@protontech/openpgp 6.2.1 → 6.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
- /*! OpenPGP.js v6.2.1 - 2025-08-28 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
2
- var openpgp=function(e){"use strict";const t="undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:{};function r(e,t){return t.forEach((function(t){t&&"string"!=typeof t&&!Array.isArray(t)&&Object.keys(t).forEach((function(r){if("default"!==r&&!(r in e)){var n=Object.getOwnPropertyDescriptor(t,r);Object.defineProperty(e,r,n.get?n:{enumerable:!0,get:function(){return t[r]}})}}))})),Object.freeze(e)}const n=Symbol("doneWritingPromise"),i=Symbol("doneWritingResolve"),s=Symbol("doneWritingReject"),a=Symbol("readingIndex");class ArrayStream extends Array{constructor(){super(),Object.setPrototypeOf(this,ArrayStream.prototype),this[n]=new Promise(((e,t)=>{this[i]=e,this[s]=t})),this[n].catch((()=>{}))}}function o(e){return e&&e.getReader&&Array.isArray(e)}function c(e){if(!o(e)){const t=e.getWriter(),r=t.releaseLock;return t.releaseLock=()=>{t.closed.catch((function(){})),r.call(t)},t}this.stream=e}function u(e){if(o(e))return"array";if(t.ReadableStream&&t.ReadableStream.prototype.isPrototypeOf(e))return"web";if(e&&!(t.ReadableStream&&e instanceof t.ReadableStream)&&"function"==typeof e._read&&"object"==typeof e._readableState)throw Error("Native Node streams are no longer supported: please manually convert the stream to a WebStream, using e.g. `stream.Readable.toWeb`");return!(!e||!e.getReader)&&"web-like"}function h(e){return Uint8Array.prototype.isPrototypeOf(e)}function l(e){if(1===e.length)return e[0];let t=0;for(let r=0;r<e.length;r++){if(!h(e[r]))throw Error("concatUint8Array: Data must be in the form of a Uint8Array");t+=e[r].length}const r=new Uint8Array(t);let n=0;return e.forEach((function(e){r.set(e,n),n+=e.length})),r}ArrayStream.prototype.getReader=function(){return void 0===this[a]&&(this[a]=0),{read:async()=>(await this[n],this[a]===this.length?{value:void 0,done:!0}:{value:this[this[a]++],done:!1})}},ArrayStream.prototype.readToEnd=async function(e){await this[n];const t=e(this.slice(this[a]));return this.length=0,t},ArrayStream.prototype.clone=function(){const e=new ArrayStream;return e[n]=this[n].then((()=>{e.push(...this)})),e},c.prototype.write=async function(e){this.stream.push(e)},c.prototype.close=async function(){this.stream[i]()},c.prototype.abort=async function(e){return this.stream[s](e),e},c.prototype.releaseLock=function(){},"object"==typeof t.process&&t.process.versions;const f=new WeakSet,y=Symbol("externalBuffer");function p(e){if(this.stream=e,e[y]&&(this[y]=e[y].slice()),o(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{},void(this._cancel=()=>{})}if(u(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{t.closed.catch((function(){})),t.releaseLock()},void(this._cancel=t.cancel.bind(t))}let t=!1;this._read=async()=>t||f.has(e)?{value:void 0,done:!0}:(t=!0,{value:e,done:!1}),this._releaseLock=()=>{if(t)try{f.add(e)}catch(e){}}}function d(e){return u(e)?e:new ReadableStream({start(t){t.enqueue(e),t.close()}})}function g(e){if(u(e))return e;const t=new ArrayStream;return(async()=>{const r=x(t);await r.write(e),await r.close()})(),t}function A(e){return e.some((e=>u(e)&&!o(e)))?function(e){e=e.map(d);const t=b((async function(e){await Promise.all(n.map((t=>U(t,e))))}));let r=Promise.resolve();const n=e.map(((n,i)=>E(n,((n,s)=>(r=r.then((()=>w(n,t.writable,{preventClose:i!==e.length-1}))),r)))));return t.readable}(e):e.some((e=>o(e)))?function(e){const t=new ArrayStream;let r=Promise.resolve();return e.forEach(((n,i)=>(r=r.then((()=>w(n,t,{preventClose:i!==e.length-1}))),r))),t}(e):"string"==typeof e[0]?e.join(""):l(e)}async function w(e,t,{preventClose:r=!1,preventAbort:n=!1,preventCancel:i=!1}={}){if(u(e)&&!o(e)){e=d(e);try{if(e[y]){const r=x(t);for(let t=0;t<e[y].length;t++)await r.ready,await r.write(e[y][t]);r.releaseLock()}await e.pipeTo(t,{preventClose:r,preventAbort:n,preventCancel:i})}catch(e){}return}const s=D(e=g(e)),a=x(t);try{for(;;){await a.ready;const{done:e,value:t}=await s.read();if(e){r||await a.close();break}await a.write(t)}}catch(e){n||await a.abort(e)}finally{s.releaseLock(),a.releaseLock()}}function m(e,t){const r=new TransformStream(t);return w(e,r.writable),r.readable}function b(e){let t,r,n,i=!1,s=!1;return{readable:new ReadableStream({start(e){n=e},pull(){t?t():i=!0},async cancel(t){s=!0,e&&await e(t),r&&r(t)}},{highWaterMark:0}),writable:new WritableStream({write:async function(e){if(s)throw Error("Stream is cancelled");n.enqueue(e),i?i=!1:(await new Promise(((e,n)=>{t=e,r=n})),t=null,r=null)},close:n.close.bind(n),abort:n.error.bind(n)})}}function k(e,t=()=>{},r=()=>{}){if(o(e)){const n=new ArrayStream;return(async()=>{const i=x(n);try{const n=await C(e),s=t(n),a=r();let o;o=void 0!==s&&void 0!==a?A([s,a]):void 0!==s?s:a,await i.write(o),await i.close()}catch(e){await i.abort(e)}})(),n}if(u(e))return m(e,{async transform(e,r){try{const n=await t(e);void 0!==n&&r.enqueue(n)}catch(e){r.error(e)}},async flush(e){try{const t=await r();void 0!==t&&e.enqueue(t)}catch(t){e.error(t)}}});const n=t(e),i=r();return void 0!==n&&void 0!==i?A([n,i]):void 0!==n?n:i}function E(e,t){if(u(e)&&!o(e)){let r;const n=new TransformStream({start(e){r=e}}),i=w(e,n.writable),s=b((async function(e){r.error(e),await i,await new Promise(setTimeout)}));return t(n.readable,s.writable),s.readable}e=g(e);const r=new ArrayStream;return t(e,r),r}function v(e,t){let r;const n=E(e,((e,i)=>{const s=D(e);s.remainder=()=>(s.releaseLock(),w(e,i),n),r=t(s)}));return r}function K(e){if(o(e))return e.clone();if(u(e)){const t=function(e){if(o(e))throw Error("ArrayStream cannot be tee()d, use clone() instead");if(u(e)){const t=d(e).tee();return t[0][y]=t[1][y]=e[y],t}return[B(e),B(e)]}(e);return I(e,t[0]),t[1]}return B(e)}function S(e){return o(e)?K(e):u(e)?new ReadableStream({start(t){const r=E(e,(async(e,r)=>{const n=D(e),i=x(r);try{for(;;){await i.ready;const{done:e,value:r}=await n.read();if(e){try{t.close()}catch(e){}return void await i.close()}try{t.enqueue(r)}catch(e){}await i.write(r)}}catch(e){t.error(e),await i.abort(e)}}));I(e,r)}}):B(e)}function I(e,t){Object.entries(Object.getOwnPropertyDescriptors(e.constructor.prototype)).forEach((([r,n])=>{"constructor"!==r&&(n.value?n.value=n.value.bind(t):n.get=n.get.bind(t),Object.defineProperty(e,r,n))}))}function B(e,t=0,r=1/0){if(o(e))throw Error("Not implemented");if(u(e)){if(t>=0&&r>=0){let n=0;return m(e,{transform(e,i){n<r?(n+e.length>=t&&i.enqueue(B(e,Math.max(t-n,0),r-n)),n+=e.length):i.terminate()}})}if(t<0&&(r<0||r===1/0)){let n=[];return k(e,(e=>{e.length>=-t?n=[e]:n.push(e)}),(()=>B(A(n),t,r)))}if(0===t&&r<0){let n;return k(e,(e=>{const i=n?A([n,e]):e;if(i.length>=-r)return n=B(i,r),B(i,t,r);n=i}))}return console.warn(`stream.slice(input, ${t}, ${r}) not implemented efficiently.`),P((async()=>B(await C(e),t,r)))}return e[y]&&(e=A(e[y].concat([e]))),h(e)?e.subarray(t,r===1/0?e.length:r):e.slice(t,r)}async function C(e,t=A){return o(e)?e.readToEnd(t):u(e)?D(e).readToEnd(t):e}async function U(e,t){if(u(e)){if(e.cancel){const r=await e.cancel(t);return await new Promise(setTimeout),r}if(e.destroy)return e.destroy(t),await new Promise(setTimeout),t}}function P(e){const t=new ArrayStream;return(async()=>{const r=x(t);try{await r.write(await e()),await r.close()}catch(e){await r.abort(e)}})(),t}function D(e){return new p(e)}function x(e){return new c(e)}p.prototype.read=async function(){if(this[y]&&this[y].length){return{done:!1,value:this[y].shift()}}return this._read()},p.prototype.releaseLock=function(){this[y]&&(this.stream[y]=this[y]),this._releaseLock()},p.prototype.cancel=function(e){return this._cancel(e)},p.prototype.readLine=async function(){let e,t=[];for(;!e;){let{done:r,value:n}=await this.read();if(n+="",r)return t.length?A(t):void 0;const i=n.indexOf("\n")+1;i&&(e=A(t.concat(n.substr(0,i))),t=[]),i!==n.length&&t.push(n.substr(i))}return this.unshift(...t),e},p.prototype.readByte=async function(){const{done:e,value:t}=await this.read();if(e)return;const r=t[0];return this.unshift(B(t,1)),r},p.prototype.readBytes=async function(e){const t=[];let r=0;for(;;){const{done:n,value:i}=await this.read();if(n)return t.length?A(t):void 0;if(t.push(i),r+=i.length,r>=e){const r=A(t);return this.unshift(B(r,e)),B(r,0,e)}}},p.prototype.peekBytes=async function(e){const t=await this.readBytes(e);return this.unshift(t),t},p.prototype.unshift=function(...e){this[y]||(this[y]=[]),1===e.length&&h(e[0])&&this[y].length&&e[0].length&&this[y][0].byteOffset>=e[0].length?this[y][0]=new Uint8Array(this[y][0].buffer,this[y][0].byteOffset-e[0].length,this[y][0].byteLength+e[0].length):this[y].unshift(...e.filter((e=>e&&e.length)))},p.prototype.readToEnd=async function(e=A){const t=[];for(;;){const{done:e,value:r}=await this.read();if(e)break;t.push(r)}return e(t)};const Q=Symbol("byValue");var R={curve:{nistP256:"nistP256",p256:"nistP256",nistP384:"nistP384",p384:"nistP384",nistP521:"nistP521",p521:"nistP521",secp256k1:"secp256k1",ed25519Legacy:"ed25519Legacy",ed25519:"ed25519Legacy",curve25519Legacy:"curve25519Legacy",curve25519:"curve25519Legacy",brainpoolP256r1:"brainpoolP256r1",brainpoolP384r1:"brainpoolP384r1",brainpoolP512r1:"brainpoolP512r1"},kdfFlags:{replace_fingerprint:1,replace_kdf_params:2},s2k:{simple:0,salted:1,iterated:3,argon2:4,gnu:101},publicKey:{rsaEncryptSign:1,rsaEncrypt:2,rsaSign:3,elgamal:16,dsa:17,ecdh:18,ecdsa:19,eddsaLegacy:22,aedh:23,aedsa:24,x25519:25,x448:26,ed25519:27,ed448:28,pqc_mldsa_ed25519:30,pqc_mlkem_x25519:35,aead:100,hmac:101},symmetric:{idea:1,tripledes:2,cast5:3,blowfish:4,aes128:7,aes192:8,aes256:9,twofish:10},compression:{uncompressed:0,zip:1,zlib:2,bzip2:3},hash:{md5:1,sha1:2,ripemd:3,sha256:8,sha384:9,sha512:10,sha224:11,sha3_256:12,sha3_512:14},webHash:{"SHA-1":2,"SHA-256":8,"SHA-384":9,"SHA-512":10},aead:{eax:1,ocb:2,gcm:3,experimentalGCM:100},packet:{publicKeyEncryptedSessionKey:1,signature:2,symEncryptedSessionKey:3,onePassSignature:4,secretKey:5,publicKey:6,secretSubkey:7,compressedData:8,symmetricallyEncryptedData:9,marker:10,literalData:11,trust:12,userID:13,publicSubkey:14,userAttribute:17,symEncryptedIntegrityProtectedData:18,modificationDetectionCode:19,aeadEncryptedData:20,padding:21},literal:{binary:98,text:116,utf8:117,mime:109},signature:{binary:0,text:1,standalone:2,certGeneric:16,certPersona:17,certCasual:18,certPositive:19,certRevocation:48,subkeyBinding:24,keyBinding:25,key:31,keyRevocation:32,subkeyRevocation:40,timestamp:64,thirdParty:80},signatureSubpacket:{signatureCreationTime:2,signatureExpirationTime:3,exportableCertification:4,trustSignature:5,regularExpression:6,revocable:7,keyExpirationTime:9,placeholderBackwardsCompatibility:10,preferredSymmetricAlgorithms:11,revocationKey:12,issuerKeyID:16,notationData:20,preferredHashAlgorithms:21,preferredCompressionAlgorithms:22,keyServerPreferences:23,preferredKeyServer:24,primaryUserID:25,policyURI:26,keyFlags:27,signersUserID:28,reasonForRevocation:29,features:30,signatureTarget:31,embeddedSignature:32,issuerFingerprint:33,preferredAEADAlgorithms:34,preferredCipherSuites:39},keyFlags:{certifyKeys:1,signData:2,encryptCommunication:4,encryptStorage:8,splitPrivateKey:16,authentication:32,forwardedCommunication:64,sharedPrivateKey:128},armor:{multipartSection:0,multipartLast:1,signed:2,message:3,publicKey:4,privateKey:5,signature:6},reasonForRevocation:{noReason:0,keySuperseded:1,keyCompromised:2,keyRetired:3,userIDInvalid:32},features:{modificationDetection:1,aead:2,v5Keys:4,seipdv2:8},write:function(e,t){if("number"==typeof t&&(t=this.read(e,t)),void 0!==e[t])return e[t];throw Error("Invalid enum value.")},read:function(e,t){if(e[Q]||(e[Q]=[],Object.entries(e).forEach((([t,r])=>{e[Q][r]=t}))),void 0!==e[Q][t])return e[Q][t];throw Error("Invalid enum value.")}},T={preferredHashAlgorithm:R.hash.sha512,preferredSymmetricAlgorithm:R.symmetric.aes256,preferredCompressionAlgorithm:R.compression.uncompressed,aeadProtect:!1,ignoreSEIPDv2FeatureFlag:!1,parseAEADEncryptedV4KeysAsLegacy:!1,preferredAEADAlgorithm:R.aead.gcm,aeadChunkSizeByte:12,v6Keys:!1,enableParsingV5Entities:!1,s2kType:R.s2k.iterated,s2kIterationCountByte:224,s2kArgon2Params:{passes:3,parallelism:4,memoryExponent:16},allowUnauthenticatedMessages:!1,allowUnauthenticatedStream:!1,allowForwardedMessages:!1,minRSABits:2047,passwordCollisionCheck:!1,allowInsecureDecryptionWithSigningKeys:!1,allowInsecureVerificationWithReformattedKeys:!1,allowMissingKeyFlags:!1,constantTimePKCS1Decryption:!1,constantTimePKCS1DecryptionSupportedSymmetricAlgorithms:new Set([R.symmetric.aes128,R.symmetric.aes192,R.symmetric.aes256]),ignoreUnsupportedPackets:!0,ignoreMalformedPackets:!1,enforceGrammar:!0,additionalAllowedPackets:[],showVersion:!1,showComment:!1,versionString:"OpenPGP.js 6.2.1",commentString:"https://openpgpjs.org",maxUserIDLength:5120,knownNotations:[],nonDeterministicSignaturesViaNotation:!0,useEllipticFallback:!0,rejectHashAlgorithms:new Set([R.hash.md5,R.hash.ripemd]),rejectMessageHashAlgorithms:new Set([R.hash.md5,R.hash.ripemd,R.hash.sha1]),rejectPublicKeyAlgorithms:new Set([R.publicKey.elgamal,R.publicKey.dsa]),rejectCurves:new Set([R.curve.secp256k1])};const M=(()=>{try{return"development"===process.env.NODE_ENV}catch(e){}return!1})(),L={isString:function(e){return"string"==typeof e||e instanceof String},nodeRequire:()=>{},isArray:function(e){return e instanceof Array},isUint8Array:h,isStream:u,getNobleCurve:async(e,t)=>{if(!T.useEllipticFallback)throw Error("This curve is only supported in the full build of OpenPGP.js");const{nobleCurves:r}=await Promise.resolve().then((function(){return Tl}));switch(e){case R.publicKey.ecdh:case R.publicKey.ecdsa:{const e=r.get(t);if(!e)throw Error("Unsupported curve");return e}case R.publicKey.x448:return r.get("x448");case R.publicKey.ed448:return r.get("ed448");default:throw Error("Unsupported curve")}},readNumber:function(e){let t=0;for(let r=0;r<e.length;r++)t+=256**r*e[e.length-1-r];return t},writeNumber:function(e,t){const r=new Uint8Array(t);for(let n=0;n<t;n++)r[n]=e>>8*(t-n-1)&255;return r},readDate:function(e){const t=L.readNumber(e);return new Date(1e3*t)},writeDate:function(e){const t=Math.floor(e.getTime()/1e3);return L.writeNumber(t,4)},normalizeDate:function(e=Date.now()){return null===e||e===1/0?e:new Date(1e3*Math.floor(+e/1e3))},readMPI:function(e){const t=(e[0]<<8|e[1])+7>>>3;return L.readExactSubarray(e,2,2+t)},readExactSubarray:function(e,t,r){if(e.length<r-t)throw Error("Input array too short");return e.subarray(t,r)},leftPad(e,t){if(e.length>t)throw Error("Input array too long");const r=new Uint8Array(t),n=t-e.length;return r.set(e,n),r},uint8ArrayToMPI:function(e){const t=L.uint8ArrayBitLength(e);if(0===t)throw Error("Zero MPI");const r=e.subarray(e.length-Math.ceil(t/8)),n=new Uint8Array([(65280&t)>>8,255&t]);return L.concatUint8Array([n,r])},uint8ArrayBitLength:function(e){let t;for(t=0;t<e.length&&0===e[t];t++);if(t===e.length)return 0;const r=e.subarray(t);return 8*(r.length-1)+L.nbits(r[0])},hexToUint8Array:function(e){const t=new Uint8Array(e.length>>1);for(let r=0;r<e.length>>1;r++)t[r]=parseInt(e.substr(r<<1,2),16);return t},uint8ArrayToHex:function(e){const t="0123456789abcdef";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),r},stringToUint8Array:function(e){return k(e,(e=>{if(!L.isString(e))throw Error("stringToUint8Array: Data must be in the form of a string");const t=new Uint8Array(e.length);for(let r=0;r<e.length;r++)t[r]=e.charCodeAt(r);return t}))},uint8ArrayToString:function(e){const t=[],r=16384,n=(e=new Uint8Array(e)).length;for(let i=0;i<n;i+=r)t.push(String.fromCharCode.apply(String,e.subarray(i,i+r<n?i+r:n)));return t.join("")},encodeUTF8:function(e){const t=new TextEncoder("utf-8");function r(e,r=!1){return t.encode(e,{stream:!r})}return k(e,r,(()=>r("",!0)))},decodeUTF8:function(e){const t=new TextDecoder("utf-8");function r(e,r=!1){return t.decode(e,{stream:!r})}return k(e,r,(()=>r(new Uint8Array,!0)))},concat:A,concatUint8Array:l,equalsUint8Array:function(e,t){if(!L.isUint8Array(e)||!L.isUint8Array(t))throw Error("Data must be in the form of a Uint8Array");if(e.length!==t.length)return!1;for(let r=0;r<e.length;r++)if(e[r]!==t[r])return!1;return!0},findLastIndex:function(e,t){for(let r=e.length;r>=0;r--)if(t(e[r],r,e))return r;return-1},writeChecksum:function(e){let t=0;for(let r=0;r<e.length;r++)t=t+e[r]&65535;return L.writeNumber(t,2)},printDebug:function(e){M&&console.log("[OpenPGP.js debug]",e)},printDebugError:function(e){M&&console.error("[OpenPGP.js debug]",e)},nbits:function(e){let t=1,r=e>>>16;return 0!==r&&(e=r,t+=16),r=e>>8,0!==r&&(e=r,t+=8),r=e>>4,0!==r&&(e=r,t+=4),r=e>>2,0!==r&&(e=r,t+=2),r=e>>1,0!==r&&(e=r,t+=1),t},double:function(e){const t=new Uint8Array(e.length),r=e.length-1;for(let n=0;n<r;n++)t[n]=e[n]<<1^e[n+1]>>7;return t[r]=e[r]<<1^135*(e[0]>>7),t},shiftRight:function(e,t){if(t)for(let r=e.length-1;r>=0;r--)e[r]>>=t,r>0&&(e[r]|=e[r-1]<<8-t);return e},getWebCrypto:function(){const e=void 0!==t&&t.crypto&&t.crypto.subtle||this.getNodeCrypto()?.webcrypto.subtle;if(!e)throw Error("The WebCrypto API is not available");return e},getNodeCrypto:function(){return this.nodeRequire("crypto")},getNodeZlib:function(){return this.nodeRequire("zlib")},getNodeBuffer:function(){return(this.nodeRequire("buffer")||{}).Buffer},getHardwareConcurrency:function(){if("undefined"!=typeof navigator)return navigator.hardwareConcurrency||1;return this.nodeRequire("os").cpus().length},isEmailAddress:function(e){if(!L.isString(e))return!1;return/^[^\p{C}\p{Z}@<>\\]+@[^\p{C}\p{Z}@<>\\]+[^\p{C}\p{Z}\p{P}]$/u.test(e)},canonicalizeEOL:function(e){let t=!1;return k(e,(e=>{let r;t&&(e=L.concatUint8Array([new Uint8Array([13]),e])),13===e[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;const n=[];for(let t=0;r=e.indexOf(10,t)+1,r;t=r)13!==e[r-2]&&n.push(r);if(!n.length)return e;const i=new Uint8Array(e.length+n.length);let s=0;for(let t=0;t<n.length;t++){const r=e.subarray(n[t-1]||0,n[t]);i.set(r,s),s+=r.length,i[s-1]=13,i[s]=10,s++}return i.set(e.subarray(n[n.length-1]||0),s),i}),(()=>t?new Uint8Array([13]):void 0))},nativeEOL:function(e){let t=!1;return k(e,(e=>{let r;13===(e=t&&10!==e[0]?L.concatUint8Array([new Uint8Array([13]),e]):new Uint8Array(e))[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;let n=0;for(let t=0;t!==e.length;t=r){r=e.indexOf(13,t)+1,r||(r=e.length);const i=r-(10===e[r]?1:0);t&&e.copyWithin(n,t,i),n+=i-t}return e.subarray(0,n)}),(()=>t?new Uint8Array([13]):void 0))},removeTrailingSpaces:function(e){return e.split("\n").map((e=>{let t=e.length-1;for(;t>=0&&(" "===e[t]||"\t"===e[t]||"\r"===e[t]);t--);return e.substr(0,t+1)})).join("\n")},wrapError:function(e,t){if(!t)return e instanceof Error?e:Error(e);if(e instanceof Error){try{e.message+=": "+t.message,e.cause=t}catch(e){}return e}return Error(e+": "+t.message,{cause:t})},constructAllowedPackets:function(e){const t={};return e.forEach((e=>{if(!e.tag)throw Error("Invalid input: expected a packet class");t[e.tag]=e})),t},anyPromise:function(e){return new Promise((async(t,r)=>{let n;await Promise.all(e.map((async e=>{try{t(await e)}catch(e){n=e}}))),r(n)}))},selectUint8Array:function(e,t,r){const n=Math.max(t.length,r.length),i=new Uint8Array(n);let s=0;for(let n=0;n<i.length;n++)i[n]=t[n]&256-e|r[n]&255+e,s+=e&n<t.length|1-e&n<r.length;return i.subarray(0,s)},selectUint8:function(e,t,r){return t&256-e|r&255+e},isAES:function(e){return e===R.symmetric.aes128||e===R.symmetric.aes192||e===R.symmetric.aes256}},F=L.getNodeBuffer();let O,N;function _(e){let t=new Uint8Array;return k(e,(e=>{t=L.concatUint8Array([t,e]);const r=[],n=Math.floor(t.length/45),i=45*n,s=O(t.subarray(0,i));for(let e=0;e<n;e++)r.push(s.substr(60*e,60)),r.push("\n");return t=t.subarray(i),r.join("")}),(()=>t.length?O(t)+"\n":""))}function H(e){let t="";return k(e,(e=>{t+=e;let r=0;const n=[" ","\t","\r","\n"];for(let e=0;e<n.length;e++){const i=n[e];for(let e=t.indexOf(i);-1!==e;e=t.indexOf(i,e+1))r++}let i=t.length;for(;i>0&&(i-r)%4!=0;i--)n.includes(t[i])&&r--;const s=N(t.substr(0,i));return t=t.substr(i),s}),(()=>N(t)))}function z(e){return H(e.replace(/-/g,"+").replace(/_/g,"/"))}function G(e,t){let r=_(e).replace(/[\r\n]/g,"");return r=r.replace(/[+]/g,"-").replace(/[/]/g,"_").replace(/[=]/g,""),r}function q(e){const t=e.match(/^-----BEGIN PGP (MESSAGE, PART \d+\/\d+|MESSAGE, PART \d+|SIGNED MESSAGE|MESSAGE|PUBLIC KEY BLOCK|PRIVATE KEY BLOCK|SIGNATURE)-----$/m);if(!t)throw Error("Unknown ASCII armor type");return/MESSAGE, PART \d+\/\d+/.test(t[1])?R.armor.multipartSection:/MESSAGE, PART \d+/.test(t[1])?R.armor.multipartLast:/SIGNED MESSAGE/.test(t[1])?R.armor.signed:/MESSAGE/.test(t[1])?R.armor.message:/PUBLIC KEY BLOCK/.test(t[1])?R.armor.publicKey:/PRIVATE KEY BLOCK/.test(t[1])?R.armor.privateKey:/SIGNATURE/.test(t[1])?R.armor.signature:void 0}function j(e,t){let r="";return t.showVersion&&(r+="Version: "+t.versionString+"\n"),t.showComment&&(r+="Comment: "+t.commentString+"\n"),e&&(r+="Comment: "+e+"\n"),r+="\n",r}function V(e){const t=function(e){let t=13501623;return k(e,(e=>{const r=Z?Math.floor(e.length/4):0,n=new Uint32Array(e.buffer,e.byteOffset,r);for(let e=0;e<r;e++)t^=n[e],t=Y[0][t>>24&255]^Y[1][t>>16&255]^Y[2][t>>8&255]^Y[3][255&t];for(let n=4*r;n<e.length;n++)t=t>>8^Y[0][255&t^e[n]]}),(()=>new Uint8Array([t,t>>8,t>>16])))}(e);return _(t)}F?(O=e=>F.from(e).toString("base64"),N=e=>{const t=F.from(e,"base64");return new Uint8Array(t.buffer,t.byteOffset,t.byteLength)}):(O=e=>btoa(L.uint8ArrayToString(e)),N=e=>L.stringToUint8Array(atob(e)));const Y=[Array(255),Array(255),Array(255),Array(255)];for(let e=0;e<=255;e++){let t=e<<16;for(let e=0;e<8;e++)t=t<<1^(8388608&t?8801531:0);Y[0][e]=(16711680&t)>>16|65280&t|(255&t)<<16}for(let e=0;e<=255;e++)Y[1][e]=Y[0][e]>>8^Y[0][255&Y[0][e]];for(let e=0;e<=255;e++)Y[2][e]=Y[1][e]>>8^Y[0][255&Y[1][e]];for(let e=0;e<=255;e++)Y[3][e]=Y[2][e]>>8^Y[0][255&Y[2][e]];const Z=function(){const e=new ArrayBuffer(2);return new DataView(e).setInt16(0,255,!0),255===new Int16Array(e)[0]}();function J(e){for(let t=0;t<e.length;t++)/^([^\s:]|[^\s:][^:]*[^\s:]): .+$/.test(e[t])||L.printDebugError(Error("Improperly formatted armor header: "+e[t])),/^(Version|Comment|MessageID|Hash|Charset): .+$/.test(e[t])||L.printDebugError(Error("Unknown header: "+e[t]))}function X(e){let t=e;const r=e.lastIndexOf("=");return r>=0&&r!==e.length-1&&(t=e.slice(0,r)),t}function W(e){return new Promise((async(t,r)=>{try{const n=/^-----[^-]+-----$/m,i=/^[ \f\r\t\u00a0\u2000-\u200a\u202f\u205f\u3000]*$/;let s;const a=[];let o,c,u=a,h=[];const l=H(E(e,(async(e,f)=>{const y=D(e);try{for(;;){let e=await y.readLine();if(void 0===e)throw Error("Misformed armored text");if(e=L.removeTrailingSpaces(e.replace(/[\r\n]/g,"")),s)if(o)c||s!==R.armor.signed||(n.test(e)?(h=h.join("\r\n"),c=!0,J(u),u=[],o=!1):h.push(e.replace(/^- /,"")));else if(n.test(e)&&r(Error("Mandatory blank line missing between armor headers and armor data")),i.test(e)){if(J(u),o=!0,c||s!==R.armor.signed){t({text:h,data:l,headers:a,type:s});break}}else u.push(e);else n.test(e)&&(s=q(e))}}catch(e){return void r(e)}const p=x(f);try{for(;;){await p.ready;const{done:e,value:t}=await y.read();if(e)throw Error("Misformed armored text");const r=t+"";if(-1!==r.indexOf("=")||-1!==r.indexOf("-")){let e=await y.readToEnd();e.length||(e=""),e=r+e,e=L.removeTrailingSpaces(e.replace(/\r/g,""));const t=e.split(n);if(1===t.length)throw Error("Misformed armored text");const i=X(t[0].slice(0,-1));await p.write(i);break}await p.write(r)}await p.ready,await p.close()}catch(e){await p.abort(e)}})))}catch(e){r(e)}})).then((async e=>(o(e.data)&&(e.data=await C(e.data)),e)))}function $(e,t,r,n,i,s=!1,a=T){let o,c;e===R.armor.signed&&(o=t.text,c=t.hash,t=t.data);const u=s&&S(t),h=[];switch(e){case R.armor.multipartSection:h.push("-----BEGIN PGP MESSAGE, PART "+r+"/"+n+"-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP MESSAGE, PART "+r+"/"+n+"-----\n");break;case R.armor.multipartLast:h.push("-----BEGIN PGP MESSAGE, PART "+r+"-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP MESSAGE, PART "+r+"-----\n");break;case R.armor.signed:h.push("-----BEGIN PGP SIGNED MESSAGE-----\n"),h.push(c?`Hash: ${c}\n\n`:"\n"),h.push(o.replace(/^-/gm,"- -")),h.push("\n-----BEGIN PGP SIGNATURE-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP SIGNATURE-----\n");break;case R.armor.message:h.push("-----BEGIN PGP MESSAGE-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP MESSAGE-----\n");break;case R.armor.publicKey:h.push("-----BEGIN PGP PUBLIC KEY BLOCK-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP PUBLIC KEY BLOCK-----\n");break;case R.armor.privateKey:h.push("-----BEGIN PGP PRIVATE KEY BLOCK-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP PRIVATE KEY BLOCK-----\n");break;case R.armor.signature:h.push("-----BEGIN PGP SIGNATURE-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP SIGNATURE-----\n")}return L.concat(h)}const ee=BigInt(0),te=BigInt(1);function re(e){const t="0123456789ABCDEF";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),BigInt("0x0"+r)}function ne(e,t){const r=e%t;return r<ee?r+t:r}function ie(e,t,r){if(r===ee)throw Error("Modulo cannot be zero");if(r===te)return BigInt(0);if(t<ee)throw Error("Unsopported negative exponent");let n=t,i=e;i%=r;let s=BigInt(1);for(;n>ee;){const e=n&te;n>>=te;s=e?s*i%r:s,i=i*i%r}return s}function se(e){return e>=ee?e:-e}function ae(e,t){const{gcd:r,x:n}=function(e,t){let r=BigInt(0),n=BigInt(1),i=BigInt(1),s=BigInt(0),a=se(e),o=se(t);const c=e<ee,u=t<ee;for(;o!==ee;){const e=a/o;let t=r;r=i-e*r,i=t,t=n,n=s-e*n,s=t,t=o,o=a%o,a=t}return{x:c?-i:i,y:u?-s:s,gcd:a}}(e,t);if(r!==te)throw Error("Inverse does not exist");return ne(n+t,t)}function oe(e){const t=Number(e);if(t>Number.MAX_SAFE_INTEGER)throw Error("Number can only safely store up to 53 bits");return t}function ce(e,t){return(e>>BigInt(t)&te)===ee?0:1}function ue(e){const t=e<ee?BigInt(-1):ee;let r=1,n=e;for(;(n>>=te)!==t;)r++;return r}function he(e){const t=e<ee?BigInt(-1):ee,r=BigInt(8);let n=1,i=e;for(;(i>>=r)!==t;)n++;return n}function le(e,t="be",r){let n=e.toString(16);n.length%2==1&&(n="0"+n);const i=n.length/2,s=new Uint8Array(r||i),a=r?r-i:0;let o=0;for(;o<i;)s[o+a]=parseInt(n.slice(2*o,2*o+2),16),o++;return"be"!==t&&s.reverse(),s}const fe=L.getNodeCrypto();function ye(e){const t="undefined"!=typeof crypto?crypto:fe?.webcrypto;if(t?.getRandomValues){const r=new Uint8Array(e);return t.getRandomValues(r)}throw Error("No secure random number generator available.")}function pe(e,t){if(t<e)throw Error("Illegal parameter value: max <= min");const r=t-e;return ne(re(ye(he(r)+8)),r)+e}const de=BigInt(1);function ge(e,t,r){const n=BigInt(30),i=de<<BigInt(e-1),s=[1,6,5,4,3,2,1,4,3,2,1,2,1,4,3,2,1,2,1,4,3,2,1,6,5,4,3,2,1,2];let a=pe(i,i<<de),o=oe(ne(a,n));do{a+=BigInt(s[o]),o=(o+s[o])%s.length,ue(a)>e&&(a=ne(a,i<<de),a+=i,o=oe(ne(a,n)))}while(!Ae(a,t,r));return a}function Ae(e,t,r){return(!t||function(e,t){let r=e,n=t;for(;n!==ee;){const e=n;n=r%n,r=e}return r}(e-de,t)===de)&&(!!function(e){const t=BigInt(0);return we.every((r=>ne(e,r)!==t))}(e)&&(!!function(e,t=BigInt(2)){return ie(t,e-de,e)===de}(e)&&!!function(e,t){const r=ue(e);t||(t=Math.max(1,r/48|0));const n=e-de;let i=0;for(;!ce(n,i);)i++;const s=e>>BigInt(i);for(;t>0;t--){let t,r=ie(pe(BigInt(2),n),s,e);if(r!==de&&r!==n){for(t=1;t<i;t++){if(r=ne(r*r,e),r===de)return!1;if(r===n)break}if(t===i)return!1}}return!0}(e,r)))}const we=[7,11,13,17,19,23,29,31,37,41,43,47,53,59,61,67,71,73,79,83,89,97,101,103,107,109,113,127,131,137,139,149,151,157,163,167,173,179,181,191,193,197,199,211,223,227,229,233,239,241,251,257,263,269,271,277,281,283,293,307,311,313,317,331,337,347,349,353,359,367,373,379,383,389,397,401,409,419,421,431,433,439,443,449,457,461,463,467,479,487,491,499,503,509,521,523,541,547,557,563,569,571,577,587,593,599,601,607,613,617,619,631,641,643,647,653,659,661,673,677,683,691,701,709,719,727,733,739,743,751,757,761,769,773,787,797,809,811,821,823,827,829,839,853,857,859,863,877,881,883,887,907,911,919,929,937,941,947,953,967,971,977,983,991,997,1009,1013,1019,1021,1031,1033,1039,1049,1051,1061,1063,1069,1087,1091,1093,1097,1103,1109,1117,1123,1129,1151,1153,1163,1171,1181,1187,1193,1201,1213,1217,1223,1229,1231,1237,1249,1259,1277,1279,1283,1289,1291,1297,1301,1303,1307,1319,1321,1327,1361,1367,1373,1381,1399,1409,1423,1427,1429,1433,1439,1447,1451,1453,1459,1471,1481,1483,1487,1489,1493,1499,1511,1523,1531,1543,1549,1553,1559,1567,1571,1579,1583,1597,1601,1607,1609,1613,1619,1621,1627,1637,1657,1663,1667,1669,1693,1697,1699,1709,1721,1723,1733,1741,1747,1753,1759,1777,1783,1787,1789,1801,1811,1823,1831,1847,1861,1867,1871,1873,1877,1879,1889,1901,1907,1913,1931,1933,1949,1951,1973,1979,1987,1993,1997,1999,2003,2011,2017,2027,2029,2039,2053,2063,2069,2081,2083,2087,2089,2099,2111,2113,2129,2131,2137,2141,2143,2153,2161,2179,2203,2207,2213,2221,2237,2239,2243,2251,2267,2269,2273,2281,2287,2293,2297,2309,2311,2333,2339,2341,2347,2351,2357,2371,2377,2381,2383,2389,2393,2399,2411,2417,2423,2437,2441,2447,2459,2467,2473,2477,2503,2521,2531,2539,2543,2549,2551,2557,2579,2591,2593,2609,2617,2621,2633,2647,2657,2659,2663,2671,2677,2683,2687,2689,2693,2699,2707,2711,2713,2719,2729,2731,2741,2749,2753,2767,2777,2789,2791,2797,2801,2803,2819,2833,2837,2843,2851,2857,2861,2879,2887,2897,2903,2909,2917,2927,2939,2953,2957,2963,2969,2971,2999,3001,3011,3019,3023,3037,3041,3049,3061,3067,3079,3083,3089,3109,3119,3121,3137,3163,3167,3169,3181,3187,3191,3203,3209,3217,3221,3229,3251,3253,3257,3259,3271,3299,3301,3307,3313,3319,3323,3329,3331,3343,3347,3359,3361,3371,3373,3389,3391,3407,3413,3433,3449,3457,3461,3463,3467,3469,3491,3499,3511,3517,3527,3529,3533,3539,3541,3547,3557,3559,3571,3581,3583,3593,3607,3613,3617,3623,3631,3637,3643,3659,3671,3673,3677,3691,3697,3701,3709,3719,3727,3733,3739,3761,3767,3769,3779,3793,3797,3803,3821,3823,3833,3847,3851,3853,3863,3877,3881,3889,3907,3911,3917,3919,3923,3929,3931,3943,3947,3967,3989,4001,4003,4007,4013,4019,4021,4027,4049,4051,4057,4073,4079,4091,4093,4099,4111,4127,4129,4133,4139,4153,4157,4159,4177,4201,4211,4217,4219,4229,4231,4241,4243,4253,4259,4261,4271,4273,4283,4289,4297,4327,4337,4339,4349,4357,4363,4373,4391,4397,4409,4421,4423,4441,4447,4451,4457,4463,4481,4483,4493,4507,4513,4517,4519,4523,4547,4549,4561,4567,4583,4591,4597,4603,4621,4637,4639,4643,4649,4651,4657,4663,4673,4679,4691,4703,4721,4723,4729,4733,4751,4759,4783,4787,4789,4793,4799,4801,4813,4817,4831,4861,4871,4877,4889,4903,4909,4919,4931,4933,4937,4943,4951,4957,4967,4969,4973,4987,4993,4999].map((e=>BigInt(e)));const me=L.getWebCrypto(),be=L.getNodeCrypto(),ke=be&&be.getHashes();function Ee(e){if(be&&ke.includes(e))return async function(t){const r=be.createHash(e);return k(t,(e=>{r.update(e)}),(()=>new Uint8Array(r.digest())))}}function ve(e,t){const r=async()=>{const{nobleHashes:t}=await Promise.resolve().then((function(){return uf})),r=t.get(e);if(!r)throw Error("Unsupported hash");return r};return async function(e){if(o(e)&&(e=await C(e)),L.isStream(e)){const t=(await r()).create();return k(e,(e=>{t.update(e)}),(()=>t.digest()))}if(me&&t)return new Uint8Array(await me.digest(t,e));return(await r())(e)}}const Ke=Ee("md5")||ve("md5"),Se=Ee("sha1")||ve("sha1","SHA-1"),Ie=Ee("sha224")||ve("sha224"),Be=Ee("sha256")||ve("sha256","SHA-256"),Ce=Ee("sha384")||ve("sha384","SHA-384"),Ue=Ee("sha512")||ve("sha512","SHA-512"),Pe=Ee("ripemd160")||ve("ripemd160"),De=Ee("sha3-256")||ve("sha3_256"),xe=Ee("sha3-512")||ve("sha3_512");function Qe(e,t){switch(e){case R.hash.md5:return Ke(t);case R.hash.sha1:return Se(t);case R.hash.ripemd:return Pe(t);case R.hash.sha256:return Be(t);case R.hash.sha384:return Ce(t);case R.hash.sha512:return Ue(t);case R.hash.sha224:return Ie(t);case R.hash.sha3_256:return De(t);case R.hash.sha3_512:return xe(t);default:throw Error("Unsupported hash function")}}function Re(e){switch(e){case R.hash.md5:return 16;case R.hash.sha1:case R.hash.ripemd:return 20;case R.hash.sha256:return 32;case R.hash.sha384:return 48;case R.hash.sha512:return 64;case R.hash.sha224:return 28;case R.hash.sha3_256:return 32;case R.hash.sha3_512:return 64;default:throw Error("Invalid hash algorithm.")}}const Te=[];function Me(e,t){const r=e.length;if(r>t-11)throw Error("Message too long");const n=function(e){const t=new Uint8Array(e);let r=0;for(;r<e;){const n=ye(e-r);for(let e=0;e<n.length;e++)0!==n[e]&&(t[r++]=n[e])}return t}(t-r-3),i=new Uint8Array(t);return i[1]=2,i.set(n,2),i.set(e,t-r),i}function Le(e,t){let r=2,n=1;for(let t=r;t<e.length;t++)n&=0!==e[t],r+=n;const i=r-2,s=e.subarray(r+1),a=0===e[0]&2===e[1]&i>=8&!n;if(t)return L.selectUint8Array(a,s,t);if(a)return s;throw Error("Decryption error")}function Fe(e,t,r){let n;if(t.length!==Re(e))throw Error("Invalid hash length");const i=new Uint8Array(Te[e].length);for(n=0;n<Te[e].length;n++)i[n]=Te[e][n];const s=i.length+t.length;if(r<s+11)throw Error("Intended encoded message length too short");const a=new Uint8Array(r-s-3).fill(255),o=new Uint8Array(r);return o[1]=1,o.set(a,2),o.set(i,r-s),o.set(t,r-t.length),o}Te[1]=[48,32,48,12,6,8,42,134,72,134,247,13,2,5,5,0,4,16],Te[2]=[48,33,48,9,6,5,43,14,3,2,26,5,0,4,20],Te[3]=[48,33,48,9,6,5,43,36,3,2,1,5,0,4,20],Te[8]=[48,49,48,13,6,9,96,134,72,1,101,3,4,2,1,5,0,4,32],Te[9]=[48,65,48,13,6,9,96,134,72,1,101,3,4,2,2,5,0,4,48],Te[10]=[48,81,48,13,6,9,96,134,72,1,101,3,4,2,3,5,0,4,64],Te[11]=[48,45,48,13,6,9,96,134,72,1,101,3,4,2,4,5,0,4,28];const Oe=L.getWebCrypto(),Ne=L.getNodeCrypto(),_e=BigInt(1);async function He(e,t,r,n,i,s,a,o,c){if(Re(e)>=r.length)throw Error("Digest size cannot exceed key modulus size");if(t&&!L.isStream(t))if(L.getWebCrypto())try{return await async function(e,t,r,n,i,s,a,o){const c=await je(r,n,i,s,a,o),u={name:"RSASSA-PKCS1-v1_5",hash:{name:e}},h=await Oe.importKey("jwk",c,u,!1,["sign"]);return new Uint8Array(await Oe.sign("RSASSA-PKCS1-v1_5",h,t))}(R.read(R.webHash,e),t,r,n,i,s,a,o)}catch(e){L.printDebugError(e)}else if(L.getNodeCrypto())return async function(e,t,r,n,i,s,a,o){const c=Ne.createSign(R.read(R.hash,e));c.write(t),c.end();const u=await je(r,n,i,s,a,o);return new Uint8Array(c.sign({key:u,format:"jwk",type:"pkcs1"}))}(e,t,r,n,i,s,a,o);return async function(e,t,r,n){t=re(t);const i=re(Fe(e,n,he(t)));return r=re(r),le(ie(i,r,t),"be",he(t))}(e,r,i,c)}async function ze(e,t,r,n,i,s){if(t&&!L.isStream(t))if(L.getWebCrypto())try{return await async function(e,t,r,n,i){const s=Ve(n,i),a=await Oe.importKey("jwk",s,{name:"RSASSA-PKCS1-v1_5",hash:{name:e}},!1,["verify"]);return Oe.verify("RSASSA-PKCS1-v1_5",a,r,t)}(R.read(R.webHash,e),t,r,n,i)}catch(e){L.printDebugError(e)}else if(L.getNodeCrypto())return async function(e,t,r,n,i){const s=Ve(n,i),a={key:s,format:"jwk",type:"pkcs1"},o=Ne.createVerify(R.read(R.hash,e));o.write(t),o.end();try{return o.verify(a,r)}catch(e){return!1}}(e,t,r,n,i);return async function(e,t,r,n,i){if(r=re(r),t=re(t),n=re(n),t>=r)throw Error("Signature size cannot exceed modulus size");const s=le(ie(t,n,r),"be",he(r)),a=Fe(e,i,he(r));return L.equalsUint8Array(s,a)}(e,r,n,i,s)}async function Ge(e,t,r){return L.getNodeCrypto()?async function(e,t,r){const n=Ve(t,r),i={key:n,format:"jwk",type:"pkcs1",padding:Ne.constants.RSA_PKCS1_PADDING};return new Uint8Array(Ne.publicEncrypt(i,e))}(e,t,r):async function(e,t,r){if(t=re(t),e=re(Me(e,he(t))),r=re(r),e>=t)throw Error("Message size cannot exceed modulus size");return le(ie(e,r,t),"be",he(t))}(e,t,r)}async function qe(e,t,r,n,i,s,a,o){if(L.getNodeCrypto()&&!o)try{return await async function(e,t,r,n,i,s,a){const o=await je(t,r,n,i,s,a),c={key:o,format:"jwk",type:"pkcs1",padding:Ne.constants.RSA_PKCS1_PADDING};try{return new Uint8Array(Ne.privateDecrypt(c,e))}catch(e){throw Error("Decryption error")}}(e,t,r,n,i,s,a)}catch(e){L.printDebugError(e)}return async function(e,t,r,n,i,s,a,o){if(e=re(e),t=re(t),r=re(r),n=re(n),i=re(i),s=re(s),a=re(a),e>=t)throw Error("Data too large.");const c=ne(n,s-_e),u=ne(n,i-_e),h=pe(BigInt(2),t),l=ie(ae(h,t),r,t);e=ne(e*l,t);const f=ie(e,u,i),y=ie(e,c,s),p=ne(a*(y-f),s);let d=p*i+f;return d=ne(d*h,t),Le(le(d,"be",he(t)),o)}(e,t,r,n,i,s,a,o)}async function je(e,t,r,n,i,s){const a=re(n),o=re(i),c=re(r);let u=ne(c,o-_e),h=ne(c,a-_e);return h=le(h),u=le(u),{kty:"RSA",n:G(e),e:G(t),d:G(r),p:G(i),q:G(n),dp:G(u),dq:G(h),qi:G(s),ext:!0}}function Ve(e,t){return{kty:"RSA",n:G(e),e:G(t),ext:!0}}function Ye(e,t){return{n:z(e.n),e:le(t),d:z(e.d),p:z(e.q),q:z(e.p),u:z(e.qi)}}const Ze=BigInt(1);const Je={"2a8648ce3d030107":R.curve.nistP256,"2b81040022":R.curve.nistP384,"2b81040023":R.curve.nistP521,"2b8104000a":R.curve.secp256k1,"2b06010401da470f01":R.curve.ed25519Legacy,"2b060104019755010501":R.curve.curve25519Legacy,"2b2403030208010107":R.curve.brainpoolP256r1,"2b240303020801010b":R.curve.brainpoolP384r1,"2b240303020801010d":R.curve.brainpoolP512r1};class Xe{constructor(e){if(e instanceof Xe)this.oid=e.oid;else if(L.isArray(e)||L.isUint8Array(e)){if(6===(e=new Uint8Array(e))[0]){if(e[1]!==e.length-2)throw Error("Length mismatch in DER encoded oid");e=e.subarray(2)}this.oid=e}else this.oid=""}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.oid=e.subarray(1,1+t),1+this.oid.length}throw Error("Invalid oid")}write(){return L.concatUint8Array([new Uint8Array([this.oid.length]),this.oid])}toHex(){return L.uint8ArrayToHex(this.oid)}getName(){const e=Je[this.toHex()];if(!e)throw Error("Unknown curve object identifier.");return e}}function We(e){let t,r=0;const n=e[0];return n<192?([r]=e,t=1):n<255?(r=(e[0]-192<<8)+e[1]+192,t=2):255===n&&(r=L.readNumber(e.subarray(1,5)),t=5),{len:r,offset:t}}function $e(e){return e<192?new Uint8Array([e]):e>191&&e<8384?new Uint8Array([192+(e-192>>8),e-192&255]):L.concatUint8Array([new Uint8Array([255]),L.writeNumber(e,4)])}function et(e){if(e<0||e>30)throw Error("Partial Length power must be between 1 and 30");return new Uint8Array([224+e])}function tt(e){return new Uint8Array([192|e])}function rt(e,t){return L.concatUint8Array([tt(e),$e(t)])}function nt(e){return[R.packet.literalData,R.packet.compressedData,R.packet.symmetricallyEncryptedData,R.packet.symEncryptedIntegrityProtectedData,R.packet.aeadEncryptedData].includes(e)}async function it(e,t,r){let n,i;try{const s=await e.peekBytes(2);if(!s||s.length<2||!(128&s[0]))throw Error("Error during parsing. This message / key probably does not conform to a valid OpenPGP format.");const a=await e.readByte();let o,c,u=-1,h=-1;h=0,64&a&&(h=1),h?u=63&a:(u=(63&a)>>2,c=3&a);const l=nt(u);let f,y=null;if(t&&l){if("array"===t){const e=new ArrayStream;n=x(e),y=e}else{const e=new TransformStream;n=x(e.writable),y=e.readable}i=r({tag:u,packet:y})}else y=[];do{if(h){const t=await e.readByte();if(f=!1,t<192)o=t;else if(t>=192&&t<224)o=(t-192<<8)+await e.readByte()+192;else if(t>223&&t<255){if(o=1<<(31&t),f=!0,!l)throw new TypeError("This packet type does not support partial lengths.")}else o=await e.readByte()<<24|await e.readByte()<<16|await e.readByte()<<8|await e.readByte()}else switch(c){case 0:o=await e.readByte();break;case 1:o=await e.readByte()<<8|await e.readByte();break;case 2:o=await e.readByte()<<24|await e.readByte()<<16|await e.readByte()<<8|await e.readByte();break;default:o=1/0}if(o>0){let t=0;for(;;){n&&await n.ready;const{done:r,value:i}=await e.read();if(r){if(o===1/0)break;throw Error("Unexpected end of packet")}const s=o===1/0?i:i.subarray(0,o-t);if(n?await n.write(s):y.push(s),t+=i.length,t>=o){e.unshift(i.subarray(o-t+i.length));break}}}}while(f);n?(await n.ready,await n.close()):(y=L.concatUint8Array(y),await r({tag:u,packet:y}))}catch(e){if(n)return await n.abort(e),!0;throw e}finally{n&&await i}}class st extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,st),this.name="UnsupportedError"}}class at extends st{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,st),this.name="UnknownPacketError"}}class ot extends st{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,st),this.name="MalformedPacketError"}}class ct{constructor(e,t){this.tag=e,this.rawContent=t}write(){return this.rawContent}}async function ut(e){switch(e){case R.publicKey.ed25519:try{const e=L.getWebCrypto(),t=await e.generateKey("Ed25519",!0,["sign","verify"]).catch((e=>{if("OperationError"===e.name){const e=Error("Unexpected key generation issue");throw e.name="NotSupportedError",e}throw e})),r=await e.exportKey("jwk",t.privateKey),n=await e.exportKey("jwk",t.publicKey);return{A:new Uint8Array(z(n.x)),seed:z(r.d)}}catch(t){if("NotSupportedError"!==t.name)throw t;const{default:r}=await Promise.resolve().then((function(){return ey})),n=ye(yt(e)),{publicKey:i}=r.sign.keyPair.fromSeed(n);return{A:i,seed:n}}case R.publicKey.ed448:{const e=await L.getNobleCurve(R.publicKey.ed448),{secretKey:t,publicKey:r}=e.keygen();return{A:r,seed:t}}default:throw Error("Unsupported EdDSA algorithm")}}async function ht(e,t,r,n,i,s){switch(e){case R.publicKey.ed25519:try{const t=L.getWebCrypto(),r=gt(e,n,i),a=await t.importKey("jwk",r,"Ed25519",!1,["sign"]);return{RS:new Uint8Array(await t.sign("Ed25519",a,s))}}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:t}=await Promise.resolve().then((function(){return ey})),r=L.concatUint8Array([i,n]);return{RS:t.sign.detached(s,r)}}case R.publicKey.ed448:return{RS:(await L.getNobleCurve(R.publicKey.ed448)).sign(s,i)};default:throw Error("Unsupported EdDSA algorithm")}}async function lt(e,t,{RS:r},n,i,s){switch(e){case R.publicKey.ed25519:try{const t=L.getWebCrypto(),n=dt(e,i),a=await t.importKey("jwk",n,"Ed25519",!1,["verify"]);return await t.verify("Ed25519",a,r,s)}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:t}=await Promise.resolve().then((function(){return ey}));return t.sign.detached.verify(s,r,i)}case R.publicKey.ed448:return(await L.getNobleCurve(R.publicKey.ed448)).verify(r,s,i);default:throw Error("Unsupported EdDSA algorithm")}}async function ft(e,t,r){switch(e){case R.publicKey.ed25519:try{const n=L.getWebCrypto(),i=gt(e,t,r),s=dt(e,t),a=await n.importKey("jwk",i,"Ed25519",!1,["sign"]),o=await n.importKey("jwk",s,"Ed25519",!1,["verify"]),c=ye(8),u=new Uint8Array(await n.sign("Ed25519",a,c));return await n.verify("Ed25519",o,u,c)}catch(e){if("NotSupportedError"!==e.name)return!1;const{default:n}=await Promise.resolve().then((function(){return ey})),{publicKey:i}=n.sign.keyPair.fromSeed(r);return L.equalsUint8Array(t,i)}case R.publicKey.ed448:{const e=(await L.getNobleCurve(R.publicKey.ed448)).getPublicKey(r);return L.equalsUint8Array(t,e)}default:return!1}}function yt(e){switch(e){case R.publicKey.ed25519:return 32;case R.publicKey.ed448:return 57;default:throw Error("Unsupported EdDSA algorithm")}}function pt(e){switch(e){case R.publicKey.ed25519:return R.hash.sha256;case R.publicKey.ed448:return R.hash.sha512;default:throw Error("Unknown EdDSA algo")}}const dt=(e,t)=>{if(e===R.publicKey.ed25519){return{kty:"OKP",crv:"Ed25519",x:G(t),ext:!0}}throw Error("Unsupported EdDSA algorithm")},gt=(e,t,r)=>{if(e===R.publicKey.ed25519){const n=dt(e,t);return n.d=G(r),n}throw Error("Unsupported EdDSA algorithm")};var At=/*#__PURE__*/Object.freeze({__proto__:null,generate:ut,getPayloadSize:yt,getPreferredHashAlgo:pt,sign:ht,validateParams:ft,verify:lt});
3
- /*! noble-ciphers - MIT License (c) 2023 Paul Miller (paulmillr.com) */function wt(e){return e instanceof Uint8Array||ArrayBuffer.isView(e)&&"Uint8Array"===e.constructor.name}function mt(e,...t){if(!wt(e))throw Error("Uint8Array expected");if(t.length>0&&!t.includes(e.length))throw Error("Uint8Array expected of length "+t+", got length="+e.length)}function bt(e,t=!0){if(e.destroyed)throw Error("Hash instance has been destroyed");if(t&&e.finished)throw Error("Hash#digest() has already been called")}function kt(e,t){mt(e);const r=t.outputLen;if(e.length<r)throw Error("digestInto() expects output buffer of length at least "+r)}function Et(e){return new Uint8Array(e.buffer,e.byteOffset,e.byteLength)}function vt(e){return new Uint32Array(e.buffer,e.byteOffset,Math.floor(e.byteLength/4))}function Kt(...e){for(let t=0;t<e.length;t++)e[t].fill(0)}function St(e){return new DataView(e.buffer,e.byteOffset,e.byteLength)}const It=/* @__PURE__ */(()=>68===new Uint8Array(new Uint32Array([287454020]).buffer)[0])();function Bt(e){if("string"==typeof e)e=function(e){if("string"!=typeof e)throw Error("string expected");return new Uint8Array((new TextEncoder).encode(e))}(e);else{if(!wt(e))throw Error("Uint8Array expected, got "+typeof e);e=Tt(e)}return e}function Ct(e,t){return e.buffer===t.buffer&&e.byteOffset<t.byteOffset+t.byteLength&&t.byteOffset<e.byteOffset+e.byteLength}function Ut(e,t){if(Ct(e,t)&&e.byteOffset<t.byteOffset)throw Error("complex overlap of input and output is not supported")}function Pt(e,t){if(e.length!==t.length)return!1;let r=0;for(let n=0;n<e.length;n++)r|=e[n]^t[n];return 0===r}const Dt=(e,t)=>{function r(r,...n){if(mt(r),!It)throw Error("Non little-endian hardware is not yet supported");if(void 0!==e.nonceLength){const t=n[0];if(!t)throw Error("nonce / iv required");e.varSizeNonce?mt(t):mt(t,e.nonceLength)}const i=e.tagLength;i&&void 0!==n[1]&&mt(n[1]);const s=t(r,...n),a=(e,t)=>{if(void 0!==t){if(2!==e)throw Error("cipher output not supported");mt(t)}};let o=!1;return{encrypt(e,t){if(o)throw Error("cannot encrypt() twice with same key + nonce");return o=!0,mt(e),a(s.encrypt.length,t),s.encrypt(e,t)},decrypt(e,t){if(mt(e),i&&e.length<i)throw Error("invalid ciphertext length: smaller than tagLength="+i);return a(s.decrypt.length,t),s.decrypt(e,t)}}}return Object.assign(r,e),r};function xt(e,t,r=!0){if(void 0===t)return new Uint8Array(e);if(t.length!==e)throw Error("invalid output length, expected "+e+", got: "+t.length);if(r&&!Rt(t))throw Error("invalid output, must be aligned");return t}function Qt(e,t,r,n){if("function"==typeof e.setBigUint64)return e.setBigUint64(t,r,n);const i=BigInt(32),s=BigInt(4294967295),a=Number(r>>i&s),o=Number(r&s);e.setUint32(t+0,a,n),e.setUint32(t+4,o,n)}function Rt(e){return e.byteOffset%4==0}function Tt(e){return Uint8Array.from(e)}const Mt=16,Lt=/* @__PURE__ */new Uint8Array(16),Ft=vt(Lt),Ot=e=>(e>>>0&255)<<24|(e>>>8&255)<<16|(e>>>16&255)<<8|e>>>24&255;class Nt{constructor(e,t){this.blockLen=Mt,this.outputLen=Mt,this.s0=0,this.s1=0,this.s2=0,this.s3=0,this.finished=!1,mt(e=Bt(e),16);const r=St(e);let n=r.getUint32(0,!1),i=r.getUint32(4,!1),s=r.getUint32(8,!1),a=r.getUint32(12,!1);const o=[];for(let e=0;e<128;e++)o.push({s0:Ot(n),s1:Ot(i),s2:Ot(s),s3:Ot(a)}),({s0:n,s1:i,s2:s,s3:a}={s3:(h=s)<<31|(l=a)>>>1,s2:(u=i)<<31|h>>>1,s1:(c=n)<<31|u>>>1,s0:c>>>1^225<<24&-(1&l)});var c,u,h,l;const f=(y=t||1024)>65536?8:y>1024?4:2;var y;if(![1,2,4,8].includes(f))throw Error("ghash: invalid window size, expected 2, 4 or 8");this.W=f;const p=128/f,d=this.windowSize=2**f,g=[];for(let e=0;e<p;e++)for(let t=0;t<d;t++){let r=0,n=0,i=0,s=0;for(let a=0;a<f;a++){if(!(t>>>f-a-1&1))continue;const{s0:c,s1:u,s2:h,s3:l}=o[f*e+a];r^=c,n^=u,i^=h,s^=l}g.push({s0:r,s1:n,s2:i,s3:s})}this.t=g}_updateBlock(e,t,r,n){e^=this.s0,t^=this.s1,r^=this.s2,n^=this.s3;const{W:i,t:s,windowSize:a}=this;let o=0,c=0,u=0,h=0;const l=(1<<i)-1;let f=0;for(const y of[e,t,r,n])for(let e=0;e<4;e++){const t=y>>>8*e&255;for(let e=8/i-1;e>=0;e--){const r=t>>>i*e&l,{s0:n,s1:y,s2:p,s3:d}=s[f*a+r];o^=n,c^=y,u^=p,h^=d,f+=1}}this.s0=o,this.s1=c,this.s2=u,this.s3=h}update(e){bt(this),mt(e=Bt(e));const t=vt(e),r=Math.floor(e.length/Mt),n=e.length%Mt;for(let e=0;e<r;e++)this._updateBlock(t[4*e+0],t[4*e+1],t[4*e+2],t[4*e+3]);return n&&(Lt.set(e.subarray(r*Mt)),this._updateBlock(Ft[0],Ft[1],Ft[2],Ft[3]),Kt(Ft)),this}destroy(){const{t:e}=this;for(const t of e)t.s0=0,t.s1=0,t.s2=0,t.s3=0}digestInto(e){bt(this),kt(e,this),this.finished=!0;const{s0:t,s1:r,s2:n,s3:i}=this,s=vt(e);return s[0]=t,s[1]=r,s[2]=n,s[3]=i,e}digest(){const e=new Uint8Array(Mt);return this.digestInto(e),this.destroy(),e}}class _t extends Nt{constructor(e,t){mt(e=Bt(e));const r=function(e){e.reverse();const t=1&e[15];let r=0;for(let t=0;t<e.length;t++){const n=e[t];e[t]=n>>>1|r,r=(1&n)<<7}return e[0]^=225&-t,e}(Tt(e));super(r,t),Kt(r)}update(e){e=Bt(e),bt(this);const t=vt(e),r=e.length%Mt,n=Math.floor(e.length/Mt);for(let e=0;e<n;e++)this._updateBlock(Ot(t[4*e+3]),Ot(t[4*e+2]),Ot(t[4*e+1]),Ot(t[4*e+0]));return r&&(Lt.set(e.subarray(n*Mt)),this._updateBlock(Ot(Ft[3]),Ot(Ft[2]),Ot(Ft[1]),Ot(Ft[0])),Kt(Ft)),this}digestInto(e){bt(this),kt(e,this),this.finished=!0;const{s0:t,s1:r,s2:n,s3:i}=this,s=vt(e);return s[0]=t,s[1]=r,s[2]=n,s[3]=i,e.reverse()}}function Ht(e){const t=(t,r)=>e(r,t.length).update(Bt(t)).digest(),r=e(new Uint8Array(16),0);return t.outputLen=r.outputLen,t.blockLen=r.blockLen,t.create=(t,r)=>e(t,r),t}const zt=Ht(((e,t)=>new Nt(e,t)));Ht(((e,t)=>new _t(e,t)));const Gt=16,qt=/* @__PURE__ */new Uint8Array(Gt);function jt(e){return e<<1^283&-(e>>7)}function Vt(e,t){let r=0;for(;t>0;t>>=1)r^=e&-(1&t),e=jt(e);return r}const Yt=/* @__PURE__ */(()=>{const e=new Uint8Array(256);for(let t=0,r=1;t<256;t++,r^=jt(r))e[t]=r;const t=new Uint8Array(256);t[0]=99;for(let r=0;r<255;r++){let n=e[255-r];n|=n<<8,t[e[r]]=255&(n^n>>4^n>>5^n>>6^n>>7^99)}return Kt(e),t})(),Zt=/* @__PURE__ */Yt.map(((e,t)=>Yt.indexOf(t))),Jt=e=>e<<8|e>>>24,Xt=e=>e<<24&4278190080|e<<8&16711680|e>>>8&65280|e>>>24&255;function Wt(e,t){if(256!==e.length)throw Error("Wrong sbox length");const r=new Uint32Array(256).map(((r,n)=>t(e[n]))),n=r.map(Jt),i=n.map(Jt),s=i.map(Jt),a=new Uint32Array(65536),o=new Uint32Array(65536),c=new Uint16Array(65536);for(let t=0;t<256;t++)for(let u=0;u<256;u++){const h=256*t+u;a[h]=r[t]^n[u],o[h]=i[t]^s[u],c[h]=e[t]<<8|e[u]}return{sbox:e,sbox2:c,T0:r,T1:n,T2:i,T3:s,T01:a,T23:o}}const $t=/* @__PURE__ */Wt(Yt,(e=>Vt(e,3)<<24|e<<16|e<<8|Vt(e,2))),er=/* @__PURE__ */Wt(Zt,(e=>Vt(e,11)<<24|Vt(e,13)<<16|Vt(e,9)<<8|Vt(e,14))),tr=/* @__PURE__ */(()=>{const e=new Uint8Array(16);for(let t=0,r=1;t<16;t++,r=jt(r))e[t]=r;return e})();function rr(e){mt(e);const t=e.length;if(![16,24,32].includes(t))throw Error("aes: invalid key size, should be 16, 24 or 32, got "+t);const{sbox2:r}=$t,n=[];Rt(e)||n.push(e=Tt(e));const i=vt(e),s=i.length,a=e=>sr(r,e,e,e,e),o=new Uint32Array(t+28);o.set(i);for(let e=s;e<o.length;e++){let t=o[e-1];e%s==0?t=a((c=t)<<24|c>>>8)^tr[e/s-1]:s>6&&e%s==4&&(t=a(t)),o[e]=o[e-s]^t}var c;return Kt(...n),o}function nr(e){const t=rr(e),r=t.slice(),n=t.length,{sbox2:i}=$t,{T0:s,T1:a,T2:o,T3:c}=er;for(let e=0;e<n;e+=4)for(let i=0;i<4;i++)r[e+i]=t[n-e-4+i];Kt(t);for(let e=4;e<n-4;e++){const t=r[e],n=sr(i,t,t,t,t);r[e]=s[255&n]^a[n>>>8&255]^o[n>>>16&255]^c[n>>>24]}return r}function ir(e,t,r,n,i,s){return e[r<<8&65280|n>>>8&255]^t[i>>>8&65280|s>>>24&255]}function sr(e,t,r,n,i){return e[255&t|65280&r]|e[n>>>16&255|i>>>16&65280]<<16}function ar(e,t,r,n,i){const{sbox2:s,T01:a,T23:o}=$t;let c=0;t^=e[c++],r^=e[c++],n^=e[c++],i^=e[c++];const u=e.length/4-2;for(let s=0;s<u;s++){const s=e[c++]^ir(a,o,t,r,n,i),u=e[c++]^ir(a,o,r,n,i,t),h=e[c++]^ir(a,o,n,i,t,r),l=e[c++]^ir(a,o,i,t,r,n);t=s,r=u,n=h,i=l}return{s0:e[c++]^sr(s,t,r,n,i),s1:e[c++]^sr(s,r,n,i,t),s2:e[c++]^sr(s,n,i,t,r),s3:e[c++]^sr(s,i,t,r,n)}}function or(e,t,r,n,i){const{sbox2:s,T01:a,T23:o}=er;let c=0;t^=e[c++],r^=e[c++],n^=e[c++],i^=e[c++];const u=e.length/4-2;for(let s=0;s<u;s++){const s=e[c++]^ir(a,o,t,i,n,r),u=e[c++]^ir(a,o,r,t,i,n),h=e[c++]^ir(a,o,n,r,t,i),l=e[c++]^ir(a,o,i,n,r,t);t=s,r=u,n=h,i=l}return{s0:e[c++]^sr(s,t,i,n,r),s1:e[c++]^sr(s,r,t,i,n),s2:e[c++]^sr(s,n,r,t,i),s3:e[c++]^sr(s,i,n,r,t)}}function cr(e,t,r,n){mt(t,Gt),mt(r);const i=r.length;Ut(r,n=xt(i,n));const s=t,a=vt(s);let{s0:o,s1:c,s2:u,s3:h}=ar(e,a[0],a[1],a[2],a[3]);const l=vt(r),f=vt(n);for(let t=0;t+4<=l.length;t+=4){f[t+0]=l[t+0]^o,f[t+1]=l[t+1]^c,f[t+2]=l[t+2]^u,f[t+3]=l[t+3]^h;let r=1;for(let e=s.length-1;e>=0;e--)r=r+(255&s[e])|0,s[e]=255&r,r>>>=8;({s0:o,s1:c,s2:u,s3:h}=ar(e,a[0],a[1],a[2],a[3]))}const y=Gt*Math.floor(l.length/4);if(y<i){const e=new Uint32Array([o,c,u,h]),t=Et(e);for(let e=y,s=0;e<i;e++,s++)n[e]=r[e]^t[s];Kt(e)}return n}function ur(e,t,r,n,i){mt(r,Gt),mt(n),i=xt(n.length,i);const s=r,a=vt(s),o=St(s),c=vt(n),u=vt(i),h=t?0:12,l=n.length;let f=o.getUint32(h,t),{s0:y,s1:p,s2:d,s3:g}=ar(e,a[0],a[1],a[2],a[3]);for(let r=0;r+4<=c.length;r+=4)u[r+0]=c[r+0]^y,u[r+1]=c[r+1]^p,u[r+2]=c[r+2]^d,u[r+3]=c[r+3]^g,f=f+1>>>0,o.setUint32(h,f,t),({s0:y,s1:p,s2:d,s3:g}=ar(e,a[0],a[1],a[2],a[3]));const A=Gt*Math.floor(c.length/4);if(A<l){const e=new Uint32Array([y,p,d,g]),t=Et(e);for(let e=A,r=0;e<l;e++,r++)i[e]=n[e]^t[r];Kt(e)}return i}const hr=/* @__PURE__ */Dt({blockSize:16,nonceLength:16},(function(e,t){function r(r,n){if(mt(r),void 0!==n&&(mt(n),!Rt(n)))throw Error("unaligned destination");const i=rr(e),s=Tt(t),a=[i,s];Rt(r)||a.push(r=Tt(r));const o=cr(i,s,r,n);return Kt(...a),o}return{encrypt:(e,t)=>r(e,t),decrypt:(e,t)=>r(e,t)}}));const lr=/* @__PURE__ */Dt({blockSize:16,nonceLength:16},(function(e,t,r={}){const n=!r.disablePadding;return{encrypt(r,i){const s=rr(e),{b:a,o,out:c}=function(e,t,r){mt(e);let n=e.length;const i=n%Gt;if(!t&&0!==i)throw Error("aec/(cbc-ecb): unpadded plaintext with disabled padding");Rt(e)||(e=Tt(e));const s=vt(e);if(t){let e=Gt-i;e||(e=Gt),n+=e}return Ut(e,r=xt(n,r)),{b:s,o:vt(r),out:r}}(r,n,i);let u=t;const h=[s];Rt(u)||h.push(u=Tt(u));const l=vt(u);let f=l[0],y=l[1],p=l[2],d=l[3],g=0;for(;g+4<=a.length;)f^=a[g+0],y^=a[g+1],p^=a[g+2],d^=a[g+3],({s0:f,s1:y,s2:p,s3:d}=ar(s,f,y,p,d)),o[g++]=f,o[g++]=y,o[g++]=p,o[g++]=d;if(n){const e=function(e){const t=new Uint8Array(16),r=vt(t);t.set(e);const n=Gt-e.length;for(let e=Gt-n;e<Gt;e++)t[e]=n;return r}(r.subarray(4*g));f^=e[0],y^=e[1],p^=e[2],d^=e[3],({s0:f,s1:y,s2:p,s3:d}=ar(s,f,y,p,d)),o[g++]=f,o[g++]=y,o[g++]=p,o[g++]=d}return Kt(...h),c},decrypt(r,i){!function(e){if(mt(e),e.length%Gt!=0)throw Error("aes-(cbc/ecb).decrypt ciphertext should consist of blocks with size 16")}(r);const s=nr(e);let a=t;const o=[s];Rt(a)||o.push(a=Tt(a));const c=vt(a);i=xt(r.length,i),Rt(r)||o.push(r=Tt(r)),Ut(r,i);const u=vt(r),h=vt(i);let l=c[0],f=c[1],y=c[2],p=c[3];for(let e=0;e+4<=u.length;){const t=l,r=f,n=y,i=p;l=u[e+0],f=u[e+1],y=u[e+2],p=u[e+3];const{s0:a,s1:o,s2:c,s3:d}=or(s,l,f,y,p);h[e++]=a^t,h[e++]=o^r,h[e++]=c^n,h[e++]=d^i}return Kt(...o),function(e,t){if(!t)return e;const r=e.length;if(!r)throw Error("aes/pcks5: empty ciphertext not allowed");const n=e[r-1];if(n<=0||n>16)throw Error("aes/pcks5: wrong padding");const i=e.subarray(0,-n);for(let t=0;t<n;t++)if(e[r-t-1]!==n)throw Error("aes/pcks5: wrong padding");return i}(i,n)}}})),fr=/* @__PURE__ */Dt({blockSize:16,nonceLength:16},(function(e,t){function r(r,n,i){mt(r);const s=r.length;if(Ct(r,i=xt(s,i)))throw Error("overlapping src and dst not supported.");const a=rr(e);let o=t;const c=[a];Rt(o)||c.push(o=Tt(o)),Rt(r)||c.push(r=Tt(r));const u=vt(r),h=vt(i),l=n?h:u,f=vt(o);let y=f[0],p=f[1],d=f[2],g=f[3];for(let e=0;e+4<=u.length;){const{s0:t,s1:r,s2:n,s3:i}=ar(a,y,p,d,g);h[e+0]=u[e+0]^t,h[e+1]=u[e+1]^r,h[e+2]=u[e+2]^n,h[e+3]=u[e+3]^i,y=l[e++],p=l[e++],d=l[e++],g=l[e++]}const A=Gt*Math.floor(u.length/4);if(A<s){({s0:y,s1:p,s2:d,s3:g}=ar(a,y,p,d,g));const e=Et(new Uint32Array([y,p,d,g]));for(let t=A,n=0;t<s;t++,n++)i[t]=r[t]^e[n];Kt(e)}return Kt(...c),i}return{encrypt:(e,t)=>r(e,!0,t),decrypt:(e,t)=>r(e,!1,t)}}));function yr(e,t,r,n,i){const s=i?i.length:0,a=e.create(r,n.length+s);i&&a.update(i);const o=function(e,t,r){const n=new Uint8Array(16),i=St(n);return Qt(i,0,BigInt(t),r),Qt(i,8,BigInt(e),r),n}(8*n.length,8*s,t);a.update(n),a.update(o);const c=a.digest();return Kt(o),c}const pr=/* @__PURE__ */Dt({blockSize:16,nonceLength:12,tagLength:16,varSizeNonce:!0},(function(e,t,r){if(t.length<8)throw Error("aes/gcm: invalid nonce length");function n(e,t,n){const i=yr(zt,!1,e,n,r);for(let e=0;e<t.length;e++)i[e]^=t[e];return i}function i(){const r=rr(e),n=qt.slice(),i=qt.slice();if(ur(r,!1,i,i,n),12===t.length)i.set(t);else{const e=qt.slice();Qt(St(e),8,BigInt(8*t.length),!1);const r=zt.create(n).update(t).update(e);r.digestInto(i),r.destroy()}return{xk:r,authKey:n,counter:i,tagMask:ur(r,!1,i,qt)}}return{encrypt(e){const{xk:t,authKey:r,counter:s,tagMask:a}=i(),o=new Uint8Array(e.length+16),c=[t,r,s,a];Rt(e)||c.push(e=Tt(e)),ur(t,!1,s,e,o.subarray(0,e.length));const u=n(r,a,o.subarray(0,o.length-16));return c.push(u),o.set(u,e.length),Kt(...c),o},decrypt(e){const{xk:t,authKey:r,counter:s,tagMask:a}=i(),o=[t,r,a,s];Rt(e)||o.push(e=Tt(e));const c=e.subarray(0,-16),u=e.subarray(-16),h=n(r,a,c);if(o.push(h),!Pt(h,u))throw Error("aes/gcm: invalid ghash tag");const l=ur(t,!1,s,c);return Kt(...o),l}}}));function dr(e){return e instanceof Uint32Array||ArrayBuffer.isView(e)&&"Uint32Array"===e.constructor.name}function gr(e,t){if(mt(t,16),!dr(e))throw Error("_encryptBlock accepts result of expandKeyLE");const r=vt(t);let{s0:n,s1:i,s2:s,s3:a}=ar(e,r[0],r[1],r[2],r[3]);return r[0]=n,r[1]=i,r[2]=s,r[3]=a,t}function Ar(e,t){if(mt(t,16),!dr(e))throw Error("_decryptBlock accepts result of expandKeyLE");const r=vt(t);let{s0:n,s1:i,s2:s,s3:a}=or(e,r[0],r[1],r[2],r[3]);return r[0]=n,r[1]=i,r[2]=s,r[3]=a,t}const wr={encrypt(e,t){if(t.length>=2**32)throw Error("plaintext should be less than 4gb");const r=rr(e);if(16===t.length)gr(r,t);else{const e=vt(t);let n=e[0],i=e[1];for(let t=0,s=1;t<6;t++)for(let t=2;t<e.length;t+=2,s++){const{s0:a,s1:o,s2:c,s3:u}=ar(r,n,i,e[t],e[t+1]);n=a,i=o^Xt(s),e[t]=c,e[t+1]=u}e[0]=n,e[1]=i}r.fill(0)},decrypt(e,t){if(t.length-8>=2**32)throw Error("ciphertext should be less than 4gb");const r=nr(e),n=t.length/8-1;if(1===n)Ar(r,t);else{const e=vt(t);let i=e[0],s=e[1];for(let t=0,a=6*n;t<6;t++)for(let t=2*n;t>=1;t-=2,a--){s^=Xt(a);const{s0:n,s1:o,s2:c,s3:u}=or(r,i,s,e[t],e[t+1]);i=n,s=o,e[t]=c,e[t+1]=u}e[0]=i,e[1]=s}r.fill(0)}},mr=/* @__PURE__ */new Uint8Array(8).fill(166),br=/* @__PURE__ */Dt({blockSize:8},(e=>({encrypt(t){if(!t.length||t.length%8!=0)throw Error("invalid plaintext length");if(8===t.length)throw Error("8-byte keys not allowed in AESKW, use AESKWP instead");const r=function(...e){let t=0;for(let r=0;r<e.length;r++){const n=e[r];mt(n),t+=n.length}const r=new Uint8Array(t);for(let t=0,n=0;t<e.length;t++){const i=e[t];r.set(i,n),n+=i.length}return r}(mr,t);return wr.encrypt(e,r),r},decrypt(t){if(t.length%8!=0||t.length<24)throw Error("invalid ciphertext length");const r=Tt(t);if(wr.decrypt(e,r),!Pt(r.subarray(0,8),mr))throw Error("integrity check failed");return r.subarray(0,8).fill(0),r.subarray(8)}}))),kr={expandKeyLE:rr,expandKeyDecLE:nr,encrypt:ar,decrypt:or,encryptBlock:gr,decryptBlock:Ar,ctrCounter:cr,ctr32:ur};async function Er(e){switch(e){case R.symmetric.aes128:case R.symmetric.aes192:case R.symmetric.aes256:throw Error("Not a legacy cipher");case R.symmetric.cast5:case R.symmetric.blowfish:case R.symmetric.twofish:case R.symmetric.tripledes:{const{legacyCiphers:t}=await Promise.resolve().then((function(){return dy})),r=R.read(R.symmetric,e),n=t.get(r);if(!n)throw Error("Unsupported cipher algorithm");return n}default:throw Error("Unsupported cipher algorithm")}}function vr(e){switch(e){case R.symmetric.aes128:case R.symmetric.aes192:case R.symmetric.aes256:case R.symmetric.twofish:return 16;case R.symmetric.blowfish:case R.symmetric.cast5:case R.symmetric.tripledes:return 8;default:throw Error("Unsupported cipher")}}function Kr(e){switch(e){case R.symmetric.aes128:case R.symmetric.blowfish:case R.symmetric.cast5:return 16;case R.symmetric.aes192:case R.symmetric.tripledes:return 24;case R.symmetric.aes256:case R.symmetric.twofish:return 32;default:throw Error("Unsupported cipher")}}function Sr(e){return{keySize:Kr(e),blockSize:vr(e)}}const Ir=L.getWebCrypto();async function Br(e,t,r){const{keySize:n}=Sr(e);if(!L.isAES(e)||t.length!==n)throw Error("Unexpected algorithm or key size");try{const e=await Ir.importKey("raw",t,{name:"AES-KW"},!1,["wrapKey"]),n=await Ir.importKey("raw",r,{name:"HMAC",hash:"SHA-256"},!0,["sign"]),i=await Ir.wrapKey("raw",n,e,{name:"AES-KW"});return new Uint8Array(i)}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;L.printDebugError("Browser did not support operation: "+e.message)}return br(t).encrypt(r)}async function Cr(e,t,r){const{keySize:n}=Sr(e);if(!L.isAES(e)||t.length!==n)throw Error("Unexpected algorithm or key size");let i;try{i=await Ir.importKey("raw",t,{name:"AES-KW"},!1,["unwrapKey"])}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;return L.printDebugError("Browser did not support operation: "+e.message),br(t).decrypt(r)}try{const e=await Ir.unwrapKey("raw",r,i,{name:"AES-KW"},{name:"HMAC",hash:"SHA-256"},!0,["sign"]);return new Uint8Array(await Ir.exportKey("raw",e))}catch(e){if("OperationError"===e.name)throw Error("Key Data Integrity failed");throw e}}async function Ur(e,t,r,n,i){const s=L.getWebCrypto(),a=R.read(R.webHash,e);if(!a)throw Error("Hash algo not supported with HKDF");const o=await s.importKey("raw",t,"HKDF",!1,["deriveBits"]),c=await s.deriveBits({name:"HKDF",hash:a,salt:r,info:n},o,8*i);return new Uint8Array(c)}const Pr={x25519:L.encodeUTF8("OpenPGP X25519"),x448:L.encodeUTF8("OpenPGP X448")};async function Dr(e){switch(e){case R.publicKey.x25519:try{const e=L.getWebCrypto(),t=await e.generateKey("X25519",!0,["deriveKey","deriveBits"]).catch((e=>{if("OperationError"===e.name){const e=Error("Unexpected key generation issue");throw e.name="NotSupportedError",e}throw e})),r=await e.exportKey("jwk",t.privateKey),n=await e.exportKey("jwk",t.publicKey);if(r.x!==n.x){const e=Error("Unexpected mismatching public point");throw e.name="NotSupportedError",e}return{A:new Uint8Array(z(n.x)),k:z(r.d)}}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:t}=await Promise.resolve().then((function(){return ey})),{secretKey:r,publicKey:n}=t.box.keyPair();return{A:n,k:r}}case R.publicKey.x448:{const e=await L.getNobleCurve(R.publicKey.x448),{secretKey:t,publicKey:r}=e.keygen();return{A:r,k:t}}default:throw Error("Unsupported ECDH algorithm")}}async function xr(e,t,r){switch(e){case R.publicKey.x25519:try{const{ephemeralPublicKey:n,sharedSecret:i}=await Mr(e,t),s=await Lr(e,n,t,r);return L.equalsUint8Array(i,s)}catch(e){return!1}case R.publicKey.x448:{const e=(await L.getNobleCurve(R.publicKey.x448)).getPublicKey(r);return L.equalsUint8Array(t,e)}default:return!1}}async function Qr(e,t,r){const{ephemeralPublicKey:n,sharedSecret:i}=await Mr(e,r),s=L.concatUint8Array([n,r,i]);switch(e){case R.publicKey.x25519:{const e=R.symmetric.aes128,{keySize:r}=Sr(e),i=await Ur(R.hash.sha256,s,new Uint8Array,Pr.x25519,r);return{ephemeralPublicKey:n,wrappedKey:await Br(e,i,t)}}case R.publicKey.x448:{const e=R.symmetric.aes256,{keySize:r}=Sr(R.symmetric.aes256),i=await Ur(R.hash.sha512,s,new Uint8Array,Pr.x448,r);return{ephemeralPublicKey:n,wrappedKey:await Br(e,i,t)}}default:throw Error("Unsupported ECDH algorithm")}}async function Rr(e,t,r,n,i){const s=await Lr(e,t,n,i),a=L.concatUint8Array([t,n,s]);switch(e){case R.publicKey.x25519:{const e=R.symmetric.aes128,{keySize:t}=Sr(e);return Cr(e,await Ur(R.hash.sha256,a,new Uint8Array,Pr.x25519,t),r)}case R.publicKey.x448:{const e=R.symmetric.aes256,{keySize:t}=Sr(R.symmetric.aes256);return Cr(e,await Ur(R.hash.sha512,a,new Uint8Array,Pr.x448,t),r)}default:throw Error("Unsupported ECDH algorithm")}}function Tr(e){switch(e){case R.publicKey.x25519:return 32;case R.publicKey.x448:return 56;default:throw Error("Unsupported ECDH algorithm")}}async function Mr(e,t){switch(e){case R.publicKey.x25519:try{const r=L.getWebCrypto(),n=await r.generateKey("X25519",!0,["deriveKey","deriveBits"]).catch((e=>{if("OperationError"===e.name){const e=Error("Unexpected key generation issue");throw e.name="NotSupportedError",e}throw e})),i=await r.exportKey("jwk",n.publicKey);if((await r.exportKey("jwk",n.privateKey)).x!==i.x){const e=Error("Unexpected mismatching public point");throw e.name="NotSupportedError",e}const s=Or(e,t),a=await r.importKey("jwk",s,"X25519",!1,[]),o=await r.deriveBits({name:"X25519",public:a},n.privateKey,8*Tr(e));return{sharedSecret:new Uint8Array(o),ephemeralPublicKey:new Uint8Array(z(i.x))}}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:r}=await Promise.resolve().then((function(){return ey})),{secretKey:n,publicKey:i}=r.box.keyPair(),s=r.scalarMult(n,t);return Fr(s),{ephemeralPublicKey:i,sharedSecret:s}}case R.publicKey.x448:{const e=await L.getNobleCurve(R.publicKey.x448),{secretKey:r,publicKey:n}=e.keygen(),i=e.getSharedSecret(r,t);return Fr(i),{ephemeralPublicKey:n,sharedSecret:i}}default:throw Error("Unsupported ECDH algorithm")}}async function Lr(e,t,r,n){switch(e){case R.publicKey.x25519:try{const i=L.getWebCrypto(),s=function(e,t,r){if(e===R.publicKey.x25519){const n=Or(e,t);return n.d=G(r),n}throw Error("Unsupported ECDH algorithm")}(e,r,n),a=Or(e,t),o=await i.importKey("jwk",s,"X25519",!1,["deriveKey","deriveBits"]),c=await i.importKey("jwk",a,"X25519",!1,[]),u=await i.deriveBits({name:"X25519",public:c},o,8*Tr(e));return new Uint8Array(u)}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:r}=await Promise.resolve().then((function(){return ey})),i=r.scalarMult(n,t);return Fr(i),i}case R.publicKey.x448:{const e=(await L.getNobleCurve(R.publicKey.x448)).getSharedSecret(n,t);return Fr(e),e}default:throw Error("Unsupported ECDH algorithm")}}function Fr(e){let t=0;for(let r=0;r<e.length;r++)t|=e[r];if(0===t)throw Error("Unexpected low order point")}function Or(e,t){if(e===R.publicKey.x25519){return{kty:"OKP",crv:"X25519",x:G(t),ext:!0}}throw Error("Unsupported ECDH algorithm")}var Nr=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:Rr,encrypt:Qr,generate:Dr,generateEphemeralEncryptionMaterial:Mr,getPayloadSize:Tr,recomputeSharedSecret:Lr,validateParams:xr});const _r=L.getWebCrypto(),Hr=L.getNodeCrypto(),zr={[R.curve.nistP256]:"P-256",[R.curve.nistP384]:"P-384",[R.curve.nistP521]:"P-521"},Gr=Hr?Hr.getCurves():[],qr=Hr?{[R.curve.secp256k1]:Gr.includes("secp256k1")?"secp256k1":void 0,[R.curve.nistP256]:Gr.includes("prime256v1")?"prime256v1":void 0,[R.curve.nistP384]:Gr.includes("secp384r1")?"secp384r1":void 0,[R.curve.nistP521]:Gr.includes("secp521r1")?"secp521r1":void 0,[R.curve.ed25519Legacy]:Gr.includes("ED25519")?"ED25519":void 0,[R.curve.curve25519Legacy]:Gr.includes("X25519")?"X25519":void 0,[R.curve.brainpoolP256r1]:Gr.includes("brainpoolP256r1")?"brainpoolP256r1":void 0,[R.curve.brainpoolP384r1]:Gr.includes("brainpoolP384r1")?"brainpoolP384r1":void 0,[R.curve.brainpoolP512r1]:Gr.includes("brainpoolP512r1")?"brainpoolP512r1":void 0}:{},jr={[R.curve.nistP256]:{oid:[6,8,42,134,72,206,61,3,1,7],keyType:R.publicKey.ecdsa,hash:R.hash.sha256,cipher:R.symmetric.aes128,node:qr[R.curve.nistP256],web:zr[R.curve.nistP256],payloadSize:32,sharedSize:256,wireFormatLeadingByte:4},[R.curve.nistP384]:{oid:[6,5,43,129,4,0,34],keyType:R.publicKey.ecdsa,hash:R.hash.sha384,cipher:R.symmetric.aes192,node:qr[R.curve.nistP384],web:zr[R.curve.nistP384],payloadSize:48,sharedSize:384,wireFormatLeadingByte:4},[R.curve.nistP521]:{oid:[6,5,43,129,4,0,35],keyType:R.publicKey.ecdsa,hash:R.hash.sha512,cipher:R.symmetric.aes256,node:qr[R.curve.nistP521],web:zr[R.curve.nistP521],payloadSize:66,sharedSize:528,wireFormatLeadingByte:4},[R.curve.secp256k1]:{oid:[6,5,43,129,4,0,10],keyType:R.publicKey.ecdsa,hash:R.hash.sha256,cipher:R.symmetric.aes128,node:qr[R.curve.secp256k1],payloadSize:32,wireFormatLeadingByte:4},[R.curve.ed25519Legacy]:{oid:[6,9,43,6,1,4,1,218,71,15,1],keyType:R.publicKey.eddsaLegacy,hash:R.hash.sha512,node:!1,payloadSize:32,wireFormatLeadingByte:64},[R.curve.curve25519Legacy]:{oid:[6,10,43,6,1,4,1,151,85,1,5,1],keyType:R.publicKey.ecdh,hash:R.hash.sha256,cipher:R.symmetric.aes128,node:!1,payloadSize:32,wireFormatLeadingByte:64},[R.curve.brainpoolP256r1]:{oid:[6,9,43,36,3,3,2,8,1,1,7],keyType:R.publicKey.ecdsa,hash:R.hash.sha256,cipher:R.symmetric.aes128,node:qr[R.curve.brainpoolP256r1],payloadSize:32,wireFormatLeadingByte:4},[R.curve.brainpoolP384r1]:{oid:[6,9,43,36,3,3,2,8,1,1,11],keyType:R.publicKey.ecdsa,hash:R.hash.sha384,cipher:R.symmetric.aes192,node:qr[R.curve.brainpoolP384r1],payloadSize:48,wireFormatLeadingByte:4},[R.curve.brainpoolP512r1]:{oid:[6,9,43,36,3,3,2,8,1,1,13],keyType:R.publicKey.ecdsa,hash:R.hash.sha512,cipher:R.symmetric.aes256,node:qr[R.curve.brainpoolP512r1],payloadSize:64,wireFormatLeadingByte:4}};class Vr{constructor(e){try{this.name=e instanceof Xe?e.getName():R.write(R.curve,e)}catch(e){throw new st("Unknown curve")}const t=jr[this.name];this.keyType=t.keyType,this.oid=t.oid,this.hash=t.hash,this.cipher=t.cipher,this.node=t.node,this.web=t.web,this.payloadSize=t.payloadSize,this.sharedSize=t.sharedSize,this.wireFormatLeadingByte=t.wireFormatLeadingByte,this.web&&L.getWebCrypto()?this.type="web":this.node&&L.getNodeCrypto()?this.type="node":this.name===R.curve.curve25519Legacy?this.type="curve25519Legacy":this.name===R.curve.ed25519Legacy&&(this.type="ed25519Legacy")}async genKeyPair(){switch(this.type){case"web":try{return await async function(e,t){const r=await _r.generateKey({name:"ECDSA",namedCurve:zr[e]},!0,["sign","verify"]),n=await _r.exportKey("jwk",r.privateKey);return{publicKey:$r(await _r.exportKey("jwk",r.publicKey),t),privateKey:z(n.d)}}(this.name,this.wireFormatLeadingByte)}catch(e){return L.printDebugError("Browser did not support generating ec key "+e.message),Wr(this.name)}case"node":return async function(e){const t=Hr.createECDH(qr[e]);return await t.generateKeys(),{publicKey:new Uint8Array(t.getPublicKey()),privateKey:new Uint8Array(t.getPrivateKey())}}(this.name);case"curve25519Legacy":{const{k:e,A:t}=await Dr(R.publicKey.x25519),r=e.slice().reverse();r[0]=127&r[0]|64,r[31]&=248;return{publicKey:L.concatUint8Array([new Uint8Array([this.wireFormatLeadingByte]),t]),privateKey:r}}case"ed25519Legacy":{const{seed:e,A:t}=await ut(R.publicKey.ed25519);return{publicKey:L.concatUint8Array([new Uint8Array([this.wireFormatLeadingByte]),t]),privateKey:e}}default:return Wr(this.name)}}}async function Yr(e){const t=new Vr(e),{oid:r,hash:n,cipher:i}=t,s=await t.genKeyPair();return{oid:r,Q:s.publicKey,secret:L.leftPad(s.privateKey,t.payloadSize),hash:n,cipher:i}}function Zr(e){return jr[e.getName()].hash}async function Jr(e,t,r,n){const i={[R.curve.nistP256]:!0,[R.curve.nistP384]:!0,[R.curve.nistP521]:!0,[R.curve.secp256k1]:!0,[R.curve.curve25519Legacy]:e===R.publicKey.ecdh,[R.curve.brainpoolP256r1]:!0,[R.curve.brainpoolP384r1]:!0,[R.curve.brainpoolP512r1]:!0},s=t.getName();if(!i[s])return!1;if(s===R.curve.curve25519Legacy){const e=n.slice().reverse();return!(r.length<1||64!==r[0])&&xr(R.publicKey.x25519,r.subarray(1),e)}const a=(await L.getNobleCurve(R.publicKey.ecdsa,s)).getPublicKey(n,!1);return!!L.equalsUint8Array(a,r)}function Xr(e,t){const{payloadSize:r,wireFormatLeadingByte:n,name:i}=e,s=i===R.curve.curve25519Legacy||i===R.curve.ed25519Legacy?r:2*r;if(t[0]!==n||t.length!==s+1)throw Error("Invalid point encoding")}async function Wr(e){const t=await L.getNobleCurve(R.publicKey.ecdsa,e),{secretKey:r}=t.keygen();return{publicKey:t.getPublicKey(r,!1),privateKey:r}}function $r(e,t){const r=z(e.x),n=z(e.y),i=new Uint8Array(r.length+n.length+1);return i[0]=t,i.set(r,1),i.set(n,r.length+1),i}function en(e,t,r){const n=e,i=r.slice(1,n+1),s=r.slice(n+1,2*n+1);return{kty:"EC",crv:t,x:G(i),y:G(s),ext:!0}}function tn(e,t,r,n){const i=en(e,t,r);return i.d=G(n),i}const rn=L.getWebCrypto(),nn=L.getNodeCrypto();async function sn(e,t,r,n,i,s){const a=new Vr(e);if(Xr(a,n),r&&!L.isStream(r)){const e={publicKey:n,privateKey:i};switch(a.type){case"web":try{return await async function(e,t,r,n){const i=e.payloadSize,s=tn(e.payloadSize,zr[e.name],n.publicKey,n.privateKey),a=await rn.importKey("jwk",s,{name:"ECDSA",namedCurve:zr[e.name],hash:{name:R.read(R.webHash,e.hash)}},!1,["sign"]),o=new Uint8Array(await rn.sign({name:"ECDSA",namedCurve:zr[e.name],hash:{name:R.read(R.webHash,t)}},a,r));return{r:o.slice(0,i),s:o.slice(i,i<<1)}}(a,t,r,e)}catch(e){if("nistP521"!==a.name&&("DataError"===e.name||"OperationError"===e.name))throw e;L.printDebugError("Browser did not support signing: "+e.message)}break;case"node":return async function(e,t,r,n){const i=L.nodeRequire("eckey-utils"),s=L.getNodeBuffer(),{privateKey:a}=i.generateDer({curveName:qr[e.name],privateKey:s.from(n)}),o=nn.createSign(R.read(R.hash,t));o.write(r),o.end();const c=new Uint8Array(o.sign({key:a,format:"der",type:"sec1",dsaEncoding:"ieee-p1363"})),u=e.payloadSize;return{r:c.subarray(0,u),s:c.subarray(u,u<<1)}}(a,t,r,i)}}const o=(await L.getNobleCurve(R.publicKey.ecdsa,a.name)).sign(s,i,{lowS:!1});return{r:le(o.r,"be",a.payloadSize),s:le(o.s,"be",a.payloadSize)}}async function an(e,t,r,n,i,s){const a=new Vr(e);Xr(a,i);const o=async()=>0===s[0]&&on(a,r,s.subarray(1),i);if(n&&!L.isStream(n))switch(a.type){case"web":try{const e=await async function(e,t,{r,s:n},i,s){const a=en(e.payloadSize,zr[e.name],s),o=await rn.importKey("jwk",a,{name:"ECDSA",namedCurve:zr[e.name],hash:{name:R.read(R.webHash,e.hash)}},!1,["verify"]),c=L.concatUint8Array([r,n]).buffer;return rn.verify({name:"ECDSA",namedCurve:zr[e.name],hash:{name:R.read(R.webHash,t)}},o,c,i)}(a,t,r,n,i);return e||o()}catch(e){if("nistP521"!==a.name&&("DataError"===e.name||"OperationError"===e.name))throw e;L.printDebugError("Browser did not support verifying: "+e.message)}break;case"node":{const e=await async function(e,t,{r,s:n},i,s){const a=L.nodeRequire("eckey-utils"),o=L.getNodeBuffer(),{publicKey:c}=a.generateDer({curveName:qr[e.name],publicKey:o.from(s)}),u=nn.createVerify(R.read(R.hash,t));u.write(i),u.end();const h=L.concatUint8Array([r,n]);try{return u.verify({key:c,format:"der",type:"spki",dsaEncoding:"ieee-p1363"},h)}catch(e){return!1}}(a,t,r,n,i);return e||o()}}return await on(a,r,s,i)||o()}async function on(e,t,r,n){return(await L.getNobleCurve(R.publicKey.ecdsa,e.name)).verify(L.concatUint8Array([t.r,t.s]),r,n,{lowS:!1})}var cn=/*#__PURE__*/Object.freeze({__proto__:null,sign:sn,validateParams:async function(e,t,r){const n=new Vr(e);if(n.keyType!==R.publicKey.ecdsa)return!1;switch(n.type){case"web":case"node":{const n=ye(8),i=R.hash.sha256,s=await Qe(i,n);try{const a=await sn(e,i,n,t,r,s);return await an(e,i,a,n,t,s)}catch(e){return!1}}default:return Jr(R.publicKey.ecdsa,e,t,r)}},verify:an});async function un(e,t,r,n,i,s){Xr(new Vr(e),n);const{RS:a}=await ht(R.publicKey.ed25519,0,0,n.subarray(1),i,s);return{r:a.subarray(0,32),s:a.subarray(32)}}async function hn(e,t,{r,s:n},i,s,a){Xr(new Vr(e),s);const o=L.concatUint8Array([r,n]);return lt(R.publicKey.ed25519,0,{RS:o},0,s.subarray(1),a)}async function ln(e,t,r){return e.getName()===R.curve.ed25519Legacy&&(!(t.length<1||64!==t[0])&&ft(R.publicKey.ed25519,t.subarray(1),r))}var fn=/*#__PURE__*/Object.freeze({__proto__:null,sign:un,validateParams:ln,verify:hn});function yn(e){const t=e.length;if(t>0){const r=e[t-1];if(r>=1){const n=e.subarray(t-r),i=new Uint8Array(r).fill(r);if(L.equalsUint8Array(n,i))return e.subarray(0,t-r)}}throw Error("Invalid padding")}function pn(e,t,r,n){return L.concatUint8Array([t.write(),new Uint8Array([e]),r.write(!0),L.stringToUint8Array("Anonymous Sender "),r.replacementFingerprint||n])}async function dn(e,t,r,n,i=!1,s=!1){let a;if(i){for(a=0;a<t.length&&0===t[a];a++);t=t.subarray(a)}if(s){for(a=t.length-1;a>=0&&0===t[a];a--);t=t.subarray(0,a+1)}return(await Qe(e,L.concatUint8Array([new Uint8Array([0,0,0,1]),t,n]))).subarray(0,r)}async function gn(e,t){switch(e.type){case"curve25519Legacy":{const{sharedSecret:r,ephemeralPublicKey:n}=await Mr(R.publicKey.x25519,t.subarray(1));return{publicKey:L.concatUint8Array([new Uint8Array([e.wireFormatLeadingByte]),n]),sharedKey:r}}case"web":if(e.web&&L.getWebCrypto())try{return await async function(e,t){const r=L.getWebCrypto(),n=en(e.payloadSize,e.web,t);let i=r.generateKey({name:"ECDH",namedCurve:e.web},!0,["deriveKey","deriveBits"]),s=r.importKey("jwk",n,{name:"ECDH",namedCurve:e.web},!1,[]);[i,s]=await Promise.all([i,s]);let a=r.deriveBits({name:"ECDH",namedCurve:e.web,public:s},i.privateKey,e.sharedSize),o=r.exportKey("jwk",i.publicKey);[a,o]=await Promise.all([a,o]);const c=new Uint8Array(a),u=new Uint8Array($r(o,e.wireFormatLeadingByte));return{publicKey:u,sharedKey:c}}(e,t)}catch(r){return L.printDebugError(r),kn(e,t)}break;case"node":return async function(e,t){const r=L.getNodeCrypto(),n=r.createECDH(e.node);n.generateKeys();const i=new Uint8Array(n.computeSecret(t));return{publicKey:new Uint8Array(n.getPublicKey()),sharedKey:i}}(e,t);default:return kn(e,t)}}async function An(e,t,r,n,i){const s=function(e){const t=8-e.length%8,r=new Uint8Array(e.length+t).fill(t);return r.set(e),r}(r),a=new Vr(e);Xr(a,n);const{publicKey:o,sharedKey:c}=await gn(a,n),u=pn(R.publicKey.ecdh,e,t,i),{keySize:h}=Sr(t.cipher),l=await dn(t.hash,c,h,u);return{publicKey:o,wrappedKey:await Br(t.cipher,l,s)}}async function wn(e,t,r,n){if(n.length!==e.payloadSize){const t=new Uint8Array(e.payloadSize);t.set(n,e.payloadSize-n.length),n=t}switch(e.type){case"curve25519Legacy":{const e=n.slice().reverse();return{secretKey:e,sharedKey:await Lr(R.publicKey.x25519,t.subarray(1),r.subarray(1),e)}}case"web":if(e.web&&L.getWebCrypto())try{return await async function(e,t,r,n){const i=L.getWebCrypto(),s=tn(e.payloadSize,e.web,r,n);let a=i.importKey("jwk",s,{name:"ECDH",namedCurve:e.web},!0,["deriveKey","deriveBits"]);const o=en(e.payloadSize,e.web,t);let c=i.importKey("jwk",o,{name:"ECDH",namedCurve:e.web},!0,[]);[a,c]=await Promise.all([a,c]);let u=i.deriveBits({name:"ECDH",namedCurve:e.web,public:c},a,e.sharedSize),h=i.exportKey("jwk",a);[u,h]=await Promise.all([u,h]);const l=new Uint8Array(u);return{secretKey:z(h.d),sharedKey:l}}(e,t,r,n)}catch(r){return L.printDebugError(r),bn(e,t,n)}break;case"node":return async function(e,t,r){const n=L.getNodeCrypto(),i=n.createECDH(e.node);i.setPrivateKey(r);const s=new Uint8Array(i.computeSecret(t));return{secretKey:new Uint8Array(i.getPrivateKey()),sharedKey:s}}(e,t,n);default:return bn(e,t,n)}}async function mn(e,t,r,n,i,s,a){const o=new Vr(e);Xr(o,i),Xr(o,r);const{sharedKey:c}=await wn(o,r,i,s),u=pn(R.publicKey.ecdh,e,t,a),{keySize:h}=Sr(t.cipher);let l;for(let e=0;e<3;e++)try{const r=await dn(t.hash,c,h,u,1===e,2===e);return yn(await Cr(t.cipher,r,n))}catch(e){l=e}throw l}async function bn(e,t,r){return{secretKey:r,sharedKey:(await L.getNobleCurve(R.publicKey.ecdh,e.name)).getSharedSecret(r,t).subarray(1)}}async function kn(e,t){const r=await L.getNobleCurve(R.publicKey.ecdh,e.name),{publicKey:n,privateKey:i}=await e.genKeyPair();return{publicKey:n,sharedKey:r.getSharedSecret(i,t).subarray(1)}}var En=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:mn,encrypt:An,validateParams:async function(e,t,r){return Jr(R.publicKey.ecdh,e,t,r)}}),vn=/*#__PURE__*/Object.freeze({__proto__:null,CurveWithOID:Vr,ecdh:En,ecdhX:Nr,ecdsa:cn,eddsa:At,eddsaLegacy:fn,generate:Yr,getPreferredHashAlgo:Zr});const Kn=BigInt(0),Sn=BigInt(1);const In=new Set([R.hash.sha1,R.hash.sha256,R.hash.sha512]),Bn=L.getWebCrypto(),Cn=L.getNodeCrypto();async function Un(e,t){if(e===R.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Hp})),{publicKey:r,secretKey:n}=e.keygen(t);return{mlkemPublicKey:r,mlkemSecretKey:n}}throw Error("Unsupported KEM algorithm")}async function Pn(e){const{eccPublicKey:t,eccSecretKey:r}=await async function(e){if(e===R.publicKey.pqc_mlkem_x25519){const{A:e,k:t}=await Dr(R.publicKey.x25519);return{eccPublicKey:e,eccSecretKey:t}}throw Error("Unsupported KEM algorithm")}(e),{mlkemPublicKey:n,mlkemSeed:i,mlkemSecretKey:s}=await async function(e){if(e===R.publicKey.pqc_mlkem_x25519){const t=ye(64),{mlkemSecretKey:r,mlkemPublicKey:n}=await Un(e,t);return{mlkemSeed:t,mlkemSecretKey:r,mlkemPublicKey:n}}throw Error("Unsupported KEM algorithm")}(e);return{eccPublicKey:t,eccSecretKey:r,mlkemPublicKey:n,mlkemSeed:i,mlkemSecretKey:s}}async function Dn(e,t,r,n){const{eccKeyShare:i,eccCipherText:s}=await async function(e,t){if(e===R.publicKey.pqc_mlkem_x25519){const{ephemeralPublicKey:e,sharedSecret:r}=await Mr(R.publicKey.x25519,t);return{eccCipherText:e,eccKeyShare:r}}throw Error("Unsupported KEM algorithm")}(e,t),{mlkemKeyShare:a,mlkemCipherText:o}=await async function(e,t){if(e===R.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Hp})),{cipherText:r,sharedSecret:n}=e.encapsulate(t);return{mlkemCipherText:r,mlkemKeyShare:n}}throw Error("Unsupported KEM algorithm")}(e,r),c=await Qn(e,a,i,s,t);return{eccCipherText:s,mlkemCipherText:o,wrappedKey:await Br(R.symmetric.aes256,c,n)}}async function xn(e,t,r,n,i,s,a,o){const c=await async function(e,t,r,n){if(e===R.publicKey.pqc_mlkem_x25519)return await Lr(R.publicKey.x25519,t,n,r);throw Error("Unsupported KEM algorithm")}(e,t,n,i),u=await async function(e,t,r){if(e===R.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Hp}));return e.decapsulate(t,r)}throw Error("Unsupported KEM algorithm")}(e,r,s),h=await Qn(e,u,c,t,i);return await Cr(R.symmetric.aes256,h,o)}async function Qn(e,t,r,n,i){const s=L.encodeUTF8("OpenPGPCompositeKDFv1"),a=L.concatUint8Array([t,r,n,i,new Uint8Array([e]),s,new Uint8Array([s.length])]);return await Qe(R.hash.sha3_256,a)}async function Rn(e,t,r,n,i){const s=async function(e,t,r){if(e===R.publicKey.pqc_mlkem_x25519)return xr(R.publicKey.x25519,t,r);throw Error("Unsupported KEM algorithm")}(e,t,r),a=async function(e,t,r){if(e===R.publicKey.pqc_mlkem_x25519){const{mlkemPublicKey:n}=await Un(e,r);return L.equalsUint8Array(t,n)}throw Error("Unsupported KEM algorithm")}(e,n,i);return await s&&await a}async function Tn(e,t){if(e===R.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Hp})),{secretKey:r,publicKey:n}=e.keygen(t);return{mldsaSecretKey:r,mldsaPublicKey:n}}throw Error("Unsupported signature algorithm")}async function Mn(e){if(e===R.publicKey.pqc_mldsa_ed25519){const{eccSecretKey:t,eccPublicKey:r}=await async function(e){if(e===R.publicKey.pqc_mldsa_ed25519){const{A:e,seed:t}=await ut(R.publicKey.ed25519);return{eccPublicKey:e,eccSecretKey:t}}throw Error("Unsupported signature algorithm")}(e),{mldsaSeed:n,mldsaSecretKey:i,mldsaPublicKey:s}=await async function(e){if(e===R.publicKey.pqc_mldsa_ed25519){const t=ye(32),{mldsaSecretKey:r,mldsaPublicKey:n}=await Tn(e,t);return{mldsaSeed:t,mldsaSecretKey:r,mldsaPublicKey:n}}throw Error("Unsupported signature algorithm")}(e);return{eccSecretKey:t,eccPublicKey:r,mldsaSeed:n,mldsaSecretKey:i,mldsaPublicKey:s}}throw Error("Unsupported signature algorithm")}async function Ln(e,t,r,n,i,s){if(e===R.publicKey.pqc_mldsa_ed25519){const{eccSignature:t}=await async function(e,t,r,n,i){if(e===R.publicKey.pqc_mldsa_ed25519){const{RS:e}=await ht(R.publicKey.ed25519,0,0,n,r,i);return{eccSignature:e}}throw Error("Unsupported signature algorithm")}(e,0,r,n,s),{mldsaSignature:a}=await async function(e,t,r){if(e===R.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Hp}));return{mldsaSignature:e.sign(t,r)}}throw Error("Unsupported signature algorithm")}(e,i,s);return{eccSignature:t,mldsaSignature:a}}throw Error("Unsupported signature algorithm")}async function Fn(e,t,r,n,i,{eccSignature:s,mldsaSignature:a}){if(e===R.publicKey.pqc_mldsa_ed25519){const t=async function(e,t,r,n,i){if(e===R.publicKey.pqc_mldsa_ed25519)return lt(R.publicKey.ed25519,0,{RS:i},0,r,n);throw Error("Unsupported signature algorithm")}(e,0,r,i,s),o=async function(e,t,r,n){if(e===R.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Hp}));return e.verify(t,r,n)}throw Error("Unsupported signature algorithm")}(e,n,i,a);return await t&&await o}throw Error("Unsupported signature algorithm")}function On(e,t){if(e===R.publicKey.pqc_mldsa_ed25519)return Re(t)>=32;throw Error("Unsupported signature algorithm")}async function Nn(e,t,r,n,i){const s=async function(e,t,r){if(e===R.publicKey.pqc_mldsa_ed25519)return ft(R.publicKey.ed25519,t,r);throw Error("Unsupported signature algorithm")}(e,t,r),a=async function(e,t,r){if(e===R.publicKey.pqc_mldsa_ed25519){const{mldsaPublicKey:n}=await Tn(e,r);return L.equalsUint8Array(t,n)}throw Error("Unsupported signature algorithm")}(e,n,i);return await s&&await a}class _n{constructor(e){e&&(this.data=e)}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.data=e.subarray(1,1+t),1+this.data.length}throw Error("Invalid symmetric key")}write(){return L.concatUint8Array([new Uint8Array([this.data.length]),this.data])}}class Hn{constructor(e){if(void 0===e&&(e=new Uint8Array([])),!L.isUint8Array(e))throw Error("data must be in the form of a Uint8Array");this.data=e,this.length=this.data.byteLength}write(){return L.concatUint8Array([new Uint8Array([this.length]),this.data])}read(e){if(e.length>=1){const t=e[0];if(e.length>=t+1)return this.data=e.subarray(1,1+t),this.length=t,1+t}throw Error("Invalid octet string")}}class zn{constructor(e){if(e){const{version:t,hash:r,cipher:n,replacementFingerprint:i}=e;this.version=t||1,this.hash=r,this.cipher=n,this.replacementFingerprint=i}else this.version=null,this.hash=null,this.cipher=null,this.replacementFingerprint=null}read(e){if(e.length<4||1!==e[1]&&255!==e[1])throw new st("Cannot read KDFParams");const t=e[0];this.version=e[1],this.hash=e[2],this.cipher=e[3];let r=4;if(255===this.version){const n=t-r+1;this.replacementFingerprint=e.slice(r,r+n),r+=n}return r}write(e){if(!this.version||1===this.version||e)return new Uint8Array([3,1,this.hash,this.cipher]);return L.concatUint8Array([new Uint8Array([3+this.replacementFingerprint.length,this.version,this.hash,this.cipher]),this.replacementFingerprint])}}const Gn=e=>class{constructor(e){this.data=void 0===e?null:e}read(t){const r=t[0];return this.data=R.write(e,r),1}write(){return new Uint8Array([this.data])}getName(){return R.read(e,this.data)}getValue(){return this.data}},qn=Gn(R.aead),jn=Gn(R.symmetric),Vn=Gn(R.hash);class Yn{static fromObject({wrappedKey:e,algorithm:t}){const r=new Yn;return r.wrappedKey=e,r.algorithm=t,r}read(e){let t=0,r=e[t++];this.algorithm=r%2?e[t++]:null,r-=r%2,this.wrappedKey=L.readExactSubarray(e,t,t+r),t+=r}write(){return L.concatUint8Array([this.algorithm?new Uint8Array([this.wrappedKey.length+1,this.algorithm]):new Uint8Array([this.wrappedKey.length]),this.wrappedKey])}}const Zn=L.getWebCrypto(),Jn=L.getNodeCrypto(),Xn=Jn?Jn.getCiphers():[],Wn={idea:Xn.includes("idea-cfb")?"idea-cfb":void 0,tripledes:Xn.includes("des-ede3-cfb")?"des-ede3-cfb":void 0,cast5:Xn.includes("cast5-cfb")?"cast5-cfb":void 0,blowfish:Xn.includes("bf-cfb")?"bf-cfb":void 0,aes128:Xn.includes("aes-128-cfb")?"aes-128-cfb":void 0,aes192:Xn.includes("aes-192-cfb")?"aes-192-cfb":void 0,aes256:Xn.includes("aes-256-cfb")?"aes-256-cfb":void 0};async function $n(e){const{blockSize:t}=Sr(e),r=await ye(t),n=new Uint8Array([r[r.length-2],r[r.length-1]]);return L.concat([r,n])}async function ei(e,t,r,n,i){const s=R.read(R.symmetric,e);if(L.getNodeCrypto()&&Wn[s])return function(e,t,r,n){const i=R.read(R.symmetric,e),s=new Jn.createCipheriv(Wn[i],t,n);return k(r,(e=>new Uint8Array(s.update(e))))}(e,t,r,n);if(L.isAES(e))return async function(e,t,r,n){if(Zn&&await ri.isSupported(e)){const i=new ri(e,t,n);return L.isStream(r)?k(r,(e=>i.encryptChunk(e)),(()=>i.finish())):i.encrypt(r)}if(L.isStream(r)){const i=new ni(!0,e,t,n);return k(r,(e=>i.processChunk(e)),(()=>i.finish()))}return fr(t,n).encrypt(r)}(e,t,r,n);const a=new(await Er(e))(t),o=a.blockSize,c=n.slice();let u=new Uint8Array;const h=e=>{e&&(u=L.concatUint8Array([u,e]));const t=new Uint8Array(u.length);let r,n=0;for(;e?u.length>=o:u.length;){const e=a.encrypt(c);for(r=0;r<o;r++)c[r]=u[r]^e[r],t[n++]=c[r];u=u.subarray(o)}return t.subarray(0,n)};return k(r,h,h)}async function ti(e,t,r,n){const i=R.read(R.symmetric,e);if(Jn&&Wn[i])return function(e,t,r,n){const i=R.read(R.symmetric,e),s=new Jn.createDecipheriv(Wn[i],t,n);return k(r,(e=>new Uint8Array(s.update(e))))}(e,t,r,n);if(L.isAES(e))return async function(e,t,r,n){if(L.isStream(r)){const i=new ni(!1,e,t,n);return k(r,(e=>i.processChunk(e)),(()=>i.finish()))}return fr(t,n).decrypt(r)}(e,t,r,n);const s=new(await Er(e))(t),a=s.blockSize;let o=n,c=new Uint8Array;const u=e=>{e&&(c=L.concatUint8Array([c,e]));const t=new Uint8Array(c.length);let r,n=0;for(;e?c.length>=a:c.length;){const e=s.encrypt(o);for(o=c.subarray(0,a),r=0;r<a;r++)t[n++]=o[r]^e[r];c=c.subarray(a)}return t.subarray(0,n)};return k(r,u,u)}class ri{constructor(e,t,r){const{blockSize:n}=Sr(e);this.key=t,this.prevBlock=r,this.nextBlock=new Uint8Array(n),this.i=0,this.blockSize=n,this.zeroBlock=new Uint8Array(this.blockSize)}static async isSupported(e){const{keySize:t}=Sr(e);return Zn.importKey("raw",new Uint8Array(t),"aes-cbc",!1,["encrypt"]).then((()=>!0),(()=>!1))}async _runCBC(e,t){const r="AES-CBC";this.keyRef=this.keyRef||await Zn.importKey("raw",this.key,r,!1,["encrypt"]);const n=await Zn.encrypt({name:r,iv:t||this.zeroBlock},this.keyRef,e);return new Uint8Array(n).subarray(0,e.length)}async encryptChunk(e){const t=this.nextBlock.length-this.i,r=e.subarray(0,t);if(this.nextBlock.set(r,this.i),this.i+e.length>=2*this.blockSize){const r=(e.length-t)%this.blockSize,n=L.concatUint8Array([this.nextBlock,e.subarray(t,e.length-r)]),i=L.concatUint8Array([this.prevBlock,n.subarray(0,n.length-this.blockSize)]),s=await this._runCBC(i);return ii(s,n),this.prevBlock=s.slice(-this.blockSize),r>0&&this.nextBlock.set(e.subarray(-r)),this.i=r,s}let n;if(this.i+=r.length,this.i===this.nextBlock.length){const t=this.nextBlock;n=await this._runCBC(this.prevBlock),ii(n,t),this.prevBlock=n.slice(),this.i=0;const i=e.subarray(r.length);this.nextBlock.set(i,this.i),this.i+=i.length}else n=new Uint8Array;return n}async finish(){let e;if(0===this.i)e=new Uint8Array;else{this.nextBlock=this.nextBlock.subarray(0,this.i);const t=this.nextBlock,r=await this._runCBC(this.prevBlock);ii(r,t),e=r.subarray(0,t.length)}return this.clearSensitiveData(),e}clearSensitiveData(){this.nextBlock.fill(0),this.prevBlock.fill(0),this.keyRef=null,this.key=null}async encrypt(e){const t=(await this._runCBC(L.concatUint8Array([new Uint8Array(this.blockSize),e]),this.iv)).subarray(0,e.length);return ii(t,e),this.clearSensitiveData(),t}}class ni{constructor(e,t,r,n){this.forEncryption=e;const{blockSize:i}=Sr(t);this.key=kr.expandKeyLE(r),n.byteOffset%4!=0&&(n=n.slice()),this.prevBlock=si(n),this.nextBlock=new Uint8Array(i),this.i=0,this.blockSize=i}_runCFB(e){const t=si(e),r=new Uint8Array(e.length),n=si(r);for(let e=0;e+4<=n.length;e+=4){const{s0:r,s1:i,s2:s,s3:a}=kr.encrypt(this.key,this.prevBlock[0],this.prevBlock[1],this.prevBlock[2],this.prevBlock[3]);n[e+0]=t[e+0]^r,n[e+1]=t[e+1]^i,n[e+2]=t[e+2]^s,n[e+3]=t[e+3]^a,this.prevBlock=(this.forEncryption?n:t).slice(e,e+4)}return r}async processChunk(e){const t=this.nextBlock.length-this.i,r=e.subarray(0,t);if(this.nextBlock.set(r,this.i),this.i+e.length>=2*this.blockSize){const r=(e.length-t)%this.blockSize,n=L.concatUint8Array([this.nextBlock,e.subarray(t,e.length-r)]),i=this._runCFB(n);return r>0&&this.nextBlock.set(e.subarray(-r)),this.i=r,i}let n;if(this.i+=r.length,this.i===this.nextBlock.length){n=this._runCFB(this.nextBlock),this.i=0;const t=e.subarray(r.length);this.nextBlock.set(t,this.i),this.i+=t.length}else n=new Uint8Array;return n}async finish(){let e;if(0===this.i)e=new Uint8Array;else{e=this._runCFB(this.nextBlock).subarray(0,this.i)}return this.clearSensitiveData(),e}clearSensitiveData(){this.nextBlock.fill(0),this.prevBlock.fill(0),this.key.fill(0)}}function ii(e,t){const r=Math.min(e.length,t.length);for(let n=0;n<r;n++)e[n]=e[n]^t[n]}const si=e=>new Uint32Array(e.buffer,e.byteOffset,Math.floor(e.byteLength/4));const ai=L.getWebCrypto(),oi=L.getNodeCrypto(),ci=16;function ui(e,t){const r=e.length-ci;for(let n=0;n<ci;n++)e[n+r]^=t[n];return e}const hi=new Uint8Array(ci);async function li(e){const t=await fi(e),r=L.double(await t(hi)),n=L.double(r);return async function(e){return(await t(function(e,t,r){if(e.length&&e.length%ci==0)return ui(e,t);const n=new Uint8Array(e.length+(ci-e.length%ci));return n.set(e),n[e.length]=128,ui(n,r)}(e,r,n))).subarray(-16)}}async function fi(e){if(L.getNodeCrypto())return async function(t){const r=new oi.createCipheriv("aes-"+8*e.length+"-cbc",e,hi).update(t);return new Uint8Array(r)};if(L.getWebCrypto())try{return e=await ai.importKey("raw",e,{name:"AES-CBC",length:8*e.length},!1,["encrypt"]),async function(t){const r=await ai.encrypt({name:"AES-CBC",iv:hi,length:128},e,t);return new Uint8Array(r).subarray(0,r.byteLength-ci)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;L.printDebugError("Browser did not support operation: "+t.message)}return async function(t){return lr(e,hi,{disablePadding:!0}).encrypt(t)}}const yi=L.getWebCrypto(),pi=L.getNodeCrypto(),di=L.getNodeBuffer(),gi=16,Ai=gi,wi=new Uint8Array(gi),mi=new Uint8Array(gi);mi[15]=1;const bi=new Uint8Array(gi);async function ki(e){const t=await li(e);return function(e,r){return t(L.concatUint8Array([e,r]))}}async function Ei(e){if(L.getNodeCrypto())return async function(t,r){const n=new pi.createCipheriv("aes-"+8*e.length+"-ctr",e,r),i=di.concat([n.update(t),n.final()]);return new Uint8Array(i)};if(L.getWebCrypto())try{const t=await yi.importKey("raw",e,{name:"AES-CTR",length:8*e.length},!1,["encrypt"]);return async function(e,r){const n=await yi.encrypt({name:"AES-CTR",counter:r,length:128},t,e);return new Uint8Array(n)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;L.printDebugError("Browser did not support operation: "+t.message)}return async function(t,r){return hr(e,r).encrypt(t)}}async function vi(e,t){if(e!==R.symmetric.aes128&&e!==R.symmetric.aes192&&e!==R.symmetric.aes256)throw Error("EAX mode supports only AES cipher");const[r,n]=await Promise.all([ki(t),Ei(t)]);return{encrypt:async function(e,t,i){const[s,a]=await Promise.all([r(wi,t),r(mi,i)]),o=await n(e,s),c=await r(bi,o);for(let e=0;e<Ai;e++)c[e]^=a[e]^s[e];return L.concatUint8Array([o,c])},decrypt:async function(e,t,i){if(e.length<Ai)throw Error("Invalid EAX ciphertext");const s=e.subarray(0,-16),a=e.subarray(-16),[o,c,u]=await Promise.all([r(wi,t),r(mi,i),r(bi,s)]),h=u;for(let e=0;e<Ai;e++)h[e]^=c[e]^o[e];if(!L.equalsUint8Array(a,h))throw Error("Authentication tag mismatch");return await n(s,o)}}}bi[15]=2,vi.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[8+e]^=t[e];return r},vi.blockLength=gi,vi.ivLength=16,vi.tagLength=Ai;const Ki=16,Si=16;function Ii(e){let t=0;for(let r=1;!(e&r);r<<=1)t++;return t}function Bi(e,t){for(let r=0;r<e.length;r++)e[r]^=t[r];return e}function Ci(e,t){return Bi(e.slice(),t)}const Ui=new Uint8Array(Ki),Pi=new Uint8Array([1]);async function Di(e,t){const{keySize:r}=Sr(e);if(!L.isAES(e)||t.length!==r)throw Error("Unexpected algorithm or key size");let n=0;const i=e=>lr(t,Ui,{disablePadding:!0}).encrypt(e),s=e=>lr(t,Ui,{disablePadding:!0}).decrypt(e);let a;function o(e,t,r,s){const o=t.length/Ki|0;!function(e,t){const r=L.nbits(Math.max(e.length,t.length)/Ki|0)-1;for(let e=n+1;e<=r;e++)a[e]=L.double(a[e-1]);n=r}(t,s);const c=L.concatUint8Array([Ui.subarray(0,15-r.length),Pi,r]),u=63&c[15];c[15]&=192;const h=i(c),l=L.concatUint8Array([h,Ci(h.subarray(0,8),h.subarray(1,9))]),f=L.shiftRight(l.subarray(0+(u>>3),17+(u>>3)),8-(7&u)).subarray(1),y=new Uint8Array(Ki),p=new Uint8Array(t.length+Si);let d,g=0;for(d=0;d<o;d++)Bi(f,a[Ii(d+1)]),p.set(Bi(e(Ci(f,t)),f),g),Bi(y,e===i?t:p.subarray(g)),t=t.subarray(Ki),g+=Ki;if(t.length){Bi(f,a.x);const r=i(f);p.set(Ci(t,r),g);const n=new Uint8Array(Ki);n.set(e===i?t:p.subarray(g,-16),0),n[t.length]=128,Bi(y,n),g+=t.length}const A=Bi(i(Bi(Bi(y,f),a.$)),function(e){if(!e.length)return Ui;const t=e.length/Ki|0,r=new Uint8Array(Ki),n=new Uint8Array(Ki);for(let s=0;s<t;s++)Bi(r,a[Ii(s+1)]),Bi(n,i(Ci(r,e))),e=e.subarray(Ki);if(e.length){Bi(r,a.x);const t=new Uint8Array(Ki);t.set(e,0),t[e.length]=128,Bi(t,r),Bi(n,i(t))}return n}(s));return p.set(A,g),p}return function(){const e=i(Ui),t=L.double(e);a=[],a[0]=L.double(t),a.x=e,a.$=t}(),{encrypt:async function(e,t,r){return o(i,e,t,r)},decrypt:async function(e,t,r){if(e.length<Si)throw Error("Invalid OCB ciphertext");const n=e.subarray(-16);e=e.subarray(0,-16);const i=o(s,e,t,r);if(L.equalsUint8Array(n,i.subarray(-16)))return i.subarray(0,-16);throw Error("Authentication tag mismatch")}}}Di.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[7+e]^=t[e];return r},Di.blockLength=Ki,Di.ivLength=15,Di.tagLength=Si;const xi=L.getWebCrypto(),Qi=L.getNodeCrypto(),Ri=L.getNodeBuffer(),Ti=16,Mi="AES-GCM";async function Li(e,t){if(e!==R.symmetric.aes128&&e!==R.symmetric.aes192&&e!==R.symmetric.aes256)throw Error("GCM mode supports only AES cipher");if(L.getNodeCrypto())return{encrypt:async function(e,r,n=new Uint8Array){const i=new Qi.createCipheriv("aes-"+8*t.length+"-gcm",t,r);i.setAAD(n);const s=Ri.concat([i.update(e),i.final(),i.getAuthTag()]);return new Uint8Array(s)},decrypt:async function(e,r,n=new Uint8Array){const i=new Qi.createDecipheriv("aes-"+8*t.length+"-gcm",t,r);i.setAAD(n),i.setAuthTag(e.slice(e.length-Ti,e.length));const s=Ri.concat([i.update(e.slice(0,e.length-Ti)),i.final()]);return new Uint8Array(s)}};if(L.getWebCrypto())try{const e=await xi.importKey("raw",t,{name:Mi},!1,["encrypt","decrypt"]),r=navigator.userAgent.match(/Version\/13\.\d(\.\d)* Safari/)||navigator.userAgent.match(/Version\/(13|14)\.\d(\.\d)* Mobile\/\S* Safari/);return{encrypt:async function(n,i,s=new Uint8Array){if(r&&!n.length)return pr(t,i,s).encrypt(n);const a=await xi.encrypt({name:Mi,iv:i,additionalData:s,tagLength:128},e,n);return new Uint8Array(a)},decrypt:async function(n,i,s=new Uint8Array){if(r&&n.length===Ti)return pr(t,i,s).decrypt(n);try{const t=await xi.decrypt({name:Mi,iv:i,additionalData:s,tagLength:128},e,n);return new Uint8Array(t)}catch(e){if("OperationError"===e.name)throw Error("Authentication tag mismatch")}}}}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;L.printDebugError("Browser did not support operation: "+e.message)}return{encrypt:async function(e,r,n){return pr(t,r,n).encrypt(e)},decrypt:async function(e,r,n){return pr(t,r,n).decrypt(e)}}}function Fi(e,t=!1){switch(e){case R.aead.eax:return vi;case R.aead.ocb:return Di;case R.aead.gcm:return Li;case R.aead.experimentalGCM:if(!t)throw Error("Unexpected non-standard `experimentalGCM` AEAD algorithm provided in `config.preferredAEADAlgorithm`: use `gcm` instead");return Li;default:throw Error("Unsupported AEAD mode")}}async function Oi(e,t,r,n,i,s){switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:{const{n:e,e:t}=r;return{c:await Ge(i,e,t)}}case R.publicKey.elgamal:{const{p:e,g:t,y:n}=r;return async function(e,t,r,n){t=re(t),r=re(r),n=re(n);const i=re(Me(e,he(t))),s=pe(Ze,t-Ze);return{c1:le(ie(r,s,t)),c2:le(ne(ie(n,s,t)*i,t))}}(i,e,t,n)}case R.publicKey.ecdh:{const{oid:e,Q:t,kdfParams:n}=r,{publicKey:a,wrappedKey:o}=await An(e,n,i,t,s);return{V:a,C:new _n(o)}}case R.publicKey.x25519:case R.publicKey.x448:{if(t&&!L.isAES(t))throw Error("X25519 and X448 keys can only encrypt AES session keys");const{A:n}=r,{ephemeralPublicKey:s,wrappedKey:a}=await Qr(e,i,n);return{ephemeralPublicKey:s,C:Yn.fromObject({algorithm:t,wrappedKey:a})}}case R.publicKey.aead:{if(!n)throw Error("Cannot encrypt with symmetric key missing private parameters");const{cipher:e}=r,t=e.getValue(),{keyMaterial:s}=n,a=T.preferredAEADAlgorithm,o=Fi(T.preferredAEADAlgorithm),{ivLength:c}=o,u=ye(c),h=await o(t,s),l=await h.encrypt(i,u,new Uint8Array);return{aeadMode:new qn(a),iv:u,c:new Hn(l)}}case R.publicKey.pqc_mlkem_x25519:{const{eccPublicKey:n,mlkemPublicKey:s}=r,{eccCipherText:a,mlkemCipherText:o,wrappedKey:c}=await Dn(e,n,s,i);return{eccCipherText:a,mlkemCipherText:o,C:Yn.fromObject({algorithm:t,wrappedKey:c})}}default:return[]}}async function Ni(e,t,r,n,i,s){switch(e){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:{const{c:e}=n,{n:i,e:a}=t,{d:o,p:c,q:u,u:h}=r;return qe(e,i,a,o,c,u,h,s)}case R.publicKey.elgamal:{const{c1:e,c2:i}=n;return async function(e,t,r,n,i){return e=re(e),t=re(t),r=re(r),Le(le(ne(ae(ie(e,n=re(n),r),r)*t,r),"be",he(r)),i)}(e,i,t.p,r.x,s)}case R.publicKey.ecdh:{const{oid:e,Q:s,kdfParams:a}=t,{d:o}=r,{V:c,C:u}=n;return mn(e,a,c,u.data,s,o,i)}case R.publicKey.x25519:case R.publicKey.x448:{const{A:i}=t,{k:s}=r,{ephemeralPublicKey:a,C:o}=n;if(null!==o.algorithm&&!L.isAES(o.algorithm))throw Error("AES session key expected");return Rr(e,a,o.wrappedKey,i,s)}case R.publicKey.aead:{const{cipher:e}=t,i=e.getValue(),{keyMaterial:s}=r,{aeadMode:a,iv:o,c}=n,u=Fi(a.getValue());return(await u(i,s)).decrypt(c.data,o,new Uint8Array)}case R.publicKey.pqc_mlkem_x25519:{const{eccSecretKey:i,mlkemSecretKey:s}=r,{eccPublicKey:a,mlkemPublicKey:o}=t,{eccCipherText:c,mlkemCipherText:u,C:h}=n;return xn(e,c,u,i,a,s,0,h.wrappedKey)}default:throw Error("Unknown public key encryption algorithm.")}}async function _i(e,t,r){let n=0;switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:{const e=L.readMPI(t.subarray(n));n+=e.length+2;const r=L.readMPI(t.subarray(n));n+=r.length+2;const i=L.readMPI(t.subarray(n));n+=i.length+2;const s=L.readMPI(t.subarray(n));return n+=s.length+2,{read:n,privateParams:{d:e,p:r,q:i,u:s}}}case R.publicKey.dsa:case R.publicKey.elgamal:{const e=L.readMPI(t.subarray(n));return n+=e.length+2,{read:n,privateParams:{x:e}}}case R.publicKey.ecdsa:case R.publicKey.ecdh:{const i=Yi(e,r.oid);let s=L.readMPI(t.subarray(n));return n+=s.length+2,s=L.leftPad(s,i),{read:n,privateParams:{d:s}}}case R.publicKey.eddsaLegacy:{const i=Yi(e,r.oid);if(r.oid.getName()!==R.curve.ed25519Legacy)throw Error("Unexpected OID for eddsaLegacy");let s=L.readMPI(t.subarray(n));return n+=s.length+2,s=L.leftPad(s,i),{read:n,privateParams:{seed:s}}}case R.publicKey.ed25519:case R.publicKey.ed448:{const r=Yi(e),i=L.readExactSubarray(t,n,n+r);return n+=i.length,{read:n,privateParams:{seed:i}}}case R.publicKey.x25519:case R.publicKey.x448:{const r=Yi(e),i=L.readExactSubarray(t,n,n+r);return n+=i.length,{read:n,privateParams:{k:i}}}case R.publicKey.hmac:{const{cipher:e}=r,i=Re(e.getValue()),s=t.subarray(n,n+32);n+=32;const a=t.subarray(n,n+i);return n+=i,{read:n,privateParams:{hashSeed:s,keyMaterial:a}}}case R.publicKey.aead:{const{cipher:e}=r,i=t.subarray(n,n+32);n+=32;const{keySize:s}=Sr(e.getValue()),a=t.subarray(n,n+s);return n+=s,{read:n,privateParams:{hashSeed:i,keyMaterial:a}}}case R.publicKey.pqc_mlkem_x25519:{const r=L.readExactSubarray(t,n,n+Yi(R.publicKey.x25519));n+=r.length;const i=L.readExactSubarray(t,n,n+64);n+=i.length;const{mlkemSecretKey:s}=await Un(e,i);return{read:n,privateParams:{eccSecretKey:r,mlkemSecretKey:s,mlkemSeed:i}}}case R.publicKey.pqc_mldsa_ed25519:{const r=L.readExactSubarray(t,n,n+Yi(R.publicKey.ed25519));n+=r.length;const i=L.readExactSubarray(t,n,n+32);n+=i.length;const{mldsaSecretKey:s}=await Tn(e,i);return{read:n,privateParams:{eccSecretKey:r,mldsaSecretKey:s,mldsaSeed:i}}}default:throw new st("Unknown public key encryption algorithm.")}}function Hi(e,t){const r=new Set([R.publicKey.ed25519,R.publicKey.x25519,R.publicKey.ed448,R.publicKey.x448,R.publicKey.aead,R.publicKey.hmac,R.publicKey.pqc_mlkem_x25519,R.publicKey.pqc_mldsa_ed25519]),n={[R.publicKey.pqc_mlkem_x25519]:new Set(["mlkemSecretKey"]),[R.publicKey.pqc_mldsa_ed25519]:new Set(["mldsaSecretKey"])},i=Object.keys(t).map((i=>{if(n[e]?.has(i))return new Uint8Array;const s=t[i];return L.isUint8Array(s)?r.has(e)?s:L.uint8ArrayToMPI(s):s.write()}));return L.concatUint8Array(i)}async function zi(e,t,r,n){switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:return async function(e,t){if(t=BigInt(t),L.getWebCrypto()){const r={name:"RSASSA-PKCS1-v1_5",modulusLength:e,publicExponent:le(t),hash:{name:"SHA-1"}},n=await Oe.generateKey(r,!0,["sign","verify"]);return Ye(await Oe.exportKey("jwk",n.privateKey),t)}if(L.getNodeCrypto()){const r={modulusLength:e,publicExponent:oe(t),publicKeyEncoding:{type:"pkcs1",format:"jwk"},privateKeyEncoding:{type:"pkcs1",format:"jwk"}},n=await new Promise(((e,t)=>{Ne.generateKeyPair("rsa",r,((r,n,i)=>{r?t(r):e(i)}))}));return Ye(n,t)}let r,n,i;do{n=ge(e-(e>>1),t,40),r=ge(e>>1,t,40),i=r*n}while(ue(i)!==e);const s=(r-_e)*(n-_e);return n<r&&([r,n]=[n,r]),{n:le(i),e:le(t),d:le(ae(t,s)),p:le(r),q:le(n),u:le(ae(r,n))}}(t,65537).then((({n:e,e:t,d:r,p:n,q:i,u:s})=>({privateParams:{d:r,p:n,q:i,u:s},publicParams:{n:e,e:t}})));case R.publicKey.ecdsa:return Yr(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{d:r},publicParams:{oid:new Xe(e),Q:t}})));case R.publicKey.eddsaLegacy:return Yr(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{seed:r},publicParams:{oid:new Xe(e),Q:t}})));case R.publicKey.ecdh:return Yr(r).then((({oid:e,Q:t,secret:r,hash:n,cipher:i})=>({privateParams:{d:r},publicParams:{oid:new Xe(e),Q:t,kdfParams:new zn({hash:n,cipher:i})}})));case R.publicKey.ed25519:case R.publicKey.ed448:return ut(e).then((({A:e,seed:t})=>({privateParams:{seed:t},publicParams:{A:e}})));case R.publicKey.x25519:case R.publicKey.x448:return Dr(e).then((({A:e,k:t})=>({privateParams:{k:t},publicParams:{A:e}})));case R.publicKey.hmac:return Gi(await async function(e){if(!In.has(e))throw Error("Unsupported hash algorithm.");const t=R.read(R.webHash,e),r=Bn||Cn.webcrypto.subtle,n=await r.generateKey({name:"HMAC",hash:{name:t}},!0,["sign","verify"]),i=await r.exportKey("raw",n);return new Uint8Array(i)}(n),new Vn(n));case R.publicKey.aead:return Gi(ji(n),new jn(n));case R.publicKey.pqc_mlkem_x25519:return Pn(e).then((({eccSecretKey:e,eccPublicKey:t,mlkemSeed:r,mlkemSecretKey:n,mlkemPublicKey:i})=>({privateParams:{eccSecretKey:e,mlkemSeed:r,mlkemSecretKey:n},publicParams:{eccPublicKey:t,mlkemPublicKey:i}})));case R.publicKey.pqc_mldsa_ed25519:return Mn(e).then((({eccSecretKey:e,eccPublicKey:t,mldsaSeed:r,mldsaSecretKey:n,mldsaPublicKey:i})=>({privateParams:{eccSecretKey:e,mldsaSeed:r,mldsaSecretKey:n},publicParams:{eccPublicKey:t,mldsaPublicKey:i}})));case R.publicKey.dsa:case R.publicKey.elgamal:throw Error("Unsupported algorithm for key generation.");default:throw Error("Unknown public key algorithm.")}}async function Gi(e,t){const r=ye(32);return{privateParams:{hashSeed:r,keyMaterial:e},publicParams:{cipher:t,digest:await Qe(R.hash.sha256,r)}}}async function qi(e,t,r){if(!t||!r)throw Error("Missing key parameters");switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:{const{n:e,e:n}=t,{d:i,p:s,q:a,u:o}=r;return async function(e,t,r,n,i,s){if(e=re(e),(n=re(n))*(i=re(i))!==e)return!1;const a=BigInt(2);if(ne(n*(s=re(s)),i)!==BigInt(1))return!1;t=re(t),r=re(r);const o=pe(a,a<<BigInt(Math.floor(ue(e)/3))),c=o*r*t;return!(ne(c,n-_e)!==o||ne(c,i-_e)!==o)}(e,n,i,s,a,o)}case R.publicKey.dsa:{const{p:e,q:n,g:i,y:s}=t,{x:a}=r;return async function(e,t,r,n,i){if(e=re(e),t=re(t),r=re(r),n=re(n),r<=Sn||r>=e)return!1;if(ne(e-Sn,t)!==Kn)return!1;if(ie(r,t,e)!==Sn)return!1;const s=BigInt(ue(t));if(s<BigInt(150)||!Ae(t,null,32))return!1;i=re(i);const a=BigInt(2);return n===ie(r,t*pe(a<<s-Sn,a<<s)+i,e)}(e,n,i,s,a)}case R.publicKey.elgamal:{const{p:e,g:n,y:i}=t,{x:s}=r;return async function(e,t,r,n){if(e=re(e),t=re(t),r=re(r),t<=Ze||t>=e)return!1;const i=BigInt(ue(e));if(i<BigInt(1023))return!1;if(ie(t,e-Ze,e)!==Ze)return!1;let s=t,a=BigInt(1);const o=BigInt(2),c=o<<BigInt(17);for(;a<c;){if(s=ne(s*t,e),s===Ze)return!1;a++}n=re(n);const u=pe(o<<i-Ze,o<<i);return r===ie(t,(e-Ze)*u+n,e)}(e,n,i,s)}case R.publicKey.ecdsa:case R.publicKey.ecdh:{const n=vn[R.read(R.publicKey,e)],{oid:i,Q:s}=t,{d:a}=r;return n.validateParams(i,s,a)}case R.publicKey.eddsaLegacy:{const{Q:e,oid:n}=t,{seed:i}=r;return ln(n,e,i)}case R.publicKey.ed25519:case R.publicKey.ed448:{const{A:n}=t,{seed:i}=r;return ft(e,n,i)}case R.publicKey.x25519:case R.publicKey.x448:{const{A:n}=t,{k:i}=r;return xr(e,n,i)}case R.publicKey.hmac:{const{cipher:e,digest:n}=t,{hashSeed:i,keyMaterial:s}=r;return Re(e.getValue())===s.length&&L.equalsUint8Array(n,await Qe(R.hash.sha256,i))}case R.publicKey.aead:{const{cipher:e,digest:n}=t,{hashSeed:i,keyMaterial:s}=r,{keySize:a}=Sr(e.getValue());return a===s.length&&L.equalsUint8Array(n,await Qe(R.hash.sha256,i))}case R.publicKey.pqc_mlkem_x25519:{const{eccSecretKey:n,mlkemSeed:i}=r,{eccPublicKey:s,mlkemPublicKey:a}=t;return Rn(e,s,n,a,i)}case R.publicKey.pqc_mldsa_ed25519:{const{eccSecretKey:n,mldsaSeed:i}=r,{eccPublicKey:s,mldsaPublicKey:a}=t;return Nn(e,s,n,a,i)}default:throw Error("Unknown public key algorithm.")}}function ji(e){const{keySize:t}=Sr(e);return ye(t)}function Vi(e){try{e.getName()}catch(e){throw new st("Unknown curve OID")}}function Yi(e,t){switch(e){case R.publicKey.ecdsa:case R.publicKey.ecdh:case R.publicKey.eddsaLegacy:return new Vr(t).payloadSize;case R.publicKey.ed25519:case R.publicKey.ed448:return yt(e);case R.publicKey.x25519:case R.publicKey.x448:return Tr(e);default:throw Error("Unknown elliptic algo")}}async function Zi(e,t,r,n,i,s,a){switch(e){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.rsaSign:{const{n:e,e:i}=n;return ze(t,s,L.leftPad(r.s,e.length),e,i,a)}case R.publicKey.dsa:{const{g:e,p:t,q:i,y:s}=n,{r:o,s:c}=r;return async function(e,t,r,n,i,s,a,o){if(t=re(t),r=re(r),s=re(s),a=re(a),i=re(i),o=re(o),t<=Kn||t>=a||r<=Kn||r>=a)return L.printDebug("invalid DSA Signature"),!1;const c=ne(re(n.subarray(0,he(a))),a),u=ae(r,a);if(u===Kn)return L.printDebug("invalid DSA Signature"),!1;i=ne(i,s),o=ne(o,s);const h=ne(c*u,a),l=ne(t*u,a);return ne(ne(ie(i,h,s)*ie(o,l,s),s),a)===t}(0,o,c,a,e,t,i,s)}case R.publicKey.ecdsa:{const{oid:e,Q:i}=n,o=new Vr(e).payloadSize;return an(e,t,{r:L.leftPad(r.r,o),s:L.leftPad(r.s,o)},s,i,a)}case R.publicKey.eddsaLegacy:{if(Re(t)<Re(R.hash.sha256))throw Error("Hash algorithm too weak for EdDSALegacy.");const{oid:e,Q:i}=n,s=new Vr(e).payloadSize;return hn(e,0,{r:L.leftPad(r.r,s),s:L.leftPad(r.s,s)},0,i,a)}case R.publicKey.ed25519:case R.publicKey.ed448:{if(Re(t)<Re(pt(e)))throw Error("Hash algorithm too weak for EdDSA.");const{A:i}=n;return lt(e,0,r,0,i,a)}case R.publicKey.hmac:{if(!i)throw Error("Cannot verify HMAC signature with symmetric key missing private parameters");const{cipher:e}=n,{keyMaterial:t}=i;return async function(e,t,r,n){if(!In.has(e))throw Error("Unsupported hash algorithm.");const i=R.read(R.webHash,e),s=Bn||Cn.webcrypto.subtle,a=await s.importKey("raw",t,{name:"HMAC",hash:{name:i}},!1,["verify"]);return s.verify("HMAC",a,r,n)}(e.getValue(),t,r.mac.data,a)}case R.publicKey.pqc_mldsa_ed25519:{if(!On(e,t))throw Error("Unexpected hash algorithm for PQC signature: digest size too short");const{eccPublicKey:i,mldsaPublicKey:s}=n;return Fn(e,0,i,s,a,r)}default:throw Error("Unknown signature algorithm.")}}async function Ji(e,t,r,n,i,s){if(!r||!n)throw Error("Missing key parameters");switch(e){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.rsaSign:{const{n:e,e:a}=r,{d:o,p:c,q:u,u:h}=n;return{s:await He(t,i,e,a,o,c,u,h,s)}}case R.publicKey.dsa:{const{g:e,p:t,q:i}=r,{x:a}=n;return async function(e,t,r,n,i,s){const a=BigInt(0);let o,c,u,h;n=re(n),i=re(i),r=re(r),s=re(s),r=ne(r,n),s=ne(s,i);const l=ne(re(t.subarray(0,he(i))),i);for(;;){if(o=pe(Sn,i),c=ne(ie(r,o,n),i),c===a)continue;const e=ne(s*c,i);if(h=ne(l+e,i),u=ne(ae(o,i)*h,i),u!==a)break}return{r:le(c,"be",he(n)),s:le(u,"be",he(n))}}(0,s,e,t,i,a)}case R.publicKey.elgamal:throw Error("Signing with Elgamal is not defined in the OpenPGP standard.");case R.publicKey.ecdsa:{const{oid:e,Q:a}=r,{d:o}=n;return sn(e,t,i,a,o,s)}case R.publicKey.eddsaLegacy:{if(Re(t)<Re(R.hash.sha256))throw Error("Hash algorithm too weak for EdDSALegacy.");const{oid:e,Q:i}=r,{seed:a}=n;return un(e,0,0,i,a,s)}case R.publicKey.ed25519:case R.publicKey.ed448:{if(Re(t)<Re(pt(e)))throw Error("Hash algorithm too weak for EdDSA.");const{A:i}=r,{seed:a}=n;return ht(e,0,0,i,a,s)}case R.publicKey.hmac:{const{cipher:e}=r,{keyMaterial:t}=n,i=await async function(e,t,r){if(!In.has(e))throw Error("Unsupported hash algorithm.");const n=R.read(R.webHash,e),i=Bn||Cn.webcrypto.subtle,s=await i.importKey("raw",t,{name:"HMAC",hash:{name:n}},!1,["sign"]),a=await i.sign("HMAC",s,r);return new Uint8Array(a)}(e.getValue(),t,s);return{mac:new Hn(i)}}case R.publicKey.pqc_mldsa_ed25519:{if(!On(e,t))throw Error("Unexpected hash algorithm for PQC signature: digest size too short");const{eccPublicKey:i}=r,{eccSecretKey:a,mldsaSecretKey:o}=n;return Ln(e,0,a,i,o,s)}default:throw Error("Unknown signature algorithm.")}}Li.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[4+e]^=t[e];return r},Li.blockLength=16,Li.ivLength=12,Li.tagLength=Ti;class Xi extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Xi),this.name="Argon2OutOfMemoryError"}}let Wi,$i,es=2<<19;class ts{static get ARGON2_WASM_MEMORY_THRESHOLD_RELOAD(){return es}static set ARGON2_WASM_MEMORY_THRESHOLD_RELOAD(e){es=e}static reloadWasmModule(){Wi&&($i=Wi(),$i.catch((()=>{})))}constructor(e=T){const{passes:t,parallelism:r,memoryExponent:n}=e.s2kArgon2Params;this.type="argon2",this.salt=null,this.t=t,this.p=r,this.encodedM=n}generateSalt(){this.salt=ye(16)}read(e){let t=0;return this.salt=e.subarray(t,t+16),t+=16,this.t=e[t++],this.p=e[t++],this.encodedM=e[t++],t}write(){const e=[new Uint8Array([R.write(R.s2k,this.type)]),this.salt,new Uint8Array([this.t,this.p,this.encodedM])];return L.concatUint8Array(e)}async produceKey(e,t){const r=2<<this.encodedM-1;try{Wi=Wi||(await Promise.resolve().then((function(){return bd}))).default,$i=$i||Wi();const n=await $i,i=n({version:19,type:2,password:L.encodeUTF8(e),salt:this.salt,tagLength:t,memorySize:r,parallelism:this.p,passes:this.t});return r>ts.ARGON2_WASM_MEMORY_THRESHOLD_RELOAD&&ts.reloadWasmModule(),i}catch(e){throw e.message&&(e.message.includes("Unable to grow instance memory")||e.message.includes("failed to grow memory")||e.message.includes("WebAssembly.Memory.grow")||e.message.includes("Out of memory"))?new Xi("Could not allocate required memory for Argon2"):e}}}class rs{constructor(e,t=T){this.algorithm=R.hash.sha256,this.type=R.read(R.s2k,e),this.c=t.s2kIterationCountByte,this.salt=null}generateSalt(){switch(this.type){case"salted":case"iterated":this.salt=ye(8)}}getCount(){return 16+(15&this.c)<<6+(this.c>>4)}read(e){let t=0;switch(this.algorithm=e[t++],this.type){case"simple":break;case"salted":this.salt=e.subarray(t,t+8),t+=8;break;case"iterated":this.salt=e.subarray(t,t+8),t+=8,this.c=e[t++];break;case"gnu":if("GNU"!==L.uint8ArrayToString(e.subarray(t,t+3)))throw new st("Unknown s2k type.");t+=3;if(1001!==1e3+e[t++])throw new st("Unknown s2k gnu protection mode.");this.type="gnu-dummy";break;default:throw new st("Unknown s2k type.")}return t}write(){if("gnu-dummy"===this.type)return new Uint8Array([101,0,...L.stringToUint8Array("GNU"),1]);const e=[new Uint8Array([R.write(R.s2k,this.type),this.algorithm])];switch(this.type){case"simple":break;case"salted":e.push(this.salt);break;case"iterated":e.push(this.salt),e.push(new Uint8Array([this.c]));break;case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}return L.concatUint8Array(e)}async produceKey(e,t){e=L.encodeUTF8(e);const r=[];let n=0,i=0;for(;n<t;){let t;switch(this.type){case"simple":t=L.concatUint8Array([new Uint8Array(i),e]);break;case"salted":t=L.concatUint8Array([new Uint8Array(i),this.salt,e]);break;case"iterated":{const r=L.concatUint8Array([this.salt,e]);let n=r.length;const s=Math.max(this.getCount(),n);t=new Uint8Array(i+s),t.set(r,i);for(let e=i+n;e<s;e+=n,n*=2)t.copyWithin(e,i,e);break}case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}const s=await Qe(this.algorithm,t);r.push(s),n+=s.length,i++}return L.concatUint8Array(r).subarray(0,t)}}const ns=new Set([R.s2k.argon2,R.s2k.iterated]);function is(e,t=T){switch(e){case R.s2k.argon2:return new ts(t);case R.s2k.iterated:case R.s2k.gnu:case R.s2k.salted:case R.s2k.simple:return new rs(e,t);default:throw new st("Unsupported S2K type")}}function ss(e){const{s2kType:t}=e;if(!ns.has(t))throw Error("The provided `config.s2kType` value is not allowed");return is(t,e)}var as=Uint8Array,os=Uint16Array,cs=Int32Array,us=new as([0,0,0,0,0,0,0,0,1,1,1,1,2,2,2,2,3,3,3,3,4,4,4,4,5,5,5,5,0,0,0,0]),hs=new as([0,0,0,0,1,1,2,2,3,3,4,4,5,5,6,6,7,7,8,8,9,9,10,10,11,11,12,12,13,13,0,0]),ls=new as([16,17,18,0,8,7,9,6,10,5,11,4,12,3,13,2,14,1,15]),fs=function(e,t){for(var r=new os(31),n=0;n<31;++n)r[n]=t+=1<<e[n-1];var i=new cs(r[30]);for(n=1;n<30;++n)for(var s=r[n];s<r[n+1];++s)i[s]=s-r[n]<<5|n;return{b:r,r:i}},ys=fs(us,2),ps=ys.b,ds=ys.r;ps[28]=258,ds[258]=28;for(var gs=fs(hs,0),As=gs.b,ws=gs.r,ms=new os(32768),bs=0;bs<32768;++bs){var ks=(43690&bs)>>1|(21845&bs)<<1;ks=(61680&(ks=(52428&ks)>>2|(13107&ks)<<2))>>4|(3855&ks)<<4,ms[bs]=((65280&ks)>>8|(255&ks)<<8)>>1}var Es=function(e,t,r){for(var n=e.length,i=0,s=new os(t);i<n;++i)e[i]&&++s[e[i]-1];var a,o=new os(t);for(i=1;i<t;++i)o[i]=o[i-1]+s[i-1]<<1;if(r){a=new os(1<<t);var c=15-t;for(i=0;i<n;++i)if(e[i])for(var u=i<<4|e[i],h=t-e[i],l=o[e[i]-1]++<<h,f=l|(1<<h)-1;l<=f;++l)a[ms[l]>>c]=u}else for(a=new os(n),i=0;i<n;++i)e[i]&&(a[i]=ms[o[e[i]-1]++]>>15-e[i]);return a},vs=new as(288);for(bs=0;bs<144;++bs)vs[bs]=8;for(bs=144;bs<256;++bs)vs[bs]=9;for(bs=256;bs<280;++bs)vs[bs]=7;for(bs=280;bs<288;++bs)vs[bs]=8;var Ks=new as(32);for(bs=0;bs<32;++bs)Ks[bs]=5;var Ss=/*#__PURE__*/Es(vs,9,0),Is=/*#__PURE__*/Es(vs,9,1),Bs=/*#__PURE__*/Es(Ks,5,0),Cs=/*#__PURE__*/Es(Ks,5,1),Us=function(e){for(var t=e[0],r=1;r<e.length;++r)e[r]>t&&(t=e[r]);return t},Ps=function(e,t,r){var n=t/8|0;return(e[n]|e[n+1]<<8)>>(7&t)&r},Ds=function(e,t){var r=t/8|0;return(e[r]|e[r+1]<<8|e[r+2]<<16)>>(7&t)},xs=function(e){return(e+7)/8|0},Qs=function(e,t,r){return(null==t||t<0)&&(t=0),(null==r||r>e.length)&&(r=e.length),new as(e.subarray(t,r))},Rs=["unexpected EOF","invalid block type","invalid length/literal","invalid distance","stream finished","no stream handler",,"no callback","invalid UTF-8 data","extra field too long","date not in range 1980-2099","filename too long","stream finishing","invalid zip data"],Ts=function(e,t,r){var n=Error(t||Rs[e]);if(n.code=e,Error.captureStackTrace&&Error.captureStackTrace(n,Ts),!r)throw n;return n},Ms=function(e,t,r){r<<=7&t;var n=t/8|0;e[n]|=r,e[n+1]|=r>>8},Ls=function(e,t,r){r<<=7&t;var n=t/8|0;e[n]|=r,e[n+1]|=r>>8,e[n+2]|=r>>16},Fs=function(e,t){for(var r=[],n=0;n<e.length;++n)e[n]&&r.push({s:n,f:e[n]});var i=r.length,s=r.slice();if(!i)return{t:qs,l:0};if(1==i){var a=new as(r[0].s+1);return a[r[0].s]=1,{t:a,l:1}}r.sort((function(e,t){return e.f-t.f})),r.push({s:-1,f:25001});var o=r[0],c=r[1],u=0,h=1,l=2;for(r[0]={s:-1,f:o.f+c.f,l:o,r:c};h!=i-1;)o=r[r[u].f<r[l].f?u++:l++],c=r[u!=h&&r[u].f<r[l].f?u++:l++],r[h++]={s:-1,f:o.f+c.f,l:o,r:c};var f=s[0].s;for(n=1;n<i;++n)s[n].s>f&&(f=s[n].s);var y=new os(f+1),p=Os(r[h-1],y,0);if(p>t){n=0;var d=0,g=p-t,A=1<<g;for(s.sort((function(e,t){return y[t.s]-y[e.s]||e.f-t.f}));n<i;++n){var w=s[n].s;if(!(y[w]>t))break;d+=A-(1<<p-y[w]),y[w]=t}for(d>>=g;d>0;){var m=s[n].s;y[m]<t?d-=1<<t-y[m]++-1:++n}for(;n>=0&&d;--n){var b=s[n].s;y[b]==t&&(--y[b],++d)}p=t}return{t:new as(y),l:p}},Os=function(e,t,r){return-1==e.s?Math.max(Os(e.l,t,r+1),Os(e.r,t,r+1)):t[e.s]=r},Ns=function(e){for(var t=e.length;t&&!e[--t];);for(var r=new os(++t),n=0,i=e[0],s=1,a=function(e){r[n++]=e},o=1;o<=t;++o)if(e[o]==i&&o!=t)++s;else{if(!i&&s>2){for(;s>138;s-=138)a(32754);s>2&&(a(s>10?s-11<<5|28690:s-3<<5|12305),s=0)}else if(s>3){for(a(i),--s;s>6;s-=6)a(8304);s>2&&(a(s-3<<5|8208),s=0)}for(;s--;)a(i);s=1,i=e[o]}return{c:r.subarray(0,n),n:t}},_s=function(e,t){for(var r=0,n=0;n<t.length;++n)r+=e[n]*t[n];return r},Hs=function(e,t,r){var n=r.length,i=xs(t+2);e[i]=255&n,e[i+1]=n>>8,e[i+2]=255^e[i],e[i+3]=255^e[i+1];for(var s=0;s<n;++s)e[i+s+4]=r[s];return 8*(i+4+n)},zs=function(e,t,r,n,i,s,a,o,c,u,h){Ms(t,h++,r),++i[256];for(var l=Fs(i,15),f=l.t,y=l.l,p=Fs(s,15),d=p.t,g=p.l,A=Ns(f),w=A.c,m=A.n,b=Ns(d),k=b.c,E=b.n,v=new os(19),K=0;K<w.length;++K)++v[31&w[K]];for(K=0;K<k.length;++K)++v[31&k[K]];for(var S=Fs(v,7),I=S.t,B=S.l,C=19;C>4&&!I[ls[C-1]];--C);var U,P,D,x,Q=u+5<<3,R=_s(i,vs)+_s(s,Ks)+a,T=_s(i,f)+_s(s,d)+a+14+3*C+_s(v,I)+2*v[16]+3*v[17]+7*v[18];if(c>=0&&Q<=R&&Q<=T)return Hs(t,h,e.subarray(c,c+u));if(Ms(t,h,1+(T<R)),h+=2,T<R){U=Es(f,y,0),P=f,D=Es(d,g,0),x=d;var M=Es(I,B,0);Ms(t,h,m-257),Ms(t,h+5,E-1),Ms(t,h+10,C-4),h+=14;for(K=0;K<C;++K)Ms(t,h+3*K,I[ls[K]]);h+=3*C;for(var L=[w,k],F=0;F<2;++F){var O=L[F];for(K=0;K<O.length;++K){var N=31&O[K];Ms(t,h,M[N]),h+=I[N],N>15&&(Ms(t,h,O[K]>>5&127),h+=O[K]>>12)}}}else U=Ss,P=vs,D=Bs,x=Ks;for(K=0;K<o;++K){var _=n[K];if(_>255){Ls(t,h,U[(N=_>>18&31)+257]),h+=P[N+257],N>7&&(Ms(t,h,_>>23&31),h+=us[N]);var H=31&_;Ls(t,h,D[H]),h+=x[H],H>3&&(Ls(t,h,_>>5&8191),h+=hs[H])}else Ls(t,h,U[_]),h+=P[_]}return Ls(t,h,U[256]),h+P[256]},Gs=/*#__PURE__*/new cs([65540,131080,131088,131104,262176,1048704,1048832,2114560,2117632]),qs=/*#__PURE__*/new as(0),js=function(){var e=1,t=0;return{p:function(r){for(var n=e,i=t,s=0|r.length,a=0;a!=s;){for(var o=Math.min(a+2655,s);a<o;++a)i+=n+=r[a];n=(65535&n)+15*(n>>16),i=(65535&i)+15*(i>>16)}e=n,t=i},d:function(){return(255&(e%=65521))<<24|(65280&e)<<8|(255&(t%=65521))<<8|t>>8}}},Vs=function(e,t,r,n,i){if(!i&&(i={l:1},t.dictionary)){var s=t.dictionary.subarray(-32768),a=new as(s.length+e.length);a.set(s),a.set(e,s.length),e=a,i.w=s.length}return function(e,t,r,n,i,s){var a=s.z||e.length,o=new as(n+a+5*(1+Math.ceil(a/7e3))+i),c=o.subarray(n,o.length-i),u=s.l,h=7&(s.r||0);if(t){h&&(c[0]=s.r>>3);for(var l=Gs[t-1],f=l>>13,y=8191&l,p=(1<<r)-1,d=s.p||new os(32768),g=s.h||new os(p+1),A=Math.ceil(r/3),w=2*A,m=function(t){return(e[t]^e[t+1]<<A^e[t+2]<<w)&p},b=new cs(25e3),k=new os(288),E=new os(32),v=0,K=0,S=s.i||0,I=0,B=s.w||0,C=0;S+2<a;++S){var U=m(S),P=32767&S,D=g[U];if(d[P]=D,g[U]=P,B<=S){var x=a-S;if((v>7e3||I>24576)&&(x>423||!u)){h=zs(e,c,0,b,k,E,K,I,C,S-C,h),I=v=K=0,C=S;for(var Q=0;Q<286;++Q)k[Q]=0;for(Q=0;Q<30;++Q)E[Q]=0}var R=2,T=0,M=y,L=P-D&32767;if(x>2&&U==m(S-L))for(var F=Math.min(f,x)-1,O=Math.min(32767,S),N=Math.min(258,x);L<=O&&--M&&P!=D;){if(e[S+R]==e[S+R-L]){for(var _=0;_<N&&e[S+_]==e[S+_-L];++_);if(_>R){if(R=_,T=L,_>F)break;var H=Math.min(L,_-2),z=0;for(Q=0;Q<H;++Q){var G=S-L+Q&32767,q=G-d[G]&32767;q>z&&(z=q,D=G)}}}L+=(P=D)-(D=d[P])&32767}if(T){b[I++]=268435456|ds[R]<<18|ws[T];var j=31&ds[R],V=31&ws[T];K+=us[j]+hs[V],++k[257+j],++E[V],B=S+R,++v}else b[I++]=e[S],++k[e[S]]}}for(S=Math.max(S,B);S<a;++S)b[I++]=e[S],++k[e[S]];h=zs(e,c,u,b,k,E,K,I,C,S-C,h),u||(s.r=7&h|c[h/8|0]<<3,h-=7,s.h=g,s.p=d,s.i=S,s.w=B)}else{for(S=s.w||0;S<a+u;S+=65535){var Y=S+65535;Y>=a&&(c[h/8|0]=u,Y=a),h=Hs(c,h+1,e.subarray(S,Y))}s.i=a}return Qs(o,0,n+xs(h)+i)}(e,null==t.level?6:t.level,null==t.mem?i.l?Math.ceil(1.5*Math.max(8,Math.min(13,Math.log(e.length)))):20:12+t.mem,r,n,i)},Ys=function(e,t,r){for(;r;++t)e[t]=r,r>>>=8},Zs=/*#__PURE__*/function(){function e(e,t){if("function"==typeof e&&(t=e,e={}),this.ondata=t,this.o=e||{},this.s={l:0,i:32768,w:32768,z:32768},this.b=new as(98304),this.o.dictionary){var r=this.o.dictionary.subarray(-32768);this.b.set(r,32768-r.length),this.s.i=32768-r.length}}return e.prototype.p=function(e,t){this.ondata(Vs(e,this.o,0,0,this.s),t)},e.prototype.push=function(e,t){this.ondata||Ts(5),this.s.l&&Ts(4);var r=e.length+this.s.z;if(r>this.b.length){if(r>2*this.b.length-32768){var n=new as(-32768&r);n.set(this.b.subarray(0,this.s.z)),this.b=n}var i=this.b.length-this.s.z;this.b.set(e.subarray(0,i),this.s.z),this.s.z=this.b.length,this.p(this.b,!1),this.b.set(this.b.subarray(-32768)),this.b.set(e.subarray(i),32768),this.s.z=e.length-i+32768,this.s.i=32766,this.s.w=32768}else this.b.set(e,this.s.z),this.s.z+=e.length;this.s.l=1&t,(this.s.z>this.s.w+8191||t)&&(this.p(this.b,t||!1),this.s.w=this.s.i,this.s.i-=2)},e.prototype.flush=function(){this.ondata||Ts(5),this.s.l&&Ts(4),this.p(this.b,!1),this.s.w=this.s.i,this.s.i-=2},e}(),Js=/*#__PURE__*/function(){function e(e,t){"function"==typeof e&&(t=e,e={}),this.ondata=t;var r=e&&e.dictionary&&e.dictionary.subarray(-32768);this.s={i:0,b:r?r.length:0},this.o=new as(32768),this.p=new as(0),r&&this.o.set(r)}return e.prototype.e=function(e){if(this.ondata||Ts(5),this.d&&Ts(4),this.p.length){if(e.length){var t=new as(this.p.length+e.length);t.set(this.p),t.set(e,this.p.length),this.p=t}}else this.p=e},e.prototype.c=function(e){this.s.i=+(this.d=e||!1);var t=this.s.b,r=function(e,t,r,n){var i=e.length;if(!i||t.f&&!t.l)return r||new as(0);var s=!r,a=s||2!=t.i,o=t.i;s&&(r=new as(3*i));var c=function(e){var t=r.length;if(e>t){var n=new as(Math.max(2*t,e));n.set(r),r=n}},u=t.f||0,h=t.p||0,l=t.b||0,f=t.l,y=t.d,p=t.m,d=t.n,g=8*i;do{if(!f){u=Ps(e,h,1);var A=Ps(e,h+1,3);if(h+=3,!A){var w=e[(U=xs(h)+4)-4]|e[U-3]<<8,m=U+w;if(m>i){o&&Ts(0);break}a&&c(l+w),r.set(e.subarray(U,m),l),t.b=l+=w,t.p=h=8*m,t.f=u;continue}if(1==A)f=Is,y=Cs,p=9,d=5;else if(2==A){var b=Ps(e,h,31)+257,k=Ps(e,h+10,15)+4,E=b+Ps(e,h+5,31)+1;h+=14;for(var v=new as(E),K=new as(19),S=0;S<k;++S)K[ls[S]]=Ps(e,h+3*S,7);h+=3*k;var I=Us(K),B=(1<<I)-1,C=Es(K,I,1);for(S=0;S<E;){var U,P=C[Ps(e,h,B)];if(h+=15&P,(U=P>>4)<16)v[S++]=U;else{var D=0,x=0;for(16==U?(x=3+Ps(e,h,3),h+=2,D=v[S-1]):17==U?(x=3+Ps(e,h,7),h+=3):18==U&&(x=11+Ps(e,h,127),h+=7);x--;)v[S++]=D}}var Q=v.subarray(0,b),R=v.subarray(b);p=Us(Q),d=Us(R),f=Es(Q,p,1),y=Es(R,d,1)}else Ts(1);if(h>g){o&&Ts(0);break}}a&&c(l+131072);for(var T=(1<<p)-1,M=(1<<d)-1,L=h;;L=h){var F=(D=f[Ds(e,h)&T])>>4;if((h+=15&D)>g){o&&Ts(0);break}if(D||Ts(2),F<256)r[l++]=F;else{if(256==F){L=h,f=null;break}var O=F-254;if(F>264){var N=us[S=F-257];O=Ps(e,h,(1<<N)-1)+ps[S],h+=N}var _=y[Ds(e,h)&M],H=_>>4;if(_||Ts(3),h+=15&_,R=As[H],H>3&&(N=hs[H],R+=Ds(e,h)&(1<<N)-1,h+=N),h>g){o&&Ts(0);break}a&&c(l+131072);var z=l+O;if(l<R){var G=0-R,q=Math.min(R,z);for(G+l<0&&Ts(3);l<q;++l)r[l]=n[G+l]}for(;l<z;++l)r[l]=r[l-R]}}t.l=f,t.p=L,t.b=l,t.f=u,f&&(u=1,t.m=p,t.d=y,t.n=d)}while(!u);return l!=r.length&&s?Qs(r,0,l):r.subarray(0,l)}(this.p,this.s,this.o);this.ondata(Qs(r,t,this.s.b),this.d),this.o=Qs(r,this.s.b-32768),this.s.b=this.o.length,this.p=Qs(this.p,this.s.p/8|0),this.s.p&=7},e.prototype.push=function(e,t){this.e(e),this.c(t)},e}(),Xs=/*#__PURE__*/function(){function e(e,t){this.c=js(),this.v=1,Zs.call(this,e,t)}return e.prototype.push=function(e,t){this.c.p(e),Zs.prototype.push.call(this,e,t)},e.prototype.p=function(e,t){var r=Vs(e,this.o,this.v&&(this.o.dictionary?6:2),t&&4,this.s);this.v&&(function(e,t){var r=t.level,n=0==r?0:r<6?1:9==r?3:2;if(e[0]=120,e[1]=n<<6|(t.dictionary&&32),e[1]|=31-(e[0]<<8|e[1])%31,t.dictionary){var i=js();i.p(t.dictionary),Ys(e,2,i.d())}}(r,this.o),this.v=0),t&&Ys(r,r.length-4,this.c.d()),this.ondata(r,t)},e.prototype.flush=function(){Zs.prototype.flush.call(this)},e}(),Ws=/*#__PURE__*/function(){function e(e,t){Js.call(this,e,t),this.v=e&&e.dictionary?2:1}return e.prototype.push=function(e,t){if(Js.prototype.e.call(this,e),this.v){if(this.p.length<6&&!t)return;this.p=this.p.subarray((r=this.p,n=this.v-1,(8!=(15&r[0])||r[0]>>4>7||(r[0]<<8|r[1])%31)&&Ts(6,"invalid zlib data"),(r[1]>>5&1)==+!n&&Ts(6,"invalid zlib data: "+(32&r[1]?"need":"unexpected")+" dictionary"),2+(r[1]>>3&4))),this.v=0}var r,n;t&&(this.p.length<4&&Ts(6,"invalid zlib data"),this.p=this.p.subarray(0,-4)),Js.prototype.c.call(this,t)},e}(),$s="undefined"!=typeof TextDecoder&&/*#__PURE__*/new TextDecoder;try{$s.decode(qs,{stream:!0})}catch(e){}class ea{static get tag(){return R.packet.literalData}constructor(e=new Date){this.format=R.literal.utf8,this.date=L.normalizeDate(e),this.text=null,this.data=null,this.filename=""}setText(e,t=R.literal.utf8){this.format=t,this.text=e,this.data=null}getText(e=!1){return(null===this.text||L.isStream(this.text))&&(this.text=L.decodeUTF8(L.nativeEOL(this.getBytes(e)))),this.text}setBytes(e,t){this.format=t,this.data=e,this.text=null}getBytes(e=!1){return null===this.data&&(this.data=L.canonicalizeEOL(L.encodeUTF8(this.text))),e?S(this.data):this.data}setFilename(e){this.filename=e}getFilename(){return this.filename}async read(e){await v(e,(async e=>{const t=await e.readByte(),r=await e.readByte();this.filename=L.decodeUTF8(await e.readBytes(r)),this.date=L.readDate(await e.readBytes(4));let n=e.remainder();o(n)&&(n=await C(n)),this.setBytes(n,t)}))}writeHeader(){const e=L.encodeUTF8(this.filename),t=new Uint8Array([e.length]),r=new Uint8Array([this.format]),n=L.writeDate(this.date);return L.concatUint8Array([r,t,e,n])}write(){const e=this.writeHeader(),t=this.getBytes();return L.concat([e,t])}}class ta{constructor(){this.bytes=""}read(e){return this.bytes=L.uint8ArrayToString(e.subarray(0,8)),this.bytes.length}write(){return L.stringToUint8Array(this.bytes)}toHex(){return L.uint8ArrayToHex(L.stringToUint8Array(this.bytes))}equals(e,t=!1){return t&&(e.isWildcard()||this.isWildcard())||this.bytes===e.bytes}isNull(){return""===this.bytes}isWildcard(){return/^0+$/.test(this.toHex())}static mapToHex(e){return e.toHex()}static fromID(e){const t=new ta;return t.read(L.hexToUint8Array(e)),t}static wildcard(){const e=new ta;return e.read(new Uint8Array(8)),e}}const ra=Symbol("verified"),na="salt@notations.openpgpjs.org",ia=new Set([R.signatureSubpacket.issuerKeyID,R.signatureSubpacket.issuerFingerprint,R.signatureSubpacket.embeddedSignature]);class sa{static get tag(){return R.packet.signature}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.signatureData=null,this.unhashedSubpackets=[],this.unknownSubpackets=[],this.signedHashValue=null,this.salt=null,this.created=null,this.signatureExpirationTime=null,this.signatureNeverExpires=!0,this.exportable=null,this.trustLevel=null,this.trustAmount=null,this.regularExpression=null,this.revocable=null,this.keyExpirationTime=null,this.keyNeverExpires=null,this.preferredSymmetricAlgorithms=null,this.revocationKeyClass=null,this.revocationKeyAlgorithm=null,this.revocationKeyFingerprint=null,this.issuerKeyID=new ta,this.rawNotations=[],this.notations={},this.preferredHashAlgorithms=null,this.preferredCompressionAlgorithms=null,this.keyServerPreferences=null,this.preferredKeyServer=null,this.isPrimaryUserID=null,this.policyURI=null,this.keyFlags=null,this.signersUserID=null,this.reasonForRevocationFlag=null,this.reasonForRevocationString=null,this.features=null,this.signatureTargetPublicKeyAlgorithm=null,this.signatureTargetHashAlgorithm=null,this.signatureTargetHash=null,this.embeddedSignature=null,this.issuerKeyVersion=null,this.issuerFingerprint=null,this.preferredAEADAlgorithms=null,this.preferredCipherSuites=null,this.revoked=null,this[ra]=null}read(e,t=T){let r=0;if(this.version=e[r++],5===this.version&&!t.enableParsingV5Entities)throw new st("Support for v5 entities is disabled; turn on `config.enableParsingV5Entities` if needed");if(4!==this.version&&5!==this.version&&6!==this.version)throw new st(`Version ${this.version} of the signature packet is unsupported.`);if(this.signatureType=e[r++],this.publicKeyAlgorithm=e[r++],this.hashAlgorithm=e[r++],r+=this.readSubPackets(e.subarray(r,e.length),!0),!this.created)throw Error("Missing signature creation time subpacket.");if(this.signatureData=e.subarray(0,r),r+=this.readSubPackets(e.subarray(r,e.length),!1),this.signedHashValue=e.subarray(r,r+2),r+=2,6===this.version){const t=e[r++];this.salt=e.subarray(r,r+t),r+=t}const n=e.subarray(r,e.length),{read:i,signatureParams:s}=function(e,t){let r=0;switch(e){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.rsaSign:{const e=L.readMPI(t.subarray(r));return r+=e.length+2,{read:r,signatureParams:{s:e}}}case R.publicKey.dsa:case R.publicKey.ecdsa:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));return r+=n.length+2,{read:r,signatureParams:{r:e,s:n}}}case R.publicKey.eddsaLegacy:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));return r+=n.length+2,{read:r,signatureParams:{r:e,s:n}}}case R.publicKey.ed25519:case R.publicKey.ed448:{const n=2*yt(e),i=L.readExactSubarray(t,r,r+n);return r+=i.length,{read:r,signatureParams:{RS:i}}}case R.publicKey.hmac:{const e=new Hn;return r+=e.read(t.subarray(r)),{read:r,signatureParams:{mac:e}}}case R.publicKey.pqc_mldsa_ed25519:{const e=2*yt(R.publicKey.ed25519),n=L.readExactSubarray(t,r,r+e);r+=n.length;const i=L.readExactSubarray(t,r,r+3309);return r+=i.length,{read:r,signatureParams:{eccSignature:n,mldsaSignature:i}}}default:throw new st("Unknown signature algorithm.")}}(this.publicKeyAlgorithm,n);if(i<n.length)throw Error("Error reading MPIs");this.params=s}writeParams(){return this.params instanceof Promise?P((async()=>Hi(this.publicKeyAlgorithm,await this.params))):Hi(this.publicKeyAlgorithm,this.params)}write(){const e=[];return e.push(this.signatureData),e.push(this.writeUnhashedSubPackets()),e.push(this.signedHashValue),6===this.version&&(e.push(new Uint8Array([this.salt.length])),e.push(this.salt)),e.push(this.writeParams()),L.concat(e)}async sign(e,t,r=new Date,n=!1,i){this.version=e.version,this.created=L.normalizeDate(r),this.issuerKeyVersion=e.version,this.issuerFingerprint=e.getFingerprintBytes(),this.issuerKeyID=e.getKeyID();const s=[new Uint8Array([this.version,this.signatureType,this.publicKeyAlgorithm,this.hashAlgorithm])];if(6===this.version){const e=oa(this.hashAlgorithm);if(null===this.salt)this.salt=ye(e);else if(e!==this.salt.length)throw Error("Provided salt does not have the required length")}else if(i.nonDeterministicSignaturesViaNotation){if(0!==this.rawNotations.filter((({name:e})=>e===na)).length)throw Error("Unexpected existing salt notation");{const e=ye(oa(this.hashAlgorithm));this.rawNotations.push({name:na,value:e,humanReadable:!1,critical:!1})}}s.push(this.writeHashedSubPackets()),this.unhashedSubpackets=[],this.signatureData=L.concat(s);const a=this.toHash(this.signatureType,t,n),o=await this.hash(this.signatureType,t,a,n);this.signedHashValue=B(K(o),0,2);const c=async()=>Ji(this.publicKeyAlgorithm,this.hashAlgorithm,e.publicParams,e.privateParams,a,await C(o));L.isStream(o)?this.params=c():(this.params=await c(),this[ra]=!0)}writeHashedSubPackets(){const e=R.signatureSubpacket,t=[];let r;if(null===this.created)throw Error("Missing signature creation time");t.push(aa(e.signatureCreationTime,!0,L.writeDate(this.created))),null!==this.signatureExpirationTime&&t.push(aa(e.signatureExpirationTime,!0,L.writeNumber(this.signatureExpirationTime,4))),null!==this.exportable&&t.push(aa(e.exportableCertification,!0,new Uint8Array([this.exportable?1:0]))),null!==this.trustLevel&&(r=new Uint8Array([this.trustLevel,this.trustAmount]),t.push(aa(e.trustSignature,!0,r))),null!==this.regularExpression&&t.push(aa(e.regularExpression,!0,this.regularExpression)),null!==this.revocable&&t.push(aa(e.revocable,!0,new Uint8Array([this.revocable?1:0]))),null!==this.keyExpirationTime&&t.push(aa(e.keyExpirationTime,!0,L.writeNumber(this.keyExpirationTime,4))),null!==this.preferredSymmetricAlgorithms&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.preferredSymmetricAlgorithms)),t.push(aa(e.preferredSymmetricAlgorithms,!1,r))),null!==this.revocationKeyClass&&(r=new Uint8Array([this.revocationKeyClass,this.revocationKeyAlgorithm]),r=L.concat([r,this.revocationKeyFingerprint]),t.push(aa(e.revocationKey,!1,r))),!this.issuerKeyID.isNull()&&this.issuerKeyVersion<5&&t.push(aa(e.issuerKeyID,!1,this.issuerKeyID.write())),this.rawNotations.forEach((({name:n,value:i,humanReadable:s,critical:a})=>{r=[new Uint8Array([s?128:0,0,0,0])];const o=L.encodeUTF8(n);r.push(L.writeNumber(o.length,2)),r.push(L.writeNumber(i.length,2)),r.push(o),r.push(i),r=L.concat(r),t.push(aa(e.notationData,a,r))})),null!==this.preferredHashAlgorithms&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.preferredHashAlgorithms)),t.push(aa(e.preferredHashAlgorithms,!1,r))),null!==this.preferredCompressionAlgorithms&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.preferredCompressionAlgorithms)),t.push(aa(e.preferredCompressionAlgorithms,!1,r))),null!==this.keyServerPreferences&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.keyServerPreferences)),t.push(aa(e.keyServerPreferences,!1,r))),null!==this.preferredKeyServer&&t.push(aa(e.preferredKeyServer,!1,L.encodeUTF8(this.preferredKeyServer))),null!==this.isPrimaryUserID&&t.push(aa(e.primaryUserID,!1,new Uint8Array([this.isPrimaryUserID?1:0]))),null!==this.policyURI&&t.push(aa(e.policyURI,!1,L.encodeUTF8(this.policyURI))),null!==this.keyFlags&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.keyFlags)),t.push(aa(e.keyFlags,!0,r))),null!==this.signersUserID&&t.push(aa(e.signersUserID,!1,L.encodeUTF8(this.signersUserID))),null!==this.reasonForRevocationFlag&&(r=L.stringToUint8Array(String.fromCharCode(this.reasonForRevocationFlag)+this.reasonForRevocationString),t.push(aa(e.reasonForRevocation,!0,r))),null!==this.features&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.features)),t.push(aa(e.features,!1,r))),null!==this.signatureTargetPublicKeyAlgorithm&&(r=[new Uint8Array([this.signatureTargetPublicKeyAlgorithm,this.signatureTargetHashAlgorithm])],r.push(L.stringToUint8Array(this.signatureTargetHash)),r=L.concat(r),t.push(aa(e.signatureTarget,!0,r))),null!==this.embeddedSignature&&t.push(aa(e.embeddedSignature,!0,this.embeddedSignature.write())),null!==this.issuerFingerprint&&(r=[new Uint8Array([this.issuerKeyVersion]),this.issuerFingerprint],r=L.concat(r),t.push(aa(e.issuerFingerprint,this.version>=5,r))),null!==this.preferredAEADAlgorithms&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.preferredAEADAlgorithms)),t.push(aa(e.preferredAEADAlgorithms,!1,r))),null!==this.preferredCipherSuites&&(r=new Uint8Array([].concat(...this.preferredCipherSuites)),t.push(aa(e.preferredCipherSuites,!1,r)));const n=L.concat(t),i=L.writeNumber(n.length,6===this.version?4:2);return L.concat([i,n])}writeUnhashedSubPackets(){const e=this.unhashedSubpackets.map((({type:e,critical:t,body:r})=>aa(e,t,r))),t=L.concat(e),r=L.writeNumber(t.length,6===this.version?4:2);return L.concat([r,t])}readSubPacket(e,t=!0){let r=0;const n=!!(128&e[r]),i=127&e[r];if(r++,t||(this.unhashedSubpackets.push({type:i,critical:n,body:e.subarray(r,e.length)}),ia.has(i)))switch(i){case R.signatureSubpacket.signatureCreationTime:this.created=L.readDate(e.subarray(r,e.length));break;case R.signatureSubpacket.signatureExpirationTime:{const t=L.readNumber(e.subarray(r,e.length));this.signatureNeverExpires=0===t,this.signatureExpirationTime=t;break}case R.signatureSubpacket.exportableCertification:this.exportable=1===e[r++];break;case R.signatureSubpacket.trustSignature:this.trustLevel=e[r++],this.trustAmount=e[r++];break;case R.signatureSubpacket.regularExpression:this.regularExpression=e[r];break;case R.signatureSubpacket.revocable:this.revocable=1===e[r++];break;case R.signatureSubpacket.keyExpirationTime:{const t=L.readNumber(e.subarray(r,e.length));this.keyExpirationTime=t,this.keyNeverExpires=0===t;break}case R.signatureSubpacket.preferredSymmetricAlgorithms:this.preferredSymmetricAlgorithms=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.revocationKey:this.revocationKeyClass=e[r++],this.revocationKeyAlgorithm=e[r++],this.revocationKeyFingerprint=e.subarray(r,r+20);break;case R.signatureSubpacket.issuerKeyID:if(4===this.version)this.issuerKeyID.read(e.subarray(r,e.length));else if(t)throw Error("Unexpected Issuer Key ID subpacket");break;case R.signatureSubpacket.notationData:{const t=!!(128&e[r]);r+=4;const i=L.readNumber(e.subarray(r,r+2));r+=2;const s=L.readNumber(e.subarray(r,r+2));r+=2;const a=L.decodeUTF8(e.subarray(r,r+i)),o=e.subarray(r+i,r+i+s);this.rawNotations.push({name:a,humanReadable:t,value:o,critical:n}),t&&(this.notations[a]=L.decodeUTF8(o));break}case R.signatureSubpacket.preferredHashAlgorithms:this.preferredHashAlgorithms=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.preferredCompressionAlgorithms:this.preferredCompressionAlgorithms=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.keyServerPreferences:this.keyServerPreferences=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.preferredKeyServer:this.preferredKeyServer=L.decodeUTF8(e.subarray(r,e.length));break;case R.signatureSubpacket.primaryUserID:this.isPrimaryUserID=0!==e[r++];break;case R.signatureSubpacket.policyURI:this.policyURI=L.decodeUTF8(e.subarray(r,e.length));break;case R.signatureSubpacket.keyFlags:this.keyFlags=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.signersUserID:this.signersUserID=L.decodeUTF8(e.subarray(r,e.length));break;case R.signatureSubpacket.reasonForRevocation:this.reasonForRevocationFlag=e[r++],this.reasonForRevocationString=L.decodeUTF8(e.subarray(r,e.length));break;case R.signatureSubpacket.features:this.features=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.signatureTarget:{this.signatureTargetPublicKeyAlgorithm=e[r++],this.signatureTargetHashAlgorithm=e[r++];const t=Re(this.signatureTargetHashAlgorithm);this.signatureTargetHash=L.uint8ArrayToString(e.subarray(r,r+t));break}case R.signatureSubpacket.embeddedSignature:this.embeddedSignature=new sa,this.embeddedSignature.read(e.subarray(r,e.length));break;case R.signatureSubpacket.issuerFingerprint:this.issuerKeyVersion=e[r++],this.issuerFingerprint=e.subarray(r,e.length),this.issuerKeyVersion>=5?this.issuerKeyID.read(this.issuerFingerprint):this.issuerKeyID.read(this.issuerFingerprint.subarray(-8));break;case R.signatureSubpacket.preferredAEADAlgorithms:this.preferredAEADAlgorithms=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.preferredCipherSuites:this.preferredCipherSuites=[];for(let t=r;t<e.length;t+=2)this.preferredCipherSuites.push([e[t],e[t+1]]);break;default:this.unknownSubpackets.push({type:i,critical:n,body:e.subarray(r,e.length)})}}readSubPackets(e,t=!0,r){const n=6===this.version?4:2,i=L.readNumber(e.subarray(0,n));let s=n;for(;s<2+i;){const n=We(e.subarray(s,e.length));s+=n.offset,this.readSubPacket(e.subarray(s,s+n.len),t,r),s+=n.len}return s}toSign(e,t){const r=R.signature;switch(e){case r.binary:return null!==t.text?L.encodeUTF8(t.getText(!0)):t.getBytes(!0);case r.text:{const e=t.getBytes(!0);return L.canonicalizeEOL(e)}case r.standalone:return new Uint8Array(0);case r.certGeneric:case r.certPersona:case r.certCasual:case r.certPositive:case r.certRevocation:{let e,n;if(t.userID)n=180,e=t.userID;else{if(!t.userAttribute)throw Error("Either a userID or userAttribute packet needs to be supplied for certification.");n=209,e=t.userAttribute}const i=e.write();return L.concat([this.toSign(r.key,t),new Uint8Array([n]),L.writeNumber(i.length,4),i])}case r.subkeyBinding:case r.subkeyRevocation:case r.keyBinding:return L.concat([this.toSign(r.key,t),this.toSign(r.key,{key:t.bind})]);case r.key:if(void 0===t.key)throw Error("Key packet is required for this signature.");return t.key.writeForHash(this.version);case r.keyRevocation:return this.toSign(r.key,t);case r.timestamp:return new Uint8Array(0);case r.thirdParty:throw Error("Not implemented");default:throw Error("Unknown signature type.")}}calculateTrailer(e,t){let r=0;return k(K(this.signatureData),(e=>{r+=e.length}),(()=>{const n=[];return 5!==this.version||this.signatureType!==R.signature.binary&&this.signatureType!==R.signature.text||(t?n.push(new Uint8Array(6)):n.push(e.writeHeader())),n.push(new Uint8Array([this.version,255])),5===this.version&&n.push(new Uint8Array(4)),n.push(L.writeNumber(r,4)),L.concat(n)}))}toHash(e,t,r=!1){const n=this.toSign(e,t);return L.concat([this.salt||new Uint8Array,n,this.signatureData,this.calculateTrailer(t,r)])}async hash(e,t,r,n=!1){if(6===this.version&&this.salt.length!==oa(this.hashAlgorithm))throw Error("Signature salt does not have the expected length");return r||(r=this.toHash(e,t,n)),Qe(this.hashAlgorithm,r)}async verify(e,t,r,n=new Date,i=!1,s=T){if(!this.issuerKeyID.equals(e.getKeyID()))throw Error("Signature was not issued by the given public key");if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Public key algorithm used to sign signature does not match issuer key algorithm.");const a=t===R.signature.binary||t===R.signature.text;if(!(this[ra]&&!a)){let n,s;if(this.hashed?s=await this.hashed:(n=this.toHash(t,r,i),s=await this.hash(t,r,n)),s=await C(s),this.signedHashValue[0]!==s[0]||this.signedHashValue[1]!==s[1])throw Error("Signed digest did not match");this.params=await this.params;const a=this.publicKeyAlgorithm===R.publicKey.hmac?e.privateParams:null;if(this[ra]=await Zi(this.publicKeyAlgorithm,this.hashAlgorithm,this.params,e.publicParams,a,n,s),!this[ra])throw Error("Signature verification failed")}const o=L.normalizeDate(n);if(o&&this.created>o)throw Error("Signature creation time is in the future");if(o&&o>=this.getExpirationTime())throw Error("Signature is expired");if(s.rejectHashAlgorithms.has(this.hashAlgorithm))throw Error("Insecure hash algorithm: "+R.read(R.hash,this.hashAlgorithm).toUpperCase());if(s.rejectMessageHashAlgorithms.has(this.hashAlgorithm)&&[R.signature.binary,R.signature.text].includes(this.signatureType))throw Error("Insecure message hash algorithm: "+R.read(R.hash,this.hashAlgorithm).toUpperCase());if(this.unknownSubpackets.forEach((({type:e,critical:t})=>{if(t)throw Error("Unknown critical signature subpacket type "+e)})),this.rawNotations.forEach((({name:e,critical:t})=>{if(t&&s.knownNotations.indexOf(e)<0)throw Error("Unknown critical notation: "+e)})),null!==this.revocationKeyClass)throw Error("This key is intended to be revoked with an authorized key, which OpenPGP.js does not support.")}isExpired(e=new Date){const t=L.normalizeDate(e);return null!==t&&!(this.created<=t&&t<this.getExpirationTime())}getExpirationTime(){return this.signatureNeverExpires?1/0:new Date(this.created.getTime()+1e3*this.signatureExpirationTime)}}function aa(e,t,r){const n=[];return n.push($e(r.length+1)),n.push(new Uint8Array([(t?128:0)|e])),n.push(r),L.concat(n)}function oa(e){switch(e){case R.hash.sha256:return 16;case R.hash.sha384:return 24;case R.hash.sha512:return 32;case R.hash.sha224:case R.hash.sha3_256:return 16;case R.hash.sha3_512:return 32;default:throw Error("Unsupported hash function")}}class ca{static get tag(){return R.packet.onePassSignature}static fromSignaturePacket(e,t){const r=new ca;return r.version=6===e.version?6:3,r.signatureType=e.signatureType,r.hashAlgorithm=e.hashAlgorithm,r.publicKeyAlgorithm=e.publicKeyAlgorithm,r.issuerKeyID=e.issuerKeyID,r.salt=e.salt,r.issuerFingerprint=e.issuerFingerprint,r.flags=t?1:0,r}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.salt=null,this.issuerKeyID=null,this.issuerFingerprint=null,this.flags=null}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new st(`Version ${this.version} of the one-pass signature packet is unsupported.`);if(this.signatureType=e[t++],this.hashAlgorithm=e[t++],this.publicKeyAlgorithm=e[t++],6===this.version){const r=e[t++];this.salt=e.subarray(t,t+r),t+=r,this.issuerFingerprint=e.subarray(t,t+32),t+=32,this.issuerKeyID=new ta,this.issuerKeyID.read(this.issuerFingerprint)}else this.issuerKeyID=new ta,this.issuerKeyID.read(e.subarray(t,t+8)),t+=8;return this.flags=e[t++],this}write(){const e=[new Uint8Array([this.version,this.signatureType,this.hashAlgorithm,this.publicKeyAlgorithm])];return 6===this.version?e.push(new Uint8Array([this.salt.length]),this.salt,this.issuerFingerprint):e.push(this.issuerKeyID.write()),e.push(new Uint8Array([this.flags])),L.concatUint8Array(e)}calculateTrailer(...e){return P((async()=>sa.prototype.calculateTrailer.apply(await this.correspondingSig,e)))}async verify(){const e=await this.correspondingSig;if(!e||e.constructor.tag!==R.packet.signature)throw Error("Corresponding signature packet missing");if(e.signatureType!==this.signatureType||e.hashAlgorithm!==this.hashAlgorithm||e.publicKeyAlgorithm!==this.publicKeyAlgorithm||!e.issuerKeyID.equals(this.issuerKeyID)||3===this.version&&6===e.version||6===this.version&&6!==e.version||6===this.version&&!L.equalsUint8Array(e.issuerFingerprint,this.issuerFingerprint)||6===this.version&&!L.equalsUint8Array(e.salt,this.salt))throw Error("Corresponding signature packet does not match one-pass signature packet");return e.hashed=this.hashed,e.verify.apply(e,arguments)}}function ua(e,t){if(!t[e]){let t;try{t=R.read(R.packet,e)}catch(t){throw new at("Unknown packet type with tag: "+e)}throw Error("Packet not allowed in this context: "+t)}return new t[e]}ca.prototype.hash=sa.prototype.hash,ca.prototype.toHash=sa.prototype.toHash,ca.prototype.toSign=sa.prototype.toSign;class ha extends Array{static async fromBinary(e,t,r=T,n=null,i=!1){const s=new ha;return await s.read(e,t,r,n,i),s}async read(e,t,r=T,n=null,i=!1){let s;r.additionalAllowedPackets.length&&(s=L.constructAllowedPackets(r.additionalAllowedPackets),t={...t,...s}),this.stream=E(e,(async(e,a)=>{const o=D(e),c=x(a);try{let a=L.isStream(e);for(;;){let e,u;if(await c.ready,await it(o,a,(async a=>{try{if(a.tag===R.packet.marker||a.tag===R.packet.trust||a.tag===R.packet.padding)return;const e=ua(a.tag,t);try{n?.recordPacket(a.tag,s)}catch(e){if(r.enforceGrammar)throw e;L.printDebugError(e)}e.packets=new ha,e.fromStream=L.isStream(a.packet),u=e.fromStream;try{await e.read(a.packet,r)}catch(t){if(!(t instanceof st))throw L.wrapError(new ot(`Parsing ${e.constructor.name} failed`),t);throw t}await c.write(e)}catch(t){const n=t instanceof at&&a.tag<=39,s=t instanceof st&&!(t instanceof at)&&!r.ignoreUnsupportedPackets,o=t instanceof ot&&!r.ignoreMalformedPackets,u=nt(a.tag);if(n||s||o||u||!(t instanceof at||t instanceof st||t instanceof ot))i?e=t:await c.abort(t);else{const e=new ct(a.tag,a.packet);await c.write(e)}L.printDebugError(t)}})),u&&(a=null),e)throw await o.readToEnd(),e;const h=await o.peekBytes(2);if(!h||!h.length){try{n?.recordEnd()}catch(e){if(r.enforceGrammar)throw e;L.printDebugError(e)}return await c.ready,void await c.close()}}}catch(e){await c.abort(e)}}));const a=D(this.stream);for(;;){const{done:e,value:t}=await a.read();if(e?this.stream=null:this.push(t),e||nt(t.constructor.tag))break}a.releaseLock()}write(){const e=[];for(let t=0;t<this.length;t++){const r=this[t]instanceof ct?this[t].tag:this[t].constructor.tag,n=this[t].write();if(L.isStream(n)&&nt(this[t].constructor.tag)){let t=[],i=0;const s=512;e.push(tt(r)),e.push(k(n,(e=>{if(t.push(e),i+=e.length,i>=s){const e=Math.min(Math.log(i)/Math.LN2|0,30),r=2**e,n=L.concat([et(e)].concat(t));return t=[n.subarray(1+r)],i=t[0].length,n.subarray(0,1+r)}}),(()=>L.concat([$e(i)].concat(t)))))}else{if(L.isStream(n)){let t=0;e.push(k(K(n),(e=>{t+=e.length}),(()=>rt(r,t))))}else e.push(rt(r,n.length));e.push(n)}}return L.concat(e)}filterByTag(...e){const t=new ha,r=e=>t=>e===t;for(let n=0;n<this.length;n++)e.some(r(this[n].constructor.tag))&&t.push(this[n]);return t}findPacket(e){return this.find((t=>t.constructor.tag===e))}indexOfTag(...e){const t=[],r=this,n=e=>t=>e===t;for(let i=0;i<this.length;i++)e.some(n(r[i].constructor.tag))&&t.push(i);return t}}class la extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,la),this.name="GrammarError"}}var fa;!function(e){e[e.EmptyMessage=0]="EmptyMessage",e[e.PlaintextOrEncryptedData=1]="PlaintextOrEncryptedData",e[e.EncryptedSessionKeys=2]="EncryptedSessionKeys",e[e.StandaloneAdditionalAllowedData=3]="StandaloneAdditionalAllowedData"}(fa||(fa={}));class ya{constructor(){this.state=fa.EmptyMessage,this.leadingOnePassSignatureCounter=0}recordPacket(e,t){switch(this.state){case fa.EmptyMessage:case fa.StandaloneAdditionalAllowedData:switch(e){case R.packet.literalData:case R.packet.compressedData:case R.packet.aeadEncryptedData:case R.packet.symEncryptedIntegrityProtectedData:case R.packet.symmetricallyEncryptedData:return void(this.state=fa.PlaintextOrEncryptedData);case R.packet.signature:if(this.state===fa.StandaloneAdditionalAllowedData&&--this.leadingOnePassSignatureCounter<0)throw new la("Trailing signature packet without OPS");return;case R.packet.onePassSignature:if(this.state===fa.StandaloneAdditionalAllowedData)throw new la("OPS following StandaloneAdditionalAllowedData");return void this.leadingOnePassSignatureCounter++;case R.packet.publicKeyEncryptedSessionKey:case R.packet.symEncryptedSessionKey:return void(this.state=fa.EncryptedSessionKeys);default:if(!t?.[e])throw new la(`Unexpected packet ${e} in state ${this.state}`);return void(this.state=fa.StandaloneAdditionalAllowedData)}case fa.PlaintextOrEncryptedData:if(e===R.packet.signature){if(--this.leadingOnePassSignatureCounter<0)throw new la("Trailing signature packet without OPS");return void(this.state=fa.PlaintextOrEncryptedData)}if(!t?.[e])throw new la(`Unexpected packet ${e} in state ${this.state}`);return void(this.state=fa.PlaintextOrEncryptedData);case fa.EncryptedSessionKeys:switch(e){case R.packet.publicKeyEncryptedSessionKey:case R.packet.symEncryptedSessionKey:return void(this.state=fa.EncryptedSessionKeys);case R.packet.symEncryptedIntegrityProtectedData:case R.packet.aeadEncryptedData:case R.packet.symmetricallyEncryptedData:return void(this.state=fa.PlaintextOrEncryptedData);case R.packet.signature:if(--this.leadingOnePassSignatureCounter<0)throw new la("Trailing signature packet without OPS");return void(this.state=fa.PlaintextOrEncryptedData);default:if(!t?.[e])throw new la(`Unexpected packet ${e} in state ${this.state}`);this.state=fa.EncryptedSessionKeys}}}recordEnd(){switch(this.state){case fa.EmptyMessage:case fa.PlaintextOrEncryptedData:case fa.EncryptedSessionKeys:case fa.StandaloneAdditionalAllowedData:if(this.leadingOnePassSignatureCounter>0)throw new la("Missing trailing signature packets")}}}const pa=/*#__PURE__*/L.constructAllowedPackets([ea,ca,sa]);class da{static get tag(){return R.packet.compressedData}constructor(e=T){this.packets=null,this.algorithm=e.preferredCompressionAlgorithm,this.compressed=null}async read(e,t=T){await v(e,(async e=>{this.algorithm=await e.readByte(),this.compressed=e.remainder(),await this.decompress(t)}))}write(){return null===this.compressed&&this.compress(),L.concat([new Uint8Array([this.algorithm]),this.compressed])}async decompress(e=T){const t=R.read(R.compression,this.algorithm),r=ba[t];if(!r)throw Error(t+" decompression not supported");this.packets=await ha.fromBinary(await r(this.compressed),pa,e,new ya)}compress(){const e=R.read(R.compression,this.algorithm),t=ma[e];if(!t)throw Error(e+" compression not supported");this.compressed=t(this.packets.write())}}function ga(e,t){return r=>{if(!L.isStream(r)||o(r))return P((()=>C(r).then((e=>new Promise(((r,n)=>{const i=new t;i.ondata=e=>{r(e)};try{i.push(e,!0)}catch(e){n(e)}}))))));if(e)try{const t=e();return r.pipeThrough(t)}catch(e){if("TypeError"!==e.name)throw e}const n=r.getReader(),i=new t;return new ReadableStream({async start(e){for(i.ondata=async(t,r)=>{e.enqueue(t),r&&e.close()};;){const{done:e,value:t}=await n.read();if(e)return void i.push(new Uint8Array,!0);t.length&&i.push(t)}}})}}function Aa(){return async function(e){const{decode:t}=await Promise.resolve().then((function(){return vd}));return P((async()=>t(await C(e))))}}const wa=e=>({compressor:"undefined"!=typeof CompressionStream&&(()=>new CompressionStream(e)),decompressor:"undefined"!=typeof DecompressionStream&&(()=>new DecompressionStream(e))}),ma={zip:/*#__PURE__*/ga(wa("deflate-raw").compressor,Zs),zlib:/*#__PURE__*/ga(wa("deflate").compressor,Xs)},ba={uncompressed:e=>e,zip:/*#__PURE__*/ga(wa("deflate-raw").decompressor,Js),zlib:/*#__PURE__*/ga(wa("deflate").decompressor,Ws),bzip2:/*#__PURE__*/Aa()},ka=/*#__PURE__*/L.constructAllowedPackets([ea,da,ca,sa]);class Ea{static get tag(){return R.packet.symEncryptedIntegrityProtectedData}static fromObject({version:e,aeadAlgorithm:t}){if(1!==e&&2!==e)throw Error("Unsupported SEIPD version");const r=new Ea;return r.version=e,2===e&&(r.aeadAlgorithm=t),r}constructor(){this.version=null,this.cipherAlgorithm=null,this.aeadAlgorithm=null,this.chunkSizeByte=null,this.salt=null,this.encrypted=null,this.packets=null}async read(e){await v(e,(async e=>{if(this.version=await e.readByte(),1!==this.version&&2!==this.version)throw new st(`Version ${this.version} of the SEIP packet is unsupported.`);2===this.version&&(this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte(),this.salt=await e.readBytes(32)),this.encrypted=e.remainder()}))}write(){return 2===this.version?L.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.salt,this.encrypted]):L.concat([new Uint8Array([this.version]),this.encrypted])}async encrypt(e,t,r=T){const{blockSize:n,keySize:i}=Sr(e);if(t.length!==i)throw Error("Unexpected session key size");let s=this.packets.write();if(o(s)&&(s=await C(s)),2===this.version)this.cipherAlgorithm=e,this.salt=ye(32),this.chunkSizeByte=r.aeadChunkSizeByte,this.encrypted=await va(this,"encrypt",t,s);else{const r=await $n(e),i=new Uint8Array([211,20]),a=L.concat([r,s,i]),o=await Qe(R.hash.sha1,S(a)),c=L.concat([a,o]);this.encrypted=await ei(e,t,c,new Uint8Array(n))}return!0}async decrypt(e,t,r=T){if(t.length!==Sr(e).keySize)throw Error("Unexpected session key size");let n,i=K(this.encrypted);o(i)&&(i=await C(i));let s=!1;if(2===this.version){if(this.cipherAlgorithm!==e)throw Error("Unexpected session key algorithm");n=await va(this,"decrypt",t,i)}else{const{blockSize:a}=Sr(e),o=await ti(e,t,i,new Uint8Array(a)),c=B(S(o),-20),u=B(o,0,-20),h=Promise.all([C(await Qe(R.hash.sha1,S(u))),C(c)]).then((([e,t])=>{if(!L.equalsUint8Array(e,t))throw Error("Modification detected.");return new Uint8Array})),l=B(u,a+2);n=B(l,0,-2),n=A([n,P((()=>h))]),L.isStream(i)&&r.allowUnauthenticatedStream?s=!0:n=await C(n)}return this.packets=await ha.fromBinary(n,ka,r,new ya,s),!0}}async function va(e,t,r,n){const i=e instanceof Ea&&2===e.version,s=!i&&e.constructor.tag===R.packet.aeadEncryptedData;if(!i&&!s)throw Error("Unexpected packet type");const a=Fi(e.aeadAlgorithm,s),o="decrypt"===t?a.tagLength:0,c="encrypt"===t?a.tagLength:0,u=2**(e.chunkSizeByte+6)+o,h=s?8:0,l=new ArrayBuffer(13+h),f=new Uint8Array(l,0,5+h),y=new Uint8Array(l),p=new DataView(l),d=new Uint8Array(l,5,8);f.set([192|e.constructor.tag,e.version,e.cipherAlgorithm,e.aeadAlgorithm,e.chunkSizeByte],0);let g,A,m=0,b=Promise.resolve(),k=0,v=0;if(i){const{keySize:t}=Sr(e.cipherAlgorithm),{ivLength:n}=a,i=new Uint8Array(l,0,5),s=await Ur(R.hash.sha256,r,e.salt,i,t+n);r=s.subarray(0,t),g=s.subarray(t),g.fill(0,g.length-8),A=new DataView(g.buffer,g.byteOffset,g.byteLength)}else g=e.iv;const K=await a(e.cipherAlgorithm,r);return E(n,(async(r,n)=>{if("array"!==L.isStream(r)){const t=new TransformStream({},{highWaterMark:L.getHardwareConcurrency()*2**(e.chunkSizeByte+6),size:e=>e.length});w(t.readable,n),n=t.writable}const s=D(r),a=x(n);try{for(;;){let e=await s.readBytes(u+o)||new Uint8Array;const r=e.subarray(e.length-o);let n,l,w;if(e=e.subarray(0,e.length-o),i)w=g;else{w=g.slice();for(let e=0;e<8;e++)w[g.length-8+e]^=d[e]}if(!m||e.length?(s.unshift(r),n=K[t](e,w,f),n.catch((()=>{})),v+=e.length-o+c):(p.setInt32(5+h+4,k),n=K[t](r,w,y),n.catch((()=>{})),v+=c,l=!0),k+=e.length-o,b=b.then((()=>n)).then((async e=>{await a.ready,await a.write(e),v-=e.length})).catch((e=>a.abort(e))),(l||v>a.desiredSize)&&await b,l){await a.close();break}i?A.setInt32(g.length-4,++m):p.setInt32(9,++m)}}catch(e){await a.ready.catch((()=>{})),await a.abort(e)}}))}const Ka=/*#__PURE__*/L.constructAllowedPackets([ea,da,ca,sa]);class Sa{static get tag(){return R.packet.aeadEncryptedData}constructor(){this.version=1,this.cipherAlgorithm=null,this.aeadAlgorithm=R.aead.eax,this.chunkSizeByte=null,this.iv=null,this.encrypted=null,this.packets=null}async read(e){await v(e,(async e=>{const t=await e.readByte();if(1!==t)throw new st(`Version ${t} of the AEAD-encrypted data packet is not supported.`);this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte();const r=Fi(this.aeadAlgorithm,!0);this.iv=await e.readBytes(r.ivLength),this.encrypted=e.remainder()}))}write(){return L.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.iv,this.encrypted])}async decrypt(e,t,r=T){this.packets=await ha.fromBinary(await va(this,"decrypt",t,K(this.encrypted)),Ka,r,new ya)}async encrypt(e,t,r=T){this.cipherAlgorithm=e;const{ivLength:n}=Fi(this.aeadAlgorithm,!0);this.iv=ye(n),this.chunkSizeByte=r.aeadChunkSizeByte;const i=this.packets.write();this.encrypted=await va(this,"encrypt",t,i)}}const Ia=new Set([R.publicKey.x25519,R.publicKey.x448,R.publicKey.pqc_mlkem_x25519]);class Ba{static get tag(){return R.packet.publicKeyEncryptedSessionKey}constructor(){this.version=null,this.publicKeyID=new ta,this.publicKeyVersion=null,this.publicKeyFingerprint=null,this.publicKeyAlgorithm=null,this.sessionKey=null,this.sessionKeyAlgorithm=null,this.encrypted={}}static fromObject({version:e,encryptionKeyPacket:t,anonymousRecipient:r,sessionKey:n,sessionKeyAlgorithm:i}){const s=new Ba;if(3!==e&&6!==e)throw Error("Unsupported PKESK version");return s.version=e,6===e&&(s.publicKeyVersion=r?null:t.version,s.publicKeyFingerprint=r?null:t.getFingerprintBytes()),s.publicKeyID=r?ta.wildcard():t.getKeyID(),s.publicKeyAlgorithm=t.algorithm,s.sessionKey=n,s.sessionKeyAlgorithm=i,s}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new st(`Version ${this.version} of the PKESK packet is unsupported.`);if(6===this.version){const r=e[t++];if(r){this.publicKeyVersion=e[t++];const n=r-1;this.publicKeyFingerprint=e.subarray(t,t+n),t+=n,this.publicKeyVersion>=5?this.publicKeyID.read(this.publicKeyFingerprint):this.publicKeyID.read(this.publicKeyFingerprint.subarray(-8))}else this.publicKeyID=ta.wildcard()}else t+=this.publicKeyID.read(e.subarray(t,t+8));if(this.publicKeyAlgorithm=e[t++],this.encrypted=function(e,t){let r=0;switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:return{c:L.readMPI(t.subarray(r))};case R.publicKey.elgamal:{const e=L.readMPI(t.subarray(r));return r+=e.length+2,{c1:e,c2:L.readMPI(t.subarray(r))}}case R.publicKey.ecdh:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=new _n;return n.read(t.subarray(r)),{V:e,C:n}}case R.publicKey.x25519:case R.publicKey.x448:{const n=Yi(e),i=L.readExactSubarray(t,r,r+n);r+=i.length;const s=new Yn;return s.read(t.subarray(r)),{ephemeralPublicKey:i,C:s}}case R.publicKey.aead:{const e=new qn;r+=e.read(t.subarray(r));const{ivLength:n}=Fi(e.getValue()),i=t.subarray(r,r+n);r+=n;const s=new Hn;return r+=s.read(t.subarray(r)),{aeadMode:e,iv:i,c:s}}case R.publicKey.pqc_mlkem_x25519:{const e=L.readExactSubarray(t,r,r+Yi(R.publicKey.x25519));r+=e.length;const n=L.readExactSubarray(t,r,r+1088);r+=n.length;const i=new Yn;return i.read(t.subarray(r)),{eccCipherText:e,mlkemCipherText:n,C:i}}default:throw new st("Unknown public key encryption algorithm.")}}(this.publicKeyAlgorithm,e.subarray(t)),Ia.has(this.publicKeyAlgorithm))if(3===this.version)this.sessionKeyAlgorithm=R.write(R.symmetric,this.encrypted.C.algorithm);else if(null!==this.encrypted.C.algorithm)throw Error("Unexpected cleartext symmetric algorithm")}write(){const e=[new Uint8Array([this.version])];return 6===this.version?null!==this.publicKeyFingerprint?(e.push(new Uint8Array([this.publicKeyFingerprint.length+1,this.publicKeyVersion])),e.push(this.publicKeyFingerprint)):e.push(new Uint8Array([0])):e.push(this.publicKeyID.write()),e.push(new Uint8Array([this.publicKeyAlgorithm]),Hi(this.publicKeyAlgorithm,this.encrypted)),L.concatUint8Array(e)}async encrypt(e){const t=R.write(R.publicKey,this.publicKeyAlgorithm),r=3===this.version?this.sessionKeyAlgorithm:null,n=5===e.version?e.getFingerprintBytes().subarray(0,20):e.getFingerprintBytes(),i=Ca(this.version,t,r,this.sessionKey),s=t===R.publicKey.aead?e.privateParams:null;this.encrypted=await Oi(t,r,e.publicParams,s,i,n)}async decrypt(e,t){if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Decryption error");const r=t?Ca(this.version,this.publicKeyAlgorithm,t.sessionKeyAlgorithm,t.sessionKey):null,n=5===e.version?e.getFingerprintBytes().subarray(0,20):e.getFingerprintBytes(),i=await Ni(this.publicKeyAlgorithm,e.publicParams,e.privateParams,this.encrypted,n,r),{sessionKey:s,sessionKeyAlgorithm:a}=function(e,t,r,n){switch(t){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.elgamal:case R.publicKey.ecdh:case R.publicKey.aead:{const t=r.subarray(0,r.length-2),i=r.subarray(r.length-2),s=L.writeChecksum(t.subarray(t.length%8)),a=s[0]===i[0]&s[1]===i[1],o=6===e?{sessionKeyAlgorithm:null,sessionKey:t}:{sessionKeyAlgorithm:t[0],sessionKey:t.subarray(1)};if(n){const t=a&o.sessionKeyAlgorithm===n.sessionKeyAlgorithm&o.sessionKey.length===n.sessionKey.length;return{sessionKey:L.selectUint8Array(t,o.sessionKey,n.sessionKey),sessionKeyAlgorithm:6===e?null:L.selectUint8(t,o.sessionKeyAlgorithm,n.sessionKeyAlgorithm)}}if(a&&(6===e||R.read(R.symmetric,o.sessionKeyAlgorithm)))return o;throw Error("Decryption error")}case R.publicKey.x25519:case R.publicKey.x448:case R.publicKey.pqc_mlkem_x25519:return{sessionKeyAlgorithm:null,sessionKey:r};default:throw Error("Unsupported public key algorithm")}}(this.version,this.publicKeyAlgorithm,i,t);if(3===this.version){const e=!Ia.has(this.publicKeyAlgorithm);if(this.sessionKeyAlgorithm=e?a:this.sessionKeyAlgorithm,s.length!==Sr(this.sessionKeyAlgorithm).keySize)throw Error("Unexpected session key size")}this.sessionKey=s}}function Ca(e,t,r,n){switch(t){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.elgamal:case R.publicKey.ecdh:case R.publicKey.aead:return L.concatUint8Array([new Uint8Array(6===e?[]:[r]),n,L.writeChecksum(n.subarray(n.length%8))]);case R.publicKey.x25519:case R.publicKey.x448:case R.publicKey.pqc_mlkem_x25519:return n;default:throw Error("Unsupported public key algorithm")}}class Ua{static get tag(){return R.packet.symEncryptedSessionKey}constructor(e=T){this.version=e.aeadProtect?6:4,this.sessionKey=null,this.sessionKeyEncryptionAlgorithm=null,this.sessionKeyAlgorithm=null,this.aeadAlgorithm=R.write(R.aead,e.preferredAEADAlgorithm),this.encrypted=null,this.s2k=null,this.iv=null}read(e){let t=0;if(this.version=e[t++],4!==this.version&&5!==this.version&&6!==this.version)throw new st(`Version ${this.version} of the SKESK packet is unsupported.`);6===this.version&&t++;const r=e[t++];this.version>=5&&(this.aeadAlgorithm=e[t++],6===this.version&&t++);const n=e[t++];if(this.s2k=is(n),t+=this.s2k.read(e.subarray(t,e.length)),this.version>=5){const r=Fi(this.aeadAlgorithm,!0);this.iv=e.subarray(t,t+=r.ivLength)}this.version>=5||t<e.length?(this.encrypted=e.subarray(t,e.length),this.sessionKeyEncryptionAlgorithm=r):this.sessionKeyAlgorithm=r}write(){const e=null===this.encrypted?this.sessionKeyAlgorithm:this.sessionKeyEncryptionAlgorithm;let t;const r=this.s2k.write();if(6===this.version){const n=r.length,i=3+n+this.iv.length;t=L.concatUint8Array([new Uint8Array([this.version,i,e,this.aeadAlgorithm,n]),r,this.iv,this.encrypted])}else 5===this.version?t=L.concatUint8Array([new Uint8Array([this.version,e,this.aeadAlgorithm]),r,this.iv,this.encrypted]):(t=L.concatUint8Array([new Uint8Array([this.version,e]),r]),null!==this.encrypted&&(t=L.concatUint8Array([t,this.encrypted])));return t}async decrypt(e){const t=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm,{blockSize:r,keySize:n}=Sr(t),i=await this.s2k.produceKey(e,n);if(this.version>=5){const e=Fi(this.aeadAlgorithm,!0),r=new Uint8Array([192|Ua.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),s=6===this.version?await Ur(R.hash.sha256,i,new Uint8Array,r,n):i,a=await e(t,s);this.sessionKey=await a.decrypt(this.encrypted,this.iv,r)}else if(null!==this.encrypted){const e=await ti(t,i,this.encrypted,new Uint8Array(r));if(this.sessionKeyAlgorithm=R.write(R.symmetric,e[0]),this.sessionKey=e.subarray(1,e.length),this.sessionKey.length!==Sr(this.sessionKeyAlgorithm).keySize)throw Error("Unexpected session key size")}else this.sessionKey=i}async encrypt(e,t=T){const r=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm;this.sessionKeyEncryptionAlgorithm=r,this.s2k=ss(t),this.s2k.generateSalt();const{blockSize:n,keySize:i}=Sr(r),s=await this.s2k.produceKey(e,i);if(null===this.sessionKey&&(this.sessionKey=ji(this.sessionKeyAlgorithm)),this.version>=5){const e=Fi(this.aeadAlgorithm);this.iv=ye(e.ivLength);const t=new Uint8Array([192|Ua.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),n=6===this.version?await Ur(R.hash.sha256,s,new Uint8Array,t,i):s,a=await e(r,n);this.encrypted=await a.encrypt(this.sessionKey,this.iv,t)}else{const e=L.concatUint8Array([new Uint8Array([this.sessionKeyAlgorithm]),this.sessionKey]);this.encrypted=await ei(r,s,e,new Uint8Array(n))}}}class Pa{static get tag(){return R.packet.publicKey}constructor(e=new Date,t=T){this.version=t.v6Keys?6:4,this.created=L.normalizeDate(e),this.algorithm=null,this.publicParams=null,this.expirationTimeV3=0,this.fingerprint=null,this.keyID=null}static fromSecretKeyPacket(e){const t=new Pa,{version:r,created:n,algorithm:i,publicParams:s,keyID:a,fingerprint:o}=e;return t.version=r,t.created=n,t.algorithm=i,t.publicParams=s,t.keyID=a,t.fingerprint=o,t}async read(e,t=T){let r=0;if(this.version=e[r++],5===this.version&&!t.enableParsingV5Entities)throw new st("Support for parsing v5 entities is disabled; turn on `config.enableParsingV5Entities` if needed");if(4===this.version||5===this.version||6===this.version){this.created=L.readDate(e.subarray(r,r+4)),r+=4,this.algorithm=e[r++],this.version>=5&&(r+=4);const{read:t,publicParams:n}=function(e,t){let r=0;switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));return r+=n.length+2,{read:r,publicParams:{n:e,e:n}}}case R.publicKey.dsa:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));r+=n.length+2;const i=L.readMPI(t.subarray(r));r+=i.length+2;const s=L.readMPI(t.subarray(r));return r+=s.length+2,{read:r,publicParams:{p:e,q:n,g:i,y:s}}}case R.publicKey.elgamal:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));r+=n.length+2;const i=L.readMPI(t.subarray(r));return r+=i.length+2,{read:r,publicParams:{p:e,g:n,y:i}}}case R.publicKey.ecdsa:{const e=new Xe;r+=e.read(t),Vi(e);const n=L.readMPI(t.subarray(r));return r+=n.length+2,{read:r,publicParams:{oid:e,Q:n}}}case R.publicKey.eddsaLegacy:{const e=new Xe;if(r+=e.read(t),Vi(e),e.getName()!==R.curve.ed25519Legacy)throw Error("Unexpected OID for eddsaLegacy");let n=L.readMPI(t.subarray(r));return r+=n.length+2,n=L.leftPad(n,33),{read:r,publicParams:{oid:e,Q:n}}}case R.publicKey.ecdh:{const e=new Xe;r+=e.read(t),Vi(e);const n=L.readMPI(t.subarray(r));r+=n.length+2;const i=new zn;return r+=i.read(t.subarray(r)),{read:r,publicParams:{oid:e,Q:n,kdfParams:i}}}case R.publicKey.ed25519:case R.publicKey.ed448:case R.publicKey.x25519:case R.publicKey.x448:{const n=L.readExactSubarray(t,r,r+Yi(e));return r+=n.length,{read:r,publicParams:{A:n}}}case R.publicKey.hmac:case R.publicKey.aead:{const e=new jn;r+=e.read(t);const n=Re(R.hash.sha256),i=t.subarray(r,r+n);return r+=n,{read:r,publicParams:{cipher:e,digest:i}}}case R.publicKey.pqc_mlkem_x25519:{const e=L.readExactSubarray(t,r,r+Yi(R.publicKey.x25519));r+=e.length;const n=L.readExactSubarray(t,r,r+1184);return r+=n.length,{read:r,publicParams:{eccPublicKey:e,mlkemPublicKey:n}}}case R.publicKey.pqc_mldsa_ed25519:{const e=L.readExactSubarray(t,r,r+Yi(R.publicKey.ed25519));r+=e.length;const n=L.readExactSubarray(t,r,r+1952);return r+=n.length,{read:r,publicParams:{eccPublicKey:e,mldsaPublicKey:n}}}default:throw new st("Unknown public key encryption algorithm.")}}(this.algorithm,e.subarray(r));if(6===this.version&&n.oid&&(n.oid.getName()===R.curve.curve25519Legacy||n.oid.getName()===R.curve.ed25519Legacy))throw Error("Legacy curve25519 cannot be used with v6 keys");if(6!==this.version&&this.algorithm===R.publicKey.pqc_mldsa_ed25519)throw Error("Unexpected key version: ML-DSA algorithms can only be used with v6 keys");return this.publicParams=n,r+=t,await this.computeFingerprintAndKeyID(),r}throw new st(`Version ${this.version} of the key packet is unsupported.`)}write(){const e=[];e.push(new Uint8Array([this.version])),e.push(L.writeDate(this.created)),e.push(new Uint8Array([this.algorithm]));const t=Hi(this.algorithm,this.publicParams);return this.version>=5&&e.push(L.writeNumber(t.length,4)),e.push(t),L.concatUint8Array(e)}writeForHash(e){const t=this.writePublicKey(),r=149+e,n=e>=5?4:2;return L.concatUint8Array([new Uint8Array([r]),L.writeNumber(t.length,n),t])}isDecrypted(){return null}getCreationTime(){return this.created}getKeyID(){return this.keyID}async computeFingerprintAndKeyID(){if(await this.computeFingerprint(),this.keyID=new ta,this.version>=5)this.keyID.read(this.fingerprint.subarray(0,8));else{if(4!==this.version)throw Error("Unsupported key version");this.keyID.read(this.fingerprint.subarray(12,20))}}async computeFingerprint(){const e=this.writeForHash(this.version);if(this.version>=5)this.fingerprint=await Qe(R.hash.sha256,e);else{if(4!==this.version)throw Error("Unsupported key version");this.fingerprint=await Qe(R.hash.sha1,e)}}getFingerprintBytes(){return this.fingerprint}getFingerprint(){return L.uint8ArrayToHex(this.getFingerprintBytes())}hasSameFingerprintAs(e){return this.version===e.version&&L.equalsUint8Array(this.writePublicKey(),e.writePublicKey())}getAlgorithmInfo(){const e={};e.algorithm=R.read(R.publicKey,this.algorithm);const t=this.publicParams.n||this.publicParams.p;return t?e.bits=L.uint8ArrayBitLength(t):this.publicParams.oid?e.curve=this.publicParams.oid.getName():this.publicParams.cipher&&(e.symmetric=this.publicParams.cipher.getName()),e}}Pa.prototype.readPublicKey=Pa.prototype.read,Pa.prototype.writePublicKey=Pa.prototype.write;const Da=/*#__PURE__*/L.constructAllowedPackets([ea,da,ca,sa]);class xa{static get tag(){return R.packet.symmetricallyEncryptedData}constructor(){this.encrypted=null,this.packets=null}read(e){this.encrypted=e}write(){return this.encrypted}async decrypt(e,t,r=T){if(!r.allowUnauthenticatedMessages)throw Error("Message is not authenticated.");const{blockSize:n}=Sr(e),i=await C(K(this.encrypted)),s=await ti(e,t,i.subarray(n+2),i.subarray(2,n+2));this.packets=await ha.fromBinary(s,Da,r)}async encrypt(e,t,r=T){const n=this.packets.write(),{blockSize:i}=Sr(e),s=await $n(e),a=await ei(e,t,s,new Uint8Array(i)),o=await ei(e,t,n,a.subarray(2));this.encrypted=L.concat([a,o])}}class Qa extends Pa{static get tag(){return R.packet.publicSubkey}constructor(e,t){super(e,t)}static fromSecretSubkeyPacket(e){const t=new Qa,{version:r,created:n,algorithm:i,publicParams:s,keyID:a,fingerprint:o}=e;return t.version=r,t.created=n,t.algorithm=i,t.publicParams=s,t.keyID=a,t.fingerprint=o,t}}class Ra{static get tag(){return R.packet.userAttribute}constructor(){this.attributes=[]}read(e){let t=0;for(;t<e.length;){const r=We(e.subarray(t,e.length));t+=r.offset,this.attributes.push(L.uint8ArrayToString(e.subarray(t,t+r.len))),t+=r.len}}write(){const e=[];for(let t=0;t<this.attributes.length;t++)e.push($e(this.attributes[t].length)),e.push(L.stringToUint8Array(this.attributes[t]));return L.concatUint8Array(e)}equals(e){return!!(e&&e instanceof Ra)&&this.attributes.every((function(t,r){return t===e.attributes[r]}))}}class Ta extends Pa{static get tag(){return R.packet.secretKey}constructor(e=new Date,t=T){super(e,t),this.keyMaterial=null,this.isEncrypted=null,this.s2kUsage=0,this.s2k=null,this.symmetric=null,this.aead=null,this.isLegacyAEAD=null,this.privateParams=null,this.usedModernAEAD=null}async read(e,t=T){let r=await this.readPublicKey(e,t);const n=r;this.s2kUsage=e[r++],5===this.version&&r++,6===this.version&&this.s2kUsage&&r++;try{if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){this.symmetric=e[r++],253===this.s2kUsage&&(this.aead=e[r++]),6===this.version&&r++;const t=e[r++];if(this.s2k=is(t),r+=this.s2k.read(e.subarray(r,e.length)),"gnu-dummy"===this.s2k.type)return}else this.s2kUsage&&(this.symmetric=this.s2kUsage);this.s2kUsage&&(this.isLegacyAEAD=253===this.s2kUsage&&(5===this.version||4===this.version&&t.parseAEADEncryptedV4KeysAsLegacy),253!==this.s2kUsage||this.isLegacyAEAD?(this.iv=e.subarray(r,r+Sr(this.symmetric).blockSize),this.usedModernAEAD=!1):(this.iv=e.subarray(r,r+Fi(this.aead).ivLength),this.usedModernAEAD=!0),r+=this.iv.length)}catch(t){if(!this.s2kUsage)throw t;this.unparseableKeyMaterial=e.subarray(n),this.isEncrypted=!0}if(5===this.version&&(r+=4),this.keyMaterial=e.subarray(r),this.isEncrypted=!!this.s2kUsage,!this.isEncrypted){let e;if(6===this.version)e=this.keyMaterial;else if(e=this.keyMaterial.subarray(0,-2),!L.equalsUint8Array(L.writeChecksum(e),this.keyMaterial.subarray(-2)))throw Error("Key checksum mismatch");try{const{read:t,privateParams:r}=await _i(this.algorithm,e,this.publicParams);if(t<e.length)throw Error("Error reading MPIs");this.privateParams=r}catch(e){if(e instanceof st)throw e;throw Error("Error reading MPIs")}}}write(){const e=this.writePublicKey();if(this.unparseableKeyMaterial)return L.concatUint8Array([e,this.unparseableKeyMaterial]);const t=[e];t.push(new Uint8Array([this.s2kUsage]));const r=[];if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){r.push(this.symmetric),253===this.s2kUsage&&r.push(this.aead);const e=this.s2k.write();6===this.version&&r.push(e.length),r.push(...e)}return this.s2kUsage&&"gnu-dummy"!==this.s2k.type&&r.push(...this.iv),(5===this.version||6===this.version&&this.s2kUsage)&&t.push(new Uint8Array([r.length])),t.push(new Uint8Array(r)),this.isDummy()||(this.s2kUsage||(this.keyMaterial=Hi(this.algorithm,this.privateParams)),5===this.version&&t.push(L.writeNumber(this.keyMaterial.length,4)),t.push(this.keyMaterial),this.s2kUsage||6===this.version||t.push(L.writeChecksum(this.keyMaterial))),L.concatUint8Array(t)}isDecrypted(){return!1===this.isEncrypted}isMissingSecretKeyMaterial(){return void 0!==this.unparseableKeyMaterial||this.isDummy()}isDummy(){return!(!this.s2k||"gnu-dummy"!==this.s2k.type)}makeDummy(e=T){this.isDummy()||(this.isDecrypted()&&this.clearPrivateParams(),delete this.unparseableKeyMaterial,this.isEncrypted=null,this.keyMaterial=null,this.s2k=is(R.s2k.gnu,e),this.s2k.algorithm=0,this.s2k.c=0,this.s2k.type="gnu-dummy",this.s2kUsage=254,this.symmetric=R.symmetric.aes256,this.isLegacyAEAD=null,this.usedModernAEAD=null)}async encrypt(e,t=T){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key packet is already encrypted");if(!e)throw Error("A non-empty passphrase is required for key encryption.");this.s2k=ss(t),this.s2k.generateSalt();const r=Hi(this.algorithm,this.privateParams);this.symmetric=R.symmetric.aes256;const{blockSize:n}=Sr(this.symmetric);if(t.aeadProtect){this.s2kUsage=253,this.aead=t.preferredAEADAlgorithm;const i=Fi(this.aead);this.isLegacyAEAD=5===this.version,this.usedModernAEAD=!this.isLegacyAEAD;const s=tt(this.constructor.tag),a=await Ma(this.version,this.s2k,e,this.symmetric,this.aead,s,this.isLegacyAEAD),o=await i(this.symmetric,a);this.iv=this.isLegacyAEAD?ye(n):ye(i.ivLength);const c=this.isLegacyAEAD?new Uint8Array:L.concatUint8Array([s,this.writePublicKey()]);this.keyMaterial=await o.encrypt(r,this.iv.subarray(0,i.ivLength),c)}else{this.s2kUsage=254,this.usedModernAEAD=!1;const t=await Ma(this.version,this.s2k,e,this.symmetric);this.iv=ye(n),this.keyMaterial=await ei(this.symmetric,t,L.concatUint8Array([r,await Qe(R.hash.sha1,r)]),this.iv)}}async decrypt(e){if(this.isDummy())return!1;if(this.unparseableKeyMaterial)throw Error("Key packet cannot be decrypted: unsupported S2K or cipher algo");if(this.isDecrypted())throw Error("Key packet is already decrypted.");let t;const r=tt(this.constructor.tag);if(254!==this.s2kUsage&&253!==this.s2kUsage)throw 255===this.s2kUsage?Error("Encrypted private key is authenticated using an insecure two-byte hash"):Error("Private key is encrypted using an insecure S2K function: unsalted MD5");let n;if(t=await Ma(this.version,this.s2k,e,this.symmetric,this.aead,r,this.isLegacyAEAD),253===this.s2kUsage){const e=Fi(this.aead,!0),i=await e(this.symmetric,t);try{const t=this.isLegacyAEAD?new Uint8Array:L.concatUint8Array([r,this.writePublicKey()]);n=await i.decrypt(this.keyMaterial,this.iv.subarray(0,e.ivLength),t)}catch(e){if("Authentication tag mismatch"===e.message)throw Error("Incorrect key passphrase: "+e.message);throw e}}else{const e=await ti(this.symmetric,t,this.keyMaterial,this.iv);n=e.subarray(0,-20);const r=await Qe(R.hash.sha1,n);if(!L.equalsUint8Array(r,e.subarray(-20)))throw Error("Incorrect key passphrase")}try{const{privateParams:e}=await _i(this.algorithm,n,this.publicParams);this.privateParams=e}catch(e){throw Error("Error reading MPIs")}this.isEncrypted=!1,this.keyMaterial=null,this.s2kUsage=0,this.aead=null,this.symmetric=null,this.isLegacyAEAD=null}async validate(){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key is not decrypted");if(this.usedModernAEAD)return;let e;try{e=await qi(this.algorithm,this.publicParams,this.privateParams)}catch(t){e=!1}if(!e)throw Error("Key is invalid")}async generate(e,t,r){if(6===this.version&&(this.algorithm===R.publicKey.ecdh&&t===R.curve.curve25519Legacy||this.algorithm===R.publicKey.eddsaLegacy))throw Error(`Cannot generate v6 keys of type 'ecc' with curve ${t}. Generate a key of type 'curve25519' instead`);if(6!==this.version&&this.algorithm===R.publicKey.pqc_mldsa_ed25519)throw Error(`Cannot generate v${this.version} signing keys of type 'pqc'. Generate a v6 key instead`);const{privateParams:n,publicParams:i}=await zi(this.algorithm,e,t,r);this.privateParams=n,this.publicParams=i,this.isEncrypted=!1}clearPrivateParams(){this.isMissingSecretKeyMaterial()||(Object.keys(this.privateParams).forEach((e=>{this.privateParams[e].fill(0),delete this.privateParams[e]})),this.privateParams=null,this.isEncrypted=!0)}}async function Ma(e,t,r,n,i,s,a){if("argon2"===t.type&&!i)throw Error("Using Argon2 S2K without AEAD is not allowed");if("simple"===t.type&&6===e)throw Error("Using Simple S2K with version 6 keys is not allowed");const{keySize:o}=Sr(n),c=await t.produceKey(r,o);if(!i||5===e||a)return c;const u=L.concatUint8Array([s,new Uint8Array([e,n,i])]);return Ur(R.hash.sha256,c,new Uint8Array,u,o)}class La{static get tag(){return R.packet.userID}constructor(){this.userID="",this.name="",this.email="",this.comment=""}static fromObject(e){if(L.isString(e)||e.name&&!L.isString(e.name)||e.email&&!L.isEmailAddress(e.email)||e.comment&&!L.isString(e.comment))throw Error("Invalid user ID format");const t=new La;Object.assign(t,e);const r=[];return t.name&&r.push(t.name),t.comment&&r.push(`(${t.comment})`),t.email&&r.push(`<${t.email}>`),t.userID=r.join(" "),t}read(e,t=T){const r=L.decodeUTF8(e);if(r.length>t.maxUserIDLength)throw Error("User ID string is too long");const n=e=>/^[^\s@]+@[^\s@]+$/.test(e),i=r.indexOf("<"),s=r.lastIndexOf(">");if(-1!==i&&-1!==s&&s>i){const e=r.substring(i+1,s);if(n(e)){this.email=e;const t=r.substring(0,i).trim(),n=t.indexOf("("),s=t.lastIndexOf(")");-1!==n&&-1!==s&&s>n?(this.comment=t.substring(n+1,s).trim(),this.name=t.substring(0,n).trim()):(this.name=t,this.comment="")}}else n(r.trim())&&(this.email=r.trim(),this.name="",this.comment="");this.userID=r}write(){return L.encodeUTF8(this.userID)}equals(e){return e&&e.userID===this.userID}}class Fa extends Ta{static get tag(){return R.packet.secretSubkey}constructor(e=new Date,t=T){super(e,t)}}const Oa=/*#__PURE__*/L.constructAllowedPackets([sa]);class Na{constructor(e){this.packets=e||new ha}write(){return this.packets.write()}armor(e=T){const t=this.packets.some((e=>e.constructor.tag===sa.tag&&6!==e.version));return $(R.armor.signature,this.write(),void 0,void 0,void 0,t,e)}getSigningKeyIDs(){return this.packets.map((e=>e.issuerKeyID))}}async function _a(e,t){const r=new Fa(e.date,t);return r.packets=null,r.algorithm=R.write(R.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function Ha(e,t){const r=new Ta(e.date,t);return r.packets=null,r.algorithm=R.write(R.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function za(e,t,r,n,i=new Date,s){let a,o;for(let c=e.length-1;c>=0;c--)try{(!a||e[c].created>=a.created)&&(await e[c].verify(t,r,n,i,void 0,s),a=e[c])}catch(e){o=e}if(!a)throw L.wrapError(`Could not find valid ${R.read(R.signature,r)} signature in key ${t.getKeyID().toHex()}`.replace("certGeneric ","self-").replace(/([a-z])([A-Z])/g,((e,t,r)=>t+" "+r.toLowerCase())),o);return a}function Ga(e,t,r=new Date){const n=L.normalizeDate(r);if(null!==n){const r=Ja(e,t);return!(e.created<=n&&n<r)}return!1}async function qa(e,t,r,n){const i={};i.key=t,i.bind=e;const s={signatureType:R.signature.subkeyBinding};r.sign?(s.keyFlags=[R.keyFlags.signData],s.embeddedSignature=await Va(i,[],e,{signatureType:R.signature.keyBinding},r.date,void 0,void 0,void 0,n)):s.keyFlags=r.forwarding?[R.keyFlags.forwardedCommunication]:[R.keyFlags.encryptCommunication|R.keyFlags.encryptStorage],r.keyExpirationTime>0&&(s.keyExpirationTime=r.keyExpirationTime,s.keyNeverExpires=!1);return await Va(i,[],t,s,r.date,void 0,void 0,void 0,n)}async function ja(e,t,r=new Date,n=[],i){const s=R.hash.sha256,a=i.preferredHashAlgorithm,o=await Promise.all(e.map((async(e,t)=>(await e.getPrimarySelfSignature(r,n[t],i)).preferredHashAlgorithms||[]))),c=new Map;for(const e of o)for(const t of e)try{const e=R.write(R.hash,t);c.set(e,c.has(e)?c.get(e)+1:1)}catch{}const u=t=>0===e.length||c.get(t)===e.length||t===s,h=()=>{if(0===c.size)return s;const e=Array.from(c.keys()).filter((e=>u(e))).sort(((e,t)=>Re(e)-Re(t)))[0];return Re(e)>=Re(s)?e:s},l=new Set([R.publicKey.ecdsa,R.publicKey.eddsaLegacy,R.publicKey.ed25519,R.publicKey.ed448]),f=new Set([R.publicKey.pqc_mldsa_ed25519]);if(l.has(t.algorithm)){const e=function(e,t){switch(e){case R.publicKey.ecdsa:case R.publicKey.eddsaLegacy:return Zr(t);case R.publicKey.ed25519:case R.publicKey.ed448:return pt(e);default:throw Error("Unknown elliptic signing algo")}}(t.algorithm,t.publicParams.oid),r=u(a),n=Re(a)>=Re(e);if(r&&n)return a;{const t=h();return Re(t)>=Re(e)?t:e}}if(f.has(t.algorithm)){if(u(a)&&On(t.algorithm,a))return a;{const e=h();return On(t.algorithm,e)?e:s}}return u(a)?a:h()}async function Va(e,t,r,n,i,s,a=[],o=!1,c){if(r.isDummy())throw Error("Cannot sign with a gnu-dummy key.");if(!r.isDecrypted())throw Error("Signing key is not decrypted.");const u=new sa;return Object.assign(u,n),u.publicKeyAlgorithm=r.algorithm,u.hashAlgorithm=await ja(t,r,i,s,c),u.rawNotations=[...a],await u.sign(r,e,i,o,c),u}async function Ya(e,t,r,n=new Date,i){(e=e[r])&&(t[r].length?await Promise.all(e.map((async function(e){e.isExpired(n)||i&&!await i(e)||t[r].some((function(t){return L.equalsUint8Array(t.writeParams(),e.writeParams())}))||t[r].push(e)}))):t[r]=e)}async function Za(e,t,r,n,i,s,a=new Date,o){s=s||e;const c=[];return await Promise.all(n.map((async function(e){try{if(!i||e.issuerKeyID.equals(i.issuerKeyID)){const n=![R.reasonForRevocation.keyRetired,R.reasonForRevocation.keySuperseded,R.reasonForRevocation.userIDInvalid].includes(e.reasonForRevocationFlag);await e.verify(s,t,r,n?null:a,!1,o),c.push(e.issuerKeyID)}}catch(e){}}))),i?(i.revoked=!!c.some((e=>e.equals(i.issuerKeyID)))||(i.revoked||!1),i.revoked):c.length>0}function Ja(e,t){let r;return!1===t.keyNeverExpires&&(r=e.created.getTime()+1e3*t.keyExpirationTime),r?new Date(r):1/0}function Xa(e,t={}){if(e.type=e.type||t.type,e.curve=e.curve||t.curve,e.rsaBits=e.rsaBits||t.rsaBits,e.symmetricHash=e.symmetricHash||t.symmetricHash,e.symmetricCipher=e.symmetricCipher||t.symmetricCipher,e.keyExpirationTime=void 0!==e.keyExpirationTime?e.keyExpirationTime:t.keyExpirationTime,e.passphrase=L.isString(e.passphrase)?e.passphrase:t.passphrase,e.date=e.date||t.date,e.sign=e.sign||!1,e.forwarding=e.forwarding||!1,e.sign&&e.forwarding)throw Error('Incompatible options: "sign" and "forwarding" cannot be set together');switch(e.type){case"pqc":e.sign?e.algorithm=R.publicKey.pqc_mldsa_ed25519:e.algorithm=R.publicKey.pqc_mlkem_x25519;break;case"ecc":try{e.curve=R.write(R.curve,e.curve)}catch(e){throw Error("Unknown curve")}e.curve!==R.curve.ed25519Legacy&&e.curve!==R.curve.curve25519Legacy&&"ed25519"!==e.curve&&"curve25519"!==e.curve||(e.curve=e.sign?R.curve.ed25519Legacy:R.curve.curve25519Legacy),e.sign?e.algorithm=e.curve===R.curve.ed25519Legacy?R.publicKey.eddsaLegacy:R.publicKey.ecdsa:e.algorithm=R.publicKey.ecdh;break;case"curve25519":e.algorithm=e.sign?R.publicKey.ed25519:R.publicKey.x25519;break;case"curve448":e.algorithm=e.sign?R.publicKey.ed448:R.publicKey.x448;break;case"rsa":e.algorithm=R.publicKey.rsaEncryptSign;break;case"symmetric":if(e.sign){e.algorithm=R.publicKey.hmac;try{e.symmetric=R.write(R.hash,e.symmetricHash)}catch(e){throw Error("Unknown hash algorithm")}}else{e.algorithm=R.publicKey.aead;try{e.symmetric=R.write(R.symmetric,e.symmetricCipher)}catch(e){throw Error("Unknown symmetric algorithm")}}break;default:throw Error("Unsupported key type "+e.type)}return e}function Wa(e,t,r){switch(e.algorithm){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:case R.publicKey.dsa:case R.publicKey.ecdsa:case R.publicKey.eddsaLegacy:case R.publicKey.ed25519:case R.publicKey.ed448:case R.publicKey.hmac:case R.publicKey.pqc_mldsa_ed25519:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||!!(t.keyFlags[0]&R.keyFlags.signData);default:return!1}}function $a(e,t,r){switch(e.algorithm){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.elgamal:case R.publicKey.ecdh:case R.publicKey.x25519:case R.publicKey.x448:case R.publicKey.aead:case R.publicKey.pqc_mlkem_x25519:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||!!(t.keyFlags[0]&R.keyFlags.encryptCommunication)||!!(t.keyFlags[0]&R.keyFlags.encryptStorage);default:return!1}}function eo(e,t,r){if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");switch(e.algorithm){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.elgamal:case R.publicKey.ecdh:case R.publicKey.x25519:case R.publicKey.x448:case R.publicKey.pqc_mlkem_x25519:return!(!(!t.keyFlags||!!(t.keyFlags[0]&R.keyFlags.signData))||!r.allowInsecureDecryptionWithSigningKeys)||(!t.keyFlags||!!(t.keyFlags[0]&R.keyFlags.encryptCommunication)||!!(t.keyFlags[0]&R.keyFlags.encryptStorage)||r.allowForwardedMessages&&!!(t.keyFlags[0]&R.keyFlags.forwardedCommunication));default:return!1}}function to(e,t){const r=R.write(R.publicKey,e.algorithm),n=e.getAlgorithmInfo();if(t.rejectPublicKeyAlgorithms.has(r))throw Error(n.algorithm+" keys are considered too weak.");switch(r){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:case R.publicKey.rsaEncrypt:if(n.bits<t.minRSABits)throw Error(`RSA keys shorter than ${t.minRSABits} bits are considered too weak.`);break;case R.publicKey.ecdsa:case R.publicKey.eddsaLegacy:case R.publicKey.ecdh:if(t.rejectCurves.has(n.curve))throw Error(`Support for ${n.algorithm} keys using curve ${n.curve} is disabled.`)}}class ro{constructor(e,t){this.userID=e.constructor.tag===R.packet.userID?e:null,this.userAttribute=e.constructor.tag===R.packet.userAttribute?e:null,this.selfCertifications=[],this.otherCertifications=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new ha;return e.push(this.userID||this.userAttribute),e.push(...this.revocationSignatures),e.push(...this.selfCertifications),e.push(...this.otherCertifications),e}clone(){const e=new ro(this.userID||this.userAttribute,this.mainKey);return e.selfCertifications=[...this.selfCertifications],e.otherCertifications=[...this.otherCertifications],e.revocationSignatures=[...this.revocationSignatures],e}async certify(e,t,r){const n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n},s=new ro(i.userID||i.userAttribute,this.mainKey);return s.otherCertifications=await Promise.all(e.map((async function(e){if(!e.isPrivate())throw Error("Need private key for signing");if(e.hasSameFingerprintAs(n))throw Error("The user's own key can only be used for self-certifications");const s=await e.getSigningKey(void 0,t,void 0,r);return Va(i,[e],s.keyPacket,{signatureType:R.signature.certGeneric,keyFlags:[R.keyFlags.certifyKeys|R.keyFlags.signData]},t,void 0,void 0,void 0,r)}))),await s.update(this,t,r),s}async isRevoked(e,t,r=new Date,n=T){const i=this.mainKey.keyPacket;return Za(i,R.signature.certRevocation,{key:i,userID:this.userID,userAttribute:this.userAttribute},this.revocationSignatures,e,t,r,n)}async verifyCertificate(e,t,r=new Date,n){const i=this,s=this.mainKey.keyPacket,a={userID:this.userID,userAttribute:this.userAttribute,key:s},{issuerKeyID:o}=e,c=t.filter((e=>e.getKeys(o).length>0));return 0===c.length?null:(await Promise.all(c.map((async t=>{const s=await t.getSigningKey(o,e.created,void 0,n);if(e.revoked||await i.isRevoked(e,s.keyPacket,r,n))throw Error("User certificate is revoked");try{await e.verify(s.keyPacket,R.signature.certGeneric,a,r,void 0,n)}catch(e){throw L.wrapError("User certificate is invalid",e)}}))),!0)}async verifyAllCertifications(e,t=new Date,r){const n=this,i=this.selfCertifications.concat(this.otherCertifications);return Promise.all(i.map((async i=>({keyID:i.issuerKeyID,valid:await n.verifyCertificate(i,e,t,r).catch((()=>!1))}))))}async verify(e=new Date,t){if(!this.selfCertifications.length)throw Error("No self-certifications found");const r=this,n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n};let s;for(let a=this.selfCertifications.length-1;a>=0;a--)try{const s=this.selfCertifications[a];if(s.revoked||await r.isRevoked(s,void 0,e,t))throw Error("Self-certification is revoked");try{await s.verify(n,R.signature.certGeneric,i,e,void 0,t)}catch(e){throw L.wrapError("Self-certification is invalid",e)}return!0}catch(e){s=e}throw s}async update(e,t,r){const n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n};await Ya(e,this,"selfCertifications",t,(async function(e){try{return await e.verify(n,R.signature.certGeneric,i,t,!1,r),!0}catch(e){return!1}})),await Ya(e,this,"otherCertifications",t),await Ya(e,this,"revocationSignatures",t,(function(e){return Za(n,R.signature.certRevocation,i,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=R.reasonForRevocation.noReason,string:r=""}={},n=new Date,i=T){const s={userID:this.userID,userAttribute:this.userAttribute,key:e},a=new ro(s.userID||s.userAttribute,this.mainKey);return a.revocationSignatures.push(await Va(s,[],e,{signatureType:R.signature.certRevocation,reasonForRevocationFlag:R.write(R.reasonForRevocation,t),reasonForRevocationString:r},n,void 0,void 0,!1,i)),await a.update(this),a}}class no{constructor(e,t){this.keyPacket=e,this.bindingSignatures=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new ha;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.bindingSignatures),e}clone(){const e=new no(this.keyPacket,this.mainKey);return e.bindingSignatures=[...this.bindingSignatures],e.revocationSignatures=[...this.revocationSignatures],e}async isRevoked(e,t,r=new Date,n=T){const i=this.mainKey.keyPacket;return Za(i,R.signature.subkeyRevocation,{key:i,bind:this.keyPacket},this.revocationSignatures,e,t,r,n)}async verify(e=new Date,t=T){const r=this.mainKey.keyPacket,n={key:r,bind:this.keyPacket},i=await za(this.bindingSignatures,r,R.signature.subkeyBinding,n,e,t);if(i.revoked||await this.isRevoked(i,null,e,t))throw Error("Subkey is revoked");if(Ga(this.keyPacket,i,e))throw Error("Subkey is expired");return i}async getExpirationTime(e=new Date,t=T){const r=this.mainKey.keyPacket,n={key:r,bind:this.keyPacket};let i;try{i=await za(this.bindingSignatures,r,R.signature.subkeyBinding,n,e,t)}catch(e){return null}const s=Ja(this.keyPacket,i),a=i.getExpirationTime();return s<a?s:a}async update(e,t=new Date,r=T){const n=this.mainKey.keyPacket;if(!this.hasSameFingerprintAs(e))throw Error("Subkey update method: fingerprints of subkeys not equal");this.keyPacket.constructor.tag===R.packet.publicSubkey&&e.keyPacket.constructor.tag===R.packet.secretSubkey&&(this.keyPacket=e.keyPacket);const i=this,s={key:n,bind:i.keyPacket};await Ya(e,this,"bindingSignatures",t,(async function(e){for(let t=0;t<i.bindingSignatures.length;t++)if(i.bindingSignatures[t].issuerKeyID.equals(e.issuerKeyID))return e.created>i.bindingSignatures[t].created&&(i.bindingSignatures[t]=e),!1;try{return await e.verify(n,R.signature.subkeyBinding,s,t,void 0,r),!0}catch(e){return!1}})),await Ya(e,this,"revocationSignatures",t,(function(e){return Za(n,R.signature.subkeyRevocation,s,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=R.reasonForRevocation.noReason,string:r=""}={},n=new Date,i=T){const s={key:e,bind:this.keyPacket},a=new no(this.keyPacket,this.mainKey);return a.revocationSignatures.push(await Va(s,[],e,{signatureType:R.signature.subkeyRevocation,reasonForRevocationFlag:R.write(R.reasonForRevocation,t),reasonForRevocationString:r},n,void 0,void 0,!1,i)),await a.update(this),a}hasSameFingerprintAs(e){return this.keyPacket.hasSameFingerprintAs(e.keyPacket||e)}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","isDecrypted"].forEach((e=>{no.prototype[e]=function(){return this.keyPacket[e]()}}));const io=/*#__PURE__*/L.constructAllowedPackets([sa]),so=new Set([R.packet.publicKey,R.packet.privateKey]),ao=new Set([R.packet.publicKey,R.packet.privateKey,R.packet.publicSubkey,R.packet.privateSubkey]);class oo{packetListToStructure(e,t=new Set){let r,n,i,s;for(const a of e){if(a instanceof ct){ao.has(a.tag)&&!s&&(s=so.has(a.tag)?so:ao);continue}const e=a.constructor.tag;if(s){if(!s.has(e))continue;s=null}if(t.has(e))throw Error("Unexpected packet type: "+e);switch(e){case R.packet.publicKey:case R.packet.secretKey:if(this.keyPacket)throw Error("Key block contains multiple keys");if(this.keyPacket=a,n=this.getKeyID(),!n)throw Error("Missing Key ID");break;case R.packet.userID:case R.packet.userAttribute:r=new ro(a,this),this.users.push(r);break;case R.packet.publicSubkey:case R.packet.secretSubkey:r=null,i=new no(a,this),this.subkeys.push(i);break;case R.packet.signature:switch(a.signatureType){case R.signature.certGeneric:case R.signature.certPersona:case R.signature.certCasual:case R.signature.certPositive:if(!r){L.printDebug("Dropping certification signatures without preceding user packet");continue}a.issuerKeyID.equals(n)?r.selfCertifications.push(a):r.otherCertifications.push(a);break;case R.signature.certRevocation:r?r.revocationSignatures.push(a):this.directSignatures.push(a);break;case R.signature.key:this.directSignatures.push(a);break;case R.signature.subkeyBinding:if(!i){L.printDebug("Dropping subkey binding signature without preceding subkey packet");continue}i.bindingSignatures.push(a);break;case R.signature.keyRevocation:this.revocationSignatures.push(a);break;case R.signature.subkeyRevocation:if(!i){L.printDebug("Dropping subkey revocation signature without preceding subkey packet");continue}i.revocationSignatures.push(a)}}}}toPacketList(){const e=new ha;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.directSignatures),this.users.map((t=>e.push(...t.toPacketList()))),this.subkeys.map((t=>e.push(...t.toPacketList()))),e}clone(e=!1){const t=new this.constructor(this.toPacketList());return e&&t.getKeys().forEach((e=>{if(e.keyPacket=Object.create(Object.getPrototypeOf(e.keyPacket),Object.getOwnPropertyDescriptors(e.keyPacket)),!e.keyPacket.isDecrypted())return;const t={};Object.keys(e.keyPacket.privateParams).forEach((r=>{t[r]=new Uint8Array(e.keyPacket.privateParams[r])})),e.keyPacket.privateParams=t})),t}getSubkeys(e=null){return this.subkeys.filter((t=>!e||t.getKeyID().equals(e,!0)))}getKeys(e=null){const t=[];return e&&!this.getKeyID().equals(e,!0)||t.push(this),t.concat(this.getSubkeys(e))}getKeyIDs(){return this.getKeys().map((e=>e.getKeyID()))}getUserIDs(){return this.users.map((e=>e.userID?e.userID.userID:null)).filter((e=>null!==e))}write(){return this.toPacketList().write()}async getSigningKey(e=null,t=new Date,r={},n=T){await this.verifyPrimaryKey(t,r,n);const i=this.keyPacket;try{to(i,n)}catch(e){throw L.wrapError("Could not verify primary key",e)}const s=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created||t.keyPacket.algorithm-e.keyPacket.algorithm));let a;for(const r of s)if(!e||r.getKeyID().equals(e))try{await r.verify(t,n);const e={key:i,bind:r.keyPacket},s=await za(r.bindingSignatures,i,R.signature.subkeyBinding,e,t,n);if(!Wa(r.keyPacket,s,n))continue;if(!s.embeddedSignature)throw Error("Missing embedded signature");return await za([s.embeddedSignature],r.keyPacket,R.signature.keyBinding,e,t,n),to(r.keyPacket,n),r}catch(e){a=e}try{const s=await this.getPrimarySelfSignature(t,r,n);if((!e||i.getKeyID().equals(e))&&Wa(i,s,n))return to(i,n),this}catch(e){a=e}throw L.wrapError("Could not find valid signing key packet in key "+this.getKeyID().toHex(),a)}async getEncryptionKey(e,t=new Date,r={},n=T){await this.verifyPrimaryKey(t,r,n);const i=this.keyPacket;try{to(i,n)}catch(e){throw L.wrapError("Could not verify primary key",e)}const s=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created||t.keyPacket.algorithm-e.keyPacket.algorithm));let a;for(const r of s)if(!e||r.getKeyID().equals(e))try{await r.verify(t,n);const e={key:i,bind:r.keyPacket},s=await za(r.bindingSignatures,i,R.signature.subkeyBinding,e,t,n);if($a(r.keyPacket,s,n))return to(r.keyPacket,n),r}catch(e){a=e}try{const s=await this.getPrimarySelfSignature(t,r,n);if((!e||i.getKeyID().equals(e))&&$a(i,s,n))return to(i,n),this}catch(e){a=e}throw L.wrapError("Could not find valid encryption key packet in key "+this.getKeyID().toHex(),a)}async isRevoked(e,t,r=new Date,n=T){return Za(this.keyPacket,R.signature.keyRevocation,{key:this.keyPacket},this.revocationSignatures,e,t,r,n)}async verifyPrimaryKey(e=new Date,t={},r=T){const n=this.keyPacket;if(await this.isRevoked(null,null,e,r))throw Error("Primary key is revoked");if(Ga(n,await this.getPrimarySelfSignature(e,t,r),e))throw Error("Primary key is expired");if(6!==n.version){const t=await za(this.directSignatures,n,R.signature.key,{key:n},e,r).catch((()=>{}));if(t&&Ga(n,t,e))throw Error("Primary key is expired")}}async getExpirationTime(e,t=T){let r;try{const n=await this.getPrimarySelfSignature(null,e,t),i=Ja(this.keyPacket,n),s=n.getExpirationTime(),a=6!==this.keyPacket.version&&await za(this.directSignatures,this.keyPacket,R.signature.key,{key:this.keyPacket},null,t).catch((()=>{}));if(a){const e=Ja(this.keyPacket,a);r=Math.min(i,s,e)}else r=i<s?i:s}catch(e){r=null}return L.normalizeDate(r)}async getPrimarySelfSignature(e=new Date,t={},r=T){const n=this.keyPacket;if(6===n.version)return za(this.directSignatures,n,R.signature.key,{key:n},e,r);const{selfCertification:i}=await this.getPrimaryUser(e,t,r);return i}async getPrimaryUser(e=new Date,t={},r=T){const n=this.keyPacket,i=[];let s;for(let a=0;a<this.users.length;a++)try{const s=this.users[a];if(!s.userID)continue;if(void 0!==t.name&&s.userID.name!==t.name||void 0!==t.email&&s.userID.email!==t.email||void 0!==t.comment&&s.userID.comment!==t.comment)throw Error("Could not find user that matches that user ID");const o={userID:s.userID,key:n},c=await za(s.selfCertifications,n,R.signature.certGeneric,o,e,r);i.push({index:a,user:s,selfCertification:c})}catch(e){s=e}if(!i.length)throw s||Error("Could not find primary user");await Promise.all(i.map((async function(t){return t.selfCertification.revoked||t.user.isRevoked(t.selfCertification,null,e,r)})));const a=i.sort((function(e,t){const r=e.selfCertification,n=t.selfCertification;return n.revoked-r.revoked||r.isPrimaryUserID-n.isPrimaryUserID||r.created-n.created})).pop(),{user:o,selfCertification:c}=a;if(c.revoked||await o.isRevoked(c,null,e,r))throw Error("Primary user is revoked");return a}async update(e,t=new Date,r=T){if(!this.hasSameFingerprintAs(e))throw Error("Primary key fingerprints must be equal to update the key");if(!this.isPrivate()&&e.isPrivate()){if(!(this.subkeys.length===e.subkeys.length&&this.subkeys.every((t=>e.subkeys.some((e=>t.hasSameFingerprintAs(e)))))))throw Error("Cannot update public key with private key if subkeys mismatch");return e.update(this,r)}const n=this.clone();return await Ya(e,n,"revocationSignatures",t,(i=>Za(n.keyPacket,R.signature.keyRevocation,n,[i],null,e.keyPacket,t,r))),await Ya(e,n,"directSignatures",t),await Promise.all(e.users.map((async e=>{const i=n.users.filter((t=>e.userID&&e.userID.equals(t.userID)||e.userAttribute&&e.userAttribute.equals(t.userAttribute)));if(i.length>0)await Promise.all(i.map((n=>n.update(e,t,r))));else{const t=e.clone();t.mainKey=n,n.users.push(t)}}))),await Promise.all(e.subkeys.map((async e=>{const i=n.subkeys.filter((t=>t.hasSameFingerprintAs(e)));if(i.length>0)await Promise.all(i.map((n=>n.update(e,t,r))));else{const t=e.clone();t.mainKey=n,n.subkeys.push(t)}}))),n}async getRevocationCertificate(e=new Date,t=T){const r={key:this.keyPacket},n=await za(this.revocationSignatures,this.keyPacket,R.signature.keyRevocation,r,e,t),i=new ha;i.push(n);const s=6!==this.keyPacket.version;return $(R.armor.publicKey,i.write(),null,null,"This is a revocation certificate",s,t)}async applyRevocationCertificate(e,t=new Date,r=T){const n=await W(e),i=(await ha.fromBinary(n.data,io,r)).findPacket(R.packet.signature);if(!i||i.signatureType!==R.signature.keyRevocation)throw Error("Could not find revocation signature packet");if(!i.issuerKeyID.equals(this.getKeyID()))throw Error("Revocation signature does not match key");try{await i.verify(this.keyPacket,R.signature.keyRevocation,{key:this.keyPacket},t,void 0,r)}catch(e){throw L.wrapError("Could not verify revocation signature",e)}const s=this.clone();return s.revocationSignatures.push(i),s}async signPrimaryUser(e,t,r,n=T){const{index:i,user:s}=await this.getPrimaryUser(t,r,n),a=await s.certify(e,t,n),o=this.clone();return o.users[i]=a,o}async signAllUsers(e,t=new Date,r=T){const n=this.clone();return n.users=await Promise.all(this.users.map((function(n){return n.certify(e,t,r)}))),n}async verifyPrimaryUser(e,t=new Date,r,n=T){const i=this.keyPacket,{user:s}=await this.getPrimaryUser(t,r,n);return e?await s.verifyAllCertifications(e,t,n):[{keyID:i.getKeyID(),valid:await s.verify(t,n).catch((()=>!1))}]}async verifyAllUsers(e,t=new Date,r=T){const n=this.keyPacket,i=[];return await Promise.all(this.users.map((async s=>{const a=e?await s.verifyAllCertifications(e,t,r):[{keyID:n.getKeyID(),valid:await s.verify(t,r).catch((()=>!1))}];i.push(...a.map((e=>({userID:s.userID?s.userID.userID:null,userAttribute:s.userAttribute,keyID:e.keyID,valid:e.valid}))))}))),i}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","hasSameFingerprintAs"].forEach((e=>{oo.prototype[e]=no.prototype[e]}));class co extends oo{constructor(e){if(super(),this.keyPacket=null,this.revocationSignatures=[],this.directSignatures=[],this.users=[],this.subkeys=[],e&&(this.packetListToStructure(e,new Set([R.packet.secretKey,R.packet.secretSubkey])),!this.keyPacket))throw Error("Invalid key: missing public-key packet")}isPrivate(){return!1}toPublic(){return this}armor(e=T){const t=6!==this.keyPacket.version;return $(R.armor.publicKey,this.toPacketList().write(),void 0,void 0,void 0,t,e)}}class uo extends co{constructor(e){if(super(),this.packetListToStructure(e,new Set([R.packet.publicKey,R.packet.publicSubkey])),!this.keyPacket)throw Error("Invalid key: missing private-key packet")}isPrivate(){return!0}toPublic(){const e=new ha,t=this.toPacketList();let r=!1;for(const n of t)if(!r||n.constructor.tag!==R.packet.Signature)switch(r&&(r=!1),n.constructor.tag){case R.packet.secretKey:{if(n.algorithm===R.publicKey.aead||n.algorithm===R.publicKey.hmac)throw Error("Cannot create public key from symmetric private");const t=Pa.fromSecretKeyPacket(n);e.push(t);break}case R.packet.secretSubkey:{if(n.algorithm===R.publicKey.aead||n.algorithm===R.publicKey.hmac){r=!0;break}const t=Qa.fromSecretSubkeyPacket(n);e.push(t);break}default:e.push(n)}return new co(e)}armor(e=T){const t=6!==this.keyPacket.version;return $(R.armor.privateKey,this.toPacketList().write(),void 0,void 0,void 0,t,e)}async getDecryptionKeys(e,t=new Date,r={},n=T){const i=this.keyPacket,s=[];let a=null;for(let r=0;r<this.subkeys.length;r++)if(!e||this.subkeys[r].getKeyID().equals(e,!0)){if(this.subkeys[r].keyPacket.isDummy()){a=a||Error("Gnu-dummy key packets cannot be used for decryption");continue}try{const e={key:i,bind:this.subkeys[r].keyPacket},a=await za(this.subkeys[r].bindingSignatures,i,R.signature.subkeyBinding,e,t,n);eo(this.subkeys[r].keyPacket,a,n)&&s.push(this.subkeys[r])}catch(e){a=e}}const o=await this.getPrimarySelfSignature(t,r,n);if(e&&!i.getKeyID().equals(e,!0)||!eo(i,o,n)||(i.isDummy()?a=a||Error("Gnu-dummy key packets cannot be used for decryption"):s.push(this)),0===s.length)throw a||Error("No decryption key packets found");return s}isDecrypted(){return this.getKeys().some((({keyPacket:e})=>e.isDecrypted()))}async validate(e=T){if(!this.isPrivate())throw Error("Cannot validate a public key");let t;if(this.keyPacket.isDummy()){const r=await this.getSigningKey(null,null,void 0,{...e,rejectPublicKeyAlgorithms:new Set,minRSABits:0});r&&!r.keyPacket.isDummy()&&(t=r.keyPacket)}else t=this.keyPacket;if(t)return t.validate();{const e=this.getKeys();if(e.map((e=>e.keyPacket.isDummy())).every(Boolean))throw Error("Cannot validate an all-gnu-dummy key");return Promise.all(e.map((async e=>e.keyPacket.validate())))}}clearPrivateParams(){this.getKeys().forEach((({keyPacket:e})=>{e.isDecrypted()&&e.clearPrivateParams()}))}async revoke({flag:e=R.reasonForRevocation.noReason,string:t=""}={},r=new Date,n=T){if(!this.isPrivate())throw Error("Need private key for revoking");const i={key:this.keyPacket},s=this.clone();return s.revocationSignatures.push(await Va(i,[],this.keyPacket,{signatureType:R.signature.keyRevocation,reasonForRevocationFlag:R.write(R.reasonForRevocation,e),reasonForRevocationString:t},r,void 0,void 0,void 0,n)),s}async addSubkey(e={}){const t={...T,...e.config};if(e.passphrase)throw Error("Subkey could not be encrypted here, please encrypt whole key");if(e.rsaBits<t.minRSABits)throw Error(`rsaBits should be at least ${t.minRSABits}, got: ${e.rsaBits}`);const r=this.keyPacket;if(r.isDummy())throw Error("Cannot add subkey to gnu-dummy primary key");if(!r.isDecrypted())throw Error("Key is not decrypted");const n=r.getAlgorithmInfo();n.type=function(e){switch(R.write(R.publicKey,e)){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:case R.publicKey.dsa:return"rsa";case R.publicKey.ecdsa:case R.publicKey.eddsaLegacy:return"ecc";case R.publicKey.ed25519:return"curve25519";case R.publicKey.ed448:return"curve448";default:throw Error("Unsupported algorithm")}}(n.algorithm),n.rsaBits=n.bits||4096,n.curve=n.curve||"curve25519Legacy",e=Xa(e,n);const i=await _a(e,{...t,v6Keys:6===this.keyPacket.version});to(i,t);const s=await qa(i,r,e,t),a=this.toPacketList();return a.push(i,s),new uo(a)}}const ho=/*#__PURE__*/L.constructAllowedPackets([Pa,Qa,Ta,Fa,La,Ra,sa]);function lo(e){for(const t of e)switch(t.constructor.tag){case R.packet.secretKey:return new uo(e);case R.packet.publicKey:return new co(e)}throw Error("No key packet found")}async function fo(e,t,r,n){r.passphrase&&await e.encrypt(r.passphrase,n),await Promise.all(t.map((async function(e,t){const i=r.subkeys[t].passphrase;i&&await e.encrypt(i,n)})));const i=new ha;function s(e,t){return[t,...e.filter((e=>e!==t))]}function a(){const t={};t.keyFlags=[R.keyFlags.certifyKeys|R.keyFlags.signData];const i=s([R.symmetric.aes256,R.symmetric.aes128],n.preferredSymmetricAlgorithm);if(t.preferredSymmetricAlgorithms=i,n.aeadProtect){const e=s([R.aead.gcm,R.aead.eax,R.aead.ocb],n.preferredAEADAlgorithm);t.preferredCipherSuites=e.flatMap((e=>i.map((t=>[t,e]))))}return t.preferredHashAlgorithms=s([R.hash.sha512,R.hash.sha256,...6===e.version?[R.hash.sha3_512,R.hash.sha3_256]:[]],n.preferredHashAlgorithm),t.preferredCompressionAlgorithms=s([R.compression.uncompressed,R.compression.zlib,R.compression.zip],n.preferredCompressionAlgorithm),t.features=[0],t.features[0]|=R.features.modificationDetection,n.aeadProtect&&(t.features[0]|=R.features.seipdv2),r.keyExpirationTime>0&&(t.keyExpirationTime=r.keyExpirationTime,t.keyNeverExpires=!1),t}if(i.push(e),6===e.version){const t={key:e},s=a();s.signatureType=R.signature.key;const o=await Va(t,[],e,s,r.date,void 0,void 0,void 0,n);i.push(o)}await Promise.all(r.userIDs.map((async function(t,i){const s=La.fromObject(t),o={userID:s,key:e},c=6!==e.version?a():{};c.signatureType=R.signature.certPositive,0===i&&(c.isPrimaryUserID=!0);return{userIDPacket:s,signaturePacket:await Va(o,[],e,c,r.date,void 0,void 0,void 0,n)}}))).then((e=>{e.forEach((({userIDPacket:e,signaturePacket:t})=>{i.push(e),i.push(t)}))})),await Promise.all(t.map((async function(t,i){const s=r.subkeys[i];return{secretSubkeyPacket:t,subkeySignaturePacket:await qa(t,e,s,n)}}))).then((e=>{e.forEach((({secretSubkeyPacket:e,subkeySignaturePacket:t})=>{i.push(e),i.push(t)}))}));const o={key:e};return i.push(await Va(o,[],e,{signatureType:R.signature.keyRevocation,reasonForRevocationFlag:R.reasonForRevocation.noReason,reasonForRevocationString:""},r.date,void 0,void 0,void 0,n)),r.passphrase&&e.clearPrivateParams(),await Promise.all(t.map((async function(e,t){r.subkeys[t].passphrase&&e.clearPrivateParams()}))),new uo(i)}const yo=/*#__PURE__*/L.constructAllowedPackets([ea,da,Sa,Ea,xa,Ba,Ua,ca,sa]),po=/*#__PURE__*/L.constructAllowedPackets([Ua]),go=/*#__PURE__*/L.constructAllowedPackets([sa]);class Ao{constructor(e){this.packets=e||new ha}getEncryptionKeyIDs(){const e=[];return this.packets.filterByTag(R.packet.publicKeyEncryptedSessionKey).forEach((function(t){e.push(t.publicKeyID)})),e}getSigningKeyIDs(){const e=this.unwrapCompressed(),t=e.packets.filterByTag(R.packet.onePassSignature);if(t.length>0)return t.map((e=>e.issuerKeyID));return e.packets.filterByTag(R.packet.signature).map((e=>e.issuerKeyID))}async decrypt(e,t,r,n=new Date,i=T){const s=this.packets.filterByTag(R.packet.symmetricallyEncryptedData,R.packet.symEncryptedIntegrityProtectedData,R.packet.aeadEncryptedData);if(0===s.length)throw Error("No encrypted data found");const a=s[0],o=a.cipherAlgorithm,c=r||await this.decryptSessionKeys(e,t,o,n,i);let u=null;const h=Promise.all(c.map((async({algorithm:e,data:t})=>{if(!L.isUint8Array(t)||!a.cipherAlgorithm&&!L.isString(e))throw Error("Invalid session key for decryption.");try{const r=a.cipherAlgorithm||R.write(R.symmetric,e);await a.decrypt(r,t,i)}catch(e){L.printDebugError(e),u=e}})));if(U(a.encrypted),a.encrypted=null,await h,!a.packets||!a.packets.length)throw u||Error("Decryption failed.");const l=new Ao(a.packets);return a.packets=new ha,l}async decryptSessionKeys(e,t,r,n=new Date,i=T){let s,a=[];if(t){const e=this.packets.filterByTag(R.packet.symEncryptedSessionKey);if(0===e.length)throw Error("No symmetrically encrypted session key packet found.");await Promise.all(t.map((async function(t,r){let n;n=r?await ha.fromBinary(e.write(),po,i):e,await Promise.all(n.map((async function(e){try{await e.decrypt(t),a.push(e)}catch(e){L.printDebugError(e),e instanceof Xi&&(s=e)}})))})))}else{if(!e)throw Error("No key or password specified.");{const t=this.packets.filterByTag(R.packet.publicKeyEncryptedSessionKey);if(0===t.length)throw Error("No public key encrypted session key packet found.");await Promise.all(t.map((async function(t){await Promise.all(e.map((async function(e){let o;try{o=(await e.getDecryptionKeys(t.publicKeyID,null,void 0,i)).map((e=>e.keyPacket))}catch(e){return void(s=e)}let c=[R.symmetric.aes256,R.symmetric.aes128,R.symmetric.tripledes,R.symmetric.cast5];try{const t=await e.getPrimarySelfSignature(n,void 0,i);t.preferredSymmetricAlgorithms&&(c=c.concat(t.preferredSymmetricAlgorithms))}catch(e){}await Promise.all(o.map((async function(e){if(!e.isDecrypted())throw Error("Decryption key is not decrypted.");if(i.constantTimePKCS1Decryption&&(t.publicKeyAlgorithm===R.publicKey.rsaEncrypt||t.publicKeyAlgorithm===R.publicKey.rsaEncryptSign||t.publicKeyAlgorithm===R.publicKey.rsaSign||t.publicKeyAlgorithm===R.publicKey.elgamal)){const n=t.write();await Promise.all((r?[r]:Array.from(i.constantTimePKCS1DecryptionSupportedSymmetricAlgorithms)).map((async t=>{const r=new Ba;r.read(n);const i={sessionKeyAlgorithm:t,sessionKey:ji(t)};try{await r.decrypt(e,i),a.push(r)}catch(e){L.printDebugError(e),s=e}})))}else try{await t.decrypt(e);const n=r||t.sessionKeyAlgorithm;if(n&&!c.includes(R.write(R.symmetric,n)))throw Error("A non-preferred symmetric algorithm was used.");a.push(t)}catch(e){L.printDebugError(e),s=e}})))}))),U(t.encrypted),t.encrypted=null})))}}if(a.length>0){if(a.length>1){const e=new Set;a=a.filter((t=>{const r=t.sessionKeyAlgorithm+L.uint8ArrayToString(t.sessionKey);return!e.has(r)&&(e.add(r),!0)}))}return a.map((e=>({data:e.sessionKey,algorithm:e.sessionKeyAlgorithm&&R.read(R.symmetric,e.sessionKeyAlgorithm)})))}throw s||Error("Session key decryption failed.")}getLiteralData(){const e=this.unwrapCompressed().packets.findPacket(R.packet.literalData);return e&&e.getBytes()||null}getFilename(){const e=this.unwrapCompressed().packets.findPacket(R.packet.literalData);return e&&e.getFilename()||null}getText(){const e=this.unwrapCompressed().packets.findPacket(R.packet.literalData);return e?e.getText():null}static async generateSessionKey(e=[],t=new Date,r=[],n=T){const{symmetricAlgo:i,aeadAlgo:s}=await async function(e=[],t=new Date,r=[],n=T){const i=await Promise.all(e.map(((e,i)=>e.getPrimarySelfSignature(t,r[i],n))));if(e.length?!n.ignoreSEIPDv2FeatureFlag&&i.every((e=>e.features&&e.features[0]&R.features.seipdv2)):n.aeadProtect){const e={symmetricAlgo:R.symmetric.aes128,aeadAlgo:R.aead.ocb},t=[{symmetricAlgo:n.preferredSymmetricAlgorithm,aeadAlgo:n.preferredAEADAlgorithm},{symmetricAlgo:n.preferredSymmetricAlgorithm,aeadAlgo:R.aead.ocb},{symmetricAlgo:R.symmetric.aes128,aeadAlgo:n.preferredAEADAlgorithm}];for(const e of t)if(i.every((t=>t.preferredCipherSuites&&t.preferredCipherSuites.some((t=>t[0]===e.symmetricAlgo&&t[1]===e.aeadAlgo)))))return e;return e}const s=R.symmetric.aes128,a=n.preferredSymmetricAlgorithm;return{symmetricAlgo:i.every((e=>e.preferredSymmetricAlgorithms&&e.preferredSymmetricAlgorithms.includes(a)))?a:s,aeadAlgo:void 0}}(e,t,r,n),a=R.read(R.symmetric,i),o=s?R.read(R.aead,s):void 0;await Promise.all(e.map((e=>e.getEncryptionKey().catch((()=>null)).then((e=>{if(e&&(e.keyPacket.algorithm===R.publicKey.x25519||e.keyPacket.algorithm===R.publicKey.x448)&&!o&&!L.isAES(i))throw Error("Could not generate a session key compatible with the given `encryptionKeys`: X22519 and X448 keys can only be used to encrypt AES session keys; change `config.preferredSymmetricAlgorithm` accordingly.")})))));return{data:ji(i),algorithm:a,aeadAlgorithm:o}}async encrypt(e,t,r,n=!1,i=[],s=new Date,a=[],o=T){if(r){if(!L.isUint8Array(r.data)||!L.isString(r.algorithm))throw Error("Invalid session key for encryption.")}else if(e&&e.length)r=await Ao.generateSessionKey(e,s,a,o);else{if(!t||!t.length)throw Error("No keys, passwords, or session key provided.");r=await Ao.generateSessionKey(void 0,void 0,void 0,o)}const{data:c,algorithm:u,aeadAlgorithm:h}=r,l=await Ao.encryptSessionKey(c,u,h,e,t,n,i,s,a,o),f=Ea.fromObject({version:h?2:1,aeadAlgorithm:h?R.write(R.aead,h):null});f.packets=this.packets;const y=R.write(R.symmetric,u);return await f.encrypt(y,c,o),l.packets.push(f),f.packets=new ha,l}static async encryptSessionKey(e,t,r,n,i,s=!1,a=[],o=new Date,c=[],u=T){const h=new ha,l=R.write(R.symmetric,t),f=r&&R.write(R.aead,r);if(n){const t=await Promise.all(n.map((async function(t,r){const n=await t.getEncryptionKey(a[r],o,c,u),i=Ba.fromObject({version:f?6:3,encryptionKeyPacket:n.keyPacket,anonymousRecipient:s,sessionKey:e,sessionKeyAlgorithm:l});return await i.encrypt(n.keyPacket),delete i.sessionKey,i})));h.push(...t)}if(i){const t=async function(e,t){try{return await e.decrypt(t),1}catch(e){return 0}},r=(e,t)=>e+t,n=async function(e,s,a,o){const c=new Ua(u);if(c.sessionKey=e,c.sessionKeyAlgorithm=s,a&&(c.aeadAlgorithm=a),await c.encrypt(o,u),u.passwordCollisionCheck){if(1!==(await Promise.all(i.map((e=>t(c,e))))).reduce(r))return n(e,s,o)}return delete c.sessionKey,c},s=await Promise.all(i.map((t=>n(e,l,f,t))));h.push(...s)}return new Ao(h)}async sign(e=[],t=[],r=null,n=[],i=new Date,s=[],a=[],o=[],c=T){const u=new ha,h=this.packets.findPacket(R.packet.literalData);if(!h)throw Error("No literal data packet to sign.");const l=await wo(h,e,t,r,n,i,s,a,o,!1,c),f=l.map(((e,t)=>ca.fromSignaturePacket(e,0===t))).reverse();return u.push(...f),u.push(h),u.push(...l),new Ao(u)}compress(e,t=T){if(e===R.compression.uncompressed)return this;const r=new da(t);r.algorithm=e,r.packets=this.packets;const n=new ha;return n.push(r),new Ao(n)}async signDetached(e=[],t=[],r=null,n=[],i=[],s=new Date,a=[],o=[],c=T){const u=this.packets.findPacket(R.packet.literalData);if(!u)throw Error("No literal data packet to sign.");return new Na(await wo(u,e,t,r,n,i,s,a,o,!0,c))}async verify(e,t=new Date,r=T){const n=this.unwrapCompressed(),i=n.packets.filterByTag(R.packet.literalData);if(1!==i.length)throw Error("Can only verify message with one literal data packet.");let s=n.packets;o(s.stream)&&(s=s.concat(await C(s.stream,(e=>e||[]))));const a=s.filterByTag(R.packet.onePassSignature).reverse(),c=s.filterByTag(R.packet.signature);return a.length&&!c.length&&L.isStream(s.stream)&&!o(s.stream)?(await Promise.all(a.map((async e=>{e.correspondingSig=new Promise(((t,r)=>{e.correspondingSigResolve=t,e.correspondingSigReject=r})),e.signatureData=P((async()=>(await e.correspondingSig).signatureData)),e.hashed=C(await e.hash(e.signatureType,i[0],void 0,!1)),e.hashed.catch((()=>{}))}))),s.stream=E(s.stream,(async(e,t)=>{const r=D(e),n=x(t);try{for(let e=0;e<a.length;e++){const{value:t}=await r.read();a[e].correspondingSigResolve(t)}await r.readToEnd(),await n.ready,await n.close()}catch(e){a.forEach((t=>{t.correspondingSigReject(e)})),await n.abort(e)}})),mo(a,i,e,t,!1,r)):mo(c,i,e,t,!1,r)}verifyDetached(e,t,r=new Date,n=T){const i=this.unwrapCompressed().packets.filterByTag(R.packet.literalData);if(1!==i.length)throw Error("Can only verify message with one literal data packet.");return mo(e.packets.filterByTag(R.packet.signature),i,t,r,!0,n)}unwrapCompressed(){const e=this.packets.filterByTag(R.packet.compressedData);return e.length?new Ao(e[0].packets):this}async appendSignature(e,t=T){await this.packets.read(L.isUint8Array(e)?e:(await W(e)).data,go,t)}write(){return this.packets.write()}armor(e=T){const t=this.packets[this.packets.length-1],r=t.constructor.tag===Ea.tag?2!==t.version:this.packets.some((e=>e.constructor.tag===sa.tag&&6!==e.version));return $(R.armor.message,this.write(),null,null,null,r,e)}}async function wo(e,t,r=[],n=null,i=[],s=new Date,a=[],o=[],c=[],u=!1,h=T){const l=new ha,f=null===e.text?R.signature.binary:R.signature.text;if(await Promise.all(t.map((async(t,n)=>{const l=a[n];if(!t.isPrivate())throw Error("Need private key for signing");const y=await t.getSigningKey(i[n],s,l,h);return Va(e,r.length?r:[t],y.keyPacket,{signatureType:f},s,o,c,u,h)}))).then((e=>{l.push(...e)})),n){const e=n.packets.filterByTag(R.packet.signature);l.push(...e)}return l}async function mo(e,t,r,n=new Date,i=!1,s=T){return Promise.all(e.filter((function(e){return["text","binary"].includes(R.read(R.signature,e.signatureType))})).map((async function(e){return async function(e,t,r,n=new Date,i=!1,s=T){let a,o;for(const t of r){const r=t.getKeys(e.issuerKeyID);if(r.length>0){a=t,o=r[0];break}}const c=e instanceof ca?e.correspondingSig:e,u={keyID:e.issuerKeyID,verified:(async()=>{if(!o)throw Error("Could not find signing key with key ID "+e.issuerKeyID.toHex());await e.verify(o.keyPacket,e.signatureType,t[0],n,i,s);const r=await c;if(o.getCreationTime()>r.created)throw Error("Key is newer than the signature");try{await a.getSigningKey(o.getKeyID(),r.created,void 0,s)}catch(e){if(!s.allowInsecureVerificationWithReformattedKeys||!e.message.match(/Signature creation time is in the future/))throw e;await a.getSigningKey(o.getKeyID(),n,void 0,s)}return!0})(),signature:(async()=>{const e=await c,t=new ha;return e&&t.push(e),new Na(t)})()};return u.signature.catch((()=>{})),u.verified.catch((()=>{})),u}(e,t,r,n,i,s)})))}const bo=/*#__PURE__*/L.constructAllowedPackets([sa]);class ko{constructor(e,t){if(this.text=L.removeTrailingSpaces(e).replace(/\r?\n/g,"\r\n"),t&&!(t instanceof Na))throw Error("Invalid signature input");this.signature=t||new Na(new ha)}getSigningKeyIDs(){const e=[];return this.signature.packets.forEach((function(t){e.push(t.issuerKeyID)})),e}async sign(e,t=[],r=null,n=[],i=new Date,s=[],a=[],o=[],c=T){const u=new ea;u.setText(this.text);const h=new Na(await wo(u,e,t,r,n,i,s,a,o,!0,c));return new ko(this.text,h)}verify(e,t=new Date,r=T){const n=this.signature.packets.filterByTag(R.packet.signature),i=new ea;return i.setText(this.text),mo(n,[i],e,t,!0,r)}getText(){return this.text.replace(/\r\n/g,"\n")}armor(e=T){const t=this.signature.packets.some((e=>6!==e.version)),r={hash:t?Array.from(new Set(this.signature.packets.map((e=>R.read(R.hash,e.hashAlgorithm).toUpperCase())))).join():null,text:this.text,data:this.signature.packets.write()};return $(R.armor.signed,r,void 0,void 0,void 0,t,e)}}function Eo(e){if(!(e instanceof Ao))throw Error("Parameter [message] needs to be of type Message")}function vo(e){if(!(e instanceof ko||e instanceof Ao))throw Error("Parameter [message] needs to be of type Message or CleartextMessage")}function Ko(e){if("armored"!==e&&"binary"!==e&&"object"!==e)throw Error("Unsupported format "+e)}const So=Object.keys(T).length;function Io(e){const t=Object.keys(e);if(t.length!==So)for(const e of t)if(void 0===T[e])throw Error("Unknown config property: "+e)}function Bo(e){return e&&!L.isArray(e)&&(e=[e]),e}async function Co(e){return"array"===L.isStream(e)?C(e):e}function Uo(e,t,...r){e.data=E(t.packets.stream,(async(t,n)=>{await w(e.data,n,{preventClose:!0});const i=x(n);try{await C(t,(e=>e)),await Promise.all(r.map((e=>C(e.packets.stream,(e=>e))))),await i.close()}catch(e){await i.abort(e)}}))}function Po(e,t,r){switch(t){case"object":return e;case"armored":return e.armor(r);case"binary":return e.write();default:throw Error("Unsupported format "+t)}}const Do="object"==typeof t&&"crypto"in t?t.crypto:void 0;
1
+ /*! OpenPGP.js v6.2.2 - 2025-09-02 - this is LGPL licensed code, see LICENSE/our website https://openpgpjs.org/ for more information. */
2
+ var openpgp=function(e){"use strict";const t="undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:{};function r(e,t){return t.forEach((function(t){t&&"string"!=typeof t&&!Array.isArray(t)&&Object.keys(t).forEach((function(r){if("default"!==r&&!(r in e)){var n=Object.getOwnPropertyDescriptor(t,r);Object.defineProperty(e,r,n.get?n:{enumerable:!0,get:function(){return t[r]}})}}))})),Object.freeze(e)}const n=Symbol("doneWritingPromise"),i=Symbol("doneWritingResolve"),s=Symbol("doneWritingReject"),a=Symbol("readingIndex");class ArrayStream extends Array{constructor(){super(),Object.setPrototypeOf(this,ArrayStream.prototype),this[n]=new Promise(((e,t)=>{this[i]=e,this[s]=t})),this[n].catch((()=>{}))}}function o(e){return e&&e.getReader&&Array.isArray(e)}function c(e){if(!o(e)){const t=e.getWriter(),r=t.releaseLock;return t.releaseLock=()=>{t.closed.catch((function(){})),r.call(t)},t}this.stream=e}function u(e){if(o(e))return"array";if(t.ReadableStream&&t.ReadableStream.prototype.isPrototypeOf(e))return"web";if(e&&!(t.ReadableStream&&e instanceof t.ReadableStream)&&"function"==typeof e._read&&"object"==typeof e._readableState)throw Error("Native Node streams are no longer supported: please manually convert the stream to a WebStream, using e.g. `stream.Readable.toWeb`");return!(!e||!e.getReader)&&"web-like"}function h(e){return Uint8Array.prototype.isPrototypeOf(e)}function l(e){if(1===e.length)return e[0];let t=0;for(let r=0;r<e.length;r++){if(!h(e[r]))throw Error("concatUint8Array: Data must be in the form of a Uint8Array");t+=e[r].length}const r=new Uint8Array(t);let n=0;return e.forEach((function(e){r.set(e,n),n+=e.length})),r}ArrayStream.prototype.getReader=function(){return void 0===this[a]&&(this[a]=0),{read:async()=>(await this[n],this[a]===this.length?{value:void 0,done:!0}:{value:this[this[a]++],done:!1})}},ArrayStream.prototype.readToEnd=async function(e){await this[n];const t=e(this.slice(this[a]));return this.length=0,t},ArrayStream.prototype.clone=function(){const e=new ArrayStream;return e[n]=this[n].then((()=>{e.push(...this)})),e},c.prototype.write=async function(e){this.stream.push(e)},c.prototype.close=async function(){this.stream[i]()},c.prototype.abort=async function(e){return this.stream[s](e),e},c.prototype.releaseLock=function(){},"object"==typeof t.process&&t.process.versions;const f=new WeakSet,y=Symbol("externalBuffer");function p(e){if(this.stream=e,e[y]&&(this[y]=e[y].slice()),o(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{},void(this._cancel=()=>{})}if(u(e)){const t=e.getReader();return this._read=t.read.bind(t),this._releaseLock=()=>{t.closed.catch((function(){})),t.releaseLock()},void(this._cancel=t.cancel.bind(t))}let t=!1;this._read=async()=>t||f.has(e)?{value:void 0,done:!0}:(t=!0,{value:e,done:!1}),this._releaseLock=()=>{if(t)try{f.add(e)}catch(e){}}}function d(e){return u(e)?e:new ReadableStream({start(t){t.enqueue(e),t.close()}})}function g(e){if(u(e))return e;const t=new ArrayStream;return(async()=>{const r=x(t);await r.write(e),await r.close()})(),t}function A(e){return e.some((e=>u(e)&&!o(e)))?function(e){e=e.map(d);const t=b((async function(e){await Promise.all(n.map((t=>U(t,e))))}));let r=Promise.resolve();const n=e.map(((n,i)=>E(n,((n,s)=>(r=r.then((()=>w(n,t.writable,{preventClose:i!==e.length-1}))),r)))));return t.readable}(e):e.some((e=>o(e)))?function(e){const t=new ArrayStream;let r=Promise.resolve();return e.forEach(((n,i)=>(r=r.then((()=>w(n,t,{preventClose:i!==e.length-1}))),r))),t}(e):"string"==typeof e[0]?e.join(""):l(e)}async function w(e,t,{preventClose:r=!1,preventAbort:n=!1,preventCancel:i=!1}={}){if(u(e)&&!o(e)){e=d(e);try{if(e[y]){const r=x(t);for(let t=0;t<e[y].length;t++)await r.ready,await r.write(e[y][t]);r.releaseLock()}await e.pipeTo(t,{preventClose:r,preventAbort:n,preventCancel:i})}catch(e){}return}const s=D(e=g(e)),a=x(t);try{for(;;){await a.ready;const{done:e,value:t}=await s.read();if(e){r||await a.close();break}await a.write(t)}}catch(e){n||await a.abort(e)}finally{s.releaseLock(),a.releaseLock()}}function m(e,t){const r=new TransformStream(t);return w(e,r.writable),r.readable}function b(e){let t,r,n,i=!1,s=!1;return{readable:new ReadableStream({start(e){n=e},pull(){t?t():i=!0},async cancel(t){s=!0,e&&await e(t),r&&r(t)}},{highWaterMark:0}),writable:new WritableStream({write:async function(e){if(s)throw Error("Stream is cancelled");n.enqueue(e),i?i=!1:(await new Promise(((e,n)=>{t=e,r=n})),t=null,r=null)},close:n.close.bind(n),abort:n.error.bind(n)})}}function k(e,t=()=>{},r=()=>{}){if(o(e)){const n=new ArrayStream;return(async()=>{const i=x(n);try{const n=await C(e),s=t(n),a=r();let o;o=void 0!==s&&void 0!==a?A([s,a]):void 0!==s?s:a,await i.write(o),await i.close()}catch(e){await i.abort(e)}})(),n}if(u(e))return m(e,{async transform(e,r){try{const n=await t(e);void 0!==n&&r.enqueue(n)}catch(e){r.error(e)}},async flush(e){try{const t=await r();void 0!==t&&e.enqueue(t)}catch(t){e.error(t)}}});const n=t(e),i=r();return void 0!==n&&void 0!==i?A([n,i]):void 0!==n?n:i}function E(e,t){if(u(e)&&!o(e)){let r;const n=new TransformStream({start(e){r=e}}),i=w(e,n.writable),s=b((async function(e){r.error(e),await i,await new Promise(setTimeout)}));return t(n.readable,s.writable),s.readable}e=g(e);const r=new ArrayStream;return t(e,r),r}function v(e,t){let r;const n=E(e,((e,i)=>{const s=D(e);s.remainder=()=>(s.releaseLock(),w(e,i),n),r=t(s)}));return r}function K(e){if(o(e))return e.clone();if(u(e)){const t=function(e){if(o(e))throw Error("ArrayStream cannot be tee()d, use clone() instead");if(u(e)){const t=d(e).tee();return t[0][y]=t[1][y]=e[y],t}return[B(e),B(e)]}(e);return I(e,t[0]),t[1]}return B(e)}function S(e){return o(e)?K(e):u(e)?new ReadableStream({start(t){const r=E(e,(async(e,r)=>{const n=D(e),i=x(r);try{for(;;){await i.ready;const{done:e,value:r}=await n.read();if(e){try{t.close()}catch(e){}return void await i.close()}try{t.enqueue(r)}catch(e){}await i.write(r)}}catch(e){t.error(e),await i.abort(e)}}));I(e,r)}}):B(e)}function I(e,t){Object.entries(Object.getOwnPropertyDescriptors(e.constructor.prototype)).forEach((([r,n])=>{"constructor"!==r&&(n.value?n.value=n.value.bind(t):n.get=n.get.bind(t),Object.defineProperty(e,r,n))}))}function B(e,t=0,r=1/0){if(o(e))throw Error("Not implemented");if(u(e)){if(t>=0&&r>=0){let n=0;return m(e,{transform(e,i){n<r?(n+e.length>=t&&i.enqueue(B(e,Math.max(t-n,0),r-n)),n+=e.length):i.terminate()}})}if(t<0&&(r<0||r===1/0)){let n=[];return k(e,(e=>{e.length>=-t?n=[e]:n.push(e)}),(()=>B(A(n),t,r)))}if(0===t&&r<0){let n;return k(e,(e=>{const i=n?A([n,e]):e;if(i.length>=-r)return n=B(i,r),B(i,t,r);n=i}))}return console.warn(`stream.slice(input, ${t}, ${r}) not implemented efficiently.`),P((async()=>B(await C(e),t,r)))}return e[y]&&(e=A(e[y].concat([e]))),h(e)?e.subarray(t,r===1/0?e.length:r):e.slice(t,r)}async function C(e,t=A){return o(e)?e.readToEnd(t):u(e)?D(e).readToEnd(t):e}async function U(e,t){if(u(e)){if(e.cancel){const r=await e.cancel(t);return await new Promise(setTimeout),r}if(e.destroy)return e.destroy(t),await new Promise(setTimeout),t}}function P(e){const t=new ArrayStream;return(async()=>{const r=x(t);try{await r.write(await e()),await r.close()}catch(e){await r.abort(e)}})(),t}function D(e){return new p(e)}function x(e){return new c(e)}p.prototype.read=async function(){if(this[y]&&this[y].length){return{done:!1,value:this[y].shift()}}return this._read()},p.prototype.releaseLock=function(){this[y]&&(this.stream[y]=this[y]),this._releaseLock()},p.prototype.cancel=function(e){return this._cancel(e)},p.prototype.readLine=async function(){let e,t=[];for(;!e;){let{done:r,value:n}=await this.read();if(n+="",r)return t.length?A(t):void 0;const i=n.indexOf("\n")+1;i&&(e=A(t.concat(n.substr(0,i))),t=[]),i!==n.length&&t.push(n.substr(i))}return this.unshift(...t),e},p.prototype.readByte=async function(){const{done:e,value:t}=await this.read();if(e)return;const r=t[0];return this.unshift(B(t,1)),r},p.prototype.readBytes=async function(e){const t=[];let r=0;for(;;){const{done:n,value:i}=await this.read();if(n)return t.length?A(t):void 0;if(t.push(i),r+=i.length,r>=e){const r=A(t);return this.unshift(B(r,e)),B(r,0,e)}}},p.prototype.peekBytes=async function(e){const t=await this.readBytes(e);return this.unshift(t),t},p.prototype.unshift=function(...e){this[y]||(this[y]=[]),1===e.length&&h(e[0])&&this[y].length&&e[0].length&&this[y][0].byteOffset>=e[0].length?this[y][0]=new Uint8Array(this[y][0].buffer,this[y][0].byteOffset-e[0].length,this[y][0].byteLength+e[0].length):this[y].unshift(...e.filter((e=>e&&e.length)))},p.prototype.readToEnd=async function(e=A){const t=[];for(;;){const{done:e,value:r}=await this.read();if(e)break;t.push(r)}return e(t)};const Q=Symbol("byValue");var R={curve:{nistP256:"nistP256",p256:"nistP256",nistP384:"nistP384",p384:"nistP384",nistP521:"nistP521",p521:"nistP521",secp256k1:"secp256k1",ed25519Legacy:"ed25519Legacy",ed25519:"ed25519Legacy",curve25519Legacy:"curve25519Legacy",curve25519:"curve25519Legacy",brainpoolP256r1:"brainpoolP256r1",brainpoolP384r1:"brainpoolP384r1",brainpoolP512r1:"brainpoolP512r1"},kdfFlags:{replace_fingerprint:1,replace_kdf_params:2},s2k:{simple:0,salted:1,iterated:3,argon2:4,gnu:101},publicKey:{rsaEncryptSign:1,rsaEncrypt:2,rsaSign:3,elgamal:16,dsa:17,ecdh:18,ecdsa:19,eddsaLegacy:22,aedh:23,aedsa:24,x25519:25,x448:26,ed25519:27,ed448:28,pqc_mldsa_ed25519:30,pqc_mlkem_x25519:35,aead:100,hmac:101},symmetric:{idea:1,tripledes:2,cast5:3,blowfish:4,aes128:7,aes192:8,aes256:9,twofish:10},compression:{uncompressed:0,zip:1,zlib:2,bzip2:3},hash:{md5:1,sha1:2,ripemd:3,sha256:8,sha384:9,sha512:10,sha224:11,sha3_256:12,sha3_512:14},webHash:{"SHA-1":2,"SHA-256":8,"SHA-384":9,"SHA-512":10},aead:{eax:1,ocb:2,gcm:3,experimentalGCM:100},packet:{publicKeyEncryptedSessionKey:1,signature:2,symEncryptedSessionKey:3,onePassSignature:4,secretKey:5,publicKey:6,secretSubkey:7,compressedData:8,symmetricallyEncryptedData:9,marker:10,literalData:11,trust:12,userID:13,publicSubkey:14,userAttribute:17,symEncryptedIntegrityProtectedData:18,modificationDetectionCode:19,aeadEncryptedData:20,padding:21},literal:{binary:98,text:116,utf8:117,mime:109},signature:{binary:0,text:1,standalone:2,certGeneric:16,certPersona:17,certCasual:18,certPositive:19,certRevocation:48,subkeyBinding:24,keyBinding:25,key:31,keyRevocation:32,subkeyRevocation:40,timestamp:64,thirdParty:80},signatureSubpacket:{signatureCreationTime:2,signatureExpirationTime:3,exportableCertification:4,trustSignature:5,regularExpression:6,revocable:7,keyExpirationTime:9,placeholderBackwardsCompatibility:10,preferredSymmetricAlgorithms:11,revocationKey:12,issuerKeyID:16,notationData:20,preferredHashAlgorithms:21,preferredCompressionAlgorithms:22,keyServerPreferences:23,preferredKeyServer:24,primaryUserID:25,policyURI:26,keyFlags:27,signersUserID:28,reasonForRevocation:29,features:30,signatureTarget:31,embeddedSignature:32,issuerFingerprint:33,preferredAEADAlgorithms:34,preferredCipherSuites:39},keyFlags:{certifyKeys:1,signData:2,encryptCommunication:4,encryptStorage:8,splitPrivateKey:16,authentication:32,forwardedCommunication:64,sharedPrivateKey:128},armor:{multipartSection:0,multipartLast:1,signed:2,message:3,publicKey:4,privateKey:5,signature:6},reasonForRevocation:{noReason:0,keySuperseded:1,keyCompromised:2,keyRetired:3,userIDInvalid:32},features:{modificationDetection:1,aead:2,v5Keys:4,seipdv2:8},write:function(e,t){if("number"==typeof t&&(t=this.read(e,t)),void 0!==e[t])return e[t];throw Error("Invalid enum value.")},read:function(e,t){if(e[Q]||(e[Q]=[],Object.entries(e).forEach((([t,r])=>{e[Q][r]=t}))),void 0!==e[Q][t])return e[Q][t];throw Error("Invalid enum value.")}},T={preferredHashAlgorithm:R.hash.sha512,preferredSymmetricAlgorithm:R.symmetric.aes256,preferredCompressionAlgorithm:R.compression.uncompressed,aeadProtect:!1,ignoreSEIPDv2FeatureFlag:!1,parseAEADEncryptedV4KeysAsLegacy:!1,preferredAEADAlgorithm:R.aead.gcm,aeadChunkSizeByte:12,v6Keys:!1,enableParsingV5Entities:!1,s2kType:R.s2k.iterated,s2kIterationCountByte:224,s2kArgon2Params:{passes:3,parallelism:4,memoryExponent:16},allowUnauthenticatedMessages:!1,allowUnauthenticatedStream:!1,allowForwardedMessages:!1,minRSABits:2047,passwordCollisionCheck:!1,allowInsecureDecryptionWithSigningKeys:!1,allowInsecureVerificationWithReformattedKeys:!1,allowMissingKeyFlags:!1,constantTimePKCS1Decryption:!1,constantTimePKCS1DecryptionSupportedSymmetricAlgorithms:new Set([R.symmetric.aes128,R.symmetric.aes192,R.symmetric.aes256]),ignoreUnsupportedPackets:!0,ignoreMalformedPackets:!1,enforceGrammar:!0,additionalAllowedPackets:[],showVersion:!1,showComment:!1,versionString:"OpenPGP.js 6.2.2",commentString:"https://openpgpjs.org",maxUserIDLength:5120,knownNotations:[],nonDeterministicSignaturesViaNotation:!0,useEllipticFallback:!0,rejectHashAlgorithms:new Set([R.hash.md5,R.hash.ripemd]),rejectMessageHashAlgorithms:new Set([R.hash.md5,R.hash.ripemd,R.hash.sha1]),rejectPublicKeyAlgorithms:new Set([R.publicKey.elgamal,R.publicKey.dsa]),rejectCurves:new Set([R.curve.secp256k1])};const M=(()=>{try{return"development"===process.env.NODE_ENV}catch(e){}return!1})(),L={isString:function(e){return"string"==typeof e||e instanceof String},nodeRequire:()=>{},isArray:function(e){return e instanceof Array},isUint8Array:h,isStream:u,getNobleCurve:async(e,t)=>{if(!T.useEllipticFallback)throw Error("This curve is only supported in the full build of OpenPGP.js");const{nobleCurves:r}=await Promise.resolve().then((function(){return Tl}));switch(e){case R.publicKey.ecdh:case R.publicKey.ecdsa:{const e=r.get(t);if(!e)throw Error("Unsupported curve");return e}case R.publicKey.x448:return r.get("x448");case R.publicKey.ed448:return r.get("ed448");default:throw Error("Unsupported curve")}},readNumber:function(e){let t=0;for(let r=0;r<e.length;r++)t+=256**r*e[e.length-1-r];return t},writeNumber:function(e,t){const r=new Uint8Array(t);for(let n=0;n<t;n++)r[n]=e>>8*(t-n-1)&255;return r},readDate:function(e){const t=L.readNumber(e);return new Date(1e3*t)},writeDate:function(e){const t=Math.floor(e.getTime()/1e3);return L.writeNumber(t,4)},normalizeDate:function(e=Date.now()){return null===e||e===1/0?e:new Date(1e3*Math.floor(+e/1e3))},readMPI:function(e){const t=(e[0]<<8|e[1])+7>>>3;return L.readExactSubarray(e,2,2+t)},readExactSubarray:function(e,t,r){if(e.length<r-t)throw Error("Input array too short");return e.subarray(t,r)},leftPad(e,t){if(e.length>t)throw Error("Input array too long");const r=new Uint8Array(t),n=t-e.length;return r.set(e,n),r},uint8ArrayToMPI:function(e){const t=L.uint8ArrayBitLength(e);if(0===t)throw Error("Zero MPI");const r=e.subarray(e.length-Math.ceil(t/8)),n=new Uint8Array([(65280&t)>>8,255&t]);return L.concatUint8Array([n,r])},uint8ArrayBitLength:function(e){let t;for(t=0;t<e.length&&0===e[t];t++);if(t===e.length)return 0;const r=e.subarray(t);return 8*(r.length-1)+L.nbits(r[0])},hexToUint8Array:function(e){const t=new Uint8Array(e.length>>1);for(let r=0;r<e.length>>1;r++)t[r]=parseInt(e.substr(r<<1,2),16);return t},uint8ArrayToHex:function(e){const t="0123456789abcdef";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),r},stringToUint8Array:function(e){return k(e,(e=>{if(!L.isString(e))throw Error("stringToUint8Array: Data must be in the form of a string");const t=new Uint8Array(e.length);for(let r=0;r<e.length;r++)t[r]=e.charCodeAt(r);return t}))},uint8ArrayToString:function(e){const t=[],r=16384,n=(e=new Uint8Array(e)).length;for(let i=0;i<n;i+=r)t.push(String.fromCharCode.apply(String,e.subarray(i,i+r<n?i+r:n)));return t.join("")},encodeUTF8:function(e){const t=new TextEncoder("utf-8");function r(e,r=!1){return t.encode(e,{stream:!r})}return k(e,r,(()=>r("",!0)))},decodeUTF8:function(e){const t=new TextDecoder("utf-8");function r(e,r=!1){return t.decode(e,{stream:!r})}return k(e,r,(()=>r(new Uint8Array,!0)))},concat:A,concatUint8Array:l,equalsUint8Array:function(e,t){if(!L.isUint8Array(e)||!L.isUint8Array(t))throw Error("Data must be in the form of a Uint8Array");if(e.length!==t.length)return!1;for(let r=0;r<e.length;r++)if(e[r]!==t[r])return!1;return!0},findLastIndex:function(e,t){for(let r=e.length;r>=0;r--)if(t(e[r],r,e))return r;return-1},writeChecksum:function(e){let t=0;for(let r=0;r<e.length;r++)t=t+e[r]&65535;return L.writeNumber(t,2)},printDebug:function(e){M&&console.log("[OpenPGP.js debug]",e)},printDebugError:function(e){M&&console.error("[OpenPGP.js debug]",e)},nbits:function(e){let t=1,r=e>>>16;return 0!==r&&(e=r,t+=16),r=e>>8,0!==r&&(e=r,t+=8),r=e>>4,0!==r&&(e=r,t+=4),r=e>>2,0!==r&&(e=r,t+=2),r=e>>1,0!==r&&(e=r,t+=1),t},double:function(e){const t=new Uint8Array(e.length),r=e.length-1;for(let n=0;n<r;n++)t[n]=e[n]<<1^e[n+1]>>7;return t[r]=e[r]<<1^135*(e[0]>>7),t},shiftRight:function(e,t){if(t)for(let r=e.length-1;r>=0;r--)e[r]>>=t,r>0&&(e[r]|=e[r-1]<<8-t);return e},getWebCrypto:function(){const e=void 0!==t&&t.crypto&&t.crypto.subtle||this.getNodeCrypto()?.webcrypto.subtle;if(!e)throw Error("The WebCrypto API is not available");return e},getNodeCrypto:function(){return this.nodeRequire("crypto")},getNodeZlib:function(){return this.nodeRequire("zlib")},getNodeBuffer:function(){return(this.nodeRequire("buffer")||{}).Buffer},getHardwareConcurrency:function(){if("undefined"!=typeof navigator)return navigator.hardwareConcurrency||1;return this.nodeRequire("os").cpus().length},isEmailAddress:function(e){if(!L.isString(e))return!1;return/^[^\p{C}\p{Z}@<>\\]+@[^\p{C}\p{Z}@<>\\]+[^\p{C}\p{Z}\p{P}]$/u.test(e)},canonicalizeEOL:function(e){let t=!1;return k(e,(e=>{let r;t&&(e=L.concatUint8Array([new Uint8Array([13]),e])),13===e[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;const n=[];for(let t=0;r=e.indexOf(10,t)+1,r;t=r)13!==e[r-2]&&n.push(r);if(!n.length)return e;const i=new Uint8Array(e.length+n.length);let s=0;for(let t=0;t<n.length;t++){const r=e.subarray(n[t-1]||0,n[t]);i.set(r,s),s+=r.length,i[s-1]=13,i[s]=10,s++}return i.set(e.subarray(n[n.length-1]||0),s),i}),(()=>t?new Uint8Array([13]):void 0))},nativeEOL:function(e){let t=!1;return k(e,(e=>{let r;13===(e=t&&10!==e[0]?L.concatUint8Array([new Uint8Array([13]),e]):new Uint8Array(e))[e.length-1]?(t=!0,e=e.subarray(0,-1)):t=!1;let n=0;for(let t=0;t!==e.length;t=r){r=e.indexOf(13,t)+1,r||(r=e.length);const i=r-(10===e[r]?1:0);t&&e.copyWithin(n,t,i),n+=i-t}return e.subarray(0,n)}),(()=>t?new Uint8Array([13]):void 0))},removeTrailingSpaces:function(e){return e.split("\n").map((e=>{let t=e.length-1;for(;t>=0&&(" "===e[t]||"\t"===e[t]||"\r"===e[t]);t--);return e.substr(0,t+1)})).join("\n")},wrapError:function(e,t){if(!t)return e instanceof Error?e:Error(e);if(e instanceof Error){try{e.message+=": "+t.message,e.cause=t}catch(e){}return e}return Error(e+": "+t.message,{cause:t})},constructAllowedPackets:function(e){const t={};return e.forEach((e=>{if(!e.tag)throw Error("Invalid input: expected a packet class");t[e.tag]=e})),t},anyPromise:function(e){return new Promise((async(t,r)=>{let n;await Promise.all(e.map((async e=>{try{t(await e)}catch(e){n=e}}))),r(n)}))},selectUint8Array:function(e,t,r){const n=Math.max(t.length,r.length),i=new Uint8Array(n);let s=0;for(let n=0;n<i.length;n++)i[n]=t[n]&256-e|r[n]&255+e,s+=e&n<t.length|1-e&n<r.length;return i.subarray(0,s)},selectUint8:function(e,t,r){return t&256-e|r&255+e},isAES:function(e){return e===R.symmetric.aes128||e===R.symmetric.aes192||e===R.symmetric.aes256}},F=L.getNodeBuffer();let O,N;function _(e){let t=new Uint8Array;return k(e,(e=>{t=L.concatUint8Array([t,e]);const r=[],n=Math.floor(t.length/45),i=45*n,s=O(t.subarray(0,i));for(let e=0;e<n;e++)r.push(s.substr(60*e,60)),r.push("\n");return t=t.subarray(i),r.join("")}),(()=>t.length?O(t)+"\n":""))}function H(e){let t="";return k(e,(e=>{t+=e;let r=0;const n=[" ","\t","\r","\n"];for(let e=0;e<n.length;e++){const i=n[e];for(let e=t.indexOf(i);-1!==e;e=t.indexOf(i,e+1))r++}let i=t.length;for(;i>0&&(i-r)%4!=0;i--)n.includes(t[i])&&r--;const s=N(t.substr(0,i));return t=t.substr(i),s}),(()=>N(t)))}function z(e){return H(e.replace(/-/g,"+").replace(/_/g,"/"))}function G(e,t){let r=_(e).replace(/[\r\n]/g,"");return r=r.replace(/[+]/g,"-").replace(/[/]/g,"_").replace(/[=]/g,""),r}function q(e){const t=e.match(/^-----BEGIN PGP (MESSAGE, PART \d+\/\d+|MESSAGE, PART \d+|SIGNED MESSAGE|MESSAGE|PUBLIC KEY BLOCK|PRIVATE KEY BLOCK|SIGNATURE)-----$/m);if(!t)throw Error("Unknown ASCII armor type");return/MESSAGE, PART \d+\/\d+/.test(t[1])?R.armor.multipartSection:/MESSAGE, PART \d+/.test(t[1])?R.armor.multipartLast:/SIGNED MESSAGE/.test(t[1])?R.armor.signed:/MESSAGE/.test(t[1])?R.armor.message:/PUBLIC KEY BLOCK/.test(t[1])?R.armor.publicKey:/PRIVATE KEY BLOCK/.test(t[1])?R.armor.privateKey:/SIGNATURE/.test(t[1])?R.armor.signature:void 0}function j(e,t){let r="";return t.showVersion&&(r+="Version: "+t.versionString+"\n"),t.showComment&&(r+="Comment: "+t.commentString+"\n"),e&&(r+="Comment: "+e+"\n"),r+="\n",r}function V(e){const t=function(e){let t=13501623;return k(e,(e=>{const r=Z?Math.floor(e.length/4):0,n=new Uint32Array(e.buffer,e.byteOffset,r);for(let e=0;e<r;e++)t^=n[e],t=Y[0][t>>24&255]^Y[1][t>>16&255]^Y[2][t>>8&255]^Y[3][255&t];for(let n=4*r;n<e.length;n++)t=t>>8^Y[0][255&t^e[n]]}),(()=>new Uint8Array([t,t>>8,t>>16])))}(e);return _(t)}F?(O=e=>F.from(e).toString("base64"),N=e=>{const t=F.from(e,"base64");return new Uint8Array(t.buffer,t.byteOffset,t.byteLength)}):(O=e=>btoa(L.uint8ArrayToString(e)),N=e=>L.stringToUint8Array(atob(e)));const Y=[Array(255),Array(255),Array(255),Array(255)];for(let e=0;e<=255;e++){let t=e<<16;for(let e=0;e<8;e++)t=t<<1^(8388608&t?8801531:0);Y[0][e]=(16711680&t)>>16|65280&t|(255&t)<<16}for(let e=0;e<=255;e++)Y[1][e]=Y[0][e]>>8^Y[0][255&Y[0][e]];for(let e=0;e<=255;e++)Y[2][e]=Y[1][e]>>8^Y[0][255&Y[1][e]];for(let e=0;e<=255;e++)Y[3][e]=Y[2][e]>>8^Y[0][255&Y[2][e]];const Z=function(){const e=new ArrayBuffer(2);return new DataView(e).setInt16(0,255,!0),255===new Int16Array(e)[0]}();function J(e){for(let t=0;t<e.length;t++)/^([^\s:]|[^\s:][^:]*[^\s:]): .+$/.test(e[t])||L.printDebugError(Error("Improperly formatted armor header: "+e[t])),/^(Version|Comment|MessageID|Hash|Charset): .+$/.test(e[t])||L.printDebugError(Error("Unknown header: "+e[t]))}function X(e){let t=e;const r=e.lastIndexOf("=");return r>=0&&r!==e.length-1&&(t=e.slice(0,r)),t}function W(e){return new Promise((async(t,r)=>{try{const n=/^-----[^-]+-----$/m,i=/^[ \f\r\t\u00a0\u2000-\u200a\u202f\u205f\u3000]*$/;let s;const a=[];let o,c,u=a,h=[];const l=H(E(e,(async(e,f)=>{const y=D(e);try{for(;;){let e=await y.readLine();if(void 0===e)throw Error("Misformed armored text");if(e=L.removeTrailingSpaces(e.replace(/[\r\n]/g,"")),s)if(o)c||s!==R.armor.signed||(n.test(e)?(h=h.join("\r\n"),c=!0,J(u),u=[],o=!1):h.push(e.replace(/^- /,"")));else if(n.test(e)&&r(Error("Mandatory blank line missing between armor headers and armor data")),i.test(e)){if(J(u),o=!0,c||s!==R.armor.signed){t({text:h,data:l,headers:a,type:s});break}}else u.push(e);else n.test(e)&&(s=q(e))}}catch(e){return void r(e)}const p=x(f);try{for(;;){await p.ready;const{done:e,value:t}=await y.read();if(e)throw Error("Misformed armored text");const r=t+"";if(-1!==r.indexOf("=")||-1!==r.indexOf("-")){let e=await y.readToEnd();e.length||(e=""),e=r+e,e=L.removeTrailingSpaces(e.replace(/\r/g,""));const t=e.split(n);if(1===t.length)throw Error("Misformed armored text");const i=X(t[0].slice(0,-1));await p.write(i);break}await p.write(r)}await p.ready,await p.close()}catch(e){await p.abort(e)}})))}catch(e){r(e)}})).then((async e=>(o(e.data)&&(e.data=await C(e.data)),e)))}function $(e,t,r,n,i,s=!1,a=T){let o,c;e===R.armor.signed&&(o=t.text,c=t.hash,t=t.data);const u=s&&S(t),h=[];switch(e){case R.armor.multipartSection:h.push("-----BEGIN PGP MESSAGE, PART "+r+"/"+n+"-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP MESSAGE, PART "+r+"/"+n+"-----\n");break;case R.armor.multipartLast:h.push("-----BEGIN PGP MESSAGE, PART "+r+"-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP MESSAGE, PART "+r+"-----\n");break;case R.armor.signed:h.push("-----BEGIN PGP SIGNED MESSAGE-----\n"),h.push(c?`Hash: ${c}\n\n`:"\n"),h.push(o.replace(/^-/gm,"- -")),h.push("\n-----BEGIN PGP SIGNATURE-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP SIGNATURE-----\n");break;case R.armor.message:h.push("-----BEGIN PGP MESSAGE-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP MESSAGE-----\n");break;case R.armor.publicKey:h.push("-----BEGIN PGP PUBLIC KEY BLOCK-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP PUBLIC KEY BLOCK-----\n");break;case R.armor.privateKey:h.push("-----BEGIN PGP PRIVATE KEY BLOCK-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP PRIVATE KEY BLOCK-----\n");break;case R.armor.signature:h.push("-----BEGIN PGP SIGNATURE-----\n"),h.push(j(i,a)),h.push(_(t)),u&&h.push("=",V(u)),h.push("-----END PGP SIGNATURE-----\n")}return L.concat(h)}const ee=BigInt(0),te=BigInt(1);function re(e){const t="0123456789ABCDEF";let r="";return e.forEach((e=>{r+=t[e>>4]+t[15&e]})),BigInt("0x0"+r)}function ne(e,t){const r=e%t;return r<ee?r+t:r}function ie(e,t,r){if(r===ee)throw Error("Modulo cannot be zero");if(r===te)return BigInt(0);if(t<ee)throw Error("Unsopported negative exponent");let n=t,i=e;i%=r;let s=BigInt(1);for(;n>ee;){const e=n&te;n>>=te;s=e?s*i%r:s,i=i*i%r}return s}function se(e){return e>=ee?e:-e}function ae(e,t){const{gcd:r,x:n}=function(e,t){let r=BigInt(0),n=BigInt(1),i=BigInt(1),s=BigInt(0),a=se(e),o=se(t);const c=e<ee,u=t<ee;for(;o!==ee;){const e=a/o;let t=r;r=i-e*r,i=t,t=n,n=s-e*n,s=t,t=o,o=a%o,a=t}return{x:c?-i:i,y:u?-s:s,gcd:a}}(e,t);if(r!==te)throw Error("Inverse does not exist");return ne(n+t,t)}function oe(e){const t=Number(e);if(t>Number.MAX_SAFE_INTEGER)throw Error("Number can only safely store up to 53 bits");return t}function ce(e,t){return(e>>BigInt(t)&te)===ee?0:1}function ue(e){const t=e<ee?BigInt(-1):ee;let r=1,n=e;for(;(n>>=te)!==t;)r++;return r}function he(e){const t=e<ee?BigInt(-1):ee,r=BigInt(8);let n=1,i=e;for(;(i>>=r)!==t;)n++;return n}function le(e,t="be",r){let n=e.toString(16);n.length%2==1&&(n="0"+n);const i=n.length/2,s=new Uint8Array(r||i),a=r?r-i:0;let o=0;for(;o<i;)s[o+a]=parseInt(n.slice(2*o,2*o+2),16),o++;return"be"!==t&&s.reverse(),s}const fe=L.getNodeCrypto();function ye(e){const t="undefined"!=typeof crypto?crypto:fe?.webcrypto;if(t?.getRandomValues){const r=new Uint8Array(e);return t.getRandomValues(r)}throw Error("No secure random number generator available.")}function pe(e,t){if(t<e)throw Error("Illegal parameter value: max <= min");const r=t-e;return ne(re(ye(he(r)+8)),r)+e}const de=BigInt(1);function ge(e,t,r){const n=BigInt(30),i=de<<BigInt(e-1),s=[1,6,5,4,3,2,1,4,3,2,1,2,1,4,3,2,1,2,1,4,3,2,1,6,5,4,3,2,1,2];let a=pe(i,i<<de),o=oe(ne(a,n));do{a+=BigInt(s[o]),o=(o+s[o])%s.length,ue(a)>e&&(a=ne(a,i<<de),a+=i,o=oe(ne(a,n)))}while(!Ae(a,t,r));return a}function Ae(e,t,r){return(!t||function(e,t){let r=e,n=t;for(;n!==ee;){const e=n;n=r%n,r=e}return r}(e-de,t)===de)&&(!!function(e){const t=BigInt(0);return we.every((r=>ne(e,r)!==t))}(e)&&(!!function(e,t=BigInt(2)){return ie(t,e-de,e)===de}(e)&&!!function(e,t){const r=ue(e);t||(t=Math.max(1,r/48|0));const n=e-de;let i=0;for(;!ce(n,i);)i++;const s=e>>BigInt(i);for(;t>0;t--){let t,r=ie(pe(BigInt(2),n),s,e);if(r!==de&&r!==n){for(t=1;t<i;t++){if(r=ne(r*r,e),r===de)return!1;if(r===n)break}if(t===i)return!1}}return!0}(e,r)))}const we=[7,11,13,17,19,23,29,31,37,41,43,47,53,59,61,67,71,73,79,83,89,97,101,103,107,109,113,127,131,137,139,149,151,157,163,167,173,179,181,191,193,197,199,211,223,227,229,233,239,241,251,257,263,269,271,277,281,283,293,307,311,313,317,331,337,347,349,353,359,367,373,379,383,389,397,401,409,419,421,431,433,439,443,449,457,461,463,467,479,487,491,499,503,509,521,523,541,547,557,563,569,571,577,587,593,599,601,607,613,617,619,631,641,643,647,653,659,661,673,677,683,691,701,709,719,727,733,739,743,751,757,761,769,773,787,797,809,811,821,823,827,829,839,853,857,859,863,877,881,883,887,907,911,919,929,937,941,947,953,967,971,977,983,991,997,1009,1013,1019,1021,1031,1033,1039,1049,1051,1061,1063,1069,1087,1091,1093,1097,1103,1109,1117,1123,1129,1151,1153,1163,1171,1181,1187,1193,1201,1213,1217,1223,1229,1231,1237,1249,1259,1277,1279,1283,1289,1291,1297,1301,1303,1307,1319,1321,1327,1361,1367,1373,1381,1399,1409,1423,1427,1429,1433,1439,1447,1451,1453,1459,1471,1481,1483,1487,1489,1493,1499,1511,1523,1531,1543,1549,1553,1559,1567,1571,1579,1583,1597,1601,1607,1609,1613,1619,1621,1627,1637,1657,1663,1667,1669,1693,1697,1699,1709,1721,1723,1733,1741,1747,1753,1759,1777,1783,1787,1789,1801,1811,1823,1831,1847,1861,1867,1871,1873,1877,1879,1889,1901,1907,1913,1931,1933,1949,1951,1973,1979,1987,1993,1997,1999,2003,2011,2017,2027,2029,2039,2053,2063,2069,2081,2083,2087,2089,2099,2111,2113,2129,2131,2137,2141,2143,2153,2161,2179,2203,2207,2213,2221,2237,2239,2243,2251,2267,2269,2273,2281,2287,2293,2297,2309,2311,2333,2339,2341,2347,2351,2357,2371,2377,2381,2383,2389,2393,2399,2411,2417,2423,2437,2441,2447,2459,2467,2473,2477,2503,2521,2531,2539,2543,2549,2551,2557,2579,2591,2593,2609,2617,2621,2633,2647,2657,2659,2663,2671,2677,2683,2687,2689,2693,2699,2707,2711,2713,2719,2729,2731,2741,2749,2753,2767,2777,2789,2791,2797,2801,2803,2819,2833,2837,2843,2851,2857,2861,2879,2887,2897,2903,2909,2917,2927,2939,2953,2957,2963,2969,2971,2999,3001,3011,3019,3023,3037,3041,3049,3061,3067,3079,3083,3089,3109,3119,3121,3137,3163,3167,3169,3181,3187,3191,3203,3209,3217,3221,3229,3251,3253,3257,3259,3271,3299,3301,3307,3313,3319,3323,3329,3331,3343,3347,3359,3361,3371,3373,3389,3391,3407,3413,3433,3449,3457,3461,3463,3467,3469,3491,3499,3511,3517,3527,3529,3533,3539,3541,3547,3557,3559,3571,3581,3583,3593,3607,3613,3617,3623,3631,3637,3643,3659,3671,3673,3677,3691,3697,3701,3709,3719,3727,3733,3739,3761,3767,3769,3779,3793,3797,3803,3821,3823,3833,3847,3851,3853,3863,3877,3881,3889,3907,3911,3917,3919,3923,3929,3931,3943,3947,3967,3989,4001,4003,4007,4013,4019,4021,4027,4049,4051,4057,4073,4079,4091,4093,4099,4111,4127,4129,4133,4139,4153,4157,4159,4177,4201,4211,4217,4219,4229,4231,4241,4243,4253,4259,4261,4271,4273,4283,4289,4297,4327,4337,4339,4349,4357,4363,4373,4391,4397,4409,4421,4423,4441,4447,4451,4457,4463,4481,4483,4493,4507,4513,4517,4519,4523,4547,4549,4561,4567,4583,4591,4597,4603,4621,4637,4639,4643,4649,4651,4657,4663,4673,4679,4691,4703,4721,4723,4729,4733,4751,4759,4783,4787,4789,4793,4799,4801,4813,4817,4831,4861,4871,4877,4889,4903,4909,4919,4931,4933,4937,4943,4951,4957,4967,4969,4973,4987,4993,4999].map((e=>BigInt(e)));const me=L.getWebCrypto(),be=L.getNodeCrypto(),ke=be&&be.getHashes();function Ee(e){if(be&&ke.includes(e))return async function(t){const r=be.createHash(e);return k(t,(e=>{r.update(e)}),(()=>new Uint8Array(r.digest())))}}function ve(e,t){const r=async()=>{const{nobleHashes:t}=await Promise.resolve().then((function(){return uf})),r=t.get(e);if(!r)throw Error("Unsupported hash");return r};return async function(e){if(o(e)&&(e=await C(e)),L.isStream(e)){const t=(await r()).create();return k(e,(e=>{t.update(e)}),(()=>t.digest()))}if(me&&t)return new Uint8Array(await me.digest(t,e));return(await r())(e)}}const Ke=Ee("md5")||ve("md5"),Se=Ee("sha1")||ve("sha1","SHA-1"),Ie=Ee("sha224")||ve("sha224"),Be=Ee("sha256")||ve("sha256","SHA-256"),Ce=Ee("sha384")||ve("sha384","SHA-384"),Ue=Ee("sha512")||ve("sha512","SHA-512"),Pe=Ee("ripemd160")||ve("ripemd160"),De=Ee("sha3-256")||ve("sha3_256"),xe=Ee("sha3-512")||ve("sha3_512");function Qe(e,t){switch(e){case R.hash.md5:return Ke(t);case R.hash.sha1:return Se(t);case R.hash.ripemd:return Pe(t);case R.hash.sha256:return Be(t);case R.hash.sha384:return Ce(t);case R.hash.sha512:return Ue(t);case R.hash.sha224:return Ie(t);case R.hash.sha3_256:return De(t);case R.hash.sha3_512:return xe(t);default:throw Error("Unsupported hash function")}}function Re(e){switch(e){case R.hash.md5:return 16;case R.hash.sha1:case R.hash.ripemd:return 20;case R.hash.sha256:return 32;case R.hash.sha384:return 48;case R.hash.sha512:return 64;case R.hash.sha224:return 28;case R.hash.sha3_256:return 32;case R.hash.sha3_512:return 64;default:throw Error("Invalid hash algorithm.")}}const Te=[];function Me(e,t){const r=e.length;if(r>t-11)throw Error("Message too long");const n=function(e){const t=new Uint8Array(e);let r=0;for(;r<e;){const n=ye(e-r);for(let e=0;e<n.length;e++)0!==n[e]&&(t[r++]=n[e])}return t}(t-r-3),i=new Uint8Array(t);return i[1]=2,i.set(n,2),i.set(e,t-r),i}function Le(e,t){let r=2,n=1;for(let t=r;t<e.length;t++)n&=0!==e[t],r+=n;const i=r-2,s=e.subarray(r+1),a=0===e[0]&2===e[1]&i>=8&!n;if(t)return L.selectUint8Array(a,s,t);if(a)return s;throw Error("Decryption error")}function Fe(e,t,r){let n;if(t.length!==Re(e))throw Error("Invalid hash length");const i=new Uint8Array(Te[e].length);for(n=0;n<Te[e].length;n++)i[n]=Te[e][n];const s=i.length+t.length;if(r<s+11)throw Error("Intended encoded message length too short");const a=new Uint8Array(r-s-3).fill(255),o=new Uint8Array(r);return o[1]=1,o.set(a,2),o.set(i,r-s),o.set(t,r-t.length),o}Te[1]=[48,32,48,12,6,8,42,134,72,134,247,13,2,5,5,0,4,16],Te[2]=[48,33,48,9,6,5,43,14,3,2,26,5,0,4,20],Te[3]=[48,33,48,9,6,5,43,36,3,2,1,5,0,4,20],Te[8]=[48,49,48,13,6,9,96,134,72,1,101,3,4,2,1,5,0,4,32],Te[9]=[48,65,48,13,6,9,96,134,72,1,101,3,4,2,2,5,0,4,48],Te[10]=[48,81,48,13,6,9,96,134,72,1,101,3,4,2,3,5,0,4,64],Te[11]=[48,45,48,13,6,9,96,134,72,1,101,3,4,2,4,5,0,4,28];const Oe=L.getWebCrypto(),Ne=L.getNodeCrypto(),_e=BigInt(1);async function He(e,t,r,n,i,s,a,o,c){if(Re(e)>=r.length)throw Error("Digest size cannot exceed key modulus size");if(t&&!L.isStream(t))if(L.getWebCrypto())try{return await async function(e,t,r,n,i,s,a,o){const c=await je(r,n,i,s,a,o),u={name:"RSASSA-PKCS1-v1_5",hash:{name:e}},h=await Oe.importKey("jwk",c,u,!1,["sign"]);return new Uint8Array(await Oe.sign("RSASSA-PKCS1-v1_5",h,t))}(R.read(R.webHash,e),t,r,n,i,s,a,o)}catch(e){L.printDebugError(e)}else if(L.getNodeCrypto())return async function(e,t,r,n,i,s,a,o){const c=Ne.createSign(R.read(R.hash,e));c.write(t),c.end();const u=await je(r,n,i,s,a,o);return new Uint8Array(c.sign({key:u,format:"jwk",type:"pkcs1"}))}(e,t,r,n,i,s,a,o);return async function(e,t,r,n){t=re(t);const i=re(Fe(e,n,he(t)));return r=re(r),le(ie(i,r,t),"be",he(t))}(e,r,i,c)}async function ze(e,t,r,n,i,s){if(t&&!L.isStream(t))if(L.getWebCrypto())try{return await async function(e,t,r,n,i){const s=Ve(n,i),a=await Oe.importKey("jwk",s,{name:"RSASSA-PKCS1-v1_5",hash:{name:e}},!1,["verify"]);return Oe.verify("RSASSA-PKCS1-v1_5",a,r,t)}(R.read(R.webHash,e),t,r,n,i)}catch(e){L.printDebugError(e)}else if(L.getNodeCrypto())return async function(e,t,r,n,i){const s=Ve(n,i),a={key:s,format:"jwk",type:"pkcs1"},o=Ne.createVerify(R.read(R.hash,e));o.write(t),o.end();try{return o.verify(a,r)}catch(e){return!1}}(e,t,r,n,i);return async function(e,t,r,n,i){if(r=re(r),t=re(t),n=re(n),t>=r)throw Error("Signature size cannot exceed modulus size");const s=le(ie(t,n,r),"be",he(r)),a=Fe(e,i,he(r));return L.equalsUint8Array(s,a)}(e,r,n,i,s)}async function Ge(e,t,r){return L.getNodeCrypto()?async function(e,t,r){const n=Ve(t,r),i={key:n,format:"jwk",type:"pkcs1",padding:Ne.constants.RSA_PKCS1_PADDING};return new Uint8Array(Ne.publicEncrypt(i,e))}(e,t,r):async function(e,t,r){if(t=re(t),e=re(Me(e,he(t))),r=re(r),e>=t)throw Error("Message size cannot exceed modulus size");return le(ie(e,r,t),"be",he(t))}(e,t,r)}async function qe(e,t,r,n,i,s,a,o){if(L.getNodeCrypto()&&!o)try{return await async function(e,t,r,n,i,s,a){const o=await je(t,r,n,i,s,a),c={key:o,format:"jwk",type:"pkcs1",padding:Ne.constants.RSA_PKCS1_PADDING};try{return new Uint8Array(Ne.privateDecrypt(c,e))}catch(e){throw Error("Decryption error")}}(e,t,r,n,i,s,a)}catch(e){L.printDebugError(e)}return async function(e,t,r,n,i,s,a,o){if(e=re(e),t=re(t),r=re(r),n=re(n),i=re(i),s=re(s),a=re(a),e>=t)throw Error("Data too large.");const c=ne(n,s-_e),u=ne(n,i-_e),h=pe(BigInt(2),t),l=ie(ae(h,t),r,t);e=ne(e*l,t);const f=ie(e,u,i),y=ie(e,c,s),p=ne(a*(y-f),s);let d=p*i+f;return d=ne(d*h,t),Le(le(d,"be",he(t)),o)}(e,t,r,n,i,s,a,o)}async function je(e,t,r,n,i,s){const a=re(n),o=re(i),c=re(r);let u=ne(c,o-_e),h=ne(c,a-_e);return h=le(h),u=le(u),{kty:"RSA",n:G(e),e:G(t),d:G(r),p:G(i),q:G(n),dp:G(u),dq:G(h),qi:G(s),ext:!0}}function Ve(e,t){return{kty:"RSA",n:G(e),e:G(t),ext:!0}}function Ye(e,t){return{n:z(e.n),e:le(t),d:z(e.d),p:z(e.q),q:z(e.p),u:z(e.qi)}}const Ze=BigInt(1);const Je={"2a8648ce3d030107":R.curve.nistP256,"2b81040022":R.curve.nistP384,"2b81040023":R.curve.nistP521,"2b8104000a":R.curve.secp256k1,"2b06010401da470f01":R.curve.ed25519Legacy,"2b060104019755010501":R.curve.curve25519Legacy,"2b2403030208010107":R.curve.brainpoolP256r1,"2b240303020801010b":R.curve.brainpoolP384r1,"2b240303020801010d":R.curve.brainpoolP512r1};class Xe{constructor(e){if(e instanceof Xe)this.oid=e.oid;else if(L.isArray(e)||L.isUint8Array(e)){if(6===(e=new Uint8Array(e))[0]){if(e[1]!==e.length-2)throw Error("Length mismatch in DER encoded oid");e=e.subarray(2)}this.oid=e}else this.oid=""}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.oid=e.subarray(1,1+t),1+this.oid.length}throw Error("Invalid oid")}write(){return L.concatUint8Array([new Uint8Array([this.oid.length]),this.oid])}toHex(){return L.uint8ArrayToHex(this.oid)}getName(){const e=Je[this.toHex()];if(!e)throw Error("Unknown curve object identifier.");return e}}function We(e){let t,r=0;const n=e[0];return n<192?([r]=e,t=1):n<255?(r=(e[0]-192<<8)+e[1]+192,t=2):255===n&&(r=L.readNumber(e.subarray(1,5)),t=5),{len:r,offset:t}}function $e(e){return e<192?new Uint8Array([e]):e>191&&e<8384?new Uint8Array([192+(e-192>>8),e-192&255]):L.concatUint8Array([new Uint8Array([255]),L.writeNumber(e,4)])}function et(e){if(e<0||e>30)throw Error("Partial Length power must be between 1 and 30");return new Uint8Array([224+e])}function tt(e){return new Uint8Array([192|e])}function rt(e,t){return L.concatUint8Array([tt(e),$e(t)])}function nt(e){return[R.packet.literalData,R.packet.compressedData,R.packet.symmetricallyEncryptedData,R.packet.symEncryptedIntegrityProtectedData,R.packet.aeadEncryptedData].includes(e)}async function it(e,t,r){let n,i;try{const s=await e.peekBytes(2);if(!s||s.length<2||!(128&s[0]))throw Error("Error during parsing. This message / key probably does not conform to a valid OpenPGP format.");const a=await e.readByte();let o,c,u=-1,h=-1;h=0,64&a&&(h=1),h?u=63&a:(u=(63&a)>>2,c=3&a);const l=nt(u);let f,y=null;if(t&&l){if("array"===t){const e=new ArrayStream;n=x(e),y=e}else{const e=new TransformStream;n=x(e.writable),y=e.readable}i=r({tag:u,packet:y})}else y=[];do{if(h){const t=await e.readByte();if(f=!1,t<192)o=t;else if(t>=192&&t<224)o=(t-192<<8)+await e.readByte()+192;else if(t>223&&t<255){if(o=1<<(31&t),f=!0,!l)throw new TypeError("This packet type does not support partial lengths.")}else o=await e.readByte()<<24|await e.readByte()<<16|await e.readByte()<<8|await e.readByte()}else switch(c){case 0:o=await e.readByte();break;case 1:o=await e.readByte()<<8|await e.readByte();break;case 2:o=await e.readByte()<<24|await e.readByte()<<16|await e.readByte()<<8|await e.readByte();break;default:o=1/0}if(o>0){let t=0;for(;;){n&&await n.ready;const{done:r,value:i}=await e.read();if(r){if(o===1/0)break;throw Error("Unexpected end of packet")}const s=o===1/0?i:i.subarray(0,o-t);if(n?await n.write(s):y.push(s),t+=i.length,t>=o){e.unshift(i.subarray(o-t+i.length));break}}}}while(f);n?(await n.ready,await n.close()):(y=L.concatUint8Array(y),await r({tag:u,packet:y}))}catch(e){if(n)return await n.abort(e),!0;throw e}finally{n&&await i}}class st extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,st),this.name="UnsupportedError"}}class at extends st{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,st),this.name="UnknownPacketError"}}class ot extends st{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,st),this.name="MalformedPacketError"}}class ct{constructor(e,t){this.tag=e,this.rawContent=t}write(){return this.rawContent}}async function ut(e){switch(e){case R.publicKey.ed25519:try{const e=L.getWebCrypto(),t=await e.generateKey("Ed25519",!0,["sign","verify"]).catch((e=>{if("OperationError"===e.name){const e=Error("Unexpected key generation issue");throw e.name="NotSupportedError",e}throw e})),r=await e.exportKey("jwk",t.privateKey),n=await e.exportKey("jwk",t.publicKey);return{A:new Uint8Array(z(n.x)),seed:z(r.d)}}catch(t){if("NotSupportedError"!==t.name)throw t;const{default:r}=await Promise.resolve().then((function(){return ey})),n=ye(yt(e)),{publicKey:i}=r.sign.keyPair.fromSeed(n);return{A:i,seed:n}}case R.publicKey.ed448:{const e=await L.getNobleCurve(R.publicKey.ed448),{secretKey:t,publicKey:r}=e.keygen();return{A:r,seed:t}}default:throw Error("Unsupported EdDSA algorithm")}}async function ht(e,t,r,n,i,s){switch(e){case R.publicKey.ed25519:try{const t=L.getWebCrypto(),r=gt(e,n,i),a=await t.importKey("jwk",r,"Ed25519",!1,["sign"]);return{RS:new Uint8Array(await t.sign("Ed25519",a,s))}}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:t}=await Promise.resolve().then((function(){return ey})),r=L.concatUint8Array([i,n]);return{RS:t.sign.detached(s,r)}}case R.publicKey.ed448:return{RS:(await L.getNobleCurve(R.publicKey.ed448)).sign(s,i)};default:throw Error("Unsupported EdDSA algorithm")}}async function lt(e,t,{RS:r},n,i,s){switch(e){case R.publicKey.ed25519:try{const t=L.getWebCrypto(),n=dt(e,i),a=await t.importKey("jwk",n,"Ed25519",!1,["verify"]);return await t.verify("Ed25519",a,r,s)}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:t}=await Promise.resolve().then((function(){return ey}));return t.sign.detached.verify(s,r,i)}case R.publicKey.ed448:return(await L.getNobleCurve(R.publicKey.ed448)).verify(r,s,i);default:throw Error("Unsupported EdDSA algorithm")}}async function ft(e,t,r){switch(e){case R.publicKey.ed25519:try{const n=L.getWebCrypto(),i=gt(e,t,r),s=dt(e,t),a=await n.importKey("jwk",i,"Ed25519",!1,["sign"]),o=await n.importKey("jwk",s,"Ed25519",!1,["verify"]),c=ye(8),u=new Uint8Array(await n.sign("Ed25519",a,c));return await n.verify("Ed25519",o,u,c)}catch(e){if("NotSupportedError"!==e.name)return!1;const{default:n}=await Promise.resolve().then((function(){return ey})),{publicKey:i}=n.sign.keyPair.fromSeed(r);return L.equalsUint8Array(t,i)}case R.publicKey.ed448:{const e=(await L.getNobleCurve(R.publicKey.ed448)).getPublicKey(r);return L.equalsUint8Array(t,e)}default:return!1}}function yt(e){switch(e){case R.publicKey.ed25519:return 32;case R.publicKey.ed448:return 57;default:throw Error("Unsupported EdDSA algorithm")}}function pt(e){switch(e){case R.publicKey.ed25519:return R.hash.sha256;case R.publicKey.ed448:return R.hash.sha512;default:throw Error("Unknown EdDSA algo")}}const dt=(e,t)=>{if(e===R.publicKey.ed25519){return{kty:"OKP",crv:"Ed25519",x:G(t),ext:!0}}throw Error("Unsupported EdDSA algorithm")},gt=(e,t,r)=>{if(e===R.publicKey.ed25519){const n=dt(e,t);return n.d=G(r),n}throw Error("Unsupported EdDSA algorithm")};var At=/*#__PURE__*/Object.freeze({__proto__:null,generate:ut,getPayloadSize:yt,getPreferredHashAlgo:pt,sign:ht,validateParams:ft,verify:lt});
3
+ /*! noble-ciphers - MIT License (c) 2023 Paul Miller (paulmillr.com) */function wt(e){return e instanceof Uint8Array||ArrayBuffer.isView(e)&&"Uint8Array"===e.constructor.name}function mt(e,...t){if(!wt(e))throw Error("Uint8Array expected");if(t.length>0&&!t.includes(e.length))throw Error("Uint8Array expected of length "+t+", got length="+e.length)}function bt(e,t=!0){if(e.destroyed)throw Error("Hash instance has been destroyed");if(t&&e.finished)throw Error("Hash#digest() has already been called")}function kt(e,t){mt(e);const r=t.outputLen;if(e.length<r)throw Error("digestInto() expects output buffer of length at least "+r)}function Et(e){return new Uint8Array(e.buffer,e.byteOffset,e.byteLength)}function vt(e){return new Uint32Array(e.buffer,e.byteOffset,Math.floor(e.byteLength/4))}function Kt(...e){for(let t=0;t<e.length;t++)e[t].fill(0)}function St(e){return new DataView(e.buffer,e.byteOffset,e.byteLength)}const It=/* @__PURE__ */(()=>68===new Uint8Array(new Uint32Array([287454020]).buffer)[0])();function Bt(e){if("string"==typeof e)e=function(e){if("string"!=typeof e)throw Error("string expected");return new Uint8Array((new TextEncoder).encode(e))}(e);else{if(!wt(e))throw Error("Uint8Array expected, got "+typeof e);e=Tt(e)}return e}function Ct(e,t){return e.buffer===t.buffer&&e.byteOffset<t.byteOffset+t.byteLength&&t.byteOffset<e.byteOffset+e.byteLength}function Ut(e,t){if(Ct(e,t)&&e.byteOffset<t.byteOffset)throw Error("complex overlap of input and output is not supported")}function Pt(e,t){if(e.length!==t.length)return!1;let r=0;for(let n=0;n<e.length;n++)r|=e[n]^t[n];return 0===r}const Dt=(e,t)=>{function r(r,...n){if(mt(r),!It)throw Error("Non little-endian hardware is not yet supported");if(void 0!==e.nonceLength){const t=n[0];if(!t)throw Error("nonce / iv required");e.varSizeNonce?mt(t):mt(t,e.nonceLength)}const i=e.tagLength;i&&void 0!==n[1]&&mt(n[1]);const s=t(r,...n),a=(e,t)=>{if(void 0!==t){if(2!==e)throw Error("cipher output not supported");mt(t)}};let o=!1;return{encrypt(e,t){if(o)throw Error("cannot encrypt() twice with same key + nonce");return o=!0,mt(e),a(s.encrypt.length,t),s.encrypt(e,t)},decrypt(e,t){if(mt(e),i&&e.length<i)throw Error("invalid ciphertext length: smaller than tagLength="+i);return a(s.decrypt.length,t),s.decrypt(e,t)}}}return Object.assign(r,e),r};function xt(e,t,r=!0){if(void 0===t)return new Uint8Array(e);if(t.length!==e)throw Error("invalid output length, expected "+e+", got: "+t.length);if(r&&!Rt(t))throw Error("invalid output, must be aligned");return t}function Qt(e,t,r,n){if("function"==typeof e.setBigUint64)return e.setBigUint64(t,r,n);const i=BigInt(32),s=BigInt(4294967295),a=Number(r>>i&s),o=Number(r&s);e.setUint32(t+0,a,n),e.setUint32(t+4,o,n)}function Rt(e){return e.byteOffset%4==0}function Tt(e){return Uint8Array.from(e)}const Mt=16,Lt=/* @__PURE__ */new Uint8Array(16),Ft=vt(Lt),Ot=e=>(e>>>0&255)<<24|(e>>>8&255)<<16|(e>>>16&255)<<8|e>>>24&255;class Nt{constructor(e,t){this.blockLen=Mt,this.outputLen=Mt,this.s0=0,this.s1=0,this.s2=0,this.s3=0,this.finished=!1,mt(e=Bt(e),16);const r=St(e);let n=r.getUint32(0,!1),i=r.getUint32(4,!1),s=r.getUint32(8,!1),a=r.getUint32(12,!1);const o=[];for(let e=0;e<128;e++)o.push({s0:Ot(n),s1:Ot(i),s2:Ot(s),s3:Ot(a)}),({s0:n,s1:i,s2:s,s3:a}={s3:(h=s)<<31|(l=a)>>>1,s2:(u=i)<<31|h>>>1,s1:(c=n)<<31|u>>>1,s0:c>>>1^225<<24&-(1&l)});var c,u,h,l;const f=(y=t||1024)>65536?8:y>1024?4:2;var y;if(![1,2,4,8].includes(f))throw Error("ghash: invalid window size, expected 2, 4 or 8");this.W=f;const p=128/f,d=this.windowSize=2**f,g=[];for(let e=0;e<p;e++)for(let t=0;t<d;t++){let r=0,n=0,i=0,s=0;for(let a=0;a<f;a++){if(!(t>>>f-a-1&1))continue;const{s0:c,s1:u,s2:h,s3:l}=o[f*e+a];r^=c,n^=u,i^=h,s^=l}g.push({s0:r,s1:n,s2:i,s3:s})}this.t=g}_updateBlock(e,t,r,n){e^=this.s0,t^=this.s1,r^=this.s2,n^=this.s3;const{W:i,t:s,windowSize:a}=this;let o=0,c=0,u=0,h=0;const l=(1<<i)-1;let f=0;for(const y of[e,t,r,n])for(let e=0;e<4;e++){const t=y>>>8*e&255;for(let e=8/i-1;e>=0;e--){const r=t>>>i*e&l,{s0:n,s1:y,s2:p,s3:d}=s[f*a+r];o^=n,c^=y,u^=p,h^=d,f+=1}}this.s0=o,this.s1=c,this.s2=u,this.s3=h}update(e){bt(this),mt(e=Bt(e));const t=vt(e),r=Math.floor(e.length/Mt),n=e.length%Mt;for(let e=0;e<r;e++)this._updateBlock(t[4*e+0],t[4*e+1],t[4*e+2],t[4*e+3]);return n&&(Lt.set(e.subarray(r*Mt)),this._updateBlock(Ft[0],Ft[1],Ft[2],Ft[3]),Kt(Ft)),this}destroy(){const{t:e}=this;for(const t of e)t.s0=0,t.s1=0,t.s2=0,t.s3=0}digestInto(e){bt(this),kt(e,this),this.finished=!0;const{s0:t,s1:r,s2:n,s3:i}=this,s=vt(e);return s[0]=t,s[1]=r,s[2]=n,s[3]=i,e}digest(){const e=new Uint8Array(Mt);return this.digestInto(e),this.destroy(),e}}class _t extends Nt{constructor(e,t){mt(e=Bt(e));const r=function(e){e.reverse();const t=1&e[15];let r=0;for(let t=0;t<e.length;t++){const n=e[t];e[t]=n>>>1|r,r=(1&n)<<7}return e[0]^=225&-t,e}(Tt(e));super(r,t),Kt(r)}update(e){e=Bt(e),bt(this);const t=vt(e),r=e.length%Mt,n=Math.floor(e.length/Mt);for(let e=0;e<n;e++)this._updateBlock(Ot(t[4*e+3]),Ot(t[4*e+2]),Ot(t[4*e+1]),Ot(t[4*e+0]));return r&&(Lt.set(e.subarray(n*Mt)),this._updateBlock(Ot(Ft[3]),Ot(Ft[2]),Ot(Ft[1]),Ot(Ft[0])),Kt(Ft)),this}digestInto(e){bt(this),kt(e,this),this.finished=!0;const{s0:t,s1:r,s2:n,s3:i}=this,s=vt(e);return s[0]=t,s[1]=r,s[2]=n,s[3]=i,e.reverse()}}function Ht(e){const t=(t,r)=>e(r,t.length).update(Bt(t)).digest(),r=e(new Uint8Array(16),0);return t.outputLen=r.outputLen,t.blockLen=r.blockLen,t.create=(t,r)=>e(t,r),t}const zt=Ht(((e,t)=>new Nt(e,t)));Ht(((e,t)=>new _t(e,t)));const Gt=16,qt=/* @__PURE__ */new Uint8Array(Gt);function jt(e){return e<<1^283&-(e>>7)}function Vt(e,t){let r=0;for(;t>0;t>>=1)r^=e&-(1&t),e=jt(e);return r}const Yt=/* @__PURE__ */(()=>{const e=new Uint8Array(256);for(let t=0,r=1;t<256;t++,r^=jt(r))e[t]=r;const t=new Uint8Array(256);t[0]=99;for(let r=0;r<255;r++){let n=e[255-r];n|=n<<8,t[e[r]]=255&(n^n>>4^n>>5^n>>6^n>>7^99)}return Kt(e),t})(),Zt=/* @__PURE__ */Yt.map(((e,t)=>Yt.indexOf(t))),Jt=e=>e<<8|e>>>24,Xt=e=>e<<24&4278190080|e<<8&16711680|e>>>8&65280|e>>>24&255;function Wt(e,t){if(256!==e.length)throw Error("Wrong sbox length");const r=new Uint32Array(256).map(((r,n)=>t(e[n]))),n=r.map(Jt),i=n.map(Jt),s=i.map(Jt),a=new Uint32Array(65536),o=new Uint32Array(65536),c=new Uint16Array(65536);for(let t=0;t<256;t++)for(let u=0;u<256;u++){const h=256*t+u;a[h]=r[t]^n[u],o[h]=i[t]^s[u],c[h]=e[t]<<8|e[u]}return{sbox:e,sbox2:c,T0:r,T1:n,T2:i,T3:s,T01:a,T23:o}}const $t=/* @__PURE__ */Wt(Yt,(e=>Vt(e,3)<<24|e<<16|e<<8|Vt(e,2))),er=/* @__PURE__ */Wt(Zt,(e=>Vt(e,11)<<24|Vt(e,13)<<16|Vt(e,9)<<8|Vt(e,14))),tr=/* @__PURE__ */(()=>{const e=new Uint8Array(16);for(let t=0,r=1;t<16;t++,r=jt(r))e[t]=r;return e})();function rr(e){mt(e);const t=e.length;if(![16,24,32].includes(t))throw Error("aes: invalid key size, should be 16, 24 or 32, got "+t);const{sbox2:r}=$t,n=[];Rt(e)||n.push(e=Tt(e));const i=vt(e),s=i.length,a=e=>sr(r,e,e,e,e),o=new Uint32Array(t+28);o.set(i);for(let e=s;e<o.length;e++){let t=o[e-1];e%s==0?t=a((c=t)<<24|c>>>8)^tr[e/s-1]:s>6&&e%s==4&&(t=a(t)),o[e]=o[e-s]^t}var c;return Kt(...n),o}function nr(e){const t=rr(e),r=t.slice(),n=t.length,{sbox2:i}=$t,{T0:s,T1:a,T2:o,T3:c}=er;for(let e=0;e<n;e+=4)for(let i=0;i<4;i++)r[e+i]=t[n-e-4+i];Kt(t);for(let e=4;e<n-4;e++){const t=r[e],n=sr(i,t,t,t,t);r[e]=s[255&n]^a[n>>>8&255]^o[n>>>16&255]^c[n>>>24]}return r}function ir(e,t,r,n,i,s){return e[r<<8&65280|n>>>8&255]^t[i>>>8&65280|s>>>24&255]}function sr(e,t,r,n,i){return e[255&t|65280&r]|e[n>>>16&255|i>>>16&65280]<<16}function ar(e,t,r,n,i){const{sbox2:s,T01:a,T23:o}=$t;let c=0;t^=e[c++],r^=e[c++],n^=e[c++],i^=e[c++];const u=e.length/4-2;for(let s=0;s<u;s++){const s=e[c++]^ir(a,o,t,r,n,i),u=e[c++]^ir(a,o,r,n,i,t),h=e[c++]^ir(a,o,n,i,t,r),l=e[c++]^ir(a,o,i,t,r,n);t=s,r=u,n=h,i=l}return{s0:e[c++]^sr(s,t,r,n,i),s1:e[c++]^sr(s,r,n,i,t),s2:e[c++]^sr(s,n,i,t,r),s3:e[c++]^sr(s,i,t,r,n)}}function or(e,t,r,n,i){const{sbox2:s,T01:a,T23:o}=er;let c=0;t^=e[c++],r^=e[c++],n^=e[c++],i^=e[c++];const u=e.length/4-2;for(let s=0;s<u;s++){const s=e[c++]^ir(a,o,t,i,n,r),u=e[c++]^ir(a,o,r,t,i,n),h=e[c++]^ir(a,o,n,r,t,i),l=e[c++]^ir(a,o,i,n,r,t);t=s,r=u,n=h,i=l}return{s0:e[c++]^sr(s,t,i,n,r),s1:e[c++]^sr(s,r,t,i,n),s2:e[c++]^sr(s,n,r,t,i),s3:e[c++]^sr(s,i,n,r,t)}}function cr(e,t,r,n){mt(t,Gt),mt(r);const i=r.length;Ut(r,n=xt(i,n));const s=t,a=vt(s);let{s0:o,s1:c,s2:u,s3:h}=ar(e,a[0],a[1],a[2],a[3]);const l=vt(r),f=vt(n);for(let t=0;t+4<=l.length;t+=4){f[t+0]=l[t+0]^o,f[t+1]=l[t+1]^c,f[t+2]=l[t+2]^u,f[t+3]=l[t+3]^h;let r=1;for(let e=s.length-1;e>=0;e--)r=r+(255&s[e])|0,s[e]=255&r,r>>>=8;({s0:o,s1:c,s2:u,s3:h}=ar(e,a[0],a[1],a[2],a[3]))}const y=Gt*Math.floor(l.length/4);if(y<i){const e=new Uint32Array([o,c,u,h]),t=Et(e);for(let e=y,s=0;e<i;e++,s++)n[e]=r[e]^t[s];Kt(e)}return n}function ur(e,t,r,n,i){mt(r,Gt),mt(n),i=xt(n.length,i);const s=r,a=vt(s),o=St(s),c=vt(n),u=vt(i),h=t?0:12,l=n.length;let f=o.getUint32(h,t),{s0:y,s1:p,s2:d,s3:g}=ar(e,a[0],a[1],a[2],a[3]);for(let r=0;r+4<=c.length;r+=4)u[r+0]=c[r+0]^y,u[r+1]=c[r+1]^p,u[r+2]=c[r+2]^d,u[r+3]=c[r+3]^g,f=f+1>>>0,o.setUint32(h,f,t),({s0:y,s1:p,s2:d,s3:g}=ar(e,a[0],a[1],a[2],a[3]));const A=Gt*Math.floor(c.length/4);if(A<l){const e=new Uint32Array([y,p,d,g]),t=Et(e);for(let e=A,r=0;e<l;e++,r++)i[e]=n[e]^t[r];Kt(e)}return i}const hr=/* @__PURE__ */Dt({blockSize:16,nonceLength:16},(function(e,t){function r(r,n){if(mt(r),void 0!==n&&(mt(n),!Rt(n)))throw Error("unaligned destination");const i=rr(e),s=Tt(t),a=[i,s];Rt(r)||a.push(r=Tt(r));const o=cr(i,s,r,n);return Kt(...a),o}return{encrypt:(e,t)=>r(e,t),decrypt:(e,t)=>r(e,t)}}));const lr=/* @__PURE__ */Dt({blockSize:16,nonceLength:16},(function(e,t,r={}){const n=!r.disablePadding;return{encrypt(r,i){const s=rr(e),{b:a,o,out:c}=function(e,t,r){mt(e);let n=e.length;const i=n%Gt;if(!t&&0!==i)throw Error("aec/(cbc-ecb): unpadded plaintext with disabled padding");Rt(e)||(e=Tt(e));const s=vt(e);if(t){let e=Gt-i;e||(e=Gt),n+=e}return Ut(e,r=xt(n,r)),{b:s,o:vt(r),out:r}}(r,n,i);let u=t;const h=[s];Rt(u)||h.push(u=Tt(u));const l=vt(u);let f=l[0],y=l[1],p=l[2],d=l[3],g=0;for(;g+4<=a.length;)f^=a[g+0],y^=a[g+1],p^=a[g+2],d^=a[g+3],({s0:f,s1:y,s2:p,s3:d}=ar(s,f,y,p,d)),o[g++]=f,o[g++]=y,o[g++]=p,o[g++]=d;if(n){const e=function(e){const t=new Uint8Array(16),r=vt(t);t.set(e);const n=Gt-e.length;for(let e=Gt-n;e<Gt;e++)t[e]=n;return r}(r.subarray(4*g));f^=e[0],y^=e[1],p^=e[2],d^=e[3],({s0:f,s1:y,s2:p,s3:d}=ar(s,f,y,p,d)),o[g++]=f,o[g++]=y,o[g++]=p,o[g++]=d}return Kt(...h),c},decrypt(r,i){!function(e){if(mt(e),e.length%Gt!=0)throw Error("aes-(cbc/ecb).decrypt ciphertext should consist of blocks with size 16")}(r);const s=nr(e);let a=t;const o=[s];Rt(a)||o.push(a=Tt(a));const c=vt(a);i=xt(r.length,i),Rt(r)||o.push(r=Tt(r)),Ut(r,i);const u=vt(r),h=vt(i);let l=c[0],f=c[1],y=c[2],p=c[3];for(let e=0;e+4<=u.length;){const t=l,r=f,n=y,i=p;l=u[e+0],f=u[e+1],y=u[e+2],p=u[e+3];const{s0:a,s1:o,s2:c,s3:d}=or(s,l,f,y,p);h[e++]=a^t,h[e++]=o^r,h[e++]=c^n,h[e++]=d^i}return Kt(...o),function(e,t){if(!t)return e;const r=e.length;if(!r)throw Error("aes/pcks5: empty ciphertext not allowed");const n=e[r-1];if(n<=0||n>16)throw Error("aes/pcks5: wrong padding");const i=e.subarray(0,-n);for(let t=0;t<n;t++)if(e[r-t-1]!==n)throw Error("aes/pcks5: wrong padding");return i}(i,n)}}})),fr=/* @__PURE__ */Dt({blockSize:16,nonceLength:16},(function(e,t){function r(r,n,i){mt(r);const s=r.length;if(Ct(r,i=xt(s,i)))throw Error("overlapping src and dst not supported.");const a=rr(e);let o=t;const c=[a];Rt(o)||c.push(o=Tt(o)),Rt(r)||c.push(r=Tt(r));const u=vt(r),h=vt(i),l=n?h:u,f=vt(o);let y=f[0],p=f[1],d=f[2],g=f[3];for(let e=0;e+4<=u.length;){const{s0:t,s1:r,s2:n,s3:i}=ar(a,y,p,d,g);h[e+0]=u[e+0]^t,h[e+1]=u[e+1]^r,h[e+2]=u[e+2]^n,h[e+3]=u[e+3]^i,y=l[e++],p=l[e++],d=l[e++],g=l[e++]}const A=Gt*Math.floor(u.length/4);if(A<s){({s0:y,s1:p,s2:d,s3:g}=ar(a,y,p,d,g));const e=Et(new Uint32Array([y,p,d,g]));for(let t=A,n=0;t<s;t++,n++)i[t]=r[t]^e[n];Kt(e)}return Kt(...c),i}return{encrypt:(e,t)=>r(e,!0,t),decrypt:(e,t)=>r(e,!1,t)}}));function yr(e,t,r,n,i){const s=i?i.length:0,a=e.create(r,n.length+s);i&&a.update(i);const o=function(e,t,r){const n=new Uint8Array(16),i=St(n);return Qt(i,0,BigInt(t),r),Qt(i,8,BigInt(e),r),n}(8*n.length,8*s,t);a.update(n),a.update(o);const c=a.digest();return Kt(o),c}const pr=/* @__PURE__ */Dt({blockSize:16,nonceLength:12,tagLength:16,varSizeNonce:!0},(function(e,t,r){if(t.length<8)throw Error("aes/gcm: invalid nonce length");function n(e,t,n){const i=yr(zt,!1,e,n,r);for(let e=0;e<t.length;e++)i[e]^=t[e];return i}function i(){const r=rr(e),n=qt.slice(),i=qt.slice();if(ur(r,!1,i,i,n),12===t.length)i.set(t);else{const e=qt.slice();Qt(St(e),8,BigInt(8*t.length),!1);const r=zt.create(n).update(t).update(e);r.digestInto(i),r.destroy()}return{xk:r,authKey:n,counter:i,tagMask:ur(r,!1,i,qt)}}return{encrypt(e){const{xk:t,authKey:r,counter:s,tagMask:a}=i(),o=new Uint8Array(e.length+16),c=[t,r,s,a];Rt(e)||c.push(e=Tt(e)),ur(t,!1,s,e,o.subarray(0,e.length));const u=n(r,a,o.subarray(0,o.length-16));return c.push(u),o.set(u,e.length),Kt(...c),o},decrypt(e){const{xk:t,authKey:r,counter:s,tagMask:a}=i(),o=[t,r,a,s];Rt(e)||o.push(e=Tt(e));const c=e.subarray(0,-16),u=e.subarray(-16),h=n(r,a,c);if(o.push(h),!Pt(h,u))throw Error("aes/gcm: invalid ghash tag");const l=ur(t,!1,s,c);return Kt(...o),l}}}));function dr(e){return e instanceof Uint32Array||ArrayBuffer.isView(e)&&"Uint32Array"===e.constructor.name}function gr(e,t){if(mt(t,16),!dr(e))throw Error("_encryptBlock accepts result of expandKeyLE");const r=vt(t);let{s0:n,s1:i,s2:s,s3:a}=ar(e,r[0],r[1],r[2],r[3]);return r[0]=n,r[1]=i,r[2]=s,r[3]=a,t}function Ar(e,t){if(mt(t,16),!dr(e))throw Error("_decryptBlock accepts result of expandKeyLE");const r=vt(t);let{s0:n,s1:i,s2:s,s3:a}=or(e,r[0],r[1],r[2],r[3]);return r[0]=n,r[1]=i,r[2]=s,r[3]=a,t}const wr={encrypt(e,t){if(t.length>=2**32)throw Error("plaintext should be less than 4gb");const r=rr(e);if(16===t.length)gr(r,t);else{const e=vt(t);let n=e[0],i=e[1];for(let t=0,s=1;t<6;t++)for(let t=2;t<e.length;t+=2,s++){const{s0:a,s1:o,s2:c,s3:u}=ar(r,n,i,e[t],e[t+1]);n=a,i=o^Xt(s),e[t]=c,e[t+1]=u}e[0]=n,e[1]=i}r.fill(0)},decrypt(e,t){if(t.length-8>=2**32)throw Error("ciphertext should be less than 4gb");const r=nr(e),n=t.length/8-1;if(1===n)Ar(r,t);else{const e=vt(t);let i=e[0],s=e[1];for(let t=0,a=6*n;t<6;t++)for(let t=2*n;t>=1;t-=2,a--){s^=Xt(a);const{s0:n,s1:o,s2:c,s3:u}=or(r,i,s,e[t],e[t+1]);i=n,s=o,e[t]=c,e[t+1]=u}e[0]=i,e[1]=s}r.fill(0)}},mr=/* @__PURE__ */new Uint8Array(8).fill(166),br=/* @__PURE__ */Dt({blockSize:8},(e=>({encrypt(t){if(!t.length||t.length%8!=0)throw Error("invalid plaintext length");if(8===t.length)throw Error("8-byte keys not allowed in AESKW, use AESKWP instead");const r=function(...e){let t=0;for(let r=0;r<e.length;r++){const n=e[r];mt(n),t+=n.length}const r=new Uint8Array(t);for(let t=0,n=0;t<e.length;t++){const i=e[t];r.set(i,n),n+=i.length}return r}(mr,t);return wr.encrypt(e,r),r},decrypt(t){if(t.length%8!=0||t.length<24)throw Error("invalid ciphertext length");const r=Tt(t);if(wr.decrypt(e,r),!Pt(r.subarray(0,8),mr))throw Error("integrity check failed");return r.subarray(0,8).fill(0),r.subarray(8)}}))),kr={expandKeyLE:rr,expandKeyDecLE:nr,encrypt:ar,decrypt:or,encryptBlock:gr,decryptBlock:Ar,ctrCounter:cr,ctr32:ur};async function Er(e){switch(e){case R.symmetric.aes128:case R.symmetric.aes192:case R.symmetric.aes256:throw Error("Not a legacy cipher");case R.symmetric.cast5:case R.symmetric.blowfish:case R.symmetric.twofish:case R.symmetric.tripledes:{const{legacyCiphers:t}=await Promise.resolve().then((function(){return dy})),r=R.read(R.symmetric,e),n=t.get(r);if(!n)throw Error("Unsupported cipher algorithm");return n}default:throw Error("Unsupported cipher algorithm")}}function vr(e){switch(e){case R.symmetric.aes128:case R.symmetric.aes192:case R.symmetric.aes256:case R.symmetric.twofish:return 16;case R.symmetric.blowfish:case R.symmetric.cast5:case R.symmetric.tripledes:return 8;default:throw Error("Unsupported cipher")}}function Kr(e){switch(e){case R.symmetric.aes128:case R.symmetric.blowfish:case R.symmetric.cast5:return 16;case R.symmetric.aes192:case R.symmetric.tripledes:return 24;case R.symmetric.aes256:case R.symmetric.twofish:return 32;default:throw Error("Unsupported cipher")}}function Sr(e){return{keySize:Kr(e),blockSize:vr(e)}}const Ir=L.getWebCrypto();async function Br(e,t,r){const{keySize:n}=Sr(e);if(!L.isAES(e)||t.length!==n)throw Error("Unexpected algorithm or key size");try{const e=await Ir.importKey("raw",t,{name:"AES-KW"},!1,["wrapKey"]),n=await Ir.importKey("raw",r,{name:"HMAC",hash:"SHA-256"},!0,["sign"]),i=await Ir.wrapKey("raw",n,e,{name:"AES-KW"});return new Uint8Array(i)}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;L.printDebugError("Browser did not support operation: "+e.message)}return br(t).encrypt(r)}async function Cr(e,t,r){const{keySize:n}=Sr(e);if(!L.isAES(e)||t.length!==n)throw Error("Unexpected algorithm or key size");let i;try{i=await Ir.importKey("raw",t,{name:"AES-KW"},!1,["unwrapKey"])}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;return L.printDebugError("Browser did not support operation: "+e.message),br(t).decrypt(r)}try{const e=await Ir.unwrapKey("raw",r,i,{name:"AES-KW"},{name:"HMAC",hash:"SHA-256"},!0,["sign"]);return new Uint8Array(await Ir.exportKey("raw",e))}catch(e){if("OperationError"===e.name)throw Error("Key Data Integrity failed");throw e}}async function Ur(e,t,r,n,i){const s=L.getWebCrypto(),a=R.read(R.webHash,e);if(!a)throw Error("Hash algo not supported with HKDF");const o=await s.importKey("raw",t,"HKDF",!1,["deriveBits"]),c=await s.deriveBits({name:"HKDF",hash:a,salt:r,info:n},o,8*i);return new Uint8Array(c)}const Pr={x25519:L.encodeUTF8("OpenPGP X25519"),x448:L.encodeUTF8("OpenPGP X448")};async function Dr(e){switch(e){case R.publicKey.x25519:try{const e=L.getWebCrypto(),t=await e.generateKey("X25519",!0,["deriveKey","deriveBits"]).catch((e=>{if("OperationError"===e.name){const e=Error("Unexpected key generation issue");throw e.name="NotSupportedError",e}throw e})),r=await e.exportKey("jwk",t.privateKey),n=await e.exportKey("jwk",t.publicKey);if(r.x!==n.x){const e=Error("Unexpected mismatching public point");throw e.name="NotSupportedError",e}return{A:new Uint8Array(z(n.x)),k:z(r.d)}}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:t}=await Promise.resolve().then((function(){return ey})),{secretKey:r,publicKey:n}=t.box.keyPair();return{A:n,k:r}}case R.publicKey.x448:{const e=await L.getNobleCurve(R.publicKey.x448),{secretKey:t,publicKey:r}=e.keygen();return{A:r,k:t}}default:throw Error("Unsupported ECDH algorithm")}}async function xr(e,t,r){switch(e){case R.publicKey.x25519:try{const{ephemeralPublicKey:n,sharedSecret:i}=await Mr(e,t),s=await Lr(e,n,t,r);return L.equalsUint8Array(i,s)}catch(e){return!1}case R.publicKey.x448:{const e=(await L.getNobleCurve(R.publicKey.x448)).getPublicKey(r);return L.equalsUint8Array(t,e)}default:return!1}}async function Qr(e,t,r){const{ephemeralPublicKey:n,sharedSecret:i}=await Mr(e,r),s=L.concatUint8Array([n,r,i]);switch(e){case R.publicKey.x25519:{const e=R.symmetric.aes128,{keySize:r}=Sr(e),i=await Ur(R.hash.sha256,s,new Uint8Array,Pr.x25519,r);return{ephemeralPublicKey:n,wrappedKey:await Br(e,i,t)}}case R.publicKey.x448:{const e=R.symmetric.aes256,{keySize:r}=Sr(R.symmetric.aes256),i=await Ur(R.hash.sha512,s,new Uint8Array,Pr.x448,r);return{ephemeralPublicKey:n,wrappedKey:await Br(e,i,t)}}default:throw Error("Unsupported ECDH algorithm")}}async function Rr(e,t,r,n,i){const s=await Lr(e,t,n,i),a=L.concatUint8Array([t,n,s]);switch(e){case R.publicKey.x25519:{const e=R.symmetric.aes128,{keySize:t}=Sr(e);return Cr(e,await Ur(R.hash.sha256,a,new Uint8Array,Pr.x25519,t),r)}case R.publicKey.x448:{const e=R.symmetric.aes256,{keySize:t}=Sr(R.symmetric.aes256);return Cr(e,await Ur(R.hash.sha512,a,new Uint8Array,Pr.x448,t),r)}default:throw Error("Unsupported ECDH algorithm")}}function Tr(e){switch(e){case R.publicKey.x25519:return 32;case R.publicKey.x448:return 56;default:throw Error("Unsupported ECDH algorithm")}}async function Mr(e,t){switch(e){case R.publicKey.x25519:try{const r=L.getWebCrypto(),n=await r.generateKey("X25519",!0,["deriveKey","deriveBits"]).catch((e=>{if("OperationError"===e.name){const e=Error("Unexpected key generation issue");throw e.name="NotSupportedError",e}throw e})),i=await r.exportKey("jwk",n.publicKey);if((await r.exportKey("jwk",n.privateKey)).x!==i.x){const e=Error("Unexpected mismatching public point");throw e.name="NotSupportedError",e}const s=Or(e,t),a=await r.importKey("jwk",s,"X25519",!1,[]),o=await r.deriveBits({name:"X25519",public:a},n.privateKey,8*Tr(e));return{sharedSecret:new Uint8Array(o),ephemeralPublicKey:new Uint8Array(z(i.x))}}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:r}=await Promise.resolve().then((function(){return ey})),{secretKey:n,publicKey:i}=r.box.keyPair(),s=r.scalarMult(n,t);return Fr(s),{ephemeralPublicKey:i,sharedSecret:s}}case R.publicKey.x448:{const e=await L.getNobleCurve(R.publicKey.x448),{secretKey:r,publicKey:n}=e.keygen(),i=e.getSharedSecret(r,t);return Fr(i),{ephemeralPublicKey:n,sharedSecret:i}}default:throw Error("Unsupported ECDH algorithm")}}async function Lr(e,t,r,n){switch(e){case R.publicKey.x25519:try{const i=L.getWebCrypto(),s=function(e,t,r){if(e===R.publicKey.x25519){const n=Or(e,t);return n.d=G(r),n}throw Error("Unsupported ECDH algorithm")}(e,r,n),a=Or(e,t),o=await i.importKey("jwk",s,"X25519",!1,["deriveKey","deriveBits"]),c=await i.importKey("jwk",a,"X25519",!1,[]),u=await i.deriveBits({name:"X25519",public:c},o,8*Tr(e));return new Uint8Array(u)}catch(e){if("NotSupportedError"!==e.name)throw e;const{default:r}=await Promise.resolve().then((function(){return ey})),i=r.scalarMult(n,t);return Fr(i),i}case R.publicKey.x448:{const e=(await L.getNobleCurve(R.publicKey.x448)).getSharedSecret(n,t);return Fr(e),e}default:throw Error("Unsupported ECDH algorithm")}}function Fr(e){let t=0;for(let r=0;r<e.length;r++)t|=e[r];if(0===t)throw Error("Unexpected low order point")}function Or(e,t){if(e===R.publicKey.x25519){return{kty:"OKP",crv:"X25519",x:G(t),ext:!0}}throw Error("Unsupported ECDH algorithm")}var Nr=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:Rr,encrypt:Qr,generate:Dr,generateEphemeralEncryptionMaterial:Mr,getPayloadSize:Tr,recomputeSharedSecret:Lr,validateParams:xr});const _r=L.getWebCrypto(),Hr=L.getNodeCrypto(),zr={[R.curve.nistP256]:"P-256",[R.curve.nistP384]:"P-384",[R.curve.nistP521]:"P-521"},Gr=Hr?Hr.getCurves():[],qr=Hr?{[R.curve.secp256k1]:Gr.includes("secp256k1")?"secp256k1":void 0,[R.curve.nistP256]:Gr.includes("prime256v1")?"prime256v1":void 0,[R.curve.nistP384]:Gr.includes("secp384r1")?"secp384r1":void 0,[R.curve.nistP521]:Gr.includes("secp521r1")?"secp521r1":void 0,[R.curve.ed25519Legacy]:Gr.includes("ED25519")?"ED25519":void 0,[R.curve.curve25519Legacy]:Gr.includes("X25519")?"X25519":void 0,[R.curve.brainpoolP256r1]:Gr.includes("brainpoolP256r1")?"brainpoolP256r1":void 0,[R.curve.brainpoolP384r1]:Gr.includes("brainpoolP384r1")?"brainpoolP384r1":void 0,[R.curve.brainpoolP512r1]:Gr.includes("brainpoolP512r1")?"brainpoolP512r1":void 0}:{},jr={[R.curve.nistP256]:{oid:[6,8,42,134,72,206,61,3,1,7],keyType:R.publicKey.ecdsa,hash:R.hash.sha256,cipher:R.symmetric.aes128,node:qr[R.curve.nistP256],web:zr[R.curve.nistP256],payloadSize:32,sharedSize:256,wireFormatLeadingByte:4},[R.curve.nistP384]:{oid:[6,5,43,129,4,0,34],keyType:R.publicKey.ecdsa,hash:R.hash.sha384,cipher:R.symmetric.aes192,node:qr[R.curve.nistP384],web:zr[R.curve.nistP384],payloadSize:48,sharedSize:384,wireFormatLeadingByte:4},[R.curve.nistP521]:{oid:[6,5,43,129,4,0,35],keyType:R.publicKey.ecdsa,hash:R.hash.sha512,cipher:R.symmetric.aes256,node:qr[R.curve.nistP521],web:zr[R.curve.nistP521],payloadSize:66,sharedSize:528,wireFormatLeadingByte:4},[R.curve.secp256k1]:{oid:[6,5,43,129,4,0,10],keyType:R.publicKey.ecdsa,hash:R.hash.sha256,cipher:R.symmetric.aes128,node:qr[R.curve.secp256k1],payloadSize:32,wireFormatLeadingByte:4},[R.curve.ed25519Legacy]:{oid:[6,9,43,6,1,4,1,218,71,15,1],keyType:R.publicKey.eddsaLegacy,hash:R.hash.sha512,node:!1,payloadSize:32,wireFormatLeadingByte:64},[R.curve.curve25519Legacy]:{oid:[6,10,43,6,1,4,1,151,85,1,5,1],keyType:R.publicKey.ecdh,hash:R.hash.sha256,cipher:R.symmetric.aes128,node:!1,payloadSize:32,wireFormatLeadingByte:64},[R.curve.brainpoolP256r1]:{oid:[6,9,43,36,3,3,2,8,1,1,7],keyType:R.publicKey.ecdsa,hash:R.hash.sha256,cipher:R.symmetric.aes128,node:qr[R.curve.brainpoolP256r1],payloadSize:32,wireFormatLeadingByte:4},[R.curve.brainpoolP384r1]:{oid:[6,9,43,36,3,3,2,8,1,1,11],keyType:R.publicKey.ecdsa,hash:R.hash.sha384,cipher:R.symmetric.aes192,node:qr[R.curve.brainpoolP384r1],payloadSize:48,wireFormatLeadingByte:4},[R.curve.brainpoolP512r1]:{oid:[6,9,43,36,3,3,2,8,1,1,13],keyType:R.publicKey.ecdsa,hash:R.hash.sha512,cipher:R.symmetric.aes256,node:qr[R.curve.brainpoolP512r1],payloadSize:64,wireFormatLeadingByte:4}};class Vr{constructor(e){try{this.name=e instanceof Xe?e.getName():R.write(R.curve,e)}catch(e){throw new st("Unknown curve")}const t=jr[this.name];this.keyType=t.keyType,this.oid=t.oid,this.hash=t.hash,this.cipher=t.cipher,this.node=t.node,this.web=t.web,this.payloadSize=t.payloadSize,this.sharedSize=t.sharedSize,this.wireFormatLeadingByte=t.wireFormatLeadingByte,this.web&&L.getWebCrypto()?this.type="web":this.node&&L.getNodeCrypto()?this.type="node":this.name===R.curve.curve25519Legacy?this.type="curve25519Legacy":this.name===R.curve.ed25519Legacy&&(this.type="ed25519Legacy")}async genKeyPair(){switch(this.type){case"web":try{return await async function(e,t){const r=await _r.generateKey({name:"ECDSA",namedCurve:zr[e]},!0,["sign","verify"]),n=await _r.exportKey("jwk",r.privateKey);return{publicKey:$r(await _r.exportKey("jwk",r.publicKey),t),privateKey:z(n.d)}}(this.name,this.wireFormatLeadingByte)}catch(e){return L.printDebugError("Browser did not support generating ec key "+e.message),Wr(this.name)}case"node":return async function(e){const t=Hr.createECDH(qr[e]);return await t.generateKeys(),{publicKey:new Uint8Array(t.getPublicKey()),privateKey:new Uint8Array(t.getPrivateKey())}}(this.name);case"curve25519Legacy":{const{k:e,A:t}=await Dr(R.publicKey.x25519),r=e.slice().reverse();r[0]=127&r[0]|64,r[31]&=248;return{publicKey:L.concatUint8Array([new Uint8Array([this.wireFormatLeadingByte]),t]),privateKey:r}}case"ed25519Legacy":{const{seed:e,A:t}=await ut(R.publicKey.ed25519);return{publicKey:L.concatUint8Array([new Uint8Array([this.wireFormatLeadingByte]),t]),privateKey:e}}default:return Wr(this.name)}}}async function Yr(e){const t=new Vr(e),{oid:r,hash:n,cipher:i}=t,s=await t.genKeyPair();return{oid:r,Q:s.publicKey,secret:L.leftPad(s.privateKey,t.payloadSize),hash:n,cipher:i}}function Zr(e){return jr[e.getName()].hash}async function Jr(e,t,r,n){const i={[R.curve.nistP256]:!0,[R.curve.nistP384]:!0,[R.curve.nistP521]:!0,[R.curve.secp256k1]:!0,[R.curve.curve25519Legacy]:e===R.publicKey.ecdh,[R.curve.brainpoolP256r1]:!0,[R.curve.brainpoolP384r1]:!0,[R.curve.brainpoolP512r1]:!0},s=t.getName();if(!i[s])return!1;if(s===R.curve.curve25519Legacy){const e=n.slice().reverse();return!(r.length<1||64!==r[0])&&xr(R.publicKey.x25519,r.subarray(1),e)}const a=(await L.getNobleCurve(R.publicKey.ecdsa,s)).getPublicKey(n,!1);return!!L.equalsUint8Array(a,r)}function Xr(e,t){const{payloadSize:r,wireFormatLeadingByte:n,name:i}=e,s=i===R.curve.curve25519Legacy||i===R.curve.ed25519Legacy?r:2*r;if(t[0]!==n||t.length!==s+1)throw Error("Invalid point encoding")}async function Wr(e){const t=await L.getNobleCurve(R.publicKey.ecdsa,e),{secretKey:r}=t.keygen();return{publicKey:t.getPublicKey(r,!1),privateKey:r}}function $r(e,t){const r=z(e.x),n=z(e.y),i=new Uint8Array(r.length+n.length+1);return i[0]=t,i.set(r,1),i.set(n,r.length+1),i}function en(e,t,r){const n=e,i=r.slice(1,n+1),s=r.slice(n+1,2*n+1);return{kty:"EC",crv:t,x:G(i),y:G(s),ext:!0}}function tn(e,t,r,n){const i=en(e,t,r);return i.d=G(n),i}const rn=L.getWebCrypto(),nn=L.getNodeCrypto();async function sn(e,t,r,n,i,s){const a=new Vr(e);if(Xr(a,n),r&&!L.isStream(r)){const e={publicKey:n,privateKey:i};switch(a.type){case"web":try{return await async function(e,t,r,n){const i=e.payloadSize,s=tn(e.payloadSize,zr[e.name],n.publicKey,n.privateKey),a=await rn.importKey("jwk",s,{name:"ECDSA",namedCurve:zr[e.name],hash:{name:R.read(R.webHash,e.hash)}},!1,["sign"]),o=new Uint8Array(await rn.sign({name:"ECDSA",namedCurve:zr[e.name],hash:{name:R.read(R.webHash,t)}},a,r));return{r:o.slice(0,i),s:o.slice(i,i<<1)}}(a,t,r,e)}catch(e){if("nistP521"!==a.name&&("DataError"===e.name||"OperationError"===e.name))throw e;L.printDebugError("Browser did not support signing: "+e.message)}break;case"node":return async function(e,t,r,n){const i=L.nodeRequire("eckey-utils"),s=L.getNodeBuffer(),{privateKey:a}=i.generateDer({curveName:qr[e.name],privateKey:s.from(n)}),o=nn.createSign(R.read(R.hash,t));o.write(r),o.end();const c=new Uint8Array(o.sign({key:a,format:"der",type:"sec1",dsaEncoding:"ieee-p1363"})),u=e.payloadSize;return{r:c.subarray(0,u),s:c.subarray(u,u<<1)}}(a,t,r,i)}}const o=(await L.getNobleCurve(R.publicKey.ecdsa,a.name)).sign(s,i,{lowS:!1});return{r:le(o.r,"be",a.payloadSize),s:le(o.s,"be",a.payloadSize)}}async function an(e,t,r,n,i,s){const a=new Vr(e);Xr(a,i);const o=async()=>0===s[0]&&on(a,r,s.subarray(1),i);if(n&&!L.isStream(n))switch(a.type){case"web":try{const e=await async function(e,t,{r,s:n},i,s){const a=en(e.payloadSize,zr[e.name],s),o=await rn.importKey("jwk",a,{name:"ECDSA",namedCurve:zr[e.name],hash:{name:R.read(R.webHash,e.hash)}},!1,["verify"]),c=L.concatUint8Array([r,n]).buffer;return rn.verify({name:"ECDSA",namedCurve:zr[e.name],hash:{name:R.read(R.webHash,t)}},o,c,i)}(a,t,r,n,i);return e||o()}catch(e){if("nistP521"!==a.name&&("DataError"===e.name||"OperationError"===e.name))throw e;L.printDebugError("Browser did not support verifying: "+e.message)}break;case"node":{const e=await async function(e,t,{r,s:n},i,s){const a=L.nodeRequire("eckey-utils"),o=L.getNodeBuffer(),{publicKey:c}=a.generateDer({curveName:qr[e.name],publicKey:o.from(s)}),u=nn.createVerify(R.read(R.hash,t));u.write(i),u.end();const h=L.concatUint8Array([r,n]);try{return u.verify({key:c,format:"der",type:"spki",dsaEncoding:"ieee-p1363"},h)}catch(e){return!1}}(a,t,r,n,i);return e||o()}}return await on(a,r,s,i)||o()}async function on(e,t,r,n){return(await L.getNobleCurve(R.publicKey.ecdsa,e.name)).verify(L.concatUint8Array([t.r,t.s]),r,n,{lowS:!1})}var cn=/*#__PURE__*/Object.freeze({__proto__:null,sign:sn,validateParams:async function(e,t,r){const n=new Vr(e);if(n.keyType!==R.publicKey.ecdsa)return!1;switch(n.type){case"web":case"node":{const n=ye(8),i=R.hash.sha256,s=await Qe(i,n);try{const a=await sn(e,i,n,t,r,s);return await an(e,i,a,n,t,s)}catch(e){return!1}}default:return Jr(R.publicKey.ecdsa,e,t,r)}},verify:an});async function un(e,t,r,n,i,s){Xr(new Vr(e),n);const{RS:a}=await ht(R.publicKey.ed25519,0,0,n.subarray(1),i,s);return{r:a.subarray(0,32),s:a.subarray(32)}}async function hn(e,t,{r,s:n},i,s,a){Xr(new Vr(e),s);const o=L.concatUint8Array([r,n]);return lt(R.publicKey.ed25519,0,{RS:o},0,s.subarray(1),a)}async function ln(e,t,r){return e.getName()===R.curve.ed25519Legacy&&(!(t.length<1||64!==t[0])&&ft(R.publicKey.ed25519,t.subarray(1),r))}var fn=/*#__PURE__*/Object.freeze({__proto__:null,sign:un,validateParams:ln,verify:hn});function yn(e){const t=e.length;if(t>0){const r=e[t-1];if(r>=1){const n=e.subarray(t-r),i=new Uint8Array(r).fill(r);if(L.equalsUint8Array(n,i))return e.subarray(0,t-r)}}throw Error("Invalid padding")}function pn(e,t,r,n){return L.concatUint8Array([t.write(),new Uint8Array([e]),r.write(!0),L.stringToUint8Array("Anonymous Sender "),r.replacementFingerprint||n])}async function dn(e,t,r,n,i=!1,s=!1){let a;if(i){for(a=0;a<t.length&&0===t[a];a++);t=t.subarray(a)}if(s){for(a=t.length-1;a>=0&&0===t[a];a--);t=t.subarray(0,a+1)}return(await Qe(e,L.concatUint8Array([new Uint8Array([0,0,0,1]),t,n]))).subarray(0,r)}async function gn(e,t){switch(e.type){case"curve25519Legacy":{const{sharedSecret:r,ephemeralPublicKey:n}=await Mr(R.publicKey.x25519,t.subarray(1));return{publicKey:L.concatUint8Array([new Uint8Array([e.wireFormatLeadingByte]),n]),sharedKey:r}}case"web":if(e.web&&L.getWebCrypto())try{return await async function(e,t){const r=L.getWebCrypto(),n=en(e.payloadSize,e.web,t);let i=r.generateKey({name:"ECDH",namedCurve:e.web},!0,["deriveKey","deriveBits"]),s=r.importKey("jwk",n,{name:"ECDH",namedCurve:e.web},!1,[]);[i,s]=await Promise.all([i,s]);let a=r.deriveBits({name:"ECDH",namedCurve:e.web,public:s},i.privateKey,e.sharedSize),o=r.exportKey("jwk",i.publicKey);[a,o]=await Promise.all([a,o]);const c=new Uint8Array(a),u=new Uint8Array($r(o,e.wireFormatLeadingByte));return{publicKey:u,sharedKey:c}}(e,t)}catch(r){return L.printDebugError(r),kn(e,t)}break;case"node":return async function(e,t){const r=L.getNodeCrypto(),n=r.createECDH(e.node);n.generateKeys();const i=new Uint8Array(n.computeSecret(t));return{publicKey:new Uint8Array(n.getPublicKey()),sharedKey:i}}(e,t);default:return kn(e,t)}}async function An(e,t,r,n,i){const s=function(e){const t=8-e.length%8,r=new Uint8Array(e.length+t).fill(t);return r.set(e),r}(r),a=new Vr(e);Xr(a,n);const{publicKey:o,sharedKey:c}=await gn(a,n),u=pn(R.publicKey.ecdh,e,t,i),{keySize:h}=Sr(t.cipher),l=await dn(t.hash,c,h,u);return{publicKey:o,wrappedKey:await Br(t.cipher,l,s)}}async function wn(e,t,r,n){if(n.length!==e.payloadSize){const t=new Uint8Array(e.payloadSize);t.set(n,e.payloadSize-n.length),n=t}switch(e.type){case"curve25519Legacy":{const e=n.slice().reverse();return{secretKey:e,sharedKey:await Lr(R.publicKey.x25519,t.subarray(1),r.subarray(1),e)}}case"web":if(e.web&&L.getWebCrypto())try{return await async function(e,t,r,n){const i=L.getWebCrypto(),s=tn(e.payloadSize,e.web,r,n);let a=i.importKey("jwk",s,{name:"ECDH",namedCurve:e.web},!0,["deriveKey","deriveBits"]);const o=en(e.payloadSize,e.web,t);let c=i.importKey("jwk",o,{name:"ECDH",namedCurve:e.web},!0,[]);[a,c]=await Promise.all([a,c]);let u=i.deriveBits({name:"ECDH",namedCurve:e.web,public:c},a,e.sharedSize),h=i.exportKey("jwk",a);[u,h]=await Promise.all([u,h]);const l=new Uint8Array(u);return{secretKey:z(h.d),sharedKey:l}}(e,t,r,n)}catch(r){return L.printDebugError(r),bn(e,t,n)}break;case"node":return async function(e,t,r){const n=L.getNodeCrypto(),i=n.createECDH(e.node);i.setPrivateKey(r);const s=new Uint8Array(i.computeSecret(t));return{secretKey:new Uint8Array(i.getPrivateKey()),sharedKey:s}}(e,t,n);default:return bn(e,t,n)}}async function mn(e,t,r,n,i,s,a){const o=new Vr(e);Xr(o,i),Xr(o,r);const{sharedKey:c}=await wn(o,r,i,s),u=pn(R.publicKey.ecdh,e,t,a),{keySize:h}=Sr(t.cipher);let l;for(let e=0;e<3;e++)try{const r=await dn(t.hash,c,h,u,1===e,2===e);return yn(await Cr(t.cipher,r,n))}catch(e){l=e}throw l}async function bn(e,t,r){return{secretKey:r,sharedKey:(await L.getNobleCurve(R.publicKey.ecdh,e.name)).getSharedSecret(r,t).subarray(1)}}async function kn(e,t){const r=await L.getNobleCurve(R.publicKey.ecdh,e.name),{publicKey:n,privateKey:i}=await e.genKeyPair();return{publicKey:n,sharedKey:r.getSharedSecret(i,t).subarray(1)}}var En=/*#__PURE__*/Object.freeze({__proto__:null,decrypt:mn,encrypt:An,validateParams:async function(e,t,r){return Jr(R.publicKey.ecdh,e,t,r)}}),vn=/*#__PURE__*/Object.freeze({__proto__:null,CurveWithOID:Vr,ecdh:En,ecdhX:Nr,ecdsa:cn,eddsa:At,eddsaLegacy:fn,generate:Yr,getPreferredHashAlgo:Zr});const Kn=BigInt(0),Sn=BigInt(1);const In=new Set([R.hash.sha1,R.hash.sha256,R.hash.sha512]),Bn=L.getWebCrypto(),Cn=L.getNodeCrypto();async function Un(e,t){if(e===R.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Hp})),{publicKey:r,secretKey:n}=e.keygen(t);return{mlkemPublicKey:r,mlkemSecretKey:n}}throw Error("Unsupported KEM algorithm")}async function Pn(e){const{eccPublicKey:t,eccSecretKey:r}=await async function(e){if(e===R.publicKey.pqc_mlkem_x25519){const{A:e,k:t}=await Dr(R.publicKey.x25519);return{eccPublicKey:e,eccSecretKey:t}}throw Error("Unsupported KEM algorithm")}(e),{mlkemPublicKey:n,mlkemSeed:i,mlkemSecretKey:s}=await async function(e){if(e===R.publicKey.pqc_mlkem_x25519){const t=ye(64),{mlkemSecretKey:r,mlkemPublicKey:n}=await Un(e,t);return{mlkemSeed:t,mlkemSecretKey:r,mlkemPublicKey:n}}throw Error("Unsupported KEM algorithm")}(e);return{eccPublicKey:t,eccSecretKey:r,mlkemPublicKey:n,mlkemSeed:i,mlkemSecretKey:s}}async function Dn(e,t,r,n){const{eccKeyShare:i,eccCipherText:s}=await async function(e,t){if(e===R.publicKey.pqc_mlkem_x25519){const{ephemeralPublicKey:e,sharedSecret:r}=await Mr(R.publicKey.x25519,t);return{eccCipherText:e,eccKeyShare:r}}throw Error("Unsupported KEM algorithm")}(e,t),{mlkemKeyShare:a,mlkemCipherText:o}=await async function(e,t){if(e===R.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Hp})),{cipherText:r,sharedSecret:n}=e.encapsulate(t);return{mlkemCipherText:r,mlkemKeyShare:n}}throw Error("Unsupported KEM algorithm")}(e,r),c=await Qn(e,a,i,s,t);return{eccCipherText:s,mlkemCipherText:o,wrappedKey:await Br(R.symmetric.aes256,c,n)}}async function xn(e,t,r,n,i,s,a,o){const c=await async function(e,t,r,n){if(e===R.publicKey.pqc_mlkem_x25519)return await Lr(R.publicKey.x25519,t,n,r);throw Error("Unsupported KEM algorithm")}(e,t,n,i),u=await async function(e,t,r){if(e===R.publicKey.pqc_mlkem_x25519){const{ml_kem768:e}=await Promise.resolve().then((function(){return Hp}));return e.decapsulate(t,r)}throw Error("Unsupported KEM algorithm")}(e,r,s),h=await Qn(e,u,c,t,i);return await Cr(R.symmetric.aes256,h,o)}async function Qn(e,t,r,n,i){const s=L.encodeUTF8("OpenPGPCompositeKDFv1"),a=L.concatUint8Array([t,r,n,i,new Uint8Array([e]),s,new Uint8Array([s.length])]);return await Qe(R.hash.sha3_256,a)}async function Rn(e,t,r,n,i){const s=async function(e,t,r){if(e===R.publicKey.pqc_mlkem_x25519)return xr(R.publicKey.x25519,t,r);throw Error("Unsupported KEM algorithm")}(e,t,r),a=async function(e,t,r){if(e===R.publicKey.pqc_mlkem_x25519){const{mlkemPublicKey:n}=await Un(e,r);return L.equalsUint8Array(t,n)}throw Error("Unsupported KEM algorithm")}(e,n,i);return await s&&await a}async function Tn(e,t){if(e===R.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Hp})),{secretKey:r,publicKey:n}=e.keygen(t);return{mldsaSecretKey:r,mldsaPublicKey:n}}throw Error("Unsupported signature algorithm")}async function Mn(e){if(e===R.publicKey.pqc_mldsa_ed25519){const{eccSecretKey:t,eccPublicKey:r}=await async function(e){if(e===R.publicKey.pqc_mldsa_ed25519){const{A:e,seed:t}=await ut(R.publicKey.ed25519);return{eccPublicKey:e,eccSecretKey:t}}throw Error("Unsupported signature algorithm")}(e),{mldsaSeed:n,mldsaSecretKey:i,mldsaPublicKey:s}=await async function(e){if(e===R.publicKey.pqc_mldsa_ed25519){const t=ye(32),{mldsaSecretKey:r,mldsaPublicKey:n}=await Tn(e,t);return{mldsaSeed:t,mldsaSecretKey:r,mldsaPublicKey:n}}throw Error("Unsupported signature algorithm")}(e);return{eccSecretKey:t,eccPublicKey:r,mldsaSeed:n,mldsaSecretKey:i,mldsaPublicKey:s}}throw Error("Unsupported signature algorithm")}async function Ln(e,t,r,n,i,s){if(e===R.publicKey.pqc_mldsa_ed25519){const{eccSignature:t}=await async function(e,t,r,n,i){if(e===R.publicKey.pqc_mldsa_ed25519){const{RS:e}=await ht(R.publicKey.ed25519,0,0,n,r,i);return{eccSignature:e}}throw Error("Unsupported signature algorithm")}(e,0,r,n,s),{mldsaSignature:a}=await async function(e,t,r){if(e===R.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Hp}));return{mldsaSignature:e.sign(t,r)}}throw Error("Unsupported signature algorithm")}(e,i,s);return{eccSignature:t,mldsaSignature:a}}throw Error("Unsupported signature algorithm")}async function Fn(e,t,r,n,i,{eccSignature:s,mldsaSignature:a}){if(e===R.publicKey.pqc_mldsa_ed25519){const t=async function(e,t,r,n,i){if(e===R.publicKey.pqc_mldsa_ed25519)return lt(R.publicKey.ed25519,0,{RS:i},0,r,n);throw Error("Unsupported signature algorithm")}(e,0,r,i,s),o=async function(e,t,r,n){if(e===R.publicKey.pqc_mldsa_ed25519){const{ml_dsa65:e}=await Promise.resolve().then((function(){return Hp}));return e.verify(t,r,n)}throw Error("Unsupported signature algorithm")}(e,n,i,a);return await t&&await o}throw Error("Unsupported signature algorithm")}function On(e,t){if(e===R.publicKey.pqc_mldsa_ed25519)return Re(t)>=32;throw Error("Unsupported signature algorithm")}async function Nn(e,t,r,n,i){const s=async function(e,t,r){if(e===R.publicKey.pqc_mldsa_ed25519)return ft(R.publicKey.ed25519,t,r);throw Error("Unsupported signature algorithm")}(e,t,r),a=async function(e,t,r){if(e===R.publicKey.pqc_mldsa_ed25519){const{mldsaPublicKey:n}=await Tn(e,r);return L.equalsUint8Array(t,n)}throw Error("Unsupported signature algorithm")}(e,n,i);return await s&&await a}class _n{constructor(e){e&&(this.data=e)}read(e){if(e.length>=1){const t=e[0];if(e.length>=1+t)return this.data=e.subarray(1,1+t),1+this.data.length}throw Error("Invalid symmetric key")}write(){return L.concatUint8Array([new Uint8Array([this.data.length]),this.data])}}class Hn{constructor(e){if(void 0===e&&(e=new Uint8Array([])),!L.isUint8Array(e))throw Error("data must be in the form of a Uint8Array");this.data=e,this.length=this.data.byteLength}write(){return L.concatUint8Array([new Uint8Array([this.length]),this.data])}read(e){if(e.length>=1){const t=e[0];if(e.length>=t+1)return this.data=e.subarray(1,1+t),this.length=t,1+t}throw Error("Invalid octet string")}}class zn{constructor(e){if(e){const{version:t,hash:r,cipher:n,replacementFingerprint:i}=e;this.version=t||1,this.hash=r,this.cipher=n,this.replacementFingerprint=i}else this.version=null,this.hash=null,this.cipher=null,this.replacementFingerprint=null}read(e){if(e.length<4||1!==e[1]&&255!==e[1])throw new st("Cannot read KDFParams");const t=e[0];this.version=e[1],this.hash=e[2],this.cipher=e[3];let r=4;if(255===this.version){const n=t-r+1;this.replacementFingerprint=e.slice(r,r+n),r+=n}return r}write(e){if(!this.version||1===this.version||e)return new Uint8Array([3,1,this.hash,this.cipher]);return L.concatUint8Array([new Uint8Array([3+this.replacementFingerprint.length,this.version,this.hash,this.cipher]),this.replacementFingerprint])}}const Gn=e=>class{constructor(e){this.data=void 0===e?null:e}read(t){const r=t[0];return this.data=R.write(e,r),1}write(){return new Uint8Array([this.data])}getName(){return R.read(e,this.data)}getValue(){return this.data}},qn=Gn(R.aead),jn=Gn(R.symmetric),Vn=Gn(R.hash);class Yn{static fromObject({wrappedKey:e,algorithm:t}){const r=new Yn;return r.wrappedKey=e,r.algorithm=t,r}read(e){let t=0,r=e[t++];this.algorithm=r%2?e[t++]:null,r-=r%2,this.wrappedKey=L.readExactSubarray(e,t,t+r),t+=r}write(){return L.concatUint8Array([this.algorithm?new Uint8Array([this.wrappedKey.length+1,this.algorithm]):new Uint8Array([this.wrappedKey.length]),this.wrappedKey])}}const Zn=L.getWebCrypto(),Jn=L.getNodeCrypto(),Xn=Jn?Jn.getCiphers():[],Wn={idea:Xn.includes("idea-cfb")?"idea-cfb":void 0,tripledes:Xn.includes("des-ede3-cfb")?"des-ede3-cfb":void 0,cast5:Xn.includes("cast5-cfb")?"cast5-cfb":void 0,blowfish:Xn.includes("bf-cfb")?"bf-cfb":void 0,aes128:Xn.includes("aes-128-cfb")?"aes-128-cfb":void 0,aes192:Xn.includes("aes-192-cfb")?"aes-192-cfb":void 0,aes256:Xn.includes("aes-256-cfb")?"aes-256-cfb":void 0};async function $n(e){const{blockSize:t}=Sr(e),r=await ye(t),n=new Uint8Array([r[r.length-2],r[r.length-1]]);return L.concat([r,n])}async function ei(e,t,r,n,i){const s=R.read(R.symmetric,e);if(L.getNodeCrypto()&&Wn[s])return function(e,t,r,n){const i=R.read(R.symmetric,e),s=new Jn.createCipheriv(Wn[i],t,n);return k(r,(e=>new Uint8Array(s.update(e))))}(e,t,r,n);if(L.isAES(e))return async function(e,t,r,n){if(Zn&&await ri.isSupported(e)){const i=new ri(e,t,n);return L.isStream(r)?k(r,(e=>i.encryptChunk(e)),(()=>i.finish())):i.encrypt(r)}if(L.isStream(r)){const i=new ni(!0,e,t,n);return k(r,(e=>i.processChunk(e)),(()=>i.finish()))}return fr(t,n).encrypt(r)}(e,t,r,n);const a=new(await Er(e))(t),o=a.blockSize,c=n.slice();let u=new Uint8Array;const h=e=>{e&&(u=L.concatUint8Array([u,e]));const t=new Uint8Array(u.length);let r,n=0;for(;e?u.length>=o:u.length;){const e=a.encrypt(c);for(r=0;r<o;r++)c[r]=u[r]^e[r],t[n++]=c[r];u=u.subarray(o)}return t.subarray(0,n)};return k(r,h,h)}async function ti(e,t,r,n){const i=R.read(R.symmetric,e);if(Jn&&Wn[i])return function(e,t,r,n){const i=R.read(R.symmetric,e),s=new Jn.createDecipheriv(Wn[i],t,n);return k(r,(e=>new Uint8Array(s.update(e))))}(e,t,r,n);if(L.isAES(e))return async function(e,t,r,n){if(L.isStream(r)){const i=new ni(!1,e,t,n);return k(r,(e=>i.processChunk(e)),(()=>i.finish()))}return fr(t,n).decrypt(r)}(e,t,r,n);const s=new(await Er(e))(t),a=s.blockSize;let o=n,c=new Uint8Array;const u=e=>{e&&(c=L.concatUint8Array([c,e]));const t=new Uint8Array(c.length);let r,n=0;for(;e?c.length>=a:c.length;){const e=s.encrypt(o);for(o=c.subarray(0,a),r=0;r<a;r++)t[n++]=o[r]^e[r];c=c.subarray(a)}return t.subarray(0,n)};return k(r,u,u)}class ri{constructor(e,t,r){const{blockSize:n}=Sr(e);this.key=t,this.prevBlock=r,this.nextBlock=new Uint8Array(n),this.i=0,this.blockSize=n,this.zeroBlock=new Uint8Array(this.blockSize)}static async isSupported(e){const{keySize:t}=Sr(e);return Zn.importKey("raw",new Uint8Array(t),"aes-cbc",!1,["encrypt"]).then((()=>!0),(()=>!1))}async _runCBC(e,t){const r="AES-CBC";this.keyRef=this.keyRef||await Zn.importKey("raw",this.key,r,!1,["encrypt"]);const n=await Zn.encrypt({name:r,iv:t||this.zeroBlock},this.keyRef,e);return new Uint8Array(n).subarray(0,e.length)}async encryptChunk(e){const t=this.nextBlock.length-this.i,r=e.subarray(0,t);if(this.nextBlock.set(r,this.i),this.i+e.length>=2*this.blockSize){const r=(e.length-t)%this.blockSize,n=L.concatUint8Array([this.nextBlock,e.subarray(t,e.length-r)]),i=L.concatUint8Array([this.prevBlock,n.subarray(0,n.length-this.blockSize)]),s=await this._runCBC(i);return ii(s,n),this.prevBlock=s.slice(-this.blockSize),r>0&&this.nextBlock.set(e.subarray(-r)),this.i=r,s}let n;if(this.i+=r.length,this.i===this.nextBlock.length){const t=this.nextBlock;n=await this._runCBC(this.prevBlock),ii(n,t),this.prevBlock=n.slice(),this.i=0;const i=e.subarray(r.length);this.nextBlock.set(i,this.i),this.i+=i.length}else n=new Uint8Array;return n}async finish(){let e;if(0===this.i)e=new Uint8Array;else{this.nextBlock=this.nextBlock.subarray(0,this.i);const t=this.nextBlock,r=await this._runCBC(this.prevBlock);ii(r,t),e=r.subarray(0,t.length)}return this.clearSensitiveData(),e}clearSensitiveData(){this.nextBlock.fill(0),this.prevBlock.fill(0),this.keyRef=null,this.key=null}async encrypt(e){const t=(await this._runCBC(L.concatUint8Array([new Uint8Array(this.blockSize),e]),this.iv)).subarray(0,e.length);return ii(t,e),this.clearSensitiveData(),t}}class ni{constructor(e,t,r,n){this.forEncryption=e;const{blockSize:i}=Sr(t);this.key=kr.expandKeyLE(r),n.byteOffset%4!=0&&(n=n.slice()),this.prevBlock=si(n),this.nextBlock=new Uint8Array(i),this.i=0,this.blockSize=i}_runCFB(e){const t=si(e),r=new Uint8Array(e.length),n=si(r);for(let e=0;e+4<=n.length;e+=4){const{s0:r,s1:i,s2:s,s3:a}=kr.encrypt(this.key,this.prevBlock[0],this.prevBlock[1],this.prevBlock[2],this.prevBlock[3]);n[e+0]=t[e+0]^r,n[e+1]=t[e+1]^i,n[e+2]=t[e+2]^s,n[e+3]=t[e+3]^a,this.prevBlock=(this.forEncryption?n:t).slice(e,e+4)}return r}async processChunk(e){const t=this.nextBlock.length-this.i,r=e.subarray(0,t);if(this.nextBlock.set(r,this.i),this.i+e.length>=2*this.blockSize){const r=(e.length-t)%this.blockSize,n=L.concatUint8Array([this.nextBlock,e.subarray(t,e.length-r)]),i=this._runCFB(n);return r>0&&this.nextBlock.set(e.subarray(-r)),this.i=r,i}let n;if(this.i+=r.length,this.i===this.nextBlock.length){n=this._runCFB(this.nextBlock),this.i=0;const t=e.subarray(r.length);this.nextBlock.set(t,this.i),this.i+=t.length}else n=new Uint8Array;return n}async finish(){let e;if(0===this.i)e=new Uint8Array;else{e=this._runCFB(this.nextBlock).subarray(0,this.i)}return this.clearSensitiveData(),e}clearSensitiveData(){this.nextBlock.fill(0),this.prevBlock.fill(0),this.key.fill(0)}}function ii(e,t){const r=Math.min(e.length,t.length);for(let n=0;n<r;n++)e[n]=e[n]^t[n]}const si=e=>new Uint32Array(e.buffer,e.byteOffset,Math.floor(e.byteLength/4));const ai=L.getWebCrypto(),oi=L.getNodeCrypto(),ci=16;function ui(e,t){const r=e.length-ci;for(let n=0;n<ci;n++)e[n+r]^=t[n];return e}const hi=new Uint8Array(ci);async function li(e){const t=await fi(e),r=L.double(await t(hi)),n=L.double(r);return async function(e){return(await t(function(e,t,r){if(e.length&&e.length%ci==0)return ui(e,t);const n=new Uint8Array(e.length+(ci-e.length%ci));return n.set(e),n[e.length]=128,ui(n,r)}(e,r,n))).subarray(-16)}}async function fi(e){if(L.getNodeCrypto())return async function(t){const r=new oi.createCipheriv("aes-"+8*e.length+"-cbc",e,hi).update(t);return new Uint8Array(r)};if(L.getWebCrypto())try{return e=await ai.importKey("raw",e,{name:"AES-CBC",length:8*e.length},!1,["encrypt"]),async function(t){const r=await ai.encrypt({name:"AES-CBC",iv:hi,length:128},e,t);return new Uint8Array(r).subarray(0,r.byteLength-ci)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;L.printDebugError("Browser did not support operation: "+t.message)}return async function(t){return lr(e,hi,{disablePadding:!0}).encrypt(t)}}const yi=L.getWebCrypto(),pi=L.getNodeCrypto(),di=L.getNodeBuffer(),gi=16,Ai=gi,wi=new Uint8Array(gi),mi=new Uint8Array(gi);mi[15]=1;const bi=new Uint8Array(gi);async function ki(e){const t=await li(e);return function(e,r){return t(L.concatUint8Array([e,r]))}}async function Ei(e){if(L.getNodeCrypto())return async function(t,r){const n=new pi.createCipheriv("aes-"+8*e.length+"-ctr",e,r),i=di.concat([n.update(t),n.final()]);return new Uint8Array(i)};if(L.getWebCrypto())try{const t=await yi.importKey("raw",e,{name:"AES-CTR",length:8*e.length},!1,["encrypt"]);return async function(e,r){const n=await yi.encrypt({name:"AES-CTR",counter:r,length:128},t,e);return new Uint8Array(n)}}catch(t){if("NotSupportedError"!==t.name&&(24!==e.length||"OperationError"!==t.name))throw t;L.printDebugError("Browser did not support operation: "+t.message)}return async function(t,r){return hr(e,r).encrypt(t)}}async function vi(e,t){if(e!==R.symmetric.aes128&&e!==R.symmetric.aes192&&e!==R.symmetric.aes256)throw Error("EAX mode supports only AES cipher");const[r,n]=await Promise.all([ki(t),Ei(t)]);return{encrypt:async function(e,t,i){const[s,a]=await Promise.all([r(wi,t),r(mi,i)]),o=await n(e,s),c=await r(bi,o);for(let e=0;e<Ai;e++)c[e]^=a[e]^s[e];return L.concatUint8Array([o,c])},decrypt:async function(e,t,i){if(e.length<Ai)throw Error("Invalid EAX ciphertext");const s=e.subarray(0,-16),a=e.subarray(-16),[o,c,u]=await Promise.all([r(wi,t),r(mi,i),r(bi,s)]),h=u;for(let e=0;e<Ai;e++)h[e]^=c[e]^o[e];if(!L.equalsUint8Array(a,h))throw Error("Authentication tag mismatch");return await n(s,o)}}}bi[15]=2,vi.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[8+e]^=t[e];return r},vi.blockLength=gi,vi.ivLength=16,vi.tagLength=Ai;const Ki=16,Si=16;function Ii(e){let t=0;for(let r=1;!(e&r);r<<=1)t++;return t}function Bi(e,t){for(let r=0;r<e.length;r++)e[r]^=t[r];return e}function Ci(e,t){return Bi(e.slice(),t)}const Ui=new Uint8Array(Ki),Pi=new Uint8Array([1]);async function Di(e,t){const{keySize:r}=Sr(e);if(!L.isAES(e)||t.length!==r)throw Error("Unexpected algorithm or key size");let n=0;const i=e=>lr(t,Ui,{disablePadding:!0}).encrypt(e),s=e=>lr(t,Ui,{disablePadding:!0}).decrypt(e);let a;function o(e,t,r,s){const o=t.length/Ki|0;!function(e,t){const r=L.nbits(Math.max(e.length,t.length)/Ki|0)-1;for(let e=n+1;e<=r;e++)a[e]=L.double(a[e-1]);n=r}(t,s);const c=L.concatUint8Array([Ui.subarray(0,15-r.length),Pi,r]),u=63&c[15];c[15]&=192;const h=i(c),l=L.concatUint8Array([h,Ci(h.subarray(0,8),h.subarray(1,9))]),f=L.shiftRight(l.subarray(0+(u>>3),17+(u>>3)),8-(7&u)).subarray(1),y=new Uint8Array(Ki),p=new Uint8Array(t.length+Si);let d,g=0;for(d=0;d<o;d++)Bi(f,a[Ii(d+1)]),p.set(Bi(e(Ci(f,t)),f),g),Bi(y,e===i?t:p.subarray(g)),t=t.subarray(Ki),g+=Ki;if(t.length){Bi(f,a.x);const r=i(f);p.set(Ci(t,r),g);const n=new Uint8Array(Ki);n.set(e===i?t:p.subarray(g,-16),0),n[t.length]=128,Bi(y,n),g+=t.length}const A=Bi(i(Bi(Bi(y,f),a.$)),function(e){if(!e.length)return Ui;const t=e.length/Ki|0,r=new Uint8Array(Ki),n=new Uint8Array(Ki);for(let s=0;s<t;s++)Bi(r,a[Ii(s+1)]),Bi(n,i(Ci(r,e))),e=e.subarray(Ki);if(e.length){Bi(r,a.x);const t=new Uint8Array(Ki);t.set(e,0),t[e.length]=128,Bi(t,r),Bi(n,i(t))}return n}(s));return p.set(A,g),p}return function(){const e=i(Ui),t=L.double(e);a=[],a[0]=L.double(t),a.x=e,a.$=t}(),{encrypt:async function(e,t,r){return o(i,e,t,r)},decrypt:async function(e,t,r){if(e.length<Si)throw Error("Invalid OCB ciphertext");const n=e.subarray(-16);e=e.subarray(0,-16);const i=o(s,e,t,r);if(L.equalsUint8Array(n,i.subarray(-16)))return i.subarray(0,-16);throw Error("Authentication tag mismatch")}}}Di.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[7+e]^=t[e];return r},Di.blockLength=Ki,Di.ivLength=15,Di.tagLength=Si;const xi=L.getWebCrypto(),Qi=L.getNodeCrypto(),Ri=L.getNodeBuffer(),Ti=16,Mi="AES-GCM";async function Li(e,t){if(e!==R.symmetric.aes128&&e!==R.symmetric.aes192&&e!==R.symmetric.aes256)throw Error("GCM mode supports only AES cipher");if(L.getNodeCrypto())return{encrypt:async function(e,r,n=new Uint8Array){const i=new Qi.createCipheriv("aes-"+8*t.length+"-gcm",t,r);i.setAAD(n);const s=Ri.concat([i.update(e),i.final(),i.getAuthTag()]);return new Uint8Array(s)},decrypt:async function(e,r,n=new Uint8Array){const i=new Qi.createDecipheriv("aes-"+8*t.length+"-gcm",t,r);i.setAAD(n),i.setAuthTag(e.slice(e.length-Ti,e.length));const s=Ri.concat([i.update(e.slice(0,e.length-Ti)),i.final()]);return new Uint8Array(s)}};if(L.getWebCrypto())try{const e=await xi.importKey("raw",t,{name:Mi},!1,["encrypt","decrypt"]),r=navigator.userAgent.match(/Version\/13\.\d(\.\d)* Safari/)||navigator.userAgent.match(/Version\/(13|14)\.\d(\.\d)* Mobile\/\S* Safari/);return{encrypt:async function(n,i,s=new Uint8Array){if(r&&!n.length)return pr(t,i,s).encrypt(n);const a=await xi.encrypt({name:Mi,iv:i,additionalData:s,tagLength:128},e,n);return new Uint8Array(a)},decrypt:async function(n,i,s=new Uint8Array){if(r&&n.length===Ti)return pr(t,i,s).decrypt(n);try{const t=await xi.decrypt({name:Mi,iv:i,additionalData:s,tagLength:128},e,n);return new Uint8Array(t)}catch(e){if("OperationError"===e.name)throw Error("Authentication tag mismatch")}}}}catch(e){if("NotSupportedError"!==e.name&&(24!==t.length||"OperationError"!==e.name))throw e;L.printDebugError("Browser did not support operation: "+e.message)}return{encrypt:async function(e,r,n){return pr(t,r,n).encrypt(e)},decrypt:async function(e,r,n){return pr(t,r,n).decrypt(e)}}}function Fi(e,t=!1){switch(e){case R.aead.eax:return vi;case R.aead.ocb:return Di;case R.aead.gcm:return Li;case R.aead.experimentalGCM:if(!t)throw Error("Unexpected non-standard `experimentalGCM` AEAD algorithm provided in `config.preferredAEADAlgorithm`: use `gcm` instead");return Li;default:throw Error("Unsupported AEAD mode")}}async function Oi(e,t,r,n,i,s){switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:{const{n:e,e:t}=r;return{c:await Ge(i,e,t)}}case R.publicKey.elgamal:{const{p:e,g:t,y:n}=r;return async function(e,t,r,n){t=re(t),r=re(r),n=re(n);const i=re(Me(e,he(t))),s=pe(Ze,t-Ze);return{c1:le(ie(r,s,t)),c2:le(ne(ie(n,s,t)*i,t))}}(i,e,t,n)}case R.publicKey.ecdh:{const{oid:e,Q:t,kdfParams:n}=r,{publicKey:a,wrappedKey:o}=await An(e,n,i,t,s);return{V:a,C:new _n(o)}}case R.publicKey.x25519:case R.publicKey.x448:{if(t&&!L.isAES(t))throw Error("X25519 and X448 keys can only encrypt AES session keys");const{A:n}=r,{ephemeralPublicKey:s,wrappedKey:a}=await Qr(e,i,n);return{ephemeralPublicKey:s,C:Yn.fromObject({algorithm:t,wrappedKey:a})}}case R.publicKey.aead:{if(!n)throw Error("Cannot encrypt with symmetric key missing private parameters");const{cipher:e}=r,t=e.getValue(),{keyMaterial:s}=n,a=T.preferredAEADAlgorithm,o=Fi(T.preferredAEADAlgorithm),{ivLength:c}=o,u=ye(c),h=await o(t,s),l=await h.encrypt(i,u,new Uint8Array);return{aeadMode:new qn(a),iv:u,c:new Hn(l)}}case R.publicKey.pqc_mlkem_x25519:{const{eccPublicKey:n,mlkemPublicKey:s}=r,{eccCipherText:a,mlkemCipherText:o,wrappedKey:c}=await Dn(e,n,s,i);return{eccCipherText:a,mlkemCipherText:o,C:Yn.fromObject({algorithm:t,wrappedKey:c})}}default:return[]}}async function Ni(e,t,r,n,i,s){switch(e){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:{const{c:e}=n,{n:i,e:a}=t,{d:o,p:c,q:u,u:h}=r;return qe(e,i,a,o,c,u,h,s)}case R.publicKey.elgamal:{const{c1:e,c2:i}=n;return async function(e,t,r,n,i){return e=re(e),t=re(t),r=re(r),Le(le(ne(ae(ie(e,n=re(n),r),r)*t,r),"be",he(r)),i)}(e,i,t.p,r.x,s)}case R.publicKey.ecdh:{const{oid:e,Q:s,kdfParams:a}=t,{d:o}=r,{V:c,C:u}=n;return mn(e,a,c,u.data,s,o,i)}case R.publicKey.x25519:case R.publicKey.x448:{const{A:i}=t,{k:s}=r,{ephemeralPublicKey:a,C:o}=n;if(null!==o.algorithm&&!L.isAES(o.algorithm))throw Error("AES session key expected");return Rr(e,a,o.wrappedKey,i,s)}case R.publicKey.aead:{const{cipher:e}=t,i=e.getValue(),{keyMaterial:s}=r,{aeadMode:a,iv:o,c}=n,u=Fi(a.getValue());return(await u(i,s)).decrypt(c.data,o,new Uint8Array)}case R.publicKey.pqc_mlkem_x25519:{const{eccSecretKey:i,mlkemSecretKey:s}=r,{eccPublicKey:a,mlkemPublicKey:o}=t,{eccCipherText:c,mlkemCipherText:u,C:h}=n;return xn(e,c,u,i,a,s,0,h.wrappedKey)}default:throw Error("Unknown public key encryption algorithm.")}}async function _i(e,t,r){let n=0;switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:{const e=L.readMPI(t.subarray(n));n+=e.length+2;const r=L.readMPI(t.subarray(n));n+=r.length+2;const i=L.readMPI(t.subarray(n));n+=i.length+2;const s=L.readMPI(t.subarray(n));return n+=s.length+2,{read:n,privateParams:{d:e,p:r,q:i,u:s}}}case R.publicKey.dsa:case R.publicKey.elgamal:{const e=L.readMPI(t.subarray(n));return n+=e.length+2,{read:n,privateParams:{x:e}}}case R.publicKey.ecdsa:case R.publicKey.ecdh:{const i=Yi(e,r.oid);let s=L.readMPI(t.subarray(n));return n+=s.length+2,s=L.leftPad(s,i),{read:n,privateParams:{d:s}}}case R.publicKey.eddsaLegacy:{const i=Yi(e,r.oid);if(r.oid.getName()!==R.curve.ed25519Legacy)throw Error("Unexpected OID for eddsaLegacy");let s=L.readMPI(t.subarray(n));return n+=s.length+2,s=L.leftPad(s,i),{read:n,privateParams:{seed:s}}}case R.publicKey.ed25519:case R.publicKey.ed448:{const r=Yi(e),i=L.readExactSubarray(t,n,n+r);return n+=i.length,{read:n,privateParams:{seed:i}}}case R.publicKey.x25519:case R.publicKey.x448:{const r=Yi(e),i=L.readExactSubarray(t,n,n+r);return n+=i.length,{read:n,privateParams:{k:i}}}case R.publicKey.hmac:{const{cipher:e}=r,i=Re(e.getValue()),s=t.subarray(n,n+32);n+=32;const a=t.subarray(n,n+i);return n+=i,{read:n,privateParams:{hashSeed:s,keyMaterial:a}}}case R.publicKey.aead:{const{cipher:e}=r,i=t.subarray(n,n+32);n+=32;const{keySize:s}=Sr(e.getValue()),a=t.subarray(n,n+s);return n+=s,{read:n,privateParams:{hashSeed:i,keyMaterial:a}}}case R.publicKey.pqc_mlkem_x25519:{const r=L.readExactSubarray(t,n,n+Yi(R.publicKey.x25519));n+=r.length;const i=L.readExactSubarray(t,n,n+64);n+=i.length;const{mlkemSecretKey:s}=await Un(e,i);return{read:n,privateParams:{eccSecretKey:r,mlkemSecretKey:s,mlkemSeed:i}}}case R.publicKey.pqc_mldsa_ed25519:{const r=L.readExactSubarray(t,n,n+Yi(R.publicKey.ed25519));n+=r.length;const i=L.readExactSubarray(t,n,n+32);n+=i.length;const{mldsaSecretKey:s}=await Tn(e,i);return{read:n,privateParams:{eccSecretKey:r,mldsaSecretKey:s,mldsaSeed:i}}}default:throw new st("Unknown public key encryption algorithm.")}}function Hi(e,t){const r=new Set([R.publicKey.ed25519,R.publicKey.x25519,R.publicKey.ed448,R.publicKey.x448,R.publicKey.aead,R.publicKey.hmac,R.publicKey.pqc_mlkem_x25519,R.publicKey.pqc_mldsa_ed25519]),n={[R.publicKey.pqc_mlkem_x25519]:new Set(["mlkemSecretKey"]),[R.publicKey.pqc_mldsa_ed25519]:new Set(["mldsaSecretKey"])},i=Object.keys(t).map((i=>{if(n[e]?.has(i))return new Uint8Array;const s=t[i];return L.isUint8Array(s)?r.has(e)?s:L.uint8ArrayToMPI(s):s.write()}));return L.concatUint8Array(i)}async function zi(e,t,r,n){switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:return async function(e,t){if(t=BigInt(t),L.getWebCrypto()){const r={name:"RSASSA-PKCS1-v1_5",modulusLength:e,publicExponent:le(t),hash:{name:"SHA-1"}},n=await Oe.generateKey(r,!0,["sign","verify"]);return Ye(await Oe.exportKey("jwk",n.privateKey),t)}if(L.getNodeCrypto()){const r={modulusLength:e,publicExponent:oe(t),publicKeyEncoding:{type:"pkcs1",format:"jwk"},privateKeyEncoding:{type:"pkcs1",format:"jwk"}},n=await new Promise(((e,t)=>{Ne.generateKeyPair("rsa",r,((r,n,i)=>{r?t(r):e(i)}))}));return Ye(n,t)}let r,n,i;do{n=ge(e-(e>>1),t,40),r=ge(e>>1,t,40),i=r*n}while(ue(i)!==e);const s=(r-_e)*(n-_e);return n<r&&([r,n]=[n,r]),{n:le(i),e:le(t),d:le(ae(t,s)),p:le(r),q:le(n),u:le(ae(r,n))}}(t,65537).then((({n:e,e:t,d:r,p:n,q:i,u:s})=>({privateParams:{d:r,p:n,q:i,u:s},publicParams:{n:e,e:t}})));case R.publicKey.ecdsa:return Yr(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{d:r},publicParams:{oid:new Xe(e),Q:t}})));case R.publicKey.eddsaLegacy:return Yr(r).then((({oid:e,Q:t,secret:r})=>({privateParams:{seed:r},publicParams:{oid:new Xe(e),Q:t}})));case R.publicKey.ecdh:return Yr(r).then((({oid:e,Q:t,secret:r,hash:n,cipher:i})=>({privateParams:{d:r},publicParams:{oid:new Xe(e),Q:t,kdfParams:new zn({hash:n,cipher:i})}})));case R.publicKey.ed25519:case R.publicKey.ed448:return ut(e).then((({A:e,seed:t})=>({privateParams:{seed:t},publicParams:{A:e}})));case R.publicKey.x25519:case R.publicKey.x448:return Dr(e).then((({A:e,k:t})=>({privateParams:{k:t},publicParams:{A:e}})));case R.publicKey.hmac:return Gi(await async function(e){if(!In.has(e))throw Error("Unsupported hash algorithm.");const t=R.read(R.webHash,e),r=Bn||Cn.webcrypto.subtle,n=await r.generateKey({name:"HMAC",hash:{name:t}},!0,["sign","verify"]),i=await r.exportKey("raw",n);return new Uint8Array(i)}(n),new Vn(n));case R.publicKey.aead:return Gi(ji(n),new jn(n));case R.publicKey.pqc_mlkem_x25519:return Pn(e).then((({eccSecretKey:e,eccPublicKey:t,mlkemSeed:r,mlkemSecretKey:n,mlkemPublicKey:i})=>({privateParams:{eccSecretKey:e,mlkemSeed:r,mlkemSecretKey:n},publicParams:{eccPublicKey:t,mlkemPublicKey:i}})));case R.publicKey.pqc_mldsa_ed25519:return Mn(e).then((({eccSecretKey:e,eccPublicKey:t,mldsaSeed:r,mldsaSecretKey:n,mldsaPublicKey:i})=>({privateParams:{eccSecretKey:e,mldsaSeed:r,mldsaSecretKey:n},publicParams:{eccPublicKey:t,mldsaPublicKey:i}})));case R.publicKey.dsa:case R.publicKey.elgamal:throw Error("Unsupported algorithm for key generation.");default:throw Error("Unknown public key algorithm.")}}async function Gi(e,t){const r=ye(32);return{privateParams:{hashSeed:r,keyMaterial:e},publicParams:{cipher:t,digest:await Qe(R.hash.sha256,r)}}}async function qi(e,t,r){if(!t||!r)throw Error("Missing key parameters");switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:{const{n:e,e:n}=t,{d:i,p:s,q:a,u:o}=r;return async function(e,t,r,n,i,s){if(e=re(e),(n=re(n))*(i=re(i))!==e)return!1;const a=BigInt(2);if(ne(n*(s=re(s)),i)!==BigInt(1))return!1;t=re(t),r=re(r);const o=pe(a,a<<BigInt(Math.floor(ue(e)/3))),c=o*r*t;return!(ne(c,n-_e)!==o||ne(c,i-_e)!==o)}(e,n,i,s,a,o)}case R.publicKey.dsa:{const{p:e,q:n,g:i,y:s}=t,{x:a}=r;return async function(e,t,r,n,i){if(e=re(e),t=re(t),r=re(r),n=re(n),r<=Sn||r>=e)return!1;if(ne(e-Sn,t)!==Kn)return!1;if(ie(r,t,e)!==Sn)return!1;const s=BigInt(ue(t));if(s<BigInt(150)||!Ae(t,null,32))return!1;i=re(i);const a=BigInt(2);return n===ie(r,t*pe(a<<s-Sn,a<<s)+i,e)}(e,n,i,s,a)}case R.publicKey.elgamal:{const{p:e,g:n,y:i}=t,{x:s}=r;return async function(e,t,r,n){if(e=re(e),t=re(t),r=re(r),t<=Ze||t>=e)return!1;const i=BigInt(ue(e));if(i<BigInt(1023))return!1;if(ie(t,e-Ze,e)!==Ze)return!1;let s=t,a=BigInt(1);const o=BigInt(2),c=o<<BigInt(17);for(;a<c;){if(s=ne(s*t,e),s===Ze)return!1;a++}n=re(n);const u=pe(o<<i-Ze,o<<i);return r===ie(t,(e-Ze)*u+n,e)}(e,n,i,s)}case R.publicKey.ecdsa:case R.publicKey.ecdh:{const n=vn[R.read(R.publicKey,e)],{oid:i,Q:s}=t,{d:a}=r;return n.validateParams(i,s,a)}case R.publicKey.eddsaLegacy:{const{Q:e,oid:n}=t,{seed:i}=r;return ln(n,e,i)}case R.publicKey.ed25519:case R.publicKey.ed448:{const{A:n}=t,{seed:i}=r;return ft(e,n,i)}case R.publicKey.x25519:case R.publicKey.x448:{const{A:n}=t,{k:i}=r;return xr(e,n,i)}case R.publicKey.hmac:{const{cipher:e,digest:n}=t,{hashSeed:i,keyMaterial:s}=r;return Re(e.getValue())===s.length&&L.equalsUint8Array(n,await Qe(R.hash.sha256,i))}case R.publicKey.aead:{const{cipher:e,digest:n}=t,{hashSeed:i,keyMaterial:s}=r,{keySize:a}=Sr(e.getValue());return a===s.length&&L.equalsUint8Array(n,await Qe(R.hash.sha256,i))}case R.publicKey.pqc_mlkem_x25519:{const{eccSecretKey:n,mlkemSeed:i}=r,{eccPublicKey:s,mlkemPublicKey:a}=t;return Rn(e,s,n,a,i)}case R.publicKey.pqc_mldsa_ed25519:{const{eccSecretKey:n,mldsaSeed:i}=r,{eccPublicKey:s,mldsaPublicKey:a}=t;return Nn(e,s,n,a,i)}default:throw Error("Unknown public key algorithm.")}}function ji(e){const{keySize:t}=Sr(e);return ye(t)}function Vi(e){try{e.getName()}catch(e){throw new st("Unknown curve OID")}}function Yi(e,t){switch(e){case R.publicKey.ecdsa:case R.publicKey.ecdh:case R.publicKey.eddsaLegacy:return new Vr(t).payloadSize;case R.publicKey.ed25519:case R.publicKey.ed448:return yt(e);case R.publicKey.x25519:case R.publicKey.x448:return Tr(e);default:throw Error("Unknown elliptic algo")}}async function Zi(e,t,r,n,i,s,a){switch(e){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.rsaSign:{const{n:e,e:i}=n;return ze(t,s,L.leftPad(r.s,e.length),e,i,a)}case R.publicKey.dsa:{const{g:e,p:t,q:i,y:s}=n,{r:o,s:c}=r;return async function(e,t,r,n,i,s,a,o){if(t=re(t),r=re(r),s=re(s),a=re(a),i=re(i),o=re(o),t<=Kn||t>=a||r<=Kn||r>=a)return L.printDebug("invalid DSA Signature"),!1;const c=ne(re(n.subarray(0,he(a))),a),u=ae(r,a);if(u===Kn)return L.printDebug("invalid DSA Signature"),!1;i=ne(i,s),o=ne(o,s);const h=ne(c*u,a),l=ne(t*u,a);return ne(ne(ie(i,h,s)*ie(o,l,s),s),a)===t}(0,o,c,a,e,t,i,s)}case R.publicKey.ecdsa:{const{oid:e,Q:i}=n,o=new Vr(e).payloadSize;return an(e,t,{r:L.leftPad(r.r,o),s:L.leftPad(r.s,o)},s,i,a)}case R.publicKey.eddsaLegacy:{if(Re(t)<Re(R.hash.sha256))throw Error("Hash algorithm too weak for EdDSALegacy.");const{oid:e,Q:i}=n,s=new Vr(e).payloadSize;return hn(e,0,{r:L.leftPad(r.r,s),s:L.leftPad(r.s,s)},0,i,a)}case R.publicKey.ed25519:case R.publicKey.ed448:{if(Re(t)<Re(pt(e)))throw Error("Hash algorithm too weak for EdDSA.");const{A:i}=n;return lt(e,0,r,0,i,a)}case R.publicKey.hmac:{if(!i)throw Error("Cannot verify HMAC signature with symmetric key missing private parameters");const{cipher:e}=n,{keyMaterial:t}=i;return async function(e,t,r,n){if(!In.has(e))throw Error("Unsupported hash algorithm.");const i=R.read(R.webHash,e),s=Bn||Cn.webcrypto.subtle,a=await s.importKey("raw",t,{name:"HMAC",hash:{name:i}},!1,["verify"]);return s.verify("HMAC",a,r,n)}(e.getValue(),t,r.mac.data,a)}case R.publicKey.pqc_mldsa_ed25519:{if(!On(e,t))throw Error("Unexpected hash algorithm for PQC signature: digest size too short");const{eccPublicKey:i,mldsaPublicKey:s}=n;return Fn(e,0,i,s,a,r)}default:throw Error("Unknown signature algorithm.")}}async function Ji(e,t,r,n,i,s){if(!r||!n)throw Error("Missing key parameters");switch(e){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.rsaSign:{const{n:e,e:a}=r,{d:o,p:c,q:u,u:h}=n;return{s:await He(t,i,e,a,o,c,u,h,s)}}case R.publicKey.dsa:{const{g:e,p:t,q:i}=r,{x:a}=n;return async function(e,t,r,n,i,s){const a=BigInt(0);let o,c,u,h;n=re(n),i=re(i),r=re(r),s=re(s),r=ne(r,n),s=ne(s,i);const l=ne(re(t.subarray(0,he(i))),i);for(;;){if(o=pe(Sn,i),c=ne(ie(r,o,n),i),c===a)continue;const e=ne(s*c,i);if(h=ne(l+e,i),u=ne(ae(o,i)*h,i),u!==a)break}return{r:le(c,"be",he(n)),s:le(u,"be",he(n))}}(0,s,e,t,i,a)}case R.publicKey.elgamal:throw Error("Signing with Elgamal is not defined in the OpenPGP standard.");case R.publicKey.ecdsa:{const{oid:e,Q:a}=r,{d:o}=n;return sn(e,t,i,a,o,s)}case R.publicKey.eddsaLegacy:{if(Re(t)<Re(R.hash.sha256))throw Error("Hash algorithm too weak for EdDSALegacy.");const{oid:e,Q:i}=r,{seed:a}=n;return un(e,0,0,i,a,s)}case R.publicKey.ed25519:case R.publicKey.ed448:{if(Re(t)<Re(pt(e)))throw Error("Hash algorithm too weak for EdDSA.");const{A:i}=r,{seed:a}=n;return ht(e,0,0,i,a,s)}case R.publicKey.hmac:{const{cipher:e}=r,{keyMaterial:t}=n,i=await async function(e,t,r){if(!In.has(e))throw Error("Unsupported hash algorithm.");const n=R.read(R.webHash,e),i=Bn||Cn.webcrypto.subtle,s=await i.importKey("raw",t,{name:"HMAC",hash:{name:n}},!1,["sign"]),a=await i.sign("HMAC",s,r);return new Uint8Array(a)}(e.getValue(),t,s);return{mac:new Hn(i)}}case R.publicKey.pqc_mldsa_ed25519:{if(!On(e,t))throw Error("Unexpected hash algorithm for PQC signature: digest size too short");const{eccPublicKey:i}=r,{eccSecretKey:a,mldsaSecretKey:o}=n;return Ln(e,0,a,i,o,s)}default:throw Error("Unknown signature algorithm.")}}Li.getNonce=function(e,t){const r=e.slice();for(let e=0;e<t.length;e++)r[4+e]^=t[e];return r},Li.blockLength=16,Li.ivLength=12,Li.tagLength=Ti;class Xi extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,Xi),this.name="Argon2OutOfMemoryError"}}let Wi,$i,es=2<<19;class ts{static get ARGON2_WASM_MEMORY_THRESHOLD_RELOAD(){return es}static set ARGON2_WASM_MEMORY_THRESHOLD_RELOAD(e){es=e}static reloadWasmModule(){Wi&&($i=Wi(),$i.catch((()=>{})))}constructor(e=T){const{passes:t,parallelism:r,memoryExponent:n}=e.s2kArgon2Params;this.type="argon2",this.salt=null,this.t=t,this.p=r,this.encodedM=n}generateSalt(){this.salt=ye(16)}read(e){let t=0;return this.salt=e.subarray(t,t+16),t+=16,this.t=e[t++],this.p=e[t++],this.encodedM=e[t++],t}write(){const e=[new Uint8Array([R.write(R.s2k,this.type)]),this.salt,new Uint8Array([this.t,this.p,this.encodedM])];return L.concatUint8Array(e)}async produceKey(e,t){const r=2<<this.encodedM-1;try{Wi=Wi||(await Promise.resolve().then((function(){return bd}))).default,$i=$i||Wi();const n=await $i,i=n({version:19,type:2,password:L.encodeUTF8(e),salt:this.salt,tagLength:t,memorySize:r,parallelism:this.p,passes:this.t});return r>ts.ARGON2_WASM_MEMORY_THRESHOLD_RELOAD&&ts.reloadWasmModule(),i}catch(e){throw e.message&&(e.message.includes("Unable to grow instance memory")||e.message.includes("failed to grow memory")||e.message.includes("WebAssembly.Memory.grow")||e.message.includes("Out of memory"))?new Xi("Could not allocate required memory for Argon2"):e}}}class rs{constructor(e,t=T){this.algorithm=R.hash.sha256,this.type=R.read(R.s2k,e),this.c=t.s2kIterationCountByte,this.salt=null}generateSalt(){switch(this.type){case"salted":case"iterated":this.salt=ye(8)}}getCount(){return 16+(15&this.c)<<6+(this.c>>4)}read(e){let t=0;switch(this.algorithm=e[t++],this.type){case"simple":break;case"salted":this.salt=e.subarray(t,t+8),t+=8;break;case"iterated":this.salt=e.subarray(t,t+8),t+=8,this.c=e[t++];break;case"gnu":if("GNU"!==L.uint8ArrayToString(e.subarray(t,t+3)))throw new st("Unknown s2k type.");t+=3;if(1001!==1e3+e[t++])throw new st("Unknown s2k gnu protection mode.");this.type="gnu-dummy";break;default:throw new st("Unknown s2k type.")}return t}write(){if("gnu-dummy"===this.type)return new Uint8Array([101,0,...L.stringToUint8Array("GNU"),1]);const e=[new Uint8Array([R.write(R.s2k,this.type),this.algorithm])];switch(this.type){case"simple":break;case"salted":e.push(this.salt);break;case"iterated":e.push(this.salt),e.push(new Uint8Array([this.c]));break;case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}return L.concatUint8Array(e)}async produceKey(e,t){e=L.encodeUTF8(e);const r=[];let n=0,i=0;for(;n<t;){let t;switch(this.type){case"simple":t=L.concatUint8Array([new Uint8Array(i),e]);break;case"salted":t=L.concatUint8Array([new Uint8Array(i),this.salt,e]);break;case"iterated":{const r=L.concatUint8Array([this.salt,e]);let n=r.length;const s=Math.max(this.getCount(),n);t=new Uint8Array(i+s),t.set(r,i);for(let e=i+n;e<s;e+=n,n*=2)t.copyWithin(e,i,e);break}case"gnu":throw Error("GNU s2k type not supported.");default:throw Error("Unknown s2k type.")}const s=await Qe(this.algorithm,t);r.push(s),n+=s.length,i++}return L.concatUint8Array(r).subarray(0,t)}}const ns=new Set([R.s2k.argon2,R.s2k.iterated]);function is(e,t=T){switch(e){case R.s2k.argon2:return new ts(t);case R.s2k.iterated:case R.s2k.gnu:case R.s2k.salted:case R.s2k.simple:return new rs(e,t);default:throw new st("Unsupported S2K type")}}function ss(e){const{s2kType:t}=e;if(!ns.has(t))throw Error("The provided `config.s2kType` value is not allowed");return is(t,e)}var as=Uint8Array,os=Uint16Array,cs=Int32Array,us=new as([0,0,0,0,0,0,0,0,1,1,1,1,2,2,2,2,3,3,3,3,4,4,4,4,5,5,5,5,0,0,0,0]),hs=new as([0,0,0,0,1,1,2,2,3,3,4,4,5,5,6,6,7,7,8,8,9,9,10,10,11,11,12,12,13,13,0,0]),ls=new as([16,17,18,0,8,7,9,6,10,5,11,4,12,3,13,2,14,1,15]),fs=function(e,t){for(var r=new os(31),n=0;n<31;++n)r[n]=t+=1<<e[n-1];var i=new cs(r[30]);for(n=1;n<30;++n)for(var s=r[n];s<r[n+1];++s)i[s]=s-r[n]<<5|n;return{b:r,r:i}},ys=fs(us,2),ps=ys.b,ds=ys.r;ps[28]=258,ds[258]=28;for(var gs=fs(hs,0),As=gs.b,ws=gs.r,ms=new os(32768),bs=0;bs<32768;++bs){var ks=(43690&bs)>>1|(21845&bs)<<1;ks=(61680&(ks=(52428&ks)>>2|(13107&ks)<<2))>>4|(3855&ks)<<4,ms[bs]=((65280&ks)>>8|(255&ks)<<8)>>1}var Es=function(e,t,r){for(var n=e.length,i=0,s=new os(t);i<n;++i)e[i]&&++s[e[i]-1];var a,o=new os(t);for(i=1;i<t;++i)o[i]=o[i-1]+s[i-1]<<1;if(r){a=new os(1<<t);var c=15-t;for(i=0;i<n;++i)if(e[i])for(var u=i<<4|e[i],h=t-e[i],l=o[e[i]-1]++<<h,f=l|(1<<h)-1;l<=f;++l)a[ms[l]>>c]=u}else for(a=new os(n),i=0;i<n;++i)e[i]&&(a[i]=ms[o[e[i]-1]++]>>15-e[i]);return a},vs=new as(288);for(bs=0;bs<144;++bs)vs[bs]=8;for(bs=144;bs<256;++bs)vs[bs]=9;for(bs=256;bs<280;++bs)vs[bs]=7;for(bs=280;bs<288;++bs)vs[bs]=8;var Ks=new as(32);for(bs=0;bs<32;++bs)Ks[bs]=5;var Ss=/*#__PURE__*/Es(vs,9,0),Is=/*#__PURE__*/Es(vs,9,1),Bs=/*#__PURE__*/Es(Ks,5,0),Cs=/*#__PURE__*/Es(Ks,5,1),Us=function(e){for(var t=e[0],r=1;r<e.length;++r)e[r]>t&&(t=e[r]);return t},Ps=function(e,t,r){var n=t/8|0;return(e[n]|e[n+1]<<8)>>(7&t)&r},Ds=function(e,t){var r=t/8|0;return(e[r]|e[r+1]<<8|e[r+2]<<16)>>(7&t)},xs=function(e){return(e+7)/8|0},Qs=function(e,t,r){return(null==t||t<0)&&(t=0),(null==r||r>e.length)&&(r=e.length),new as(e.subarray(t,r))},Rs=["unexpected EOF","invalid block type","invalid length/literal","invalid distance","stream finished","no stream handler",,"no callback","invalid UTF-8 data","extra field too long","date not in range 1980-2099","filename too long","stream finishing","invalid zip data"],Ts=function(e,t,r){var n=Error(t||Rs[e]);if(n.code=e,Error.captureStackTrace&&Error.captureStackTrace(n,Ts),!r)throw n;return n},Ms=function(e,t,r){r<<=7&t;var n=t/8|0;e[n]|=r,e[n+1]|=r>>8},Ls=function(e,t,r){r<<=7&t;var n=t/8|0;e[n]|=r,e[n+1]|=r>>8,e[n+2]|=r>>16},Fs=function(e,t){for(var r=[],n=0;n<e.length;++n)e[n]&&r.push({s:n,f:e[n]});var i=r.length,s=r.slice();if(!i)return{t:qs,l:0};if(1==i){var a=new as(r[0].s+1);return a[r[0].s]=1,{t:a,l:1}}r.sort((function(e,t){return e.f-t.f})),r.push({s:-1,f:25001});var o=r[0],c=r[1],u=0,h=1,l=2;for(r[0]={s:-1,f:o.f+c.f,l:o,r:c};h!=i-1;)o=r[r[u].f<r[l].f?u++:l++],c=r[u!=h&&r[u].f<r[l].f?u++:l++],r[h++]={s:-1,f:o.f+c.f,l:o,r:c};var f=s[0].s;for(n=1;n<i;++n)s[n].s>f&&(f=s[n].s);var y=new os(f+1),p=Os(r[h-1],y,0);if(p>t){n=0;var d=0,g=p-t,A=1<<g;for(s.sort((function(e,t){return y[t.s]-y[e.s]||e.f-t.f}));n<i;++n){var w=s[n].s;if(!(y[w]>t))break;d+=A-(1<<p-y[w]),y[w]=t}for(d>>=g;d>0;){var m=s[n].s;y[m]<t?d-=1<<t-y[m]++-1:++n}for(;n>=0&&d;--n){var b=s[n].s;y[b]==t&&(--y[b],++d)}p=t}return{t:new as(y),l:p}},Os=function(e,t,r){return-1==e.s?Math.max(Os(e.l,t,r+1),Os(e.r,t,r+1)):t[e.s]=r},Ns=function(e){for(var t=e.length;t&&!e[--t];);for(var r=new os(++t),n=0,i=e[0],s=1,a=function(e){r[n++]=e},o=1;o<=t;++o)if(e[o]==i&&o!=t)++s;else{if(!i&&s>2){for(;s>138;s-=138)a(32754);s>2&&(a(s>10?s-11<<5|28690:s-3<<5|12305),s=0)}else if(s>3){for(a(i),--s;s>6;s-=6)a(8304);s>2&&(a(s-3<<5|8208),s=0)}for(;s--;)a(i);s=1,i=e[o]}return{c:r.subarray(0,n),n:t}},_s=function(e,t){for(var r=0,n=0;n<t.length;++n)r+=e[n]*t[n];return r},Hs=function(e,t,r){var n=r.length,i=xs(t+2);e[i]=255&n,e[i+1]=n>>8,e[i+2]=255^e[i],e[i+3]=255^e[i+1];for(var s=0;s<n;++s)e[i+s+4]=r[s];return 8*(i+4+n)},zs=function(e,t,r,n,i,s,a,o,c,u,h){Ms(t,h++,r),++i[256];for(var l=Fs(i,15),f=l.t,y=l.l,p=Fs(s,15),d=p.t,g=p.l,A=Ns(f),w=A.c,m=A.n,b=Ns(d),k=b.c,E=b.n,v=new os(19),K=0;K<w.length;++K)++v[31&w[K]];for(K=0;K<k.length;++K)++v[31&k[K]];for(var S=Fs(v,7),I=S.t,B=S.l,C=19;C>4&&!I[ls[C-1]];--C);var U,P,D,x,Q=u+5<<3,R=_s(i,vs)+_s(s,Ks)+a,T=_s(i,f)+_s(s,d)+a+14+3*C+_s(v,I)+2*v[16]+3*v[17]+7*v[18];if(c>=0&&Q<=R&&Q<=T)return Hs(t,h,e.subarray(c,c+u));if(Ms(t,h,1+(T<R)),h+=2,T<R){U=Es(f,y,0),P=f,D=Es(d,g,0),x=d;var M=Es(I,B,0);Ms(t,h,m-257),Ms(t,h+5,E-1),Ms(t,h+10,C-4),h+=14;for(K=0;K<C;++K)Ms(t,h+3*K,I[ls[K]]);h+=3*C;for(var L=[w,k],F=0;F<2;++F){var O=L[F];for(K=0;K<O.length;++K){var N=31&O[K];Ms(t,h,M[N]),h+=I[N],N>15&&(Ms(t,h,O[K]>>5&127),h+=O[K]>>12)}}}else U=Ss,P=vs,D=Bs,x=Ks;for(K=0;K<o;++K){var _=n[K];if(_>255){Ls(t,h,U[(N=_>>18&31)+257]),h+=P[N+257],N>7&&(Ms(t,h,_>>23&31),h+=us[N]);var H=31&_;Ls(t,h,D[H]),h+=x[H],H>3&&(Ls(t,h,_>>5&8191),h+=hs[H])}else Ls(t,h,U[_]),h+=P[_]}return Ls(t,h,U[256]),h+P[256]},Gs=/*#__PURE__*/new cs([65540,131080,131088,131104,262176,1048704,1048832,2114560,2117632]),qs=/*#__PURE__*/new as(0),js=function(){var e=1,t=0;return{p:function(r){for(var n=e,i=t,s=0|r.length,a=0;a!=s;){for(var o=Math.min(a+2655,s);a<o;++a)i+=n+=r[a];n=(65535&n)+15*(n>>16),i=(65535&i)+15*(i>>16)}e=n,t=i},d:function(){return(255&(e%=65521))<<24|(65280&e)<<8|(255&(t%=65521))<<8|t>>8}}},Vs=function(e,t,r,n,i){if(!i&&(i={l:1},t.dictionary)){var s=t.dictionary.subarray(-32768),a=new as(s.length+e.length);a.set(s),a.set(e,s.length),e=a,i.w=s.length}return function(e,t,r,n,i,s){var a=s.z||e.length,o=new as(n+a+5*(1+Math.ceil(a/7e3))+i),c=o.subarray(n,o.length-i),u=s.l,h=7&(s.r||0);if(t){h&&(c[0]=s.r>>3);for(var l=Gs[t-1],f=l>>13,y=8191&l,p=(1<<r)-1,d=s.p||new os(32768),g=s.h||new os(p+1),A=Math.ceil(r/3),w=2*A,m=function(t){return(e[t]^e[t+1]<<A^e[t+2]<<w)&p},b=new cs(25e3),k=new os(288),E=new os(32),v=0,K=0,S=s.i||0,I=0,B=s.w||0,C=0;S+2<a;++S){var U=m(S),P=32767&S,D=g[U];if(d[P]=D,g[U]=P,B<=S){var x=a-S;if((v>7e3||I>24576)&&(x>423||!u)){h=zs(e,c,0,b,k,E,K,I,C,S-C,h),I=v=K=0,C=S;for(var Q=0;Q<286;++Q)k[Q]=0;for(Q=0;Q<30;++Q)E[Q]=0}var R=2,T=0,M=y,L=P-D&32767;if(x>2&&U==m(S-L))for(var F=Math.min(f,x)-1,O=Math.min(32767,S),N=Math.min(258,x);L<=O&&--M&&P!=D;){if(e[S+R]==e[S+R-L]){for(var _=0;_<N&&e[S+_]==e[S+_-L];++_);if(_>R){if(R=_,T=L,_>F)break;var H=Math.min(L,_-2),z=0;for(Q=0;Q<H;++Q){var G=S-L+Q&32767,q=G-d[G]&32767;q>z&&(z=q,D=G)}}}L+=(P=D)-(D=d[P])&32767}if(T){b[I++]=268435456|ds[R]<<18|ws[T];var j=31&ds[R],V=31&ws[T];K+=us[j]+hs[V],++k[257+j],++E[V],B=S+R,++v}else b[I++]=e[S],++k[e[S]]}}for(S=Math.max(S,B);S<a;++S)b[I++]=e[S],++k[e[S]];h=zs(e,c,u,b,k,E,K,I,C,S-C,h),u||(s.r=7&h|c[h/8|0]<<3,h-=7,s.h=g,s.p=d,s.i=S,s.w=B)}else{for(S=s.w||0;S<a+u;S+=65535){var Y=S+65535;Y>=a&&(c[h/8|0]=u,Y=a),h=Hs(c,h+1,e.subarray(S,Y))}s.i=a}return Qs(o,0,n+xs(h)+i)}(e,null==t.level?6:t.level,null==t.mem?i.l?Math.ceil(1.5*Math.max(8,Math.min(13,Math.log(e.length)))):20:12+t.mem,r,n,i)},Ys=function(e,t,r){for(;r;++t)e[t]=r,r>>>=8},Zs=/*#__PURE__*/function(){function e(e,t){if("function"==typeof e&&(t=e,e={}),this.ondata=t,this.o=e||{},this.s={l:0,i:32768,w:32768,z:32768},this.b=new as(98304),this.o.dictionary){var r=this.o.dictionary.subarray(-32768);this.b.set(r,32768-r.length),this.s.i=32768-r.length}}return e.prototype.p=function(e,t){this.ondata(Vs(e,this.o,0,0,this.s),t)},e.prototype.push=function(e,t){this.ondata||Ts(5),this.s.l&&Ts(4);var r=e.length+this.s.z;if(r>this.b.length){if(r>2*this.b.length-32768){var n=new as(-32768&r);n.set(this.b.subarray(0,this.s.z)),this.b=n}var i=this.b.length-this.s.z;this.b.set(e.subarray(0,i),this.s.z),this.s.z=this.b.length,this.p(this.b,!1),this.b.set(this.b.subarray(-32768)),this.b.set(e.subarray(i),32768),this.s.z=e.length-i+32768,this.s.i=32766,this.s.w=32768}else this.b.set(e,this.s.z),this.s.z+=e.length;this.s.l=1&t,(this.s.z>this.s.w+8191||t)&&(this.p(this.b,t||!1),this.s.w=this.s.i,this.s.i-=2)},e.prototype.flush=function(){this.ondata||Ts(5),this.s.l&&Ts(4),this.p(this.b,!1),this.s.w=this.s.i,this.s.i-=2},e}(),Js=/*#__PURE__*/function(){function e(e,t){"function"==typeof e&&(t=e,e={}),this.ondata=t;var r=e&&e.dictionary&&e.dictionary.subarray(-32768);this.s={i:0,b:r?r.length:0},this.o=new as(32768),this.p=new as(0),r&&this.o.set(r)}return e.prototype.e=function(e){if(this.ondata||Ts(5),this.d&&Ts(4),this.p.length){if(e.length){var t=new as(this.p.length+e.length);t.set(this.p),t.set(e,this.p.length),this.p=t}}else this.p=e},e.prototype.c=function(e){this.s.i=+(this.d=e||!1);var t=this.s.b,r=function(e,t,r,n){var i=e.length;if(!i||t.f&&!t.l)return r||new as(0);var s=!r,a=s||2!=t.i,o=t.i;s&&(r=new as(3*i));var c=function(e){var t=r.length;if(e>t){var n=new as(Math.max(2*t,e));n.set(r),r=n}},u=t.f||0,h=t.p||0,l=t.b||0,f=t.l,y=t.d,p=t.m,d=t.n,g=8*i;do{if(!f){u=Ps(e,h,1);var A=Ps(e,h+1,3);if(h+=3,!A){var w=e[(U=xs(h)+4)-4]|e[U-3]<<8,m=U+w;if(m>i){o&&Ts(0);break}a&&c(l+w),r.set(e.subarray(U,m),l),t.b=l+=w,t.p=h=8*m,t.f=u;continue}if(1==A)f=Is,y=Cs,p=9,d=5;else if(2==A){var b=Ps(e,h,31)+257,k=Ps(e,h+10,15)+4,E=b+Ps(e,h+5,31)+1;h+=14;for(var v=new as(E),K=new as(19),S=0;S<k;++S)K[ls[S]]=Ps(e,h+3*S,7);h+=3*k;var I=Us(K),B=(1<<I)-1,C=Es(K,I,1);for(S=0;S<E;){var U,P=C[Ps(e,h,B)];if(h+=15&P,(U=P>>4)<16)v[S++]=U;else{var D=0,x=0;for(16==U?(x=3+Ps(e,h,3),h+=2,D=v[S-1]):17==U?(x=3+Ps(e,h,7),h+=3):18==U&&(x=11+Ps(e,h,127),h+=7);x--;)v[S++]=D}}var Q=v.subarray(0,b),R=v.subarray(b);p=Us(Q),d=Us(R),f=Es(Q,p,1),y=Es(R,d,1)}else Ts(1);if(h>g){o&&Ts(0);break}}a&&c(l+131072);for(var T=(1<<p)-1,M=(1<<d)-1,L=h;;L=h){var F=(D=f[Ds(e,h)&T])>>4;if((h+=15&D)>g){o&&Ts(0);break}if(D||Ts(2),F<256)r[l++]=F;else{if(256==F){L=h,f=null;break}var O=F-254;if(F>264){var N=us[S=F-257];O=Ps(e,h,(1<<N)-1)+ps[S],h+=N}var _=y[Ds(e,h)&M],H=_>>4;if(_||Ts(3),h+=15&_,R=As[H],H>3&&(N=hs[H],R+=Ds(e,h)&(1<<N)-1,h+=N),h>g){o&&Ts(0);break}a&&c(l+131072);var z=l+O;if(l<R){var G=0-R,q=Math.min(R,z);for(G+l<0&&Ts(3);l<q;++l)r[l]=n[G+l]}for(;l<z;++l)r[l]=r[l-R]}}t.l=f,t.p=L,t.b=l,t.f=u,f&&(u=1,t.m=p,t.d=y,t.n=d)}while(!u);return l!=r.length&&s?Qs(r,0,l):r.subarray(0,l)}(this.p,this.s,this.o);this.ondata(Qs(r,t,this.s.b),this.d),this.o=Qs(r,this.s.b-32768),this.s.b=this.o.length,this.p=Qs(this.p,this.s.p/8|0),this.s.p&=7},e.prototype.push=function(e,t){this.e(e),this.c(t)},e}(),Xs=/*#__PURE__*/function(){function e(e,t){this.c=js(),this.v=1,Zs.call(this,e,t)}return e.prototype.push=function(e,t){this.c.p(e),Zs.prototype.push.call(this,e,t)},e.prototype.p=function(e,t){var r=Vs(e,this.o,this.v&&(this.o.dictionary?6:2),t&&4,this.s);this.v&&(function(e,t){var r=t.level,n=0==r?0:r<6?1:9==r?3:2;if(e[0]=120,e[1]=n<<6|(t.dictionary&&32),e[1]|=31-(e[0]<<8|e[1])%31,t.dictionary){var i=js();i.p(t.dictionary),Ys(e,2,i.d())}}(r,this.o),this.v=0),t&&Ys(r,r.length-4,this.c.d()),this.ondata(r,t)},e.prototype.flush=function(){Zs.prototype.flush.call(this)},e}(),Ws=/*#__PURE__*/function(){function e(e,t){Js.call(this,e,t),this.v=e&&e.dictionary?2:1}return e.prototype.push=function(e,t){if(Js.prototype.e.call(this,e),this.v){if(this.p.length<6&&!t)return;this.p=this.p.subarray((r=this.p,n=this.v-1,(8!=(15&r[0])||r[0]>>4>7||(r[0]<<8|r[1])%31)&&Ts(6,"invalid zlib data"),(r[1]>>5&1)==+!n&&Ts(6,"invalid zlib data: "+(32&r[1]?"need":"unexpected")+" dictionary"),2+(r[1]>>3&4))),this.v=0}var r,n;t&&(this.p.length<4&&Ts(6,"invalid zlib data"),this.p=this.p.subarray(0,-4)),Js.prototype.c.call(this,t)},e}(),$s="undefined"!=typeof TextDecoder&&/*#__PURE__*/new TextDecoder;try{$s.decode(qs,{stream:!0})}catch(e){}class ea{static get tag(){return R.packet.literalData}constructor(e=new Date){this.format=R.literal.utf8,this.date=L.normalizeDate(e),this.text=null,this.data=null,this.filename=""}setText(e,t=R.literal.utf8){this.format=t,this.text=e,this.data=null}getText(e=!1){return(null===this.text||L.isStream(this.text))&&(this.text=L.decodeUTF8(L.nativeEOL(this.getBytes(e)))),this.text}setBytes(e,t){this.format=t,this.data=e,this.text=null}getBytes(e=!1){return null===this.data&&(this.data=L.canonicalizeEOL(L.encodeUTF8(this.text))),e?S(this.data):this.data}setFilename(e){this.filename=e}getFilename(){return this.filename}async read(e){await v(e,(async e=>{const t=await e.readByte(),r=await e.readByte();this.filename=L.decodeUTF8(await e.readBytes(r)),this.date=L.readDate(await e.readBytes(4));let n=e.remainder();o(n)&&(n=await C(n)),this.setBytes(n,t)}))}writeHeader(){const e=L.encodeUTF8(this.filename),t=new Uint8Array([e.length]),r=new Uint8Array([this.format]),n=L.writeDate(this.date);return L.concatUint8Array([r,t,e,n])}write(){const e=this.writeHeader(),t=this.getBytes();return L.concat([e,t])}}class ta{constructor(){this.bytes=""}read(e){return this.bytes=L.uint8ArrayToString(e.subarray(0,8)),this.bytes.length}write(){return L.stringToUint8Array(this.bytes)}toHex(){return L.uint8ArrayToHex(L.stringToUint8Array(this.bytes))}equals(e,t=!1){return t&&(e.isWildcard()||this.isWildcard())||this.bytes===e.bytes}isNull(){return""===this.bytes}isWildcard(){return/^0+$/.test(this.toHex())}static mapToHex(e){return e.toHex()}static fromID(e){const t=new ta;return t.read(L.hexToUint8Array(e)),t}static wildcard(){const e=new ta;return e.read(new Uint8Array(8)),e}}const ra=Symbol("verified"),na="salt@notations.openpgpjs.org",ia=new Set([R.signatureSubpacket.issuerKeyID,R.signatureSubpacket.issuerFingerprint,R.signatureSubpacket.embeddedSignature]);class sa{static get tag(){return R.packet.signature}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.signatureData=null,this.unhashedSubpackets=[],this.unknownSubpackets=[],this.signedHashValue=null,this.salt=null,this.created=null,this.signatureExpirationTime=null,this.signatureNeverExpires=!0,this.exportable=null,this.trustLevel=null,this.trustAmount=null,this.regularExpression=null,this.revocable=null,this.keyExpirationTime=null,this.keyNeverExpires=null,this.preferredSymmetricAlgorithms=null,this.revocationKeyClass=null,this.revocationKeyAlgorithm=null,this.revocationKeyFingerprint=null,this.issuerKeyID=new ta,this.rawNotations=[],this.notations={},this.preferredHashAlgorithms=null,this.preferredCompressionAlgorithms=null,this.keyServerPreferences=null,this.preferredKeyServer=null,this.isPrimaryUserID=null,this.policyURI=null,this.keyFlags=null,this.signersUserID=null,this.reasonForRevocationFlag=null,this.reasonForRevocationString=null,this.features=null,this.signatureTargetPublicKeyAlgorithm=null,this.signatureTargetHashAlgorithm=null,this.signatureTargetHash=null,this.embeddedSignature=null,this.issuerKeyVersion=null,this.issuerFingerprint=null,this.preferredAEADAlgorithms=null,this.preferredCipherSuites=null,this.revoked=null,this[ra]=null}read(e,t=T){let r=0;if(this.version=e[r++],5===this.version&&!t.enableParsingV5Entities)throw new st("Support for v5 entities is disabled; turn on `config.enableParsingV5Entities` if needed");if(4!==this.version&&5!==this.version&&6!==this.version)throw new st(`Version ${this.version} of the signature packet is unsupported.`);if(this.signatureType=e[r++],this.publicKeyAlgorithm=e[r++],this.hashAlgorithm=e[r++],r+=this.readSubPackets(e.subarray(r,e.length),!0),!this.created)throw Error("Missing signature creation time subpacket.");if(this.signatureData=e.subarray(0,r),r+=this.readSubPackets(e.subarray(r,e.length),!1),this.signedHashValue=e.subarray(r,r+2),r+=2,6===this.version){const t=e[r++];this.salt=e.subarray(r,r+t),r+=t}const n=e.subarray(r,e.length),{read:i,signatureParams:s}=function(e,t){let r=0;switch(e){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.rsaSign:{const e=L.readMPI(t.subarray(r));return r+=e.length+2,{read:r,signatureParams:{s:e}}}case R.publicKey.dsa:case R.publicKey.ecdsa:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));return r+=n.length+2,{read:r,signatureParams:{r:e,s:n}}}case R.publicKey.eddsaLegacy:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));return r+=n.length+2,{read:r,signatureParams:{r:e,s:n}}}case R.publicKey.ed25519:case R.publicKey.ed448:{const n=2*yt(e),i=L.readExactSubarray(t,r,r+n);return r+=i.length,{read:r,signatureParams:{RS:i}}}case R.publicKey.hmac:{const e=new Hn;return r+=e.read(t.subarray(r)),{read:r,signatureParams:{mac:e}}}case R.publicKey.pqc_mldsa_ed25519:{const e=2*yt(R.publicKey.ed25519),n=L.readExactSubarray(t,r,r+e);r+=n.length;const i=L.readExactSubarray(t,r,r+3309);return r+=i.length,{read:r,signatureParams:{eccSignature:n,mldsaSignature:i}}}default:throw new st("Unknown signature algorithm.")}}(this.publicKeyAlgorithm,n);if(i<n.length)throw Error("Error reading MPIs");this.params=s}writeParams(){return this.params instanceof Promise?P((async()=>Hi(this.publicKeyAlgorithm,await this.params))):Hi(this.publicKeyAlgorithm,this.params)}write(){const e=[];return e.push(this.signatureData),e.push(this.writeUnhashedSubPackets()),e.push(this.signedHashValue),6===this.version&&(e.push(new Uint8Array([this.salt.length])),e.push(this.salt)),e.push(this.writeParams()),L.concat(e)}async sign(e,t,r=new Date,n=!1,i){this.version=e.version,this.created=L.normalizeDate(r),this.issuerKeyVersion=e.version,this.issuerFingerprint=e.getFingerprintBytes(),this.issuerKeyID=e.getKeyID();const s=[new Uint8Array([this.version,this.signatureType,this.publicKeyAlgorithm,this.hashAlgorithm])];if(6===this.version){const e=oa(this.hashAlgorithm);if(null===this.salt)this.salt=ye(e);else if(e!==this.salt.length)throw Error("Provided salt does not have the required length")}else if(i.nonDeterministicSignaturesViaNotation){if(0!==this.rawNotations.filter((({name:e})=>e===na)).length)throw Error("Unexpected existing salt notation");{const e=ye(oa(this.hashAlgorithm));this.rawNotations.push({name:na,value:e,humanReadable:!1,critical:!1})}}s.push(this.writeHashedSubPackets()),this.unhashedSubpackets=[],this.signatureData=L.concat(s);const a=this.toHash(this.signatureType,t,n),o=await this.hash(this.signatureType,t,a,n);this.signedHashValue=B(K(o),0,2);const c=async()=>Ji(this.publicKeyAlgorithm,this.hashAlgorithm,e.publicParams,e.privateParams,a,await C(o));L.isStream(o)?this.params=c():(this.params=await c(),this[ra]=!0)}writeHashedSubPackets(){const e=R.signatureSubpacket,t=[];let r;if(null===this.created)throw Error("Missing signature creation time");t.push(aa(e.signatureCreationTime,!0,L.writeDate(this.created))),null!==this.signatureExpirationTime&&t.push(aa(e.signatureExpirationTime,!0,L.writeNumber(this.signatureExpirationTime,4))),null!==this.exportable&&t.push(aa(e.exportableCertification,!0,new Uint8Array([this.exportable?1:0]))),null!==this.trustLevel&&(r=new Uint8Array([this.trustLevel,this.trustAmount]),t.push(aa(e.trustSignature,!0,r))),null!==this.regularExpression&&t.push(aa(e.regularExpression,!0,this.regularExpression)),null!==this.revocable&&t.push(aa(e.revocable,!0,new Uint8Array([this.revocable?1:0]))),null!==this.keyExpirationTime&&t.push(aa(e.keyExpirationTime,!0,L.writeNumber(this.keyExpirationTime,4))),null!==this.preferredSymmetricAlgorithms&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.preferredSymmetricAlgorithms)),t.push(aa(e.preferredSymmetricAlgorithms,!1,r))),null!==this.revocationKeyClass&&(r=new Uint8Array([this.revocationKeyClass,this.revocationKeyAlgorithm]),r=L.concat([r,this.revocationKeyFingerprint]),t.push(aa(e.revocationKey,!1,r))),!this.issuerKeyID.isNull()&&this.issuerKeyVersion<5&&t.push(aa(e.issuerKeyID,!1,this.issuerKeyID.write())),this.rawNotations.forEach((({name:n,value:i,humanReadable:s,critical:a})=>{r=[new Uint8Array([s?128:0,0,0,0])];const o=L.encodeUTF8(n);r.push(L.writeNumber(o.length,2)),r.push(L.writeNumber(i.length,2)),r.push(o),r.push(i),r=L.concat(r),t.push(aa(e.notationData,a,r))})),null!==this.preferredHashAlgorithms&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.preferredHashAlgorithms)),t.push(aa(e.preferredHashAlgorithms,!1,r))),null!==this.preferredCompressionAlgorithms&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.preferredCompressionAlgorithms)),t.push(aa(e.preferredCompressionAlgorithms,!1,r))),null!==this.keyServerPreferences&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.keyServerPreferences)),t.push(aa(e.keyServerPreferences,!1,r))),null!==this.preferredKeyServer&&t.push(aa(e.preferredKeyServer,!1,L.encodeUTF8(this.preferredKeyServer))),null!==this.isPrimaryUserID&&t.push(aa(e.primaryUserID,!1,new Uint8Array([this.isPrimaryUserID?1:0]))),null!==this.policyURI&&t.push(aa(e.policyURI,!1,L.encodeUTF8(this.policyURI))),null!==this.keyFlags&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.keyFlags)),t.push(aa(e.keyFlags,!0,r))),null!==this.signersUserID&&t.push(aa(e.signersUserID,!1,L.encodeUTF8(this.signersUserID))),null!==this.reasonForRevocationFlag&&(r=L.stringToUint8Array(String.fromCharCode(this.reasonForRevocationFlag)+this.reasonForRevocationString),t.push(aa(e.reasonForRevocation,!0,r))),null!==this.features&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.features)),t.push(aa(e.features,!1,r))),null!==this.signatureTargetPublicKeyAlgorithm&&(r=[new Uint8Array([this.signatureTargetPublicKeyAlgorithm,this.signatureTargetHashAlgorithm])],r.push(L.stringToUint8Array(this.signatureTargetHash)),r=L.concat(r),t.push(aa(e.signatureTarget,!0,r))),null!==this.embeddedSignature&&t.push(aa(e.embeddedSignature,!0,this.embeddedSignature.write())),null!==this.issuerFingerprint&&(r=[new Uint8Array([this.issuerKeyVersion]),this.issuerFingerprint],r=L.concat(r),t.push(aa(e.issuerFingerprint,this.version>=5,r))),null!==this.preferredAEADAlgorithms&&(r=L.stringToUint8Array(L.uint8ArrayToString(this.preferredAEADAlgorithms)),t.push(aa(e.preferredAEADAlgorithms,!1,r))),null!==this.preferredCipherSuites&&(r=new Uint8Array([].concat(...this.preferredCipherSuites)),t.push(aa(e.preferredCipherSuites,!1,r)));const n=L.concat(t),i=L.writeNumber(n.length,6===this.version?4:2);return L.concat([i,n])}writeUnhashedSubPackets(){const e=this.unhashedSubpackets.map((({type:e,critical:t,body:r})=>aa(e,t,r))),t=L.concat(e),r=L.writeNumber(t.length,6===this.version?4:2);return L.concat([r,t])}readSubPacket(e,t=!0){let r=0;const n=!!(128&e[r]),i=127&e[r];if(r++,t||(this.unhashedSubpackets.push({type:i,critical:n,body:e.subarray(r,e.length)}),ia.has(i)))switch(i){case R.signatureSubpacket.signatureCreationTime:this.created=L.readDate(e.subarray(r,e.length));break;case R.signatureSubpacket.signatureExpirationTime:{const t=L.readNumber(e.subarray(r,e.length));this.signatureNeverExpires=0===t,this.signatureExpirationTime=t;break}case R.signatureSubpacket.exportableCertification:this.exportable=1===e[r++];break;case R.signatureSubpacket.trustSignature:this.trustLevel=e[r++],this.trustAmount=e[r++];break;case R.signatureSubpacket.regularExpression:this.regularExpression=e[r];break;case R.signatureSubpacket.revocable:this.revocable=1===e[r++];break;case R.signatureSubpacket.keyExpirationTime:{const t=L.readNumber(e.subarray(r,e.length));this.keyExpirationTime=t,this.keyNeverExpires=0===t;break}case R.signatureSubpacket.preferredSymmetricAlgorithms:this.preferredSymmetricAlgorithms=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.revocationKey:this.revocationKeyClass=e[r++],this.revocationKeyAlgorithm=e[r++],this.revocationKeyFingerprint=e.subarray(r,r+20);break;case R.signatureSubpacket.issuerKeyID:if(4===this.version)this.issuerKeyID.read(e.subarray(r,e.length));else if(t)throw Error("Unexpected Issuer Key ID subpacket");break;case R.signatureSubpacket.notationData:{const t=!!(128&e[r]);r+=4;const i=L.readNumber(e.subarray(r,r+2));r+=2;const s=L.readNumber(e.subarray(r,r+2));r+=2;const a=L.decodeUTF8(e.subarray(r,r+i)),o=e.subarray(r+i,r+i+s);this.rawNotations.push({name:a,humanReadable:t,value:o,critical:n}),t&&(this.notations[a]=L.decodeUTF8(o));break}case R.signatureSubpacket.preferredHashAlgorithms:this.preferredHashAlgorithms=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.preferredCompressionAlgorithms:this.preferredCompressionAlgorithms=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.keyServerPreferences:this.keyServerPreferences=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.preferredKeyServer:this.preferredKeyServer=L.decodeUTF8(e.subarray(r,e.length));break;case R.signatureSubpacket.primaryUserID:this.isPrimaryUserID=0!==e[r++];break;case R.signatureSubpacket.policyURI:this.policyURI=L.decodeUTF8(e.subarray(r,e.length));break;case R.signatureSubpacket.keyFlags:this.keyFlags=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.signersUserID:this.signersUserID=L.decodeUTF8(e.subarray(r,e.length));break;case R.signatureSubpacket.reasonForRevocation:this.reasonForRevocationFlag=e[r++],this.reasonForRevocationString=L.decodeUTF8(e.subarray(r,e.length));break;case R.signatureSubpacket.features:this.features=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.signatureTarget:{this.signatureTargetPublicKeyAlgorithm=e[r++],this.signatureTargetHashAlgorithm=e[r++];const t=Re(this.signatureTargetHashAlgorithm);this.signatureTargetHash=L.uint8ArrayToString(e.subarray(r,r+t));break}case R.signatureSubpacket.embeddedSignature:this.embeddedSignature=new sa,this.embeddedSignature.read(e.subarray(r,e.length));break;case R.signatureSubpacket.issuerFingerprint:this.issuerKeyVersion=e[r++],this.issuerFingerprint=e.subarray(r,e.length),this.issuerKeyVersion>=5?this.issuerKeyID.read(this.issuerFingerprint):this.issuerKeyID.read(this.issuerFingerprint.subarray(-8));break;case R.signatureSubpacket.preferredAEADAlgorithms:this.preferredAEADAlgorithms=[...e.subarray(r,e.length)];break;case R.signatureSubpacket.preferredCipherSuites:this.preferredCipherSuites=[];for(let t=r;t<e.length;t+=2)this.preferredCipherSuites.push([e[t],e[t+1]]);break;default:this.unknownSubpackets.push({type:i,critical:n,body:e.subarray(r,e.length)})}}readSubPackets(e,t=!0,r){const n=6===this.version?4:2,i=L.readNumber(e.subarray(0,n));let s=n;for(;s<2+i;){const n=We(e.subarray(s,e.length));s+=n.offset,this.readSubPacket(e.subarray(s,s+n.len),t,r),s+=n.len}return s}toSign(e,t){const r=R.signature;switch(e){case r.binary:return null!==t.text?L.encodeUTF8(t.getText(!0)):t.getBytes(!0);case r.text:{const e=t.getBytes(!0);return L.canonicalizeEOL(e)}case r.standalone:return new Uint8Array(0);case r.certGeneric:case r.certPersona:case r.certCasual:case r.certPositive:case r.certRevocation:{let e,n;if(t.userID)n=180,e=t.userID;else{if(!t.userAttribute)throw Error("Either a userID or userAttribute packet needs to be supplied for certification.");n=209,e=t.userAttribute}const i=e.write();return L.concat([this.toSign(r.key,t),new Uint8Array([n]),L.writeNumber(i.length,4),i])}case r.subkeyBinding:case r.subkeyRevocation:case r.keyBinding:return L.concat([this.toSign(r.key,t),this.toSign(r.key,{key:t.bind})]);case r.key:if(void 0===t.key)throw Error("Key packet is required for this signature.");return t.key.writeForHash(this.version);case r.keyRevocation:return this.toSign(r.key,t);case r.timestamp:return new Uint8Array(0);case r.thirdParty:throw Error("Not implemented");default:throw Error("Unknown signature type.")}}calculateTrailer(e,t){let r=0;return k(K(this.signatureData),(e=>{r+=e.length}),(()=>{const n=[];return 5!==this.version||this.signatureType!==R.signature.binary&&this.signatureType!==R.signature.text||(t?n.push(new Uint8Array(6)):n.push(e.writeHeader())),n.push(new Uint8Array([this.version,255])),5===this.version&&n.push(new Uint8Array(4)),n.push(L.writeNumber(r,4)),L.concat(n)}))}toHash(e,t,r=!1){const n=this.toSign(e,t);return L.concat([this.salt||new Uint8Array,n,this.signatureData,this.calculateTrailer(t,r)])}async hash(e,t,r,n=!1){if(6===this.version&&this.salt.length!==oa(this.hashAlgorithm))throw Error("Signature salt does not have the expected length");return r||(r=this.toHash(e,t,n)),Qe(this.hashAlgorithm,r)}async verify(e,t,r,n=new Date,i=!1,s=T){if(!this.issuerKeyID.equals(e.getKeyID()))throw Error("Signature was not issued by the given public key");if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Public key algorithm used to sign signature does not match issuer key algorithm.");const a=t===R.signature.binary||t===R.signature.text;if(!(this[ra]&&!a)){let n,s;if(this.hashed?s=await this.hashed:(n=this.toHash(t,r,i),s=await this.hash(t,r,n)),s=await C(s),this.signedHashValue[0]!==s[0]||this.signedHashValue[1]!==s[1])throw Error("Signed digest did not match");this.params=await this.params;const a=this.publicKeyAlgorithm===R.publicKey.hmac?e.privateParams:null;if(this[ra]=await Zi(this.publicKeyAlgorithm,this.hashAlgorithm,this.params,e.publicParams,a,n,s),!this[ra])throw Error("Signature verification failed")}const o=L.normalizeDate(n);if(o&&this.created>o)throw Error("Signature creation time is in the future");if(o&&o>=this.getExpirationTime())throw Error("Signature is expired");if(s.rejectHashAlgorithms.has(this.hashAlgorithm))throw Error("Insecure hash algorithm: "+R.read(R.hash,this.hashAlgorithm).toUpperCase());if(s.rejectMessageHashAlgorithms.has(this.hashAlgorithm)&&[R.signature.binary,R.signature.text].includes(this.signatureType))throw Error("Insecure message hash algorithm: "+R.read(R.hash,this.hashAlgorithm).toUpperCase());if(this.unknownSubpackets.forEach((({type:e,critical:t})=>{if(t)throw Error("Unknown critical signature subpacket type "+e)})),this.rawNotations.forEach((({name:e,critical:t})=>{if(t&&s.knownNotations.indexOf(e)<0)throw Error("Unknown critical notation: "+e)})),null!==this.revocationKeyClass)throw Error("This key is intended to be revoked with an authorized key, which OpenPGP.js does not support.")}isExpired(e=new Date){const t=L.normalizeDate(e);return null!==t&&!(this.created<=t&&t<this.getExpirationTime())}getExpirationTime(){return this.signatureNeverExpires?1/0:new Date(this.created.getTime()+1e3*this.signatureExpirationTime)}}function aa(e,t,r){const n=[];return n.push($e(r.length+1)),n.push(new Uint8Array([(t?128:0)|e])),n.push(r),L.concat(n)}function oa(e){switch(e){case R.hash.sha256:return 16;case R.hash.sha384:return 24;case R.hash.sha512:return 32;case R.hash.sha224:case R.hash.sha3_256:return 16;case R.hash.sha3_512:return 32;default:throw Error("Unsupported hash function")}}class ca{static get tag(){return R.packet.onePassSignature}static fromSignaturePacket(e,t){const r=new ca;return r.version=6===e.version?6:3,r.signatureType=e.signatureType,r.hashAlgorithm=e.hashAlgorithm,r.publicKeyAlgorithm=e.publicKeyAlgorithm,r.issuerKeyID=e.issuerKeyID,r.salt=e.salt,r.issuerFingerprint=e.issuerFingerprint,r.flags=t?1:0,r}constructor(){this.version=null,this.signatureType=null,this.hashAlgorithm=null,this.publicKeyAlgorithm=null,this.salt=null,this.issuerKeyID=null,this.issuerFingerprint=null,this.flags=null}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new st(`Version ${this.version} of the one-pass signature packet is unsupported.`);if(this.signatureType=e[t++],this.hashAlgorithm=e[t++],this.publicKeyAlgorithm=e[t++],6===this.version){const r=e[t++];this.salt=e.subarray(t,t+r),t+=r,this.issuerFingerprint=e.subarray(t,t+32),t+=32,this.issuerKeyID=new ta,this.issuerKeyID.read(this.issuerFingerprint)}else this.issuerKeyID=new ta,this.issuerKeyID.read(e.subarray(t,t+8)),t+=8;return this.flags=e[t++],this}write(){const e=[new Uint8Array([this.version,this.signatureType,this.hashAlgorithm,this.publicKeyAlgorithm])];return 6===this.version?e.push(new Uint8Array([this.salt.length]),this.salt,this.issuerFingerprint):e.push(this.issuerKeyID.write()),e.push(new Uint8Array([this.flags])),L.concatUint8Array(e)}calculateTrailer(...e){return P((async()=>sa.prototype.calculateTrailer.apply(await this.correspondingSig,e)))}async verify(){const e=await this.correspondingSig;if(!e||e.constructor.tag!==R.packet.signature)throw Error("Corresponding signature packet missing");if(e.signatureType!==this.signatureType||e.hashAlgorithm!==this.hashAlgorithm||e.publicKeyAlgorithm!==this.publicKeyAlgorithm||!e.issuerKeyID.equals(this.issuerKeyID)||3===this.version&&6===e.version||6===this.version&&6!==e.version||6===this.version&&!L.equalsUint8Array(e.issuerFingerprint,this.issuerFingerprint)||6===this.version&&!L.equalsUint8Array(e.salt,this.salt))throw Error("Corresponding signature packet does not match one-pass signature packet");return e.hashed=this.hashed,e.verify.apply(e,arguments)}}function ua(e,t){if(!t[e]){let t;try{t=R.read(R.packet,e)}catch(t){throw new at("Unknown packet type with tag: "+e)}throw Error("Packet not allowed in this context: "+t)}return new t[e]}ca.prototype.hash=sa.prototype.hash,ca.prototype.toHash=sa.prototype.toHash,ca.prototype.toSign=sa.prototype.toSign;class ha extends Array{static async fromBinary(e,t,r=T,n=null,i=!1){const s=new ha;return await s.read(e,t,r,n,i),s}async read(e,t,r=T,n=null,i=!1){let s;r.additionalAllowedPackets.length&&(s=L.constructAllowedPackets(r.additionalAllowedPackets),t={...t,...s}),this.stream=E(e,(async(e,a)=>{const o=D(e),c=x(a);try{let a=L.isStream(e);for(;;){let e,u;if(await c.ready,await it(o,a,(async a=>{try{if(a.tag===R.packet.marker||a.tag===R.packet.trust||a.tag===R.packet.padding)return;const e=ua(a.tag,t);try{n?.recordPacket(a.tag,s)}catch(e){if(r.enforceGrammar)throw e;L.printDebugError(e)}e.packets=new ha,e.fromStream=L.isStream(a.packet),u=e.fromStream;try{await e.read(a.packet,r)}catch(t){if(!(t instanceof st))throw L.wrapError(new ot(`Parsing ${e.constructor.name} failed`),t);throw t}await c.write(e)}catch(t){const n=t instanceof at&&a.tag<=39,s=t instanceof st&&!(t instanceof at)&&!r.ignoreUnsupportedPackets,o=t instanceof ot&&!r.ignoreMalformedPackets,u=nt(a.tag);if(n||s||o||u||!(t instanceof at||t instanceof st||t instanceof ot))i?e=t:await c.abort(t);else{const e=new ct(a.tag,a.packet);await c.write(e)}L.printDebugError(t)}})),u&&(a=null),e)throw await o.readToEnd(),e;const h=await o.peekBytes(2);if(!h||!h.length){try{n?.recordEnd()}catch(e){if(r.enforceGrammar)throw e;L.printDebugError(e)}return await c.ready,void await c.close()}}}catch(e){await c.abort(e)}}));const a=D(this.stream);for(;;){const{done:e,value:t}=await a.read();if(e?this.stream=null:this.push(t),e||nt(t.constructor.tag))break}a.releaseLock()}write(){const e=[];for(let t=0;t<this.length;t++){const r=this[t]instanceof ct?this[t].tag:this[t].constructor.tag,n=this[t].write();if(L.isStream(n)&&nt(this[t].constructor.tag)){let t=[],i=0;const s=512;e.push(tt(r)),e.push(k(n,(e=>{if(t.push(e),i+=e.length,i>=s){const e=Math.min(Math.log(i)/Math.LN2|0,30),r=2**e,n=L.concat([et(e)].concat(t));return t=[n.subarray(1+r)],i=t[0].length,n.subarray(0,1+r)}}),(()=>L.concat([$e(i)].concat(t)))))}else{if(L.isStream(n)){let t=0;e.push(k(K(n),(e=>{t+=e.length}),(()=>rt(r,t))))}else e.push(rt(r,n.length));e.push(n)}}return L.concat(e)}filterByTag(...e){const t=new ha,r=e=>t=>e===t;for(let n=0;n<this.length;n++)e.some(r(this[n].constructor.tag))&&t.push(this[n]);return t}findPacket(e){return this.find((t=>t.constructor.tag===e))}indexOfTag(...e){const t=[],r=this,n=e=>t=>e===t;for(let i=0;i<this.length;i++)e.some(n(r[i].constructor.tag))&&t.push(i);return t}}class la extends Error{constructor(...e){super(...e),Error.captureStackTrace&&Error.captureStackTrace(this,la),this.name="GrammarError"}}var fa;!function(e){e[e.EmptyMessage=0]="EmptyMessage",e[e.PlaintextOrEncryptedData=1]="PlaintextOrEncryptedData",e[e.EncryptedSessionKeys=2]="EncryptedSessionKeys",e[e.StandaloneAdditionalAllowedData=3]="StandaloneAdditionalAllowedData"}(fa||(fa={}));class ya{constructor(){this.state=fa.EmptyMessage,this.leadingOnePassSignatureCounter=0}recordPacket(e,t){switch(this.state){case fa.EmptyMessage:case fa.StandaloneAdditionalAllowedData:switch(e){case R.packet.literalData:case R.packet.compressedData:case R.packet.aeadEncryptedData:case R.packet.symEncryptedIntegrityProtectedData:case R.packet.symmetricallyEncryptedData:return void(this.state=fa.PlaintextOrEncryptedData);case R.packet.signature:if(this.state===fa.StandaloneAdditionalAllowedData&&--this.leadingOnePassSignatureCounter<0)throw new la("Trailing signature packet without OPS");return;case R.packet.onePassSignature:if(this.state===fa.StandaloneAdditionalAllowedData)throw new la("OPS following StandaloneAdditionalAllowedData");return void this.leadingOnePassSignatureCounter++;case R.packet.publicKeyEncryptedSessionKey:case R.packet.symEncryptedSessionKey:return void(this.state=fa.EncryptedSessionKeys);default:if(!t?.[e])throw new la(`Unexpected packet ${e} in state ${this.state}`);return void(this.state=fa.StandaloneAdditionalAllowedData)}case fa.PlaintextOrEncryptedData:if(e===R.packet.signature){if(--this.leadingOnePassSignatureCounter<0)throw new la("Trailing signature packet without OPS");return void(this.state=fa.PlaintextOrEncryptedData)}if(!t?.[e])throw new la(`Unexpected packet ${e} in state ${this.state}`);return void(this.state=fa.PlaintextOrEncryptedData);case fa.EncryptedSessionKeys:switch(e){case R.packet.publicKeyEncryptedSessionKey:case R.packet.symEncryptedSessionKey:return void(this.state=fa.EncryptedSessionKeys);case R.packet.symEncryptedIntegrityProtectedData:case R.packet.aeadEncryptedData:case R.packet.symmetricallyEncryptedData:return void(this.state=fa.PlaintextOrEncryptedData);case R.packet.signature:if(--this.leadingOnePassSignatureCounter<0)throw new la("Trailing signature packet without OPS");return void(this.state=fa.PlaintextOrEncryptedData);default:if(!t?.[e])throw new la(`Unexpected packet ${e} in state ${this.state}`);this.state=fa.EncryptedSessionKeys}}}recordEnd(){switch(this.state){case fa.EmptyMessage:case fa.PlaintextOrEncryptedData:case fa.EncryptedSessionKeys:case fa.StandaloneAdditionalAllowedData:if(this.leadingOnePassSignatureCounter>0)throw new la("Missing trailing signature packets")}}}const pa=/*#__PURE__*/L.constructAllowedPackets([ea,ca,sa]);class da{static get tag(){return R.packet.compressedData}constructor(e=T){this.packets=null,this.algorithm=e.preferredCompressionAlgorithm,this.compressed=null}async read(e,t=T){await v(e,(async e=>{this.algorithm=await e.readByte(),this.compressed=e.remainder(),await this.decompress(t)}))}write(){return null===this.compressed&&this.compress(),L.concat([new Uint8Array([this.algorithm]),this.compressed])}async decompress(e=T){const t=R.read(R.compression,this.algorithm),r=ba[t];if(!r)throw Error(t+" decompression not supported");this.packets=await ha.fromBinary(await r(this.compressed),pa,e,new ya)}compress(){const e=R.read(R.compression,this.algorithm),t=ma[e];if(!t)throw Error(e+" compression not supported");this.compressed=t(this.packets.write())}}function ga(e,t){return r=>{if(!L.isStream(r)||o(r))return P((()=>C(r).then((e=>new Promise(((r,n)=>{const i=new t,s=[];i.ondata=(e,t)=>{s.push(e),t&&r(L.concatUint8Array(s))};try{i.push(e,!0)}catch(e){n(e)}}))))));if(e)try{const t=e();return r.pipeThrough(t)}catch(e){if("TypeError"!==e.name)throw e}const n=r.getReader(),i=new t;return new ReadableStream({async start(e){for(i.ondata=async(t,r)=>{e.enqueue(t),r&&e.close()};;){const{done:e,value:t}=await n.read();if(e)return void i.push(new Uint8Array,!0);t.length&&i.push(t)}}})}}function Aa(){return async function(e){const{decode:t}=await Promise.resolve().then((function(){return vd}));return P((async()=>t(await C(e))))}}const wa=e=>({compressor:"undefined"!=typeof CompressionStream&&(()=>new CompressionStream(e)),decompressor:"undefined"!=typeof DecompressionStream&&(()=>new DecompressionStream(e))}),ma={zip:/*#__PURE__*/ga(wa("deflate-raw").compressor,Zs),zlib:/*#__PURE__*/ga(wa("deflate").compressor,Xs)},ba={uncompressed:e=>e,zip:/*#__PURE__*/ga(wa("deflate-raw").decompressor,Js),zlib:/*#__PURE__*/ga(wa("deflate").decompressor,Ws),bzip2:/*#__PURE__*/Aa()},ka=/*#__PURE__*/L.constructAllowedPackets([ea,da,ca,sa]);class Ea{static get tag(){return R.packet.symEncryptedIntegrityProtectedData}static fromObject({version:e,aeadAlgorithm:t}){if(1!==e&&2!==e)throw Error("Unsupported SEIPD version");const r=new Ea;return r.version=e,2===e&&(r.aeadAlgorithm=t),r}constructor(){this.version=null,this.cipherAlgorithm=null,this.aeadAlgorithm=null,this.chunkSizeByte=null,this.salt=null,this.encrypted=null,this.packets=null}async read(e){await v(e,(async e=>{if(this.version=await e.readByte(),1!==this.version&&2!==this.version)throw new st(`Version ${this.version} of the SEIP packet is unsupported.`);2===this.version&&(this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte(),this.salt=await e.readBytes(32)),this.encrypted=e.remainder()}))}write(){return 2===this.version?L.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.salt,this.encrypted]):L.concat([new Uint8Array([this.version]),this.encrypted])}async encrypt(e,t,r=T){const{blockSize:n,keySize:i}=Sr(e);if(t.length!==i)throw Error("Unexpected session key size");let s=this.packets.write();if(o(s)&&(s=await C(s)),2===this.version)this.cipherAlgorithm=e,this.salt=ye(32),this.chunkSizeByte=r.aeadChunkSizeByte,this.encrypted=await va(this,"encrypt",t,s);else{const r=await $n(e),i=new Uint8Array([211,20]),a=L.concat([r,s,i]),o=await Qe(R.hash.sha1,S(a)),c=L.concat([a,o]);this.encrypted=await ei(e,t,c,new Uint8Array(n))}return!0}async decrypt(e,t,r=T){if(t.length!==Sr(e).keySize)throw Error("Unexpected session key size");let n,i=K(this.encrypted);o(i)&&(i=await C(i));let s=!1;if(2===this.version){if(this.cipherAlgorithm!==e)throw Error("Unexpected session key algorithm");n=await va(this,"decrypt",t,i)}else{const{blockSize:a}=Sr(e),o=await ti(e,t,i,new Uint8Array(a)),c=B(S(o),-20),u=B(o,0,-20),h=Promise.all([C(await Qe(R.hash.sha1,S(u))),C(c)]).then((([e,t])=>{if(!L.equalsUint8Array(e,t))throw Error("Modification detected.");return new Uint8Array})),l=B(u,a+2);n=B(l,0,-2),n=A([n,P((()=>h))]),L.isStream(i)&&r.allowUnauthenticatedStream?s=!0:n=await C(n)}return this.packets=await ha.fromBinary(n,ka,r,new ya,s),!0}}async function va(e,t,r,n){const i=e instanceof Ea&&2===e.version,s=!i&&e.constructor.tag===R.packet.aeadEncryptedData;if(!i&&!s)throw Error("Unexpected packet type");const a=Fi(e.aeadAlgorithm,s),o="decrypt"===t?a.tagLength:0,c="encrypt"===t?a.tagLength:0,u=2**(e.chunkSizeByte+6)+o,h=s?8:0,l=new ArrayBuffer(13+h),f=new Uint8Array(l,0,5+h),y=new Uint8Array(l),p=new DataView(l),d=new Uint8Array(l,5,8);f.set([192|e.constructor.tag,e.version,e.cipherAlgorithm,e.aeadAlgorithm,e.chunkSizeByte],0);let g,A,m=0,b=Promise.resolve(),k=0,v=0;if(i){const{keySize:t}=Sr(e.cipherAlgorithm),{ivLength:n}=a,i=new Uint8Array(l,0,5),s=await Ur(R.hash.sha256,r,e.salt,i,t+n);r=s.subarray(0,t),g=s.subarray(t),g.fill(0,g.length-8),A=new DataView(g.buffer,g.byteOffset,g.byteLength)}else g=e.iv;const K=await a(e.cipherAlgorithm,r);return E(n,(async(r,n)=>{if("array"!==L.isStream(r)){const t=new TransformStream({},{highWaterMark:L.getHardwareConcurrency()*2**(e.chunkSizeByte+6),size:e=>e.length});w(t.readable,n),n=t.writable}const s=D(r),a=x(n);try{for(;;){let e=await s.readBytes(u+o)||new Uint8Array;const r=e.subarray(e.length-o);let n,l,w;if(e=e.subarray(0,e.length-o),i)w=g;else{w=g.slice();for(let e=0;e<8;e++)w[g.length-8+e]^=d[e]}if(!m||e.length?(s.unshift(r),n=K[t](e,w,f),n.catch((()=>{})),v+=e.length-o+c):(p.setInt32(5+h+4,k),n=K[t](r,w,y),n.catch((()=>{})),v+=c,l=!0),k+=e.length-o,b=b.then((()=>n)).then((async e=>{await a.ready,await a.write(e),v-=e.length})).catch((e=>a.abort(e))),(l||v>a.desiredSize)&&await b,l){await a.close();break}i?A.setInt32(g.length-4,++m):p.setInt32(9,++m)}}catch(e){await a.ready.catch((()=>{})),await a.abort(e)}}))}const Ka=/*#__PURE__*/L.constructAllowedPackets([ea,da,ca,sa]);class Sa{static get tag(){return R.packet.aeadEncryptedData}constructor(){this.version=1,this.cipherAlgorithm=null,this.aeadAlgorithm=R.aead.eax,this.chunkSizeByte=null,this.iv=null,this.encrypted=null,this.packets=null}async read(e){await v(e,(async e=>{const t=await e.readByte();if(1!==t)throw new st(`Version ${t} of the AEAD-encrypted data packet is not supported.`);this.cipherAlgorithm=await e.readByte(),this.aeadAlgorithm=await e.readByte(),this.chunkSizeByte=await e.readByte();const r=Fi(this.aeadAlgorithm,!0);this.iv=await e.readBytes(r.ivLength),this.encrypted=e.remainder()}))}write(){return L.concat([new Uint8Array([this.version,this.cipherAlgorithm,this.aeadAlgorithm,this.chunkSizeByte]),this.iv,this.encrypted])}async decrypt(e,t,r=T){this.packets=await ha.fromBinary(await va(this,"decrypt",t,K(this.encrypted)),Ka,r,new ya)}async encrypt(e,t,r=T){this.cipherAlgorithm=e;const{ivLength:n}=Fi(this.aeadAlgorithm,!0);this.iv=ye(n),this.chunkSizeByte=r.aeadChunkSizeByte;const i=this.packets.write();this.encrypted=await va(this,"encrypt",t,i)}}const Ia=new Set([R.publicKey.x25519,R.publicKey.x448,R.publicKey.pqc_mlkem_x25519]);class Ba{static get tag(){return R.packet.publicKeyEncryptedSessionKey}constructor(){this.version=null,this.publicKeyID=new ta,this.publicKeyVersion=null,this.publicKeyFingerprint=null,this.publicKeyAlgorithm=null,this.sessionKey=null,this.sessionKeyAlgorithm=null,this.encrypted={}}static fromObject({version:e,encryptionKeyPacket:t,anonymousRecipient:r,sessionKey:n,sessionKeyAlgorithm:i}){const s=new Ba;if(3!==e&&6!==e)throw Error("Unsupported PKESK version");return s.version=e,6===e&&(s.publicKeyVersion=r?null:t.version,s.publicKeyFingerprint=r?null:t.getFingerprintBytes()),s.publicKeyID=r?ta.wildcard():t.getKeyID(),s.publicKeyAlgorithm=t.algorithm,s.sessionKey=n,s.sessionKeyAlgorithm=i,s}read(e){let t=0;if(this.version=e[t++],3!==this.version&&6!==this.version)throw new st(`Version ${this.version} of the PKESK packet is unsupported.`);if(6===this.version){const r=e[t++];if(r){this.publicKeyVersion=e[t++];const n=r-1;this.publicKeyFingerprint=e.subarray(t,t+n),t+=n,this.publicKeyVersion>=5?this.publicKeyID.read(this.publicKeyFingerprint):this.publicKeyID.read(this.publicKeyFingerprint.subarray(-8))}else this.publicKeyID=ta.wildcard()}else t+=this.publicKeyID.read(e.subarray(t,t+8));if(this.publicKeyAlgorithm=e[t++],this.encrypted=function(e,t){let r=0;switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:return{c:L.readMPI(t.subarray(r))};case R.publicKey.elgamal:{const e=L.readMPI(t.subarray(r));return r+=e.length+2,{c1:e,c2:L.readMPI(t.subarray(r))}}case R.publicKey.ecdh:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=new _n;return n.read(t.subarray(r)),{V:e,C:n}}case R.publicKey.x25519:case R.publicKey.x448:{const n=Yi(e),i=L.readExactSubarray(t,r,r+n);r+=i.length;const s=new Yn;return s.read(t.subarray(r)),{ephemeralPublicKey:i,C:s}}case R.publicKey.aead:{const e=new qn;r+=e.read(t.subarray(r));const{ivLength:n}=Fi(e.getValue()),i=t.subarray(r,r+n);r+=n;const s=new Hn;return r+=s.read(t.subarray(r)),{aeadMode:e,iv:i,c:s}}case R.publicKey.pqc_mlkem_x25519:{const e=L.readExactSubarray(t,r,r+Yi(R.publicKey.x25519));r+=e.length;const n=L.readExactSubarray(t,r,r+1088);r+=n.length;const i=new Yn;return i.read(t.subarray(r)),{eccCipherText:e,mlkemCipherText:n,C:i}}default:throw new st("Unknown public key encryption algorithm.")}}(this.publicKeyAlgorithm,e.subarray(t)),Ia.has(this.publicKeyAlgorithm))if(3===this.version)this.sessionKeyAlgorithm=R.write(R.symmetric,this.encrypted.C.algorithm);else if(null!==this.encrypted.C.algorithm)throw Error("Unexpected cleartext symmetric algorithm")}write(){const e=[new Uint8Array([this.version])];return 6===this.version?null!==this.publicKeyFingerprint?(e.push(new Uint8Array([this.publicKeyFingerprint.length+1,this.publicKeyVersion])),e.push(this.publicKeyFingerprint)):e.push(new Uint8Array([0])):e.push(this.publicKeyID.write()),e.push(new Uint8Array([this.publicKeyAlgorithm]),Hi(this.publicKeyAlgorithm,this.encrypted)),L.concatUint8Array(e)}async encrypt(e){const t=R.write(R.publicKey,this.publicKeyAlgorithm),r=3===this.version?this.sessionKeyAlgorithm:null,n=5===e.version?e.getFingerprintBytes().subarray(0,20):e.getFingerprintBytes(),i=Ca(this.version,t,r,this.sessionKey),s=t===R.publicKey.aead?e.privateParams:null;this.encrypted=await Oi(t,r,e.publicParams,s,i,n)}async decrypt(e,t){if(this.publicKeyAlgorithm!==e.algorithm)throw Error("Decryption error");const r=t?Ca(this.version,this.publicKeyAlgorithm,t.sessionKeyAlgorithm,t.sessionKey):null,n=5===e.version?e.getFingerprintBytes().subarray(0,20):e.getFingerprintBytes(),i=await Ni(this.publicKeyAlgorithm,e.publicParams,e.privateParams,this.encrypted,n,r),{sessionKey:s,sessionKeyAlgorithm:a}=function(e,t,r,n){switch(t){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.elgamal:case R.publicKey.ecdh:case R.publicKey.aead:{const t=r.subarray(0,r.length-2),i=r.subarray(r.length-2),s=L.writeChecksum(t.subarray(t.length%8)),a=s[0]===i[0]&s[1]===i[1],o=6===e?{sessionKeyAlgorithm:null,sessionKey:t}:{sessionKeyAlgorithm:t[0],sessionKey:t.subarray(1)};if(n){const t=a&o.sessionKeyAlgorithm===n.sessionKeyAlgorithm&o.sessionKey.length===n.sessionKey.length;return{sessionKey:L.selectUint8Array(t,o.sessionKey,n.sessionKey),sessionKeyAlgorithm:6===e?null:L.selectUint8(t,o.sessionKeyAlgorithm,n.sessionKeyAlgorithm)}}if(a&&(6===e||R.read(R.symmetric,o.sessionKeyAlgorithm)))return o;throw Error("Decryption error")}case R.publicKey.x25519:case R.publicKey.x448:case R.publicKey.pqc_mlkem_x25519:return{sessionKeyAlgorithm:null,sessionKey:r};default:throw Error("Unsupported public key algorithm")}}(this.version,this.publicKeyAlgorithm,i,t);if(3===this.version){const e=!Ia.has(this.publicKeyAlgorithm);if(this.sessionKeyAlgorithm=e?a:this.sessionKeyAlgorithm,s.length!==Sr(this.sessionKeyAlgorithm).keySize)throw Error("Unexpected session key size")}this.sessionKey=s}}function Ca(e,t,r,n){switch(t){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.elgamal:case R.publicKey.ecdh:case R.publicKey.aead:return L.concatUint8Array([new Uint8Array(6===e?[]:[r]),n,L.writeChecksum(n.subarray(n.length%8))]);case R.publicKey.x25519:case R.publicKey.x448:case R.publicKey.pqc_mlkem_x25519:return n;default:throw Error("Unsupported public key algorithm")}}class Ua{static get tag(){return R.packet.symEncryptedSessionKey}constructor(e=T){this.version=e.aeadProtect?6:4,this.sessionKey=null,this.sessionKeyEncryptionAlgorithm=null,this.sessionKeyAlgorithm=null,this.aeadAlgorithm=R.write(R.aead,e.preferredAEADAlgorithm),this.encrypted=null,this.s2k=null,this.iv=null}read(e){let t=0;if(this.version=e[t++],4!==this.version&&5!==this.version&&6!==this.version)throw new st(`Version ${this.version} of the SKESK packet is unsupported.`);6===this.version&&t++;const r=e[t++];this.version>=5&&(this.aeadAlgorithm=e[t++],6===this.version&&t++);const n=e[t++];if(this.s2k=is(n),t+=this.s2k.read(e.subarray(t,e.length)),this.version>=5){const r=Fi(this.aeadAlgorithm,!0);this.iv=e.subarray(t,t+=r.ivLength)}this.version>=5||t<e.length?(this.encrypted=e.subarray(t,e.length),this.sessionKeyEncryptionAlgorithm=r):this.sessionKeyAlgorithm=r}write(){const e=null===this.encrypted?this.sessionKeyAlgorithm:this.sessionKeyEncryptionAlgorithm;let t;const r=this.s2k.write();if(6===this.version){const n=r.length,i=3+n+this.iv.length;t=L.concatUint8Array([new Uint8Array([this.version,i,e,this.aeadAlgorithm,n]),r,this.iv,this.encrypted])}else 5===this.version?t=L.concatUint8Array([new Uint8Array([this.version,e,this.aeadAlgorithm]),r,this.iv,this.encrypted]):(t=L.concatUint8Array([new Uint8Array([this.version,e]),r]),null!==this.encrypted&&(t=L.concatUint8Array([t,this.encrypted])));return t}async decrypt(e){const t=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm,{blockSize:r,keySize:n}=Sr(t),i=await this.s2k.produceKey(e,n);if(this.version>=5){const e=Fi(this.aeadAlgorithm,!0),r=new Uint8Array([192|Ua.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),s=6===this.version?await Ur(R.hash.sha256,i,new Uint8Array,r,n):i,a=await e(t,s);this.sessionKey=await a.decrypt(this.encrypted,this.iv,r)}else if(null!==this.encrypted){const e=await ti(t,i,this.encrypted,new Uint8Array(r));if(this.sessionKeyAlgorithm=R.write(R.symmetric,e[0]),this.sessionKey=e.subarray(1,e.length),this.sessionKey.length!==Sr(this.sessionKeyAlgorithm).keySize)throw Error("Unexpected session key size")}else this.sessionKey=i}async encrypt(e,t=T){const r=null!==this.sessionKeyEncryptionAlgorithm?this.sessionKeyEncryptionAlgorithm:this.sessionKeyAlgorithm;this.sessionKeyEncryptionAlgorithm=r,this.s2k=ss(t),this.s2k.generateSalt();const{blockSize:n,keySize:i}=Sr(r),s=await this.s2k.produceKey(e,i);if(null===this.sessionKey&&(this.sessionKey=ji(this.sessionKeyAlgorithm)),this.version>=5){const e=Fi(this.aeadAlgorithm);this.iv=ye(e.ivLength);const t=new Uint8Array([192|Ua.tag,this.version,this.sessionKeyEncryptionAlgorithm,this.aeadAlgorithm]),n=6===this.version?await Ur(R.hash.sha256,s,new Uint8Array,t,i):s,a=await e(r,n);this.encrypted=await a.encrypt(this.sessionKey,this.iv,t)}else{const e=L.concatUint8Array([new Uint8Array([this.sessionKeyAlgorithm]),this.sessionKey]);this.encrypted=await ei(r,s,e,new Uint8Array(n))}}}class Pa{static get tag(){return R.packet.publicKey}constructor(e=new Date,t=T){this.version=t.v6Keys?6:4,this.created=L.normalizeDate(e),this.algorithm=null,this.publicParams=null,this.expirationTimeV3=0,this.fingerprint=null,this.keyID=null}static fromSecretKeyPacket(e){const t=new Pa,{version:r,created:n,algorithm:i,publicParams:s,keyID:a,fingerprint:o}=e;return t.version=r,t.created=n,t.algorithm=i,t.publicParams=s,t.keyID=a,t.fingerprint=o,t}async read(e,t=T){let r=0;if(this.version=e[r++],5===this.version&&!t.enableParsingV5Entities)throw new st("Support for parsing v5 entities is disabled; turn on `config.enableParsingV5Entities` if needed");if(4===this.version||5===this.version||6===this.version){this.created=L.readDate(e.subarray(r,r+4)),r+=4,this.algorithm=e[r++],this.version>=5&&(r+=4);const{read:t,publicParams:n}=function(e,t){let r=0;switch(e){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));return r+=n.length+2,{read:r,publicParams:{n:e,e:n}}}case R.publicKey.dsa:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));r+=n.length+2;const i=L.readMPI(t.subarray(r));r+=i.length+2;const s=L.readMPI(t.subarray(r));return r+=s.length+2,{read:r,publicParams:{p:e,q:n,g:i,y:s}}}case R.publicKey.elgamal:{const e=L.readMPI(t.subarray(r));r+=e.length+2;const n=L.readMPI(t.subarray(r));r+=n.length+2;const i=L.readMPI(t.subarray(r));return r+=i.length+2,{read:r,publicParams:{p:e,g:n,y:i}}}case R.publicKey.ecdsa:{const e=new Xe;r+=e.read(t),Vi(e);const n=L.readMPI(t.subarray(r));return r+=n.length+2,{read:r,publicParams:{oid:e,Q:n}}}case R.publicKey.eddsaLegacy:{const e=new Xe;if(r+=e.read(t),Vi(e),e.getName()!==R.curve.ed25519Legacy)throw Error("Unexpected OID for eddsaLegacy");let n=L.readMPI(t.subarray(r));return r+=n.length+2,n=L.leftPad(n,33),{read:r,publicParams:{oid:e,Q:n}}}case R.publicKey.ecdh:{const e=new Xe;r+=e.read(t),Vi(e);const n=L.readMPI(t.subarray(r));r+=n.length+2;const i=new zn;return r+=i.read(t.subarray(r)),{read:r,publicParams:{oid:e,Q:n,kdfParams:i}}}case R.publicKey.ed25519:case R.publicKey.ed448:case R.publicKey.x25519:case R.publicKey.x448:{const n=L.readExactSubarray(t,r,r+Yi(e));return r+=n.length,{read:r,publicParams:{A:n}}}case R.publicKey.hmac:case R.publicKey.aead:{const e=new jn;r+=e.read(t);const n=Re(R.hash.sha256),i=t.subarray(r,r+n);return r+=n,{read:r,publicParams:{cipher:e,digest:i}}}case R.publicKey.pqc_mlkem_x25519:{const e=L.readExactSubarray(t,r,r+Yi(R.publicKey.x25519));r+=e.length;const n=L.readExactSubarray(t,r,r+1184);return r+=n.length,{read:r,publicParams:{eccPublicKey:e,mlkemPublicKey:n}}}case R.publicKey.pqc_mldsa_ed25519:{const e=L.readExactSubarray(t,r,r+Yi(R.publicKey.ed25519));r+=e.length;const n=L.readExactSubarray(t,r,r+1952);return r+=n.length,{read:r,publicParams:{eccPublicKey:e,mldsaPublicKey:n}}}default:throw new st("Unknown public key encryption algorithm.")}}(this.algorithm,e.subarray(r));if(6===this.version&&n.oid&&(n.oid.getName()===R.curve.curve25519Legacy||n.oid.getName()===R.curve.ed25519Legacy))throw Error("Legacy curve25519 cannot be used with v6 keys");if(6!==this.version&&this.algorithm===R.publicKey.pqc_mldsa_ed25519)throw Error("Unexpected key version: ML-DSA algorithms can only be used with v6 keys");return this.publicParams=n,r+=t,await this.computeFingerprintAndKeyID(),r}throw new st(`Version ${this.version} of the key packet is unsupported.`)}write(){const e=[];e.push(new Uint8Array([this.version])),e.push(L.writeDate(this.created)),e.push(new Uint8Array([this.algorithm]));const t=Hi(this.algorithm,this.publicParams);return this.version>=5&&e.push(L.writeNumber(t.length,4)),e.push(t),L.concatUint8Array(e)}writeForHash(e){const t=this.writePublicKey(),r=149+e,n=e>=5?4:2;return L.concatUint8Array([new Uint8Array([r]),L.writeNumber(t.length,n),t])}isDecrypted(){return null}getCreationTime(){return this.created}getKeyID(){return this.keyID}async computeFingerprintAndKeyID(){if(await this.computeFingerprint(),this.keyID=new ta,this.version>=5)this.keyID.read(this.fingerprint.subarray(0,8));else{if(4!==this.version)throw Error("Unsupported key version");this.keyID.read(this.fingerprint.subarray(12,20))}}async computeFingerprint(){const e=this.writeForHash(this.version);if(this.version>=5)this.fingerprint=await Qe(R.hash.sha256,e);else{if(4!==this.version)throw Error("Unsupported key version");this.fingerprint=await Qe(R.hash.sha1,e)}}getFingerprintBytes(){return this.fingerprint}getFingerprint(){return L.uint8ArrayToHex(this.getFingerprintBytes())}hasSameFingerprintAs(e){return this.version===e.version&&L.equalsUint8Array(this.writePublicKey(),e.writePublicKey())}getAlgorithmInfo(){const e={};e.algorithm=R.read(R.publicKey,this.algorithm);const t=this.publicParams.n||this.publicParams.p;return t?e.bits=L.uint8ArrayBitLength(t):this.publicParams.oid?e.curve=this.publicParams.oid.getName():this.publicParams.cipher&&(e.symmetric=this.publicParams.cipher.getName()),e}}Pa.prototype.readPublicKey=Pa.prototype.read,Pa.prototype.writePublicKey=Pa.prototype.write;const Da=/*#__PURE__*/L.constructAllowedPackets([ea,da,ca,sa]);class xa{static get tag(){return R.packet.symmetricallyEncryptedData}constructor(){this.encrypted=null,this.packets=null}read(e){this.encrypted=e}write(){return this.encrypted}async decrypt(e,t,r=T){if(!r.allowUnauthenticatedMessages)throw Error("Message is not authenticated.");const{blockSize:n}=Sr(e),i=await C(K(this.encrypted)),s=await ti(e,t,i.subarray(n+2),i.subarray(2,n+2));this.packets=await ha.fromBinary(s,Da,r)}async encrypt(e,t,r=T){const n=this.packets.write(),{blockSize:i}=Sr(e),s=await $n(e),a=await ei(e,t,s,new Uint8Array(i)),o=await ei(e,t,n,a.subarray(2));this.encrypted=L.concat([a,o])}}class Qa extends Pa{static get tag(){return R.packet.publicSubkey}constructor(e,t){super(e,t)}static fromSecretSubkeyPacket(e){const t=new Qa,{version:r,created:n,algorithm:i,publicParams:s,keyID:a,fingerprint:o}=e;return t.version=r,t.created=n,t.algorithm=i,t.publicParams=s,t.keyID=a,t.fingerprint=o,t}}class Ra{static get tag(){return R.packet.userAttribute}constructor(){this.attributes=[]}read(e){let t=0;for(;t<e.length;){const r=We(e.subarray(t,e.length));t+=r.offset,this.attributes.push(L.uint8ArrayToString(e.subarray(t,t+r.len))),t+=r.len}}write(){const e=[];for(let t=0;t<this.attributes.length;t++)e.push($e(this.attributes[t].length)),e.push(L.stringToUint8Array(this.attributes[t]));return L.concatUint8Array(e)}equals(e){return!!(e&&e instanceof Ra)&&this.attributes.every((function(t,r){return t===e.attributes[r]}))}}class Ta extends Pa{static get tag(){return R.packet.secretKey}constructor(e=new Date,t=T){super(e,t),this.keyMaterial=null,this.isEncrypted=null,this.s2kUsage=0,this.s2k=null,this.symmetric=null,this.aead=null,this.isLegacyAEAD=null,this.privateParams=null,this.usedModernAEAD=null}async read(e,t=T){let r=await this.readPublicKey(e,t);const n=r;this.s2kUsage=e[r++],5===this.version&&r++,6===this.version&&this.s2kUsage&&r++;try{if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){this.symmetric=e[r++],253===this.s2kUsage&&(this.aead=e[r++]),6===this.version&&r++;const t=e[r++];if(this.s2k=is(t),r+=this.s2k.read(e.subarray(r,e.length)),"gnu-dummy"===this.s2k.type)return}else this.s2kUsage&&(this.symmetric=this.s2kUsage);this.s2kUsage&&(this.isLegacyAEAD=253===this.s2kUsage&&(5===this.version||4===this.version&&t.parseAEADEncryptedV4KeysAsLegacy),253!==this.s2kUsage||this.isLegacyAEAD?(this.iv=e.subarray(r,r+Sr(this.symmetric).blockSize),this.usedModernAEAD=!1):(this.iv=e.subarray(r,r+Fi(this.aead).ivLength),this.usedModernAEAD=!0),r+=this.iv.length)}catch(t){if(!this.s2kUsage)throw t;this.unparseableKeyMaterial=e.subarray(n),this.isEncrypted=!0}if(5===this.version&&(r+=4),this.keyMaterial=e.subarray(r),this.isEncrypted=!!this.s2kUsage,!this.isEncrypted){let e;if(6===this.version)e=this.keyMaterial;else if(e=this.keyMaterial.subarray(0,-2),!L.equalsUint8Array(L.writeChecksum(e),this.keyMaterial.subarray(-2)))throw Error("Key checksum mismatch");try{const{read:t,privateParams:r}=await _i(this.algorithm,e,this.publicParams);if(t<e.length)throw Error("Error reading MPIs");this.privateParams=r}catch(e){if(e instanceof st)throw e;throw Error("Error reading MPIs")}}}write(){const e=this.writePublicKey();if(this.unparseableKeyMaterial)return L.concatUint8Array([e,this.unparseableKeyMaterial]);const t=[e];t.push(new Uint8Array([this.s2kUsage]));const r=[];if(255===this.s2kUsage||254===this.s2kUsage||253===this.s2kUsage){r.push(this.symmetric),253===this.s2kUsage&&r.push(this.aead);const e=this.s2k.write();6===this.version&&r.push(e.length),r.push(...e)}return this.s2kUsage&&"gnu-dummy"!==this.s2k.type&&r.push(...this.iv),(5===this.version||6===this.version&&this.s2kUsage)&&t.push(new Uint8Array([r.length])),t.push(new Uint8Array(r)),this.isDummy()||(this.s2kUsage||(this.keyMaterial=Hi(this.algorithm,this.privateParams)),5===this.version&&t.push(L.writeNumber(this.keyMaterial.length,4)),t.push(this.keyMaterial),this.s2kUsage||6===this.version||t.push(L.writeChecksum(this.keyMaterial))),L.concatUint8Array(t)}isDecrypted(){return!1===this.isEncrypted}isMissingSecretKeyMaterial(){return void 0!==this.unparseableKeyMaterial||this.isDummy()}isDummy(){return!(!this.s2k||"gnu-dummy"!==this.s2k.type)}makeDummy(e=T){this.isDummy()||(this.isDecrypted()&&this.clearPrivateParams(),delete this.unparseableKeyMaterial,this.isEncrypted=null,this.keyMaterial=null,this.s2k=is(R.s2k.gnu,e),this.s2k.algorithm=0,this.s2k.c=0,this.s2k.type="gnu-dummy",this.s2kUsage=254,this.symmetric=R.symmetric.aes256,this.isLegacyAEAD=null,this.usedModernAEAD=null)}async encrypt(e,t=T){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key packet is already encrypted");if(!e)throw Error("A non-empty passphrase is required for key encryption.");this.s2k=ss(t),this.s2k.generateSalt();const r=Hi(this.algorithm,this.privateParams);this.symmetric=R.symmetric.aes256;const{blockSize:n}=Sr(this.symmetric);if(t.aeadProtect){this.s2kUsage=253,this.aead=t.preferredAEADAlgorithm;const i=Fi(this.aead);this.isLegacyAEAD=5===this.version,this.usedModernAEAD=!this.isLegacyAEAD;const s=tt(this.constructor.tag),a=await Ma(this.version,this.s2k,e,this.symmetric,this.aead,s,this.isLegacyAEAD),o=await i(this.symmetric,a);this.iv=this.isLegacyAEAD?ye(n):ye(i.ivLength);const c=this.isLegacyAEAD?new Uint8Array:L.concatUint8Array([s,this.writePublicKey()]);this.keyMaterial=await o.encrypt(r,this.iv.subarray(0,i.ivLength),c)}else{this.s2kUsage=254,this.usedModernAEAD=!1;const t=await Ma(this.version,this.s2k,e,this.symmetric);this.iv=ye(n),this.keyMaterial=await ei(this.symmetric,t,L.concatUint8Array([r,await Qe(R.hash.sha1,r)]),this.iv)}}async decrypt(e){if(this.isDummy())return!1;if(this.unparseableKeyMaterial)throw Error("Key packet cannot be decrypted: unsupported S2K or cipher algo");if(this.isDecrypted())throw Error("Key packet is already decrypted.");let t;const r=tt(this.constructor.tag);if(254!==this.s2kUsage&&253!==this.s2kUsage)throw 255===this.s2kUsage?Error("Encrypted private key is authenticated using an insecure two-byte hash"):Error("Private key is encrypted using an insecure S2K function: unsalted MD5");let n;if(t=await Ma(this.version,this.s2k,e,this.symmetric,this.aead,r,this.isLegacyAEAD),253===this.s2kUsage){const e=Fi(this.aead,!0),i=await e(this.symmetric,t);try{const t=this.isLegacyAEAD?new Uint8Array:L.concatUint8Array([r,this.writePublicKey()]);n=await i.decrypt(this.keyMaterial,this.iv.subarray(0,e.ivLength),t)}catch(e){if("Authentication tag mismatch"===e.message)throw Error("Incorrect key passphrase: "+e.message);throw e}}else{const e=await ti(this.symmetric,t,this.keyMaterial,this.iv);n=e.subarray(0,-20);const r=await Qe(R.hash.sha1,n);if(!L.equalsUint8Array(r,e.subarray(-20)))throw Error("Incorrect key passphrase")}try{const{privateParams:e}=await _i(this.algorithm,n,this.publicParams);this.privateParams=e}catch(e){throw Error("Error reading MPIs")}this.isEncrypted=!1,this.keyMaterial=null,this.s2kUsage=0,this.aead=null,this.symmetric=null,this.isLegacyAEAD=null}async validate(){if(this.isDummy())return;if(!this.isDecrypted())throw Error("Key is not decrypted");if(this.usedModernAEAD)return;let e;try{e=await qi(this.algorithm,this.publicParams,this.privateParams)}catch(t){e=!1}if(!e)throw Error("Key is invalid")}async generate(e,t,r){if(6===this.version&&(this.algorithm===R.publicKey.ecdh&&t===R.curve.curve25519Legacy||this.algorithm===R.publicKey.eddsaLegacy))throw Error(`Cannot generate v6 keys of type 'ecc' with curve ${t}. Generate a key of type 'curve25519' instead`);if(6!==this.version&&this.algorithm===R.publicKey.pqc_mldsa_ed25519)throw Error(`Cannot generate v${this.version} signing keys of type 'pqc'. Generate a v6 key instead`);const{privateParams:n,publicParams:i}=await zi(this.algorithm,e,t,r);this.privateParams=n,this.publicParams=i,this.isEncrypted=!1}clearPrivateParams(){this.isMissingSecretKeyMaterial()||(Object.keys(this.privateParams).forEach((e=>{this.privateParams[e].fill(0),delete this.privateParams[e]})),this.privateParams=null,this.isEncrypted=!0)}}async function Ma(e,t,r,n,i,s,a){if("argon2"===t.type&&!i)throw Error("Using Argon2 S2K without AEAD is not allowed");if("simple"===t.type&&6===e)throw Error("Using Simple S2K with version 6 keys is not allowed");const{keySize:o}=Sr(n),c=await t.produceKey(r,o);if(!i||5===e||a)return c;const u=L.concatUint8Array([s,new Uint8Array([e,n,i])]);return Ur(R.hash.sha256,c,new Uint8Array,u,o)}class La{static get tag(){return R.packet.userID}constructor(){this.userID="",this.name="",this.email="",this.comment=""}static fromObject(e){if(L.isString(e)||e.name&&!L.isString(e.name)||e.email&&!L.isEmailAddress(e.email)||e.comment&&!L.isString(e.comment))throw Error("Invalid user ID format");const t=new La;Object.assign(t,e);const r=[];return t.name&&r.push(t.name),t.comment&&r.push(`(${t.comment})`),t.email&&r.push(`<${t.email}>`),t.userID=r.join(" "),t}read(e,t=T){const r=L.decodeUTF8(e);if(r.length>t.maxUserIDLength)throw Error("User ID string is too long");const n=e=>/^[^\s@]+@[^\s@]+$/.test(e),i=r.indexOf("<"),s=r.lastIndexOf(">");if(-1!==i&&-1!==s&&s>i){const e=r.substring(i+1,s);if(n(e)){this.email=e;const t=r.substring(0,i).trim(),n=t.indexOf("("),s=t.lastIndexOf(")");-1!==n&&-1!==s&&s>n?(this.comment=t.substring(n+1,s).trim(),this.name=t.substring(0,n).trim()):(this.name=t,this.comment="")}}else n(r.trim())&&(this.email=r.trim(),this.name="",this.comment="");this.userID=r}write(){return L.encodeUTF8(this.userID)}equals(e){return e&&e.userID===this.userID}}class Fa extends Ta{static get tag(){return R.packet.secretSubkey}constructor(e=new Date,t=T){super(e,t)}}const Oa=/*#__PURE__*/L.constructAllowedPackets([sa]);class Na{constructor(e){this.packets=e||new ha}write(){return this.packets.write()}armor(e=T){const t=this.packets.some((e=>e.constructor.tag===sa.tag&&6!==e.version));return $(R.armor.signature,this.write(),void 0,void 0,void 0,t,e)}getSigningKeyIDs(){return this.packets.map((e=>e.issuerKeyID))}}async function _a(e,t){const r=new Fa(e.date,t);return r.packets=null,r.algorithm=R.write(R.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function Ha(e,t){const r=new Ta(e.date,t);return r.packets=null,r.algorithm=R.write(R.publicKey,e.algorithm),await r.generate(e.rsaBits,e.curve,e.symmetric),await r.computeFingerprintAndKeyID(),r}async function za(e,t,r,n,i=new Date,s){let a,o;for(let c=e.length-1;c>=0;c--)try{(!a||e[c].created>=a.created)&&(await e[c].verify(t,r,n,i,void 0,s),a=e[c])}catch(e){o=e}if(!a)throw L.wrapError(`Could not find valid ${R.read(R.signature,r)} signature in key ${t.getKeyID().toHex()}`.replace("certGeneric ","self-").replace(/([a-z])([A-Z])/g,((e,t,r)=>t+" "+r.toLowerCase())),o);return a}function Ga(e,t,r=new Date){const n=L.normalizeDate(r);if(null!==n){const r=Ja(e,t);return!(e.created<=n&&n<r)}return!1}async function qa(e,t,r,n){const i={};i.key=t,i.bind=e;const s={signatureType:R.signature.subkeyBinding};r.sign?(s.keyFlags=[R.keyFlags.signData],s.embeddedSignature=await Va(i,[],e,{signatureType:R.signature.keyBinding},r.date,void 0,void 0,void 0,n)):s.keyFlags=r.forwarding?[R.keyFlags.forwardedCommunication]:[R.keyFlags.encryptCommunication|R.keyFlags.encryptStorage],r.keyExpirationTime>0&&(s.keyExpirationTime=r.keyExpirationTime,s.keyNeverExpires=!1);return await Va(i,[],t,s,r.date,void 0,void 0,void 0,n)}async function ja(e,t,r=new Date,n=[],i){const s=R.hash.sha256,a=i.preferredHashAlgorithm,o=await Promise.all(e.map((async(e,t)=>(await e.getPrimarySelfSignature(r,n[t],i)).preferredHashAlgorithms||[]))),c=new Map;for(const e of o)for(const t of e)try{const e=R.write(R.hash,t);c.set(e,c.has(e)?c.get(e)+1:1)}catch{}const u=t=>0===e.length||c.get(t)===e.length||t===s,h=()=>{if(0===c.size)return s;const e=Array.from(c.keys()).filter((e=>u(e))).sort(((e,t)=>Re(e)-Re(t)))[0];return Re(e)>=Re(s)?e:s},l=new Set([R.publicKey.ecdsa,R.publicKey.eddsaLegacy,R.publicKey.ed25519,R.publicKey.ed448]),f=new Set([R.publicKey.pqc_mldsa_ed25519]);if(l.has(t.algorithm)){const e=function(e,t){switch(e){case R.publicKey.ecdsa:case R.publicKey.eddsaLegacy:return Zr(t);case R.publicKey.ed25519:case R.publicKey.ed448:return pt(e);default:throw Error("Unknown elliptic signing algo")}}(t.algorithm,t.publicParams.oid),r=u(a),n=Re(a)>=Re(e);if(r&&n)return a;{const t=h();return Re(t)>=Re(e)?t:e}}if(f.has(t.algorithm)){if(u(a)&&On(t.algorithm,a))return a;{const e=h();return On(t.algorithm,e)?e:s}}return u(a)?a:h()}async function Va(e,t,r,n,i,s,a=[],o=!1,c){if(r.isDummy())throw Error("Cannot sign with a gnu-dummy key.");if(!r.isDecrypted())throw Error("Signing key is not decrypted.");const u=new sa;return Object.assign(u,n),u.publicKeyAlgorithm=r.algorithm,u.hashAlgorithm=await ja(t,r,i,s,c),u.rawNotations=[...a],await u.sign(r,e,i,o,c),u}async function Ya(e,t,r,n=new Date,i){(e=e[r])&&(t[r].length?await Promise.all(e.map((async function(e){e.isExpired(n)||i&&!await i(e)||t[r].some((function(t){return L.equalsUint8Array(t.writeParams(),e.writeParams())}))||t[r].push(e)}))):t[r]=e)}async function Za(e,t,r,n,i,s,a=new Date,o){s=s||e;const c=[];return await Promise.all(n.map((async function(e){try{if(!i||e.issuerKeyID.equals(i.issuerKeyID)){const n=![R.reasonForRevocation.keyRetired,R.reasonForRevocation.keySuperseded,R.reasonForRevocation.userIDInvalid].includes(e.reasonForRevocationFlag);await e.verify(s,t,r,n?null:a,!1,o),c.push(e.issuerKeyID)}}catch(e){}}))),i?(i.revoked=!!c.some((e=>e.equals(i.issuerKeyID)))||(i.revoked||!1),i.revoked):c.length>0}function Ja(e,t){let r;return!1===t.keyNeverExpires&&(r=e.created.getTime()+1e3*t.keyExpirationTime),r?new Date(r):1/0}function Xa(e,t={}){if(e.type=e.type||t.type,e.curve=e.curve||t.curve,e.rsaBits=e.rsaBits||t.rsaBits,e.symmetricHash=e.symmetricHash||t.symmetricHash,e.symmetricCipher=e.symmetricCipher||t.symmetricCipher,e.keyExpirationTime=void 0!==e.keyExpirationTime?e.keyExpirationTime:t.keyExpirationTime,e.passphrase=L.isString(e.passphrase)?e.passphrase:t.passphrase,e.date=e.date||t.date,e.sign=e.sign||!1,e.forwarding=e.forwarding||!1,e.sign&&e.forwarding)throw Error('Incompatible options: "sign" and "forwarding" cannot be set together');switch(e.type){case"pqc":e.sign?e.algorithm=R.publicKey.pqc_mldsa_ed25519:e.algorithm=R.publicKey.pqc_mlkem_x25519;break;case"ecc":try{e.curve=R.write(R.curve,e.curve)}catch(e){throw Error("Unknown curve")}e.curve!==R.curve.ed25519Legacy&&e.curve!==R.curve.curve25519Legacy&&"ed25519"!==e.curve&&"curve25519"!==e.curve||(e.curve=e.sign?R.curve.ed25519Legacy:R.curve.curve25519Legacy),e.sign?e.algorithm=e.curve===R.curve.ed25519Legacy?R.publicKey.eddsaLegacy:R.publicKey.ecdsa:e.algorithm=R.publicKey.ecdh;break;case"curve25519":e.algorithm=e.sign?R.publicKey.ed25519:R.publicKey.x25519;break;case"curve448":e.algorithm=e.sign?R.publicKey.ed448:R.publicKey.x448;break;case"rsa":e.algorithm=R.publicKey.rsaEncryptSign;break;case"symmetric":if(e.sign){e.algorithm=R.publicKey.hmac;try{e.symmetric=R.write(R.hash,e.symmetricHash)}catch(e){throw Error("Unknown hash algorithm")}}else{e.algorithm=R.publicKey.aead;try{e.symmetric=R.write(R.symmetric,e.symmetricCipher)}catch(e){throw Error("Unknown symmetric algorithm")}}break;default:throw Error("Unsupported key type "+e.type)}return e}function Wa(e,t,r){switch(e.algorithm){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:case R.publicKey.dsa:case R.publicKey.ecdsa:case R.publicKey.eddsaLegacy:case R.publicKey.ed25519:case R.publicKey.ed448:case R.publicKey.hmac:case R.publicKey.pqc_mldsa_ed25519:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||!!(t.keyFlags[0]&R.keyFlags.signData);default:return!1}}function $a(e,t,r){switch(e.algorithm){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.elgamal:case R.publicKey.ecdh:case R.publicKey.x25519:case R.publicKey.x448:case R.publicKey.aead:case R.publicKey.pqc_mlkem_x25519:if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");return!t.keyFlags||!!(t.keyFlags[0]&R.keyFlags.encryptCommunication)||!!(t.keyFlags[0]&R.keyFlags.encryptStorage);default:return!1}}function eo(e,t,r){if(!t.keyFlags&&!r.allowMissingKeyFlags)throw Error("None of the key flags is set: consider passing `config.allowMissingKeyFlags`");switch(e.algorithm){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaEncrypt:case R.publicKey.elgamal:case R.publicKey.ecdh:case R.publicKey.x25519:case R.publicKey.x448:case R.publicKey.pqc_mlkem_x25519:return!(!(!t.keyFlags||!!(t.keyFlags[0]&R.keyFlags.signData))||!r.allowInsecureDecryptionWithSigningKeys)||(!t.keyFlags||!!(t.keyFlags[0]&R.keyFlags.encryptCommunication)||!!(t.keyFlags[0]&R.keyFlags.encryptStorage)||r.allowForwardedMessages&&!!(t.keyFlags[0]&R.keyFlags.forwardedCommunication));default:return!1}}function to(e,t){const r=R.write(R.publicKey,e.algorithm),n=e.getAlgorithmInfo();if(t.rejectPublicKeyAlgorithms.has(r))throw Error(n.algorithm+" keys are considered too weak.");switch(r){case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:case R.publicKey.rsaEncrypt:if(n.bits<t.minRSABits)throw Error(`RSA keys shorter than ${t.minRSABits} bits are considered too weak.`);break;case R.publicKey.ecdsa:case R.publicKey.eddsaLegacy:case R.publicKey.ecdh:if(t.rejectCurves.has(n.curve))throw Error(`Support for ${n.algorithm} keys using curve ${n.curve} is disabled.`)}}class ro{constructor(e,t){this.userID=e.constructor.tag===R.packet.userID?e:null,this.userAttribute=e.constructor.tag===R.packet.userAttribute?e:null,this.selfCertifications=[],this.otherCertifications=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new ha;return e.push(this.userID||this.userAttribute),e.push(...this.revocationSignatures),e.push(...this.selfCertifications),e.push(...this.otherCertifications),e}clone(){const e=new ro(this.userID||this.userAttribute,this.mainKey);return e.selfCertifications=[...this.selfCertifications],e.otherCertifications=[...this.otherCertifications],e.revocationSignatures=[...this.revocationSignatures],e}async certify(e,t,r){const n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n},s=new ro(i.userID||i.userAttribute,this.mainKey);return s.otherCertifications=await Promise.all(e.map((async function(e){if(!e.isPrivate())throw Error("Need private key for signing");if(e.hasSameFingerprintAs(n))throw Error("The user's own key can only be used for self-certifications");const s=await e.getSigningKey(void 0,t,void 0,r);return Va(i,[e],s.keyPacket,{signatureType:R.signature.certGeneric,keyFlags:[R.keyFlags.certifyKeys|R.keyFlags.signData]},t,void 0,void 0,void 0,r)}))),await s.update(this,t,r),s}async isRevoked(e,t,r=new Date,n=T){const i=this.mainKey.keyPacket;return Za(i,R.signature.certRevocation,{key:i,userID:this.userID,userAttribute:this.userAttribute},this.revocationSignatures,e,t,r,n)}async verifyCertificate(e,t,r=new Date,n){const i=this,s=this.mainKey.keyPacket,a={userID:this.userID,userAttribute:this.userAttribute,key:s},{issuerKeyID:o}=e,c=t.filter((e=>e.getKeys(o).length>0));return 0===c.length?null:(await Promise.all(c.map((async t=>{const s=await t.getSigningKey(o,e.created,void 0,n);if(e.revoked||await i.isRevoked(e,s.keyPacket,r,n))throw Error("User certificate is revoked");try{await e.verify(s.keyPacket,R.signature.certGeneric,a,r,void 0,n)}catch(e){throw L.wrapError("User certificate is invalid",e)}}))),!0)}async verifyAllCertifications(e,t=new Date,r){const n=this,i=this.selfCertifications.concat(this.otherCertifications);return Promise.all(i.map((async i=>({keyID:i.issuerKeyID,valid:await n.verifyCertificate(i,e,t,r).catch((()=>!1))}))))}async verify(e=new Date,t){if(!this.selfCertifications.length)throw Error("No self-certifications found");const r=this,n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n};let s;for(let a=this.selfCertifications.length-1;a>=0;a--)try{const s=this.selfCertifications[a];if(s.revoked||await r.isRevoked(s,void 0,e,t))throw Error("Self-certification is revoked");try{await s.verify(n,R.signature.certGeneric,i,e,void 0,t)}catch(e){throw L.wrapError("Self-certification is invalid",e)}return!0}catch(e){s=e}throw s}async update(e,t,r){const n=this.mainKey.keyPacket,i={userID:this.userID,userAttribute:this.userAttribute,key:n};await Ya(e,this,"selfCertifications",t,(async function(e){try{return await e.verify(n,R.signature.certGeneric,i,t,!1,r),!0}catch(e){return!1}})),await Ya(e,this,"otherCertifications",t),await Ya(e,this,"revocationSignatures",t,(function(e){return Za(n,R.signature.certRevocation,i,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=R.reasonForRevocation.noReason,string:r=""}={},n=new Date,i=T){const s={userID:this.userID,userAttribute:this.userAttribute,key:e},a=new ro(s.userID||s.userAttribute,this.mainKey);return a.revocationSignatures.push(await Va(s,[],e,{signatureType:R.signature.certRevocation,reasonForRevocationFlag:R.write(R.reasonForRevocation,t),reasonForRevocationString:r},n,void 0,void 0,!1,i)),await a.update(this),a}}class no{constructor(e,t){this.keyPacket=e,this.bindingSignatures=[],this.revocationSignatures=[],this.mainKey=t}toPacketList(){const e=new ha;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.bindingSignatures),e}clone(){const e=new no(this.keyPacket,this.mainKey);return e.bindingSignatures=[...this.bindingSignatures],e.revocationSignatures=[...this.revocationSignatures],e}async isRevoked(e,t,r=new Date,n=T){const i=this.mainKey.keyPacket;return Za(i,R.signature.subkeyRevocation,{key:i,bind:this.keyPacket},this.revocationSignatures,e,t,r,n)}async verify(e=new Date,t=T){const r=this.mainKey.keyPacket,n={key:r,bind:this.keyPacket},i=await za(this.bindingSignatures,r,R.signature.subkeyBinding,n,e,t);if(i.revoked||await this.isRevoked(i,null,e,t))throw Error("Subkey is revoked");if(Ga(this.keyPacket,i,e))throw Error("Subkey is expired");return i}async getExpirationTime(e=new Date,t=T){const r=this.mainKey.keyPacket,n={key:r,bind:this.keyPacket};let i;try{i=await za(this.bindingSignatures,r,R.signature.subkeyBinding,n,e,t)}catch(e){return null}const s=Ja(this.keyPacket,i),a=i.getExpirationTime();return s<a?s:a}async update(e,t=new Date,r=T){const n=this.mainKey.keyPacket;if(!this.hasSameFingerprintAs(e))throw Error("Subkey update method: fingerprints of subkeys not equal");this.keyPacket.constructor.tag===R.packet.publicSubkey&&e.keyPacket.constructor.tag===R.packet.secretSubkey&&(this.keyPacket=e.keyPacket);const i=this,s={key:n,bind:i.keyPacket};await Ya(e,this,"bindingSignatures",t,(async function(e){for(let t=0;t<i.bindingSignatures.length;t++)if(i.bindingSignatures[t].issuerKeyID.equals(e.issuerKeyID))return e.created>i.bindingSignatures[t].created&&(i.bindingSignatures[t]=e),!1;try{return await e.verify(n,R.signature.subkeyBinding,s,t,void 0,r),!0}catch(e){return!1}})),await Ya(e,this,"revocationSignatures",t,(function(e){return Za(n,R.signature.subkeyRevocation,s,[e],void 0,void 0,t,r)}))}async revoke(e,{flag:t=R.reasonForRevocation.noReason,string:r=""}={},n=new Date,i=T){const s={key:e,bind:this.keyPacket},a=new no(this.keyPacket,this.mainKey);return a.revocationSignatures.push(await Va(s,[],e,{signatureType:R.signature.subkeyRevocation,reasonForRevocationFlag:R.write(R.reasonForRevocation,t),reasonForRevocationString:r},n,void 0,void 0,!1,i)),await a.update(this),a}hasSameFingerprintAs(e){return this.keyPacket.hasSameFingerprintAs(e.keyPacket||e)}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","isDecrypted"].forEach((e=>{no.prototype[e]=function(){return this.keyPacket[e]()}}));const io=/*#__PURE__*/L.constructAllowedPackets([sa]),so=new Set([R.packet.publicKey,R.packet.privateKey]),ao=new Set([R.packet.publicKey,R.packet.privateKey,R.packet.publicSubkey,R.packet.privateSubkey]);class oo{packetListToStructure(e,t=new Set){let r,n,i,s;for(const a of e){if(a instanceof ct){ao.has(a.tag)&&!s&&(s=so.has(a.tag)?so:ao);continue}const e=a.constructor.tag;if(s){if(!s.has(e))continue;s=null}if(t.has(e))throw Error("Unexpected packet type: "+e);switch(e){case R.packet.publicKey:case R.packet.secretKey:if(this.keyPacket)throw Error("Key block contains multiple keys");if(this.keyPacket=a,n=this.getKeyID(),!n)throw Error("Missing Key ID");break;case R.packet.userID:case R.packet.userAttribute:r=new ro(a,this),this.users.push(r);break;case R.packet.publicSubkey:case R.packet.secretSubkey:r=null,i=new no(a,this),this.subkeys.push(i);break;case R.packet.signature:switch(a.signatureType){case R.signature.certGeneric:case R.signature.certPersona:case R.signature.certCasual:case R.signature.certPositive:if(!r){L.printDebug("Dropping certification signatures without preceding user packet");continue}a.issuerKeyID.equals(n)?r.selfCertifications.push(a):r.otherCertifications.push(a);break;case R.signature.certRevocation:r?r.revocationSignatures.push(a):this.directSignatures.push(a);break;case R.signature.key:this.directSignatures.push(a);break;case R.signature.subkeyBinding:if(!i){L.printDebug("Dropping subkey binding signature without preceding subkey packet");continue}i.bindingSignatures.push(a);break;case R.signature.keyRevocation:this.revocationSignatures.push(a);break;case R.signature.subkeyRevocation:if(!i){L.printDebug("Dropping subkey revocation signature without preceding subkey packet");continue}i.revocationSignatures.push(a)}}}}toPacketList(){const e=new ha;return e.push(this.keyPacket),e.push(...this.revocationSignatures),e.push(...this.directSignatures),this.users.map((t=>e.push(...t.toPacketList()))),this.subkeys.map((t=>e.push(...t.toPacketList()))),e}clone(e=!1){const t=new this.constructor(this.toPacketList());return e&&t.getKeys().forEach((e=>{if(e.keyPacket=Object.create(Object.getPrototypeOf(e.keyPacket),Object.getOwnPropertyDescriptors(e.keyPacket)),!e.keyPacket.isDecrypted())return;const t={};Object.keys(e.keyPacket.privateParams).forEach((r=>{t[r]=new Uint8Array(e.keyPacket.privateParams[r])})),e.keyPacket.privateParams=t})),t}getSubkeys(e=null){return this.subkeys.filter((t=>!e||t.getKeyID().equals(e,!0)))}getKeys(e=null){const t=[];return e&&!this.getKeyID().equals(e,!0)||t.push(this),t.concat(this.getSubkeys(e))}getKeyIDs(){return this.getKeys().map((e=>e.getKeyID()))}getUserIDs(){return this.users.map((e=>e.userID?e.userID.userID:null)).filter((e=>null!==e))}write(){return this.toPacketList().write()}async getSigningKey(e=null,t=new Date,r={},n=T){await this.verifyPrimaryKey(t,r,n);const i=this.keyPacket;try{to(i,n)}catch(e){throw L.wrapError("Could not verify primary key",e)}const s=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created||t.keyPacket.algorithm-e.keyPacket.algorithm));let a;for(const r of s)if(!e||r.getKeyID().equals(e))try{await r.verify(t,n);const e={key:i,bind:r.keyPacket},s=await za(r.bindingSignatures,i,R.signature.subkeyBinding,e,t,n);if(!Wa(r.keyPacket,s,n))continue;if(!s.embeddedSignature)throw Error("Missing embedded signature");return await za([s.embeddedSignature],r.keyPacket,R.signature.keyBinding,e,t,n),to(r.keyPacket,n),r}catch(e){a=e}try{const s=await this.getPrimarySelfSignature(t,r,n);if((!e||i.getKeyID().equals(e))&&Wa(i,s,n))return to(i,n),this}catch(e){a=e}throw L.wrapError("Could not find valid signing key packet in key "+this.getKeyID().toHex(),a)}async getEncryptionKey(e,t=new Date,r={},n=T){await this.verifyPrimaryKey(t,r,n);const i=this.keyPacket;try{to(i,n)}catch(e){throw L.wrapError("Could not verify primary key",e)}const s=this.subkeys.slice().sort(((e,t)=>t.keyPacket.created-e.keyPacket.created||t.keyPacket.algorithm-e.keyPacket.algorithm));let a;for(const r of s)if(!e||r.getKeyID().equals(e))try{await r.verify(t,n);const e={key:i,bind:r.keyPacket},s=await za(r.bindingSignatures,i,R.signature.subkeyBinding,e,t,n);if($a(r.keyPacket,s,n))return to(r.keyPacket,n),r}catch(e){a=e}try{const s=await this.getPrimarySelfSignature(t,r,n);if((!e||i.getKeyID().equals(e))&&$a(i,s,n))return to(i,n),this}catch(e){a=e}throw L.wrapError("Could not find valid encryption key packet in key "+this.getKeyID().toHex(),a)}async isRevoked(e,t,r=new Date,n=T){return Za(this.keyPacket,R.signature.keyRevocation,{key:this.keyPacket},this.revocationSignatures,e,t,r,n)}async verifyPrimaryKey(e=new Date,t={},r=T){const n=this.keyPacket;if(await this.isRevoked(null,null,e,r))throw Error("Primary key is revoked");if(Ga(n,await this.getPrimarySelfSignature(e,t,r),e))throw Error("Primary key is expired");if(6!==n.version){const t=await za(this.directSignatures,n,R.signature.key,{key:n},e,r).catch((()=>{}));if(t&&Ga(n,t,e))throw Error("Primary key is expired")}}async getExpirationTime(e,t=T){let r;try{const n=await this.getPrimarySelfSignature(null,e,t),i=Ja(this.keyPacket,n),s=n.getExpirationTime(),a=6!==this.keyPacket.version&&await za(this.directSignatures,this.keyPacket,R.signature.key,{key:this.keyPacket},null,t).catch((()=>{}));if(a){const e=Ja(this.keyPacket,a);r=Math.min(i,s,e)}else r=i<s?i:s}catch(e){r=null}return L.normalizeDate(r)}async getPrimarySelfSignature(e=new Date,t={},r=T){const n=this.keyPacket;if(6===n.version)return za(this.directSignatures,n,R.signature.key,{key:n},e,r);const{selfCertification:i}=await this.getPrimaryUser(e,t,r);return i}async getPrimaryUser(e=new Date,t={},r=T){const n=this.keyPacket,i=[];let s;for(let a=0;a<this.users.length;a++)try{const s=this.users[a];if(!s.userID)continue;if(void 0!==t.name&&s.userID.name!==t.name||void 0!==t.email&&s.userID.email!==t.email||void 0!==t.comment&&s.userID.comment!==t.comment)throw Error("Could not find user that matches that user ID");const o={userID:s.userID,key:n},c=await za(s.selfCertifications,n,R.signature.certGeneric,o,e,r);i.push({index:a,user:s,selfCertification:c})}catch(e){s=e}if(!i.length)throw s||Error("Could not find primary user");await Promise.all(i.map((async function(t){return t.selfCertification.revoked||t.user.isRevoked(t.selfCertification,null,e,r)})));const a=i.sort((function(e,t){const r=e.selfCertification,n=t.selfCertification;return n.revoked-r.revoked||r.isPrimaryUserID-n.isPrimaryUserID||r.created-n.created})).pop(),{user:o,selfCertification:c}=a;if(c.revoked||await o.isRevoked(c,null,e,r))throw Error("Primary user is revoked");return a}async update(e,t=new Date,r=T){if(!this.hasSameFingerprintAs(e))throw Error("Primary key fingerprints must be equal to update the key");if(!this.isPrivate()&&e.isPrivate()){if(!(this.subkeys.length===e.subkeys.length&&this.subkeys.every((t=>e.subkeys.some((e=>t.hasSameFingerprintAs(e)))))))throw Error("Cannot update public key with private key if subkeys mismatch");return e.update(this,r)}const n=this.clone();return await Ya(e,n,"revocationSignatures",t,(i=>Za(n.keyPacket,R.signature.keyRevocation,n,[i],null,e.keyPacket,t,r))),await Ya(e,n,"directSignatures",t),await Promise.all(e.users.map((async e=>{const i=n.users.filter((t=>e.userID&&e.userID.equals(t.userID)||e.userAttribute&&e.userAttribute.equals(t.userAttribute)));if(i.length>0)await Promise.all(i.map((n=>n.update(e,t,r))));else{const t=e.clone();t.mainKey=n,n.users.push(t)}}))),await Promise.all(e.subkeys.map((async e=>{const i=n.subkeys.filter((t=>t.hasSameFingerprintAs(e)));if(i.length>0)await Promise.all(i.map((n=>n.update(e,t,r))));else{const t=e.clone();t.mainKey=n,n.subkeys.push(t)}}))),n}async getRevocationCertificate(e=new Date,t=T){const r={key:this.keyPacket},n=await za(this.revocationSignatures,this.keyPacket,R.signature.keyRevocation,r,e,t),i=new ha;i.push(n);const s=6!==this.keyPacket.version;return $(R.armor.publicKey,i.write(),null,null,"This is a revocation certificate",s,t)}async applyRevocationCertificate(e,t=new Date,r=T){const n=await W(e),i=(await ha.fromBinary(n.data,io,r)).findPacket(R.packet.signature);if(!i||i.signatureType!==R.signature.keyRevocation)throw Error("Could not find revocation signature packet");if(!i.issuerKeyID.equals(this.getKeyID()))throw Error("Revocation signature does not match key");try{await i.verify(this.keyPacket,R.signature.keyRevocation,{key:this.keyPacket},t,void 0,r)}catch(e){throw L.wrapError("Could not verify revocation signature",e)}const s=this.clone();return s.revocationSignatures.push(i),s}async signPrimaryUser(e,t,r,n=T){const{index:i,user:s}=await this.getPrimaryUser(t,r,n),a=await s.certify(e,t,n),o=this.clone();return o.users[i]=a,o}async signAllUsers(e,t=new Date,r=T){const n=this.clone();return n.users=await Promise.all(this.users.map((function(n){return n.certify(e,t,r)}))),n}async verifyPrimaryUser(e,t=new Date,r,n=T){const i=this.keyPacket,{user:s}=await this.getPrimaryUser(t,r,n);return e?await s.verifyAllCertifications(e,t,n):[{keyID:i.getKeyID(),valid:await s.verify(t,n).catch((()=>!1))}]}async verifyAllUsers(e,t=new Date,r=T){const n=this.keyPacket,i=[];return await Promise.all(this.users.map((async s=>{const a=e?await s.verifyAllCertifications(e,t,r):[{keyID:n.getKeyID(),valid:await s.verify(t,r).catch((()=>!1))}];i.push(...a.map((e=>({userID:s.userID?s.userID.userID:null,userAttribute:s.userAttribute,keyID:e.keyID,valid:e.valid}))))}))),i}}["getKeyID","getFingerprint","getAlgorithmInfo","getCreationTime","hasSameFingerprintAs"].forEach((e=>{oo.prototype[e]=no.prototype[e]}));class co extends oo{constructor(e){if(super(),this.keyPacket=null,this.revocationSignatures=[],this.directSignatures=[],this.users=[],this.subkeys=[],e&&(this.packetListToStructure(e,new Set([R.packet.secretKey,R.packet.secretSubkey])),!this.keyPacket))throw Error("Invalid key: missing public-key packet")}isPrivate(){return!1}toPublic(){return this}armor(e=T){const t=6!==this.keyPacket.version;return $(R.armor.publicKey,this.toPacketList().write(),void 0,void 0,void 0,t,e)}}class uo extends co{constructor(e){if(super(),this.packetListToStructure(e,new Set([R.packet.publicKey,R.packet.publicSubkey])),!this.keyPacket)throw Error("Invalid key: missing private-key packet")}isPrivate(){return!0}toPublic(){const e=new ha,t=this.toPacketList();let r=!1;for(const n of t)if(!r||n.constructor.tag!==R.packet.Signature)switch(r&&(r=!1),n.constructor.tag){case R.packet.secretKey:{if(n.algorithm===R.publicKey.aead||n.algorithm===R.publicKey.hmac)throw Error("Cannot create public key from symmetric private");const t=Pa.fromSecretKeyPacket(n);e.push(t);break}case R.packet.secretSubkey:{if(n.algorithm===R.publicKey.aead||n.algorithm===R.publicKey.hmac){r=!0;break}const t=Qa.fromSecretSubkeyPacket(n);e.push(t);break}default:e.push(n)}return new co(e)}armor(e=T){const t=6!==this.keyPacket.version;return $(R.armor.privateKey,this.toPacketList().write(),void 0,void 0,void 0,t,e)}async getDecryptionKeys(e,t=new Date,r={},n=T){const i=this.keyPacket,s=[];let a=null;for(let r=0;r<this.subkeys.length;r++)if(!e||this.subkeys[r].getKeyID().equals(e,!0)){if(this.subkeys[r].keyPacket.isDummy()){a=a||Error("Gnu-dummy key packets cannot be used for decryption");continue}try{const e={key:i,bind:this.subkeys[r].keyPacket},a=await za(this.subkeys[r].bindingSignatures,i,R.signature.subkeyBinding,e,t,n);eo(this.subkeys[r].keyPacket,a,n)&&s.push(this.subkeys[r])}catch(e){a=e}}const o=await this.getPrimarySelfSignature(t,r,n);if(e&&!i.getKeyID().equals(e,!0)||!eo(i,o,n)||(i.isDummy()?a=a||Error("Gnu-dummy key packets cannot be used for decryption"):s.push(this)),0===s.length)throw a||Error("No decryption key packets found");return s}isDecrypted(){return this.getKeys().some((({keyPacket:e})=>e.isDecrypted()))}async validate(e=T){if(!this.isPrivate())throw Error("Cannot validate a public key");let t;if(this.keyPacket.isDummy()){const r=await this.getSigningKey(null,null,void 0,{...e,rejectPublicKeyAlgorithms:new Set,minRSABits:0});r&&!r.keyPacket.isDummy()&&(t=r.keyPacket)}else t=this.keyPacket;if(t)return t.validate();{const e=this.getKeys();if(e.map((e=>e.keyPacket.isDummy())).every(Boolean))throw Error("Cannot validate an all-gnu-dummy key");return Promise.all(e.map((async e=>e.keyPacket.validate())))}}clearPrivateParams(){this.getKeys().forEach((({keyPacket:e})=>{e.isDecrypted()&&e.clearPrivateParams()}))}async revoke({flag:e=R.reasonForRevocation.noReason,string:t=""}={},r=new Date,n=T){if(!this.isPrivate())throw Error("Need private key for revoking");const i={key:this.keyPacket},s=this.clone();return s.revocationSignatures.push(await Va(i,[],this.keyPacket,{signatureType:R.signature.keyRevocation,reasonForRevocationFlag:R.write(R.reasonForRevocation,e),reasonForRevocationString:t},r,void 0,void 0,void 0,n)),s}async addSubkey(e={}){const t={...T,...e.config};if(e.passphrase)throw Error("Subkey could not be encrypted here, please encrypt whole key");if(e.rsaBits<t.minRSABits)throw Error(`rsaBits should be at least ${t.minRSABits}, got: ${e.rsaBits}`);const r=this.keyPacket;if(r.isDummy())throw Error("Cannot add subkey to gnu-dummy primary key");if(!r.isDecrypted())throw Error("Key is not decrypted");const n=r.getAlgorithmInfo();n.type=function(e){switch(R.write(R.publicKey,e)){case R.publicKey.rsaEncrypt:case R.publicKey.rsaEncryptSign:case R.publicKey.rsaSign:case R.publicKey.dsa:return"rsa";case R.publicKey.ecdsa:case R.publicKey.eddsaLegacy:return"ecc";case R.publicKey.ed25519:return"curve25519";case R.publicKey.ed448:return"curve448";default:throw Error("Unsupported algorithm")}}(n.algorithm),n.rsaBits=n.bits||4096,n.curve=n.curve||"curve25519Legacy",e=Xa(e,n);const i=await _a(e,{...t,v6Keys:6===this.keyPacket.version});to(i,t);const s=await qa(i,r,e,t),a=this.toPacketList();return a.push(i,s),new uo(a)}}const ho=/*#__PURE__*/L.constructAllowedPackets([Pa,Qa,Ta,Fa,La,Ra,sa]);function lo(e){for(const t of e)switch(t.constructor.tag){case R.packet.secretKey:return new uo(e);case R.packet.publicKey:return new co(e)}throw Error("No key packet found")}async function fo(e,t,r,n){r.passphrase&&await e.encrypt(r.passphrase,n),await Promise.all(t.map((async function(e,t){const i=r.subkeys[t].passphrase;i&&await e.encrypt(i,n)})));const i=new ha;function s(e,t){return[t,...e.filter((e=>e!==t))]}function a(){const t={};t.keyFlags=[R.keyFlags.certifyKeys|R.keyFlags.signData];const i=s([R.symmetric.aes256,R.symmetric.aes128],n.preferredSymmetricAlgorithm);if(t.preferredSymmetricAlgorithms=i,n.aeadProtect){const e=s([R.aead.gcm,R.aead.eax,R.aead.ocb],n.preferredAEADAlgorithm);t.preferredCipherSuites=e.flatMap((e=>i.map((t=>[t,e]))))}return t.preferredHashAlgorithms=s([R.hash.sha512,R.hash.sha256,...6===e.version?[R.hash.sha3_512,R.hash.sha3_256]:[]],n.preferredHashAlgorithm),t.preferredCompressionAlgorithms=s([R.compression.uncompressed,R.compression.zlib,R.compression.zip],n.preferredCompressionAlgorithm),t.features=[0],t.features[0]|=R.features.modificationDetection,n.aeadProtect&&(t.features[0]|=R.features.seipdv2),r.keyExpirationTime>0&&(t.keyExpirationTime=r.keyExpirationTime,t.keyNeverExpires=!1),t}if(i.push(e),6===e.version){const t={key:e},s=a();s.signatureType=R.signature.key;const o=await Va(t,[],e,s,r.date,void 0,void 0,void 0,n);i.push(o)}await Promise.all(r.userIDs.map((async function(t,i){const s=La.fromObject(t),o={userID:s,key:e},c=6!==e.version?a():{};c.signatureType=R.signature.certPositive,0===i&&(c.isPrimaryUserID=!0);return{userIDPacket:s,signaturePacket:await Va(o,[],e,c,r.date,void 0,void 0,void 0,n)}}))).then((e=>{e.forEach((({userIDPacket:e,signaturePacket:t})=>{i.push(e),i.push(t)}))})),await Promise.all(t.map((async function(t,i){const s=r.subkeys[i];return{secretSubkeyPacket:t,subkeySignaturePacket:await qa(t,e,s,n)}}))).then((e=>{e.forEach((({secretSubkeyPacket:e,subkeySignaturePacket:t})=>{i.push(e),i.push(t)}))}));const o={key:e};return i.push(await Va(o,[],e,{signatureType:R.signature.keyRevocation,reasonForRevocationFlag:R.reasonForRevocation.noReason,reasonForRevocationString:""},r.date,void 0,void 0,void 0,n)),r.passphrase&&e.clearPrivateParams(),await Promise.all(t.map((async function(e,t){r.subkeys[t].passphrase&&e.clearPrivateParams()}))),new uo(i)}const yo=/*#__PURE__*/L.constructAllowedPackets([ea,da,Sa,Ea,xa,Ba,Ua,ca,sa]),po=/*#__PURE__*/L.constructAllowedPackets([Ua]),go=/*#__PURE__*/L.constructAllowedPackets([sa]);class Ao{constructor(e){this.packets=e||new ha}getEncryptionKeyIDs(){const e=[];return this.packets.filterByTag(R.packet.publicKeyEncryptedSessionKey).forEach((function(t){e.push(t.publicKeyID)})),e}getSigningKeyIDs(){const e=this.unwrapCompressed(),t=e.packets.filterByTag(R.packet.onePassSignature);if(t.length>0)return t.map((e=>e.issuerKeyID));return e.packets.filterByTag(R.packet.signature).map((e=>e.issuerKeyID))}async decrypt(e,t,r,n=new Date,i=T){const s=this.packets.filterByTag(R.packet.symmetricallyEncryptedData,R.packet.symEncryptedIntegrityProtectedData,R.packet.aeadEncryptedData);if(0===s.length)throw Error("No encrypted data found");const a=s[0],o=a.cipherAlgorithm,c=r||await this.decryptSessionKeys(e,t,o,n,i);let u=null;const h=Promise.all(c.map((async({algorithm:e,data:t})=>{if(!L.isUint8Array(t)||!a.cipherAlgorithm&&!L.isString(e))throw Error("Invalid session key for decryption.");try{const r=a.cipherAlgorithm||R.write(R.symmetric,e);await a.decrypt(r,t,i)}catch(e){L.printDebugError(e),u=e}})));if(U(a.encrypted),a.encrypted=null,await h,!a.packets||!a.packets.length)throw u||Error("Decryption failed.");const l=new Ao(a.packets);return a.packets=new ha,l}async decryptSessionKeys(e,t,r,n=new Date,i=T){let s,a=[];if(t){const e=this.packets.filterByTag(R.packet.symEncryptedSessionKey);if(0===e.length)throw Error("No symmetrically encrypted session key packet found.");await Promise.all(t.map((async function(t,r){let n;n=r?await ha.fromBinary(e.write(),po,i):e,await Promise.all(n.map((async function(e){try{await e.decrypt(t),a.push(e)}catch(e){L.printDebugError(e),e instanceof Xi&&(s=e)}})))})))}else{if(!e)throw Error("No key or password specified.");{const t=this.packets.filterByTag(R.packet.publicKeyEncryptedSessionKey);if(0===t.length)throw Error("No public key encrypted session key packet found.");await Promise.all(t.map((async function(t){await Promise.all(e.map((async function(e){let o;try{o=(await e.getDecryptionKeys(t.publicKeyID,null,void 0,i)).map((e=>e.keyPacket))}catch(e){return void(s=e)}let c=[R.symmetric.aes256,R.symmetric.aes128,R.symmetric.tripledes,R.symmetric.cast5];try{const t=await e.getPrimarySelfSignature(n,void 0,i);t.preferredSymmetricAlgorithms&&(c=c.concat(t.preferredSymmetricAlgorithms))}catch(e){}await Promise.all(o.map((async function(e){if(!e.isDecrypted())throw Error("Decryption key is not decrypted.");if(i.constantTimePKCS1Decryption&&(t.publicKeyAlgorithm===R.publicKey.rsaEncrypt||t.publicKeyAlgorithm===R.publicKey.rsaEncryptSign||t.publicKeyAlgorithm===R.publicKey.rsaSign||t.publicKeyAlgorithm===R.publicKey.elgamal)){const n=t.write();await Promise.all((r?[r]:Array.from(i.constantTimePKCS1DecryptionSupportedSymmetricAlgorithms)).map((async t=>{const r=new Ba;r.read(n);const i={sessionKeyAlgorithm:t,sessionKey:ji(t)};try{await r.decrypt(e,i),a.push(r)}catch(e){L.printDebugError(e),s=e}})))}else try{await t.decrypt(e);const n=r||t.sessionKeyAlgorithm;if(n&&!c.includes(R.write(R.symmetric,n)))throw Error("A non-preferred symmetric algorithm was used.");a.push(t)}catch(e){L.printDebugError(e),s=e}})))}))),U(t.encrypted),t.encrypted=null})))}}if(a.length>0){if(a.length>1){const e=new Set;a=a.filter((t=>{const r=t.sessionKeyAlgorithm+L.uint8ArrayToString(t.sessionKey);return!e.has(r)&&(e.add(r),!0)}))}return a.map((e=>({data:e.sessionKey,algorithm:e.sessionKeyAlgorithm&&R.read(R.symmetric,e.sessionKeyAlgorithm)})))}throw s||Error("Session key decryption failed.")}getLiteralData(){const e=this.unwrapCompressed().packets.findPacket(R.packet.literalData);return e&&e.getBytes()||null}getFilename(){const e=this.unwrapCompressed().packets.findPacket(R.packet.literalData);return e&&e.getFilename()||null}getText(){const e=this.unwrapCompressed().packets.findPacket(R.packet.literalData);return e?e.getText():null}static async generateSessionKey(e=[],t=new Date,r=[],n=T){const{symmetricAlgo:i,aeadAlgo:s}=await async function(e=[],t=new Date,r=[],n=T){const i=await Promise.all(e.map(((e,i)=>e.getPrimarySelfSignature(t,r[i],n))));if(e.length?!n.ignoreSEIPDv2FeatureFlag&&i.every((e=>e.features&&e.features[0]&R.features.seipdv2)):n.aeadProtect){const e={symmetricAlgo:R.symmetric.aes128,aeadAlgo:R.aead.ocb},t=[{symmetricAlgo:n.preferredSymmetricAlgorithm,aeadAlgo:n.preferredAEADAlgorithm},{symmetricAlgo:n.preferredSymmetricAlgorithm,aeadAlgo:R.aead.ocb},{symmetricAlgo:R.symmetric.aes128,aeadAlgo:n.preferredAEADAlgorithm}];for(const e of t)if(i.every((t=>t.preferredCipherSuites&&t.preferredCipherSuites.some((t=>t[0]===e.symmetricAlgo&&t[1]===e.aeadAlgo)))))return e;return e}const s=R.symmetric.aes128,a=n.preferredSymmetricAlgorithm;return{symmetricAlgo:i.every((e=>e.preferredSymmetricAlgorithms&&e.preferredSymmetricAlgorithms.includes(a)))?a:s,aeadAlgo:void 0}}(e,t,r,n),a=R.read(R.symmetric,i),o=s?R.read(R.aead,s):void 0;await Promise.all(e.map((e=>e.getEncryptionKey().catch((()=>null)).then((e=>{if(e&&(e.keyPacket.algorithm===R.publicKey.x25519||e.keyPacket.algorithm===R.publicKey.x448)&&!o&&!L.isAES(i))throw Error("Could not generate a session key compatible with the given `encryptionKeys`: X22519 and X448 keys can only be used to encrypt AES session keys; change `config.preferredSymmetricAlgorithm` accordingly.")})))));return{data:ji(i),algorithm:a,aeadAlgorithm:o}}async encrypt(e,t,r,n=!1,i=[],s=new Date,a=[],o=T){if(r){if(!L.isUint8Array(r.data)||!L.isString(r.algorithm))throw Error("Invalid session key for encryption.")}else if(e&&e.length)r=await Ao.generateSessionKey(e,s,a,o);else{if(!t||!t.length)throw Error("No keys, passwords, or session key provided.");r=await Ao.generateSessionKey(void 0,void 0,void 0,o)}const{data:c,algorithm:u,aeadAlgorithm:h}=r,l=await Ao.encryptSessionKey(c,u,h,e,t,n,i,s,a,o),f=Ea.fromObject({version:h?2:1,aeadAlgorithm:h?R.write(R.aead,h):null});f.packets=this.packets;const y=R.write(R.symmetric,u);return await f.encrypt(y,c,o),l.packets.push(f),f.packets=new ha,l}static async encryptSessionKey(e,t,r,n,i,s=!1,a=[],o=new Date,c=[],u=T){const h=new ha,l=R.write(R.symmetric,t),f=r&&R.write(R.aead,r);if(n){const t=await Promise.all(n.map((async function(t,r){const n=await t.getEncryptionKey(a[r],o,c,u),i=Ba.fromObject({version:f?6:3,encryptionKeyPacket:n.keyPacket,anonymousRecipient:s,sessionKey:e,sessionKeyAlgorithm:l});return await i.encrypt(n.keyPacket),delete i.sessionKey,i})));h.push(...t)}if(i){const t=async function(e,t){try{return await e.decrypt(t),1}catch(e){return 0}},r=(e,t)=>e+t,n=async function(e,s,a,o){const c=new Ua(u);if(c.sessionKey=e,c.sessionKeyAlgorithm=s,a&&(c.aeadAlgorithm=a),await c.encrypt(o,u),u.passwordCollisionCheck){if(1!==(await Promise.all(i.map((e=>t(c,e))))).reduce(r))return n(e,s,o)}return delete c.sessionKey,c},s=await Promise.all(i.map((t=>n(e,l,f,t))));h.push(...s)}return new Ao(h)}async sign(e=[],t=[],r=null,n=[],i=new Date,s=[],a=[],o=[],c=T){const u=new ha,h=this.packets.findPacket(R.packet.literalData);if(!h)throw Error("No literal data packet to sign.");const l=await wo(h,e,t,r,n,i,s,a,o,!1,c),f=l.map(((e,t)=>ca.fromSignaturePacket(e,0===t))).reverse();return u.push(...f),u.push(h),u.push(...l),new Ao(u)}compress(e,t=T){if(e===R.compression.uncompressed)return this;const r=new da(t);r.algorithm=e,r.packets=this.packets;const n=new ha;return n.push(r),new Ao(n)}async signDetached(e=[],t=[],r=null,n=[],i=[],s=new Date,a=[],o=[],c=T){const u=this.packets.findPacket(R.packet.literalData);if(!u)throw Error("No literal data packet to sign.");return new Na(await wo(u,e,t,r,n,i,s,a,o,!0,c))}async verify(e,t=new Date,r=T){const n=this.unwrapCompressed(),i=n.packets.filterByTag(R.packet.literalData);if(1!==i.length)throw Error("Can only verify message with one literal data packet.");let s=n.packets;o(s.stream)&&(s=s.concat(await C(s.stream,(e=>e||[]))));const a=s.filterByTag(R.packet.onePassSignature).reverse(),c=s.filterByTag(R.packet.signature);return a.length&&!c.length&&L.isStream(s.stream)&&!o(s.stream)?(await Promise.all(a.map((async e=>{e.correspondingSig=new Promise(((t,r)=>{e.correspondingSigResolve=t,e.correspondingSigReject=r})),e.signatureData=P((async()=>(await e.correspondingSig).signatureData)),e.hashed=C(await e.hash(e.signatureType,i[0],void 0,!1)),e.hashed.catch((()=>{}))}))),s.stream=E(s.stream,(async(e,t)=>{const r=D(e),n=x(t);try{for(let e=0;e<a.length;e++){const{value:t}=await r.read();a[e].correspondingSigResolve(t)}await r.readToEnd(),await n.ready,await n.close()}catch(e){a.forEach((t=>{t.correspondingSigReject(e)})),await n.abort(e)}})),mo(a,i,e,t,!1,r)):mo(c,i,e,t,!1,r)}verifyDetached(e,t,r=new Date,n=T){const i=this.unwrapCompressed().packets.filterByTag(R.packet.literalData);if(1!==i.length)throw Error("Can only verify message with one literal data packet.");return mo(e.packets.filterByTag(R.packet.signature),i,t,r,!0,n)}unwrapCompressed(){const e=this.packets.filterByTag(R.packet.compressedData);return e.length?new Ao(e[0].packets):this}async appendSignature(e,t=T){await this.packets.read(L.isUint8Array(e)?e:(await W(e)).data,go,t)}write(){return this.packets.write()}armor(e=T){const t=this.packets[this.packets.length-1],r=t.constructor.tag===Ea.tag?2!==t.version:this.packets.some((e=>e.constructor.tag===sa.tag&&6!==e.version));return $(R.armor.message,this.write(),null,null,null,r,e)}}async function wo(e,t,r=[],n=null,i=[],s=new Date,a=[],o=[],c=[],u=!1,h=T){const l=new ha,f=null===e.text?R.signature.binary:R.signature.text;if(await Promise.all(t.map((async(t,n)=>{const l=a[n];if(!t.isPrivate())throw Error("Need private key for signing");const y=await t.getSigningKey(i[n],s,l,h);return Va(e,r.length?r:[t],y.keyPacket,{signatureType:f},s,o,c,u,h)}))).then((e=>{l.push(...e)})),n){const e=n.packets.filterByTag(R.packet.signature);l.push(...e)}return l}async function mo(e,t,r,n=new Date,i=!1,s=T){return Promise.all(e.filter((function(e){return["text","binary"].includes(R.read(R.signature,e.signatureType))})).map((async function(e){return async function(e,t,r,n=new Date,i=!1,s=T){let a,o;for(const t of r){const r=t.getKeys(e.issuerKeyID);if(r.length>0){a=t,o=r[0];break}}const c=e instanceof ca?e.correspondingSig:e,u={keyID:e.issuerKeyID,verified:(async()=>{if(!o)throw Error("Could not find signing key with key ID "+e.issuerKeyID.toHex());await e.verify(o.keyPacket,e.signatureType,t[0],n,i,s);const r=await c;if(o.getCreationTime()>r.created)throw Error("Key is newer than the signature");try{await a.getSigningKey(o.getKeyID(),r.created,void 0,s)}catch(e){if(!s.allowInsecureVerificationWithReformattedKeys||!e.message.match(/Signature creation time is in the future/))throw e;await a.getSigningKey(o.getKeyID(),n,void 0,s)}return!0})(),signature:(async()=>{const e=await c,t=new ha;return e&&t.push(e),new Na(t)})()};return u.signature.catch((()=>{})),u.verified.catch((()=>{})),u}(e,t,r,n,i,s)})))}const bo=/*#__PURE__*/L.constructAllowedPackets([sa]);class ko{constructor(e,t){if(this.text=L.removeTrailingSpaces(e).replace(/\r?\n/g,"\r\n"),t&&!(t instanceof Na))throw Error("Invalid signature input");this.signature=t||new Na(new ha)}getSigningKeyIDs(){const e=[];return this.signature.packets.forEach((function(t){e.push(t.issuerKeyID)})),e}async sign(e,t=[],r=null,n=[],i=new Date,s=[],a=[],o=[],c=T){const u=new ea;u.setText(this.text);const h=new Na(await wo(u,e,t,r,n,i,s,a,o,!0,c));return new ko(this.text,h)}verify(e,t=new Date,r=T){const n=this.signature.packets.filterByTag(R.packet.signature),i=new ea;return i.setText(this.text),mo(n,[i],e,t,!0,r)}getText(){return this.text.replace(/\r\n/g,"\n")}armor(e=T){const t=this.signature.packets.some((e=>6!==e.version)),r={hash:t?Array.from(new Set(this.signature.packets.map((e=>R.read(R.hash,e.hashAlgorithm).toUpperCase())))).join():null,text:this.text,data:this.signature.packets.write()};return $(R.armor.signed,r,void 0,void 0,void 0,t,e)}}function Eo(e){if(!(e instanceof Ao))throw Error("Parameter [message] needs to be of type Message")}function vo(e){if(!(e instanceof ko||e instanceof Ao))throw Error("Parameter [message] needs to be of type Message or CleartextMessage")}function Ko(e){if("armored"!==e&&"binary"!==e&&"object"!==e)throw Error("Unsupported format "+e)}const So=Object.keys(T).length;function Io(e){const t=Object.keys(e);if(t.length!==So)for(const e of t)if(void 0===T[e])throw Error("Unknown config property: "+e)}function Bo(e){return e&&!L.isArray(e)&&(e=[e]),e}async function Co(e){return"array"===L.isStream(e)?C(e):e}function Uo(e,t,...r){e.data=E(t.packets.stream,(async(t,n)=>{await w(e.data,n,{preventClose:!0});const i=x(n);try{await C(t,(e=>e)),await Promise.all(r.map((e=>C(e.packets.stream,(e=>e))))),await i.close()}catch(e){await i.abort(e)}}))}function Po(e,t,r){switch(t){case"object":return e;case"armored":return e.armor(r);case"binary":return e.write();default:throw Error("Unsupported format "+t)}}const Do="object"==typeof t&&"crypto"in t?t.crypto:void 0;
4
4
  /*! noble-hashes - MIT License (c) 2022 Paul Miller (paulmillr.com) */function xo(e){return e instanceof Uint8Array||ArrayBuffer.isView(e)&&"Uint8Array"===e.constructor.name}function Qo(e){if(!Number.isSafeInteger(e)||e<0)throw Error("positive integer expected, got "+e)}function Ro(e,...t){if(!xo(e))throw Error("Uint8Array expected");if(t.length>0&&!t.includes(e.length))throw Error("Uint8Array expected of length "+t+", got length="+e.length)}function To(e){if("function"!=typeof e||"function"!=typeof e.create)throw Error("Hash should be wrapped by utils.createHasher");Qo(e.outputLen),Qo(e.blockLen)}function Mo(e,t=!0){if(e.destroyed)throw Error("Hash instance has been destroyed");if(t&&e.finished)throw Error("Hash#digest() has already been called")}function Lo(e,t){Ro(e);const r=t.outputLen;if(e.length<r)throw Error("digestInto() expects output buffer of length at least "+r)}function Fo(...e){for(let t=0;t<e.length;t++)e[t].fill(0)}function Oo(e){return new DataView(e.buffer,e.byteOffset,e.byteLength)}function No(e,t){return e<<32-t|e>>>t}function _o(e,t){return e<<t|e>>>32-t>>>0}const Ho=/* @__PURE__ */(()=>68===new Uint8Array(new Uint32Array([287454020]).buffer)[0])()?e=>e:function(e){for(let r=0;r<e.length;r++)e[r]=(t=e[r])<<24&4278190080|t<<8&16711680|t>>>8&65280|t>>>24&255;var t;return e},zo=/* @__PURE__ */(()=>"function"==typeof Uint8Array.from([]).toHex&&"function"==typeof Uint8Array.fromHex)(),Go=/* @__PURE__ */Array.from({length:256},((e,t)=>t.toString(16).padStart(2,"0")));function qo(e){if(Ro(e),zo)return e.toHex();let t="";for(let r=0;r<e.length;r++)t+=Go[e[r]];return t}const jo=48,Vo=57,Yo=65,Zo=70,Jo=97,Xo=102;function Wo(e){return e>=jo&&e<=Vo?e-jo:e>=Yo&&e<=Zo?e-(Yo-10):e>=Jo&&e<=Xo?e-(Jo-10):void 0}function $o(e){if("string"!=typeof e)throw Error("hex string expected, got "+typeof e);if(zo)return Uint8Array.fromHex(e);const t=e.length,r=t/2;if(t%2)throw Error("hex string expected, got unpadded hex of length "+t);const n=new Uint8Array(r);for(let t=0,i=0;t<r;t++,i+=2){const r=Wo(e.charCodeAt(i)),s=Wo(e.charCodeAt(i+1));if(void 0===r||void 0===s){const t=e[i]+e[i+1];throw Error('hex string expected, got non-hex character "'+t+'" at index '+i)}n[t]=16*r+s}return n}function ec(e){return"string"==typeof e&&(e=function(e){if("string"!=typeof e)throw Error("string expected");return new Uint8Array((new TextEncoder).encode(e))}(e)),Ro(e),e}function tc(...e){let t=0;for(let r=0;r<e.length;r++){const n=e[r];Ro(n),t+=n.length}const r=new Uint8Array(t);for(let t=0,n=0;t<e.length;t++){const i=e[t];r.set(i,n),n+=i.length}return r}let rc=class{};function nc(e){const t=t=>e().update(ec(t)).digest(),r=e();return t.outputLen=r.outputLen,t.blockLen=r.blockLen,t.create=()=>e(),t}const ic=nc;function sc(e=32){if(Do&&"function"==typeof Do.getRandomValues)return Do.getRandomValues(new Uint8Array(e));if(Do&&"function"==typeof Do.randomBytes)return Uint8Array.from(Do.randomBytes(e));throw Error("crypto.getRandomValues must be defined")}
5
5
  /*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */const ac=/* @__PURE__ */BigInt(0),oc=/* @__PURE__ */BigInt(1);function cc(e,t=""){if("boolean"!=typeof e){throw Error((t&&`"${t}"`)+"expected boolean, got type="+typeof e)}return e}function uc(e,t,r=""){const n=xo(e),i=e?.length,s=void 0!==t;if(!n||s&&i!==t){throw Error((r&&`"${r}" `)+"expected Uint8Array"+(s?" of length "+t:"")+", got "+(n?"length="+i:"type="+typeof e))}return e}function hc(e){const t=e.toString(16);return 1&t.length?"0"+t:t}function lc(e){if("string"!=typeof e)throw Error("hex string expected, got "+typeof e);return""===e?ac:BigInt("0x"+e)}function fc(e){return lc(qo(e))}function yc(e){return Ro(e),lc(qo(Uint8Array.from(e).reverse()))}function pc(e,t){return $o(e.toString(16).padStart(2*t,"0"))}function dc(e,t){return pc(e,t).reverse()}function gc(e,t,r){let n;if("string"==typeof t)try{n=$o(t)}catch(t){throw Error(e+" must be hex string or Uint8Array, cause: "+t)}else{if(!xo(t))throw Error(e+" must be hex string or Uint8Array");n=Uint8Array.from(t)}const i=n.length;if("number"==typeof r&&i!==r)throw Error(e+" of length "+r+" expected, got "+i);return n}function Ac(e){return Uint8Array.from(e)}const wc=e=>"bigint"==typeof e&&ac<=e;function mc(e,t,r,n){if(!function(e,t,r){return wc(e)&&wc(t)&&wc(r)&&t<=e&&e<r}(t,r,n))throw Error("expected valid "+e+": "+r+" <= n < "+n+", got "+t)}function bc(e){let t;for(t=0;e>ac;e>>=oc,t+=1);return t}const kc=e=>(oc<<BigInt(e))-oc;function Ec(e,t,r={}){if(!e||"object"!=typeof e)throw Error("expected valid options object");function n(t,r,n){const i=e[t];if(n&&void 0===i)return;const s=typeof i;if(s!==r||null===i)throw Error(`param "${t}" is invalid: expected ${r}, got ${s}`)}Object.entries(t).forEach((([e,t])=>n(e,t,!1))),Object.entries(r).forEach((([e,t])=>n(e,t,!0)))}function vc(e){const t=new WeakMap;return(r,...n)=>{const i=t.get(r);if(void 0!==i)return i;const s=e(r,...n);return t.set(r,s),s}}
6
6
  /*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */const Kc=BigInt(0),Sc=BigInt(1),Ic=/* @__PURE__ */BigInt(2),Bc=/* @__PURE__ */BigInt(3),Cc=/* @__PURE__ */BigInt(4),Uc=/* @__PURE__ */BigInt(5),Pc=/* @__PURE__ */BigInt(7),Dc=/* @__PURE__ */BigInt(8),xc=/* @__PURE__ */BigInt(9),Qc=/* @__PURE__ */BigInt(16);function Rc(e,t){const r=e%t;return r>=Kc?r:t+r}function Tc(e,t,r){let n=e;for(;t-- >Kc;)n*=n,n%=r;return n}function Mc(e,t){if(e===Kc)throw Error("invert: expected non-zero number");if(t<=Kc)throw Error("invert: expected positive modulus, got "+t);let r=Rc(e,t),n=t,i=Kc,s=Sc;for(;r!==Kc;){const e=n%r,t=i-s*(n/r);n=r,r=e,i=s,s=t}if(n!==Sc)throw Error("invert: does not exist");return Rc(i,t)}function Lc(e,t,r){if(!e.eql(e.sqr(t),r))throw Error("Cannot find square root")}function Fc(e,t){const r=(e.ORDER+Sc)/Cc,n=e.pow(t,r);return Lc(e,n,t),n}function Oc(e,t){const r=(e.ORDER-Uc)/Dc,n=e.mul(t,Ic),i=e.pow(n,r),s=e.mul(t,i),a=e.mul(e.mul(s,Ic),i),o=e.mul(s,e.sub(a,e.ONE));return Lc(e,o,t),o}function Nc(e){if(e<Bc)throw Error("sqrt is not defined for small field");let t=e-Sc,r=0;for(;t%Ic===Kc;)t/=Ic,r++;let n=Ic;const i=jc(e);for(;1===Gc(i,n);)if(n++>1e3)throw Error("Cannot find square root: probably non-prime P");if(1===r)return Fc;let s=i.pow(n,t);const a=(t+Sc)/Ic;return function(e,n){if(e.is0(n))return n;if(1!==Gc(e,n))throw Error("Cannot find square root");let i=r,o=e.mul(e.ONE,s),c=e.pow(n,t),u=e.pow(n,a);for(;!e.eql(c,e.ONE);){if(e.is0(c))return e.ZERO;let t=1,r=e.sqr(c);for(;!e.eql(r,e.ONE);)if(t++,r=e.sqr(r),t===i)throw Error("Cannot find square root");const n=Sc<<BigInt(i-t-1),s=e.pow(o,n);i=t,o=e.sqr(s),c=e.mul(c,o),u=e.mul(u,s)}return u}}function _c(e){return e%Cc===Bc?Fc:e%Dc===Uc?Oc:e%Qc===xc?function(e){const t=jc(e),r=Nc(e),n=r(t,t.neg(t.ONE)),i=r(t,n),s=r(t,t.neg(n)),a=(e+Pc)/Qc;return(e,t)=>{let r=e.pow(t,a),o=e.mul(r,n);const c=e.mul(r,i),u=e.mul(r,s),h=e.eql(e.sqr(o),t),l=e.eql(e.sqr(c),t);r=e.cmov(r,o,h),o=e.cmov(u,c,l);const f=e.eql(e.sqr(o),t),y=e.cmov(r,o,f);return Lc(e,y,t),y}}(e):Nc(e)}const Hc=["create","isValid","is0","neg","inv","sqrt","sqr","eql","add","sub","mul","pow","div","addN","subN","mulN","sqrN"];function zc(e,t,r=!1){const n=Array(t.length).fill(r?e.ZERO:void 0),i=t.reduce(((t,r,i)=>e.is0(r)?t:(n[i]=t,e.mul(t,r))),e.ONE),s=e.inv(i);return t.reduceRight(((t,r,i)=>e.is0(r)?t:(n[i]=e.mul(t,n[i]),e.mul(t,r))),s),n}function Gc(e,t){const r=(e.ORDER-Sc)/Ic,n=e.pow(t,r),i=e.eql(n,e.ONE),s=e.eql(n,e.ZERO),a=e.eql(n,e.neg(e.ONE));if(!i&&!s&&!a)throw Error("invalid Legendre symbol result");return i?1:s?0:-1}function qc(e,t){void 0!==t&&Qo(t);const r=void 0!==t?t:e.toString(2).length;return{nBitLength:r,nByteLength:Math.ceil(r/8)}}function jc(e,t,r=!1,n={}){if(e<=Kc)throw Error("invalid field: expected ORDER > 0, got "+e);let i,s,a,o=!1;if("object"==typeof t&&null!=t){if(n.sqrt||r)throw Error("cannot specify opts in two arguments");const e=t;e.BITS&&(i=e.BITS),e.sqrt&&(s=e.sqrt),"boolean"==typeof e.isLE&&(r=e.isLE),"boolean"==typeof e.modFromBytes&&(o=e.modFromBytes),a=e.allowedLengths}else"number"==typeof t&&(i=t),n.sqrt&&(s=n.sqrt);const{nBitLength:c,nByteLength:u}=qc(e,i);if(u>2048)throw Error("invalid field: expected ORDER of <= 2048 bytes");let h;const l=Object.freeze({ORDER:e,isLE:r,BITS:c,BYTES:u,MASK:kc(c),ZERO:Kc,ONE:Sc,allowedLengths:a,create:t=>Rc(t,e),isValid:t=>{if("bigint"!=typeof t)throw Error("invalid field element: expected bigint, got "+typeof t);return Kc<=t&&t<e},is0:e=>e===Kc,isValidNot0:e=>!l.is0(e)&&l.isValid(e),isOdd:e=>(e&Sc)===Sc,neg:t=>Rc(-t,e),eql:(e,t)=>e===t,sqr:t=>Rc(t*t,e),add:(t,r)=>Rc(t+r,e),sub:(t,r)=>Rc(t-r,e),mul:(t,r)=>Rc(t*r,e),pow:(e,t)=>function(e,t,r){if(r<Kc)throw Error("invalid exponent, negatives unsupported");if(r===Kc)return e.ONE;if(r===Sc)return t;let n=e.ONE,i=t;for(;r>Kc;)r&Sc&&(n=e.mul(n,i)),i=e.sqr(i),r>>=Sc;return n}(l,e,t),div:(t,r)=>Rc(t*Mc(r,e),e),sqrN:e=>e*e,addN:(e,t)=>e+t,subN:(e,t)=>e-t,mulN:(e,t)=>e*t,inv:t=>Mc(t,e),sqrt:s||(t=>(h||(h=_c(e)),h(l,t))),toBytes:e=>r?dc(e,u):pc(e,u),fromBytes:(t,n=!0)=>{if(a){if(!a.includes(t.length)||t.length>u)throw Error("Field.fromBytes: expected "+a+" bytes, got "+t.length);const e=new Uint8Array(u);e.set(t,r?0:e.length-t.length),t=e}if(t.length!==u)throw Error("Field.fromBytes: expected "+u+" bytes, got "+t.length);let i=r?yc(t):fc(t);if(o&&(i=Rc(i,e)),!n&&!l.isValid(i))throw Error("invalid field element: outside of range 0..ORDER");return i},invertBatch:e=>zc(l,e),cmov:(e,t,r)=>r?t:e});return Object.freeze(l)}function Vc(e){if("bigint"!=typeof e)throw Error("field order must be bigint");const t=e.toString(2).length;return Math.ceil(t/8)}function Yc(e){const t=Vc(e);return t+Math.ceil(t/2)}function Zc(e,t,r){return e&t^~e&r}function Jc(e,t,r){return e&t^e&r^t&r}class Xc extends rc{constructor(e,t,r,n){super(),this.finished=!1,this.length=0,this.pos=0,this.destroyed=!1,this.blockLen=e,this.outputLen=t,this.padOffset=r,this.isLE=n,this.buffer=new Uint8Array(e),this.view=Oo(this.buffer)}update(e){Mo(this),Ro(e=ec(e));const{view:t,buffer:r,blockLen:n}=this,i=e.length;for(let s=0;s<i;){const a=Math.min(n-this.pos,i-s);if(a!==n)r.set(e.subarray(s,s+a),this.pos),this.pos+=a,s+=a,this.pos===n&&(this.process(t,0),this.pos=0);else{const t=Oo(e);for(;n<=i-s;s+=n)this.process(t,s)}}return this.length+=e.length,this.roundClean(),this}digestInto(e){Mo(this),Lo(e,this),this.finished=!0;const{buffer:t,view:r,blockLen:n,isLE:i}=this;let{pos:s}=this;t[s++]=128,Fo(this.buffer.subarray(s)),this.padOffset>n-s&&(this.process(r,0),s=0);for(let e=s;e<n;e++)t[e]=0;!function(e,t,r,n){if("function"==typeof e.setBigUint64)return e.setBigUint64(t,r,n);const i=BigInt(32),s=BigInt(4294967295),a=Number(r>>i&s),o=Number(r&s),c=n?4:0,u=n?0:4;e.setUint32(t+c,a,n),e.setUint32(t+u,o,n)}(r,n-8,BigInt(8*this.length),i),this.process(r,0);const a=Oo(e),o=this.outputLen;if(o%4)throw Error("_sha2: outputLen should be aligned to 32bit");const c=o/4,u=this.get();if(c>u.length)throw Error("_sha2: outputLen bigger than state");for(let e=0;e<c;e++)a.setUint32(4*e,u[e],i)}digest(){const{buffer:e,outputLen:t}=this;this.digestInto(e);const r=e.slice(0,t);return this.destroy(),r}_cloneInto(e){e||(e=new this.constructor),e.set(...this.get());const{blockLen:t,buffer:r,length:n,finished:i,destroyed:s,pos:a}=this;return e.destroyed=s,e.finished=i,e.length=n,e.pos=a,n%t&&e.buffer.set(r),e}clone(){return this._cloneInto()}}const Wc=/* @__PURE__ */Uint32Array.from([1779033703,3144134277,1013904242,2773480762,1359893119,2600822924,528734635,1541459225]),$c=/* @__PURE__ */Uint32Array.from([3238371032,914150663,812702999,4144912697,4290775857,1750603025,1694076839,3204075428]),eu=/* @__PURE__ */Uint32Array.from([3418070365,3238371032,1654270250,914150663,2438529370,812702999,355462360,4144912697,1731405415,4290775857,2394180231,1750603025,3675008525,1694076839,1203062813,3204075428]),tu=/* @__PURE__ */Uint32Array.from([1779033703,4089235720,3144134277,2227873595,1013904242,4271175723,2773480762,1595750129,1359893119,2917565137,2600822924,725511199,528734635,4215389547,1541459225,327033209]),ru=/* @__PURE__ */BigInt(2**32-1),nu=/* @__PURE__ */BigInt(32);function iu(e,t=!1){return t?{h:Number(e&ru),l:Number(e>>nu&ru)}:{h:0|Number(e>>nu&ru),l:0|Number(e&ru)}}function su(e,t=!1){const r=e.length;let n=new Uint32Array(r),i=new Uint32Array(r);for(let s=0;s<r;s++){const{h:r,l:a}=iu(e[s],t);[n[s],i[s]]=[r,a]}return[n,i]}const au=(e,t,r)=>e>>>r,ou=(e,t,r)=>e<<32-r|t>>>r,cu=(e,t,r)=>e>>>r|t<<32-r,uu=(e,t,r)=>e<<32-r|t>>>r,hu=(e,t,r)=>e<<64-r|t>>>r-32,lu=(e,t,r)=>e>>>r-32|t<<64-r;function fu(e,t,r,n){const i=(t>>>0)+(n>>>0);return{h:e+r+(i/2**32|0)|0,l:0|i}}const yu=(e,t,r)=>(e>>>0)+(t>>>0)+(r>>>0),pu=(e,t,r,n)=>t+r+n+(e/2**32|0)|0,du=(e,t,r,n)=>(e>>>0)+(t>>>0)+(r>>>0)+(n>>>0),gu=(e,t,r,n,i)=>t+r+n+i+(e/2**32|0)|0,Au=(e,t,r,n,i)=>(e>>>0)+(t>>>0)+(r>>>0)+(n>>>0)+(i>>>0),wu=(e,t,r,n,i,s)=>t+r+n+i+s+(e/2**32|0)|0,mu=/* @__PURE__ */Uint32Array.from([1116352408,1899447441,3049323471,3921009573,961987163,1508970993,2453635748,2870763221,3624381080,310598401,607225278,1426881987,1925078388,2162078206,2614888103,3248222580,3835390401,4022224774,264347078,604807628,770255983,1249150122,1555081692,1996064986,2554220882,2821834349,2952996808,3210313671,3336571891,3584528711,113926993,338241895,666307205,773529912,1294757372,1396182291,1695183700,1986661051,2177026350,2456956037,2730485921,2820302411,3259730800,3345764771,3516065817,3600352804,4094571909,275423344,430227734,506948616,659060556,883997877,958139571,1322822218,1537002063,1747873779,1955562222,2024104815,2227730452,2361852424,2428436474,2756734187,3204031479,3329325298]),bu=/* @__PURE__ */new Uint32Array(64);class ku extends Xc{constructor(e=32){super(64,e,8,!1),this.A=0|Wc[0],this.B=0|Wc[1],this.C=0|Wc[2],this.D=0|Wc[3],this.E=0|Wc[4],this.F=0|Wc[5],this.G=0|Wc[6],this.H=0|Wc[7]}get(){const{A:e,B:t,C:r,D:n,E:i,F:s,G:a,H:o}=this;return[e,t,r,n,i,s,a,o]}set(e,t,r,n,i,s,a,o){this.A=0|e,this.B=0|t,this.C=0|r,this.D=0|n,this.E=0|i,this.F=0|s,this.G=0|a,this.H=0|o}process(e,t){for(let r=0;r<16;r++,t+=4)bu[r]=e.getUint32(t,!1);for(let e=16;e<64;e++){const t=bu[e-15],r=bu[e-2],n=No(t,7)^No(t,18)^t>>>3,i=No(r,17)^No(r,19)^r>>>10;bu[e]=i+bu[e-7]+n+bu[e-16]|0}let{A:r,B:n,C:i,D:s,E:a,F:o,G:c,H:u}=this;for(let e=0;e<64;e++){const t=u+(No(a,6)^No(a,11)^No(a,25))+Zc(a,o,c)+mu[e]+bu[e]|0,h=(No(r,2)^No(r,13)^No(r,22))+Jc(r,n,i)|0;u=c,c=o,o=a,a=s+t|0,s=i,i=n,n=r,r=t+h|0}r=r+this.A|0,n=n+this.B|0,i=i+this.C|0,s=s+this.D|0,a=a+this.E|0,o=o+this.F|0,c=c+this.G|0,u=u+this.H|0,this.set(r,n,i,s,a,o,c,u)}roundClean(){Fo(bu)}destroy(){this.set(0,0,0,0,0,0,0,0),Fo(this.buffer)}}class Eu extends ku{constructor(){super(28),this.A=0|$c[0],this.B=0|$c[1],this.C=0|$c[2],this.D=0|$c[3],this.E=0|$c[4],this.F=0|$c[5],this.G=0|$c[6],this.H=0|$c[7]}}const vu=/* @__PURE__ */(()=>su(["0x428a2f98d728ae22","0x7137449123ef65cd","0xb5c0fbcfec4d3b2f","0xe9b5dba58189dbbc","0x3956c25bf348b538","0x59f111f1b605d019","0x923f82a4af194f9b","0xab1c5ed5da6d8118","0xd807aa98a3030242","0x12835b0145706fbe","0x243185be4ee4b28c","0x550c7dc3d5ffb4e2","0x72be5d74f27b896f","0x80deb1fe3b1696b1","0x9bdc06a725c71235","0xc19bf174cf692694","0xe49b69c19ef14ad2","0xefbe4786384f25e3","0x0fc19dc68b8cd5b5","0x240ca1cc77ac9c65","0x2de92c6f592b0275","0x4a7484aa6ea6e483","0x5cb0a9dcbd41fbd4","0x76f988da831153b5","0x983e5152ee66dfab","0xa831c66d2db43210","0xb00327c898fb213f","0xbf597fc7beef0ee4","0xc6e00bf33da88fc2","0xd5a79147930aa725","0x06ca6351e003826f","0x142929670a0e6e70","0x27b70a8546d22ffc","0x2e1b21385c26c926","0x4d2c6dfc5ac42aed","0x53380d139d95b3df","0x650a73548baf63de","0x766a0abb3c77b2a8","0x81c2c92e47edaee6","0x92722c851482353b","0xa2bfe8a14cf10364","0xa81a664bbc423001","0xc24b8b70d0f89791","0xc76c51a30654be30","0xd192e819d6ef5218","0xd69906245565a910","0xf40e35855771202a","0x106aa07032bbd1b8","0x19a4c116b8d2d0c8","0x1e376c085141ab53","0x2748774cdf8eeb99","0x34b0bcb5e19b48a8","0x391c0cb3c5c95a63","0x4ed8aa4ae3418acb","0x5b9cca4f7763e373","0x682e6ff3d6b2b8a3","0x748f82ee5defb2fc","0x78a5636f43172f60","0x84c87814a1f0ab72","0x8cc702081a6439ec","0x90befffa23631e28","0xa4506cebde82bde9","0xbef9a3f7b2c67915","0xc67178f2e372532b","0xca273eceea26619c","0xd186b8c721c0c207","0xeada7dd6cde0eb1e","0xf57d4f7fee6ed178","0x06f067aa72176fba","0x0a637dc5a2c898a6","0x113f9804bef90dae","0x1b710b35131c471b","0x28db77f523047d84","0x32caab7b40c72493","0x3c9ebe0a15c9bebc","0x431d67c49c100d4c","0x4cc5d4becb3e42b6","0x597f299cfc657e2a","0x5fcb6fab3ad6faec","0x6c44198c4a475817"].map((e=>BigInt(e)))))(),Ku=/* @__PURE__ */(()=>vu[0])(),Su=/* @__PURE__ */(()=>vu[1])(),Iu=/* @__PURE__ */new Uint32Array(80),Bu=/* @__PURE__ */new Uint32Array(80);class Cu extends Xc{constructor(e=64){super(128,e,16,!1),this.Ah=0|tu[0],this.Al=0|tu[1],this.Bh=0|tu[2],this.Bl=0|tu[3],this.Ch=0|tu[4],this.Cl=0|tu[5],this.Dh=0|tu[6],this.Dl=0|tu[7],this.Eh=0|tu[8],this.El=0|tu[9],this.Fh=0|tu[10],this.Fl=0|tu[11],this.Gh=0|tu[12],this.Gl=0|tu[13],this.Hh=0|tu[14],this.Hl=0|tu[15]}get(){const{Ah:e,Al:t,Bh:r,Bl:n,Ch:i,Cl:s,Dh:a,Dl:o,Eh:c,El:u,Fh:h,Fl:l,Gh:f,Gl:y,Hh:p,Hl:d}=this;return[e,t,r,n,i,s,a,o,c,u,h,l,f,y,p,d]}set(e,t,r,n,i,s,a,o,c,u,h,l,f,y,p,d){this.Ah=0|e,this.Al=0|t,this.Bh=0|r,this.Bl=0|n,this.Ch=0|i,this.Cl=0|s,this.Dh=0|a,this.Dl=0|o,this.Eh=0|c,this.El=0|u,this.Fh=0|h,this.Fl=0|l,this.Gh=0|f,this.Gl=0|y,this.Hh=0|p,this.Hl=0|d}process(e,t){for(let r=0;r<16;r++,t+=4)Iu[r]=e.getUint32(t),Bu[r]=e.getUint32(t+=4);for(let e=16;e<80;e++){const t=0|Iu[e-15],r=0|Bu[e-15],n=cu(t,r,1)^cu(t,r,8)^au(t,0,7),i=uu(t,r,1)^uu(t,r,8)^ou(t,r,7),s=0|Iu[e-2],a=0|Bu[e-2],o=cu(s,a,19)^hu(s,a,61)^au(s,0,6),c=uu(s,a,19)^lu(s,a,61)^ou(s,a,6),u=du(i,c,Bu[e-7],Bu[e-16]),h=gu(u,n,o,Iu[e-7],Iu[e-16]);Iu[e]=0|h,Bu[e]=0|u}let{Ah:r,Al:n,Bh:i,Bl:s,Ch:a,Cl:o,Dh:c,Dl:u,Eh:h,El:l,Fh:f,Fl:y,Gh:p,Gl:d,Hh:g,Hl:A}=this;for(let e=0;e<80;e++){const t=cu(h,l,14)^cu(h,l,18)^hu(h,l,41),w=uu(h,l,14)^uu(h,l,18)^lu(h,l,41),m=h&f^~h&p,b=Au(A,w,l&y^~l&d,Su[e],Bu[e]),k=wu(b,g,t,m,Ku[e],Iu[e]),E=0|b,v=cu(r,n,28)^hu(r,n,34)^hu(r,n,39),K=uu(r,n,28)^lu(r,n,34)^lu(r,n,39),S=r&i^r&a^i&a,I=n&s^n&o^s&o;g=0|p,A=0|d,p=0|f,d=0|y,f=0|h,y=0|l,({h,l}=fu(0|c,0|u,0|k,0|E)),c=0|a,u=0|o,a=0|i,o=0|s,i=0|r,s=0|n;const B=yu(E,K,I);r=pu(B,k,v,S),n=0|B}({h:r,l:n}=fu(0|this.Ah,0|this.Al,0|r,0|n)),({h:i,l:s}=fu(0|this.Bh,0|this.Bl,0|i,0|s)),({h:a,l:o}=fu(0|this.Ch,0|this.Cl,0|a,0|o)),({h:c,l:u}=fu(0|this.Dh,0|this.Dl,0|c,0|u)),({h,l}=fu(0|this.Eh,0|this.El,0|h,0|l)),({h:f,l:y}=fu(0|this.Fh,0|this.Fl,0|f,0|y)),({h:p,l:d}=fu(0|this.Gh,0|this.Gl,0|p,0|d)),({h:g,l:A}=fu(0|this.Hh,0|this.Hl,0|g,0|A)),this.set(r,n,i,s,a,o,c,u,h,l,f,y,p,d,g,A)}roundClean(){Fo(Iu,Bu)}destroy(){Fo(this.buffer),this.set(0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0)}}class Uu extends Cu{constructor(){super(48),this.Ah=0|eu[0],this.Al=0|eu[1],this.Bh=0|eu[2],this.Bl=0|eu[3],this.Ch=0|eu[4],this.Cl=0|eu[5],this.Dh=0|eu[6],this.Dl=0|eu[7],this.Eh=0|eu[8],this.El=0|eu[9],this.Fh=0|eu[10],this.Fl=0|eu[11],this.Gh=0|eu[12],this.Gl=0|eu[13],this.Hh=0|eu[14],this.Hl=0|eu[15]}}const Pu=/* @__PURE__ */nc((()=>new ku)),Du=/* @__PURE__ */nc((()=>new Eu)),xu=/* @__PURE__ */nc((()=>new Cu)),Qu=/* @__PURE__ */nc((()=>new Uu));class Ru extends rc{constructor(e,t){super(),this.finished=!1,this.destroyed=!1,To(e);const r=ec(t);if(this.iHash=e.create(),"function"!=typeof this.iHash.update)throw Error("Expected instance of class which extends utils.Hash");this.blockLen=this.iHash.blockLen,this.outputLen=this.iHash.outputLen;const n=this.blockLen,i=new Uint8Array(n);i.set(r.length>n?e.create().update(r).digest():r);for(let e=0;e<i.length;e++)i[e]^=54;this.iHash.update(i),this.oHash=e.create();for(let e=0;e<i.length;e++)i[e]^=106;this.oHash.update(i),Fo(i)}update(e){return Mo(this),this.iHash.update(e),this}digestInto(e){Mo(this),Ro(e,this.outputLen),this.finished=!0,this.iHash.digestInto(e),this.oHash.update(e),this.oHash.digestInto(e),this.destroy()}digest(){const e=new Uint8Array(this.oHash.outputLen);return this.digestInto(e),e}_cloneInto(e){e||(e=Object.create(Object.getPrototypeOf(this),{}));const{oHash:t,iHash:r,finished:n,destroyed:i,blockLen:s,outputLen:a}=this;return e.finished=n,e.destroyed=i,e.blockLen=s,e.outputLen=a,e.oHash=t._cloneInto(e.oHash),e.iHash=r._cloneInto(e.iHash),e}clone(){return this._cloneInto()}destroy(){this.destroyed=!0,this.oHash.destroy(),this.iHash.destroy()}}const Tu=(e,t,r)=>new Ru(e,t).update(r).digest();Tu.create=(e,t)=>new Ru(e,t)