@protontech/openpgp 6.1.1-patch.1 → 6.1.1-patch.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1,5 @@
1
- /*! OpenPGP.js v6.1.1-patch.1 - 2025-05-14 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
2
- const e="undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:{};import{createRequire as t}from"module";import*as r from"node:crypto";import*as n from"crypto";function i(e,t){return t.forEach((function(t){t&&"string"!=typeof t&&!Array.isArray(t)&&Object.keys(t).forEach((function(r){if("default"!==r&&!(r in e)){var n=Object.getOwnPropertyDescriptor(t,r);Object.defineProperty(e,r,n.get?n:{enumerable:!0,get:function(){return t[r]}})}}))})),Object.freeze(e)}const s=Symbol("doneWritingPromise"),a=Symbol("doneWritingResolve"),o=Symbol("doneWritingReject"),c=Symbol("readingIndex");class ArrayStream extends Array{constructor(){super(),Object.setPrototypeOf(this,ArrayStream.prototype),this[s]=new Promise(((e,t)=>{this[a]=e,this[o]=t})),this[s].catch((()=>{}))}}function u(e){return e&&e.getReader&&Array.isArray(e)}function h(e){if(!u(e)){const t=e.getWriter(),r=t.releaseLock;return t.releaseLock=()=>{t.closed.catch((function(){})),r.call(t)},t}this.stream=e}function l(t){if(u(t))return"array";if(e.ReadableStream&&e.ReadableStream.prototype.isPrototypeOf(t))return"web";if(t&&!(e.ReadableStream&&t instanceof e.ReadableStream)&&"function"==typeof t._read&&"object"==typeof t._readableState)throw Error("Native Node streams are no longer supported: please manually convert the stream to a WebStream, using e.g. `stream.Readable.toWeb`");return!(!t||!t.getReader)&&"web-like"}function y(e){return Uint8Array.prototype.isPrototypeOf(e)}function f(e){if(1===e.length)return e[0];let t=0;for(let r=0;r<e.length;r++){if(!y(e[r]))throw Error("concatUint8Array: Data must be in the form of a Uint8Array");t+=e[r].length}const r=new Uint8Array(t);let n=0;return e.forEach((function(e){r.set(e,n),n+=e.length})),r}ArrayStream.prototype.getReader=function(){return void 0===this[c]&&(this[c]=0),{read:async()=>(await this[s],this[c]===this.length?{value:void 0,done:!0}:{value:this[this[c]++],done:!1})}},ArrayStream.prototype.readToEnd=async function(e){await this[s];const t=e(this.slice(this[c]));return this.length=0,t},ArrayStream.prototype.clone=function(){const e=new ArrayStream;return e[s]=this[s].then((()=>{e.push(...this)})),e},h.prototype.write=async function(e){this.stream.push(e)},h.prototype.close=async function(){this.stream[a]()},h.prototype.abort=async function(e){return this.stream[o](e),e},h.prototype.releaseLock=function(){},"object"==typeof e.process&&e.process.versions;const g=new WeakSet,p=Symbol("externalBuffer");function d(e){if(this.stream=e,e[p]&&(this[p]=e[p].slice()),u(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{},void(this._cancel=()=>{})}if(l(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{t.closed.catch((function(){})),t.releaseLock()},void(this._cancel=t.cancel.bind(t))}let t=!1;this._read=async()=>t||g.has(e)?{value:void 0,done:!0}:(t=!0,{value:e,done:!1}),this._releaseLock=()=>{if(t)try{g.add(e)}catch(e){}}}function A(e){return l(e)?e:new ReadableStream({start(t){t.enqueue(e),t.close()}})}function w(e){if(l(e))return e;const t=new ArrayStream;return(async()=>{const r=R(t);await r.write(e),await r.close()})(),t}function m(e){return e.some((e=>l(e)&&!u(e)))?function(e){e=e.map(A);const t=E((async function(e){await Promise.all(n.map((t=>D(t,e))))}));let r=Promise.resolve();const n=e.map(((n,i)=>B(n,((n,s)=>(r=r.then((()=>b(n,t.writable,{preventClose:i!==e.length-1}))),r)))));return t.readable}(e):e.some((e=>u(e)))?function(e){const t=new ArrayStream;let r=Promise.resolve();return e.forEach(((n,i)=>(r=r.then((()=>b(n,t,{preventClose:i!==e.length-1}))),r))),t}(e):"string"==typeof e[0]?e.join(""):f(e)}async function b(e,t,{preventClose:r=!1,preventAbort:n=!1,preventCancel:i=!1}={}){if(l(e)&&!u(e)){e=A(e);try{if(e[p]){const r=R(t);for(let t=0;t<e[p].length;t++)await r.ready,await r.write(e[p][t]);r.releaseLock()}await e.pipeTo(t,{preventClose:r,preventAbort:n,preventCancel:i})}catch(e){}return}const s=Q(e=w(e)),a=R(t);try{for(;;){await a.ready;const{done:e,value:t}=await s.read();if(e){r||await a.close();break}await a.write(t)}}catch(e){n||await a.abort(e)}finally{s.releaseLock(),a.releaseLock()}}function k(e,t){const r=new TransformStream(t);return b(e,r.writable),r.readable}function E(e){let t,r,n,i=!1,s=!1;return{readable:new ReadableStream({start(e){n=e},pull(){t?t():i=!0},async cancel(t){s=!0,e&&await e(t),r&&r(t)}},{highWaterMark:0}),writable:new WritableStream({write:async function(e){if(s)throw Error("Stream is cancelled");n.enqueue(e),i?i=!1:(await new Promise(((e,n)=>{t=e,r=n})),t=null,r=null)},close:n.close.bind(n),abort:n.error.bind(n)})}}function v(e,t=()=>{},r=()=>{}){if(u(e)){const n=new ArrayStream;return(async()=>{const i=R(n);try{const n=await P(e),s=t(n),a=r();let o;o=void 0!==s&&void 0!==a?m([s,a]):void 0!==s?s:a,await i.write(o),await i.close()}catch(e){await i.abort(e)}})(),n}if(l(e))return k(e,{async transform(e,r){try{const n=await t(e);void 0!==n&&r.enqueue(n)}catch(e){r.error(e)}},async flush(e){try{const t=await r();void 0!==t&&e.enqueue(t)}catch(t){e.error(t)}}});const n=t(e),i=r();return void 0!==n&&void 0!==i?m([n,i]):void 0!==n?n:i}function B(e,t){if(l(e)&&!u(e)){let r;const n=new TransformStream({start(e){r=e}}),i=b(e,n.writable),s=E((async function(e){r.error(e),await i,await new Promise(setTimeout)}));return t(n.readable,s.writable),s.readable}e=w(e);const r=new ArrayStream;return t(e,r),r}function S(e,t){let r;const n=B(e,((e,i)=>{const s=Q(e);s.remainder=()=>(s.releaseLock(),b(e,i),n),r=t(s)}));return r}function I(e){if(u(e))return e.clone();if(l(e)){const t=function(e){if(u(e))throw Error("ArrayStream cannot be tee()d, use clone() instead");if(l(e)){const t=A(e).tee();return t[0][p]=t[1][p]=e[p],t}return[U(e),U(e)]}(e);return C(e,t[0]),t[1]}return U(e)}function K(e){return u(e)?I(e):l(e)?new ReadableStream({start(t){const r=B(e,(async(e,r)=>{const n=Q(e),i=R(r);try{for(;;){await i.ready;const{done:e,value:r}=await n.read();if(e){try{t.close()}catch(e){}return void await i.close()}try{t.enqueue(r)}catch(e){}await i.write(r)}}catch(e){t.error(e),await i.abort(e)}}));C(e,r)}}):U(e)}function C(e,t){Object.entries(Object.getOwnPropertyDescriptors(e.constructor.prototype)).forEach((([r,n])=>{"constructor"!==r&&(n.value?n.value=n.value.bind(t):n.get=n.get.bind(t),Object.defineProperty(e,r,n))}))}function U(e,t=0,r=1/0){if(u(e))throw Error("Not implemented");if(l(e)){if(t>=0&&r>=0){let n=0;return k(e,{transform(e,i){n<r?(n+e.length>=t&&i.enqueue(U(e,Math.max(t-n,0),r-n)),n+=e.length):i.terminate()}})}if(t<0&&(r<0||r===1/0)){let n=[];return v(e,(e=>{e.length>=-t?n=[e]:n.push(e)}),(()=>U(m(n),t,r)))}if(0===t&&r<0){let n;return v(e,(e=>{const i=n?m([n,e]):e;if(i.length>=-r)return n=U(i,r),U(i,t,r);n=i}))}return console.warn(`stream.slice(input, ${t}, ${r}) not implemented efficiently.`),x((async()=>U(await P(e),t,r)))}return e[p]&&(e=m(e[p].concat([e]))),y(e)?e.subarray(t,r===1/0?e.length:r):e.slice(t,r)}async function P(e,t=m){return u(e)?e.readToEnd(t):l(e)?Q(e).readToEnd(t):e}async function D(e,t){if(l(e)){if(e.cancel){const r=await e.cancel(t);return await new Promise(setTimeout),r}if(e.destroy)return e.destroy(t),await new Promise(setTimeout),t}}function x(e){const t=new ArrayStream;return(async()=>{const r=R(t);try{await r.write(await e()),await r.close()}catch(e){await r.abort(e)}})(),t}function Q(e){return new d(e)}function R(e){return new h(e)}d.prototype.read=async function(){if(this[p]&&this[p].length){return{done:!1,value:this[p].shift()}}return this._read()},d.prototype.releaseLock=function(){this[p]&&(this.stream[p]=this[p]),this._releaseLock()},d.prototype.cancel=function(e){return this._cancel(e)},d.prototype.readLine=async function(){let e,t=[];for(;!e;){let{done:r,value:n}=await this.read();if(n+="",r)return t.length?m(t):void 0;const i=n.indexOf("\n")+1;i&&(e=m(t.concat(n.substr(0,i))),t=[]),i!==n.length&&t.push(n.substr(i))}return this.unshift(...t),e},d.prototype.readByte=async function(){const{done:e,value:t}=await this.read();if(e)return;const r=t[0];return this.unshift(U(t,1)),r},d.prototype.readBytes=async function(e){const t=[];let r=0;for(;;){const{done:n,value:i}=await this.read();if(n)return t.length?m(t):void 0;if(t.push(i),r+=i.length,r>=e){const r=m(t);return this.unshift(U(r,e)),U(r,0,e)}}},d.prototype.peekBytes=async function(e){const t=await this.readBytes(e);return this.unshift(t),t},d.prototype.unshift=function(...e){this[p]||(this[p]=[]),1===e.length&&y(e[0])&&this[p].length&&e[0].length&&this[p][0].byteOffset>=e[0].length?this[p][0]=new Uint8Array(this[p][0].buffer,this[p][0].byteOffset-e[0].length,this[p][0].byteLength+e[0].length):this[p].unshift(...e.filter((e=>e&&e.length)))},d.prototype.readToEnd=async function(e=m){const t=[];for(;;){const{done:e,value:r}=await this.read();if(e)break;t.push(r)}return e(t)};const T=Symbol("byValue");var M={curve:{nistP256:"nistP256",p256:"nistP256",nistP384:"nistP384",p384:"nistP384",nistP521:"nistP521",p521:"nistP521",secp256k1:"secp256k1",ed25519Legacy:"ed25519Legacy",ed25519:"ed25519Legacy",curve25519Legacy:"curve25519Legacy",curve25519:"curve25519Legacy",brainpoolP256r1:"brainpoolP256r1",brainpoolP384r1:"brainpoolP384r1",brainpoolP512r1:"brainpoolP512r1"},kdfFlags:{replace_fingerprint:1,replace_kdf_params:2},s2k:{simple:0,salted:1,iterated:3,argon2:4,gnu:101},publicKey:{rsaEncryptSign:1,rsaEncrypt:2,rsaSign:3,elgamal:16,dsa:17,ecdh:18,ecdsa:19,eddsaLegacy:22,aedh:23,aedsa:24,x25519:25,x448:26,ed25519:27,ed448:28,pqc_mlkem_x25519:105,pqc_mldsa_ed25519:107,aead:100,hmac:101},symmetric:{idea:1,tripledes:2,cast5:3,blowfish:4,aes128:7,aes192:8,aes256:9,twofish:10},compression:{uncompressed:0,zip:1,zlib:2,bzip2:3},hash:{md5:1,sha1:2,ripemd:3,sha256:8,sha384:9,sha512:10,sha224:11,sha3_256:12,sha3_512:14},webHash:{"SHA-1":2,"SHA-256":8,"SHA-384":9,"SHA-512":10},aead:{eax:1,ocb:2,gcm:3,experimentalGCM:100},packet:{publicKeyEncryptedSessionKey:1,signature:2,symEncryptedSessionKey:3,onePassSignature:4,secretKey:5,publicKey:6,secretSubkey:7,compressedData:8,symmetricallyEncryptedData:9,marker:10,literalData:11,trust:12,userID:13,publicSubkey:14,userAttribute:17,symEncryptedIntegrityProtectedData:18,modificationDetectionCode:19,aeadEncryptedData:20,padding:21},literal:{binary:98,text:116,utf8:117,mime:109},signature:{binary:0,text:1,standalone:2,certGeneric:16,certPersona:17,certCasual:18,certPositive:19,certRevocation:48,subkeyBinding:24,keyBinding:25,key:31,keyRevocation:32,subkeyRevocation:40,timestamp:64,thirdParty:80},signatureSubpacket:{signatureCreationTime:2,signatureExpirationTime:3,exportableCertification:4,trustSignature:5,regularExpression:6,revocable:7,keyExpirationTime:9,placeholderBackwardsCompatibility:10,preferredSymmetricAlgorithms:11,revocationKey:12,issuerKeyID:16,notationData:20,preferredHashAlgorithms:21,preferredCompressionAlgorithms:22,keyServerPreferences:23,preferredKeyServer:24,primaryUserID:25,policyURI:26,keyFlags:27,signersUserID:28,reasonForRevocation:29,features:30,signatureTarget:31,embeddedSignature:32,issuerFingerprint:33,preferredAEADAlgorithms:34,preferredCipherSuites:39},keyFlags:{certifyKeys:1,signData:2,encryptCommunication:4,encryptStorage:8,splitPrivateKey:16,authentication:32,forwardedCommunication:64,sharedPrivateKey:128},armor:{multipartSection:0,multipartLast:1,signed:2,message:3,publicKey:4,privateKey:5,signature:6},reasonForRevocation:{noReason:0,keySuperseded:1,keyCompromised:2,keyRetired:3,userIDInvalid:32},features:{modificationDetection:1,aead:2,v5Keys:4,seipdv2:8},write:function(e,t){if("number"==typeof t&&(t=this.read(e,t)),void 0!==e[t])return e[t];throw Error("Invalid enum value.")},read:function(e,t){if(e[T]||(e[T]=[],Object.entries(e).forEach((([t,r])=>{e[T][r]=t}))),void 0!==e[T][t])return e[T][t];throw Error("Invalid enum value.")}},L={preferredHashAlgorithm:M.hash.sha512,preferredSymmetricAlgorithm:M.symmetric.aes256,preferredCompressionAlgorithm:M.compression.uncompressed,aeadProtect:!1,ignoreSEIPDv2FeatureFlag:!1,parseAEADEncryptedV4KeysAsLegacy:!1,preferredAEADAlgorithm:M.aead.gcm,aeadChunkSizeByte:12,v6Keys:!1,enableParsingV5Entities:!1,s2kType:M.s2k.iterated,s2kIterationCountByte:224,s2kArgon2Params:{passes:3,parallelism:4,memoryExponent:16},allowUnauthenticatedMessages:!1,allowUnauthenticatedStream:!1,allowForwardedMessages:!1,minRSABits:2047,passwordCollisionCheck:!1,allowInsecureDecryptionWithSigningKeys:!1,allowInsecureVerificationWithReformattedKeys:!1,allowMissingKeyFlags:!1,constantTimePKCS1Decryption:!1,constantTimePKCS1DecryptionSupportedSymmetricAlgorithms:new Set([M.symmetric.aes128,M.symmetric.aes192,M.symmetric.aes256]),ignoreUnsupportedPackets:!0,ignoreMalformedPackets:!1,enforceGrammar:!0,pluggableGrammarErrorReporter:null,additionalAllowedPackets:[],showVersion:!1,showComment:!1,versionString:"OpenPGP.js 6.1.1-patch.1",commentString:"https://openpgpjs.org",maxUserIDLength:5120,knownNotations:[],nonDeterministicSignaturesViaNotation:!0,useEllipticFallback:!0,rejectHashAlgorithms:new Set([M.hash.md5,M.hash.ripemd]),rejectMessageHashAlgorithms:new Set([M.hash.md5,M.hash.ripemd,M.hash.sha1]),rejectPublicKeyAlgorithms:new Set([M.publicKey.elgamal,M.publicKey.dsa]),rejectCurves:new Set([M.curve.secp256k1])};const F=(()=>{try{return"development"===process.env.NODE_ENV}catch(e){}return!1})(),N={isString:function(e){return"string"==typeof e||e instanceof String},nodeRequire:t(import.meta.url),isArray:function(e){return e instanceof Array},isUint8Array:y,isStream:l,getNobleCurve:async(e,t)=>{if(!L.useEllipticFallback)throw Error("This curve is only supported in the full build of OpenPGP.js");const{nobleCurves:r}=await Promise.resolve().then((function(){return nf}));switch(e){case M.publicKey.ecdh:case M.publicKey.ecdsa:{const e=r.get(t);if(!e)throw Error("Unsupported curve");return e}case M.publicKey.x448:return r.get("x448");case M.publicKey.ed448:return r.get("ed448");default:throw Error("Unsupported curve")}},readNumber:function(e){let t=0;for(let r=0;r<e.length;r++)t+=256**r*e[e.length-1-r];return t},writeNumber:function(e,t){const r=new Uint8Array(t);for(let n=0;n<t;n++)r[n]=e>>8*(t-n-1)&255;return r},readDate:function(e){const t=N.readNumber(e);return new Date(1e3*t)},writeDate:function(e){const t=Math.floor(e.getTime()/1e3);return N.writeNumber(t,4)},normalizeDate:function(e=Date.now()){return null===e||e===1/0?e:new Date(1e3*Math.floor(+e/1e3))},readMPI:function(e){const t=(e[0]<<8|e[1])+7>>>3;return N.readExactSubarray(e,2,2+t)},readExactSubarray:function(e,t,r){if(e.length<r-t)throw Error("Input array too short");return e.subarray(t,r)},leftPad(e,t){if(e.length>t)throw Error("Input array too long");const r=new Uint8Array(t),n=t-e.length;return r.set(e,n),r},uint8ArrayToMPI:function(e){const t=N.uint8ArrayBitLength(e);if(0===t)throw Error("Zero MPI");const r=e.subarray(e.length-Math.ceil(t/8)),n=new Uint8Array([(65280&t)>>8,255&t]);return N.concatUint8Array([n,r])},uint8ArrayBitLength:function(e){let t;for(t=0;t<e.length&&0===e[t];t++);if(t===e.length)return 0;const r=e.subarray(t);return 8*(r.length-1)+N.nbits(r[0])},hexToUint8Array:function(e){const t=new Uint8Array(e.length>>1);for(let r=0;r<e.length>>1;r++)t[r]=parseInt(e.substr(r<<1,2),16);return t},uint8ArrayToHex:function(e){const t="0123456789abcdef";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),r},stringToUint8Array:function(e){return v(e,(e=>{if(!N.isString(e))throw Error("stringToUint8Array: Data must be in the form of a string");const t=new Uint8Array(e.length);for(let r=0;r<e.length;r++)t[r]=e.charCodeAt(r);return t}))},uint8ArrayToString:function(e){const t=[],r=16384,n=(e=new Uint8Array(e)).length;for(let i=0;i<n;i+=r)t.push(String.fromCharCode.apply(String,e.subarray(i,i+r<n?i+r:n)));return t.join("")},encodeUTF8:function(e){const t=new TextEncoder("utf-8");function r(e,r=!1){return t.encode(e,{stream:!r})}return v(e,r,(()=>r("",!0)))},decodeUTF8:function(e){const t=new TextDecoder("utf-8");function r(e,r=!1){return t.decode(e,{stream:!r})}return v(e,r,(()=>r(new Uint8Array,!0)))},concat:m,concatUint8Array:f,equalsUint8Array:function(e,t){if(!N.isUint8Array(e)||!N.isUint8Array(t))throw Error("Data must be in the form of a Uint8Array");if(e.length!==t.length)return!1;for(let r=0;r<e.length;r++)if(e[r]!==t[r])return!1;return!0},findLastIndex:function(e,t){for(let r=e.length;r>=0;r--)if(t(e[r],r,e))return r;return-1},writeChecksum:function(e){let t=0;for(let r=0;r<e.length;r++)t=t+e[r]&65535;return N.writeNumber(t,2)},printDebug:function(e){F&&console.log("[OpenPGP.js debug]",e)},printDebugError:function(e){F&&console.error("[OpenPGP.js debug]",e)},nbits:function(e){let t=1,r=e>>>16;return 0!==r&&(e=r,t+=16),r=e>>8,0!==r&&(e=r,t+=8),r=e>>4,0!==r&&(e=r,t+=4),r=e>>2,0!==r&&(e=r,t+=2),r=e>>1,0!==r&&(e=r,t+=1),t},double:function(e){const t=new Uint8Array(e.length),r=e.length-1;for(let n=0;n<r;n++)t[n]=e[n]<<1^e[n+1]>>7;return t[r]=e[r]<<1^135*(e[0]>>7),t},shiftRight:function(e,t){if(t)for(let r=e.length-1;r>=0;r--)e[r]>>=t,r>0&&(e[r]|=e[r-1]<<8-t);return e},getWebCrypto:function(){const t=void 0!==e&&e.crypto&&e.crypto.subtle||this.getNodeCrypto()?.webcrypto.subtle;if(!t)throw Error("The WebCrypto API is not available");return t},getNodeCrypto:function(){return this.nodeRequire("crypto")},getNodeZlib:function(){return this.nodeRequire("zlib")},getNodeBuffer:function(){return(this.nodeRequire("buffer")||{}).Buffer},getHardwareConcurrency:function(){if("undefined"!=typeof navigator)return navigator.hardwareConcurrency||1;return this.nodeRequire("os").cpus().length},isEmailAddress:function(e){if(!N.isString(e))return!1;return/^[^\p{C}\p{Z}@<>\\]+@[^\p{C}\p{Z}@<>\\]+[^\p{C}\p{Z}\p{P}]$/u.test(e)},canonicalizeEOL:function(e){let t=!1;return v(e,(e=>{let r;t&&(e=N.concatUint8Array([new Uint8Array([13]),e])),13===e[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;const n=[];for(let t=0;r=e.indexOf(10,t)+1,r;t=r)13!==e[r-2]&&n.push(r);if(!n.length)return e;const i=new Uint8Array(e.length+n.length);let s=0;for(let t=0;t<n.length;t++){const r=e.subarray(n[t-1]||0,n[t]);i.set(r,s),s+=r.length,i[s-1]=13,i[s]=10,s++}return i.set(e.subarray(n[n.length-1]||0),s),i}),(()=>t?new Uint8Array([13]):void 0))},nativeEOL:function(e){let t=!1;return v(e,(e=>{let r;13===(e=t&&10!==e[0]?N.concatUint8Array([new Uint8Array([13]),e]):new Uint8Array(e))[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;let n=0;for(let t=0;t!==e.length;t=r){r=e.indexOf(13,t)+1,r||(r=e.length);const i=r-(10===e[r]?1:0);t&&e.copyWithin(n,t,i),n+=i-t}return e.subarray(0,n)}),(()=>t?new Uint8Array([13]):void 0))},removeTrailingSpaces:function(e){return e.split("\n").map((e=>{let t=e.length-1;for(;t>=0&&(" "===e[t]||"\t"===e[t]||"\r"===e[t]);t--);return e.substr(0,t+1)})).join("\n")},wrapError:function(e,t){if(!t)return Error(e);try{t.message=e+": "+t.message}catch(e){}return t},constructAllowedPackets:function(e){const t={};return e.forEach((e=>{if(!e.tag)throw Error("Invalid input: expected a packet class");t[e.tag]=e})),t},anyPromise:function(e){return new Promise((async(t,r)=>{let n;await Promise.all(e.map((async e=>{try{t(await e)}catch(e){n=e}}))),r(n)}))},selectUint8Array:function(e,t,r){const n=Math.max(t.length,r.length),i=new Uint8Array(n);let s=0;for(let n=0;n<i.length;n++)i[n]=t[n]&256-e|r[n]&255+e,s+=e&n<t.length|1-e&n<r.length;return i.subarray(0,s)},selectUint8:function(e,t,r){return t&256-e|r&255+e},isAES:function(e){return e===M.symmetric.aes128||e===M.symmetric.aes192||e===M.symmetric.aes256}},O=N.getNodeBuffer();let _,H;function z(e){let t=new Uint8Array;return v(e,(e=>{t=N.concatUint8Array([t,e]);const r=[],n=Math.floor(t.length/45),i=45*n,s=_(t.subarray(0,i));for(let e=0;e<n;e++)r.push(s.substr(60*e,60)),r.push("\n");return t=t.subarray(i),r.join("")}),(()=>t.length?_(t)+"\n":""))}function G(e){let t="";return v(e,(e=>{t+=e;let r=0;const n=[" ","\t","\r","\n"];for(let e=0;e<n.length;e++){const i=n[e];for(let e=t.indexOf(i);-1!==e;e=t.indexOf(i,e+1))r++}let i=t.length;for(;i>0&&(i-r)%4!=0;i--)n.includes(t[i])&&r--;const s=H(t.substr(0,i));return t=t.substr(i),s}),(()=>H(t)))}function q(e){return G(e.replace(/-/g,"+").replace(/_/g,"/"))}function j(e,t){let r=z(e).replace(/[\r\n]/g,"");return r=r.replace(/[+]/g,"-").replace(/[/]/g,"_").replace(/[=]/g,""),r}function V(e){const t=e.match(/^-----BEGIN PGP (MESSAGE, PART \d+\/\d+|MESSAGE, PART \d+|SIGNED MESSAGE|MESSAGE|PUBLIC KEY BLOCK|PRIVATE KEY BLOCK|SIGNATURE)-----$/m);if(!t)throw Error("Unknown ASCII armor type");return/MESSAGE, PART \d+\/\d+/.test(t[1])?M.armor.multipartSection:/MESSAGE, PART \d+/.test(t[1])?M.armor.multipartLast:/SIGNED MESSAGE/.test(t[1])?M.armor.signed:/MESSAGE/.test(t[1])?M.armor.message:/PUBLIC KEY BLOCK/.test(t[1])?M.armor.publicKey:/PRIVATE KEY BLOCK/.test(t[1])?M.armor.privateKey:/SIGNATURE/.test(t[1])?M.armor.signature:void 0}function Y(e,t){let r="";return t.showVersion&&(r+="Version: "+t.versionString+"\n"),t.showComment&&(r+="Comment: "+t.commentString+"\n"),e&&(r+="Comment: "+e+"\n"),r+="\n",r}function Z(e){const t=function(e){let t=13501623;return v(e,(e=>{const r=J?Math.floor(e.length/4):0,n=new Uint32Array(e.buffer,e.byteOffset,r);for(let e=0;e<r;e++)t^=n[e],t=W[0][t>>24&255]^W[1][t>>16&255]^W[2][t>>8&255]^W[3][255&t];for(let n=4*r;n<e.length;n++)t=t>>8^W[0][255&t^e[n]]}),(()=>new Uint8Array([t,t>>8,t>>16])))}(e);return z(t)}O?(_=e=>O.from(e).toString("base64"),H=e=>{const t=O.from(e,"base64");return new Uint8Array(t.buffer,t.byteOffset,t.byteLength)}):(_=e=>btoa(N.uint8ArrayToString(e)),H=e=>N.stringToUint8Array(atob(e)));const W=[Array(255),Array(255),Array(255),Array(255)];for(let e=0;e<=255;e++){let t=e<<16;for(let e=0;e<8;e++)t=t<<1^(8388608&t?8801531:0);W[0][e]=(16711680&t)>>16|65280&t|(255&t)<<16}for(let e=0;e<=255;e++)W[1][e]=W[0][e]>>8^W[0][255&W[0][e]];for(let e=0;e<=255;e++)W[2][e]=W[1][e]>>8^W[0][255&W[1][e]];for(let e=0;e<=255;e++)W[3][e]=W[2][e]>>8^W[0][255&W[2][e]];const J=function(){const e=new ArrayBuffer(2);return new DataView(e).setInt16(0,255,!0),255===new Int16Array(e)[0]}();function X(e){for(let t=0;t<e.length;t++)/^([^\s:]|[^\s:][^:]*[^\s:]): .+$/.test(e[t])||N.printDebugError(Error("Improperly formatted armor header: "+e[t])),/^(Version|Comment|MessageID|Hash|Charset): .+$/.test(e[t])||N.printDebugError(Error("Unknown header: "+e[t]))}function $(e){let t=e;const r=e.lastIndexOf("=");return r>=0&&r!==e.length-1&&(t=e.slice(0,r)),t}function ee(e){return new Promise((async(t,r)=>{try{const n=/^-----[^-]+-----$/m,i=/^[ \f\r\t\u00a0\u2000-\u200a\u202f\u205f\u3000]*$/;let s;const a=[];let o,c,u=a,h=[];const l=G(B(e,(async(e,y)=>{const f=Q(e);try{for(;;){let e=await f.readLine();if(void 0===e)throw Error("Misformed armored text");if(e=N.removeTrailingSpaces(e.replace(/[\r\n]/g,"")),s)if(o)c||s!==M.armor.signed||(n.test(e)?(h=h.join("\r\n"),c=!0,X(u),u=[],o=!1):h.push(e.replace(/^- /,"")));else if(n.test(e)&&r(Error("Mandatory blank line missing between armor headers and armor data")),i.test(e)){if(X(u),o=!0,c||s!==M.armor.signed){t({text:h,data:l,headers:a,type:s});break}}else u.push(e);else n.test(e)&&(s=V(e))}}catch(e){return void r(e)}const g=R(y);try{for(;;){await g.ready;const{done:e,value:t}=await f.read();if(e)throw Error("Misformed armored text");const r=t+"";if(-1!==r.indexOf("=")||-1!==r.indexOf("-")){let e=await f.readToEnd();e.length||(e=""),e=r+e,e=N.removeTrailingSpaces(e.replace(/\r/g,""));const t=e.split(n);if(1===t.length)throw Error("Misformed armored text");const i=$(t[0].slice(0,-1));await g.write(i);break}await g.write(r)}await g.ready,await g.close()}catch(e){await g.abort(e)}})))}catch(e){r(e)}})).then((async e=>(u(e.data)&&(e.data=await P(e.data)),e)))}function te(e,t,r,n,i,s=!1,a=L){let o,c;e===M.armor.signed&&(o=t.text,c=t.hash,t=t.data);const u=s&&K(t),h=[];switch(e){case M.armor.multipartSection:h.push("-----BEGIN PGP MESSAGE, PART "+r+"/"+n+"-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP MESSAGE, PART "+r+"/"+n+"-----\n");break;case M.armor.multipartLast:h.push("-----BEGIN PGP MESSAGE, PART "+r+"-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP MESSAGE, PART "+r+"-----\n");break;case M.armor.signed:h.push("-----BEGIN PGP SIGNED MESSAGE-----\n"),h.push(c?`Hash: ${c}\n\n`:"\n"),h.push(o.replace(/^-/gm,"- -")),h.push("\n-----BEGIN PGP SIGNATURE-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP SIGNATURE-----\n");break;case M.armor.message:h.push("-----BEGIN PGP MESSAGE-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP MESSAGE-----\n");break;case M.armor.publicKey:h.push("-----BEGIN PGP PUBLIC KEY BLOCK-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP PUBLIC KEY BLOCK-----\n");break;case M.armor.privateKey:h.push("-----BEGIN PGP PRIVATE KEY BLOCK-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP PRIVATE KEY BLOCK-----\n");break;case M.armor.signature:h.push("-----BEGIN PGP SIGNATURE-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP SIGNATURE-----\n")}return N.concat(h)}const re=BigInt(0),ne=BigInt(1);function ie(e){const t="0123456789ABCDEF";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),BigInt("0x0"+r)}function se(e,t){const r=e%t;return r<re?r+t:r}function ae(e,t,r){if(r===re)throw Error("Modulo cannot be zero");if(r===ne)return BigInt(0);if(t<re)throw Error("Unsopported negative exponent");let n=t,i=e;i%=r;let s=BigInt(1);for(;n>re;){const e=n&ne;n>>=ne;s=e?s*i%r:s,i=i*i%r}return s}function oe(e){return e>=re?e:-e}function ce(e,t){const{gcd:r,x:n}=function(e,t){let r=BigInt(0),n=BigInt(1),i=BigInt(1),s=BigInt(0),a=oe(e),o=oe(t);const c=e<re,u=t<re;for(;o!==re;){const e=a/o;let t=r;r=i-e*r,i=t,t=n,n=s-e*n,s=t,t=o,o=a%o,a=t}return{x:c?-i:i,y:u?-s:s,gcd:a}}(e,t);if(r!==ne)throw Error("Inverse does not exist");return se(n+t,t)}function ue(e){const t=Number(e);if(t>Number.MAX_SAFE_INTEGER)throw Error("Number can only safely store up to 53 bits");return t}function he(e,t){return(e>>BigInt(t)&ne)===re?0:1}function le(e){const t=e<re?BigInt(-1):re;let r=1,n=e;for(;(n>>=ne)!==t;)r++;return r}function ye(e){const t=e<re?BigInt(-1):re,r=BigInt(8);let n=1,i=e;for(;(i>>=r)!==t;)n++;return n}function fe(e,t="be",r){let n=e.toString(16);n.length%2==1&&(n="0"+n);const i=n.length/2,s=new Uint8Array(r||i),a=r?r-i:0;let o=0;for(;o<i;)s[o+a]=parseInt(n.slice(2*o,2*o+2),16),o++;return"be"!==t&&s.reverse(),s}const ge=N.getNodeCrypto();function pe(e){const t="undefined"!=typeof crypto?crypto:ge?.webcrypto;if(t?.getRandomValues){const r=new Uint8Array(e);return t.getRandomValues(r)}throw Error("No secure random number generator available.")}function de(e,t){if(t<e)throw Error("Illegal parameter value: max <= min");const r=t-e;return se(ie(pe(ye(r)+8)),r)+e}const Ae=BigInt(1);function we(e,t,r){const n=BigInt(30),i=Ae<<BigInt(e-1),s=[1,6,5,4,3,2,1,4,3,2,1,2,1,4,3,2,1,2,1,4,3,2,1,6,5,4,3,2,1,2];let a=de(i,i<<Ae),o=ue(se(a,n));do{a+=BigInt(s[o]),o=(o+s[o])%s.length,le(a)>e&&(a=se(a,i<<Ae),a+=i,o=ue(se(a,n)))}while(!me(a,t,r));return a}function me(e,t,r){return(!t||function(e,t){let r=e,n=t;for(;n!==re;){const e=n;n=r%n,r=e}return r}(e-Ae,t)===Ae)&&(!!function(e){const t=BigInt(0);return be.every((r=>se(e,r)!==t))}(e)&&(!!function(e,t=BigInt(2)){return ae(t,e-Ae,e)===Ae}(e)&&!!function(e,t){const r=le(e);t||(t=Math.max(1,r/48|0));const n=e-Ae;let i=0;for(;!he(n,i);)i++;const s=e>>BigInt(i);for(;t>0;t--){let t,r=ae(de(BigInt(2),n),s,e);if(r!==Ae&&r!==n){for(t=1;t<i;t++){if(r=se(r*r,e),r===Ae)return!1;if(r===n)break}if(t===i)return!1}}return!0}(e,r)))}const be=[7,11,13,17,19,23,29,31,37,41,43,47,53,59,61,67,71,73,79,83,89,97,101,103,107,109,113,127,131,137,139,149,151,157,163,167,173,179,181,191,193,197,199,211,223,227,229,233,239,241,251,257,263,269,271,277,281,283,293,307,311,313,317,331,337,347,349,353,359,367,373,379,383,389,397,401,409,419,421,431,433,439,443,449,457,461,463,467,479,487,491,499,503,509,521,523,541,547,557,563,569,571,577,587,593,599,601,607,613,617,619,631,641,643,647,653,659,661,673,677,683,691,701,709,719,727,733,739,743,751,757,761,769,773,787,797,809,811,821,823,827,829,839,853,857,859,863,877,881,883,887,907,911,919,929,937,941,947,953,967,971,977,983,991,997,1009,1013,1019,1021,1031,1033,1039,1049,1051,1061,1063,1069,1087,1091,1093,1097,1103,1109,1117,1123,1129,1151,1153,1163,1171,1181,1187,1193,1201,1213,1217,1223,1229,1231,1237,1249,1259,1277,1279,1283,1289,1291,1297,1301,1303,1307,1319,1321,1327,1361,1367,1373,1381,1399,1409,1423,1427,1429,1433,1439,1447,1451,1453,1459,1471,1481,1483,1487,1489,1493,1499,1511,1523,1531,1543,1549,1553,1559,1567,1571,1579,1583,1597,1601,1607,1609,1613,1619,1621,1627,1637,1657,1663,1667,1669,1693,1697,1699,1709,1721,1723,1733,1741,1747,1753,1759,1777,1783,1787,1789,1801,1811,1823,1831,1847,1861,1867,1871,1873,1877,1879,1889,1901,1907,1913,1931,1933,1949,1951,1973,1979,1987,1993,1997,1999,2003,2011,2017,2027,2029,2039,2053,2063,2069,2081,2083,2087,2089,2099,2111,2113,2129,2131,2137,2141,2143,2153,2161,2179,2203,2207,2213,2221,2237,2239,2243,2251,2267,2269,2273,2281,2287,2293,2297,2309,2311,2333,2339,2341,2347,2351,2357,2371,2377,2381,2383,2389,2393,2399,2411,2417,2423,2437,2441,2447,2459,2467,2473,2477,2503,2521,2531,2539,2543,2549,2551,2557,2579,2591,2593,2609,2617,2621,2633,2647,2657,2659,2663,2671,2677,2683,2687,2689,2693,2699,2707,2711,2713,2719,2729,2731,2741,2749,2753,2767,2777,2789,2791,2797,2801,2803,2819,2833,2837,2843,2851,2857,2861,2879,2887,2897,2903,2909,2917,2927,2939,2953,2957,2963,2969,2971,2999,3001,3011,3019,3023,3037,3041,3049,3061,3067,3079,3083,3089,3109,3119,3121,3137,3163,3167,3169,3181,3187,3191,3203,3209,3217,3221,3229,3251,3253,3257,3259,3271,3299,3301,3307,3313,3319,3323,3329,3331,3343,3347,3359,3361,3371,3373,3389,3391,3407,3413,3433,3449,3457,3461,3463,3467,3469,3491,3499,3511,3517,3527,3529,3533,3539,3541,3547,3557,3559,3571,3581,3583,3593,3607,3613,3617,3623,3631,3637,3643,3659,3671,3673,3677,3691,3697,3701,3709,3719,3727,3733,3739,3761,3767,3769,3779,3793,3797,3803,3821,3823,3833,3847,3851,3853,3863,3877,3881,3889,3907,3911,3917,3919,3923,3929,3931,3943,3947,3967,3989,4001,4003,4007,4013,4019,4021,4027,4049,4051,4057,4073,4079,4091,4093,4099,4111,4127,4129,4133,4139,4153,4157,4159,4177,4201,4211,4217,4219,4229,4231,4241,4243,4253,4259,4261,4271,4273,4283,4289,4297,4327,4337,4339,4349,4357,4363,4373,4391,4397,4409,4421,4423,4441,4447,4451,4457,4463,4481,4483,4493,4507,4513,4517,4519,4523,4547,4549,4561,4567,4583,4591,4597,4603,4621,4637,4639,4643,4649,4651,4657,4663,4673,4679,4691,4703,4721,4723,4729,4733,4751,4759,4783,4787,4789,4793,4799,4801,4813,4817,4831,4861,4871,4877,4889,4903,4909,4919,4931,4933,4937,4943,4951,4957,4967,4969,4973,4987,4993,4999].map((e=>BigInt(e)));const ke=N.getWebCrypto(),Ee=N.getNodeCrypto(),ve=Ee&&Ee.getHashes();function Be(e){if(Ee&&ve.includes(e))return async function(t){const r=Ee.createHash(e);return v(t,(e=>{r.update(e)}),(()=>new Uint8Array(r.digest())))}}function Se(e,t){const r=async()=>{const{nobleHashes:t}=await Promise.resolve().then((function(){return Uf})),r=t.get(e);if(!r)throw Error("Unsupported hash");return r};return async function(e){if(u(e)&&(e=await P(e)),N.isStream(e)){const t=(await r()).create();return v(e,(e=>{t.update(e)}),(()=>t.digest()))}if(ke&&t)return new Uint8Array(await ke.digest(t,e));return(await r())(e)}}const Ie=Be("md5")||Se("md5"),Ke=Be("sha1")||Se("sha1","SHA-1"),Ce=Be("sha224")||Se("sha224"),Ue=Be("sha256")||Se("sha256","SHA-256"),Pe=Be("sha384")||Se("sha384","SHA-384"),De=Be("sha512")||Se("sha512","SHA-512"),xe=Be("ripemd160")||Se("ripemd160"),Qe=Be("sha3-256")||Se("sha3_256"),Re=Be("sha3-512")||Se("sha3_512");function Te(e,t){switch(e){case M.hash.md5:return Ie(t);case M.hash.sha1:return Ke(t);case M.hash.ripemd:return xe(t);case M.hash.sha256:return Ue(t);case M.hash.sha384:return Pe(t);case M.hash.sha512:return De(t);case M.hash.sha224:return Ce(t);case M.hash.sha3_256:return Qe(t);case M.hash.sha3_512:return Re(t);default:throw Error("Unsupported hash function")}}function Me(e){switch(e){case M.hash.md5:return 16;case M.hash.sha1:case M.hash.ripemd:return 20;case M.hash.sha256:return 32;case M.hash.sha384:return 48;case M.hash.sha512:return 64;case M.hash.sha224:return 28;case M.hash.sha3_256:return 32;case M.hash.sha3_512:return 64;default:throw Error("Invalid hash algorithm.")}}const Le=[];function Fe(e,t){const r=e.length;if(r>t-11)throw Error("Message too long");const n=function(e){const t=new Uint8Array(e);let r=0;for(;r<e;){const n=pe(e-r);for(let e=0;e<n.length;e++)0!==n[e]&&(t[r++]=n[e])}return t}(t-r-3),i=new Uint8Array(t);return i[1]=2,i.set(n,2),i.set(e,t-r),i}function Ne(e,t){let r=2,n=1;for(let t=r;t<e.length;t++)n&=0!==e[t],r+=n;const i=r-2,s=e.subarray(r+1),a=0===e[0]&2===e[1]&i>=8&!n;if(t)return N.selectUint8Array(a,s,t);if(a)return s;throw Error("Decryption error")}function Oe(e,t,r){let n;if(t.length!==Me(e))throw Error("Invalid hash length");const i=new Uint8Array(Le[e].length);for(n=0;n<Le[e].length;n++)i[n]=Le[e][n];const s=i.length+t.length;if(r<s+11)throw Error("Intended encoded message length too short");const a=new Uint8Array(r-s-3).fill(255),o=new Uint8Array(r);return o[1]=1,o.set(a,2),o.set(i,r-s),o.set(t,r-t.length),o}Le[1]=[48,32,48,12,6,8,42,134,72,134,247,13,2,5,5,0,4,16],Le[2]=[48,33,48,9,6,5,43,14,3,2,26,5,0,4,20],Le[3]=[48,33,48,9,6,5,43,36,3,2,1,5,0,4,20],Le[8]=[48,49,48,13,6,9,96,134,72,1,101,3,4,2,1,5,0,4,32],Le[9]=[48,65,48,13,6,9,96,134,72,1,101,3,4,2,2,5,0,4,48],Le[10]=[48,81,48,13,6,9,96,134,72,1,101,3,4,2,3,5,0,4,64],Le[11]=[48,45,48,13,6,9,96,134,72,1,101,3,4,2,4,5,0,4,28];const _e=N.getWebCrypto(),He=N.getNodeCrypto(),ze=BigInt(1);async function Ge(e,t,r,n,i,s,a,o,c){if(Me(e)>=r.length)throw Error("Digest size cannot exceed key modulus size");if(t&&!N.isStream(t))if(N.getWebCrypto())try{return await async function(e,t,r,n,i,s,a,o){const c=await Ye(r,n,i,s,a,o),u={name:"RSASSA-PKCS1-v1_5",hash:{name:e}},h=await _e.importKey("jwk",c,u,!1,["sign"]);return new Uint8Array(await _e.sign("RSASSA-PKCS1-v1_5",h,t))}(M.read(M.webHash,e),t,r,n,i,s,a,o)}catch(e){N.printDebugError(e)}else if(N.getNodeCrypto())return async function(e,t,r,n,i,s,a,o){const c=He.createSign(M.read(M.hash,e));c.write(t),c.end();const u=await Ye(r,n,i,s,a,o);return new Uint8Array(c.sign({key:u,format:"jwk",type:"pkcs1"}))}(e,t,r,n,i,s,a,o);return async function(e,t,r,n){t=ie(t);const i=ie(Oe(e,n,ye(t)));return r=ie(r),fe(ae(i,r,t),"be",ye(t))}(e,r,i,c)}async function qe(e,t,r,n,i,s){if(t&&!N.isStream(t))if(N.getWebCrypto())try{return await async function(e,t,r,n,i){const s=Ze(n,i),a=await _e.importKey("jwk",s,{name:"RSASSA-PKCS1-v1_5",hash:{name:e}},!1,["verify"]);return _e.verify("RSASSA-PKCS1-v1_5",a,r,t)}(M.read(M.webHash,e),t,r,n,i)}catch(e){N.printDebugError(e)}else if(N.getNodeCrypto())return async function(e,t,r,n,i){const s=Ze(n,i),a={key:s,format:"jwk",type:"pkcs1"},o=He.createVerify(M.read(M.hash,e));o.write(t),o.end();try{return o.verify(a,r)}catch(e){return!1}}(e,t,r,n,i);return async function(e,t,r,n,i){if(r=ie(r),t=ie(t),n=ie(n),t>=r)throw Error("Signature size cannot exceed modulus size");const s=fe(ae(t,n,r),"be",ye(r)),a=Oe(e,i,ye(r));return N.equalsUint8Array(s,a)}(e,r,n,i,s)}async function je(e,t,r){return N.getNodeCrypto()?async function(e,t,r){const n=Ze(t,r),i={key:n,format:"jwk",type:"pkcs1",padding:He.constants.RSA_PKCS1_PADDING};return new Uint8Array(He.publicEncrypt(i,e))}(e,t,r):async function(e,t,r){if(t=ie(t),e=ie(Fe(e,ye(t))),r=ie(r),e>=t)throw Error("Message size cannot exceed modulus size");return fe(ae(e,r,t),"be",ye(t))}(e,t,r)}async function Ve(e,t,r,n,i,s,a,o){if(N.getNodeCrypto()&&!o)try{return await async function(e,t,r,n,i,s,a){const o=await Ye(t,r,n,i,s,a),c={key:o,format:"jwk",type:"pkcs1",padding:He.constants.RSA_PKCS1_PADDING};try{return new Uint8Array(He.privateDecrypt(c,e))}catch(e){throw Error("Decryption error")}}(e,t,r,n,i,s,a)}catch(e){N.printDebugError(e)}return async function(e,t,r,n,i,s,a,o){if(e=ie(e),t=ie(t),r=ie(r),n=ie(n),i=ie(i),s=ie(s),a=ie(a),e>=t)throw Error("Data too large.");const c=se(n,s-ze),u=se(n,i-ze),h=de(BigInt(2),t),l=ae(ce(h,t),r,t);e=se(e*l,t);const y=ae(e,u,i),f=ae(e,c,s),g=se(a*(f-y),s);let p=g*i+y;return p=se(p*h,t),Ne(fe(p,"be",ye(t)),o)}(e,t,r,n,i,s,a,o)}async function Ye(e,t,r,n,i,s){const a=ie(n),o=ie(i),c=ie(r);let u=se(c,o-ze),h=se(c,a-ze);return h=fe(h),u=fe(u),{kty:"RSA",n:j(e),e:j(t),d:j(r),p:j(i),q:j(n),dp:j(u),dq:j(h),qi:j(s),ext:!0}}function Ze(e,t){return{kty:"RSA",n:j(e),e:j(t),ext:!0}}function We(e,t){return{n:q(e.n),e:fe(t),d:q(e.d),p:q(e.q),q:q(e.p),u:q(e.qi)}}const Je=BigInt(1);const Xe=r&&"object"==typeof r&&"webcrypto"in r?r.webcrypto:void 0,$e={};var et=function(e){var t,r=new Float64Array(16);if(e)for(t=0;t<e.length;t++)r[t]=e[t];return r},tt=function(){throw Error("no PRNG")},rt=new Uint8Array(32);rt[0]=9;var nt=et(),it=et([1]),st=et([56129,1]),at=et([30883,4953,19914,30187,55467,16705,2637,112,59544,30585,16505,36039,65139,11119,27886,20995]),ot=et([61785,9906,39828,60374,45398,33411,5274,224,53552,61171,33010,6542,64743,22239,55772,9222]),ct=et([54554,36645,11616,51542,42930,38181,51040,26924,56412,64982,57905,49316,21502,52590,14035,8553]),ut=et([26200,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214]),ht=et([41136,18958,6951,50414,58488,44335,6150,12099,55207,15867,153,11085,57099,20417,9344,11139]);function lt(e,t,r,n){e[t]=r>>24&255,e[t+1]=r>>16&255,e[t+2]=r>>8&255,e[t+3]=255&r,e[t+4]=n>>24&255,e[t+5]=n>>16&255,e[t+6]=n>>8&255,e[t+7]=255&n}function yt(e,t,r,n){return function(e,t,r,n,i){var s,a=0;for(s=0;s<i;s++)a|=e[t+s]^r[n+s];return(1&a-1>>>8)-1}(e,t,r,n,32)}function ft(e,t){var r;for(r=0;r<16;r++)e[r]=0|t[r]}function gt(e){var t,r,n=1;for(t=0;t<16;t++)r=e[t]+n+65535,n=Math.floor(r/65536),e[t]=r-65536*n;e[0]+=n-1+37*(n-1)}function pt(e,t,r){for(var n,i=~(r-1),s=0;s<16;s++)n=i&(e[s]^t[s]),e[s]^=n,t[s]^=n}function dt(e,t){var r,n,i,s=et(),a=et();for(r=0;r<16;r++)a[r]=t[r];for(gt(a),gt(a),gt(a),n=0;n<2;n++){for(s[0]=a[0]-65517,r=1;r<15;r++)s[r]=a[r]-65535-(s[r-1]>>16&1),s[r-1]&=65535;s[15]=a[15]-32767-(s[14]>>16&1),i=s[15]>>16&1,s[14]&=65535,pt(a,s,1-i)}for(r=0;r<16;r++)e[2*r]=255&a[r],e[2*r+1]=a[r]>>8}function At(e,t){var r=new Uint8Array(32),n=new Uint8Array(32);return dt(r,e),dt(n,t),yt(r,0,n,0)}function wt(e){var t=new Uint8Array(32);return dt(t,e),1&t[0]}function mt(e,t){var r;for(r=0;r<16;r++)e[r]=t[2*r]+(t[2*r+1]<<8);e[15]&=32767}function bt(e,t,r){for(var n=0;n<16;n++)e[n]=t[n]+r[n]}function kt(e,t,r){for(var n=0;n<16;n++)e[n]=t[n]-r[n]}function Et(e,t,r){var n,i,s=0,a=0,o=0,c=0,u=0,h=0,l=0,y=0,f=0,g=0,p=0,d=0,A=0,w=0,m=0,b=0,k=0,E=0,v=0,B=0,S=0,I=0,K=0,C=0,U=0,P=0,D=0,x=0,Q=0,R=0,T=0,M=r[0],L=r[1],F=r[2],N=r[3],O=r[4],_=r[5],H=r[6],z=r[7],G=r[8],q=r[9],j=r[10],V=r[11],Y=r[12],Z=r[13],W=r[14],J=r[15];s+=(n=t[0])*M,a+=n*L,o+=n*F,c+=n*N,u+=n*O,h+=n*_,l+=n*H,y+=n*z,f+=n*G,g+=n*q,p+=n*j,d+=n*V,A+=n*Y,w+=n*Z,m+=n*W,b+=n*J,a+=(n=t[1])*M,o+=n*L,c+=n*F,u+=n*N,h+=n*O,l+=n*_,y+=n*H,f+=n*z,g+=n*G,p+=n*q,d+=n*j,A+=n*V,w+=n*Y,m+=n*Z,b+=n*W,k+=n*J,o+=(n=t[2])*M,c+=n*L,u+=n*F,h+=n*N,l+=n*O,y+=n*_,f+=n*H,g+=n*z,p+=n*G,d+=n*q,A+=n*j,w+=n*V,m+=n*Y,b+=n*Z,k+=n*W,E+=n*J,c+=(n=t[3])*M,u+=n*L,h+=n*F,l+=n*N,y+=n*O,f+=n*_,g+=n*H,p+=n*z,d+=n*G,A+=n*q,w+=n*j,m+=n*V,b+=n*Y,k+=n*Z,E+=n*W,v+=n*J,u+=(n=t[4])*M,h+=n*L,l+=n*F,y+=n*N,f+=n*O,g+=n*_,p+=n*H,d+=n*z,A+=n*G,w+=n*q,m+=n*j,b+=n*V,k+=n*Y,E+=n*Z,v+=n*W,B+=n*J,h+=(n=t[5])*M,l+=n*L,y+=n*F,f+=n*N,g+=n*O,p+=n*_,d+=n*H,A+=n*z,w+=n*G,m+=n*q,b+=n*j,k+=n*V,E+=n*Y,v+=n*Z,B+=n*W,S+=n*J,l+=(n=t[6])*M,y+=n*L,f+=n*F,g+=n*N,p+=n*O,d+=n*_,A+=n*H,w+=n*z,m+=n*G,b+=n*q,k+=n*j,E+=n*V,v+=n*Y,B+=n*Z,S+=n*W,I+=n*J,y+=(n=t[7])*M,f+=n*L,g+=n*F,p+=n*N,d+=n*O,A+=n*_,w+=n*H,m+=n*z,b+=n*G,k+=n*q,E+=n*j,v+=n*V,B+=n*Y,S+=n*Z,I+=n*W,K+=n*J,f+=(n=t[8])*M,g+=n*L,p+=n*F,d+=n*N,A+=n*O,w+=n*_,m+=n*H,b+=n*z,k+=n*G,E+=n*q,v+=n*j,B+=n*V,S+=n*Y,I+=n*Z,K+=n*W,C+=n*J,g+=(n=t[9])*M,p+=n*L,d+=n*F,A+=n*N,w+=n*O,m+=n*_,b+=n*H,k+=n*z,E+=n*G,v+=n*q,B+=n*j,S+=n*V,I+=n*Y,K+=n*Z,C+=n*W,U+=n*J,p+=(n=t[10])*M,d+=n*L,A+=n*F,w+=n*N,m+=n*O,b+=n*_,k+=n*H,E+=n*z,v+=n*G,B+=n*q,S+=n*j,I+=n*V,K+=n*Y,C+=n*Z,U+=n*W,P+=n*J,d+=(n=t[11])*M,A+=n*L,w+=n*F,m+=n*N,b+=n*O,k+=n*_,E+=n*H,v+=n*z,B+=n*G,S+=n*q,I+=n*j,K+=n*V,C+=n*Y,U+=n*Z,P+=n*W,D+=n*J,A+=(n=t[12])*M,w+=n*L,m+=n*F,b+=n*N,k+=n*O,E+=n*_,v+=n*H,B+=n*z,S+=n*G,I+=n*q,K+=n*j,C+=n*V,U+=n*Y,P+=n*Z,D+=n*W,x+=n*J,w+=(n=t[13])*M,m+=n*L,b+=n*F,k+=n*N,E+=n*O,v+=n*_,B+=n*H,S+=n*z,I+=n*G,K+=n*q,C+=n*j,U+=n*V,P+=n*Y,D+=n*Z,x+=n*W,Q+=n*J,m+=(n=t[14])*M,b+=n*L,k+=n*F,E+=n*N,v+=n*O,B+=n*_,S+=n*H,I+=n*z,K+=n*G,C+=n*q,U+=n*j,P+=n*V,D+=n*Y,x+=n*Z,Q+=n*W,R+=n*J,b+=(n=t[15])*M,a+=38*(E+=n*F),o+=38*(v+=n*N),c+=38*(B+=n*O),u+=38*(S+=n*_),h+=38*(I+=n*H),l+=38*(K+=n*z),y+=38*(C+=n*G),f+=38*(U+=n*q),g+=38*(P+=n*j),p+=38*(D+=n*V),d+=38*(x+=n*Y),A+=38*(Q+=n*Z),w+=38*(R+=n*W),m+=38*(T+=n*J),s=(n=(s+=38*(k+=n*L))+(i=1)+65535)-65536*(i=Math.floor(n/65536)),a=(n=a+i+65535)-65536*(i=Math.floor(n/65536)),o=(n=o+i+65535)-65536*(i=Math.floor(n/65536)),c=(n=c+i+65535)-65536*(i=Math.floor(n/65536)),u=(n=u+i+65535)-65536*(i=Math.floor(n/65536)),h=(n=h+i+65535)-65536*(i=Math.floor(n/65536)),l=(n=l+i+65535)-65536*(i=Math.floor(n/65536)),y=(n=y+i+65535)-65536*(i=Math.floor(n/65536)),f=(n=f+i+65535)-65536*(i=Math.floor(n/65536)),g=(n=g+i+65535)-65536*(i=Math.floor(n/65536)),p=(n=p+i+65535)-65536*(i=Math.floor(n/65536)),d=(n=d+i+65535)-65536*(i=Math.floor(n/65536)),A=(n=A+i+65535)-65536*(i=Math.floor(n/65536)),w=(n=w+i+65535)-65536*(i=Math.floor(n/65536)),m=(n=m+i+65535)-65536*(i=Math.floor(n/65536)),b=(n=b+i+65535)-65536*(i=Math.floor(n/65536)),s=(n=(s+=i-1+37*(i-1))+(i=1)+65535)-65536*(i=Math.floor(n/65536)),a=(n=a+i+65535)-65536*(i=Math.floor(n/65536)),o=(n=o+i+65535)-65536*(i=Math.floor(n/65536)),c=(n=c+i+65535)-65536*(i=Math.floor(n/65536)),u=(n=u+i+65535)-65536*(i=Math.floor(n/65536)),h=(n=h+i+65535)-65536*(i=Math.floor(n/65536)),l=(n=l+i+65535)-65536*(i=Math.floor(n/65536)),y=(n=y+i+65535)-65536*(i=Math.floor(n/65536)),f=(n=f+i+65535)-65536*(i=Math.floor(n/65536)),g=(n=g+i+65535)-65536*(i=Math.floor(n/65536)),p=(n=p+i+65535)-65536*(i=Math.floor(n/65536)),d=(n=d+i+65535)-65536*(i=Math.floor(n/65536)),A=(n=A+i+65535)-65536*(i=Math.floor(n/65536)),w=(n=w+i+65535)-65536*(i=Math.floor(n/65536)),m=(n=m+i+65535)-65536*(i=Math.floor(n/65536)),b=(n=b+i+65535)-65536*(i=Math.floor(n/65536)),s+=i-1+37*(i-1),e[0]=s,e[1]=a,e[2]=o,e[3]=c,e[4]=u,e[5]=h,e[6]=l,e[7]=y,e[8]=f,e[9]=g,e[10]=p,e[11]=d,e[12]=A,e[13]=w,e[14]=m,e[15]=b}function vt(e,t){Et(e,t,t)}function Bt(e,t){var r,n=et();for(r=0;r<16;r++)n[r]=t[r];for(r=253;r>=0;r--)vt(n,n),2!==r&&4!==r&&Et(n,n,t);for(r=0;r<16;r++)e[r]=n[r]}function St(e,t,r){var n,i,s=new Uint8Array(32),a=new Float64Array(80),o=et(),c=et(),u=et(),h=et(),l=et(),y=et();for(i=0;i<31;i++)s[i]=t[i];for(s[31]=127&t[31]|64,s[0]&=248,mt(a,r),i=0;i<16;i++)c[i]=a[i],h[i]=o[i]=u[i]=0;for(o[0]=h[0]=1,i=254;i>=0;--i)pt(o,c,n=s[i>>>3]>>>(7&i)&1),pt(u,h,n),bt(l,o,u),kt(o,o,u),bt(u,c,h),kt(c,c,h),vt(h,l),vt(y,o),Et(o,u,o),Et(u,c,l),bt(l,o,u),kt(o,o,u),vt(c,o),kt(u,h,y),Et(o,u,st),bt(o,o,h),Et(u,u,o),Et(o,h,y),Et(h,c,a),vt(c,l),pt(o,c,n),pt(u,h,n);for(i=0;i<16;i++)a[i+16]=o[i],a[i+32]=u[i],a[i+48]=c[i],a[i+64]=h[i];var f=a.subarray(32),g=a.subarray(16);return Bt(f,f),Et(g,g,f),dt(e,g),0}function It(e,t){return St(e,t,rt)}var Kt=[1116352408,3609767458,1899447441,602891725,3049323471,3964484399,3921009573,2173295548,961987163,4081628472,1508970993,3053834265,2453635748,2937671579,2870763221,3664609560,3624381080,2734883394,310598401,1164996542,607225278,1323610764,1426881987,3590304994,1925078388,4068182383,2162078206,991336113,2614888103,633803317,3248222580,3479774868,3835390401,2666613458,4022224774,944711139,264347078,2341262773,604807628,2007800933,770255983,1495990901,1249150122,1856431235,1555081692,3175218132,1996064986,2198950837,2554220882,3999719339,2821834349,766784016,2952996808,2566594879,3210313671,3203337956,3336571891,1034457026,3584528711,2466948901,113926993,3758326383,338241895,168717936,666307205,1188179964,773529912,1546045734,1294757372,1522805485,1396182291,2643833823,1695183700,2343527390,1986661051,1014477480,2177026350,1206759142,2456956037,344077627,2730485921,1290863460,2820302411,3158454273,3259730800,3505952657,3345764771,106217008,3516065817,3606008344,3600352804,1432725776,4094571909,1467031594,275423344,851169720,430227734,3100823752,506948616,1363258195,659060556,3750685593,883997877,3785050280,958139571,3318307427,1322822218,3812723403,1537002063,2003034995,1747873779,3602036899,1955562222,1575990012,2024104815,1125592928,2227730452,2716904306,2361852424,442776044,2428436474,593698344,2756734187,3733110249,3204031479,2999351573,3329325298,3815920427,3391569614,3928383900,3515267271,566280711,3940187606,3454069534,4118630271,4000239992,116418474,1914138554,174292421,2731055270,289380356,3203993006,460393269,320620315,685471733,587496836,852142971,1086792851,1017036298,365543100,1126000580,2618297676,1288033470,3409855158,1501505948,4234509866,1607167915,987167468,1816402316,1246189591];function Ct(e,t,r,n){for(var i,s,a,o,c,u,h,l,y,f,g,p,d,A,w,m,b,k,E,v,B,S,I,K,C,U,P=new Int32Array(16),D=new Int32Array(16),x=e[0],Q=e[1],R=e[2],T=e[3],M=e[4],L=e[5],F=e[6],N=e[7],O=t[0],_=t[1],H=t[2],z=t[3],G=t[4],q=t[5],j=t[6],V=t[7],Y=0;n>=128;){for(E=0;E<16;E++)v=8*E+Y,P[E]=r[v+0]<<24|r[v+1]<<16|r[v+2]<<8|r[v+3],D[E]=r[v+4]<<24|r[v+5]<<16|r[v+6]<<8|r[v+7];for(E=0;E<80;E++)if(i=x,s=Q,a=R,o=T,c=M,u=L,h=F,N,y=O,f=_,g=H,p=z,d=G,A=q,w=j,V,I=65535&(S=V),K=S>>>16,C=65535&(B=N),U=B>>>16,I+=65535&(S=(G>>>14|M<<18)^(G>>>18|M<<14)^(M>>>9|G<<23)),K+=S>>>16,C+=65535&(B=(M>>>14|G<<18)^(M>>>18|G<<14)^(G>>>9|M<<23)),U+=B>>>16,I+=65535&(S=G&q^~G&j),K+=S>>>16,C+=65535&(B=M&L^~M&F),U+=B>>>16,B=Kt[2*E],I+=65535&(S=Kt[2*E+1]),K+=S>>>16,C+=65535&B,U+=B>>>16,B=P[E%16],K+=(S=D[E%16])>>>16,C+=65535&B,U+=B>>>16,C+=(K+=(I+=65535&S)>>>16)>>>16,I=65535&(S=k=65535&I|K<<16),K=S>>>16,C=65535&(B=b=65535&C|(U+=C>>>16)<<16),U=B>>>16,I+=65535&(S=(O>>>28|x<<4)^(x>>>2|O<<30)^(x>>>7|O<<25)),K+=S>>>16,C+=65535&(B=(x>>>28|O<<4)^(O>>>2|x<<30)^(O>>>7|x<<25)),U+=B>>>16,K+=(S=O&_^O&H^_&H)>>>16,C+=65535&(B=x&Q^x&R^Q&R),U+=B>>>16,l=65535&(C+=(K+=(I+=65535&S)>>>16)>>>16)|(U+=C>>>16)<<16,m=65535&I|K<<16,I=65535&(S=p),K=S>>>16,C=65535&(B=o),U=B>>>16,K+=(S=k)>>>16,C+=65535&(B=b),U+=B>>>16,Q=i,R=s,T=a,M=o=65535&(C+=(K+=(I+=65535&S)>>>16)>>>16)|(U+=C>>>16)<<16,L=c,F=u,N=h,x=l,_=y,H=f,z=g,G=p=65535&I|K<<16,q=d,j=A,V=w,O=m,E%16==15)for(v=0;v<16;v++)B=P[v],I=65535&(S=D[v]),K=S>>>16,C=65535&B,U=B>>>16,B=P[(v+9)%16],I+=65535&(S=D[(v+9)%16]),K+=S>>>16,C+=65535&B,U+=B>>>16,b=P[(v+1)%16],I+=65535&(S=((k=D[(v+1)%16])>>>1|b<<31)^(k>>>8|b<<24)^(k>>>7|b<<25)),K+=S>>>16,C+=65535&(B=(b>>>1|k<<31)^(b>>>8|k<<24)^b>>>7),U+=B>>>16,b=P[(v+14)%16],K+=(S=((k=D[(v+14)%16])>>>19|b<<13)^(b>>>29|k<<3)^(k>>>6|b<<26))>>>16,C+=65535&(B=(b>>>19|k<<13)^(k>>>29|b<<3)^b>>>6),U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,P[v]=65535&C|U<<16,D[v]=65535&I|K<<16;I=65535&(S=O),K=S>>>16,C=65535&(B=x),U=B>>>16,B=e[0],K+=(S=t[0])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[0]=x=65535&C|U<<16,t[0]=O=65535&I|K<<16,I=65535&(S=_),K=S>>>16,C=65535&(B=Q),U=B>>>16,B=e[1],K+=(S=t[1])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[1]=Q=65535&C|U<<16,t[1]=_=65535&I|K<<16,I=65535&(S=H),K=S>>>16,C=65535&(B=R),U=B>>>16,B=e[2],K+=(S=t[2])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[2]=R=65535&C|U<<16,t[2]=H=65535&I|K<<16,I=65535&(S=z),K=S>>>16,C=65535&(B=T),U=B>>>16,B=e[3],K+=(S=t[3])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[3]=T=65535&C|U<<16,t[3]=z=65535&I|K<<16,I=65535&(S=G),K=S>>>16,C=65535&(B=M),U=B>>>16,B=e[4],K+=(S=t[4])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[4]=M=65535&C|U<<16,t[4]=G=65535&I|K<<16,I=65535&(S=q),K=S>>>16,C=65535&(B=L),U=B>>>16,B=e[5],K+=(S=t[5])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[5]=L=65535&C|U<<16,t[5]=q=65535&I|K<<16,I=65535&(S=j),K=S>>>16,C=65535&(B=F),U=B>>>16,B=e[6],K+=(S=t[6])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[6]=F=65535&C|U<<16,t[6]=j=65535&I|K<<16,I=65535&(S=V),K=S>>>16,C=65535&(B=N),U=B>>>16,B=e[7],K+=(S=t[7])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[7]=N=65535&C|U<<16,t[7]=V=65535&I|K<<16,Y+=128,n-=128}return n}function Ut(e,t,r){var n,i=new Int32Array(8),s=new Int32Array(8),a=new Uint8Array(256),o=r;for(i[0]=1779033703,i[1]=3144134277,i[2]=1013904242,i[3]=2773480762,i[4]=1359893119,i[5]=2600822924,i[6]=528734635,i[7]=1541459225,s[0]=4089235720,s[1]=2227873595,s[2]=4271175723,s[3]=1595750129,s[4]=2917565137,s[5]=725511199,s[6]=4215389547,s[7]=327033209,Ct(i,s,t,r),r%=128,n=0;n<r;n++)a[n]=t[o-r+n];for(a[r]=128,a[(r=256-128*(r<112?1:0))-9]=0,lt(a,r-8,o/536870912|0,o<<3),Ct(i,s,a,r),n=0;n<8;n++)lt(e,8*n,i[n],s[n]);return 0}function Pt(e,t){var r=et(),n=et(),i=et(),s=et(),a=et(),o=et(),c=et(),u=et(),h=et();kt(r,e[1],e[0]),kt(h,t[1],t[0]),Et(r,r,h),bt(n,e[0],e[1]),bt(h,t[0],t[1]),Et(n,n,h),Et(i,e[3],t[3]),Et(i,i,ot),Et(s,e[2],t[2]),bt(s,s,s),kt(a,n,r),kt(o,s,i),bt(c,s,i),bt(u,n,r),Et(e[0],a,o),Et(e[1],u,c),Et(e[2],c,o),Et(e[3],a,u)}function Dt(e,t,r){var n;for(n=0;n<4;n++)pt(e[n],t[n],r)}function xt(e,t){var r=et(),n=et(),i=et();Bt(i,t[2]),Et(r,t[0],i),Et(n,t[1],i),dt(e,n),e[31]^=wt(r)<<7}function Qt(e,t,r){var n,i;for(ft(e[0],nt),ft(e[1],it),ft(e[2],it),ft(e[3],nt),i=255;i>=0;--i)Dt(e,t,n=r[i/8|0]>>(7&i)&1),Pt(t,e),Pt(e,e),Dt(e,t,n)}function Rt(e,t){var r=[et(),et(),et(),et()];ft(r[0],ct),ft(r[1],ut),ft(r[2],it),Et(r[3],ct,ut),Qt(e,r,t)}function Tt(e,t,r){var n,i=new Uint8Array(64),s=[et(),et(),et(),et()];for(r||tt(t,32),Ut(i,t,32),i[0]&=248,i[31]&=127,i[31]|=64,Rt(s,i),xt(e,s),n=0;n<32;n++)t[n+32]=e[n];return 0}var Mt=new Float64Array([237,211,245,92,26,99,18,88,214,156,247,162,222,249,222,20,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,16]);function Lt(e,t){var r,n,i,s;for(n=63;n>=32;--n){for(r=0,i=n-32,s=n-12;i<s;++i)t[i]+=r-16*t[n]*Mt[i-(n-32)],r=Math.floor((t[i]+128)/256),t[i]-=256*r;t[i]+=r,t[n]=0}for(r=0,i=0;i<32;i++)t[i]+=r-(t[31]>>4)*Mt[i],r=t[i]>>8,t[i]&=255;for(i=0;i<32;i++)t[i]-=r*Mt[i];for(n=0;n<32;n++)t[n+1]+=t[n]>>8,e[n]=255&t[n]}function Ft(e){var t,r=new Float64Array(64);for(t=0;t<64;t++)r[t]=e[t];for(t=0;t<64;t++)e[t]=0;Lt(e,r)}function Nt(e,t){var r=et(),n=et(),i=et(),s=et(),a=et(),o=et(),c=et();return ft(e[2],it),mt(e[1],t),vt(i,e[1]),Et(s,i,at),kt(i,i,e[2]),bt(s,e[2],s),vt(a,s),vt(o,a),Et(c,o,a),Et(r,c,i),Et(r,r,s),function(e,t){var r,n=et();for(r=0;r<16;r++)n[r]=t[r];for(r=250;r>=0;r--)vt(n,n),1!==r&&Et(n,n,t);for(r=0;r<16;r++)e[r]=n[r]}(r,r),Et(r,r,i),Et(r,r,s),Et(r,r,s),Et(e[0],r,s),vt(n,e[0]),Et(n,n,s),At(n,i)&&Et(e[0],e[0],ht),vt(n,e[0]),Et(n,n,s),At(n,i)?-1:(wt(e[0])===t[31]>>7&&kt(e[0],nt,e[0]),Et(e[3],e[0],e[1]),0)}var Ot=64;function _t(){for(var e=0;e<arguments.length;e++)if(!(arguments[e]instanceof Uint8Array))throw new TypeError("unexpected type, use Uint8Array")}$e.scalarMult=function(e,t){if(_t(e,t),32!==e.length)throw Error("bad n size");if(32!==t.length)throw Error("bad p size");var r=new Uint8Array(32);return St(r,e,t),r},$e.box={},$e.box.keyPair=function(){var e=new Uint8Array(32),t=new Uint8Array(32);return function(e,t){tt(t,32),It(e,t)}(e,t),{publicKey:e,secretKey:t}},$e.box.keyPair.fromSecretKey=function(e){if(_t(e),32!==e.length)throw Error("bad secret key size");var t=new Uint8Array(32);return It(t,e),{publicKey:t,secretKey:new Uint8Array(e)}},$e.sign=function(e,t){if(_t(e,t),64!==t.length)throw Error("bad secret key size");var r=new Uint8Array(Ot+e.length);return function(e,t,r,n){var i,s,a=new Uint8Array(64),o=new Uint8Array(64),c=new Uint8Array(64),u=new Float64Array(64),h=[et(),et(),et(),et()];Ut(a,n,32),a[0]&=248,a[31]&=127,a[31]|=64;var l=r+64;for(i=0;i<r;i++)e[64+i]=t[i];for(i=0;i<32;i++)e[32+i]=a[32+i];for(Ut(c,e.subarray(32),r+32),Ft(c),Rt(h,c),xt(e,h),i=32;i<64;i++)e[i]=n[i];for(Ut(o,e,r+64),Ft(o),i=0;i<64;i++)u[i]=0;for(i=0;i<32;i++)u[i]=c[i];for(i=0;i<32;i++)for(s=0;s<32;s++)u[i+s]+=o[i]*a[s];Lt(e.subarray(32),u)}(r,e,e.length,t),r},$e.sign.detached=function(e,t){for(var r=$e.sign(e,t),n=new Uint8Array(Ot),i=0;i<n.length;i++)n[i]=r[i];return n},$e.sign.detached.verify=function(e,t,r){if(_t(e,t,r),t.length!==Ot)throw Error("bad signature size");if(32!==r.length)throw Error("bad public key size");var n,i=new Uint8Array(Ot+e.length),s=new Uint8Array(Ot+e.length);for(n=0;n<Ot;n++)i[n]=t[n];for(n=0;n<e.length;n++)i[n+Ot]=e[n];return function(e,t,r,n){var i,s=new Uint8Array(32),a=new Uint8Array(64),o=[et(),et(),et(),et()],c=[et(),et(),et(),et()];if(r<64)return-1;if(Nt(c,n))return-1;for(i=0;i<r;i++)e[i]=t[i];for(i=0;i<32;i++)e[i+32]=n[i];if(Ut(a,e,r),Ft(a),Qt(o,c,a),Rt(c,t.subarray(32)),Pt(o,c),xt(s,o),r-=64,yt(t,0,s,0)){for(i=0;i<r;i++)e[i]=0;return-1}for(i=0;i<r;i++)e[i]=t[i+64];return r}(s,i,i.length,r)>=0},$e.sign.keyPair=function(){var e=new Uint8Array(32),t=new Uint8Array(64);return Tt(e,t),{publicKey:e,secretKey:t}},$e.sign.keyPair.fromSecretKey=function(e){if(_t(e),64!==e.length)throw Error("bad secret key size");for(var t=new Uint8Array(32),r=0;r<t.length;r++)t[r]=e[32+r];return{publicKey:t,secretKey:new Uint8Array(e)}},$e.sign.keyPair.fromSeed=function(e){if(_t(e),32!==e.length)throw Error("bad seed size");for(var t=new Uint8Array(32),r=new Uint8Array(64),n=0;n<32;n++)r[n]=e[n];return Tt(t,r,!0),{publicKey:t,secretKey:r}},$e.setPRNG=function(e){tt=e},function(){if(Xe&&Xe.getRandomValues){$e.setPRNG((function(e,t){var r,n=new Uint8Array(t);for(r=0;r<t;r+=65536)Xe.getRandomValues(n.subarray(r,r+Math.min(t-r,65536)));for(r=0;r<t;r++)e[r]=n[r];!function(e){for(var t=0;t<e.length;t++)e[t]=0}(n)}))}}();const Ht={"2a8648ce3d030107":M.curve.nistP256,"2b81040022":M.curve.nistP384,"2b81040023":M.curve.nistP521,"2b8104000a":M.curve.secp256k1,"2b06010401da470f01":M.curve.ed25519Legacy,"2b060104019755010501":M.curve.curve25519Legacy,"2b2403030208010107":M.curve.brainpoolP256r1,"2b240303020801010b":M.curve.brainpoolP384r1,"2b240303020801010d":M.curve.brainpoolP512r1};class zt{constructor(e){if(e instanceof zt)this.oid=e.oid;else if(N.isArray(e)||N.isUint8Array(e)){if(6===(e=new Uint8Array(e))[0]){if(e[1]!==e.length-2)throw Error("Length mismatch in DER encoded oid");e=e.subarray(2)}this.oid=e}else this.oid=""}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.oid=e.subarray(1,1+t),1+this.oid.length}throw Error("Invalid oid")}write(){return N.concatUint8Array([new Uint8Array([this.oid.length]),this.oid])}toHex(){return N.uint8ArrayToHex(this.oid)}getName(){const e=Ht[this.toHex()];if(!e)throw Error("Unknown curve object identifier.");return e}}function Gt(e){let t,r=0;const n=e[0];return n<192?([r]=e,t=1):n<255?(r=(e[0]-192<<8)+e[1]+192,t=2):255===n&&(r=N.readNumber(e.subarray(1,5)),t=5),{len:r,offset:t}}function qt(e){return e<192?new Uint8Array([e]):e>191&&e<8384?new Uint8Array([192+(e-192>>8),e-192&255]):N.concatUint8Array([new Uint8Array([255]),N.writeNumber(e,4)])}function jt(e){if(e<0||e>30)throw Error("Partial Length power must be between 1 and 30");return new Uint8Array([224+e])}function Vt(e){return new Uint8Array([192|e])}function Yt(e,t){return N.concatUint8Array([Vt(e),qt(t)])}function Zt(e){return[M.packet.literalData,M.packet.compressedData,M.packet.symmetricallyEncryptedData,M.packet.symEncryptedIntegrityProtectedData,M.packet.aeadEncryptedData].includes(e)}async function Wt(e,t){const r=Q(e);let n,i;try{const s=await r.peekBytes(2);if(!s||s.length<2||!(128&s[0]))throw Error("Error during parsing. This message / key probably does not conform to a valid OpenPGP format.");const a=await r.readByte();let o,c,u=-1,h=-1;h=0,64&a&&(h=1),h?u=63&a:(u=(63&a)>>2,c=3&a);const l=Zt(u);let y,f=null;if(l){if("array"===N.isStream(e)){const e=new ArrayStream;n=R(e),f=e}else{const e=new TransformStream;n=R(e.writable),f=e.readable}i=t({tag:u,packet:f})}else f=[];do{if(h){const e=await r.readByte();if(y=!1,e<192)o=e;else if(e>=192&&e<224)o=(e-192<<8)+await r.readByte()+192;else if(e>223&&e<255){if(o=1<<(31&e),y=!0,!l)throw new TypeError("This packet type does not support partial lengths.")}else o=await r.readByte()<<24|await r.readByte()<<16|await r.readByte()<<8|await r.readByte()}else switch(c){case 0:o=await r.readByte();break;case 1:o=await r.readByte()<<8|await r.readByte();break;case 2:o=await r.readByte()<<24|await r.readByte()<<16|await r.readByte()<<8|await r.readByte();break;default:o=1/0}if(o>0){let e=0;for(;;){n&&await n.ready;const{done:t,value:i}=await r.read();if(t){if(o===1/0)break;throw Error("Unexpected end of packet")}const s=o===1/0?i:i.subarray(0,o-e);if(n?await n.write(s):f.push(s),e+=i.length,e>=o){r.unshift(i.subarray(o-e+i.length));break}}}}while(y);const g=await r.peekBytes(l?1/0:2);return n?(await n.ready,await n.close()):(f=N.concatUint8Array(f),await t({tag:u,packet:f})),!g||!g.length}catch(e){if(n)return await n.abort(e),!0;throw e}finally{n&&await i,r.releaseLock()}}class Jt extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Jt),this.name="UnsupportedError"}}class Xt extends Jt{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Jt),this.name="UnknownPacketError"}}class $t{constructor(e,t){this.tag=e,this.rawContent=t}write(){return this.rawContent}}
1
+ /*! OpenPGP.js v6.1.1-patch.2 - 2025-05-14 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
2
+ const e="undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:{};import{createRequire as t}from"module";import*as r from"node:crypto";import*as n from"crypto";function i(e,t){return t.forEach((function(t){t&&"string"!=typeof t&&!Array.isArray(t)&&Object.keys(t).forEach((function(r){if("default"!==r&&!(r in e)){var n=Object.getOwnPropertyDescriptor(t,r);Object.defineProperty(e,r,n.get?n:{enumerable:!0,get:function(){return t[r]}})}}))})),Object.freeze(e)}const s=Symbol("doneWritingPromise"),a=Symbol("doneWritingResolve"),o=Symbol("doneWritingReject"),c=Symbol("readingIndex");class ArrayStream extends Array{constructor(){super(),Object.setPrototypeOf(this,ArrayStream.prototype),this[s]=new Promise(((e,t)=>{this[a]=e,this[o]=t})),this[s].catch((()=>{}))}}function u(e){return e&&e.getReader&&Array.isArray(e)}function h(e){if(!u(e)){const t=e.getWriter(),r=t.releaseLock;return t.releaseLock=()=>{t.closed.catch((function(){})),r.call(t)},t}this.stream=e}function l(t){if(u(t))return"array";if(e.ReadableStream&&e.ReadableStream.prototype.isPrototypeOf(t))return"web";if(t&&!(e.ReadableStream&&t instanceof e.ReadableStream)&&"function"==typeof t._read&&"object"==typeof t._readableState)throw Error("Native Node streams are no longer supported: please manually convert the stream to a WebStream, using e.g. `stream.Readable.toWeb`");return!(!t||!t.getReader)&&"web-like"}function y(e){return Uint8Array.prototype.isPrototypeOf(e)}function f(e){if(1===e.length)return e[0];let t=0;for(let r=0;r<e.length;r++){if(!y(e[r]))throw Error("concatUint8Array: Data must be in the form of a Uint8Array");t+=e[r].length}const r=new Uint8Array(t);let n=0;return e.forEach((function(e){r.set(e,n),n+=e.length})),r}ArrayStream.prototype.getReader=function(){return void 0===this[c]&&(this[c]=0),{read:async()=>(await this[s],this[c]===this.length?{value:void 0,done:!0}:{value:this[this[c]++],done:!1})}},ArrayStream.prototype.readToEnd=async function(e){await this[s];const t=e(this.slice(this[c]));return this.length=0,t},ArrayStream.prototype.clone=function(){const e=new ArrayStream;return e[s]=this[s].then((()=>{e.push(...this)})),e},h.prototype.write=async function(e){this.stream.push(e)},h.prototype.close=async function(){this.stream[a]()},h.prototype.abort=async function(e){return this.stream[o](e),e},h.prototype.releaseLock=function(){},"object"==typeof e.process&&e.process.versions;const g=new WeakSet,p=Symbol("externalBuffer");function d(e){if(this.stream=e,e[p]&&(this[p]=e[p].slice()),u(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{},void(this._cancel=()=>{})}if(l(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{t.closed.catch((function(){})),t.releaseLock()},void(this._cancel=t.cancel.bind(t))}let t=!1;this._read=async()=>t||g.has(e)?{value:void 0,done:!0}:(t=!0,{value:e,done:!1}),this._releaseLock=()=>{if(t)try{g.add(e)}catch(e){}}}function A(e){return l(e)?e:new ReadableStream({start(t){t.enqueue(e),t.close()}})}function w(e){if(l(e))return e;const t=new ArrayStream;return(async()=>{const r=R(t);await r.write(e),await r.close()})(),t}function m(e){return e.some((e=>l(e)&&!u(e)))?function(e){e=e.map(A);const t=E((async function(e){await Promise.all(n.map((t=>D(t,e))))}));let r=Promise.resolve();const n=e.map(((n,i)=>B(n,((n,s)=>(r=r.then((()=>b(n,t.writable,{preventClose:i!==e.length-1}))),r)))));return t.readable}(e):e.some((e=>u(e)))?function(e){const t=new ArrayStream;let r=Promise.resolve();return e.forEach(((n,i)=>(r=r.then((()=>b(n,t,{preventClose:i!==e.length-1}))),r))),t}(e):"string"==typeof e[0]?e.join(""):f(e)}async function b(e,t,{preventClose:r=!1,preventAbort:n=!1,preventCancel:i=!1}={}){if(l(e)&&!u(e)){e=A(e);try{if(e[p]){const r=R(t);for(let t=0;t<e[p].length;t++)await r.ready,await r.write(e[p][t]);r.releaseLock()}await e.pipeTo(t,{preventClose:r,preventAbort:n,preventCancel:i})}catch(e){}return}const s=Q(e=w(e)),a=R(t);try{for(;;){await a.ready;const{done:e,value:t}=await s.read();if(e){r||await a.close();break}await a.write(t)}}catch(e){n||await a.abort(e)}finally{s.releaseLock(),a.releaseLock()}}function k(e,t){const r=new TransformStream(t);return b(e,r.writable),r.readable}function E(e){let t,r,n,i=!1,s=!1;return{readable:new ReadableStream({start(e){n=e},pull(){t?t():i=!0},async cancel(t){s=!0,e&&await e(t),r&&r(t)}},{highWaterMark:0}),writable:new WritableStream({write:async function(e){if(s)throw Error("Stream is cancelled");n.enqueue(e),i?i=!1:(await new Promise(((e,n)=>{t=e,r=n})),t=null,r=null)},close:n.close.bind(n),abort:n.error.bind(n)})}}function v(e,t=()=>{},r=()=>{}){if(u(e)){const n=new ArrayStream;return(async()=>{const i=R(n);try{const n=await P(e),s=t(n),a=r();let o;o=void 0!==s&&void 0!==a?m([s,a]):void 0!==s?s:a,await i.write(o),await i.close()}catch(e){await i.abort(e)}})(),n}if(l(e))return k(e,{async transform(e,r){try{const n=await t(e);void 0!==n&&r.enqueue(n)}catch(e){r.error(e)}},async flush(e){try{const t=await r();void 0!==t&&e.enqueue(t)}catch(t){e.error(t)}}});const n=t(e),i=r();return void 0!==n&&void 0!==i?m([n,i]):void 0!==n?n:i}function B(e,t){if(l(e)&&!u(e)){let r;const n=new TransformStream({start(e){r=e}}),i=b(e,n.writable),s=E((async function(e){r.error(e),await i,await new Promise(setTimeout)}));return t(n.readable,s.writable),s.readable}e=w(e);const r=new ArrayStream;return t(e,r),r}function S(e,t){let r;const n=B(e,((e,i)=>{const s=Q(e);s.remainder=()=>(s.releaseLock(),b(e,i),n),r=t(s)}));return r}function I(e){if(u(e))return e.clone();if(l(e)){const t=function(e){if(u(e))throw Error("ArrayStream cannot be tee()d, use clone() instead");if(l(e)){const t=A(e).tee();return t[0][p]=t[1][p]=e[p],t}return[U(e),U(e)]}(e);return C(e,t[0]),t[1]}return U(e)}function K(e){return u(e)?I(e):l(e)?new ReadableStream({start(t){const r=B(e,(async(e,r)=>{const n=Q(e),i=R(r);try{for(;;){await i.ready;const{done:e,value:r}=await n.read();if(e){try{t.close()}catch(e){}return void await i.close()}try{t.enqueue(r)}catch(e){}await i.write(r)}}catch(e){t.error(e),await i.abort(e)}}));C(e,r)}}):U(e)}function C(e,t){Object.entries(Object.getOwnPropertyDescriptors(e.constructor.prototype)).forEach((([r,n])=>{"constructor"!==r&&(n.value?n.value=n.value.bind(t):n.get=n.get.bind(t),Object.defineProperty(e,r,n))}))}function U(e,t=0,r=1/0){if(u(e))throw Error("Not implemented");if(l(e)){if(t>=0&&r>=0){let n=0;return k(e,{transform(e,i){n<r?(n+e.length>=t&&i.enqueue(U(e,Math.max(t-n,0),r-n)),n+=e.length):i.terminate()}})}if(t<0&&(r<0||r===1/0)){let n=[];return v(e,(e=>{e.length>=-t?n=[e]:n.push(e)}),(()=>U(m(n),t,r)))}if(0===t&&r<0){let n;return v(e,(e=>{const i=n?m([n,e]):e;if(i.length>=-r)return n=U(i,r),U(i,t,r);n=i}))}return console.warn(`stream.slice(input, ${t}, ${r}) not implemented efficiently.`),x((async()=>U(await P(e),t,r)))}return e[p]&&(e=m(e[p].concat([e]))),y(e)?e.subarray(t,r===1/0?e.length:r):e.slice(t,r)}async function P(e,t=m){return u(e)?e.readToEnd(t):l(e)?Q(e).readToEnd(t):e}async function D(e,t){if(l(e)){if(e.cancel){const r=await e.cancel(t);return await new Promise(setTimeout),r}if(e.destroy)return e.destroy(t),await new Promise(setTimeout),t}}function x(e){const t=new ArrayStream;return(async()=>{const r=R(t);try{await r.write(await e()),await r.close()}catch(e){await r.abort(e)}})(),t}function Q(e){return new d(e)}function R(e){return new h(e)}d.prototype.read=async function(){if(this[p]&&this[p].length){return{done:!1,value:this[p].shift()}}return this._read()},d.prototype.releaseLock=function(){this[p]&&(this.stream[p]=this[p]),this._releaseLock()},d.prototype.cancel=function(e){return this._cancel(e)},d.prototype.readLine=async function(){let e,t=[];for(;!e;){let{done:r,value:n}=await this.read();if(n+="",r)return t.length?m(t):void 0;const i=n.indexOf("\n")+1;i&&(e=m(t.concat(n.substr(0,i))),t=[]),i!==n.length&&t.push(n.substr(i))}return this.unshift(...t),e},d.prototype.readByte=async function(){const{done:e,value:t}=await this.read();if(e)return;const r=t[0];return this.unshift(U(t,1)),r},d.prototype.readBytes=async function(e){const t=[];let r=0;for(;;){const{done:n,value:i}=await this.read();if(n)return t.length?m(t):void 0;if(t.push(i),r+=i.length,r>=e){const r=m(t);return this.unshift(U(r,e)),U(r,0,e)}}},d.prototype.peekBytes=async function(e){const t=await this.readBytes(e);return this.unshift(t),t},d.prototype.unshift=function(...e){this[p]||(this[p]=[]),1===e.length&&y(e[0])&&this[p].length&&e[0].length&&this[p][0].byteOffset>=e[0].length?this[p][0]=new Uint8Array(this[p][0].buffer,this[p][0].byteOffset-e[0].length,this[p][0].byteLength+e[0].length):this[p].unshift(...e.filter((e=>e&&e.length)))},d.prototype.readToEnd=async function(e=m){const t=[];for(;;){const{done:e,value:r}=await this.read();if(e)break;t.push(r)}return e(t)};const T=Symbol("byValue");var M={curve:{nistP256:"nistP256",p256:"nistP256",nistP384:"nistP384",p384:"nistP384",nistP521:"nistP521",p521:"nistP521",secp256k1:"secp256k1",ed25519Legacy:"ed25519Legacy",ed25519:"ed25519Legacy",curve25519Legacy:"curve25519Legacy",curve25519:"curve25519Legacy",brainpoolP256r1:"brainpoolP256r1",brainpoolP384r1:"brainpoolP384r1",brainpoolP512r1:"brainpoolP512r1"},kdfFlags:{replace_fingerprint:1,replace_kdf_params:2},s2k:{simple:0,salted:1,iterated:3,argon2:4,gnu:101},publicKey:{rsaEncryptSign:1,rsaEncrypt:2,rsaSign:3,elgamal:16,dsa:17,ecdh:18,ecdsa:19,eddsaLegacy:22,aedh:23,aedsa:24,x25519:25,x448:26,ed25519:27,ed448:28,pqc_mlkem_x25519:105,pqc_mldsa_ed25519:107,aead:100,hmac:101},symmetric:{idea:1,tripledes:2,cast5:3,blowfish:4,aes128:7,aes192:8,aes256:9,twofish:10},compression:{uncompressed:0,zip:1,zlib:2,bzip2:3},hash:{md5:1,sha1:2,ripemd:3,sha256:8,sha384:9,sha512:10,sha224:11,sha3_256:12,sha3_512:14},webHash:{"SHA-1":2,"SHA-256":8,"SHA-384":9,"SHA-512":10},aead:{eax:1,ocb:2,gcm:3,experimentalGCM:100},packet:{publicKeyEncryptedSessionKey:1,signature:2,symEncryptedSessionKey:3,onePassSignature:4,secretKey:5,publicKey:6,secretSubkey:7,compressedData:8,symmetricallyEncryptedData:9,marker:10,literalData:11,trust:12,userID:13,publicSubkey:14,userAttribute:17,symEncryptedIntegrityProtectedData:18,modificationDetectionCode:19,aeadEncryptedData:20,padding:21},literal:{binary:98,text:116,utf8:117,mime:109},signature:{binary:0,text:1,standalone:2,certGeneric:16,certPersona:17,certCasual:18,certPositive:19,certRevocation:48,subkeyBinding:24,keyBinding:25,key:31,keyRevocation:32,subkeyRevocation:40,timestamp:64,thirdParty:80},signatureSubpacket:{signatureCreationTime:2,signatureExpirationTime:3,exportableCertification:4,trustSignature:5,regularExpression:6,revocable:7,keyExpirationTime:9,placeholderBackwardsCompatibility:10,preferredSymmetricAlgorithms:11,revocationKey:12,issuerKeyID:16,notationData:20,preferredHashAlgorithms:21,preferredCompressionAlgorithms:22,keyServerPreferences:23,preferredKeyServer:24,primaryUserID:25,policyURI:26,keyFlags:27,signersUserID:28,reasonForRevocation:29,features:30,signatureTarget:31,embeddedSignature:32,issuerFingerprint:33,preferredAEADAlgorithms:34,preferredCipherSuites:39},keyFlags:{certifyKeys:1,signData:2,encryptCommunication:4,encryptStorage:8,splitPrivateKey:16,authentication:32,forwardedCommunication:64,sharedPrivateKey:128},armor:{multipartSection:0,multipartLast:1,signed:2,message:3,publicKey:4,privateKey:5,signature:6},reasonForRevocation:{noReason:0,keySuperseded:1,keyCompromised:2,keyRetired:3,userIDInvalid:32},features:{modificationDetection:1,aead:2,v5Keys:4,seipdv2:8},write:function(e,t){if("number"==typeof t&&(t=this.read(e,t)),void 0!==e[t])return e[t];throw Error("Invalid enum value.")},read:function(e,t){if(e[T]||(e[T]=[],Object.entries(e).forEach((([t,r])=>{e[T][r]=t}))),void 0!==e[T][t])return e[T][t];throw Error("Invalid enum value.")}},L={preferredHashAlgorithm:M.hash.sha512,preferredSymmetricAlgorithm:M.symmetric.aes256,preferredCompressionAlgorithm:M.compression.uncompressed,aeadProtect:!1,ignoreSEIPDv2FeatureFlag:!1,parseAEADEncryptedV4KeysAsLegacy:!1,preferredAEADAlgorithm:M.aead.gcm,aeadChunkSizeByte:12,v6Keys:!1,enableParsingV5Entities:!1,s2kType:M.s2k.iterated,s2kIterationCountByte:224,s2kArgon2Params:{passes:3,parallelism:4,memoryExponent:16},allowUnauthenticatedMessages:!1,allowUnauthenticatedStream:!1,allowForwardedMessages:!1,minRSABits:2047,passwordCollisionCheck:!1,allowInsecureDecryptionWithSigningKeys:!1,allowInsecureVerificationWithReformattedKeys:!1,allowMissingKeyFlags:!1,constantTimePKCS1Decryption:!1,constantTimePKCS1DecryptionSupportedSymmetricAlgorithms:new Set([M.symmetric.aes128,M.symmetric.aes192,M.symmetric.aes256]),ignoreUnsupportedPackets:!0,ignoreMalformedPackets:!1,enforceGrammar:!0,pluggableGrammarErrorReporter:null,additionalAllowedPackets:[],showVersion:!1,showComment:!1,versionString:"OpenPGP.js 6.1.1-patch.2",commentString:"https://openpgpjs.org",maxUserIDLength:5120,knownNotations:[],nonDeterministicSignaturesViaNotation:!0,useEllipticFallback:!0,rejectHashAlgorithms:new Set([M.hash.md5,M.hash.ripemd]),rejectMessageHashAlgorithms:new Set([M.hash.md5,M.hash.ripemd,M.hash.sha1]),rejectPublicKeyAlgorithms:new Set([M.publicKey.elgamal,M.publicKey.dsa]),rejectCurves:new Set([M.curve.secp256k1])};const F=(()=>{try{return"development"===process.env.NODE_ENV}catch(e){}return!1})(),N={isString:function(e){return"string"==typeof e||e instanceof String},nodeRequire:t(import.meta.url),isArray:function(e){return e instanceof Array},isUint8Array:y,isStream:l,getNobleCurve:async(e,t)=>{if(!L.useEllipticFallback)throw Error("This curve is only supported in the full build of OpenPGP.js");const{nobleCurves:r}=await Promise.resolve().then((function(){return nf}));switch(e){case M.publicKey.ecdh:case M.publicKey.ecdsa:{const e=r.get(t);if(!e)throw Error("Unsupported curve");return e}case M.publicKey.x448:return r.get("x448");case M.publicKey.ed448:return r.get("ed448");default:throw Error("Unsupported curve")}},readNumber:function(e){let t=0;for(let r=0;r<e.length;r++)t+=256**r*e[e.length-1-r];return t},writeNumber:function(e,t){const r=new Uint8Array(t);for(let n=0;n<t;n++)r[n]=e>>8*(t-n-1)&255;return r},readDate:function(e){const t=N.readNumber(e);return new Date(1e3*t)},writeDate:function(e){const t=Math.floor(e.getTime()/1e3);return N.writeNumber(t,4)},normalizeDate:function(e=Date.now()){return null===e||e===1/0?e:new Date(1e3*Math.floor(+e/1e3))},readMPI:function(e){const t=(e[0]<<8|e[1])+7>>>3;return N.readExactSubarray(e,2,2+t)},readExactSubarray:function(e,t,r){if(e.length<r-t)throw Error("Input array too short");return e.subarray(t,r)},leftPad(e,t){if(e.length>t)throw Error("Input array too long");const r=new Uint8Array(t),n=t-e.length;return r.set(e,n),r},uint8ArrayToMPI:function(e){const t=N.uint8ArrayBitLength(e);if(0===t)throw Error("Zero MPI");const r=e.subarray(e.length-Math.ceil(t/8)),n=new Uint8Array([(65280&t)>>8,255&t]);return N.concatUint8Array([n,r])},uint8ArrayBitLength:function(e){let t;for(t=0;t<e.length&&0===e[t];t++);if(t===e.length)return 0;const r=e.subarray(t);return 8*(r.length-1)+N.nbits(r[0])},hexToUint8Array:function(e){const t=new Uint8Array(e.length>>1);for(let r=0;r<e.length>>1;r++)t[r]=parseInt(e.substr(r<<1,2),16);return t},uint8ArrayToHex:function(e){const t="0123456789abcdef";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),r},stringToUint8Array:function(e){return v(e,(e=>{if(!N.isString(e))throw Error("stringToUint8Array: Data must be in the form of a string");const t=new Uint8Array(e.length);for(let r=0;r<e.length;r++)t[r]=e.charCodeAt(r);return t}))},uint8ArrayToString:function(e){const t=[],r=16384,n=(e=new Uint8Array(e)).length;for(let i=0;i<n;i+=r)t.push(String.fromCharCode.apply(String,e.subarray(i,i+r<n?i+r:n)));return t.join("")},encodeUTF8:function(e){const t=new TextEncoder("utf-8");function r(e,r=!1){return t.encode(e,{stream:!r})}return v(e,r,(()=>r("",!0)))},decodeUTF8:function(e){const t=new TextDecoder("utf-8");function r(e,r=!1){return t.decode(e,{stream:!r})}return v(e,r,(()=>r(new Uint8Array,!0)))},concat:m,concatUint8Array:f,equalsUint8Array:function(e,t){if(!N.isUint8Array(e)||!N.isUint8Array(t))throw Error("Data must be in the form of a Uint8Array");if(e.length!==t.length)return!1;for(let r=0;r<e.length;r++)if(e[r]!==t[r])return!1;return!0},findLastIndex:function(e,t){for(let r=e.length;r>=0;r--)if(t(e[r],r,e))return r;return-1},writeChecksum:function(e){let t=0;for(let r=0;r<e.length;r++)t=t+e[r]&65535;return N.writeNumber(t,2)},printDebug:function(e){F&&console.log("[OpenPGP.js debug]",e)},printDebugError:function(e){F&&console.error("[OpenPGP.js debug]",e)},nbits:function(e){let t=1,r=e>>>16;return 0!==r&&(e=r,t+=16),r=e>>8,0!==r&&(e=r,t+=8),r=e>>4,0!==r&&(e=r,t+=4),r=e>>2,0!==r&&(e=r,t+=2),r=e>>1,0!==r&&(e=r,t+=1),t},double:function(e){const t=new Uint8Array(e.length),r=e.length-1;for(let n=0;n<r;n++)t[n]=e[n]<<1^e[n+1]>>7;return t[r]=e[r]<<1^135*(e[0]>>7),t},shiftRight:function(e,t){if(t)for(let r=e.length-1;r>=0;r--)e[r]>>=t,r>0&&(e[r]|=e[r-1]<<8-t);return e},getWebCrypto:function(){const t=void 0!==e&&e.crypto&&e.crypto.subtle||this.getNodeCrypto()?.webcrypto.subtle;if(!t)throw Error("The WebCrypto API is not available");return t},getNodeCrypto:function(){return this.nodeRequire("crypto")},getNodeZlib:function(){return this.nodeRequire("zlib")},getNodeBuffer:function(){return(this.nodeRequire("buffer")||{}).Buffer},getHardwareConcurrency:function(){if("undefined"!=typeof navigator)return navigator.hardwareConcurrency||1;return this.nodeRequire("os").cpus().length},isEmailAddress:function(e){if(!N.isString(e))return!1;return/^[^\p{C}\p{Z}@<>\\]+@[^\p{C}\p{Z}@<>\\]+[^\p{C}\p{Z}\p{P}]$/u.test(e)},canonicalizeEOL:function(e){let t=!1;return v(e,(e=>{let r;t&&(e=N.concatUint8Array([new Uint8Array([13]),e])),13===e[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;const n=[];for(let t=0;r=e.indexOf(10,t)+1,r;t=r)13!==e[r-2]&&n.push(r);if(!n.length)return e;const i=new Uint8Array(e.length+n.length);let s=0;for(let t=0;t<n.length;t++){const r=e.subarray(n[t-1]||0,n[t]);i.set(r,s),s+=r.length,i[s-1]=13,i[s]=10,s++}return i.set(e.subarray(n[n.length-1]||0),s),i}),(()=>t?new Uint8Array([13]):void 0))},nativeEOL:function(e){let t=!1;return v(e,(e=>{let r;13===(e=t&&10!==e[0]?N.concatUint8Array([new Uint8Array([13]),e]):new Uint8Array(e))[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;let n=0;for(let t=0;t!==e.length;t=r){r=e.indexOf(13,t)+1,r||(r=e.length);const i=r-(10===e[r]?1:0);t&&e.copyWithin(n,t,i),n+=i-t}return e.subarray(0,n)}),(()=>t?new Uint8Array([13]):void 0))},removeTrailingSpaces:function(e){return e.split("\n").map((e=>{let t=e.length-1;for(;t>=0&&(" "===e[t]||"\t"===e[t]||"\r"===e[t]);t--);return e.substr(0,t+1)})).join("\n")},wrapError:function(e,t){if(!t)return Error(e);try{t.message=e+": "+t.message}catch(e){}return t},constructAllowedPackets:function(e){const t={};return e.forEach((e=>{if(!e.tag)throw Error("Invalid input: expected a packet class");t[e.tag]=e})),t},anyPromise:function(e){return new Promise((async(t,r)=>{let n;await Promise.all(e.map((async e=>{try{t(await e)}catch(e){n=e}}))),r(n)}))},selectUint8Array:function(e,t,r){const n=Math.max(t.length,r.length),i=new Uint8Array(n);let s=0;for(let n=0;n<i.length;n++)i[n]=t[n]&256-e|r[n]&255+e,s+=e&n<t.length|1-e&n<r.length;return i.subarray(0,s)},selectUint8:function(e,t,r){return t&256-e|r&255+e},isAES:function(e){return e===M.symmetric.aes128||e===M.symmetric.aes192||e===M.symmetric.aes256}},O=N.getNodeBuffer();let _,H;function z(e){let t=new Uint8Array;return v(e,(e=>{t=N.concatUint8Array([t,e]);const r=[],n=Math.floor(t.length/45),i=45*n,s=_(t.subarray(0,i));for(let e=0;e<n;e++)r.push(s.substr(60*e,60)),r.push("\n");return t=t.subarray(i),r.join("")}),(()=>t.length?_(t)+"\n":""))}function G(e){let t="";return v(e,(e=>{t+=e;let r=0;const n=[" ","\t","\r","\n"];for(let e=0;e<n.length;e++){const i=n[e];for(let e=t.indexOf(i);-1!==e;e=t.indexOf(i,e+1))r++}let i=t.length;for(;i>0&&(i-r)%4!=0;i--)n.includes(t[i])&&r--;const s=H(t.substr(0,i));return t=t.substr(i),s}),(()=>H(t)))}function q(e){return G(e.replace(/-/g,"+").replace(/_/g,"/"))}function j(e,t){let r=z(e).replace(/[\r\n]/g,"");return r=r.replace(/[+]/g,"-").replace(/[/]/g,"_").replace(/[=]/g,""),r}function V(e){const t=e.match(/^-----BEGIN PGP (MESSAGE, PART \d+\/\d+|MESSAGE, PART \d+|SIGNED MESSAGE|MESSAGE|PUBLIC KEY BLOCK|PRIVATE KEY BLOCK|SIGNATURE)-----$/m);if(!t)throw Error("Unknown ASCII armor type");return/MESSAGE, PART \d+\/\d+/.test(t[1])?M.armor.multipartSection:/MESSAGE, PART \d+/.test(t[1])?M.armor.multipartLast:/SIGNED MESSAGE/.test(t[1])?M.armor.signed:/MESSAGE/.test(t[1])?M.armor.message:/PUBLIC KEY BLOCK/.test(t[1])?M.armor.publicKey:/PRIVATE KEY BLOCK/.test(t[1])?M.armor.privateKey:/SIGNATURE/.test(t[1])?M.armor.signature:void 0}function Y(e,t){let r="";return t.showVersion&&(r+="Version: "+t.versionString+"\n"),t.showComment&&(r+="Comment: "+t.commentString+"\n"),e&&(r+="Comment: "+e+"\n"),r+="\n",r}function Z(e){const t=function(e){let t=13501623;return v(e,(e=>{const r=J?Math.floor(e.length/4):0,n=new Uint32Array(e.buffer,e.byteOffset,r);for(let e=0;e<r;e++)t^=n[e],t=W[0][t>>24&255]^W[1][t>>16&255]^W[2][t>>8&255]^W[3][255&t];for(let n=4*r;n<e.length;n++)t=t>>8^W[0][255&t^e[n]]}),(()=>new Uint8Array([t,t>>8,t>>16])))}(e);return z(t)}O?(_=e=>O.from(e).toString("base64"),H=e=>{const t=O.from(e,"base64");return new Uint8Array(t.buffer,t.byteOffset,t.byteLength)}):(_=e=>btoa(N.uint8ArrayToString(e)),H=e=>N.stringToUint8Array(atob(e)));const W=[Array(255),Array(255),Array(255),Array(255)];for(let e=0;e<=255;e++){let t=e<<16;for(let e=0;e<8;e++)t=t<<1^(8388608&t?8801531:0);W[0][e]=(16711680&t)>>16|65280&t|(255&t)<<16}for(let e=0;e<=255;e++)W[1][e]=W[0][e]>>8^W[0][255&W[0][e]];for(let e=0;e<=255;e++)W[2][e]=W[1][e]>>8^W[0][255&W[1][e]];for(let e=0;e<=255;e++)W[3][e]=W[2][e]>>8^W[0][255&W[2][e]];const J=function(){const e=new ArrayBuffer(2);return new DataView(e).setInt16(0,255,!0),255===new Int16Array(e)[0]}();function X(e){for(let t=0;t<e.length;t++)/^([^\s:]|[^\s:][^:]*[^\s:]): .+$/.test(e[t])||N.printDebugError(Error("Improperly formatted armor header: "+e[t])),/^(Version|Comment|MessageID|Hash|Charset): .+$/.test(e[t])||N.printDebugError(Error("Unknown header: "+e[t]))}function $(e){let t=e;const r=e.lastIndexOf("=");return r>=0&&r!==e.length-1&&(t=e.slice(0,r)),t}function ee(e){return new Promise((async(t,r)=>{try{const n=/^-----[^-]+-----$/m,i=/^[ \f\r\t\u00a0\u2000-\u200a\u202f\u205f\u3000]*$/;let s;const a=[];let o,c,u=a,h=[];const l=G(B(e,(async(e,y)=>{const f=Q(e);try{for(;;){let e=await f.readLine();if(void 0===e)throw Error("Misformed armored text");if(e=N.removeTrailingSpaces(e.replace(/[\r\n]/g,"")),s)if(o)c||s!==M.armor.signed||(n.test(e)?(h=h.join("\r\n"),c=!0,X(u),u=[],o=!1):h.push(e.replace(/^- /,"")));else if(n.test(e)&&r(Error("Mandatory blank line missing between armor headers and armor data")),i.test(e)){if(X(u),o=!0,c||s!==M.armor.signed){t({text:h,data:l,headers:a,type:s});break}}else u.push(e);else n.test(e)&&(s=V(e))}}catch(e){return void r(e)}const g=R(y);try{for(;;){await g.ready;const{done:e,value:t}=await f.read();if(e)throw Error("Misformed armored text");const r=t+"";if(-1!==r.indexOf("=")||-1!==r.indexOf("-")){let e=await f.readToEnd();e.length||(e=""),e=r+e,e=N.removeTrailingSpaces(e.replace(/\r/g,""));const t=e.split(n);if(1===t.length)throw Error("Misformed armored text");const i=$(t[0].slice(0,-1));await g.write(i);break}await g.write(r)}await g.ready,await g.close()}catch(e){await g.abort(e)}})))}catch(e){r(e)}})).then((async e=>(u(e.data)&&(e.data=await P(e.data)),e)))}function te(e,t,r,n,i,s=!1,a=L){let o,c;e===M.armor.signed&&(o=t.text,c=t.hash,t=t.data);const u=s&&K(t),h=[];switch(e){case M.armor.multipartSection:h.push("-----BEGIN PGP MESSAGE, PART "+r+"/"+n+"-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP MESSAGE, PART "+r+"/"+n+"-----\n");break;case M.armor.multipartLast:h.push("-----BEGIN PGP MESSAGE, PART "+r+"-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP MESSAGE, PART "+r+"-----\n");break;case M.armor.signed:h.push("-----BEGIN PGP SIGNED MESSAGE-----\n"),h.push(c?`Hash: ${c}\n\n`:"\n"),h.push(o.replace(/^-/gm,"- -")),h.push("\n-----BEGIN PGP SIGNATURE-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP SIGNATURE-----\n");break;case M.armor.message:h.push("-----BEGIN PGP MESSAGE-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP MESSAGE-----\n");break;case M.armor.publicKey:h.push("-----BEGIN PGP PUBLIC KEY BLOCK-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP PUBLIC KEY BLOCK-----\n");break;case M.armor.privateKey:h.push("-----BEGIN PGP PRIVATE KEY BLOCK-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP PRIVATE KEY BLOCK-----\n");break;case M.armor.signature:h.push("-----BEGIN PGP SIGNATURE-----\n"),h.push(Y(i,a)),h.push(z(t)),u&&h.push("=",Z(u)),h.push("-----END PGP SIGNATURE-----\n")}return N.concat(h)}const re=BigInt(0),ne=BigInt(1);function ie(e){const t="0123456789ABCDEF";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),BigInt("0x0"+r)}function se(e,t){const r=e%t;return r<re?r+t:r}function ae(e,t,r){if(r===re)throw Error("Modulo cannot be zero");if(r===ne)return BigInt(0);if(t<re)throw Error("Unsopported negative exponent");let n=t,i=e;i%=r;let s=BigInt(1);for(;n>re;){const e=n&ne;n>>=ne;s=e?s*i%r:s,i=i*i%r}return s}function oe(e){return e>=re?e:-e}function ce(e,t){const{gcd:r,x:n}=function(e,t){let r=BigInt(0),n=BigInt(1),i=BigInt(1),s=BigInt(0),a=oe(e),o=oe(t);const c=e<re,u=t<re;for(;o!==re;){const e=a/o;let t=r;r=i-e*r,i=t,t=n,n=s-e*n,s=t,t=o,o=a%o,a=t}return{x:c?-i:i,y:u?-s:s,gcd:a}}(e,t);if(r!==ne)throw Error("Inverse does not exist");return se(n+t,t)}function ue(e){const t=Number(e);if(t>Number.MAX_SAFE_INTEGER)throw Error("Number can only safely store up to 53 bits");return t}function he(e,t){return(e>>BigInt(t)&ne)===re?0:1}function le(e){const t=e<re?BigInt(-1):re;let r=1,n=e;for(;(n>>=ne)!==t;)r++;return r}function ye(e){const t=e<re?BigInt(-1):re,r=BigInt(8);let n=1,i=e;for(;(i>>=r)!==t;)n++;return n}function fe(e,t="be",r){let n=e.toString(16);n.length%2==1&&(n="0"+n);const i=n.length/2,s=new Uint8Array(r||i),a=r?r-i:0;let o=0;for(;o<i;)s[o+a]=parseInt(n.slice(2*o,2*o+2),16),o++;return"be"!==t&&s.reverse(),s}const ge=N.getNodeCrypto();function pe(e){const t="undefined"!=typeof crypto?crypto:ge?.webcrypto;if(t?.getRandomValues){const r=new Uint8Array(e);return t.getRandomValues(r)}throw Error("No secure random number generator available.")}function de(e,t){if(t<e)throw Error("Illegal parameter value: max <= min");const r=t-e;return se(ie(pe(ye(r)+8)),r)+e}const Ae=BigInt(1);function we(e,t,r){const n=BigInt(30),i=Ae<<BigInt(e-1),s=[1,6,5,4,3,2,1,4,3,2,1,2,1,4,3,2,1,2,1,4,3,2,1,6,5,4,3,2,1,2];let a=de(i,i<<Ae),o=ue(se(a,n));do{a+=BigInt(s[o]),o=(o+s[o])%s.length,le(a)>e&&(a=se(a,i<<Ae),a+=i,o=ue(se(a,n)))}while(!me(a,t,r));return a}function me(e,t,r){return(!t||function(e,t){let r=e,n=t;for(;n!==re;){const e=n;n=r%n,r=e}return r}(e-Ae,t)===Ae)&&(!!function(e){const t=BigInt(0);return be.every((r=>se(e,r)!==t))}(e)&&(!!function(e,t=BigInt(2)){return ae(t,e-Ae,e)===Ae}(e)&&!!function(e,t){const r=le(e);t||(t=Math.max(1,r/48|0));const n=e-Ae;let i=0;for(;!he(n,i);)i++;const s=e>>BigInt(i);for(;t>0;t--){let t,r=ae(de(BigInt(2),n),s,e);if(r!==Ae&&r!==n){for(t=1;t<i;t++){if(r=se(r*r,e),r===Ae)return!1;if(r===n)break}if(t===i)return!1}}return!0}(e,r)))}const be=[7,11,13,17,19,23,29,31,37,41,43,47,53,59,61,67,71,73,79,83,89,97,101,103,107,109,113,127,131,137,139,149,151,157,163,167,173,179,181,191,193,197,199,211,223,227,229,233,239,241,251,257,263,269,271,277,281,283,293,307,311,313,317,331,337,347,349,353,359,367,373,379,383,389,397,401,409,419,421,431,433,439,443,449,457,461,463,467,479,487,491,499,503,509,521,523,541,547,557,563,569,571,577,587,593,599,601,607,613,617,619,631,641,643,647,653,659,661,673,677,683,691,701,709,719,727,733,739,743,751,757,761,769,773,787,797,809,811,821,823,827,829,839,853,857,859,863,877,881,883,887,907,911,919,929,937,941,947,953,967,971,977,983,991,997,1009,1013,1019,1021,1031,1033,1039,1049,1051,1061,1063,1069,1087,1091,1093,1097,1103,1109,1117,1123,1129,1151,1153,1163,1171,1181,1187,1193,1201,1213,1217,1223,1229,1231,1237,1249,1259,1277,1279,1283,1289,1291,1297,1301,1303,1307,1319,1321,1327,1361,1367,1373,1381,1399,1409,1423,1427,1429,1433,1439,1447,1451,1453,1459,1471,1481,1483,1487,1489,1493,1499,1511,1523,1531,1543,1549,1553,1559,1567,1571,1579,1583,1597,1601,1607,1609,1613,1619,1621,1627,1637,1657,1663,1667,1669,1693,1697,1699,1709,1721,1723,1733,1741,1747,1753,1759,1777,1783,1787,1789,1801,1811,1823,1831,1847,1861,1867,1871,1873,1877,1879,1889,1901,1907,1913,1931,1933,1949,1951,1973,1979,1987,1993,1997,1999,2003,2011,2017,2027,2029,2039,2053,2063,2069,2081,2083,2087,2089,2099,2111,2113,2129,2131,2137,2141,2143,2153,2161,2179,2203,2207,2213,2221,2237,2239,2243,2251,2267,2269,2273,2281,2287,2293,2297,2309,2311,2333,2339,2341,2347,2351,2357,2371,2377,2381,2383,2389,2393,2399,2411,2417,2423,2437,2441,2447,2459,2467,2473,2477,2503,2521,2531,2539,2543,2549,2551,2557,2579,2591,2593,2609,2617,2621,2633,2647,2657,2659,2663,2671,2677,2683,2687,2689,2693,2699,2707,2711,2713,2719,2729,2731,2741,2749,2753,2767,2777,2789,2791,2797,2801,2803,2819,2833,2837,2843,2851,2857,2861,2879,2887,2897,2903,2909,2917,2927,2939,2953,2957,2963,2969,2971,2999,3001,3011,3019,3023,3037,3041,3049,3061,3067,3079,3083,3089,3109,3119,3121,3137,3163,3167,3169,3181,3187,3191,3203,3209,3217,3221,3229,3251,3253,3257,3259,3271,3299,3301,3307,3313,3319,3323,3329,3331,3343,3347,3359,3361,3371,3373,3389,3391,3407,3413,3433,3449,3457,3461,3463,3467,3469,3491,3499,3511,3517,3527,3529,3533,3539,3541,3547,3557,3559,3571,3581,3583,3593,3607,3613,3617,3623,3631,3637,3643,3659,3671,3673,3677,3691,3697,3701,3709,3719,3727,3733,3739,3761,3767,3769,3779,3793,3797,3803,3821,3823,3833,3847,3851,3853,3863,3877,3881,3889,3907,3911,3917,3919,3923,3929,3931,3943,3947,3967,3989,4001,4003,4007,4013,4019,4021,4027,4049,4051,4057,4073,4079,4091,4093,4099,4111,4127,4129,4133,4139,4153,4157,4159,4177,4201,4211,4217,4219,4229,4231,4241,4243,4253,4259,4261,4271,4273,4283,4289,4297,4327,4337,4339,4349,4357,4363,4373,4391,4397,4409,4421,4423,4441,4447,4451,4457,4463,4481,4483,4493,4507,4513,4517,4519,4523,4547,4549,4561,4567,4583,4591,4597,4603,4621,4637,4639,4643,4649,4651,4657,4663,4673,4679,4691,4703,4721,4723,4729,4733,4751,4759,4783,4787,4789,4793,4799,4801,4813,4817,4831,4861,4871,4877,4889,4903,4909,4919,4931,4933,4937,4943,4951,4957,4967,4969,4973,4987,4993,4999].map((e=>BigInt(e)));const ke=N.getWebCrypto(),Ee=N.getNodeCrypto(),ve=Ee&&Ee.getHashes();function Be(e){if(Ee&&ve.includes(e))return async function(t){const r=Ee.createHash(e);return v(t,(e=>{r.update(e)}),(()=>new Uint8Array(r.digest())))}}function Se(e,t){const r=async()=>{const{nobleHashes:t}=await Promise.resolve().then((function(){return Uf})),r=t.get(e);if(!r)throw Error("Unsupported hash");return r};return async function(e){if(u(e)&&(e=await P(e)),N.isStream(e)){const t=(await r()).create();return v(e,(e=>{t.update(e)}),(()=>t.digest()))}if(ke&&t)return new Uint8Array(await ke.digest(t,e));return(await r())(e)}}const Ie=Be("md5")||Se("md5"),Ke=Be("sha1")||Se("sha1","SHA-1"),Ce=Be("sha224")||Se("sha224"),Ue=Be("sha256")||Se("sha256","SHA-256"),Pe=Be("sha384")||Se("sha384","SHA-384"),De=Be("sha512")||Se("sha512","SHA-512"),xe=Be("ripemd160")||Se("ripemd160"),Qe=Be("sha3-256")||Se("sha3_256"),Re=Be("sha3-512")||Se("sha3_512");function Te(e,t){switch(e){case M.hash.md5:return Ie(t);case M.hash.sha1:return Ke(t);case M.hash.ripemd:return xe(t);case M.hash.sha256:return Ue(t);case M.hash.sha384:return Pe(t);case M.hash.sha512:return De(t);case M.hash.sha224:return Ce(t);case M.hash.sha3_256:return Qe(t);case M.hash.sha3_512:return Re(t);default:throw Error("Unsupported hash function")}}function Me(e){switch(e){case M.hash.md5:return 16;case M.hash.sha1:case M.hash.ripemd:return 20;case M.hash.sha256:return 32;case M.hash.sha384:return 48;case M.hash.sha512:return 64;case M.hash.sha224:return 28;case M.hash.sha3_256:return 32;case M.hash.sha3_512:return 64;default:throw Error("Invalid hash algorithm.")}}const Le=[];function Fe(e,t){const r=e.length;if(r>t-11)throw Error("Message too long");const n=function(e){const t=new Uint8Array(e);let r=0;for(;r<e;){const n=pe(e-r);for(let e=0;e<n.length;e++)0!==n[e]&&(t[r++]=n[e])}return t}(t-r-3),i=new Uint8Array(t);return i[1]=2,i.set(n,2),i.set(e,t-r),i}function Ne(e,t){let r=2,n=1;for(let t=r;t<e.length;t++)n&=0!==e[t],r+=n;const i=r-2,s=e.subarray(r+1),a=0===e[0]&2===e[1]&i>=8&!n;if(t)return N.selectUint8Array(a,s,t);if(a)return s;throw Error("Decryption error")}function Oe(e,t,r){let n;if(t.length!==Me(e))throw Error("Invalid hash length");const i=new Uint8Array(Le[e].length);for(n=0;n<Le[e].length;n++)i[n]=Le[e][n];const s=i.length+t.length;if(r<s+11)throw Error("Intended encoded message length too short");const a=new Uint8Array(r-s-3).fill(255),o=new Uint8Array(r);return o[1]=1,o.set(a,2),o.set(i,r-s),o.set(t,r-t.length),o}Le[1]=[48,32,48,12,6,8,42,134,72,134,247,13,2,5,5,0,4,16],Le[2]=[48,33,48,9,6,5,43,14,3,2,26,5,0,4,20],Le[3]=[48,33,48,9,6,5,43,36,3,2,1,5,0,4,20],Le[8]=[48,49,48,13,6,9,96,134,72,1,101,3,4,2,1,5,0,4,32],Le[9]=[48,65,48,13,6,9,96,134,72,1,101,3,4,2,2,5,0,4,48],Le[10]=[48,81,48,13,6,9,96,134,72,1,101,3,4,2,3,5,0,4,64],Le[11]=[48,45,48,13,6,9,96,134,72,1,101,3,4,2,4,5,0,4,28];const _e=N.getWebCrypto(),He=N.getNodeCrypto(),ze=BigInt(1);async function Ge(e,t,r,n,i,s,a,o,c){if(Me(e)>=r.length)throw Error("Digest size cannot exceed key modulus size");if(t&&!N.isStream(t))if(N.getWebCrypto())try{return await async function(e,t,r,n,i,s,a,o){const c=await Ye(r,n,i,s,a,o),u={name:"RSASSA-PKCS1-v1_5",hash:{name:e}},h=await _e.importKey("jwk",c,u,!1,["sign"]);return new Uint8Array(await _e.sign("RSASSA-PKCS1-v1_5",h,t))}(M.read(M.webHash,e),t,r,n,i,s,a,o)}catch(e){N.printDebugError(e)}else if(N.getNodeCrypto())return async function(e,t,r,n,i,s,a,o){const c=He.createSign(M.read(M.hash,e));c.write(t),c.end();const u=await Ye(r,n,i,s,a,o);return new Uint8Array(c.sign({key:u,format:"jwk",type:"pkcs1"}))}(e,t,r,n,i,s,a,o);return async function(e,t,r,n){t=ie(t);const i=ie(Oe(e,n,ye(t)));return r=ie(r),fe(ae(i,r,t),"be",ye(t))}(e,r,i,c)}async function qe(e,t,r,n,i,s){if(t&&!N.isStream(t))if(N.getWebCrypto())try{return await async function(e,t,r,n,i){const s=Ze(n,i),a=await _e.importKey("jwk",s,{name:"RSASSA-PKCS1-v1_5",hash:{name:e}},!1,["verify"]);return _e.verify("RSASSA-PKCS1-v1_5",a,r,t)}(M.read(M.webHash,e),t,r,n,i)}catch(e){N.printDebugError(e)}else if(N.getNodeCrypto())return async function(e,t,r,n,i){const s=Ze(n,i),a={key:s,format:"jwk",type:"pkcs1"},o=He.createVerify(M.read(M.hash,e));o.write(t),o.end();try{return o.verify(a,r)}catch(e){return!1}}(e,t,r,n,i);return async function(e,t,r,n,i){if(r=ie(r),t=ie(t),n=ie(n),t>=r)throw Error("Signature size cannot exceed modulus size");const s=fe(ae(t,n,r),"be",ye(r)),a=Oe(e,i,ye(r));return N.equalsUint8Array(s,a)}(e,r,n,i,s)}async function je(e,t,r){return N.getNodeCrypto()?async function(e,t,r){const n=Ze(t,r),i={key:n,format:"jwk",type:"pkcs1",padding:He.constants.RSA_PKCS1_PADDING};return new Uint8Array(He.publicEncrypt(i,e))}(e,t,r):async function(e,t,r){if(t=ie(t),e=ie(Fe(e,ye(t))),r=ie(r),e>=t)throw Error("Message size cannot exceed modulus size");return fe(ae(e,r,t),"be",ye(t))}(e,t,r)}async function Ve(e,t,r,n,i,s,a,o){if(N.getNodeCrypto()&&!o)try{return await async function(e,t,r,n,i,s,a){const o=await Ye(t,r,n,i,s,a),c={key:o,format:"jwk",type:"pkcs1",padding:He.constants.RSA_PKCS1_PADDING};try{return new Uint8Array(He.privateDecrypt(c,e))}catch(e){throw Error("Decryption error")}}(e,t,r,n,i,s,a)}catch(e){N.printDebugError(e)}return async function(e,t,r,n,i,s,a,o){if(e=ie(e),t=ie(t),r=ie(r),n=ie(n),i=ie(i),s=ie(s),a=ie(a),e>=t)throw Error("Data too large.");const c=se(n,s-ze),u=se(n,i-ze),h=de(BigInt(2),t),l=ae(ce(h,t),r,t);e=se(e*l,t);const y=ae(e,u,i),f=ae(e,c,s),g=se(a*(f-y),s);let p=g*i+y;return p=se(p*h,t),Ne(fe(p,"be",ye(t)),o)}(e,t,r,n,i,s,a,o)}async function Ye(e,t,r,n,i,s){const a=ie(n),o=ie(i),c=ie(r);let u=se(c,o-ze),h=se(c,a-ze);return h=fe(h),u=fe(u),{kty:"RSA",n:j(e),e:j(t),d:j(r),p:j(i),q:j(n),dp:j(u),dq:j(h),qi:j(s),ext:!0}}function Ze(e,t){return{kty:"RSA",n:j(e),e:j(t),ext:!0}}function We(e,t){return{n:q(e.n),e:fe(t),d:q(e.d),p:q(e.q),q:q(e.p),u:q(e.qi)}}const Je=BigInt(1);const Xe=r&&"object"==typeof r&&"webcrypto"in r?r.webcrypto:void 0,$e={};var et=function(e){var t,r=new Float64Array(16);if(e)for(t=0;t<e.length;t++)r[t]=e[t];return r},tt=function(){throw Error("no PRNG")},rt=new Uint8Array(32);rt[0]=9;var nt=et(),it=et([1]),st=et([56129,1]),at=et([30883,4953,19914,30187,55467,16705,2637,112,59544,30585,16505,36039,65139,11119,27886,20995]),ot=et([61785,9906,39828,60374,45398,33411,5274,224,53552,61171,33010,6542,64743,22239,55772,9222]),ct=et([54554,36645,11616,51542,42930,38181,51040,26924,56412,64982,57905,49316,21502,52590,14035,8553]),ut=et([26200,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214,26214]),ht=et([41136,18958,6951,50414,58488,44335,6150,12099,55207,15867,153,11085,57099,20417,9344,11139]);function lt(e,t,r,n){e[t]=r>>24&255,e[t+1]=r>>16&255,e[t+2]=r>>8&255,e[t+3]=255&r,e[t+4]=n>>24&255,e[t+5]=n>>16&255,e[t+6]=n>>8&255,e[t+7]=255&n}function yt(e,t,r,n){return function(e,t,r,n,i){var s,a=0;for(s=0;s<i;s++)a|=e[t+s]^r[n+s];return(1&a-1>>>8)-1}(e,t,r,n,32)}function ft(e,t){var r;for(r=0;r<16;r++)e[r]=0|t[r]}function gt(e){var t,r,n=1;for(t=0;t<16;t++)r=e[t]+n+65535,n=Math.floor(r/65536),e[t]=r-65536*n;e[0]+=n-1+37*(n-1)}function pt(e,t,r){for(var n,i=~(r-1),s=0;s<16;s++)n=i&(e[s]^t[s]),e[s]^=n,t[s]^=n}function dt(e,t){var r,n,i,s=et(),a=et();for(r=0;r<16;r++)a[r]=t[r];for(gt(a),gt(a),gt(a),n=0;n<2;n++){for(s[0]=a[0]-65517,r=1;r<15;r++)s[r]=a[r]-65535-(s[r-1]>>16&1),s[r-1]&=65535;s[15]=a[15]-32767-(s[14]>>16&1),i=s[15]>>16&1,s[14]&=65535,pt(a,s,1-i)}for(r=0;r<16;r++)e[2*r]=255&a[r],e[2*r+1]=a[r]>>8}function At(e,t){var r=new Uint8Array(32),n=new Uint8Array(32);return dt(r,e),dt(n,t),yt(r,0,n,0)}function wt(e){var t=new Uint8Array(32);return dt(t,e),1&t[0]}function mt(e,t){var r;for(r=0;r<16;r++)e[r]=t[2*r]+(t[2*r+1]<<8);e[15]&=32767}function bt(e,t,r){for(var n=0;n<16;n++)e[n]=t[n]+r[n]}function kt(e,t,r){for(var n=0;n<16;n++)e[n]=t[n]-r[n]}function Et(e,t,r){var n,i,s=0,a=0,o=0,c=0,u=0,h=0,l=0,y=0,f=0,g=0,p=0,d=0,A=0,w=0,m=0,b=0,k=0,E=0,v=0,B=0,S=0,I=0,K=0,C=0,U=0,P=0,D=0,x=0,Q=0,R=0,T=0,M=r[0],L=r[1],F=r[2],N=r[3],O=r[4],_=r[5],H=r[6],z=r[7],G=r[8],q=r[9],j=r[10],V=r[11],Y=r[12],Z=r[13],W=r[14],J=r[15];s+=(n=t[0])*M,a+=n*L,o+=n*F,c+=n*N,u+=n*O,h+=n*_,l+=n*H,y+=n*z,f+=n*G,g+=n*q,p+=n*j,d+=n*V,A+=n*Y,w+=n*Z,m+=n*W,b+=n*J,a+=(n=t[1])*M,o+=n*L,c+=n*F,u+=n*N,h+=n*O,l+=n*_,y+=n*H,f+=n*z,g+=n*G,p+=n*q,d+=n*j,A+=n*V,w+=n*Y,m+=n*Z,b+=n*W,k+=n*J,o+=(n=t[2])*M,c+=n*L,u+=n*F,h+=n*N,l+=n*O,y+=n*_,f+=n*H,g+=n*z,p+=n*G,d+=n*q,A+=n*j,w+=n*V,m+=n*Y,b+=n*Z,k+=n*W,E+=n*J,c+=(n=t[3])*M,u+=n*L,h+=n*F,l+=n*N,y+=n*O,f+=n*_,g+=n*H,p+=n*z,d+=n*G,A+=n*q,w+=n*j,m+=n*V,b+=n*Y,k+=n*Z,E+=n*W,v+=n*J,u+=(n=t[4])*M,h+=n*L,l+=n*F,y+=n*N,f+=n*O,g+=n*_,p+=n*H,d+=n*z,A+=n*G,w+=n*q,m+=n*j,b+=n*V,k+=n*Y,E+=n*Z,v+=n*W,B+=n*J,h+=(n=t[5])*M,l+=n*L,y+=n*F,f+=n*N,g+=n*O,p+=n*_,d+=n*H,A+=n*z,w+=n*G,m+=n*q,b+=n*j,k+=n*V,E+=n*Y,v+=n*Z,B+=n*W,S+=n*J,l+=(n=t[6])*M,y+=n*L,f+=n*F,g+=n*N,p+=n*O,d+=n*_,A+=n*H,w+=n*z,m+=n*G,b+=n*q,k+=n*j,E+=n*V,v+=n*Y,B+=n*Z,S+=n*W,I+=n*J,y+=(n=t[7])*M,f+=n*L,g+=n*F,p+=n*N,d+=n*O,A+=n*_,w+=n*H,m+=n*z,b+=n*G,k+=n*q,E+=n*j,v+=n*V,B+=n*Y,S+=n*Z,I+=n*W,K+=n*J,f+=(n=t[8])*M,g+=n*L,p+=n*F,d+=n*N,A+=n*O,w+=n*_,m+=n*H,b+=n*z,k+=n*G,E+=n*q,v+=n*j,B+=n*V,S+=n*Y,I+=n*Z,K+=n*W,C+=n*J,g+=(n=t[9])*M,p+=n*L,d+=n*F,A+=n*N,w+=n*O,m+=n*_,b+=n*H,k+=n*z,E+=n*G,v+=n*q,B+=n*j,S+=n*V,I+=n*Y,K+=n*Z,C+=n*W,U+=n*J,p+=(n=t[10])*M,d+=n*L,A+=n*F,w+=n*N,m+=n*O,b+=n*_,k+=n*H,E+=n*z,v+=n*G,B+=n*q,S+=n*j,I+=n*V,K+=n*Y,C+=n*Z,U+=n*W,P+=n*J,d+=(n=t[11])*M,A+=n*L,w+=n*F,m+=n*N,b+=n*O,k+=n*_,E+=n*H,v+=n*z,B+=n*G,S+=n*q,I+=n*j,K+=n*V,C+=n*Y,U+=n*Z,P+=n*W,D+=n*J,A+=(n=t[12])*M,w+=n*L,m+=n*F,b+=n*N,k+=n*O,E+=n*_,v+=n*H,B+=n*z,S+=n*G,I+=n*q,K+=n*j,C+=n*V,U+=n*Y,P+=n*Z,D+=n*W,x+=n*J,w+=(n=t[13])*M,m+=n*L,b+=n*F,k+=n*N,E+=n*O,v+=n*_,B+=n*H,S+=n*z,I+=n*G,K+=n*q,C+=n*j,U+=n*V,P+=n*Y,D+=n*Z,x+=n*W,Q+=n*J,m+=(n=t[14])*M,b+=n*L,k+=n*F,E+=n*N,v+=n*O,B+=n*_,S+=n*H,I+=n*z,K+=n*G,C+=n*q,U+=n*j,P+=n*V,D+=n*Y,x+=n*Z,Q+=n*W,R+=n*J,b+=(n=t[15])*M,a+=38*(E+=n*F),o+=38*(v+=n*N),c+=38*(B+=n*O),u+=38*(S+=n*_),h+=38*(I+=n*H),l+=38*(K+=n*z),y+=38*(C+=n*G),f+=38*(U+=n*q),g+=38*(P+=n*j),p+=38*(D+=n*V),d+=38*(x+=n*Y),A+=38*(Q+=n*Z),w+=38*(R+=n*W),m+=38*(T+=n*J),s=(n=(s+=38*(k+=n*L))+(i=1)+65535)-65536*(i=Math.floor(n/65536)),a=(n=a+i+65535)-65536*(i=Math.floor(n/65536)),o=(n=o+i+65535)-65536*(i=Math.floor(n/65536)),c=(n=c+i+65535)-65536*(i=Math.floor(n/65536)),u=(n=u+i+65535)-65536*(i=Math.floor(n/65536)),h=(n=h+i+65535)-65536*(i=Math.floor(n/65536)),l=(n=l+i+65535)-65536*(i=Math.floor(n/65536)),y=(n=y+i+65535)-65536*(i=Math.floor(n/65536)),f=(n=f+i+65535)-65536*(i=Math.floor(n/65536)),g=(n=g+i+65535)-65536*(i=Math.floor(n/65536)),p=(n=p+i+65535)-65536*(i=Math.floor(n/65536)),d=(n=d+i+65535)-65536*(i=Math.floor(n/65536)),A=(n=A+i+65535)-65536*(i=Math.floor(n/65536)),w=(n=w+i+65535)-65536*(i=Math.floor(n/65536)),m=(n=m+i+65535)-65536*(i=Math.floor(n/65536)),b=(n=b+i+65535)-65536*(i=Math.floor(n/65536)),s=(n=(s+=i-1+37*(i-1))+(i=1)+65535)-65536*(i=Math.floor(n/65536)),a=(n=a+i+65535)-65536*(i=Math.floor(n/65536)),o=(n=o+i+65535)-65536*(i=Math.floor(n/65536)),c=(n=c+i+65535)-65536*(i=Math.floor(n/65536)),u=(n=u+i+65535)-65536*(i=Math.floor(n/65536)),h=(n=h+i+65535)-65536*(i=Math.floor(n/65536)),l=(n=l+i+65535)-65536*(i=Math.floor(n/65536)),y=(n=y+i+65535)-65536*(i=Math.floor(n/65536)),f=(n=f+i+65535)-65536*(i=Math.floor(n/65536)),g=(n=g+i+65535)-65536*(i=Math.floor(n/65536)),p=(n=p+i+65535)-65536*(i=Math.floor(n/65536)),d=(n=d+i+65535)-65536*(i=Math.floor(n/65536)),A=(n=A+i+65535)-65536*(i=Math.floor(n/65536)),w=(n=w+i+65535)-65536*(i=Math.floor(n/65536)),m=(n=m+i+65535)-65536*(i=Math.floor(n/65536)),b=(n=b+i+65535)-65536*(i=Math.floor(n/65536)),s+=i-1+37*(i-1),e[0]=s,e[1]=a,e[2]=o,e[3]=c,e[4]=u,e[5]=h,e[6]=l,e[7]=y,e[8]=f,e[9]=g,e[10]=p,e[11]=d,e[12]=A,e[13]=w,e[14]=m,e[15]=b}function vt(e,t){Et(e,t,t)}function Bt(e,t){var r,n=et();for(r=0;r<16;r++)n[r]=t[r];for(r=253;r>=0;r--)vt(n,n),2!==r&&4!==r&&Et(n,n,t);for(r=0;r<16;r++)e[r]=n[r]}function St(e,t,r){var n,i,s=new Uint8Array(32),a=new Float64Array(80),o=et(),c=et(),u=et(),h=et(),l=et(),y=et();for(i=0;i<31;i++)s[i]=t[i];for(s[31]=127&t[31]|64,s[0]&=248,mt(a,r),i=0;i<16;i++)c[i]=a[i],h[i]=o[i]=u[i]=0;for(o[0]=h[0]=1,i=254;i>=0;--i)pt(o,c,n=s[i>>>3]>>>(7&i)&1),pt(u,h,n),bt(l,o,u),kt(o,o,u),bt(u,c,h),kt(c,c,h),vt(h,l),vt(y,o),Et(o,u,o),Et(u,c,l),bt(l,o,u),kt(o,o,u),vt(c,o),kt(u,h,y),Et(o,u,st),bt(o,o,h),Et(u,u,o),Et(o,h,y),Et(h,c,a),vt(c,l),pt(o,c,n),pt(u,h,n);for(i=0;i<16;i++)a[i+16]=o[i],a[i+32]=u[i],a[i+48]=c[i],a[i+64]=h[i];var f=a.subarray(32),g=a.subarray(16);return Bt(f,f),Et(g,g,f),dt(e,g),0}function It(e,t){return St(e,t,rt)}var Kt=[1116352408,3609767458,1899447441,602891725,3049323471,3964484399,3921009573,2173295548,961987163,4081628472,1508970993,3053834265,2453635748,2937671579,2870763221,3664609560,3624381080,2734883394,310598401,1164996542,607225278,1323610764,1426881987,3590304994,1925078388,4068182383,2162078206,991336113,2614888103,633803317,3248222580,3479774868,3835390401,2666613458,4022224774,944711139,264347078,2341262773,604807628,2007800933,770255983,1495990901,1249150122,1856431235,1555081692,3175218132,1996064986,2198950837,2554220882,3999719339,2821834349,766784016,2952996808,2566594879,3210313671,3203337956,3336571891,1034457026,3584528711,2466948901,113926993,3758326383,338241895,168717936,666307205,1188179964,773529912,1546045734,1294757372,1522805485,1396182291,2643833823,1695183700,2343527390,1986661051,1014477480,2177026350,1206759142,2456956037,344077627,2730485921,1290863460,2820302411,3158454273,3259730800,3505952657,3345764771,106217008,3516065817,3606008344,3600352804,1432725776,4094571909,1467031594,275423344,851169720,430227734,3100823752,506948616,1363258195,659060556,3750685593,883997877,3785050280,958139571,3318307427,1322822218,3812723403,1537002063,2003034995,1747873779,3602036899,1955562222,1575990012,2024104815,1125592928,2227730452,2716904306,2361852424,442776044,2428436474,593698344,2756734187,3733110249,3204031479,2999351573,3329325298,3815920427,3391569614,3928383900,3515267271,566280711,3940187606,3454069534,4118630271,4000239992,116418474,1914138554,174292421,2731055270,289380356,3203993006,460393269,320620315,685471733,587496836,852142971,1086792851,1017036298,365543100,1126000580,2618297676,1288033470,3409855158,1501505948,4234509866,1607167915,987167468,1816402316,1246189591];function Ct(e,t,r,n){for(var i,s,a,o,c,u,h,l,y,f,g,p,d,A,w,m,b,k,E,v,B,S,I,K,C,U,P=new Int32Array(16),D=new Int32Array(16),x=e[0],Q=e[1],R=e[2],T=e[3],M=e[4],L=e[5],F=e[6],N=e[7],O=t[0],_=t[1],H=t[2],z=t[3],G=t[4],q=t[5],j=t[6],V=t[7],Y=0;n>=128;){for(E=0;E<16;E++)v=8*E+Y,P[E]=r[v+0]<<24|r[v+1]<<16|r[v+2]<<8|r[v+3],D[E]=r[v+4]<<24|r[v+5]<<16|r[v+6]<<8|r[v+7];for(E=0;E<80;E++)if(i=x,s=Q,a=R,o=T,c=M,u=L,h=F,N,y=O,f=_,g=H,p=z,d=G,A=q,w=j,V,I=65535&(S=V),K=S>>>16,C=65535&(B=N),U=B>>>16,I+=65535&(S=(G>>>14|M<<18)^(G>>>18|M<<14)^(M>>>9|G<<23)),K+=S>>>16,C+=65535&(B=(M>>>14|G<<18)^(M>>>18|G<<14)^(G>>>9|M<<23)),U+=B>>>16,I+=65535&(S=G&q^~G&j),K+=S>>>16,C+=65535&(B=M&L^~M&F),U+=B>>>16,B=Kt[2*E],I+=65535&(S=Kt[2*E+1]),K+=S>>>16,C+=65535&B,U+=B>>>16,B=P[E%16],K+=(S=D[E%16])>>>16,C+=65535&B,U+=B>>>16,C+=(K+=(I+=65535&S)>>>16)>>>16,I=65535&(S=k=65535&I|K<<16),K=S>>>16,C=65535&(B=b=65535&C|(U+=C>>>16)<<16),U=B>>>16,I+=65535&(S=(O>>>28|x<<4)^(x>>>2|O<<30)^(x>>>7|O<<25)),K+=S>>>16,C+=65535&(B=(x>>>28|O<<4)^(O>>>2|x<<30)^(O>>>7|x<<25)),U+=B>>>16,K+=(S=O&_^O&H^_&H)>>>16,C+=65535&(B=x&Q^x&R^Q&R),U+=B>>>16,l=65535&(C+=(K+=(I+=65535&S)>>>16)>>>16)|(U+=C>>>16)<<16,m=65535&I|K<<16,I=65535&(S=p),K=S>>>16,C=65535&(B=o),U=B>>>16,K+=(S=k)>>>16,C+=65535&(B=b),U+=B>>>16,Q=i,R=s,T=a,M=o=65535&(C+=(K+=(I+=65535&S)>>>16)>>>16)|(U+=C>>>16)<<16,L=c,F=u,N=h,x=l,_=y,H=f,z=g,G=p=65535&I|K<<16,q=d,j=A,V=w,O=m,E%16==15)for(v=0;v<16;v++)B=P[v],I=65535&(S=D[v]),K=S>>>16,C=65535&B,U=B>>>16,B=P[(v+9)%16],I+=65535&(S=D[(v+9)%16]),K+=S>>>16,C+=65535&B,U+=B>>>16,b=P[(v+1)%16],I+=65535&(S=((k=D[(v+1)%16])>>>1|b<<31)^(k>>>8|b<<24)^(k>>>7|b<<25)),K+=S>>>16,C+=65535&(B=(b>>>1|k<<31)^(b>>>8|k<<24)^b>>>7),U+=B>>>16,b=P[(v+14)%16],K+=(S=((k=D[(v+14)%16])>>>19|b<<13)^(b>>>29|k<<3)^(k>>>6|b<<26))>>>16,C+=65535&(B=(b>>>19|k<<13)^(k>>>29|b<<3)^b>>>6),U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,P[v]=65535&C|U<<16,D[v]=65535&I|K<<16;I=65535&(S=O),K=S>>>16,C=65535&(B=x),U=B>>>16,B=e[0],K+=(S=t[0])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[0]=x=65535&C|U<<16,t[0]=O=65535&I|K<<16,I=65535&(S=_),K=S>>>16,C=65535&(B=Q),U=B>>>16,B=e[1],K+=(S=t[1])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[1]=Q=65535&C|U<<16,t[1]=_=65535&I|K<<16,I=65535&(S=H),K=S>>>16,C=65535&(B=R),U=B>>>16,B=e[2],K+=(S=t[2])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[2]=R=65535&C|U<<16,t[2]=H=65535&I|K<<16,I=65535&(S=z),K=S>>>16,C=65535&(B=T),U=B>>>16,B=e[3],K+=(S=t[3])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[3]=T=65535&C|U<<16,t[3]=z=65535&I|K<<16,I=65535&(S=G),K=S>>>16,C=65535&(B=M),U=B>>>16,B=e[4],K+=(S=t[4])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[4]=M=65535&C|U<<16,t[4]=G=65535&I|K<<16,I=65535&(S=q),K=S>>>16,C=65535&(B=L),U=B>>>16,B=e[5],K+=(S=t[5])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[5]=L=65535&C|U<<16,t[5]=q=65535&I|K<<16,I=65535&(S=j),K=S>>>16,C=65535&(B=F),U=B>>>16,B=e[6],K+=(S=t[6])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[6]=F=65535&C|U<<16,t[6]=j=65535&I|K<<16,I=65535&(S=V),K=S>>>16,C=65535&(B=N),U=B>>>16,B=e[7],K+=(S=t[7])>>>16,C+=65535&B,U+=B>>>16,U+=(C+=(K+=(I+=65535&S)>>>16)>>>16)>>>16,e[7]=N=65535&C|U<<16,t[7]=V=65535&I|K<<16,Y+=128,n-=128}return n}function Ut(e,t,r){var n,i=new Int32Array(8),s=new Int32Array(8),a=new Uint8Array(256),o=r;for(i[0]=1779033703,i[1]=3144134277,i[2]=1013904242,i[3]=2773480762,i[4]=1359893119,i[5]=2600822924,i[6]=528734635,i[7]=1541459225,s[0]=4089235720,s[1]=2227873595,s[2]=4271175723,s[3]=1595750129,s[4]=2917565137,s[5]=725511199,s[6]=4215389547,s[7]=327033209,Ct(i,s,t,r),r%=128,n=0;n<r;n++)a[n]=t[o-r+n];for(a[r]=128,a[(r=256-128*(r<112?1:0))-9]=0,lt(a,r-8,o/536870912|0,o<<3),Ct(i,s,a,r),n=0;n<8;n++)lt(e,8*n,i[n],s[n]);return 0}function Pt(e,t){var r=et(),n=et(),i=et(),s=et(),a=et(),o=et(),c=et(),u=et(),h=et();kt(r,e[1],e[0]),kt(h,t[1],t[0]),Et(r,r,h),bt(n,e[0],e[1]),bt(h,t[0],t[1]),Et(n,n,h),Et(i,e[3],t[3]),Et(i,i,ot),Et(s,e[2],t[2]),bt(s,s,s),kt(a,n,r),kt(o,s,i),bt(c,s,i),bt(u,n,r),Et(e[0],a,o),Et(e[1],u,c),Et(e[2],c,o),Et(e[3],a,u)}function Dt(e,t,r){var n;for(n=0;n<4;n++)pt(e[n],t[n],r)}function xt(e,t){var r=et(),n=et(),i=et();Bt(i,t[2]),Et(r,t[0],i),Et(n,t[1],i),dt(e,n),e[31]^=wt(r)<<7}function Qt(e,t,r){var n,i;for(ft(e[0],nt),ft(e[1],it),ft(e[2],it),ft(e[3],nt),i=255;i>=0;--i)Dt(e,t,n=r[i/8|0]>>(7&i)&1),Pt(t,e),Pt(e,e),Dt(e,t,n)}function Rt(e,t){var r=[et(),et(),et(),et()];ft(r[0],ct),ft(r[1],ut),ft(r[2],it),Et(r[3],ct,ut),Qt(e,r,t)}function Tt(e,t,r){var n,i=new Uint8Array(64),s=[et(),et(),et(),et()];for(r||tt(t,32),Ut(i,t,32),i[0]&=248,i[31]&=127,i[31]|=64,Rt(s,i),xt(e,s),n=0;n<32;n++)t[n+32]=e[n];return 0}var Mt=new Float64Array([237,211,245,92,26,99,18,88,214,156,247,162,222,249,222,20,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,16]);function Lt(e,t){var r,n,i,s;for(n=63;n>=32;--n){for(r=0,i=n-32,s=n-12;i<s;++i)t[i]+=r-16*t[n]*Mt[i-(n-32)],r=Math.floor((t[i]+128)/256),t[i]-=256*r;t[i]+=r,t[n]=0}for(r=0,i=0;i<32;i++)t[i]+=r-(t[31]>>4)*Mt[i],r=t[i]>>8,t[i]&=255;for(i=0;i<32;i++)t[i]-=r*Mt[i];for(n=0;n<32;n++)t[n+1]+=t[n]>>8,e[n]=255&t[n]}function Ft(e){var t,r=new Float64Array(64);for(t=0;t<64;t++)r[t]=e[t];for(t=0;t<64;t++)e[t]=0;Lt(e,r)}function Nt(e,t){var r=et(),n=et(),i=et(),s=et(),a=et(),o=et(),c=et();return ft(e[2],it),mt(e[1],t),vt(i,e[1]),Et(s,i,at),kt(i,i,e[2]),bt(s,e[2],s),vt(a,s),vt(o,a),Et(c,o,a),Et(r,c,i),Et(r,r,s),function(e,t){var r,n=et();for(r=0;r<16;r++)n[r]=t[r];for(r=250;r>=0;r--)vt(n,n),1!==r&&Et(n,n,t);for(r=0;r<16;r++)e[r]=n[r]}(r,r),Et(r,r,i),Et(r,r,s),Et(r,r,s),Et(e[0],r,s),vt(n,e[0]),Et(n,n,s),At(n,i)&&Et(e[0],e[0],ht),vt(n,e[0]),Et(n,n,s),At(n,i)?-1:(wt(e[0])===t[31]>>7&&kt(e[0],nt,e[0]),Et(e[3],e[0],e[1]),0)}var Ot=64;function _t(){for(var e=0;e<arguments.length;e++)if(!(arguments[e]instanceof Uint8Array))throw new TypeError("unexpected type, use Uint8Array")}$e.scalarMult=function(e,t){if(_t(e,t),32!==e.length)throw Error("bad n size");if(32!==t.length)throw Error("bad p size");var r=new Uint8Array(32);return St(r,e,t),r},$e.box={},$e.box.keyPair=function(){var e=new Uint8Array(32),t=new Uint8Array(32);return function(e,t){tt(t,32),It(e,t)}(e,t),{publicKey:e,secretKey:t}},$e.box.keyPair.fromSecretKey=function(e){if(_t(e),32!==e.length)throw Error("bad secret key size");var t=new Uint8Array(32);return It(t,e),{publicKey:t,secretKey:new Uint8Array(e)}},$e.sign=function(e,t){if(_t(e,t),64!==t.length)throw Error("bad secret key size");var r=new Uint8Array(Ot+e.length);return function(e,t,r,n){var i,s,a=new Uint8Array(64),o=new Uint8Array(64),c=new Uint8Array(64),u=new Float64Array(64),h=[et(),et(),et(),et()];Ut(a,n,32),a[0]&=248,a[31]&=127,a[31]|=64;var l=r+64;for(i=0;i<r;i++)e[64+i]=t[i];for(i=0;i<32;i++)e[32+i]=a[32+i];for(Ut(c,e.subarray(32),r+32),Ft(c),Rt(h,c),xt(e,h),i=32;i<64;i++)e[i]=n[i];for(Ut(o,e,r+64),Ft(o),i=0;i<64;i++)u[i]=0;for(i=0;i<32;i++)u[i]=c[i];for(i=0;i<32;i++)for(s=0;s<32;s++)u[i+s]+=o[i]*a[s];Lt(e.subarray(32),u)}(r,e,e.length,t),r},$e.sign.detached=function(e,t){for(var r=$e.sign(e,t),n=new Uint8Array(Ot),i=0;i<n.length;i++)n[i]=r[i];return n},$e.sign.detached.verify=function(e,t,r){if(_t(e,t,r),t.length!==Ot)throw Error("bad signature size");if(32!==r.length)throw Error("bad public key size");var n,i=new Uint8Array(Ot+e.length),s=new Uint8Array(Ot+e.length);for(n=0;n<Ot;n++)i[n]=t[n];for(n=0;n<e.length;n++)i[n+Ot]=e[n];return function(e,t,r,n){var i,s=new Uint8Array(32),a=new Uint8Array(64),o=[et(),et(),et(),et()],c=[et(),et(),et(),et()];if(r<64)return-1;if(Nt(c,n))return-1;for(i=0;i<r;i++)e[i]=t[i];for(i=0;i<32;i++)e[i+32]=n[i];if(Ut(a,e,r),Ft(a),Qt(o,c,a),Rt(c,t.subarray(32)),Pt(o,c),xt(s,o),r-=64,yt(t,0,s,0)){for(i=0;i<r;i++)e[i]=0;return-1}for(i=0;i<r;i++)e[i]=t[i+64];return r}(s,i,i.length,r)>=0},$e.sign.keyPair=function(){var e=new Uint8Array(32),t=new Uint8Array(64);return Tt(e,t),{publicKey:e,secretKey:t}},$e.sign.keyPair.fromSecretKey=function(e){if(_t(e),64!==e.length)throw Error("bad secret key size");for(var t=new Uint8Array(32),r=0;r<t.length;r++)t[r]=e[32+r];return{publicKey:t,secretKey:new Uint8Array(e)}},$e.sign.keyPair.fromSeed=function(e){if(_t(e),32!==e.length)throw Error("bad seed size");for(var t=new Uint8Array(32),r=new Uint8Array(64),n=0;n<32;n++)r[n]=e[n];return Tt(t,r,!0),{publicKey:t,secretKey:r}},$e.setPRNG=function(e){tt=e},function(){if(Xe&&Xe.getRandomValues){$e.setPRNG((function(e,t){var r,n=new Uint8Array(t);for(r=0;r<t;r+=65536)Xe.getRandomValues(n.subarray(r,r+Math.min(t-r,65536)));for(r=0;r<t;r++)e[r]=n[r];!function(e){for(var t=0;t<e.length;t++)e[t]=0}(n)}))}}();const Ht={"2a8648ce3d030107":M.curve.nistP256,"2b81040022":M.curve.nistP384,"2b81040023":M.curve.nistP521,"2b8104000a":M.curve.secp256k1,"2b06010401da470f01":M.curve.ed25519Legacy,"2b060104019755010501":M.curve.curve25519Legacy,"2b2403030208010107":M.curve.brainpoolP256r1,"2b240303020801010b":M.curve.brainpoolP384r1,"2b240303020801010d":M.curve.brainpoolP512r1};class zt{constructor(e){if(e instanceof zt)this.oid=e.oid;else if(N.isArray(e)||N.isUint8Array(e)){if(6===(e=new Uint8Array(e))[0]){if(e[1]!==e.length-2)throw Error("Length mismatch in DER encoded oid");e=e.subarray(2)}this.oid=e}else this.oid=""}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.oid=e.subarray(1,1+t),1+this.oid.length}throw Error("Invalid oid")}write(){return N.concatUint8Array([new Uint8Array([this.oid.length]),this.oid])}toHex(){return N.uint8ArrayToHex(this.oid)}getName(){const e=Ht[this.toHex()];if(!e)throw Error("Unknown curve object identifier.");return e}}function Gt(e){let t,r=0;const n=e[0];return n<192?([r]=e,t=1):n<255?(r=(e[0]-192<<8)+e[1]+192,t=2):255===n&&(r=N.readNumber(e.subarray(1,5)),t=5),{len:r,offset:t}}function qt(e){return e<192?new Uint8Array([e]):e>191&&e<8384?new Uint8Array([192+(e-192>>8),e-192&255]):N.concatUint8Array([new Uint8Array([255]),N.writeNumber(e,4)])}function jt(e){if(e<0||e>30)throw Error("Partial Length power must be between 1 and 30");return new Uint8Array([224+e])}function Vt(e){return new Uint8Array([192|e])}function Yt(e,t){return N.concatUint8Array([Vt(e),qt(t)])}function Zt(e){return[M.packet.literalData,M.packet.compressedData,M.packet.symmetricallyEncryptedData,M.packet.symEncryptedIntegrityProtectedData,M.packet.aeadEncryptedData].includes(e)}async function Wt(e,t){const r=Q(e);let n,i;try{const s=await r.peekBytes(2);if(!s||s.length<2||!(128&s[0]))throw Error("Error during parsing. This message / key probably does not conform to a valid OpenPGP format.");const a=await r.readByte();let o,c,u=-1,h=-1;h=0,64&a&&(h=1),h?u=63&a:(u=(63&a)>>2,c=3&a);const l=Zt(u);let y,f=null;if(l){if("array"===N.isStream(e)){const e=new ArrayStream;n=R(e),f=e}else{const e=new TransformStream;n=R(e.writable),f=e.readable}i=t({tag:u,packet:f})}else f=[];do{if(h){const e=await r.readByte();if(y=!1,e<192)o=e;else if(e>=192&&e<224)o=(e-192<<8)+await r.readByte()+192;else if(e>223&&e<255){if(o=1<<(31&e),y=!0,!l)throw new TypeError("This packet type does not support partial lengths.")}else o=await r.readByte()<<24|await r.readByte()<<16|await r.readByte()<<8|await r.readByte()}else switch(c){case 0:o=await r.readByte();break;case 1:o=await r.readByte()<<8|await r.readByte();break;case 2:o=await r.readByte()<<24|await r.readByte()<<16|await r.readByte()<<8|await r.readByte();break;default:o=1/0}if(o>0){let e=0;for(;;){n&&await n.ready;const{done:t,value:i}=await r.read();if(t){if(o===1/0)break;throw Error("Unexpected end of packet")}const s=o===1/0?i:i.subarray(0,o-e);if(n?await n.write(s):f.push(s),e+=i.length,e>=o){r.unshift(i.subarray(o-e+i.length));break}}}}while(y);const g=await r.peekBytes(l?1/0:2);return n?(await n.ready,await n.close()):(f=N.concatUint8Array(f),await t({tag:u,packet:f})),!g||!g.length}catch(e){if(n)return await n.abort(e),!0;throw e}finally{n&&await i,r.releaseLock()}}class Jt extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Jt),this.name="UnsupportedError"}}class Xt extends Jt{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Jt),this.name="UnknownPacketError"}}class $t{constructor(e,t){this.tag=e,this.rawContent=t}write(){return this.rawContent}}
3
3
  /*! noble-ed25519 - MIT License (c) 2019 Paul Miller (paulmillr.com) */const er=BigInt(0),tr=BigInt(1),rr=BigInt(2),nr=BigInt(8),ir=BigInt("7237005577332262213973186563042994240857116359379907606001950938285454250989"),sr=Object.freeze({a:BigInt(-1),d:BigInt("37095705934669439343138083508754565189542113879843219016388785533085940283555"),P:BigInt("57896044618658097711785492504343953926634992332820282019728792003956564819949"),l:ir,n:ir,h:BigInt(8),Gx:BigInt("15112221349535400772501151409588531511454012693041857206046113283949847762202"),Gy:BigInt("46316835694926478169428394003475163141307993866256225615783033603165251855960")}),ar=BigInt("0x10000000000000000000000000000000000000000000000000000000000000000"),or=BigInt("19681161376707505956807079304988542015446066515923890162744021073123829784752");BigInt("6853475219497561581579357271197624642482790079785650197046958215289687604742");const cr=BigInt("25063068953384623474111414158702152701244531502492656460079210482610430750235"),ur=BigInt("54469307008909316920995813868745141605393597292927456921205312896311721017578"),hr=BigInt("1159843021668779879193775521855586647937357759715417654439879720876111806838"),lr=BigInt("40440834346308536858101042469323190826248399146238708352240133220865137265952");class yr{constructor(e,t,r,n){this.x=e,this.y=t,this.z=r,this.t=n}static fromAffine(e){if(!(e instanceof mr))throw new TypeError("ExtendedPoint#fromAffine: expected Point");return e.equals(mr.ZERO)?yr.ZERO:new yr(e.x,e.y,tr,Dr(e.x*e.y))}static toAffineBatch(e){const t=function(e,t=sr.P){const r=Array(e.length),n=e.reduce(((e,n,i)=>n===er?e:(r[i]=e,Dr(e*n,t))),tr),i=xr(n,t);return e.reduceRight(((e,n,i)=>n===er?e:(r[i]=Dr(e*r[i],t),Dr(e*n,t))),i),r}(e.map((e=>e.z)));return e.map(((e,r)=>e.toAffine(t[r])))}static normalizeZ(e){return this.toAffineBatch(e).map(this.fromAffine)}equals(e){gr(e);const{x:t,y:r,z:n}=this,{x:i,y:s,z:a}=e,o=Dr(t*a),c=Dr(i*n),u=Dr(r*a),h=Dr(s*n);return o===c&&u===h}negate(){return new yr(Dr(-this.x),this.y,this.z,Dr(-this.t))}double(){const{x:e,y:t,z:r}=this,{a:n}=sr,i=Dr(e*e),s=Dr(t*t),a=Dr(rr*Dr(r*r)),o=Dr(n*i),c=e+t,u=Dr(Dr(c*c)-i-s),h=o+s,l=h-a,y=o-s,f=Dr(u*l),g=Dr(h*y),p=Dr(u*y),d=Dr(l*h);return new yr(f,g,d,p)}add(e){gr(e);const{x:t,y:r,z:n,t:i}=this,{x:s,y:a,z:o,t:c}=e,u=Dr((r-t)*(a+s)),h=Dr((r+t)*(a-s)),l=Dr(h-u);if(l===er)return this.double();const y=Dr(n*rr*c),f=Dr(i*rr*o),g=f+y,p=h+u,d=f-y,A=Dr(g*l),w=Dr(p*d),m=Dr(g*d),b=Dr(l*p);return new yr(A,w,b,m)}subtract(e){return this.add(e.negate())}precomputeWindow(e){const t=1+256/e,r=[];let n=this,i=n;for(let s=0;s<t;s++){i=n,r.push(i);for(let t=1;t<2**(e-1);t++)i=i.add(n),r.push(i);n=i.double()}return r}wNAF(e,t){!t&&this.equals(yr.BASE)&&(t=mr.BASE);const r=t&&t._WINDOW_SIZE||1;if(256%r)throw Error("Point#wNAF: Invalid precomputation window, must be power of 2");let n=t&&wr.get(t);n||(n=this.precomputeWindow(r),t&&1!==r&&(n=yr.normalizeZ(n),wr.set(t,n)));let i=yr.ZERO,s=yr.BASE;const a=1+256/r,o=2**(r-1),c=BigInt(2**r-1),u=2**r,h=BigInt(r);for(let t=0;t<a;t++){const r=t*o;let a=Number(e&c);e>>=h,a>o&&(a-=u,e+=tr);const l=r,y=r+Math.abs(a)-1,f=t%2!=0,g=a<0;0===a?s=s.add(fr(f,n[l])):i=i.add(fr(g,n[y]))}return yr.normalizeZ([i,s])[0]}multiply(e,t){return this.wNAF(Fr(e,sr.l),t)}multiplyUnsafe(e){let t=Fr(e,sr.l,!1);const r=yr.BASE,n=yr.ZERO;if(t===er)return n;if(this.equals(n)||t===tr)return this;if(this.equals(r))return this.wNAF(t);let i=n,s=this;for(;t>er;)t&tr&&(i=i.add(s)),s=s.double(),t>>=tr;return i}isSmallOrder(){return this.multiplyUnsafe(sr.h).equals(yr.ZERO)}isTorsionFree(){let e=this.multiplyUnsafe(sr.l/rr).double();return sr.l%rr&&(e=e.add(this)),e.equals(yr.ZERO)}toAffine(e){const{x:t,y:r,z:n}=this,i=this.equals(yr.ZERO);null==e&&(e=i?nr:xr(n));const s=Dr(t*e),a=Dr(r*e),o=Dr(n*e);if(i)return mr.ZERO;if(o!==tr)throw Error("invZ was invalid");return new mr(s,a)}fromRistrettoBytes(){dr()}toRistrettoBytes(){dr()}fromRistrettoHash(){dr()}}function fr(e,t){const r=t.negate();return e?r:t}function gr(e){if(!(e instanceof yr))throw new TypeError("ExtendedPoint expected")}function pr(e){if(!(e instanceof Ar))throw new TypeError("RistrettoPoint expected")}function dr(){throw Error("Legacy method: switch to RistrettoPoint")}yr.BASE=new yr(sr.Gx,sr.Gy,tr,Dr(sr.Gx*sr.Gy)),yr.ZERO=new yr(er,tr,tr,er);class Ar{constructor(e){this.ep=e}static calcElligatorRistrettoMap(e){const{d:t}=sr,r=Dr(or*e*e),n=Dr((r+tr)*hr);let i=BigInt(-1);const s=Dr((i-t*r)*Dr(r+t));let{isValid:a,value:o}=Rr(n,s),c=Dr(o*e);Kr(c)||(c=Dr(-c)),a||(o=c),a||(i=r);const u=Dr(i*(r-tr)*lr-s),h=o*o,l=Dr((o+o)*s),y=Dr(u*cr),f=Dr(tr-h),g=Dr(tr+h);return new yr(Dr(l*g),Dr(f*y),Dr(y*g),Dr(l*f))}static hashToCurve(e){const t=Pr((e=Lr(e,64)).slice(0,32)),r=this.calcElligatorRistrettoMap(t),n=Pr(e.slice(32,64)),i=this.calcElligatorRistrettoMap(n);return new Ar(r.add(i))}static fromHex(e){e=Lr(e,32);const{a:t,d:r}=sr,n="RistrettoPoint.fromHex: the hex is not valid encoding of RistrettoPoint",i=Pr(e);if(!function(e,t){if(e.length!==t.length)return!1;for(let r=0;r<e.length;r++)if(e[r]!==t[r])return!1;return!0}(Ir(i),e)||Kr(i))throw Error(n);const s=Dr(i*i),a=Dr(tr+t*s),o=Dr(tr-t*s),c=Dr(a*a),u=Dr(o*o),h=Dr(t*r*c-u),{isValid:l,value:y}=Tr(Dr(h*u)),f=Dr(y*o),g=Dr(y*f*h);let p=Dr((i+i)*f);Kr(p)&&(p=Dr(-p));const d=Dr(a*g),A=Dr(p*d);if(!l||Kr(A)||d===er)throw Error(n);return new Ar(new yr(p,d,tr,A))}toRawBytes(){let{x:e,y:t,z:r,t:n}=this.ep;const i=Dr(Dr(r+t)*Dr(r-t)),s=Dr(e*t),a=Dr(s*s),{value:o}=Tr(Dr(i*a)),c=Dr(o*i),u=Dr(o*s),h=Dr(c*u*n);let l;if(Kr(n*h)){let r=Dr(t*or),n=Dr(e*or);e=r,t=n,l=Dr(c*ur)}else l=u;Kr(e*h)&&(t=Dr(-t));let y=Dr((r-t)*l);return Kr(y)&&(y=Dr(-y)),Ir(y)}toHex(){return vr(this.toRawBytes())}toString(){return this.toHex()}equals(e){pr(e);const t=this.ep,r=e.ep,n=Dr(t.x*r.y)===Dr(t.y*r.x),i=Dr(t.y*r.y)===Dr(t.x*r.x);return n||i}add(e){return pr(e),new Ar(this.ep.add(e.ep))}subtract(e){return pr(e),new Ar(this.ep.subtract(e.ep))}multiply(e){return new Ar(this.ep.multiply(e))}multiplyUnsafe(e){return new Ar(this.ep.multiplyUnsafe(e))}}Ar.BASE=new Ar(yr.BASE),Ar.ZERO=new Ar(yr.ZERO);const wr=new WeakMap;class mr{constructor(e,t){this.x=e,this.y=t}_setWindowSize(e){this._WINDOW_SIZE=e,wr.delete(this)}static fromHex(e,t=!0){const{d:r,P:n}=sr,i=(e=Lr(e,32)).slice();i[31]=-129&e[31];const s=Cr(i);if(t&&s>=n)throw Error("Expected 0 < hex < P");if(!t&&s>=ar)throw Error("Expected 0 < hex < 2**256");const a=Dr(s*s),o=Dr(a-tr),c=Dr(r*a+tr);let{isValid:u,value:h}=Rr(o,c);if(!u)throw Error("Point.fromHex: invalid y coordinate");const l=(h&tr)===tr;return!!(128&e[31])!==l&&(h=Dr(-h)),new mr(h,s)}static async fromPrivateKey(e){return(await Or(e)).point}toRawBytes(){const e=Ir(this.y);return e[31]|=this.x&tr?128:0,e}toHex(){return vr(this.toRawBytes())}toX25519(){const{y:e}=this;return Ir(Dr((tr+e)*xr(tr-e)))}isTorsionFree(){return yr.fromAffine(this).isTorsionFree()}equals(e){return this.x===e.x&&this.y===e.y}negate(){return new mr(Dr(-this.x),this.y)}add(e){return yr.fromAffine(this).add(yr.fromAffine(e)).toAffine()}subtract(e){return this.add(e.negate())}multiply(e){return yr.fromAffine(this).multiply(e,this).toAffine()}}mr.BASE=new mr(sr.Gx,sr.Gy),mr.ZERO=new mr(er,tr);let br=class e{constructor(e,t){this.r=e,this.s=t,this.assertValidity()}static fromHex(t){const r=Lr(t,64),n=mr.fromHex(r.slice(0,32),!1),i=Cr(r.slice(32,64));return new e(n,i)}assertValidity(){const{r:e,s:t}=this;if(!(e instanceof mr))throw Error("Expected Point instance");return Fr(t,sr.l,!1),this}toRawBytes(){const e=new Uint8Array(64);return e.set(this.r.toRawBytes()),e.set(Ir(this.s),32),e}toHex(){return vr(this.toRawBytes())}};function kr(...e){if(!e.every((e=>e instanceof Uint8Array)))throw Error("Expected Uint8Array list");if(1===e.length)return e[0];const t=e.reduce(((e,t)=>e+t.length),0),r=new Uint8Array(t);for(let t=0,n=0;t<e.length;t++){const i=e[t];r.set(i,n),n+=i.length}return r}const Er=Array.from({length:256},((e,t)=>t.toString(16).padStart(2,"0")));function vr(e){if(!(e instanceof Uint8Array))throw Error("Uint8Array expected");let t="";for(let r=0;r<e.length;r++)t+=Er[e[r]];return t}function Br(e){if("string"!=typeof e)throw new TypeError("hexToBytes: expected string, got "+typeof e);if(e.length%2)throw Error("hexToBytes: received invalid unpadded hex");const t=new Uint8Array(e.length/2);for(let r=0;r<t.length;r++){const n=2*r,i=e.slice(n,n+2),s=Number.parseInt(i,16);if(Number.isNaN(s)||s<0)throw Error("Invalid byte sequence");t[r]=s}return t}function Sr(e){return Br(e.toString(16).padStart(64,"0"))}function Ir(e){return Sr(e).reverse()}function Kr(e){return(Dr(e)&tr)===tr}function Cr(e){if(!(e instanceof Uint8Array))throw Error("Expected Uint8Array");return BigInt("0x"+vr(Uint8Array.from(e).reverse()))}const Ur=BigInt("0x7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff");function Pr(e){return Dr(Cr(e)&Ur)}function Dr(e,t=sr.P){const r=e%t;return r>=er?r:t+r}function xr(e,t=sr.P){if(e===er||t<=er)throw Error(`invert: expected positive integers, got n=${e} mod=${t}`);let r=Dr(e,t),n=t,i=er,s=tr;for(;r!==er;){const e=n%r,t=i-s*(n/r);n=r,r=e,i=s,s=t}if(n!==tr)throw Error("invert: does not exist");return Dr(i,t)}function Qr(e,t){const{P:r}=sr;let n=e;for(;t-- >er;)n*=n,n%=r;return n}function Rr(e,t){const r=Dr(t*t*t),n=function(e){const{P:t}=sr,r=BigInt(5),n=BigInt(10),i=BigInt(20),s=BigInt(40),a=BigInt(80),o=e*e%t*e%t,c=Qr(o,rr)*o%t,u=Qr(c,tr)*e%t,h=Qr(u,r)*u%t,l=Qr(h,n)*h%t,y=Qr(l,i)*l%t,f=Qr(y,s)*y%t,g=Qr(f,a)*f%t,p=Qr(g,a)*f%t,d=Qr(p,n)*h%t;return{pow_p_5_8:Qr(d,rr)*e%t,b2:o}}(e*Dr(r*r*t)).pow_p_5_8;let i=Dr(e*r*n);const s=Dr(t*i*i),a=i,o=Dr(i*or),c=s===e,u=s===Dr(-e),h=s===Dr(-e*or);return c&&(i=a),(u||h)&&(i=o),Kr(i)&&(i=Dr(-i)),{isValid:c||u,value:i}}function Tr(e){return Rr(tr,e)}function Mr(e){return Dr(Cr(e),sr.l)}function Lr(e,t){const r=e instanceof Uint8Array?Uint8Array.from(e):Br(e);if("number"==typeof t&&r.length!==t)throw Error(`Expected ${t} bytes`);return r}function Fr(e,t,r=!0){if(!t)throw new TypeError("Specify max value");if("number"==typeof e&&Number.isSafeInteger(e)&&(e=BigInt(e)),"bigint"==typeof e&&e<t)if(r){if(er<e)return e}else if(er<=e)return e;throw new TypeError("Expected valid scalar: 0 < scalar < max")}let Nr;async function Or(e){return function(e){const t=function(e){return e[0]&=248,e[31]&=127,e[31]|=64,e}(e.slice(0,32)),r=e.slice(32,64),n=Mr(t),i=mr.BASE.multiply(n),s=i.toRawBytes();return{head:t,prefix:r,scalar:n,point:i,pointBytes:s}}(await zr.sha512(function(e){if(32!==(e="bigint"==typeof e||"number"==typeof e?Sr(Fr(e,ar)):Lr(e)).length)throw Error("Expected 32 bytes");return e}(e)))}async function _r(e,t,r){const{r:n,SB:i,msg:s,pub:a}=function(e,t,r){t=Lr(t),r instanceof mr||(r=mr.fromHex(r,!1));const{r:n,s:i}=e instanceof br?e.assertValidity():br.fromHex(e);return{r:n,s:i,SB:yr.BASE.multiplyUnsafe(i),pub:r,msg:t}}(e,t,r),o=await zr.sha512(n.toRawBytes(),a.toRawBytes(),s);return function(e,t,r,n){const i=Mr(n),s=yr.fromAffine(e).multiplyUnsafe(i);return yr.fromAffine(t).add(s).subtract(r).multiplyUnsafe(sr.h).equals(yr.ZERO)}(a,n,i,o)}mr.BASE._setWindowSize(8);const Hr={node:n,web:"object"==typeof self&&"crypto"in self?self.crypto:void 0},zr={bytesToHex:vr,hexToBytes:Br,concatBytes:kr,getExtendedPublicKey:Or,mod:Dr,invert:xr,TORSION_SUBGROUP:["0100000000000000000000000000000000000000000000000000000000000000","c7176a703d4dd84fba3c0b760d10670f2a2053fa2c39ccc64ec7fd7792ac037a","0000000000000000000000000000000000000000000000000000000000000080","26e8958fc2b227b045c3f489f2ef98f0d5dfac05d3c63339b13802886d53fc05","ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f","26e8958fc2b227b045c3f489f2ef98f0d5dfac05d3c63339b13802886d53fc85","0000000000000000000000000000000000000000000000000000000000000000","c7176a703d4dd84fba3c0b760d10670f2a2053fa2c39ccc64ec7fd7792ac03fa"],hashToPrivateScalar:e=>{if((e=Lr(e)).length<40||e.length>1024)throw Error("Expected 40-1024 bytes of private key as per FIPS 186");return Dr(Cr(e),sr.l-tr)+tr},randomBytes:(e=32)=>{if(Hr.web)return Hr.web.getRandomValues(new Uint8Array(e));if(Hr.node){const{randomBytes:t}=Hr.node;return new Uint8Array(t(e).buffer)}throw Error("The environment doesn't have randomBytes function")},randomPrivateKey:()=>zr.randomBytes(32),sha512:async(...e)=>{const t=kr(...e);if(Hr.web){const e=await Hr.web.subtle.digest("SHA-512",t.buffer);return new Uint8Array(e)}if(Hr.node)return Uint8Array.from(Hr.node.createHash("sha512").update(t).digest());throw Error("The environment doesn't have sha512 function")},precompute(e=8,t=mr.BASE){const r=t.equals(mr.BASE)?t:new mr(t.x,t.y);return r._setWindowSize(e),r.multiply(rr),r},sha512Sync:void 0};async function Gr(e){switch(e){case M.publicKey.ed25519:try{const e=N.getWebCrypto(),t=await e.generateKey("Ed25519",!0,["sign","verify"]),r=await e.exportKey("jwk",t.privateKey),n=await e.exportKey("jwk",t.publicKey);return{A:new Uint8Array(q(n.x)),seed:q(r.d)}}catch(t){if("NotSupportedError"!==t.name&&"OperationError"!==t.name)throw t;const r=pe(Yr(e)),{publicKey:n}=$e.sign.keyPair.fromSeed(r);return{A:n,seed:r}}case M.publicKey.ed448:{const e=await N.getNobleCurve(M.publicKey.ed448),t=e.utils.randomPrivateKey();return{A:e.getPublicKey(t),seed:t}}default:throw Error("Unsupported EdDSA algorithm")}}async function qr(e,t,r,n,i,s){if(Me(t)<Me(Zr(e)))throw Error("Hash algorithm too weak for EdDSA.");switch(e){case M.publicKey.ed25519:try{const t=N.getWebCrypto(),r=Jr(e,n,i),a=await t.importKey("jwk",r,"Ed25519",!1,["sign"]);return{RS:new Uint8Array(await t.sign("Ed25519",a,s))}}catch(e){if("NotSupportedError"!==e.name)throw e;const t=N.concatUint8Array([i,n]);return{RS:$e.sign.detached(s,t)}}case M.publicKey.ed448:return{RS:(await N.getNobleCurve(M.publicKey.ed448)).sign(s,i)};default:throw Error("Unsupported EdDSA algorithm")}}async function jr(e,t,{RS:r},n,i,s){if(Me(t)<Me(Zr(e)))throw Error("Hash algorithm too weak for EdDSA.");switch(e){case M.publicKey.ed25519:try{const t=N.getWebCrypto(),n=Wr(e,i),a=await t.importKey("jwk",n,"Ed25519",!1,["verify"]);return await t.verify("Ed25519",a,r,s)}catch(e){if("NotSupportedError"!==e.name)throw e;return _r(r,s,i)}case M.publicKey.ed448:return(await N.getNobleCurve(M.publicKey.ed448)).verify(r,s,i);default:throw Error("Unsupported EdDSA algorithm")}}async function Vr(e,t,r){switch(e){case M.publicKey.ed25519:{const{publicKey:e}=$e.sign.keyPair.fromSeed(r);return N.equalsUint8Array(t,e)}case M.publicKey.ed448:{const e=(await N.getNobleCurve(M.publicKey.ed448)).getPublicKey(r);return N.equalsUint8Array(t,e)}default:return!1}}function Yr(e){switch(e){case M.publicKey.ed25519:return 32;case M.publicKey.ed448:return 57;default:throw Error("Unsupported EdDSA algorithm")}}function Zr(e){switch(e){case M.publicKey.ed25519:return M.hash.sha256;case M.publicKey.ed448:return M.hash.sha512;default:throw Error("Unknown EdDSA algo")}}Object.defineProperties(zr,{sha512Sync:{configurable:!1,get:()=>Nr,set(e){Nr||(Nr=e)}}});const Wr=(e,t)=>{if(e===M.publicKey.ed25519){return{kty:"OKP",crv:"Ed25519",x:j(t),ext:!0}}throw Error("Unsupported EdDSA algorithm")},Jr=(e,t,r)=>{if(e===M.publicKey.ed25519){const n=Wr(e,t);return n.d=j(r),n}throw Error("Unsupported EdDSA algorithm")};var Xr=/*#__PURE__*/Object.freeze({__proto__:null,generate:Gr,getPayloadSize:Yr,getPreferredHashAlgo:Zr,sign:qr,validateParams:Vr,verify:jr});function $r(e){return e instanceof Uint8Array||null!=e&&"object"==typeof e&&"Uint8Array"===e.constructor.name}function en(e,...t){if(!$r(e))throw Error("Uint8Array expected");if(t.length>0&&!t.includes(e.length))throw Error(`Uint8Array expected of length ${t}, not of length=${e.length}`)}function tn(e,t=!0){if(e.destroyed)throw Error("Hash instance has been destroyed");if(t&&e.finished)throw Error("Hash#digest() has already been called")}function rn(e,t){en(e);const r=t.outputLen;if(e.length<r)throw Error("digestInto() expects output buffer of length at least "+r)}
4
4
  /*! noble-ciphers - MIT License (c) 2023 Paul Miller (paulmillr.com) */const nn=e=>new Uint8Array(e.buffer,e.byteOffset,e.byteLength),sn=e=>new Uint32Array(e.buffer,e.byteOffset,Math.floor(e.byteLength/4)),an=e=>new DataView(e.buffer,e.byteOffset,e.byteLength);if(!(68===new Uint8Array(new Uint32Array([287454020]).buffer)[0]))throw Error("Non little-endian hardware is not supported");function on(e){if("string"==typeof e)e=function(e){if("string"!=typeof e)throw Error("string expected, got "+typeof e);return new Uint8Array((new TextEncoder).encode(e))}(e);else{if(!$r(e))throw Error("Uint8Array expected, got "+typeof e);e=yn(e)}return e}function cn(e,t){if(e.length!==t.length)return!1;let r=0;for(let n=0;n<e.length;n++)r|=e[n]^t[n];return 0===r}const un=(e,t)=>(Object.assign(t,e),t);function hn(e,t,r,n){if("function"==typeof e.setBigUint64)return e.setBigUint64(t,r,n);const i=BigInt(32),s=BigInt(4294967295),a=Number(r>>i&s),o=Number(r&s);e.setUint32(t+0,a,n),e.setUint32(t+4,o,n)}function ln(e){return e.byteOffset%4==0}function yn(e){return Uint8Array.from(e)}function fn(...e){for(let t=0;t<e.length;t++)e[t].fill(0)}const gn=16,pn=/* @__PURE__ */new Uint8Array(16),dn=sn(pn),An=e=>(e>>>0&255)<<24|(e>>>8&255)<<16|(e>>>16&255)<<8|e>>>24&255;class wn{constructor(e,t){this.blockLen=gn,this.outputLen=gn,this.s0=0,this.s1=0,this.s2=0,this.s3=0,this.finished=!1,en(e=on(e),16);const r=an(e);let n=r.getUint32(0,!1),i=r.getUint32(4,!1),s=r.getUint32(8,!1),a=r.getUint32(12,!1);const o=[];for(let e=0;e<128;e++)o.push({s0:An(n),s1:An(i),s2:An(s),s3:An(a)}),({s0:n,s1:i,s2:s,s3:a}={s3:(h=s)<<31|(l=a)>>>1,s2:(u=i)<<31|h>>>1,s1:(c=n)<<31|u>>>1,s0:c>>>1^225<<24&-(1&l)});var c,u,h,l;const y=(e=>e>65536?8:e>1024?4:2)(t||1024);if(![1,2,4,8].includes(y))throw Error(`ghash: wrong window size=${y}, should be 2, 4 or 8`);this.W=y;const f=128/y,g=this.windowSize=2**y,p=[];for(let e=0;e<f;e++)for(let t=0;t<g;t++){let r=0,n=0,i=0,s=0;for(let a=0;a<y;a++){if(!(t>>>y-a-1&1))continue;const{s0:c,s1:u,s2:h,s3:l}=o[y*e+a];r^=c,n^=u,i^=h,s^=l}p.push({s0:r,s1:n,s2:i,s3:s})}this.t=p}_updateBlock(e,t,r,n){e^=this.s0,t^=this.s1,r^=this.s2,n^=this.s3;const{W:i,t:s,windowSize:a}=this;let o=0,c=0,u=0,h=0;const l=(1<<i)-1;let y=0;for(const f of[e,t,r,n])for(let e=0;e<4;e++){const t=f>>>8*e&255;for(let e=8/i-1;e>=0;e--){const r=t>>>i*e&l,{s0:n,s1:f,s2:g,s3:p}=s[y*a+r];o^=n,c^=f,u^=g,h^=p,y+=1}}this.s0=o,this.s1=c,this.s2=u,this.s3=h}update(e){e=on(e),tn(this);const t=sn(e),r=Math.floor(e.length/gn),n=e.length%gn;for(let e=0;e<r;e++)this._updateBlock(t[4*e+0],t[4*e+1],t[4*e+2],t[4*e+3]);return n&&(pn.set(e.subarray(r*gn)),this._updateBlock(dn[0],dn[1],dn[2],dn[3]),fn(dn)),this}destroy(){const{t:e}=this;for(const t of e)t.s0=0,t.s1=0,t.s2=0,t.s3=0}digestInto(e){tn(this),rn(e,this),this.finished=!0;const{s0:t,s1:r,s2:n,s3:i}=this,s=sn(e);return s[0]=t,s[1]=r,s[2]=n,s[3]=i,e}digest(){const e=new Uint8Array(gn);return this.digestInto(e),this.destroy(),e}}class mn extends wn{constructor(e,t){const r=function(e){e.reverse();const t=1&e[15];let r=0;for(let t=0;t<e.length;t++){const n=e[t];e[t]=n>>>1|r,r=(1&n)<<7}return e[0]^=225&-t,e}(yn(e=on(e)));super(r,t),fn(r)}update(e){e=on(e),tn(this);const t=sn(e),r=e.length%gn,n=Math.floor(e.length/gn);for(let e=0;e<n;e++)this._updateBlock(An(t[4*e+3]),An(t[4*e+2]),An(t[4*e+1]),An(t[4*e+0]));return r&&(pn.set(e.subarray(n*gn)),this._updateBlock(An(dn[3]),An(dn[2]),An(dn[1]),An(dn[0])),fn(dn)),this}digestInto(e){tn(this),rn(e,this),this.finished=!0;const{s0:t,s1:r,s2:n,s3:i}=this,s=sn(e);return s[0]=t,s[1]=r,s[2]=n,s[3]=i,e.reverse()}}function bn(e){const t=(t,r)=>e(r,t.length).update(on(t)).digest(),r=e(new Uint8Array(16),0);return t.outputLen=r.outputLen,t.blockLen=r.blockLen,t.create=(t,r)=>e(t,r),t}const kn=bn(((e,t)=>new wn(e,t)));bn(((e,t)=>new mn(e,t)));const En=16,vn=new Uint8Array(En),Bn=283;function Sn(e){return e<<1^Bn&-(e>>7)}function In(e,t){let r=0;for(;t>0;t>>=1)r^=e&-(1&t),e=Sn(e);return r}const Kn=/* @__PURE__ */(()=>{const e=new Uint8Array(256);for(let t=0,r=1;t<256;t++,r^=Sn(r))e[t]=r;const t=new Uint8Array(256);t[0]=99;for(let r=0;r<255;r++){let n=e[255-r];n|=n<<8,t[e[r]]=255&(n^n>>4^n>>5^n>>6^n>>7^99)}return fn(e),t})(),Cn=/* @__PURE__ */Kn.map(((e,t)=>Kn.indexOf(t))),Un=e=>e<<24|e>>>8,Pn=e=>e<<8|e>>>24,Dn=e=>e<<24&4278190080|e<<8&16711680|e>>>8&65280|e>>>24&255;function xn(e,t){if(256!==e.length)throw Error("Wrong sbox length");const r=new Uint32Array(256).map(((r,n)=>t(e[n]))),n=r.map(Pn),i=n.map(Pn),s=i.map(Pn),a=new Uint32Array(65536),o=new Uint32Array(65536),c=new Uint16Array(65536);for(let t=0;t<256;t++)for(let u=0;u<256;u++){const h=256*t+u;a[h]=r[t]^n[u],o[h]=i[t]^s[u],c[h]=e[t]<<8|e[u]}return{sbox:e,sbox2:c,T0:r,T1:n,T2:i,T3:s,T01:a,T23:o}}const Qn=/* @__PURE__ */xn(Kn,(e=>In(e,3)<<24|e<<16|e<<8|In(e,2))),Rn=/* @__PURE__ */xn(Cn,(e=>In(e,11)<<24|In(e,13)<<16|In(e,9)<<8|In(e,14))),Tn=/* @__PURE__ */(()=>{const e=new Uint8Array(16);for(let t=0,r=1;t<16;t++,r=Sn(r))e[t]=r;return e})();function Mn(e){en(e);const t=e.length;if(![16,24,32].includes(t))throw Error("aes: wrong key size: should be 16, 24 or 32, got: "+t);const{sbox2:r}=Qn,n=[];ln(e)||n.push(e=yn(e));const i=sn(e),s=i.length,a=e=>Nn(r,e,e,e,e),o=new Uint32Array(t+28);o.set(i);for(let e=s;e<o.length;e++){let t=o[e-1];e%s==0?t=a(Un(t))^Tn[e/s-1]:s>6&&e%s==4&&(t=a(t)),o[e]=o[e-s]^t}return fn(...n),o}function Ln(e){const t=Mn(e),r=t.slice(),n=t.length,{sbox2:i}=Qn,{T0:s,T1:a,T2:o,T3:c}=Rn;for(let e=0;e<n;e+=4)for(let i=0;i<4;i++)r[e+i]=t[n-e-4+i];fn(t);for(let e=4;e<n-4;e++){const t=r[e],n=Nn(i,t,t,t,t);r[e]=s[255&n]^a[n>>>8&255]^o[n>>>16&255]^c[n>>>24]}return r}function Fn(e,t,r,n,i,s){return e[r<<8&65280|n>>>8&255]^t[i>>>8&65280|s>>>24&255]}function Nn(e,t,r,n,i){return e[255&t|65280&r]|e[n>>>16&255|i>>>16&65280]<<16}function On(e,t,r,n,i){const{sbox2:s,T01:a,T23:o}=Qn;let c=0;t^=e[c++],r^=e[c++],n^=e[c++],i^=e[c++];const u=e.length/4-2;for(let s=0;s<u;s++){const s=e[c++]^Fn(a,o,t,r,n,i),u=e[c++]^Fn(a,o,r,n,i,t),h=e[c++]^Fn(a,o,n,i,t,r),l=e[c++]^Fn(a,o,i,t,r,n);t=s,r=u,n=h,i=l}return{s0:e[c++]^Nn(s,t,r,n,i),s1:e[c++]^Nn(s,r,n,i,t),s2:e[c++]^Nn(s,n,i,t,r),s3:e[c++]^Nn(s,i,t,r,n)}}function _n(e,t,r,n,i){const{sbox2:s,T01:a,T23:o}=Rn;let c=0;t^=e[c++],r^=e[c++],n^=e[c++],i^=e[c++];const u=e.length/4-2;for(let s=0;s<u;s++){const s=e[c++]^Fn(a,o,t,i,n,r),u=e[c++]^Fn(a,o,r,t,i,n),h=e[c++]^Fn(a,o,n,r,t,i),l=e[c++]^Fn(a,o,i,n,r,t);t=s,r=u,n=h,i=l}return{s0:e[c++]^Nn(s,t,i,n,r),s1:e[c++]^Nn(s,r,t,i,n),s2:e[c++]^Nn(s,n,r,t,i),s3:e[c++]^Nn(s,i,n,r,t)}}function Hn(e,t){if(void 0===t)return new Uint8Array(e);if(en(t),t.length<e)throw Error(`aes: wrong destination length, expected at least ${e}, got: ${t.length}`);if(!ln(t))throw Error("unaligned dst");return t}function zn(e,t,r,n){en(t,En),en(r);const i=r.length;n=Hn(i,n);const s=t,a=sn(s);let{s0:o,s1:c,s2:u,s3:h}=On(e,a[0],a[1],a[2],a[3]);const l=sn(r),y=sn(n);for(let t=0;t+4<=l.length;t+=4){y[t+0]=l[t+0]^o,y[t+1]=l[t+1]^c,y[t+2]=l[t+2]^u,y[t+3]=l[t+3]^h;let r=1;for(let e=s.length-1;e>=0;e--)r=r+(255&s[e])|0,s[e]=255&r,r>>>=8;({s0:o,s1:c,s2:u,s3:h}=On(e,a[0],a[1],a[2],a[3]))}const f=En*Math.floor(l.length/4);if(f<i){const e=new Uint32Array([o,c,u,h]),t=nn(e);for(let e=f,s=0;e<i;e++,s++)n[e]=r[e]^t[s];fn(e)}return n}function Gn(e,t,r,n,i){en(r,En),en(n),i=Hn(n.length,i);const s=r,a=sn(s),o=an(s),c=sn(n),u=sn(i),h=t?0:12,l=n.length;let y=o.getUint32(h,t),{s0:f,s1:g,s2:p,s3:d}=On(e,a[0],a[1],a[2],a[3]);for(let r=0;r+4<=c.length;r+=4)u[r+0]=c[r+0]^f,u[r+1]=c[r+1]^g,u[r+2]=c[r+2]^p,u[r+3]=c[r+3]^d,y=y+1>>>0,o.setUint32(h,y,t),({s0:f,s1:g,s2:p,s3:d}=On(e,a[0],a[1],a[2],a[3]));const A=En*Math.floor(c.length/4);if(A<l){const e=new Uint32Array([f,g,p,d]),t=nn(e);for(let e=A,r=0;e<l;e++,r++)i[e]=n[e]^t[r];fn(e)}return i}const qn=un({blockSize:16,nonceLength:16},(function(e,t){function r(r,n){if(en(r),void 0!==n&&(en(n),!ln(n)))throw Error("unaligned destination");const i=Mn(e),s=yn(t),a=[i,s];ln(r)||a.push(r=yn(r));const o=zn(i,s,r,n);return fn(...a),o}return en(e),en(t,En),{encrypt:(e,t)=>r(e,t),decrypt:(e,t)=>r(e,t)}}));const jn=un({blockSize:16,nonceLength:16},(function(e,t,r={}){en(e),en(t,16);const n=!r.disablePadding;return{encrypt(r,i){const s=Mn(e),{b:a,o,out:c}=function(e,t,r){en(e);let n=e.length;const i=n%En;if(!t&&0!==i)throw Error("aec/(cbc-ecb): unpadded plaintext with disabled padding");ln(e)||(e=yn(e));const s=sn(e);if(t){let e=En-i;e||(e=En),n+=e}const a=Hn(n,r);return{b:s,o:sn(a),out:a}}(r,n,i);let u=t;const h=[s];ln(u)||h.push(u=yn(u));const l=sn(u);let y=l[0],f=l[1],g=l[2],p=l[3],d=0;for(;d+4<=a.length;)y^=a[d+0],f^=a[d+1],g^=a[d+2],p^=a[d+3],({s0:y,s1:f,s2:g,s3:p}=On(s,y,f,g,p)),o[d++]=y,o[d++]=f,o[d++]=g,o[d++]=p;if(n){const e=function(e){const t=new Uint8Array(16),r=sn(t);t.set(e);const n=En-e.length;for(let e=En-n;e<En;e++)t[e]=n;return r}(r.subarray(4*d));y^=e[0],f^=e[1],g^=e[2],p^=e[3],({s0:y,s1:f,s2:g,s3:p}=On(s,y,f,g,p)),o[d++]=y,o[d++]=f,o[d++]=g,o[d++]=p}return fn(...h),c},decrypt(r,i){!function(e){if(en(e),e.length%En!=0)throw Error("aes/(cbc-ecb).decrypt ciphertext should consist of blocks with size 16")}(r);const s=Ln(e);let a=t;const o=[s];ln(a)||o.push(a=yn(a));const c=sn(a),u=Hn(r.length,i);ln(r)||o.push(r=yn(r));const h=sn(r),l=sn(u);let y=c[0],f=c[1],g=c[2],p=c[3];for(let e=0;e+4<=h.length;){const t=y,r=f,n=g,i=p;y=h[e+0],f=h[e+1],g=h[e+2],p=h[e+3];const{s0:a,s1:o,s2:c,s3:u}=_n(s,y,f,g,p);l[e++]=a^t,l[e++]=o^r,l[e++]=c^n,l[e++]=u^i}return fn(...o),function(e,t){if(!t)return e;const r=e.length;if(!r)throw Error("aes/pcks5: empty ciphertext not allowed");const n=e[r-1];if(n<=0||n>16)throw Error("aes/pcks5: wrong padding");const i=e.subarray(0,-n);for(let t=0;t<n;t++)if(e[r-t-1]!==n)throw Error("aes/pcks5: wrong padding");return i}(u,n)}}})),Vn=un({blockSize:16,nonceLength:16},(function(e,t){function r(r,n,i){en(r);const s=r.length;i=Hn(s,i);const a=Mn(e);let o=t;const c=[a];ln(o)||c.push(o=yn(o)),ln(r)||c.push(r=yn(r));const u=sn(r),h=sn(i),l=n?h:u,y=sn(o);let f=y[0],g=y[1],p=y[2],d=y[3];for(let e=0;e+4<=u.length;){const{s0:t,s1:r,s2:n,s3:i}=On(a,f,g,p,d);h[e+0]=u[e+0]^t,h[e+1]=u[e+1]^r,h[e+2]=u[e+2]^n,h[e+3]=u[e+3]^i,f=l[e++],g=l[e++],p=l[e++],d=l[e++]}const A=En*Math.floor(u.length/4);if(A<s){({s0:f,s1:g,s2:p,s3:d}=On(a,f,g,p,d));const e=nn(new Uint32Array([f,g,p,d]));for(let t=A,n=0;t<s;t++,n++)i[t]=r[t]^e[n];fn(e)}return fn(...c),i}return en(e),en(t,16),{encrypt:(e,t)=>r(e,!0,t),decrypt:(e,t)=>r(e,!1,t)}}));const Yn=un({blockSize:16,nonceLength:12,tagLength:16},(function(e,t,r){if(en(e),en(t),void 0!==r&&en(r),t.length<8)throw Error("aes/gcm: invalid nonce length");const n=16;function i(e,t,n){const i=function(e,t,r,n,i){const s=null==i?0:i.length,a=e.create(r,n.length+s);i&&a.update(i),a.update(n);const o=new Uint8Array(16),c=an(o);i&&hn(c,0,BigInt(8*s),t),hn(c,8,BigInt(8*n.length),t),a.update(o);const u=a.digest();return fn(o),u}(kn,!1,e,n,r);for(let e=0;e<t.length;e++)i[e]^=t[e];return i}function s(){const r=Mn(e),n=vn.slice(),i=vn.slice();if(Gn(r,!1,i,i,n),12===t.length)i.set(t);else{const e=vn.slice();hn(an(e),8,BigInt(8*t.length),!1);const r=kn.create(n).update(t).update(e);r.digestInto(i),r.destroy()}return{xk:r,authKey:n,counter:i,tagMask:Gn(r,!1,i,vn)}}return{encrypt(e){en(e);const{xk:t,authKey:r,counter:a,tagMask:o}=s(),c=new Uint8Array(e.length+n),u=[t,r,a,o];ln(e)||u.push(e=yn(e)),Gn(t,!1,a,e,c);const h=i(r,o,c.subarray(0,c.length-n));return u.push(h),c.set(h,e.length),fn(...u),c},decrypt(e){if(en(e),e.length<n)throw Error("aes/gcm: ciphertext less than tagLen (16)");const{xk:t,authKey:r,counter:a,tagMask:o}=s(),c=[t,r,o,a];ln(e)||c.push(e=yn(e));const u=e.subarray(0,-16),h=e.subarray(-16),l=i(r,o,u);if(c.push(l),!cn(l,h))throw Error("aes/gcm: invalid ghash tag");const y=Gn(t,!1,a,u);return fn(...c),y}}}));function Zn(e){return null!=e&&"object"==typeof e&&(e instanceof Uint32Array||"Uint32Array"===e.constructor.name)}function Wn(e,t){if(en(t,16),!Zn(e))throw Error("_encryptBlock accepts result of expandKeyLE");const r=sn(t);let{s0:n,s1:i,s2:s,s3:a}=On(e,r[0],r[1],r[2],r[3]);return r[0]=n,r[1]=i,r[2]=s,r[3]=a,t}function Jn(e,t){if(en(t,16),!Zn(e))throw Error("_decryptBlock accepts result of expandKeyLE");const r=sn(t);let{s0:n,s1:i,s2:s,s3:a}=_n(e,r[0],r[1],r[2],r[3]);return r[0]=n,r[1]=i,r[2]=s,r[3]=a,t}const Xn={encrypt(e,t){if(t.length>=2**32)throw Error("plaintext should be less than 4gb");const r=Mn(e);if(16===t.length)Wn(r,t);else{const e=sn(t);let n=e[0],i=e[1];for(let t=0,s=1;t<6;t++)for(let t=2;t<e.length;t+=2,s++){const{s0:a,s1:o,s2:c,s3:u}=On(r,n,i,e[t],e[t+1]);n=a,i=o^Dn(s),e[t]=c,e[t+1]=u}e[0]=n,e[1]=i}r.fill(0)},decrypt(e,t){if(t.length-8>=2**32)throw Error("ciphertext should be less than 4gb");const r=Ln(e),n=t.length/8-1;if(1===n)Jn(r,t);else{const e=sn(t);let i=e[0],s=e[1];for(let t=0,a=6*n;t<6;t++)for(let t=2*n;t>=1;t-=2,a--){s^=Dn(a);const{s0:n,s1:o,s2:c,s3:u}=_n(r,i,s,e[t],e[t+1]);i=n,s=o,e[t]=c,e[t+1]=u}e[0]=i,e[1]=s}r.fill(0)}},$n=new Uint8Array(8).fill(166),ei=un({blockSize:8},(e=>({encrypt(t){if(en(t),!t.length||t.length%8!=0)throw Error("invalid plaintext length");if(8===t.length)throw Error("8-byte keys not allowed in AESKW, use AESKWP instead");const r=function(...e){let t=0;for(let r=0;r<e.length;r++){const n=e[r];en(n),t+=n.length}const r=new Uint8Array(t);for(let t=0,n=0;t<e.length;t++){const i=e[t];r.set(i,n),n+=i.length}return r}($n,t);return Xn.encrypt(e,r),r},decrypt(t){if(en(t),t.length%8!=0||t.length<24)throw Error("invalid ciphertext length");const r=yn(t);if(Xn.decrypt(e,r),!cn(r.subarray(0,8),$n))throw Error("integrity check failed");return r.subarray(0,8).fill(0),r.subarray(8)}}))),ti={expandKeyLE:Mn,expandKeyDecLE:Ln,encrypt:On,decrypt:_n,encryptBlock:Wn,decryptBlock:Jn,ctrCounter:zn,ctr32:Gn};async function ri(e){switch(e){case M.symmetric.aes128:case M.symmetric.aes192:case M.symmetric.aes256:throw Error("Not a legacy cipher");case M.symmetric.cast5:case M.symmetric.blowfish:case M.symmetric.twofish:case M.symmetric.tripledes:{const{legacyCiphers:t}=await Promise.resolve().then((function(){return Gf})),r=M.read(M.symmetric,e),n=t.get(r);if(!n)throw Error("Unsupported cipher algorithm");return n}default:throw Error("Unsupported cipher algorithm")}}function ni(e){switch(e){case M.symmetric.aes128:case M.symmetric.aes192:case M.symmetric.aes256:case M.symmetric.twofish:return 16;case M.symmetric.blowfish:case M.symmetric.cast5:case M.symmetric.tripledes:return 8;default:throw Error("Unsupported cipher")}}function ii(e){switch(e){case M.symmetric.aes128:case M.symmetric.blowfish:case M.symmetric.cast5:return 16;case M.symmetric.aes192:case M.symmetric.tripledes:return 24;case M.symmetric.aes256:case M.symmetric.twofish:return 32;default:throw Error("Unsupported cipher")}}function si(e){return{keySize:ii(e),blockSize:ni(e)}}const ai=N.getWebCrypto();async function oi(e,t,r){const{keySize:n}=si(e);if(!N.isAES(e)||t.length!==n)throw Error("Unexpected algorithm or key size");try{const e=await ai.importKey("raw",t,{name:"AES-KW"},!1,["wrapKey"]),n=await ai.importKey("raw",r,{name:"HMAC",hash:"SHA-256"},!0,["sign"]),i=await ai.wrapKey("raw",n,e,{name:"AES-KW"});return new Uint8Array(i)}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;N.printDebugError("Browser did not support operation: "+e.message)}return ei(t).encrypt(r)}async function ci(e,t,r){const{keySize:n}=si(e);if(!N.isAES(e)||t.length!==n)throw Error("Unexpected algorithm or key size");let i;try{i=await ai.importKey("raw",t,{name:"AES-KW"},!1,["unwrapKey"])}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;return N.printDebugError("Browser did not support operation: "+e.message),ei(t).decrypt(r)}try{const e=await ai.unwrapKey("raw",r,i,{name:"AES-KW"},{name:"HMAC",hash:"SHA-256"},!0,["sign"]);return new Uint8Array(await ai.exportKey("raw",e))}catch(e){if("OperationError"===e.name)throw Error("Key Data Integrity failed");throw e}}const ui=N.getWebCrypto();async function hi(e,t,r,n,i){const s=M.read(M.webHash,e);if(!s)throw Error("Hash algo not supported with HKDF");const a=await ui.importKey("raw",t,"HKDF",!1,["deriveBits"]),o=await ui.deriveBits({name:"HKDF",hash:s,salt:r,info:n},a,8*i);return new Uint8Array(o)}const li={x25519:N.encodeUTF8("OpenPGP X25519"),x448:N.encodeUTF8("OpenPGP X448")};async function yi(e){switch(e){case M.publicKey.x25519:{const e=pe(32),{publicKey:t}=$e.box.keyPair.fromSecretKey(e);return{A:t,k:e}}case M.publicKey.x448:{const e=await N.getNobleCurve(M.publicKey.x448),t=e.utils.randomPrivateKey();return{A:e.getPublicKey(t),k:t}}default:throw Error("Unsupported ECDH algorithm")}}async function fi(e,t,r){switch(e){case M.publicKey.x25519:{const{publicKey:e}=$e.box.keyPair.fromSecretKey(r);return N.equalsUint8Array(t,e)}case M.publicKey.x448:{const e=(await N.getNobleCurve(M.publicKey.x448)).getPublicKey(r);return N.equalsUint8Array(t,e)}default:return!1}}async function gi(e,t,r){const{ephemeralPublicKey:n,sharedSecret:i}=await Ai(e,r),s=N.concatUint8Array([n,r,i]);switch(e){case M.publicKey.x25519:{const e=M.symmetric.aes128,{keySize:r}=si(e),i=await hi(M.hash.sha256,s,new Uint8Array,li.x25519,r);return{ephemeralPublicKey:n,wrappedKey:await oi(e,i,t)}}case M.publicKey.x448:{const e=M.symmetric.aes256,{keySize:r}=si(M.symmetric.aes256),i=await hi(M.hash.sha512,s,new Uint8Array,li.x448,r);return{ephemeralPublicKey:n,wrappedKey:await oi(e,i,t)}}default:throw Error("Unsupported ECDH algorithm")}}async function pi(e,t,r,n,i){const s=await wi(e,t,n,i),a=N.concatUint8Array([t,n,s]);switch(e){case M.publicKey.x25519:{const e=M.symmetric.aes128,{keySize:t}=si(e);return ci(e,await hi(M.hash.sha256,a,new Uint8Array,li.x25519,t),r)}case M.publicKey.x448:{const e=M.symmetric.aes256,{keySize:t}=si(M.symmetric.aes256);return ci(e,await hi(M.hash.sha512,a,new Uint8Array,li.x448,t),r)}default:throw Error("Unsupported ECDH algorithm")}}function di(e){switch(e){case M.publicKey.x25519:return 32;case M.publicKey.x448:return 56;default:throw Error("Unsupported ECDH algorithm")}}async function Ai(e,t){switch(e){case M.publicKey.x25519:{const r=pe(di(e)),n=$e.scalarMult(r,t);mi(n);const{publicKey:i}=$e.box.keyPair.fromSecretKey(r);return{ephemeralPublicKey:i,sharedSecret:n}}case M.publicKey.x448:{const e=await N.getNobleCurve(M.publicKey.x448),r=e.utils.randomPrivateKey(),n=e.getSharedSecret(r,t);mi(n);return{ephemeralPublicKey:e.getPublicKey(r),sharedSecret:n}}default:throw Error("Unsupported ECDH algorithm")}}async function wi(e,t,r,n){switch(e){case M.publicKey.x25519:{const e=$e.scalarMult(n,t);return mi(e),e}case M.publicKey.x448:{const e=(await N.getNobleCurve(M.publicKey.x448)).getSharedSecret(n,t);return mi(e),e}default:throw Error("Unsupported ECDH algorithm")}}function mi(e){let t=0;for(let r=0;r<e.length;r++)t|=e[r];if(0===t)throw Error("Unexpected low order point")}var bi=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:pi,encrypt:gi,generate:yi,generateEphemeralEncryptionMaterial:Ai,getPayloadSize:di,recomputeSharedSecret:wi,validateParams:fi});const ki=N.getWebCrypto(),Ei=N.getNodeCrypto(),vi={[M.curve.nistP256]:"P-256",[M.curve.nistP384]:"P-384",[M.curve.nistP521]:"P-521"},Bi=Ei?Ei.getCurves():[],Si=Ei?{[M.curve.secp256k1]:Bi.includes("secp256k1")?"secp256k1":void 0,[M.curve.nistP256]:Bi.includes("prime256v1")?"prime256v1":void 0,[M.curve.nistP384]:Bi.includes("secp384r1")?"secp384r1":void 0,[M.curve.nistP521]:Bi.includes("secp521r1")?"secp521r1":void 0,[M.curve.ed25519Legacy]:Bi.includes("ED25519")?"ED25519":void 0,[M.curve.curve25519Legacy]:Bi.includes("X25519")?"X25519":void 0,[M.curve.brainpoolP256r1]:Bi.includes("brainpoolP256r1")?"brainpoolP256r1":void 0,[M.curve.brainpoolP384r1]:Bi.includes("brainpoolP384r1")?"brainpoolP384r1":void 0,[M.curve.brainpoolP512r1]:Bi.includes("brainpoolP512r1")?"brainpoolP512r1":void 0}:{},Ii={[M.curve.nistP256]:{oid:[6,8,42,134,72,206,61,3,1,7],keyType:M.publicKey.ecdsa,hash:M.hash.sha256,cipher:M.symmetric.aes128,node:Si[M.curve.nistP256],web:vi[M.curve.nistP256],payloadSize:32,sharedSize:256,wireFormatLeadingByte:4},[M.curve.nistP384]:{oid:[6,5,43,129,4,0,34],keyType:M.publicKey.ecdsa,hash:M.hash.sha384,cipher:M.symmetric.aes192,node:Si[M.curve.nistP384],web:vi[M.curve.nistP384],payloadSize:48,sharedSize:384,wireFormatLeadingByte:4},[M.curve.nistP521]:{oid:[6,5,43,129,4,0,35],keyType:M.publicKey.ecdsa,hash:M.hash.sha512,cipher:M.symmetric.aes256,node:Si[M.curve.nistP521],web:vi[M.curve.nistP521],payloadSize:66,sharedSize:528,wireFormatLeadingByte:4},[M.curve.secp256k1]:{oid:[6,5,43,129,4,0,10],keyType:M.publicKey.ecdsa,hash:M.hash.sha256,cipher:M.symmetric.aes128,node:Si[M.curve.secp256k1],payloadSize:32,wireFormatLeadingByte:4},[M.curve.ed25519Legacy]:{oid:[6,9,43,6,1,4,1,218,71,15,1],keyType:M.publicKey.eddsaLegacy,hash:M.hash.sha512,node:!1,payloadSize:32,wireFormatLeadingByte:64},[M.curve.curve25519Legacy]:{oid:[6,10,43,6,1,4,1,151,85,1,5,1],keyType:M.publicKey.ecdh,hash:M.hash.sha256,cipher:M.symmetric.aes128,node:!1,payloadSize:32,wireFormatLeadingByte:64},[M.curve.brainpoolP256r1]:{oid:[6,9,43,36,3,3,2,8,1,1,7],keyType:M.publicKey.ecdsa,hash:M.hash.sha256,cipher:M.symmetric.aes128,node:Si[M.curve.brainpoolP256r1],payloadSize:32,wireFormatLeadingByte:4},[M.curve.brainpoolP384r1]:{oid:[6,9,43,36,3,3,2,8,1,1,11],keyType:M.publicKey.ecdsa,hash:M.hash.sha384,cipher:M.symmetric.aes192,node:Si[M.curve.brainpoolP384r1],payloadSize:48,wireFormatLeadingByte:4},[M.curve.brainpoolP512r1]:{oid:[6,9,43,36,3,3,2,8,1,1,13],keyType:M.publicKey.ecdsa,hash:M.hash.sha512,cipher:M.symmetric.aes256,node:Si[M.curve.brainpoolP512r1],payloadSize:64,wireFormatLeadingByte:4}};class Ki{constructor(e){try{this.name=e instanceof zt?e.getName():M.write(M.curve,e)}catch(e){throw new Jt("Unknown curve")}const t=Ii[this.name];this.keyType=t.keyType,this.oid=t.oid,this.hash=t.hash,this.cipher=t.cipher,this.node=t.node,this.web=t.web,this.payloadSize=t.payloadSize,this.sharedSize=t.sharedSize,this.wireFormatLeadingByte=t.wireFormatLeadingByte,this.web&&N.getWebCrypto()?this.type="web":this.node&&N.getNodeCrypto()?this.type="node":this.name===M.curve.curve25519Legacy?this.type="curve25519Legacy":this.name===M.curve.ed25519Legacy&&(this.type="ed25519Legacy")}async genKeyPair(){switch(this.type){case"web":try{return await async function(e,t){const r=await ki.generateKey({name:"ECDSA",namedCurve:vi[e]},!0,["sign","verify"]),n=await ki.exportKey("jwk",r.privateKey);return{publicKey:Qi(await ki.exportKey("jwk",r.publicKey),t),privateKey:q(n.d)}}(this.name,this.wireFormatLeadingByte)}catch(e){return N.printDebugError("Browser did not support generating ec key "+e.message),xi(this.name)}case"node":return async function(e){const t=Ei.createECDH(Si[e]);return await t.generateKeys(),{publicKey:new Uint8Array(t.getPublicKey()),privateKey:new Uint8Array(t.getPrivateKey())}}(this.name);case"curve25519Legacy":{const{k:e,A:t}=await yi(M.publicKey.x25519),r=e.slice().reverse();r[0]=127&r[0]|64,r[31]&=248;return{publicKey:N.concatUint8Array([new Uint8Array([this.wireFormatLeadingByte]),t]),privateKey:r}}case"ed25519Legacy":{const{seed:e,A:t}=await Gr(M.publicKey.ed25519);return{publicKey:N.concatUint8Array([new Uint8Array([this.wireFormatLeadingByte]),t]),privateKey:e}}default:return xi(this.name)}}}async function Ci(e){const t=new Ki(e),{oid:r,hash:n,cipher:i}=t,s=await t.genKeyPair();return{oid:r,Q:s.publicKey,secret:N.leftPad(s.privateKey,t.payloadSize),hash:n,cipher:i}}function Ui(e){return Ii[e.getName()].hash}async function Pi(e,t,r,n){const i={[M.curve.nistP256]:!0,[M.curve.nistP384]:!0,[M.curve.nistP521]:!0,[M.curve.secp256k1]:!0,[M.curve.curve25519Legacy]:e===M.publicKey.ecdh,[M.curve.brainpoolP256r1]:!0,[M.curve.brainpoolP384r1]:!0,[M.curve.brainpoolP512r1]:!0},s=t.getName();if(!i[s])return!1;if(s===M.curve.curve25519Legacy){n=n.slice().reverse();const{publicKey:e}=$e.box.keyPair.fromSecretKey(n);r=new Uint8Array(r);const t=new Uint8Array([64,...e]);return!!N.equalsUint8Array(t,r)}const a=(await N.getNobleCurve(M.publicKey.ecdsa,s)).getPublicKey(n,!1);return!!N.equalsUint8Array(a,r)}function Di(e,t){const{payloadSize:r,wireFormatLeadingByte:n,name:i}=e,s=i===M.curve.curve25519Legacy||i===M.curve.ed25519Legacy?r:2*r;if(t[0]!==n||t.length!==s+1)throw Error("Invalid point encoding")}async function xi(e){const t=await N.getNobleCurve(M.publicKey.ecdsa,e),r=t.utils.randomPrivateKey();return{publicKey:t.getPublicKey(r,!1),privateKey:r}}function Qi(e,t){const r=q(e.x),n=q(e.y),i=new Uint8Array(r.length+n.length+1);return i[0]=t,i.set(r,1),i.set(n,r.length+1),i}function Ri(e,t,r){const n=e,i=r.slice(1,n+1),s=r.slice(n+1,2*n+1);return{kty:"EC",crv:t,x:j(i),y:j(s),ext:!0}}function Ti(e,t,r,n){const i=Ri(e,t,r);return i.d=j(n),i}const Mi=N.getWebCrypto(),Li=N.getNodeCrypto();async function Fi(e,t,r,n,i,s){const a=new Ki(e);if(Di(a,n),r&&!N.isStream(r)){const e={publicKey:n,privateKey:i};switch(a.type){case"web":try{return await async function(e,t,r,n){const i=e.payloadSize,s=Ti(e.payloadSize,vi[e.name],n.publicKey,n.privateKey),a=await Mi.importKey("jwk",s,{name:"ECDSA",namedCurve:vi[e.name],hash:{name:M.read(M.webHash,e.hash)}},!1,["sign"]),o=new Uint8Array(await Mi.sign({name:"ECDSA",namedCurve:vi[e.name],hash:{name:M.read(M.webHash,t)}},a,r));return{r:o.slice(0,i),s:o.slice(i,i<<1)}}(a,t,r,e)}catch(e){if("nistP521"!==a.name&&("DataError"===e.name||"OperationError"===e.name))throw e;N.printDebugError("Browser did not support signing: "+e.message)}break;case"node":return async function(e,t,r,n){const i=N.nodeRequire("eckey-utils"),s=N.getNodeBuffer(),{privateKey:a}=i.generateDer({curveName:Si[e.name],privateKey:s.from(n)}),o=Li.createSign(M.read(M.hash,t));o.write(r),o.end();const c=new Uint8Array(o.sign({key:a,format:"der",type:"sec1",dsaEncoding:"ieee-p1363"})),u=e.payloadSize;return{r:c.subarray(0,u),s:c.subarray(u,u<<1)}}(a,t,r,i)}}const o=(await N.getNobleCurve(M.publicKey.ecdsa,a.name)).sign(s,i,{lowS:!1});return{r:fe(o.r,"be",a.payloadSize),s:fe(o.s,"be",a.payloadSize)}}async function Ni(e,t,r,n,i,s){const a=new Ki(e);Di(a,i);const o=async()=>0===s[0]&&Oi(a,r,s.subarray(1),i);if(n&&!N.isStream(n))switch(a.type){case"web":try{const e=await async function(e,t,{r,s:n},i,s){const a=Ri(e.payloadSize,vi[e.name],s),o=await Mi.importKey("jwk",a,{name:"ECDSA",namedCurve:vi[e.name],hash:{name:M.read(M.webHash,e.hash)}},!1,["verify"]),c=N.concatUint8Array([r,n]).buffer;return Mi.verify({name:"ECDSA",namedCurve:vi[e.name],hash:{name:M.read(M.webHash,t)}},o,c,i)}(a,t,r,n,i);return e||o()}catch(e){if("nistP521"!==a.name&&("DataError"===e.name||"OperationError"===e.name))throw e;N.printDebugError("Browser did not support verifying: "+e.message)}break;case"node":{const e=await async function(e,t,{r,s:n},i,s){const a=N.nodeRequire("eckey-utils"),o=N.getNodeBuffer(),{publicKey:c}=a.generateDer({curveName:Si[e.name],publicKey:o.from(s)}),u=Li.createVerify(M.read(M.hash,t));u.write(i),u.end();const h=N.concatUint8Array([r,n]);try{return u.verify({key:c,format:"der",type:"spki",dsaEncoding:"ieee-p1363"},h)}catch(e){return!1}}(a,t,r,n,i);return e||o()}}return await Oi(a,r,s,i)||o()}async function Oi(e,t,r,n){return(await N.getNobleCurve(M.publicKey.ecdsa,e.name)).verify(N.concatUint8Array([t.r,t.s]),r,n,{lowS:!1})}var _i=/*#__PURE__*/Object.freeze({__proto__:null,sign:Fi,validateParams:async function(e,t,r){const n=new Ki(e);if(n.keyType!==M.publicKey.ecdsa)return!1;switch(n.type){case"web":case"node":{const n=pe(8),i=M.hash.sha256,s=await Te(i,n);try{const a=await Fi(e,i,n,t,r,s);return await Ni(e,i,a,n,t,s)}catch(e){return!1}}default:return Pi(M.publicKey.ecdsa,e,t,r)}},verify:Ni});async function Hi(e,t,r,n,i,s){if(Di(new Ki(e),n),Me(t)<Me(M.hash.sha256))throw Error("Hash algorithm too weak for EdDSA.");const{RS:a}=await qr(M.publicKey.ed25519,t,0,n.subarray(1),i,s);return{r:a.subarray(0,32),s:a.subarray(32)}}async function zi(e,t,{r,s:n},i,s,a){if(Di(new Ki(e),s),Me(t)<Me(M.hash.sha256))throw Error("Hash algorithm too weak for EdDSA.");const o=N.concatUint8Array([r,n]);return jr(M.publicKey.ed25519,t,{RS:o},0,s.subarray(1),a)}async function Gi(e,t,r){if(e.getName()!==M.curve.ed25519Legacy)return!1;const{publicKey:n}=$e.sign.keyPair.fromSeed(r),i=new Uint8Array([64,...n]);return N.equalsUint8Array(t,i)}var qi=/*#__PURE__*/Object.freeze({__proto__:null,sign:Hi,validateParams:Gi,verify:zi});function ji(e){const t=e.length;if(t>0){const r=e[t-1];if(r>=1){const n=e.subarray(t-r),i=new Uint8Array(r).fill(r);if(N.equalsUint8Array(n,i))return e.subarray(0,t-r)}}throw Error("Invalid padding")}const Vi=N.getWebCrypto(),Yi=N.getNodeCrypto();function Zi(e,t,r,n){return N.concatUint8Array([t.write(),new Uint8Array([e]),r.write(!0),N.stringToUint8Array("Anonymous Sender "),r.replacementFingerprint||n])}async function Wi(e,t,r,n,i=!1,s=!1){let a;if(i){for(a=0;a<t.length&&0===t[a];a++);t=t.subarray(a)}if(s){for(a=t.length-1;a>=0&&0===t[a];a--);t=t.subarray(0,a+1)}return(await Te(e,N.concatUint8Array([new Uint8Array([0,0,0,1]),t,n]))).subarray(0,r)}async function Ji(e,t){switch(e.type){case"curve25519Legacy":{const{sharedSecret:r,ephemeralPublicKey:n}=await Ai(M.publicKey.x25519,t.subarray(1));return{publicKey:N.concatUint8Array([new Uint8Array([e.wireFormatLeadingByte]),n]),sharedKey:r}}case"web":if(e.web&&N.getWebCrypto())try{return await async function(e,t){const r=Ri(e.payloadSize,e.web,t);let n=Vi.generateKey({name:"ECDH",namedCurve:e.web},!0,["deriveKey","deriveBits"]),i=Vi.importKey("jwk",r,{name:"ECDH",namedCurve:e.web},!1,[]);[n,i]=await Promise.all([n,i]);let s=Vi.deriveBits({name:"ECDH",namedCurve:e.web,public:i},n.privateKey,e.sharedSize),a=Vi.exportKey("jwk",n.publicKey);[s,a]=await Promise.all([s,a]);const o=new Uint8Array(s),c=new Uint8Array(Qi(a,e.wireFormatLeadingByte));return{publicKey:c,sharedKey:o}}(e,t)}catch(r){return N.printDebugError(r),rs(e,t)}break;case"node":return async function(e,t){const r=Yi.createECDH(e.node);r.generateKeys();const n=new Uint8Array(r.computeSecret(t));return{publicKey:new Uint8Array(r.getPublicKey()),sharedKey:n}}(e,t);default:return rs(e,t)}}async function Xi(e,t,r,n,i){const s=function(e){const t=8-e.length%8,r=new Uint8Array(e.length+t).fill(t);return r.set(e),r}(r),a=new Ki(e);Di(a,n);const{publicKey:o,sharedKey:c}=await Ji(a,n),u=Zi(M.publicKey.ecdh,e,t,i),{keySize:h}=si(t.cipher),l=await Wi(t.hash,c,h,u);return{publicKey:o,wrappedKey:await oi(t.cipher,l,s)}}async function $i(e,t,r,n){if(n.length!==e.payloadSize){const t=new Uint8Array(e.payloadSize);t.set(n,e.payloadSize-n.length),n=t}switch(e.type){case"curve25519Legacy":{const e=n.slice().reverse();return{secretKey:e,sharedKey:await wi(M.publicKey.x25519,t.subarray(1),r.subarray(1),e)}}case"web":if(e.web&&N.getWebCrypto())try{return await async function(e,t,r,n){const i=Ti(e.payloadSize,e.web,r,n);let s=Vi.importKey("jwk",i,{name:"ECDH",namedCurve:e.web},!0,["deriveKey","deriveBits"]);const a=Ri(e.payloadSize,e.web,t);let o=Vi.importKey("jwk",a,{name:"ECDH",namedCurve:e.web},!0,[]);[s,o]=await Promise.all([s,o]);let c=Vi.deriveBits({name:"ECDH",namedCurve:e.web,public:o},s,e.sharedSize),u=Vi.exportKey("jwk",s);[c,u]=await Promise.all([c,u]);const h=new Uint8Array(c);return{secretKey:q(u.d),sharedKey:h}}(e,t,r,n)}catch(r){return N.printDebugError(r),ts(e,t,n)}break;case"node":return async function(e,t,r){const n=Yi.createECDH(e.node);n.setPrivateKey(r);const i=new Uint8Array(n.computeSecret(t));return{secretKey:new Uint8Array(n.getPrivateKey()),sharedKey:i}}(e,t,n);default:return ts(e,t,n)}}async function es(e,t,r,n,i,s,a){const o=new Ki(e);Di(o,i),Di(o,r);const{sharedKey:c}=await $i(o,r,i,s),u=Zi(M.publicKey.ecdh,e,t,a),{keySize:h}=si(t.cipher);let l;for(let e=0;e<3;e++)try{const r=await Wi(t.hash,c,h,u,1===e,2===e);return ji(await ci(t.cipher,r,n))}catch(e){l=e}throw l}async function ts(e,t,r){return{secretKey:r,sharedKey:(await N.getNobleCurve(M.publicKey.ecdh,e.name)).getSharedSecret(r,t).subarray(1)}}async function rs(e,t){const r=await N.getNobleCurve(M.publicKey.ecdh,e.name),{publicKey:n,privateKey:i}=await e.genKeyPair();return{publicKey:n,sharedKey:r.getSharedSecret(i,t).subarray(1)}}var ns=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:es,encrypt:Xi,validateParams:async function(e,t,r){return Pi(M.publicKey.ecdh,e,t,r)}}),is=/*#__PURE__*/Object.freeze({__proto__:null,CurveWithOID:Ki,ecdh:ns,ecdhX:bi,ecdsa:_i,eddsa:Xr,eddsaLegacy:qi,generate:Ci,getPreferredHashAlgo:Ui});const ss=BigInt(0),as=BigInt(1);const os=new Set([M.hash.sha1,M.hash.sha256,M.hash.sha512]),cs=N.getWebCrypto(),us=N.getNodeCrypto();async function hs(e,t){if(e===M.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Ng})),{publicKey:r,secretKey:n}=e.keygen(t);return{mlkemPublicKey:r,mlkemSecretKey:n}}throw Error("Unsupported KEM algorithm")}async function ls(e){const{eccPublicKey:t,eccSecretKey:r}=await async function(e){if(e===M.publicKey.pqc_mlkem_x25519){const{A:e,k:t}=await yi(M.publicKey.x25519);return{eccPublicKey:e,eccSecretKey:t}}throw Error("Unsupported KEM algorithm")}(e),{mlkemPublicKey:n,mlkemSeed:i,mlkemSecretKey:s}=await async function(e){if(e===M.publicKey.pqc_mlkem_x25519){const t=pe(64),{mlkemSecretKey:r,mlkemPublicKey:n}=await hs(e,t);return{mlkemSeed:t,mlkemSecretKey:r,mlkemPublicKey:n}}throw Error("Unsupported KEM algorithm")}(e);return{eccPublicKey:t,eccSecretKey:r,mlkemPublicKey:n,mlkemSeed:i,mlkemSecretKey:s}}async function ys(e,t,r,n){const{eccKeyShare:i,eccCipherText:s}=await async function(e,t){if(e===M.publicKey.pqc_mlkem_x25519){const{ephemeralPublicKey:e,sharedSecret:r}=await Ai(M.publicKey.x25519,t);return{eccCipherText:e,eccKeyShare:r}}throw Error("Unsupported KEM algorithm")}(e,t),{mlkemKeyShare:a,mlkemCipherText:o}=await async function(e,t){if(e===M.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Ng})),{cipherText:r,sharedSecret:n}=e.encapsulate(t);return{mlkemCipherText:r,mlkemKeyShare:n}}throw Error("Unsupported KEM algorithm")}(e,r),c=await gs(e,i,s,t,a,o,r);return{eccCipherText:s,mlkemCipherText:o,wrappedKey:await oi(M.symmetric.aes256,c,n)}}async function fs(e,t,r,n,i,s,a,o){const c=await async function(e,t,r){if(e===M.publicKey.pqc_mlkem_x25519)return await wi(M.publicKey.x25519,t,0,r);throw Error("Unsupported KEM algorithm")}(e,t,n),u=await async function(e,t,r){if(e===M.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Ng}));return e.decapsulate(t,r)}throw Error("Unsupported KEM algorithm")}(e,r,s),h=await gs(e,c,t,i,u,r,a);return await ci(M.symmetric.aes256,h,o)}async function gs(e,t,r,n,i,s,a){const o=N.concatUint8Array([i,t,r,n,s,a,new Uint8Array([e]),N.encodeUTF8("OpenPGPCompositeKDFv1")]);return await Te(M.hash.sha3_256,o)}async function ps(e,t,r,n,i){const s=async function(e,t,r){if(e===M.publicKey.pqc_mlkem_x25519)return fi(M.publicKey.x25519,t,r);throw Error("Unsupported KEM algorithm")}(e,t,r),a=async function(e,t,r){if(e===M.publicKey.pqc_mlkem_x25519){const{mlkemPublicKey:n}=await hs(e,r);return N.equalsUint8Array(t,n)}throw Error("Unsupported KEM algorithm")}(e,n,i);return await s&&await a}async function ds(e,t){if(e===M.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Ng})),{secretKey:r,publicKey:n}=e.keygen(t);return{mldsaSecretKey:r,mldsaPublicKey:n}}throw Error("Unsupported signature algorithm")}async function As(e){if(e===M.publicKey.pqc_mldsa_ed25519){const{eccSecretKey:t,eccPublicKey:r}=await async function(e){if(e===M.publicKey.pqc_mldsa_ed25519){const{A:e,seed:t}=await Gr(M.publicKey.ed25519);return{eccPublicKey:e,eccSecretKey:t}}throw Error("Unsupported signature algorithm")}(e),{mldsaSeed:n,mldsaSecretKey:i,mldsaPublicKey:s}=await async function(e){if(e===M.publicKey.pqc_mldsa_ed25519){const t=pe(32),{mldsaSecretKey:r,mldsaPublicKey:n}=await ds(e,t);return{mldsaSeed:t,mldsaSecretKey:r,mldsaPublicKey:n}}throw Error("Unsupported signature algorithm")}(e);return{eccSecretKey:t,eccPublicKey:r,mldsaSeed:n,mldsaSecretKey:i,mldsaPublicKey:s}}throw Error("Unsupported signature algorithm")}async function ws(e,t,r,n,i,s){if(t!==bs(e))throw Error("Unexpected hash algorithm for PQC signature");if(e===M.publicKey.pqc_mldsa_ed25519){const{eccSignature:a}=await async function(e,t,r,n,i){if(e===M.publicKey.pqc_mldsa_ed25519){const{RS:e}=await qr(M.publicKey.ed25519,t,0,n,r,i);return{eccSignature:e}}throw Error("Unsupported signature algorithm")}(e,t,r,n,s),{mldsaSignature:o}=await async function(e,t,r){if(e===M.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Ng}));return{mldsaSignature:e.sign(t,r)}}throw Error("Unsupported signature algorithm")}(e,i,s);return{eccSignature:a,mldsaSignature:o}}throw Error("Unsupported signature algorithm")}async function ms(e,t,r,n,i,{eccSignature:s,mldsaSignature:a}){if(t!==bs(e))throw Error("Unexpected hash algorithm for PQC signature");if(e===M.publicKey.pqc_mldsa_ed25519){const o=async function(e,t,r,n,i){if(e===M.publicKey.pqc_mldsa_ed25519)return jr(M.publicKey.ed25519,t,{RS:i},0,r,n);throw Error("Unsupported signature algorithm")}(e,t,r,i,s),c=async function(e,t,r,n){if(e===M.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Ng}));return e.verify(t,r,n)}throw Error("Unsupported signature algorithm")}(e,n,i,a);return await o&&await c}throw Error("Unsupported signature algorithm")}function bs(e){if(e===M.publicKey.pqc_mldsa_ed25519)return M.hash.sha3_256;throw Error("Unsupported signature algorithm")}async function ks(e,t,r,n,i){const s=async function(e,t,r){if(e===M.publicKey.pqc_mldsa_ed25519)return Vr(M.publicKey.ed25519,t,r);throw Error("Unsupported signature algorithm")}(e,t,r),a=async function(e,t,r){if(e===M.publicKey.pqc_mldsa_ed25519){const{mldsaPublicKey:n}=await ds(e,r);return N.equalsUint8Array(t,n)}throw Error("Unsupported signature algorithm")}(e,n,i);return await s&&await a}class Es{constructor(e){e&&(this.data=e)}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.data=e.subarray(1,1+t),1+this.data.length}throw Error("Invalid symmetric key")}write(){return N.concatUint8Array([new Uint8Array([this.data.length]),this.data])}}class vs{constructor(e){if(void 0===e&&(e=new Uint8Array([])),!N.isUint8Array(e))throw Error("data must be in the form of a Uint8Array");this.data=e,this.length=this.data.byteLength}write(){return N.concatUint8Array([new Uint8Array([this.length]),this.data])}read(e){if(e.length>=1){const t=e[0];if(e.length>=t+1)return this.data=e.subarray(1,1+t),this.length=t,1+t}throw Error("Invalid octet string")}}class Bs{constructor(e){if(e){const{version:t,hash:r,cipher:n,replacementFingerprint:i}=e;this.version=t||1,this.hash=r,this.cipher=n,this.replacementFingerprint=i}else this.version=null,this.hash=null,this.cipher=null,this.replacementFingerprint=null}read(e){if(e.length<4||1!==e[1]&&255!==e[1])throw new Jt("Cannot read KDFParams");const t=e[0];this.version=e[1],this.hash=e[2],this.cipher=e[3];let r=4;if(255===this.version){const n=t-r+1;this.replacementFingerprint=e.slice(r,r+n),r+=n}return r}write(e){if(!this.version||1===this.version||e)return new Uint8Array([3,1,this.hash,this.cipher]);return N.concatUint8Array([new Uint8Array([3+this.replacementFingerprint.length,this.version,this.hash,this.cipher]),this.replacementFingerprint])}}const Ss=e=>class{constructor(e){this.data=void 0===e?null:e}read(t){const r=t[0];return this.data=M.write(e,r),1}write(){return new Uint8Array([this.data])}getName(){return M.read(e,this.data)}getValue(){return this.data}},Is=Ss(M.aead),Ks=Ss(M.symmetric),Cs=Ss(M.hash);class Us{static fromObject({wrappedKey:e,algorithm:t}){const r=new Us;return r.wrappedKey=e,r.algorithm=t,r}read(e){let t=0,r=e[t++];this.algorithm=r%2?e[t++]:null,r-=r%2,this.wrappedKey=N.readExactSubarray(e,t,t+r),t+=r}write(){return N.concatUint8Array([this.algorithm?new Uint8Array([this.wrappedKey.length+1,this.algorithm]):new Uint8Array([this.wrappedKey.length]),this.wrappedKey])}}const Ps=N.getWebCrypto(),Ds=N.getNodeCrypto(),xs=Ds?Ds.getCiphers():[],Qs={idea:xs.includes("idea-cfb")?"idea-cfb":void 0,tripledes:xs.includes("des-ede3-cfb")?"des-ede3-cfb":void 0,cast5:xs.includes("cast5-cfb")?"cast5-cfb":void 0,blowfish:xs.includes("bf-cfb")?"bf-cfb":void 0,aes128:xs.includes("aes-128-cfb")?"aes-128-cfb":void 0,aes192:xs.includes("aes-192-cfb")?"aes-192-cfb":void 0,aes256:xs.includes("aes-256-cfb")?"aes-256-cfb":void 0};async function Rs(e){const{blockSize:t}=si(e),r=await pe(t),n=new Uint8Array([r[r.length-2],r[r.length-1]]);return N.concat([r,n])}async function Ts(e,t,r,n,i){const s=M.read(M.symmetric,e);if(N.getNodeCrypto()&&Qs[s])return function(e,t,r,n){const i=M.read(M.symmetric,e),s=new Ds.createCipheriv(Qs[i],t,n);return v(r,(e=>new Uint8Array(s.update(e))))}(e,t,r,n);if(N.isAES(e))return async function(e,t,r,n){if(Ps&&await Ls.isSupported(e)){const i=new Ls(e,t,n);return N.isStream(r)?v(r,(e=>i.encryptChunk(e)),(()=>i.finish())):i.encrypt(r)}if(N.isStream(r)){const i=new Fs(!0,e,t,n);return v(r,(e=>i.processChunk(e)),(()=>i.finish()))}return Vn(t,n).encrypt(r)}(e,t,r,n);const a=new(await ri(e))(t),o=a.blockSize,c=n.slice();let u=new Uint8Array;const h=e=>{e&&(u=N.concatUint8Array([u,e]));const t=new Uint8Array(u.length);let r,n=0;for(;e?u.length>=o:u.length;){const e=a.encrypt(c);for(r=0;r<o;r++)c[r]=u[r]^e[r],t[n++]=c[r];u=u.subarray(o)}return t.subarray(0,n)};return v(r,h,h)}async function Ms(e,t,r,n){const i=M.read(M.symmetric,e);if(Ds&&Qs[i])return function(e,t,r,n){const i=M.read(M.symmetric,e),s=new Ds.createDecipheriv(Qs[i],t,n);return v(r,(e=>new Uint8Array(s.update(e))))}(e,t,r,n);if(N.isAES(e))return async function(e,t,r,n){if(N.isStream(r)){const i=new Fs(!1,e,t,n);return v(r,(e=>i.processChunk(e)),(()=>i.finish()))}return Vn(t,n).decrypt(r)}(e,t,r,n);const s=new(await ri(e))(t),a=s.blockSize;let o=n,c=new Uint8Array;const u=e=>{e&&(c=N.concatUint8Array([c,e]));const t=new Uint8Array(c.length);let r,n=0;for(;e?c.length>=a:c.length;){const e=s.encrypt(o);for(o=c.subarray(0,a),r=0;r<a;r++)t[n++]=o[r]^e[r];c=c.subarray(a)}return t.subarray(0,n)};return v(r,u,u)}class Ls{constructor(e,t,r){const{blockSize:n}=si(e);this.key=t,this.prevBlock=r,this.nextBlock=new Uint8Array(n),this.i=0,this.blockSize=n,this.zeroBlock=new Uint8Array(this.blockSize)}static async isSupported(e){const{keySize:t}=si(e);return Ps.importKey("raw",new Uint8Array(t),"aes-cbc",!1,["encrypt"]).then((()=>!0),(()=>!1))}async _runCBC(e,t){const r="AES-CBC";this.keyRef=this.keyRef||await Ps.importKey("raw",this.key,r,!1,["encrypt"]);const n=await Ps.encrypt({name:r,iv:t||this.zeroBlock},this.keyRef,e);return new Uint8Array(n).subarray(0,e.length)}async encryptChunk(e){const t=this.nextBlock.length-this.i,r=e.subarray(0,t);if(this.nextBlock.set(r,this.i),this.i+e.length>=2*this.blockSize){const r=(e.length-t)%this.blockSize,n=N.concatUint8Array([this.nextBlock,e.subarray(t,e.length-r)]),i=N.concatUint8Array([this.prevBlock,n.subarray(0,n.length-this.blockSize)]),s=await this._runCBC(i);return Ns(s,n),this.prevBlock=s.slice(-this.blockSize),r>0&&this.nextBlock.set(e.subarray(-r)),this.i=r,s}let n;if(this.i+=r.length,this.i===this.nextBlock.length){const t=this.nextBlock;n=await this._runCBC(this.prevBlock),Ns(n,t),this.prevBlock=n.slice(),this.i=0;const i=e.subarray(r.length);this.nextBlock.set(i,this.i),this.i+=i.length}else n=new Uint8Array;return n}async finish(){let e;if(0===this.i)e=new Uint8Array;else{this.nextBlock=this.nextBlock.subarray(0,this.i);const t=this.nextBlock,r=await this._runCBC(this.prevBlock);Ns(r,t),e=r.subarray(0,t.length)}return this.clearSensitiveData(),e}clearSensitiveData(){this.nextBlock.fill(0),this.prevBlock.fill(0),this.keyRef=null,this.key=null}async encrypt(e){const t=(await this._runCBC(N.concatUint8Array([new Uint8Array(this.blockSize),e]),this.iv)).subarray(0,e.length);return Ns(t,e),this.clearSensitiveData(),t}}class Fs{constructor(e,t,r,n){this.forEncryption=e;const{blockSize:i}=si(t);this.key=ti.expandKeyLE(r),n.byteOffset%4!=0&&(n=n.slice()),this.prevBlock=Os(n),this.nextBlock=new Uint8Array(i),this.i=0,this.blockSize=i}_runCFB(e){const t=Os(e),r=new Uint8Array(e.length),n=Os(r);for(let e=0;e+4<=n.length;e+=4){const{s0:r,s1:i,s2:s,s3:a}=ti.encrypt(this.key,this.prevBlock[0],this.prevBlock[1],this.prevBlock[2],this.prevBlock[3]);n[e+0]=t[e+0]^r,n[e+1]=t[e+1]^i,n[e+2]=t[e+2]^s,n[e+3]=t[e+3]^a,this.prevBlock=(this.forEncryption?n:t).slice(e,e+4)}return r}async processChunk(e){const t=this.nextBlock.length-this.i,r=e.subarray(0,t);if(this.nextBlock.set(r,this.i),this.i+e.length>=2*this.blockSize){const r=(e.length-t)%this.blockSize,n=N.concatUint8Array([this.nextBlock,e.subarray(t,e.length-r)]),i=this._runCFB(n);return r>0&&this.nextBlock.set(e.subarray(-r)),this.i=r,i}let n;if(this.i+=r.length,this.i===this.nextBlock.length){n=this._runCFB(this.nextBlock),this.i=0;const t=e.subarray(r.length);this.nextBlock.set(t,this.i),this.i+=t.length}else n=new Uint8Array;return n}async finish(){let e;if(0===this.i)e=new Uint8Array;else{e=this._runCFB(this.nextBlock).subarray(0,this.i)}return this.clearSensitiveData(),e}clearSensitiveData(){this.nextBlock.fill(0),this.prevBlock.fill(0),this.key.fill(0)}}function Ns(e,t){const r=Math.min(e.length,t.length);for(let n=0;n<r;n++)e[n]=e[n]^t[n]}const Os=e=>new Uint32Array(e.buffer,e.byteOffset,Math.floor(e.byteLength/4));const _s=N.getWebCrypto(),Hs=N.getNodeCrypto(),zs=16;function Gs(e,t){const r=e.length-zs;for(let n=0;n<zs;n++)e[n+r]^=t[n];return e}const qs=new Uint8Array(zs);async function js(e){const t=await Vs(e),r=N.double(await t(qs)),n=N.double(r);return async function(e){return(await t(function(e,t,r){if(e.length&&e.length%zs==0)return Gs(e,t);const n=new Uint8Array(e.length+(zs-e.length%zs));return n.set(e),n[e.length]=128,Gs(n,r)}(e,r,n))).subarray(-zs)}}async function Vs(e){if(N.getNodeCrypto())return async function(t){const r=new Hs.createCipheriv("aes-"+8*e.length+"-cbc",e,qs).update(t);return new Uint8Array(r)};if(N.getWebCrypto())try{return e=await _s.importKey("raw",e,{name:"AES-CBC",length:8*e.length},!1,["encrypt"]),async function(t){const r=await _s.encrypt({name:"AES-CBC",iv:qs,length:8*zs},e,t);return new Uint8Array(r).subarray(0,r.byteLength-zs)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;N.printDebugError("Browser did not support operation: "+t.message)}return async function(t){return jn(e,qs,{disablePadding:!0}).encrypt(t)}}const Ys=N.getWebCrypto(),Zs=N.getNodeCrypto(),Ws=N.getNodeBuffer(),Js=16,Xs=Js,$s=Js,ea=new Uint8Array(Js),ta=new Uint8Array(Js);ta[Js-1]=1;const ra=new Uint8Array(Js);async function na(e){const t=await js(e);return function(e,r){return t(N.concatUint8Array([e,r]))}}async function ia(e){if(N.getNodeCrypto())return async function(t,r){const n=new Zs.createCipheriv("aes-"+8*e.length+"-ctr",e,r),i=Ws.concat([n.update(t),n.final()]);return new Uint8Array(i)};if(N.getWebCrypto())try{const t=await Ys.importKey("raw",e,{name:"AES-CTR",length:8*e.length},!1,["encrypt"]);return async function(e,r){const n=await Ys.encrypt({name:"AES-CTR",counter:r,length:8*Js},t,e);return new Uint8Array(n)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;N.printDebugError("Browser did not support operation: "+t.message)}return async function(t,r){return qn(e,r).encrypt(t)}}async function sa(e,t){if(e!==M.symmetric.aes128&&e!==M.symmetric.aes192&&e!==M.symmetric.aes256)throw Error("EAX mode supports only AES cipher");const[r,n]=await Promise.all([na(t),ia(t)]);return{encrypt:async function(e,t,i){const[s,a]=await Promise.all([r(ea,t),r(ta,i)]),o=await n(e,s),c=await r(ra,o);for(let e=0;e<$s;e++)c[e]^=a[e]^s[e];return N.concatUint8Array([o,c])},decrypt:async function(e,t,i){if(e.length<$s)throw Error("Invalid EAX ciphertext");const s=e.subarray(0,-$s),a=e.subarray(-$s),[o,c,u]=await Promise.all([r(ea,t),r(ta,i),r(ra,s)]),h=u;for(let e=0;e<$s;e++)h[e]^=c[e]^o[e];if(!N.equalsUint8Array(a,h))throw Error("Authentication tag mismatch");return await n(s,o)}}}ra[Js-1]=2,sa.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[8+e]^=t[e];return r},sa.blockLength=Js,sa.ivLength=Xs,sa.tagLength=$s;const aa=16,oa=15,ca=16;function ua(e){let t=0;for(let r=1;!(e&r);r<<=1)t++;return t}function ha(e,t){for(let r=0;r<e.length;r++)e[r]^=t[r];return e}function la(e,t){return ha(e.slice(),t)}const ya=new Uint8Array(aa),fa=new Uint8Array([1]);async function ga(e,t){const{keySize:r}=si(e);if(!N.isAES(e)||t.length!==r)throw Error("Unexpected algorithm or key size");let n=0;const i=jn(t,ya,{disablePadding:!0}),s=e=>i.encrypt(e),a=e=>i.decrypt(e);let o;function c(e,t,r,i){const a=t.length/aa|0;!function(e,t){const r=N.nbits(Math.max(e.length,t.length)/aa|0)-1;for(let e=n+1;e<=r;e++)o[e]=N.double(o[e-1]);n=r}(t,i);const c=N.concatUint8Array([ya.subarray(0,oa-r.length),fa,r]),u=63&c[aa-1];c[aa-1]&=192;const h=s(c),l=N.concatUint8Array([h,la(h.subarray(0,8),h.subarray(1,9))]),y=N.shiftRight(l.subarray(0+(u>>3),17+(u>>3)),8-(7&u)).subarray(1),f=new Uint8Array(aa),g=new Uint8Array(t.length+ca);let p,d=0;for(p=0;p<a;p++)ha(y,o[ua(p+1)]),g.set(ha(e(la(y,t)),y),d),ha(f,e===s?t:g.subarray(d)),t=t.subarray(aa),d+=aa;if(t.length){ha(y,o.x);const r=s(y);g.set(la(t,r),d);const n=new Uint8Array(aa);n.set(e===s?t:g.subarray(d,-ca),0),n[t.length]=128,ha(f,n),d+=t.length}const A=ha(s(ha(ha(f,y),o.$)),function(e){if(!e.length)return ya;const t=e.length/aa|0,r=new Uint8Array(aa),n=new Uint8Array(aa);for(let i=0;i<t;i++)ha(r,o[ua(i+1)]),ha(n,s(la(r,e))),e=e.subarray(aa);if(e.length){ha(r,o.x);const t=new Uint8Array(aa);t.set(e,0),t[e.length]=128,ha(t,r),ha(n,s(t))}return n}(i));return g.set(A,d),g}return function(){const e=s(ya),t=N.double(e);o=[],o[0]=N.double(t),o.x=e,o.$=t}(),{encrypt:async function(e,t,r){return c(s,e,t,r)},decrypt:async function(e,t,r){if(e.length<ca)throw Error("Invalid OCB ciphertext");const n=e.subarray(-ca);e=e.subarray(0,-ca);const i=c(a,e,t,r);if(N.equalsUint8Array(n,i.subarray(-ca)))return i.subarray(0,-ca);throw Error("Authentication tag mismatch")}}}ga.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[7+e]^=t[e];return r},ga.blockLength=aa,ga.ivLength=oa,ga.tagLength=ca;const pa=N.getWebCrypto(),da=N.getNodeCrypto(),Aa=N.getNodeBuffer(),wa=16,ma="AES-GCM";async function ba(e,t){if(e!==M.symmetric.aes128&&e!==M.symmetric.aes192&&e!==M.symmetric.aes256)throw Error("GCM mode supports only AES cipher");if(N.getNodeCrypto())return{encrypt:async function(e,r,n=new Uint8Array){const i=new da.createCipheriv("aes-"+8*t.length+"-gcm",t,r);i.setAAD(n);const s=Aa.concat([i.update(e),i.final(),i.getAuthTag()]);return new Uint8Array(s)},decrypt:async function(e,r,n=new Uint8Array){const i=new da.createDecipheriv("aes-"+8*t.length+"-gcm",t,r);i.setAAD(n),i.setAuthTag(e.slice(e.length-wa,e.length));const s=Aa.concat([i.update(e.slice(0,e.length-wa)),i.final()]);return new Uint8Array(s)}};if(N.getWebCrypto())try{const e=await pa.importKey("raw",t,{name:ma},!1,["encrypt","decrypt"]),r=navigator.userAgent.match(/Version\/13\.\d(\.\d)* Safari/)||navigator.userAgent.match(/Version\/(13|14)\.\d(\.\d)* Mobile\/\S* Safari/);return{encrypt:async function(n,i,s=new Uint8Array){if(r&&!n.length)return Yn(t,i,s).encrypt(n);const a=await pa.encrypt({name:ma,iv:i,additionalData:s,tagLength:8*wa},e,n);return new Uint8Array(a)},decrypt:async function(n,i,s=new Uint8Array){if(r&&n.length===wa)return Yn(t,i,s).decrypt(n);try{const t=await pa.decrypt({name:ma,iv:i,additionalData:s,tagLength:8*wa},e,n);return new Uint8Array(t)}catch(e){if("OperationError"===e.name)throw Error("Authentication tag mismatch")}}}}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;N.printDebugError("Browser did not support operation: "+e.message)}return{encrypt:async function(e,r,n){return Yn(t,r,n).encrypt(e)},decrypt:async function(e,r,n){return Yn(t,r,n).decrypt(e)}}}function ka(e,t=!1){switch(e){case M.aead.eax:return sa;case M.aead.ocb:return ga;case M.aead.gcm:return ba;case M.aead.experimentalGCM:if(!t)throw Error("Unexpected non-standard `experimentalGCM` AEAD algorithm provided in `config.preferredAEADAlgorithm`: use `gcm` instead");return ba;default:throw Error("Unsupported AEAD mode")}}async function Ea(e,t,r,n,i,s){switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:{const{n:e,e:t}=r;return{c:await je(i,e,t)}}case M.publicKey.elgamal:{const{p:e,g:t,y:n}=r;return async function(e,t,r,n){t=ie(t),r=ie(r),n=ie(n);const i=ie(Fe(e,ye(t))),s=de(Je,t-Je);return{c1:fe(ae(r,s,t)),c2:fe(se(ae(n,s,t)*i,t))}}(i,e,t,n)}case M.publicKey.ecdh:{const{oid:e,Q:t,kdfParams:n}=r,{publicKey:a,wrappedKey:o}=await Xi(e,n,i,t,s);return{V:a,C:new Es(o)}}case M.publicKey.x25519:case M.publicKey.x448:{if(t&&!N.isAES(t))throw Error("X25519 and X448 keys can only encrypt AES session keys");const{A:n}=r,{ephemeralPublicKey:s,wrappedKey:a}=await gi(e,i,n);return{ephemeralPublicKey:s,C:Us.fromObject({algorithm:t,wrappedKey:a})}}case M.publicKey.aead:{if(!n)throw Error("Cannot encrypt with symmetric key missing private parameters");const{cipher:e}=r,t=e.getValue(),{keyMaterial:s}=n,a=L.preferredAEADAlgorithm,o=ka(L.preferredAEADAlgorithm),{ivLength:c}=o,u=pe(c),h=await o(t,s),l=await h.encrypt(i,u,new Uint8Array);return{aeadMode:new Is(a),iv:u,c:new vs(l)}}case M.publicKey.pqc_mlkem_x25519:{const{eccPublicKey:n,mlkemPublicKey:s}=r,{eccCipherText:a,mlkemCipherText:o,wrappedKey:c}=await ys(e,n,s,i);return{eccCipherText:a,mlkemCipherText:o,C:Us.fromObject({algorithm:t,wrappedKey:c})}}default:return[]}}async function va(e,t,r,n,i,s){switch(e){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:{const{c:e}=n,{n:i,e:a}=t,{d:o,p:c,q:u,u:h}=r;return Ve(e,i,a,o,c,u,h,s)}case M.publicKey.elgamal:{const{c1:e,c2:i}=n;return async function(e,t,r,n,i){return e=ie(e),t=ie(t),r=ie(r),Ne(fe(se(ce(ae(e,n=ie(n),r),r)*t,r),"be",ye(r)),i)}(e,i,t.p,r.x,s)}case M.publicKey.ecdh:{const{oid:e,Q:s,kdfParams:a}=t,{d:o}=r,{V:c,C:u}=n;return es(e,a,c,u.data,s,o,i)}case M.publicKey.x25519:case M.publicKey.x448:{const{A:i}=t,{k:s}=r,{ephemeralPublicKey:a,C:o}=n;if(null!==o.algorithm&&!N.isAES(o.algorithm))throw Error("AES session key expected");return pi(e,a,o.wrappedKey,i,s)}case M.publicKey.aead:{const{cipher:e}=t,i=e.getValue(),{keyMaterial:s}=r,{aeadMode:a,iv:o,c}=n,u=ka(a.getValue());return(await u(i,s)).decrypt(c.data,o,new Uint8Array)}case M.publicKey.pqc_mlkem_x25519:{const{eccSecretKey:i,mlkemSecretKey:s}=r,{eccPublicKey:a,mlkemPublicKey:o}=t,{eccCipherText:c,mlkemCipherText:u,C:h}=n;return fs(e,c,u,i,a,s,o,h.wrappedKey)}default:throw Error("Unknown public key encryption algorithm.")}}async function Ba(e,t,r){let n=0;switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:{const e=N.readMPI(t.subarray(n));n+=e.length+2;const r=N.readMPI(t.subarray(n));n+=r.length+2;const i=N.readMPI(t.subarray(n));n+=i.length+2;const s=N.readMPI(t.subarray(n));return n+=s.length+2,{read:n,privateParams:{d:e,p:r,q:i,u:s}}}case M.publicKey.dsa:case M.publicKey.elgamal:{const e=N.readMPI(t.subarray(n));return n+=e.length+2,{read:n,privateParams:{x:e}}}case M.publicKey.ecdsa:case M.publicKey.ecdh:{const i=Da(e,r.oid);let s=N.readMPI(t.subarray(n));return n+=s.length+2,s=N.leftPad(s,i),{read:n,privateParams:{d:s}}}case M.publicKey.eddsaLegacy:{const i=Da(e,r.oid);if(r.oid.getName()!==M.curve.ed25519Legacy)throw Error("Unexpected OID for eddsaLegacy");let s=N.readMPI(t.subarray(n));return n+=s.length+2,s=N.leftPad(s,i),{read:n,privateParams:{seed:s}}}case M.publicKey.ed25519:case M.publicKey.ed448:{const r=Da(e),i=N.readExactSubarray(t,n,n+r);return n+=i.length,{read:n,privateParams:{seed:i}}}case M.publicKey.x25519:case M.publicKey.x448:{const r=Da(e),i=N.readExactSubarray(t,n,n+r);return n+=i.length,{read:n,privateParams:{k:i}}}case M.publicKey.hmac:{const{cipher:e}=r,i=Me(e.getValue()),s=t.subarray(n,n+32);n+=32;const a=t.subarray(n,n+i);return n+=i,{read:n,privateParams:{hashSeed:s,keyMaterial:a}}}case M.publicKey.aead:{const{cipher:e}=r,i=t.subarray(n,n+32);n+=32;const{keySize:s}=si(e.getValue()),a=t.subarray(n,n+s);return n+=s,{read:n,privateParams:{hashSeed:i,keyMaterial:a}}}case M.publicKey.pqc_mlkem_x25519:{const r=N.readExactSubarray(t,n,n+Da(M.publicKey.x25519));n+=r.length;const i=N.readExactSubarray(t,n,n+64);n+=i.length;const{mlkemSecretKey:s}=await hs(e,i);return{read:n,privateParams:{eccSecretKey:r,mlkemSecretKey:s,mlkemSeed:i}}}case M.publicKey.pqc_mldsa_ed25519:{const r=N.readExactSubarray(t,n,n+Da(M.publicKey.ed25519));n+=r.length;const i=N.readExactSubarray(t,n,n+32);n+=i.length;const{mldsaSecretKey:s}=await ds(e,i);return{read:n,privateParams:{eccSecretKey:r,mldsaSecretKey:s,mldsaSeed:i}}}default:throw new Jt("Unknown public key encryption algorithm.")}}function Sa(e,t){const r=new Set([M.publicKey.ed25519,M.publicKey.x25519,M.publicKey.ed448,M.publicKey.x448,M.publicKey.aead,M.publicKey.hmac,M.publicKey.pqc_mlkem_x25519,M.publicKey.pqc_mldsa_ed25519]),n={[M.publicKey.pqc_mlkem_x25519]:new Set(["mlkemSecretKey"]),[M.publicKey.pqc_mldsa_ed25519]:new Set(["mldsaSecretKey"])},i=Object.keys(t).map((i=>{if(n[e]?.has(i))return new Uint8Array;const s=t[i];return N.isUint8Array(s)?r.has(e)?s:N.uint8ArrayToMPI(s):s.write()}));return N.concatUint8Array(i)}async function Ia(e,t,r,n){switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:return async function(e,t){if(t=BigInt(t),N.getWebCrypto()){const r={name:"RSASSA-PKCS1-v1_5",modulusLength:e,publicExponent:fe(t),hash:{name:"SHA-1"}},n=await _e.generateKey(r,!0,["sign","verify"]);return We(await _e.exportKey("jwk",n.privateKey),t)}if(N.getNodeCrypto()){const r={modulusLength:e,publicExponent:ue(t),publicKeyEncoding:{type:"pkcs1",format:"jwk"},privateKeyEncoding:{type:"pkcs1",format:"jwk"}},n=await new Promise(((e,t)=>{He.generateKeyPair("rsa",r,((r,n,i)=>{r?t(r):e(i)}))}));return We(n,t)}let r,n,i;do{n=we(e-(e>>1),t,40),r=we(e>>1,t,40),i=r*n}while(le(i)!==e);const s=(r-ze)*(n-ze);return n<r&&([r,n]=[n,r]),{n:fe(i),e:fe(t),d:fe(ce(t,s)),p:fe(r),q:fe(n),u:fe(ce(r,n))}}(t,65537).then((({n:e,e:t,d:r,p:n,q:i,u:s})=>({privateParams:{d:r,p:n,q:i,u:s},publicParams:{n:e,e:t}})));case M.publicKey.ecdsa:return Ci(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{d:r},publicParams:{oid:new zt(e),Q:t}})));case M.publicKey.eddsaLegacy:return Ci(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{seed:r},publicParams:{oid:new zt(e),Q:t}})));case M.publicKey.ecdh:return Ci(r).then((({oid:e,Q:t,secret:r,hash:n,cipher:i})=>({privateParams:{d:r},publicParams:{oid:new zt(e),Q:t,kdfParams:new Bs({hash:n,cipher:i})}})));case M.publicKey.ed25519:case M.publicKey.ed448:return Gr(e).then((({A:e,seed:t})=>({privateParams:{seed:t},publicParams:{A:e}})));case M.publicKey.x25519:case M.publicKey.x448:return yi(e).then((({A:e,k:t})=>({privateParams:{k:t},publicParams:{A:e}})));case M.publicKey.hmac:return Ka(await async function(e){if(!os.has(e))throw Error("Unsupported hash algorithm.");const t=M.read(M.webHash,e),r=cs||us.webcrypto.subtle,n=await r.generateKey({name:"HMAC",hash:{name:t}},!0,["sign","verify"]),i=await r.exportKey("raw",n);return new Uint8Array(i)}(n),new Cs(n));case M.publicKey.aead:return Ka(Ua(n),new Ks(n));case M.publicKey.pqc_mlkem_x25519:return ls(e).then((({eccSecretKey:e,eccPublicKey:t,mlkemSeed:r,mlkemSecretKey:n,mlkemPublicKey:i})=>({privateParams:{eccSecretKey:e,mlkemSeed:r,mlkemSecretKey:n},publicParams:{eccPublicKey:t,mlkemPublicKey:i}})));case M.publicKey.pqc_mldsa_ed25519:return As(e).then((({eccSecretKey:e,eccPublicKey:t,mldsaSeed:r,mldsaSecretKey:n,mldsaPublicKey:i})=>({privateParams:{eccSecretKey:e,mldsaSeed:r,mldsaSecretKey:n},publicParams:{eccPublicKey:t,mldsaPublicKey:i}})));case M.publicKey.dsa:case M.publicKey.elgamal:throw Error("Unsupported algorithm for key generation.");default:throw Error("Unknown public key algorithm.")}}async function Ka(e,t){const r=pe(32);return{privateParams:{hashSeed:r,keyMaterial:e},publicParams:{cipher:t,digest:await Te(M.hash.sha256,r)}}}async function Ca(e,t,r){if(!t||!r)throw Error("Missing key parameters");switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:{const{n:e,e:n}=t,{d:i,p:s,q:a,u:o}=r;return async function(e,t,r,n,i,s){if(e=ie(e),(n=ie(n))*(i=ie(i))!==e)return!1;const a=BigInt(2);if(se(n*(s=ie(s)),i)!==BigInt(1))return!1;t=ie(t),r=ie(r);const o=de(a,a<<BigInt(Math.floor(le(e)/3))),c=o*r*t;return!(se(c,n-ze)!==o||se(c,i-ze)!==o)}(e,n,i,s,a,o)}case M.publicKey.dsa:{const{p:e,q:n,g:i,y:s}=t,{x:a}=r;return async function(e,t,r,n,i){if(e=ie(e),t=ie(t),r=ie(r),n=ie(n),r<=as||r>=e)return!1;if(se(e-as,t)!==ss)return!1;if(ae(r,t,e)!==as)return!1;const s=BigInt(le(t));if(s<BigInt(150)||!me(t,null,32))return!1;i=ie(i);const a=BigInt(2);return n===ae(r,t*de(a<<s-as,a<<s)+i,e)}(e,n,i,s,a)}case M.publicKey.elgamal:{const{p:e,g:n,y:i}=t,{x:s}=r;return async function(e,t,r,n){if(e=ie(e),t=ie(t),r=ie(r),t<=Je||t>=e)return!1;const i=BigInt(le(e));if(i<BigInt(1023))return!1;if(ae(t,e-Je,e)!==Je)return!1;let s=t,a=BigInt(1);const o=BigInt(2),c=o<<BigInt(17);for(;a<c;){if(s=se(s*t,e),s===Je)return!1;a++}n=ie(n);const u=de(o<<i-Je,o<<i);return r===ae(t,(e-Je)*u+n,e)}(e,n,i,s)}case M.publicKey.ecdsa:case M.publicKey.ecdh:{const n=is[M.read(M.publicKey,e)],{oid:i,Q:s}=t,{d:a}=r;return n.validateParams(i,s,a)}case M.publicKey.eddsaLegacy:{const{Q:e,oid:n}=t,{seed:i}=r;return Gi(n,e,i)}case M.publicKey.ed25519:case M.publicKey.ed448:{const{A:n}=t,{seed:i}=r;return Vr(e,n,i)}case M.publicKey.x25519:case M.publicKey.x448:{const{A:n}=t,{k:i}=r;return fi(e,n,i)}case M.publicKey.hmac:{const{cipher:e,digest:n}=t,{hashSeed:i,keyMaterial:s}=r;return Me(e.getValue())===s.length&&N.equalsUint8Array(n,await Te(M.hash.sha256,i))}case M.publicKey.aead:{const{cipher:e,digest:n}=t,{hashSeed:i,keyMaterial:s}=r,{keySize:a}=si(e.getValue());return a===s.length&&N.equalsUint8Array(n,await Te(M.hash.sha256,i))}case M.publicKey.pqc_mlkem_x25519:{const{eccSecretKey:n,mlkemSeed:i}=r,{eccPublicKey:s,mlkemPublicKey:a}=t;return ps(e,s,n,a,i)}case M.publicKey.pqc_mldsa_ed25519:{const{eccSecretKey:n,mldsaSeed:i}=r,{eccPublicKey:s,mldsaPublicKey:a}=t;return ks(e,s,n,a,i)}default:throw Error("Unknown public key algorithm.")}}function Ua(e){const{keySize:t}=si(e);return pe(t)}function Pa(e){try{e.getName()}catch(e){throw new Jt("Unknown curve OID")}}function Da(e,t){switch(e){case M.publicKey.ecdsa:case M.publicKey.ecdh:case M.publicKey.eddsaLegacy:return new Ki(t).payloadSize;case M.publicKey.ed25519:case M.publicKey.ed448:return Yr(e);case M.publicKey.x25519:case M.publicKey.x448:return di(e);default:throw Error("Unknown elliptic algo")}}async function xa(e,t,r,n,i,s,a){switch(e){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.rsaSign:{const{n:e,e:i}=n;return qe(t,s,N.leftPad(r.s,e.length),e,i,a)}case M.publicKey.dsa:{const{g:e,p:t,q:i,y:s}=n,{r:o,s:c}=r;return async function(e,t,r,n,i,s,a,o){if(t=ie(t),r=ie(r),s=ie(s),a=ie(a),i=ie(i),o=ie(o),t<=ss||t>=a||r<=ss||r>=a)return N.printDebug("invalid DSA Signature"),!1;const c=se(ie(n.subarray(0,ye(a))),a),u=ce(r,a);if(u===ss)return N.printDebug("invalid DSA Signature"),!1;i=se(i,s),o=se(o,s);const h=se(c*u,a),l=se(t*u,a);return se(se(ae(i,h,s)*ae(o,l,s),s),a)===t}(0,o,c,a,e,t,i,s)}case M.publicKey.ecdsa:{const{oid:e,Q:i}=n,o=new Ki(e).payloadSize;return Ni(e,t,{r:N.leftPad(r.r,o),s:N.leftPad(r.s,o)},s,i,a)}case M.publicKey.eddsaLegacy:{const{oid:e,Q:i}=n,s=new Ki(e).payloadSize;return zi(e,t,{r:N.leftPad(r.r,s),s:N.leftPad(r.s,s)},0,i,a)}case M.publicKey.ed25519:case M.publicKey.ed448:{const{A:i}=n;return jr(e,t,r,0,i,a)}case M.publicKey.hmac:{if(!i)throw Error("Cannot verify HMAC signature with symmetric key missing private parameters");const{cipher:e}=n,{keyMaterial:t}=i;return async function(e,t,r,n){if(!os.has(e))throw Error("Unsupported hash algorithm.");const i=M.read(M.webHash,e),s=cs||us.webcrypto.subtle,a=await s.importKey("raw",t,{name:"HMAC",hash:{name:i}},!1,["verify"]);return s.verify("HMAC",a,r,n)}(e.getValue(),t,r.mac.data,a)}case M.publicKey.pqc_mldsa_ed25519:{const{eccPublicKey:i,mldsaPublicKey:s}=n;return ms(e,t,i,s,a,r)}default:throw Error("Unknown signature algorithm.")}}async function Qa(e,t,r,n,i,s){if(!r||!n)throw Error("Missing key parameters");switch(e){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.rsaSign:{const{n:e,e:a}=r,{d:o,p:c,q:u,u:h}=n;return{s:await Ge(t,i,e,a,o,c,u,h,s)}}case M.publicKey.dsa:{const{g:e,p:t,q:i}=r,{x:a}=n;return async function(e,t,r,n,i,s){const a=BigInt(0);let o,c,u,h;n=ie(n),i=ie(i),r=ie(r),s=ie(s),r=se(r,n),s=se(s,i);const l=se(ie(t.subarray(0,ye(i))),i);for(;;){if(o=de(as,i),c=se(ae(r,o,n),i),c===a)continue;const e=se(s*c,i);if(h=se(l+e,i),u=se(ce(o,i)*h,i),u!==a)break}return{r:fe(c,"be",ye(n)),s:fe(u,"be",ye(n))}}(0,s,e,t,i,a)}case M.publicKey.elgamal:throw Error("Signing with Elgamal is not defined in the OpenPGP standard.");case M.publicKey.ecdsa:{const{oid:e,Q:a}=r,{d:o}=n;return Fi(e,t,i,a,o,s)}case M.publicKey.eddsaLegacy:{const{oid:e,Q:i}=r,{seed:a}=n;return Hi(e,t,0,i,a,s)}case M.publicKey.ed25519:case M.publicKey.ed448:{const{A:i}=r,{seed:a}=n;return qr(e,t,0,i,a,s)}case M.publicKey.hmac:{const{cipher:e}=r,{keyMaterial:t}=n,i=await async function(e,t,r){if(!os.has(e))throw Error("Unsupported hash algorithm.");const n=M.read(M.webHash,e),i=cs||us.webcrypto.subtle,s=await i.importKey("raw",t,{name:"HMAC",hash:{name:n}},!1,["sign"]),a=await i.sign("HMAC",s,r);return new Uint8Array(a)}(e.getValue(),t,s);return{mac:new vs(i)}}case M.publicKey.pqc_mldsa_ed25519:{const{eccPublicKey:i}=r,{eccSecretKey:a,mldsaSecretKey:o}=n;return ws(e,t,a,i,o,s)}default:throw Error("Unknown signature algorithm.")}}ba.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[4+e]^=t[e];return r},ba.blockLength=16,ba.ivLength=12,ba.tagLength=wa;class Ra extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Ra),this.name="Argon2OutOfMemoryError"}}let Ta,Ma,La=2<<19;class Fa{static get ARGON2_WASM_MEMORY_THRESHOLD_RELOAD(){return La}static set ARGON2_WASM_MEMORY_THRESHOLD_RELOAD(e){La=e}static reloadWasmModule(){Ta&&(Ma=Ta(),Ma.catch((()=>{})))}constructor(e=L){const{passes:t,parallelism:r,memoryExponent:n}=e.s2kArgon2Params;this.type="argon2",this.salt=null,this.t=t,this.p=r,this.encodedM=n}generateSalt(){this.salt=pe(16)}read(e){let t=0;return this.salt=e.subarray(t,t+16),t+=16,this.t=e[t++],this.p=e[t++],this.encodedM=e[t++],t}write(){const e=[new Uint8Array([M.write(M.s2k,this.type)]),this.salt,new Uint8Array([this.t,this.p,this.encodedM])];return N.concatUint8Array(e)}async produceKey(e,t){const r=2<<this.encodedM-1;try{Ta=Ta||(await Promise.resolve().then((function(){return vp}))).default,Ma=Ma||Ta();const n=await Ma,i=n({version:19,type:2,password:N.encodeUTF8(e),salt:this.salt,tagLength:t,memorySize:r,parallelism:this.p,passes:this.t});return r>Fa.ARGON2_WASM_MEMORY_THRESHOLD_RELOAD&&Fa.reloadWasmModule(),i}catch(e){throw e.message&&(e.message.includes("Unable to grow instance memory")||e.message.includes("failed to grow memory")||e.message.includes("WebAssembly.Memory.grow")||e.message.includes("Out of memory"))?new Ra("Could not allocate required memory for Argon2"):e}}}class Na{constructor(e,t=L){this.algorithm=M.hash.sha256,this.type=M.read(M.s2k,e),this.c=t.s2kIterationCountByte,this.salt=null}generateSalt(){switch(this.type){case"salted":case"iterated":this.salt=pe(8)}}getCount(){return 16+(15&this.c)<<6+(this.c>>4)}read(e){let t=0;switch(this.algorithm=e[t++],this.type){case"simple":break;case"salted":this.salt=e.subarray(t,t+8),t+=8;break;case"iterated":this.salt=e.subarray(t,t+8),t+=8,this.c=e[t++];break;case"gnu":if("GNU"!==N.uint8ArrayToString(e.subarray(t,t+3)))throw new Jt("Unknown s2k type.");t+=3;if(1001!==1e3+e[t++])throw new Jt("Unknown s2k gnu protection mode.");this.type="gnu-dummy";break;default:throw new Jt("Unknown s2k type.")}return t}write(){if("gnu-dummy"===this.type)return new Uint8Array([101,0,...N.stringToUint8Array("GNU"),1]);const e=[new Uint8Array([M.write(M.s2k,this.type),this.algorithm])];switch(this.type){case"simple":break;case"salted":e.push(this.salt);break;case"iterated":e.push(this.salt),e.push(new Uint8Array([this.c]));break;case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}return N.concatUint8Array(e)}async produceKey(e,t){e=N.encodeUTF8(e);const r=[];let n=0,i=0;for(;n<t;){let t;switch(this.type){case"simple":t=N.concatUint8Array([new Uint8Array(i),e]);break;case"salted":t=N.concatUint8Array([new Uint8Array(i),this.salt,e]);break;case"iterated":{const r=N.concatUint8Array([this.salt,e]);let n=r.length;const s=Math.max(this.getCount(),n);t=new Uint8Array(i+s),t.set(r,i);for(let e=i+n;e<s;e+=n,n*=2)t.copyWithin(e,i,e);break}case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}const s=await Te(this.algorithm,t);r.push(s),n+=s.length,i++}return N.concatUint8Array(r).subarray(0,t)}}const Oa=new Set([M.s2k.argon2,M.s2k.iterated]);function _a(e,t=L){switch(e){case M.s2k.argon2:return new Fa(t);case M.s2k.iterated:case M.s2k.gnu:case M.s2k.salted:case M.s2k.simple:return new Na(e,t);default:throw new Jt("Unsupported S2K type")}}function Ha(e){const{s2kType:t}=e;if(!Oa.has(t))throw Error("The provided `config.s2kType` value is not allowed");return _a(t,e)}var za=t("/");try{za("worker_threads").Worker}catch(e){}var Ga=Uint8Array,qa=Uint16Array,ja=Uint32Array,Va=new Ga([0,0,0,0,0,0,0,0,1,1,1,1,2,2,2,2,3,3,3,3,4,4,4,4,5,5,5,5,0,0,0,0]),Ya=new Ga([0,0,0,0,1,1,2,2,3,3,4,4,5,5,6,6,7,7,8,8,9,9,10,10,11,11,12,12,13,13,0,0]),Za=new Ga([16,17,18,0,8,7,9,6,10,5,11,4,12,3,13,2,14,1,15]),Wa=function(e,t){for(var r=new qa(31),n=0;n<31;++n)r[n]=t+=1<<e[n-1];var i=new ja(r[30]);for(n=1;n<30;++n)for(var s=r[n];s<r[n+1];++s)i[s]=s-r[n]<<5|n;return[r,i]},Ja=Wa(Va,2),Xa=Ja[0],$a=Ja[1];Xa[28]=258,$a[258]=28;for(var eo=Wa(Ya,0),to=eo[0],ro=eo[1],no=new qa(32768),io=0;io<32768;++io){var so=(43690&io)>>>1|(21845&io)<<1;so=(61680&(so=(52428&so)>>>2|(13107&so)<<2))>>>4|(3855&so)<<4,no[io]=((65280&so)>>>8|(255&so)<<8)>>>1}var ao=function(e,t,r){for(var n=e.length,i=0,s=new qa(t);i<n;++i)e[i]&&++s[e[i]-1];var a,o=new qa(t);for(i=0;i<t;++i)o[i]=o[i-1]+s[i-1]<<1;if(r){a=new qa(1<<t);var c=15-t;for(i=0;i<n;++i)if(e[i])for(var u=i<<4|e[i],h=t-e[i],l=o[e[i]-1]++<<h,y=l|(1<<h)-1;l<=y;++l)a[no[l]>>>c]=u}else for(a=new qa(n),i=0;i<n;++i)e[i]&&(a[i]=no[o[e[i]-1]++]>>>15-e[i]);return a},oo=new Ga(288);for(io=0;io<144;++io)oo[io]=8;for(io=144;io<256;++io)oo[io]=9;for(io=256;io<280;++io)oo[io]=7;for(io=280;io<288;++io)oo[io]=8;var co=new Ga(32);for(io=0;io<32;++io)co[io]=5;var uo=/*#__PURE__*/ao(oo,9,0),ho=/*#__PURE__*/ao(oo,9,1),lo=/*#__PURE__*/ao(co,5,0),yo=/*#__PURE__*/ao(co,5,1),fo=function(e){for(var t=e[0],r=1;r<e.length;++r)e[r]>t&&(t=e[r]);return t},go=function(e,t,r){var n=t/8|0;return(e[n]|e[n+1]<<8)>>(7&t)&r},po=function(e,t){var r=t/8|0;return(e[r]|e[r+1]<<8|e[r+2]<<16)>>(7&t)},Ao=function(e){return(e+7)/8|0},wo=function(e,t,r){(null==t||t<0)&&(t=0),(null==r||r>e.length)&&(r=e.length);var n=new(2==e.BYTES_PER_ELEMENT?qa:4==e.BYTES_PER_ELEMENT?ja:Ga)(r-t);return n.set(e.subarray(t,r)),n},mo=["unexpected EOF","invalid block type","invalid length/literal","invalid distance","stream finished","no stream handler",,"no callback","invalid UTF-8 data","extra field too long","date not in range 1980-2099","filename too long","stream finishing","invalid zip data"],bo=function(e,t,r){var n=Error(t||mo[e]);if(n.code=e,Error.captureStackTrace&&Error.captureStackTrace(n,bo),!r)throw n;return n},ko=function(e,t,r){r<<=7&t;var n=t/8|0;e[n]|=r,e[n+1]|=r>>>8},Eo=function(e,t,r){r<<=7&t;var n=t/8|0;e[n]|=r,e[n+1]|=r>>>8,e[n+2]|=r>>>16},vo=function(e,t){for(var r=[],n=0;n<e.length;++n)e[n]&&r.push({s:n,f:e[n]});var i=r.length,s=r.slice();if(!i)return[Po,0];if(1==i){var a=new Ga(r[0].s+1);return a[r[0].s]=1,[a,1]}r.sort((function(e,t){return e.f-t.f})),r.push({s:-1,f:25001});var o=r[0],c=r[1],u=0,h=1,l=2;for(r[0]={s:-1,f:o.f+c.f,l:o,r:c};h!=i-1;)o=r[r[u].f<r[l].f?u++:l++],c=r[u!=h&&r[u].f<r[l].f?u++:l++],r[h++]={s:-1,f:o.f+c.f,l:o,r:c};var y=s[0].s;for(n=1;n<i;++n)s[n].s>y&&(y=s[n].s);var f=new qa(y+1),g=Bo(r[h-1],f,0);if(g>t){n=0;var p=0,d=g-t,A=1<<d;for(s.sort((function(e,t){return f[t.s]-f[e.s]||e.f-t.f}));n<i;++n){var w=s[n].s;if(!(f[w]>t))break;p+=A-(1<<g-f[w]),f[w]=t}for(p>>>=d;p>0;){var m=s[n].s;f[m]<t?p-=1<<t-f[m]++-1:++n}for(;n>=0&&p;--n){var b=s[n].s;f[b]==t&&(--f[b],++p)}g=t}return[new Ga(f),g]},Bo=function(e,t,r){return-1==e.s?Math.max(Bo(e.l,t,r+1),Bo(e.r,t,r+1)):t[e.s]=r},So=function(e){for(var t=e.length;t&&!e[--t];);for(var r=new qa(++t),n=0,i=e[0],s=1,a=function(e){r[n++]=e},o=1;o<=t;++o)if(e[o]==i&&o!=t)++s;else{if(!i&&s>2){for(;s>138;s-=138)a(32754);s>2&&(a(s>10?s-11<<5|28690:s-3<<5|12305),s=0)}else if(s>3){for(a(i),--s;s>6;s-=6)a(8304);s>2&&(a(s-3<<5|8208),s=0)}for(;s--;)a(i);s=1,i=e[o]}return[r.subarray(0,n),t]},Io=function(e,t){for(var r=0,n=0;n<t.length;++n)r+=e[n]*t[n];return r},Ko=function(e,t,r){var n=r.length,i=Ao(t+2);e[i]=255&n,e[i+1]=n>>>8,e[i+2]=255^e[i],e[i+3]=255^e[i+1];for(var s=0;s<n;++s)e[i+s+4]=r[s];return 8*(i+4+n)},Co=function(e,t,r,n,i,s,a,o,c,u,h){ko(t,h++,r),++i[256];for(var l=vo(i,15),y=l[0],f=l[1],g=vo(s,15),p=g[0],d=g[1],A=So(y),w=A[0],m=A[1],b=So(p),k=b[0],E=b[1],v=new qa(19),B=0;B<w.length;++B)v[31&w[B]]++;for(B=0;B<k.length;++B)v[31&k[B]]++;for(var S=vo(v,7),I=S[0],K=S[1],C=19;C>4&&!I[Za[C-1]];--C);var U,P,D,x,Q=u+5<<3,R=Io(i,oo)+Io(s,co)+a,T=Io(i,y)+Io(s,p)+a+14+3*C+Io(v,I)+(2*v[16]+3*v[17]+7*v[18]);if(Q<=R&&Q<=T)return Ko(t,h,e.subarray(c,c+u));if(ko(t,h,1+(T<R)),h+=2,T<R){U=ao(y,f,0),P=y,D=ao(p,d,0),x=p;var M=ao(I,K,0);ko(t,h,m-257),ko(t,h+5,E-1),ko(t,h+10,C-4),h+=14;for(B=0;B<C;++B)ko(t,h+3*B,I[Za[B]]);h+=3*C;for(var L=[w,k],F=0;F<2;++F){var N=L[F];for(B=0;B<N.length;++B){var O=31&N[B];ko(t,h,M[O]),h+=I[O],O>15&&(ko(t,h,N[B]>>>5&127),h+=N[B]>>>12)}}}else U=uo,P=oo,D=lo,x=co;for(B=0;B<o;++B)if(n[B]>255){O=n[B]>>>18&31;Eo(t,h,U[O+257]),h+=P[O+257],O>7&&(ko(t,h,n[B]>>>23&31),h+=Va[O]);var _=31&n[B];Eo(t,h,D[_]),h+=x[_],_>3&&(Eo(t,h,n[B]>>>5&8191),h+=Ya[_])}else Eo(t,h,U[n[B]]),h+=P[n[B]];return Eo(t,h,U[256]),h+P[256]},Uo=/*#__PURE__*/new ja([65540,131080,131088,131104,262176,1048704,1048832,2114560,2117632]),Po=/*#__PURE__*/new Ga(0),Do=function(e,t,r,n,i){return function(e,t,r,n,i,s){var a=e.length,o=new Ga(n+a+5*(1+Math.ceil(a/7e3))+i),c=o.subarray(n,o.length-i),u=0;if(!t||a<8)for(var h=0;h<=a;h+=65535){var l=h+65535;l>=a&&(c[u>>3]=s),u=Ko(c,u+1,e.subarray(h,l))}else{for(var y=Uo[t-1],f=y>>>13,g=8191&y,p=(1<<r)-1,d=new qa(32768),A=new qa(p+1),w=Math.ceil(r/3),m=2*w,b=function(t){return(e[t]^e[t+1]<<w^e[t+2]<<m)&p},k=new ja(25e3),E=new qa(288),v=new qa(32),B=0,S=0,I=(h=0,0),K=0,C=0;h<a;++h){var U=b(h),P=32767&h,D=A[U];if(d[P]=D,A[U]=P,K<=h){var x=a-h;if((B>7e3||I>24576)&&x>423){u=Co(e,c,0,k,E,v,S,I,C,h-C,u),I=B=S=0,C=h;for(var Q=0;Q<286;++Q)E[Q]=0;for(Q=0;Q<30;++Q)v[Q]=0}var R=2,T=0,M=g,L=P-D&32767;if(x>2&&U==b(h-L))for(var F=Math.min(f,x)-1,N=Math.min(32767,h),O=Math.min(258,x);L<=N&&--M&&P!=D;){if(e[h+R]==e[h+R-L]){for(var _=0;_<O&&e[h+_]==e[h+_-L];++_);if(_>R){if(R=_,T=L,_>F)break;var H=Math.min(L,_-2),z=0;for(Q=0;Q<H;++Q){var G=h-L+Q+32768&32767,q=G-d[G]+32768&32767;q>z&&(z=q,D=G)}}}L+=(P=D)-(D=d[P])+32768&32767}if(T){k[I++]=268435456|$a[R]<<18|ro[T];var j=31&$a[R],V=31&ro[T];S+=Va[j]+Ya[V],++E[257+j],++v[V],K=h+R,++B}else k[I++]=e[h],++E[e[h]]}}u=Co(e,c,s,k,E,v,S,I,C,h-C,u),!s&&7&u&&(u=Ko(c,u+1,Po))}return wo(o,0,n+Ao(u)+i)}(e,null==t.level?6:t.level,null==t.mem?Math.ceil(1.5*Math.max(8,Math.min(13,Math.log(e.length)))):12+t.mem,r,n,!i)},xo=/*#__PURE__*/function(){function e(e,t){t||"function"!=typeof e||(t=e,e={}),this.ondata=t,this.o=e||{}}return e.prototype.p=function(e,t){this.ondata(Do(e,this.o,0,0,!t),t)},e.prototype.push=function(e,t){this.ondata||bo(5),this.d&&bo(4),this.d=t,this.p(e,t||!1)},e}(),Qo=/*#__PURE__*/function(){function e(e){this.s={},this.p=new Ga(0),this.ondata=e}return e.prototype.e=function(e){this.ondata||bo(5),this.d&&bo(4);var t=this.p.length,r=new Ga(t+e.length);r.set(this.p),r.set(e,t),this.p=r},e.prototype.c=function(e){this.d=this.s.i=e||!1;var t=this.s.b,r=function(e,t,r){var n=e.length;if(!n||r&&r.f&&!r.l)return t||new Ga(0);var i=!t||r,s=!r||r.i;r||(r={}),t||(t=new Ga(3*n));var a=function(e){var r=t.length;if(e>r){var n=new Ga(Math.max(2*r,e));n.set(t),t=n}},o=r.f||0,c=r.p||0,u=r.b||0,h=r.l,l=r.d,y=r.m,f=r.n,g=8*n;do{if(!h){o=go(e,c,1);var p=go(e,c+1,3);if(c+=3,!p){var d=e[(K=Ao(c)+4)-4]|e[K-3]<<8,A=K+d;if(A>n){s&&bo(0);break}i&&a(u+d),t.set(e.subarray(K,A),u),r.b=u+=d,r.p=c=8*A,r.f=o;continue}if(1==p)h=ho,l=yo,y=9,f=5;else if(2==p){var w=go(e,c,31)+257,m=go(e,c+10,15)+4,b=w+go(e,c+5,31)+1;c+=14;for(var k=new Ga(b),E=new Ga(19),v=0;v<m;++v)E[Za[v]]=go(e,c+3*v,7);c+=3*m;var B=fo(E),S=(1<<B)-1,I=ao(E,B,1);for(v=0;v<b;){var K,C=I[go(e,c,S)];if(c+=15&C,(K=C>>>4)<16)k[v++]=K;else{var U=0,P=0;for(16==K?(P=3+go(e,c,3),c+=2,U=k[v-1]):17==K?(P=3+go(e,c,7),c+=3):18==K&&(P=11+go(e,c,127),c+=7);P--;)k[v++]=U}}var D=k.subarray(0,w),x=k.subarray(w);y=fo(D),f=fo(x),h=ao(D,y,1),l=ao(x,f,1)}else bo(1);if(c>g){s&&bo(0);break}}i&&a(u+131072);for(var Q=(1<<y)-1,R=(1<<f)-1,T=c;;T=c){var M=(U=h[po(e,c)&Q])>>>4;if((c+=15&U)>g){s&&bo(0);break}if(U||bo(2),M<256)t[u++]=M;else{if(256==M){T=c,h=null;break}var L=M-254;if(M>264){var F=Va[v=M-257];L=go(e,c,(1<<F)-1)+Xa[v],c+=F}var N=l[po(e,c)&R],O=N>>>4;if(N||bo(3),c+=15&N,x=to[O],O>3&&(F=Ya[O],x+=po(e,c)&(1<<F)-1,c+=F),c>g){s&&bo(0);break}i&&a(u+131072);for(var _=u+L;u<_;u+=4)t[u]=t[u-x],t[u+1]=t[u+1-x],t[u+2]=t[u+2-x],t[u+3]=t[u+3-x];u=_}}r.l=h,r.p=T,r.b=u,r.f=o,h&&(o=1,r.m=y,r.d=l,r.n=f)}while(!o);return u==t.length?t:wo(t,0,u)}(this.p,this.o,this.s);this.ondata(wo(r,t,this.s.b),this.d),this.o=wo(r,this.s.b-32768),this.s.b=this.o.length,this.p=wo(this.p,this.s.p/8|0),this.s.p&=7},e.prototype.push=function(e,t){this.e(e),this.c(t)},e}(),Ro=/*#__PURE__*/function(){function e(e,t){var r,n;this.c=(r=1,n=0,{p:function(e){for(var t=r,i=n,s=0|e.length,a=0;a!=s;){for(var o=Math.min(a+2655,s);a<o;++a)i+=t+=e[a];t=(65535&t)+15*(t>>16),i=(65535&i)+15*(i>>16)}r=t,n=i},d:function(){return(255&(r%=65521))<<24|r>>>8<<16|(255&(n%=65521))<<8|n>>>8}}),this.v=1,xo.call(this,e,t)}return e.prototype.push=function(e,t){xo.prototype.push.call(this,e,t)},e.prototype.p=function(e,t){this.c.p(e);var r=Do(e,this.o,this.v&&2,t&&4,!t);this.v&&(function(e,t){var r=t.level,n=0==r?0:r<6?1:9==r?3:2;e[0]=120,e[1]=n<<6|(n?32-2*n:1)}(r,this.o),this.v=0),t&&function(e,t,r){for(;r;++t)e[t]=r,r>>>=8}(r,r.length-4,this.c.d()),this.ondata(r,t)},e}(),To=/*#__PURE__*/function(){function e(e){this.v=1,Qo.call(this,e)}return e.prototype.push=function(e,t){if(Qo.prototype.e.call(this,e),this.v){if(this.p.length<2&&!t)return;this.p=this.p.subarray(2),this.v=0}t&&(this.p.length<4&&bo(6,"invalid zlib data"),this.p=this.p.subarray(0,-4)),Qo.prototype.c.call(this,t)},e}(),Mo="undefined"!=typeof TextDecoder&&/*#__PURE__*/new TextDecoder;try{Mo.decode(Po,{stream:!0}),1}catch(e){}class Lo{static get tag(){return M.packet.literalData}constructor(e=new Date){this.format=M.literal.utf8,this.date=N.normalizeDate(e),this.text=null,this.data=null,this.filename=""}setText(e,t=M.literal.utf8){this.format=t,this.text=e,this.data=null}getText(e=!1){return(null===this.text||N.isStream(this.text))&&(this.text=N.decodeUTF8(N.nativeEOL(this.getBytes(e)))),this.text}setBytes(e,t){this.format=t,this.data=e,this.text=null}getBytes(e=!1){return null===this.data&&(this.data=N.canonicalizeEOL(N.encodeUTF8(this.text))),e?K(this.data):this.data}setFilename(e){this.filename=e}getFilename(){return this.filename}async read(e){await S(e,(async e=>{const t=await e.readByte(),r=await e.readByte();this.filename=N.decodeUTF8(await e.readBytes(r)),this.date=N.readDate(await e.readBytes(4));let n=e.remainder();u(n)&&(n=await P(n)),this.setBytes(n,t)}))}writeHeader(){const e=N.encodeUTF8(this.filename),t=new Uint8Array([e.length]),r=new Uint8Array([this.format]),n=N.writeDate(this.date);return N.concatUint8Array([r,t,e,n])}write(){const e=this.writeHeader(),t=this.getBytes();return N.concat([e,t])}}class Fo{constructor(){this.bytes=""}read(e){return this.bytes=N.uint8ArrayToString(e.subarray(0,8)),this.bytes.length}write(){return N.stringToUint8Array(this.bytes)}toHex(){return N.uint8ArrayToHex(N.stringToUint8Array(this.bytes))}equals(e,t=!1){return t&&(e.isWildcard()||this.isWildcard())||this.bytes===e.bytes}isNull(){return""===this.bytes}isWildcard(){return/^0+$/.test(this.toHex())}static mapToHex(e){return e.toHex()}static fromID(e){const t=new Fo;return t.read(N.hexToUint8Array(e)),t}static wildcard(){const e=new Fo;return e.read(new Uint8Array(8)),e}}const No=Symbol("verified"),Oo="salt@notations.openpgpjs.org",_o=new Set([M.signatureSubpacket.issuerKeyID,M.signatureSubpacket.issuerFingerprint,M.signatureSubpacket.embeddedSignature]);class Ho{static get tag(){return M.packet.signature}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.signatureData=null,this.unhashedSubpackets=[],this.unknownSubpackets=[],this.signedHashValue=null,this.salt=null,this.created=null,this.signatureExpirationTime=null,this.signatureNeverExpires=!0,this.exportable=null,this.trustLevel=null,this.trustAmount=null,this.regularExpression=null,this.revocable=null,this.keyExpirationTime=null,this.keyNeverExpires=null,this.preferredSymmetricAlgorithms=null,this.revocationKeyClass=null,this.revocationKeyAlgorithm=null,this.revocationKeyFingerprint=null,this.issuerKeyID=new Fo,this.rawNotations=[],this.notations={},this.preferredHashAlgorithms=null,this.preferredCompressionAlgorithms=null,this.keyServerPreferences=null,this.preferredKeyServer=null,this.isPrimaryUserID=null,this.policyURI=null,this.keyFlags=null,this.signersUserID=null,this.reasonForRevocationFlag=null,this.reasonForRevocationString=null,this.features=null,this.signatureTargetPublicKeyAlgorithm=null,this.signatureTargetHashAlgorithm=null,this.signatureTargetHash=null,this.embeddedSignature=null,this.issuerKeyVersion=null,this.issuerFingerprint=null,this.preferredAEADAlgorithms=null,this.preferredCipherSuites=null,this.revoked=null,this[No]=null}read(e,t=L){let r=0;if(this.version=e[r++],5===this.version&&!t.enableParsingV5Entities)throw new Jt("Support for v5 entities is disabled; turn on `config.enableParsingV5Entities` if needed");if(4!==this.version&&5!==this.version&&6!==this.version)throw new Jt(`Version ${this.version} of the signature packet is unsupported.`);if(this.signatureType=e[r++],this.publicKeyAlgorithm=e[r++],this.hashAlgorithm=e[r++],r+=this.readSubPackets(e.subarray(r,e.length),!0),!this.created)throw Error("Missing signature creation time subpacket.");if(this.signatureData=e.subarray(0,r),r+=this.readSubPackets(e.subarray(r,e.length),!1),this.signedHashValue=e.subarray(r,r+2),r+=2,6===this.version){const t=e[r++];this.salt=e.subarray(r,r+t),r+=t}const n=e.subarray(r,e.length),{read:i,signatureParams:s}=function(e,t){let r=0;switch(e){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.rsaSign:{const e=N.readMPI(t.subarray(r));return r+=e.length+2,{read:r,signatureParams:{s:e}}}case M.publicKey.dsa:case M.publicKey.ecdsa:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const n=N.readMPI(t.subarray(r));return r+=n.length+2,{read:r,signatureParams:{r:e,s:n}}}case M.publicKey.eddsaLegacy:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const n=N.readMPI(t.subarray(r));return r+=n.length+2,{read:r,signatureParams:{r:e,s:n}}}case M.publicKey.ed25519:case M.publicKey.ed448:{const n=2*Yr(e),i=N.readExactSubarray(t,r,r+n);return r+=i.length,{read:r,signatureParams:{RS:i}}}case M.publicKey.hmac:{const e=new vs;return r+=e.read(t.subarray(r)),{read:r,signatureParams:{mac:e}}}case M.publicKey.pqc_mldsa_ed25519:{const e=2*Yr(M.publicKey.ed25519),n=N.readExactSubarray(t,r,r+e);r+=n.length;const i=N.readExactSubarray(t,r,r+3309);return r+=i.length,{read:r,signatureParams:{eccSignature:n,mldsaSignature:i}}}default:throw new Jt("Unknown signature algorithm.")}}(this.publicKeyAlgorithm,n);if(i<n.length)throw Error("Error reading MPIs");this.params=s}writeParams(){return this.params instanceof Promise?x((async()=>Sa(this.publicKeyAlgorithm,await this.params))):Sa(this.publicKeyAlgorithm,this.params)}write(){const e=[];return e.push(this.signatureData),e.push(this.writeUnhashedSubPackets()),e.push(this.signedHashValue),6===this.version&&(e.push(new Uint8Array([this.salt.length])),e.push(this.salt)),e.push(this.writeParams()),N.concat(e)}async sign(e,t,r=new Date,n=!1,i){this.version=e.version,this.created=N.normalizeDate(r),this.issuerKeyVersion=e.version,this.issuerFingerprint=e.getFingerprintBytes(),this.issuerKeyID=e.getKeyID();const s=[new Uint8Array([this.version,this.signatureType,this.publicKeyAlgorithm,this.hashAlgorithm])];if(6===this.version){const e=Go(this.hashAlgorithm);if(null===this.salt)this.salt=pe(e);else if(e!==this.salt.length)throw Error("Provided salt does not have the required length")}else if(i.nonDeterministicSignaturesViaNotation){if(0!==this.rawNotations.filter((({name:e})=>e===Oo)).length)throw Error("Unexpected existing salt notation");{const e=pe(Go(this.hashAlgorithm));this.rawNotations.push({name:Oo,value:e,humanReadable:!1,critical:!1})}}s.push(this.writeHashedSubPackets()),this.unhashedSubpackets=[],this.signatureData=N.concat(s);const a=this.toHash(this.signatureType,t,n),o=await this.hash(this.signatureType,t,a,n);this.signedHashValue=U(I(o),0,2);const c=async()=>Qa(this.publicKeyAlgorithm,this.hashAlgorithm,e.publicParams,e.privateParams,a,await P(o));N.isStream(o)?this.params=c():(this.params=await c(),this[No]=!0)}writeHashedSubPackets(){const e=M.signatureSubpacket,t=[];let r;if(null===this.created)throw Error("Missing signature creation time");t.push(zo(e.signatureCreationTime,!0,N.writeDate(this.created))),null!==this.signatureExpirationTime&&t.push(zo(e.signatureExpirationTime,!0,N.writeNumber(this.signatureExpirationTime,4))),null!==this.exportable&&t.push(zo(e.exportableCertification,!0,new Uint8Array([this.exportable?1:0]))),null!==this.trustLevel&&(r=new Uint8Array([this.trustLevel,this.trustAmount]),t.push(zo(e.trustSignature,!0,r))),null!==this.regularExpression&&t.push(zo(e.regularExpression,!0,this.regularExpression)),null!==this.revocable&&t.push(zo(e.revocable,!0,new Uint8Array([this.revocable?1:0]))),null!==this.keyExpirationTime&&t.push(zo(e.keyExpirationTime,!0,N.writeNumber(this.keyExpirationTime,4))),null!==this.preferredSymmetricAlgorithms&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.preferredSymmetricAlgorithms)),t.push(zo(e.preferredSymmetricAlgorithms,!1,r))),null!==this.revocationKeyClass&&(r=new Uint8Array([this.revocationKeyClass,this.revocationKeyAlgorithm]),r=N.concat([r,this.revocationKeyFingerprint]),t.push(zo(e.revocationKey,!1,r))),!this.issuerKeyID.isNull()&&this.issuerKeyVersion<5&&t.push(zo(e.issuerKeyID,!0,this.issuerKeyID.write())),this.rawNotations.forEach((({name:n,value:i,humanReadable:s,critical:a})=>{r=[new Uint8Array([s?128:0,0,0,0])];const o=N.encodeUTF8(n);r.push(N.writeNumber(o.length,2)),r.push(N.writeNumber(i.length,2)),r.push(o),r.push(i),r=N.concat(r),t.push(zo(e.notationData,a,r))})),null!==this.preferredHashAlgorithms&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.preferredHashAlgorithms)),t.push(zo(e.preferredHashAlgorithms,!1,r))),null!==this.preferredCompressionAlgorithms&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.preferredCompressionAlgorithms)),t.push(zo(e.preferredCompressionAlgorithms,!1,r))),null!==this.keyServerPreferences&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.keyServerPreferences)),t.push(zo(e.keyServerPreferences,!1,r))),null!==this.preferredKeyServer&&t.push(zo(e.preferredKeyServer,!1,N.encodeUTF8(this.preferredKeyServer))),null!==this.isPrimaryUserID&&t.push(zo(e.primaryUserID,!1,new Uint8Array([this.isPrimaryUserID?1:0]))),null!==this.policyURI&&t.push(zo(e.policyURI,!1,N.encodeUTF8(this.policyURI))),null!==this.keyFlags&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.keyFlags)),t.push(zo(e.keyFlags,!0,r))),null!==this.signersUserID&&t.push(zo(e.signersUserID,!1,N.encodeUTF8(this.signersUserID))),null!==this.reasonForRevocationFlag&&(r=N.stringToUint8Array(String.fromCharCode(this.reasonForRevocationFlag)+this.reasonForRevocationString),t.push(zo(e.reasonForRevocation,!0,r))),null!==this.features&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.features)),t.push(zo(e.features,!1,r))),null!==this.signatureTargetPublicKeyAlgorithm&&(r=[new Uint8Array([this.signatureTargetPublicKeyAlgorithm,this.signatureTargetHashAlgorithm])],r.push(N.stringToUint8Array(this.signatureTargetHash)),r=N.concat(r),t.push(zo(e.signatureTarget,!0,r))),null!==this.embeddedSignature&&t.push(zo(e.embeddedSignature,!0,this.embeddedSignature.write())),null!==this.issuerFingerprint&&(r=[new Uint8Array([this.issuerKeyVersion]),this.issuerFingerprint],r=N.concat(r),t.push(zo(e.issuerFingerprint,this.version>=5,r))),null!==this.preferredAEADAlgorithms&&(r=N.stringToUint8Array(N.uint8ArrayToString(this.preferredAEADAlgorithms)),t.push(zo(e.preferredAEADAlgorithms,!1,r))),null!==this.preferredCipherSuites&&(r=new Uint8Array([].concat(...this.preferredCipherSuites)),t.push(zo(e.preferredCipherSuites,!1,r)));const n=N.concat(t),i=N.writeNumber(n.length,6===this.version?4:2);return N.concat([i,n])}writeUnhashedSubPackets(){const e=this.unhashedSubpackets.map((({type:e,critical:t,body:r})=>zo(e,t,r))),t=N.concat(e),r=N.writeNumber(t.length,6===this.version?4:2);return N.concat([r,t])}readSubPacket(e,t=!0){let r=0;const n=!!(128&e[r]),i=127&e[r];if(r++,t||(this.unhashedSubpackets.push({type:i,critical:n,body:e.subarray(r,e.length)}),_o.has(i)))switch(i){case M.signatureSubpacket.signatureCreationTime:this.created=N.readDate(e.subarray(r,e.length));break;case M.signatureSubpacket.signatureExpirationTime:{const t=N.readNumber(e.subarray(r,e.length));this.signatureNeverExpires=0===t,this.signatureExpirationTime=t;break}case M.signatureSubpacket.exportableCertification:this.exportable=1===e[r++];break;case M.signatureSubpacket.trustSignature:this.trustLevel=e[r++],this.trustAmount=e[r++];break;case M.signatureSubpacket.regularExpression:this.regularExpression=e[r];break;case M.signatureSubpacket.revocable:this.revocable=1===e[r++];break;case M.signatureSubpacket.keyExpirationTime:{const t=N.readNumber(e.subarray(r,e.length));this.keyExpirationTime=t,this.keyNeverExpires=0===t;break}case M.signatureSubpacket.preferredSymmetricAlgorithms:this.preferredSymmetricAlgorithms=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.revocationKey:this.revocationKeyClass=e[r++],this.revocationKeyAlgorithm=e[r++],this.revocationKeyFingerprint=e.subarray(r,r+20);break;case M.signatureSubpacket.issuerKeyID:if(4===this.version)this.issuerKeyID.read(e.subarray(r,e.length));else if(t)throw Error("Unexpected Issuer Key ID subpacket");break;case M.signatureSubpacket.notationData:{const t=!!(128&e[r]);r+=4;const i=N.readNumber(e.subarray(r,r+2));r+=2;const s=N.readNumber(e.subarray(r,r+2));r+=2;const a=N.decodeUTF8(e.subarray(r,r+i)),o=e.subarray(r+i,r+i+s);this.rawNotations.push({name:a,humanReadable:t,value:o,critical:n}),t&&(this.notations[a]=N.decodeUTF8(o));break}case M.signatureSubpacket.preferredHashAlgorithms:this.preferredHashAlgorithms=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.preferredCompressionAlgorithms:this.preferredCompressionAlgorithms=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.keyServerPreferences:this.keyServerPreferences=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.preferredKeyServer:this.preferredKeyServer=N.decodeUTF8(e.subarray(r,e.length));break;case M.signatureSubpacket.primaryUserID:this.isPrimaryUserID=0!==e[r++];break;case M.signatureSubpacket.policyURI:this.policyURI=N.decodeUTF8(e.subarray(r,e.length));break;case M.signatureSubpacket.keyFlags:this.keyFlags=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.signersUserID:this.signersUserID=N.decodeUTF8(e.subarray(r,e.length));break;case M.signatureSubpacket.reasonForRevocation:this.reasonForRevocationFlag=e[r++],this.reasonForRevocationString=N.decodeUTF8(e.subarray(r,e.length));break;case M.signatureSubpacket.features:this.features=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.signatureTarget:{this.signatureTargetPublicKeyAlgorithm=e[r++],this.signatureTargetHashAlgorithm=e[r++];const t=Me(this.signatureTargetHashAlgorithm);this.signatureTargetHash=N.uint8ArrayToString(e.subarray(r,r+t));break}case M.signatureSubpacket.embeddedSignature:this.embeddedSignature=new Ho,this.embeddedSignature.read(e.subarray(r,e.length));break;case M.signatureSubpacket.issuerFingerprint:this.issuerKeyVersion=e[r++],this.issuerFingerprint=e.subarray(r,e.length),this.issuerKeyVersion>=5?this.issuerKeyID.read(this.issuerFingerprint):this.issuerKeyID.read(this.issuerFingerprint.subarray(-8));break;case M.signatureSubpacket.preferredAEADAlgorithms:this.preferredAEADAlgorithms=[...e.subarray(r,e.length)];break;case M.signatureSubpacket.preferredCipherSuites:this.preferredCipherSuites=[];for(let t=r;t<e.length;t+=2)this.preferredCipherSuites.push([e[t],e[t+1]]);break;default:this.unknownSubpackets.push({type:i,critical:n,body:e.subarray(r,e.length)})}}readSubPackets(e,t=!0,r){const n=6===this.version?4:2,i=N.readNumber(e.subarray(0,n));let s=n;for(;s<2+i;){const n=Gt(e.subarray(s,e.length));s+=n.offset,this.readSubPacket(e.subarray(s,s+n.len),t,r),s+=n.len}return s}toSign(e,t){const r=M.signature;switch(e){case r.binary:return null!==t.text?N.encodeUTF8(t.getText(!0)):t.getBytes(!0);case r.text:{const e=t.getBytes(!0);return N.canonicalizeEOL(e)}case r.standalone:return new Uint8Array(0);case r.certGeneric:case r.certPersona:case r.certCasual:case r.certPositive:case r.certRevocation:{let e,n;if(t.userID)n=180,e=t.userID;else{if(!t.userAttribute)throw Error("Either a userID or userAttribute packet needs to be supplied for certification.");n=209,e=t.userAttribute}const i=e.write();return N.concat([this.toSign(r.key,t),new Uint8Array([n]),N.writeNumber(i.length,4),i])}case r.subkeyBinding:case r.subkeyRevocation:case r.keyBinding:return N.concat([this.toSign(r.key,t),this.toSign(r.key,{key:t.bind})]);case r.key:if(void 0===t.key)throw Error("Key packet is required for this signature.");return t.key.writeForHash(this.version);case r.keyRevocation:return this.toSign(r.key,t);case r.timestamp:return new Uint8Array(0);case r.thirdParty:throw Error("Not implemented");default:throw Error("Unknown signature type.")}}calculateTrailer(e,t){let r=0;return v(I(this.signatureData),(e=>{r+=e.length}),(()=>{const n=[];return 5!==this.version||this.signatureType!==M.signature.binary&&this.signatureType!==M.signature.text||(t?n.push(new Uint8Array(6)):n.push(e.writeHeader())),n.push(new Uint8Array([this.version,255])),5===this.version&&n.push(new Uint8Array(4)),n.push(N.writeNumber(r,4)),N.concat(n)}))}toHash(e,t,r=!1){const n=this.toSign(e,t);return N.concat([this.salt||new Uint8Array,n,this.signatureData,this.calculateTrailer(t,r)])}async hash(e,t,r,n=!1){if(6===this.version&&this.salt.length!==Go(this.hashAlgorithm))throw Error("Signature salt does not have the expected length");return r||(r=this.toHash(e,t,n)),Te(this.hashAlgorithm,r)}async verify(e,t,r,n=new Date,i=!1,s=L){if(!this.issuerKeyID.equals(e.getKeyID()))throw Error("Signature was not issued by the given public key");if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Public key algorithm used to sign signature does not match issuer key algorithm.");const a=t===M.signature.binary||t===M.signature.text;if(!(this[No]&&!a)){let n,s;if(this.hashed?s=await this.hashed:(n=this.toHash(t,r,i),s=await this.hash(t,r,n)),s=await P(s),this.signedHashValue[0]!==s[0]||this.signedHashValue[1]!==s[1])throw Error("Signed digest did not match");this.params=await this.params;const a=this.publicKeyAlgorithm===M.publicKey.hmac?e.privateParams:null;if(this[No]=await xa(this.publicKeyAlgorithm,this.hashAlgorithm,this.params,e.publicParams,a,n,s),!this[No])throw Error("Signature verification failed")}const o=N.normalizeDate(n);if(o&&this.created>o)throw Error("Signature creation time is in the future");if(o&&o>=this.getExpirationTime())throw Error("Signature is expired");if(s.rejectHashAlgorithms.has(this.hashAlgorithm))throw Error("Insecure hash algorithm: "+M.read(M.hash,this.hashAlgorithm).toUpperCase());if(s.rejectMessageHashAlgorithms.has(this.hashAlgorithm)&&[M.signature.binary,M.signature.text].includes(this.signatureType))throw Error("Insecure message hash algorithm: "+M.read(M.hash,this.hashAlgorithm).toUpperCase());if(this.unknownSubpackets.forEach((({type:e,critical:t})=>{if(t)throw Error("Unknown critical signature subpacket type "+e)})),this.rawNotations.forEach((({name:e,critical:t})=>{if(t&&s.knownNotations.indexOf(e)<0)throw Error("Unknown critical notation: "+e)})),null!==this.revocationKeyClass)throw Error("This key is intended to be revoked with an authorized key, which OpenPGP.js does not support.")}isExpired(e=new Date){const t=N.normalizeDate(e);return null!==t&&!(this.created<=t&&t<this.getExpirationTime())}getExpirationTime(){return this.signatureNeverExpires?1/0:new Date(this.created.getTime()+1e3*this.signatureExpirationTime)}}function zo(e,t,r){const n=[];return n.push(qt(r.length+1)),n.push(new Uint8Array([(t?128:0)|e])),n.push(r),N.concat(n)}function Go(e){switch(e){case M.hash.sha256:return 16;case M.hash.sha384:return 24;case M.hash.sha512:return 32;case M.hash.sha224:case M.hash.sha3_256:return 16;case M.hash.sha3_512:return 32;default:throw Error("Unsupported hash function")}}class qo{static get tag(){return M.packet.onePassSignature}static fromSignaturePacket(e,t){const r=new qo;return r.version=6===e.version?6:3,r.signatureType=e.signatureType,r.hashAlgorithm=e.hashAlgorithm,r.publicKeyAlgorithm=e.publicKeyAlgorithm,r.issuerKeyID=e.issuerKeyID,r.salt=e.salt,r.issuerFingerprint=e.issuerFingerprint,r.flags=t?1:0,r}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.salt=null,this.issuerKeyID=null,this.issuerFingerprint=null,this.flags=null}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new Jt(`Version ${this.version} of the one-pass signature packet is unsupported.`);if(this.signatureType=e[t++],this.hashAlgorithm=e[t++],this.publicKeyAlgorithm=e[t++],6===this.version){const r=e[t++];this.salt=e.subarray(t,t+r),t+=r,this.issuerFingerprint=e.subarray(t,t+32),t+=32,this.issuerKeyID=new Fo,this.issuerKeyID.read(this.issuerFingerprint)}else this.issuerKeyID=new Fo,this.issuerKeyID.read(e.subarray(t,t+8)),t+=8;return this.flags=e[t++],this}write(){const e=[new Uint8Array([this.version,this.signatureType,this.hashAlgorithm,this.publicKeyAlgorithm])];return 6===this.version?e.push(new Uint8Array([this.salt.length]),this.salt,this.issuerFingerprint):e.push(this.issuerKeyID.write()),e.push(new Uint8Array([this.flags])),N.concatUint8Array(e)}calculateTrailer(...e){return x((async()=>Ho.prototype.calculateTrailer.apply(await this.correspondingSig,e)))}async verify(){const e=await this.correspondingSig;if(!e||e.constructor.tag!==M.packet.signature)throw Error("Corresponding signature packet missing");if(e.signatureType!==this.signatureType||e.hashAlgorithm!==this.hashAlgorithm||e.publicKeyAlgorithm!==this.publicKeyAlgorithm||!e.issuerKeyID.equals(this.issuerKeyID)||3===this.version&&6===e.version||6===this.version&&6!==e.version||6===this.version&&!N.equalsUint8Array(e.issuerFingerprint,this.issuerFingerprint)||6===this.version&&!N.equalsUint8Array(e.salt,this.salt))throw Error("Corresponding signature packet does not match one-pass signature packet");return e.hashed=this.hashed,e.verify.apply(e,arguments)}}qo.prototype.hash=Ho.prototype.hash,qo.prototype.toHash=Ho.prototype.toHash,qo.prototype.toSign=Ho.prototype.toSign;class jo extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,jo),this.name="GrammarError"}}const Vo=(e,t)=>{const r=e.filter((e=>e!==M.packet.marker&&e!==M.packet.padding&&!(e=>{try{return M.read(M.packet,e),!1}catch(e){return!0}})(e)));return 1===(n=r).length&&n[0]===M.packet.literalData||(e=>1===e.length&&e[0]===M.packet.compressedData)(r)||(e=>{const t=(e,t)=>e.every((e=>new Set([M.packet.publicKeyEncryptedSessionKey,M.packet.symEncryptedSessionKey]).has(e))),r=e.findIndex((e=>new Set([M.packet.aeadEncryptedData,M.packet.symmetricallyEncryptedData,M.packet.symEncryptedIntegrityProtectedData]).has(e)));return r<0?t(e):r===e.length-1&&t(e.slice(0,r))})(r)||((e,t)=>{if(0===e.findIndex((e=>e===M.packet.signature)))return Vo(e.slice(1),t);if(0===e.findIndex((e=>e===M.packet.onePassSignature))){const r=N.findLastIndex(e,(e=>e===M.packet.signature));return!(r!==e.length-1&&!t)&&Vo(e.slice(1,r<0?void 0:r),t)}return!1})(r,t);var n},Yo=({delayReporting:e})=>{let t=!1;return(r,n,i)=>{if(e&&n)return null;if(!Vo(r,n)){const e=new jo(`Data does not respect OpenPGP grammar [${r}]`);if(t||(i.pluggableGrammarErrorReporter?.(e.message),N.printDebugError(e),t=!0),i.enforceGrammar)throw e;return!0}return!0}};function Zo(e,t){if(!t[e]){let t;try{t=M.read(M.packet,e)}catch(t){throw new Xt("Unknown packet type with tag: "+e)}throw Error("Packet not allowed in this context: "+t)}return new t[e]}class Wo extends Array{static async fromBinary(e,t,r=L,n=null){const i=new Wo;return await i.read(e,t,r,n),i}async read(e,t,r=L,n=null){r.additionalAllowedPackets.length&&(t={...t,...N.constructAllowedPackets(r.additionalAllowedPackets)}),this.stream=B(e,(async(e,i)=>{const s=R(i),a=[];try{for(;;){await s.ready;if(await Wt(e,(async e=>{try{if(e.tag===M.packet.marker||e.tag===M.packet.trust||e.tag===M.packet.padding)return;const i=Zo(e.tag,t);i.packets=new Wo,i.fromStream=N.isStream(e.packet),await i.read(e.packet,r),await s.write(i),a.push(e.tag),n?.(a,!0,r)}catch(t){if(t instanceof Xt){if(!(e.tag<=39))return;await s.abort(t)}const i=!r.ignoreUnsupportedPackets&&t instanceof Jt,o=!(r.ignoreMalformedPackets||t instanceof Jt);if(i||o||t instanceof jo||Zt(e.tag))await s.abort(t);else{const t=new $t(e.tag,e.packet);await s.write(t),a.push(e.tag),n?.(a,!0,r)}N.printDebugError(t)}})))return n?.(a,!1,r),await s.ready,void await s.close()}}catch(e){await s.abort(e)}}));const i=Q(this.stream);for(;;){const{done:e,value:t}=await i.read();if(e?this.stream=null:this.push(t),e||Zt(t.constructor.tag))break}i.releaseLock()}write(){const e=[];for(let t=0;t<this.length;t++){const r=this[t]instanceof $t?this[t].tag:this[t].constructor.tag,n=this[t].write();if(N.isStream(n)&&Zt(this[t].constructor.tag)){let t=[],i=0;const s=512;e.push(Vt(r)),e.push(v(n,(e=>{if(t.push(e),i+=e.length,i>=s){const e=Math.min(Math.log(i)/Math.LN2|0,30),r=2**e,n=N.concat([jt(e)].concat(t));return t=[n.subarray(1+r)],i=t[0].length,n.subarray(0,1+r)}}),(()=>N.concat([qt(i)].concat(t)))))}else{if(N.isStream(n)){let t=0;e.push(v(I(n),(e=>{t+=e.length}),(()=>Yt(r,t))))}else e.push(Yt(r,n.length));e.push(n)}}return N.concat(e)}filterByTag(...e){const t=new Wo,r=e=>t=>e===t;for(let n=0;n<this.length;n++)e.some(r(this[n].constructor.tag))&&t.push(this[n]);return t}findPacket(e){return this.find((t=>t.constructor.tag===e))}indexOfTag(...e){const t=[],r=this,n=e=>t=>e===t;for(let i=0;i<this.length;i++)e.some(n(r[i].constructor.tag))&&t.push(i);return t}}const Jo=/*#__PURE__*/N.constructAllowedPackets([Lo,qo,Ho]);class Xo{static get tag(){return M.packet.compressedData}constructor(e=L){this.packets=null,this.algorithm=e.preferredCompressionAlgorithm,this.compressed=null}async read(e,t=L){await S(e,(async e=>{this.algorithm=await e.readByte(),this.compressed=e.remainder(),await this.decompress(t)}))}write(){return null===this.compressed&&this.compress(),N.concat([new Uint8Array([this.algorithm]),this.compressed])}async decompress(e=L){const t=M.read(M.compression,this.algorithm),r=nc[t];if(!r)throw Error(t+" decompression not supported");this.packets=await Wo.fromBinary(await r(this.compressed),Jo,e,Yo({enforceDelay:!1}))}compress(){const e=M.read(M.compression,this.algorithm),t=rc[e];if(!t)throw Error(e+" compression not supported");this.compressed=t(this.packets.write())}}function $o(e,t){return r=>{if(!N.isStream(r)||u(r))return x((()=>P(r).then((e=>new Promise(((r,n)=>{const i=new t;i.ondata=e=>{r(e)};try{i.push(e,!0)}catch(e){n(e)}}))))));if(e)try{const t=e();return r.pipeThrough(t)}catch(e){if("TypeError"!==e.name)throw e}const n=r.getReader(),i=new t;return new ReadableStream({async start(e){for(i.ondata=async(t,r)=>{e.enqueue(t),r&&e.close()};;){const{done:e,value:t}=await n.read();if(e)return void i.push(new Uint8Array,!0);t.length&&i.push(t)}}})}}function ec(){return async function(e){const{decode:t}=await Promise.resolve().then((function(){return Hp}));return x((async()=>t(await P(e))))}}const tc=e=>({compressor:"undefined"!=typeof CompressionStream&&(()=>new CompressionStream(e)),decompressor:"undefined"!=typeof DecompressionStream&&(()=>new DecompressionStream(e))}),rc={zip:/*#__PURE__*/$o(tc("deflate-raw").compressor,xo),zlib:/*#__PURE__*/$o(tc("deflate").compressor,Ro)},nc={uncompressed:e=>e,zip:/*#__PURE__*/$o(tc("deflate-raw").decompressor,Qo),zlib:/*#__PURE__*/$o(tc("deflate").decompressor,To),bzip2:/*#__PURE__*/ec()},ic=/*#__PURE__*/N.constructAllowedPackets([Lo,Xo,qo,Ho]);class sc{static get tag(){return M.packet.symEncryptedIntegrityProtectedData}static fromObject({version:e,aeadAlgorithm:t}){if(1!==e&&2!==e)throw Error("Unsupported SEIPD version");const r=new sc;return r.version=e,2===e&&(r.aeadAlgorithm=t),r}constructor(){this.version=null,this.cipherAlgorithm=null,this.aeadAlgorithm=null,this.chunkSizeByte=null,this.salt=null,this.encrypted=null,this.packets=null}async read(e){await S(e,(async e=>{if(this.version=await e.readByte(),1!==this.version&&2!==this.version)throw new Jt(`Version ${this.version} of the SEIP packet is unsupported.`);2===this.version&&(this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte(),this.salt=await e.readBytes(32)),this.encrypted=e.remainder()}))}write(){return 2===this.version?N.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.salt,this.encrypted]):N.concat([new Uint8Array([this.version]),this.encrypted])}async encrypt(e,t,r=L){const{blockSize:n,keySize:i}=si(e);if(t.length!==i)throw Error("Unexpected session key size");let s=this.packets.write();if(u(s)&&(s=await P(s)),2===this.version)this.cipherAlgorithm=e,this.salt=pe(32),this.chunkSizeByte=r.aeadChunkSizeByte,this.encrypted=await ac(this,"encrypt",t,s);else{const r=await Rs(e),i=new Uint8Array([211,20]),a=N.concat([r,s,i]),o=await Te(M.hash.sha1,K(a)),c=N.concat([a,o]);this.encrypted=await Ts(e,t,c,new Uint8Array(n))}return!0}async decrypt(e,t,r=L){if(t.length!==si(e).keySize)throw Error("Unexpected session key size");let n,i,s=I(this.encrypted);if(u(s)&&(s=await P(s)),2===this.version){if(this.cipherAlgorithm!==e)throw Error("Unexpected session key algorithm");n=await ac(this,"decrypt",t,s),i=Yo({delayReporting:!1})}else{const{blockSize:a}=si(e),o=await Ms(e,t,s,new Uint8Array(a)),c=N.isStream(s)&&r.allowUnauthenticatedStream;i=Yo({delayReporting:c});const u=U(K(o),-20),h=U(o,0,-20),l=Promise.all([P(await Te(M.hash.sha1,K(h))),P(u)]).then((([e,t])=>{if(!N.equalsUint8Array(e,t))throw Error("Modification detected.");return new Uint8Array})),y=U(h,a+2);n=U(y,0,-2),n=m([n,x((()=>l))]),c||(n=await P(n))}return this.packets=await Wo.fromBinary(n,ic,r,i),!0}}async function ac(e,t,r,n){const i=e instanceof sc&&2===e.version,s=!i&&e.constructor.tag===M.packet.aeadEncryptedData;if(!i&&!s)throw Error("Unexpected packet type");const a=ka(e.aeadAlgorithm,s),o="decrypt"===t?a.tagLength:0,c="encrypt"===t?a.tagLength:0,u=2**(e.chunkSizeByte+6)+o,h=s?8:0,l=new ArrayBuffer(13+h),y=new Uint8Array(l,0,5+h),f=new Uint8Array(l),g=new DataView(l),p=new Uint8Array(l,5,8);y.set([192|e.constructor.tag,e.version,e.cipherAlgorithm,e.aeadAlgorithm,e.chunkSizeByte],0);let d,A,w=0,m=Promise.resolve(),k=0,E=0;if(i){const{keySize:t}=si(e.cipherAlgorithm),{ivLength:n}=a,i=new Uint8Array(l,0,5),s=await hi(M.hash.sha256,r,e.salt,i,t+n);r=s.subarray(0,t),d=s.subarray(t),d.fill(0,d.length-8),A=new DataView(d.buffer,d.byteOffset,d.byteLength)}else d=e.iv;const v=await a(e.cipherAlgorithm,r);return B(n,(async(r,n)=>{if("array"!==N.isStream(r)){const t=new TransformStream({},{highWaterMark:N.getHardwareConcurrency()*2**(e.chunkSizeByte+6),size:e=>e.length});b(t.readable,n),n=t.writable}const s=Q(r),a=R(n);try{for(;;){let e=await s.readBytes(u+o)||new Uint8Array;const r=e.subarray(e.length-o);let n,l,b;if(e=e.subarray(0,e.length-o),i)b=d;else{b=d.slice();for(let e=0;e<8;e++)b[d.length-8+e]^=p[e]}if(!w||e.length?(s.unshift(r),n=v[t](e,b,y),n.catch((()=>{})),E+=e.length-o+c):(g.setInt32(5+h+4,k),n=v[t](r,b,f),n.catch((()=>{})),E+=c,l=!0),k+=e.length-o,m=m.then((()=>n)).then((async e=>{await a.ready,await a.write(e),E-=e.length})).catch((e=>a.abort(e))),(l||E>a.desiredSize)&&await m,l){await a.close();break}i?A.setInt32(d.length-4,++w):g.setInt32(9,++w)}}catch(e){await a.ready.catch((()=>{})),await a.abort(e)}}))}const oc=/*#__PURE__*/N.constructAllowedPackets([Lo,Xo,qo,Ho]);class cc{static get tag(){return M.packet.aeadEncryptedData}constructor(){this.version=1,this.cipherAlgorithm=null,this.aeadAlgorithm=M.aead.eax,this.chunkSizeByte=null,this.iv=null,this.encrypted=null,this.packets=null}async read(e){await S(e,(async e=>{const t=await e.readByte();if(1!==t)throw new Jt(`Version ${t} of the AEAD-encrypted data packet is not supported.`);this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte();const r=ka(this.aeadAlgorithm,!0);this.iv=await e.readBytes(r.ivLength),this.encrypted=e.remainder()}))}write(){return N.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.iv,this.encrypted])}async decrypt(e,t,r=L){this.packets=await Wo.fromBinary(await ac(this,"decrypt",t,I(this.encrypted)),oc,r,Yo({enforceDelay:!1}))}async encrypt(e,t,r=L){this.cipherAlgorithm=e;const{ivLength:n}=ka(this.aeadAlgorithm,!0);this.iv=pe(n),this.chunkSizeByte=r.aeadChunkSizeByte;const i=this.packets.write();this.encrypted=await ac(this,"encrypt",t,i)}}const uc=new Set([M.publicKey.x25519,M.publicKey.x448,M.publicKey.pqc_mlkem_x25519]);class hc{static get tag(){return M.packet.publicKeyEncryptedSessionKey}constructor(){this.version=null,this.publicKeyID=new Fo,this.publicKeyVersion=null,this.publicKeyFingerprint=null,this.publicKeyAlgorithm=null,this.sessionKey=null,this.sessionKeyAlgorithm=null,this.encrypted={}}static fromObject({version:e,encryptionKeyPacket:t,anonymousRecipient:r,sessionKey:n,sessionKeyAlgorithm:i}){const s=new hc;if(3!==e&&6!==e)throw Error("Unsupported PKESK version");return s.version=e,6===e&&(s.publicKeyVersion=r?null:t.version,s.publicKeyFingerprint=r?null:t.getFingerprintBytes()),s.publicKeyID=r?Fo.wildcard():t.getKeyID(),s.publicKeyAlgorithm=t.algorithm,s.sessionKey=n,s.sessionKeyAlgorithm=i,s}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new Jt(`Version ${this.version} of the PKESK packet is unsupported.`);if(6===this.version){const r=e[t++];if(r){this.publicKeyVersion=e[t++];const n=r-1;this.publicKeyFingerprint=e.subarray(t,t+n),t+=n,this.publicKeyVersion>=5?this.publicKeyID.read(this.publicKeyFingerprint):this.publicKeyID.read(this.publicKeyFingerprint.subarray(-8))}else this.publicKeyID=Fo.wildcard()}else t+=this.publicKeyID.read(e.subarray(t,t+8));if(this.publicKeyAlgorithm=e[t++],this.encrypted=function(e,t){let r=0;switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:return{c:N.readMPI(t.subarray(r))};case M.publicKey.elgamal:{const e=N.readMPI(t.subarray(r));return r+=e.length+2,{c1:e,c2:N.readMPI(t.subarray(r))}}case M.publicKey.ecdh:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const n=new Es;return n.read(t.subarray(r)),{V:e,C:n}}case M.publicKey.x25519:case M.publicKey.x448:{const n=Da(e),i=N.readExactSubarray(t,r,r+n);r+=i.length;const s=new Us;return s.read(t.subarray(r)),{ephemeralPublicKey:i,C:s}}case M.publicKey.aead:{const e=new Is;r+=e.read(t.subarray(r));const{ivLength:n}=ka(e.getValue()),i=t.subarray(r,r+n);r+=n;const s=new vs;return r+=s.read(t.subarray(r)),{aeadMode:e,iv:i,c:s}}case M.publicKey.pqc_mlkem_x25519:{const e=N.readExactSubarray(t,r,r+Da(M.publicKey.x25519));r+=e.length;const n=N.readExactSubarray(t,r,r+1088);r+=n.length;const i=new Us;return i.read(t.subarray(r)),{eccCipherText:e,mlkemCipherText:n,C:i}}default:throw new Jt("Unknown public key encryption algorithm.")}}(this.publicKeyAlgorithm,e.subarray(t)),uc.has(this.publicKeyAlgorithm))if(3===this.version)this.sessionKeyAlgorithm=M.write(M.symmetric,this.encrypted.C.algorithm);else if(null!==this.encrypted.C.algorithm)throw Error("Unexpected cleartext symmetric algorithm")}write(){const e=[new Uint8Array([this.version])];return 6===this.version?null!==this.publicKeyFingerprint?(e.push(new Uint8Array([this.publicKeyFingerprint.length+1,this.publicKeyVersion])),e.push(this.publicKeyFingerprint)):e.push(new Uint8Array([0])):e.push(this.publicKeyID.write()),e.push(new Uint8Array([this.publicKeyAlgorithm]),Sa(this.publicKeyAlgorithm,this.encrypted)),N.concatUint8Array(e)}async encrypt(e){const t=M.write(M.publicKey,this.publicKeyAlgorithm),r=3===this.version?this.sessionKeyAlgorithm:null,n=5===e.version?e.getFingerprintBytes().subarray(0,20):e.getFingerprintBytes(),i=lc(this.version,t,r,this.sessionKey),s=t===M.publicKey.aead?e.privateParams:null;this.encrypted=await Ea(t,r,e.publicParams,s,i,n)}async decrypt(e,t){if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Decryption error");const r=t?lc(this.version,this.publicKeyAlgorithm,t.sessionKeyAlgorithm,t.sessionKey):null,n=5===e.version?e.getFingerprintBytes().subarray(0,20):e.getFingerprintBytes(),i=await va(this.publicKeyAlgorithm,e.publicParams,e.privateParams,this.encrypted,n,r),{sessionKey:s,sessionKeyAlgorithm:a}=function(e,t,r,n){switch(t){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.elgamal:case M.publicKey.ecdh:case M.publicKey.aead:{const t=r.subarray(0,r.length-2),i=r.subarray(r.length-2),s=N.writeChecksum(t.subarray(t.length%8)),a=s[0]===i[0]&s[1]===i[1],o=6===e?{sessionKeyAlgorithm:null,sessionKey:t}:{sessionKeyAlgorithm:t[0],sessionKey:t.subarray(1)};if(n){const t=a&o.sessionKeyAlgorithm===n.sessionKeyAlgorithm&o.sessionKey.length===n.sessionKey.length;return{sessionKey:N.selectUint8Array(t,o.sessionKey,n.sessionKey),sessionKeyAlgorithm:6===e?null:N.selectUint8(t,o.sessionKeyAlgorithm,n.sessionKeyAlgorithm)}}if(a&&(6===e||M.read(M.symmetric,o.sessionKeyAlgorithm)))return o;throw Error("Decryption error")}case M.publicKey.x25519:case M.publicKey.x448:case M.publicKey.pqc_mlkem_x25519:return{sessionKeyAlgorithm:null,sessionKey:r};default:throw Error("Unsupported public key algorithm")}}(this.version,this.publicKeyAlgorithm,i,t);if(3===this.version){const e=!uc.has(this.publicKeyAlgorithm);if(this.sessionKeyAlgorithm=e?a:this.sessionKeyAlgorithm,s.length!==si(this.sessionKeyAlgorithm).keySize)throw Error("Unexpected session key size")}this.sessionKey=s}}function lc(e,t,r,n){switch(t){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.elgamal:case M.publicKey.ecdh:case M.publicKey.aead:return N.concatUint8Array([new Uint8Array(6===e?[]:[r]),n,N.writeChecksum(n.subarray(n.length%8))]);case M.publicKey.x25519:case M.publicKey.x448:case M.publicKey.pqc_mlkem_x25519:return n;default:throw Error("Unsupported public key algorithm")}}class yc{static get tag(){return M.packet.symEncryptedSessionKey}constructor(e=L){this.version=e.aeadProtect?6:4,this.sessionKey=null,this.sessionKeyEncryptionAlgorithm=null,this.sessionKeyAlgorithm=null,this.aeadAlgorithm=M.write(M.aead,e.preferredAEADAlgorithm),this.encrypted=null,this.s2k=null,this.iv=null}read(e){let t=0;if(this.version=e[t++],4!==this.version&&5!==this.version&&6!==this.version)throw new Jt(`Version ${this.version} of the SKESK packet is unsupported.`);6===this.version&&t++;const r=e[t++];this.version>=5&&(this.aeadAlgorithm=e[t++],6===this.version&&t++);const n=e[t++];if(this.s2k=_a(n),t+=this.s2k.read(e.subarray(t,e.length)),this.version>=5){const r=ka(this.aeadAlgorithm,!0);this.iv=e.subarray(t,t+=r.ivLength)}this.version>=5||t<e.length?(this.encrypted=e.subarray(t,e.length),this.sessionKeyEncryptionAlgorithm=r):this.sessionKeyAlgorithm=r}write(){const e=null===this.encrypted?this.sessionKeyAlgorithm:this.sessionKeyEncryptionAlgorithm;let t;const r=this.s2k.write();if(6===this.version){const n=r.length,i=3+n+this.iv.length;t=N.concatUint8Array([new Uint8Array([this.version,i,e,this.aeadAlgorithm,n]),r,this.iv,this.encrypted])}else 5===this.version?t=N.concatUint8Array([new Uint8Array([this.version,e,this.aeadAlgorithm]),r,this.iv,this.encrypted]):(t=N.concatUint8Array([new Uint8Array([this.version,e]),r]),null!==this.encrypted&&(t=N.concatUint8Array([t,this.encrypted])));return t}async decrypt(e){const t=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm,{blockSize:r,keySize:n}=si(t),i=await this.s2k.produceKey(e,n);if(this.version>=5){const e=ka(this.aeadAlgorithm,!0),r=new Uint8Array([192|yc.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),s=6===this.version?await hi(M.hash.sha256,i,new Uint8Array,r,n):i,a=await e(t,s);this.sessionKey=await a.decrypt(this.encrypted,this.iv,r)}else if(null!==this.encrypted){const e=await Ms(t,i,this.encrypted,new Uint8Array(r));if(this.sessionKeyAlgorithm=M.write(M.symmetric,e[0]),this.sessionKey=e.subarray(1,e.length),this.sessionKey.length!==si(this.sessionKeyAlgorithm).keySize)throw Error("Unexpected session key size")}else this.sessionKey=i}async encrypt(e,t=L){const r=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm;this.sessionKeyEncryptionAlgorithm=r,this.s2k=Ha(t),this.s2k.generateSalt();const{blockSize:n,keySize:i}=si(r),s=await this.s2k.produceKey(e,i);if(null===this.sessionKey&&(this.sessionKey=Ua(this.sessionKeyAlgorithm)),this.version>=5){const e=ka(this.aeadAlgorithm);this.iv=pe(e.ivLength);const t=new Uint8Array([192|yc.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),n=6===this.version?await hi(M.hash.sha256,s,new Uint8Array,t,i):s,a=await e(r,n);this.encrypted=await a.encrypt(this.sessionKey,this.iv,t)}else{const e=N.concatUint8Array([new Uint8Array([this.sessionKeyAlgorithm]),this.sessionKey]);this.encrypted=await Ts(r,s,e,new Uint8Array(n))}}}class fc{static get tag(){return M.packet.publicKey}constructor(e=new Date,t=L){this.version=t.v6Keys?6:4,this.created=N.normalizeDate(e),this.algorithm=null,this.publicParams=null,this.expirationTimeV3=0,this.fingerprint=null,this.keyID=null}static fromSecretKeyPacket(e){const t=new fc,{version:r,created:n,algorithm:i,publicParams:s,keyID:a,fingerprint:o}=e;return t.version=r,t.created=n,t.algorithm=i,t.publicParams=s,t.keyID=a,t.fingerprint=o,t}async read(e,t=L){let r=0;if(this.version=e[r++],5===this.version&&!t.enableParsingV5Entities)throw new Jt("Support for parsing v5 entities is disabled; turn on `config.enableParsingV5Entities` if needed");if(4===this.version||5===this.version||6===this.version){this.created=N.readDate(e.subarray(r,r+4)),r+=4,this.algorithm=e[r++],this.version>=5&&(r+=4);const{read:t,publicParams:n}=function(e,t){let r=0;switch(e){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const n=N.readMPI(t.subarray(r));return r+=n.length+2,{read:r,publicParams:{n:e,e:n}}}case M.publicKey.dsa:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const n=N.readMPI(t.subarray(r));r+=n.length+2;const i=N.readMPI(t.subarray(r));r+=i.length+2;const s=N.readMPI(t.subarray(r));return r+=s.length+2,{read:r,publicParams:{p:e,q:n,g:i,y:s}}}case M.publicKey.elgamal:{const e=N.readMPI(t.subarray(r));r+=e.length+2;const n=N.readMPI(t.subarray(r));r+=n.length+2;const i=N.readMPI(t.subarray(r));return r+=i.length+2,{read:r,publicParams:{p:e,g:n,y:i}}}case M.publicKey.ecdsa:{const e=new zt;r+=e.read(t),Pa(e);const n=N.readMPI(t.subarray(r));return r+=n.length+2,{read:r,publicParams:{oid:e,Q:n}}}case M.publicKey.eddsaLegacy:{const e=new zt;if(r+=e.read(t),Pa(e),e.getName()!==M.curve.ed25519Legacy)throw Error("Unexpected OID for eddsaLegacy");let n=N.readMPI(t.subarray(r));return r+=n.length+2,n=N.leftPad(n,33),{read:r,publicParams:{oid:e,Q:n}}}case M.publicKey.ecdh:{const e=new zt;r+=e.read(t),Pa(e);const n=N.readMPI(t.subarray(r));r+=n.length+2;const i=new Bs;return r+=i.read(t.subarray(r)),{read:r,publicParams:{oid:e,Q:n,kdfParams:i}}}case M.publicKey.ed25519:case M.publicKey.ed448:case M.publicKey.x25519:case M.publicKey.x448:{const n=N.readExactSubarray(t,r,r+Da(e));return r+=n.length,{read:r,publicParams:{A:n}}}case M.publicKey.hmac:case M.publicKey.aead:{const e=new Ks;r+=e.read(t);const n=Me(M.hash.sha256),i=t.subarray(r,r+n);return r+=n,{read:r,publicParams:{cipher:e,digest:i}}}case M.publicKey.pqc_mlkem_x25519:{const e=N.readExactSubarray(t,r,r+Da(M.publicKey.x25519));r+=e.length;const n=N.readExactSubarray(t,r,r+1184);return r+=n.length,{read:r,publicParams:{eccPublicKey:e,mlkemPublicKey:n}}}case M.publicKey.pqc_mldsa_ed25519:{const e=N.readExactSubarray(t,r,r+Da(M.publicKey.ed25519));r+=e.length;const n=N.readExactSubarray(t,r,r+1952);return r+=n.length,{read:r,publicParams:{eccPublicKey:e,mldsaPublicKey:n}}}default:throw new Jt("Unknown public key encryption algorithm.")}}(this.algorithm,e.subarray(r));if(6===this.version&&n.oid&&(n.oid.getName()===M.curve.curve25519Legacy||n.oid.getName()===M.curve.ed25519Legacy))throw Error("Legacy curve25519 cannot be used with v6 keys");if(6!==this.version&&(this.algorithm===M.publicKey.pqc_mldsa_ed25519||this.algorithm===M.publicKey.pqc_mlkem_x25519))throw Error("Unexpected key version: ML-DSA and ML-KEM algorithms can only be used with v6 keys");return this.publicParams=n,r+=t,await this.computeFingerprintAndKeyID(),r}throw new Jt(`Version ${this.version} of the key packet is unsupported.`)}write(){const e=[];e.push(new Uint8Array([this.version])),e.push(N.writeDate(this.created)),e.push(new Uint8Array([this.algorithm]));const t=Sa(this.algorithm,this.publicParams);return this.version>=5&&e.push(N.writeNumber(t.length,4)),e.push(t),N.concatUint8Array(e)}writeForHash(e){const t=this.writePublicKey(),r=149+e,n=e>=5?4:2;return N.concatUint8Array([new Uint8Array([r]),N.writeNumber(t.length,n),t])}isDecrypted(){return null}getCreationTime(){return this.created}getKeyID(){return this.keyID}async computeFingerprintAndKeyID(){if(await this.computeFingerprint(),this.keyID=new Fo,this.version>=5)this.keyID.read(this.fingerprint.subarray(0,8));else{if(4!==this.version)throw Error("Unsupported key version");this.keyID.read(this.fingerprint.subarray(12,20))}}async computeFingerprint(){const e=this.writeForHash(this.version);if(this.version>=5)this.fingerprint=await Te(M.hash.sha256,e);else{if(4!==this.version)throw Error("Unsupported key version");this.fingerprint=await Te(M.hash.sha1,e)}}getFingerprintBytes(){return this.fingerprint}getFingerprint(){return N.uint8ArrayToHex(this.getFingerprintBytes())}hasSameFingerprintAs(e){return this.version===e.version&&N.equalsUint8Array(this.writePublicKey(),e.writePublicKey())}getAlgorithmInfo(){const e={};e.algorithm=M.read(M.publicKey,this.algorithm);const t=this.publicParams.n||this.publicParams.p;return t?e.bits=N.uint8ArrayBitLength(t):this.publicParams.oid?e.curve=this.publicParams.oid.getName():this.publicParams.cipher&&(e.symmetric=this.publicParams.cipher.getName()),e}}fc.prototype.readPublicKey=fc.prototype.read,fc.prototype.writePublicKey=fc.prototype.write;const gc=/*#__PURE__*/N.constructAllowedPackets([Lo,Xo,qo,Ho]);class pc{static get tag(){return M.packet.symmetricallyEncryptedData}constructor(){this.encrypted=null,this.packets=null}read(e){this.encrypted=e}write(){return this.encrypted}async decrypt(e,t,r=L){if(!r.allowUnauthenticatedMessages)throw Error("Message is not authenticated.");const{blockSize:n}=si(e),i=await P(I(this.encrypted)),s=await Ms(e,t,i.subarray(n+2),i.subarray(2,n+2));this.packets=await Wo.fromBinary(s,gc,r)}async encrypt(e,t,r=L){const n=this.packets.write(),{blockSize:i}=si(e),s=await Rs(e),a=await Ts(e,t,s,new Uint8Array(i)),o=await Ts(e,t,n,a.subarray(2));this.encrypted=N.concat([a,o])}}class dc{static get tag(){return M.packet.marker}read(e){return 80===e[0]&&71===e[1]&&80===e[2]}write(){return new Uint8Array([80,71,80])}}class Ac extends fc{static get tag(){return M.packet.publicSubkey}constructor(e,t){super(e,t)}static fromSecretSubkeyPacket(e){const t=new Ac,{version:r,created:n,algorithm:i,publicParams:s,keyID:a,fingerprint:o}=e;return t.version=r,t.created=n,t.algorithm=i,t.publicParams=s,t.keyID=a,t.fingerprint=o,t}}class wc{static get tag(){return M.packet.userAttribute}constructor(){this.attributes=[]}read(e){let t=0;for(;t<e.length;){const r=Gt(e.subarray(t,e.length));t+=r.offset,this.attributes.push(N.uint8ArrayToString(e.subarray(t,t+r.len))),t+=r.len}}write(){const e=[];for(let t=0;t<this.attributes.length;t++)e.push(qt(this.attributes[t].length)),e.push(N.stringToUint8Array(this.attributes[t]));return N.concatUint8Array(e)}equals(e){return!!(e&&e instanceof wc)&&this.attributes.every((function(t,r){return t===e.attributes[r]}))}}class mc extends fc{static get tag(){return M.packet.secretKey}constructor(e=new Date,t=L){super(e,t),this.keyMaterial=null,this.isEncrypted=null,this.s2kUsage=0,this.s2k=null,this.symmetric=null,this.aead=null,this.isLegacyAEAD=null,this.privateParams=null,this.usedModernAEAD=null}async read(e,t=L){let r=await this.readPublicKey(e,t);const n=r;this.s2kUsage=e[r++],5===this.version&&r++,6===this.version&&this.s2kUsage&&r++;try{if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){this.symmetric=e[r++],253===this.s2kUsage&&(this.aead=e[r++]),6===this.version&&r++;const t=e[r++];if(this.s2k=_a(t),r+=this.s2k.read(e.subarray(r,e.length)),"gnu-dummy"===this.s2k.type)return}else this.s2kUsage&&(this.symmetric=this.s2kUsage);this.s2kUsage&&(this.isLegacyAEAD=253===this.s2kUsage&&(5===this.version||4===this.version&&t.parseAEADEncryptedV4KeysAsLegacy),253!==this.s2kUsage||this.isLegacyAEAD?(this.iv=e.subarray(r,r+si(this.symmetric).blockSize),this.usedModernAEAD=!1):(this.iv=e.subarray(r,r+ka(this.aead).ivLength),this.usedModernAEAD=!0),r+=this.iv.length)}catch(t){if(!this.s2kUsage)throw t;this.unparseableKeyMaterial=e.subarray(n),this.isEncrypted=!0}if(5===this.version&&(r+=4),this.keyMaterial=e.subarray(r),this.isEncrypted=!!this.s2kUsage,!this.isEncrypted){let e;if(6===this.version)e=this.keyMaterial;else if(e=this.keyMaterial.subarray(0,-2),!N.equalsUint8Array(N.writeChecksum(e),this.keyMaterial.subarray(-2)))throw Error("Key checksum mismatch");try{const{read:t,privateParams:r}=await Ba(this.algorithm,e,this.publicParams);if(t<e.length)throw Error("Error reading MPIs");this.privateParams=r}catch(e){if(e instanceof Jt)throw e;throw Error("Error reading MPIs")}}}write(){const e=this.writePublicKey();if(this.unparseableKeyMaterial)return N.concatUint8Array([e,this.unparseableKeyMaterial]);const t=[e];t.push(new Uint8Array([this.s2kUsage]));const r=[];if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){r.push(this.symmetric),253===this.s2kUsage&&r.push(this.aead);const e=this.s2k.write();6===this.version&&r.push(e.length),r.push(...e)}return this.s2kUsage&&"gnu-dummy"!==this.s2k.type&&r.push(...this.iv),(5===this.version||6===this.version&&this.s2kUsage)&&t.push(new Uint8Array([r.length])),t.push(new Uint8Array(r)),this.isDummy()||(this.s2kUsage||(this.keyMaterial=Sa(this.algorithm,this.privateParams)),5===this.version&&t.push(N.writeNumber(this.keyMaterial.length,4)),t.push(this.keyMaterial),this.s2kUsage||6===this.version||t.push(N.writeChecksum(this.keyMaterial))),N.concatUint8Array(t)}isDecrypted(){return!1===this.isEncrypted}isMissingSecretKeyMaterial(){return void 0!==this.unparseableKeyMaterial||this.isDummy()}isDummy(){return!(!this.s2k||"gnu-dummy"!==this.s2k.type)}makeDummy(e=L){this.isDummy()||(this.isDecrypted()&&this.clearPrivateParams(),delete this.unparseableKeyMaterial,this.isEncrypted=null,this.keyMaterial=null,this.s2k=_a(M.s2k.gnu,e),this.s2k.algorithm=0,this.s2k.c=0,this.s2k.type="gnu-dummy",this.s2kUsage=254,this.symmetric=M.symmetric.aes256,this.isLegacyAEAD=null,this.usedModernAEAD=null)}async encrypt(e,t=L){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key packet is already encrypted");if(!e)throw Error("A non-empty passphrase is required for key encryption.");this.s2k=Ha(t),this.s2k.generateSalt();const r=Sa(this.algorithm,this.privateParams);this.symmetric=M.symmetric.aes256;const{blockSize:n}=si(this.symmetric);if(t.aeadProtect){this.s2kUsage=253,this.aead=t.preferredAEADAlgorithm;const i=ka(this.aead);this.isLegacyAEAD=5===this.version,this.usedModernAEAD=!this.isLegacyAEAD;const s=Vt(this.constructor.tag),a=await bc(this.version,this.s2k,e,this.symmetric,this.aead,s,this.isLegacyAEAD),o=await i(this.symmetric,a);this.iv=this.isLegacyAEAD?pe(n):pe(i.ivLength);const c=this.isLegacyAEAD?new Uint8Array:N.concatUint8Array([s,this.writePublicKey()]);this.keyMaterial=await o.encrypt(r,this.iv.subarray(0,i.ivLength),c)}else{this.s2kUsage=254,this.usedModernAEAD=!1;const t=await bc(this.version,this.s2k,e,this.symmetric);this.iv=pe(n),this.keyMaterial=await Ts(this.symmetric,t,N.concatUint8Array([r,await Te(M.hash.sha1,r)]),this.iv)}}async decrypt(e){if(this.isDummy())return!1;if(this.unparseableKeyMaterial)throw Error("Key packet cannot be decrypted: unsupported S2K or cipher algo");if(this.isDecrypted())throw Error("Key packet is already decrypted.");let t;const r=Vt(this.constructor.tag);if(254!==this.s2kUsage&&253!==this.s2kUsage)throw 255===this.s2kUsage?Error("Encrypted private key is authenticated using an insecure two-byte hash"):Error("Private key is encrypted using an insecure S2K function: unsalted MD5");let n;if(t=await bc(this.version,this.s2k,e,this.symmetric,this.aead,r,this.isLegacyAEAD),253===this.s2kUsage){const e=ka(this.aead,!0),i=await e(this.symmetric,t);try{const t=this.isLegacyAEAD?new Uint8Array:N.concatUint8Array([r,this.writePublicKey()]);n=await i.decrypt(this.keyMaterial,this.iv.subarray(0,e.ivLength),t)}catch(e){if("Authentication tag mismatch"===e.message)throw Error("Incorrect key passphrase: "+e.message);throw e}}else{const e=await Ms(this.symmetric,t,this.keyMaterial,this.iv);n=e.subarray(0,-20);const r=await Te(M.hash.sha1,n);if(!N.equalsUint8Array(r,e.subarray(-20)))throw Error("Incorrect key passphrase")}try{const{privateParams:e}=await Ba(this.algorithm,n,this.publicParams);this.privateParams=e}catch(e){throw Error("Error reading MPIs")}this.isEncrypted=!1,this.keyMaterial=null,this.s2kUsage=0,this.aead=null,this.symmetric=null,this.isLegacyAEAD=null}async validate(){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key is not decrypted");if(this.usedModernAEAD)return;let e;try{e=await Ca(this.algorithm,this.publicParams,this.privateParams)}catch(t){e=!1}if(!e)throw Error("Key is invalid")}async generate(e,t,r){if(6===this.version&&(this.algorithm===M.publicKey.ecdh&&t===M.curve.curve25519Legacy||this.algorithm===M.publicKey.eddsaLegacy))throw Error(`Cannot generate v6 keys of type 'ecc' with curve ${t}. Generate a key of type 'curve25519' instead`);if(6!==this.version&&(this.algorithm===M.publicKey.pqc_mldsa_ed25519||this.algorithm===M.publicKey.pqc_mlkem_x25519))throw Error(`Cannot generate v${this.version} keys of type 'pqc'. Generate a v6 key instead`);const{privateParams:n,publicParams:i}=await Ia(this.algorithm,e,t,r);this.privateParams=n,this.publicParams=i,this.isEncrypted=!1}clearPrivateParams(){this.isMissingSecretKeyMaterial()||(Object.keys(this.privateParams).forEach((e=>{this.privateParams[e].fill(0),delete this.privateParams[e]})),this.privateParams=null,this.isEncrypted=!0)}}async function bc(e,t,r,n,i,s,a){if("argon2"===t.type&&!i)throw Error("Using Argon2 S2K without AEAD is not allowed");if("simple"===t.type&&6===e)throw Error("Using Simple S2K with version 6 keys is not allowed");const{keySize:o}=si(n),c=await t.produceKey(r,o);if(!i||5===e||a)return c;const u=N.concatUint8Array([s,new Uint8Array([e,n,i])]);return hi(M.hash.sha256,c,new Uint8Array,u,o)}class kc{static get tag(){return M.packet.userID}constructor(){this.userID="",this.name="",this.email="",this.comment=""}static fromObject(e){if(N.isString(e)||e.name&&!N.isString(e.name)||e.email&&!N.isEmailAddress(e.email)||e.comment&&!N.isString(e.comment))throw Error("Invalid user ID format");const t=new kc;Object.assign(t,e);const r=[];return t.name&&r.push(t.name),t.comment&&r.push(`(${t.comment})`),t.email&&r.push(`<${t.email}>`),t.userID=r.join(" "),t}read(e,t=L){const r=N.decodeUTF8(e);if(r.length>t.maxUserIDLength)throw Error("User ID string is too long");const n=/^(?<name>[^()]+\s+)?(?<comment>\([^()]+\)\s+)?(?<email><\S+@\S+>)$/.exec(r);if(null!==n){const{name:e,comment:t,email:r}=n.groups;this.comment=t?.replace(/^\(|\)|\s$/g,"").trim()||"",this.name=e?.trim()||"",this.email=r.substring(1,r.length-1)}else/^[^\s@]+@[^\s@]+$/.test(r)&&(this.email=r);this.userID=r}write(){return N.encodeUTF8(this.userID)}equals(e){return e&&e.userID===this.userID}}class Ec extends mc{static get tag(){return M.packet.secretSubkey}constructor(e=new Date,t=L){super(e,t)}}class vc{static get tag(){return M.packet.trust}read(){throw new Jt("Trust packets are not supported")}write(){throw new Jt("Trust packets are not supported")}}class Bc{static get tag(){return M.packet.padding}constructor(){this.padding=null}read(e){}write(){return this.padding}async createPadding(e){this.padding=await pe(e)}}const Sc=/*#__PURE__*/N.constructAllowedPackets([Ho]);class Ic{constructor(e){this.packets=e||new Wo}write(){return this.packets.write()}armor(e=L){const t=this.packets.some((e=>e.constructor.tag===Ho.tag&&6!==e.version));return te(M.armor.signature,this.write(),void 0,void 0,void 0,t,e)}getSigningKeyIDs(){return this.packets.map((e=>e.issuerKeyID))}}async function Kc({armoredSignature:e,binarySignature:t,config:r,...n}){r={...L,...r};let i=e||t;if(!i)throw Error("readSignature: must pass options object containing `armoredSignature` or `binarySignature`");if(e&&!N.isString(e))throw Error("readSignature: options.armoredSignature must be a string");if(t&&!N.isUint8Array(t))throw Error("readSignature: options.binarySignature must be a Uint8Array");const s=Object.keys(n);if(s.length>0)throw Error("Unknown option: "+s.join(", "));if(e){const{type:e,data:t}=await ee(i);if(e!==M.armor.signature)throw Error("Armored text not of type signature");i=t}const a=await Wo.fromBinary(i,Sc,r);return new Ic(a)}async function Cc(e,t){const r=new Ec(e.date,t);return r.packets=null,r.algorithm=M.write(M.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function Uc(e,t){const r=new mc(e.date,t);return r.packets=null,r.algorithm=M.write(M.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function Pc(e,t,r,n,i=new Date,s){let a,o;for(let c=e.length-1;c>=0;c--)try{(!a||e[c].created>=a.created)&&(await e[c].verify(t,r,n,i,void 0,s),a=e[c])}catch(e){o=e}if(!a)throw N.wrapError(`Could not find valid ${M.read(M.signature,r)} signature in key ${t.getKeyID().toHex()}`.replace("certGeneric ","self-").replace(/([a-z])([A-Z])/g,((e,t,r)=>t+" "+r.toLowerCase())),o);return a}function Dc(e,t,r=new Date){const n=N.normalizeDate(r);if(null!==n){const r=Lc(e,t);return!(e.created<=n&&n<r)}return!1}async function xc(e,t,r,n){const i={};i.key=t,i.bind=e;const s={signatureType:M.signature.subkeyBinding};r.sign?(s.keyFlags=[M.keyFlags.signData],s.embeddedSignature=await Rc(i,[],e,{signatureType:M.signature.keyBinding},r.date,void 0,void 0,void 0,n)):s.keyFlags=r.forwarding?[M.keyFlags.forwardedCommunication]:[M.keyFlags.encryptCommunication|M.keyFlags.encryptStorage],r.keyExpirationTime>0&&(s.keyExpirationTime=r.keyExpirationTime,s.keyNeverExpires=!1);return await Rc(i,[],t,s,r.date,void 0,void 0,void 0,n)}async function Qc(e,t,r=new Date,n=[],i){if(t.algorithm===M.publicKey.pqc_mldsa_ed25519)return bs(t.algorithm);const s=M.hash.sha256,a=i.preferredHashAlgorithm,o=await Promise.all(e.map((async(e,t)=>(await e.getPrimarySelfSignature(r,n[t],i)).preferredHashAlgorithms||[]))),c=new Map;for(const e of o)for(const t of e)try{const e=M.write(M.hash,t);c.set(e,c.has(e)?c.get(e)+1:1)}catch{}const u=t=>0===e.length||c.get(t)===e.length||t===s,h=()=>{if(0===c.size)return s;const e=Array.from(c.keys()).filter((e=>u(e))).sort(((e,t)=>Me(e)-Me(t)))[0];return Me(e)>=Me(s)?e:s};if(new Set([M.publicKey.ecdsa,M.publicKey.eddsaLegacy,M.publicKey.ed25519,M.publicKey.ed448]).has(t.algorithm)){const e=function(e,t){switch(e){case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:return Ui(t);case M.publicKey.ed25519:case M.publicKey.ed448:return Zr(e);default:throw Error("Unknown elliptic signing algo")}}(t.algorithm,t.publicParams.oid),r=u(a),n=Me(a)>=Me(e);if(r&&n)return a;{const t=h();return Me(t)>=Me(e)?t:e}}return u(a)?a:h()}async function Rc(e,t,r,n,i,s,a=[],o=!1,c){if(r.isDummy())throw Error("Cannot sign with a gnu-dummy key.");if(!r.isDecrypted())throw Error("Signing key is not decrypted.");const u=new Ho;return Object.assign(u,n),u.publicKeyAlgorithm=r.algorithm,u.hashAlgorithm=await Qc(t,r,i,s,c),u.rawNotations=[...a],await u.sign(r,e,i,o,c),u}async function Tc(e,t,r,n=new Date,i){(e=e[r])&&(t[r].length?await Promise.all(e.map((async function(e){e.isExpired(n)||i&&!await i(e)||t[r].some((function(t){return N.equalsUint8Array(t.writeParams(),e.writeParams())}))||t[r].push(e)}))):t[r]=e)}async function Mc(e,t,r,n,i,s,a=new Date,o){s=s||e;const c=[];return await Promise.all(n.map((async function(e){try{if(!i||e.issuerKeyID.equals(i.issuerKeyID)){const n=![M.reasonForRevocation.keyRetired,M.reasonForRevocation.keySuperseded,M.reasonForRevocation.userIDInvalid].includes(e.reasonForRevocationFlag);await e.verify(s,t,r,n?null:a,!1,o),c.push(e.issuerKeyID)}}catch(e){}}))),i?(i.revoked=!!c.some((e=>e.equals(i.issuerKeyID)))||(i.revoked||!1),i.revoked):c.length>0}function Lc(e,t){let r;return!1===t.keyNeverExpires&&(r=e.created.getTime()+1e3*t.keyExpirationTime),r?new Date(r):1/0}function Fc(e,t={}){if(e.type=e.type||t.type,e.curve=e.curve||t.curve,e.rsaBits=e.rsaBits||t.rsaBits,e.symmetricHash=e.symmetricHash||t.symmetricHash,e.symmetricCipher=e.symmetricCipher||t.symmetricCipher,e.keyExpirationTime=void 0!==e.keyExpirationTime?e.keyExpirationTime:t.keyExpirationTime,e.passphrase=N.isString(e.passphrase)?e.passphrase:t.passphrase,e.date=e.date||t.date,e.sign=e.sign||!1,e.forwarding=e.forwarding||!1,e.sign&&e.forwarding)throw Error('Incompatible options: "sign" and "forwarding" cannot be set together');switch(e.type){case"pqc":e.sign?e.algorithm=M.publicKey.pqc_mldsa_ed25519:e.algorithm=M.publicKey.pqc_mlkem_x25519;break;case"ecc":try{e.curve=M.write(M.curve,e.curve)}catch(e){throw Error("Unknown curve")}e.curve!==M.curve.ed25519Legacy&&e.curve!==M.curve.curve25519Legacy&&"ed25519"!==e.curve&&"curve25519"!==e.curve||(e.curve=e.sign?M.curve.ed25519Legacy:M.curve.curve25519Legacy),e.sign?e.algorithm=e.curve===M.curve.ed25519Legacy?M.publicKey.eddsaLegacy:M.publicKey.ecdsa:e.algorithm=M.publicKey.ecdh;break;case"curve25519":e.algorithm=e.sign?M.publicKey.ed25519:M.publicKey.x25519;break;case"curve448":e.algorithm=e.sign?M.publicKey.ed448:M.publicKey.x448;break;case"rsa":e.algorithm=M.publicKey.rsaEncryptSign;break;case"symmetric":if(e.sign){e.algorithm=M.publicKey.hmac;try{e.symmetric=M.write(M.hash,e.symmetricHash)}catch(e){throw Error("Unknown hash algorithm")}}else{e.algorithm=M.publicKey.aead;try{e.symmetric=M.write(M.symmetric,e.symmetricCipher)}catch(e){throw Error("Unknown symmetric algorithm")}}break;default:throw Error("Unsupported key type "+e.type)}return e}function Nc(e,t,r){switch(e.algorithm){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:case M.publicKey.dsa:case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:case M.publicKey.ed25519:case M.publicKey.ed448:case M.publicKey.hmac:case M.publicKey.pqc_mldsa_ed25519:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||!!(t.keyFlags[0]&M.keyFlags.signData);default:return!1}}function Oc(e,t,r){switch(e.algorithm){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.elgamal:case M.publicKey.ecdh:case M.publicKey.x25519:case M.publicKey.x448:case M.publicKey.aead:case M.publicKey.pqc_mlkem_x25519:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||!!(t.keyFlags[0]&M.keyFlags.encryptCommunication)||!!(t.keyFlags[0]&M.keyFlags.encryptStorage);default:return!1}}function _c(e,t,r){if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");switch(e.algorithm){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaEncrypt:case M.publicKey.elgamal:case M.publicKey.ecdh:case M.publicKey.x25519:case M.publicKey.x448:case M.publicKey.pqc_mlkem_x25519:return!(!(!t.keyFlags||!!(t.keyFlags[0]&M.keyFlags.signData))||!r.allowInsecureDecryptionWithSigningKeys)||(!t.keyFlags||!!(t.keyFlags[0]&M.keyFlags.encryptCommunication)||!!(t.keyFlags[0]&M.keyFlags.encryptStorage)||r.allowForwardedMessages&&!!(t.keyFlags[0]&M.keyFlags.forwardedCommunication));default:return!1}}function Hc(e,t){const r=M.write(M.publicKey,e.algorithm),n=e.getAlgorithmInfo();if(t.rejectPublicKeyAlgorithms.has(r))throw Error(n.algorithm+" keys are considered too weak.");switch(r){case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:case M.publicKey.rsaEncrypt:if(n.bits<t.minRSABits)throw Error(`RSA keys shorter than ${t.minRSABits} bits are considered too weak.`);break;case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:case M.publicKey.ecdh:if(t.rejectCurves.has(n.curve))throw Error(`Support for ${n.algorithm} keys using curve ${n.curve} is disabled.`)}}class zc{constructor(e,t){this.userID=e.constructor.tag===M.packet.userID?e:null,this.userAttribute=e.constructor.tag===M.packet.userAttribute?e:null,this.selfCertifications=[],this.otherCertifications=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new Wo;return e.push(this.userID||this.userAttribute),e.push(...this.revocationSignatures),e.push(...this.selfCertifications),e.push(...this.otherCertifications),e}clone(){const e=new zc(this.userID||this.userAttribute,this.mainKey);return e.selfCertifications=[...this.selfCertifications],e.otherCertifications=[...this.otherCertifications],e.revocationSignatures=[...this.revocationSignatures],e}async certify(e,t,r){const n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n},s=new zc(i.userID||i.userAttribute,this.mainKey);return s.otherCertifications=await Promise.all(e.map((async function(e){if(!e.isPrivate())throw Error("Need private key for signing");if(e.hasSameFingerprintAs(n))throw Error("The user's own key can only be used for self-certifications");const s=await e.getSigningKey(void 0,t,void 0,r);return Rc(i,[e],s.keyPacket,{signatureType:M.signature.certGeneric,keyFlags:[M.keyFlags.certifyKeys|M.keyFlags.signData]},t,void 0,void 0,void 0,r)}))),await s.update(this,t,r),s}async isRevoked(e,t,r=new Date,n=L){const i=this.mainKey.keyPacket;return Mc(i,M.signature.certRevocation,{key:i,userID:this.userID,userAttribute:this.userAttribute},this.revocationSignatures,e,t,r,n)}async verifyCertificate(e,t,r=new Date,n){const i=this,s=this.mainKey.keyPacket,a={userID:this.userID,userAttribute:this.userAttribute,key:s},{issuerKeyID:o}=e,c=t.filter((e=>e.getKeys(o).length>0));return 0===c.length?null:(await Promise.all(c.map((async t=>{const s=await t.getSigningKey(o,e.created,void 0,n);if(e.revoked||await i.isRevoked(e,s.keyPacket,r,n))throw Error("User certificate is revoked");try{await e.verify(s.keyPacket,M.signature.certGeneric,a,r,void 0,n)}catch(e){throw N.wrapError("User certificate is invalid",e)}}))),!0)}async verifyAllCertifications(e,t=new Date,r){const n=this,i=this.selfCertifications.concat(this.otherCertifications);return Promise.all(i.map((async i=>({keyID:i.issuerKeyID,valid:await n.verifyCertificate(i,e,t,r).catch((()=>!1))}))))}async verify(e=new Date,t){if(!this.selfCertifications.length)throw Error("No self-certifications found");const r=this,n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n};let s;for(let a=this.selfCertifications.length-1;a>=0;a--)try{const s=this.selfCertifications[a];if(s.revoked||await r.isRevoked(s,void 0,e,t))throw Error("Self-certification is revoked");try{await s.verify(n,M.signature.certGeneric,i,e,void 0,t)}catch(e){throw N.wrapError("Self-certification is invalid",e)}return!0}catch(e){s=e}throw s}async update(e,t,r){const n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n};await Tc(e,this,"selfCertifications",t,(async function(e){try{return await e.verify(n,M.signature.certGeneric,i,t,!1,r),!0}catch(e){return!1}})),await Tc(e,this,"otherCertifications",t),await Tc(e,this,"revocationSignatures",t,(function(e){return Mc(n,M.signature.certRevocation,i,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=M.reasonForRevocation.noReason,string:r=""}={},n=new Date,i=L){const s={userID:this.userID,userAttribute:this.userAttribute,key:e},a=new zc(s.userID||s.userAttribute,this.mainKey);return a.revocationSignatures.push(await Rc(s,[],e,{signatureType:M.signature.certRevocation,reasonForRevocationFlag:M.write(M.reasonForRevocation,t),reasonForRevocationString:r},n,void 0,void 0,!1,i)),await a.update(this),a}}class Gc{constructor(e,t){this.keyPacket=e,this.bindingSignatures=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new Wo;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.bindingSignatures),e}clone(){const e=new Gc(this.keyPacket,this.mainKey);return e.bindingSignatures=[...this.bindingSignatures],e.revocationSignatures=[...this.revocationSignatures],e}async isRevoked(e,t,r=new Date,n=L){const i=this.mainKey.keyPacket;return Mc(i,M.signature.subkeyRevocation,{key:i,bind:this.keyPacket},this.revocationSignatures,e,t,r,n)}async verify(e=new Date,t=L){const r=this.mainKey.keyPacket,n={key:r,bind:this.keyPacket},i=await Pc(this.bindingSignatures,r,M.signature.subkeyBinding,n,e,t);if(i.revoked||await this.isRevoked(i,null,e,t))throw Error("Subkey is revoked");if(Dc(this.keyPacket,i,e))throw Error("Subkey is expired");return i}async getExpirationTime(e=new Date,t=L){const r=this.mainKey.keyPacket,n={key:r,bind:this.keyPacket};let i;try{i=await Pc(this.bindingSignatures,r,M.signature.subkeyBinding,n,e,t)}catch(e){return null}const s=Lc(this.keyPacket,i),a=i.getExpirationTime();return s<a?s:a}async update(e,t=new Date,r=L){const n=this.mainKey.keyPacket;if(!this.hasSameFingerprintAs(e))throw Error("Subkey update method: fingerprints of subkeys not equal");this.keyPacket.constructor.tag===M.packet.publicSubkey&&e.keyPacket.constructor.tag===M.packet.secretSubkey&&(this.keyPacket=e.keyPacket);const i=this,s={key:n,bind:i.keyPacket};await Tc(e,this,"bindingSignatures",t,(async function(e){for(let t=0;t<i.bindingSignatures.length;t++)if(i.bindingSignatures[t].issuerKeyID.equals(e.issuerKeyID))return e.created>i.bindingSignatures[t].created&&(i.bindingSignatures[t]=e),!1;try{return await e.verify(n,M.signature.subkeyBinding,s,t,void 0,r),!0}catch(e){return!1}})),await Tc(e,this,"revocationSignatures",t,(function(e){return Mc(n,M.signature.subkeyRevocation,s,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=M.reasonForRevocation.noReason,string:r=""}={},n=new Date,i=L){const s={key:e,bind:this.keyPacket},a=new Gc(this.keyPacket,this.mainKey);return a.revocationSignatures.push(await Rc(s,[],e,{signatureType:M.signature.subkeyRevocation,reasonForRevocationFlag:M.write(M.reasonForRevocation,t),reasonForRevocationString:r},n,void 0,void 0,!1,i)),await a.update(this),a}hasSameFingerprintAs(e){return this.keyPacket.hasSameFingerprintAs(e.keyPacket||e)}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","isDecrypted"].forEach((e=>{Gc.prototype[e]=function(){return this.keyPacket[e]()}}));const qc=/*#__PURE__*/N.constructAllowedPackets([Ho]),jc=new Set([M.packet.publicKey,M.packet.privateKey]),Vc=new Set([M.packet.publicKey,M.packet.privateKey,M.packet.publicSubkey,M.packet.privateSubkey]);class Yc{packetListToStructure(e,t=new Set){let r,n,i,s;for(const a of e){if(a instanceof $t){Vc.has(a.tag)&&!s&&(s=jc.has(a.tag)?jc:Vc);continue}const e=a.constructor.tag;if(s){if(!s.has(e))continue;s=null}if(t.has(e))throw Error("Unexpected packet type: "+e);switch(e){case M.packet.publicKey:case M.packet.secretKey:if(this.keyPacket)throw Error("Key block contains multiple keys");if(this.keyPacket=a,n=this.getKeyID(),!n)throw Error("Missing Key ID");break;case M.packet.userID:case M.packet.userAttribute:r=new zc(a,this),this.users.push(r);break;case M.packet.publicSubkey:case M.packet.secretSubkey:r=null,i=new Gc(a,this),this.subkeys.push(i);break;case M.packet.signature:switch(a.signatureType){case M.signature.certGeneric:case M.signature.certPersona:case M.signature.certCasual:case M.signature.certPositive:if(!r){N.printDebug("Dropping certification signatures without preceding user packet");continue}a.issuerKeyID.equals(n)?r.selfCertifications.push(a):r.otherCertifications.push(a);break;case M.signature.certRevocation:r?r.revocationSignatures.push(a):this.directSignatures.push(a);break;case M.signature.key:this.directSignatures.push(a);break;case M.signature.subkeyBinding:if(!i){N.printDebug("Dropping subkey binding signature without preceding subkey packet");continue}i.bindingSignatures.push(a);break;case M.signature.keyRevocation:this.revocationSignatures.push(a);break;case M.signature.subkeyRevocation:if(!i){N.printDebug("Dropping subkey revocation signature without preceding subkey packet");continue}i.revocationSignatures.push(a)}}}}toPacketList(){const e=new Wo;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.directSignatures),this.users.map((t=>e.push(...t.toPacketList()))),this.subkeys.map((t=>e.push(...t.toPacketList()))),e}clone(e=!1){const t=new this.constructor(this.toPacketList());return e&&t.getKeys().forEach((e=>{if(e.keyPacket=Object.create(Object.getPrototypeOf(e.keyPacket),Object.getOwnPropertyDescriptors(e.keyPacket)),!e.keyPacket.isDecrypted())return;const t={};Object.keys(e.keyPacket.privateParams).forEach((r=>{t[r]=new Uint8Array(e.keyPacket.privateParams[r])})),e.keyPacket.privateParams=t})),t}getSubkeys(e=null){return this.subkeys.filter((t=>!e||t.getKeyID().equals(e,!0)))}getKeys(e=null){const t=[];return e&&!this.getKeyID().equals(e,!0)||t.push(this),t.concat(this.getSubkeys(e))}getKeyIDs(){return this.getKeys().map((e=>e.getKeyID()))}getUserIDs(){return this.users.map((e=>e.userID?e.userID.userID:null)).filter((e=>null!==e))}write(){return this.toPacketList().write()}async getSigningKey(e=null,t=new Date,r={},n=L){await this.verifyPrimaryKey(t,r,n);const i=this.keyPacket;try{Hc(i,n)}catch(e){throw N.wrapError("Could not verify primary key",e)}const s=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created));let a;for(const r of s)if(!e||r.getKeyID().equals(e))try{await r.verify(t,n);const e={key:i,bind:r.keyPacket},s=await Pc(r.bindingSignatures,i,M.signature.subkeyBinding,e,t,n);if(!Nc(r.keyPacket,s,n))continue;if(!s.embeddedSignature)throw Error("Missing embedded signature");return await Pc([s.embeddedSignature],r.keyPacket,M.signature.keyBinding,e,t,n),Hc(r.keyPacket,n),r}catch(e){a=e}try{const s=await this.getPrimarySelfSignature(t,r,n);if((!e||i.getKeyID().equals(e))&&Nc(i,s,n))return Hc(i,n),this}catch(e){a=e}throw N.wrapError("Could not find valid signing key packet in key "+this.getKeyID().toHex(),a)}async getEncryptionKey(e,t=new Date,r={},n=L){await this.verifyPrimaryKey(t,r,n);const i=this.keyPacket;try{Hc(i,n)}catch(e){throw N.wrapError("Could not verify primary key",e)}const s=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created));let a;for(const r of s)if(!e||r.getKeyID().equals(e))try{await r.verify(t,n);const e={key:i,bind:r.keyPacket},s=await Pc(r.bindingSignatures,i,M.signature.subkeyBinding,e,t,n);if(Oc(r.keyPacket,s,n))return Hc(r.keyPacket,n),r}catch(e){a=e}try{const s=await this.getPrimarySelfSignature(t,r,n);if((!e||i.getKeyID().equals(e))&&Oc(i,s,n))return Hc(i,n),this}catch(e){a=e}throw N.wrapError("Could not find valid encryption key packet in key "+this.getKeyID().toHex(),a)}async isRevoked(e,t,r=new Date,n=L){return Mc(this.keyPacket,M.signature.keyRevocation,{key:this.keyPacket},this.revocationSignatures,e,t,r,n)}async verifyPrimaryKey(e=new Date,t={},r=L){const n=this.keyPacket;if(await this.isRevoked(null,null,e,r))throw Error("Primary key is revoked");if(Dc(n,await this.getPrimarySelfSignature(e,t,r),e))throw Error("Primary key is expired");if(6!==n.version){const t=await Pc(this.directSignatures,n,M.signature.key,{key:n},e,r).catch((()=>{}));if(t&&Dc(n,t,e))throw Error("Primary key is expired")}}async getExpirationTime(e,t=L){let r;try{const n=await this.getPrimarySelfSignature(null,e,t),i=Lc(this.keyPacket,n),s=n.getExpirationTime(),a=6!==this.keyPacket.version&&await Pc(this.directSignatures,this.keyPacket,M.signature.key,{key:this.keyPacket},null,t).catch((()=>{}));if(a){const e=Lc(this.keyPacket,a);r=Math.min(i,s,e)}else r=i<s?i:s}catch(e){r=null}return N.normalizeDate(r)}async getPrimarySelfSignature(e=new Date,t={},r=L){const n=this.keyPacket;if(6===n.version)return Pc(this.directSignatures,n,M.signature.key,{key:n},e,r);const{selfCertification:i}=await this.getPrimaryUser(e,t,r);return i}async getPrimaryUser(e=new Date,t={},r=L){const n=this.keyPacket,i=[];let s;for(let a=0;a<this.users.length;a++)try{const s=this.users[a];if(!s.userID)continue;if(void 0!==t.name&&s.userID.name!==t.name||void 0!==t.email&&s.userID.email!==t.email||void 0!==t.comment&&s.userID.comment!==t.comment)throw Error("Could not find user that matches that user ID");const o={userID:s.userID,key:n},c=await Pc(s.selfCertifications,n,M.signature.certGeneric,o,e,r);i.push({index:a,user:s,selfCertification:c})}catch(e){s=e}if(!i.length)throw s||Error("Could not find primary user");await Promise.all(i.map((async function(t){return t.selfCertification.revoked||t.user.isRevoked(t.selfCertification,null,e,r)})));const a=i.sort((function(e,t){const r=e.selfCertification,n=t.selfCertification;return n.revoked-r.revoked||r.isPrimaryUserID-n.isPrimaryUserID||r.created-n.created})).pop(),{user:o,selfCertification:c}=a;if(c.revoked||await o.isRevoked(c,null,e,r))throw Error("Primary user is revoked");return a}async update(e,t=new Date,r=L){if(!this.hasSameFingerprintAs(e))throw Error("Primary key fingerprints must be equal to update the key");if(!this.isPrivate()&&e.isPrivate()){if(!(this.subkeys.length===e.subkeys.length&&this.subkeys.every((t=>e.subkeys.some((e=>t.hasSameFingerprintAs(e)))))))throw Error("Cannot update public key with private key if subkeys mismatch");return e.update(this,r)}const n=this.clone();return await Tc(e,n,"revocationSignatures",t,(i=>Mc(n.keyPacket,M.signature.keyRevocation,n,[i],null,e.keyPacket,t,r))),await Tc(e,n,"directSignatures",t),await Promise.all(e.users.map((async e=>{const i=n.users.filter((t=>e.userID&&e.userID.equals(t.userID)||e.userAttribute&&e.userAttribute.equals(t.userAttribute)));if(i.length>0)await Promise.all(i.map((n=>n.update(e,t,r))));else{const t=e.clone();t.mainKey=n,n.users.push(t)}}))),await Promise.all(e.subkeys.map((async e=>{const i=n.subkeys.filter((t=>t.hasSameFingerprintAs(e)));if(i.length>0)await Promise.all(i.map((n=>n.update(e,t,r))));else{const t=e.clone();t.mainKey=n,n.subkeys.push(t)}}))),n}async getRevocationCertificate(e=new Date,t=L){const r={key:this.keyPacket},n=await Pc(this.revocationSignatures,this.keyPacket,M.signature.keyRevocation,r,e,t),i=new Wo;i.push(n);const s=6!==this.keyPacket.version;return te(M.armor.publicKey,i.write(),null,null,"This is a revocation certificate",s,t)}async applyRevocationCertificate(e,t=new Date,r=L){const n=await ee(e),i=(await Wo.fromBinary(n.data,qc,r)).findPacket(M.packet.signature);if(!i||i.signatureType!==M.signature.keyRevocation)throw Error("Could not find revocation signature packet");if(!i.issuerKeyID.equals(this.getKeyID()))throw Error("Revocation signature does not match key");try{await i.verify(this.keyPacket,M.signature.keyRevocation,{key:this.keyPacket},t,void 0,r)}catch(e){throw N.wrapError("Could not verify revocation signature",e)}const s=this.clone();return s.revocationSignatures.push(i),s}async signPrimaryUser(e,t,r,n=L){const{index:i,user:s}=await this.getPrimaryUser(t,r,n),a=await s.certify(e,t,n),o=this.clone();return o.users[i]=a,o}async signAllUsers(e,t=new Date,r=L){const n=this.clone();return n.users=await Promise.all(this.users.map((function(n){return n.certify(e,t,r)}))),n}async verifyPrimaryUser(e,t=new Date,r,n=L){const i=this.keyPacket,{user:s}=await this.getPrimaryUser(t,r,n);return e?await s.verifyAllCertifications(e,t,n):[{keyID:i.getKeyID(),valid:await s.verify(t,n).catch((()=>!1))}]}async verifyAllUsers(e,t=new Date,r=L){const n=this.keyPacket,i=[];return await Promise.all(this.users.map((async s=>{const a=e?await s.verifyAllCertifications(e,t,r):[{keyID:n.getKeyID(),valid:await s.verify(t,r).catch((()=>!1))}];i.push(...a.map((e=>({userID:s.userID?s.userID.userID:null,userAttribute:s.userAttribute,keyID:e.keyID,valid:e.valid}))))}))),i}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","hasSameFingerprintAs"].forEach((e=>{Yc.prototype[e]=Gc.prototype[e]}));class Zc extends Yc{constructor(e){if(super(),this.keyPacket=null,this.revocationSignatures=[],this.directSignatures=[],this.users=[],this.subkeys=[],e&&(this.packetListToStructure(e,new Set([M.packet.secretKey,M.packet.secretSubkey])),!this.keyPacket))throw Error("Invalid key: missing public-key packet")}isPrivate(){return!1}toPublic(){return this}armor(e=L){const t=6!==this.keyPacket.version;return te(M.armor.publicKey,this.toPacketList().write(),void 0,void 0,void 0,t,e)}}class Wc extends Zc{constructor(e){if(super(),this.packetListToStructure(e,new Set([M.packet.publicKey,M.packet.publicSubkey])),!this.keyPacket)throw Error("Invalid key: missing private-key packet")}isPrivate(){return!0}toPublic(){const e=new Wo,t=this.toPacketList();let r=!1;for(const n of t)if(!r||n.constructor.tag!==M.packet.Signature)switch(r&&(r=!1),n.constructor.tag){case M.packet.secretKey:{if(n.algorithm===M.publicKey.aead||n.algorithm===M.publicKey.hmac)throw Error("Cannot create public key from symmetric private");const t=fc.fromSecretKeyPacket(n);e.push(t);break}case M.packet.secretSubkey:{if(n.algorithm===M.publicKey.aead||n.algorithm===M.publicKey.hmac){r=!0;break}const t=Ac.fromSecretSubkeyPacket(n);e.push(t);break}default:e.push(n)}return new Zc(e)}armor(e=L){const t=6!==this.keyPacket.version;return te(M.armor.privateKey,this.toPacketList().write(),void 0,void 0,void 0,t,e)}async getDecryptionKeys(e,t=new Date,r={},n=L){const i=this.keyPacket,s=[];let a=null;for(let r=0;r<this.subkeys.length;r++)if(!e||this.subkeys[r].getKeyID().equals(e,!0)){if(this.subkeys[r].keyPacket.isDummy()){a=a||Error("Gnu-dummy key packets cannot be used for decryption");continue}try{const e={key:i,bind:this.subkeys[r].keyPacket},a=await Pc(this.subkeys[r].bindingSignatures,i,M.signature.subkeyBinding,e,t,n);_c(this.subkeys[r].keyPacket,a,n)&&s.push(this.subkeys[r])}catch(e){a=e}}const o=await this.getPrimarySelfSignature(t,r,n);if(e&&!i.getKeyID().equals(e,!0)||!_c(i,o,n)||(i.isDummy()?a=a||Error("Gnu-dummy key packets cannot be used for decryption"):s.push(this)),0===s.length)throw a||Error("No decryption key packets found");return s}isDecrypted(){return this.getKeys().some((({keyPacket:e})=>e.isDecrypted()))}async validate(e=L){if(!this.isPrivate())throw Error("Cannot validate a public key");let t;if(this.keyPacket.isDummy()){const r=await this.getSigningKey(null,null,void 0,{...e,rejectPublicKeyAlgorithms:new Set,minRSABits:0});r&&!r.keyPacket.isDummy()&&(t=r.keyPacket)}else t=this.keyPacket;if(t)return t.validate();{const e=this.getKeys();if(e.map((e=>e.keyPacket.isDummy())).every(Boolean))throw Error("Cannot validate an all-gnu-dummy key");return Promise.all(e.map((async e=>e.keyPacket.validate())))}}clearPrivateParams(){this.getKeys().forEach((({keyPacket:e})=>{e.isDecrypted()&&e.clearPrivateParams()}))}async revoke({flag:e=M.reasonForRevocation.noReason,string:t=""}={},r=new Date,n=L){if(!this.isPrivate())throw Error("Need private key for revoking");const i={key:this.keyPacket},s=this.clone();return s.revocationSignatures.push(await Rc(i,[],this.keyPacket,{signatureType:M.signature.keyRevocation,reasonForRevocationFlag:M.write(M.reasonForRevocation,e),reasonForRevocationString:t},r,void 0,void 0,void 0,n)),s}async addSubkey(e={}){const t={...L,...e.config};if(e.passphrase)throw Error("Subkey could not be encrypted here, please encrypt whole key");if(e.rsaBits<t.minRSABits)throw Error(`rsaBits should be at least ${t.minRSABits}, got: ${e.rsaBits}`);const r=this.keyPacket;if(r.isDummy())throw Error("Cannot add subkey to gnu-dummy primary key");if(!r.isDecrypted())throw Error("Key is not decrypted");const n=r.getAlgorithmInfo();n.type=function(e){switch(M.write(M.publicKey,e)){case M.publicKey.rsaEncrypt:case M.publicKey.rsaEncryptSign:case M.publicKey.rsaSign:case M.publicKey.dsa:return"rsa";case M.publicKey.ecdsa:case M.publicKey.eddsaLegacy:return"ecc";case M.publicKey.ed25519:return"curve25519";case M.publicKey.ed448:return"curve448";default:throw Error("Unsupported algorithm")}}(n.algorithm),n.rsaBits=n.bits||4096,n.curve=n.curve||"curve25519Legacy",e=Fc(e,n);const i=await Cc(e,{...t,v6Keys:6===this.keyPacket.version});Hc(i,t);const s=await xc(i,r,e,t),a=this.toPacketList();return a.push(i,s),new Wc(a)}}const Jc=/*#__PURE__*/N.constructAllowedPackets([fc,Ac,mc,Ec,kc,wc,Ho]);function Xc(e){for(const t of e)switch(t.constructor.tag){case M.packet.secretKey:return new Wc(e);case M.packet.publicKey:return new Zc(e)}throw Error("No key packet found")}async function $c(e,t,r,n){r.passphrase&&await e.encrypt(r.passphrase,n),await Promise.all(t.map((async function(e,t){const i=r.subkeys[t].passphrase;i&&await e.encrypt(i,n)})));const i=new Wo;function s(e,t){return[t,...e.filter((e=>e!==t))]}function a(){const t={};t.keyFlags=[M.keyFlags.certifyKeys|M.keyFlags.signData];const i=s([M.symmetric.aes256,M.symmetric.aes128],n.preferredSymmetricAlgorithm);if(t.preferredSymmetricAlgorithms=i,n.aeadProtect){const e=s([M.aead.gcm,M.aead.eax,M.aead.ocb],n.preferredAEADAlgorithm);t.preferredCipherSuites=e.flatMap((e=>i.map((t=>[t,e]))))}return t.preferredHashAlgorithms=s([M.hash.sha512,M.hash.sha256,...6===e.version?[M.hash.sha3_512,M.hash.sha3_256]:[]],n.preferredHashAlgorithm),t.preferredCompressionAlgorithms=s([M.compression.uncompressed,M.compression.zlib,M.compression.zip],n.preferredCompressionAlgorithm),t.features=[0],t.features[0]|=M.features.modificationDetection,n.aeadProtect&&(t.features[0]|=M.features.seipdv2),r.keyExpirationTime>0&&(t.keyExpirationTime=r.keyExpirationTime,t.keyNeverExpires=!1),t}if(i.push(e),6===e.version){const t={key:e},s=a();s.signatureType=M.signature.key;const o=await Rc(t,[],e,s,r.date,void 0,void 0,void 0,n);i.push(o)}await Promise.all(r.userIDs.map((async function(t,i){const s=kc.fromObject(t),o={userID:s,key:e},c=6!==e.version?a():{};c.signatureType=M.signature.certPositive,0===i&&(c.isPrimaryUserID=!0);return{userIDPacket:s,signaturePacket:await Rc(o,[],e,c,r.date,void 0,void 0,void 0,n)}}))).then((e=>{e.forEach((({userIDPacket:e,signaturePacket:t})=>{i.push(e),i.push(t)}))})),await Promise.all(t.map((async function(t,i){const s=r.subkeys[i];return{secretSubkeyPacket:t,subkeySignaturePacket:await xc(t,e,s,n)}}))).then((e=>{e.forEach((({secretSubkeyPacket:e,subkeySignaturePacket:t})=>{i.push(e),i.push(t)}))}));const o={key:e};return i.push(await Rc(o,[],e,{signatureType:M.signature.keyRevocation,reasonForRevocationFlag:M.reasonForRevocation.noReason,reasonForRevocationString:""},r.date,void 0,void 0,void 0,n)),r.passphrase&&e.clearPrivateParams(),await Promise.all(t.map((async function(e,t){r.subkeys[t].passphrase&&e.clearPrivateParams()}))),new Wc(i)}async function eu({armoredKey:e,binaryKey:t,config:r,...n}){if(r={...L,...r},!e&&!t)throw Error("readKey: must pass options object containing `armoredKey` or `binaryKey`");if(e&&!N.isString(e))throw Error("readKey: options.armoredKey must be a string");if(t&&!N.isUint8Array(t))throw Error("readKey: options.binaryKey must be a Uint8Array");const i=Object.keys(n);if(i.length>0)throw Error("Unknown option: "+i.join(", "));let s;if(e){const{type:t,data:r}=await ee(e);if(t!==M.armor.publicKey&&t!==M.armor.privateKey)throw Error("Armored text not of type key");s=r}else s=t;const a=await Wo.fromBinary(s,Jc,r),o=a.indexOfTag(M.packet.publicKey,M.packet.secretKey);if(0===o.length)throw Error("No key packet found");return Xc(a.slice(o[0],o[1]))}async function tu({armoredKey:e,binaryKey:t,config:r,...n}){if(r={...L,...r},!e&&!t)throw Error("readPrivateKey: must pass options object containing `armoredKey` or `binaryKey`");if(e&&!N.isString(e))throw Error("readPrivateKey: options.armoredKey must be a string");if(t&&!N.isUint8Array(t))throw Error("readPrivateKey: options.binaryKey must be a Uint8Array");const i=Object.keys(n);if(i.length>0)throw Error("Unknown option: "+i.join(", "));let s;if(e){const{type:t,data:r}=await ee(e);if(t!==M.armor.privateKey)throw Error("Armored text not of type private key");s=r}else s=t;const a=await Wo.fromBinary(s,Jc,r),o=a.indexOfTag(M.packet.publicKey,M.packet.secretKey);for(let e=0;e<o.length;e++){if(a[o[e]].constructor.tag===M.packet.publicKey)continue;const t=a.slice(o[e],o[e+1]);return new Wc(t)}throw Error("No secret key packet found")}async function ru({armoredKeys:e,binaryKeys:t,config:r,...n}){r={...L,...r};let i=e||t;if(!i)throw Error("readKeys: must pass options object containing `armoredKeys` or `binaryKeys`");if(e&&!N.isString(e))throw Error("readKeys: options.armoredKeys must be a string");if(t&&!N.isUint8Array(t))throw Error("readKeys: options.binaryKeys must be a Uint8Array");const s=Object.keys(n);if(s.length>0)throw Error("Unknown option: "+s.join(", "));if(e){const{type:t,data:r}=await ee(e);if(t!==M.armor.publicKey&&t!==M.armor.privateKey)throw Error("Armored text not of type key");i=r}const a=[],o=await Wo.fromBinary(i,Jc,r),c=o.indexOfTag(M.packet.publicKey,M.packet.secretKey);if(0===c.length)throw Error("No key packet found");for(let e=0;e<c.length;e++){const t=Xc(o.slice(c[e],c[e+1]));a.push(t)}return a}async function nu({armoredKeys:e,binaryKeys:t,config:r}){r={...L,...r};let n=e||t;if(!n)throw Error("readPrivateKeys: must pass options object containing `armoredKeys` or `binaryKeys`");if(e&&!N.isString(e))throw Error("readPrivateKeys: options.armoredKeys must be a string");if(t&&!N.isUint8Array(t))throw Error("readPrivateKeys: options.binaryKeys must be a Uint8Array");if(e){const{type:t,data:r}=await ee(e);if(t!==M.armor.privateKey)throw Error("Armored text not of type private key");n=r}const i=[],s=await Wo.fromBinary(n,Jc,r),a=s.indexOfTag(M.packet.publicKey,M.packet.secretKey);for(let e=0;e<a.length;e++){if(s[a[e]].constructor.tag===M.packet.publicKey)continue;const t=s.slice(a[e],a[e+1]),r=new Wc(t);i.push(r)}if(0===i.length)throw Error("No secret key packet found");return i}const iu=/*#__PURE__*/N.constructAllowedPackets([Lo,Xo,cc,sc,pc,hc,yc,qo,Ho]),su=/*#__PURE__*/N.constructAllowedPackets([yc]),au=/*#__PURE__*/N.constructAllowedPackets([Ho]);class ou{constructor(e){this.packets=e||new Wo}getEncryptionKeyIDs(){const e=[];return this.packets.filterByTag(M.packet.publicKeyEncryptedSessionKey).forEach((function(t){e.push(t.publicKeyID)})),e}getSigningKeyIDs(){const e=this.unwrapCompressed(),t=e.packets.filterByTag(M.packet.onePassSignature);if(t.length>0)return t.map((e=>e.issuerKeyID));return e.packets.filterByTag(M.packet.signature).map((e=>e.issuerKeyID))}async decrypt(e,t,r,n=new Date,i=L){const s=this.packets.filterByTag(M.packet.symmetricallyEncryptedData,M.packet.symEncryptedIntegrityProtectedData,M.packet.aeadEncryptedData);if(0===s.length)throw Error("No encrypted data found");const a=s[0],o=a.cipherAlgorithm,c=r||await this.decryptSessionKeys(e,t,o,n,i);let u=null;const h=Promise.all(c.map((async({algorithm:e,data:t})=>{if(!N.isUint8Array(t)||!a.cipherAlgorithm&&!N.isString(e))throw Error("Invalid session key for decryption.");try{const r=a.cipherAlgorithm||M.write(M.symmetric,e);await a.decrypt(r,t,i)}catch(e){N.printDebugError(e),u=e}})));if(D(a.encrypted),a.encrypted=null,await h,!a.packets||!a.packets.length)throw u||Error("Decryption failed.");const l=new ou(a.packets);return a.packets=new Wo,l}async decryptSessionKeys(e,t,r,n=new Date,i=L){let s,a=[];if(t){const e=this.packets.filterByTag(M.packet.symEncryptedSessionKey);if(0===e.length)throw Error("No symmetrically encrypted session key packet found.");await Promise.all(t.map((async function(t,r){let n;n=r?await Wo.fromBinary(e.write(),su,i):e,await Promise.all(n.map((async function(e){try{await e.decrypt(t),a.push(e)}catch(e){N.printDebugError(e),e instanceof Ra&&(s=e)}})))})))}else{if(!e)throw Error("No key or password specified.");{const t=this.packets.filterByTag(M.packet.publicKeyEncryptedSessionKey);if(0===t.length)throw Error("No public key encrypted session key packet found.");await Promise.all(t.map((async function(t){await Promise.all(e.map((async function(e){let o;try{o=(await e.getDecryptionKeys(t.publicKeyID,null,void 0,i)).map((e=>e.keyPacket))}catch(e){return void(s=e)}let c=[M.symmetric.aes256,M.symmetric.aes128,M.symmetric.tripledes,M.symmetric.cast5];try{const t=await e.getPrimarySelfSignature(n,void 0,i);t.preferredSymmetricAlgorithms&&(c=c.concat(t.preferredSymmetricAlgorithms))}catch(e){}await Promise.all(o.map((async function(e){if(!e.isDecrypted())throw Error("Decryption key is not decrypted.");if(i.constantTimePKCS1Decryption&&(t.publicKeyAlgorithm===M.publicKey.rsaEncrypt||t.publicKeyAlgorithm===M.publicKey.rsaEncryptSign||t.publicKeyAlgorithm===M.publicKey.rsaSign||t.publicKeyAlgorithm===M.publicKey.elgamal)){const n=t.write();await Promise.all((r?[r]:Array.from(i.constantTimePKCS1DecryptionSupportedSymmetricAlgorithms)).map((async t=>{const r=new hc;r.read(n);const i={sessionKeyAlgorithm:t,sessionKey:Ua(t)};try{await r.decrypt(e,i),a.push(r)}catch(e){N.printDebugError(e),s=e}})))}else try{await t.decrypt(e);const n=r||t.sessionKeyAlgorithm;if(n&&!c.includes(M.write(M.symmetric,n)))throw Error("A non-preferred symmetric algorithm was used.");a.push(t)}catch(e){N.printDebugError(e),s=e}})))}))),D(t.encrypted),t.encrypted=null})))}}if(a.length>0){if(a.length>1){const e=new Set;a=a.filter((t=>{const r=t.sessionKeyAlgorithm+N.uint8ArrayToString(t.sessionKey);return!e.has(r)&&(e.add(r),!0)}))}return a.map((e=>({data:e.sessionKey,algorithm:e.sessionKeyAlgorithm&&M.read(M.symmetric,e.sessionKeyAlgorithm)})))}throw s||Error("Session key decryption failed.")}getLiteralData(){const e=this.unwrapCompressed().packets.findPacket(M.packet.literalData);return e&&e.getBytes()||null}getFilename(){const e=this.unwrapCompressed().packets.findPacket(M.packet.literalData);return e&&e.getFilename()||null}getText(){const e=this.unwrapCompressed().packets.findPacket(M.packet.literalData);return e?e.getText():null}static async generateSessionKey(e=[],t=new Date,r=[],n=L){const{symmetricAlgo:i,aeadAlgo:s}=await async function(e=[],t=new Date,r=[],n=L){const i=await Promise.all(e.map(((e,i)=>e.getPrimarySelfSignature(t,r[i],n))));if(e.length?!n.ignoreSEIPDv2FeatureFlag&&i.every((e=>e.features&&e.features[0]&M.features.seipdv2)):n.aeadProtect){const e={symmetricAlgo:M.symmetric.aes128,aeadAlgo:M.aead.ocb},t=[{symmetricAlgo:n.preferredSymmetricAlgorithm,aeadAlgo:n.preferredAEADAlgorithm},{symmetricAlgo:n.preferredSymmetricAlgorithm,aeadAlgo:M.aead.ocb},{symmetricAlgo:M.symmetric.aes128,aeadAlgo:n.preferredAEADAlgorithm}];for(const e of t)if(i.every((t=>t.preferredCipherSuites&&t.preferredCipherSuites.some((t=>t[0]===e.symmetricAlgo&&t[1]===e.aeadAlgo)))))return e;return e}const s=M.symmetric.aes128,a=n.preferredSymmetricAlgorithm;return{symmetricAlgo:i.every((e=>e.preferredSymmetricAlgorithms&&e.preferredSymmetricAlgorithms.includes(a)))?a:s,aeadAlgo:void 0}}(e,t,r,n),a=M.read(M.symmetric,i),o=s?M.read(M.aead,s):void 0;await Promise.all(e.map((e=>e.getEncryptionKey().catch((()=>null)).then((e=>{if(e&&(e.keyPacket.algorithm===M.publicKey.x25519||e.keyPacket.algorithm===M.publicKey.x448)&&!o&&!N.isAES(i))throw Error("Could not generate a session key compatible with the given `encryptionKeys`: X22519 and X448 keys can only be used to encrypt AES session keys; change `config.preferredSymmetricAlgorithm` accordingly.")})))));return{data:Ua(i),algorithm:a,aeadAlgorithm:o}}async encrypt(e,t,r,n=!1,i=[],s=new Date,a=[],o=L){if(r){if(!N.isUint8Array(r.data)||!N.isString(r.algorithm))throw Error("Invalid session key for encryption.")}else if(e&&e.length)r=await ou.generateSessionKey(e,s,a,o);else{if(!t||!t.length)throw Error("No keys, passwords, or session key provided.");r=await ou.generateSessionKey(void 0,void 0,void 0,o)}const{data:c,algorithm:u,aeadAlgorithm:h}=r,l=await ou.encryptSessionKey(c,u,h,e,t,n,i,s,a,o),y=sc.fromObject({version:h?2:1,aeadAlgorithm:h?M.write(M.aead,h):null});y.packets=this.packets;const f=M.write(M.symmetric,u);return await y.encrypt(f,c,o),l.packets.push(y),y.packets=new Wo,l}static async encryptSessionKey(e,t,r,n,i,s=!1,a=[],o=new Date,c=[],u=L){const h=new Wo,l=M.write(M.symmetric,t),y=r&&M.write(M.aead,r);if(n){const t=await Promise.all(n.map((async function(t,r){const n=await t.getEncryptionKey(a[r],o,c,u),i=hc.fromObject({version:y?6:3,encryptionKeyPacket:n.keyPacket,anonymousRecipient:s,sessionKey:e,sessionKeyAlgorithm:l});return await i.encrypt(n.keyPacket),delete i.sessionKey,i})));h.push(...t)}if(i){const t=async function(e,t){try{return await e.decrypt(t),1}catch(e){return 0}},r=(e,t)=>e+t,n=async function(e,s,a,o){const c=new yc(u);if(c.sessionKey=e,c.sessionKeyAlgorithm=s,a&&(c.aeadAlgorithm=a),await c.encrypt(o,u),u.passwordCollisionCheck){if(1!==(await Promise.all(i.map((e=>t(c,e))))).reduce(r))return n(e,s,o)}return delete c.sessionKey,c},s=await Promise.all(i.map((t=>n(e,l,y,t))));h.push(...s)}return new ou(h)}async sign(e=[],t=[],r=null,n=[],i=new Date,s=[],a=[],o=[],c=L){const u=new Wo,h=this.packets.findPacket(M.packet.literalData);if(!h)throw Error("No literal data packet to sign.");const l=await cu(h,e,t,r,n,i,s,a,o,!1,c),y=l.map(((e,t)=>qo.fromSignaturePacket(e,0===t))).reverse();return u.push(...y),u.push(h),u.push(...l),new ou(u)}compress(e,t=L){if(e===M.compression.uncompressed)return this;const r=new Xo(t);r.algorithm=e,r.packets=this.packets;const n=new Wo;return n.push(r),new ou(n)}async signDetached(e=[],t=[],r=null,n=[],i=[],s=new Date,a=[],o=[],c=L){const u=this.packets.findPacket(M.packet.literalData);if(!u)throw Error("No literal data packet to sign.");return new Ic(await cu(u,e,t,r,n,i,s,a,o,!0,c))}async verify(e,t=new Date,r=L){const n=this.unwrapCompressed(),i=n.packets.filterByTag(M.packet.literalData);if(1!==i.length)throw Error("Can only verify message with one literal data packet.");u(n.packets.stream)&&n.packets.push(...await P(n.packets.stream,(e=>e||[])));const s=n.packets.filterByTag(M.packet.onePassSignature).reverse(),a=n.packets.filterByTag(M.packet.signature);return s.length&&!a.length&&N.isStream(n.packets.stream)&&!u(n.packets.stream)?(await Promise.all(s.map((async e=>{e.correspondingSig=new Promise(((t,r)=>{e.correspondingSigResolve=t,e.correspondingSigReject=r})),e.signatureData=x((async()=>(await e.correspondingSig).signatureData)),e.hashed=P(await e.hash(e.signatureType,i[0],void 0,!1)),e.hashed.catch((()=>{}))}))),n.packets.stream=B(n.packets.stream,(async(e,t)=>{const r=Q(e),n=R(t);try{for(let e=0;e<s.length;e++){const{value:t}=await r.read();s[e].correspondingSigResolve(t)}await r.readToEnd(),await n.ready,await n.close()}catch(e){s.forEach((t=>{t.correspondingSigReject(e)})),await n.abort(e)}})),uu(s,i,e,t,!1,r)):uu(a,i,e,t,!1,r)}verifyDetached(e,t,r=new Date,n=L){const i=this.unwrapCompressed().packets.filterByTag(M.packet.literalData);if(1!==i.length)throw Error("Can only verify message with one literal data packet.");return uu(e.packets.filterByTag(M.packet.signature),i,t,r,!0,n)}unwrapCompressed(){const e=this.packets.filterByTag(M.packet.compressedData);return e.length?new ou(e[0].packets):this}async appendSignature(e,t=L){await this.packets.read(N.isUint8Array(e)?e:(await ee(e)).data,au,t)}write(){return this.packets.write()}armor(e=L){const t=this.packets[this.packets.length-1],r=t.constructor.tag===sc.tag?2!==t.version:this.packets.some((e=>e.constructor.tag===Ho.tag&&6!==e.version));return te(M.armor.message,this.write(),null,null,null,r,e)}}async function cu(e,t,r=[],n=null,i=[],s=new Date,a=[],o=[],c=[],u=!1,h=L){const l=new Wo,y=null===e.text?M.signature.binary:M.signature.text;if(await Promise.all(t.map((async(t,n)=>{const l=a[n];if(!t.isPrivate())throw Error("Need private key for signing");const f=await t.getSigningKey(i[n],s,l,h);return Rc(e,r.length?r:[t],f.keyPacket,{signatureType:y},s,o,c,u,h)}))).then((e=>{l.push(...e)})),n){const e=n.packets.filterByTag(M.packet.signature);l.push(...e)}return l}async function uu(e,t,r,n=new Date,i=!1,s=L){return Promise.all(e.filter((function(e){return["text","binary"].includes(M.read(M.signature,e.signatureType))})).map((async function(e){return async function(e,t,r,n=new Date,i=!1,s=L){let a,o;for(const t of r){const r=t.getKeys(e.issuerKeyID);if(r.length>0){a=t,o=r[0];break}}const c=e instanceof qo?e.correspondingSig:e,u={keyID:e.issuerKeyID,verified:(async()=>{if(!o)throw Error("Could not find signing key with key ID "+e.issuerKeyID.toHex());await e.verify(o.keyPacket,e.signatureType,t[0],n,i,s);const r=await c;if(o.getCreationTime()>r.created)throw Error("Key is newer than the signature");try{await a.getSigningKey(o.getKeyID(),r.created,void 0,s)}catch(e){if(!s.allowInsecureVerificationWithReformattedKeys||!e.message.match(/Signature creation time is in the future/))throw e;await a.getSigningKey(o.getKeyID(),n,void 0,s)}return!0})(),signature:(async()=>{const e=await c,t=new Wo;return e&&t.push(e),new Ic(t)})()};return u.signature.catch((()=>{})),u.verified.catch((()=>{})),u}(e,t,r,n,i,s)})))}async function hu({armoredMessage:e,binaryMessage:t,config:r,...n}){r={...L,...r};let i=e||t;if(!i)throw Error("readMessage: must pass options object containing `armoredMessage` or `binaryMessage`");if(e&&!N.isString(e)&&!N.isStream(e))throw Error("readMessage: options.armoredMessage must be a string or stream");if(t&&!N.isUint8Array(t)&&!N.isStream(t))throw Error("readMessage: options.binaryMessage must be a Uint8Array or stream");const s=Object.keys(n);if(s.length>0)throw Error("Unknown option: "+s.join(", "));const a=N.isStream(i);if(e){const{type:e,data:t}=await ee(i);if(e!==M.armor.message)throw Error("Armored text not of type message");i=t}const o=await Wo.fromBinary(i,iu,r,Yo({delayReporting:!1})),c=new ou(o);return c.fromStream=a,c}async function lu({text:e,binary:t,filename:r,date:n=new Date,format:i=(void 0!==e?"utf8":"binary"),...s}){const a=void 0!==e?e:t;if(void 0===a)throw Error("createMessage: must pass options object containing `text` or `binary`");if(e&&!N.isString(e)&&!N.isStream(e))throw Error("createMessage: options.text must be a string or stream");if(t&&!N.isUint8Array(t)&&!N.isStream(t))throw Error("createMessage: options.binary must be a Uint8Array or stream");const o=Object.keys(s);if(o.length>0)throw Error("Unknown option: "+o.join(", "));const c=N.isStream(a),u=new Lo(n);void 0!==e?u.setText(a,M.write(M.literal,i)):u.setBytes(a,M.write(M.literal,i)),void 0!==r&&u.setFilename(r);const h=new Wo;h.push(u);const l=new ou(h);return l.fromStream=c,l}const yu=/*#__PURE__*/N.constructAllowedPackets([Ho]);class fu{constructor(e,t){if(this.text=N.removeTrailingSpaces(e).replace(/\r?\n/g,"\r\n"),t&&!(t instanceof Ic))throw Error("Invalid signature input");this.signature=t||new Ic(new Wo)}getSigningKeyIDs(){const e=[];return this.signature.packets.forEach((function(t){e.push(t.issuerKeyID)})),e}async sign(e,t=[],r=null,n=[],i=new Date,s=[],a=[],o=[],c=L){const u=new Lo;u.setText(this.text);const h=new Ic(await cu(u,e,t,r,n,i,s,a,o,!0,c));return new fu(this.text,h)}verify(e,t=new Date,r=L){const n=this.signature.packets.filterByTag(M.packet.signature),i=new Lo;return i.setText(this.text),uu(n,[i],e,t,!0,r)}getText(){return this.text.replace(/\r\n/g,"\n")}armor(e=L){const t=this.signature.packets.some((e=>6!==e.version)),r={hash:t?Array.from(new Set(this.signature.packets.map((e=>M.read(M.hash,e.hashAlgorithm).toUpperCase())))).join():null,text:this.text,data:this.signature.packets.write()};return te(M.armor.signed,r,void 0,void 0,void 0,t,e)}}async function gu({cleartextMessage:e,config:t,...r}){if(t={...L,...t},!e)throw Error("readCleartextMessage: must pass options object containing `cleartextMessage`");if(!N.isString(e))throw Error("readCleartextMessage: options.cleartextMessage must be a string");const n=Object.keys(r);if(n.length>0)throw Error("Unknown option: "+n.join(", "));const i=await ee(e);if(i.type!==M.armor.signed)throw Error("No cleartext signed message.");const s=await Wo.fromBinary(i.data,yu,t);!function(e,t){const r=function(e){const r=e=>t=>e.hashAlgorithm===t;for(let n=0;n<t.length;n++)if(t[n].constructor.tag===M.packet.signature&&!e.some(r(t[n])))return!1;return!0},n=[];if(e.forEach((e=>{const t=e.match(/^Hash: (.+)$/);if(!t)throw Error('Only "Hash" header allowed in cleartext signed message');{const e=t[1].replace(/\s/g,"").split(",").map((e=>{try{return M.write(M.hash,e.toLowerCase())}catch(t){throw Error("Unknown hash algorithm in armor header: "+e.toLowerCase())}}));n.push(...e)}})),n.length&&!r(n))throw Error("Hash algorithm mismatch in armor header and signature")}(i.headers,s);const a=new Ic(s);return new fu(i.text,a)}async function pu({text:e,...t}){if(!e)throw Error("createCleartextMessage: must pass options object containing `text`");if(!N.isString(e))throw Error("createCleartextMessage: options.text must be a string");const r=Object.keys(t);if(r.length>0)throw Error("Unknown option: "+r.join(", "));return new fu(e)}async function du({userIDs:e=[],passphrase:t,type:r,curve:n,rsaBits:i=4096,symmetricHash:s="sha256",symmetricCipher:a="aes256",keyExpirationTime:o=0,date:c=new Date,subkeys:u=[{}],format:h="armored",config:l,...y}){xu(l={...L,...l}),r||n?(r=r||"ecc",n=n||"curve25519Legacy"):(r=l.v6Keys?"curve25519":"ecc",n="curve25519Legacy"),e=Qu(e);const f=Object.keys(y);if(f.length>0)throw Error("Unknown option: "+f.join(", "));if(0===e.length&&!l.v6Keys)throw Error("UserIDs are required for V4 keys");if("rsa"===r&&i<l.minRSABits)throw Error(`rsaBits should be at least ${l.minRSABits}, got: ${i}`);const g={userIDs:e,passphrase:t,type:r,rsaBits:i,curve:n,keyExpirationTime:o,date:c,subkeys:u,symmetricHash:s,symmetricCipher:a};try{const{key:e,revocationCertificate:t}=await async function(e,t){e.sign=!0,(e=Fc(e)).subkeys=e.subkeys.map(((t,r)=>Fc(e.subkeys[r],e)));let r=[Uc(e,t)];r=r.concat(e.subkeys.map((e=>Cc(e,t))));const n=await Promise.all(r),i=await $c(n[0],n.slice(1),e,t),s=await i.getRevocationCertificate(e.date,t);return i.revocationSignatures=[],{key:i,revocationCertificate:s}}(g,l);return e.getKeys().forEach((({keyPacket:e})=>Hc(e,l))),{privateKey:Mu(e,h,l),publicKey:"symmetric"!==r?Mu(e.toPublic(),h,l):null,revocationCertificate:t}}catch(e){throw N.wrapError("Error generating keypair",e)}}async function Au({privateKey:e,userIDs:t=[],passphrase:r,keyExpirationTime:n=0,date:i,format:s="armored",config:a,...o}){xu(a={...L,...a}),t=Qu(t);const c=Object.keys(o);if(c.length>0)throw Error("Unknown option: "+c.join(", "));if(0===t.length&&6!==e.keyPacket.version)throw Error("UserIDs are required for V4 keys");const u={privateKey:e,userIDs:t,passphrase:r,keyExpirationTime:n,date:i};try{const{key:e,revocationCertificate:t}=await async function(e,t){e=o(e);const{privateKey:r}=e;if(!r.isPrivate())throw Error("Cannot reformat a public key");if(r.keyPacket.isDummy())throw Error("Cannot reformat a gnu-dummy primary key");if(!r.getKeys().every((({keyPacket:e})=>e.isDecrypted())))throw Error("Key is not decrypted");const n=r.keyPacket;e.subkeys||(e.subkeys=await Promise.all(r.subkeys.map((async e=>{const r=e.keyPacket,i={key:n,bind:r},s=await Pc(e.bindingSignatures,n,M.signature.subkeyBinding,i,null,t).catch((()=>({})));return{sign:s.keyFlags&&s.keyFlags[0]&M.keyFlags.signData,forwarding:s.keyFlags&&s.keyFlags[0]&M.keyFlags.forwardedCommunication}}))));const i=r.subkeys.map((e=>e.keyPacket));if(e.subkeys.length!==i.length)throw Error("Number of subkey options does not match number of subkeys");e.subkeys=e.subkeys.map((t=>o(t,e)));const s=await $c(n,i,e,t),a=await s.getRevocationCertificate(e.date,t);return s.revocationSignatures=[],{key:s,revocationCertificate:a};function o(e,t={}){return e.keyExpirationTime=e.keyExpirationTime||t.keyExpirationTime,e.passphrase=N.isString(e.passphrase)?e.passphrase:t.passphrase,e.date=e.date||t.date,e}}(u,a);return{privateKey:Mu(e,s,a),publicKey:Mu(e.toPublic(),s,a),revocationCertificate:t}}catch(e){throw N.wrapError("Error reformatting keypair",e)}}async function wu({key:e,revocationCertificate:t,reasonForRevocation:r,date:n=new Date,format:i="armored",config:s,...a}){xu(s={...L,...s});const o=Object.keys(a);if(o.length>0)throw Error("Unknown option: "+o.join(", "));try{const a=t?await e.applyRevocationCertificate(t,n,s):await e.revoke(r,n,s);return a.isPrivate()?{privateKey:Mu(a,i,s),publicKey:Mu(a.toPublic(),i,s)}:{privateKey:null,publicKey:Mu(a,i,s)}}catch(e){throw N.wrapError("Error revoking key",e)}}async function mu({privateKey:e,passphrase:t,config:r,...n}){xu(r={...L,...r});const i=Object.keys(n);if(i.length>0)throw Error("Unknown option: "+i.join(", "));if(!e.isPrivate())throw Error("Cannot decrypt a public key");const s=e.clone(!0),a=N.isArray(t)?t:[t];try{return await Promise.all(s.getKeys().map((e=>N.anyPromise(a.map((t=>e.keyPacket.decrypt(t))))))),await s.validate(r),s}catch(e){throw s.clearPrivateParams(),N.wrapError("Error decrypting private key",e)}}async function bu({privateKey:e,passphrase:t,config:r,...n}){xu(r={...L,...r});const i=Object.keys(n);if(i.length>0)throw Error("Unknown option: "+i.join(", "));if(!e.isPrivate())throw Error("Cannot encrypt a public key");const s=e.clone(!0),a=s.getKeys(),o=N.isArray(t)?t:Array(a.length).fill(t);if(o.length!==a.length)throw Error("Invalid number of passphrases given for key encryption");try{return await Promise.all(a.map((async(e,t)=>{const{keyPacket:n}=e;await n.encrypt(o[t],r),n.clearPrivateParams()}))),s}catch(e){throw s.clearPrivateParams(),N.wrapError("Error encrypting private key",e)}}async function ku({message:e,encryptionKeys:t,signingKeys:r,passwords:n,sessionKey:i,format:s="armored",signature:a=null,wildcard:o=!1,signingKeyIDs:c=[],encryptionKeyIDs:u=[],date:h=new Date,signingUserIDs:l=[],encryptionUserIDs:y=[],signatureNotations:f=[],config:g,...p}){if(xu(g={...L,...g}),Cu(e),Pu(s),t=Qu(t),r=Qu(r),n=Qu(n),c=Qu(c),u=Qu(u),l=Qu(l),y=Qu(y),f=Qu(f),p.detached)throw Error("The `detached` option has been removed from openpgp.encrypt, separately call openpgp.sign instead. Don't forget to remove the `privateKeys` option as well.");if(p.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.encrypt, pass `encryptionKeys` instead");if(p.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.encrypt, pass `signingKeys` instead");if(void 0!==p.armor)throw Error("The `armor` option has been removed from openpgp.encrypt, pass `format` instead.");const d=Object.keys(p);if(d.length>0)throw Error("Unknown option: "+d.join(", "));r||(r=[]);try{if((r.length||a)&&(e=await e.sign(r,t,a,c,h,l,u,f,g)),e=e.compress(await async function(e=[],t=new Date,r=[],n=L){const i=M.compression.uncompressed,s=n.preferredCompressionAlgorithm,a=await Promise.all(e.map((async function(e,i){const a=(await e.getPrimarySelfSignature(t,r[i],n)).preferredCompressionAlgorithms;return!!a&&a.indexOf(s)>=0})));return a.every(Boolean)?s:i}(t,h,y,g),g),e=await e.encrypt(t,n,i,o,u,h,y,g),"object"===s)return e;const p="armored"===s?e.armor(g):e.write();return await Ru(p)}catch(e){throw N.wrapError("Error encrypting message",e)}}async function Eu({message:e,decryptionKeys:t,passwords:r,sessionKeys:n,verificationKeys:i,expectSigned:s=!1,format:a="utf8",signature:o=null,date:c=new Date,config:u,...h}){if(xu(u={...L,...u}),Cu(e),i=Qu(i),t=Qu(t),r=Qu(r),n=Qu(n),h.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.decrypt, pass `decryptionKeys` instead");if(h.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.decrypt, pass `verificationKeys` instead");const l=Object.keys(h);if(l.length>0)throw Error("Unknown option: "+l.join(", "));try{const h=await e.decrypt(t,r,n,c,u);i||(i=[]);const l={};if(l.signatures=o?await h.verifyDetached(o,i,c,u):await h.verify(i,c,u),l.data="binary"===a?h.getLiteralData():h.getText(),l.filename=h.getFilename(),Tu(l,e,...new Set([h,h.unwrapCompressed()])),s){if(0===i.length)throw Error("Verification keys are required to verify message signatures");if(0===l.signatures.length)throw Error("Message is not signed");l.data=m([l.data,x((async()=>(await N.anyPromise(l.signatures.map((e=>e.verified))),"binary"===a?new Uint8Array:"")))])}return l.data=await Ru(l.data),l}catch(e){throw N.wrapError("Error decrypting message",e)}}async function vu({message:e,signingKeys:t,recipientKeys:r=[],format:n="armored",detached:i=!1,signingKeyIDs:s=[],date:a=new Date,signingUserIDs:o=[],recipientUserIDs:c=[],signatureNotations:u=[],config:h,...l}){if(xu(h={...L,...h}),Uu(e),Pu(n),t=Qu(t),s=Qu(s),o=Qu(o),r=Qu(r),c=Qu(c),u=Qu(u),l.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.sign, pass `signingKeys` instead");if(void 0!==l.armor)throw Error("The `armor` option has been removed from openpgp.sign, pass `format` instead.");const y=Object.keys(l);if(y.length>0)throw Error("Unknown option: "+y.join(", "));if(e instanceof fu&&"binary"===n)throw Error("Cannot return signed cleartext message in binary format");if(e instanceof fu&&i)throw Error("Cannot detach-sign a cleartext message");if(!t||0===t.length)throw Error("No signing keys provided");try{let l;if(l=i?await e.signDetached(t,r,void 0,s,a,o,c,u,h):await e.sign(t,r,void 0,s,a,o,c,u,h),"object"===n)return l;return l="armored"===n?l.armor(h):l.write(),i&&(l=B(e.packets.write(),(async(e,t)=>{await Promise.all([b(l,t),P(e).catch((()=>{}))])}))),await Ru(l)}catch(e){throw N.wrapError("Error signing message",e)}}async function Bu({message:e,verificationKeys:t,expectSigned:r=!1,format:n="utf8",signature:i=null,date:s=new Date,config:a,...o}){if(xu(a={...L,...a}),Uu(e),t=Qu(t),o.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.verify, pass `verificationKeys` instead");const c=Object.keys(o);if(c.length>0)throw Error("Unknown option: "+c.join(", "));if(e instanceof fu&&"binary"===n)throw Error("Can't return cleartext message data as binary");if(e instanceof fu&&i)throw Error("Can't verify detached cleartext signature");try{const o={};if(o.signatures=i?await e.verifyDetached(i,t,s,a):await e.verify(t,s,a),o.data="binary"===n?e.getLiteralData():e.getText(),e.fromStream&&!i&&Tu(o,...new Set([e,e.unwrapCompressed()])),r){if(0===o.signatures.length)throw Error("Message is not signed");o.data=m([o.data,x((async()=>(await N.anyPromise(o.signatures.map((e=>e.verified))),"binary"===n?new Uint8Array:"")))])}return o.data=await Ru(o.data),o}catch(e){throw N.wrapError("Error verifying signed message",e)}}async function Su({encryptionKeys:e,date:t=new Date,encryptionUserIDs:r=[],config:n,...i}){if(xu(n={...L,...n}),e=Qu(e),r=Qu(r),i.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.generateSessionKey, pass `encryptionKeys` instead");const s=Object.keys(i);if(s.length>0)throw Error("Unknown option: "+s.join(", "));try{return await ou.generateSessionKey(e,t,r,n)}catch(e){throw N.wrapError("Error generating session key",e)}}async function Iu({data:e,algorithm:t,aeadAlgorithm:r,encryptionKeys:n,passwords:i,format:s="armored",wildcard:a=!1,encryptionKeyIDs:o=[],date:c=new Date,encryptionUserIDs:u=[],config:h,...l}){if(xu(h={...L,...h}),function(e){if(!N.isUint8Array(e))throw Error("Parameter [data] must be of type Uint8Array")}(e),function(e,t){if(!N.isString(e))throw Error("Parameter ["+t+"] must be of type String")}(t,"algorithm"),Pu(s),n=Qu(n),i=Qu(i),o=Qu(o),u=Qu(u),l.publicKeys)throw Error("The `publicKeys` option has been removed from openpgp.encryptSessionKey, pass `encryptionKeys` instead");const y=Object.keys(l);if(y.length>0)throw Error("Unknown option: "+y.join(", "));if(!(n&&0!==n.length||i&&0!==i.length))throw Error("No encryption keys or passwords provided.");try{return Mu(await ou.encryptSessionKey(e,t,r,n,i,a,o,c,u,h),s,h)}catch(e){throw N.wrapError("Error encrypting session key",e)}}async function Ku({message:e,decryptionKeys:t,passwords:r,date:n=new Date,config:i,...s}){if(xu(i={...L,...i}),Cu(e),t=Qu(t),r=Qu(r),s.privateKeys)throw Error("The `privateKeys` option has been removed from openpgp.decryptSessionKeys, pass `decryptionKeys` instead");const a=Object.keys(s);if(a.length>0)throw Error("Unknown option: "+a.join(", "));try{return await e.decryptSessionKeys(t,r,void 0,n,i)}catch(e){throw N.wrapError("Error decrypting session keys",e)}}function Cu(e){if(!(e instanceof ou))throw Error("Parameter [message] needs to be of type Message")}function Uu(e){if(!(e instanceof fu||e instanceof ou))throw Error("Parameter [message] needs to be of type Message or CleartextMessage")}function Pu(e){if("armored"!==e&&"binary"!==e&&"object"!==e)throw Error("Unsupported format "+e)}const Du=Object.keys(L).length;function xu(e){const t=Object.keys(e);if(t.length!==Du)for(const e of t)if(void 0===L[e])throw Error("Unknown config property: "+e)}function Qu(e){return e&&!N.isArray(e)&&(e=[e]),e}async function Ru(e){return"array"===N.isStream(e)?P(e):e}function Tu(e,t,...r){e.data=B(t.packets.stream,(async(t,n)=>{await b(e.data,n,{preventClose:!0});const i=R(n);try{await P(t,(e=>e)),await Promise.all(r.map((e=>P(e.packets.stream,(e=>e))))),await i.close()}catch(e){await i.abort(e)}}))}function Mu(e,t,r){switch(t){case"object":return e;case"armored":return e.armor(r);case"binary":return e.write();default:throw Error("Unsupported format "+t)}}function Lu(e){if(!Number.isSafeInteger(e)||e<0)throw Error("positive integer expected, got "+e)}function Fu(e,...t){if(!((r=e)instanceof Uint8Array||ArrayBuffer.isView(r)&&"Uint8Array"===r.constructor.name))throw Error("Uint8Array expected");var r;if(t.length>0&&!t.includes(e.length))throw Error("Uint8Array expected of length "+t+", got length="+e.length)}function Nu(e,t=!0){if(e.destroyed)throw Error("Hash instance has been destroyed");if(t&&e.finished)throw Error("Hash#digest() has already been called")}function Ou(e,t){Fu(e);const r=t.outputLen;if(e.length<r)throw Error("digestInto() expects output buffer of length at least "+r)}const _u=r&&"object"==typeof r&&"webcrypto"in r?r.webcrypto:r&&"object"==typeof r&&"randomBytes"in r?r:void 0,Hu=e=>new Uint32Array(e.buffer,e.byteOffset,Math.floor(e.byteLength/4)),zu=e=>new DataView(e.buffer,e.byteOffset,e.byteLength),Gu=(e,t)=>e<<32-t|e>>>t,qu=(e,t)=>e<<t|e>>>32-t>>>0,ju=/* @__PURE__ */(()=>68===new Uint8Array(new Uint32Array([287454020]).buffer)[0])();
5
5
  /*! noble-hashes - MIT License (c) 2022 Paul Miller (paulmillr.com) */function Vu(e){for(let r=0;r<e.length;r++)e[r]=(t=e[r])<<24&4278190080|t<<8&16711680|t>>>8&65280|t>>>24&255;var t}function Yu(e){if("string"!=typeof e)throw Error("utf8ToBytes expected string, got "+typeof e);return new Uint8Array((new TextEncoder).encode(e))}function Zu(e){return"string"==typeof e&&(e=Yu(e)),Fu(e),e}function Wu(...e){let t=0;for(let r=0;r<e.length;r++){const n=e[r];Fu(n),t+=n.length}const r=new Uint8Array(t);for(let t=0,n=0;t<e.length;t++){const i=e[t];r.set(i,n),n+=i.length}return r}class Ju{clone(){return this._cloneInto()}}function Xu(e){const t=t=>e().update(Zu(t)).digest(),r=e();return t.outputLen=r.outputLen,t.blockLen=r.blockLen,t.create=()=>e(),t}function $u(e=32){if(_u&&"function"==typeof _u.getRandomValues)return _u.getRandomValues(new Uint8Array(e));if(_u&&"function"==typeof _u.randomBytes)return _u.randomBytes(e);throw Error("crypto.getRandomValues must be defined")}const eh=(e,t,r)=>e&t^~e&r,th=(e,t,r)=>e&t^e&r^t&r;class rh extends Ju{constructor(e,t,r,n){super(),this.blockLen=e,this.outputLen=t,this.padOffset=r,this.isLE=n,this.finished=!1,this.length=0,this.pos=0,this.destroyed=!1,this.buffer=new Uint8Array(e),this.view=zu(this.buffer)}update(e){Nu(this);const{view:t,buffer:r,blockLen:n}=this,i=(e=Zu(e)).length;for(let s=0;s<i;){const a=Math.min(n-this.pos,i-s);if(a!==n)r.set(e.subarray(s,s+a),this.pos),this.pos+=a,s+=a,this.pos===n&&(this.process(t,0),this.pos=0);else{const t=zu(e);for(;n<=i-s;s+=n)this.process(t,s)}}return this.length+=e.length,this.roundClean(),this}digestInto(e){Nu(this),Ou(e,this),this.finished=!0;const{buffer:t,view:r,blockLen:n,isLE:i}=this;let{pos:s}=this;t[s++]=128,this.buffer.subarray(s).fill(0),this.padOffset>n-s&&(this.process(r,0),s=0);for(let e=s;e<n;e++)t[e]=0;!function(e,t,r,n){if("function"==typeof e.setBigUint64)return e.setBigUint64(t,r,n);const i=BigInt(32),s=BigInt(4294967295),a=Number(r>>i&s),o=Number(r&s),c=n?4:0,u=n?0:4;e.setUint32(t+c,a,n),e.setUint32(t+u,o,n)}(r,n-8,BigInt(8*this.length),i),this.process(r,0);const a=zu(e),o=this.outputLen;if(o%4)throw Error("_sha2: outputLen should be aligned to 32bit");const c=o/4,u=this.get();if(c>u.length)throw Error("_sha2: outputLen bigger than state");for(let e=0;e<c;e++)a.setUint32(4*e,u[e],i)}digest(){const{buffer:e,outputLen:t}=this;this.digestInto(e);const r=e.slice(0,t);return this.destroy(),r}_cloneInto(e){e||(e=new this.constructor),e.set(...this.get());const{blockLen:t,buffer:r,length:n,finished:i,destroyed:s,pos:a}=this;return e.length=n,e.pos=a,e.finished=i,e.destroyed=s,n%t&&e.buffer.set(r),e}}const nh=/* @__PURE__ */new Uint32Array([1116352408,1899447441,3049323471,3921009573,961987163,1508970993,2453635748,2870763221,3624381080,310598401,607225278,1426881987,1925078388,2162078206,2614888103,3248222580,3835390401,4022224774,264347078,604807628,770255983,1249150122,1555081692,1996064986,2554220882,2821834349,2952996808,3210313671,3336571891,3584528711,113926993,338241895,666307205,773529912,1294757372,1396182291,1695183700,1986661051,2177026350,2456956037,2730485921,2820302411,3259730800,3345764771,3516065817,3600352804,4094571909,275423344,430227734,506948616,659060556,883997877,958139571,1322822218,1537002063,1747873779,1955562222,2024104815,2227730452,2361852424,2428436474,2756734187,3204031479,3329325298]),ih=/* @__PURE__ */new Uint32Array([1779033703,3144134277,1013904242,2773480762,1359893119,2600822924,528734635,1541459225]),sh=/* @__PURE__ */new Uint32Array(64);class ah extends rh{constructor(){super(64,32,8,!1),this.A=0|ih[0],this.B=0|ih[1],this.C=0|ih[2],this.D=0|ih[3],this.E=0|ih[4],this.F=0|ih[5],this.G=0|ih[6],this.H=0|ih[7]}get(){const{A:e,B:t,C:r,D:n,E:i,F:s,G:a,H:o}=this;return[e,t,r,n,i,s,a,o]}set(e,t,r,n,i,s,a,o){this.A=0|e,this.B=0|t,this.C=0|r,this.D=0|n,this.E=0|i,this.F=0|s,this.G=0|a,this.H=0|o}process(e,t){for(let r=0;r<16;r++,t+=4)sh[r]=e.getUint32(t,!1);for(let e=16;e<64;e++){const t=sh[e-15],r=sh[e-2],n=Gu(t,7)^Gu(t,18)^t>>>3,i=Gu(r,17)^Gu(r,19)^r>>>10;sh[e]=i+sh[e-7]+n+sh[e-16]|0}let{A:r,B:n,C:i,D:s,E:a,F:o,G:c,H:u}=this;for(let e=0;e<64;e++){const t=u+(Gu(a,6)^Gu(a,11)^Gu(a,25))+eh(a,o,c)+nh[e]+sh[e]|0,h=(Gu(r,2)^Gu(r,13)^Gu(r,22))+th(r,n,i)|0;u=c,c=o,o=a,a=s+t|0,s=i,i=n,n=r,r=t+h|0}r=r+this.A|0,n=n+this.B|0,i=i+this.C|0,s=s+this.D|0,a=a+this.E|0,o=o+this.F|0,c=c+this.G|0,u=u+this.H|0,this.set(r,n,i,s,a,o,c,u)}roundClean(){sh.fill(0)}destroy(){this.set(0,0,0,0,0,0,0,0),this.buffer.fill(0)}}class oh extends ah{constructor(){super(),this.A=-1056596264,this.B=914150663,this.C=812702999,this.D=-150054599,this.E=-4191439,this.F=1750603025,this.G=1694076839,this.H=-1090891868,this.outputLen=28}}const ch=/* @__PURE__ */Xu((()=>new ah)),uh=/* @__PURE__ */Xu((()=>new oh));class hh extends Ju{constructor(e,t){super(),this.finished=!1,this.destroyed=!1,function(e){if("function"!=typeof e||"function"!=typeof e.create)throw Error("Hash should be wrapped by utils.wrapConstructor");Lu(e.outputLen),Lu(e.blockLen)}(e);const r=Zu(t);if(this.iHash=e.create(),"function"!=typeof this.iHash.update)throw Error("Expected instance of class which extends utils.Hash");this.blockLen=this.iHash.blockLen,this.outputLen=this.iHash.outputLen;const n=this.blockLen,i=new Uint8Array(n);i.set(r.length>n?e.create().update(r).digest():r);for(let e=0;e<i.length;e++)i[e]^=54;this.iHash.update(i),this.oHash=e.create();for(let e=0;e<i.length;e++)i[e]^=106;this.oHash.update(i),i.fill(0)}update(e){return Nu(this),this.iHash.update(e),this}digestInto(e){Nu(this),Fu(e,this.outputLen),this.finished=!0,this.iHash.digestInto(e),this.oHash.update(e),this.oHash.digestInto(e),this.destroy()}digest(){const e=new Uint8Array(this.oHash.outputLen);return this.digestInto(e),e}_cloneInto(e){e||(e=Object.create(Object.getPrototypeOf(this),{}));const{oHash:t,iHash:r,finished:n,destroyed:i,blockLen:s,outputLen:a}=this;return e.finished=n,e.destroyed=i,e.blockLen=s,e.outputLen=a,e.oHash=t._cloneInto(e.oHash),e.iHash=r._cloneInto(e.iHash),e}destroy(){this.destroyed=!0,this.oHash.destroy(),this.iHash.destroy()}}const lh=(e,t,r)=>new hh(e,t).update(r).digest();lh.create=(e,t)=>new hh(e,t)