h)p      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~                                                                                                                                                      0.1.1.0 Safe-Inferred"'?paseto1Error decoding a compressed elliptic curve point.paseto-Prefix is not either of the expected values (0x02 or 0x03).paseto3Length of the provided compressed point is invalid.paseto2Failed to find the modular square root of a value.pasetoPoint is invalid for the curve.paseto4Error decoding an uncompressed elliptic curve point.paseto"Prefix is not the expected value (0x04).paseto(Length of the provided point is invalid.pasetoPoint is invalid for the curve. pasetoError decoding a scalar value. pasetoInvalid scalar length. paseto(Decoded scalar is invalid for the curve.paseto0Whether an elliptic curve scalar value is valid.paseto&Encode an elliptic curve scalar value. paseto Render a   as .paseto&Decode an elliptic curve scalar value.pasetoEncode an elliptic curve point into its uncompressed binary format as defined by  https://www.secg.org/sec1-v2.pdfSEC 1 and  9https://datatracker.ietf.org/doc/html/rfc5480#section-2.2RFC 5480 section 2.2.Note that this function will only accept a point on an elliptic curve over p (i.e. ).pasetoEncode an elliptic curve point into its compressed binary format as defined by  https://www.secg.org/sec1-v2.pdfSEC 1.Note that this function will only accept a point on an elliptic curve over p (i.e. ).Adapted from  https://github.com/haskell-crypto/cryptonite/issues/302#issue-531003322cryptonite issue #302.paseto Render an  as .pasetoDecode an elliptic curve point from its uncompressed binary format as defined by  https://www.secg.org/sec1-v2.pdfSEC 1 and  9https://datatracker.ietf.org/doc/html/rfc5480#section-2.2RFC 5480 section 2.2.Note that this function will only decode a point on an elliptic curve over p (i.e. ).paseto Render an  as .pasetoDecode an elliptic curve point from its compressed binary format as defined by  https://www.secg.org/sec1-v2.pdfSEC 1 and  9https://datatracker.ietf.org/doc/html/rfc5480#section-2.2RFC 5480 section 2.2.Note that this function will only decode a point on an elliptic curve over p (i.e. ). Thanks to  5https://github.com/haskell-crypto/cryptonite/pull/303cryptonite PR #303, there's a function that we can use to compute a square root modulo a prime number ().pasetoConstruct the  which corresponds to a given .paseto%Invalid prefix which was encountered.pasetoExpected lengthpaseto Actual lengthpaseto%Invalid prefix which was encountered.pasetoExpected lengthpaseto Actual length pasetoExpected lengthpaseto Actual length  Safe-Inferred"'?, paseto&Error decoding a public key for curve .paseto'Error decoding a compressed public key.paseto*Error decoding an uncompressed public key.pasetoECDSA public key for curve .pasetoECDSA private key for curve .Note that this type's 3 instance performs a constant-time equality check.pasetoElliptic curve .paseto&Generate a random scalar on the curve .paseto'Whether a scalar is valid on the curve .paseto"Construct a private key for curve .paseto!Generate a private key for curve .paseto;Encode a private key into its binary format as defined in  #https://tools.ietf.org/html/rfc5915RFC 5915 , i.e. the  privateKey field described in  7https://datatracker.ietf.org/doc/html/rfc5915#section-3 section 3.paseto;Decode a private key from its binary format as defined in  #https://tools.ietf.org/html/rfc5915RFC 5915 , i.e. the  privateKey field described in  7https://datatracker.ietf.org/doc/html/rfc5915#section-3 section 3.paseto!Construct a public key for curve .pasetoConstruct the  which corresponds to a given .pasetoEncode an elliptic curve point into its compressed binary format as defined by  https://www.secg.org/sec1-v2.pdfSEC 1 and  9https://datatracker.ietf.org/doc/html/rfc5480#section-2.2RFC 5480 section 2.2. paseto Render a   as .!pasetoDecode a public key from either its compressed or uncompressed binary format as defined by  https://www.secg.org/sec1-v2.pdfSEC 1 and  9https://datatracker.ietf.org/doc/html/rfc5480#section-2.2RFC 5480 section 2.2."   !$   ! Safe-Inferred"'?(pasetoPASETO token purpose.)paseto$Shared-key authenticated encryption.*pasetoPublic-key digital signatures ( not encrypted).+pasetoPASETO protocol version.,paseto$Version 3. Modern NIST cryptography.-pasetoVersion 4. Modern  https://doc.libsodium.org/Sodium ( libsodium) cryptography.+-,()*+-,()* Safe-Inferred"'?2paseto%Error decoding a PAE-encoded message.4paseto"Encode a multipart message using  https://github.com/paseto-standard/paseto-spec/blob/af79f25908227555404e7462ccdd8ce106049469/docs/01-Protocol-Versions/Common.md#authentication-padding!Pre-Authentication Encoding (PAE) as defined in the PASETO spec.5paseto9Decode a multipart message which has been encoded using  https://github.com/paseto-standard/paseto-spec/blob/af79f25908227555404e7462ccdd8ce106049469/docs/01-Protocol-Versions/Common.md#authentication-padding!Pre-Authentication Encoding (PAE) as defined in the PASETO spec.42354235 Safe-Inferred "'(1? 8paseto*Simple wrapper around a 32-byte (256-bit)  value.Note that this type's 2 instance performs a constant-time equality check.:pasetoConstruct a 32-byte (256-bit)  value from an array of bytes.;paseto Construct a 8 value from a  of .<paseto Convert a 8 value to .=paseto Convert a 8 value to a  of .>pasetoRandomly generate a 8 value.89:;<=>899:;<=> Safe-Inferred "')*15?(0Fpaseto.Verification key (also known as a public key).GpasetoVersion 3 verification key.HpasetoVersion 4 verification key.Ipaseto1Signing key (also known as a private/secret key).Note that this type's 3 instance performs a constant-time equality check.JpasetoVersion 3 signing key.KpasetoVersion 3 signing key.LpasetoSymmetric key.Note that this type's 3 instance performs a constant-time equality check.MpasetoVersion 3 symmetric key.NpasetoVersion 4 symmetric key.Opaseto2Get the raw bytes associated with a symmetric key.Ppaseto/Construct a version 3 symmetric key from bytes.6If the provided byte string does not have a length of 32 (256 bits),  is returned.Qpaseto/Construct a version 4 symmetric key from bytes.6If the provided byte string does not have a length of 32 (256 bits),  is returned.Rpaseto,Randomly generate a version 3 symmetric key.Spaseto,Randomly generate a version 4 symmetric key.Tpaseto0Get the raw bytes associated with a signing key.Upaseto-Construct a version 3 signing key from bytes.Vpaseto-Construct a version 4 signing key from bytes.Wpaseto*Randomly generate a version 3 signing key.Xpaseto*Randomly generate a version 4 signing key.Ypaseto5Get the raw bytes associated with a verification key.Zpaseto2Construct a version 3 verification key from bytes. The input  is expected to be formatted as either a compressed or uncompressed elliptic curve public key as defined by  https://www.secg.org/sec1-v2.pdfSEC 1 and  9https://datatracker.ietf.org/doc/html/rfc5480#section-2.2RFC 5480 section 2.2.[paseto2Construct a version 4 verification key from bytes.\pasetoGet the F which corresponds to a given I.LMNOPQRSIJKTUVWXFGHYZ[\LMNOPQRSIJKTUVWXFGHYZ[\ Safe-Inferred "')*15?. `pasetoSome kind of PASETO token.epaseto+PASETO token parameterized by its protocol + and (.fpasetoPASETO version 3 local token.gpasetoPASETO version 3 public token.hpasetoPASETO version 4 local token.ipasetoPASETO version 4 public token.jpasetoRaw PASETO token payload.Note that this type's 3 instance performs a constant-time equality check.mpasetoUnencrypted authenticated data which is not stored in the PASETO token.When a PASETO token is constructed, the implicit assertion is authenticated, but it is not stored in the token. This is useful if one wants to associate some data that should remain confidential.Note that this type's 3 instance performs a constant-time equality check.ppaseto0Footer consisting of unencrypted free-form data.The footer's contents may be JSON or some other structured data, but it doesn't have to be.When a PASETO token is constructed, the footer is authenticated, but not encrypted (i.e. its integrity is protected, but it is not made confidential). In authenticated encryption schemes, this is referred to as "associated data".Note that this type's 3 instance performs a constant-time equality check.spaseto Convert a e to a `.fpasetoEncrypted token payload.paseto"Optional footer (associated data).gpasetoSigned token payload.paseto"Optional footer (associated data).hpasetoEncrypted token payload.paseto"Optional footer (associated data).ipasetoSigned token payload.paseto"Optional footer (associated data).pqrmnojklefghi`abcdspqrmnojklefghi`abcds Safe-Inferred"'(?3~paseto Token claim.pasetoUnregistered claim key.pasetoToken claim key.pasetoToken identifier.paseto!Time at which a token was issued.paseto3Time from which a token should be considered valid.paseto!Time after which a token expires.paseto(Recipient for which a token is intended.pasetoSubject of a token.pasetoIssuer of a token.paseto Render an  as .paseto Render a  as .paseto Render an  as .paseto Render a  as .pasetoParse a  from .paseto%Registered claims as defined by the  https://github.com/paseto-standard/paseto-spec/blob/af79f25908227555404e7462ccdd8ce106049469/docs/02-Implementation-Guide/04-Claims.md#registered-claimsPASETO specification.paseto$Construct an unregistered claim key.If the provided Text* key matches that of a registered claim (), this function will return .paseto Render an  as .paseto/Get the JSON object key which corresponds to a ~.paseto Claim key.paseto Claim value.3~;~ Safe-Inferred"'?9pasetoCollection of ~s.pasetoEmpty collection of claims.paseto7Construct a collection of claims with a single element.paseto Insert a ~ into a collection of .Note that if a claim with the same key is already present, it is replaced with the provided claim.paseto#Delete a claim from the collection.paseto Lookup a ~ by its key.Note that this function is not intended to be exported as it can be a bit error prone.pasetoLookup the issuer claim.pasetoLookup the subject claim.pasetoLookup the audience claim.pasetoLookup the expiration claim.pasetoLookup the "not before" claim.pasetoLookup the "issued at" claim.paseto"Lookup the token identifier claim.paseto#Lookup a custom unregistered claim.paseto(Whether a collection of claims is empty.pasetoSize of a collection of claims.pasetoConvert a collection of  to a list of ~s.pasetoConvert a list of ~s to a collection of .Note that if the provided list contains more than one value for the same claim, the last value for that claim is retained.  Safe-Inferred"')*1?Fzpaseto.PASETO version 4 signature verification error.pasetoInvalid token footer.paseto# that occurred during verification.pasetoSignature verification failed.paseto?@ABCDEFFGHIJKKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{||}~~                                                                                                                                G                         paseto-0.1.1.0-inplaceCrypto.Paseto.Keys.V3Crypto.Paseto.Mode'Crypto.Paseto.PreAuthenticationEncodingCrypto.Paseto.ScrubbedBytesCrypto.Paseto.KeysCrypto.Paseto.TokenCrypto.Paseto.Token.ClaimCrypto.Paseto.Token.ClaimsCrypto.Paseto.Protocol.V4Crypto.Paseto.Token.ParserCrypto.Paseto.Token.ValidationCrypto.Paseto.Protocol.V3Crypto.Paseto.Token.EncodingCrypto.Paseto.Token.BuildpasetoCrypto.Paseto.Keys.V3.InternalExpirationClaim IssuedAtClaimNotBeforeClaimData.Binary.Put.Integer Crypto.PasetoCompressedPointDecodingError)CompressedPointDecodingInvalidPrefixError)CompressedPointDecodingInvalidLengthError-CompressedPointDecodingModularSquareRootError(CompressedPointDecodingInvalidPointErrorUncompressedPointDecodingError+UncompressedPointDecodingInvalidPrefixError+UncompressedPointDecodingInvalidLengthError*UncompressedPointDecodingInvalidPointErrorScalarDecodingError ScalarDecodingInvalidLengthErrorScalarDecodingInvalidErrorrenderScalarDecodingErrorPublicKeyP384DecodingError$PublicKeyP384DecodingCompressedError&PublicKeyP384DecodingUncompressedError PublicKeyP384unPublicKeyP384PrivateKeyP384unPrivateKeyP384 curveP384generateScalarP384isScalarValidP384mkPrivateKeyP384generatePrivateKeyP384encodePrivateKeyP384decodePrivateKeyP384mkPublicKeyP384fromPrivateKeyP384encodePublicKeyP384 renderPublicKeyP384DecodingErrordecodePublicKeyP384$fEqPrivateKeyP384 $fShowPublicKeyP384DecodingError$fEqPublicKeyP384DecodingError$fShowPublicKeyP384$fEqPublicKeyP384$fShowPrivateKeyP384PurposeLocalPublicVersionV3V4 $fShowPurpose $fEqPurpose $fShowVersion $fEqVersion DecodingErrorencodedecode$fShowDecodingError$fEqDecodingErrorScrubbedBytes32mkScrubbedBytes32fromSizedBytestoBytes toSizedBytesgenerateScrubbedBytes32$fByteArrayN32ScrubbedBytes32$fNFDataScrubbedBytes32$fShowScrubbedBytes32$fEqScrubbedBytes32$fOrdScrubbedBytes32$fNormalFormScrubbedBytes32 $fByteArrayAccessScrubbedBytes32VerificationKeyVerificationKeyV3VerificationKeyV4 SigningKey SigningKeyV3 SigningKeyV4 SymmetricKeySymmetricKeyV3SymmetricKeyV4symmetricKeyToBytesbytesToSymmetricKeyV3bytesToSymmetricKeyV4generateSymmetricKeyV3generateSymmetricKeyV4signingKeyToBytesbytesToSigningKeyV3bytesToSigningKeyV4generateSigningKeyV3generateSigningKeyV4verificationKeyToBytesbytesToVerificationKeyV3bytesToVerificationKeyV4fromSigningKey$fEqSymmetricKey$fEqSigningKey$fEqVerificationKey SomeTokenSomeTokenV3LocalSomeTokenV3PublicSomeTokenV4LocalSomeTokenV4PublicToken TokenV3Local TokenV3Public TokenV4Local TokenV4PublicPayload unPayloadImplicitAssertionunImplicitAssertionFooterunFooter toSomeToken $fEqFooter$fEqImplicitAssertion $fEqPayload $fEqToken$fShowSomeToken $fEqSomeToken $fShowPayload$fShowImplicitAssertion $fShowFooter $fShowTokenClaim IssuerClaim SubjectClaim AudienceClaimTokenIdentifierClaim CustomClaimUnregisteredClaimKeyClaimKeyTokenIdentifierunTokenIdentifierIssuedAt unIssuedAt NotBefore unNotBefore Expiration unExpirationAudience unAudienceSubject unSubjectIssuerunIssuerCustomClaimKeyTokenIdentifierClaimKeyIssuedAtClaimKeyNotBeforeClaimKeyExpirationClaimKeyAudienceClaimKeySubjectClaimKeyIssuerClaimKeyrenderExpirationrenderNotBeforerenderIssuedAtrenderClaimKey parseClaimKeyregisteredClaimKeysmkUnregisteredClaimKeyrenderUnregisteredClaimKeyclaimKey claimToPair claimFromJson $fOrdClaimKey $fShowClaim $fEqClaim$fShowUnregisteredClaimKey$fEqUnregisteredClaimKey$fShowClaimKey $fEqClaimKey$fShowTokenIdentifier$fEqTokenIdentifier$fToJSONTokenIdentifier$fFromJSONTokenIdentifier$fShowIssuedAt $fEqIssuedAt$fToJSONIssuedAt$fFromJSONIssuedAt$fShowNotBefore $fEqNotBefore$fToJSONNotBefore$fFromJSONNotBefore$fShowExpiration$fEqExpiration$fToJSONExpiration$fFromJSONExpiration$fShowAudience $fEqAudience$fToJSONAudience$fFromJSONAudience $fShowSubject $fEqSubject$fToJSONSubject$fFromJSONSubject $fShowIssuer $fEqIssuer$fToJSONIssuer$fFromJSONIssuerClaimsempty singletoninsertdelete lookupIssuer lookupSubjectlookupAudiencelookupExpirationlookupNotBeforelookupIssuedAtlookupTokenIdentifier lookupCustomnullsizetoListfromList$fFromJSONClaims$fToJSONClaims $fShowClaims $fEqClaims$fSemigroupClaims$fMonoidClaimsVerificationErrorVerificationInvalidFooterErrorVerificationCryptoError!VerificationInvalidSignatureError&VerificationClaimsDeserializationErrorDecryptionErrorDecryptionInvalidFooterErrorDecryptionInvalidNonceSizeErrorDecryptionInvalidMacSizeErrorDecryptionInvalidMacError$DecryptionClaimsDeserializationErrorv4LocalTokenHeader encryptPureencryptrenderDecryptionErrordecryptv4PublicTokenHeadersignrenderVerificationErrorverify$fShowVerificationError$fEqVerificationError$fShowDecryptionError$fEqDecryptionErrorparseTokenV3LocalparseTokenV3PublicparseTokenV4LocalparseTokenV4PublicparseSomeTokenpVersion pVersionV3 pVersionV4pPurpose pPurposeLocalpPurposePublicpPayloadpFooterpPayloadAndFooter pTokenParts pTokenV3LocalpTokenV3Public pTokenV4LocalpTokenV4Public pSomeTokenClaimMustExistValidationRuleunValidationRuleValidationErrorValidationClaimNotFoundErrorValidationInvalidClaimErrorValidationExpirationErrorValidationIssuedAtErrorValidationNotBeforeErrorValidationCustomErrorrenderValidationErrorrenderValidationErrors forAudience identifiedByissuedBy notExpiredsubjectvalidAt customClaimEqgetDefaultValidationRulesvalidatevalidateDefault$fShowValidationError$fEqValidationError%VerificationInvalidSignatureSizeError SigningErrorSigningKIsZeroError#DecryptionInvalidHkdfNonceSizeErrorDecryptionInvalidHmacSizeErrorDecryptionInvalidHmacErrorDecryptionCryptoError.DecryptionInvalidInitializationVectorSizeErrorEncryptionErrorEncryptionCryptoError.EncryptionInvalidInitializationVectorSizeErrorv3LocalTokenHeaderrenderEncryptionErrorv3PublicTokenHeaderrenderSigningErrorsignPure$fShowSigningError$fEqSigningError$fShowEncryptionError$fEqEncryptionErrorV4PublicDecodingErrorV4PublicDecodingCommonError!V4PublicDecodingVerificationErrorV4LocalDecodingErrorV4LocalDecodingCommonErrorV4LocalDecodingDecryptionErrorV3PublicDecodingErrorV3PublicDecodingCommonError!V3PublicDecodingVerificationErrorV3LocalDecodingErrorV3LocalDecodingCommonErrorV3LocalDecodingDecryptionErrorCommonDecodingErrorCommonDecodingParseError#CommonDecodingClaimsValidationErrorValidatedTokenvtTokenvtClaimsencodeSomeTokenrenderCommonDecodingErrorrenderV3LocalDecodingErrordecodeTokenV3LocalrenderV3PublicDecodingErrordecodeTokenV3PublicrenderV4LocalDecodingErrordecodeTokenV4LocalrenderV4PublicDecodingErrordecodeTokenV4Public$fShowV4PublicDecodingError$fEqV4PublicDecodingError$fShowV4LocalDecodingError$fEqV4LocalDecodingError$fShowV3PublicDecodingError$fEqV3PublicDecodingError$fShowV3LocalDecodingError$fEqV3LocalDecodingError$fShowCommonDecodingError$fEqCommonDecodingError$fShowValidatedToken$fEqValidatedTokenV3PublicBuildErrorV3PublicBuildSigningErrorV3LocalBuildErrorV3LocalBuildEncryptionErrorBuildTokenParams btpClaims btpFooterbtpImplicitAssertiongetDefaultBuildTokenParamsrenderV3LocalBuildErrorbuildTokenV3LocalrenderV3PublicBuildErrorbuildTokenV3PublicbuildTokenV4LocalbuildTokenV4Public$fShowV3PublicBuildError$fEqV3PublicBuildError$fShowV3LocalBuildError$fEqV3LocalBuildError$fShowBuildTokenParams$fEqBuildTokenParams isScalarValid encodeScalar text-2.0.2Data.Text.InternalText decodeScalarencodePointUncompressedcrypton-1.0.0-82fb0f4a0fbb7ff8bda3ea431c50f02339829dff37d825e897ad6e07c9917da3Crypto.PubKey.ECC.Types CurvePrimeencodePointCompressed$renderUncompressedPointDecodingErrordecodePointUncompressed"renderCompressedPointDecodingErrordecodePointCompressedCrypto.Number.ModArithmetic squareRootfromPrivateKeyCrypto.PubKey.ECC.ECDSA PublicKey PrivateKey SEC_p384r1ghc-prim GHC.ClassesEqmemory-0.18.0-cbe65deb13b77506b3e45fe2319042a92493d0a1ad555b8ea341613ef7739862Data.ByteArray.ScrubbedBytes ScrubbedBytesData.ByteArray.SizedSizedByteArraybase GHC.MaybeNothingbytestring-0.11.5.3Data.ByteString.Internal.Type ByteStringlookupCrypto.Error.Types CryptoError base64urlCharperiodmkEqValidationRule time-1.12.2Data.Time.Clock.POSIXgetCurrentTime integerToBS ghc-bignumGHC.Num.IntegerInteger putIntegerbe