[e|6]=c>>>8&255,S[e|7]=c&255,S[e|8]=u>>>24,S[e|9]=u>>>16&255,S[e|10]=u>>>8&255,S[e|11]=u&255,S[e|12]=h>>>24,S[e|13]=h>>>16&255,S[e|14]=h>>>8&255,S[e|15]=h&255;return 16}function q(){U(0,0,0,0);b=i,k=a,v=n,A=s}function G(e,t,r){e=e|0;t=t|0;r=r|0;var o=0;if(t&15)return-1;while((r|0)>=16){W[e&7](S[t|0]<<24|S[t|1]<<16|S[t|2]<<8|S[t|3],S[t|4]<<24|S[t|5]<<16|S[t|6]<<8|S[t|7],S[t|8]<<24|S[t|9]<<16|S[t|10]<<8|S[t|11],S[t|12]<<24|S[t|13]<<16|S[t|14]<<8|S[t|15]);S[t|0]=i>>>24,S[t|1]=i>>>16&255,S[t|2]=i>>>8&255,S[t|3]=i&255,S[t|4]=a>>>24,S[t|5]=a>>>16&255,S[t|6]=a>>>8&255,S[t|7]=a&255,S[t|8]=n>>>24,S[t|9]=n>>>16&255,S[t|10]=n>>>8&255,S[t|11]=n&255,S[t|12]=s>>>24,S[t|13]=s>>>16&255,S[t|14]=s>>>8&255,S[t|15]=s&255;o=o+16|0,t=t+16|0,r=r-16|0}return o|0}function V(e,t,r){e=e|0;t=t|0;r=r|0;var i=0;if(t&15)return-1;while((r|0)>=16){$[e&1](S[t|0]<<24|S[t|1]<<16|S[t|2]<<8|S[t|3],S[t|4]<<24|S[t|5]<<16|S[t|6]<<8|S[t|7],S[t|8]<<24|S[t|9]<<16|S[t|10]<<8|S[t|11],S[t|12]<<24|S[t|13]<<16|S[t|14]<<8|S[t|15]);i=i+16|0,t=t+16|0,r=r-16|0}return i|0}var W=[U,D,C,x,T,I,_,B];var $=[C,M];return{set_rounds:R,set_state:L,set_iv:F,set_nonce:N,set_mask:z,set_counter:O,get_state:H,get_iv:j,gcm_init:q,cipher:G,mac:V}}({Uint8Array,Uint32Array},e,t);return h.set_key=function(e,t,i,n,s,c,u,y,l){var p=r.subarray(0,60),g=r.subarray(256,316);p.set([t,i,n,s,c,u,y,l]);for(var d=e,f=1;d<4*e+28;d++){var m=p[d-1];(d%e==0||8===e&&d%e==4)&&(m=a[m>>>24]<<24^a[m>>>16&255]<<16^a[m>>>8&255]<<8^a[255&m]),d%e==0&&(m=m<<8^m>>>24^f<<24,f=f<<1^(128&f?27:0)),p[d]=p[d-e]^m}for(var w=0;w<d;w+=4)for(var b=0;b<4;b++){m=p[d-(4+w)+(4-b)%4];g[w+b]=w<4||w>=d-4?m:o[0][a[m>>>24]]^o[1][a[m>>>16&255]]^o[2][a[m>>>8&255]]^o[3][a[255&m]]}h.set_rounds(e+5)},h};return h.ENC={ECB:0,CBC:2,CFB:4,OFB:6,CTR:7},h.DEC={ECB:1,CBC:3,CFB:5,OFB:6,CTR:7},h.MAC={CBC:0,GCM:1},h.HEAP_DATA=16384,h}();function we(e){return e instanceof Uint8Array}function be(e,t,r,i,a){const n=e.length-t,s=n<a?n:a;return e.set(r.subarray(i,i+s),t),s}function ke(...e){const t=e.reduce(((e,t)=>e+t.length),0),r=new Uint8Array(t);let i=0;for(let t=0;t<e.length;t++)r.set(e[t],i),i+=e[t].length;return r}class ve extends Error{constructor(...e){super(...e)}}class Ae extends Error{constructor(...e){super(...e)}}class Ke extends Error{constructor(...e){super(...e)}}const Ee=[],Se=[];class Pe{constructor(e,t,r=!0,i,a,n){this.pos=0,this.len=0,this.mode=i,this.pos=0,this.len=0,this.key=e,this.iv=t,this.padding=r,this.acquire_asm(a,n)}acquire_asm(e,t){return void 0!==this.heap&&void 0!==this.asm||(this.heap=e||Ee.pop()||function(e,t){const r=e?e.byteLength:t||65536;if(4095&r||r<=0)throw Error("heap size must be a positive integer and a multiple of 4096");return e||new Uint8Array(new ArrayBuffer(r))}().subarray(me.HEAP_DATA),this.asm=t||Se.pop()||new me(null,this.heap.buffer),this.reset(this.key,this.iv)),{heap:this.heap,asm:this.asm}}release_asm(){void 0!==this.heap&&void 0!==this.asm&&(Ee.push(this.heap),Se.push(this.asm)),this.heap=void 0,this.asm=void 0}reset(e,t){const{asm:r}=this.acquire_asm(),i=e.length;if(16!==i&&24!==i&&32!==i)throw new Ae("illegal key size");const a=new DataView(e.buffer,e.byteOffset,e.byteLength);if(r.set_key(i>>2,a.getUint32(0),a.getUint32(4),a.getUint32(8),a.getUint32(12),i>16?a.getUint32(16):0,i>16?a.getUint32(20):0,i>24?a.getUint32(24):0,i>24?a.getUint32(28):0),void 0!==t){if(16!==t.length)throw new Ae("illegal iv size");let e=new DataView(t.buffer,t.byteOffset,t.byteLength);r.set_iv(e.getUint32(0),e.getUint32(4),e.getUint32(8),e.getUint32(12))}else r.set_iv(0,0,0,0)}AES_Encrypt_process(e){if(!we(e))throw new TypeError("data isn't of expected type");let{heap:t,asm:r}=this.acquire_asm(),i=me.ENC[this.mode],a=me.HEAP_DATA,n=this.pos,s=this.len,o=0,c=e.length||0,u=0,h=0,y=new Uint8Array(s+c&-16);for(;c>0;)h=be(t,n+s,e,o,c),s+=h,o+=h,c-=h,h=r.cipher(i,a+n,s),h&&y.set(t.subarray(n,n+h),u),u+=h,h<s?(n+=h,s-=h):(n=0,s=0);return this.pos=n,this.len=s,y}AES_Encrypt_finish(){let{heap:e,asm:t}=this.acquire_asm(),r=me.ENC[this.mode],i=me.HEAP_DATA,a=this.pos,n=this.len,s=16-n%16,o=n;if(this.hasOwnProperty("padding")){if(this.padding){for(let t=0;t<s;++t)e[a+n+t]=s;n+=s,o=n}else if(n%16)throw new Ae("data length must be a multiple of the block size")}else n+=s;const c=new Uint8Array(o);return n&&t.cipher(r,i+a,n),o&&c.set(e.subarray(a,a+o)),this.pos=0,this.len=0,this.release_asm(),c}AES_Decrypt_process(e){if(!we(e))throw new TypeError("data isn't of expected type");let{heap:t,asm:r}=this.acquire_asm(),i=me.DEC[this.mode],a=me.HEAP_DATA,n=this.pos,s=this.len,o=0,c=e.length||0,u=0,h=s+c&-16,y=0,l=0;this.padding&&(y=s+c-h||16,h-=y);const p=new Uint8Array(h);for(;c>0;)l=be(t,n+s,e,o,c),s+=l,o+=l,c-=l,l=r.cipher(i,a+n,s-(c?0:y)),l&&p.set(t.subarray(n,n+l),u),u+=l,l<s?(n+=l,s-=l):(n=0,s=0);return this.pos=n,this.len=s,p}AES_Decrypt_finish(){let{heap:e,asm:t}=this.acquire_asm(),r=me.DEC[this.mode],i=me.HEAP_DATA,a=this.pos,n=this.len,s=n;if(n>0){if(n%16){if(this.hasOwnProperty("padding"))throw new Ae("data length must be a multiple of the block size");n+=16-n%16}if(t.cipher(r,i+a,n),this.hasOwnProperty("padding")&&this.padding){let t=e[a+s-1];if(t<1||t>16||t>s)throw new Ke("bad padding");let r=0;for(let i=t;i>1;i--)r|=t^e[a+s-i];if(r)throw new Ke("bad padding");s-=t}}const o=new Uint8Array(s);return s>0&&o.set(e.subarray(a,a+s)),this.pos=0,this.len=0,this.release_asm(),o}}class Ue{static encrypt(e,t,r){return new Ue(t,r).encrypt(e)}static decrypt(e,t,r){return new Ue(t,r).decrypt(e)}constructor(e,t,r){this.aes=r||new Pe(e,t,!0,"CFB"),delete this.aes.padding}encrypt(e){return ke(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}decrypt(e){return ke(this.aes.AES_Decrypt_process(e),this.aes.AES_Decrypt_finish())}}const De=R.getWebCrypto(),Ce=R.getNodeCrypto(),xe=Ce?Ce.getCiphers():[],Te={idea:xe.includes("idea-cfb")?"idea-cfb":void 0,tripledes:xe.includes("des-ede3-cfb")?"des-ede3-cfb":void 0,cast5:xe.includes("cast5-cfb")?"cast5-cfb":void 0,blowfish:xe.includes("bf-cfb")?"bf-cfb":void 0,aes128:xe.includes("aes-128-cfb")?"aes-128-cfb":void 0,aes192:xe.includes("aes-192-cfb")?"aes-192-cfb":void 0,aes256:xe.includes("aes-256-cfb")?"aes-256-cfb":void 0};class Ie{constructor(e,t,r){const{blockSize:i}=J(e);this.key=t,this.prevBlock=r,this.nextBlock=new Uint8Array(i),this.i=0,this.blockSize=i,this.zeroBlock=new Uint8Array(this.blockSize)}static async isSupported(e){const{keySize:t}=J(e);return De.importKey("raw",new Uint8Array(t),"aes-cbc",!1,["encrypt"]).then((()=>!0),(()=>!1))}async _runCBC(e,t){const r="AES-CBC";this.keyRef=this.keyRef||await De.importKey("raw",this.key,r,!1,["encrypt"]);const i=await De.encrypt({name:r,iv:t||this.zeroBlock},this.keyRef,e);return new Uint8Array(i).subarray(0,e.length)}async encryptChunk(e){const t=this.nextBlock.length-this.i,r=e.subarray(0,t);if(this.nextBlock.set(r,this.i),this.i+e.length>=2*this.blockSize){const r=(e.length-t)%this.blockSize,i=R.concatUint8Array([this.nextBlock,e.subarray(t,e.length-r)]),a=R.concatUint8Array([this.prevBlock,i.subarray(0,i.length-this.blockSize)]),n=await this._runCBC(a);return _e(n,i),this.prevBlock=n.subarray(-this.blockSize).slice(),r>0&&this.nextBlock.set(e.subarray(-r).slice()),this.i=r,n}this.i+=r.length;let i=new Uint8Array;if(this.i===this.nextBlock.length){const t=this.nextBlock;i=await this._runCBC(this.prevBlock),_e(i,t),this.prevBlock=i.slice(),this.i=0;const a=e.subarray(r.length);this.nextBlock.set(a,this.i),this.i+=a.length}return i}async finish(){let e;if(0===this.i)e=new Uint8Array;else{this.nextBlock=this.nextBlock.subarray(0,this.i);const t=this.nextBlock,r=await this._runCBC(this.prevBlock);_e(r,t),e=r.subarray(0,t.length)}return this.clearSensitiveData(),e}clearSensitiveData(){this.nextBlock.fill(0),this.prevBlock.fill(0),this.keyRef=null,this.key=null}async encrypt(e){const t=(await this._runCBC(R.concatUint8Array([new Uint8Array(this.blockSize),e]),this.iv)).subarray(0,e.length);return _e(t,e),this.clearSensitiveData(),t}}function _e(e,t){const r=Math.min(e.length,t.length);for(let i=0;i<r;i++)e[i]=e[i]^t[i]}var Be=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i){const a=_.read(_.symmetric,e);if(Ce&&Te[a])return function(e,t,r,i){const a=_.read(_.symmetric,e),n=new Ce.createDecipheriv(Te[a],t,i);return k(r,(e=>new Uint8Array(n.update(e))))}(e,t,r,i);if(R.isAES(e))return function(e,t,r,i){if(R.isStream(r)){const e=new Ue(t,i);return k(r,(t=>e.aes.AES_Decrypt_process(t)),(()=>e.aes.AES_Decrypt_finish()))}return Ue.decrypt(r,t,i)}(0,t,r,i);const n=new(await Z(e))(t),s=n.blockSize;let o=i,c=new Uint8Array;const u=e=>{e&&(c=R.concatUint8Array([c,e]));const t=new Uint8Array(c.length);let r,i=0;for(;e?c.length>=s:c.length;){const e=n.encrypt(o);for(o=c.subarray(0,s),r=0;r<s;r++)t[i++]=o[r]^e[r];c=c.subarray(s)}return t.subarray(0,i)};return k(r,u,u)},encrypt:async function(e,t,r,i,a){const n=_.read(_.symmetric,e);if(R.getNodeCrypto()&&Te[n])return function(e,t,r,i){const a=_.read(_.symmetric,e),n=new Ce.createCipheriv(Te[a],t,i);return k(r,(e=>new Uint8Array(n.update(e))))}(e,t,r,i);if(R.isAES(e))return async function(e,t,r,i){if(De&&await Ie.isSupported(e)){const a=new Ie(e,t,i);return R.isStream(r)?k(r,(e=>a.encryptChunk(e)),(()=>a.finish())):a.encrypt(r)}{const e=new Ue(t,i);return k(r,(t=>e.aes.AES_Encrypt_process(t)),(()=>e.aes.AES_Encrypt_finish()))}}(e,t,r,i);const s=new(await Z(e))(t),o=s.blockSize,c=i.slice();let u=new Uint8Array;const h=e=>{e&&(u=R.concatUint8Array([u,e]));const t=new Uint8Array(u.length);let r,i=0;for(;e?u.length>=o:u.length;){const e=s.encrypt(c);for(r=0;r<o;r++)c[r]=u[r]^e[r],t[i++]=c[r];u=u.subarray(o)}return t.subarray(0,i)};return k(r,h,h)}});class Me{static encrypt(e,t,r){return new Me(t,r).encrypt(e)}static decrypt(e,t,r){return new Me(t,r).encrypt(e)}constructor(e,t,r){this.aes=r||new Pe(e,void 0,!1,"CTR"),delete this.aes.padding,this.AES_CTR_set_options(t)}encrypt(e){return ke(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}decrypt(e){return ke(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}AES_CTR_set_options(e,t,r){let{asm:i}=this.aes.acquire_asm();if(void 0!==r){if(r<8||r>48)throw new Ae("illegal counter size");let e=Math.pow(2,r)-1;i.set_mask(0,0,e/4294967296|0,0|e)}else r=48,i.set_mask(0,0,65535,4294967295);if(void 0===e)throw Error("nonce is required");{let t=e.length;if(!t||t>16)throw new Ae("illegal nonce size");let r=new DataView(new ArrayBuffer(16));new Uint8Array(r.buffer).set(e),i.set_nonce(r.getUint32(0),r.getUint32(4),r.getUint32(8),r.getUint32(12))}if(void 0!==t){if(t<0||t>=Math.pow(2,r))throw new Ae("illegal counter value");i.set_counter(0,0,t/4294967296|0,0|t)}}}class Re{static encrypt(e,t,r=!0,i){return new Re(t,i,r).encrypt(e)}static decrypt(e,t,r=!0,i){return new Re(t,i,r).decrypt(e)}constructor(e,t,r=!0,i){this.aes=i||new Pe(e,t,r,"CBC")}encrypt(e){return ke(this.aes.AES_Encrypt_process(e),this.aes.AES_Encrypt_finish())}decrypt(e){return ke(this.aes.AES_Decrypt_process(e),this.aes.AES_Decrypt_finish())}}const Le=R.getWebCrypto(),Fe=R.getNodeCrypto(),Ne=16;function ze(e,t){const r=e.length-Ne;for(let i=0;i<Ne;i++)e[i+r]^=t[i];return e}const Oe=new Uint8Array(Ne);async function He(e){const t=await async function(e){if(R.getNodeCrypto())return async function(t){const r=new Fe.createCipheriv("aes-"+8*e.length+"-cbc",e,Oe).update(t);return new Uint8Array(r)};if(R.getWebCrypto())try{return e=await Le.importKey("raw",e,{name:"AES-CBC",length:8*e.length},!1,["encrypt"]),async function(t){const r=await Le.encrypt({name:"AES-CBC",iv:Oe,length:8*Ne},e,t);return new Uint8Array(r).subarray(0,r.byteLength-Ne)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;R.printDebugError("Browser did not support operation: "+t.message)}return async function(t){return Re.encrypt(t,e,!1,Oe)}}(e),r=R.double(await t(Oe)),i=R.double(r);return async function(e){return(await t(function(e,t,r){if(e.length&&e.length%Ne==0)return ze(e,t);const i=new Uint8Array(e.length+(Ne-e.length%Ne));return i.set(e),i[e.length]=128,ze(i,r)}(e,r,i))).subarray(-Ne)}}const je=R.getWebCrypto(),qe=R.getNodeCrypto(),Ge=R.getNodeBuffer(),Ve=16,We=Ve,$e=Ve,Xe=new Uint8Array(Ve),Ze=new Uint8Array(Ve);Ze[Ve-1]=1;const Qe=new Uint8Array(Ve);async function Ye(e){const t=await He(e);return function(e,r){return t(R.concatUint8Array([e,r]))}}async function Je(e){if(R.getNodeCrypto())return async function(t,r){const i=new qe.createCipheriv("aes-"+8*e.length+"-ctr",e,r),a=Ge.concat([i.update(t),i.final()]);return new Uint8Array(a)};if(R.getWebCrypto())try{const t=await je.importKey("raw",e,{name:"AES-CTR",length:8*e.length},!1,["encrypt"]);return async function(e,r){const i=await je.encrypt({name:"AES-CTR",counter:r,length:8*Ve},t,e);return new Uint8Array(i)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;R.printDebugError("Browser did not support operation: "+t.message)}return async function(t,r){return Me.encrypt(t,e,r)}}async function et(e,t){if(e!==_.symmetric.aes128&&e!==_.symmetric.aes192&&e!==_.symmetric.aes256)throw Error("EAX mode supports only AES cipher");const[r,i]=await Promise.all([Ye(t),Je(t)]);return{encrypt:async function(e,t,a){const[n,s]=await Promise.all([r(Xe,t),r(Ze,a)]),o=await i(e,n),c=await r(Qe,o);for(let e=0;e<$e;e++)c[e]^=s[e]^n[e];return R.concatUint8Array([o,c])},decrypt:async function(e,t,a){if(e.length<$e)throw Error("Invalid EAX ciphertext");const n=e.subarray(0,-$e),s=e.subarray(-$e),[o,c,u]=await Promise.all([r(Xe,t),r(Ze,a),r(Qe,n)]),h=u;for(let e=0;e<$e;e++)h[e]^=c[e]^o[e];if(!R.equalsUint8Array(s,h))throw Error("Authentication tag mismatch");return await i(n,o)}}}Qe[Ve-1]=2,et.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[8+e]^=t[e];return r},et.blockLength=Ve,et.ivLength=We,et.tagLength=$e;const tt=16,rt=16;function it(e){let t=0;for(let r=1;0==(e&r);r<<=1)t++;return t}function at(e,t){for(let r=0;r<e.length;r++)e[r]^=t[r];return e}function nt(e,t){return at(e.slice(),t)}const st=new Uint8Array(tt),ot=new Uint8Array([1]);async function ct(e,t){const{keySize:r}=J(e);if(!R.isAES(e)||t.length!==r)throw Error("Unexpected algorithm or key size");let i=0;const a=e=>Re.encrypt(e,t,!1),n=e=>Re.decrypt(e,t,!1);let s;function o(e,t,r,n){const o=t.length/tt|0;!function(e,t){const r=R.nbits(Math.max(e.length,t.length)/tt|0)-1;for(let e=i+1;e<=r;e++)s[e]=R.double(s[e-1]);i=r}(t,n);const c=R.concatUint8Array([st.subarray(0,15-r.length),ot,r]),u=63&c[15];c[15]&=192;const h=a(c),y=R.concatUint8Array([h,nt(h.subarray(0,8),h.subarray(1,9))]),l=R.shiftRight(y.subarray(0+(u>>3),17+(u>>3)),8-(7&u)).subarray(1),p=new Uint8Array(tt),g=new Uint8Array(t.length+rt);let d,f=0;for(d=0;d<o;d++)at(l,s[it(d+1)]),g.set(at(e(nt(l,t)),l),f),at(p,e===a?t:g.subarray(f)),t=t.subarray(tt),f+=tt;if(t.length){at(l,s.x);const r=a(l);g.set(nt(t,r),f);const i=new Uint8Array(tt);i.set(e===a?t:g.subarray(f,-16),0),i[t.length]=128,at(p,i),f+=t.length}const m=at(a(at(at(p,l),s.$)),function(e){if(!e.length)return st;const t=e.length/tt|0,r=new Uint8Array(tt),i=new Uint8Array(tt);for(let n=0;n<t;n++)at(r,s[it(n+1)]),at(i,a(nt(r,e))),e=e.subarray(tt);if(e.length){at(r,s.x);const t=new Uint8Array(tt);t.set(e,0),t[e.length]=128,at(t,r),at(i,a(t))}return i}(n));return g.set(m,f),g}return function(){const e=a(st),t=R.double(e);s=[],s[0]=R.double(t),s.x=e,s.$=t}(),{encrypt:async function(e,t,r){return o(a,e,t,r)},decrypt:async function(e,t,r){if(e.length<rt)throw Error("Invalid OCB ciphertext");const i=e.subarray(-16);e=e.subarray(0,-16);const a=o(n,e,t,r);if(R.equalsUint8Array(i,a.subarray(-16)))return a.subarray(0,-16);throw Error("Authentication tag mismatch")}}}ct.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[7+e]^=t[e];return r},ct.blockLength=tt,ct.ivLength=15,ct.tagLength=rt;const ut=68719476704;class ht{static encrypt(e,t,r,i,a){return new ht(t,r,i,a).encrypt(e)}static decrypt(e,t,r,i,a){return new ht(t,r,i,a).decrypt(e)}constructor(e,t,r,i=16,a){this.tagSize=i,this.gamma0=0,this.counter=1,this.aes=a||new Pe(e,void 0,!1,"CTR");let{asm:n,heap:s}=this.aes.acquire_asm();if(n.gcm_init(),this.tagSize<4||this.tagSize>16)throw new Ae("illegal tagSize value");const o=t.length||0,c=new Uint8Array(16);12!==o?(this._gcm_mac_process(t),s[0]=0,s[1]=0,s[2]=0,s[3]=0,s[4]=0,s[5]=0,s[6]=0,s[7]=0,s[8]=0,s[9]=0,s[10]=0,s[11]=o>>>29,s[12]=o>>>21&255,s[13]=o>>>13&255,s[14]=o>>>5&255,s[15]=o<<3&255,n.mac(me.MAC.GCM,me.HEAP_DATA,16),n.get_iv(me.HEAP_DATA),n.set_iv(0,0,0,0),c.set(s.subarray(0,16))):(c.set(t),c[15]=1);const u=new DataView(c.buffer);if(this.gamma0=u.getUint32(12),n.set_nonce(u.getUint32(0),u.getUint32(4),u.getUint32(8),0),n.set_mask(0,0,0,4294967295),void 0!==r){if(r.length>ut)throw new Ae("illegal adata length");r.length?(this.adata=r,this._gcm_mac_process(r)):this.adata=void 0}else this.adata=void 0;if(this.counter<1||this.counter>4294967295)throw new RangeError("counter must be a positive 32-bit integer");n.set_counter(0,0,0,this.gamma0+this.counter|0)}encrypt(e){return this.AES_GCM_encrypt(e)}decrypt(e){return this.AES_GCM_decrypt(e)}AES_GCM_Encrypt_process(e){let t=0,r=e.length||0,{asm:i,heap:a}=this.aes.acquire_asm(),n=this.counter,s=this.aes.pos,o=this.aes.len,c=0,u=o+r&-16,h=0;if((n-1<<4)+o+r>ut)throw new RangeError("counter overflow");const y=new Uint8Array(u);for(;r>0;)h=be(a,s+o,e,t,r),o+=h,t+=h,r-=h,h=i.cipher(me.ENC.CTR,me.HEAP_DATA+s,o),h=i.mac(me.MAC.GCM,me.HEAP_DATA+s,h),h&&y.set(a.subarray(s,s+h),c),n+=h>>>4,c+=h,h<o?(s+=h,o-=h):(s=0,o=0);return this.counter=n,this.aes.pos=s,this.aes.len=o,y}AES_GCM_Encrypt_finish(){let{asm:e,heap:t}=this.aes.acquire_asm(),r=this.counter,i=this.tagSize,a=this.adata,n=this.aes.pos,s=this.aes.len;const o=new Uint8Array(s+i);e.cipher(me.ENC.CTR,me.HEAP_DATA+n,s+15&-16),s&&o.set(t.subarray(n,n+s));let c=s;for(;15&c;c++)t[n+c]=0;e.mac(me.MAC.GCM,me.HEAP_DATA+n,c);const u=void 0!==a?a.length:0,h=(r-1<<4)+s;return t[0]=0,t[1]=0,t[2]=0,t[3]=u>>>29,t[4]=u>>>21,t[5]=u>>>13&255,t[6]=u>>>5&255,t[7]=u<<3&255,t[8]=t[9]=t[10]=0,t[11]=h>>>29,t[12]=h>>>21&255,t[13]=h>>>13&255,t[14]=h>>>5&255,t[15]=h<<3&255,e.mac(me.MAC.GCM,me.HEAP_DATA,16),e.get_iv(me.HEAP_DATA),e.set_counter(0,0,0,this.gamma0),e.cipher(me.ENC.CTR,me.HEAP_DATA,16),o.set(t.subarray(0,i),s),this.counter=1,this.aes.pos=0,this.aes.len=0,o}AES_GCM_Decrypt_process(e){let t=0,r=e.length||0,{asm:i,heap:a}=this.aes.acquire_asm(),n=this.counter,s=this.tagSize,o=this.aes.pos,c=this.aes.len,u=0,h=c+r>s?c+r-s&-16:0,y=c+r-h,l=0;if((n-1<<4)+c+r>ut)throw new RangeError("counter overflow");const p=new Uint8Array(h);for(;r>y;)l=be(a,o+c,e,t,r-y),c+=l,t+=l,r-=l,l=i.mac(me.MAC.GCM,me.HEAP_DATA+o,l),l=i.cipher(me.DEC.CTR,me.HEAP_DATA+o,l),l&&p.set(a.subarray(o,o+l),u),n+=l>>>4,u+=l,o=0,c=0;return r>0&&(c+=be(a,0,e,t,r)),this.counter=n,this.aes.pos=o,this.aes.len=c,p}AES_GCM_Decrypt_finish(){let{asm:e,heap:t}=this.aes.acquire_asm(),r=this.tagSize,i=this.adata,a=this.counter,n=this.aes.pos,s=this.aes.len,o=s-r;if(s<r)throw new ve("authentication tag not found");const c=new Uint8Array(o),u=new Uint8Array(t.subarray(n+o,n+s));let h=o;for(;15&h;h++)t[n+h]=0;e.mac(me.MAC.GCM,me.HEAP_DATA+n,h),e.cipher(me.DEC.CTR,me.HEAP_DATA+n,h),o&&c.set(t.subarray(n,n+o));const y=void 0!==i?i.length:0,l=(a-1<<4)+s-r;t[0]=0,t[1]=0,t[2]=0,t[3]=y>>>29,t[4]=y>>>21,t[5]=y>>>13&255,t[6]=y>>>5&255,t[7]=y<<3&255,t[8]=t[9]=t[10]=0,t[11]=l>>>29,t[12]=l>>>21&255,t[13]=l>>>13&255,t[14]=l>>>5&255,t[15]=l<<3&255,e.mac(me.MAC.GCM,me.HEAP_DATA,16),e.get_iv(me.HEAP_DATA),e.set_counter(0,0,0,this.gamma0),e.cipher(me.ENC.CTR,me.HEAP_DATA,16);let p=0;for(let e=0;e<r;++e)p|=u[e]^t[e];if(p)throw new Ke("data integrity check failed");return this.counter=1,this.aes.pos=0,this.aes.len=0,c}AES_GCM_decrypt(e){const t=this.AES_GCM_Decrypt_process(e),r=this.AES_GCM_Decrypt_finish(),i=new Uint8Array(t.length+r.length);return t.length&&i.set(t),r.length&&i.set(r,t.length),i}AES_GCM_encrypt(e){const t=this.AES_GCM_Encrypt_process(e),r=this.AES_GCM_Encrypt_finish(),i=new Uint8Array(t.length+r.length);return t.length&&i.set(t),r.length&&i.set(r,t.length),i}_gcm_mac_process(e){let{asm:t,heap:r}=this.aes.acquire_asm(),i=0,a=e.length||0,n=0;for(;a>0;){for(n=be(r,0,e,i,a),i+=n,a-=n;15&n;)r[n++]=0;t.mac(me.MAC.GCM,me.HEAP_DATA,n)}}}const yt=R.getWebCrypto(),lt=R.getNodeCrypto(),pt=R.getNodeBuffer(),gt=16,dt="AES-GCM";async function ft(e,t){if(e!==_.symmetric.aes128&&e!==_.symmetric.aes192&&e!==_.symmetric.aes256)throw Error("GCM mode supports only AES cipher");if(R.getNodeCrypto())return{encrypt:async function(e,r,i=new Uint8Array){const a=new lt.createCipheriv("aes-"+8*t.length+"-gcm",t,r);a.setAAD(i);const n=pt.concat([a.update(e),a.final(),a.getAuthTag()]);return new Uint8Array(n)},decrypt:async function(e,r,i=new Uint8Array){const a=new lt.createDecipheriv("aes-"+8*t.length+"-gcm",t,r);a.setAAD(i),a.setAuthTag(e.slice(e.length-gt,e.length));const n=pt.concat([a.update(e.slice(0,e.length-gt)),a.final()]);return new Uint8Array(n)}};if(R.getWebCrypto())try{const e=await yt.importKey("raw",t,{name:dt},!1,["encrypt","decrypt"]),r=navigator.userAgent.match(/Version\/13\.\d(\.\d)* Safari/)||navigator.userAgent.match(/Version\/(13|14)\.\d(\.\d)* Mobile\/\S* Safari/);return{encrypt:async function(i,a,n=new Uint8Array){if(r&&!i.length)return ht.encrypt(i,t,a,n);const s=await yt.encrypt({name:dt,iv:a,additionalData:n,tagLength:128},e,i);return new Uint8Array(s)},decrypt:async function(i,a,n=new Uint8Array){if(r&&i.length===gt)return ht.decrypt(i,t,a,n);try{const t=await yt.decrypt({name:dt,iv:a,additionalData:n,tagLength:128},e,i);return new Uint8Array(t)}catch(e){if("OperationError"===e.name)throw Error("Authentication tag mismatch")}}}}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;R.printDebugError("Browser did not support operation: "+e.message)}return{encrypt:async function(e,r,i){return ht.encrypt(e,t,r,i)},decrypt:async function(e,r,i){return ht.decrypt(e,t,r,i)}}}ft.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[4+e]^=t[e];return r},ft.blockLength=16,ft.ivLength=12,ft.tagLength=gt;var mt={cfb:Be,gcm:ft,experimentalGCM:ft,eax:et,ocb:ct};const wt=R.getNodeCrypto();function bt(e){const t=new Uint8Array(e);if(wt){const e=wt.randomBytes(t.length);t.set(e)}else{if("undefined"==typeof crypto||!crypto.getRandomValues)throw Error("No secure random number generator available.");crypto.getRandomValues(t)}return t}async function kt(e,t){const r=await R.getBigInteger();if(t.lt(e))throw Error("Illegal parameter value: max <= min");const i=t.sub(e);return new r(bt(i.byteLength()+8)).mod(i).add(e)}var vt=/*#__PURE__*/Object.freeze({__proto__:null,getRandomBigInteger:kt,getRandomBytes:bt});async function At(e,t,r){const i=await R.getBigInteger(),a=new i(1),n=a.leftShift(new i(e-1)),s=new i(30),o=[1,6,5,4,3,2,1,4,3,2,1,2,1,4,3,2,1,2,1,4,3,2,1,6,5,4,3,2,1,2],c=await kt(n,n.leftShift(a));let u=c.mod(s).toNumber();do{c.iadd(new i(o[u])),u=(u+o[u])%o.length,c.bitLength()>e&&(c.imod(n.leftShift(a)).iadd(n),u=c.mod(s).toNumber())}while(!await Kt(c,t,r));return c}async function Kt(e,t,r){return!(t&&!e.dec().gcd(t).isOne())&&(!!await async function(e){const t=await R.getBigInteger();return Et.every((r=>0!==e.mod(new t(r))))}(e)&&(!!await async function(e,t){const r=await R.getBigInteger();return(t=t||new r(2)).modExp(e.dec(),e).isOne()}(e)&&!!await async function(e,t,r){const i=await R.getBigInteger(),a=e.bitLength();t||(t=Math.max(1,a/48|0));const n=e.dec();let s=0;for(;!n.getBit(s);)s++;const o=e.rightShift(new i(s));for(;t>0;t--){let t,a=(r?r():await kt(new i(2),n)).modExp(o,e);if(!a.isOne()&&!a.equal(n)){for(t=1;t<s;t++){if(a=a.mul(a).mod(e),a.isOne())return!1;if(a.equal(n))break}if(t===s)return!1}}return!0}(e,r)))}const Et=[7,11,13,17,19,23,29,31,37,41,43,47,53,59,61,67,71,73,79,83,89,97,101,103,107,109,113,127,131,137,139,149,151,157,163,167,173,179,181,191,193,197,199,211,223,227,229,233,239,241,251,257,263,269,271,277,281,283,293,307,311,313,317,331,337,347,349,353,359,367,373,379,383,389,397,401,409,419,421,431,433,439,443,449,457,461,463,467,479,487,491,499,503,509,521,523,541,547,557,563,569,571,577,587,593,599,601,607,613,617,619,631,641,643,647,653,659,661,673,677,683,691,701,709,719,727,733,739,743,751,757,761,769,773,787,797,809,811,821,823,827,829,839,853,857,859,863,877,881,883,887,907,911,919,929,937,941,947,953,967,971,977,983,991,997,1009,1013,1019,1021,1031,1033,1039,1049,1051,1061,1063,1069,1087,1091,1093,1097,1103,1109,1117,1123,1129,1151,1153,1163,1171,1181,1187,1193,1201,1213,1217,1223,1229,1231,1237,1249,1259,1277,1279,1283,1289,1291,1297,1301,1303,1307,1319,1321,1327,1361,1367,1373,1381,1399,1409,1423,1427,1429,1433,1439,1447,1451,1453,1459,1471,1481,1483,1487,1489,1493,1499,1511,1523,1531,1543,1549,1553,1559,1567,1571,1579,1583,1597,1601,1607,1609,1613,1619,1621,1627,1637,1657,1663,1667,1669,1693,1697,1699,1709,1721,1723,1733,1741,1747,1753,1759,1777,1783,1787,1789,1801,1811,1823,1831,1847,1861,1867,1871,1873,1877,1879,1889,1901,1907,1913,1931,1933,1949,1951,1973,1979,1987,1993,1997,1999,2003,2011,2017,2027,2029,2039,2053,2063,2069,2081,2083,2087,2089,2099,2111,2113,2129,2131,2137,2141,2143,2153,2161,2179,2203,2207,2213,2221,2237,2239,2243,2251,2267,2269,2273,2281,2287,2293,2297,2309,2311,2333,2339,2341,2347,2351,2357,2371,2377,2381,2383,2389,2393,2399,2411,2417,2423,2437,2441,2447,2459,2467,2473,2477,2503,2521,2531,2539,2543,2549,2551,2557,2579,2591,2593,2609,2617,2621,2633,2647,2657,2659,2663,2671,2677,2683,2687,2689,2693,2699,2707,2711,2713,2719,2729,2731,2741,2749,2753,2767,2777,2789,2791,2797,2801,2803,2819,2833,2837,2843,2851,2857,2861,2879,2887,2897,2903,2909,2917,2927,2939,2953,2957,2963,2969,2971,2999,3001,3011,3019,3023,3037,3041,3049,3061,3067,3079,3083,3089,3109,3119,3121,3137,3163,3167,3169,3181,3187,3191,3203,3209,3217,3221,3229,3251,3253,3257,3259,3271,3299,3301,3307,3313,3319,3323,3329,3331,3343,3347,3359,3361,3371,3373,3389,3391,3407,3413,3433,3449,3457,3461,3463,3467,3469,3491,3499,3511,3517,3527,3529,3533,3539,3541,3547,3557,3559,3571,3581,3583,3593,3607,3613,3617,3623,3631,3637,3643,3659,3671,3673,3677,3691,3697,3701,3709,3719,3727,3733,3739,3761,3767,3769,3779,3793,3797,3803,3821,3823,3833,3847,3851,3853,3863,3877,3881,3889,3907,3911,3917,3919,3923,3929,3931,3943,3947,3967,3989,4001,4003,4007,4013,4019,4021,4027,4049,4051,4057,4073,4079,4091,4093,4099,4111,4127,4129,4133,4139,4153,4157,4159,4177,4201,4211,4217,4219,4229,4231,4241,4243,4253,4259,4261,4271,4273,4283,4289,4297,4327,4337,4339,4349,4357,4363,4373,4391,4397,4409,4421,4423,4441,4447,4451,4457,4463,4481,4483,4493,4507,4513,4517,4519,4523,4547,4549,4561,4567,4583,4591,4597,4603,4621,4637,4639,4643,4649,4651,4657,4663,4673,4679,4691,4703,4721,4723,4729,4733,4751,4759,4783,4787,4789,4793,4799,4801,4813,4817,4831,4861,4871,4877,4889,4903,4909,4919,4931,4933,4937,4943,4951,4957,4967,4969,4973,4987,4993,4999];const St=[];function Pt(e,t){const r=e.length;if(r>t-11)throw Error("Message too long");const i=function(e){const t=new Uint8Array(e);let r=0;for(;r<e;){const i=bt(e-r);for(let e=0;e<i.length;e++)0!==i[e]&&(t[r++]=i[e])}return t}(t-r-3),a=new Uint8Array(t);return a[1]=2,a.set(i,2),a.set(e,t-r),a}function Ut(e,t){let r=2,i=1;for(let t=r;t<e.length;t++)i&=0!==e[t],r+=i;const a=r-2,n=e.subarray(r+1),s=0===e[0]&2===e[1]&a>=8&!i;if(t)return R.selectUint8Array(s,n,t);if(s)return n;throw Error("Decryption error")}async function Dt(e,t,r){let i;if(t.length!==fe.getHashByteLength(e))throw Error("Invalid hash length");const a=new Uint8Array(St[e].length);for(i=0;i<St[e].length;i++)a[i]=St[e][i];const n=a.length+t.length;if(r<n+11)throw Error("Intended encoded message length too short");const s=new Uint8Array(r-n-3).fill(255),o=new Uint8Array(r);return o[1]=1,o.set(s,2),o.set(a,r-n),o.set(t,r-t.length),o}St[1]=[48,32,48,12,6,8,42,134,72,134,247,13,2,5,5,0,4,16],St[2]=[48,33,48,9,6,5,43,14,3,2,26,5,0,4,20],St[3]=[48,33,48,9,6,5,43,36,3,2,1,5,0,4,20],St[8]=[48,49,48,13,6,9,96,134,72,1,101,3,4,2,1,5,0,4,32],St[9]=[48,65,48,13,6,9,96,134,72,1,101,3,4,2,2,5,0,4,48],St[10]=[48,81,48,13,6,9,96,134,72,1,101,3,4,2,3,5,0,4,64],St[11]=[48,45,48,13,6,9,96,134,72,1,101,3,4,2,4,5,0,4,28];var Ct=/*#__PURE__*/Object.freeze({__proto__:null,emeDecode:Ut,emeEncode:Pt,emsaEncode:Dt});const xt=R.getWebCrypto(),Tt=R.getNodeCrypto();async function It(e,t,r,i,a,n){const s=await R.getBigInteger(),o=new s(i),c=new s(a),u=new s(r);let h=u.mod(c.dec()),y=u.mod(o.dec());return y=y.toUint8Array(),h=h.toUint8Array(),{kty:"RSA",n:j(e,!0),e:j(t,!0),d:j(r,!0),p:j(a,!0),q:j(i,!0),dp:j(h,!0),dq:j(y,!0),qi:j(n,!0),ext:!0}}function _t(e,t){return{kty:"RSA",n:j(e,!0),e:j(t,!0),ext:!0}}function Bt(e,t){return{n:H(e.n),e:t.toUint8Array(),d:H(e.d),p:H(e.q),q:H(e.p),u:H(e.qi)}}var Mt=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i,a,n,s,o){if(R.getNodeCrypto()&&!o)try{return await async function(e,t,r,i,a,n,s){const o=await It(t,r,i,a,n,s),c={key:o,format:"jwk",type:"pkcs1",padding:Tt.constants.RSA_PKCS1_PADDING};try{return new Uint8Array(Tt.privateDecrypt(c,e))}catch(e){throw Error("Decryption error")}}(e,t,r,i,a,n,s)}catch(e){R.printDebugError(e)}return async function(e,t,r,i,a,n,s,o){const c=await R.getBigInteger();if(e=new c(e),t=new c(t),r=new c(r),i=new c(i),a=new c(a),n=new c(n),s=new c(s),e.gte(t))throw Error("Data too large.");const u=i.mod(n.dec()),h=i.mod(a.dec()),y=(await kt(new c(2),t)).mod(t),l=y.modInv(t).modExp(r,t);e=e.mul(l).mod(t);const p=e.modExp(h,a),g=e.modExp(u,n),d=s.mul(g.sub(p)).mod(n);let f=d.mul(a).add(p);return f=f.mul(y).mod(t),Ut(f.toUint8Array("be",t.byteLength()),o)}(e,t,r,i,a,n,s,o)},encrypt:async function(e,t,r){return R.getNodeCrypto()?async function(e,t,r){const i=_t(t,r),a={key:i,format:"jwk",type:"pkcs1",padding:Tt.constants.RSA_PKCS1_PADDING};return new Uint8Array(Tt.publicEncrypt(a,e))}(e,t,r):async function(e,t,r){const i=await R.getBigInteger();if(t=new i(t),e=new i(Pt(e,t.byteLength())),r=new i(r),e.gte(t))throw Error("Message size cannot exceed modulus size");return e.modExp(r,t).toUint8Array("be",t.byteLength())}(e,t,r)},generate:async function(e,t){if(t=new(await R.getBigInteger())(t),R.getWebCrypto()){const r={name:"RSASSA-PKCS1-v1_5",modulusLength:e,publicExponent:t.toUint8Array(),hash:{name:"SHA-1"}},i=await xt.generateKey(r,!0,["sign","verify"]);return Bt(await xt.exportKey("jwk",i.privateKey),t)}if(R.getNodeCrypto()){const r={modulusLength:e,publicExponent:t.toNumber(),publicKeyEncoding:{type:"pkcs1",format:"jwk"},privateKeyEncoding:{type:"pkcs1",format:"jwk"}},i=await new Promise(((e,t)=>{Tt.generateKeyPair("rsa",r,((r,i,a)=>{r?t(r):e(a)}))}));return Bt(i,t)}let r,i,a;do{i=await At(e-(e>>1),t,40),r=await At(e>>1,t,40),a=r.mul(i)}while(a.bitLength()!==e);const n=r.dec().imul(i.dec());return i.lt(r)&&([r,i]=[i,r]),{n:a.toUint8Array(),e:t.toUint8Array(),d:t.modInv(n).toUint8Array(),p:r.toUint8Array(),q:i.toUint8Array(),u:r.modInv(i).toUint8Array()}},sign:async function(e,t,r,i,a,n,s,o,c){if(t&&!R.isStream(t))if(R.getWebCrypto())try{return await async function(e,t,r,i,a,n,s,o){const c=await It(r,i,a,n,s,o),u={name:"RSASSA-PKCS1-v1_5",hash:{name:e}},h=await xt.importKey("jwk",c,u,!1,["sign"]);return new Uint8Array(await xt.sign("RSASSA-PKCS1-v1_5",h,t))}(_.read(_.webHash,e),t,r,i,a,n,s,o)}catch(e){R.printDebugError(e)}else if(R.getNodeCrypto())return async function(e,t,r,i,a,n,s,o){const c=Tt.createSign(_.read(_.hash,e));c.write(t),c.end();const u=await It(r,i,a,n,s,o);return new Uint8Array(c.sign({key:u,format:"jwk",type:"pkcs1"}))}(e,t,r,i,a,n,s,o);return async function(e,t,r,i){const a=await R.getBigInteger();t=new a(t);const n=new a(await Dt(e,i,t.byteLength()));if(r=new a(r),n.gte(t))throw Error("Message size cannot exceed modulus size");return n.modExp(r,t).toUint8Array("be",t.byteLength())}(e,r,a,c)},validateParams:async function(e,t,r,i,a,n){const s=await R.getBigInteger();if(e=new s(e),i=new s(i),a=new s(a),!i.mul(a).equal(e))return!1;const o=new s(2);if(n=new s(n),!i.mul(n).mod(a).isOne())return!1;t=new s(t),r=new s(r);const c=new s(Math.floor(e.bitLength()/3)),u=await kt(o,o.leftShift(c)),h=u.mul(r).mul(t);return!(!h.mod(i.dec()).equal(u)||!h.mod(a.dec()).equal(u))},verify:async function(e,t,r,i,a,n){if(t&&!R.isStream(t))if(R.getWebCrypto())try{return await async function(e,t,r,i,a){const n=_t(i,a),s=await xt.importKey("jwk",n,{name:"RSASSA-PKCS1-v1_5",hash:{name:e}},!1,["verify"]);return xt.verify("RSASSA-PKCS1-v1_5",s,r,t)}(_.read(_.webHash,e),t,r,i,a)}catch(e){R.printDebugError(e)}else if(R.getNodeCrypto())return async function(e,t,r,i,a){const n=_t(i,a),s={key:n,format:"jwk",type:"pkcs1"},o=Tt.createVerify(_.read(_.hash,e));o.write(t),o.end();try{return await o.verify(s,r)}catch(e){return!1}}(e,t,r,i,a);return async function(e,t,r,i,a){const n=await R.getBigInteger();if(r=new n(r),t=new n(t),i=new n(i),t.gte(r))throw Error("Signature size cannot exceed modulus size");const s=t.modExp(i,r).toUint8Array("be",r.byteLength()),o=await Dt(e,a,r.byteLength());return R.equalsUint8Array(s,o)}(e,r,i,a,n)}});var Rt=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i,a){const n=await R.getBigInteger();return e=new n(e),t=new n(t),r=new n(r),i=new n(i),Ut(e.modExp(i,r).modInv(r).imul(t).imod(r).toUint8Array("be",r.byteLength()),a)},encrypt:async function(e,t,r,i){const a=await R.getBigInteger();t=new a(t),r=new a(r),i=new a(i);const n=new a(Pt(e,t.byteLength())),s=await kt(new a(1),t.dec());return{c1:r.modExp(s,t).toUint8Array(),c2:i.modExp(s,t).imul(n).imod(t).toUint8Array()}},validateParams:async function(e,t,r,i){const a=await R.getBigInteger();e=new a(e),t=new a(t),r=new a(r);const n=new a(1);if(t.lte(n)||t.gte(e))return!1;const s=new a(e.bitLength()),o=new a(1023);if(s.lt(o))return!1;if(!t.modExp(e.dec(),e).isOne())return!1;let c=t;const u=new a(1),h=new a(2).leftShift(new a(17));for(;u.lt(h);){if(c=c.mul(t).imod(e),c.isOne())return!1;u.iinc()}i=new a(i);const y=new a(2),l=await kt(y.leftShift(s.dec()),y.leftShift(s)),p=e.dec().imul(l).iadd(i);return!!r.equal(t.modExp(p,e))}});const Lt="object"==typeof e&&"crypto"in e?e.crypto:void 0,Ft={};var Nt=function(e){var t,r=new Float64Array(16);if(e)for(t=0;t<e.length;t++)r[t]=e[t];return r},zt=function(){throw Error("no PRNG")},Ot=new Uint8Array(32);Ot[0]=9;var Ht=Nt(),jt=Nt([1]),qt=Nt([56129,1]),Gt=Nt([30883,4953,19914,30187,55467,16705,2637,112,59544,30585,16505,36039,65139,11119,27886,20995]),Vt=Nt([61785,9906,39828,60374,45398,33411,5274,224,53552,61171,33010,6542,64743,22239,55772,9222]),Wt=Nt([54554,36645,11616,51542,42930,38181,51040,26924,56412,64982,57905,49316,21502,52590,14035,8553]),$t=Nt([26200,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214]),Xt=Nt([41136,18958,6951,50414,58488,44335,6150,12099,55207,15867,153,11085,57099,20417,9344,11139]);function Zt(e,t,r,i){e[t]=r>>24&255,e[t+1]=r>>16&255,e[t+2]=r>>8&255,e[t+3]=255&r,e[t+4]=i>>24&255,e[t+5]=i>>16&255,e[t+6]=i>>8&255,e[t+7]=255&i}function Qt(e,t,r,i){return function(e,t,r,i,a){var n,s=0;for(n=0;n<a;n++)s|=e[t+n]^r[i+n];return(1&s-1>>>8)-1}(e,t,r,i,32)}function Yt(e,t){var r;for(r=0;r<16;r++)e[r]=0|t[r]}function Jt(e){var t,r,i=1;for(t=0;t<16;t++)r=e[t]+i+65535,i=Math.floor(r/65536),e[t]=r-65536*i;e[0]+=i-1+37*(i-1)}function er(e,t,r){for(var i,a=~(r-1),n=0;n<16;n++)i=a&(e[n]^t[n]),e[n]^=i,t[n]^=i}function tr(e,t){var r,i,a,n=Nt(),s=Nt();for(r=0;r<16;r++)s[r]=t[r];for(Jt(s),Jt(s),Jt(s),i=0;i<2;i++){for(n[0]=s[0]-65517,r=1;r<15;r++)n[r]=s[r]-65535-(n[r-1]>>16&1),n[r-1]&=65535;n[15]=s[15]-32767-(n[14]>>16&1),a=n[15]>>16&1,n[14]&=65535,er(s,n,1-a)}for(r=0;r<16;r++)e[2*r]=255&s[r],e[2*r+1]=s[r]>>8}function rr(e,t){var r=new Uint8Array(32),i=new Uint8Array(32);return tr(r,e),tr(i,t),Qt(r,0,i,0)}function ir(e){var t=new Uint8Array(32);return tr(t,e),1&t[0]}function ar(e,t){var r;for(r=0;r<16;r++)e[r]=t[2*r]+(t[2*r+1]<<8);e[15]&=32767}function nr(e,t,r){for(var i=0;i<16;i++)e[i]=t[i]+r[i]}function sr(e,t,r){for(var i=0;i<16;i++)e[i]=t[i]-r[i]}function or(e,t,r){var i,a,n=0,s=0,o=0,c=0,u=0,h=0,y=0,l=0,p=0,g=0,d=0,f=0,m=0,w=0,b=0,k=0,v=0,A=0,K=0,E=0,S=0,P=0,U=0,D=0,C=0,x=0,T=0,I=0,_=0,B=0,M=0,R=r[0],L=r[1],F=r[2],N=r[3],z=r[4],O=r[5],H=r[6],j=r[7],q=r[8],G=r[9],V=r[10],W=r[11],$=r[12],X=r[13],Z=r[14],Q=r[15];n+=(i=t[0])*R,s+=i*L,o+=i*F,c+=i*N,u+=i*z,h+=i*O,y+=i*H,l+=i*j,p+=i*q,g+=i*G,d+=i*V,f+=i*W,m+=i*$,w+=i*X,b+=i*Z,k+=i*Q,s+=(i=t[1])*R,o+=i*L,c+=i*F,u+=i*N,h+=i*z,y+=i*O,l+=i*H,p+=i*j,g+=i*q,d+=i*G,f+=i*V,m+=i*W,w+=i*$,b+=i*X,k+=i*Z,v+=i*Q,o+=(i=t[2])*R,c+=i*L,u+=i*F,h+=i*N,y+=i*z,l+=i*O,p+=i*H,g+=i*j,d+=i*q,f+=i*G,m+=i*V,w+=i*W,b+=i*$,k+=i*X,v+=i*Z,A+=i*Q,c+=(i=t[3])*R,u+=i*L,h+=i*F,y+=i*N,l+=i*z,p+=i*O,g+=i*H,d+=i*j,f+=i*q,m+=i*G,w+=i*V,b+=i*W,k+=i*$,v+=i*X,A+=i*Z,K+=i*Q,u+=(i=t[4])*R,h+=i*L,y+=i*F,l+=i*N,p+=i*z,g+=i*O,d+=i*H,f+=i*j,m+=i*q,w+=i*G,b+=i*V,k+=i*W,v+=i*$,A+=i*X,K+=i*Z,E+=i*Q,h+=(i=t[5])*R,y+=i*L,l+=i*F,p+=i*N,g+=i*z,d+=i*O,f+=i*H,m+=i*j,w+=i*q,b+=i*G,k+=i*V,v+=i*W,A+=i*$,K+=i*X,E+=i*Z,S+=i*Q,y+=(i=t[6])*R,l+=i*L,p+=i*F,g+=i*N,d+=i*z,f+=i*O,m+=i*H,w+=i*j,b+=i*q,k+=i*G,v+=i*V,A+=i*W,K+=i*$,E+=i*X,S+=i*Z,P+=i*Q,l+=(i=t[7])*R,p+=i*L,g+=i*F,d+=i*N,f+=i*z,m+=i*O,w+=i*H,b+=i*j,k+=i*q,v+=i*G,A+=i*V,K+=i*W,E+=i*$,S+=i*X,P+=i*Z,U+=i*Q,p+=(i=t[8])*R,g+=i*L,d+=i*F,f+=i*N,m+=i*z,w+=i*O,b+=i*H,k+=i*j,v+=i*q,A+=i*G,K+=i*V,E+=i*W,S+=i*$,P+=i*X,U+=i*Z,D+=i*Q,g+=(i=t[9])*R,d+=i*L,f+=i*F,m+=i*N,w+=i*z,b+=i*O,k+=i*H,v+=i*j,A+=i*q,K+=i*G,E+=i*V,S+=i*W,P+=i*$,U+=i*X,D+=i*Z,C+=i*Q,d+=(i=t[10])*R,f+=i*L,m+=i*F,w+=i*N,b+=i*z,k+=i*O,v+=i*H,A+=i*j,K+=i*q,E+=i*G,S+=i*V,P+=i*W,U+=i*$,D+=i*X,C+=i*Z,x+=i*Q,f+=(i=t[11])*R,m+=i*L,w+=i*F,b+=i*N,k+=i*z,v+=i*O,A+=i*H,K+=i*j,E+=i*q,S+=i*G,P+=i*V,U+=i*W,D+=i*$,C+=i*X,x+=i*Z,T+=i*Q,m+=(i=t[12])*R,w+=i*L,b+=i*F,k+=i*N,v+=i*z,A+=i*O,K+=i*H,E+=i*j,S+=i*q,P+=i*G,U+=i*V,D+=i*W,C+=i*$,x+=i*X,T+=i*Z,I+=i*Q,w+=(i=t[13])*R,b+=i*L,k+=i*F,v+=i*N,A+=i*z,K+=i*O,E+=i*H,S+=i*j,P+=i*q,U+=i*G,D+=i*V,C+=i*W,x+=i*$,T+=i*X,I+=i*Z,_+=i*Q,b+=(i=t[14])*R,k+=i*L,v+=i*F,A+=i*N,K+=i*z,E+=i*O,S+=i*H,P+=i*j,U+=i*q,D+=i*G,C+=i*V,x+=i*W,T+=i*$,I+=i*X,_+=i*Z,B+=i*Q,k+=(i=t[15])*R,s+=38*(A+=i*F),o+=38*(K+=i*N),c+=38*(E+=i*z),u+=38*(S+=i*O),h+=38*(P+=i*H),y+=38*(U+=i*j),l+=38*(D+=i*q),p+=38*(C+=i*G),g+=38*(x+=i*V),d+=38*(T+=i*W),f+=38*(I+=i*$),m+=38*(_+=i*X),w+=38*(B+=i*Z),b+=38*(M+=i*Q),n=(i=(n+=38*(v+=i*L))+(a=1)+65535)-65536*(a=Math.floor(i/65536)),s=(i=s+a+65535)-65536*(a=Math.floor(i/65536)),o=(i=o+a+65535)-65536*(a=Math.floor(i/65536)),c=(i=c+a+65535)-65536*(a=Math.floor(i/65536)),u=(i=u+a+65535)-65536*(a=Math.floor(i/65536)),h=(i=h+a+65535)-65536*(a=Math.floor(i/65536)),y=(i=y+a+65535)-65536*(a=Math.floor(i/65536)),l=(i=l+a+65535)-65536*(a=Math.floor(i/65536)),p=(i=p+a+65535)-65536*(a=Math.floor(i/65536)),g=(i=g+a+65535)-65536*(a=Math.floor(i/65536)),d=(i=d+a+65535)-65536*(a=Math.floor(i/65536)),f=(i=f+a+65535)-65536*(a=Math.floor(i/65536)),m=(i=m+a+65535)-65536*(a=Math.floor(i/65536)),w=(i=w+a+65535)-65536*(a=Math.floor(i/65536)),b=(i=b+a+65535)-65536*(a=Math.floor(i/65536)),k=(i=k+a+65535)-65536*(a=Math.floor(i/65536)),n=(i=(n+=a-1+37*(a-1))+(a=1)+65535)-65536*(a=Math.floor(i/65536)),s=(i=s+a+65535)-65536*(a=Math.floor(i/65536)),o=(i=o+a+65535)-65536*(a=Math.floor(i/65536)),c=(i=c+a+65535)-65536*(a=Math.floor(i/65536)),u=(i=u+a+65535)-65536*(a=Math.floor(i/65536)),h=(i=h+a+65535)-65536*(a=Math.floor(i/65536)),y=(i=y+a+65535)-65536*(a=Math.floor(i/65536)),l=(i=l+a+65535)-65536*(a=Math.floor(i/65536)),p=(i=p+a+65535)-65536*(a=Math.floor(i/65536)),g=(i=g+a+65535)-65536*(a=Math.floor(i/65536)),d=(i=d+a+65535)-65536*(a=Math.floor(i/65536)),f=(i=f+a+65535)-65536*(a=Math.floor(i/65536)),m=(i=m+a+65535)-65536*(a=Math.floor(i/65536)),w=(i=w+a+65535)-65536*(a=Math.floor(i/65536)),b=(i=b+a+65535)-65536*(a=Math.floor(i/65536)),k=(i=k+a+65535)-65536*(a=Math.floor(i/65536)),n+=a-1+37*(a-1),e[0]=n,e[1]=s,e[2]=o,e[3]=c,e[4]=u,e[5]=h,e[6]=y,e[7]=l,e[8]=p,e[9]=g,e[10]=d,e[11]=f,e[12]=m,e[13]=w,e[14]=b,e[15]=k}function cr(e,t){or(e,t,t)}function ur(e,t){var r,i=Nt();for(r=0;r<16;r++)i[r]=t[r];for(r=253;r>=0;r--)cr(i,i),2!==r&&4!==r&&or(i,i,t);for(r=0;r<16;r++)e[r]=i[r]}function hr(e,t,r){var i,a,n=new Uint8Array(32),s=new Float64Array(80),o=Nt(),c=Nt(),u=Nt(),h=Nt(),y=Nt(),l=Nt();for(a=0;a<31;a++)n[a]=t[a];for(n[31]=127&t[31]|64,n[0]&=248,ar(s,r),a=0;a<16;a++)c[a]=s[a],h[a]=o[a]=u[a]=0;for(o[0]=h[0]=1,a=254;a>=0;--a)er(o,c,i=n[a>>>3]>>>(7&a)&1),er(u,h,i),nr(y,o,u),sr(o,o,u),nr(u,c,h),sr(c,c,h),cr(h,y),cr(l,o),or(o,u,o),or(u,c,y),nr(y,o,u),sr(o,o,u),cr(c,o),sr(u,h,l),or(o,u,qt),nr(o,o,h),or(u,u,o),or(o,h,l),or(h,c,s),cr(c,y),er(o,c,i),er(u,h,i);for(a=0;a<16;a++)s[a+16]=o[a],s[a+32]=u[a],s[a+48]=c[a],s[a+64]=h[a];var p=s.subarray(32),g=s.subarray(16);return ur(p,p),or(g,g,p),tr(e,g),0}function yr(e,t){return hr(e,t,Ot)}var lr=[1116352408,3609767458,1899447441,602891725,3049323471,3964484399,3921009573,2173295548,961987163,4081628472,1508970993,3053834265,2453635748,2937671579,2870763221,3664609560,3624381080,2734883394,310598401,1164996542,607225278,1323610764,1426881987,3590304994,1925078388,4068182383,2162078206,991336113,2614888103,633803317,3248222580,3479774868,3835390401,2666613458,4022224774,944711139,264347078,2341262773,604807628,2007800933,770255983,1495990901,1249150122,1856431235,1555081692,3175218132,1996064986,2198950837,2554220882,3999719339,2821834349,766784016,2952996808,2566594879,3210313671,3203337956,3336571891,1034457026,3584528711,2466948901,113926993,3758326383,338241895,168717936,666307205,1188179964,773529912,1546045734,1294757372,1522805485,1396182291,2643833823,1695183700,2343527390,1986661051,1014477480,2177026350,1206759142,2456956037,344077627,2730485921,1290863460,2820302411,3158454273,3259730800,3505952657,3345764771,106217008,3516065817,3606008344,3600352804,1432725776,4094571909,1467031594,275423344,851169720,430227734,3100823752,506948616,1363258195,659060556,3750685593,883997877,3785050280,958139571,3318307427,1322822218,3812723403,1537002063,2003034995,1747873779,3602036899,1955562222,1575990012,2024104815,1125592928,2227730452,2716904306,2361852424,442776044,2428436474,593698344,2756734187,3733110249,3204031479,2999351573,3329325298,3815920427,3391569614,3928383900,3515267271,566280711,3940187606,3454069534,4118630271,4000239992,116418474,1914138554,174292421,2731055270,289380356,3203993006,460393269,320620315,685471733,587496836,852142971,1086792851,1017036298,365543100,1126000580,2618297676,1288033470,3409855158,1501505948,4234509866,1607167915,987167468,1816402316,1246189591];function pr(e,t,r,i){for(var a,n,s,o,c,u,h,y,l,p,g,d,f,m,w,b,k,v,A,K,E,S,P,U,D,C,x=new Int32Array(16),T=new Int32Array(16),I=e[0],_=e[1],B=e[2],M=e[3],R=e[4],L=e[5],F=e[6],N=e[7],z=t[0],O=t[1],H=t[2],j=t[3],q=t[4],G=t[5],V=t[6],W=t[7],$=0;i>=128;){for(A=0;A<16;A++)K=8*A+$,x[A]=r[K+0]<<24|r[K+1]<<16|r[K+2]<<8|r[K+3],T[A]=r[K+4]<<24|r[K+5]<<16|r[K+6]<<8|r[K+7];for(A=0;A<80;A++)if(a=I,n=_,s=B,o=M,c=R,u=L,h=F,N,l=z,p=O,g=H,d=j,f=q,m=G,w=V,W,P=65535&(S=W),U=S>>>16,D=65535&(E=N),C=E>>>16,P+=65535&(S=(q>>>14|R<<18)^(q>>>18|R<<14)^(R>>>9|q<<23)),U+=S>>>16,D+=65535&(E=(R>>>14|q<<18)^(R>>>18|q<<14)^(q>>>9|R<<23)),C+=E>>>16,P+=65535&(S=q&G^~q&V),U+=S>>>16,D+=65535&(E=R&L^~R&F),C+=E>>>16,E=lr[2*A],P+=65535&(S=lr[2*A+1]),U+=S>>>16,D+=65535&E,C+=E>>>16,E=x[A%16],U+=(S=T[A%16])>>>16,D+=65535&E,C+=E>>>16,D+=(U+=(P+=65535&S)>>>16)>>>16,P=65535&(S=v=65535&P|U<<16),U=S>>>16,D=65535&(E=k=65535&D|(C+=D>>>16)<<16),C=E>>>16,P+=65535&(S=(z>>>28|I<<4)^(I>>>2|z<<30)^(I>>>7|z<<25)),U+=S>>>16,D+=65535&(E=(I>>>28|z<<4)^(z>>>2|I<<30)^(z>>>7|I<<25)),C+=E>>>16,U+=(S=z&O^z&H^O&H)>>>16,D+=65535&(E=I&_^I&B^_&B),C+=E>>>16,y=65535&(D+=(U+=(P+=65535&S)>>>16)>>>16)|(C+=D>>>16)<<16,b=65535&P|U<<16,P=65535&(S=d),U=S>>>16,D=65535&(E=o),C=E>>>16,U+=(S=v)>>>16,D+=65535&(E=k),C+=E>>>16,_=a,B=n,M=s,R=o=65535&(D+=(U+=(P+=65535&S)>>>16)>>>16)|(C+=D>>>16)<<16,L=c,F=u,N=h,I=y,O=l,H=p,j=g,q=d=65535&P|U<<16,G=f,V=m,W=w,z=b,A%16==15)for(K=0;K<16;K++)E=x[K],P=65535&(S=T[K]),U=S>>>16,D=65535&E,C=E>>>16,E=x[(K+9)%16],P+=65535&(S=T[(K+9)%16]),U+=S>>>16,D+=65535&E,C+=E>>>16,k=x[(K+1)%16],P+=65535&(S=((v=T[(K+1)%16])>>>1|k<<31)^(v>>>8|k<<24)^(v>>>7|k<<25)),U+=S>>>16,D+=65535&(E=(k>>>1|v<<31)^(k>>>8|v<<24)^k>>>7),C+=E>>>16,k=x[(K+14)%16],U+=(S=((v=T[(K+14)%16])>>>19|k<<13)^(k>>>29|v<<3)^(v>>>6|k<<26))>>>16,D+=65535&(E=(k>>>19|v<<13)^(v>>>29|k<<3)^k>>>6),C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,x[K]=65535&D|C<<16,T[K]=65535&P|U<<16;P=65535&(S=z),U=S>>>16,D=65535&(E=I),C=E>>>16,E=e[0],U+=(S=t[0])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[0]=I=65535&D|C<<16,t[0]=z=65535&P|U<<16,P=65535&(S=O),U=S>>>16,D=65535&(E=_),C=E>>>16,E=e[1],U+=(S=t[1])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[1]=_=65535&D|C<<16,t[1]=O=65535&P|U<<16,P=65535&(S=H),U=S>>>16,D=65535&(E=B),C=E>>>16,E=e[2],U+=(S=t[2])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[2]=B=65535&D|C<<16,t[2]=H=65535&P|U<<16,P=65535&(S=j),U=S>>>16,D=65535&(E=M),C=E>>>16,E=e[3],U+=(S=t[3])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[3]=M=65535&D|C<<16,t[3]=j=65535&P|U<<16,P=65535&(S=q),U=S>>>16,D=65535&(E=R),C=E>>>16,E=e[4],U+=(S=t[4])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[4]=R=65535&D|C<<16,t[4]=q=65535&P|U<<16,P=65535&(S=G),U=S>>>16,D=65535&(E=L),C=E>>>16,E=e[5],U+=(S=t[5])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[5]=L=65535&D|C<<16,t[5]=G=65535&P|U<<16,P=65535&(S=V),U=S>>>16,D=65535&(E=F),C=E>>>16,E=e[6],U+=(S=t[6])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[6]=F=65535&D|C<<16,t[6]=V=65535&P|U<<16,P=65535&(S=W),U=S>>>16,D=65535&(E=N),C=E>>>16,E=e[7],U+=(S=t[7])>>>16,D+=65535&E,C+=E>>>16,C+=(D+=(U+=(P+=65535&S)>>>16)>>>16)>>>16,e[7]=N=65535&D|C<<16,t[7]=W=65535&P|U<<16,$+=128,i-=128}return i}function gr(e,t,r){var i,a=new Int32Array(8),n=new Int32Array(8),s=new Uint8Array(256),o=r;for(a[0]=1779033703,a[1]=3144134277,a[2]=1013904242,a[3]=2773480762,a[4]=1359893119,a[5]=2600822924,a[6]=528734635,a[7]=1541459225,n[0]=4089235720,n[1]=2227873595,n[2]=4271175723,n[3]=1595750129,n[4]=2917565137,n[5]=725511199,n[6]=4215389547,n[7]=327033209,pr(a,n,t,r),r%=128,i=0;i<r;i++)s[i]=t[o-r+i];for(s[r]=128,s[(r=256-128*(r<112?1:0))-9]=0,Zt(s,r-8,o/536870912|0,o<<3),pr(a,n,s,r),i=0;i<8;i++)Zt(e,8*i,a[i],n[i]);return 0}function dr(e,t){var r=Nt(),i=Nt(),a=Nt(),n=Nt(),s=Nt(),o=Nt(),c=Nt(),u=Nt(),h=Nt();sr(r,e[1],e[0]),sr(h,t[1],t[0]),or(r,r,h),nr(i,e[0],e[1]),nr(h,t[0],t[1]),or(i,i,h),or(a,e[3],t[3]),or(a,a,Vt),or(n,e[2],t[2]),nr(n,n,n),sr(s,i,r),sr(o,n,a),nr(c,n,a),nr(u,i,r),or(e[0],s,o),or(e[1],u,c),or(e[2],c,o),or(e[3],s,u)}function fr(e,t,r){var i;for(i=0;i<4;i++)er(e[i],t[i],r)}function mr(e,t){var r=Nt(),i=Nt(),a=Nt();ur(a,t[2]),or(r,t[0],a),or(i,t[1],a),tr(e,i),e[31]^=ir(r)<<7}function wr(e,t,r){var i,a;for(Yt(e[0],Ht),Yt(e[1],jt),Yt(e[2],jt),Yt(e[3],Ht),a=255;a>=0;--a)fr(e,t,i=r[a/8|0]>>(7&a)&1),dr(t,e),dr(e,e),fr(e,t,i)}function br(e,t){var r=[Nt(),Nt(),Nt(),Nt()];Yt(r[0],Wt),Yt(r[1],$t),Yt(r[2],jt),or(r[3],Wt,$t),wr(e,r,t)}function kr(e,t,r){var i,a=new Uint8Array(64),n=[Nt(),Nt(),Nt(),Nt()];for(r||zt(t,32),gr(a,t,32),a[0]&=248,a[31]&=127,a[31]|=64,br(n,a),mr(e,n),i=0;i<32;i++)t[i+32]=e[i];return 0}var vr=new Float64Array([237,211,245,92,26,99,18,88,214,156,247,162,222,249,222,20,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,16]);function Ar(e,t){var r,i,a,n;for(i=63;i>=32;--i){for(r=0,a=i-32,n=i-12;a<n;++a)t[a]+=r-16*t[i]*vr[a-(i-32)],r=Math.floor((t[a]+128)/256),t[a]-=256*r;t[a]+=r,t[i]=0}for(r=0,a=0;a<32;a++)t[a]+=r-(t[31]>>4)*vr[a],r=t[a]>>8,t[a]&=255;for(a=0;a<32;a++)t[a]-=r*vr[a];for(i=0;i<32;i++)t[i+1]+=t[i]>>8,e[i]=255&t[i]}function Kr(e){var t,r=new Float64Array(64);for(t=0;t<64;t++)r[t]=e[t];for(t=0;t<64;t++)e[t]=0;Ar(e,r)}function Er(e,t){var r=Nt(),i=Nt(),a=Nt(),n=Nt(),s=Nt(),o=Nt(),c=Nt();return Yt(e[2],jt),ar(e[1],t),cr(a,e[1]),or(n,a,Gt),sr(a,a,e[2]),nr(n,e[2],n),cr(s,n),cr(o,s),or(c,o,s),or(r,c,a),or(r,r,n),function(e,t){var r,i=Nt();for(r=0;r<16;r++)i[r]=t[r];for(r=250;r>=0;r--)cr(i,i),1!==r&&or(i,i,t);for(r=0;r<16;r++)e[r]=i[r]}(r,r),or(r,r,a),or(r,r,n),or(r,r,n),or(e[0],r,n),cr(i,e[0]),or(i,i,n),rr(i,a)&&or(e[0],e[0],Xt),cr(i,e[0]),or(i,i,n),rr(i,a)?-1:(ir(e[0])===t[31]>>7&&sr(e[0],Ht,e[0]),or(e[3],e[0],e[1]),0)}var Sr=64;function Pr(){for(var e=0;e<arguments.length;e++)if(!(arguments[e]instanceof Uint8Array))throw new TypeError("unexpected type, use Uint8Array")}Ft.scalarMult=function(e,t){if(Pr(e,t),32!==e.length)throw Error("bad n size");if(32!==t.length)throw Error("bad p size");var r=new Uint8Array(32);return hr(r,e,t),r},Ft.box={},Ft.box.keyPair=function(){var e=new Uint8Array(32),t=new Uint8Array(32);return function(e,t){zt(t,32),yr(e,t)}(e,t),{publicKey:e,secretKey:t}},Ft.box.keyPair.fromSecretKey=function(e){if(Pr(e),32!==e.length)throw Error("bad secret key size");var t=new Uint8Array(32);return yr(t,e),{publicKey:t,secretKey:new Uint8Array(e)}},Ft.sign=function(e,t){if(Pr(e,t),64!==t.length)throw Error("bad secret key size");var r=new Uint8Array(Sr+e.length);return function(e,t,r,i){var a,n,s=new Uint8Array(64),o=new Uint8Array(64),c=new Uint8Array(64),u=new Float64Array(64),h=[Nt(),Nt(),Nt(),Nt()];gr(s,i,32),s[0]&=248,s[31]&=127,s[31]|=64;var y=r+64;for(a=0;a<r;a++)e[64+a]=t[a];for(a=0;a<32;a++)e[32+a]=s[32+a];for(gr(c,e.subarray(32),r+32),Kr(c),br(h,c),mr(e,h),a=32;a<64;a++)e[a]=i[a];for(gr(o,e,r+64),Kr(o),a=0;a<64;a++)u[a]=0;for(a=0;a<32;a++)u[a]=c[a];for(a=0;a<32;a++)for(n=0;n<32;n++)u[a+n]+=o[a]*s[n];Ar(e.subarray(32),u)}(r,e,e.length,t),r},Ft.sign.detached=function(e,t){for(var r=Ft.sign(e,t),i=new Uint8Array(Sr),a=0;a<i.length;a++)i[a]=r[a];return i},Ft.sign.detached.verify=function(e,t,r){if(Pr(e,t,r),t.length!==Sr)throw Error("bad signature size");if(32!==r.length)throw Error("bad public key size");var i,a=new Uint8Array(Sr+e.length),n=new Uint8Array(Sr+e.length);for(i=0;i<Sr;i++)a[i]=t[i];for(i=0;i<e.length;i++)a[i+Sr]=e[i];return function(e,t,r,i){var a,n=new Uint8Array(32),s=new Uint8Array(64),o=[Nt(),Nt(),Nt(),Nt()],c=[Nt(),Nt(),Nt(),Nt()];if(r<64)return-1;if(Er(c,i))return-1;for(a=0;a<r;a++)e[a]=t[a];for(a=0;a<32;a++)e[a+32]=i[a];if(gr(s,e,r),Kr(s),wr(o,c,s),br(c,t.subarray(32)),dr(o,c),mr(n,o),r-=64,Qt(t,0,n,0)){for(a=0;a<r;a++)e[a]=0;return-1}for(a=0;a<r;a++)e[a]=t[a+64];return r}(n,a,a.length,r)>=0},Ft.sign.keyPair=function(){var e=new Uint8Array(32),t=new Uint8Array(64);return kr(e,t),{publicKey:e,secretKey:t}},Ft.sign.keyPair.fromSecretKey=function(e){if(Pr(e),64!==e.length)throw Error("bad secret key size");for(var t=new Uint8Array(32),r=0;r<t.length;r++)t[r]=e[32+r];return{publicKey:t,secretKey:new Uint8Array(e)}},Ft.sign.keyPair.fromSeed=function(e){if(Pr(e),32!==e.length)throw Error("bad seed size");for(var t=new Uint8Array(32),r=new Uint8Array(64),i=0;i<32;i++)r[i]=e[i];return kr(t,r,!0),{publicKey:t,secretKey:r}},Ft.setPRNG=function(e){zt=e},function(){if(Lt&&Lt.getRandomValues){Ft.setPRNG((function(e,t){var r,i=new Uint8Array(t);for(r=0;r<t;r+=65536)Lt.getRandomValues(i.subarray(r,r+Math.min(t-r,65536)));for(r=0;r<t;r++)e[r]=i[r];!function(e){for(var t=0;t<e.length;t++)e[t]=0}(i)}))}}();const Ur={"2a8648ce3d030107":_.curve.nistP256,"2b81040022":_.curve.nistP384,"2b81040023":_.curve.nistP521,"2b8104000a":_.curve.secp256k1,"2b06010401da470f01":_.curve.ed25519Legacy,"2b060104019755010501":_.curve.curve25519Legacy,"2b2403030208010107":_.curve.brainpoolP256r1,"2b240303020801010b":_.curve.brainpoolP384r1,"2b240303020801010d":_.curve.brainpoolP512r1};class Dr{constructor(e){if(e instanceof Dr)this.oid=e.oid;else if(R.isArray(e)||R.isUint8Array(e)){if(6===(e=new Uint8Array(e))[0]){if(e[1]!==e.length-2)throw Error("Length mismatch in DER encoded oid");e=e.subarray(2)}this.oid=e}else this.oid=""}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.oid=e.subarray(1,1+t),1+this.oid.length}throw Error("Invalid oid")}write(){return R.concatUint8Array([new Uint8Array([this.oid.length]),this.oid])}toHex(){return R.uint8ArrayToHex(this.oid)}getName(){const e=Ur[this.toHex()];if(!e)throw Error("Unknown curve object identifier.");return e}}function Cr(e){let t,r=0;const i=e[0];return i<192?([r]=e,t=1):i<255?(r=(e[0]-192<<8)+e[1]+192,t=2):255===i&&(r=R.readNumber(e.subarray(1,5)),t=5),{len:r,offset:t}}function xr(e){return e<192?new Uint8Array([e]):e>191&&e<8384?new Uint8Array([192+(e-192>>8),e-192&255]):R.concatUint8Array([new Uint8Array([255]),R.writeNumber(e,4)])}function Tr(e){if(e<0||e>30)throw Error("Partial Length power must be between 1 and 30");return new Uint8Array([224+e])}function Ir(e){return new Uint8Array([192|e])}function _r(e,t){return R.concatUint8Array([Ir(e),xr(t)])}function Br(e){return[_.packet.literalData,_.packet.compressedData,_.packet.symmetricallyEncryptedData,_.packet.symEncryptedIntegrityProtectedData,_.packet.aeadEncryptedData].includes(e)}async function Mr(e,t){const r=x(e);let i,a;try{const s=await r.peekBytes(2);if(!s||s.length<2||0==(128&s[0]))throw Error("Error during parsing. This message / key probably does not conform to a valid OpenPGP format.");const o=await r.readByte();let c,u,h=-1,y=-1;y=0,0!=(64&o)&&(y=1),y?h=63&o:(h=(63&o)>>2,u=3&o);const l=Br(h);let p,g=null;if(l){if("array"===R.isStream(e)){const e=new n;i=T(e),g=e}else{const e=new TransformStream;i=T(e.writable),g=e.readable}a=t({tag:h,packet:g})}else g=[];do{if(y){const e=await r.readByte();if(p=!1,e<192)c=e;else if(e>=192&&e<224)c=(e-192<<8)+await r.readByte()+192;else if(e>223&&e<255){if(c=1<<(31&e),p=!0,!l)throw new TypeError("This packet type does not support partial lengths.")}else c=await r.readByte()<<24|await r.readByte()<<16|await r.readByte()<<8|await r.readByte()}else switch(u){case 0:c=await r.readByte();break;case 1:c=await r.readByte()<<8|await r.readByte();break;case 2:c=await r.readByte()<<24|await r.readByte()<<16|await r.readByte()<<8|await r.readByte();break;default:c=1/0}if(c>0){let e=0;for(;;){i&&await i.ready;const{done:t,value:a}=await r.read();if(t){if(c===1/0)break;throw Error("Unexpected end of packet")}const n=c===1/0?a:a.subarray(0,c-e);if(i?await i.write(n):g.push(n),e+=a.length,e>=c){r.unshift(a.subarray(c-e+a.length));break}}}}while(p);const d=await r.peekBytes(l?1/0:2);return i?(await i.ready,await i.close()):(g=R.concatUint8Array(g),await t({tag:h,packet:g})),!d||!d.length}catch(e){if(i)return await i.abort(e),!0;throw e}finally{i&&await a,r.releaseLock()}}class Rr extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Rr),this.name="UnsupportedError"}}class Lr extends Rr{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Rr),this.name="UnknownPacketError"}}class Fr{constructor(e,t){this.tag=e,this.rawContent=t}write(){return this.rawContent}}const Nr=R.getWebCrypto(),zr=R.getNodeCrypto(),Or={[_.curve.nistP256]:"P-256",[_.curve.nistP384]:"P-384",[_.curve.nistP521]:"P-521"},Hr=zr?zr.getCurves():[],jr=zr?{[_.curve.secp256k1]:Hr.includes("secp256k1")?"secp256k1":void 0,[_.curve.nistP256]:Hr.includes("prime256v1")?"prime256v1":void 0,[_.curve.nistP384]:Hr.includes("secp384r1")?"secp384r1":void 0,[_.curve.nistP521]:Hr.includes("secp521r1")?"secp521r1":void 0,[_.curve.ed25519Legacy]:Hr.includes("ED25519")?"ED25519":void 0,[_.curve.curve25519Legacy]:Hr.includes("X25519")?"X25519":void 0,[_.curve.brainpoolP256r1]:Hr.includes("brainpoolP256r1")?"brainpoolP256r1":void 0,[_.curve.brainpoolP384r1]:Hr.includes("brainpoolP384r1")?"brainpoolP384r1":void 0,[_.curve.brainpoolP512r1]:Hr.includes("brainpoolP512r1")?"brainpoolP512r1":void 0}:{},qr={[_.curve.nistP256]:{oid:[6,8,42,134,72,206,61,3,1,7],keyType:_.publicKey.ecdsa,hash:_.hash.sha256,cipher:_.symmetric.aes128,node:jr[_.curve.nistP256],web:Or[_.curve.nistP256],payloadSize:32,sharedSize:256},[_.curve.nistP384]:{oid:[6,5,43,129,4,0,34],keyType:_.publicKey.ecdsa,hash:_.hash.sha384,cipher:_.symmetric.aes192,node:jr[_.curve.nistP384],web:Or[_.curve.nistP384],payloadSize:48,sharedSize:384},[_.curve.nistP521]:{oid:[6,5,43,129,4,0,35],keyType:_.publicKey.ecdsa,hash:_.hash.sha512,cipher:_.symmetric.aes256,node:jr[_.curve.nistP521],web:Or[_.curve.nistP521],payloadSize:66,sharedSize:528},[_.curve.secp256k1]:{oid:[6,5,43,129,4,0,10],keyType:_.publicKey.ecdsa,hash:_.hash.sha256,cipher:_.symmetric.aes128,node:jr[_.curve.secp256k1],payloadSize:32},[_.curve.ed25519Legacy]:{oid:[6,9,43,6,1,4,1,218,71,15,1],keyType:_.publicKey.eddsaLegacy,hash:_.hash.sha512,node:!1,payloadSize:32},[_.curve.curve25519Legacy]:{oid:[6,10,43,6,1,4,1,151,85,1,5,1],keyType:_.publicKey.ecdh,hash:_.hash.sha256,cipher:_.symmetric.aes128,node:!1,payloadSize:32},[_.curve.brainpoolP256r1]:{oid:[6,9,43,36,3,3,2,8,1,1,7],keyType:_.publicKey.ecdsa,hash:_.hash.sha256,cipher:_.symmetric.aes128,node:jr[_.curve.brainpoolP256r1],payloadSize:32},[_.curve.brainpoolP384r1]:{oid:[6,9,43,36,3,3,2,8,1,1,11],keyType:_.publicKey.ecdsa,hash:_.hash.sha384,cipher:_.symmetric.aes192,node:jr[_.curve.brainpoolP384r1],payloadSize:48},[_.curve.brainpoolP512r1]:{oid:[6,9,43,36,3,3,2,8,1,1,13],keyType:_.publicKey.ecdsa,hash:_.hash.sha512,cipher:_.symmetric.aes256,node:jr[_.curve.brainpoolP512r1],payloadSize:64}};class Gr{constructor(e){try{this.name=e instanceof Dr?e.getName():_.write(_.curve,e)}catch(e){throw new Rr("Unknown curve")}const t=qr[this.name];this.keyType=t.keyType,this.oid=t.oid,this.hash=t.hash,this.cipher=t.cipher,this.node=t.node,this.web=t.web,this.payloadSize=t.payloadSize,this.sharedSize=t.sharedSize,this.web&&R.getWebCrypto()?this.type="web":this.node&&R.getNodeCrypto()?this.type="node":this.name===_.curve.curve25519Legacy?this.type="curve25519Legacy":this.name===_.curve.ed25519Legacy&&(this.type="ed25519Legacy")}async genKeyPair(){switch(this.type){case"web":try{return await async function(e){const t=await Nr.generateKey({name:"ECDSA",namedCurve:Or[e]},!0,["sign","verify"]),r=await Nr.exportKey("jwk",t.privateKey),i=await Nr.exportKey("jwk",t.publicKey);return{publicKey:$r(i),privateKey:H(r.d)}}(this.name)}catch(e){return R.printDebugError("Browser did not support generating ec key "+e.message),Wr(this.name)}case"node":return async function(e){const t=zr.createECDH(jr[e]);return await t.generateKeys(),{publicKey:new Uint8Array(t.getPublicKey()),privateKey:new Uint8Array(t.getPrivateKey())}}(this.name);case"curve25519Legacy":{const e=bt(32);e[0]=127&e[0]|64,e[31]&=248;const t=e.slice().reverse(),{publicKey:r}=Ft.box.keyPair.fromSecretKey(t);return{publicKey:R.concatUint8Array([new Uint8Array([64]),r]),privateKey:e}}case"ed25519Legacy":{const e=bt(32),t=Ft.sign.keyPair.fromSeed(e);return{publicKey:R.concatUint8Array([new Uint8Array([64]),t.publicKey]),privateKey:e}}default:return Wr(this.name)}}}async function Vr(e,t,r,i){const a={[_.curve.nistP256]:!0,[_.curve.nistP384]:!0,[_.curve.nistP521]:!0,[_.curve.secp256k1]:!0,[_.curve.curve25519Legacy]:e===_.publicKey.ecdh,[_.curve.brainpoolP256r1]:!0,[_.curve.brainpoolP384r1]:!0,[_.curve.brainpoolP512r1]:!0},n=t.getName();if(!a[n])return!1;if(n===_.curve.curve25519Legacy){i=i.slice().reverse();const{publicKey:e}=Ft.box.keyPair.fromSecretKey(i);r=new Uint8Array(r);const t=new Uint8Array([64,...e]);return!!R.equalsUint8Array(t,r)}const s=(await R.getNobleCurve(_.publicKey.ecdsa,n)).getPublicKey(i,!1);return!!R.equalsUint8Array(s,r)}async function Wr(e){const t=await R.getNobleCurve(_.publicKey.ecdsa,e),r=t.utils.randomPrivateKey();return{publicKey:t.getPublicKey(r,!1),privateKey:r}}function $r(e){const t=H(e.x),r=H(e.y),i=new Uint8Array(t.length+r.length+1);return i[0]=4,i.set(t,1),i.set(r,t.length+1),i}function Xr(e,t,r){const i=e,a=r.slice(1,i+1),n=r.slice(i+1,2*i+1);return{kty:"EC",crv:t,x:j(a,!0),y:j(n,!0),ext:!0}}function Zr(e,t,r,i){const a=Xr(e,t,r);return a.d=j(i,!0),a}const Qr=R.getWebCrypto(),Yr=R.getNodeCrypto();async function Jr(e,t,r,i,a,n){const s=new Gr(e);if(r&&!R.isStream(r)){const e={publicKey:i,privateKey:a};switch(s.type){case"web":try{return await async function(e,t,r,i){const a=e.payloadSize,n=Zr(e.payloadSize,Or[e.name],i.publicKey,i.privateKey),s=await Qr.importKey("jwk",n,{name:"ECDSA",namedCurve:Or[e.name],hash:{name:_.read(_.webHash,e.hash)}},!1,["sign"]),o=new Uint8Array(await Qr.sign({name:"ECDSA",namedCurve:Or[e.name],hash:{name:_.read(_.webHash,t)}},s,r));return{r:o.slice(0,a),s:o.slice(a,a<<1)}}(s,t,r,e)}catch(e){if("nistP521"!==s.name&&("DataError"===e.name||"OperationError"===e.name))throw e;R.printDebugError("Browser did not support signing: "+e.message)}break;case"node":return async function(e,t,r,i){const a=R.nodeRequire("eckey-utils"),n=R.getNodeBuffer(),{privateKey:s}=a.generateDer({curveName:jr[e.name],privateKey:n.from(i)}),o=Yr.createSign(_.read(_.hash,t));o.write(r),o.end();const c=new Uint8Array(o.sign({key:s,format:"der",type:"sec1",dsaEncoding:"ieee-p1363"})),u=e.payloadSize;return{r:c.subarray(0,u),s:c.subarray(u,u<<1)}}(s,t,r,a)}}const o=(await R.getNobleCurve(_.publicKey.ecdsa,s.name)).sign(n,a,{lowS:!1});return{r:o.r.toUint8Array("be",s.payloadSize),s:o.s.toUint8Array("be",s.payloadSize)}}async function ei(e,t,r,i,a,n){const s=new Gr(e),o=async()=>0===n[0]&&ti(s,r,n.subarray(1),a);if(i&&!R.isStream(i))switch(s.type){case"web":try{const e=await async function(e,t,{r,s:i},a,n){const s=Xr(e.payloadSize,Or[e.name],n),o=await Qr.importKey("jwk",s,{name:"ECDSA",namedCurve:Or[e.name],hash:{name:_.read(_.webHash,e.hash)}},!1,["verify"]),c=R.concatUint8Array([r,i]).buffer;return Qr.verify({name:"ECDSA",namedCurve:Or[e.name],hash:{name:_.read(_.webHash,t)}},o,c,a)}(s,t,r,i,a);return e||o()}catch(e){if("nistP521"!==s.name&&("DataError"===e.name||"OperationError"===e.name))throw e;R.printDebugError("Browser did not support verifying: "+e.message)}break;case"node":{const e=await async function(e,t,{r,s:i},a,n){const s=R.nodeRequire("eckey-utils"),o=R.getNodeBuffer(),{publicKey:c}=s.generateDer({curveName:jr[e.name],publicKey:o.from(n)}),u=Yr.createVerify(_.read(_.hash,t));u.write(a),u.end();const h=R.concatUint8Array([r,i]);try{return u.verify({key:c,format:"der",type:"spki",dsaEncoding:"ieee-p1363"},h)}catch(e){return!1}}(s,t,r,i,a);return e||o()}}return await ti(s,r,n,a)||o()}async function ti(e,t,r,i){return(await R.getNobleCurve(_.publicKey.ecdsa,e.name)).verify(R.concatUint8Array([t.r,t.s]),r,i,{lowS:!1})}var ri=/*#__PURE__*/Object.freeze({__proto__:null,sign:Jr,validateParams:async function(e,t,r){const i=new Gr(e);if(i.keyType!==_.publicKey.ecdsa)return!1;switch(i.type){case"web":case"node":{const i=bt(8),a=_.hash.sha256,n=await fe.digest(a,i);try{const s=await Jr(e,a,i,t,r,n);return await ei(e,a,s,i,t,n)}catch(e){return!1}}default:return Vr(_.publicKey.ecdsa,e,t,r)}},verify:ei});var ii=/*#__PURE__*/Object.freeze({__proto__:null,sign:async function(e,t,r,i,a,n){if(fe.getHashByteLength(t)<fe.getHashByteLength(_.hash.sha256))throw Error("Hash algorithm too weak for EdDSA.");const s=R.concatUint8Array([a,i.subarray(1)]),o=Ft.sign.detached(n,s);if(B.checkEdDSAFaultySignatures&&!Ft.sign.detached.verify(n,o,i.subarray(1)))throw Error("Transient signing failure");return{r:o.subarray(0,32),s:o.subarray(32)}},validateParams:async function(e,t,r){if(e.getName()!==_.curve.ed25519Legacy)return!1;const{publicKey:i}=Ft.sign.keyPair.fromSeed(r),a=new Uint8Array([64,...i]);return R.equalsUint8Array(t,a)},verify:async function(e,t,{r,s:i},a,n,s){if(fe.getHashByteLength(t)<fe.getHashByteLength(_.hash.sha256))throw Error("Hash algorithm too weak for EdDSA.");const o=R.concatUint8Array([r,i]);return Ft.sign.detached.verify(s,o,n.subarray(1))}});function ai(e){switch(e){case _.publicKey.ed25519:return 32;case _.publicKey.ed448:return 57;default:throw Error("Unsupported EdDSA algorithm")}}function ni(e){switch(e){case _.publicKey.ed25519:return _.hash.sha256;case _.publicKey.ed448:return _.hash.sha512;default:throw Error("Unknown EdDSA algo")}}var si=/*#__PURE__*/Object.freeze({__proto__:null,generate:async function(e){switch(e){case _.publicKey.ed25519:{const t=bt(ai(e)),{publicKey:r}=Ft.sign.keyPair.fromSeed(t);return{A:r,seed:t}}case _.publicKey.ed448:{const e=await R.getNobleCurve(_.publicKey.ed448),t=e.utils.randomPrivateKey();return{A:e.getPublicKey(t),seed:t}}default:throw Error("Unsupported EdDSA algorithm")}},getPayloadSize:ai,getPreferredHashAlgo:ni,sign:async function(e,t,r,i,a,n){if(fe.getHashByteLength(t)<fe.getHashByteLength(ni(e)))throw Error("Hash algorithm too weak for EdDSA.");switch(e){case _.publicKey.ed25519:{const e=R.concatUint8Array([a,i]),t=Ft.sign.detached(n,e);if(B.checkEdDSAFaultySignatures&&!Ft.sign.detached.verify(n,t,i))throw Error("Transient signing failure");return{RS:t}}case _.publicKey.ed448:return{RS:(await R.getNobleCurve(_.publicKey.ed448)).sign(n,a)};default:throw Error("Unsupported EdDSA algorithm")}},validateParams:async function(e,t,r){switch(e){case _.publicKey.ed25519:{const{publicKey:e}=Ft.sign.keyPair.fromSeed(r);return R.equalsUint8Array(t,e)}case _.publicKey.ed448:{const e=(await R.getNobleCurve(_.publicKey.ed448)).getPublicKey(r);return R.equalsUint8Array(t,e)}default:return!1}},verify:async function(e,t,{RS:r},i,a,n){if(fe.getHashByteLength(t)<fe.getHashByteLength(ni(e)))throw Error("Hash algorithm too weak for EdDSA.");switch(e){case _.publicKey.ed25519:return Ft.sign.detached.verify(n,r,a);case _.publicKey.ed448:return(await R.getNobleCurve(_.publicKey.ed448)).verify(r,n,a);default:throw Error("Unsupported EdDSA algorithm")}}});const oi=R.getWebCrypto();async function ci(e,t,r){const{keySize:i}=J(e);if(!R.isAES(e)||t.length!==i)throw Error("Unexpected algorithm or key size");try{const e=await oi.importKey("raw",t,{name:"AES-KW"},!1,["wrapKey"]),i=await oi.importKey("raw",r,{name:"HMAC",hash:"SHA-256"},!0,["sign"]),a=await oi.wrapKey("raw",i,e,{name:"AES-KW"});return new Uint8Array(a)}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;R.printDebugError("Browser did not support operation: "+e.message)}return function(e,t,r){const i=new Re(t,new Uint8Array(16),!1),a=new Uint32Array([2795939494,2795939494]),n=hi(r);let s=a;const o=n,c=n.length/2,u=new Uint32Array([0,0]);let h=new Uint32Array(4);for(let e=0;e<=5;++e)for(let t=0;t<c;++t)u[1]=c*e+(1+t),h[0]=s[0],h[1]=s[1],h[2]=o[2*t],h[3]=o[2*t+1],h=hi(i.encrypt(yi(h))),s=h.subarray(0,2),s[0]^=u[0],s[1]^=u[1],o[2*t]=h[2],o[2*t+1]=h[3];return yi(s,o)}(0,t,r)}async function ui(e,t,r){const{keySize:i}=J(e);if(!R.isAES(e)||t.length!==i)throw Error("Unexpected algorithm or key size");let a;try{a=await oi.importKey("raw",t,{name:"AES-KW"},!1,["unwrapKey"])}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;return R.printDebugError("Browser did not support operation: "+e.message),function(e,t,r){const i=new Re(t,new Uint8Array(16),!1),a=new Uint32Array([2795939494,2795939494]),n=hi(r);let s=n.subarray(0,2);const o=n.subarray(2),c=n.length/2-1,u=new Uint32Array([0,0]);let h=new Uint32Array(4);for(let e=5;e>=0;--e)for(let t=c-1;t>=0;--t)u[1]=c*e+(t+1),h[0]=s[0]^u[0],h[1]=s[1]^u[1],h[2]=o[2*t],h[3]=o[2*t+1],h=hi(i.decrypt(yi(h))),s=h.subarray(0,2),o[2*t]=h[2],o[2*t+1]=h[3];if(s[0]===a[0]&&s[1]===a[1])return yi(o);throw Error("Key Data Integrity failed")}(0,t,r)}try{const e=await oi.unwrapKey("raw",r,a,{name:"AES-KW"},{name:"HMAC",hash:"SHA-256"},!0,["sign"]);return new Uint8Array(await oi.exportKey("raw",e))}catch(e){if("OperationError"===e.name)throw Error("Key Data Integrity failed");throw e}}function hi(e){const t=e.buffer,r=new DataView(t),i=new Uint32Array(e.length/4);for(let t=0;t<e.length/4;++t)i[t]=r.getUint32(4*t);return i}function yi(){let e=0;for(let t=0;t<arguments.length;++t)e+=4*arguments[t].length;const t=new ArrayBuffer(e),r=new DataView(t);let i=0;for(let e=0;e<arguments.length;++e){for(let t=0;t<arguments[e].length;++t)r.setUint32(i+4*t,arguments[e][t]);i+=4*arguments[e].length}return new Uint8Array(t)}var li=/*#__PURE__*/Object.freeze({__proto__:null,unwrap:ui,wrap:ci});function pi(e){const t=8-e.length%8,r=new Uint8Array(e.length+t).fill(t);return r.set(e),r}function gi(e){const t=e.length;if(t>0){const r=e[t-1];if(r>=1){const i=e.subarray(t-r),a=new Uint8Array(r).fill(r);if(R.equalsUint8Array(i,a))return e.subarray(0,t-r)}}throw Error("Invalid padding")}var di=/*#__PURE__*/Object.freeze({__proto__:null,decode:gi,encode:pi});const fi=R.getWebCrypto(),mi=R.getNodeCrypto();function wi(e,t,r,i){return R.concatUint8Array([t.write(),new Uint8Array([e]),r.write(!0),R.stringToUint8Array("Anonymous Sender "),r.replacementFingerprint||i.subarray(0,20)])}async function bi(e,t,r,i,a=!1,n=!1){let s;if(a){for(s=0;s<t.length&&0===t[s];s++);t=t.subarray(s)}if(n){for(s=t.length-1;s>=0&&0===t[s];s--);t=t.subarray(0,s+1)}return(await fe.digest(e,R.concatUint8Array([new Uint8Array([0,0,0,1]),t,i]))).subarray(0,r)}async function ki(e,t){switch(e.type){case"curve25519Legacy":{const r=bt(32),{secretKey:i,sharedKey:a}=await vi(e,t,null,r);let{publicKey:n}=Ft.box.keyPair.fromSecretKey(i);return n=R.concatUint8Array([new Uint8Array([64]),n]),{publicKey:n,sharedKey:a}}case"web":if(e.web&&R.getWebCrypto())try{return await async function(e,t){const r=Xr(e.payloadSize,e.web,t);let i=fi.generateKey({name:"ECDH",namedCurve:e.web},!0,["deriveKey","deriveBits"]),a=fi.importKey("jwk",r,{name:"ECDH",namedCurve:e.web},!1,[]);[i,a]=await Promise.all([i,a]);let n=fi.deriveBits({name:"ECDH",namedCurve:e.web,public:a},i.privateKey,e.sharedSize),s=fi.exportKey("jwk",i.publicKey);[n,s]=await Promise.all([n,s]);const o=new Uint8Array(n),c=new Uint8Array($r(s));return{publicKey:c,sharedKey:o}}(e,t)}catch(r){return R.printDebugError(r),Ki(e,t)}break;case"node":return async function(e,t){const r=mi.createECDH(e.node);r.generateKeys();const i=new Uint8Array(r.computeSecret(t)),a=new Uint8Array(r.getPublicKey());return{publicKey:a,sharedKey:i}}(e,t);default:return Ki(e,t)}}async function vi(e,t,r,i){if(i.length!==e.payloadSize){const t=new Uint8Array(e.payloadSize);t.set(i,e.payloadSize-i.length),i=t}switch(e.type){case"curve25519Legacy":{const e=i.slice().reverse();return{secretKey:e,sharedKey:Ft.scalarMult(e,t.subarray(1))}}case"web":if(e.web&&R.getWebCrypto())try{return await async function(e,t,r,i){const a=Zr(e.payloadSize,e.web,r,i);let n=fi.importKey("jwk",a,{name:"ECDH",namedCurve:e.web},!0,["deriveKey","deriveBits"]);const s=Xr(e.payloadSize,e.web,t);let o=fi.importKey("jwk",s,{name:"ECDH",namedCurve:e.web},!0,[]);[n,o]=await Promise.all([n,o]);let c=fi.deriveBits({name:"ECDH",namedCurve:e.web,public:o},n,e.sharedSize),u=fi.exportKey("jwk",n);[c,u]=await Promise.all([c,u]);const h=new Uint8Array(c);return{secretKey:H(u.d),sharedKey:h}}(e,t,r,i)}catch(r){return R.printDebugError(r),Ai(e,t,i)}break;case"node":return async function(e,t,r){const i=mi.createECDH(e.node);i.setPrivateKey(r);const a=new Uint8Array(i.computeSecret(t));return{secretKey:new Uint8Array(i.getPrivateKey()),sharedKey:a}}(e,t,i);default:return Ai(e,t,i)}}async function Ai(e,t,r){return{secretKey:r,sharedKey:(await R.getNobleCurve(_.publicKey.ecdh,e.name)).getSharedSecret(r,t).subarray(1)}}async function Ki(e,t){const r=await R.getNobleCurve(_.publicKey.ecdh,e.name),{publicKey:i,privateKey:a}=await e.genKeyPair();return{publicKey:i,sharedKey:r.getSharedSecret(a,t).subarray(1)}}var Ei=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i,a,n,s){const o=new Gr(e),{sharedKey:c}=await vi(o,r,a,n),u=wi(_.publicKey.ecdh,e,t,s),{keySize:h}=J(t.cipher);let y;for(let e=0;e<3;e++)try{const r=await bi(t.hash,c,h,u,1===e,2===e);return gi(await ui(t.cipher,r,i))}catch(e){y=e}throw y},encrypt:async function(e,t,r,i,a){const n=pi(r),s=new Gr(e),{publicKey:o,sharedKey:c}=await ki(s,i),u=wi(_.publicKey.ecdh,e,t,a),{keySize:h}=J(t.cipher),y=await bi(t.hash,c,h,u);return{publicKey:o,wrappedKey:await ci(t.cipher,y,n)}},validateParams:async function(e,t,r){return Vr(_.publicKey.ecdh,e,t,r)}});const Si=R.getWebCrypto();async function Pi(e,t,r,i,a){const n=_.read(_.webHash,e);if(!n)throw Error("Hash algo not supported with HKDF");const s=await Si.importKey("raw",t,"HKDF",!1,["deriveBits"]),o=await Si.deriveBits({name:"HKDF",hash:n,salt:r,info:i},s,8*a);return new Uint8Array(o)}const Ui={x25519:R.encodeUTF8("OpenPGP X25519"),x448:R.encodeUTF8("OpenPGP X448")};var Di=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:async function(e,t,r,i,a){switch(e){case _.publicKey.x25519:{const e=Ft.scalarMult(a,t),n=R.concatUint8Array([t,i,e]),s=_.symmetric.aes128,{keySize:o}=J(s);return ui(s,await Pi(_.hash.sha256,n,new Uint8Array,Ui.x25519,o),r)}case _.publicKey.x448:{const e=(await R.getNobleCurve(_.publicKey.x448)).getSharedSecret(a,t),n=R.concatUint8Array([t,i,e]),s=_.symmetric.aes256,{keySize:o}=J(_.symmetric.aes256);return ui(s,await Pi(_.hash.sha512,n,new Uint8Array,Ui.x448,o),r)}default:throw Error("Unsupported ECDH algorithm")}},encrypt:async function(e,t,r){switch(e){case _.publicKey.x25519:{const e=bt(32),i=Ft.scalarMult(e,r),{publicKey:a}=Ft.box.keyPair.fromSecretKey(e),n=R.concatUint8Array([a,r,i]),s=_.symmetric.aes128,{keySize:o}=J(s),c=await Pi(_.hash.sha256,n,new Uint8Array,Ui.x25519,o);return{ephemeralPublicKey:a,wrappedKey:await ci(s,c,t)}}case _.publicKey.x448:{const e=await R.getNobleCurve(_.publicKey.x448),i=e.utils.randomPrivateKey(),a=e.getSharedSecret(i,r),n=e.getPublicKey(i),s=R.concatUint8Array([n,r,a]),o=_.symmetric.aes256,{keySize:c}=J(_.symmetric.aes256),u=await Pi(_.hash.sha512,s,new Uint8Array,Ui.x448,c);return{ephemeralPublicKey:n,wrappedKey:await ci(o,u,t)}}default:throw Error("Unsupported ECDH algorithm")}},generate:async function(e){switch(e){case _.publicKey.x25519:{const e=bt(32),{publicKey:t}=Ft.box.keyPair.fromSecretKey(e);return{A:t,k:e}}case _.publicKey.x448:{const e=await R.getNobleCurve(_.publicKey.x448),t=e.utils.randomPrivateKey();return{A:e.getPublicKey(t),k:t}}default:throw Error("Unsupported ECDH algorithm")}},getPayloadSize:function(e){switch(e){case _.publicKey.x25519:return 32;case _.publicKey.x448:return 56;default:throw Error("Unsupported ECDH algorithm")}},validateParams:async function(e,t,r){switch(e){case _.publicKey.x25519:{const{publicKey:e}=Ft.box.keyPair.fromSecretKey(r);return R.equalsUint8Array(t,e)}case _.publicKey.x448:{const e=(await R.getNobleCurve(_.publicKey.x448)).getPublicKey(r);return R.equalsUint8Array(t,e)}default:return!1}}}),Ci=/*#__PURE__*/Object.freeze({__proto__:null,CurveWithOID:Gr,ecdh:Ei,ecdhX:Di,ecdsa:ri,eddsa:si,eddsaLegacy:ii,generate:async function(e){const t=new Gr(e),{oid:r,hash:i,cipher:a}=t,n=await t.genKeyPair();return{oid:r,Q:n.publicKey,secret:R.leftPad(n.privateKey,t.payloadSize),hash:i,cipher:a}},getPreferredHashAlgo:function(e){return qr[e.getName()].hash}});var xi=/*#__PURE__*/Object.freeze({__proto__:null,sign:async function(e,t,r,i,a,n){const s=await R.getBigInteger(),o=new s(1);let c,u,h,y;i=new s(i),a=new s(a),r=new s(r),n=new s(n),r=r.mod(i),n=n.mod(a);const l=new s(t.subarray(0,a.byteLength())).mod(a);for(;;){if(c=await kt(o,a),u=r.modExp(c,i).imod(a),u.isZero())continue;const e=n.mul(u).imod(a);if(y=l.add(e).imod(a),h=c.modInv(a).imul(y).imod(a),!h.isZero())break}return{r:u.toUint8Array("be",a.byteLength()),s:h.toUint8Array("be",a.byteLength())}},validateParams:async function(e,t,r,i,a){const n=await R.getBigInteger();e=new n(e),t=new n(t),r=new n(r),i=new n(i);const s=new n(1);if(r.lte(s)||r.gte(e))return!1;if(!e.dec().mod(t).isZero())return!1;if(!r.modExp(t,e).isOne())return!1;const o=new n(t.bitLength()),c=new n(150);if(o.lt(c)||!await Kt(t,null,32))return!1;a=new n(a);const u=new n(2),h=await kt(u.leftShift(o.dec()),u.leftShift(o)),y=t.mul(h).add(a);return!!i.equal(r.modExp(y,e))},verify:async function(e,t,r,i,a,n,s,o){const c=await R.getBigInteger(),u=new c(0);if(t=new c(t),r=new c(r),n=new c(n),s=new c(s),a=new c(a),o=new c(o),t.lte(u)||t.gte(s)||r.lte(u)||r.gte(s))return R.printDebug("invalid DSA Signature"),!1;const h=new c(i.subarray(0,s.byteLength())).imod(s),y=r.modInv(s);if(y.isZero())return R.printDebug("invalid DSA Signature"),!1;a=a.mod(n),o=o.mod(n);const l=h.mul(y).imod(s),p=t.mul(y).imod(s),g=a.modExp(l,n),d=o.modExp(p,n);return g.mul(d).imod(n).imod(s).equal(t)}});const Ti=new Set([_.hash.sha1,_.hash.sha256,_.hash.sha512]),Ii=R.getWebCrypto(),_i=R.getNodeCrypto();var Bi={rsa:Mt,elgamal:Rt,elliptic:Ci,dsa:xi,hmac:/*#__PURE__*/Object.freeze({__proto__:null,generate:async function(e){if(!Ti.has(e))throw Error("Unsupported hash algorithm.");const t=_.read(_.webHash,e),r=Ii||_i.webcrypto.subtle,i=await r.generateKey({name:"HMAC",hash:{name:t}},!0,["sign","verify"]),a=await r.exportKey("raw",i);return new Uint8Array(a)},sign:async function(e,t,r){if(!Ti.has(e))throw Error("Unsupported hash algorithm.");const i=_.read(_.webHash,e),a=Ii||_i.webcrypto.subtle,n=await a.importKey("raw",t,{name:"HMAC",hash:{name:i}},!1,["sign"]),s=await a.sign("HMAC",n,r);return new Uint8Array(s)},verify:async function(e,t,r,i){if(!Ti.has(e))throw Error("Unsupported hash algorithm.");const a=_.read(_.webHash,e),n=Ii||_i.webcrypto.subtle,s=await n.importKey("raw",t,{name:"HMAC",hash:{name:a}},!1,["verify"]);return n.verify("HMAC",s,r,i)}})};class Mi{constructor(e){if(void 0===e&&(e=new Uint8Array([])),!R.isUint8Array(e))throw Error("data must be in the form of a Uint8Array");this.data=e,this.length=this.data.byteLength}write(){return R.concatUint8Array([new Uint8Array([this.length]),this.data])}read(e){if(e.length>=1){const t=e[0];if(e.length>=t+1)return this.data=e.subarray(1,1+t),this.length=t,1+t}throw Error("Invalid octet string")}}var Ri=/*#__PURE__*/Object.freeze({__proto__:null,parseSignatureParams:function(e,t){let r=0;switch(e){case _.publicKey.rsaEncryptSign:case _.publicKey.rsaEncrypt:case _.publicKey.rsaSign:{const e=R.readMPI(t.subarray(r));return r+=e.length+2,{read:r,signatureParams:{s:e}}}case _.publicKey.dsa:case _.publicKey.ecdsa:{const e=R.readMPI(t.subarray(r));r+=e.length+2;const i=R.readMPI(t.subarray(r));return r+=i.length+2,{read:r,signatureParams:{r:e,s:i}}}case _.publicKey.eddsaLegacy:{let e=R.readMPI(t.subarray(r));r+=e.length+2,e=R.leftPad(e,32);let i=R.readMPI(t.subarray(r));return r+=i.length+2,i=R.leftPad(i,32),{read:r,signatureParams:{r:e,s:i}}}case _.publicKey.ed25519:case _.publicKey.ed448:{const i=2*Bi.elliptic.eddsa.getPayloadSize(e),a=R.readExactSubarray(t,r,r+i);return r+=a.length,{read:r,signatureParams:{RS:a}}}case _.publicKey.hmac:{const e=new Mi;return r+=e.read(t.subarray(r)),{read:r,signatureParams:{mac:e}}}default:throw new Rr("Unknown signature algorithm.")}},sign:async function(e,t,r,i,a,n){if(!r||!i)throw Error("Missing key parameters");switch(e){case _.publicKey.rsaEncryptSign:case _.publicKey.rsaEncrypt:case _.publicKey.rsaSign:{const{n:e,e:s}=r,{d:o,p:c,q:u,u:h}=i;return{s:await Bi.rsa.sign(t,a,e,s,o,c,u,h,n)}}case _.publicKey.dsa:{const{g:e,p:a,q:s}=r,{x:o}=i;return Bi.dsa.sign(t,n,e,a,s,o)}case _.publicKey.elgamal:throw Error("Signing with Elgamal is not defined in the OpenPGP standard.");case _.publicKey.ecdsa:{const{oid:e,Q:s}=r,{d:o}=i;return Bi.elliptic.ecdsa.sign(e,t,a,s,o,n)}case _.publicKey.eddsaLegacy:{const{oid:e,Q:s}=r,{seed:o}=i;return Bi.elliptic.eddsaLegacy.sign(e,t,a,s,o,n)}case _.publicKey.ed25519:case _.publicKey.ed448:{const{A:s}=r,{seed:o}=i;return Bi.elliptic.eddsa.sign(e,t,a,s,o,n)}case _.publicKey.hmac:{const{cipher:e}=r,{keyMaterial:t}=i,a=await Bi.hmac.sign(e.getValue(),t,n);return{mac:new Mi(a)}}default:throw Error("Unknown signature algorithm.")}},verify:async function(e,t,r,i,a,n,s){switch(e){case _.publicKey.rsaEncryptSign:case _.publicKey.rsaEncrypt:case _.publicKey.rsaSign:{const{n:e,e:a}=i,o=R.leftPad(r.s,e.length);return Bi.rsa.verify(t,n,o,e,a,s)}case _.publicKey.dsa:{const{g:e,p:a,q:n,y:o}=i,{r:c,s:u}=r;return Bi.dsa.verify(t,c,u,s,e,a,n,o)}case _.publicKey.ecdsa:{const{oid:e,Q:a}=i,o=new Bi.elliptic.CurveWithOID(e).payloadSize,c=R.leftPad(r.r,o),u=R.leftPad(r.s,o);return Bi.elliptic.ecdsa.verify(e,t,{r:c,s:u},n,a,s)}case _.publicKey.eddsaLegacy:{const{oid:e,Q:a}=i;return Bi.elliptic.eddsaLegacy.verify(e,t,r,n,a,s)}case _.publicKey.ed25519:case _.publicKey.ed448:{const{A:a}=i;return Bi.elliptic.eddsa.verify(e,t,r,n,a,s)}case _.publicKey.hmac:{if(!a)throw Error("Cannot verify HMAC signature with symmetric key missing private parameters");const{cipher:e}=i,{keyMaterial:t}=a;return Bi.hmac.verify(e.getValue(),t,r.mac.data,s)}default:throw Error("Unknown signature algorithm.")}}});class Li{constructor(e){e&&(this.data=e)}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.data=e.subarray(1,1+t),1+this.data.length}throw Error("Invalid symmetric key")}write(){return R.concatUint8Array([new Uint8Array([this.data.length]),this.data])}}class Fi{constructor(e){if(e){const{version:t,hash:r,cipher:i,replacementFingerprint:a}=e;this.version=t||1,this.hash=r,this.cipher=i,this.replacementFingerprint=a}else this.version=null,this.hash=null,this.cipher=null,this.replacementFingerprint=null}read(e){if(e.length<4||1!==e[1]&&255!==e[1])throw new Rr("Cannot read KDFParams");const t=e[0];this.version=e[1],this.hash=e[2],this.cipher=e[3];let r=4;if(255===this.version){const i=t-r+1;this.replacementFingerprint=e.slice(r,r+i),r+=i}return r}write(e){if(!this.version||1===this.version||e)return new Uint8Array([3,1,this.hash,this.cipher]);return R.concatUint8Array([new Uint8Array([3+this.replacementFingerprint.length,this.version,this.hash,this.cipher]),this.replacementFingerprint])}}const Ni=e=>class{constructor(e){this.data=void 0===e?null:e}read(t){const r=t[0];return this.data=_.write(e,r),1}write(){return new Uint8Array([this.data])}getName(){return _.read(e,this.data)}getValue(){return this.data}},zi=Ni(_.aead),Oi=Ni(_.symmetric),Hi=Ni(_.hash);class ji{static fromObject({wrappedKey:e,algorithm:t}){const r=new ji;return r.wrappedKey=e,r.algorithm=t,r}read(e){let t=0,r=e[t++];this.algorithm=r%2?e[t++]:null,r-=r%2,this.wrappedKey=R.readExactSubarray(e,t,t+r),t+=r}write(){return R.concatUint8Array([this.algorithm?new Uint8Array([this.wrappedKey.length+1,this.algorithm]):new Uint8Array([this.wrappedKey.length]),this.wrappedKey])}}async function qi(e,t){const r=bt(32);return{privateParams:{hashSeed:r,keyMaterial:e},publicParams:{cipher:t,digest:await fe.sha256(r)}}}function Gi(e){const{keySize:t}=J(e);return bt(t)}function Vi(e){const t=_.read(_.aead,e);return mt[t]}function Wi(e){try{e.getName()}catch(e){throw new Rr("Unknown curve OID")}}function $i(e,t){switch(e){case _.publicKey.ecdsa:case _.publicKey.ecdh:case _.publicKey.eddsaLegacy:return new Bi.elliptic.CurveWithOID(t).payloadSize;case _.publicKey.ed25519:case _.publicKey.ed448:return Bi.elliptic.eddsa.getPayloadSize(e);case _.publicKey.x25519:case _.publicKey.x448:return Bi.elliptic.ecdhX.getPayloadSize(e);default:throw Error("Unknown elliptic algo")}}var Xi=/*#__PURE__*/Object.freeze({__proto__:null,generateParams:async function(e,t,r,i){switch(e){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:case _.publicKey.rsaSign:return Bi.rsa.generate(t,65537).then((({n:e,e:t,d:r,p:i,q:a,u:n})=>({privateParams:{d:r,p:i,q:a,u:n},publicParams:{n:e,e:t}})));case _.publicKey.ecdsa:return Bi.elliptic.generate(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{d:r},publicParams:{oid:new Dr(e),Q:t}})));case _.publicKey.eddsaLegacy:return Bi.elliptic.generate(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{seed:r},publicParams:{oid:new Dr(e),Q:t}})));case _.publicKey.ecdh:return Bi.elliptic.generate(r).then((({oid:e,Q:t,secret:r,hash:i,cipher:a})=>({privateParams:{d:r},publicParams:{oid:new Dr(e),Q:t,kdfParams:new Fi({hash:i,cipher:a})}})));case _.publicKey.ed25519:case _.publicKey.ed448:return Bi.elliptic.eddsa.generate(e).then((({A:e,seed:t})=>({privateParams:{seed:t},publicParams:{A:e}})));case _.publicKey.x25519:case _.publicKey.x448:return Bi.elliptic.ecdhX.generate(e).then((({A:e,k:t})=>({privateParams:{k:t},publicParams:{A:e}})));case _.publicKey.hmac:return qi(await Bi.hmac.generate(i),new Hi(i));case _.publicKey.aead:return qi(Gi(i),new Oi(i));case _.publicKey.dsa:case _.publicKey.elgamal:throw Error("Unsupported algorithm for key generation.");default:throw Error("Unknown public key algorithm.")}},generateSessionKey:Gi,getAEADMode:Vi,getCipherParams:J,getCurvePayloadSize:$i,getPreferredCurveHashAlgo:function(e,t){switch(e){case _.publicKey.ecdsa:case _.publicKey.eddsaLegacy:return Bi.elliptic.getPreferredHashAlgo(t);case _.publicKey.ed25519:case _.publicKey.ed448:return Bi.elliptic.eddsa.getPreferredHashAlgo(e);default:throw Error("Unknown elliptic signing algo")}},getPrefixRandom:async function(e){const{blockSize:t}=J(e),r=await bt(t),i=new Uint8Array([r[r.length-2],r[r.length-1]]);return R.concat([r,i])},parseEncSessionKeyParams:function(e,t){let r=0;switch(e){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:return{c:R.readMPI(t.subarray(r))};case _.publicKey.elgamal:{const e=R.readMPI(t.subarray(r));r+=e.length+2;return{c1:e,c2:R.readMPI(t.subarray(r))}}case _.publicKey.ecdh:{const e=R.readMPI(t.subarray(r));r+=e.length+2;const i=new Li;return i.read(t.subarray(r)),{V:e,C:i}}case _.publicKey.x25519:case _.publicKey.x448:{const i=$i(e),a=R.readExactSubarray(t,r,r+i);r+=a.length;const n=new ji;return n.read(t.subarray(r)),{ephemeralPublicKey:a,C:n}}case _.publicKey.aead:{const e=new zi;r+=e.read(t.subarray(r));const{ivLength:i}=Vi(e.getValue()),a=t.subarray(r,r+i);r+=i;const n=new Mi;return r+=n.read(t.subarray(r)),{aeadMode:e,iv:a,c:n}}default:throw new Rr("Unknown public key encryption algorithm.")}},parsePrivateKeyParams:function(e,t,r){let i=0;switch(e){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:case _.publicKey.rsaSign:{const e=R.readMPI(t.subarray(i));i+=e.length+2;const r=R.readMPI(t.subarray(i));i+=r.length+2;const a=R.readMPI(t.subarray(i));i+=a.length+2;const n=R.readMPI(t.subarray(i));return i+=n.length+2,{read:i,privateParams:{d:e,p:r,q:a,u:n}}}case _.publicKey.dsa:case _.publicKey.elgamal:{const e=R.readMPI(t.subarray(i));return i+=e.length+2,{read:i,privateParams:{x:e}}}case _.publicKey.ecdsa:case _.publicKey.ecdh:{const a=$i(e,r.oid);let n=R.readMPI(t.subarray(i));return i+=n.length+2,n=R.leftPad(n,a),{read:i,privateParams:{d:n}}}case _.publicKey.eddsaLegacy:{const a=$i(e,r.oid);let n=R.readMPI(t.subarray(i));return i+=n.length+2,n=R.leftPad(n,a),{read:i,privateParams:{seed:n}}}case _.publicKey.ed25519:case _.publicKey.ed448:{const r=$i(e),a=R.readExactSubarray(t,i,i+r);return i+=a.length,{read:i,privateParams:{seed:a}}}case _.publicKey.x25519:case _.publicKey.x448:{const r=$i(e),a=R.readExactSubarray(t,i,i+r);return i+=a.length,{read:i,privateParams:{k:a}}}case _.publicKey.hmac:{const{cipher:e}=r,a=fe.getHashByteLength(e.getValue()),n=t.subarray(i,i+32);i+=32;const s=t.subarray(i,i+a);return i+=a,{read:i,privateParams:{hashSeed:n,keyMaterial:s}}}case _.publicKey.aead:{const{cipher:e}=r,a=t.subarray(i,i+32);i+=32;const{keySize:n}=J(e.getValue()),s=t.subarray(i,i+n);return i+=n,{read:i,privateParams:{hashSeed:a,keyMaterial:s}}}default:throw new Rr("Unknown public key encryption algorithm.")}},parsePublicKeyParams:function(e,t){let r=0;switch(e){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:case _.publicKey.rsaSign:{const e=R.readMPI(t.subarray(r));r+=e.length+2;const i=R.readMPI(t.subarray(r));return r+=i.length+2,{read:r,publicParams:{n:e,e:i}}}case _.publicKey.dsa:{const e=R.readMPI(t.subarray(r));r+=e.length+2;const i=R.readMPI(t.subarray(r));r+=i.length+2;const a=R.readMPI(t.subarray(r));r+=a.length+2;const n=R.readMPI(t.subarray(r));return r+=n.length+2,{read:r,publicParams:{p:e,q:i,g:a,y:n}}}case _.publicKey.elgamal:{const e=R.readMPI(t.subarray(r));r+=e.length+2;const i=R.readMPI(t.subarray(r));r+=i.length+2;const a=R.readMPI(t.subarray(r));return r+=a.length+2,{read:r,publicParams:{p:e,g:i,y:a}}}case _.publicKey.ecdsa:{const e=new Dr;r+=e.read(t),Wi(e);const i=R.readMPI(t.subarray(r));return r+=i.length+2,{read:r,publicParams:{oid:e,Q:i}}}case _.publicKey.eddsaLegacy:{const e=new Dr;r+=e.read(t),Wi(e);let i=R.readMPI(t.subarray(r));return r+=i.length+2,i=R.leftPad(i,33),{read:r,publicParams:{oid:e,Q:i}}}case _.publicKey.ecdh:{const e=new Dr;r+=e.read(t),Wi(e);const i=R.readMPI(t.subarray(r));r+=i.length+2;const a=new Fi;return r+=a.read(t.subarray(r)),{read:r,publicParams:{oid:e,Q:i,kdfParams:a}}}case _.publicKey.ed25519:case _.publicKey.ed448:case _.publicKey.x25519:case _.publicKey.x448:{const i=R.readExactSubarray(t,r,r+$i(e));return r+=i.length,{read:r,publicParams:{A:i}}}case _.publicKey.hmac:case _.publicKey.aead:{const e=new Oi;r+=e.read(t);const i=fe.getHashByteLength(_.hash.sha256),a=t.subarray(r,r+i);return r+=i,{read:r,publicParams:{cipher:e,digest:a}}}default:throw new Rr("Unknown public key encryption algorithm.")}},publicKeyDecrypt:async function(e,t,r,i,a,n){switch(e){case _.publicKey.rsaEncryptSign:case _.publicKey.rsaEncrypt:{const{c:e}=i,{n:a,e:s}=t,{d:o,p:c,q:u,u:h}=r;return Bi.rsa.decrypt(e,a,s,o,c,u,h,n)}case _.publicKey.elgamal:{const{c1:e,c2:a}=i,s=t.p,o=r.x;return Bi.elgamal.decrypt(e,a,s,o,n)}case _.publicKey.ecdh:{const{oid:e,Q:n,kdfParams:s}=t,{d:o}=r,{V:c,C:u}=i;return Bi.elliptic.ecdh.decrypt(e,s,c,u.data,n,o,a)}case _.publicKey.x25519:case _.publicKey.x448:{const{A:a}=t,{k:n}=r,{ephemeralPublicKey:s,C:o}=i;if(null!==o.algorithm&&!R.isAES(o.algorithm))throw Error("AES session key expected");return Bi.elliptic.ecdhX.decrypt(e,s,o.wrappedKey,a,n)}case _.publicKey.aead:{const{cipher:e}=t,a=e.getValue(),{keyMaterial:n}=r,{aeadMode:s,iv:o,c}=i,u=Vi(s.getValue());return(await u(a,n)).decrypt(c.data,o,new Uint8Array)}default:throw Error("Unknown public key encryption algorithm.")}},publicKeyEncrypt:async function(e,t,r,i,a,n){switch(e){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:{const{n:e,e:t}=r;return{c:await Bi.rsa.encrypt(a,e,t)}}case _.publicKey.elgamal:{const{p:e,g:t,y:i}=r;return Bi.elgamal.encrypt(a,e,t,i)}case _.publicKey.ecdh:{const{oid:e,Q:t,kdfParams:i}=r,{publicKey:s,wrappedKey:o}=await Bi.elliptic.ecdh.encrypt(e,i,a,t,n);return{V:s,C:new Li(o)}}case _.publicKey.x25519:case _.publicKey.x448:{if(!R.isAES(t))throw Error("X25519 and X448 keys can only encrypt AES session keys");const{A:i}=r,{ephemeralPublicKey:n,wrappedKey:s}=await Bi.elliptic.ecdhX.encrypt(e,a,i);return{ephemeralPublicKey:n,C:ji.fromObject({algorithm:t,wrappedKey:s})}}case _.publicKey.aead:{if(!i)throw Error("Cannot encrypt with symmetric key missing private parameters");const{cipher:e}=r,t=e.getValue(),{keyMaterial:n}=i,s=B.preferredAEADAlgorithm,o=Vi(B.preferredAEADAlgorithm),{ivLength:c}=o,u=bt(c),h=await o(t,n),y=await h.encrypt(a,u,new Uint8Array);return{aeadMode:new zi(s),iv:u,c:new Mi(y)}}default:return[]}},serializeParams:function(e,t){const r=new Set([_.publicKey.ed25519,_.publicKey.x25519,_.publicKey.ed448,_.publicKey.x448,_.publicKey.aead,_.publicKey.hmac]),i=Object.keys(t).map((i=>{const a=t[i];return R.isUint8Array(a)?r.has(e)?a:R.uint8ArrayToMPI(a):a.write()}));return R.concatUint8Array(i)},validateParams:async function(e,t,r){if(!t||!r)throw Error("Missing key parameters");switch(e){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:case _.publicKey.rsaSign:{const{n:e,e:i}=t,{d:a,p:n,q:s,u:o}=r;return Bi.rsa.validateParams(e,i,a,n,s,o)}case _.publicKey.dsa:{const{p:e,q:i,g:a,y:n}=t,{x:s}=r;return Bi.dsa.validateParams(e,i,a,n,s)}case _.publicKey.elgamal:{const{p:e,g:i,y:a}=t,{x:n}=r;return Bi.elgamal.validateParams(e,i,a,n)}case _.publicKey.ecdsa:case _.publicKey.ecdh:{const i=Bi.elliptic[_.read(_.publicKey,e)],{oid:a,Q:n}=t,{d:s}=r;return i.validateParams(a,n,s)}case _.publicKey.eddsaLegacy:{const{Q:e,oid:i}=t,{seed:a}=r;return Bi.elliptic.eddsaLegacy.validateParams(i,e,a)}case _.publicKey.ed25519:case _.publicKey.ed448:{const{A:i}=t,{seed:a}=r;return Bi.elliptic.eddsa.validateParams(e,i,a)}case _.publicKey.x25519:case _.publicKey.x448:{const{A:i}=t,{k:a}=r;return Bi.elliptic.ecdhX.validateParams(e,i,a)}case _.publicKey.hmac:{const{cipher:e,digest:i}=t,{hashSeed:a,keyMaterial:n}=r;return fe.getHashByteLength(e.getValue())===n.length&&R.equalsUint8Array(i,await fe.sha256(a))}case _.publicKey.aead:{const{cipher:e,digest:i}=t,{hashSeed:a,keyMaterial:n}=r,{keySize:s}=J(e.getValue());return s===n.length&&R.equalsUint8Array(i,await fe.sha256(a))}default:throw Error("Unknown public key algorithm.")}}});const Zi={cipher:ee,hash:fe,mode:mt,publicKey:Bi,signature:Ri,random:vt,pkcs1:Ct,pkcs5:di,aesKW:li};Object.assign(Zi,Xi);class Qi extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Qi),this.name="Argon2OutOfMemoryError"}}let Yi,Ji;class ea{constructor(e=B){const{passes:t,parallelism:r,memoryExponent:i}=e.s2kArgon2Params;this.type="argon2",this.salt=null,this.t=t,this.p=r,this.encodedM=i}generateSalt(){this.salt=Zi.random.getRandomBytes(16)}read(e){let t=0;return this.salt=e.subarray(t,t+16),t+=16,this.t=e[t++],this.p=e[t++],this.encodedM=e[t++],t}write(){const e=[new Uint8Array([_.write(_.s2k,this.type)]),this.salt,new Uint8Array([this.t,this.p,this.encodedM])];return R.concatUint8Array(e)}async produceKey(e,t){const r=2<<this.encodedM-1;try{Yi=Yi||(await import("./argon2id.min.mjs")).default,Ji=Ji||Yi();const i=await Ji,a=i({version:19,type:2,password:R.encodeUTF8(e),salt:this.salt,tagLength:t,memorySize:r,parallelism:this.p,passes:this.t});return r>1048576&&(Ji=Yi(),Ji.catch((()=>{}))),a}catch(e){throw e.message&&(e.message.includes("Unable to grow instance memory")||e.message.includes("failed to grow memory")||e.message.includes("WebAssembly.Memory.grow")||e.message.includes("Out of memory"))?new Qi("Could not allocate required memory for Argon2"):e}}}class ta{constructor(e,t=B){this.algorithm=_.hash.sha256,this.type=_.read(_.s2k,e),this.c=t.s2kIterationCountByte,this.salt=null}generateSalt(){switch(this.type){case"salted":case"iterated":this.salt=Zi.random.getRandomBytes(8)}}getCount(){return 16+(15&this.c)<<6+(this.c>>4)}read(e){let t=0;switch(this.algorithm=e[t++],this.type){case"simple":break;case"salted":this.salt=e.subarray(t,t+8),t+=8;break;case"iterated":this.salt=e.subarray(t,t+8),t+=8,this.c=e[t++];break;case"gnu":if("GNU"!==R.uint8ArrayToString(e.subarray(t,t+3)))throw new Rr("Unknown s2k type.");t+=3;if(1001!==1e3+e[t++])throw new Rr("Unknown s2k gnu protection mode.");this.type="gnu-dummy";break;default:throw new Rr("Unknown s2k type.")}return t}write(){if("gnu-dummy"===this.type)return new Uint8Array([101,0,...R.stringToUint8Array("GNU"),1]);const e=[new Uint8Array([_.write(_.s2k,this.type),this.algorithm])];switch(this.type){case"simple":break;case"salted":e.push(this.salt);break;case"iterated":e.push(this.salt),e.push(new Uint8Array([this.c]));break;case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}return R.concatUint8Array(e)}async produceKey(e,t){e=R.encodeUTF8(e);const r=[];let i=0,a=0;for(;i<t;){let t;switch(this.type){case"simple":t=R.concatUint8Array([new Uint8Array(a),e]);break;case"salted":t=R.concatUint8Array([new Uint8Array(a),this.salt,e]);break;case"iterated":{const r=R.concatUint8Array([this.salt,e]);let i=r.length;const n=Math.max(this.getCount(),i);t=new Uint8Array(a+n),t.set(r,a);for(let e=a+i;e<n;e+=i,i*=2)t.copyWithin(e,a,e);break}case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}const n=await Zi.hash.digest(this.algorithm,t);r.push(n),i+=n.length,a++}return R.concatUint8Array(r).subarray(0,t)}}const ra=new Set([_.s2k.argon2,_.s2k.iterated]);function ia(e,t=B){switch(e){case _.s2k.argon2:return new ea(t);case _.s2k.iterated:case _.s2k.gnu:case _.s2k.salted:case _.s2k.simple:return new ta(e,t);default:throw new Rr("Unsupported S2K type")}}function aa(e){const{s2kType:t}=e;if(!ra.has(t))throw Error("The provided `config.s2kType` value is not allowed");return ia(t,e)}var na=Uint8Array,sa=Uint16Array,oa=Uint32Array,ca=new na([0,0,0,0,0,0,0,0,1,1,1,1,2,2,2,2,3,3,3,3,4,4,4,4,5,5,5,5,0,0,0,0]),ua=new na([0,0,0,0,1,1,2,2,3,3,4,4,5,5,6,6,7,7,8,8,9,9,10,10,11,11,12,12,13,13,0,0]),ha=new na([16,17,18,0,8,7,9,6,10,5,11,4,12,3,13,2,14,1,15]),ya=function(e,t){for(var r=new sa(31),i=0;i<31;++i)r[i]=t+=1<<e[i-1];var a=new oa(r[30]);for(i=1;i<30;++i)for(var n=r[i];n<r[i+1];++n)a[n]=n-r[i]<<5|i;return[r,a]},la=ya(ca,2),pa=la[0],ga=la[1];pa[28]=258,ga[258]=28;for(var da=ya(ua,0),fa=da[0],ma=da[1],wa=new sa(32768),ba=0;ba<32768;++ba){var ka=(43690&ba)>>>1|(21845&ba)<<1;ka=(61680&(ka=(52428&ka)>>>2|(13107&ka)<<2))>>>4|(3855&ka)<<4,wa[ba]=((65280&ka)>>>8|(255&ka)<<8)>>>1}var va=function(e,t,r){for(var i=e.length,a=0,n=new sa(t);a<i;++a)e[a]&&++n[e[a]-1];var s,o=new sa(t);for(a=0;a<t;++a)o[a]=o[a-1]+n[a-1]<<1;if(r){s=new sa(1<<t);var c=15-t;for(a=0;a<i;++a)if(e[a])for(var u=a<<4|e[a],h=t-e[a],y=o[e[a]-1]++<<h,l=y|(1<<h)-1;y<=l;++y)s[wa[y]>>>c]=u}else for(s=new sa(i),a=0;a<i;++a)e[a]&&(s[a]=wa[o[e[a]-1]++]>>>15-e[a]);return s},Aa=new na(288);for(ba=0;ba<144;++ba)Aa[ba]=8;for(ba=144;ba<256;++ba)Aa[ba]=9;for(ba=256;ba<280;++ba)Aa[ba]=7;for(ba=280;ba<288;++ba)Aa[ba]=8;var Ka=new na(32);for(ba=0;ba<32;++ba)Ka[ba]=5;var Ea=/*#__PURE__*/va(Aa,9,0),Sa=/*#__PURE__*/va(Aa,9,1),Pa=/*#__PURE__*/va(Ka,5,0),Ua=/*#__PURE__*/va(Ka,5,1),Da=function(e){for(var t=e[0],r=1;r<e.length;++r)e[r]>t&&(t=e[r]);return t},Ca=function(e,t,r){var i=t/8|0;return(e[i]|e[i+1]<<8)>>(7&t)&r},xa=function(e,t){var r=t/8|0;return(e[r]|e[r+1]<<8|e[r+2]<<16)>>(7&t)},Ta=function(e){return(e+7)/8|0},Ia=function(e,t,r){(null==t||t<0)&&(t=0),(null==r||r>e.length)&&(r=e.length);var i=new(2==e.BYTES_PER_ELEMENT?sa:4==e.BYTES_PER_ELEMENT?oa:na)(r-t);return i.set(e.subarray(t,r)),i},_a=["unexpected EOF","invalid block type","invalid length/literal","invalid distance","stream finished","no stream handler",,"no callback","invalid UTF-8 data","extra field too long","date not in range 1980-2099","filename too long","stream finishing","invalid zip data"],Ba=function(e,t,r){var i=Error(t||_a[e]);if(i.code=e,Error.captureStackTrace&&Error.captureStackTrace(i,Ba),!r)throw i;return i},Ma=function(e,t,r){r<<=7&t;var i=t/8|0;e[i]|=r,e[i+1]|=r>>>8},Ra=function(e,t,r){r<<=7&t;var i=t/8|0;e[i]|=r,e[i+1]|=r>>>8,e[i+2]|=r>>>16},La=function(e,t){for(var r=[],i=0;i<e.length;++i)e[i]&&r.push({s:i,f:e[i]});var a=r.length,n=r.slice();if(!a)return[qa,0];if(1==a){var s=new na(r[0].s+1);return s[r[0].s]=1,[s,1]}r.sort((function(e,t){return e.f-t.f})),r.push({s:-1,f:25001});var o=r[0],c=r[1],u=0,h=1,y=2;for(r[0]={s:-1,f:o.f+c.f,l:o,r:c};h!=a-1;)o=r[r[u].f<r[y].f?u++:y++],c=r[u!=h&&r[u].f<r[y].f?u++:y++],r[h++]={s:-1,f:o.f+c.f,l:o,r:c};var l=n[0].s;for(i=1;i<a;++i)n[i].s>l&&(l=n[i].s);var p=new sa(l+1),g=Fa(r[h-1],p,0);if(g>t){i=0;var d=0,f=g-t,m=1<<f;for(n.sort((function(e,t){return p[t.s]-p[e.s]||e.f-t.f}));i<a;++i){var w=n[i].s;if(!(p[w]>t))break;d+=m-(1<<g-p[w]),p[w]=t}for(d>>>=f;d>0;){var b=n[i].s;p[b]<t?d-=1<<t-p[b]++-1:++i}for(;i>=0&&d;--i){var k=n[i].s;p[k]==t&&(--p[k],++d)}g=t}return[new na(p),g]},Fa=function(e,t,r){return-1==e.s?Math.max(Fa(e.l,t,r+1),Fa(e.r,t,r+1)):t[e.s]=r},Na=function(e){for(var t=e.length;t&&!e[--t];);for(var r=new sa(++t),i=0,a=e[0],n=1,s=function(e){r[i++]=e},o=1;o<=t;++o)if(e[o]==a&&o!=t)++n;else{if(!a&&n>2){for(;n>138;n-=138)s(32754);n>2&&(s(n>10?n-11<<5|28690:n-3<<5|12305),n=0)}else if(n>3){for(s(a),--n;n>6;n-=6)s(8304);n>2&&(s(n-3<<5|8208),n=0)}for(;n--;)s(a);n=1,a=e[o]}return[r.subarray(0,i),t]},za=function(e,t){for(var r=0,i=0;i<t.length;++i)r+=e[i]*t[i];return r},Oa=function(e,t,r){var i=r.length,a=Ta(t+2);e[a]=255&i,e[a+1]=i>>>8,e[a+2]=255^e[a],e[a+3]=255^e[a+1];for(var n=0;n<i;++n)e[a+n+4]=r[n];return 8*(a+4+i)},Ha=function(e,t,r,i,a,n,s,o,c,u,h){Ma(t,h++,r),++a[256];for(var y=La(a,15),l=y[0],p=y[1],g=La(n,15),d=g[0],f=g[1],m=Na(l),w=m[0],b=m[1],k=Na(d),v=k[0],A=k[1],K=new sa(19),E=0;E<w.length;++E)K[31&w[E]]++;for(E=0;E<v.length;++E)K[31&v[E]]++;for(var S=La(K,7),P=S[0],U=S[1],D=19;D>4&&!P[ha[D-1]];--D);var C,x,T,I,_=u+5<<3,B=za(a,Aa)+za(n,Ka)+s,M=za(a,l)+za(n,d)+s+14+3*D+za(K,P)+(2*K[16]+3*K[17]+7*K[18]);if(_<=B&&_<=M)return Oa(t,h,e.subarray(c,c+u));if(Ma(t,h,1+(M<B)),h+=2,M<B){C=va(l,p,0),x=l,T=va(d,f,0),I=d;var R=va(P,U,0);Ma(t,h,b-257),Ma(t,h+5,A-1),Ma(t,h+10,D-4),h+=14;for(E=0;E<D;++E)Ma(t,h+3*E,P[ha[E]]);h+=3*D;for(var L=[w,v],F=0;F<2;++F){var N=L[F];for(E=0;E<N.length;++E){var z=31&N[E];Ma(t,h,R[z]),h+=P[z],z>15&&(Ma(t,h,N[E]>>>5&127),h+=N[E]>>>12)}}}else C=Ea,x=Aa,T=Pa,I=Ka;for(E=0;E<o;++E)if(i[E]>255){z=i[E]>>>18&31;Ra(t,h,C[z+257]),h+=x[z+257],z>7&&(Ma(t,h,i[E]>>>23&31),h+=ca[z]);var O=31&i[E];Ra(t,h,T[O]),h+=I[O],O>3&&(Ra(t,h,i[E]>>>5&8191),h+=ua[O])}else Ra(t,h,C[i[E]]),h+=x[i[E]];return Ra(t,h,C[256]),h+x[256]},ja=/*#__PURE__*/new oa([65540,131080,131088,131104,262176,1048704,1048832,2114560,2117632]),qa=/*#__PURE__*/new na(0),Ga=function(e,t,r,i,a){return function(e,t,r,i,a,n){var s=e.length,o=new na(i+s+5*(1+Math.ceil(s/7e3))+a),c=o.subarray(i,o.length-a),u=0;if(!t||s<8)for(var h=0;h<=s;h+=65535){var y=h+65535;y>=s&&(c[u>>3]=n),u=Oa(c,u+1,e.subarray(h,y))}else{for(var l=ja[t-1],p=l>>>13,g=8191&l,d=(1<<r)-1,f=new sa(32768),m=new sa(d+1),w=Math.ceil(r/3),b=2*w,k=function(t){return(e[t]^e[t+1]<<w^e[t+2]<<b)&d},v=new oa(25e3),A=new sa(288),K=new sa(32),E=0,S=0,P=(h=0,0),U=0,D=0;h<s;++h){var C=k(h),x=32767&h,T=m[C];if(f[x]=T,m[C]=x,U<=h){var I=s-h;if((E>7e3||P>24576)&&I>423){u=Ha(e,c,0,v,A,K,S,P,D,h-D,u),P=E=S=0,D=h;for(var _=0;_<286;++_)A[_]=0;for(_=0;_<30;++_)K[_]=0}var B=2,M=0,R=g,L=x-T&32767;if(I>2&&C==k(h-L))for(var F=Math.min(p,I)-1,N=Math.min(32767,h),z=Math.min(258,I);L<=N&&--R&&x!=T;){if(e[h+B]==e[h+B-L]){for(var O=0;O<z&&e[h+O]==e[h+O-L];++O);if(O>B){if(B=O,M=L,O>F)break;var H=Math.min(L,O-2),j=0;for(_=0;_<H;++_){var q=h-L+_+32768&32767,G=q-f[q]+32768&32767;G>j&&(j=G,T=q)}}}L+=(x=T)-(T=f[x])+32768&32767}if(M){v[P++]=268435456|ga[B]<<18|ma[M];var V=31&ga[B],W=31&ma[M];S+=ca[V]+ua[W],++A[257+V],++K[W],U=h+B,++E}else v[P++]=e[h],++A[e[h]]}}u=Ha(e,c,n,v,A,K,S,P,D,h-D,u),!n&&7&u&&(u=Oa(c,u+1,qa))}return Ia(o,0,i+Ta(u)+a)}(e,null==t.level?6:t.level,null==t.mem?Math.ceil(1.5*Math.max(8,Math.min(13,Math.log(e.length)))):12+t.mem,r,i,!a)},Va=/*#__PURE__*/function(){function e(e,t){t||"function"!=typeof e||(t=e,e={}),this.ondata=t,this.o=e||{}}return e.prototype.p=function(e,t){this.ondata(Ga(e,this.o,0,0,!t),t)},e.prototype.push=function(e,t){this.ondata||Ba(5),this.d&&Ba(4),this.d=t,this.p(e,t||!1)},e}(),Wa=/*#__PURE__*/function(){function e(e){this.s={},this.p=new na(0),this.ondata=e}return e.prototype.e=function(e){this.ondata||Ba(5),this.d&&Ba(4);var t=this.p.length,r=new na(t+e.length);r.set(this.p),r.set(e,t),this.p=r},e.prototype.c=function(e){this.d=this.s.i=e||!1;var t=this.s.b,r=function(e,t,r){var i=e.length;if(!i||r&&r.f&&!r.l)return t||new na(0);var a=!t||r,n=!r||r.i;r||(r={}),t||(t=new na(3*i));var s=function(e){var r=t.length;if(e>r){var i=new na(Math.max(2*r,e));i.set(t),t=i}},o=r.f||0,c=r.p||0,u=r.b||0,h=r.l,y=r.d,l=r.m,p=r.n,g=8*i;do{if(!h){o=Ca(e,c,1);var d=Ca(e,c+1,3);if(c+=3,!d){var f=e[(U=Ta(c)+4)-4]|e[U-3]<<8,m=U+f;if(m>i){n&&Ba(0);break}a&&s(u+f),t.set(e.subarray(U,m),u),r.b=u+=f,r.p=c=8*m,r.f=o;continue}if(1==d)h=Sa,y=Ua,l=9,p=5;else if(2==d){var w=Ca(e,c,31)+257,b=Ca(e,c+10,15)+4,k=w+Ca(e,c+5,31)+1;c+=14;for(var v=new na(k),A=new na(19),K=0;K<b;++K)A[ha[K]]=Ca(e,c+3*K,7);c+=3*b;var E=Da(A),S=(1<<E)-1,P=va(A,E,1);for(K=0;K<k;){var U,D=P[Ca(e,c,S)];if(c+=15&D,(U=D>>>4)<16)v[K++]=U;else{var C=0,x=0;for(16==U?(x=3+Ca(e,c,3),c+=2,C=v[K-1]):17==U?(x=3+Ca(e,c,7),c+=3):18==U&&(x=11+Ca(e,c,127),c+=7);x--;)v[K++]=C}}var T=v.subarray(0,w),I=v.subarray(w);l=Da(T),p=Da(I),h=va(T,l,1),y=va(I,p,1)}else Ba(1);if(c>g){n&&Ba(0);break}}a&&s(u+131072);for(var _=(1<<l)-1,B=(1<<p)-1,M=c;;M=c){var R=(C=h[xa(e,c)&_])>>>4;if((c+=15&C)>g){n&&Ba(0);break}if(C||Ba(2),R<256)t[u++]=R;else{if(256==R){M=c,h=null;break}var L=R-254;if(R>264){var F=ca[K=R-257];L=Ca(e,c,(1<<F)-1)+pa[K],c+=F}var N=y[xa(e,c)&B],z=N>>>4;if(N||Ba(3),c+=15&N,I=fa[z],z>3&&(F=ua[z],I+=xa(e,c)&(1<<F)-1,c+=F),c>g){n&&Ba(0);break}a&&s(u+131072);for(var O=u+L;u<O;u+=4)t[u]=t[u-I],t[u+1]=t[u+1-I],t[u+2]=t[u+2-I],t[u+3]=t[u+3-I];u=O}}r.l=h,r.p=M,r.b=u,r.f=o,h&&(o=1,r.m=l,r.d=y,r.n=p)}while(!o);return u==t.length?t:Ia(t,0,u)}(this.p,this.o,this.s);this.ondata(Ia(r,t,this.s.b),this.d),this.o=Ia(r,this.s.b-32768),this.s.b=this.o.length,this.p=Ia(this.p,this.s.p/8|0),this.s.p&=7},e.prototype.push=function(e,t){this.e(e),this.c(t)},e}(),$a=/*#__PURE__*/function(){function e(e,t){var r,i;this.c=(r=1,i=0,{p:function(e){for(var t=r,a=i,n=0|e.length,s=0;s!=n;){for(var o=Math.min(s+2655,n);s<o;++s)a+=t+=e[s];t=(65535&t)+15*(t>>16),a=(65535&a)+15*(a>>16)}r=t,i=a},d:function(){return(255&(r%=65521))<<24|r>>>8<<16|(255&(i%=65521))<<8|i>>>8}}),this.v=1,Va.call(this,e,t)}return e.prototype.push=function(e,t){Va.prototype.push.call(this,e,t)},e.prototype.p=function(e,t){this.c.p(e);var r=Ga(e,this.o,this.v&&2,t&&4,!t);this.v&&(function(e,t){var r=t.level,i=0==r?0:r<6?1:9==r?3:2;e[0]=120,e[1]=i<<6|(i?32-2*i:1)}(r,this.o),this.v=0),t&&function(e,t,r){for(;r;++t)e[t]=r,r>>>=8}(r,r.length-4,this.c.d()),this.ondata(r,t)},e}(),Xa=/*#__PURE__*/function(){function e(e){this.v=1,Wa.call(this,e)}return e.prototype.push=function(e,t){if(Wa.prototype.e.call(this,e),this.v){if(this.p.length<2&&!t)return;this.p=this.p.subarray(2),this.v=0}t&&(this.p.length<4&&Ba(6,"invalid zlib data"),this.p=this.p.subarray(0,-4)),Wa.prototype.c.call(this,t)},e}(),Za="undefined"!=typeof TextDecoder&&/*#__PURE__*/new TextDecoder;try{Za.decode(qa,{stream:!0}),1}catch(e){}var Qa=[0,1,3,7,15,31,63,127,255],Ya=function(e){this.stream=e,this.bitOffset=0,this.curByte=0,this.hasByte=!1};Ya.prototype._ensureByte=function(){this.hasByte||(this.curByte=this.stream.readByte(),this.hasByte=!0)},Ya.prototype.read=function(e){for(var t=0;e>0;){this._ensureByte();var r=8-this.bitOffset;if(e>=r)t<<=r,t|=Qa[r]&this.curByte,this.hasByte=!1,this.bitOffset=0,e-=r;else{t<<=e;var i=r-e;t|=(this.curByte&Qa[e]<<i)>>i,this.bitOffset+=e,e=0}}return t},Ya.prototype.seek=function(e){var t=e%8,r=(e-t)/8;this.bitOffset=t,this.stream.seek(r),this.hasByte=!1},Ya.prototype.pi=function(){var e,t=new Uint8Array(6);for(e=0;e<t.length;e++)t[e]=this.read(8);return function(e){return Array.prototype.map.call(e,(e=>("00"+e.toString(16)).slice(-2))).join("")}(t)};var Ja=Ya,en=function(){};en.prototype.readByte=function(){throw Error("abstract method readByte() not implemented")},en.prototype.read=function(e,t,r){for(var i=0;i<r;){var a=this.readByte();if(a<0)return 0===i?-1:i;e[t++]=a,i++}return i},en.prototype.seek=function(e){throw Error("abstract method seek() not implemented")},en.prototype.writeByte=function(e){throw Error("abstract method readByte() not implemented")},en.prototype.write=function(e,t,r){var i;for(i=0;i<r;i++)this.writeByte(e[t++]);return r},en.prototype.flush=function(){};var tn,rn=en,an=(tn=new Uint32Array([0,79764919,159529838,222504665,319059676,398814059,445009330,507990021,638119352,583659535,797628118,726387553,890018660,835552979,1015980042,944750013,1276238704,1221641927,1167319070,1095957929,1595256236,1540665371,1452775106,1381403509,1780037320,1859660671,1671105958,1733955601,2031960084,2111593891,1889500026,1952343757,2552477408,2632100695,2443283854,2506133561,2334638140,2414271883,2191915858,2254759653,3190512472,3135915759,3081330742,3009969537,2905550212,2850959411,2762807018,2691435357,3560074640,3505614887,3719321342,3648080713,3342211916,3287746299,3467911202,3396681109,4063920168,4143685023,4223187782,4286162673,3779000052,3858754371,3904687514,3967668269,881225847,809987520,1023691545,969234094,662832811,591600412,771767749,717299826,311336399,374308984,453813921,533576470,25881363,88864420,134795389,214552010,2023205639,2086057648,1897238633,1976864222,1804852699,1867694188,1645340341,1724971778,1587496639,1516133128,1461550545,1406951526,1302016099,1230646740,1142491917,1087903418,2896545431,2825181984,2770861561,2716262478,3215044683,3143675388,3055782693,3001194130,2326604591,2389456536,2200899649,2280525302,2578013683,2640855108,2418763421,2498394922,3769900519,3832873040,3912640137,3992402750,4088425275,4151408268,4197601365,4277358050,3334271071,3263032808,3476998961,3422541446,3585640067,3514407732,3694837229,3640369242,1762451694,1842216281,1619975040,1682949687,2047383090,2127137669,1938468188,2001449195,1325665622,1271206113,1183200824,1111960463,1543535498,1489069629,1434599652,1363369299,622672798,568075817,748617968,677256519,907627842,853037301,1067152940,995781531,51762726,131386257,177728840,240578815,269590778,349224269,429104020,491947555,4046411278,4126034873,4172115296,4234965207,3794477266,3874110821,3953728444,4016571915,3609705398,3555108353,3735388376,3664026991,3290680682,3236090077,3449943556,3378572211,3174993278,3120533705,3032266256,2961025959,2923101090,2868635157,2813903052,2742672763,2604032198,2683796849,2461293480,2524268063,2284983834,2364738477,2175806836,2238787779,1569362073,1498123566,1409854455,1355396672,1317987909,1246755826,1192025387,1137557660,2072149281,2135122070,1912620623,1992383480,1753615357,1816598090,1627664531,1707420964,295390185,358241886,404320391,483945776,43990325,106832002,186451547,266083308,932423249,861060070,1041341759,986742920,613929101,542559546,756411363,701822548,3316196985,3244833742,3425377559,3370778784,3601682597,3530312978,3744426955,3689838204,3819031489,3881883254,3928223919,4007849240,4037393693,4100235434,4180117107,4259748804,2310601993,2373574846,2151335527,2231098320,2596047829,2659030626,2470359227,2550115596,2947551409,2876312838,2788305887,2733848168,3165939309,3094707162,3040238851,2985771188]),function(){var e=4294967295;this.getCRC=function(){return~e>>>0},this.updateCRC=function(t){e=e<<8^tn[255&(e>>>24^t)]},this.updateCRCRun=function(t,r){for(;r-- >0;)e=e<<8^tn[255&(e>>>24^t)]}}),nn=Ja,sn=rn,on=an,cn=function(e,t){var r,i=e[t];for(r=t;r>0;r--)e[r]=e[r-1];return e[0]=i,i},un={OK:0,LAST_BLOCK:-1,NOT_BZIP_DATA:-2,UNEXPECTED_INPUT_EOF:-3,UNEXPECTED_OUTPUT_EOF:-4,DATA_ERROR:-5,OUT_OF_MEMORY:-6,OBSOLETE_INPUT:-7,END_OF_BLOCK:-8},hn={};hn[un.LAST_BLOCK]="Bad file checksum",hn[un.NOT_BZIP_DATA]="Not bzip data",hn[un.UNEXPECTED_INPUT_EOF]="Unexpected input EOF",hn[un.UNEXPECTED_OUTPUT_EOF]="Unexpected output EOF",hn[un.DATA_ERROR]="Data error",hn[un.OUT_OF_MEMORY]="Out of memory",hn[un.OBSOLETE_INPUT]="Obsolete (pre 0.9.5) bzip format not supported.";var yn=function(e,t){var r=hn[e]||"unknown error";t&&(r+=": "+t);var i=new TypeError(r);throw i.errorCode=e,i},ln=function(e,t){this.writePos=this.writeCurrent=this.writeCount=0,this._start_bunzip(e,t)};ln.prototype._init_block=function(){return this._get_next_block()?(this.blockCRC=new on,!0):(this.writeCount=-1,!1)},ln.prototype._start_bunzip=function(e,t){var r=new Uint8Array(4);4===e.read(r,0,4)&&"BZh"===String.fromCharCode(r[0],r[1],r[2])||yn(un.NOT_BZIP_DATA,"bad magic");var i=r[3]-48;(i<1||i>9)&&yn(un.NOT_BZIP_DATA,"level out of range"),this.reader=new nn(e),this.dbufSize=1e5*i,this.nextoutput=0,this.outputStream=t,this.streamCRC=0},ln.prototype._get_next_block=function(){var e,t,r,i=this.reader,a=i.pi();if("177245385090"===a)return!1;"314159265359"!==a&&yn(un.NOT_BZIP_DATA),this.targetBlockCRC=i.read(32)>>>0,this.streamCRC=(this.targetBlockCRC^(this.streamCRC<<1|this.streamCRC>>>31))>>>0,i.read(1)&&yn(un.OBSOLETE_INPUT);var n=i.read(24);n>this.dbufSize&&yn(un.DATA_ERROR,"initial position out of bounds");var s=i.read(16),o=new Uint8Array(256),c=0;for(e=0;e<16;e++)if(s&1<<15-e){var u=16*e;for(r=i.read(16),t=0;t<16;t++)r&1<<15-t&&(o[c++]=u+t)}var h=i.read(3);(h<2||h>6)&&yn(un.DATA_ERROR);var y=i.read(15);0===y&&yn(un.DATA_ERROR);var l=new Uint8Array(256);for(e=0;e<h;e++)l[e]=e;var p=new Uint8Array(y);for(e=0;e<y;e++){for(t=0;i.read(1);t++)t>=h&&yn(un.DATA_ERROR);p[e]=cn(l,t)}var g,d=c+2,f=[];for(t=0;t<h;t++){var m,w,b=new Uint8Array(d),k=new Uint16Array(21);for(s=i.read(5),e=0;e<d;e++){for(;(s<1||s>20)&&yn(un.DATA_ERROR),i.read(1);)i.read(1)?s--:s++;b[e]=s}for(m=w=b[0],e=1;e<d;e++)b[e]>w?w=b[e]:b[e]<m&&(m=b[e]);g={},f.push(g),g.permute=new Uint16Array(258),g.limit=new Uint32Array(22),g.base=new Uint32Array(21),g.minLen=m,g.maxLen=w;var v=0;for(e=m;e<=w;e++)for(k[e]=g.limit[e]=0,s=0;s<d;s++)b[s]===e&&(g.permute[v++]=s);for(e=0;e<d;e++)k[b[e]]++;for(v=s=0,e=m;e<w;e++)v+=k[e],g.limit[e]=v-1,v<<=1,s+=k[e],g.base[e+1]=v-s;g.limit[w+1]=Number.MAX_VALUE,g.limit[w]=v+k[w]-1,g.base[m]=0}var A=new Uint32Array(256);for(e=0;e<256;e++)l[e]=e;var K,E=0,S=0,P=0,U=this.dbuf=new Uint32Array(this.dbufSize);for(d=0;;){for(d--||(d=49,P>=y&&yn(un.DATA_ERROR),g=f[p[P++]]),e=g.minLen,t=i.read(e);e>g.maxLen&&yn(un.DATA_ERROR),!(t<=g.limit[e]);e++)t=t<<1|i.read(1);((t-=g.base[e])<0||t>=258)&&yn(un.DATA_ERROR);var D=g.permute[t];if(0!==D&&1!==D){if(E)for(E=0,S+s>this.dbufSize&&yn(un.DATA_ERROR),A[K=o[l[0]]]+=s;s--;)U[S++]=K;if(D>c)break;S>=this.dbufSize&&yn(un.DATA_ERROR),A[K=o[K=cn(l,e=D-1)]]++,U[S++]=K}else E||(E=1,s=0),s+=0===D?E:2*E,E<<=1}for((n<0||n>=S)&&yn(un.DATA_ERROR),t=0,e=0;e<256;e++)r=t+A[e],A[e]=t,t=r;for(e=0;e<S;e++)U[A[K=255&U[e]]]|=e<<8,A[K]++;var C=0,x=0,T=0;return S&&(x=255&(C=U[n]),C>>=8,T=-1),this.writePos=C,this.writeCurrent=x,this.writeCount=S,this.writeRun=T,!0},ln.prototype._read_bunzip=function(e,t){var r,i,a;if(this.writeCount<0)return 0;var n=this.dbuf,s=this.writePos,o=this.writeCurrent,c=this.writeCount;this.outputsize;for(var u=this.writeRun;c;){for(c--,i=o,o=255&(s=n[s]),s>>=8,3==u++?(r=o,a=i,o=-1):(r=1,a=o),this.blockCRC.updateCRCRun(a,r);r--;)this.outputStream.writeByte(a),this.nextoutput++;o!=i&&(u=0)}return this.writeCount=c,this.blockCRC.getCRC()!==this.targetBlockCRC&&yn(un.DATA_ERROR,"Bad block CRC (got "+this.blockCRC.getCRC().toString(16)+" expected "+this.targetBlockCRC.toString(16)+")"),this.nextoutput};var pn=function(e){if("readByte"in e)return e;var t=new sn;return t.pos=0,t.readByte=function(){return e[this.pos++]},t.seek=function(e){this.pos=e},t.eof=function(){return this.pos>=e.length},t},gn=function(e){var t=new sn,r=!0;if(e)if("number"==typeof e)t.buffer=new Uint8Array(e),r=!1;else{if("writeByte"in e)return e;t.buffer=e,r=!1}else t.buffer=new Uint8Array(16384);return t.pos=0,t.writeByte=function(e){if(r&&this.pos>=this.buffer.length){var t=new Uint8Array(2*this.buffer.length);t.set(this.buffer),this.buffer=t}this.buffer[this.pos++]=e},t.getBuffer=function(){if(this.pos!==this.buffer.length){if(!r)throw new TypeError("outputsize does not match decoded input");var e=new Uint8Array(this.pos);e.set(this.buffer.subarray(0,this.pos)),this.buffer=e}return this.buffer},t._coerced=!0,t};var dn=function(e,t,r){for(var i=pn(e),a=gn(t),n=new ln(i,a);!("eof"in i)||!i.eof();)if(n._init_block())n._read_bunzip();else{var s=n.reader.read(32)>>>0;if(s!==n.streamCRC&&yn(un.DATA_ERROR,"Bad stream CRC (got "+n.streamCRC.toString(16)+" expected "+s.toString(16)+")"),!r||!("eof"in i)||i.eof())break;n._start_bunzip(i,a)}if("getBuffer"in a)return a.getBuffer()};class fn{static get tag(){return _.packet.literalData}constructor(e=new Date){this.format=_.literal.utf8,this.date=R.normalizeDate(e),this.text=null,this.data=null,this.filename=""}setText(e,t=_.literal.utf8){this.format=t,this.text=e,this.data=null}getText(e=!1){return(null===this.text||R.isStream(this.text))&&(this.text=R.decodeUTF8(R.nativeEOL(this.getBytes(e)))),this.text}setBytes(e,t){this.format=t,this.data=e,this.text=null}getBytes(e=!1){return null===this.data&&(this.data=R.canonicalizeEOL(R.encodeUTF8(this.text))),e?E(this.data):this.data}setFilename(e){this.filename=e}getFilename(){return this.filename}async read(e){await A(e,(async e=>{const t=await e.readByte(),r=await e.readByte();this.filename=R.decodeUTF8(await e.readBytes(r)),this.date=R.readDate(await e.readBytes(4));let i=e.remainder();s(i)&&(i=await U(i)),this.setBytes(i,t)}))}writeHeader(){const e=R.encodeUTF8(this.filename),t=new Uint8Array([e.length]),r=new Uint8Array([this.format]),i=R.writeDate(this.date);return R.concatUint8Array([r,t,e,i])}write(){const e=this.writeHeader(),t=this.getBytes();return R.concat([e,t])}}class mn{constructor(){this.bytes=""}read(e){return this.bytes=R.uint8ArrayToString(e.subarray(0,8)),this.bytes.length}write(){return R.stringToUint8Array(this.bytes)}toHex(){return R.uint8ArrayToHex(R.stringToUint8Array(this.bytes))}equals(e,t=!1){return t&&(e.isWildcard()||this.isWildcard())||this.bytes===e.bytes}isNull(){return""===this.bytes}isWildcard(){return/^0+$/.test(this.toHex())}static mapToHex(e){return e.toHex()}static fromID(e){const t=new mn;return t.read(R.hexToUint8Array(e)),t}static wildcard(){const e=new mn;return e.read(new Uint8Array(8)),e}}const wn=Symbol("verified"),bn=new Set([_.signatureSubpacket.issuerKeyID,_.signatureSubpacket.issuerFingerprint,_.signatureSubpacket.embeddedSignature]);class kn{static get tag(){return _.packet.signature}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.signatureData=null,this.unhashedSubpackets=[],this.signedHashValue=null,this.salt=null,this.created=null,this.signatureExpirationTime=null,this.signatureNeverExpires=!0,this.exportable=null,this.trustLevel=null,this.trustAmount=null,this.regularExpression=null,this.revocable=null,this.keyExpirationTime=null,this.keyNeverExpires=null,this.preferredSymmetricAlgorithms=null,this.revocationKeyClass=null,this.revocationKeyAlgorithm=null,this.revocationKeyFingerprint=null,this.issuerKeyID=new mn,this.rawNotations=[],this.notations={},this.preferredHashAlgorithms=null,this.preferredCompressionAlgorithms=null,this.keyServerPreferences=null,this.preferredKeyServer=null,this.isPrimaryUserID=null,this.policyURI=null,this.keyFlags=null,this.signersUserID=null,this.reasonForRevocationFlag=null,this.reasonForRevocationString=null,this.features=null,this.signatureTargetPublicKeyAlgorithm=null,this.signatureTargetHashAlgorithm=null,this.signatureTargetHash=null,this.embeddedSignature=null,this.issuerKeyVersion=null,this.issuerFingerprint=null,this.preferredAEADAlgorithms=null,this.preferredCipherSuites=null,this.revoked=null,this[wn]=null}read(e){let t=0;if(this.version=e[t++],4!==this.version&&5!==this.version&&6!==this.version)throw new Rr(`Version ${this.version} of the signature packet is unsupported.`);if(this.signatureType=e[t++],this.publicKeyAlgorithm=e[t++],this.hashAlgorithm=e[t++],t+=this.readSubPackets(e.subarray(t,e.length),!0),!this.created)throw Error("Missing signature creation time subpacket.");if(this.signatureData=e.subarray(0,t),t+=this.readSubPackets(e.subarray(t,e.length),!1),this.signedHashValue=e.subarray(t,t+2),t+=2,6===this.version){const r=e[t++];this.salt=e.subarray(t,t+r),t+=r}const r=e.subarray(t,e.length),{read:i,signatureParams:a}=Zi.signature.parseSignatureParams(this.publicKeyAlgorithm,r);if(i<r.length)throw Error("Error reading MPIs");this.params=a}writeParams(){return this.params instanceof Promise?C((async()=>Zi.serializeParams(this.publicKeyAlgorithm,await this.params))):Zi.serializeParams(this.publicKeyAlgorithm,this.params)}write(){const e=[];return e.push(this.signatureData),e.push(this.writeUnhashedSubPackets()),e.push(this.signedHashValue),6===this.version&&(e.push(new Uint8Array([this.salt.length])),e.push(this.salt)),e.push(this.writeParams()),R.concat(e)}async sign(e,t,r=new Date,i=!1){this.version=e.version,this.created=R.normalizeDate(r),this.issuerKeyVersion=e.version,this.issuerFingerprint=e.getFingerprintBytes(),this.issuerKeyID=e.getKeyID();const a=[new Uint8Array([this.version,this.signatureType,this.publicKeyAlgorithm,this.hashAlgorithm])];if(a.push(this.writeHashedSubPackets()),this.unhashedSubpackets=[],this.signatureData=R.concat(a),6===this.version){const e=An(this.hashAlgorithm);if(null===this.salt)this.salt=Zi.random.getRandomBytes(e);else if(e!==this.salt.length)throw Error("Provided salt does not have the required length")}const n=this.toHash(this.signatureType,t,i),s=await this.hash(this.signatureType,t,n,i);this.signedHashValue=P(K(s),0,2);const o=async()=>Zi.signature.sign(this.publicKeyAlgorithm,this.hashAlgorithm,e.publicParams,e.privateParams,n,await U(s));R.isStream(s)?this.params=o():(this.params=await o(),this[wn]=!0)}writeHashedSubPackets(){const e=_.signatureSubpacket,t=[];let r;if(null===this.created)throw Error("Missing signature creation time");t.push(vn(e.signatureCreationTime,!0,R.writeDate(this.created))),null!==this.signatureExpirationTime&&t.push(vn(e.signatureExpirationTime,!0,R.writeNumber(this.signatureExpirationTime,4))),null!==this.exportable&&t.push(vn(e.exportableCertification,!0,new Uint8Array([this.exportable?1:0]))),null!==this.trustLevel&&(r=new Uint8Array([this.trustLevel,this.trustAmount]),t.push(vn(e.trustSignature,!0,r))),null!==this.regularExpression&&t.push(vn(e.regularExpression,!0,this.regularExpression)),null!==this.revocable&&t.push(vn(e.revocable,!0,new Uint8Array([this.revocable?1:0]))),null!==this.keyExpirationTime&&t.push(vn(e.keyExpirationTime,!0,R.writeNumber(this.keyExpirationTime,4))),null!==this.preferredSymmetricAlgorithms&&(r=R.stringToUint8Array(R.uint8ArrayToString(this.preferredSymmetricAlgorithms)),t.push(vn(e.preferredSymmetricAlgorithms,!1,r))),null!==this.revocationKeyClass&&(r=new Uint8Array([this.revocationKeyClass,this.revocationKeyAlgorithm]),r=R.concat([r,this.revocationKeyFingerprint]),t.push(vn(e.revocationKey,!1,r))),!this.issuerKeyID.isNull()&&this.issuerKeyVersion<5&&t.push(vn(e.issuerKeyID,!0,this.issuerKeyID.write())),this.rawNotations.forEach((({name:i,value:a,humanReadable:n,critical:s})=>{r=[new Uint8Array([n?128:0,0,0,0])];const o=R.encodeUTF8(i);r.push(R.writeNumber(o.length,2)),r.push(R.writeNumber(a.length,2)),r.push(o),r.push(a),r=R.concat(r),t.push(vn(e.notationData,s,r))})),null!==this.preferredHashAlgorithms&&(r=R.stringToUint8Array(R.uint8ArrayToString(this.preferredHashAlgorithms)),t.push(vn(e.preferredHashAlgorithms,!1,r))),null!==this.preferredCompressionAlgorithms&&(r=R.stringToUint8Array(R.uint8ArrayToString(this.preferredCompressionAlgorithms)),t.push(vn(e.preferredCompressionAlgorithms,!1,r))),null!==this.keyServerPreferences&&(r=R.stringToUint8Array(R.uint8ArrayToString(this.keyServerPreferences)),t.push(vn(e.keyServerPreferences,!1,r))),null!==this.preferredKeyServer&&t.push(vn(e.preferredKeyServer,!1,R.encodeUTF8(this.preferredKeyServer))),null!==this.isPrimaryUserID&&t.push(vn(e.primaryUserID,!1,new Uint8Array([this.isPrimaryUserID?1:0]))),null!==this.policyURI&&t.push(vn(e.policyURI,!1,R.encodeUTF8(this.policyURI))),null!==this.keyFlags&&(r=R.stringToUint8Array(R.uint8ArrayToString(this.keyFlags)),t.push(vn(e.keyFlags,!0,r))),null!==this.signersUserID&&t.push(vn(e.signersUserID,!1,R.encodeUTF8(this.signersUserID))),null!==this.reasonForRevocationFlag&&(r=R.stringToUint8Array(String.fromCharCode(this.reasonForRevocationFlag)+this.reasonForRevocationString),t.push(vn(e.reasonForRevocation,!0,r))),null!==this.features&&(r=R.stringToUint8Array(R.uint8ArrayToString(this.features)),t.push(vn(e.features,!1,r))),null!==this.signatureTargetPublicKeyAlgorithm&&(r=[new Uint8Array([this.signatureTargetPublicKeyAlgorithm,this.signatureTargetHashAlgorithm])],r.push(R.stringToUint8Array(this.signatureTargetHash)),r=R.concat(r),t.push(vn(e.signatureTarget,!0,r))),null!==this.embeddedSignature&&t.push(vn(e.embeddedSignature,!0,this.embeddedSignature.write())),null!==this.issuerFingerprint&&(r=[new Uint8Array([this.issuerKeyVersion]),this.issuerFingerprint],r=R.concat(r),t.push(vn(e.issuerFingerprint,this.version>=5,r))),null!==this.preferredAEADAlgorithms&&(r=R.stringToUint8Array(R.uint8ArrayToString(this.preferredAEADAlgorithms)),t.push(vn(e.preferredAEADAlgorithms,!1,r))),null!==this.preferredCipherSuites&&(r=new Uint8Array([].concat(...this.preferredCipherSuites)),t.push(vn(e.preferredCipherSuites,!1,r)));const i=R.concat(t),a=R.writeNumber(i.length,6===this.version?4:2);return R.concat([a,i])}writeUnhashedSubPackets(){const e=[];this.unhashedSubpackets.forEach((t=>{e.push(xr(t.length)),e.push(t)}));const t=R.concat(e),r=R.writeNumber(t.length,6===this.version?4:2);return R.concat([r,t])}readSubPacket(e,t=!0){let r=0;const i=!!(128&e[r]),a=127&e[r];if(t||(this.unhashedSubpackets.push(e.subarray(r,e.length)),bn.has(a)))switch(r++,a){case _.signatureSubpacket.signatureCreationTime:this.created=R.readDate(e.subarray(r,e.length));break;case _.signatureSubpacket.signatureExpirationTime:{const t=R.readNumber(e.subarray(r,e.length));this.signatureNeverExpires=0===t,this.signatureExpirationTime=t;break}case _.signatureSubpacket.exportableCertification:this.exportable=1===e[r++];break;case _.signatureSubpacket.trustSignature:this.trustLevel=e[r++],this.trustAmount=e[r++];break;case _.signatureSubpacket.regularExpression:this.regularExpression=e[r];break;case _.signatureSubpacket.revocable:this.revocable=1===e[r++];break;case _.signatureSubpacket.keyExpirationTime:{const t=R.readNumber(e.subarray(r,e.length));this.keyExpirationTime=t,this.keyNeverExpires=0===t;break}case _.signatureSubpacket.preferredSymmetricAlgorithms:this.preferredSymmetricAlgorithms=[...e.subarray(r,e.length)];break;case _.signatureSubpacket.revocationKey:this.revocationKeyClass=e[r++],this.revocationKeyAlgorithm=e[r++],this.revocationKeyFingerprint=e.subarray(r,r+20);break;case _.signatureSubpacket.issuerKeyID:if(4===this.version)this.issuerKeyID.read(e.subarray(r,e.length));else if(t)throw Error("Unexpected Issuer Key ID subpacket");break;case _.signatureSubpacket.notationData:{const t=!!(128&e[r]);r+=4;const a=R.readNumber(e.subarray(r,r+2));r+=2;const n=R.readNumber(e.subarray(r,r+2));r+=2;const s=R.decodeUTF8(e.subarray(r,r+a)),o=e.subarray(r+a,r+a+n);this.rawNotations.push({name:s,humanReadable:t,value:o,critical:i}),t&&(this.notations[s]=R.decodeUTF8(o));break}case _.signatureSubpacket.preferredHashAlgorithms:this.preferredHashAlgorithms=[...e.subarray(r,e.length)];break;case _.signatureSubpacket.preferredCompressionAlgorithms:this.preferredCompressionAlgorithms=[...e.subarray(r,e.length)];break;case _.signatureSubpacket.keyServerPreferences:this.keyServerPreferences=[...e.subarray(r,e.length)];break;case _.signatureSubpacket.preferredKeyServer:this.preferredKeyServer=R.decodeUTF8(e.subarray(r,e.length));break;case _.signatureSubpacket.primaryUserID:this.isPrimaryUserID=0!==e[r++];break;case _.signatureSubpacket.policyURI:this.policyURI=R.decodeUTF8(e.subarray(r,e.length));break;case _.signatureSubpacket.keyFlags:this.keyFlags=[...e.subarray(r,e.length)];break;case _.signatureSubpacket.signersUserID:this.signersUserID=R.decodeUTF8(e.subarray(r,e.length));break;case _.signatureSubpacket.reasonForRevocation:this.reasonForRevocationFlag=e[r++],this.reasonForRevocationString=R.decodeUTF8(e.subarray(r,e.length));break;case _.signatureSubpacket.features:this.features=[...e.subarray(r,e.length)];break;case _.signatureSubpacket.signatureTarget:{this.signatureTargetPublicKeyAlgorithm=e[r++],this.signatureTargetHashAlgorithm=e[r++];const t=Zi.getHashByteLength(this.signatureTargetHashAlgorithm);this.signatureTargetHash=R.uint8ArrayToString(e.subarray(r,r+t));break}case _.signatureSubpacket.embeddedSignature:this.embeddedSignature=new kn,this.embeddedSignature.read(e.subarray(r,e.length));break;case _.signatureSubpacket.issuerFingerprint:this.issuerKeyVersion=e[r++],this.issuerFingerprint=e.subarray(r,e.length),this.issuerKeyVersion>=5?this.issuerKeyID.read(this.issuerFingerprint):this.issuerKeyID.read(this.issuerFingerprint.subarray(-8));break;case _.signatureSubpacket.preferredAEADAlgorithms:this.preferredAEADAlgorithms=[...e.subarray(r,e.length)];break;case _.signatureSubpacket.preferredCipherSuites:this.preferredCipherSuites=[];for(let t=r;t<e.length;t+=2)this.preferredCipherSuites.push([e[t],e[t+1]]);break;default:{const e=Error("Unknown signature subpacket type "+a);if(i)throw e;R.printDebug(e)}}}readSubPackets(e,t=!0,r){const i=6===this.version?4:2,a=R.readNumber(e.subarray(0,i));let n=i;for(;n<2+a;){const i=Cr(e.subarray(n,e.length));n+=i.offset,this.readSubPacket(e.subarray(n,n+i.len),t,r),n+=i.len}return n}toSign(e,t){const r=_.signature;switch(e){case r.binary:return null!==t.text?R.encodeUTF8(t.getText(!0)):t.getBytes(!0);case r.text:{const e=t.getBytes(!0);return R.canonicalizeEOL(e)}case r.standalone:return new Uint8Array(0);case r.certGeneric:case r.certPersona:case r.certCasual:case r.certPositive:case r.certRevocation:{let e,i;if(t.userID)i=180,e=t.userID;else{if(!t.userAttribute)throw Error("Either a userID or userAttribute packet needs to be supplied for certification.");i=209,e=t.userAttribute}const a=e.write();return R.concat([this.toSign(r.key,t),new Uint8Array([i]),R.writeNumber(a.length,4),a])}case r.subkeyBinding:case r.subkeyRevocation:case r.keyBinding:return R.concat([this.toSign(r.key,t),this.toSign(r.key,{key:t.bind})]);case r.key:if(void 0===t.key)throw Error("Key packet is required for this signature.");return t.key.writeForHash(this.version);case r.keyRevocation:return this.toSign(r.key,t);case r.timestamp:return new Uint8Array(0);case r.thirdParty:throw Error("Not implemented");default:throw Error("Unknown signature type.")}}calculateTrailer(e,t){let r=0;return k(K(this.signatureData),(e=>{r+=e.length}),(()=>{const i=[];return 5!==this.version||this.signatureType!==_.signature.binary&&this.signatureType!==_.signature.text||(t?i.push(new Uint8Array(6)):i.push(e.writeHeader())),i.push(new Uint8Array([this.version,255])),5===this.version&&i.push(new Uint8Array(4)),i.push(R.writeNumber(r,4)),R.concat(i)}))}toHash(e,t,r=!1){const i=this.toSign(e,t);return R.concat([this.salt||new Uint8Array,i,this.signatureData,this.calculateTrailer(t,r)])}async hash(e,t,r,i=!1){if(6===this.version&&this.salt.length!==An(this.hashAlgorithm))throw Error("Signature salt does not have the expected length");return r||(r=this.toHash(e,t,i)),Zi.hash.digest(this.hashAlgorithm,r)}async verify(e,t,r,i=new Date,a=!1,n=B){if(!this.issuerKeyID.equals(e.getKeyID()))throw Error("Signature was not issued by the given public key");if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Public key algorithm used to sign signature does not match issuer key algorithm.");const s=t===_.signature.binary||t===_.signature.text;if(!(this[wn]&&!s)){let i,n;if(this.hashed?n=await this.hashed:(i=this.toHash(t,r,a),n=await this.hash(t,r,i)),n=await U(n),this.signedHashValue[0]!==n[0]||this.signedHashValue[1]!==n[1])throw Error("Signed digest did not match");this.params=await this.params;const s=this.publicKeyAlgorithm===_.publicKey.hmac?e.privateParams:null;if(this[wn]=await Zi.signature.verify(this.publicKeyAlgorithm,this.hashAlgorithm,this.params,e.publicParams,s,i,n),!this[wn])throw Error("Signature verification failed")}const o=R.normalizeDate(i);if(o&&this.created>o)throw Error("Signature creation time is in the future");if(o&&o>=this.getExpirationTime())throw Error("Signature is expired");if(n.rejectHashAlgorithms.has(this.hashAlgorithm))throw Error("Insecure hash algorithm: "+_.read(_.hash,this.hashAlgorithm).toUpperCase());if(n.rejectMessageHashAlgorithms.has(this.hashAlgorithm)&&[_.signature.binary,_.signature.text].includes(this.signatureType))throw Error("Insecure message hash algorithm: "+_.read(_.hash,this.hashAlgorithm).toUpperCase());if(this.rawNotations.forEach((({name:e,critical:t})=>{if(t&&n.knownNotations.indexOf(e)<0)throw Error("Unknown critical notation: "+e)})),null!==this.revocationKeyClass)throw Error("This key is intended to be revoked with an authorized key, which OpenPGP.js does not support.")}isExpired(e=new Date){const t=R.normalizeDate(e);return null!==t&&!(this.created<=t&&t<this.getExpirationTime())}getExpirationTime(){return this.signatureNeverExpires?1/0:new Date(this.created.getTime()+1e3*this.signatureExpirationTime)}}function vn(e,t,r){const i=[];return i.push(xr(r.length+1)),i.push(new Uint8Array([(t?128:0)|e])),i.push(r),R.concat(i)}function An(e){switch(e){case _.hash.sha256:return 16;case _.hash.sha384:return 24;case _.hash.sha512:return 32;case _.hash.sha224:case _.hash.sha3_256:return 16;case _.hash.sha3_512:return 32;default:throw Error("Unsupported hash function")}}class Kn{static get tag(){return _.packet.onePassSignature}static fromSignaturePacket(e,t){const r=new Kn;return r.version=6===e.version?6:3,r.signatureType=e.signatureType,r.hashAlgorithm=e.hashAlgorithm,r.publicKeyAlgorithm=e.publicKeyAlgorithm,r.issuerKeyID=e.issuerKeyID,r.salt=e.salt,r.issuerFingerprint=e.issuerFingerprint,r.flags=t?1:0,r}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.salt=null,this.issuerKeyID=null,this.issuerFingerprint=null,this.flags=null}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new Rr(`Version ${this.version} of the one-pass signature packet is unsupported.`);if(this.signatureType=e[t++],this.hashAlgorithm=e[t++],this.publicKeyAlgorithm=e[t++],6===this.version){const r=e[t++];this.salt=e.subarray(t,t+r),t+=r,this.issuerFingerprint=e.subarray(t,t+32),t+=32,this.issuerKeyID=new mn,this.issuerKeyID.read(this.issuerFingerprint)}else this.issuerKeyID=new mn,this.issuerKeyID.read(e.subarray(t,t+8)),t+=8;return this.flags=e[t++],this}write(){const e=[new Uint8Array([this.version,this.signatureType,this.hashAlgorithm,this.publicKeyAlgorithm])];return 6===this.version?e.push(new Uint8Array([this.salt.length]),this.salt,this.issuerFingerprint):e.push(this.issuerKeyID.write()),e.push(new Uint8Array([this.flags])),R.concatUint8Array(e)}calculateTrailer(...e){return C((async()=>kn.prototype.calculateTrailer.apply(await this.correspondingSig,e)))}async verify(){const e=await this.correspondingSig;if(!e||e.constructor.tag!==_.packet.signature)throw Error("Corresponding signature packet missing");if(e.signatureType!==this.signatureType||e.hashAlgorithm!==this.hashAlgorithm||e.publicKeyAlgorithm!==this.publicKeyAlgorithm||!e.issuerKeyID.equals(this.issuerKeyID)||3===this.version&&6===e.version||6===this.version&&6!==e.version||6===this.version&&!R.equalsUint8Array(e.issuerFingerprint,this.issuerFingerprint)||6===this.version&&!R.equalsUint8Array(e.salt,this.salt))throw Error("Corresponding signature packet does not match one-pass signature packet");return e.hashed=this.hashed,e.verify.apply(e,arguments)}}function En(e,t){if(!t[e]){let t;try{t=_.read(_.packet,e)}catch(t){throw new Lr("Unknown packet type with tag: "+e)}throw Error("Packet not allowed in this context: "+t)}return new t[e]}Kn.prototype.hash=kn.prototype.hash,Kn.prototype.toHash=kn.prototype.toHash,Kn.prototype.toSign=kn.prototype.toSign;class Sn extends Array{static async fromBinary(e,t,r=B){const i=new Sn;return await i.read(e,t,r),i}async read(e,t,r=B){r.additionalAllowedPackets.length&&(t={...t,...R.constructAllowedPackets(r.additionalAllowedPackets)}),this.stream=v(e,(async(e,i)=>{const a=T(i);try{for(;;){await a.ready;if(await Mr(e,(async e=>{try{if(e.tag===_.packet.marker||e.tag===_.packet.trust||e.tag===_.packet.padding)return;const i=En(e.tag,t);i.packets=new Sn,i.fromStream=R.isStream(e.packet),await i.read(e.packet,r),await a.write(i)}catch(t){if(t instanceof Lr){if(!(e.tag<=39))return;await a.abort(t)}const i=!r.ignoreUnsupportedPackets&&t instanceof Rr,n=!(r.ignoreMalformedPackets||t instanceof Rr);if(i||n||Br(e.tag))await a.abort(t);else{const t=new Fr(e.tag,e.packet);await a.write(t)}R.printDebugError(t)}})))return await a.ready,void await a.close()}}catch(e){await a.abort(e)}}));const i=x(this.stream);for(;;){const{done:e,value:t}=await i.read();if(e?this.stream=null:this.push(t),e||Br(t.constructor.tag))break}i.releaseLock()}write(){const e=[];for(let t=0;t<this.length;t++){const r=this[t]instanceof Fr?this[t].tag:this[t].constructor.tag,i=this[t].write();if(R.isStream(i)&&Br(this[t].constructor.tag)){let t=[],a=0;const n=512;e.push(Ir(r)),e.push(k(i,(e=>{if(t.push(e),a+=e.length,a>=n){const e=Math.min(Math.log(a)/Math.LN2|0,30),r=2**e,i=R.concat([Tr(e)].concat(t));return t=[i.subarray(1+r)],a=t[0].length,i.subarray(0,1+r)}}),(()=>R.concat([xr(a)].concat(t)))))}else{if(R.isStream(i)){let t=0;e.push(k(K(i),(e=>{t+=e.length}),(()=>_r(r,t))))}else e.push(_r(r,i.length));e.push(i)}}return R.concat(e)}filterByTag(...e){const t=new Sn,r=e=>t=>e===t;for(let i=0;i<this.length;i++)e.some(r(this[i].constructor.tag))&&t.push(this[i]);return t}findPacket(e){return this.find((t=>t.constructor.tag===e))}indexOfTag(...e){const t=[],r=this,i=e=>t=>e===t;for(let a=0;a<this.length;a++)e.some(i(r[a].constructor.tag))&&t.push(a);return t}}const Pn=/*#__PURE__*/R.constructAllowedPackets([fn,Kn,kn]);class Un{static get tag(){return _.packet.compressedData}constructor(e=B){this.packets=null,this.algorithm=e.preferredCompressionAlgorithm,this.compressed=null}async read(e,t=B){await A(e,(async e=>{this.algorithm=await e.readByte(),this.compressed=e.remainder(),await this.decompress(t)}))}write(){return null===this.compressed&&this.compress(),R.concat([new Uint8Array([this.algorithm]),this.compressed])}async decompress(e=B){const t=_.read(_.compression,this.algorithm),r=In[t];if(!r)throw Error(t+" decompression not supported");this.packets=await Sn.fromBinary(r(this.compressed),Pn,e)}compress(){const e=_.read(_.compression,this.algorithm),t=Tn[e];if(!t)throw Error(e+" compression not supported");this.compressed=t(this.packets.write())}}function Dn(e,t){return r=>{if(!R.isStream(r)||s(r))return C((()=>U(r).then((e=>new Promise(((r,i)=>{const a=new t;a.ondata=e=>{r(e)};try{a.push(e,!0)}catch(e){i(e)}}))))));if(e)try{const t=e();return r.pipeThrough(t)}catch(e){if("TypeError"!==e.name)throw e}const i=r.getReader(),a=new t;return new ReadableStream({async start(e){for(a.ondata=async(t,r)=>{e.enqueue(t),r&&e.close()};;){const{done:e,value:t}=await i.read();if(e)return void a.push(new Uint8Array,!0);t.length&&a.push(t)}}})}}function Cn(e){return function(t){return C((async()=>e(await U(t))))}}const xn=e=>({compressor:"undefined"!=typeof CompressionStream&&(()=>new CompressionStream(e)),decompressor:"undefined"!=typeof DecompressionStream&&(()=>new DecompressionStream(e))}),Tn={zip:/*#__PURE__*/Dn(xn("deflate-raw").compressor,Va),zlib:/*#__PURE__*/Dn(xn("deflate").compressor,$a)},In={uncompressed:e=>e,zip:/*#__PURE__*/Dn(xn("deflate-raw").decompressor,Wa),zlib:/*#__PURE__*/Dn(xn("deflate").decompressor,Xa),bzip2:/*#__PURE__*/Cn(dn)},_n=/*#__PURE__*/R.constructAllowedPackets([fn,Un,Kn,kn]);class Bn{static get tag(){return _.packet.symEncryptedIntegrityProtectedData}static fromObject({version:e,aeadAlgorithm:t}){if(1!==e&&2!==e)throw Error("Unsupported SEIPD version");const r=new Bn;return r.version=e,2===e&&(r.aeadAlgorithm=t),r}constructor(){this.version=null,this.cipherAlgorithm=null,this.aeadAlgorithm=null,this.chunkSizeByte=null,this.salt=null,this.encrypted=null,this.packets=null}async read(e){await A(e,(async e=>{if(this.version=await e.readByte(),1!==this.version&&2!==this.version)throw new Rr(`Version ${this.version} of the SEIP packet is unsupported.`);2===this.version&&(this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte(),this.salt=await e.readBytes(32)),this.encrypted=e.remainder()}))}write(){return 2===this.version?R.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.salt,this.encrypted]):R.concat([new Uint8Array([this.version]),this.encrypted])}async encrypt(e,t,r=B){let i=this.packets.write();if(s(i)&&(i=await U(i)),2===this.version)this.cipherAlgorithm=e,this.salt=Zi.random.getRandomBytes(32),this.chunkSizeByte=r.aeadChunkSizeByte,this.encrypted=await Mn(this,"encrypt",t,i);else{const{blockSize:a}=Zi.getCipherParams(e),n=await Zi.getPrefixRandom(e),s=new Uint8Array([211,20]),o=R.concat([n,i,s]),c=await Zi.hash.sha1(E(o)),u=R.concat([o,c]);this.encrypted=await Zi.mode.cfb.encrypt(e,t,u,new Uint8Array(a),r)}return!0}async decrypt(e,t,r=B){let i,a=K(this.encrypted);if(s(a)&&(a=await U(a)),2===this.version)i=await Mn(this,"decrypt",t,a);else{const{blockSize:n}=Zi.getCipherParams(e),s=await Zi.mode.cfb.decrypt(e,t,a,new Uint8Array(n)),o=P(E(s),-20),c=P(s,0,-20),u=Promise.all([U(await Zi.hash.sha1(E(c))),U(o)]).then((([e,t])=>{if(!R.equalsUint8Array(e,t))throw Error("Modification detected.");return new Uint8Array})),h=P(c,n+2);i=P(h,0,-2),i=f([i,C((()=>u))]),R.isStream(a)&&r.allowUnauthenticatedStream||(i=await U(i))}return this.packets=await Sn.fromBinary(i,_n,r),!0}}async function Mn(e,t,r,i){const a=e instanceof Bn&&2===e.version,n=!a&&e.constructor.tag===_.packet.aeadEncryptedData;if(!a&&!n)throw Error("Unexpected packet type");const s=Zi.getAEADMode(e.aeadAlgorithm),o="decrypt"===t?s.tagLength:0,c="encrypt"===t?s.tagLength:0,u=2**(e.chunkSizeByte+6)+o,h=n?8:0,y=new ArrayBuffer(13+h),l=new Uint8Array(y,0,5+h),p=new Uint8Array(y),g=new DataView(y),d=new Uint8Array(y,5,8);l.set([192|e.constructor.tag,e.version,e.cipherAlgorithm,e.aeadAlgorithm,e.chunkSizeByte],0);let f,w,b=0,k=Promise.resolve(),A=0,K=0;if(a){const{keySize:t}=Zi.getCipherParams(e.cipherAlgorithm),{ivLength:i}=s,a=new Uint8Array(y,0,5),n=await Pi(_.hash.sha256,r,e.salt,a,t+i);r=n.subarray(0,t),f=n.subarray(t),f.fill(0,f.length-8),w=new DataView(f.buffer,f.byteOffset,f.byteLength)}else f=e.iv;const E=await s(e.cipherAlgorithm,r);return v(i,(async(r,i)=>{if("array"!==R.isStream(r)){const t=new TransformStream({},{highWaterMark:R.getHardwareConcurrency()*2**(e.chunkSizeByte+6),size:e=>e.length});m(t.readable,i),i=t.writable}const n=x(r),s=T(i);try{for(;;){let e=await n.readBytes(u+o)||new Uint8Array;const r=e.subarray(e.length-o);let i,y,m;if(e=e.subarray(0,e.length-o),a)m=f;else{m=f.slice();for(let e=0;e<8;e++)m[f.length-8+e]^=d[e]}if(!b||e.length?(n.unshift(r),i=E[t](e,m,l),i.catch((()=>{})),K+=e.length-o+c):(g.setInt32(5+h+4,A),i=E[t](r,m,p),i.catch((()=>{})),K+=c,y=!0),A+=e.length-o,k=k.then((()=>i)).then((async e=>{await s.ready,await s.write(e),K-=e.length})).catch((e=>s.abort(e))),(y||K>s.desiredSize)&&await k,y){await s.close();break}a?w.setInt32(f.length-4,++b):g.setInt32(9,++b)}}catch(e){await s.ready.catch((()=>{})),await s.abort(e)}}))}const Rn=/*#__PURE__*/R.constructAllowedPackets([fn,Un,Kn,kn]);class Ln{static get tag(){return _.packet.aeadEncryptedData}constructor(){this.version=1,this.cipherAlgorithm=null,this.aeadAlgorithm=_.aead.eax,this.chunkSizeByte=null,this.iv=null,this.encrypted=null,this.packets=null}async read(e){await A(e,(async e=>{const t=await e.readByte();if(1!==t)throw new Rr(`Version ${t} of the AEAD-encrypted data packet is not supported.`);this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte();const r=Zi.getAEADMode(this.aeadAlgorithm);this.iv=await e.readBytes(r.ivLength),this.encrypted=e.remainder()}))}write(){return R.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.iv,this.encrypted])}async decrypt(e,t,r=B){this.packets=await Sn.fromBinary(await Mn(this,"decrypt",t,K(this.encrypted)),Rn,r)}async encrypt(e,t,r=B){this.cipherAlgorithm=e;const{ivLength:i}=Zi.getAEADMode(this.aeadAlgorithm);this.iv=Zi.random.getRandomBytes(i),this.chunkSizeByte=r.aeadChunkSizeByte;const a=this.packets.write();this.encrypted=await Mn(this,"encrypt",t,a)}}class Fn{static get tag(){return _.packet.publicKeyEncryptedSessionKey}constructor(){this.version=null,this.publicKeyID=new mn,this.publicKeyVersion=null,this.publicKeyFingerprint=null,this.publicKeyAlgorithm=null,this.sessionKey=null,this.sessionKeyAlgorithm=null,this.encrypted={}}static fromObject({version:e,encryptionKeyPacket:t,anonymousRecipient:r,sessionKey:i,sessionKeyAlgorithm:a}){const n=new Fn;if(3!==e&&6!==e)throw Error("Unsupported PKESK version");return n.version=e,6===e&&(n.publicKeyVersion=r?null:t.version,n.publicKeyFingerprint=r?null:t.getFingerprintBytes()),n.publicKeyID=r?mn.wildcard():t.getKeyID(),n.publicKeyAlgorithm=t.algorithm,n.sessionKey=i,n.sessionKeyAlgorithm=a,n}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new Rr(`Version ${this.version} of the PKESK packet is unsupported.`);if(6===this.version){const r=e[t++];if(r){this.publicKeyVersion=e[t++];const i=r-1;this.publicKeyFingerprint=e.subarray(t,t+i),t+=i,this.publicKeyVersion>=5?this.publicKeyID.read(this.publicKeyFingerprint):this.publicKeyID.read(this.publicKeyFingerprint.subarray(-8))}else this.publicKeyID=mn.wildcard()}else t+=this.publicKeyID.read(e.subarray(t,t+8));this.publicKeyAlgorithm=e[t++],this.encrypted=Zi.parseEncSessionKeyParams(this.publicKeyAlgorithm,e.subarray(t)),3!==this.version||this.publicKeyAlgorithm!==_.publicKey.x25519&&this.publicKeyAlgorithm!==_.publicKey.x448||(this.sessionKeyAlgorithm=_.write(_.symmetric,this.encrypted.C.algorithm))}write(){const e=[new Uint8Array([this.version])];return 6===this.version?null!==this.publicKeyFingerprint?(e.push(new Uint8Array([this.publicKeyFingerprint.length+1,this.publicKeyVersion])),e.push(this.publicKeyFingerprint)):e.push(new Uint8Array([0])):e.push(this.publicKeyID.write()),e.push(new Uint8Array([this.publicKeyAlgorithm]),Zi.serializeParams(this.publicKeyAlgorithm,this.encrypted)),R.concatUint8Array(e)}async encrypt(e){const t=_.write(_.publicKey,this.publicKeyAlgorithm),r=Nn(this.version,t,this.sessionKeyAlgorithm,this.sessionKey),i=t===_.publicKey.aead?e.privateParams:null;this.encrypted=await Zi.publicKeyEncrypt(t,this.sessionKeyAlgorithm,e.publicParams,i,r,e.getFingerprintBytes())}async decrypt(e,t){if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Decryption error");const r=t?Nn(this.version,this.publicKeyAlgorithm,t.sessionKeyAlgorithm,t.sessionKey):null,i=await Zi.publicKeyDecrypt(this.publicKeyAlgorithm,e.publicParams,e.privateParams,this.encrypted,e.getFingerprintBytes(),r),{sessionKey:a,sessionKeyAlgorithm:n}=function(e,t,r,i){switch(t){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:case _.publicKey.elgamal:case _.publicKey.ecdh:case _.publicKey.aead:{const t=r.subarray(0,r.length-2),a=r.subarray(r.length-2),n=R.writeChecksum(t.subarray(t.length%8)),s=n[0]===a[0]&n[1]===a[1],o=6===e?{sessionKeyAlgorithm:null,sessionKey:t}:{sessionKeyAlgorithm:t[0],sessionKey:t.subarray(1)};if(i){const t=s&o.sessionKeyAlgorithm===i.sessionKeyAlgorithm&o.sessionKey.length===i.sessionKey.length;return{sessionKey:R.selectUint8Array(t,o.sessionKey,i.sessionKey),sessionKeyAlgorithm:6===e?null:R.selectUint8(t,o.sessionKeyAlgorithm,i.sessionKeyAlgorithm)}}if(s&&(6===e||_.read(_.symmetric,o.sessionKeyAlgorithm)))return o;throw Error("Decryption error")}case _.publicKey.x25519:case _.publicKey.x448:return{sessionKey:r};default:throw Error("Unsupported public key algorithm")}}(this.version,this.publicKeyAlgorithm,i,t);3===this.version&&this.publicKeyAlgorithm!==_.publicKey.x25519&&this.publicKeyAlgorithm!==_.publicKey.x448&&(this.sessionKeyAlgorithm=n),this.sessionKey=a}}function Nn(e,t,r,i){switch(t){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:case _.publicKey.elgamal:case _.publicKey.ecdh:case _.publicKey.aead:return R.concatUint8Array([new Uint8Array(6===e?[]:[r]),i,R.writeChecksum(i.subarray(i.length%8))]);case _.publicKey.x25519:case _.publicKey.x448:return i;default:throw Error("Unsupported public key algorithm")}}class zn{static get tag(){return _.packet.symEncryptedSessionKey}constructor(e=B){this.version=e.aeadProtect?6:4,this.sessionKey=null,this.sessionKeyEncryptionAlgorithm=null,this.sessionKeyAlgorithm=_.symmetric.aes256,this.aeadAlgorithm=_.write(_.aead,e.preferredAEADAlgorithm),this.encrypted=null,this.s2k=null,this.iv=null}read(e){let t=0;if(this.version=e[t++],4!==this.version&&5!==this.version&&6!==this.version)throw new Rr(`Version ${this.version} of the SKESK packet is unsupported.`);6===this.version&&t++;const r=e[t++];this.version>=5&&(this.aeadAlgorithm=e[t++],6===this.version&&t++);const i=e[t++];if(this.s2k=ia(i),t+=this.s2k.read(e.subarray(t,e.length)),this.version>=5){const r=Zi.getAEADMode(this.aeadAlgorithm);this.iv=e.subarray(t,t+=r.ivLength)}this.version>=5||t<e.length?(this.encrypted=e.subarray(t,e.length),this.sessionKeyEncryptionAlgorithm=r):this.sessionKeyAlgorithm=r}write(){const e=null===this.encrypted?this.sessionKeyAlgorithm:this.sessionKeyEncryptionAlgorithm;let t;const r=this.s2k.write();if(6===this.version){const i=r.length,a=3+i+this.iv.length;t=R.concatUint8Array([new Uint8Array([this.version,a,e,this.aeadAlgorithm,i]),r,this.iv,this.encrypted])}else 5===this.version?t=R.concatUint8Array([new Uint8Array([this.version,e,this.aeadAlgorithm]),r,this.iv,this.encrypted]):(t=R.concatUint8Array([new Uint8Array([this.version,e]),r]),null!==this.encrypted&&(t=R.concatUint8Array([t,this.encrypted])));return t}async decrypt(e){const t=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm,{blockSize:r,keySize:i}=Zi.getCipherParams(t),a=await this.s2k.produceKey(e,i);if(this.version>=5){const e=Zi.getAEADMode(this.aeadAlgorithm),r=new Uint8Array([192|zn.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),n=6===this.version?await Pi(_.hash.sha256,a,new Uint8Array,r,i):a,s=await e(t,n);this.sessionKey=await s.decrypt(this.encrypted,this.iv,r)}else if(null!==this.encrypted){const e=await Zi.mode.cfb.decrypt(t,a,this.encrypted,new Uint8Array(r));this.sessionKeyAlgorithm=_.write(_.symmetric,e[0]),this.sessionKey=e.subarray(1,e.length)}else this.sessionKey=a}async encrypt(e,t=B){const r=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm;this.sessionKeyEncryptionAlgorithm=r,this.s2k=aa(t),this.s2k.generateSalt();const{blockSize:i,keySize:a}=Zi.getCipherParams(r),n=await this.s2k.produceKey(e,a);if(null===this.sessionKey&&(this.sessionKey=Zi.generateSessionKey(this.sessionKeyAlgorithm)),this.version>=5){const e=Zi.getAEADMode(this.aeadAlgorithm);this.iv=Zi.random.getRandomBytes(e.ivLength);const t=new Uint8Array([192|zn.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),i=6===this.version?await Pi(_.hash.sha256,n,new Uint8Array,t,a):n,s=await e(r,i);this.encrypted=await s.encrypt(this.sessionKey,this.iv,t)}else{const e=R.concatUint8Array([new Uint8Array([this.sessionKeyAlgorithm]),this.sessionKey]);this.encrypted=await Zi.mode.cfb.encrypt(r,n,e,new Uint8Array(i),t)}}}class On{static get tag(){return _.packet.publicKey}constructor(e=new Date,t=B){this.version=t.v6Keys?6:4,this.created=R.normalizeDate(e),this.algorithm=null,this.publicParams=null,this.expirationTimeV3=0,this.fingerprint=null,this.keyID=null}static fromSecretKeyPacket(e){const t=new On,{version:r,created:i,algorithm:a,publicParams:n,keyID:s,fingerprint:o}=e;return t.version=r,t.created=i,t.algorithm=a,t.publicParams=n,t.keyID=s,t.fingerprint=o,t}async read(e){let t=0;if(this.version=e[t++],4===this.version||5===this.version||6===this.version){this.created=R.readDate(e.subarray(t,t+4)),t+=4,this.algorithm=e[t++],this.version>=5&&(t+=4);const{read:r,publicParams:i}=Zi.parsePublicKeyParams(this.algorithm,e.subarray(t));if(6===this.version&&i.oid&&(i.oid.getName()===_.curve.curve25519Legacy||i.oid.getName()===_.curve.ed25519Legacy))throw Error("Legacy curve25519 cannot be used with v6 keys");return this.publicParams=i,t+=r,await this.computeFingerprintAndKeyID(),t}throw new Rr(`Version ${this.version} of the key packet is unsupported.`)}write(){const e=[];e.push(new Uint8Array([this.version])),e.push(R.writeDate(this.created)),e.push(new Uint8Array([this.algorithm]));const t=Zi.serializeParams(this.algorithm,this.publicParams);return this.version>=5&&e.push(R.writeNumber(t.length,4)),e.push(t),R.concatUint8Array(e)}writeForHash(e){const t=this.writePublicKey(),r=149+e,i=e>=5?4:2;return R.concatUint8Array([new Uint8Array([r]),R.writeNumber(t.length,i),t])}isDecrypted(){return null}getCreationTime(){return this.created}getKeyID(){return this.keyID}async computeFingerprintAndKeyID(){if(await this.computeFingerprint(),this.keyID=new mn,this.version>=5)this.keyID.read(this.fingerprint.subarray(0,8));else{if(4!==this.version)throw Error("Unsupported key version");this.keyID.read(this.fingerprint.subarray(12,20))}}async computeFingerprint(){const e=this.writeForHash(this.version);if(this.version>=5)this.fingerprint=await Zi.hash.sha256(e);else{if(4!==this.version)throw Error("Unsupported key version");this.fingerprint=await Zi.hash.sha1(e)}}getFingerprintBytes(){return this.fingerprint}getFingerprint(){return R.uint8ArrayToHex(this.getFingerprintBytes())}hasSameFingerprintAs(e){return this.version===e.version&&R.equalsUint8Array(this.writePublicKey(),e.writePublicKey())}getAlgorithmInfo(){const e={};e.algorithm=_.read(_.publicKey,this.algorithm);const t=this.publicParams.n||this.publicParams.p;return t?e.bits=R.uint8ArrayBitLength(t):this.publicParams.oid?e.curve=this.publicParams.oid.getName():this.publicParams.cipher&&(e.symmetric=this.publicParams.cipher.getName()),e}}On.prototype.readPublicKey=On.prototype.read,On.prototype.writePublicKey=On.prototype.write;const Hn=/*#__PURE__*/R.constructAllowedPackets([fn,Un,Kn,kn]);class jn{static get tag(){return _.packet.symmetricallyEncryptedData}constructor(){this.encrypted=null,this.packets=null}read(e){this.encrypted=e}write(){return this.encrypted}async decrypt(e,t,r=B){if(!r.allowUnauthenticatedMessages)throw Error("Message is not authenticated.");const{blockSize:i}=Zi.getCipherParams(e),a=await U(K(this.encrypted)),n=await Zi.mode.cfb.decrypt(e,t,a.subarray(i+2),a.subarray(2,i+2));this.packets=await Sn.fromBinary(n,Hn,r)}async encrypt(e,t,r=B){const i=this.packets.write(),{blockSize:a}=Zi.getCipherParams(e),n=await Zi.getPrefixRandom(e),s=await Zi.mode.cfb.encrypt(e,t,n,new Uint8Array(a),r),o=await Zi.mode.cfb.encrypt(e,t,i,s.subarray(2),r);this.encrypted=R.concat([s,o])}}class qn{static get tag(){return _.packet.marker}read(e){return 80===e[0]&&71===e[1]&&80===e[2]}write(){return new Uint8Array([80,71,80])}}class Gn extends On{static get tag(){return _.packet.publicSubkey}constructor(e,t){super(e,t)}static fromSecretSubkeyPacket(e){const t=new Gn,{version:r,created:i,algorithm:a,publicParams:n,keyID:s,fingerprint:o}=e;return t.version=r,t.created=i,t.algorithm=a,t.publicParams=n,t.keyID=s,t.fingerprint=o,t}}class Vn{static get tag(){return _.packet.userAttribute}constructor(){this.attributes=[]}read(e){let t=0;for(;t<e.length;){const r=Cr(e.subarray(t,e.length));t+=r.offset,this.attributes.push(R.uint8ArrayToString(e.subarray(t,t+r.len))),t+=r.len}}write(){const e=[];for(let t=0;t<this.attributes.length;t++)e.push(xr(this.attributes[t].length)),e.push(R.stringToUint8Array(this.attributes[t]));return R.concatUint8Array(e)}equals(e){return!!(e&&e instanceof Vn)&&this.attributes.every((function(t,r){return t===e.attributes[r]}))}}class Wn extends On{static get tag(){return _.packet.secretKey}constructor(e=new Date,t=B){super(e,t),this.keyMaterial=null,this.isEncrypted=null,this.s2kUsage=0,this.s2k=null,this.symmetric=null,this.aead=null,this.isLegacyAEAD=null,this.privateParams=null,this.usedModernAEAD=null}async read(e,t=B){let r=await this.readPublicKey(e);const i=r;this.s2kUsage=e[r++],5===this.version&&r++,6===this.version&&this.s2kUsage&&r++;try{if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){this.symmetric=e[r++],253===this.s2kUsage&&(this.aead=e[r++]),6===this.version&&r++;const t=e[r++];if(this.s2k=ia(t),r+=this.s2k.read(e.subarray(r,e.length)),"gnu-dummy"===this.s2k.type)return}else this.s2kUsage&&(this.symmetric=this.s2kUsage);this.s2kUsage&&(this.isLegacyAEAD=253===this.s2kUsage&&(5===this.version||4===this.version&&t.parseAEADEncryptedV4KeysAsLegacy),253!==this.s2kUsage||this.isLegacyAEAD?(this.iv=e.subarray(r,r+Zi.getCipherParams(this.symmetric).blockSize),this.usedModernAEAD=!1):(this.iv=e.subarray(r,r+Zi.getAEADMode(this.aead).ivLength),this.usedModernAEAD=!0),r+=this.iv.length)}catch(t){if(!this.s2kUsage)throw t;this.unparseableKeyMaterial=e.subarray(i),this.isEncrypted=!0}if(5===this.version&&(r+=4),this.keyMaterial=e.subarray(r),this.isEncrypted=!!this.s2kUsage,!this.isEncrypted){let e;if(6===this.version)e=this.keyMaterial;else if(e=this.keyMaterial.subarray(0,-2),!R.equalsUint8Array(R.writeChecksum(e),this.keyMaterial.subarray(-2)))throw Error("Key checksum mismatch");try{const{read:t,privateParams:r}=Zi.parsePrivateKeyParams(this.algorithm,e,this.publicParams);if(t<e.length)throw Error("Error reading MPIs");this.privateParams=r}catch(e){if(e instanceof Rr)throw e;throw Error("Error reading MPIs")}}}write(){const e=this.writePublicKey();if(this.unparseableKeyMaterial)return R.concatUint8Array([e,this.unparseableKeyMaterial]);const t=[e];t.push(new Uint8Array([this.s2kUsage]));const r=[];if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){r.push(this.symmetric),253===this.s2kUsage&&r.push(this.aead);const e=this.s2k.write();6===this.version&&r.push(e.length),r.push(...e)}return this.s2kUsage&&"gnu-dummy"!==this.s2k.type&&r.push(...this.iv),(5===this.version||6===this.version&&this.s2kUsage)&&t.push(new Uint8Array([r.length])),t.push(new Uint8Array(r)),this.isDummy()||(this.s2kUsage||(this.keyMaterial=Zi.serializeParams(this.algorithm,this.privateParams)),5===this.version&&t.push(R.writeNumber(this.keyMaterial.length,4)),t.push(this.keyMaterial),this.s2kUsage||6===this.version||t.push(R.writeChecksum(this.keyMaterial))),R.concatUint8Array(t)}isDecrypted(){return!1===this.isEncrypted}isMissingSecretKeyMaterial(){return void 0!==this.unparseableKeyMaterial||this.isDummy()}isDummy(){return!(!this.s2k||"gnu-dummy"!==this.s2k.type)}makeDummy(e=B){this.isDummy()||(this.isDecrypted()&&this.clearPrivateParams(),delete this.unparseableKeyMaterial,this.isEncrypted=null,this.keyMaterial=null,this.s2k=ia(_.s2k.gnu,e),this.s2k.algorithm=0,this.s2k.c=0,this.s2k.type="gnu-dummy",this.s2kUsage=254,this.symmetric=_.symmetric.aes256,this.isLegacyAEAD=null,this.usedModernAEAD=null)}async encrypt(e,t=B){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key packet is already encrypted");if(!e)throw Error("A non-empty passphrase is required for key encryption.");this.s2k=aa(t),this.s2k.generateSalt();const r=Zi.serializeParams(this.algorithm,this.privateParams);this.symmetric=_.symmetric.aes256;const{blockSize:i}=Zi.getCipherParams(this.symmetric);if(t.aeadProtect){this.s2kUsage=253,this.aead=_.aead.eax;const t=Zi.getAEADMode(this.aead);this.isLegacyAEAD=5===this.version,this.usedModernAEAD=!this.isLegacyAEAD;const a=Ir(this.constructor.tag),n=await $n(this.version,this.s2k,e,this.symmetric,this.aead,a),s=await t(this.symmetric,n);this.iv=this.isLegacyAEAD?Zi.random.getRandomBytes(i):Zi.random.getRandomBytes(t.ivLength);const o=this.isLegacyAEAD?new Uint8Array:R.concatUint8Array([a,this.writePublicKey()]);this.keyMaterial=await s.encrypt(r,this.iv.subarray(0,t.ivLength),o)}else{this.s2kUsage=254,this.usedModernAEAD=!1;const a=await $n(this.version,this.s2k,e,this.symmetric);this.iv=Zi.random.getRandomBytes(i),this.keyMaterial=await Zi.mode.cfb.encrypt(this.symmetric,a,R.concatUint8Array([r,await Zi.hash.sha1(r,t)]),this.iv,t)}}async decrypt(e){if(this.isDummy())return!1;if(this.unparseableKeyMaterial)throw Error("Key packet cannot be decrypted: unsupported S2K or cipher algo");if(this.isDecrypted())throw Error("Key packet is already decrypted.");let t;const r=Ir(this.constructor.tag);if(254!==this.s2kUsage&&253!==this.s2kUsage)throw 255===this.s2kUsage?Error("Encrypted private key is authenticated using an insecure two-byte hash"):Error("Private key is encrypted using an insecure S2K function: unsalted MD5");let i;if(t=await $n(this.version,this.s2k,e,this.symmetric,this.aead,r,this.isLegacyAEAD),253===this.s2kUsage){const e=Zi.getAEADMode(this.aead),a=await e(this.symmetric,t);try{const t=this.isLegacyAEAD?new Uint8Array:R.concatUint8Array([r,this.writePublicKey()]);i=await a.decrypt(this.keyMaterial,this.iv.subarray(0,e.ivLength),t)}catch(e){if("Authentication tag mismatch"===e.message)throw Error("Incorrect key passphrase: "+e.message);throw e}}else{const e=await Zi.mode.cfb.decrypt(this.symmetric,t,this.keyMaterial,this.iv);i=e.subarray(0,-20);const r=await Zi.hash.sha1(i);if(!R.equalsUint8Array(r,e.subarray(-20)))throw Error("Incorrect key passphrase")}try{const{privateParams:e}=Zi.parsePrivateKeyParams(this.algorithm,i,this.publicParams);this.privateParams=e}catch(e){throw Error("Error reading MPIs")}this.isEncrypted=!1,this.keyMaterial=null,this.s2kUsage=0,this.aead=null,this.symmetric=null,this.isLegacyAEAD=null}async validate(){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key is not decrypted");if(this.usedModernAEAD)return;let e;try{e=await Zi.validateParams(this.algorithm,this.publicParams,this.privateParams)}catch(t){e=!1}if(!e)throw Error("Key is invalid")}async generate(e,t,r){if(6===this.version&&(this.algorithm===_.publicKey.ecdh&&t===_.curve.curve25519Legacy||this.algorithm===_.publicKey.eddsaLegacy))throw Error(`Cannot generate v6 keys of type 'ecc' with curve ${t}. Generate a key of type 'curve25519' instead`);const{privateParams:i,publicParams:a}=await Zi.generateParams(this.algorithm,e,t,r);this.privateParams=i,this.publicParams=a,this.isEncrypted=!1}clearPrivateParams(){this.isMissingSecretKeyMaterial()||(Object.keys(this.privateParams).forEach((e=>{this.privateParams[e].fill(0),delete this.privateParams[e]})),this.privateParams=null,this.isEncrypted=!0)}}async function $n(e,t,r,i,a,n,s){const{keySize:o}=Zi.getCipherParams(i),c=await t.produceKey(r,o);if(!a||5===e||s)return c;const u=R.concatUint8Array([n,new Uint8Array([e,i,a])]);return Pi(_.hash.sha256,c,new Uint8Array,u,o)}class Xn{static get tag(){return _.packet.userID}constructor(){this.userID="",this.name="",this.email="",this.comment=""}static fromObject(e){if(R.isString(e)||e.name&&!R.isString(e.name)||e.email&&!R.isEmailAddress(e.email)||e.comment&&!R.isString(e.comment))throw Error("Invalid user ID format");const t=new Xn;Object.assign(t,e);const r=[];return t.name&&r.push(t.name),t.comment&&r.push(`(${t.comment})`),t.email&&r.push(`<${t.email}>`),t.userID=r.join(" "),t}read(e,t=B){const r=R.decodeUTF8(e);if(r.length>t.maxUserIDLength)throw Error("User ID string is too long");const i=/^(?<name>[^()]+\s+)?(?<comment>\([^()]+\)\s+)?(?<email><\S+@\S+>)$/.exec(r);if(null!==i){const{name:e,comment:t,email:r}=i.groups;this.comment=t?.replace(/^\(|\)|\s$/g,"").trim()||"",this.name=e?.trim()||"",this.email=r.substring(1,r.length-1)}else/^[^\s@]+@[^\s@]+$/.test(r)&&(this.email=r);this.userID=r}write(){return R.encodeUTF8(this.userID)}equals(e){return e&&e.userID===this.userID}}class Zn extends Wn{static get tag(){return _.packet.secretSubkey}constructor(e=new Date,t=B){super(e,t)}}class Qn{static get tag(){return _.packet.trust}read(){throw new Rr("Trust packets are not supported")}write(){throw new Rr("Trust packets are not supported")}}class Yn{static get tag(){return _.packet.padding}constructor(){this.padding=null}read(e){}write(){return this.padding}async createPadding(e){this.padding=await Zi.random.getRandomBytes(e)}}const Jn=/*#__PURE__*/R.constructAllowedPackets([kn]);class es{constructor(e){this.packets=e||new Sn}write(){return this.packets.write()}armor(e=B){return X(_.armor.signature,this.write(),void 0,void 0,void 0,e)}getSigningKeyIDs(){return this.packets.map((e=>e.issuerKeyID))}}async function ts({armoredSignature:e,binarySignature:t,config:r,...i}){r={...B,...r};let a=e||t;if(!a)throw Error("readSignature: must pass options object containing `armoredSignature` or `binarySignature`");if(e&&!R.isString(e))throw Error("readSignature: options.armoredSignature must be a string");if(t&&!R.isUint8Array(t))throw Error("readSignature: options.binarySignature must be a Uint8Array");const n=Object.keys(i);if(n.length>0)throw Error("Unknown option: "+n.join(", "));if(e){const{type:e,data:t}=await $(a);if(e!==_.armor.signature)throw Error("Armored text not of type signature");a=t}const s=await Sn.fromBinary(a,Jn,r);return new es(s)}async function rs(e,t){const r=new Zn(e.date,t);return r.packets=null,r.algorithm=_.write(_.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function is(e,t){const r=new Wn(e.date,t);return r.packets=null,r.algorithm=_.write(_.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function as(e,t,r,i,a=new Date,n){let s,o;for(let c=e.length-1;c>=0;c--)try{(!s||e[c].created>=s.created)&&(await e[c].verify(t,r,i,a,void 0,n),s=e[c])}catch(e){o=e}if(!s)throw R.wrapError(`Could not find valid ${_.read(_.signature,r)} signature in key ${t.getKeyID().toHex()}`.replace("certGeneric ","self-").replace(/([a-z])([A-Z])/g,((e,t,r)=>t+" "+r.toLowerCase())),o);return s}function ns(e,t,r=new Date){const i=R.normalizeDate(r);if(null!==i){const r=hs(e,t);return!(e.created<=i&&i<r)}return!1}async function ss(e,t,r,i){const a={};a.key=t,a.bind=e;const n={signatureType:_.signature.subkeyBinding};r.sign?(n.keyFlags=[_.keyFlags.signData],n.embeddedSignature=await os(a,null,e,{signatureType:_.signature.keyBinding},r.date,void 0,void 0,void 0,i)):n.keyFlags=r.forwarding?[_.keyFlags.forwardedCommunication]:[_.keyFlags.encryptCommunication|_.keyFlags.encryptStorage],r.keyExpirationTime>0&&(n.keyExpirationTime=r.keyExpirationTime,n.keyNeverExpires=!1);return await os(a,null,t,n,r.date,void 0,void 0,void 0,i)}async function os(e,t,r,i,a,n,s=[],o=!1,c){if(r.isDummy())throw Error("Cannot sign with a gnu-dummy key.");if(!r.isDecrypted())throw Error("Signing key is not decrypted.");const u=new kn;return Object.assign(u,i),u.publicKeyAlgorithm=r.algorithm,u.hashAlgorithm=await async function(e,t,r=new Date,i={},a){let n=a.preferredHashAlgorithm,s=n;if(e){const t=await e.getPrimarySelfSignature(r,i,a);t.preferredHashAlgorithms&&([s]=t.preferredHashAlgorithms,n=Zi.hash.getHashByteLength(n)<=Zi.hash.getHashByteLength(s)?s:n)}switch(t.algorithm){case _.publicKey.ecdsa:case _.publicKey.eddsaLegacy:case _.publicKey.ed25519:case _.publicKey.ed448:s=Zi.getPreferredCurveHashAlgo(t.algorithm,t.publicParams.oid)}return Zi.hash.getHashByteLength(n)<=Zi.hash.getHashByteLength(s)?s:n}(t,r,a,n,c),u.rawNotations=s,await u.sign(r,e,a,o),u}async function cs(e,t,r,i=new Date,a){(e=e[r])&&(t[r].length?await Promise.all(e.map((async function(e){e.isExpired(i)||a&&!await a(e)||t[r].some((function(t){return R.equalsUint8Array(t.writeParams(),e.writeParams())}))||t[r].push(e)}))):t[r]=e)}async function us(e,t,r,i,a,n,s=new Date,o){n=n||e;const c=[];return await Promise.all(i.map((async function(e){try{a&&!e.issuerKeyID.equals(a.issuerKeyID)||(await e.verify(n,t,r,o.revocationsExpire?s:null,!1,o),c.push(e.issuerKeyID))}catch(e){}}))),a?(a.revoked=!!c.some((e=>e.equals(a.issuerKeyID)))||(a.revoked||!1),a.revoked):c.length>0}function hs(e,t){let r;return!1===t.keyNeverExpires&&(r=e.created.getTime()+1e3*t.keyExpirationTime),r?new Date(r):1/0}function ys(e,t={}){if(e.type=e.type||t.type,e.curve=e.curve||t.curve,e.rsaBits=e.rsaBits||t.rsaBits,e.symmetricHash=e.symmetricHash||t.symmetricHash,e.symmetricCipher=e.symmetricCipher||t.symmetricCipher,e.keyExpirationTime=void 0!==e.keyExpirationTime?e.keyExpirationTime:t.keyExpirationTime,e.passphrase=R.isString(e.passphrase)?e.passphrase:t.passphrase,e.date=e.date||t.date,e.sign=e.sign||!1,e.forwarding=e.forwarding||!1,e.sign&&e.forwarding)throw Error('Incompatible options: "sign" and "forwarding" cannot be set together');switch(e.type){case"ecc":try{e.curve=_.write(_.curve,e.curve)}catch(e){throw Error("Unknown curve")}e.curve!==_.curve.ed25519Legacy&&e.curve!==_.curve.curve25519Legacy&&"ed25519"!==e.curve&&"curve25519"!==e.curve||(e.curve=e.sign?_.curve.ed25519Legacy:_.curve.curve25519Legacy),e.sign?e.algorithm=e.curve===_.curve.ed25519Legacy?_.publicKey.eddsaLegacy:_.publicKey.ecdsa:e.algorithm=_.publicKey.ecdh;break;case"curve25519":e.algorithm=e.sign?_.publicKey.ed25519:_.publicKey.x25519;break;case"curve448":e.algorithm=e.sign?_.publicKey.ed448:_.publicKey.x448;break;case"rsa":e.algorithm=_.publicKey.rsaEncryptSign;break;case"symmetric":if(e.sign){e.algorithm=_.publicKey.hmac;try{e.symmetric=_.write(_.hash,e.symmetricHash)}catch(e){throw Error("Unknown hash algorithm")}}else{e.algorithm=_.publicKey.aead;try{e.symmetric=_.write(_.symmetric,e.symmetricCipher)}catch(e){throw Error("Unknown symmetric algorithm")}}break;default:throw Error("Unsupported key type "+e.type)}return e}function ls(e,t,r){switch(e.algorithm){case _.publicKey.rsaEncryptSign:case _.publicKey.rsaSign:case _.publicKey.dsa:case _.publicKey.ecdsa:case _.publicKey.eddsaLegacy:case _.publicKey.ed25519:case _.publicKey.ed448:case _.publicKey.hmac:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||0!=(t.keyFlags[0]&_.keyFlags.signData);default:return!1}}function ps(e,t,r){switch(e.algorithm){case _.publicKey.rsaEncryptSign:case _.publicKey.rsaEncrypt:case _.publicKey.elgamal:case _.publicKey.ecdh:case _.publicKey.x25519:case _.publicKey.x448:case _.publicKey.aead:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||0!=(t.keyFlags[0]&_.keyFlags.encryptCommunication)||0!=(t.keyFlags[0]&_.keyFlags.encryptStorage);default:return!1}}function gs(e,t,r){if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");switch(e.algorithm){case _.publicKey.rsaEncryptSign:case _.publicKey.rsaEncrypt:case _.publicKey.elgamal:case _.publicKey.ecdh:case _.publicKey.x25519:case _.publicKey.x448:return!(!(!t.keyFlags||0!=(t.keyFlags[0]&_.keyFlags.signData))||!r.allowInsecureDecryptionWithSigningKeys)||(!t.keyFlags||0!=(t.keyFlags[0]&_.keyFlags.encryptCommunication)||0!=(t.keyFlags[0]&_.keyFlags.encryptStorage)||r.allowForwardedMessages&&0!=(t.keyFlags[0]&_.keyFlags.forwardedCommunication));default:return!1}}function ds(e,t){const r=_.write(_.publicKey,e.algorithm),i=e.getAlgorithmInfo();if(t.rejectPublicKeyAlgorithms.has(r))throw Error(i.algorithm+" keys are considered too weak.");switch(r){case _.publicKey.rsaEncryptSign:case _.publicKey.rsaSign:case _.publicKey.rsaEncrypt:if(i.bits<t.minRSABits)throw Error(`RSA keys shorter than ${t.minRSABits} bits are considered too weak.`);break;case _.publicKey.ecdsa:case _.publicKey.eddsaLegacy:case _.publicKey.ecdh:if(t.rejectCurves.has(i.curve))throw Error(`Support for ${i.algorithm} keys using curve ${i.curve} is disabled.`)}}class fs{constructor(e,t){this.userID=e.constructor.tag===_.packet.userID?e:null,this.userAttribute=e.constructor.tag===_.packet.userAttribute?e:null,this.selfCertifications=[],this.otherCertifications=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new Sn;return e.push(this.userID||this.userAttribute),e.push(...this.revocationSignatures),e.push(...this.selfCertifications),e.push(...this.otherCertifications),e}clone(){const e=new fs(this.userID||this.userAttribute,this.mainKey);return e.selfCertifications=[...this.selfCertifications],e.otherCertifications=[...this.otherCertifications],e.revocationSignatures=[...this.revocationSignatures],e}async certify(e,t,r){const i=this.mainKey.keyPacket,a={userID:this.userID,userAttribute:this.userAttribute,key:i},n=new fs(a.userID||a.userAttribute,this.mainKey);return n.otherCertifications=await Promise.all(e.map((async function(e){if(!e.isPrivate())throw Error("Need private key for signing");if(e.hasSameFingerprintAs(i))throw Error("The user's own key can only be used for self-certifications");const n=await e.getSigningKey(void 0,t,void 0,r);return os(a,e,n.keyPacket,{signatureType:_.signature.certGeneric,keyFlags:[_.keyFlags.certifyKeys|_.keyFlags.signData]},t,void 0,void 0,void 0,r)}))),await n.update(this,t,r),n}async isRevoked(e,t,r=new Date,i=B){const a=this.mainKey.keyPacket;return us(a,_.signature.certRevocation,{key:a,userID:this.userID,userAttribute:this.userAttribute},this.revocationSignatures,e,t,r,i)}async verifyCertificate(e,t,r=new Date,i){const a=this,n=this.mainKey.keyPacket,s={userID:this.userID,userAttribute:this.userAttribute,key:n},{issuerKeyID:o}=e,c=t.filter((e=>e.getKeys(o).length>0));return 0===c.length?null:(await Promise.all(c.map((async t=>{const n=await t.getSigningKey(o,e.created,void 0,i);if(e.revoked||await a.isRevoked(e,n.keyPacket,r,i))throw Error("User certificate is revoked");try{await e.verify(n.keyPacket,_.signature.certGeneric,s,r,void 0,i)}catch(e){throw R.wrapError("User certificate is invalid",e)}}))),!0)}async verifyAllCertifications(e,t=new Date,r){const i=this,a=this.selfCertifications.concat(this.otherCertifications);return Promise.all(a.map((async a=>({keyID:a.issuerKeyID,valid:await i.verifyCertificate(a,e,t,r).catch((()=>!1))}))))}async verify(e=new Date,t){if(!this.selfCertifications.length)throw Error("No self-certifications found");const r=this,i=this.mainKey.keyPacket,a={userID:this.userID,userAttribute:this.userAttribute,key:i};let n;for(let s=this.selfCertifications.length-1;s>=0;s--)try{const n=this.selfCertifications[s];if(n.revoked||await r.isRevoked(n,void 0,e,t))throw Error("Self-certification is revoked");try{await n.verify(i,_.signature.certGeneric,a,e,void 0,t)}catch(e){throw R.wrapError("Self-certification is invalid",e)}return!0}catch(e){n=e}throw n}async update(e,t,r){const i=this.mainKey.keyPacket,a={userID:this.userID,userAttribute:this.userAttribute,key:i};await cs(e,this,"selfCertifications",t,(async function(e){try{return await e.verify(i,_.signature.certGeneric,a,t,!1,r),!0}catch(e){return!1}})),await cs(e,this,"otherCertifications",t),await cs(e,this,"revocationSignatures",t,(function(e){return us(i,_.signature.certRevocation,a,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=_.reasonForRevocation.noReason,string:r=""}={},i=new Date,a=B){const n={userID:this.userID,userAttribute:this.userAttribute,key:e},s=new fs(n.userID||n.userAttribute,this.mainKey);return s.revocationSignatures.push(await os(n,null,e,{signatureType:_.signature.certRevocation,reasonForRevocationFlag:_.write(_.reasonForRevocation,t),reasonForRevocationString:r},i,void 0,void 0,!1,a)),await s.update(this),s}}class ms{constructor(e,t){this.keyPacket=e,this.bindingSignatures=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new Sn;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.bindingSignatures),e}clone(){const e=new ms(this.keyPacket,this.mainKey);return e.bindingSignatures=[...this.bindingSignatures],e.revocationSignatures=[...this.revocationSignatures],e}async isRevoked(e,t,r=new Date,i=B){const a=this.mainKey.keyPacket;return us(a,_.signature.subkeyRevocation,{key:a,bind:this.keyPacket},this.revocationSignatures,e,t,r,i)}async verify(e=new Date,t=B){const r=this.mainKey.keyPacket,i={key:r,bind:this.keyPacket},a=await as(this.bindingSignatures,r,_.signature.subkeyBinding,i,e,t);if(a.revoked||await this.isRevoked(a,null,e,t))throw Error("Subkey is revoked");if(ns(this.keyPacket,a,e))throw Error("Subkey is expired");return a}async getExpirationTime(e=new Date,t=B){const r=this.mainKey.keyPacket,i={key:r,bind:this.keyPacket};let a;try{a=await as(this.bindingSignatures,r,_.signature.subkeyBinding,i,e,t)}catch(e){return null}const n=hs(this.keyPacket,a),s=a.getExpirationTime();return n<s?n:s}async update(e,t=new Date,r=B){const i=this.mainKey.keyPacket;if(!this.hasSameFingerprintAs(e))throw Error("Subkey update method: fingerprints of subkeys not equal");this.keyPacket.constructor.tag===_.packet.publicSubkey&&e.keyPacket.constructor.tag===_.packet.secretSubkey&&(this.keyPacket=e.keyPacket);const a=this,n={key:i,bind:a.keyPacket};await cs(e,this,"bindingSignatures",t,(async function(e){for(let t=0;t<a.bindingSignatures.length;t++)if(a.bindingSignatures[t].issuerKeyID.equals(e.issuerKeyID))return e.created>a.bindingSignatures[t].created&&(a.bindingSignatures[t]=e),!1;try{return await e.verify(i,_.signature.subkeyBinding,n,t,void 0,r),!0}catch(e){return!1}})),await cs(e,this,"revocationSignatures",t,(function(e){return us(i,_.signature.subkeyRevocation,n,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=_.reasonForRevocation.noReason,string:r=""}={},i=new Date,a=B){const n={key:e,bind:this.keyPacket},s=new ms(this.keyPacket,this.mainKey);return s.revocationSignatures.push(await os(n,null,e,{signatureType:_.signature.subkeyRevocation,reasonForRevocationFlag:_.write(_.reasonForRevocation,t),reasonForRevocationString:r},i,void 0,void 0,!1,a)),await s.update(this),s}hasSameFingerprintAs(e){return this.keyPacket.hasSameFingerprintAs(e.keyPacket||e)}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","isDecrypted"].forEach((e=>{ms.prototype[e]=function(){return this.keyPacket[e]()}}));const ws=/*#__PURE__*/R.constructAllowedPackets([kn]),bs=new Set([_.packet.publicKey,_.packet.privateKey]),ks=new Set([_.packet.publicKey,_.packet.privateKey,_.packet.publicSubkey,_.packet.privateSubkey]);class vs{packetListToStructure(e,t=new Set){let r,i,a,n;for(const s of e){if(s instanceof Fr){ks.has(s.tag)&&!n&&(n=bs.has(s.tag)?bs:ks);continue}const e=s.constructor.tag;if(n){if(!n.has(e))continue;n=null}if(t.has(e))throw Error("Unexpected packet type: "+e);switch(e){case _.packet.publicKey:case _.packet.secretKey:if(this.keyPacket)throw Error("Key block contains multiple keys");if(this.keyPacket=s,i=this.getKeyID(),!i)throw Error("Missing Key ID");break;case _.packet.userID:case _.packet.userAttribute:r=new fs(s,this),this.users.push(r);break;case _.packet.publicSubkey:case _.packet.secretSubkey:r=null,a=new ms(s,this),this.subkeys.push(a);break;case _.packet.signature:switch(s.signatureType){case _.signature.certGeneric:case _.signature.certPersona:case _.signature.certCasual:case _.signature.certPositive:if(!r){R.printDebug("Dropping certification signatures without preceding user packet");continue}s.issuerKeyID.equals(i)?r.selfCertifications.push(s):r.otherCertifications.push(s);break;case _.signature.certRevocation:r?r.revocationSignatures.push(s):this.directSignatures.push(s);break;case _.signature.key:this.directSignatures.push(s);break;case _.signature.subkeyBinding:if(!a){R.printDebug("Dropping subkey binding signature without preceding subkey packet");continue}a.bindingSignatures.push(s);break;case _.signature.keyRevocation:this.revocationSignatures.push(s);break;case _.signature.subkeyRevocation:if(!a){R.printDebug("Dropping subkey revocation signature without preceding subkey packet");continue}a.revocationSignatures.push(s)}}}}toPacketList(){const e=new Sn;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.directSignatures),this.users.map((t=>e.push(...t.toPacketList()))),this.subkeys.map((t=>e.push(...t.toPacketList()))),e}clone(e=!1){const t=new this.constructor(this.toPacketList());return e&&t.getKeys().forEach((e=>{if(e.keyPacket=Object.create(Object.getPrototypeOf(e.keyPacket),Object.getOwnPropertyDescriptors(e.keyPacket)),!e.keyPacket.isDecrypted())return;const t={};Object.keys(e.keyPacket.privateParams).forEach((r=>{t[r]=new Uint8Array(e.keyPacket.privateParams[r])})),e.keyPacket.privateParams=t})),t}getSubkeys(e=null){return this.subkeys.filter((t=>!e||t.getKeyID().equals(e,!0)))}getKeys(e=null){const t=[];return e&&!this.getKeyID().equals(e,!0)||t.push(this),t.concat(this.getSubkeys(e))}getKeyIDs(){return this.getKeys().map((e=>e.getKeyID()))}getUserIDs(){return this.users.map((e=>e.userID?e.userID.userID:null)).filter((e=>null!==e))}write(){return this.toPacketList().write()}async getSigningKey(e=null,t=new Date,r={},i=B){await this.verifyPrimaryKey(t,r,i);const a=this.keyPacket;try{ds(a,i)}catch(e){throw R.wrapError("Could not verify primary key",e)}const n=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created));let s;for(const r of n)if(!e||r.getKeyID().equals(e))try{await r.verify(t,i);const e={key:a,bind:r.keyPacket},n=await as(r.bindingSignatures,a,_.signature.subkeyBinding,e,t,i);if(!ls(r.keyPacket,n,i))continue;if(!n.embeddedSignature)throw Error("Missing embedded signature");return await as([n.embeddedSignature],r.keyPacket,_.signature.keyBinding,e,t,i),ds(r.keyPacket,i),r}catch(e){s=e}try{const n=await this.getPrimarySelfSignature(t,r,i);if((!e||a.getKeyID().equals(e))&&ls(a,n,i))return ds(a,i),this}catch(e){s=e}throw R.wrapError("Could not find valid signing key packet in key "+this.getKeyID().toHex(),s)}async getEncryptionKey(e,t=new Date,r={},i=B){await this.verifyPrimaryKey(t,r,i);const a=this.keyPacket;try{ds(a,i)}catch(e){throw R.wrapError("Could not verify primary key",e)}const n=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created));let s;for(const r of n)if(!e||r.getKeyID().equals(e))try{await r.verify(t,i);const e={key:a,bind:r.keyPacket},n=await as(r.bindingSignatures,a,_.signature.subkeyBinding,e,t,i);if(ps(r.keyPacket,n,i))return ds(r.keyPacket,i),r}catch(e){s=e}try{const n=await this.getPrimarySelfSignature(t,r,i);if((!e||a.getKeyID().equals(e))&&ps(a,n,i))return ds(a,i),this}catch(e){s=e}throw R.wrapError("Could not find valid encryption key packet in key "+this.getKeyID().toHex(),s)}async isRevoked(e,t,r=new Date,i=B){return us(this.keyPacket,_.signature.keyRevocation,{key:this.keyPacket},this.revocationSignatures,e,t,r,i)}async verifyPrimaryKey(e=new Date,t={},r=B){const i=this.keyPacket;if(await this.isRevoked(null,null,e,r))throw Error("Primary key is revoked");if(ns(i,await this.getPrimarySelfSignature(e,t,r),e))throw Error("Primary key is expired");if(6!==i.version){const t=await as(this.directSignatures,i,_.signature.key,{key:i},e,r).catch((()=>{}));if(t&&ns(i,t,e))throw Error("Primary key is expired")}}async getExpirationTime(e,t=B){let r;try{const i=await this.getPrimarySelfSignature(null,e,t),a=hs(this.keyPacket,i),n=i.getExpirationTime(),s=6!==this.keyPacket.version&&await as(this.directSignatures,this.keyPacket,_.signature.key,{key:this.keyPacket},null,t).catch((()=>{}));if(s){const e=hs(this.keyPacket,s);r=Math.min(a,n,e)}else r=a<n?a:n}catch(e){r=null}return R.normalizeDate(r)}async getPrimarySelfSignature(e=new Date,t={},r=B){const i=this.keyPacket;if(6===i.version)return as(this.directSignatures,i,_.signature.key,{key:i},e,r);const{selfCertification:a}=await this.getPrimaryUser(e,t,r);return a}async getPrimaryUser(e=new Date,t={},r=B){const i=this.keyPacket,a=[];let n;for(let s=0;s<this.users.length;s++)try{const n=this.users[s];if(!n.userID)continue;if(void 0!==t.name&&n.userID.name!==t.name||void 0!==t.email&&n.userID.email!==t.email||void 0!==t.comment&&n.userID.comment!==t.comment)throw Error("Could not find user that matches that user ID");const o={userID:n.userID,key:i},c=await as(n.selfCertifications,i,_.signature.certGeneric,o,e,r);a.push({index:s,user:n,selfCertification:c})}catch(e){n=e}if(!a.length)throw n||Error("Could not find primary user");await Promise.all(a.map((async function(t){return t.selfCertification.revoked||t.user.isRevoked(t.selfCertification,null,e,r)})));const s=a.sort((function(e,t){const r=e.selfCertification,i=t.selfCertification;return i.revoked-r.revoked||r.isPrimaryUserID-i.isPrimaryUserID||r.created-i.created})).pop(),{user:o,selfCertification:c}=s;if(c.revoked||await o.isRevoked(c,null,e,r))throw Error("Primary user is revoked");return s}async update(e,t=new Date,r=B){if(!this.hasSameFingerprintAs(e))throw Error("Primary key fingerprints must be equal to update the key");if(!this.isPrivate()&&e.isPrivate()){if(!(this.subkeys.length===e.subkeys.length&&this.subkeys.every((t=>e.subkeys.some((e=>t.hasSameFingerprintAs(e)))))))throw Error("Cannot update public key with private key if subkeys mismatch");return e.update(this,r)}const i=this.clone();return await cs(e,i,"revocationSignatures",t,(a=>us(i.keyPacket,_.signature.keyRevocation,i,[a],null,e.keyPacket,t,r))),await cs(e,i,"directSignatures",t),await Promise.all(e.users.map((async e=>{const a=i.users.filter((t=>e.userID&&e.userID.equals(t.userID)||e.userAttribute&&e.userAttribute.equals(t.userAttribute)));if(a.length>0)await Promise.all(a.map((i=>i.update(e,t,r))));else{const t=e.clone();t.mainKey=i,i.users.push(t)}}))),await Promise.all(e.subkeys.map((async e=>{const a=i.subkeys.filter((t=>t.hasSameFingerprintAs(e)));if(a.length>0)await Promise.all(a.map((i=>i.update(e,t,r))));else{const t=e.clone();t.mainKey=i,i.subkeys.push(t)}}))),i}async getRevocationCertificate(e=new Date,t=B){const r={key:this.keyPacket},i=await as(this.revocationSignatures,this.keyPacket,_.signature.keyRevocation,r,e,t),a=new Sn;return a.push(i),X(_.armor.publicKey,a.write(),null,null,"This is a revocation certificate")}async applyRevocationCertificate(e,t=new Date,r=B){const i=await $(e),a=(await Sn.fromBinary(i.data,ws,r)).findPacket(_.packet.signature);if(!a||a.signatureType!==_.signature.keyRevocation)throw Error("Could not find revocation signature packet");if(!a.issuerKeyID.equals(this.getKeyID()))throw Error("Revocation signature does not match key");try{await a.verify(this.keyPacket,_.signature.keyRevocation,{key:this.keyPacket},t,void 0,r)}catch(e){throw R.wrapError("Could not verify revocation signature",e)}const n=this.clone();return n.revocationSignatures.push(a),n}async signPrimaryUser(e,t,r,i=B){const{index:a,user:n}=await this.getPrimaryUser(t,r,i),s=await n.certify(e,t,i),o=this.clone();return o.users[a]=s,o}async signAllUsers(e,t=new Date,r=B){const i=this.clone();return i.users=await Promise.all(this.users.map((function(i){return i.certify(e,t,r)}))),i}async verifyPrimaryUser(e,t=new Date,r,i=B){const a=this.keyPacket,{user:n}=await this.getPrimaryUser(t,r,i);return e?await n.verifyAllCertifications(e,t,i):[{keyID:a.getKeyID(),valid:await n.verify(t,i).catch((()=>!1))}]}async verifyAllUsers(e,t=new Date,r=B){const i=this.keyPacket,a=[];return await Promise.all(this.users.map((async n=>{const s=e?await n.verifyAllCertifications(e,t,r):[{keyID:i.getKeyID(),valid:await n.verify(t,r).catch((()=>!1))}];a.push(...s.map((e=>({userID:n.userID?n.userID.userID:null,userAttribute:n.userAttribute,keyID:e.keyID,valid:e.valid}))))}))),a}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","hasSameFingerprintAs"].forEach((e=>{vs.prototype[e]=ms.prototype[e]}));class As extends vs{constructor(e){if(super(),this.keyPacket=null,this.revocationSignatures=[],this.directSignatures=[],this.users=[],this.subkeys=[],e&&(this.packetListToStructure(e,new Set([_.packet.secretKey,_.packet.secretSubkey])),!this.keyPacket))throw Error("Invalid key: missing public-key packet")}isPrivate(){return!1}toPublic(){return this}armor(e=B){return X(_.armor.publicKey,this.toPacketList().write(),void 0,void 0,void 0,e)}}class Ks extends As{constructor(e){if(super(),this.packetListToStructure(e,new Set([_.packet.publicKey,_.packet.publicSubkey])),!this.keyPacket)throw Error("Invalid key: missing private-key packet")}isPrivate(){return!0}toPublic(){const e=new Sn,t=this.toPacketList();let r=!1;for(const i of t)if(!r||i.constructor.tag!==_.packet.Signature)switch(r&&(r=!1),i.constructor.tag){case _.packet.secretKey:{if(i.algorithm===_.publicKey.aead||i.algorithm===_.publicKey.hmac)throw Error("Cannot create public key from symmetric private");const t=On.fromSecretKeyPacket(i);e.push(t);break}case _.packet.secretSubkey:{if(i.algorithm===_.publicKey.aead||i.algorithm===_.publicKey.hmac){r=!0;break}const t=Gn.fromSecretSubkeyPacket(i);e.push(t);break}default:e.push(i)}return new As(e)}armor(e=B){return X(_.armor.privateKey,this.toPacketList().write(),void 0,void 0,void 0,e)}async getDecryptionKeys(e,t=new Date,r={},i=B){const a=this.keyPacket,n=[];for(let r=0;r<this.subkeys.length;r++)if(!e||this.subkeys[r].getKeyID().equals(e,!0))try{const e={key:a,bind:this.subkeys[r].keyPacket},s=await as(this.subkeys[r].bindingSignatures,a,_.signature.subkeyBinding,e,t,i);gs(this.subkeys[r].keyPacket,s,i)&&n.push(this.subkeys[r])}catch(e){}const s=await this.getPrimarySelfSignature(t,r,i);return e&&!a.getKeyID().equals(e,!0)||!gs(a,s,i)||n.push(this),n}isDecrypted(){return this.getKeys().some((({keyPacket:e})=>e.isDecrypted()))}async validate(e=B){if(!this.isPrivate())throw Error("Cannot validate a public key");let t;if(this.keyPacket.isDummy()){const r=await this.getSigningKey(null,null,void 0,{...e,rejectPublicKeyAlgorithms:new Set,minRSABits:0});r&&!r.keyPacket.isDummy()&&(t=r.keyPacket)}else t=this.keyPacket;if(t)return t.validate();{const e=this.getKeys();if(e.map((e=>e.keyPacket.isDummy())).every(Boolean))throw Error("Cannot validate an all-gnu-dummy key");return Promise.all(e.map((async e=>e.keyPacket.validate())))}}clearPrivateParams(){this.getKeys().forEach((({keyPacket:e})=>{e.isDecrypted()&&e.clearPrivateParams()}))}async revoke({flag:e=_.reasonForRevocation.noReason,string:t=""}={},r=new Date,i=B){if(!this.isPrivate())throw Error("Need private key for revoking");const a={key:this.keyPacket},n=this.clone();return n.revocationSignatures.push(await os(a,null,this.keyPacket,{signatureType:_.signature.keyRevocation,reasonForRevocationFlag:_.write(_.reasonForRevocation,e),reasonForRevocationString:t},r,void 0,void 0,void 0,i)),n}async addSubkey(e={}){const t={...B,...e.config};if(e.passphrase)throw Error("Subkey could not be encrypted here, please encrypt whole key");if(e.rsaBits<t.minRSABits)throw Error(`rsaBits should be at least ${t.minRSABits}, got: ${e.rsaBits}`);const r=this.keyPacket;if(r.isDummy())throw Error("Cannot add subkey to gnu-dummy primary key");if(!r.isDecrypted())throw Error("Key is not decrypted");const i=r.getAlgorithmInfo();i.type=function(e){switch(_.write(_.publicKey,e)){case _.publicKey.rsaEncrypt:case _.publicKey.rsaEncryptSign:case _.publicKey.rsaSign:case _.publicKey.dsa:return"rsa";case _.publicKey.ecdsa:case _.publicKey.eddsaLegacy:return"ecc";case _.publicKey.ed25519:return"curve25519";case _.publicKey.ed448:return"curve448";default:throw Error("Unsupported algorithm")}}(i.algorithm),i.rsaBits=i.bits||4096,i.curve=i.curve||"curve25519Legacy",e=ys(e,i);const a=await rs(e,{...t,v6Keys:6===this.keyPacket.version});ds(a,t);const n=await ss(a,r,e,t),s=this.toPacketList();return s.push(a,n),new Ks(s)}}const Es=/*#__PURE__*/R.constructAllowedPackets([On,Gn,Wn,Zn,Xn,Vn,kn]);function Ss(e){for(const t of e)switch(t.constructor.tag){case _.packet.secretKey:return new Ks(e);case _.packet.publicKey:return new As(e)}throw Error("No key packet found")}async function Ps(e,t,r,i){r.passphrase&&await e.encrypt(r.passphrase,i),await Promise.all(t.map((async function(e,t){const a=r.subkeys[t].passphrase;a&&await e.encrypt(a,i)})));const a=new Sn;function n(e,t){return[t,...e.filter((e=>e!==t))]}function s(){const t={};t.keyFlags=[_.keyFlags.certifyKeys|_.keyFlags.signData];const a=n([_.symmetric.aes256,_.symmetric.aes128],i.preferredSymmetricAlgorithm);if(t.preferredSymmetricAlgorithms=a,i.aeadProtect){const e=n([_.aead.gcm,_.aead.eax,_.aead.ocb],i.preferredAEADAlgorithm);t.preferredCipherSuites=e.flatMap((e=>a.map((t=>[t,e]))))}return t.preferredHashAlgorithms=n([_.hash.sha256,_.hash.sha512,...6===e.version?[_.hash.sha3_256,_.hash.sha3_512]:[]],i.preferredHashAlgorithm),t.preferredCompressionAlgorithms=n([_.compression.uncompressed,_.compression.zlib,_.compression.zip],i.preferredCompressionAlgorithm),t.features=[0],t.features[0]|=_.features.modificationDetection,i.aeadProtect&&(t.features[0]|=_.features.seipdv2),r.keyExpirationTime>0&&(t.keyExpirationTime=r.keyExpirationTime,t.keyNeverExpires=!1),t}if(a.push(e),6===e.version){const t={key:e},n=s();n.signatureType=_.signature.key;const o=await os(t,null,e,n,r.date,void 0,void 0,void 0,i);a.push(o)}await Promise.all(r.userIDs.map((async function(t,a){const n=Xn.fromObject(t),o={userID:n,key:e},c=6!==e.version?s():{};c.signatureType=_.signature.certGeneric,0===a&&(c.isPrimaryUserID=!0);return{userIDPacket:n,signaturePacket:await os(o,null,e,c,r.date,void 0,void 0,void 0,i)}}))).then((e=>{e.forEach((({userIDPacket:e,signaturePacket:t})=>{a.push(e),a.push(t)}))})),await Promise.all(t.map((async function(t,a){const n=r.subkeys[a];return{secretSubkeyPacket:t,subkeySignaturePacket:await ss(t,e,n,i)}}))).then((e=>{e.forEach((({secretSubkeyPacket:e,subkeySignaturePacket:t})=>{a.push(e),a.push(t)}))}));const o={key:e};return a.push(await os(o,null,e,{signatureType:_.signature.keyRevocation,reasonForRevocationFlag:_.reasonForRevocation.noReason,reasonForRevocationString:""},r.date,void 0,void 0,void 0,i)),r.passphrase&&e.clearPrivateParams(),await Promise.all(t.map((async function(e,t){r.subkeys[t].passphrase&&e.clearPrivateParams()}))),new Ks(a)}async function Us({armoredKey:e,binaryKey:t,config:r,...i}){if(r={...B,...r},!e&&!t)throw Error("readKey: must pass options object containing `armoredKey` or `binaryKey`");if(e&&!R.isString(e))throw Error("readKey: options.armoredKey must be a string");if(t&&!R.isUint8Array(t))throw Error("readKey: options.binaryKey must be a Uint8Array");const a=Object.keys(i);if(a.length>0)throw Error("Unknown option: "+a.join(", "));let n;if(e){const{type:t,data:r}=await $(e);if(t!==_.armor.publicKey&&t!==_.armor.privateKey)throw Error("Armored text not of type key");n=r}else n=t;return Ss(await Sn.fromBinary(n,Es,r))}async function Ds({armoredKey:e,binaryKey:t,config:r,...i}){if(r={...B,...r},!e&&!t)throw Error("readPrivateKey: must pass options object containing `armoredKey` or `binaryKey`");if(e&&!R.isString(e))throw Error("readPrivateKey: options.armoredKey must be a string");if(t&&!R.isUint8Array(t))throw Error("readPrivateKey: options.binaryKey must be a Uint8Array");const a=Object.keys(i);if(a.length>0)throw Error("Unknown option: "+a.join(", "));let n;if(e){const{type:t,data:r}=await $(e);if(t!==_.armor.privateKey)throw Error("Armored text not of type private key");n=r}else n=t;const s=await Sn.fromBinary(n,Es,r);return new Ks(s)}async function Cs({armoredKeys:e,binaryKeys:t,config:r,...i}){r={...B,...r};let a=e||t;if(!a)throw Error("readKeys: must pass options object containing `armoredKeys` or `binaryKeys`");if(e&&!R.isString(e))throw Error("readKeys: options.armoredKeys must be a string");if(t&&!R.isUint8Array(t))throw Error("readKeys: options.binaryKeys must be a Uint8Array");const n=Object.keys(i);if(n.length>0)throw Error("Unknown option: "+n.join(", "));if(e){const{type:t,data:r}=await $(e);if(t!==_.armor.publicKey&&t!==_.armor.privateKey)throw Error("Armored text not of type key");a=r}const s=[],o=await Sn.fromBinary(a,Es,r),c=o.indexOfTag(_.packet.publicKey,_.packet.secretKey);if(0===c.length)throw Error("No key packet found");for(let e=0;e<c.length;e++){const t=Ss(o.slice(c[e],c[e+1]));s.push(t)}return s}async function xs({armoredKeys:e,binaryKeys:t,config:r}){r={...B,...r};let i=e||t;if(!i)throw Error("readPrivateKeys: must pass options object containing `armoredKeys` or `binaryKeys`");if(e&&!R.isString(e))throw Error("readPrivateKeys: options.armoredKeys must be a string");if(t&&!R.isUint8Array(t))throw Error("readPrivateKeys: options.binaryKeys must be a Uint8Array");if(e){const{type:t,data:r}=await $(e);if(t!==_.armor.privateKey)throw Error("Armored text not of type private key");i=r}const a=[],n=await Sn.fromBinary(i,Es,r),s=n.indexOfTag(_.packet.secretKey);if(0===s.length)throw Error("No secret key packet found");for(let e=0;e<s.length;e++){const t=n.slice(s[e],s[e+1]),r=new Ks(t);a.push(r)}return a}const Ts=/*#__PURE__*/R.constructAllowedPackets([fn,Un,Ln,Bn,jn,Fn,zn,Kn,kn]),Is=/*#__PURE__*/R.constructAllowedPackets([zn]),_s=/*#__PURE__*/R.constructAllowedPackets([kn]);class Bs{constructor(e){this.packets=e||new Sn}getEncryptionKeyIDs(){const e=[];return this.packets.filterByTag(_.packet.publicKeyEncryptedSessionKey).forEach((function(t){e.push(t.publicKeyID)})),e}getSigningKeyIDs(){const e=this.unwrapCompressed(),t=e.packets.filterByTag(_.packet.onePassSignature);if(t.length>0)return t.map((e=>e.issuerKeyID));return e.packets.filterByTag(_.packet.signature).map((e=>e.issuerKeyID))}async decrypt(e,t,r,i=new Date,a=B){const n=this.packets.filterByTag(_.packet.symmetricallyEncryptedData,_.packet.symEncryptedIntegrityProtectedData,_.packet.aeadEncryptedData);if(0===n.length)throw Error("No encrypted data found");const s=n[0],o=s.cipherAlgorithm,c=r||await this.decryptSessionKeys(e,t,o,i,a);let u=null;const h=Promise.all(c.map((async({algorithm:e,data:t})=>{if(!R.isUint8Array(t)||!s.cipherAlgorithm&&!R.isString(e))throw Error("Invalid session key for decryption.");try{const r=s.cipherAlgorithm||_.write(_.symmetric,e);await s.decrypt(r,t,a)}catch(e){R.printDebugError(e),u=e}})));if(D(s.encrypted),s.encrypted=null,await h,!s.packets||!s.packets.length)throw u||Error("Decryption failed.");const y=new Bs(s.packets);return s.packets=new Sn,y}async decryptSessionKeys(e,t,r,i=new Date,a=B){let n,s=[];if(t){const e=this.packets.filterByTag(_.packet.symEncryptedSessionKey);if(0===e.length)throw Error("No symmetrically encrypted session key packet found.");await Promise.all(t.map((async function(t,r){let i;i=r?await Sn.fromBinary(e.write(),Is,a):e,await Promise.all(i.map((async function(e){try{await e.decrypt(t),s.push(e)}catch(e){R.printDebugError(e),e instanceof Qi&&(n=e)}})))})))}else{if(!e)throw Error("No key or password specified.");{const t=this.packets.filterByTag(_.packet.publicKeyEncryptedSessionKey);if(0===t.length)throw Error("No public key encrypted session key packet found.");await Promise.all(t.map((async function(t){await Promise.all(e.map((async function(e){let o=[_.symmetric.aes256,_.symmetric.aes128,_.symmetric.tripledes,_.symmetric.cast5];try{const t=await e.getPrimarySelfSignature(i,void 0,a);t.preferredSymmetricAlgorithms&&(o=o.concat(t.preferredSymmetricAlgorithms))}catch(e){}const c=(await e.getDecryptionKeys(t.publicKeyID,null,void 0,a)).map((e=>e.keyPacket));await Promise.all(c.map((async function(e){if(!e||e.isDummy())return;if(!e.isDecrypted())throw Error("Decryption key is not decrypted.");if(a.constantTimePKCS1Decryption&&(t.publicKeyAlgorithm===_.publicKey.rsaEncrypt||t.publicKeyAlgorithm===_.publicKey.rsaEncryptSign||t.publicKeyAlgorithm===_.publicKey.rsaSign||t.publicKeyAlgorithm===_.publicKey.elgamal)){const i=t.write();await Promise.all((r?[r]:Array.from(a.constantTimePKCS1DecryptionSupportedSymmetricAlgorithms)).map((async t=>{const r=new Fn;r.read(i);const a={sessionKeyAlgorithm:t,sessionKey:Zi.generateSessionKey(t)};try{await r.decrypt(e,a),s.push(r)}catch(e){R.printDebugError(e),n=e}})))}else try{await t.decrypt(e);const i=r||t.sessionKeyAlgorithm;if(i&&!o.includes(_.write(_.symmetric,i)))throw Error("A non-preferred symmetric algorithm was used.");s.push(t)}catch(e){R.printDebugError(e),n=e}})))}))),D(t.encrypted),t.encrypted=null})))}}if(s.length>0){if(s.length>1){const e=new Set;s=s.filter((t=>{const r=t.sessionKeyAlgorithm+R.uint8ArrayToString(t.sessionKey);return!e.has(r)&&(e.add(r),!0)}))}return s.map((e=>({data:e.sessionKey,algorithm:e.sessionKeyAlgorithm&&_.read(_.symmetric,e.sessionKeyAlgorithm)})))}throw n||Error("Session key decryption failed.")}getLiteralData(){const e=this.unwrapCompressed().packets.findPacket(_.packet.literalData);return e&&e.getBytes()||null}getFilename(){const e=this.unwrapCompressed().packets.findPacket(_.packet.literalData);return e&&e.getFilename()||null}getText(){const e=this.unwrapCompressed().packets.findPacket(_.packet.literalData);return e?e.getText():null}static async generateSessionKey(e=[],t=new Date,r=[],i=B){const{symmetricAlgo:a,aeadAlgo:n}=await async function(e=[],t=new Date,r=[],i=B){const a=await Promise.all(e.map(((e,a)=>e.getPrimarySelfSignature(t,r[a],i))));if(e.length?a.every((e=>e.features[0]&_.features.seipdv2)):i.aeadProtect){const e={symmetricAlgo:_.symmetric.aes128,aeadAlgo:_.aead.ocb},t={symmetricAlgo:i.preferredSymmetricAlgorithm,aeadAlgo:i.preferredAEADAlgorithm};return a.every((e=>e.preferredCipherSuites&&e.preferredCipherSuites.some((e=>e[0]===t.symmetricAlgo&&e[1]===t.aeadAlgo))))?t:e}const n=_.symmetric.aes128,s=i.preferredSymmetricAlgorithm;return{symmetricAlgo:a.every((e=>e.preferredSymmetricAlgorithms&&e.preferredSymmetricAlgorithms.includes(s)))?s:n,aeadAlgo:void 0}}(e,t,r,i),s=_.read(_.symmetric,a),o=n?_.read(_.aead,n):void 0;await Promise.all(e.map((e=>e.getEncryptionKey().catch((()=>null)).then((e=>{if(e&&(e.keyPacket.algorithm===_.publicKey.x25519||e.keyPacket.algorithm===_.publicKey.x448)&&!o&&!R.isAES(a))throw Error("Could not generate a session key compatible with the given `encryptionKeys`: X22519 and X448 keys can only be used to encrypt AES session keys; change `config.preferredSymmetricAlgorithm` accordingly.")})))));return{data:Zi.generateSessionKey(a),algorithm:s,aeadAlgorithm:o}}async encrypt(e,t,r,i=!1,a=[],n=new Date,s=[],o=B){if(r){if(!R.isUint8Array(r.data)||!R.isString(r.algorithm))throw Error("Invalid session key for encryption.")}else if(e&&e.length)r=await Bs.generateSessionKey(e,n,s,o);else{if(!t||!t.length)throw Error("No keys, passwords, or session key provided.");r=await Bs.generateSessionKey(void 0,void 0,void 0,o)}const{data:c,algorithm:u,aeadAlgorithm:h}=r,y=await Bs.encryptSessionKey(c,u,h,e,t,i,a,n,s,o),l=Bn.fromObject({version:h?2:1,aeadAlgorithm:h?_.write(_.aead,h):null});l.packets=this.packets;const p=_.write(_.symmetric,u);return await l.encrypt(p,c,o),y.packets.push(l),l.packets=new Sn,y}static async encryptSessionKey(e,t,r,i,a,n=!1,s=[],o=new Date,c=[],u=B){const h=new Sn,y=_.write(_.symmetric,t),l=r&&_.write(_.aead,r);if(i){const t=await Promise.all(i.map((async function(t,r){const i=await t.getEncryptionKey(s[r],o,c,u),a=Fn.fromObject({version:l?6:3,encryptionKeyPacket:i.keyPacket,anonymousRecipient:n,sessionKey:e,sessionKeyAlgorithm:y});return await a.encrypt(i.keyPacket),delete a.sessionKey,a})));h.push(...t)}if(a){const t=async function(e,t){try{return await e.decrypt(t),1}catch(e){return 0}},r=(e,t)=>e+t,i=async function(e,n,s,o){const c=new zn(u);if(c.sessionKey=e,c.sessionKeyAlgorithm=n,s&&(c.aeadAlgorithm=s),await c.encrypt(o,u),u.passwordCollisionCheck){if(1!==(await Promise.all(a.map((e=>t(c,e))))).reduce(r))return i(e,n,o)}return delete c.sessionKey,c},n=await Promise.all(a.map((t=>i(e,y,l,t))));h.push(...n)}return new Bs(h)}async sign(e=[],t=null,r=[],i=new Date,a=[],n=[],s=B){const o=new Sn,c=this.packets.findPacket(_.packet.literalData);if(!c)throw Error("No literal data packet to sign.");const u=await Ms(c,e,t,r,i,a,n,!1,s),h=u.map(((e,t)=>Kn.fromSignaturePacket(e,0===t))).reverse();return o.push(...h),o.push(c),o.push(...u),new Bs(o)}compress(e,t=B){if(e===_.compression.uncompressed)return this;const r=new Un(t);r.algorithm=e,r.packets=this.packets;const i=new Sn;return i.push(r),new Bs(i)}async signDetached(e=[],t=null,r=[],i=new Date,a=[],n=[],s=B){const o=this.packets.findPacket(_.packet.literalData);if(!o)throw Error("No literal data packet to sign.");return new es(await Ms(o,e,t,r,i,a,n,!0,s))}async verify(e,t=new Date,r=B){const i=this.unwrapCompressed(),a=i.packets.filterByTag(_.packet.literalData);if(1!==a.length)throw Error("Can only verify message with one literal data packet.");s(i.packets.stream)&&i.packets.push(...await U(i.packets.stream,(e=>e||[])));const n=i.packets.filterByTag(_.packet.onePassSignature).reverse(),o=i.packets.filterByTag(_.packet.signature);return n.length&&!o.length&&R.isStream(i.packets.stream)&&!s(i.packets.stream)?(await Promise.all(n.map((async e=>{e.correspondingSig=new Promise(((t,r)=>{e.correspondingSigResolve=t,e.correspondingSigReject=r})),e.signatureData=C((async()=>(await e.correspondingSig).signatureData)),e.hashed=U(await e.hash(e.signatureType,a[0],void 0,!1)),e.hashed.catch((()=>{}))}))),i.packets.stream=v(i.packets.stream,(async(e,t)=>{const r=x(e),i=T(t);try{for(let e=0;e<n.length;e++){const{value:t}=await r.read();n[e].correspondingSigResolve(t)}await r.readToEnd(),await i.ready,await i.close()}catch(e){n.forEach((t=>{t.correspondingSigReject(e)})),await i.abort(e)}})),Rs(n,a,e,t,!1,r)):Rs(o,a,e,t,!1,r)}verifyDetached(e,t,r=new Date,i=B){const a=this.unwrapCompressed().packets.filterByTag(_.packet.literalData);if(1!==a.length)throw Error("Can only verify message with one literal data packet.");return Rs(e.packets.filterByTag(_.packet.signature),a,t,r,!0,i)}unwrapCompressed(){const e=this.packets.filterByTag(_.packet.compressedData);return e.length?new Bs(e[0].packets):this}async appendSignature(e,t=B){await this.packets.read(R.isUint8Array(e)?e:(await $(e)).data,_s,t)}write(){return this.packets.write()}armor(e=B){return X(_.armor.message,this.write(),null,null,null,e)}}async function Ms(e,t,r=null,i=[],a=new Date,n=[],s=[],o=!1,c=B){const u=new Sn,h=null===e.text?_.signature.binary:_.signature.text;if(await Promise.all(t.map((async(t,r)=>{const u=n[r];if(!t.isPrivate())throw Error("Need private key for signing");const y=await t.getSigningKey(i[r],a,u,c);return os(e,t,y.keyPacket,{signatureType:h},a,u,s,o,c)}))).then((e=>{u.push(...e)})),r){const e=r.packets.filterByTag(_.packet.signature);u.push(...e)}return u}async function Rs(e,t,r,i=new Date,a=!1,n=B){return Promise.all(e.filter((function(e){return["text","binary"].includes(_.read(_.signature,e.signatureType))})).map((async function(e){return async function(e,t,r,i=new Date,a=!1,n=B){let s,o;for(const t of r){const r=t.getKeys(e.issuerKeyID);if(r.length>0){s=t,o=r[0];break}}const c=e instanceof Kn?e.correspondingSig:e,u={keyID:e.issuerKeyID,verified:(async()=>{if(!o)throw Error("Could not find signing key with key ID "+e.issuerKeyID.toHex());await e.verify(o.keyPacket,e.signatureType,t[0],i,a,n);const r=await c;if(o.getCreationTime()>r.created)throw Error("Key is newer than the signature");try{await s.getSigningKey(o.getKeyID(),r.created,void 0,n)}catch(e){if(!n.allowInsecureVerificationWithReformattedKeys||!e.message.match(/Signature creation time is in the future/))throw e;await s.getSigningKey(o.getKeyID(),i,void 0,n)}return!0})(),signature:(async()=>{const e=await c,t=new Sn;return e&&t.push(e),new es(t)})()};return u.signature.catch((()=>{})),u.verified.catch((()=>{})),u}(e,t,r,i,a,n)})))}async function Ls({armoredMessage:e,binaryMessage:t,config:r,...i}){r={...B,...r};let a=e||t;if(!a)throw Error("readMessage: must pass options object containing `armoredMessage` or `binaryMessage`");if(e&&!R.isString(e)&&!R.isStream(e))throw Error("readMessage: options.armoredMessage must be a string or stream");if(t&&!R.isUint8Array(t)&&!R.isStream(t))throw Error("readMessage: options.binaryMessage must be a Uint8Array or stream");const n=Object.keys(i);if(n.length>0)throw Error("Unknown option: "+n.join(", "));const s=R.isStream(a);if(e){const{type:e,data:t}=await $(a);if(e!==_.armor.message)throw Error("Armored text not of type message");a=t}const o=await Sn.fromBinary(a,Ts,r),c=new Bs(o);return c.fromStream=s,c}async function Fs({text:e,binary:t,filename:r,date:i=new Date,format:a=(void 0!==e?"utf8":"binary"),...n}){const s=void 0!==e?e:t;if(void 0===s)throw Error("createMessage: must pass options object containing `text` or `binary`");if(e&&!R.isString(e)&&!R.isStream(e))throw Error("createMessage: options.text must be a string or stream");if(t&&!R.isUint8Array(t)&&!R.isStream(t))throw Error("createMessage: options.binary must be a Uint8Array or stream");const o=Object.keys(n);if(o.length>0)throw Error("Unknown option: "+o.join(", "));const c=R.isStream(s),u=new fn(i);void 0!==e?u.setText(s,_.write(_.literal,a)):u.setBytes(s,_.write(_.literal,a)),void 0!==r&&u.setFilename(r);const h=new Sn;h.push(u);const y=new Bs(h);return y.fromStream=c,y}const Ns=/*#__PURE__*/R.constructAllowedPackets([kn]);class zs{constructor(e,t){if(this.text=R.removeTrailingSpaces(e).replace(/\r?\n/g,"\r\n"),t&&!(t instanceof es))throw Error("Invalid signature input");this.signature=t||new es(new Sn)}getSigningKeyIDs(){const e=[];return this.signature.packets.forEach((function(t){e.push(t.issuerKeyID)})),e}async sign(e,t=null,r=[],i=new Date,a=[],n=[],s=B){const o=new fn;o.setText(this.text);const c=new es(await Ms(o,e,t,r,i,a,n,!0,s));return new zs(this.text,c)}verify(e,t=new Date,r=B){const i=this.signature.packets.filterByTag(_.packet.signature),a=new fn;return a.setText(this.text),Rs(i,[a],e,t,!0,r)}getText(){return this.text.replace(/\r\n/g,"\n")}armor(e=B){const t={hash:this.signature.packets.some((e=>6!==e.version))?Array.from(new Set(this.signature.packets.map((e=>_.read(_.hash,e.hashAlgorithm).toUpperCase())))).join():null,text:this.text,data:this.signature.packets.write()};return X(_.armor.signed,t,void 0,void 0,void 0,e)}}async function Os({cleartextMessage:e,config:t,...r}){if(t={...B,...t},!e)throw Error("readCleartextMessage: must pass options object containing `cleartextMessage`");if(!R.isString(e))throw Error("readCleartextMessage: options.cleartextMessage must be a string");const i=Object.keys(r);if(i.length>0)throw Error("Unknown option: "+i.join(", "));const a=await $(e);if(a.type!==_.armor.signed)throw Error("No cleartext signed message.");const n=await Sn.fromBinary(a.data,Ns,t);!function(e,t){const r=function(e){const r=e=>t=>e.hashAlgorithm===t;for(let i=0;i<t.length;i++)if(t[i].constructor.tag===_.packet.signature&&!e.some(r(t[i])))return!1;return!0},i=[];if(e.forEach((e=>{const t=e.match(/^Hash: (.+)$/);if(!t)throw Error('Only "Hash" header allowed in cleartext signed message');{const e=t[1].replace(/\s/g,"").split(",").map((e=>{try{return _.write(_.hash,e.toLowerCase())}catch(t){throw Error("Unknown hash algorithm in armor header: "+e.toLowerCase())}}));i.push(...e)}})),i.length&&!r(i))throw Error("Hash algorithm mismatch in armor header and signature")}(a.headers,n);const s=new es(n);return new zs(a.text,s)}async function Hs({text:e,...t}){if(!e)throw Error("createCleartextMessage: must pass options object containing `text`");if(!R.isString(e))throw Error("createCleartextMessage: options.text must be a string");const r=Object.keys(t);if(r.length>0)throw Error("Unknown option: "+r.join(", "));return new zs(e)}async function js({userIDs:e=[],passphrase:t,type:r,curve:i,rsaBits:a=4096,symmetricHash:n="sha256",symmetricCipher:s="aes256",keyExpirationTime:o=0,date:c=new Date,subkeys:u=[{}],format:h="armored",config:y,...l}){no(y={...B,...y}),r||i?(r=r||"ecc",i=i||"curve25519Legacy"):(r=y.v6Keys?"curve25519":"ecc",i="curve25519Legacy"),e=so(e);const p=Object.keys(l);if(p.length>0)throw Error("Unknown option: "+p.join(", "));if(0===e.length&&!y.v6Keys)throw Error("UserIDs are required for V4 keys");if("rsa"===r&&a<y.minRSABits)throw Error(`rsaBits should be at least ${y.minRSABits}, got: ${a}`);const g={userIDs:e,passphrase:t,type:r,rsaBits:a,curve:i,keyExpirationTime:o,date:c,subkeys:u,symmetricHash:n,symmetricCipher:s};try{const{key:e,revocationCertificate:t}=await async function(e,t){e.sign=!0,(e=ys(e)).subkeys=e.subkeys.map(((t,r)=>ys(e.subkeys[r],e)));let r=[is(e,t)];r=r.concat(e.subkeys.map((e=>rs(e,t))));const i=await Promise.all(r),a=await Ps(i[0],i.slice(1),e,t),n=await a.getRevocationCertificate(e.date,t);return a.revocationSignatures=[],{key:a,revocationCertificate:n}}(g,y);return e.getKeys().forEach((({keyPacket:e})=>ds(e,y))),{privateKey:uo(e,h,y),publicKey:"symmetric"!==r?uo(e.toPublic(),h,y):null,revocationCertificate:t}}catch(e){throw R.wrapError("Error generating keypair",e)}}async function qs({privateKey:e,userIDs:t=[],passphrase:r,keyExpirationTime:i=0,date:a,format:n="armored",config:s,...o}){no(s={...B,...s}),t=so(t);const c=Object.keys(o);if(c.length>0)throw Error("Unknown option: "+c.join(", "));if(0===t.length&&6!==e.keyPacket.version)throw Error("UserIDs are required for V4 keys");const u={privateKey:e,userIDs:t,passphrase:r,keyExpirationTime:i,date:a};try{const{key:e,revocationCertificate:t}=await async function(e,t){e=o(e);const{privateKey:r}=e;if(!r.isPrivate())throw Error("Cannot reformat a public key");if(r.keyPacket.isDummy())throw Error("Cannot reformat a gnu-dummy primary key");if(!r.getKeys().every((({keyPacket:e})=>e.isDecrypted())))throw Error("Key is not decrypted");const i=r.keyPacket;e.subkeys||(e.subkeys=await Promise.all(r.subkeys.map((async e=>{const r=e.keyPacket,a={key:i,bind:r},n=await as(e.bindingSignatures,i,_.signature.subkeyBinding,a,null,t).catch((()=>({})));return{sign:n.keyFlags&&n.keyFlags[0]&_.keyFlags.signData,forwarding:n.keyFlags&&n.keyFlags[0]&_.keyFlags.forwardedCommunication}}))));const a=r.subkeys.map((e=>e.keyPacket));if(e.subkeys.length!==a.length)throw Error("Number of subkey options does not match number of subkeys");e.subkeys=e.subkeys.map((t=>o(t,e)));const n=await Ps(i,a,e,t),s=await n.getRevocationCertificate(e.date,t);return n.revocationSignatures=[],{key:n,revocationCertificate:s};function o(e,t={}){return e.keyExpirationTime=e.keyExpirationTime||t.keyExpirationTime,e.passphrase=R.isString(e.passphrase)?e.passphrase:t.passphrase,e.date=e.date||t.date,e}}(u,s);return{privateKey:uo(e,n,s),publicKey:uo(e.toPublic(),n,s),revocationCertificate:t}}catch(e){throw R.wrapError("Error reformatting keypair",e)}}async function Gs({key:e,revocationCertificate:t,reasonForRevocation:r,date:i=new Date,format:a="armored",config:n,...s}){no(n={...B,...n});const o=Object.keys(s);if(o.length>0)throw Error("Unknown option: "+o.join(", "));try{const s=t?await e.applyRevocationCertificate(t,i,n):await e.revoke(r,i,n);return s.isPrivate()?{privateKey:uo(s,a,n),publicKey:uo(s.toPublic(),a,n)}:{privateKey:null,publicKey:uo(s,a,n)}}catch(e){throw R.wrapError("Error revoking key",e)}}async function Vs({privateKey:e,passphrase:t,config:r,...i}){no(r={...B,...r});const a=Object.keys(i);if(a.length>0)throw Error("Unknown option: "+a.join(", "));if(!e.isPrivate())throw Error("Cannot decrypt a public key");const n=e.clone(!0),s=R.isArray(t)?t:[t];try{return await Promise.all(n.getKeys().map((e=>R.anyPromise(s.map((t=>e.keyPacket.decrypt(t))))))),await n.validate(r),n}catch(e){throw n.clearPrivateParams(),R.wrapError("Error decrypting private key",e)}}async function Ws({privateKey:e,passphrase:t,config:r,...i}){no(r={...B,...r});const a=Object.keys(i);if(a.length>0)throw Error("Unknown option: "+a.join(", "));if(!e.isPrivate())throw Error("Cannot encrypt a public key");const n=e.clone(!0),s=n.getKeys(),o=R.isArray(t)?t:Array(s.length).fill(t);if(o.length!==s.length)throw Error("Invalid number of passphrases given for key encryption");try{return await Promise.all(s.map((async(e,t)=>{const{keyPacket:i}=e;await i.encrypt(o[t],r),i.clearPrivateParams()}))),n}catch(e){throw n.clearPrivateParams(),R.wrapError("Error encrypting private key",e)}}async function $s({message:e,encryptionKeys:t,signingKeys:r,passwords:i,sessionKey:a,format:n="armored",signature:s=null,wildcard:o=!1,signingKeyIDs:c=[],encryptionKeyIDs:u=[],date:h=new Date,signingUserIDs:y=[],encryptionUserIDs:l=[],signatureNotations:p=[],config:g,...d}){if(no(g={...B,...g}),to(e),io(n),t=so(t),r=so(r),i=so(i),c=so(c),u=so(u),y=so(y),l=so(l),p=so(p),d.detached)throw Error("The `detached` option has been removed from openpgp.encrypt, separately call openpgp.sign instead. Don't forget to remove the `privateKeys` option as well.");if(d.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.encrypt, pass `encryptionKeys` instead");if(d.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.encrypt, pass `signingKeys` instead");if(void 0!==d.armor)throw Error("The `armor` option has been removed from openpgp.encrypt, pass `format` instead.");const f=Object.keys(d);if(f.length>0)throw Error("Unknown option: "+f.join(", "));r||(r=[]);try{if((r.length||s)&&(e=await e.sign(r,s,c,h,y,p,g)),e=e.compress(await async function(e=[],t=new Date,r=[],i=B){const a=_.compression.uncompressed,n=i.preferredCompressionAlgorithm,s=await Promise.all(e.map((async function(e,a){const s=(await e.getPrimarySelfSignature(t,r[a],i)).preferredCompressionAlgorithms;return!!s&&s.indexOf(n)>=0})));return s.every(Boolean)?n:a}(t,h,l,g),g),e=await e.encrypt(t,i,a,o,u,h,l,g),"object"===n)return e;return oo("armored"===n?e.armor(g):e.write())}catch(e){throw R.wrapError("Error encrypting message",e)}}async function Xs({message:e,decryptionKeys:t,passwords:r,sessionKeys:i,verificationKeys:a,expectSigned:n=!1,format:s="utf8",signature:o=null,date:c=new Date,config:u,...h}){if(no(u={...B,...u}),to(e),a=so(a),t=so(t),r=so(r),i=so(i),h.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.decrypt, pass `decryptionKeys` instead");if(h.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.decrypt, pass `verificationKeys` instead");const y=Object.keys(h);if(y.length>0)throw Error("Unknown option: "+y.join(", "));try{const h=await e.decrypt(t,r,i,c,u);a||(a=[]);const y={};if(y.signatures=o?await h.verifyDetached(o,a,c,u):await h.verify(a,c,u),y.data="binary"===s?h.getLiteralData():h.getText(),y.filename=h.getFilename(),co(y,e),n){if(0===a.length)throw Error("Verification keys are required to verify message signatures");if(0===y.signatures.length)throw Error("Message is not signed");y.data=f([y.data,C((async()=>{await R.anyPromise(y.signatures.map((e=>e.verified)))}))])}return y.data=await oo(y.data),y}catch(e){throw R.wrapError("Error decrypting message",e)}}async function Zs({message:e,signingKeys:t,format:r="armored",detached:i=!1,signingKeyIDs:a=[],date:n=new Date,signingUserIDs:s=[],signatureNotations:o=[],config:c,...u}){if(no(c={...B,...c}),ro(e),io(r),t=so(t),a=so(a),s=so(s),o=so(o),u.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.sign, pass `signingKeys` instead");if(void 0!==u.armor)throw Error("The `armor` option has been removed from openpgp.sign, pass `format` instead.");const h=Object.keys(u);if(h.length>0)throw Error("Unknown option: "+h.join(", "));if(e instanceof zs&&"binary"===r)throw Error("Cannot return signed cleartext message in binary format");if(e instanceof zs&&i)throw Error("Cannot detach-sign a cleartext message");if(!t||0===t.length)throw Error("No signing keys provided");try{let u;if(u=i?await e.signDetached(t,void 0,a,n,s,o,c):await e.sign(t,void 0,a,n,s,o,c),"object"===r)return u;return u="armored"===r?u.armor(c):u.write(),i&&(u=v(e.packets.write(),(async(e,t)=>{await Promise.all([m(u,t),U(e).catch((()=>{}))])}))),oo(u)}catch(e){throw R.wrapError("Error signing message",e)}}async function Qs({message:e,verificationKeys:t,expectSigned:r=!1,format:i="utf8",signature:a=null,date:n=new Date,config:s,...o}){if(no(s={...B,...s}),ro(e),t=so(t),o.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.verify, pass `verificationKeys` instead");const c=Object.keys(o);if(c.length>0)throw Error("Unknown option: "+c.join(", "));if(e instanceof zs&&"binary"===i)throw Error("Can't return cleartext message data as binary");if(e instanceof zs&&a)throw Error("Can't verify detached cleartext signature");try{const o={};if(o.signatures=a?await e.verifyDetached(a,t,n,s):await e.verify(t,n,s),o.data="binary"===i?e.getLiteralData():e.getText(),e.fromStream&&co(o,e),r){if(0===o.signatures.length)throw Error("Message is not signed");o.data=f([o.data,C((async()=>{await R.anyPromise(o.signatures.map((e=>e.verified)))}))])}return o.data=await oo(o.data),o}catch(e){throw R.wrapError("Error verifying signed message",e)}}async function Ys({encryptionKeys:e,date:t=new Date,encryptionUserIDs:r=[],config:i,...a}){if(no(i={...B,...i}),e=so(e),r=so(r),a.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.generateSessionKey, pass `encryptionKeys` instead");const n=Object.keys(a);if(n.length>0)throw Error("Unknown option: "+n.join(", "));try{return await Bs.generateSessionKey(e,t,r,i)}catch(e){throw R.wrapError("Error generating session key",e)}}async function Js({data:e,algorithm:t,aeadAlgorithm:r,encryptionKeys:i,passwords:a,format:n="armored",wildcard:s=!1,encryptionKeyIDs:o=[],date:c=new Date,encryptionUserIDs:u=[],config:h,...y}){if(no(h={...B,...h}),function(e,t){if(!R.isUint8Array(e))throw Error("Parameter ["+(t||"data")+"] must be of type Uint8Array")}(e),function(e,t){if(!R.isString(e))throw Error("Parameter ["+(t||"data")+"] must be of type String")}(t,"algorithm"),io(n),i=so(i),a=so(a),o=so(o),u=so(u),y.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.encryptSessionKey, pass `encryptionKeys` instead");const l=Object.keys(y);if(l.length>0)throw Error("Unknown option: "+l.join(", "));if(!(i&&0!==i.length||a&&0!==a.length))throw Error("No encryption keys or passwords provided.");try{return uo(await Bs.encryptSessionKey(e,t,r,i,a,s,o,c,u,h),n,h)}catch(e){throw R.wrapError("Error encrypting session key",e)}}async function eo({message:e,decryptionKeys:t,passwords:r,date:i=new Date,config:a,...n}){if(no(a={...B,...a}),to(e),t=so(t),r=so(r),n.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.decryptSessionKeys, pass `decryptionKeys` instead");const s=Object.keys(n);if(s.length>0)throw Error("Unknown option: "+s.join(", "));try{return await e.decryptSessionKeys(t,r,void 0,i,a)}catch(e){throw R.wrapError("Error decrypting session keys",e)}}function to(e){if(!(e instanceof Bs))throw Error("Parameter [message] needs to be of type Message")}function ro(e){if(!(e instanceof zs||e instanceof Bs))throw Error("Parameter [message] needs to be of type Message or CleartextMessage")}function io(e){if("armored"!==e&&"binary"!==e&&"object"!==e)throw Error("Unsupported format "+e)}const ao=Object.keys(B).length;function no(e){const t=Object.keys(e);if(t.length!==ao)for(const e of t)if(void 0===B[e])throw Error("Unknown config property: "+e)}function so(e){return e&&!R.isArray(e)&&(e=[e]),e}async function oo(e){return"array"===R.isStream(e)?U(e):e}function co(e,t){e.data=v(t.packets.stream,(async(t,r)=>{await m(e.data,r,{preventClose:!0});const i=T(r);try{await U(t,(e=>e)),await i.close()}catch(e){await i.abort(e)}}))}function uo(e,t,r){switch(t){case"object":return e;case"armored":return e.armor(r);case"binary":return e.write();default:throw Error("Unsupported format "+t)}}export{Ln as AEADEncryptedDataPacket,Qi as Argon2OutOfMemoryError,ea as Argon2S2K,zs as CleartextMessage,Un as CompressedDataPacket,Fi as KDFParams,fn as LiteralDataPacket,qn as MarkerPacket,Bs as Message,Kn as OnePassSignaturePacket,Sn as PacketList,Yn as PaddingPacket,Ks as PrivateKey,As as PublicKey,Fn as PublicKeyEncryptedSessionKeyPacket,On as PublicKeyPacket,Gn as PublicSubkeyPacket,Wn as SecretKeyPacket,Zn as SecretSubkeyPacket,es as Signature,kn as SignaturePacket,ms as Subkey,Bn as SymEncryptedIntegrityProtectedDataPacket,zn as SymEncryptedSessionKeyPacket,jn as SymmetricallyEncryptedDataPacket,Qn as TrustPacket,Fr as UnparseablePacket,Vn as UserAttributePacket,Xn as UserIDPacket,X as armor,B as config,Hs as createCleartextMessage,Fs as createMessage,Xs as decrypt,Vs as decryptKey,eo as decryptSessionKeys,$s as encrypt,Ws as encryptKey,Js as encryptSessionKey,_ as enums,js as generateKey,Ys as generateSessionKey,Os as readCleartextMessage,Us as readKey,Cs as readKeys,Ls as readMessage,Ds as readPrivateKey,xs as readPrivateKeys,ts as readSignature,qs as reformatKey,Gs as revokeKey,Zs as sign,$ as unarmor,Qs as verify};
|
|
3
3
|
//# sourceMappingURL=openpgp.min.mjs.map
|