@coinbase/cdp-core 0.0.0 → 0.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (106) hide show
  1. package/README.md +255 -0
  2. package/dist/esm/index.js +21 -0
  3. package/dist/esm/index10.js +119 -0
  4. package/dist/esm/index100.js +19 -0
  5. package/dist/esm/index101.js +83 -0
  6. package/dist/esm/index102.js +81 -0
  7. package/dist/esm/index11.js +8 -0
  8. package/dist/esm/index12.js +18 -0
  9. package/dist/esm/index13.js +174 -0
  10. package/dist/esm/index14.js +162 -0
  11. package/dist/esm/index15.js +50 -0
  12. package/dist/esm/index16.js +149 -0
  13. package/dist/esm/index17.js +58 -0
  14. package/dist/esm/index18.js +43 -0
  15. package/dist/esm/index19.js +19 -0
  16. package/dist/esm/index2.js +172 -0
  17. package/dist/esm/index20.js +7 -0
  18. package/dist/esm/index21.js +7 -0
  19. package/dist/esm/index22.js +11 -0
  20. package/dist/esm/index23.js +20 -0
  21. package/dist/esm/index24.js +48 -0
  22. package/dist/esm/index25.js +16 -0
  23. package/dist/esm/index26.js +58 -0
  24. package/dist/esm/index27.js +9 -0
  25. package/dist/esm/index28.js +24 -0
  26. package/dist/esm/index29.js +14 -0
  27. package/dist/esm/index3.js +109 -0
  28. package/dist/esm/index30.js +6 -0
  29. package/dist/esm/index31.js +6 -0
  30. package/dist/esm/index32.js +37 -0
  31. package/dist/esm/index33.js +15 -0
  32. package/dist/esm/index34.js +7 -0
  33. package/dist/esm/index35.js +31 -0
  34. package/dist/esm/index36.js +9 -0
  35. package/dist/esm/index37.js +27 -0
  36. package/dist/esm/index38.js +19 -0
  37. package/dist/esm/index39.js +57 -0
  38. package/dist/esm/index4.js +126 -0
  39. package/dist/esm/index40.js +26 -0
  40. package/dist/esm/index41.js +14 -0
  41. package/dist/esm/index42.js +30 -0
  42. package/dist/esm/index43.js +45 -0
  43. package/dist/esm/index44.js +58 -0
  44. package/dist/esm/index45.js +130 -0
  45. package/dist/esm/index46.js +15 -0
  46. package/dist/esm/index47.js +107 -0
  47. package/dist/esm/index48.js +9 -0
  48. package/dist/esm/index49.js +5 -0
  49. package/dist/esm/index5.js +194 -0
  50. package/dist/esm/index50.js +17 -0
  51. package/dist/esm/index51.js +45 -0
  52. package/dist/esm/index52.js +81 -0
  53. package/dist/esm/index53.js +4 -0
  54. package/dist/esm/index54.js +4 -0
  55. package/dist/esm/index55.js +15 -0
  56. package/dist/esm/index56.js +40 -0
  57. package/dist/esm/index57.js +9 -0
  58. package/dist/esm/index58.js +37 -0
  59. package/dist/esm/index59.js +11 -0
  60. package/dist/esm/index6.js +14 -0
  61. package/dist/esm/index60.js +13 -0
  62. package/dist/esm/index61.js +14 -0
  63. package/dist/esm/index62.js +16 -0
  64. package/dist/esm/index63.js +21 -0
  65. package/dist/esm/index64.js +8 -0
  66. package/dist/esm/index65.js +7 -0
  67. package/dist/esm/index66.js +13 -0
  68. package/dist/esm/index67.js +19 -0
  69. package/dist/esm/index68.js +25 -0
  70. package/dist/esm/index69.js +53 -0
  71. package/dist/esm/index7.js +14 -0
  72. package/dist/esm/index70.js +4 -0
  73. package/dist/esm/index71.js +23 -0
  74. package/dist/esm/index72.js +22 -0
  75. package/dist/esm/index73.js +82 -0
  76. package/dist/esm/index74.js +106 -0
  77. package/dist/esm/index75.js +35 -0
  78. package/dist/esm/index76.js +9 -0
  79. package/dist/esm/index77.js +12 -0
  80. package/dist/esm/index78.js +57 -0
  81. package/dist/esm/index79.js +13 -0
  82. package/dist/esm/index8.js +23 -0
  83. package/dist/esm/index80.js +4 -0
  84. package/dist/esm/index81.js +47 -0
  85. package/dist/esm/index82.js +16 -0
  86. package/dist/esm/index83.js +81 -0
  87. package/dist/esm/index84.js +7 -0
  88. package/dist/esm/index85.js +15 -0
  89. package/dist/esm/index86.js +38 -0
  90. package/dist/esm/index87.js +44 -0
  91. package/dist/esm/index88.js +23 -0
  92. package/dist/esm/index89.js +12 -0
  93. package/dist/esm/index9.js +17 -0
  94. package/dist/esm/index90.js +22 -0
  95. package/dist/esm/index91.js +96 -0
  96. package/dist/esm/index92.js +23 -0
  97. package/dist/esm/index93.js +120 -0
  98. package/dist/esm/index94.js +20 -0
  99. package/dist/esm/index95.js +30 -0
  100. package/dist/esm/index96.js +10 -0
  101. package/dist/esm/index97.js +13 -0
  102. package/dist/esm/index98.js +15 -0
  103. package/dist/esm/index99.js +12 -0
  104. package/dist/types/index.d.ts +287 -0
  105. package/package.json +69 -6
  106. package/index.js +0 -1
@@ -0,0 +1,44 @@
1
+ import { InvalidAddressError as a } from "./index55.js";
2
+ import { isAddress as f } from "./index29.js";
3
+ import { concatHex as p } from "./index30.js";
4
+ import { toHex as i } from "./index24.js";
5
+ import { toRlp as x } from "./index43.js";
6
+ import { serializeTransaction as l } from "./index13.js";
7
+ function T(r, e) {
8
+ return h(r) ? z(r) : l(r, e);
9
+ }
10
+ const E = {
11
+ transaction: T
12
+ };
13
+ function z(r) {
14
+ w(r);
15
+ const { sourceHash: e, data: o, from: m, gas: t, isSystemTx: u, mint: s, to: c, value: n } = r, d = [
16
+ e,
17
+ m,
18
+ c ?? "0x",
19
+ s ? i(s) : "0x",
20
+ n ? i(n) : "0x",
21
+ t ? i(t) : "0x",
22
+ u ? "0x1" : "0x",
23
+ o ?? "0x"
24
+ ];
25
+ return p([
26
+ "0x7e",
27
+ x(d)
28
+ ]);
29
+ }
30
+ function h(r) {
31
+ return r.type === "deposit" || typeof r.sourceHash < "u";
32
+ }
33
+ function w(r) {
34
+ const { from: e, to: o } = r;
35
+ if (e && !f(e))
36
+ throw new a({ address: e });
37
+ if (o && !f(o))
38
+ throw new a({ address: o });
39
+ }
40
+ export {
41
+ w as assertTransactionDeposit,
42
+ T as serializeTransaction,
43
+ E as serializers
44
+ };
@@ -0,0 +1,23 @@
1
+ import { encoder as t, decoder as o } from "./index79.js";
2
+ import { encodeBase64 as c, decodeBase64 as a } from "./index94.js";
3
+ function i(r) {
4
+ if (Uint8Array.fromBase64)
5
+ return Uint8Array.fromBase64(typeof r == "string" ? r : o.decode(r), {
6
+ alphabet: "base64url"
7
+ });
8
+ let e = r;
9
+ e instanceof Uint8Array && (e = o.decode(e)), e = e.replace(/-/g, "+").replace(/_/g, "/").replace(/\s/g, "");
10
+ try {
11
+ return a(e);
12
+ } catch {
13
+ throw new TypeError("The input to be decoded is not correctly encoded.");
14
+ }
15
+ }
16
+ function p(r) {
17
+ let e = r;
18
+ return typeof e == "string" && (e = t.encode(e)), Uint8Array.prototype.toBase64 ? e.toBase64({ alphabet: "base64url", omitPadding: !0 }) : c(e).replace(/=/g, "").replace(/\+/g, "-").replace(/\//g, "_");
19
+ }
20
+ export {
21
+ i as decode,
22
+ p as encode
23
+ };
@@ -0,0 +1,12 @@
1
+ import n from "./index95.js";
2
+ import s from "./index96.js";
3
+ import a from "./index97.js";
4
+ const y = async (t, o, e) => {
5
+ const r = await a(t, o, "sign");
6
+ s(t, r);
7
+ const i = await crypto.subtle.sign(n(t, r.algorithm), r, e);
8
+ return new Uint8Array(i);
9
+ };
10
+ export {
11
+ y as default
12
+ };
@@ -0,0 +1,17 @@
1
+ async function a(e, n) {
2
+ try {
3
+ const r = new Uint8Array(Array.from(atob(n), (t) => t.charCodeAt(0))), o = await window.crypto.subtle.decrypt(
4
+ {
5
+ name: "RSA-OAEP"
6
+ },
7
+ e,
8
+ r
9
+ );
10
+ return Array.from(new Uint8Array(o)).map((t) => t.toString(16).padStart(2, "0")).join("");
11
+ } catch (r) {
12
+ throw new Error(`Decryption failed: ${String(r)}`);
13
+ }
14
+ }
15
+ export {
16
+ a as decryptWithPrivateKey
17
+ };
@@ -0,0 +1,22 @@
1
+ const a = (...o) => {
2
+ const t = o.filter(Boolean);
3
+ if (t.length === 0 || t.length === 1)
4
+ return !0;
5
+ let e;
6
+ for (const s of t) {
7
+ const r = Object.keys(s);
8
+ if (!e || e.size === 0) {
9
+ e = new Set(r);
10
+ continue;
11
+ }
12
+ for (const n of r) {
13
+ if (e.has(n))
14
+ return !1;
15
+ e.add(n);
16
+ }
17
+ }
18
+ return !0;
19
+ };
20
+ export {
21
+ a as default
22
+ };
@@ -0,0 +1,96 @@
1
+ import { withAlg as n } from "./index98.js";
2
+ import c from "./index99.js";
3
+ import { isJWK as p, isSecretJWK as a, isPublicJWK as y, isPrivateJWK as f } from "./index100.js";
4
+ const s = (r) => r?.[Symbol.toStringTag], o = (r, e, t) => {
5
+ if (e.use !== void 0) {
6
+ let i;
7
+ switch (t) {
8
+ case "sign":
9
+ case "verify":
10
+ i = "sig";
11
+ break;
12
+ case "encrypt":
13
+ case "decrypt":
14
+ i = "enc";
15
+ break;
16
+ }
17
+ if (e.use !== i)
18
+ throw new TypeError(`Invalid key for this operation, its "use" must be "${i}" when present`);
19
+ }
20
+ if (e.alg !== void 0 && e.alg !== r)
21
+ throw new TypeError(`Invalid key for this operation, its "alg" must be "${r}" when present`);
22
+ if (Array.isArray(e.key_ops)) {
23
+ let i;
24
+ switch (!0) {
25
+ case t === "sign":
26
+ case r === "dir":
27
+ case r.includes("CBC-HS"):
28
+ i = t;
29
+ break;
30
+ case r.startsWith("PBES2"):
31
+ i = "deriveBits";
32
+ break;
33
+ case /^A\d{3}(?:GCM)?(?:KW)?$/.test(r):
34
+ !r.includes("GCM") && r.endsWith("KW") ? i = "unwrapKey" : i = t;
35
+ break;
36
+ case t === "encrypt":
37
+ i = "wrapKey";
38
+ break;
39
+ case t === "decrypt":
40
+ i = r.startsWith("RSA") ? "unwrapKey" : "deriveBits";
41
+ break;
42
+ }
43
+ if (i && e.key_ops?.includes?.(i) === !1)
44
+ throw new TypeError(`Invalid key for this operation, its "key_ops" must include "${i}" when present`);
45
+ }
46
+ return !0;
47
+ }, h = (r, e, t) => {
48
+ if (!(e instanceof Uint8Array)) {
49
+ if (p(e)) {
50
+ if (a(e) && o(r, e, t))
51
+ return;
52
+ throw new TypeError('JSON Web Key for symmetric algorithms must have JWK "kty" (Key Type) equal to "oct" and the JWK "k" (Key Value) present');
53
+ }
54
+ if (!c(e))
55
+ throw new TypeError(n(r, e, "CryptoKey", "KeyObject", "JSON Web Key", "Uint8Array"));
56
+ if (e.type !== "secret")
57
+ throw new TypeError(`${s(e)} instances for symmetric algorithms must be of type "secret"`);
58
+ }
59
+ }, m = (r, e, t) => {
60
+ if (p(e))
61
+ switch (t) {
62
+ case "decrypt":
63
+ case "sign":
64
+ if (f(e) && o(r, e, t))
65
+ return;
66
+ throw new TypeError("JSON Web Key for this operation be a private JWK");
67
+ case "encrypt":
68
+ case "verify":
69
+ if (y(e) && o(r, e, t))
70
+ return;
71
+ throw new TypeError("JSON Web Key for this operation be a public JWK");
72
+ }
73
+ if (!c(e))
74
+ throw new TypeError(n(r, e, "CryptoKey", "KeyObject", "JSON Web Key"));
75
+ if (e.type === "secret")
76
+ throw new TypeError(`${s(e)} instances for asymmetric algorithms must not be of type "secret"`);
77
+ if (e.type === "public")
78
+ switch (t) {
79
+ case "sign":
80
+ throw new TypeError(`${s(e)} instances for asymmetric algorithm signing must be of type "private"`);
81
+ case "decrypt":
82
+ throw new TypeError(`${s(e)} instances for asymmetric algorithm decryption must be of type "private"`);
83
+ }
84
+ if (e.type === "private")
85
+ switch (t) {
86
+ case "verify":
87
+ throw new TypeError(`${s(e)} instances for asymmetric algorithm verifying must be of type "public"`);
88
+ case "encrypt":
89
+ throw new TypeError(`${s(e)} instances for asymmetric algorithm encryption must be of type "public"`);
90
+ }
91
+ }, d = (r, e, t) => {
92
+ r.startsWith("HS") || r === "dir" || r.startsWith("PBES2") || /^A(?:128|192|256)(?:GCM)?(?:KW)?$/.test(r) || /^A(?:128|192|256)CBC-HS(?:256|384|512)$/.test(r) ? h(r, e, t) : m(r, e, t);
93
+ };
94
+ export {
95
+ d as default
96
+ };
@@ -0,0 +1,23 @@
1
+ import { JOSENotSupported as f } from "./index68.js";
2
+ const w = (n, r, a, e, s) => {
3
+ if (s.crit !== void 0 && e?.crit === void 0)
4
+ throw new n('"crit" (Critical) Header Parameter MUST be integrity protected');
5
+ if (!e || e.crit === void 0)
6
+ return /* @__PURE__ */ new Set();
7
+ if (!Array.isArray(e.crit) || e.crit.length === 0 || e.crit.some((i) => typeof i != "string" || i.length === 0))
8
+ throw new n('"crit" (Critical) Header Parameter MUST be an array of non-empty strings when present');
9
+ let t;
10
+ a !== void 0 ? t = new Map([...Object.entries(a), ...r.entries()]) : t = r;
11
+ for (const i of e.crit) {
12
+ if (!t.has(i))
13
+ throw new f(`Extension Header Parameter "${i}" is not recognized`);
14
+ if (s[i] === void 0)
15
+ throw new n(`Extension Header Parameter "${i}" is missing`);
16
+ if (t.get(i) && e[i] === void 0)
17
+ throw new n(`Extension Header Parameter "${i}" MUST be integrity protected`);
18
+ }
19
+ return new Set(e.crit);
20
+ };
21
+ export {
22
+ w as default
23
+ };
@@ -0,0 +1,120 @@
1
+ import { isJWK as p } from "./index100.js";
2
+ import { decode as m } from "./index88.js";
3
+ import y from "./index101.js";
4
+ import { isCryptoKey as S, isKeyObject as K } from "./index99.js";
5
+ let c;
6
+ const f = async (e, r, s, i = !1) => {
7
+ c ||= /* @__PURE__ */ new WeakMap();
8
+ let n = c.get(e);
9
+ if (n?.[s])
10
+ return n[s];
11
+ const t = await y({ ...r, alg: s });
12
+ return i && Object.freeze(e), n ? n[s] = t : c.set(e, { [s]: t }), t;
13
+ }, E = (e, r) => {
14
+ c ||= /* @__PURE__ */ new WeakMap();
15
+ let s = c.get(e);
16
+ if (s?.[r])
17
+ return s[r];
18
+ const i = e.type === "public", n = !!i;
19
+ let t;
20
+ if (e.asymmetricKeyType === "x25519") {
21
+ switch (r) {
22
+ case "ECDH-ES":
23
+ case "ECDH-ES+A128KW":
24
+ case "ECDH-ES+A192KW":
25
+ case "ECDH-ES+A256KW":
26
+ break;
27
+ default:
28
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
29
+ }
30
+ t = e.toCryptoKey(e.asymmetricKeyType, n, i ? [] : ["deriveBits"]);
31
+ }
32
+ if (e.asymmetricKeyType === "ed25519") {
33
+ if (r !== "EdDSA" && r !== "Ed25519")
34
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
35
+ t = e.toCryptoKey(e.asymmetricKeyType, n, [
36
+ i ? "verify" : "sign"
37
+ ]);
38
+ }
39
+ if (e.asymmetricKeyType === "rsa") {
40
+ let a;
41
+ switch (r) {
42
+ case "RSA-OAEP":
43
+ a = "SHA-1";
44
+ break;
45
+ case "RS256":
46
+ case "PS256":
47
+ case "RSA-OAEP-256":
48
+ a = "SHA-256";
49
+ break;
50
+ case "RS384":
51
+ case "PS384":
52
+ case "RSA-OAEP-384":
53
+ a = "SHA-384";
54
+ break;
55
+ case "RS512":
56
+ case "PS512":
57
+ case "RSA-OAEP-512":
58
+ a = "SHA-512";
59
+ break;
60
+ default:
61
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
62
+ }
63
+ if (r.startsWith("RSA-OAEP"))
64
+ return e.toCryptoKey({
65
+ name: "RSA-OAEP",
66
+ hash: a
67
+ }, n, i ? ["encrypt"] : ["decrypt"]);
68
+ t = e.toCryptoKey({
69
+ name: r.startsWith("PS") ? "RSA-PSS" : "RSASSA-PKCS1-v1_5",
70
+ hash: a
71
+ }, n, [i ? "verify" : "sign"]);
72
+ }
73
+ if (e.asymmetricKeyType === "ec") {
74
+ const o = (/* @__PURE__ */ new Map([
75
+ ["prime256v1", "P-256"],
76
+ ["secp384r1", "P-384"],
77
+ ["secp521r1", "P-521"]
78
+ ])).get(e.asymmetricKeyDetails?.namedCurve);
79
+ if (!o)
80
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
81
+ r === "ES256" && o === "P-256" && (t = e.toCryptoKey({
82
+ name: "ECDSA",
83
+ namedCurve: o
84
+ }, n, [i ? "verify" : "sign"])), r === "ES384" && o === "P-384" && (t = e.toCryptoKey({
85
+ name: "ECDSA",
86
+ namedCurve: o
87
+ }, n, [i ? "verify" : "sign"])), r === "ES512" && o === "P-521" && (t = e.toCryptoKey({
88
+ name: "ECDSA",
89
+ namedCurve: o
90
+ }, n, [i ? "verify" : "sign"])), r.startsWith("ECDH-ES") && (t = e.toCryptoKey({
91
+ name: "ECDH",
92
+ namedCurve: o
93
+ }, n, i ? [] : ["deriveBits"]));
94
+ }
95
+ if (!t)
96
+ throw new TypeError("given KeyObject instance cannot be used for this algorithm");
97
+ return s ? s[r] = t : c.set(e, { [r]: t }), t;
98
+ }, d = async (e, r) => {
99
+ if (e instanceof Uint8Array || S(e))
100
+ return e;
101
+ if (K(e)) {
102
+ if (e.type === "secret")
103
+ return e.export();
104
+ if ("toCryptoKey" in e && typeof e.toCryptoKey == "function")
105
+ try {
106
+ return E(e, r);
107
+ } catch (i) {
108
+ if (i instanceof TypeError)
109
+ throw i;
110
+ }
111
+ let s = e.export({ format: "jwk" });
112
+ return f(e, s, r);
113
+ }
114
+ if (p(e))
115
+ return e.k ? m(e.k) : f(e, e, r, !0);
116
+ throw new Error("unreachable");
117
+ };
118
+ export {
119
+ d as default
120
+ };
@@ -0,0 +1,20 @@
1
+ function o(t) {
2
+ if (Uint8Array.prototype.toBase64)
3
+ return t.toBase64();
4
+ const e = 32768, n = [];
5
+ for (let r = 0; r < t.length; r += e)
6
+ n.push(String.fromCharCode.apply(null, t.subarray(r, r + e)));
7
+ return btoa(n.join(""));
8
+ }
9
+ function a(t) {
10
+ if (Uint8Array.fromBase64)
11
+ return Uint8Array.fromBase64(t);
12
+ const e = atob(t), n = new Uint8Array(e.length);
13
+ for (let r = 0; r < e.length; r++)
14
+ n[r] = e.charCodeAt(r);
15
+ return n;
16
+ }
17
+ export {
18
+ a as decodeBase64,
19
+ o as encodeBase64
20
+ };
@@ -0,0 +1,30 @@
1
+ import { JOSENotSupported as r } from "./index68.js";
2
+ const S = (e, s) => {
3
+ const a = `SHA-${e.slice(-3)}`;
4
+ switch (e) {
5
+ case "HS256":
6
+ case "HS384":
7
+ case "HS512":
8
+ return { hash: a, name: "HMAC" };
9
+ case "PS256":
10
+ case "PS384":
11
+ case "PS512":
12
+ return { hash: a, name: "RSA-PSS", saltLength: parseInt(e.slice(-3), 10) >> 3 };
13
+ case "RS256":
14
+ case "RS384":
15
+ case "RS512":
16
+ return { hash: a, name: "RSASSA-PKCS1-v1_5" };
17
+ case "ES256":
18
+ case "ES384":
19
+ case "ES512":
20
+ return { hash: a, name: "ECDSA", namedCurve: s.namedCurve };
21
+ case "Ed25519":
22
+ case "EdDSA":
23
+ return { name: "Ed25519" };
24
+ default:
25
+ throw new r(`alg ${e} is not supported either by JOSE or your javascript runtime`);
26
+ }
27
+ };
28
+ export {
29
+ S as default
30
+ };
@@ -0,0 +1,10 @@
1
+ const o = (t, r) => {
2
+ if (t.startsWith("RS") || t.startsWith("PS")) {
3
+ const { modulusLength: e } = r.algorithm;
4
+ if (typeof e != "number" || e < 2048)
5
+ throw new TypeError(`${t} requires key modulusLength to be 2048 bits or larger`);
6
+ }
7
+ };
8
+ export {
9
+ o as default
10
+ };
@@ -0,0 +1,13 @@
1
+ import { checkSigCryptoKey as i } from "./index102.js";
2
+ import o from "./index98.js";
3
+ const s = async (t, r, e) => {
4
+ if (r instanceof Uint8Array) {
5
+ if (!t.startsWith("HS"))
6
+ throw new TypeError(o(r, "CryptoKey", "KeyObject", "JSON Web Key"));
7
+ return crypto.subtle.importKey("raw", r, { hash: `SHA-${t.slice(-3)}`, name: "HMAC" }, !1, [e]);
8
+ }
9
+ return i(r, t, e), r;
10
+ };
11
+ export {
12
+ s as default
13
+ };
@@ -0,0 +1,15 @@
1
+ function i(n, e, ...o) {
2
+ if (o = o.filter(Boolean), o.length > 2) {
3
+ const f = o.pop();
4
+ n += `one of type ${o.join(", ")}, or ${f}.`;
5
+ } else o.length === 2 ? n += `one of type ${o[0]} or ${o[1]}.` : n += `of type ${o[0]}.`;
6
+ return e == null ? n += ` Received ${e}` : typeof e == "function" && e.name ? n += ` Received function ${e.name}` : typeof e == "object" && e != null && e.constructor?.name && (n += ` Received an instance of ${e.constructor.name}`), n;
7
+ }
8
+ const r = (n, ...e) => i("Key must be ", n, ...e);
9
+ function t(n, e, ...o) {
10
+ return i(`Key for the ${n} algorithm must be `, e, ...o);
11
+ }
12
+ export {
13
+ r as default,
14
+ t as withAlg
15
+ };
@@ -0,0 +1,12 @@
1
+ function e(t) {
2
+ return t?.[Symbol.toStringTag] === "CryptoKey";
3
+ }
4
+ function r(t) {
5
+ return t?.[Symbol.toStringTag] === "KeyObject";
6
+ }
7
+ const n = (t) => e(t) || r(t);
8
+ export {
9
+ n as default,
10
+ e as isCryptoKey,
11
+ r as isKeyObject
12
+ };