@dynamic-labs-wallet/browser-wallet-client 0.0.83 → 0.0.85
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.cjs.js +22 -34
- package/index.esm.js +12 -8
- package/package.json +3 -4
- package/src/client/client.d.ts +8 -5
- package/src/client/client.d.ts.map +1 -1
- package/src/index.d.ts +0 -1
- package/src/index.d.ts.map +1 -1
- package/internal/core/bip340.d.ts +0 -22
- package/internal/core/bip340.js +0 -1
- package/internal/core/common.d.ts +0 -1
- package/internal/core/common.js +0 -1
- package/internal/core/ecdsa.d.ts +0 -23
- package/internal/core/ecdsa.js +0 -1
- package/internal/core/ed25519.d.ts +0 -22
- package/internal/core/ed25519.js +0 -1
- package/internal/core/ed25519_exportable.d.ts +0 -21
- package/internal/core/ed25519_exportable.js +0 -1
- package/internal/core/index.d.ts +0 -8
- package/internal/core/index.js +0 -1
- package/internal/core/native.d.ts +0 -168
- package/internal/core/native.js +0 -1
- package/internal/core/sr25519.d.ts +0 -22
- package/internal/core/sr25519.js +0 -1
- package/internal/core/types.d.ts +0 -78
- package/internal/core/types.js +0 -1
package/index.cjs.js
CHANGED
|
@@ -2,8 +2,7 @@
|
|
|
2
2
|
|
|
3
3
|
var messageTransport = require('@dynamic-labs/message-transport');
|
|
4
4
|
var logger$1 = require('@dynamic-labs/logger');
|
|
5
|
-
var core
|
|
6
|
-
var core = require('./internal/core');
|
|
5
|
+
var core = require('@dynamic-labs-wallet/core');
|
|
7
6
|
|
|
8
7
|
const setupMessageTransportBridge = (messageTransport$1, iframe, iframeOrigin)=>{
|
|
9
8
|
if (!(iframe == null ? void 0 : iframe.contentWindow)) {
|
|
@@ -309,7 +308,7 @@ class DynamicWalletClient {
|
|
|
309
308
|
chainName: this.chainName
|
|
310
309
|
});
|
|
311
310
|
}
|
|
312
|
-
async getWallet({ accountAddress, walletOperation = core
|
|
311
|
+
async getWallet({ accountAddress, walletOperation = core.WalletOperation.NO_OPERATION, signedSessionId }) {
|
|
313
312
|
await this.initializeMessageTransport();
|
|
314
313
|
if (!this.iframeMessageHandler) {
|
|
315
314
|
throw new Error('Iframe message handler not initialized');
|
|
@@ -321,7 +320,7 @@ class DynamicWalletClient {
|
|
|
321
320
|
signedSessionId
|
|
322
321
|
});
|
|
323
322
|
}
|
|
324
|
-
async createWalletAccount({ thresholdSignatureScheme, password = undefined }) {
|
|
323
|
+
async createWalletAccount({ thresholdSignatureScheme, password = undefined, signedSessionId }) {
|
|
325
324
|
await this.initializeMessageTransport();
|
|
326
325
|
if (!this.iframeMessageHandler) {
|
|
327
326
|
throw new Error('Iframe message handler not initialized');
|
|
@@ -329,10 +328,11 @@ class DynamicWalletClient {
|
|
|
329
328
|
return this.iframeMessageHandler.createWalletAccount({
|
|
330
329
|
chainName: this.chainName,
|
|
331
330
|
thresholdSignatureScheme,
|
|
332
|
-
password
|
|
331
|
+
password,
|
|
332
|
+
signedSessionId
|
|
333
333
|
});
|
|
334
334
|
}
|
|
335
|
-
async requiresPasswordForOperation({ accountAddress, walletOperation = core
|
|
335
|
+
async requiresPasswordForOperation({ accountAddress, walletOperation = core.WalletOperation.REACH_THRESHOLD }) {
|
|
336
336
|
await this.initializeMessageTransport();
|
|
337
337
|
if (!this.iframeMessageHandler) {
|
|
338
338
|
throw new Error('Iframe message handler not initialized');
|
|
@@ -353,7 +353,7 @@ class DynamicWalletClient {
|
|
|
353
353
|
accountAddress
|
|
354
354
|
});
|
|
355
355
|
}
|
|
356
|
-
async signMessage({ message, accountAddress, password = undefined }) {
|
|
356
|
+
async signMessage({ message, accountAddress, password = undefined, signedSessionId }) {
|
|
357
357
|
await this.initializeMessageTransport();
|
|
358
358
|
if (!this.iframeMessageHandler) {
|
|
359
359
|
throw new Error('Iframe message handler not initialized');
|
|
@@ -362,7 +362,8 @@ class DynamicWalletClient {
|
|
|
362
362
|
chainName: this.chainName,
|
|
363
363
|
message,
|
|
364
364
|
accountAddress,
|
|
365
|
-
password
|
|
365
|
+
password,
|
|
366
|
+
signedSessionId
|
|
366
367
|
});
|
|
367
368
|
}
|
|
368
369
|
async signRawMessage({ message, accountAddress, password = undefined, signedSessionId }) {
|
|
@@ -453,7 +454,7 @@ class DynamicWalletClient {
|
|
|
453
454
|
signedSessionId
|
|
454
455
|
});
|
|
455
456
|
}
|
|
456
|
-
async exportPrivateKey({ accountAddress, displayContainer, password }) {
|
|
457
|
+
async exportPrivateKey({ accountAddress, displayContainer, password, signedSessionId }) {
|
|
457
458
|
const { iframeDisplay } = await this.initializeIframeDisplayForContainer({
|
|
458
459
|
container: displayContainer
|
|
459
460
|
});
|
|
@@ -463,10 +464,11 @@ class DynamicWalletClient {
|
|
|
463
464
|
return iframeDisplay.exportPrivateKey({
|
|
464
465
|
chainName: this.chainName,
|
|
465
466
|
accountAddress,
|
|
466
|
-
password
|
|
467
|
+
password,
|
|
468
|
+
signedSessionId
|
|
467
469
|
});
|
|
468
470
|
}
|
|
469
|
-
async verifyPassword({ accountAddress, password, walletOperation = core
|
|
471
|
+
async verifyPassword({ accountAddress, password, walletOperation = core.WalletOperation.NO_OPERATION, signedSessionId }) {
|
|
470
472
|
await this.initializeMessageTransport();
|
|
471
473
|
if (!this.iframeMessageHandler) {
|
|
472
474
|
throw new Error('Iframe message handler not initialized');
|
|
@@ -515,7 +517,9 @@ class DynamicWalletClient {
|
|
|
515
517
|
signedSessionId
|
|
516
518
|
});
|
|
517
519
|
}
|
|
518
|
-
|
|
520
|
+
/**
|
|
521
|
+
* keyShares is stringified list of EcdsaKeygenResult[] and Ed25519KeygenResult[]
|
|
522
|
+
*/ async offlineExportPrivateKey({ keyShares, derivationPath }) {
|
|
519
523
|
await this.initializeMessageTransport();
|
|
520
524
|
if (!this.iframeMessageHandler) {
|
|
521
525
|
throw new Error('Iframe message handler not initialized');
|
|
@@ -561,8 +565,8 @@ class DynamicWalletClient {
|
|
|
561
565
|
this.baseApiUrl = baseApiUrl;
|
|
562
566
|
this.baseMPCRelayApiUrl = baseMPCRelayApiUrl;
|
|
563
567
|
this.chainName = chainName;
|
|
564
|
-
const environment = core
|
|
565
|
-
this.iframeDomain = core
|
|
568
|
+
const environment = core.getEnvironmentFromUrl(baseApiUrl);
|
|
569
|
+
this.iframeDomain = core.IFRAME_DOMAIN_MAP[environment];
|
|
566
570
|
// Generate unique instanceId when client is created
|
|
567
571
|
this.instanceId = crypto.randomUUID();
|
|
568
572
|
this.debug = Boolean(debug);
|
|
@@ -577,34 +581,18 @@ DynamicWalletClient.iframeInstanceCount = 0;
|
|
|
577
581
|
|
|
578
582
|
Object.defineProperty(exports, "MPC_RELAY_PREPROD_API_URL", {
|
|
579
583
|
enumerable: true,
|
|
580
|
-
get: function () { return core
|
|
584
|
+
get: function () { return core.MPC_RELAY_PREPROD_API_URL; }
|
|
581
585
|
});
|
|
582
586
|
Object.defineProperty(exports, "MPC_RELAY_PROD_API_URL", {
|
|
583
587
|
enumerable: true,
|
|
584
|
-
get: function () { return core
|
|
588
|
+
get: function () { return core.MPC_RELAY_PROD_API_URL; }
|
|
585
589
|
});
|
|
586
590
|
Object.defineProperty(exports, "ThresholdSignatureScheme", {
|
|
587
591
|
enumerable: true,
|
|
588
|
-
get: function () { return core
|
|
592
|
+
get: function () { return core.ThresholdSignatureScheme; }
|
|
589
593
|
});
|
|
590
594
|
Object.defineProperty(exports, "WalletOperation", {
|
|
591
595
|
enumerable: true,
|
|
592
|
-
get: function () { return core
|
|
593
|
-
});
|
|
594
|
-
Object.defineProperty(exports, "BIP340KeygenResult", {
|
|
595
|
-
enumerable: true,
|
|
596
|
-
get: function () { return core.BIP340KeygenResult; }
|
|
597
|
-
});
|
|
598
|
-
Object.defineProperty(exports, "EcdsaKeygenResult", {
|
|
599
|
-
enumerable: true,
|
|
600
|
-
get: function () { return core.EcdsaKeygenResult; }
|
|
601
|
-
});
|
|
602
|
-
Object.defineProperty(exports, "EcdsaSignature", {
|
|
603
|
-
enumerable: true,
|
|
604
|
-
get: function () { return core.EcdsaSignature; }
|
|
605
|
-
});
|
|
606
|
-
Object.defineProperty(exports, "Ed25519KeygenResult", {
|
|
607
|
-
enumerable: true,
|
|
608
|
-
get: function () { return core.Ed25519KeygenResult; }
|
|
596
|
+
get: function () { return core.WalletOperation; }
|
|
609
597
|
});
|
|
610
598
|
exports.DynamicWalletClient = DynamicWalletClient;
|
package/index.esm.js
CHANGED
|
@@ -2,7 +2,6 @@ import { parseMessageTransportData, createRequestChannel, applyDefaultMessageOri
|
|
|
2
2
|
import { Logger } from '@dynamic-labs/logger';
|
|
3
3
|
import { WalletOperation, getEnvironmentFromUrl, IFRAME_DOMAIN_MAP } from '@dynamic-labs-wallet/core';
|
|
4
4
|
export { MPC_RELAY_PREPROD_API_URL, MPC_RELAY_PROD_API_URL, ThresholdSignatureScheme, WalletOperation } from '@dynamic-labs-wallet/core';
|
|
5
|
-
export { BIP340KeygenResult, EcdsaKeygenResult, EcdsaSignature, Ed25519KeygenResult } from './internal/core';
|
|
6
5
|
|
|
7
6
|
const setupMessageTransportBridge = (messageTransport, iframe, iframeOrigin)=>{
|
|
8
7
|
if (!(iframe == null ? void 0 : iframe.contentWindow)) {
|
|
@@ -320,7 +319,7 @@ class DynamicWalletClient {
|
|
|
320
319
|
signedSessionId
|
|
321
320
|
});
|
|
322
321
|
}
|
|
323
|
-
async createWalletAccount({ thresholdSignatureScheme, password = undefined }) {
|
|
322
|
+
async createWalletAccount({ thresholdSignatureScheme, password = undefined, signedSessionId }) {
|
|
324
323
|
await this.initializeMessageTransport();
|
|
325
324
|
if (!this.iframeMessageHandler) {
|
|
326
325
|
throw new Error('Iframe message handler not initialized');
|
|
@@ -328,7 +327,8 @@ class DynamicWalletClient {
|
|
|
328
327
|
return this.iframeMessageHandler.createWalletAccount({
|
|
329
328
|
chainName: this.chainName,
|
|
330
329
|
thresholdSignatureScheme,
|
|
331
|
-
password
|
|
330
|
+
password,
|
|
331
|
+
signedSessionId
|
|
332
332
|
});
|
|
333
333
|
}
|
|
334
334
|
async requiresPasswordForOperation({ accountAddress, walletOperation = WalletOperation.REACH_THRESHOLD }) {
|
|
@@ -352,7 +352,7 @@ class DynamicWalletClient {
|
|
|
352
352
|
accountAddress
|
|
353
353
|
});
|
|
354
354
|
}
|
|
355
|
-
async signMessage({ message, accountAddress, password = undefined }) {
|
|
355
|
+
async signMessage({ message, accountAddress, password = undefined, signedSessionId }) {
|
|
356
356
|
await this.initializeMessageTransport();
|
|
357
357
|
if (!this.iframeMessageHandler) {
|
|
358
358
|
throw new Error('Iframe message handler not initialized');
|
|
@@ -361,7 +361,8 @@ class DynamicWalletClient {
|
|
|
361
361
|
chainName: this.chainName,
|
|
362
362
|
message,
|
|
363
363
|
accountAddress,
|
|
364
|
-
password
|
|
364
|
+
password,
|
|
365
|
+
signedSessionId
|
|
365
366
|
});
|
|
366
367
|
}
|
|
367
368
|
async signRawMessage({ message, accountAddress, password = undefined, signedSessionId }) {
|
|
@@ -452,7 +453,7 @@ class DynamicWalletClient {
|
|
|
452
453
|
signedSessionId
|
|
453
454
|
});
|
|
454
455
|
}
|
|
455
|
-
async exportPrivateKey({ accountAddress, displayContainer, password }) {
|
|
456
|
+
async exportPrivateKey({ accountAddress, displayContainer, password, signedSessionId }) {
|
|
456
457
|
const { iframeDisplay } = await this.initializeIframeDisplayForContainer({
|
|
457
458
|
container: displayContainer
|
|
458
459
|
});
|
|
@@ -462,7 +463,8 @@ class DynamicWalletClient {
|
|
|
462
463
|
return iframeDisplay.exportPrivateKey({
|
|
463
464
|
chainName: this.chainName,
|
|
464
465
|
accountAddress,
|
|
465
|
-
password
|
|
466
|
+
password,
|
|
467
|
+
signedSessionId
|
|
466
468
|
});
|
|
467
469
|
}
|
|
468
470
|
async verifyPassword({ accountAddress, password, walletOperation = WalletOperation.NO_OPERATION, signedSessionId }) {
|
|
@@ -514,7 +516,9 @@ class DynamicWalletClient {
|
|
|
514
516
|
signedSessionId
|
|
515
517
|
});
|
|
516
518
|
}
|
|
517
|
-
|
|
519
|
+
/**
|
|
520
|
+
* keyShares is stringified list of EcdsaKeygenResult[] and Ed25519KeygenResult[]
|
|
521
|
+
*/ async offlineExportPrivateKey({ keyShares, derivationPath }) {
|
|
518
522
|
await this.initializeMessageTransport();
|
|
519
523
|
if (!this.iframeMessageHandler) {
|
|
520
524
|
throw new Error('Iframe message handler not initialized');
|
package/package.json
CHANGED
|
@@ -1,12 +1,11 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs-wallet/browser-wallet-client",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.85",
|
|
4
4
|
"license": "MIT",
|
|
5
5
|
"dependencies": {
|
|
6
|
-
"@dynamic-labs-wallet/core": "0.0.
|
|
6
|
+
"@dynamic-labs-wallet/core": "0.0.85",
|
|
7
7
|
"@dynamic-labs/message-transport": "^4.9.9",
|
|
8
|
-
"@dynamic-labs/logger": "^4.9.9"
|
|
9
|
-
"@noble/hashes": "1.7.1"
|
|
8
|
+
"@dynamic-labs/logger": "^4.9.9"
|
|
10
9
|
},
|
|
11
10
|
"nx": {
|
|
12
11
|
"sourceRoot": "packages/browser-wallet-client/src",
|
package/src/client/client.d.ts
CHANGED
|
@@ -2,7 +2,6 @@ import { type MessageTransportWithDefaultOrigin } from '@dynamic-labs/message-tr
|
|
|
2
2
|
import { iframeMessageHandler } from '../services/iframeMessageHandler';
|
|
3
3
|
import type { GetWalletResponse, CreateWalletAccountResponse, RequiresPasswordForOperationRequest, SignMessageRequest, IsPasswordEncryptedRequest, BackupKeySharesToGoogleDriveRequest, VerifyPasswordRequest, UpdatePasswordRequest, ImportPrivateKeyRequest, ExportClientKeysharesRequest, OfflineExportPrivateKeyResponse, SignRawMessageRequest, CreateWalletAccountRequest, SignTransactionRequest, RefreshWalletAccountSharesRequest, ReshareRequest } from '@dynamic-labs-wallet/core';
|
|
4
4
|
import { WalletOperation } from '@dynamic-labs-wallet/core';
|
|
5
|
-
import type { EcdsaKeygenResult, Ed25519KeygenResult } from '../../../internal/core';
|
|
6
5
|
export declare class DynamicWalletClient {
|
|
7
6
|
protected chainName: string;
|
|
8
7
|
protected logger: import("@dynamic-labs/logger").Logger;
|
|
@@ -75,10 +74,10 @@ export declare class DynamicWalletClient {
|
|
|
75
74
|
walletOperation?: WalletOperation;
|
|
76
75
|
signedSessionId?: string;
|
|
77
76
|
}): Promise<GetWalletResponse>;
|
|
78
|
-
createWalletAccount({ thresholdSignatureScheme, password, }: Omit<CreateWalletAccountRequest, 'chainName'>): Promise<CreateWalletAccountResponse>;
|
|
77
|
+
createWalletAccount({ thresholdSignatureScheme, password, signedSessionId, }: Omit<CreateWalletAccountRequest, 'chainName'>): Promise<CreateWalletAccountResponse>;
|
|
79
78
|
requiresPasswordForOperation({ accountAddress, walletOperation, }: Omit<RequiresPasswordForOperationRequest, 'chainName'>): Promise<boolean>;
|
|
80
79
|
isPasswordEncrypted({ accountAddress, }: Omit<IsPasswordEncryptedRequest, 'chainName'>): Promise<boolean>;
|
|
81
|
-
signMessage({ message, accountAddress, password, }: Omit<SignMessageRequest, 'chainName'>): Promise<string>;
|
|
80
|
+
signMessage({ message, accountAddress, password, signedSessionId, }: Omit<SignMessageRequest, 'chainName'>): Promise<string>;
|
|
82
81
|
signRawMessage({ message, accountAddress, password, signedSessionId, }: Omit<SignRawMessageRequest, 'chainName'>): Promise<string>;
|
|
83
82
|
/**
|
|
84
83
|
* Signs a transaction and returns the signature, @transaction is a string of the serialized transaction
|
|
@@ -101,17 +100,21 @@ export declare class DynamicWalletClient {
|
|
|
101
100
|
}): Promise<void>;
|
|
102
101
|
refreshWalletAccountShares({ accountAddress, password, signedSessionId, }: Omit<RefreshWalletAccountSharesRequest, 'chainName'>): Promise<void>;
|
|
103
102
|
reshare({ accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password, signedSessionId, }: Omit<ReshareRequest, 'chainName'>): Promise<void>;
|
|
104
|
-
exportPrivateKey({ accountAddress, displayContainer, password, }: {
|
|
103
|
+
exportPrivateKey({ accountAddress, displayContainer, password, signedSessionId, }: {
|
|
105
104
|
accountAddress: string;
|
|
106
105
|
displayContainer: HTMLElement;
|
|
107
106
|
password?: string;
|
|
107
|
+
signedSessionId?: string;
|
|
108
108
|
}): Promise<void>;
|
|
109
109
|
verifyPassword({ accountAddress, password, walletOperation, signedSessionId, }: Omit<VerifyPasswordRequest, 'chainName'>): Promise<void>;
|
|
110
110
|
updatePassword({ accountAddress, existingPassword, newPassword, signedSessionId, }: Omit<UpdatePasswordRequest, 'chainName'>): Promise<void>;
|
|
111
111
|
importPrivateKey({ privateKey, thresholdSignatureScheme, }: Omit<ImportPrivateKeyRequest, 'chainName'>): Promise<CreateWalletAccountResponse>;
|
|
112
112
|
exportClientKeyshares({ accountAddress, password, signedSessionId, }: Omit<ExportClientKeysharesRequest, 'chainName'>): Promise<void>;
|
|
113
|
+
/**
|
|
114
|
+
* keyShares is stringified list of EcdsaKeygenResult[] and Ed25519KeygenResult[]
|
|
115
|
+
*/
|
|
113
116
|
offlineExportPrivateKey({ keyShares, derivationPath, }: {
|
|
114
|
-
keyShares:
|
|
117
|
+
keyShares: string[];
|
|
115
118
|
derivationPath?: string;
|
|
116
119
|
}): Promise<OfflineExportPrivateKeyResponse>;
|
|
117
120
|
cleanup(): Promise<void>;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../src/client/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,KAAK,iCAAiC,EACvC,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EAAE,oBAAoB,EAAE,MAAM,kCAAkC,CAAC;AAExE,OAAO,KAAK,EACV,iBAAiB,EACjB,2BAA2B,EAC3B,mCAAmC,EACnC,kBAAkB,EAClB,0BAA0B,EAC1B,mCAAmC,EACnC,qBAAqB,EACrB,qBAAqB,EACrB,uBAAuB,EACvB,4BAA4B,EAC5B,+BAA+B,EAC/B,qBAAqB,EACrB,0BAA0B,EAC1B,sBAAsB,EACtB,iCAAiC,EACjC,cAAc,EACf,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAGL,eAAe,EAChB,MAAM,2BAA2B,CAAC;
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../src/client/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAGL,KAAK,iCAAiC,EACvC,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EAAE,oBAAoB,EAAE,MAAM,kCAAkC,CAAC;AAExE,OAAO,KAAK,EACV,iBAAiB,EACjB,2BAA2B,EAC3B,mCAAmC,EACnC,kBAAkB,EAClB,0BAA0B,EAC1B,mCAAmC,EACnC,qBAAqB,EACrB,qBAAqB,EACrB,uBAAuB,EACvB,4BAA4B,EAC5B,+BAA+B,EAC/B,qBAAqB,EACrB,0BAA0B,EAC1B,sBAAsB,EACtB,iCAAiC,EACjC,cAAc,EACf,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAGL,eAAe,EAChB,MAAM,2BAA2B,CAAC;AAEnC,qBAAa,mBAAmB;IAC9B,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC;IAC5B,SAAS,CAAC,MAAM,wCAAU;IACnB,UAAU,EAAE,MAAM,GAAG,IAAI,CAAQ;IACjC,YAAY,EAAE,MAAM,GAAG,IAAI,CAAQ;IACnC,aAAa,EAAE,MAAM,CAAC;IAC7B,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAS;IAC5B,UAAU,EAAE,MAAM,CAAC;IACnB,kBAAkB,EAAE,MAAM,CAAC;IAClC,SAAS,CAAC,gBAAgB,EAAE,iCAAiC,GAAG,IAAI,CAAQ;IAC5E,SAAS,CAAC,oBAAoB,EAAE,oBAAoB,GAAG,IAAI,CAAQ;IACnE,OAAO,CAAC,MAAM,CAAC,iBAAiB,CAA8B;IAC9D,SAAS,CAAC,MAAM,EAAE,iBAAiB,GAAG,IAAI,CAAQ;IAClD,OAAO,CAAC,KAAK,CAAU;IAEvB,OAAO,CAAC,MAAM,CAAC,YAAY,CAAkC;IAC7D,OAAO,CAAC,MAAM,CAAC,mBAAmB,CAAK;gBAE3B,EACV,aAAa,EACb,SAAS,EACT,UAAU,EACV,kBAAkB,EAClB,SAAS,EACT,KAAK,GACN,EAAE;QACD,aAAa,EAAE,MAAM,CAAC;QACtB,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,kBAAkB,EAAE,MAAM,CAAC;QAC3B,SAAS,EAAE,MAAM,CAAC;QAClB,KAAK,CAAC,EAAE,OAAO,CAAC;KACjB;IAqBK,UAAU;IAIhB;;;OAGG;IACH,6BAA6B,IAAI,OAAO,CAAC,IAAI,CAAC;IAS9C;;;OAGG;YACW,+BAA+B;IAS7C;;OAEG;YACW,0BAA0B;IAyBxC;;OAEG;YACW,aAAa;YAYb,UAAU;IA0ExB;;;;OAIG;IACH,OAAO,CAAC,sBAAsB;IAgD9B;;;;;;;;OAQG;IACG,mCAAmC,CAAC,EACxC,SAAS,GACV,EAAE;QACD,SAAS,EAAE,WAAW,CAAC;KACxB,GAAG,OAAO,CAAC;QACV,MAAM,EAAE,iBAAiB,CAAC;QAC1B,aAAa,EAAE,oBAAoB,CAAC;QACpC,OAAO,EAAE,MAAM,IAAI,CAAC;KACrB,CAAC;IAiCI,UAAU,IAAI,OAAO,CAAC,iBAAiB,EAAE,CAAC;IAW1C,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,eAAe,CAAC,EAAE,MAAM,CAAC;KAC1B;IAcK,mBAAmB,CAAC,EACxB,wBAAwB,EACxB,QAAoB,EACpB,eAAe,GAChB,EAAE,IAAI,CACL,0BAA0B,EAC1B,WAAW,CACZ,GAAG,OAAO,CAAC,2BAA2B,CAAC;IAclC,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,GAClD,EAAE,IAAI,CAAC,mCAAmC,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;IAatE,mBAAmB,CAAC,EACxB,cAAc,GACf,EAAE,IAAI,CAAC,0BAA0B,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,OAAO,CAAC;IAY7D,WAAW,CAAC,EAChB,OAAO,EACP,cAAc,EACd,QAAoB,EACpB,eAAe,GAChB,EAAE,IAAI,CAAC,kBAAkB,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,MAAM,CAAC;IAepD,cAAc,CAAC,EACnB,OAAO,EACP,cAAc,EACd,QAAoB,EACpB,eAAe,GAChB,EAAE,IAAI,CAAC,qBAAqB,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,MAAM,CAAC;IAe7D;;;;;;;;;;OAUG;IACG,eAAe,CAAC,EACpB,aAAa,EACb,WAAW,EACX,QAAoB,EACpB,eAAe,GAChB,EAAE,IAAI,CAAC,sBAAsB,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,MAAM,CAAC;IAexD,4BAA4B,CAAC,EACjC,cAAc,EACd,QAAoB,EACpB,eAAe,GAChB,EAAE,IAAI,CAAC,mCAAmC,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAcnE,4BAA4B,CAAC,EACjC,cAAc,EACd,gBAAgB,EAChB,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,EAAE,WAAW,CAAC;QAC9B,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;KAC1B,GAAG,OAAO,CAAC,IAAI,CAAC;IAkBX,0BAA0B,CAAC,EAC/B,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE,IAAI,CAAC,iCAAiC,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAcjE,OAAO,CAAC,EACZ,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAQ,EACR,eAAe,GAChB,EAAE,IAAI,CAAC,cAAc,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAgB9C,gBAAgB,CAAC,EACrB,cAAc,EACd,gBAAgB,EAChB,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,EAAE,WAAW,CAAC;QAC9B,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;KAC1B,GAAG,OAAO,CAAC,IAAI,CAAC;IAkBX,cAAc,CAAC,EACnB,cAAc,EACd,QAAQ,EACR,eAA8C,EAC9C,eAAe,GAChB,EAAE,IAAI,CAAC,qBAAqB,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAerD,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,EACX,eAAe,GAChB,EAAE,IAAI,CAAC,qBAAqB,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAerD,gBAAgB,CAAC,EACrB,UAAU,EACV,wBAAwB,GACzB,EAAE,IAAI,CACL,uBAAuB,EACvB,WAAW,CACZ,GAAG,OAAO,CAAC,2BAA2B,CAAC;IAalC,qBAAqB,CAAC,EAC1B,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE,IAAI,CAAC,4BAA4B,EAAE,WAAW,CAAC,GAAG,OAAO,CAAC,IAAI,CAAC;IAclE;;OAEG;IACG,uBAAuB,CAAC,EAC5B,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,EAAE,CAAC;QACpB,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB,GAAG,OAAO,CAAC,+BAA+B,CAAC;IAqB/B,OAAO;CAqBrB"}
|
package/src/index.d.ts
CHANGED
|
@@ -1,4 +1,3 @@
|
|
|
1
1
|
export * from './client';
|
|
2
|
-
export { EcdsaKeygenResult, Ed25519KeygenResult, BIP340KeygenResult, EcdsaSignature, } from '../../internal/core';
|
|
3
2
|
export { ThresholdSignatureScheme, WalletOperation, MPC_RELAY_PROD_API_URL, MPC_RELAY_PREPROD_API_URL, } from '@dynamic-labs-wallet/core';
|
|
4
3
|
//# sourceMappingURL=index.d.ts.map
|
package/src/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../packages/src/index.ts"],"names":[],"mappings":"AAAA,cAAc,UAAU,CAAC;AACzB,OAAO,EACL,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../packages/src/index.ts"],"names":[],"mappings":"AAAA,cAAc,UAAU,CAAC;AACzB,OAAO,EACL,wBAAwB,EACxB,eAAe,EACf,sBAAsB,EACtB,yBAAyB,GAC1B,MAAM,2BAA2B,CAAC"}
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
import { BIP340InitKeygenResult, BIP340KeygenResult, DynamicNativeSdkInterface } from '.';
|
|
2
|
-
export declare class BIP340 {
|
|
3
|
-
protected readonly NATIVE: Promise<DynamicNativeSdkInterface>;
|
|
4
|
-
protected readonly URL: string;
|
|
5
|
-
protected constructor(native: Promise<DynamicNativeSdkInterface>, url: string);
|
|
6
|
-
initKeygen(): Promise<BIP340InitKeygenResult>;
|
|
7
|
-
exportID(keygenResult: BIP340KeygenResult | string): Promise<string>;
|
|
8
|
-
createRoom(numParties: number, apiKey: string): Promise<string>;
|
|
9
|
-
keygen(roomUuid: string, numParties: number, threshold: number, keygenInit: BIP340InitKeygenResult, keygenIds: string[]): Promise<BIP340KeygenResult>;
|
|
10
|
-
sign(roomUuid: string, keygenResult: BIP340KeygenResult | string, msg: Uint8Array | string, derivationPath?: Uint32Array, tweak?: Uint8Array | string): Promise<Uint8Array>;
|
|
11
|
-
refresh(roomUuid: string, keygenResult: BIP340KeygenResult | string): Promise<BIP340KeygenResult>;
|
|
12
|
-
reshareNewParty(roomUuid: string, oldThreshold: number, newThreshold: number, keygenInit: BIP340InitKeygenResult, keygenIds: string[]): Promise<BIP340KeygenResult>;
|
|
13
|
-
reshareRemainingParty(roomUuid: string, newThreshold: number, keygenResult: BIP340KeygenResult | string, keygenIds: string[]): Promise<BIP340KeygenResult>;
|
|
14
|
-
deriveTweakPubkey(keygenResult: BIP340KeygenResult | string, derivationPath?: Uint32Array, tweak?: Uint8Array | string): Promise<Uint8Array>;
|
|
15
|
-
getXpub(keygenResult: BIP340KeygenResult | string): Promise<string>;
|
|
16
|
-
deriveTweakPubkeyFromXpub(Xpub: string, derivationPath?: Uint32Array, tweak?: Uint8Array | string): Promise<Uint8Array>;
|
|
17
|
-
exportFullPrivateKey(roomUuid: string, keygenResult: BIP340KeygenResult | string, toExportID: string): Promise<string | undefined>;
|
|
18
|
-
derivePrivateKeyFromXpriv(xpriv: string, derivationPath?: Uint32Array): Promise<string>;
|
|
19
|
-
offlineExportFullPrivateKey(keygenResults: BIP340KeygenResult[] | string[]): Promise<string>;
|
|
20
|
-
importPrivateKeyRecipient(roomUuid: string, threshold: number, keygenInit: BIP340InitKeygenResult, keygenIds: string[]): Promise<BIP340KeygenResult>;
|
|
21
|
-
importPrivateKeyImporter(roomUuid: string, threshold: number, privateKey: string, keygenInit: BIP340InitKeygenResult, keygenIds: string[]): Promise<BIP340KeygenResult>;
|
|
22
|
-
}
|
package/internal/core/bip340.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
Object.defineProperty(exports,"__esModule",{value:!0}),exports.BIP340=void 0;let _1=require("."),utils_1=require("@noble/hashes/utils"),common_1=require("./common");function getTweak(e){if(0!==(e="string"!=typeof e?(0,utils_1.bytesToHex)(e):e).length&&64!==e.length)throw new Error("Tweak must be 32 bytes long");return e}class BIP340{constructor(e,t){this.NATIVE=e,this.URL=t}async initKeygen(){var e=await(await this.NATIVE).initKeygen();return new _1.BIP340InitKeygenResult(e.pubkey,e.keypair)}async exportID(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).bip340GetExportID(e)}async createRoom(e,t){return(0,common_1.sanitizeNumberOfParties)(e),(await this.NATIVE).createRoom(this.URL,e,t)}async keygen(e,t,r,i,a){if((0,common_1.sanitizeNumberOfParties)(t,r),a.length!==t-1)throw new Error(`keygenIds length must be exactly: ${t-1}, it is: `+a.length);e=await(await this.NATIVE).bip340Keygen(e,this.URL,t,r,i.keygenSecret,a);if(e.pubkey&&e.secret_share)return t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share,new _1.BIP340KeygenResult(t,r);throw new Error("Keygen failed, no public key or secret share was returned.")}async sign(e,t,r,i=new Uint32Array,a=new Uint8Array){t="string"==typeof t?t:t.secretShare,"string"!=typeof r&&(r=(0,utils_1.bytesToHex)(r)),a=getTweak(a),e=await(await this.NATIVE).bip340Sign(e,this.URL,t,r,Array.from(i),a);return(0,utils_1.hexToBytes)(e)}async refresh(e,t){var t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).bip340Refresh(e,this.URL,t);if(e.pubkey&&e.secret_share)return t=(0,utils_1.hexToBytes)(e.pubkey),e=e.secret_share,new _1.BIP340KeygenResult(t,e);throw new Error("Keygen failed, no public key or secret share was returned.")}async reshareNewParty(e,t,r,i,a){e=await(await this.NATIVE).bip340ReshareNewParty(e,this.URL,t,r,i.keygenSecret,a),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.BIP340KeygenResult(t,r)}async reshareRemainingParty(e,t,r,i){r="string"==typeof r?r:r.secretShare,e=await(await this.NATIVE).bip340ReshareRemainingParty(e,this.URL,t,r,i),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.BIP340KeygenResult(t,r)}async deriveTweakPubkey(e,t=new Uint32Array,r=new Uint8Array){e="string"==typeof e?e:e.secretShare,e=await(await this.NATIVE).bip340DeriveTweakPubkey(e,Array.from(t),getTweak(r));return(0,utils_1.hexToBytes)(e)}async getXpub(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).bip340GetXpub(e)}async deriveTweakPubkeyFromXpub(e,t=new Uint32Array,r=new Uint8Array){e=await(await this.NATIVE).bip340DeriveTweakPubkeyFromXpub(e,Array.from(t),getTweak(r));return(0,utils_1.hexToBytes)(e)}async exportFullPrivateKey(e,t,r){t="string"==typeof t?t:t.secretShare;return(await this.NATIVE).bip340ExportFullPrivateKey(e,this.URL,t,r)}async derivePrivateKeyFromXpriv(e,t=new Uint32Array){return(await this.NATIVE).bip340DerivePrivateKeyFromXpriv(e,Array.from(t))}async offlineExportFullPrivateKey(e){e=e.map(e=>{if("string"==typeof e)return e;if(e instanceof _1.BIP340KeygenResult)return e.secretShare;throw"UnknownType"});return(await this.NATIVE).bip340OfflineExportFullPrivateKey(e)}async importPrivateKeyRecipient(e,t,r,i){e=await(await this.NATIVE).bip340ImportPrivateKeyRecipient(e,this.URL,t,r.keygenSecret,i),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.BIP340KeygenResult(t,r)}async importPrivateKeyImporter(e,t,r,i,a){e=await(await this.NATIVE).bip340ImportPrivateKeyImporter(e,this.URL,t,r,i.keygenSecret,a),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.BIP340KeygenResult(t,r)}}exports.BIP340=BIP340;
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export declare function sanitizeNumberOfParties(...numberOfParties: number[]): void;
|
package/internal/core/common.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
function sanitizeNumberOfParties(...e){for(var r of e)if(!Number.isInteger(r)||r<1||65535<r)throw new RangeError(`numberOfParties should be an integer in the range: 1..65_535, instead got: ${r} `)}Object.defineProperty(exports,"__esModule",{value:!0}),exports.sanitizeNumberOfParties=sanitizeNumberOfParties;
|
package/internal/core/ecdsa.d.ts
DELETED
|
@@ -1,23 +0,0 @@
|
|
|
1
|
-
import { EcdsaInitKeygenResult, EcdsaKeygenResult, EcdsaPublicKey, EcdsaSignature, MessageHash, DynamicNativeSdkInterface } from './';
|
|
2
|
-
export declare class Ecdsa {
|
|
3
|
-
protected readonly NATIVE: Promise<DynamicNativeSdkInterface>;
|
|
4
|
-
protected readonly URL: string;
|
|
5
|
-
protected constructor(native: Promise<DynamicNativeSdkInterface>, hostUrl: string);
|
|
6
|
-
createRoom(numParties: number, apiKey: string): Promise<string>;
|
|
7
|
-
initKeygen(): Promise<EcdsaInitKeygenResult>;
|
|
8
|
-
exportID(keygenResult: EcdsaKeygenResult | string): Promise<string>;
|
|
9
|
-
keygen(roomUuid: string, numParties: number, threshold: number, keygenInit: EcdsaInitKeygenResult, keygenIds: string[]): Promise<EcdsaKeygenResult>;
|
|
10
|
-
sign(roomUuid: string, keygenResult: EcdsaKeygenResult | string, msgHash: MessageHash, derivationPath?: Uint32Array): Promise<EcdsaSignature>;
|
|
11
|
-
refresh(roomUuid: string, keygenResult: EcdsaKeygenResult | string): Promise<EcdsaKeygenResult>;
|
|
12
|
-
reshareNewParty(roomUuid: string, oldThreshold: number, newThreshold: number, keygenInit: EcdsaInitKeygenResult, keygenIds: string[]): Promise<EcdsaKeygenResult>;
|
|
13
|
-
reshareRemainingParty(roomUuid: string, newThreshold: number, keygenResult: EcdsaKeygenResult | string, keygenIds: string[]): Promise<EcdsaKeygenResult>;
|
|
14
|
-
derivePubkey(keygenResult: EcdsaKeygenResult | string, derivationPath?: Uint32Array): Promise<EcdsaPublicKey>;
|
|
15
|
-
getXpub(keygenResult: EcdsaKeygenResult | string): Promise<string>;
|
|
16
|
-
derivePubkeyFromXpub(Xpub: string, derivationPath?: Uint32Array): Promise<EcdsaPublicKey>;
|
|
17
|
-
exportFullPrivateKey(roomUuid: string, keygenResult: EcdsaKeygenResult | string, toExportID: string): Promise<string | undefined>;
|
|
18
|
-
derivePrivateKeyFromXpriv(xpriv: string, derivationPath?: Uint32Array): Promise<string>;
|
|
19
|
-
offlineExportFullPrivateKey(keygenResults: EcdsaKeygenResult[] | string[]): Promise<string>;
|
|
20
|
-
importPrivateKeyRecipient(roomUuid: string, threshold: number, keygenInit: EcdsaInitKeygenResult, keygenIds: string[]): Promise<EcdsaKeygenResult>;
|
|
21
|
-
importPrivateKeyImporter(roomUuid: string, threshold: number, privateKey: string, keygenInit: EcdsaInitKeygenResult, keygenIds: string[]): Promise<EcdsaKeygenResult>;
|
|
22
|
-
protected getHostUrl(path?: string): string;
|
|
23
|
-
}
|
package/internal/core/ecdsa.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
Object.defineProperty(exports,"__esModule",{value:!0}),exports.Ecdsa=void 0;let _1=require("./"),common_1=require("./common");class Ecdsa{constructor(e,t){this.NATIVE=e,this.URL=t}async createRoom(e,t){return(0,common_1.sanitizeNumberOfParties)(e),(await this.NATIVE).createRoom(this.URL,e,t)}async initKeygen(){var e=await(await this.NATIVE).initKeygen();return new _1.EcdsaInitKeygenResult(e.pubkey,e.keypair)}async exportID(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).ecdsaGetExportID(e)}async keygen(e,t,r,a,s){if((0,common_1.sanitizeNumberOfParties)(t,r),s.length!==t-1)throw new Error(`keygenIds length must be exactly: ${t-1}, it is: `+s.length);e=await(await this.NATIVE).ecdsaKeygen(e,this.URL,t,r,a.keygenSecret,s),t=new _1.EcdsaPublicKey(e.pubkey),r=e.secret_share;return new _1.EcdsaKeygenResult(t,r)}async sign(e,t,r,a=new Uint32Array){t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).ecdsaSign(e,this.URL,t,r.toHex(),Array.from(a));return _1.EcdsaSignature.fromBuffer(e)}async refresh(e,t){t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).ecdsaRefresh(e,this.URL,t),t=new _1.EcdsaPublicKey(e.pubkey),e=e.secret_share;return new _1.EcdsaKeygenResult(t,e)}async reshareNewParty(e,t,r,a,s){e=await(await this.NATIVE).ecdsaReshareNewParty(e,this.URL,t,r,a.keygenSecret,s),t=new _1.EcdsaPublicKey(e.pubkey),r=e.secret_share;return new _1.EcdsaKeygenResult(t,r)}async reshareRemainingParty(e,t,r,a){r="string"==typeof r?r:r.secretShare,e=await(await this.NATIVE).ecdsaReshareRemainingParty(e,this.URL,t,r,a),t=new _1.EcdsaPublicKey(e.pubkey),r=e.secret_share;return new _1.EcdsaKeygenResult(t,r)}async derivePubkey(e,t=new Uint32Array){e="string"==typeof e?e:e.secretShare,e=await(await this.NATIVE).ecdsaDerivePubkey(e,Array.from(t));return new _1.EcdsaPublicKey(e)}async getXpub(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).ecdsaGetXpub(e)}async derivePubkeyFromXpub(e,t=new Uint32Array){e=await(await this.NATIVE).ecdsaDerivePubkeyFromXpub(e,Array.from(t));return new _1.EcdsaPublicKey(e)}async exportFullPrivateKey(e,t,r){t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).ecdsaExportFullPrivateKey(e,this.URL,t,r);return e||void 0}async derivePrivateKeyFromXpriv(e,t=new Uint32Array){return(await this.NATIVE).ecdsaDerivePrivateKeyFromXpriv(e,Array.from(t))}async offlineExportFullPrivateKey(e){e=e.map(e=>{if("string"==typeof e)return e;if(e instanceof _1.EcdsaKeygenResult)return e.secretShare;throw"UnknownType"});return(await this.NATIVE).ecdsaOfflineExportFullPrivateKey(e)}async importPrivateKeyRecipient(e,t,r,a){e=await(await this.NATIVE).ecdsaImportPrivateKeyRecipient(e,this.URL,t,r.keygenSecret,a),t=new _1.EcdsaPublicKey(e.pubkey),r=e.secret_share;return new _1.EcdsaKeygenResult(t,r)}async importPrivateKeyImporter(e,t,r,a,s){e=await(await this.NATIVE).ecdsaImportPrivateKeyImporter(e,this.URL,t,r,a.keygenSecret,s),t=new _1.EcdsaPublicKey(e.pubkey),r=e.secret_share;return new _1.EcdsaKeygenResult(t,r)}getHostUrl(e){return e||this.URL}}exports.Ecdsa=Ecdsa;
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
import { Ed25519InitKeygenResult, Ed25519KeygenResult, DynamicNativeSdkInterface } from './';
|
|
2
|
-
export declare class Ed25519 {
|
|
3
|
-
protected readonly NATIVE: Promise<DynamicNativeSdkInterface>;
|
|
4
|
-
protected readonly URL: string;
|
|
5
|
-
protected constructor(native: Promise<DynamicNativeSdkInterface>, url: string);
|
|
6
|
-
initKeygen(): Promise<Ed25519InitKeygenResult>;
|
|
7
|
-
exportID(keygenResult: Ed25519KeygenResult | string): Promise<string>;
|
|
8
|
-
createRoom(numParties: number, apiKey: string): Promise<string>;
|
|
9
|
-
keygen(roomUuid: string, numParties: number, threshold: number, keygenInit: Ed25519InitKeygenResult, keygenIds: string[]): Promise<Ed25519KeygenResult>;
|
|
10
|
-
sign(roomUuid: string, keygenResult: Ed25519KeygenResult | string, msg: Uint8Array | string, derivationPath?: Uint32Array): Promise<Uint8Array>;
|
|
11
|
-
refresh(roomUuid: string, keygenResult: Ed25519KeygenResult | string): Promise<Ed25519KeygenResult>;
|
|
12
|
-
reshareNewParty(roomUuid: string, oldThreshold: number, newThreshold: number, keygenInit: Ed25519InitKeygenResult, keygenIds: string[]): Promise<Ed25519KeygenResult>;
|
|
13
|
-
reshareRemainingParty(roomUuid: string, newThreshold: number, keygenResult: Ed25519KeygenResult | string, keygenIds: string[]): Promise<Ed25519KeygenResult>;
|
|
14
|
-
derivePubkey(keygenResult: Ed25519KeygenResult | string, derivationPath?: Uint32Array): Promise<Uint8Array>;
|
|
15
|
-
getSpub(keygenResult: Ed25519KeygenResult | string): Promise<string>;
|
|
16
|
-
derivePubkeyFromSpub(spub: string, derivation: Uint32Array): Promise<Uint8Array>;
|
|
17
|
-
exportFullPrivateKey(roomUuid: string, keygenResult: Ed25519KeygenResult | string, toExportID: string): Promise<string | undefined>;
|
|
18
|
-
derivePrivateKeyFromSpriv(spriv: string, derivationPath?: Uint32Array): Promise<string>;
|
|
19
|
-
offlineExportFullPrivateKey(keygenResults: Ed25519KeygenResult[] | string[]): Promise<string>;
|
|
20
|
-
importPrivateKeyRecipient(roomUuid: string, threshold: number, keygenInit: Ed25519InitKeygenResult, keygenIds: string[]): Promise<Ed25519KeygenResult>;
|
|
21
|
-
importPrivateKeyImporter(roomUuid: string, threshold: number, privateKey: string, keygenInit: Ed25519InitKeygenResult, keygenIds: string[], isPrivateKeyRaw?: boolean): Promise<Ed25519KeygenResult>;
|
|
22
|
-
}
|
package/internal/core/ed25519.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
Object.defineProperty(exports,"__esModule",{value:!0}),exports.Ed25519=void 0;let _1=require("./"),utils_1=require("@noble/hashes/utils"),common_1=require("./common");class Ed25519{constructor(e,t){this.NATIVE=e,this.URL=t}async initKeygen(){var e=await(await this.NATIVE).initKeygen();return new _1.Ed25519InitKeygenResult(e.pubkey,e.keypair)}async exportID(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).ed25519GetExportID(e)}async createRoom(e,t){return(0,common_1.sanitizeNumberOfParties)(e),(await this.NATIVE).createRoom(this.URL,e,t)}async keygen(e,t,r,i,s){if((0,common_1.sanitizeNumberOfParties)(t,r),s.length!==t-1)throw new Error(`keygenIds length must be exactly: ${t-1}, it is: `+s.length);e=await(await this.NATIVE).ed25519Keygen(e,this.URL,t,r,i.keygenSecret,s);if(e.pubkey&&e.secret_share)return t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share,new _1.Ed25519KeygenResult(t,r);throw new Error("Keygen failed, no public key or secret share was returned.")}async sign(e,t,r,i=new Uint32Array){"string"!=typeof r&&(r=(0,utils_1.bytesToHex)(r));t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).ed25519Sign(e,this.URL,t,r,Array.from(i));return(0,utils_1.hexToBytes)(e)}async refresh(e,t){var t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).ed25519Refresh(e,this.URL,t);if(e.pubkey&&e.secret_share)return t=(0,utils_1.hexToBytes)(e.pubkey),e=e.secret_share,new _1.Ed25519KeygenResult(t,e);throw new Error("Keygen failed, no public key or secret share was returned.")}async reshareNewParty(e,t,r,i,s){e=await(await this.NATIVE).ed25519ReshareNewParty(e,this.URL,t,r,i.keygenSecret,s),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.Ed25519KeygenResult(t,r)}async reshareRemainingParty(e,t,r,i){r="string"==typeof r?r:r.secretShare,e=await(await this.NATIVE).ed25519ReshareRemainingParty(e,this.URL,t,r,i),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.Ed25519KeygenResult(t,r)}async derivePubkey(e,t=new Uint32Array){e="string"==typeof e?e:e.secretShare,e=await(await this.NATIVE).ed25519DerivePubkey(e,Array.from(t));return(0,utils_1.hexToBytes)(e)}async getSpub(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).ed25519GetSpub(e)}async derivePubkeyFromSpub(e,t){e=await(await this.NATIVE).ed25519DerivePubkeyFromSpub(e,Array.from(t));return(0,utils_1.hexToBytes)(e)}async exportFullPrivateKey(e,t,r){t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).ed25519ExportFullPrivateKey(e,this.URL,t,r);return e||void 0}async derivePrivateKeyFromSpriv(e,t=new Uint32Array){return(await this.NATIVE).ed25519DerivePrivateKeyFromSpriv(e,Array.from(t))}async offlineExportFullPrivateKey(e){e=e.map(e=>{if("string"==typeof e)return e;if(e instanceof _1.Ed25519KeygenResult)return e.secretShare;throw"UnknownType"});return(await this.NATIVE).ed25519OfflineExportFullPrivateKey(e)}async importPrivateKeyRecipient(e,t,r,i){e=await(await this.NATIVE).ed25519ImportPrivateKeyRecipient(e,this.URL,t,r.keygenSecret,i),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.Ed25519KeygenResult(t,r)}async importPrivateKeyImporter(e,t,r,i,s,a=!1){e=await(await this.NATIVE).ed25519ImportPrivateKeyImporter(e,this.URL,t,r,i.keygenSecret,s,a),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.Ed25519KeygenResult(t,r)}}exports.Ed25519=Ed25519;
|
|
@@ -1,21 +0,0 @@
|
|
|
1
|
-
import { ExportableEd25519InitKeygenResult, ExportableEd25519KeygenResult, DynamicNativeSdkInterface } from './';
|
|
2
|
-
export declare class ExportableEd25519 {
|
|
3
|
-
protected readonly NATIVE: Promise<DynamicNativeSdkInterface>;
|
|
4
|
-
protected readonly URL: string;
|
|
5
|
-
protected constructor(native: Promise<DynamicNativeSdkInterface>, url: string);
|
|
6
|
-
initKeygen(): Promise<ExportableEd25519InitKeygenResult>;
|
|
7
|
-
exportID(keygenResult: ExportableEd25519KeygenResult | string): Promise<string>;
|
|
8
|
-
createRoom(numParties: number, apiKey: string): Promise<string>;
|
|
9
|
-
sampleKey(roomUuid: string, numParties: number, threshold: number, keygenInit: ExportableEd25519InitKeygenResult, keygenIds: string[]): Promise<ExportableEd25519KeygenResult>;
|
|
10
|
-
receiveKey(roomUuid: string, numParties: number, threshold: number, keygenInit: ExportableEd25519InitKeygenResult, keygenIds: string[]): Promise<ExportableEd25519KeygenResult>;
|
|
11
|
-
sign(roomUuid: string, keygenResult: ExportableEd25519KeygenResult | string, msg: Uint8Array | string): Promise<Uint8Array>;
|
|
12
|
-
refresh(roomUuid: string, keygenResult: ExportableEd25519KeygenResult | string): Promise<ExportableEd25519KeygenResult>;
|
|
13
|
-
reshareNewParty(roomUuid: string, oldThreshold: number, newThreshold: number, keygenInit: ExportableEd25519InitKeygenResult, keygenIds: string[]): Promise<ExportableEd25519KeygenResult>;
|
|
14
|
-
reshareRemainingParty(roomUuid: string, newThreshold: number, keygenResult: ExportableEd25519KeygenResult | string, keygenIds: string[]): Promise<ExportableEd25519KeygenResult>;
|
|
15
|
-
getPrivateKey(keygenResult: ExportableEd25519KeygenResult | string): Promise<string>;
|
|
16
|
-
exportFullPrivateKey(roomUuid: string, keygenResult: ExportableEd25519KeygenResult | string, toExportID: string): Promise<string | undefined>;
|
|
17
|
-
offlineExportFullPrivateKey(keygenResults: ExportableEd25519KeygenResult[] | string[]): Promise<string>;
|
|
18
|
-
importPrivateKeyRecipient(roomUuid: string, threshold: number, keygenInit: ExportableEd25519InitKeygenResult, keygenIds: string[]): Promise<ExportableEd25519KeygenResult>;
|
|
19
|
-
importPrivateKeyImporter(roomUuid: string, threshold: number, privateKey: string, keygenInit: ExportableEd25519InitKeygenResult, keygenIds: string[]): Promise<ExportableEd25519KeygenResult>;
|
|
20
|
-
getPubkey(keygenResult: ExportableEd25519KeygenResult | string): Promise<string>;
|
|
21
|
-
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
Object.defineProperty(exports,"__esModule",{value:!0}),exports.ExportableEd25519=void 0;let _1=require("./"),utils_1=require("@noble/hashes/utils"),common_1=require("./common");class ExportableEd25519{constructor(e,t){this.NATIVE=e,this.URL=t}async initKeygen(){var e=await(await this.NATIVE).initKeygen();return new _1.ExportableEd25519InitKeygenResult(e.pubkey,e.keypair)}async exportID(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).exportableEd25519GetExportID(e)}async createRoom(e,t){return(0,common_1.sanitizeNumberOfParties)(e),(await this.NATIVE).createRoom(this.URL,e,t)}async sampleKey(e,t,r,a,s){if((0,common_1.sanitizeNumberOfParties)(t,r),s.length!==t-1)throw new Error(`keygenIds length must be exactly: ${t-1}, it is: `+s.length);e=await(await this.NATIVE).exportableEd25519SampleKey(e,this.URL,t,r,a.keygenSecret,s);if(e.pubkey&&e.secret_share)return t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share,new _1.ExportableEd25519KeygenResult(t,r);throw new Error("Key sampling failed, no public key or secret share was returned.")}async receiveKey(e,t,r,a,s){if((0,common_1.sanitizeNumberOfParties)(t,r),s.length!==t-1)throw new Error(`keygenIds length must be exactly: ${t-1}, it is: `+s.length);e=await(await this.NATIVE).exportableEd25519ReceiveKey(e,this.URL,t,r,a.keygenSecret,s);if(e.pubkey&&e.secret_share)return t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share,new _1.ExportableEd25519KeygenResult(t,r);throw new Error("Key receive failed, no public key or secret share was returned.")}async sign(e,t,r){"string"!=typeof r&&(r=(0,utils_1.bytesToHex)(r));t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).exportableEd25519Sign(e,this.URL,t,r);return(0,utils_1.hexToBytes)(e)}async refresh(e,t){var t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).exportableEd25519Refresh(e,this.URL,t);if(e.pubkey&&e.secret_share)return t=(0,utils_1.hexToBytes)(e.pubkey),e=e.secret_share,new _1.ExportableEd25519KeygenResult(t,e);throw new Error("Keygen failed, no public key or secret share was returned.")}async reshareNewParty(e,t,r,a,s){e=await(await this.NATIVE).exportableEd25519ReshareNewParty(e,this.URL,t,r,a.keygenSecret,s),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.ExportableEd25519KeygenResult(t,r)}async reshareRemainingParty(e,t,r,a){r="string"==typeof r?r:r.secretShare,e=await(await this.NATIVE).exportableEd25519ReshareRemainingParty(e,this.URL,t,r,a),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.ExportableEd25519KeygenResult(t,r)}async getPrivateKey(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).exportableEd25519GetPubkey(e)}async exportFullPrivateKey(e,t,r){t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).exportableEd25519ExportFullPrivateKey(e,this.URL,t,r);return e||void 0}async offlineExportFullPrivateKey(e){e=e.map(e=>{if("string"==typeof e)return e;if(e instanceof _1.ExportableEd25519KeygenResult)return e.secretShare;throw new Error("UnknownType")});return(await this.NATIVE).exportableEd25519OfflineExportFullPrivateKey(e)}async importPrivateKeyRecipient(e,t,r,a){e=await(await this.NATIVE).exportableEd25519ImportPrivateKeyRecipient(e,this.URL,t,r.keygenSecret,a),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.ExportableEd25519KeygenResult(t,r)}async importPrivateKeyImporter(e,t,r,a,s){e=await(await this.NATIVE).exportableEd25519ImportPrivateKeyImporter(e,this.URL,t,r,a.keygenSecret,s),t=(0,utils_1.hexToBytes)(e.pubkey),r=e.secret_share;return new _1.ExportableEd25519KeygenResult(t,r)}async getPubkey(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).exportableEd25519GetPubkey(e)}}exports.ExportableEd25519=ExportableEd25519;
|
package/internal/core/index.d.ts
DELETED
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
import { EcdsaInitKeygenResult, EcdsaKeygenResult, EcdsaPublicKey, EcdsaSignature, Ed25519InitKeygenResult, Ed25519KeygenResult, ExportableEd25519InitKeygenResult, ExportableEd25519KeygenResult, Sr25519InitKeygenResult, Sr25519KeygenResult, BIP340InitKeygenResult, BIP340KeygenResult, MessageHash } from './types';
|
|
2
|
-
import { Ecdsa } from './ecdsa';
|
|
3
|
-
import { Ed25519 } from './ed25519';
|
|
4
|
-
import { ExportableEd25519 } from './ed25519_exportable';
|
|
5
|
-
import { Sr25519 } from './sr25519';
|
|
6
|
-
import { BIP340 } from './bip340';
|
|
7
|
-
import { DynamicNativeSdkInterface } from './native';
|
|
8
|
-
export { DynamicNativeSdkInterface, EcdsaInitKeygenResult, EcdsaKeygenResult, EcdsaPublicKey, EcdsaSignature, Ed25519InitKeygenResult, Ed25519KeygenResult, ExportableEd25519InitKeygenResult, ExportableEd25519KeygenResult, Sr25519InitKeygenResult, Sr25519KeygenResult, BIP340InitKeygenResult, BIP340KeygenResult, MessageHash, Ecdsa, Ed25519, ExportableEd25519, Sr25519, BIP340, };
|
package/internal/core/index.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
Object.defineProperty(exports,"__esModule",{value:!0}),exports.BIP340=exports.Sr25519=exports.ExportableEd25519=exports.Ed25519=exports.Ecdsa=exports.MessageHash=exports.BIP340KeygenResult=exports.BIP340InitKeygenResult=exports.Sr25519KeygenResult=exports.Sr25519InitKeygenResult=exports.ExportableEd25519KeygenResult=exports.ExportableEd25519InitKeygenResult=exports.Ed25519KeygenResult=exports.Ed25519InitKeygenResult=exports.EcdsaSignature=exports.EcdsaPublicKey=exports.EcdsaKeygenResult=exports.EcdsaInitKeygenResult=void 0;let types_1=require("./types"),ecdsa_1=(Object.defineProperty(exports,"EcdsaInitKeygenResult",{enumerable:!0,get:function(){return types_1.EcdsaInitKeygenResult}}),Object.defineProperty(exports,"EcdsaKeygenResult",{enumerable:!0,get:function(){return types_1.EcdsaKeygenResult}}),Object.defineProperty(exports,"EcdsaPublicKey",{enumerable:!0,get:function(){return types_1.EcdsaPublicKey}}),Object.defineProperty(exports,"EcdsaSignature",{enumerable:!0,get:function(){return types_1.EcdsaSignature}}),Object.defineProperty(exports,"Ed25519InitKeygenResult",{enumerable:!0,get:function(){return types_1.Ed25519InitKeygenResult}}),Object.defineProperty(exports,"Ed25519KeygenResult",{enumerable:!0,get:function(){return types_1.Ed25519KeygenResult}}),Object.defineProperty(exports,"ExportableEd25519InitKeygenResult",{enumerable:!0,get:function(){return types_1.ExportableEd25519InitKeygenResult}}),Object.defineProperty(exports,"ExportableEd25519KeygenResult",{enumerable:!0,get:function(){return types_1.ExportableEd25519KeygenResult}}),Object.defineProperty(exports,"Sr25519InitKeygenResult",{enumerable:!0,get:function(){return types_1.Sr25519InitKeygenResult}}),Object.defineProperty(exports,"Sr25519KeygenResult",{enumerable:!0,get:function(){return types_1.Sr25519KeygenResult}}),Object.defineProperty(exports,"BIP340InitKeygenResult",{enumerable:!0,get:function(){return types_1.BIP340InitKeygenResult}}),Object.defineProperty(exports,"BIP340KeygenResult",{enumerable:!0,get:function(){return types_1.BIP340KeygenResult}}),Object.defineProperty(exports,"MessageHash",{enumerable:!0,get:function(){return types_1.MessageHash}}),require("./ecdsa")),ed25519_1=(Object.defineProperty(exports,"Ecdsa",{enumerable:!0,get:function(){return ecdsa_1.Ecdsa}}),require("./ed25519")),ed25519_exportable_1=(Object.defineProperty(exports,"Ed25519",{enumerable:!0,get:function(){return ed25519_1.Ed25519}}),require("./ed25519_exportable")),sr25519_1=(Object.defineProperty(exports,"ExportableEd25519",{enumerable:!0,get:function(){return ed25519_exportable_1.ExportableEd25519}}),require("./sr25519")),bip340_1=(Object.defineProperty(exports,"Sr25519",{enumerable:!0,get:function(){return sr25519_1.Sr25519}}),require("./bip340"));Object.defineProperty(exports,"BIP340",{enumerable:!0,get:function(){return bip340_1.BIP340}});
|
|
@@ -1,168 +0,0 @@
|
|
|
1
|
-
export interface DynamicNativeSdkInterface {
|
|
2
|
-
initKeygen(): Promise<{
|
|
3
|
-
pubkey: string;
|
|
4
|
-
keypair: string;
|
|
5
|
-
}>;
|
|
6
|
-
createRoom(hostUrl: string, numParties: number, apiKey: string): Promise<string>;
|
|
7
|
-
ecdsaGetExportID(secretShare: string): Promise<string>;
|
|
8
|
-
ecdsaKeygen(roomUUID: string, hostUrl: string, numParties: number, threshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
9
|
-
pubkey: string;
|
|
10
|
-
secret_share: string;
|
|
11
|
-
}>;
|
|
12
|
-
ecdsaSign(roomUUID: string, hostUrl: string, secretShare: string, msgHex: string, derivationPath: number[]): Promise<string>;
|
|
13
|
-
ecdsaRefresh(roomUUID: string, hostUrl: string, secretShare: string): Promise<{
|
|
14
|
-
pubkey: string;
|
|
15
|
-
secret_share: string;
|
|
16
|
-
}>;
|
|
17
|
-
ecdsaReshareNewParty(roomUUID: string, hostUrl: string, oldThreshold: number, newThreshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
18
|
-
pubkey: string;
|
|
19
|
-
secret_share: string;
|
|
20
|
-
}>;
|
|
21
|
-
ecdsaReshareRemainingParty(roomUUID: string, hostUrl: string, newThreshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
22
|
-
pubkey: string;
|
|
23
|
-
secret_share: string;
|
|
24
|
-
}>;
|
|
25
|
-
ecdsaDerivePubkey(secretShare: string, derive: number[]): Promise<string>;
|
|
26
|
-
ecdsaGetXpub(secretShare: string): Promise<string>;
|
|
27
|
-
ecdsaDerivePubkeyFromXpub(xpub: string, derivation: number[]): Promise<string>;
|
|
28
|
-
ecdsaExportFullPrivateKey(roomUUID: string, hostUrl: string, secretShare: string, toExportID: string): Promise<undefined | string>;
|
|
29
|
-
ecdsaDerivePrivateKeyFromXpriv(xpriv: string, derive: number[]): Promise<string>;
|
|
30
|
-
ecdsaOfflineExportFullPrivateKey(keygenResults: string[]): Promise<string>;
|
|
31
|
-
ecdsaImportPrivateKeyRecipient(roomUUID: string, hostUrl: string, threshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
32
|
-
pubkey: string;
|
|
33
|
-
secret_share: string;
|
|
34
|
-
}>;
|
|
35
|
-
ecdsaImportPrivateKeyImporter(roomUUID: string, hostUrl: string, threshold: number, privateKey: string, secretShare: string, keygenIDs: string[]): Promise<{
|
|
36
|
-
pubkey: string;
|
|
37
|
-
secret_share: string;
|
|
38
|
-
}>;
|
|
39
|
-
ed25519GetExportID(secretShare: string): Promise<string>;
|
|
40
|
-
ed25519Keygen(roomUUID: string, hostUrl: string, numParties: number, threshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
41
|
-
pubkey: string;
|
|
42
|
-
secret_share: string;
|
|
43
|
-
}>;
|
|
44
|
-
ed25519Sign(roomUUID: string, hostUrl: string, secretShare: string, msgHex: string, derivationPath: number[]): Promise<string>;
|
|
45
|
-
ed25519Refresh(roomUUID: string, hostUrl: string, secretShare: string): Promise<{
|
|
46
|
-
pubkey: string;
|
|
47
|
-
secret_share: string;
|
|
48
|
-
}>;
|
|
49
|
-
ed25519ReshareNewParty(roomUUID: string, hostUrl: string, oldThreshold: number, newThreshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
50
|
-
pubkey: string;
|
|
51
|
-
secret_share: string;
|
|
52
|
-
}>;
|
|
53
|
-
ed25519ReshareRemainingParty(roomUUID: string, hostUrl: string, newThreshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
54
|
-
pubkey: string;
|
|
55
|
-
secret_share: string;
|
|
56
|
-
}>;
|
|
57
|
-
ed25519DerivePubkey(secretShare: string, derive: number[]): Promise<string>;
|
|
58
|
-
ed25519GetSpub(secretShare: string): Promise<string>;
|
|
59
|
-
ed25519DerivePubkeyFromSpub(spub: string, derivation: number[]): Promise<string>;
|
|
60
|
-
ed25519ExportFullPrivateKey(roomUUID: string, hostUrl: string, secretShare: string, toExportID: string): Promise<undefined | string>;
|
|
61
|
-
ed25519DerivePrivateKeyFromSpriv(spriv: string, derive: number[]): Promise<string>;
|
|
62
|
-
ed25519OfflineExportFullPrivateKey(keygenResults: string[]): Promise<string>;
|
|
63
|
-
ed25519ImportPrivateKeyRecipient(roomUUID: string, hostUrl: string, threshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
64
|
-
pubkey: string;
|
|
65
|
-
secret_share: string;
|
|
66
|
-
}>;
|
|
67
|
-
ed25519ImportPrivateKeyImporter(roomUUID: string, hostUrl: string, threshold: number, privateKey: string, secretShare: string, keygenIDs: string[], isPrivateKeyRaw: boolean): Promise<{
|
|
68
|
-
pubkey: string;
|
|
69
|
-
secret_share: string;
|
|
70
|
-
}>;
|
|
71
|
-
exportableEd25519GetExportID(secretShare: string): Promise<string>;
|
|
72
|
-
exportableEd25519SampleKey(roomUUID: string, hostUrl: string, numParties: number, threshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
73
|
-
pubkey: string;
|
|
74
|
-
secret_share: string;
|
|
75
|
-
}>;
|
|
76
|
-
exportableEd25519ReceiveKey(roomUUID: string, hostUrl: string, numParties: number, threshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
77
|
-
pubkey: string;
|
|
78
|
-
secret_share: string;
|
|
79
|
-
}>;
|
|
80
|
-
exportableEd25519Sign(roomUUID: string, hostUrl: string, secretShare: string, msgHex: string): Promise<string>;
|
|
81
|
-
exportableEd25519Refresh(roomUUID: string, hostUrl: string, secretShare: string): Promise<{
|
|
82
|
-
pubkey: string;
|
|
83
|
-
secret_share: string;
|
|
84
|
-
}>;
|
|
85
|
-
exportableEd25519ReshareNewParty(roomUUID: string, hostUrl: string, oldThreshold: number, newThreshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
86
|
-
pubkey: string;
|
|
87
|
-
secret_share: string;
|
|
88
|
-
}>;
|
|
89
|
-
exportableEd25519ReshareRemainingParty(roomUUID: string, hostUrl: string, newThreshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
90
|
-
pubkey: string;
|
|
91
|
-
secret_share: string;
|
|
92
|
-
}>;
|
|
93
|
-
exportableEd25519GetPubkey(secretShare: string): Promise<string>;
|
|
94
|
-
exportableEd25519ExportFullPrivateKey(roomUUID: string, hostUrl: string, secretShare: string, toExportID: string): Promise<undefined | string>;
|
|
95
|
-
exportableEd25519OfflineExportFullPrivateKey(keygenResults: string[]): Promise<string>;
|
|
96
|
-
exportableEd25519ImportPrivateKeyRecipient(roomUUID: string, hostUrl: string, threshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
97
|
-
pubkey: string;
|
|
98
|
-
secret_share: string;
|
|
99
|
-
}>;
|
|
100
|
-
exportableEd25519ImportPrivateKeyImporter(roomUUID: string, hostUrl: string, threshold: number, privateKey: string, secretShare: string, keygenIDs: string[]): Promise<{
|
|
101
|
-
pubkey: string;
|
|
102
|
-
secret_share: string;
|
|
103
|
-
}>;
|
|
104
|
-
bip340GetExportID(secretShare: string): Promise<string>;
|
|
105
|
-
bip340Keygen(roomUUID: string, hostUrl: string, numParties: number, threshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
106
|
-
pubkey: string;
|
|
107
|
-
secret_share: string;
|
|
108
|
-
}>;
|
|
109
|
-
bip340Sign(roomUUID: string, hostUrl: string, secretShare: string, msgHex: string, derivationPath: number[], tweak: string): Promise<string>;
|
|
110
|
-
bip340Refresh(roomUUID: string, hostUrl: string, secretShare: string): Promise<{
|
|
111
|
-
pubkey: string;
|
|
112
|
-
secret_share: string;
|
|
113
|
-
}>;
|
|
114
|
-
bip340ReshareNewParty(roomUUID: string, hostUrl: string, oldThreshold: number, newThreshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
115
|
-
pubkey: string;
|
|
116
|
-
secret_share: string;
|
|
117
|
-
}>;
|
|
118
|
-
bip340ReshareRemainingParty(roomUUID: string, hostUrl: string, newThreshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
119
|
-
pubkey: string;
|
|
120
|
-
secret_share: string;
|
|
121
|
-
}>;
|
|
122
|
-
bip340DeriveTweakPubkey(secretShare: string, derive: number[], tweak: string): Promise<string>;
|
|
123
|
-
bip340GetXpub(secretShare: string): Promise<string>;
|
|
124
|
-
bip340DeriveTweakPubkeyFromXpub(xpub: string, derivation: number[], optTweak: string): Promise<string>;
|
|
125
|
-
bip340ExportFullPrivateKey(roomUUID: string, hostUrl: string, secretShare: string, toExportID: string): Promise<undefined | string>;
|
|
126
|
-
bip340DerivePrivateKeyFromXpriv(xpriv: string, derive: number[]): Promise<string>;
|
|
127
|
-
bip340OfflineExportFullPrivateKey(keygenResults: string[]): Promise<string>;
|
|
128
|
-
bip340ImportPrivateKeyRecipient(roomUUID: string, hostUrl: string, threshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
129
|
-
pubkey: string;
|
|
130
|
-
secret_share: string;
|
|
131
|
-
}>;
|
|
132
|
-
bip340ImportPrivateKeyImporter(roomUUID: string, hostUrl: string, threshold: number, privateKey: string, secretShare: string, keygenIDs: string[]): Promise<{
|
|
133
|
-
pubkey: string;
|
|
134
|
-
secret_share: string;
|
|
135
|
-
}>;
|
|
136
|
-
sr25519GetExportID(secretShare: string): Promise<string>;
|
|
137
|
-
sr25519Keygen(roomUUID: string, hostUrl: string, numParties: number, threshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
138
|
-
pubkey: string;
|
|
139
|
-
secret_share: string;
|
|
140
|
-
}>;
|
|
141
|
-
sr25519Sign(roomUUID: string, hostUrl: string, secretShare: string, msgHex: string, derivationPath: string[]): Promise<string>;
|
|
142
|
-
sr25519Refresh(roomUUID: string, hostUrl: string, secretShare: string): Promise<{
|
|
143
|
-
pubkey: string;
|
|
144
|
-
secret_share: string;
|
|
145
|
-
}>;
|
|
146
|
-
sr25519ReshareNewParty(roomUUID: string, hostUrl: string, oldThreshold: number, newThreshold: number, keygenSecret: string, keygenIDs: string[]): Promise<{
|
|
147
|
-
pubkey: string;
|
|
148
|
-
secret_share: string;
|
|
149
|
-
}>;
|
|
150
|
-
sr25519ReshareRemainingParty(roomUUID: string, hostUrl: string, newThreshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
151
|
-
pubkey: string;
|
|
152
|
-
secret_share: string;
|
|
153
|
-
}>;
|
|
154
|
-
sr25519DerivePubkey(secretShare: string, derivationPath: string[]): Promise<string>;
|
|
155
|
-
sr25519GetPubkey(secretShare: string): Promise<string>;
|
|
156
|
-
sr25519DerivePubkeyFromPubkey(pubkey: string, derivation: string[]): Promise<string>;
|
|
157
|
-
sr25519ExportFullPrivateKey(roomUUID: string, hostUrl: string, secretShare: string, toExportID: string): Promise<undefined | string>;
|
|
158
|
-
sr25519DerivePrivateKeyFromPrivateKey(privkey: string, derive: string[], isPrivateKeyRaw: boolean): Promise<string>;
|
|
159
|
-
sr25519OfflineExportFullPrivateKey(keygenResults: string[]): Promise<string>;
|
|
160
|
-
sr25519ImportPrivateKeyRecipient(roomUUID: string, hostUrl: string, threshold: number, secretShare: string, keygenIDs: string[]): Promise<{
|
|
161
|
-
pubkey: string;
|
|
162
|
-
secret_share: string;
|
|
163
|
-
}>;
|
|
164
|
-
sr25519ImportPrivateKeyImporter(roomUUID: string, hostUrl: string, threshold: number, privateKey: string, secretShare: string, keygenIDs: string[], isPrivateKeyRaw: boolean): Promise<{
|
|
165
|
-
pubkey: string;
|
|
166
|
-
secret_share: string;
|
|
167
|
-
}>;
|
|
168
|
-
}
|
package/internal/core/native.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
Object.defineProperty(exports,"__esModule",{value:!0});
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
import { Sr25519InitKeygenResult, Sr25519KeygenResult, DynamicNativeSdkInterface } from './';
|
|
2
|
-
export declare class Sr25519 {
|
|
3
|
-
protected readonly NATIVE: Promise<DynamicNativeSdkInterface>;
|
|
4
|
-
protected readonly URL: string;
|
|
5
|
-
protected constructor(native: Promise<DynamicNativeSdkInterface>, url: string);
|
|
6
|
-
initKeygen(): Promise<Sr25519InitKeygenResult>;
|
|
7
|
-
exportID(keygenResult: Sr25519KeygenResult | string): Promise<string>;
|
|
8
|
-
createRoom(numParties: number, apiKey: string): Promise<string>;
|
|
9
|
-
keygen(roomUuid: string, numParties: number, threshold: number, keygenInit: Sr25519InitKeygenResult, keygenIds: string[]): Promise<Sr25519KeygenResult>;
|
|
10
|
-
sign(roomUuid: string, keygenResult: Sr25519KeygenResult | string, msg: Uint8Array | string, derivationPath?: string[]): Promise<Uint8Array>;
|
|
11
|
-
refresh(roomUuid: string, keygenResult: Sr25519KeygenResult | string): Promise<Sr25519KeygenResult>;
|
|
12
|
-
reshareNewParty(roomUuid: string, oldThreshold: number, newThreshold: number, keygenInit: Sr25519InitKeygenResult, keygenIds: string[]): Promise<Sr25519KeygenResult>;
|
|
13
|
-
reshareRemainingParty(roomUuid: string, newThreshold: number, keygenResult: Sr25519KeygenResult | string, keygenIds: string[]): Promise<Sr25519KeygenResult>;
|
|
14
|
-
derivePubkey(keygenResult: Sr25519KeygenResult | string, derivationPath?: string[]): Promise<Uint8Array>;
|
|
15
|
-
getPubkey(keygenResult: Sr25519KeygenResult | string): Promise<Uint8Array>;
|
|
16
|
-
derivePubkeyFromPubkey(pubkey: Uint8Array, derivation: string[]): Promise<Uint8Array>;
|
|
17
|
-
exportFullPrivateKey(roomUuid: string, keygenResult: Sr25519KeygenResult | string, toExportID: string): Promise<string | undefined>;
|
|
18
|
-
derivePrivateKeyFromPrivateKey(privkey: string, isPrivateKeyRaw: boolean, derivationPath?: string[]): Promise<string>;
|
|
19
|
-
offlineExportFullPrivateKey(keygenResults: Sr25519KeygenResult[] | string[]): Promise<string>;
|
|
20
|
-
importPrivateKeyRecipient(roomUuid: string, threshold: number, keygenInit: Sr25519InitKeygenResult, keygenIds: string[]): Promise<Sr25519KeygenResult>;
|
|
21
|
-
importPrivateKeyImporter(roomUuid: string, threshold: number, privateKey: string, keygenInit: Sr25519InitKeygenResult, keygenIds: string[], isPrivateKeyRaw?: boolean): Promise<Sr25519KeygenResult>;
|
|
22
|
-
}
|
package/internal/core/sr25519.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
Object.defineProperty(exports,"__esModule",{value:!0}),exports.Sr25519=void 0;let _1=require("./"),utils_1=require("@noble/hashes/utils"),common_1=require("./common");class Sr25519{constructor(e,r){this.NATIVE=e,this.URL=r}async initKeygen(){var e=await(await this.NATIVE).initKeygen();return new _1.Sr25519InitKeygenResult(e.pubkey,e.keypair)}async exportID(e){e="string"==typeof e?e:e.secretShare;return(await this.NATIVE).sr25519GetExportID(e)}async createRoom(e,r){return(0,common_1.sanitizeNumberOfParties)(e),(await this.NATIVE).createRoom(this.URL,e,r)}async keygen(e,r,t,s,i){if((0,common_1.sanitizeNumberOfParties)(r,t),i.length!==r-1)throw new Error(`keygenIds length must be exactly: ${r-1}, it is: `+i.length);e=await(await this.NATIVE).sr25519Keygen(e,this.URL,r,t,s.keygenSecret,i);if(e.pubkey&&e.secret_share)return r=(0,utils_1.hexToBytes)(e.pubkey),t=e.secret_share,new _1.Sr25519KeygenResult(r,t);throw new Error("Keygen failed, no public key or secret share was returned.")}async sign(e,r,t,s=[]){"string"!=typeof t&&(t=(0,utils_1.bytesToHex)(t));r="string"==typeof r?r:r.secretShare,e=await(await this.NATIVE).sr25519Sign(e,this.URL,r,t,Array.from(s));return(0,utils_1.hexToBytes)(e)}async refresh(e,r){var r="string"==typeof r?r:r.secretShare,e=await(await this.NATIVE).sr25519Refresh(e,this.URL,r);if(e.pubkey&&e.secret_share)return r=(0,utils_1.hexToBytes)(e.pubkey),e=e.secret_share,new _1.Sr25519KeygenResult(r,e);throw new Error("Keygen failed, no public key or secret share was returned.")}async reshareNewParty(e,r,t,s,i){e=await(await this.NATIVE).sr25519ReshareNewParty(e,this.URL,r,t,s.keygenSecret,i),r=(0,utils_1.hexToBytes)(e.pubkey),t=e.secret_share;return new _1.Sr25519KeygenResult(r,t)}async reshareRemainingParty(e,r,t,s){t="string"==typeof t?t:t.secretShare,e=await(await this.NATIVE).sr25519ReshareRemainingParty(e,this.URL,r,t,s),r=(0,utils_1.hexToBytes)(e.pubkey),t=e.secret_share;return new _1.Sr25519KeygenResult(r,t)}async derivePubkey(e,r=[]){e="string"==typeof e?e:e.secretShare,e=await(await this.NATIVE).sr25519DerivePubkey(e,Array.from(r));return(0,utils_1.hexToBytes)(e)}async getPubkey(e){e="string"==typeof e?e:e.secretShare,e=await(await this.NATIVE).sr25519GetPubkey(e);return(0,utils_1.hexToBytes)(e)}async derivePubkeyFromPubkey(e,r){e=await(await this.NATIVE).sr25519DerivePubkeyFromPubkey((0,utils_1.bytesToHex)(e),Array.from(r));return(0,utils_1.hexToBytes)(e)}async exportFullPrivateKey(e,r,t){r="string"==typeof r?r:r.secretShare,e=await(await this.NATIVE).sr25519ExportFullPrivateKey(e,this.URL,r,t);return e||void 0}async derivePrivateKeyFromPrivateKey(e,r,t=[]){return(await this.NATIVE).sr25519DerivePrivateKeyFromPrivateKey(e,Array.from(t),r)}async offlineExportFullPrivateKey(e){e=e.map(e=>{if("string"==typeof e)return e;if(e instanceof _1.Sr25519KeygenResult)return e.secretShare;throw"UnknownType"});return(await this.NATIVE).sr25519OfflineExportFullPrivateKey(e)}async importPrivateKeyRecipient(e,r,t,s){e=await(await this.NATIVE).sr25519ImportPrivateKeyRecipient(e,this.URL,r,t.keygenSecret,s),r=(0,utils_1.hexToBytes)(e.pubkey),t=e.secret_share;return new _1.Sr25519KeygenResult(r,t)}async importPrivateKeyImporter(e,r,t,s,i,a=!1){e=await(await this.NATIVE).sr25519ImportPrivateKeyImporter(e,this.URL,r,t,s.keygenSecret,i,a),r=(0,utils_1.hexToBytes)(e.pubkey),t=e.secret_share;return new _1.Sr25519KeygenResult(r,t)}}exports.Sr25519=Sr25519;
|
package/internal/core/types.d.ts
DELETED
|
@@ -1,78 +0,0 @@
|
|
|
1
|
-
export declare class MessageHash {
|
|
2
|
-
static readonly LENGTH = 32;
|
|
3
|
-
readonly bytes: Uint8Array;
|
|
4
|
-
constructor(bytes: Uint8Array | string);
|
|
5
|
-
static sha256(message: Uint8Array | string): MessageHash;
|
|
6
|
-
static sha256d(message: Uint8Array | string): MessageHash;
|
|
7
|
-
static keccak256(message: Uint8Array | string): MessageHash;
|
|
8
|
-
toHex(): string;
|
|
9
|
-
}
|
|
10
|
-
export declare class EcdsaPublicKey {
|
|
11
|
-
private static readonly LENGTH;
|
|
12
|
-
private readonly pubkey;
|
|
13
|
-
constructor(pubkey: Uint8Array | string);
|
|
14
|
-
serializeUncompressed(): Uint8Array;
|
|
15
|
-
serializeCompressed(): Uint8Array;
|
|
16
|
-
pubKeyAsHex(): string;
|
|
17
|
-
}
|
|
18
|
-
export declare class EcdsaKeygenResult {
|
|
19
|
-
pubkey: EcdsaPublicKey;
|
|
20
|
-
secretShare: string;
|
|
21
|
-
constructor(pubkey: EcdsaPublicKey, secretShare: string);
|
|
22
|
-
}
|
|
23
|
-
export declare class EcdsaInitKeygenResult {
|
|
24
|
-
keygenId: string;
|
|
25
|
-
keygenSecret: string;
|
|
26
|
-
constructor(keygenId: string, keygenSecret: string);
|
|
27
|
-
}
|
|
28
|
-
export declare class Ed25519KeygenResult {
|
|
29
|
-
pubkey: Uint8Array;
|
|
30
|
-
secretShare: string;
|
|
31
|
-
constructor(pubkey: Uint8Array, secretShare: string);
|
|
32
|
-
}
|
|
33
|
-
export declare class Ed25519InitKeygenResult {
|
|
34
|
-
keygenId: string;
|
|
35
|
-
keygenSecret: string;
|
|
36
|
-
constructor(keygenId: string, keygenSecret: string);
|
|
37
|
-
}
|
|
38
|
-
export declare class Sr25519KeygenResult {
|
|
39
|
-
pubkey: Uint8Array;
|
|
40
|
-
secretShare: string;
|
|
41
|
-
constructor(pubkey: Uint8Array, secretShare: string);
|
|
42
|
-
}
|
|
43
|
-
export declare class ExportableEd25519KeygenResult {
|
|
44
|
-
pubkey: Uint8Array;
|
|
45
|
-
secretShare: string;
|
|
46
|
-
constructor(pubkey: Uint8Array, secretShare: string);
|
|
47
|
-
}
|
|
48
|
-
export declare class ExportableEd25519InitKeygenResult {
|
|
49
|
-
keygenId: string;
|
|
50
|
-
keygenSecret: string;
|
|
51
|
-
constructor(keygenId: string, keygenSecret: string);
|
|
52
|
-
}
|
|
53
|
-
export declare class Sr25519InitKeygenResult {
|
|
54
|
-
keygenId: string;
|
|
55
|
-
keygenSecret: string;
|
|
56
|
-
constructor(keygenId: string, keygenSecret: string);
|
|
57
|
-
}
|
|
58
|
-
export declare class EcdsaSignature {
|
|
59
|
-
private static readonly FIELD_SIZE;
|
|
60
|
-
private static readonly MAX_DER_LEN;
|
|
61
|
-
private static readonly MIN_DER_LEN;
|
|
62
|
-
readonly r: Uint8Array;
|
|
63
|
-
readonly s: Uint8Array;
|
|
64
|
-
readonly v: number;
|
|
65
|
-
readonly der: Uint8Array;
|
|
66
|
-
static fromBuffer(expandedSignature: Uint8Array | string): EcdsaSignature;
|
|
67
|
-
constructor(r: Uint8Array, s: Uint8Array, v: number, DERencoding: Uint8Array);
|
|
68
|
-
}
|
|
69
|
-
export declare class BIP340KeygenResult {
|
|
70
|
-
pubkey: Uint8Array;
|
|
71
|
-
secretShare: string;
|
|
72
|
-
constructor(pubkey: Uint8Array, secretShare: string);
|
|
73
|
-
}
|
|
74
|
-
export declare class BIP340InitKeygenResult {
|
|
75
|
-
keygenId: string;
|
|
76
|
-
keygenSecret: string;
|
|
77
|
-
constructor(keygenId: string, keygenSecret: string);
|
|
78
|
-
}
|
package/internal/core/types.js
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
Object.defineProperty(exports,"__esModule",{value:!0}),exports.BIP340InitKeygenResult=exports.BIP340KeygenResult=exports.EcdsaSignature=exports.Sr25519InitKeygenResult=exports.ExportableEd25519InitKeygenResult=exports.ExportableEd25519KeygenResult=exports.Sr25519KeygenResult=exports.Ed25519InitKeygenResult=exports.Ed25519KeygenResult=exports.EcdsaInitKeygenResult=exports.EcdsaKeygenResult=exports.EcdsaPublicKey=exports.MessageHash=void 0;let utils_1=require("@noble/hashes/utils"),sha3_1=require("@noble/hashes/sha3"),sha256_1=require("@noble/hashes/sha256");class MessageHash{constructor(e){if(this.bytes=new Uint8Array,"string"==typeof e){if(e.length!==2*MessageHash.LENGTH)throw new Error("Invalid length for MessageHash: "+e.length);this.bytes=(0,utils_1.hexToBytes)(e)}else{if(e.length!==MessageHash.LENGTH)throw new Error("Invalid length for MessageHash: "+e.length);this.bytes=e}}static sha256(e){return new MessageHash((0,sha256_1.sha256)(e))}static sha256d(e){return new MessageHash((0,sha256_1.sha256)((0,sha256_1.sha256)(e)))}static keccak256(e){return new MessageHash((0,sha3_1.keccak_256)(e))}toHex(){return(0,utils_1.bytesToHex)(this.bytes)}}(exports.MessageHash=MessageHash).LENGTH=32;class EcdsaPublicKey{constructor(e){if((e="string"==typeof e?(0,utils_1.hexToBytes)(e):e).length===EcdsaPublicKey.LENGTH+1)this.pubkey=e.slice(1);else{if(e.length!==EcdsaPublicKey.LENGTH)throw new RangeError(`Invalid ${this.constructor.name} length, expected: ${EcdsaPublicKey.LENGTH} bytes, found: `+e.length);this.pubkey=e}}serializeUncompressed(){return new Uint8Array([4,...this.pubkey])}serializeCompressed(){var e=1&this.pubkey[63];return new Uint8Array([2+e,...this.pubkey.slice(0,32)])}pubKeyAsHex(){return(0,utils_1.bytesToHex)(this.serializeUncompressed())}}(exports.EcdsaPublicKey=EcdsaPublicKey).LENGTH=64;class EcdsaKeygenResult{constructor(e,s){this.pubkey=e,this.secretShare=s}}exports.EcdsaKeygenResult=EcdsaKeygenResult;class EcdsaInitKeygenResult{constructor(e,s){this.keygenId=e,this.keygenSecret=s}}exports.EcdsaInitKeygenResult=EcdsaInitKeygenResult;class Ed25519KeygenResult{constructor(e,s){this.pubkey=e,this.secretShare=s}}exports.Ed25519KeygenResult=Ed25519KeygenResult;class Ed25519InitKeygenResult{constructor(e,s){this.keygenId=e,this.keygenSecret=s}}exports.Ed25519InitKeygenResult=Ed25519InitKeygenResult;class Sr25519KeygenResult{constructor(e,s){this.pubkey=e,this.secretShare=s}}exports.Sr25519KeygenResult=Sr25519KeygenResult;class ExportableEd25519KeygenResult{constructor(e,s){this.pubkey=e,this.secretShare=s}}exports.ExportableEd25519KeygenResult=ExportableEd25519KeygenResult;class ExportableEd25519InitKeygenResult{constructor(e,s){this.keygenId=e,this.keygenSecret=s}}exports.ExportableEd25519InitKeygenResult=ExportableEd25519InitKeygenResult;class Sr25519InitKeygenResult{constructor(e,s){this.keygenId=e,this.keygenSecret=s}}exports.Sr25519InitKeygenResult=Sr25519InitKeygenResult;class EcdsaSignature{static fromBuffer(e){"string"==typeof e&&(e=(0,utils_1.hexToBytes)(e));var s=2*EcdsaSignature.FIELD_SIZE+EcdsaSignature.MAX_DER_LEN+1,t=2*EcdsaSignature.FIELD_SIZE+EcdsaSignature.MIN_DER_LEN+1;if(e.length<t||e.length>s)throw new RangeError(`Invalid ${this.constructor.name} length, expected between ${t}..${s} bytes, found: `+e.length);var t=e.subarray(0,EcdsaSignature.FIELD_SIZE),s=e.subarray(EcdsaSignature.FIELD_SIZE,2*EcdsaSignature.FIELD_SIZE),r=e[2*EcdsaSignature.FIELD_SIZE],e=e.subarray(2*EcdsaSignature.FIELD_SIZE+1);return new EcdsaSignature(t,s,r,e)}constructor(e,s,t,r){if(s.length!==EcdsaSignature.FIELD_SIZE)throw new RangeError(`Invalid 's' length, expected: ${EcdsaSignature.FIELD_SIZE} found: `+s.length);if(e.length!==EcdsaSignature.FIELD_SIZE)throw new RangeError(`Invalid 'r' length, expected: ${EcdsaSignature.FIELD_SIZE} found: `+e.length);if(!Number.isInteger(t)||t<27||30<t)throw new RangeError("Invalid 'v' value, expected 27/28/29/30 found: "+t);if(r.length<EcdsaSignature.MIN_DER_LEN||r.length>EcdsaSignature.MAX_DER_LEN)throw new RangeError(`Invalid DER encoding, expected length: ${EcdsaSignature.MIN_DER_LEN}..${EcdsaSignature.MAX_DER_LEN} found: `+r.length);this.r=e,this.s=s,this.v=t,this.der=r}}(exports.EcdsaSignature=EcdsaSignature).FIELD_SIZE=32,EcdsaSignature.MAX_DER_LEN=72,EcdsaSignature.MIN_DER_LEN=8;class BIP340KeygenResult{constructor(e,s){this.pubkey=e,this.secretShare=s}}exports.BIP340KeygenResult=BIP340KeygenResult;class BIP340InitKeygenResult{constructor(e,s){this.keygenId=e,this.keygenSecret=s}}exports.BIP340InitKeygenResult=BIP340InitKeygenResult;
|