@scopeblind/passport 0.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +184 -0
- package/dist/browser.d.mts +44 -0
- package/dist/browser.d.ts +44 -0
- package/dist/browser.js +180 -0
- package/dist/browser.mjs +148 -0
- package/dist/index.d.mts +421 -0
- package/dist/index.d.ts +421 -0
- package/dist/index.js +630 -0
- package/dist/index.mjs +568 -0
- package/dist/types-DHZHv2EE.d.mts +278 -0
- package/dist/types-DHZHv2EE.d.ts +278 -0
- package/package.json +63 -0
package/dist/index.d.mts
ADDED
|
@@ -0,0 +1,421 @@
|
|
|
1
|
+
import { b as PassportRole, a as PassportKeyPair, A as AgentPublicProfile, c as AgentConfigAttestations, d as AgentCapabilities, e as AgentEvidencePointers, S as SignedEnvelope, f as AgentManifest, C as CoachContribution, g as CoachManifest, O as OwnershipAttestation, h as StatusRecord, M as Manifest, i as ArenaBattleReceipt, j as CoachUpliftReceipt, F as FormalDebateReceipt, P as PassportBundle } from './types-DHZHv2EE.mjs';
|
|
2
|
+
export { k as AuthKeyBinding, B as BaseManifest, l as BattleParticipant, E as EncryptedPassportBundle, m as EvidenceReceipt, n as EvidenceReceiptType, o as FormalDebateParticipant, p as ManifestType, R as RestraintReceipt } from './types-DHZHv2EE.mjs';
|
|
3
|
+
|
|
4
|
+
/**
|
|
5
|
+
* @scopeblind/passport — Key Generation
|
|
6
|
+
*
|
|
7
|
+
* Ed25519 key generation using @noble/curves (same library as @veritasacta/artifacts).
|
|
8
|
+
* Works in both Node.js and browser environments.
|
|
9
|
+
*/
|
|
10
|
+
|
|
11
|
+
declare function base58Encode(bytes: Uint8Array): string;
|
|
12
|
+
/**
|
|
13
|
+
* Derive a passport ID from a public key.
|
|
14
|
+
* Format: sb:<role>:<first-12-chars-of-base58-pubkey>
|
|
15
|
+
*/
|
|
16
|
+
declare function derivePassportId(publicKey: Uint8Array, role: PassportRole): string;
|
|
17
|
+
/**
|
|
18
|
+
* Generate a new Ed25519 passport keypair.
|
|
19
|
+
*
|
|
20
|
+
* @param role - 'coach' or 'agent'
|
|
21
|
+
* @returns A PassportKeyPair with the derived kid
|
|
22
|
+
*/
|
|
23
|
+
declare function generatePassportKey(role: PassportRole): PassportKeyPair;
|
|
24
|
+
/**
|
|
25
|
+
* Get the hex-encoded private key seed (32 bytes) for signing.
|
|
26
|
+
* Compatible with @noble/curves ed25519.sign() which expects the seed.
|
|
27
|
+
*/
|
|
28
|
+
declare function getSigningKey(keyPair: PassportKeyPair): string;
|
|
29
|
+
/**
|
|
30
|
+
* Get the hex-encoded public key for verification.
|
|
31
|
+
*/
|
|
32
|
+
declare function getVerifyKey(keyPair: PassportKeyPair): string;
|
|
33
|
+
/**
|
|
34
|
+
* Compute SHA-256 hash of a string. Returns hex.
|
|
35
|
+
*/
|
|
36
|
+
declare function hashString(value: string): string;
|
|
37
|
+
|
|
38
|
+
/**
|
|
39
|
+
* @scopeblind/passport — Manifest Creation & Signing
|
|
40
|
+
*
|
|
41
|
+
* Creates immutable, signed manifests for coaches and agents.
|
|
42
|
+
* Uses canonical JSON serialization + Ed25519 signing
|
|
43
|
+
* (same approach as @veritasacta/artifacts).
|
|
44
|
+
*/
|
|
45
|
+
|
|
46
|
+
/**
|
|
47
|
+
* Produce a deterministic JSON string (JCS-style sorted keys).
|
|
48
|
+
* Must match @veritasacta/artifacts canonicalize() output.
|
|
49
|
+
*/
|
|
50
|
+
declare function canonicalize(obj: Record<string, unknown>): string;
|
|
51
|
+
/**
|
|
52
|
+
* SHA-256 hash of canonical JSON.
|
|
53
|
+
*/
|
|
54
|
+
declare function canonicalHash(obj: Record<string, unknown>): string;
|
|
55
|
+
/**
|
|
56
|
+
* Sign any payload with the passport's Ed25519 key.
|
|
57
|
+
*/
|
|
58
|
+
declare function signPayload<T>(payload: T, keyPair: PassportKeyPair): SignedEnvelope<T>;
|
|
59
|
+
interface CreateCoachManifestInput {
|
|
60
|
+
display_name: string;
|
|
61
|
+
}
|
|
62
|
+
/**
|
|
63
|
+
* Create and sign an immutable coach manifest.
|
|
64
|
+
*/
|
|
65
|
+
declare function createCoachManifest(keyPair: PassportKeyPair, input: CreateCoachManifestInput, previousVersion?: string | null, version?: string): SignedEnvelope<CoachManifest>;
|
|
66
|
+
interface CreateAgentManifestInput {
|
|
67
|
+
public_profile: AgentPublicProfile;
|
|
68
|
+
configuration_attestations: Omit<AgentConfigAttestations, 'prompt_hash'> & {
|
|
69
|
+
/** The raw system prompt — will be hashed, NOT stored */
|
|
70
|
+
system_prompt: string;
|
|
71
|
+
};
|
|
72
|
+
capability_declarations: AgentCapabilities;
|
|
73
|
+
evidence_pointers?: AgentEvidencePointers;
|
|
74
|
+
}
|
|
75
|
+
/**
|
|
76
|
+
* Create and sign an immutable agent manifest.
|
|
77
|
+
* The system prompt is hashed (SHA-256) and never stored in the manifest.
|
|
78
|
+
*/
|
|
79
|
+
declare function createAgentManifest(keyPair: PassportKeyPair, input: CreateAgentManifestInput, previousVersion?: string | null, version?: string): SignedEnvelope<AgentManifest>;
|
|
80
|
+
/**
|
|
81
|
+
* Create a signed ownership attestation (coach proves ownership of agent).
|
|
82
|
+
*/
|
|
83
|
+
declare function createOwnershipAttestation(coachKeyPair: PassportKeyPair, agentId: string, agentManifestVersion: string): SignedEnvelope<OwnershipAttestation>;
|
|
84
|
+
/**
|
|
85
|
+
* Create a signed status change record.
|
|
86
|
+
*/
|
|
87
|
+
declare function createStatusRecord(signerKeyPair: PassportKeyPair, targetId: string, status: 'active' | 'suspended' | 'revoked', reason?: string): SignedEnvelope<StatusRecord>;
|
|
88
|
+
/**
|
|
89
|
+
* Create a signed coach contribution (one canonical payload per battle).
|
|
90
|
+
*/
|
|
91
|
+
declare function createCoachContribution(coachKeyPair: PassportKeyPair, battleId: string, coachedSide: 'A' | 'B', noteHash: string, noteLength: number, upliftVerdict?: 'stronger' | 'same' | 'weaker'): SignedEnvelope<CoachContribution>;
|
|
92
|
+
|
|
93
|
+
/**
|
|
94
|
+
* @scopeblind/passport — Verification
|
|
95
|
+
*
|
|
96
|
+
* Verify signed envelopes (manifests, attestations, contributions).
|
|
97
|
+
* Uses Ed25519 verification compatible with @veritasacta/artifacts.
|
|
98
|
+
*/
|
|
99
|
+
|
|
100
|
+
interface VerificationResult {
|
|
101
|
+
valid: boolean;
|
|
102
|
+
/** SHA-256 hash of the canonical payload */
|
|
103
|
+
hash?: string;
|
|
104
|
+
/** Error description if verification failed */
|
|
105
|
+
error?: string;
|
|
106
|
+
}
|
|
107
|
+
/**
|
|
108
|
+
* Verify a signed envelope's Ed25519 signature.
|
|
109
|
+
*
|
|
110
|
+
* @param envelope - The signed envelope to verify
|
|
111
|
+
* @param expectedPublicKey - Optional. If provided, also checks the signer matches.
|
|
112
|
+
*/
|
|
113
|
+
declare function verifyEnvelope<T>(envelope: SignedEnvelope<T>, expectedPublicKey?: Uint8Array): VerificationResult;
|
|
114
|
+
/**
|
|
115
|
+
* Verify that a manifest is self-consistent (signature matches embedded public key).
|
|
116
|
+
*/
|
|
117
|
+
declare function verifyManifest(envelope: SignedEnvelope<Manifest>): VerificationResult;
|
|
118
|
+
/**
|
|
119
|
+
* Verify an ownership attestation was signed by the claimed coach.
|
|
120
|
+
*/
|
|
121
|
+
declare function verifyOwnership(attestation: SignedEnvelope<OwnershipAttestation>, coachPublicKey: Uint8Array): VerificationResult;
|
|
122
|
+
|
|
123
|
+
/**
|
|
124
|
+
* @scopeblind/passport — Display & UI Helpers
|
|
125
|
+
*
|
|
126
|
+
* Utilities for displaying passport identities in UIs.
|
|
127
|
+
* These are convenience functions, not core crypto.
|
|
128
|
+
*/
|
|
129
|
+
|
|
130
|
+
/**
|
|
131
|
+
* Format a passport kid for display.
|
|
132
|
+
* "sb:coach:3kFxGq7nY1Ka" → "3kFx…Y1Ka"
|
|
133
|
+
*/
|
|
134
|
+
declare function formatKidShort(kid: string): string;
|
|
135
|
+
/**
|
|
136
|
+
* Format a passport kid with role label.
|
|
137
|
+
* "sb:coach:3kFxGq7nY1Ka" → "Coach 3kFx…Y1Ka"
|
|
138
|
+
*/
|
|
139
|
+
declare function formatKidLabeled(kid: string): string;
|
|
140
|
+
/**
|
|
141
|
+
* Get a display-ready summary from a signed coach manifest.
|
|
142
|
+
*/
|
|
143
|
+
declare function getCoachSummary(envelope: SignedEnvelope<CoachManifest>): {
|
|
144
|
+
kid: string;
|
|
145
|
+
displayName: string;
|
|
146
|
+
shortId: string;
|
|
147
|
+
version: string;
|
|
148
|
+
createdAt: string;
|
|
149
|
+
};
|
|
150
|
+
/**
|
|
151
|
+
* Get a display-ready summary from a signed agent manifest.
|
|
152
|
+
*/
|
|
153
|
+
declare function getAgentSummary(envelope: SignedEnvelope<AgentManifest>): {
|
|
154
|
+
kid: string;
|
|
155
|
+
name: string;
|
|
156
|
+
shortId: string;
|
|
157
|
+
version: string;
|
|
158
|
+
domainLanes: string[];
|
|
159
|
+
createdAt: string;
|
|
160
|
+
};
|
|
161
|
+
/**
|
|
162
|
+
* Check if a manifest is a coach manifest.
|
|
163
|
+
*/
|
|
164
|
+
declare function isCoachManifest(manifest: Manifest): manifest is CoachManifest;
|
|
165
|
+
/**
|
|
166
|
+
* Check if a manifest is an agent manifest.
|
|
167
|
+
*/
|
|
168
|
+
declare function isAgentManifest(manifest: Manifest): manifest is AgentManifest;
|
|
169
|
+
|
|
170
|
+
/**
|
|
171
|
+
* @scopeblind/passport — Issuer Module
|
|
172
|
+
*
|
|
173
|
+
* Provides Ed25519 signing for server-side receipt issuance.
|
|
174
|
+
* Uses the SAME canonical envelope model as passport signing.
|
|
175
|
+
*
|
|
176
|
+
* Usage in Cloudflare Workers:
|
|
177
|
+
* - Store issuer secret key as an environment secret
|
|
178
|
+
* - Expose public key at /.well-known/blindllm-keys.json
|
|
179
|
+
* - Sign receipts using createSignedReceipt()
|
|
180
|
+
*/
|
|
181
|
+
|
|
182
|
+
interface IssuerKeyPair {
|
|
183
|
+
/** Hex-encoded Ed25519 public key */
|
|
184
|
+
publicKeyHex: string;
|
|
185
|
+
/** Hex-encoded Ed25519 secret key seed (32 bytes) */
|
|
186
|
+
secretKeyHex: string;
|
|
187
|
+
/** Issuer ID: sb:issuer:<fingerprint> */
|
|
188
|
+
issuerId: string;
|
|
189
|
+
}
|
|
190
|
+
/**
|
|
191
|
+
* Generate a new issuer keypair.
|
|
192
|
+
* Call ONCE, store the result as environment secrets.
|
|
193
|
+
*/
|
|
194
|
+
declare function generateIssuerKey(): IssuerKeyPair;
|
|
195
|
+
/**
|
|
196
|
+
* Sign a receipt payload with the issuer's key.
|
|
197
|
+
* Same canonical JSON + Ed25519 envelope as passport signing.
|
|
198
|
+
*/
|
|
199
|
+
declare function signReceipt<T>(payload: T, issuerSecretKeyHex: string, issuerId: string): SignedEnvelope<T>;
|
|
200
|
+
interface CreateArenaBattleReceiptInput {
|
|
201
|
+
battleId: string;
|
|
202
|
+
laneId: string;
|
|
203
|
+
agentA: {
|
|
204
|
+
id: string;
|
|
205
|
+
manifest_version: string;
|
|
206
|
+
};
|
|
207
|
+
agentB: {
|
|
208
|
+
id: string;
|
|
209
|
+
manifest_version: string;
|
|
210
|
+
};
|
|
211
|
+
winner: 'A' | 'B' | 'tie';
|
|
212
|
+
coach?: {
|
|
213
|
+
id: string;
|
|
214
|
+
coached_side: 'A' | 'B';
|
|
215
|
+
note_hash: string;
|
|
216
|
+
note_length: number;
|
|
217
|
+
};
|
|
218
|
+
}
|
|
219
|
+
/**
|
|
220
|
+
* Create and sign a blindllm:arena-battle receipt.
|
|
221
|
+
*/
|
|
222
|
+
declare function createArenaBattleReceipt(input: CreateArenaBattleReceiptInput, issuerSecretKeyHex: string, issuerId: string): SignedEnvelope<ArenaBattleReceipt>;
|
|
223
|
+
interface CreateCoachUpliftReceiptInput {
|
|
224
|
+
battleId: string;
|
|
225
|
+
coachId: string;
|
|
226
|
+
coachedSide: 'A' | 'B';
|
|
227
|
+
upliftVerdict: 'stronger' | 'same' | 'weaker';
|
|
228
|
+
}
|
|
229
|
+
/**
|
|
230
|
+
* Create and sign a blindllm:coach-uplift receipt.
|
|
231
|
+
*/
|
|
232
|
+
declare function createCoachUpliftReceipt(input: CreateCoachUpliftReceiptInput, issuerSecretKeyHex: string, issuerId: string): SignedEnvelope<CoachUpliftReceipt>;
|
|
233
|
+
interface CreateFormalDebateReceiptInput {
|
|
234
|
+
debateId: string;
|
|
235
|
+
specId: string;
|
|
236
|
+
laneId: string;
|
|
237
|
+
artifactHash: string;
|
|
238
|
+
resolutionHash: string;
|
|
239
|
+
pro: {
|
|
240
|
+
id: string;
|
|
241
|
+
manifest_version: string;
|
|
242
|
+
coach_id?: string;
|
|
243
|
+
};
|
|
244
|
+
con: {
|
|
245
|
+
id: string;
|
|
246
|
+
manifest_version: string;
|
|
247
|
+
coach_id?: string;
|
|
248
|
+
};
|
|
249
|
+
audienceWinner: 'pro' | 'con' | 'tie';
|
|
250
|
+
judgeWinner: 'pro' | 'con' | 'tie';
|
|
251
|
+
restraintResult: 'clean' | 'flagged';
|
|
252
|
+
}
|
|
253
|
+
/**
|
|
254
|
+
* Create and sign a blindllm:formal-debate receipt.
|
|
255
|
+
*/
|
|
256
|
+
declare function createFormalDebateReceipt(input: CreateFormalDebateReceiptInput, issuerSecretKeyHex: string, issuerId: string): SignedEnvelope<FormalDebateReceipt>;
|
|
257
|
+
/**
|
|
258
|
+
* Build a proper JWK Set payload for the issuer endpoint.
|
|
259
|
+
* x is base64url-encoded per RFC 8037 (not hex).
|
|
260
|
+
*
|
|
261
|
+
* Serve at: GET /.well-known/blindllm-keys.json
|
|
262
|
+
*/
|
|
263
|
+
declare function buildPublicKeyEndpoint(issuerPublicKeyHex: string, issuerId: string): {
|
|
264
|
+
keys: {
|
|
265
|
+
kty: string;
|
|
266
|
+
crv: string;
|
|
267
|
+
kid: string;
|
|
268
|
+
x: string;
|
|
269
|
+
use: string;
|
|
270
|
+
}[];
|
|
271
|
+
issuer: string;
|
|
272
|
+
updated_at: string;
|
|
273
|
+
};
|
|
274
|
+
/**
|
|
275
|
+
* Derive a full IssuerKeyPair from a single hex-encoded seed.
|
|
276
|
+
* Use this when the worker stores one secret (BLINDLLM_ISSUER_SEED)
|
|
277
|
+
* and needs to derive the public key and issuer ID at runtime.
|
|
278
|
+
*/
|
|
279
|
+
declare function deriveIssuerFromSeed(secretKeyHex: string): IssuerKeyPair;
|
|
280
|
+
|
|
281
|
+
/**
|
|
282
|
+
* @scopeblind/passport — Export / Import
|
|
283
|
+
*
|
|
284
|
+
* Portable passport bundle format for cross-browser/machine transfer.
|
|
285
|
+
* Plain JSON first; encrypted bundles in a later sprint.
|
|
286
|
+
*/
|
|
287
|
+
|
|
288
|
+
/** Serializable passport bundle (hex-encoded keys, JSON-safe) */
|
|
289
|
+
interface PortablePassportBundle {
|
|
290
|
+
/** Format version */
|
|
291
|
+
v: 1;
|
|
292
|
+
/** Export timestamp */
|
|
293
|
+
exported_at: string;
|
|
294
|
+
/** Passport data */
|
|
295
|
+
passport: {
|
|
296
|
+
kid: string;
|
|
297
|
+
role: 'coach' | 'agent';
|
|
298
|
+
created_at: string;
|
|
299
|
+
publicKeyHex: string;
|
|
300
|
+
secretKeyHex: string;
|
|
301
|
+
};
|
|
302
|
+
/** Signed manifests */
|
|
303
|
+
manifests: SignedEnvelope<Manifest>[];
|
|
304
|
+
/** Ownership attestations */
|
|
305
|
+
ownership_attestations: SignedEnvelope<OwnershipAttestation>[];
|
|
306
|
+
/** Status records */
|
|
307
|
+
status_records: SignedEnvelope<StatusRecord>[];
|
|
308
|
+
}
|
|
309
|
+
/**
|
|
310
|
+
* Export a PassportBundle to a portable JSON-serializable format.
|
|
311
|
+
* Keys are hex-encoded for safe transport.
|
|
312
|
+
*/
|
|
313
|
+
declare function exportPassportBundle(bundle: PassportBundle): PortablePassportBundle;
|
|
314
|
+
/**
|
|
315
|
+
* Serialize a portable bundle to a JSON string.
|
|
316
|
+
*/
|
|
317
|
+
declare function serializeBundle(bundle: PortablePassportBundle): string;
|
|
318
|
+
interface ImportResult {
|
|
319
|
+
valid: boolean;
|
|
320
|
+
bundle?: PassportBundle;
|
|
321
|
+
errors: string[];
|
|
322
|
+
warnings: string[];
|
|
323
|
+
}
|
|
324
|
+
/**
|
|
325
|
+
* Parse and validate a portable passport bundle.
|
|
326
|
+
*
|
|
327
|
+
* Verifies:
|
|
328
|
+
* 1. JSON structure and version
|
|
329
|
+
* 2. Secret key → public key derivation coherence
|
|
330
|
+
* 3. kid matches the public key
|
|
331
|
+
* 4. Manifest signatures
|
|
332
|
+
* 5. Manifests belong to this passport's kid
|
|
333
|
+
*/
|
|
334
|
+
declare function importPassportBundle(json: string): ImportResult;
|
|
335
|
+
|
|
336
|
+
/**
|
|
337
|
+
* Passport → @veritasacta/artifacts bridge
|
|
338
|
+
*
|
|
339
|
+
* Utilities for converting @scopeblind/passport receipts into
|
|
340
|
+
* v2 artifact envelopes that can be verified at scopeblind.com/verify
|
|
341
|
+
* and indexed by the receipt explorer.
|
|
342
|
+
*
|
|
343
|
+
* This bridge allows BlindLLM battle receipts, coach contributions,
|
|
344
|
+
* and agent manifests to be treated as standard Veritas Acta artifacts.
|
|
345
|
+
*/
|
|
346
|
+
/**
|
|
347
|
+
* Convert a passport SignedEnvelope to a v2 artifact envelope.
|
|
348
|
+
*
|
|
349
|
+
* Passport receipts already use JCS canonicalization + Ed25519 signing
|
|
350
|
+
* (same approach as @veritasacta/artifacts), so the conversion is
|
|
351
|
+
* primarily a metadata wrapper that adds the v2 format identifier.
|
|
352
|
+
*/
|
|
353
|
+
declare function passportToArtifact<T>(envelope: PassportSignedEnvelope<T>, options?: {
|
|
354
|
+
format?: string;
|
|
355
|
+
issuer?: string;
|
|
356
|
+
}): ArtifactEnvelope<T>;
|
|
357
|
+
/**
|
|
358
|
+
* Convert multiple passport receipts to artifact envelopes.
|
|
359
|
+
*/
|
|
360
|
+
declare function passportBatchToArtifacts<T>(envelopes: PassportSignedEnvelope<T>[], options?: {
|
|
361
|
+
format?: string;
|
|
362
|
+
issuer?: string;
|
|
363
|
+
}): ArtifactEnvelope<T>[];
|
|
364
|
+
/**
|
|
365
|
+
* Create a self-contained audit bundle from passport receipts.
|
|
366
|
+
* The bundle embeds the public keys for offline verification.
|
|
367
|
+
*/
|
|
368
|
+
declare function createPassportAuditBundle<T>(envelopes: PassportSignedEnvelope<T>[], keys: Record<string, {
|
|
369
|
+
pub: string;
|
|
370
|
+
issuer?: string;
|
|
371
|
+
}>, options?: {
|
|
372
|
+
issuer?: string;
|
|
373
|
+
}): AuditBundle<T>;
|
|
374
|
+
/** Passport SignedEnvelope (matches @scopeblind/passport) */
|
|
375
|
+
interface PassportSignedEnvelope<T> {
|
|
376
|
+
payload: T;
|
|
377
|
+
signature: {
|
|
378
|
+
alg?: string;
|
|
379
|
+
kid: string;
|
|
380
|
+
sig: string;
|
|
381
|
+
pub?: string;
|
|
382
|
+
};
|
|
383
|
+
}
|
|
384
|
+
/** v2 Artifact Envelope (matches @veritasacta/artifacts) */
|
|
385
|
+
interface ArtifactEnvelope<T> {
|
|
386
|
+
version: string;
|
|
387
|
+
format: string;
|
|
388
|
+
payload: T;
|
|
389
|
+
signature: {
|
|
390
|
+
alg: string;
|
|
391
|
+
kid: string;
|
|
392
|
+
sig: string;
|
|
393
|
+
pub?: string;
|
|
394
|
+
};
|
|
395
|
+
meta?: {
|
|
396
|
+
issuer?: string;
|
|
397
|
+
source?: string;
|
|
398
|
+
timestamp?: number;
|
|
399
|
+
};
|
|
400
|
+
}
|
|
401
|
+
/** Audit Bundle */
|
|
402
|
+
interface AuditBundle<T> {
|
|
403
|
+
version: string;
|
|
404
|
+
created_at: string;
|
|
405
|
+
issuer: string;
|
|
406
|
+
receipts: ArtifactEnvelope<T>[];
|
|
407
|
+
keys: Record<string, {
|
|
408
|
+
alg: string;
|
|
409
|
+
pub: string;
|
|
410
|
+
issuer?: string;
|
|
411
|
+
}>;
|
|
412
|
+
summary: {
|
|
413
|
+
total_receipts: number;
|
|
414
|
+
time_range: {
|
|
415
|
+
first: number;
|
|
416
|
+
last: number;
|
|
417
|
+
};
|
|
418
|
+
};
|
|
419
|
+
}
|
|
420
|
+
|
|
421
|
+
export { AgentCapabilities, AgentConfigAttestations, AgentEvidencePointers, AgentManifest, AgentPublicProfile, ArenaBattleReceipt, CoachContribution, CoachManifest, CoachUpliftReceipt, type CreateAgentManifestInput, type CreateArenaBattleReceiptInput, type CreateCoachManifestInput, type CreateCoachUpliftReceiptInput, type CreateFormalDebateReceiptInput, FormalDebateReceipt, type ImportResult, type IssuerKeyPair, Manifest, OwnershipAttestation, PassportBundle, PassportKeyPair, PassportRole, type PortablePassportBundle, SignedEnvelope, StatusRecord, type VerificationResult, base58Encode, buildPublicKeyEndpoint, canonicalHash, canonicalize, createAgentManifest, createArenaBattleReceipt, createCoachContribution, createCoachManifest, createCoachUpliftReceipt, createFormalDebateReceipt, createOwnershipAttestation, createPassportAuditBundle, createStatusRecord, deriveIssuerFromSeed, derivePassportId, exportPassportBundle, formatKidLabeled, formatKidShort, generateIssuerKey, generatePassportKey, getAgentSummary, getCoachSummary, getSigningKey, getVerifyKey, hashString, importPassportBundle, isAgentManifest, isCoachManifest, passportBatchToArtifacts, passportToArtifact, serializeBundle, signPayload, signReceipt, verifyEnvelope, verifyManifest, verifyOwnership };
|