diff --git a/export-and-sign/dist/bundle.1bef18ef275b7dcf0da4.js b/export-and-sign/dist/bundle.1bef18ef275b7dcf0da4.js new file mode 100644 index 0000000..f041c24 --- /dev/null +++ b/export-and-sign/dist/bundle.1bef18ef275b7dcf0da4.js @@ -0,0 +1,3 @@ +/*! For license information please see bundle.1bef18ef275b7dcf0da4.js.LICENSE.txt */ +(()=>{var e,t,r,n,a,o={560:(e,t,r)=>{"use strict";var n=r(598),a=r(443),o=r(566);function i(e){return i="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},i(e)}function c(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function u(e){for(var t=1;t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var d=[][n]?t(t([][n]())):(l(t={},n,function(){return this}),t),p=s.prototype=c.prototype=Object.create(d);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,l(e,a,"GeneratorFunction")),e.prototype=Object.create(p),e}return u.prototype=s,l(p,"constructor",s),l(s,"constructor",u),u.displayName="GeneratorFunction",l(s,a,"GeneratorFunction"),l(p),l(p,a,"Generator"),l(p,n,function(){return this}),l(p,"toString",function(){return"[object Generator]"}),(f=function(){return{w:o,m:y}})()}function l(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}l=function(e,t,r,n){function o(t,r){l(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},l(e,t,r,n)}function d(e){return function(e){if(Array.isArray(e))return y(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||p(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function p(e,t){if(e){if("string"==typeof e)return y(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?y(e,t):void 0}}function y(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r1:window.parent!==window.top}function S(){return(S=b(f().m(function e(t){var r;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,r.importKey("raw",t,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function O(){return(O=b(f().m(function e(){return f().w(function(e){for(;;)switch(e.n){case 0:if(!E()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,j();case 2:if(null!==e.v){e.n=4;break}return e.n=3,k();case 3:P(e.v);case 4:return e.a(2)}},e)}))).apply(this,arguments)}function k(){return _.apply(this,arguments)}function _(){return(_=b(f().m(function e(){var t,r;return f().w(function(e){for(;;)switch(e.n){case 0:if(t=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,t.generateKey({name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return r=e.v,e.n=3,t.exportKey("jwk",r.privateKey);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function j(){var e=T(g);return e?JSON.parse(e):null}function P(e){x(g,JSON.stringify(e),1728e5)}function x(e,t,r){var n={value:t,expiry:(new Date).getTime()+r};window.localStorage.setItem(e,JSON.stringify(n))}function T(e){var t=window.localStorage.getItem(e);if(!t)return null;var r=JSON.parse(t);return Object.prototype.hasOwnProperty.call(r,"expiry")&&Object.prototype.hasOwnProperty.call(r,"value")?(new Date).getTime()>r.expiry?(window.localStorage.removeItem(e),null):r.value:(window.localStorage.removeItem(e),null)}function I(e){if(!e||"string"!=typeof e)throw new Error("cannot create uint8array from invalid hex string");var t=e.startsWith("0x")||e.startsWith("0X")?e.slice(2):e;if(t.length%2!=0||!/^[0-9A-Fa-f]+$/.test(t))throw new Error("cannot create uint8array from invalid hex string");return new Uint8Array(t.match(/../g).map(function(e){return parseInt(e,16)}))}function A(e){return d(e).map(function(e){return e.toString(16).padStart(2,"0")}).join("")}function D(e,t){var r=Array.from(new Uint8Array(e)),n=Array.from(new Uint8Array(t));return new Uint8Array([].concat(r,n))}function R(e){var t=document.getElementById("message-log");if(t){var r=document.createElement("p");r.innerText=e,t.appendChild(r)}}function N(e){return M.apply(this,arguments)}function M(){return(M=b(f().m(function e(t){var r,n,a,o;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return delete(n=u({},t)).d,n.key_ops=["verify"],e.n=2,r.importKey("jwk",n,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return a=e.v,e.n=3,r.exportKey("raw",a);case 3:return o=e.v,e.a(2,new Uint8Array(o))}},e)}))).apply(this,arguments)}function K(e){for(var t="",r=[0],n=0;n0;)r.push(a%58),a=a/58|0}for(var i=0;i0;){var c=r[i];o=(c=void 0===c?o:58*c+o)>>8,r[i]=c%256,i++}}var u=n.concat(r.reverse());return new Uint8Array(u)}function C(){return(C=b(f().m(function e(t,r,n){var a,o;return f().w(function(e){for(;;)switch(e.n){case 0:o=r,e.n="SOLANA"===o?1:"HEXADECIMAL"===o?5:6;break;case 1:if(n){e.n=2;break}throw new Error("public key must be specified for SOLANA key format");case 2:if(32===t.length){e.n=3;break}throw new Error("invalid private key length. Expected 32 bytes. Got ".concat(t.length,"."));case 3:if(32===n.length){e.n=4;break}throw new Error("invalid public key length. Expected 32 bytes. Got ".concat(n.length,"."));case 4:return(a=new Uint8Array(64)).set(t,0),a.set(n,32),e.a(2,K(a));case 5:return e.a(2,"0x"+A(t));case 6:return console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),e.a(2,"0x"+A(t));case 7:return e.a(2)}},e)}))).apply(this,arguments)}function G(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",a=r.toStringTag||"@@toStringTag";function o(r,n,a,o){var u=n&&n.prototype instanceof c?n:c,s=Object.create(u.prototype);return B(s,"_invoke",function(r,n,a){var o,c,u,s=0,f=a||[],l=!1,d={p:0,n:0,v:e,a:p,f:p.bind(e,4),d:function(t,r){return o=t,c=0,u=e,d.n=r,i}};function p(r,n){for(c=r,u=n,t=0;!l&&s&&!a&&t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(B(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,B(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,B(l,"constructor",s),B(s,"constructor",u),u.displayName="GeneratorFunction",B(s,a,"GeneratorFunction"),B(l),B(l,a,"Generator"),B(l,n,function(){return this}),B(l,"toString",function(){return"[object Generator]"}),(G=function(){return{w:o,m:d}})()}function B(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}B=function(e,t,r,n){function o(t,r){B(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},B(e,t,r,n)}function L(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var n,a,o=(a=2,function(e){if(Array.isArray(e))return e}(n=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,a,o,i,c=[],u=!0,s=!1;try{if(o=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=o.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,a=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw a}}return c}}(n,a)||p(n,a)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=o[0],c=o[1],u=i.trim();if(0===u.length)throw new Error("css style property cannot be empty");var s=r[u];if(!s)throw new Error('invalid or unsupported css style property: "'.concat(u,'"'));var f=new RegExp(s),l=c.trim();if(0==l.length)throw new Error('css style for "'.concat(u,'" is empty'));if(!f.test(l))throw new Error('invalid css style value for property "'.concat(u,'"'));t[u]=l}),t},$=E,W=function(e){return S.apply(this,arguments)};function X(){return(X=H(G().m(function e(){return G().w(function(e){for(;;)switch(e.n){case 0:if(!$()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,Y();case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function Q(){return(Q=H(G().m(function e(t,r,n){var a,i,c,u,s,f,l,d;return G().w(function(e){for(;;)switch(e.n){case 0:if(a={prod:"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569",preprod:"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212"},i=null,"undefined"!=typeof document&&(c=document.querySelector('meta[name="turnkey-signer-environment"]'))&&c.content&&"__TURNKEY_SIGNER_ENVIRONMENT__"!==c.content&&(i=c.content),i||"undefined"==typeof window||(i=window.__TURNKEY_SIGNER_ENVIRONMENT__),void 0!==(u=a[i])){e.n=1;break}throw new Error("Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined");case 1:if(t===u){e.n=2;break}throw new Error("enclave quorum public keys from client and bundle do not match. Client: ".concat(u,". Bundle: ").concat(t,"."));case 2:return s=new Uint8Array(q(u)),e.n=3,W(s);case 3:if(f=e.v){e.n=4;break}throw new Error("failed to load quorum key");case 4:return l=(0,o.g8)(r),d=q(n),e.n=5,crypto.subtle.verify({name:"ECDSA",hash:"SHA-256"},f,l,d);case 5:return e.a(2,e.v)}},e)}))).apply(this,arguments)}var V={initEmbeddedKey:function(){return X.apply(this,arguments)},generateTargetKey:k,setItemWithExpiry:x,getItemWithExpiry:T,getEmbeddedKey:j,setEmbeddedKey:P,onResetEmbeddedKey:function(){window.localStorage.removeItem(g),window.localStorage.removeItem("TURNKEY_EMBEDDED_KEY_ORIGIN")},p256JWKPrivateToPublic:N,base58Encode:K,base58Decode:U,encodeKey:function(e,t,r){return C.apply(this,arguments)},sendMessageUp:function(e,t,r){var n={type:e,value:t};r&&(n.requestId=r),h?h.postMessage(n):window.parent!==window&&window.parent.postMessage({type:e,value:t},"*"),R("⬆️ Sent message ".concat(e,": ").concat(t))},logMessage:R,uint8arrayFromHexString:q,uint8arrayToHexString:A,setParentFrameMessageChannelPort:function(e){h=e},normalizePadding:function(e,t){var r=t-e.length;if(r>0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(d(n),d(e)))}if(r<0){for(var a=-1*r,o=0,i=0;i3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(te(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,te(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,te(l,"constructor",s),te(s,"constructor",u),u.displayName="GeneratorFunction",te(s,a,"GeneratorFunction"),te(l),te(l,a,"Generator"),te(l,n,function(){return this}),te(l,"toString",function(){return"[object Generator]"}),(ee=function(){return{w:o,m:d}})()}function te(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}te=function(e,t,r,n){function o(t,r){te(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},te(e,t,r,n)}function re(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,a,o,i,c=[],u=!0,s=!1;try{if(o=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=o.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,a=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw a}}return c}}(e,t)||function(e,t){if(e){if("string"==typeof e)return ne(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?ne(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function ne(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r= v2.0.0 to pass "organizationId" for security purposes.');case 8:if(a.organizationId&&V.timingSafeEqual(a.organizationId,r)){e.n=9;break}throw new Error("organization id does not match expected value. Expected: ".concat(r,". Found: ").concat(a.organizationId,"."));case 9:if(a.encappedPublic){e.n=10;break}throw new Error('missing "encappedPublic" in bundle signed data');case 10:if(a.ciphertext){e.n=11;break}throw new Error('missing "ciphertext" in bundle signed data');case 11:return e.a(2,a)}},e)}))).apply(this,arguments)}function pe(e,t,r){return ye.apply(this,arguments)}function ye(){return ye=oe(ee().m(function e(t,r,n){var a,o,i,c,u;return ee().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,le(t,r);case 1:if(a=e.v,o=V.uint8arrayFromHexString(a.encappedPublic),i=V.uint8arrayFromHexString(a.ciphertext),u=ce){e.n=3;break}return e.n=2,V.getEmbeddedKey();case 2:u=e.v;case 3:return c=u,e.n=4,n({ciphertextBuf:i,encappedKeyBuf:o,receiverPrivJwk:c});case 4:return e.a(2,e.v)}},e)})),ye.apply(this,arguments)}function ve(e){return be.apply(this,arguments)}function be(){return(be=oe(ee().m(function e(t){var r,n,a;return ee().w(function(e){for(;;)switch(e.n){case 0:if(r=V.getEmbeddedKey()){e.n=1;break}return V.sendMessageUp("EMBEDDED_PUBLIC_KEY","",t),e.a(2);case 1:return e.n=2,V.p256JWKPrivateToPublic(r);case 2:n=e.v,a=V.uint8arrayToHexString(n),V.sendMessageUp("EMBEDDED_PUBLIC_KEY",a,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function ge(e,t,r,n){return me.apply(this,arguments)}function me(){return(me=oe(ee().m(function e(t,r,n,a){var o,i,c,u,s,f;return ee().w(function(e){for(;;)switch(e.p=e.n){case 0:if(i=new Uint8Array(r),e.p=1,"SOLANA"!==n){e.n=3;break}return c=V.uint8arrayToHexString(i.subarray(0,32)),u=V.getEd25519PublicKey(c),e.n=2,V.encodeKey(i,n,u);case 2:o=e.v,e.n=5;break;case 3:return e.n=4,V.encodeKey(i,n);case 4:o=e.v;case 5:return e.p=5,i.fill(0),e.f(5);case 6:if(s=t||"default","SOLANA"!==n){e.n=7;break}f=Z.AX.fromSecretKey(V.base58Decode(o)),e.n=9;break;case 7:if("HEXADECIMAL"!==n){e.n=9;break}return e.n=8,De(Array.from(V.uint8arrayFromHexString(o)));case 8:f=e.v;case 9:ie[s]&&fe(ie[s]),ie[s]={organizationId:a,privateKey:o,format:n,expiry:(new Date).getTime()+864e5,keypair:f};case 10:return e.a(2)}},e,null,[[1,,5,6]])}))).apply(this,arguments)}function he(e,t,r,n,a,o){return we.apply(this,arguments)}function we(){return we=oe(ee().m(function e(t,r,n,a,o,i){var c;return ee().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,pe(n,r,i);case 1:return c=e.v,e.n=2,ge(o,c,a,r);case 2:V.sendMessageUp("BUNDLE_INJECTED",!0,t);case 3:return e.a(2)}},e)})),we.apply(this,arguments)}function Ee(e,t){return Se.apply(this,arguments)}function Se(){return(Se=oe(ee().m(function e(t,r){var n;return ee().w(function(e){for(;;)switch(e.n){case 0:n=V.applySettings(t),V.setSettings(n),V.sendMessageUp("SETTINGS_APPLIED",!0,r);case 1:return e.a(2)}},e)}))).apply(this,arguments)}function Oe(e,t,r){return ke.apply(this,arguments)}function ke(){return(ke=oe(ee().m(function e(t,r,n){var a,o,i,c,u,s,f,l,d;return ee().w(function(e){for(;;)switch(e.n){case 0:if(Ue(o=ie[a=n||"default"],a)){e.n=1;break}return e.a(2);case 1:return e.n=2,Ce(o);case 2:if(i=e.v,c=JSON.parse(r),u=c.transaction,"SOLANA"!==c.type){e.n=3;break}f=V.uint8arrayFromHexString(u),(l=Z.Kt.deserialize(f)).sign([i]),s=l.serialize(),e.n=4;break;case 3:throw new Error("unsupported transaction type");case 4:d=V.uint8arrayToHexString(s),V.sendMessageUp("TRANSACTION_SIGNED",d,t);case 5:return e.a(2)}},e)}))).apply(this,arguments)}function _e(e,t,r){return je.apply(this,arguments)}function je(){return je=oe(ee().m(function e(t,r,o){var i,c,u,s,f,l,d,p,y,v;return ee().w(function(e){for(;;)switch(e.n){case 0:if(Ue(c=ie[i=o||"default"],i)){e.n=1;break}return e.a(2);case 1:return u=JSON.parse(r),s=u.message,f=u.type,l=ue.encode(s),e.n=2,Ce(c);case 2:if(p=e.v,"SOLANA"!==f){e.n=3;break}n.jn.sha512Sync=function(){var e;return a.Zf((e=n.jn).concatBytes.apply(e,arguments))},y=p.secretKey.slice(0,32);try{v=n._S(l,y),d=V.uint8arrayToHexString(v)}finally{y.fill(0)}e.n=4;break;case 3:return V.sendMessageUp("ERROR","unsupported message type",t),e.a(2);case 4:V.sendMessageUp("MESSAGE_SIGNED",d,t);case 5:return e.a(2)}},e)})),je.apply(this,arguments)}function Pe(e,t){return xe.apply(this,arguments)}function xe(){return(xe=oe(ee().m(function e(t,r){var n,a,o;return ee().w(function(e){for(;;)switch(e.n){case 0:if(r){e.n=1;break}for(n=0,a=Object.keys(ie);n=e.expiry)throw function(){for(var e=(new Date).getTime(),t=[],r=0,n=Object.entries(ie);r=i.expiry&&t.push(o)}for(var c=0,u=t;c3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(Ye(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,Ye(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,Ye(l,"constructor",s),Ye(s,"constructor",u),u.displayName="GeneratorFunction",Ye(s,a,"GeneratorFunction"),Ye(l),Ye(l,a,"Generator"),Ye(l,n,function(){return this}),Ye(l,"toString",function(){return"[object Generator]"}),(He=function(){return{w:o,m:d}})()}function Ye(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}Ye=function(e,t,r,n){function o(t,r){Ye(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},Ye(e,t,r,n)}function qe(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function ze(e){for(var t=1;t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(Ze(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,Ze(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,Ze(l,"constructor",s),Ze(s,"constructor",u),u.displayName="GeneratorFunction",Ze(s,a,"GeneratorFunction"),Ze(l),Ze(l,a,"Generator"),Ze(l,n,function(){return this}),Ze(l,"toString",function(){return"[object Generator]"}),(Ve=function(){return{w:o,m:d}})()}function Ze(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}Ze=function(e,t,r,n){function o(t,r){Ze(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},Ze(e,t,r,n)}function et(e,t,r,n,a,o,i){try{var c=e[o](i),u=c.value}catch(e){return void r(e)}c.done?t(u):Promise.resolve(u).then(n,a)}function tt(e){return function(){var t=this,r=arguments;return new Promise(function(n,a){var o=e.apply(t,r);function i(e){et(o,n,a,i,c,"next",e)}function c(e){et(o,n,a,i,c,"throw",e)}i(void 0)})}}window.TKHQ=V,document.addEventListener("DOMContentLoaded",tt(Ve().m(function e(){var t,r,n,a;return Ve().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,V.initEmbeddedKey();case 1:return e.n=2,V.getEmbeddedKey();case 2:return t=e.v,e.n=3,V.p256JWKPrivateToPublic(t);case 3:r=e.v,n=V.uint8arrayToHexString(r),document.getElementById("embedded-key").value=n,Be(Xe),(a=V.getSettings())&&V.applySettings(a),V.sendMessageUp("PUBLIC_KEY_READY",n);case 4:return e.a(2)}},e)})))},790:()=>{},846:e=>{"use strict";e.exports=crypto}},i={};function c(e){var t=i[e];if(void 0!==t)return t.exports;var r=i[e]={id:e,loaded:!1,exports:{}};return o[e].call(r.exports,r,r.exports,c),r.loaded=!0,r.exports}c.m=o,e=[],c.O=(t,r,n,a)=>{if(!r){var o=1/0;for(f=0;f=a)&&Object.keys(c.O).every(e=>c.O[e](r[u]))?r.splice(u--,1):(i=!1,a0&&e[f-1][2]>a;f--)e[f]=e[f-1];e[f]=[r,n,a]},c.n=e=>{var t=e&&e.__esModule?()=>e.default:()=>e;return c.d(t,{a:t}),t},r=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,c.t=function(e,n){if(1&n&&(e=this(e)),8&n)return e;if("object"==typeof e&&e){if(4&n&&e.__esModule)return e;if(16&n&&"function"==typeof e.then)return e}var a=Object.create(null);c.r(a);var o={};t=t||[null,r({}),r([]),r(r)];for(var i=2&n&&e;("object"==typeof i||"function"==typeof i)&&!~t.indexOf(i);i=r(i))Object.getOwnPropertyNames(i).forEach(t=>o[t]=()=>e[t]);return o.default=()=>e,c.d(a,o),a},c.d=(e,t)=>{for(var r in t)c.o(t,r)&&!c.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},c.f={},c.e=e=>Promise.all(Object.keys(c.f).reduce((t,r)=>(c.f[r](e,t),t),[])),c.u=e=>"bundle."+{291:"3eaea85f4001b9cc63c3",825:"aaba32bf7338e3d0f1cc"}[e]+".js",c.miniCssF=e=>{},c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),c.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),n={},a="export-and-sign:",c.l=(e,t,r,o)=>{if(n[e])n[e].push(t);else{var i,u;if(void 0!==r)for(var s=document.getElementsByTagName("script"),f=0;f{i.onerror=i.onload=null,clearTimeout(p);var a=n[e];if(delete n[e],i.parentNode&&i.parentNode.removeChild(i),a&&a.forEach(e=>e(r)),t)return t(r)},p=setTimeout(d.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=d.bind(null,i.onerror),i.onload=d.bind(null,i.onload),u&&document.head.appendChild(i)}},c.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},c.nmd=e=>(e.paths=[],e.children||(e.children=[]),e),c.p="/",c.sriHashes={291:"sha384-G5pDFEAG9UZITbluyje/R/rWohZTUJf+Vu3ZIh0rsnLFLTw3SP/ca/XVNZVtv48f",825:"sha384-R9OIdd42i5GcdtZiHJuQgIUVvqyqJ0s7eaBnJHAfGllpi4YwbF7NSkjIRwOPUtsP"},(()=>{var e={792:0};c.f.j=(t,r)=>{var n=c.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var a=new Promise((r,a)=>n=e[t]=[r,a]);r.push(n[2]=a);var o=c.p+c.u(t),i=new Error;c.l(o,r=>{if(c.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var a=r&&("load"===r.type?"missing":r.type),o=r&&r.target&&r.target.src;i.message="Loading chunk "+t+" failed.\n("+a+": "+o+")",i.name="ChunkLoadError",i.type=a,i.request=o,n[1](i)}},"chunk-"+t,t)}},c.O.j=t=>0===e[t];var t=(t,r)=>{var n,a,[o,i,u]=r,s=0;if(o.some(t=>0!==e[t])){for(n in i)c.o(i,n)&&(c.m[n]=i[n]);if(u)var f=u(c)}for(t&&t(r);sc(560));u=c.O(u)})(); +//# sourceMappingURL=bundle.1bef18ef275b7dcf0da4.js.map \ No newline at end of file diff --git a/export-and-sign/dist/bundle.539e9a91965e314c7b7e.js.LICENSE.txt b/export-and-sign/dist/bundle.1bef18ef275b7dcf0da4.js.LICENSE.txt similarity index 100% rename from export-and-sign/dist/bundle.539e9a91965e314c7b7e.js.LICENSE.txt rename to export-and-sign/dist/bundle.1bef18ef275b7dcf0da4.js.LICENSE.txt diff --git a/export-and-sign/dist/bundle.1bef18ef275b7dcf0da4.js.map b/export-and-sign/dist/bundle.1bef18ef275b7dcf0da4.js.map new file mode 100644 index 0000000..8081806 --- /dev/null +++ b/export-and-sign/dist/bundle.1bef18ef275b7dcf0da4.js.map @@ -0,0 +1 @@ +{"version":3,"file":"bundle.1bef18ef275b7dcf0da4.js","mappings":";UAAIA,ECCAC,EADAC,ECAAC,EACAC,E,svCCAJ,IAAAC,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA1C,GAAA,gBAAAA,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAA6C,EAAA7C,EAAA,CAAA8C,CAAA9C,IAAA,SAAAA,GAAA,uBAAAC,QAAA,MAAAD,EAAAC,OAAAE,WAAA,MAAAH,EAAA,qBAAA2C,MAAAI,KAAA/C,EAAA,CAAAgD,CAAAhD,IAAAiD,EAAAjD,IAAA,qBAAAwB,UAAA,wIAAA0B,EAAA,UAAAD,EAAAjD,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,YAAA0B,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,M,OA+BA,IAAME,EAAuB,uBAEvBC,EAAmB,mBAWrBC,EAAgC,KAMpC,SAASC,IACP,MAIwB,oBAAfC,YACPA,WAAWC,QACXD,WAAWC,OAAOC,OAEXF,WAAWC,OAAOC,OAEL,oBAAXC,QAA0BA,OAAOF,QAAUE,OAAOF,OAAOC,OAC3DC,OAAOF,OAAOC,YAED,IAAXE,EAAAA,GAA0BA,EAAAA,EAAOH,QAAUG,EAAAA,EAAOH,OAAOC,OAC3DE,EAAAA,EAAOH,OAAOC,OAED,oBAAXD,QAA0BA,OAAOC,OACnCD,OAAOC,OAGT,IACT,CAYA,SAASG,IACP,YAAwCC,IAApCH,OAAOI,SAASC,gBAGXL,OAAOI,SAASC,gBAAgBvD,OAAS,EAEzCkD,OAAOM,SAAWN,OAAOO,GAEpC,CAsBA,SAAAC,IAFC,OAEDA,EAAApB,EAAA1B,IAAAE,EAjBA,SAAA6C,EAA6BC,GAAY,IAAAX,EAAA,OAAArC,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACP,GAA1BqE,EAASH,IACF,CAAFe,EAAAjF,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAD,EAAAjF,EAAA,EAE3CqE,EAAOc,UAClB,MACAH,EACA,CACE5B,KAAM,QACNgC,WAAY,UAEd,EACA,CAAC,WACF,cAAAH,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACFnB,MAAA,KAAAD,UAAA,CAuCD,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAZA,SAAAoD,IAAA,OAAAtD,IAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,WACMwE,IAAmB,CAAFe,EAAAvF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAK,EAAAvF,EAAA,EAERwF,IAAgB,OAAzB,GACG,OADHD,EAAAvE,EACO,CAAAuE,EAAAvF,EAAA,eAAAuF,EAAAvF,EAAA,EACCyF,IAAmB,OAC3CC,EADeH,EAAAvE,GACW,cAAAuE,EAAAtE,EAAA,KAAAqE,EAAA,KAG7B1B,MAAA,KAAAD,UAAA,UAKc8B,IAAiB,OAAAE,EAAA/B,MAAC,KAADD,UAAA,CAiBhC,SAAAgC,IAFC,OAEDA,EAAAjC,EAAA1B,IAAAE,EAjBA,SAAA0D,IAAA,IAAAvB,EAAAwB,EAAA,OAAA7D,IAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACkC,GAA1BqE,EAASH,IACF,CAAF4B,EAAA9F,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAY,EAAA9F,EAAA,EAElCqE,EAAO0B,YAC3B,CACE3C,KAAM,OACNgC,WAAY,UAEd,EACA,CAAC,eACF,OAPY,OAAPS,EAAOC,EAAA9E,EAAA8E,EAAA9F,EAAG,EASHqE,EAAO2B,UAAU,MAAOH,EAAQI,YAAW,cAAAH,EAAA7E,EAAA,EAAA6E,EAAA9E,GAAA,EAAA4E,EAAA,KACzDhC,MAAA,KAAAD,UAAA,CAKD,SAAS6B,IACP,IAAMU,EAASC,EAAkBpC,GACjC,OAAOmC,EAASE,KAAKC,MAAMH,GAAU,IACvC,CAMA,SAASR,EAAeY,GACtBC,EACExC,EACAqC,KAAKI,UAAUF,GAjJwB,OAoJ3C,CA8DA,SAASC,EAAkBE,EAAKhF,EAAOiF,GACrC,IACMC,EAAO,CACXlF,MAAOA,EACPmF,QAHU,IAAIC,MAGFC,UAAYJ,GAE1BpC,OAAOyC,aAAaC,QAAQP,EAAKL,KAAKI,UAAUG,GAClD,CAQA,SAASR,EAAkBM,GACzB,IAAMQ,EAAU3C,OAAOyC,aAAaG,QAAQT,GAC5C,IAAKQ,EACH,OAAO,KAET,IAAMN,EAAOP,KAAKC,MAAMY,GACxB,OACGxG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,WAC3ClG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,UAKlC,IAAIE,MACRC,UAAYH,EAAKC,QACvBtC,OAAOyC,aAAaK,WAAWX,GACxB,MAEFE,EAAKlF,OARV6C,OAAOyC,aAAaK,WAAWX,GACxB,KAQX,CAOA,SAASY,EAAwBC,GAC/B,IAAKA,GAAkC,iBAAdA,EACvB,MAAM,IAAIpC,MAAM,oDAIlB,IAAMqC,EACJD,EAAUE,WAAW,OAASF,EAAUE,WAAW,MAC/CF,EAAUpE,MAAM,GAChBoE,EAGN,GAAIC,EAAiBnG,OAAS,GAAK,IADpB,iBACmCiC,KAAKkE,GACrD,MAAM,IAAIrC,MAAM,oDAElB,OAAO,IAAIuC,WACTF,EAAiBG,MAAM,OAAOC,IAAI,SAACC,GAAC,OAAKC,SAASD,EAAG,GAAG,GAE5D,CAOA,SAASE,EAAsBC,GAC7B,OAAOvF,EAAIuF,GAAQJ,IAAI,SAACK,GAAC,OAAKA,EAAE/E,SAAS,IAAIgF,SAAS,EAAG,IAAI,GAAEC,KAAK,GACtE,CAqCA,SAASC,EAAyBC,EAAcC,GAC9C,IAAMC,EAAI7F,MAAMI,KAAK,IAAI4E,WAAWW,IAC9BtI,EAAI2C,MAAMI,KAAK,IAAI4E,WAAWY,IACpC,OAAO,IAAIZ,WAAW,GAADc,OAAKD,EAAMxI,GAClC,CAmJA,SAAS0I,EAAWC,GAClB,IAAMC,EAAaC,SAASC,eAAe,eAC3C,GAAIF,EAAY,CACd,IAAMG,EAAUF,SAASG,cAAc,KACvCD,EAAQE,UAAYN,EACpBC,EAAWM,YAAYH,EACzB,CACF,CAEA,SAKeI,EAAsBC,GAAA,OAAAC,EAAAvF,MAAC,KAADD,UAAA,CAsBrC,SAAAwF,IAFC,OAEDA,EAAAzF,EAAA1B,IAAAE,EAtBA,SAAAkH,EAAsCC,GAAU,IAAAhF,EAAAiF,EAAAC,EAAAxB,EAAA,OAAA/F,IAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAAxJ,GAAA,OACd,GAA1BqE,EAASH,IACF,CAAFsF,EAAAxJ,EAAA,cACH,IAAIkF,MAAM,uCAAsC,OAMpB,cAH9BoE,EAAcG,EAAA,GAAQJ,IAENnI,EACtBoI,EAAeI,QAAU,CAAC,UAAUF,EAAAxJ,EAAA,EAEZqE,EAAOc,UAC7B,MACAmE,EACA,CAAElG,KAAM,QAASgC,WAAY,UAC7B,EACA,CAAC,WACF,OANc,OAATmE,EAASC,EAAAxI,EAAAwI,EAAAxJ,EAAG,EAOGqE,EAAO2B,UAAU,MAAOuD,GAAU,OAA3C,OAANxB,EAAMyB,EAAAxI,EAAAwI,EAAAvI,EAAA,EACL,IAAIwG,WAAWM,IAAO,EAAAqB,EAAA,KAC9BxF,MAAA,KAAAD,UAAA,CAOD,SAASgG,EAAaC,GAKpB,IAHA,IACIC,EAAS,GACTC,EAAS,CAAC,GACL1J,EAAI,EAAGA,EAAIwJ,EAAMxI,OAAQhB,IAAK,CAErC,IADA,IAAI2J,EAAQH,EAAMxJ,GACT4J,EAAI,EAAGA,EAAIF,EAAO1I,SAAU4I,EACnCD,GAASD,EAAOE,IAAM,EACtBF,EAAOE,GAAKD,EAAQ,GACpBA,EAASA,EAAQ,GAAM,EAGzB,KAAOA,EAAQ,GACbD,EAAOG,KAAKF,EAAQ,IACpBA,EAASA,EAAQ,GAAM,CAE3B,CAEA,IAAK,IAAIG,EAAI,EAAGA,EAAIJ,EAAO1I,OAAQ8I,IACjCL,EAlBe,6DAkBGC,EAAOI,IAAML,EAIjC,IAAK,IAAIzJ,EAAI,EAAgB,IAAbwJ,EAAMxJ,IAAYA,EAAIwJ,EAAMxI,OAAS,EAAGhB,IACtDyJ,EAAS,IAAMA,EAEjB,OAAOA,CACT,CAQA,SAASM,EAAa7B,GAKpB,IAHA,IAAI8B,EAAW,6DACXC,EAAe,GACfC,EAAe,GACVlK,EAAI,EAAGA,EAAIkI,EAAElH,OAAQhB,IAAK,CACjC,IAAgC,IAA5BgK,EAASG,QAAQjC,EAAElI,IACrB,MAAM,IAAI8E,MAAM,yBAADqD,OAA0BD,EAAElI,GAAE,6BAE/C,IAAI2J,EAAQK,EAASG,QAAQjC,EAAElI,IAKlB,GAAT2J,GAAc3J,IAAMkK,EAAalJ,QACnCkJ,EAAaL,KAAK,GAIpB,IADA,IAAID,EAAI,EACDA,EAAIK,EAAajJ,QAAU2I,EAAQ,GAAG,CAC3C,IAAIS,EAAcH,EAAaL,GAW/BD,GANES,OADkB/F,IAAhB+F,EACYT,EAEc,GAAdS,EAAmBT,IAIZ,EAEvBM,EAAaL,GAAKQ,EAAc,IAChCR,GACF,CACF,CAEA,IAAIH,EAASS,EAAa/B,OAAO8B,EAAaI,WAC9C,OAAO,IAAIhD,WAAWoC,EACxB,CA0MA,SAAAa,IAHC,OAGDA,EAAAhH,EAAA1B,IAAAE,EAnCA,SAAAyI,EAAyBC,EAAiBC,EAAWC,GAAc,IAAAC,EAAAC,EAAA,OAAAhJ,IAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,OAAAgL,EACzDH,EAASI,EAAAjL,EACV,WADUgL,EACF,EAoBR,gBApBQA,EAoBK,oBAnBXF,EAAgB,CAAFG,EAAAjL,EAAA,cACX,IAAIkF,MAAM,sDAAqD,UAExC,KAA3B0F,EAAgBxJ,OAAa,CAAA6J,EAAAjL,EAAA,cACzB,IAAIkF,MAAM,sDAADqD,OACyCqC,EAAgBxJ,OAAM,MAC7E,UAE2B,KAA1B0J,EAAe1J,OAAa,CAAA6J,EAAAjL,EAAA,cACxB,IAAIkF,MAAM,qDAADqD,OACwCuC,EAAe1J,OAAM,MAC3E,OAKyC,OAFpC2J,EAAoB,IAAItD,WAAW,KACvByD,IAAIN,EAAiB,GACvCG,EAAkBG,IAAIJ,EAAgB,IAAIG,EAAAhK,EAAA,EACnC0I,EAAaoB,IAAkB,cAAAE,EAAAhK,EAAA,EAGjC,KAAO6G,EAAsB8C,IAAgB,OAMlD,OAFFO,QAAQC,KAAK,uBAAD7C,OACasC,EAAS,iCAChCI,EAAAhK,EAAA,EACK,KAAO6G,EAAsB8C,IAAgB,cAAAK,EAAAhK,EAAA,KAAA0J,EAAA,KAEzD/G,MAAA,KAAAD,UAAA,C,aCvzBD,IAAA/D,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA8C,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAIA,IACmBwH,EDiIlB,WAK6B,OAAAhG,EAAAzB,MAAC,KAADD,UAAA,ECzH5B0D,EAYEiE,EARFnD,EAQEmD,EAJFC,EDo0BF,SAAwBC,GACtB,IAAMC,EAAc,CAAC,EAEfC,EAAqB,CACzBC,QAAS,+BACTC,OAAQ,+BACRC,YAAa,6BACbC,YACE,gEACFC,YACE,iLACFC,aAAc,+BACdC,SAAU,6DACVC,WAAY,wCACZC,WAAY,aACZC,MACE,iLACFC,WACE,iLACFC,gBACE,iLACFC,MAAO,kEACPC,OAAQ,kEACRC,SAAU,kEACVC,UACE,kEACFC,WACE,8EACFC,UACE,8HACFC,UAAW,gDACXC,aAAc,iCACdC,SAAU,wBACVC,OAAQ,kDA4BV,OAzBAvM,OAAOwM,QAAQzB,GAAQ0B,QAAQ,SAAAC,GAAuB,IAl4BxDrN,EAAAF,EAk4BwDwN,GAl4BxDxN,EAk4BwD,EAl4BxD,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAuN,CAAAvN,EAk4BwDqN,IAl4BxD,SAAArN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAwN,KAAA,IAAAjM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAsM,CAAAzN,EAAAF,IAAAmD,EAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAkM,IAk4BmCC,EAAQL,EAAA,GAAE3L,EAAK2L,EAAA,GACxCM,EAAgBD,EAASE,OAC/B,GAA6B,IAAzBD,EAActM,OAChB,MAAM,IAAI8D,MAAM,sCAElB,IAAM0I,EAAgBlC,EAAmBgC,GACzC,IAAKE,EACH,MAAM,IAAI1I,MAAM,+CAADqD,OACkCmF,EAAa,MAGhE,IAAMG,EAAa,IAAIC,OAAOF,GACxBG,EAAatM,EAAMkM,OACzB,GAAyB,GAArBI,EAAW3M,OACb,MAAM,IAAI8D,MAAM,kBAADqD,OAAmBmF,EAAa,eAGjD,IADqBG,EAAWxK,KAAK0K,GAEnC,MAAM,IAAI7I,MAAM,yCAADqD,OAC4BmF,EAAa,MAG1DjC,EAAYiC,GAAiBK,CAC/B,GAEOtC,CACT,ECj4BEjH,EAGE8G,EAFF0C,EDkEF,SAG4BC,GAAA,OAAAnJ,EAAAlB,MAAC,KAADD,UAAA,ECvD5B,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAPA,SAAA6C,IAAA,OAAA/C,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,WACMwE,IAAmB,CAAFS,EAAAjF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAD,EAAAjF,EAAA,EAEtBqL,IAAuB,cAAApG,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACrCnB,MAAA,KAAAD,UAAA,CAuED,SAAAuK,IAFC,OAEDA,EAAAxK,EAAA1B,IAAAE,EA/DA,SAAAiM,EACEC,EACAC,EACAC,GAAU,IAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA9M,IAAAC,EAAA,SAAA8M,GAAA,cAAAA,EAAA/O,GAAA,OA2B6B,GAxBjCuO,EAA2B,CAC/BS,KAAM,qIACNC,QACE,sIAIAT,EAAc,KACM,oBAAb7F,WACH8F,EAAO9F,SAASuG,cACpB,6CAIAT,EAAKhG,SACY,mCAAjBgG,EAAKhG,UAEL+F,EAAcC,EAAKhG,SAGlB+F,GAAiC,oBAAXlK,SACzBkK,EAAclK,OAAO6K,qCAK0B1K,KAH3CiK,EACJH,EAAyBC,IAE+B,CAAAO,EAAA/O,EAAA,cAClD,IAAIkF,MAAM,8EAEf,UAGCkJ,IAAwBM,EAAwC,CAAAK,EAAA/O,EAAA,cAC5D,IAAIkF,MAAM,2EAADqD,OAC8DmG,EAAwC,cAAAnG,OAAa6F,EAAmB,MACpJ,OAKF,OAFKO,EAA4B,IAAIlH,WACpCJ,EAAwBqH,IACzBK,EAAA/O,EAAA,EACuBgO,EAAcW,GAA0B,OAAjD,GAATC,EAASG,EAAA/N,EACC,CAAF+N,EAAA/O,EAAA,cACN,IAAIkF,MAAM,6BAA4B,OAKW,OADnD2J,GAAqBO,EAAAA,EAAAA,IAAiBf,GACtCS,EAAgBzH,EAAwBiH,GAAWS,EAAA/O,EAAA,EAC5CoE,OAAOC,OAAOgL,OACzB,CAAEjM,KAAM,QAASkM,KAAM,WACvBV,EACAC,EACAC,GACD,cAAAC,EAAA9N,EAAA,EAAA8N,EAAA/N,GAAA,EAAAmN,EAAA,KACFvK,MAAA,KAAAD,UAAA,CA2CM,IAAM4L,EAAO,CAClBC,gBAzHF,WAG8B,OAAAnK,EAAAzB,MAAC,KAADD,UAAA,EAuH5B8B,kBA5HE6F,EA6HF/E,kBA7HE+E,EA8HFnF,kBA9HEmF,EA+HF9F,eA/HE8F,EAgIF5F,eAhIE4F,EAiIFmE,mBDsDF,WACEnL,OAAOyC,aAAaK,WAAWrD,GAC/BO,OAAOyC,aAAaK,WA7Kc,8BA8KpC,ECxDE6B,uBAlIEqC,EAmIF3B,aAnIE2B,EAoIFnB,aApIEmB,EAqIFoE,UD2mBD,SASuBC,EAAAC,EAAAC,GAAA,OAAAnF,EAAA9G,MAAC,KAADD,UAAA,ECnnBtBmM,cD2TF,SAAuBC,EAAMtO,EAAOuO,GAClC,IAAMnH,EAAU,CACdkH,KAAMA,EACNtO,MAAOA,GAILuO,IACFnH,EAAQmH,UAAYA,GAGlB/L,EACFA,EAA8BgM,YAAYpH,GACjCvE,OAAOM,SAAWN,QAC3BA,OAAOM,OAAOqL,YACZ,CACEF,KAAMA,EACNtO,MAAOA,GAET,KAGJ+G,EAAW,mBAADD,OAAoBwH,EAAI,MAAAxH,OAAK9G,GACzC,ECjVE+G,WAvIE8C,EAwIFjE,wBAAAA,EACAS,sBAzIEwD,EA0IF4E,iCDyDF,SAA0CC,GACxClM,EAAgCkM,CAClC,EC1DEC,iBD2JF,SAA0BC,EAAWC,GACnC,IAAMC,EAAgBD,EAAeD,EAAUjP,OAG/C,GAAImP,EAAgB,EAAG,CACrB,IAAM5E,EAAU,IAAIlE,WAAW8I,GAAeC,KAAK,GACnD,OAAO,IAAI/I,WAAW,GAADc,OAAA/F,EAAKmJ,GAAOnJ,EAAK6N,IACxC,CAGA,GAAIE,EAAgB,EAAG,CAGrB,IAFA,IAAME,GAAqC,EAAjBF,EACtBG,EAAY,EACPtQ,EAAI,EAAGA,EAAIqQ,GAAqBrQ,EAAIiQ,EAAUjP,OAAQhB,IACxC,IAAjBiQ,EAAUjQ,IACZsQ,IAIJ,GAAIA,IAAcD,EAChB,MAAM,IAAIvL,MAAM,iEAADqD,OACoDkI,EAAiB,aAAAlI,OAAYmI,EAAS,MAG3G,OAAOL,EAAUnN,MAAMuN,EAAmBA,EAAoBH,EAChE,CACA,OAAOD,CACT,ECrLEjB,iBAAAA,EAAAA,GACAjH,yBAAAA,EACAwI,uBApID,SAQoC1C,EAAA2C,EAAAC,GAAA,OAAA3C,EAAAtK,MAAC,KAADD,UAAA,EA6HnCmN,oBA1DF,SAA6BC,GAG3B,OAFAC,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWxN,MAAAsN,EAAAvN,WAAO,EACjDqN,EAAAA,GAA0BD,EACnC,EAuDEM,cA/CF,SAAuBC,GACrB,IAAMC,EAAgB,CAAC,EACvB,IAAKD,EACH,OAAOlL,KAAKI,UAAU+K,GAExB,IAAMC,EAAcpL,KAAKC,MAAMiL,GAC/B,GAAIE,EAAYhG,OAAQ,CAEtB,IAAMiG,EAAiB9I,SAASC,eAAe,WAC/C,IAAK6I,EACH,MAAM,IAAIvM,MAAM,uDAIlB,IAAMuG,EAAcF,EAAeiG,EAAYhG,QAC/C/K,OAAOwM,QAAQxB,GAAayB,QAAQ,SAAAC,GAAkB,IA9I1DrN,EAAAF,EA8I0DwN,GA9I1DxN,EA8I0D,EA9I1D,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAuN,CAAAvN,EA8I0DqN,IA9I1D,SAAArN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAwN,KAAA,IAAAjM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAsM,CAAAzN,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAkM,IA8I0C/G,EAAG2G,EAAA,GAAE3L,EAAK2L,EAAA,GAC9CqE,EAAeC,MAAMjL,GAAOhF,CAC9B,GAEA8P,EAAsB,OAAI9F,CAC5B,CAEA,OAAOrF,KAAKI,UAAU+K,EACxB,EAyBEhG,eAAAA,EACAoG,YDwDF,WACE,IAAML,EAAWhN,OAAOyC,aAAaG,QAAQlD,GAC7C,OAAOsN,EAAWlL,KAAKC,MAAMiL,GAAY,IAC3C,EC1DEM,YDgEF,SAAqBN,GACnBhN,OAAOyC,aAAaC,QAAQhD,EAAkBoC,KAAKI,UAAU8K,GAC/D,ECjEEO,gBDyoBF,SAAyB5L,GACvB,GAAIxD,MAAMC,QAAQuD,GAChB,OAAO,IAAIwB,WAAWxB,GAGxB,GAA0B,iBAAfA,EAAyB,CAOlC,GALIA,EAAWuB,WAAW,QACxBvB,EAAaA,EAAW/C,MAAM,IAIN,KAAtB+C,EAAW7E,QAAiB,iBAAiBiC,KAAK4C,GACpD,OAAOoB,EAAwBpB,GAIjC,IACE,OAAOkE,EAAalE,EACtB,CAAE,MAAO6L,GACP,MAAM,IAAI5M,MACR,mEAEJ,CACF,CAEA,MAAM,IAAIA,MAAM,4DAClB,ECnqBE6M,gBDpKF,SAAyB9Q,EAAG+Q,GAC1B,GAAiB,iBAAN/Q,GAA+B,iBAAN+Q,EAAgB,OAAO,EAC3D,IAAMC,EAAM,IAAIC,YACVC,EAAOF,EAAIG,OAAOnR,GAClBoR,EAAOJ,EAAIG,OAAOJ,GACxB,GAAIG,EAAK/Q,SAAWiR,EAAKjR,OACvB,OAAO,EAGT,IADA,IAAIkR,EAAO,EACFlS,EAAI,EAAGA,EAAI+R,EAAK/Q,OAAQhB,IAC/BkS,GAAQH,EAAK/R,GAAKiS,EAAKjS,GAEzB,OAAgB,IAATkS,CACT,G,uBE5BA,IAAA1S,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA0S,GAAAzS,EAAAF,GAAA,gBAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAuN,CAAAvN,IAAA,SAAAA,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAwN,KAAA,IAAAjM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAsM,CAAAzN,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,GAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,GAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAkM,EAAA,UAAA7K,GAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAUA,IAAI2O,GAAe,CAAC,EAUhBC,GAAsB,KAKpBC,GAAc,IAAIR,YAClBS,GAAc,IAAIC,YASxB,SAASC,GAAaC,GACfA,GAEDA,EAASC,SAAWD,EAASC,QAAQC,WACvCF,EAASC,QAAQC,UAAUxC,KAAK,EAMpC,CAEA,SAMeyC,GAAwBhF,EAAA2C,GAAA,OAAAsC,GAAAtP,MAAC,KAADD,UAAA,CA2DvC,SAAAuP,KAFC,OAEDA,GAAAxP,GAAA1B,KAAAE,EA3DA,SAAAiR,EAAwCC,EAAQC,GAAc,IAAAC,EAAAhF,EAAA,OAAAtM,KAAAC,EAAA,SAAAsR,GAAA,cAAAA,EAAAvT,GAAA,OACxB,GAEV,YAFpBsT,EAAYlN,KAAKC,MAAM+M,IAEfI,QAAoB,CAAAD,EAAAvT,EAAA,cAC1B,IAAIkF,MAAM,wBAADqD,OAAyB+K,EAAUE,UAAU,UAEzDF,EAAUG,KAAM,CAAFF,EAAAvT,EAAA,cACX,IAAIkF,MAAM,4BAA2B,UAExCoO,EAAUI,cAAe,CAAFH,EAAAvT,EAAA,cACpB,IAAIkF,MAAM,qCAAoC,UAEjDoO,EAAUlF,oBAAqB,CAAFmF,EAAAvT,EAAA,cAC1B,IAAIkF,MAAM,2CAA0C,UAGvDqK,EAAKoB,uBAAwB,CAAF4C,EAAAvT,EAAA,cACxB,IAAIkF,MAAM,iDAAgD,cAAAqO,EAAAvT,EAAA,EAE3CuP,EAAKoB,uBAC1B2C,EAAUlF,oBACVkF,EAAUI,cACVJ,EAAUG,MACX,OAJa,GAAAF,EAAAvS,EAKC,CAAFuS,EAAAvT,EAAA,cACL,IAAIkF,MAAM,sDAADqD,OACyC+K,EAAUI,cAAa,2BAAAnL,OAA0B+K,EAAUlF,sBAClH,OAKF,GAFKE,EAAalI,KAAKC,MACtBsM,GAAYgB,OAAOpE,EAAKlI,wBAAwBiM,EAAUG,QAGvDJ,EAAgB,CAAFE,EAAAvT,EAAA,cACX,IAAIkF,MAAM,8IAEf,UAEAoJ,EAAW+E,gBAGX9D,EAAKwC,gBAAgBzD,EAAW+E,eAAgBA,GAAe,CAAAE,EAAAvT,EAAA,cAE1D,IAAIkF,MAAM,4DAADqD,OAC+C8K,EAAc,aAAA9K,OAAY+F,EAAW+E,eAAc,MAChH,UAGE/E,EAAWsF,eAAgB,CAAFL,EAAAvT,EAAA,eACtB,IAAIkF,MAAM,kDAAiD,WAE9DoJ,EAAWuF,WAAY,CAAFN,EAAAvT,EAAA,eAClB,IAAIkF,MAAM,8CAA6C,eAAAqO,EAAAtS,EAAA,EAGxDqN,GAAU,EAAA6E,EAAA,KAClBvP,MAAA,KAAAD,UAAA,UAUcmQ,GAAajD,EAAAkD,EAAAC,GAAA,OAAAC,GAAArQ,MAAC,KAADD,UAAA,CAiB5B,SAAAsQ,KAFC,OAEDA,GAAAvQ,GAAA1B,KAAAE,EAjBA,SAAAyI,EAA6ByI,EAAQC,EAAgBa,GAAW,IAAA5F,EAAA6F,EAAAC,EAAAC,EAAAC,EAAA,OAAAtS,KAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,cAAAiL,EAAAjL,EAAA,EACrCiT,GAAyBG,EAAQC,GAAe,OAQ9B,GARrC/E,EAAUrD,EAAAjK,EAEVmT,EAAiB5E,EAAKlI,wBAC1BiH,EAAWsF,gBAEPQ,EAAgB7E,EAAKlI,wBAAwBiH,EAAWuF,YAE9DS,EACwB7B,GAAmB,CAAAxH,EAAAjL,EAAA,eAAAiL,EAAAjL,EAAA,EAAWuP,EAAK/J,iBAAgB,OAAA8O,EAAArJ,EAAAjK,EAAA,OAAtD,OAAfqT,EAAeC,EAAArJ,EAAAjL,EAAG,EACXkU,EAAY,CACvBE,cAAAA,EACAD,eAAAA,EACAE,gBAAAA,IACA,cAAApJ,EAAAhK,EAAA,EAAAgK,EAAAjK,GAAA,EAAA2J,EAAA,IACHsJ,GAAArQ,MAAA,KAAAD,UAAA,UAMc4Q,GAAsBrL,GAAA,OAAAsL,GAAA5Q,MAAC,KAADD,UAAA,CAgBrC,SAAA6Q,KAFC,OAEDA,GAAA9Q,GAAA1B,KAAAE,EAhBA,SAAAuS,EAAsCzE,GAAS,IAAA0E,EAAAC,EAAAC,EAAA,OAAA5S,KAAAC,EAAA,SAAA4S,GAAA,cAAAA,EAAA7U,GAAA,OACD,GAAtC0U,EAAiBnF,EAAK/J,iBAEP,CAAFqP,EAAA7U,EAAA,QACyC,OAA1DuP,EAAKO,cAAc,sBAAuB,GAAIE,GAAY6E,EAAA5T,EAAA,iBAAA4T,EAAA7U,EAAA,EAKjCuP,EAAKtG,uBAAuByL,GAAe,OAAhEC,EAAYE,EAAA7T,EACZ4T,EAAerF,EAAKzH,sBAAsB6M,GAGhDpF,EAAKO,cAAc,sBAAuB8E,EAAc5E,GAAW,cAAA6E,EAAA5T,EAAA,KAAAwT,EAAA,KACpE7Q,MAAA,KAAAD,UAAA,UAScmR,GAAiBC,EAAAC,EAAAC,EAAAtF,GAAA,OAAAuF,GAAAtR,MAAC,KAADD,UAAA,CAkDhC,SAAAuR,KAFC,OAEDA,GAAAxR,GAAA1B,KAAAE,EAlDA,SAAAiT,EAAiCC,EAASC,EAAUxK,EAAWwI,GAAc,IAAA5M,EAAAmE,EAAAmG,EAAAjG,EAAAwK,EAAAC,EAAA,OAAAvT,KAAAC,EAAA,SAAAuT,GAAA,cAAAA,EAAA3U,EAAA2U,EAAAxV,GAAA,OAE3B,GAA1C4K,EAAkB,IAAInD,WAAW4N,GAASG,EAAA3U,EAAA,EAG5B,WAAdgK,EAAsB,CAAA2K,EAAAxV,EAAA,QAIsC,OAHxD+Q,EAAgBxB,EAAKzH,sBACzB8C,EAAgB6K,SAAS,EAAG,KAExB3K,EAAiByE,EAAKuB,oBAAoBC,GAAcyE,EAAAxV,EAAA,EAClDuP,EAAKG,UAAU9E,EAAiBC,EAAWC,GAAe,OAAtErE,EAAG+O,EAAAxU,EAAAwU,EAAAxV,EAAG,EAAH,oBAAAwV,EAAAxV,EAAG,EAEMuP,EAAKG,UAAU9E,EAAiBC,GAAU,OAAtDpE,EAAG+O,EAAAxU,EAAA,OAMmB,OANnBwU,EAAA3U,EAAG,EAMR+J,EAAgB4F,KAAK,GAAGgF,EAAA5U,EAAA,UAK1B,GAFM0U,EAAaF,GAAW,UAIZ,WAAdvK,EAAsB,CAAA2K,EAAAxV,EAAA,QACxBuV,EAAgBG,EAAAA,GAAQC,cAAcpG,EAAKpF,aAAa1D,IAAM+O,EAAAxV,EAAA,kBACvC,gBAAd6K,EAA2B,CAAA2K,EAAAxV,EAAA,eAAAwV,EAAAxV,EAAA,EACd4V,GACpBnT,MAAMI,KAAK0M,EAAKlI,wBAAwBZ,KACzC,OAFD8O,EAAaC,EAAAxU,EAAA,OAUXwR,GAAa8C,IACfzC,GAAaL,GAAa8C,IAE5B9C,GAAa8C,GAAc,CACzBjC,eAAAA,EACApN,WAAYQ,EACZoP,OAAQhL,EACRjE,QAAQ,IAAIC,MAAOC,UA3LiB,MA4LpCiM,QAASwC,GACT,eAAAC,EAAAvU,EAAA,KAAAkU,EAAA,qBACHvR,MAAA,KAAAD,UAAA,UAWcmS,GAAiBlG,EAAAC,EAAAkG,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAAvS,MAAC,KAADD,UAAA,CAkBhC,SAAAwS,KAFC,OAEDA,GAAAzS,GAAA1B,KAAAE,EAlBA,SAAAkU,EACEpG,EACAqD,EACAD,EACAvI,EACAuK,EACAlB,GAAW,IAAAmB,EAAA,OAAArT,KAAAC,EAAA,SAAAoU,GAAA,cAAAA,EAAArW,GAAA,cAAAqW,EAAArW,EAAA,EAGY8T,GAAcV,EAAQC,EAAgBa,GAAY,OAA3D,OAARmB,EAAQgB,EAAArV,EAAAqV,EAAArW,EAAG,EAGX8U,GAAkBM,EAASC,EAAUxK,EAAWwI,GAAe,OAGrE9D,EAAKO,cAAc,mBAAmB,EAAME,GAAW,cAAAqG,EAAApV,EAAA,KAAAmV,EAAA,IACxDD,GAAAvS,MAAA,KAAAD,UAAA,UAUc2S,GAAeC,EAAAC,GAAA,OAAAC,GAAA7S,MAAC,KAADD,UAAA,CAW9B,SAAA8S,KAFC,OAEDA,GAAA/S,GAAA1B,KAAAE,EAXA,SAAAwU,EAA+BpF,EAAUtB,GAAS,IAAAuB,EAAA,OAAAvP,KAAAC,EAAA,SAAA0U,GAAA,cAAAA,EAAA3W,GAAA,OAE1CuR,EAAgBhC,EAAK8B,cAAcC,GAGzC/B,EAAKqC,YAAYL,GAGjBhC,EAAKO,cAAc,oBAAoB,EAAME,GAAW,cAAA2G,EAAA1V,EAAA,KAAAyV,EAAA,KACzD9S,MAAA,KAAAD,UAAA,UAQciT,GAAiBC,EAAAC,EAAAC,GAAA,OAAAC,GAAApT,MAAC,KAADD,UAAA,CAmChC,SAAAqT,KAFC,OAEDA,GAAAtT,GAAA1B,KAAAE,EAnCA,SAAA+U,EAAiCjH,EAAWkH,EAAuB9B,GAAO,IAAAE,EAAA7O,EAAAsM,EAAAoE,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAAxV,KAAAC,EAAA,SAAAwV,GAAA,cAAAA,EAAAzX,GAAA,OAKxE,GACK0X,GAHCjR,EAAM+L,GADN8C,EAAaF,GAAW,WAIRE,GAAwB,CAAFmC,EAAAzX,EAAA,eAAAyX,EAAAxW,EAAA,iBAAAwW,EAAAzX,EAAA,EAKtB2X,GAAmBlR,GAAI,OAIE,GAJzCsM,EAAO0E,EAAAzW,EAEPmW,EAAqB/Q,KAAKC,MAAM6Q,GAChCE,EAAoBD,EAAmBI,YAKrB,WAJAJ,EAAmBpH,KAIX,CAAA0H,EAAAzX,EAAA,QAExBsX,EAAmB/H,EAAKlI,wBAAwB+P,IAChDG,EAAcK,EAAAA,GAAqBC,YAAYP,IACzCQ,KAAK,CAAC/E,IAElBsE,EAAoBE,EAAYQ,YAAYN,EAAAzX,EAAA,qBAEtC,IAAIkF,MAAM,gCAA+B,OAG3CsS,EAAuBjI,EAAKzH,sBAAsBuP,GAExD9H,EAAKO,cAAc,qBAAsB0H,EAAsBxH,GAAW,cAAAyH,EAAAxW,EAAA,KAAAgW,EAAA,KAC3ErT,MAAA,KAAAD,UAAA,UAQcqU,GAAaC,EAAAC,EAAAC,GAAA,OAAAC,GAAAxU,MAAC,KAADD,UAAA,CAmD5B,SAAAyU,KAFC,OAEDA,GAAA1U,GAAA1B,KAAAE,EAnDA,SAAAmW,EAA6BrI,EAAWsI,EAAmBlD,GAAO,IAAAE,EAAA7O,EAAA8R,EAAAC,EAAAC,EAAAC,EAAAC,EAAA5F,EAAA9M,EAAA2S,EAAA,OAAA5W,KAAAC,EAAA,SAAA4W,GAAA,cAAAA,EAAA7Y,GAAA,OAKhE,GACK0X,GAHCjR,EAAM+L,GADN8C,EAAaF,GAAW,WAIRE,GAAwB,CAAFuD,EAAA7Y,EAAA,eAAA6Y,EAAA5X,EAAA,UAOU,OAHhDsX,EAAiBnS,KAAKC,MAAMiS,GAC5BE,EAAgBD,EAAe1P,QAC/B4P,EAAcF,EAAexI,KAC7B2I,EAAehG,GAAYN,OAAOoG,GAAcK,EAAA7Y,EAAA,EAKhC2X,GAAmBlR,GAAI,OAAhC,GAAPsM,EAAO8F,EAAA7X,EAEO,WAAhByX,EAAwB,CAAAI,EAAA7Y,EAAA,QAE1BgR,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWxN,MAAAsN,EAAAvN,WAAO,EAMlDsC,EAAa8M,EAAQC,UAAU9P,MAAM,EAAG,IAC9C,IAEQ0V,EAAY5H,EAAAA,GAAkB0H,EAAczS,GAKlD0S,EAAepJ,EAAKzH,sBAAsB8Q,EAC5C,CAAE,QAEA3S,EAAWuK,KAAK,EAClB,CAACqI,EAAA7Y,EAAA,eAEkE,OAAnEuP,EAAKO,cAAc,QAAS,2BAA4BE,GAAW6I,EAAA5X,EAAA,UAKrEsO,EAAKO,cAAc,iBAAkB6I,EAAc3I,GAAW,cAAA6I,EAAA5X,EAAA,KAAAoX,EAAA,IAC/DD,GAAAxU,MAAA,KAAAD,UAAA,UAOcmV,GAAyBC,EAAAC,GAAA,OAAAC,GAAArV,MAAC,KAADD,UAAA,CAmCxC,SAAAsV,KAFC,OAEDA,GAAAvV,GAAA1B,KAAAE,EAnCA,SAAAgX,EAAyClJ,EAAWoF,GAAO,IAAA+D,EAAAC,EAAA3S,EAAA,OAAAzE,KAAAC,EAAA,SAAAoX,GAAA,cAAAA,EAAArZ,GAAA,UAEpDoV,EAAS,CAAFiE,EAAArZ,EAAA,QAIV,IAAAmZ,EAAA,EAAAC,EAAkB3Y,OAAO6Y,KAAK9G,IAAa2G,EAAAC,EAAAhY,OAAA+X,IAAhC1S,EAAG2S,EAAAD,GACZtG,GAAaL,GAAa/L,IAGwC,OADpE+L,GAAe,CAAC,EAChBjD,EAAKO,cAAc,gCAAgC,EAAME,GAAWqJ,EAAApY,EAAA,aAMjEuR,GAAa4C,GAAU,CAAFiE,EAAArZ,EAAA,QAOtB,OANFuP,EAAKO,cACH,QACA,IAAI5K,MAAM,6BAADqD,OACsB6M,EAAO,2CACpCnS,WACF+M,GACAqJ,EAAApY,EAAA,UAMJ4R,GAAaL,GAAa4C,WACnB5C,GAAa4C,GAEpB7F,EAAKO,cAAc,gCAAgC,EAAME,GAAW,cAAAqJ,EAAApY,EAAA,KAAAiY,EAAA,KACrEtV,MAAA,KAAAD,UAAA,UAWc4V,GAAwBC,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAAhW,MAAC,KAADD,UAAA,CAmCvC,SAAAiW,KAFC,OAEDA,GAAAlW,GAAA1B,KAAAE,EAnCA,SAAA2X,EACE7J,EACAqD,EACAD,EACAc,GAAW,IAAAmB,EAAAyE,EAAAC,EAAAC,EAAA,OAAAhY,KAAAC,EAAA,SAAAgY,GAAA,cAAAA,EAAApZ,EAAAoZ,EAAAja,GAAA,OAEQ,OAAfqV,EAAW,KAAI4E,EAAApZ,EAAA,EAAAoZ,EAAAja,EAAA,EAIO8T,GAAcV,EAAQC,EAAgBa,GAAY,OAI1E,OAJM4F,EAASG,EAAAjZ,EACfqU,EACEyE,aAAqBrS,WAAaqS,EAAY,IAAIrS,WAAWqS,GAE/DG,EAAAja,EAAA,EACqBka,GAAuB,IAAIzS,WAAW4N,IAAU,OAA/D0E,EAAME,EAAAjZ,EAGZyR,GAAsBsH,EAEtBxK,EAAKO,cAAc,6BAA6B,EAAME,GAAWiK,EAAAja,EAAA,eAKtC,MALsCia,EAAApZ,EAAA,EAAAmZ,EAAAC,EAAAjZ,EAKjEyR,GAAsB,KAAKuH,EAAA,OAM1B,OAN0BC,EAAApZ,EAAA,EAIvBwU,GACFA,EAAS7E,KAAK,GACfyJ,EAAArZ,EAAA,iBAAAqZ,EAAAhZ,EAAA,KAAA4Y,EAAA,qBAEJD,GAAAhW,MAAA,KAAAD,UAAA,CAOD,SAASwW,GAA4BnK,GACnCyC,GAAsB,KACtBlD,EAAKO,cAAc,iCAAiC,EAAME,EAC5D,CAEA,SACe4F,GAAmBwE,GAAA,OAAAC,GAAAzW,MAAC,KAADD,UAAA,CAmBlC,SAAA0W,KAFC,OAEDA,GAAA3W,GAAA1B,KAAAE,EAnBA,SAAAoY,EAAmCrU,GAAU,IAAA2E,EAAAmI,EAAA,OAAA/Q,KAAAC,EAAA,SAAAsY,GAAA,cAAAA,EAAAva,GAAA,OACa,GAGzB,MAHzB4K,EAAkB2E,EAAKsC,gBAAgB5L,IAGzB7E,OAAa,CAAAmZ,EAAAva,EAAA,QAE/B+S,EAAU2C,EAAAA,GAAQ8E,SAAS5P,GAAiB2P,EAAAva,EAAA,kBACR,KAA3B4K,EAAgBxJ,OAAa,CAAAmZ,EAAAva,EAAA,QAEtC+S,EAAU2C,EAAAA,GAAQC,cAAc/K,GAAiB2P,EAAAva,EAAA,qBAE3C,IAAIkF,MAAM,+BAADqD,OACkBqC,EAAgBxJ,OAAM,+BACtD,cAAAmZ,EAAAtZ,EAAA,EAGI8R,GAAO,EAAAuH,EAAA,KACf1W,MAAA,KAAAD,UAAA,UAScuW,GAAsBO,GAAA,OAAAC,GAAA9W,MAAC,KAADD,UAAA,CA0DrC,SAAA+W,KAFC,OAEDA,GAAAhX,GAAA1B,KAAAE,EA1DA,SAAAyY,EAAsCC,GAAkB,IAAAC,EAAAC,EAAAC,EAAA,OAAA/Y,KAAAC,EAAA,SAAA+Y,GAAA,cAAAA,EAAAna,EAAAma,EAAAhb,GAAA,UACpB,KAA9B4a,EAAmBxZ,OAAa,CAAA4Z,EAAAhb,EAAA,cAC5B,IAAIkF,MAAM,yDAADqD,OAC4CqS,EAAmBxZ,SAC7E,OAkC+C,OAR5CyZ,EAAc,IAAIpT,WAAW,CACjC,GAAM,GAAM,EAAM,EAAM,EAAM,GAAM,GAAM,EAAM,EAAM,GAAM,IAAM,GAClE,IAAM,GAAM,EAAM,EAAM,EAAM,EAAM,GAAM,IAAM,GAAM,IAAM,GAAM,EAClE,EAAM,EAAM,EAAM,GAAM,GAAM,GAAM,EAAM,EAAM,EAAM,EAAM,MAGxDqT,EAAQ,IAAIrT,WAAWoT,EAAYzZ,OAAS,KAC5C8J,IAAI2P,GACVC,EAAM5P,IAAI0P,EAAoBC,EAAYzZ,QAAQ4Z,EAAAna,EAAA,EAAAma,EAAAhb,EAAA,EAGxBoE,OAAOC,OAAOc,UACpC,QACA2V,EACA,CAAE1X,KAAM,OAAQgC,WAAY,UAC5B,EACA,CAAC,eACF,OANc,OAAT2V,EAASC,EAAAha,EAAAga,EAAAhb,EAAG,EAQLoE,OAAOC,OAAO2B,UAAU,MAAO+U,GAAU,cAAAC,EAAA/Z,EAAA,EAAA+Z,EAAAha,GAAA,OAK3B,OAL2Bga,EAAAna,EAAA,EAItDia,EAAMtK,KAAK,GACXoK,EAAmBpK,KAAK,GAAGwK,EAAApa,EAAA,iBAAAoa,EAAA/Z,EAAA,KAAA0Z,EAAA,qBAE9B/W,MAAA,KAAAD,UAAA,CAgBD,SAASsX,GAAgB3F,GACnB9C,GAAa8C,KAEfzC,GAAaL,GAAa8C,WACnB9C,GAAa8C,GAExB,CA6BA,SAASoC,GAAYjR,EAAK6O,GACxB,IAAK7O,EACH,MAAM,IAAIvB,MAAM,mEAADqD,OACsD+M,EAAU,uDAC7ErS,WAIJ,IADY,IAAI4D,MAAOC,WACZL,EAAIG,OAGb,MAlCJ,WAIE,IAHA,IAAMsU,GAAM,IAAIrU,MAAOC,UACjBqU,EAAoB,GAE1BC,EAAA,EAAAC,EAA6B5a,OAAOwM,QAAQuF,IAAa4I,EAAAC,EAAAja,OAAAga,IAAE,CAAtD,IAAAE,EAAA/I,GAAA8I,EAAAD,GAAA,GAAOhG,EAAOkG,EAAA,GAAE7U,EAAG6U,EAAA,GAClB7U,EAAIG,QAAUsU,GAAOzU,EAAIG,QAC3BuU,EAAkBlR,KAAKmL,EAE3B,CAEA,IAAK,IAALmG,EAAA,EAAAC,EAAsBL,EAAiBI,EAAAC,EAAApa,OAAAma,IACrCN,GADgBO,EAAAD,GAGpB,CAoBIE,GACM,IAAIvW,MAvDP,SAAoCoQ,GACzC,MAAO,sEAAP/M,OAA6E+M,EAAU,qDACzF,CAqDoBoG,CAA2BpG,IAAarS,WAG1D,OAAO,CACT,CAEA,SAMe0U,GAAkBgE,GAAA,OAAAC,GAAAhY,MAAC,KAADD,UAAA,CAcjC,SAAAiY,KAFC,OAEDA,GAAAlY,GAAA1B,KAAAE,EAdA,SAAA2Z,EAAkCpV,GAAG,OAAAzE,KAAAC,EAAA,SAAA6Z,GAAA,cAAAA,EAAA9b,GAAA,WAC/ByG,EAAIsM,QAAS,CAAF+I,EAAA9b,EAAA,eAAA8b,EAAA7a,EAAA,EACNwF,EAAIsM,SAAO,UAGD,WAAftM,EAAIoP,OAAmB,CAAAiG,EAAA9b,EAAA,eAAA8b,EAAA7a,EAAA,EAClByU,EAAAA,GAAQC,cAAcpG,EAAKpF,aAAa1D,EAAIR,cAAY,cAAA6V,EAAA9b,EAAA,EAElD4V,GACXnT,MAAMI,KAAK0M,EAAKlI,wBAAwBZ,EAAIR,cAC7C,cAAA6V,EAAA7a,EAAA,EAAA6a,EAAA9a,GAAA,cAAA8a,EAAA7a,EAAA,KAAA4a,EAAA,KAEJjY,MAAA,KAAAD,UAAA,CAyMM,SAASoY,GAAkB7H,GAChC,IAAM8H,EA/HR,SAAkC9H,GAChC,sBAAA+H,EAAAvY,GAAA1B,KAAAE,EAAO,SAAAkH,EAAoC8S,GAAK,IAAAC,EAAAnR,EAAAoR,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAAza,KAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAA3I,EAAA2I,EAAAxJ,GAAA,WAC1Ckc,EAAMzI,MAA8B,4BAAtByI,EAAMzI,KAAW,KAA+B,CAAAjK,EAAAxJ,EAAA,QAG9D,OAFFuP,EAAK/G,WAAW,uBAADD,OACU2T,EAAMzI,KAAW,KAAC,MAAAlL,OAAK2T,EAAMzI,KAAY,MAAC,MAAAlL,OAAK2T,EAAMzI,KAAgB,UAAC,MAAAlL,OAAK2T,EAAMzI,KAAqB,iBAC7HjK,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEM8V,GACJoG,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAqB,eAC3ByI,EAAMzI,KAAY,MAClByI,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAc,QACpBS,GACD,OAAA1K,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAAsb,EAAA3S,EAAAxI,EAEDuO,EAAKO,cAAc,QAASqM,EAAElZ,WAAYiZ,EAAMzI,KAAgB,WAAG,WAGnEyI,EAAMzI,MAA8B,+BAAtByI,EAAMzI,KAAW,KAAkC,CAAAjK,EAAAxJ,EAAA,QAGjE,OAFFuP,EAAK/G,WAAW,uBAADD,OACU2T,EAAMzI,KAAW,KAAC,MAAAlL,OAAK2T,EAAMzI,KAAY,MAAC,MAAAlL,OAAK2T,EAAMzI,KAAqB,iBACjGjK,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEM8V,GACJoG,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAqB,eAC3ByI,EAAMzI,KAAY,WAClBhP,OACAA,EACAyP,GACD,OAAA1K,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAAmK,EAAAxB,EAAAxI,EAEDuO,EAAKO,cAAc,QAAS9E,EAAE/H,WAAYiZ,EAAMzI,KAAgB,WAAG,WAGnEyI,EAAMzI,MAA8B,kBAAtByI,EAAMzI,KAAW,KAAqB,CAAAjK,EAAAxJ,EAAA,gBAAAwJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,GAE9CsW,GAAgB4F,EAAMzI,KAAY,MAAGyI,EAAMzI,KAAgB,WAAE,QAAAjK,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAub,EAAA5S,EAAAxI,EAEnEuO,EAAKO,cAAc,QAASsM,EAAEnZ,WAAYiZ,EAAMzI,KAAgB,WAAG,QAGvE,GAAIyI,EAAMzI,MAA8B,sBAAtByI,EAAMzI,KAAW,KAA2B,CAC5DlE,EAAK/G,WAAW,uBAADD,OAAwB2T,EAAMzI,KAAW,OACxD,IACElE,EAAKE,oBACP,CAAE,MAAO7P,GACP2P,EAAKO,cAAc,QAASlQ,EAAEqD,WAChC,CACF,CAAC,IACGiZ,EAAMzI,MAA8B,oBAAtByI,EAAMzI,KAAW,KAAuB,CAAAjK,EAAAxJ,EAAA,SAGtD,OAFFuP,EAAK/G,WAAW,uBAADD,OACU2T,EAAMzI,KAAW,KAAC,MAAAlL,OAAK2T,EAAMzI,KAAY,QAChEjK,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEM4W,GACJsF,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAY,MAClByI,EAAMzI,KAAc,SACrB,QAAAjK,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAwb,EAAA7S,EAAAxI,EAEDuO,EAAKO,cAAc,QAASuM,EAAEpZ,WAAYiZ,EAAMzI,KAAgB,WAAG,YAGnEyI,EAAMzI,MAA8B,gBAAtByI,EAAMzI,KAAW,KAAmB,CAAAjK,EAAAxJ,EAAA,SAGlD,OAFFuP,EAAK/G,WAAW,uBAADD,OACU2T,EAAMzI,KAAW,KAAC,MAAAlL,OAAK2T,EAAMzI,KAAY,QAChEjK,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMgY,GACJkE,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAY,MAClByI,EAAMzI,KAAc,SACrB,QAAAjK,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAyb,EAAA9S,EAAAxI,EAEDuO,EAAKO,cAAc,QAASwM,EAAErZ,WAAYiZ,EAAMzI,KAAgB,WAAG,YAGnEyI,EAAMzI,MAA8B,8BAAtByI,EAAMzI,KAAW,KAAiC,CAAAjK,EAAAxJ,EAAA,SACL,OAA7DuP,EAAK/G,WAAW,uBAADD,OAAwB2T,EAAMzI,KAAW,OAAKjK,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErD8Y,GACJoD,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAc,SACrB,QAAAjK,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA0b,EAAA/S,EAAAxI,EAEDuO,EAAKO,cAAc,QAASyM,EAAEtZ,WAAYiZ,EAAMzI,KAAgB,WAAG,YAGnEyI,EAAMzI,MAA8B,2BAAtByI,EAAMzI,KAAW,KAA8B,CAAAjK,EAAAxJ,EAAA,SACF,OAA7DuP,EAAK/G,WAAW,uBAADD,OAAwB2T,EAAMzI,KAAW,OAAKjK,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErDuU,GAAuB2H,EAAMzI,KAAgB,WAAE,QAAAjK,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA2b,EAAAhT,EAAAxI,EAErDuO,EAAKO,cAAc,QAAS0M,EAAEvZ,WAAYiZ,EAAMzI,KAAgB,WAAG,YAGnEyI,EAAMzI,MAA8B,6BAAtByI,EAAMzI,KAAW,KAAgC,CAAAjK,EAAAxJ,EAAA,SACJ,OAA7DuP,EAAK/G,WAAW,uBAADD,OAAwB2T,EAAMzI,KAAW,OAAKjK,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErDuZ,GACJ2C,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAqB,eAC3ByI,EAAMzI,KAAY,MAClBS,GACD,QAAA1K,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA4b,EAAAjT,EAAAxI,EAEDuO,EAAKO,cAAc,QAAS2M,EAAExZ,WAAYiZ,EAAMzI,KAAgB,WAAG,QAGvE,GAAIyI,EAAMzI,MAA8B,iCAAtByI,EAAMzI,KAAW,KAAsC,CACvElE,EAAK/G,WAAW,uBAADD,OAAwB2T,EAAMzI,KAAW,OACxD,IACE0G,GAA4B+B,EAAMzI,KAAgB,UACpD,CAAE,MAAO7T,GACP2P,EAAKO,cAAc,QAASlQ,EAAEqD,WAAYiZ,EAAMzI,KAAgB,UAClE,CACF,CAAC,eAAAjK,EAAAvI,EAAA,KAAAmI,EAAA,sEArHuC,OAsHzC,SAtHyCsT,GAAA,OAAAT,EAAArY,MAAC,KAADD,UAAA,EAA1C,EAuHF,CAO+BgZ,CAAyBzI,GAGhD0I,EAA4B,IAAIC,gBAChCC,EAAwB,IAAID,iBAvMpC,WAEElU,SAASC,eAAe,cAAcmU,iBACpC,QAAO,eAAA5P,EAAAzJ,GAAA1B,KAAAE,EACP,SAAA6C,EAAOnF,GAAC,OAAAoC,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACNJ,EAAEod,iBACF1Y,OAAO2L,YAAY,CACjBF,KAAM,2BACNtO,MAAOkH,SAASC,eAAe,qBAAqBnH,MACpDoJ,UAAWlC,SAASC,eAAe,qBAAqBnH,MACxD4R,eAAgB1K,SAASC,eAAe,uBAAuBnH,QAC9D,cAAAwD,EAAAhE,EAAA,KAAA8D,EAAA,IACJ,gBAAAkY,GAAA,OAAA9P,EAAAvJ,MAAA,KAAAD,UAAA,EATM,IAUP,GAEFgF,SAASC,eAAe,oBAAoBmU,iBAC1C,QAAO,eAAA3P,EAAA1J,GAAA1B,KAAAE,EACP,SAAAiM,EAAOvO,GAAC,OAAAoC,KAAAC,EAAA,SAAA8M,GAAA,cAAAA,EAAA/O,GAAA,OACNJ,EAAEod,iBACF1Y,OAAO2L,YAAY,CACjBF,KAAM,mBACNtO,MAAOkH,SAASC,eAAe,uBAAuBnH,QACrD,cAAAsN,EAAA9N,EAAA,KAAAkN,EAAA,IACJ,gBAAA+O,GAAA,OAAA9P,EAAAxJ,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,gBAAgBmU,iBACtC,QAAO,eAAAI,EAAAzZ,GAAA1B,KAAAE,EACP,SAAAoD,EAAO1F,GAAC,OAAAoC,KAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,OACNJ,EAAEod,iBACF1Y,OAAO2L,YAAY,CACjBF,KAAM,eACNtO,MAAOkH,SAASC,eAAe,mBAAmBnH,QACjD,cAAA8D,EAAAtE,EAAA,KAAAqE,EAAA,IACJ,gBAAA8X,GAAA,OAAAD,EAAAvZ,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,SAASmU,iBAC/B,QAAO,eAAAM,EAAA3Z,GAAA1B,KAAAE,EACP,SAAA0D,EAAOhG,GAAC,OAAAoC,KAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACNJ,EAAEod,iBACF1Y,OAAO2L,YAAY,CAAEF,KAAM,uBAAwB,cAAAjK,EAAA7E,EAAA,KAAA2E,EAAA,IACpD,gBAAA0X,GAAA,OAAAD,EAAAzZ,MAAA,KAAAD,UAAA,EAJM,IAKP,GAIF,IAAM4Z,EAAkB5U,SAASC,eAAe,iBAC5C2U,GACFA,EAAgBR,iBACd,QAAO,eAAAS,EAAA9Z,GAAA1B,KAAAE,EACP,SAAAub,EAAO7d,GAAC,OAAAoC,KAAAC,EAAA,SAAAyb,GAAA,cAAAA,EAAA1d,GAAA,OACNJ,EAAEod,iBACF1Y,OAAO2L,YAAY,CACjBF,KAAM,8BACNtO,MAAOkH,SAASC,eAAe,wBAAwBnH,MACvD4R,eAAgB1K,SAASC,eAAe,0BACrCnH,QACF,cAAAic,EAAAzc,EAAA,KAAAwc,EAAA,IACJ,gBAAAE,GAAA,OAAAH,EAAA5Z,MAAA,KAAAD,UAAA,EATM,IAUP,EAGN,CA2IEia,GAGAtZ,OAAOyY,iBAAiB,UAAWf,EAAsB,CACvD6B,SAAS,EACTC,OAAQlB,EAA0BkB,SAIpC,IAAIC,GAAqB,EAiDzB,OA9CAzZ,OAAOyY,iBACL,UAAS,eAAAiB,EAAAta,GAAA1B,KAAAE,EACT,SAAA+b,EAAgB/B,GAAK,IAAAgC,EAAAC,EAAAzJ,EAAAC,EAAAC,EAAA,OAAA5S,KAAAC,EAAA,SAAAmc,GAAA,cAAAA,EAAApe,GAAA,WAQjBkc,EAAMzI,MACgB,gCAAtByI,EAAMzI,KAAW,MACN,QADyCyK,EACpDhC,EAAMmC,aAAK,IAAAH,IAAXA,EAAc,GAAE,CAAAE,EAAApe,EAAA,YAMZ+d,EAAoB,CAAFK,EAAApe,EAAA,eAAAoe,EAAAnd,EAAA,UAWmC,OARzD8c,GAAqB,EAGrBnB,EAA0B0B,SAEpBH,EAAoBjC,EAAMmC,MAAM,IACpBE,UAAYvC,EAE9BzM,EAAKW,iCAAiCiO,GAAmBC,EAAApe,EAAA,EAEnDuP,EAAKC,gBAAgB0M,EAAMsC,QAAO,cAAAJ,EAAApe,EAAA,EACbuP,EAAK/J,iBAAgB,OAA9B,OAAdkP,EAAc0J,EAAApd,EAAAod,EAAApe,EAAG,EACIuP,EAAKtG,uBAAuByL,GAAe,OAAhEC,EAAYyJ,EAAApd,EACZ4T,EAAerF,EAAKzH,sBAAsB6M,GAC9ChM,SAASC,eAAe,gBAAgBnH,MAAQmT,EAEhDrF,EAAKO,cAAc,mBAAoB8E,GAGvCkI,EAAsBwB,QAAQ,cAAAF,EAAAnd,EAAA,KAAAgd,EAAA,IAEjC,gBAAAQ,GAAA,OAAAT,EAAApa,MAAA,KAAAD,UAAA,EAzCQ,GA0CT,CAAEma,OAAQhB,EAAsBgB,SAG3B,CAAE9B,qBAAAA,EACX,C,qQCz3BA,IAAApc,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA6e,GAAA9e,EAAAE,GAAA,IAAAD,EAAAY,OAAA6Y,KAAA1Z,GAAA,GAAAa,OAAAke,sBAAA,KAAAze,EAAAO,OAAAke,sBAAA/e,GAAAE,IAAAI,EAAAA,EAAA0e,OAAA,SAAA9e,GAAA,OAAAW,OAAAoe,yBAAAjf,EAAAE,GAAAuC,UAAA,IAAAxC,EAAAoK,KAAArG,MAAA/D,EAAAK,EAAA,QAAAL,CAAA,UAAA4J,GAAA7J,GAAA,QAAAE,EAAA,EAAAA,EAAA6D,UAAAvC,OAAAtB,IAAA,KAAAD,EAAA,MAAA8D,UAAA7D,GAAA6D,UAAA7D,GAAA,GAAAA,EAAA,EAAA4e,GAAAje,OAAAZ,IAAA,GAAAqN,QAAA,SAAApN,GAAAgf,GAAAlf,EAAAE,EAAAD,EAAAC,GAAA,GAAAW,OAAAse,0BAAAte,OAAAue,iBAAApf,EAAAa,OAAAse,0BAAAlf,IAAA6e,GAAAje,OAAAZ,IAAAqN,QAAA,SAAApN,GAAAW,OAAA0B,eAAAvC,EAAAE,EAAAW,OAAAoe,yBAAAhf,EAAAC,GAAA,UAAAF,CAAA,UAAAkf,GAAAlf,EAAAE,EAAAD,GAAA,OAAAC,EAAA,SAAAD,GAAA,IAAAO,EAAA,SAAAP,GAAA,aAAAof,GAAApf,KAAAA,EAAA,OAAAA,EAAA,IAAAD,EAAAC,EAAAE,OAAAmf,aAAA,YAAAtf,EAAA,KAAAQ,EAAAR,EAAA2B,KAAA1B,EAAAC,UAAA,aAAAmf,GAAA7e,GAAA,OAAAA,EAAA,UAAAkB,UAAA,uDAAA6d,OAAAtf,EAAA,CAAAuf,CAAAvf,GAAA,gBAAAof,GAAA7e,GAAAA,EAAAA,EAAA,GAAAif,CAAAvf,MAAAF,EAAAa,OAAA0B,eAAAvC,EAAAE,EAAA,CAAA2B,MAAA5B,EAAAwC,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAA3C,EAAAE,GAAAD,EAAAD,CAAA,UAAA0D,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,CAiBA,IAAMof,IAAoB,IAAIpN,aAAcE,OAAO,gBAM5C,SAAe8B,GAAWjG,GAAA,OAAAsR,GAAA3b,MAAC,KAADD,UAAA,CAsCjC,SAAA4b,KAFC,OA3DDvf,EA6DAgC,KAAAE,EAtCO,SAAA6C,EAAAoI,GAAA,IAAAiH,EAAAD,EAAAE,EAAAmL,EAAAC,EAAAC,EAAAC,EAAAtX,EAAAuX,EAAAC,EAAA1D,EAAA,OAAAna,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAApE,EAAAoE,EAAAjF,GAAA,OAKuC,OAJ5CoU,EAAajH,EAAbiH,cACAD,EAAchH,EAAdgH,eACAE,EAAelH,EAAfkH,gBAEMmL,EAAa,IAAIM,GAAAA,GAAqB7a,EAAAjF,EAAA,EACnBwf,EAAWra,UAClC,MAAKsE,GAAA,GACA4K,IACL,GACD,OAMC,OAVEoL,EAAYxa,EAAAjE,EAMZ0e,EAAQ,IAAIK,GAAAA,GAAY,CAC1BC,IAAKR,EACLS,IAAK,IAAIC,GAAAA,GACTC,KAAM,IAAIC,GAAAA,KACVnb,EAAAjF,EAAA,EAEuB0f,EAAMW,uBAAuB,CACpDC,aAAcb,EACdxN,IAAKkC,EACLoM,KAAMjB,KACN,OAJc,OAAZK,EAAY1a,EAAAjE,EAAAiE,EAAAjF,EAAG,EAMQiJ,EAAuBoL,GAAgB,OACA,OAD9DhM,EAAcpD,EAAAjE,EACd4e,EAAMzX,EAAyBgM,EAAgB9L,GAAepD,EAAApE,EAAA,EAAAoE,EAAAjF,EAAA,EAGpD2f,EAAaa,KAAKpM,EAAewL,GAAI,OAAjDC,EAAG5a,EAAAjE,EAAAiE,EAAAjF,EAAG,EAAH,mBAAAiF,EAAApE,EAAG,EAAHsb,EAAAlX,EAAAjE,EAEG,IAAIkE,MACR,gGACEiX,EAAElZ,YACL,cAAAgC,EAAAhE,EAAA,EAEI4e,GAAG,EAAA9a,EAAA,gBAGZwa,GA7DA,eAAA1f,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,OA2DCD,MAAA,KAAAD,WA3DD,IAAA3D,CA2DC,C,cC3DD,IAAAJ,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAyD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAQAS,OAAOiL,KAAOA,EAGd5G,SAASoU,iBAAiB,mBAAkBrZ,GAAA1B,KAAAE,EAAE,SAAA6C,IAAA,IAAA2P,EAAAC,EAAAC,EAAA6L,EAAA,OAAAze,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,cAAAiF,EAAAjF,EAAA,EACtCuP,EAAKC,kBAAiB,cAAAvK,EAAAjF,EAAA,EACCuP,EAAK/J,iBAAgB,OAA9B,OAAdkP,EAAczP,EAAAjE,EAAAiE,EAAAjF,EAAG,EACIuP,EAAKtG,uBAAuByL,GAAe,OAAhEC,EAAY1P,EAAAjE,EACZ4T,EAAerF,EAAKzH,sBAAsB6M,GAChDhM,SAASC,eAAe,gBAAgBnH,MAAQmT,EAEhDmH,GAAkB7H,KAGZuM,EAAgBlR,EAAKoC,gBAEzBpC,EAAK8B,cAAcoP,GAGrBlR,EAAKO,cAAc,mBAAoB8E,GAAc,cAAA3P,EAAAhE,EAAA,KAAA8D,EAAA,I,kCC3BvD2b,EAAOC,QAAUvc,M,GCCbwc,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBrc,IAAjBsc,EACH,OAAOA,EAAaJ,QAGrB,IAAID,EAASE,EAAyBE,GAAY,CACjDE,GAAIF,EACJG,QAAQ,EACRN,QAAS,CAAC,GAUX,OANAO,EAAoBJ,GAAUvf,KAAKmf,EAAOC,QAASD,EAAQA,EAAOC,QAASE,GAG3EH,EAAOO,QAAS,EAGTP,EAAOC,OACf,CAGAE,EAAoB3e,EAAIgf,ET5BpB3hB,EAAW,GACfshB,EAAoBM,EAAI,CAACtX,EAAQuX,EAAUC,EAAIC,KAC9C,IAAGF,EAAH,CAMA,IAAIG,EAAeC,IACnB,IAASphB,EAAI,EAAGA,EAAIb,EAAS6B,OAAQhB,IAAK,CAGzC,IAFA,IAAKghB,EAAUC,EAAIC,GAAY/hB,EAASa,GACpCqhB,GAAY,EACPzX,EAAI,EAAGA,EAAIoX,EAAShgB,OAAQ4I,MACpB,EAAXsX,GAAsBC,GAAgBD,IAAa7gB,OAAO6Y,KAAKuH,EAAoBM,GAAGO,MAAOjb,GAASoa,EAAoBM,EAAE1a,GAAK2a,EAASpX,KAC9IoX,EAASO,OAAO3X,IAAK,IAErByX,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACbliB,EAASoiB,OAAOvhB,IAAK,GACrB,IAAIN,EAAIuhB,SACE5c,IAAN3E,IAAiB+J,EAAS/J,EAC/B,CACD,CACA,OAAO+J,CAnBP,CAJCyX,EAAWA,GAAY,EACvB,IAAI,IAAIlhB,EAAIb,EAAS6B,OAAQhB,EAAI,GAAKb,EAASa,EAAI,GAAG,GAAKkhB,EAAUlhB,IAAKb,EAASa,GAAKb,EAASa,EAAI,GACrGb,EAASa,GAAK,CAACghB,EAAUC,EAAIC,IUJ/BT,EAAoB7gB,EAAK0gB,IACxB,IAAIkB,EAASlB,GAAUA,EAAOmB,WAC7B,IAAOnB,EAAiB,QACxB,IAAM,EAEP,OADAG,EAAoB3f,EAAE0gB,EAAQ,CAAE3gB,EAAG2gB,IAC5BA,GTNJniB,EAAWgB,OAAOmB,eAAkBkgB,GAASrhB,OAAOmB,eAAekgB,GAASA,GAASA,EAAa,UAQtGjB,EAAoBhhB,EAAI,SAAS4B,EAAOsgB,GAEvC,GADU,EAAPA,IAAUtgB,EAAQugB,KAAKvgB,IAChB,EAAPsgB,EAAU,OAAOtgB,EACpB,GAAoB,iBAAVA,GAAsBA,EAAO,CACtC,GAAW,EAAPsgB,GAAatgB,EAAMogB,WAAY,OAAOpgB,EAC1C,GAAW,GAAPsgB,GAAoC,mBAAftgB,EAAMgC,KAAqB,OAAOhC,CAC5D,CACA,IAAIwgB,EAAKxhB,OAAOC,OAAO,MACvBmgB,EAAoB/gB,EAAEmiB,GACtB,IAAIC,EAAM,CAAC,EACX1iB,EAAiBA,GAAkB,CAAC,KAAMC,EAAS,CAAC,GAAIA,EAAS,IAAKA,EAASA,IAC/E,IAAI,IAAI0iB,EAAiB,EAAPJ,GAAYtgB,GAA0B,iBAAX0gB,GAAyC,mBAAXA,MAA4B3iB,EAAe+K,QAAQ4X,GAAUA,EAAU1iB,EAAS0iB,GAC1J1hB,OAAO2hB,oBAAoBD,GAASjV,QAASzG,GAASyb,EAAIzb,GAAO,IAAOhF,EAAMgF,IAI/E,OAFAyb,EAAa,QAAI,IAAM,EACvBrB,EAAoB3f,EAAE+gB,EAAIC,GACnBD,CACR,EUxBApB,EAAoB3f,EAAI,CAACyf,EAAS0B,KACjC,IAAI,IAAI5b,KAAO4b,EACXxB,EAAoB3gB,EAAEmiB,EAAY5b,KAASoa,EAAoB3gB,EAAEygB,EAASla,IAC5EhG,OAAO0B,eAAewe,EAASla,EAAK,CAAEpE,YAAY,EAAMigB,IAAKD,EAAW5b,MCJ3Eoa,EAAoBjgB,EAAI,CAAC,EAGzBigB,EAAoBjhB,EAAK2iB,GACjBhf,QAAQif,IAAI/hB,OAAO6Y,KAAKuH,EAAoBjgB,GAAG6hB,OAAO,CAACC,EAAUjc,KACvEoa,EAAoBjgB,EAAE6F,GAAK8b,EAASG,GAC7BA,GACL,KCNJ7B,EAAoBrgB,EAAK+hB,GAEjB,UAAY,CAAC,IAAM,uBAAuB,IAAM,wBAAwBA,GAAW,MCF3F1B,EAAoB8B,SAAYJ,MCDhC1B,EAAoB+B,EAAI,WACvB,GAA0B,iBAAfze,WAAyB,OAAOA,WAC3C,IACC,OAAO6d,MAAQ,IAAIa,SAAS,cAAb,EAChB,CAAE,MAAOjjB,GACR,GAAsB,iBAAX0E,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBuc,EAAoB3gB,EAAI,CAAC4hB,EAAKgB,IAAUriB,OAAOH,UAAU6G,eAAe5F,KAAKugB,EAAKgB,GdA9EpjB,EAAa,CAAC,EACdC,EAAoB,mBAExBkhB,EAAoBxf,EAAI,CAAC0hB,EAAKvhB,EAAMiF,EAAK8b,KACxC,GAAG7iB,EAAWqjB,GAAQrjB,EAAWqjB,GAAK9Y,KAAKzI,OAA3C,CACA,IAAIwhB,EAAQC,EACZ,QAAWxe,IAARgC,EAEF,IADA,IAAIyc,EAAUva,SAASwa,qBAAqB,UACpC/iB,EAAI,EAAGA,EAAI8iB,EAAQ9hB,OAAQhB,IAAK,CACvC,IAAIkI,EAAI4a,EAAQ9iB,GAChB,GAAGkI,EAAE8a,aAAa,QAAUL,GAAOza,EAAE8a,aAAa,iBAAmBzjB,EAAoB8G,EAAK,CAAEuc,EAAS1a,EAAG,KAAO,CACpH,CAEG0a,IACHC,GAAa,GACbD,EAASra,SAASG,cAAc,WAEzBua,QAAU,QACbxC,EAAoByC,IACvBN,EAAOO,aAAa,QAAS1C,EAAoByC,IAElDN,EAAOO,aAAa,eAAgB5jB,EAAoB8G,GAExDuc,EAAOQ,IAAMT,EAC4C,IAArDC,EAAOQ,IAAIjZ,QAAQjG,OAAOI,SAAS8Z,OAAS,OAC/CwE,EAAOS,YAAc,aAEtBT,EAAOU,UAAY7C,EAAoB8C,UAAUpB,GACjDS,EAAOS,YAAc,aAEtB/jB,EAAWqjB,GAAO,CAACvhB,GACnB,IAAIoiB,EAAmB,CAACC,EAAM3H,KAE7B8G,EAAOc,QAAUd,EAAOe,OAAS,KACjCC,aAAaC,GACb,IAAIC,EAAUxkB,EAAWqjB,GAIzB,UAHOrjB,EAAWqjB,GAClBC,EAAOmB,YAAcnB,EAAOmB,WAAWC,YAAYpB,GACnDkB,GAAWA,EAAQhX,QAASmU,GAAQA,EAAGnF,IACpC2H,EAAM,OAAOA,EAAK3H,IAElB+H,EAAUI,WAAWT,EAAiBziB,KAAK,UAAMsD,EAAW,CAAEsL,KAAM,UAAWuU,OAAQtB,IAAW,MACtGA,EAAOc,QAAUF,EAAiBziB,KAAK,KAAM6hB,EAAOc,SACpDd,EAAOe,OAASH,EAAiBziB,KAAK,KAAM6hB,EAAOe,QACnDd,GAActa,SAAS4b,KAAKvb,YAAYga,EAxCkB,GeH3DnC,EAAoB/gB,EAAK6gB,IACH,oBAAX5gB,QAA0BA,OAAOI,aAC1CM,OAAO0B,eAAewe,EAAS5gB,OAAOI,YAAa,CAAEsB,MAAO,WAE7DhB,OAAO0B,eAAewe,EAAS,aAAc,CAAElf,OAAO,KCLvDof,EAAoB2D,IAAO9D,IAC1BA,EAAO+D,MAAQ,GACV/D,EAAOgE,WAAUhE,EAAOgE,SAAW,IACjChE,GCHRG,EAAoBhgB,EAAI,ICCxBggB,EAAoB8C,UAAY,CAAC,IAAM,0EAA0E,IAAM,2E,MCIvH,IAAIgB,EAAkB,CACrB,IAAK,GAGN9D,EAAoBjgB,EAAEoJ,EAAI,CAACuY,EAASG,KAElC,IAAIkC,EAAqB/D,EAAoB3gB,EAAEykB,EAAiBpC,GAAWoC,EAAgBpC,QAAW9d,EACtG,GAA0B,IAAvBmgB,EAGF,GAAGA,EACFlC,EAASzY,KAAK2a,EAAmB,QAC3B,CAGL,IAAIC,EAAU,IAAIthB,QAAQ,CAACC,EAASshB,IAAYF,EAAqBD,EAAgBpC,GAAW,CAAC/e,EAASshB,IAC1GpC,EAASzY,KAAK2a,EAAmB,GAAKC,GAGtC,IAAI9B,EAAMlC,EAAoBhgB,EAAIggB,EAAoBrgB,EAAE+hB,GAEpDzQ,EAAQ,IAAI5M,MAgBhB2b,EAAoBxf,EAAE0hB,EAfF7G,IACnB,GAAG2E,EAAoB3gB,EAAEykB,EAAiBpC,KAEf,KAD1BqC,EAAqBD,EAAgBpC,MACRoC,EAAgBpC,QAAW9d,GACrDmgB,GAAoB,CACtB,IAAIG,EAAY7I,IAAyB,SAAfA,EAAMnM,KAAkB,UAAYmM,EAAMnM,MAChEiV,EAAU9I,GAASA,EAAMoI,QAAUpI,EAAMoI,OAAOd,IACpD1R,EAAMjJ,QAAU,iBAAmB0Z,EAAU,cAAgBwC,EAAY,KAAOC,EAAU,IAC1FlT,EAAM1O,KAAO,iBACb0O,EAAM/B,KAAOgV,EACbjT,EAAMmT,QAAUD,EAChBJ,EAAmB,GAAG9S,EACvB,GAGuC,SAAWyQ,EAASA,EAE/D,GAYH1B,EAAoBM,EAAEnX,EAAKuY,GAA0C,IAA7BoC,EAAgBpC,GAGxD,IAAI2C,EAAuB,CAACC,EAA4B1R,KACvD,IAGIqN,EAAUyB,GAHTnB,EAAUgE,EAAaC,GAAW5R,EAGhBrT,EAAI,EAC3B,GAAGghB,EAASkE,KAAMtE,GAAgC,IAAxB2D,EAAgB3D,IAAa,CACtD,IAAIF,KAAYsE,EACZvE,EAAoB3gB,EAAEklB,EAAatE,KACrCD,EAAoB3e,EAAE4e,GAAYsE,EAAYtE,IAGhD,GAAGuE,EAAS,IAAIxb,EAASwb,EAAQxE,EAClC,CAEA,IADGsE,GAA4BA,EAA2B1R,GACrDrT,EAAIghB,EAAShgB,OAAQhB,IACzBmiB,EAAUnB,EAAShhB,GAChBygB,EAAoB3gB,EAAEykB,EAAiBpC,IAAYoC,EAAgBpC,IACrEoC,EAAgBpC,GAAS,KAE1BoC,EAAgBpC,GAAW,EAE5B,OAAO1B,EAAoBM,EAAEtX,IAG1B0b,EAAqBC,KAAkC,4BAAIA,KAAkC,6BAAK,GACtGD,EAAmBrY,QAAQgY,EAAqB/jB,KAAK,KAAM,IAC3DokB,EAAmBtb,KAAOib,EAAqB/jB,KAAK,KAAMokB,EAAmBtb,KAAK9I,KAAKokB,G,KClFvF,IAAIE,EAAsB5E,EAAoBM,OAAE1c,EAAW,CAAC,IAAK,IAAOoc,EAAoB,MAC5F4E,EAAsB5E,EAAoBM,EAAEsE,E","sources":["webpack://export-and-sign/webpack/runtime/chunk loaded","webpack://export-and-sign/webpack/runtime/create fake namespace object","webpack://export-and-sign/webpack/runtime/load script","webpack://export-and-sign/../shared/turnkey-core.js","webpack://export-and-sign/./src/turnkey-core.js","webpack://export-and-sign/./src/event-handlers.js","webpack://export-and-sign/../shared/crypto-utils.js","webpack://export-and-sign/./src/index.js","webpack://export-and-sign/external var \"crypto\"","webpack://export-and-sign/webpack/bootstrap","webpack://export-and-sign/webpack/runtime/compat get default export","webpack://export-and-sign/webpack/runtime/define property getters","webpack://export-and-sign/webpack/runtime/ensure chunk","webpack://export-and-sign/webpack/runtime/get javascript chunk filename","webpack://export-and-sign/webpack/runtime/get mini-css chunk filename","webpack://export-and-sign/webpack/runtime/global","webpack://export-and-sign/webpack/runtime/hasOwnProperty shorthand","webpack://export-and-sign/webpack/runtime/make namespace object","webpack://export-and-sign/webpack/runtime/node module decorator","webpack://export-and-sign/webpack/runtime/publicPath","webpack://export-and-sign/webpack/runtime/compat","webpack://export-and-sign/webpack/runtime/jsonp chunk loading","webpack://export-and-sign/webpack/startup"],"sourcesContent":["var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var getProto = Object.getPrototypeOf ? (obj) => (Object.getPrototypeOf(obj)) : (obj) => (obj.__proto__);\nvar leafPrototypes;\n// create a fake namespace object\n// mode & 1: value is a module id, require it\n// mode & 2: merge all properties of value into the ns\n// mode & 4: return value when already ns object\n// mode & 16: return value when it's Promise-like\n// mode & 8|1: behave like require\n__webpack_require__.t = function(value, mode) {\n\tif(mode & 1) value = this(value);\n\tif(mode & 8) return value;\n\tif(typeof value === 'object' && value) {\n\t\tif((mode & 4) && value.__esModule) return value;\n\t\tif((mode & 16) && typeof value.then === 'function') return value;\n\t}\n\tvar ns = Object.create(null);\n\t__webpack_require__.r(ns);\n\tvar def = {};\n\tleafPrototypes = leafPrototypes || [null, getProto({}), getProto([]), getProto(getProto)];\n\tfor(var current = mode & 2 && value; (typeof current == 'object' || typeof current == 'function') && !~leafPrototypes.indexOf(current); current = getProto(current)) {\n\t\tObject.getOwnPropertyNames(current).forEach((key) => (def[key] = () => (value[key])));\n\t}\n\tdef['default'] = () => (value);\n\t__webpack_require__.d(ns, def);\n\treturn ns;\n};","var inProgress = {};\nvar dataWebpackPrefix = \"export-and-sign:\";\n// loadScript function to load a script via script tag\n__webpack_require__.l = (url, done, key, chunkId) => {\n\tif(inProgress[url]) { inProgress[url].push(done); return; }\n\tvar script, needAttach;\n\tif(key !== undefined) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tfor(var i = 0; i < scripts.length; i++) {\n\t\t\tvar s = scripts[i];\n\t\t\tif(s.getAttribute(\"src\") == url || s.getAttribute(\"data-webpack\") == dataWebpackPrefix + key) { script = s; break; }\n\t\t}\n\t}\n\tif(!script) {\n\t\tneedAttach = true;\n\t\tscript = document.createElement('script');\n\n\t\tscript.charset = 'utf-8';\n\t\tif (__webpack_require__.nc) {\n\t\t\tscript.setAttribute(\"nonce\", __webpack_require__.nc);\n\t\t}\n\t\tscript.setAttribute(\"data-webpack\", dataWebpackPrefix + key);\n\n\t\tscript.src = url;\n\t\tif (script.src.indexOf(window.location.origin + '/') !== 0) {\n\t\t\tscript.crossOrigin = \"anonymous\";\n\t\t}\n\t\tscript.integrity = __webpack_require__.sriHashes[chunkId];\n\t\tscript.crossOrigin = \"anonymous\";\n\t}\n\tinProgress[url] = [done];\n\tvar onScriptComplete = (prev, event) => {\n\t\t// avoid mem leaks in IE.\n\t\tscript.onerror = script.onload = null;\n\t\tclearTimeout(timeout);\n\t\tvar doneFns = inProgress[url];\n\t\tdelete inProgress[url];\n\t\tscript.parentNode && script.parentNode.removeChild(script);\n\t\tdoneFns && doneFns.forEach((fn) => (fn(event)));\n\t\tif(prev) return prev(event);\n\t}\n\tvar timeout = setTimeout(onScriptComplete.bind(null, undefined, { type: 'timeout', target: script }), 120000);\n\tscript.onerror = onScriptComplete.bind(null, script.onerror);\n\tscript.onload = onScriptComplete.bind(null, script.onload);\n\tneedAttach && document.head.appendChild(script);\n};","import { bech32 } from \"bech32\";\n\n/**\n * Turnkey Core Module - Shared\n * Contains all the core cryptographic and utility functions shared across frames\n */\n\n/**\n * Constant-time string comparison to prevent timing side-channel attacks.\n * Standard `===` / `!==` short-circuits on the first differing byte, leaking\n * information about how many leading bytes match. This XOR-based approach\n * always compares every byte regardless of mismatches.\n * @param {string} a\n * @param {string} b\n * @returns {boolean} true if strings are equal\n */\nfunction timingSafeEqual(a, b) {\n if (typeof a !== \"string\" || typeof b !== \"string\") return false;\n const enc = new TextEncoder();\n const aBuf = enc.encode(a);\n const bBuf = enc.encode(b);\n if (aBuf.length !== bBuf.length) {\n return false;\n }\n let diff = 0;\n for (let i = 0; i < aBuf.length; i++) {\n diff |= aBuf[i] ^ bBuf[i];\n }\n return diff === 0;\n}\n\n/** constants for LocalStorage */\nconst TURNKEY_EMBEDDED_KEY = \"TURNKEY_EMBEDDED_KEY\";\nconst TURNKEY_TARGET_EMBEDDED_KEY = \"TURNKEY_TARGET_EMBEDDED_KEY\";\nconst TURNKEY_SETTINGS = \"TURNKEY_SETTINGS\";\n/**\n * TTL for the embedded ECDH private key stored in localStorage.\n *\n * SECURITY NOTE: The P-256 ECDH private key is stored as a JSON-serialized JWK\n * in localStorage, where it cannot be reliably zeroed (localStorage values are\n * immutable strings managed by the browser).\n */\nconst TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 48;\nconst TURNKEY_EMBEDDED_KEY_ORIGIN = \"TURNKEY_EMBEDDED_KEY_ORIGIN\";\n\nlet parentFrameMessageChannelPort = null;\nvar cryptoProviderOverride = null;\n\n/*\n * Returns a reference to the WebCrypto subtle interface regardless of the host environment.\n */\nfunction getSubtleCrypto() {\n if (cryptoProviderOverride && cryptoProviderOverride.subtle) {\n return cryptoProviderOverride.subtle;\n }\n if (\n typeof globalThis !== \"undefined\" &&\n globalThis.crypto &&\n globalThis.crypto.subtle\n ) {\n return globalThis.crypto.subtle;\n }\n if (typeof window !== \"undefined\" && window.crypto && window.crypto.subtle) {\n return window.crypto.subtle;\n }\n if (typeof global !== \"undefined\" && global.crypto && global.crypto.subtle) {\n return global.crypto.subtle;\n }\n if (typeof crypto !== \"undefined\" && crypto.subtle) {\n return crypto.subtle;\n }\n\n return null;\n}\n\n/*\n * Allows tests to explicitly set the crypto provider (e.g. crypto.webcrypto) when the runtime\n * environment does not expose one on the global/window objects.\n */\nfunction setCryptoProvider(cryptoProvider) {\n cryptoProviderOverride = cryptoProvider || null;\n}\n\n/* Security functions */\n\nfunction isDoublyIframed() {\n if (window.location.ancestorOrigins !== undefined) {\n // Does not exist in IE and firefox.\n // See https://developer.mozilla.org/en-US/docs/Web/API/Location/ancestorOrigins for how this works\n return window.location.ancestorOrigins.length > 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n dev: \"048cf9ed5f579298cc1571823a3222b82d80c529c551f6070fbe712ae1a9e8d1a23b7006e306d27190358dfcd9c44624918a00f23c920a33cb14f5b026eafc865d\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions ( 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @return {Object}\n */\nfunction validateStyles(styles) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n timingSafeEqual,\n};\n","import * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\nimport { fromDerSignature } from \"@turnkey/crypto\";\nimport * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n initEmbeddedKey: sharedInitEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n additionalAssociatedData,\n getSettings,\n setSettings,\n parsePrivateKey,\n validateStyles,\n isDoublyIframed,\n loadQuorumKey,\n timingSafeEqual,\n} = SharedTKHQ;\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n return await sharedInitEmbeddedKey();\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Read environment from meta tag (templated at deploy time), fall back to window variable (for testing)\n let environment = null;\n if (typeof document !== \"undefined\") {\n const meta = document.querySelector(\n 'meta[name=\"turnkey-signer-environment\"]'\n );\n if (\n meta &&\n meta.content &&\n meta.content !== \"__TURNKEY_SIGNER_ENVIRONMENT__\"\n ) {\n environment = meta.content;\n }\n }\n if (!environment && typeof window !== \"undefined\") {\n environment = window.__TURNKEY_SIGNER_ENVIRONMENT__;\n }\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n return await crypto.subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Returns the public key bytes for a hex-encoded Ed25519 private key.\n * @param {string} privateKeyHex\n */\nfunction getEd25519PublicKey(privateKeyHex) {\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n return nobleEd25519.getPublicKey(privateKeyHex);\n}\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n if (!settings) {\n return JSON.stringify(validSettings);\n }\n const settingsObj = JSON.parse(settings);\n if (settingsObj.styles) {\n // Valid styles will be applied the \"key-div\" div HTML element.\n const keyDivTextarea = document.getElementById(\"key-div\");\n if (!keyDivTextarea) {\n throw new Error(\"no key-div HTML element found to apply settings to.\");\n }\n\n // Validate, sanitize, and apply the styles to the \"key-div\" div element.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n keyDivTextarea.style[key] = value;\n });\n\n validSettings[\"styles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport const TKHQ = {\n initEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n getEd25519PublicKey,\n applySettings,\n validateStyles,\n getSettings,\n setSettings,\n parsePrivateKey,\n timingSafeEqual,\n};\n","import { TKHQ } from \"./turnkey-core.js\";\nimport { Keypair, VersionedTransaction } from \"@solana/web3.js\";\nimport * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\n\n/**\n * In-memory key store: { address --> key object }.\n * SECURITY: Mutated in-place (not spread-copied) to avoid multiplying\n * copies of key material on the V8 heap. Before deleting an entry,\n * all Uint8Array fields (e.g. keypair.secretKey) must be zeroed.\n */\nlet inMemoryKeys = {};\n\n/**\n * Injected embedded key -- held in memory only, never persisted.\n * When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key.\n *\n * SECURITY LIMITATION: This is a JWK object containing the raw \"d\" parameter.\n * It cannot be reliably zeroed in JS (object properties are GC'd, not wiped).\n * We null it on error paths and on reset to limit the exposure window.\n */\nlet injectedEmbeddedKey = null;\n\nexport const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds\n\n// Instantiate these once (for perf)\nconst textEncoder = new TextEncoder();\nconst textDecoder = new TextDecoder();\n\n/**\n * Zeros all sensitive Uint8Array fields on a key entry before removal.\n * JS strings (like `privateKey`) are immutable and cannot be zeroed — this is\n * a known V8 limitation. We zero what we can (Uint8Array buffers) and document\n * the rest.\n * @param {Object} keyEntry - An entry from inMemoryKeys\n */\nfunction zeroKeyEntry(keyEntry) {\n if (!keyEntry) return;\n // Zero the cached Solana keypair's secret key (64-byte Uint8Array)\n if (keyEntry.keypair && keyEntry.keypair.secretKey) {\n keyEntry.keypair.secretKey.fill(0);\n }\n // NOTE: keyEntry.privateKey is a JS string (hex or base58 encoded).\n // JS strings are immutable — we cannot zero them. They will linger on the\n // V8 heap until GC. Keeping key material as Uint8Array end-to-end would\n // require a larger refactor of the encodeKey/decodeKey pipeline.\n}\n\n/**\n * Verifies the enclave signature on a v1.0.0 bundle and returns the parsed signed data.\n * @param {string} bundle - JSON-stringified bundle\n * @param {string} organizationId - Expected organization ID\n * @returns {Promise} - The parsed signed data {organizationId, encappedPublic, ciphertext}\n */\nasync function verifyAndParseBundleData(bundle, organizationId) {\n const bundleObj = JSON.parse(bundle);\n\n if (bundleObj.version !== \"v1.0.0\") {\n throw new Error(`unsupported version: ${bundleObj.version}`);\n }\n if (!bundleObj.data) {\n throw new Error('missing \"data\" in bundle');\n }\n if (!bundleObj.dataSignature) {\n throw new Error('missing \"dataSignature\" in bundle');\n }\n if (!bundleObj.enclaveQuorumPublic) {\n throw new Error('missing \"enclaveQuorumPublic\" in bundle');\n }\n\n if (!TKHQ.verifyEnclaveSignature) {\n throw new Error(\"method TKHQ.verifyEnclaveSignature not loaded\");\n }\n const verified = await TKHQ.verifyEnclaveSignature(\n bundleObj.enclaveQuorumPublic,\n bundleObj.dataSignature,\n bundleObj.data\n );\n if (!verified) {\n throw new Error(\n `failed to verify enclave signature. Got signature: ${bundleObj.dataSignature}, enclaveQuorumPublic: ${bundleObj.enclaveQuorumPublic}`\n );\n }\n\n const signedData = JSON.parse(\n textDecoder.decode(TKHQ.uint8arrayFromHexString(bundleObj.data))\n );\n\n if (!organizationId) {\n throw new Error(\n `organization id is required. Please ensure you are using @turnkey/iframe-stamper >= v2.0.0 to pass \"organizationId\" for security purposes.`\n );\n } else if (\n !signedData.organizationId ||\n // SECURITY: Use constant-time comparison to prevent timing side-channel\n // attacks that could leak the organization ID byte-by-byte.\n !TKHQ.timingSafeEqual(signedData.organizationId, organizationId)\n ) {\n throw new Error(\n `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.`\n );\n }\n\n if (!signedData.encappedPublic) {\n throw new Error('missing \"encappedPublic\" in bundle signed data');\n }\n if (!signedData.ciphertext) {\n throw new Error('missing \"ciphertext\" in bundle signed data');\n }\n\n return signedData;\n}\n\n/**\n * Parse and decrypt the export bundle.\n * The `bundle` param is a JSON string of the encapsulated public\n * key, encapsulated public key signature, and the ciphertext.\n * @param {string} bundle\n * @param {string} organizationId\n * @param {Function} HpkeDecrypt\n */\nasync function decryptBundle(bundle, organizationId, HpkeDecrypt) {\n const signedData = await verifyAndParseBundleData(bundle, organizationId);\n\n const encappedKeyBuf = TKHQ.uint8arrayFromHexString(\n signedData.encappedPublic\n );\n const ciphertextBuf = TKHQ.uint8arrayFromHexString(signedData.ciphertext);\n\n // Use the injected embedded key if available, otherwise fall back to the embedded key\n const receiverPrivJwk = injectedEmbeddedKey || (await TKHQ.getEmbeddedKey());\n return await HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n });\n}\n\n/**\n * Function triggered when GET_EMBEDDED_PUBLIC_KEY event is received.\n * @param {string} requestId\n */\nasync function onGetPublicEmbeddedKey(requestId) {\n const embeddedKeyJwk = TKHQ.getEmbeddedKey();\n\n if (!embeddedKeyJwk) {\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", \"\", requestId); // no key == empty string\n\n return;\n }\n\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n\n // Send up EMBEDDED_PUBLIC_KEY message\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", targetPubHex, requestId);\n}\n\n/**\n * Encodes raw key bytes and loads them into the in-memory key store.\n * @param {string} address - Wallet address (case-sensitive)\n * @param {ArrayBuffer} keyBytes - Raw decrypted private key bytes\n * @param {string} keyFormat - \"SOLANA\" | \"HEXADECIMAL\"\n * @param {string} organizationId - Organization ID\n */\nasync function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) {\n let key;\n const privateKeyBytes = new Uint8Array(keyBytes);\n\n try {\n if (keyFormat === \"SOLANA\") {\n const privateKeyHex = TKHQ.uint8arrayToHexString(\n privateKeyBytes.subarray(0, 32)\n );\n const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex);\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes);\n } else {\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat);\n }\n } finally {\n // SECURITY: Zero the raw private key bytes immediately after encoding.\n // The encoded `key` is a JS string (hex or base58) which we cannot zero,\n // but we can at least wipe the Uint8Array source material from the heap.\n privateKeyBytes.fill(0);\n }\n\n const keyAddress = address || \"default\";\n\n // Cache keypair for improved signing perf\n let cachedKeypair;\n if (keyFormat === \"SOLANA\") {\n cachedKeypair = Keypair.fromSecretKey(TKHQ.base58Decode(key));\n } else if (keyFormat === \"HEXADECIMAL\") {\n cachedKeypair = await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key))\n );\n }\n\n // SECURITY: Mutate in-place rather than spread-copying. The spread pattern\n // `{ ...inMemoryKeys, [addr]: ... }` creates a shallow copy of the entire map\n // on every key injection, multiplying references to key material on the heap.\n // In-place mutation avoids this; only one reference per key exists at a time.\n // If replacing an existing entry, zero its buffers first.\n if (inMemoryKeys[keyAddress]) {\n zeroKeyEntry(inMemoryKeys[keyAddress]);\n }\n inMemoryKeys[keyAddress] = {\n organizationId,\n privateKey: key,\n format: keyFormat,\n expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS,\n keypair: cachedKeypair,\n };\n}\n\n/**\n * Function triggered when INJECT_KEY_EXPORT_BUNDLE event is received.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle\n * @param {string} keyFormat\n * @param {string} address\n * @param {Function} HpkeDecrypt // TODO: import this directly (instead of passing around)\n */\nasync function onInjectKeyBundle(\n requestId,\n organizationId,\n bundle,\n keyFormat,\n address,\n HpkeDecrypt\n) {\n // Decrypt the export bundle\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Load decrypted key into memory\n await loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId);\n\n // Send up BUNDLE_INJECTED message\n TKHQ.sendMessageUp(\"BUNDLE_INJECTED\", true, requestId);\n}\n\n/**\n * Function triggered when APPLY_SETTINGS event is received.\n * For now, the only settings that can be applied are for \"styles\".\n * Persist them in local storage so they can be applied on every\n * page load.\n * @param {string} settings: JSON-stringified settings\n * @param {string} requestId\n */\nasync function onApplySettings(settings, requestId) {\n // Apply settings\n const validSettings = TKHQ.applySettings(settings);\n\n // Persist in local storage\n TKHQ.setSettings(validSettings);\n\n // Send up SETTINGS_APPLIED message\n TKHQ.sendMessageUp(\"SETTINGS_APPLIED\", true, requestId);\n}\n\n/**\n * Function triggered when SIGN_TRANSACTION event is received.\n * @param {string} requestId\n * @param {string} transaction (serialized)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignTransaction(requestId, serializedTransaction, address) {\n // If no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and is valid/non-expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n const transactionWrapper = JSON.parse(serializedTransaction);\n const transactionToSign = transactionWrapper.transaction;\n const transactionType = transactionWrapper.type;\n\n let signedTransaction;\n\n if (transactionType === \"SOLANA\") {\n // Fetch the transaction and sign\n const transactionBytes = TKHQ.uint8arrayFromHexString(transactionToSign);\n const transaction = VersionedTransaction.deserialize(transactionBytes);\n transaction.sign([keypair]);\n\n signedTransaction = transaction.serialize();\n } else {\n throw new Error(\"unsupported transaction type\");\n }\n\n const signedTransactionHex = TKHQ.uint8arrayToHexString(signedTransaction);\n\n TKHQ.sendMessageUp(\"TRANSACTION_SIGNED\", signedTransactionHex, requestId);\n}\n\n/**\n * Function triggered when SIGN_MESSAGE event is received.\n * @param {string} requestId\n * @param {string} message (serialized, JSON-stringified)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignMessage(requestId, serializedMessage, address) {\n // Backwards compatibility: if no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and has not expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n const messageWrapper = JSON.parse(serializedMessage);\n const messageToSign = messageWrapper.message;\n const messageType = messageWrapper.type;\n const messageBytes = textEncoder.encode(messageToSign);\n\n let signatureHex;\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n if (messageType === \"SOLANA\") {\n // Set up sha512 for nobleEd25519 (required for signing)\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n\n // Extract the 32-byte private key from the 64-byte secretKey.\n // Solana keypair.secretKey format: [32-byte private key][32-byte public key]\n // SECURITY: .slice() creates a new Uint8Array copy. We must zero it after\n // signing to avoid leaving an extra copy of the private key on the heap.\n const privateKey = keypair.secretKey.slice(0, 32);\n try {\n // Sign the message using nobleEd25519\n const signature = nobleEd25519.sign(messageBytes, privateKey);\n\n // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair.\n // Clients can verify the signature returned.\n\n signatureHex = TKHQ.uint8arrayToHexString(signature);\n } finally {\n // SECURITY: Zero the private key slice immediately after use.\n privateKey.fill(0);\n }\n } else {\n TKHQ.sendMessageUp(\"ERROR\", \"unsupported message type\", requestId);\n\n return;\n }\n\n TKHQ.sendMessageUp(\"MESSAGE_SIGNED\", signatureHex, requestId);\n}\n\n/**\n * Function triggered when CLEAR_EMBEDDED_PRIVATE_KEY event is received.\n * @param {string} requestId\n * @param {string} address - Optional: The address of the key to clear (case-sensitive). If not provided, clears all keys.\n */\nasync function onClearEmbeddedPrivateKey(requestId, address) {\n // If no address is provided, clear all keys\n if (!address) {\n // SECURITY: Zero all Uint8Array buffers before releasing references.\n // `delete` and reassignment only remove the JS reference — the underlying\n // memory isn't wiped and will persist until GC reclaims it.\n for (const key of Object.keys(inMemoryKeys)) {\n zeroKeyEntry(inMemoryKeys[key]);\n }\n inMemoryKeys = {};\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n\n return;\n }\n\n // Check if key exists for the specific address\n if (!inMemoryKeys[address]) {\n TKHQ.sendMessageUp(\n \"ERROR\",\n new Error(\n `key not found for address ${address}. Note that address is case sensitive.`\n ).toString(),\n requestId\n );\n\n return;\n }\n\n // SECURITY: Zero sensitive buffers before deleting the entry.\n zeroKeyEntry(inMemoryKeys[address]);\n delete inMemoryKeys[address];\n\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n}\n\n/**\n * Handler for SET_EMBEDDED_KEY_OVERRIDE events.\n * Decrypts a P-256 private key bundle using the iframe's embedded key and\n * overrides the embedded key with it for subsequent bundle decryptions.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle - v1.0.0 bundle containing the P-256 private key\n * @param {Function} HpkeDecrypt\n */\nasync function onSetEmbeddedKeyOverride(\n requestId,\n organizationId,\n bundle,\n HpkeDecrypt\n) {\n let keyBytes = null;\n try {\n // Decrypt the private key using the iframe's embedded key.\n // The decrypted payload is a raw 32-byte P-256 private key scalar.\n const decrypted = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n keyBytes =\n decrypted instanceof Uint8Array ? decrypted : new Uint8Array(decrypted);\n\n // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto)\n const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes));\n\n // Store in module-level variable (memory only)\n injectedEmbeddedKey = keyJwk;\n\n TKHQ.sendMessageUp(\"EMBEDDED_KEY_OVERRIDE_SET\", true, requestId);\n } catch (e) {\n // SECURITY: Ensure the injected key is cleared on any error path.\n // If decryption or JWK conversion partially succeeded before throwing,\n // we must not leave stale key material in the module variable.\n injectedEmbeddedKey = null;\n throw e;\n } finally {\n // SECURITY: Zero decrypted key bytes on all paths once we've derived the JWK.\n if (keyBytes) {\n keyBytes.fill(0);\n }\n }\n}\n\n/**\n * Handler for RESET_TO_DEFAULT_EMBEDDED_KEY events.\n * Clears the embedded key from memory, replacing it with the iframe's default embedded key.\n * @param {string} requestId\n */\nfunction onResetToDefaultEmbeddedKey(requestId) {\n injectedEmbeddedKey = null;\n TKHQ.sendMessageUp(\"RESET_TO_DEFAULT_EMBEDDED_KEY\", true, requestId);\n}\n\n// Utility functions\nasync function createSolanaKeypair(privateKey) {\n const privateKeyBytes = TKHQ.parsePrivateKey(privateKey);\n\n let keypair;\n if (privateKeyBytes.length === 32) {\n // 32-byte private key (seed)\n keypair = Keypair.fromSeed(privateKeyBytes);\n } else if (privateKeyBytes.length === 64) {\n // 64-byte secret key (private + public)\n keypair = Keypair.fromSecretKey(privateKeyBytes);\n } else {\n throw new Error(\n `Invalid private key length: ${privateKeyBytes.length}. Expected 32 or 64 bytes.`\n );\n }\n\n return keypair;\n}\n\n/**\n * Converts raw P-256 private key bytes (32-byte scalar) to a JWK.\n * Constructs a PKCS8 wrapper around the raw bytes, imports via WebCrypto\n * (which derives the public key), then exports as JWK.\n * @param {Uint8Array} rawPrivateKeyBytes - 32-byte P-256 private key scalar\n * @returns {Promise} - Full P-256 ECDH private key JWK\n */\nasync function rawP256PrivateKeyToJwk(rawPrivateKeyBytes) {\n if (rawPrivateKeyBytes.length !== 32) {\n throw new Error(\n `invalid decryption key length: expected 32 bytes, got ${rawPrivateKeyBytes.length}`\n );\n }\n\n // Fixed PKCS#8 DER prefix for a P-256 private key (36 bytes).\n // This wraps a raw 32-byte scalar into the PrivateKeyInfo structure\n // that WebCrypto's importKey(\"pkcs8\", ...) expects.\n //\n // Structure (per RFC 5958 §2 / RFC 5208 §5):\n // SEQUENCE {\n // INTEGER 0 -- version (v1)\n // SEQUENCE { -- AlgorithmIdentifier (RFC 5480 §2.1.1)\n // OID 1.2.840.10045.2.1 -- id-ecPublicKey\n // OID 1.2.840.10045.3.1.7 -- secp256r1 (P-256)\n // }\n // OCTET STRING { -- privateKey (SEC 1 §C.4 / RFC 5915 §3)\n // SEQUENCE {\n // INTEGER 1 -- version\n // OCTET STRING (32 bytes) -- raw private key scalar\n // }\n // }\n // }\n //\n // References:\n // - RFC 5958 / RFC 5208: PKCS#8 PrivateKeyInfo\n // - RFC 5480 §2.1.1: ECC AlgorithmIdentifier (OIDs)\n // - RFC 5915 / SEC 1 v2 §C.4: ECPrivateKey encoding\n const pkcs8Prefix = new Uint8Array([\n 0x30, 0x41, 0x02, 0x01, 0x00, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48,\n 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03,\n 0x01, 0x07, 0x04, 0x27, 0x30, 0x25, 0x02, 0x01, 0x01, 0x04, 0x20,\n ]);\n\n const pkcs8 = new Uint8Array(pkcs8Prefix.length + 32);\n pkcs8.set(pkcs8Prefix);\n pkcs8.set(rawPrivateKeyBytes, pkcs8Prefix.length);\n\n try {\n const cryptoKey = await crypto.subtle.importKey(\n \"pkcs8\",\n pkcs8,\n { name: \"ECDH\", namedCurve: \"P-256\" },\n true,\n [\"deriveBits\"]\n );\n\n return await crypto.subtle.exportKey(\"jwk\", cryptoKey);\n } finally {\n // SECURITY: Zero intermediate buffers that contain private key material.\n // The PKCS#8 wrapper embeds the raw scalar, so both must be wiped.\n pkcs8.fill(0);\n rawPrivateKeyBytes.fill(0);\n }\n}\n\n/**\n * Generates the error message for missing or expired keys.\n * @param {string} keyAddress - The address of the key\n * @returns {string} - The error message string\n */\nexport function getKeyNotFoundErrorMessage(keyAddress) {\n return `key bytes have expired. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`;\n}\n\n/**\n * Clears an expired key from memory. This is an internal helper function\n * that clears the key without sending messages to the parent frame.\n * @param {string} keyAddress - The address of the key to clear\n */\nfunction clearExpiredKey(keyAddress) {\n if (inMemoryKeys[keyAddress]) {\n // SECURITY: Zero sensitive Uint8Array buffers before releasing the reference.\n zeroKeyEntry(inMemoryKeys[keyAddress]);\n delete inMemoryKeys[keyAddress];\n }\n}\n\n/**\n * Clears all expired keys from memory.\n * This function iterates through all keys and removes any that have expired.\n */\nfunction clearAllExpiredKeys() {\n const now = new Date().getTime();\n const addressesToRemove = [];\n\n for (const [address, key] of Object.entries(inMemoryKeys)) {\n if (key.expiry && now >= key.expiry) {\n addressesToRemove.push(address);\n }\n }\n\n for (const address of addressesToRemove) {\n clearExpiredKey(address);\n }\n}\n\n/**\n * Validates that a key exists and has not expired.\n * Clears the key from memory if it has expired.\n * Throws error if validation fails (and caller will send message up back to parent).\n * @param {Object} key - The key object from inMemoryKeys\n * @param {string} keyAddress - The address of the key\n * @returns {boolean} - True if key is valid, false otherwise\n */\nfunction validateKey(key, keyAddress) {\n if (!key) {\n throw new Error(\n `key bytes not found. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`\n ).toString();\n }\n\n const now = new Date().getTime();\n if (now >= key.expiry) {\n // Clear all expired keys before processing the signing request\n clearAllExpiredKeys();\n throw new Error(getKeyNotFoundErrorMessage(keyAddress)).toString();\n }\n\n return true;\n}\n\n/**\n * Gets or creates a Solana keypair from a key object.\n * Uses cached keypair if available, otherwise creates a new one.\n * @param {Object} key - The key object containing format and privateKey\n * @returns {Promise} - The Solana keypair\n */\nasync function getOrCreateKeypair(key) {\n if (key.keypair) {\n return key.keypair;\n }\n\n if (key.format === \"SOLANA\") {\n return Keypair.fromSecretKey(TKHQ.base58Decode(key.privateKey));\n } else {\n return await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key.privateKey))\n );\n }\n}\n\n/**\n * DOM Event handlers to power the export flow in standalone mode\n * Instead of receiving events from the parent page, forms trigger them.\n * This is useful for debugging as well.\n */\nfunction addDOMEventListeners() {\n // only support injected keys, not wallets\n document.getElementById(\"inject-key\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_KEY_EXPORT_BUNDLE\",\n value: document.getElementById(\"key-export-bundle\").value,\n keyFormat: document.getElementById(\"key-export-format\").value,\n organizationId: document.getElementById(\"key-organization-id\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-transaction\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_TRANSACTION\",\n value: document.getElementById(\"transaction-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-message\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_MESSAGE\",\n value: document.getElementById(\"message-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"reset\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({ type: \"RESET_EMBEDDED_KEY\" });\n },\n false\n );\n\n // Add wallet injection support\n const injectWalletBtn = document.getElementById(\"inject-wallet\");\n if (injectWalletBtn) {\n injectWalletBtn.addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_WALLET_EXPORT_BUNDLE\",\n value: document.getElementById(\"wallet-export-bundle\").value,\n organizationId: document.getElementById(\"wallet-organization-id\")\n .value,\n });\n },\n false\n );\n }\n}\n\n/**\n * Message Event Handlers to process messages from the parent frame\n */\nfunction initMessageEventListener(HpkeDecrypt) {\n return async function messageEventListener(event) {\n if (event.data && event.data[\"type\"] == \"INJECT_KEY_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"keyFormat\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"], // bundle\n event.data[\"keyFormat\"],\n event.data[\"address\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"INJECT_WALLET_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n undefined, // keyFormat - default to HEXADECIMAL\n undefined, // address - default to \"default\"\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"APPLY_SETTINGS\") {\n try {\n await onApplySettings(event.data[\"value\"], event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n TKHQ.onResetEmbeddedKey();\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString());\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_TRANSACTION\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignTransaction(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_MESSAGE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignMessage(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"CLEAR_EMBEDDED_PRIVATE_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onClearEmbeddedPrivateKey(\n event.data[\"requestId\"],\n event.data[\"address\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"GET_EMBEDDED_PUBLIC_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onGetPublicEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SET_EMBEDDED_KEY_OVERRIDE\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onSetEmbeddedKeyOverride(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_TO_DEFAULT_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n onResetToDefaultEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n };\n}\n\n/**\n * Set up event handlers for both DOM and message events\n * @param {Function} HpkeDecrypt\n */\nexport function initEventHandlers(HpkeDecrypt) {\n const messageEventListener = initMessageEventListener(HpkeDecrypt);\n\n // controllers to remove event listeners\n const messageListenerController = new AbortController();\n const turnkeyInitController = new AbortController();\n\n // Add DOM event listeners for standalone mode\n addDOMEventListeners();\n\n // Add window message listener for iframe mode\n window.addEventListener(\"message\", messageEventListener, {\n capture: false,\n signal: messageListenerController.signal,\n });\n\n // Guard to prevent concurrent channel establishment from multiple senders\n let channelEstablished = false;\n\n // Handle MessageChannel initialization for iframe communication\n window.addEventListener(\n \"message\",\n async function (event) {\n /**\n * @turnkey/iframe-stamper >= v2.1.0 is using a MessageChannel to communicate with the parent frame.\n * The parent frame sends a TURNKEY_INIT_MESSAGE_CHANNEL event with the MessagePort.\n * If we receive this event, we want to remove the message event listener that was added in the DOMContentLoaded event to avoid processing messages twice.\n * We persist the MessagePort so we can use it to communicate with the parent window in subsequent calls to TKHQ.sendMessageUp\n */\n if (\n event.data &&\n event.data[\"type\"] == \"TURNKEY_INIT_MESSAGE_CHANNEL\" &&\n event.ports?.[0]\n ) {\n // Synchronously check-and-set the flag before any await. This prevents\n // a second concurrent invocation from racing through while the first is\n // suspended at an await, which would allow multiple origins to establish\n // a channel before turnkeyInitController.abort() is reached.\n if (channelEstablished) {\n return;\n }\n channelEstablished = true;\n\n // remove the message event listener that was added in the DOMContentLoaded event\n messageListenerController.abort();\n\n const iframeMessagePort = event.ports[0];\n iframeMessagePort.onmessage = messageEventListener;\n\n TKHQ.setParentFrameMessageChannelPort(iframeMessagePort);\n\n await TKHQ.initEmbeddedKey(event.origin);\n var embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n var targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n var targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n\n // remove the listener for TURNKEY_INIT_MESSAGE_CHANNEL after it's been processed\n turnkeyInitController.abort();\n }\n },\n { signal: turnkeyInitController.signal }\n );\n\n return { messageEventListener };\n}\n/**\n * Expose internal handlers for targeted testing.\n */\nexport {\n onInjectKeyBundle,\n onSignTransaction,\n onSignMessage,\n onClearEmbeddedPrivateKey,\n onSetEmbeddedKeyOverride,\n onResetToDefaultEmbeddedKey,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n","// This file is the main entrypoint of the webpack-bundled application\n\n// Import relevant modules\nimport { TKHQ } from \"./turnkey-core.js\";\nimport { initEventHandlers } from \"./event-handlers.js\";\nimport { HpkeDecrypt } from \"@shared/crypto-utils.js\";\nimport \"./styles.css\";\n\n// Surface TKHQ for external access\nwindow.TKHQ = TKHQ;\n\n// Init app\ndocument.addEventListener(\"DOMContentLoaded\", async function () {\n await TKHQ.initEmbeddedKey();\n const embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n initEventHandlers(HpkeDecrypt);\n\n // If styles are saved in local storage, sanitize and apply them\n const styleSettings = TKHQ.getSettings();\n if (styleSettings) {\n TKHQ.applySettings(styleSettings);\n }\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n});\n","module.exports = crypto;","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\tid: moduleId,\n\t\tloaded: false,\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId].call(module.exports, module, module.exports, __webpack_require__);\n\n\t// Flag the module as loaded\n\tmodule.loaded = true;\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n","// getDefaultExport function for compatibility with non-harmony modules\n__webpack_require__.n = (module) => {\n\tvar getter = module && module.__esModule ?\n\t\t() => (module['default']) :\n\t\t() => (module);\n\t__webpack_require__.d(getter, { a: getter });\n\treturn getter;\n};","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"bundle.\" + {\"291\":\"3eaea85f4001b9cc63c3\",\"825\":\"aaba32bf7338e3d0f1cc\"}[chunkId] + \".js\";\n};","// This function allow to reference async chunks\n__webpack_require__.miniCssF = (chunkId) => {\n\t// return url for filenames based on template\n\treturn undefined;\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","// define __esModule on exports\n__webpack_require__.r = (exports) => {\n\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n\t}\n\tObject.defineProperty(exports, '__esModule', { value: true });\n};","__webpack_require__.nmd = (module) => {\n\tmodule.paths = [];\n\tif (!module.children) module.children = [];\n\treturn module;\n};","__webpack_require__.p = \"/\";","\n__webpack_require__.sriHashes = {\"291\":\"*-*-*-CHUNK-SRI-HASH-r3NPGwA4ft5fHgGXhVIptCiDVf06qPa+sxzG6L+8GwPuhn89e/\",\"825\":\"*-*-*-CHUNK-SRI-HASH-mfog3UJdGPOmSk4QZbKxsxHPFZtt298WnZNc1aQ1MCgc6YirFj\"};","// no baseURI\n\n// object to store loaded and loading chunks\n// undefined = chunk not loaded, null = chunk preloaded/prefetched\n// [resolve, reject, Promise] = chunk loading, 0 = chunk loaded\nvar installedChunks = {\n\t792: 0\n};\n\n__webpack_require__.f.j = (chunkId, promises) => {\n\t\t// JSONP chunk loading for javascript\n\t\tvar installedChunkData = __webpack_require__.o(installedChunks, chunkId) ? installedChunks[chunkId] : undefined;\n\t\tif(installedChunkData !== 0) { // 0 means \"already installed\".\n\n\t\t\t// a Promise means \"currently loading\".\n\t\t\tif(installedChunkData) {\n\t\t\t\tpromises.push(installedChunkData[2]);\n\t\t\t} else {\n\t\t\t\tif(true) { // all chunks have JS\n\t\t\t\t\t// setup Promise in chunk cache\n\t\t\t\t\tvar promise = new Promise((resolve, reject) => (installedChunkData = installedChunks[chunkId] = [resolve, reject]));\n\t\t\t\t\tpromises.push(installedChunkData[2] = promise);\n\n\t\t\t\t\t// start chunk loading\n\t\t\t\t\tvar url = __webpack_require__.p + __webpack_require__.u(chunkId);\n\t\t\t\t\t// create error before stack unwound to get useful stacktrace later\n\t\t\t\t\tvar error = new Error();\n\t\t\t\t\tvar loadingEnded = (event) => {\n\t\t\t\t\t\tif(__webpack_require__.o(installedChunks, chunkId)) {\n\t\t\t\t\t\t\tinstalledChunkData = installedChunks[chunkId];\n\t\t\t\t\t\t\tif(installedChunkData !== 0) installedChunks[chunkId] = undefined;\n\t\t\t\t\t\t\tif(installedChunkData) {\n\t\t\t\t\t\t\t\tvar errorType = event && (event.type === 'load' ? 'missing' : event.type);\n\t\t\t\t\t\t\t\tvar realSrc = event && event.target && event.target.src;\n\t\t\t\t\t\t\t\terror.message = 'Loading chunk ' + chunkId + ' failed.\\n(' + errorType + ': ' + realSrc + ')';\n\t\t\t\t\t\t\t\terror.name = 'ChunkLoadError';\n\t\t\t\t\t\t\t\terror.type = errorType;\n\t\t\t\t\t\t\t\terror.request = realSrc;\n\t\t\t\t\t\t\t\tinstalledChunkData[1](error);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t};\n\t\t\t\t\t__webpack_require__.l(url, loadingEnded, \"chunk-\" + chunkId, chunkId);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n};\n\n// no prefetching\n\n// no preloaded\n\n// no HMR\n\n// no HMR manifest\n\n__webpack_require__.O.j = (chunkId) => (installedChunks[chunkId] === 0);\n\n// install a JSONP callback for chunk loading\nvar webpackJsonpCallback = (parentChunkLoadingFunction, data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\t// add \"moreModules\" to the modules object,\n\t// then flag all \"chunkIds\" as loaded and fire callback\n\tvar moduleId, chunkId, i = 0;\n\tif(chunkIds.some((id) => (installedChunks[id] !== 0))) {\n\t\tfor(moduleId in moreModules) {\n\t\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t\t}\n\t\t}\n\t\tif(runtime) var result = runtime(__webpack_require__);\n\t}\n\tif(parentChunkLoadingFunction) parentChunkLoadingFunction(data);\n\tfor(;i < chunkIds.length; i++) {\n\t\tchunkId = chunkIds[i];\n\t\tif(__webpack_require__.o(installedChunks, chunkId) && installedChunks[chunkId]) {\n\t\t\tinstalledChunks[chunkId][0]();\n\t\t}\n\t\tinstalledChunks[chunkId] = 0;\n\t}\n\treturn __webpack_require__.O(result);\n}\n\nvar chunkLoadingGlobal = self[\"webpackChunkexport_and_sign\"] = self[\"webpackChunkexport_and_sign\"] || [];\nchunkLoadingGlobal.forEach(webpackJsonpCallback.bind(null, 0));\nchunkLoadingGlobal.push = webpackJsonpCallback.bind(null, chunkLoadingGlobal.push.bind(chunkLoadingGlobal));","// startup\n// Load entry module and return exports\n// This entry module depends on other loaded chunks and execution need to be delayed\nvar __webpack_exports__ = __webpack_require__.O(undefined, [96], () => (__webpack_require__(560)))\n__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n"],"names":["deferred","leafPrototypes","getProto","inProgress","dataWebpackPrefix","e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","getSubtleCrypto","globalThis","crypto","subtle","window","global","isDoublyIframed","undefined","location","ancestorOrigins","parent","top","_loadQuorumKey","_callee","quorumPublic","_context","Error","importKey","namedCurve","_initEmbeddedKey","_callee3","_context3","getEmbeddedKey","generateTargetKey","setEmbeddedKey","_generateTargetKey","_callee4","p256key","_context4","generateKey","exportKey","privateKey","jwtKey","getItemWithExpiry","JSON","parse","targetKey","setItemWithExpiry","stringify","key","ttl","item","expiry","Date","getTime","localStorage","setItem","itemStr","getItem","hasOwnProperty","removeItem","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","concat","logMessage","content","messageLog","document","getElementById","message","createElement","innerText","appendChild","p256JWKPrivateToPublic","_x6","_p256JWKPrivateToPublic","_callee6","jwkPrivate","jwkPrivateCopy","publicKey","_context6","_objectSpread","key_ops","base58Encode","bytes","result","digits","carry","j","push","k","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","currentByte","reverse","_encodeKey","_callee9","privateKeyBytes","keyFormat","publicKeyBytes","concatenatedBytes","_t2","_context9","set","console","warn","sharedInitEmbeddedKey","SharedTKHQ","validateStyles","styles","validStyles","cssValidationRegex","padding","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","next","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","loadQuorumKey","_x","_verifyEnclaveSignature","_callee2","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","meta","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context2","prod","preprod","querySelector","__TURNKEY_SIGNER_ENVIRONMENT__","fromDerSignature","verify","hash","TKHQ","initEmbeddedKey","onResetEmbeddedKey","encodeKey","_x0","_x1","_x10","sendMessageUp","type","requestId","postMessage","setParentFrameMessageChannelPort","port","normalizePadding","byteArray","targetLength","paddingLength","fill","expectedZeroCount","zeroCount","verifyEnclaveSignature","_x2","_x3","getEd25519PublicKey","privateKeyHex","nobleEd25519","sha512Sync","_nobleEd25519$etc","nobleHashes","concatBytes","applySettings","settings","validSettings","settingsObj","keyDivTextarea","style","getSettings","setSettings","parsePrivateKey","error","timingSafeEqual","b","enc","TextEncoder","aBuf","encode","bBuf","diff","_slicedToArray","inMemoryKeys","injectedEmbeddedKey","textEncoder","textDecoder","TextDecoder","zeroKeyEntry","keyEntry","keypair","secretKey","verifyAndParseBundleData","_verifyAndParseBundleData","_callee8","bundle","organizationId","bundleObj","_context8","version","data","dataSignature","decode","encappedPublic","ciphertext","decryptBundle","_x4","_x5","_decryptBundle","HpkeDecrypt","encappedKeyBuf","ciphertextBuf","receiverPrivJwk","_t9","onGetPublicEmbeddedKey","_onGetPublicEmbeddedKey","_callee0","embeddedKeyJwk","targetPubBuf","targetPubHex","_context0","loadKeyIntoMemory","_x7","_x8","_x9","_loadKeyIntoMemory","_callee1","address","keyBytes","keyAddress","cachedKeypair","_context1","subarray","Keypair","fromSecretKey","createSolanaKeypair","format","onInjectKeyBundle","_x11","_x12","_x13","_x14","_onInjectKeyBundle","_callee10","_context10","onApplySettings","_x15","_x16","_onApplySettings","_callee11","_context11","onSignTransaction","_x17","_x18","_x19","_onSignTransaction","_callee12","serializedTransaction","transactionWrapper","transactionToSign","signedTransaction","transactionBytes","transaction","signedTransactionHex","_context12","validateKey","getOrCreateKeypair","VersionedTransaction","deserialize","sign","serialize","onSignMessage","_x20","_x21","_x22","_onSignMessage","_callee13","serializedMessage","messageWrapper","messageToSign","messageType","messageBytes","signatureHex","signature","_context13","onClearEmbeddedPrivateKey","_x23","_x24","_onClearEmbeddedPrivateKey","_callee14","_i3","_Object$keys","_context14","keys","onSetEmbeddedKeyOverride","_x25","_x26","_x27","_x28","_onSetEmbeddedKeyOverride","_callee15","decrypted","keyJwk","_t0","_context15","rawP256PrivateKeyToJwk","onResetToDefaultEmbeddedKey","_x29","_createSolanaKeypair","_callee16","_context16","fromSeed","_x30","_rawP256PrivateKeyToJwk","_callee17","rawPrivateKeyBytes","pkcs8Prefix","pkcs8","cryptoKey","_context17","clearExpiredKey","now","addressesToRemove","_i","_Object$entries","_Object$entries$_i","_i2","_addressesToRemove","clearAllExpiredKeys","getKeyNotFoundErrorMessage","_x31","_getOrCreateKeypair","_callee18","_context18","initEventHandlers","messageEventListener","_messageEventListener","event","_t","_t3","_t4","_t5","_t6","_t7","_t8","_x37","initMessageEventListener","messageListenerController","AbortController","turnkeyInitController","addEventListener","preventDefault","_x32","_x33","_ref3","_x34","_ref4","_x35","injectWalletBtn","_ref5","_callee5","_context5","_x36","addDOMEventListeners","capture","signal","channelEstablished","_ref6","_callee7","_event$ports","iframeMessagePort","_context7","ports","abort","onmessage","origin","_x38","ownKeys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","_defineProperty","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","_HpkeDecrypt","kemContext","receiverPriv","suite","recipientCtx","aad","res","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createRecipientContext","recipientKey","info","open","styleSettings","module","exports","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","id","loaded","__webpack_modules__","O","chunkIds","fn","priority","notFulfilled","Infinity","fulfilled","every","splice","getter","__esModule","obj","mode","this","ns","def","current","getOwnPropertyNames","definition","get","chunkId","all","reduce","promises","miniCssF","g","Function","prop","url","script","needAttach","scripts","getElementsByTagName","getAttribute","charset","nc","setAttribute","src","crossOrigin","integrity","sriHashes","onScriptComplete","prev","onerror","onload","clearTimeout","timeout","doneFns","parentNode","removeChild","setTimeout","target","head","nmd","paths","children","installedChunks","installedChunkData","promise","reject","errorType","realSrc","request","webpackJsonpCallback","parentChunkLoadingFunction","moreModules","runtime","some","chunkLoadingGlobal","self","__webpack_exports__"],"sourceRoot":""} \ No newline at end of file diff --git a/export-and-sign/dist/bundle.539e9a91965e314c7b7e.js b/export-and-sign/dist/bundle.539e9a91965e314c7b7e.js deleted file mode 100644 index 68e0afb..0000000 --- a/export-and-sign/dist/bundle.539e9a91965e314c7b7e.js +++ /dev/null @@ -1,3 +0,0 @@ -/*! For license information please see bundle.539e9a91965e314c7b7e.js.LICENSE.txt */ -(()=>{var e,t,r,n,a,o={560:(e,t,r)=>{"use strict";var n=r(598),a=r(443),o=r(566);function i(e){return i="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},i(e)}function c(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function u(e){for(var t=1;t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var d=[][n]?t(t([][n]())):(l(t={},n,function(){return this}),t),p=s.prototype=c.prototype=Object.create(d);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,l(e,a,"GeneratorFunction")),e.prototype=Object.create(p),e}return u.prototype=s,l(p,"constructor",s),l(s,"constructor",u),u.displayName="GeneratorFunction",l(s,a,"GeneratorFunction"),l(p),l(p,a,"Generator"),l(p,n,function(){return this}),l(p,"toString",function(){return"[object Generator]"}),(f=function(){return{w:o,m:y}})()}function l(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}l=function(e,t,r,n){function o(t,r){l(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},l(e,t,r,n)}function d(e){return function(e){if(Array.isArray(e))return y(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||p(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function p(e,t){if(e){if("string"==typeof e)return y(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?y(e,t):void 0}}function y(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r1:window.parent!==window.top}function S(){return(S=b(f().m(function e(t){var r;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,r.importKey("raw",t,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function O(){return(O=b(f().m(function e(){return f().w(function(e){for(;;)switch(e.n){case 0:if(!E()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,P();case 2:if(null!==e.v){e.n=4;break}return e.n=3,k();case 3:_(e.v);case 4:return e.a(2)}},e)}))).apply(this,arguments)}function k(){return j.apply(this,arguments)}function j(){return(j=b(f().m(function e(){var t,r;return f().w(function(e){for(;;)switch(e.n){case 0:if(t=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,t.generateKey({name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return r=e.v,e.n=3,t.exportKey("jwk",r.privateKey);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function P(){var e=T(m);return e?JSON.parse(e):null}function _(e){x(m,JSON.stringify(e),1728e5)}function x(e,t,r){var n={value:t,expiry:(new Date).getTime()+r};window.localStorage.setItem(e,JSON.stringify(n))}function T(e){var t=window.localStorage.getItem(e);if(!t)return null;var r=JSON.parse(t);return Object.prototype.hasOwnProperty.call(r,"expiry")&&Object.prototype.hasOwnProperty.call(r,"value")?(new Date).getTime()>r.expiry?(window.localStorage.removeItem(e),null):r.value:(window.localStorage.removeItem(e),null)}function I(e){if(!e||"string"!=typeof e)throw new Error("cannot create uint8array from invalid hex string");var t=e.startsWith("0x")||e.startsWith("0X")?e.slice(2):e;if(t.length%2!=0||!/^[0-9A-Fa-f]+$/.test(t))throw new Error("cannot create uint8array from invalid hex string");return new Uint8Array(t.match(/../g).map(function(e){return parseInt(e,16)}))}function A(e){return d(e).map(function(e){return e.toString(16).padStart(2,"0")}).join("")}function D(e,t){var r=Array.from(new Uint8Array(e)),n=Array.from(new Uint8Array(t));return new Uint8Array([].concat(r,n))}function R(e){var t=document.getElementById("message-log");if(t){var r=document.createElement("p");r.innerText=e,t.appendChild(r)}}function N(e){return M.apply(this,arguments)}function M(){return(M=b(f().m(function e(t){var r,n,a,o;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return delete(n=u({},t)).d,n.key_ops=["verify"],e.n=2,r.importKey("jwk",n,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return a=e.v,e.n=3,r.exportKey("raw",a);case 3:return o=e.v,e.a(2,new Uint8Array(o))}},e)}))).apply(this,arguments)}function K(e){for(var t="",r=[0],n=0;n0;)r.push(a%58),a=a/58|0}for(var i=0;i0;){var c=r[i];o=(c=void 0===c?o:58*c+o)>>8,r[i]=c%256,i++}}var u=n.concat(r.reverse());return new Uint8Array(u)}function C(){return(C=b(f().m(function e(t,r,n){var a,o;return f().w(function(e){for(;;)switch(e.n){case 0:o=r,e.n="SOLANA"===o?1:"HEXADECIMAL"===o?5:6;break;case 1:if(n){e.n=2;break}throw new Error("public key must be specified for SOLANA key format");case 2:if(32===t.length){e.n=3;break}throw new Error("invalid private key length. Expected 32 bytes. Got ".concat(t.length,"."));case 3:if(32===n.length){e.n=4;break}throw new Error("invalid public key length. Expected 32 bytes. Got ".concat(n.length,"."));case 4:return(a=new Uint8Array(64)).set(t,0),a.set(n,32),e.a(2,K(a));case 5:return e.a(2,"0x"+A(t));case 6:return console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),e.a(2,"0x"+A(t));case 7:return e.a(2)}},e)}))).apply(this,arguments)}function G(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",a=r.toStringTag||"@@toStringTag";function o(r,n,a,o){var u=n&&n.prototype instanceof c?n:c,s=Object.create(u.prototype);return B(s,"_invoke",function(r,n,a){var o,c,u,s=0,f=a||[],l=!1,d={p:0,n:0,v:e,a:p,f:p.bind(e,4),d:function(t,r){return o=t,c=0,u=e,d.n=r,i}};function p(r,n){for(c=r,u=n,t=0;!l&&s&&!a&&t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(B(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,B(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,B(l,"constructor",s),B(s,"constructor",u),u.displayName="GeneratorFunction",B(s,a,"GeneratorFunction"),B(l),B(l,a,"Generator"),B(l,n,function(){return this}),B(l,"toString",function(){return"[object Generator]"}),(G=function(){return{w:o,m:d}})()}function B(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}B=function(e,t,r,n){function o(t,r){B(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},B(e,t,r,n)}function L(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var t,a,o=(a=2,function(e){if(Array.isArray(e))return e}(t=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,a,o,i,c=[],u=!0,s=!1;try{if(o=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=o.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,a=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw a}}return c}}(t,a)||p(t,a)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=o[0],c=o[1],u=i.trim();if(0===u.length)throw new Error("css style property cannot be empty");var s=n[u];if(!s)throw new Error('invalid or unsupported css style property: "'.concat(u,'"'));var f=new RegExp(s),l=c.trim();if(0==l.length)throw new Error('css style for "'.concat(u,'" is empty'));if(!f.test(l))throw new Error('invalid css style value for property "'.concat(u,'"'));r[u]=l}),r},$=E,W=function(e){return S.apply(this,arguments)};function X(){return(X=H(G().m(function e(){return G().w(function(e){for(;;)switch(e.n){case 0:if(!$()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,Y();case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function Q(){return(Q=H(G().m(function e(t,r,n){var a,i,c,u,s,f,l,d;return G().w(function(e){for(;;)switch(e.n){case 0:if(a={prod:"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569",preprod:"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212"},i=null,"undefined"!=typeof document&&(c=document.querySelector('meta[name="turnkey-signer-environment"]'))&&c.content&&"__TURNKEY_SIGNER_ENVIRONMENT__"!==c.content&&(i=c.content),i||"undefined"==typeof window||(i=window.__TURNKEY_SIGNER_ENVIRONMENT__),void 0!==(u=a[i])){e.n=1;break}throw new Error("Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined");case 1:if(t===u){e.n=2;break}throw new Error("enclave quorum public keys from client and bundle do not match. Client: ".concat(u,". Bundle: ").concat(t,"."));case 2:return s=new Uint8Array(q(u)),e.n=3,W(s);case 3:if(f=e.v){e.n=4;break}throw new Error("failed to load quorum key");case 4:return l=(0,o.g8)(r),d=q(n),e.n=5,crypto.subtle.verify({name:"ECDSA",hash:"SHA-256"},f,l,d);case 5:return e.a(2,e.v)}},e)}))).apply(this,arguments)}var V={initEmbeddedKey:function(){return X.apply(this,arguments)},generateTargetKey:k,setItemWithExpiry:x,getItemWithExpiry:T,getEmbeddedKey:P,setEmbeddedKey:_,onResetEmbeddedKey:function(){window.localStorage.removeItem(m),window.localStorage.removeItem("TURNKEY_EMBEDDED_KEY_ORIGIN")},p256JWKPrivateToPublic:N,base58Encode:K,base58Decode:U,encodeKey:function(e,t,r){return C.apply(this,arguments)},sendMessageUp:function(e,t,r){var n={type:e,value:t};r&&(n.requestId=r),h?h.postMessage(n):window.parent!==window&&window.parent.postMessage({type:e,value:t},"*"),R("⬆️ Sent message ".concat(e,": ").concat(t))},logMessage:R,uint8arrayFromHexString:q,uint8arrayToHexString:A,setParentFrameMessageChannelPort:function(e){h=e},normalizePadding:function(e,t){var r=t-e.length;if(r>0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(d(n),d(e)))}if(r<0){for(var a=-1*r,o=0,i=0;i3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(oe(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,oe(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,oe(l,"constructor",s),oe(s,"constructor",u),u.displayName="GeneratorFunction",oe(s,a,"GeneratorFunction"),oe(l),oe(l,a,"Generator"),oe(l,n,function(){return this}),oe(l,"toString",function(){return"[object Generator]"}),(ae=function(){return{w:o,m:d}})()}function oe(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}oe=function(e,t,r,n){function o(t,r){oe(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},oe(e,t,r,n)}function ie(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,a,o,i,c=[],u=!0,s=!1;try{if(o=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=o.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,a=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw a}}return c}}(e,t)||function(e,t){if(e){if("string"==typeof e)return ce(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?ce(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function ce(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r= v2.0.0 to pass "organizationId" for security purposes.');case 8:if(a.organizationId&&a.organizationId===r){e.n=9;break}throw new Error("organization id does not match expected value. Expected: ".concat(r,". Found: ").concat(a.organizationId,"."));case 9:if(a.encappedPublic){e.n=10;break}throw new Error('missing "encappedPublic" in bundle signed data');case 10:if(a.ciphertext){e.n=11;break}throw new Error('missing "ciphertext" in bundle signed data');case 11:return e.a(2,a)}},e)}))).apply(this,arguments)}function be(e,t,r){return me.apply(this,arguments)}function me(){return me=se(ae().m(function e(t,r,n){var a,o,i,c,u;return ae().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,ye(t,r);case 1:if(a=e.v,o=V.uint8arrayFromHexString(a.encappedPublic),i=V.uint8arrayFromHexString(a.ciphertext),u=le){e.n=3;break}return e.n=2,V.getEmbeddedKey();case 2:u=e.v;case 3:return c=u,e.n=4,n({ciphertextBuf:i,encappedKeyBuf:o,receiverPrivJwk:c});case 4:return e.a(2,e.v)}},e)})),me.apply(this,arguments)}function ge(e){return he.apply(this,arguments)}function he(){return(he=se(ae().m(function e(t){var r,n,a;return ae().w(function(e){for(;;)switch(e.n){case 0:if(r=V.getEmbeddedKey()){e.n=1;break}return V.sendMessageUp("EMBEDDED_PUBLIC_KEY","",t),e.a(2);case 1:return e.n=2,V.p256JWKPrivateToPublic(r);case 2:n=e.v,a=V.uint8arrayToHexString(n),V.sendMessageUp("EMBEDDED_PUBLIC_KEY",a,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function we(e,t,r,n){return Ee.apply(this,arguments)}function Ee(){return(Ee=se(ae().m(function e(t,r,n,a){var o,i,c,u,s,f;return ae().w(function(e){for(;;)switch(e.n){case 0:if(i=new Uint8Array(r),"SOLANA"!==n){e.n=2;break}return c=V.uint8arrayToHexString(i.subarray(0,32)),u=V.getEd25519PublicKey(c),e.n=1,V.encodeKey(i,n,u);case 1:o=e.v,e.n=4;break;case 2:return e.n=3,V.encodeKey(i,n);case 3:o=e.v;case 4:if(s=t||"default","SOLANA"!==n){e.n=5;break}f=Z.AX.fromSecretKey(V.base58Decode(o)),e.n=7;break;case 5:if("HEXADECIMAL"!==n){e.n=7;break}return e.n=6,Me(Array.from(V.uint8arrayFromHexString(o)));case 6:f=e.v;case 7:fe=re(re({},fe),{},ne({},s,{organizationId:a,privateKey:o,format:n,expiry:(new Date).getTime()+864e5,keypair:f}));case 8:return e.a(2)}},e)}))).apply(this,arguments)}function Se(e,t,r,n,a,o){return Oe.apply(this,arguments)}function Oe(){return Oe=se(ae().m(function e(t,r,n,a,o,i){var c;return ae().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,be(n,r,i);case 1:return c=e.v,e.n=2,we(o,c,a,r);case 2:V.sendMessageUp("BUNDLE_INJECTED",!0,t);case 3:return e.a(2)}},e)})),Oe.apply(this,arguments)}function ke(e,t){return je.apply(this,arguments)}function je(){return(je=se(ae().m(function e(t,r){var n;return ae().w(function(e){for(;;)switch(e.n){case 0:n=V.applySettings(t),V.setSettings(n),V.sendMessageUp("SETTINGS_APPLIED",!0,r);case 1:return e.a(2)}},e)}))).apply(this,arguments)}function Pe(e,t,r){return _e.apply(this,arguments)}function _e(){return(_e=se(ae().m(function e(t,r,n){var a,o,i,c,u,s,f,l,d;return ae().w(function(e){for(;;)switch(e.n){case 0:if(Be(o=fe[a=n||"default"],a)){e.n=1;break}return e.a(2);case 1:return e.n=2,Le(o);case 2:if(i=e.v,c=JSON.parse(r),u=c.transaction,"SOLANA"!==c.type){e.n=3;break}f=V.uint8arrayFromHexString(u),(l=Z.Kt.deserialize(f)).sign([i]),s=l.serialize(),e.n=4;break;case 3:throw new Error("unsupported transaction type");case 4:d=V.uint8arrayToHexString(s),V.sendMessageUp("TRANSACTION_SIGNED",d,t);case 5:return e.a(2)}},e)}))).apply(this,arguments)}function xe(e,t,r){return Te.apply(this,arguments)}function Te(){return Te=se(ae().m(function e(t,r,o){var i,c,u,s,f,l,d,p,y,v;return ae().w(function(e){for(;;)switch(e.n){case 0:if(Be(c=fe[i=o||"default"],i)){e.n=1;break}return e.a(2);case 1:return u=JSON.parse(r),s=u.message,f=u.type,l=de.encode(s),e.n=2,Le(c);case 2:if(p=e.v,"SOLANA"!==f){e.n=3;break}n.jn.sha512Sync=function(){var e;return a.Zf((e=n.jn).concatBytes.apply(e,arguments))},y=p.secretKey.slice(0,32),v=n._S(l,y),d=V.uint8arrayToHexString(v),e.n=4;break;case 3:return V.sendMessageUp("ERROR","unsupported message type",t),e.a(2);case 4:V.sendMessageUp("MESSAGE_SIGNED",d,t);case 5:return e.a(2)}},e)})),Te.apply(this,arguments)}function Ie(e,t){return Ae.apply(this,arguments)}function Ae(){return(Ae=se(ae().m(function e(t,r){return ae().w(function(e){for(;;)switch(e.n){case 0:if(r){e.n=1;break}return fe={},V.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED",!0,t),e.a(2);case 1:if(fe[r]){e.n=2;break}return V.sendMessageUp("ERROR",new Error("key not found for address ".concat(r,". Note that address is case sensitive.")).toString(),t),e.a(2);case 2:delete fe[r],V.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED",!0,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function De(e,t,r,n){return Re.apply(this,arguments)}function Re(){return Re=se(ae().m(function e(t,r,n,a){var o,i;return ae().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,be(n,r,a);case 1:return o=e.v,e.n=2,Ue(new Uint8Array(o));case 2:i=e.v,le=i,V.sendMessageUp("EMBEDDED_KEY_OVERRIDE_SET",!0,t);case 3:return e.a(2)}},e)})),Re.apply(this,arguments)}function Ne(e){le=null,V.sendMessageUp("RESET_TO_DEFAULT_EMBEDDED_KEY",!0,e)}function Me(e){return Ke.apply(this,arguments)}function Ke(){return(Ke=se(ae().m(function e(t){var r,n;return ae().w(function(e){for(;;)switch(e.n){case 0:if(32!==(r=V.parsePrivateKey(t)).length){e.n=1;break}n=Z.AX.fromSeed(r),e.n=3;break;case 1:if(64!==r.length){e.n=2;break}n=Z.AX.fromSecretKey(r),e.n=3;break;case 2:throw new Error("Invalid private key length: ".concat(r.length,". Expected 32 or 64 bytes."));case 3:return e.a(2,n)}},e)}))).apply(this,arguments)}function Ue(e){return Ce.apply(this,arguments)}function Ce(){return(Ce=se(ae().m(function e(t){var r,n,a;return ae().w(function(e){for(;;)switch(e.n){case 0:if(32===t.length){e.n=1;break}throw new Error("invalid decryption key length: expected 32 bytes, got ".concat(t.length));case 1:return r=new Uint8Array([48,65,2,1,0,48,19,6,7,42,134,72,206,61,2,1,6,8,42,134,72,206,61,3,1,7,4,39,48,37,2,1,1,4,32]),(n=new Uint8Array(r.length+32)).set(r),n.set(t,r.length),e.n=2,crypto.subtle.importKey("pkcs8",n,{name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return a=e.v,e.n=3,crypto.subtle.exportKey("jwk",a);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function Ge(e){fe[e]&&delete fe[e]}function Be(e,t){if(!e)throw new Error("key bytes not found. Please re-inject export bundle for address ".concat(t," into iframe. Note that address is case sensitive.")).toString();if((new Date).getTime()>=e.expiry)throw function(){for(var e=(new Date).getTime(),t=[],r=0,n=Object.entries(fe);r=i.expiry&&t.push(o)}for(var c=0,u=t;c3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(Je(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,Je(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,Je(l,"constructor",s),Je(s,"constructor",u),u.displayName="GeneratorFunction",Je(s,a,"GeneratorFunction"),Je(l),Je(l,a,"Generator"),Je(l,n,function(){return this}),Je(l,"toString",function(){return"[object Generator]"}),(ze=function(){return{w:o,m:d}})()}function Je(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}Je=function(e,t,r,n){function o(t,r){Je(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},Je(e,t,r,n)}function $e(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function We(e){for(var t=1;t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(rt(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,rt(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,rt(l,"constructor",s),rt(s,"constructor",u),u.displayName="GeneratorFunction",rt(s,a,"GeneratorFunction"),rt(l),rt(l,a,"Generator"),rt(l,n,function(){return this}),rt(l,"toString",function(){return"[object Generator]"}),(tt=function(){return{w:o,m:d}})()}function rt(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}rt=function(e,t,r,n){function o(t,r){rt(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},rt(e,t,r,n)}function nt(e,t,r,n,a,o,i){try{var c=e[o](i),u=c.value}catch(e){return void r(e)}c.done?t(u):Promise.resolve(u).then(n,a)}function at(e){return function(){var t=this,r=arguments;return new Promise(function(n,a){var o=e.apply(t,r);function i(e){nt(o,n,a,i,c,"next",e)}function c(e){nt(o,n,a,i,c,"throw",e)}i(void 0)})}}window.TKHQ=V,document.addEventListener("DOMContentLoaded",at(tt().m(function e(){var t,r,n,a;return tt().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,V.initEmbeddedKey();case 1:return e.n=2,V.getEmbeddedKey();case 2:return t=e.v,e.n=3,V.p256JWKPrivateToPublic(t);case 3:r=e.v,n=V.uint8arrayToHexString(r),document.getElementById("embedded-key").value=n,He(Ze),(a=V.getSettings())&&V.applySettings(a),V.sendMessageUp("PUBLIC_KEY_READY",n);case 4:return e.a(2)}},e)})))},790:()=>{},846:e=>{"use strict";e.exports=crypto}},i={};function c(e){var t=i[e];if(void 0!==t)return t.exports;var r=i[e]={id:e,loaded:!1,exports:{}};return o[e].call(r.exports,r,r.exports,c),r.loaded=!0,r.exports}c.m=o,e=[],c.O=(t,r,n,a)=>{if(!r){var o=1/0;for(f=0;f=a)&&Object.keys(c.O).every(e=>c.O[e](r[u]))?r.splice(u--,1):(i=!1,a0&&e[f-1][2]>a;f--)e[f]=e[f-1];e[f]=[r,n,a]},c.n=e=>{var t=e&&e.__esModule?()=>e.default:()=>e;return c.d(t,{a:t}),t},r=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,c.t=function(e,n){if(1&n&&(e=this(e)),8&n)return e;if("object"==typeof e&&e){if(4&n&&e.__esModule)return e;if(16&n&&"function"==typeof e.then)return e}var a=Object.create(null);c.r(a);var o={};t=t||[null,r({}),r([]),r(r)];for(var i=2&n&&e;("object"==typeof i||"function"==typeof i)&&!~t.indexOf(i);i=r(i))Object.getOwnPropertyNames(i).forEach(t=>o[t]=()=>e[t]);return o.default=()=>e,c.d(a,o),a},c.d=(e,t)=>{for(var r in t)c.o(t,r)&&!c.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},c.f={},c.e=e=>Promise.all(Object.keys(c.f).reduce((t,r)=>(c.f[r](e,t),t),[])),c.u=e=>"bundle."+{291:"3eaea85f4001b9cc63c3",825:"aaba32bf7338e3d0f1cc"}[e]+".js",c.miniCssF=e=>{},c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),c.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),n={},a="export-and-sign:",c.l=(e,t,r,o)=>{if(n[e])n[e].push(t);else{var i,u;if(void 0!==r)for(var s=document.getElementsByTagName("script"),f=0;f{i.onerror=i.onload=null,clearTimeout(p);var a=n[e];if(delete n[e],i.parentNode&&i.parentNode.removeChild(i),a&&a.forEach(e=>e(r)),t)return t(r)},p=setTimeout(d.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=d.bind(null,i.onerror),i.onload=d.bind(null,i.onload),u&&document.head.appendChild(i)}},c.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},c.nmd=e=>(e.paths=[],e.children||(e.children=[]),e),c.p="/",c.sriHashes={291:"sha384-G5pDFEAG9UZITbluyje/R/rWohZTUJf+Vu3ZIh0rsnLFLTw3SP/ca/XVNZVtv48f",825:"sha384-R9OIdd42i5GcdtZiHJuQgIUVvqyqJ0s7eaBnJHAfGllpi4YwbF7NSkjIRwOPUtsP"},(()=>{var e={792:0};c.f.j=(t,r)=>{var n=c.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var a=new Promise((r,a)=>n=e[t]=[r,a]);r.push(n[2]=a);var o=c.p+c.u(t),i=new Error;c.l(o,r=>{if(c.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var a=r&&("load"===r.type?"missing":r.type),o=r&&r.target&&r.target.src;i.message="Loading chunk "+t+" failed.\n("+a+": "+o+")",i.name="ChunkLoadError",i.type=a,i.request=o,n[1](i)}},"chunk-"+t,t)}},c.O.j=t=>0===e[t];var t=(t,r)=>{var n,a,[o,i,u]=r,s=0;if(o.some(t=>0!==e[t])){for(n in i)c.o(i,n)&&(c.m[n]=i[n]);if(u)var f=u(c)}for(t&&t(r);sc(560));u=c.O(u)})(); -//# sourceMappingURL=bundle.539e9a91965e314c7b7e.js.map \ No newline at end of file diff --git a/export-and-sign/dist/bundle.539e9a91965e314c7b7e.js.map b/export-and-sign/dist/bundle.539e9a91965e314c7b7e.js.map deleted file mode 100644 index 7e561ec..0000000 --- a/export-and-sign/dist/bundle.539e9a91965e314c7b7e.js.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"file":"bundle.539e9a91965e314c7b7e.js","mappings":";UAAIA,ECCAC,EADAC,ECAAC,EACAC,E,svCCAJ,IAAAC,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA1C,GAAA,gBAAAA,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAA6C,EAAA7C,EAAA,CAAA8C,CAAA9C,IAAA,SAAAA,GAAA,uBAAAC,QAAA,MAAAD,EAAAC,OAAAE,WAAA,MAAAH,EAAA,qBAAA2C,MAAAI,KAAA/C,EAAA,CAAAgD,CAAAhD,IAAAiD,EAAAjD,IAAA,qBAAAwB,UAAA,wIAAA0B,EAAA,UAAAD,EAAAjD,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,YAAA0B,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,M,OAOA,IAAME,EAAuB,uBAEvBC,EAAmB,mBAKrBC,EAAgC,KAMpC,SAASC,IACP,MAIwB,oBAAfC,YACPA,WAAWC,QACXD,WAAWC,OAAOC,OAEXF,WAAWC,OAAOC,OAEL,oBAAXC,QAA0BA,OAAOF,QAAUE,OAAOF,OAAOC,OAC3DC,OAAOF,OAAOC,YAED,IAAXE,EAAAA,GAA0BA,EAAAA,EAAOH,QAAUG,EAAAA,EAAOH,OAAOC,OAC3DE,EAAAA,EAAOH,OAAOC,OAED,oBAAXD,QAA0BA,OAAOC,OACnCD,OAAOC,OAGT,IACT,CAYA,SAASG,IACP,YAAwCC,IAApCH,OAAOI,SAASC,gBAGXL,OAAOI,SAASC,gBAAgBvD,OAAS,EAEzCkD,OAAOM,SAAWN,OAAOO,GAEpC,CAsBA,SAAAC,IAFC,OAEDA,EAAApB,EAAA1B,IAAAE,EAjBA,SAAA6C,EAA6BC,GAAY,IAAAX,EAAA,OAAArC,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACP,GAA1BqE,EAASH,IACF,CAAFe,EAAAjF,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAD,EAAAjF,EAAA,EAE3CqE,EAAOc,UAClB,MACAH,EACA,CACE5B,KAAM,QACNgC,WAAY,UAEd,EACA,CAAC,WACF,cAAAH,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACFnB,MAAA,KAAAD,UAAA,CAuCD,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAZA,SAAAoD,IAAA,OAAAtD,IAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,WACMwE,IAAmB,CAAFe,EAAAvF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAK,EAAAvF,EAAA,EAERwF,IAAgB,OAAzB,GACG,OADHD,EAAAvE,EACO,CAAAuE,EAAAvF,EAAA,eAAAuF,EAAAvF,EAAA,EACCyF,IAAmB,OAC3CC,EADeH,EAAAvE,GACW,cAAAuE,EAAAtE,EAAA,KAAAqE,EAAA,KAG7B1B,MAAA,KAAAD,UAAA,UAKc8B,IAAiB,OAAAE,EAAA/B,MAAC,KAADD,UAAA,CAiBhC,SAAAgC,IAFC,OAEDA,EAAAjC,EAAA1B,IAAAE,EAjBA,SAAA0D,IAAA,IAAAvB,EAAAwB,EAAA,OAAA7D,IAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACkC,GAA1BqE,EAASH,IACF,CAAF4B,EAAA9F,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAY,EAAA9F,EAAA,EAElCqE,EAAO0B,YAC3B,CACE3C,KAAM,OACNgC,WAAY,UAEd,EACA,CAAC,eACF,OAPY,OAAPS,EAAOC,EAAA9E,EAAA8E,EAAA9F,EAAG,EASHqE,EAAO2B,UAAU,MAAOH,EAAQI,YAAW,cAAAH,EAAA7E,EAAA,EAAA6E,EAAA9E,GAAA,EAAA4E,EAAA,KACzDhC,MAAA,KAAAD,UAAA,CAKD,SAAS6B,IACP,IAAMU,EAASC,EAAkBpC,GACjC,OAAOmC,EAASE,KAAKC,MAAMH,GAAU,IACvC,CAMA,SAASR,EAAeY,GACtBC,EACExC,EACAqC,KAAKI,UAAUF,GAjJwB,OAoJ3C,CA8DA,SAASC,EAAkBE,EAAKhF,EAAOiF,GACrC,IACMC,EAAO,CACXlF,MAAOA,EACPmF,QAHU,IAAIC,MAGFC,UAAYJ,GAE1BpC,OAAOyC,aAAaC,QAAQP,EAAKL,KAAKI,UAAUG,GAClD,CAQA,SAASR,EAAkBM,GACzB,IAAMQ,EAAU3C,OAAOyC,aAAaG,QAAQT,GAC5C,IAAKQ,EACH,OAAO,KAET,IAAMN,EAAOP,KAAKC,MAAMY,GACxB,OACGxG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,WAC3ClG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,UAKlC,IAAIE,MACRC,UAAYH,EAAKC,QACvBtC,OAAOyC,aAAaK,WAAWX,GACxB,MAEFE,EAAKlF,OARV6C,OAAOyC,aAAaK,WAAWX,GACxB,KAQX,CAOA,SAASY,EAAwBC,GAC/B,IAAKA,GAAkC,iBAAdA,EACvB,MAAM,IAAIpC,MAAM,oDAIlB,IAAMqC,EACJD,EAAUE,WAAW,OAASF,EAAUE,WAAW,MAC/CF,EAAUpE,MAAM,GAChBoE,EAGN,GAAIC,EAAiBnG,OAAS,GAAK,IADpB,iBACmCiC,KAAKkE,GACrD,MAAM,IAAIrC,MAAM,oDAElB,OAAO,IAAIuC,WACTF,EAAiBG,MAAM,OAAOC,IAAI,SAACC,GAAC,OAAKC,SAASD,EAAG,GAAG,GAE5D,CAOA,SAASE,EAAsBC,GAC7B,OAAOvF,EAAIuF,GAAQJ,IAAI,SAACK,GAAC,OAAKA,EAAE/E,SAAS,IAAIgF,SAAS,EAAG,IAAI,GAAEC,KAAK,GACtE,CAqCA,SAASC,EAAyBC,EAAcC,GAC9C,IAAMC,EAAI7F,MAAMI,KAAK,IAAI4E,WAAWW,IAC9BtI,EAAI2C,MAAMI,KAAK,IAAI4E,WAAWY,IACpC,OAAO,IAAIZ,WAAW,GAADc,OAAKD,EAAMxI,GAClC,CAmJA,SAAS0I,EAAWC,GAClB,IAAMC,EAAaC,SAASC,eAAe,eAC3C,GAAIF,EAAY,CACd,IAAMG,EAAUF,SAASG,cAAc,KACvCD,EAAQE,UAAYN,EACpBC,EAAWM,YAAYH,EACzB,CACF,CAEA,SAKeI,EAAsBC,GAAA,OAAAC,EAAAvF,MAAC,KAADD,UAAA,CAsBrC,SAAAwF,IAFC,OAEDA,EAAAzF,EAAA1B,IAAAE,EAtBA,SAAAkH,EAAsCC,GAAU,IAAAhF,EAAAiF,EAAAC,EAAAxB,EAAA,OAAA/F,IAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAAxJ,GAAA,OACd,GAA1BqE,EAASH,IACF,CAAFsF,EAAAxJ,EAAA,cACH,IAAIkF,MAAM,uCAAsC,OAMpB,cAH9BoE,EAAcG,EAAA,GAAQJ,IAENnI,EACtBoI,EAAeI,QAAU,CAAC,UAAUF,EAAAxJ,EAAA,EAEZqE,EAAOc,UAC7B,MACAmE,EACA,CAAElG,KAAM,QAASgC,WAAY,UAC7B,EACA,CAAC,WACF,OANc,OAATmE,EAASC,EAAAxI,EAAAwI,EAAAxJ,EAAG,EAOGqE,EAAO2B,UAAU,MAAOuD,GAAU,OAA3C,OAANxB,EAAMyB,EAAAxI,EAAAwI,EAAAvI,EAAA,EACL,IAAIwG,WAAWM,IAAO,EAAAqB,EAAA,KAC9BxF,MAAA,KAAAD,UAAA,CAOD,SAASgG,EAAaC,GAKpB,IAHA,IACIC,EAAS,GACTC,EAAS,CAAC,GACL1J,EAAI,EAAGA,EAAIwJ,EAAMxI,OAAQhB,IAAK,CAErC,IADA,IAAI2J,EAAQH,EAAMxJ,GACT4J,EAAI,EAAGA,EAAIF,EAAO1I,SAAU4I,EACnCD,GAASD,EAAOE,IAAM,EACtBF,EAAOE,GAAKD,EAAQ,GACpBA,EAASA,EAAQ,GAAM,EAGzB,KAAOA,EAAQ,GACbD,EAAOG,KAAKF,EAAQ,IACpBA,EAASA,EAAQ,GAAM,CAE3B,CAEA,IAAK,IAAIG,EAAI,EAAGA,EAAIJ,EAAO1I,OAAQ8I,IACjCL,EAlBe,6DAkBGC,EAAOI,IAAML,EAIjC,IAAK,IAAIzJ,EAAI,EAAgB,IAAbwJ,EAAMxJ,IAAYA,EAAIwJ,EAAMxI,OAAS,EAAGhB,IACtDyJ,EAAS,IAAMA,EAEjB,OAAOA,CACT,CAQA,SAASM,EAAa7B,GAKpB,IAHA,IAAI8B,EAAW,6DACXC,EAAe,GACfC,EAAe,GACVlK,EAAI,EAAGA,EAAIkI,EAAElH,OAAQhB,IAAK,CACjC,IAAgC,IAA5BgK,EAASG,QAAQjC,EAAElI,IACrB,MAAM,IAAI8E,MAAM,yBAADqD,OAA0BD,EAAElI,GAAE,6BAE/C,IAAI2J,EAAQK,EAASG,QAAQjC,EAAElI,IAKlB,GAAT2J,GAAc3J,IAAMkK,EAAalJ,QACnCkJ,EAAaL,KAAK,GAIpB,IADA,IAAID,EAAI,EACDA,EAAIK,EAAajJ,QAAU2I,EAAQ,GAAG,CAC3C,IAAIS,EAAcH,EAAaL,GAW/BD,GANES,OADkB/F,IAAhB+F,EACYT,EAEc,GAAdS,EAAmBT,IAIZ,EAEvBM,EAAaL,GAAKQ,EAAc,IAChCR,GACF,CACF,CAEA,IAAIH,EAASS,EAAa/B,OAAO8B,EAAaI,WAC9C,OAAO,IAAIhD,WAAWoC,EACxB,CA0MA,SAAAa,IAHC,OAGDA,EAAAhH,EAAA1B,IAAAE,EAnCA,SAAAyI,EAAyBC,EAAiBC,EAAWC,GAAc,IAAAC,EAAAC,EAAA,OAAAhJ,IAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,OAAAgL,EACzDH,EAASI,EAAAjL,EACV,WADUgL,EACF,EAoBR,gBApBQA,EAoBK,oBAnBXF,EAAgB,CAAFG,EAAAjL,EAAA,cACX,IAAIkF,MAAM,sDAAqD,UAExC,KAA3B0F,EAAgBxJ,OAAa,CAAA6J,EAAAjL,EAAA,cACzB,IAAIkF,MAAM,sDAADqD,OACyCqC,EAAgBxJ,OAAM,MAC7E,UAE2B,KAA1B0J,EAAe1J,OAAa,CAAA6J,EAAAjL,EAAA,cACxB,IAAIkF,MAAM,qDAADqD,OACwCuC,EAAe1J,OAAM,MAC3E,OAKyC,OAFpC2J,EAAoB,IAAItD,WAAW,KACvByD,IAAIN,EAAiB,GACvCG,EAAkBG,IAAIJ,EAAgB,IAAIG,EAAAhK,EAAA,EACnC0I,EAAaoB,IAAkB,cAAAE,EAAAhK,EAAA,EAGjC,KAAO6G,EAAsB8C,IAAgB,OAMlD,OAFFO,QAAQC,KAAK,uBAAD7C,OACasC,EAAS,iCAChCI,EAAAhK,EAAA,EACK,KAAO6G,EAAsB8C,IAAgB,cAAAK,EAAAhK,EAAA,KAAA0J,EAAA,KAEzD/G,MAAA,KAAAD,UAAA,C,aCzxBD,IAAA/D,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA8C,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAIA,IACmBwH,EDmGlB,WAK6B,OAAAhG,EAAAzB,MAAC,KAADD,UAAA,EC3F5B0D,EAWEiE,EAPFnD,EAOEmD,EAHFC,EDuyBF,SAAwBC,EAAQC,GAC9B,IAAMC,EAAc,CAAC,EAEfC,EAAqB,CACzBC,QAAS,+BACTC,OAAQ,+BACRC,YAAa,6BACbC,YACE,gEACFC,YACE,iLACFC,aAAc,+BACdC,SAAU,6DACVC,WAAY,wCACZC,WAAY,aACZC,MACE,iLACFC,WACE,iLACFC,gBACE,iLACFC,MAAO,kEACPC,OAAQ,kEACRC,SAAU,kEACVC,UACE,kEACFC,WACE,8EACFC,UACE,8HACFC,UAAW,gDACXC,aAAc,iCACdC,SAAU,wBACVC,OAAQ,kDA4BV,OAzBAxM,OAAOyM,QAAQ1B,GAAQ2B,QAAQ,SAAAC,GAAuB,IAr2BxDtN,EAAAF,EAq2BwDyN,GAr2BxDzN,EAq2BwD,EAr2BxD,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,EAq2BwDsN,IAr2BxD,SAAAtN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAAmD,EAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,IAq2BmCC,EAAQL,EAAA,GAAE5L,EAAK4L,EAAA,GACxCM,EAAgBD,EAASE,OAC/B,GAA6B,IAAzBD,EAAcvM,OAChB,MAAM,IAAI8D,MAAM,sCAElB,IAAM2I,EAAgBlC,EAAmBgC,GACzC,IAAKE,EACH,MAAM,IAAI3I,MAAM,+CAADqD,OACkCoF,EAAa,MAGhE,IAAMG,EAAa,IAAIC,OAAOF,GACxBG,EAAavM,EAAMmM,OACzB,GAAyB,GAArBI,EAAW5M,OACb,MAAM,IAAI8D,MAAM,kBAADqD,OAAmBoF,EAAa,eAGjD,IADqBG,EAAWzK,KAAK2K,GAEnC,MAAM,IAAI9I,MAAM,yCAADqD,OAC4BoF,EAAa,MAG1DjC,EAAYiC,GAAiBK,CAC/B,GAEOtC,CACT,ECp2BElH,EAEE8G,EADF2C,EDoCF,SAG4BC,GAAA,OAAApJ,EAAAlB,MAAC,KAADD,UAAA,EC1B5B,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAPA,SAAA6C,IAAA,OAAA/C,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,WACMwE,IAAmB,CAAFS,EAAAjF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAD,EAAAjF,EAAA,EAEtBqL,IAAuB,cAAApG,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACrCnB,MAAA,KAAAD,UAAA,CAuED,SAAAwK,IAFC,OAEDA,EAAAzK,EAAA1B,IAAAE,EA/DA,SAAAkM,EACEC,EACAC,EACAC,GAAU,IAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA/M,IAAAC,EAAA,SAAA+M,GAAA,cAAAA,EAAAhP,GAAA,OA2B6B,GAxBjCwO,EAA2B,CAC/BS,KAAM,qIACNC,QACE,sIAIAT,EAAc,KACM,oBAAb9F,WACH+F,EAAO/F,SAASwG,cACpB,6CAIAT,EAAKjG,SACY,mCAAjBiG,EAAKjG,UAELgG,EAAcC,EAAKjG,SAGlBgG,GAAiC,oBAAXnK,SACzBmK,EAAcnK,OAAO8K,qCAK0B3K,KAH3CkK,EACJH,EAAyBC,IAE+B,CAAAO,EAAAhP,EAAA,cAClD,IAAIkF,MAAM,8EAEf,UAGCmJ,IAAwBM,EAAwC,CAAAK,EAAAhP,EAAA,cAC5D,IAAIkF,MAAM,2EAADqD,OAC8DoG,EAAwC,cAAApG,OAAa8F,EAAmB,MACpJ,OAKF,OAFKO,EAA4B,IAAInH,WACpCJ,EAAwBsH,IACzBK,EAAAhP,EAAA,EACuBiO,EAAcW,GAA0B,OAAjD,GAATC,EAASG,EAAAhO,EACC,CAAFgO,EAAAhP,EAAA,cACN,IAAIkF,MAAM,6BAA4B,OAKW,OADnD4J,GAAqBO,EAAAA,EAAAA,IAAiBf,GACtCS,EAAgB1H,EAAwBkH,GAAWS,EAAAhP,EAAA,EAC5CoE,OAAOC,OAAOiL,OACzB,CAAElM,KAAM,QAASmM,KAAM,WACvBV,EACAC,EACAC,GACD,cAAAC,EAAA/N,EAAA,EAAA+N,EAAAhO,GAAA,EAAAoN,EAAA,KACFxK,MAAA,KAAAD,UAAA,CA2CM,IAAM6L,EAAO,CAClBC,gBAzHF,WAG8B,OAAApK,EAAAzB,MAAC,KAADD,UAAA,EAuH5B8B,kBA5HE6F,EA6HF/E,kBA7HE+E,EA8HFnF,kBA9HEmF,EA+HF9F,eA/HE8F,EAgIF5F,eAhIE4F,EAiIFoE,mBDyBF,WACEpL,OAAOyC,aAAaK,WAAWrD,GAC/BO,OAAOyC,aAAaK,WA7Kc,8BA8KpC,EC3BE6B,uBAlIEqC,EAmIF3B,aAnIE2B,EAoIFnB,aApIEmB,EAqIFqE,UD8kBD,SASuBC,EAAAC,EAAAC,GAAA,OAAApF,EAAA9G,MAAC,KAADD,UAAA,ECtlBtBoM,cD8RF,SAAuBC,EAAMvO,EAAOwO,GAClC,IAAMpH,EAAU,CACdmH,KAAMA,EACNvO,MAAOA,GAILwO,IACFpH,EAAQoH,UAAYA,GAGlBhM,EACFA,EAA8BiM,YAAYrH,GACjCvE,OAAOM,SAAWN,QAC3BA,OAAOM,OAAOsL,YACZ,CACEF,KAAMA,EACNvO,MAAOA,GAET,KAGJ+G,EAAW,mBAADD,OAAoByH,EAAI,MAAAzH,OAAK9G,GACzC,ECpTE+G,WAvIE8C,EAwIFjE,wBAAAA,EACAS,sBAzIEwD,EA0IF6E,iCD4BF,SAA0CC,GACxCnM,EAAgCmM,CAClC,EC7BEC,iBD8HF,SAA0BC,EAAWC,GACnC,IAAMC,EAAgBD,EAAeD,EAAUlP,OAG/C,GAAIoP,EAAgB,EAAG,CACrB,IAAM5E,EAAU,IAAInE,WAAW+I,GAAeC,KAAK,GACnD,OAAO,IAAIhJ,WAAW,GAADc,OAAA/F,EAAKoJ,GAAOpJ,EAAK8N,IACxC,CAGA,GAAIE,EAAgB,EAAG,CAGrB,IAFA,IAAME,GAAqC,EAAjBF,EACtBG,EAAY,EACPvQ,EAAI,EAAGA,EAAIsQ,GAAqBtQ,EAAIkQ,EAAUlP,OAAQhB,IACxC,IAAjBkQ,EAAUlQ,IACZuQ,IAIJ,GAAIA,IAAcD,EAChB,MAAM,IAAIxL,MAAM,iEAADqD,OACoDmI,EAAiB,aAAAnI,OAAYoI,EAAS,MAG3G,OAAOL,EAAUpN,MAAMwN,EAAmBA,EAAoBH,EAChE,CACA,OAAOD,CACT,ECxJEjB,iBAAAA,EAAAA,GACAlH,yBAAAA,EACAyI,uBApID,SAQoC1C,EAAA2C,EAAAC,GAAA,OAAA3C,EAAAvK,MAAC,KAADD,UAAA,EA6HnCoN,oBA1DF,SAA6BC,GAG3B,OAFAC,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWzN,MAAAuN,EAAAxN,WAAO,EACjDsN,EAAAA,GAA0BD,EACnC,EAuDEM,cA/CF,SAAuBC,GACrB,IAAMC,EAAgB,CAAC,EACvB,IAAKD,EACH,OAAOnL,KAAKI,UAAUgL,GAExB,IAAMC,EAAcrL,KAAKC,MAAMkL,GAC/B,GAAIE,EAAYjG,OAAQ,CAEtB,IAAMkG,EAAiB/I,SAASC,eAAe,WAC/C,IAAK8I,EACH,MAAM,IAAIxM,MAAM,uDAIlB,IAAMwG,EAAcH,EAAekG,EAAYjG,QAC/C/K,OAAOyM,QAAQxB,GAAayB,QAAQ,SAAAC,GAAkB,IA7I1DtN,EAAAF,EA6I0DyN,GA7I1DzN,EA6I0D,EA7I1D,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,EA6I0DsN,IA7I1D,SAAAtN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,IA6I0ChH,EAAG4G,EAAA,GAAE5L,EAAK4L,EAAA,GAC9CqE,EAAeC,MAAMlL,GAAOhF,CAC9B,GAEA+P,EAAsB,OAAI9F,CAC5B,CAEA,OAAOtF,KAAKI,UAAUgL,EACxB,EAyBEjG,eAAAA,EACAqG,YD2BF,WACE,IAAML,EAAWjN,OAAOyC,aAAaG,QAAQlD,GAC7C,OAAOuN,EAAWnL,KAAKC,MAAMkL,GAAY,IAC3C,EC7BEM,YDmCF,SAAqBN,GACnBjN,OAAOyC,aAAaC,QAAQhD,EAAkBoC,KAAKI,UAAU+K,GAC/D,ECpCEO,gBD4mBF,SAAyB7L,GACvB,GAAIxD,MAAMC,QAAQuD,GAChB,OAAO,IAAIwB,WAAWxB,GAGxB,GAA0B,iBAAfA,EAAyB,CAOlC,GALIA,EAAWuB,WAAW,QACxBvB,EAAaA,EAAW/C,MAAM,IAIN,KAAtB+C,EAAW7E,QAAiB,iBAAiBiC,KAAK4C,GACpD,OAAOoB,EAAwBpB,GAIjC,IACE,OAAOkE,EAAalE,EACtB,CAAE,MAAO8L,GACP,MAAM,IAAI7M,MACR,mEAEJ,CACF,CAEA,MAAM,IAAIA,MAAM,4DAClB,G,+sCExzBA,IAAAtF,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAmS,GAAAlS,EAAAF,GAAA,gBAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,IAAA,SAAAA,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,GAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,GAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,EAAA,UAAA9K,GAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAKA,IAAIoO,GAAe,CAAC,EAIhBC,GAAsB,KAKpBC,GAAc,IAAIC,YAClBC,GAAc,IAAIC,YAExB,SAMeC,GAAwBrE,EAAA2C,GAAA,OAAA2B,GAAA5O,MAAC,KAADD,UAAA,CAyDvC,SAAA6O,KAFC,OAEDA,GAAA9O,GAAA1B,KAAAE,EAzDA,SAAAuQ,EAAwCC,EAAQC,GAAc,IAAAC,EAAArE,EAAA,OAAAvM,KAAAC,EAAA,SAAA4Q,GAAA,cAAAA,EAAA7S,GAAA,OACxB,GAEV,YAFpB4S,EAAYxM,KAAKC,MAAMqM,IAEfI,QAAoB,CAAAD,EAAA7S,EAAA,cAC1B,IAAIkF,MAAM,wBAADqD,OAAyBqK,EAAUE,UAAU,UAEzDF,EAAUG,KAAM,CAAFF,EAAA7S,EAAA,cACX,IAAIkF,MAAM,4BAA2B,UAExC0N,EAAUI,cAAe,CAAFH,EAAA7S,EAAA,cACpB,IAAIkF,MAAM,qCAAoC,UAEjD0N,EAAUvE,oBAAqB,CAAFwE,EAAA7S,EAAA,cAC1B,IAAIkF,MAAM,2CAA0C,UAGvDsK,EAAKoB,uBAAwB,CAAFiC,EAAA7S,EAAA,cACxB,IAAIkF,MAAM,iDAAgD,cAAA2N,EAAA7S,EAAA,EAE3CwP,EAAKoB,uBAC1BgC,EAAUvE,oBACVuE,EAAUI,cACVJ,EAAUG,MACX,OAJa,GAAAF,EAAA7R,EAKC,CAAF6R,EAAA7S,EAAA,cACL,IAAIkF,MAAM,sDAADqD,OACyCqK,EAAUI,cAAa,2BAAAzK,OAA0BqK,EAAUvE,sBAClH,OAKF,GAFKE,EAAanI,KAAKC,MACtBgM,GAAYY,OAAOzD,EAAKnI,wBAAwBuL,EAAUG,QAGvDJ,EAAgB,CAAFE,EAAA7S,EAAA,cACX,IAAIkF,MAAM,8IAEf,UAEAqJ,EAAWoE,gBACZpE,EAAWoE,iBAAmBA,EAAc,CAAAE,EAAA7S,EAAA,cAEtC,IAAIkF,MAAM,4DAADqD,OAC+CoK,EAAc,aAAApK,OAAYgG,EAAWoE,eAAc,MAChH,UAGEpE,EAAW2E,eAAgB,CAAFL,EAAA7S,EAAA,eACtB,IAAIkF,MAAM,kDAAiD,WAE9DqJ,EAAW4E,WAAY,CAAFN,EAAA7S,EAAA,eAClB,IAAIkF,MAAM,8CAA6C,eAAA2N,EAAA5R,EAAA,EAGxDsN,GAAU,EAAAkE,EAAA,KAClB7O,MAAA,KAAAD,UAAA,UAUcyP,GAAatC,EAAAuC,EAAAC,GAAA,OAAAC,GAAA3P,MAAC,KAADD,UAAA,CAiB5B,SAAA4P,KAFC,OAEDA,GAAA7P,GAAA1B,KAAAE,EAjBA,SAAAyI,EAA6B+H,EAAQC,EAAgBa,GAAW,IAAAjF,EAAAkF,EAAAC,EAAAC,EAAAC,EAAA,OAAA5R,KAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,cAAAiL,EAAAjL,EAAA,EACrCuS,GAAyBG,EAAQC,GAAe,OAQ9B,GARrCpE,EAAUtD,EAAAjK,EAEVyS,EAAiBjE,EAAKnI,wBAC1BkH,EAAW2E,gBAEPQ,EAAgBlE,EAAKnI,wBAAwBkH,EAAW4E,YAE9DS,EACwB1B,GAAmB,CAAAjH,EAAAjL,EAAA,eAAAiL,EAAAjL,EAAA,EAAWwP,EAAKhK,iBAAgB,OAAAoO,EAAA3I,EAAAjK,EAAA,OAAtD,OAAf2S,EAAeC,EAAA3I,EAAAjL,EAAG,EACXwT,EAAY,CACvBE,cAAAA,EACAD,eAAAA,EACAE,gBAAAA,IACA,cAAA1I,EAAAhK,EAAA,EAAAgK,EAAAjK,GAAA,EAAA2J,EAAA,IACH4I,GAAA3P,MAAA,KAAAD,UAAA,UAMckQ,GAAsB3K,GAAA,OAAA4K,GAAAlQ,MAAC,KAADD,UAAA,CAgBrC,SAAAmQ,KAFC,OAEDA,GAAApQ,GAAA1B,KAAAE,EAhBA,SAAA6R,EAAsC9D,GAAS,IAAA+D,EAAAC,EAAAC,EAAA,OAAAlS,KAAAC,EAAA,SAAAkS,GAAA,cAAAA,EAAAnU,GAAA,OACD,GAAtCgU,EAAiBxE,EAAKhK,iBAEP,CAAF2O,EAAAnU,EAAA,QACyC,OAA1DwP,EAAKO,cAAc,sBAAuB,GAAIE,GAAYkE,EAAAlT,EAAA,iBAAAkT,EAAAnU,EAAA,EAKjCwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYE,EAAAnT,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAGhDzE,EAAKO,cAAc,sBAAuBmE,EAAcjE,GAAW,cAAAkE,EAAAlT,EAAA,KAAA8S,EAAA,KACpEnQ,MAAA,KAAAD,UAAA,UAScyQ,GAAiBC,EAAAC,EAAAC,EAAA3E,GAAA,OAAA4E,GAAA5Q,MAAC,KAADD,UAAA,CAsChC,SAAA6Q,KAFC,OAEDA,GAAA9Q,GAAA1B,KAAAE,EAtCA,SAAAuS,EAAiCC,EAASC,EAAU9J,EAAW8H,GAAc,IAAAlM,EAAAmE,EAAAoG,EAAAlG,EAAA8J,EAAAC,EAAA,OAAA7S,KAAAC,EAAA,SAAA6S,GAAA,cAAAA,EAAA9U,GAAA,OAE3B,GAA1C4K,EAAkB,IAAInD,WAAWkN,GAErB,WAAd9J,EAAsB,CAAAiK,EAAA9U,EAAA,QAIsC,OAHxDgR,EAAgBxB,EAAK1H,sBACzB8C,EAAgBmK,SAAS,EAAG,KAExBjK,EAAiB0E,EAAKuB,oBAAoBC,GAAc8D,EAAA9U,EAAA,EAClDwP,EAAKG,UAAU/E,EAAiBC,EAAWC,GAAe,OAAtErE,EAAGqO,EAAA9T,EAAA8T,EAAA9U,EAAG,EAAH,oBAAA8U,EAAA9U,EAAG,EAEMwP,EAAKG,UAAU/E,EAAiBC,GAAU,OAAtDpE,EAAGqO,EAAA9T,EAAA,OAKL,GAFM4T,EAAaF,GAAW,UAIZ,WAAd7J,EAAsB,CAAAiK,EAAA9U,EAAA,QACxB6U,EAAgBG,EAAAA,GAAQC,cAAczF,EAAKrF,aAAa1D,IAAMqO,EAAA9U,EAAA,kBACvC,gBAAd6K,EAA2B,CAAAiK,EAAA9U,EAAA,eAAA8U,EAAA9U,EAAA,EACdkV,GACpBzS,MAAMI,KAAK2M,EAAKnI,wBAAwBZ,KACzC,OAFDoO,EAAaC,EAAA9T,EAAA,OAKfiR,GAAYxI,GAAAA,GAAA,GACPwI,IAAY,GAAAkD,GAAA,GACdP,EAAa,CACZjC,eAAAA,EACA1M,WAAYQ,EACZ2O,OAAQvK,EACRjE,QAAQ,IAAIC,MAAOC,UAzJe,MA0JlCuO,QAASR,KAEX,cAAAC,EAAA7T,EAAA,KAAAwT,EAAA,KACH7Q,MAAA,KAAAD,UAAA,UAWc2R,GAAiBzF,EAAAC,EAAAyF,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAA/R,MAAC,KAADD,UAAA,CAkBhC,SAAAgS,KAFC,OAEDA,GAAAjS,GAAA1B,KAAAE,EAlBA,SAAA0T,EACE3F,EACA0C,EACAD,EACA7H,EACA6J,EACAlB,GAAW,IAAAmB,EAAA,OAAA3S,KAAAC,EAAA,SAAA4T,GAAA,cAAAA,EAAA7V,GAAA,cAAA6V,EAAA7V,EAAA,EAGYoT,GAAcV,EAAQC,EAAgBa,GAAY,OAA3D,OAARmB,EAAQkB,EAAA7U,EAAA6U,EAAA7V,EAAG,EAGXoU,GAAkBM,EAASC,EAAU9J,EAAW8H,GAAe,OAGrEnD,EAAKO,cAAc,mBAAmB,EAAME,GAAW,cAAA4F,EAAA5U,EAAA,KAAA2U,EAAA,IACxDD,GAAA/R,MAAA,KAAAD,UAAA,UAUcmS,GAAeC,EAAAC,GAAA,OAAAC,GAAArS,MAAC,KAADD,UAAA,CAW9B,SAAAsS,KAFC,OAEDA,GAAAvS,GAAA1B,KAAAE,EAXA,SAAAgU,EAA+B3E,EAAUtB,GAAS,IAAAuB,EAAA,OAAAxP,KAAAC,EAAA,SAAAkU,GAAA,cAAAA,EAAAnW,GAAA,OAE1CwR,EAAgBhC,EAAK8B,cAAcC,GAGzC/B,EAAKqC,YAAYL,GAGjBhC,EAAKO,cAAc,oBAAoB,EAAME,GAAW,cAAAkG,EAAAlV,EAAA,KAAAiV,EAAA,KACzDtS,MAAA,KAAAD,UAAA,UAQcyS,GAAiBC,EAAAC,EAAAC,GAAA,OAAAC,GAAA5S,MAAC,KAADD,UAAA,CAmChC,SAAA6S,KAFC,OAEDA,GAAA9S,GAAA1B,KAAAE,EAnCA,SAAAuU,EAAiCxG,EAAWyG,EAAuBhC,GAAO,IAAAE,EAAAnO,EAAA4O,EAAAsB,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAAhV,KAAAC,EAAA,SAAAgV,GAAA,cAAAA,EAAAjX,GAAA,OAKxE,GACKkX,GAHCzQ,EAAMwL,GADN2C,EAAaF,GAAW,WAIRE,GAAwB,CAAFqC,EAAAjX,EAAA,eAAAiX,EAAAhW,EAAA,iBAAAgW,EAAAjX,EAAA,EAKtBmX,GAAmB1Q,GAAI,OAIE,GAJzC4O,EAAO4B,EAAAjW,EAEP2V,EAAqBvQ,KAAKC,MAAMqQ,GAChCE,EAAoBD,EAAmBI,YAKrB,WAJAJ,EAAmB3G,KAIX,CAAAiH,EAAAjX,EAAA,QAExB8W,EAAmBtH,EAAKnI,wBAAwBuP,IAChDG,EAAcK,EAAAA,GAAqBC,YAAYP,IACzCQ,KAAK,CAACjC,IAElBwB,EAAoBE,EAAYQ,YAAYN,EAAAjX,EAAA,qBAEtC,IAAIkF,MAAM,gCAA+B,OAG3C8R,EAAuBxH,EAAK1H,sBAAsB+O,GAExDrH,EAAKO,cAAc,qBAAsBiH,EAAsB/G,GAAW,cAAAgH,EAAAhW,EAAA,KAAAwV,EAAA,KAC3E7S,MAAA,KAAAD,UAAA,UAQc6T,GAAaC,EAAAC,EAAAC,GAAA,OAAAC,GAAAhU,MAAC,KAADD,UAAA,CA4C5B,SAAAiU,KAFC,OAEDA,GAAAlU,GAAA1B,KAAAE,EA5CA,SAAA2V,EAA6B5H,EAAW6H,EAAmBpD,GAAO,IAAAE,EAAAnO,EAAAsR,EAAAC,EAAAC,EAAAC,EAAAC,EAAA9C,EAAApP,EAAAmS,EAAA,OAAApW,KAAAC,EAAA,SAAAoW,GAAA,cAAAA,EAAArY,GAAA,OAKhE,GACKkX,GAHCzQ,EAAMwL,GADN2C,EAAaF,GAAW,WAIRE,GAAwB,CAAFyD,EAAArY,EAAA,eAAAqY,EAAApX,EAAA,UAOU,OAHhD8W,EAAiB3R,KAAKC,MAAMyR,GAC5BE,EAAgBD,EAAelP,QAC/BoP,EAAcF,EAAe/H,KAC7BkI,EAAe/F,GAAYmG,OAAON,GAAcK,EAAArY,EAAA,EAKhCmX,GAAmB1Q,GAAI,OAAhC,GAAP4O,EAAOgD,EAAArX,EAEO,WAAhBiX,EAAwB,CAAAI,EAAArY,EAAA,QAE1BiR,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWzN,MAAAuN,EAAAxN,WAAO,EAIlDsC,EAAaoP,EAAQkD,UAAUrV,MAAM,EAAG,IAExCkV,EAAYnH,EAAAA,GAAkBiH,EAAcjS,GAKlDkS,EAAe3I,EAAK1H,sBAAsBsQ,GAAWC,EAAArY,EAAA,eAEc,OAAnEwP,EAAKO,cAAc,QAAS,2BAA4BE,GAAWoI,EAAApX,EAAA,UAKrEuO,EAAKO,cAAc,iBAAkBoI,EAAclI,GAAW,cAAAoI,EAAApX,EAAA,KAAA4W,EAAA,IAC/DD,GAAAhU,MAAA,KAAAD,UAAA,UAOc6U,GAAyBC,EAAAC,GAAA,OAAAC,GAAA/U,MAAC,KAADD,UAAA,CA4BxC,SAAAgV,KAFC,OAEDA,GAAAjV,GAAA1B,KAAAE,EA5BA,SAAA0W,EAAyC3I,EAAWyE,GAAO,OAAA1S,KAAAC,EAAA,SAAA4W,GAAA,cAAAA,EAAA7Y,GAAA,UAEpD0U,EAAS,CAAFmE,EAAA7Y,EAAA,QAE0D,OADpEiS,GAAe,CAAC,EAChBzC,EAAKO,cAAc,gCAAgC,EAAME,GAAW4I,EAAA5X,EAAA,aAMjEgR,GAAayC,GAAU,CAAFmE,EAAA7Y,EAAA,QAOtB,OANFwP,EAAKO,cACH,QACA,IAAI7K,MAAM,6BAADqD,OACsBmM,EAAO,2CACpCzR,WACFgN,GACA4I,EAAA5X,EAAA,iBAMGgR,GAAayC,GAEpBlF,EAAKO,cAAc,gCAAgC,EAAME,GAAW,cAAA4I,EAAA5X,EAAA,KAAA2X,EAAA,KACrEhV,MAAA,KAAAD,UAAA,UAWcmV,GAAwBC,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAAvV,MAAC,KAADD,UAAA,CAmBvC,SAAAwV,KAFC,OAEDA,GAAAzV,GAAA1B,KAAAE,EAnBA,SAAAkX,EACEnJ,EACA0C,EACAD,EACAc,GAAW,IAAAmB,EAAA0E,EAAA,OAAArX,KAAAC,EAAA,SAAAqX,GAAA,cAAAA,EAAAtZ,GAAA,cAAAsZ,EAAAtZ,EAAA,EAIYoT,GAAcV,EAAQC,EAAgBa,GAAY,OAA3D,OAARmB,EAAQ2E,EAAAtY,EAAAsY,EAAAtZ,EAAG,EAGIuZ,GAAuB,IAAI9R,WAAWkN,IAAU,OAA/D0E,EAAMC,EAAAtY,EAGZkR,GAAsBmH,EAEtB7J,EAAKO,cAAc,6BAA6B,EAAME,GAAW,cAAAqJ,EAAArY,EAAA,KAAAmY,EAAA,IAClED,GAAAvV,MAAA,KAAAD,UAAA,CAOD,SAAS6V,GAA4BvJ,GACnCiC,GAAsB,KACtB1C,EAAKO,cAAc,iCAAiC,EAAME,EAC5D,CAEA,SACeiF,GAAmBuE,GAAA,OAAAC,GAAA9V,MAAC,KAADD,UAAA,CAmBlC,SAAA+V,KAFC,OAEDA,GAAAhW,GAAA1B,KAAAE,EAnBA,SAAAyX,EAAmC1T,GAAU,IAAA2E,EAAAyK,EAAA,OAAArT,KAAAC,EAAA,SAAA2X,GAAA,cAAAA,EAAA5Z,GAAA,OACa,GAGzB,MAHzB4K,EAAkB4E,EAAKsC,gBAAgB7L,IAGzB7E,OAAa,CAAAwY,EAAA5Z,EAAA,QAE/BqV,EAAUL,EAAAA,GAAQ6E,SAASjP,GAAiBgP,EAAA5Z,EAAA,kBACR,KAA3B4K,EAAgBxJ,OAAa,CAAAwY,EAAA5Z,EAAA,QAEtCqV,EAAUL,EAAAA,GAAQC,cAAcrK,GAAiBgP,EAAA5Z,EAAA,qBAE3C,IAAIkF,MAAM,+BAADqD,OACkBqC,EAAgBxJ,OAAM,+BACtD,cAAAwY,EAAA3Y,EAAA,EAGIoU,GAAO,EAAAsE,EAAA,KACf/V,MAAA,KAAAD,UAAA,UASc4V,GAAsBO,GAAA,OAAAC,GAAAnW,MAAC,KAADD,UAAA,CAmDrC,SAAAoW,KAFC,OAEDA,GAAArW,GAAA1B,KAAAE,EAnDA,SAAA8X,EAAsCC,GAAkB,IAAAC,EAAAC,EAAAC,EAAA,OAAApY,KAAAC,EAAA,SAAAoY,GAAA,cAAAA,EAAAra,GAAA,UACpB,KAA9Bia,EAAmB7Y,OAAa,CAAAiZ,EAAAra,EAAA,cAC5B,IAAIkF,MAAM,yDAADqD,OAC4C0R,EAAmB7Y,SAC7E,OAkC+C,OAR5C8Y,EAAc,IAAIzS,WAAW,CACjC,GAAM,GAAM,EAAM,EAAM,EAAM,GAAM,GAAM,EAAM,EAAM,GAAM,IAAM,GAClE,IAAM,GAAM,EAAM,EAAM,EAAM,EAAM,GAAM,IAAM,GAAM,IAAM,GAAM,EAClE,EAAM,EAAM,EAAM,GAAM,GAAM,GAAM,EAAM,EAAM,EAAM,EAAM,MAGxD0S,EAAQ,IAAI1S,WAAWyS,EAAY9Y,OAAS,KAC5C8J,IAAIgP,GACVC,EAAMjP,IAAI+O,EAAoBC,EAAY9Y,QAAQiZ,EAAAra,EAAA,EAE1BoE,OAAOC,OAAOc,UACpC,QACAgV,EACA,CAAE/W,KAAM,OAAQgC,WAAY,UAC5B,EACA,CAAC,eACF,OANc,OAATgV,EAASC,EAAArZ,EAAAqZ,EAAAra,EAAG,EAQLoE,OAAOC,OAAO2B,UAAU,MAAOoU,GAAU,cAAAC,EAAApZ,EAAA,EAAAoZ,EAAArZ,GAAA,EAAAgZ,EAAA,KACvDpW,MAAA,KAAAD,UAAA,CAgBD,SAAS2W,GAAgB1F,GACnB3C,GAAa2C,WACR3C,GAAa2C,EAExB,CA6BA,SAASsC,GAAYzQ,EAAKmO,GACxB,IAAKnO,EACH,MAAM,IAAIvB,MAAM,mEAADqD,OACsDqM,EAAU,uDAC7E3R,WAIJ,IADY,IAAI4D,MAAOC,WACZL,EAAIG,OAGb,MAlCJ,WAIE,IAHA,IAAM2T,GAAM,IAAI1T,MAAOC,UACjB0T,EAAoB,GAE1BC,EAAA,EAAAC,EAA6Bja,OAAOyM,QAAQ+E,IAAawI,EAAAC,EAAAtZ,OAAAqZ,IAAE,CAAtD,IAAAE,EAAA3I,GAAA0I,EAAAD,GAAA,GAAO/F,EAAOiG,EAAA,GAAElU,EAAGkU,EAAA,GAClBlU,EAAIG,QAAU2T,GAAO9T,EAAIG,QAC3B4T,EAAkBvQ,KAAKyK,EAE3B,CAEA,IAAK,IAALkG,EAAA,EAAAC,EAAsBL,EAAiBI,EAAAC,EAAAzZ,OAAAwZ,IACrCN,GADgBO,EAAAD,GAGpB,CAoBIE,GACM,IAAI5V,MArDP,SAAoC0P,GACzC,MAAO,sEAAPrM,OAA6EqM,EAAU,qDACzF,CAmDoBmG,CAA2BnG,IAAa3R,WAG1D,OAAO,CACT,CAEA,SAMekU,GAAkB6D,GAAA,OAAAC,GAAArX,MAAC,KAADD,UAAA,CAcjC,SAAAsX,KAFC,OAEDA,GAAAvX,GAAA1B,KAAAE,EAdA,SAAAgZ,EAAkCzU,GAAG,OAAAzE,KAAAC,EAAA,SAAAkZ,GAAA,cAAAA,EAAAnb,GAAA,WAC/ByG,EAAI4O,QAAS,CAAF8F,EAAAnb,EAAA,eAAAmb,EAAAla,EAAA,EACNwF,EAAI4O,SAAO,UAGD,WAAf5O,EAAI2O,OAAmB,CAAA+F,EAAAnb,EAAA,eAAAmb,EAAAla,EAAA,EAClB+T,EAAAA,GAAQC,cAAczF,EAAKrF,aAAa1D,EAAIR,cAAY,cAAAkV,EAAAnb,EAAA,EAElDkV,GACXzS,MAAMI,KAAK2M,EAAKnI,wBAAwBZ,EAAIR,cAC7C,cAAAkV,EAAAla,EAAA,EAAAka,EAAAna,GAAA,cAAAma,EAAAla,EAAA,KAAAia,EAAA,KAEJtX,MAAA,KAAAD,UAAA,CAyMM,SAASyX,GAAkB5H,GAChC,IAAM6H,EA/HR,SAAkC7H,GAChC,sBAAA8H,EAAA5X,GAAA1B,KAAAE,EAAO,SAAAkH,EAAoCmS,GAAK,IAAAC,EAAAxQ,EAAAyQ,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA9Z,KAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAA3I,EAAA2I,EAAAxJ,GAAA,WAC1Cub,EAAMxI,MAA8B,4BAAtBwI,EAAMxI,KAAW,KAA+B,CAAAvJ,EAAAxJ,EAAA,QAG9D,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,MAAC,MAAAxK,OAAKgT,EAAMxI,KAAgB,UAAC,MAAAxK,OAAKgT,EAAMxI,KAAqB,iBAC7HvJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEMsV,GACJiG,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAc,QACpBS,GACD,OAAAhK,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAA2a,EAAAhS,EAAAxI,EAEDwO,EAAKO,cAAc,QAASyL,EAAEvY,WAAYsY,EAAMxI,KAAgB,WAAG,WAGnEwI,EAAMxI,MAA8B,+BAAtBwI,EAAMxI,KAAW,KAAkC,CAAAvJ,EAAAxJ,EAAA,QAGjE,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,MAAC,MAAAxK,OAAKgT,EAAMxI,KAAqB,iBACjGvJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEMsV,GACJiG,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,WAClBtO,OACAA,EACA+O,GACD,OAAAhK,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAAmK,EAAAxB,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS/E,EAAE/H,WAAYsY,EAAMxI,KAAgB,WAAG,WAGnEwI,EAAMxI,MAA8B,kBAAtBwI,EAAMxI,KAAW,KAAqB,CAAAvJ,EAAAxJ,EAAA,gBAAAwJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,GAE9C8V,GAAgByF,EAAMxI,KAAY,MAAGwI,EAAMxI,KAAgB,WAAE,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA4a,EAAAjS,EAAAxI,EAEnEwO,EAAKO,cAAc,QAAS0L,EAAExY,WAAYsY,EAAMxI,KAAgB,WAAG,QAGvE,GAAIwI,EAAMxI,MAA8B,sBAAtBwI,EAAMxI,KAAW,KAA2B,CAC5DvD,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OACxD,IACEvD,EAAKE,oBACP,CAAE,MAAO9P,GACP4P,EAAKO,cAAc,QAASnQ,EAAEqD,WAChC,CACF,CAAC,IACGsY,EAAMxI,MAA8B,oBAAtBwI,EAAMxI,KAAW,KAAuB,CAAAvJ,EAAAxJ,EAAA,SAGtD,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,QAChEvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMoW,GACJmF,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA6a,EAAAlS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS2L,EAAEzY,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,gBAAtBwI,EAAMxI,KAAW,KAAmB,CAAAvJ,EAAAxJ,EAAA,SAGlD,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,QAChEvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMwX,GACJ+D,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA8a,EAAAnS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS4L,EAAE1Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,8BAAtBwI,EAAMxI,KAAW,KAAiC,CAAAvJ,EAAAxJ,EAAA,SACL,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErDwY,GACJ+C,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA+a,EAAApS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS6L,EAAE3Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,2BAAtBwI,EAAMxI,KAAW,KAA8B,CAAAvJ,EAAAxJ,EAAA,SACF,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErD6T,GAAuB0H,EAAMxI,KAAgB,WAAE,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAgb,EAAArS,EAAAxI,EAErDwO,EAAKO,cAAc,QAAS8L,EAAE5Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,6BAAtBwI,EAAMxI,KAAW,KAAgC,CAAAvJ,EAAAxJ,EAAA,SACJ,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErD8Y,GACJyC,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,MAClBS,GACD,QAAAhK,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAib,EAAAtS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS+L,EAAE7Y,WAAYsY,EAAMxI,KAAgB,WAAG,QAGvE,GAAIwI,EAAMxI,MAA8B,iCAAtBwI,EAAMxI,KAAW,KAAsC,CACvEvD,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OACxD,IACEyG,GAA4B+B,EAAMxI,KAAgB,UACpD,CAAE,MAAOnT,GACP4P,EAAKO,cAAc,QAASnQ,EAAEqD,WAAYsY,EAAMxI,KAAgB,UAClE,CACF,CAAC,eAAAvJ,EAAAvI,EAAA,KAAAmI,EAAA,sEArHuC,OAsHzC,SAtHyC2S,GAAA,OAAAT,EAAA1X,MAAC,KAADD,UAAA,EAA1C,EAuHF,CAO+BqY,CAAyBxI,GAGhDyI,EAA4B,IAAIC,gBAChCC,EAAwB,IAAID,iBAvMpC,WAEEvT,SAASC,eAAe,cAAcwT,iBACpC,QAAO,eAAAhP,EAAA1J,GAAA1B,KAAAE,EACP,SAAA6C,EAAOnF,GAAC,OAAAoC,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,2BACNvO,MAAOkH,SAASC,eAAe,qBAAqBnH,MACpDoJ,UAAWlC,SAASC,eAAe,qBAAqBnH,MACxDkR,eAAgBhK,SAASC,eAAe,uBAAuBnH,QAC9D,cAAAwD,EAAAhE,EAAA,KAAA8D,EAAA,IACJ,gBAAAuX,GAAA,OAAAlP,EAAAxJ,MAAA,KAAAD,UAAA,EATM,IAUP,GAEFgF,SAASC,eAAe,oBAAoBwT,iBAC1C,QAAO,eAAA/O,EAAA3J,GAAA1B,KAAAE,EACP,SAAAkM,EAAOxO,GAAC,OAAAoC,KAAAC,EAAA,SAAA+M,GAAA,cAAAA,EAAAhP,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,mBACNvO,MAAOkH,SAASC,eAAe,uBAAuBnH,QACrD,cAAAuN,EAAA/N,EAAA,KAAAmN,EAAA,IACJ,gBAAAmO,GAAA,OAAAlP,EAAAzJ,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,gBAAgBwT,iBACtC,QAAO,eAAAI,EAAA9Y,GAAA1B,KAAAE,EACP,SAAAoD,EAAO1F,GAAC,OAAAoC,KAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,eACNvO,MAAOkH,SAASC,eAAe,mBAAmBnH,QACjD,cAAA8D,EAAAtE,EAAA,KAAAqE,EAAA,IACJ,gBAAAmX,GAAA,OAAAD,EAAA5Y,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,SAASwT,iBAC/B,QAAO,eAAAM,EAAAhZ,GAAA1B,KAAAE,EACP,SAAA0D,EAAOhG,GAAC,OAAAoC,KAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CAAEF,KAAM,uBAAwB,cAAAlK,EAAA7E,EAAA,KAAA2E,EAAA,IACpD,gBAAA+W,GAAA,OAAAD,EAAA9Y,MAAA,KAAAD,UAAA,EAJM,IAKP,GAIF,IAAMiZ,EAAkBjU,SAASC,eAAe,iBAC5CgU,GACFA,EAAgBR,iBACd,QAAO,eAAAS,EAAAnZ,GAAA1B,KAAAE,EACP,SAAA4a,EAAOld,GAAC,OAAAoC,KAAAC,EAAA,SAAA8a,GAAA,cAAAA,EAAA/c,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,8BACNvO,MAAOkH,SAASC,eAAe,wBAAwBnH,MACvDkR,eAAgBhK,SAASC,eAAe,0BACrCnH,QACF,cAAAsb,EAAA9b,EAAA,KAAA6b,EAAA,IACJ,gBAAAE,GAAA,OAAAH,EAAAjZ,MAAA,KAAAD,UAAA,EATM,IAUP,EAGN,CA2IEsZ,GAGA3Y,OAAO8X,iBAAiB,UAAWf,EAAsB,CACvD6B,SAAS,EACTC,OAAQlB,EAA0BkB,SAIpC,IAAIC,GAAqB,EAiDzB,OA9CA9Y,OAAO8X,iBACL,UAAS,eAAAiB,EAAA3Z,GAAA1B,KAAAE,EACT,SAAAob,EAAgB/B,GAAK,IAAAgC,EAAAC,EAAAxJ,EAAAC,EAAAC,EAAA,OAAAlS,KAAAC,EAAA,SAAAwb,GAAA,cAAAA,EAAAzd,GAAA,WAQjBub,EAAMxI,MACgB,gCAAtBwI,EAAMxI,KAAW,MACN,QADyCwK,EACpDhC,EAAMmC,aAAK,IAAAH,IAAXA,EAAc,GAAE,CAAAE,EAAAzd,EAAA,YAMZod,EAAoB,CAAFK,EAAAzd,EAAA,eAAAyd,EAAAxc,EAAA,UAWmC,OARzDmc,GAAqB,EAGrBnB,EAA0B0B,SAEpBH,EAAoBjC,EAAMmC,MAAM,IACpBE,UAAYvC,EAE9B7L,EAAKW,iCAAiCqN,GAAmBC,EAAAzd,EAAA,EAEnDwP,EAAKC,gBAAgB8L,EAAMsC,QAAO,cAAAJ,EAAAzd,EAAA,EACbwP,EAAKhK,iBAAgB,OAA9B,OAAdwO,EAAcyJ,EAAAzc,EAAAyc,EAAAzd,EAAG,EACIwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYwJ,EAAAzc,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAC9CtL,SAASC,eAAe,gBAAgBnH,MAAQyS,EAEhD1E,EAAKO,cAAc,mBAAoBmE,GAGvCiI,EAAsBwB,QAAQ,cAAAF,EAAAxc,EAAA,KAAAqc,EAAA,IAEjC,gBAAAQ,GAAA,OAAAT,EAAAzZ,MAAA,KAAAD,UAAA,EAzCQ,GA0CT,CAAEwZ,OAAQhB,EAAsBgB,SAG3B,CAAE9B,qBAAAA,EACX,C,qQCtyBA,IAAAzb,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAke,GAAAne,EAAAE,GAAA,IAAAD,EAAAY,OAAAud,KAAApe,GAAA,GAAAa,OAAAwd,sBAAA,KAAA/d,EAAAO,OAAAwd,sBAAAre,GAAAE,IAAAI,EAAAA,EAAAge,OAAA,SAAApe,GAAA,OAAAW,OAAA0d,yBAAAve,EAAAE,GAAAuC,UAAA,IAAAxC,EAAAoK,KAAArG,MAAA/D,EAAAK,EAAA,QAAAL,CAAA,UAAA4J,GAAA7J,GAAA,QAAAE,EAAA,EAAAA,EAAA6D,UAAAvC,OAAAtB,IAAA,KAAAD,EAAA,MAAA8D,UAAA7D,GAAA6D,UAAA7D,GAAA,GAAAA,EAAA,EAAAie,GAAAtd,OAAAZ,IAAA,GAAAsN,QAAA,SAAArN,GAAAqV,GAAAvV,EAAAE,EAAAD,EAAAC,GAAA,GAAAW,OAAA2d,0BAAA3d,OAAA4d,iBAAAze,EAAAa,OAAA2d,0BAAAve,IAAAke,GAAAtd,OAAAZ,IAAAsN,QAAA,SAAArN,GAAAW,OAAA0B,eAAAvC,EAAAE,EAAAW,OAAA0d,yBAAAte,EAAAC,GAAA,UAAAF,CAAA,UAAAuV,GAAAvV,EAAAE,EAAAD,GAAA,OAAAC,EAAA,SAAAD,GAAA,IAAAO,EAAA,SAAAP,GAAA,aAAAye,GAAAze,KAAAA,EAAA,OAAAA,EAAA,IAAAD,EAAAC,EAAAE,OAAAwe,aAAA,YAAA3e,EAAA,KAAAQ,EAAAR,EAAA2B,KAAA1B,EAAAC,UAAA,aAAAwe,GAAAle,GAAA,OAAAA,EAAA,UAAAkB,UAAA,uDAAAkd,OAAA3e,EAAA,CAAA4e,CAAA5e,GAAA,gBAAAye,GAAAle,GAAAA,EAAAA,EAAA,GAAAse,CAAA5e,MAAAF,EAAAa,OAAA0B,eAAAvC,EAAAE,EAAA,CAAA2B,MAAA5B,EAAAwC,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAA3C,EAAAE,GAAAD,EAAAD,CAAA,UAAA0D,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,CAiBA,IAAMye,IAAoB,IAAIvM,aAAckG,OAAO,gBAM5C,SAAe9E,GAAWtF,GAAA,OAAA0Q,GAAAhb,MAAC,KAADD,UAAA,CAsCjC,SAAAib,KAFC,OA3DD5e,EA6DAgC,KAAAE,EAtCO,SAAA6C,EAAAqI,GAAA,IAAAsG,EAAAD,EAAAE,EAAAkL,EAAAC,EAAAC,EAAAC,EAAA3W,EAAA4W,EAAAC,EAAA1D,EAAA,OAAAxZ,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAApE,EAAAoE,EAAAjF,GAAA,OAKuC,OAJ5C0T,EAAatG,EAAbsG,cACAD,EAAcrG,EAAdqG,eACAE,EAAevG,EAAfuG,gBAEMkL,EAAa,IAAIM,GAAAA,GAAqBla,EAAAjF,EAAA,EACnB6e,EAAW1Z,UAClC,MAAKsE,GAAA,GACAkK,IACL,GACD,OAMC,OAVEmL,EAAY7Z,EAAAjE,EAMZ+d,EAAQ,IAAIK,GAAAA,GAAY,CAC1BC,IAAKR,EACLS,IAAK,IAAIC,GAAAA,GACTC,KAAM,IAAIC,GAAAA,KACVxa,EAAAjF,EAAA,EAEuB+e,EAAMW,uBAAuB,CACpDC,aAAcb,EACdc,IAAKnM,EACLoM,KAAMlB,KACN,OAJc,OAAZK,EAAY/Z,EAAAjE,EAAAiE,EAAAjF,EAAG,EAMQiJ,EAAuB0K,GAAgB,OACA,OAD9DtL,EAAcpD,EAAAjE,EACdie,EAAM9W,EAAyBsL,EAAgBpL,GAAepD,EAAApE,EAAA,EAAAoE,EAAAjF,EAAA,EAGpDgf,EAAac,KAAKpM,EAAeuL,GAAI,OAAjDC,EAAGja,EAAAjE,EAAAiE,EAAAjF,EAAG,EAAH,mBAAAiF,EAAApE,EAAG,EAAH2a,EAAAvW,EAAAjE,EAEG,IAAIkE,MACR,gGACEsW,EAAEvY,YACL,cAAAgC,EAAAhE,EAAA,EAEIie,GAAG,EAAAna,EAAA,gBAGZ6Z,GA7DA,eAAA/e,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,OA2DCD,MAAA,KAAAD,WA3DD,IAAA3D,CA2DC,C,cC3DD,IAAAJ,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAyD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAQAS,OAAOkL,KAAOA,EAGd7G,SAASyT,iBAAiB,mBAAkB1Y,GAAA1B,KAAAE,EAAE,SAAA6C,IAAA,IAAAiP,EAAAC,EAAAC,EAAA6L,EAAA,OAAA/d,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,cAAAiF,EAAAjF,EAAA,EACtCwP,EAAKC,kBAAiB,cAAAxK,EAAAjF,EAAA,EACCwP,EAAKhK,iBAAgB,OAA9B,OAAdwO,EAAc/O,EAAAjE,EAAAiE,EAAAjF,EAAG,EACIwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYhP,EAAAjE,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAChDtL,SAASC,eAAe,gBAAgBnH,MAAQyS,EAEhDkH,GAAkB5H,KAGZuM,EAAgBvQ,EAAKoC,gBAEzBpC,EAAK8B,cAAcyO,GAGrBvQ,EAAKO,cAAc,mBAAoBmE,GAAc,cAAAjP,EAAAhE,EAAA,KAAA8D,EAAA,I,kCC3BvDib,EAAOC,QAAU7b,M,GCCb8b,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqB3b,IAAjB4b,EACH,OAAOA,EAAaJ,QAGrB,IAAID,EAASE,EAAyBE,GAAY,CACjDE,GAAIF,EACJG,QAAQ,EACRN,QAAS,CAAC,GAUX,OANAO,EAAoBJ,GAAU7e,KAAKye,EAAOC,QAASD,EAAQA,EAAOC,QAASE,GAG3EH,EAAOO,QAAS,EAGTP,EAAOC,OACf,CAGAE,EAAoBje,EAAIse,ET5BpBjhB,EAAW,GACf4gB,EAAoBM,EAAI,CAAC5W,EAAQ6W,EAAUC,EAAIC,KAC9C,IAAGF,EAAH,CAMA,IAAIG,EAAeC,IACnB,IAAS1gB,EAAI,EAAGA,EAAIb,EAAS6B,OAAQhB,IAAK,CAGzC,IAFA,IAAKsgB,EAAUC,EAAIC,GAAYrhB,EAASa,GACpC2gB,GAAY,EACP/W,EAAI,EAAGA,EAAI0W,EAAStf,OAAQ4I,MACpB,EAAX4W,GAAsBC,GAAgBD,IAAangB,OAAOud,KAAKmC,EAAoBM,GAAGO,MAAOva,GAAS0Z,EAAoBM,EAAEha,GAAKia,EAAS1W,KAC9I0W,EAASO,OAAOjX,IAAK,IAErB+W,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACbxhB,EAAS0hB,OAAO7gB,IAAK,GACrB,IAAIN,EAAI6gB,SACElc,IAAN3E,IAAiB+J,EAAS/J,EAC/B,CACD,CACA,OAAO+J,CAnBP,CAJC+W,EAAWA,GAAY,EACvB,IAAI,IAAIxgB,EAAIb,EAAS6B,OAAQhB,EAAI,GAAKb,EAASa,EAAI,GAAG,GAAKwgB,EAAUxgB,IAAKb,EAASa,GAAKb,EAASa,EAAI,GACrGb,EAASa,GAAK,CAACsgB,EAAUC,EAAIC,IUJ/BT,EAAoBngB,EAAKggB,IACxB,IAAIkB,EAASlB,GAAUA,EAAOmB,WAC7B,IAAOnB,EAAiB,QACxB,IAAM,EAEP,OADAG,EAAoBjf,EAAEggB,EAAQ,CAAEjgB,EAAGigB,IAC5BA,GTNJzhB,EAAWgB,OAAOmB,eAAkBwf,GAAS3gB,OAAOmB,eAAewf,GAASA,GAASA,EAAa,UAQtGjB,EAAoBtgB,EAAI,SAAS4B,EAAO4f,GAEvC,GADU,EAAPA,IAAU5f,EAAQ6f,KAAK7f,IAChB,EAAP4f,EAAU,OAAO5f,EACpB,GAAoB,iBAAVA,GAAsBA,EAAO,CACtC,GAAW,EAAP4f,GAAa5f,EAAM0f,WAAY,OAAO1f,EAC1C,GAAW,GAAP4f,GAAoC,mBAAf5f,EAAMgC,KAAqB,OAAOhC,CAC5D,CACA,IAAI8f,EAAK9gB,OAAOC,OAAO,MACvByf,EAAoBrgB,EAAEyhB,GACtB,IAAIC,EAAM,CAAC,EACXhiB,EAAiBA,GAAkB,CAAC,KAAMC,EAAS,CAAC,GAAIA,EAAS,IAAKA,EAASA,IAC/E,IAAI,IAAIgiB,EAAiB,EAAPJ,GAAY5f,GAA0B,iBAAXggB,GAAyC,mBAAXA,MAA4BjiB,EAAe+K,QAAQkX,GAAUA,EAAUhiB,EAASgiB,GAC1JhhB,OAAOihB,oBAAoBD,GAAStU,QAAS1G,GAAS+a,EAAI/a,GAAO,IAAOhF,EAAMgF,IAI/E,OAFA+a,EAAa,QAAI,IAAM,EACvBrB,EAAoBjf,EAAEqgB,EAAIC,GACnBD,CACR,EUxBApB,EAAoBjf,EAAI,CAAC+e,EAAS0B,KACjC,IAAI,IAAIlb,KAAOkb,EACXxB,EAAoBjgB,EAAEyhB,EAAYlb,KAAS0Z,EAAoBjgB,EAAE+f,EAASxZ,IAC5EhG,OAAO0B,eAAe8d,EAASxZ,EAAK,CAAEpE,YAAY,EAAMuf,IAAKD,EAAWlb,MCJ3E0Z,EAAoBvf,EAAI,CAAC,EAGzBuf,EAAoBvgB,EAAKiiB,GACjBte,QAAQue,IAAIrhB,OAAOud,KAAKmC,EAAoBvf,GAAGmhB,OAAO,CAACC,EAAUvb,KACvE0Z,EAAoBvf,EAAE6F,GAAKob,EAASG,GAC7BA,GACL,KCNJ7B,EAAoB3f,EAAKqhB,GAEjB,UAAY,CAAC,IAAM,uBAAuB,IAAM,wBAAwBA,GAAW,MCF3F1B,EAAoB8B,SAAYJ,MCDhC1B,EAAoB+B,EAAI,WACvB,GAA0B,iBAAf/d,WAAyB,OAAOA,WAC3C,IACC,OAAOmd,MAAQ,IAAIa,SAAS,cAAb,EAChB,CAAE,MAAOviB,GACR,GAAsB,iBAAX0E,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxB6b,EAAoBjgB,EAAI,CAACkhB,EAAKgB,IAAU3hB,OAAOH,UAAU6G,eAAe5F,KAAK6f,EAAKgB,GdA9E1iB,EAAa,CAAC,EACdC,EAAoB,mBAExBwgB,EAAoB9e,EAAI,CAACghB,EAAK7gB,EAAMiF,EAAKob,KACxC,GAAGniB,EAAW2iB,GAAQ3iB,EAAW2iB,GAAKpY,KAAKzI,OAA3C,CACA,IAAI8gB,EAAQC,EACZ,QAAW9d,IAARgC,EAEF,IADA,IAAI+b,EAAU7Z,SAAS8Z,qBAAqB,UACpCriB,EAAI,EAAGA,EAAIoiB,EAAQphB,OAAQhB,IAAK,CACvC,IAAIkI,EAAIka,EAAQpiB,GAChB,GAAGkI,EAAEoa,aAAa,QAAUL,GAAO/Z,EAAEoa,aAAa,iBAAmB/iB,EAAoB8G,EAAK,CAAE6b,EAASha,EAAG,KAAO,CACpH,CAEGga,IACHC,GAAa,GACbD,EAAS3Z,SAASG,cAAc,WAEzB6Z,QAAU,QACbxC,EAAoByC,IACvBN,EAAOO,aAAa,QAAS1C,EAAoByC,IAElDN,EAAOO,aAAa,eAAgBljB,EAAoB8G,GAExD6b,EAAOQ,IAAMT,EAC4C,IAArDC,EAAOQ,IAAIvY,QAAQjG,OAAOI,SAASmZ,OAAS,OAC/CyE,EAAOS,YAAc,aAEtBT,EAAOU,UAAY7C,EAAoB8C,UAAUpB,GACjDS,EAAOS,YAAc,aAEtBrjB,EAAW2iB,GAAO,CAAC7gB,GACnB,IAAI0hB,EAAmB,CAACC,EAAM5H,KAE7B+G,EAAOc,QAAUd,EAAOe,OAAS,KACjCC,aAAaC,GACb,IAAIC,EAAU9jB,EAAW2iB,GAIzB,UAHO3iB,EAAW2iB,GAClBC,EAAOmB,YAAcnB,EAAOmB,WAAWC,YAAYpB,GACnDkB,GAAWA,EAAQrW,QAASwT,GAAQA,EAAGpF,IACpC4H,EAAM,OAAOA,EAAK5H,IAElBgI,EAAUI,WAAWT,EAAiB/hB,KAAK,UAAMsD,EAAW,CAAEuL,KAAM,UAAW4T,OAAQtB,IAAW,MACtGA,EAAOc,QAAUF,EAAiB/hB,KAAK,KAAMmhB,EAAOc,SACpDd,EAAOe,OAASH,EAAiB/hB,KAAK,KAAMmhB,EAAOe,QACnDd,GAAc5Z,SAASkb,KAAK7a,YAAYsZ,EAxCkB,GeH3DnC,EAAoBrgB,EAAKmgB,IACH,oBAAXlgB,QAA0BA,OAAOI,aAC1CM,OAAO0B,eAAe8d,EAASlgB,OAAOI,YAAa,CAAEsB,MAAO,WAE7DhB,OAAO0B,eAAe8d,EAAS,aAAc,CAAExe,OAAO,KCLvD0e,EAAoB2D,IAAO9D,IAC1BA,EAAO+D,MAAQ,GACV/D,EAAOgE,WAAUhE,EAAOgE,SAAW,IACjChE,GCHRG,EAAoBtf,EAAI,ICCxBsf,EAAoB8C,UAAY,CAAC,IAAM,0EAA0E,IAAM,2E,MCIvH,IAAIgB,EAAkB,CACrB,IAAK,GAGN9D,EAAoBvf,EAAEoJ,EAAI,CAAC6X,EAASG,KAElC,IAAIkC,EAAqB/D,EAAoBjgB,EAAE+jB,EAAiBpC,GAAWoC,EAAgBpC,QAAWpd,EACtG,GAA0B,IAAvByf,EAGF,GAAGA,EACFlC,EAAS/X,KAAKia,EAAmB,QAC3B,CAGL,IAAIC,EAAU,IAAI5gB,QAAQ,CAACC,EAAS4gB,IAAYF,EAAqBD,EAAgBpC,GAAW,CAACre,EAAS4gB,IAC1GpC,EAAS/X,KAAKia,EAAmB,GAAKC,GAGtC,IAAI9B,EAAMlC,EAAoBtf,EAAIsf,EAAoB3f,EAAEqhB,GAEpD9P,EAAQ,IAAI7M,MAgBhBib,EAAoB9e,EAAEghB,EAfF9G,IACnB,GAAG4E,EAAoBjgB,EAAE+jB,EAAiBpC,KAEf,KAD1BqC,EAAqBD,EAAgBpC,MACRoC,EAAgBpC,QAAWpd,GACrDyf,GAAoB,CACtB,IAAIG,EAAY9I,IAAyB,SAAfA,EAAMvL,KAAkB,UAAYuL,EAAMvL,MAChEsU,EAAU/I,GAASA,EAAMqI,QAAUrI,EAAMqI,OAAOd,IACpD/Q,EAAMlJ,QAAU,iBAAmBgZ,EAAU,cAAgBwC,EAAY,KAAOC,EAAU,IAC1FvS,EAAM3O,KAAO,iBACb2O,EAAM/B,KAAOqU,EACbtS,EAAMwS,QAAUD,EAChBJ,EAAmB,GAAGnS,EACvB,GAGuC,SAAW8P,EAASA,EAE/D,GAYH1B,EAAoBM,EAAEzW,EAAK6X,GAA0C,IAA7BoC,EAAgBpC,GAGxD,IAAI2C,EAAuB,CAACC,EAA4B1R,KACvD,IAGIqN,EAAUyB,GAHTnB,EAAUgE,EAAaC,GAAW5R,EAGhB3S,EAAI,EAC3B,GAAGsgB,EAASkE,KAAMtE,GAAgC,IAAxB2D,EAAgB3D,IAAa,CACtD,IAAIF,KAAYsE,EACZvE,EAAoBjgB,EAAEwkB,EAAatE,KACrCD,EAAoBje,EAAEke,GAAYsE,EAAYtE,IAGhD,GAAGuE,EAAS,IAAI9a,EAAS8a,EAAQxE,EAClC,CAEA,IADGsE,GAA4BA,EAA2B1R,GACrD3S,EAAIsgB,EAAStf,OAAQhB,IACzByhB,EAAUnB,EAAStgB,GAChB+f,EAAoBjgB,EAAE+jB,EAAiBpC,IAAYoC,EAAgBpC,IACrEoC,EAAgBpC,GAAS,KAE1BoC,EAAgBpC,GAAW,EAE5B,OAAO1B,EAAoBM,EAAE5W,IAG1Bgb,EAAqBC,KAAkC,4BAAIA,KAAkC,6BAAK,GACtGD,EAAmB1X,QAAQqX,EAAqBrjB,KAAK,KAAM,IAC3D0jB,EAAmB5a,KAAOua,EAAqBrjB,KAAK,KAAM0jB,EAAmB5a,KAAK9I,KAAK0jB,G,KClFvF,IAAIE,EAAsB5E,EAAoBM,OAAEhc,EAAW,CAAC,IAAK,IAAO0b,EAAoB,MAC5F4E,EAAsB5E,EAAoBM,EAAEsE,E","sources":["webpack://export-and-sign/webpack/runtime/chunk loaded","webpack://export-and-sign/webpack/runtime/create fake namespace object","webpack://export-and-sign/webpack/runtime/load script","webpack://export-and-sign/../shared/turnkey-core.js","webpack://export-and-sign/./src/turnkey-core.js","webpack://export-and-sign/./src/event-handlers.js","webpack://export-and-sign/../shared/crypto-utils.js","webpack://export-and-sign/./src/index.js","webpack://export-and-sign/external var \"crypto\"","webpack://export-and-sign/webpack/bootstrap","webpack://export-and-sign/webpack/runtime/compat get default export","webpack://export-and-sign/webpack/runtime/define property getters","webpack://export-and-sign/webpack/runtime/ensure chunk","webpack://export-and-sign/webpack/runtime/get javascript chunk filename","webpack://export-and-sign/webpack/runtime/get mini-css chunk filename","webpack://export-and-sign/webpack/runtime/global","webpack://export-and-sign/webpack/runtime/hasOwnProperty shorthand","webpack://export-and-sign/webpack/runtime/make namespace object","webpack://export-and-sign/webpack/runtime/node module decorator","webpack://export-and-sign/webpack/runtime/publicPath","webpack://export-and-sign/webpack/runtime/compat","webpack://export-and-sign/webpack/runtime/jsonp chunk loading","webpack://export-and-sign/webpack/startup"],"sourcesContent":["var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var getProto = Object.getPrototypeOf ? (obj) => (Object.getPrototypeOf(obj)) : (obj) => (obj.__proto__);\nvar leafPrototypes;\n// create a fake namespace object\n// mode & 1: value is a module id, require it\n// mode & 2: merge all properties of value into the ns\n// mode & 4: return value when already ns object\n// mode & 16: return value when it's Promise-like\n// mode & 8|1: behave like require\n__webpack_require__.t = function(value, mode) {\n\tif(mode & 1) value = this(value);\n\tif(mode & 8) return value;\n\tif(typeof value === 'object' && value) {\n\t\tif((mode & 4) && value.__esModule) return value;\n\t\tif((mode & 16) && typeof value.then === 'function') return value;\n\t}\n\tvar ns = Object.create(null);\n\t__webpack_require__.r(ns);\n\tvar def = {};\n\tleafPrototypes = leafPrototypes || [null, getProto({}), getProto([]), getProto(getProto)];\n\tfor(var current = mode & 2 && value; (typeof current == 'object' || typeof current == 'function') && !~leafPrototypes.indexOf(current); current = getProto(current)) {\n\t\tObject.getOwnPropertyNames(current).forEach((key) => (def[key] = () => (value[key])));\n\t}\n\tdef['default'] = () => (value);\n\t__webpack_require__.d(ns, def);\n\treturn ns;\n};","var inProgress = {};\nvar dataWebpackPrefix = \"export-and-sign:\";\n// loadScript function to load a script via script tag\n__webpack_require__.l = (url, done, key, chunkId) => {\n\tif(inProgress[url]) { inProgress[url].push(done); return; }\n\tvar script, needAttach;\n\tif(key !== undefined) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tfor(var i = 0; i < scripts.length; i++) {\n\t\t\tvar s = scripts[i];\n\t\t\tif(s.getAttribute(\"src\") == url || s.getAttribute(\"data-webpack\") == dataWebpackPrefix + key) { script = s; break; }\n\t\t}\n\t}\n\tif(!script) {\n\t\tneedAttach = true;\n\t\tscript = document.createElement('script');\n\n\t\tscript.charset = 'utf-8';\n\t\tif (__webpack_require__.nc) {\n\t\t\tscript.setAttribute(\"nonce\", __webpack_require__.nc);\n\t\t}\n\t\tscript.setAttribute(\"data-webpack\", dataWebpackPrefix + key);\n\n\t\tscript.src = url;\n\t\tif (script.src.indexOf(window.location.origin + '/') !== 0) {\n\t\t\tscript.crossOrigin = \"anonymous\";\n\t\t}\n\t\tscript.integrity = __webpack_require__.sriHashes[chunkId];\n\t\tscript.crossOrigin = \"anonymous\";\n\t}\n\tinProgress[url] = [done];\n\tvar onScriptComplete = (prev, event) => {\n\t\t// avoid mem leaks in IE.\n\t\tscript.onerror = script.onload = null;\n\t\tclearTimeout(timeout);\n\t\tvar doneFns = inProgress[url];\n\t\tdelete inProgress[url];\n\t\tscript.parentNode && script.parentNode.removeChild(script);\n\t\tdoneFns && doneFns.forEach((fn) => (fn(event)));\n\t\tif(prev) return prev(event);\n\t}\n\tvar timeout = setTimeout(onScriptComplete.bind(null, undefined, { type: 'timeout', target: script }), 120000);\n\tscript.onerror = onScriptComplete.bind(null, script.onerror);\n\tscript.onload = onScriptComplete.bind(null, script.onload);\n\tneedAttach && document.head.appendChild(script);\n};","import { bech32 } from \"bech32\";\n\n/**\n * Turnkey Core Module - Shared\n * Contains all the core cryptographic and utility functions shared across frames\n */\n\n/** constants for LocalStorage */\nconst TURNKEY_EMBEDDED_KEY = \"TURNKEY_EMBEDDED_KEY\";\nconst TURNKEY_TARGET_EMBEDDED_KEY = \"TURNKEY_TARGET_EMBEDDED_KEY\";\nconst TURNKEY_SETTINGS = \"TURNKEY_SETTINGS\";\n/** 48 hours in milliseconds */\nconst TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 48;\nconst TURNKEY_EMBEDDED_KEY_ORIGIN = \"TURNKEY_EMBEDDED_KEY_ORIGIN\";\n\nlet parentFrameMessageChannelPort = null;\nvar cryptoProviderOverride = null;\n\n/*\n * Returns a reference to the WebCrypto subtle interface regardless of the host environment.\n */\nfunction getSubtleCrypto() {\n if (cryptoProviderOverride && cryptoProviderOverride.subtle) {\n return cryptoProviderOverride.subtle;\n }\n if (\n typeof globalThis !== \"undefined\" &&\n globalThis.crypto &&\n globalThis.crypto.subtle\n ) {\n return globalThis.crypto.subtle;\n }\n if (typeof window !== \"undefined\" && window.crypto && window.crypto.subtle) {\n return window.crypto.subtle;\n }\n if (typeof global !== \"undefined\" && global.crypto && global.crypto.subtle) {\n return global.crypto.subtle;\n }\n if (typeof crypto !== \"undefined\" && crypto.subtle) {\n return crypto.subtle;\n }\n\n return null;\n}\n\n/*\n * Allows tests to explicitly set the crypto provider (e.g. crypto.webcrypto) when the runtime\n * environment does not expose one on the global/window objects.\n */\nfunction setCryptoProvider(cryptoProvider) {\n cryptoProviderOverride = cryptoProvider || null;\n}\n\n/* Security functions */\n\nfunction isDoublyIframed() {\n if (window.location.ancestorOrigins !== undefined) {\n // Does not exist in IE and firefox.\n // See https://developer.mozilla.org/en-US/docs/Web/API/Location/ancestorOrigins for how this works\n return window.location.ancestorOrigins.length > 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n dev: \"048cf9ed5f579298cc1571823a3222b82d80c529c551f6070fbe712ae1a9e8d1a23b7006e306d27190358dfcd9c44624918a00f23c920a33cb14f5b026eafc865d\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions ( 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @param {HTMLElement} element - Optional element parameter (for import frame)\n * @return {Object}\n */\nfunction validateStyles(styles, element) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n};\n","import * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\nimport { fromDerSignature } from \"@turnkey/crypto\";\nimport * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n initEmbeddedKey: sharedInitEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n additionalAssociatedData,\n getSettings,\n setSettings,\n parsePrivateKey,\n validateStyles,\n isDoublyIframed,\n loadQuorumKey,\n} = SharedTKHQ;\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n return await sharedInitEmbeddedKey();\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Read environment from meta tag (templated at deploy time), fall back to window variable (for testing)\n let environment = null;\n if (typeof document !== \"undefined\") {\n const meta = document.querySelector(\n 'meta[name=\"turnkey-signer-environment\"]'\n );\n if (\n meta &&\n meta.content &&\n meta.content !== \"__TURNKEY_SIGNER_ENVIRONMENT__\"\n ) {\n environment = meta.content;\n }\n }\n if (!environment && typeof window !== \"undefined\") {\n environment = window.__TURNKEY_SIGNER_ENVIRONMENT__;\n }\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n return await crypto.subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Returns the public key bytes for a hex-encoded Ed25519 private key.\n * @param {string} privateKeyHex\n */\nfunction getEd25519PublicKey(privateKeyHex) {\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n return nobleEd25519.getPublicKey(privateKeyHex);\n}\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n if (!settings) {\n return JSON.stringify(validSettings);\n }\n const settingsObj = JSON.parse(settings);\n if (settingsObj.styles) {\n // Valid styles will be applied the \"key-div\" div HTML element.\n const keyDivTextarea = document.getElementById(\"key-div\");\n if (!keyDivTextarea) {\n throw new Error(\"no key-div HTML element found to apply settings to.\");\n }\n\n // Validate, sanitize, and apply the styles to the \"key-div\" div element.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n keyDivTextarea.style[key] = value;\n });\n\n validSettings[\"styles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport const TKHQ = {\n initEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n getEd25519PublicKey,\n applySettings,\n validateStyles,\n getSettings,\n setSettings,\n parsePrivateKey,\n};\n","import { TKHQ } from \"./turnkey-core.js\";\nimport { Keypair, VersionedTransaction } from \"@solana/web3.js\";\nimport * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\n\n// Persist keys in memory via mapping of { address --> pk }\nlet inMemoryKeys = {};\n\n// Injected embedded key -- held in memory only, never persisted.\n// When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key.\nlet injectedEmbeddedKey = null;\n\nexport const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds\n\n// Instantiate these once (for perf)\nconst textEncoder = new TextEncoder();\nconst textDecoder = new TextDecoder();\n\n/**\n * Verifies the enclave signature on a v1.0.0 bundle and returns the parsed signed data.\n * @param {string} bundle - JSON-stringified bundle\n * @param {string} organizationId - Expected organization ID\n * @returns {Promise} - The parsed signed data {organizationId, encappedPublic, ciphertext}\n */\nasync function verifyAndParseBundleData(bundle, organizationId) {\n const bundleObj = JSON.parse(bundle);\n\n if (bundleObj.version !== \"v1.0.0\") {\n throw new Error(`unsupported version: ${bundleObj.version}`);\n }\n if (!bundleObj.data) {\n throw new Error('missing \"data\" in bundle');\n }\n if (!bundleObj.dataSignature) {\n throw new Error('missing \"dataSignature\" in bundle');\n }\n if (!bundleObj.enclaveQuorumPublic) {\n throw new Error('missing \"enclaveQuorumPublic\" in bundle');\n }\n\n if (!TKHQ.verifyEnclaveSignature) {\n throw new Error(\"method TKHQ.verifyEnclaveSignature not loaded\");\n }\n const verified = await TKHQ.verifyEnclaveSignature(\n bundleObj.enclaveQuorumPublic,\n bundleObj.dataSignature,\n bundleObj.data\n );\n if (!verified) {\n throw new Error(\n `failed to verify enclave signature. Got signature: ${bundleObj.dataSignature}, enclaveQuorumPublic: ${bundleObj.enclaveQuorumPublic}`\n );\n }\n\n const signedData = JSON.parse(\n textDecoder.decode(TKHQ.uint8arrayFromHexString(bundleObj.data))\n );\n\n if (!organizationId) {\n throw new Error(\n `organization id is required. Please ensure you are using @turnkey/iframe-stamper >= v2.0.0 to pass \"organizationId\" for security purposes.`\n );\n } else if (\n !signedData.organizationId ||\n signedData.organizationId !== organizationId\n ) {\n throw new Error(\n `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.`\n );\n }\n\n if (!signedData.encappedPublic) {\n throw new Error('missing \"encappedPublic\" in bundle signed data');\n }\n if (!signedData.ciphertext) {\n throw new Error('missing \"ciphertext\" in bundle signed data');\n }\n\n return signedData;\n}\n\n/**\n * Parse and decrypt the export bundle.\n * The `bundle` param is a JSON string of the encapsulated public\n * key, encapsulated public key signature, and the ciphertext.\n * @param {string} bundle\n * @param {string} organizationId\n * @param {Function} HpkeDecrypt\n */\nasync function decryptBundle(bundle, organizationId, HpkeDecrypt) {\n const signedData = await verifyAndParseBundleData(bundle, organizationId);\n\n const encappedKeyBuf = TKHQ.uint8arrayFromHexString(\n signedData.encappedPublic\n );\n const ciphertextBuf = TKHQ.uint8arrayFromHexString(signedData.ciphertext);\n\n // Use the injected embedded key if available, otherwise fall back to the embedded key\n const receiverPrivJwk = injectedEmbeddedKey || (await TKHQ.getEmbeddedKey());\n return await HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n });\n}\n\n/**\n * Function triggered when GET_EMBEDDED_PUBLIC_KEY event is received.\n * @param {string} requestId\n */\nasync function onGetPublicEmbeddedKey(requestId) {\n const embeddedKeyJwk = TKHQ.getEmbeddedKey();\n\n if (!embeddedKeyJwk) {\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", \"\", requestId); // no key == empty string\n\n return;\n }\n\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n\n // Send up EMBEDDED_PUBLIC_KEY message\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", targetPubHex, requestId);\n}\n\n/**\n * Encodes raw key bytes and loads them into the in-memory key store.\n * @param {string} address - Wallet address (case-sensitive)\n * @param {ArrayBuffer} keyBytes - Raw decrypted private key bytes\n * @param {string} keyFormat - \"SOLANA\" | \"HEXADECIMAL\"\n * @param {string} organizationId - Organization ID\n */\nasync function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) {\n let key;\n const privateKeyBytes = new Uint8Array(keyBytes);\n\n if (keyFormat === \"SOLANA\") {\n const privateKeyHex = TKHQ.uint8arrayToHexString(\n privateKeyBytes.subarray(0, 32)\n );\n const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex);\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes);\n } else {\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat);\n }\n\n const keyAddress = address || \"default\";\n\n // Cache keypair for improved signing perf\n let cachedKeypair;\n if (keyFormat === \"SOLANA\") {\n cachedKeypair = Keypair.fromSecretKey(TKHQ.base58Decode(key));\n } else if (keyFormat === \"HEXADECIMAL\") {\n cachedKeypair = await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key))\n );\n }\n\n inMemoryKeys = {\n ...inMemoryKeys,\n [keyAddress]: {\n organizationId,\n privateKey: key,\n format: keyFormat,\n expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS,\n keypair: cachedKeypair,\n },\n };\n}\n\n/**\n * Function triggered when INJECT_KEY_EXPORT_BUNDLE event is received.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle\n * @param {string} keyFormat\n * @param {string} address\n * @param {Function} HpkeDecrypt // TODO: import this directly (instead of passing around)\n */\nasync function onInjectKeyBundle(\n requestId,\n organizationId,\n bundle,\n keyFormat,\n address,\n HpkeDecrypt\n) {\n // Decrypt the export bundle\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Load decrypted key into memory\n await loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId);\n\n // Send up BUNDLE_INJECTED message\n TKHQ.sendMessageUp(\"BUNDLE_INJECTED\", true, requestId);\n}\n\n/**\n * Function triggered when APPLY_SETTINGS event is received.\n * For now, the only settings that can be applied are for \"styles\".\n * Persist them in local storage so they can be applied on every\n * page load.\n * @param {string} settings: JSON-stringified settings\n * @param {string} requestId\n */\nasync function onApplySettings(settings, requestId) {\n // Apply settings\n const validSettings = TKHQ.applySettings(settings);\n\n // Persist in local storage\n TKHQ.setSettings(validSettings);\n\n // Send up SETTINGS_APPLIED message\n TKHQ.sendMessageUp(\"SETTINGS_APPLIED\", true, requestId);\n}\n\n/**\n * Function triggered when SIGN_TRANSACTION event is received.\n * @param {string} requestId\n * @param {string} transaction (serialized)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignTransaction(requestId, serializedTransaction, address) {\n // If no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and is valid/non-expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n const transactionWrapper = JSON.parse(serializedTransaction);\n const transactionToSign = transactionWrapper.transaction;\n const transactionType = transactionWrapper.type;\n\n let signedTransaction;\n\n if (transactionType === \"SOLANA\") {\n // Fetch the transaction and sign\n const transactionBytes = TKHQ.uint8arrayFromHexString(transactionToSign);\n const transaction = VersionedTransaction.deserialize(transactionBytes);\n transaction.sign([keypair]);\n\n signedTransaction = transaction.serialize();\n } else {\n throw new Error(\"unsupported transaction type\");\n }\n\n const signedTransactionHex = TKHQ.uint8arrayToHexString(signedTransaction);\n\n TKHQ.sendMessageUp(\"TRANSACTION_SIGNED\", signedTransactionHex, requestId);\n}\n\n/**\n * Function triggered when SIGN_MESSAGE event is received.\n * @param {string} requestId\n * @param {string} message (serialized, JSON-stringified)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignMessage(requestId, serializedMessage, address) {\n // Backwards compatibility: if no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and has not expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n const messageWrapper = JSON.parse(serializedMessage);\n const messageToSign = messageWrapper.message;\n const messageType = messageWrapper.type;\n const messageBytes = textEncoder.encode(messageToSign);\n\n let signatureHex;\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n if (messageType === \"SOLANA\") {\n // Set up sha512 for nobleEd25519 (required for signing)\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n\n // Extract the 32-byte private key from the 64-byte secretKey\n // Solana keypair.secretKey format: [32-byte private key][32-byte public key]\n const privateKey = keypair.secretKey.slice(0, 32);\n // Sign the message using nobleEd25519\n const signature = nobleEd25519.sign(messageBytes, privateKey);\n\n // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair.\n // Clients can verify the signature returned.\n\n signatureHex = TKHQ.uint8arrayToHexString(signature);\n } else {\n TKHQ.sendMessageUp(\"ERROR\", \"unsupported message type\", requestId);\n\n return;\n }\n\n TKHQ.sendMessageUp(\"MESSAGE_SIGNED\", signatureHex, requestId);\n}\n\n/**\n * Function triggered when CLEAR_EMBEDDED_PRIVATE_KEY event is received.\n * @param {string} requestId\n * @param {string} address - Optional: The address of the key to clear (case-sensitive). If not provided, clears all keys.\n */\nasync function onClearEmbeddedPrivateKey(requestId, address) {\n // If no address is provided, clear all keys\n if (!address) {\n inMemoryKeys = {};\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n\n return;\n }\n\n // Check if key exists for the specific address\n if (!inMemoryKeys[address]) {\n TKHQ.sendMessageUp(\n \"ERROR\",\n new Error(\n `key not found for address ${address}. Note that address is case sensitive.`\n ).toString(),\n requestId\n );\n\n return;\n }\n\n // Clear the specific key from memory\n delete inMemoryKeys[address];\n\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n}\n\n/**\n * Handler for SET_EMBEDDED_KEY_OVERRIDE events.\n * Decrypts a P-256 private key bundle using the iframe's embedded key and\n * overrides the embedded key with it for subsequent bundle decryptions.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle - v1.0.0 bundle containing the P-256 private key\n * @param {Function} HpkeDecrypt\n */\nasync function onSetEmbeddedKeyOverride(\n requestId,\n organizationId,\n bundle,\n HpkeDecrypt\n) {\n // Decrypt the private key using the iframe's embedded key.\n // The decrypted payload is a raw 32-byte P-256 private key scalar.\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto)\n const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes));\n\n // Store in module-level variable (memory only)\n injectedEmbeddedKey = keyJwk;\n\n TKHQ.sendMessageUp(\"EMBEDDED_KEY_OVERRIDE_SET\", true, requestId);\n}\n\n/**\n * Handler for RESET_TO_DEFAULT_EMBEDDED_KEY events.\n * Clears the embedded key from memory, replacing it with the iframe's default embedded key.\n * @param {string} requestId\n */\nfunction onResetToDefaultEmbeddedKey(requestId) {\n injectedEmbeddedKey = null;\n TKHQ.sendMessageUp(\"RESET_TO_DEFAULT_EMBEDDED_KEY\", true, requestId);\n}\n\n// Utility functions\nasync function createSolanaKeypair(privateKey) {\n const privateKeyBytes = TKHQ.parsePrivateKey(privateKey);\n\n let keypair;\n if (privateKeyBytes.length === 32) {\n // 32-byte private key (seed)\n keypair = Keypair.fromSeed(privateKeyBytes);\n } else if (privateKeyBytes.length === 64) {\n // 64-byte secret key (private + public)\n keypair = Keypair.fromSecretKey(privateKeyBytes);\n } else {\n throw new Error(\n `Invalid private key length: ${privateKeyBytes.length}. Expected 32 or 64 bytes.`\n );\n }\n\n return keypair;\n}\n\n/**\n * Converts raw P-256 private key bytes (32-byte scalar) to a JWK.\n * Constructs a PKCS8 wrapper around the raw bytes, imports via WebCrypto\n * (which derives the public key), then exports as JWK.\n * @param {Uint8Array} rawPrivateKeyBytes - 32-byte P-256 private key scalar\n * @returns {Promise} - Full P-256 ECDH private key JWK\n */\nasync function rawP256PrivateKeyToJwk(rawPrivateKeyBytes) {\n if (rawPrivateKeyBytes.length !== 32) {\n throw new Error(\n `invalid decryption key length: expected 32 bytes, got ${rawPrivateKeyBytes.length}`\n );\n }\n\n // Fixed PKCS#8 DER prefix for a P-256 private key (36 bytes).\n // This wraps a raw 32-byte scalar into the PrivateKeyInfo structure\n // that WebCrypto's importKey(\"pkcs8\", ...) expects.\n //\n // Structure (per RFC 5958 §2 / RFC 5208 §5):\n // SEQUENCE {\n // INTEGER 0 -- version (v1)\n // SEQUENCE { -- AlgorithmIdentifier (RFC 5480 §2.1.1)\n // OID 1.2.840.10045.2.1 -- id-ecPublicKey\n // OID 1.2.840.10045.3.1.7 -- secp256r1 (P-256)\n // }\n // OCTET STRING { -- privateKey (SEC 1 §C.4 / RFC 5915 §3)\n // SEQUENCE {\n // INTEGER 1 -- version\n // OCTET STRING (32 bytes) -- raw private key scalar\n // }\n // }\n // }\n //\n // References:\n // - RFC 5958 / RFC 5208: PKCS#8 PrivateKeyInfo\n // - RFC 5480 §2.1.1: ECC AlgorithmIdentifier (OIDs)\n // - RFC 5915 / SEC 1 v2 §C.4: ECPrivateKey encoding\n const pkcs8Prefix = new Uint8Array([\n 0x30, 0x41, 0x02, 0x01, 0x00, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48,\n 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03,\n 0x01, 0x07, 0x04, 0x27, 0x30, 0x25, 0x02, 0x01, 0x01, 0x04, 0x20,\n ]);\n\n const pkcs8 = new Uint8Array(pkcs8Prefix.length + 32);\n pkcs8.set(pkcs8Prefix);\n pkcs8.set(rawPrivateKeyBytes, pkcs8Prefix.length);\n\n const cryptoKey = await crypto.subtle.importKey(\n \"pkcs8\",\n pkcs8,\n { name: \"ECDH\", namedCurve: \"P-256\" },\n true,\n [\"deriveBits\"]\n );\n\n return await crypto.subtle.exportKey(\"jwk\", cryptoKey);\n}\n\n/**\n * Generates the error message for missing or expired keys.\n * @param {string} keyAddress - The address of the key\n * @returns {string} - The error message string\n */\nexport function getKeyNotFoundErrorMessage(keyAddress) {\n return `key bytes have expired. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`;\n}\n\n/**\n * Clears an expired key from memory. This is an internal helper function\n * that clears the key without sending messages to the parent frame.\n * @param {string} keyAddress - The address of the key to clear\n */\nfunction clearExpiredKey(keyAddress) {\n if (inMemoryKeys[keyAddress]) {\n delete inMemoryKeys[keyAddress];\n }\n}\n\n/**\n * Clears all expired keys from memory.\n * This function iterates through all keys and removes any that have expired.\n */\nfunction clearAllExpiredKeys() {\n const now = new Date().getTime();\n const addressesToRemove = [];\n\n for (const [address, key] of Object.entries(inMemoryKeys)) {\n if (key.expiry && now >= key.expiry) {\n addressesToRemove.push(address);\n }\n }\n\n for (const address of addressesToRemove) {\n clearExpiredKey(address);\n }\n}\n\n/**\n * Validates that a key exists and has not expired.\n * Clears the key from memory if it has expired.\n * Throws error if validation fails (and caller will send message up back to parent).\n * @param {Object} key - The key object from inMemoryKeys\n * @param {string} keyAddress - The address of the key\n * @returns {boolean} - True if key is valid, false otherwise\n */\nfunction validateKey(key, keyAddress) {\n if (!key) {\n throw new Error(\n `key bytes not found. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`\n ).toString();\n }\n\n const now = new Date().getTime();\n if (now >= key.expiry) {\n // Clear all expired keys before processing the signing request\n clearAllExpiredKeys();\n throw new Error(getKeyNotFoundErrorMessage(keyAddress)).toString();\n }\n\n return true;\n}\n\n/**\n * Gets or creates a Solana keypair from a key object.\n * Uses cached keypair if available, otherwise creates a new one.\n * @param {Object} key - The key object containing format and privateKey\n * @returns {Promise} - The Solana keypair\n */\nasync function getOrCreateKeypair(key) {\n if (key.keypair) {\n return key.keypair;\n }\n\n if (key.format === \"SOLANA\") {\n return Keypair.fromSecretKey(TKHQ.base58Decode(key.privateKey));\n } else {\n return await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key.privateKey))\n );\n }\n}\n\n/**\n * DOM Event handlers to power the export flow in standalone mode\n * Instead of receiving events from the parent page, forms trigger them.\n * This is useful for debugging as well.\n */\nfunction addDOMEventListeners() {\n // only support injected keys, not wallets\n document.getElementById(\"inject-key\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_KEY_EXPORT_BUNDLE\",\n value: document.getElementById(\"key-export-bundle\").value,\n keyFormat: document.getElementById(\"key-export-format\").value,\n organizationId: document.getElementById(\"key-organization-id\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-transaction\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_TRANSACTION\",\n value: document.getElementById(\"transaction-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-message\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_MESSAGE\",\n value: document.getElementById(\"message-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"reset\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({ type: \"RESET_EMBEDDED_KEY\" });\n },\n false\n );\n\n // Add wallet injection support\n const injectWalletBtn = document.getElementById(\"inject-wallet\");\n if (injectWalletBtn) {\n injectWalletBtn.addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_WALLET_EXPORT_BUNDLE\",\n value: document.getElementById(\"wallet-export-bundle\").value,\n organizationId: document.getElementById(\"wallet-organization-id\")\n .value,\n });\n },\n false\n );\n }\n}\n\n/**\n * Message Event Handlers to process messages from the parent frame\n */\nfunction initMessageEventListener(HpkeDecrypt) {\n return async function messageEventListener(event) {\n if (event.data && event.data[\"type\"] == \"INJECT_KEY_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"keyFormat\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"], // bundle\n event.data[\"keyFormat\"],\n event.data[\"address\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"INJECT_WALLET_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n undefined, // keyFormat - default to HEXADECIMAL\n undefined, // address - default to \"default\"\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"APPLY_SETTINGS\") {\n try {\n await onApplySettings(event.data[\"value\"], event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n TKHQ.onResetEmbeddedKey();\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString());\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_TRANSACTION\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignTransaction(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_MESSAGE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignMessage(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"CLEAR_EMBEDDED_PRIVATE_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onClearEmbeddedPrivateKey(\n event.data[\"requestId\"],\n event.data[\"address\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"GET_EMBEDDED_PUBLIC_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onGetPublicEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SET_EMBEDDED_KEY_OVERRIDE\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onSetEmbeddedKeyOverride(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_TO_DEFAULT_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n onResetToDefaultEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n };\n}\n\n/**\n * Set up event handlers for both DOM and message events\n * @param {Function} HpkeDecrypt\n */\nexport function initEventHandlers(HpkeDecrypt) {\n const messageEventListener = initMessageEventListener(HpkeDecrypt);\n\n // controllers to remove event listeners\n const messageListenerController = new AbortController();\n const turnkeyInitController = new AbortController();\n\n // Add DOM event listeners for standalone mode\n addDOMEventListeners();\n\n // Add window message listener for iframe mode\n window.addEventListener(\"message\", messageEventListener, {\n capture: false,\n signal: messageListenerController.signal,\n });\n\n // Guard to prevent concurrent channel establishment from multiple senders\n let channelEstablished = false;\n\n // Handle MessageChannel initialization for iframe communication\n window.addEventListener(\n \"message\",\n async function (event) {\n /**\n * @turnkey/iframe-stamper >= v2.1.0 is using a MessageChannel to communicate with the parent frame.\n * The parent frame sends a TURNKEY_INIT_MESSAGE_CHANNEL event with the MessagePort.\n * If we receive this event, we want to remove the message event listener that was added in the DOMContentLoaded event to avoid processing messages twice.\n * We persist the MessagePort so we can use it to communicate with the parent window in subsequent calls to TKHQ.sendMessageUp\n */\n if (\n event.data &&\n event.data[\"type\"] == \"TURNKEY_INIT_MESSAGE_CHANNEL\" &&\n event.ports?.[0]\n ) {\n // Synchronously check-and-set the flag before any await. This prevents\n // a second concurrent invocation from racing through while the first is\n // suspended at an await, which would allow multiple origins to establish\n // a channel before turnkeyInitController.abort() is reached.\n if (channelEstablished) {\n return;\n }\n channelEstablished = true;\n\n // remove the message event listener that was added in the DOMContentLoaded event\n messageListenerController.abort();\n\n const iframeMessagePort = event.ports[0];\n iframeMessagePort.onmessage = messageEventListener;\n\n TKHQ.setParentFrameMessageChannelPort(iframeMessagePort);\n\n await TKHQ.initEmbeddedKey(event.origin);\n var embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n var targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n var targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n\n // remove the listener for TURNKEY_INIT_MESSAGE_CHANNEL after it's been processed\n turnkeyInitController.abort();\n }\n },\n { signal: turnkeyInitController.signal }\n );\n\n return { messageEventListener };\n}\n/**\n * Expose internal handlers for targeted testing.\n */\nexport {\n onInjectKeyBundle,\n onSignTransaction,\n onSignMessage,\n onClearEmbeddedPrivateKey,\n onSetEmbeddedKeyOverride,\n onResetToDefaultEmbeddedKey,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n","// This file is the main entrypoint of the webpack-bundled application\n\n// Import relevant modules\nimport { TKHQ } from \"./turnkey-core.js\";\nimport { initEventHandlers } from \"./event-handlers.js\";\nimport { HpkeDecrypt } from \"@shared/crypto-utils.js\";\nimport \"./styles.css\";\n\n// Surface TKHQ for external access\nwindow.TKHQ = TKHQ;\n\n// Init app\ndocument.addEventListener(\"DOMContentLoaded\", async function () {\n await TKHQ.initEmbeddedKey();\n const embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n initEventHandlers(HpkeDecrypt);\n\n // If styles are saved in local storage, sanitize and apply them\n const styleSettings = TKHQ.getSettings();\n if (styleSettings) {\n TKHQ.applySettings(styleSettings);\n }\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n});\n","module.exports = crypto;","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\tid: moduleId,\n\t\tloaded: false,\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId].call(module.exports, module, module.exports, __webpack_require__);\n\n\t// Flag the module as loaded\n\tmodule.loaded = true;\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n","// getDefaultExport function for compatibility with non-harmony modules\n__webpack_require__.n = (module) => {\n\tvar getter = module && module.__esModule ?\n\t\t() => (module['default']) :\n\t\t() => (module);\n\t__webpack_require__.d(getter, { a: getter });\n\treturn getter;\n};","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"bundle.\" + {\"291\":\"3eaea85f4001b9cc63c3\",\"825\":\"aaba32bf7338e3d0f1cc\"}[chunkId] + \".js\";\n};","// This function allow to reference async chunks\n__webpack_require__.miniCssF = (chunkId) => {\n\t// return url for filenames based on template\n\treturn undefined;\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","// define __esModule on exports\n__webpack_require__.r = (exports) => {\n\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n\t}\n\tObject.defineProperty(exports, '__esModule', { value: true });\n};","__webpack_require__.nmd = (module) => {\n\tmodule.paths = [];\n\tif (!module.children) module.children = [];\n\treturn module;\n};","__webpack_require__.p = \"/\";","\n__webpack_require__.sriHashes = {\"291\":\"*-*-*-CHUNK-SRI-HASH-r3NPGwA4ft5fHgGXhVIptCiDVf06qPa+sxzG6L+8GwPuhn89e/\",\"825\":\"*-*-*-CHUNK-SRI-HASH-mfog3UJdGPOmSk4QZbKxsxHPFZtt298WnZNc1aQ1MCgc6YirFj\"};","// no baseURI\n\n// object to store loaded and loading chunks\n// undefined = chunk not loaded, null = chunk preloaded/prefetched\n// [resolve, reject, Promise] = chunk loading, 0 = chunk loaded\nvar installedChunks = {\n\t792: 0\n};\n\n__webpack_require__.f.j = (chunkId, promises) => {\n\t\t// JSONP chunk loading for javascript\n\t\tvar installedChunkData = __webpack_require__.o(installedChunks, chunkId) ? installedChunks[chunkId] : undefined;\n\t\tif(installedChunkData !== 0) { // 0 means \"already installed\".\n\n\t\t\t// a Promise means \"currently loading\".\n\t\t\tif(installedChunkData) {\n\t\t\t\tpromises.push(installedChunkData[2]);\n\t\t\t} else {\n\t\t\t\tif(true) { // all chunks have JS\n\t\t\t\t\t// setup Promise in chunk cache\n\t\t\t\t\tvar promise = new Promise((resolve, reject) => (installedChunkData = installedChunks[chunkId] = [resolve, reject]));\n\t\t\t\t\tpromises.push(installedChunkData[2] = promise);\n\n\t\t\t\t\t// start chunk loading\n\t\t\t\t\tvar url = __webpack_require__.p + __webpack_require__.u(chunkId);\n\t\t\t\t\t// create error before stack unwound to get useful stacktrace later\n\t\t\t\t\tvar error = new Error();\n\t\t\t\t\tvar loadingEnded = (event) => {\n\t\t\t\t\t\tif(__webpack_require__.o(installedChunks, chunkId)) {\n\t\t\t\t\t\t\tinstalledChunkData = installedChunks[chunkId];\n\t\t\t\t\t\t\tif(installedChunkData !== 0) installedChunks[chunkId] = undefined;\n\t\t\t\t\t\t\tif(installedChunkData) {\n\t\t\t\t\t\t\t\tvar errorType = event && (event.type === 'load' ? 'missing' : event.type);\n\t\t\t\t\t\t\t\tvar realSrc = event && event.target && event.target.src;\n\t\t\t\t\t\t\t\terror.message = 'Loading chunk ' + chunkId + ' failed.\\n(' + errorType + ': ' + realSrc + ')';\n\t\t\t\t\t\t\t\terror.name = 'ChunkLoadError';\n\t\t\t\t\t\t\t\terror.type = errorType;\n\t\t\t\t\t\t\t\terror.request = realSrc;\n\t\t\t\t\t\t\t\tinstalledChunkData[1](error);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t};\n\t\t\t\t\t__webpack_require__.l(url, loadingEnded, \"chunk-\" + chunkId, chunkId);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n};\n\n// no prefetching\n\n// no preloaded\n\n// no HMR\n\n// no HMR manifest\n\n__webpack_require__.O.j = (chunkId) => (installedChunks[chunkId] === 0);\n\n// install a JSONP callback for chunk loading\nvar webpackJsonpCallback = (parentChunkLoadingFunction, data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\t// add \"moreModules\" to the modules object,\n\t// then flag all \"chunkIds\" as loaded and fire callback\n\tvar moduleId, chunkId, i = 0;\n\tif(chunkIds.some((id) => (installedChunks[id] !== 0))) {\n\t\tfor(moduleId in moreModules) {\n\t\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t\t}\n\t\t}\n\t\tif(runtime) var result = runtime(__webpack_require__);\n\t}\n\tif(parentChunkLoadingFunction) parentChunkLoadingFunction(data);\n\tfor(;i < chunkIds.length; i++) {\n\t\tchunkId = chunkIds[i];\n\t\tif(__webpack_require__.o(installedChunks, chunkId) && installedChunks[chunkId]) {\n\t\t\tinstalledChunks[chunkId][0]();\n\t\t}\n\t\tinstalledChunks[chunkId] = 0;\n\t}\n\treturn __webpack_require__.O(result);\n}\n\nvar chunkLoadingGlobal = self[\"webpackChunkexport_and_sign\"] = self[\"webpackChunkexport_and_sign\"] || [];\nchunkLoadingGlobal.forEach(webpackJsonpCallback.bind(null, 0));\nchunkLoadingGlobal.push = webpackJsonpCallback.bind(null, chunkLoadingGlobal.push.bind(chunkLoadingGlobal));","// startup\n// Load entry module and return exports\n// This entry module depends on other loaded chunks and execution need to be delayed\nvar __webpack_exports__ = __webpack_require__.O(undefined, [96], () => (__webpack_require__(560)))\n__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n"],"names":["deferred","leafPrototypes","getProto","inProgress","dataWebpackPrefix","e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","getSubtleCrypto","globalThis","crypto","subtle","window","global","isDoublyIframed","undefined","location","ancestorOrigins","parent","top","_loadQuorumKey","_callee","quorumPublic","_context","Error","importKey","namedCurve","_initEmbeddedKey","_callee3","_context3","getEmbeddedKey","generateTargetKey","setEmbeddedKey","_generateTargetKey","_callee4","p256key","_context4","generateKey","exportKey","privateKey","jwtKey","getItemWithExpiry","JSON","parse","targetKey","setItemWithExpiry","stringify","key","ttl","item","expiry","Date","getTime","localStorage","setItem","itemStr","getItem","hasOwnProperty","removeItem","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","concat","logMessage","content","messageLog","document","getElementById","message","createElement","innerText","appendChild","p256JWKPrivateToPublic","_x6","_p256JWKPrivateToPublic","_callee6","jwkPrivate","jwkPrivateCopy","publicKey","_context6","_objectSpread","key_ops","base58Encode","bytes","result","digits","carry","j","push","k","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","currentByte","reverse","_encodeKey","_callee9","privateKeyBytes","keyFormat","publicKeyBytes","concatenatedBytes","_t2","_context9","set","console","warn","sharedInitEmbeddedKey","SharedTKHQ","validateStyles","styles","element","validStyles","cssValidationRegex","padding","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","next","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","loadQuorumKey","_x","_verifyEnclaveSignature","_callee2","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","meta","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context2","prod","preprod","querySelector","__TURNKEY_SIGNER_ENVIRONMENT__","fromDerSignature","verify","hash","TKHQ","initEmbeddedKey","onResetEmbeddedKey","encodeKey","_x0","_x1","_x10","sendMessageUp","type","requestId","postMessage","setParentFrameMessageChannelPort","port","normalizePadding","byteArray","targetLength","paddingLength","fill","expectedZeroCount","zeroCount","verifyEnclaveSignature","_x2","_x3","getEd25519PublicKey","privateKeyHex","nobleEd25519","sha512Sync","_nobleEd25519$etc","nobleHashes","concatBytes","applySettings","settings","validSettings","settingsObj","keyDivTextarea","style","getSettings","setSettings","parsePrivateKey","error","_slicedToArray","inMemoryKeys","injectedEmbeddedKey","textEncoder","TextEncoder","textDecoder","TextDecoder","verifyAndParseBundleData","_verifyAndParseBundleData","_callee8","bundle","organizationId","bundleObj","_context8","version","data","dataSignature","decode","encappedPublic","ciphertext","decryptBundle","_x4","_x5","_decryptBundle","HpkeDecrypt","encappedKeyBuf","ciphertextBuf","receiverPrivJwk","_t9","onGetPublicEmbeddedKey","_onGetPublicEmbeddedKey","_callee0","embeddedKeyJwk","targetPubBuf","targetPubHex","_context0","loadKeyIntoMemory","_x7","_x8","_x9","_loadKeyIntoMemory","_callee1","address","keyBytes","keyAddress","cachedKeypair","_context1","subarray","Keypair","fromSecretKey","createSolanaKeypair","_defineProperty","format","keypair","onInjectKeyBundle","_x11","_x12","_x13","_x14","_onInjectKeyBundle","_callee10","_context10","onApplySettings","_x15","_x16","_onApplySettings","_callee11","_context11","onSignTransaction","_x17","_x18","_x19","_onSignTransaction","_callee12","serializedTransaction","transactionWrapper","transactionToSign","signedTransaction","transactionBytes","transaction","signedTransactionHex","_context12","validateKey","getOrCreateKeypair","VersionedTransaction","deserialize","sign","serialize","onSignMessage","_x20","_x21","_x22","_onSignMessage","_callee13","serializedMessage","messageWrapper","messageToSign","messageType","messageBytes","signatureHex","signature","_context13","encode","secretKey","onClearEmbeddedPrivateKey","_x23","_x24","_onClearEmbeddedPrivateKey","_callee14","_context14","onSetEmbeddedKeyOverride","_x25","_x26","_x27","_x28","_onSetEmbeddedKeyOverride","_callee15","keyJwk","_context15","rawP256PrivateKeyToJwk","onResetToDefaultEmbeddedKey","_x29","_createSolanaKeypair","_callee16","_context16","fromSeed","_x30","_rawP256PrivateKeyToJwk","_callee17","rawPrivateKeyBytes","pkcs8Prefix","pkcs8","cryptoKey","_context17","clearExpiredKey","now","addressesToRemove","_i","_Object$entries","_Object$entries$_i","_i2","_addressesToRemove","clearAllExpiredKeys","getKeyNotFoundErrorMessage","_x31","_getOrCreateKeypair","_callee18","_context18","initEventHandlers","messageEventListener","_messageEventListener","event","_t","_t3","_t4","_t5","_t6","_t7","_t8","_x37","initMessageEventListener","messageListenerController","AbortController","turnkeyInitController","addEventListener","preventDefault","_x32","_x33","_ref3","_x34","_ref4","_x35","injectWalletBtn","_ref5","_callee5","_context5","_x36","addDOMEventListeners","capture","signal","channelEstablished","_ref6","_callee7","_event$ports","iframeMessagePort","_context7","ports","abort","onmessage","origin","_x38","ownKeys","keys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","_HpkeDecrypt","kemContext","receiverPriv","suite","recipientCtx","aad","res","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createRecipientContext","recipientKey","enc","info","open","styleSettings","module","exports","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","id","loaded","__webpack_modules__","O","chunkIds","fn","priority","notFulfilled","Infinity","fulfilled","every","splice","getter","__esModule","obj","mode","this","ns","def","current","getOwnPropertyNames","definition","get","chunkId","all","reduce","promises","miniCssF","g","Function","prop","url","script","needAttach","scripts","getElementsByTagName","getAttribute","charset","nc","setAttribute","src","crossOrigin","integrity","sriHashes","onScriptComplete","prev","onerror","onload","clearTimeout","timeout","doneFns","parentNode","removeChild","setTimeout","target","head","nmd","paths","children","installedChunks","installedChunkData","promise","reject","errorType","realSrc","request","webpackJsonpCallback","parentChunkLoadingFunction","moreModules","runtime","some","chunkLoadingGlobal","self","__webpack_exports__"],"sourceRoot":""} \ No newline at end of file diff --git a/export-and-sign/dist/index.html b/export-and-sign/dist/index.html index 456ed13..3436c69 100644 --- a/export-and-sign/dist/index.html +++ b/export-and-sign/dist/index.html @@ -1 +1 @@ -Turnkey Export

Export Key Material

This public key will be sent along with a private key ID or wallet ID inside of a new EXPORT_PRIVATE_KEY or EXPORT_WALLET activity




Inject Key Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).





Inject Wallet Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).




Sign Transaction

Input a serialized transaction to sign.



Sign Message

Input a serialized message to sign.



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file +Turnkey Export

Export Key Material

This public key will be sent along with a private key ID or wallet ID inside of a new EXPORT_PRIVATE_KEY or EXPORT_WALLET activity




Inject Key Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).





Inject Wallet Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).




Sign Transaction

Input a serialized transaction to sign.



Sign Message

Input a serialized message to sign.



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file diff --git a/export-and-sign/index.test.js b/export-and-sign/index.test.js index 5de7117..fe902a4 100644 --- a/export-and-sign/index.test.js +++ b/export-and-sign/index.test.js @@ -7,6 +7,7 @@ import { DEFAULT_TTL_MILLISECONDS, onInjectKeyBundle, onSignTransaction, + onClearEmbeddedPrivateKey, getKeyNotFoundErrorMessage, onResetToDefaultEmbeddedKey, onSetEmbeddedKeyOverride, @@ -869,7 +870,8 @@ describe("Embedded Key Override", () => { // Mock raw 32-byte P-256 private key (embedded key) // This is what Turnkey exports after HPKE decryption - raw key bytes, not a JWK. - const mockEmbeddedKeyBytes = new Uint8Array(32).fill(42); + // Return a fresh buffer each time since handlers zero key buffers in-place. + const makeMockEmbeddedKeyBytes = () => new Uint8Array(32).fill(42); function buildBundle(organizationId = "org-test") { const signedData = { @@ -957,7 +959,9 @@ describe("Embedded Key Override", () => { describe("SET_EMBEDDED_KEY_OVERRIDE handler", () => { it("decrypts and stores the embedded key", async () => { - const HpkeDecryptMock = jest.fn().mockResolvedValue(mockEmbeddedKeyBytes); + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(makeMockEmbeddedKeyBytes()); await onSetEmbeddedKeyOverride( requestId, @@ -974,6 +978,20 @@ describe("Embedded Key Override", () => { ); }); + it("zeros decrypted key bytes on success", async () => { + const decrypted = new Uint8Array(32).fill(42); + const HpkeDecryptMock = jest.fn().mockResolvedValue(decrypted); + + await onSetEmbeddedKeyOverride( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ); + + expect(decrypted.every((b) => b === 0)).toBe(true); + }); + it("rejects invalid decryption key length", async () => { const HpkeDecryptMock = jest .fn() @@ -989,6 +1007,22 @@ describe("Embedded Key Override", () => { ).rejects.toThrow("invalid decryption key length"); }); + it("zeros decrypted key bytes on error", async () => { + const decrypted = new Uint8Array(16).fill(1); + const HpkeDecryptMock = jest.fn().mockResolvedValue(decrypted); + + await expect( + onSetEmbeddedKeyOverride( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ) + ).rejects.toThrow("invalid decryption key length"); + + expect(decrypted.every((b) => b === 0)).toBe(true); + }); + it("uses injected key for subsequent bundle decryptions", async () => { // 1. Replace embedded key with embedded key let callCount = 0; @@ -996,7 +1030,7 @@ describe("Embedded Key Override", () => { callCount++; if (callCount === 1) { // First call: decrypting the embedded key bundle itself (uses embedded key) - return Promise.resolve(mockEmbeddedKeyBytes); + return Promise.resolve(makeMockEmbeddedKeyBytes()); } // Subsequent calls: decrypting wallet bundles (should use the injected key) return Promise.resolve(new Uint8Array(64).fill(9)); @@ -1038,7 +1072,9 @@ describe("Embedded Key Override", () => { describe("RESET_TO_DEFAULT_EMBEDDED_KEY handler", () => { it("clears the injected embedded key", async () => { // 1. Replace embedded key - const HpkeDecryptMock = jest.fn().mockResolvedValue(mockEmbeddedKeyBytes); + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(makeMockEmbeddedKeyBytes()); await onSetEmbeddedKeyOverride( requestId, @@ -1073,6 +1109,148 @@ describe("Embedded Key Override", () => { }); }); + describe("Key clearing and buffer zeroing", () => { + it("clears all keys when no address is given and subsequent signing fails", async () => { + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(new Uint8Array(64).fill(9)); + + // Inject two keys + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-x", + HpkeDecryptMock + ); + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-y", + HpkeDecryptMock + ); + + // Clear all keys (no address argument) + await onClearEmbeddedPrivateKey(requestId, undefined); + + expect(sendMessageSpy).toHaveBeenCalledWith( + "EMBEDDED_PRIVATE_KEY_CLEARED", + true, + requestId + ); + + // After clearing, signing should throw "key bytes not found" + let signError; + try { + await onSignTransaction(requestId, serializedTransaction, "wallet-x"); + } catch (e) { + signError = e.toString(); + } + expect(signError).toContain("key bytes not found"); + + try { + await onSignTransaction(requestId, serializedTransaction, "wallet-y"); + } catch (e) { + signError = e.toString(); + } + expect(signError).toContain("key bytes not found"); + }); + + it("clears only the targeted key and leaves other keys intact", async () => { + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(new Uint8Array(64).fill(9)); + + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-keep", + HpkeDecryptMock + ); + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-remove", + HpkeDecryptMock + ); + + // Clear only wallet-remove + await onClearEmbeddedPrivateKey(requestId, "wallet-remove"); + + expect(sendMessageSpy).toHaveBeenCalledWith( + "EMBEDDED_PRIVATE_KEY_CLEARED", + true, + requestId + ); + + // wallet-remove should be gone -- signing throws + let signError; + try { + await onSignTransaction( + requestId, + serializedTransaction, + "wallet-remove" + ); + } catch (e) { + signError = e.toString(); + } + expect(signError).toContain("key bytes not found"); + + // wallet-keep should still be signable + await onSignTransaction(requestId, serializedTransaction, "wallet-keep"); + expect(sendMessageSpy).toHaveBeenCalledWith( + "TRANSACTION_SIGNED", + expect.any(String), + requestId + ); + }); + + it("zeros the Solana secretKey buffer on single-key clear", async () => { + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(new Uint8Array(64).fill(9)); + + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-zero", + HpkeDecryptMock + ); + + // The mock Keypair.fromSecretKey always returns the same mockKeypair object. + // Capture the secretKey reference before clearing. + const { Keypair } = await import("@solana/web3.js"); + const capturedSecretKey = Keypair.fromSecretKey().secretKey; + + await onClearEmbeddedPrivateKey(requestId, "wallet-zero"); + + // zeroKeyEntry should have called fill(0) on the secretKey buffer. + // (It may already be zero if a prior test cleared the same mock keypair, + // but the important invariant is: it must be zero after a clear.) + expect(capturedSecretKey.every((b) => b === 0)).toBe(true); + }); + + it("sends error when trying to clear a key that does not exist", async () => { + await onClearEmbeddedPrivateKey(requestId, "nonexistent-wallet"); + + // onClearEmbeddedPrivateKey sends new Error(...).toString() which includes "Error: " prefix + expect(sendMessageSpy).toHaveBeenCalledWith( + "ERROR", + "Error: key not found for address nonexistent-wallet. Note that address is case sensitive.", + requestId + ); + }); + }); + describe("Full Lifecycle", () => { it("replace key -> inject bundles -> sign -> reset -> inject uses embedded key", async () => { // 1. Replace embedded key with injected embedded key @@ -1080,7 +1258,7 @@ describe("Embedded Key Override", () => { const HpkeDecryptMock = jest.fn().mockImplementation(() => { callCount++; if (callCount === 1) { - return Promise.resolve(mockEmbeddedKeyBytes); + return Promise.resolve(makeMockEmbeddedKeyBytes()); } return Promise.resolve(new Uint8Array(64).fill(9)); }); diff --git a/export-and-sign/src/event-handlers.js b/export-and-sign/src/event-handlers.js index b51632e..16256e0 100644 --- a/export-and-sign/src/event-handlers.js +++ b/export-and-sign/src/event-handlers.js @@ -3,11 +3,22 @@ import { Keypair, VersionedTransaction } from "@solana/web3.js"; import * as nobleEd25519 from "@noble/ed25519"; import * as nobleHashes from "@noble/hashes/sha512"; -// Persist keys in memory via mapping of { address --> pk } +/** + * In-memory key store: { address --> key object }. + * SECURITY: Mutated in-place (not spread-copied) to avoid multiplying + * copies of key material on the V8 heap. Before deleting an entry, + * all Uint8Array fields (e.g. keypair.secretKey) must be zeroed. + */ let inMemoryKeys = {}; -// Injected embedded key -- held in memory only, never persisted. -// When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key. +/** + * Injected embedded key -- held in memory only, never persisted. + * When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key. + * + * SECURITY LIMITATION: This is a JWK object containing the raw "d" parameter. + * It cannot be reliably zeroed in JS (object properties are GC'd, not wiped). + * We null it on error paths and on reset to limit the exposure window. + */ let injectedEmbeddedKey = null; export const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds @@ -16,6 +27,25 @@ export const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,4 const textEncoder = new TextEncoder(); const textDecoder = new TextDecoder(); +/** + * Zeros all sensitive Uint8Array fields on a key entry before removal. + * JS strings (like `privateKey`) are immutable and cannot be zeroed — this is + * a known V8 limitation. We zero what we can (Uint8Array buffers) and document + * the rest. + * @param {Object} keyEntry - An entry from inMemoryKeys + */ +function zeroKeyEntry(keyEntry) { + if (!keyEntry) return; + // Zero the cached Solana keypair's secret key (64-byte Uint8Array) + if (keyEntry.keypair && keyEntry.keypair.secretKey) { + keyEntry.keypair.secretKey.fill(0); + } + // NOTE: keyEntry.privateKey is a JS string (hex or base58 encoded). + // JS strings are immutable — we cannot zero them. They will linger on the + // V8 heap until GC. Keeping key material as Uint8Array end-to-end would + // require a larger refactor of the encodeKey/decodeKey pipeline. +} + /** * Verifies the enclave signature on a v1.0.0 bundle and returns the parsed signed data. * @param {string} bundle - JSON-stringified bundle @@ -62,7 +92,9 @@ async function verifyAndParseBundleData(bundle, organizationId) { ); } else if ( !signedData.organizationId || - signedData.organizationId !== organizationId + // SECURITY: Use constant-time comparison to prevent timing side-channel + // attacks that could leak the organization ID byte-by-byte. + !TKHQ.timingSafeEqual(signedData.organizationId, organizationId) ) { throw new Error( `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.` @@ -135,14 +167,21 @@ async function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) { let key; const privateKeyBytes = new Uint8Array(keyBytes); - if (keyFormat === "SOLANA") { - const privateKeyHex = TKHQ.uint8arrayToHexString( - privateKeyBytes.subarray(0, 32) - ); - const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex); - key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes); - } else { - key = await TKHQ.encodeKey(privateKeyBytes, keyFormat); + try { + if (keyFormat === "SOLANA") { + const privateKeyHex = TKHQ.uint8arrayToHexString( + privateKeyBytes.subarray(0, 32) + ); + const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex); + key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes); + } else { + key = await TKHQ.encodeKey(privateKeyBytes, keyFormat); + } + } finally { + // SECURITY: Zero the raw private key bytes immediately after encoding. + // The encoded `key` is a JS string (hex or base58) which we cannot zero, + // but we can at least wipe the Uint8Array source material from the heap. + privateKeyBytes.fill(0); } const keyAddress = address || "default"; @@ -157,15 +196,20 @@ async function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) { ); } - inMemoryKeys = { - ...inMemoryKeys, - [keyAddress]: { - organizationId, - privateKey: key, - format: keyFormat, - expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS, - keypair: cachedKeypair, - }, + // SECURITY: Mutate in-place rather than spread-copying. The spread pattern + // `{ ...inMemoryKeys, [addr]: ... }` creates a shallow copy of the entire map + // on every key injection, multiplying references to key material on the heap. + // In-place mutation avoids this; only one reference per key exists at a time. + // If replacing an existing entry, zero its buffers first. + if (inMemoryKeys[keyAddress]) { + zeroKeyEntry(inMemoryKeys[keyAddress]); + } + inMemoryKeys[keyAddress] = { + organizationId, + privateKey: key, + format: keyFormat, + expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS, + keypair: cachedKeypair, }; } @@ -287,16 +331,23 @@ async function onSignMessage(requestId, serializedMessage, address) { nobleEd25519.etc.sha512Sync = (...m) => nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m)); - // Extract the 32-byte private key from the 64-byte secretKey + // Extract the 32-byte private key from the 64-byte secretKey. // Solana keypair.secretKey format: [32-byte private key][32-byte public key] + // SECURITY: .slice() creates a new Uint8Array copy. We must zero it after + // signing to avoid leaving an extra copy of the private key on the heap. const privateKey = keypair.secretKey.slice(0, 32); - // Sign the message using nobleEd25519 - const signature = nobleEd25519.sign(messageBytes, privateKey); + try { + // Sign the message using nobleEd25519 + const signature = nobleEd25519.sign(messageBytes, privateKey); - // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair. - // Clients can verify the signature returned. + // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair. + // Clients can verify the signature returned. - signatureHex = TKHQ.uint8arrayToHexString(signature); + signatureHex = TKHQ.uint8arrayToHexString(signature); + } finally { + // SECURITY: Zero the private key slice immediately after use. + privateKey.fill(0); + } } else { TKHQ.sendMessageUp("ERROR", "unsupported message type", requestId); @@ -314,6 +365,12 @@ async function onSignMessage(requestId, serializedMessage, address) { async function onClearEmbeddedPrivateKey(requestId, address) { // If no address is provided, clear all keys if (!address) { + // SECURITY: Zero all Uint8Array buffers before releasing references. + // `delete` and reassignment only remove the JS reference — the underlying + // memory isn't wiped and will persist until GC reclaims it. + for (const key of Object.keys(inMemoryKeys)) { + zeroKeyEntry(inMemoryKeys[key]); + } inMemoryKeys = {}; TKHQ.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED", true, requestId); @@ -333,7 +390,8 @@ async function onClearEmbeddedPrivateKey(requestId, address) { return; } - // Clear the specific key from memory + // SECURITY: Zero sensitive buffers before deleting the entry. + zeroKeyEntry(inMemoryKeys[address]); delete inMemoryKeys[address]; TKHQ.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED", true, requestId); @@ -354,17 +412,33 @@ async function onSetEmbeddedKeyOverride( bundle, HpkeDecrypt ) { - // Decrypt the private key using the iframe's embedded key. - // The decrypted payload is a raw 32-byte P-256 private key scalar. - const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt); - - // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto) - const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes)); - - // Store in module-level variable (memory only) - injectedEmbeddedKey = keyJwk; - - TKHQ.sendMessageUp("EMBEDDED_KEY_OVERRIDE_SET", true, requestId); + let keyBytes = null; + try { + // Decrypt the private key using the iframe's embedded key. + // The decrypted payload is a raw 32-byte P-256 private key scalar. + const decrypted = await decryptBundle(bundle, organizationId, HpkeDecrypt); + keyBytes = + decrypted instanceof Uint8Array ? decrypted : new Uint8Array(decrypted); + + // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto) + const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes)); + + // Store in module-level variable (memory only) + injectedEmbeddedKey = keyJwk; + + TKHQ.sendMessageUp("EMBEDDED_KEY_OVERRIDE_SET", true, requestId); + } catch (e) { + // SECURITY: Ensure the injected key is cleared on any error path. + // If decryption or JWK conversion partially succeeded before throwing, + // we must not leave stale key material in the module variable. + injectedEmbeddedKey = null; + throw e; + } finally { + // SECURITY: Zero decrypted key bytes on all paths once we've derived the JWK. + if (keyBytes) { + keyBytes.fill(0); + } + } } /** @@ -444,15 +518,22 @@ async function rawP256PrivateKeyToJwk(rawPrivateKeyBytes) { pkcs8.set(pkcs8Prefix); pkcs8.set(rawPrivateKeyBytes, pkcs8Prefix.length); - const cryptoKey = await crypto.subtle.importKey( - "pkcs8", - pkcs8, - { name: "ECDH", namedCurve: "P-256" }, - true, - ["deriveBits"] - ); + try { + const cryptoKey = await crypto.subtle.importKey( + "pkcs8", + pkcs8, + { name: "ECDH", namedCurve: "P-256" }, + true, + ["deriveBits"] + ); - return await crypto.subtle.exportKey("jwk", cryptoKey); + return await crypto.subtle.exportKey("jwk", cryptoKey); + } finally { + // SECURITY: Zero intermediate buffers that contain private key material. + // The PKCS#8 wrapper embeds the raw scalar, so both must be wiped. + pkcs8.fill(0); + rawPrivateKeyBytes.fill(0); + } } /** @@ -471,6 +552,8 @@ export function getKeyNotFoundErrorMessage(keyAddress) { */ function clearExpiredKey(keyAddress) { if (inMemoryKeys[keyAddress]) { + // SECURITY: Zero sensitive Uint8Array buffers before releasing the reference. + zeroKeyEntry(inMemoryKeys[keyAddress]); delete inMemoryKeys[keyAddress]; } } diff --git a/export-and-sign/src/turnkey-core.js b/export-and-sign/src/turnkey-core.js index 8c79de7..6d942c2 100644 --- a/export-and-sign/src/turnkey-core.js +++ b/export-and-sign/src/turnkey-core.js @@ -28,6 +28,7 @@ const { validateStyles, isDoublyIframed, loadQuorumKey, + timingSafeEqual, } = SharedTKHQ; /** @@ -177,4 +178,5 @@ export const TKHQ = { getSettings, setSettings, parsePrivateKey, + timingSafeEqual, }; diff --git a/import/dist/551.bundle.49402ee939a00be74d76.js b/import/dist/551.bundle.332145a70ecbd5b7542a.js similarity index 51% rename from import/dist/551.bundle.49402ee939a00be74d76.js rename to import/dist/551.bundle.332145a70ecbd5b7542a.js index b6d7a0e..a781ff7 100644 --- a/import/dist/551.bundle.49402ee939a00be74d76.js +++ b/import/dist/551.bundle.332145a70ecbd5b7542a.js @@ -1,3 +1,3 @@ -/*! For license information please see 551.bundle.49402ee939a00be74d76.js.LICENSE.txt */ -"use strict";(self.webpackChunkimport=self.webpackChunkimport||[]).push([[551],{275:(e,t,r)=>{r.d(t,{Di:()=>$,FZ:()=>A,MO:()=>_,P2:()=>T,Rx:()=>B,Sb:()=>G,Tn:()=>H,VU:()=>N,Wq:()=>F,Y$:()=>R,ZX:()=>M,Z_:()=>X,b6:()=>k,fX:()=>D,fw:()=>P,g8:()=>W,mt:()=>C,oc:()=>U,y3:()=>J});var n=r(343);function o(e){return o="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},o(e)}function a(){var e=f(),t=e.m(a),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var o={throw:1,return:2,break:3,continue:3};function p(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,o[e],t)},delegateYield:function(e,o,a){return t.resultName=o,r(n.d,i(e),a)},finish:function(e){return r(n.f,e)}},r=function(e,r,o){n.p=t.prev,n.n=t.next;try{return e(r,o)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(a=function(){return{wrap:function(t,r,n,o){return e.w(p(t),r,n,o&&o.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new d(e,t)},AsyncIterator:s,async:function(e,t,r,o,a){return(n(t)?l:u)(p(e),t,r,o,a)},keys:c,values:i}})()}function i(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(o(e)+" is not iterable")}function c(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function u(e,t,r,n,o){var a=l(e,t,r,n,o);return a.next().then(function(e){return e.done?e.value:a.next()})}function l(e,t,r,n,o){return new s(f().w(e,t,r,n),o||Promise)}function s(e,t){function r(n,o,a,i){try{var c=e[n](o),u=c.value;return u instanceof d?t.resolve(u.v).then(function(e){r("next",e,a,i)},function(e){r("throw",e,a,i)}):t.resolve(u).then(function(e){c.value=e,a(c)},function(e){return r("throw",e,a,i)})}catch(e){i(e)}}var n;this.next||(p(s.prototype),p(s.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),p(this,"_invoke",function(e,o,a){function i(){return new t(function(t,n){r(e,a,t,n)})}return n=n?n.then(i,i):i()},!0)}function f(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var u=n&&n.prototype instanceof c?n:c,l=Object.create(u.prototype);return p(l,"_invoke",function(r,n,o){var a,c,u,l=0,s=o||[],f=!1,p={p:0,n:0,v:e,a:d,f:d.bind(e,4),d:function(t,r){return a=t,c=0,u=e,p.n=r,i}};function d(r,n){for(c=r,u=n,t=0;!f&&l&&!o&&t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=d&&((o=r<2&&dn||n>y)&&(a[4]=r,a[5]=n,p.n=y,c=0))}if(o||r>1)return i;throw f=!0,n}return function(o,s,y){if(l>1)throw TypeError("Generator is already running");for(f&&1===s&&d(s,y),c=s,u=y;(t=c<2?e:u)||!f;){a||(c?c<3?(c>1&&(p.n=-1),d(c,u)):p.n=u:p.v=u);try{if(l=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(f=p.n<0)?u:r.call(n,p))!==i)break}catch(t){a=e,c=1,u=t}finally{l=1}}return{value:t,done:f}}}(r,o,a),!0),l}var i={};function c(){}function u(){}function l(){}t=Object.getPrototypeOf;var s=[][n]?t(t([][n]())):(p(t={},n,function(){return this}),t),d=l.prototype=c.prototype=Object.create(s);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,l):(e.__proto__=l,p(e,o,"GeneratorFunction")),e.prototype=Object.create(d),e}return u.prototype=l,p(d,"constructor",l),p(l,"constructor",u),u.displayName="GeneratorFunction",p(l,o,"GeneratorFunction"),p(d),p(d,o,"Generator"),p(d,n,function(){return this}),p(d,"toString",function(){return"[object Generator]"}),(f=function(){return{w:a,m:y}})()}function p(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}p=function(e,t,r,n){function a(t,r){p(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},p(e,t,r,n)}function d(e,t){this.v=e,this.k=t}function y(e){return function(e){if(Array.isArray(e))return v(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||b(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function b(e,t){if(e){if("string"==typeof e)return v(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?v(e,t):void 0}}function v(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(y(n),y(e)))}if(r<0){for(var o=-1*r,a=0,i=0;i0;){var c=r[i];a=(c=void 0===c?a:58*c+a)>>8,r[i]=c%256,i++}}var u=n.concat(r.reverse());return new Uint8Array(u)}function H(e){return Y.apply(this,arguments)}function Y(){return(Y=m(a().mark(function e(t){var r,n,o,i,c,u,l,s,f;return a().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(!((r=B(t)).length<5)){e.next=3;break}throw new Error("invalid base58check length: expected at least 5 bytes, got ".concat(r.length));case 3:if(n=r.subarray(0,r.length-4),o=r.subarray(r.length-4),i=S()){e.next=8;break}throw new Error("WebCrypto subtle API is unavailable");case 8:return e.next=10,i.digest("SHA-256",n);case 10:return c=e.sent,u=new Uint8Array(c),e.next=14,i.digest("SHA-256",u);case 14:if(l=e.sent,s=new Uint8Array(l),f=s.subarray(0,4),0===(o[0]^f[0]|o[1]^f[1]|o[2]^f[2]|o[3]^f[3])){e.next=20;break}throw new Error("invalid base58check checksum");case 20:return e.abrupt("return",n);case 21:case"end":return e.stop()}},e)}))).apply(this,arguments)}function J(e,t){return L.apply(this,arguments)}function L(){return(L=m(a().mark(function e(t,r){var o,i,c,u,l,s,f,p,d,y,b,v,h;return a().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:e.t0=r,e.next="SOLANA"===e.t0?3:"HEXADECIMAL"===e.t0?7:"BITCOIN_MAINNET_WIF"===e.t0?10:"BITCOIN_TESTNET_WIF"===e.t0?22:"SUI_BECH32"===e.t0?34:45;break;case 3:if(64===(o=B(t)).length){e.next=6;break}throw new Error("invalid key length. Expected 64 bytes. Got ".concat(o.length,"."));case 6:return e.abrupt("return",o.subarray(0,32));case 7:if(!t.startsWith("0x")){e.next=9;break}return e.abrupt("return",F(t.slice(2)));case 9:case 48:return e.abrupt("return",F(t));case 10:return e.next=12,H(t);case 12:if(i=e.sent,c=i[0],u=i.subarray(1),128===c){e.next=17;break}throw new Error("invalid WIF version byte: ".concat(c,". Expected 0x80 (mainnet)."));case 17:if(32!==u.length){e.next=19;break}throw new Error("uncompressed WIF keys not supported");case 19:if(33===u.length&&1===u[32]){e.next=21;break}throw new Error("invalid WIF format: expected compressed private key");case 21:return e.abrupt("return",u.subarray(0,32));case 22:return e.next=24,H(t);case 24:if(l=e.sent,s=l[0],f=l.subarray(1),239===s){e.next=29;break}throw new Error("invalid WIF version byte: ".concat(s,". Expected 0xEF (testnet)."));case 29:if(32!==f.length){e.next=31;break}throw new Error("uncompressed WIF keys not supported");case 31:if(33===f.length&&1===f[32]){e.next=33;break}throw new Error("invalid WIF format: expected compressed private key");case 33:return e.abrupt("return",f.subarray(0,32));case 34:if(p=n.I.decode(t),d=p.prefix,y=p.words,"suiprivkey"===d){e.next=37;break}throw new Error('invalid SUI private key human-readable part (HRP): expected "suiprivkey"');case 37:if(33===(b=n.I.fromWords(y)).length){e.next=40;break}throw new Error("invalid SUI private key length: expected 33 bytes, got ".concat(b.length));case 40:if(v=b[0],h=b.slice(1),0===v){e.next=44;break}throw new Error("invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.");case 44:return e.abrupt("return",new Uint8Array(h));case 45:if(console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),!t.startsWith("0x")){e.next=48;break}return e.abrupt("return",F(t.slice(2)));case 49:case"end":return e.stop()}},e)}))).apply(this,arguments)}function X(e,t){var r={},n={padding:"^(\\d+(px|em|%|rem) ?){1,4}$",margin:"^(\\d+(px|em|%|rem) ?){1,4}$",borderWidth:"^(\\d+(px|em|rem) ?){1,4}$",borderStyle:"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$",borderColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",borderRadius:"^(\\d+(px|em|%|rem) ?){1,4}$",fontSize:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$",fontWeight:"^(normal|bold|bolder|lighter|\\d{3})$",fontFamily:'^[^";<>]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var t,o,a=(o=2,function(e){if(Array.isArray(e))return e}(t=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,l=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){l=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(l)throw o}}return c}}(t,o)||b(t,o)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=a[0],c=a[1],u=i.trim();if(0===u.length)throw new Error("css style property cannot be empty");var l=n[u];if(!l)throw new Error('invalid or unsupported css style property: "'.concat(u,'"'));var s=new RegExp(l),f=c.trim();if(0==f.length)throw new Error('css style for "'.concat(u,'" is empty'));if(!s.test(f))throw new Error('invalid css style value for property "'.concat(u,'"'));r[u]=f}),r}},482:(e,t,r)=>{r.r(t),r.d(t,{additionalAssociatedData:()=>E,applySettings:()=>O,base58CheckDecode:()=>h,base58Decode:()=>v,decodeKey:()=>m,fromDerSignature:()=>x,getSettings:()=>f,getTargetEmbeddedKey:()=>u,loadTargetKey:()=>c,normalizePadding:()=>g,resetTargetEmbeddedKey:()=>s,sendMessageUp:()=>d,setCryptoProvider:()=>i,setParentFrameMessageChannelPort:()=>w,setSettings:()=>p,setTargetEmbeddedKey:()=>l,uint8arrayFromHexString:()=>y,uint8arrayToHexString:()=>b,validateStyles:()=>k,verifyEnclaveSignature:()=>S});var n=r(275);function o(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,l=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){l=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(l)throw o}}return c}}(e,t)||function(e,t){if(e){if("string"==typeof e)return a(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?a(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function a(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r{r.d(t,{q:()=>g});var n=r(275),o=r(255);function a(e){return a="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},a(e)}function i(){var e=p(),t=e.m(i),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var o={throw:1,return:2,break:3,continue:3};function a(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,o[e],t)},delegateYield:function(e,o,a){return t.resultName=o,r(n.d,c(e),a)},finish:function(e){return r(n.f,e)}},r=function(e,r,o){n.p=t.prev,n.n=t.next;try{return e(r,o)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(i=function(){return{wrap:function(t,r,n,o){return e.w(a(t),r,n,o&&o.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new y(e,t)},AsyncIterator:f,async:function(e,t,r,o,i){return(n(t)?s:l)(a(e),t,r,o,i)},keys:u,values:c}})()}function c(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(a(e)+" is not iterable")}function u(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function l(e,t,r,n,o){var a=s(e,t,r,n,o);return a.next().then(function(e){return e.done?e.value:a.next()})}function s(e,t,r,n,o){return new f(p().w(e,t,r,n),o||Promise)}function f(e,t){function r(n,o,a,i){try{var c=e[n](o),u=c.value;return u instanceof y?t.resolve(u.v).then(function(e){r("next",e,a,i)},function(e){r("throw",e,a,i)}):t.resolve(u).then(function(e){c.value=e,a(c)},function(e){return r("throw",e,a,i)})}catch(e){i(e)}}var n;this.next||(d(f.prototype),d(f.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),d(this,"_invoke",function(e,o,a){function i(){return new t(function(t,n){r(e,a,t,n)})}return n=n?n.then(i,i):i()},!0)}function p(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var u=n&&n.prototype instanceof c?n:c,l=Object.create(u.prototype);return d(l,"_invoke",function(r,n,o){var a,c,u,l=0,s=o||[],f=!1,p={p:0,n:0,v:e,a:d,f:d.bind(e,4),d:function(t,r){return a=t,c=0,u=e,p.n=r,i}};function d(r,n){for(c=r,u=n,t=0;!f&&l&&!o&&t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=d&&((o=r<2&&dn||n>y)&&(a[4]=r,a[5]=n,p.n=y,c=0))}if(o||r>1)return i;throw f=!0,n}return function(o,s,y){if(l>1)throw TypeError("Generator is already running");for(f&&1===s&&d(s,y),c=s,u=y;(t=c<2?e:u)||!f;){a||(c?c<3?(c>1&&(p.n=-1),d(c,u)):p.n=u:p.v=u);try{if(l=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(f=p.n<0)?u:r.call(n,p))!==i)break}catch(t){a=e,c=1,u=t}finally{l=1}}return{value:t,done:f}}}(r,o,a),!0),l}var i={};function c(){}function u(){}function l(){}t=Object.getPrototypeOf;var s=[][n]?t(t([][n]())):(d(t={},n,function(){return this}),t),f=l.prototype=c.prototype=Object.create(s);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,l):(e.__proto__=l,d(e,o,"GeneratorFunction")),e.prototype=Object.create(f),e}return u.prototype=l,d(f,"constructor",l),d(l,"constructor",u),u.displayName="GeneratorFunction",d(l,o,"GeneratorFunction"),d(f),d(f,o,"Generator"),d(f,n,function(){return this}),d(f,"toString",function(){return"[object Generator]"}),(p=function(){return{w:a,m:y}})()}function d(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}d=function(e,t,r,n){function a(t,r){d(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},d(e,t,r,n)}function y(e,t){this.v=e,this.k=t}function b(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function v(e){for(var t=1;t{r.d(t,{Di:()=>$,FZ:()=>A,MO:()=>_,P2:()=>T,Rx:()=>B,Sb:()=>G,Tn:()=>H,VU:()=>N,Wq:()=>F,Y$:()=>R,ZX:()=>M,Z_:()=>X,b6:()=>k,fX:()=>D,fw:()=>P,g8:()=>W,mt:()=>C,oc:()=>U,y3:()=>J});var n=r(343);function o(e){return o="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},o(e)}function a(){var e=f(),t=e.m(a),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var o={throw:1,return:2,break:3,continue:3};function p(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,o[e],t)},delegateYield:function(e,o,a){return t.resultName=o,r(n.d,i(e),a)},finish:function(e){return r(n.f,e)}},r=function(e,r,o){n.p=t.prev,n.n=t.next;try{return e(r,o)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(a=function(){return{wrap:function(t,r,n,o){return e.w(p(t),r,n,o&&o.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new d(e,t)},AsyncIterator:s,async:function(e,t,r,o,a){return(n(t)?l:u)(p(e),t,r,o,a)},keys:c,values:i}})()}function i(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(o(e)+" is not iterable")}function c(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function u(e,t,r,n,o){var a=l(e,t,r,n,o);return a.next().then(function(e){return e.done?e.value:a.next()})}function l(e,t,r,n,o){return new s(f().w(e,t,r,n),o||Promise)}function s(e,t){function r(n,o,a,i){try{var c=e[n](o),u=c.value;return u instanceof d?t.resolve(u.v).then(function(e){r("next",e,a,i)},function(e){r("throw",e,a,i)}):t.resolve(u).then(function(e){c.value=e,a(c)},function(e){return r("throw",e,a,i)})}catch(e){i(e)}}var n;this.next||(p(s.prototype),p(s.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),p(this,"_invoke",function(e,o,a){function i(){return new t(function(t,n){r(e,a,t,n)})}return n=n?n.then(i,i):i()},!0)}function f(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var u=n&&n.prototype instanceof c?n:c,l=Object.create(u.prototype);return p(l,"_invoke",function(r,n,o){var a,c,u,l=0,s=o||[],f=!1,p={p:0,n:0,v:e,a:d,f:d.bind(e,4),d:function(t,r){return a=t,c=0,u=e,p.n=r,i}};function d(r,n){for(c=r,u=n,t=0;!f&&l&&!o&&t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=d&&((o=r<2&&dn||n>y)&&(a[4]=r,a[5]=n,p.n=y,c=0))}if(o||r>1)return i;throw f=!0,n}return function(o,s,y){if(l>1)throw TypeError("Generator is already running");for(f&&1===s&&d(s,y),c=s,u=y;(t=c<2?e:u)||!f;){a||(c?c<3?(c>1&&(p.n=-1),d(c,u)):p.n=u:p.v=u);try{if(l=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(f=p.n<0)?u:r.call(n,p))!==i)break}catch(t){a=e,c=1,u=t}finally{l=1}}return{value:t,done:f}}}(r,o,a),!0),l}var i={};function c(){}function u(){}function l(){}t=Object.getPrototypeOf;var s=[][n]?t(t([][n]())):(p(t={},n,function(){return this}),t),d=l.prototype=c.prototype=Object.create(s);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,l):(e.__proto__=l,p(e,o,"GeneratorFunction")),e.prototype=Object.create(d),e}return u.prototype=l,p(d,"constructor",l),p(l,"constructor",u),u.displayName="GeneratorFunction",p(l,o,"GeneratorFunction"),p(d),p(d,o,"Generator"),p(d,n,function(){return this}),p(d,"toString",function(){return"[object Generator]"}),(f=function(){return{w:a,m:y}})()}function p(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}p=function(e,t,r,n){function a(t,r){p(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},p(e,t,r,n)}function d(e,t){this.v=e,this.k=t}function y(e){return function(e){if(Array.isArray(e))return v(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||b(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function b(e,t){if(e){if("string"==typeof e)return v(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?v(e,t):void 0}}function v(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(y(n),y(e)))}if(r<0){for(var o=-1*r,a=0,i=0;i0;){var c=r[i];a=(c=void 0===c?a:58*c+a)>>8,r[i]=c%256,i++}}var u=n.concat(r.reverse());return new Uint8Array(u)}function H(e){return Y.apply(this,arguments)}function Y(){return(Y=m(a().mark(function e(t){var r,n,o,i,c,u,l,s,f;return a().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(!((r=B(t)).length<5)){e.next=3;break}throw new Error("invalid base58check length: expected at least 5 bytes, got ".concat(r.length));case 3:if(n=r.subarray(0,r.length-4),o=r.subarray(r.length-4),i=S()){e.next=8;break}throw new Error("WebCrypto subtle API is unavailable");case 8:return e.next=10,i.digest("SHA-256",n);case 10:return c=e.sent,u=new Uint8Array(c),e.next=14,i.digest("SHA-256",u);case 14:if(l=e.sent,s=new Uint8Array(l),f=s.subarray(0,4),0===(o[0]^f[0]|o[1]^f[1]|o[2]^f[2]|o[3]^f[3])){e.next=20;break}throw new Error("invalid base58check checksum");case 20:return e.abrupt("return",n);case 21:case"end":return e.stop()}},e)}))).apply(this,arguments)}function J(e,t){return L.apply(this,arguments)}function L(){return(L=m(a().mark(function e(t,r){var o,i,c,u,l,s,f,p,d,y,b,v,h;return a().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:e.t0=r,e.next="SOLANA"===e.t0?3:"HEXADECIMAL"===e.t0?7:"BITCOIN_MAINNET_WIF"===e.t0?10:"BITCOIN_TESTNET_WIF"===e.t0?22:"SUI_BECH32"===e.t0?34:45;break;case 3:if(64===(o=B(t)).length){e.next=6;break}throw new Error("invalid key length. Expected 64 bytes. Got ".concat(o.length,"."));case 6:return e.abrupt("return",o.subarray(0,32));case 7:if(!t.startsWith("0x")){e.next=9;break}return e.abrupt("return",F(t.slice(2)));case 9:case 48:return e.abrupt("return",F(t));case 10:return e.next=12,H(t);case 12:if(i=e.sent,c=i[0],u=i.subarray(1),128===c){e.next=17;break}throw new Error("invalid WIF version byte: ".concat(c,". Expected 0x80 (mainnet)."));case 17:if(32!==u.length){e.next=19;break}throw new Error("uncompressed WIF keys not supported");case 19:if(33===u.length&&1===u[32]){e.next=21;break}throw new Error("invalid WIF format: expected compressed private key");case 21:return e.abrupt("return",u.subarray(0,32));case 22:return e.next=24,H(t);case 24:if(l=e.sent,s=l[0],f=l.subarray(1),239===s){e.next=29;break}throw new Error("invalid WIF version byte: ".concat(s,". Expected 0xEF (testnet)."));case 29:if(32!==f.length){e.next=31;break}throw new Error("uncompressed WIF keys not supported");case 31:if(33===f.length&&1===f[32]){e.next=33;break}throw new Error("invalid WIF format: expected compressed private key");case 33:return e.abrupt("return",f.subarray(0,32));case 34:if(p=n.I.decode(t),d=p.prefix,y=p.words,"suiprivkey"===d){e.next=37;break}throw new Error('invalid SUI private key human-readable part (HRP): expected "suiprivkey"');case 37:if(33===(b=n.I.fromWords(y)).length){e.next=40;break}throw new Error("invalid SUI private key length: expected 33 bytes, got ".concat(b.length));case 40:if(v=b[0],h=b.slice(1),0===v){e.next=44;break}throw new Error("invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.");case 44:return e.abrupt("return",new Uint8Array(h));case 45:if(console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),!t.startsWith("0x")){e.next=48;break}return e.abrupt("return",F(t.slice(2)));case 49:case"end":return e.stop()}},e)}))).apply(this,arguments)}function X(e){var t={},r={padding:"^(\\d+(px|em|%|rem) ?){1,4}$",margin:"^(\\d+(px|em|%|rem) ?){1,4}$",borderWidth:"^(\\d+(px|em|rem) ?){1,4}$",borderStyle:"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$",borderColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",borderRadius:"^(\\d+(px|em|%|rem) ?){1,4}$",fontSize:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$",fontWeight:"^(normal|bold|bolder|lighter|\\d{3})$",fontFamily:'^[^";<>]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var n,o,a=(o=2,function(e){if(Array.isArray(e))return e}(n=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,l=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){l=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(l)throw o}}return c}}(n,o)||b(n,o)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=a[0],c=a[1],u=i.trim();if(0===u.length)throw new Error("css style property cannot be empty");var l=r[u];if(!l)throw new Error('invalid or unsupported css style property: "'.concat(u,'"'));var s=new RegExp(l),f=c.trim();if(0==f.length)throw new Error('css style for "'.concat(u,'" is empty'));if(!s.test(f))throw new Error('invalid css style value for property "'.concat(u,'"'));t[u]=f}),t}},482:(e,t,r)=>{r.r(t),r.d(t,{additionalAssociatedData:()=>E,applySettings:()=>O,base58CheckDecode:()=>h,base58Decode:()=>v,decodeKey:()=>m,fromDerSignature:()=>x,getSettings:()=>f,getTargetEmbeddedKey:()=>u,loadTargetKey:()=>c,normalizePadding:()=>g,resetTargetEmbeddedKey:()=>s,sendMessageUp:()=>d,setCryptoProvider:()=>i,setParentFrameMessageChannelPort:()=>w,setSettings:()=>p,setTargetEmbeddedKey:()=>l,uint8arrayFromHexString:()=>y,uint8arrayToHexString:()=>b,validateStyles:()=>k,verifyEnclaveSignature:()=>S});var n=r(275);function o(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,l=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){l=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(l)throw o}}return c}}(e,t)||function(e,t){if(e){if("string"==typeof e)return a(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?a(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function a(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r{r.d(t,{q:()=>g});var n=r(275),o=r(255);function a(e){return a="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},a(e)}function i(){var e=p(),t=e.m(i),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var o={throw:1,return:2,break:3,continue:3};function a(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,o[e],t)},delegateYield:function(e,o,a){return t.resultName=o,r(n.d,c(e),a)},finish:function(e){return r(n.f,e)}},r=function(e,r,o){n.p=t.prev,n.n=t.next;try{return e(r,o)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(i=function(){return{wrap:function(t,r,n,o){return e.w(a(t),r,n,o&&o.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new y(e,t)},AsyncIterator:f,async:function(e,t,r,o,i){return(n(t)?s:l)(a(e),t,r,o,i)},keys:u,values:c}})()}function c(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(a(e)+" is not iterable")}function u(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function l(e,t,r,n,o){var a=s(e,t,r,n,o);return a.next().then(function(e){return e.done?e.value:a.next()})}function s(e,t,r,n,o){return new f(p().w(e,t,r,n),o||Promise)}function f(e,t){function r(n,o,a,i){try{var c=e[n](o),u=c.value;return u instanceof y?t.resolve(u.v).then(function(e){r("next",e,a,i)},function(e){r("throw",e,a,i)}):t.resolve(u).then(function(e){c.value=e,a(c)},function(e){return r("throw",e,a,i)})}catch(e){i(e)}}var n;this.next||(d(f.prototype),d(f.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),d(this,"_invoke",function(e,o,a){function i(){return new t(function(t,n){r(e,a,t,n)})}return n=n?n.then(i,i):i()},!0)}function p(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var u=n&&n.prototype instanceof c?n:c,l=Object.create(u.prototype);return d(l,"_invoke",function(r,n,o){var a,c,u,l=0,s=o||[],f=!1,p={p:0,n:0,v:e,a:d,f:d.bind(e,4),d:function(t,r){return a=t,c=0,u=e,p.n=r,i}};function d(r,n){for(c=r,u=n,t=0;!f&&l&&!o&&t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=d&&((o=r<2&&dn||n>y)&&(a[4]=r,a[5]=n,p.n=y,c=0))}if(o||r>1)return i;throw f=!0,n}return function(o,s,y){if(l>1)throw TypeError("Generator is already running");for(f&&1===s&&d(s,y),c=s,u=y;(t=c<2?e:u)||!f;){a||(c?c<3?(c>1&&(p.n=-1),d(c,u)):p.n=u:p.v=u);try{if(l=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(f=p.n<0)?u:r.call(n,p))!==i)break}catch(t){a=e,c=1,u=t}finally{l=1}}return{value:t,done:f}}}(r,o,a),!0),l}var i={};function c(){}function u(){}function l(){}t=Object.getPrototypeOf;var s=[][n]?t(t([][n]())):(d(t={},n,function(){return this}),t),f=l.prototype=c.prototype=Object.create(s);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,l):(e.__proto__=l,d(e,o,"GeneratorFunction")),e.prototype=Object.create(f),e}return u.prototype=l,d(f,"constructor",l),d(l,"constructor",u),u.displayName="GeneratorFunction",d(l,o,"GeneratorFunction"),d(f),d(f,o,"Generator"),d(f,n,function(){return this}),d(f,"toString",function(){return"[object Generator]"}),(p=function(){return{w:a,m:y}})()}function d(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}d=function(e,t,r,n){function a(t,r){d(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},d(e,t,r,n)}function y(e,t){this.v=e,this.k=t}function b(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function v(e){for(var t=1;t 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n dev: \"048cf9ed5f579298cc1571823a3222b82d80c529c551f6070fbe712ae1a9e8d1a23b7006e306d27190358dfcd9c44624918a00f23c920a33cb14f5b026eafc865d\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions ( 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @return {Object}\n */\nfunction validateStyles(styles) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n timingSafeEqual,\n};\n","import * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n setCryptoProvider,\n loadTargetKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n resetTargetEmbeddedKey,\n getSettings,\n setSettings,\n sendMessageUp,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n validateStyles,\n} = SharedTKHQ;\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n const settingsObj = JSON.parse(settings);\n\n const passphraseLabel = document.getElementById(\"passphrase-label\");\n const mnemonicLabel = document.getElementById(\"mnemonic-label\");\n const passphraseTextarea = document.getElementById(\"passphrase\");\n\n if (!passphraseLabel || !passphraseTextarea) {\n throw new Error(\"no passphrase HTML elements found to apply settings to.\");\n }\n const plaintextTextarea = document.getElementById(\"plaintext\");\n if (!plaintextTextarea) {\n throw new Error(\n \"no plaintext textarea HTML element found to apply settings to.\"\n );\n }\n\n // Apply enablePassphrase setting\n if (settingsObj.enablePassphrase === true) {\n passphraseLabel.style.display = \"inline-block\";\n passphraseTextarea.style.display = \"inline-block\";\n passphraseTextarea.style.border = \"solid 1px #ccc\";\n passphraseTextarea.style.borderRadius = \"4px\";\n\n mnemonicLabel.style.display = \"inline-block\";\n plaintextTextarea.style.border = \"solid 1px #ccc\";\n plaintextTextarea.style.borderRadius = \"4px\";\n\n validSettings[\"enablePassphrase\"] = true;\n } else {\n passphraseLabel.style.display = \"none\";\n passphraseTextarea.style.display = \"none\";\n mnemonicLabel.style.display = \"none\";\n\n plaintextTextarea.style.border = \"none\";\n validSettings[\"enablePassphrase\"] = false;\n }\n\n if (settingsObj.styles) {\n // Validate, sanitize, and apply the styles to the \"plaintext\" textarea.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n plaintextTextarea.style[key] = value;\n });\n\n if (validStyles.backgroundColor) {\n // Apply background color to document and body as well.\n document.documentElement.style.backgroundColor =\n validStyles.backgroundColor;\n document.body.style.backgroundColor = validStyles.backgroundColor;\n }\n\n if (validStyles.labelColor) {\n document.getElementById(\"mnemonic-label\").style.color =\n validStyles.labelColor;\n }\n\n validSettings[\"styles\"] = validStyles;\n }\n\n if (settingsObj.passphraseStyles) {\n // Validate, sanitize, and apply the styles to the \"passphrase\" textarea.\n const validStyles = validateStyles(settingsObj.passphraseStyles);\n Object.entries(validStyles).forEach(([key, value]) => {\n passphraseTextarea.style[key] = value;\n });\n\n if (validStyles.labelColor) {\n document.getElementById(\"passphrase-label\").style.color =\n validStyles.labelColor;\n }\n\n validSettings[\"passphraseStyles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport {\n setCryptoProvider,\n loadTargetKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n resetTargetEmbeddedKey,\n getSettings,\n setSettings,\n sendMessageUp,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n validateStyles,\n applySettings,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n"],"names":["e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_OverloadYield","k","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_TARGET_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","cryptoProviderOverride","getSubtleCrypto","subtle","globalThis","crypto","window","global","setCryptoProvider","cryptoProvider","loadQuorumKey","_x","_loadQuorumKey","_regeneratorRuntime","mark","_callee","quorumPublic","wrap","_context","prev","next","Error","importKey","namedCurve","abrupt","sent","stop","loadTargetKey","_x2","_loadTargetKey","_callee2","targetPublic","targetKey","_context2","exportKey","getTargetEmbeddedKey","jwtKey","localStorage","getItem","JSON","parse","setTargetEmbeddedKey","setItem","stringify","resetTargetEmbeddedKey","removeItem","setParentFrameMessageChannelPort","port","getSettings","settings","setSettings","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","normalizePadding","byteArray","targetLength","paddingLength","padding","fill","concat","expectedZeroCount","zeroCount","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","fromDerSignature","derSignature","derSignatureBuf","index","rLength","sLength","rPadded","sPadded","verifyEnclaveSignature","_x3","_x4","_x5","_verifyEnclaveSignature","_callee5","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context5","prod","preprod","dev","__TURNKEY_SIGNER_ENVIRONMENT__","undefined","verify","hash","sendMessageUp","type","requestId","message","postMessage","parent","content","messageLog","document","getElementById","createElement","innerText","appendChild","logMessage","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","carry","push","j","currentByte","result","reverse","base58CheckDecode","_x7","_base58CheckDecode","_callee7","decoded","payload","checksum","hash1Buf","hash1","hash2Buf","hash2","computedChecksum","_context7","subarray","digest","decodeKey","_x8","_x9","_decodeKey","_callee8","privateKey","keyFormat","decodedKeyBytes","version","keyAndFlags","_payload","_version","_keyAndFlags","_bech32$decode","prefix","words","bytes","schemeFlag","privkey","_context8","t0","bech32","decode","fromWords","console","warn","validateStyles","styles","validStyles","cssValidationRegex","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","SharedTKHQ","applySettings","validSettings","settingsObj","passphraseLabel","mnemonicLabel","passphraseTextarea","plaintextTextarea","enablePassphrase","style","display","border","_slicedToArray","key","documentElement","body","passphraseStyles","_ref3","_ref4","ownKeys","keys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","_objectSpread","_defineProperty","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","TextEncoder","encode","HpkeEncrypt","_HpkeEncrypt","plaintextBuf","receiverPubJwk","kemContext","receiverPub","suite","senderCtx","receiverPubCryptoKey","receiverPubRaw","encappedKeyBuf","aad","ciphertextBuf","ciphertextHex","encappedKeyBufHex","encryptedBundle","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createSenderContext","recipientPublicKey","info","enc","seal","encappedPublic","ciphertext"],"sourceRoot":""} \ No newline at end of file diff --git a/import/dist/551.bundle.49402ee939a00be74d76.js.map b/import/dist/551.bundle.49402ee939a00be74d76.js.map deleted file mode 100644 index 6880448..0000000 --- a/import/dist/551.bundle.49402ee939a00be74d76.js.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"file":"551.bundle.49402ee939a00be74d76.js","mappings":";moFACA,IAAAA,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA5C,EAAAsB,GAAA,KAAAF,EAAApB,EAAA,KAAA6C,EAAAvB,CAAA,UAAAwB,EAAA5C,GAAA,gBAAAA,GAAA,GAAA6C,MAAAC,QAAA9C,GAAA,OAAA+C,EAAA/C,EAAA,CAAAgD,CAAAhD,IAAA,SAAAA,GAAA,uBAAAC,QAAA,MAAAD,EAAAC,OAAAE,WAAA,MAAAH,EAAA,qBAAA6C,MAAAI,KAAAjD,EAAA,CAAAkD,CAAAlD,IAAAmD,EAAAnD,IAAA,qBAAAwB,UAAA,wIAAA4B,EAAA,UAAAD,EAAAnD,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA+C,EAAA/C,EAAAmB,GAAA,IAAApB,EAAA,GAAAsD,SAAA5B,KAAAzB,GAAAsD,MAAA,uBAAAvD,GAAAC,EAAAuD,cAAAxD,EAAAC,EAAAuD,YAAAC,MAAA,QAAAzD,GAAA,QAAAA,EAAA8C,MAAAI,KAAAjD,GAAA,cAAAD,GAAA,2CAAA0D,KAAA1D,GAAAgD,EAAA/C,EAAAmB,QAAA,YAAA4B,EAAA/C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAA2C,MAAA1B,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAwD,EAAAxD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAAiD,QAAAC,QAAAlD,GAAAmD,KAAA7D,EAAAI,EAAA,UAAA0D,EAAA5D,GAAA,sBAAAH,EAAA,KAAAD,EAAAiE,UAAA,WAAAJ,QAAA,SAAA3D,EAAAI,GAAA,IAAAe,EAAAjB,EAAA8D,MAAAjE,EAAAD,GAAA,SAAAmE,EAAA/D,GAAAwD,EAAAvC,EAAAnB,EAAAI,EAAA6D,EAAAC,EAAA,OAAAhE,EAAA,UAAAgE,EAAAhE,GAAAwD,EAAAvC,EAAAnB,EAAAI,EAAA6D,EAAAC,EAAA,QAAAhE,EAAA,CAAA+D,OAAA,MAOA,IACME,EAA8B,8BAC9BC,EAAmB,mBAKrBC,EAAgC,KAChCC,EAAyB,KAK7B,SAASC,IACP,OAAID,GAA0BA,EAAuBE,OAC5CF,EAAuBE,OAGR,oBAAfC,YACPA,WAAWC,QACXD,WAAWC,OAAOF,OAEXC,WAAWC,OAAOF,OAEL,oBAAXG,QAA0BA,OAAOD,QAAUC,OAAOD,OAAOF,OAC3DG,OAAOD,OAAOF,YAED,IAAXI,EAAAA,GAA0BA,EAAAA,EAAOF,QAAUE,EAAAA,EAAOF,OAAOF,OAC3DI,EAAAA,EAAOF,OAAOF,OAED,oBAAXE,QAA0BA,OAAOF,OACnCE,OAAOF,OAGT,IACT,CAMA,SAASK,EAAkBC,GACzBR,EAAyBQ,GAAkB,IAC7C,CAcA,SAGeC,EAAaC,GAAA,OAAAC,EAAAjB,MAAC,KAADD,UAAA,CAiB5B,SAAAkB,IAFC,OAEDA,EAAAnB,EAAAoB,IAAAC,KAjBA,SAAAC,EAA6BC,GAAY,IAAAb,EAAA,OAAAU,IAAAI,KAAA,SAAAC,GAAA,cAAAA,EAAAC,KAAAD,EAAAE,MAAA,OACP,GAA1BjB,EAASD,IACF,CAAFgB,EAAAE,KAAA,cACH,IAAIC,MAAM,uCAAsC,cAAAH,EAAAE,KAAA,EAE3CjB,EAAOmB,UAClB,MACAN,EACA,CACE7B,KAAM,QACNoC,WAAY,UAEd,EACA,CAAC,WACF,cAAAL,EAAAM,OAAA,SAAAN,EAAAO,MAAA,wBAAAP,EAAAQ,OAAA,EAAAX,EAAA,KACFpB,MAAA,KAAAD,UAAA,UAKciC,EAAaC,GAAA,OAAAC,EAAAlC,MAAC,KAADD,UAAA,CAmB5B,SAAAmC,IAFC,OAEDA,EAAApC,EAAAoB,IAAAC,KAnBA,SAAAgB,EAA6BC,GAAY,IAAA5B,EAAA6B,EAAA,OAAAnB,IAAAI,KAAA,SAAAgB,GAAA,cAAAA,EAAAd,KAAAc,EAAAb,MAAA,OACP,GAA1BjB,EAASD,IACF,CAAF+B,EAAAb,KAAA,cACH,IAAIC,MAAM,uCAAsC,cAAAY,EAAAb,KAAA,EAEhCjB,EAAOmB,UAC7B,MACAS,EACA,CACE5C,KAAM,OACNoC,WAAY,UAEd,EACA,IACD,OATc,OAATS,EAASC,EAAAR,KAAAQ,EAAAb,KAAG,EAWLjB,EAAO+B,UAAU,MAAOF,GAAU,cAAAC,EAAAT,OAAA,SAAAS,EAAAR,MAAA,wBAAAQ,EAAAP,OAAA,EAAAI,EAAA,KAChDnC,MAAA,KAAAD,UAAA,CA4DD,SAASyC,IACP,IAAMC,EAAS9B,OAAO+B,aAAaC,QAAQxC,GAC3C,OAAOsC,EAASG,KAAKC,MAAMJ,GAAU,IACvC,CAMA,SAASK,EAAqBT,GAC5B1B,OAAO+B,aAAaK,QAClB5C,EACAyC,KAAKI,UAAUX,GAEnB,CAaA,SAASY,IACPtC,OAAO+B,aAAaQ,WAAW/C,EACjC,CAEA,SAASgD,EAAiCC,GACxC/C,EAAgC+C,CAClC,CAKA,SAASC,IACP,IAAMC,EAAW3C,OAAO+B,aAAaC,QAAQvC,GAC7C,OAAOkD,EAAWV,KAAKC,MAAMS,GAAY,IAC3C,CAMA,SAASC,EAAYD,GACnB3C,OAAO+B,aAAaK,QAAQ3C,EAAkBwC,KAAKI,UAAUM,GAC/D,CAiDA,SAASE,EAAwBC,GAC/B,IAAKA,GAAkC,iBAAdA,EACvB,MAAM,IAAI/B,MAAM,oDAIlB,IAAMgC,EACJD,EAAUE,WAAW,OAASF,EAAUE,WAAW,MAC/CF,EAAUnE,MAAM,GAChBmE,EAGN,GAAIC,EAAiBpG,OAAS,GAAK,IADpB,iBACmCmC,KAAKiE,GACrD,MAAM,IAAIhC,MAAM,oDAElB,OAAO,IAAIkC,WACTF,EAAiBG,MAAM,OAAOC,IAAI,SAACC,GAAC,OAAKC,SAASD,EAAG,GAAG,GAE5D,CAOA,SAASE,EAAsBC,GAC7B,OAAOtF,EAAIsF,GAAQJ,IAAI,SAACK,GAAC,OAAKA,EAAE9E,SAAS,IAAI+E,SAAS,EAAG,IAAI,GAAEC,KAAK,GACtE,CAKA,SAASC,EAAiBC,EAAWC,GACnC,IAAMC,EAAgBD,EAAeD,EAAUjH,OAG/C,GAAImH,EAAgB,EAAG,CACrB,IAAMC,EAAU,IAAId,WAAWa,GAAeE,KAAK,GACnD,OAAO,IAAIf,WAAW,GAADgB,OAAAhG,EAAK8F,GAAO9F,EAAK2F,IACxC,CAGA,GAAIE,EAAgB,EAAG,CAGrB,IAFA,IAAMI,GAAqC,EAAjBJ,EACtBK,EAAY,EACPxI,EAAI,EAAGA,EAAIuI,GAAqBvI,EAAIiI,EAAUjH,OAAQhB,IACxC,IAAjBiI,EAAUjI,IACZwI,IAIJ,GAAIA,IAAcD,EAChB,MAAM,IAAInD,MAAM,iEAADkD,OACoDC,EAAiB,aAAAD,OAAYE,EAAS,MAG3G,OAAOP,EAAUjF,MAAMuF,EAAmBA,EAAoBL,EAChE,CACA,OAAOD,CACT,CAKA,SAASQ,EAAyBC,EAAcC,GAC9C,IAAMC,EAAIrG,MAAMI,KAAK,IAAI2E,WAAWoB,IAC9BhJ,EAAI6C,MAAMI,KAAK,IAAI2E,WAAWqB,IACpC,OAAO,IAAIrB,WAAW,GAADgB,OAAKM,EAAMlJ,GAClC,CAKA,SAASmJ,EAAiBC,GACxB,IAAMC,EAAkB7B,EAAwB4B,GAG5CE,EAAQ,EAGZ,GAA+B,IAA3BD,EAAgBC,GAClB,MAAM,IAAI5D,MACR,8DAIJ,IAAM6D,EAAUF,IADhBC,GAEAA,IACA,IAAMtJ,EAAIqJ,EAAgB/F,MAAMgG,EAAOA,EAAQC,GAI/C,GAA+B,IAA3BF,EAHJC,GAASC,GAIP,MAAM,IAAI7D,MACR,8DAIJ,IAAM8D,EAAUH,IADhBC,GAEAA,IACA,IAAMJ,EAAIG,EAAgB/F,MAAMgG,EAAOA,EAAQE,GAGzCC,EAAUnB,EAAiBtI,EAAG,IAC9B0J,EAAUpB,EAAiBY,EAAG,IAGpC,OAAO,IAAItB,WAAW,GAADgB,OAAAhG,EAAK6G,GAAO7G,EAAK8G,IACxC,CAEA,SAMeC,EAAsBC,EAAAC,EAAAC,GAAA,OAAAC,EAAA/F,MAAC,KAADD,UAAA,CA0DrC,SAAAgG,IAFC,OAEDA,EAAAjG,EAAAoB,IAAAC,KA1DA,SAAA6E,EACEC,EACAC,EACAC,GAAU,IAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAlG,EAAA,OAAAU,IAAAI,KAAA,SAAAqF,GAAA,cAAAA,EAAAnF,KAAAmF,EAAAlF,MAAA,OAe6B,GAZjC2E,EAA2B,CAC/BQ,KAAM,qIACNC,QACE,qIACFC,IAAK,sIAIDT,EACe,oBAAX1F,QAA0BA,OAAOoG,gCACzC,sCAI+CC,KAH3CV,EACJF,EAAyBC,IAE+B,CAAAM,EAAAlF,KAAA,cAClD,IAAIC,MAAM,8EAEf,WAICuE,EAAqB,CAAFU,EAAAlF,KAAA,WACjBwE,IAAwBK,EAAwC,CAAAK,EAAAlF,KAAA,cAC5D,IAAIC,MAAM,2EAADkD,OAC8D0B,EAAwC,cAAA1B,OAAaqB,EAAmB,MACpJ,OAMJ,OAFKM,EAA4B,IAAI3C,WACpCJ,EAAwB8C,IACzBK,EAAAlF,KAAA,GACuBV,EAAcwF,GAA0B,QAAjD,GAATC,EAASG,EAAA7E,KACC,CAAF6E,EAAAlF,KAAA,eACN,IAAIC,MAAM,6BAA4B,QAMd,GAF1B+E,EAAqBtB,EAAiBe,GACtCQ,EAAgBlD,EAAwB2C,GACxC3F,EAASD,IACF,CAAFoG,EAAAlF,KAAA,eACH,IAAIC,MAAM,uCAAsC,eAAAiF,EAAAlF,KAAA,GAE3CjB,EAAOyG,OAClB,CAAEzH,KAAM,QAAS0H,KAAM,WACvBV,EACAC,EACAC,GACD,eAAAC,EAAA9E,OAAA,SAAA8E,EAAA7E,MAAA,yBAAA6E,EAAA5E,OAAA,EAAAiE,EAAA,KACFhG,MAAA,KAAAD,UAAA,CAeD,SAASoH,EAAcC,EAAMzJ,EAAO0J,GAClC,IAAMC,EAAU,CACdF,KAAMA,EACNzJ,MAAOA,GAIL0J,IACFC,EAAQD,UAAYA,GAGlBhH,EACFA,EAA8BkH,YAAYD,GACjC3G,OAAO6G,SAAW7G,QAC3BA,OAAO6G,OAAOD,YACZ,CACEH,KAAMA,EACNzJ,MAAOA,GAET,KASN,SAAoB8J,GAClB,IAAMC,EAAaC,SAASC,eAAe,eAC3C,GAAIF,EAAY,CACd,IAAMJ,EAAUK,SAASE,cAAc,KACvCP,EAAQQ,UAAYL,EACpBC,EAAWK,YAAYT,EACzB,CACF,CAbEU,CAAW,mBAADpD,OAAoBwC,EAAI,MAAAxC,OAAKjH,GACzC,CAkFA,SAASsK,EAAa/C,GAKpB,IAHA,IAAIgD,EAAW,6DACXC,EAAe,GACfC,EAAe,GACV9L,EAAI,EAAGA,EAAI4I,EAAE5H,OAAQhB,IAAK,CACjC,IAAgC,IAA5B4L,EAASG,QAAQnD,EAAE5I,IACrB,MAAM,IAAIoF,MAAM,yBAADkD,OAA0BM,EAAE5I,GAAE,6BAE/C,IAAIgM,EAAQJ,EAASG,QAAQnD,EAAE5I,IAKlB,GAATgM,GAAchM,IAAM8L,EAAa9K,QACnC8K,EAAaG,KAAK,GAIpB,IADA,IAAIC,EAAI,EACDA,EAAIL,EAAa7K,QAAUgL,EAAQ,GAAG,CAC3C,IAAIG,EAAcN,EAAaK,GAW/BF,GANEG,OADkBzB,IAAhByB,EACYH,EAEc,GAAdG,EAAmBH,IAIZ,EAEvBH,EAAaK,GAAKC,EAAc,IAChCD,GACF,CACF,CAEA,IAAIE,EAASN,EAAaxD,OAAOuD,EAAaQ,WAC9C,OAAO,IAAI/E,WAAW8E,EACxB,CAEA,SAQeE,EAAiBC,GAAA,OAAAC,EAAA9I,MAAC,KAADD,UAAA,CAqChC,SAAA+I,IAFC,OAEDA,EAAAhJ,EAAAoB,IAAAC,KArCA,SAAA4H,EAAiC7D,GAAC,IAAA8D,EAAAC,EAAAC,EAAA1I,EAAA2I,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAArI,IAAAI,KAAA,SAAAkI,GAAA,cAAAA,EAAAhI,KAAAgI,EAAA/H,MAAA,OACD,MAAzBuH,EAAUf,EAAa/C,IAEjB5H,OAAS,GAAC,CAAAkM,EAAA/H,KAAA,cACd,IAAIC,MAAM,8DAADkD,OACiDoE,EAAQ1L,SACvE,OAM6B,GAH1B2L,EAAUD,EAAQS,SAAS,EAAGT,EAAQ1L,OAAS,GAC/C4L,EAAWF,EAAQS,SAAST,EAAQ1L,OAAS,GAE7CkD,EAASD,IACF,CAAFiJ,EAAA/H,KAAA,cACH,IAAIC,MAAM,uCAAsC,cAAA8H,EAAA/H,KAAA,GAIjCjB,EAAOkJ,OAAO,UAAWT,GAAQ,QAClB,OADhCE,EAAQK,EAAA1H,KACRsH,EAAQ,IAAIxF,WAAWuF,GAASK,EAAA/H,KAAA,GACfjB,EAAOkJ,OAAO,UAAWN,GAAM,QASjB,GAT/BC,EAAQG,EAAA1H,KACRwH,EAAQ,IAAI1F,WAAWyF,GACvBE,EAAmBD,EAAMG,SAAS,EAAG,GAQ1B,KAJdP,EAAS,GAAKK,EAAiB,GAC/BL,EAAS,GAAKK,EAAiB,GAC/BL,EAAS,GAAKK,EAAiB,GAC/BL,EAAS,GAAKK,EAAiB,IAChB,CAAAC,EAAA/H,KAAA,eACV,IAAIC,MAAM,gCAA+B,eAAA8H,EAAA3H,OAAA,SAG1CoH,GAAO,yBAAAO,EAAAzH,OAAA,EAAAgH,EAAA,KACf/I,MAAA,KAAAD,UAAA,UAUc4J,EAASC,EAAAC,GAAA,OAAAC,EAAA9J,MAAC,KAADD,UAAA,CAyGxB,SAAA+J,IAFC,OAEDA,EAAAhK,EAAAoB,IAAAC,KAzGA,SAAA4I,EAAyBC,EAAYC,GAAS,IAAAC,EAAAjB,EAAAkB,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA3J,IAAAI,KAAA,SAAAwJ,GAAA,cAAAA,EAAAtJ,KAAAsJ,EAAArJ,MAAA,OAAAqJ,EAAAC,GACpCd,EAASa,EAAArJ,KACV,WADUqJ,EAAAC,GACF,EASR,gBATQD,EAAAC,GASK,EAKb,wBALaD,EAAAC,GAKQ,GAyBrB,wBAzBqBD,EAAAC,GAyBA,GAyBrB,eAzBqBD,EAAAC,GAyBT,mBA/DiC,GACjB,MADzBb,EAAkBjC,EAAa+B,IACjB1M,OAAa,CAAAwN,EAAArJ,KAAA,cACzB,IAAIC,MAAM,8CAADkD,OACiCsF,EAAgB5M,OAAM,MACrE,cAAAwN,EAAAjJ,OAAA,SAEIqI,EAAgBT,SAAS,EAAG,KAAG,WAGlCO,EAAWrG,WAAW,MAAO,CAAFmH,EAAArJ,KAAA,eAAAqJ,EAAAjJ,OAAA,SACtB2B,EAAwBwG,EAAW1K,MAAM,KAAG,OAsFA,eAAAwL,EAAAjJ,OAAA,SAE9C2B,EAAwBwG,IAtFW,eAAAc,EAAArJ,KAAA,GAEpBmH,EAAkBoB,GAAW,QAKnD,GALMf,EAAO6B,EAAAhJ,KAEPqI,EAAUlB,EAAQ,GAClBmB,EAAcnB,EAAQQ,SAAS,GAGrB,MAAZU,EAAgB,CAAAW,EAAArJ,KAAA,eACZ,IAAIC,MAAM,6BAADkD,OACgBuF,EAAO,+BACrC,WAIwB,KAAvBC,EAAY9M,OAAa,CAAAwN,EAAArJ,KAAA,eACrB,IAAIC,MAAM,uCAAsC,WAI7B,KAAvB0I,EAAY9M,QAAqC,IAApB8M,EAAY,IAAY,CAAAU,EAAArJ,KAAA,eACjD,IAAIC,MAAM,uDAAsD,eAAAoJ,EAAAjJ,OAAA,SAGjEuI,EAAYX,SAAS,EAAG,KAAG,eAAAqB,EAAArJ,KAAA,GAGZmH,EAAkBoB,GAAW,QAKnD,GALMf,EAAO6B,EAAAhJ,KAEPqI,EAAUlB,EAAQ,GAClBmB,EAAcnB,EAAQQ,SAAS,GAGrB,MAAZU,EAAgB,CAAAW,EAAArJ,KAAA,eACZ,IAAIC,MAAM,6BAADkD,OACgBuF,EAAO,+BACrC,WAIwB,KAAvBC,EAAY9M,OAAa,CAAAwN,EAAArJ,KAAA,eACrB,IAAIC,MAAM,uCAAsC,WAI7B,KAAvB0I,EAAY9M,QAAqC,IAApB8M,EAAY,IAAY,CAAAU,EAAArJ,KAAA,eACjD,IAAIC,MAAM,uDAAsD,eAAAoJ,EAAAjJ,OAAA,SAGjEuI,EAAYX,SAAS,EAAG,KAAG,QAGb,GAHae,EAGRQ,EAAAA,EAAOC,OAAOjB,GAAhCS,EAAMD,EAANC,OAAQC,EAAKF,EAALE,MAED,eAAXD,EAAuB,CAAAK,EAAArJ,KAAA,eACnB,IAAIC,MAAM,4EAEf,QAGkC,GAChB,MADfiJ,EAAQK,EAAAA,EAAOE,UAAUR,IACrBpN,OAAa,CAAAwN,EAAArJ,KAAA,eACf,IAAIC,MAAM,0DAADkD,OAC6C+F,EAAMrN,SACjE,QAMH,GAHMsN,EAAaD,EAAM,GACnBE,EAAUF,EAAMrL,MAAM,GAGT,IAAfsL,EAAgB,CAAAE,EAAArJ,KAAA,eACZ,IAAIC,MAAM,0GAEf,eAAAoJ,EAAAjJ,OAAA,SAGI,IAAI+B,WAAWiH,IAAQ,QAK5B,GAFFM,QAAQC,KAAK,uBAADxG,OACaqF,EAAS,kCAE9BD,EAAWrG,WAAW,MAAO,CAAFmH,EAAArJ,KAAA,gBAAAqJ,EAAAjJ,OAAA,SACtB2B,EAAwBwG,EAAW1K,MAAM,KAER,yBAAAwL,EAAA/I,OAAA,EAAAgI,EAAA,KAE/C/J,MAAA,KAAAD,UAAA,CAiFD,SAASsL,EAAeC,EAAQC,GAC9B,IAAMC,EAAc,CAAC,EAEfC,EAAqB,CACzB/G,QAAS,+BACTgH,OAAQ,+BACRC,YAAa,6BACbC,YACE,gEACFC,YACE,iLACFC,aAAc,+BACdC,SAAU,6DACVC,WAAY,wCACZC,WAAY,aACZC,MACE,iLACFC,WACE,iLACFC,gBACE,iLACFC,MAAO,kEACPC,OAAQ,kEACRC,SAAU,kEACVC,UACE,kEACFC,WACE,8EACFC,UACE,8HACFC,UAAW,gDACXC,aAAc,iCACdC,SAAU,wBACVC,OAAQ,kDA4BV,OAzBAnQ,OAAOoQ,QAAQzB,GAAQ0B,QAAQ,SAAAC,GAAuB,IAr2BxDjR,EAAAF,EAq2BwDoR,GAr2BxDpR,EAq2BwD,EAr2BxD,SAAAE,GAAA,GAAA6C,MAAAC,QAAA9C,GAAA,OAAAA,CAAA,CAAAmR,CAAAnR,EAq2BwDiR,IAr2BxD,SAAAjR,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyF,KAAA,IAAAlE,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAoL,KAAAzM,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAiQ,CAAApR,EAAAF,IAAAqD,EAAAnD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAA6P,IAq2BmCC,EAAQJ,EAAA,GAAEvP,EAAKuP,EAAA,GACxCK,EAAgBD,EAASE,OAC/B,GAA6B,IAAzBD,EAAcjQ,OAChB,MAAM,IAAIoE,MAAM,sCAElB,IAAM+L,EAAgBhC,EAAmB8B,GACzC,IAAKE,EACH,MAAM,IAAI/L,MAAM,+CAADkD,OACkC2I,EAAa,MAGhE,IAAMG,EAAa,IAAIC,OAAOF,GACxBG,EAAajQ,EAAM6P,OACzB,GAAyB,GAArBI,EAAWtQ,OACb,MAAM,IAAIoE,MAAM,kBAADkD,OAAmB2I,EAAa,eAGjD,IADqBG,EAAWjO,KAAKmO,GAEnC,MAAM,IAAIlM,MAAM,yCAADkD,OAC4B2I,EAAa,MAG1D/B,EAAY+B,GAAiBK,CAC/B,GAEOpC,CACT,C,mhDC93BA,IACE3K,EAmBEgN,EAAAA,GAlBF7L,EAkBE6L,EAAAA,GAjBFrL,EAiBEqL,EAAAA,GAhBF/K,EAgBE+K,EAAAA,GAfF5K,EAeE4K,EAAAA,GAdFxK,EAcEwK,EAAAA,GAbFtK,EAaEsK,EAAAA,GAZF1G,EAYE0G,EAAAA,GAXFrK,EAWEqK,EAAAA,GAVF5J,EAUE4J,EAAAA,GATF5F,EASE4F,EAAAA,GARFjF,EAQEiF,EAAAA,GAPFlE,EAOEkE,EAAAA,GANF1K,EAME0K,EAAAA,GALFvJ,EAKEuJ,EAAAA,GAJF1I,EAIE0I,EAAAA,GAHF9I,EAGE8I,EAAAA,GAFFlI,EAEEkI,EAAAA,GADFxC,EACEwC,EAAAA,GAQJ,SAASC,EAAcxK,GACrB,IAAMyK,EAAgB,CAAC,EACjBC,EAAcpL,KAAKC,MAAMS,GAEzB2K,EAAkBtG,SAASC,eAAe,oBAC1CsG,EAAgBvG,SAASC,eAAe,kBACxCuG,EAAqBxG,SAASC,eAAe,cAEnD,IAAKqG,IAAoBE,EACvB,MAAM,IAAIzM,MAAM,2DAElB,IAAM0M,EAAoBzG,SAASC,eAAe,aAClD,IAAKwG,EACH,MAAM,IAAI1M,MACR,kEAyBJ,IApBqC,IAAjCsM,EAAYK,kBACdJ,EAAgBK,MAAMC,QAAU,eAChCJ,EAAmBG,MAAMC,QAAU,eACnCJ,EAAmBG,MAAME,OAAS,iBAClCL,EAAmBG,MAAMxC,aAAe,MAExCoC,EAAcI,MAAMC,QAAU,eAC9BH,EAAkBE,MAAME,OAAS,iBACjCJ,EAAkBE,MAAMxC,aAAe,MAEvCiC,EAAgC,kBAAI,IAEpCE,EAAgBK,MAAMC,QAAU,OAChCJ,EAAmBG,MAAMC,QAAU,OACnCL,EAAcI,MAAMC,QAAU,OAE9BH,EAAkBE,MAAME,OAAS,OACjCT,EAAgC,kBAAI,GAGlCC,EAAY1C,OAAQ,CAEtB,IAAME,EAAcH,EAAe2C,EAAY1C,QAC/C3O,OAAOoQ,QAAQvB,GAAawB,QAAQ,SAAAC,GAAkB,IAAAC,EAAAuB,EAAAxB,EAAA,GAAhByB,EAAGxB,EAAA,GAAEvP,EAAKuP,EAAA,GAC9CkB,EAAkBE,MAAMI,GAAO/Q,CACjC,GAEI6N,EAAYY,kBAEdzE,SAASgH,gBAAgBL,MAAMlC,gBAC7BZ,EAAYY,gBACdzE,SAASiH,KAAKN,MAAMlC,gBAAkBZ,EAAYY,iBAGhDZ,EAAYW,aACdxE,SAASC,eAAe,kBAAkB0G,MAAMpC,MAC9CV,EAAYW,YAGhB4B,EAAsB,OAAIvC,CAC5B,CAEA,GAAIwC,EAAYa,iBAAkB,CAEhC,IAAMrD,EAAcH,EAAe2C,EAAYa,kBAC/ClS,OAAOoQ,QAAQvB,GAAawB,QAAQ,SAAA8B,GAAkB,IAAAC,EAAAN,EAAAK,EAAA,GAAhBJ,EAAGK,EAAA,GAAEpR,EAAKoR,EAAA,GAC9CZ,EAAmBG,MAAMI,GAAO/Q,CAClC,GAEI6N,EAAYW,aACdxE,SAASC,eAAe,oBAAoB0G,MAAMpC,MAChDV,EAAYW,YAGhB4B,EAAgC,iBAAIvC,CACtC,CAEA,OAAO5I,KAAKI,UAAU+K,EACxB,C,25EC1GA,IAAAjS,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA5C,EAAAsB,GAAA,KAAAF,EAAApB,EAAA,KAAA6C,EAAAvB,CAAA,UAAA4R,EAAAlT,EAAAE,GAAA,IAAAD,EAAAY,OAAAsS,KAAAnT,GAAA,GAAAa,OAAAuS,sBAAA,KAAA9S,EAAAO,OAAAuS,sBAAApT,GAAAE,IAAAI,EAAAA,EAAA+S,OAAA,SAAAnT,GAAA,OAAAW,OAAAyS,yBAAAtT,EAAAE,GAAAuC,UAAA,IAAAxC,EAAAwM,KAAAvI,MAAAjE,EAAAK,EAAA,QAAAL,CAAA,UAAAsT,EAAAvT,GAAA,QAAAE,EAAA,EAAAA,EAAA+D,UAAAzC,OAAAtB,IAAA,KAAAD,EAAA,MAAAgE,UAAA/D,GAAA+D,UAAA/D,GAAA,GAAAA,EAAA,EAAAgT,EAAArS,OAAAZ,IAAA,GAAAiR,QAAA,SAAAhR,GAAAsT,EAAAxT,EAAAE,EAAAD,EAAAC,GAAA,GAAAW,OAAA4S,0BAAA5S,OAAA6S,iBAAA1T,EAAAa,OAAA4S,0BAAAxT,IAAAiT,EAAArS,OAAAZ,IAAAiR,QAAA,SAAAhR,GAAAW,OAAA0B,eAAAvC,EAAAE,EAAAW,OAAAyS,yBAAArT,EAAAC,GAAA,UAAAF,CAAA,UAAAwT,EAAAxT,EAAAE,EAAAD,GAAA,OAAAC,EAAA,SAAAD,GAAA,IAAAO,EAAA,SAAAP,GAAA,aAAA0T,EAAA1T,KAAAA,EAAA,OAAAA,EAAA,IAAAD,EAAAC,EAAAE,OAAAyT,aAAA,YAAA5T,EAAA,KAAAQ,EAAAR,EAAA2B,KAAA1B,EAAAC,UAAA,aAAAyT,EAAAnT,GAAA,OAAAA,EAAA,UAAAkB,UAAA,uDAAAmS,OAAA5T,EAAA,CAAA6T,CAAA7T,GAAA,gBAAA0T,EAAAnT,GAAAA,EAAAA,EAAA,GAAAuT,CAAA7T,MAAAF,EAAAa,OAAA0B,eAAAvC,EAAAE,EAAA,CAAA2B,MAAA5B,EAAAwC,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAA3C,EAAAE,GAAAD,EAAAD,CAAA,UAAA4D,EAAAxD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAAiD,QAAAC,QAAAlD,GAAAmD,KAAA7D,EAAAI,EAAA,CAiBA,IAAM0T,GAAoB,IAAIC,aAAcC,OAAO,gBAmD5C,SAAeC,EAAWhO,GAAA,OAAAiO,EAAAlQ,MAAC,KAADD,UAAA,CAuDhC,SAAAmQ,IAAA,OA3HDhU,EA2HCgF,IAAAC,KAvDM,SAAAgB,EAAA+K,GAAA,IAAAiD,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAzL,EAAA0L,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA9P,IAAAI,KAAA,SAAAgB,GAAA,cAAAA,EAAAd,KAAAc,EAAAb,MAAA,OACuC,OADV0O,EAAYjD,EAAZiD,aAAcC,EAAclD,EAAdkD,eAC1CC,EAAa,IAAIY,EAAAA,GAAqB3O,EAAAb,KAAA,EAClB4O,EAAW1O,UACnC,MAAK0N,EAAA,GACAe,IACL,GACD,OAMC,OAVIE,EAAWhO,EAAAR,KAMXyO,EAAQ,IAAIW,EAAAA,GAAY,CAC5BC,IAAKd,EACLe,IAAK,IAAIC,EAAAA,GACTC,KAAM,IAAIC,EAAAA,KACVjP,EAAAb,KAAA,EAEsB8O,EAAMiB,oBAAoB,CAChDC,mBAAoBnB,EACpBoB,KAAM5B,IACN,OAHa,OAATU,EAASlO,EAAAR,KAAAQ,EAAAb,KAAG,GAOiBf,OAAOF,OAAOmB,UAC/C,MACAyO,EACA,CACE5Q,KAAM,QACNoC,WAAY,UAEd,EACA,IACD,QATyB,OAApB6O,EAAoBnO,EAAAR,KAAAQ,EAAAb,KAAG,GAUAf,OAAOF,OAAO+B,UACzC,MACAkO,GACD,QAKmE,OAR9DC,EAAcpO,EAAAR,KAIdmD,EAAiB,IAAIrB,WAAW8M,GAEhCC,EAAiB,IAAI/M,WAAW4M,EAAUmB,KAE1Cf,GAAM7L,EAAAA,EAAAA,IAAyB4L,EAAgB1L,GAAe3C,EAAAd,KAAA,GAAAc,EAAAb,KAAA,GAI5C+O,EAAUoB,KAAKzB,EAAcS,GAAI,QAAvDC,EAAavO,EAAAR,KAAAQ,EAAAb,KAAG,GAAH,oBAAAa,EAAAd,KAAG,GAAHc,EAAAyI,GAAAzI,EAAA,UAEP,IAAIZ,MAAM,oCAAsCY,EAAAyI,GAAE1L,YAAW,QAQnE,OALIyR,GAAgB7M,EAAAA,EAAAA,IAAsB,IAAIL,WAAWiN,IACrDE,GAAoB9M,EAAAA,EAAAA,IAAsB0M,GAC1CK,EAAkBpO,KAAKI,UAAU,CACrC6O,eAAgBd,EAChBe,WAAYhB,IACZxO,EAAAT,OAAA,SACKmP,GAAe,yBAAA1O,EAAAP,OAAA,EAAAI,EAAA,kBACvB+N,EA3HD,eAAAnU,EAAA,KAAAD,EAAAiE,UAAA,WAAAJ,QAAA,SAAA3D,EAAAI,GAAA,IAAAe,EAAAjB,EAAA8D,MAAAjE,EAAAD,GAAA,SAAAmE,EAAA/D,GAAAwD,EAAAvC,EAAAnB,EAAAI,EAAA6D,EAAAC,EAAA,OAAAhE,EAAA,UAAAgE,EAAAhE,GAAAwD,EAAAvC,EAAAnB,EAAAI,EAAA6D,EAAAC,EAAA,QAAAhE,EAAA,CAAA+D,OAAA,OA2HCD,MAAA,KAAAD,WA3HD,IAAA7D,CA2HC,C","sources":["webpack://import/../shared/turnkey-core.js","webpack://import/./src/turnkey-core.js","webpack://import/../shared/crypto-utils.js"],"sourcesContent":["import { bech32 } from \"bech32\";\n\n/**\n * Turnkey Core Module - Shared\n * Contains all the core cryptographic and utility functions shared across frames\n */\n\n/** constants for LocalStorage */\nconst TURNKEY_EMBEDDED_KEY = \"TURNKEY_EMBEDDED_KEY\";\nconst TURNKEY_TARGET_EMBEDDED_KEY = \"TURNKEY_TARGET_EMBEDDED_KEY\";\nconst TURNKEY_SETTINGS = \"TURNKEY_SETTINGS\";\n/** 48 hours in milliseconds */\nconst TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 48;\nconst TURNKEY_EMBEDDED_KEY_ORIGIN = \"TURNKEY_EMBEDDED_KEY_ORIGIN\";\n\nlet parentFrameMessageChannelPort = null;\nvar cryptoProviderOverride = null;\n\n/*\n * Returns a reference to the WebCrypto subtle interface regardless of the host environment.\n */\nfunction getSubtleCrypto() {\n if (cryptoProviderOverride && cryptoProviderOverride.subtle) {\n return cryptoProviderOverride.subtle;\n }\n if (\n typeof globalThis !== \"undefined\" &&\n globalThis.crypto &&\n globalThis.crypto.subtle\n ) {\n return globalThis.crypto.subtle;\n }\n if (typeof window !== \"undefined\" && window.crypto && window.crypto.subtle) {\n return window.crypto.subtle;\n }\n if (typeof global !== \"undefined\" && global.crypto && global.crypto.subtle) {\n return global.crypto.subtle;\n }\n if (typeof crypto !== \"undefined\" && crypto.subtle) {\n return crypto.subtle;\n }\n\n return null;\n}\n\n/*\n * Allows tests to explicitly set the crypto provider (e.g. crypto.webcrypto) when the runtime\n * environment does not expose one on the global/window objects.\n */\nfunction setCryptoProvider(cryptoProvider) {\n cryptoProviderOverride = cryptoProvider || null;\n}\n\n/* Security functions */\n\nfunction isDoublyIframed() {\n if (window.location.ancestorOrigins !== undefined) {\n // Does not exist in IE and firefox.\n // See https://developer.mozilla.org/en-US/docs/Web/API/Location/ancestorOrigins for how this works\n return window.location.ancestorOrigins.length > 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n dev: \"048cf9ed5f579298cc1571823a3222b82d80c529c551f6070fbe712ae1a9e8d1a23b7006e306d27190358dfcd9c44624918a00f23c920a33cb14f5b026eafc865d\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions ( 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @param {HTMLElement} element - Optional element parameter (for import frame)\n * @return {Object}\n */\nfunction validateStyles(styles, element) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n};\n","import * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n setCryptoProvider,\n loadTargetKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n resetTargetEmbeddedKey,\n getSettings,\n setSettings,\n sendMessageUp,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n validateStyles,\n} = SharedTKHQ;\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n const settingsObj = JSON.parse(settings);\n\n const passphraseLabel = document.getElementById(\"passphrase-label\");\n const mnemonicLabel = document.getElementById(\"mnemonic-label\");\n const passphraseTextarea = document.getElementById(\"passphrase\");\n\n if (!passphraseLabel || !passphraseTextarea) {\n throw new Error(\"no passphrase HTML elements found to apply settings to.\");\n }\n const plaintextTextarea = document.getElementById(\"plaintext\");\n if (!plaintextTextarea) {\n throw new Error(\n \"no plaintext textarea HTML element found to apply settings to.\"\n );\n }\n\n // Apply enablePassphrase setting\n if (settingsObj.enablePassphrase === true) {\n passphraseLabel.style.display = \"inline-block\";\n passphraseTextarea.style.display = \"inline-block\";\n passphraseTextarea.style.border = \"solid 1px #ccc\";\n passphraseTextarea.style.borderRadius = \"4px\";\n\n mnemonicLabel.style.display = \"inline-block\";\n plaintextTextarea.style.border = \"solid 1px #ccc\";\n plaintextTextarea.style.borderRadius = \"4px\";\n\n validSettings[\"enablePassphrase\"] = true;\n } else {\n passphraseLabel.style.display = \"none\";\n passphraseTextarea.style.display = \"none\";\n mnemonicLabel.style.display = \"none\";\n\n plaintextTextarea.style.border = \"none\";\n validSettings[\"enablePassphrase\"] = false;\n }\n\n if (settingsObj.styles) {\n // Validate, sanitize, and apply the styles to the \"plaintext\" textarea.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n plaintextTextarea.style[key] = value;\n });\n\n if (validStyles.backgroundColor) {\n // Apply background color to document and body as well.\n document.documentElement.style.backgroundColor =\n validStyles.backgroundColor;\n document.body.style.backgroundColor = validStyles.backgroundColor;\n }\n\n if (validStyles.labelColor) {\n document.getElementById(\"mnemonic-label\").style.color =\n validStyles.labelColor;\n }\n\n validSettings[\"styles\"] = validStyles;\n }\n\n if (settingsObj.passphraseStyles) {\n // Validate, sanitize, and apply the styles to the \"passphrase\" textarea.\n const validStyles = validateStyles(settingsObj.passphraseStyles);\n Object.entries(validStyles).forEach(([key, value]) => {\n passphraseTextarea.style[key] = value;\n });\n\n if (validStyles.labelColor) {\n document.getElementById(\"passphrase-label\").style.color =\n validStyles.labelColor;\n }\n\n validSettings[\"passphraseStyles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport {\n setCryptoProvider,\n loadTargetKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n resetTargetEmbeddedKey,\n getSettings,\n setSettings,\n sendMessageUp,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n validateStyles,\n applySettings,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n"],"names":["e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_OverloadYield","k","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_TARGET_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","cryptoProviderOverride","getSubtleCrypto","subtle","globalThis","crypto","window","global","setCryptoProvider","cryptoProvider","loadQuorumKey","_x","_loadQuorumKey","_regeneratorRuntime","mark","_callee","quorumPublic","wrap","_context","prev","next","Error","importKey","namedCurve","abrupt","sent","stop","loadTargetKey","_x2","_loadTargetKey","_callee2","targetPublic","targetKey","_context2","exportKey","getTargetEmbeddedKey","jwtKey","localStorage","getItem","JSON","parse","setTargetEmbeddedKey","setItem","stringify","resetTargetEmbeddedKey","removeItem","setParentFrameMessageChannelPort","port","getSettings","settings","setSettings","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","normalizePadding","byteArray","targetLength","paddingLength","padding","fill","concat","expectedZeroCount","zeroCount","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","fromDerSignature","derSignature","derSignatureBuf","index","rLength","sLength","rPadded","sPadded","verifyEnclaveSignature","_x3","_x4","_x5","_verifyEnclaveSignature","_callee5","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context5","prod","preprod","dev","__TURNKEY_SIGNER_ENVIRONMENT__","undefined","verify","hash","sendMessageUp","type","requestId","message","postMessage","parent","content","messageLog","document","getElementById","createElement","innerText","appendChild","logMessage","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","carry","push","j","currentByte","result","reverse","base58CheckDecode","_x7","_base58CheckDecode","_callee7","decoded","payload","checksum","hash1Buf","hash1","hash2Buf","hash2","computedChecksum","_context7","subarray","digest","decodeKey","_x8","_x9","_decodeKey","_callee8","privateKey","keyFormat","decodedKeyBytes","version","keyAndFlags","_payload","_version","_keyAndFlags","_bech32$decode","prefix","words","bytes","schemeFlag","privkey","_context8","t0","bech32","decode","fromWords","console","warn","validateStyles","styles","element","validStyles","cssValidationRegex","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","SharedTKHQ","applySettings","validSettings","settingsObj","passphraseLabel","mnemonicLabel","passphraseTextarea","plaintextTextarea","enablePassphrase","style","display","border","_slicedToArray","key","documentElement","body","passphraseStyles","_ref3","_ref4","ownKeys","keys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","_objectSpread","_defineProperty","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","TextEncoder","encode","HpkeEncrypt","_HpkeEncrypt","plaintextBuf","receiverPubJwk","kemContext","receiverPub","suite","senderCtx","receiverPubCryptoKey","receiverPubRaw","encappedKeyBuf","aad","ciphertextBuf","ciphertextHex","encappedKeyBufHex","encryptedBundle","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createSenderContext","recipientPublicKey","info","enc","seal","encappedPublic","ciphertext"],"sourceRoot":""} \ No newline at end of file diff --git a/import/dist/index.html b/import/dist/index.html index 0e88d04..d60d273 100644 --- a/import/dist/index.html +++ b/import/dist/index.html @@ -1 +1 @@ -Turnkey Import
\ No newline at end of file +Turnkey Import
\ No newline at end of file diff --git a/import/dist/standalone.html b/import/dist/standalone.html index 4651ff0..c723b14 100644 --- a/import/dist/standalone.html +++ b/import/dist/standalone.html @@ -1 +1 @@ -Turnkey Import (Standalone Mode)

Initialize Import




Import Wallet


Import Private Key



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file +Turnkey Import (Standalone Mode)

Initialize Import




Import Wallet


Import Private Key



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file diff --git a/shared/turnkey-core.js b/shared/turnkey-core.js index 97071c1..c74720d 100644 --- a/shared/turnkey-core.js +++ b/shared/turnkey-core.js @@ -5,11 +5,41 @@ import { bech32 } from "bech32"; * Contains all the core cryptographic and utility functions shared across frames */ +/** + * Constant-time string comparison to prevent timing side-channel attacks. + * Standard `===` / `!==` short-circuits on the first differing byte, leaking + * information about how many leading bytes match. This XOR-based approach + * always compares every byte regardless of mismatches. + * @param {string} a + * @param {string} b + * @returns {boolean} true if strings are equal + */ +function timingSafeEqual(a, b) { + if (typeof a !== "string" || typeof b !== "string") return false; + const enc = new TextEncoder(); + const aBuf = enc.encode(a); + const bBuf = enc.encode(b); + if (aBuf.length !== bBuf.length) { + return false; + } + let diff = 0; + for (let i = 0; i < aBuf.length; i++) { + diff |= aBuf[i] ^ bBuf[i]; + } + return diff === 0; +} + /** constants for LocalStorage */ const TURNKEY_EMBEDDED_KEY = "TURNKEY_EMBEDDED_KEY"; const TURNKEY_TARGET_EMBEDDED_KEY = "TURNKEY_TARGET_EMBEDDED_KEY"; const TURNKEY_SETTINGS = "TURNKEY_SETTINGS"; -/** 48 hours in milliseconds */ +/** + * TTL for the embedded ECDH private key stored in localStorage. + * + * SECURITY NOTE: The P-256 ECDH private key is stored as a JSON-serialized JWK + * in localStorage, where it cannot be reliably zeroed (localStorage values are + * immutable strings managed by the browser). + */ const TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 48; const TURNKEY_EMBEDDED_KEY_ORIGIN = "TURNKEY_EMBEDDED_KEY_ORIGIN"; @@ -829,10 +859,9 @@ function parsePrivateKey(privateKey) { * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions). * Any invalid style throws an error. Returns an object of valid styles. * @param {Object} styles - * @param {HTMLElement} element - Optional element parameter (for import frame) * @return {Object} */ -function validateStyles(styles, element) { +function validateStyles(styles) { const validStyles = {}; const cssValidationRegex = { @@ -932,4 +961,5 @@ export { encodeKey, parsePrivateKey, validateStyles, + timingSafeEqual, };