@aztec/wallet-sdk 0.0.1-commit.d1f2d6c → 0.0.1-commit.d431d1c
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +294 -217
- package/dest/base-wallet/base_wallet.d.ts +4 -4
- package/dest/base-wallet/base_wallet.d.ts.map +1 -1
- package/dest/base-wallet/base_wallet.js +4 -9
- package/dest/crypto.d.ts +50 -59
- package/dest/crypto.d.ts.map +1 -1
- package/dest/crypto.js +108 -202
- package/dest/manager/index.d.ts +8 -2
- package/dest/manager/index.d.ts.map +1 -1
- package/dest/manager/index.js +6 -0
- package/dest/manager/types.d.ts +6 -88
- package/dest/manager/types.d.ts.map +1 -1
- package/dest/manager/types.js +1 -17
- package/dest/manager/wallet_manager.d.ts +7 -50
- package/dest/manager/wallet_manager.d.ts.map +1 -1
- package/dest/manager/wallet_manager.js +44 -174
- package/dest/providers/extension/extension_provider.d.ts +63 -0
- package/dest/providers/extension/extension_provider.d.ts.map +1 -0
- package/dest/providers/extension/extension_provider.js +124 -0
- package/dest/providers/extension/extension_wallet.d.ts +155 -0
- package/dest/providers/extension/extension_wallet.d.ts.map +1 -0
- package/dest/{extension/provider → providers/extension}/extension_wallet.js +95 -48
- package/dest/providers/extension/index.d.ts +6 -0
- package/dest/providers/extension/index.d.ts.map +1 -0
- package/dest/{extension/provider → providers/extension}/index.js +2 -0
- package/dest/types.d.ts +12 -43
- package/dest/types.d.ts.map +1 -1
- package/dest/types.js +2 -3
- package/package.json +9 -10
- package/src/base-wallet/base_wallet.ts +8 -15
- package/src/crypto.ts +113 -237
- package/src/manager/index.ts +10 -2
- package/src/manager/types.ts +5 -91
- package/src/manager/wallet_manager.ts +46 -192
- package/src/providers/extension/extension_provider.ts +167 -0
- package/src/{extension/provider → providers/extension}/extension_wallet.ts +110 -52
- package/src/providers/extension/index.ts +5 -0
- package/src/types.ts +10 -44
- package/dest/emoji_alphabet.d.ts +0 -35
- package/dest/emoji_alphabet.d.ts.map +0 -1
- package/dest/emoji_alphabet.js +0 -299
- package/dest/extension/handlers/background_connection_handler.d.ts +0 -158
- package/dest/extension/handlers/background_connection_handler.d.ts.map +0 -1
- package/dest/extension/handlers/background_connection_handler.js +0 -258
- package/dest/extension/handlers/content_script_connection_handler.d.ts +0 -56
- package/dest/extension/handlers/content_script_connection_handler.d.ts.map +0 -1
- package/dest/extension/handlers/content_script_connection_handler.js +0 -174
- package/dest/extension/handlers/index.d.ts +0 -12
- package/dest/extension/handlers/index.d.ts.map +0 -1
- package/dest/extension/handlers/index.js +0 -10
- package/dest/extension/handlers/internal_message_types.d.ts +0 -63
- package/dest/extension/handlers/internal_message_types.d.ts.map +0 -1
- package/dest/extension/handlers/internal_message_types.js +0 -22
- package/dest/extension/provider/extension_provider.d.ts +0 -107
- package/dest/extension/provider/extension_provider.d.ts.map +0 -1
- package/dest/extension/provider/extension_provider.js +0 -160
- package/dest/extension/provider/extension_wallet.d.ts +0 -131
- package/dest/extension/provider/extension_wallet.d.ts.map +0 -1
- package/dest/extension/provider/index.d.ts +0 -3
- package/dest/extension/provider/index.d.ts.map +0 -1
- package/src/emoji_alphabet.ts +0 -317
- package/src/extension/handlers/background_connection_handler.ts +0 -423
- package/src/extension/handlers/content_script_connection_handler.ts +0 -246
- package/src/extension/handlers/index.ts +0 -25
- package/src/extension/handlers/internal_message_types.ts +0 -69
- package/src/extension/provider/extension_provider.ts +0 -233
- package/src/extension/provider/index.ts +0 -7
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"base_wallet.d.ts","sourceRoot":"","sources":["../../src/base-wallet/base_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,KAAK,EAAE,UAAU,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AACjF,OAAO,
|
|
1
|
+
{"version":3,"file":"base_wallet.d.ts","sourceRoot":"","sources":["../../src/base-wallet/base_wallet.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,KAAK,EAAE,UAAU,EAAE,eAAe,EAAE,MAAM,+BAA+B,CAAC;AACjF,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,qBAAqB,CAAC;AAC5D,OAAO,KAAK,EACV,OAAO,EACP,YAAY,EACZ,aAAa,EACb,YAAY,EACZ,kBAAkB,EAClB,cAAc,EACd,WAAW,EACX,eAAe,EACf,MAAM,EACP,MAAM,wBAAwB,CAAC;AAOhC,OAAO,EAAE,8BAA8B,EAAwC,MAAM,4BAA4B,CAAC;AAClH,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,+BAA+B,CAAC;AAC/D,OAAO,EAAE,EAAE,EAAE,MAAM,gCAAgC,CAAC;AAEpD,OAAO,KAAK,EAAE,QAAQ,EAAE,MAAM,yBAAyB,CAAC;AACxD,OAAO,KAAK,EAAE,GAAG,EAAsB,MAAM,mBAAmB,CAAC;AACjE,OAAO,EACL,KAAK,gBAAgB,EACrB,KAAK,uBAAuB,EAC5B,KAAK,YAAY,EAElB,MAAM,mBAAmB,CAAC;AAC3B,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AAC9D,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,EACL,KAAK,2BAA2B,EAGjC,MAAM,wBAAwB,CAAC;AAEhC,OAAO,EAAO,WAAW,EAAE,MAAM,mBAAmB,CAAC;AAErD,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AACjE,OAAO,KAAK,EACV,kBAAkB,EAClB,MAAM,EACN,eAAe,EACf,SAAS,EACT,kBAAkB,EAClB,uBAAuB,EACxB,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,gBAAgB,EAA0B,MAAM,kBAAkB,CAAC;AAI5E;;GAEG;AACH,MAAM,MAAM,UAAU,GAAG;IACvB;;;OAGG;IACH,sBAAsB,CAAC,EAAE,gBAAgB,CAAC;IAC1C,+FAA+F;IAC/F,8BAA8B,EAAE,8BAA8B,CAAC;IAC/D,kDAAkD;IAClD,WAAW,EAAE,WAAW,CAAC;CAC1B,CAAC;AAEF;;GAEG;AACH,8BAAsB,UAAW,YAAW,MAAM;IAQ9C,SAAS,CAAC,QAAQ,CAAC,GAAG,EAAE,GAAG;IAC3B,SAAS,CAAC,QAAQ,CAAC,SAAS,EAAE,SAAS;IARzC,SAAS,CAAC,GAAG,yCAA0C;IAEvD,SAAS,CAAC,aAAa,SAAO;IAC9B,SAAS,CAAC,uBAAuB,UAAS;IAG1C,SAAS,aACY,GAAG,EAAE,GAAG,EACR,SAAS,EAAE,SAAS,EACrC;IAEJ,SAAS,CAAC,QAAQ,CAAC,qBAAqB,CAAC,OAAO,EAAE,YAAY,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;IAElF,QAAQ,CAAC,WAAW,IAAI,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,CAAC,CAAC;IAEzD;;;;;;OAMG;IACG,cAAc,IAAI,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,CAAC,CAGvD;IAEK,YAAY,IAAI,OAAO,CAAC,SAAS,CAAC,CAGvC;IAED,UAAgB,yCAAyC,CACvD,gBAAgB,EAAE,gBAAgB,EAClC,IAAI,EAAE,YAAY,EAClB,UAAU,EAAE,UAAU,GACrB,OAAO,CAAC,kBAAkB,CAAC,CAkB7B;IAEY,aAAa,CACxB,IAAI,EAAE,YAAY,EAClB,mBAAmB,EAAE,eAAe,GAAG,UAAU,GAChD,OAAO,CAAC,WAAW,CAAC,CAItB;IAEY,KAAK,CAAC,KAAK,CAAC,CAAC,SAAS,SAAS,aAAa,EAAE,EAAE,OAAO,EAAE,CAAC,GAAG,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,CAgBjG;IAED;;;;;;OAMG;IACH,UAAgB,kBAAkB,CAChC,IAAI,EAAE,YAAY,EAClB,QAAQ,CAAC,EAAE,YAAY,EACvB,WAAW,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC,GAC3C,OAAO,CAAC,UAAU,CAAC,CAsBrB;IAED;;;;;;;OAOG;IACH,UAAgB,+BAA+B,CAC7C,IAAI,EAAE,YAAY,EAClB,QAAQ,CAAC,EAAE,YAAY,EACvB,WAAW,CAAC,EAAE,OAAO,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QAhJ9C;;;WAGG;;QAEH,+FAA+F;;;OA6J9F;IAED,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE,MAAM,GAAE,MAAW,GAAG,OAAO,CAAC,YAAY,CAAC,CAEhF;IAEK,gBAAgB,CACpB,QAAQ,EAAE,2BAA2B,EACrC,QAAQ,CAAC,EAAE,gBAAgB,EAC3B,SAAS,CAAC,EAAE,EAAE,GACb,OAAO,CAAC,2BAA2B,CAAC,CAgCtC;IAEK,UAAU,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,IAAI,EAAE,eAAe,GAAG,OAAO,CAAC,kBAAkB,CAAC,CAWvG;IAEK,SAAS,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,IAAI,EAAE,cAAc,GAAG,OAAO,CAAC,eAAe,CAAC,CAIlG;IAEK,MAAM,CAAC,gBAAgB,EAAE,gBAAgB,EAAE,IAAI,EAAE,WAAW,GAAG,OAAO,CAAC,MAAM,CAAC,CAenF;IAED,SAAS,CAAC,kBAAkB,CAAC,GAAG,EAAE,KAAK,EAAE,GAAG,OAAO,EAAE,MAAM,EAAE,GAAG,KAAK,CAYpE;IAED,eAAe,CAAC,IAAI,EAAE,YAAY,EAAE,QAAQ,CAAC,EAAE,WAAW,EAAE,GAAG,OAAO,CAAC,uBAAuB,CAAC,CAE9F;IAED,YAAY,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,SAAS,CAAC,CAE/C;IAEK,gBAAgB,CAAC,CAAC,EACtB,QAAQ,EAAE,uBAAuB,EACjC,WAAW,EAAE,kBAAkB,GAC9B,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC,CAe5B;IAEK,mBAAmB,CAAC,OAAO,EAAE,YAAY;;;;;;;OAuB9C;IAEK,wBAAwB,CAAC,EAAE,EAAE,EAAE;;;OAMpC;CACF"}
|
|
@@ -1,5 +1,3 @@
|
|
|
1
|
-
import { NO_WAIT } from '@aztec/aztec.js/contracts';
|
|
2
|
-
import { waitForTx } from '@aztec/aztec.js/node';
|
|
3
1
|
import { GAS_ESTIMATION_DA_GAS_LIMIT, GAS_ESTIMATION_L2_GAS_LIMIT, GAS_ESTIMATION_TEARDOWN_DA_GAS_LIMIT, GAS_ESTIMATION_TEARDOWN_L2_GAS_LIMIT } from '@aztec/constants';
|
|
4
2
|
import { AccountFeePaymentMethodOptions } from '@aztec/entrypoints/account';
|
|
5
3
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
@@ -192,13 +190,7 @@ import { inspect } from 'util';
|
|
|
192
190
|
throw this.contextualizeError(err, inspect(tx));
|
|
193
191
|
});
|
|
194
192
|
this.log.info(`Sent transaction ${txHash}`);
|
|
195
|
-
|
|
196
|
-
if (opts.wait === NO_WAIT) {
|
|
197
|
-
return txHash;
|
|
198
|
-
}
|
|
199
|
-
// Otherwise, wait for the full receipt (default behavior on wait: undefined)
|
|
200
|
-
const waitOpts = typeof opts.wait === 'object' ? opts.wait : undefined;
|
|
201
|
-
return await waitForTx(this.aztecNode, txHash, waitOpts);
|
|
193
|
+
return txHash;
|
|
202
194
|
}
|
|
203
195
|
contextualizeError(err, ...context) {
|
|
204
196
|
let contextStr = '';
|
|
@@ -216,6 +208,9 @@ import { inspect } from 'util';
|
|
|
216
208
|
simulateUtility(call, authwits) {
|
|
217
209
|
return this.pxe.simulateUtility(call, authwits);
|
|
218
210
|
}
|
|
211
|
+
getTxReceipt(txHash) {
|
|
212
|
+
return this.aztecNode.getTxReceipt(txHash);
|
|
213
|
+
}
|
|
219
214
|
async getPrivateEvents(eventDef, eventFilter) {
|
|
220
215
|
const pxeEvents = await this.pxe.getPrivateEvents(eventDef.eventSelector, eventFilter);
|
|
221
216
|
const decodedEvents = pxeEvents.map((pxeEvent)=>{
|
package/dest/crypto.d.ts
CHANGED
|
@@ -36,23 +36,11 @@ export interface SecureKeyPair {
|
|
|
36
36
|
/** Private key - keep secret, used for key derivation */
|
|
37
37
|
privateKey: CryptoKey;
|
|
38
38
|
}
|
|
39
|
-
/**
|
|
40
|
-
* Session keys derived from ECDH key exchange.
|
|
41
|
-
*
|
|
42
|
-
* Contains both the encryption key and the verification hash (verificationHash)
|
|
43
|
-
* computed from a separate HMAC key.
|
|
44
|
-
*/
|
|
45
|
-
export interface SessionKeys {
|
|
46
|
-
/** AES-256-GCM key for message encryption/decryption */
|
|
47
|
-
encryptionKey: CryptoKey;
|
|
48
|
-
/** Hex-encoded verificationHash for verification */
|
|
49
|
-
verificationHash: string;
|
|
50
|
-
}
|
|
51
39
|
/**
|
|
52
40
|
* Generates an ECDH P-256 key pair for key exchange.
|
|
53
41
|
*
|
|
54
|
-
* The generated key pair can be used to derive
|
|
55
|
-
* party's public key using {@link
|
|
42
|
+
* The generated key pair can be used to derive a shared secret with another
|
|
43
|
+
* party's public key using {@link deriveSharedKey}.
|
|
56
44
|
*
|
|
57
45
|
* @returns A new ECDH key pair
|
|
58
46
|
*
|
|
@@ -84,71 +72,65 @@ export declare function exportPublicKey(publicKey: CryptoKey): Promise<ExportedP
|
|
|
84
72
|
/**
|
|
85
73
|
* Imports a public key from JWK format.
|
|
86
74
|
*
|
|
87
|
-
* Used to import the other party's public key for deriving
|
|
75
|
+
* Used to import the other party's public key for deriving a shared secret.
|
|
88
76
|
*
|
|
89
77
|
* @param exported - The public key in JWK format
|
|
90
|
-
* @returns A CryptoKey that can be used with {@link
|
|
78
|
+
* @returns A CryptoKey that can be used with {@link deriveSharedKey}
|
|
91
79
|
*
|
|
92
80
|
* @example
|
|
93
81
|
* ```typescript
|
|
94
|
-
* //
|
|
95
|
-
* const
|
|
96
|
-
* const
|
|
82
|
+
* // Receive exported public key from other party
|
|
83
|
+
* const theirPublicKey = await importPublicKey(receivedPublicKey);
|
|
84
|
+
* const sharedKey = await deriveSharedKey(myPrivateKey, theirPublicKey);
|
|
97
85
|
* ```
|
|
98
86
|
*/
|
|
99
87
|
export declare function importPublicKey(exported: ExportedPublicKey): Promise<CryptoKey>;
|
|
100
88
|
/**
|
|
101
|
-
* Derives
|
|
102
|
-
*
|
|
103
|
-
* This is the main key derivation function that produces:
|
|
104
|
-
* 1. An AES-256-GCM encryption key (first 256 bits)
|
|
105
|
-
* 2. An HMAC key for verificationHash computation (second 256 bits)
|
|
106
|
-
* 3. A verificationHash computed as HMAC(hmacKey, "aztec-wallet-verification-verificationHash")
|
|
89
|
+
* Derives a shared AES-256-GCM key from ECDH key exchange.
|
|
107
90
|
*
|
|
108
|
-
*
|
|
109
|
-
*
|
|
91
|
+
* Both parties will derive the same shared key when using their own private key
|
|
92
|
+
* and the other party's public key. This is the core of ECDH key agreement.
|
|
110
93
|
*
|
|
111
|
-
* @param
|
|
112
|
-
* @param
|
|
113
|
-
* @
|
|
114
|
-
* @returns Session keys containing encryption key and verificationHash
|
|
94
|
+
* @param privateKey - Your ECDH private key
|
|
95
|
+
* @param publicKey - The other party's ECDH public key
|
|
96
|
+
* @returns An AES-256-GCM key for encryption/decryption
|
|
115
97
|
*
|
|
116
98
|
* @example
|
|
117
99
|
* ```typescript
|
|
118
|
-
* //
|
|
119
|
-
* const
|
|
120
|
-
*
|
|
121
|
-
*
|
|
122
|
-
* // sessionA.verificationHash === sessionB.verificationHash
|
|
100
|
+
* // Both parties derive the same key
|
|
101
|
+
* const sharedKeyA = await deriveSharedKey(privateKeyA, publicKeyB);
|
|
102
|
+
* const sharedKeyB = await deriveSharedKey(privateKeyB, publicKeyA);
|
|
103
|
+
* // sharedKeyA and sharedKeyB are equivalent
|
|
123
104
|
* ```
|
|
124
105
|
*/
|
|
125
|
-
export declare function
|
|
106
|
+
export declare function deriveSharedKey(privateKey: CryptoKey, publicKey: CryptoKey): Promise<CryptoKey>;
|
|
126
107
|
/**
|
|
127
108
|
* Encrypts data using AES-256-GCM.
|
|
128
109
|
*
|
|
129
|
-
* A random 12-byte IV is
|
|
110
|
+
* The data is JSON serialized before encryption. A random 12-byte IV is
|
|
111
|
+
* generated for each encryption operation.
|
|
130
112
|
*
|
|
131
113
|
* AES-GCM provides both confidentiality and authenticity - any tampering
|
|
132
114
|
* with the ciphertext will cause decryption to fail.
|
|
133
115
|
*
|
|
134
|
-
* @param key - The AES-GCM key (from {@link
|
|
135
|
-
* @param data - The
|
|
116
|
+
* @param key - The AES-GCM key (from {@link deriveSharedKey})
|
|
117
|
+
* @param data - The data to encrypt (will be JSON serialized)
|
|
136
118
|
* @returns The encrypted payload with IV and ciphertext
|
|
137
119
|
*
|
|
138
120
|
* @example
|
|
139
121
|
* ```typescript
|
|
140
|
-
* const encrypted = await encrypt(
|
|
122
|
+
* const encrypted = await encrypt(sharedKey, { action: 'transfer', amount: 100 });
|
|
141
123
|
* // encrypted.iv and encrypted.ciphertext are base64 strings
|
|
142
124
|
* ```
|
|
143
125
|
*/
|
|
144
|
-
export declare function encrypt(key: CryptoKey, data:
|
|
126
|
+
export declare function encrypt(key: CryptoKey, data: unknown): Promise<EncryptedPayload>;
|
|
145
127
|
/**
|
|
146
128
|
* Decrypts data using AES-256-GCM.
|
|
147
129
|
*
|
|
148
130
|
* The decrypted data is JSON parsed before returning.
|
|
149
131
|
*
|
|
150
132
|
* @typeParam T - The expected type of the decrypted data
|
|
151
|
-
* @param key - The AES-GCM key (from {@link
|
|
133
|
+
* @param key - The AES-GCM key (from {@link deriveSharedKey})
|
|
152
134
|
* @param payload - The encrypted payload from {@link encrypt}
|
|
153
135
|
* @returns The decrypted and parsed data
|
|
154
136
|
*
|
|
@@ -156,37 +138,46 @@ export declare function encrypt(key: CryptoKey, data: string): Promise<Encrypted
|
|
|
156
138
|
*
|
|
157
139
|
* @example
|
|
158
140
|
* ```typescript
|
|
159
|
-
* const decrypted = await decrypt<{ action: string; amount: number }>(
|
|
141
|
+
* const decrypted = await decrypt<{ action: string; amount: number }>(sharedKey, encrypted);
|
|
160
142
|
* console.log(decrypted.action); // 'transfer'
|
|
161
143
|
* ```
|
|
162
144
|
*/
|
|
163
145
|
export declare function decrypt<T = unknown>(key: CryptoKey, payload: EncryptedPayload): Promise<T>;
|
|
164
146
|
/**
|
|
165
|
-
*
|
|
166
|
-
*
|
|
147
|
+
* Hashes a shared AES key to a hex string for verification.
|
|
148
|
+
*
|
|
149
|
+
* This extracts the raw key material and hashes it with SHA-256,
|
|
150
|
+
* returning the first 16 bytes as a hex string.
|
|
151
|
+
*
|
|
152
|
+
* @param sharedKey - The AES-GCM shared key (must be extractable)
|
|
153
|
+
* @returns A hex string representation of the hash
|
|
154
|
+
*
|
|
155
|
+
* @example
|
|
156
|
+
* ```typescript
|
|
157
|
+
* const hash = await hashSharedSecret(sharedKey);
|
|
158
|
+
* const emoji = hashToEmoji(hash);
|
|
159
|
+
* ```
|
|
167
160
|
*/
|
|
168
|
-
export declare
|
|
161
|
+
export declare function hashSharedSecret(sharedKey: CryptoKey): Promise<string>;
|
|
169
162
|
/**
|
|
170
163
|
* Converts a hex hash to an emoji sequence for visual verification.
|
|
171
164
|
*
|
|
172
|
-
* This is used for verification - both the dApp and wallet
|
|
173
|
-
* independently compute the same emoji sequence from the
|
|
165
|
+
* This is used for anti-MITM verification - both the dApp and wallet
|
|
166
|
+
* independently compute the same emoji sequence from the shared secret.
|
|
174
167
|
* Users can visually compare the sequences to detect interception.
|
|
175
168
|
*
|
|
176
|
-
*
|
|
177
|
-
* 72 bits of security (9 * 8 = 72 bits), making brute-force attacks
|
|
178
|
-
* computationally infeasible.
|
|
169
|
+
* Similar to SAS (Short Authentication String) in ZRTP/Signal.
|
|
179
170
|
*
|
|
180
|
-
* @param hash - Hex string from
|
|
181
|
-
* @param
|
|
171
|
+
* @param hash - Hex string from {@link hashSharedSecret}
|
|
172
|
+
* @param length - Number of emojis to generate (default: 4)
|
|
182
173
|
* @returns A string of emojis representing the hash
|
|
183
174
|
*
|
|
184
175
|
* @example
|
|
185
176
|
* ```typescript
|
|
186
|
-
* const
|
|
187
|
-
* const emoji = hashToEmoji(
|
|
188
|
-
* // Display
|
|
177
|
+
* const hash = await hashSharedSecret(sharedKey);
|
|
178
|
+
* const emoji = hashToEmoji(hash); // e.g., "🔵🦋🎯🐼"
|
|
179
|
+
* // Display to user for verification
|
|
189
180
|
* ```
|
|
190
181
|
*/
|
|
191
|
-
export declare function hashToEmoji(hash: string,
|
|
192
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
182
|
+
export declare function hashToEmoji(hash: string, length?: number): string;
|
|
183
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dest/crypto.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"AAmCA;;;;GAIG;AACH,MAAM,WAAW,iBAAiB;IAChC,gDAAgD;IAChD,GAAG,EAAE,MAAM,CAAC;IACZ,kCAAkC;IAClC,GAAG,EAAE,MAAM,CAAC;IACZ,uCAAuC;IACvC,CAAC,EAAE,MAAM,CAAC;IACV,uCAAuC;IACvC,CAAC,EAAE,MAAM,CAAC;CACX;AAED;;;;GAIG;AACH,MAAM,WAAW,gBAAgB;IAC/B,uDAAuD;IACvD,EAAE,EAAE,MAAM,CAAC;IACX,kCAAkC;IAClC,UAAU,EAAE,MAAM,CAAC;CACpB;AAED;;;;;GAKG;AACH,MAAM,WAAW,aAAa;IAC5B,iCAAiC;IACjC,SAAS,EAAE,SAAS,CAAC;IACrB,yDAAyD;IACzD,UAAU,EAAE,SAAS,CAAC;CACvB;AAED;;;;;;;;;;;;;;GAcG;AACH,wBAAsB,eAAe,IAAI,OAAO,CAAC,aAAa,CAAC,CAa9D;AAED;;;;;;;;;;;;;;;GAeG;AACH,wBAAsB,eAAe,CAAC,SAAS,EAAE,SAAS,GAAG,OAAO,CAAC,iBAAiB,CAAC,CAQtF;AAED;;;;;;;;;;;;;;GAcG;AACH,wBAAgB,eAAe,CAAC,QAAQ,EAAE,iBAAiB,GAAG,OAAO,CAAC,SAAS,CAAC,CAgB/E;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAgB,eAAe,CAAC,UAAU,EAAE,SAAS,EAAE,SAAS,EAAE,SAAS,GAAG,OAAO,CAAC,SAAS,CAAC,CAc/F;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,wBAAsB,OAAO,CAAC,GAAG,EAAE,SAAS,EAAE,IAAI,EAAE,OAAO,GAAG,OAAO,CAAC,gBAAgB,CAAC,CAUtF;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,wBAAsB,OAAO,CAAC,CAAC,GAAG,OAAO,EAAE,GAAG,EAAE,SAAS,EAAE,OAAO,EAAE,gBAAgB,GAAG,OAAO,CAAC,CAAC,CAAC,CAQhG;AAoED;;;;;;;;;;;;;;GAcG;AACH,wBAAsB,gBAAgB,CAAC,SAAS,EAAE,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,CAO5E;AAED;;;;;;;;;;;;;;;;;;;GAmBG;AACH,wBAAgB,WAAW,CAAC,IAAI,EAAE,MAAM,EAAE,MAAM,GAAE,MAAU,GAAG,MAAM,CAMpE"}
|