digiid-ts 2.0.1 → 2.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"file":"digiid-ts.es.js","sources":["../src/types.ts","../node_modules/@noble/curves/node_modules/@noble/hashes/utils.js","../node_modules/@noble/curves/node_modules/@noble/hashes/_md.js","../node_modules/@noble/curves/node_modules/@noble/hashes/sha2.js","../node_modules/@noble/curves/utils.js","../node_modules/@noble/curves/abstract/modular.js","../node_modules/@noble/curves/abstract/curve.js","../node_modules/@noble/curves/node_modules/@noble/hashes/hmac.js","../node_modules/@noble/curves/abstract/weierstrass.js","../node_modules/@noble/curves/secp256k1.js","../node_modules/@noble/hashes/esm/utils.js","../node_modules/@noble/hashes/esm/_md.js","../node_modules/@noble/hashes/esm/legacy.js","../node_modules/@noble/hashes/esm/ripemd160.js","../node_modules/@noble/hashes/esm/sha2.js","../node_modules/@noble/hashes/esm/sha256.js","../src/digiid.ts"],"sourcesContent":["/**\n * Options for generating a DigiID URI.\n */\nexport interface DigiIDUriOptions {\n /** The full URL that the user's DigiID wallet will send the verification data back to. */\n callbackUrl: string;\n /** A unique, unpredictable nonce (number used once) for this authentication request. If not provided, a secure random one might be generated (implementation specific). */\n nonce?: string;\n /** Set to true for testing over HTTP (insecure), defaults to false (HTTPS required). */\n unsecure?: boolean;\n}\n\n/**\n * Data structure typically received from the DigiID wallet callback.\n */\nexport interface DigiIDCallbackData {\n /** The DigiByte address used for signing. */\n address: string;\n /** The DigiID URI that was originally presented to the user. */\n uri: string;\n /** The signature proving ownership of the address, signing the URI. */\n signature: string;\n}\n\n/**\n * Options for verifying a DigiID callback.\n */\nexport interface DigiIDVerifyOptions {\n /** The expected callback URL (or parts of it, like domain/path) that should match the one in the received URI. */\n expectedCallbackUrl: string | URL;\n /** The specific nonce that was originally generated for this authentication attempt, to prevent replay attacks. */\n expectedNonce?: string;\n}\n\n/**\n * Result of a successful DigiID verification.\n */\nexport interface DigiIDVerificationResult {\n /** Indicates the verification was successful. */\n isValid: true;\n /** The DigiByte address that was successfully verified. */\n address: string;\n /** The nonce extracted from the verified URI. */\n nonce: string;\n}\n\n/**\n * Represents an error during DigiID processing.\n */\nexport class DigiIDError extends Error {\n constructor(message: string) {\n super(message);\n this.name = 'DigiIDError';\n }\n}\n","/**\n * Utilities for hex, bytes, CSPRNG.\n * @module\n */\n/*! noble-hashes - MIT License (c) 2022 Paul Miller (paulmillr.com) */\n/** Checks if something is Uint8Array. Be careful: nodejs Buffer will return true. */\nexport function isBytes(a) {\n return a instanceof Uint8Array || (ArrayBuffer.isView(a) && a.constructor.name === 'Uint8Array');\n}\n/** Asserts something is positive integer. */\nexport function anumber(n, title = '') {\n if (!Number.isSafeInteger(n) || n < 0) {\n const prefix = title && `\"${title}\" `;\n throw new Error(`${prefix}expected integer >= 0, got ${n}`);\n }\n}\n/** Asserts something is Uint8Array. */\nexport function abytes(value, length, title = '') {\n const bytes = isBytes(value);\n const len = value?.length;\n const needsLen = length !== undefined;\n if (!bytes || (needsLen && len !== length)) {\n const prefix = title && `\"${title}\" `;\n const ofLen = needsLen ? ` of length ${length}` : '';\n const got = bytes ? `length=${len}` : `type=${typeof value}`;\n throw new Error(prefix + 'expected Uint8Array' + ofLen + ', got ' + got);\n }\n return value;\n}\n/** Asserts something is hash */\nexport function ahash(h) {\n if (typeof h !== 'function' || typeof h.create !== 'function')\n throw new Error('Hash must wrapped by utils.createHasher');\n anumber(h.outputLen);\n anumber(h.blockLen);\n}\n/** Asserts a hash instance has not been destroyed / finished */\nexport function aexists(instance, checkFinished = true) {\n if (instance.destroyed)\n throw new Error('Hash instance has been destroyed');\n if (checkFinished && instance.finished)\n throw new Error('Hash#digest() has already been called');\n}\n/** Asserts output is properly-sized byte array */\nexport function aoutput(out, instance) {\n abytes(out, undefined, 'digestInto() output');\n const min = instance.outputLen;\n if (out.length < min) {\n throw new Error('\"digestInto() output\" expected to be of length >=' + min);\n }\n}\n/** Cast u8 / u16 / u32 to u8. */\nexport function u8(arr) {\n return new Uint8Array(arr.buffer, arr.byteOffset, arr.byteLength);\n}\n/** Cast u8 / u16 / u32 to u32. */\nexport function u32(arr) {\n return new Uint32Array(arr.buffer, arr.byteOffset, Math.floor(arr.byteLength / 4));\n}\n/** Zeroize a byte array. Warning: JS provides no guarantees. */\nexport function clean(...arrays) {\n for (let i = 0; i < arrays.length; i++) {\n arrays[i].fill(0);\n }\n}\n/** Create DataView of an array for easy byte-level manipulation. */\nexport function createView(arr) {\n return new DataView(arr.buffer, arr.byteOffset, arr.byteLength);\n}\n/** The rotate right (circular right shift) operation for uint32 */\nexport function rotr(word, shift) {\n return (word << (32 - shift)) | (word >>> shift);\n}\n/** The rotate left (circular left shift) operation for uint32 */\nexport function rotl(word, shift) {\n return (word << shift) | ((word >>> (32 - shift)) >>> 0);\n}\n/** Is current platform little-endian? Most are. Big-Endian platform: IBM */\nexport const isLE = /* @__PURE__ */ (() => new Uint8Array(new Uint32Array([0x11223344]).buffer)[0] === 0x44)();\n/** The byte swap operation for uint32 */\nexport function byteSwap(word) {\n return (((word << 24) & 0xff000000) |\n ((word << 8) & 0xff0000) |\n ((word >>> 8) & 0xff00) |\n ((word >>> 24) & 0xff));\n}\n/** Conditionally byte swap if on a big-endian platform */\nexport const swap8IfBE = isLE\n ? (n) => n\n : (n) => byteSwap(n);\n/** In place byte swap for Uint32Array */\nexport function byteSwap32(arr) {\n for (let i = 0; i < arr.length; i++) {\n arr[i] = byteSwap(arr[i]);\n }\n return arr;\n}\nexport const swap32IfBE = isLE\n ? (u) => u\n : byteSwap32;\n// Built-in hex conversion https://caniuse.com/mdn-javascript_builtins_uint8array_fromhex\nconst hasHexBuiltin = /* @__PURE__ */ (() => \n// @ts-ignore\ntypeof Uint8Array.from([]).toHex === 'function' && typeof Uint8Array.fromHex === 'function')();\n// Array where index 0xf0 (240) is mapped to string 'f0'\nconst hexes = /* @__PURE__ */ Array.from({ length: 256 }, (_, i) => i.toString(16).padStart(2, '0'));\n/**\n * Convert byte array to hex string. Uses built-in function, when available.\n * @example bytesToHex(Uint8Array.from([0xca, 0xfe, 0x01, 0x23])) // 'cafe0123'\n */\nexport function bytesToHex(bytes) {\n abytes(bytes);\n // @ts-ignore\n if (hasHexBuiltin)\n return bytes.toHex();\n // pre-caching improves the speed 6x\n let hex = '';\n for (let i = 0; i < bytes.length; i++) {\n hex += hexes[bytes[i]];\n }\n return hex;\n}\n// We use optimized technique to convert hex string to byte array\nconst asciis = { _0: 48, _9: 57, A: 65, F: 70, a: 97, f: 102 };\nfunction asciiToBase16(ch) {\n if (ch >= asciis._0 && ch <= asciis._9)\n return ch - asciis._0; // '2' => 50-48\n if (ch >= asciis.A && ch <= asciis.F)\n return ch - (asciis.A - 10); // 'B' => 66-(65-10)\n if (ch >= asciis.a && ch <= asciis.f)\n return ch - (asciis.a - 10); // 'b' => 98-(97-10)\n return;\n}\n/**\n * Convert hex string to byte array. Uses built-in function, when available.\n * @example hexToBytes('cafe0123') // Uint8Array.from([0xca, 0xfe, 0x01, 0x23])\n */\nexport function hexToBytes(hex) {\n if (typeof hex !== 'string')\n throw new Error('hex string expected, got ' + typeof hex);\n // @ts-ignore\n if (hasHexBuiltin)\n return Uint8Array.fromHex(hex);\n const hl = hex.length;\n const al = hl / 2;\n if (hl % 2)\n throw new Error('hex string expected, got unpadded hex of length ' + hl);\n const array = new Uint8Array(al);\n for (let ai = 0, hi = 0; ai < al; ai++, hi += 2) {\n const n1 = asciiToBase16(hex.charCodeAt(hi));\n const n2 = asciiToBase16(hex.charCodeAt(hi + 1));\n if (n1 === undefined || n2 === undefined) {\n const char = hex[hi] + hex[hi + 1];\n throw new Error('hex string expected, got non-hex character \"' + char + '\" at index ' + hi);\n }\n array[ai] = n1 * 16 + n2; // multiply first octet, e.g. 'a3' => 10*16+3 => 160 + 3 => 163\n }\n return array;\n}\n/**\n * There is no setImmediate in browser and setTimeout is slow.\n * Call of async fn will return Promise, which will be fullfiled only on\n * next scheduler queue processing step and this is exactly what we need.\n */\nexport const nextTick = async () => { };\n/** Returns control to thread each 'tick' ms to avoid blocking. */\nexport async function asyncLoop(iters, tick, cb) {\n let ts = Date.now();\n for (let i = 0; i < iters; i++) {\n cb(i);\n // Date.now() is not monotonic, so in case if clock goes backwards we return return control too\n const diff = Date.now() - ts;\n if (diff >= 0 && diff < tick)\n continue;\n await nextTick();\n ts += diff;\n }\n}\n/**\n * Converts string to bytes using UTF8 encoding.\n * Built-in doesn't validate input to be string: we do the check.\n * @example utf8ToBytes('abc') // Uint8Array.from([97, 98, 99])\n */\nexport function utf8ToBytes(str) {\n if (typeof str !== 'string')\n throw new Error('string expected');\n return new Uint8Array(new TextEncoder().encode(str)); // https://bugzil.la/1681809\n}\n/**\n * Helper for KDFs: consumes uint8array or string.\n * When string is passed, does utf8 decoding, using TextDecoder.\n */\nexport function kdfInputToBytes(data, errorTitle = '') {\n if (typeof data === 'string')\n return utf8ToBytes(data);\n return abytes(data, undefined, errorTitle);\n}\n/** Copies several Uint8Arrays into one. */\nexport function concatBytes(...arrays) {\n let sum = 0;\n for (let i = 0; i < arrays.length; i++) {\n const a = arrays[i];\n abytes(a);\n sum += a.length;\n }\n const res = new Uint8Array(sum);\n for (let i = 0, pad = 0; i < arrays.length; i++) {\n const a = arrays[i];\n res.set(a, pad);\n pad += a.length;\n }\n return res;\n}\n/** Merges default options and passed options. */\nexport function checkOpts(defaults, opts) {\n if (opts !== undefined && {}.toString.call(opts) !== '[object Object]')\n throw new Error('options must be object or undefined');\n const merged = Object.assign(defaults, opts);\n return merged;\n}\n/** Creates function with outputLen, blockLen, create properties from a class constructor. */\nexport function createHasher(hashCons, info = {}) {\n const hashC = (msg, opts) => hashCons(opts).update(msg).digest();\n const tmp = hashCons(undefined);\n hashC.outputLen = tmp.outputLen;\n hashC.blockLen = tmp.blockLen;\n hashC.create = (opts) => hashCons(opts);\n Object.assign(hashC, info);\n return Object.freeze(hashC);\n}\n/** Cryptographically secure PRNG. Uses internal OS-level `crypto.getRandomValues`. */\nexport function randomBytes(bytesLength = 32) {\n const cr = typeof globalThis === 'object' ? globalThis.crypto : null;\n if (typeof cr?.getRandomValues !== 'function')\n throw new Error('crypto.getRandomValues must be defined');\n return cr.getRandomValues(new Uint8Array(bytesLength));\n}\n/** Creates OID opts for NIST hashes, with prefix 06 09 60 86 48 01 65 03 04 02. */\nexport const oidNist = (suffix) => ({\n oid: Uint8Array.from([0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, suffix]),\n});\n//# sourceMappingURL=utils.js.map","/**\n * Internal Merkle-Damgard hash utils.\n * @module\n */\nimport { abytes, aexists, aoutput, clean, createView } from \"./utils.js\";\n/** Choice: a ? b : c */\nexport function Chi(a, b, c) {\n return (a & b) ^ (~a & c);\n}\n/** Majority function, true if any two inputs is true. */\nexport function Maj(a, b, c) {\n return (a & b) ^ (a & c) ^ (b & c);\n}\n/**\n * Merkle-Damgard hash construction base class.\n * Could be used to create MD5, RIPEMD, SHA1, SHA2.\n */\nexport class HashMD {\n blockLen;\n outputLen;\n padOffset;\n isLE;\n // For partial updates less than block size\n buffer;\n view;\n finished = false;\n length = 0;\n pos = 0;\n destroyed = false;\n constructor(blockLen, outputLen, padOffset, isLE) {\n this.blockLen = blockLen;\n this.outputLen = outputLen;\n this.padOffset = padOffset;\n this.isLE = isLE;\n this.buffer = new Uint8Array(blockLen);\n this.view = createView(this.buffer);\n }\n update(data) {\n aexists(this);\n abytes(data);\n const { view, buffer, blockLen } = this;\n const len = data.length;\n for (let pos = 0; pos < len;) {\n const take = Math.min(blockLen - this.pos, len - pos);\n // Fast path: we have at least one block in input, cast it to view and process\n if (take === blockLen) {\n const dataView = createView(data);\n for (; blockLen <= len - pos; pos += blockLen)\n this.process(dataView, pos);\n continue;\n }\n buffer.set(data.subarray(pos, pos + take), this.pos);\n this.pos += take;\n pos += take;\n if (this.pos === blockLen) {\n this.process(view, 0);\n this.pos = 0;\n }\n }\n this.length += data.length;\n this.roundClean();\n return this;\n }\n digestInto(out) {\n aexists(this);\n aoutput(out, this);\n this.finished = true;\n // Padding\n // We can avoid allocation of buffer for padding completely if it\n // was previously not allocated here. But it won't change performance.\n const { buffer, view, blockLen, isLE } = this;\n let { pos } = this;\n // append the bit '1' to the message\n buffer[pos++] = 0b10000000;\n clean(this.buffer.subarray(pos));\n // we have less than padOffset left in buffer, so we cannot put length in\n // current block, need process it and pad again\n if (this.padOffset > blockLen - pos) {\n this.process(view, 0);\n pos = 0;\n }\n // Pad until full block byte with zeros\n for (let i = pos; i < blockLen; i++)\n buffer[i] = 0;\n // Note: sha512 requires length to be 128bit integer, but length in JS will overflow before that\n // You need to write around 2 exabytes (u64_max / 8 / (1024**6)) for this to happen.\n // So we just write lowest 64 bits of that value.\n view.setBigUint64(blockLen - 8, BigInt(this.length * 8), isLE);\n this.process(view, 0);\n const oview = createView(out);\n const len = this.outputLen;\n // NOTE: we do division by 4 later, which must be fused in single op with modulo by JIT\n if (len % 4)\n throw new Error('_sha2: outputLen must be aligned to 32bit');\n const outLen = len / 4;\n const state = this.get();\n if (outLen > state.length)\n throw new Error('_sha2: outputLen bigger than state');\n for (let i = 0; i < outLen; i++)\n oview.setUint32(4 * i, state[i], isLE);\n }\n digest() {\n const { buffer, outputLen } = this;\n this.digestInto(buffer);\n const res = buffer.slice(0, outputLen);\n this.destroy();\n return res;\n }\n _cloneInto(to) {\n to ||= new this.constructor();\n to.set(...this.get());\n const { blockLen, buffer, length, finished, destroyed, pos } = this;\n to.destroyed = destroyed;\n to.finished = finished;\n to.length = length;\n to.pos = pos;\n if (length % blockLen)\n to.buffer.set(buffer);\n return to;\n }\n clone() {\n return this._cloneInto();\n }\n}\n/**\n * Initial SHA-2 state: fractional parts of square roots of first 16 primes 2..53.\n * Check out `test/misc/sha2-gen-iv.js` for recomputation guide.\n */\n/** Initial SHA256 state. Bits 0..32 of frac part of sqrt of primes 2..19 */\nexport const SHA256_IV = /* @__PURE__ */ Uint32Array.from([\n 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19,\n]);\n/** Initial SHA224 state. Bits 32..64 of frac part of sqrt of primes 23..53 */\nexport const SHA224_IV = /* @__PURE__ */ Uint32Array.from([\n 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939, 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4,\n]);\n/** Initial SHA384 state. Bits 0..64 of frac part of sqrt of primes 23..53 */\nexport const SHA384_IV = /* @__PURE__ */ Uint32Array.from([\n 0xcbbb9d5d, 0xc1059ed8, 0x629a292a, 0x367cd507, 0x9159015a, 0x3070dd17, 0x152fecd8, 0xf70e5939,\n 0x67332667, 0xffc00b31, 0x8eb44a87, 0x68581511, 0xdb0c2e0d, 0x64f98fa7, 0x47b5481d, 0xbefa4fa4,\n]);\n/** Initial SHA512 state. Bits 0..64 of frac part of sqrt of primes 2..19 */\nexport const SHA512_IV = /* @__PURE__ */ Uint32Array.from([\n 0x6a09e667, 0xf3bcc908, 0xbb67ae85, 0x84caa73b, 0x3c6ef372, 0xfe94f82b, 0xa54ff53a, 0x5f1d36f1,\n 0x510e527f, 0xade682d1, 0x9b05688c, 0x2b3e6c1f, 0x1f83d9ab, 0xfb41bd6b, 0x5be0cd19, 0x137e2179,\n]);\n//# sourceMappingURL=_md.js.map","/**\n * SHA2 hash function. A.k.a. sha256, sha384, sha512, sha512_224, sha512_256.\n * SHA256 is the fastest hash implementable in JS, even faster than Blake3.\n * Check out [RFC 4634](https://www.rfc-editor.org/rfc/rfc4634) and\n * [FIPS 180-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf).\n * @module\n */\nimport { Chi, HashMD, Maj, SHA224_IV, SHA256_IV, SHA384_IV, SHA512_IV } from \"./_md.js\";\nimport * as u64 from \"./_u64.js\";\nimport { clean, createHasher, oidNist, rotr } from \"./utils.js\";\n/**\n * Round constants:\n * First 32 bits of fractional parts of the cube roots of the first 64 primes 2..311)\n */\n// prettier-ignore\nconst SHA256_K = /* @__PURE__ */ Uint32Array.from([\n 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\n 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\n 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\n 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\n 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\n 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\n 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\n 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2\n]);\n/** Reusable temporary buffer. \"W\" comes straight from spec. */\nconst SHA256_W = /* @__PURE__ */ new Uint32Array(64);\n/** Internal 32-byte base SHA2 hash class. */\nclass SHA2_32B extends HashMD {\n constructor(outputLen) {\n super(64, outputLen, 8, false);\n }\n get() {\n const { A, B, C, D, E, F, G, H } = this;\n return [A, B, C, D, E, F, G, H];\n }\n // prettier-ignore\n set(A, B, C, D, E, F, G, H) {\n this.A = A | 0;\n this.B = B | 0;\n this.C = C | 0;\n this.D = D | 0;\n this.E = E | 0;\n this.F = F | 0;\n this.G = G | 0;\n this.H = H | 0;\n }\n process(view, offset) {\n // Extend the first 16 words into the remaining 48 words w[16..63] of the message schedule array\n for (let i = 0; i < 16; i++, offset += 4)\n SHA256_W[i] = view.getUint32(offset, false);\n for (let i = 16; i < 64; i++) {\n const W15 = SHA256_W[i - 15];\n const W2 = SHA256_W[i - 2];\n const s0 = rotr(W15, 7) ^ rotr(W15, 18) ^ (W15 >>> 3);\n const s1 = rotr(W2, 17) ^ rotr(W2, 19) ^ (W2 >>> 10);\n SHA256_W[i] = (s1 + SHA256_W[i - 7] + s0 + SHA256_W[i - 16]) | 0;\n }\n // Compression function main loop, 64 rounds\n let { A, B, C, D, E, F, G, H } = this;\n for (let i = 0; i < 64; i++) {\n const sigma1 = rotr(E, 6) ^ rotr(E, 11) ^ rotr(E, 25);\n const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;\n const sigma0 = rotr(A, 2) ^ rotr(A, 13) ^ rotr(A, 22);\n const T2 = (sigma0 + Maj(A, B, C)) | 0;\n H = G;\n G = F;\n F = E;\n E = (D + T1) | 0;\n D = C;\n C = B;\n B = A;\n A = (T1 + T2) | 0;\n }\n // Add the compressed chunk to the current hash value\n A = (A + this.A) | 0;\n B = (B + this.B) | 0;\n C = (C + this.C) | 0;\n D = (D + this.D) | 0;\n E = (E + this.E) | 0;\n F = (F + this.F) | 0;\n G = (G + this.G) | 0;\n H = (H + this.H) | 0;\n this.set(A, B, C, D, E, F, G, H);\n }\n roundClean() {\n clean(SHA256_W);\n }\n destroy() {\n this.set(0, 0, 0, 0, 0, 0, 0, 0);\n clean(this.buffer);\n }\n}\n/** Internal SHA2-256 hash class. */\nexport class _SHA256 extends SHA2_32B {\n // We cannot use array here since array allows indexing by variable\n // which means optimizer/compiler cannot use registers.\n A = SHA256_IV[0] | 0;\n B = SHA256_IV[1] | 0;\n C = SHA256_IV[2] | 0;\n D = SHA256_IV[3] | 0;\n E = SHA256_IV[4] | 0;\n F = SHA256_IV[5] | 0;\n G = SHA256_IV[6] | 0;\n H = SHA256_IV[7] | 0;\n constructor() {\n super(32);\n }\n}\n/** Internal SHA2-224 hash class. */\nexport class _SHA224 extends SHA2_32B {\n A = SHA224_IV[0] | 0;\n B = SHA224_IV[1] | 0;\n C = SHA224_IV[2] | 0;\n D = SHA224_IV[3] | 0;\n E = SHA224_IV[4] | 0;\n F = SHA224_IV[5] | 0;\n G = SHA224_IV[6] | 0;\n H = SHA224_IV[7] | 0;\n constructor() {\n super(28);\n }\n}\n// SHA2-512 is slower than sha256 in js because u64 operations are slow.\n// Round contants\n// First 32 bits of the fractional parts of the cube roots of the first 80 primes 2..409\n// prettier-ignore\nconst K512 = /* @__PURE__ */ (() => u64.split([\n '0x428a2f98d728ae22', '0x7137449123ef65cd', '0xb5c0fbcfec4d3b2f', '0xe9b5dba58189dbbc',\n '0x3956c25bf348b538', '0x59f111f1b605d019', '0x923f82a4af194f9b', '0xab1c5ed5da6d8118',\n '0xd807aa98a3030242', '0x12835b0145706fbe', '0x243185be4ee4b28c', '0x550c7dc3d5ffb4e2',\n '0x72be5d74f27b896f', '0x80deb1fe3b1696b1', '0x9bdc06a725c71235', '0xc19bf174cf692694',\n '0xe49b69c19ef14ad2', '0xefbe4786384f25e3', '0x0fc19dc68b8cd5b5', '0x240ca1cc77ac9c65',\n '0x2de92c6f592b0275', '0x4a7484aa6ea6e483', '0x5cb0a9dcbd41fbd4', '0x76f988da831153b5',\n '0x983e5152ee66dfab', '0xa831c66d2db43210', '0xb00327c898fb213f', '0xbf597fc7beef0ee4',\n '0xc6e00bf33da88fc2', '0xd5a79147930aa725', '0x06ca6351e003826f', '0x142929670a0e6e70',\n '0x27b70a8546d22ffc', '0x2e1b21385c26c926', '0x4d2c6dfc5ac42aed', '0x53380d139d95b3df',\n '0x650a73548baf63de', '0x766a0abb3c77b2a8', '0x81c2c92e47edaee6', '0x92722c851482353b',\n '0xa2bfe8a14cf10364', '0xa81a664bbc423001', '0xc24b8b70d0f89791', '0xc76c51a30654be30',\n '0xd192e819d6ef5218', '0xd69906245565a910', '0xf40e35855771202a', '0x106aa07032bbd1b8',\n '0x19a4c116b8d2d0c8', '0x1e376c085141ab53', '0x2748774cdf8eeb99', '0x34b0bcb5e19b48a8',\n '0x391c0cb3c5c95a63', '0x4ed8aa4ae3418acb', '0x5b9cca4f7763e373', '0x682e6ff3d6b2b8a3',\n '0x748f82ee5defb2fc', '0x78a5636f43172f60', '0x84c87814a1f0ab72', '0x8cc702081a6439ec',\n '0x90befffa23631e28', '0xa4506cebde82bde9', '0xbef9a3f7b2c67915', '0xc67178f2e372532b',\n '0xca273eceea26619c', '0xd186b8c721c0c207', '0xeada7dd6cde0eb1e', '0xf57d4f7fee6ed178',\n '0x06f067aa72176fba', '0x0a637dc5a2c898a6', '0x113f9804bef90dae', '0x1b710b35131c471b',\n '0x28db77f523047d84', '0x32caab7b40c72493', '0x3c9ebe0a15c9bebc', '0x431d67c49c100d4c',\n '0x4cc5d4becb3e42b6', '0x597f299cfc657e2a', '0x5fcb6fab3ad6faec', '0x6c44198c4a475817'\n].map(n => BigInt(n))))();\nconst SHA512_Kh = /* @__PURE__ */ (() => K512[0])();\nconst SHA512_Kl = /* @__PURE__ */ (() => K512[1])();\n// Reusable temporary buffers\nconst SHA512_W_H = /* @__PURE__ */ new Uint32Array(80);\nconst SHA512_W_L = /* @__PURE__ */ new Uint32Array(80);\n/** Internal 64-byte base SHA2 hash class. */\nclass SHA2_64B extends HashMD {\n constructor(outputLen) {\n super(128, outputLen, 16, false);\n }\n // prettier-ignore\n get() {\n const { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;\n return [Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl];\n }\n // prettier-ignore\n set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl) {\n this.Ah = Ah | 0;\n this.Al = Al | 0;\n this.Bh = Bh | 0;\n this.Bl = Bl | 0;\n this.Ch = Ch | 0;\n this.Cl = Cl | 0;\n this.Dh = Dh | 0;\n this.Dl = Dl | 0;\n this.Eh = Eh | 0;\n this.El = El | 0;\n this.Fh = Fh | 0;\n this.Fl = Fl | 0;\n this.Gh = Gh | 0;\n this.Gl = Gl | 0;\n this.Hh = Hh | 0;\n this.Hl = Hl | 0;\n }\n process(view, offset) {\n // Extend the first 16 words into the remaining 64 words w[16..79] of the message schedule array\n for (let i = 0; i < 16; i++, offset += 4) {\n SHA512_W_H[i] = view.getUint32(offset);\n SHA512_W_L[i] = view.getUint32((offset += 4));\n }\n for (let i = 16; i < 80; i++) {\n // s0 := (w[i-15] rightrotate 1) xor (w[i-15] rightrotate 8) xor (w[i-15] rightshift 7)\n const W15h = SHA512_W_H[i - 15] | 0;\n const W15l = SHA512_W_L[i - 15] | 0;\n const s0h = u64.rotrSH(W15h, W15l, 1) ^ u64.rotrSH(W15h, W15l, 8) ^ u64.shrSH(W15h, W15l, 7);\n const s0l = u64.rotrSL(W15h, W15l, 1) ^ u64.rotrSL(W15h, W15l, 8) ^ u64.shrSL(W15h, W15l, 7);\n // s1 := (w[i-2] rightrotate 19) xor (w[i-2] rightrotate 61) xor (w[i-2] rightshift 6)\n const W2h = SHA512_W_H[i - 2] | 0;\n const W2l = SHA512_W_L[i - 2] | 0;\n const s1h = u64.rotrSH(W2h, W2l, 19) ^ u64.rotrBH(W2h, W2l, 61) ^ u64.shrSH(W2h, W2l, 6);\n const s1l = u64.rotrSL(W2h, W2l, 19) ^ u64.rotrBL(W2h, W2l, 61) ^ u64.shrSL(W2h, W2l, 6);\n // SHA256_W[i] = s0 + s1 + SHA256_W[i - 7] + SHA256_W[i - 16];\n const SUMl = u64.add4L(s0l, s1l, SHA512_W_L[i - 7], SHA512_W_L[i - 16]);\n const SUMh = u64.add4H(SUMl, s0h, s1h, SHA512_W_H[i - 7], SHA512_W_H[i - 16]);\n SHA512_W_H[i] = SUMh | 0;\n SHA512_W_L[i] = SUMl | 0;\n }\n let { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;\n // Compression function main loop, 80 rounds\n for (let i = 0; i < 80; i++) {\n // S1 := (e rightrotate 14) xor (e rightrotate 18) xor (e rightrotate 41)\n const sigma1h = u64.rotrSH(Eh, El, 14) ^ u64.rotrSH(Eh, El, 18) ^ u64.rotrBH(Eh, El, 41);\n const sigma1l = u64.rotrSL(Eh, El, 14) ^ u64.rotrSL(Eh, El, 18) ^ u64.rotrBL(Eh, El, 41);\n //const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;\n const CHIh = (Eh & Fh) ^ (~Eh & Gh);\n const CHIl = (El & Fl) ^ (~El & Gl);\n // T1 = H + sigma1 + Chi(E, F, G) + SHA512_K[i] + SHA512_W[i]\n // prettier-ignore\n const T1ll = u64.add5L(Hl, sigma1l, CHIl, SHA512_Kl[i], SHA512_W_L[i]);\n const T1h = u64.add5H(T1ll, Hh, sigma1h, CHIh, SHA512_Kh[i], SHA512_W_H[i]);\n const T1l = T1ll | 0;\n // S0 := (a rightrotate 28) xor (a rightrotate 34) xor (a rightrotate 39)\n const sigma0h = u64.rotrSH(Ah, Al, 28) ^ u64.rotrBH(Ah, Al, 34) ^ u64.rotrBH(Ah, Al, 39);\n const sigma0l = u64.rotrSL(Ah, Al, 28) ^ u64.rotrBL(Ah, Al, 34) ^ u64.rotrBL(Ah, Al, 39);\n const MAJh = (Ah & Bh) ^ (Ah & Ch) ^ (Bh & Ch);\n const MAJl = (Al & Bl) ^ (Al & Cl) ^ (Bl & Cl);\n Hh = Gh | 0;\n Hl = Gl | 0;\n Gh = Fh | 0;\n Gl = Fl | 0;\n Fh = Eh | 0;\n Fl = El | 0;\n ({ h: Eh, l: El } = u64.add(Dh | 0, Dl | 0, T1h | 0, T1l | 0));\n Dh = Ch | 0;\n Dl = Cl | 0;\n Ch = Bh | 0;\n Cl = Bl | 0;\n Bh = Ah | 0;\n Bl = Al | 0;\n const All = u64.add3L(T1l, sigma0l, MAJl);\n Ah = u64.add3H(All, T1h, sigma0h, MAJh);\n Al = All | 0;\n }\n // Add the compressed chunk to the current hash value\n ({ h: Ah, l: Al } = u64.add(this.Ah | 0, this.Al | 0, Ah | 0, Al | 0));\n ({ h: Bh, l: Bl } = u64.add(this.Bh | 0, this.Bl | 0, Bh | 0, Bl | 0));\n ({ h: Ch, l: Cl } = u64.add(this.Ch | 0, this.Cl | 0, Ch | 0, Cl | 0));\n ({ h: Dh, l: Dl } = u64.add(this.Dh | 0, this.Dl | 0, Dh | 0, Dl | 0));\n ({ h: Eh, l: El } = u64.add(this.Eh | 0, this.El | 0, Eh | 0, El | 0));\n ({ h: Fh, l: Fl } = u64.add(this.Fh | 0, this.Fl | 0, Fh | 0, Fl | 0));\n ({ h: Gh, l: Gl } = u64.add(this.Gh | 0, this.Gl | 0, Gh | 0, Gl | 0));\n ({ h: Hh, l: Hl } = u64.add(this.Hh | 0, this.Hl | 0, Hh | 0, Hl | 0));\n this.set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl);\n }\n roundClean() {\n clean(SHA512_W_H, SHA512_W_L);\n }\n destroy() {\n clean(this.buffer);\n this.set(0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0);\n }\n}\n/** Internal SHA2-512 hash class. */\nexport class _SHA512 extends SHA2_64B {\n Ah = SHA512_IV[0] | 0;\n Al = SHA512_IV[1] | 0;\n Bh = SHA512_IV[2] | 0;\n Bl = SHA512_IV[3] | 0;\n Ch = SHA512_IV[4] | 0;\n Cl = SHA512_IV[5] | 0;\n Dh = SHA512_IV[6] | 0;\n Dl = SHA512_IV[7] | 0;\n Eh = SHA512_IV[8] | 0;\n El = SHA512_IV[9] | 0;\n Fh = SHA512_IV[10] | 0;\n Fl = SHA512_IV[11] | 0;\n Gh = SHA512_IV[12] | 0;\n Gl = SHA512_IV[13] | 0;\n Hh = SHA512_IV[14] | 0;\n Hl = SHA512_IV[15] | 0;\n constructor() {\n super(64);\n }\n}\n/** Internal SHA2-384 hash class. */\nexport class _SHA384 extends SHA2_64B {\n Ah = SHA384_IV[0] | 0;\n Al = SHA384_IV[1] | 0;\n Bh = SHA384_IV[2] | 0;\n Bl = SHA384_IV[3] | 0;\n Ch = SHA384_IV[4] | 0;\n Cl = SHA384_IV[5] | 0;\n Dh = SHA384_IV[6] | 0;\n Dl = SHA384_IV[7] | 0;\n Eh = SHA384_IV[8] | 0;\n El = SHA384_IV[9] | 0;\n Fh = SHA384_IV[10] | 0;\n Fl = SHA384_IV[11] | 0;\n Gh = SHA384_IV[12] | 0;\n Gl = SHA384_IV[13] | 0;\n Hh = SHA384_IV[14] | 0;\n Hl = SHA384_IV[15] | 0;\n constructor() {\n super(48);\n }\n}\n/**\n * Truncated SHA512/256 and SHA512/224.\n * SHA512_IV is XORed with 0xa5a5a5a5a5a5a5a5, then used as \"intermediary\" IV of SHA512/t.\n * Then t hashes string to produce result IV.\n * See `test/misc/sha2-gen-iv.js`.\n */\n/** SHA512/224 IV */\nconst T224_IV = /* @__PURE__ */ Uint32Array.from([\n 0x8c3d37c8, 0x19544da2, 0x73e19966, 0x89dcd4d6, 0x1dfab7ae, 0x32ff9c82, 0x679dd514, 0x582f9fcf,\n 0x0f6d2b69, 0x7bd44da8, 0x77e36f73, 0x04c48942, 0x3f9d85a8, 0x6a1d36c8, 0x1112e6ad, 0x91d692a1,\n]);\n/** SHA512/256 IV */\nconst T256_IV = /* @__PURE__ */ Uint32Array.from([\n 0x22312194, 0xfc2bf72c, 0x9f555fa3, 0xc84c64c2, 0x2393b86b, 0x6f53b151, 0x96387719, 0x5940eabd,\n 0x96283ee2, 0xa88effe3, 0xbe5e1e25, 0x53863992, 0x2b0199fc, 0x2c85b8aa, 0x0eb72ddc, 0x81c52ca2,\n]);\n/** Internal SHA2-512/224 hash class. */\nexport class _SHA512_224 extends SHA2_64B {\n Ah = T224_IV[0] | 0;\n Al = T224_IV[1] | 0;\n Bh = T224_IV[2] | 0;\n Bl = T224_IV[3] | 0;\n Ch = T224_IV[4] | 0;\n Cl = T224_IV[5] | 0;\n Dh = T224_IV[6] | 0;\n Dl = T224_IV[7] | 0;\n Eh = T224_IV[8] | 0;\n El = T224_IV[9] | 0;\n Fh = T224_IV[10] | 0;\n Fl = T224_IV[11] | 0;\n Gh = T224_IV[12] | 0;\n Gl = T224_IV[13] | 0;\n Hh = T224_IV[14] | 0;\n Hl = T224_IV[15] | 0;\n constructor() {\n super(28);\n }\n}\n/** Internal SHA2-512/256 hash class. */\nexport class _SHA512_256 extends SHA2_64B {\n Ah = T256_IV[0] | 0;\n Al = T256_IV[1] | 0;\n Bh = T256_IV[2] | 0;\n Bl = T256_IV[3] | 0;\n Ch = T256_IV[4] | 0;\n Cl = T256_IV[5] | 0;\n Dh = T256_IV[6] | 0;\n Dl = T256_IV[7] | 0;\n Eh = T256_IV[8] | 0;\n El = T256_IV[9] | 0;\n Fh = T256_IV[10] | 0;\n Fl = T256_IV[11] | 0;\n Gh = T256_IV[12] | 0;\n Gl = T256_IV[13] | 0;\n Hh = T256_IV[14] | 0;\n Hl = T256_IV[15] | 0;\n constructor() {\n super(32);\n }\n}\n/**\n * SHA2-256 hash function from RFC 4634. In JS it's the fastest: even faster than Blake3. Some info:\n *\n * - Trying 2^128 hashes would get 50% chance of collision, using birthday attack.\n * - BTC network is doing 2^70 hashes/sec (2^95 hashes/year) as per 2025.\n * - Each sha256 hash is executing 2^18 bit operations.\n * - Good 2024 ASICs can do 200Th/sec with 3500 watts of power, corresponding to 2^36 hashes/joule.\n */\nexport const sha256 = /* @__PURE__ */ createHasher(() => new _SHA256(), \n/* @__PURE__ */ oidNist(0x01));\n/** SHA2-224 hash function from RFC 4634 */\nexport const sha224 = /* @__PURE__ */ createHasher(() => new _SHA224(), \n/* @__PURE__ */ oidNist(0x04));\n/** SHA2-512 hash function from RFC 4634. */\nexport const sha512 = /* @__PURE__ */ createHasher(() => new _SHA512(), \n/* @__PURE__ */ oidNist(0x03));\n/** SHA2-384 hash function from RFC 4634. */\nexport const sha384 = /* @__PURE__ */ createHasher(() => new _SHA384(), \n/* @__PURE__ */ oidNist(0x02));\n/**\n * SHA2-512/256 \"truncated\" hash function, with improved resistance to length extension attacks.\n * See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).\n */\nexport const sha512_256 = /* @__PURE__ */ createHasher(() => new _SHA512_256(), \n/* @__PURE__ */ oidNist(0x06));\n/**\n * SHA2-512/224 \"truncated\" hash function, with improved resistance to length extension attacks.\n * See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).\n */\nexport const sha512_224 = /* @__PURE__ */ createHasher(() => new _SHA512_224(), \n/* @__PURE__ */ oidNist(0x05));\n//# sourceMappingURL=sha2.js.map","/**\n * Hex, bytes and number utilities.\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { abytes as abytes_, anumber, bytesToHex as bytesToHex_, concatBytes as concatBytes_, hexToBytes as hexToBytes_, } from '@noble/hashes/utils.js';\nexport { abytes, anumber, bytesToHex, concatBytes, hexToBytes, isBytes, randomBytes, } from '@noble/hashes/utils.js';\nconst _0n = /* @__PURE__ */ BigInt(0);\nconst _1n = /* @__PURE__ */ BigInt(1);\nexport function abool(value, title = '') {\n if (typeof value !== 'boolean') {\n const prefix = title && `\"${title}\" `;\n throw new Error(prefix + 'expected boolean, got type=' + typeof value);\n }\n return value;\n}\n// Used in weierstrass, der\nfunction abignumber(n) {\n if (typeof n === 'bigint') {\n if (!isPosBig(n))\n throw new Error('positive bigint expected, got ' + n);\n }\n else\n anumber(n);\n return n;\n}\nexport function asafenumber(value, title = '') {\n if (!Number.isSafeInteger(value)) {\n const prefix = title && `\"${title}\" `;\n throw new Error(prefix + 'expected safe integer, got type=' + typeof value);\n }\n}\nexport function numberToHexUnpadded(num) {\n const hex = abignumber(num).toString(16);\n return hex.length & 1 ? '0' + hex : hex;\n}\nexport function hexToNumber(hex) {\n if (typeof hex !== 'string')\n throw new Error('hex string expected, got ' + typeof hex);\n return hex === '' ? _0n : BigInt('0x' + hex); // Big Endian\n}\n// BE: Big Endian, LE: Little Endian\nexport function bytesToNumberBE(bytes) {\n return hexToNumber(bytesToHex_(bytes));\n}\nexport function bytesToNumberLE(bytes) {\n return hexToNumber(bytesToHex_(copyBytes(abytes_(bytes)).reverse()));\n}\nexport function numberToBytesBE(n, len) {\n anumber(len);\n n = abignumber(n);\n const res = hexToBytes_(n.toString(16).padStart(len * 2, '0'));\n if (res.length !== len)\n throw new Error('number too large');\n return res;\n}\nexport function numberToBytesLE(n, len) {\n return numberToBytesBE(n, len).reverse();\n}\n// Unpadded, rarely used\nexport function numberToVarBytesBE(n) {\n return hexToBytes_(numberToHexUnpadded(abignumber(n)));\n}\n// Compares 2 u8a-s in kinda constant time\nexport function equalBytes(a, b) {\n if (a.length !== b.length)\n return false;\n let diff = 0;\n for (let i = 0; i < a.length; i++)\n diff |= a[i] ^ b[i];\n return diff === 0;\n}\n/**\n * Copies Uint8Array. We can't use u8a.slice(), because u8a can be Buffer,\n * and Buffer#slice creates mutable copy. Never use Buffers!\n */\nexport function copyBytes(bytes) {\n return Uint8Array.from(bytes);\n}\n/**\n * Decodes 7-bit ASCII string to Uint8Array, throws on non-ascii symbols\n * Should be safe to use for things expected to be ASCII.\n * Returns exact same result as `TextEncoder` for ASCII or throws.\n */\nexport function asciiToBytes(ascii) {\n return Uint8Array.from(ascii, (c, i) => {\n const charCode = c.charCodeAt(0);\n if (c.length !== 1 || charCode > 127) {\n throw new Error(`string contains non-ASCII character \"${ascii[i]}\" with code ${charCode} at position ${i}`);\n }\n return charCode;\n });\n}\n// Is positive bigint\nconst isPosBig = (n) => typeof n === 'bigint' && _0n <= n;\nexport function inRange(n, min, max) {\n return isPosBig(n) && isPosBig(min) && isPosBig(max) && min <= n && n < max;\n}\n/**\n * Asserts min <= n < max. NOTE: It's < max and not <= max.\n * @example\n * aInRange('x', x, 1n, 256n); // would assume x is in (1n..255n)\n */\nexport function aInRange(title, n, min, max) {\n // Why min <= n < max and not a (min < n < max) OR b (min <= n <= max)?\n // consider P=256n, min=0n, max=P\n // - a for min=0 would require -1: `inRange('x', x, -1n, P)`\n // - b would commonly require subtraction: `inRange('x', x, 0n, P - 1n)`\n // - our way is the cleanest: `inRange('x', x, 0n, P)\n if (!inRange(n, min, max))\n throw new Error('expected valid ' + title + ': ' + min + ' <= n < ' + max + ', got ' + n);\n}\n// Bit operations\n/**\n * Calculates amount of bits in a bigint.\n * Same as `n.toString(2).length`\n * TODO: merge with nLength in modular\n */\nexport function bitLen(n) {\n let len;\n for (len = 0; n > _0n; n >>= _1n, len += 1)\n ;\n return len;\n}\n/**\n * Gets single bit at position.\n * NOTE: first bit position is 0 (same as arrays)\n * Same as `!!+Array.from(n.toString(2)).reverse()[pos]`\n */\nexport function bitGet(n, pos) {\n return (n >> BigInt(pos)) & _1n;\n}\n/**\n * Sets single bit at position.\n */\nexport function bitSet(n, pos, value) {\n return n | ((value ? _1n : _0n) << BigInt(pos));\n}\n/**\n * Calculate mask for N bits. Not using ** operator with bigints because of old engines.\n * Same as BigInt(`0b${Array(i).fill('1').join('')}`)\n */\nexport const bitMask = (n) => (_1n << BigInt(n)) - _1n;\n/**\n * Minimal HMAC-DRBG from NIST 800-90 for RFC6979 sigs.\n * @returns function that will call DRBG until 2nd arg returns something meaningful\n * @example\n * const drbg = createHmacDRBG<Key>(32, 32, hmac);\n * drbg(seed, bytesToKey); // bytesToKey must return Key or undefined\n */\nexport function createHmacDrbg(hashLen, qByteLen, hmacFn) {\n anumber(hashLen, 'hashLen');\n anumber(qByteLen, 'qByteLen');\n if (typeof hmacFn !== 'function')\n throw new Error('hmacFn must be a function');\n const u8n = (len) => new Uint8Array(len); // creates Uint8Array\n const NULL = Uint8Array.of();\n const byte0 = Uint8Array.of(0x00);\n const byte1 = Uint8Array.of(0x01);\n const _maxDrbgIters = 1000;\n // Step B, Step C: set hashLen to 8*ceil(hlen/8)\n let v = u8n(hashLen); // Minimal non-full-spec HMAC-DRBG from NIST 800-90 for RFC6979 sigs.\n let k = u8n(hashLen); // Steps B and C of RFC6979 3.2: set hashLen, in our case always same\n let i = 0; // Iterations counter, will throw when over 1000\n const reset = () => {\n v.fill(1);\n k.fill(0);\n i = 0;\n };\n const h = (...msgs) => hmacFn(k, concatBytes_(v, ...msgs)); // hmac(k)(v, ...values)\n const reseed = (seed = NULL) => {\n // HMAC-DRBG reseed() function. Steps D-G\n k = h(byte0, seed); // k = hmac(k || v || 0x00 || seed)\n v = h(); // v = hmac(k || v)\n if (seed.length === 0)\n return;\n k = h(byte1, seed); // k = hmac(k || v || 0x01 || seed)\n v = h(); // v = hmac(k || v)\n };\n const gen = () => {\n // HMAC-DRBG generate() function\n if (i++ >= _maxDrbgIters)\n throw new Error('drbg: tried max amount of iterations');\n let len = 0;\n const out = [];\n while (len < qByteLen) {\n v = h();\n const sl = v.slice();\n out.push(sl);\n len += v.length;\n }\n return concatBytes_(...out);\n };\n const genUntil = (seed, pred) => {\n reset();\n reseed(seed); // Steps D-G\n let res = undefined; // Step H: grind until k is in [1..n-1]\n while (!(res = pred(gen())))\n reseed();\n reset();\n return res;\n };\n return genUntil;\n}\nexport function validateObject(object, fields = {}, optFields = {}) {\n if (!object || typeof object !== 'object')\n throw new Error('expected valid options object');\n function checkField(fieldName, expectedType, isOpt) {\n const val = object[fieldName];\n if (isOpt && val === undefined)\n return;\n const current = typeof val;\n if (current !== expectedType || val === null)\n throw new Error(`param \"${fieldName}\" is invalid: expected ${expectedType}, got ${current}`);\n }\n const iter = (f, isOpt) => Object.entries(f).forEach(([k, v]) => checkField(k, v, isOpt));\n iter(fields, false);\n iter(optFields, true);\n}\n/**\n * throws not implemented error\n */\nexport const notImplemented = () => {\n throw new Error('not implemented');\n};\n/**\n * Memoizes (caches) computation result.\n * Uses WeakMap: the value is going auto-cleaned by GC after last reference is removed.\n */\nexport function memoized(fn) {\n const map = new WeakMap();\n return (arg, ...args) => {\n const val = map.get(arg);\n if (val !== undefined)\n return val;\n const computed = fn(arg, ...args);\n map.set(arg, computed);\n return computed;\n };\n}\n//# sourceMappingURL=utils.js.map","/**\n * Utils for modular division and fields.\n * Field over 11 is a finite (Galois) field is integer number operations `mod 11`.\n * There is no division: it is replaced by modular multiplicative inverse.\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { abytes, anumber, bytesToNumberBE, bytesToNumberLE, numberToBytesBE, numberToBytesLE, validateObject, } from \"../utils.js\";\n// Numbers aren't used in x25519 / x448 builds\n// prettier-ignore\nconst _0n = /* @__PURE__ */ BigInt(0), _1n = /* @__PURE__ */ BigInt(1), _2n = /* @__PURE__ */ BigInt(2);\n// prettier-ignore\nconst _3n = /* @__PURE__ */ BigInt(3), _4n = /* @__PURE__ */ BigInt(4), _5n = /* @__PURE__ */ BigInt(5);\n// prettier-ignore\nconst _7n = /* @__PURE__ */ BigInt(7), _8n = /* @__PURE__ */ BigInt(8), _9n = /* @__PURE__ */ BigInt(9);\nconst _16n = /* @__PURE__ */ BigInt(16);\n// Calculates a modulo b\nexport function mod(a, b) {\n const result = a % b;\n return result >= _0n ? result : b + result;\n}\n/**\n * Efficiently raise num to power and do modular division.\n * Unsafe in some contexts: uses ladder, so can expose bigint bits.\n * @example\n * pow(2n, 6n, 11n) // 64n % 11n == 9n\n */\nexport function pow(num, power, modulo) {\n return FpPow(Field(modulo), num, power);\n}\n/** Does `x^(2^power)` mod p. `pow2(30, 4)` == `30^(2^4)` */\nexport function pow2(x, power, modulo) {\n let res = x;\n while (power-- > _0n) {\n res *= res;\n res %= modulo;\n }\n return res;\n}\n/**\n * Inverses number over modulo.\n * Implemented using [Euclidean GCD](https://brilliant.org/wiki/extended-euclidean-algorithm/).\n */\nexport function invert(number, modulo) {\n if (number === _0n)\n throw new Error('invert: expected non-zero number');\n if (modulo <= _0n)\n throw new Error('invert: expected positive modulus, got ' + modulo);\n // Fermat's little theorem \"CT-like\" version inv(n) = n^(m-2) mod m is 30x slower.\n let a = mod(number, modulo);\n let b = modulo;\n // prettier-ignore\n let x = _0n, y = _1n, u = _1n, v = _0n;\n while (a !== _0n) {\n // JIT applies optimization if those two lines follow each other\n const q = b / a;\n const r = b % a;\n const m = x - u * q;\n const n = y - v * q;\n // prettier-ignore\n b = a, a = r, x = u, y = v, u = m, v = n;\n }\n const gcd = b;\n if (gcd !== _1n)\n throw new Error('invert: does not exist');\n return mod(x, modulo);\n}\nfunction assertIsSquare(Fp, root, n) {\n if (!Fp.eql(Fp.sqr(root), n))\n throw new Error('Cannot find square root');\n}\n// Not all roots are possible! Example which will throw:\n// const NUM =\n// n = 72057594037927816n;\n// Fp = Field(BigInt('0x1a0111ea397fe69a4b1ba7b6434bacd764774b84f38512bf6730d2a0f6b0f6241eabfffeb153ffffb9feffffffffaaab'));\nfunction sqrt3mod4(Fp, n) {\n const p1div4 = (Fp.ORDER + _1n) / _4n;\n const root = Fp.pow(n, p1div4);\n assertIsSquare(Fp, root, n);\n return root;\n}\nfunction sqrt5mod8(Fp, n) {\n const p5div8 = (Fp.ORDER - _5n) / _8n;\n const n2 = Fp.mul(n, _2n);\n const v = Fp.pow(n2, p5div8);\n const nv = Fp.mul(n, v);\n const i = Fp.mul(Fp.mul(nv, _2n), v);\n const root = Fp.mul(nv, Fp.sub(i, Fp.ONE));\n assertIsSquare(Fp, root, n);\n return root;\n}\n// Based on RFC9380, Kong algorithm\n// prettier-ignore\nfunction sqrt9mod16(P) {\n const Fp_ = Field(P);\n const tn = tonelliShanks(P);\n const c1 = tn(Fp_, Fp_.neg(Fp_.ONE)); // 1. c1 = sqrt(-1) in F, i.e., (c1^2) == -1 in F\n const c2 = tn(Fp_, c1); // 2. c2 = sqrt(c1) in F, i.e., (c2^2) == c1 in F\n const c3 = tn(Fp_, Fp_.neg(c1)); // 3. c3 = sqrt(-c1) in F, i.e., (c3^2) == -c1 in F\n const c4 = (P + _7n) / _16n; // 4. c4 = (q + 7) / 16 # Integer arithmetic\n return (Fp, n) => {\n let tv1 = Fp.pow(n, c4); // 1. tv1 = x^c4\n let tv2 = Fp.mul(tv1, c1); // 2. tv2 = c1 * tv1\n const tv3 = Fp.mul(tv1, c2); // 3. tv3 = c2 * tv1\n const tv4 = Fp.mul(tv1, c3); // 4. tv4 = c3 * tv1\n const e1 = Fp.eql(Fp.sqr(tv2), n); // 5. e1 = (tv2^2) == x\n const e2 = Fp.eql(Fp.sqr(tv3), n); // 6. e2 = (tv3^2) == x\n tv1 = Fp.cmov(tv1, tv2, e1); // 7. tv1 = CMOV(tv1, tv2, e1) # Select tv2 if (tv2^2) == x\n tv2 = Fp.cmov(tv4, tv3, e2); // 8. tv2 = CMOV(tv4, tv3, e2) # Select tv3 if (tv3^2) == x\n const e3 = Fp.eql(Fp.sqr(tv2), n); // 9. e3 = (tv2^2) == x\n const root = Fp.cmov(tv1, tv2, e3); // 10. z = CMOV(tv1, tv2, e3) # Select sqrt from tv1 & tv2\n assertIsSquare(Fp, root, n);\n return root;\n };\n}\n/**\n * Tonelli-Shanks square root search algorithm.\n * 1. https://eprint.iacr.org/2012/685.pdf (page 12)\n * 2. Square Roots from 1; 24, 51, 10 to Dan Shanks\n * @param P field order\n * @returns function that takes field Fp (created from P) and number n\n */\nexport function tonelliShanks(P) {\n // Initialization (precomputation).\n // Caching initialization could boost perf by 7%.\n if (P < _3n)\n throw new Error('sqrt is not defined for small field');\n // Factor P - 1 = Q * 2^S, where Q is odd\n let Q = P - _1n;\n let S = 0;\n while (Q % _2n === _0n) {\n Q /= _2n;\n S++;\n }\n // Find the first quadratic non-residue Z >= 2\n let Z = _2n;\n const _Fp = Field(P);\n while (FpLegendre(_Fp, Z) === 1) {\n // Basic primality test for P. After x iterations, chance of\n // not finding quadratic non-residue is 2^x, so 2^1000.\n if (Z++ > 1000)\n throw new Error('Cannot find square root: probably non-prime P');\n }\n // Fast-path; usually done before Z, but we do \"primality test\".\n if (S === 1)\n return sqrt3mod4;\n // Slow-path\n // TODO: test on Fp2 and others\n let cc = _Fp.pow(Z, Q); // c = z^Q\n const Q1div2 = (Q + _1n) / _2n;\n return function tonelliSlow(Fp, n) {\n if (Fp.is0(n))\n return n;\n // Check if n is a quadratic residue using Legendre symbol\n if (FpLegendre(Fp, n) !== 1)\n throw new Error('Cannot find square root');\n // Initialize variables for the main loop\n let M = S;\n let c = Fp.mul(Fp.ONE, cc); // c = z^Q, move cc from field _Fp into field Fp\n let t = Fp.pow(n, Q); // t = n^Q, first guess at the fudge factor\n let R = Fp.pow(n, Q1div2); // R = n^((Q+1)/2), first guess at the square root\n // Main loop\n // while t != 1\n while (!Fp.eql(t, Fp.ONE)) {\n if (Fp.is0(t))\n return Fp.ZERO; // if t=0 return R=0\n let i = 1;\n // Find the smallest i >= 1 such that t^(2^i) ≡ 1 (mod P)\n let t_tmp = Fp.sqr(t); // t^(2^1)\n while (!Fp.eql(t_tmp, Fp.ONE)) {\n i++;\n t_tmp = Fp.sqr(t_tmp); // t^(2^2)...\n if (i === M)\n throw new Error('Cannot find square root');\n }\n // Calculate the exponent for b: 2^(M - i - 1)\n const exponent = _1n << BigInt(M - i - 1); // bigint is important\n const b = Fp.pow(c, exponent); // b = 2^(M - i - 1)\n // Update variables\n M = i;\n c = Fp.sqr(b); // c = b^2\n t = Fp.mul(t, c); // t = (t * b^2)\n R = Fp.mul(R, b); // R = R*b\n }\n return R;\n };\n}\n/**\n * Square root for a finite field. Will try optimized versions first:\n *\n * 1. P ≡ 3 (mod 4)\n * 2. P ≡ 5 (mod 8)\n * 3. P ≡ 9 (mod 16)\n * 4. Tonelli-Shanks algorithm\n *\n * Different algorithms can give different roots, it is up to user to decide which one they want.\n * For example there is FpSqrtOdd/FpSqrtEven to choice root based on oddness (used for hash-to-curve).\n */\nexport function FpSqrt(P) {\n // P ≡ 3 (mod 4) => √n = n^((P+1)/4)\n if (P % _4n === _3n)\n return sqrt3mod4;\n // P ≡ 5 (mod 8) => Atkin algorithm, page 10 of https://eprint.iacr.org/2012/685.pdf\n if (P % _8n === _5n)\n return sqrt5mod8;\n // P ≡ 9 (mod 16) => Kong algorithm, page 11 of https://eprint.iacr.org/2012/685.pdf (algorithm 4)\n if (P % _16n === _9n)\n return sqrt9mod16(P);\n // Tonelli-Shanks algorithm\n return tonelliShanks(P);\n}\n// Little-endian check for first LE bit (last BE bit);\nexport const isNegativeLE = (num, modulo) => (mod(num, modulo) & _1n) === _1n;\n// prettier-ignore\nconst FIELD_FIELDS = [\n 'create', 'isValid', 'is0', 'neg', 'inv', 'sqrt', 'sqr',\n 'eql', 'add', 'sub', 'mul', 'pow', 'div',\n 'addN', 'subN', 'mulN', 'sqrN'\n];\nexport function validateField(field) {\n const initial = {\n ORDER: 'bigint',\n BYTES: 'number',\n BITS: 'number',\n };\n const opts = FIELD_FIELDS.reduce((map, val) => {\n map[val] = 'function';\n return map;\n }, initial);\n validateObject(field, opts);\n // const max = 16384;\n // if (field.BYTES < 1 || field.BYTES > max) throw new Error('invalid field');\n // if (field.BITS < 1 || field.BITS > 8 * max) throw new Error('invalid field');\n return field;\n}\n// Generic field functions\n/**\n * Same as `pow` but for Fp: non-constant-time.\n * Unsafe in some contexts: uses ladder, so can expose bigint bits.\n */\nexport function FpPow(Fp, num, power) {\n if (power < _0n)\n throw new Error('invalid exponent, negatives unsupported');\n if (power === _0n)\n return Fp.ONE;\n if (power === _1n)\n return num;\n let p = Fp.ONE;\n let d = num;\n while (power > _0n) {\n if (power & _1n)\n p = Fp.mul(p, d);\n d = Fp.sqr(d);\n power >>= _1n;\n }\n return p;\n}\n/**\n * Efficiently invert an array of Field elements.\n * Exception-free. Will return `undefined` for 0 elements.\n * @param passZero map 0 to 0 (instead of undefined)\n */\nexport function FpInvertBatch(Fp, nums, passZero = false) {\n const inverted = new Array(nums.length).fill(passZero ? Fp.ZERO : undefined);\n // Walk from first to last, multiply them by each other MOD p\n const multipliedAcc = nums.reduce((acc, num, i) => {\n if (Fp.is0(num))\n return acc;\n inverted[i] = acc;\n return Fp.mul(acc, num);\n }, Fp.ONE);\n // Invert last element\n const invertedAcc = Fp.inv(multipliedAcc);\n // Walk from last to first, multiply them by inverted each other MOD p\n nums.reduceRight((acc, num, i) => {\n if (Fp.is0(num))\n return acc;\n inverted[i] = Fp.mul(acc, inverted[i]);\n return Fp.mul(acc, num);\n }, invertedAcc);\n return inverted;\n}\n// TODO: remove\nexport function FpDiv(Fp, lhs, rhs) {\n return Fp.mul(lhs, typeof rhs === 'bigint' ? invert(rhs, Fp.ORDER) : Fp.inv(rhs));\n}\n/**\n * Legendre symbol.\n * Legendre constant is used to calculate Legendre symbol (a | p)\n * which denotes the value of a^((p-1)/2) (mod p).\n *\n * * (a | p) ≡ 1 if a is a square (mod p), quadratic residue\n * * (a | p) ≡ -1 if a is not a square (mod p), quadratic non residue\n * * (a | p) ≡ 0 if a ≡ 0 (mod p)\n */\nexport function FpLegendre(Fp, n) {\n // We can use 3rd argument as optional cache of this value\n // but seems unneeded for now. The operation is very fast.\n const p1mod2 = (Fp.ORDER - _1n) / _2n;\n const powered = Fp.pow(n, p1mod2);\n const yes = Fp.eql(powered, Fp.ONE);\n const zero = Fp.eql(powered, Fp.ZERO);\n const no = Fp.eql(powered, Fp.neg(Fp.ONE));\n if (!yes && !zero && !no)\n throw new Error('invalid Legendre symbol result');\n return yes ? 1 : zero ? 0 : -1;\n}\n// This function returns True whenever the value x is a square in the field F.\nexport function FpIsSquare(Fp, n) {\n const l = FpLegendre(Fp, n);\n return l === 1;\n}\n// CURVE.n lengths\nexport function nLength(n, nBitLength) {\n // Bit size, byte size of CURVE.n\n if (nBitLength !== undefined)\n anumber(nBitLength);\n const _nBitLength = nBitLength !== undefined ? nBitLength : n.toString(2).length;\n const nByteLength = Math.ceil(_nBitLength / 8);\n return { nBitLength: _nBitLength, nByteLength };\n}\nclass _Field {\n ORDER;\n BITS;\n BYTES;\n isLE;\n ZERO = _0n;\n ONE = _1n;\n _lengths;\n _sqrt; // cached sqrt\n _mod;\n constructor(ORDER, opts = {}) {\n if (ORDER <= _0n)\n throw new Error('invalid field: expected ORDER > 0, got ' + ORDER);\n let _nbitLength = undefined;\n this.isLE = false;\n if (opts != null && typeof opts === 'object') {\n if (typeof opts.BITS === 'number')\n _nbitLength = opts.BITS;\n if (typeof opts.sqrt === 'function')\n this.sqrt = opts.sqrt;\n if (typeof opts.isLE === 'boolean')\n this.isLE = opts.isLE;\n if (opts.allowedLengths)\n this._lengths = opts.allowedLengths?.slice();\n if (typeof opts.modFromBytes === 'boolean')\n this._mod = opts.modFromBytes;\n }\n const { nBitLength, nByteLength } = nLength(ORDER, _nbitLength);\n if (nByteLength > 2048)\n throw new Error('invalid field: expected ORDER of <= 2048 bytes');\n this.ORDER = ORDER;\n this.BITS = nBitLength;\n this.BYTES = nByteLength;\n this._sqrt = undefined;\n Object.preventExtensions(this);\n }\n create(num) {\n return mod(num, this.ORDER);\n }\n isValid(num) {\n if (typeof num !== 'bigint')\n throw new Error('invalid field element: expected bigint, got ' + typeof num);\n return _0n <= num && num < this.ORDER; // 0 is valid element, but it's not invertible\n }\n is0(num) {\n return num === _0n;\n }\n // is valid and invertible\n isValidNot0(num) {\n return !this.is0(num) && this.isValid(num);\n }\n isOdd(num) {\n return (num & _1n) === _1n;\n }\n neg(num) {\n return mod(-num, this.ORDER);\n }\n eql(lhs, rhs) {\n return lhs === rhs;\n }\n sqr(num) {\n return mod(num * num, this.ORDER);\n }\n add(lhs, rhs) {\n return mod(lhs + rhs, this.ORDER);\n }\n sub(lhs, rhs) {\n return mod(lhs - rhs, this.ORDER);\n }\n mul(lhs, rhs) {\n return mod(lhs * rhs, this.ORDER);\n }\n pow(num, power) {\n return FpPow(this, num, power);\n }\n div(lhs, rhs) {\n return mod(lhs * invert(rhs, this.ORDER), this.ORDER);\n }\n // Same as above, but doesn't normalize\n sqrN(num) {\n return num * num;\n }\n addN(lhs, rhs) {\n return lhs + rhs;\n }\n subN(lhs, rhs) {\n return lhs - rhs;\n }\n mulN(lhs, rhs) {\n return lhs * rhs;\n }\n inv(num) {\n return invert(num, this.ORDER);\n }\n sqrt(num) {\n // Caching _sqrt speeds up sqrt9mod16 by 5x and tonneli-shanks by 10%\n if (!this._sqrt)\n this._sqrt = FpSqrt(this.ORDER);\n return this._sqrt(this, num);\n }\n toBytes(num) {\n return this.isLE ? numberToBytesLE(num, this.BYTES) : numberToBytesBE(num, this.BYTES);\n }\n fromBytes(bytes, skipValidation = false) {\n abytes(bytes);\n const { _lengths: allowedLengths, BYTES, isLE, ORDER, _mod: modFromBytes } = this;\n if (allowedLengths) {\n if (!allowedLengths.includes(bytes.length) || bytes.length > BYTES) {\n throw new Error('Field.fromBytes: expected ' + allowedLengths + ' bytes, got ' + bytes.length);\n }\n const padded = new Uint8Array(BYTES);\n // isLE add 0 to right, !isLE to the left.\n padded.set(bytes, isLE ? 0 : padded.length - bytes.length);\n bytes = padded;\n }\n if (bytes.length !== BYTES)\n throw new Error('Field.fromBytes: expected ' + BYTES + ' bytes, got ' + bytes.length);\n let scalar = isLE ? bytesToNumberLE(bytes) : bytesToNumberBE(bytes);\n if (modFromBytes)\n scalar = mod(scalar, ORDER);\n if (!skipValidation)\n if (!this.isValid(scalar))\n throw new Error('invalid field element: outside of range 0..ORDER');\n // NOTE: we don't validate scalar here, please use isValid. This done such way because some\n // protocol may allow non-reduced scalar that reduced later or changed some other way.\n return scalar;\n }\n // TODO: we don't need it here, move out to separate fn\n invertBatch(lst) {\n return FpInvertBatch(this, lst);\n }\n // We can't move this out because Fp6, Fp12 implement it\n // and it's unclear what to return in there.\n cmov(a, b, condition) {\n return condition ? b : a;\n }\n}\n/**\n * Creates a finite field. Major performance optimizations:\n * * 1. Denormalized operations like mulN instead of mul.\n * * 2. Identical object shape: never add or remove keys.\n * * 3. `Object.freeze`.\n * Fragile: always run a benchmark on a change.\n * Security note: operations don't check 'isValid' for all elements for performance reasons,\n * it is caller responsibility to check this.\n * This is low-level code, please make sure you know what you're doing.\n *\n * Note about field properties:\n * * CHARACTERISTIC p = prime number, number of elements in main subgroup.\n * * ORDER q = similar to cofactor in curves, may be composite `q = p^m`.\n *\n * @param ORDER field order, probably prime, or could be composite\n * @param bitLen how many bits the field consumes\n * @param isLE (default: false) if encoding / decoding should be in little-endian\n * @param redef optional faster redefinitions of sqrt and other methods\n */\nexport function Field(ORDER, opts = {}) {\n return new _Field(ORDER, opts);\n}\n// Generic random scalar, we can do same for other fields if via Fp2.mul(Fp2.ONE, Fp2.random)?\n// This allows unsafe methods like ignore bias or zero. These unsafe, but often used in different protocols (if deterministic RNG).\n// which mean we cannot force this via opts.\n// Not sure what to do with randomBytes, we can accept it inside opts if wanted.\n// Probably need to export getMinHashLength somewhere?\n// random(bytes?: Uint8Array, unsafeAllowZero = false, unsafeAllowBias = false) {\n// const LEN = !unsafeAllowBias ? getMinHashLength(ORDER) : BYTES;\n// if (bytes === undefined) bytes = randomBytes(LEN); // _opts.randomBytes?\n// const num = isLE ? bytesToNumberLE(bytes) : bytesToNumberBE(bytes);\n// // `mod(x, 11)` can sometimes produce 0. `mod(x, 10) + 1` is the same, but no 0\n// const reduced = unsafeAllowZero ? mod(num, ORDER) : mod(num, ORDER - _1n) + _1n;\n// return reduced;\n// },\nexport function FpSqrtOdd(Fp, elm) {\n if (!Fp.isOdd)\n throw new Error(\"Field doesn't have isOdd\");\n const root = Fp.sqrt(elm);\n return Fp.isOdd(root) ? root : Fp.neg(root);\n}\nexport function FpSqrtEven(Fp, elm) {\n if (!Fp.isOdd)\n throw new Error(\"Field doesn't have isOdd\");\n const root = Fp.sqrt(elm);\n return Fp.isOdd(root) ? Fp.neg(root) : root;\n}\n/**\n * Returns total number of bytes consumed by the field element.\n * For example, 32 bytes for usual 256-bit weierstrass curve.\n * @param fieldOrder number of field elements, usually CURVE.n\n * @returns byte length of field\n */\nexport function getFieldBytesLength(fieldOrder) {\n if (typeof fieldOrder !== 'bigint')\n throw new Error('field order must be bigint');\n const bitLength = fieldOrder.toString(2).length;\n return Math.ceil(bitLength / 8);\n}\n/**\n * Returns minimal amount of bytes that can be safely reduced\n * by field order.\n * Should be 2^-128 for 128-bit curve such as P256.\n * @param fieldOrder number of field elements, usually CURVE.n\n * @returns byte length of target hash\n */\nexport function getMinHashLength(fieldOrder) {\n const length = getFieldBytesLength(fieldOrder);\n return length + Math.ceil(length / 2);\n}\n/**\n * \"Constant-time\" private key generation utility.\n * Can take (n + n/2) or more bytes of uniform input e.g. from CSPRNG or KDF\n * and convert them into private scalar, with the modulo bias being negligible.\n * Needs at least 48 bytes of input for 32-byte private key.\n * https://research.kudelskisecurity.com/2020/07/28/the-definitive-guide-to-modulo-bias-and-how-to-avoid-it/\n * FIPS 186-5, A.2 https://csrc.nist.gov/publications/detail/fips/186/5/final\n * RFC 9380, https://www.rfc-editor.org/rfc/rfc9380#section-5\n * @param hash hash output from SHA3 or a similar function\n * @param groupOrder size of subgroup - (e.g. secp256k1.Point.Fn.ORDER)\n * @param isLE interpret hash bytes as LE num\n * @returns valid private scalar\n */\nexport function mapHashToField(key, fieldOrder, isLE = false) {\n abytes(key);\n const len = key.length;\n const fieldLen = getFieldBytesLength(fieldOrder);\n const minLen = getMinHashLength(fieldOrder);\n // No small numbers: need to understand bias story. No huge numbers: easier to detect JS timings.\n if (len < 16 || len < minLen || len > 1024)\n throw new Error('expected ' + minLen + '-1024 bytes of input, got ' + len);\n const num = isLE ? bytesToNumberLE(key) : bytesToNumberBE(key);\n // `mod(x, 11)` can sometimes produce 0. `mod(x, 10) + 1` is the same, but no 0\n const reduced = mod(num, fieldOrder - _1n) + _1n;\n return isLE ? numberToBytesLE(reduced, fieldLen) : numberToBytesBE(reduced, fieldLen);\n}\n//# sourceMappingURL=modular.js.map","/**\n * Methods for elliptic curve multiplication by scalars.\n * Contains wNAF, pippenger.\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { bitLen, bitMask } from \"../utils.js\";\nimport { Field, FpInvertBatch, validateField } from \"./modular.js\";\nconst _0n = /* @__PURE__ */ BigInt(0);\nconst _1n = /* @__PURE__ */ BigInt(1);\nexport function negateCt(condition, item) {\n const neg = item.negate();\n return condition ? neg : item;\n}\n/**\n * Takes a bunch of Projective Points but executes only one\n * inversion on all of them. Inversion is very slow operation,\n * so this improves performance massively.\n * Optimization: converts a list of projective points to a list of identical points with Z=1.\n */\nexport function normalizeZ(c, points) {\n const invertedZs = FpInvertBatch(c.Fp, points.map((p) => p.Z));\n return points.map((p, i) => c.fromAffine(p.toAffine(invertedZs[i])));\n}\nfunction validateW(W, bits) {\n if (!Number.isSafeInteger(W) || W <= 0 || W > bits)\n throw new Error('invalid window size, expected [1..' + bits + '], got W=' + W);\n}\nfunction calcWOpts(W, scalarBits) {\n validateW(W, scalarBits);\n const windows = Math.ceil(scalarBits / W) + 1; // W=8 33. Not 32, because we skip zero\n const windowSize = 2 ** (W - 1); // W=8 128. Not 256, because we skip zero\n const maxNumber = 2 ** W; // W=8 256\n const mask = bitMask(W); // W=8 255 == mask 0b11111111\n const shiftBy = BigInt(W); // W=8 8\n return { windows, windowSize, mask, maxNumber, shiftBy };\n}\nfunction calcOffsets(n, window, wOpts) {\n const { windowSize, mask, maxNumber, shiftBy } = wOpts;\n let wbits = Number(n & mask); // extract W bits.\n let nextN = n >> shiftBy; // shift number by W bits.\n // What actually happens here:\n // const highestBit = Number(mask ^ (mask >> 1n));\n // let wbits2 = wbits - 1; // skip zero\n // if (wbits2 & highestBit) { wbits2 ^= Number(mask); // (~);\n // split if bits > max: +224 => 256-32\n if (wbits > windowSize) {\n // we skip zero, which means instead of `>= size-1`, we do `> size`\n wbits -= maxNumber; // -32, can be maxNumber - wbits, but then we need to set isNeg here.\n nextN += _1n; // +256 (carry)\n }\n const offsetStart = window * windowSize;\n const offset = offsetStart + Math.abs(wbits) - 1; // -1 because we skip zero\n const isZero = wbits === 0; // is current window slice a 0?\n const isNeg = wbits < 0; // is current window slice negative?\n const isNegF = window % 2 !== 0; // fake random statement for noise\n const offsetF = offsetStart; // fake offset for noise\n return { nextN, offset, isZero, isNeg, isNegF, offsetF };\n}\nfunction validateMSMPoints(points, c) {\n if (!Array.isArray(points))\n throw new Error('array expected');\n points.forEach((p, i) => {\n if (!(p instanceof c))\n throw new Error('invalid point at index ' + i);\n });\n}\nfunction validateMSMScalars(scalars, field) {\n if (!Array.isArray(scalars))\n throw new Error('array of scalars expected');\n scalars.forEach((s, i) => {\n if (!field.isValid(s))\n throw new Error('invalid scalar at index ' + i);\n });\n}\n// Since points in different groups cannot be equal (different object constructor),\n// we can have single place to store precomputes.\n// Allows to make points frozen / immutable.\nconst pointPrecomputes = new WeakMap();\nconst pointWindowSizes = new WeakMap();\nfunction getW(P) {\n // To disable precomputes:\n // return 1;\n return pointWindowSizes.get(P) || 1;\n}\nfunction assert0(n) {\n if (n !== _0n)\n throw new Error('invalid wNAF');\n}\n/**\n * Elliptic curve multiplication of Point by scalar. Fragile.\n * Table generation takes **30MB of ram and 10ms on high-end CPU**,\n * but may take much longer on slow devices. Actual generation will happen on\n * first call of `multiply()`. By default, `BASE` point is precomputed.\n *\n * Scalars should always be less than curve order: this should be checked inside of a curve itself.\n * Creates precomputation tables for fast multiplication:\n * - private scalar is split by fixed size windows of W bits\n * - every window point is collected from window's table & added to accumulator\n * - since windows are different, same point inside tables won't be accessed more than once per calc\n * - each multiplication is 'Math.ceil(CURVE_ORDER / 𝑊) + 1' point additions (fixed for any scalar)\n * - +1 window is neccessary for wNAF\n * - wNAF reduces table size: 2x less memory + 2x faster generation, but 10% slower multiplication\n *\n * @todo Research returning 2d JS array of windows, instead of a single window.\n * This would allow windows to be in different memory locations\n */\nexport class wNAF {\n BASE;\n ZERO;\n Fn;\n bits;\n // Parametrized with a given Point class (not individual point)\n constructor(Point, bits) {\n this.BASE = Point.BASE;\n this.ZERO = Point.ZERO;\n this.Fn = Point.Fn;\n this.bits = bits;\n }\n // non-const time multiplication ladder\n _unsafeLadder(elm, n, p = this.ZERO) {\n let d = elm;\n while (n > _0n) {\n if (n & _1n)\n p = p.add(d);\n d = d.double();\n n >>= _1n;\n }\n return p;\n }\n /**\n * Creates a wNAF precomputation window. Used for caching.\n * Default window size is set by `utils.precompute()` and is equal to 8.\n * Number of precomputed points depends on the curve size:\n * 2^(𝑊−1) * (Math.ceil(𝑛 / 𝑊) + 1), where:\n * - 𝑊 is the window size\n * - 𝑛 is the bitlength of the curve order.\n * For a 256-bit curve and window size 8, the number of precomputed points is 128 * 33 = 4224.\n * @param point Point instance\n * @param W window size\n * @returns precomputed point tables flattened to a single array\n */\n precomputeWindow(point, W) {\n const { windows, windowSize } = calcWOpts(W, this.bits);\n const points = [];\n let p = point;\n let base = p;\n for (let window = 0; window < windows; window++) {\n base = p;\n points.push(base);\n // i=1, bc we skip 0\n for (let i = 1; i < windowSize; i++) {\n base = base.add(p);\n points.push(base);\n }\n p = base.double();\n }\n return points;\n }\n /**\n * Implements ec multiplication using precomputed tables and w-ary non-adjacent form.\n * More compact implementation:\n * https://github.com/paulmillr/noble-secp256k1/blob/47cb1669b6e506ad66b35fe7d76132ae97465da2/index.ts#L502-L541\n * @returns real and fake (for const-time) points\n */\n wNAF(W, precomputes, n) {\n // Scalar should be smaller than field order\n if (!this.Fn.isValid(n))\n throw new Error('invalid scalar');\n // Accumulators\n let p = this.ZERO;\n let f = this.BASE;\n // This code was first written with assumption that 'f' and 'p' will never be infinity point:\n // since each addition is multiplied by 2 ** W, it cannot cancel each other. However,\n // there is negate now: it is possible that negated element from low value\n // would be the same as high element, which will create carry into next window.\n // It's not obvious how this can fail, but still worth investigating later.\n const wo = calcWOpts(W, this.bits);\n for (let window = 0; window < wo.windows; window++) {\n // (n === _0n) is handled and not early-exited. isEven and offsetF are used for noise\n const { nextN, offset, isZero, isNeg, isNegF, offsetF } = calcOffsets(n, window, wo);\n n = nextN;\n if (isZero) {\n // bits are 0: add garbage to fake point\n // Important part for const-time getPublicKey: add random \"noise\" point to f.\n f = f.add(negateCt(isNegF, precomputes[offsetF]));\n }\n else {\n // bits are 1: add to result point\n p = p.add(negateCt(isNeg, precomputes[offset]));\n }\n }\n assert0(n);\n // Return both real and fake points: JIT won't eliminate f.\n // At this point there is a way to F be infinity-point even if p is not,\n // which makes it less const-time: around 1 bigint multiply.\n return { p, f };\n }\n /**\n * Implements ec unsafe (non const-time) multiplication using precomputed tables and w-ary non-adjacent form.\n * @param acc accumulator point to add result of multiplication\n * @returns point\n */\n wNAFUnsafe(W, precomputes, n, acc = this.ZERO) {\n const wo = calcWOpts(W, this.bits);\n for (let window = 0; window < wo.windows; window++) {\n if (n === _0n)\n break; // Early-exit, skip 0 value\n const { nextN, offset, isZero, isNeg } = calcOffsets(n, window, wo);\n n = nextN;\n if (isZero) {\n // Window bits are 0: skip processing.\n // Move to next window.\n continue;\n }\n else {\n const item = precomputes[offset];\n acc = acc.add(isNeg ? item.negate() : item); // Re-using acc allows to save adds in MSM\n }\n }\n assert0(n);\n return acc;\n }\n getPrecomputes(W, point, transform) {\n // Calculate precomputes on a first run, reuse them after\n let comp = pointPrecomputes.get(point);\n if (!comp) {\n comp = this.precomputeWindow(point, W);\n if (W !== 1) {\n // Doing transform outside of if brings 15% perf hit\n if (typeof transform === 'function')\n comp = transform(comp);\n pointPrecomputes.set(point, comp);\n }\n }\n return comp;\n }\n cached(point, scalar, transform) {\n const W = getW(point);\n return this.wNAF(W, this.getPrecomputes(W, point, transform), scalar);\n }\n unsafe(point, scalar, transform, prev) {\n const W = getW(point);\n if (W === 1)\n return this._unsafeLadder(point, scalar, prev); // For W=1 ladder is ~x2 faster\n return this.wNAFUnsafe(W, this.getPrecomputes(W, point, transform), scalar, prev);\n }\n // We calculate precomputes for elliptic curve point multiplication\n // using windowed method. This specifies window size and\n // stores precomputed values. Usually only base point would be precomputed.\n createCache(P, W) {\n validateW(W, this.bits);\n pointWindowSizes.set(P, W);\n pointPrecomputes.delete(P);\n }\n hasCache(elm) {\n return getW(elm) !== 1;\n }\n}\n/**\n * Endomorphism-specific multiplication for Koblitz curves.\n * Cost: 128 dbl, 0-256 adds.\n */\nexport function mulEndoUnsafe(Point, point, k1, k2) {\n let acc = point;\n let p1 = Point.ZERO;\n let p2 = Point.ZERO;\n while (k1 > _0n || k2 > _0n) {\n if (k1 & _1n)\n p1 = p1.add(acc);\n if (k2 & _1n)\n p2 = p2.add(acc);\n acc = acc.double();\n k1 >>= _1n;\n k2 >>= _1n;\n }\n return { p1, p2 };\n}\n/**\n * Pippenger algorithm for multi-scalar multiplication (MSM, Pa + Qb + Rc + ...).\n * 30x faster vs naive addition on L=4096, 10x faster than precomputes.\n * For N=254bit, L=1, it does: 1024 ADD + 254 DBL. For L=5: 1536 ADD + 254 DBL.\n * Algorithmically constant-time (for same L), even when 1 point + scalar, or when scalar = 0.\n * @param c Curve Point constructor\n * @param fieldN field over CURVE.N - important that it's not over CURVE.P\n * @param points array of L curve points\n * @param scalars array of L scalars (aka secret keys / bigints)\n */\nexport function pippenger(c, points, scalars) {\n // If we split scalars by some window (let's say 8 bits), every chunk will only\n // take 256 buckets even if there are 4096 scalars, also re-uses double.\n // TODO:\n // - https://eprint.iacr.org/2024/750.pdf\n // - https://tches.iacr.org/index.php/TCHES/article/view/10287\n // 0 is accepted in scalars\n const fieldN = c.Fn;\n validateMSMPoints(points, c);\n validateMSMScalars(scalars, fieldN);\n const plength = points.length;\n const slength = scalars.length;\n if (plength !== slength)\n throw new Error('arrays of points and scalars must have equal length');\n // if (plength === 0) throw new Error('array must be of length >= 2');\n const zero = c.ZERO;\n const wbits = bitLen(BigInt(plength));\n let windowSize = 1; // bits\n if (wbits > 12)\n windowSize = wbits - 3;\n else if (wbits > 4)\n windowSize = wbits - 2;\n else if (wbits > 0)\n windowSize = 2;\n const MASK = bitMask(windowSize);\n const buckets = new Array(Number(MASK) + 1).fill(zero); // +1 for zero array\n const lastBits = Math.floor((fieldN.BITS - 1) / windowSize) * windowSize;\n let sum = zero;\n for (let i = lastBits; i >= 0; i -= windowSize) {\n buckets.fill(zero);\n for (let j = 0; j < slength; j++) {\n const scalar = scalars[j];\n const wbits = Number((scalar >> BigInt(i)) & MASK);\n buckets[wbits] = buckets[wbits].add(points[j]);\n }\n let resI = zero; // not using this will do small speed-up, but will lose ct\n // Skip first bucket, because it is zero\n for (let j = buckets.length - 1, sumI = zero; j > 0; j--) {\n sumI = sumI.add(buckets[j]);\n resI = resI.add(sumI);\n }\n sum = sum.add(resI);\n if (i !== 0)\n for (let j = 0; j < windowSize; j++)\n sum = sum.double();\n }\n return sum;\n}\n/**\n * Precomputed multi-scalar multiplication (MSM, Pa + Qb + Rc + ...).\n * @param c Curve Point constructor\n * @param fieldN field over CURVE.N - important that it's not over CURVE.P\n * @param points array of L curve points\n * @returns function which multiplies points with scaars\n */\nexport function precomputeMSMUnsafe(c, points, windowSize) {\n /**\n * Performance Analysis of Window-based Precomputation\n *\n * Base Case (256-bit scalar, 8-bit window):\n * - Standard precomputation requires:\n * - 31 additions per scalar × 256 scalars = 7,936 ops\n * - Plus 255 summary additions = 8,191 total ops\n * Note: Summary additions can be optimized via accumulator\n *\n * Chunked Precomputation Analysis:\n * - Using 32 chunks requires:\n * - 255 additions per chunk\n * - 256 doublings\n * - Total: (255 × 32) + 256 = 8,416 ops\n *\n * Memory Usage Comparison:\n * Window Size | Standard Points | Chunked Points\n * ------------|-----------------|---------------\n * 4-bit | 520 | 15\n * 8-bit | 4,224 | 255\n * 10-bit | 13,824 | 1,023\n * 16-bit | 557,056 | 65,535\n *\n * Key Advantages:\n * 1. Enables larger window sizes due to reduced memory overhead\n * 2. More efficient for smaller scalar counts:\n * - 16 chunks: (16 × 255) + 256 = 4,336 ops\n * - ~2x faster than standard 8,191 ops\n *\n * Limitations:\n * - Not suitable for plain precomputes (requires 256 constant doublings)\n * - Performance degrades with larger scalar counts:\n * - Optimal for ~256 scalars\n * - Less efficient for 4096+ scalars (Pippenger preferred)\n */\n const fieldN = c.Fn;\n validateW(windowSize, fieldN.BITS);\n validateMSMPoints(points, c);\n const zero = c.ZERO;\n const tableSize = 2 ** windowSize - 1; // table size (without zero)\n const chunks = Math.ceil(fieldN.BITS / windowSize); // chunks of item\n const MASK = bitMask(windowSize);\n const tables = points.map((p) => {\n const res = [];\n for (let i = 0, acc = p; i < tableSize; i++) {\n res.push(acc);\n acc = acc.add(p);\n }\n return res;\n });\n return (scalars) => {\n validateMSMScalars(scalars, fieldN);\n if (scalars.length > points.length)\n throw new Error('array of scalars must be smaller than array of points');\n let res = zero;\n for (let i = 0; i < chunks; i++) {\n // No need to double if accumulator is still zero.\n if (res !== zero)\n for (let j = 0; j < windowSize; j++)\n res = res.double();\n const shiftBy = BigInt(chunks * windowSize - (i + 1) * windowSize);\n for (let j = 0; j < scalars.length; j++) {\n const n = scalars[j];\n const curr = Number((n >> shiftBy) & MASK);\n if (!curr)\n continue; // skip zero scalars chunks\n res = res.add(tables[j][curr - 1]);\n }\n }\n return res;\n };\n}\nfunction createField(order, field, isLE) {\n if (field) {\n if (field.ORDER !== order)\n throw new Error('Field.ORDER must match order: Fp == p, Fn == n');\n validateField(field);\n return field;\n }\n else {\n return Field(order, { isLE });\n }\n}\n/** Validates CURVE opts and creates fields */\nexport function createCurveFields(type, CURVE, curveOpts = {}, FpFnLE) {\n if (FpFnLE === undefined)\n FpFnLE = type === 'edwards';\n if (!CURVE || typeof CURVE !== 'object')\n throw new Error(`expected valid ${type} CURVE object`);\n for (const p of ['p', 'n', 'h']) {\n const val = CURVE[p];\n if (!(typeof val === 'bigint' && val > _0n))\n throw new Error(`CURVE.${p} must be positive bigint`);\n }\n const Fp = createField(CURVE.p, curveOpts.Fp, FpFnLE);\n const Fn = createField(CURVE.n, curveOpts.Fn, FpFnLE);\n const _b = type === 'weierstrass' ? 'b' : 'd';\n const params = ['Gx', 'Gy', 'a', _b];\n for (const p of params) {\n // @ts-ignore\n if (!Fp.isValid(CURVE[p]))\n throw new Error(`CURVE.${p} must be valid field element of CURVE.Fp`);\n }\n CURVE = Object.freeze(Object.assign({}, CURVE));\n return { CURVE, Fp, Fn };\n}\nexport function createKeygen(randomSecretKey, getPublicKey) {\n return function keygen(seed) {\n const secretKey = randomSecretKey(seed);\n return { secretKey, publicKey: getPublicKey(secretKey) };\n };\n}\n//# sourceMappingURL=curve.js.map","/**\n * HMAC: RFC2104 message authentication code.\n * @module\n */\nimport { abytes, aexists, ahash, clean } from \"./utils.js\";\n/** Internal class for HMAC. */\nexport class _HMAC {\n oHash;\n iHash;\n blockLen;\n outputLen;\n finished = false;\n destroyed = false;\n constructor(hash, key) {\n ahash(hash);\n abytes(key, undefined, 'key');\n this.iHash = hash.create();\n if (typeof this.iHash.update !== 'function')\n throw new Error('Expected instance of class which extends utils.Hash');\n this.blockLen = this.iHash.blockLen;\n this.outputLen = this.iHash.outputLen;\n const blockLen = this.blockLen;\n const pad = new Uint8Array(blockLen);\n // blockLen can be bigger than outputLen\n pad.set(key.length > blockLen ? hash.create().update(key).digest() : key);\n for (let i = 0; i < pad.length; i++)\n pad[i] ^= 0x36;\n this.iHash.update(pad);\n // By doing update (processing of first block) of outer hash here we can re-use it between multiple calls via clone\n this.oHash = hash.create();\n // Undo internal XOR && apply outer XOR\n for (let i = 0; i < pad.length; i++)\n pad[i] ^= 0x36 ^ 0x5c;\n this.oHash.update(pad);\n clean(pad);\n }\n update(buf) {\n aexists(this);\n this.iHash.update(buf);\n return this;\n }\n digestInto(out) {\n aexists(this);\n abytes(out, this.outputLen, 'output');\n this.finished = true;\n this.iHash.digestInto(out);\n this.oHash.update(out);\n this.oHash.digestInto(out);\n this.destroy();\n }\n digest() {\n const out = new Uint8Array(this.oHash.outputLen);\n this.digestInto(out);\n return out;\n }\n _cloneInto(to) {\n // Create new instance without calling constructor since key already in state and we don't know it.\n to ||= Object.create(Object.getPrototypeOf(this), {});\n const { oHash, iHash, finished, destroyed, blockLen, outputLen } = this;\n to = to;\n to.finished = finished;\n to.destroyed = destroyed;\n to.blockLen = blockLen;\n to.outputLen = outputLen;\n to.oHash = oHash._cloneInto(to.oHash);\n to.iHash = iHash._cloneInto(to.iHash);\n return to;\n }\n clone() {\n return this._cloneInto();\n }\n destroy() {\n this.destroyed = true;\n this.oHash.destroy();\n this.iHash.destroy();\n }\n}\n/**\n * HMAC: RFC2104 message authentication code.\n * @param hash - function that would be used e.g. sha256\n * @param key - message key\n * @param message - message data\n * @example\n * import { hmac } from '@noble/hashes/hmac';\n * import { sha256 } from '@noble/hashes/sha2';\n * const mac1 = hmac(sha256, 'key', 'message');\n */\nexport const hmac = (hash, key, message) => new _HMAC(hash, key).update(message).digest();\nhmac.create = (hash, key) => new _HMAC(hash, key);\n//# sourceMappingURL=hmac.js.map","/**\n * Short Weierstrass curve methods. The formula is: y² = x³ + ax + b.\n *\n * ### Design rationale for types\n *\n * * Interaction between classes from different curves should fail:\n * `k256.Point.BASE.add(p256.Point.BASE)`\n * * For this purpose we want to use `instanceof` operator, which is fast and works during runtime\n * * Different calls of `curve()` would return different classes -\n * `curve(params) !== curve(params)`: if somebody decided to monkey-patch their curve,\n * it won't affect others\n *\n * TypeScript can't infer types for classes created inside a function. Classes is one instance\n * of nominative types in TypeScript and interfaces only check for shape, so it's hard to create\n * unique type for every function call.\n *\n * We can use generic types via some param, like curve opts, but that would:\n * 1. Enable interaction between `curve(params)` and `curve(params)` (curves of same params)\n * which is hard to debug.\n * 2. Params can be generic and we can't enforce them to be constant value:\n * if somebody creates curve from non-constant params,\n * it would be allowed to interact with other curves with non-constant params\n *\n * @todo https://www.typescriptlang.org/docs/handbook/release-notes/typescript-2-7.html#unique-symbol\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { hmac as nobleHmac } from '@noble/hashes/hmac.js';\nimport { ahash } from '@noble/hashes/utils.js';\nimport { abool, abytes, aInRange, bitLen, bitMask, bytesToHex, bytesToNumberBE, concatBytes, createHmacDrbg, hexToBytes, isBytes, memoized, numberToHexUnpadded, validateObject, randomBytes as wcRandomBytes, } from \"../utils.js\";\nimport { createCurveFields, createKeygen, mulEndoUnsafe, negateCt, normalizeZ, wNAF, } from \"./curve.js\";\nimport { FpInvertBatch, getMinHashLength, mapHashToField, validateField, } from \"./modular.js\";\n// We construct basis in such way that den is always positive and equals n, but num sign depends on basis (not on secret value)\nconst divNearest = (num, den) => (num + (num >= 0 ? den : -den) / _2n) / den;\n/**\n * Splits scalar for GLV endomorphism.\n */\nexport function _splitEndoScalar(k, basis, n) {\n // Split scalar into two such that part is ~half bits: `abs(part) < sqrt(N)`\n // Since part can be negative, we need to do this on point.\n // TODO: verifyScalar function which consumes lambda\n const [[a1, b1], [a2, b2]] = basis;\n const c1 = divNearest(b2 * k, n);\n const c2 = divNearest(-b1 * k, n);\n // |k1|/|k2| is < sqrt(N), but can be negative.\n // If we do `k1 mod N`, we'll get big scalar (`> sqrt(N)`): so, we do cheaper negation instead.\n let k1 = k - c1 * a1 - c2 * a2;\n let k2 = -c1 * b1 - c2 * b2;\n const k1neg = k1 < _0n;\n const k2neg = k2 < _0n;\n if (k1neg)\n k1 = -k1;\n if (k2neg)\n k2 = -k2;\n // Double check that resulting scalar less than half bits of N: otherwise wNAF will fail.\n // This should only happen on wrong basises. Also, math inside is too complex and I don't trust it.\n const MAX_NUM = bitMask(Math.ceil(bitLen(n) / 2)) + _1n; // Half bits of N\n if (k1 < _0n || k1 >= MAX_NUM || k2 < _0n || k2 >= MAX_NUM) {\n throw new Error('splitScalar (endomorphism): failed, k=' + k);\n }\n return { k1neg, k1, k2neg, k2 };\n}\nfunction validateSigFormat(format) {\n if (!['compact', 'recovered', 'der'].includes(format))\n throw new Error('Signature format must be \"compact\", \"recovered\", or \"der\"');\n return format;\n}\nfunction validateSigOpts(opts, def) {\n const optsn = {};\n for (let optName of Object.keys(def)) {\n // @ts-ignore\n optsn[optName] = opts[optName] === undefined ? def[optName] : opts[optName];\n }\n abool(optsn.lowS, 'lowS');\n abool(optsn.prehash, 'prehash');\n if (optsn.format !== undefined)\n validateSigFormat(optsn.format);\n return optsn;\n}\nexport class DERErr extends Error {\n constructor(m = '') {\n super(m);\n }\n}\n/**\n * ASN.1 DER encoding utilities. ASN is very complex & fragile. Format:\n *\n * [0x30 (SEQUENCE), bytelength, 0x02 (INTEGER), intLength, R, 0x02 (INTEGER), intLength, S]\n *\n * Docs: https://letsencrypt.org/docs/a-warm-welcome-to-asn1-and-der/, https://luca.ntop.org/Teaching/Appunti/asn1.html\n */\nexport const DER = {\n // asn.1 DER encoding utils\n Err: DERErr,\n // Basic building block is TLV (Tag-Length-Value)\n _tlv: {\n encode: (tag, data) => {\n const { Err: E } = DER;\n if (tag < 0 || tag > 256)\n throw new E('tlv.encode: wrong tag');\n if (data.length & 1)\n throw new E('tlv.encode: unpadded data');\n const dataLen = data.length / 2;\n const len = numberToHexUnpadded(dataLen);\n if ((len.length / 2) & 0b1000_0000)\n throw new E('tlv.encode: long form length too big');\n // length of length with long form flag\n const lenLen = dataLen > 127 ? numberToHexUnpadded((len.length / 2) | 0b1000_0000) : '';\n const t = numberToHexUnpadded(tag);\n return t + lenLen + len + data;\n },\n // v - value, l - left bytes (unparsed)\n decode(tag, data) {\n const { Err: E } = DER;\n let pos = 0;\n if (tag < 0 || tag > 256)\n throw new E('tlv.encode: wrong tag');\n if (data.length < 2 || data[pos++] !== tag)\n throw new E('tlv.decode: wrong tlv');\n const first = data[pos++];\n const isLong = !!(first & 0b1000_0000); // First bit of first length byte is flag for short/long form\n let length = 0;\n if (!isLong)\n length = first;\n else {\n // Long form: [longFlag(1bit), lengthLength(7bit), length (BE)]\n const lenLen = first & 0b0111_1111;\n if (!lenLen)\n throw new E('tlv.decode(long): indefinite length not supported');\n if (lenLen > 4)\n throw new E('tlv.decode(long): byte length is too big'); // this will overflow u32 in js\n const lengthBytes = data.subarray(pos, pos + lenLen);\n if (lengthBytes.length !== lenLen)\n throw new E('tlv.decode: length bytes not complete');\n if (lengthBytes[0] === 0)\n throw new E('tlv.decode(long): zero leftmost byte');\n for (const b of lengthBytes)\n length = (length << 8) | b;\n pos += lenLen;\n if (length < 128)\n throw new E('tlv.decode(long): not minimal encoding');\n }\n const v = data.subarray(pos, pos + length);\n if (v.length !== length)\n throw new E('tlv.decode: wrong value length');\n return { v, l: data.subarray(pos + length) };\n },\n },\n // https://crypto.stackexchange.com/a/57734 Leftmost bit of first byte is 'negative' flag,\n // since we always use positive integers here. It must always be empty:\n // - add zero byte if exists\n // - if next byte doesn't have a flag, leading zero is not allowed (minimal encoding)\n _int: {\n encode(num) {\n const { Err: E } = DER;\n if (num < _0n)\n throw new E('integer: negative integers are not allowed');\n let hex = numberToHexUnpadded(num);\n // Pad with zero byte if negative flag is present\n if (Number.parseInt(hex[0], 16) & 0b1000)\n hex = '00' + hex;\n if (hex.length & 1)\n throw new E('unexpected DER parsing assertion: unpadded hex');\n return hex;\n },\n decode(data) {\n const { Err: E } = DER;\n if (data[0] & 0b1000_0000)\n throw new E('invalid signature integer: negative');\n if (data[0] === 0x00 && !(data[1] & 0b1000_0000))\n throw new E('invalid signature integer: unnecessary leading zero');\n return bytesToNumberBE(data);\n },\n },\n toSig(bytes) {\n // parse DER signature\n const { Err: E, _int: int, _tlv: tlv } = DER;\n const data = abytes(bytes, undefined, 'signature');\n const { v: seqBytes, l: seqLeftBytes } = tlv.decode(0x30, data);\n if (seqLeftBytes.length)\n throw new E('invalid signature: left bytes after parsing');\n const { v: rBytes, l: rLeftBytes } = tlv.decode(0x02, seqBytes);\n const { v: sBytes, l: sLeftBytes } = tlv.decode(0x02, rLeftBytes);\n if (sLeftBytes.length)\n throw new E('invalid signature: left bytes after parsing');\n return { r: int.decode(rBytes), s: int.decode(sBytes) };\n },\n hexFromSig(sig) {\n const { _tlv: tlv, _int: int } = DER;\n const rs = tlv.encode(0x02, int.encode(sig.r));\n const ss = tlv.encode(0x02, int.encode(sig.s));\n const seq = rs + ss;\n return tlv.encode(0x30, seq);\n },\n};\n// Be friendly to bad ECMAScript parsers by not using bigint literals\n// prettier-ignore\nconst _0n = BigInt(0), _1n = BigInt(1), _2n = BigInt(2), _3n = BigInt(3), _4n = BigInt(4);\n/**\n * Creates weierstrass Point constructor, based on specified curve options.\n *\n * See {@link WeierstrassOpts}.\n *\n * @example\n```js\nconst opts = {\n p: 0xfffffffffffffffffffffffffffffffeffffac73n,\n n: 0x100000000000000000001b8fa16dfab9aca16b6b3n,\n h: 1n,\n a: 0n,\n b: 7n,\n Gx: 0x3b4c382ce37aa192a4019e763036f4f5dd4d7ebbn,\n Gy: 0x938cf935318fdced6bc28286531733c3f03c4feen,\n};\nconst secp160k1_Point = weierstrass(opts);\n```\n */\nexport function weierstrass(params, extraOpts = {}) {\n const validated = createCurveFields('weierstrass', params, extraOpts);\n const { Fp, Fn } = validated;\n let CURVE = validated.CURVE;\n const { h: cofactor, n: CURVE_ORDER } = CURVE;\n validateObject(extraOpts, {}, {\n allowInfinityPoint: 'boolean',\n clearCofactor: 'function',\n isTorsionFree: 'function',\n fromBytes: 'function',\n toBytes: 'function',\n endo: 'object',\n });\n const { endo } = extraOpts;\n if (endo) {\n // validateObject(endo, { beta: 'bigint', splitScalar: 'function' });\n if (!Fp.is0(CURVE.a) || typeof endo.beta !== 'bigint' || !Array.isArray(endo.basises)) {\n throw new Error('invalid endo: expected \"beta\": bigint and \"basises\": array');\n }\n }\n const lengths = getWLengths(Fp, Fn);\n function assertCompressionIsSupported() {\n if (!Fp.isOdd)\n throw new Error('compression is not supported: Field does not have .isOdd()');\n }\n // Implements IEEE P1363 point encoding\n function pointToBytes(_c, point, isCompressed) {\n const { x, y } = point.toAffine();\n const bx = Fp.toBytes(x);\n abool(isCompressed, 'isCompressed');\n if (isCompressed) {\n assertCompressionIsSupported();\n const hasEvenY = !Fp.isOdd(y);\n return concatBytes(pprefix(hasEvenY), bx);\n }\n else {\n return concatBytes(Uint8Array.of(0x04), bx, Fp.toBytes(y));\n }\n }\n function pointFromBytes(bytes) {\n abytes(bytes, undefined, 'Point');\n const { publicKey: comp, publicKeyUncompressed: uncomp } = lengths; // e.g. for 32-byte: 33, 65\n const length = bytes.length;\n const head = bytes[0];\n const tail = bytes.subarray(1);\n // No actual validation is done here: use .assertValidity()\n if (length === comp && (head === 0x02 || head === 0x03)) {\n const x = Fp.fromBytes(tail);\n if (!Fp.isValid(x))\n throw new Error('bad point: is not on curve, wrong x');\n const y2 = weierstrassEquation(x); // y² = x³ + ax + b\n let y;\n try {\n y = Fp.sqrt(y2); // y = y² ^ (p+1)/4\n }\n catch (sqrtError) {\n const err = sqrtError instanceof Error ? ': ' + sqrtError.message : '';\n throw new Error('bad point: is not on curve, sqrt error' + err);\n }\n assertCompressionIsSupported();\n const evenY = Fp.isOdd(y);\n const evenH = (head & 1) === 1; // ECDSA-specific\n if (evenH !== evenY)\n y = Fp.neg(y);\n return { x, y };\n }\n else if (length === uncomp && head === 0x04) {\n // TODO: more checks\n const L = Fp.BYTES;\n const x = Fp.fromBytes(tail.subarray(0, L));\n const y = Fp.fromBytes(tail.subarray(L, L * 2));\n if (!isValidXY(x, y))\n throw new Error('bad point: is not on curve');\n return { x, y };\n }\n else {\n throw new Error(`bad point: got length ${length}, expected compressed=${comp} or uncompressed=${uncomp}`);\n }\n }\n const encodePoint = extraOpts.toBytes || pointToBytes;\n const decodePoint = extraOpts.fromBytes || pointFromBytes;\n function weierstrassEquation(x) {\n const x2 = Fp.sqr(x); // x * x\n const x3 = Fp.mul(x2, x); // x² * x\n return Fp.add(Fp.add(x3, Fp.mul(x, CURVE.a)), CURVE.b); // x³ + a * x + b\n }\n // TODO: move top-level\n /** Checks whether equation holds for given x, y: y² == x³ + ax + b */\n function isValidXY(x, y) {\n const left = Fp.sqr(y); // y²\n const right = weierstrassEquation(x); // x³ + ax + b\n return Fp.eql(left, right);\n }\n // Validate whether the passed curve params are valid.\n // Test 1: equation y² = x³ + ax + b should work for generator point.\n if (!isValidXY(CURVE.Gx, CURVE.Gy))\n throw new Error('bad curve params: generator point');\n // Test 2: discriminant Δ part should be non-zero: 4a³ + 27b² != 0.\n // Guarantees curve is genus-1, smooth (non-singular).\n const _4a3 = Fp.mul(Fp.pow(CURVE.a, _3n), _4n);\n const _27b2 = Fp.mul(Fp.sqr(CURVE.b), BigInt(27));\n if (Fp.is0(Fp.add(_4a3, _27b2)))\n throw new Error('bad curve params: a or b');\n /** Asserts coordinate is valid: 0 <= n < Fp.ORDER. */\n function acoord(title, n, banZero = false) {\n if (!Fp.isValid(n) || (banZero && Fp.is0(n)))\n throw new Error(`bad point coordinate ${title}`);\n return n;\n }\n function aprjpoint(other) {\n if (!(other instanceof Point))\n throw new Error('Weierstrass Point expected');\n }\n function splitEndoScalarN(k) {\n if (!endo || !endo.basises)\n throw new Error('no endo');\n return _splitEndoScalar(k, endo.basises, Fn.ORDER);\n }\n // Memoized toAffine / validity check. They are heavy. Points are immutable.\n // Converts Projective point to affine (x, y) coordinates.\n // Can accept precomputed Z^-1 - for example, from invertBatch.\n // (X, Y, Z) ∋ (x=X/Z, y=Y/Z)\n const toAffineMemo = memoized((p, iz) => {\n const { X, Y, Z } = p;\n // Fast-path for normalized points\n if (Fp.eql(Z, Fp.ONE))\n return { x: X, y: Y };\n const is0 = p.is0();\n // If invZ was 0, we return zero point. However we still want to execute\n // all operations, so we replace invZ with a random number, 1.\n if (iz == null)\n iz = is0 ? Fp.ONE : Fp.inv(Z);\n const x = Fp.mul(X, iz);\n const y = Fp.mul(Y, iz);\n const zz = Fp.mul(Z, iz);\n if (is0)\n return { x: Fp.ZERO, y: Fp.ZERO };\n if (!Fp.eql(zz, Fp.ONE))\n throw new Error('invZ was invalid');\n return { x, y };\n });\n // NOTE: on exception this will crash 'cached' and no value will be set.\n // Otherwise true will be return\n const assertValidMemo = memoized((p) => {\n if (p.is0()) {\n // (0, 1, 0) aka ZERO is invalid in most contexts.\n // In BLS, ZERO can be serialized, so we allow it.\n // (0, 0, 0) is invalid representation of ZERO.\n if (extraOpts.allowInfinityPoint && !Fp.is0(p.Y))\n return;\n throw new Error('bad point: ZERO');\n }\n // Some 3rd-party test vectors require different wording between here & `fromCompressedHex`\n const { x, y } = p.toAffine();\n if (!Fp.isValid(x) || !Fp.isValid(y))\n throw new Error('bad point: x or y not field elements');\n if (!isValidXY(x, y))\n throw new Error('bad point: equation left != right');\n if (!p.isTorsionFree())\n throw new Error('bad point: not in prime-order subgroup');\n return true;\n });\n function finishEndo(endoBeta, k1p, k2p, k1neg, k2neg) {\n k2p = new Point(Fp.mul(k2p.X, endoBeta), k2p.Y, k2p.Z);\n k1p = negateCt(k1neg, k1p);\n k2p = negateCt(k2neg, k2p);\n return k1p.add(k2p);\n }\n /**\n * Projective Point works in 3d / projective (homogeneous) coordinates:(X, Y, Z) ∋ (x=X/Z, y=Y/Z).\n * Default Point works in 2d / affine coordinates: (x, y).\n * We're doing calculations in projective, because its operations don't require costly inversion.\n */\n class Point {\n // base / generator point\n static BASE = new Point(CURVE.Gx, CURVE.Gy, Fp.ONE);\n // zero / infinity / identity point\n static ZERO = new Point(Fp.ZERO, Fp.ONE, Fp.ZERO); // 0, 1, 0\n // math field\n static Fp = Fp;\n // scalar field\n static Fn = Fn;\n X;\n Y;\n Z;\n /** Does NOT validate if the point is valid. Use `.assertValidity()`. */\n constructor(X, Y, Z) {\n this.X = acoord('x', X);\n this.Y = acoord('y', Y, true);\n this.Z = acoord('z', Z);\n Object.freeze(this);\n }\n static CURVE() {\n return CURVE;\n }\n /** Does NOT validate if the point is valid. Use `.assertValidity()`. */\n static fromAffine(p) {\n const { x, y } = p || {};\n if (!p || !Fp.isValid(x) || !Fp.isValid(y))\n throw new Error('invalid affine point');\n if (p instanceof Point)\n throw new Error('projective point not allowed');\n // (0, 0) would've produced (0, 0, 1) - instead, we need (0, 1, 0)\n if (Fp.is0(x) && Fp.is0(y))\n return Point.ZERO;\n return new Point(x, y, Fp.ONE);\n }\n static fromBytes(bytes) {\n const P = Point.fromAffine(decodePoint(abytes(bytes, undefined, 'point')));\n P.assertValidity();\n return P;\n }\n static fromHex(hex) {\n return Point.fromBytes(hexToBytes(hex));\n }\n get x() {\n return this.toAffine().x;\n }\n get y() {\n return this.toAffine().y;\n }\n /**\n *\n * @param windowSize\n * @param isLazy true will defer table computation until the first multiplication\n * @returns\n */\n precompute(windowSize = 8, isLazy = true) {\n wnaf.createCache(this, windowSize);\n if (!isLazy)\n this.multiply(_3n); // random number\n return this;\n }\n // TODO: return `this`\n /** A point on curve is valid if it conforms to equation. */\n assertValidity() {\n assertValidMemo(this);\n }\n hasEvenY() {\n const { y } = this.toAffine();\n if (!Fp.isOdd)\n throw new Error(\"Field doesn't support isOdd\");\n return !Fp.isOdd(y);\n }\n /** Compare one point to another. */\n equals(other) {\n aprjpoint(other);\n const { X: X1, Y: Y1, Z: Z1 } = this;\n const { X: X2, Y: Y2, Z: Z2 } = other;\n const U1 = Fp.eql(Fp.mul(X1, Z2), Fp.mul(X2, Z1));\n const U2 = Fp.eql(Fp.mul(Y1, Z2), Fp.mul(Y2, Z1));\n return U1 && U2;\n }\n /** Flips point to one corresponding to (x, -y) in Affine coordinates. */\n negate() {\n return new Point(this.X, Fp.neg(this.Y), this.Z);\n }\n // Renes-Costello-Batina exception-free doubling formula.\n // There is 30% faster Jacobian formula, but it is not complete.\n // https://eprint.iacr.org/2015/1060, algorithm 3\n // Cost: 8M + 3S + 3*a + 2*b3 + 15add.\n double() {\n const { a, b } = CURVE;\n const b3 = Fp.mul(b, _3n);\n const { X: X1, Y: Y1, Z: Z1 } = this;\n let X3 = Fp.ZERO, Y3 = Fp.ZERO, Z3 = Fp.ZERO; // prettier-ignore\n let t0 = Fp.mul(X1, X1); // step 1\n let t1 = Fp.mul(Y1, Y1);\n let t2 = Fp.mul(Z1, Z1);\n let t3 = Fp.mul(X1, Y1);\n t3 = Fp.add(t3, t3); // step 5\n Z3 = Fp.mul(X1, Z1);\n Z3 = Fp.add(Z3, Z3);\n X3 = Fp.mul(a, Z3);\n Y3 = Fp.mul(b3, t2);\n Y3 = Fp.add(X3, Y3); // step 10\n X3 = Fp.sub(t1, Y3);\n Y3 = Fp.add(t1, Y3);\n Y3 = Fp.mul(X3, Y3);\n X3 = Fp.mul(t3, X3);\n Z3 = Fp.mul(b3, Z3); // step 15\n t2 = Fp.mul(a, t2);\n t3 = Fp.sub(t0, t2);\n t3 = Fp.mul(a, t3);\n t3 = Fp.add(t3, Z3);\n Z3 = Fp.add(t0, t0); // step 20\n t0 = Fp.add(Z3, t0);\n t0 = Fp.add(t0, t2);\n t0 = Fp.mul(t0, t3);\n Y3 = Fp.add(Y3, t0);\n t2 = Fp.mul(Y1, Z1); // step 25\n t2 = Fp.add(t2, t2);\n t0 = Fp.mul(t2, t3);\n X3 = Fp.sub(X3, t0);\n Z3 = Fp.mul(t2, t1);\n Z3 = Fp.add(Z3, Z3); // step 30\n Z3 = Fp.add(Z3, Z3);\n return new Point(X3, Y3, Z3);\n }\n // Renes-Costello-Batina exception-free addition formula.\n // There is 30% faster Jacobian formula, but it is not complete.\n // https://eprint.iacr.org/2015/1060, algorithm 1\n // Cost: 12M + 0S + 3*a + 3*b3 + 23add.\n add(other) {\n aprjpoint(other);\n const { X: X1, Y: Y1, Z: Z1 } = this;\n const { X: X2, Y: Y2, Z: Z2 } = other;\n let X3 = Fp.ZERO, Y3 = Fp.ZERO, Z3 = Fp.ZERO; // prettier-ignore\n const a = CURVE.a;\n const b3 = Fp.mul(CURVE.b, _3n);\n let t0 = Fp.mul(X1, X2); // step 1\n let t1 = Fp.mul(Y1, Y2);\n let t2 = Fp.mul(Z1, Z2);\n let t3 = Fp.add(X1, Y1);\n let t4 = Fp.add(X2, Y2); // step 5\n t3 = Fp.mul(t3, t4);\n t4 = Fp.add(t0, t1);\n t3 = Fp.sub(t3, t4);\n t4 = Fp.add(X1, Z1);\n let t5 = Fp.add(X2, Z2); // step 10\n t4 = Fp.mul(t4, t5);\n t5 = Fp.add(t0, t2);\n t4 = Fp.sub(t4, t5);\n t5 = Fp.add(Y1, Z1);\n X3 = Fp.add(Y2, Z2); // step 15\n t5 = Fp.mul(t5, X3);\n X3 = Fp.add(t1, t2);\n t5 = Fp.sub(t5, X3);\n Z3 = Fp.mul(a, t4);\n X3 = Fp.mul(b3, t2); // step 20\n Z3 = Fp.add(X3, Z3);\n X3 = Fp.sub(t1, Z3);\n Z3 = Fp.add(t1, Z3);\n Y3 = Fp.mul(X3, Z3);\n t1 = Fp.add(t0, t0); // step 25\n t1 = Fp.add(t1, t0);\n t2 = Fp.mul(a, t2);\n t4 = Fp.mul(b3, t4);\n t1 = Fp.add(t1, t2);\n t2 = Fp.sub(t0, t2); // step 30\n t2 = Fp.mul(a, t2);\n t4 = Fp.add(t4, t2);\n t0 = Fp.mul(t1, t4);\n Y3 = Fp.add(Y3, t0);\n t0 = Fp.mul(t5, t4); // step 35\n X3 = Fp.mul(t3, X3);\n X3 = Fp.sub(X3, t0);\n t0 = Fp.mul(t3, t1);\n Z3 = Fp.mul(t5, Z3);\n Z3 = Fp.add(Z3, t0); // step 40\n return new Point(X3, Y3, Z3);\n }\n subtract(other) {\n return this.add(other.negate());\n }\n is0() {\n return this.equals(Point.ZERO);\n }\n /**\n * Constant time multiplication.\n * Uses wNAF method. Windowed method may be 10% faster,\n * but takes 2x longer to generate and consumes 2x memory.\n * Uses precomputes when available.\n * Uses endomorphism for Koblitz curves.\n * @param scalar by which the point would be multiplied\n * @returns New point\n */\n multiply(scalar) {\n const { endo } = extraOpts;\n if (!Fn.isValidNot0(scalar))\n throw new Error('invalid scalar: out of range'); // 0 is invalid\n let point, fake; // Fake point is used to const-time mult\n const mul = (n) => wnaf.cached(this, n, (p) => normalizeZ(Point, p));\n /** See docs for {@link EndomorphismOpts} */\n if (endo) {\n const { k1neg, k1, k2neg, k2 } = splitEndoScalarN(scalar);\n const { p: k1p, f: k1f } = mul(k1);\n const { p: k2p, f: k2f } = mul(k2);\n fake = k1f.add(k2f);\n point = finishEndo(endo.beta, k1p, k2p, k1neg, k2neg);\n }\n else {\n const { p, f } = mul(scalar);\n point = p;\n fake = f;\n }\n // Normalize `z` for both points, but return only real one\n return normalizeZ(Point, [point, fake])[0];\n }\n /**\n * Non-constant-time multiplication. Uses double-and-add algorithm.\n * It's faster, but should only be used when you don't care about\n * an exposed secret key e.g. sig verification, which works over *public* keys.\n */\n multiplyUnsafe(sc) {\n const { endo } = extraOpts;\n const p = this;\n if (!Fn.isValid(sc))\n throw new Error('invalid scalar: out of range'); // 0 is valid\n if (sc === _0n || p.is0())\n return Point.ZERO; // 0\n if (sc === _1n)\n return p; // 1\n if (wnaf.hasCache(this))\n return this.multiply(sc); // precomputes\n // We don't have method for double scalar multiplication (aP + bQ):\n // Even with using Strauss-Shamir trick, it's 35% slower than naïve mul+add.\n if (endo) {\n const { k1neg, k1, k2neg, k2 } = splitEndoScalarN(sc);\n const { p1, p2 } = mulEndoUnsafe(Point, p, k1, k2); // 30% faster vs wnaf.unsafe\n return finishEndo(endo.beta, p1, p2, k1neg, k2neg);\n }\n else {\n return wnaf.unsafe(p, sc);\n }\n }\n /**\n * Converts Projective point to affine (x, y) coordinates.\n * @param invertedZ Z^-1 (inverted zero) - optional, precomputation is useful for invertBatch\n */\n toAffine(invertedZ) {\n return toAffineMemo(this, invertedZ);\n }\n /**\n * Checks whether Point is free of torsion elements (is in prime subgroup).\n * Always torsion-free for cofactor=1 curves.\n */\n isTorsionFree() {\n const { isTorsionFree } = extraOpts;\n if (cofactor === _1n)\n return true;\n if (isTorsionFree)\n return isTorsionFree(Point, this);\n return wnaf.unsafe(this, CURVE_ORDER).is0();\n }\n clearCofactor() {\n const { clearCofactor } = extraOpts;\n if (cofactor === _1n)\n return this; // Fast-path\n if (clearCofactor)\n return clearCofactor(Point, this);\n return this.multiplyUnsafe(cofactor);\n }\n isSmallOrder() {\n // can we use this.clearCofactor()?\n return this.multiplyUnsafe(cofactor).is0();\n }\n toBytes(isCompressed = true) {\n abool(isCompressed, 'isCompressed');\n this.assertValidity();\n return encodePoint(Point, this, isCompressed);\n }\n toHex(isCompressed = true) {\n return bytesToHex(this.toBytes(isCompressed));\n }\n toString() {\n return `<Point ${this.is0() ? 'ZERO' : this.toHex()}>`;\n }\n }\n const bits = Fn.BITS;\n const wnaf = new wNAF(Point, extraOpts.endo ? Math.ceil(bits / 2) : bits);\n Point.BASE.precompute(8); // Enable precomputes. Slows down first publicKey computation by 20ms.\n return Point;\n}\n// Points start with byte 0x02 when y is even; otherwise 0x03\nfunction pprefix(hasEvenY) {\n return Uint8Array.of(hasEvenY ? 0x02 : 0x03);\n}\n/**\n * Implementation of the Shallue and van de Woestijne method for any weierstrass curve.\n * TODO: check if there is a way to merge this with uvRatio in Edwards; move to modular.\n * b = True and y = sqrt(u / v) if (u / v) is square in F, and\n * b = False and y = sqrt(Z * (u / v)) otherwise.\n * @param Fp\n * @param Z\n * @returns\n */\nexport function SWUFpSqrtRatio(Fp, Z) {\n // Generic implementation\n const q = Fp.ORDER;\n let l = _0n;\n for (let o = q - _1n; o % _2n === _0n; o /= _2n)\n l += _1n;\n const c1 = l; // 1. c1, the largest integer such that 2^c1 divides q - 1.\n // We need 2n ** c1 and 2n ** (c1-1). We can't use **; but we can use <<.\n // 2n ** c1 == 2n << (c1-1)\n const _2n_pow_c1_1 = _2n << (c1 - _1n - _1n);\n const _2n_pow_c1 = _2n_pow_c1_1 * _2n;\n const c2 = (q - _1n) / _2n_pow_c1; // 2. c2 = (q - 1) / (2^c1) # Integer arithmetic\n const c3 = (c2 - _1n) / _2n; // 3. c3 = (c2 - 1) / 2 # Integer arithmetic\n const c4 = _2n_pow_c1 - _1n; // 4. c4 = 2^c1 - 1 # Integer arithmetic\n const c5 = _2n_pow_c1_1; // 5. c5 = 2^(c1 - 1) # Integer arithmetic\n const c6 = Fp.pow(Z, c2); // 6. c6 = Z^c2\n const c7 = Fp.pow(Z, (c2 + _1n) / _2n); // 7. c7 = Z^((c2 + 1) / 2)\n let sqrtRatio = (u, v) => {\n let tv1 = c6; // 1. tv1 = c6\n let tv2 = Fp.pow(v, c4); // 2. tv2 = v^c4\n let tv3 = Fp.sqr(tv2); // 3. tv3 = tv2^2\n tv3 = Fp.mul(tv3, v); // 4. tv3 = tv3 * v\n let tv5 = Fp.mul(u, tv3); // 5. tv5 = u * tv3\n tv5 = Fp.pow(tv5, c3); // 6. tv5 = tv5^c3\n tv5 = Fp.mul(tv5, tv2); // 7. tv5 = tv5 * tv2\n tv2 = Fp.mul(tv5, v); // 8. tv2 = tv5 * v\n tv3 = Fp.mul(tv5, u); // 9. tv3 = tv5 * u\n let tv4 = Fp.mul(tv3, tv2); // 10. tv4 = tv3 * tv2\n tv5 = Fp.pow(tv4, c5); // 11. tv5 = tv4^c5\n let isQR = Fp.eql(tv5, Fp.ONE); // 12. isQR = tv5 == 1\n tv2 = Fp.mul(tv3, c7); // 13. tv2 = tv3 * c7\n tv5 = Fp.mul(tv4, tv1); // 14. tv5 = tv4 * tv1\n tv3 = Fp.cmov(tv2, tv3, isQR); // 15. tv3 = CMOV(tv2, tv3, isQR)\n tv4 = Fp.cmov(tv5, tv4, isQR); // 16. tv4 = CMOV(tv5, tv4, isQR)\n // 17. for i in (c1, c1 - 1, ..., 2):\n for (let i = c1; i > _1n; i--) {\n let tv5 = i - _2n; // 18. tv5 = i - 2\n tv5 = _2n << (tv5 - _1n); // 19. tv5 = 2^tv5\n let tvv5 = Fp.pow(tv4, tv5); // 20. tv5 = tv4^tv5\n const e1 = Fp.eql(tvv5, Fp.ONE); // 21. e1 = tv5 == 1\n tv2 = Fp.mul(tv3, tv1); // 22. tv2 = tv3 * tv1\n tv1 = Fp.mul(tv1, tv1); // 23. tv1 = tv1 * tv1\n tvv5 = Fp.mul(tv4, tv1); // 24. tv5 = tv4 * tv1\n tv3 = Fp.cmov(tv2, tv3, e1); // 25. tv3 = CMOV(tv2, tv3, e1)\n tv4 = Fp.cmov(tvv5, tv4, e1); // 26. tv4 = CMOV(tv5, tv4, e1)\n }\n return { isValid: isQR, value: tv3 };\n };\n if (Fp.ORDER % _4n === _3n) {\n // sqrt_ratio_3mod4(u, v)\n const c1 = (Fp.ORDER - _3n) / _4n; // 1. c1 = (q - 3) / 4 # Integer arithmetic\n const c2 = Fp.sqrt(Fp.neg(Z)); // 2. c2 = sqrt(-Z)\n sqrtRatio = (u, v) => {\n let tv1 = Fp.sqr(v); // 1. tv1 = v^2\n const tv2 = Fp.mul(u, v); // 2. tv2 = u * v\n tv1 = Fp.mul(tv1, tv2); // 3. tv1 = tv1 * tv2\n let y1 = Fp.pow(tv1, c1); // 4. y1 = tv1^c1\n y1 = Fp.mul(y1, tv2); // 5. y1 = y1 * tv2\n const y2 = Fp.mul(y1, c2); // 6. y2 = y1 * c2\n const tv3 = Fp.mul(Fp.sqr(y1), v); // 7. tv3 = y1^2; 8. tv3 = tv3 * v\n const isQR = Fp.eql(tv3, u); // 9. isQR = tv3 == u\n let y = Fp.cmov(y2, y1, isQR); // 10. y = CMOV(y2, y1, isQR)\n return { isValid: isQR, value: y }; // 11. return (isQR, y) isQR ? y : y*c2\n };\n }\n // No curves uses that\n // if (Fp.ORDER % _8n === _5n) // sqrt_ratio_5mod8\n return sqrtRatio;\n}\n/**\n * Simplified Shallue-van de Woestijne-Ulas Method\n * https://www.rfc-editor.org/rfc/rfc9380#section-6.6.2\n */\nexport function mapToCurveSimpleSWU(Fp, opts) {\n validateField(Fp);\n const { A, B, Z } = opts;\n if (!Fp.isValid(A) || !Fp.isValid(B) || !Fp.isValid(Z))\n throw new Error('mapToCurveSimpleSWU: invalid opts');\n const sqrtRatio = SWUFpSqrtRatio(Fp, Z);\n if (!Fp.isOdd)\n throw new Error('Field does not have .isOdd()');\n // Input: u, an element of F.\n // Output: (x, y), a point on E.\n return (u) => {\n // prettier-ignore\n let tv1, tv2, tv3, tv4, tv5, tv6, x, y;\n tv1 = Fp.sqr(u); // 1. tv1 = u^2\n tv1 = Fp.mul(tv1, Z); // 2. tv1 = Z * tv1\n tv2 = Fp.sqr(tv1); // 3. tv2 = tv1^2\n tv2 = Fp.add(tv2, tv1); // 4. tv2 = tv2 + tv1\n tv3 = Fp.add(tv2, Fp.ONE); // 5. tv3 = tv2 + 1\n tv3 = Fp.mul(tv3, B); // 6. tv3 = B * tv3\n tv4 = Fp.cmov(Z, Fp.neg(tv2), !Fp.eql(tv2, Fp.ZERO)); // 7. tv4 = CMOV(Z, -tv2, tv2 != 0)\n tv4 = Fp.mul(tv4, A); // 8. tv4 = A * tv4\n tv2 = Fp.sqr(tv3); // 9. tv2 = tv3^2\n tv6 = Fp.sqr(tv4); // 10. tv6 = tv4^2\n tv5 = Fp.mul(tv6, A); // 11. tv5 = A * tv6\n tv2 = Fp.add(tv2, tv5); // 12. tv2 = tv2 + tv5\n tv2 = Fp.mul(tv2, tv3); // 13. tv2 = tv2 * tv3\n tv6 = Fp.mul(tv6, tv4); // 14. tv6 = tv6 * tv4\n tv5 = Fp.mul(tv6, B); // 15. tv5 = B * tv6\n tv2 = Fp.add(tv2, tv5); // 16. tv2 = tv2 + tv5\n x = Fp.mul(tv1, tv3); // 17. x = tv1 * tv3\n const { isValid, value } = sqrtRatio(tv2, tv6); // 18. (is_gx1_square, y1) = sqrt_ratio(tv2, tv6)\n y = Fp.mul(tv1, u); // 19. y = tv1 * u -> Z * u^3 * y1\n y = Fp.mul(y, value); // 20. y = y * y1\n x = Fp.cmov(x, tv3, isValid); // 21. x = CMOV(x, tv3, is_gx1_square)\n y = Fp.cmov(y, value, isValid); // 22. y = CMOV(y, y1, is_gx1_square)\n const e1 = Fp.isOdd(u) === Fp.isOdd(y); // 23. e1 = sgn0(u) == sgn0(y)\n y = Fp.cmov(Fp.neg(y), y, e1); // 24. y = CMOV(-y, y, e1)\n const tv4_inv = FpInvertBatch(Fp, [tv4], true)[0];\n x = Fp.mul(x, tv4_inv); // 25. x = x / tv4\n return { x, y };\n };\n}\nfunction getWLengths(Fp, Fn) {\n return {\n secretKey: Fn.BYTES,\n publicKey: 1 + Fp.BYTES,\n publicKeyUncompressed: 1 + 2 * Fp.BYTES,\n publicKeyHasPrefix: true,\n signature: 2 * Fn.BYTES,\n };\n}\n/**\n * Sometimes users only need getPublicKey, getSharedSecret, and secret key handling.\n * This helper ensures no signature functionality is present. Less code, smaller bundle size.\n */\nexport function ecdh(Point, ecdhOpts = {}) {\n const { Fn } = Point;\n const randomBytes_ = ecdhOpts.randomBytes || wcRandomBytes;\n const lengths = Object.assign(getWLengths(Point.Fp, Fn), { seed: getMinHashLength(Fn.ORDER) });\n function isValidSecretKey(secretKey) {\n try {\n const num = Fn.fromBytes(secretKey);\n return Fn.isValidNot0(num);\n }\n catch (error) {\n return false;\n }\n }\n function isValidPublicKey(publicKey, isCompressed) {\n const { publicKey: comp, publicKeyUncompressed } = lengths;\n try {\n const l = publicKey.length;\n if (isCompressed === true && l !== comp)\n return false;\n if (isCompressed === false && l !== publicKeyUncompressed)\n return false;\n return !!Point.fromBytes(publicKey);\n }\n catch (error) {\n return false;\n }\n }\n /**\n * Produces cryptographically secure secret key from random of size\n * (groupLen + ceil(groupLen / 2)) with modulo bias being negligible.\n */\n function randomSecretKey(seed = randomBytes_(lengths.seed)) {\n return mapHashToField(abytes(seed, lengths.seed, 'seed'), Fn.ORDER);\n }\n /**\n * Computes public key for a secret key. Checks for validity of the secret key.\n * @param isCompressed whether to return compact (default), or full key\n * @returns Public key, full when isCompressed=false; short when isCompressed=true\n */\n function getPublicKey(secretKey, isCompressed = true) {\n return Point.BASE.multiply(Fn.fromBytes(secretKey)).toBytes(isCompressed);\n }\n /**\n * Quick and dirty check for item being public key. Does not validate hex, or being on-curve.\n */\n function isProbPub(item) {\n const { secretKey, publicKey, publicKeyUncompressed } = lengths;\n if (!isBytes(item))\n return undefined;\n if (('_lengths' in Fn && Fn._lengths) || secretKey === publicKey)\n return undefined;\n const l = abytes(item, undefined, 'key').length;\n return l === publicKey || l === publicKeyUncompressed;\n }\n /**\n * ECDH (Elliptic Curve Diffie Hellman).\n * Computes shared public key from secret key A and public key B.\n * Checks: 1) secret key validity 2) shared key is on-curve.\n * Does NOT hash the result.\n * @param isCompressed whether to return compact (default), or full key\n * @returns shared public key\n */\n function getSharedSecret(secretKeyA, publicKeyB, isCompressed = true) {\n if (isProbPub(secretKeyA) === true)\n throw new Error('first arg must be private key');\n if (isProbPub(publicKeyB) === false)\n throw new Error('second arg must be public key');\n const s = Fn.fromBytes(secretKeyA);\n const b = Point.fromBytes(publicKeyB); // checks for being on-curve\n return b.multiply(s).toBytes(isCompressed);\n }\n const utils = {\n isValidSecretKey,\n isValidPublicKey,\n randomSecretKey,\n };\n const keygen = createKeygen(randomSecretKey, getPublicKey);\n return Object.freeze({ getPublicKey, getSharedSecret, keygen, Point, utils, lengths });\n}\n/**\n * Creates ECDSA signing interface for given elliptic curve `Point` and `hash` function.\n *\n * @param Point created using {@link weierstrass} function\n * @param hash used for 1) message prehash-ing 2) k generation in `sign`, using hmac_drbg(hash)\n * @param ecdsaOpts rarely needed, see {@link ECDSAOpts}\n *\n * @example\n * ```js\n * const p256_Point = weierstrass(...);\n * const p256_sha256 = ecdsa(p256_Point, sha256);\n * const p256_sha224 = ecdsa(p256_Point, sha224);\n * const p256_sha224_r = ecdsa(p256_Point, sha224, { randomBytes: (length) => { ... } });\n * ```\n */\nexport function ecdsa(Point, hash, ecdsaOpts = {}) {\n ahash(hash);\n validateObject(ecdsaOpts, {}, {\n hmac: 'function',\n lowS: 'boolean',\n randomBytes: 'function',\n bits2int: 'function',\n bits2int_modN: 'function',\n });\n ecdsaOpts = Object.assign({}, ecdsaOpts);\n const randomBytes = ecdsaOpts.randomBytes || wcRandomBytes;\n const hmac = ecdsaOpts.hmac || ((key, msg) => nobleHmac(hash, key, msg));\n const { Fp, Fn } = Point;\n const { ORDER: CURVE_ORDER, BITS: fnBits } = Fn;\n const { keygen, getPublicKey, getSharedSecret, utils, lengths } = ecdh(Point, ecdsaOpts);\n const defaultSigOpts = {\n prehash: true,\n lowS: typeof ecdsaOpts.lowS === 'boolean' ? ecdsaOpts.lowS : true,\n format: 'compact',\n extraEntropy: false,\n };\n const hasLargeCofactor = CURVE_ORDER * _2n < Fp.ORDER; // Won't CURVE().h > 2n be more effective?\n function isBiggerThanHalfOrder(number) {\n const HALF = CURVE_ORDER >> _1n;\n return number > HALF;\n }\n function validateRS(title, num) {\n if (!Fn.isValidNot0(num))\n throw new Error(`invalid signature ${title}: out of range 1..Point.Fn.ORDER`);\n return num;\n }\n function assertSmallCofactor() {\n // ECDSA recovery is hard for cofactor > 1 curves.\n // In sign, `r = q.x mod n`, and here we recover q.x from r.\n // While recovering q.x >= n, we need to add r+n for cofactor=1 curves.\n // However, for cofactor>1, r+n may not get q.x:\n // r+n*i would need to be done instead where i is unknown.\n // To easily get i, we either need to:\n // a. increase amount of valid recid values (4, 5...); OR\n // b. prohibit non-prime-order signatures (recid > 1).\n if (hasLargeCofactor)\n throw new Error('\"recovered\" sig type is not supported for cofactor >2 curves');\n }\n function validateSigLength(bytes, format) {\n validateSigFormat(format);\n const size = lengths.signature;\n const sizer = format === 'compact' ? size : format === 'recovered' ? size + 1 : undefined;\n return abytes(bytes, sizer);\n }\n /**\n * ECDSA signature with its (r, s) properties. Supports compact, recovered & DER representations.\n */\n class Signature {\n r;\n s;\n recovery;\n constructor(r, s, recovery) {\n this.r = validateRS('r', r); // r in [1..N-1];\n this.s = validateRS('s', s); // s in [1..N-1];\n if (recovery != null) {\n assertSmallCofactor();\n if (![0, 1, 2, 3].includes(recovery))\n throw new Error('invalid recovery id');\n this.recovery = recovery;\n }\n Object.freeze(this);\n }\n static fromBytes(bytes, format = defaultSigOpts.format) {\n validateSigLength(bytes, format);\n let recid;\n if (format === 'der') {\n const { r, s } = DER.toSig(abytes(bytes));\n return new Signature(r, s);\n }\n if (format === 'recovered') {\n recid = bytes[0];\n format = 'compact';\n bytes = bytes.subarray(1);\n }\n const L = lengths.signature / 2;\n const r = bytes.subarray(0, L);\n const s = bytes.subarray(L, L * 2);\n return new Signature(Fn.fromBytes(r), Fn.fromBytes(s), recid);\n }\n static fromHex(hex, format) {\n return this.fromBytes(hexToBytes(hex), format);\n }\n assertRecovery() {\n const { recovery } = this;\n if (recovery == null)\n throw new Error('invalid recovery id: must be present');\n return recovery;\n }\n addRecoveryBit(recovery) {\n return new Signature(this.r, this.s, recovery);\n }\n recoverPublicKey(messageHash) {\n const { r, s } = this;\n const recovery = this.assertRecovery();\n const radj = recovery === 2 || recovery === 3 ? r + CURVE_ORDER : r;\n if (!Fp.isValid(radj))\n throw new Error('invalid recovery id: sig.r+curve.n != R.x');\n const x = Fp.toBytes(radj);\n const R = Point.fromBytes(concatBytes(pprefix((recovery & 1) === 0), x));\n const ir = Fn.inv(radj); // r^-1\n const h = bits2int_modN(abytes(messageHash, undefined, 'msgHash')); // Truncate hash\n const u1 = Fn.create(-h * ir); // -hr^-1\n const u2 = Fn.create(s * ir); // sr^-1\n // (sr^-1)R-(hr^-1)G = -(hr^-1)G + (sr^-1). unsafe is fine: there is no private data.\n const Q = Point.BASE.multiplyUnsafe(u1).add(R.multiplyUnsafe(u2));\n if (Q.is0())\n throw new Error('invalid recovery: point at infinify');\n Q.assertValidity();\n return Q;\n }\n // Signatures should be low-s, to prevent malleability.\n hasHighS() {\n return isBiggerThanHalfOrder(this.s);\n }\n toBytes(format = defaultSigOpts.format) {\n validateSigFormat(format);\n if (format === 'der')\n return hexToBytes(DER.hexFromSig(this));\n const { r, s } = this;\n const rb = Fn.toBytes(r);\n const sb = Fn.toBytes(s);\n if (format === 'recovered') {\n assertSmallCofactor();\n return concatBytes(Uint8Array.of(this.assertRecovery()), rb, sb);\n }\n return concatBytes(rb, sb);\n }\n toHex(format) {\n return bytesToHex(this.toBytes(format));\n }\n }\n // RFC6979: ensure ECDSA msg is X bytes and < N. RFC suggests optional truncating via bits2octets.\n // FIPS 186-4 4.6 suggests the leftmost min(nBitLen, outLen) bits, which matches bits2int.\n // bits2int can produce res>N, we can do mod(res, N) since the bitLen is the same.\n // int2octets can't be used; pads small msgs with 0: unacceptatble for trunc as per RFC vectors\n const bits2int = ecdsaOpts.bits2int ||\n function bits2int_def(bytes) {\n // Our custom check \"just in case\", for protection against DoS\n if (bytes.length > 8192)\n throw new Error('input is too large');\n // For curves with nBitLength % 8 !== 0: bits2octets(bits2octets(m)) !== bits2octets(m)\n // for some cases, since bytes.length * 8 is not actual bitLength.\n const num = bytesToNumberBE(bytes); // check for == u8 done here\n const delta = bytes.length * 8 - fnBits; // truncate to nBitLength leftmost bits\n return delta > 0 ? num >> BigInt(delta) : num;\n };\n const bits2int_modN = ecdsaOpts.bits2int_modN ||\n function bits2int_modN_def(bytes) {\n return Fn.create(bits2int(bytes)); // can't use bytesToNumberBE here\n };\n // Pads output with zero as per spec\n const ORDER_MASK = bitMask(fnBits);\n /** Converts to bytes. Checks if num in `[0..ORDER_MASK-1]` e.g.: `[0..2^256-1]`. */\n function int2octets(num) {\n // IMPORTANT: the check ensures working for case `Fn.BYTES != Fn.BITS * 8`\n aInRange('num < 2^' + fnBits, num, _0n, ORDER_MASK);\n return Fn.toBytes(num);\n }\n function validateMsgAndHash(message, prehash) {\n abytes(message, undefined, 'message');\n return prehash ? abytes(hash(message), undefined, 'prehashed message') : message;\n }\n /**\n * Steps A, D of RFC6979 3.2.\n * Creates RFC6979 seed; converts msg/privKey to numbers.\n * Used only in sign, not in verify.\n *\n * Warning: we cannot assume here that message has same amount of bytes as curve order,\n * this will be invalid at least for P521. Also it can be bigger for P224 + SHA256.\n */\n function prepSig(message, secretKey, opts) {\n const { lowS, prehash, extraEntropy } = validateSigOpts(opts, defaultSigOpts);\n message = validateMsgAndHash(message, prehash); // RFC6979 3.2 A: h1 = H(m)\n // We can't later call bits2octets, since nested bits2int is broken for curves\n // with fnBits % 8 !== 0. Because of that, we unwrap it here as int2octets call.\n // const bits2octets = (bits) => int2octets(bits2int_modN(bits))\n const h1int = bits2int_modN(message);\n const d = Fn.fromBytes(secretKey); // validate secret key, convert to bigint\n if (!Fn.isValidNot0(d))\n throw new Error('invalid private key');\n const seedArgs = [int2octets(d), int2octets(h1int)];\n // extraEntropy. RFC6979 3.6: additional k' (optional).\n if (extraEntropy != null && extraEntropy !== false) {\n // K = HMAC_K(V || 0x00 || int2octets(x) || bits2octets(h1) || k')\n // gen random bytes OR pass as-is\n const e = extraEntropy === true ? randomBytes(lengths.secretKey) : extraEntropy;\n seedArgs.push(abytes(e, undefined, 'extraEntropy')); // check for being bytes\n }\n const seed = concatBytes(...seedArgs); // Step D of RFC6979 3.2\n const m = h1int; // no need to call bits2int second time here, it is inside truncateHash!\n // Converts signature params into point w r/s, checks result for validity.\n // To transform k => Signature:\n // q = k⋅G\n // r = q.x mod n\n // s = k^-1(m + rd) mod n\n // Can use scalar blinding b^-1(bm + bdr) where b ∈ [1,q−1] according to\n // https://tches.iacr.org/index.php/TCHES/article/view/7337/6509. We've decided against it:\n // a) dependency on CSPRNG b) 15% slowdown c) doesn't really help since bigints are not CT\n function k2sig(kBytes) {\n // RFC 6979 Section 3.2, step 3: k = bits2int(T)\n // Important: all mod() calls here must be done over N\n const k = bits2int(kBytes); // Cannot use fields methods, since it is group element\n if (!Fn.isValidNot0(k))\n return; // Valid scalars (including k) must be in 1..N-1\n const ik = Fn.inv(k); // k^-1 mod n\n const q = Point.BASE.multiply(k).toAffine(); // q = k⋅G\n const r = Fn.create(q.x); // r = q.x mod n\n if (r === _0n)\n return;\n const s = Fn.create(ik * Fn.create(m + r * d)); // s = k^-1(m + rd) mod n\n if (s === _0n)\n return;\n let recovery = (q.x === r ? 0 : 2) | Number(q.y & _1n); // recovery bit (2 or 3 when q.x>n)\n let normS = s;\n if (lowS && isBiggerThanHalfOrder(s)) {\n normS = Fn.neg(s); // if lowS was passed, ensure s is always in the bottom half of N\n recovery ^= 1;\n }\n return new Signature(r, normS, hasLargeCofactor ? undefined : recovery);\n }\n return { seed, k2sig };\n }\n /**\n * Signs message hash with a secret key.\n *\n * ```\n * sign(m, d) where\n * k = rfc6979_hmac_drbg(m, d)\n * (x, y) = G × k\n * r = x mod n\n * s = (m + dr) / k mod n\n * ```\n */\n function sign(message, secretKey, opts = {}) {\n const { seed, k2sig } = prepSig(message, secretKey, opts); // Steps A, D of RFC6979 3.2.\n const drbg = createHmacDrbg(hash.outputLen, Fn.BYTES, hmac);\n const sig = drbg(seed, k2sig); // Steps B, C, D, E, F, G\n return sig.toBytes(opts.format);\n }\n /**\n * Verifies a signature against message and public key.\n * Rejects lowS signatures by default: see {@link ECDSAVerifyOpts}.\n * Implements section 4.1.4 from https://www.secg.org/sec1-v2.pdf:\n *\n * ```\n * verify(r, s, h, P) where\n * u1 = hs^-1 mod n\n * u2 = rs^-1 mod n\n * R = u1⋅G + u2⋅P\n * mod(R.x, n) == r\n * ```\n */\n function verify(signature, message, publicKey, opts = {}) {\n const { lowS, prehash, format } = validateSigOpts(opts, defaultSigOpts);\n publicKey = abytes(publicKey, undefined, 'publicKey');\n message = validateMsgAndHash(message, prehash);\n if (!isBytes(signature)) {\n const end = signature instanceof Signature ? ', use sig.toBytes()' : '';\n throw new Error('verify expects Uint8Array signature' + end);\n }\n validateSigLength(signature, format); // execute this twice because we want loud error\n try {\n const sig = Signature.fromBytes(signature, format);\n const P = Point.fromBytes(publicKey);\n if (lowS && sig.hasHighS())\n return false;\n const { r, s } = sig;\n const h = bits2int_modN(message); // mod n, not mod p\n const is = Fn.inv(s); // s^-1 mod n\n const u1 = Fn.create(h * is); // u1 = hs^-1 mod n\n const u2 = Fn.create(r * is); // u2 = rs^-1 mod n\n const R = Point.BASE.multiplyUnsafe(u1).add(P.multiplyUnsafe(u2)); // u1⋅G + u2⋅P\n if (R.is0())\n return false;\n const v = Fn.create(R.x); // v = r.x mod n\n return v === r;\n }\n catch (e) {\n return false;\n }\n }\n function recoverPublicKey(signature, message, opts = {}) {\n const { prehash } = validateSigOpts(opts, defaultSigOpts);\n message = validateMsgAndHash(message, prehash);\n return Signature.fromBytes(signature, 'recovered').recoverPublicKey(message).toBytes();\n }\n return Object.freeze({\n keygen,\n getPublicKey,\n getSharedSecret,\n utils,\n lengths,\n Point,\n sign,\n verify,\n recoverPublicKey,\n Signature,\n hash,\n });\n}\n//# sourceMappingURL=weierstrass.js.map","/**\n * SECG secp256k1. See [pdf](https://www.secg.org/sec2-v2.pdf).\n *\n * Belongs to Koblitz curves: it has efficiently-computable GLV endomorphism ψ,\n * check out {@link EndomorphismOpts}. Seems to be rigid (not backdoored).\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { sha256 } from '@noble/hashes/sha2.js';\nimport { randomBytes } from '@noble/hashes/utils.js';\nimport { createKeygen } from \"./abstract/curve.js\";\nimport { createHasher, isogenyMap } from \"./abstract/hash-to-curve.js\";\nimport { Field, mapHashToField, pow2 } from \"./abstract/modular.js\";\nimport { ecdsa, mapToCurveSimpleSWU, weierstrass, } from \"./abstract/weierstrass.js\";\nimport { abytes, asciiToBytes, bytesToNumberBE, concatBytes } from \"./utils.js\";\n// Seems like generator was produced from some seed:\n// `Pointk1.BASE.multiply(Pointk1.Fn.inv(2n, N)).toAffine().x`\n// // gives short x 0x3b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63n\nconst secp256k1_CURVE = {\n p: BigInt('0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f'),\n n: BigInt('0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141'),\n h: BigInt(1),\n a: BigInt(0),\n b: BigInt(7),\n Gx: BigInt('0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798'),\n Gy: BigInt('0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8'),\n};\nconst secp256k1_ENDO = {\n beta: BigInt('0x7ae96a2b657c07106e64479eac3434e99cf0497512f58995c1396c28719501ee'),\n basises: [\n [BigInt('0x3086d221a7d46bcde86c90e49284eb15'), -BigInt('0xe4437ed6010e88286f547fa90abfe4c3')],\n [BigInt('0x114ca50f7a8e2f3f657c1108d9d44cfd8'), BigInt('0x3086d221a7d46bcde86c90e49284eb15')],\n ],\n};\nconst _0n = /* @__PURE__ */ BigInt(0);\nconst _2n = /* @__PURE__ */ BigInt(2);\n/**\n * √n = n^((p+1)/4) for fields p = 3 mod 4. We unwrap the loop and multiply bit-by-bit.\n * (P+1n/4n).toString(2) would produce bits [223x 1, 0, 22x 1, 4x 0, 11, 00]\n */\nfunction sqrtMod(y) {\n const P = secp256k1_CURVE.p;\n // prettier-ignore\n const _3n = BigInt(3), _6n = BigInt(6), _11n = BigInt(11), _22n = BigInt(22);\n // prettier-ignore\n const _23n = BigInt(23), _44n = BigInt(44), _88n = BigInt(88);\n const b2 = (y * y * y) % P; // x^3, 11\n const b3 = (b2 * b2 * y) % P; // x^7\n const b6 = (pow2(b3, _3n, P) * b3) % P;\n const b9 = (pow2(b6, _3n, P) * b3) % P;\n const b11 = (pow2(b9, _2n, P) * b2) % P;\n const b22 = (pow2(b11, _11n, P) * b11) % P;\n const b44 = (pow2(b22, _22n, P) * b22) % P;\n const b88 = (pow2(b44, _44n, P) * b44) % P;\n const b176 = (pow2(b88, _88n, P) * b88) % P;\n const b220 = (pow2(b176, _44n, P) * b44) % P;\n const b223 = (pow2(b220, _3n, P) * b3) % P;\n const t1 = (pow2(b223, _23n, P) * b22) % P;\n const t2 = (pow2(t1, _6n, P) * b2) % P;\n const root = pow2(t2, _2n, P);\n if (!Fpk1.eql(Fpk1.sqr(root), y))\n throw new Error('Cannot find square root');\n return root;\n}\nconst Fpk1 = Field(secp256k1_CURVE.p, { sqrt: sqrtMod });\nconst Pointk1 = /* @__PURE__ */ weierstrass(secp256k1_CURVE, {\n Fp: Fpk1,\n endo: secp256k1_ENDO,\n});\n/**\n * secp256k1 curve: ECDSA and ECDH methods.\n *\n * Uses sha256 to hash messages. To use a different hash,\n * pass `{ prehash: false }` to sign / verify.\n *\n * @example\n * ```js\n * import { secp256k1 } from '@noble/curves/secp256k1.js';\n * const { secretKey, publicKey } = secp256k1.keygen();\n * // const publicKey = secp256k1.getPublicKey(secretKey);\n * const msg = new TextEncoder().encode('hello noble');\n * const sig = secp256k1.sign(msg, secretKey);\n * const isValid = secp256k1.verify(sig, msg, publicKey);\n * // const sigKeccak = secp256k1.sign(keccak256(msg), secretKey, { prehash: false });\n * ```\n */\nexport const secp256k1 = /* @__PURE__ */ ecdsa(Pointk1, sha256);\n// Schnorr signatures are superior to ECDSA from above. Below is Schnorr-specific BIP0340 code.\n// https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki\n/** An object mapping tags to their tagged hash prefix of [SHA256(tag) | SHA256(tag)] */\nconst TAGGED_HASH_PREFIXES = {};\nfunction taggedHash(tag, ...messages) {\n let tagP = TAGGED_HASH_PREFIXES[tag];\n if (tagP === undefined) {\n const tagH = sha256(asciiToBytes(tag));\n tagP = concatBytes(tagH, tagH);\n TAGGED_HASH_PREFIXES[tag] = tagP;\n }\n return sha256(concatBytes(tagP, ...messages));\n}\n// ECDSA compact points are 33-byte. Schnorr is 32: we strip first byte 0x02 or 0x03\nconst pointToBytes = (point) => point.toBytes(true).slice(1);\nconst hasEven = (y) => y % _2n === _0n;\n// Calculate point, scalar and bytes\nfunction schnorrGetExtPubKey(priv) {\n const { Fn, BASE } = Pointk1;\n const d_ = Fn.fromBytes(priv);\n const p = BASE.multiply(d_); // P = d'⋅G; 0 < d' < n check is done inside\n const scalar = hasEven(p.y) ? d_ : Fn.neg(d_);\n return { scalar, bytes: pointToBytes(p) };\n}\n/**\n * lift_x from BIP340. Convert 32-byte x coordinate to elliptic curve point.\n * @returns valid point checked for being on-curve\n */\nfunction lift_x(x) {\n const Fp = Fpk1;\n if (!Fp.isValidNot0(x))\n throw new Error('invalid x: Fail if x ≥ p');\n const xx = Fp.create(x * x);\n const c = Fp.create(xx * x + BigInt(7)); // Let c = x³ + 7 mod p.\n let y = Fp.sqrt(c); // Let y = c^(p+1)/4 mod p. Same as sqrt().\n // Return the unique point P such that x(P) = x and\n // y(P) = y if y mod 2 = 0 or y(P) = p-y otherwise.\n if (!hasEven(y))\n y = Fp.neg(y);\n const p = Pointk1.fromAffine({ x, y });\n p.assertValidity();\n return p;\n}\nconst num = bytesToNumberBE;\n/**\n * Create tagged hash, convert it to bigint, reduce modulo-n.\n */\nfunction challenge(...args) {\n return Pointk1.Fn.create(num(taggedHash('BIP0340/challenge', ...args)));\n}\n/**\n * Schnorr public key is just `x` coordinate of Point as per BIP340.\n */\nfunction schnorrGetPublicKey(secretKey) {\n return schnorrGetExtPubKey(secretKey).bytes; // d'=int(sk). Fail if d'=0 or d'≥n. Ret bytes(d'⋅G)\n}\n/**\n * Creates Schnorr signature as per BIP340. Verifies itself before returning anything.\n * auxRand is optional and is not the sole source of k generation: bad CSPRNG won't be dangerous.\n */\nfunction schnorrSign(message, secretKey, auxRand = randomBytes(32)) {\n const { Fn } = Pointk1;\n const m = abytes(message, undefined, 'message');\n const { bytes: px, scalar: d } = schnorrGetExtPubKey(secretKey); // checks for isWithinCurveOrder\n const a = abytes(auxRand, 32, 'auxRand'); // Auxiliary random data a: a 32-byte array\n const t = Fn.toBytes(d ^ num(taggedHash('BIP0340/aux', a))); // Let t be the byte-wise xor of bytes(d) and hash/aux(a)\n const rand = taggedHash('BIP0340/nonce', t, px, m); // Let rand = hash/nonce(t || bytes(P) || m)\n // Let k' = int(rand) mod n. Fail if k' = 0. Let R = k'⋅G\n const { bytes: rx, scalar: k } = schnorrGetExtPubKey(rand);\n const e = challenge(rx, px, m); // Let e = int(hash/challenge(bytes(R) || bytes(P) || m)) mod n.\n const sig = new Uint8Array(64); // Let sig = bytes(R) || bytes((k + ed) mod n).\n sig.set(rx, 0);\n sig.set(Fn.toBytes(Fn.create(k + e * d)), 32);\n // If Verify(bytes(P), m, sig) (see below) returns failure, abort\n if (!schnorrVerify(sig, m, px))\n throw new Error('sign: Invalid signature produced');\n return sig;\n}\n/**\n * Verifies Schnorr signature.\n * Will swallow errors & return false except for initial type validation of arguments.\n */\nfunction schnorrVerify(signature, message, publicKey) {\n const { Fp, Fn, BASE } = Pointk1;\n const sig = abytes(signature, 64, 'signature');\n const m = abytes(message, undefined, 'message');\n const pub = abytes(publicKey, 32, 'publicKey');\n try {\n const P = lift_x(num(pub)); // P = lift_x(int(pk)); fail if that fails\n const r = num(sig.subarray(0, 32)); // Let r = int(sig[0:32]); fail if r ≥ p.\n if (!Fp.isValidNot0(r))\n return false;\n const s = num(sig.subarray(32, 64)); // Let s = int(sig[32:64]); fail if s ≥ n.\n if (!Fn.isValidNot0(s))\n return false;\n const e = challenge(Fn.toBytes(r), pointToBytes(P), m); // int(challenge(bytes(r)||bytes(P)||m))%n\n // R = s⋅G - e⋅P, where -eP == (n-e)P\n const R = BASE.multiplyUnsafe(s).add(P.multiplyUnsafe(Fn.neg(e)));\n const { x, y } = R.toAffine();\n // Fail if is_infinite(R) / not has_even_y(R) / x(R) ≠ r.\n if (R.is0() || !hasEven(y) || x !== r)\n return false;\n return true;\n }\n catch (error) {\n return false;\n }\n}\n/**\n * Schnorr signatures over secp256k1.\n * https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki\n * @example\n * ```js\n * import { schnorr } from '@noble/curves/secp256k1.js';\n * const { secretKey, publicKey } = schnorr.keygen();\n * // const publicKey = schnorr.getPublicKey(secretKey);\n * const msg = new TextEncoder().encode('hello');\n * const sig = schnorr.sign(msg, secretKey);\n * const isValid = schnorr.verify(sig, msg, publicKey);\n * ```\n */\nexport const schnorr = /* @__PURE__ */ (() => {\n const size = 32;\n const seedLength = 48;\n const randomSecretKey = (seed = randomBytes(seedLength)) => {\n return mapHashToField(seed, secp256k1_CURVE.n);\n };\n return {\n keygen: createKeygen(randomSecretKey, schnorrGetPublicKey),\n getPublicKey: schnorrGetPublicKey,\n sign: schnorrSign,\n verify: schnorrVerify,\n Point: Pointk1,\n utils: {\n randomSecretKey,\n taggedHash,\n lift_x,\n pointToBytes,\n },\n lengths: {\n secretKey: size,\n publicKey: size,\n publicKeyHasPrefix: false,\n signature: size * 2,\n seed: seedLength,\n },\n };\n})();\nconst isoMap = /* @__PURE__ */ (() => isogenyMap(Fpk1, [\n // xNum\n [\n '0x8e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38daaaaa8c7',\n '0x7d3d4c80bc321d5b9f315cea7fd44c5d595d2fc0bf63b92dfff1044f17c6581',\n '0x534c328d23f234e6e2a413deca25caece4506144037c40314ecbd0b53d9dd262',\n '0x8e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38daaaaa88c',\n ],\n // xDen\n [\n '0xd35771193d94918a9ca34ccbb7b640dd86cd409542f8487d9fe6b745781eb49b',\n '0xedadc6f64383dc1df7c4b2d51b54225406d36b641f5e41bbc52a56612a8c6d14',\n '0x0000000000000000000000000000000000000000000000000000000000000001', // LAST 1\n ],\n // yNum\n [\n '0x4bda12f684bda12f684bda12f684bda12f684bda12f684bda12f684b8e38e23c',\n '0xc75e0c32d5cb7c0fa9d0a54b12a0a6d5647ab046d686da6fdffc90fc201d71a3',\n '0x29a6194691f91a73715209ef6512e576722830a201be2018a765e85a9ecee931',\n '0x2f684bda12f684bda12f684bda12f684bda12f684bda12f684bda12f38e38d84',\n ],\n // yDen\n [\n '0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffff93b',\n '0x7a06534bb8bdb49fd5e9e6632722c2989467c1bfc8e8d978dfb425d2685c2573',\n '0x6484aa716545ca2cf3a70c3fa8fe337e0a3d21162f0d6299a7bf8192bfd2a76f',\n '0x0000000000000000000000000000000000000000000000000000000000000001', // LAST 1\n ],\n].map((i) => i.map((j) => BigInt(j)))))();\nconst mapSWU = /* @__PURE__ */ (() => mapToCurveSimpleSWU(Fpk1, {\n A: BigInt('0x3f8731abdd661adca08a5558f0f5d272e953d363cb6f0e5d405447c01a444533'),\n B: BigInt('1771'),\n Z: Fpk1.create(BigInt('-11')),\n}))();\n/** Hashing / encoding to secp256k1 points / field. RFC 9380 methods. */\nexport const secp256k1_hasher = /* @__PURE__ */ (() => createHasher(Pointk1, (scalars) => {\n const { x, y } = mapSWU(Fpk1.create(scalars[0]));\n return isoMap(x, y);\n}, {\n DST: 'secp256k1_XMD:SHA-256_SSWU_RO_',\n encodeDST: 'secp256k1_XMD:SHA-256_SSWU_NU_',\n p: Fpk1.ORDER,\n m: 1,\n k: 128,\n expand: 'xmd',\n hash: sha256,\n}))();\n//# sourceMappingURL=secp256k1.js.map","/**\n * Utilities for hex, bytes, CSPRNG.\n * @module\n */\n/*! noble-hashes - MIT License (c) 2022 Paul Miller (paulmillr.com) */\n// We use WebCrypto aka globalThis.crypto, which exists in browsers and node.js 16+.\n// node.js versions earlier than v19 don't declare it in global scope.\n// For node.js, package.json#exports field mapping rewrites import\n// from `crypto` to `cryptoNode`, which imports native module.\n// Makes the utils un-importable in browsers without a bundler.\n// Once node.js 18 is deprecated (2025-04-30), we can just drop the import.\nimport { crypto } from '@noble/hashes/crypto';\n/** Checks if something is Uint8Array. Be careful: nodejs Buffer will return true. */\nexport function isBytes(a) {\n return a instanceof Uint8Array || (ArrayBuffer.isView(a) && a.constructor.name === 'Uint8Array');\n}\n/** Asserts something is positive integer. */\nexport function anumber(n) {\n if (!Number.isSafeInteger(n) || n < 0)\n throw new Error('positive integer expected, got ' + n);\n}\n/** Asserts something is Uint8Array. */\nexport function abytes(b, ...lengths) {\n if (!isBytes(b))\n throw new Error('Uint8Array expected');\n if (lengths.length > 0 && !lengths.includes(b.length))\n throw new Error('Uint8Array expected of length ' + lengths + ', got length=' + b.length);\n}\n/** Asserts something is hash */\nexport function ahash(h) {\n if (typeof h !== 'function' || typeof h.create !== 'function')\n throw new Error('Hash should be wrapped by utils.createHasher');\n anumber(h.outputLen);\n anumber(h.blockLen);\n}\n/** Asserts a hash instance has not been destroyed / finished */\nexport function aexists(instance, checkFinished = true) {\n if (instance.destroyed)\n throw new Error('Hash instance has been destroyed');\n if (checkFinished && instance.finished)\n throw new Error('Hash#digest() has already been called');\n}\n/** Asserts output is properly-sized byte array */\nexport function aoutput(out, instance) {\n abytes(out);\n const min = instance.outputLen;\n if (out.length < min) {\n throw new Error('digestInto() expects output buffer of length at least ' + min);\n }\n}\n/** Cast u8 / u16 / u32 to u8. */\nexport function u8(arr) {\n return new Uint8Array(arr.buffer, arr.byteOffset, arr.byteLength);\n}\n/** Cast u8 / u16 / u32 to u32. */\nexport function u32(arr) {\n return new Uint32Array(arr.buffer, arr.byteOffset, Math.floor(arr.byteLength / 4));\n}\n/** Zeroize a byte array. Warning: JS provides no guarantees. */\nexport function clean(...arrays) {\n for (let i = 0; i < arrays.length; i++) {\n arrays[i].fill(0);\n }\n}\n/** Create DataView of an array for easy byte-level manipulation. */\nexport function createView(arr) {\n return new DataView(arr.buffer, arr.byteOffset, arr.byteLength);\n}\n/** The rotate right (circular right shift) operation for uint32 */\nexport function rotr(word, shift) {\n return (word << (32 - shift)) | (word >>> shift);\n}\n/** The rotate left (circular left shift) operation for uint32 */\nexport function rotl(word, shift) {\n return (word << shift) | ((word >>> (32 - shift)) >>> 0);\n}\n/** Is current platform little-endian? Most are. Big-Endian platform: IBM */\nexport const isLE = /* @__PURE__ */ (() => new Uint8Array(new Uint32Array([0x11223344]).buffer)[0] === 0x44)();\n/** The byte swap operation for uint32 */\nexport function byteSwap(word) {\n return (((word << 24) & 0xff000000) |\n ((word << 8) & 0xff0000) |\n ((word >>> 8) & 0xff00) |\n ((word >>> 24) & 0xff));\n}\n/** Conditionally byte swap if on a big-endian platform */\nexport const swap8IfBE = isLE\n ? (n) => n\n : (n) => byteSwap(n);\n/** @deprecated */\nexport const byteSwapIfBE = swap8IfBE;\n/** In place byte swap for Uint32Array */\nexport function byteSwap32(arr) {\n for (let i = 0; i < arr.length; i++) {\n arr[i] = byteSwap(arr[i]);\n }\n return arr;\n}\nexport const swap32IfBE = isLE\n ? (u) => u\n : byteSwap32;\n// Built-in hex conversion https://caniuse.com/mdn-javascript_builtins_uint8array_fromhex\nconst hasHexBuiltin = /* @__PURE__ */ (() => \n// @ts-ignore\ntypeof Uint8Array.from([]).toHex === 'function' && typeof Uint8Array.fromHex === 'function')();\n// Array where index 0xf0 (240) is mapped to string 'f0'\nconst hexes = /* @__PURE__ */ Array.from({ length: 256 }, (_, i) => i.toString(16).padStart(2, '0'));\n/**\n * Convert byte array to hex string. Uses built-in function, when available.\n * @example bytesToHex(Uint8Array.from([0xca, 0xfe, 0x01, 0x23])) // 'cafe0123'\n */\nexport function bytesToHex(bytes) {\n abytes(bytes);\n // @ts-ignore\n if (hasHexBuiltin)\n return bytes.toHex();\n // pre-caching improves the speed 6x\n let hex = '';\n for (let i = 0; i < bytes.length; i++) {\n hex += hexes[bytes[i]];\n }\n return hex;\n}\n// We use optimized technique to convert hex string to byte array\nconst asciis = { _0: 48, _9: 57, A: 65, F: 70, a: 97, f: 102 };\nfunction asciiToBase16(ch) {\n if (ch >= asciis._0 && ch <= asciis._9)\n return ch - asciis._0; // '2' => 50-48\n if (ch >= asciis.A && ch <= asciis.F)\n return ch - (asciis.A - 10); // 'B' => 66-(65-10)\n if (ch >= asciis.a && ch <= asciis.f)\n return ch - (asciis.a - 10); // 'b' => 98-(97-10)\n return;\n}\n/**\n * Convert hex string to byte array. Uses built-in function, when available.\n * @example hexToBytes('cafe0123') // Uint8Array.from([0xca, 0xfe, 0x01, 0x23])\n */\nexport function hexToBytes(hex) {\n if (typeof hex !== 'string')\n throw new Error('hex string expected, got ' + typeof hex);\n // @ts-ignore\n if (hasHexBuiltin)\n return Uint8Array.fromHex(hex);\n const hl = hex.length;\n const al = hl / 2;\n if (hl % 2)\n throw new Error('hex string expected, got unpadded hex of length ' + hl);\n const array = new Uint8Array(al);\n for (let ai = 0, hi = 0; ai < al; ai++, hi += 2) {\n const n1 = asciiToBase16(hex.charCodeAt(hi));\n const n2 = asciiToBase16(hex.charCodeAt(hi + 1));\n if (n1 === undefined || n2 === undefined) {\n const char = hex[hi] + hex[hi + 1];\n throw new Error('hex string expected, got non-hex character \"' + char + '\" at index ' + hi);\n }\n array[ai] = n1 * 16 + n2; // multiply first octet, e.g. 'a3' => 10*16+3 => 160 + 3 => 163\n }\n return array;\n}\n/**\n * There is no setImmediate in browser and setTimeout is slow.\n * Call of async fn will return Promise, which will be fullfiled only on\n * next scheduler queue processing step and this is exactly what we need.\n */\nexport const nextTick = async () => { };\n/** Returns control to thread each 'tick' ms to avoid blocking. */\nexport async function asyncLoop(iters, tick, cb) {\n let ts = Date.now();\n for (let i = 0; i < iters; i++) {\n cb(i);\n // Date.now() is not monotonic, so in case if clock goes backwards we return return control too\n const diff = Date.now() - ts;\n if (diff >= 0 && diff < tick)\n continue;\n await nextTick();\n ts += diff;\n }\n}\n/**\n * Converts string to bytes using UTF8 encoding.\n * @example utf8ToBytes('abc') // Uint8Array.from([97, 98, 99])\n */\nexport function utf8ToBytes(str) {\n if (typeof str !== 'string')\n throw new Error('string expected');\n return new Uint8Array(new TextEncoder().encode(str)); // https://bugzil.la/1681809\n}\n/**\n * Converts bytes to string using UTF8 encoding.\n * @example bytesToUtf8(Uint8Array.from([97, 98, 99])) // 'abc'\n */\nexport function bytesToUtf8(bytes) {\n return new TextDecoder().decode(bytes);\n}\n/**\n * Normalizes (non-hex) string or Uint8Array to Uint8Array.\n * Warning: when Uint8Array is passed, it would NOT get copied.\n * Keep in mind for future mutable operations.\n */\nexport function toBytes(data) {\n if (typeof data === 'string')\n data = utf8ToBytes(data);\n abytes(data);\n return data;\n}\n/**\n * Helper for KDFs: consumes uint8array or string.\n * When string is passed, does utf8 decoding, using TextDecoder.\n */\nexport function kdfInputToBytes(data) {\n if (typeof data === 'string')\n data = utf8ToBytes(data);\n abytes(data);\n return data;\n}\n/** Copies several Uint8Arrays into one. */\nexport function concatBytes(...arrays) {\n let sum = 0;\n for (let i = 0; i < arrays.length; i++) {\n const a = arrays[i];\n abytes(a);\n sum += a.length;\n }\n const res = new Uint8Array(sum);\n for (let i = 0, pad = 0; i < arrays.length; i++) {\n const a = arrays[i];\n res.set(a, pad);\n pad += a.length;\n }\n return res;\n}\nexport function checkOpts(defaults, opts) {\n if (opts !== undefined && {}.toString.call(opts) !== '[object Object]')\n throw new Error('options should be object or undefined');\n const merged = Object.assign(defaults, opts);\n return merged;\n}\n/** For runtime check if class implements interface */\nexport class Hash {\n}\n/** Wraps hash function, creating an interface on top of it */\nexport function createHasher(hashCons) {\n const hashC = (msg) => hashCons().update(toBytes(msg)).digest();\n const tmp = hashCons();\n hashC.outputLen = tmp.outputLen;\n hashC.blockLen = tmp.blockLen;\n hashC.create = () => hashCons();\n return hashC;\n}\nexport function createOptHasher(hashCons) {\n const hashC = (msg, opts) => hashCons(opts).update(toBytes(msg)).digest();\n const tmp = hashCons({});\n hashC.outputLen = tmp.outputLen;\n hashC.blockLen = tmp.blockLen;\n hashC.create = (opts) => hashCons(opts);\n return hashC;\n}\nexport function createXOFer(hashCons) {\n const hashC = (msg, opts) => hashCons(opts).update(toBytes(msg)).digest();\n const tmp = hashCons({});\n hashC.outputLen = tmp.outputLen;\n hashC.blockLen = tmp.blockLen;\n hashC.create = (opts) => hashCons(opts);\n return hashC;\n}\nexport const wrapConstructor = createHasher;\nexport const wrapConstructorWithOpts = createOptHasher;\nexport const wrapXOFConstructorWithOpts = createXOFer;\n/** Cryptographically secure PRNG. Uses internal OS-level `crypto.getRandomValues`. */\nexport function randomBytes(bytesLength = 32) {\n if (crypto && typeof crypto.getRandomValues === 'function') {\n return crypto.getRandomValues(new Uint8Array(bytesLength));\n }\n // Legacy Node.js compatibility\n if (crypto && typeof crypto.randomBytes === 'function') {\n return Uint8Array.from(crypto.randomBytes(bytesLength));\n }\n throw new Error('crypto.getRandomValues must be defined');\n}\n//# sourceMappingURL=utils.js.map","/**\n * Internal Merkle-Damgard hash utils.\n * @module\n */\nimport { Hash, abytes, aexists, aoutput, clean, createView, toBytes } from \"./utils.js\";\n/** Polyfill for Safari 14. https://caniuse.com/mdn-javascript_builtins_dataview_setbiguint64 */\nexport function setBigUint64(view, byteOffset, value, isLE) {\n if (typeof view.setBigUint64 === 'function')\n return view.setBigUint64(byteOffset, value, isLE);\n const _32n = BigInt(32);\n const _u32_max = BigInt(0xffffffff);\n const wh = Number((value >> _32n) & _u32_max);\n const wl = Number(value & _u32_max);\n const h = isLE ? 4 : 0;\n const l = isLE ? 0 : 4;\n view.setUint32(byteOffset + h, wh, isLE);\n view.setUint32(byteOffset + l, wl, isLE);\n}\n/** Choice: a ? b : c */\nexport function Chi(a, b, c) {\n return (a & b) ^ (~a & c);\n}\n/** Majority function, true if any two inputs is true. */\nexport function Maj(a, b, c) {\n return (a & b) ^ (a & c) ^ (b & c);\n}\n/**\n * Merkle-Damgard hash construction base class.\n * Could be used to create MD5, RIPEMD, SHA1, SHA2.\n */\nexport class HashMD extends Hash {\n constructor(blockLen, outputLen, padOffset, isLE) {\n super();\n this.finished = false;\n this.length = 0;\n this.pos = 0;\n this.destroyed = false;\n this.blockLen = blockLen;\n this.outputLen = outputLen;\n this.padOffset = padOffset;\n this.isLE = isLE;\n this.buffer = new Uint8Array(blockLen);\n this.view = createView(this.buffer);\n }\n update(data) {\n aexists(this);\n data = toBytes(data);\n abytes(data);\n const { view, buffer, blockLen } = this;\n const len = data.length;\n for (let pos = 0; pos < len;) {\n const take = Math.min(blockLen - this.pos, len - pos);\n // Fast path: we have at least one block in input, cast it to view and process\n if (take === blockLen) {\n const dataView = createView(data);\n for (; blockLen <= len - pos; pos += blockLen)\n this.process(dataView, pos);\n continue;\n }\n buffer.set(data.subarray(pos, pos + take), this.pos);\n this.pos += take;\n pos += take;\n if (this.pos === blockLen) {\n this.process(view, 0);\n this.pos = 0;\n }\n }\n this.length += data.length;\n this.roundClean();\n return this;\n }\n digestInto(out) {\n aexists(this);\n aoutput(out, this);\n this.finished = true;\n // Padding\n // We can avoid allocation of buffer for padding completely if it\n // was previously not allocated here. But it won't change performance.\n const { buffer, view, blockLen, isLE } = this;\n let { pos } = this;\n // append the bit '1' to the message\n buffer[pos++] = 0b10000000;\n clean(this.buffer.subarray(pos));\n // we have less than padOffset left in buffer, so we cannot put length in\n // current block, need process it and pad again\n if (this.padOffset > blockLen - pos) {\n this.process(view, 0);\n pos = 0;\n }\n // Pad until full block byte with zeros\n for (let i = pos; i < blockLen; i++)\n buffer[i] = 0;\n // Note: sha512 requires length to be 128bit integer, but length in JS will overflow before that\n // You need to write around 2 exabytes (u64_max / 8 / (1024**6)) for this to happen.\n // So we just write lowest 64 bits of that value.\n setBigUint64(view, blockLen - 8, BigInt(this.length * 8), isLE);\n this.process(view, 0);\n const oview = createView(out);\n const len = this.outputLen;\n // NOTE: we do division by 4 later, which should be fused in single op with modulo by JIT\n if (len % 4)\n throw new Error('_sha2: outputLen should be aligned to 32bit');\n const outLen = len / 4;\n const state = this.get();\n if (outLen > state.length)\n throw new Error('_sha2: outputLen bigger than state');\n for (let i = 0; i < outLen; i++)\n oview.setUint32(4 * i, state[i], isLE);\n }\n digest() {\n const { buffer, outputLen } = this;\n this.digestInto(buffer);\n const res = buffer.slice(0, outputLen);\n this.destroy();\n return res;\n }\n _cloneInto(to) {\n to || (to = new this.constructor());\n to.set(...this.get());\n const { blockLen, buffer, length, finished, destroyed, pos } = this;\n to.destroyed = destroyed;\n to.finished = finished;\n to.length = length;\n to.pos = pos;\n if (length % blockLen)\n to.buffer.set(buffer);\n return to;\n }\n clone() {\n return this._cloneInto();\n }\n}\n/**\n * Initial SHA-2 state: fractional parts of square roots of first 16 primes 2..53.\n * Check out `test/misc/sha2-gen-iv.js` for recomputation guide.\n */\n/** Initial SHA256 state. Bits 0..32 of frac part of sqrt of primes 2..19 */\nexport const SHA256_IV = /* @__PURE__ */ Uint32Array.from([\n 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19,\n]);\n/** Initial SHA224 state. Bits 32..64 of frac part of sqrt of primes 23..53 */\nexport const SHA224_IV = /* @__PURE__ */ Uint32Array.from([\n 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939, 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4,\n]);\n/** Initial SHA384 state. Bits 0..64 of frac part of sqrt of primes 23..53 */\nexport const SHA384_IV = /* @__PURE__ */ Uint32Array.from([\n 0xcbbb9d5d, 0xc1059ed8, 0x629a292a, 0x367cd507, 0x9159015a, 0x3070dd17, 0x152fecd8, 0xf70e5939,\n 0x67332667, 0xffc00b31, 0x8eb44a87, 0x68581511, 0xdb0c2e0d, 0x64f98fa7, 0x47b5481d, 0xbefa4fa4,\n]);\n/** Initial SHA512 state. Bits 0..64 of frac part of sqrt of primes 2..19 */\nexport const SHA512_IV = /* @__PURE__ */ Uint32Array.from([\n 0x6a09e667, 0xf3bcc908, 0xbb67ae85, 0x84caa73b, 0x3c6ef372, 0xfe94f82b, 0xa54ff53a, 0x5f1d36f1,\n 0x510e527f, 0xade682d1, 0x9b05688c, 0x2b3e6c1f, 0x1f83d9ab, 0xfb41bd6b, 0x5be0cd19, 0x137e2179,\n]);\n//# sourceMappingURL=_md.js.map","/**\n\nSHA1 (RFC 3174), MD5 (RFC 1321) and RIPEMD160 (RFC 2286) legacy, weak hash functions.\nDon't use them in a new protocol. What \"weak\" means:\n\n- Collisions can be made with 2^18 effort in MD5, 2^60 in SHA1, 2^80 in RIPEMD160.\n- No practical pre-image attacks (only theoretical, 2^123.4)\n- HMAC seems kinda ok: https://datatracker.ietf.org/doc/html/rfc6151\n * @module\n */\nimport { Chi, HashMD, Maj } from \"./_md.js\";\nimport { clean, createHasher, rotl } from \"./utils.js\";\n/** Initial SHA1 state */\nconst SHA1_IV = /* @__PURE__ */ Uint32Array.from([\n 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0,\n]);\n// Reusable temporary buffer\nconst SHA1_W = /* @__PURE__ */ new Uint32Array(80);\n/** SHA1 legacy hash class. */\nexport class SHA1 extends HashMD {\n constructor() {\n super(64, 20, 8, false);\n this.A = SHA1_IV[0] | 0;\n this.B = SHA1_IV[1] | 0;\n this.C = SHA1_IV[2] | 0;\n this.D = SHA1_IV[3] | 0;\n this.E = SHA1_IV[4] | 0;\n }\n get() {\n const { A, B, C, D, E } = this;\n return [A, B, C, D, E];\n }\n set(A, B, C, D, E) {\n this.A = A | 0;\n this.B = B | 0;\n this.C = C | 0;\n this.D = D | 0;\n this.E = E | 0;\n }\n process(view, offset) {\n for (let i = 0; i < 16; i++, offset += 4)\n SHA1_W[i] = view.getUint32(offset, false);\n for (let i = 16; i < 80; i++)\n SHA1_W[i] = rotl(SHA1_W[i - 3] ^ SHA1_W[i - 8] ^ SHA1_W[i - 14] ^ SHA1_W[i - 16], 1);\n // Compression function main loop, 80 rounds\n let { A, B, C, D, E } = this;\n for (let i = 0; i < 80; i++) {\n let F, K;\n if (i < 20) {\n F = Chi(B, C, D);\n K = 0x5a827999;\n }\n else if (i < 40) {\n F = B ^ C ^ D;\n K = 0x6ed9eba1;\n }\n else if (i < 60) {\n F = Maj(B, C, D);\n K = 0x8f1bbcdc;\n }\n else {\n F = B ^ C ^ D;\n K = 0xca62c1d6;\n }\n const T = (rotl(A, 5) + F + E + K + SHA1_W[i]) | 0;\n E = D;\n D = C;\n C = rotl(B, 30);\n B = A;\n A = T;\n }\n // Add the compressed chunk to the current hash value\n A = (A + this.A) | 0;\n B = (B + this.B) | 0;\n C = (C + this.C) | 0;\n D = (D + this.D) | 0;\n E = (E + this.E) | 0;\n this.set(A, B, C, D, E);\n }\n roundClean() {\n clean(SHA1_W);\n }\n destroy() {\n this.set(0, 0, 0, 0, 0);\n clean(this.buffer);\n }\n}\n/** SHA1 (RFC 3174) legacy hash function. It was cryptographically broken. */\nexport const sha1 = /* @__PURE__ */ createHasher(() => new SHA1());\n/** Per-round constants */\nconst p32 = /* @__PURE__ */ Math.pow(2, 32);\nconst K = /* @__PURE__ */ Array.from({ length: 64 }, (_, i) => Math.floor(p32 * Math.abs(Math.sin(i + 1))));\n/** md5 initial state: same as sha1, but 4 u32 instead of 5. */\nconst MD5_IV = /* @__PURE__ */ SHA1_IV.slice(0, 4);\n// Reusable temporary buffer\nconst MD5_W = /* @__PURE__ */ new Uint32Array(16);\n/** MD5 legacy hash class. */\nexport class MD5 extends HashMD {\n constructor() {\n super(64, 16, 8, true);\n this.A = MD5_IV[0] | 0;\n this.B = MD5_IV[1] | 0;\n this.C = MD5_IV[2] | 0;\n this.D = MD5_IV[3] | 0;\n }\n get() {\n const { A, B, C, D } = this;\n return [A, B, C, D];\n }\n set(A, B, C, D) {\n this.A = A | 0;\n this.B = B | 0;\n this.C = C | 0;\n this.D = D | 0;\n }\n process(view, offset) {\n for (let i = 0; i < 16; i++, offset += 4)\n MD5_W[i] = view.getUint32(offset, true);\n // Compression function main loop, 64 rounds\n let { A, B, C, D } = this;\n for (let i = 0; i < 64; i++) {\n let F, g, s;\n if (i < 16) {\n F = Chi(B, C, D);\n g = i;\n s = [7, 12, 17, 22];\n }\n else if (i < 32) {\n F = Chi(D, B, C);\n g = (5 * i + 1) % 16;\n s = [5, 9, 14, 20];\n }\n else if (i < 48) {\n F = B ^ C ^ D;\n g = (3 * i + 5) % 16;\n s = [4, 11, 16, 23];\n }\n else {\n F = C ^ (B | ~D);\n g = (7 * i) % 16;\n s = [6, 10, 15, 21];\n }\n F = F + A + K[i] + MD5_W[g];\n A = D;\n D = C;\n C = B;\n B = B + rotl(F, s[i % 4]);\n }\n // Add the compressed chunk to the current hash value\n A = (A + this.A) | 0;\n B = (B + this.B) | 0;\n C = (C + this.C) | 0;\n D = (D + this.D) | 0;\n this.set(A, B, C, D);\n }\n roundClean() {\n clean(MD5_W);\n }\n destroy() {\n this.set(0, 0, 0, 0);\n clean(this.buffer);\n }\n}\n/**\n * MD5 (RFC 1321) legacy hash function. It was cryptographically broken.\n * MD5 architecture is similar to SHA1, with some differences:\n * - Reduced output length: 16 bytes (128 bit) instead of 20\n * - 64 rounds, instead of 80\n * - Little-endian: could be faster, but will require more code\n * - Non-linear index selection: huge speed-up for unroll\n * - Per round constants: more memory accesses, additional speed-up for unroll\n */\nexport const md5 = /* @__PURE__ */ createHasher(() => new MD5());\n// RIPEMD-160\nconst Rho160 = /* @__PURE__ */ Uint8Array.from([\n 7, 4, 13, 1, 10, 6, 15, 3, 12, 0, 9, 5, 2, 14, 11, 8,\n]);\nconst Id160 = /* @__PURE__ */ (() => Uint8Array.from(new Array(16).fill(0).map((_, i) => i)))();\nconst Pi160 = /* @__PURE__ */ (() => Id160.map((i) => (9 * i + 5) % 16))();\nconst idxLR = /* @__PURE__ */ (() => {\n const L = [Id160];\n const R = [Pi160];\n const res = [L, R];\n for (let i = 0; i < 4; i++)\n for (let j of res)\n j.push(j[i].map((k) => Rho160[k]));\n return res;\n})();\nconst idxL = /* @__PURE__ */ (() => idxLR[0])();\nconst idxR = /* @__PURE__ */ (() => idxLR[1])();\n// const [idxL, idxR] = idxLR;\nconst shifts160 = /* @__PURE__ */ [\n [11, 14, 15, 12, 5, 8, 7, 9, 11, 13, 14, 15, 6, 7, 9, 8],\n [12, 13, 11, 15, 6, 9, 9, 7, 12, 15, 11, 13, 7, 8, 7, 7],\n [13, 15, 14, 11, 7, 7, 6, 8, 13, 14, 13, 12, 5, 5, 6, 9],\n [14, 11, 12, 14, 8, 6, 5, 5, 15, 12, 15, 14, 9, 9, 8, 6],\n [15, 12, 13, 13, 9, 5, 8, 6, 14, 11, 12, 11, 8, 6, 5, 5],\n].map((i) => Uint8Array.from(i));\nconst shiftsL160 = /* @__PURE__ */ idxL.map((idx, i) => idx.map((j) => shifts160[i][j]));\nconst shiftsR160 = /* @__PURE__ */ idxR.map((idx, i) => idx.map((j) => shifts160[i][j]));\nconst Kl160 = /* @__PURE__ */ Uint32Array.from([\n 0x00000000, 0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xa953fd4e,\n]);\nconst Kr160 = /* @__PURE__ */ Uint32Array.from([\n 0x50a28be6, 0x5c4dd124, 0x6d703ef3, 0x7a6d76e9, 0x00000000,\n]);\n// It's called f() in spec.\nfunction ripemd_f(group, x, y, z) {\n if (group === 0)\n return x ^ y ^ z;\n if (group === 1)\n return (x & y) | (~x & z);\n if (group === 2)\n return (x | ~y) ^ z;\n if (group === 3)\n return (x & z) | (y & ~z);\n return x ^ (y | ~z);\n}\n// Reusable temporary buffer\nconst BUF_160 = /* @__PURE__ */ new Uint32Array(16);\nexport class RIPEMD160 extends HashMD {\n constructor() {\n super(64, 20, 8, true);\n this.h0 = 0x67452301 | 0;\n this.h1 = 0xefcdab89 | 0;\n this.h2 = 0x98badcfe | 0;\n this.h3 = 0x10325476 | 0;\n this.h4 = 0xc3d2e1f0 | 0;\n }\n get() {\n const { h0, h1, h2, h3, h4 } = this;\n return [h0, h1, h2, h3, h4];\n }\n set(h0, h1, h2, h3, h4) {\n this.h0 = h0 | 0;\n this.h1 = h1 | 0;\n this.h2 = h2 | 0;\n this.h3 = h3 | 0;\n this.h4 = h4 | 0;\n }\n process(view, offset) {\n for (let i = 0; i < 16; i++, offset += 4)\n BUF_160[i] = view.getUint32(offset, true);\n // prettier-ignore\n let al = this.h0 | 0, ar = al, bl = this.h1 | 0, br = bl, cl = this.h2 | 0, cr = cl, dl = this.h3 | 0, dr = dl, el = this.h4 | 0, er = el;\n // Instead of iterating 0 to 80, we split it into 5 groups\n // And use the groups in constants, functions, etc. Much simpler\n for (let group = 0; group < 5; group++) {\n const rGroup = 4 - group;\n const hbl = Kl160[group], hbr = Kr160[group]; // prettier-ignore\n const rl = idxL[group], rr = idxR[group]; // prettier-ignore\n const sl = shiftsL160[group], sr = shiftsR160[group]; // prettier-ignore\n for (let i = 0; i < 16; i++) {\n const tl = (rotl(al + ripemd_f(group, bl, cl, dl) + BUF_160[rl[i]] + hbl, sl[i]) + el) | 0;\n al = el, el = dl, dl = rotl(cl, 10) | 0, cl = bl, bl = tl; // prettier-ignore\n }\n // 2 loops are 10% faster\n for (let i = 0; i < 16; i++) {\n const tr = (rotl(ar + ripemd_f(rGroup, br, cr, dr) + BUF_160[rr[i]] + hbr, sr[i]) + er) | 0;\n ar = er, er = dr, dr = rotl(cr, 10) | 0, cr = br, br = tr; // prettier-ignore\n }\n }\n // Add the compressed chunk to the current hash value\n this.set((this.h1 + cl + dr) | 0, (this.h2 + dl + er) | 0, (this.h3 + el + ar) | 0, (this.h4 + al + br) | 0, (this.h0 + bl + cr) | 0);\n }\n roundClean() {\n clean(BUF_160);\n }\n destroy() {\n this.destroyed = true;\n clean(this.buffer);\n this.set(0, 0, 0, 0, 0);\n }\n}\n/**\n * RIPEMD-160 - a legacy hash function from 1990s.\n * * https://homes.esat.kuleuven.be/~bosselae/ripemd160.html\n * * https://homes.esat.kuleuven.be/~bosselae/ripemd160/pdf/AB-9601/AB-9601.pdf\n */\nexport const ripemd160 = /* @__PURE__ */ createHasher(() => new RIPEMD160());\n//# sourceMappingURL=legacy.js.map","/**\n * RIPEMD-160 legacy hash function.\n * https://homes.esat.kuleuven.be/~bosselae/ripemd160.html\n * https://homes.esat.kuleuven.be/~bosselae/ripemd160/pdf/AB-9601/AB-9601.pdf\n * @module\n * @deprecated\n */\nimport { RIPEMD160 as RIPEMD160n, ripemd160 as ripemd160n } from \"./legacy.js\";\n/** @deprecated Use import from `noble/hashes/legacy` module */\nexport const RIPEMD160 = RIPEMD160n;\n/** @deprecated Use import from `noble/hashes/legacy` module */\nexport const ripemd160 = ripemd160n;\n//# sourceMappingURL=ripemd160.js.map","/**\n * SHA2 hash function. A.k.a. sha256, sha384, sha512, sha512_224, sha512_256.\n * SHA256 is the fastest hash implementable in JS, even faster than Blake3.\n * Check out [RFC 4634](https://datatracker.ietf.org/doc/html/rfc4634) and\n * [FIPS 180-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf).\n * @module\n */\nimport { Chi, HashMD, Maj, SHA224_IV, SHA256_IV, SHA384_IV, SHA512_IV } from \"./_md.js\";\nimport * as u64 from \"./_u64.js\";\nimport { clean, createHasher, rotr } from \"./utils.js\";\n/**\n * Round constants:\n * First 32 bits of fractional parts of the cube roots of the first 64 primes 2..311)\n */\n// prettier-ignore\nconst SHA256_K = /* @__PURE__ */ Uint32Array.from([\n 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\n 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\n 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\n 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\n 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\n 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\n 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\n 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2\n]);\n/** Reusable temporary buffer. \"W\" comes straight from spec. */\nconst SHA256_W = /* @__PURE__ */ new Uint32Array(64);\nexport class SHA256 extends HashMD {\n constructor(outputLen = 32) {\n super(64, outputLen, 8, false);\n // We cannot use array here since array allows indexing by variable\n // which means optimizer/compiler cannot use registers.\n this.A = SHA256_IV[0] | 0;\n this.B = SHA256_IV[1] | 0;\n this.C = SHA256_IV[2] | 0;\n this.D = SHA256_IV[3] | 0;\n this.E = SHA256_IV[4] | 0;\n this.F = SHA256_IV[5] | 0;\n this.G = SHA256_IV[6] | 0;\n this.H = SHA256_IV[7] | 0;\n }\n get() {\n const { A, B, C, D, E, F, G, H } = this;\n return [A, B, C, D, E, F, G, H];\n }\n // prettier-ignore\n set(A, B, C, D, E, F, G, H) {\n this.A = A | 0;\n this.B = B | 0;\n this.C = C | 0;\n this.D = D | 0;\n this.E = E | 0;\n this.F = F | 0;\n this.G = G | 0;\n this.H = H | 0;\n }\n process(view, offset) {\n // Extend the first 16 words into the remaining 48 words w[16..63] of the message schedule array\n for (let i = 0; i < 16; i++, offset += 4)\n SHA256_W[i] = view.getUint32(offset, false);\n for (let i = 16; i < 64; i++) {\n const W15 = SHA256_W[i - 15];\n const W2 = SHA256_W[i - 2];\n const s0 = rotr(W15, 7) ^ rotr(W15, 18) ^ (W15 >>> 3);\n const s1 = rotr(W2, 17) ^ rotr(W2, 19) ^ (W2 >>> 10);\n SHA256_W[i] = (s1 + SHA256_W[i - 7] + s0 + SHA256_W[i - 16]) | 0;\n }\n // Compression function main loop, 64 rounds\n let { A, B, C, D, E, F, G, H } = this;\n for (let i = 0; i < 64; i++) {\n const sigma1 = rotr(E, 6) ^ rotr(E, 11) ^ rotr(E, 25);\n const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;\n const sigma0 = rotr(A, 2) ^ rotr(A, 13) ^ rotr(A, 22);\n const T2 = (sigma0 + Maj(A, B, C)) | 0;\n H = G;\n G = F;\n F = E;\n E = (D + T1) | 0;\n D = C;\n C = B;\n B = A;\n A = (T1 + T2) | 0;\n }\n // Add the compressed chunk to the current hash value\n A = (A + this.A) | 0;\n B = (B + this.B) | 0;\n C = (C + this.C) | 0;\n D = (D + this.D) | 0;\n E = (E + this.E) | 0;\n F = (F + this.F) | 0;\n G = (G + this.G) | 0;\n H = (H + this.H) | 0;\n this.set(A, B, C, D, E, F, G, H);\n }\n roundClean() {\n clean(SHA256_W);\n }\n destroy() {\n this.set(0, 0, 0, 0, 0, 0, 0, 0);\n clean(this.buffer);\n }\n}\nexport class SHA224 extends SHA256 {\n constructor() {\n super(28);\n this.A = SHA224_IV[0] | 0;\n this.B = SHA224_IV[1] | 0;\n this.C = SHA224_IV[2] | 0;\n this.D = SHA224_IV[3] | 0;\n this.E = SHA224_IV[4] | 0;\n this.F = SHA224_IV[5] | 0;\n this.G = SHA224_IV[6] | 0;\n this.H = SHA224_IV[7] | 0;\n }\n}\n// SHA2-512 is slower than sha256 in js because u64 operations are slow.\n// Round contants\n// First 32 bits of the fractional parts of the cube roots of the first 80 primes 2..409\n// prettier-ignore\nconst K512 = /* @__PURE__ */ (() => u64.split([\n '0x428a2f98d728ae22', '0x7137449123ef65cd', '0xb5c0fbcfec4d3b2f', '0xe9b5dba58189dbbc',\n '0x3956c25bf348b538', '0x59f111f1b605d019', '0x923f82a4af194f9b', '0xab1c5ed5da6d8118',\n '0xd807aa98a3030242', '0x12835b0145706fbe', '0x243185be4ee4b28c', '0x550c7dc3d5ffb4e2',\n '0x72be5d74f27b896f', '0x80deb1fe3b1696b1', '0x9bdc06a725c71235', '0xc19bf174cf692694',\n '0xe49b69c19ef14ad2', '0xefbe4786384f25e3', '0x0fc19dc68b8cd5b5', '0x240ca1cc77ac9c65',\n '0x2de92c6f592b0275', '0x4a7484aa6ea6e483', '0x5cb0a9dcbd41fbd4', '0x76f988da831153b5',\n '0x983e5152ee66dfab', '0xa831c66d2db43210', '0xb00327c898fb213f', '0xbf597fc7beef0ee4',\n '0xc6e00bf33da88fc2', '0xd5a79147930aa725', '0x06ca6351e003826f', '0x142929670a0e6e70',\n '0x27b70a8546d22ffc', '0x2e1b21385c26c926', '0x4d2c6dfc5ac42aed', '0x53380d139d95b3df',\n '0x650a73548baf63de', '0x766a0abb3c77b2a8', '0x81c2c92e47edaee6', '0x92722c851482353b',\n '0xa2bfe8a14cf10364', '0xa81a664bbc423001', '0xc24b8b70d0f89791', '0xc76c51a30654be30',\n '0xd192e819d6ef5218', '0xd69906245565a910', '0xf40e35855771202a', '0x106aa07032bbd1b8',\n '0x19a4c116b8d2d0c8', '0x1e376c085141ab53', '0x2748774cdf8eeb99', '0x34b0bcb5e19b48a8',\n '0x391c0cb3c5c95a63', '0x4ed8aa4ae3418acb', '0x5b9cca4f7763e373', '0x682e6ff3d6b2b8a3',\n '0x748f82ee5defb2fc', '0x78a5636f43172f60', '0x84c87814a1f0ab72', '0x8cc702081a6439ec',\n '0x90befffa23631e28', '0xa4506cebde82bde9', '0xbef9a3f7b2c67915', '0xc67178f2e372532b',\n '0xca273eceea26619c', '0xd186b8c721c0c207', '0xeada7dd6cde0eb1e', '0xf57d4f7fee6ed178',\n '0x06f067aa72176fba', '0x0a637dc5a2c898a6', '0x113f9804bef90dae', '0x1b710b35131c471b',\n '0x28db77f523047d84', '0x32caab7b40c72493', '0x3c9ebe0a15c9bebc', '0x431d67c49c100d4c',\n '0x4cc5d4becb3e42b6', '0x597f299cfc657e2a', '0x5fcb6fab3ad6faec', '0x6c44198c4a475817'\n].map(n => BigInt(n))))();\nconst SHA512_Kh = /* @__PURE__ */ (() => K512[0])();\nconst SHA512_Kl = /* @__PURE__ */ (() => K512[1])();\n// Reusable temporary buffers\nconst SHA512_W_H = /* @__PURE__ */ new Uint32Array(80);\nconst SHA512_W_L = /* @__PURE__ */ new Uint32Array(80);\nexport class SHA512 extends HashMD {\n constructor(outputLen = 64) {\n super(128, outputLen, 16, false);\n // We cannot use array here since array allows indexing by variable\n // which means optimizer/compiler cannot use registers.\n // h -- high 32 bits, l -- low 32 bits\n this.Ah = SHA512_IV[0] | 0;\n this.Al = SHA512_IV[1] | 0;\n this.Bh = SHA512_IV[2] | 0;\n this.Bl = SHA512_IV[3] | 0;\n this.Ch = SHA512_IV[4] | 0;\n this.Cl = SHA512_IV[5] | 0;\n this.Dh = SHA512_IV[6] | 0;\n this.Dl = SHA512_IV[7] | 0;\n this.Eh = SHA512_IV[8] | 0;\n this.El = SHA512_IV[9] | 0;\n this.Fh = SHA512_IV[10] | 0;\n this.Fl = SHA512_IV[11] | 0;\n this.Gh = SHA512_IV[12] | 0;\n this.Gl = SHA512_IV[13] | 0;\n this.Hh = SHA512_IV[14] | 0;\n this.Hl = SHA512_IV[15] | 0;\n }\n // prettier-ignore\n get() {\n const { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;\n return [Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl];\n }\n // prettier-ignore\n set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl) {\n this.Ah = Ah | 0;\n this.Al = Al | 0;\n this.Bh = Bh | 0;\n this.Bl = Bl | 0;\n this.Ch = Ch | 0;\n this.Cl = Cl | 0;\n this.Dh = Dh | 0;\n this.Dl = Dl | 0;\n this.Eh = Eh | 0;\n this.El = El | 0;\n this.Fh = Fh | 0;\n this.Fl = Fl | 0;\n this.Gh = Gh | 0;\n this.Gl = Gl | 0;\n this.Hh = Hh | 0;\n this.Hl = Hl | 0;\n }\n process(view, offset) {\n // Extend the first 16 words into the remaining 64 words w[16..79] of the message schedule array\n for (let i = 0; i < 16; i++, offset += 4) {\n SHA512_W_H[i] = view.getUint32(offset);\n SHA512_W_L[i] = view.getUint32((offset += 4));\n }\n for (let i = 16; i < 80; i++) {\n // s0 := (w[i-15] rightrotate 1) xor (w[i-15] rightrotate 8) xor (w[i-15] rightshift 7)\n const W15h = SHA512_W_H[i - 15] | 0;\n const W15l = SHA512_W_L[i - 15] | 0;\n const s0h = u64.rotrSH(W15h, W15l, 1) ^ u64.rotrSH(W15h, W15l, 8) ^ u64.shrSH(W15h, W15l, 7);\n const s0l = u64.rotrSL(W15h, W15l, 1) ^ u64.rotrSL(W15h, W15l, 8) ^ u64.shrSL(W15h, W15l, 7);\n // s1 := (w[i-2] rightrotate 19) xor (w[i-2] rightrotate 61) xor (w[i-2] rightshift 6)\n const W2h = SHA512_W_H[i - 2] | 0;\n const W2l = SHA512_W_L[i - 2] | 0;\n const s1h = u64.rotrSH(W2h, W2l, 19) ^ u64.rotrBH(W2h, W2l, 61) ^ u64.shrSH(W2h, W2l, 6);\n const s1l = u64.rotrSL(W2h, W2l, 19) ^ u64.rotrBL(W2h, W2l, 61) ^ u64.shrSL(W2h, W2l, 6);\n // SHA256_W[i] = s0 + s1 + SHA256_W[i - 7] + SHA256_W[i - 16];\n const SUMl = u64.add4L(s0l, s1l, SHA512_W_L[i - 7], SHA512_W_L[i - 16]);\n const SUMh = u64.add4H(SUMl, s0h, s1h, SHA512_W_H[i - 7], SHA512_W_H[i - 16]);\n SHA512_W_H[i] = SUMh | 0;\n SHA512_W_L[i] = SUMl | 0;\n }\n let { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;\n // Compression function main loop, 80 rounds\n for (let i = 0; i < 80; i++) {\n // S1 := (e rightrotate 14) xor (e rightrotate 18) xor (e rightrotate 41)\n const sigma1h = u64.rotrSH(Eh, El, 14) ^ u64.rotrSH(Eh, El, 18) ^ u64.rotrBH(Eh, El, 41);\n const sigma1l = u64.rotrSL(Eh, El, 14) ^ u64.rotrSL(Eh, El, 18) ^ u64.rotrBL(Eh, El, 41);\n //const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;\n const CHIh = (Eh & Fh) ^ (~Eh & Gh);\n const CHIl = (El & Fl) ^ (~El & Gl);\n // T1 = H + sigma1 + Chi(E, F, G) + SHA512_K[i] + SHA512_W[i]\n // prettier-ignore\n const T1ll = u64.add5L(Hl, sigma1l, CHIl, SHA512_Kl[i], SHA512_W_L[i]);\n const T1h = u64.add5H(T1ll, Hh, sigma1h, CHIh, SHA512_Kh[i], SHA512_W_H[i]);\n const T1l = T1ll | 0;\n // S0 := (a rightrotate 28) xor (a rightrotate 34) xor (a rightrotate 39)\n const sigma0h = u64.rotrSH(Ah, Al, 28) ^ u64.rotrBH(Ah, Al, 34) ^ u64.rotrBH(Ah, Al, 39);\n const sigma0l = u64.rotrSL(Ah, Al, 28) ^ u64.rotrBL(Ah, Al, 34) ^ u64.rotrBL(Ah, Al, 39);\n const MAJh = (Ah & Bh) ^ (Ah & Ch) ^ (Bh & Ch);\n const MAJl = (Al & Bl) ^ (Al & Cl) ^ (Bl & Cl);\n Hh = Gh | 0;\n Hl = Gl | 0;\n Gh = Fh | 0;\n Gl = Fl | 0;\n Fh = Eh | 0;\n Fl = El | 0;\n ({ h: Eh, l: El } = u64.add(Dh | 0, Dl | 0, T1h | 0, T1l | 0));\n Dh = Ch | 0;\n Dl = Cl | 0;\n Ch = Bh | 0;\n Cl = Bl | 0;\n Bh = Ah | 0;\n Bl = Al | 0;\n const All = u64.add3L(T1l, sigma0l, MAJl);\n Ah = u64.add3H(All, T1h, sigma0h, MAJh);\n Al = All | 0;\n }\n // Add the compressed chunk to the current hash value\n ({ h: Ah, l: Al } = u64.add(this.Ah | 0, this.Al | 0, Ah | 0, Al | 0));\n ({ h: Bh, l: Bl } = u64.add(this.Bh | 0, this.Bl | 0, Bh | 0, Bl | 0));\n ({ h: Ch, l: Cl } = u64.add(this.Ch | 0, this.Cl | 0, Ch | 0, Cl | 0));\n ({ h: Dh, l: Dl } = u64.add(this.Dh | 0, this.Dl | 0, Dh | 0, Dl | 0));\n ({ h: Eh, l: El } = u64.add(this.Eh | 0, this.El | 0, Eh | 0, El | 0));\n ({ h: Fh, l: Fl } = u64.add(this.Fh | 0, this.Fl | 0, Fh | 0, Fl | 0));\n ({ h: Gh, l: Gl } = u64.add(this.Gh | 0, this.Gl | 0, Gh | 0, Gl | 0));\n ({ h: Hh, l: Hl } = u64.add(this.Hh | 0, this.Hl | 0, Hh | 0, Hl | 0));\n this.set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl);\n }\n roundClean() {\n clean(SHA512_W_H, SHA512_W_L);\n }\n destroy() {\n clean(this.buffer);\n this.set(0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0);\n }\n}\nexport class SHA384 extends SHA512 {\n constructor() {\n super(48);\n this.Ah = SHA384_IV[0] | 0;\n this.Al = SHA384_IV[1] | 0;\n this.Bh = SHA384_IV[2] | 0;\n this.Bl = SHA384_IV[3] | 0;\n this.Ch = SHA384_IV[4] | 0;\n this.Cl = SHA384_IV[5] | 0;\n this.Dh = SHA384_IV[6] | 0;\n this.Dl = SHA384_IV[7] | 0;\n this.Eh = SHA384_IV[8] | 0;\n this.El = SHA384_IV[9] | 0;\n this.Fh = SHA384_IV[10] | 0;\n this.Fl = SHA384_IV[11] | 0;\n this.Gh = SHA384_IV[12] | 0;\n this.Gl = SHA384_IV[13] | 0;\n this.Hh = SHA384_IV[14] | 0;\n this.Hl = SHA384_IV[15] | 0;\n }\n}\n/**\n * Truncated SHA512/256 and SHA512/224.\n * SHA512_IV is XORed with 0xa5a5a5a5a5a5a5a5, then used as \"intermediary\" IV of SHA512/t.\n * Then t hashes string to produce result IV.\n * See `test/misc/sha2-gen-iv.js`.\n */\n/** SHA512/224 IV */\nconst T224_IV = /* @__PURE__ */ Uint32Array.from([\n 0x8c3d37c8, 0x19544da2, 0x73e19966, 0x89dcd4d6, 0x1dfab7ae, 0x32ff9c82, 0x679dd514, 0x582f9fcf,\n 0x0f6d2b69, 0x7bd44da8, 0x77e36f73, 0x04c48942, 0x3f9d85a8, 0x6a1d36c8, 0x1112e6ad, 0x91d692a1,\n]);\n/** SHA512/256 IV */\nconst T256_IV = /* @__PURE__ */ Uint32Array.from([\n 0x22312194, 0xfc2bf72c, 0x9f555fa3, 0xc84c64c2, 0x2393b86b, 0x6f53b151, 0x96387719, 0x5940eabd,\n 0x96283ee2, 0xa88effe3, 0xbe5e1e25, 0x53863992, 0x2b0199fc, 0x2c85b8aa, 0x0eb72ddc, 0x81c52ca2,\n]);\nexport class SHA512_224 extends SHA512 {\n constructor() {\n super(28);\n this.Ah = T224_IV[0] | 0;\n this.Al = T224_IV[1] | 0;\n this.Bh = T224_IV[2] | 0;\n this.Bl = T224_IV[3] | 0;\n this.Ch = T224_IV[4] | 0;\n this.Cl = T224_IV[5] | 0;\n this.Dh = T224_IV[6] | 0;\n this.Dl = T224_IV[7] | 0;\n this.Eh = T224_IV[8] | 0;\n this.El = T224_IV[9] | 0;\n this.Fh = T224_IV[10] | 0;\n this.Fl = T224_IV[11] | 0;\n this.Gh = T224_IV[12] | 0;\n this.Gl = T224_IV[13] | 0;\n this.Hh = T224_IV[14] | 0;\n this.Hl = T224_IV[15] | 0;\n }\n}\nexport class SHA512_256 extends SHA512 {\n constructor() {\n super(32);\n this.Ah = T256_IV[0] | 0;\n this.Al = T256_IV[1] | 0;\n this.Bh = T256_IV[2] | 0;\n this.Bl = T256_IV[3] | 0;\n this.Ch = T256_IV[4] | 0;\n this.Cl = T256_IV[5] | 0;\n this.Dh = T256_IV[6] | 0;\n this.Dl = T256_IV[7] | 0;\n this.Eh = T256_IV[8] | 0;\n this.El = T256_IV[9] | 0;\n this.Fh = T256_IV[10] | 0;\n this.Fl = T256_IV[11] | 0;\n this.Gh = T256_IV[12] | 0;\n this.Gl = T256_IV[13] | 0;\n this.Hh = T256_IV[14] | 0;\n this.Hl = T256_IV[15] | 0;\n }\n}\n/**\n * SHA2-256 hash function from RFC 4634.\n *\n * It is the fastest JS hash, even faster than Blake3.\n * To break sha256 using birthday attack, attackers need to try 2^128 hashes.\n * BTC network is doing 2^70 hashes/sec (2^95 hashes/year) as per 2025.\n */\nexport const sha256 = /* @__PURE__ */ createHasher(() => new SHA256());\n/** SHA2-224 hash function from RFC 4634 */\nexport const sha224 = /* @__PURE__ */ createHasher(() => new SHA224());\n/** SHA2-512 hash function from RFC 4634. */\nexport const sha512 = /* @__PURE__ */ createHasher(() => new SHA512());\n/** SHA2-384 hash function from RFC 4634. */\nexport const sha384 = /* @__PURE__ */ createHasher(() => new SHA384());\n/**\n * SHA2-512/256 \"truncated\" hash function, with improved resistance to length extension attacks.\n * See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).\n */\nexport const sha512_256 = /* @__PURE__ */ createHasher(() => new SHA512_256());\n/**\n * SHA2-512/224 \"truncated\" hash function, with improved resistance to length extension attacks.\n * See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).\n */\nexport const sha512_224 = /* @__PURE__ */ createHasher(() => new SHA512_224());\n//# sourceMappingURL=sha2.js.map","/**\n * SHA2-256 a.k.a. sha256. In JS, it is the fastest hash, even faster than Blake3.\n *\n * To break sha256 using birthday attack, attackers need to try 2^128 hashes.\n * BTC network is doing 2^70 hashes/sec (2^95 hashes/year) as per 2025.\n *\n * Check out [FIPS 180-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf).\n * @module\n * @deprecated\n */\nimport { SHA224 as SHA224n, sha224 as sha224n, SHA256 as SHA256n, sha256 as sha256n, } from \"./sha2.js\";\n/** @deprecated Use import from `noble/hashes/sha2` module */\nexport const SHA256 = SHA256n;\n/** @deprecated Use import from `noble/hashes/sha2` module */\nexport const sha256 = sha256n;\n/** @deprecated Use import from `noble/hashes/sha2` module */\nexport const SHA224 = SHA224n;\n/** @deprecated Use import from `noble/hashes/sha2` module */\nexport const sha224 = sha224n;\n//# sourceMappingURL=sha256.js.map","import { secp256k1 } from '@noble/curves/secp256k1.js';\nimport { ripemd160 } from '@noble/hashes/ripemd160';\nimport { sha256 } from '@noble/hashes/sha256';\nimport { randomBytes } from 'crypto';\nimport {\n DigiIDCallbackData,\n DigiIDError,\n DigiIDUriOptions,\n DigiIDVerificationResult,\n DigiIDVerifyOptions\n} from './types';\n\n/**\n * Base58 alphabet used for Bitcoin/DigiByte addresses\n */\nconst BASE58_ALPHABET = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz';\n\n/**\n * Decode a base58 string to bytes\n */\nfunction base58Decode(str: string): Uint8Array {\n const bytes: number[] = [0];\n for (let i = 0; i < str.length; i++) {\n const char = str[i];\n if (!char) continue;\n const value = BASE58_ALPHABET.indexOf(char);\n if (value === -1) throw new Error('Invalid base58 character');\n\n for (let j = 0; j < bytes.length; j++) {\n bytes[j]! *= 58;\n }\n bytes[0]! += value;\n\n let carry = 0;\n for (let j = 0; j < bytes.length; j++) {\n const byte = bytes[j]!;\n bytes[j] = byte + carry;\n carry = bytes[j]! >> 8;\n bytes[j]! &= 0xff;\n }\n while (carry > 0) {\n bytes.push(carry & 0xff);\n carry >>= 8;\n }\n }\n\n // Add leading zeros\n for (let i = 0; i < str.length && str[i] === '1'; i++) {\n bytes.push(0);\n }\n\n return new Uint8Array(bytes.reverse());\n}\n\n/**\n * Decode a bech32 address (simplified for verification purposes)\n */\nfunction decodeBech32(address: string): { version: number; program: Uint8Array } | null {\n const CHARSET = 'qpzry9x8gf2tvdw0s3jn54khce6mua7l';\n\n const lowerAddr = address.toLowerCase();\n const parts = lowerAddr.split('1');\n if (parts.length !== 2) return null;\n\n const hrp = parts[0];\n const data = parts[1];\n if (!hrp || !data) return null;\n if (hrp !== 'dgb') return null;\n\n const values: number[] = [];\n for (const char of data) {\n const val = CHARSET.indexOf(char);\n if (val === -1) return null;\n values.push(val);\n }\n\n // Remove checksum (last 6 chars)\n const payload = values.slice(0, -6);\n if (payload.length < 1) return null;\n\n const version = payload[0];\n if (version === undefined) return null;\n\n // Convert from 5-bit to 8-bit\n const converted = convertBits(payload.slice(1), 5, 8, false);\n if (!converted) return null;\n\n return { version, program: new Uint8Array(converted) };\n}\n\n/**\n * Convert bits between different bit groups\n */\nfunction convertBits(data: number[], fromBits: number, toBits: number, pad: boolean): number[] | null {\n let acc = 0;\n let bits = 0;\n const result: number[] = [];\n const maxv = (1 << toBits) - 1;\n\n for (const value of data) {\n if (value < 0 || value >> fromBits !== 0) return null;\n acc = (acc << fromBits) | value;\n bits += fromBits;\n while (bits >= toBits) {\n bits -= toBits;\n result.push((acc >> bits) & maxv);\n }\n }\n\n if (pad) {\n if (bits > 0) result.push((acc << (toBits - bits)) & maxv);\n } else if (bits >= fromBits || ((acc << (toBits - bits)) & maxv)) {\n return null;\n }\n\n return result;\n}\n\n/**\n * Hash message with Bitcoin/DigiByte message signing format\n */\nfunction hashMessage(message: string, messagePrefix: string): Uint8Array {\n // The messagePrefix already includes the length byte (e.g., '\\x19DigiByte Signed Message:\\n')\n // where \\x19 = 25 = length of \"DigiByte Signed Message:\\n\"\n const prefixBuffer = new TextEncoder().encode(messagePrefix);\n\n const messageBuffer = new TextEncoder().encode(message);\n const messageLengthBytes: number[] = [];\n let messageLength = messageBuffer.length;\n\n // Encode message length as variable-length integer\n if (messageLength < 0xfd) {\n messageLengthBytes.push(messageLength);\n } else if (messageLength <= 0xffff) {\n messageLengthBytes.push(0xfd, messageLength & 0xff, (messageLength >> 8) & 0xff);\n } else if (messageLength <= 0xffffffff) {\n messageLengthBytes.push(\n 0xfe,\n messageLength & 0xff,\n (messageLength >> 8) & 0xff,\n (messageLength >> 16) & 0xff,\n (messageLength >> 24) & 0xff\n );\n } else {\n throw new Error('Message too long');\n }\n\n const messageLengthBuffer = new Uint8Array(messageLengthBytes);\n\n // Concatenate: prefix + messageLengthBuffer + message\n const totalLength = prefixBuffer.length + messageLengthBuffer.length + messageBuffer.length;\n const combined = new Uint8Array(totalLength);\n let offset = 0;\n\n combined.set(prefixBuffer, offset);\n offset += prefixBuffer.length;\n combined.set(messageLengthBuffer, offset);\n offset += messageLengthBuffer.length;\n combined.set(messageBuffer, offset);\n\n // Double SHA256\n return sha256(sha256(combined));\n}\n\n/**\n * Recover public key from signature\n */\nfunction recoverPublicKey(messageHash: Uint8Array, signature: Uint8Array): Uint8Array[] {\n if (signature.length !== 65) {\n throw new Error('Invalid signature length');\n }\n\n const firstByte = signature[0];\n if (firstByte === undefined) throw new Error('Invalid signature');\n\n const r = signature.slice(1, 33);\n const s = signature.slice(33, 65);\n\n const results: Uint8Array[] = [];\n\n // Try all recovery IDs (0-3) to be thorough\n // Some implementations may encode the recovery ID differently\n for (let recId = 0; recId < 4; recId++) {\n try {\n // Create signature object\n const sig = new secp256k1.Signature(\n BigInt('0x' + Array.from(r).map(b => b.toString(16).padStart(2, '0')).join('')),\n BigInt('0x' + Array.from(s).map(b => b.toString(16).padStart(2, '0')).join(''))\n ).addRecoveryBit(recId);\n\n const point = sig.recoverPublicKey(messageHash);\n\n // Add both compressed and uncompressed versions\n const compressedBytes = point.toBytes(true);\n const uncompressedBytes = point.toBytes(false);\n\n // Add compressed first (more common for SegWit)\n results.push(compressedBytes);\n results.push(uncompressedBytes);\n } catch (e) {\n // This recovery ID didn't work, try the next one\n continue;\n }\n }\n\n if (results.length === 0) {\n throw new Error('Failed to recover any public keys');\n }\n\n return results;\n}\n\n/**\n * Hash160: RIPEMD160(SHA256(data))\n */\nfunction hash160(buffer: Uint8Array): Uint8Array {\n return ripemd160(sha256(buffer));\n}\n\n/**\n * Verify address matches public key\n */\nfunction verifyAddress(address: string, publicKey: Uint8Array): boolean {\n // Legacy address (starts with D or S)\n if (address.startsWith('D') || address.startsWith('S')) {\n try {\n const decoded = base58Decode(address);\n if (decoded.length < 25) return false;\n\n const payload = decoded.slice(0, -4);\n const checksum = decoded.slice(-4);\n\n const hash = sha256(sha256(payload));\n const expectedChecksum = hash.slice(0, 4);\n\n // Verify checksum\n if (!checksum.every((byte, i) => byte === expectedChecksum[i])) {\n return false;\n }\n\n const pubKeyHash = payload.slice(1);\n const computedHash = hash160(publicKey);\n\n return pubKeyHash.every((byte, i) => byte === computedHash[i]);\n } catch {\n return false;\n }\n }\n\n // Bech32 address (starts with dgb1)\n if (address.toLowerCase().startsWith('dgb1')) {\n try {\n const decoded = decodeBech32(address);\n if (!decoded) return false;\n\n const { version, program } = decoded;\n\n if (version === 0) {\n // For witness v0 P2WPKH, use hash160 of compressed public key\n let pkToHash = publicKey;\n\n // If uncompressed (65 bytes), convert to compressed (33 bytes)\n if (publicKey.length === 65) {\n const isEven = publicKey[64]! % 2 === 0;\n pkToHash = new Uint8Array(33);\n pkToHash[0] = isEven ? 0x02 : 0x03;\n pkToHash.set(publicKey.slice(1, 33), 1);\n }\n\n const computedHash = hash160(pkToHash);\n return program.every((byte, i) => byte === computedHash[i]);\n }\n\n return false;\n } catch {\n return false;\n }\n }\n\n return false;\n}\n\n/**\n * INTERNAL: Verifies the signature using @noble/curves.\n * Exported primarily for testing purposes (mocking/spying).\n * @internal\n */\nexport async function _internalVerifySignature(\n uri: string,\n address: string,\n signature: string\n): Promise<boolean> {\n // DigiByte Message Prefix\n const messagePrefix = '\\x19DigiByte Signed Message:\\n';\n\n try {\n // Decode base64 signature\n const sigBytes = Uint8Array.from(atob(signature), c => c.charCodeAt(0));\n\n if (sigBytes.length !== 65) {\n throw new Error('Invalid signature length');\n }\n\n // Hash the message\n const messageHash = hashMessage(uri, messagePrefix);\n\n // Recover public key from signature\n const publicKeys = recoverPublicKey(messageHash, sigBytes);\n\n // Verify that at least one recovered public key matches the address\n for (const pubKey of publicKeys) {\n if (verifyAddress(address, pubKey)) {\n return true;\n }\n }\n\n return false;\n } catch (e: unknown) {\n const errorMessage = e instanceof Error ? e.message : String(e);\n throw new DigiIDError(`Signature verification failed: ${errorMessage}`);\n }\n}\n\n/**\n * Generates a secure random nonce (hex string).\n * @param length - The number of bytes to generate (default: 16, resulting in 32 hex chars).\n * @returns A hex-encoded random string.\n */\nfunction generateNonce(length = 16): string {\n return randomBytes(length).toString('hex');\n}\n\n/**\n * Generates a DigiID authentication URI.\n *\n * @param options - Options for URI generation, including the callback URL.\n * @returns The generated DigiID URI string.\n * @throws {DigiIDError} If the callback URL is invalid or missing.\n */\nexport function generateDigiIDUri(options: DigiIDUriOptions): string {\n if (!options.callbackUrl) {\n throw new DigiIDError('Callback URL is required.');\n }\n\n let parsedUrl: URL;\n try {\n parsedUrl = new URL(options.callbackUrl);\n } catch (e) {\n throw new DigiIDError(`Invalid callback URL: ${(e as Error).message}`);\n }\n\n // DigiID spec requires stripping the scheme (http/https)\n const domainAndPath = parsedUrl.host + parsedUrl.pathname;\n\n const nonce = options.nonce || generateNonce();\n const unsecureFlag = options.unsecure ? '1' : '0'; // 1 for http, 0 for https\n\n // Validate scheme based on unsecure flag\n if (options.unsecure && parsedUrl.protocol !== 'http:') {\n throw new DigiIDError('Unsecure flag is true, but callback URL does not use http protocol.');\n }\n if (!options.unsecure && parsedUrl.protocol !== 'https:') {\n throw new DigiIDError('Callback URL must use https protocol unless unsecure flag is set to true.');\n }\n\n // Construct the URI\n // Example: digiid://example.com/callback?x=nonce_value&u=0\n const uri = `digiid://${domainAndPath}?x=${nonce}&u=${unsecureFlag}`;\n\n // Clean up potential trailing slash in path if no query params exist (though DigiID always has params)\n // This check might be redundant given DigiID structure, but good practice\n // const cleanedUri = uri.endsWith('/') && parsedUrl.search === '' ? uri.slice(0, -1) : uri;\n\n return uri;\n}\n\n/**\n * Verifies the signature and data received from a DigiID callback.\n *\n * @param callbackData - The data received from the wallet (address, uri, signature).\n * @param verifyOptions - Options for verification, including the expected callback URL and nonce.\n * @returns {Promise<DigiIDVerificationResult>} A promise that resolves with verification details if successful.\n * @throws {DigiIDError} If validation or signature verification fails.\n */\nexport async function verifyDigiIDCallback(\n callbackData: DigiIDCallbackData,\n verifyOptions: DigiIDVerifyOptions\n): Promise<DigiIDVerificationResult> {\n const { address, uri, signature } = callbackData;\n const { expectedCallbackUrl, expectedNonce } = verifyOptions;\n\n if (!address || !uri || !signature) {\n throw new DigiIDError('Missing required callback data: address, uri, or signature.');\n }\n\n // 1. Parse the received URI\n let parsedReceivedUri: URL;\n try {\n // Temporarily replace digiid:// with http:// for standard URL parsing\n const parsableUri = uri.replace(/^digiid:/, 'http:');\n parsedReceivedUri = new URL(parsableUri);\n } catch (e) {\n throw new DigiIDError(`Invalid URI received in callback: ${(e as Error).message}`);\n }\n\n const receivedNonce = parsedReceivedUri.searchParams.get('x');\n const receivedUnsecure = parsedReceivedUri.searchParams.get('u'); // 0 or 1\n const receivedDomainAndPath = parsedReceivedUri.host + parsedReceivedUri.pathname;\n\n if (receivedNonce === null || receivedUnsecure === null) {\n throw new DigiIDError('URI missing nonce (x) or unsecure (u) parameter.');\n }\n\n // 2. Validate Callback URL\n let parsedExpectedUrl: URL;\n try {\n // Allow expectedCallbackUrl to be a string or URL object\n parsedExpectedUrl = typeof expectedCallbackUrl === 'string' ? new URL(expectedCallbackUrl) : expectedCallbackUrl;\n } catch (e) {\n throw new DigiIDError(`Invalid expectedCallbackUrl provided: ${(e as Error).message}`);\n }\n\n const expectedDomainAndPath = parsedExpectedUrl.host + parsedExpectedUrl.pathname;\n\n if (receivedDomainAndPath !== expectedDomainAndPath) {\n throw new DigiIDError(`Callback URL mismatch: URI contained \"${receivedDomainAndPath}\", expected \"${expectedDomainAndPath}\"`);\n }\n\n // Validate scheme consistency\n const expectedScheme = parsedExpectedUrl.protocol;\n if (receivedUnsecure === '1' && expectedScheme !== 'http:') {\n throw new DigiIDError('URI indicates unsecure (u=1), but expectedCallbackUrl is not http.');\n }\n if (receivedUnsecure === '0' && expectedScheme !== 'https:') {\n throw new DigiIDError('URI indicates secure (u=0), but expectedCallbackUrl is not https.');\n }\n\n // 3. Validate Nonce (optional)\n if (expectedNonce && receivedNonce !== expectedNonce) {\n throw new DigiIDError(`Nonce mismatch: URI contained \"${receivedNonce}\", expected \"${expectedNonce}\". Possible replay attack.`);\n }\n\n // 4. Verify Signature using internal helper\n try {\n const isValidSignature = await _internalVerifySignature(uri, address, signature);\n if (!isValidSignature) {\n // If the helper returns false, throw the standard invalid signature error\n throw new DigiIDError('Invalid signature.');\n }\n } catch (error) {\n // If _internalVerifySignature throws (e.g., due to format/checksum errors from the lib, or our re-thrown error),\n // re-throw it. It should already be a DigiIDError.\n if (error instanceof DigiIDError) {\n throw error;\n } else {\n // Catch any unexpected errors and wrap them\n throw new DigiIDError(`Unexpected error during signature verification: ${(error as Error).message}`);\n }\n }\n\n // 5. Return successful result\n return {\n isValid: true,\n address: address,\n nonce: receivedNonce, // Return the nonce from the URI\n };\n}\n"],"names":["DigiIDError","message","isBytes","a","anumber","n","title","prefix","abytes","value","length","bytes","len","needsLen","ofLen","got","ahash","h","aexists","instance","checkFinished","aoutput","out","min","clean","arrays","i","createView","arr","rotr","word","shift","hasHexBuiltin","hexes","_","bytesToHex","hex","asciis","asciiToBase16","ch","hexToBytes","hl","al","array","ai","hi","n1","n2","char","concatBytes","sum","res","pad","createHasher","hashCons","info","hashC","msg","opts","tmp","randomBytes","bytesLength","cr","oidNist","suffix","Chi","b","c","Maj","HashMD$1","blockLen","outputLen","padOffset","isLE","__publicField","data","view","buffer","pos","take","dataView","oview","outLen","state","to","finished","destroyed","SHA256_IV","SHA256_K","SHA256_W","SHA2_32B","HashMD","A","B","C","D","E","F","G","H","offset","W15","W2","s0","s1","sigma1","T1","T2","_SHA256","sha256","_0n","_1n","abool","abignumber","isPosBig","numberToHexUnpadded","num","hexToNumber","bytesToNumberBE","bytesToHex_","bytesToNumberLE","copyBytes","abytes_","numberToBytesBE","hexToBytes_","numberToBytesLE","inRange","max","aInRange","bitLen","bitMask","createHmacDrbg","hashLen","qByteLen","hmacFn","u8n","NULL","byte0","byte1","_maxDrbgIters","v","k","reset","msgs","concatBytes_","reseed","seed","gen","sl","pred","validateObject","object","fields","optFields","checkField","fieldName","expectedType","isOpt","val","current","iter","f","memoized","fn","map","arg","args","computed","_2n","_3n","_4n","_5n","_7n","_8n","_9n","_16n","mod","result","pow2","x","power","modulo","invert","number","u","q","r","m","assertIsSquare","Fp","root","sqrt3mod4","p1div4","sqrt5mod8","p5div8","nv","sqrt9mod16","P","Fp_","Field","tn","tonelliShanks","c1","c2","c3","c4","tv1","tv2","tv3","tv4","e1","e2","e3","Q","S","Z","_Fp","FpLegendre","cc","Q1div2","M","t","R","t_tmp","exponent","FpSqrt","FIELD_FIELDS","validateField","field","initial","FpPow","p","d","FpInvertBatch","nums","passZero","inverted","multipliedAcc","acc","invertedAcc","p1mod2","powered","yes","zero","no","nLength","nBitLength","_nBitLength","nByteLength","_Field","ORDER","_nbitLength","_a","lhs","rhs","skipValidation","allowedLengths","BYTES","modFromBytes","padded","scalar","lst","condition","getFieldBytesLength","fieldOrder","bitLength","getMinHashLength","mapHashToField","key","fieldLen","minLen","reduced","negateCt","item","neg","normalizeZ","points","invertedZs","validateW","W","bits","calcWOpts","scalarBits","windows","windowSize","maxNumber","mask","shiftBy","calcOffsets","window","wOpts","wbits","nextN","offsetStart","isZero","isNeg","isNegF","pointPrecomputes","pointWindowSizes","getW","assert0","wNAF","Point","elm","point","base","precomputes","wo","offsetF","transform","comp","prev","mulEndoUnsafe","k1","k2","p1","p2","createField","order","createCurveFields","type","CURVE","curveOpts","FpFnLE","Fn","params","createKeygen","randomSecretKey","getPublicKey","secretKey","_HMAC","hash","buf","oHash","iHash","hmac","divNearest","den","_splitEndoScalar","basis","a1","b1","a2","b2","k1neg","k2neg","MAX_NUM","validateSigFormat","format","validateSigOpts","def","optsn","optName","DERErr","DER","tag","dataLen","lenLen","first","isLong","lengthBytes","int","tlv","seqBytes","seqLeftBytes","rBytes","rLeftBytes","sBytes","sLeftBytes","sig","rs","ss","seq","weierstrass","extraOpts","validated","cofactor","CURVE_ORDER","endo","lengths","getWLengths","assertCompressionIsSupported","pointToBytes","_c","isCompressed","y","bx","hasEvenY","pprefix","pointFromBytes","uncomp","head","tail","y2","weierstrassEquation","sqrtError","err","evenY","L","isValidXY","encodePoint","decodePoint","x2","x3","left","right","_4a3","_27b2","acoord","banZero","aprjpoint","other","splitEndoScalarN","toAffineMemo","iz","X","Y","is0","zz","assertValidMemo","finishEndo","endoBeta","k1p","k2p","_Point","isLazy","wnaf","X1","Y1","Z1","X2","Y2","Z2","U1","U2","b3","X3","Y3","Z3","t0","t1","t2","t3","t4","t5","fake","mul","k1f","k2f","sc","invertedZ","isTorsionFree","clearCofactor","ecdh","ecdhOpts","randomBytes_","wcRandomBytes","isValidSecretKey","isValidPublicKey","publicKey","publicKeyUncompressed","l","isProbPub","getSharedSecret","secretKeyA","publicKeyB","s","utils","keygen","ecdsa","ecdsaOpts","nobleHmac","fnBits","defaultSigOpts","hasLargeCofactor","isBiggerThanHalfOrder","HALF","validateRS","assertSmallCofactor","validateSigLength","size","sizer","Signature","recovery","recid","messageHash","radj","ir","bits2int_modN","u1","u2","rb","sb","bits2int","delta","ORDER_MASK","int2octets","validateMsgAndHash","prehash","prepSig","lowS","extraEntropy","h1int","seedArgs","e","k2sig","kBytes","ik","normS","sign","verify","signature","end","is","recoverPublicKey","secp256k1_CURVE","secp256k1_ENDO","sqrtMod","_6n","_11n","_22n","_23n","_44n","_88n","b6","b9","b11","b22","b44","b88","b176","b220","b223","Fpk1","Pointk1","secp256k1","rotl","utf8ToBytes","str","toBytes","Hash","setBigUint64","byteOffset","_32n","_u32_max","wh","wl","Rho160","Id160","Pi160","idxLR","j","idxL","idxR","shifts160","shiftsL160","idx","shiftsR160","Kl160","Kr160","ripemd_f","group","z","BUF_160","RIPEMD160","h0","h1","h2","h3","h4","ar","bl","br","cl","dl","dr","el","er","rGroup","hbl","hbr","rl","rr","sr","tl","tr","ripemd160","ripemd160n","SHA256","sha256n","BASE58_ALPHABET","base58Decode","carry","byte","decodeBech32","address","CHARSET","parts","hrp","values","payload","version","converted","convertBits","fromBits","toBits","maxv","hashMessage","messagePrefix","prefixBuffer","messageBuffer","messageLengthBytes","messageLength","messageLengthBuffer","totalLength","combined","results","recId","compressedBytes","uncompressedBytes","hash160","verifyAddress","decoded","checksum","expectedChecksum","pubKeyHash","computedHash","program","pkToHash","isEven","_internalVerifySignature","uri","sigBytes","publicKeys","pubKey","errorMessage","generateNonce","generateDigiIDUri","options","parsedUrl","domainAndPath","nonce","unsecureFlag","verifyDigiIDCallback","callbackData","verifyOptions","expectedCallbackUrl","expectedNonce","parsedReceivedUri","parsableUri","receivedNonce","receivedUnsecure","receivedDomainAndPath","parsedExpectedUrl","expectedDomainAndPath","expectedScheme","error"],"mappings":";;;;AAiDO,MAAMA,UAAoB,MAAM;AAAA,EACrC,YAAYC,GAAiB;AAC3B,UAAMA,CAAO,GACb,KAAK,OAAO;AAAA,EAAA;AAEhB;AClDA;AAEO,SAASC,GAAQC,GAAG;AACvB,SAAOA,aAAa,cAAe,YAAY,OAAOA,CAAC,KAAKA,EAAE,YAAY,SAAS;AACvF;AAEO,SAASC,GAAQC,GAAGC,IAAQ,IAAI;AACnC,MAAI,CAAC,OAAO,cAAcD,CAAC,KAAKA,IAAI,GAAG;AACnC,UAAME,IAASD,KAAS,IAAIA,CAAK;AACjC,UAAM,IAAI,MAAM,GAAGC,CAAM,8BAA8BF,CAAC,EAAE;AAAA,EAClE;AACA;AAEO,SAASG,EAAOC,GAAOC,GAAQJ,IAAQ,IAAI;AAC9C,QAAMK,IAAQT,GAAQO,CAAK,GACrBG,IAAMH,KAAA,gBAAAA,EAAO,QACbI,IAAWH,MAAW;AAC5B,MAAI,CAACC,KAAUE,KAAYD,MAAQF,GAAS;AACxC,UAAMH,IAASD,KAAS,IAAIA,CAAK,MAC3BQ,IAAQD,IAAW,cAAcH,CAAM,KAAK,IAC5CK,IAAMJ,IAAQ,UAAUC,CAAG,KAAK,QAAQ,OAAOH,CAAK;AAC1D,UAAM,IAAI,MAAMF,IAAS,wBAAwBO,IAAQ,WAAWC,CAAG;AAAA,EAC/E;AACI,SAAON;AACX;AAEO,SAASO,GAAMC,GAAG;AACrB,MAAI,OAAOA,KAAM,cAAc,OAAOA,EAAE,UAAW;AAC/C,UAAM,IAAI,MAAM,yCAAyC;AAC7D,EAAAb,GAAQa,EAAE,SAAS,GACnBb,GAAQa,EAAE,QAAQ;AACtB;AAEO,SAASC,GAAQC,GAAUC,IAAgB,IAAM;AACpD,MAAID,EAAS;AACT,UAAM,IAAI,MAAM,kCAAkC;AACtD,MAAIC,KAAiBD,EAAS;AAC1B,UAAM,IAAI,MAAM,uCAAuC;AAC/D;AAEO,SAASE,GAAQC,GAAKH,GAAU;AACnCX,EAAAA,EAAOc,GAAK,QAAW,qBAAqB;AAC5C,QAAMC,IAAMJ,EAAS;AACrB,MAAIG,EAAI,SAASC;AACb,UAAM,IAAI,MAAM,sDAAsDA,CAAG;AAEjF;AAUO,SAASC,MAASC,GAAQ;AAC7B,WAASC,IAAI,GAAGA,IAAID,EAAO,QAAQC;AAC/B,IAAAD,EAAOC,CAAC,EAAE,KAAK,CAAC;AAExB;AAEO,SAASC,GAAWC,GAAK;AAC5B,SAAO,IAAI,SAASA,EAAI,QAAQA,EAAI,YAAYA,EAAI,UAAU;AAClE;AAEO,SAASC,EAAKC,GAAMC,GAAO;AAC9B,SAAQD,KAAS,KAAKC,IAAWD,MAASC;AAC9C;AA6BA,MAAMC,sBAEN,OAAO,WAAW,KAAK,CAAA,CAAE,EAAE,SAAU,cAAc,OAAO,WAAW,WAAY,YAE3EC,KAAwB,sBAAM,KAAK,EAAE,QAAQ,IAAK,GAAE,CAACC,GAAGR,MAAMA,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC;AAK5F,SAASS,GAAWxB,GAAO;AAG9B,MAFAH,EAAOG,CAAK,GAERqB;AACA,WAAOrB,EAAM,MAAO;AAExB,MAAIyB,IAAM;AACV,WAASV,IAAI,GAAGA,IAAIf,EAAM,QAAQe;AAC9B,IAAAU,KAAOH,GAAMtB,EAAMe,CAAC,CAAC;AAEzB,SAAOU;AACX;AAEA,MAAMC,IAAS,EAAE,IAAI,IAAI,IAAI,IAAI,GAAG,IAAI,GAAG,IAAI,GAAG,IAAI,GAAG,IAAK;AAC9D,SAASC,GAAcC,GAAI;AACvB,MAAIA,KAAMF,EAAO,MAAME,KAAMF,EAAO;AAChC,WAAOE,IAAKF,EAAO;AACvB,MAAIE,KAAMF,EAAO,KAAKE,KAAMF,EAAO;AAC/B,WAAOE,KAAMF,EAAO,IAAI;AAC5B,MAAIE,KAAMF,EAAO,KAAKE,KAAMF,EAAO;AAC/B,WAAOE,KAAMF,EAAO,IAAI;AAEhC;AAKO,SAASG,GAAWJ,GAAK;AAC5B,MAAI,OAAOA,KAAQ;AACf,UAAM,IAAI,MAAM,8BAA8B,OAAOA,CAAG;AAE5D,MAAIJ;AACA,WAAO,WAAW,QAAQI,CAAG;AACjC,QAAMK,IAAKL,EAAI,QACTM,IAAKD,IAAK;AAChB,MAAIA,IAAK;AACL,UAAM,IAAI,MAAM,qDAAqDA,CAAE;AAC3E,QAAME,IAAQ,IAAI,WAAWD,CAAE;AAC/B,WAASE,IAAK,GAAGC,IAAK,GAAGD,IAAKF,GAAIE,KAAMC,KAAM,GAAG;AAC7C,UAAMC,IAAKR,GAAcF,EAAI,WAAWS,CAAE,CAAC,GACrCE,IAAKT,GAAcF,EAAI,WAAWS,IAAK,CAAC,CAAC;AAC/C,QAAIC,MAAO,UAAaC,MAAO,QAAW;AACtC,YAAMC,IAAOZ,EAAIS,CAAE,IAAIT,EAAIS,IAAK,CAAC;AACjC,YAAM,IAAI,MAAM,iDAAiDG,IAAO,gBAAgBH,CAAE;AAAA,IACtG;AACQ,IAAAF,EAAMC,CAAE,IAAIE,IAAK,KAAKC;AAAA,EAC9B;AACI,SAAOJ;AACX;AAwCO,SAASM,MAAexB,GAAQ;AACnC,MAAIyB,IAAM;AACV,WAASxB,IAAI,GAAGA,IAAID,EAAO,QAAQC,KAAK;AACpC,UAAMvB,IAAIsB,EAAOC,CAAC;AAClBlB,IAAAA,EAAOL,CAAC,GACR+C,KAAO/C,EAAE;AAAA,EACjB;AACI,QAAMgD,IAAM,IAAI,WAAWD,CAAG;AAC9B,WAASxB,IAAI,GAAG0B,IAAM,GAAG1B,IAAID,EAAO,QAAQC,KAAK;AAC7C,UAAMvB,IAAIsB,EAAOC,CAAC;AAClB,IAAAyB,EAAI,IAAIhD,GAAGiD,CAAG,GACdA,KAAOjD,EAAE;AAAA,EACjB;AACI,SAAOgD;AACX;AASO,SAASE,GAAaC,GAAUC,IAAO,IAAI;AAC9C,QAAMC,IAAQ,CAACC,GAAKC,MAASJ,EAASI,CAAI,EAAE,OAAOD,CAAG,EAAE,OAAQ,GAC1DE,IAAML,EAAS,MAAS;AAC9B,SAAAE,EAAM,YAAYG,EAAI,WACtBH,EAAM,WAAWG,EAAI,UACrBH,EAAM,SAAS,CAACE,MAASJ,EAASI,CAAI,GACtC,OAAO,OAAOF,GAAOD,CAAI,GAClB,OAAO,OAAOC,CAAK;AAC9B;AAEO,SAASI,GAAYC,IAAc,IAAI;AAC1C,QAAMC,IAAK,OAAO,cAAe,WAAW,WAAW,SAAS;AAChE,MAAI,QAAOA,KAAA,gBAAAA,EAAI,oBAAoB;AAC/B,UAAM,IAAI,MAAM,wCAAwC;AAC5D,SAAOA,EAAG,gBAAgB,IAAI,WAAWD,CAAW,CAAC;AACzD;AAEO,MAAME,KAAU,CAACC,OAAY;AAAA,EAChC,KAAK,WAAW,KAAK,CAAC,GAAM,GAAM,IAAM,KAAM,IAAM,GAAM,KAAM,GAAM,GAAM,GAAMA,CAAM,CAAC;AAC7F;AC1OO,SAASC,GAAI9D,GAAG+D,GAAGC,GAAG;AACzB,SAAQhE,IAAI+D,IAAM,CAAC/D,IAAIgE;AAC3B;AAEO,SAASC,GAAIjE,GAAG+D,GAAGC,GAAG;AACzB,SAAQhE,IAAI+D,IAAM/D,IAAIgE,IAAMD,IAAIC;AACpC;AAKO,IAAAE,KAAA,MAAa;AAAA,EAYhB,YAAYC,GAAUC,GAAWC,GAAWC,GAAM;AAXlD,IAAAC,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AAEA;AAAA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA,kBAAW;AACX,IAAAA,EAAA,gBAAS;AACT,IAAAA,EAAA,aAAM;AACN,IAAAA,EAAA,mBAAY;AAER,SAAK,WAAWJ,GAChB,KAAK,YAAYC,GACjB,KAAK,YAAYC,GACjB,KAAK,OAAOC,GACZ,KAAK,SAAS,IAAI,WAAWH,CAAQ,GACrC,KAAK,OAAO3C,GAAW,KAAK,MAAM;AAAA,EAC1C;AAAA,EACI,OAAOgD,GAAM;AACTzD,IAAAA,GAAQ,IAAI,GACZV,EAAOmE,CAAI;AACX,UAAM,EAAE,MAAAC,GAAM,QAAAC,GAAQ,UAAAP,EAAU,IAAG,MAC7B1D,IAAM+D,EAAK;AACjB,aAASG,IAAM,GAAGA,IAAMlE,KAAM;AAC1B,YAAMmE,IAAO,KAAK,IAAIT,IAAW,KAAK,KAAK1D,IAAMkE,CAAG;AAEpD,UAAIC,MAAST,GAAU;AACnB,cAAMU,IAAWrD,GAAWgD,CAAI;AAChC,eAAOL,KAAY1D,IAAMkE,GAAKA,KAAOR;AACjC,eAAK,QAAQU,GAAUF,CAAG;AAC9B;AAAA,MAChB;AACY,MAAAD,EAAO,IAAIF,EAAK,SAASG,GAAKA,IAAMC,CAAI,GAAG,KAAK,GAAG,GACnD,KAAK,OAAOA,GACZD,KAAOC,GACH,KAAK,QAAQT,MACb,KAAK,QAAQM,GAAM,CAAC,GACpB,KAAK,MAAM;AAAA,IAE3B;AACQ,gBAAK,UAAUD,EAAK,QACpB,KAAK,WAAY,GACV;AAAA,EACf;AAAA,EACI,WAAWrD,GAAK;AACZJ,IAAAA,GAAQ,IAAI,GACZG,GAAQC,GAAK,IAAI,GACjB,KAAK,WAAW;AAIhB,UAAM,EAAE,QAAAuD,GAAQ,MAAAD,GAAM,UAAAN,GAAU,MAAAG,EAAM,IAAG;AACzC,QAAI,EAAE,KAAAK,EAAG,IAAK;AAEd,IAAAD,EAAOC,GAAK,IAAI,KAChBtD,GAAM,KAAK,OAAO,SAASsD,CAAG,CAAC,GAG3B,KAAK,YAAYR,IAAWQ,MAC5B,KAAK,QAAQF,GAAM,CAAC,GACpBE,IAAM;AAGV,aAASpD,IAAIoD,GAAKpD,IAAI4C,GAAU5C;AAC5B,MAAAmD,EAAOnD,CAAC,IAAI;AAIhB,IAAAkD,EAAK,aAAaN,IAAW,GAAG,OAAO,KAAK,SAAS,CAAC,GAAGG,CAAI,GAC7D,KAAK,QAAQG,GAAM,CAAC;AACpB,UAAMK,IAAQtD,GAAWL,CAAG,GACtBV,IAAM,KAAK;AAEjB,QAAIA,IAAM;AACN,YAAM,IAAI,MAAM,2CAA2C;AAC/D,UAAMsE,IAAStE,IAAM,GACfuE,IAAQ,KAAK,IAAK;AACxB,QAAID,IAASC,EAAM;AACf,YAAM,IAAI,MAAM,oCAAoC;AACxD,aAASzD,IAAI,GAAGA,IAAIwD,GAAQxD;AACxB,MAAAuD,EAAM,UAAU,IAAIvD,GAAGyD,EAAMzD,CAAC,GAAG+C,CAAI;AAAA,EACjD;AAAA,EACI,SAAS;AACL,UAAM,EAAE,QAAAI,GAAQ,WAAAN,EAAS,IAAK;AAC9B,SAAK,WAAWM,CAAM;AACtB,UAAM1B,IAAM0B,EAAO,MAAM,GAAGN,CAAS;AACrC,gBAAK,QAAS,GACPpB;AAAA,EACf;AAAA,EACI,WAAWiC,GAAI;AACX,IAAAA,UAAO,IAAI,KAAK,YAAa,IAC7BA,EAAG,IAAI,GAAG,KAAK,IAAG,CAAE;AACpB,UAAM,EAAE,UAAAd,GAAU,QAAAO,GAAQ,QAAAnE,GAAQ,UAAA2E,GAAU,WAAAC,GAAW,KAAAR,EAAG,IAAK;AAC/D,WAAAM,EAAG,YAAYE,GACfF,EAAG,WAAWC,GACdD,EAAG,SAAS1E,GACZ0E,EAAG,MAAMN,GACLpE,IAAS4D,KACTc,EAAG,OAAO,IAAIP,CAAM,GACjBO;AAAA,EACf;AAAA,EACI,QAAQ;AACJ,WAAO,KAAK,WAAY;AAAA,EAChC;AACA;AAMO,MAAMG,KAA4B,4BAAY,KAAK;AAAA,EACtD;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACxF,CAAC,GCpHKC,KAA2B,4BAAY,KAAK;AAAA,EAC9C;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACxF,CAAC,GAEKC,KAA2B,oBAAI,YAAY,EAAE;AAEnD,MAAMC,WAAiBC,GAAO;AAAA,EAC1B,YAAYpB,GAAW;AACnB,UAAM,IAAIA,GAAW,GAAG,EAAK;AAAA,EACrC;AAAA,EACI,MAAM;AACF,UAAM,EAAE,GAAAqB,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,EAAC,IAAK;AACnC,WAAO,CAACP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,CAAC;AAAA,EACtC;AAAA;AAAA,EAEI,IAAIP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAG;AACxB,SAAK,IAAIP,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI;AAAA,EACrB;AAAA,EACI,QAAQvB,GAAMwB,GAAQ;AAElB,aAAS1E,IAAI,GAAGA,IAAI,IAAIA,KAAK0E,KAAU;AACnCX,MAAAA,GAAS/D,CAAC,IAAIkD,EAAK,UAAUwB,GAAQ,EAAK;AAC9C,aAAS1E,IAAI,IAAIA,IAAI,IAAIA,KAAK;AAC1B,YAAM2E,IAAMZ,GAAS/D,IAAI,EAAE,GACrB4E,IAAKb,GAAS/D,IAAI,CAAC,GACnB6E,IAAK1E,EAAKwE,GAAK,CAAC,IAAIxE,EAAKwE,GAAK,EAAE,IAAKA,MAAQ,GAC7CG,IAAK3E,EAAKyE,GAAI,EAAE,IAAIzE,EAAKyE,GAAI,EAAE,IAAKA,MAAO;AACjDb,MAAAA,GAAS/D,CAAC,IAAK8E,IAAKf,GAAS/D,IAAI,CAAC,IAAI6E,IAAKd,GAAS/D,IAAI,EAAE,IAAK;AAAA,IAC3E;AAEQ,QAAI,EAAE,GAAAkE,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,EAAC,IAAK;AACjC,aAASzE,IAAI,GAAGA,IAAI,IAAIA,KAAK;AACzB,YAAM+E,IAAS5E,EAAKmE,GAAG,CAAC,IAAInE,EAAKmE,GAAG,EAAE,IAAInE,EAAKmE,GAAG,EAAE,GAC9CU,IAAMP,IAAIM,IAASxC,GAAI+B,GAAGC,GAAGC,CAAC,IAAIV,GAAS9D,CAAC,IAAI+D,GAAS/D,CAAC,IAAK,GAE/DiF,KADS9E,EAAK+D,GAAG,CAAC,IAAI/D,EAAK+D,GAAG,EAAE,IAAI/D,EAAK+D,GAAG,EAAE,KAC/BxB,GAAIwB,GAAGC,GAAGC,CAAC,IAAK;AACrC,MAAAK,IAAID,GACJA,IAAID,GACJA,IAAID,GACJA,IAAKD,IAAIW,IAAM,GACfX,IAAID,GACJA,IAAID,GACJA,IAAID,GACJA,IAAKc,IAAKC,IAAM;AAAA,IAC5B;AAEQ,IAAAf,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnB,KAAK,IAAIP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,CAAC;AAAA,EACvC;AAAA,EACI,aAAa;AACT3E,IAAAA,GAAMiE,EAAQ;AAAA,EACtB;AAAA,EACI,UAAU;AACN,SAAK,IAAI,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,CAAC,GAC/BjE,GAAM,KAAK,MAAM;AAAA,EACzB;AACA;AAEO,MAAMoF,WAAgBlB,GAAS;AAAA,EAWlC,cAAc;AACV,UAAM,EAAE;AATZ;AAAA;AAAA,IAAAhB,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AAAA,EAGvB;AACA;AAyQO,MAAMsB,KAAyBxD,gBAAAA;AAAAA,EAAa,MAAM,IAAIuD,GAAS;AAAA,EACtD,gBAAA7C,GAAQ,CAAI;AAAC;AClX7B;AAGA,MAAM+C,KAAsB,uBAAO,CAAC,GAC9BC,KAAsB,uBAAO,CAAC;AAC7B,SAASC,GAAMvG,GAAOH,IAAQ,IAAI;AACrC,MAAI,OAAOG,KAAU,WAAW;AAC5B,UAAMF,IAASD,KAAS,IAAIA,CAAK;AACjC,UAAM,IAAI,MAAMC,IAAS,gCAAgC,OAAOE,CAAK;AAAA,EAC7E;AACI,SAAOA;AACX;AAEA,SAASwG,GAAW5G,GAAG;AACnB,MAAI,OAAOA,KAAM;AACb,QAAI,CAAC6G,GAAS7G,CAAC;AACX,YAAM,IAAI,MAAM,mCAAmCA,CAAC;AAAA;AAGxD,IAAAD,GAAQC,CAAC;AACb,SAAOA;AACX;AAOO,SAAS8G,GAAoBC,GAAK;AACrC,QAAMhF,IAAM6E,GAAWG,CAAG,EAAE,SAAS,EAAE;AACvC,SAAOhF,EAAI,SAAS,IAAI,MAAMA,IAAMA;AACxC;AACO,SAASiF,GAAYjF,GAAK;AAC7B,MAAI,OAAOA,KAAQ;AACf,UAAM,IAAI,MAAM,8BAA8B,OAAOA,CAAG;AAC5D,SAAOA,MAAQ,KAAK0E,KAAM,OAAO,OAAO1E,CAAG;AAC/C;AAEO,SAASkF,GAAgB3G,GAAO;AACnC,SAAO0G,GAAYE,GAAY5G,CAAK,CAAC;AACzC;AACO,SAAS6G,GAAgB7G,GAAO;AACnC,SAAO0G,GAAYE,GAAYE,GAAUC,EAAQ/G,CAAK,CAAC,EAAE,QAAO,CAAE,CAAC;AACvE;AACO,SAASgH,GAAgBtH,GAAGO,GAAK;AACpC,EAAAR,GAAQQ,CAAG,GACXP,IAAI4G,GAAW5G,CAAC;AAChB,QAAM8C,IAAMyE,GAAYvH,EAAE,SAAS,EAAE,EAAE,SAASO,IAAM,GAAG,GAAG,CAAC;AAC7D,MAAIuC,EAAI,WAAWvC;AACf,UAAM,IAAI,MAAM,kBAAkB;AACtC,SAAOuC;AACX;AACO,SAAS0E,GAAgBxH,GAAGO,GAAK;AACpC,SAAO+G,GAAgBtH,GAAGO,CAAG,EAAE,QAAS;AAC5C;AAkBO,SAAS6G,GAAU9G,GAAO;AAC7B,SAAO,WAAW,KAAKA,CAAK;AAChC;AAgBA,MAAMuG,KAAW,CAAC7G,MAAM,OAAOA,KAAM,YAAYyG,MAAOzG;AACjD,SAASyH,GAAQzH,GAAGkB,GAAKwG,GAAK;AACjC,SAAOb,GAAS7G,CAAC,KAAK6G,GAAS3F,CAAG,KAAK2F,GAASa,CAAG,KAAKxG,KAAOlB,KAAKA,IAAI0H;AAC5E;AAMO,SAASC,GAAS1H,GAAOD,GAAGkB,GAAKwG,GAAK;AAMzC,MAAI,CAACD,GAAQzH,GAAGkB,GAAKwG,CAAG;AACpB,UAAM,IAAI,MAAM,oBAAoBzH,IAAQ,OAAOiB,IAAM,aAAawG,IAAM,WAAW1H,CAAC;AAChG;AAOO,SAAS4H,GAAO5H,GAAG;AACtB,MAAIO;AACJ,OAAKA,IAAM,GAAGP,IAAIyG,IAAKzG,MAAM0G,IAAKnG,KAAO;AACrC;AACJ,SAAOA;AACX;AAmBO,MAAMsH,KAAU,CAAC7H,OAAO0G,MAAO,OAAO1G,CAAC,KAAK0G;AAQ5C,SAASoB,GAAeC,GAASC,GAAUC,GAAQ;AAGtD,MAFAlI,GAAQgI,GAAS,SAAS,GAC1BhI,GAAQiI,GAAU,UAAU,GACxB,OAAOC,KAAW;AAClB,UAAM,IAAI,MAAM,2BAA2B;AAC/C,QAAMC,IAAM,CAAC3H,MAAQ,IAAI,WAAWA,CAAG,GACjC4H,IAAO,WAAW,GAAI,GACtBC,IAAQ,WAAW,GAAG,CAAI,GAC1BC,IAAQ,WAAW,GAAG,CAAI,GAC1BC,IAAgB;AAEtB,MAAIC,IAAIL,EAAIH,CAAO,GACfS,IAAIN,EAAIH,CAAO,GACf1G,IAAI;AACR,QAAMoH,IAAQ,MAAM;AAChB,IAAAF,EAAE,KAAK,CAAC,GACRC,EAAE,KAAK,CAAC,GACRnH,IAAI;AAAA,EACP,GACKT,IAAI,IAAI8H,MAAST,EAAOO,GAAGG,GAAaJ,GAAG,GAAGG,CAAI,CAAC,GACnDE,IAAS,CAACC,IAAOV,MAAS;AAI5B,IAFAK,IAAI5H,EAAEwH,GAAOS,CAAI,GACjBN,IAAI3H,EAAC,GACDiI,EAAK,WAAW,MAEpBL,IAAI5H,EAAEyH,GAAOQ,CAAI,GACjBN,IAAI3H,EAAC;AAAA,EACR,GACKkI,IAAM,MAAM;AAEd,QAAIzH,OAAOiH;AACP,YAAM,IAAI,MAAM,sCAAsC;AAC1D,QAAI/H,IAAM;AACV,UAAMU,IAAM,CAAE;AACd,WAAOV,IAAMyH,KAAU;AACnB,MAAAO,IAAI3H,EAAG;AACP,YAAMmI,IAAKR,EAAE,MAAO;AACpB,MAAAtH,EAAI,KAAK8H,CAAE,GACXxI,KAAOgI,EAAE;AAAA,IACrB;AACQ,WAAOI,GAAa,GAAG1H,CAAG;AAAA,EAC7B;AAUD,SATiB,CAAC4H,GAAMG,MAAS;AAC7B,IAAAP,EAAO,GACPG,EAAOC,CAAI;AACX,QAAI/F;AACJ,WAAO,EAAEA,IAAMkG,EAAKF,EAAK,CAAA;AACrB,MAAAF,EAAQ;AACZ,WAAAH,EAAO,GACA3F;AAAA,EACV;AAEL;AACO,SAASmG,GAAeC,GAAQC,IAAS,CAAA,GAAIC,IAAY,CAAA,GAAI;AAChE,MAAI,CAACF,KAAU,OAAOA,KAAW;AAC7B,UAAM,IAAI,MAAM,+BAA+B;AACnD,WAASG,EAAWC,GAAWC,GAAcC,GAAO;AAChD,UAAMC,IAAMP,EAAOI,CAAS;AAC5B,QAAIE,KAASC,MAAQ;AACjB;AACJ,UAAMC,IAAU,OAAOD;AACvB,QAAIC,MAAYH,KAAgBE,MAAQ;AACpC,YAAM,IAAI,MAAM,UAAUH,CAAS,0BAA0BC,CAAY,SAASG,CAAO,EAAE;AAAA,EACvG;AACI,QAAMC,IAAO,CAACC,GAAGJ,MAAU,OAAO,QAAQI,CAAC,EAAE,QAAQ,CAAC,CAACpB,GAAGD,CAAC,MAAMc,EAAWb,GAAGD,GAAGiB,CAAK,CAAC;AACxF,EAAAG,EAAKR,GAAQ,EAAK,GAClBQ,EAAKP,GAAW,EAAI;AACxB;AAWO,SAASS,GAASC,GAAI;AACzB,QAAMC,IAAM,oBAAI,QAAS;AACzB,SAAO,CAACC,MAAQC,MAAS;AACrB,UAAMR,IAAMM,EAAI,IAAIC,CAAG;AACvB,QAAIP,MAAQ;AACR,aAAOA;AACX,UAAMS,IAAWJ,EAAGE,GAAK,GAAGC,CAAI;AAChC,WAAAF,EAAI,IAAIC,GAAKE,CAAQ,GACdA;AAAA,EACV;AACL;ACzOA;AAIA,MAAMzD,IAAsB,uBAAO,CAAC,GAAGC,IAAsB,uBAAO,CAAC,GAAGyD,KAAsB,uBAAO,CAAC,GAEhGC,KAAsB,uBAAO,CAAC,GAAGC,KAAsB,uBAAO,CAAC,GAAGC,KAAsB,uBAAO,CAAC,GAEhGC,KAAsB,uBAAO,CAAC,GAAGC,KAAsB,uBAAO,CAAC,GAAGC,KAAsB,uBAAO,CAAC,GAChGC,KAAuB,uBAAO,EAAE;AAE/B,SAASC,EAAI7K,GAAG+D,GAAG;AACtB,QAAM+G,IAAS9K,IAAI+D;AACnB,SAAO+G,KAAUnE,IAAMmE,IAAS/G,IAAI+G;AACxC;AAWO,SAASC,EAAKC,GAAGC,GAAOC,GAAQ;AACnC,MAAIlI,IAAMgI;AACV,SAAOC,MAAUtE;AACb,IAAA3D,KAAOA,GACPA,KAAOkI;AAEX,SAAOlI;AACX;AAKO,SAASmI,GAAOC,GAAQF,GAAQ;AACnC,MAAIE,MAAWzE;AACX,UAAM,IAAI,MAAM,kCAAkC;AACtD,MAAIuE,KAAUvE;AACV,UAAM,IAAI,MAAM,4CAA4CuE,CAAM;AAEtE,MAAIlL,IAAI6K,EAAIO,GAAQF,CAAM,GACtBnH,IAAImH,GAEJF,IAAIrE,GAAc0E,IAAIzE;AAC1B,SAAO5G,MAAM2G,KAAK;AAEd,UAAM2E,IAAIvH,IAAI/D,GACRuL,IAAIxH,IAAI/D,GACRwL,IAAIR,IAAIK,IAAIC;AAGlB,IAAAvH,IAAI/D,GAAGA,IAAIuL,GAAGP,IAAIK,GAAUA,IAAIG;AAAA,EACxC;AAEI,MADYzH,MACA6C;AACR,UAAM,IAAI,MAAM,wBAAwB;AAC5C,SAAOiE,EAAIG,GAAGE,CAAM;AACxB;AACA,SAASO,GAAeC,GAAIC,GAAMzL,GAAG;AACjC,MAAI,CAACwL,EAAG,IAAIA,EAAG,IAAIC,CAAI,GAAGzL,CAAC;AACvB,UAAM,IAAI,MAAM,yBAAyB;AACjD;AAKA,SAAS0L,GAAUF,GAAIxL,GAAG;AACtB,QAAM2L,KAAUH,EAAG,QAAQ9E,KAAO2D,IAC5BoB,IAAOD,EAAG,IAAIxL,GAAG2L,CAAM;AAC7B,SAAAJ,GAAeC,GAAIC,GAAMzL,CAAC,GACnByL;AACX;AACA,SAASG,GAAUJ,GAAIxL,GAAG;AACtB,QAAM6L,KAAUL,EAAG,QAAQlB,MAAOE,IAC5B9H,IAAK8I,EAAG,IAAIxL,GAAGmK,EAAG,GAClB5B,IAAIiD,EAAG,IAAI9I,GAAImJ,CAAM,GACrBC,IAAKN,EAAG,IAAIxL,GAAGuI,CAAC,GAChB,IAAIiD,EAAG,IAAIA,EAAG,IAAIM,GAAI3B,EAAG,GAAG5B,CAAC,GAC7BkD,IAAOD,EAAG,IAAIM,GAAIN,EAAG,IAAI,GAAGA,EAAG,GAAG,CAAC;AACzC,SAAAD,GAAeC,GAAIC,GAAMzL,CAAC,GACnByL;AACX;AAGA,SAASM,GAAWC,GAAG;AACnB,QAAMC,IAAMC,GAAMF,CAAC,GACbG,IAAKC,GAAcJ,CAAC,GACpBK,IAAKF,EAAGF,GAAKA,EAAI,IAAIA,EAAI,GAAG,CAAC,GAC7BK,IAAKH,EAAGF,GAAKI,CAAE,GACfE,IAAKJ,EAAGF,GAAKA,EAAI,IAAII,CAAE,CAAC,GACxBG,KAAMR,IAAIzB,MAAOG;AACvB,SAAO,CAACc,GAAIxL,MAAM;AACd,QAAIyM,IAAMjB,EAAG,IAAIxL,GAAGwM,CAAE,GAClBE,IAAMlB,EAAG,IAAIiB,GAAKJ,CAAE;AACxB,UAAMM,IAAMnB,EAAG,IAAIiB,GAAKH,CAAE,GACpBM,IAAMpB,EAAG,IAAIiB,GAAKF,CAAE,GACpBM,IAAKrB,EAAG,IAAIA,EAAG,IAAIkB,CAAG,GAAG1M,CAAC,GAC1B8M,IAAKtB,EAAG,IAAIA,EAAG,IAAImB,CAAG,GAAG3M,CAAC;AAChC,IAAAyM,IAAMjB,EAAG,KAAKiB,GAAKC,GAAKG,CAAE,GAC1BH,IAAMlB,EAAG,KAAKoB,GAAKD,GAAKG,CAAE;AAC1B,UAAMC,IAAKvB,EAAG,IAAIA,EAAG,IAAIkB,CAAG,GAAG1M,CAAC,GAC1ByL,IAAOD,EAAG,KAAKiB,GAAKC,GAAKK,CAAE;AACjC,WAAAxB,GAAeC,GAAIC,GAAMzL,CAAC,GACnByL;AAAA,EACV;AACL;AAQO,SAASW,GAAcJ,GAAG;AAG7B,MAAIA,IAAI5B;AACJ,UAAM,IAAI,MAAM,qCAAqC;AAEzD,MAAI4C,IAAIhB,IAAItF,GACRuG,IAAI;AACR,SAAOD,IAAI7C,OAAQ1D;AACf,IAAAuG,KAAK7C,IACL8C;AAGJ,MAAIC,IAAI/C;AACR,QAAMgD,IAAMjB,GAAMF,CAAC;AACnB,SAAOoB,GAAWD,GAAKD,CAAC,MAAM;AAG1B,QAAIA,MAAM;AACN,YAAM,IAAI,MAAM,+CAA+C;AAGvE,MAAID,MAAM;AACN,WAAOvB;AAGX,MAAI2B,IAAKF,EAAI,IAAID,GAAGF,CAAC;AACrB,QAAMM,KAAUN,IAAItG,KAAOyD;AAC3B,SAAO,SAAqBqB,GAAIxL,GAAG;AAC/B,QAAIwL,EAAG,IAAIxL,CAAC;AACR,aAAOA;AAEX,QAAIoN,GAAW5B,GAAIxL,CAAC,MAAM;AACtB,YAAM,IAAI,MAAM,yBAAyB;AAE7C,QAAIuN,IAAIN,GACJnJ,IAAI0H,EAAG,IAAIA,EAAG,KAAK6B,CAAE,GACrBG,IAAIhC,EAAG,IAAIxL,GAAGgN,CAAC,GACfS,IAAIjC,EAAG,IAAIxL,GAAGsN,CAAM;AAGxB,WAAO,CAAC9B,EAAG,IAAIgC,GAAGhC,EAAG,GAAG,KAAG;AACvB,UAAIA,EAAG,IAAIgC,CAAC;AACR,eAAOhC,EAAG;AACd,UAAInK,IAAI,GAEJqM,IAAQlC,EAAG,IAAIgC,CAAC;AACpB,aAAO,CAAChC,EAAG,IAAIkC,GAAOlC,EAAG,GAAG;AAGxB,YAFAnK,KACAqM,IAAQlC,EAAG,IAAIkC,CAAK,GAChBrM,MAAMkM;AACN,gBAAM,IAAI,MAAM,yBAAyB;AAGjD,YAAMI,IAAWjH,KAAO,OAAO6G,IAAIlM,IAAI,CAAC,GAClCwC,IAAI2H,EAAG,IAAI1H,GAAG6J,CAAQ;AAE5B,MAAAJ,IAAIlM,GACJyC,IAAI0H,EAAG,IAAI3H,CAAC,GACZ2J,IAAIhC,EAAG,IAAIgC,GAAG1J,CAAC,GACf2J,IAAIjC,EAAG,IAAIiC,GAAG5J,CAAC;AAAA,IAC3B;AACQ,WAAO4J;AAAA,EACV;AACL;AAYO,SAASG,GAAO5B,GAAG;AAEtB,SAAIA,IAAI3B,OAAQD,KACLsB,KAEPM,IAAIxB,OAAQF,KACLsB,KAEPI,IAAItB,OAASD,KACNsB,GAAWC,CAAC,IAEhBI,GAAcJ,CAAC;AAC1B;AAIA,MAAM6B,KAAe;AAAA,EACjB;AAAA,EAAU;AAAA,EAAW;AAAA,EAAO;AAAA,EAAO;AAAA,EAAO;AAAA,EAAQ;AAAA,EAClD;AAAA,EAAO;AAAA,EAAO;AAAA,EAAO;AAAA,EAAO;AAAA,EAAO;AAAA,EACnC;AAAA,EAAQ;AAAA,EAAQ;AAAA,EAAQ;AAC5B;AACO,SAASC,GAAcC,GAAO;AACjC,QAAMC,IAAU;AAAA,IACZ,OAAO;AAAA,IACP,OAAO;AAAA,IACP,MAAM;AAAA,EACT,GACK3K,IAAOwK,GAAa,OAAO,CAAC9D,GAAKN,OACnCM,EAAIN,CAAG,IAAI,YACJM,IACRiE,CAAO;AACV,SAAA/E,GAAe8E,GAAO1K,CAAI,GAInB0K;AACX;AAMO,SAASE,GAAMzC,GAAIzE,GAAKgE,GAAO;AAClC,MAAIA,IAAQtE;AACR,UAAM,IAAI,MAAM,yCAAyC;AAC7D,MAAIsE,MAAUtE;AACV,WAAO+E,EAAG;AACd,MAAIT,MAAUrE;AACV,WAAOK;AACX,MAAImH,IAAI1C,EAAG,KACP2C,IAAIpH;AACR,SAAOgE,IAAQtE;AACX,IAAIsE,IAAQrE,MACRwH,IAAI1C,EAAG,IAAI0C,GAAGC,CAAC,IACnBA,IAAI3C,EAAG,IAAI2C,CAAC,GACZpD,MAAUrE;AAEd,SAAOwH;AACX;AAMO,SAASE,GAAc5C,GAAI6C,GAAMC,IAAW,IAAO;AACtD,QAAMC,IAAW,IAAI,MAAMF,EAAK,MAAM,EAAE,KAAKC,IAAW9C,EAAG,OAAO,MAAS,GAErEgD,IAAgBH,EAAK,OAAO,CAACI,GAAK1H,GAAK1F,MACrCmK,EAAG,IAAIzE,CAAG,IACH0H,KACXF,EAASlN,CAAC,IAAIoN,GACPjD,EAAG,IAAIiD,GAAK1H,CAAG,IACvByE,EAAG,GAAG,GAEHkD,IAAclD,EAAG,IAAIgD,CAAa;AAExC,SAAAH,EAAK,YAAY,CAACI,GAAK1H,GAAK1F,MACpBmK,EAAG,IAAIzE,CAAG,IACH0H,KACXF,EAASlN,CAAC,IAAImK,EAAG,IAAIiD,GAAKF,EAASlN,CAAC,CAAC,GAC9BmK,EAAG,IAAIiD,GAAK1H,CAAG,IACvB2H,CAAW,GACPH;AACX;AAcO,SAASnB,GAAW5B,GAAIxL,GAAG;AAG9B,QAAM2O,KAAUnD,EAAG,QAAQ9E,KAAOyD,IAC5ByE,IAAUpD,EAAG,IAAIxL,GAAG2O,CAAM,GAC1BE,IAAMrD,EAAG,IAAIoD,GAASpD,EAAG,GAAG,GAC5BsD,IAAOtD,EAAG,IAAIoD,GAASpD,EAAG,IAAI,GAC9BuD,IAAKvD,EAAG,IAAIoD,GAASpD,EAAG,IAAIA,EAAG,GAAG,CAAC;AACzC,MAAI,CAACqD,KAAO,CAACC,KAAQ,CAACC;AAClB,UAAM,IAAI,MAAM,gCAAgC;AACpD,SAAOF,IAAM,IAAIC,IAAO,IAAI;AAChC;AAOO,SAASE,GAAQhP,GAAGiP,GAAY;AAEnC,EAAIA,MAAe,UACflP,GAAQkP,CAAU;AACtB,QAAMC,IAAcD,MAAe,SAAYA,IAAajP,EAAE,SAAS,CAAC,EAAE,QACpEmP,IAAc,KAAK,KAAKD,IAAc,CAAC;AAC7C,SAAO,EAAE,YAAYA,GAAa,aAAAC,EAAa;AACnD;AACA,MAAMC,GAAO;AAAA,EAUT,YAAYC,GAAOhM,IAAO,IAAI;AAT9B,IAAAgB,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA,cAAOoC;AACP,IAAApC,EAAA,aAAMqC;AACN,IAAArC,EAAA;AACA,IAAAA,EAAA;AACA;AAAA,IAAAA,EAAA;;AAEI,QAAIgL,KAAS5I;AACT,YAAM,IAAI,MAAM,4CAA4C4I,CAAK;AACrE,QAAIC;AACJ,SAAK,OAAO,IACRjM,KAAQ,QAAQ,OAAOA,KAAS,aAC5B,OAAOA,EAAK,QAAS,aACrBiM,IAAcjM,EAAK,OACnB,OAAOA,EAAK,QAAS,eACrB,KAAK,OAAOA,EAAK,OACjB,OAAOA,EAAK,QAAS,cACrB,KAAK,OAAOA,EAAK,OACjBA,EAAK,mBACL,KAAK,YAAWkM,IAAAlM,EAAK,mBAAL,gBAAAkM,EAAqB,UACrC,OAAOlM,EAAK,gBAAiB,cAC7B,KAAK,OAAOA,EAAK;AAEzB,UAAM,EAAE,YAAA4L,GAAY,aAAAE,EAAW,IAAKH,GAAQK,GAAOC,CAAW;AAC9D,QAAIH,IAAc;AACd,YAAM,IAAI,MAAM,gDAAgD;AACpE,SAAK,QAAQE,GACb,KAAK,OAAOJ,GACZ,KAAK,QAAQE,GACb,KAAK,QAAQ,QACb,OAAO,kBAAkB,IAAI;AAAA,EACrC;AAAA,EACI,OAAOpI,GAAK;AACR,WAAO4D,EAAI5D,GAAK,KAAK,KAAK;AAAA,EAClC;AAAA,EACI,QAAQA,GAAK;AACT,QAAI,OAAOA,KAAQ;AACf,YAAM,IAAI,MAAM,iDAAiD,OAAOA,CAAG;AAC/E,WAAON,KAAOM,KAAOA,IAAM,KAAK;AAAA,EACxC;AAAA,EACI,IAAIA,GAAK;AACL,WAAOA,MAAQN;AAAAA,EACvB;AAAA;AAAA,EAEI,YAAYM,GAAK;AACb,WAAO,CAAC,KAAK,IAAIA,CAAG,KAAK,KAAK,QAAQA,CAAG;AAAA,EACjD;AAAA,EACI,MAAMA,GAAK;AACP,YAAQA,IAAML,OAASA;AAAAA,EAC/B;AAAA,EACI,IAAIK,GAAK;AACL,WAAO4D,EAAI,CAAC5D,GAAK,KAAK,KAAK;AAAA,EACnC;AAAA,EACI,IAAIyI,GAAKC,GAAK;AACV,WAAOD,MAAQC;AAAA,EACvB;AAAA,EACI,IAAI1I,GAAK;AACL,WAAO4D,EAAI5D,IAAMA,GAAK,KAAK,KAAK;AAAA,EACxC;AAAA,EACI,IAAIyI,GAAKC,GAAK;AACV,WAAO9E,EAAI6E,IAAMC,GAAK,KAAK,KAAK;AAAA,EACxC;AAAA,EACI,IAAID,GAAKC,GAAK;AACV,WAAO9E,EAAI6E,IAAMC,GAAK,KAAK,KAAK;AAAA,EACxC;AAAA,EACI,IAAID,GAAKC,GAAK;AACV,WAAO9E,EAAI6E,IAAMC,GAAK,KAAK,KAAK;AAAA,EACxC;AAAA,EACI,IAAI1I,GAAKgE,GAAO;AACZ,WAAOkD,GAAM,MAAMlH,GAAKgE,CAAK;AAAA,EACrC;AAAA,EACI,IAAIyE,GAAKC,GAAK;AACV,WAAO9E,EAAI6E,IAAMvE,GAAOwE,GAAK,KAAK,KAAK,GAAG,KAAK,KAAK;AAAA,EAC5D;AAAA;AAAA,EAEI,KAAK1I,GAAK;AACN,WAAOA,IAAMA;AAAA,EACrB;AAAA,EACI,KAAKyI,GAAKC,GAAK;AACX,WAAOD,IAAMC;AAAA,EACrB;AAAA,EACI,KAAKD,GAAKC,GAAK;AACX,WAAOD,IAAMC;AAAA,EACrB;AAAA,EACI,KAAKD,GAAKC,GAAK;AACX,WAAOD,IAAMC;AAAA,EACrB;AAAA,EACI,IAAI1I,GAAK;AACL,WAAOkE,GAAOlE,GAAK,KAAK,KAAK;AAAA,EACrC;AAAA,EACI,KAAKA,GAAK;AAEN,WAAK,KAAK,UACN,KAAK,QAAQ6G,GAAO,KAAK,KAAK,IAC3B,KAAK,MAAM,MAAM7G,CAAG;AAAA,EACnC;AAAA,EACI,QAAQA,GAAK;AACT,WAAO,KAAK,OAAOS,GAAgBT,GAAK,KAAK,KAAK,IAAIO,GAAgBP,GAAK,KAAK,KAAK;AAAA,EAC7F;AAAA,EACI,UAAUzG,GAAOoP,IAAiB,IAAO;AACrCvP,IAAAA,EAAOG,CAAK;AACZ,UAAM,EAAE,UAAUqP,GAAgB,OAAAC,GAAO,MAAAxL,GAAM,OAAAiL,GAAO,MAAMQ,EAAY,IAAK;AAC7E,QAAIF,GAAgB;AAChB,UAAI,CAACA,EAAe,SAASrP,EAAM,MAAM,KAAKA,EAAM,SAASsP;AACzD,cAAM,IAAI,MAAM,+BAA+BD,IAAiB,iBAAiBrP,EAAM,MAAM;AAEjG,YAAMwP,IAAS,IAAI,WAAWF,CAAK;AAEnC,MAAAE,EAAO,IAAIxP,GAAO8D,IAAO,IAAI0L,EAAO,SAASxP,EAAM,MAAM,GACzDA,IAAQwP;AAAA,IACpB;AACQ,QAAIxP,EAAM,WAAWsP;AACjB,YAAM,IAAI,MAAM,+BAA+BA,IAAQ,iBAAiBtP,EAAM,MAAM;AACxF,QAAIyP,IAAS3L,IAAO+C,GAAgB7G,CAAK,IAAI2G,GAAgB3G,CAAK;AAGlE,QAFIuP,MACAE,IAASpF,EAAIoF,GAAQV,CAAK,IAC1B,CAACK,KACG,CAAC,KAAK,QAAQK,CAAM;AACpB,YAAM,IAAI,MAAM,kDAAkD;AAG1E,WAAOA;AAAA,EACf;AAAA;AAAA,EAEI,YAAYC,GAAK;AACb,WAAO5B,GAAc,MAAM4B,CAAG;AAAA,EACtC;AAAA;AAAA;AAAA,EAGI,KAAKlQ,GAAG+D,GAAGoM,GAAW;AAClB,WAAOA,IAAYpM,IAAI/D;AAAA,EAC/B;AACA;AAoBO,SAASoM,GAAMmD,GAAOhM,IAAO,IAAI;AACpC,SAAO,IAAI+L,GAAOC,GAAOhM,CAAI;AACjC;AAgCO,SAAS6M,GAAoBC,GAAY;AAC5C,MAAI,OAAOA,KAAe;AACtB,UAAM,IAAI,MAAM,4BAA4B;AAChD,QAAMC,IAAYD,EAAW,SAAS,CAAC,EAAE;AACzC,SAAO,KAAK,KAAKC,IAAY,CAAC;AAClC;AAQO,SAASC,GAAiBF,GAAY;AACzC,QAAM9P,IAAS6P,GAAoBC,CAAU;AAC7C,SAAO9P,IAAS,KAAK,KAAKA,IAAS,CAAC;AACxC;AAcO,SAASiQ,GAAeC,GAAKJ,GAAY/L,IAAO,IAAO;AAC1DjE,EAAAA,EAAOoQ,CAAG;AACV,QAAMhQ,IAAMgQ,EAAI,QACVC,IAAWN,GAAoBC,CAAU,GACzCM,IAASJ,GAAiBF,CAAU;AAE1C,MAAI5P,IAAM,MAAMA,IAAMkQ,KAAUlQ,IAAM;AAClC,UAAM,IAAI,MAAM,cAAckQ,IAAS,+BAA+BlQ,CAAG;AAC7E,QAAMwG,IAAM3C,IAAO+C,GAAgBoJ,CAAG,IAAItJ,GAAgBsJ,CAAG,GAEvDG,IAAU/F,EAAI5D,GAAKoJ,IAAazJ,CAAG,IAAIA;AAC7C,SAAOtC,IAAOoD,GAAgBkJ,GAASF,CAAQ,IAAIlJ,GAAgBoJ,GAASF,CAAQ;AACxF;ACpiBA;AAGA,MAAM/J,KAAsB,uBAAO,CAAC,GAC9BC,KAAsB,uBAAO,CAAC;AAC7B,SAASiK,GAASV,GAAWW,GAAM;AACtC,QAAMC,IAAMD,EAAK,OAAQ;AACzB,SAAOX,IAAYY,IAAMD;AAC7B;AAOO,SAASE,GAAWhN,GAAGiN,GAAQ;AAClC,QAAMC,IAAa5C,GAActK,EAAE,IAAIiN,EAAO,IAAI,CAAC7C,MAAMA,EAAE,CAAC,CAAC;AAC7D,SAAO6C,EAAO,IAAI,CAAC7C,GAAG7M,MAAMyC,EAAE,WAAWoK,EAAE,SAAS8C,EAAW3P,CAAC,CAAC,CAAC,CAAC;AACvE;AACA,SAAS4P,GAAUC,GAAGC,GAAM;AACxB,MAAI,CAAC,OAAO,cAAcD,CAAC,KAAKA,KAAK,KAAKA,IAAIC;AAC1C,UAAM,IAAI,MAAM,uCAAuCA,IAAO,cAAcD,CAAC;AACrF;AACA,SAASE,GAAUF,GAAGG,GAAY;AAC9B,EAAAJ,GAAUC,GAAGG,CAAU;AACvB,QAAMC,IAAU,KAAK,KAAKD,IAAaH,CAAC,IAAI,GACtCK,IAAa,MAAML,IAAI,IACvBM,IAAY,KAAKN,GACjBO,IAAO5J,GAAQqJ,CAAC,GAChBQ,IAAU,OAAOR,CAAC;AACxB,SAAO,EAAE,SAAAI,GAAS,YAAAC,GAAY,MAAAE,GAAM,WAAAD,GAAW,SAAAE,EAAS;AAC5D;AACA,SAASC,GAAY3R,GAAG4R,GAAQC,GAAO;AACnC,QAAM,EAAE,YAAAN,GAAY,MAAAE,GAAM,WAAAD,GAAW,SAAAE,EAAS,IAAGG;AACjD,MAAIC,IAAQ,OAAO9R,IAAIyR,CAAI,GACvBM,IAAQ/R,KAAK0R;AAMjB,EAAII,IAAQP,MAERO,KAASN,GACTO,KAASrL;AAEb,QAAMsL,IAAcJ,IAASL,GACvBxL,IAASiM,IAAc,KAAK,IAAIF,CAAK,IAAI,GACzCG,IAASH,MAAU,GACnBI,IAAQJ,IAAQ,GAChBK,IAASP,IAAS,MAAM;AAE9B,SAAO,EAAE,OAAAG,GAAO,QAAAhM,GAAQ,QAAAkM,GAAQ,OAAAC,GAAO,QAAAC,GAAQ,SAD/BH,EACwC;AAC5D;AAoBA,MAAMI,KAAmB,oBAAI,QAAS,GAChCC,KAAmB,oBAAI,QAAS;AACtC,SAASC,GAAKtG,GAAG;AAGb,SAAOqG,GAAiB,IAAIrG,CAAC,KAAK;AACtC;AACA,SAASuG,GAAQvS,GAAG;AAChB,MAAIA,MAAMyG;AACN,UAAM,IAAI,MAAM,cAAc;AACtC;AAmBO,MAAM+L,GAAK;AAAA;AAAA,EAMd,YAAYC,GAAOtB,GAAM;AALzB,IAAA9M,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AAGI,SAAK,OAAOoO,EAAM,MAClB,KAAK,OAAOA,EAAM,MAClB,KAAK,KAAKA,EAAM,IAChB,KAAK,OAAOtB;AAAA,EACpB;AAAA;AAAA,EAEI,cAAcuB,GAAK1S,GAAGkO,IAAI,KAAK,MAAM;AACjC,QAAIC,IAAIuE;AACR,WAAO1S,IAAIyG;AACP,MAAIzG,IAAI0G,OACJwH,IAAIA,EAAE,IAAIC,CAAC,IACfA,IAAIA,EAAE,OAAQ,GACdnO,MAAM0G;AAEV,WAAOwH;AAAA,EACf;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaI,iBAAiByE,GAAOzB,GAAG;AACvB,UAAM,EAAE,SAAAI,GAAS,YAAAC,EAAY,IAAGH,GAAUF,GAAG,KAAK,IAAI,GAChDH,IAAS,CAAE;AACjB,QAAI7C,IAAIyE,GACJC,IAAO1E;AACX,aAAS0D,IAAS,GAAGA,IAASN,GAASM,KAAU;AAC7C,MAAAgB,IAAO1E,GACP6C,EAAO,KAAK6B,CAAI;AAEhB,eAASvR,IAAI,GAAGA,IAAIkQ,GAAYlQ;AAC5B,QAAAuR,IAAOA,EAAK,IAAI1E,CAAC,GACjB6C,EAAO,KAAK6B,CAAI;AAEpB,MAAA1E,IAAI0E,EAAK,OAAQ;AAAA,IAC7B;AACQ,WAAO7B;AAAA,EACf;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOI,KAAKG,GAAG2B,GAAa,GAAG;AAEpB,QAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;AAClB,YAAM,IAAI,MAAM,gBAAgB;AAEpC,QAAI3E,IAAI,KAAK,MACTtE,IAAI,KAAK;AAMb,UAAMkJ,IAAK1B,GAAUF,GAAG,KAAK,IAAI;AACjC,aAASU,IAAS,GAAGA,IAASkB,EAAG,SAASlB,KAAU;AAEhD,YAAM,EAAE,OAAAG,GAAO,QAAAhM,GAAQ,QAAAkM,GAAQ,OAAAC,GAAO,QAAAC,GAAQ,SAAAY,EAAO,IAAKpB,GAAY,GAAGC,GAAQkB,CAAE;AACnF,UAAIf,GACAE,IAGArI,IAAIA,EAAE,IAAI+G,GAASwB,GAAQU,EAAYE,CAAO,CAAC,CAAC,IAIhD7E,IAAIA,EAAE,IAAIyC,GAASuB,GAAOW,EAAY9M,CAAM,CAAC,CAAC;AAAA,IAE9D;AACQ,WAAAwM,GAAQ,CAAC,GAIF,EAAE,GAAArE,GAAG,GAAAtE,EAAG;AAAA,EACvB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAMI,WAAWsH,GAAG2B,GAAa,GAAGpE,IAAM,KAAK,MAAM;AAC3C,UAAMqE,IAAK1B,GAAUF,GAAG,KAAK,IAAI;AACjC,aAASU,IAAS,GAAGA,IAASkB,EAAG,WACzB,MAAMrM,IAD4BmL,KAAU;AAGhD,YAAM,EAAE,OAAAG,GAAO,QAAAhM,GAAQ,QAAAkM,GAAQ,OAAAC,EAAO,IAAGP,GAAY,GAAGC,GAAQkB,CAAE;AAElE,UADA,IAAIf,GACA,CAAAE,GAKC;AACD,cAAMrB,IAAOiC,EAAY9M,CAAM;AAC/B,QAAA0I,IAAMA,EAAI,IAAIyD,IAAQtB,EAAK,OAAM,IAAKA,CAAI;AAAA,MAC1D;AAAA,IACA;AACQ,WAAA2B,GAAQ,CAAC,GACF9D;AAAA,EACf;AAAA,EACI,eAAeyC,GAAGyB,GAAOK,GAAW;AAEhC,QAAIC,IAAOb,GAAiB,IAAIO,CAAK;AACrC,WAAKM,MACDA,IAAO,KAAK,iBAAiBN,GAAOzB,CAAC,GACjCA,MAAM,MAEF,OAAO8B,KAAc,eACrBC,IAAOD,EAAUC,CAAI,IACzBb,GAAiB,IAAIO,GAAOM,CAAI,KAGjCA;AAAA,EACf;AAAA,EACI,OAAON,GAAO5C,GAAQiD,GAAW;AAC7B,UAAM9B,IAAIoB,GAAKK,CAAK;AACpB,WAAO,KAAK,KAAKzB,GAAG,KAAK,eAAeA,GAAGyB,GAAOK,CAAS,GAAGjD,CAAM;AAAA,EAC5E;AAAA,EACI,OAAO4C,GAAO5C,GAAQiD,GAAWE,GAAM;AACnC,UAAMhC,IAAIoB,GAAKK,CAAK;AACpB,WAAIzB,MAAM,IACC,KAAK,cAAcyB,GAAO5C,GAAQmD,CAAI,IAC1C,KAAK,WAAWhC,GAAG,KAAK,eAAeA,GAAGyB,GAAOK,CAAS,GAAGjD,GAAQmD,CAAI;AAAA,EACxF;AAAA;AAAA;AAAA;AAAA,EAII,YAAYlH,GAAGkF,GAAG;AACd,IAAAD,GAAUC,GAAG,KAAK,IAAI,GACtBmB,GAAiB,IAAIrG,GAAGkF,CAAC,GACzBkB,GAAiB,OAAOpG,CAAC;AAAA,EACjC;AAAA,EACI,SAAS0G,GAAK;AACV,WAAOJ,GAAKI,CAAG,MAAM;AAAA,EAC7B;AACA;AAKO,SAASS,GAAcV,GAAOE,GAAOS,GAAIC,GAAI;AAChD,MAAI5E,IAAMkE,GACNW,IAAKb,EAAM,MACXc,IAAKd,EAAM;AACf,SAAOW,IAAK3M,MAAO4M,IAAK5M;AACpB,IAAI2M,IAAK1M,OACL4M,IAAKA,EAAG,IAAI7E,CAAG,IACf4E,IAAK3M,OACL6M,IAAKA,EAAG,IAAI9E,CAAG,IACnBA,IAAMA,EAAI,OAAQ,GAClB2E,MAAO1M,IACP2M,MAAO3M;AAEX,SAAO,EAAE,IAAA4M,GAAI,IAAAC,EAAI;AACrB;AA2IA,SAASC,GAAYC,GAAO1F,GAAO3J,GAAM;AACrC,MAAI2J,GAAO;AACP,QAAIA,EAAM,UAAU0F;AAChB,YAAM,IAAI,MAAM,gDAAgD;AACpE,WAAA3F,GAAcC,CAAK,GACZA;AAAA,EACf;AAEQ,WAAO7B,GAAMuH,GAAO,EAAE,MAAArP,GAAM;AAEpC;AAEO,SAASsP,GAAkBC,GAAMC,GAAOC,IAAY,CAAA,GAAIC,GAAQ;AAGnE,MAFIA,MAAW,WACXA,IAASH,MAAS,YAClB,CAACC,KAAS,OAAOA,KAAU;AAC3B,UAAM,IAAI,MAAM,kBAAkBD,CAAI,eAAe;AACzD,aAAWzF,KAAK,CAAC,KAAK,KAAK,GAAG,GAAG;AAC7B,UAAMzE,IAAMmK,EAAM1F,CAAC;AACnB,QAAI,EAAE,OAAOzE,KAAQ,YAAYA,IAAMhD;AACnC,YAAM,IAAI,MAAM,SAASyH,CAAC,0BAA0B;AAAA,EAChE;AACI,QAAM1C,IAAKgI,GAAYI,EAAM,GAAGC,EAAU,IAAIC,CAAM,GAC9CC,IAAKP,GAAYI,EAAM,GAAGC,EAAU,IAAIC,CAAM,GAE9CE,IAAS,CAAC,MAAM,MAAM,KADQ,GACD;AACnC,aAAW9F,KAAK8F;AAEZ,QAAI,CAACxI,EAAG,QAAQoI,EAAM1F,CAAC,CAAC;AACpB,YAAM,IAAI,MAAM,SAASA,CAAC,0CAA0C;AAE5E,SAAA0F,IAAQ,OAAO,OAAO,OAAO,OAAO,CAAA,GAAIA,CAAK,CAAC,GACvC,EAAE,OAAAA,GAAO,IAAApI,GAAI,IAAAuI,EAAI;AAC5B;AACO,SAASE,GAAaC,GAAiBC,GAAc;AACxD,SAAO,SAAgBtL,GAAM;AACzB,UAAMuL,IAAYF,EAAgBrL,CAAI;AACtC,WAAO,EAAE,WAAAuL,GAAW,WAAWD,EAAaC,CAAS,EAAG;AAAA,EAC3D;AACL;ACjcO,MAAMC,GAAM;AAAA,EAOf,YAAYC,GAAM/D,GAAK;AANvB,IAAAlM,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA,kBAAW;AACX,IAAAA,EAAA,mBAAY;AAKR,QAHA1D,GAAM2T,CAAI,GACVnU,EAAOoQ,GAAK,QAAW,KAAK,GAC5B,KAAK,QAAQ+D,EAAK,OAAQ,GACtB,OAAO,KAAK,MAAM,UAAW;AAC7B,YAAM,IAAI,MAAM,qDAAqD;AACzE,SAAK,WAAW,KAAK,MAAM,UAC3B,KAAK,YAAY,KAAK,MAAM;AAC5B,UAAMrQ,IAAW,KAAK,UAChBlB,IAAM,IAAI,WAAWkB,CAAQ;AAEnC,IAAAlB,EAAI,IAAIwN,EAAI,SAAStM,IAAWqQ,EAAK,OAAQ,EAAC,OAAO/D,CAAG,EAAE,OAAM,IAAKA,CAAG;AACxE,aAASlP,IAAI,GAAGA,IAAI0B,EAAI,QAAQ1B;AAC5B,MAAA0B,EAAI1B,CAAC,KAAK;AACd,SAAK,MAAM,OAAO0B,CAAG,GAErB,KAAK,QAAQuR,EAAK,OAAQ;AAE1B,aAASjT,IAAI,GAAGA,IAAI0B,EAAI,QAAQ1B;AAC5B,MAAA0B,EAAI1B,CAAC,KAAK;AACd,SAAK,MAAM,OAAO0B,CAAG,GACrB5B,GAAM4B,CAAG;AAAA,EACjB;AAAA,EACI,OAAOwR,GAAK;AACR1T,WAAAA,GAAQ,IAAI,GACZ,KAAK,MAAM,OAAO0T,CAAG,GACd;AAAA,EACf;AAAA,EACI,WAAWtT,GAAK;AACZJ,IAAAA,GAAQ,IAAI,GACZV,EAAOc,GAAK,KAAK,WAAW,QAAQ,GACpC,KAAK,WAAW,IAChB,KAAK,MAAM,WAAWA,CAAG,GACzB,KAAK,MAAM,OAAOA,CAAG,GACrB,KAAK,MAAM,WAAWA,CAAG,GACzB,KAAK,QAAS;AAAA,EACtB;AAAA,EACI,SAAS;AACL,UAAMA,IAAM,IAAI,WAAW,KAAK,MAAM,SAAS;AAC/C,gBAAK,WAAWA,CAAG,GACZA;AAAA,EACf;AAAA,EACI,WAAW8D,GAAI;AAEX,IAAAA,UAAO,OAAO,OAAO,OAAO,eAAe,IAAI,GAAG,EAAE;AACpD,UAAM,EAAE,OAAAyP,GAAO,OAAAC,GAAO,UAAAzP,GAAU,WAAAC,GAAW,UAAAhB,GAAU,WAAAC,EAAS,IAAK;AACnE,WAAAa,IAAKA,GACLA,EAAG,WAAWC,GACdD,EAAG,YAAYE,GACfF,EAAG,WAAWd,GACdc,EAAG,YAAYb,GACfa,EAAG,QAAQyP,EAAM,WAAWzP,EAAG,KAAK,GACpCA,EAAG,QAAQ0P,EAAM,WAAW1P,EAAG,KAAK,GAC7BA;AAAA,EACf;AAAA,EACI,QAAQ;AACJ,WAAO,KAAK,WAAY;AAAA,EAChC;AAAA,EACI,UAAU;AACN,SAAK,YAAY,IACjB,KAAK,MAAM,QAAS,GACpB,KAAK,MAAM,QAAS;AAAA,EAC5B;AACA;AAWO,MAAM2P,KAAO,CAACJ,GAAM/D,GAAK3Q,MAAY,IAAIyU,GAAMC,GAAM/D,CAAG,EAAE,OAAO3Q,CAAO,EAAE,OAAQ;AACzF8U,GAAK,SAAS,CAACJ,GAAM/D,MAAQ,IAAI8D,GAAMC,GAAM/D,CAAG;AC9DhD;AAOA,MAAMoE,KAAa,CAAC5N,GAAK6N,OAAS7N,KAAOA,KAAO,IAAI6N,IAAM,CAACA,KAAOzK,MAAOyK;AAIlE,SAASC,GAAiBrM,GAAGsM,GAAO9U,GAAG;AAI1C,QAAM,CAAC,CAAC+U,GAAIC,CAAE,GAAG,CAACC,GAAIC,CAAE,CAAC,IAAIJ,GACvBzI,IAAKsI,GAAWO,IAAK1M,GAAGxI,CAAC,GACzBsM,IAAKqI,GAAW,CAACK,IAAKxM,GAAGxI,CAAC;AAGhC,MAAIoT,IAAK5K,IAAI6D,IAAK0I,IAAKzI,IAAK2I,GACxB5B,IAAK,CAAChH,IAAK2I,IAAK1I,IAAK4I;AACzB,QAAMC,IAAQ/B,IAAK3M,IACb2O,IAAQ/B,IAAK5M;AACnB,EAAI0O,MACA/B,IAAK,CAACA,IACNgC,MACA/B,IAAK,CAACA;AAGV,QAAMgC,IAAUxN,GAAQ,KAAK,KAAKD,GAAO5H,CAAC,IAAI,CAAC,CAAC,IAAI0G;AACpD,MAAI0M,IAAK3M,MAAO2M,KAAMiC,KAAWhC,IAAK5M,MAAO4M,KAAMgC;AAC/C,UAAM,IAAI,MAAM,2CAA2C7M,CAAC;AAEhE,SAAO,EAAE,OAAA2M,GAAO,IAAA/B,GAAI,OAAAgC,GAAO,IAAA/B,EAAI;AACnC;AACA,SAASiC,GAAkBC,GAAQ;AAC/B,MAAI,CAAC,CAAC,WAAW,aAAa,KAAK,EAAE,SAASA,CAAM;AAChD,UAAM,IAAI,MAAM,2DAA2D;AAC/E,SAAOA;AACX;AACA,SAASC,GAAgBnS,GAAMoS,GAAK;AAChC,QAAMC,IAAQ,CAAE;AAChB,WAASC,KAAW,OAAO,KAAKF,CAAG;AAE/B,IAAAC,EAAMC,CAAO,IAAItS,EAAKsS,CAAO,MAAM,SAAYF,EAAIE,CAAO,IAAItS,EAAKsS,CAAO;AAE9E,SAAAhP,GAAM+O,EAAM,MAAM,MAAM,GACxB/O,GAAM+O,EAAM,SAAS,SAAS,GAC1BA,EAAM,WAAW,UACjBJ,GAAkBI,EAAM,MAAM,GAC3BA;AACX;AACO,MAAME,WAAe,MAAM;AAAA,EAC9B,YAAYtK,IAAI,IAAI;AAChB,UAAMA,CAAC;AAAA,EACf;AACA;AAQO,MAAMuK,KAAM;AAAA;AAAA,EAEf,KAAKD;AAAA;AAAA,EAEL,MAAM;AAAA,IACF,QAAQ,CAACE,GAAKxR,MAAS;AACnB,YAAM,EAAE,KAAKqB,EAAC,IAAKkQ;AACnB,UAAIC,IAAM,KAAKA,IAAM;AACjB,cAAM,IAAInQ,EAAE,uBAAuB;AACvC,UAAIrB,EAAK,SAAS;AACd,cAAM,IAAIqB,EAAE,2BAA2B;AAC3C,YAAMoQ,IAAUzR,EAAK,SAAS,GACxB/D,IAAMuG,GAAoBiP,CAAO;AACvC,UAAKxV,EAAI,SAAS,IAAK;AACnB,cAAM,IAAIoF,EAAE,sCAAsC;AAEtD,YAAMqQ,IAASD,IAAU,MAAMjP,GAAqBvG,EAAI,SAAS,IAAK,GAAW,IAAI;AAErF,aADUuG,GAAoBgP,CAAG,IACtBE,IAASzV,IAAM+D;AAAA,IAC7B;AAAA;AAAA,IAED,OAAOwR,GAAKxR,GAAM;AACd,YAAM,EAAE,KAAKqB,EAAC,IAAKkQ;AACnB,UAAIpR,IAAM;AACV,UAAIqR,IAAM,KAAKA,IAAM;AACjB,cAAM,IAAInQ,EAAE,uBAAuB;AACvC,UAAIrB,EAAK,SAAS,KAAKA,EAAKG,GAAK,MAAMqR;AACnC,cAAM,IAAInQ,EAAE,uBAAuB;AACvC,YAAMsQ,IAAQ3R,EAAKG,GAAK,GAClByR,IAAS,CAAC,EAAED,IAAQ;AAC1B,UAAI5V,IAAS;AACb,UAAI,CAAC6V;AACD,QAAA7V,IAAS4V;AAAA,WACR;AAED,cAAMD,IAASC,IAAQ;AACvB,YAAI,CAACD;AACD,gBAAM,IAAIrQ,EAAE,mDAAmD;AACnE,YAAIqQ,IAAS;AACT,gBAAM,IAAIrQ,EAAE,0CAA0C;AAC1D,cAAMwQ,IAAc7R,EAAK,SAASG,GAAKA,IAAMuR,CAAM;AACnD,YAAIG,EAAY,WAAWH;AACvB,gBAAM,IAAIrQ,EAAE,uCAAuC;AACvD,YAAIwQ,EAAY,CAAC,MAAM;AACnB,gBAAM,IAAIxQ,EAAE,sCAAsC;AACtD,mBAAW9B,KAAKsS;AACZ,UAAA9V,IAAUA,KAAU,IAAKwD;AAE7B,YADAY,KAAOuR,GACH3V,IAAS;AACT,gBAAM,IAAIsF,EAAE,wCAAwC;AAAA,MACxE;AACY,YAAM4C,IAAIjE,EAAK,SAASG,GAAKA,IAAMpE,CAAM;AACzC,UAAIkI,EAAE,WAAWlI;AACb,cAAM,IAAIsF,EAAE,gCAAgC;AAChD,aAAO,EAAE,GAAA4C,GAAG,GAAGjE,EAAK,SAASG,IAAMpE,CAAM,EAAG;AAAA,IAC/C;AAAA,EACJ;AAAA;AAAA;AAAA;AAAA;AAAA,EAKD,MAAM;AAAA,IACF,OAAO0G,GAAK;AACR,YAAM,EAAE,KAAKpB,EAAC,IAAKkQ;AACnB,UAAI9O,IAAMN;AACN,cAAM,IAAId,EAAE,4CAA4C;AAC5D,UAAI5D,IAAM+E,GAAoBC,CAAG;AAIjC,UAFI,OAAO,SAAShF,EAAI,CAAC,GAAG,EAAE,IAAI,MAC9BA,IAAM,OAAOA,IACbA,EAAI,SAAS;AACb,cAAM,IAAI4D,EAAE,gDAAgD;AAChE,aAAO5D;AAAA,IACV;AAAA,IACD,OAAOuC,GAAM;AACT,YAAM,EAAE,KAAKqB,EAAC,IAAKkQ;AACnB,UAAIvR,EAAK,CAAC,IAAI;AACV,cAAM,IAAIqB,EAAE,qCAAqC;AACrD,UAAIrB,EAAK,CAAC,MAAM,KAAQ,EAAEA,EAAK,CAAC,IAAI;AAChC,cAAM,IAAIqB,EAAE,qDAAqD;AACrE,aAAOsB,GAAgB3C,CAAI;AAAA,IAC9B;AAAA,EACJ;AAAA,EACD,MAAMhE,GAAO;AAET,UAAM,EAAE,KAAKqF,GAAG,MAAMyQ,GAAK,MAAMC,EAAG,IAAKR,IACnCvR,IAAOnE,EAAOG,GAAO,QAAW,WAAW,GAC3C,EAAE,GAAGgW,GAAU,GAAGC,EAAc,IAAGF,EAAI,OAAO,IAAM/R,CAAI;AAC9D,QAAIiS,EAAa;AACb,YAAM,IAAI5Q,EAAE,6CAA6C;AAC7D,UAAM,EAAE,GAAG6Q,GAAQ,GAAGC,EAAY,IAAGJ,EAAI,OAAO,GAAMC,CAAQ,GACxD,EAAE,GAAGI,GAAQ,GAAGC,EAAY,IAAGN,EAAI,OAAO,GAAMI,CAAU;AAChE,QAAIE,EAAW;AACX,YAAM,IAAIhR,EAAE,6CAA6C;AAC7D,WAAO,EAAE,GAAGyQ,EAAI,OAAOI,CAAM,GAAG,GAAGJ,EAAI,OAAOM,CAAM,EAAG;AAAA,EAC1D;AAAA,EACD,WAAWE,GAAK;AACZ,UAAM,EAAE,MAAMP,GAAK,MAAMD,EAAK,IAAGP,IAC3BgB,IAAKR,EAAI,OAAO,GAAMD,EAAI,OAAOQ,EAAI,CAAC,CAAC,GACvCE,IAAKT,EAAI,OAAO,GAAMD,EAAI,OAAOQ,EAAI,CAAC,CAAC,GACvCG,IAAMF,IAAKC;AACjB,WAAOT,EAAI,OAAO,IAAMU,CAAG;AAAA,EAC9B;AACL,GAGMtQ,KAAM,OAAO,CAAC,GAAGC,KAAM,OAAO,CAAC,GAAGyD,KAAM,OAAO,CAAC,GAAGC,KAAM,OAAO,CAAC,GAAGC,KAAM,OAAO,CAAC;AAoBjF,SAAS2M,GAAYhD,GAAQiD,IAAY,IAAI;AAChD,QAAMC,IAAYxD,GAAkB,eAAeM,GAAQiD,CAAS,GAC9D,EAAE,IAAAzL,GAAI,IAAAuI,EAAE,IAAKmD;AACnB,MAAItD,IAAQsD,EAAU;AACtB,QAAM,EAAE,GAAGC,GAAU,GAAGC,EAAa,IAAGxD;AACxC,EAAA3K,GAAegO,GAAW,IAAI;AAAA,IAC1B,oBAAoB;AAAA,IACpB,eAAe;AAAA,IACf,eAAe;AAAA,IACf,WAAW;AAAA,IACX,SAAS;AAAA,IACT,MAAM;AAAA,EACd,CAAK;AACD,QAAM,EAAE,MAAAI,EAAI,IAAKJ;AACjB,MAAII,MAEI,CAAC7L,EAAG,IAAIoI,EAAM,CAAC,KAAK,OAAOyD,EAAK,QAAS,YAAY,CAAC,MAAM,QAAQA,EAAK,OAAO;AAChF,UAAM,IAAI,MAAM,4DAA4D;AAGpF,QAAMC,IAAUC,GAAY/L,GAAIuI,CAAE;AAClC,WAASyD,IAA+B;AACpC,QAAI,CAAChM,EAAG;AACJ,YAAM,IAAI,MAAM,4DAA4D;AAAA,EACxF;AAEI,WAASiM,EAAaC,GAAI/E,GAAOgF,GAAc;AAC3C,UAAM,EAAE,GAAA7M,GAAG,GAAA8M,MAAMjF,EAAM,SAAU,GAC3BkF,IAAKrM,EAAG,QAAQV,CAAC;AAEvB,QADAnE,GAAMgR,GAAc,cAAc,GAC9BA,GAAc;AACd,MAAAH,EAA8B;AAC9B,YAAMM,IAAW,CAACtM,EAAG,MAAMoM,CAAC;AAC5B,aAAOhV,GAAYmV,GAAQD,CAAQ,GAAGD,CAAE;AAAA,IACpD;AAEY,aAAOjV,GAAY,WAAW,GAAG,CAAI,GAAGiV,GAAIrM,EAAG,QAAQoM,CAAC,CAAC;AAAA,EAErE;AACI,WAASI,EAAe1X,GAAO;AAC3BH,IAAAA,EAAOG,GAAO,QAAW,OAAO;AAChC,UAAM,EAAE,WAAW2S,GAAM,uBAAuBgF,EAAM,IAAKX,GACrDjX,IAASC,EAAM,QACf4X,IAAO5X,EAAM,CAAC,GACd6X,IAAO7X,EAAM,SAAS,CAAC;AAE7B,QAAID,MAAW4S,MAASiF,MAAS,KAAQA,MAAS,IAAO;AACrD,YAAMpN,IAAIU,EAAG,UAAU2M,CAAI;AAC3B,UAAI,CAAC3M,EAAG,QAAQV,CAAC;AACb,cAAM,IAAI,MAAM,qCAAqC;AACzD,YAAMsN,IAAKC,EAAoBvN,CAAC;AAChC,UAAI8M;AACJ,UAAI;AACA,QAAAA,IAAIpM,EAAG,KAAK4M,CAAE;AAAA,MAC9B,SACmBE,GAAW;AACd,cAAMC,IAAMD,aAAqB,QAAQ,OAAOA,EAAU,UAAU;AACpE,cAAM,IAAI,MAAM,2CAA2CC,CAAG;AAAA,MAC9E;AACY,MAAAf,EAA8B;AAC9B,YAAMgB,IAAQhN,EAAG,MAAMoM,CAAC;AAExB,cADeM,IAAO,OAAO,MACfM,MACVZ,IAAIpM,EAAG,IAAIoM,CAAC,IACT,EAAE,GAAA9M,GAAG,GAAA8M,EAAG;AAAA,IAC3B,WACiBvX,MAAW4X,KAAUC,MAAS,GAAM;AAEzC,YAAMO,IAAIjN,EAAG,OACPV,IAAIU,EAAG,UAAU2M,EAAK,SAAS,GAAGM,CAAC,CAAC,GACpCb,IAAIpM,EAAG,UAAU2M,EAAK,SAASM,GAAGA,IAAI,CAAC,CAAC;AAC9C,UAAI,CAACC,EAAU5N,GAAG8M,CAAC;AACf,cAAM,IAAI,MAAM,4BAA4B;AAChD,aAAO,EAAE,GAAA9M,GAAG,GAAA8M,EAAG;AAAA,IAC3B;AAEY,YAAM,IAAI,MAAM,yBAAyBvX,CAAM,yBAAyB4S,CAAI,oBAAoBgF,CAAM,EAAE;AAAA,EAEpH;AACI,QAAMU,IAAc1B,EAAU,WAAWQ,GACnCmB,IAAc3B,EAAU,aAAae;AAC3C,WAASK,EAAoBvN,GAAG;AAC5B,UAAM+N,IAAKrN,EAAG,IAAIV,CAAC,GACbgO,IAAKtN,EAAG,IAAIqN,GAAI/N,CAAC;AACvB,WAAOU,EAAG,IAAIA,EAAG,IAAIsN,GAAItN,EAAG,IAAIV,GAAG8I,EAAM,CAAC,CAAC,GAAGA,EAAM,CAAC;AAAA,EAC7D;AAGI,WAAS8E,EAAU5N,GAAG8M,GAAG;AACrB,UAAMmB,IAAOvN,EAAG,IAAIoM,CAAC,GACfoB,IAAQX,EAAoBvN,CAAC;AACnC,WAAOU,EAAG,IAAIuN,GAAMC,CAAK;AAAA,EACjC;AAGI,MAAI,CAACN,EAAU9E,EAAM,IAAIA,EAAM,EAAE;AAC7B,UAAM,IAAI,MAAM,mCAAmC;AAGvD,QAAMqF,IAAOzN,EAAG,IAAIA,EAAG,IAAIoI,EAAM,GAAGxJ,EAAG,GAAGC,EAAG,GACvC6O,IAAQ1N,EAAG,IAAIA,EAAG,IAAIoI,EAAM,CAAC,GAAG,OAAO,EAAE,CAAC;AAChD,MAAIpI,EAAG,IAAIA,EAAG,IAAIyN,GAAMC,CAAK,CAAC;AAC1B,UAAM,IAAI,MAAM,0BAA0B;AAE9C,WAASC,EAAOlZ,GAAOD,GAAGoZ,IAAU,IAAO;AACvC,QAAI,CAAC5N,EAAG,QAAQxL,CAAC,KAAMoZ,KAAW5N,EAAG,IAAIxL,CAAC;AACtC,YAAM,IAAI,MAAM,wBAAwBC,CAAK,EAAE;AACnD,WAAOD;AAAA,EACf;AACI,WAASqZ,EAAUC,GAAO;AACtB,QAAI,EAAEA,aAAiB7G;AACnB,YAAM,IAAI,MAAM,4BAA4B;AAAA,EACxD;AACI,WAAS8G,EAAiB/Q,GAAG;AACzB,QAAI,CAAC6O,KAAQ,CAACA,EAAK;AACf,YAAM,IAAI,MAAM,SAAS;AAC7B,WAAOxC,GAAiBrM,GAAG6O,EAAK,SAAStD,EAAG,KAAK;AAAA,EACzD;AAKI,QAAMyF,IAAe3P,GAAS,CAACqE,GAAGuL,MAAO;AACrC,UAAM,EAAE,GAAAC,GAAG,GAAAC,GAAG,GAAAzM,EAAG,IAAGgB;AAEpB,QAAI1C,EAAG,IAAI0B,GAAG1B,EAAG,GAAG;AAChB,aAAO,EAAE,GAAGkO,GAAG,GAAGC,EAAG;AACzB,UAAMC,IAAM1L,EAAE,IAAK;AAGnB,IAAIuL,KAAM,SACNA,IAAKG,IAAMpO,EAAG,MAAMA,EAAG,IAAI0B,CAAC;AAChC,UAAMpC,IAAIU,EAAG,IAAIkO,GAAGD,CAAE,GAChB7B,IAAIpM,EAAG,IAAImO,GAAGF,CAAE,GAChBI,IAAKrO,EAAG,IAAI0B,GAAGuM,CAAE;AACvB,QAAIG;AACA,aAAO,EAAE,GAAGpO,EAAG,MAAM,GAAGA,EAAG,KAAM;AACrC,QAAI,CAACA,EAAG,IAAIqO,GAAIrO,EAAG,GAAG;AAClB,YAAM,IAAI,MAAM,kBAAkB;AACtC,WAAO,EAAE,GAAAV,GAAG,GAAA8M,EAAG;AAAA,EACvB,CAAK,GAGKkC,KAAkBjQ,GAAS,CAACqE,MAAM;AACpC,QAAIA,EAAE,OAAO;AAIT,UAAI+I,EAAU,sBAAsB,CAACzL,EAAG,IAAI0C,EAAE,CAAC;AAC3C;AACJ,YAAM,IAAI,MAAM,iBAAiB;AAAA,IAC7C;AAEQ,UAAM,EAAE,GAAApD,GAAG,GAAA8M,MAAM1J,EAAE,SAAU;AAC7B,QAAI,CAAC1C,EAAG,QAAQV,CAAC,KAAK,CAACU,EAAG,QAAQoM,CAAC;AAC/B,YAAM,IAAI,MAAM,sCAAsC;AAC1D,QAAI,CAACc,EAAU5N,GAAG8M,CAAC;AACf,YAAM,IAAI,MAAM,mCAAmC;AACvD,QAAI,CAAC1J,EAAE,cAAe;AAClB,YAAM,IAAI,MAAM,wCAAwC;AAC5D,WAAO;AAAA,EACf,CAAK;AACD,WAAS6L,GAAWC,GAAUC,GAAKC,GAAK/E,GAAOC,GAAO;AAClD,WAAA8E,IAAM,IAAIzH,EAAMjH,EAAG,IAAI0O,EAAI,GAAGF,CAAQ,GAAGE,EAAI,GAAGA,EAAI,CAAC,GACrDD,IAAMtJ,GAASwE,GAAO8E,CAAG,GACzBC,IAAMvJ,GAASyE,GAAO8E,CAAG,GAClBD,EAAI,IAAIC,CAAG;AAAA,EAC1B;AAMI,QAAMC,IAAN,MAAMA,EAAM;AAAA;AAAA,IAaR,YAAYT,GAAGC,GAAGzM,GAAG;AAJrB,MAAA7I,EAAA;AACA,MAAAA,EAAA;AACA,MAAAA,EAAA;AAGI,WAAK,IAAI8U,EAAO,KAAKO,CAAC,GACtB,KAAK,IAAIP,EAAO,KAAKQ,GAAG,EAAI,GAC5B,KAAK,IAAIR,EAAO,KAAKjM,CAAC,GACtB,OAAO,OAAO,IAAI;AAAA,IAC9B;AAAA,IACQ,OAAO,QAAQ;AACX,aAAO0G;AAAA,IACnB;AAAA;AAAA,IAEQ,OAAO,WAAW1F,GAAG;AACjB,YAAM,EAAE,GAAApD,GAAG,GAAA8M,EAAG,IAAG1J,KAAK,CAAE;AACxB,UAAI,CAACA,KAAK,CAAC1C,EAAG,QAAQV,CAAC,KAAK,CAACU,EAAG,QAAQoM,CAAC;AACrC,cAAM,IAAI,MAAM,sBAAsB;AAC1C,UAAI1J,aAAaiM;AACb,cAAM,IAAI,MAAM,8BAA8B;AAElD,aAAI3O,EAAG,IAAIV,CAAC,KAAKU,EAAG,IAAIoM,CAAC,IACduC,EAAM,OACV,IAAIA,EAAMrP,GAAG8M,GAAGpM,EAAG,GAAG;AAAA,IACzC;AAAA,IACQ,OAAO,UAAUlL,GAAO;AACpB,YAAM0L,IAAImO,EAAM,WAAWvB,EAAYzY,EAAOG,GAAO,QAAW,OAAO,CAAC,CAAC;AACzE,aAAA0L,EAAE,eAAgB,GACXA;AAAA,IACnB;AAAA,IACQ,OAAO,QAAQjK,GAAK;AAChB,aAAOoY,EAAM,UAAUhY,GAAWJ,CAAG,CAAC;AAAA,IAClD;AAAA,IACQ,IAAI,IAAI;AACJ,aAAO,KAAK,SAAQ,EAAG;AAAA,IACnC;AAAA,IACQ,IAAI,IAAI;AACJ,aAAO,KAAK,SAAQ,EAAG;AAAA,IACnC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,IAOQ,WAAWwP,IAAa,GAAG6I,IAAS,IAAM;AACtC,aAAAC,GAAK,YAAY,MAAM9I,CAAU,GAC5B6I,KACD,KAAK,SAAShQ,EAAG,GACd;AAAA,IACnB;AAAA;AAAA;AAAA,IAGQ,iBAAiB;AACb,MAAA0P,GAAgB,IAAI;AAAA,IAChC;AAAA,IACQ,WAAW;AACP,YAAM,EAAE,GAAAlC,EAAC,IAAK,KAAK,SAAU;AAC7B,UAAI,CAACpM,EAAG;AACJ,cAAM,IAAI,MAAM,6BAA6B;AACjD,aAAO,CAACA,EAAG,MAAMoM,CAAC;AAAA,IAC9B;AAAA;AAAA,IAEQ,OAAO0B,GAAO;AACV,MAAAD,EAAUC,CAAK;AACf,YAAM,EAAE,GAAGgB,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAK,MAC1B,EAAE,GAAGC,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAKrB,GAC1BsB,IAAKpP,EAAG,IAAIA,EAAG,IAAI8O,GAAIK,CAAE,GAAGnP,EAAG,IAAIiP,GAAID,CAAE,CAAC,GAC1CK,IAAKrP,EAAG,IAAIA,EAAG,IAAI+O,GAAII,CAAE,GAAGnP,EAAG,IAAIkP,GAAIF,CAAE,CAAC;AAChD,aAAOI,KAAMC;AAAA,IACzB;AAAA;AAAA,IAEQ,SAAS;AACL,aAAO,IAAIV,EAAM,KAAK,GAAG3O,EAAG,IAAI,KAAK,CAAC,GAAG,KAAK,CAAC;AAAA,IAC3D;AAAA;AAAA;AAAA;AAAA;AAAA,IAKQ,SAAS;AACL,YAAM,EAAE,GAAA1L,GAAG,GAAA+D,EAAC,IAAK+P,GACXkH,IAAKtP,EAAG,IAAI3H,GAAGuG,EAAG,GAClB,EAAE,GAAGkQ,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAK;AAChC,UAAIO,IAAKvP,EAAG,MAAMwP,IAAKxP,EAAG,MAAMyP,IAAKzP,EAAG,MACpC0P,IAAK1P,EAAG,IAAI8O,GAAIA,CAAE,GAClBa,IAAK3P,EAAG,IAAI+O,GAAIA,CAAE,GAClBa,IAAK5P,EAAG,IAAIgP,GAAIA,CAAE,GAClBa,IAAK7P,EAAG,IAAI8O,GAAIC,CAAE;AACtB,aAAAc,IAAK7P,EAAG,IAAI6P,GAAIA,CAAE,GAClBJ,IAAKzP,EAAG,IAAI8O,GAAIE,CAAE,GAClBS,IAAKzP,EAAG,IAAIyP,GAAIA,CAAE,GAClBF,IAAKvP,EAAG,IAAI1L,GAAGmb,CAAE,GACjBD,IAAKxP,EAAG,IAAIsP,GAAIM,CAAE,GAClBJ,IAAKxP,EAAG,IAAIuP,GAAIC,CAAE,GAClBD,IAAKvP,EAAG,IAAI2P,GAAIH,CAAE,GAClBA,IAAKxP,EAAG,IAAI2P,GAAIH,CAAE,GAClBA,IAAKxP,EAAG,IAAIuP,GAAIC,CAAE,GAClBD,IAAKvP,EAAG,IAAI6P,GAAIN,CAAE,GAClBE,IAAKzP,EAAG,IAAIsP,GAAIG,CAAE,GAClBG,IAAK5P,EAAG,IAAI1L,GAAGsb,CAAE,GACjBC,IAAK7P,EAAG,IAAI0P,GAAIE,CAAE,GAClBC,IAAK7P,EAAG,IAAI1L,GAAGub,CAAE,GACjBA,IAAK7P,EAAG,IAAI6P,GAAIJ,CAAE,GAClBA,IAAKzP,EAAG,IAAI0P,GAAIA,CAAE,GAClBA,IAAK1P,EAAG,IAAIyP,GAAIC,CAAE,GAClBA,IAAK1P,EAAG,IAAI0P,GAAIE,CAAE,GAClBF,IAAK1P,EAAG,IAAI0P,GAAIG,CAAE,GAClBL,IAAKxP,EAAG,IAAIwP,GAAIE,CAAE,GAClBE,IAAK5P,EAAG,IAAI+O,GAAIC,CAAE,GAClBY,IAAK5P,EAAG,IAAI4P,GAAIA,CAAE,GAClBF,IAAK1P,EAAG,IAAI4P,GAAIC,CAAE,GAClBN,IAAKvP,EAAG,IAAIuP,GAAIG,CAAE,GAClBD,IAAKzP,EAAG,IAAI4P,GAAID,CAAE,GAClBF,IAAKzP,EAAG,IAAIyP,GAAIA,CAAE,GAClBA,IAAKzP,EAAG,IAAIyP,GAAIA,CAAE,GACX,IAAId,EAAMY,GAAIC,GAAIC,CAAE;AAAA,IACvC;AAAA;AAAA;AAAA;AAAA;AAAA,IAKQ,IAAI3B,GAAO;AACP,MAAAD,EAAUC,CAAK;AACf,YAAM,EAAE,GAAGgB,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAK,MAC1B,EAAE,GAAGC,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAKrB;AAChC,UAAIyB,IAAKvP,EAAG,MAAMwP,IAAKxP,EAAG,MAAMyP,IAAKzP,EAAG;AACxC,YAAM1L,IAAI8T,EAAM,GACVkH,IAAKtP,EAAG,IAAIoI,EAAM,GAAGxJ,EAAG;AAC9B,UAAI8Q,IAAK1P,EAAG,IAAI8O,GAAIG,CAAE,GAClBU,IAAK3P,EAAG,IAAI+O,GAAIG,CAAE,GAClBU,IAAK5P,EAAG,IAAIgP,GAAIG,CAAE,GAClBU,IAAK7P,EAAG,IAAI8O,GAAIC,CAAE,GAClBe,IAAK9P,EAAG,IAAIiP,GAAIC,CAAE;AACtB,MAAAW,IAAK7P,EAAG,IAAI6P,GAAIC,CAAE,GAClBA,IAAK9P,EAAG,IAAI0P,GAAIC,CAAE,GAClBE,IAAK7P,EAAG,IAAI6P,GAAIC,CAAE,GAClBA,IAAK9P,EAAG,IAAI8O,GAAIE,CAAE;AAClB,UAAIe,IAAK/P,EAAG,IAAIiP,GAAIE,CAAE;AACtB,aAAAW,IAAK9P,EAAG,IAAI8P,GAAIC,CAAE,GAClBA,IAAK/P,EAAG,IAAI0P,GAAIE,CAAE,GAClBE,IAAK9P,EAAG,IAAI8P,GAAIC,CAAE,GAClBA,IAAK/P,EAAG,IAAI+O,GAAIC,CAAE,GAClBO,IAAKvP,EAAG,IAAIkP,GAAIC,CAAE,GAClBY,IAAK/P,EAAG,IAAI+P,GAAIR,CAAE,GAClBA,IAAKvP,EAAG,IAAI2P,GAAIC,CAAE,GAClBG,IAAK/P,EAAG,IAAI+P,GAAIR,CAAE,GAClBE,IAAKzP,EAAG,IAAI1L,GAAGwb,CAAE,GACjBP,IAAKvP,EAAG,IAAIsP,GAAIM,CAAE,GAClBH,IAAKzP,EAAG,IAAIuP,GAAIE,CAAE,GAClBF,IAAKvP,EAAG,IAAI2P,GAAIF,CAAE,GAClBA,IAAKzP,EAAG,IAAI2P,GAAIF,CAAE,GAClBD,IAAKxP,EAAG,IAAIuP,GAAIE,CAAE,GAClBE,IAAK3P,EAAG,IAAI0P,GAAIA,CAAE,GAClBC,IAAK3P,EAAG,IAAI2P,GAAID,CAAE,GAClBE,IAAK5P,EAAG,IAAI1L,GAAGsb,CAAE,GACjBE,IAAK9P,EAAG,IAAIsP,GAAIQ,CAAE,GAClBH,IAAK3P,EAAG,IAAI2P,GAAIC,CAAE,GAClBA,IAAK5P,EAAG,IAAI0P,GAAIE,CAAE,GAClBA,IAAK5P,EAAG,IAAI1L,GAAGsb,CAAE,GACjBE,IAAK9P,EAAG,IAAI8P,GAAIF,CAAE,GAClBF,IAAK1P,EAAG,IAAI2P,GAAIG,CAAE,GAClBN,IAAKxP,EAAG,IAAIwP,GAAIE,CAAE,GAClBA,IAAK1P,EAAG,IAAI+P,GAAID,CAAE,GAClBP,IAAKvP,EAAG,IAAI6P,GAAIN,CAAE,GAClBA,IAAKvP,EAAG,IAAIuP,GAAIG,CAAE,GAClBA,IAAK1P,EAAG,IAAI6P,GAAIF,CAAE,GAClBF,IAAKzP,EAAG,IAAI+P,GAAIN,CAAE,GAClBA,IAAKzP,EAAG,IAAIyP,GAAIC,CAAE,GACX,IAAIf,EAAMY,GAAIC,GAAIC,CAAE;AAAA,IACvC;AAAA,IACQ,SAAS3B,GAAO;AACZ,aAAO,KAAK,IAAIA,EAAM,OAAM,CAAE;AAAA,IAC1C;AAAA,IACQ,MAAM;AACF,aAAO,KAAK,OAAOa,EAAM,IAAI;AAAA,IACzC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,IAUQ,SAASpK,GAAQ;AACb,YAAM,EAAE,MAAAsH,EAAI,IAAKJ;AACjB,UAAI,CAAClD,EAAG,YAAYhE,CAAM;AACtB,cAAM,IAAI,MAAM,8BAA8B;AAClD,UAAI4C,GAAO6I;AACX,YAAMC,IAAM,CAACzb,MAAMqa,GAAK,OAAO,MAAMra,GAAG,CAACkO,MAAM4C,GAAWqJ,GAAOjM,CAAC,CAAC;AAEnE,UAAImJ,GAAM;AACN,cAAM,EAAE,OAAAlC,GAAO,IAAA/B,GAAI,OAAAgC,GAAO,IAAA/B,EAAI,IAAGkG,EAAiBxJ,CAAM,GAClD,EAAE,GAAGkK,GAAK,GAAGyB,EAAK,IAAGD,EAAIrI,CAAE,GAC3B,EAAE,GAAG8G,GAAK,GAAGyB,EAAK,IAAGF,EAAIpI,CAAE;AACjC,QAAAmI,IAAOE,EAAI,IAAIC,CAAG,GAClBhJ,IAAQoH,GAAW1C,EAAK,MAAM4C,GAAKC,GAAK/E,GAAOC,CAAK;AAAA,MACpE,OACiB;AACD,cAAM,EAAE,GAAAlH,GAAG,GAAAtE,MAAM6R,EAAI1L,CAAM;AAC3B,QAAA4C,IAAQzE,GACRsN,IAAO5R;AAAA,MACvB;AAEY,aAAOkH,GAAWqJ,GAAO,CAACxH,GAAO6I,CAAI,CAAC,EAAE,CAAC;AAAA,IACrD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,IAMQ,eAAeI,GAAI;AACf,YAAM,EAAE,MAAAvE,EAAI,IAAKJ,GACX/I,IAAI;AACV,UAAI,CAAC6F,EAAG,QAAQ6H,CAAE;AACd,cAAM,IAAI,MAAM,8BAA8B;AAClD,UAAIA,MAAOnV,MAAOyH,EAAE,IAAK;AACrB,eAAOiM,EAAM;AACjB,UAAIyB,MAAOlV;AACP,eAAOwH;AACX,UAAImM,GAAK,SAAS,IAAI;AAClB,eAAO,KAAK,SAASuB,CAAE;AAG3B,UAAIvE,GAAM;AACN,cAAM,EAAE,OAAAlC,GAAO,IAAA/B,GAAI,OAAAgC,GAAO,IAAA/B,EAAI,IAAGkG,EAAiBqC,CAAE,GAC9C,EAAE,IAAAtI,GAAI,IAAAC,MAAOJ,GAAcgH,GAAOjM,GAAGkF,GAAIC,CAAE;AACjD,eAAO0G,GAAW1C,EAAK,MAAM/D,GAAIC,GAAI4B,GAAOC,CAAK;AAAA,MACjE;AAEgB,eAAOiF,GAAK,OAAOnM,GAAG0N,CAAE;AAAA,IAExC;AAAA;AAAA;AAAA;AAAA;AAAA,IAKQ,SAASC,GAAW;AAChB,aAAOrC,EAAa,MAAMqC,CAAS;AAAA,IAC/C;AAAA;AAAA;AAAA;AAAA;AAAA,IAKQ,gBAAgB;AACZ,YAAM,EAAE,eAAAC,EAAa,IAAK7E;AAC1B,aAAIE,MAAazQ,KACN,KACPoV,IACOA,EAAc3B,GAAO,IAAI,IAC7BE,GAAK,OAAO,MAAMjD,CAAW,EAAE,IAAK;AAAA,IACvD;AAAA,IACQ,gBAAgB;AACZ,YAAM,EAAE,eAAA2E,EAAa,IAAK9E;AAC1B,aAAIE,MAAazQ,KACN,OACPqV,IACOA,EAAc5B,GAAO,IAAI,IAC7B,KAAK,eAAehD,CAAQ;AAAA,IAC/C;AAAA,IACQ,eAAe;AAEX,aAAO,KAAK,eAAeA,CAAQ,EAAE,IAAK;AAAA,IACtD;AAAA,IACQ,QAAQQ,IAAe,IAAM;AACzB,aAAAhR,GAAMgR,GAAc,cAAc,GAClC,KAAK,eAAgB,GACdgB,EAAYwB,GAAO,MAAMxC,CAAY;AAAA,IACxD;AAAA,IACQ,MAAMA,IAAe,IAAM;AACvB,aAAO7V,GAAW,KAAK,QAAQ6V,CAAY,CAAC;AAAA,IACxD;AAAA,IACQ,WAAW;AACP,aAAO,UAAU,KAAK,IAAG,IAAK,SAAS,KAAK,MAAO,CAAA;AAAA,IAC/D;AAAA,EACA;AA3RQ;AAAA,EAAAtT,EAFE8V,GAEK,QAAO,IAAIA,EAAMvG,EAAM,IAAIA,EAAM,IAAIpI,EAAG,GAAG;AAAA,EAElDnH,EAJE8V,GAIK,QAAO,IAAIA,EAAM3O,EAAG,MAAMA,EAAG,KAAKA,EAAG,IAAI;AAAA;AAAA,EAEhDnH,EANE8V,GAMK,MAAK3O;AAAA,EAEZnH,EARE8V,GAQK,MAAKpG;AARhB,MAAMtB,IAAN0H;AA8RA,QAAMhJ,KAAO4C,EAAG,MACVsG,KAAO,IAAI7H,GAAKC,GAAOwE,EAAU,OAAO,KAAK,KAAK9F,KAAO,CAAC,IAAIA,EAAI;AACxE,SAAAsB,EAAM,KAAK,WAAW,CAAC,GAChBA;AACX;AAEA,SAASsF,GAAQD,GAAU;AACvB,SAAO,WAAW,GAAGA,IAAW,IAAO,CAAI;AAC/C;AA6HA,SAASP,GAAY/L,GAAIuI,GAAI;AACzB,SAAO;AAAA,IACH,WAAWA,EAAG;AAAA,IACd,WAAW,IAAIvI,EAAG;AAAA,IAClB,uBAAuB,IAAI,IAAIA,EAAG;AAAA,IAClC,oBAAoB;AAAA,IACpB,WAAW,IAAIuI,EAAG;AAAA,EACrB;AACL;AAKO,SAASiI,GAAKvJ,GAAOwJ,IAAW,IAAI;AACvC,QAAM,EAAE,IAAAlI,EAAE,IAAKtB,GACTyJ,IAAeD,EAAS,eAAeE,IACvC7E,IAAU,OAAO,OAAOC,GAAY9E,EAAM,IAAIsB,CAAE,GAAG,EAAE,MAAM1D,GAAiB0D,EAAG,KAAK,EAAC,CAAE;AAC7F,WAASqI,EAAiBhI,GAAW;AACjC,QAAI;AACA,YAAMrN,IAAMgN,EAAG,UAAUK,CAAS;AAClC,aAAOL,EAAG,YAAYhN,CAAG;AAAA,IACrC,QACsB;AACV,aAAO;AAAA,IACnB;AAAA,EACA;AACI,WAASsV,EAAiBC,GAAW3E,GAAc;AAC/C,UAAM,EAAE,WAAW1E,GAAM,uBAAAsJ,EAAuB,IAAGjF;AACnD,QAAI;AACA,YAAMkF,IAAIF,EAAU;AAGpB,aAFI3E,MAAiB,MAAQ6E,MAAMvJ,KAE/B0E,MAAiB,MAAS6E,MAAMD,IACzB,KACJ,CAAC,CAAC9J,EAAM,UAAU6J,CAAS;AAAA,IAC9C,QACsB;AACV,aAAO;AAAA,IACnB;AAAA,EACA;AAKI,WAASpI,EAAgBrL,IAAOqT,EAAa5E,EAAQ,IAAI,GAAG;AACxD,WAAOhH,GAAenQ,EAAO0I,GAAMyO,EAAQ,MAAM,MAAM,GAAGvD,EAAG,KAAK;AAAA,EAC1E;AAMI,WAASI,EAAaC,GAAWuD,IAAe,IAAM;AAClD,WAAOlF,EAAM,KAAK,SAASsB,EAAG,UAAUK,CAAS,CAAC,EAAE,QAAQuD,CAAY;AAAA,EAChF;AAII,WAAS8E,EAAU7L,GAAM;AACrB,UAAM,EAAE,WAAAwD,GAAW,WAAAkI,GAAW,uBAAAC,EAAuB,IAAGjF;AAGxD,QAFI,CAACzX,GAAQ+Q,CAAI,KAEZ,cAAcmD,KAAMA,EAAG,YAAaK,MAAckI;AACnD;AACJ,UAAME,IAAIrc,EAAOyQ,GAAM,QAAW,KAAK,EAAE;AACzC,WAAO4L,MAAMF,KAAaE,MAAMD;AAAA,EACxC;AASI,WAASG,EAAgBC,GAAYC,GAAYjF,IAAe,IAAM;AAClE,QAAI8E,EAAUE,CAAU,MAAM;AAC1B,YAAM,IAAI,MAAM,+BAA+B;AACnD,QAAIF,EAAUG,CAAU,MAAM;AAC1B,YAAM,IAAI,MAAM,+BAA+B;AACnD,UAAMC,IAAI9I,EAAG,UAAU4I,CAAU;AAEjC,WADUlK,EAAM,UAAUmK,CAAU,EAC3B,SAASC,CAAC,EAAE,QAAQlF,CAAY;AAAA,EACjD;AACI,QAAMmF,IAAQ;AAAA,IACV,kBAAAV;AAAA,IACA,kBAAAC;AAAA,IACA,iBAAAnI;AAAA,EACH,GACK6I,IAAS9I,GAAaC,GAAiBC,CAAY;AACzD,SAAO,OAAO,OAAO,EAAE,cAAAA,GAAc,iBAAAuI,GAAiB,QAAAK,GAAQ,OAAAtK,GAAO,OAAAqK,GAAO,SAAAxF,GAAS;AACzF;AAgBO,SAAS0F,GAAMvK,GAAO6B,GAAM2I,IAAY,CAAA,GAAI;AAC/C,EAAAtc,GAAM2T,CAAI,GACVrL,GAAegU,GAAW,IAAI;AAAA,IAC1B,MAAM;AAAA,IACN,MAAM;AAAA,IACN,aAAa;AAAA,IACb,UAAU;AAAA,IACV,eAAe;AAAA,EACvB,CAAK,GACDA,IAAY,OAAO,OAAO,CAAA,GAAIA,CAAS;AACvC,QAAM1Z,IAAc0Z,EAAU,eAAed,IACvCzH,IAAOuI,EAAU,SAAS,CAAC1M,GAAKnN,MAAQ8Z,GAAU5I,GAAM/D,GAAKnN,CAAG,IAChE,EAAE,IAAAoI,GAAI,IAAAuI,EAAE,IAAKtB,GACb,EAAE,OAAO2E,GAAa,MAAM+F,EAAQ,IAAGpJ,GACvC,EAAE,QAAAgJ,GAAQ,cAAA5I,GAAc,iBAAAuI,GAAiB,OAAAI,GAAO,SAAAxF,MAAY0E,GAAKvJ,GAAOwK,CAAS,GACjFG,IAAiB;AAAA,IACnB,SAAS;AAAA,IACT,MAAM,OAAOH,EAAU,QAAS,YAAYA,EAAU,OAAO;AAAA,IAC7D,QAAQ;AAAA,IACR,cAAc;AAAA,EACjB,GACKI,IAAmBjG,IAAcjN,KAAMqB,EAAG;AAChD,WAAS8R,EAAsBpS,GAAQ;AACnC,UAAMqS,IAAOnG,KAAe1Q;AAC5B,WAAOwE,IAASqS;AAAA,EACxB;AACI,WAASC,EAAWvd,GAAO8G,GAAK;AAC5B,QAAI,CAACgN,EAAG,YAAYhN,CAAG;AACnB,YAAM,IAAI,MAAM,qBAAqB9G,CAAK,kCAAkC;AAChF,WAAO8G;AAAA,EACf;AACI,WAAS0W,IAAsB;AAS3B,QAAIJ;AACA,YAAM,IAAI,MAAM,8DAA8D;AAAA,EAC1F;AACI,WAASK,EAAkBpd,GAAOiV,GAAQ;AACtC,IAAAD,GAAkBC,CAAM;AACxB,UAAMoI,IAAOrG,EAAQ,WACfsG,IAAQrI,MAAW,YAAYoI,IAAOpI,MAAW,cAAcoI,IAAO,IAAI;AAChF,WAAOxd,EAAOG,GAAOsd,CAAK;AAAA,EAClC;AAAA,EAII,MAAMC,EAAU;AAAA,IAIZ,YAAYxS,GAAGwR,GAAGiB,GAAU;AAH5B,MAAAzZ,EAAA;AACA,MAAAA,EAAA;AACA,MAAAA,EAAA;AAII,UAFA,KAAK,IAAImZ,EAAW,KAAKnS,CAAC,GAC1B,KAAK,IAAImS,EAAW,KAAKX,CAAC,GACtBiB,KAAY,MAAM;AAElB,YADAL,EAAqB,GACjB,CAAC,CAAC,GAAG,GAAG,GAAG,CAAC,EAAE,SAASK,CAAQ;AAC/B,gBAAM,IAAI,MAAM,qBAAqB;AACzC,aAAK,WAAWA;AAAA,MAChC;AACY,aAAO,OAAO,IAAI;AAAA,IAC9B;AAAA,IACQ,OAAO,UAAUxd,GAAOiV,IAAS6H,EAAe,QAAQ;AACpD,MAAAM,EAAkBpd,GAAOiV,CAAM;AAC/B,UAAIwI;AACJ,UAAIxI,MAAW,OAAO;AAClB,cAAM,EAAE,GAAAlK,GAAG,GAAAwR,EAAG,IAAGhH,GAAI,MAAM1V,EAAOG,CAAK,CAAC;AACxC,eAAO,IAAIud,EAAUxS,GAAGwR,CAAC;AAAA,MACzC;AACY,MAAItH,MAAW,gBACXwI,IAAQzd,EAAM,CAAC,GACfiV,IAAS,WACTjV,IAAQA,EAAM,SAAS,CAAC;AAE5B,YAAMmY,IAAInB,EAAQ,YAAY,GACxBjM,IAAI/K,EAAM,SAAS,GAAGmY,CAAC,GACvBoE,IAAIvc,EAAM,SAASmY,GAAGA,IAAI,CAAC;AACjC,aAAO,IAAIoF,EAAU9J,EAAG,UAAU1I,CAAC,GAAG0I,EAAG,UAAU8I,CAAC,GAAGkB,CAAK;AAAA,IACxE;AAAA,IACQ,OAAO,QAAQhc,GAAKwT,GAAQ;AACxB,aAAO,KAAK,UAAUpT,GAAWJ,CAAG,GAAGwT,CAAM;AAAA,IACzD;AAAA,IACQ,iBAAiB;AACb,YAAM,EAAE,UAAAuI,EAAQ,IAAK;AACrB,UAAIA,KAAY;AACZ,cAAM,IAAI,MAAM,sCAAsC;AAC1D,aAAOA;AAAA,IACnB;AAAA,IACQ,eAAeA,GAAU;AACrB,aAAO,IAAID,EAAU,KAAK,GAAG,KAAK,GAAGC,CAAQ;AAAA,IACzD;AAAA,IACQ,iBAAiBE,GAAa;AAC1B,YAAM,EAAE,GAAA3S,GAAG,GAAAwR,EAAC,IAAK,MACXiB,IAAW,KAAK,eAAgB,GAChCG,IAAOH,MAAa,KAAKA,MAAa,IAAIzS,IAAI+L,IAAc/L;AAClE,UAAI,CAACG,EAAG,QAAQyS,CAAI;AAChB,cAAM,IAAI,MAAM,2CAA2C;AAC/D,YAAMnT,IAAIU,EAAG,QAAQyS,CAAI,GACnBxQ,IAAIgF,EAAM,UAAU7P,GAAYmV,IAAS+F,IAAW,OAAO,CAAC,GAAGhT,CAAC,CAAC,GACjEoT,IAAKnK,EAAG,IAAIkK,CAAI,GAChBrd,IAAIud,EAAche,EAAO6d,GAAa,QAAW,SAAS,CAAC,GAC3DI,IAAKrK,EAAG,OAAO,CAACnT,IAAIsd,CAAE,GACtBG,IAAKtK,EAAG,OAAO8I,IAAIqB,CAAE,GAErBlR,IAAIyF,EAAM,KAAK,eAAe2L,CAAE,EAAE,IAAI3Q,EAAE,eAAe4Q,CAAE,CAAC;AAChE,UAAIrR,EAAE,IAAK;AACP,cAAM,IAAI,MAAM,qCAAqC;AACzD,aAAAA,EAAE,eAAgB,GACXA;AAAA,IACnB;AAAA;AAAA,IAEQ,WAAW;AACP,aAAOsQ,EAAsB,KAAK,CAAC;AAAA,IAC/C;AAAA,IACQ,QAAQ/H,IAAS6H,EAAe,QAAQ;AAEpC,UADA9H,GAAkBC,CAAM,GACpBA,MAAW;AACX,eAAOpT,GAAW0T,GAAI,WAAW,IAAI,CAAC;AAC1C,YAAM,EAAE,GAAAxK,GAAG,GAAAwR,EAAC,IAAK,MACXyB,IAAKvK,EAAG,QAAQ1I,CAAC,GACjBkT,IAAKxK,EAAG,QAAQ8I,CAAC;AACvB,aAAItH,MAAW,eACXkI,EAAqB,GACd7a,GAAY,WAAW,GAAG,KAAK,gBAAgB,GAAG0b,GAAIC,CAAE,KAE5D3b,GAAY0b,GAAIC,CAAE;AAAA,IACrC;AAAA,IACQ,MAAMhJ,GAAQ;AACV,aAAOzT,GAAW,KAAK,QAAQyT,CAAM,CAAC;AAAA,IAClD;AAAA,EACA;AAKI,QAAMiJ,IAAWvB,EAAU,YACvB,SAAsB3c,GAAO;AAEzB,QAAIA,EAAM,SAAS;AACf,YAAM,IAAI,MAAM,oBAAoB;AAGxC,UAAMyG,IAAME,GAAgB3G,CAAK,GAC3Bme,IAAQne,EAAM,SAAS,IAAI6c;AACjC,WAAOsB,IAAQ,IAAI1X,KAAO,OAAO0X,CAAK,IAAI1X;AAAA,EAC7C,GACCoX,IAAgBlB,EAAU,iBAC5B,SAA2B3c,GAAO;AAC9B,WAAOyT,EAAG,OAAOyK,EAASle,CAAK,CAAC;AAAA,EACnC,GAECoe,KAAa7W,GAAQsV,CAAM;AAEjC,WAASwB,GAAW5X,GAAK;AAErB,WAAAY,GAAS,aAAawV,GAAQpW,GAAKN,IAAKiY,EAAU,GAC3C3K,EAAG,QAAQhN,CAAG;AAAA,EAC7B;AACI,WAAS6X,EAAmBhf,GAASif,GAAS;AAC1C1e,WAAAA,EAAOP,GAAS,QAAW,SAAS,GAC7Bif,IAAU1e,EAAOmU,EAAK1U,CAAO,GAAG,QAAW,mBAAmB,IAAIA;AAAA,EACjF;AASI,WAASkf,GAAQlf,GAASwU,GAAW/Q,GAAM;AACvC,UAAM,EAAE,MAAA0b,GAAM,SAAAF,GAAS,cAAAG,EAAc,IAAGxJ,GAAgBnS,GAAM+Z,CAAc;AAC5E,IAAAxd,IAAUgf,EAAmBhf,GAASif,CAAO;AAI7C,UAAMI,IAAQd,EAAcve,CAAO,GAC7BuO,IAAI4F,EAAG,UAAUK,CAAS;AAChC,QAAI,CAACL,EAAG,YAAY5F,CAAC;AACjB,YAAM,IAAI,MAAM,qBAAqB;AACzC,UAAM+Q,IAAW,CAACP,GAAWxQ,CAAC,GAAGwQ,GAAWM,CAAK,CAAC;AAElD,QAAID,KAAgB,QAAQA,MAAiB,IAAO;AAGhD,YAAMG,IAAIH,MAAiB,KAAOzb,EAAY+T,EAAQ,SAAS,IAAI0H;AACnE,MAAAE,EAAS,KAAK/e,EAAOgf,GAAG,QAAW,cAAc,CAAC;AAAA,IAC9D;AACQ,UAAMtW,IAAOjG,GAAY,GAAGsc,CAAQ,GAC9B5T,IAAI2T;AASV,aAASG,EAAMC,GAAQ;AAGnB,YAAM7W,IAAIgW,EAASa,CAAM;AACzB,UAAI,CAACtL,EAAG,YAAYvL,CAAC;AACjB;AACJ,YAAM8W,IAAKvL,EAAG,IAAIvL,CAAC,GACb4C,IAAIqH,EAAM,KAAK,SAASjK,CAAC,EAAE,YAC3B6C,IAAI0I,EAAG,OAAO3I,EAAE,CAAC;AACvB,UAAIC,MAAM5E;AACN;AACJ,YAAMoW,IAAI9I,EAAG,OAAOuL,IAAKvL,EAAG,OAAOzI,IAAID,IAAI8C,CAAC,CAAC;AAC7C,UAAI0O,MAAMpW;AACN;AACJ,UAAIqX,MAAY1S,EAAE,MAAMC,IAAI,IAAI,KAAK,OAAOD,EAAE,IAAI1E,EAAG,GACjD6Y,KAAQ1C;AACZ,aAAIkC,KAAQzB,EAAsBT,CAAC,MAC/B0C,KAAQxL,EAAG,IAAI8I,CAAC,GAChBiB,MAAY,IAET,IAAID,EAAUxS,GAAGkU,IAAOlC,IAAmB,SAAYS,EAAQ;AAAA,IAClF;AACQ,WAAO,EAAE,MAAAjV,GAAM,OAAAuW,EAAO;AAAA,EAC9B;AAYI,WAASI,GAAK5f,GAASwU,GAAW/Q,IAAO,CAAA,GAAI;AACzC,UAAM,EAAE,MAAAwF,GAAM,OAAAuW,EAAO,IAAGN,GAAQlf,GAASwU,GAAW/Q,CAAI;AAGxD,WAFayE,GAAewM,EAAK,WAAWP,EAAG,OAAOW,CAAI,EACzC7L,GAAMuW,CAAK,EACjB,QAAQ/b,EAAK,MAAM;AAAA,EACtC;AAcI,WAASoc,EAAOC,GAAW9f,GAAS0c,GAAWjZ,IAAO,CAAA,GAAI;AACtD,UAAM,EAAE,MAAA0b,GAAM,SAAAF,GAAS,QAAAtJ,EAAQ,IAAGC,GAAgBnS,GAAM+Z,CAAc;AAGtE,QAFAd,IAAYnc,EAAOmc,GAAW,QAAW,WAAW,GACpD1c,IAAUgf,EAAmBhf,GAASif,CAAO,GACzC,CAAChf,GAAQ6f,CAAS,GAAG;AACrB,YAAMC,IAAMD,aAAqB7B,IAAY,wBAAwB;AACrE,YAAM,IAAI,MAAM,wCAAwC8B,CAAG;AAAA,IACvE;AACQ,IAAAjC,EAAkBgC,GAAWnK,CAAM;AACnC,QAAI;AACA,YAAMqB,IAAMiH,EAAU,UAAU6B,GAAWnK,CAAM,GAC3CvJ,IAAIyG,EAAM,UAAU6J,CAAS;AACnC,UAAIyC,KAAQnI,EAAI,SAAU;AACtB,eAAO;AACX,YAAM,EAAE,GAAAvL,GAAG,GAAAwR,EAAC,IAAKjG,GACXhW,IAAIud,EAAcve,CAAO,GACzBggB,IAAK7L,EAAG,IAAI8I,CAAC,GACbuB,IAAKrK,EAAG,OAAOnT,IAAIgf,CAAE,GACrBvB,IAAKtK,EAAG,OAAO1I,IAAIuU,CAAE,GACrBnS,IAAIgF,EAAM,KAAK,eAAe2L,CAAE,EAAE,IAAIpS,EAAE,eAAeqS,CAAE,CAAC;AAChE,aAAI5Q,EAAE,IAAK,IACA,KACDsG,EAAG,OAAOtG,EAAE,CAAC,MACVpC;AAAA,IACzB,QACkB;AACN,aAAO;AAAA,IACnB;AAAA,EACA;AACI,WAASwU,EAAiBH,GAAW9f,GAASyD,IAAO,CAAA,GAAI;AACrD,UAAM,EAAE,SAAAwb,EAAS,IAAGrJ,GAAgBnS,GAAM+Z,CAAc;AACxD,WAAAxd,IAAUgf,EAAmBhf,GAASif,CAAO,GACtChB,EAAU,UAAU6B,GAAW,WAAW,EAAE,iBAAiB9f,CAAO,EAAE,QAAS;AAAA,EAC9F;AACI,SAAO,OAAO,OAAO;AAAA,IACjB,QAAAmd;AAAA,IACA,cAAA5I;AAAA,IACA,iBAAAuI;AAAA,IACA,OAAAI;AAAA,IACA,SAAAxF;AAAA,IACA,OAAA7E;AAAA,IACA,MAAA+M;AAAA,IACA,QAAAC;AAAA,IACA,kBAAAI;AAAA,IACA,WAAAhC;AAAA,IACA,MAAAvJ;AAAA,EACR,CAAK;AACL;AC7rCA;AAWA,MAAMwL,KAAkB;AAAA,EACpB,GAAG,OAAO,oEAAoE;AAAA,EAC9E,GAAG,OAAO,oEAAoE;AAAA,EAC9E,GAAG,OAAO,CAAC;AAAA,EACX,GAAG,OAAO,CAAC;AAAA,EACX,GAAG,OAAO,CAAC;AAAA,EACX,IAAI,OAAO,oEAAoE;AAAA,EAC/E,IAAI,OAAO,oEAAoE;AACnF,GACMC,KAAiB;AAAA,EACnB,MAAM,OAAO,oEAAoE;AAAA,EACjF,SAAS;AAAA,IACL,CAAC,OAAO,oCAAoC,GAAG,CAAC,OAAO,oCAAoC,CAAC;AAAA,IAC5F,CAAC,OAAO,qCAAqC,GAAG,OAAO,oCAAoC,CAAC;AAAA,EAC/F;AACL,GAEM5V,KAAsB,uBAAO,CAAC;AAKpC,SAAS6V,GAAQpI,GAAG;AAChB,QAAM5L,IAAI8T,GAAgB,GAEpB1V,IAAM,OAAO,CAAC,GAAG6V,IAAM,OAAO,CAAC,GAAGC,IAAO,OAAO,EAAE,GAAGC,IAAO,OAAO,EAAE,GAErEC,IAAO,OAAO,EAAE,GAAGC,IAAO,OAAO,EAAE,GAAGC,IAAO,OAAO,EAAE,GACtDpL,IAAM0C,IAAIA,IAAIA,IAAK5L,GACnB8O,IAAM5F,IAAKA,IAAK0C,IAAK5L,GACrBuU,IAAM1V,EAAKiQ,GAAI1Q,GAAK4B,CAAC,IAAI8O,IAAM9O,GAC/BwU,IAAM3V,EAAK0V,GAAInW,GAAK4B,CAAC,IAAI8O,IAAM9O,GAC/ByU,IAAO5V,EAAK2V,GAAIrW,IAAK6B,CAAC,IAAIkJ,IAAMlJ,GAChC0U,IAAO7V,EAAK4V,GAAKP,GAAMlU,CAAC,IAAIyU,IAAOzU,GACnC2U,IAAO9V,EAAK6V,GAAKP,GAAMnU,CAAC,IAAI0U,IAAO1U,GACnC4U,IAAO/V,EAAK8V,GAAKN,GAAMrU,CAAC,IAAI2U,IAAO3U,GACnC6U,IAAQhW,EAAK+V,GAAKN,GAAMtU,CAAC,IAAI4U,IAAO5U,GACpC8U,IAAQjW,EAAKgW,GAAMR,GAAMrU,CAAC,IAAI2U,IAAO3U,GACrC+U,IAAQlW,EAAKiW,GAAM1W,GAAK4B,CAAC,IAAI8O,IAAM9O,GACnCmP,IAAMtQ,EAAKkW,GAAMX,GAAMpU,CAAC,IAAI0U,IAAO1U,GACnCoP,IAAMvQ,EAAKsQ,GAAI8E,GAAKjU,CAAC,IAAIkJ,IAAMlJ,GAC/BP,IAAOZ,EAAKuQ,GAAIjR,IAAK6B,CAAC;AAC5B,MAAI,CAACgV,GAAK,IAAIA,GAAK,IAAIvV,CAAI,GAAGmM,CAAC;AAC3B,UAAM,IAAI,MAAM,yBAAyB;AAC7C,SAAOnM;AACX;AACA,MAAMuV,KAAO9U,GAAM4T,GAAgB,GAAG,EAAE,MAAME,IAAS,GACjDiB,KAA0B,gBAAAjK,GAAY8I,IAAiB;AAAA,EACzD,IAAIkB;AAAA,EACJ,MAAMjB;AACV,CAAC,GAkBYmB,KAA4B,gBAAAlE,GAAMiE,IAASza,EAAM;AClF9D;AASO,SAAS3G,GAAQC,GAAG;AACvB,SAAOA,aAAa,cAAe,YAAY,OAAOA,CAAC,KAAKA,EAAE,YAAY,SAAS;AACvF;AAOO,SAASK,GAAO0D,MAAMyT,GAAS;AAClC,MAAI,CAACzX,GAAQgE,CAAC;AACV,UAAM,IAAI,MAAM,qBAAqB;AACzC,MAAIyT,EAAQ,SAAS,KAAK,CAACA,EAAQ,SAASzT,EAAE,MAAM;AAChD,UAAM,IAAI,MAAM,mCAAmCyT,IAAU,kBAAkBzT,EAAE,MAAM;AAC/F;AASO,SAAShD,GAAQC,GAAUC,IAAgB,IAAM;AACpD,MAAID,EAAS;AACT,UAAM,IAAI,MAAM,kCAAkC;AACtD,MAAIC,KAAiBD,EAAS;AAC1B,UAAM,IAAI,MAAM,uCAAuC;AAC/D;AAEO,SAASE,GAAQC,GAAKH,GAAU;AACnC,EAAAX,GAAOc,CAAG;AACV,QAAMC,IAAMJ,EAAS;AACrB,MAAIG,EAAI,SAASC;AACb,UAAM,IAAI,MAAM,2DAA2DA,CAAG;AAEtF;AAUO,SAASC,MAASC,GAAQ;AAC7B,WAASC,IAAI,GAAGA,IAAID,EAAO,QAAQC;AAC/B,IAAAD,EAAOC,CAAC,EAAE,KAAK,CAAC;AAExB;AAEO,SAASC,GAAWC,GAAK;AAC5B,SAAO,IAAI,SAASA,EAAI,QAAQA,EAAI,YAAYA,EAAI,UAAU;AAClE;AAEO,SAASC,EAAKC,GAAMC,GAAO;AAC9B,SAAQD,KAAS,KAAKC,IAAWD,MAASC;AAC9C;AAEO,SAASyf,GAAK1f,GAAMC,GAAO;AAC9B,SAAQD,KAAQC,IAAWD,MAAU,KAAKC,MAAY;AAC1D;AA4GO,SAAS0f,GAAYC,GAAK;AAC7B,MAAI,OAAOA,KAAQ;AACf,UAAM,IAAI,MAAM,iBAAiB;AACrC,SAAO,IAAI,WAAW,IAAI,YAAa,EAAC,OAAOA,CAAG,CAAC;AACvD;AAaO,SAASC,GAAQhd,GAAM;AAC1B,SAAI,OAAOA,KAAS,aAChBA,IAAO8c,GAAY9c,CAAI,IAC3BnE,GAAOmE,CAAI,GACJA;AACX;AAkCO,MAAMid,GAAK;AAClB;AAEO,SAASve,GAAaC,GAAU;AACnC,QAAME,IAAQ,CAACC,MAAQH,EAAU,EAAC,OAAOqe,GAAQle,CAAG,CAAC,EAAE,OAAQ,GACzDE,IAAML,EAAU;AACtB,SAAAE,EAAM,YAAYG,EAAI,WACtBH,EAAM,WAAWG,EAAI,UACrBH,EAAM,SAAS,MAAMF,EAAU,GACxBE;AACX;ACnPO,SAASqe,GAAajd,GAAMkd,GAAYrhB,GAAOgE,GAAM;AACxD,MAAI,OAAOG,EAAK,gBAAiB;AAC7B,WAAOA,EAAK,aAAakd,GAAYrhB,GAAOgE,CAAI;AACpD,QAAMsd,IAAO,OAAO,EAAE,GAChBC,IAAW,OAAO,UAAU,GAC5BC,IAAK,OAAQxhB,KAASshB,IAAQC,CAAQ,GACtCE,IAAK,OAAOzhB,IAAQuhB,CAAQ,GAC5B/gB,IAAIwD,IAAO,IAAI,GACfoY,IAAIpY,IAAO,IAAI;AACrB,EAAAG,EAAK,UAAUkd,IAAa7gB,GAAGghB,GAAIxd,CAAI,GACvCG,EAAK,UAAUkd,IAAajF,GAAGqF,GAAIzd,CAAI;AAC3C;AAEO,SAASR,GAAI9D,GAAG+D,GAAGC,GAAG;AACzB,SAAQhE,IAAI+D,IAAM,CAAC/D,IAAIgE;AAC3B;AAEO,SAASC,GAAIjE,GAAG+D,GAAGC,GAAG;AACzB,SAAQhE,IAAI+D,IAAM/D,IAAIgE,IAAMD,IAAIC;AACpC;AAKO,MAAMwB,WAAeic,GAAK;AAAA,EAC7B,YAAYtd,GAAUC,GAAWC,GAAWC,GAAM;AAC9C,UAAO,GACP,KAAK,WAAW,IAChB,KAAK,SAAS,GACd,KAAK,MAAM,GACX,KAAK,YAAY,IACjB,KAAK,WAAWH,GAChB,KAAK,YAAYC,GACjB,KAAK,YAAYC,GACjB,KAAK,OAAOC,GACZ,KAAK,SAAS,IAAI,WAAWH,CAAQ,GACrC,KAAK,OAAO3C,GAAW,KAAK,MAAM;AAAA,EAC1C;AAAA,EACI,OAAOgD,GAAM;AACT,IAAAzD,GAAQ,IAAI,GACZyD,IAAOgd,GAAQhd,CAAI,GACnBnE,GAAOmE,CAAI;AACX,UAAM,EAAE,MAAAC,GAAM,QAAAC,GAAQ,UAAAP,EAAU,IAAG,MAC7B1D,IAAM+D,EAAK;AACjB,aAASG,IAAM,GAAGA,IAAMlE,KAAM;AAC1B,YAAMmE,IAAO,KAAK,IAAIT,IAAW,KAAK,KAAK1D,IAAMkE,CAAG;AAEpD,UAAIC,MAAST,GAAU;AACnB,cAAMU,IAAWrD,GAAWgD,CAAI;AAChC,eAAOL,KAAY1D,IAAMkE,GAAKA,KAAOR;AACjC,eAAK,QAAQU,GAAUF,CAAG;AAC9B;AAAA,MAChB;AACY,MAAAD,EAAO,IAAIF,EAAK,SAASG,GAAKA,IAAMC,CAAI,GAAG,KAAK,GAAG,GACnD,KAAK,OAAOA,GACZD,KAAOC,GACH,KAAK,QAAQT,MACb,KAAK,QAAQM,GAAM,CAAC,GACpB,KAAK,MAAM;AAAA,IAE3B;AACQ,gBAAK,UAAUD,EAAK,QACpB,KAAK,WAAY,GACV;AAAA,EACf;AAAA,EACI,WAAWrD,GAAK;AACZ,IAAAJ,GAAQ,IAAI,GACZG,GAAQC,GAAK,IAAI,GACjB,KAAK,WAAW;AAIhB,UAAM,EAAE,QAAAuD,GAAQ,MAAAD,GAAM,UAAAN,GAAU,MAAAG,EAAM,IAAG;AACzC,QAAI,EAAE,KAAAK,EAAG,IAAK;AAEd,IAAAD,EAAOC,GAAK,IAAI,KAChBtD,GAAM,KAAK,OAAO,SAASsD,CAAG,CAAC,GAG3B,KAAK,YAAYR,IAAWQ,MAC5B,KAAK,QAAQF,GAAM,CAAC,GACpBE,IAAM;AAGV,aAASpD,IAAIoD,GAAKpD,IAAI4C,GAAU5C;AAC5B,MAAAmD,EAAOnD,CAAC,IAAI;AAIhB,IAAAmgB,GAAajd,GAAMN,IAAW,GAAG,OAAO,KAAK,SAAS,CAAC,GAAGG,CAAI,GAC9D,KAAK,QAAQG,GAAM,CAAC;AACpB,UAAMK,IAAQtD,GAAWL,CAAG,GACtBV,IAAM,KAAK;AAEjB,QAAIA,IAAM;AACN,YAAM,IAAI,MAAM,6CAA6C;AACjE,UAAMsE,IAAStE,IAAM,GACfuE,IAAQ,KAAK,IAAK;AACxB,QAAID,IAASC,EAAM;AACf,YAAM,IAAI,MAAM,oCAAoC;AACxD,aAASzD,IAAI,GAAGA,IAAIwD,GAAQxD;AACxB,MAAAuD,EAAM,UAAU,IAAIvD,GAAGyD,EAAMzD,CAAC,GAAG+C,CAAI;AAAA,EACjD;AAAA,EACI,SAAS;AACL,UAAM,EAAE,QAAAI,GAAQ,WAAAN,EAAS,IAAK;AAC9B,SAAK,WAAWM,CAAM;AACtB,UAAM1B,IAAM0B,EAAO,MAAM,GAAGN,CAAS;AACrC,gBAAK,QAAS,GACPpB;AAAA,EACf;AAAA,EACI,WAAWiC,GAAI;AACX,IAAAA,MAAOA,IAAK,IAAI,KAAK,YAAW,IAChCA,EAAG,IAAI,GAAG,KAAK,IAAG,CAAE;AACpB,UAAM,EAAE,UAAAd,GAAU,QAAAO,GAAQ,QAAAnE,GAAQ,UAAA2E,GAAU,WAAAC,GAAW,KAAAR,EAAG,IAAK;AAC/D,WAAAM,EAAG,YAAYE,GACfF,EAAG,WAAWC,GACdD,EAAG,SAAS1E,GACZ0E,EAAG,MAAMN,GACLpE,IAAS4D,KACTc,EAAG,OAAO,IAAIP,CAAM,GACjBO;AAAA,EACf;AAAA,EACI,QAAQ;AACJ,WAAO,KAAK,WAAY;AAAA,EAChC;AACA;AAMO,MAAMG,KAA4B,4BAAY,KAAK;AAAA,EACtD;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACxF,CAAC,GCmCK4c,KAAyB,2BAAW,KAAK;AAAA,EAC3C;AAAA,EAAG;AAAA,EAAG;AAAA,EAAI;AAAA,EAAG;AAAA,EAAI;AAAA,EAAG;AAAA,EAAI;AAAA,EAAG;AAAA,EAAI;AAAA,EAAG;AAAA,EAAG;AAAA,EAAG;AAAA,EAAG;AAAA,EAAI;AAAA,EAAI;AACvD,CAAC,GACKC,KAA+B,WAAW,KAAK,IAAI,MAAM,EAAE,EAAE,KAAK,CAAC,EAAE,IAAI,CAAClgB,GAAGR,MAAMA,CAAC,CAAC,GACrF2gB,KAA+BD,GAAM,IAAI,CAAC1gB,OAAO,IAAIA,IAAI,KAAK,EAAE,GAChE4gB,KAAyB,uBAAM;AAGjC,QAAMnf,IAAM,CAFF,CAACif,EAAK,GACN,CAACC,EAAK,CACC;AACjB,WAAS3gB,IAAI,GAAGA,IAAI,GAAGA;AACnB,aAAS6gB,KAAKpf;AACV,MAAAof,EAAE,KAAKA,EAAE7gB,CAAC,EAAE,IAAI,CAACmH,MAAMsZ,GAAOtZ,CAAC,CAAC,CAAC;AACzC,SAAO1F;AACX,GAAI,GACEqf,KAA8BF,GAAM,CAAC,GACrCG,KAA8BH,GAAM,CAAC,GAErCI,KAA4B;AAAA,EAC9B,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAAA,EACvD,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAAA,EACvD,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAAA,EACvD,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAAA,EACvD,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAC3D,EAAE,IAAI,CAAChhB,MAAM,WAAW,KAAKA,CAAC,CAAC,GACzBihB,KAA6B,gBAAAH,GAAK,IAAI,CAACI,GAAKlhB,MAAMkhB,EAAI,IAAI,CAACL,MAAMG,GAAUhhB,CAAC,EAAE6gB,CAAC,CAAC,CAAC,GACjFM,KAA6B,gBAAAJ,GAAK,IAAI,CAACG,GAAKlhB,MAAMkhB,EAAI,IAAI,CAACL,MAAMG,GAAUhhB,CAAC,EAAE6gB,CAAC,CAAC,CAAC,GACjFO,KAAwB,4BAAY,KAAK;AAAA,EAC3C;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACpD,CAAC,GACKC,KAAwB,4BAAY,KAAK;AAAA,EAC3C;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACpD,CAAC;AAED,SAASC,GAASC,GAAO9X,GAAG8M,GAAGiL,GAAG;AAC9B,SAAID,MAAU,IACH9X,IAAI8M,IAAIiL,IACfD,MAAU,IACF9X,IAAI8M,IAAM,CAAC9M,IAAI+X,IACvBD,MAAU,KACF9X,IAAI,CAAC8M,KAAKiL,IAClBD,MAAU,IACF9X,IAAI+X,IAAMjL,IAAI,CAACiL,IACpB/X,KAAK8M,IAAI,CAACiL;AACrB;AAEA,MAAMC,KAA0B,oBAAI,YAAY,EAAE;AAC3C,MAAMC,WAAkBzd,GAAO;AAAA,EAClC,cAAc;AACV,UAAM,IAAI,IAAI,GAAG,EAAI,GACrB,KAAK,KAAK,YACV,KAAK,KAAK,YACV,KAAK,KAAK,aACV,KAAK,KAAK,WACV,KAAK,KAAK;AAAA,EAClB;AAAA,EACI,MAAM;AACF,UAAM,EAAE,IAAA0d,GAAI,IAAAC,GAAI,IAAAC,GAAI,IAAAC,GAAI,IAAAC,EAAE,IAAK;AAC/B,WAAO,CAACJ,GAAIC,GAAIC,GAAIC,GAAIC,CAAE;AAAA,EAClC;AAAA,EACI,IAAIJ,GAAIC,GAAIC,GAAIC,GAAIC,GAAI;AACpB,SAAK,KAAKJ,IAAK,GACf,KAAK,KAAKC,IAAK,GACf,KAAK,KAAKC,IAAK,GACf,KAAK,KAAKC,IAAK,GACf,KAAK,KAAKC,IAAK;AAAA,EACvB;AAAA,EACI,QAAQ7e,GAAMwB,GAAQ;AAClB,aAAS1E,IAAI,GAAGA,IAAI,IAAIA,KAAK0E,KAAU;AACnC,MAAA+c,GAAQzhB,CAAC,IAAIkD,EAAK,UAAUwB,GAAQ,EAAI;AAE5C,QAAI1D,IAAK,KAAK,KAAK,GAAGghB,IAAKhhB,GAAIihB,IAAK,KAAK,KAAK,GAAGC,IAAKD,GAAIE,IAAK,KAAK,KAAK,GAAG/f,IAAK+f,GAAIC,IAAK,KAAK,KAAK,GAAGC,IAAKD,GAAIE,IAAK,KAAK,KAAK,GAAGC,IAAKD;AAGvI,aAASf,IAAQ,GAAGA,IAAQ,GAAGA,KAAS;AACpC,YAAMiB,IAAS,IAAIjB,GACbkB,IAAMrB,GAAMG,CAAK,GAAGmB,IAAMrB,GAAME,CAAK,GACrCoB,IAAK7B,GAAKS,CAAK,GAAGqB,IAAK7B,GAAKQ,CAAK,GACjC7Z,IAAKuZ,GAAWM,CAAK,GAAGsB,IAAK1B,GAAWI,CAAK;AACnD,eAASvhB,IAAI,GAAGA,IAAI,IAAIA,KAAK;AACzB,cAAM8iB,IAAMhD,GAAK9e,IAAKsgB,GAASC,GAAOU,GAAIE,GAAIC,CAAE,IAAIX,GAAQkB,EAAG3iB,CAAC,CAAC,IAAIyiB,GAAK/a,EAAG1H,CAAC,CAAC,IAAIsiB,IAAM;AACzF,QAAAthB,IAAKshB,GAAIA,IAAKF,GAAIA,IAAKtC,GAAKqC,GAAI,EAAE,IAAI,GAAGA,IAAKF,GAAIA,IAAKa;AAAA,MACvE;AAEY,eAAS9iB,IAAI,GAAGA,IAAI,IAAIA,KAAK;AACzB,cAAM+iB,IAAMjD,GAAKkC,IAAKV,GAASkB,GAAQN,GAAI9f,GAAIigB,CAAE,IAAIZ,GAAQmB,EAAG5iB,CAAC,CAAC,IAAI0iB,GAAKG,EAAG7iB,CAAC,CAAC,IAAIuiB,IAAM;AAC1F,QAAAP,IAAKO,GAAIA,IAAKF,GAAIA,IAAKvC,GAAK1d,GAAI,EAAE,IAAI,GAAGA,IAAK8f,GAAIA,IAAKa;AAAA,MACvE;AAAA,IACA;AAEQ,SAAK,IAAK,KAAK,KAAKZ,IAAKE,IAAM,GAAI,KAAK,KAAKD,IAAKG,IAAM,GAAI,KAAK,KAAKD,IAAKN,IAAM,GAAI,KAAK,KAAKhhB,IAAKkhB,IAAM,GAAI,KAAK,KAAKD,IAAK7f,IAAM,CAAC;AAAA,EAC5I;AAAA,EACI,aAAa;AACT,IAAAtC,GAAM2hB,EAAO;AAAA,EACrB;AAAA,EACI,UAAU;AACN,SAAK,YAAY,IACjB3hB,GAAM,KAAK,MAAM,GACjB,KAAK,IAAI,GAAG,GAAG,GAAG,GAAG,CAAC;AAAA,EAC9B;AACA;AAMO,MAAMkjB,KAA4B,gBAAArhB,GAAa,MAAM,IAAI+f,IAAW,GC5Q9DsB,KAAYC,ICInBnf,KAA2B,4BAAY,KAAK;AAAA,EAC9C;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACxF,CAAC,GAEKC,KAA2B,oBAAI,YAAY,EAAE;AAC5C,MAAMmf,WAAejf,GAAO;AAAA,EAC/B,YAAYpB,IAAY,IAAI;AACxB,UAAM,IAAIA,GAAW,GAAG,EAAK,GAG7B,KAAK,IAAIgB,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI;AAAA,EAChC;AAAA,EACI,MAAM;AACF,UAAM,EAAE,GAAAK,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,EAAC,IAAK;AACnC,WAAO,CAACP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,CAAC;AAAA,EACtC;AAAA;AAAA,EAEI,IAAIP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAG;AACxB,SAAK,IAAIP,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI;AAAA,EACrB;AAAA,EACI,QAAQvB,GAAMwB,GAAQ;AAElB,aAAS1E,IAAI,GAAGA,IAAI,IAAIA,KAAK0E,KAAU;AACnC,MAAAX,GAAS/D,CAAC,IAAIkD,EAAK,UAAUwB,GAAQ,EAAK;AAC9C,aAAS1E,IAAI,IAAIA,IAAI,IAAIA,KAAK;AAC1B,YAAM2E,IAAMZ,GAAS/D,IAAI,EAAE,GACrB4E,IAAKb,GAAS/D,IAAI,CAAC,GACnB6E,IAAK1E,EAAKwE,GAAK,CAAC,IAAIxE,EAAKwE,GAAK,EAAE,IAAKA,MAAQ,GAC7CG,IAAK3E,EAAKyE,GAAI,EAAE,IAAIzE,EAAKyE,GAAI,EAAE,IAAKA,MAAO;AACjD,MAAAb,GAAS/D,CAAC,IAAK8E,IAAKf,GAAS/D,IAAI,CAAC,IAAI6E,IAAKd,GAAS/D,IAAI,EAAE,IAAK;AAAA,IAC3E;AAEQ,QAAI,EAAE,GAAAkE,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,EAAC,IAAK;AACjC,aAASzE,IAAI,GAAGA,IAAI,IAAIA,KAAK;AACzB,YAAM+E,IAAS5E,EAAKmE,GAAG,CAAC,IAAInE,EAAKmE,GAAG,EAAE,IAAInE,EAAKmE,GAAG,EAAE,GAC9CU,IAAMP,IAAIM,IAASxC,GAAI+B,GAAGC,GAAGC,CAAC,IAAIV,GAAS9D,CAAC,IAAI+D,GAAS/D,CAAC,IAAK,GAE/DiF,KADS9E,EAAK+D,GAAG,CAAC,IAAI/D,EAAK+D,GAAG,EAAE,IAAI/D,EAAK+D,GAAG,EAAE,KAC/BxB,GAAIwB,GAAGC,GAAGC,CAAC,IAAK;AACrC,MAAAK,IAAID,GACJA,IAAID,GACJA,IAAID,GACJA,IAAKD,IAAIW,IAAM,GACfX,IAAID,GACJA,IAAID,GACJA,IAAID,GACJA,IAAKc,IAAKC,IAAM;AAAA,IAC5B;AAEQ,IAAAf,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnB,KAAK,IAAIP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,CAAC;AAAA,EACvC;AAAA,EACI,aAAa;AACT,IAAA3E,GAAMiE,EAAQ;AAAA,EACtB;AAAA,EACI,UAAU;AACN,SAAK,IAAI,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,CAAC,GAC/BjE,GAAM,KAAK,MAAM;AAAA,EACzB;AACA;AAgQO,MAAMqF,KAAyB,gBAAAxD,GAAa,MAAM,IAAIuhB,IAAQ,GCvVxD/d,KAASge,ICChBC,KAAkB;AAKxB,SAASC,GAAarD,GAAyB;AACvC,QAAA/gB,IAAkB,CAAC,CAAC;AAC1B,WAASe,IAAI,GAAGA,IAAIggB,EAAI,QAAQhgB,KAAK;AAC7B,UAAAsB,IAAO0e,EAAIhgB,CAAC;AAClB,QAAI,CAACsB,EAAM;AACL,UAAAvC,IAAQqkB,GAAgB,QAAQ9hB,CAAI;AAC1C,QAAIvC,MAAU,GAAU,OAAA,IAAI,MAAM,0BAA0B;AAE5D,aAAS8hB,IAAI,GAAGA,IAAI5hB,EAAM,QAAQ4hB;AAChC,MAAA5hB,EAAM4hB,CAAC,KAAM;AAEf,IAAA5hB,EAAM,CAAC,KAAMF;AAEb,QAAIukB,IAAQ;AACZ,aAASzC,IAAI,GAAGA,IAAI5hB,EAAM,QAAQ4hB,KAAK;AAC/B,YAAA0C,IAAOtkB,EAAM4hB,CAAC;AACd,MAAA5hB,EAAA4hB,CAAC,IAAI0C,IAAOD,GACVA,IAAArkB,EAAM4hB,CAAC,KAAM,GACrB5hB,EAAM4hB,CAAC,KAAM;AAAA,IAAA;AAEf,WAAOyC,IAAQ;AACP,MAAArkB,EAAA,KAAKqkB,IAAQ,GAAI,GACbA,MAAA;AAAA,EACZ;AAIO,WAAAtjB,IAAI,GAAGA,IAAIggB,EAAI,UAAUA,EAAIhgB,CAAC,MAAM,KAAKA;AAChD,IAAAf,EAAM,KAAK,CAAC;AAGd,SAAO,IAAI,WAAWA,EAAM,SAAS;AACvC;AAKA,SAASukB,GAAaC,GAAkE;AACtF,QAAMC,IAAU,oCAGVC,IADYF,EAAQ,YAAY,EACd,MAAM,GAAG;AAC7B,MAAAE,EAAM,WAAW,EAAU,QAAA;AAEzB,QAAAC,IAAMD,EAAM,CAAC,GACb1gB,IAAO0gB,EAAM,CAAC;AAEhB,MADA,CAACC,KAAO,CAAC3gB,KACT2gB,MAAQ,MAAc,QAAA;AAE1B,QAAMC,IAAmB,CAAC;AAC1B,aAAWviB,KAAQ2B,GAAM;AACjB,UAAAmF,IAAMsb,EAAQ,QAAQpiB,CAAI;AAC5B,QAAA8G,MAAQ,GAAW,QAAA;AACvB,IAAAyb,EAAO,KAAKzb,CAAG;AAAA,EAAA;AAIjB,QAAM0b,IAAUD,EAAO,MAAM,GAAG,EAAE;AAC9B,MAAAC,EAAQ,SAAS,EAAU,QAAA;AAEzB,QAAAC,IAAUD,EAAQ,CAAC;AACrB,MAAAC,MAAY,OAAkB,QAAA;AAG5B,QAAAC,IAAYC,GAAYH,EAAQ,MAAM,CAAC,GAAG,GAAG,CAAQ;AACvD,SAACE,IAEE,EAAE,SAAAD,GAAS,SAAS,IAAI,WAAWC,CAAS,EAAE,IAF9B;AAGzB;AAKA,SAASC,GAAYhhB,GAAgBihB,GAAkBC,GAAgBziB,GAA+B;AACpG,MAAI0L,IAAM,GACN0C,IAAO;AACX,QAAMvG,IAAmB,CAAC,GACpB6a,KAAQ,KAAKD,KAAU;AAE7B,aAAWplB,KAASkE,GAAM;AACxB,QAAIlE,IAAQ,KAAKA,KAASmlB,MAAa,EAAU,QAAA;AAGjD,SAFA9W,IAAOA,KAAO8W,IAAYnlB,GAClB+Q,KAAAoU,GACDpU,KAAQqU;AACL,MAAArU,KAAAqU,GACD5a,EAAA,KAAM6D,KAAO0C,IAAQsU,CAAI;AAAA,EAClC;SAKStU,KAAQoU,KAAc9W,KAAQ+W,IAASrU,IAASsU,IAClD,OAGF7a;AACT;AAKA,SAAS8a,GAAY9lB,GAAiB+lB,GAAmC;AAGvE,QAAMC,IAAe,IAAI,cAAc,OAAOD,CAAa,GAErDE,IAAgB,IAAI,cAAc,OAAOjmB,CAAO,GAChDkmB,IAA+B,CAAC;AACtC,MAAIC,IAAgBF,EAAc;AAGlC,MAAIE,IAAgB;AAClB,IAAAD,EAAmB,KAAKC,CAAa;AAAA,WAC5BA,KAAiB;AAC1B,IAAAD,EAAmB,KAAK,KAAMC,IAAgB,KAAOA,KAAiB,IAAK,GAAI;AAAA,WACtEA,KAAiB;AACP,IAAAD,EAAA;AAAA,MACjB;AAAA,MACAC,IAAgB;AAAA,MACfA,KAAiB,IAAK;AAAA,MACtBA,KAAiB,KAAM;AAAA,MACvBA,KAAiB,KAAM;AAAA,IAC1B;AAAA;AAEM,UAAA,IAAI,MAAM,kBAAkB;AAG9B,QAAAC,IAAsB,IAAI,WAAWF,CAAkB,GAGvDG,IAAcL,EAAa,SAASI,EAAoB,SAASH,EAAc,QAC/EK,IAAW,IAAI,WAAWD,CAAW;AAC3C,MAAIlgB,IAAS;AAEJ,SAAAmgB,EAAA,IAAIN,GAAc7f,CAAM,GACjCA,KAAU6f,EAAa,QACdM,EAAA,IAAIF,GAAqBjgB,CAAM,GACxCA,KAAUigB,EAAoB,QACrBE,EAAA,IAAIL,GAAe9f,CAAM,GAG3BS,GAAOA,GAAO0f,CAAQ,CAAC;AAChC;AAKA,SAASrG,GAAiB7B,GAAyB0B,GAAqC;AAClF,MAAAA,EAAU,WAAW;AACjB,UAAA,IAAI,MAAM,0BAA0B;AAI5C,MADkBA,EAAU,CAAC,MACX,OAAiB,OAAA,IAAI,MAAM,mBAAmB;AAEhE,QAAMrU,IAAIqU,EAAU,MAAM,GAAG,EAAE,GACzB,IAAIA,EAAU,MAAM,IAAI,EAAE,GAE1ByG,IAAwB,CAAC;AAI/B,WAASC,IAAQ,GAAGA,IAAQ,GAAGA;AACzB,QAAA;AAOI,YAAAzT,IALM,IAAIuO,GAAU;AAAA,QACxB,OAAO,OAAO,MAAM,KAAK7V,CAAC,EAAE,IAAI,CAAKxH,MAAAA,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,EAAE,KAAK,EAAE,CAAC;AAAA,QAC9E,OAAO,OAAO,MAAM,KAAK,CAAC,EAAE,IAAI,CAAKA,MAAAA,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,EAAE,KAAK,EAAE,CAAC;AAAA,MAAA,EAC9E,eAAeuiB,CAAK,EAEJ,iBAAiBpI,CAAW,GAGxCqI,IAAkB1T,EAAM,QAAQ,EAAI,GACpC2T,IAAoB3T,EAAM,QAAQ,EAAK;AAG7C,MAAAwT,EAAQ,KAAKE,CAAe,GAC5BF,EAAQ,KAAKG,CAAiB;AAAA,YACpB;AAEV;AAAA,IAAA;AAIA,MAAAH,EAAQ,WAAW;AACf,UAAA,IAAI,MAAM,mCAAmC;AAG9C,SAAAA;AACT;AAKA,SAASI,GAAQ/hB,GAAgC;AACxC,SAAA6f,GAAU7d,GAAOhC,CAAM,CAAC;AACjC;AAKA,SAASgiB,GAAc1B,GAAiBxI,GAAgC;AAEtE,MAAIwI,EAAQ,WAAW,GAAG,KAAKA,EAAQ,WAAW,GAAG;AAC/C,QAAA;AACI,YAAA2B,IAAU/B,GAAaI,CAAO;AAChC,UAAA2B,EAAQ,SAAS,GAAW,QAAA;AAEhC,YAAMtB,IAAUsB,EAAQ,MAAM,GAAG,EAAE,GAC7BC,IAAWD,EAAQ,MAAM,EAAE,GAG3BE,IADOngB,GAAOA,GAAO2e,CAAO,CAAC,EACL,MAAM,GAAG,CAAC;AAGpC,UAAA,CAACuB,EAAS,MAAM,CAAC9B,GAAMvjB,MAAMujB,MAAS+B,EAAiBtlB,CAAC,CAAC;AACpD,eAAA;AAGH,YAAAulB,IAAazB,EAAQ,MAAM,CAAC,GAC5B0B,IAAeN,GAAQjK,CAAS;AAE/B,aAAAsK,EAAW,MAAM,CAAChC,GAAMvjB,MAAMujB,MAASiC,EAAaxlB,CAAC,CAAC;AAAA,IAAA,QACvD;AACC,aAAA;AAAA,IAAA;AAKX,MAAIyjB,EAAQ,YAAA,EAAc,WAAW,MAAM;AACrC,QAAA;AACI,YAAA2B,IAAU5B,GAAaC,CAAO;AAChC,UAAA,CAAC2B,EAAgB,QAAA;AAEf,YAAA,EAAE,SAAArB,GAAS,SAAA0B,EAAA,IAAYL;AAE7B,UAAIrB,MAAY,GAAG;AAEjB,YAAI2B,IAAWzK;AAGX,YAAAA,EAAU,WAAW,IAAI;AAC3B,gBAAM0K,IAAS1K,EAAU,EAAE,IAAK,MAAM;AAC3B,UAAAyK,IAAA,IAAI,WAAW,EAAE,GACnBA,EAAA,CAAC,IAAIC,IAAS,IAAO,GAC9BD,EAAS,IAAIzK,EAAU,MAAM,GAAG,EAAE,GAAG,CAAC;AAAA,QAAA;AAGlC,cAAAuK,IAAeN,GAAQQ,CAAQ;AAC9B,eAAAD,EAAQ,MAAM,CAAClC,GAAMvjB,MAAMujB,MAASiC,EAAaxlB,CAAC,CAAC;AAAA,MAAA;AAGrD,aAAA;AAAA,IAAA,QACD;AACC,aAAA;AAAA,IAAA;AAIJ,SAAA;AACT;AAOsB,eAAA4lB,GACpBC,GACApC,GACApF,GACkB;AAElB,QAAMiG,IAAgB;AAAA;AAElB,MAAA;AAEI,UAAAwB,IAAW,WAAW,KAAK,KAAKzH,CAAS,GAAG,CAAK,MAAA,EAAE,WAAW,CAAC,CAAC;AAElE,QAAAyH,EAAS,WAAW;AAChB,YAAA,IAAI,MAAM,0BAA0B;AAItC,UAAAnJ,IAAc0H,GAAYwB,GAAKvB,CAAa,GAG5CyB,IAAavH,GAAiB7B,GAAamJ,CAAQ;AAGzD,eAAWE,KAAUD;AACf,UAAAZ,GAAc1B,GAASuC,CAAM;AACxB,eAAA;AAIJ,WAAA;AAAA,WACAlI,GAAY;AACnB,UAAMmI,IAAenI,aAAa,QAAQA,EAAE,UAAU,OAAOA,CAAC;AAC9D,UAAM,IAAIxf,EAAY,kCAAkC2nB,CAAY,EAAE;AAAA,EAAA;AAE1E;AAOA,SAASC,GAAclnB,IAAS,IAAY;AAC1C,SAAOkD,GAAYlD,CAAM,EAAE,SAAS,KAAK;AAC3C;AASO,SAASmnB,GAAkBC,GAAmC;AAC/D,MAAA,CAACA,EAAQ;AACL,UAAA,IAAI9nB,EAAY,2BAA2B;AAG/C,MAAA+nB;AACA,MAAA;AACU,IAAAA,IAAA,IAAI,IAAID,EAAQ,WAAW;AAAA,WAChCtI,GAAG;AACV,UAAM,IAAIxf,EAAY,yBAA0Bwf,EAAY,OAAO,EAAE;AAAA,EAAA;AAIjE,QAAAwI,IAAgBD,EAAU,OAAOA,EAAU,UAE3CE,IAAQH,EAAQ,SAASF,GAAc,GACvCM,IAAeJ,EAAQ,WAAW,MAAM;AAG9C,MAAIA,EAAQ,YAAYC,EAAU,aAAa;AACvC,UAAA,IAAI/nB,EAAY,qEAAqE;AAE7F,MAAI,CAAC8nB,EAAQ,YAAYC,EAAU,aAAa;AACxC,UAAA,IAAI/nB,EAAY,2EAA2E;AAW5F,SANK,YAAYgoB,CAAa,MAAMC,CAAK,MAAMC,CAAY;AAOpE;AAUsB,eAAAC,GACpBC,GACAC,GACmC;AACnC,QAAM,EAAE,SAAAlD,GAAS,KAAAoC,GAAK,WAAAxH,EAAc,IAAAqI,GAC9B,EAAE,qBAAAE,GAAqB,eAAAC,EAAA,IAAkBF;AAE/C,MAAI,CAAClD,KAAW,CAACoC,KAAO,CAACxH;AACjB,UAAA,IAAI/f,EAAY,6DAA6D;AAIjF,MAAAwoB;AACA,MAAA;AAEF,UAAMC,IAAclB,EAAI,QAAQ,YAAY,OAAO;AAC/B,IAAAiB,IAAA,IAAI,IAAIC,CAAW;AAAA,WAChCjJ,GAAG;AACV,UAAM,IAAIxf,EAAY,qCAAsCwf,EAAY,OAAO,EAAE;AAAA,EAAA;AAGnF,QAAMkJ,IAAgBF,EAAkB,aAAa,IAAI,GAAG,GACtDG,IAAmBH,EAAkB,aAAa,IAAI,GAAG,GACzDI,IAAwBJ,EAAkB,OAAOA,EAAkB;AAErE,MAAAE,MAAkB,QAAQC,MAAqB;AAC3C,UAAA,IAAI3oB,EAAY,kDAAkD;AAItE,MAAA6oB;AACA,MAAA;AAEF,IAAAA,IAAoB,OAAOP,KAAwB,WAAW,IAAI,IAAIA,CAAmB,IAAIA;AAAA,WACtF9I,GAAG;AACV,UAAM,IAAIxf,EAAY,yCAA0Cwf,EAAY,OAAO,EAAE;AAAA,EAAA;AAGjF,QAAAsJ,IAAwBD,EAAkB,OAAOA,EAAkB;AAEzE,MAAID,MAA0BE;AAC5B,UAAM,IAAI9oB,EAAY,yCAAyC4oB,CAAqB,gBAAgBE,CAAqB,GAAG;AAI9H,QAAMC,IAAiBF,EAAkB;AACrC,MAAAF,MAAqB,OAAOI,MAAmB;AAC3C,UAAA,IAAI/oB,EAAY,oEAAoE;AAExF,MAAA2oB,MAAqB,OAAOI,MAAmB;AAC3C,UAAA,IAAI/oB,EAAY,mEAAmE;AAIvF,MAAAuoB,KAAiBG,MAAkBH;AACrC,UAAM,IAAIvoB,EAAY,kCAAkC0oB,CAAa,gBAAgBH,CAAa,4BAA4B;AAI5H,MAAA;AAEF,QAAI,CADqB,MAAMjB,GAAyBC,GAAKpC,GAASpF,CAAS;AAGvE,YAAA,IAAI/f,EAAY,oBAAoB;AAAA,WAErCgpB,GAAO;AAGd,UAAIA,aAAiBhpB,IACbgpB,IAGA,IAAIhpB,EAAY,mDAAoDgpB,EAAgB,OAAO,EAAE;AAAA,EACrG;AAIK,SAAA;AAAA,IACL,SAAS;AAAA,IACT,SAAA7D;AAAA,IACA,OAAOuD;AAAA;AAAA,EACT;AACF;","x_google_ignoreList":[1,2,3,4,5,6,7,8,9,10,11,12,13,14,15]}
1
+ {"version":3,"file":"digiid-ts.es.js","sources":["../src/types.ts","../node_modules/@noble/curves/node_modules/@noble/hashes/utils.js","../node_modules/@noble/curves/node_modules/@noble/hashes/_md.js","../node_modules/@noble/curves/node_modules/@noble/hashes/sha2.js","../node_modules/@noble/curves/utils.js","../node_modules/@noble/curves/abstract/modular.js","../node_modules/@noble/curves/abstract/curve.js","../node_modules/@noble/curves/node_modules/@noble/hashes/hmac.js","../node_modules/@noble/curves/abstract/weierstrass.js","../node_modules/@noble/curves/secp256k1.js","../node_modules/@noble/hashes/esm/utils.js","../node_modules/@noble/hashes/esm/_md.js","../node_modules/@noble/hashes/esm/legacy.js","../node_modules/@noble/hashes/esm/ripemd160.js","../node_modules/@noble/hashes/esm/sha2.js","../node_modules/@noble/hashes/esm/sha256.js","../src/digiid.ts"],"sourcesContent":["/**\n * Options for generating a DigiID URI.\n */\nexport interface DigiIDUriOptions {\n /** The full URL that the user's DigiID wallet will send the verification data back to. */\n callbackUrl: string;\n /** A unique, unpredictable nonce (number used once) for this authentication request. If not provided, a secure random one might be generated (implementation specific). */\n nonce?: string;\n /** Set to true for testing over HTTP (insecure), defaults to false (HTTPS required). */\n unsecure?: boolean;\n}\n\n/**\n * Data structure typically received from the DigiID wallet callback.\n */\nexport interface DigiIDCallbackData {\n /** The DigiByte address used for signing. */\n address: string;\n /** The DigiID URI that was originally presented to the user. */\n uri: string;\n /** The signature proving ownership of the address, signing the URI. */\n signature: string;\n}\n\n/**\n * Options for verifying a DigiID callback.\n */\nexport interface DigiIDVerifyOptions {\n /** The expected callback URL (or parts of it, like domain/path) that should match the one in the received URI. */\n expectedCallbackUrl: string | URL;\n /** The specific nonce that was originally generated for this authentication attempt, to prevent replay attacks. */\n expectedNonce?: string;\n}\n\n/**\n * Result of a successful DigiID verification.\n */\nexport interface DigiIDVerificationResult {\n /** Indicates the verification was successful. */\n isValid: true;\n /** The DigiByte address that was successfully verified. */\n address: string;\n /** The nonce extracted from the verified URI. */\n nonce: string;\n}\n\n/**\n * Represents an error during DigiID processing.\n */\nexport class DigiIDError extends Error {\n constructor(message: string) {\n super(message);\n this.name = 'DigiIDError';\n }\n}\n","/**\n * Utilities for hex, bytes, CSPRNG.\n * @module\n */\n/*! noble-hashes - MIT License (c) 2022 Paul Miller (paulmillr.com) */\n/** Checks if something is Uint8Array. Be careful: nodejs Buffer will return true. */\nexport function isBytes(a) {\n return a instanceof Uint8Array || (ArrayBuffer.isView(a) && a.constructor.name === 'Uint8Array');\n}\n/** Asserts something is positive integer. */\nexport function anumber(n, title = '') {\n if (!Number.isSafeInteger(n) || n < 0) {\n const prefix = title && `\"${title}\" `;\n throw new Error(`${prefix}expected integer >= 0, got ${n}`);\n }\n}\n/** Asserts something is Uint8Array. */\nexport function abytes(value, length, title = '') {\n const bytes = isBytes(value);\n const len = value?.length;\n const needsLen = length !== undefined;\n if (!bytes || (needsLen && len !== length)) {\n const prefix = title && `\"${title}\" `;\n const ofLen = needsLen ? ` of length ${length}` : '';\n const got = bytes ? `length=${len}` : `type=${typeof value}`;\n throw new Error(prefix + 'expected Uint8Array' + ofLen + ', got ' + got);\n }\n return value;\n}\n/** Asserts something is hash */\nexport function ahash(h) {\n if (typeof h !== 'function' || typeof h.create !== 'function')\n throw new Error('Hash must wrapped by utils.createHasher');\n anumber(h.outputLen);\n anumber(h.blockLen);\n}\n/** Asserts a hash instance has not been destroyed / finished */\nexport function aexists(instance, checkFinished = true) {\n if (instance.destroyed)\n throw new Error('Hash instance has been destroyed');\n if (checkFinished && instance.finished)\n throw new Error('Hash#digest() has already been called');\n}\n/** Asserts output is properly-sized byte array */\nexport function aoutput(out, instance) {\n abytes(out, undefined, 'digestInto() output');\n const min = instance.outputLen;\n if (out.length < min) {\n throw new Error('\"digestInto() output\" expected to be of length >=' + min);\n }\n}\n/** Cast u8 / u16 / u32 to u8. */\nexport function u8(arr) {\n return new Uint8Array(arr.buffer, arr.byteOffset, arr.byteLength);\n}\n/** Cast u8 / u16 / u32 to u32. */\nexport function u32(arr) {\n return new Uint32Array(arr.buffer, arr.byteOffset, Math.floor(arr.byteLength / 4));\n}\n/** Zeroize a byte array. Warning: JS provides no guarantees. */\nexport function clean(...arrays) {\n for (let i = 0; i < arrays.length; i++) {\n arrays[i].fill(0);\n }\n}\n/** Create DataView of an array for easy byte-level manipulation. */\nexport function createView(arr) {\n return new DataView(arr.buffer, arr.byteOffset, arr.byteLength);\n}\n/** The rotate right (circular right shift) operation for uint32 */\nexport function rotr(word, shift) {\n return (word << (32 - shift)) | (word >>> shift);\n}\n/** The rotate left (circular left shift) operation for uint32 */\nexport function rotl(word, shift) {\n return (word << shift) | ((word >>> (32 - shift)) >>> 0);\n}\n/** Is current platform little-endian? Most are. Big-Endian platform: IBM */\nexport const isLE = /* @__PURE__ */ (() => new Uint8Array(new Uint32Array([0x11223344]).buffer)[0] === 0x44)();\n/** The byte swap operation for uint32 */\nexport function byteSwap(word) {\n return (((word << 24) & 0xff000000) |\n ((word << 8) & 0xff0000) |\n ((word >>> 8) & 0xff00) |\n ((word >>> 24) & 0xff));\n}\n/** Conditionally byte swap if on a big-endian platform */\nexport const swap8IfBE = isLE\n ? (n) => n\n : (n) => byteSwap(n);\n/** In place byte swap for Uint32Array */\nexport function byteSwap32(arr) {\n for (let i = 0; i < arr.length; i++) {\n arr[i] = byteSwap(arr[i]);\n }\n return arr;\n}\nexport const swap32IfBE = isLE\n ? (u) => u\n : byteSwap32;\n// Built-in hex conversion https://caniuse.com/mdn-javascript_builtins_uint8array_fromhex\nconst hasHexBuiltin = /* @__PURE__ */ (() => \n// @ts-ignore\ntypeof Uint8Array.from([]).toHex === 'function' && typeof Uint8Array.fromHex === 'function')();\n// Array where index 0xf0 (240) is mapped to string 'f0'\nconst hexes = /* @__PURE__ */ Array.from({ length: 256 }, (_, i) => i.toString(16).padStart(2, '0'));\n/**\n * Convert byte array to hex string. Uses built-in function, when available.\n * @example bytesToHex(Uint8Array.from([0xca, 0xfe, 0x01, 0x23])) // 'cafe0123'\n */\nexport function bytesToHex(bytes) {\n abytes(bytes);\n // @ts-ignore\n if (hasHexBuiltin)\n return bytes.toHex();\n // pre-caching improves the speed 6x\n let hex = '';\n for (let i = 0; i < bytes.length; i++) {\n hex += hexes[bytes[i]];\n }\n return hex;\n}\n// We use optimized technique to convert hex string to byte array\nconst asciis = { _0: 48, _9: 57, A: 65, F: 70, a: 97, f: 102 };\nfunction asciiToBase16(ch) {\n if (ch >= asciis._0 && ch <= asciis._9)\n return ch - asciis._0; // '2' => 50-48\n if (ch >= asciis.A && ch <= asciis.F)\n return ch - (asciis.A - 10); // 'B' => 66-(65-10)\n if (ch >= asciis.a && ch <= asciis.f)\n return ch - (asciis.a - 10); // 'b' => 98-(97-10)\n return;\n}\n/**\n * Convert hex string to byte array. Uses built-in function, when available.\n * @example hexToBytes('cafe0123') // Uint8Array.from([0xca, 0xfe, 0x01, 0x23])\n */\nexport function hexToBytes(hex) {\n if (typeof hex !== 'string')\n throw new Error('hex string expected, got ' + typeof hex);\n // @ts-ignore\n if (hasHexBuiltin)\n return Uint8Array.fromHex(hex);\n const hl = hex.length;\n const al = hl / 2;\n if (hl % 2)\n throw new Error('hex string expected, got unpadded hex of length ' + hl);\n const array = new Uint8Array(al);\n for (let ai = 0, hi = 0; ai < al; ai++, hi += 2) {\n const n1 = asciiToBase16(hex.charCodeAt(hi));\n const n2 = asciiToBase16(hex.charCodeAt(hi + 1));\n if (n1 === undefined || n2 === undefined) {\n const char = hex[hi] + hex[hi + 1];\n throw new Error('hex string expected, got non-hex character \"' + char + '\" at index ' + hi);\n }\n array[ai] = n1 * 16 + n2; // multiply first octet, e.g. 'a3' => 10*16+3 => 160 + 3 => 163\n }\n return array;\n}\n/**\n * There is no setImmediate in browser and setTimeout is slow.\n * Call of async fn will return Promise, which will be fullfiled only on\n * next scheduler queue processing step and this is exactly what we need.\n */\nexport const nextTick = async () => { };\n/** Returns control to thread each 'tick' ms to avoid blocking. */\nexport async function asyncLoop(iters, tick, cb) {\n let ts = Date.now();\n for (let i = 0; i < iters; i++) {\n cb(i);\n // Date.now() is not monotonic, so in case if clock goes backwards we return return control too\n const diff = Date.now() - ts;\n if (diff >= 0 && diff < tick)\n continue;\n await nextTick();\n ts += diff;\n }\n}\n/**\n * Converts string to bytes using UTF8 encoding.\n * Built-in doesn't validate input to be string: we do the check.\n * @example utf8ToBytes('abc') // Uint8Array.from([97, 98, 99])\n */\nexport function utf8ToBytes(str) {\n if (typeof str !== 'string')\n throw new Error('string expected');\n return new Uint8Array(new TextEncoder().encode(str)); // https://bugzil.la/1681809\n}\n/**\n * Helper for KDFs: consumes uint8array or string.\n * When string is passed, does utf8 decoding, using TextDecoder.\n */\nexport function kdfInputToBytes(data, errorTitle = '') {\n if (typeof data === 'string')\n return utf8ToBytes(data);\n return abytes(data, undefined, errorTitle);\n}\n/** Copies several Uint8Arrays into one. */\nexport function concatBytes(...arrays) {\n let sum = 0;\n for (let i = 0; i < arrays.length; i++) {\n const a = arrays[i];\n abytes(a);\n sum += a.length;\n }\n const res = new Uint8Array(sum);\n for (let i = 0, pad = 0; i < arrays.length; i++) {\n const a = arrays[i];\n res.set(a, pad);\n pad += a.length;\n }\n return res;\n}\n/** Merges default options and passed options. */\nexport function checkOpts(defaults, opts) {\n if (opts !== undefined && {}.toString.call(opts) !== '[object Object]')\n throw new Error('options must be object or undefined');\n const merged = Object.assign(defaults, opts);\n return merged;\n}\n/** Creates function with outputLen, blockLen, create properties from a class constructor. */\nexport function createHasher(hashCons, info = {}) {\n const hashC = (msg, opts) => hashCons(opts).update(msg).digest();\n const tmp = hashCons(undefined);\n hashC.outputLen = tmp.outputLen;\n hashC.blockLen = tmp.blockLen;\n hashC.create = (opts) => hashCons(opts);\n Object.assign(hashC, info);\n return Object.freeze(hashC);\n}\n/** Cryptographically secure PRNG. Uses internal OS-level `crypto.getRandomValues`. */\nexport function randomBytes(bytesLength = 32) {\n const cr = typeof globalThis === 'object' ? globalThis.crypto : null;\n if (typeof cr?.getRandomValues !== 'function')\n throw new Error('crypto.getRandomValues must be defined');\n return cr.getRandomValues(new Uint8Array(bytesLength));\n}\n/** Creates OID opts for NIST hashes, with prefix 06 09 60 86 48 01 65 03 04 02. */\nexport const oidNist = (suffix) => ({\n oid: Uint8Array.from([0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, suffix]),\n});\n//# sourceMappingURL=utils.js.map","/**\n * Internal Merkle-Damgard hash utils.\n * @module\n */\nimport { abytes, aexists, aoutput, clean, createView } from \"./utils.js\";\n/** Choice: a ? b : c */\nexport function Chi(a, b, c) {\n return (a & b) ^ (~a & c);\n}\n/** Majority function, true if any two inputs is true. */\nexport function Maj(a, b, c) {\n return (a & b) ^ (a & c) ^ (b & c);\n}\n/**\n * Merkle-Damgard hash construction base class.\n * Could be used to create MD5, RIPEMD, SHA1, SHA2.\n */\nexport class HashMD {\n blockLen;\n outputLen;\n padOffset;\n isLE;\n // For partial updates less than block size\n buffer;\n view;\n finished = false;\n length = 0;\n pos = 0;\n destroyed = false;\n constructor(blockLen, outputLen, padOffset, isLE) {\n this.blockLen = blockLen;\n this.outputLen = outputLen;\n this.padOffset = padOffset;\n this.isLE = isLE;\n this.buffer = new Uint8Array(blockLen);\n this.view = createView(this.buffer);\n }\n update(data) {\n aexists(this);\n abytes(data);\n const { view, buffer, blockLen } = this;\n const len = data.length;\n for (let pos = 0; pos < len;) {\n const take = Math.min(blockLen - this.pos, len - pos);\n // Fast path: we have at least one block in input, cast it to view and process\n if (take === blockLen) {\n const dataView = createView(data);\n for (; blockLen <= len - pos; pos += blockLen)\n this.process(dataView, pos);\n continue;\n }\n buffer.set(data.subarray(pos, pos + take), this.pos);\n this.pos += take;\n pos += take;\n if (this.pos === blockLen) {\n this.process(view, 0);\n this.pos = 0;\n }\n }\n this.length += data.length;\n this.roundClean();\n return this;\n }\n digestInto(out) {\n aexists(this);\n aoutput(out, this);\n this.finished = true;\n // Padding\n // We can avoid allocation of buffer for padding completely if it\n // was previously not allocated here. But it won't change performance.\n const { buffer, view, blockLen, isLE } = this;\n let { pos } = this;\n // append the bit '1' to the message\n buffer[pos++] = 0b10000000;\n clean(this.buffer.subarray(pos));\n // we have less than padOffset left in buffer, so we cannot put length in\n // current block, need process it and pad again\n if (this.padOffset > blockLen - pos) {\n this.process(view, 0);\n pos = 0;\n }\n // Pad until full block byte with zeros\n for (let i = pos; i < blockLen; i++)\n buffer[i] = 0;\n // Note: sha512 requires length to be 128bit integer, but length in JS will overflow before that\n // You need to write around 2 exabytes (u64_max / 8 / (1024**6)) for this to happen.\n // So we just write lowest 64 bits of that value.\n view.setBigUint64(blockLen - 8, BigInt(this.length * 8), isLE);\n this.process(view, 0);\n const oview = createView(out);\n const len = this.outputLen;\n // NOTE: we do division by 4 later, which must be fused in single op with modulo by JIT\n if (len % 4)\n throw new Error('_sha2: outputLen must be aligned to 32bit');\n const outLen = len / 4;\n const state = this.get();\n if (outLen > state.length)\n throw new Error('_sha2: outputLen bigger than state');\n for (let i = 0; i < outLen; i++)\n oview.setUint32(4 * i, state[i], isLE);\n }\n digest() {\n const { buffer, outputLen } = this;\n this.digestInto(buffer);\n const res = buffer.slice(0, outputLen);\n this.destroy();\n return res;\n }\n _cloneInto(to) {\n to ||= new this.constructor();\n to.set(...this.get());\n const { blockLen, buffer, length, finished, destroyed, pos } = this;\n to.destroyed = destroyed;\n to.finished = finished;\n to.length = length;\n to.pos = pos;\n if (length % blockLen)\n to.buffer.set(buffer);\n return to;\n }\n clone() {\n return this._cloneInto();\n }\n}\n/**\n * Initial SHA-2 state: fractional parts of square roots of first 16 primes 2..53.\n * Check out `test/misc/sha2-gen-iv.js` for recomputation guide.\n */\n/** Initial SHA256 state. Bits 0..32 of frac part of sqrt of primes 2..19 */\nexport const SHA256_IV = /* @__PURE__ */ Uint32Array.from([\n 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19,\n]);\n/** Initial SHA224 state. Bits 32..64 of frac part of sqrt of primes 23..53 */\nexport const SHA224_IV = /* @__PURE__ */ Uint32Array.from([\n 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939, 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4,\n]);\n/** Initial SHA384 state. Bits 0..64 of frac part of sqrt of primes 23..53 */\nexport const SHA384_IV = /* @__PURE__ */ Uint32Array.from([\n 0xcbbb9d5d, 0xc1059ed8, 0x629a292a, 0x367cd507, 0x9159015a, 0x3070dd17, 0x152fecd8, 0xf70e5939,\n 0x67332667, 0xffc00b31, 0x8eb44a87, 0x68581511, 0xdb0c2e0d, 0x64f98fa7, 0x47b5481d, 0xbefa4fa4,\n]);\n/** Initial SHA512 state. Bits 0..64 of frac part of sqrt of primes 2..19 */\nexport const SHA512_IV = /* @__PURE__ */ Uint32Array.from([\n 0x6a09e667, 0xf3bcc908, 0xbb67ae85, 0x84caa73b, 0x3c6ef372, 0xfe94f82b, 0xa54ff53a, 0x5f1d36f1,\n 0x510e527f, 0xade682d1, 0x9b05688c, 0x2b3e6c1f, 0x1f83d9ab, 0xfb41bd6b, 0x5be0cd19, 0x137e2179,\n]);\n//# sourceMappingURL=_md.js.map","/**\n * SHA2 hash function. A.k.a. sha256, sha384, sha512, sha512_224, sha512_256.\n * SHA256 is the fastest hash implementable in JS, even faster than Blake3.\n * Check out [RFC 4634](https://www.rfc-editor.org/rfc/rfc4634) and\n * [FIPS 180-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf).\n * @module\n */\nimport { Chi, HashMD, Maj, SHA224_IV, SHA256_IV, SHA384_IV, SHA512_IV } from \"./_md.js\";\nimport * as u64 from \"./_u64.js\";\nimport { clean, createHasher, oidNist, rotr } from \"./utils.js\";\n/**\n * Round constants:\n * First 32 bits of fractional parts of the cube roots of the first 64 primes 2..311)\n */\n// prettier-ignore\nconst SHA256_K = /* @__PURE__ */ Uint32Array.from([\n 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\n 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\n 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\n 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\n 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\n 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\n 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\n 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2\n]);\n/** Reusable temporary buffer. \"W\" comes straight from spec. */\nconst SHA256_W = /* @__PURE__ */ new Uint32Array(64);\n/** Internal 32-byte base SHA2 hash class. */\nclass SHA2_32B extends HashMD {\n constructor(outputLen) {\n super(64, outputLen, 8, false);\n }\n get() {\n const { A, B, C, D, E, F, G, H } = this;\n return [A, B, C, D, E, F, G, H];\n }\n // prettier-ignore\n set(A, B, C, D, E, F, G, H) {\n this.A = A | 0;\n this.B = B | 0;\n this.C = C | 0;\n this.D = D | 0;\n this.E = E | 0;\n this.F = F | 0;\n this.G = G | 0;\n this.H = H | 0;\n }\n process(view, offset) {\n // Extend the first 16 words into the remaining 48 words w[16..63] of the message schedule array\n for (let i = 0; i < 16; i++, offset += 4)\n SHA256_W[i] = view.getUint32(offset, false);\n for (let i = 16; i < 64; i++) {\n const W15 = SHA256_W[i - 15];\n const W2 = SHA256_W[i - 2];\n const s0 = rotr(W15, 7) ^ rotr(W15, 18) ^ (W15 >>> 3);\n const s1 = rotr(W2, 17) ^ rotr(W2, 19) ^ (W2 >>> 10);\n SHA256_W[i] = (s1 + SHA256_W[i - 7] + s0 + SHA256_W[i - 16]) | 0;\n }\n // Compression function main loop, 64 rounds\n let { A, B, C, D, E, F, G, H } = this;\n for (let i = 0; i < 64; i++) {\n const sigma1 = rotr(E, 6) ^ rotr(E, 11) ^ rotr(E, 25);\n const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;\n const sigma0 = rotr(A, 2) ^ rotr(A, 13) ^ rotr(A, 22);\n const T2 = (sigma0 + Maj(A, B, C)) | 0;\n H = G;\n G = F;\n F = E;\n E = (D + T1) | 0;\n D = C;\n C = B;\n B = A;\n A = (T1 + T2) | 0;\n }\n // Add the compressed chunk to the current hash value\n A = (A + this.A) | 0;\n B = (B + this.B) | 0;\n C = (C + this.C) | 0;\n D = (D + this.D) | 0;\n E = (E + this.E) | 0;\n F = (F + this.F) | 0;\n G = (G + this.G) | 0;\n H = (H + this.H) | 0;\n this.set(A, B, C, D, E, F, G, H);\n }\n roundClean() {\n clean(SHA256_W);\n }\n destroy() {\n this.set(0, 0, 0, 0, 0, 0, 0, 0);\n clean(this.buffer);\n }\n}\n/** Internal SHA2-256 hash class. */\nexport class _SHA256 extends SHA2_32B {\n // We cannot use array here since array allows indexing by variable\n // which means optimizer/compiler cannot use registers.\n A = SHA256_IV[0] | 0;\n B = SHA256_IV[1] | 0;\n C = SHA256_IV[2] | 0;\n D = SHA256_IV[3] | 0;\n E = SHA256_IV[4] | 0;\n F = SHA256_IV[5] | 0;\n G = SHA256_IV[6] | 0;\n H = SHA256_IV[7] | 0;\n constructor() {\n super(32);\n }\n}\n/** Internal SHA2-224 hash class. */\nexport class _SHA224 extends SHA2_32B {\n A = SHA224_IV[0] | 0;\n B = SHA224_IV[1] | 0;\n C = SHA224_IV[2] | 0;\n D = SHA224_IV[3] | 0;\n E = SHA224_IV[4] | 0;\n F = SHA224_IV[5] | 0;\n G = SHA224_IV[6] | 0;\n H = SHA224_IV[7] | 0;\n constructor() {\n super(28);\n }\n}\n// SHA2-512 is slower than sha256 in js because u64 operations are slow.\n// Round contants\n// First 32 bits of the fractional parts of the cube roots of the first 80 primes 2..409\n// prettier-ignore\nconst K512 = /* @__PURE__ */ (() => u64.split([\n '0x428a2f98d728ae22', '0x7137449123ef65cd', '0xb5c0fbcfec4d3b2f', '0xe9b5dba58189dbbc',\n '0x3956c25bf348b538', '0x59f111f1b605d019', '0x923f82a4af194f9b', '0xab1c5ed5da6d8118',\n '0xd807aa98a3030242', '0x12835b0145706fbe', '0x243185be4ee4b28c', '0x550c7dc3d5ffb4e2',\n '0x72be5d74f27b896f', '0x80deb1fe3b1696b1', '0x9bdc06a725c71235', '0xc19bf174cf692694',\n '0xe49b69c19ef14ad2', '0xefbe4786384f25e3', '0x0fc19dc68b8cd5b5', '0x240ca1cc77ac9c65',\n '0x2de92c6f592b0275', '0x4a7484aa6ea6e483', '0x5cb0a9dcbd41fbd4', '0x76f988da831153b5',\n '0x983e5152ee66dfab', '0xa831c66d2db43210', '0xb00327c898fb213f', '0xbf597fc7beef0ee4',\n '0xc6e00bf33da88fc2', '0xd5a79147930aa725', '0x06ca6351e003826f', '0x142929670a0e6e70',\n '0x27b70a8546d22ffc', '0x2e1b21385c26c926', '0x4d2c6dfc5ac42aed', '0x53380d139d95b3df',\n '0x650a73548baf63de', '0x766a0abb3c77b2a8', '0x81c2c92e47edaee6', '0x92722c851482353b',\n '0xa2bfe8a14cf10364', '0xa81a664bbc423001', '0xc24b8b70d0f89791', '0xc76c51a30654be30',\n '0xd192e819d6ef5218', '0xd69906245565a910', '0xf40e35855771202a', '0x106aa07032bbd1b8',\n '0x19a4c116b8d2d0c8', '0x1e376c085141ab53', '0x2748774cdf8eeb99', '0x34b0bcb5e19b48a8',\n '0x391c0cb3c5c95a63', '0x4ed8aa4ae3418acb', '0x5b9cca4f7763e373', '0x682e6ff3d6b2b8a3',\n '0x748f82ee5defb2fc', '0x78a5636f43172f60', '0x84c87814a1f0ab72', '0x8cc702081a6439ec',\n '0x90befffa23631e28', '0xa4506cebde82bde9', '0xbef9a3f7b2c67915', '0xc67178f2e372532b',\n '0xca273eceea26619c', '0xd186b8c721c0c207', '0xeada7dd6cde0eb1e', '0xf57d4f7fee6ed178',\n '0x06f067aa72176fba', '0x0a637dc5a2c898a6', '0x113f9804bef90dae', '0x1b710b35131c471b',\n '0x28db77f523047d84', '0x32caab7b40c72493', '0x3c9ebe0a15c9bebc', '0x431d67c49c100d4c',\n '0x4cc5d4becb3e42b6', '0x597f299cfc657e2a', '0x5fcb6fab3ad6faec', '0x6c44198c4a475817'\n].map(n => BigInt(n))))();\nconst SHA512_Kh = /* @__PURE__ */ (() => K512[0])();\nconst SHA512_Kl = /* @__PURE__ */ (() => K512[1])();\n// Reusable temporary buffers\nconst SHA512_W_H = /* @__PURE__ */ new Uint32Array(80);\nconst SHA512_W_L = /* @__PURE__ */ new Uint32Array(80);\n/** Internal 64-byte base SHA2 hash class. */\nclass SHA2_64B extends HashMD {\n constructor(outputLen) {\n super(128, outputLen, 16, false);\n }\n // prettier-ignore\n get() {\n const { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;\n return [Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl];\n }\n // prettier-ignore\n set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl) {\n this.Ah = Ah | 0;\n this.Al = Al | 0;\n this.Bh = Bh | 0;\n this.Bl = Bl | 0;\n this.Ch = Ch | 0;\n this.Cl = Cl | 0;\n this.Dh = Dh | 0;\n this.Dl = Dl | 0;\n this.Eh = Eh | 0;\n this.El = El | 0;\n this.Fh = Fh | 0;\n this.Fl = Fl | 0;\n this.Gh = Gh | 0;\n this.Gl = Gl | 0;\n this.Hh = Hh | 0;\n this.Hl = Hl | 0;\n }\n process(view, offset) {\n // Extend the first 16 words into the remaining 64 words w[16..79] of the message schedule array\n for (let i = 0; i < 16; i++, offset += 4) {\n SHA512_W_H[i] = view.getUint32(offset);\n SHA512_W_L[i] = view.getUint32((offset += 4));\n }\n for (let i = 16; i < 80; i++) {\n // s0 := (w[i-15] rightrotate 1) xor (w[i-15] rightrotate 8) xor (w[i-15] rightshift 7)\n const W15h = SHA512_W_H[i - 15] | 0;\n const W15l = SHA512_W_L[i - 15] | 0;\n const s0h = u64.rotrSH(W15h, W15l, 1) ^ u64.rotrSH(W15h, W15l, 8) ^ u64.shrSH(W15h, W15l, 7);\n const s0l = u64.rotrSL(W15h, W15l, 1) ^ u64.rotrSL(W15h, W15l, 8) ^ u64.shrSL(W15h, W15l, 7);\n // s1 := (w[i-2] rightrotate 19) xor (w[i-2] rightrotate 61) xor (w[i-2] rightshift 6)\n const W2h = SHA512_W_H[i - 2] | 0;\n const W2l = SHA512_W_L[i - 2] | 0;\n const s1h = u64.rotrSH(W2h, W2l, 19) ^ u64.rotrBH(W2h, W2l, 61) ^ u64.shrSH(W2h, W2l, 6);\n const s1l = u64.rotrSL(W2h, W2l, 19) ^ u64.rotrBL(W2h, W2l, 61) ^ u64.shrSL(W2h, W2l, 6);\n // SHA256_W[i] = s0 + s1 + SHA256_W[i - 7] + SHA256_W[i - 16];\n const SUMl = u64.add4L(s0l, s1l, SHA512_W_L[i - 7], SHA512_W_L[i - 16]);\n const SUMh = u64.add4H(SUMl, s0h, s1h, SHA512_W_H[i - 7], SHA512_W_H[i - 16]);\n SHA512_W_H[i] = SUMh | 0;\n SHA512_W_L[i] = SUMl | 0;\n }\n let { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;\n // Compression function main loop, 80 rounds\n for (let i = 0; i < 80; i++) {\n // S1 := (e rightrotate 14) xor (e rightrotate 18) xor (e rightrotate 41)\n const sigma1h = u64.rotrSH(Eh, El, 14) ^ u64.rotrSH(Eh, El, 18) ^ u64.rotrBH(Eh, El, 41);\n const sigma1l = u64.rotrSL(Eh, El, 14) ^ u64.rotrSL(Eh, El, 18) ^ u64.rotrBL(Eh, El, 41);\n //const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;\n const CHIh = (Eh & Fh) ^ (~Eh & Gh);\n const CHIl = (El & Fl) ^ (~El & Gl);\n // T1 = H + sigma1 + Chi(E, F, G) + SHA512_K[i] + SHA512_W[i]\n // prettier-ignore\n const T1ll = u64.add5L(Hl, sigma1l, CHIl, SHA512_Kl[i], SHA512_W_L[i]);\n const T1h = u64.add5H(T1ll, Hh, sigma1h, CHIh, SHA512_Kh[i], SHA512_W_H[i]);\n const T1l = T1ll | 0;\n // S0 := (a rightrotate 28) xor (a rightrotate 34) xor (a rightrotate 39)\n const sigma0h = u64.rotrSH(Ah, Al, 28) ^ u64.rotrBH(Ah, Al, 34) ^ u64.rotrBH(Ah, Al, 39);\n const sigma0l = u64.rotrSL(Ah, Al, 28) ^ u64.rotrBL(Ah, Al, 34) ^ u64.rotrBL(Ah, Al, 39);\n const MAJh = (Ah & Bh) ^ (Ah & Ch) ^ (Bh & Ch);\n const MAJl = (Al & Bl) ^ (Al & Cl) ^ (Bl & Cl);\n Hh = Gh | 0;\n Hl = Gl | 0;\n Gh = Fh | 0;\n Gl = Fl | 0;\n Fh = Eh | 0;\n Fl = El | 0;\n ({ h: Eh, l: El } = u64.add(Dh | 0, Dl | 0, T1h | 0, T1l | 0));\n Dh = Ch | 0;\n Dl = Cl | 0;\n Ch = Bh | 0;\n Cl = Bl | 0;\n Bh = Ah | 0;\n Bl = Al | 0;\n const All = u64.add3L(T1l, sigma0l, MAJl);\n Ah = u64.add3H(All, T1h, sigma0h, MAJh);\n Al = All | 0;\n }\n // Add the compressed chunk to the current hash value\n ({ h: Ah, l: Al } = u64.add(this.Ah | 0, this.Al | 0, Ah | 0, Al | 0));\n ({ h: Bh, l: Bl } = u64.add(this.Bh | 0, this.Bl | 0, Bh | 0, Bl | 0));\n ({ h: Ch, l: Cl } = u64.add(this.Ch | 0, this.Cl | 0, Ch | 0, Cl | 0));\n ({ h: Dh, l: Dl } = u64.add(this.Dh | 0, this.Dl | 0, Dh | 0, Dl | 0));\n ({ h: Eh, l: El } = u64.add(this.Eh | 0, this.El | 0, Eh | 0, El | 0));\n ({ h: Fh, l: Fl } = u64.add(this.Fh | 0, this.Fl | 0, Fh | 0, Fl | 0));\n ({ h: Gh, l: Gl } = u64.add(this.Gh | 0, this.Gl | 0, Gh | 0, Gl | 0));\n ({ h: Hh, l: Hl } = u64.add(this.Hh | 0, this.Hl | 0, Hh | 0, Hl | 0));\n this.set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl);\n }\n roundClean() {\n clean(SHA512_W_H, SHA512_W_L);\n }\n destroy() {\n clean(this.buffer);\n this.set(0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0);\n }\n}\n/** Internal SHA2-512 hash class. */\nexport class _SHA512 extends SHA2_64B {\n Ah = SHA512_IV[0] | 0;\n Al = SHA512_IV[1] | 0;\n Bh = SHA512_IV[2] | 0;\n Bl = SHA512_IV[3] | 0;\n Ch = SHA512_IV[4] | 0;\n Cl = SHA512_IV[5] | 0;\n Dh = SHA512_IV[6] | 0;\n Dl = SHA512_IV[7] | 0;\n Eh = SHA512_IV[8] | 0;\n El = SHA512_IV[9] | 0;\n Fh = SHA512_IV[10] | 0;\n Fl = SHA512_IV[11] | 0;\n Gh = SHA512_IV[12] | 0;\n Gl = SHA512_IV[13] | 0;\n Hh = SHA512_IV[14] | 0;\n Hl = SHA512_IV[15] | 0;\n constructor() {\n super(64);\n }\n}\n/** Internal SHA2-384 hash class. */\nexport class _SHA384 extends SHA2_64B {\n Ah = SHA384_IV[0] | 0;\n Al = SHA384_IV[1] | 0;\n Bh = SHA384_IV[2] | 0;\n Bl = SHA384_IV[3] | 0;\n Ch = SHA384_IV[4] | 0;\n Cl = SHA384_IV[5] | 0;\n Dh = SHA384_IV[6] | 0;\n Dl = SHA384_IV[7] | 0;\n Eh = SHA384_IV[8] | 0;\n El = SHA384_IV[9] | 0;\n Fh = SHA384_IV[10] | 0;\n Fl = SHA384_IV[11] | 0;\n Gh = SHA384_IV[12] | 0;\n Gl = SHA384_IV[13] | 0;\n Hh = SHA384_IV[14] | 0;\n Hl = SHA384_IV[15] | 0;\n constructor() {\n super(48);\n }\n}\n/**\n * Truncated SHA512/256 and SHA512/224.\n * SHA512_IV is XORed with 0xa5a5a5a5a5a5a5a5, then used as \"intermediary\" IV of SHA512/t.\n * Then t hashes string to produce result IV.\n * See `test/misc/sha2-gen-iv.js`.\n */\n/** SHA512/224 IV */\nconst T224_IV = /* @__PURE__ */ Uint32Array.from([\n 0x8c3d37c8, 0x19544da2, 0x73e19966, 0x89dcd4d6, 0x1dfab7ae, 0x32ff9c82, 0x679dd514, 0x582f9fcf,\n 0x0f6d2b69, 0x7bd44da8, 0x77e36f73, 0x04c48942, 0x3f9d85a8, 0x6a1d36c8, 0x1112e6ad, 0x91d692a1,\n]);\n/** SHA512/256 IV */\nconst T256_IV = /* @__PURE__ */ Uint32Array.from([\n 0x22312194, 0xfc2bf72c, 0x9f555fa3, 0xc84c64c2, 0x2393b86b, 0x6f53b151, 0x96387719, 0x5940eabd,\n 0x96283ee2, 0xa88effe3, 0xbe5e1e25, 0x53863992, 0x2b0199fc, 0x2c85b8aa, 0x0eb72ddc, 0x81c52ca2,\n]);\n/** Internal SHA2-512/224 hash class. */\nexport class _SHA512_224 extends SHA2_64B {\n Ah = T224_IV[0] | 0;\n Al = T224_IV[1] | 0;\n Bh = T224_IV[2] | 0;\n Bl = T224_IV[3] | 0;\n Ch = T224_IV[4] | 0;\n Cl = T224_IV[5] | 0;\n Dh = T224_IV[6] | 0;\n Dl = T224_IV[7] | 0;\n Eh = T224_IV[8] | 0;\n El = T224_IV[9] | 0;\n Fh = T224_IV[10] | 0;\n Fl = T224_IV[11] | 0;\n Gh = T224_IV[12] | 0;\n Gl = T224_IV[13] | 0;\n Hh = T224_IV[14] | 0;\n Hl = T224_IV[15] | 0;\n constructor() {\n super(28);\n }\n}\n/** Internal SHA2-512/256 hash class. */\nexport class _SHA512_256 extends SHA2_64B {\n Ah = T256_IV[0] | 0;\n Al = T256_IV[1] | 0;\n Bh = T256_IV[2] | 0;\n Bl = T256_IV[3] | 0;\n Ch = T256_IV[4] | 0;\n Cl = T256_IV[5] | 0;\n Dh = T256_IV[6] | 0;\n Dl = T256_IV[7] | 0;\n Eh = T256_IV[8] | 0;\n El = T256_IV[9] | 0;\n Fh = T256_IV[10] | 0;\n Fl = T256_IV[11] | 0;\n Gh = T256_IV[12] | 0;\n Gl = T256_IV[13] | 0;\n Hh = T256_IV[14] | 0;\n Hl = T256_IV[15] | 0;\n constructor() {\n super(32);\n }\n}\n/**\n * SHA2-256 hash function from RFC 4634. In JS it's the fastest: even faster than Blake3. Some info:\n *\n * - Trying 2^128 hashes would get 50% chance of collision, using birthday attack.\n * - BTC network is doing 2^70 hashes/sec (2^95 hashes/year) as per 2025.\n * - Each sha256 hash is executing 2^18 bit operations.\n * - Good 2024 ASICs can do 200Th/sec with 3500 watts of power, corresponding to 2^36 hashes/joule.\n */\nexport const sha256 = /* @__PURE__ */ createHasher(() => new _SHA256(), \n/* @__PURE__ */ oidNist(0x01));\n/** SHA2-224 hash function from RFC 4634 */\nexport const sha224 = /* @__PURE__ */ createHasher(() => new _SHA224(), \n/* @__PURE__ */ oidNist(0x04));\n/** SHA2-512 hash function from RFC 4634. */\nexport const sha512 = /* @__PURE__ */ createHasher(() => new _SHA512(), \n/* @__PURE__ */ oidNist(0x03));\n/** SHA2-384 hash function from RFC 4634. */\nexport const sha384 = /* @__PURE__ */ createHasher(() => new _SHA384(), \n/* @__PURE__ */ oidNist(0x02));\n/**\n * SHA2-512/256 \"truncated\" hash function, with improved resistance to length extension attacks.\n * See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).\n */\nexport const sha512_256 = /* @__PURE__ */ createHasher(() => new _SHA512_256(), \n/* @__PURE__ */ oidNist(0x06));\n/**\n * SHA2-512/224 \"truncated\" hash function, with improved resistance to length extension attacks.\n * See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).\n */\nexport const sha512_224 = /* @__PURE__ */ createHasher(() => new _SHA512_224(), \n/* @__PURE__ */ oidNist(0x05));\n//# sourceMappingURL=sha2.js.map","/**\n * Hex, bytes and number utilities.\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { abytes as abytes_, anumber, bytesToHex as bytesToHex_, concatBytes as concatBytes_, hexToBytes as hexToBytes_, } from '@noble/hashes/utils.js';\nexport { abytes, anumber, bytesToHex, concatBytes, hexToBytes, isBytes, randomBytes, } from '@noble/hashes/utils.js';\nconst _0n = /* @__PURE__ */ BigInt(0);\nconst _1n = /* @__PURE__ */ BigInt(1);\nexport function abool(value, title = '') {\n if (typeof value !== 'boolean') {\n const prefix = title && `\"${title}\" `;\n throw new Error(prefix + 'expected boolean, got type=' + typeof value);\n }\n return value;\n}\n// Used in weierstrass, der\nfunction abignumber(n) {\n if (typeof n === 'bigint') {\n if (!isPosBig(n))\n throw new Error('positive bigint expected, got ' + n);\n }\n else\n anumber(n);\n return n;\n}\nexport function asafenumber(value, title = '') {\n if (!Number.isSafeInteger(value)) {\n const prefix = title && `\"${title}\" `;\n throw new Error(prefix + 'expected safe integer, got type=' + typeof value);\n }\n}\nexport function numberToHexUnpadded(num) {\n const hex = abignumber(num).toString(16);\n return hex.length & 1 ? '0' + hex : hex;\n}\nexport function hexToNumber(hex) {\n if (typeof hex !== 'string')\n throw new Error('hex string expected, got ' + typeof hex);\n return hex === '' ? _0n : BigInt('0x' + hex); // Big Endian\n}\n// BE: Big Endian, LE: Little Endian\nexport function bytesToNumberBE(bytes) {\n return hexToNumber(bytesToHex_(bytes));\n}\nexport function bytesToNumberLE(bytes) {\n return hexToNumber(bytesToHex_(copyBytes(abytes_(bytes)).reverse()));\n}\nexport function numberToBytesBE(n, len) {\n anumber(len);\n n = abignumber(n);\n const res = hexToBytes_(n.toString(16).padStart(len * 2, '0'));\n if (res.length !== len)\n throw new Error('number too large');\n return res;\n}\nexport function numberToBytesLE(n, len) {\n return numberToBytesBE(n, len).reverse();\n}\n// Unpadded, rarely used\nexport function numberToVarBytesBE(n) {\n return hexToBytes_(numberToHexUnpadded(abignumber(n)));\n}\n// Compares 2 u8a-s in kinda constant time\nexport function equalBytes(a, b) {\n if (a.length !== b.length)\n return false;\n let diff = 0;\n for (let i = 0; i < a.length; i++)\n diff |= a[i] ^ b[i];\n return diff === 0;\n}\n/**\n * Copies Uint8Array. We can't use u8a.slice(), because u8a can be Buffer,\n * and Buffer#slice creates mutable copy. Never use Buffers!\n */\nexport function copyBytes(bytes) {\n return Uint8Array.from(bytes);\n}\n/**\n * Decodes 7-bit ASCII string to Uint8Array, throws on non-ascii symbols\n * Should be safe to use for things expected to be ASCII.\n * Returns exact same result as `TextEncoder` for ASCII or throws.\n */\nexport function asciiToBytes(ascii) {\n return Uint8Array.from(ascii, (c, i) => {\n const charCode = c.charCodeAt(0);\n if (c.length !== 1 || charCode > 127) {\n throw new Error(`string contains non-ASCII character \"${ascii[i]}\" with code ${charCode} at position ${i}`);\n }\n return charCode;\n });\n}\n// Is positive bigint\nconst isPosBig = (n) => typeof n === 'bigint' && _0n <= n;\nexport function inRange(n, min, max) {\n return isPosBig(n) && isPosBig(min) && isPosBig(max) && min <= n && n < max;\n}\n/**\n * Asserts min <= n < max. NOTE: It's < max and not <= max.\n * @example\n * aInRange('x', x, 1n, 256n); // would assume x is in (1n..255n)\n */\nexport function aInRange(title, n, min, max) {\n // Why min <= n < max and not a (min < n < max) OR b (min <= n <= max)?\n // consider P=256n, min=0n, max=P\n // - a for min=0 would require -1: `inRange('x', x, -1n, P)`\n // - b would commonly require subtraction: `inRange('x', x, 0n, P - 1n)`\n // - our way is the cleanest: `inRange('x', x, 0n, P)\n if (!inRange(n, min, max))\n throw new Error('expected valid ' + title + ': ' + min + ' <= n < ' + max + ', got ' + n);\n}\n// Bit operations\n/**\n * Calculates amount of bits in a bigint.\n * Same as `n.toString(2).length`\n * TODO: merge with nLength in modular\n */\nexport function bitLen(n) {\n let len;\n for (len = 0; n > _0n; n >>= _1n, len += 1)\n ;\n return len;\n}\n/**\n * Gets single bit at position.\n * NOTE: first bit position is 0 (same as arrays)\n * Same as `!!+Array.from(n.toString(2)).reverse()[pos]`\n */\nexport function bitGet(n, pos) {\n return (n >> BigInt(pos)) & _1n;\n}\n/**\n * Sets single bit at position.\n */\nexport function bitSet(n, pos, value) {\n return n | ((value ? _1n : _0n) << BigInt(pos));\n}\n/**\n * Calculate mask for N bits. Not using ** operator with bigints because of old engines.\n * Same as BigInt(`0b${Array(i).fill('1').join('')}`)\n */\nexport const bitMask = (n) => (_1n << BigInt(n)) - _1n;\n/**\n * Minimal HMAC-DRBG from NIST 800-90 for RFC6979 sigs.\n * @returns function that will call DRBG until 2nd arg returns something meaningful\n * @example\n * const drbg = createHmacDRBG<Key>(32, 32, hmac);\n * drbg(seed, bytesToKey); // bytesToKey must return Key or undefined\n */\nexport function createHmacDrbg(hashLen, qByteLen, hmacFn) {\n anumber(hashLen, 'hashLen');\n anumber(qByteLen, 'qByteLen');\n if (typeof hmacFn !== 'function')\n throw new Error('hmacFn must be a function');\n const u8n = (len) => new Uint8Array(len); // creates Uint8Array\n const NULL = Uint8Array.of();\n const byte0 = Uint8Array.of(0x00);\n const byte1 = Uint8Array.of(0x01);\n const _maxDrbgIters = 1000;\n // Step B, Step C: set hashLen to 8*ceil(hlen/8)\n let v = u8n(hashLen); // Minimal non-full-spec HMAC-DRBG from NIST 800-90 for RFC6979 sigs.\n let k = u8n(hashLen); // Steps B and C of RFC6979 3.2: set hashLen, in our case always same\n let i = 0; // Iterations counter, will throw when over 1000\n const reset = () => {\n v.fill(1);\n k.fill(0);\n i = 0;\n };\n const h = (...msgs) => hmacFn(k, concatBytes_(v, ...msgs)); // hmac(k)(v, ...values)\n const reseed = (seed = NULL) => {\n // HMAC-DRBG reseed() function. Steps D-G\n k = h(byte0, seed); // k = hmac(k || v || 0x00 || seed)\n v = h(); // v = hmac(k || v)\n if (seed.length === 0)\n return;\n k = h(byte1, seed); // k = hmac(k || v || 0x01 || seed)\n v = h(); // v = hmac(k || v)\n };\n const gen = () => {\n // HMAC-DRBG generate() function\n if (i++ >= _maxDrbgIters)\n throw new Error('drbg: tried max amount of iterations');\n let len = 0;\n const out = [];\n while (len < qByteLen) {\n v = h();\n const sl = v.slice();\n out.push(sl);\n len += v.length;\n }\n return concatBytes_(...out);\n };\n const genUntil = (seed, pred) => {\n reset();\n reseed(seed); // Steps D-G\n let res = undefined; // Step H: grind until k is in [1..n-1]\n while (!(res = pred(gen())))\n reseed();\n reset();\n return res;\n };\n return genUntil;\n}\nexport function validateObject(object, fields = {}, optFields = {}) {\n if (!object || typeof object !== 'object')\n throw new Error('expected valid options object');\n function checkField(fieldName, expectedType, isOpt) {\n const val = object[fieldName];\n if (isOpt && val === undefined)\n return;\n const current = typeof val;\n if (current !== expectedType || val === null)\n throw new Error(`param \"${fieldName}\" is invalid: expected ${expectedType}, got ${current}`);\n }\n const iter = (f, isOpt) => Object.entries(f).forEach(([k, v]) => checkField(k, v, isOpt));\n iter(fields, false);\n iter(optFields, true);\n}\n/**\n * throws not implemented error\n */\nexport const notImplemented = () => {\n throw new Error('not implemented');\n};\n/**\n * Memoizes (caches) computation result.\n * Uses WeakMap: the value is going auto-cleaned by GC after last reference is removed.\n */\nexport function memoized(fn) {\n const map = new WeakMap();\n return (arg, ...args) => {\n const val = map.get(arg);\n if (val !== undefined)\n return val;\n const computed = fn(arg, ...args);\n map.set(arg, computed);\n return computed;\n };\n}\n//# sourceMappingURL=utils.js.map","/**\n * Utils for modular division and fields.\n * Field over 11 is a finite (Galois) field is integer number operations `mod 11`.\n * There is no division: it is replaced by modular multiplicative inverse.\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { abytes, anumber, bytesToNumberBE, bytesToNumberLE, numberToBytesBE, numberToBytesLE, validateObject, } from \"../utils.js\";\n// Numbers aren't used in x25519 / x448 builds\n// prettier-ignore\nconst _0n = /* @__PURE__ */ BigInt(0), _1n = /* @__PURE__ */ BigInt(1), _2n = /* @__PURE__ */ BigInt(2);\n// prettier-ignore\nconst _3n = /* @__PURE__ */ BigInt(3), _4n = /* @__PURE__ */ BigInt(4), _5n = /* @__PURE__ */ BigInt(5);\n// prettier-ignore\nconst _7n = /* @__PURE__ */ BigInt(7), _8n = /* @__PURE__ */ BigInt(8), _9n = /* @__PURE__ */ BigInt(9);\nconst _16n = /* @__PURE__ */ BigInt(16);\n// Calculates a modulo b\nexport function mod(a, b) {\n const result = a % b;\n return result >= _0n ? result : b + result;\n}\n/**\n * Efficiently raise num to power and do modular division.\n * Unsafe in some contexts: uses ladder, so can expose bigint bits.\n * @example\n * pow(2n, 6n, 11n) // 64n % 11n == 9n\n */\nexport function pow(num, power, modulo) {\n return FpPow(Field(modulo), num, power);\n}\n/** Does `x^(2^power)` mod p. `pow2(30, 4)` == `30^(2^4)` */\nexport function pow2(x, power, modulo) {\n let res = x;\n while (power-- > _0n) {\n res *= res;\n res %= modulo;\n }\n return res;\n}\n/**\n * Inverses number over modulo.\n * Implemented using [Euclidean GCD](https://brilliant.org/wiki/extended-euclidean-algorithm/).\n */\nexport function invert(number, modulo) {\n if (number === _0n)\n throw new Error('invert: expected non-zero number');\n if (modulo <= _0n)\n throw new Error('invert: expected positive modulus, got ' + modulo);\n // Fermat's little theorem \"CT-like\" version inv(n) = n^(m-2) mod m is 30x slower.\n let a = mod(number, modulo);\n let b = modulo;\n // prettier-ignore\n let x = _0n, y = _1n, u = _1n, v = _0n;\n while (a !== _0n) {\n // JIT applies optimization if those two lines follow each other\n const q = b / a;\n const r = b % a;\n const m = x - u * q;\n const n = y - v * q;\n // prettier-ignore\n b = a, a = r, x = u, y = v, u = m, v = n;\n }\n const gcd = b;\n if (gcd !== _1n)\n throw new Error('invert: does not exist');\n return mod(x, modulo);\n}\nfunction assertIsSquare(Fp, root, n) {\n if (!Fp.eql(Fp.sqr(root), n))\n throw new Error('Cannot find square root');\n}\n// Not all roots are possible! Example which will throw:\n// const NUM =\n// n = 72057594037927816n;\n// Fp = Field(BigInt('0x1a0111ea397fe69a4b1ba7b6434bacd764774b84f38512bf6730d2a0f6b0f6241eabfffeb153ffffb9feffffffffaaab'));\nfunction sqrt3mod4(Fp, n) {\n const p1div4 = (Fp.ORDER + _1n) / _4n;\n const root = Fp.pow(n, p1div4);\n assertIsSquare(Fp, root, n);\n return root;\n}\nfunction sqrt5mod8(Fp, n) {\n const p5div8 = (Fp.ORDER - _5n) / _8n;\n const n2 = Fp.mul(n, _2n);\n const v = Fp.pow(n2, p5div8);\n const nv = Fp.mul(n, v);\n const i = Fp.mul(Fp.mul(nv, _2n), v);\n const root = Fp.mul(nv, Fp.sub(i, Fp.ONE));\n assertIsSquare(Fp, root, n);\n return root;\n}\n// Based on RFC9380, Kong algorithm\n// prettier-ignore\nfunction sqrt9mod16(P) {\n const Fp_ = Field(P);\n const tn = tonelliShanks(P);\n const c1 = tn(Fp_, Fp_.neg(Fp_.ONE)); // 1. c1 = sqrt(-1) in F, i.e., (c1^2) == -1 in F\n const c2 = tn(Fp_, c1); // 2. c2 = sqrt(c1) in F, i.e., (c2^2) == c1 in F\n const c3 = tn(Fp_, Fp_.neg(c1)); // 3. c3 = sqrt(-c1) in F, i.e., (c3^2) == -c1 in F\n const c4 = (P + _7n) / _16n; // 4. c4 = (q + 7) / 16 # Integer arithmetic\n return (Fp, n) => {\n let tv1 = Fp.pow(n, c4); // 1. tv1 = x^c4\n let tv2 = Fp.mul(tv1, c1); // 2. tv2 = c1 * tv1\n const tv3 = Fp.mul(tv1, c2); // 3. tv3 = c2 * tv1\n const tv4 = Fp.mul(tv1, c3); // 4. tv4 = c3 * tv1\n const e1 = Fp.eql(Fp.sqr(tv2), n); // 5. e1 = (tv2^2) == x\n const e2 = Fp.eql(Fp.sqr(tv3), n); // 6. e2 = (tv3^2) == x\n tv1 = Fp.cmov(tv1, tv2, e1); // 7. tv1 = CMOV(tv1, tv2, e1) # Select tv2 if (tv2^2) == x\n tv2 = Fp.cmov(tv4, tv3, e2); // 8. tv2 = CMOV(tv4, tv3, e2) # Select tv3 if (tv3^2) == x\n const e3 = Fp.eql(Fp.sqr(tv2), n); // 9. e3 = (tv2^2) == x\n const root = Fp.cmov(tv1, tv2, e3); // 10. z = CMOV(tv1, tv2, e3) # Select sqrt from tv1 & tv2\n assertIsSquare(Fp, root, n);\n return root;\n };\n}\n/**\n * Tonelli-Shanks square root search algorithm.\n * 1. https://eprint.iacr.org/2012/685.pdf (page 12)\n * 2. Square Roots from 1; 24, 51, 10 to Dan Shanks\n * @param P field order\n * @returns function that takes field Fp (created from P) and number n\n */\nexport function tonelliShanks(P) {\n // Initialization (precomputation).\n // Caching initialization could boost perf by 7%.\n if (P < _3n)\n throw new Error('sqrt is not defined for small field');\n // Factor P - 1 = Q * 2^S, where Q is odd\n let Q = P - _1n;\n let S = 0;\n while (Q % _2n === _0n) {\n Q /= _2n;\n S++;\n }\n // Find the first quadratic non-residue Z >= 2\n let Z = _2n;\n const _Fp = Field(P);\n while (FpLegendre(_Fp, Z) === 1) {\n // Basic primality test for P. After x iterations, chance of\n // not finding quadratic non-residue is 2^x, so 2^1000.\n if (Z++ > 1000)\n throw new Error('Cannot find square root: probably non-prime P');\n }\n // Fast-path; usually done before Z, but we do \"primality test\".\n if (S === 1)\n return sqrt3mod4;\n // Slow-path\n // TODO: test on Fp2 and others\n let cc = _Fp.pow(Z, Q); // c = z^Q\n const Q1div2 = (Q + _1n) / _2n;\n return function tonelliSlow(Fp, n) {\n if (Fp.is0(n))\n return n;\n // Check if n is a quadratic residue using Legendre symbol\n if (FpLegendre(Fp, n) !== 1)\n throw new Error('Cannot find square root');\n // Initialize variables for the main loop\n let M = S;\n let c = Fp.mul(Fp.ONE, cc); // c = z^Q, move cc from field _Fp into field Fp\n let t = Fp.pow(n, Q); // t = n^Q, first guess at the fudge factor\n let R = Fp.pow(n, Q1div2); // R = n^((Q+1)/2), first guess at the square root\n // Main loop\n // while t != 1\n while (!Fp.eql(t, Fp.ONE)) {\n if (Fp.is0(t))\n return Fp.ZERO; // if t=0 return R=0\n let i = 1;\n // Find the smallest i >= 1 such that t^(2^i) ≡ 1 (mod P)\n let t_tmp = Fp.sqr(t); // t^(2^1)\n while (!Fp.eql(t_tmp, Fp.ONE)) {\n i++;\n t_tmp = Fp.sqr(t_tmp); // t^(2^2)...\n if (i === M)\n throw new Error('Cannot find square root');\n }\n // Calculate the exponent for b: 2^(M - i - 1)\n const exponent = _1n << BigInt(M - i - 1); // bigint is important\n const b = Fp.pow(c, exponent); // b = 2^(M - i - 1)\n // Update variables\n M = i;\n c = Fp.sqr(b); // c = b^2\n t = Fp.mul(t, c); // t = (t * b^2)\n R = Fp.mul(R, b); // R = R*b\n }\n return R;\n };\n}\n/**\n * Square root for a finite field. Will try optimized versions first:\n *\n * 1. P ≡ 3 (mod 4)\n * 2. P ≡ 5 (mod 8)\n * 3. P ≡ 9 (mod 16)\n * 4. Tonelli-Shanks algorithm\n *\n * Different algorithms can give different roots, it is up to user to decide which one they want.\n * For example there is FpSqrtOdd/FpSqrtEven to choice root based on oddness (used for hash-to-curve).\n */\nexport function FpSqrt(P) {\n // P ≡ 3 (mod 4) => √n = n^((P+1)/4)\n if (P % _4n === _3n)\n return sqrt3mod4;\n // P ≡ 5 (mod 8) => Atkin algorithm, page 10 of https://eprint.iacr.org/2012/685.pdf\n if (P % _8n === _5n)\n return sqrt5mod8;\n // P ≡ 9 (mod 16) => Kong algorithm, page 11 of https://eprint.iacr.org/2012/685.pdf (algorithm 4)\n if (P % _16n === _9n)\n return sqrt9mod16(P);\n // Tonelli-Shanks algorithm\n return tonelliShanks(P);\n}\n// Little-endian check for first LE bit (last BE bit);\nexport const isNegativeLE = (num, modulo) => (mod(num, modulo) & _1n) === _1n;\n// prettier-ignore\nconst FIELD_FIELDS = [\n 'create', 'isValid', 'is0', 'neg', 'inv', 'sqrt', 'sqr',\n 'eql', 'add', 'sub', 'mul', 'pow', 'div',\n 'addN', 'subN', 'mulN', 'sqrN'\n];\nexport function validateField(field) {\n const initial = {\n ORDER: 'bigint',\n BYTES: 'number',\n BITS: 'number',\n };\n const opts = FIELD_FIELDS.reduce((map, val) => {\n map[val] = 'function';\n return map;\n }, initial);\n validateObject(field, opts);\n // const max = 16384;\n // if (field.BYTES < 1 || field.BYTES > max) throw new Error('invalid field');\n // if (field.BITS < 1 || field.BITS > 8 * max) throw new Error('invalid field');\n return field;\n}\n// Generic field functions\n/**\n * Same as `pow` but for Fp: non-constant-time.\n * Unsafe in some contexts: uses ladder, so can expose bigint bits.\n */\nexport function FpPow(Fp, num, power) {\n if (power < _0n)\n throw new Error('invalid exponent, negatives unsupported');\n if (power === _0n)\n return Fp.ONE;\n if (power === _1n)\n return num;\n let p = Fp.ONE;\n let d = num;\n while (power > _0n) {\n if (power & _1n)\n p = Fp.mul(p, d);\n d = Fp.sqr(d);\n power >>= _1n;\n }\n return p;\n}\n/**\n * Efficiently invert an array of Field elements.\n * Exception-free. Will return `undefined` for 0 elements.\n * @param passZero map 0 to 0 (instead of undefined)\n */\nexport function FpInvertBatch(Fp, nums, passZero = false) {\n const inverted = new Array(nums.length).fill(passZero ? Fp.ZERO : undefined);\n // Walk from first to last, multiply them by each other MOD p\n const multipliedAcc = nums.reduce((acc, num, i) => {\n if (Fp.is0(num))\n return acc;\n inverted[i] = acc;\n return Fp.mul(acc, num);\n }, Fp.ONE);\n // Invert last element\n const invertedAcc = Fp.inv(multipliedAcc);\n // Walk from last to first, multiply them by inverted each other MOD p\n nums.reduceRight((acc, num, i) => {\n if (Fp.is0(num))\n return acc;\n inverted[i] = Fp.mul(acc, inverted[i]);\n return Fp.mul(acc, num);\n }, invertedAcc);\n return inverted;\n}\n// TODO: remove\nexport function FpDiv(Fp, lhs, rhs) {\n return Fp.mul(lhs, typeof rhs === 'bigint' ? invert(rhs, Fp.ORDER) : Fp.inv(rhs));\n}\n/**\n * Legendre symbol.\n * Legendre constant is used to calculate Legendre symbol (a | p)\n * which denotes the value of a^((p-1)/2) (mod p).\n *\n * * (a | p) ≡ 1 if a is a square (mod p), quadratic residue\n * * (a | p) ≡ -1 if a is not a square (mod p), quadratic non residue\n * * (a | p) ≡ 0 if a ≡ 0 (mod p)\n */\nexport function FpLegendre(Fp, n) {\n // We can use 3rd argument as optional cache of this value\n // but seems unneeded for now. The operation is very fast.\n const p1mod2 = (Fp.ORDER - _1n) / _2n;\n const powered = Fp.pow(n, p1mod2);\n const yes = Fp.eql(powered, Fp.ONE);\n const zero = Fp.eql(powered, Fp.ZERO);\n const no = Fp.eql(powered, Fp.neg(Fp.ONE));\n if (!yes && !zero && !no)\n throw new Error('invalid Legendre symbol result');\n return yes ? 1 : zero ? 0 : -1;\n}\n// This function returns True whenever the value x is a square in the field F.\nexport function FpIsSquare(Fp, n) {\n const l = FpLegendre(Fp, n);\n return l === 1;\n}\n// CURVE.n lengths\nexport function nLength(n, nBitLength) {\n // Bit size, byte size of CURVE.n\n if (nBitLength !== undefined)\n anumber(nBitLength);\n const _nBitLength = nBitLength !== undefined ? nBitLength : n.toString(2).length;\n const nByteLength = Math.ceil(_nBitLength / 8);\n return { nBitLength: _nBitLength, nByteLength };\n}\nclass _Field {\n ORDER;\n BITS;\n BYTES;\n isLE;\n ZERO = _0n;\n ONE = _1n;\n _lengths;\n _sqrt; // cached sqrt\n _mod;\n constructor(ORDER, opts = {}) {\n if (ORDER <= _0n)\n throw new Error('invalid field: expected ORDER > 0, got ' + ORDER);\n let _nbitLength = undefined;\n this.isLE = false;\n if (opts != null && typeof opts === 'object') {\n if (typeof opts.BITS === 'number')\n _nbitLength = opts.BITS;\n if (typeof opts.sqrt === 'function')\n this.sqrt = opts.sqrt;\n if (typeof opts.isLE === 'boolean')\n this.isLE = opts.isLE;\n if (opts.allowedLengths)\n this._lengths = opts.allowedLengths?.slice();\n if (typeof opts.modFromBytes === 'boolean')\n this._mod = opts.modFromBytes;\n }\n const { nBitLength, nByteLength } = nLength(ORDER, _nbitLength);\n if (nByteLength > 2048)\n throw new Error('invalid field: expected ORDER of <= 2048 bytes');\n this.ORDER = ORDER;\n this.BITS = nBitLength;\n this.BYTES = nByteLength;\n this._sqrt = undefined;\n Object.preventExtensions(this);\n }\n create(num) {\n return mod(num, this.ORDER);\n }\n isValid(num) {\n if (typeof num !== 'bigint')\n throw new Error('invalid field element: expected bigint, got ' + typeof num);\n return _0n <= num && num < this.ORDER; // 0 is valid element, but it's not invertible\n }\n is0(num) {\n return num === _0n;\n }\n // is valid and invertible\n isValidNot0(num) {\n return !this.is0(num) && this.isValid(num);\n }\n isOdd(num) {\n return (num & _1n) === _1n;\n }\n neg(num) {\n return mod(-num, this.ORDER);\n }\n eql(lhs, rhs) {\n return lhs === rhs;\n }\n sqr(num) {\n return mod(num * num, this.ORDER);\n }\n add(lhs, rhs) {\n return mod(lhs + rhs, this.ORDER);\n }\n sub(lhs, rhs) {\n return mod(lhs - rhs, this.ORDER);\n }\n mul(lhs, rhs) {\n return mod(lhs * rhs, this.ORDER);\n }\n pow(num, power) {\n return FpPow(this, num, power);\n }\n div(lhs, rhs) {\n return mod(lhs * invert(rhs, this.ORDER), this.ORDER);\n }\n // Same as above, but doesn't normalize\n sqrN(num) {\n return num * num;\n }\n addN(lhs, rhs) {\n return lhs + rhs;\n }\n subN(lhs, rhs) {\n return lhs - rhs;\n }\n mulN(lhs, rhs) {\n return lhs * rhs;\n }\n inv(num) {\n return invert(num, this.ORDER);\n }\n sqrt(num) {\n // Caching _sqrt speeds up sqrt9mod16 by 5x and tonneli-shanks by 10%\n if (!this._sqrt)\n this._sqrt = FpSqrt(this.ORDER);\n return this._sqrt(this, num);\n }\n toBytes(num) {\n return this.isLE ? numberToBytesLE(num, this.BYTES) : numberToBytesBE(num, this.BYTES);\n }\n fromBytes(bytes, skipValidation = false) {\n abytes(bytes);\n const { _lengths: allowedLengths, BYTES, isLE, ORDER, _mod: modFromBytes } = this;\n if (allowedLengths) {\n if (!allowedLengths.includes(bytes.length) || bytes.length > BYTES) {\n throw new Error('Field.fromBytes: expected ' + allowedLengths + ' bytes, got ' + bytes.length);\n }\n const padded = new Uint8Array(BYTES);\n // isLE add 0 to right, !isLE to the left.\n padded.set(bytes, isLE ? 0 : padded.length - bytes.length);\n bytes = padded;\n }\n if (bytes.length !== BYTES)\n throw new Error('Field.fromBytes: expected ' + BYTES + ' bytes, got ' + bytes.length);\n let scalar = isLE ? bytesToNumberLE(bytes) : bytesToNumberBE(bytes);\n if (modFromBytes)\n scalar = mod(scalar, ORDER);\n if (!skipValidation)\n if (!this.isValid(scalar))\n throw new Error('invalid field element: outside of range 0..ORDER');\n // NOTE: we don't validate scalar here, please use isValid. This done such way because some\n // protocol may allow non-reduced scalar that reduced later or changed some other way.\n return scalar;\n }\n // TODO: we don't need it here, move out to separate fn\n invertBatch(lst) {\n return FpInvertBatch(this, lst);\n }\n // We can't move this out because Fp6, Fp12 implement it\n // and it's unclear what to return in there.\n cmov(a, b, condition) {\n return condition ? b : a;\n }\n}\n/**\n * Creates a finite field. Major performance optimizations:\n * * 1. Denormalized operations like mulN instead of mul.\n * * 2. Identical object shape: never add or remove keys.\n * * 3. `Object.freeze`.\n * Fragile: always run a benchmark on a change.\n * Security note: operations don't check 'isValid' for all elements for performance reasons,\n * it is caller responsibility to check this.\n * This is low-level code, please make sure you know what you're doing.\n *\n * Note about field properties:\n * * CHARACTERISTIC p = prime number, number of elements in main subgroup.\n * * ORDER q = similar to cofactor in curves, may be composite `q = p^m`.\n *\n * @param ORDER field order, probably prime, or could be composite\n * @param bitLen how many bits the field consumes\n * @param isLE (default: false) if encoding / decoding should be in little-endian\n * @param redef optional faster redefinitions of sqrt and other methods\n */\nexport function Field(ORDER, opts = {}) {\n return new _Field(ORDER, opts);\n}\n// Generic random scalar, we can do same for other fields if via Fp2.mul(Fp2.ONE, Fp2.random)?\n// This allows unsafe methods like ignore bias or zero. These unsafe, but often used in different protocols (if deterministic RNG).\n// which mean we cannot force this via opts.\n// Not sure what to do with randomBytes, we can accept it inside opts if wanted.\n// Probably need to export getMinHashLength somewhere?\n// random(bytes?: Uint8Array, unsafeAllowZero = false, unsafeAllowBias = false) {\n// const LEN = !unsafeAllowBias ? getMinHashLength(ORDER) : BYTES;\n// if (bytes === undefined) bytes = randomBytes(LEN); // _opts.randomBytes?\n// const num = isLE ? bytesToNumberLE(bytes) : bytesToNumberBE(bytes);\n// // `mod(x, 11)` can sometimes produce 0. `mod(x, 10) + 1` is the same, but no 0\n// const reduced = unsafeAllowZero ? mod(num, ORDER) : mod(num, ORDER - _1n) + _1n;\n// return reduced;\n// },\nexport function FpSqrtOdd(Fp, elm) {\n if (!Fp.isOdd)\n throw new Error(\"Field doesn't have isOdd\");\n const root = Fp.sqrt(elm);\n return Fp.isOdd(root) ? root : Fp.neg(root);\n}\nexport function FpSqrtEven(Fp, elm) {\n if (!Fp.isOdd)\n throw new Error(\"Field doesn't have isOdd\");\n const root = Fp.sqrt(elm);\n return Fp.isOdd(root) ? Fp.neg(root) : root;\n}\n/**\n * Returns total number of bytes consumed by the field element.\n * For example, 32 bytes for usual 256-bit weierstrass curve.\n * @param fieldOrder number of field elements, usually CURVE.n\n * @returns byte length of field\n */\nexport function getFieldBytesLength(fieldOrder) {\n if (typeof fieldOrder !== 'bigint')\n throw new Error('field order must be bigint');\n const bitLength = fieldOrder.toString(2).length;\n return Math.ceil(bitLength / 8);\n}\n/**\n * Returns minimal amount of bytes that can be safely reduced\n * by field order.\n * Should be 2^-128 for 128-bit curve such as P256.\n * @param fieldOrder number of field elements, usually CURVE.n\n * @returns byte length of target hash\n */\nexport function getMinHashLength(fieldOrder) {\n const length = getFieldBytesLength(fieldOrder);\n return length + Math.ceil(length / 2);\n}\n/**\n * \"Constant-time\" private key generation utility.\n * Can take (n + n/2) or more bytes of uniform input e.g. from CSPRNG or KDF\n * and convert them into private scalar, with the modulo bias being negligible.\n * Needs at least 48 bytes of input for 32-byte private key.\n * https://research.kudelskisecurity.com/2020/07/28/the-definitive-guide-to-modulo-bias-and-how-to-avoid-it/\n * FIPS 186-5, A.2 https://csrc.nist.gov/publications/detail/fips/186/5/final\n * RFC 9380, https://www.rfc-editor.org/rfc/rfc9380#section-5\n * @param hash hash output from SHA3 or a similar function\n * @param groupOrder size of subgroup - (e.g. secp256k1.Point.Fn.ORDER)\n * @param isLE interpret hash bytes as LE num\n * @returns valid private scalar\n */\nexport function mapHashToField(key, fieldOrder, isLE = false) {\n abytes(key);\n const len = key.length;\n const fieldLen = getFieldBytesLength(fieldOrder);\n const minLen = getMinHashLength(fieldOrder);\n // No small numbers: need to understand bias story. No huge numbers: easier to detect JS timings.\n if (len < 16 || len < minLen || len > 1024)\n throw new Error('expected ' + minLen + '-1024 bytes of input, got ' + len);\n const num = isLE ? bytesToNumberLE(key) : bytesToNumberBE(key);\n // `mod(x, 11)` can sometimes produce 0. `mod(x, 10) + 1` is the same, but no 0\n const reduced = mod(num, fieldOrder - _1n) + _1n;\n return isLE ? numberToBytesLE(reduced, fieldLen) : numberToBytesBE(reduced, fieldLen);\n}\n//# sourceMappingURL=modular.js.map","/**\n * Methods for elliptic curve multiplication by scalars.\n * Contains wNAF, pippenger.\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { bitLen, bitMask } from \"../utils.js\";\nimport { Field, FpInvertBatch, validateField } from \"./modular.js\";\nconst _0n = /* @__PURE__ */ BigInt(0);\nconst _1n = /* @__PURE__ */ BigInt(1);\nexport function negateCt(condition, item) {\n const neg = item.negate();\n return condition ? neg : item;\n}\n/**\n * Takes a bunch of Projective Points but executes only one\n * inversion on all of them. Inversion is very slow operation,\n * so this improves performance massively.\n * Optimization: converts a list of projective points to a list of identical points with Z=1.\n */\nexport function normalizeZ(c, points) {\n const invertedZs = FpInvertBatch(c.Fp, points.map((p) => p.Z));\n return points.map((p, i) => c.fromAffine(p.toAffine(invertedZs[i])));\n}\nfunction validateW(W, bits) {\n if (!Number.isSafeInteger(W) || W <= 0 || W > bits)\n throw new Error('invalid window size, expected [1..' + bits + '], got W=' + W);\n}\nfunction calcWOpts(W, scalarBits) {\n validateW(W, scalarBits);\n const windows = Math.ceil(scalarBits / W) + 1; // W=8 33. Not 32, because we skip zero\n const windowSize = 2 ** (W - 1); // W=8 128. Not 256, because we skip zero\n const maxNumber = 2 ** W; // W=8 256\n const mask = bitMask(W); // W=8 255 == mask 0b11111111\n const shiftBy = BigInt(W); // W=8 8\n return { windows, windowSize, mask, maxNumber, shiftBy };\n}\nfunction calcOffsets(n, window, wOpts) {\n const { windowSize, mask, maxNumber, shiftBy } = wOpts;\n let wbits = Number(n & mask); // extract W bits.\n let nextN = n >> shiftBy; // shift number by W bits.\n // What actually happens here:\n // const highestBit = Number(mask ^ (mask >> 1n));\n // let wbits2 = wbits - 1; // skip zero\n // if (wbits2 & highestBit) { wbits2 ^= Number(mask); // (~);\n // split if bits > max: +224 => 256-32\n if (wbits > windowSize) {\n // we skip zero, which means instead of `>= size-1`, we do `> size`\n wbits -= maxNumber; // -32, can be maxNumber - wbits, but then we need to set isNeg here.\n nextN += _1n; // +256 (carry)\n }\n const offsetStart = window * windowSize;\n const offset = offsetStart + Math.abs(wbits) - 1; // -1 because we skip zero\n const isZero = wbits === 0; // is current window slice a 0?\n const isNeg = wbits < 0; // is current window slice negative?\n const isNegF = window % 2 !== 0; // fake random statement for noise\n const offsetF = offsetStart; // fake offset for noise\n return { nextN, offset, isZero, isNeg, isNegF, offsetF };\n}\nfunction validateMSMPoints(points, c) {\n if (!Array.isArray(points))\n throw new Error('array expected');\n points.forEach((p, i) => {\n if (!(p instanceof c))\n throw new Error('invalid point at index ' + i);\n });\n}\nfunction validateMSMScalars(scalars, field) {\n if (!Array.isArray(scalars))\n throw new Error('array of scalars expected');\n scalars.forEach((s, i) => {\n if (!field.isValid(s))\n throw new Error('invalid scalar at index ' + i);\n });\n}\n// Since points in different groups cannot be equal (different object constructor),\n// we can have single place to store precomputes.\n// Allows to make points frozen / immutable.\nconst pointPrecomputes = new WeakMap();\nconst pointWindowSizes = new WeakMap();\nfunction getW(P) {\n // To disable precomputes:\n // return 1;\n return pointWindowSizes.get(P) || 1;\n}\nfunction assert0(n) {\n if (n !== _0n)\n throw new Error('invalid wNAF');\n}\n/**\n * Elliptic curve multiplication of Point by scalar. Fragile.\n * Table generation takes **30MB of ram and 10ms on high-end CPU**,\n * but may take much longer on slow devices. Actual generation will happen on\n * first call of `multiply()`. By default, `BASE` point is precomputed.\n *\n * Scalars should always be less than curve order: this should be checked inside of a curve itself.\n * Creates precomputation tables for fast multiplication:\n * - private scalar is split by fixed size windows of W bits\n * - every window point is collected from window's table & added to accumulator\n * - since windows are different, same point inside tables won't be accessed more than once per calc\n * - each multiplication is 'Math.ceil(CURVE_ORDER / 𝑊) + 1' point additions (fixed for any scalar)\n * - +1 window is neccessary for wNAF\n * - wNAF reduces table size: 2x less memory + 2x faster generation, but 10% slower multiplication\n *\n * @todo Research returning 2d JS array of windows, instead of a single window.\n * This would allow windows to be in different memory locations\n */\nexport class wNAF {\n BASE;\n ZERO;\n Fn;\n bits;\n // Parametrized with a given Point class (not individual point)\n constructor(Point, bits) {\n this.BASE = Point.BASE;\n this.ZERO = Point.ZERO;\n this.Fn = Point.Fn;\n this.bits = bits;\n }\n // non-const time multiplication ladder\n _unsafeLadder(elm, n, p = this.ZERO) {\n let d = elm;\n while (n > _0n) {\n if (n & _1n)\n p = p.add(d);\n d = d.double();\n n >>= _1n;\n }\n return p;\n }\n /**\n * Creates a wNAF precomputation window. Used for caching.\n * Default window size is set by `utils.precompute()` and is equal to 8.\n * Number of precomputed points depends on the curve size:\n * 2^(𝑊−1) * (Math.ceil(𝑛 / 𝑊) + 1), where:\n * - 𝑊 is the window size\n * - 𝑛 is the bitlength of the curve order.\n * For a 256-bit curve and window size 8, the number of precomputed points is 128 * 33 = 4224.\n * @param point Point instance\n * @param W window size\n * @returns precomputed point tables flattened to a single array\n */\n precomputeWindow(point, W) {\n const { windows, windowSize } = calcWOpts(W, this.bits);\n const points = [];\n let p = point;\n let base = p;\n for (let window = 0; window < windows; window++) {\n base = p;\n points.push(base);\n // i=1, bc we skip 0\n for (let i = 1; i < windowSize; i++) {\n base = base.add(p);\n points.push(base);\n }\n p = base.double();\n }\n return points;\n }\n /**\n * Implements ec multiplication using precomputed tables and w-ary non-adjacent form.\n * More compact implementation:\n * https://github.com/paulmillr/noble-secp256k1/blob/47cb1669b6e506ad66b35fe7d76132ae97465da2/index.ts#L502-L541\n * @returns real and fake (for const-time) points\n */\n wNAF(W, precomputes, n) {\n // Scalar should be smaller than field order\n if (!this.Fn.isValid(n))\n throw new Error('invalid scalar');\n // Accumulators\n let p = this.ZERO;\n let f = this.BASE;\n // This code was first written with assumption that 'f' and 'p' will never be infinity point:\n // since each addition is multiplied by 2 ** W, it cannot cancel each other. However,\n // there is negate now: it is possible that negated element from low value\n // would be the same as high element, which will create carry into next window.\n // It's not obvious how this can fail, but still worth investigating later.\n const wo = calcWOpts(W, this.bits);\n for (let window = 0; window < wo.windows; window++) {\n // (n === _0n) is handled and not early-exited. isEven and offsetF are used for noise\n const { nextN, offset, isZero, isNeg, isNegF, offsetF } = calcOffsets(n, window, wo);\n n = nextN;\n if (isZero) {\n // bits are 0: add garbage to fake point\n // Important part for const-time getPublicKey: add random \"noise\" point to f.\n f = f.add(negateCt(isNegF, precomputes[offsetF]));\n }\n else {\n // bits are 1: add to result point\n p = p.add(negateCt(isNeg, precomputes[offset]));\n }\n }\n assert0(n);\n // Return both real and fake points: JIT won't eliminate f.\n // At this point there is a way to F be infinity-point even if p is not,\n // which makes it less const-time: around 1 bigint multiply.\n return { p, f };\n }\n /**\n * Implements ec unsafe (non const-time) multiplication using precomputed tables and w-ary non-adjacent form.\n * @param acc accumulator point to add result of multiplication\n * @returns point\n */\n wNAFUnsafe(W, precomputes, n, acc = this.ZERO) {\n const wo = calcWOpts(W, this.bits);\n for (let window = 0; window < wo.windows; window++) {\n if (n === _0n)\n break; // Early-exit, skip 0 value\n const { nextN, offset, isZero, isNeg } = calcOffsets(n, window, wo);\n n = nextN;\n if (isZero) {\n // Window bits are 0: skip processing.\n // Move to next window.\n continue;\n }\n else {\n const item = precomputes[offset];\n acc = acc.add(isNeg ? item.negate() : item); // Re-using acc allows to save adds in MSM\n }\n }\n assert0(n);\n return acc;\n }\n getPrecomputes(W, point, transform) {\n // Calculate precomputes on a first run, reuse them after\n let comp = pointPrecomputes.get(point);\n if (!comp) {\n comp = this.precomputeWindow(point, W);\n if (W !== 1) {\n // Doing transform outside of if brings 15% perf hit\n if (typeof transform === 'function')\n comp = transform(comp);\n pointPrecomputes.set(point, comp);\n }\n }\n return comp;\n }\n cached(point, scalar, transform) {\n const W = getW(point);\n return this.wNAF(W, this.getPrecomputes(W, point, transform), scalar);\n }\n unsafe(point, scalar, transform, prev) {\n const W = getW(point);\n if (W === 1)\n return this._unsafeLadder(point, scalar, prev); // For W=1 ladder is ~x2 faster\n return this.wNAFUnsafe(W, this.getPrecomputes(W, point, transform), scalar, prev);\n }\n // We calculate precomputes for elliptic curve point multiplication\n // using windowed method. This specifies window size and\n // stores precomputed values. Usually only base point would be precomputed.\n createCache(P, W) {\n validateW(W, this.bits);\n pointWindowSizes.set(P, W);\n pointPrecomputes.delete(P);\n }\n hasCache(elm) {\n return getW(elm) !== 1;\n }\n}\n/**\n * Endomorphism-specific multiplication for Koblitz curves.\n * Cost: 128 dbl, 0-256 adds.\n */\nexport function mulEndoUnsafe(Point, point, k1, k2) {\n let acc = point;\n let p1 = Point.ZERO;\n let p2 = Point.ZERO;\n while (k1 > _0n || k2 > _0n) {\n if (k1 & _1n)\n p1 = p1.add(acc);\n if (k2 & _1n)\n p2 = p2.add(acc);\n acc = acc.double();\n k1 >>= _1n;\n k2 >>= _1n;\n }\n return { p1, p2 };\n}\n/**\n * Pippenger algorithm for multi-scalar multiplication (MSM, Pa + Qb + Rc + ...).\n * 30x faster vs naive addition on L=4096, 10x faster than precomputes.\n * For N=254bit, L=1, it does: 1024 ADD + 254 DBL. For L=5: 1536 ADD + 254 DBL.\n * Algorithmically constant-time (for same L), even when 1 point + scalar, or when scalar = 0.\n * @param c Curve Point constructor\n * @param fieldN field over CURVE.N - important that it's not over CURVE.P\n * @param points array of L curve points\n * @param scalars array of L scalars (aka secret keys / bigints)\n */\nexport function pippenger(c, points, scalars) {\n // If we split scalars by some window (let's say 8 bits), every chunk will only\n // take 256 buckets even if there are 4096 scalars, also re-uses double.\n // TODO:\n // - https://eprint.iacr.org/2024/750.pdf\n // - https://tches.iacr.org/index.php/TCHES/article/view/10287\n // 0 is accepted in scalars\n const fieldN = c.Fn;\n validateMSMPoints(points, c);\n validateMSMScalars(scalars, fieldN);\n const plength = points.length;\n const slength = scalars.length;\n if (plength !== slength)\n throw new Error('arrays of points and scalars must have equal length');\n // if (plength === 0) throw new Error('array must be of length >= 2');\n const zero = c.ZERO;\n const wbits = bitLen(BigInt(plength));\n let windowSize = 1; // bits\n if (wbits > 12)\n windowSize = wbits - 3;\n else if (wbits > 4)\n windowSize = wbits - 2;\n else if (wbits > 0)\n windowSize = 2;\n const MASK = bitMask(windowSize);\n const buckets = new Array(Number(MASK) + 1).fill(zero); // +1 for zero array\n const lastBits = Math.floor((fieldN.BITS - 1) / windowSize) * windowSize;\n let sum = zero;\n for (let i = lastBits; i >= 0; i -= windowSize) {\n buckets.fill(zero);\n for (let j = 0; j < slength; j++) {\n const scalar = scalars[j];\n const wbits = Number((scalar >> BigInt(i)) & MASK);\n buckets[wbits] = buckets[wbits].add(points[j]);\n }\n let resI = zero; // not using this will do small speed-up, but will lose ct\n // Skip first bucket, because it is zero\n for (let j = buckets.length - 1, sumI = zero; j > 0; j--) {\n sumI = sumI.add(buckets[j]);\n resI = resI.add(sumI);\n }\n sum = sum.add(resI);\n if (i !== 0)\n for (let j = 0; j < windowSize; j++)\n sum = sum.double();\n }\n return sum;\n}\n/**\n * Precomputed multi-scalar multiplication (MSM, Pa + Qb + Rc + ...).\n * @param c Curve Point constructor\n * @param fieldN field over CURVE.N - important that it's not over CURVE.P\n * @param points array of L curve points\n * @returns function which multiplies points with scaars\n */\nexport function precomputeMSMUnsafe(c, points, windowSize) {\n /**\n * Performance Analysis of Window-based Precomputation\n *\n * Base Case (256-bit scalar, 8-bit window):\n * - Standard precomputation requires:\n * - 31 additions per scalar × 256 scalars = 7,936 ops\n * - Plus 255 summary additions = 8,191 total ops\n * Note: Summary additions can be optimized via accumulator\n *\n * Chunked Precomputation Analysis:\n * - Using 32 chunks requires:\n * - 255 additions per chunk\n * - 256 doublings\n * - Total: (255 × 32) + 256 = 8,416 ops\n *\n * Memory Usage Comparison:\n * Window Size | Standard Points | Chunked Points\n * ------------|-----------------|---------------\n * 4-bit | 520 | 15\n * 8-bit | 4,224 | 255\n * 10-bit | 13,824 | 1,023\n * 16-bit | 557,056 | 65,535\n *\n * Key Advantages:\n * 1. Enables larger window sizes due to reduced memory overhead\n * 2. More efficient for smaller scalar counts:\n * - 16 chunks: (16 × 255) + 256 = 4,336 ops\n * - ~2x faster than standard 8,191 ops\n *\n * Limitations:\n * - Not suitable for plain precomputes (requires 256 constant doublings)\n * - Performance degrades with larger scalar counts:\n * - Optimal for ~256 scalars\n * - Less efficient for 4096+ scalars (Pippenger preferred)\n */\n const fieldN = c.Fn;\n validateW(windowSize, fieldN.BITS);\n validateMSMPoints(points, c);\n const zero = c.ZERO;\n const tableSize = 2 ** windowSize - 1; // table size (without zero)\n const chunks = Math.ceil(fieldN.BITS / windowSize); // chunks of item\n const MASK = bitMask(windowSize);\n const tables = points.map((p) => {\n const res = [];\n for (let i = 0, acc = p; i < tableSize; i++) {\n res.push(acc);\n acc = acc.add(p);\n }\n return res;\n });\n return (scalars) => {\n validateMSMScalars(scalars, fieldN);\n if (scalars.length > points.length)\n throw new Error('array of scalars must be smaller than array of points');\n let res = zero;\n for (let i = 0; i < chunks; i++) {\n // No need to double if accumulator is still zero.\n if (res !== zero)\n for (let j = 0; j < windowSize; j++)\n res = res.double();\n const shiftBy = BigInt(chunks * windowSize - (i + 1) * windowSize);\n for (let j = 0; j < scalars.length; j++) {\n const n = scalars[j];\n const curr = Number((n >> shiftBy) & MASK);\n if (!curr)\n continue; // skip zero scalars chunks\n res = res.add(tables[j][curr - 1]);\n }\n }\n return res;\n };\n}\nfunction createField(order, field, isLE) {\n if (field) {\n if (field.ORDER !== order)\n throw new Error('Field.ORDER must match order: Fp == p, Fn == n');\n validateField(field);\n return field;\n }\n else {\n return Field(order, { isLE });\n }\n}\n/** Validates CURVE opts and creates fields */\nexport function createCurveFields(type, CURVE, curveOpts = {}, FpFnLE) {\n if (FpFnLE === undefined)\n FpFnLE = type === 'edwards';\n if (!CURVE || typeof CURVE !== 'object')\n throw new Error(`expected valid ${type} CURVE object`);\n for (const p of ['p', 'n', 'h']) {\n const val = CURVE[p];\n if (!(typeof val === 'bigint' && val > _0n))\n throw new Error(`CURVE.${p} must be positive bigint`);\n }\n const Fp = createField(CURVE.p, curveOpts.Fp, FpFnLE);\n const Fn = createField(CURVE.n, curveOpts.Fn, FpFnLE);\n const _b = type === 'weierstrass' ? 'b' : 'd';\n const params = ['Gx', 'Gy', 'a', _b];\n for (const p of params) {\n // @ts-ignore\n if (!Fp.isValid(CURVE[p]))\n throw new Error(`CURVE.${p} must be valid field element of CURVE.Fp`);\n }\n CURVE = Object.freeze(Object.assign({}, CURVE));\n return { CURVE, Fp, Fn };\n}\nexport function createKeygen(randomSecretKey, getPublicKey) {\n return function keygen(seed) {\n const secretKey = randomSecretKey(seed);\n return { secretKey, publicKey: getPublicKey(secretKey) };\n };\n}\n//# sourceMappingURL=curve.js.map","/**\n * HMAC: RFC2104 message authentication code.\n * @module\n */\nimport { abytes, aexists, ahash, clean } from \"./utils.js\";\n/** Internal class for HMAC. */\nexport class _HMAC {\n oHash;\n iHash;\n blockLen;\n outputLen;\n finished = false;\n destroyed = false;\n constructor(hash, key) {\n ahash(hash);\n abytes(key, undefined, 'key');\n this.iHash = hash.create();\n if (typeof this.iHash.update !== 'function')\n throw new Error('Expected instance of class which extends utils.Hash');\n this.blockLen = this.iHash.blockLen;\n this.outputLen = this.iHash.outputLen;\n const blockLen = this.blockLen;\n const pad = new Uint8Array(blockLen);\n // blockLen can be bigger than outputLen\n pad.set(key.length > blockLen ? hash.create().update(key).digest() : key);\n for (let i = 0; i < pad.length; i++)\n pad[i] ^= 0x36;\n this.iHash.update(pad);\n // By doing update (processing of first block) of outer hash here we can re-use it between multiple calls via clone\n this.oHash = hash.create();\n // Undo internal XOR && apply outer XOR\n for (let i = 0; i < pad.length; i++)\n pad[i] ^= 0x36 ^ 0x5c;\n this.oHash.update(pad);\n clean(pad);\n }\n update(buf) {\n aexists(this);\n this.iHash.update(buf);\n return this;\n }\n digestInto(out) {\n aexists(this);\n abytes(out, this.outputLen, 'output');\n this.finished = true;\n this.iHash.digestInto(out);\n this.oHash.update(out);\n this.oHash.digestInto(out);\n this.destroy();\n }\n digest() {\n const out = new Uint8Array(this.oHash.outputLen);\n this.digestInto(out);\n return out;\n }\n _cloneInto(to) {\n // Create new instance without calling constructor since key already in state and we don't know it.\n to ||= Object.create(Object.getPrototypeOf(this), {});\n const { oHash, iHash, finished, destroyed, blockLen, outputLen } = this;\n to = to;\n to.finished = finished;\n to.destroyed = destroyed;\n to.blockLen = blockLen;\n to.outputLen = outputLen;\n to.oHash = oHash._cloneInto(to.oHash);\n to.iHash = iHash._cloneInto(to.iHash);\n return to;\n }\n clone() {\n return this._cloneInto();\n }\n destroy() {\n this.destroyed = true;\n this.oHash.destroy();\n this.iHash.destroy();\n }\n}\n/**\n * HMAC: RFC2104 message authentication code.\n * @param hash - function that would be used e.g. sha256\n * @param key - message key\n * @param message - message data\n * @example\n * import { hmac } from '@noble/hashes/hmac';\n * import { sha256 } from '@noble/hashes/sha2';\n * const mac1 = hmac(sha256, 'key', 'message');\n */\nexport const hmac = (hash, key, message) => new _HMAC(hash, key).update(message).digest();\nhmac.create = (hash, key) => new _HMAC(hash, key);\n//# sourceMappingURL=hmac.js.map","/**\n * Short Weierstrass curve methods. The formula is: y² = x³ + ax + b.\n *\n * ### Design rationale for types\n *\n * * Interaction between classes from different curves should fail:\n * `k256.Point.BASE.add(p256.Point.BASE)`\n * * For this purpose we want to use `instanceof` operator, which is fast and works during runtime\n * * Different calls of `curve()` would return different classes -\n * `curve(params) !== curve(params)`: if somebody decided to monkey-patch their curve,\n * it won't affect others\n *\n * TypeScript can't infer types for classes created inside a function. Classes is one instance\n * of nominative types in TypeScript and interfaces only check for shape, so it's hard to create\n * unique type for every function call.\n *\n * We can use generic types via some param, like curve opts, but that would:\n * 1. Enable interaction between `curve(params)` and `curve(params)` (curves of same params)\n * which is hard to debug.\n * 2. Params can be generic and we can't enforce them to be constant value:\n * if somebody creates curve from non-constant params,\n * it would be allowed to interact with other curves with non-constant params\n *\n * @todo https://www.typescriptlang.org/docs/handbook/release-notes/typescript-2-7.html#unique-symbol\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { hmac as nobleHmac } from '@noble/hashes/hmac.js';\nimport { ahash } from '@noble/hashes/utils.js';\nimport { abool, abytes, aInRange, bitLen, bitMask, bytesToHex, bytesToNumberBE, concatBytes, createHmacDrbg, hexToBytes, isBytes, memoized, numberToHexUnpadded, validateObject, randomBytes as wcRandomBytes, } from \"../utils.js\";\nimport { createCurveFields, createKeygen, mulEndoUnsafe, negateCt, normalizeZ, wNAF, } from \"./curve.js\";\nimport { FpInvertBatch, getMinHashLength, mapHashToField, validateField, } from \"./modular.js\";\n// We construct basis in such way that den is always positive and equals n, but num sign depends on basis (not on secret value)\nconst divNearest = (num, den) => (num + (num >= 0 ? den : -den) / _2n) / den;\n/**\n * Splits scalar for GLV endomorphism.\n */\nexport function _splitEndoScalar(k, basis, n) {\n // Split scalar into two such that part is ~half bits: `abs(part) < sqrt(N)`\n // Since part can be negative, we need to do this on point.\n // TODO: verifyScalar function which consumes lambda\n const [[a1, b1], [a2, b2]] = basis;\n const c1 = divNearest(b2 * k, n);\n const c2 = divNearest(-b1 * k, n);\n // |k1|/|k2| is < sqrt(N), but can be negative.\n // If we do `k1 mod N`, we'll get big scalar (`> sqrt(N)`): so, we do cheaper negation instead.\n let k1 = k - c1 * a1 - c2 * a2;\n let k2 = -c1 * b1 - c2 * b2;\n const k1neg = k1 < _0n;\n const k2neg = k2 < _0n;\n if (k1neg)\n k1 = -k1;\n if (k2neg)\n k2 = -k2;\n // Double check that resulting scalar less than half bits of N: otherwise wNAF will fail.\n // This should only happen on wrong basises. Also, math inside is too complex and I don't trust it.\n const MAX_NUM = bitMask(Math.ceil(bitLen(n) / 2)) + _1n; // Half bits of N\n if (k1 < _0n || k1 >= MAX_NUM || k2 < _0n || k2 >= MAX_NUM) {\n throw new Error('splitScalar (endomorphism): failed, k=' + k);\n }\n return { k1neg, k1, k2neg, k2 };\n}\nfunction validateSigFormat(format) {\n if (!['compact', 'recovered', 'der'].includes(format))\n throw new Error('Signature format must be \"compact\", \"recovered\", or \"der\"');\n return format;\n}\nfunction validateSigOpts(opts, def) {\n const optsn = {};\n for (let optName of Object.keys(def)) {\n // @ts-ignore\n optsn[optName] = opts[optName] === undefined ? def[optName] : opts[optName];\n }\n abool(optsn.lowS, 'lowS');\n abool(optsn.prehash, 'prehash');\n if (optsn.format !== undefined)\n validateSigFormat(optsn.format);\n return optsn;\n}\nexport class DERErr extends Error {\n constructor(m = '') {\n super(m);\n }\n}\n/**\n * ASN.1 DER encoding utilities. ASN is very complex & fragile. Format:\n *\n * [0x30 (SEQUENCE), bytelength, 0x02 (INTEGER), intLength, R, 0x02 (INTEGER), intLength, S]\n *\n * Docs: https://letsencrypt.org/docs/a-warm-welcome-to-asn1-and-der/, https://luca.ntop.org/Teaching/Appunti/asn1.html\n */\nexport const DER = {\n // asn.1 DER encoding utils\n Err: DERErr,\n // Basic building block is TLV (Tag-Length-Value)\n _tlv: {\n encode: (tag, data) => {\n const { Err: E } = DER;\n if (tag < 0 || tag > 256)\n throw new E('tlv.encode: wrong tag');\n if (data.length & 1)\n throw new E('tlv.encode: unpadded data');\n const dataLen = data.length / 2;\n const len = numberToHexUnpadded(dataLen);\n if ((len.length / 2) & 0b1000_0000)\n throw new E('tlv.encode: long form length too big');\n // length of length with long form flag\n const lenLen = dataLen > 127 ? numberToHexUnpadded((len.length / 2) | 0b1000_0000) : '';\n const t = numberToHexUnpadded(tag);\n return t + lenLen + len + data;\n },\n // v - value, l - left bytes (unparsed)\n decode(tag, data) {\n const { Err: E } = DER;\n let pos = 0;\n if (tag < 0 || tag > 256)\n throw new E('tlv.encode: wrong tag');\n if (data.length < 2 || data[pos++] !== tag)\n throw new E('tlv.decode: wrong tlv');\n const first = data[pos++];\n const isLong = !!(first & 0b1000_0000); // First bit of first length byte is flag for short/long form\n let length = 0;\n if (!isLong)\n length = first;\n else {\n // Long form: [longFlag(1bit), lengthLength(7bit), length (BE)]\n const lenLen = first & 0b0111_1111;\n if (!lenLen)\n throw new E('tlv.decode(long): indefinite length not supported');\n if (lenLen > 4)\n throw new E('tlv.decode(long): byte length is too big'); // this will overflow u32 in js\n const lengthBytes = data.subarray(pos, pos + lenLen);\n if (lengthBytes.length !== lenLen)\n throw new E('tlv.decode: length bytes not complete');\n if (lengthBytes[0] === 0)\n throw new E('tlv.decode(long): zero leftmost byte');\n for (const b of lengthBytes)\n length = (length << 8) | b;\n pos += lenLen;\n if (length < 128)\n throw new E('tlv.decode(long): not minimal encoding');\n }\n const v = data.subarray(pos, pos + length);\n if (v.length !== length)\n throw new E('tlv.decode: wrong value length');\n return { v, l: data.subarray(pos + length) };\n },\n },\n // https://crypto.stackexchange.com/a/57734 Leftmost bit of first byte is 'negative' flag,\n // since we always use positive integers here. It must always be empty:\n // - add zero byte if exists\n // - if next byte doesn't have a flag, leading zero is not allowed (minimal encoding)\n _int: {\n encode(num) {\n const { Err: E } = DER;\n if (num < _0n)\n throw new E('integer: negative integers are not allowed');\n let hex = numberToHexUnpadded(num);\n // Pad with zero byte if negative flag is present\n if (Number.parseInt(hex[0], 16) & 0b1000)\n hex = '00' + hex;\n if (hex.length & 1)\n throw new E('unexpected DER parsing assertion: unpadded hex');\n return hex;\n },\n decode(data) {\n const { Err: E } = DER;\n if (data[0] & 0b1000_0000)\n throw new E('invalid signature integer: negative');\n if (data[0] === 0x00 && !(data[1] & 0b1000_0000))\n throw new E('invalid signature integer: unnecessary leading zero');\n return bytesToNumberBE(data);\n },\n },\n toSig(bytes) {\n // parse DER signature\n const { Err: E, _int: int, _tlv: tlv } = DER;\n const data = abytes(bytes, undefined, 'signature');\n const { v: seqBytes, l: seqLeftBytes } = tlv.decode(0x30, data);\n if (seqLeftBytes.length)\n throw new E('invalid signature: left bytes after parsing');\n const { v: rBytes, l: rLeftBytes } = tlv.decode(0x02, seqBytes);\n const { v: sBytes, l: sLeftBytes } = tlv.decode(0x02, rLeftBytes);\n if (sLeftBytes.length)\n throw new E('invalid signature: left bytes after parsing');\n return { r: int.decode(rBytes), s: int.decode(sBytes) };\n },\n hexFromSig(sig) {\n const { _tlv: tlv, _int: int } = DER;\n const rs = tlv.encode(0x02, int.encode(sig.r));\n const ss = tlv.encode(0x02, int.encode(sig.s));\n const seq = rs + ss;\n return tlv.encode(0x30, seq);\n },\n};\n// Be friendly to bad ECMAScript parsers by not using bigint literals\n// prettier-ignore\nconst _0n = BigInt(0), _1n = BigInt(1), _2n = BigInt(2), _3n = BigInt(3), _4n = BigInt(4);\n/**\n * Creates weierstrass Point constructor, based on specified curve options.\n *\n * See {@link WeierstrassOpts}.\n *\n * @example\n```js\nconst opts = {\n p: 0xfffffffffffffffffffffffffffffffeffffac73n,\n n: 0x100000000000000000001b8fa16dfab9aca16b6b3n,\n h: 1n,\n a: 0n,\n b: 7n,\n Gx: 0x3b4c382ce37aa192a4019e763036f4f5dd4d7ebbn,\n Gy: 0x938cf935318fdced6bc28286531733c3f03c4feen,\n};\nconst secp160k1_Point = weierstrass(opts);\n```\n */\nexport function weierstrass(params, extraOpts = {}) {\n const validated = createCurveFields('weierstrass', params, extraOpts);\n const { Fp, Fn } = validated;\n let CURVE = validated.CURVE;\n const { h: cofactor, n: CURVE_ORDER } = CURVE;\n validateObject(extraOpts, {}, {\n allowInfinityPoint: 'boolean',\n clearCofactor: 'function',\n isTorsionFree: 'function',\n fromBytes: 'function',\n toBytes: 'function',\n endo: 'object',\n });\n const { endo } = extraOpts;\n if (endo) {\n // validateObject(endo, { beta: 'bigint', splitScalar: 'function' });\n if (!Fp.is0(CURVE.a) || typeof endo.beta !== 'bigint' || !Array.isArray(endo.basises)) {\n throw new Error('invalid endo: expected \"beta\": bigint and \"basises\": array');\n }\n }\n const lengths = getWLengths(Fp, Fn);\n function assertCompressionIsSupported() {\n if (!Fp.isOdd)\n throw new Error('compression is not supported: Field does not have .isOdd()');\n }\n // Implements IEEE P1363 point encoding\n function pointToBytes(_c, point, isCompressed) {\n const { x, y } = point.toAffine();\n const bx = Fp.toBytes(x);\n abool(isCompressed, 'isCompressed');\n if (isCompressed) {\n assertCompressionIsSupported();\n const hasEvenY = !Fp.isOdd(y);\n return concatBytes(pprefix(hasEvenY), bx);\n }\n else {\n return concatBytes(Uint8Array.of(0x04), bx, Fp.toBytes(y));\n }\n }\n function pointFromBytes(bytes) {\n abytes(bytes, undefined, 'Point');\n const { publicKey: comp, publicKeyUncompressed: uncomp } = lengths; // e.g. for 32-byte: 33, 65\n const length = bytes.length;\n const head = bytes[0];\n const tail = bytes.subarray(1);\n // No actual validation is done here: use .assertValidity()\n if (length === comp && (head === 0x02 || head === 0x03)) {\n const x = Fp.fromBytes(tail);\n if (!Fp.isValid(x))\n throw new Error('bad point: is not on curve, wrong x');\n const y2 = weierstrassEquation(x); // y² = x³ + ax + b\n let y;\n try {\n y = Fp.sqrt(y2); // y = y² ^ (p+1)/4\n }\n catch (sqrtError) {\n const err = sqrtError instanceof Error ? ': ' + sqrtError.message : '';\n throw new Error('bad point: is not on curve, sqrt error' + err);\n }\n assertCompressionIsSupported();\n const evenY = Fp.isOdd(y);\n const evenH = (head & 1) === 1; // ECDSA-specific\n if (evenH !== evenY)\n y = Fp.neg(y);\n return { x, y };\n }\n else if (length === uncomp && head === 0x04) {\n // TODO: more checks\n const L = Fp.BYTES;\n const x = Fp.fromBytes(tail.subarray(0, L));\n const y = Fp.fromBytes(tail.subarray(L, L * 2));\n if (!isValidXY(x, y))\n throw new Error('bad point: is not on curve');\n return { x, y };\n }\n else {\n throw new Error(`bad point: got length ${length}, expected compressed=${comp} or uncompressed=${uncomp}`);\n }\n }\n const encodePoint = extraOpts.toBytes || pointToBytes;\n const decodePoint = extraOpts.fromBytes || pointFromBytes;\n function weierstrassEquation(x) {\n const x2 = Fp.sqr(x); // x * x\n const x3 = Fp.mul(x2, x); // x² * x\n return Fp.add(Fp.add(x3, Fp.mul(x, CURVE.a)), CURVE.b); // x³ + a * x + b\n }\n // TODO: move top-level\n /** Checks whether equation holds for given x, y: y² == x³ + ax + b */\n function isValidXY(x, y) {\n const left = Fp.sqr(y); // y²\n const right = weierstrassEquation(x); // x³ + ax + b\n return Fp.eql(left, right);\n }\n // Validate whether the passed curve params are valid.\n // Test 1: equation y² = x³ + ax + b should work for generator point.\n if (!isValidXY(CURVE.Gx, CURVE.Gy))\n throw new Error('bad curve params: generator point');\n // Test 2: discriminant Δ part should be non-zero: 4a³ + 27b² != 0.\n // Guarantees curve is genus-1, smooth (non-singular).\n const _4a3 = Fp.mul(Fp.pow(CURVE.a, _3n), _4n);\n const _27b2 = Fp.mul(Fp.sqr(CURVE.b), BigInt(27));\n if (Fp.is0(Fp.add(_4a3, _27b2)))\n throw new Error('bad curve params: a or b');\n /** Asserts coordinate is valid: 0 <= n < Fp.ORDER. */\n function acoord(title, n, banZero = false) {\n if (!Fp.isValid(n) || (banZero && Fp.is0(n)))\n throw new Error(`bad point coordinate ${title}`);\n return n;\n }\n function aprjpoint(other) {\n if (!(other instanceof Point))\n throw new Error('Weierstrass Point expected');\n }\n function splitEndoScalarN(k) {\n if (!endo || !endo.basises)\n throw new Error('no endo');\n return _splitEndoScalar(k, endo.basises, Fn.ORDER);\n }\n // Memoized toAffine / validity check. They are heavy. Points are immutable.\n // Converts Projective point to affine (x, y) coordinates.\n // Can accept precomputed Z^-1 - for example, from invertBatch.\n // (X, Y, Z) ∋ (x=X/Z, y=Y/Z)\n const toAffineMemo = memoized((p, iz) => {\n const { X, Y, Z } = p;\n // Fast-path for normalized points\n if (Fp.eql(Z, Fp.ONE))\n return { x: X, y: Y };\n const is0 = p.is0();\n // If invZ was 0, we return zero point. However we still want to execute\n // all operations, so we replace invZ with a random number, 1.\n if (iz == null)\n iz = is0 ? Fp.ONE : Fp.inv(Z);\n const x = Fp.mul(X, iz);\n const y = Fp.mul(Y, iz);\n const zz = Fp.mul(Z, iz);\n if (is0)\n return { x: Fp.ZERO, y: Fp.ZERO };\n if (!Fp.eql(zz, Fp.ONE))\n throw new Error('invZ was invalid');\n return { x, y };\n });\n // NOTE: on exception this will crash 'cached' and no value will be set.\n // Otherwise true will be return\n const assertValidMemo = memoized((p) => {\n if (p.is0()) {\n // (0, 1, 0) aka ZERO is invalid in most contexts.\n // In BLS, ZERO can be serialized, so we allow it.\n // (0, 0, 0) is invalid representation of ZERO.\n if (extraOpts.allowInfinityPoint && !Fp.is0(p.Y))\n return;\n throw new Error('bad point: ZERO');\n }\n // Some 3rd-party test vectors require different wording between here & `fromCompressedHex`\n const { x, y } = p.toAffine();\n if (!Fp.isValid(x) || !Fp.isValid(y))\n throw new Error('bad point: x or y not field elements');\n if (!isValidXY(x, y))\n throw new Error('bad point: equation left != right');\n if (!p.isTorsionFree())\n throw new Error('bad point: not in prime-order subgroup');\n return true;\n });\n function finishEndo(endoBeta, k1p, k2p, k1neg, k2neg) {\n k2p = new Point(Fp.mul(k2p.X, endoBeta), k2p.Y, k2p.Z);\n k1p = negateCt(k1neg, k1p);\n k2p = negateCt(k2neg, k2p);\n return k1p.add(k2p);\n }\n /**\n * Projective Point works in 3d / projective (homogeneous) coordinates:(X, Y, Z) ∋ (x=X/Z, y=Y/Z).\n * Default Point works in 2d / affine coordinates: (x, y).\n * We're doing calculations in projective, because its operations don't require costly inversion.\n */\n class Point {\n // base / generator point\n static BASE = new Point(CURVE.Gx, CURVE.Gy, Fp.ONE);\n // zero / infinity / identity point\n static ZERO = new Point(Fp.ZERO, Fp.ONE, Fp.ZERO); // 0, 1, 0\n // math field\n static Fp = Fp;\n // scalar field\n static Fn = Fn;\n X;\n Y;\n Z;\n /** Does NOT validate if the point is valid. Use `.assertValidity()`. */\n constructor(X, Y, Z) {\n this.X = acoord('x', X);\n this.Y = acoord('y', Y, true);\n this.Z = acoord('z', Z);\n Object.freeze(this);\n }\n static CURVE() {\n return CURVE;\n }\n /** Does NOT validate if the point is valid. Use `.assertValidity()`. */\n static fromAffine(p) {\n const { x, y } = p || {};\n if (!p || !Fp.isValid(x) || !Fp.isValid(y))\n throw new Error('invalid affine point');\n if (p instanceof Point)\n throw new Error('projective point not allowed');\n // (0, 0) would've produced (0, 0, 1) - instead, we need (0, 1, 0)\n if (Fp.is0(x) && Fp.is0(y))\n return Point.ZERO;\n return new Point(x, y, Fp.ONE);\n }\n static fromBytes(bytes) {\n const P = Point.fromAffine(decodePoint(abytes(bytes, undefined, 'point')));\n P.assertValidity();\n return P;\n }\n static fromHex(hex) {\n return Point.fromBytes(hexToBytes(hex));\n }\n get x() {\n return this.toAffine().x;\n }\n get y() {\n return this.toAffine().y;\n }\n /**\n *\n * @param windowSize\n * @param isLazy true will defer table computation until the first multiplication\n * @returns\n */\n precompute(windowSize = 8, isLazy = true) {\n wnaf.createCache(this, windowSize);\n if (!isLazy)\n this.multiply(_3n); // random number\n return this;\n }\n // TODO: return `this`\n /** A point on curve is valid if it conforms to equation. */\n assertValidity() {\n assertValidMemo(this);\n }\n hasEvenY() {\n const { y } = this.toAffine();\n if (!Fp.isOdd)\n throw new Error(\"Field doesn't support isOdd\");\n return !Fp.isOdd(y);\n }\n /** Compare one point to another. */\n equals(other) {\n aprjpoint(other);\n const { X: X1, Y: Y1, Z: Z1 } = this;\n const { X: X2, Y: Y2, Z: Z2 } = other;\n const U1 = Fp.eql(Fp.mul(X1, Z2), Fp.mul(X2, Z1));\n const U2 = Fp.eql(Fp.mul(Y1, Z2), Fp.mul(Y2, Z1));\n return U1 && U2;\n }\n /** Flips point to one corresponding to (x, -y) in Affine coordinates. */\n negate() {\n return new Point(this.X, Fp.neg(this.Y), this.Z);\n }\n // Renes-Costello-Batina exception-free doubling formula.\n // There is 30% faster Jacobian formula, but it is not complete.\n // https://eprint.iacr.org/2015/1060, algorithm 3\n // Cost: 8M + 3S + 3*a + 2*b3 + 15add.\n double() {\n const { a, b } = CURVE;\n const b3 = Fp.mul(b, _3n);\n const { X: X1, Y: Y1, Z: Z1 } = this;\n let X3 = Fp.ZERO, Y3 = Fp.ZERO, Z3 = Fp.ZERO; // prettier-ignore\n let t0 = Fp.mul(X1, X1); // step 1\n let t1 = Fp.mul(Y1, Y1);\n let t2 = Fp.mul(Z1, Z1);\n let t3 = Fp.mul(X1, Y1);\n t3 = Fp.add(t3, t3); // step 5\n Z3 = Fp.mul(X1, Z1);\n Z3 = Fp.add(Z3, Z3);\n X3 = Fp.mul(a, Z3);\n Y3 = Fp.mul(b3, t2);\n Y3 = Fp.add(X3, Y3); // step 10\n X3 = Fp.sub(t1, Y3);\n Y3 = Fp.add(t1, Y3);\n Y3 = Fp.mul(X3, Y3);\n X3 = Fp.mul(t3, X3);\n Z3 = Fp.mul(b3, Z3); // step 15\n t2 = Fp.mul(a, t2);\n t3 = Fp.sub(t0, t2);\n t3 = Fp.mul(a, t3);\n t3 = Fp.add(t3, Z3);\n Z3 = Fp.add(t0, t0); // step 20\n t0 = Fp.add(Z3, t0);\n t0 = Fp.add(t0, t2);\n t0 = Fp.mul(t0, t3);\n Y3 = Fp.add(Y3, t0);\n t2 = Fp.mul(Y1, Z1); // step 25\n t2 = Fp.add(t2, t2);\n t0 = Fp.mul(t2, t3);\n X3 = Fp.sub(X3, t0);\n Z3 = Fp.mul(t2, t1);\n Z3 = Fp.add(Z3, Z3); // step 30\n Z3 = Fp.add(Z3, Z3);\n return new Point(X3, Y3, Z3);\n }\n // Renes-Costello-Batina exception-free addition formula.\n // There is 30% faster Jacobian formula, but it is not complete.\n // https://eprint.iacr.org/2015/1060, algorithm 1\n // Cost: 12M + 0S + 3*a + 3*b3 + 23add.\n add(other) {\n aprjpoint(other);\n const { X: X1, Y: Y1, Z: Z1 } = this;\n const { X: X2, Y: Y2, Z: Z2 } = other;\n let X3 = Fp.ZERO, Y3 = Fp.ZERO, Z3 = Fp.ZERO; // prettier-ignore\n const a = CURVE.a;\n const b3 = Fp.mul(CURVE.b, _3n);\n let t0 = Fp.mul(X1, X2); // step 1\n let t1 = Fp.mul(Y1, Y2);\n let t2 = Fp.mul(Z1, Z2);\n let t3 = Fp.add(X1, Y1);\n let t4 = Fp.add(X2, Y2); // step 5\n t3 = Fp.mul(t3, t4);\n t4 = Fp.add(t0, t1);\n t3 = Fp.sub(t3, t4);\n t4 = Fp.add(X1, Z1);\n let t5 = Fp.add(X2, Z2); // step 10\n t4 = Fp.mul(t4, t5);\n t5 = Fp.add(t0, t2);\n t4 = Fp.sub(t4, t5);\n t5 = Fp.add(Y1, Z1);\n X3 = Fp.add(Y2, Z2); // step 15\n t5 = Fp.mul(t5, X3);\n X3 = Fp.add(t1, t2);\n t5 = Fp.sub(t5, X3);\n Z3 = Fp.mul(a, t4);\n X3 = Fp.mul(b3, t2); // step 20\n Z3 = Fp.add(X3, Z3);\n X3 = Fp.sub(t1, Z3);\n Z3 = Fp.add(t1, Z3);\n Y3 = Fp.mul(X3, Z3);\n t1 = Fp.add(t0, t0); // step 25\n t1 = Fp.add(t1, t0);\n t2 = Fp.mul(a, t2);\n t4 = Fp.mul(b3, t4);\n t1 = Fp.add(t1, t2);\n t2 = Fp.sub(t0, t2); // step 30\n t2 = Fp.mul(a, t2);\n t4 = Fp.add(t4, t2);\n t0 = Fp.mul(t1, t4);\n Y3 = Fp.add(Y3, t0);\n t0 = Fp.mul(t5, t4); // step 35\n X3 = Fp.mul(t3, X3);\n X3 = Fp.sub(X3, t0);\n t0 = Fp.mul(t3, t1);\n Z3 = Fp.mul(t5, Z3);\n Z3 = Fp.add(Z3, t0); // step 40\n return new Point(X3, Y3, Z3);\n }\n subtract(other) {\n return this.add(other.negate());\n }\n is0() {\n return this.equals(Point.ZERO);\n }\n /**\n * Constant time multiplication.\n * Uses wNAF method. Windowed method may be 10% faster,\n * but takes 2x longer to generate and consumes 2x memory.\n * Uses precomputes when available.\n * Uses endomorphism for Koblitz curves.\n * @param scalar by which the point would be multiplied\n * @returns New point\n */\n multiply(scalar) {\n const { endo } = extraOpts;\n if (!Fn.isValidNot0(scalar))\n throw new Error('invalid scalar: out of range'); // 0 is invalid\n let point, fake; // Fake point is used to const-time mult\n const mul = (n) => wnaf.cached(this, n, (p) => normalizeZ(Point, p));\n /** See docs for {@link EndomorphismOpts} */\n if (endo) {\n const { k1neg, k1, k2neg, k2 } = splitEndoScalarN(scalar);\n const { p: k1p, f: k1f } = mul(k1);\n const { p: k2p, f: k2f } = mul(k2);\n fake = k1f.add(k2f);\n point = finishEndo(endo.beta, k1p, k2p, k1neg, k2neg);\n }\n else {\n const { p, f } = mul(scalar);\n point = p;\n fake = f;\n }\n // Normalize `z` for both points, but return only real one\n return normalizeZ(Point, [point, fake])[0];\n }\n /**\n * Non-constant-time multiplication. Uses double-and-add algorithm.\n * It's faster, but should only be used when you don't care about\n * an exposed secret key e.g. sig verification, which works over *public* keys.\n */\n multiplyUnsafe(sc) {\n const { endo } = extraOpts;\n const p = this;\n if (!Fn.isValid(sc))\n throw new Error('invalid scalar: out of range'); // 0 is valid\n if (sc === _0n || p.is0())\n return Point.ZERO; // 0\n if (sc === _1n)\n return p; // 1\n if (wnaf.hasCache(this))\n return this.multiply(sc); // precomputes\n // We don't have method for double scalar multiplication (aP + bQ):\n // Even with using Strauss-Shamir trick, it's 35% slower than naïve mul+add.\n if (endo) {\n const { k1neg, k1, k2neg, k2 } = splitEndoScalarN(sc);\n const { p1, p2 } = mulEndoUnsafe(Point, p, k1, k2); // 30% faster vs wnaf.unsafe\n return finishEndo(endo.beta, p1, p2, k1neg, k2neg);\n }\n else {\n return wnaf.unsafe(p, sc);\n }\n }\n /**\n * Converts Projective point to affine (x, y) coordinates.\n * @param invertedZ Z^-1 (inverted zero) - optional, precomputation is useful for invertBatch\n */\n toAffine(invertedZ) {\n return toAffineMemo(this, invertedZ);\n }\n /**\n * Checks whether Point is free of torsion elements (is in prime subgroup).\n * Always torsion-free for cofactor=1 curves.\n */\n isTorsionFree() {\n const { isTorsionFree } = extraOpts;\n if (cofactor === _1n)\n return true;\n if (isTorsionFree)\n return isTorsionFree(Point, this);\n return wnaf.unsafe(this, CURVE_ORDER).is0();\n }\n clearCofactor() {\n const { clearCofactor } = extraOpts;\n if (cofactor === _1n)\n return this; // Fast-path\n if (clearCofactor)\n return clearCofactor(Point, this);\n return this.multiplyUnsafe(cofactor);\n }\n isSmallOrder() {\n // can we use this.clearCofactor()?\n return this.multiplyUnsafe(cofactor).is0();\n }\n toBytes(isCompressed = true) {\n abool(isCompressed, 'isCompressed');\n this.assertValidity();\n return encodePoint(Point, this, isCompressed);\n }\n toHex(isCompressed = true) {\n return bytesToHex(this.toBytes(isCompressed));\n }\n toString() {\n return `<Point ${this.is0() ? 'ZERO' : this.toHex()}>`;\n }\n }\n const bits = Fn.BITS;\n const wnaf = new wNAF(Point, extraOpts.endo ? Math.ceil(bits / 2) : bits);\n Point.BASE.precompute(8); // Enable precomputes. Slows down first publicKey computation by 20ms.\n return Point;\n}\n// Points start with byte 0x02 when y is even; otherwise 0x03\nfunction pprefix(hasEvenY) {\n return Uint8Array.of(hasEvenY ? 0x02 : 0x03);\n}\n/**\n * Implementation of the Shallue and van de Woestijne method for any weierstrass curve.\n * TODO: check if there is a way to merge this with uvRatio in Edwards; move to modular.\n * b = True and y = sqrt(u / v) if (u / v) is square in F, and\n * b = False and y = sqrt(Z * (u / v)) otherwise.\n * @param Fp\n * @param Z\n * @returns\n */\nexport function SWUFpSqrtRatio(Fp, Z) {\n // Generic implementation\n const q = Fp.ORDER;\n let l = _0n;\n for (let o = q - _1n; o % _2n === _0n; o /= _2n)\n l += _1n;\n const c1 = l; // 1. c1, the largest integer such that 2^c1 divides q - 1.\n // We need 2n ** c1 and 2n ** (c1-1). We can't use **; but we can use <<.\n // 2n ** c1 == 2n << (c1-1)\n const _2n_pow_c1_1 = _2n << (c1 - _1n - _1n);\n const _2n_pow_c1 = _2n_pow_c1_1 * _2n;\n const c2 = (q - _1n) / _2n_pow_c1; // 2. c2 = (q - 1) / (2^c1) # Integer arithmetic\n const c3 = (c2 - _1n) / _2n; // 3. c3 = (c2 - 1) / 2 # Integer arithmetic\n const c4 = _2n_pow_c1 - _1n; // 4. c4 = 2^c1 - 1 # Integer arithmetic\n const c5 = _2n_pow_c1_1; // 5. c5 = 2^(c1 - 1) # Integer arithmetic\n const c6 = Fp.pow(Z, c2); // 6. c6 = Z^c2\n const c7 = Fp.pow(Z, (c2 + _1n) / _2n); // 7. c7 = Z^((c2 + 1) / 2)\n let sqrtRatio = (u, v) => {\n let tv1 = c6; // 1. tv1 = c6\n let tv2 = Fp.pow(v, c4); // 2. tv2 = v^c4\n let tv3 = Fp.sqr(tv2); // 3. tv3 = tv2^2\n tv3 = Fp.mul(tv3, v); // 4. tv3 = tv3 * v\n let tv5 = Fp.mul(u, tv3); // 5. tv5 = u * tv3\n tv5 = Fp.pow(tv5, c3); // 6. tv5 = tv5^c3\n tv5 = Fp.mul(tv5, tv2); // 7. tv5 = tv5 * tv2\n tv2 = Fp.mul(tv5, v); // 8. tv2 = tv5 * v\n tv3 = Fp.mul(tv5, u); // 9. tv3 = tv5 * u\n let tv4 = Fp.mul(tv3, tv2); // 10. tv4 = tv3 * tv2\n tv5 = Fp.pow(tv4, c5); // 11. tv5 = tv4^c5\n let isQR = Fp.eql(tv5, Fp.ONE); // 12. isQR = tv5 == 1\n tv2 = Fp.mul(tv3, c7); // 13. tv2 = tv3 * c7\n tv5 = Fp.mul(tv4, tv1); // 14. tv5 = tv4 * tv1\n tv3 = Fp.cmov(tv2, tv3, isQR); // 15. tv3 = CMOV(tv2, tv3, isQR)\n tv4 = Fp.cmov(tv5, tv4, isQR); // 16. tv4 = CMOV(tv5, tv4, isQR)\n // 17. for i in (c1, c1 - 1, ..., 2):\n for (let i = c1; i > _1n; i--) {\n let tv5 = i - _2n; // 18. tv5 = i - 2\n tv5 = _2n << (tv5 - _1n); // 19. tv5 = 2^tv5\n let tvv5 = Fp.pow(tv4, tv5); // 20. tv5 = tv4^tv5\n const e1 = Fp.eql(tvv5, Fp.ONE); // 21. e1 = tv5 == 1\n tv2 = Fp.mul(tv3, tv1); // 22. tv2 = tv3 * tv1\n tv1 = Fp.mul(tv1, tv1); // 23. tv1 = tv1 * tv1\n tvv5 = Fp.mul(tv4, tv1); // 24. tv5 = tv4 * tv1\n tv3 = Fp.cmov(tv2, tv3, e1); // 25. tv3 = CMOV(tv2, tv3, e1)\n tv4 = Fp.cmov(tvv5, tv4, e1); // 26. tv4 = CMOV(tv5, tv4, e1)\n }\n return { isValid: isQR, value: tv3 };\n };\n if (Fp.ORDER % _4n === _3n) {\n // sqrt_ratio_3mod4(u, v)\n const c1 = (Fp.ORDER - _3n) / _4n; // 1. c1 = (q - 3) / 4 # Integer arithmetic\n const c2 = Fp.sqrt(Fp.neg(Z)); // 2. c2 = sqrt(-Z)\n sqrtRatio = (u, v) => {\n let tv1 = Fp.sqr(v); // 1. tv1 = v^2\n const tv2 = Fp.mul(u, v); // 2. tv2 = u * v\n tv1 = Fp.mul(tv1, tv2); // 3. tv1 = tv1 * tv2\n let y1 = Fp.pow(tv1, c1); // 4. y1 = tv1^c1\n y1 = Fp.mul(y1, tv2); // 5. y1 = y1 * tv2\n const y2 = Fp.mul(y1, c2); // 6. y2 = y1 * c2\n const tv3 = Fp.mul(Fp.sqr(y1), v); // 7. tv3 = y1^2; 8. tv3 = tv3 * v\n const isQR = Fp.eql(tv3, u); // 9. isQR = tv3 == u\n let y = Fp.cmov(y2, y1, isQR); // 10. y = CMOV(y2, y1, isQR)\n return { isValid: isQR, value: y }; // 11. return (isQR, y) isQR ? y : y*c2\n };\n }\n // No curves uses that\n // if (Fp.ORDER % _8n === _5n) // sqrt_ratio_5mod8\n return sqrtRatio;\n}\n/**\n * Simplified Shallue-van de Woestijne-Ulas Method\n * https://www.rfc-editor.org/rfc/rfc9380#section-6.6.2\n */\nexport function mapToCurveSimpleSWU(Fp, opts) {\n validateField(Fp);\n const { A, B, Z } = opts;\n if (!Fp.isValid(A) || !Fp.isValid(B) || !Fp.isValid(Z))\n throw new Error('mapToCurveSimpleSWU: invalid opts');\n const sqrtRatio = SWUFpSqrtRatio(Fp, Z);\n if (!Fp.isOdd)\n throw new Error('Field does not have .isOdd()');\n // Input: u, an element of F.\n // Output: (x, y), a point on E.\n return (u) => {\n // prettier-ignore\n let tv1, tv2, tv3, tv4, tv5, tv6, x, y;\n tv1 = Fp.sqr(u); // 1. tv1 = u^2\n tv1 = Fp.mul(tv1, Z); // 2. tv1 = Z * tv1\n tv2 = Fp.sqr(tv1); // 3. tv2 = tv1^2\n tv2 = Fp.add(tv2, tv1); // 4. tv2 = tv2 + tv1\n tv3 = Fp.add(tv2, Fp.ONE); // 5. tv3 = tv2 + 1\n tv3 = Fp.mul(tv3, B); // 6. tv3 = B * tv3\n tv4 = Fp.cmov(Z, Fp.neg(tv2), !Fp.eql(tv2, Fp.ZERO)); // 7. tv4 = CMOV(Z, -tv2, tv2 != 0)\n tv4 = Fp.mul(tv4, A); // 8. tv4 = A * tv4\n tv2 = Fp.sqr(tv3); // 9. tv2 = tv3^2\n tv6 = Fp.sqr(tv4); // 10. tv6 = tv4^2\n tv5 = Fp.mul(tv6, A); // 11. tv5 = A * tv6\n tv2 = Fp.add(tv2, tv5); // 12. tv2 = tv2 + tv5\n tv2 = Fp.mul(tv2, tv3); // 13. tv2 = tv2 * tv3\n tv6 = Fp.mul(tv6, tv4); // 14. tv6 = tv6 * tv4\n tv5 = Fp.mul(tv6, B); // 15. tv5 = B * tv6\n tv2 = Fp.add(tv2, tv5); // 16. tv2 = tv2 + tv5\n x = Fp.mul(tv1, tv3); // 17. x = tv1 * tv3\n const { isValid, value } = sqrtRatio(tv2, tv6); // 18. (is_gx1_square, y1) = sqrt_ratio(tv2, tv6)\n y = Fp.mul(tv1, u); // 19. y = tv1 * u -> Z * u^3 * y1\n y = Fp.mul(y, value); // 20. y = y * y1\n x = Fp.cmov(x, tv3, isValid); // 21. x = CMOV(x, tv3, is_gx1_square)\n y = Fp.cmov(y, value, isValid); // 22. y = CMOV(y, y1, is_gx1_square)\n const e1 = Fp.isOdd(u) === Fp.isOdd(y); // 23. e1 = sgn0(u) == sgn0(y)\n y = Fp.cmov(Fp.neg(y), y, e1); // 24. y = CMOV(-y, y, e1)\n const tv4_inv = FpInvertBatch(Fp, [tv4], true)[0];\n x = Fp.mul(x, tv4_inv); // 25. x = x / tv4\n return { x, y };\n };\n}\nfunction getWLengths(Fp, Fn) {\n return {\n secretKey: Fn.BYTES,\n publicKey: 1 + Fp.BYTES,\n publicKeyUncompressed: 1 + 2 * Fp.BYTES,\n publicKeyHasPrefix: true,\n signature: 2 * Fn.BYTES,\n };\n}\n/**\n * Sometimes users only need getPublicKey, getSharedSecret, and secret key handling.\n * This helper ensures no signature functionality is present. Less code, smaller bundle size.\n */\nexport function ecdh(Point, ecdhOpts = {}) {\n const { Fn } = Point;\n const randomBytes_ = ecdhOpts.randomBytes || wcRandomBytes;\n const lengths = Object.assign(getWLengths(Point.Fp, Fn), { seed: getMinHashLength(Fn.ORDER) });\n function isValidSecretKey(secretKey) {\n try {\n const num = Fn.fromBytes(secretKey);\n return Fn.isValidNot0(num);\n }\n catch (error) {\n return false;\n }\n }\n function isValidPublicKey(publicKey, isCompressed) {\n const { publicKey: comp, publicKeyUncompressed } = lengths;\n try {\n const l = publicKey.length;\n if (isCompressed === true && l !== comp)\n return false;\n if (isCompressed === false && l !== publicKeyUncompressed)\n return false;\n return !!Point.fromBytes(publicKey);\n }\n catch (error) {\n return false;\n }\n }\n /**\n * Produces cryptographically secure secret key from random of size\n * (groupLen + ceil(groupLen / 2)) with modulo bias being negligible.\n */\n function randomSecretKey(seed = randomBytes_(lengths.seed)) {\n return mapHashToField(abytes(seed, lengths.seed, 'seed'), Fn.ORDER);\n }\n /**\n * Computes public key for a secret key. Checks for validity of the secret key.\n * @param isCompressed whether to return compact (default), or full key\n * @returns Public key, full when isCompressed=false; short when isCompressed=true\n */\n function getPublicKey(secretKey, isCompressed = true) {\n return Point.BASE.multiply(Fn.fromBytes(secretKey)).toBytes(isCompressed);\n }\n /**\n * Quick and dirty check for item being public key. Does not validate hex, or being on-curve.\n */\n function isProbPub(item) {\n const { secretKey, publicKey, publicKeyUncompressed } = lengths;\n if (!isBytes(item))\n return undefined;\n if (('_lengths' in Fn && Fn._lengths) || secretKey === publicKey)\n return undefined;\n const l = abytes(item, undefined, 'key').length;\n return l === publicKey || l === publicKeyUncompressed;\n }\n /**\n * ECDH (Elliptic Curve Diffie Hellman).\n * Computes shared public key from secret key A and public key B.\n * Checks: 1) secret key validity 2) shared key is on-curve.\n * Does NOT hash the result.\n * @param isCompressed whether to return compact (default), or full key\n * @returns shared public key\n */\n function getSharedSecret(secretKeyA, publicKeyB, isCompressed = true) {\n if (isProbPub(secretKeyA) === true)\n throw new Error('first arg must be private key');\n if (isProbPub(publicKeyB) === false)\n throw new Error('second arg must be public key');\n const s = Fn.fromBytes(secretKeyA);\n const b = Point.fromBytes(publicKeyB); // checks for being on-curve\n return b.multiply(s).toBytes(isCompressed);\n }\n const utils = {\n isValidSecretKey,\n isValidPublicKey,\n randomSecretKey,\n };\n const keygen = createKeygen(randomSecretKey, getPublicKey);\n return Object.freeze({ getPublicKey, getSharedSecret, keygen, Point, utils, lengths });\n}\n/**\n * Creates ECDSA signing interface for given elliptic curve `Point` and `hash` function.\n *\n * @param Point created using {@link weierstrass} function\n * @param hash used for 1) message prehash-ing 2) k generation in `sign`, using hmac_drbg(hash)\n * @param ecdsaOpts rarely needed, see {@link ECDSAOpts}\n *\n * @example\n * ```js\n * const p256_Point = weierstrass(...);\n * const p256_sha256 = ecdsa(p256_Point, sha256);\n * const p256_sha224 = ecdsa(p256_Point, sha224);\n * const p256_sha224_r = ecdsa(p256_Point, sha224, { randomBytes: (length) => { ... } });\n * ```\n */\nexport function ecdsa(Point, hash, ecdsaOpts = {}) {\n ahash(hash);\n validateObject(ecdsaOpts, {}, {\n hmac: 'function',\n lowS: 'boolean',\n randomBytes: 'function',\n bits2int: 'function',\n bits2int_modN: 'function',\n });\n ecdsaOpts = Object.assign({}, ecdsaOpts);\n const randomBytes = ecdsaOpts.randomBytes || wcRandomBytes;\n const hmac = ecdsaOpts.hmac || ((key, msg) => nobleHmac(hash, key, msg));\n const { Fp, Fn } = Point;\n const { ORDER: CURVE_ORDER, BITS: fnBits } = Fn;\n const { keygen, getPublicKey, getSharedSecret, utils, lengths } = ecdh(Point, ecdsaOpts);\n const defaultSigOpts = {\n prehash: true,\n lowS: typeof ecdsaOpts.lowS === 'boolean' ? ecdsaOpts.lowS : true,\n format: 'compact',\n extraEntropy: false,\n };\n const hasLargeCofactor = CURVE_ORDER * _2n < Fp.ORDER; // Won't CURVE().h > 2n be more effective?\n function isBiggerThanHalfOrder(number) {\n const HALF = CURVE_ORDER >> _1n;\n return number > HALF;\n }\n function validateRS(title, num) {\n if (!Fn.isValidNot0(num))\n throw new Error(`invalid signature ${title}: out of range 1..Point.Fn.ORDER`);\n return num;\n }\n function assertSmallCofactor() {\n // ECDSA recovery is hard for cofactor > 1 curves.\n // In sign, `r = q.x mod n`, and here we recover q.x from r.\n // While recovering q.x >= n, we need to add r+n for cofactor=1 curves.\n // However, for cofactor>1, r+n may not get q.x:\n // r+n*i would need to be done instead where i is unknown.\n // To easily get i, we either need to:\n // a. increase amount of valid recid values (4, 5...); OR\n // b. prohibit non-prime-order signatures (recid > 1).\n if (hasLargeCofactor)\n throw new Error('\"recovered\" sig type is not supported for cofactor >2 curves');\n }\n function validateSigLength(bytes, format) {\n validateSigFormat(format);\n const size = lengths.signature;\n const sizer = format === 'compact' ? size : format === 'recovered' ? size + 1 : undefined;\n return abytes(bytes, sizer);\n }\n /**\n * ECDSA signature with its (r, s) properties. Supports compact, recovered & DER representations.\n */\n class Signature {\n r;\n s;\n recovery;\n constructor(r, s, recovery) {\n this.r = validateRS('r', r); // r in [1..N-1];\n this.s = validateRS('s', s); // s in [1..N-1];\n if (recovery != null) {\n assertSmallCofactor();\n if (![0, 1, 2, 3].includes(recovery))\n throw new Error('invalid recovery id');\n this.recovery = recovery;\n }\n Object.freeze(this);\n }\n static fromBytes(bytes, format = defaultSigOpts.format) {\n validateSigLength(bytes, format);\n let recid;\n if (format === 'der') {\n const { r, s } = DER.toSig(abytes(bytes));\n return new Signature(r, s);\n }\n if (format === 'recovered') {\n recid = bytes[0];\n format = 'compact';\n bytes = bytes.subarray(1);\n }\n const L = lengths.signature / 2;\n const r = bytes.subarray(0, L);\n const s = bytes.subarray(L, L * 2);\n return new Signature(Fn.fromBytes(r), Fn.fromBytes(s), recid);\n }\n static fromHex(hex, format) {\n return this.fromBytes(hexToBytes(hex), format);\n }\n assertRecovery() {\n const { recovery } = this;\n if (recovery == null)\n throw new Error('invalid recovery id: must be present');\n return recovery;\n }\n addRecoveryBit(recovery) {\n return new Signature(this.r, this.s, recovery);\n }\n recoverPublicKey(messageHash) {\n const { r, s } = this;\n const recovery = this.assertRecovery();\n const radj = recovery === 2 || recovery === 3 ? r + CURVE_ORDER : r;\n if (!Fp.isValid(radj))\n throw new Error('invalid recovery id: sig.r+curve.n != R.x');\n const x = Fp.toBytes(radj);\n const R = Point.fromBytes(concatBytes(pprefix((recovery & 1) === 0), x));\n const ir = Fn.inv(radj); // r^-1\n const h = bits2int_modN(abytes(messageHash, undefined, 'msgHash')); // Truncate hash\n const u1 = Fn.create(-h * ir); // -hr^-1\n const u2 = Fn.create(s * ir); // sr^-1\n // (sr^-1)R-(hr^-1)G = -(hr^-1)G + (sr^-1). unsafe is fine: there is no private data.\n const Q = Point.BASE.multiplyUnsafe(u1).add(R.multiplyUnsafe(u2));\n if (Q.is0())\n throw new Error('invalid recovery: point at infinify');\n Q.assertValidity();\n return Q;\n }\n // Signatures should be low-s, to prevent malleability.\n hasHighS() {\n return isBiggerThanHalfOrder(this.s);\n }\n toBytes(format = defaultSigOpts.format) {\n validateSigFormat(format);\n if (format === 'der')\n return hexToBytes(DER.hexFromSig(this));\n const { r, s } = this;\n const rb = Fn.toBytes(r);\n const sb = Fn.toBytes(s);\n if (format === 'recovered') {\n assertSmallCofactor();\n return concatBytes(Uint8Array.of(this.assertRecovery()), rb, sb);\n }\n return concatBytes(rb, sb);\n }\n toHex(format) {\n return bytesToHex(this.toBytes(format));\n }\n }\n // RFC6979: ensure ECDSA msg is X bytes and < N. RFC suggests optional truncating via bits2octets.\n // FIPS 186-4 4.6 suggests the leftmost min(nBitLen, outLen) bits, which matches bits2int.\n // bits2int can produce res>N, we can do mod(res, N) since the bitLen is the same.\n // int2octets can't be used; pads small msgs with 0: unacceptatble for trunc as per RFC vectors\n const bits2int = ecdsaOpts.bits2int ||\n function bits2int_def(bytes) {\n // Our custom check \"just in case\", for protection against DoS\n if (bytes.length > 8192)\n throw new Error('input is too large');\n // For curves with nBitLength % 8 !== 0: bits2octets(bits2octets(m)) !== bits2octets(m)\n // for some cases, since bytes.length * 8 is not actual bitLength.\n const num = bytesToNumberBE(bytes); // check for == u8 done here\n const delta = bytes.length * 8 - fnBits; // truncate to nBitLength leftmost bits\n return delta > 0 ? num >> BigInt(delta) : num;\n };\n const bits2int_modN = ecdsaOpts.bits2int_modN ||\n function bits2int_modN_def(bytes) {\n return Fn.create(bits2int(bytes)); // can't use bytesToNumberBE here\n };\n // Pads output with zero as per spec\n const ORDER_MASK = bitMask(fnBits);\n /** Converts to bytes. Checks if num in `[0..ORDER_MASK-1]` e.g.: `[0..2^256-1]`. */\n function int2octets(num) {\n // IMPORTANT: the check ensures working for case `Fn.BYTES != Fn.BITS * 8`\n aInRange('num < 2^' + fnBits, num, _0n, ORDER_MASK);\n return Fn.toBytes(num);\n }\n function validateMsgAndHash(message, prehash) {\n abytes(message, undefined, 'message');\n return prehash ? abytes(hash(message), undefined, 'prehashed message') : message;\n }\n /**\n * Steps A, D of RFC6979 3.2.\n * Creates RFC6979 seed; converts msg/privKey to numbers.\n * Used only in sign, not in verify.\n *\n * Warning: we cannot assume here that message has same amount of bytes as curve order,\n * this will be invalid at least for P521. Also it can be bigger for P224 + SHA256.\n */\n function prepSig(message, secretKey, opts) {\n const { lowS, prehash, extraEntropy } = validateSigOpts(opts, defaultSigOpts);\n message = validateMsgAndHash(message, prehash); // RFC6979 3.2 A: h1 = H(m)\n // We can't later call bits2octets, since nested bits2int is broken for curves\n // with fnBits % 8 !== 0. Because of that, we unwrap it here as int2octets call.\n // const bits2octets = (bits) => int2octets(bits2int_modN(bits))\n const h1int = bits2int_modN(message);\n const d = Fn.fromBytes(secretKey); // validate secret key, convert to bigint\n if (!Fn.isValidNot0(d))\n throw new Error('invalid private key');\n const seedArgs = [int2octets(d), int2octets(h1int)];\n // extraEntropy. RFC6979 3.6: additional k' (optional).\n if (extraEntropy != null && extraEntropy !== false) {\n // K = HMAC_K(V || 0x00 || int2octets(x) || bits2octets(h1) || k')\n // gen random bytes OR pass as-is\n const e = extraEntropy === true ? randomBytes(lengths.secretKey) : extraEntropy;\n seedArgs.push(abytes(e, undefined, 'extraEntropy')); // check for being bytes\n }\n const seed = concatBytes(...seedArgs); // Step D of RFC6979 3.2\n const m = h1int; // no need to call bits2int second time here, it is inside truncateHash!\n // Converts signature params into point w r/s, checks result for validity.\n // To transform k => Signature:\n // q = k⋅G\n // r = q.x mod n\n // s = k^-1(m + rd) mod n\n // Can use scalar blinding b^-1(bm + bdr) where b ∈ [1,q−1] according to\n // https://tches.iacr.org/index.php/TCHES/article/view/7337/6509. We've decided against it:\n // a) dependency on CSPRNG b) 15% slowdown c) doesn't really help since bigints are not CT\n function k2sig(kBytes) {\n // RFC 6979 Section 3.2, step 3: k = bits2int(T)\n // Important: all mod() calls here must be done over N\n const k = bits2int(kBytes); // Cannot use fields methods, since it is group element\n if (!Fn.isValidNot0(k))\n return; // Valid scalars (including k) must be in 1..N-1\n const ik = Fn.inv(k); // k^-1 mod n\n const q = Point.BASE.multiply(k).toAffine(); // q = k⋅G\n const r = Fn.create(q.x); // r = q.x mod n\n if (r === _0n)\n return;\n const s = Fn.create(ik * Fn.create(m + r * d)); // s = k^-1(m + rd) mod n\n if (s === _0n)\n return;\n let recovery = (q.x === r ? 0 : 2) | Number(q.y & _1n); // recovery bit (2 or 3 when q.x>n)\n let normS = s;\n if (lowS && isBiggerThanHalfOrder(s)) {\n normS = Fn.neg(s); // if lowS was passed, ensure s is always in the bottom half of N\n recovery ^= 1;\n }\n return new Signature(r, normS, hasLargeCofactor ? undefined : recovery);\n }\n return { seed, k2sig };\n }\n /**\n * Signs message hash with a secret key.\n *\n * ```\n * sign(m, d) where\n * k = rfc6979_hmac_drbg(m, d)\n * (x, y) = G × k\n * r = x mod n\n * s = (m + dr) / k mod n\n * ```\n */\n function sign(message, secretKey, opts = {}) {\n const { seed, k2sig } = prepSig(message, secretKey, opts); // Steps A, D of RFC6979 3.2.\n const drbg = createHmacDrbg(hash.outputLen, Fn.BYTES, hmac);\n const sig = drbg(seed, k2sig); // Steps B, C, D, E, F, G\n return sig.toBytes(opts.format);\n }\n /**\n * Verifies a signature against message and public key.\n * Rejects lowS signatures by default: see {@link ECDSAVerifyOpts}.\n * Implements section 4.1.4 from https://www.secg.org/sec1-v2.pdf:\n *\n * ```\n * verify(r, s, h, P) where\n * u1 = hs^-1 mod n\n * u2 = rs^-1 mod n\n * R = u1⋅G + u2⋅P\n * mod(R.x, n) == r\n * ```\n */\n function verify(signature, message, publicKey, opts = {}) {\n const { lowS, prehash, format } = validateSigOpts(opts, defaultSigOpts);\n publicKey = abytes(publicKey, undefined, 'publicKey');\n message = validateMsgAndHash(message, prehash);\n if (!isBytes(signature)) {\n const end = signature instanceof Signature ? ', use sig.toBytes()' : '';\n throw new Error('verify expects Uint8Array signature' + end);\n }\n validateSigLength(signature, format); // execute this twice because we want loud error\n try {\n const sig = Signature.fromBytes(signature, format);\n const P = Point.fromBytes(publicKey);\n if (lowS && sig.hasHighS())\n return false;\n const { r, s } = sig;\n const h = bits2int_modN(message); // mod n, not mod p\n const is = Fn.inv(s); // s^-1 mod n\n const u1 = Fn.create(h * is); // u1 = hs^-1 mod n\n const u2 = Fn.create(r * is); // u2 = rs^-1 mod n\n const R = Point.BASE.multiplyUnsafe(u1).add(P.multiplyUnsafe(u2)); // u1⋅G + u2⋅P\n if (R.is0())\n return false;\n const v = Fn.create(R.x); // v = r.x mod n\n return v === r;\n }\n catch (e) {\n return false;\n }\n }\n function recoverPublicKey(signature, message, opts = {}) {\n const { prehash } = validateSigOpts(opts, defaultSigOpts);\n message = validateMsgAndHash(message, prehash);\n return Signature.fromBytes(signature, 'recovered').recoverPublicKey(message).toBytes();\n }\n return Object.freeze({\n keygen,\n getPublicKey,\n getSharedSecret,\n utils,\n lengths,\n Point,\n sign,\n verify,\n recoverPublicKey,\n Signature,\n hash,\n });\n}\n//# sourceMappingURL=weierstrass.js.map","/**\n * SECG secp256k1. See [pdf](https://www.secg.org/sec2-v2.pdf).\n *\n * Belongs to Koblitz curves: it has efficiently-computable GLV endomorphism ψ,\n * check out {@link EndomorphismOpts}. Seems to be rigid (not backdoored).\n * @module\n */\n/*! noble-curves - MIT License (c) 2022 Paul Miller (paulmillr.com) */\nimport { sha256 } from '@noble/hashes/sha2.js';\nimport { randomBytes } from '@noble/hashes/utils.js';\nimport { createKeygen } from \"./abstract/curve.js\";\nimport { createHasher, isogenyMap } from \"./abstract/hash-to-curve.js\";\nimport { Field, mapHashToField, pow2 } from \"./abstract/modular.js\";\nimport { ecdsa, mapToCurveSimpleSWU, weierstrass, } from \"./abstract/weierstrass.js\";\nimport { abytes, asciiToBytes, bytesToNumberBE, concatBytes } from \"./utils.js\";\n// Seems like generator was produced from some seed:\n// `Pointk1.BASE.multiply(Pointk1.Fn.inv(2n, N)).toAffine().x`\n// // gives short x 0x3b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63n\nconst secp256k1_CURVE = {\n p: BigInt('0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f'),\n n: BigInt('0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141'),\n h: BigInt(1),\n a: BigInt(0),\n b: BigInt(7),\n Gx: BigInt('0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798'),\n Gy: BigInt('0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8'),\n};\nconst secp256k1_ENDO = {\n beta: BigInt('0x7ae96a2b657c07106e64479eac3434e99cf0497512f58995c1396c28719501ee'),\n basises: [\n [BigInt('0x3086d221a7d46bcde86c90e49284eb15'), -BigInt('0xe4437ed6010e88286f547fa90abfe4c3')],\n [BigInt('0x114ca50f7a8e2f3f657c1108d9d44cfd8'), BigInt('0x3086d221a7d46bcde86c90e49284eb15')],\n ],\n};\nconst _0n = /* @__PURE__ */ BigInt(0);\nconst _2n = /* @__PURE__ */ BigInt(2);\n/**\n * √n = n^((p+1)/4) for fields p = 3 mod 4. We unwrap the loop and multiply bit-by-bit.\n * (P+1n/4n).toString(2) would produce bits [223x 1, 0, 22x 1, 4x 0, 11, 00]\n */\nfunction sqrtMod(y) {\n const P = secp256k1_CURVE.p;\n // prettier-ignore\n const _3n = BigInt(3), _6n = BigInt(6), _11n = BigInt(11), _22n = BigInt(22);\n // prettier-ignore\n const _23n = BigInt(23), _44n = BigInt(44), _88n = BigInt(88);\n const b2 = (y * y * y) % P; // x^3, 11\n const b3 = (b2 * b2 * y) % P; // x^7\n const b6 = (pow2(b3, _3n, P) * b3) % P;\n const b9 = (pow2(b6, _3n, P) * b3) % P;\n const b11 = (pow2(b9, _2n, P) * b2) % P;\n const b22 = (pow2(b11, _11n, P) * b11) % P;\n const b44 = (pow2(b22, _22n, P) * b22) % P;\n const b88 = (pow2(b44, _44n, P) * b44) % P;\n const b176 = (pow2(b88, _88n, P) * b88) % P;\n const b220 = (pow2(b176, _44n, P) * b44) % P;\n const b223 = (pow2(b220, _3n, P) * b3) % P;\n const t1 = (pow2(b223, _23n, P) * b22) % P;\n const t2 = (pow2(t1, _6n, P) * b2) % P;\n const root = pow2(t2, _2n, P);\n if (!Fpk1.eql(Fpk1.sqr(root), y))\n throw new Error('Cannot find square root');\n return root;\n}\nconst Fpk1 = Field(secp256k1_CURVE.p, { sqrt: sqrtMod });\nconst Pointk1 = /* @__PURE__ */ weierstrass(secp256k1_CURVE, {\n Fp: Fpk1,\n endo: secp256k1_ENDO,\n});\n/**\n * secp256k1 curve: ECDSA and ECDH methods.\n *\n * Uses sha256 to hash messages. To use a different hash,\n * pass `{ prehash: false }` to sign / verify.\n *\n * @example\n * ```js\n * import { secp256k1 } from '@noble/curves/secp256k1.js';\n * const { secretKey, publicKey } = secp256k1.keygen();\n * // const publicKey = secp256k1.getPublicKey(secretKey);\n * const msg = new TextEncoder().encode('hello noble');\n * const sig = secp256k1.sign(msg, secretKey);\n * const isValid = secp256k1.verify(sig, msg, publicKey);\n * // const sigKeccak = secp256k1.sign(keccak256(msg), secretKey, { prehash: false });\n * ```\n */\nexport const secp256k1 = /* @__PURE__ */ ecdsa(Pointk1, sha256);\n// Schnorr signatures are superior to ECDSA from above. Below is Schnorr-specific BIP0340 code.\n// https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki\n/** An object mapping tags to their tagged hash prefix of [SHA256(tag) | SHA256(tag)] */\nconst TAGGED_HASH_PREFIXES = {};\nfunction taggedHash(tag, ...messages) {\n let tagP = TAGGED_HASH_PREFIXES[tag];\n if (tagP === undefined) {\n const tagH = sha256(asciiToBytes(tag));\n tagP = concatBytes(tagH, tagH);\n TAGGED_HASH_PREFIXES[tag] = tagP;\n }\n return sha256(concatBytes(tagP, ...messages));\n}\n// ECDSA compact points are 33-byte. Schnorr is 32: we strip first byte 0x02 or 0x03\nconst pointToBytes = (point) => point.toBytes(true).slice(1);\nconst hasEven = (y) => y % _2n === _0n;\n// Calculate point, scalar and bytes\nfunction schnorrGetExtPubKey(priv) {\n const { Fn, BASE } = Pointk1;\n const d_ = Fn.fromBytes(priv);\n const p = BASE.multiply(d_); // P = d'⋅G; 0 < d' < n check is done inside\n const scalar = hasEven(p.y) ? d_ : Fn.neg(d_);\n return { scalar, bytes: pointToBytes(p) };\n}\n/**\n * lift_x from BIP340. Convert 32-byte x coordinate to elliptic curve point.\n * @returns valid point checked for being on-curve\n */\nfunction lift_x(x) {\n const Fp = Fpk1;\n if (!Fp.isValidNot0(x))\n throw new Error('invalid x: Fail if x ≥ p');\n const xx = Fp.create(x * x);\n const c = Fp.create(xx * x + BigInt(7)); // Let c = x³ + 7 mod p.\n let y = Fp.sqrt(c); // Let y = c^(p+1)/4 mod p. Same as sqrt().\n // Return the unique point P such that x(P) = x and\n // y(P) = y if y mod 2 = 0 or y(P) = p-y otherwise.\n if (!hasEven(y))\n y = Fp.neg(y);\n const p = Pointk1.fromAffine({ x, y });\n p.assertValidity();\n return p;\n}\nconst num = bytesToNumberBE;\n/**\n * Create tagged hash, convert it to bigint, reduce modulo-n.\n */\nfunction challenge(...args) {\n return Pointk1.Fn.create(num(taggedHash('BIP0340/challenge', ...args)));\n}\n/**\n * Schnorr public key is just `x` coordinate of Point as per BIP340.\n */\nfunction schnorrGetPublicKey(secretKey) {\n return schnorrGetExtPubKey(secretKey).bytes; // d'=int(sk). Fail if d'=0 or d'≥n. Ret bytes(d'⋅G)\n}\n/**\n * Creates Schnorr signature as per BIP340. Verifies itself before returning anything.\n * auxRand is optional and is not the sole source of k generation: bad CSPRNG won't be dangerous.\n */\nfunction schnorrSign(message, secretKey, auxRand = randomBytes(32)) {\n const { Fn } = Pointk1;\n const m = abytes(message, undefined, 'message');\n const { bytes: px, scalar: d } = schnorrGetExtPubKey(secretKey); // checks for isWithinCurveOrder\n const a = abytes(auxRand, 32, 'auxRand'); // Auxiliary random data a: a 32-byte array\n const t = Fn.toBytes(d ^ num(taggedHash('BIP0340/aux', a))); // Let t be the byte-wise xor of bytes(d) and hash/aux(a)\n const rand = taggedHash('BIP0340/nonce', t, px, m); // Let rand = hash/nonce(t || bytes(P) || m)\n // Let k' = int(rand) mod n. Fail if k' = 0. Let R = k'⋅G\n const { bytes: rx, scalar: k } = schnorrGetExtPubKey(rand);\n const e = challenge(rx, px, m); // Let e = int(hash/challenge(bytes(R) || bytes(P) || m)) mod n.\n const sig = new Uint8Array(64); // Let sig = bytes(R) || bytes((k + ed) mod n).\n sig.set(rx, 0);\n sig.set(Fn.toBytes(Fn.create(k + e * d)), 32);\n // If Verify(bytes(P), m, sig) (see below) returns failure, abort\n if (!schnorrVerify(sig, m, px))\n throw new Error('sign: Invalid signature produced');\n return sig;\n}\n/**\n * Verifies Schnorr signature.\n * Will swallow errors & return false except for initial type validation of arguments.\n */\nfunction schnorrVerify(signature, message, publicKey) {\n const { Fp, Fn, BASE } = Pointk1;\n const sig = abytes(signature, 64, 'signature');\n const m = abytes(message, undefined, 'message');\n const pub = abytes(publicKey, 32, 'publicKey');\n try {\n const P = lift_x(num(pub)); // P = lift_x(int(pk)); fail if that fails\n const r = num(sig.subarray(0, 32)); // Let r = int(sig[0:32]); fail if r ≥ p.\n if (!Fp.isValidNot0(r))\n return false;\n const s = num(sig.subarray(32, 64)); // Let s = int(sig[32:64]); fail if s ≥ n.\n if (!Fn.isValidNot0(s))\n return false;\n const e = challenge(Fn.toBytes(r), pointToBytes(P), m); // int(challenge(bytes(r)||bytes(P)||m))%n\n // R = s⋅G - e⋅P, where -eP == (n-e)P\n const R = BASE.multiplyUnsafe(s).add(P.multiplyUnsafe(Fn.neg(e)));\n const { x, y } = R.toAffine();\n // Fail if is_infinite(R) / not has_even_y(R) / x(R) ≠ r.\n if (R.is0() || !hasEven(y) || x !== r)\n return false;\n return true;\n }\n catch (error) {\n return false;\n }\n}\n/**\n * Schnorr signatures over secp256k1.\n * https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki\n * @example\n * ```js\n * import { schnorr } from '@noble/curves/secp256k1.js';\n * const { secretKey, publicKey } = schnorr.keygen();\n * // const publicKey = schnorr.getPublicKey(secretKey);\n * const msg = new TextEncoder().encode('hello');\n * const sig = schnorr.sign(msg, secretKey);\n * const isValid = schnorr.verify(sig, msg, publicKey);\n * ```\n */\nexport const schnorr = /* @__PURE__ */ (() => {\n const size = 32;\n const seedLength = 48;\n const randomSecretKey = (seed = randomBytes(seedLength)) => {\n return mapHashToField(seed, secp256k1_CURVE.n);\n };\n return {\n keygen: createKeygen(randomSecretKey, schnorrGetPublicKey),\n getPublicKey: schnorrGetPublicKey,\n sign: schnorrSign,\n verify: schnorrVerify,\n Point: Pointk1,\n utils: {\n randomSecretKey,\n taggedHash,\n lift_x,\n pointToBytes,\n },\n lengths: {\n secretKey: size,\n publicKey: size,\n publicKeyHasPrefix: false,\n signature: size * 2,\n seed: seedLength,\n },\n };\n})();\nconst isoMap = /* @__PURE__ */ (() => isogenyMap(Fpk1, [\n // xNum\n [\n '0x8e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38daaaaa8c7',\n '0x7d3d4c80bc321d5b9f315cea7fd44c5d595d2fc0bf63b92dfff1044f17c6581',\n '0x534c328d23f234e6e2a413deca25caece4506144037c40314ecbd0b53d9dd262',\n '0x8e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38e38daaaaa88c',\n ],\n // xDen\n [\n '0xd35771193d94918a9ca34ccbb7b640dd86cd409542f8487d9fe6b745781eb49b',\n '0xedadc6f64383dc1df7c4b2d51b54225406d36b641f5e41bbc52a56612a8c6d14',\n '0x0000000000000000000000000000000000000000000000000000000000000001', // LAST 1\n ],\n // yNum\n [\n '0x4bda12f684bda12f684bda12f684bda12f684bda12f684bda12f684b8e38e23c',\n '0xc75e0c32d5cb7c0fa9d0a54b12a0a6d5647ab046d686da6fdffc90fc201d71a3',\n '0x29a6194691f91a73715209ef6512e576722830a201be2018a765e85a9ecee931',\n '0x2f684bda12f684bda12f684bda12f684bda12f684bda12f684bda12f38e38d84',\n ],\n // yDen\n [\n '0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffff93b',\n '0x7a06534bb8bdb49fd5e9e6632722c2989467c1bfc8e8d978dfb425d2685c2573',\n '0x6484aa716545ca2cf3a70c3fa8fe337e0a3d21162f0d6299a7bf8192bfd2a76f',\n '0x0000000000000000000000000000000000000000000000000000000000000001', // LAST 1\n ],\n].map((i) => i.map((j) => BigInt(j)))))();\nconst mapSWU = /* @__PURE__ */ (() => mapToCurveSimpleSWU(Fpk1, {\n A: BigInt('0x3f8731abdd661adca08a5558f0f5d272e953d363cb6f0e5d405447c01a444533'),\n B: BigInt('1771'),\n Z: Fpk1.create(BigInt('-11')),\n}))();\n/** Hashing / encoding to secp256k1 points / field. RFC 9380 methods. */\nexport const secp256k1_hasher = /* @__PURE__ */ (() => createHasher(Pointk1, (scalars) => {\n const { x, y } = mapSWU(Fpk1.create(scalars[0]));\n return isoMap(x, y);\n}, {\n DST: 'secp256k1_XMD:SHA-256_SSWU_RO_',\n encodeDST: 'secp256k1_XMD:SHA-256_SSWU_NU_',\n p: Fpk1.ORDER,\n m: 1,\n k: 128,\n expand: 'xmd',\n hash: sha256,\n}))();\n//# sourceMappingURL=secp256k1.js.map","/**\n * Utilities for hex, bytes, CSPRNG.\n * @module\n */\n/*! noble-hashes - MIT License (c) 2022 Paul Miller (paulmillr.com) */\n// We use WebCrypto aka globalThis.crypto, which exists in browsers and node.js 16+.\n// node.js versions earlier than v19 don't declare it in global scope.\n// For node.js, package.json#exports field mapping rewrites import\n// from `crypto` to `cryptoNode`, which imports native module.\n// Makes the utils un-importable in browsers without a bundler.\n// Once node.js 18 is deprecated (2025-04-30), we can just drop the import.\nimport { crypto } from '@noble/hashes/crypto';\n/** Checks if something is Uint8Array. Be careful: nodejs Buffer will return true. */\nexport function isBytes(a) {\n return a instanceof Uint8Array || (ArrayBuffer.isView(a) && a.constructor.name === 'Uint8Array');\n}\n/** Asserts something is positive integer. */\nexport function anumber(n) {\n if (!Number.isSafeInteger(n) || n < 0)\n throw new Error('positive integer expected, got ' + n);\n}\n/** Asserts something is Uint8Array. */\nexport function abytes(b, ...lengths) {\n if (!isBytes(b))\n throw new Error('Uint8Array expected');\n if (lengths.length > 0 && !lengths.includes(b.length))\n throw new Error('Uint8Array expected of length ' + lengths + ', got length=' + b.length);\n}\n/** Asserts something is hash */\nexport function ahash(h) {\n if (typeof h !== 'function' || typeof h.create !== 'function')\n throw new Error('Hash should be wrapped by utils.createHasher');\n anumber(h.outputLen);\n anumber(h.blockLen);\n}\n/** Asserts a hash instance has not been destroyed / finished */\nexport function aexists(instance, checkFinished = true) {\n if (instance.destroyed)\n throw new Error('Hash instance has been destroyed');\n if (checkFinished && instance.finished)\n throw new Error('Hash#digest() has already been called');\n}\n/** Asserts output is properly-sized byte array */\nexport function aoutput(out, instance) {\n abytes(out);\n const min = instance.outputLen;\n if (out.length < min) {\n throw new Error('digestInto() expects output buffer of length at least ' + min);\n }\n}\n/** Cast u8 / u16 / u32 to u8. */\nexport function u8(arr) {\n return new Uint8Array(arr.buffer, arr.byteOffset, arr.byteLength);\n}\n/** Cast u8 / u16 / u32 to u32. */\nexport function u32(arr) {\n return new Uint32Array(arr.buffer, arr.byteOffset, Math.floor(arr.byteLength / 4));\n}\n/** Zeroize a byte array. Warning: JS provides no guarantees. */\nexport function clean(...arrays) {\n for (let i = 0; i < arrays.length; i++) {\n arrays[i].fill(0);\n }\n}\n/** Create DataView of an array for easy byte-level manipulation. */\nexport function createView(arr) {\n return new DataView(arr.buffer, arr.byteOffset, arr.byteLength);\n}\n/** The rotate right (circular right shift) operation for uint32 */\nexport function rotr(word, shift) {\n return (word << (32 - shift)) | (word >>> shift);\n}\n/** The rotate left (circular left shift) operation for uint32 */\nexport function rotl(word, shift) {\n return (word << shift) | ((word >>> (32 - shift)) >>> 0);\n}\n/** Is current platform little-endian? Most are. Big-Endian platform: IBM */\nexport const isLE = /* @__PURE__ */ (() => new Uint8Array(new Uint32Array([0x11223344]).buffer)[0] === 0x44)();\n/** The byte swap operation for uint32 */\nexport function byteSwap(word) {\n return (((word << 24) & 0xff000000) |\n ((word << 8) & 0xff0000) |\n ((word >>> 8) & 0xff00) |\n ((word >>> 24) & 0xff));\n}\n/** Conditionally byte swap if on a big-endian platform */\nexport const swap8IfBE = isLE\n ? (n) => n\n : (n) => byteSwap(n);\n/** @deprecated */\nexport const byteSwapIfBE = swap8IfBE;\n/** In place byte swap for Uint32Array */\nexport function byteSwap32(arr) {\n for (let i = 0; i < arr.length; i++) {\n arr[i] = byteSwap(arr[i]);\n }\n return arr;\n}\nexport const swap32IfBE = isLE\n ? (u) => u\n : byteSwap32;\n// Built-in hex conversion https://caniuse.com/mdn-javascript_builtins_uint8array_fromhex\nconst hasHexBuiltin = /* @__PURE__ */ (() => \n// @ts-ignore\ntypeof Uint8Array.from([]).toHex === 'function' && typeof Uint8Array.fromHex === 'function')();\n// Array where index 0xf0 (240) is mapped to string 'f0'\nconst hexes = /* @__PURE__ */ Array.from({ length: 256 }, (_, i) => i.toString(16).padStart(2, '0'));\n/**\n * Convert byte array to hex string. Uses built-in function, when available.\n * @example bytesToHex(Uint8Array.from([0xca, 0xfe, 0x01, 0x23])) // 'cafe0123'\n */\nexport function bytesToHex(bytes) {\n abytes(bytes);\n // @ts-ignore\n if (hasHexBuiltin)\n return bytes.toHex();\n // pre-caching improves the speed 6x\n let hex = '';\n for (let i = 0; i < bytes.length; i++) {\n hex += hexes[bytes[i]];\n }\n return hex;\n}\n// We use optimized technique to convert hex string to byte array\nconst asciis = { _0: 48, _9: 57, A: 65, F: 70, a: 97, f: 102 };\nfunction asciiToBase16(ch) {\n if (ch >= asciis._0 && ch <= asciis._9)\n return ch - asciis._0; // '2' => 50-48\n if (ch >= asciis.A && ch <= asciis.F)\n return ch - (asciis.A - 10); // 'B' => 66-(65-10)\n if (ch >= asciis.a && ch <= asciis.f)\n return ch - (asciis.a - 10); // 'b' => 98-(97-10)\n return;\n}\n/**\n * Convert hex string to byte array. Uses built-in function, when available.\n * @example hexToBytes('cafe0123') // Uint8Array.from([0xca, 0xfe, 0x01, 0x23])\n */\nexport function hexToBytes(hex) {\n if (typeof hex !== 'string')\n throw new Error('hex string expected, got ' + typeof hex);\n // @ts-ignore\n if (hasHexBuiltin)\n return Uint8Array.fromHex(hex);\n const hl = hex.length;\n const al = hl / 2;\n if (hl % 2)\n throw new Error('hex string expected, got unpadded hex of length ' + hl);\n const array = new Uint8Array(al);\n for (let ai = 0, hi = 0; ai < al; ai++, hi += 2) {\n const n1 = asciiToBase16(hex.charCodeAt(hi));\n const n2 = asciiToBase16(hex.charCodeAt(hi + 1));\n if (n1 === undefined || n2 === undefined) {\n const char = hex[hi] + hex[hi + 1];\n throw new Error('hex string expected, got non-hex character \"' + char + '\" at index ' + hi);\n }\n array[ai] = n1 * 16 + n2; // multiply first octet, e.g. 'a3' => 10*16+3 => 160 + 3 => 163\n }\n return array;\n}\n/**\n * There is no setImmediate in browser and setTimeout is slow.\n * Call of async fn will return Promise, which will be fullfiled only on\n * next scheduler queue processing step and this is exactly what we need.\n */\nexport const nextTick = async () => { };\n/** Returns control to thread each 'tick' ms to avoid blocking. */\nexport async function asyncLoop(iters, tick, cb) {\n let ts = Date.now();\n for (let i = 0; i < iters; i++) {\n cb(i);\n // Date.now() is not monotonic, so in case if clock goes backwards we return return control too\n const diff = Date.now() - ts;\n if (diff >= 0 && diff < tick)\n continue;\n await nextTick();\n ts += diff;\n }\n}\n/**\n * Converts string to bytes using UTF8 encoding.\n * @example utf8ToBytes('abc') // Uint8Array.from([97, 98, 99])\n */\nexport function utf8ToBytes(str) {\n if (typeof str !== 'string')\n throw new Error('string expected');\n return new Uint8Array(new TextEncoder().encode(str)); // https://bugzil.la/1681809\n}\n/**\n * Converts bytes to string using UTF8 encoding.\n * @example bytesToUtf8(Uint8Array.from([97, 98, 99])) // 'abc'\n */\nexport function bytesToUtf8(bytes) {\n return new TextDecoder().decode(bytes);\n}\n/**\n * Normalizes (non-hex) string or Uint8Array to Uint8Array.\n * Warning: when Uint8Array is passed, it would NOT get copied.\n * Keep in mind for future mutable operations.\n */\nexport function toBytes(data) {\n if (typeof data === 'string')\n data = utf8ToBytes(data);\n abytes(data);\n return data;\n}\n/**\n * Helper for KDFs: consumes uint8array or string.\n * When string is passed, does utf8 decoding, using TextDecoder.\n */\nexport function kdfInputToBytes(data) {\n if (typeof data === 'string')\n data = utf8ToBytes(data);\n abytes(data);\n return data;\n}\n/** Copies several Uint8Arrays into one. */\nexport function concatBytes(...arrays) {\n let sum = 0;\n for (let i = 0; i < arrays.length; i++) {\n const a = arrays[i];\n abytes(a);\n sum += a.length;\n }\n const res = new Uint8Array(sum);\n for (let i = 0, pad = 0; i < arrays.length; i++) {\n const a = arrays[i];\n res.set(a, pad);\n pad += a.length;\n }\n return res;\n}\nexport function checkOpts(defaults, opts) {\n if (opts !== undefined && {}.toString.call(opts) !== '[object Object]')\n throw new Error('options should be object or undefined');\n const merged = Object.assign(defaults, opts);\n return merged;\n}\n/** For runtime check if class implements interface */\nexport class Hash {\n}\n/** Wraps hash function, creating an interface on top of it */\nexport function createHasher(hashCons) {\n const hashC = (msg) => hashCons().update(toBytes(msg)).digest();\n const tmp = hashCons();\n hashC.outputLen = tmp.outputLen;\n hashC.blockLen = tmp.blockLen;\n hashC.create = () => hashCons();\n return hashC;\n}\nexport function createOptHasher(hashCons) {\n const hashC = (msg, opts) => hashCons(opts).update(toBytes(msg)).digest();\n const tmp = hashCons({});\n hashC.outputLen = tmp.outputLen;\n hashC.blockLen = tmp.blockLen;\n hashC.create = (opts) => hashCons(opts);\n return hashC;\n}\nexport function createXOFer(hashCons) {\n const hashC = (msg, opts) => hashCons(opts).update(toBytes(msg)).digest();\n const tmp = hashCons({});\n hashC.outputLen = tmp.outputLen;\n hashC.blockLen = tmp.blockLen;\n hashC.create = (opts) => hashCons(opts);\n return hashC;\n}\nexport const wrapConstructor = createHasher;\nexport const wrapConstructorWithOpts = createOptHasher;\nexport const wrapXOFConstructorWithOpts = createXOFer;\n/** Cryptographically secure PRNG. Uses internal OS-level `crypto.getRandomValues`. */\nexport function randomBytes(bytesLength = 32) {\n if (crypto && typeof crypto.getRandomValues === 'function') {\n return crypto.getRandomValues(new Uint8Array(bytesLength));\n }\n // Legacy Node.js compatibility\n if (crypto && typeof crypto.randomBytes === 'function') {\n return Uint8Array.from(crypto.randomBytes(bytesLength));\n }\n throw new Error('crypto.getRandomValues must be defined');\n}\n//# sourceMappingURL=utils.js.map","/**\n * Internal Merkle-Damgard hash utils.\n * @module\n */\nimport { Hash, abytes, aexists, aoutput, clean, createView, toBytes } from \"./utils.js\";\n/** Polyfill for Safari 14. https://caniuse.com/mdn-javascript_builtins_dataview_setbiguint64 */\nexport function setBigUint64(view, byteOffset, value, isLE) {\n if (typeof view.setBigUint64 === 'function')\n return view.setBigUint64(byteOffset, value, isLE);\n const _32n = BigInt(32);\n const _u32_max = BigInt(0xffffffff);\n const wh = Number((value >> _32n) & _u32_max);\n const wl = Number(value & _u32_max);\n const h = isLE ? 4 : 0;\n const l = isLE ? 0 : 4;\n view.setUint32(byteOffset + h, wh, isLE);\n view.setUint32(byteOffset + l, wl, isLE);\n}\n/** Choice: a ? b : c */\nexport function Chi(a, b, c) {\n return (a & b) ^ (~a & c);\n}\n/** Majority function, true if any two inputs is true. */\nexport function Maj(a, b, c) {\n return (a & b) ^ (a & c) ^ (b & c);\n}\n/**\n * Merkle-Damgard hash construction base class.\n * Could be used to create MD5, RIPEMD, SHA1, SHA2.\n */\nexport class HashMD extends Hash {\n constructor(blockLen, outputLen, padOffset, isLE) {\n super();\n this.finished = false;\n this.length = 0;\n this.pos = 0;\n this.destroyed = false;\n this.blockLen = blockLen;\n this.outputLen = outputLen;\n this.padOffset = padOffset;\n this.isLE = isLE;\n this.buffer = new Uint8Array(blockLen);\n this.view = createView(this.buffer);\n }\n update(data) {\n aexists(this);\n data = toBytes(data);\n abytes(data);\n const { view, buffer, blockLen } = this;\n const len = data.length;\n for (let pos = 0; pos < len;) {\n const take = Math.min(blockLen - this.pos, len - pos);\n // Fast path: we have at least one block in input, cast it to view and process\n if (take === blockLen) {\n const dataView = createView(data);\n for (; blockLen <= len - pos; pos += blockLen)\n this.process(dataView, pos);\n continue;\n }\n buffer.set(data.subarray(pos, pos + take), this.pos);\n this.pos += take;\n pos += take;\n if (this.pos === blockLen) {\n this.process(view, 0);\n this.pos = 0;\n }\n }\n this.length += data.length;\n this.roundClean();\n return this;\n }\n digestInto(out) {\n aexists(this);\n aoutput(out, this);\n this.finished = true;\n // Padding\n // We can avoid allocation of buffer for padding completely if it\n // was previously not allocated here. But it won't change performance.\n const { buffer, view, blockLen, isLE } = this;\n let { pos } = this;\n // append the bit '1' to the message\n buffer[pos++] = 0b10000000;\n clean(this.buffer.subarray(pos));\n // we have less than padOffset left in buffer, so we cannot put length in\n // current block, need process it and pad again\n if (this.padOffset > blockLen - pos) {\n this.process(view, 0);\n pos = 0;\n }\n // Pad until full block byte with zeros\n for (let i = pos; i < blockLen; i++)\n buffer[i] = 0;\n // Note: sha512 requires length to be 128bit integer, but length in JS will overflow before that\n // You need to write around 2 exabytes (u64_max / 8 / (1024**6)) for this to happen.\n // So we just write lowest 64 bits of that value.\n setBigUint64(view, blockLen - 8, BigInt(this.length * 8), isLE);\n this.process(view, 0);\n const oview = createView(out);\n const len = this.outputLen;\n // NOTE: we do division by 4 later, which should be fused in single op with modulo by JIT\n if (len % 4)\n throw new Error('_sha2: outputLen should be aligned to 32bit');\n const outLen = len / 4;\n const state = this.get();\n if (outLen > state.length)\n throw new Error('_sha2: outputLen bigger than state');\n for (let i = 0; i < outLen; i++)\n oview.setUint32(4 * i, state[i], isLE);\n }\n digest() {\n const { buffer, outputLen } = this;\n this.digestInto(buffer);\n const res = buffer.slice(0, outputLen);\n this.destroy();\n return res;\n }\n _cloneInto(to) {\n to || (to = new this.constructor());\n to.set(...this.get());\n const { blockLen, buffer, length, finished, destroyed, pos } = this;\n to.destroyed = destroyed;\n to.finished = finished;\n to.length = length;\n to.pos = pos;\n if (length % blockLen)\n to.buffer.set(buffer);\n return to;\n }\n clone() {\n return this._cloneInto();\n }\n}\n/**\n * Initial SHA-2 state: fractional parts of square roots of first 16 primes 2..53.\n * Check out `test/misc/sha2-gen-iv.js` for recomputation guide.\n */\n/** Initial SHA256 state. Bits 0..32 of frac part of sqrt of primes 2..19 */\nexport const SHA256_IV = /* @__PURE__ */ Uint32Array.from([\n 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19,\n]);\n/** Initial SHA224 state. Bits 32..64 of frac part of sqrt of primes 23..53 */\nexport const SHA224_IV = /* @__PURE__ */ Uint32Array.from([\n 0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939, 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4,\n]);\n/** Initial SHA384 state. Bits 0..64 of frac part of sqrt of primes 23..53 */\nexport const SHA384_IV = /* @__PURE__ */ Uint32Array.from([\n 0xcbbb9d5d, 0xc1059ed8, 0x629a292a, 0x367cd507, 0x9159015a, 0x3070dd17, 0x152fecd8, 0xf70e5939,\n 0x67332667, 0xffc00b31, 0x8eb44a87, 0x68581511, 0xdb0c2e0d, 0x64f98fa7, 0x47b5481d, 0xbefa4fa4,\n]);\n/** Initial SHA512 state. Bits 0..64 of frac part of sqrt of primes 2..19 */\nexport const SHA512_IV = /* @__PURE__ */ Uint32Array.from([\n 0x6a09e667, 0xf3bcc908, 0xbb67ae85, 0x84caa73b, 0x3c6ef372, 0xfe94f82b, 0xa54ff53a, 0x5f1d36f1,\n 0x510e527f, 0xade682d1, 0x9b05688c, 0x2b3e6c1f, 0x1f83d9ab, 0xfb41bd6b, 0x5be0cd19, 0x137e2179,\n]);\n//# sourceMappingURL=_md.js.map","/**\n\nSHA1 (RFC 3174), MD5 (RFC 1321) and RIPEMD160 (RFC 2286) legacy, weak hash functions.\nDon't use them in a new protocol. What \"weak\" means:\n\n- Collisions can be made with 2^18 effort in MD5, 2^60 in SHA1, 2^80 in RIPEMD160.\n- No practical pre-image attacks (only theoretical, 2^123.4)\n- HMAC seems kinda ok: https://datatracker.ietf.org/doc/html/rfc6151\n * @module\n */\nimport { Chi, HashMD, Maj } from \"./_md.js\";\nimport { clean, createHasher, rotl } from \"./utils.js\";\n/** Initial SHA1 state */\nconst SHA1_IV = /* @__PURE__ */ Uint32Array.from([\n 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0,\n]);\n// Reusable temporary buffer\nconst SHA1_W = /* @__PURE__ */ new Uint32Array(80);\n/** SHA1 legacy hash class. */\nexport class SHA1 extends HashMD {\n constructor() {\n super(64, 20, 8, false);\n this.A = SHA1_IV[0] | 0;\n this.B = SHA1_IV[1] | 0;\n this.C = SHA1_IV[2] | 0;\n this.D = SHA1_IV[3] | 0;\n this.E = SHA1_IV[4] | 0;\n }\n get() {\n const { A, B, C, D, E } = this;\n return [A, B, C, D, E];\n }\n set(A, B, C, D, E) {\n this.A = A | 0;\n this.B = B | 0;\n this.C = C | 0;\n this.D = D | 0;\n this.E = E | 0;\n }\n process(view, offset) {\n for (let i = 0; i < 16; i++, offset += 4)\n SHA1_W[i] = view.getUint32(offset, false);\n for (let i = 16; i < 80; i++)\n SHA1_W[i] = rotl(SHA1_W[i - 3] ^ SHA1_W[i - 8] ^ SHA1_W[i - 14] ^ SHA1_W[i - 16], 1);\n // Compression function main loop, 80 rounds\n let { A, B, C, D, E } = this;\n for (let i = 0; i < 80; i++) {\n let F, K;\n if (i < 20) {\n F = Chi(B, C, D);\n K = 0x5a827999;\n }\n else if (i < 40) {\n F = B ^ C ^ D;\n K = 0x6ed9eba1;\n }\n else if (i < 60) {\n F = Maj(B, C, D);\n K = 0x8f1bbcdc;\n }\n else {\n F = B ^ C ^ D;\n K = 0xca62c1d6;\n }\n const T = (rotl(A, 5) + F + E + K + SHA1_W[i]) | 0;\n E = D;\n D = C;\n C = rotl(B, 30);\n B = A;\n A = T;\n }\n // Add the compressed chunk to the current hash value\n A = (A + this.A) | 0;\n B = (B + this.B) | 0;\n C = (C + this.C) | 0;\n D = (D + this.D) | 0;\n E = (E + this.E) | 0;\n this.set(A, B, C, D, E);\n }\n roundClean() {\n clean(SHA1_W);\n }\n destroy() {\n this.set(0, 0, 0, 0, 0);\n clean(this.buffer);\n }\n}\n/** SHA1 (RFC 3174) legacy hash function. It was cryptographically broken. */\nexport const sha1 = /* @__PURE__ */ createHasher(() => new SHA1());\n/** Per-round constants */\nconst p32 = /* @__PURE__ */ Math.pow(2, 32);\nconst K = /* @__PURE__ */ Array.from({ length: 64 }, (_, i) => Math.floor(p32 * Math.abs(Math.sin(i + 1))));\n/** md5 initial state: same as sha1, but 4 u32 instead of 5. */\nconst MD5_IV = /* @__PURE__ */ SHA1_IV.slice(0, 4);\n// Reusable temporary buffer\nconst MD5_W = /* @__PURE__ */ new Uint32Array(16);\n/** MD5 legacy hash class. */\nexport class MD5 extends HashMD {\n constructor() {\n super(64, 16, 8, true);\n this.A = MD5_IV[0] | 0;\n this.B = MD5_IV[1] | 0;\n this.C = MD5_IV[2] | 0;\n this.D = MD5_IV[3] | 0;\n }\n get() {\n const { A, B, C, D } = this;\n return [A, B, C, D];\n }\n set(A, B, C, D) {\n this.A = A | 0;\n this.B = B | 0;\n this.C = C | 0;\n this.D = D | 0;\n }\n process(view, offset) {\n for (let i = 0; i < 16; i++, offset += 4)\n MD5_W[i] = view.getUint32(offset, true);\n // Compression function main loop, 64 rounds\n let { A, B, C, D } = this;\n for (let i = 0; i < 64; i++) {\n let F, g, s;\n if (i < 16) {\n F = Chi(B, C, D);\n g = i;\n s = [7, 12, 17, 22];\n }\n else if (i < 32) {\n F = Chi(D, B, C);\n g = (5 * i + 1) % 16;\n s = [5, 9, 14, 20];\n }\n else if (i < 48) {\n F = B ^ C ^ D;\n g = (3 * i + 5) % 16;\n s = [4, 11, 16, 23];\n }\n else {\n F = C ^ (B | ~D);\n g = (7 * i) % 16;\n s = [6, 10, 15, 21];\n }\n F = F + A + K[i] + MD5_W[g];\n A = D;\n D = C;\n C = B;\n B = B + rotl(F, s[i % 4]);\n }\n // Add the compressed chunk to the current hash value\n A = (A + this.A) | 0;\n B = (B + this.B) | 0;\n C = (C + this.C) | 0;\n D = (D + this.D) | 0;\n this.set(A, B, C, D);\n }\n roundClean() {\n clean(MD5_W);\n }\n destroy() {\n this.set(0, 0, 0, 0);\n clean(this.buffer);\n }\n}\n/**\n * MD5 (RFC 1321) legacy hash function. It was cryptographically broken.\n * MD5 architecture is similar to SHA1, with some differences:\n * - Reduced output length: 16 bytes (128 bit) instead of 20\n * - 64 rounds, instead of 80\n * - Little-endian: could be faster, but will require more code\n * - Non-linear index selection: huge speed-up for unroll\n * - Per round constants: more memory accesses, additional speed-up for unroll\n */\nexport const md5 = /* @__PURE__ */ createHasher(() => new MD5());\n// RIPEMD-160\nconst Rho160 = /* @__PURE__ */ Uint8Array.from([\n 7, 4, 13, 1, 10, 6, 15, 3, 12, 0, 9, 5, 2, 14, 11, 8,\n]);\nconst Id160 = /* @__PURE__ */ (() => Uint8Array.from(new Array(16).fill(0).map((_, i) => i)))();\nconst Pi160 = /* @__PURE__ */ (() => Id160.map((i) => (9 * i + 5) % 16))();\nconst idxLR = /* @__PURE__ */ (() => {\n const L = [Id160];\n const R = [Pi160];\n const res = [L, R];\n for (let i = 0; i < 4; i++)\n for (let j of res)\n j.push(j[i].map((k) => Rho160[k]));\n return res;\n})();\nconst idxL = /* @__PURE__ */ (() => idxLR[0])();\nconst idxR = /* @__PURE__ */ (() => idxLR[1])();\n// const [idxL, idxR] = idxLR;\nconst shifts160 = /* @__PURE__ */ [\n [11, 14, 15, 12, 5, 8, 7, 9, 11, 13, 14, 15, 6, 7, 9, 8],\n [12, 13, 11, 15, 6, 9, 9, 7, 12, 15, 11, 13, 7, 8, 7, 7],\n [13, 15, 14, 11, 7, 7, 6, 8, 13, 14, 13, 12, 5, 5, 6, 9],\n [14, 11, 12, 14, 8, 6, 5, 5, 15, 12, 15, 14, 9, 9, 8, 6],\n [15, 12, 13, 13, 9, 5, 8, 6, 14, 11, 12, 11, 8, 6, 5, 5],\n].map((i) => Uint8Array.from(i));\nconst shiftsL160 = /* @__PURE__ */ idxL.map((idx, i) => idx.map((j) => shifts160[i][j]));\nconst shiftsR160 = /* @__PURE__ */ idxR.map((idx, i) => idx.map((j) => shifts160[i][j]));\nconst Kl160 = /* @__PURE__ */ Uint32Array.from([\n 0x00000000, 0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xa953fd4e,\n]);\nconst Kr160 = /* @__PURE__ */ Uint32Array.from([\n 0x50a28be6, 0x5c4dd124, 0x6d703ef3, 0x7a6d76e9, 0x00000000,\n]);\n// It's called f() in spec.\nfunction ripemd_f(group, x, y, z) {\n if (group === 0)\n return x ^ y ^ z;\n if (group === 1)\n return (x & y) | (~x & z);\n if (group === 2)\n return (x | ~y) ^ z;\n if (group === 3)\n return (x & z) | (y & ~z);\n return x ^ (y | ~z);\n}\n// Reusable temporary buffer\nconst BUF_160 = /* @__PURE__ */ new Uint32Array(16);\nexport class RIPEMD160 extends HashMD {\n constructor() {\n super(64, 20, 8, true);\n this.h0 = 0x67452301 | 0;\n this.h1 = 0xefcdab89 | 0;\n this.h2 = 0x98badcfe | 0;\n this.h3 = 0x10325476 | 0;\n this.h4 = 0xc3d2e1f0 | 0;\n }\n get() {\n const { h0, h1, h2, h3, h4 } = this;\n return [h0, h1, h2, h3, h4];\n }\n set(h0, h1, h2, h3, h4) {\n this.h0 = h0 | 0;\n this.h1 = h1 | 0;\n this.h2 = h2 | 0;\n this.h3 = h3 | 0;\n this.h4 = h4 | 0;\n }\n process(view, offset) {\n for (let i = 0; i < 16; i++, offset += 4)\n BUF_160[i] = view.getUint32(offset, true);\n // prettier-ignore\n let al = this.h0 | 0, ar = al, bl = this.h1 | 0, br = bl, cl = this.h2 | 0, cr = cl, dl = this.h3 | 0, dr = dl, el = this.h4 | 0, er = el;\n // Instead of iterating 0 to 80, we split it into 5 groups\n // And use the groups in constants, functions, etc. Much simpler\n for (let group = 0; group < 5; group++) {\n const rGroup = 4 - group;\n const hbl = Kl160[group], hbr = Kr160[group]; // prettier-ignore\n const rl = idxL[group], rr = idxR[group]; // prettier-ignore\n const sl = shiftsL160[group], sr = shiftsR160[group]; // prettier-ignore\n for (let i = 0; i < 16; i++) {\n const tl = (rotl(al + ripemd_f(group, bl, cl, dl) + BUF_160[rl[i]] + hbl, sl[i]) + el) | 0;\n al = el, el = dl, dl = rotl(cl, 10) | 0, cl = bl, bl = tl; // prettier-ignore\n }\n // 2 loops are 10% faster\n for (let i = 0; i < 16; i++) {\n const tr = (rotl(ar + ripemd_f(rGroup, br, cr, dr) + BUF_160[rr[i]] + hbr, sr[i]) + er) | 0;\n ar = er, er = dr, dr = rotl(cr, 10) | 0, cr = br, br = tr; // prettier-ignore\n }\n }\n // Add the compressed chunk to the current hash value\n this.set((this.h1 + cl + dr) | 0, (this.h2 + dl + er) | 0, (this.h3 + el + ar) | 0, (this.h4 + al + br) | 0, (this.h0 + bl + cr) | 0);\n }\n roundClean() {\n clean(BUF_160);\n }\n destroy() {\n this.destroyed = true;\n clean(this.buffer);\n this.set(0, 0, 0, 0, 0);\n }\n}\n/**\n * RIPEMD-160 - a legacy hash function from 1990s.\n * * https://homes.esat.kuleuven.be/~bosselae/ripemd160.html\n * * https://homes.esat.kuleuven.be/~bosselae/ripemd160/pdf/AB-9601/AB-9601.pdf\n */\nexport const ripemd160 = /* @__PURE__ */ createHasher(() => new RIPEMD160());\n//# sourceMappingURL=legacy.js.map","/**\n * RIPEMD-160 legacy hash function.\n * https://homes.esat.kuleuven.be/~bosselae/ripemd160.html\n * https://homes.esat.kuleuven.be/~bosselae/ripemd160/pdf/AB-9601/AB-9601.pdf\n * @module\n * @deprecated\n */\nimport { RIPEMD160 as RIPEMD160n, ripemd160 as ripemd160n } from \"./legacy.js\";\n/** @deprecated Use import from `noble/hashes/legacy` module */\nexport const RIPEMD160 = RIPEMD160n;\n/** @deprecated Use import from `noble/hashes/legacy` module */\nexport const ripemd160 = ripemd160n;\n//# sourceMappingURL=ripemd160.js.map","/**\n * SHA2 hash function. A.k.a. sha256, sha384, sha512, sha512_224, sha512_256.\n * SHA256 is the fastest hash implementable in JS, even faster than Blake3.\n * Check out [RFC 4634](https://datatracker.ietf.org/doc/html/rfc4634) and\n * [FIPS 180-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf).\n * @module\n */\nimport { Chi, HashMD, Maj, SHA224_IV, SHA256_IV, SHA384_IV, SHA512_IV } from \"./_md.js\";\nimport * as u64 from \"./_u64.js\";\nimport { clean, createHasher, rotr } from \"./utils.js\";\n/**\n * Round constants:\n * First 32 bits of fractional parts of the cube roots of the first 64 primes 2..311)\n */\n// prettier-ignore\nconst SHA256_K = /* @__PURE__ */ Uint32Array.from([\n 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\n 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\n 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\n 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\n 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\n 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\n 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\n 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2\n]);\n/** Reusable temporary buffer. \"W\" comes straight from spec. */\nconst SHA256_W = /* @__PURE__ */ new Uint32Array(64);\nexport class SHA256 extends HashMD {\n constructor(outputLen = 32) {\n super(64, outputLen, 8, false);\n // We cannot use array here since array allows indexing by variable\n // which means optimizer/compiler cannot use registers.\n this.A = SHA256_IV[0] | 0;\n this.B = SHA256_IV[1] | 0;\n this.C = SHA256_IV[2] | 0;\n this.D = SHA256_IV[3] | 0;\n this.E = SHA256_IV[4] | 0;\n this.F = SHA256_IV[5] | 0;\n this.G = SHA256_IV[6] | 0;\n this.H = SHA256_IV[7] | 0;\n }\n get() {\n const { A, B, C, D, E, F, G, H } = this;\n return [A, B, C, D, E, F, G, H];\n }\n // prettier-ignore\n set(A, B, C, D, E, F, G, H) {\n this.A = A | 0;\n this.B = B | 0;\n this.C = C | 0;\n this.D = D | 0;\n this.E = E | 0;\n this.F = F | 0;\n this.G = G | 0;\n this.H = H | 0;\n }\n process(view, offset) {\n // Extend the first 16 words into the remaining 48 words w[16..63] of the message schedule array\n for (let i = 0; i < 16; i++, offset += 4)\n SHA256_W[i] = view.getUint32(offset, false);\n for (let i = 16; i < 64; i++) {\n const W15 = SHA256_W[i - 15];\n const W2 = SHA256_W[i - 2];\n const s0 = rotr(W15, 7) ^ rotr(W15, 18) ^ (W15 >>> 3);\n const s1 = rotr(W2, 17) ^ rotr(W2, 19) ^ (W2 >>> 10);\n SHA256_W[i] = (s1 + SHA256_W[i - 7] + s0 + SHA256_W[i - 16]) | 0;\n }\n // Compression function main loop, 64 rounds\n let { A, B, C, D, E, F, G, H } = this;\n for (let i = 0; i < 64; i++) {\n const sigma1 = rotr(E, 6) ^ rotr(E, 11) ^ rotr(E, 25);\n const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;\n const sigma0 = rotr(A, 2) ^ rotr(A, 13) ^ rotr(A, 22);\n const T2 = (sigma0 + Maj(A, B, C)) | 0;\n H = G;\n G = F;\n F = E;\n E = (D + T1) | 0;\n D = C;\n C = B;\n B = A;\n A = (T1 + T2) | 0;\n }\n // Add the compressed chunk to the current hash value\n A = (A + this.A) | 0;\n B = (B + this.B) | 0;\n C = (C + this.C) | 0;\n D = (D + this.D) | 0;\n E = (E + this.E) | 0;\n F = (F + this.F) | 0;\n G = (G + this.G) | 0;\n H = (H + this.H) | 0;\n this.set(A, B, C, D, E, F, G, H);\n }\n roundClean() {\n clean(SHA256_W);\n }\n destroy() {\n this.set(0, 0, 0, 0, 0, 0, 0, 0);\n clean(this.buffer);\n }\n}\nexport class SHA224 extends SHA256 {\n constructor() {\n super(28);\n this.A = SHA224_IV[0] | 0;\n this.B = SHA224_IV[1] | 0;\n this.C = SHA224_IV[2] | 0;\n this.D = SHA224_IV[3] | 0;\n this.E = SHA224_IV[4] | 0;\n this.F = SHA224_IV[5] | 0;\n this.G = SHA224_IV[6] | 0;\n this.H = SHA224_IV[7] | 0;\n }\n}\n// SHA2-512 is slower than sha256 in js because u64 operations are slow.\n// Round contants\n// First 32 bits of the fractional parts of the cube roots of the first 80 primes 2..409\n// prettier-ignore\nconst K512 = /* @__PURE__ */ (() => u64.split([\n '0x428a2f98d728ae22', '0x7137449123ef65cd', '0xb5c0fbcfec4d3b2f', '0xe9b5dba58189dbbc',\n '0x3956c25bf348b538', '0x59f111f1b605d019', '0x923f82a4af194f9b', '0xab1c5ed5da6d8118',\n '0xd807aa98a3030242', '0x12835b0145706fbe', '0x243185be4ee4b28c', '0x550c7dc3d5ffb4e2',\n '0x72be5d74f27b896f', '0x80deb1fe3b1696b1', '0x9bdc06a725c71235', '0xc19bf174cf692694',\n '0xe49b69c19ef14ad2', '0xefbe4786384f25e3', '0x0fc19dc68b8cd5b5', '0x240ca1cc77ac9c65',\n '0x2de92c6f592b0275', '0x4a7484aa6ea6e483', '0x5cb0a9dcbd41fbd4', '0x76f988da831153b5',\n '0x983e5152ee66dfab', '0xa831c66d2db43210', '0xb00327c898fb213f', '0xbf597fc7beef0ee4',\n '0xc6e00bf33da88fc2', '0xd5a79147930aa725', '0x06ca6351e003826f', '0x142929670a0e6e70',\n '0x27b70a8546d22ffc', '0x2e1b21385c26c926', '0x4d2c6dfc5ac42aed', '0x53380d139d95b3df',\n '0x650a73548baf63de', '0x766a0abb3c77b2a8', '0x81c2c92e47edaee6', '0x92722c851482353b',\n '0xa2bfe8a14cf10364', '0xa81a664bbc423001', '0xc24b8b70d0f89791', '0xc76c51a30654be30',\n '0xd192e819d6ef5218', '0xd69906245565a910', '0xf40e35855771202a', '0x106aa07032bbd1b8',\n '0x19a4c116b8d2d0c8', '0x1e376c085141ab53', '0x2748774cdf8eeb99', '0x34b0bcb5e19b48a8',\n '0x391c0cb3c5c95a63', '0x4ed8aa4ae3418acb', '0x5b9cca4f7763e373', '0x682e6ff3d6b2b8a3',\n '0x748f82ee5defb2fc', '0x78a5636f43172f60', '0x84c87814a1f0ab72', '0x8cc702081a6439ec',\n '0x90befffa23631e28', '0xa4506cebde82bde9', '0xbef9a3f7b2c67915', '0xc67178f2e372532b',\n '0xca273eceea26619c', '0xd186b8c721c0c207', '0xeada7dd6cde0eb1e', '0xf57d4f7fee6ed178',\n '0x06f067aa72176fba', '0x0a637dc5a2c898a6', '0x113f9804bef90dae', '0x1b710b35131c471b',\n '0x28db77f523047d84', '0x32caab7b40c72493', '0x3c9ebe0a15c9bebc', '0x431d67c49c100d4c',\n '0x4cc5d4becb3e42b6', '0x597f299cfc657e2a', '0x5fcb6fab3ad6faec', '0x6c44198c4a475817'\n].map(n => BigInt(n))))();\nconst SHA512_Kh = /* @__PURE__ */ (() => K512[0])();\nconst SHA512_Kl = /* @__PURE__ */ (() => K512[1])();\n// Reusable temporary buffers\nconst SHA512_W_H = /* @__PURE__ */ new Uint32Array(80);\nconst SHA512_W_L = /* @__PURE__ */ new Uint32Array(80);\nexport class SHA512 extends HashMD {\n constructor(outputLen = 64) {\n super(128, outputLen, 16, false);\n // We cannot use array here since array allows indexing by variable\n // which means optimizer/compiler cannot use registers.\n // h -- high 32 bits, l -- low 32 bits\n this.Ah = SHA512_IV[0] | 0;\n this.Al = SHA512_IV[1] | 0;\n this.Bh = SHA512_IV[2] | 0;\n this.Bl = SHA512_IV[3] | 0;\n this.Ch = SHA512_IV[4] | 0;\n this.Cl = SHA512_IV[5] | 0;\n this.Dh = SHA512_IV[6] | 0;\n this.Dl = SHA512_IV[7] | 0;\n this.Eh = SHA512_IV[8] | 0;\n this.El = SHA512_IV[9] | 0;\n this.Fh = SHA512_IV[10] | 0;\n this.Fl = SHA512_IV[11] | 0;\n this.Gh = SHA512_IV[12] | 0;\n this.Gl = SHA512_IV[13] | 0;\n this.Hh = SHA512_IV[14] | 0;\n this.Hl = SHA512_IV[15] | 0;\n }\n // prettier-ignore\n get() {\n const { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;\n return [Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl];\n }\n // prettier-ignore\n set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl) {\n this.Ah = Ah | 0;\n this.Al = Al | 0;\n this.Bh = Bh | 0;\n this.Bl = Bl | 0;\n this.Ch = Ch | 0;\n this.Cl = Cl | 0;\n this.Dh = Dh | 0;\n this.Dl = Dl | 0;\n this.Eh = Eh | 0;\n this.El = El | 0;\n this.Fh = Fh | 0;\n this.Fl = Fl | 0;\n this.Gh = Gh | 0;\n this.Gl = Gl | 0;\n this.Hh = Hh | 0;\n this.Hl = Hl | 0;\n }\n process(view, offset) {\n // Extend the first 16 words into the remaining 64 words w[16..79] of the message schedule array\n for (let i = 0; i < 16; i++, offset += 4) {\n SHA512_W_H[i] = view.getUint32(offset);\n SHA512_W_L[i] = view.getUint32((offset += 4));\n }\n for (let i = 16; i < 80; i++) {\n // s0 := (w[i-15] rightrotate 1) xor (w[i-15] rightrotate 8) xor (w[i-15] rightshift 7)\n const W15h = SHA512_W_H[i - 15] | 0;\n const W15l = SHA512_W_L[i - 15] | 0;\n const s0h = u64.rotrSH(W15h, W15l, 1) ^ u64.rotrSH(W15h, W15l, 8) ^ u64.shrSH(W15h, W15l, 7);\n const s0l = u64.rotrSL(W15h, W15l, 1) ^ u64.rotrSL(W15h, W15l, 8) ^ u64.shrSL(W15h, W15l, 7);\n // s1 := (w[i-2] rightrotate 19) xor (w[i-2] rightrotate 61) xor (w[i-2] rightshift 6)\n const W2h = SHA512_W_H[i - 2] | 0;\n const W2l = SHA512_W_L[i - 2] | 0;\n const s1h = u64.rotrSH(W2h, W2l, 19) ^ u64.rotrBH(W2h, W2l, 61) ^ u64.shrSH(W2h, W2l, 6);\n const s1l = u64.rotrSL(W2h, W2l, 19) ^ u64.rotrBL(W2h, W2l, 61) ^ u64.shrSL(W2h, W2l, 6);\n // SHA256_W[i] = s0 + s1 + SHA256_W[i - 7] + SHA256_W[i - 16];\n const SUMl = u64.add4L(s0l, s1l, SHA512_W_L[i - 7], SHA512_W_L[i - 16]);\n const SUMh = u64.add4H(SUMl, s0h, s1h, SHA512_W_H[i - 7], SHA512_W_H[i - 16]);\n SHA512_W_H[i] = SUMh | 0;\n SHA512_W_L[i] = SUMl | 0;\n }\n let { Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl } = this;\n // Compression function main loop, 80 rounds\n for (let i = 0; i < 80; i++) {\n // S1 := (e rightrotate 14) xor (e rightrotate 18) xor (e rightrotate 41)\n const sigma1h = u64.rotrSH(Eh, El, 14) ^ u64.rotrSH(Eh, El, 18) ^ u64.rotrBH(Eh, El, 41);\n const sigma1l = u64.rotrSL(Eh, El, 14) ^ u64.rotrSL(Eh, El, 18) ^ u64.rotrBL(Eh, El, 41);\n //const T1 = (H + sigma1 + Chi(E, F, G) + SHA256_K[i] + SHA256_W[i]) | 0;\n const CHIh = (Eh & Fh) ^ (~Eh & Gh);\n const CHIl = (El & Fl) ^ (~El & Gl);\n // T1 = H + sigma1 + Chi(E, F, G) + SHA512_K[i] + SHA512_W[i]\n // prettier-ignore\n const T1ll = u64.add5L(Hl, sigma1l, CHIl, SHA512_Kl[i], SHA512_W_L[i]);\n const T1h = u64.add5H(T1ll, Hh, sigma1h, CHIh, SHA512_Kh[i], SHA512_W_H[i]);\n const T1l = T1ll | 0;\n // S0 := (a rightrotate 28) xor (a rightrotate 34) xor (a rightrotate 39)\n const sigma0h = u64.rotrSH(Ah, Al, 28) ^ u64.rotrBH(Ah, Al, 34) ^ u64.rotrBH(Ah, Al, 39);\n const sigma0l = u64.rotrSL(Ah, Al, 28) ^ u64.rotrBL(Ah, Al, 34) ^ u64.rotrBL(Ah, Al, 39);\n const MAJh = (Ah & Bh) ^ (Ah & Ch) ^ (Bh & Ch);\n const MAJl = (Al & Bl) ^ (Al & Cl) ^ (Bl & Cl);\n Hh = Gh | 0;\n Hl = Gl | 0;\n Gh = Fh | 0;\n Gl = Fl | 0;\n Fh = Eh | 0;\n Fl = El | 0;\n ({ h: Eh, l: El } = u64.add(Dh | 0, Dl | 0, T1h | 0, T1l | 0));\n Dh = Ch | 0;\n Dl = Cl | 0;\n Ch = Bh | 0;\n Cl = Bl | 0;\n Bh = Ah | 0;\n Bl = Al | 0;\n const All = u64.add3L(T1l, sigma0l, MAJl);\n Ah = u64.add3H(All, T1h, sigma0h, MAJh);\n Al = All | 0;\n }\n // Add the compressed chunk to the current hash value\n ({ h: Ah, l: Al } = u64.add(this.Ah | 0, this.Al | 0, Ah | 0, Al | 0));\n ({ h: Bh, l: Bl } = u64.add(this.Bh | 0, this.Bl | 0, Bh | 0, Bl | 0));\n ({ h: Ch, l: Cl } = u64.add(this.Ch | 0, this.Cl | 0, Ch | 0, Cl | 0));\n ({ h: Dh, l: Dl } = u64.add(this.Dh | 0, this.Dl | 0, Dh | 0, Dl | 0));\n ({ h: Eh, l: El } = u64.add(this.Eh | 0, this.El | 0, Eh | 0, El | 0));\n ({ h: Fh, l: Fl } = u64.add(this.Fh | 0, this.Fl | 0, Fh | 0, Fl | 0));\n ({ h: Gh, l: Gl } = u64.add(this.Gh | 0, this.Gl | 0, Gh | 0, Gl | 0));\n ({ h: Hh, l: Hl } = u64.add(this.Hh | 0, this.Hl | 0, Hh | 0, Hl | 0));\n this.set(Ah, Al, Bh, Bl, Ch, Cl, Dh, Dl, Eh, El, Fh, Fl, Gh, Gl, Hh, Hl);\n }\n roundClean() {\n clean(SHA512_W_H, SHA512_W_L);\n }\n destroy() {\n clean(this.buffer);\n this.set(0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0);\n }\n}\nexport class SHA384 extends SHA512 {\n constructor() {\n super(48);\n this.Ah = SHA384_IV[0] | 0;\n this.Al = SHA384_IV[1] | 0;\n this.Bh = SHA384_IV[2] | 0;\n this.Bl = SHA384_IV[3] | 0;\n this.Ch = SHA384_IV[4] | 0;\n this.Cl = SHA384_IV[5] | 0;\n this.Dh = SHA384_IV[6] | 0;\n this.Dl = SHA384_IV[7] | 0;\n this.Eh = SHA384_IV[8] | 0;\n this.El = SHA384_IV[9] | 0;\n this.Fh = SHA384_IV[10] | 0;\n this.Fl = SHA384_IV[11] | 0;\n this.Gh = SHA384_IV[12] | 0;\n this.Gl = SHA384_IV[13] | 0;\n this.Hh = SHA384_IV[14] | 0;\n this.Hl = SHA384_IV[15] | 0;\n }\n}\n/**\n * Truncated SHA512/256 and SHA512/224.\n * SHA512_IV is XORed with 0xa5a5a5a5a5a5a5a5, then used as \"intermediary\" IV of SHA512/t.\n * Then t hashes string to produce result IV.\n * See `test/misc/sha2-gen-iv.js`.\n */\n/** SHA512/224 IV */\nconst T224_IV = /* @__PURE__ */ Uint32Array.from([\n 0x8c3d37c8, 0x19544da2, 0x73e19966, 0x89dcd4d6, 0x1dfab7ae, 0x32ff9c82, 0x679dd514, 0x582f9fcf,\n 0x0f6d2b69, 0x7bd44da8, 0x77e36f73, 0x04c48942, 0x3f9d85a8, 0x6a1d36c8, 0x1112e6ad, 0x91d692a1,\n]);\n/** SHA512/256 IV */\nconst T256_IV = /* @__PURE__ */ Uint32Array.from([\n 0x22312194, 0xfc2bf72c, 0x9f555fa3, 0xc84c64c2, 0x2393b86b, 0x6f53b151, 0x96387719, 0x5940eabd,\n 0x96283ee2, 0xa88effe3, 0xbe5e1e25, 0x53863992, 0x2b0199fc, 0x2c85b8aa, 0x0eb72ddc, 0x81c52ca2,\n]);\nexport class SHA512_224 extends SHA512 {\n constructor() {\n super(28);\n this.Ah = T224_IV[0] | 0;\n this.Al = T224_IV[1] | 0;\n this.Bh = T224_IV[2] | 0;\n this.Bl = T224_IV[3] | 0;\n this.Ch = T224_IV[4] | 0;\n this.Cl = T224_IV[5] | 0;\n this.Dh = T224_IV[6] | 0;\n this.Dl = T224_IV[7] | 0;\n this.Eh = T224_IV[8] | 0;\n this.El = T224_IV[9] | 0;\n this.Fh = T224_IV[10] | 0;\n this.Fl = T224_IV[11] | 0;\n this.Gh = T224_IV[12] | 0;\n this.Gl = T224_IV[13] | 0;\n this.Hh = T224_IV[14] | 0;\n this.Hl = T224_IV[15] | 0;\n }\n}\nexport class SHA512_256 extends SHA512 {\n constructor() {\n super(32);\n this.Ah = T256_IV[0] | 0;\n this.Al = T256_IV[1] | 0;\n this.Bh = T256_IV[2] | 0;\n this.Bl = T256_IV[3] | 0;\n this.Ch = T256_IV[4] | 0;\n this.Cl = T256_IV[5] | 0;\n this.Dh = T256_IV[6] | 0;\n this.Dl = T256_IV[7] | 0;\n this.Eh = T256_IV[8] | 0;\n this.El = T256_IV[9] | 0;\n this.Fh = T256_IV[10] | 0;\n this.Fl = T256_IV[11] | 0;\n this.Gh = T256_IV[12] | 0;\n this.Gl = T256_IV[13] | 0;\n this.Hh = T256_IV[14] | 0;\n this.Hl = T256_IV[15] | 0;\n }\n}\n/**\n * SHA2-256 hash function from RFC 4634.\n *\n * It is the fastest JS hash, even faster than Blake3.\n * To break sha256 using birthday attack, attackers need to try 2^128 hashes.\n * BTC network is doing 2^70 hashes/sec (2^95 hashes/year) as per 2025.\n */\nexport const sha256 = /* @__PURE__ */ createHasher(() => new SHA256());\n/** SHA2-224 hash function from RFC 4634 */\nexport const sha224 = /* @__PURE__ */ createHasher(() => new SHA224());\n/** SHA2-512 hash function from RFC 4634. */\nexport const sha512 = /* @__PURE__ */ createHasher(() => new SHA512());\n/** SHA2-384 hash function from RFC 4634. */\nexport const sha384 = /* @__PURE__ */ createHasher(() => new SHA384());\n/**\n * SHA2-512/256 \"truncated\" hash function, with improved resistance to length extension attacks.\n * See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).\n */\nexport const sha512_256 = /* @__PURE__ */ createHasher(() => new SHA512_256());\n/**\n * SHA2-512/224 \"truncated\" hash function, with improved resistance to length extension attacks.\n * See the paper on [truncated SHA512](https://eprint.iacr.org/2010/548.pdf).\n */\nexport const sha512_224 = /* @__PURE__ */ createHasher(() => new SHA512_224());\n//# sourceMappingURL=sha2.js.map","/**\n * SHA2-256 a.k.a. sha256. In JS, it is the fastest hash, even faster than Blake3.\n *\n * To break sha256 using birthday attack, attackers need to try 2^128 hashes.\n * BTC network is doing 2^70 hashes/sec (2^95 hashes/year) as per 2025.\n *\n * Check out [FIPS 180-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf).\n * @module\n * @deprecated\n */\nimport { SHA224 as SHA224n, sha224 as sha224n, SHA256 as SHA256n, sha256 as sha256n, } from \"./sha2.js\";\n/** @deprecated Use import from `noble/hashes/sha2` module */\nexport const SHA256 = SHA256n;\n/** @deprecated Use import from `noble/hashes/sha2` module */\nexport const sha256 = sha256n;\n/** @deprecated Use import from `noble/hashes/sha2` module */\nexport const SHA224 = SHA224n;\n/** @deprecated Use import from `noble/hashes/sha2` module */\nexport const sha224 = sha224n;\n//# sourceMappingURL=sha256.js.map","import { secp256k1 } from '@noble/curves/secp256k1.js';\nimport { ripemd160 } from '@noble/hashes/ripemd160';\nimport { sha256 } from '@noble/hashes/sha256';\nimport { randomBytes } from 'crypto';\nimport {\n DigiIDCallbackData,\n DigiIDError,\n DigiIDUriOptions,\n DigiIDVerificationResult,\n DigiIDVerifyOptions\n} from './types';\n\n/**\n * Base58 alphabet used for Bitcoin/DigiByte addresses\n */\nconst BASE58_ALPHABET = '123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz';\n\n/**\n * Decode a base58 string to bytes\n */\nfunction base58Decode(str: string): Uint8Array {\n const bytes: number[] = [0];\n for (let i = 0; i < str.length; i++) {\n const char = str[i];\n if (!char) continue;\n const value = BASE58_ALPHABET.indexOf(char);\n if (value === -1) throw new Error('Invalid base58 character');\n\n for (let j = 0; j < bytes.length; j++) {\n bytes[j]! *= 58;\n }\n bytes[0]! += value;\n\n let carry = 0;\n for (let j = 0; j < bytes.length; j++) {\n const byte = bytes[j]!;\n bytes[j] = byte + carry;\n carry = bytes[j]! >> 8;\n bytes[j]! &= 0xff;\n }\n while (carry > 0) {\n bytes.push(carry & 0xff);\n carry >>= 8;\n }\n }\n\n // Add leading zeros\n for (let i = 0; i < str.length && str[i] === '1'; i++) {\n bytes.push(0);\n }\n\n return new Uint8Array(bytes.reverse());\n}\n\n/**\n * Decode a bech32 address (simplified for verification purposes)\n */\nfunction decodeBech32(address: string): { version: number; program: Uint8Array } | null {\n const CHARSET = 'qpzry9x8gf2tvdw0s3jn54khce6mua7l';\n\n const lowerAddr = address.toLowerCase();\n const parts = lowerAddr.split('1');\n if (parts.length !== 2) return null;\n\n const hrp = parts[0];\n const data = parts[1];\n if (!hrp || !data) return null;\n if (hrp !== 'dgb') return null;\n\n const values: number[] = [];\n for (const char of data) {\n const val = CHARSET.indexOf(char);\n if (val === -1) return null;\n values.push(val);\n }\n\n // Remove checksum (last 6 chars)\n const payload = values.slice(0, -6);\n if (payload.length < 1) return null;\n\n const version = payload[0];\n if (version === undefined) return null;\n\n // Convert from 5-bit to 8-bit\n const converted = convertBits(payload.slice(1), 5, 8, false);\n if (!converted) return null;\n\n return { version, program: new Uint8Array(converted) };\n}\n\n/**\n * Convert bits between different bit groups\n */\nfunction convertBits(data: number[], fromBits: number, toBits: number, pad: boolean): number[] | null {\n let acc = 0;\n let bits = 0;\n const result: number[] = [];\n const maxv = (1 << toBits) - 1;\n\n for (const value of data) {\n if (value < 0 || value >> fromBits !== 0) return null;\n acc = (acc << fromBits) | value;\n bits += fromBits;\n while (bits >= toBits) {\n bits -= toBits;\n result.push((acc >> bits) & maxv);\n }\n }\n\n if (pad) {\n if (bits > 0) result.push((acc << (toBits - bits)) & maxv);\n } else if (bits >= fromBits || ((acc << (toBits - bits)) & maxv)) {\n return null;\n }\n\n return result;\n}\n\n/**\n * Hash message with Bitcoin/DigiByte message signing format\n */\nfunction hashMessage(message: string, messagePrefix: string): Uint8Array {\n // The messagePrefix already includes the length byte (e.g., '\\x19DigiByte Signed Message:\\n')\n // where \\x19 = 25 = length of \"DigiByte Signed Message:\\n\"\n const prefixBuffer = new TextEncoder().encode(messagePrefix);\n\n const messageBuffer = new TextEncoder().encode(message);\n const messageLengthBytes: number[] = [];\n let messageLength = messageBuffer.length;\n\n // Encode message length as variable-length integer\n if (messageLength < 0xfd) {\n messageLengthBytes.push(messageLength);\n } else if (messageLength <= 0xffff) {\n messageLengthBytes.push(0xfd, messageLength & 0xff, (messageLength >> 8) & 0xff);\n } else if (messageLength <= 0xffffffff) {\n messageLengthBytes.push(\n 0xfe,\n messageLength & 0xff,\n (messageLength >> 8) & 0xff,\n (messageLength >> 16) & 0xff,\n (messageLength >> 24) & 0xff\n );\n } else {\n throw new Error('Message too long');\n }\n\n const messageLengthBuffer = new Uint8Array(messageLengthBytes);\n\n // Concatenate: prefix + messageLengthBuffer + message\n const totalLength = prefixBuffer.length + messageLengthBuffer.length + messageBuffer.length;\n const combined = new Uint8Array(totalLength);\n let offset = 0;\n\n combined.set(prefixBuffer, offset);\n offset += prefixBuffer.length;\n combined.set(messageLengthBuffer, offset);\n offset += messageLengthBuffer.length;\n combined.set(messageBuffer, offset);\n\n // Double SHA256\n return sha256(sha256(combined));\n}\n\n/**\n * Recover public key from signature\n */\nfunction recoverPublicKey(messageHash: Uint8Array, signature: Uint8Array): Uint8Array[] {\n if (signature.length !== 65) {\n throw new Error('Invalid signature length');\n }\n\n const firstByte = signature[0];\n if (firstByte === undefined) throw new Error('Invalid signature');\n\n const r = signature.slice(1, 33);\n const s = signature.slice(33, 65);\n\n const results: Uint8Array[] = [];\n\n // Try all recovery IDs (0-3) to be thorough\n // Some implementations may encode the recovery ID differently\n for (let recId = 0; recId < 4; recId++) {\n try {\n // Create signature object\n const sig = new secp256k1.Signature(\n BigInt('0x' + Array.from(r).map(b => b.toString(16).padStart(2, '0')).join('')),\n BigInt('0x' + Array.from(s).map(b => b.toString(16).padStart(2, '0')).join(''))\n ).addRecoveryBit(recId);\n\n const point = sig.recoverPublicKey(messageHash);\n\n // Add both compressed and uncompressed versions\n const compressedBytes = point.toBytes(true);\n const uncompressedBytes = point.toBytes(false);\n\n // Add compressed first (more common for SegWit)\n results.push(compressedBytes);\n results.push(uncompressedBytes);\n } catch (e) {\n // This recovery ID didn't work, try the next one\n continue;\n }\n }\n\n if (results.length === 0) {\n throw new Error('Failed to recover any public keys');\n }\n\n return results;\n}\n\n/**\n * Hash160: RIPEMD160(SHA256(data))\n */\nfunction hash160(buffer: Uint8Array): Uint8Array {\n return ripemd160(sha256(buffer));\n}\n\n/**\n * Verify address matches public key\n */\nfunction verifyAddress(address: string, publicKey: Uint8Array): boolean {\n // Legacy address (starts with D or S)\n if (address.startsWith('D') || address.startsWith('S')) {\n try {\n const decoded = base58Decode(address);\n if (decoded.length < 25) return false;\n\n const payload = decoded.slice(0, -4);\n const checksum = decoded.slice(-4);\n\n const hash = sha256(sha256(payload));\n const expectedChecksum = hash.slice(0, 4);\n\n // Verify checksum\n if (!checksum.every((byte, i) => byte === expectedChecksum[i])) {\n return false;\n }\n\n const pubKeyHash = payload.slice(1);\n const computedHash = hash160(publicKey);\n\n return pubKeyHash.every((byte, i) => byte === computedHash[i]);\n } catch {\n return false;\n }\n }\n\n // Bech32 address (starts with dgb1)\n if (address.toLowerCase().startsWith('dgb1')) {\n try {\n const decoded = decodeBech32(address);\n if (!decoded) return false;\n\n const { version, program } = decoded;\n\n if (version === 0) {\n // For witness v0 P2WPKH, use hash160 of compressed public key\n let pkToHash = publicKey;\n\n // If uncompressed (65 bytes), convert to compressed (33 bytes)\n if (publicKey.length === 65) {\n const isEven = publicKey[64]! % 2 === 0;\n pkToHash = new Uint8Array(33);\n pkToHash[0] = isEven ? 0x02 : 0x03;\n pkToHash.set(publicKey.slice(1, 33), 1);\n }\n\n const computedHash = hash160(pkToHash);\n return program.every((byte, i) => byte === computedHash[i]);\n }\n\n return false;\n } catch {\n return false;\n }\n }\n\n return false;\n}\n\n/**\n * INTERNAL: Verifies the signature using @noble/curves.\n * Exported primarily for testing purposes (mocking/spying).\n * @internal\n */\nexport async function _internalVerifySignature(\n uri: string,\n address: string,\n signature: string\n): Promise<boolean> {\n // DigiByte Message Prefix\n const messagePrefix = '\\x19DigiByte Signed Message:\\n';\n\n try {\n // Decode base64 signature\n const sigBytes = Uint8Array.from(atob(signature), c => c.charCodeAt(0));\n\n if (sigBytes.length !== 65) {\n throw new Error('Invalid signature length');\n }\n\n // Hash the message\n const messageHash = hashMessage(uri, messagePrefix);\n\n // Recover public key from signature\n const publicKeys = recoverPublicKey(messageHash, sigBytes);\n\n // Verify that at least one recovered public key matches the address\n for (const pubKey of publicKeys) {\n if (verifyAddress(address, pubKey)) {\n return true;\n }\n }\n\n return false;\n } catch (e: unknown) {\n const errorMessage = e instanceof Error ? e.message : String(e);\n throw new DigiIDError(`Signature verification failed: ${errorMessage}`);\n }\n}\n\n/**\n * Generates a secure random nonce (hex string).\n * @param length - The number of bytes to generate (default: 16, resulting in 32 hex chars).\n * @returns A hex-encoded random string.\n */\nfunction generateNonce(length = 16): string {\n return randomBytes(length).toString('hex');\n}\n\n/**\n * Generates a DigiID authentication URI.\n *\n * @param options - Options for URI generation, including the callback URL.\n * @returns The generated DigiID URI string.\n * @throws {DigiIDError} If the callback URL is invalid or missing.\n */\nexport function generateDigiIDUri(options: DigiIDUriOptions): string {\n if (!options.callbackUrl) {\n throw new DigiIDError('Callback URL is required.');\n }\n\n let parsedUrl: URL;\n try {\n parsedUrl = new URL(options.callbackUrl);\n } catch (e) {\n throw new DigiIDError(`Invalid callback URL: ${(e as Error).message}`);\n }\n\n // DigiID spec requires stripping the scheme (http/https)\n const domainAndPath = parsedUrl.host + parsedUrl.pathname;\n\n const nonce = options.nonce || generateNonce();\n const unsecureFlag = options.unsecure ? '1' : '0'; // 1 for http, 0 for https\n\n // Validate scheme based on unsecure flag\n if (options.unsecure && parsedUrl.protocol !== 'http:') {\n throw new DigiIDError('Unsecure flag is true, but callback URL does not use http protocol.');\n }\n if (!options.unsecure && parsedUrl.protocol !== 'https:') {\n throw new DigiIDError('Callback URL must use https protocol unless unsecure flag is set to true.');\n }\n\n // Construct the URI\n // Example: digiid://example.com/callback?x=nonce_value&u=0\n const uri = `digiid://${domainAndPath}?x=${nonce}&u=${unsecureFlag}`;\n\n // Clean up potential trailing slash in path if no query params exist (though DigiID always has params)\n // This check might be redundant given DigiID structure, but good practice\n // const cleanedUri = uri.endsWith('/') && parsedUrl.search === '' ? uri.slice(0, -1) : uri;\n\n return uri;\n}\n\n/**\n * Verifies the signature and data received from a DigiID callback.\n *\n * @param callbackData - The data received from the wallet (address, uri, signature).\n * @param verifyOptions - Options for verification, including the expected callback URL and nonce.\n * @returns {Promise<DigiIDVerificationResult>} A promise that resolves with verification details if successful.\n * @throws {DigiIDError} If validation or signature verification fails.\n */\nexport async function verifyDigiIDCallback(\n callbackData: DigiIDCallbackData,\n verifyOptions: DigiIDVerifyOptions\n): Promise<DigiIDVerificationResult> {\n const { address, uri, signature } = callbackData;\n const { expectedCallbackUrl, expectedNonce } = verifyOptions;\n\n if (!address || !uri || !signature) {\n throw new DigiIDError('Missing required callback data: address, uri, or signature.');\n }\n\n // 1. Parse the received URI\n let parsedReceivedUri: URL;\n try {\n // Temporarily replace digiid:// with http:// for standard URL parsing\n const parsableUri = uri.replace(/^digiid:/, 'http:');\n parsedReceivedUri = new URL(parsableUri);\n } catch (e) {\n throw new DigiIDError(`Invalid URI received in callback: ${(e as Error).message}`);\n }\n\n const receivedNonce = parsedReceivedUri.searchParams.get('x');\n const receivedUnsecure = parsedReceivedUri.searchParams.get('u'); // 0 or 1\n const receivedDomainAndPath = parsedReceivedUri.host + parsedReceivedUri.pathname;\n\n if (receivedNonce === null || receivedUnsecure === null) {\n throw new DigiIDError('URI missing nonce (x) or unsecure (u) parameter.');\n }\n\n // 2. Validate Callback URL\n let parsedExpectedUrl: URL;\n try {\n // Allow expectedCallbackUrl to be a string or URL object\n parsedExpectedUrl = typeof expectedCallbackUrl === 'string' ? new URL(expectedCallbackUrl) : expectedCallbackUrl;\n } catch (e) {\n throw new DigiIDError(`Invalid expectedCallbackUrl provided: ${(e as Error).message}`);\n }\n\n const expectedDomainAndPath = parsedExpectedUrl.host + parsedExpectedUrl.pathname;\n\n if (receivedDomainAndPath !== expectedDomainAndPath) {\n throw new DigiIDError(`Callback URL mismatch: URI contained \"${receivedDomainAndPath}\", expected \"${expectedDomainAndPath}\"`);\n }\n\n // Validate scheme consistency\n const expectedScheme = parsedExpectedUrl.protocol;\n if (receivedUnsecure === '1' && expectedScheme !== 'http:') {\n throw new DigiIDError('URI indicates unsecure (u=1), but expectedCallbackUrl is not http.');\n }\n if (receivedUnsecure === '0' && expectedScheme !== 'https:') {\n throw new DigiIDError('URI indicates secure (u=0), but expectedCallbackUrl is not https.');\n }\n\n // 3. Validate Nonce (optional)\n if (expectedNonce && receivedNonce !== expectedNonce) {\n throw new DigiIDError(`Nonce mismatch: URI contained \"${receivedNonce}\", expected \"${expectedNonce}\". Possible replay attack.`);\n }\n\n // 4. Verify Signature using internal helper\n try {\n const isValidSignature = await _internalVerifySignature(uri, address, signature);\n if (!isValidSignature) {\n // If the helper returns false, throw the standard invalid signature error\n throw new DigiIDError('Invalid signature.');\n }\n } catch (error) {\n // If _internalVerifySignature throws (e.g., due to format/checksum errors from the lib, or our re-thrown error),\n // re-throw it. It should already be a DigiIDError.\n if (error instanceof DigiIDError) {\n throw error;\n } else {\n // Catch any unexpected errors and wrap them\n throw new DigiIDError(`Unexpected error during signature verification: ${(error as Error).message}`);\n }\n }\n\n // 5. Return successful result\n return {\n isValid: true,\n address: address,\n nonce: receivedNonce, // Return the nonce from the URI\n };\n}\n"],"names":["DigiIDError","message","isBytes","a","anumber","n","title","prefix","abytes","value","length","bytes","len","needsLen","ofLen","got","ahash","h","aexists","instance","checkFinished","aoutput","out","min","clean","arrays","i","createView","arr","rotr","word","shift","hasHexBuiltin","hexes","_","bytesToHex","hex","asciis","asciiToBase16","ch","hexToBytes","hl","al","array","ai","hi","n1","n2","char","concatBytes","sum","res","pad","createHasher","hashCons","info","hashC","msg","opts","tmp","randomBytes","bytesLength","cr","oidNist","suffix","Chi","b","c","Maj","HashMD$1","blockLen","outputLen","padOffset","isLE","__publicField","data","view","buffer","pos","take","dataView","oview","outLen","state","to","finished","destroyed","SHA256_IV","SHA256_K","SHA256_W","SHA2_32B","HashMD","A","B","C","D","E","F","G","H","offset","W15","W2","s0","s1","sigma1","T1","T2","_SHA256","sha256","_0n","_1n","abool","abignumber","isPosBig","numberToHexUnpadded","num","hexToNumber","bytesToNumberBE","bytesToHex_","bytesToNumberLE","copyBytes","abytes_","numberToBytesBE","hexToBytes_","numberToBytesLE","inRange","max","aInRange","bitLen","bitMask","createHmacDrbg","hashLen","qByteLen","hmacFn","u8n","NULL","byte0","byte1","_maxDrbgIters","v","k","reset","msgs","concatBytes_","reseed","seed","gen","sl","pred","validateObject","object","fields","optFields","checkField","fieldName","expectedType","isOpt","val","current","iter","f","memoized","fn","map","arg","args","computed","_2n","_3n","_4n","_5n","_7n","_8n","_9n","_16n","mod","result","pow2","x","power","modulo","invert","number","u","q","r","m","assertIsSquare","Fp","root","sqrt3mod4","p1div4","sqrt5mod8","p5div8","nv","sqrt9mod16","P","Fp_","Field","tn","tonelliShanks","c1","c2","c3","c4","tv1","tv2","tv3","tv4","e1","e2","e3","Q","S","Z","_Fp","FpLegendre","cc","Q1div2","M","t","R","t_tmp","exponent","FpSqrt","FIELD_FIELDS","validateField","field","initial","FpPow","p","d","FpInvertBatch","nums","passZero","inverted","multipliedAcc","acc","invertedAcc","p1mod2","powered","yes","zero","no","nLength","nBitLength","_nBitLength","nByteLength","_Field","ORDER","_nbitLength","_a","lhs","rhs","skipValidation","allowedLengths","BYTES","modFromBytes","padded","scalar","lst","condition","getFieldBytesLength","fieldOrder","bitLength","getMinHashLength","mapHashToField","key","fieldLen","minLen","reduced","negateCt","item","neg","normalizeZ","points","invertedZs","validateW","W","bits","calcWOpts","scalarBits","windows","windowSize","maxNumber","mask","shiftBy","calcOffsets","window","wOpts","wbits","nextN","offsetStart","isZero","isNeg","isNegF","pointPrecomputes","pointWindowSizes","getW","assert0","wNAF","Point","elm","point","base","precomputes","wo","offsetF","transform","comp","prev","mulEndoUnsafe","k1","k2","p1","p2","createField","order","createCurveFields","type","CURVE","curveOpts","FpFnLE","Fn","params","createKeygen","randomSecretKey","getPublicKey","secretKey","_HMAC","hash","buf","oHash","iHash","hmac","divNearest","den","_splitEndoScalar","basis","a1","b1","a2","b2","k1neg","k2neg","MAX_NUM","validateSigFormat","format","validateSigOpts","def","optsn","optName","DERErr","DER","tag","dataLen","lenLen","first","isLong","lengthBytes","int","tlv","seqBytes","seqLeftBytes","rBytes","rLeftBytes","sBytes","sLeftBytes","sig","rs","ss","seq","weierstrass","extraOpts","validated","cofactor","CURVE_ORDER","endo","lengths","getWLengths","assertCompressionIsSupported","pointToBytes","_c","isCompressed","y","bx","hasEvenY","pprefix","pointFromBytes","uncomp","head","tail","y2","weierstrassEquation","sqrtError","err","evenY","L","isValidXY","encodePoint","decodePoint","x2","x3","left","right","_4a3","_27b2","acoord","banZero","aprjpoint","other","splitEndoScalarN","toAffineMemo","iz","X","Y","is0","zz","assertValidMemo","finishEndo","endoBeta","k1p","k2p","_Point","isLazy","wnaf","X1","Y1","Z1","X2","Y2","Z2","U1","U2","b3","X3","Y3","Z3","t0","t1","t2","t3","t4","t5","fake","mul","k1f","k2f","sc","invertedZ","isTorsionFree","clearCofactor","ecdh","ecdhOpts","randomBytes_","wcRandomBytes","isValidSecretKey","isValidPublicKey","publicKey","publicKeyUncompressed","l","isProbPub","getSharedSecret","secretKeyA","publicKeyB","s","utils","keygen","ecdsa","ecdsaOpts","nobleHmac","fnBits","defaultSigOpts","hasLargeCofactor","isBiggerThanHalfOrder","HALF","validateRS","assertSmallCofactor","validateSigLength","size","sizer","Signature","recovery","recid","messageHash","radj","ir","bits2int_modN","u1","u2","rb","sb","bits2int","delta","ORDER_MASK","int2octets","validateMsgAndHash","prehash","prepSig","lowS","extraEntropy","h1int","seedArgs","e","k2sig","kBytes","ik","normS","sign","verify","signature","end","is","recoverPublicKey","secp256k1_CURVE","secp256k1_ENDO","sqrtMod","_6n","_11n","_22n","_23n","_44n","_88n","b6","b9","b11","b22","b44","b88","b176","b220","b223","Fpk1","Pointk1","secp256k1","rotl","utf8ToBytes","str","toBytes","Hash","setBigUint64","byteOffset","_32n","_u32_max","wh","wl","Rho160","Id160","Pi160","idxLR","j","idxL","idxR","shifts160","shiftsL160","idx","shiftsR160","Kl160","Kr160","ripemd_f","group","z","BUF_160","RIPEMD160","h0","h1","h2","h3","h4","ar","bl","br","cl","dl","dr","el","er","rGroup","hbl","hbr","rl","rr","sr","tl","tr","ripemd160","ripemd160n","SHA256","sha256n","BASE58_ALPHABET","base58Decode","carry","byte","decodeBech32","address","CHARSET","parts","hrp","values","payload","version","converted","convertBits","fromBits","toBits","maxv","hashMessage","messagePrefix","prefixBuffer","messageBuffer","messageLengthBytes","messageLength","messageLengthBuffer","totalLength","combined","results","recId","compressedBytes","uncompressedBytes","hash160","verifyAddress","decoded","checksum","expectedChecksum","pubKeyHash","computedHash","program","pkToHash","isEven","_internalVerifySignature","uri","sigBytes","publicKeys","pubKey","errorMessage","generateNonce","generateDigiIDUri","options","parsedUrl","domainAndPath","nonce","unsecureFlag","verifyDigiIDCallback","callbackData","verifyOptions","expectedCallbackUrl","expectedNonce","parsedReceivedUri","parsableUri","receivedNonce","receivedUnsecure","receivedDomainAndPath","parsedExpectedUrl","expectedDomainAndPath","expectedScheme","error"],"mappings":";;;;AAiDO,MAAMA,UAAoB,MAAM;AAAA,EACrC,YAAYC,GAAiB;AAC3B,UAAMA,CAAO,GACb,KAAK,OAAO;AAAA,EACd;AACF;AClDA;AAEO,SAASC,GAAQC,GAAG;AACvB,SAAOA,aAAa,cAAe,YAAY,OAAOA,CAAC,KAAKA,EAAE,YAAY,SAAS;AACvF;AAEO,SAASC,GAAQC,GAAGC,IAAQ,IAAI;AACnC,MAAI,CAAC,OAAO,cAAcD,CAAC,KAAKA,IAAI,GAAG;AACnC,UAAME,IAASD,KAAS,IAAIA,CAAK;AACjC,UAAM,IAAI,MAAM,GAAGC,CAAM,8BAA8BF,CAAC,EAAE;AAAA,EAC9D;AACJ;AAEO,SAASG,EAAOC,GAAOC,GAAQJ,IAAQ,IAAI;AAC9C,QAAMK,IAAQT,GAAQO,CAAK,GACrBG,IAAMH,KAAA,gBAAAA,EAAO,QACbI,IAAWH,MAAW;AAC5B,MAAI,CAACC,KAAUE,KAAYD,MAAQF,GAAS;AACxC,UAAMH,IAASD,KAAS,IAAIA,CAAK,MAC3BQ,IAAQD,IAAW,cAAcH,CAAM,KAAK,IAC5CK,IAAMJ,IAAQ,UAAUC,CAAG,KAAK,QAAQ,OAAOH,CAAK;AAC1D,UAAM,IAAI,MAAMF,IAAS,wBAAwBO,IAAQ,WAAWC,CAAG;AAAA,EAC3E;AACA,SAAON;AACX;AAEO,SAASO,GAAMC,GAAG;AACrB,MAAI,OAAOA,KAAM,cAAc,OAAOA,EAAE,UAAW;AAC/C,UAAM,IAAI,MAAM,yCAAyC;AAC7D,EAAAb,GAAQa,EAAE,SAAS,GACnBb,GAAQa,EAAE,QAAQ;AACtB;AAEO,SAASC,GAAQC,GAAUC,IAAgB,IAAM;AACpD,MAAID,EAAS;AACT,UAAM,IAAI,MAAM,kCAAkC;AACtD,MAAIC,KAAiBD,EAAS;AAC1B,UAAM,IAAI,MAAM,uCAAuC;AAC/D;AAEO,SAASE,GAAQC,GAAKH,GAAU;AACnCX,EAAAA,EAAOc,GAAK,QAAW,qBAAqB;AAC5C,QAAMC,IAAMJ,EAAS;AACrB,MAAIG,EAAI,SAASC;AACb,UAAM,IAAI,MAAM,sDAAsDA,CAAG;AAEjF;AAUO,SAASC,MAASC,GAAQ;AAC7B,WAASC,IAAI,GAAGA,IAAID,EAAO,QAAQC;AAC/B,IAAAD,EAAOC,CAAC,EAAE,KAAK,CAAC;AAExB;AAEO,SAASC,GAAWC,GAAK;AAC5B,SAAO,IAAI,SAASA,EAAI,QAAQA,EAAI,YAAYA,EAAI,UAAU;AAClE;AAEO,SAASC,EAAKC,GAAMC,GAAO;AAC9B,SAAQD,KAAS,KAAKC,IAAWD,MAASC;AAC9C;AA6BA,MAAMC,sBAEN,OAAO,WAAW,KAAK,CAAA,CAAE,EAAE,SAAU,cAAc,OAAO,WAAW,WAAY,YAE3EC,KAAwB,sBAAM,KAAK,EAAE,QAAQ,IAAG,GAAI,CAACC,GAAGR,MAAMA,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC;AAK5F,SAASS,GAAWxB,GAAO;AAG9B,MAFAH,EAAOG,CAAK,GAERqB;AACA,WAAOrB,EAAM,MAAK;AAEtB,MAAIyB,IAAM;AACV,WAASV,IAAI,GAAGA,IAAIf,EAAM,QAAQe;AAC9B,IAAAU,KAAOH,GAAMtB,EAAMe,CAAC,CAAC;AAEzB,SAAOU;AACX;AAEA,MAAMC,IAAS,EAAE,IAAI,IAAI,IAAI,IAAI,GAAG,IAAI,GAAG,IAAI,GAAG,IAAI,GAAG,IAAG;AAC5D,SAASC,GAAcC,GAAI;AACvB,MAAIA,KAAMF,EAAO,MAAME,KAAMF,EAAO;AAChC,WAAOE,IAAKF,EAAO;AACvB,MAAIE,KAAMF,EAAO,KAAKE,KAAMF,EAAO;AAC/B,WAAOE,KAAMF,EAAO,IAAI;AAC5B,MAAIE,KAAMF,EAAO,KAAKE,KAAMF,EAAO;AAC/B,WAAOE,KAAMF,EAAO,IAAI;AAEhC;AAKO,SAASG,GAAWJ,GAAK;AAC5B,MAAI,OAAOA,KAAQ;AACf,UAAM,IAAI,MAAM,8BAA8B,OAAOA,CAAG;AAE5D,MAAIJ;AACA,WAAO,WAAW,QAAQI,CAAG;AACjC,QAAMK,IAAKL,EAAI,QACTM,IAAKD,IAAK;AAChB,MAAIA,IAAK;AACL,UAAM,IAAI,MAAM,qDAAqDA,CAAE;AAC3E,QAAME,IAAQ,IAAI,WAAWD,CAAE;AAC/B,WAASE,IAAK,GAAGC,IAAK,GAAGD,IAAKF,GAAIE,KAAMC,KAAM,GAAG;AAC7C,UAAMC,IAAKR,GAAcF,EAAI,WAAWS,CAAE,CAAC,GACrCE,IAAKT,GAAcF,EAAI,WAAWS,IAAK,CAAC,CAAC;AAC/C,QAAIC,MAAO,UAAaC,MAAO,QAAW;AACtC,YAAMC,IAAOZ,EAAIS,CAAE,IAAIT,EAAIS,IAAK,CAAC;AACjC,YAAM,IAAI,MAAM,iDAAiDG,IAAO,gBAAgBH,CAAE;AAAA,IAC9F;AACA,IAAAF,EAAMC,CAAE,IAAIE,IAAK,KAAKC;AAAA,EAC1B;AACA,SAAOJ;AACX;AAwCO,SAASM,MAAexB,GAAQ;AACnC,MAAIyB,IAAM;AACV,WAASxB,IAAI,GAAGA,IAAID,EAAO,QAAQC,KAAK;AACpC,UAAMvB,IAAIsB,EAAOC,CAAC;AAClBlB,IAAAA,EAAOL,CAAC,GACR+C,KAAO/C,EAAE;AAAA,EACb;AACA,QAAMgD,IAAM,IAAI,WAAWD,CAAG;AAC9B,WAASxB,IAAI,GAAG0B,IAAM,GAAG1B,IAAID,EAAO,QAAQC,KAAK;AAC7C,UAAMvB,IAAIsB,EAAOC,CAAC;AAClB,IAAAyB,EAAI,IAAIhD,GAAGiD,CAAG,GACdA,KAAOjD,EAAE;AAAA,EACb;AACA,SAAOgD;AACX;AASO,SAASE,GAAaC,GAAUC,IAAO,IAAI;AAC9C,QAAMC,IAAQ,CAACC,GAAKC,MAASJ,EAASI,CAAI,EAAE,OAAOD,CAAG,EAAE,OAAM,GACxDE,IAAML,EAAS,MAAS;AAC9B,SAAAE,EAAM,YAAYG,EAAI,WACtBH,EAAM,WAAWG,EAAI,UACrBH,EAAM,SAAS,CAACE,MAASJ,EAASI,CAAI,GACtC,OAAO,OAAOF,GAAOD,CAAI,GAClB,OAAO,OAAOC,CAAK;AAC9B;AAEO,SAASI,GAAYC,IAAc,IAAI;AAC1C,QAAMC,IAAK,OAAO,cAAe,WAAW,WAAW,SAAS;AAChE,MAAI,QAAOA,KAAA,gBAAAA,EAAI,oBAAoB;AAC/B,UAAM,IAAI,MAAM,wCAAwC;AAC5D,SAAOA,EAAG,gBAAgB,IAAI,WAAWD,CAAW,CAAC;AACzD;AAEO,MAAME,KAAU,CAACC,OAAY;AAAA,EAChC,KAAK,WAAW,KAAK,CAAC,GAAM,GAAM,IAAM,KAAM,IAAM,GAAM,KAAM,GAAM,GAAM,GAAMA,CAAM,CAAC;AAC7F;AC1OO,SAASC,GAAI9D,GAAG+D,GAAGC,GAAG;AACzB,SAAQhE,IAAI+D,IAAM,CAAC/D,IAAIgE;AAC3B;AAEO,SAASC,GAAIjE,GAAG+D,GAAGC,GAAG;AACzB,SAAQhE,IAAI+D,IAAM/D,IAAIgE,IAAMD,IAAIC;AACpC;AAKO,IAAAE,KAAA,MAAa;AAAA,EAYhB,YAAYC,GAAUC,GAAWC,GAAWC,GAAM;AAXlD,IAAAC,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AAEA;AAAA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA,kBAAW;AACX,IAAAA,EAAA,gBAAS;AACT,IAAAA,EAAA,aAAM;AACN,IAAAA,EAAA,mBAAY;AAER,SAAK,WAAWJ,GAChB,KAAK,YAAYC,GACjB,KAAK,YAAYC,GACjB,KAAK,OAAOC,GACZ,KAAK,SAAS,IAAI,WAAWH,CAAQ,GACrC,KAAK,OAAO3C,GAAW,KAAK,MAAM;AAAA,EACtC;AAAA,EACA,OAAOgD,GAAM;AACTzD,IAAAA,GAAQ,IAAI,GACZV,EAAOmE,CAAI;AACX,UAAM,EAAE,MAAAC,GAAM,QAAAC,GAAQ,UAAAP,EAAQ,IAAK,MAC7B1D,IAAM+D,EAAK;AACjB,aAASG,IAAM,GAAGA,IAAMlE,KAAM;AAC1B,YAAMmE,IAAO,KAAK,IAAIT,IAAW,KAAK,KAAK1D,IAAMkE,CAAG;AAEpD,UAAIC,MAAST,GAAU;AACnB,cAAMU,IAAWrD,GAAWgD,CAAI;AAChC,eAAOL,KAAY1D,IAAMkE,GAAKA,KAAOR;AACjC,eAAK,QAAQU,GAAUF,CAAG;AAC9B;AAAA,MACJ;AACA,MAAAD,EAAO,IAAIF,EAAK,SAASG,GAAKA,IAAMC,CAAI,GAAG,KAAK,GAAG,GACnD,KAAK,OAAOA,GACZD,KAAOC,GACH,KAAK,QAAQT,MACb,KAAK,QAAQM,GAAM,CAAC,GACpB,KAAK,MAAM;AAAA,IAEnB;AACA,gBAAK,UAAUD,EAAK,QACpB,KAAK,WAAU,GACR;AAAA,EACX;AAAA,EACA,WAAWrD,GAAK;AACZJ,IAAAA,GAAQ,IAAI,GACZG,GAAQC,GAAK,IAAI,GACjB,KAAK,WAAW;AAIhB,UAAM,EAAE,QAAAuD,GAAQ,MAAAD,GAAM,UAAAN,GAAU,MAAAG,EAAI,IAAK;AACzC,QAAI,EAAE,KAAAK,EAAG,IAAK;AAEd,IAAAD,EAAOC,GAAK,IAAI,KAChBtD,GAAM,KAAK,OAAO,SAASsD,CAAG,CAAC,GAG3B,KAAK,YAAYR,IAAWQ,MAC5B,KAAK,QAAQF,GAAM,CAAC,GACpBE,IAAM;AAGV,aAASpD,IAAIoD,GAAKpD,IAAI4C,GAAU5C;AAC5B,MAAAmD,EAAOnD,CAAC,IAAI;AAIhB,IAAAkD,EAAK,aAAaN,IAAW,GAAG,OAAO,KAAK,SAAS,CAAC,GAAGG,CAAI,GAC7D,KAAK,QAAQG,GAAM,CAAC;AACpB,UAAMK,IAAQtD,GAAWL,CAAG,GACtBV,IAAM,KAAK;AAEjB,QAAIA,IAAM;AACN,YAAM,IAAI,MAAM,2CAA2C;AAC/D,UAAMsE,IAAStE,IAAM,GACfuE,IAAQ,KAAK,IAAG;AACtB,QAAID,IAASC,EAAM;AACf,YAAM,IAAI,MAAM,oCAAoC;AACxD,aAASzD,IAAI,GAAGA,IAAIwD,GAAQxD;AACxB,MAAAuD,EAAM,UAAU,IAAIvD,GAAGyD,EAAMzD,CAAC,GAAG+C,CAAI;AAAA,EAC7C;AAAA,EACA,SAAS;AACL,UAAM,EAAE,QAAAI,GAAQ,WAAAN,EAAS,IAAK;AAC9B,SAAK,WAAWM,CAAM;AACtB,UAAM1B,IAAM0B,EAAO,MAAM,GAAGN,CAAS;AACrC,gBAAK,QAAO,GACLpB;AAAA,EACX;AAAA,EACA,WAAWiC,GAAI;AACX,IAAAA,UAAO,IAAI,KAAK,YAAW,IAC3BA,EAAG,IAAI,GAAG,KAAK,IAAG,CAAE;AACpB,UAAM,EAAE,UAAAd,GAAU,QAAAO,GAAQ,QAAAnE,GAAQ,UAAA2E,GAAU,WAAAC,GAAW,KAAAR,EAAG,IAAK;AAC/D,WAAAM,EAAG,YAAYE,GACfF,EAAG,WAAWC,GACdD,EAAG,SAAS1E,GACZ0E,EAAG,MAAMN,GACLpE,IAAS4D,KACTc,EAAG,OAAO,IAAIP,CAAM,GACjBO;AAAA,EACX;AAAA,EACA,QAAQ;AACJ,WAAO,KAAK,WAAU;AAAA,EAC1B;AACJ;AAMO,MAAMG,KAA4B,4BAAY,KAAK;AAAA,EACtD;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACxF,CAAC,GCpHKC,KAA2B,4BAAY,KAAK;AAAA,EAC9C;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACxF,CAAC,GAEKC,KAA2B,oBAAI,YAAY,EAAE;AAEnD,MAAMC,WAAiBC,GAAO;AAAA,EAC1B,YAAYpB,GAAW;AACnB,UAAM,IAAIA,GAAW,GAAG,EAAK;AAAA,EACjC;AAAA,EACA,MAAM;AACF,UAAM,EAAE,GAAAqB,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,EAAC,IAAK;AACnC,WAAO,CAACP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,CAAC;AAAA,EAClC;AAAA;AAAA,EAEA,IAAIP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAG;AACxB,SAAK,IAAIP,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI;AAAA,EACjB;AAAA,EACA,QAAQvB,GAAMwB,GAAQ;AAElB,aAAS1E,IAAI,GAAGA,IAAI,IAAIA,KAAK0E,KAAU;AACnCX,MAAAA,GAAS/D,CAAC,IAAIkD,EAAK,UAAUwB,GAAQ,EAAK;AAC9C,aAAS1E,IAAI,IAAIA,IAAI,IAAIA,KAAK;AAC1B,YAAM2E,IAAMZ,GAAS/D,IAAI,EAAE,GACrB4E,IAAKb,GAAS/D,IAAI,CAAC,GACnB6E,IAAK1E,EAAKwE,GAAK,CAAC,IAAIxE,EAAKwE,GAAK,EAAE,IAAKA,MAAQ,GAC7CG,IAAK3E,EAAKyE,GAAI,EAAE,IAAIzE,EAAKyE,GAAI,EAAE,IAAKA,MAAO;AACjDb,MAAAA,GAAS/D,CAAC,IAAK8E,IAAKf,GAAS/D,IAAI,CAAC,IAAI6E,IAAKd,GAAS/D,IAAI,EAAE,IAAK;AAAA,IACnE;AAEA,QAAI,EAAE,GAAAkE,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,EAAC,IAAK;AACjC,aAASzE,IAAI,GAAGA,IAAI,IAAIA,KAAK;AACzB,YAAM+E,IAAS5E,EAAKmE,GAAG,CAAC,IAAInE,EAAKmE,GAAG,EAAE,IAAInE,EAAKmE,GAAG,EAAE,GAC9CU,IAAMP,IAAIM,IAASxC,GAAI+B,GAAGC,GAAGC,CAAC,IAAIV,GAAS9D,CAAC,IAAI+D,GAAS/D,CAAC,IAAK,GAE/DiF,KADS9E,EAAK+D,GAAG,CAAC,IAAI/D,EAAK+D,GAAG,EAAE,IAAI/D,EAAK+D,GAAG,EAAE,KAC/BxB,GAAIwB,GAAGC,GAAGC,CAAC,IAAK;AACrC,MAAAK,IAAID,GACJA,IAAID,GACJA,IAAID,GACJA,IAAKD,IAAIW,IAAM,GACfX,IAAID,GACJA,IAAID,GACJA,IAAID,GACJA,IAAKc,IAAKC,IAAM;AAAA,IACpB;AAEA,IAAAf,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnB,KAAK,IAAIP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,CAAC;AAAA,EACnC;AAAA,EACA,aAAa;AACT3E,IAAAA,GAAMiE,EAAQ;AAAA,EAClB;AAAA,EACA,UAAU;AACN,SAAK,IAAI,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,CAAC,GAC/BjE,GAAM,KAAK,MAAM;AAAA,EACrB;AACJ;AAEO,MAAMoF,WAAgBlB,GAAS;AAAA,EAWlC,cAAc;AACV,UAAM,EAAE;AATZ;AAAA;AAAA,IAAAhB,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AACnB,IAAAb,EAAA,WAAIa,GAAU,CAAC,IAAI;AAAA,EAGnB;AACJ;AAyQO,MAAMsB,KAAyBxD,gBAAAA;AAAAA,EAAa,MAAM,IAAIuD,GAAO;AAAA,EACpD,gBAAA7C,GAAQ,CAAI;AAAC;AClX7B;AAGA,MAAM+C,KAAsB,uBAAO,CAAC,GAC9BC,KAAsB,uBAAO,CAAC;AAC7B,SAASC,GAAMvG,GAAOH,IAAQ,IAAI;AACrC,MAAI,OAAOG,KAAU,WAAW;AAC5B,UAAMF,IAASD,KAAS,IAAIA,CAAK;AACjC,UAAM,IAAI,MAAMC,IAAS,gCAAgC,OAAOE,CAAK;AAAA,EACzE;AACA,SAAOA;AACX;AAEA,SAASwG,GAAW5G,GAAG;AACnB,MAAI,OAAOA,KAAM;AACb,QAAI,CAAC6G,GAAS7G,CAAC;AACX,YAAM,IAAI,MAAM,mCAAmCA,CAAC;AAAA;AAGxD,IAAAD,GAAQC,CAAC;AACb,SAAOA;AACX;AAOO,SAAS8G,GAAoBC,GAAK;AACrC,QAAMhF,IAAM6E,GAAWG,CAAG,EAAE,SAAS,EAAE;AACvC,SAAOhF,EAAI,SAAS,IAAI,MAAMA,IAAMA;AACxC;AACO,SAASiF,GAAYjF,GAAK;AAC7B,MAAI,OAAOA,KAAQ;AACf,UAAM,IAAI,MAAM,8BAA8B,OAAOA,CAAG;AAC5D,SAAOA,MAAQ,KAAK0E,KAAM,OAAO,OAAO1E,CAAG;AAC/C;AAEO,SAASkF,GAAgB3G,GAAO;AACnC,SAAO0G,GAAYE,GAAY5G,CAAK,CAAC;AACzC;AACO,SAAS6G,GAAgB7G,GAAO;AACnC,SAAO0G,GAAYE,GAAYE,GAAUC,EAAQ/G,CAAK,CAAC,EAAE,QAAO,CAAE,CAAC;AACvE;AACO,SAASgH,GAAgBtH,GAAGO,GAAK;AACpC,EAAAR,GAAQQ,CAAG,GACXP,IAAI4G,GAAW5G,CAAC;AAChB,QAAM8C,IAAMyE,GAAYvH,EAAE,SAAS,EAAE,EAAE,SAASO,IAAM,GAAG,GAAG,CAAC;AAC7D,MAAIuC,EAAI,WAAWvC;AACf,UAAM,IAAI,MAAM,kBAAkB;AACtC,SAAOuC;AACX;AACO,SAAS0E,GAAgBxH,GAAGO,GAAK;AACpC,SAAO+G,GAAgBtH,GAAGO,CAAG,EAAE,QAAO;AAC1C;AAkBO,SAAS6G,GAAU9G,GAAO;AAC7B,SAAO,WAAW,KAAKA,CAAK;AAChC;AAgBA,MAAMuG,KAAW,CAAC7G,MAAM,OAAOA,KAAM,YAAYyG,MAAOzG;AACjD,SAASyH,GAAQzH,GAAGkB,GAAKwG,GAAK;AACjC,SAAOb,GAAS7G,CAAC,KAAK6G,GAAS3F,CAAG,KAAK2F,GAASa,CAAG,KAAKxG,KAAOlB,KAAKA,IAAI0H;AAC5E;AAMO,SAASC,GAAS1H,GAAOD,GAAGkB,GAAKwG,GAAK;AAMzC,MAAI,CAACD,GAAQzH,GAAGkB,GAAKwG,CAAG;AACpB,UAAM,IAAI,MAAM,oBAAoBzH,IAAQ,OAAOiB,IAAM,aAAawG,IAAM,WAAW1H,CAAC;AAChG;AAOO,SAAS4H,GAAO5H,GAAG;AACtB,MAAIO;AACJ,OAAKA,IAAM,GAAGP,IAAIyG,IAAKzG,MAAM0G,IAAKnG,KAAO;AACrC;AACJ,SAAOA;AACX;AAmBO,MAAMsH,KAAU,CAAC7H,OAAO0G,MAAO,OAAO1G,CAAC,KAAK0G;AAQ5C,SAASoB,GAAeC,GAASC,GAAUC,GAAQ;AAGtD,MAFAlI,GAAQgI,GAAS,SAAS,GAC1BhI,GAAQiI,GAAU,UAAU,GACxB,OAAOC,KAAW;AAClB,UAAM,IAAI,MAAM,2BAA2B;AAC/C,QAAMC,IAAM,CAAC3H,MAAQ,IAAI,WAAWA,CAAG,GACjC4H,IAAO,WAAW,GAAE,GACpBC,IAAQ,WAAW,GAAG,CAAI,GAC1BC,IAAQ,WAAW,GAAG,CAAI,GAC1BC,IAAgB;AAEtB,MAAIC,IAAIL,EAAIH,CAAO,GACfS,IAAIN,EAAIH,CAAO,GACf1G,IAAI;AACR,QAAMoH,IAAQ,MAAM;AAChB,IAAAF,EAAE,KAAK,CAAC,GACRC,EAAE,KAAK,CAAC,GACRnH,IAAI;AAAA,EACR,GACMT,IAAI,IAAI8H,MAAST,EAAOO,GAAGG,GAAaJ,GAAG,GAAGG,CAAI,CAAC,GACnDE,IAAS,CAACC,IAAOV,MAAS;AAI5B,IAFAK,IAAI5H,EAAEwH,GAAOS,CAAI,GACjBN,IAAI3H,EAAC,GACDiI,EAAK,WAAW,MAEpBL,IAAI5H,EAAEyH,GAAOQ,CAAI,GACjBN,IAAI3H,EAAC;AAAA,EACT,GACMkI,IAAM,MAAM;AAEd,QAAIzH,OAAOiH;AACP,YAAM,IAAI,MAAM,sCAAsC;AAC1D,QAAI/H,IAAM;AACV,UAAMU,IAAM,CAAA;AACZ,WAAOV,IAAMyH,KAAU;AACnB,MAAAO,IAAI3H,EAAC;AACL,YAAMmI,IAAKR,EAAE,MAAK;AAClB,MAAAtH,EAAI,KAAK8H,CAAE,GACXxI,KAAOgI,EAAE;AAAA,IACb;AACA,WAAOI,GAAa,GAAG1H,CAAG;AAAA,EAC9B;AAUA,SATiB,CAAC4H,GAAMG,MAAS;AAC7B,IAAAP,EAAK,GACLG,EAAOC,CAAI;AACX,QAAI/F;AACJ,WAAO,EAAEA,IAAMkG,EAAKF,EAAG,CAAE;AACrB,MAAAF,EAAM;AACV,WAAAH,EAAK,GACE3F;AAAA,EACX;AAEJ;AACO,SAASmG,GAAeC,GAAQC,IAAS,CAAA,GAAIC,IAAY,CAAA,GAAI;AAChE,MAAI,CAACF,KAAU,OAAOA,KAAW;AAC7B,UAAM,IAAI,MAAM,+BAA+B;AACnD,WAASG,EAAWC,GAAWC,GAAcC,GAAO;AAChD,UAAMC,IAAMP,EAAOI,CAAS;AAC5B,QAAIE,KAASC,MAAQ;AACjB;AACJ,UAAMC,IAAU,OAAOD;AACvB,QAAIC,MAAYH,KAAgBE,MAAQ;AACpC,YAAM,IAAI,MAAM,UAAUH,CAAS,0BAA0BC,CAAY,SAASG,CAAO,EAAE;AAAA,EACnG;AACA,QAAMC,IAAO,CAACC,GAAGJ,MAAU,OAAO,QAAQI,CAAC,EAAE,QAAQ,CAAC,CAACpB,GAAGD,CAAC,MAAMc,EAAWb,GAAGD,GAAGiB,CAAK,CAAC;AACxF,EAAAG,EAAKR,GAAQ,EAAK,GAClBQ,EAAKP,GAAW,EAAI;AACxB;AAWO,SAASS,GAASC,GAAI;AACzB,QAAMC,IAAM,oBAAI,QAAO;AACvB,SAAO,CAACC,MAAQC,MAAS;AACrB,UAAMR,IAAMM,EAAI,IAAIC,CAAG;AACvB,QAAIP,MAAQ;AACR,aAAOA;AACX,UAAMS,IAAWJ,EAAGE,GAAK,GAAGC,CAAI;AAChC,WAAAF,EAAI,IAAIC,GAAKE,CAAQ,GACdA;AAAA,EACX;AACJ;ACzOA;AAIA,MAAMzD,IAAsB,uBAAO,CAAC,GAAGC,IAAsB,uBAAO,CAAC,GAAGyD,KAAsB,uBAAO,CAAC,GAEhGC,KAAsB,uBAAO,CAAC,GAAGC,KAAsB,uBAAO,CAAC,GAAGC,KAAsB,uBAAO,CAAC,GAEhGC,KAAsB,uBAAO,CAAC,GAAGC,KAAsB,uBAAO,CAAC,GAAGC,KAAsB,uBAAO,CAAC,GAChGC,KAAuB,uBAAO,EAAE;AAE/B,SAASC,EAAI7K,GAAG+D,GAAG;AACtB,QAAM+G,IAAS9K,IAAI+D;AACnB,SAAO+G,KAAUnE,IAAMmE,IAAS/G,IAAI+G;AACxC;AAWO,SAASC,EAAKC,GAAGC,GAAOC,GAAQ;AACnC,MAAIlI,IAAMgI;AACV,SAAOC,MAAUtE;AACb,IAAA3D,KAAOA,GACPA,KAAOkI;AAEX,SAAOlI;AACX;AAKO,SAASmI,GAAOC,GAAQF,GAAQ;AACnC,MAAIE,MAAWzE;AACX,UAAM,IAAI,MAAM,kCAAkC;AACtD,MAAIuE,KAAUvE;AACV,UAAM,IAAI,MAAM,4CAA4CuE,CAAM;AAEtE,MAAIlL,IAAI6K,EAAIO,GAAQF,CAAM,GACtBnH,IAAImH,GAEJF,IAAIrE,GAAc0E,IAAIzE;AAC1B,SAAO5G,MAAM2G,KAAK;AAEd,UAAM2E,IAAIvH,IAAI/D,GACRuL,IAAIxH,IAAI/D,GACRwL,IAAIR,IAAIK,IAAIC;AAGlB,IAAAvH,IAAI/D,GAAGA,IAAIuL,GAAGP,IAAIK,GAAUA,IAAIG;AAAA,EACpC;AAEA,MADYzH,MACA6C;AACR,UAAM,IAAI,MAAM,wBAAwB;AAC5C,SAAOiE,EAAIG,GAAGE,CAAM;AACxB;AACA,SAASO,GAAeC,GAAIC,GAAMzL,GAAG;AACjC,MAAI,CAACwL,EAAG,IAAIA,EAAG,IAAIC,CAAI,GAAGzL,CAAC;AACvB,UAAM,IAAI,MAAM,yBAAyB;AACjD;AAKA,SAAS0L,GAAUF,GAAIxL,GAAG;AACtB,QAAM2L,KAAUH,EAAG,QAAQ9E,KAAO2D,IAC5BoB,IAAOD,EAAG,IAAIxL,GAAG2L,CAAM;AAC7B,SAAAJ,GAAeC,GAAIC,GAAMzL,CAAC,GACnByL;AACX;AACA,SAASG,GAAUJ,GAAIxL,GAAG;AACtB,QAAM6L,KAAUL,EAAG,QAAQlB,MAAOE,IAC5B9H,IAAK8I,EAAG,IAAIxL,GAAGmK,EAAG,GAClB5B,IAAIiD,EAAG,IAAI9I,GAAImJ,CAAM,GACrBC,IAAKN,EAAG,IAAIxL,GAAGuI,CAAC,GAChB,IAAIiD,EAAG,IAAIA,EAAG,IAAIM,GAAI3B,EAAG,GAAG5B,CAAC,GAC7BkD,IAAOD,EAAG,IAAIM,GAAIN,EAAG,IAAI,GAAGA,EAAG,GAAG,CAAC;AACzC,SAAAD,GAAeC,GAAIC,GAAMzL,CAAC,GACnByL;AACX;AAGA,SAASM,GAAWC,GAAG;AACnB,QAAMC,IAAMC,GAAMF,CAAC,GACbG,IAAKC,GAAcJ,CAAC,GACpBK,IAAKF,EAAGF,GAAKA,EAAI,IAAIA,EAAI,GAAG,CAAC,GAC7BK,IAAKH,EAAGF,GAAKI,CAAE,GACfE,IAAKJ,EAAGF,GAAKA,EAAI,IAAII,CAAE,CAAC,GACxBG,KAAMR,IAAIzB,MAAOG;AACvB,SAAO,CAACc,GAAIxL,MAAM;AACd,QAAIyM,IAAMjB,EAAG,IAAIxL,GAAGwM,CAAE,GAClBE,IAAMlB,EAAG,IAAIiB,GAAKJ,CAAE;AACxB,UAAMM,IAAMnB,EAAG,IAAIiB,GAAKH,CAAE,GACpBM,IAAMpB,EAAG,IAAIiB,GAAKF,CAAE,GACpBM,IAAKrB,EAAG,IAAIA,EAAG,IAAIkB,CAAG,GAAG1M,CAAC,GAC1B8M,IAAKtB,EAAG,IAAIA,EAAG,IAAImB,CAAG,GAAG3M,CAAC;AAChC,IAAAyM,IAAMjB,EAAG,KAAKiB,GAAKC,GAAKG,CAAE,GAC1BH,IAAMlB,EAAG,KAAKoB,GAAKD,GAAKG,CAAE;AAC1B,UAAMC,IAAKvB,EAAG,IAAIA,EAAG,IAAIkB,CAAG,GAAG1M,CAAC,GAC1ByL,IAAOD,EAAG,KAAKiB,GAAKC,GAAKK,CAAE;AACjC,WAAAxB,GAAeC,GAAIC,GAAMzL,CAAC,GACnByL;AAAA,EACX;AACJ;AAQO,SAASW,GAAcJ,GAAG;AAG7B,MAAIA,IAAI5B;AACJ,UAAM,IAAI,MAAM,qCAAqC;AAEzD,MAAI4C,IAAIhB,IAAItF,GACRuG,IAAI;AACR,SAAOD,IAAI7C,OAAQ1D;AACf,IAAAuG,KAAK7C,IACL8C;AAGJ,MAAIC,IAAI/C;AACR,QAAMgD,IAAMjB,GAAMF,CAAC;AACnB,SAAOoB,GAAWD,GAAKD,CAAC,MAAM;AAG1B,QAAIA,MAAM;AACN,YAAM,IAAI,MAAM,+CAA+C;AAGvE,MAAID,MAAM;AACN,WAAOvB;AAGX,MAAI2B,IAAKF,EAAI,IAAID,GAAGF,CAAC;AACrB,QAAMM,KAAUN,IAAItG,KAAOyD;AAC3B,SAAO,SAAqBqB,GAAIxL,GAAG;AAC/B,QAAIwL,EAAG,IAAIxL,CAAC;AACR,aAAOA;AAEX,QAAIoN,GAAW5B,GAAIxL,CAAC,MAAM;AACtB,YAAM,IAAI,MAAM,yBAAyB;AAE7C,QAAIuN,IAAIN,GACJnJ,IAAI0H,EAAG,IAAIA,EAAG,KAAK6B,CAAE,GACrBG,IAAIhC,EAAG,IAAIxL,GAAGgN,CAAC,GACfS,IAAIjC,EAAG,IAAIxL,GAAGsN,CAAM;AAGxB,WAAO,CAAC9B,EAAG,IAAIgC,GAAGhC,EAAG,GAAG,KAAG;AACvB,UAAIA,EAAG,IAAIgC,CAAC;AACR,eAAOhC,EAAG;AACd,UAAInK,IAAI,GAEJqM,IAAQlC,EAAG,IAAIgC,CAAC;AACpB,aAAO,CAAChC,EAAG,IAAIkC,GAAOlC,EAAG,GAAG;AAGxB,YAFAnK,KACAqM,IAAQlC,EAAG,IAAIkC,CAAK,GAChBrM,MAAMkM;AACN,gBAAM,IAAI,MAAM,yBAAyB;AAGjD,YAAMI,IAAWjH,KAAO,OAAO6G,IAAIlM,IAAI,CAAC,GAClCwC,IAAI2H,EAAG,IAAI1H,GAAG6J,CAAQ;AAE5B,MAAAJ,IAAIlM,GACJyC,IAAI0H,EAAG,IAAI3H,CAAC,GACZ2J,IAAIhC,EAAG,IAAIgC,GAAG1J,CAAC,GACf2J,IAAIjC,EAAG,IAAIiC,GAAG5J,CAAC;AAAA,IACnB;AACA,WAAO4J;AAAA,EACX;AACJ;AAYO,SAASG,GAAO5B,GAAG;AAEtB,SAAIA,IAAI3B,OAAQD,KACLsB,KAEPM,IAAIxB,OAAQF,KACLsB,KAEPI,IAAItB,OAASD,KACNsB,GAAWC,CAAC,IAEhBI,GAAcJ,CAAC;AAC1B;AAIA,MAAM6B,KAAe;AAAA,EACjB;AAAA,EAAU;AAAA,EAAW;AAAA,EAAO;AAAA,EAAO;AAAA,EAAO;AAAA,EAAQ;AAAA,EAClD;AAAA,EAAO;AAAA,EAAO;AAAA,EAAO;AAAA,EAAO;AAAA,EAAO;AAAA,EACnC;AAAA,EAAQ;AAAA,EAAQ;AAAA,EAAQ;AAC5B;AACO,SAASC,GAAcC,GAAO;AACjC,QAAMC,IAAU;AAAA,IACZ,OAAO;AAAA,IACP,OAAO;AAAA,IACP,MAAM;AAAA,EACd,GACU3K,IAAOwK,GAAa,OAAO,CAAC9D,GAAKN,OACnCM,EAAIN,CAAG,IAAI,YACJM,IACRiE,CAAO;AACV,SAAA/E,GAAe8E,GAAO1K,CAAI,GAInB0K;AACX;AAMO,SAASE,GAAMzC,GAAIzE,GAAKgE,GAAO;AAClC,MAAIA,IAAQtE;AACR,UAAM,IAAI,MAAM,yCAAyC;AAC7D,MAAIsE,MAAUtE;AACV,WAAO+E,EAAG;AACd,MAAIT,MAAUrE;AACV,WAAOK;AACX,MAAImH,IAAI1C,EAAG,KACP2C,IAAIpH;AACR,SAAOgE,IAAQtE;AACX,IAAIsE,IAAQrE,MACRwH,IAAI1C,EAAG,IAAI0C,GAAGC,CAAC,IACnBA,IAAI3C,EAAG,IAAI2C,CAAC,GACZpD,MAAUrE;AAEd,SAAOwH;AACX;AAMO,SAASE,GAAc5C,GAAI6C,GAAMC,IAAW,IAAO;AACtD,QAAMC,IAAW,IAAI,MAAMF,EAAK,MAAM,EAAE,KAAKC,IAAW9C,EAAG,OAAO,MAAS,GAErEgD,IAAgBH,EAAK,OAAO,CAACI,GAAK1H,GAAK1F,MACrCmK,EAAG,IAAIzE,CAAG,IACH0H,KACXF,EAASlN,CAAC,IAAIoN,GACPjD,EAAG,IAAIiD,GAAK1H,CAAG,IACvByE,EAAG,GAAG,GAEHkD,IAAclD,EAAG,IAAIgD,CAAa;AAExC,SAAAH,EAAK,YAAY,CAACI,GAAK1H,GAAK1F,MACpBmK,EAAG,IAAIzE,CAAG,IACH0H,KACXF,EAASlN,CAAC,IAAImK,EAAG,IAAIiD,GAAKF,EAASlN,CAAC,CAAC,GAC9BmK,EAAG,IAAIiD,GAAK1H,CAAG,IACvB2H,CAAW,GACPH;AACX;AAcO,SAASnB,GAAW5B,GAAIxL,GAAG;AAG9B,QAAM2O,KAAUnD,EAAG,QAAQ9E,KAAOyD,IAC5ByE,IAAUpD,EAAG,IAAIxL,GAAG2O,CAAM,GAC1BE,IAAMrD,EAAG,IAAIoD,GAASpD,EAAG,GAAG,GAC5BsD,IAAOtD,EAAG,IAAIoD,GAASpD,EAAG,IAAI,GAC9BuD,IAAKvD,EAAG,IAAIoD,GAASpD,EAAG,IAAIA,EAAG,GAAG,CAAC;AACzC,MAAI,CAACqD,KAAO,CAACC,KAAQ,CAACC;AAClB,UAAM,IAAI,MAAM,gCAAgC;AACpD,SAAOF,IAAM,IAAIC,IAAO,IAAI;AAChC;AAOO,SAASE,GAAQhP,GAAGiP,GAAY;AAEnC,EAAIA,MAAe,UACflP,GAAQkP,CAAU;AACtB,QAAMC,IAAcD,MAAe,SAAYA,IAAajP,EAAE,SAAS,CAAC,EAAE,QACpEmP,IAAc,KAAK,KAAKD,IAAc,CAAC;AAC7C,SAAO,EAAE,YAAYA,GAAa,aAAAC,EAAW;AACjD;AACA,MAAMC,GAAO;AAAA,EAUT,YAAYC,GAAOhM,IAAO,IAAI;AAT9B,IAAAgB,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA,cAAOoC;AACP,IAAApC,EAAA,aAAMqC;AACN,IAAArC,EAAA;AACA,IAAAA,EAAA;AACA;AAAA,IAAAA,EAAA;;AAEI,QAAIgL,KAAS5I;AACT,YAAM,IAAI,MAAM,4CAA4C4I,CAAK;AACrE,QAAIC;AACJ,SAAK,OAAO,IACRjM,KAAQ,QAAQ,OAAOA,KAAS,aAC5B,OAAOA,EAAK,QAAS,aACrBiM,IAAcjM,EAAK,OACnB,OAAOA,EAAK,QAAS,eACrB,KAAK,OAAOA,EAAK,OACjB,OAAOA,EAAK,QAAS,cACrB,KAAK,OAAOA,EAAK,OACjBA,EAAK,mBACL,KAAK,YAAWkM,IAAAlM,EAAK,mBAAL,gBAAAkM,EAAqB,UACrC,OAAOlM,EAAK,gBAAiB,cAC7B,KAAK,OAAOA,EAAK;AAEzB,UAAM,EAAE,YAAA4L,GAAY,aAAAE,EAAW,IAAKH,GAAQK,GAAOC,CAAW;AAC9D,QAAIH,IAAc;AACd,YAAM,IAAI,MAAM,gDAAgD;AACpE,SAAK,QAAQE,GACb,KAAK,OAAOJ,GACZ,KAAK,QAAQE,GACb,KAAK,QAAQ,QACb,OAAO,kBAAkB,IAAI;AAAA,EACjC;AAAA,EACA,OAAOpI,GAAK;AACR,WAAO4D,EAAI5D,GAAK,KAAK,KAAK;AAAA,EAC9B;AAAA,EACA,QAAQA,GAAK;AACT,QAAI,OAAOA,KAAQ;AACf,YAAM,IAAI,MAAM,iDAAiD,OAAOA,CAAG;AAC/E,WAAON,KAAOM,KAAOA,IAAM,KAAK;AAAA,EACpC;AAAA,EACA,IAAIA,GAAK;AACL,WAAOA,MAAQN;AAAAA,EACnB;AAAA;AAAA,EAEA,YAAYM,GAAK;AACb,WAAO,CAAC,KAAK,IAAIA,CAAG,KAAK,KAAK,QAAQA,CAAG;AAAA,EAC7C;AAAA,EACA,MAAMA,GAAK;AACP,YAAQA,IAAML,OAASA;AAAAA,EAC3B;AAAA,EACA,IAAIK,GAAK;AACL,WAAO4D,EAAI,CAAC5D,GAAK,KAAK,KAAK;AAAA,EAC/B;AAAA,EACA,IAAIyI,GAAKC,GAAK;AACV,WAAOD,MAAQC;AAAA,EACnB;AAAA,EACA,IAAI1I,GAAK;AACL,WAAO4D,EAAI5D,IAAMA,GAAK,KAAK,KAAK;AAAA,EACpC;AAAA,EACA,IAAIyI,GAAKC,GAAK;AACV,WAAO9E,EAAI6E,IAAMC,GAAK,KAAK,KAAK;AAAA,EACpC;AAAA,EACA,IAAID,GAAKC,GAAK;AACV,WAAO9E,EAAI6E,IAAMC,GAAK,KAAK,KAAK;AAAA,EACpC;AAAA,EACA,IAAID,GAAKC,GAAK;AACV,WAAO9E,EAAI6E,IAAMC,GAAK,KAAK,KAAK;AAAA,EACpC;AAAA,EACA,IAAI1I,GAAKgE,GAAO;AACZ,WAAOkD,GAAM,MAAMlH,GAAKgE,CAAK;AAAA,EACjC;AAAA,EACA,IAAIyE,GAAKC,GAAK;AACV,WAAO9E,EAAI6E,IAAMvE,GAAOwE,GAAK,KAAK,KAAK,GAAG,KAAK,KAAK;AAAA,EACxD;AAAA;AAAA,EAEA,KAAK1I,GAAK;AACN,WAAOA,IAAMA;AAAA,EACjB;AAAA,EACA,KAAKyI,GAAKC,GAAK;AACX,WAAOD,IAAMC;AAAA,EACjB;AAAA,EACA,KAAKD,GAAKC,GAAK;AACX,WAAOD,IAAMC;AAAA,EACjB;AAAA,EACA,KAAKD,GAAKC,GAAK;AACX,WAAOD,IAAMC;AAAA,EACjB;AAAA,EACA,IAAI1I,GAAK;AACL,WAAOkE,GAAOlE,GAAK,KAAK,KAAK;AAAA,EACjC;AAAA,EACA,KAAKA,GAAK;AAEN,WAAK,KAAK,UACN,KAAK,QAAQ6G,GAAO,KAAK,KAAK,IAC3B,KAAK,MAAM,MAAM7G,CAAG;AAAA,EAC/B;AAAA,EACA,QAAQA,GAAK;AACT,WAAO,KAAK,OAAOS,GAAgBT,GAAK,KAAK,KAAK,IAAIO,GAAgBP,GAAK,KAAK,KAAK;AAAA,EACzF;AAAA,EACA,UAAUzG,GAAOoP,IAAiB,IAAO;AACrCvP,IAAAA,EAAOG,CAAK;AACZ,UAAM,EAAE,UAAUqP,GAAgB,OAAAC,GAAO,MAAAxL,GAAM,OAAAiL,GAAO,MAAMQ,EAAY,IAAK;AAC7E,QAAIF,GAAgB;AAChB,UAAI,CAACA,EAAe,SAASrP,EAAM,MAAM,KAAKA,EAAM,SAASsP;AACzD,cAAM,IAAI,MAAM,+BAA+BD,IAAiB,iBAAiBrP,EAAM,MAAM;AAEjG,YAAMwP,IAAS,IAAI,WAAWF,CAAK;AAEnC,MAAAE,EAAO,IAAIxP,GAAO8D,IAAO,IAAI0L,EAAO,SAASxP,EAAM,MAAM,GACzDA,IAAQwP;AAAA,IACZ;AACA,QAAIxP,EAAM,WAAWsP;AACjB,YAAM,IAAI,MAAM,+BAA+BA,IAAQ,iBAAiBtP,EAAM,MAAM;AACxF,QAAIyP,IAAS3L,IAAO+C,GAAgB7G,CAAK,IAAI2G,GAAgB3G,CAAK;AAGlE,QAFIuP,MACAE,IAASpF,EAAIoF,GAAQV,CAAK,IAC1B,CAACK,KACG,CAAC,KAAK,QAAQK,CAAM;AACpB,YAAM,IAAI,MAAM,kDAAkD;AAG1E,WAAOA;AAAA,EACX;AAAA;AAAA,EAEA,YAAYC,GAAK;AACb,WAAO5B,GAAc,MAAM4B,CAAG;AAAA,EAClC;AAAA;AAAA;AAAA,EAGA,KAAKlQ,GAAG+D,GAAGoM,GAAW;AAClB,WAAOA,IAAYpM,IAAI/D;AAAA,EAC3B;AACJ;AAoBO,SAASoM,GAAMmD,GAAOhM,IAAO,IAAI;AACpC,SAAO,IAAI+L,GAAOC,GAAOhM,CAAI;AACjC;AAgCO,SAAS6M,GAAoBC,GAAY;AAC5C,MAAI,OAAOA,KAAe;AACtB,UAAM,IAAI,MAAM,4BAA4B;AAChD,QAAMC,IAAYD,EAAW,SAAS,CAAC,EAAE;AACzC,SAAO,KAAK,KAAKC,IAAY,CAAC;AAClC;AAQO,SAASC,GAAiBF,GAAY;AACzC,QAAM9P,IAAS6P,GAAoBC,CAAU;AAC7C,SAAO9P,IAAS,KAAK,KAAKA,IAAS,CAAC;AACxC;AAcO,SAASiQ,GAAeC,GAAKJ,GAAY/L,IAAO,IAAO;AAC1DjE,EAAAA,EAAOoQ,CAAG;AACV,QAAMhQ,IAAMgQ,EAAI,QACVC,IAAWN,GAAoBC,CAAU,GACzCM,IAASJ,GAAiBF,CAAU;AAE1C,MAAI5P,IAAM,MAAMA,IAAMkQ,KAAUlQ,IAAM;AAClC,UAAM,IAAI,MAAM,cAAckQ,IAAS,+BAA+BlQ,CAAG;AAC7E,QAAMwG,IAAM3C,IAAO+C,GAAgBoJ,CAAG,IAAItJ,GAAgBsJ,CAAG,GAEvDG,IAAU/F,EAAI5D,GAAKoJ,IAAazJ,CAAG,IAAIA;AAC7C,SAAOtC,IAAOoD,GAAgBkJ,GAASF,CAAQ,IAAIlJ,GAAgBoJ,GAASF,CAAQ;AACxF;ACpiBA;AAGA,MAAM/J,KAAsB,uBAAO,CAAC,GAC9BC,KAAsB,uBAAO,CAAC;AAC7B,SAASiK,GAASV,GAAWW,GAAM;AACtC,QAAMC,IAAMD,EAAK,OAAM;AACvB,SAAOX,IAAYY,IAAMD;AAC7B;AAOO,SAASE,GAAWhN,GAAGiN,GAAQ;AAClC,QAAMC,IAAa5C,GAActK,EAAE,IAAIiN,EAAO,IAAI,CAAC7C,MAAMA,EAAE,CAAC,CAAC;AAC7D,SAAO6C,EAAO,IAAI,CAAC7C,GAAG7M,MAAMyC,EAAE,WAAWoK,EAAE,SAAS8C,EAAW3P,CAAC,CAAC,CAAC,CAAC;AACvE;AACA,SAAS4P,GAAUC,GAAGC,GAAM;AACxB,MAAI,CAAC,OAAO,cAAcD,CAAC,KAAKA,KAAK,KAAKA,IAAIC;AAC1C,UAAM,IAAI,MAAM,uCAAuCA,IAAO,cAAcD,CAAC;AACrF;AACA,SAASE,GAAUF,GAAGG,GAAY;AAC9B,EAAAJ,GAAUC,GAAGG,CAAU;AACvB,QAAMC,IAAU,KAAK,KAAKD,IAAaH,CAAC,IAAI,GACtCK,IAAa,MAAML,IAAI,IACvBM,IAAY,KAAKN,GACjBO,IAAO5J,GAAQqJ,CAAC,GAChBQ,IAAU,OAAOR,CAAC;AACxB,SAAO,EAAE,SAAAI,GAAS,YAAAC,GAAY,MAAAE,GAAM,WAAAD,GAAW,SAAAE,EAAO;AAC1D;AACA,SAASC,GAAY3R,GAAG4R,GAAQC,GAAO;AACnC,QAAM,EAAE,YAAAN,GAAY,MAAAE,GAAM,WAAAD,GAAW,SAAAE,EAAO,IAAKG;AACjD,MAAIC,IAAQ,OAAO9R,IAAIyR,CAAI,GACvBM,IAAQ/R,KAAK0R;AAMjB,EAAII,IAAQP,MAERO,KAASN,GACTO,KAASrL;AAEb,QAAMsL,IAAcJ,IAASL,GACvBxL,IAASiM,IAAc,KAAK,IAAIF,CAAK,IAAI,GACzCG,IAASH,MAAU,GACnBI,IAAQJ,IAAQ,GAChBK,IAASP,IAAS,MAAM;AAE9B,SAAO,EAAE,OAAAG,GAAO,QAAAhM,GAAQ,QAAAkM,GAAQ,OAAAC,GAAO,QAAAC,GAAQ,SAD/BH,EACsC;AAC1D;AAoBA,MAAMI,KAAmB,oBAAI,QAAO,GAC9BC,KAAmB,oBAAI,QAAO;AACpC,SAASC,GAAKtG,GAAG;AAGb,SAAOqG,GAAiB,IAAIrG,CAAC,KAAK;AACtC;AACA,SAASuG,GAAQvS,GAAG;AAChB,MAAIA,MAAMyG;AACN,UAAM,IAAI,MAAM,cAAc;AACtC;AAmBO,MAAM+L,GAAK;AAAA;AAAA,EAMd,YAAYC,GAAOtB,GAAM;AALzB,IAAA9M,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AAGI,SAAK,OAAOoO,EAAM,MAClB,KAAK,OAAOA,EAAM,MAClB,KAAK,KAAKA,EAAM,IAChB,KAAK,OAAOtB;AAAA,EAChB;AAAA;AAAA,EAEA,cAAcuB,GAAK1S,GAAGkO,IAAI,KAAK,MAAM;AACjC,QAAIC,IAAIuE;AACR,WAAO1S,IAAIyG;AACP,MAAIzG,IAAI0G,OACJwH,IAAIA,EAAE,IAAIC,CAAC,IACfA,IAAIA,EAAE,OAAM,GACZnO,MAAM0G;AAEV,WAAOwH;AAAA,EACX;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,iBAAiByE,GAAOzB,GAAG;AACvB,UAAM,EAAE,SAAAI,GAAS,YAAAC,EAAU,IAAKH,GAAUF,GAAG,KAAK,IAAI,GAChDH,IAAS,CAAA;AACf,QAAI7C,IAAIyE,GACJC,IAAO1E;AACX,aAAS0D,IAAS,GAAGA,IAASN,GAASM,KAAU;AAC7C,MAAAgB,IAAO1E,GACP6C,EAAO,KAAK6B,CAAI;AAEhB,eAASvR,IAAI,GAAGA,IAAIkQ,GAAYlQ;AAC5B,QAAAuR,IAAOA,EAAK,IAAI1E,CAAC,GACjB6C,EAAO,KAAK6B,CAAI;AAEpB,MAAA1E,IAAI0E,EAAK,OAAM;AAAA,IACnB;AACA,WAAO7B;AAAA,EACX;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,KAAKG,GAAG2B,GAAa,GAAG;AAEpB,QAAI,CAAC,KAAK,GAAG,QAAQ,CAAC;AAClB,YAAM,IAAI,MAAM,gBAAgB;AAEpC,QAAI3E,IAAI,KAAK,MACTtE,IAAI,KAAK;AAMb,UAAMkJ,IAAK1B,GAAUF,GAAG,KAAK,IAAI;AACjC,aAASU,IAAS,GAAGA,IAASkB,EAAG,SAASlB,KAAU;AAEhD,YAAM,EAAE,OAAAG,GAAO,QAAAhM,GAAQ,QAAAkM,GAAQ,OAAAC,GAAO,QAAAC,GAAQ,SAAAY,EAAO,IAAKpB,GAAY,GAAGC,GAAQkB,CAAE;AACnF,UAAIf,GACAE,IAGArI,IAAIA,EAAE,IAAI+G,GAASwB,GAAQU,EAAYE,CAAO,CAAC,CAAC,IAIhD7E,IAAIA,EAAE,IAAIyC,GAASuB,GAAOW,EAAY9M,CAAM,CAAC,CAAC;AAAA,IAEtD;AACA,WAAAwM,GAAQ,CAAC,GAIF,EAAE,GAAArE,GAAG,GAAAtE,EAAC;AAAA,EACjB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,WAAWsH,GAAG2B,GAAa,GAAGpE,IAAM,KAAK,MAAM;AAC3C,UAAMqE,IAAK1B,GAAUF,GAAG,KAAK,IAAI;AACjC,aAASU,IAAS,GAAGA,IAASkB,EAAG,WACzB,MAAMrM,IAD4BmL,KAAU;AAGhD,YAAM,EAAE,OAAAG,GAAO,QAAAhM,GAAQ,QAAAkM,GAAQ,OAAAC,EAAK,IAAKP,GAAY,GAAGC,GAAQkB,CAAE;AAElE,UADA,IAAIf,GACA,CAAAE,GAKC;AACD,cAAMrB,IAAOiC,EAAY9M,CAAM;AAC/B,QAAA0I,IAAMA,EAAI,IAAIyD,IAAQtB,EAAK,OAAM,IAAKA,CAAI;AAAA,MAC9C;AAAA,IACJ;AACA,WAAA2B,GAAQ,CAAC,GACF9D;AAAA,EACX;AAAA,EACA,eAAeyC,GAAGyB,GAAOK,GAAW;AAEhC,QAAIC,IAAOb,GAAiB,IAAIO,CAAK;AACrC,WAAKM,MACDA,IAAO,KAAK,iBAAiBN,GAAOzB,CAAC,GACjCA,MAAM,MAEF,OAAO8B,KAAc,eACrBC,IAAOD,EAAUC,CAAI,IACzBb,GAAiB,IAAIO,GAAOM,CAAI,KAGjCA;AAAA,EACX;AAAA,EACA,OAAON,GAAO5C,GAAQiD,GAAW;AAC7B,UAAM9B,IAAIoB,GAAKK,CAAK;AACpB,WAAO,KAAK,KAAKzB,GAAG,KAAK,eAAeA,GAAGyB,GAAOK,CAAS,GAAGjD,CAAM;AAAA,EACxE;AAAA,EACA,OAAO4C,GAAO5C,GAAQiD,GAAWE,GAAM;AACnC,UAAMhC,IAAIoB,GAAKK,CAAK;AACpB,WAAIzB,MAAM,IACC,KAAK,cAAcyB,GAAO5C,GAAQmD,CAAI,IAC1C,KAAK,WAAWhC,GAAG,KAAK,eAAeA,GAAGyB,GAAOK,CAAS,GAAGjD,GAAQmD,CAAI;AAAA,EACpF;AAAA;AAAA;AAAA;AAAA,EAIA,YAAYlH,GAAGkF,GAAG;AACd,IAAAD,GAAUC,GAAG,KAAK,IAAI,GACtBmB,GAAiB,IAAIrG,GAAGkF,CAAC,GACzBkB,GAAiB,OAAOpG,CAAC;AAAA,EAC7B;AAAA,EACA,SAAS0G,GAAK;AACV,WAAOJ,GAAKI,CAAG,MAAM;AAAA,EACzB;AACJ;AAKO,SAASS,GAAcV,GAAOE,GAAOS,GAAIC,GAAI;AAChD,MAAI5E,IAAMkE,GACNW,IAAKb,EAAM,MACXc,IAAKd,EAAM;AACf,SAAOW,IAAK3M,MAAO4M,IAAK5M;AACpB,IAAI2M,IAAK1M,OACL4M,IAAKA,EAAG,IAAI7E,CAAG,IACf4E,IAAK3M,OACL6M,IAAKA,EAAG,IAAI9E,CAAG,IACnBA,IAAMA,EAAI,OAAM,GAChB2E,MAAO1M,IACP2M,MAAO3M;AAEX,SAAO,EAAE,IAAA4M,GAAI,IAAAC,EAAE;AACnB;AA2IA,SAASC,GAAYC,GAAO1F,GAAO3J,GAAM;AACrC,MAAI2J,GAAO;AACP,QAAIA,EAAM,UAAU0F;AAChB,YAAM,IAAI,MAAM,gDAAgD;AACpE,WAAA3F,GAAcC,CAAK,GACZA;AAAA,EACX;AAEI,WAAO7B,GAAMuH,GAAO,EAAE,MAAArP,GAAM;AAEpC;AAEO,SAASsP,GAAkBC,GAAMC,GAAOC,IAAY,CAAA,GAAIC,GAAQ;AAGnE,MAFIA,MAAW,WACXA,IAASH,MAAS,YAClB,CAACC,KAAS,OAAOA,KAAU;AAC3B,UAAM,IAAI,MAAM,kBAAkBD,CAAI,eAAe;AACzD,aAAWzF,KAAK,CAAC,KAAK,KAAK,GAAG,GAAG;AAC7B,UAAMzE,IAAMmK,EAAM1F,CAAC;AACnB,QAAI,EAAE,OAAOzE,KAAQ,YAAYA,IAAMhD;AACnC,YAAM,IAAI,MAAM,SAASyH,CAAC,0BAA0B;AAAA,EAC5D;AACA,QAAM1C,IAAKgI,GAAYI,EAAM,GAAGC,EAAU,IAAIC,CAAM,GAC9CC,IAAKP,GAAYI,EAAM,GAAGC,EAAU,IAAIC,CAAM,GAE9CE,IAAS,CAAC,MAAM,MAAM,KADQ,GACD;AACnC,aAAW9F,KAAK8F;AAEZ,QAAI,CAACxI,EAAG,QAAQoI,EAAM1F,CAAC,CAAC;AACpB,YAAM,IAAI,MAAM,SAASA,CAAC,0CAA0C;AAE5E,SAAA0F,IAAQ,OAAO,OAAO,OAAO,OAAO,CAAA,GAAIA,CAAK,CAAC,GACvC,EAAE,OAAAA,GAAO,IAAApI,GAAI,IAAAuI,EAAE;AAC1B;AACO,SAASE,GAAaC,GAAiBC,GAAc;AACxD,SAAO,SAAgBtL,GAAM;AACzB,UAAMuL,IAAYF,EAAgBrL,CAAI;AACtC,WAAO,EAAE,WAAAuL,GAAW,WAAWD,EAAaC,CAAS,EAAC;AAAA,EAC1D;AACJ;ACjcO,MAAMC,GAAM;AAAA,EAOf,YAAYC,GAAM/D,GAAK;AANvB,IAAAlM,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA;AACA,IAAAA,EAAA,kBAAW;AACX,IAAAA,EAAA,mBAAY;AAKR,QAHA1D,GAAM2T,CAAI,GACVnU,EAAOoQ,GAAK,QAAW,KAAK,GAC5B,KAAK,QAAQ+D,EAAK,OAAM,GACpB,OAAO,KAAK,MAAM,UAAW;AAC7B,YAAM,IAAI,MAAM,qDAAqD;AACzE,SAAK,WAAW,KAAK,MAAM,UAC3B,KAAK,YAAY,KAAK,MAAM;AAC5B,UAAMrQ,IAAW,KAAK,UAChBlB,IAAM,IAAI,WAAWkB,CAAQ;AAEnC,IAAAlB,EAAI,IAAIwN,EAAI,SAAStM,IAAWqQ,EAAK,OAAM,EAAG,OAAO/D,CAAG,EAAE,OAAM,IAAKA,CAAG;AACxE,aAASlP,IAAI,GAAGA,IAAI0B,EAAI,QAAQ1B;AAC5B,MAAA0B,EAAI1B,CAAC,KAAK;AACd,SAAK,MAAM,OAAO0B,CAAG,GAErB,KAAK,QAAQuR,EAAK,OAAM;AAExB,aAASjT,IAAI,GAAGA,IAAI0B,EAAI,QAAQ1B;AAC5B,MAAA0B,EAAI1B,CAAC,KAAK;AACd,SAAK,MAAM,OAAO0B,CAAG,GACrB5B,GAAM4B,CAAG;AAAA,EACb;AAAA,EACA,OAAOwR,GAAK;AACR1T,WAAAA,GAAQ,IAAI,GACZ,KAAK,MAAM,OAAO0T,CAAG,GACd;AAAA,EACX;AAAA,EACA,WAAWtT,GAAK;AACZJ,IAAAA,GAAQ,IAAI,GACZV,EAAOc,GAAK,KAAK,WAAW,QAAQ,GACpC,KAAK,WAAW,IAChB,KAAK,MAAM,WAAWA,CAAG,GACzB,KAAK,MAAM,OAAOA,CAAG,GACrB,KAAK,MAAM,WAAWA,CAAG,GACzB,KAAK,QAAO;AAAA,EAChB;AAAA,EACA,SAAS;AACL,UAAMA,IAAM,IAAI,WAAW,KAAK,MAAM,SAAS;AAC/C,gBAAK,WAAWA,CAAG,GACZA;AAAA,EACX;AAAA,EACA,WAAW8D,GAAI;AAEX,IAAAA,UAAO,OAAO,OAAO,OAAO,eAAe,IAAI,GAAG,EAAE;AACpD,UAAM,EAAE,OAAAyP,GAAO,OAAAC,GAAO,UAAAzP,GAAU,WAAAC,GAAW,UAAAhB,GAAU,WAAAC,EAAS,IAAK;AACnE,WAAAa,IAAKA,GACLA,EAAG,WAAWC,GACdD,EAAG,YAAYE,GACfF,EAAG,WAAWd,GACdc,EAAG,YAAYb,GACfa,EAAG,QAAQyP,EAAM,WAAWzP,EAAG,KAAK,GACpCA,EAAG,QAAQ0P,EAAM,WAAW1P,EAAG,KAAK,GAC7BA;AAAA,EACX;AAAA,EACA,QAAQ;AACJ,WAAO,KAAK,WAAU;AAAA,EAC1B;AAAA,EACA,UAAU;AACN,SAAK,YAAY,IACjB,KAAK,MAAM,QAAO,GAClB,KAAK,MAAM,QAAO;AAAA,EACtB;AACJ;AAWO,MAAM2P,KAAO,CAACJ,GAAM/D,GAAK3Q,MAAY,IAAIyU,GAAMC,GAAM/D,CAAG,EAAE,OAAO3Q,CAAO,EAAE,OAAM;AACvF8U,GAAK,SAAS,CAACJ,GAAM/D,MAAQ,IAAI8D,GAAMC,GAAM/D,CAAG;AC9DhD;AAOA,MAAMoE,KAAa,CAAC5N,GAAK6N,OAAS7N,KAAOA,KAAO,IAAI6N,IAAM,CAACA,KAAOzK,MAAOyK;AAIlE,SAASC,GAAiBrM,GAAGsM,GAAO9U,GAAG;AAI1C,QAAM,CAAC,CAAC+U,GAAIC,CAAE,GAAG,CAACC,GAAIC,CAAE,CAAC,IAAIJ,GACvBzI,IAAKsI,GAAWO,IAAK1M,GAAGxI,CAAC,GACzBsM,IAAKqI,GAAW,CAACK,IAAKxM,GAAGxI,CAAC;AAGhC,MAAIoT,IAAK5K,IAAI6D,IAAK0I,IAAKzI,IAAK2I,GACxB5B,IAAK,CAAChH,IAAK2I,IAAK1I,IAAK4I;AACzB,QAAMC,IAAQ/B,IAAK3M,IACb2O,IAAQ/B,IAAK5M;AACnB,EAAI0O,MACA/B,IAAK,CAACA,IACNgC,MACA/B,IAAK,CAACA;AAGV,QAAMgC,IAAUxN,GAAQ,KAAK,KAAKD,GAAO5H,CAAC,IAAI,CAAC,CAAC,IAAI0G;AACpD,MAAI0M,IAAK3M,MAAO2M,KAAMiC,KAAWhC,IAAK5M,MAAO4M,KAAMgC;AAC/C,UAAM,IAAI,MAAM,2CAA2C7M,CAAC;AAEhE,SAAO,EAAE,OAAA2M,GAAO,IAAA/B,GAAI,OAAAgC,GAAO,IAAA/B,EAAE;AACjC;AACA,SAASiC,GAAkBC,GAAQ;AAC/B,MAAI,CAAC,CAAC,WAAW,aAAa,KAAK,EAAE,SAASA,CAAM;AAChD,UAAM,IAAI,MAAM,2DAA2D;AAC/E,SAAOA;AACX;AACA,SAASC,GAAgBnS,GAAMoS,GAAK;AAChC,QAAMC,IAAQ,CAAA;AACd,WAASC,KAAW,OAAO,KAAKF,CAAG;AAE/B,IAAAC,EAAMC,CAAO,IAAItS,EAAKsS,CAAO,MAAM,SAAYF,EAAIE,CAAO,IAAItS,EAAKsS,CAAO;AAE9E,SAAAhP,GAAM+O,EAAM,MAAM,MAAM,GACxB/O,GAAM+O,EAAM,SAAS,SAAS,GAC1BA,EAAM,WAAW,UACjBJ,GAAkBI,EAAM,MAAM,GAC3BA;AACX;AACO,MAAME,WAAe,MAAM;AAAA,EAC9B,YAAYtK,IAAI,IAAI;AAChB,UAAMA,CAAC;AAAA,EACX;AACJ;AAQO,MAAMuK,KAAM;AAAA;AAAA,EAEf,KAAKD;AAAA;AAAA,EAEL,MAAM;AAAA,IACF,QAAQ,CAACE,GAAKxR,MAAS;AACnB,YAAM,EAAE,KAAKqB,EAAC,IAAKkQ;AACnB,UAAIC,IAAM,KAAKA,IAAM;AACjB,cAAM,IAAInQ,EAAE,uBAAuB;AACvC,UAAIrB,EAAK,SAAS;AACd,cAAM,IAAIqB,EAAE,2BAA2B;AAC3C,YAAMoQ,IAAUzR,EAAK,SAAS,GACxB/D,IAAMuG,GAAoBiP,CAAO;AACvC,UAAKxV,EAAI,SAAS,IAAK;AACnB,cAAM,IAAIoF,EAAE,sCAAsC;AAEtD,YAAMqQ,IAASD,IAAU,MAAMjP,GAAqBvG,EAAI,SAAS,IAAK,GAAW,IAAI;AAErF,aADUuG,GAAoBgP,CAAG,IACtBE,IAASzV,IAAM+D;AAAA,IAC9B;AAAA;AAAA,IAEA,OAAOwR,GAAKxR,GAAM;AACd,YAAM,EAAE,KAAKqB,EAAC,IAAKkQ;AACnB,UAAIpR,IAAM;AACV,UAAIqR,IAAM,KAAKA,IAAM;AACjB,cAAM,IAAInQ,EAAE,uBAAuB;AACvC,UAAIrB,EAAK,SAAS,KAAKA,EAAKG,GAAK,MAAMqR;AACnC,cAAM,IAAInQ,EAAE,uBAAuB;AACvC,YAAMsQ,IAAQ3R,EAAKG,GAAK,GAClByR,IAAS,CAAC,EAAED,IAAQ;AAC1B,UAAI5V,IAAS;AACb,UAAI,CAAC6V;AACD,QAAA7V,IAAS4V;AAAA,WACR;AAED,cAAMD,IAASC,IAAQ;AACvB,YAAI,CAACD;AACD,gBAAM,IAAIrQ,EAAE,mDAAmD;AACnE,YAAIqQ,IAAS;AACT,gBAAM,IAAIrQ,EAAE,0CAA0C;AAC1D,cAAMwQ,IAAc7R,EAAK,SAASG,GAAKA,IAAMuR,CAAM;AACnD,YAAIG,EAAY,WAAWH;AACvB,gBAAM,IAAIrQ,EAAE,uCAAuC;AACvD,YAAIwQ,EAAY,CAAC,MAAM;AACnB,gBAAM,IAAIxQ,EAAE,sCAAsC;AACtD,mBAAW9B,KAAKsS;AACZ,UAAA9V,IAAUA,KAAU,IAAKwD;AAE7B,YADAY,KAAOuR,GACH3V,IAAS;AACT,gBAAM,IAAIsF,EAAE,wCAAwC;AAAA,MAC5D;AACA,YAAM4C,IAAIjE,EAAK,SAASG,GAAKA,IAAMpE,CAAM;AACzC,UAAIkI,EAAE,WAAWlI;AACb,cAAM,IAAIsF,EAAE,gCAAgC;AAChD,aAAO,EAAE,GAAA4C,GAAG,GAAGjE,EAAK,SAASG,IAAMpE,CAAM,EAAC;AAAA,IAC9C;AAAA,EACR;AAAA;AAAA;AAAA;AAAA;AAAA,EAKI,MAAM;AAAA,IACF,OAAO0G,GAAK;AACR,YAAM,EAAE,KAAKpB,EAAC,IAAKkQ;AACnB,UAAI9O,IAAMN;AACN,cAAM,IAAId,EAAE,4CAA4C;AAC5D,UAAI5D,IAAM+E,GAAoBC,CAAG;AAIjC,UAFI,OAAO,SAAShF,EAAI,CAAC,GAAG,EAAE,IAAI,MAC9BA,IAAM,OAAOA,IACbA,EAAI,SAAS;AACb,cAAM,IAAI4D,EAAE,gDAAgD;AAChE,aAAO5D;AAAA,IACX;AAAA,IACA,OAAOuC,GAAM;AACT,YAAM,EAAE,KAAKqB,EAAC,IAAKkQ;AACnB,UAAIvR,EAAK,CAAC,IAAI;AACV,cAAM,IAAIqB,EAAE,qCAAqC;AACrD,UAAIrB,EAAK,CAAC,MAAM,KAAQ,EAAEA,EAAK,CAAC,IAAI;AAChC,cAAM,IAAIqB,EAAE,qDAAqD;AACrE,aAAOsB,GAAgB3C,CAAI;AAAA,IAC/B;AAAA,EACR;AAAA,EACI,MAAMhE,GAAO;AAET,UAAM,EAAE,KAAKqF,GAAG,MAAMyQ,GAAK,MAAMC,EAAG,IAAKR,IACnCvR,IAAOnE,EAAOG,GAAO,QAAW,WAAW,GAC3C,EAAE,GAAGgW,GAAU,GAAGC,EAAY,IAAKF,EAAI,OAAO,IAAM/R,CAAI;AAC9D,QAAIiS,EAAa;AACb,YAAM,IAAI5Q,EAAE,6CAA6C;AAC7D,UAAM,EAAE,GAAG6Q,GAAQ,GAAGC,EAAU,IAAKJ,EAAI,OAAO,GAAMC,CAAQ,GACxD,EAAE,GAAGI,GAAQ,GAAGC,EAAU,IAAKN,EAAI,OAAO,GAAMI,CAAU;AAChE,QAAIE,EAAW;AACX,YAAM,IAAIhR,EAAE,6CAA6C;AAC7D,WAAO,EAAE,GAAGyQ,EAAI,OAAOI,CAAM,GAAG,GAAGJ,EAAI,OAAOM,CAAM,EAAC;AAAA,EACzD;AAAA,EACA,WAAWE,GAAK;AACZ,UAAM,EAAE,MAAMP,GAAK,MAAMD,EAAG,IAAKP,IAC3BgB,IAAKR,EAAI,OAAO,GAAMD,EAAI,OAAOQ,EAAI,CAAC,CAAC,GACvCE,IAAKT,EAAI,OAAO,GAAMD,EAAI,OAAOQ,EAAI,CAAC,CAAC,GACvCG,IAAMF,IAAKC;AACjB,WAAOT,EAAI,OAAO,IAAMU,CAAG;AAAA,EAC/B;AACJ,GAGMtQ,KAAM,OAAO,CAAC,GAAGC,KAAM,OAAO,CAAC,GAAGyD,KAAM,OAAO,CAAC,GAAGC,KAAM,OAAO,CAAC,GAAGC,KAAM,OAAO,CAAC;AAoBjF,SAAS2M,GAAYhD,GAAQiD,IAAY,IAAI;AAChD,QAAMC,IAAYxD,GAAkB,eAAeM,GAAQiD,CAAS,GAC9D,EAAE,IAAAzL,GAAI,IAAAuI,EAAE,IAAKmD;AACnB,MAAItD,IAAQsD,EAAU;AACtB,QAAM,EAAE,GAAGC,GAAU,GAAGC,EAAW,IAAKxD;AACxC,EAAA3K,GAAegO,GAAW,IAAI;AAAA,IAC1B,oBAAoB;AAAA,IACpB,eAAe;AAAA,IACf,eAAe;AAAA,IACf,WAAW;AAAA,IACX,SAAS;AAAA,IACT,MAAM;AAAA,EACd,CAAK;AACD,QAAM,EAAE,MAAAI,EAAI,IAAKJ;AACjB,MAAII,MAEI,CAAC7L,EAAG,IAAIoI,EAAM,CAAC,KAAK,OAAOyD,EAAK,QAAS,YAAY,CAAC,MAAM,QAAQA,EAAK,OAAO;AAChF,UAAM,IAAI,MAAM,4DAA4D;AAGpF,QAAMC,IAAUC,GAAY/L,GAAIuI,CAAE;AAClC,WAASyD,IAA+B;AACpC,QAAI,CAAChM,EAAG;AACJ,YAAM,IAAI,MAAM,4DAA4D;AAAA,EACpF;AAEA,WAASiM,EAAaC,GAAI/E,GAAOgF,GAAc;AAC3C,UAAM,EAAE,GAAA7M,GAAG,GAAA8M,MAAMjF,EAAM,SAAQ,GACzBkF,IAAKrM,EAAG,QAAQV,CAAC;AAEvB,QADAnE,GAAMgR,GAAc,cAAc,GAC9BA,GAAc;AACd,MAAAH,EAA4B;AAC5B,YAAMM,IAAW,CAACtM,EAAG,MAAMoM,CAAC;AAC5B,aAAOhV,GAAYmV,GAAQD,CAAQ,GAAGD,CAAE;AAAA,IAC5C;AAEI,aAAOjV,GAAY,WAAW,GAAG,CAAI,GAAGiV,GAAIrM,EAAG,QAAQoM,CAAC,CAAC;AAAA,EAEjE;AACA,WAASI,EAAe1X,GAAO;AAC3BH,IAAAA,EAAOG,GAAO,QAAW,OAAO;AAChC,UAAM,EAAE,WAAW2S,GAAM,uBAAuBgF,EAAM,IAAKX,GACrDjX,IAASC,EAAM,QACf4X,IAAO5X,EAAM,CAAC,GACd6X,IAAO7X,EAAM,SAAS,CAAC;AAE7B,QAAID,MAAW4S,MAASiF,MAAS,KAAQA,MAAS,IAAO;AACrD,YAAMpN,IAAIU,EAAG,UAAU2M,CAAI;AAC3B,UAAI,CAAC3M,EAAG,QAAQV,CAAC;AACb,cAAM,IAAI,MAAM,qCAAqC;AACzD,YAAMsN,IAAKC,EAAoBvN,CAAC;AAChC,UAAI8M;AACJ,UAAI;AACA,QAAAA,IAAIpM,EAAG,KAAK4M,CAAE;AAAA,MAClB,SACOE,GAAW;AACd,cAAMC,IAAMD,aAAqB,QAAQ,OAAOA,EAAU,UAAU;AACpE,cAAM,IAAI,MAAM,2CAA2CC,CAAG;AAAA,MAClE;AACA,MAAAf,EAA4B;AAC5B,YAAMgB,IAAQhN,EAAG,MAAMoM,CAAC;AAExB,cADeM,IAAO,OAAO,MACfM,MACVZ,IAAIpM,EAAG,IAAIoM,CAAC,IACT,EAAE,GAAA9M,GAAG,GAAA8M,EAAC;AAAA,IACjB,WACSvX,MAAW4X,KAAUC,MAAS,GAAM;AAEzC,YAAMO,IAAIjN,EAAG,OACPV,IAAIU,EAAG,UAAU2M,EAAK,SAAS,GAAGM,CAAC,CAAC,GACpCb,IAAIpM,EAAG,UAAU2M,EAAK,SAASM,GAAGA,IAAI,CAAC,CAAC;AAC9C,UAAI,CAACC,EAAU5N,GAAG8M,CAAC;AACf,cAAM,IAAI,MAAM,4BAA4B;AAChD,aAAO,EAAE,GAAA9M,GAAG,GAAA8M,EAAC;AAAA,IACjB;AAEI,YAAM,IAAI,MAAM,yBAAyBvX,CAAM,yBAAyB4S,CAAI,oBAAoBgF,CAAM,EAAE;AAAA,EAEhH;AACA,QAAMU,IAAc1B,EAAU,WAAWQ,GACnCmB,IAAc3B,EAAU,aAAae;AAC3C,WAASK,EAAoBvN,GAAG;AAC5B,UAAM+N,IAAKrN,EAAG,IAAIV,CAAC,GACbgO,IAAKtN,EAAG,IAAIqN,GAAI/N,CAAC;AACvB,WAAOU,EAAG,IAAIA,EAAG,IAAIsN,GAAItN,EAAG,IAAIV,GAAG8I,EAAM,CAAC,CAAC,GAAGA,EAAM,CAAC;AAAA,EACzD;AAGA,WAAS8E,EAAU5N,GAAG8M,GAAG;AACrB,UAAMmB,IAAOvN,EAAG,IAAIoM,CAAC,GACfoB,IAAQX,EAAoBvN,CAAC;AACnC,WAAOU,EAAG,IAAIuN,GAAMC,CAAK;AAAA,EAC7B;AAGA,MAAI,CAACN,EAAU9E,EAAM,IAAIA,EAAM,EAAE;AAC7B,UAAM,IAAI,MAAM,mCAAmC;AAGvD,QAAMqF,IAAOzN,EAAG,IAAIA,EAAG,IAAIoI,EAAM,GAAGxJ,EAAG,GAAGC,EAAG,GACvC6O,IAAQ1N,EAAG,IAAIA,EAAG,IAAIoI,EAAM,CAAC,GAAG,OAAO,EAAE,CAAC;AAChD,MAAIpI,EAAG,IAAIA,EAAG,IAAIyN,GAAMC,CAAK,CAAC;AAC1B,UAAM,IAAI,MAAM,0BAA0B;AAE9C,WAASC,EAAOlZ,GAAOD,GAAGoZ,IAAU,IAAO;AACvC,QAAI,CAAC5N,EAAG,QAAQxL,CAAC,KAAMoZ,KAAW5N,EAAG,IAAIxL,CAAC;AACtC,YAAM,IAAI,MAAM,wBAAwBC,CAAK,EAAE;AACnD,WAAOD;AAAA,EACX;AACA,WAASqZ,EAAUC,GAAO;AACtB,QAAI,EAAEA,aAAiB7G;AACnB,YAAM,IAAI,MAAM,4BAA4B;AAAA,EACpD;AACA,WAAS8G,EAAiB/Q,GAAG;AACzB,QAAI,CAAC6O,KAAQ,CAACA,EAAK;AACf,YAAM,IAAI,MAAM,SAAS;AAC7B,WAAOxC,GAAiBrM,GAAG6O,EAAK,SAAStD,EAAG,KAAK;AAAA,EACrD;AAKA,QAAMyF,IAAe3P,GAAS,CAACqE,GAAGuL,MAAO;AACrC,UAAM,EAAE,GAAAC,GAAG,GAAAC,GAAG,GAAAzM,EAAC,IAAKgB;AAEpB,QAAI1C,EAAG,IAAI0B,GAAG1B,EAAG,GAAG;AAChB,aAAO,EAAE,GAAGkO,GAAG,GAAGC,EAAC;AACvB,UAAMC,IAAM1L,EAAE,IAAG;AAGjB,IAAIuL,KAAM,SACNA,IAAKG,IAAMpO,EAAG,MAAMA,EAAG,IAAI0B,CAAC;AAChC,UAAMpC,IAAIU,EAAG,IAAIkO,GAAGD,CAAE,GAChB7B,IAAIpM,EAAG,IAAImO,GAAGF,CAAE,GAChBI,IAAKrO,EAAG,IAAI0B,GAAGuM,CAAE;AACvB,QAAIG;AACA,aAAO,EAAE,GAAGpO,EAAG,MAAM,GAAGA,EAAG,KAAI;AACnC,QAAI,CAACA,EAAG,IAAIqO,GAAIrO,EAAG,GAAG;AAClB,YAAM,IAAI,MAAM,kBAAkB;AACtC,WAAO,EAAE,GAAAV,GAAG,GAAA8M,EAAC;AAAA,EACjB,CAAC,GAGKkC,KAAkBjQ,GAAS,CAACqE,MAAM;AACpC,QAAIA,EAAE,OAAO;AAIT,UAAI+I,EAAU,sBAAsB,CAACzL,EAAG,IAAI0C,EAAE,CAAC;AAC3C;AACJ,YAAM,IAAI,MAAM,iBAAiB;AAAA,IACrC;AAEA,UAAM,EAAE,GAAApD,GAAG,GAAA8M,MAAM1J,EAAE,SAAQ;AAC3B,QAAI,CAAC1C,EAAG,QAAQV,CAAC,KAAK,CAACU,EAAG,QAAQoM,CAAC;AAC/B,YAAM,IAAI,MAAM,sCAAsC;AAC1D,QAAI,CAACc,EAAU5N,GAAG8M,CAAC;AACf,YAAM,IAAI,MAAM,mCAAmC;AACvD,QAAI,CAAC1J,EAAE,cAAa;AAChB,YAAM,IAAI,MAAM,wCAAwC;AAC5D,WAAO;AAAA,EACX,CAAC;AACD,WAAS6L,GAAWC,GAAUC,GAAKC,GAAK/E,GAAOC,GAAO;AAClD,WAAA8E,IAAM,IAAIzH,EAAMjH,EAAG,IAAI0O,EAAI,GAAGF,CAAQ,GAAGE,EAAI,GAAGA,EAAI,CAAC,GACrDD,IAAMtJ,GAASwE,GAAO8E,CAAG,GACzBC,IAAMvJ,GAASyE,GAAO8E,CAAG,GAClBD,EAAI,IAAIC,CAAG;AAAA,EACtB;AAMA,QAAMC,IAAN,MAAMA,EAAM;AAAA;AAAA,IAaR,YAAYT,GAAGC,GAAGzM,GAAG;AAJrB,MAAA7I,EAAA;AACA,MAAAA,EAAA;AACA,MAAAA,EAAA;AAGI,WAAK,IAAI8U,EAAO,KAAKO,CAAC,GACtB,KAAK,IAAIP,EAAO,KAAKQ,GAAG,EAAI,GAC5B,KAAK,IAAIR,EAAO,KAAKjM,CAAC,GACtB,OAAO,OAAO,IAAI;AAAA,IACtB;AAAA,IACA,OAAO,QAAQ;AACX,aAAO0G;AAAA,IACX;AAAA;AAAA,IAEA,OAAO,WAAW1F,GAAG;AACjB,YAAM,EAAE,GAAApD,GAAG,GAAA8M,EAAC,IAAK1J,KAAK,CAAA;AACtB,UAAI,CAACA,KAAK,CAAC1C,EAAG,QAAQV,CAAC,KAAK,CAACU,EAAG,QAAQoM,CAAC;AACrC,cAAM,IAAI,MAAM,sBAAsB;AAC1C,UAAI1J,aAAaiM;AACb,cAAM,IAAI,MAAM,8BAA8B;AAElD,aAAI3O,EAAG,IAAIV,CAAC,KAAKU,EAAG,IAAIoM,CAAC,IACduC,EAAM,OACV,IAAIA,EAAMrP,GAAG8M,GAAGpM,EAAG,GAAG;AAAA,IACjC;AAAA,IACA,OAAO,UAAUlL,GAAO;AACpB,YAAM0L,IAAImO,EAAM,WAAWvB,EAAYzY,EAAOG,GAAO,QAAW,OAAO,CAAC,CAAC;AACzE,aAAA0L,EAAE,eAAc,GACTA;AAAA,IACX;AAAA,IACA,OAAO,QAAQjK,GAAK;AAChB,aAAOoY,EAAM,UAAUhY,GAAWJ,CAAG,CAAC;AAAA,IAC1C;AAAA,IACA,IAAI,IAAI;AACJ,aAAO,KAAK,SAAQ,EAAG;AAAA,IAC3B;AAAA,IACA,IAAI,IAAI;AACJ,aAAO,KAAK,SAAQ,EAAG;AAAA,IAC3B;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,IAOA,WAAWwP,IAAa,GAAG6I,IAAS,IAAM;AACtC,aAAAC,GAAK,YAAY,MAAM9I,CAAU,GAC5B6I,KACD,KAAK,SAAShQ,EAAG,GACd;AAAA,IACX;AAAA;AAAA;AAAA,IAGA,iBAAiB;AACb,MAAA0P,GAAgB,IAAI;AAAA,IACxB;AAAA,IACA,WAAW;AACP,YAAM,EAAE,GAAAlC,EAAC,IAAK,KAAK,SAAQ;AAC3B,UAAI,CAACpM,EAAG;AACJ,cAAM,IAAI,MAAM,6BAA6B;AACjD,aAAO,CAACA,EAAG,MAAMoM,CAAC;AAAA,IACtB;AAAA;AAAA,IAEA,OAAO0B,GAAO;AACV,MAAAD,EAAUC,CAAK;AACf,YAAM,EAAE,GAAGgB,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAK,MAC1B,EAAE,GAAGC,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAKrB,GAC1BsB,IAAKpP,EAAG,IAAIA,EAAG,IAAI8O,GAAIK,CAAE,GAAGnP,EAAG,IAAIiP,GAAID,CAAE,CAAC,GAC1CK,IAAKrP,EAAG,IAAIA,EAAG,IAAI+O,GAAII,CAAE,GAAGnP,EAAG,IAAIkP,GAAIF,CAAE,CAAC;AAChD,aAAOI,KAAMC;AAAA,IACjB;AAAA;AAAA,IAEA,SAAS;AACL,aAAO,IAAIV,EAAM,KAAK,GAAG3O,EAAG,IAAI,KAAK,CAAC,GAAG,KAAK,CAAC;AAAA,IACnD;AAAA;AAAA;AAAA;AAAA;AAAA,IAKA,SAAS;AACL,YAAM,EAAE,GAAA1L,GAAG,GAAA+D,EAAC,IAAK+P,GACXkH,IAAKtP,EAAG,IAAI3H,GAAGuG,EAAG,GAClB,EAAE,GAAGkQ,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAK;AAChC,UAAIO,IAAKvP,EAAG,MAAMwP,IAAKxP,EAAG,MAAMyP,IAAKzP,EAAG,MACpC0P,IAAK1P,EAAG,IAAI8O,GAAIA,CAAE,GAClBa,IAAK3P,EAAG,IAAI+O,GAAIA,CAAE,GAClBa,IAAK5P,EAAG,IAAIgP,GAAIA,CAAE,GAClBa,IAAK7P,EAAG,IAAI8O,GAAIC,CAAE;AACtB,aAAAc,IAAK7P,EAAG,IAAI6P,GAAIA,CAAE,GAClBJ,IAAKzP,EAAG,IAAI8O,GAAIE,CAAE,GAClBS,IAAKzP,EAAG,IAAIyP,GAAIA,CAAE,GAClBF,IAAKvP,EAAG,IAAI1L,GAAGmb,CAAE,GACjBD,IAAKxP,EAAG,IAAIsP,GAAIM,CAAE,GAClBJ,IAAKxP,EAAG,IAAIuP,GAAIC,CAAE,GAClBD,IAAKvP,EAAG,IAAI2P,GAAIH,CAAE,GAClBA,IAAKxP,EAAG,IAAI2P,GAAIH,CAAE,GAClBA,IAAKxP,EAAG,IAAIuP,GAAIC,CAAE,GAClBD,IAAKvP,EAAG,IAAI6P,GAAIN,CAAE,GAClBE,IAAKzP,EAAG,IAAIsP,GAAIG,CAAE,GAClBG,IAAK5P,EAAG,IAAI1L,GAAGsb,CAAE,GACjBC,IAAK7P,EAAG,IAAI0P,GAAIE,CAAE,GAClBC,IAAK7P,EAAG,IAAI1L,GAAGub,CAAE,GACjBA,IAAK7P,EAAG,IAAI6P,GAAIJ,CAAE,GAClBA,IAAKzP,EAAG,IAAI0P,GAAIA,CAAE,GAClBA,IAAK1P,EAAG,IAAIyP,GAAIC,CAAE,GAClBA,IAAK1P,EAAG,IAAI0P,GAAIE,CAAE,GAClBF,IAAK1P,EAAG,IAAI0P,GAAIG,CAAE,GAClBL,IAAKxP,EAAG,IAAIwP,GAAIE,CAAE,GAClBE,IAAK5P,EAAG,IAAI+O,GAAIC,CAAE,GAClBY,IAAK5P,EAAG,IAAI4P,GAAIA,CAAE,GAClBF,IAAK1P,EAAG,IAAI4P,GAAIC,CAAE,GAClBN,IAAKvP,EAAG,IAAIuP,GAAIG,CAAE,GAClBD,IAAKzP,EAAG,IAAI4P,GAAID,CAAE,GAClBF,IAAKzP,EAAG,IAAIyP,GAAIA,CAAE,GAClBA,IAAKzP,EAAG,IAAIyP,GAAIA,CAAE,GACX,IAAId,EAAMY,GAAIC,GAAIC,CAAE;AAAA,IAC/B;AAAA;AAAA;AAAA;AAAA;AAAA,IAKA,IAAI3B,GAAO;AACP,MAAAD,EAAUC,CAAK;AACf,YAAM,EAAE,GAAGgB,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAK,MAC1B,EAAE,GAAGC,GAAI,GAAGC,GAAI,GAAGC,EAAE,IAAKrB;AAChC,UAAIyB,IAAKvP,EAAG,MAAMwP,IAAKxP,EAAG,MAAMyP,IAAKzP,EAAG;AACxC,YAAM1L,IAAI8T,EAAM,GACVkH,IAAKtP,EAAG,IAAIoI,EAAM,GAAGxJ,EAAG;AAC9B,UAAI8Q,IAAK1P,EAAG,IAAI8O,GAAIG,CAAE,GAClBU,IAAK3P,EAAG,IAAI+O,GAAIG,CAAE,GAClBU,IAAK5P,EAAG,IAAIgP,GAAIG,CAAE,GAClBU,IAAK7P,EAAG,IAAI8O,GAAIC,CAAE,GAClBe,IAAK9P,EAAG,IAAIiP,GAAIC,CAAE;AACtB,MAAAW,IAAK7P,EAAG,IAAI6P,GAAIC,CAAE,GAClBA,IAAK9P,EAAG,IAAI0P,GAAIC,CAAE,GAClBE,IAAK7P,EAAG,IAAI6P,GAAIC,CAAE,GAClBA,IAAK9P,EAAG,IAAI8O,GAAIE,CAAE;AAClB,UAAIe,IAAK/P,EAAG,IAAIiP,GAAIE,CAAE;AACtB,aAAAW,IAAK9P,EAAG,IAAI8P,GAAIC,CAAE,GAClBA,IAAK/P,EAAG,IAAI0P,GAAIE,CAAE,GAClBE,IAAK9P,EAAG,IAAI8P,GAAIC,CAAE,GAClBA,IAAK/P,EAAG,IAAI+O,GAAIC,CAAE,GAClBO,IAAKvP,EAAG,IAAIkP,GAAIC,CAAE,GAClBY,IAAK/P,EAAG,IAAI+P,GAAIR,CAAE,GAClBA,IAAKvP,EAAG,IAAI2P,GAAIC,CAAE,GAClBG,IAAK/P,EAAG,IAAI+P,GAAIR,CAAE,GAClBE,IAAKzP,EAAG,IAAI1L,GAAGwb,CAAE,GACjBP,IAAKvP,EAAG,IAAIsP,GAAIM,CAAE,GAClBH,IAAKzP,EAAG,IAAIuP,GAAIE,CAAE,GAClBF,IAAKvP,EAAG,IAAI2P,GAAIF,CAAE,GAClBA,IAAKzP,EAAG,IAAI2P,GAAIF,CAAE,GAClBD,IAAKxP,EAAG,IAAIuP,GAAIE,CAAE,GAClBE,IAAK3P,EAAG,IAAI0P,GAAIA,CAAE,GAClBC,IAAK3P,EAAG,IAAI2P,GAAID,CAAE,GAClBE,IAAK5P,EAAG,IAAI1L,GAAGsb,CAAE,GACjBE,IAAK9P,EAAG,IAAIsP,GAAIQ,CAAE,GAClBH,IAAK3P,EAAG,IAAI2P,GAAIC,CAAE,GAClBA,IAAK5P,EAAG,IAAI0P,GAAIE,CAAE,GAClBA,IAAK5P,EAAG,IAAI1L,GAAGsb,CAAE,GACjBE,IAAK9P,EAAG,IAAI8P,GAAIF,CAAE,GAClBF,IAAK1P,EAAG,IAAI2P,GAAIG,CAAE,GAClBN,IAAKxP,EAAG,IAAIwP,GAAIE,CAAE,GAClBA,IAAK1P,EAAG,IAAI+P,GAAID,CAAE,GAClBP,IAAKvP,EAAG,IAAI6P,GAAIN,CAAE,GAClBA,IAAKvP,EAAG,IAAIuP,GAAIG,CAAE,GAClBA,IAAK1P,EAAG,IAAI6P,GAAIF,CAAE,GAClBF,IAAKzP,EAAG,IAAI+P,GAAIN,CAAE,GAClBA,IAAKzP,EAAG,IAAIyP,GAAIC,CAAE,GACX,IAAIf,EAAMY,GAAIC,GAAIC,CAAE;AAAA,IAC/B;AAAA,IACA,SAAS3B,GAAO;AACZ,aAAO,KAAK,IAAIA,EAAM,OAAM,CAAE;AAAA,IAClC;AAAA,IACA,MAAM;AACF,aAAO,KAAK,OAAOa,EAAM,IAAI;AAAA,IACjC;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,IAUA,SAASpK,GAAQ;AACb,YAAM,EAAE,MAAAsH,EAAI,IAAKJ;AACjB,UAAI,CAAClD,EAAG,YAAYhE,CAAM;AACtB,cAAM,IAAI,MAAM,8BAA8B;AAClD,UAAI4C,GAAO6I;AACX,YAAMC,IAAM,CAACzb,MAAMqa,GAAK,OAAO,MAAMra,GAAG,CAACkO,MAAM4C,GAAWqJ,GAAOjM,CAAC,CAAC;AAEnE,UAAImJ,GAAM;AACN,cAAM,EAAE,OAAAlC,GAAO,IAAA/B,GAAI,OAAAgC,GAAO,IAAA/B,EAAE,IAAKkG,EAAiBxJ,CAAM,GAClD,EAAE,GAAGkK,GAAK,GAAGyB,EAAG,IAAKD,EAAIrI,CAAE,GAC3B,EAAE,GAAG8G,GAAK,GAAGyB,EAAG,IAAKF,EAAIpI,CAAE;AACjC,QAAAmI,IAAOE,EAAI,IAAIC,CAAG,GAClBhJ,IAAQoH,GAAW1C,EAAK,MAAM4C,GAAKC,GAAK/E,GAAOC,CAAK;AAAA,MACxD,OACK;AACD,cAAM,EAAE,GAAAlH,GAAG,GAAAtE,MAAM6R,EAAI1L,CAAM;AAC3B,QAAA4C,IAAQzE,GACRsN,IAAO5R;AAAA,MACX;AAEA,aAAOkH,GAAWqJ,GAAO,CAACxH,GAAO6I,CAAI,CAAC,EAAE,CAAC;AAAA,IAC7C;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,IAMA,eAAeI,GAAI;AACf,YAAM,EAAE,MAAAvE,EAAI,IAAKJ,GACX/I,IAAI;AACV,UAAI,CAAC6F,EAAG,QAAQ6H,CAAE;AACd,cAAM,IAAI,MAAM,8BAA8B;AAClD,UAAIA,MAAOnV,MAAOyH,EAAE,IAAG;AACnB,eAAOiM,EAAM;AACjB,UAAIyB,MAAOlV;AACP,eAAOwH;AACX,UAAImM,GAAK,SAAS,IAAI;AAClB,eAAO,KAAK,SAASuB,CAAE;AAG3B,UAAIvE,GAAM;AACN,cAAM,EAAE,OAAAlC,GAAO,IAAA/B,GAAI,OAAAgC,GAAO,IAAA/B,EAAE,IAAKkG,EAAiBqC,CAAE,GAC9C,EAAE,IAAAtI,GAAI,IAAAC,MAAOJ,GAAcgH,GAAOjM,GAAGkF,GAAIC,CAAE;AACjD,eAAO0G,GAAW1C,EAAK,MAAM/D,GAAIC,GAAI4B,GAAOC,CAAK;AAAA,MACrD;AAEI,eAAOiF,GAAK,OAAOnM,GAAG0N,CAAE;AAAA,IAEhC;AAAA;AAAA;AAAA;AAAA;AAAA,IAKA,SAASC,GAAW;AAChB,aAAOrC,EAAa,MAAMqC,CAAS;AAAA,IACvC;AAAA;AAAA;AAAA;AAAA;AAAA,IAKA,gBAAgB;AACZ,YAAM,EAAE,eAAAC,EAAa,IAAK7E;AAC1B,aAAIE,MAAazQ,KACN,KACPoV,IACOA,EAAc3B,GAAO,IAAI,IAC7BE,GAAK,OAAO,MAAMjD,CAAW,EAAE,IAAG;AAAA,IAC7C;AAAA,IACA,gBAAgB;AACZ,YAAM,EAAE,eAAA2E,EAAa,IAAK9E;AAC1B,aAAIE,MAAazQ,KACN,OACPqV,IACOA,EAAc5B,GAAO,IAAI,IAC7B,KAAK,eAAehD,CAAQ;AAAA,IACvC;AAAA,IACA,eAAe;AAEX,aAAO,KAAK,eAAeA,CAAQ,EAAE,IAAG;AAAA,IAC5C;AAAA,IACA,QAAQQ,IAAe,IAAM;AACzB,aAAAhR,GAAMgR,GAAc,cAAc,GAClC,KAAK,eAAc,GACZgB,EAAYwB,GAAO,MAAMxC,CAAY;AAAA,IAChD;AAAA,IACA,MAAMA,IAAe,IAAM;AACvB,aAAO7V,GAAW,KAAK,QAAQ6V,CAAY,CAAC;AAAA,IAChD;AAAA,IACA,WAAW;AACP,aAAO,UAAU,KAAK,IAAG,IAAK,SAAS,KAAK,MAAK,CAAE;AAAA,IACvD;AAAA,EACR;AA3RQ;AAAA,EAAAtT,EAFE8V,GAEK,QAAO,IAAIA,EAAMvG,EAAM,IAAIA,EAAM,IAAIpI,EAAG,GAAG;AAAA,EAElDnH,EAJE8V,GAIK,QAAO,IAAIA,EAAM3O,EAAG,MAAMA,EAAG,KAAKA,EAAG,IAAI;AAAA;AAAA,EAEhDnH,EANE8V,GAMK,MAAK3O;AAAA,EAEZnH,EARE8V,GAQK,MAAKpG;AARhB,MAAMtB,IAAN0H;AA8RA,QAAMhJ,KAAO4C,EAAG,MACVsG,KAAO,IAAI7H,GAAKC,GAAOwE,EAAU,OAAO,KAAK,KAAK9F,KAAO,CAAC,IAAIA,EAAI;AACxE,SAAAsB,EAAM,KAAK,WAAW,CAAC,GAChBA;AACX;AAEA,SAASsF,GAAQD,GAAU;AACvB,SAAO,WAAW,GAAGA,IAAW,IAAO,CAAI;AAC/C;AA6HA,SAASP,GAAY/L,GAAIuI,GAAI;AACzB,SAAO;AAAA,IACH,WAAWA,EAAG;AAAA,IACd,WAAW,IAAIvI,EAAG;AAAA,IAClB,uBAAuB,IAAI,IAAIA,EAAG;AAAA,IAClC,oBAAoB;AAAA,IACpB,WAAW,IAAIuI,EAAG;AAAA,EAC1B;AACA;AAKO,SAASiI,GAAKvJ,GAAOwJ,IAAW,IAAI;AACvC,QAAM,EAAE,IAAAlI,EAAE,IAAKtB,GACTyJ,IAAeD,EAAS,eAAeE,IACvC7E,IAAU,OAAO,OAAOC,GAAY9E,EAAM,IAAIsB,CAAE,GAAG,EAAE,MAAM1D,GAAiB0D,EAAG,KAAK,EAAC,CAAE;AAC7F,WAASqI,EAAiBhI,GAAW;AACjC,QAAI;AACA,YAAMrN,IAAMgN,EAAG,UAAUK,CAAS;AAClC,aAAOL,EAAG,YAAYhN,CAAG;AAAA,IAC7B,QACc;AACV,aAAO;AAAA,IACX;AAAA,EACJ;AACA,WAASsV,EAAiBC,GAAW3E,GAAc;AAC/C,UAAM,EAAE,WAAW1E,GAAM,uBAAAsJ,EAAqB,IAAKjF;AACnD,QAAI;AACA,YAAMkF,IAAIF,EAAU;AAGpB,aAFI3E,MAAiB,MAAQ6E,MAAMvJ,KAE/B0E,MAAiB,MAAS6E,MAAMD,IACzB,KACJ,CAAC,CAAC9J,EAAM,UAAU6J,CAAS;AAAA,IACtC,QACc;AACV,aAAO;AAAA,IACX;AAAA,EACJ;AAKA,WAASpI,EAAgBrL,IAAOqT,EAAa5E,EAAQ,IAAI,GAAG;AACxD,WAAOhH,GAAenQ,EAAO0I,GAAMyO,EAAQ,MAAM,MAAM,GAAGvD,EAAG,KAAK;AAAA,EACtE;AAMA,WAASI,EAAaC,GAAWuD,IAAe,IAAM;AAClD,WAAOlF,EAAM,KAAK,SAASsB,EAAG,UAAUK,CAAS,CAAC,EAAE,QAAQuD,CAAY;AAAA,EAC5E;AAIA,WAAS8E,EAAU7L,GAAM;AACrB,UAAM,EAAE,WAAAwD,GAAW,WAAAkI,GAAW,uBAAAC,EAAqB,IAAKjF;AAGxD,QAFI,CAACzX,GAAQ+Q,CAAI,KAEZ,cAAcmD,KAAMA,EAAG,YAAaK,MAAckI;AACnD;AACJ,UAAME,IAAIrc,EAAOyQ,GAAM,QAAW,KAAK,EAAE;AACzC,WAAO4L,MAAMF,KAAaE,MAAMD;AAAA,EACpC;AASA,WAASG,EAAgBC,GAAYC,GAAYjF,IAAe,IAAM;AAClE,QAAI8E,EAAUE,CAAU,MAAM;AAC1B,YAAM,IAAI,MAAM,+BAA+B;AACnD,QAAIF,EAAUG,CAAU,MAAM;AAC1B,YAAM,IAAI,MAAM,+BAA+B;AACnD,UAAMC,IAAI9I,EAAG,UAAU4I,CAAU;AAEjC,WADUlK,EAAM,UAAUmK,CAAU,EAC3B,SAASC,CAAC,EAAE,QAAQlF,CAAY;AAAA,EAC7C;AACA,QAAMmF,IAAQ;AAAA,IACV,kBAAAV;AAAA,IACA,kBAAAC;AAAA,IACA,iBAAAnI;AAAA,EACR,GACU6I,IAAS9I,GAAaC,GAAiBC,CAAY;AACzD,SAAO,OAAO,OAAO,EAAE,cAAAA,GAAc,iBAAAuI,GAAiB,QAAAK,GAAQ,OAAAtK,GAAO,OAAAqK,GAAO,SAAAxF,GAAS;AACzF;AAgBO,SAAS0F,GAAMvK,GAAO6B,GAAM2I,IAAY,CAAA,GAAI;AAC/C,EAAAtc,GAAM2T,CAAI,GACVrL,GAAegU,GAAW,IAAI;AAAA,IAC1B,MAAM;AAAA,IACN,MAAM;AAAA,IACN,aAAa;AAAA,IACb,UAAU;AAAA,IACV,eAAe;AAAA,EACvB,CAAK,GACDA,IAAY,OAAO,OAAO,CAAA,GAAIA,CAAS;AACvC,QAAM1Z,IAAc0Z,EAAU,eAAed,IACvCzH,IAAOuI,EAAU,SAAS,CAAC1M,GAAKnN,MAAQ8Z,GAAU5I,GAAM/D,GAAKnN,CAAG,IAChE,EAAE,IAAAoI,GAAI,IAAAuI,EAAE,IAAKtB,GACb,EAAE,OAAO2E,GAAa,MAAM+F,EAAM,IAAKpJ,GACvC,EAAE,QAAAgJ,GAAQ,cAAA5I,GAAc,iBAAAuI,GAAiB,OAAAI,GAAO,SAAAxF,MAAY0E,GAAKvJ,GAAOwK,CAAS,GACjFG,IAAiB;AAAA,IACnB,SAAS;AAAA,IACT,MAAM,OAAOH,EAAU,QAAS,YAAYA,EAAU,OAAO;AAAA,IAC7D,QAAQ;AAAA,IACR,cAAc;AAAA,EACtB,GACUI,IAAmBjG,IAAcjN,KAAMqB,EAAG;AAChD,WAAS8R,EAAsBpS,GAAQ;AACnC,UAAMqS,IAAOnG,KAAe1Q;AAC5B,WAAOwE,IAASqS;AAAA,EACpB;AACA,WAASC,EAAWvd,GAAO8G,GAAK;AAC5B,QAAI,CAACgN,EAAG,YAAYhN,CAAG;AACnB,YAAM,IAAI,MAAM,qBAAqB9G,CAAK,kCAAkC;AAChF,WAAO8G;AAAA,EACX;AACA,WAAS0W,IAAsB;AAS3B,QAAIJ;AACA,YAAM,IAAI,MAAM,8DAA8D;AAAA,EACtF;AACA,WAASK,EAAkBpd,GAAOiV,GAAQ;AACtC,IAAAD,GAAkBC,CAAM;AACxB,UAAMoI,IAAOrG,EAAQ,WACfsG,IAAQrI,MAAW,YAAYoI,IAAOpI,MAAW,cAAcoI,IAAO,IAAI;AAChF,WAAOxd,EAAOG,GAAOsd,CAAK;AAAA,EAC9B;AAAA,EAIA,MAAMC,EAAU;AAAA,IAIZ,YAAYxS,GAAGwR,GAAGiB,GAAU;AAH5B,MAAAzZ,EAAA;AACA,MAAAA,EAAA;AACA,MAAAA,EAAA;AAII,UAFA,KAAK,IAAImZ,EAAW,KAAKnS,CAAC,GAC1B,KAAK,IAAImS,EAAW,KAAKX,CAAC,GACtBiB,KAAY,MAAM;AAElB,YADAL,EAAmB,GACf,CAAC,CAAC,GAAG,GAAG,GAAG,CAAC,EAAE,SAASK,CAAQ;AAC/B,gBAAM,IAAI,MAAM,qBAAqB;AACzC,aAAK,WAAWA;AAAA,MACpB;AACA,aAAO,OAAO,IAAI;AAAA,IACtB;AAAA,IACA,OAAO,UAAUxd,GAAOiV,IAAS6H,EAAe,QAAQ;AACpD,MAAAM,EAAkBpd,GAAOiV,CAAM;AAC/B,UAAIwI;AACJ,UAAIxI,MAAW,OAAO;AAClB,cAAM,EAAE,GAAAlK,GAAG,GAAAwR,EAAC,IAAKhH,GAAI,MAAM1V,EAAOG,CAAK,CAAC;AACxC,eAAO,IAAIud,EAAUxS,GAAGwR,CAAC;AAAA,MAC7B;AACA,MAAItH,MAAW,gBACXwI,IAAQzd,EAAM,CAAC,GACfiV,IAAS,WACTjV,IAAQA,EAAM,SAAS,CAAC;AAE5B,YAAMmY,IAAInB,EAAQ,YAAY,GACxBjM,IAAI/K,EAAM,SAAS,GAAGmY,CAAC,GACvBoE,IAAIvc,EAAM,SAASmY,GAAGA,IAAI,CAAC;AACjC,aAAO,IAAIoF,EAAU9J,EAAG,UAAU1I,CAAC,GAAG0I,EAAG,UAAU8I,CAAC,GAAGkB,CAAK;AAAA,IAChE;AAAA,IACA,OAAO,QAAQhc,GAAKwT,GAAQ;AACxB,aAAO,KAAK,UAAUpT,GAAWJ,CAAG,GAAGwT,CAAM;AAAA,IACjD;AAAA,IACA,iBAAiB;AACb,YAAM,EAAE,UAAAuI,EAAQ,IAAK;AACrB,UAAIA,KAAY;AACZ,cAAM,IAAI,MAAM,sCAAsC;AAC1D,aAAOA;AAAA,IACX;AAAA,IACA,eAAeA,GAAU;AACrB,aAAO,IAAID,EAAU,KAAK,GAAG,KAAK,GAAGC,CAAQ;AAAA,IACjD;AAAA,IACA,iBAAiBE,GAAa;AAC1B,YAAM,EAAE,GAAA3S,GAAG,GAAAwR,EAAC,IAAK,MACXiB,IAAW,KAAK,eAAc,GAC9BG,IAAOH,MAAa,KAAKA,MAAa,IAAIzS,IAAI+L,IAAc/L;AAClE,UAAI,CAACG,EAAG,QAAQyS,CAAI;AAChB,cAAM,IAAI,MAAM,2CAA2C;AAC/D,YAAMnT,IAAIU,EAAG,QAAQyS,CAAI,GACnBxQ,IAAIgF,EAAM,UAAU7P,GAAYmV,IAAS+F,IAAW,OAAO,CAAC,GAAGhT,CAAC,CAAC,GACjEoT,IAAKnK,EAAG,IAAIkK,CAAI,GAChBrd,IAAIud,EAAche,EAAO6d,GAAa,QAAW,SAAS,CAAC,GAC3DI,IAAKrK,EAAG,OAAO,CAACnT,IAAIsd,CAAE,GACtBG,IAAKtK,EAAG,OAAO8I,IAAIqB,CAAE,GAErBlR,IAAIyF,EAAM,KAAK,eAAe2L,CAAE,EAAE,IAAI3Q,EAAE,eAAe4Q,CAAE,CAAC;AAChE,UAAIrR,EAAE,IAAG;AACL,cAAM,IAAI,MAAM,qCAAqC;AACzD,aAAAA,EAAE,eAAc,GACTA;AAAA,IACX;AAAA;AAAA,IAEA,WAAW;AACP,aAAOsQ,EAAsB,KAAK,CAAC;AAAA,IACvC;AAAA,IACA,QAAQ/H,IAAS6H,EAAe,QAAQ;AAEpC,UADA9H,GAAkBC,CAAM,GACpBA,MAAW;AACX,eAAOpT,GAAW0T,GAAI,WAAW,IAAI,CAAC;AAC1C,YAAM,EAAE,GAAAxK,GAAG,GAAAwR,EAAC,IAAK,MACXyB,IAAKvK,EAAG,QAAQ1I,CAAC,GACjBkT,IAAKxK,EAAG,QAAQ8I,CAAC;AACvB,aAAItH,MAAW,eACXkI,EAAmB,GACZ7a,GAAY,WAAW,GAAG,KAAK,gBAAgB,GAAG0b,GAAIC,CAAE,KAE5D3b,GAAY0b,GAAIC,CAAE;AAAA,IAC7B;AAAA,IACA,MAAMhJ,GAAQ;AACV,aAAOzT,GAAW,KAAK,QAAQyT,CAAM,CAAC;AAAA,IAC1C;AAAA,EACR;AAKI,QAAMiJ,IAAWvB,EAAU,YACvB,SAAsB3c,GAAO;AAEzB,QAAIA,EAAM,SAAS;AACf,YAAM,IAAI,MAAM,oBAAoB;AAGxC,UAAMyG,IAAME,GAAgB3G,CAAK,GAC3Bme,IAAQne,EAAM,SAAS,IAAI6c;AACjC,WAAOsB,IAAQ,IAAI1X,KAAO,OAAO0X,CAAK,IAAI1X;AAAA,EAC9C,GACEoX,IAAgBlB,EAAU,iBAC5B,SAA2B3c,GAAO;AAC9B,WAAOyT,EAAG,OAAOyK,EAASle,CAAK,CAAC;AAAA,EACpC,GAEEoe,KAAa7W,GAAQsV,CAAM;AAEjC,WAASwB,GAAW5X,GAAK;AAErB,WAAAY,GAAS,aAAawV,GAAQpW,GAAKN,IAAKiY,EAAU,GAC3C3K,EAAG,QAAQhN,CAAG;AAAA,EACzB;AACA,WAAS6X,EAAmBhf,GAASif,GAAS;AAC1C1e,WAAAA,EAAOP,GAAS,QAAW,SAAS,GAC7Bif,IAAU1e,EAAOmU,EAAK1U,CAAO,GAAG,QAAW,mBAAmB,IAAIA;AAAA,EAC7E;AASA,WAASkf,GAAQlf,GAASwU,GAAW/Q,GAAM;AACvC,UAAM,EAAE,MAAA0b,GAAM,SAAAF,GAAS,cAAAG,EAAY,IAAKxJ,GAAgBnS,GAAM+Z,CAAc;AAC5E,IAAAxd,IAAUgf,EAAmBhf,GAASif,CAAO;AAI7C,UAAMI,IAAQd,EAAcve,CAAO,GAC7BuO,IAAI4F,EAAG,UAAUK,CAAS;AAChC,QAAI,CAACL,EAAG,YAAY5F,CAAC;AACjB,YAAM,IAAI,MAAM,qBAAqB;AACzC,UAAM+Q,IAAW,CAACP,GAAWxQ,CAAC,GAAGwQ,GAAWM,CAAK,CAAC;AAElD,QAAID,KAAgB,QAAQA,MAAiB,IAAO;AAGhD,YAAMG,IAAIH,MAAiB,KAAOzb,EAAY+T,EAAQ,SAAS,IAAI0H;AACnE,MAAAE,EAAS,KAAK/e,EAAOgf,GAAG,QAAW,cAAc,CAAC;AAAA,IACtD;AACA,UAAMtW,IAAOjG,GAAY,GAAGsc,CAAQ,GAC9B5T,IAAI2T;AASV,aAASG,EAAMC,GAAQ;AAGnB,YAAM7W,IAAIgW,EAASa,CAAM;AACzB,UAAI,CAACtL,EAAG,YAAYvL,CAAC;AACjB;AACJ,YAAM8W,IAAKvL,EAAG,IAAIvL,CAAC,GACb4C,IAAIqH,EAAM,KAAK,SAASjK,CAAC,EAAE,YAC3B6C,IAAI0I,EAAG,OAAO3I,EAAE,CAAC;AACvB,UAAIC,MAAM5E;AACN;AACJ,YAAMoW,IAAI9I,EAAG,OAAOuL,IAAKvL,EAAG,OAAOzI,IAAID,IAAI8C,CAAC,CAAC;AAC7C,UAAI0O,MAAMpW;AACN;AACJ,UAAIqX,MAAY1S,EAAE,MAAMC,IAAI,IAAI,KAAK,OAAOD,EAAE,IAAI1E,EAAG,GACjD6Y,KAAQ1C;AACZ,aAAIkC,KAAQzB,EAAsBT,CAAC,MAC/B0C,KAAQxL,EAAG,IAAI8I,CAAC,GAChBiB,MAAY,IAET,IAAID,EAAUxS,GAAGkU,IAAOlC,IAAmB,SAAYS,EAAQ;AAAA,IAC1E;AACA,WAAO,EAAE,MAAAjV,GAAM,OAAAuW,EAAK;AAAA,EACxB;AAYA,WAASI,GAAK5f,GAASwU,GAAW/Q,IAAO,CAAA,GAAI;AACzC,UAAM,EAAE,MAAAwF,GAAM,OAAAuW,EAAK,IAAKN,GAAQlf,GAASwU,GAAW/Q,CAAI;AAGxD,WAFayE,GAAewM,EAAK,WAAWP,EAAG,OAAOW,CAAI,EACzC7L,GAAMuW,CAAK,EACjB,QAAQ/b,EAAK,MAAM;AAAA,EAClC;AAcA,WAASoc,EAAOC,GAAW9f,GAAS0c,GAAWjZ,IAAO,CAAA,GAAI;AACtD,UAAM,EAAE,MAAA0b,GAAM,SAAAF,GAAS,QAAAtJ,EAAM,IAAKC,GAAgBnS,GAAM+Z,CAAc;AAGtE,QAFAd,IAAYnc,EAAOmc,GAAW,QAAW,WAAW,GACpD1c,IAAUgf,EAAmBhf,GAASif,CAAO,GACzC,CAAChf,GAAQ6f,CAAS,GAAG;AACrB,YAAMC,IAAMD,aAAqB7B,IAAY,wBAAwB;AACrE,YAAM,IAAI,MAAM,wCAAwC8B,CAAG;AAAA,IAC/D;AACA,IAAAjC,EAAkBgC,GAAWnK,CAAM;AACnC,QAAI;AACA,YAAMqB,IAAMiH,EAAU,UAAU6B,GAAWnK,CAAM,GAC3CvJ,IAAIyG,EAAM,UAAU6J,CAAS;AACnC,UAAIyC,KAAQnI,EAAI,SAAQ;AACpB,eAAO;AACX,YAAM,EAAE,GAAAvL,GAAG,GAAAwR,EAAC,IAAKjG,GACXhW,IAAIud,EAAcve,CAAO,GACzBggB,IAAK7L,EAAG,IAAI8I,CAAC,GACbuB,IAAKrK,EAAG,OAAOnT,IAAIgf,CAAE,GACrBvB,IAAKtK,EAAG,OAAO1I,IAAIuU,CAAE,GACrBnS,IAAIgF,EAAM,KAAK,eAAe2L,CAAE,EAAE,IAAIpS,EAAE,eAAeqS,CAAE,CAAC;AAChE,aAAI5Q,EAAE,IAAG,IACE,KACDsG,EAAG,OAAOtG,EAAE,CAAC,MACVpC;AAAA,IACjB,QACU;AACN,aAAO;AAAA,IACX;AAAA,EACJ;AACA,WAASwU,EAAiBH,GAAW9f,GAASyD,IAAO,CAAA,GAAI;AACrD,UAAM,EAAE,SAAAwb,EAAO,IAAKrJ,GAAgBnS,GAAM+Z,CAAc;AACxD,WAAAxd,IAAUgf,EAAmBhf,GAASif,CAAO,GACtChB,EAAU,UAAU6B,GAAW,WAAW,EAAE,iBAAiB9f,CAAO,EAAE,QAAO;AAAA,EACxF;AACA,SAAO,OAAO,OAAO;AAAA,IACjB,QAAAmd;AAAA,IACA,cAAA5I;AAAA,IACA,iBAAAuI;AAAA,IACA,OAAAI;AAAA,IACA,SAAAxF;AAAA,IACA,OAAA7E;AAAA,IACA,MAAA+M;AAAA,IACA,QAAAC;AAAA,IACA,kBAAAI;AAAA,IACA,WAAAhC;AAAA,IACA,MAAAvJ;AAAA,EACR,CAAK;AACL;AC7rCA;AAWA,MAAMwL,KAAkB;AAAA,EACpB,GAAG,OAAO,oEAAoE;AAAA,EAC9E,GAAG,OAAO,oEAAoE;AAAA,EAC9E,GAAG,OAAO,CAAC;AAAA,EACX,GAAG,OAAO,CAAC;AAAA,EACX,GAAG,OAAO,CAAC;AAAA,EACX,IAAI,OAAO,oEAAoE;AAAA,EAC/E,IAAI,OAAO,oEAAoE;AACnF,GACMC,KAAiB;AAAA,EACnB,MAAM,OAAO,oEAAoE;AAAA,EACjF,SAAS;AAAA,IACL,CAAC,OAAO,oCAAoC,GAAG,CAAC,OAAO,oCAAoC,CAAC;AAAA,IAC5F,CAAC,OAAO,qCAAqC,GAAG,OAAO,oCAAoC,CAAC;AAAA,EACpG;AACA,GAEM5V,KAAsB,uBAAO,CAAC;AAKpC,SAAS6V,GAAQpI,GAAG;AAChB,QAAM5L,IAAI8T,GAAgB,GAEpB1V,IAAM,OAAO,CAAC,GAAG6V,IAAM,OAAO,CAAC,GAAGC,IAAO,OAAO,EAAE,GAAGC,IAAO,OAAO,EAAE,GAErEC,IAAO,OAAO,EAAE,GAAGC,IAAO,OAAO,EAAE,GAAGC,IAAO,OAAO,EAAE,GACtDpL,IAAM0C,IAAIA,IAAIA,IAAK5L,GACnB8O,IAAM5F,IAAKA,IAAK0C,IAAK5L,GACrBuU,IAAM1V,EAAKiQ,GAAI1Q,GAAK4B,CAAC,IAAI8O,IAAM9O,GAC/BwU,IAAM3V,EAAK0V,GAAInW,GAAK4B,CAAC,IAAI8O,IAAM9O,GAC/ByU,IAAO5V,EAAK2V,GAAIrW,IAAK6B,CAAC,IAAIkJ,IAAMlJ,GAChC0U,IAAO7V,EAAK4V,GAAKP,GAAMlU,CAAC,IAAIyU,IAAOzU,GACnC2U,IAAO9V,EAAK6V,GAAKP,GAAMnU,CAAC,IAAI0U,IAAO1U,GACnC4U,IAAO/V,EAAK8V,GAAKN,GAAMrU,CAAC,IAAI2U,IAAO3U,GACnC6U,IAAQhW,EAAK+V,GAAKN,GAAMtU,CAAC,IAAI4U,IAAO5U,GACpC8U,IAAQjW,EAAKgW,GAAMR,GAAMrU,CAAC,IAAI2U,IAAO3U,GACrC+U,IAAQlW,EAAKiW,GAAM1W,GAAK4B,CAAC,IAAI8O,IAAM9O,GACnCmP,IAAMtQ,EAAKkW,GAAMX,GAAMpU,CAAC,IAAI0U,IAAO1U,GACnCoP,IAAMvQ,EAAKsQ,GAAI8E,GAAKjU,CAAC,IAAIkJ,IAAMlJ,GAC/BP,IAAOZ,EAAKuQ,GAAIjR,IAAK6B,CAAC;AAC5B,MAAI,CAACgV,GAAK,IAAIA,GAAK,IAAIvV,CAAI,GAAGmM,CAAC;AAC3B,UAAM,IAAI,MAAM,yBAAyB;AAC7C,SAAOnM;AACX;AACA,MAAMuV,KAAO9U,GAAM4T,GAAgB,GAAG,EAAE,MAAME,IAAS,GACjDiB,KAA0B,gBAAAjK,GAAY8I,IAAiB;AAAA,EACzD,IAAIkB;AAAA,EACJ,MAAMjB;AACV,CAAC,GAkBYmB,KAA4B,gBAAAlE,GAAMiE,IAASza,EAAM;AClF9D;AASO,SAAS3G,GAAQC,GAAG;AACvB,SAAOA,aAAa,cAAe,YAAY,OAAOA,CAAC,KAAKA,EAAE,YAAY,SAAS;AACvF;AAOO,SAASK,GAAO0D,MAAMyT,GAAS;AAClC,MAAI,CAACzX,GAAQgE,CAAC;AACV,UAAM,IAAI,MAAM,qBAAqB;AACzC,MAAIyT,EAAQ,SAAS,KAAK,CAACA,EAAQ,SAASzT,EAAE,MAAM;AAChD,UAAM,IAAI,MAAM,mCAAmCyT,IAAU,kBAAkBzT,EAAE,MAAM;AAC/F;AASO,SAAShD,GAAQC,GAAUC,IAAgB,IAAM;AACpD,MAAID,EAAS;AACT,UAAM,IAAI,MAAM,kCAAkC;AACtD,MAAIC,KAAiBD,EAAS;AAC1B,UAAM,IAAI,MAAM,uCAAuC;AAC/D;AAEO,SAASE,GAAQC,GAAKH,GAAU;AACnC,EAAAX,GAAOc,CAAG;AACV,QAAMC,IAAMJ,EAAS;AACrB,MAAIG,EAAI,SAASC;AACb,UAAM,IAAI,MAAM,2DAA2DA,CAAG;AAEtF;AAUO,SAASC,MAASC,GAAQ;AAC7B,WAASC,IAAI,GAAGA,IAAID,EAAO,QAAQC;AAC/B,IAAAD,EAAOC,CAAC,EAAE,KAAK,CAAC;AAExB;AAEO,SAASC,GAAWC,GAAK;AAC5B,SAAO,IAAI,SAASA,EAAI,QAAQA,EAAI,YAAYA,EAAI,UAAU;AAClE;AAEO,SAASC,EAAKC,GAAMC,GAAO;AAC9B,SAAQD,KAAS,KAAKC,IAAWD,MAASC;AAC9C;AAEO,SAASyf,GAAK1f,GAAMC,GAAO;AAC9B,SAAQD,KAAQC,IAAWD,MAAU,KAAKC,MAAY;AAC1D;AA4GO,SAAS0f,GAAYC,GAAK;AAC7B,MAAI,OAAOA,KAAQ;AACf,UAAM,IAAI,MAAM,iBAAiB;AACrC,SAAO,IAAI,WAAW,IAAI,YAAW,EAAG,OAAOA,CAAG,CAAC;AACvD;AAaO,SAASC,GAAQhd,GAAM;AAC1B,SAAI,OAAOA,KAAS,aAChBA,IAAO8c,GAAY9c,CAAI,IAC3BnE,GAAOmE,CAAI,GACJA;AACX;AAkCO,MAAMid,GAAK;AAClB;AAEO,SAASve,GAAaC,GAAU;AACnC,QAAME,IAAQ,CAACC,MAAQH,EAAQ,EAAG,OAAOqe,GAAQle,CAAG,CAAC,EAAE,OAAM,GACvDE,IAAML,EAAQ;AACpB,SAAAE,EAAM,YAAYG,EAAI,WACtBH,EAAM,WAAWG,EAAI,UACrBH,EAAM,SAAS,MAAMF,EAAQ,GACtBE;AACX;ACnPO,SAASqe,GAAajd,GAAMkd,GAAYrhB,GAAOgE,GAAM;AACxD,MAAI,OAAOG,EAAK,gBAAiB;AAC7B,WAAOA,EAAK,aAAakd,GAAYrhB,GAAOgE,CAAI;AACpD,QAAMsd,IAAO,OAAO,EAAE,GAChBC,IAAW,OAAO,UAAU,GAC5BC,IAAK,OAAQxhB,KAASshB,IAAQC,CAAQ,GACtCE,IAAK,OAAOzhB,IAAQuhB,CAAQ,GAC5B/gB,IAAIwD,IAAO,IAAI,GACfoY,IAAIpY,IAAO,IAAI;AACrB,EAAAG,EAAK,UAAUkd,IAAa7gB,GAAGghB,GAAIxd,CAAI,GACvCG,EAAK,UAAUkd,IAAajF,GAAGqF,GAAIzd,CAAI;AAC3C;AAEO,SAASR,GAAI9D,GAAG+D,GAAGC,GAAG;AACzB,SAAQhE,IAAI+D,IAAM,CAAC/D,IAAIgE;AAC3B;AAEO,SAASC,GAAIjE,GAAG+D,GAAGC,GAAG;AACzB,SAAQhE,IAAI+D,IAAM/D,IAAIgE,IAAMD,IAAIC;AACpC;AAKO,MAAMwB,WAAeic,GAAK;AAAA,EAC7B,YAAYtd,GAAUC,GAAWC,GAAWC,GAAM;AAC9C,UAAK,GACL,KAAK,WAAW,IAChB,KAAK,SAAS,GACd,KAAK,MAAM,GACX,KAAK,YAAY,IACjB,KAAK,WAAWH,GAChB,KAAK,YAAYC,GACjB,KAAK,YAAYC,GACjB,KAAK,OAAOC,GACZ,KAAK,SAAS,IAAI,WAAWH,CAAQ,GACrC,KAAK,OAAO3C,GAAW,KAAK,MAAM;AAAA,EACtC;AAAA,EACA,OAAOgD,GAAM;AACT,IAAAzD,GAAQ,IAAI,GACZyD,IAAOgd,GAAQhd,CAAI,GACnBnE,GAAOmE,CAAI;AACX,UAAM,EAAE,MAAAC,GAAM,QAAAC,GAAQ,UAAAP,EAAQ,IAAK,MAC7B1D,IAAM+D,EAAK;AACjB,aAASG,IAAM,GAAGA,IAAMlE,KAAM;AAC1B,YAAMmE,IAAO,KAAK,IAAIT,IAAW,KAAK,KAAK1D,IAAMkE,CAAG;AAEpD,UAAIC,MAAST,GAAU;AACnB,cAAMU,IAAWrD,GAAWgD,CAAI;AAChC,eAAOL,KAAY1D,IAAMkE,GAAKA,KAAOR;AACjC,eAAK,QAAQU,GAAUF,CAAG;AAC9B;AAAA,MACJ;AACA,MAAAD,EAAO,IAAIF,EAAK,SAASG,GAAKA,IAAMC,CAAI,GAAG,KAAK,GAAG,GACnD,KAAK,OAAOA,GACZD,KAAOC,GACH,KAAK,QAAQT,MACb,KAAK,QAAQM,GAAM,CAAC,GACpB,KAAK,MAAM;AAAA,IAEnB;AACA,gBAAK,UAAUD,EAAK,QACpB,KAAK,WAAU,GACR;AAAA,EACX;AAAA,EACA,WAAWrD,GAAK;AACZ,IAAAJ,GAAQ,IAAI,GACZG,GAAQC,GAAK,IAAI,GACjB,KAAK,WAAW;AAIhB,UAAM,EAAE,QAAAuD,GAAQ,MAAAD,GAAM,UAAAN,GAAU,MAAAG,EAAI,IAAK;AACzC,QAAI,EAAE,KAAAK,EAAG,IAAK;AAEd,IAAAD,EAAOC,GAAK,IAAI,KAChBtD,GAAM,KAAK,OAAO,SAASsD,CAAG,CAAC,GAG3B,KAAK,YAAYR,IAAWQ,MAC5B,KAAK,QAAQF,GAAM,CAAC,GACpBE,IAAM;AAGV,aAASpD,IAAIoD,GAAKpD,IAAI4C,GAAU5C;AAC5B,MAAAmD,EAAOnD,CAAC,IAAI;AAIhB,IAAAmgB,GAAajd,GAAMN,IAAW,GAAG,OAAO,KAAK,SAAS,CAAC,GAAGG,CAAI,GAC9D,KAAK,QAAQG,GAAM,CAAC;AACpB,UAAMK,IAAQtD,GAAWL,CAAG,GACtBV,IAAM,KAAK;AAEjB,QAAIA,IAAM;AACN,YAAM,IAAI,MAAM,6CAA6C;AACjE,UAAMsE,IAAStE,IAAM,GACfuE,IAAQ,KAAK,IAAG;AACtB,QAAID,IAASC,EAAM;AACf,YAAM,IAAI,MAAM,oCAAoC;AACxD,aAASzD,IAAI,GAAGA,IAAIwD,GAAQxD;AACxB,MAAAuD,EAAM,UAAU,IAAIvD,GAAGyD,EAAMzD,CAAC,GAAG+C,CAAI;AAAA,EAC7C;AAAA,EACA,SAAS;AACL,UAAM,EAAE,QAAAI,GAAQ,WAAAN,EAAS,IAAK;AAC9B,SAAK,WAAWM,CAAM;AACtB,UAAM1B,IAAM0B,EAAO,MAAM,GAAGN,CAAS;AACrC,gBAAK,QAAO,GACLpB;AAAA,EACX;AAAA,EACA,WAAWiC,GAAI;AACX,IAAAA,MAAOA,IAAK,IAAI,KAAK,YAAW,IAChCA,EAAG,IAAI,GAAG,KAAK,IAAG,CAAE;AACpB,UAAM,EAAE,UAAAd,GAAU,QAAAO,GAAQ,QAAAnE,GAAQ,UAAA2E,GAAU,WAAAC,GAAW,KAAAR,EAAG,IAAK;AAC/D,WAAAM,EAAG,YAAYE,GACfF,EAAG,WAAWC,GACdD,EAAG,SAAS1E,GACZ0E,EAAG,MAAMN,GACLpE,IAAS4D,KACTc,EAAG,OAAO,IAAIP,CAAM,GACjBO;AAAA,EACX;AAAA,EACA,QAAQ;AACJ,WAAO,KAAK,WAAU;AAAA,EAC1B;AACJ;AAMO,MAAMG,KAA4B,4BAAY,KAAK;AAAA,EACtD;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACxF,CAAC,GCmCK4c,KAAyB,2BAAW,KAAK;AAAA,EAC3C;AAAA,EAAG;AAAA,EAAG;AAAA,EAAI;AAAA,EAAG;AAAA,EAAI;AAAA,EAAG;AAAA,EAAI;AAAA,EAAG;AAAA,EAAI;AAAA,EAAG;AAAA,EAAG;AAAA,EAAG;AAAA,EAAG;AAAA,EAAI;AAAA,EAAI;AACvD,CAAC,GACKC,KAA+B,WAAW,KAAK,IAAI,MAAM,EAAE,EAAE,KAAK,CAAC,EAAE,IAAI,CAAClgB,GAAGR,MAAMA,CAAC,CAAC,GACrF2gB,KAA+BD,GAAM,IAAI,CAAC1gB,OAAO,IAAIA,IAAI,KAAK,EAAE,GAChE4gB,KAAyB,uBAAM;AAGjC,QAAMnf,IAAM,CAFF,CAACif,EAAK,GACN,CAACC,EAAK,CACC;AACjB,WAAS3gB,IAAI,GAAGA,IAAI,GAAGA;AACnB,aAAS6gB,KAAKpf;AACV,MAAAof,EAAE,KAAKA,EAAE7gB,CAAC,EAAE,IAAI,CAACmH,MAAMsZ,GAAOtZ,CAAC,CAAC,CAAC;AACzC,SAAO1F;AACX,GAAC,GACKqf,KAA8BF,GAAM,CAAC,GACrCG,KAA8BH,GAAM,CAAC,GAErCI,KAA4B;AAAA,EAC9B,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAAA,EACvD,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAAA,EACvD,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAAA,EACvD,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAAA,EACvD,CAAC,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,GAAG,IAAI,IAAI,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;AAC3D,EAAE,IAAI,CAAChhB,MAAM,WAAW,KAAKA,CAAC,CAAC,GACzBihB,KAA6B,gBAAAH,GAAK,IAAI,CAACI,GAAKlhB,MAAMkhB,EAAI,IAAI,CAACL,MAAMG,GAAUhhB,CAAC,EAAE6gB,CAAC,CAAC,CAAC,GACjFM,KAA6B,gBAAAJ,GAAK,IAAI,CAACG,GAAKlhB,MAAMkhB,EAAI,IAAI,CAACL,MAAMG,GAAUhhB,CAAC,EAAE6gB,CAAC,CAAC,CAAC,GACjFO,KAAwB,4BAAY,KAAK;AAAA,EAC3C;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACpD,CAAC,GACKC,KAAwB,4BAAY,KAAK;AAAA,EAC3C;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACpD,CAAC;AAED,SAASC,GAASC,GAAO9X,GAAG8M,GAAGiL,GAAG;AAC9B,SAAID,MAAU,IACH9X,IAAI8M,IAAIiL,IACfD,MAAU,IACF9X,IAAI8M,IAAM,CAAC9M,IAAI+X,IACvBD,MAAU,KACF9X,IAAI,CAAC8M,KAAKiL,IAClBD,MAAU,IACF9X,IAAI+X,IAAMjL,IAAI,CAACiL,IACpB/X,KAAK8M,IAAI,CAACiL;AACrB;AAEA,MAAMC,KAA0B,oBAAI,YAAY,EAAE;AAC3C,MAAMC,WAAkBzd,GAAO;AAAA,EAClC,cAAc;AACV,UAAM,IAAI,IAAI,GAAG,EAAI,GACrB,KAAK,KAAK,YACV,KAAK,KAAK,YACV,KAAK,KAAK,aACV,KAAK,KAAK,WACV,KAAK,KAAK;AAAA,EACd;AAAA,EACA,MAAM;AACF,UAAM,EAAE,IAAA0d,GAAI,IAAAC,GAAI,IAAAC,GAAI,IAAAC,GAAI,IAAAC,EAAE,IAAK;AAC/B,WAAO,CAACJ,GAAIC,GAAIC,GAAIC,GAAIC,CAAE;AAAA,EAC9B;AAAA,EACA,IAAIJ,GAAIC,GAAIC,GAAIC,GAAIC,GAAI;AACpB,SAAK,KAAKJ,IAAK,GACf,KAAK,KAAKC,IAAK,GACf,KAAK,KAAKC,IAAK,GACf,KAAK,KAAKC,IAAK,GACf,KAAK,KAAKC,IAAK;AAAA,EACnB;AAAA,EACA,QAAQ7e,GAAMwB,GAAQ;AAClB,aAAS1E,IAAI,GAAGA,IAAI,IAAIA,KAAK0E,KAAU;AACnC,MAAA+c,GAAQzhB,CAAC,IAAIkD,EAAK,UAAUwB,GAAQ,EAAI;AAE5C,QAAI1D,IAAK,KAAK,KAAK,GAAGghB,IAAKhhB,GAAIihB,IAAK,KAAK,KAAK,GAAGC,IAAKD,GAAIE,IAAK,KAAK,KAAK,GAAG/f,IAAK+f,GAAIC,IAAK,KAAK,KAAK,GAAGC,IAAKD,GAAIE,IAAK,KAAK,KAAK,GAAGC,IAAKD;AAGvI,aAASf,IAAQ,GAAGA,IAAQ,GAAGA,KAAS;AACpC,YAAMiB,IAAS,IAAIjB,GACbkB,IAAMrB,GAAMG,CAAK,GAAGmB,IAAMrB,GAAME,CAAK,GACrCoB,IAAK7B,GAAKS,CAAK,GAAGqB,IAAK7B,GAAKQ,CAAK,GACjC7Z,IAAKuZ,GAAWM,CAAK,GAAGsB,IAAK1B,GAAWI,CAAK;AACnD,eAASvhB,IAAI,GAAGA,IAAI,IAAIA,KAAK;AACzB,cAAM8iB,IAAMhD,GAAK9e,IAAKsgB,GAASC,GAAOU,GAAIE,GAAIC,CAAE,IAAIX,GAAQkB,EAAG3iB,CAAC,CAAC,IAAIyiB,GAAK/a,EAAG1H,CAAC,CAAC,IAAIsiB,IAAM;AACzF,QAAAthB,IAAKshB,GAAIA,IAAKF,GAAIA,IAAKtC,GAAKqC,GAAI,EAAE,IAAI,GAAGA,IAAKF,GAAIA,IAAKa;AAAA,MAC3D;AAEA,eAAS9iB,IAAI,GAAGA,IAAI,IAAIA,KAAK;AACzB,cAAM+iB,IAAMjD,GAAKkC,IAAKV,GAASkB,GAAQN,GAAI9f,GAAIigB,CAAE,IAAIZ,GAAQmB,EAAG5iB,CAAC,CAAC,IAAI0iB,GAAKG,EAAG7iB,CAAC,CAAC,IAAIuiB,IAAM;AAC1F,QAAAP,IAAKO,GAAIA,IAAKF,GAAIA,IAAKvC,GAAK1d,GAAI,EAAE,IAAI,GAAGA,IAAK8f,GAAIA,IAAKa;AAAA,MAC3D;AAAA,IACJ;AAEA,SAAK,IAAK,KAAK,KAAKZ,IAAKE,IAAM,GAAI,KAAK,KAAKD,IAAKG,IAAM,GAAI,KAAK,KAAKD,IAAKN,IAAM,GAAI,KAAK,KAAKhhB,IAAKkhB,IAAM,GAAI,KAAK,KAAKD,IAAK7f,IAAM,CAAC;AAAA,EACxI;AAAA,EACA,aAAa;AACT,IAAAtC,GAAM2hB,EAAO;AAAA,EACjB;AAAA,EACA,UAAU;AACN,SAAK,YAAY,IACjB3hB,GAAM,KAAK,MAAM,GACjB,KAAK,IAAI,GAAG,GAAG,GAAG,GAAG,CAAC;AAAA,EAC1B;AACJ;AAMO,MAAMkjB,KAA4B,gBAAArhB,GAAa,MAAM,IAAI+f,IAAW,GC5Q9DsB,KAAYC,ICInBnf,KAA2B,4BAAY,KAAK;AAAA,EAC9C;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EACpF;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AAAA,EAAY;AACxF,CAAC,GAEKC,KAA2B,oBAAI,YAAY,EAAE;AAC5C,MAAMmf,WAAejf,GAAO;AAAA,EAC/B,YAAYpB,IAAY,IAAI;AACxB,UAAM,IAAIA,GAAW,GAAG,EAAK,GAG7B,KAAK,IAAIgB,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI,GACxB,KAAK,IAAIA,GAAU,CAAC,IAAI;AAAA,EAC5B;AAAA,EACA,MAAM;AACF,UAAM,EAAE,GAAAK,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,EAAC,IAAK;AACnC,WAAO,CAACP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,CAAC;AAAA,EAClC;AAAA;AAAA,EAEA,IAAIP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAG;AACxB,SAAK,IAAIP,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI,GACb,KAAK,IAAIC,IAAI;AAAA,EACjB;AAAA,EACA,QAAQvB,GAAMwB,GAAQ;AAElB,aAAS1E,IAAI,GAAGA,IAAI,IAAIA,KAAK0E,KAAU;AACnC,MAAAX,GAAS/D,CAAC,IAAIkD,EAAK,UAAUwB,GAAQ,EAAK;AAC9C,aAAS1E,IAAI,IAAIA,IAAI,IAAIA,KAAK;AAC1B,YAAM2E,IAAMZ,GAAS/D,IAAI,EAAE,GACrB4E,IAAKb,GAAS/D,IAAI,CAAC,GACnB6E,IAAK1E,EAAKwE,GAAK,CAAC,IAAIxE,EAAKwE,GAAK,EAAE,IAAKA,MAAQ,GAC7CG,IAAK3E,EAAKyE,GAAI,EAAE,IAAIzE,EAAKyE,GAAI,EAAE,IAAKA,MAAO;AACjD,MAAAb,GAAS/D,CAAC,IAAK8E,IAAKf,GAAS/D,IAAI,CAAC,IAAI6E,IAAKd,GAAS/D,IAAI,EAAE,IAAK;AAAA,IACnE;AAEA,QAAI,EAAE,GAAAkE,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,GAAG,GAAAC,EAAC,IAAK;AACjC,aAASzE,IAAI,GAAGA,IAAI,IAAIA,KAAK;AACzB,YAAM+E,IAAS5E,EAAKmE,GAAG,CAAC,IAAInE,EAAKmE,GAAG,EAAE,IAAInE,EAAKmE,GAAG,EAAE,GAC9CU,IAAMP,IAAIM,IAASxC,GAAI+B,GAAGC,GAAGC,CAAC,IAAIV,GAAS9D,CAAC,IAAI+D,GAAS/D,CAAC,IAAK,GAE/DiF,KADS9E,EAAK+D,GAAG,CAAC,IAAI/D,EAAK+D,GAAG,EAAE,IAAI/D,EAAK+D,GAAG,EAAE,KAC/BxB,GAAIwB,GAAGC,GAAGC,CAAC,IAAK;AACrC,MAAAK,IAAID,GACJA,IAAID,GACJA,IAAID,GACJA,IAAKD,IAAIW,IAAM,GACfX,IAAID,GACJA,IAAID,GACJA,IAAID,GACJA,IAAKc,IAAKC,IAAM;AAAA,IACpB;AAEA,IAAAf,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnBC,IAAKA,IAAI,KAAK,IAAK,GACnB,KAAK,IAAIP,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,GAAGC,CAAC;AAAA,EACnC;AAAA,EACA,aAAa;AACT,IAAA3E,GAAMiE,EAAQ;AAAA,EAClB;AAAA,EACA,UAAU;AACN,SAAK,IAAI,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,CAAC,GAC/BjE,GAAM,KAAK,MAAM;AAAA,EACrB;AACJ;AAgQO,MAAMqF,KAAyB,gBAAAxD,GAAa,MAAM,IAAIuhB,IAAQ,GCvVxD/d,KAASge,ICChBC,KAAkB;AAKxB,SAASC,GAAarD,GAAyB;AAC7C,QAAM/gB,IAAkB,CAAC,CAAC;AAC1B,WAASe,IAAI,GAAGA,IAAIggB,EAAI,QAAQhgB,KAAK;AACnC,UAAMsB,IAAO0e,EAAIhgB,CAAC;AAClB,QAAI,CAACsB,EAAM;AACX,UAAMvC,IAAQqkB,GAAgB,QAAQ9hB,CAAI;AAC1C,QAAIvC,MAAU,GAAI,OAAM,IAAI,MAAM,0BAA0B;AAE5D,aAAS8hB,IAAI,GAAGA,IAAI5hB,EAAM,QAAQ4hB;AAChC,MAAA5hB,EAAM4hB,CAAC,KAAM;AAEf,IAAA5hB,EAAM,CAAC,KAAMF;AAEb,QAAIukB,IAAQ;AACZ,aAASzC,IAAI,GAAGA,IAAI5hB,EAAM,QAAQ4hB,KAAK;AACrC,YAAM0C,IAAOtkB,EAAM4hB,CAAC;AACpB,MAAA5hB,EAAM4hB,CAAC,IAAI0C,IAAOD,GAClBA,IAAQrkB,EAAM4hB,CAAC,KAAM,GACrB5hB,EAAM4hB,CAAC,KAAM;AAAA,IACf;AACA,WAAOyC,IAAQ;AACb,MAAArkB,EAAM,KAAKqkB,IAAQ,GAAI,GACvBA,MAAU;AAAA,EAEd;AAGA,WAAStjB,IAAI,GAAGA,IAAIggB,EAAI,UAAUA,EAAIhgB,CAAC,MAAM,KAAKA;AAChD,IAAAf,EAAM,KAAK,CAAC;AAGd,SAAO,IAAI,WAAWA,EAAM,SAAS;AACvC;AAKA,SAASukB,GAAaC,GAAkE;AACtF,QAAMC,IAAU,oCAGVC,IADYF,EAAQ,YAAA,EACF,MAAM,GAAG;AACjC,MAAIE,EAAM,WAAW,EAAG,QAAO;AAE/B,QAAMC,IAAMD,EAAM,CAAC,GACb1gB,IAAO0gB,EAAM,CAAC;AAEpB,MADI,CAACC,KAAO,CAAC3gB,KACT2gB,MAAQ,MAAO,QAAO;AAE1B,QAAMC,IAAmB,CAAA;AACzB,aAAWviB,KAAQ2B,GAAM;AACvB,UAAMmF,IAAMsb,EAAQ,QAAQpiB,CAAI;AAChC,QAAI8G,MAAQ,GAAI,QAAO;AACvB,IAAAyb,EAAO,KAAKzb,CAAG;AAAA,EACjB;AAGA,QAAM0b,IAAUD,EAAO,MAAM,GAAG,EAAE;AAClC,MAAIC,EAAQ,SAAS,EAAG,QAAO;AAE/B,QAAMC,IAAUD,EAAQ,CAAC;AACzB,MAAIC,MAAY,OAAW,QAAO;AAGlC,QAAMC,IAAYC,GAAYH,EAAQ,MAAM,CAAC,GAAG,GAAG,CAAQ;AAC3D,SAAKE,IAEE,EAAE,SAAAD,GAAS,SAAS,IAAI,WAAWC,CAAS,EAAA,IAF5B;AAGzB;AAKA,SAASC,GAAYhhB,GAAgBihB,GAAkBC,GAAgBziB,GAA+B;AACpG,MAAI0L,IAAM,GACN0C,IAAO;AACX,QAAMvG,IAAmB,CAAA,GACnB6a,KAAQ,KAAKD,KAAU;AAE7B,aAAWplB,KAASkE,GAAM;AACxB,QAAIlE,IAAQ,KAAKA,KAASmlB,MAAa,EAAG,QAAO;AAGjD,SAFA9W,IAAOA,KAAO8W,IAAYnlB,GAC1B+Q,KAAQoU,GACDpU,KAAQqU;AACb,MAAArU,KAAQqU,GACR5a,EAAO,KAAM6D,KAAO0C,IAAQsU,CAAI;AAAA,EAEpC;SAIWtU,KAAQoU,KAAc9W,KAAQ+W,IAASrU,IAASsU,IAClD,OAGF7a;AACT;AAKA,SAAS8a,GAAY9lB,GAAiB+lB,GAAmC;AAGvE,QAAMC,IAAe,IAAI,cAAc,OAAOD,CAAa,GAErDE,IAAgB,IAAI,cAAc,OAAOjmB,CAAO,GAChDkmB,IAA+B,CAAA;AACrC,MAAIC,IAAgBF,EAAc;AAGlC,MAAIE,IAAgB;AAClB,IAAAD,EAAmB,KAAKC,CAAa;AAAA,WAC5BA,KAAiB;AAC1B,IAAAD,EAAmB,KAAK,KAAMC,IAAgB,KAAOA,KAAiB,IAAK,GAAI;AAAA,WACtEA,KAAiB;AAC1B,IAAAD,EAAmB;AAAA,MACjB;AAAA,MACAC,IAAgB;AAAA,MACfA,KAAiB,IAAK;AAAA,MACtBA,KAAiB,KAAM;AAAA,MACvBA,KAAiB,KAAM;AAAA,IAAA;AAAA;AAG1B,UAAM,IAAI,MAAM,kBAAkB;AAGpC,QAAMC,IAAsB,IAAI,WAAWF,CAAkB,GAGvDG,IAAcL,EAAa,SAASI,EAAoB,SAASH,EAAc,QAC/EK,IAAW,IAAI,WAAWD,CAAW;AAC3C,MAAIlgB,IAAS;AAEb,SAAAmgB,EAAS,IAAIN,GAAc7f,CAAM,GACjCA,KAAU6f,EAAa,QACvBM,EAAS,IAAIF,GAAqBjgB,CAAM,GACxCA,KAAUigB,EAAoB,QAC9BE,EAAS,IAAIL,GAAe9f,CAAM,GAG3BS,GAAOA,GAAO0f,CAAQ,CAAC;AAChC;AAKA,SAASrG,GAAiB7B,GAAyB0B,GAAqC;AACtF,MAAIA,EAAU,WAAW;AACvB,UAAM,IAAI,MAAM,0BAA0B;AAI5C,MADkBA,EAAU,CAAC,MACX,OAAW,OAAM,IAAI,MAAM,mBAAmB;AAEhE,QAAMrU,IAAIqU,EAAU,MAAM,GAAG,EAAE,GACzB,IAAIA,EAAU,MAAM,IAAI,EAAE,GAE1ByG,IAAwB,CAAA;AAI9B,WAASC,IAAQ,GAAGA,IAAQ,GAAGA;AAC7B,QAAI;AAOF,YAAMzT,IALM,IAAIuO,GAAU;AAAA,QACxB,OAAO,OAAO,MAAM,KAAK7V,CAAC,EAAE,IAAI,CAAAxH,MAAKA,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,EAAE,KAAK,EAAE,CAAC;AAAA,QAC9E,OAAO,OAAO,MAAM,KAAK,CAAC,EAAE,IAAI,CAAAA,MAAKA,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,EAAE,KAAK,EAAE,CAAC;AAAA,MAAA,EAC9E,eAAeuiB,CAAK,EAEJ,iBAAiBpI,CAAW,GAGxCqI,IAAkB1T,EAAM,QAAQ,EAAI,GACpC2T,IAAoB3T,EAAM,QAAQ,EAAK;AAG7C,MAAAwT,EAAQ,KAAKE,CAAe,GAC5BF,EAAQ,KAAKG,CAAiB;AAAA,IAChC,QAAY;AAEV;AAAA,IACF;AAGF,MAAIH,EAAQ,WAAW;AACrB,UAAM,IAAI,MAAM,mCAAmC;AAGrD,SAAOA;AACT;AAKA,SAASI,GAAQ/hB,GAAgC;AAC/C,SAAO6f,GAAU7d,GAAOhC,CAAM,CAAC;AACjC;AAKA,SAASgiB,GAAc1B,GAAiBxI,GAAgC;AAEtE,MAAIwI,EAAQ,WAAW,GAAG,KAAKA,EAAQ,WAAW,GAAG;AACnD,QAAI;AACF,YAAM2B,IAAU/B,GAAaI,CAAO;AACpC,UAAI2B,EAAQ,SAAS,GAAI,QAAO;AAEhC,YAAMtB,IAAUsB,EAAQ,MAAM,GAAG,EAAE,GAC7BC,IAAWD,EAAQ,MAAM,EAAE,GAG3BE,IADOngB,GAAOA,GAAO2e,CAAO,CAAC,EACL,MAAM,GAAG,CAAC;AAGxC,UAAI,CAACuB,EAAS,MAAM,CAAC9B,GAAMvjB,MAAMujB,MAAS+B,EAAiBtlB,CAAC,CAAC;AAC3D,eAAO;AAGT,YAAMulB,IAAazB,EAAQ,MAAM,CAAC,GAC5B0B,IAAeN,GAAQjK,CAAS;AAEtC,aAAOsK,EAAW,MAAM,CAAChC,GAAMvjB,MAAMujB,MAASiC,EAAaxlB,CAAC,CAAC;AAAA,IAC/D,QAAQ;AACN,aAAO;AAAA,IACT;AAIF,MAAIyjB,EAAQ,YAAA,EAAc,WAAW,MAAM;AACzC,QAAI;AACF,YAAM2B,IAAU5B,GAAaC,CAAO;AACpC,UAAI,CAAC2B,EAAS,QAAO;AAErB,YAAM,EAAE,SAAArB,GAAS,SAAA0B,EAAA,IAAYL;AAE7B,UAAIrB,MAAY,GAAG;AAEjB,YAAI2B,IAAWzK;AAGf,YAAIA,EAAU,WAAW,IAAI;AAC3B,gBAAM0K,IAAS1K,EAAU,EAAE,IAAK,MAAM;AACtC,UAAAyK,IAAW,IAAI,WAAW,EAAE,GAC5BA,EAAS,CAAC,IAAIC,IAAS,IAAO,GAC9BD,EAAS,IAAIzK,EAAU,MAAM,GAAG,EAAE,GAAG,CAAC;AAAA,QACxC;AAEA,cAAMuK,IAAeN,GAAQQ,CAAQ;AACrC,eAAOD,EAAQ,MAAM,CAAClC,GAAMvjB,MAAMujB,MAASiC,EAAaxlB,CAAC,CAAC;AAAA,MAC5D;AAEA,aAAO;AAAA,IACT,QAAQ;AACN,aAAO;AAAA,IACT;AAGF,SAAO;AACT;AAOA,eAAsB4lB,GACpBC,GACApC,GACApF,GACkB;AAElB,QAAMiG,IAAgB;AAAA;AAEtB,MAAI;AAEF,UAAMwB,IAAW,WAAW,KAAK,KAAKzH,CAAS,GAAG,CAAA,MAAK,EAAE,WAAW,CAAC,CAAC;AAEtE,QAAIyH,EAAS,WAAW;AACtB,YAAM,IAAI,MAAM,0BAA0B;AAI5C,UAAMnJ,IAAc0H,GAAYwB,GAAKvB,CAAa,GAG5CyB,IAAavH,GAAiB7B,GAAamJ,CAAQ;AAGzD,eAAWE,KAAUD;AACnB,UAAIZ,GAAc1B,GAASuC,CAAM;AAC/B,eAAO;AAIX,WAAO;AAAA,EACT,SAASlI,GAAY;AACnB,UAAMmI,IAAenI,aAAa,QAAQA,EAAE,UAAU,OAAOA,CAAC;AAC9D,UAAM,IAAIxf,EAAY,kCAAkC2nB,CAAY,EAAE;AAAA,EACxE;AACF;AAOA,SAASC,GAAclnB,IAAS,IAAY;AAC1C,SAAOkD,GAAYlD,CAAM,EAAE,SAAS,KAAK;AAC3C;AASO,SAASmnB,GAAkBC,GAAmC;AACnE,MAAI,CAACA,EAAQ;AACX,UAAM,IAAI9nB,EAAY,2BAA2B;AAGnD,MAAI+nB;AACJ,MAAI;AACF,IAAAA,IAAY,IAAI,IAAID,EAAQ,WAAW;AAAA,EACzC,SAAStI,GAAG;AACV,UAAM,IAAIxf,EAAY,yBAA0Bwf,EAAY,OAAO,EAAE;AAAA,EACvE;AAGA,QAAMwI,IAAgBD,EAAU,OAAOA,EAAU,UAE3CE,IAAQH,EAAQ,SAASF,GAAA,GACzBM,IAAeJ,EAAQ,WAAW,MAAM;AAG9C,MAAIA,EAAQ,YAAYC,EAAU,aAAa;AAC7C,UAAM,IAAI/nB,EAAY,qEAAqE;AAE7F,MAAI,CAAC8nB,EAAQ,YAAYC,EAAU,aAAa;AAC9C,UAAM,IAAI/nB,EAAY,2EAA2E;AAWnG,SANY,YAAYgoB,CAAa,MAAMC,CAAK,MAAMC,CAAY;AAOpE;AAUA,eAAsBC,GACpBC,GACAC,GACmC;AACnC,QAAM,EAAE,SAAAlD,GAAS,KAAAoC,GAAK,WAAAxH,EAAA,IAAcqI,GAC9B,EAAE,qBAAAE,GAAqB,eAAAC,EAAA,IAAkBF;AAE/C,MAAI,CAAClD,KAAW,CAACoC,KAAO,CAACxH;AACvB,UAAM,IAAI/f,EAAY,6DAA6D;AAIrF,MAAIwoB;AACJ,MAAI;AAEF,UAAMC,IAAclB,EAAI,QAAQ,YAAY,OAAO;AACnD,IAAAiB,IAAoB,IAAI,IAAIC,CAAW;AAAA,EACzC,SAASjJ,GAAG;AACV,UAAM,IAAIxf,EAAY,qCAAsCwf,EAAY,OAAO,EAAE;AAAA,EACnF;AAEA,QAAMkJ,IAAgBF,EAAkB,aAAa,IAAI,GAAG,GACtDG,IAAmBH,EAAkB,aAAa,IAAI,GAAG,GACzDI,IAAwBJ,EAAkB,OAAOA,EAAkB;AAEzE,MAAIE,MAAkB,QAAQC,MAAqB;AACjD,UAAM,IAAI3oB,EAAY,kDAAkD;AAI1E,MAAI6oB;AACJ,MAAI;AAEF,IAAAA,IAAoB,OAAOP,KAAwB,WAAW,IAAI,IAAIA,CAAmB,IAAIA;AAAA,EAC/F,SAAS9I,GAAG;AACV,UAAM,IAAIxf,EAAY,yCAA0Cwf,EAAY,OAAO,EAAE;AAAA,EACvF;AAEA,QAAMsJ,IAAwBD,EAAkB,OAAOA,EAAkB;AAEzE,MAAID,MAA0BE;AAC5B,UAAM,IAAI9oB,EAAY,yCAAyC4oB,CAAqB,gBAAgBE,CAAqB,GAAG;AAI9H,QAAMC,IAAiBF,EAAkB;AACzC,MAAIF,MAAqB,OAAOI,MAAmB;AACjD,UAAM,IAAI/oB,EAAY,oEAAoE;AAE5F,MAAI2oB,MAAqB,OAAOI,MAAmB;AACjD,UAAM,IAAI/oB,EAAY,mEAAmE;AAI3F,MAAIuoB,KAAiBG,MAAkBH;AACrC,UAAM,IAAIvoB,EAAY,kCAAkC0oB,CAAa,gBAAgBH,CAAa,4BAA4B;AAIhI,MAAI;AAEF,QAAI,CADqB,MAAMjB,GAAyBC,GAAKpC,GAASpF,CAAS;AAG7E,YAAM,IAAI/f,EAAY,oBAAoB;AAAA,EAE9C,SAASgpB,GAAO;AAGd,UAAIA,aAAiBhpB,IACbgpB,IAGA,IAAIhpB,EAAY,mDAAoDgpB,EAAgB,OAAO,EAAE;AAAA,EAEvG;AAGA,SAAO;AAAA,IACL,SAAS;AAAA,IACT,SAAA7D;AAAA,IACA,OAAOuD;AAAA;AAAA,EAAA;AAEX;","x_google_ignoreList":[1,2,3,4,5,6,7,8,9,10,11,12,13,14,15]}