@breeztech/breez-sdk-spark 0.7.6 → 0.7.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/breez-sdk-spark.tgz +0 -0
- package/bundler/breez_sdk_spark_wasm.d.ts +17 -17
- package/bundler/breez_sdk_spark_wasm_bg.js +40 -40
- package/bundler/breez_sdk_spark_wasm_bg.wasm +0 -0
- package/bundler/breez_sdk_spark_wasm_bg.wasm.d.ts +2 -2
- package/deno/breez_sdk_spark_wasm.d.ts +17 -17
- package/deno/breez_sdk_spark_wasm.js +39 -39
- package/deno/breez_sdk_spark_wasm_bg.wasm +0 -0
- package/deno/breez_sdk_spark_wasm_bg.wasm.d.ts +2 -2
- package/nodejs/breez_sdk_spark_wasm.d.ts +17 -17
- package/nodejs/breez_sdk_spark_wasm.js +40 -40
- package/nodejs/breez_sdk_spark_wasm_bg.wasm +0 -0
- package/nodejs/breez_sdk_spark_wasm_bg.wasm.d.ts +2 -2
- package/package.json +1 -1
- package/web/breez_sdk_spark_wasm.d.ts +19 -19
- package/web/breez_sdk_spark_wasm.js +39 -39
- package/web/breez_sdk_spark_wasm_bg.wasm +0 -0
- package/web/breez_sdk_spark_wasm_bg.wasm.d.ts +2 -2
package/breez-sdk-spark.tgz
CHANGED
|
Binary file
|
|
@@ -823,14 +823,14 @@ export interface ExternalSigner {
|
|
|
823
823
|
signHashSchnorr(hash: Uint8Array, path: string): Promise<SchnorrSignatureBytes>;
|
|
824
824
|
generateFrostSigningCommitments(): Promise<ExternalFrostCommitments>;
|
|
825
825
|
getPublicKeyForNode(id: ExternalTreeNodeId): Promise<PublicKeyBytes>;
|
|
826
|
-
generateRandomKey(): Promise<
|
|
827
|
-
|
|
828
|
-
getStaticDepositPrivateKey(index: number): Promise<
|
|
826
|
+
generateRandomKey(): Promise<ExternalSecretSource>;
|
|
827
|
+
getStaticDepositSecretSource(index: number): Promise<ExternalSecretSource>;
|
|
828
|
+
getStaticDepositPrivateKey(index: number): Promise<SecretBytes>;
|
|
829
829
|
getStaticDepositPublicKey(index: number): Promise<PublicKeyBytes>;
|
|
830
|
-
subtractPrivateKeys(signingKey:
|
|
830
|
+
subtractPrivateKeys(signingKey: ExternalSecretSource, newSigningKey: ExternalSecretSource): Promise<ExternalSecretSource>;
|
|
831
831
|
splitSecretWithProofs(secret: ExternalSecretToSplit, threshold: number, numShares: number): Promise<ExternalVerifiableSecretShare[]>;
|
|
832
|
-
encryptPrivateKeyForReceiver(privateKey:
|
|
833
|
-
|
|
832
|
+
encryptPrivateKeyForReceiver(privateKey: ExternalEncryptedSecret, receiverPublicKey: PublicKeyBytes): Promise<Uint8Array>;
|
|
833
|
+
getPublicKeyFromSecretSource(privateKey: ExternalSecretSource): Promise<PublicKeyBytes>;
|
|
834
834
|
signFrost(request: ExternalSignFrostRequest): Promise<ExternalFrostSignatureShare>;
|
|
835
835
|
aggregateFrost(request: ExternalAggregateFrostRequest): Promise<ExternalFrostSignature>;
|
|
836
836
|
hmacSha256(message: Uint8Array, path: string): Promise<HashedMessageBytes>;
|
|
@@ -841,7 +841,7 @@ export interface IdentifierSignaturePair {
|
|
|
841
841
|
signature: ExternalFrostSignatureShare;
|
|
842
842
|
}
|
|
843
843
|
|
|
844
|
-
export interface
|
|
844
|
+
export interface SecretBytes {
|
|
845
845
|
bytes: number[];
|
|
846
846
|
}
|
|
847
847
|
|
|
@@ -895,14 +895,14 @@ export interface ExternalVerifiableSecretShare {
|
|
|
895
895
|
proofs: number[][];
|
|
896
896
|
}
|
|
897
897
|
|
|
898
|
-
export interface
|
|
898
|
+
export interface ExternalEncryptedSecret {
|
|
899
899
|
ciphertext: number[];
|
|
900
900
|
}
|
|
901
901
|
|
|
902
902
|
export interface ExternalSignFrostRequest {
|
|
903
903
|
message: number[];
|
|
904
904
|
publicKey: number[];
|
|
905
|
-
|
|
905
|
+
secret: ExternalSecretSource;
|
|
906
906
|
verifyingKey: number[];
|
|
907
907
|
selfNonceCommitment: ExternalFrostCommitments;
|
|
908
908
|
statechainCommitments: IdentifierCommitmentPair[];
|
|
@@ -927,9 +927,9 @@ export interface IdentifierCommitmentPair {
|
|
|
927
927
|
commitment: ExternalSigningCommitments;
|
|
928
928
|
}
|
|
929
929
|
|
|
930
|
-
export type
|
|
930
|
+
export type ExternalSecretSource = { type: "derived"; nodeId: ExternalTreeNodeId } | { type: "encrypted"; key: ExternalEncryptedSecret };
|
|
931
931
|
|
|
932
|
-
export type ExternalSecretToSplit = { type: "
|
|
932
|
+
export type ExternalSecretToSplit = { type: "secretSource"; source: ExternalSecretSource } | { type: "preimage"; data: number[] };
|
|
933
933
|
|
|
934
934
|
export interface ExternalFrostSignature {
|
|
935
935
|
bytes: number[];
|
|
@@ -1030,20 +1030,20 @@ export class DefaultSigner {
|
|
|
1030
1030
|
eciesDecrypt(message: Uint8Array, path: string): Promise<Uint8Array>;
|
|
1031
1031
|
eciesEncrypt(message: Uint8Array, path: string): Promise<Uint8Array>;
|
|
1032
1032
|
aggregateFrost(request: ExternalAggregateFrostRequest): Promise<ExternalFrostSignature>;
|
|
1033
|
+
subtractPrivateKeys(signing_key: ExternalSecretSource, new_signing_key: ExternalSecretSource): Promise<ExternalSecretSource>;
|
|
1033
1034
|
derivePublicKey(path: string): Promise<PublicKeyBytes>;
|
|
1034
1035
|
signHashSchnorr(hash: Uint8Array, path: string): Promise<SchnorrSignatureBytes>;
|
|
1035
|
-
generateRandomKey(): Promise<
|
|
1036
|
+
generateRandomKey(): Promise<ExternalSecretSource>;
|
|
1036
1037
|
identityPublicKey(): PublicKeyBytes;
|
|
1037
|
-
|
|
1038
|
+
getStaticDepositPrivateKey(index: number): Promise<SecretBytes>;
|
|
1039
|
+
getPublicKeyFromSecretSource(private_key: ExternalSecretSource): Promise<PublicKeyBytes>;
|
|
1038
1040
|
signEcdsaRecoverable(message: MessageBytes, path: string): Promise<RecoverableEcdsaSignatureBytes>;
|
|
1039
1041
|
getPublicKeyForNode(id: ExternalTreeNodeId): Promise<PublicKeyBytes>;
|
|
1040
1042
|
splitSecretWithProofs(secret: ExternalSecretToSplit, threshold: number, num_shares: number): Promise<ExternalVerifiableSecretShare[]>;
|
|
1041
|
-
getStaticDepositPrivateKey(index: number): Promise<PrivateKeyBytes>;
|
|
1042
1043
|
getStaticDepositPublicKey(index: number): Promise<PublicKeyBytes>;
|
|
1043
|
-
encryptPrivateKeyForReceiver(private_key:
|
|
1044
|
+
encryptPrivateKeyForReceiver(private_key: ExternalEncryptedSecret, receiver_public_key: PublicKeyBytes): Promise<Uint8Array>;
|
|
1045
|
+
getStaticDepositSecretSource(index: number): Promise<ExternalSecretSource>;
|
|
1044
1046
|
generateFrostSigningCommitments(): Promise<ExternalFrostCommitments>;
|
|
1045
|
-
getStaticDepositPrivateKeySource(index: number): Promise<ExternalPrivateKeySource>;
|
|
1046
|
-
getPublicKeyFromPrivateKeySource(private_key: ExternalPrivateKeySource): Promise<PublicKeyBytes>;
|
|
1047
1047
|
}
|
|
1048
1048
|
export class IntoUnderlyingByteSource {
|
|
1049
1049
|
private constructor();
|
|
@@ -730,6 +730,15 @@ export class DefaultSigner {
|
|
|
730
730
|
const ret = wasm.defaultsigner_aggregateFrost(this.__wbg_ptr, request);
|
|
731
731
|
return ret;
|
|
732
732
|
}
|
|
733
|
+
/**
|
|
734
|
+
* @param {ExternalSecretSource} signing_key
|
|
735
|
+
* @param {ExternalSecretSource} new_signing_key
|
|
736
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
737
|
+
*/
|
|
738
|
+
subtractPrivateKeys(signing_key, new_signing_key) {
|
|
739
|
+
const ret = wasm.defaultsigner_subtractPrivateKeys(this.__wbg_ptr, signing_key, new_signing_key);
|
|
740
|
+
return ret;
|
|
741
|
+
}
|
|
733
742
|
/**
|
|
734
743
|
* @param {string} path
|
|
735
744
|
* @returns {Promise<PublicKeyBytes>}
|
|
@@ -754,7 +763,7 @@ export class DefaultSigner {
|
|
|
754
763
|
return ret;
|
|
755
764
|
}
|
|
756
765
|
/**
|
|
757
|
-
* @returns {Promise<
|
|
766
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
758
767
|
*/
|
|
759
768
|
generateRandomKey() {
|
|
760
769
|
const ret = wasm.defaultsigner_generateRandomKey(this.__wbg_ptr);
|
|
@@ -771,12 +780,19 @@ export class DefaultSigner {
|
|
|
771
780
|
return takeFromExternrefTable0(ret[0]);
|
|
772
781
|
}
|
|
773
782
|
/**
|
|
774
|
-
* @param {
|
|
775
|
-
* @
|
|
776
|
-
* @returns {Promise<ExternalPrivateKeySource>}
|
|
783
|
+
* @param {number} index
|
|
784
|
+
* @returns {Promise<SecretBytes>}
|
|
777
785
|
*/
|
|
778
|
-
|
|
779
|
-
const ret = wasm.
|
|
786
|
+
getStaticDepositPrivateKey(index) {
|
|
787
|
+
const ret = wasm.defaultsigner_getStaticDepositPrivateKey(this.__wbg_ptr, index);
|
|
788
|
+
return ret;
|
|
789
|
+
}
|
|
790
|
+
/**
|
|
791
|
+
* @param {ExternalSecretSource} private_key
|
|
792
|
+
* @returns {Promise<PublicKeyBytes>}
|
|
793
|
+
*/
|
|
794
|
+
getPublicKeyFromSecretSource(private_key) {
|
|
795
|
+
const ret = wasm.defaultsigner_getPublicKeyFromSecretSource(this.__wbg_ptr, private_key);
|
|
780
796
|
return ret;
|
|
781
797
|
}
|
|
782
798
|
/**
|
|
@@ -808,14 +824,6 @@ export class DefaultSigner {
|
|
|
808
824
|
const ret = wasm.defaultsigner_splitSecretWithProofs(this.__wbg_ptr, secret, threshold, num_shares);
|
|
809
825
|
return ret;
|
|
810
826
|
}
|
|
811
|
-
/**
|
|
812
|
-
* @param {number} index
|
|
813
|
-
* @returns {Promise<PrivateKeyBytes>}
|
|
814
|
-
*/
|
|
815
|
-
getStaticDepositPrivateKey(index) {
|
|
816
|
-
const ret = wasm.defaultsigner_getStaticDepositPrivateKey(this.__wbg_ptr, index);
|
|
817
|
-
return ret;
|
|
818
|
-
}
|
|
819
827
|
/**
|
|
820
828
|
* @param {number} index
|
|
821
829
|
* @returns {Promise<PublicKeyBytes>}
|
|
@@ -825,7 +833,7 @@ export class DefaultSigner {
|
|
|
825
833
|
return ret;
|
|
826
834
|
}
|
|
827
835
|
/**
|
|
828
|
-
* @param {
|
|
836
|
+
* @param {ExternalEncryptedSecret} private_key
|
|
829
837
|
* @param {PublicKeyBytes} receiver_public_key
|
|
830
838
|
* @returns {Promise<Uint8Array>}
|
|
831
839
|
*/
|
|
@@ -833,27 +841,19 @@ export class DefaultSigner {
|
|
|
833
841
|
const ret = wasm.defaultsigner_encryptPrivateKeyForReceiver(this.__wbg_ptr, private_key, receiver_public_key);
|
|
834
842
|
return ret;
|
|
835
843
|
}
|
|
836
|
-
/**
|
|
837
|
-
* @returns {Promise<ExternalFrostCommitments>}
|
|
838
|
-
*/
|
|
839
|
-
generateFrostSigningCommitments() {
|
|
840
|
-
const ret = wasm.defaultsigner_generateFrostSigningCommitments(this.__wbg_ptr);
|
|
841
|
-
return ret;
|
|
842
|
-
}
|
|
843
844
|
/**
|
|
844
845
|
* @param {number} index
|
|
845
|
-
* @returns {Promise<
|
|
846
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
846
847
|
*/
|
|
847
|
-
|
|
848
|
-
const ret = wasm.
|
|
848
|
+
getStaticDepositSecretSource(index) {
|
|
849
|
+
const ret = wasm.defaultsigner_getStaticDepositSecretSource(this.__wbg_ptr, index);
|
|
849
850
|
return ret;
|
|
850
851
|
}
|
|
851
852
|
/**
|
|
852
|
-
* @
|
|
853
|
-
* @returns {Promise<PublicKeyBytes>}
|
|
853
|
+
* @returns {Promise<ExternalFrostCommitments>}
|
|
854
854
|
*/
|
|
855
|
-
|
|
856
|
-
const ret = wasm.
|
|
855
|
+
generateFrostSigningCommitments() {
|
|
856
|
+
const ret = wasm.defaultsigner_generateFrostSigningCommitments(this.__wbg_ptr);
|
|
857
857
|
return ret;
|
|
858
858
|
}
|
|
859
859
|
}
|
|
@@ -1434,7 +1434,7 @@ export function __wbg_eciesEncrypt_d1c5b3c6a4602a28() { return handleError(funct
|
|
|
1434
1434
|
}
|
|
1435
1435
|
}, arguments) };
|
|
1436
1436
|
|
|
1437
|
-
export function
|
|
1437
|
+
export function __wbg_encryptPrivateKeyForReceiver_346eec1080ebe04c() { return handleError(function (arg0, arg1, arg2) {
|
|
1438
1438
|
const ret = arg0.encryptPrivateKeyForReceiver(arg1, arg2);
|
|
1439
1439
|
return ret;
|
|
1440
1440
|
}, arguments) };
|
|
@@ -1549,8 +1549,8 @@ export function __wbg_getPublicKeyForNode_5ddb3378904e4ad4() { return handleErro
|
|
|
1549
1549
|
return ret;
|
|
1550
1550
|
}, arguments) };
|
|
1551
1551
|
|
|
1552
|
-
export function
|
|
1553
|
-
const ret = arg0.
|
|
1552
|
+
export function __wbg_getPublicKeyFromSecretSource_9e324c0b205a9f99() { return handleError(function (arg0, arg1) {
|
|
1553
|
+
const ret = arg0.getPublicKeyFromSecretSource(arg1);
|
|
1554
1554
|
return ret;
|
|
1555
1555
|
}, arguments) };
|
|
1556
1556
|
|
|
@@ -1580,12 +1580,7 @@ export function __wbg_getRequest_4ab87a8cbe18fa22() { return handleError(functio
|
|
|
1580
1580
|
}
|
|
1581
1581
|
}, arguments) };
|
|
1582
1582
|
|
|
1583
|
-
export function
|
|
1584
|
-
const ret = arg0.getStaticDepositPrivateKeySource(arg1 >>> 0);
|
|
1585
|
-
return ret;
|
|
1586
|
-
}, arguments) };
|
|
1587
|
-
|
|
1588
|
-
export function __wbg_getStaticDepositPrivateKey_a7a4ab43f45f0713() { return handleError(function (arg0, arg1) {
|
|
1583
|
+
export function __wbg_getStaticDepositPrivateKey_203e6f4eb4116ce0() { return handleError(function (arg0, arg1) {
|
|
1589
1584
|
const ret = arg0.getStaticDepositPrivateKey(arg1 >>> 0);
|
|
1590
1585
|
return ret;
|
|
1591
1586
|
}, arguments) };
|
|
@@ -1595,6 +1590,11 @@ export function __wbg_getStaticDepositPublicKey_4551dec44c20efe6() { return hand
|
|
|
1595
1590
|
return ret;
|
|
1596
1591
|
}, arguments) };
|
|
1597
1592
|
|
|
1593
|
+
export function __wbg_getStaticDepositSecretSource_8e310c718339e400() { return handleError(function (arg0, arg1) {
|
|
1594
|
+
const ret = arg0.getStaticDepositSecretSource(arg1 >>> 0);
|
|
1595
|
+
return ret;
|
|
1596
|
+
}, arguments) };
|
|
1597
|
+
|
|
1598
1598
|
export function __wbg_getTransactionHex_973b8d0555c60f99() { return handleError(function (arg0, arg1, arg2) {
|
|
1599
1599
|
let deferred0_0;
|
|
1600
1600
|
let deferred0_1;
|
|
@@ -2218,7 +2218,7 @@ export function __wbg_subarray_aa9065fa9dc5df96(arg0, arg1, arg2) {
|
|
|
2218
2218
|
return ret;
|
|
2219
2219
|
};
|
|
2220
2220
|
|
|
2221
|
-
export function
|
|
2221
|
+
export function __wbg_subtractPrivateKeys_2d63747d9fa64d4f() { return handleError(function (arg0, arg1, arg2) {
|
|
2222
2222
|
const ret = arg0.subtractPrivateKeys(arg1, arg2);
|
|
2223
2223
|
return ret;
|
|
2224
2224
|
}, arguments) };
|
|
@@ -2383,7 +2383,7 @@ export function __wbindgen_cb_drop(arg0) {
|
|
|
2383
2383
|
return ret;
|
|
2384
2384
|
};
|
|
2385
2385
|
|
|
2386
|
-
export function
|
|
2386
|
+
export function __wbindgen_closure_wrapper11277(arg0, arg1, arg2) {
|
|
2387
2387
|
const ret = makeMutClosure(arg0, arg1, 817, __wbg_adapter_64);
|
|
2388
2388
|
return ret;
|
|
2389
2389
|
};
|
|
Binary file
|
|
@@ -53,10 +53,10 @@ export const defaultsigner_encryptPrivateKeyForReceiver: (a: number, b: any, c:
|
|
|
53
53
|
export const defaultsigner_generateFrostSigningCommitments: (a: number) => any;
|
|
54
54
|
export const defaultsigner_generateRandomKey: (a: number) => any;
|
|
55
55
|
export const defaultsigner_getPublicKeyForNode: (a: number, b: any) => any;
|
|
56
|
-
export const
|
|
56
|
+
export const defaultsigner_getPublicKeyFromSecretSource: (a: number, b: any) => any;
|
|
57
57
|
export const defaultsigner_getStaticDepositPrivateKey: (a: number, b: number) => any;
|
|
58
|
-
export const defaultsigner_getStaticDepositPrivateKeySource: (a: number, b: number) => any;
|
|
59
58
|
export const defaultsigner_getStaticDepositPublicKey: (a: number, b: number) => any;
|
|
59
|
+
export const defaultsigner_getStaticDepositSecretSource: (a: number, b: number) => any;
|
|
60
60
|
export const defaultsigner_hmacSha256: (a: number, b: number, c: number, d: number, e: number) => any;
|
|
61
61
|
export const defaultsigner_identityPublicKey: (a: number) => [number, number, number];
|
|
62
62
|
export const defaultsigner_signEcdsa: (a: number, b: any, c: number, d: number) => any;
|
|
@@ -823,14 +823,14 @@ export interface ExternalSigner {
|
|
|
823
823
|
signHashSchnorr(hash: Uint8Array, path: string): Promise<SchnorrSignatureBytes>;
|
|
824
824
|
generateFrostSigningCommitments(): Promise<ExternalFrostCommitments>;
|
|
825
825
|
getPublicKeyForNode(id: ExternalTreeNodeId): Promise<PublicKeyBytes>;
|
|
826
|
-
generateRandomKey(): Promise<
|
|
827
|
-
|
|
828
|
-
getStaticDepositPrivateKey(index: number): Promise<
|
|
826
|
+
generateRandomKey(): Promise<ExternalSecretSource>;
|
|
827
|
+
getStaticDepositSecretSource(index: number): Promise<ExternalSecretSource>;
|
|
828
|
+
getStaticDepositPrivateKey(index: number): Promise<SecretBytes>;
|
|
829
829
|
getStaticDepositPublicKey(index: number): Promise<PublicKeyBytes>;
|
|
830
|
-
subtractPrivateKeys(signingKey:
|
|
830
|
+
subtractPrivateKeys(signingKey: ExternalSecretSource, newSigningKey: ExternalSecretSource): Promise<ExternalSecretSource>;
|
|
831
831
|
splitSecretWithProofs(secret: ExternalSecretToSplit, threshold: number, numShares: number): Promise<ExternalVerifiableSecretShare[]>;
|
|
832
|
-
encryptPrivateKeyForReceiver(privateKey:
|
|
833
|
-
|
|
832
|
+
encryptPrivateKeyForReceiver(privateKey: ExternalEncryptedSecret, receiverPublicKey: PublicKeyBytes): Promise<Uint8Array>;
|
|
833
|
+
getPublicKeyFromSecretSource(privateKey: ExternalSecretSource): Promise<PublicKeyBytes>;
|
|
834
834
|
signFrost(request: ExternalSignFrostRequest): Promise<ExternalFrostSignatureShare>;
|
|
835
835
|
aggregateFrost(request: ExternalAggregateFrostRequest): Promise<ExternalFrostSignature>;
|
|
836
836
|
hmacSha256(message: Uint8Array, path: string): Promise<HashedMessageBytes>;
|
|
@@ -841,7 +841,7 @@ export interface IdentifierSignaturePair {
|
|
|
841
841
|
signature: ExternalFrostSignatureShare;
|
|
842
842
|
}
|
|
843
843
|
|
|
844
|
-
export interface
|
|
844
|
+
export interface SecretBytes {
|
|
845
845
|
bytes: number[];
|
|
846
846
|
}
|
|
847
847
|
|
|
@@ -895,14 +895,14 @@ export interface ExternalVerifiableSecretShare {
|
|
|
895
895
|
proofs: number[][];
|
|
896
896
|
}
|
|
897
897
|
|
|
898
|
-
export interface
|
|
898
|
+
export interface ExternalEncryptedSecret {
|
|
899
899
|
ciphertext: number[];
|
|
900
900
|
}
|
|
901
901
|
|
|
902
902
|
export interface ExternalSignFrostRequest {
|
|
903
903
|
message: number[];
|
|
904
904
|
publicKey: number[];
|
|
905
|
-
|
|
905
|
+
secret: ExternalSecretSource;
|
|
906
906
|
verifyingKey: number[];
|
|
907
907
|
selfNonceCommitment: ExternalFrostCommitments;
|
|
908
908
|
statechainCommitments: IdentifierCommitmentPair[];
|
|
@@ -927,9 +927,9 @@ export interface IdentifierCommitmentPair {
|
|
|
927
927
|
commitment: ExternalSigningCommitments;
|
|
928
928
|
}
|
|
929
929
|
|
|
930
|
-
export type
|
|
930
|
+
export type ExternalSecretSource = { type: "derived"; nodeId: ExternalTreeNodeId } | { type: "encrypted"; key: ExternalEncryptedSecret };
|
|
931
931
|
|
|
932
|
-
export type ExternalSecretToSplit = { type: "
|
|
932
|
+
export type ExternalSecretToSplit = { type: "secretSource"; source: ExternalSecretSource } | { type: "preimage"; data: number[] };
|
|
933
933
|
|
|
934
934
|
export interface ExternalFrostSignature {
|
|
935
935
|
bytes: number[];
|
|
@@ -1030,20 +1030,20 @@ export class DefaultSigner {
|
|
|
1030
1030
|
eciesDecrypt(message: Uint8Array, path: string): Promise<Uint8Array>;
|
|
1031
1031
|
eciesEncrypt(message: Uint8Array, path: string): Promise<Uint8Array>;
|
|
1032
1032
|
aggregateFrost(request: ExternalAggregateFrostRequest): Promise<ExternalFrostSignature>;
|
|
1033
|
+
subtractPrivateKeys(signing_key: ExternalSecretSource, new_signing_key: ExternalSecretSource): Promise<ExternalSecretSource>;
|
|
1033
1034
|
derivePublicKey(path: string): Promise<PublicKeyBytes>;
|
|
1034
1035
|
signHashSchnorr(hash: Uint8Array, path: string): Promise<SchnorrSignatureBytes>;
|
|
1035
|
-
generateRandomKey(): Promise<
|
|
1036
|
+
generateRandomKey(): Promise<ExternalSecretSource>;
|
|
1036
1037
|
identityPublicKey(): PublicKeyBytes;
|
|
1037
|
-
|
|
1038
|
+
getStaticDepositPrivateKey(index: number): Promise<SecretBytes>;
|
|
1039
|
+
getPublicKeyFromSecretSource(private_key: ExternalSecretSource): Promise<PublicKeyBytes>;
|
|
1038
1040
|
signEcdsaRecoverable(message: MessageBytes, path: string): Promise<RecoverableEcdsaSignatureBytes>;
|
|
1039
1041
|
getPublicKeyForNode(id: ExternalTreeNodeId): Promise<PublicKeyBytes>;
|
|
1040
1042
|
splitSecretWithProofs(secret: ExternalSecretToSplit, threshold: number, num_shares: number): Promise<ExternalVerifiableSecretShare[]>;
|
|
1041
|
-
getStaticDepositPrivateKey(index: number): Promise<PrivateKeyBytes>;
|
|
1042
1043
|
getStaticDepositPublicKey(index: number): Promise<PublicKeyBytes>;
|
|
1043
|
-
encryptPrivateKeyForReceiver(private_key:
|
|
1044
|
+
encryptPrivateKeyForReceiver(private_key: ExternalEncryptedSecret, receiver_public_key: PublicKeyBytes): Promise<Uint8Array>;
|
|
1045
|
+
getStaticDepositSecretSource(index: number): Promise<ExternalSecretSource>;
|
|
1044
1046
|
generateFrostSigningCommitments(): Promise<ExternalFrostCommitments>;
|
|
1045
|
-
getStaticDepositPrivateKeySource(index: number): Promise<ExternalPrivateKeySource>;
|
|
1046
|
-
getPublicKeyFromPrivateKeySource(private_key: ExternalPrivateKeySource): Promise<PublicKeyBytes>;
|
|
1047
1047
|
}
|
|
1048
1048
|
export class IntoUnderlyingByteSource {
|
|
1049
1049
|
private constructor();
|
|
@@ -713,6 +713,15 @@ export class DefaultSigner {
|
|
|
713
713
|
const ret = wasm.defaultsigner_aggregateFrost(this.__wbg_ptr, request);
|
|
714
714
|
return ret;
|
|
715
715
|
}
|
|
716
|
+
/**
|
|
717
|
+
* @param {ExternalSecretSource} signing_key
|
|
718
|
+
* @param {ExternalSecretSource} new_signing_key
|
|
719
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
720
|
+
*/
|
|
721
|
+
subtractPrivateKeys(signing_key, new_signing_key) {
|
|
722
|
+
const ret = wasm.defaultsigner_subtractPrivateKeys(this.__wbg_ptr, signing_key, new_signing_key);
|
|
723
|
+
return ret;
|
|
724
|
+
}
|
|
716
725
|
/**
|
|
717
726
|
* @param {string} path
|
|
718
727
|
* @returns {Promise<PublicKeyBytes>}
|
|
@@ -737,7 +746,7 @@ export class DefaultSigner {
|
|
|
737
746
|
return ret;
|
|
738
747
|
}
|
|
739
748
|
/**
|
|
740
|
-
* @returns {Promise<
|
|
749
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
741
750
|
*/
|
|
742
751
|
generateRandomKey() {
|
|
743
752
|
const ret = wasm.defaultsigner_generateRandomKey(this.__wbg_ptr);
|
|
@@ -754,12 +763,19 @@ export class DefaultSigner {
|
|
|
754
763
|
return takeFromExternrefTable0(ret[0]);
|
|
755
764
|
}
|
|
756
765
|
/**
|
|
757
|
-
* @param {
|
|
758
|
-
* @
|
|
759
|
-
* @returns {Promise<ExternalPrivateKeySource>}
|
|
766
|
+
* @param {number} index
|
|
767
|
+
* @returns {Promise<SecretBytes>}
|
|
760
768
|
*/
|
|
761
|
-
|
|
762
|
-
const ret = wasm.
|
|
769
|
+
getStaticDepositPrivateKey(index) {
|
|
770
|
+
const ret = wasm.defaultsigner_getStaticDepositPrivateKey(this.__wbg_ptr, index);
|
|
771
|
+
return ret;
|
|
772
|
+
}
|
|
773
|
+
/**
|
|
774
|
+
* @param {ExternalSecretSource} private_key
|
|
775
|
+
* @returns {Promise<PublicKeyBytes>}
|
|
776
|
+
*/
|
|
777
|
+
getPublicKeyFromSecretSource(private_key) {
|
|
778
|
+
const ret = wasm.defaultsigner_getPublicKeyFromSecretSource(this.__wbg_ptr, private_key);
|
|
763
779
|
return ret;
|
|
764
780
|
}
|
|
765
781
|
/**
|
|
@@ -791,14 +807,6 @@ export class DefaultSigner {
|
|
|
791
807
|
const ret = wasm.defaultsigner_splitSecretWithProofs(this.__wbg_ptr, secret, threshold, num_shares);
|
|
792
808
|
return ret;
|
|
793
809
|
}
|
|
794
|
-
/**
|
|
795
|
-
* @param {number} index
|
|
796
|
-
* @returns {Promise<PrivateKeyBytes>}
|
|
797
|
-
*/
|
|
798
|
-
getStaticDepositPrivateKey(index) {
|
|
799
|
-
const ret = wasm.defaultsigner_getStaticDepositPrivateKey(this.__wbg_ptr, index);
|
|
800
|
-
return ret;
|
|
801
|
-
}
|
|
802
810
|
/**
|
|
803
811
|
* @param {number} index
|
|
804
812
|
* @returns {Promise<PublicKeyBytes>}
|
|
@@ -808,7 +816,7 @@ export class DefaultSigner {
|
|
|
808
816
|
return ret;
|
|
809
817
|
}
|
|
810
818
|
/**
|
|
811
|
-
* @param {
|
|
819
|
+
* @param {ExternalEncryptedSecret} private_key
|
|
812
820
|
* @param {PublicKeyBytes} receiver_public_key
|
|
813
821
|
* @returns {Promise<Uint8Array>}
|
|
814
822
|
*/
|
|
@@ -816,27 +824,19 @@ export class DefaultSigner {
|
|
|
816
824
|
const ret = wasm.defaultsigner_encryptPrivateKeyForReceiver(this.__wbg_ptr, private_key, receiver_public_key);
|
|
817
825
|
return ret;
|
|
818
826
|
}
|
|
819
|
-
/**
|
|
820
|
-
* @returns {Promise<ExternalFrostCommitments>}
|
|
821
|
-
*/
|
|
822
|
-
generateFrostSigningCommitments() {
|
|
823
|
-
const ret = wasm.defaultsigner_generateFrostSigningCommitments(this.__wbg_ptr);
|
|
824
|
-
return ret;
|
|
825
|
-
}
|
|
826
827
|
/**
|
|
827
828
|
* @param {number} index
|
|
828
|
-
* @returns {Promise<
|
|
829
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
829
830
|
*/
|
|
830
|
-
|
|
831
|
-
const ret = wasm.
|
|
831
|
+
getStaticDepositSecretSource(index) {
|
|
832
|
+
const ret = wasm.defaultsigner_getStaticDepositSecretSource(this.__wbg_ptr, index);
|
|
832
833
|
return ret;
|
|
833
834
|
}
|
|
834
835
|
/**
|
|
835
|
-
* @
|
|
836
|
-
* @returns {Promise<PublicKeyBytes>}
|
|
836
|
+
* @returns {Promise<ExternalFrostCommitments>}
|
|
837
837
|
*/
|
|
838
|
-
|
|
839
|
-
const ret = wasm.
|
|
838
|
+
generateFrostSigningCommitments() {
|
|
839
|
+
const ret = wasm.defaultsigner_generateFrostSigningCommitments(this.__wbg_ptr);
|
|
840
840
|
return ret;
|
|
841
841
|
}
|
|
842
842
|
}
|
|
@@ -1386,7 +1386,7 @@ const imports = {
|
|
|
1386
1386
|
wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
|
|
1387
1387
|
}
|
|
1388
1388
|
}, arguments) },
|
|
1389
|
-
|
|
1389
|
+
__wbg_encryptPrivateKeyForReceiver_346eec1080ebe04c: function() { return handleError(function (arg0, arg1, arg2) {
|
|
1390
1390
|
const ret = arg0.encryptPrivateKeyForReceiver(arg1, arg2);
|
|
1391
1391
|
return ret;
|
|
1392
1392
|
}, arguments) },
|
|
@@ -1484,8 +1484,8 @@ const imports = {
|
|
|
1484
1484
|
const ret = arg0.getPublicKeyForNode(arg1);
|
|
1485
1485
|
return ret;
|
|
1486
1486
|
}, arguments) },
|
|
1487
|
-
|
|
1488
|
-
const ret = arg0.
|
|
1487
|
+
__wbg_getPublicKeyFromSecretSource_9e324c0b205a9f99: function() { return handleError(function (arg0, arg1) {
|
|
1488
|
+
const ret = arg0.getPublicKeyFromSecretSource(arg1);
|
|
1489
1489
|
return ret;
|
|
1490
1490
|
}, arguments) },
|
|
1491
1491
|
__wbg_getRandomValues_b8f5dbd5f3995a9e: function() { return handleError(function (arg0, arg1) {
|
|
@@ -1510,11 +1510,7 @@ const imports = {
|
|
|
1510
1510
|
wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
|
|
1511
1511
|
}
|
|
1512
1512
|
}, arguments) },
|
|
1513
|
-
|
|
1514
|
-
const ret = arg0.getStaticDepositPrivateKeySource(arg1 >>> 0);
|
|
1515
|
-
return ret;
|
|
1516
|
-
}, arguments) },
|
|
1517
|
-
__wbg_getStaticDepositPrivateKey_a7a4ab43f45f0713: function() { return handleError(function (arg0, arg1) {
|
|
1513
|
+
__wbg_getStaticDepositPrivateKey_203e6f4eb4116ce0: function() { return handleError(function (arg0, arg1) {
|
|
1518
1514
|
const ret = arg0.getStaticDepositPrivateKey(arg1 >>> 0);
|
|
1519
1515
|
return ret;
|
|
1520
1516
|
}, arguments) },
|
|
@@ -1522,6 +1518,10 @@ const imports = {
|
|
|
1522
1518
|
const ret = arg0.getStaticDepositPublicKey(arg1 >>> 0);
|
|
1523
1519
|
return ret;
|
|
1524
1520
|
}, arguments) },
|
|
1521
|
+
__wbg_getStaticDepositSecretSource_8e310c718339e400: function() { return handleError(function (arg0, arg1) {
|
|
1522
|
+
const ret = arg0.getStaticDepositSecretSource(arg1 >>> 0);
|
|
1523
|
+
return ret;
|
|
1524
|
+
}, arguments) },
|
|
1525
1525
|
__wbg_getTransactionHex_973b8d0555c60f99: function() { return handleError(function (arg0, arg1, arg2) {
|
|
1526
1526
|
let deferred0_0;
|
|
1527
1527
|
let deferred0_1;
|
|
@@ -2046,7 +2046,7 @@ const imports = {
|
|
|
2046
2046
|
const ret = arg0.subarray(arg1 >>> 0, arg2 >>> 0);
|
|
2047
2047
|
return ret;
|
|
2048
2048
|
},
|
|
2049
|
-
|
|
2049
|
+
__wbg_subtractPrivateKeys_2d63747d9fa64d4f: function() { return handleError(function (arg0, arg1, arg2) {
|
|
2050
2050
|
const ret = arg0.subtractPrivateKeys(arg1, arg2);
|
|
2051
2051
|
return ret;
|
|
2052
2052
|
}, arguments) },
|
|
@@ -2182,7 +2182,7 @@ const imports = {
|
|
|
2182
2182
|
const ret = false;
|
|
2183
2183
|
return ret;
|
|
2184
2184
|
},
|
|
2185
|
-
|
|
2185
|
+
__wbindgen_closure_wrapper11277: function(arg0, arg1, arg2) {
|
|
2186
2186
|
const ret = makeMutClosure(arg0, arg1, 817, __wbg_adapter_64);
|
|
2187
2187
|
return ret;
|
|
2188
2188
|
},
|
|
Binary file
|
|
@@ -53,10 +53,10 @@ export const defaultsigner_encryptPrivateKeyForReceiver: (a: number, b: any, c:
|
|
|
53
53
|
export const defaultsigner_generateFrostSigningCommitments: (a: number) => any;
|
|
54
54
|
export const defaultsigner_generateRandomKey: (a: number) => any;
|
|
55
55
|
export const defaultsigner_getPublicKeyForNode: (a: number, b: any) => any;
|
|
56
|
-
export const
|
|
56
|
+
export const defaultsigner_getPublicKeyFromSecretSource: (a: number, b: any) => any;
|
|
57
57
|
export const defaultsigner_getStaticDepositPrivateKey: (a: number, b: number) => any;
|
|
58
|
-
export const defaultsigner_getStaticDepositPrivateKeySource: (a: number, b: number) => any;
|
|
59
58
|
export const defaultsigner_getStaticDepositPublicKey: (a: number, b: number) => any;
|
|
59
|
+
export const defaultsigner_getStaticDepositSecretSource: (a: number, b: number) => any;
|
|
60
60
|
export const defaultsigner_hmacSha256: (a: number, b: number, c: number, d: number, e: number) => any;
|
|
61
61
|
export const defaultsigner_identityPublicKey: (a: number) => [number, number, number];
|
|
62
62
|
export const defaultsigner_signEcdsa: (a: number, b: any, c: number, d: number) => any;
|
|
@@ -823,14 +823,14 @@ export interface ExternalSigner {
|
|
|
823
823
|
signHashSchnorr(hash: Uint8Array, path: string): Promise<SchnorrSignatureBytes>;
|
|
824
824
|
generateFrostSigningCommitments(): Promise<ExternalFrostCommitments>;
|
|
825
825
|
getPublicKeyForNode(id: ExternalTreeNodeId): Promise<PublicKeyBytes>;
|
|
826
|
-
generateRandomKey(): Promise<
|
|
827
|
-
|
|
828
|
-
getStaticDepositPrivateKey(index: number): Promise<
|
|
826
|
+
generateRandomKey(): Promise<ExternalSecretSource>;
|
|
827
|
+
getStaticDepositSecretSource(index: number): Promise<ExternalSecretSource>;
|
|
828
|
+
getStaticDepositPrivateKey(index: number): Promise<SecretBytes>;
|
|
829
829
|
getStaticDepositPublicKey(index: number): Promise<PublicKeyBytes>;
|
|
830
|
-
subtractPrivateKeys(signingKey:
|
|
830
|
+
subtractPrivateKeys(signingKey: ExternalSecretSource, newSigningKey: ExternalSecretSource): Promise<ExternalSecretSource>;
|
|
831
831
|
splitSecretWithProofs(secret: ExternalSecretToSplit, threshold: number, numShares: number): Promise<ExternalVerifiableSecretShare[]>;
|
|
832
|
-
encryptPrivateKeyForReceiver(privateKey:
|
|
833
|
-
|
|
832
|
+
encryptPrivateKeyForReceiver(privateKey: ExternalEncryptedSecret, receiverPublicKey: PublicKeyBytes): Promise<Uint8Array>;
|
|
833
|
+
getPublicKeyFromSecretSource(privateKey: ExternalSecretSource): Promise<PublicKeyBytes>;
|
|
834
834
|
signFrost(request: ExternalSignFrostRequest): Promise<ExternalFrostSignatureShare>;
|
|
835
835
|
aggregateFrost(request: ExternalAggregateFrostRequest): Promise<ExternalFrostSignature>;
|
|
836
836
|
hmacSha256(message: Uint8Array, path: string): Promise<HashedMessageBytes>;
|
|
@@ -841,7 +841,7 @@ export interface IdentifierSignaturePair {
|
|
|
841
841
|
signature: ExternalFrostSignatureShare;
|
|
842
842
|
}
|
|
843
843
|
|
|
844
|
-
export interface
|
|
844
|
+
export interface SecretBytes {
|
|
845
845
|
bytes: number[];
|
|
846
846
|
}
|
|
847
847
|
|
|
@@ -895,14 +895,14 @@ export interface ExternalVerifiableSecretShare {
|
|
|
895
895
|
proofs: number[][];
|
|
896
896
|
}
|
|
897
897
|
|
|
898
|
-
export interface
|
|
898
|
+
export interface ExternalEncryptedSecret {
|
|
899
899
|
ciphertext: number[];
|
|
900
900
|
}
|
|
901
901
|
|
|
902
902
|
export interface ExternalSignFrostRequest {
|
|
903
903
|
message: number[];
|
|
904
904
|
publicKey: number[];
|
|
905
|
-
|
|
905
|
+
secret: ExternalSecretSource;
|
|
906
906
|
verifyingKey: number[];
|
|
907
907
|
selfNonceCommitment: ExternalFrostCommitments;
|
|
908
908
|
statechainCommitments: IdentifierCommitmentPair[];
|
|
@@ -927,9 +927,9 @@ export interface IdentifierCommitmentPair {
|
|
|
927
927
|
commitment: ExternalSigningCommitments;
|
|
928
928
|
}
|
|
929
929
|
|
|
930
|
-
export type
|
|
930
|
+
export type ExternalSecretSource = { type: "derived"; nodeId: ExternalTreeNodeId } | { type: "encrypted"; key: ExternalEncryptedSecret };
|
|
931
931
|
|
|
932
|
-
export type ExternalSecretToSplit = { type: "
|
|
932
|
+
export type ExternalSecretToSplit = { type: "secretSource"; source: ExternalSecretSource } | { type: "preimage"; data: number[] };
|
|
933
933
|
|
|
934
934
|
export interface ExternalFrostSignature {
|
|
935
935
|
bytes: number[];
|
|
@@ -1030,20 +1030,20 @@ export class DefaultSigner {
|
|
|
1030
1030
|
eciesDecrypt(message: Uint8Array, path: string): Promise<Uint8Array>;
|
|
1031
1031
|
eciesEncrypt(message: Uint8Array, path: string): Promise<Uint8Array>;
|
|
1032
1032
|
aggregateFrost(request: ExternalAggregateFrostRequest): Promise<ExternalFrostSignature>;
|
|
1033
|
+
subtractPrivateKeys(signing_key: ExternalSecretSource, new_signing_key: ExternalSecretSource): Promise<ExternalSecretSource>;
|
|
1033
1034
|
derivePublicKey(path: string): Promise<PublicKeyBytes>;
|
|
1034
1035
|
signHashSchnorr(hash: Uint8Array, path: string): Promise<SchnorrSignatureBytes>;
|
|
1035
|
-
generateRandomKey(): Promise<
|
|
1036
|
+
generateRandomKey(): Promise<ExternalSecretSource>;
|
|
1036
1037
|
identityPublicKey(): PublicKeyBytes;
|
|
1037
|
-
|
|
1038
|
+
getStaticDepositPrivateKey(index: number): Promise<SecretBytes>;
|
|
1039
|
+
getPublicKeyFromSecretSource(private_key: ExternalSecretSource): Promise<PublicKeyBytes>;
|
|
1038
1040
|
signEcdsaRecoverable(message: MessageBytes, path: string): Promise<RecoverableEcdsaSignatureBytes>;
|
|
1039
1041
|
getPublicKeyForNode(id: ExternalTreeNodeId): Promise<PublicKeyBytes>;
|
|
1040
1042
|
splitSecretWithProofs(secret: ExternalSecretToSplit, threshold: number, num_shares: number): Promise<ExternalVerifiableSecretShare[]>;
|
|
1041
|
-
getStaticDepositPrivateKey(index: number): Promise<PrivateKeyBytes>;
|
|
1042
1043
|
getStaticDepositPublicKey(index: number): Promise<PublicKeyBytes>;
|
|
1043
|
-
encryptPrivateKeyForReceiver(private_key:
|
|
1044
|
+
encryptPrivateKeyForReceiver(private_key: ExternalEncryptedSecret, receiver_public_key: PublicKeyBytes): Promise<Uint8Array>;
|
|
1045
|
+
getStaticDepositSecretSource(index: number): Promise<ExternalSecretSource>;
|
|
1044
1046
|
generateFrostSigningCommitments(): Promise<ExternalFrostCommitments>;
|
|
1045
|
-
getStaticDepositPrivateKeySource(index: number): Promise<ExternalPrivateKeySource>;
|
|
1046
|
-
getPublicKeyFromPrivateKeySource(private_key: ExternalPrivateKeySource): Promise<PublicKeyBytes>;
|
|
1047
1047
|
}
|
|
1048
1048
|
export class IntoUnderlyingByteSource {
|
|
1049
1049
|
private constructor();
|
|
@@ -727,6 +727,15 @@ class DefaultSigner {
|
|
|
727
727
|
const ret = wasm.defaultsigner_aggregateFrost(this.__wbg_ptr, request);
|
|
728
728
|
return ret;
|
|
729
729
|
}
|
|
730
|
+
/**
|
|
731
|
+
* @param {ExternalSecretSource} signing_key
|
|
732
|
+
* @param {ExternalSecretSource} new_signing_key
|
|
733
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
734
|
+
*/
|
|
735
|
+
subtractPrivateKeys(signing_key, new_signing_key) {
|
|
736
|
+
const ret = wasm.defaultsigner_subtractPrivateKeys(this.__wbg_ptr, signing_key, new_signing_key);
|
|
737
|
+
return ret;
|
|
738
|
+
}
|
|
730
739
|
/**
|
|
731
740
|
* @param {string} path
|
|
732
741
|
* @returns {Promise<PublicKeyBytes>}
|
|
@@ -751,7 +760,7 @@ class DefaultSigner {
|
|
|
751
760
|
return ret;
|
|
752
761
|
}
|
|
753
762
|
/**
|
|
754
|
-
* @returns {Promise<
|
|
763
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
755
764
|
*/
|
|
756
765
|
generateRandomKey() {
|
|
757
766
|
const ret = wasm.defaultsigner_generateRandomKey(this.__wbg_ptr);
|
|
@@ -768,12 +777,19 @@ class DefaultSigner {
|
|
|
768
777
|
return takeFromExternrefTable0(ret[0]);
|
|
769
778
|
}
|
|
770
779
|
/**
|
|
771
|
-
* @param {
|
|
772
|
-
* @
|
|
773
|
-
* @returns {Promise<ExternalPrivateKeySource>}
|
|
780
|
+
* @param {number} index
|
|
781
|
+
* @returns {Promise<SecretBytes>}
|
|
774
782
|
*/
|
|
775
|
-
|
|
776
|
-
const ret = wasm.
|
|
783
|
+
getStaticDepositPrivateKey(index) {
|
|
784
|
+
const ret = wasm.defaultsigner_getStaticDepositPrivateKey(this.__wbg_ptr, index);
|
|
785
|
+
return ret;
|
|
786
|
+
}
|
|
787
|
+
/**
|
|
788
|
+
* @param {ExternalSecretSource} private_key
|
|
789
|
+
* @returns {Promise<PublicKeyBytes>}
|
|
790
|
+
*/
|
|
791
|
+
getPublicKeyFromSecretSource(private_key) {
|
|
792
|
+
const ret = wasm.defaultsigner_getPublicKeyFromSecretSource(this.__wbg_ptr, private_key);
|
|
777
793
|
return ret;
|
|
778
794
|
}
|
|
779
795
|
/**
|
|
@@ -805,14 +821,6 @@ class DefaultSigner {
|
|
|
805
821
|
const ret = wasm.defaultsigner_splitSecretWithProofs(this.__wbg_ptr, secret, threshold, num_shares);
|
|
806
822
|
return ret;
|
|
807
823
|
}
|
|
808
|
-
/**
|
|
809
|
-
* @param {number} index
|
|
810
|
-
* @returns {Promise<PrivateKeyBytes>}
|
|
811
|
-
*/
|
|
812
|
-
getStaticDepositPrivateKey(index) {
|
|
813
|
-
const ret = wasm.defaultsigner_getStaticDepositPrivateKey(this.__wbg_ptr, index);
|
|
814
|
-
return ret;
|
|
815
|
-
}
|
|
816
824
|
/**
|
|
817
825
|
* @param {number} index
|
|
818
826
|
* @returns {Promise<PublicKeyBytes>}
|
|
@@ -822,7 +830,7 @@ class DefaultSigner {
|
|
|
822
830
|
return ret;
|
|
823
831
|
}
|
|
824
832
|
/**
|
|
825
|
-
* @param {
|
|
833
|
+
* @param {ExternalEncryptedSecret} private_key
|
|
826
834
|
* @param {PublicKeyBytes} receiver_public_key
|
|
827
835
|
* @returns {Promise<Uint8Array>}
|
|
828
836
|
*/
|
|
@@ -830,27 +838,19 @@ class DefaultSigner {
|
|
|
830
838
|
const ret = wasm.defaultsigner_encryptPrivateKeyForReceiver(this.__wbg_ptr, private_key, receiver_public_key);
|
|
831
839
|
return ret;
|
|
832
840
|
}
|
|
833
|
-
/**
|
|
834
|
-
* @returns {Promise<ExternalFrostCommitments>}
|
|
835
|
-
*/
|
|
836
|
-
generateFrostSigningCommitments() {
|
|
837
|
-
const ret = wasm.defaultsigner_generateFrostSigningCommitments(this.__wbg_ptr);
|
|
838
|
-
return ret;
|
|
839
|
-
}
|
|
840
841
|
/**
|
|
841
842
|
* @param {number} index
|
|
842
|
-
* @returns {Promise<
|
|
843
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
843
844
|
*/
|
|
844
|
-
|
|
845
|
-
const ret = wasm.
|
|
845
|
+
getStaticDepositSecretSource(index) {
|
|
846
|
+
const ret = wasm.defaultsigner_getStaticDepositSecretSource(this.__wbg_ptr, index);
|
|
846
847
|
return ret;
|
|
847
848
|
}
|
|
848
849
|
/**
|
|
849
|
-
* @
|
|
850
|
-
* @returns {Promise<PublicKeyBytes>}
|
|
850
|
+
* @returns {Promise<ExternalFrostCommitments>}
|
|
851
851
|
*/
|
|
852
|
-
|
|
853
|
-
const ret = wasm.
|
|
852
|
+
generateFrostSigningCommitments() {
|
|
853
|
+
const ret = wasm.defaultsigner_generateFrostSigningCommitments(this.__wbg_ptr);
|
|
854
854
|
return ret;
|
|
855
855
|
}
|
|
856
856
|
}
|
|
@@ -1437,7 +1437,7 @@ module.exports.__wbg_eciesEncrypt_d1c5b3c6a4602a28 = function() { return handleE
|
|
|
1437
1437
|
}
|
|
1438
1438
|
}, arguments) };
|
|
1439
1439
|
|
|
1440
|
-
module.exports.
|
|
1440
|
+
module.exports.__wbg_encryptPrivateKeyForReceiver_346eec1080ebe04c = function() { return handleError(function (arg0, arg1, arg2) {
|
|
1441
1441
|
const ret = arg0.encryptPrivateKeyForReceiver(arg1, arg2);
|
|
1442
1442
|
return ret;
|
|
1443
1443
|
}, arguments) };
|
|
@@ -1552,8 +1552,8 @@ module.exports.__wbg_getPublicKeyForNode_5ddb3378904e4ad4 = function() { return
|
|
|
1552
1552
|
return ret;
|
|
1553
1553
|
}, arguments) };
|
|
1554
1554
|
|
|
1555
|
-
module.exports.
|
|
1556
|
-
const ret = arg0.
|
|
1555
|
+
module.exports.__wbg_getPublicKeyFromSecretSource_9e324c0b205a9f99 = function() { return handleError(function (arg0, arg1) {
|
|
1556
|
+
const ret = arg0.getPublicKeyFromSecretSource(arg1);
|
|
1557
1557
|
return ret;
|
|
1558
1558
|
}, arguments) };
|
|
1559
1559
|
|
|
@@ -1583,12 +1583,7 @@ module.exports.__wbg_getRequest_4ab87a8cbe18fa22 = function() { return handleErr
|
|
|
1583
1583
|
}
|
|
1584
1584
|
}, arguments) };
|
|
1585
1585
|
|
|
1586
|
-
module.exports.
|
|
1587
|
-
const ret = arg0.getStaticDepositPrivateKeySource(arg1 >>> 0);
|
|
1588
|
-
return ret;
|
|
1589
|
-
}, arguments) };
|
|
1590
|
-
|
|
1591
|
-
module.exports.__wbg_getStaticDepositPrivateKey_a7a4ab43f45f0713 = function() { return handleError(function (arg0, arg1) {
|
|
1586
|
+
module.exports.__wbg_getStaticDepositPrivateKey_203e6f4eb4116ce0 = function() { return handleError(function (arg0, arg1) {
|
|
1592
1587
|
const ret = arg0.getStaticDepositPrivateKey(arg1 >>> 0);
|
|
1593
1588
|
return ret;
|
|
1594
1589
|
}, arguments) };
|
|
@@ -1598,6 +1593,11 @@ module.exports.__wbg_getStaticDepositPublicKey_4551dec44c20efe6 = function() { r
|
|
|
1598
1593
|
return ret;
|
|
1599
1594
|
}, arguments) };
|
|
1600
1595
|
|
|
1596
|
+
module.exports.__wbg_getStaticDepositSecretSource_8e310c718339e400 = function() { return handleError(function (arg0, arg1) {
|
|
1597
|
+
const ret = arg0.getStaticDepositSecretSource(arg1 >>> 0);
|
|
1598
|
+
return ret;
|
|
1599
|
+
}, arguments) };
|
|
1600
|
+
|
|
1601
1601
|
module.exports.__wbg_getTransactionHex_973b8d0555c60f99 = function() { return handleError(function (arg0, arg1, arg2) {
|
|
1602
1602
|
let deferred0_0;
|
|
1603
1603
|
let deferred0_1;
|
|
@@ -2221,7 +2221,7 @@ module.exports.__wbg_subarray_aa9065fa9dc5df96 = function(arg0, arg1, arg2) {
|
|
|
2221
2221
|
return ret;
|
|
2222
2222
|
};
|
|
2223
2223
|
|
|
2224
|
-
module.exports.
|
|
2224
|
+
module.exports.__wbg_subtractPrivateKeys_2d63747d9fa64d4f = function() { return handleError(function (arg0, arg1, arg2) {
|
|
2225
2225
|
const ret = arg0.subtractPrivateKeys(arg1, arg2);
|
|
2226
2226
|
return ret;
|
|
2227
2227
|
}, arguments) };
|
|
@@ -2386,7 +2386,7 @@ module.exports.__wbindgen_cb_drop = function(arg0) {
|
|
|
2386
2386
|
return ret;
|
|
2387
2387
|
};
|
|
2388
2388
|
|
|
2389
|
-
module.exports.
|
|
2389
|
+
module.exports.__wbindgen_closure_wrapper11277 = function(arg0, arg1, arg2) {
|
|
2390
2390
|
const ret = makeMutClosure(arg0, arg1, 817, __wbg_adapter_64);
|
|
2391
2391
|
return ret;
|
|
2392
2392
|
};
|
|
Binary file
|
|
@@ -53,10 +53,10 @@ export const defaultsigner_encryptPrivateKeyForReceiver: (a: number, b: any, c:
|
|
|
53
53
|
export const defaultsigner_generateFrostSigningCommitments: (a: number) => any;
|
|
54
54
|
export const defaultsigner_generateRandomKey: (a: number) => any;
|
|
55
55
|
export const defaultsigner_getPublicKeyForNode: (a: number, b: any) => any;
|
|
56
|
-
export const
|
|
56
|
+
export const defaultsigner_getPublicKeyFromSecretSource: (a: number, b: any) => any;
|
|
57
57
|
export const defaultsigner_getStaticDepositPrivateKey: (a: number, b: number) => any;
|
|
58
|
-
export const defaultsigner_getStaticDepositPrivateKeySource: (a: number, b: number) => any;
|
|
59
58
|
export const defaultsigner_getStaticDepositPublicKey: (a: number, b: number) => any;
|
|
59
|
+
export const defaultsigner_getStaticDepositSecretSource: (a: number, b: number) => any;
|
|
60
60
|
export const defaultsigner_hmacSha256: (a: number, b: number, c: number, d: number, e: number) => any;
|
|
61
61
|
export const defaultsigner_identityPublicKey: (a: number) => [number, number, number];
|
|
62
62
|
export const defaultsigner_signEcdsa: (a: number, b: any, c: number, d: number) => any;
|
package/package.json
CHANGED
|
@@ -823,14 +823,14 @@ export interface ExternalSigner {
|
|
|
823
823
|
signHashSchnorr(hash: Uint8Array, path: string): Promise<SchnorrSignatureBytes>;
|
|
824
824
|
generateFrostSigningCommitments(): Promise<ExternalFrostCommitments>;
|
|
825
825
|
getPublicKeyForNode(id: ExternalTreeNodeId): Promise<PublicKeyBytes>;
|
|
826
|
-
generateRandomKey(): Promise<
|
|
827
|
-
|
|
828
|
-
getStaticDepositPrivateKey(index: number): Promise<
|
|
826
|
+
generateRandomKey(): Promise<ExternalSecretSource>;
|
|
827
|
+
getStaticDepositSecretSource(index: number): Promise<ExternalSecretSource>;
|
|
828
|
+
getStaticDepositPrivateKey(index: number): Promise<SecretBytes>;
|
|
829
829
|
getStaticDepositPublicKey(index: number): Promise<PublicKeyBytes>;
|
|
830
|
-
subtractPrivateKeys(signingKey:
|
|
830
|
+
subtractPrivateKeys(signingKey: ExternalSecretSource, newSigningKey: ExternalSecretSource): Promise<ExternalSecretSource>;
|
|
831
831
|
splitSecretWithProofs(secret: ExternalSecretToSplit, threshold: number, numShares: number): Promise<ExternalVerifiableSecretShare[]>;
|
|
832
|
-
encryptPrivateKeyForReceiver(privateKey:
|
|
833
|
-
|
|
832
|
+
encryptPrivateKeyForReceiver(privateKey: ExternalEncryptedSecret, receiverPublicKey: PublicKeyBytes): Promise<Uint8Array>;
|
|
833
|
+
getPublicKeyFromSecretSource(privateKey: ExternalSecretSource): Promise<PublicKeyBytes>;
|
|
834
834
|
signFrost(request: ExternalSignFrostRequest): Promise<ExternalFrostSignatureShare>;
|
|
835
835
|
aggregateFrost(request: ExternalAggregateFrostRequest): Promise<ExternalFrostSignature>;
|
|
836
836
|
hmacSha256(message: Uint8Array, path: string): Promise<HashedMessageBytes>;
|
|
@@ -841,7 +841,7 @@ export interface IdentifierSignaturePair {
|
|
|
841
841
|
signature: ExternalFrostSignatureShare;
|
|
842
842
|
}
|
|
843
843
|
|
|
844
|
-
export interface
|
|
844
|
+
export interface SecretBytes {
|
|
845
845
|
bytes: number[];
|
|
846
846
|
}
|
|
847
847
|
|
|
@@ -895,14 +895,14 @@ export interface ExternalVerifiableSecretShare {
|
|
|
895
895
|
proofs: number[][];
|
|
896
896
|
}
|
|
897
897
|
|
|
898
|
-
export interface
|
|
898
|
+
export interface ExternalEncryptedSecret {
|
|
899
899
|
ciphertext: number[];
|
|
900
900
|
}
|
|
901
901
|
|
|
902
902
|
export interface ExternalSignFrostRequest {
|
|
903
903
|
message: number[];
|
|
904
904
|
publicKey: number[];
|
|
905
|
-
|
|
905
|
+
secret: ExternalSecretSource;
|
|
906
906
|
verifyingKey: number[];
|
|
907
907
|
selfNonceCommitment: ExternalFrostCommitments;
|
|
908
908
|
statechainCommitments: IdentifierCommitmentPair[];
|
|
@@ -927,9 +927,9 @@ export interface IdentifierCommitmentPair {
|
|
|
927
927
|
commitment: ExternalSigningCommitments;
|
|
928
928
|
}
|
|
929
929
|
|
|
930
|
-
export type
|
|
930
|
+
export type ExternalSecretSource = { type: "derived"; nodeId: ExternalTreeNodeId } | { type: "encrypted"; key: ExternalEncryptedSecret };
|
|
931
931
|
|
|
932
|
-
export type ExternalSecretToSplit = { type: "
|
|
932
|
+
export type ExternalSecretToSplit = { type: "secretSource"; source: ExternalSecretSource } | { type: "preimage"; data: number[] };
|
|
933
933
|
|
|
934
934
|
export interface ExternalFrostSignature {
|
|
935
935
|
bytes: number[];
|
|
@@ -1030,20 +1030,20 @@ export class DefaultSigner {
|
|
|
1030
1030
|
eciesDecrypt(message: Uint8Array, path: string): Promise<Uint8Array>;
|
|
1031
1031
|
eciesEncrypt(message: Uint8Array, path: string): Promise<Uint8Array>;
|
|
1032
1032
|
aggregateFrost(request: ExternalAggregateFrostRequest): Promise<ExternalFrostSignature>;
|
|
1033
|
+
subtractPrivateKeys(signing_key: ExternalSecretSource, new_signing_key: ExternalSecretSource): Promise<ExternalSecretSource>;
|
|
1033
1034
|
derivePublicKey(path: string): Promise<PublicKeyBytes>;
|
|
1034
1035
|
signHashSchnorr(hash: Uint8Array, path: string): Promise<SchnorrSignatureBytes>;
|
|
1035
|
-
generateRandomKey(): Promise<
|
|
1036
|
+
generateRandomKey(): Promise<ExternalSecretSource>;
|
|
1036
1037
|
identityPublicKey(): PublicKeyBytes;
|
|
1037
|
-
|
|
1038
|
+
getStaticDepositPrivateKey(index: number): Promise<SecretBytes>;
|
|
1039
|
+
getPublicKeyFromSecretSource(private_key: ExternalSecretSource): Promise<PublicKeyBytes>;
|
|
1038
1040
|
signEcdsaRecoverable(message: MessageBytes, path: string): Promise<RecoverableEcdsaSignatureBytes>;
|
|
1039
1041
|
getPublicKeyForNode(id: ExternalTreeNodeId): Promise<PublicKeyBytes>;
|
|
1040
1042
|
splitSecretWithProofs(secret: ExternalSecretToSplit, threshold: number, num_shares: number): Promise<ExternalVerifiableSecretShare[]>;
|
|
1041
|
-
getStaticDepositPrivateKey(index: number): Promise<PrivateKeyBytes>;
|
|
1042
1043
|
getStaticDepositPublicKey(index: number): Promise<PublicKeyBytes>;
|
|
1043
|
-
encryptPrivateKeyForReceiver(private_key:
|
|
1044
|
+
encryptPrivateKeyForReceiver(private_key: ExternalEncryptedSecret, receiver_public_key: PublicKeyBytes): Promise<Uint8Array>;
|
|
1045
|
+
getStaticDepositSecretSource(index: number): Promise<ExternalSecretSource>;
|
|
1044
1046
|
generateFrostSigningCommitments(): Promise<ExternalFrostCommitments>;
|
|
1045
|
-
getStaticDepositPrivateKeySource(index: number): Promise<ExternalPrivateKeySource>;
|
|
1046
|
-
getPublicKeyFromPrivateKeySource(private_key: ExternalPrivateKeySource): Promise<PublicKeyBytes>;
|
|
1047
1047
|
}
|
|
1048
1048
|
export class IntoUnderlyingByteSource {
|
|
1049
1049
|
private constructor();
|
|
@@ -1150,10 +1150,10 @@ export interface InitOutput {
|
|
|
1150
1150
|
readonly defaultsigner_generateFrostSigningCommitments: (a: number) => any;
|
|
1151
1151
|
readonly defaultsigner_generateRandomKey: (a: number) => any;
|
|
1152
1152
|
readonly defaultsigner_getPublicKeyForNode: (a: number, b: any) => any;
|
|
1153
|
-
readonly
|
|
1153
|
+
readonly defaultsigner_getPublicKeyFromSecretSource: (a: number, b: any) => any;
|
|
1154
1154
|
readonly defaultsigner_getStaticDepositPrivateKey: (a: number, b: number) => any;
|
|
1155
|
-
readonly defaultsigner_getStaticDepositPrivateKeySource: (a: number, b: number) => any;
|
|
1156
1155
|
readonly defaultsigner_getStaticDepositPublicKey: (a: number, b: number) => any;
|
|
1156
|
+
readonly defaultsigner_getStaticDepositSecretSource: (a: number, b: number) => any;
|
|
1157
1157
|
readonly defaultsigner_hmacSha256: (a: number, b: number, c: number, d: number, e: number) => any;
|
|
1158
1158
|
readonly defaultsigner_identityPublicKey: (a: number) => [number, number, number];
|
|
1159
1159
|
readonly defaultsigner_signEcdsa: (a: number, b: any, c: number, d: number) => any;
|
|
@@ -722,6 +722,15 @@ export class DefaultSigner {
|
|
|
722
722
|
const ret = wasm.defaultsigner_aggregateFrost(this.__wbg_ptr, request);
|
|
723
723
|
return ret;
|
|
724
724
|
}
|
|
725
|
+
/**
|
|
726
|
+
* @param {ExternalSecretSource} signing_key
|
|
727
|
+
* @param {ExternalSecretSource} new_signing_key
|
|
728
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
729
|
+
*/
|
|
730
|
+
subtractPrivateKeys(signing_key, new_signing_key) {
|
|
731
|
+
const ret = wasm.defaultsigner_subtractPrivateKeys(this.__wbg_ptr, signing_key, new_signing_key);
|
|
732
|
+
return ret;
|
|
733
|
+
}
|
|
725
734
|
/**
|
|
726
735
|
* @param {string} path
|
|
727
736
|
* @returns {Promise<PublicKeyBytes>}
|
|
@@ -746,7 +755,7 @@ export class DefaultSigner {
|
|
|
746
755
|
return ret;
|
|
747
756
|
}
|
|
748
757
|
/**
|
|
749
|
-
* @returns {Promise<
|
|
758
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
750
759
|
*/
|
|
751
760
|
generateRandomKey() {
|
|
752
761
|
const ret = wasm.defaultsigner_generateRandomKey(this.__wbg_ptr);
|
|
@@ -763,12 +772,19 @@ export class DefaultSigner {
|
|
|
763
772
|
return takeFromExternrefTable0(ret[0]);
|
|
764
773
|
}
|
|
765
774
|
/**
|
|
766
|
-
* @param {
|
|
767
|
-
* @
|
|
768
|
-
* @returns {Promise<ExternalPrivateKeySource>}
|
|
775
|
+
* @param {number} index
|
|
776
|
+
* @returns {Promise<SecretBytes>}
|
|
769
777
|
*/
|
|
770
|
-
|
|
771
|
-
const ret = wasm.
|
|
778
|
+
getStaticDepositPrivateKey(index) {
|
|
779
|
+
const ret = wasm.defaultsigner_getStaticDepositPrivateKey(this.__wbg_ptr, index);
|
|
780
|
+
return ret;
|
|
781
|
+
}
|
|
782
|
+
/**
|
|
783
|
+
* @param {ExternalSecretSource} private_key
|
|
784
|
+
* @returns {Promise<PublicKeyBytes>}
|
|
785
|
+
*/
|
|
786
|
+
getPublicKeyFromSecretSource(private_key) {
|
|
787
|
+
const ret = wasm.defaultsigner_getPublicKeyFromSecretSource(this.__wbg_ptr, private_key);
|
|
772
788
|
return ret;
|
|
773
789
|
}
|
|
774
790
|
/**
|
|
@@ -800,14 +816,6 @@ export class DefaultSigner {
|
|
|
800
816
|
const ret = wasm.defaultsigner_splitSecretWithProofs(this.__wbg_ptr, secret, threshold, num_shares);
|
|
801
817
|
return ret;
|
|
802
818
|
}
|
|
803
|
-
/**
|
|
804
|
-
* @param {number} index
|
|
805
|
-
* @returns {Promise<PrivateKeyBytes>}
|
|
806
|
-
*/
|
|
807
|
-
getStaticDepositPrivateKey(index) {
|
|
808
|
-
const ret = wasm.defaultsigner_getStaticDepositPrivateKey(this.__wbg_ptr, index);
|
|
809
|
-
return ret;
|
|
810
|
-
}
|
|
811
819
|
/**
|
|
812
820
|
* @param {number} index
|
|
813
821
|
* @returns {Promise<PublicKeyBytes>}
|
|
@@ -817,7 +825,7 @@ export class DefaultSigner {
|
|
|
817
825
|
return ret;
|
|
818
826
|
}
|
|
819
827
|
/**
|
|
820
|
-
* @param {
|
|
828
|
+
* @param {ExternalEncryptedSecret} private_key
|
|
821
829
|
* @param {PublicKeyBytes} receiver_public_key
|
|
822
830
|
* @returns {Promise<Uint8Array>}
|
|
823
831
|
*/
|
|
@@ -825,27 +833,19 @@ export class DefaultSigner {
|
|
|
825
833
|
const ret = wasm.defaultsigner_encryptPrivateKeyForReceiver(this.__wbg_ptr, private_key, receiver_public_key);
|
|
826
834
|
return ret;
|
|
827
835
|
}
|
|
828
|
-
/**
|
|
829
|
-
* @returns {Promise<ExternalFrostCommitments>}
|
|
830
|
-
*/
|
|
831
|
-
generateFrostSigningCommitments() {
|
|
832
|
-
const ret = wasm.defaultsigner_generateFrostSigningCommitments(this.__wbg_ptr);
|
|
833
|
-
return ret;
|
|
834
|
-
}
|
|
835
836
|
/**
|
|
836
837
|
* @param {number} index
|
|
837
|
-
* @returns {Promise<
|
|
838
|
+
* @returns {Promise<ExternalSecretSource>}
|
|
838
839
|
*/
|
|
839
|
-
|
|
840
|
-
const ret = wasm.
|
|
840
|
+
getStaticDepositSecretSource(index) {
|
|
841
|
+
const ret = wasm.defaultsigner_getStaticDepositSecretSource(this.__wbg_ptr, index);
|
|
841
842
|
return ret;
|
|
842
843
|
}
|
|
843
844
|
/**
|
|
844
|
-
* @
|
|
845
|
-
* @returns {Promise<PublicKeyBytes>}
|
|
845
|
+
* @returns {Promise<ExternalFrostCommitments>}
|
|
846
846
|
*/
|
|
847
|
-
|
|
848
|
-
const ret = wasm.
|
|
847
|
+
generateFrostSigningCommitments() {
|
|
848
|
+
const ret = wasm.defaultsigner_generateFrostSigningCommitments(this.__wbg_ptr);
|
|
849
849
|
return ret;
|
|
850
850
|
}
|
|
851
851
|
}
|
|
@@ -1427,7 +1427,7 @@ function __wbg_get_imports() {
|
|
|
1427
1427
|
wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
|
|
1428
1428
|
}
|
|
1429
1429
|
}, arguments) };
|
|
1430
|
-
imports.wbg.
|
|
1430
|
+
imports.wbg.__wbg_encryptPrivateKeyForReceiver_346eec1080ebe04c = function() { return handleError(function (arg0, arg1, arg2) {
|
|
1431
1431
|
const ret = arg0.encryptPrivateKeyForReceiver(arg1, arg2);
|
|
1432
1432
|
return ret;
|
|
1433
1433
|
}, arguments) };
|
|
@@ -1525,8 +1525,8 @@ function __wbg_get_imports() {
|
|
|
1525
1525
|
const ret = arg0.getPublicKeyForNode(arg1);
|
|
1526
1526
|
return ret;
|
|
1527
1527
|
}, arguments) };
|
|
1528
|
-
imports.wbg.
|
|
1529
|
-
const ret = arg0.
|
|
1528
|
+
imports.wbg.__wbg_getPublicKeyFromSecretSource_9e324c0b205a9f99 = function() { return handleError(function (arg0, arg1) {
|
|
1529
|
+
const ret = arg0.getPublicKeyFromSecretSource(arg1);
|
|
1530
1530
|
return ret;
|
|
1531
1531
|
}, arguments) };
|
|
1532
1532
|
imports.wbg.__wbg_getRandomValues_b8f5dbd5f3995a9e = function() { return handleError(function (arg0, arg1) {
|
|
@@ -1551,11 +1551,7 @@ function __wbg_get_imports() {
|
|
|
1551
1551
|
wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
|
|
1552
1552
|
}
|
|
1553
1553
|
}, arguments) };
|
|
1554
|
-
imports.wbg.
|
|
1555
|
-
const ret = arg0.getStaticDepositPrivateKeySource(arg1 >>> 0);
|
|
1556
|
-
return ret;
|
|
1557
|
-
}, arguments) };
|
|
1558
|
-
imports.wbg.__wbg_getStaticDepositPrivateKey_a7a4ab43f45f0713 = function() { return handleError(function (arg0, arg1) {
|
|
1554
|
+
imports.wbg.__wbg_getStaticDepositPrivateKey_203e6f4eb4116ce0 = function() { return handleError(function (arg0, arg1) {
|
|
1559
1555
|
const ret = arg0.getStaticDepositPrivateKey(arg1 >>> 0);
|
|
1560
1556
|
return ret;
|
|
1561
1557
|
}, arguments) };
|
|
@@ -1563,6 +1559,10 @@ function __wbg_get_imports() {
|
|
|
1563
1559
|
const ret = arg0.getStaticDepositPublicKey(arg1 >>> 0);
|
|
1564
1560
|
return ret;
|
|
1565
1561
|
}, arguments) };
|
|
1562
|
+
imports.wbg.__wbg_getStaticDepositSecretSource_8e310c718339e400 = function() { return handleError(function (arg0, arg1) {
|
|
1563
|
+
const ret = arg0.getStaticDepositSecretSource(arg1 >>> 0);
|
|
1564
|
+
return ret;
|
|
1565
|
+
}, arguments) };
|
|
1566
1566
|
imports.wbg.__wbg_getTransactionHex_973b8d0555c60f99 = function() { return handleError(function (arg0, arg1, arg2) {
|
|
1567
1567
|
let deferred0_0;
|
|
1568
1568
|
let deferred0_1;
|
|
@@ -2087,7 +2087,7 @@ function __wbg_get_imports() {
|
|
|
2087
2087
|
const ret = arg0.subarray(arg1 >>> 0, arg2 >>> 0);
|
|
2088
2088
|
return ret;
|
|
2089
2089
|
};
|
|
2090
|
-
imports.wbg.
|
|
2090
|
+
imports.wbg.__wbg_subtractPrivateKeys_2d63747d9fa64d4f = function() { return handleError(function (arg0, arg1, arg2) {
|
|
2091
2091
|
const ret = arg0.subtractPrivateKeys(arg1, arg2);
|
|
2092
2092
|
return ret;
|
|
2093
2093
|
}, arguments) };
|
|
@@ -2223,7 +2223,7 @@ function __wbg_get_imports() {
|
|
|
2223
2223
|
const ret = false;
|
|
2224
2224
|
return ret;
|
|
2225
2225
|
};
|
|
2226
|
-
imports.wbg.
|
|
2226
|
+
imports.wbg.__wbindgen_closure_wrapper11277 = function(arg0, arg1, arg2) {
|
|
2227
2227
|
const ret = makeMutClosure(arg0, arg1, 817, __wbg_adapter_64);
|
|
2228
2228
|
return ret;
|
|
2229
2229
|
};
|
|
Binary file
|
|
@@ -53,10 +53,10 @@ export const defaultsigner_encryptPrivateKeyForReceiver: (a: number, b: any, c:
|
|
|
53
53
|
export const defaultsigner_generateFrostSigningCommitments: (a: number) => any;
|
|
54
54
|
export const defaultsigner_generateRandomKey: (a: number) => any;
|
|
55
55
|
export const defaultsigner_getPublicKeyForNode: (a: number, b: any) => any;
|
|
56
|
-
export const
|
|
56
|
+
export const defaultsigner_getPublicKeyFromSecretSource: (a: number, b: any) => any;
|
|
57
57
|
export const defaultsigner_getStaticDepositPrivateKey: (a: number, b: number) => any;
|
|
58
|
-
export const defaultsigner_getStaticDepositPrivateKeySource: (a: number, b: number) => any;
|
|
59
58
|
export const defaultsigner_getStaticDepositPublicKey: (a: number, b: number) => any;
|
|
59
|
+
export const defaultsigner_getStaticDepositSecretSource: (a: number, b: number) => any;
|
|
60
60
|
export const defaultsigner_hmacSha256: (a: number, b: number, c: number, d: number, e: number) => any;
|
|
61
61
|
export const defaultsigner_identityPublicKey: (a: number) => [number, number, number];
|
|
62
62
|
export const defaultsigner_signEcdsa: (a: number, b: any, c: number, d: number) => any;
|