@coinbase/cdp-core 0.0.9 → 0.0.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (95) hide show
  1. package/dist/esm/index100.js +7 -14
  2. package/dist/esm/index101.js +16 -80
  3. package/dist/esm/index102.js +72 -70
  4. package/dist/esm/index103.js +81 -0
  5. package/dist/esm/index13.js +18 -172
  6. package/dist/esm/index14.js +170 -39
  7. package/dist/esm/index15.js +40 -16
  8. package/dist/esm/index16.js +16 -4
  9. package/dist/esm/index17.js +5 -5
  10. package/dist/esm/index18.js +5 -160
  11. package/dist/esm/index19.js +157 -45
  12. package/dist/esm/index2.js +72 -68
  13. package/dist/esm/index20.js +44 -142
  14. package/dist/esm/index21.js +144 -54
  15. package/dist/esm/index22.js +56 -9
  16. package/dist/esm/index23.js +8 -17
  17. package/dist/esm/index24.js +16 -44
  18. package/dist/esm/index25.js +45 -13
  19. package/dist/esm/index26.js +13 -55
  20. package/dist/esm/index27.js +55 -6
  21. package/dist/esm/index28.js +6 -21
  22. package/dist/esm/index29.js +21 -11
  23. package/dist/esm/index3.js +4 -4
  24. package/dist/esm/index30.js +11 -3
  25. package/dist/esm/index31.js +3 -3
  26. package/dist/esm/index32.js +3 -34
  27. package/dist/esm/index33.js +32 -10
  28. package/dist/esm/index34.js +12 -4
  29. package/dist/esm/index35.js +4 -28
  30. package/dist/esm/index36.js +28 -6
  31. package/dist/esm/index37.js +6 -24
  32. package/dist/esm/index38.js +24 -16
  33. package/dist/esm/index39.js +16 -54
  34. package/dist/esm/index40.js +53 -22
  35. package/dist/esm/index41.js +23 -11
  36. package/dist/esm/index42.js +10 -26
  37. package/dist/esm/index43.js +26 -41
  38. package/dist/esm/index44.js +41 -54
  39. package/dist/esm/index45.js +54 -126
  40. package/dist/esm/index46.js +126 -11
  41. package/dist/esm/index47.js +9 -101
  42. package/dist/esm/index48.js +104 -6
  43. package/dist/esm/index49.js +7 -3
  44. package/dist/esm/index5.js +4 -4
  45. package/dist/esm/index50.js +3 -15
  46. package/dist/esm/index51.js +14 -42
  47. package/dist/esm/index52.js +38 -74
  48. package/dist/esm/index53.js +79 -2
  49. package/dist/esm/index54.js +2 -2
  50. package/dist/esm/index55.js +2 -13
  51. package/dist/esm/index56.js +8 -33
  52. package/dist/esm/index57.js +36 -5
  53. package/dist/esm/index58.js +5 -33
  54. package/dist/esm/index59.js +34 -8
  55. package/dist/esm/index60.js +8 -10
  56. package/dist/esm/index61.js +10 -11
  57. package/dist/esm/index62.js +11 -13
  58. package/dist/esm/index63.js +13 -18
  59. package/dist/esm/index64.js +18 -5
  60. package/dist/esm/index65.js +6 -5
  61. package/dist/esm/index66.js +5 -11
  62. package/dist/esm/index67.js +11 -2
  63. package/dist/esm/index68.js +13 -17
  64. package/dist/esm/index69.js +21 -15
  65. package/dist/esm/index70.js +49 -21
  66. package/dist/esm/index71.js +2 -51
  67. package/dist/esm/index72.js +18 -17
  68. package/dist/esm/index73.js +20 -80
  69. package/dist/esm/index74.js +79 -103
  70. package/dist/esm/index75.js +101 -30
  71. package/dist/esm/index76.js +32 -6
  72. package/dist/esm/index77.js +6 -54
  73. package/dist/esm/index78.js +54 -10
  74. package/dist/esm/index79.js +11 -2
  75. package/dist/esm/index80.js +2 -45
  76. package/dist/esm/index81.js +44 -13
  77. package/dist/esm/index82.js +13 -9
  78. package/dist/esm/index83.js +10 -79
  79. package/dist/esm/index84.js +79 -5
  80. package/dist/esm/index85.js +5 -21
  81. package/dist/esm/index86.js +21 -10
  82. package/dist/esm/index87.js +9 -19
  83. package/dist/esm/index88.js +15 -89
  84. package/dist/esm/index89.js +92 -19
  85. package/dist/esm/index90.js +18 -115
  86. package/dist/esm/index91.js +116 -11
  87. package/dist/esm/index92.js +12 -35
  88. package/dist/esm/index93.js +35 -41
  89. package/dist/esm/index94.js +40 -16
  90. package/dist/esm/index95.js +18 -28
  91. package/dist/esm/index96.js +26 -6
  92. package/dist/esm/index97.js +6 -9
  93. package/dist/esm/index98.js +11 -13
  94. package/dist/esm/index99.js +11 -8
  95. package/package.json +3 -3
@@ -1,19 +1,12 @@
1
- import n from "./index81.js";
2
- function r(t) {
3
- return n(t) && typeof t.kty == "string";
4
- }
5
- function o(t) {
6
- return t.kty !== "oct" && typeof t.d == "string";
7
- }
8
1
  function e(t) {
9
- return t.kty !== "oct" && typeof t.d > "u";
2
+ return t?.[Symbol.toStringTag] === "CryptoKey";
10
3
  }
11
- function c(t) {
12
- return t.kty === "oct" && typeof t.k == "string";
4
+ function r(t) {
5
+ return t?.[Symbol.toStringTag] === "KeyObject";
13
6
  }
7
+ const n = (t) => e(t) || r(t);
14
8
  export {
15
- r as isJWK,
16
- o as isPrivateJWK,
17
- e as isPublicJWK,
18
- c as isSecretJWK
9
+ n as default,
10
+ e as isCryptoKey,
11
+ r as isKeyObject
19
12
  };
@@ -1,83 +1,19 @@
1
- import { JOSENotSupported as s } from "./index70.js";
2
- function n(e) {
3
- let a, r;
4
- switch (e.kty) {
5
- case "RSA": {
6
- switch (e.alg) {
7
- case "PS256":
8
- case "PS384":
9
- case "PS512":
10
- a = { name: "RSA-PSS", hash: `SHA-${e.alg.slice(-3)}` }, r = e.d ? ["sign"] : ["verify"];
11
- break;
12
- case "RS256":
13
- case "RS384":
14
- case "RS512":
15
- a = { name: "RSASSA-PKCS1-v1_5", hash: `SHA-${e.alg.slice(-3)}` }, r = e.d ? ["sign"] : ["verify"];
16
- break;
17
- case "RSA-OAEP":
18
- case "RSA-OAEP-256":
19
- case "RSA-OAEP-384":
20
- case "RSA-OAEP-512":
21
- a = {
22
- name: "RSA-OAEP",
23
- hash: `SHA-${parseInt(e.alg.slice(-3), 10) || 1}`
24
- }, r = e.d ? ["decrypt", "unwrapKey"] : ["encrypt", "wrapKey"];
25
- break;
26
- default:
27
- throw new s('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
28
- }
29
- break;
30
- }
31
- case "EC": {
32
- switch (e.alg) {
33
- case "ES256":
34
- a = { name: "ECDSA", namedCurve: "P-256" }, r = e.d ? ["sign"] : ["verify"];
35
- break;
36
- case "ES384":
37
- a = { name: "ECDSA", namedCurve: "P-384" }, r = e.d ? ["sign"] : ["verify"];
38
- break;
39
- case "ES512":
40
- a = { name: "ECDSA", namedCurve: "P-521" }, r = e.d ? ["sign"] : ["verify"];
41
- break;
42
- case "ECDH-ES":
43
- case "ECDH-ES+A128KW":
44
- case "ECDH-ES+A192KW":
45
- case "ECDH-ES+A256KW":
46
- a = { name: "ECDH", namedCurve: e.crv }, r = e.d ? ["deriveBits"] : [];
47
- break;
48
- default:
49
- throw new s('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
50
- }
51
- break;
52
- }
53
- case "OKP": {
54
- switch (e.alg) {
55
- case "Ed25519":
56
- case "EdDSA":
57
- a = { name: "Ed25519" }, r = e.d ? ["sign"] : ["verify"];
58
- break;
59
- case "ECDH-ES":
60
- case "ECDH-ES+A128KW":
61
- case "ECDH-ES+A192KW":
62
- case "ECDH-ES+A256KW":
63
- a = { name: e.crv }, r = e.d ? ["deriveBits"] : [];
64
- break;
65
- default:
66
- throw new s('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
67
- }
68
- break;
69
- }
70
- default:
71
- throw new s('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
72
- }
73
- return { algorithm: a, keyUsages: r };
1
+ import n from "./index82.js";
2
+ function r(t) {
3
+ return n(t) && typeof t.kty == "string";
4
+ }
5
+ function o(t) {
6
+ return t.kty !== "oct" && typeof t.d == "string";
7
+ }
8
+ function e(t) {
9
+ return t.kty !== "oct" && typeof t.d > "u";
10
+ }
11
+ function c(t) {
12
+ return t.kty === "oct" && typeof t.k == "string";
74
13
  }
75
- const i = async (e) => {
76
- if (!e.alg)
77
- throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
78
- const { algorithm: a, keyUsages: r } = n(e), t = { ...e };
79
- return delete t.alg, delete t.use, crypto.subtle.importKey("jwk", t, a, e.ext ?? !e.d, e.key_ops ?? r);
80
- };
81
14
  export {
82
- i as default
15
+ r as isJWK,
16
+ o as isPrivateJWK,
17
+ e as isPublicJWK,
18
+ c as isSecretJWK
83
19
  };
@@ -1,81 +1,83 @@
1
- function r(t, e = "algorithm.name") {
2
- return new TypeError(`CryptoKey does not support this operation, its ${e} must be ${t}`);
3
- }
4
- function o(t, e) {
5
- return t.name === e;
6
- }
7
- function c(t) {
8
- return parseInt(t.name.slice(4), 10);
9
- }
10
- function h(t) {
11
- switch (t) {
12
- case "ES256":
13
- return "P-256";
14
- case "ES384":
15
- return "P-384";
16
- case "ES512":
17
- return "P-521";
18
- default:
19
- throw new Error("unreachable");
20
- }
21
- }
22
- function i(t, e) {
23
- if (!t.usages.includes(e))
24
- throw new TypeError(`CryptoKey does not support this operation, its usages must include ${e}.`);
25
- }
26
- function u(t, e, n) {
27
- switch (e) {
28
- case "HS256":
29
- case "HS384":
30
- case "HS512": {
31
- if (!o(t.algorithm, "HMAC"))
32
- throw r("HMAC");
33
- const a = parseInt(e.slice(2), 10);
34
- if (c(t.algorithm.hash) !== a)
35
- throw r(`SHA-${a}`, "algorithm.hash");
36
- break;
37
- }
38
- case "RS256":
39
- case "RS384":
40
- case "RS512": {
41
- if (!o(t.algorithm, "RSASSA-PKCS1-v1_5"))
42
- throw r("RSASSA-PKCS1-v1_5");
43
- const a = parseInt(e.slice(2), 10);
44
- if (c(t.algorithm.hash) !== a)
45
- throw r(`SHA-${a}`, "algorithm.hash");
1
+ import { JOSENotSupported as s } from "./index69.js";
2
+ function n(e) {
3
+ let a, r;
4
+ switch (e.kty) {
5
+ case "RSA": {
6
+ switch (e.alg) {
7
+ case "PS256":
8
+ case "PS384":
9
+ case "PS512":
10
+ a = { name: "RSA-PSS", hash: `SHA-${e.alg.slice(-3)}` }, r = e.d ? ["sign"] : ["verify"];
11
+ break;
12
+ case "RS256":
13
+ case "RS384":
14
+ case "RS512":
15
+ a = { name: "RSASSA-PKCS1-v1_5", hash: `SHA-${e.alg.slice(-3)}` }, r = e.d ? ["sign"] : ["verify"];
16
+ break;
17
+ case "RSA-OAEP":
18
+ case "RSA-OAEP-256":
19
+ case "RSA-OAEP-384":
20
+ case "RSA-OAEP-512":
21
+ a = {
22
+ name: "RSA-OAEP",
23
+ hash: `SHA-${parseInt(e.alg.slice(-3), 10) || 1}`
24
+ }, r = e.d ? ["decrypt", "unwrapKey"] : ["encrypt", "wrapKey"];
25
+ break;
26
+ default:
27
+ throw new s('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
28
+ }
46
29
  break;
47
30
  }
48
- case "PS256":
49
- case "PS384":
50
- case "PS512": {
51
- if (!o(t.algorithm, "RSA-PSS"))
52
- throw r("RSA-PSS");
53
- const a = parseInt(e.slice(2), 10);
54
- if (c(t.algorithm.hash) !== a)
55
- throw r(`SHA-${a}`, "algorithm.hash");
31
+ case "EC": {
32
+ switch (e.alg) {
33
+ case "ES256":
34
+ a = { name: "ECDSA", namedCurve: "P-256" }, r = e.d ? ["sign"] : ["verify"];
35
+ break;
36
+ case "ES384":
37
+ a = { name: "ECDSA", namedCurve: "P-384" }, r = e.d ? ["sign"] : ["verify"];
38
+ break;
39
+ case "ES512":
40
+ a = { name: "ECDSA", namedCurve: "P-521" }, r = e.d ? ["sign"] : ["verify"];
41
+ break;
42
+ case "ECDH-ES":
43
+ case "ECDH-ES+A128KW":
44
+ case "ECDH-ES+A192KW":
45
+ case "ECDH-ES+A256KW":
46
+ a = { name: "ECDH", namedCurve: e.crv }, r = e.d ? ["deriveBits"] : [];
47
+ break;
48
+ default:
49
+ throw new s('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
50
+ }
56
51
  break;
57
52
  }
58
- case "Ed25519":
59
- case "EdDSA": {
60
- if (!o(t.algorithm, "Ed25519"))
61
- throw r("Ed25519");
62
- break;
63
- }
64
- case "ES256":
65
- case "ES384":
66
- case "ES512": {
67
- if (!o(t.algorithm, "ECDSA"))
68
- throw r("ECDSA");
69
- const a = h(e);
70
- if (t.algorithm.namedCurve !== a)
71
- throw r(a, "algorithm.namedCurve");
53
+ case "OKP": {
54
+ switch (e.alg) {
55
+ case "Ed25519":
56
+ case "EdDSA":
57
+ a = { name: "Ed25519" }, r = e.d ? ["sign"] : ["verify"];
58
+ break;
59
+ case "ECDH-ES":
60
+ case "ECDH-ES+A128KW":
61
+ case "ECDH-ES+A192KW":
62
+ case "ECDH-ES+A256KW":
63
+ a = { name: e.crv }, r = e.d ? ["deriveBits"] : [];
64
+ break;
65
+ default:
66
+ throw new s('Invalid or unsupported JWK "alg" (Algorithm) Parameter value');
67
+ }
72
68
  break;
73
69
  }
74
70
  default:
75
- throw new TypeError("CryptoKey does not support this operation");
71
+ throw new s('Invalid or unsupported JWK "kty" (Key Type) Parameter value');
76
72
  }
77
- i(t, n);
73
+ return { algorithm: a, keyUsages: r };
78
74
  }
75
+ const i = async (e) => {
76
+ if (!e.alg)
77
+ throw new TypeError('"alg" argument is required when "jwk.alg" is not present');
78
+ const { algorithm: a, keyUsages: r } = n(e), t = { ...e };
79
+ return delete t.alg, delete t.use, crypto.subtle.importKey("jwk", t, a, e.ext ?? !e.d, e.key_ops ?? r);
80
+ };
79
81
  export {
80
- u as checkSigCryptoKey
82
+ i as default
81
83
  };
@@ -0,0 +1,81 @@
1
+ function r(t, e = "algorithm.name") {
2
+ return new TypeError(`CryptoKey does not support this operation, its ${e} must be ${t}`);
3
+ }
4
+ function o(t, e) {
5
+ return t.name === e;
6
+ }
7
+ function c(t) {
8
+ return parseInt(t.name.slice(4), 10);
9
+ }
10
+ function h(t) {
11
+ switch (t) {
12
+ case "ES256":
13
+ return "P-256";
14
+ case "ES384":
15
+ return "P-384";
16
+ case "ES512":
17
+ return "P-521";
18
+ default:
19
+ throw new Error("unreachable");
20
+ }
21
+ }
22
+ function i(t, e) {
23
+ if (!t.usages.includes(e))
24
+ throw new TypeError(`CryptoKey does not support this operation, its usages must include ${e}.`);
25
+ }
26
+ function u(t, e, n) {
27
+ switch (e) {
28
+ case "HS256":
29
+ case "HS384":
30
+ case "HS512": {
31
+ if (!o(t.algorithm, "HMAC"))
32
+ throw r("HMAC");
33
+ const a = parseInt(e.slice(2), 10);
34
+ if (c(t.algorithm.hash) !== a)
35
+ throw r(`SHA-${a}`, "algorithm.hash");
36
+ break;
37
+ }
38
+ case "RS256":
39
+ case "RS384":
40
+ case "RS512": {
41
+ if (!o(t.algorithm, "RSASSA-PKCS1-v1_5"))
42
+ throw r("RSASSA-PKCS1-v1_5");
43
+ const a = parseInt(e.slice(2), 10);
44
+ if (c(t.algorithm.hash) !== a)
45
+ throw r(`SHA-${a}`, "algorithm.hash");
46
+ break;
47
+ }
48
+ case "PS256":
49
+ case "PS384":
50
+ case "PS512": {
51
+ if (!o(t.algorithm, "RSA-PSS"))
52
+ throw r("RSA-PSS");
53
+ const a = parseInt(e.slice(2), 10);
54
+ if (c(t.algorithm.hash) !== a)
55
+ throw r(`SHA-${a}`, "algorithm.hash");
56
+ break;
57
+ }
58
+ case "Ed25519":
59
+ case "EdDSA": {
60
+ if (!o(t.algorithm, "Ed25519"))
61
+ throw r("Ed25519");
62
+ break;
63
+ }
64
+ case "ES256":
65
+ case "ES384":
66
+ case "ES512": {
67
+ if (!o(t.algorithm, "ECDSA"))
68
+ throw r("ECDSA");
69
+ const a = h(e);
70
+ if (t.algorithm.namedCurve !== a)
71
+ throw r(a, "algorithm.namedCurve");
72
+ break;
73
+ }
74
+ default:
75
+ throw new TypeError("CryptoKey does not support this operation");
76
+ }
77
+ i(t, n);
78
+ }
79
+ export {
80
+ u as checkSigCryptoKey
81
+ };
@@ -1,174 +1,20 @@
1
- import { InvalidLegacyVError as H } from "./index51.js";
2
- import { serializeAuthorizationList as g } from "./index23.js";
3
- import { blobsToCommitments as B } from "./index59.js";
4
- import { blobsToProofs as V } from "./index60.js";
5
- import { commitmentsToVersionedHashes as C } from "./index61.js";
6
- import { toBlobSidecars as k } from "./index62.js";
7
- import { concatHex as h } from "./index30.js";
8
- import { trim as T } from "./index36.js";
9
- import { numberToHex as o, bytesToHex as w } from "./index24.js";
10
- import { toRlp as b } from "./index43.js";
11
- import { assertTransactionEIP1559 as S, assertTransactionEIP2930 as _, assertTransactionEIP4844 as R, assertTransactionEIP7702 as Y, assertTransactionLegacy as j } from "./index52.js";
12
- import { getTransactionType as q } from "./index50.js";
13
- import { serializeAccessList as v } from "./index63.js";
14
- function te(e, r) {
15
- const i = q(e);
16
- return i === "eip1559" ? K(e, r) : i === "eip2930" ? M(e, r) : i === "eip4844" ? J(e, r) : i === "eip7702" ? D(e, r) : N(e, r);
17
- }
18
- function D(e, r) {
19
- const { authorizationList: i, chainId: s, gas: n, nonce: c, to: f, value: a, maxFeePerGas: x, maxPriorityFeePerGas: t, accessList: p, data: l } = e;
20
- Y(e);
21
- const d = v(p), m = g(i);
22
- return h([
23
- "0x04",
24
- b([
25
- o(s),
26
- c ? o(c) : "0x",
27
- t ? o(t) : "0x",
28
- x ? o(x) : "0x",
29
- n ? o(n) : "0x",
30
- f ?? "0x",
31
- a ? o(a) : "0x",
32
- l ?? "0x",
33
- d,
34
- m,
35
- ...I(e, r)
36
- ])
37
- ]);
38
- }
39
- function J(e, r) {
40
- const { chainId: i, gas: s, nonce: n, to: c, value: f, maxFeePerBlobGas: a, maxFeePerGas: x, maxPriorityFeePerGas: t, accessList: p, data: l } = e;
41
- R(e);
42
- let d = e.blobVersionedHashes, m = e.sidecars;
43
- if (e.blobs && (typeof d > "u" || typeof m > "u")) {
44
- const u = typeof e.blobs[0] == "string" ? e.blobs : e.blobs.map((P) => w(P)), z = e.kzg, y = B({
45
- blobs: u,
46
- kzg: z
47
- });
48
- if (typeof d > "u" && (d = C({
49
- commitments: y
50
- })), typeof m > "u") {
51
- const P = V({ blobs: u, commitments: y, kzg: z });
52
- m = k({ blobs: u, commitments: y, proofs: P });
53
- }
54
- }
55
- const L = v(p), E = [
56
- o(i),
57
- n ? o(n) : "0x",
58
- t ? o(t) : "0x",
59
- x ? o(x) : "0x",
60
- s ? o(s) : "0x",
61
- c ?? "0x",
62
- f ? o(f) : "0x",
63
- l ?? "0x",
64
- L,
65
- a ? o(a) : "0x",
66
- d ?? [],
67
- ...I(e, r)
68
- ], A = [], F = [], G = [];
69
- if (m)
70
- for (let u = 0; u < m.length; u++) {
71
- const { blob: z, commitment: y, proof: P } = m[u];
72
- A.push(z), F.push(y), G.push(P);
73
- }
74
- return h([
75
- "0x03",
76
- m ? (
77
- // If sidecars are enabled, envelope turns into a "wrapper":
78
- b([E, A, F, G])
79
- ) : (
80
- // If sidecars are disabled, standard envelope is used:
81
- b(E)
82
- )
83
- ]);
84
- }
85
- function K(e, r) {
86
- const { chainId: i, gas: s, nonce: n, to: c, value: f, maxFeePerGas: a, maxPriorityFeePerGas: x, accessList: t, data: p } = e;
87
- S(e);
88
- const l = v(t), d = [
89
- o(i),
90
- n ? o(n) : "0x",
91
- x ? o(x) : "0x",
92
- a ? o(a) : "0x",
93
- s ? o(s) : "0x",
94
- c ?? "0x",
95
- f ? o(f) : "0x",
96
- p ?? "0x",
97
- l,
98
- ...I(e, r)
99
- ];
100
- return h([
101
- "0x02",
102
- b(d)
103
- ]);
104
- }
105
- function M(e, r) {
106
- const { chainId: i, gas: s, data: n, nonce: c, to: f, value: a, accessList: x, gasPrice: t } = e;
107
- _(e);
108
- const p = v(x), l = [
109
- o(i),
110
- c ? o(c) : "0x",
111
- t ? o(t) : "0x",
112
- s ? o(s) : "0x",
113
- f ?? "0x",
114
- a ? o(a) : "0x",
115
- n ?? "0x",
116
- p,
117
- ...I(e, r)
118
- ];
119
- return h([
120
- "0x01",
121
- b(l)
122
- ]);
123
- }
124
- function N(e, r) {
125
- const { chainId: i = 0, gas: s, data: n, nonce: c, to: f, value: a, gasPrice: x } = e;
126
- j(e);
127
- let t = [
128
- c ? o(c) : "0x",
129
- x ? o(x) : "0x",
130
- s ? o(s) : "0x",
131
- f ?? "0x",
132
- a ? o(a) : "0x",
133
- n ?? "0x"
134
- ];
135
- if (r) {
136
- const p = (() => {
137
- if (r.v >= 35n)
138
- return (r.v - 35n) / 2n > 0 ? r.v : 27n + (r.v === 35n ? 0n : 1n);
139
- if (i > 0)
140
- return BigInt(i * 2) + BigInt(35n + r.v - 27n);
141
- const m = 27n + (r.v === 27n ? 0n : 1n);
142
- if (r.v !== m)
143
- throw new H({ v: r.v });
144
- return m;
145
- })(), l = T(r.r), d = T(r.s);
146
- t = [
147
- ...t,
148
- o(p),
149
- l === "0x00" ? "0x" : l,
150
- d === "0x00" ? "0x" : d
151
- ];
152
- } else i > 0 && (t = [
153
- ...t,
154
- o(i),
155
- "0x",
156
- "0x"
157
- ]);
158
- return b(t);
159
- }
160
- function I(e, r) {
161
- const i = r ?? e, { v: s, yParity: n } = i;
162
- if (typeof i.r > "u")
163
- return [];
164
- if (typeof i.s > "u")
165
- return [];
166
- if (typeof s > "u" && typeof n > "u")
167
- return [];
168
- const c = T(i.r), f = T(i.s);
169
- return [typeof n == "number" ? n ? o(1) : "0x" : s === 0n ? "0x" : s === 1n ? o(1) : s === 27n ? "0x" : o(1), c === "0x00" ? "0x" : c, f === "0x00" ? "0x" : f];
170
- }
1
+ let n = null, e = null;
2
+ const r = (t) => {
3
+ n = t;
4
+ }, o = () => {
5
+ if (!n)
6
+ throw new Error("SDK not initialized");
7
+ return n;
8
+ }, i = (t) => {
9
+ e = t;
10
+ }, a = () => {
11
+ if (!e)
12
+ throw new Error("SDK not initialized");
13
+ return e;
14
+ };
171
15
  export {
172
- te as serializeTransaction,
173
- I as toYParitySignatureArray
16
+ o as getConfig,
17
+ a as getCoreAuthManager,
18
+ r as setConfig,
19
+ i as setCoreAuthManager
174
20
  };