@hashgraphonline/standards-sdk 0.0.185 → 0.0.187

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. package/dist/cjs/hcs-12/wasm/wasm-executor.d.ts.map +1 -1
  2. package/dist/cjs/inscribe/inscriber.d.ts.map +1 -1
  3. package/dist/cjs/standards-sdk.cjs +41 -41
  4. package/dist/cjs/standards-sdk.cjs.map +1 -1
  5. package/dist/es/hcs-12/wasm/wasm-executor.d.ts.map +1 -1
  6. package/dist/es/inscribe/inscriber.d.ts.map +1 -1
  7. package/dist/es/standards-sdk.es22.js +2 -2
  8. package/dist/es/standards-sdk.es29.js +2 -2
  9. package/dist/es/standards-sdk.es32.js +2 -2
  10. package/dist/es/standards-sdk.es37.js +1 -1
  11. package/dist/es/standards-sdk.es42.js +2 -1
  12. package/dist/es/standards-sdk.es42.js.map +1 -1
  13. package/dist/es/standards-sdk.es59.js +6 -6
  14. package/dist/es/standards-sdk.es64.js +1 -1
  15. package/dist/es/standards-sdk.es65.js +1 -1
  16. package/dist/es/standards-sdk.es66.js +12 -7
  17. package/dist/es/standards-sdk.es66.js.map +1 -1
  18. package/dist/es/standards-sdk.es73.js +5 -5
  19. package/dist/es/standards-sdk.es76.js +188 -156
  20. package/dist/es/standards-sdk.es76.js.map +1 -1
  21. package/dist/es/standards-sdk.es77.js +139 -289
  22. package/dist/es/standards-sdk.es77.js.map +1 -1
  23. package/dist/es/standards-sdk.es78.js +274 -298
  24. package/dist/es/standards-sdk.es78.js.map +1 -1
  25. package/dist/es/standards-sdk.es79.js +262 -369
  26. package/dist/es/standards-sdk.es79.js.map +1 -1
  27. package/dist/es/standards-sdk.es80.js +316 -194
  28. package/dist/es/standards-sdk.es80.js.map +1 -1
  29. package/dist/es/standards-sdk.es81.js +328 -303
  30. package/dist/es/standards-sdk.es81.js.map +1 -1
  31. package/dist/es/standards-sdk.es82.js +302 -72
  32. package/dist/es/standards-sdk.es82.js.map +1 -1
  33. package/dist/es/standards-sdk.es83.js +66 -194
  34. package/dist/es/standards-sdk.es83.js.map +1 -1
  35. package/dist/es/standards-sdk.es91.js +32 -205
  36. package/dist/es/standards-sdk.es91.js.map +1 -1
  37. package/dist/es/standards-sdk.es92.js +205 -32
  38. package/dist/es/standards-sdk.es92.js.map +1 -1
  39. package/package.json +1 -1
@@ -1,37 +1,210 @@
1
- function detectCryptoEnvironment() {
2
- const isSSR = typeof window === "undefined";
3
- let hasNodeCrypto = false;
4
- let hasWebCrypto = false;
5
- try {
6
- hasNodeCrypto = typeof require !== "undefined" && typeof process !== "undefined" && !!process.versions?.node;
7
- } catch {
8
- hasNodeCrypto = false;
9
- }
10
- try {
11
- hasWebCrypto = typeof crypto !== "undefined" && typeof crypto.subtle !== "undefined" && !isSSR;
12
- } catch {
13
- hasWebCrypto = false;
14
- }
15
- let preferredAPI;
16
- if (hasNodeCrypto && isSSR) {
17
- preferredAPI = "node";
18
- } else if (hasWebCrypto && !isSSR) {
19
- preferredAPI = "web";
20
- } else {
21
- preferredAPI = "none";
22
- }
23
- return {
24
- hasNodeCrypto,
25
- hasWebCrypto,
26
- isSSR,
27
- preferredAPI
28
- };
1
+ import { detectCryptoEnvironment } from "./standards-sdk.es91.js";
2
+ import { FallbackHashAdapter, WebHashAdapter, NodeHashAdapter } from "./standards-sdk.es93.js";
3
+ class NodeHmacAdapter {
4
+ constructor(nodeHmac) {
5
+ this.nodeHmac = nodeHmac;
6
+ }
7
+ update(data) {
8
+ this.nodeHmac.update(data);
9
+ return this;
10
+ }
11
+ digest(encoding) {
12
+ return this.nodeHmac.digest(encoding);
13
+ }
14
+ }
15
+ class WebHmacAdapter {
16
+ constructor(key, algorithm = "sha256") {
17
+ this.key = key;
18
+ this.algorithm = algorithm;
19
+ this.data = [];
20
+ }
21
+ update(data) {
22
+ this.data.push(data);
23
+ return this;
24
+ }
25
+ async digest(encoding) {
26
+ const combined = Buffer.concat(this.data);
27
+ const keyBuffer = await crypto.subtle.importKey(
28
+ "raw",
29
+ this.key,
30
+ { name: "HMAC", hash: this.mapAlgorithm(this.algorithm) },
31
+ false,
32
+ ["sign"]
33
+ );
34
+ const signature = await crypto.subtle.sign("HMAC", keyBuffer, combined);
35
+ if (encoding === "hex") {
36
+ return Array.from(new Uint8Array(signature)).map((b) => b.toString(16).padStart(2, "0")).join("");
37
+ }
38
+ return Buffer.from(signature);
39
+ }
40
+ mapAlgorithm(algorithm) {
41
+ const algorithmMap = {
42
+ sha256: "SHA-256",
43
+ sha1: "SHA-1",
44
+ sha512: "SHA-512"
45
+ };
46
+ return algorithmMap[algorithm.toLowerCase()] || "SHA-256";
47
+ }
29
48
  }
30
- function isSSREnvironment() {
31
- return typeof window === "undefined";
49
+ class FallbackHmacAdapter {
50
+ constructor(key, algorithm = "sha256") {
51
+ this.key = key;
52
+ this.algorithm = algorithm;
53
+ this.data = [];
54
+ }
55
+ update(data) {
56
+ this.data.push(data);
57
+ return this;
58
+ }
59
+ digest(encoding) {
60
+ const combined = Buffer.concat(this.data);
61
+ const hash2 = this.simpleHmac(combined, this.key);
62
+ if (encoding === "hex") {
63
+ return hash2.toString(16).padStart(8, "0");
64
+ }
65
+ return hash2.toString();
66
+ }
67
+ simpleHmac(data, key) {
68
+ let hash2 = 0;
69
+ for (let i = 0; i < data.length; i++) {
70
+ const keyByte = key[i % key.length];
71
+ hash2 = (hash2 << 5) - hash2 + data[i] + keyByte & 4294967295;
72
+ }
73
+ return Math.abs(hash2);
74
+ }
75
+ }
76
+ class NodeCryptoAdapter {
77
+ constructor() {
78
+ try {
79
+ const moduleName = "crypto";
80
+ this.crypto = require(moduleName);
81
+ } catch (error) {
82
+ throw new Error("Node.js crypto module not available");
83
+ }
84
+ }
85
+ createHash(algorithm) {
86
+ return new NodeHashAdapter(this.crypto.createHash(algorithm));
87
+ }
88
+ createHmac(algorithm, key) {
89
+ return new NodeHmacAdapter(this.crypto.createHmac(algorithm, key));
90
+ }
91
+ async pbkdf2(password, salt, iterations, keylen, digest) {
92
+ return new Promise((resolve, reject) => {
93
+ this.crypto.pbkdf2(
94
+ password,
95
+ salt,
96
+ iterations,
97
+ keylen,
98
+ digest,
99
+ (err, derivedKey) => {
100
+ if (err) reject(err);
101
+ else resolve(derivedKey);
102
+ }
103
+ );
104
+ });
105
+ }
106
+ timingSafeEqual(a, b) {
107
+ return this.crypto.timingSafeEqual(a, b);
108
+ }
109
+ }
110
+ class WebCryptoAdapter {
111
+ createHash(algorithm) {
112
+ return new WebHashAdapter(algorithm);
113
+ }
114
+ createHmac(algorithm, key) {
115
+ return new WebHmacAdapter(key, algorithm);
116
+ }
117
+ async pbkdf2(password, salt, iterations, keylen, digest) {
118
+ const encoder = new TextEncoder();
119
+ const keyMaterial = await crypto.subtle.importKey(
120
+ "raw",
121
+ encoder.encode(password),
122
+ { name: "PBKDF2" },
123
+ false,
124
+ ["deriveBits"]
125
+ );
126
+ const derivedBits = await crypto.subtle.deriveBits(
127
+ {
128
+ name: "PBKDF2",
129
+ salt,
130
+ iterations,
131
+ hash: this.mapDigest(digest)
132
+ },
133
+ keyMaterial,
134
+ keylen * 8
135
+ );
136
+ return Buffer.from(derivedBits);
137
+ }
138
+ timingSafeEqual(a, b) {
139
+ if (a.length !== b.length) return false;
140
+ let result = 0;
141
+ for (let i = 0; i < a.length; i++) {
142
+ result |= a[i] ^ b[i];
143
+ }
144
+ return result === 0;
145
+ }
146
+ mapDigest(digest) {
147
+ const digestMap = {
148
+ sha256: "SHA-256",
149
+ sha1: "SHA-1",
150
+ sha512: "SHA-512"
151
+ };
152
+ return digestMap[digest.toLowerCase()] || "SHA-256";
153
+ }
154
+ }
155
+ class FallbackCryptoAdapter {
156
+ createHash(algorithm) {
157
+ return new FallbackHashAdapter(algorithm);
158
+ }
159
+ createHmac(algorithm, key) {
160
+ return new FallbackHmacAdapter(key, algorithm);
161
+ }
162
+ async pbkdf2(password, salt, iterations, keylen, digest) {
163
+ const encoder = new TextEncoder();
164
+ const passwordBuffer = Buffer.from(encoder.encode(password));
165
+ let result = Buffer.alloc(keylen);
166
+ for (let i = 0; i < iterations; i++) {
167
+ const combined = Buffer.concat([passwordBuffer, salt, Buffer.from([i])]);
168
+ let hash2 = 0;
169
+ for (let j = 0; j < combined.length; j++) {
170
+ hash2 = (hash2 << 5) - hash2 + combined[j] & 4294967295;
171
+ }
172
+ result[i % keylen] ^= hash2 & 255;
173
+ }
174
+ return result;
175
+ }
176
+ timingSafeEqual(a, b) {
177
+ if (a.length !== b.length) return false;
178
+ let result = 0;
179
+ for (let i = 0; i < a.length; i++) {
180
+ result |= a[i] ^ b[i];
181
+ }
182
+ return result === 0;
183
+ }
184
+ }
185
+ function getCryptoAdapter() {
186
+ const env = detectCryptoEnvironment();
187
+ switch (env.preferredAPI) {
188
+ case "node":
189
+ try {
190
+ return new NodeCryptoAdapter();
191
+ } catch {
192
+ return new FallbackCryptoAdapter();
193
+ }
194
+ case "web":
195
+ return new WebCryptoAdapter();
196
+ case "none":
197
+ default:
198
+ return new FallbackCryptoAdapter();
199
+ }
32
200
  }
33
201
  export {
34
- detectCryptoEnvironment,
35
- isSSREnvironment
202
+ FallbackCryptoAdapter,
203
+ FallbackHmacAdapter,
204
+ NodeCryptoAdapter,
205
+ NodeHmacAdapter,
206
+ WebCryptoAdapter,
207
+ WebHmacAdapter,
208
+ getCryptoAdapter
36
209
  };
37
210
  //# sourceMappingURL=standards-sdk.es92.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"standards-sdk.es92.js","sources":["../../src/utils/crypto-env.ts"],"sourcesContent":["/**\n * Crypto Environment Detection Utility\n *\n * Detects available cryptographic APIs and determines the best\n * crypto implementation for the current environment (Node.js, browser, or SSR).\n */\n\nexport interface CryptoEnvironment {\n hasNodeCrypto: boolean;\n hasWebCrypto: boolean;\n isSSR: boolean;\n preferredAPI: 'node' | 'web' | 'none';\n}\n\n/**\n * Detect current cryptographic environment\n */\nexport function detectCryptoEnvironment(): CryptoEnvironment {\n const isSSR = typeof window === 'undefined';\n\n let hasNodeCrypto = false;\n let hasWebCrypto = false;\n\n try {\n hasNodeCrypto =\n typeof require !== 'undefined' &&\n typeof process !== 'undefined' &&\n !!process.versions?.node;\n } catch {\n hasNodeCrypto = false;\n }\n\n try {\n hasWebCrypto =\n typeof crypto !== 'undefined' &&\n typeof crypto.subtle !== 'undefined' &&\n !isSSR;\n } catch {\n hasWebCrypto = false;\n }\n\n let preferredAPI: 'node' | 'web' | 'none';\n\n if (hasNodeCrypto && isSSR) {\n preferredAPI = 'node';\n } else if (hasWebCrypto && !isSSR) {\n preferredAPI = 'web';\n } else {\n preferredAPI = 'none';\n }\n\n return {\n hasNodeCrypto,\n hasWebCrypto,\n isSSR,\n preferredAPI,\n };\n}\n\n/**\n * Check if crypto operations are available\n */\nexport function isCryptoAvailable(): boolean {\n const env = detectCryptoEnvironment();\n return env.preferredAPI !== 'none';\n}\n\n/**\n * Check if running in server-side rendering context\n */\nexport function isSSREnvironment(): boolean {\n return typeof window === 'undefined';\n}\n"],"names":[],"mappings":"AAiBO,SAAS,0BAA6C;AAC3D,QAAM,QAAQ,OAAO,WAAW;AAEhC,MAAI,gBAAgB;AACpB,MAAI,eAAe;AAEnB,MAAI;AACF,oBACE,OAAO,YAAY,eACnB,OAAO,YAAY,eACnB,CAAC,CAAC,QAAQ,UAAU;AAAA,EACxB,QAAQ;AACN,oBAAgB;AAAA,EAClB;AAEA,MAAI;AACF,mBACE,OAAO,WAAW,eAClB,OAAO,OAAO,WAAW,eACzB,CAAC;AAAA,EACL,QAAQ;AACN,mBAAe;AAAA,EACjB;AAEA,MAAI;AAEJ,MAAI,iBAAiB,OAAO;AAC1B,mBAAe;AAAA,EACjB,WAAW,gBAAgB,CAAC,OAAO;AACjC,mBAAe;AAAA,EACjB,OAAO;AACL,mBAAe;AAAA,EACjB;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EAAA;AAEJ;AAaO,SAAS,mBAA4B;AAC1C,SAAO,OAAO,WAAW;AAC3B;"}
1
+ {"version":3,"file":"standards-sdk.es92.js","sources":["../../src/utils/crypto-abstraction.ts"],"sourcesContent":["/**\n * Crypto Abstraction Layer\n *\n * Provides a unified interface for cryptographic operations that works\n * across Node.js, browser, and SSR environments.\n */\n\nimport { detectCryptoEnvironment } from './crypto-env';\nimport {\n HashAdapter,\n NodeHashAdapter,\n WebHashAdapter,\n FallbackHashAdapter,\n} from './hash-adapter';\n\n/**\n * HMAC Adapter interface\n */\nexport interface HmacAdapter {\n update(data: Buffer): HmacAdapter;\n digest(encoding?: string): string | Buffer | Promise<string | Buffer>;\n}\n\n/**\n * Node.js HMAC adapter\n */\nexport class NodeHmacAdapter implements HmacAdapter {\n constructor(private nodeHmac: any) {}\n\n update(data: Buffer): HmacAdapter {\n this.nodeHmac.update(data);\n return this;\n }\n\n digest(encoding?: string): string | Buffer {\n return this.nodeHmac.digest(encoding);\n }\n}\n\n/**\n * WebCrypto HMAC adapter\n */\nexport class WebHmacAdapter implements HmacAdapter {\n private data: Buffer[] = [];\n\n constructor(\n private key: Buffer,\n private algorithm: string = 'sha256',\n ) {}\n\n update(data: Buffer): HmacAdapter {\n this.data.push(data);\n return this;\n }\n\n async digest(encoding?: string): Promise<string | Buffer> {\n const combined = Buffer.concat(this.data);\n const keyBuffer = await crypto.subtle.importKey(\n 'raw',\n this.key,\n { name: 'HMAC', hash: this.mapAlgorithm(this.algorithm) },\n false,\n ['sign'],\n );\n\n const signature = await crypto.subtle.sign('HMAC', keyBuffer, combined);\n\n if (encoding === 'hex') {\n return Array.from(new Uint8Array(signature))\n .map(b => b.toString(16).padStart(2, '0'))\n .join('');\n }\n\n return Buffer.from(signature);\n }\n\n private mapAlgorithm(algorithm: string): string {\n const algorithmMap: Record<string, string> = {\n sha256: 'SHA-256',\n sha1: 'SHA-1',\n sha512: 'SHA-512',\n };\n\n return algorithmMap[algorithm.toLowerCase()] || 'SHA-256';\n }\n}\n\n/**\n * Fallback HMAC adapter\n */\nexport class FallbackHmacAdapter implements HmacAdapter {\n private data: Buffer[] = [];\n\n constructor(\n private key: Buffer,\n private algorithm: string = 'sha256',\n ) {}\n\n update(data: Buffer): HmacAdapter {\n this.data.push(data);\n return this;\n }\n\n digest(encoding?: string): string {\n const combined = Buffer.concat(this.data);\n const hash = this.simpleHmac(combined, this.key);\n\n if (encoding === 'hex') {\n return hash.toString(16).padStart(8, '0');\n }\n\n return hash.toString();\n }\n\n private simpleHmac(data: Buffer, key: Buffer): number {\n let hash = 0;\n for (let i = 0; i < data.length; i++) {\n const keyByte = key[i % key.length];\n hash = ((hash << 5) - hash + data[i] + keyByte) & 0xffffffff;\n }\n return Math.abs(hash);\n }\n}\n\n/**\n * Main crypto adapter interface\n */\nexport interface CryptoAdapter {\n createHash(algorithm: string): HashAdapter;\n createHmac(algorithm: string, key: Buffer): HmacAdapter;\n pbkdf2(\n password: string,\n salt: Buffer,\n iterations: number,\n keylen: number,\n digest: string,\n ): Promise<Buffer>;\n timingSafeEqual(a: Buffer, b: Buffer): boolean;\n}\n\n// @ts-ignore - Declare crypto module to avoid bundler processing\ndeclare const require: any;\n\n/**\n * Node.js crypto adapter\n */\nexport class NodeCryptoAdapter implements CryptoAdapter {\n private crypto: any;\n\n constructor() {\n try {\n // Use string concatenation to avoid static analysis by bundlers\n const moduleName = 'cry' + 'pto';\n this.crypto = require(moduleName);\n } catch (error) {\n throw new Error('Node.js crypto module not available');\n }\n }\n\n createHash(algorithm: string): HashAdapter {\n return new NodeHashAdapter(this.crypto.createHash(algorithm));\n }\n\n createHmac(algorithm: string, key: Buffer): HmacAdapter {\n return new NodeHmacAdapter(this.crypto.createHmac(algorithm, key));\n }\n\n async pbkdf2(\n password: string,\n salt: Buffer,\n iterations: number,\n keylen: number,\n digest: string,\n ): Promise<Buffer> {\n return new Promise((resolve, reject) => {\n this.crypto.pbkdf2(\n password,\n salt,\n iterations,\n keylen,\n digest,\n (err: any, derivedKey: Buffer) => {\n if (err) reject(err);\n else resolve(derivedKey);\n },\n );\n });\n }\n\n timingSafeEqual(a: Buffer, b: Buffer): boolean {\n return this.crypto.timingSafeEqual(a, b);\n }\n}\n\n/**\n * WebCrypto adapter\n */\nexport class WebCryptoAdapter implements CryptoAdapter {\n createHash(algorithm: string): HashAdapter {\n return new WebHashAdapter(algorithm);\n }\n\n createHmac(algorithm: string, key: Buffer): HmacAdapter {\n return new WebHmacAdapter(key, algorithm);\n }\n\n async pbkdf2(\n password: string,\n salt: Buffer,\n iterations: number,\n keylen: number,\n digest: string,\n ): Promise<Buffer> {\n const encoder = new TextEncoder();\n const keyMaterial = await crypto.subtle.importKey(\n 'raw',\n encoder.encode(password),\n { name: 'PBKDF2' },\n false,\n ['deriveBits'],\n );\n\n const derivedBits = await crypto.subtle.deriveBits(\n {\n name: 'PBKDF2',\n salt: salt,\n iterations: iterations,\n hash: this.mapDigest(digest),\n },\n keyMaterial,\n keylen * 8,\n );\n\n return Buffer.from(derivedBits);\n }\n\n timingSafeEqual(a: Buffer, b: Buffer): boolean {\n if (a.length !== b.length) return false;\n\n let result = 0;\n for (let i = 0; i < a.length; i++) {\n result |= a[i] ^ b[i];\n }\n return result === 0;\n }\n\n private mapDigest(digest: string): string {\n const digestMap: Record<string, string> = {\n sha256: 'SHA-256',\n sha1: 'SHA-1',\n sha512: 'SHA-512',\n };\n\n return digestMap[digest.toLowerCase()] || 'SHA-256';\n }\n}\n\n/**\n * Fallback crypto adapter for SSR\n */\nexport class FallbackCryptoAdapter implements CryptoAdapter {\n createHash(algorithm: string): HashAdapter {\n return new FallbackHashAdapter(algorithm);\n }\n\n createHmac(algorithm: string, key: Buffer): HmacAdapter {\n return new FallbackHmacAdapter(key, algorithm);\n }\n\n async pbkdf2(\n password: string,\n salt: Buffer,\n iterations: number,\n keylen: number,\n digest: string,\n ): Promise<Buffer> {\n const encoder = new TextEncoder();\n const passwordBuffer = Buffer.from(encoder.encode(password));\n let result = Buffer.alloc(keylen);\n\n for (let i = 0; i < iterations; i++) {\n const combined = Buffer.concat([passwordBuffer, salt, Buffer.from([i])]);\n let hash = 0;\n for (let j = 0; j < combined.length; j++) {\n hash = ((hash << 5) - hash + combined[j]) & 0xffffffff;\n }\n result[i % keylen] ^= hash & 0xff;\n }\n\n return result;\n }\n\n timingSafeEqual(a: Buffer, b: Buffer): boolean {\n if (a.length !== b.length) return false;\n\n let result = 0;\n for (let i = 0; i < a.length; i++) {\n result |= a[i] ^ b[i];\n }\n return result === 0;\n }\n}\n\n/**\n * Get appropriate crypto adapter for current environment\n */\nexport function getCryptoAdapter(): CryptoAdapter {\n const env = detectCryptoEnvironment();\n\n switch (env.preferredAPI) {\n case 'node':\n try {\n return new NodeCryptoAdapter();\n } catch {\n return new FallbackCryptoAdapter();\n }\n case 'web':\n return new WebCryptoAdapter();\n case 'none':\n default:\n return new FallbackCryptoAdapter();\n }\n}\n\n/**\n * Convenience function for simple hash operations\n */\nexport async function hash(\n content: Buffer | string,\n algorithm: string = 'sha256',\n): Promise<string> {\n const adapter = getCryptoAdapter();\n const hasher = adapter.createHash(algorithm);\n const buffer = typeof content === 'string' ? Buffer.from(content) : content;\n const result = hasher.update(buffer).digest('hex');\n\n if (result instanceof Promise) {\n return (await result) as string;\n }\n\n return result as string;\n}\n"],"names":["hash"],"mappings":";;AA0BO,MAAM,gBAAuC;AAAA,EAClD,YAAoB,UAAe;AAAf,SAAA,WAAA;AAAA,EAAgB;AAAA,EAEpC,OAAO,MAA2B;AAChC,SAAK,SAAS,OAAO,IAAI;AACzB,WAAO;AAAA,EACT;AAAA,EAEA,OAAO,UAAoC;AACzC,WAAO,KAAK,SAAS,OAAO,QAAQ;AAAA,EACtC;AACF;AAKO,MAAM,eAAsC;AAAA,EAGjD,YACU,KACA,YAAoB,UAC5B;AAFQ,SAAA,MAAA;AACA,SAAA,YAAA;AAJV,SAAQ,OAAiB,CAAA;AAAA,EAKtB;AAAA,EAEH,OAAO,MAA2B;AAChC,SAAK,KAAK,KAAK,IAAI;AACnB,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,OAAO,UAA6C;AACxD,UAAM,WAAW,OAAO,OAAO,KAAK,IAAI;AACxC,UAAM,YAAY,MAAM,OAAO,OAAO;AAAA,MACpC;AAAA,MACA,KAAK;AAAA,MACL,EAAE,MAAM,QAAQ,MAAM,KAAK,aAAa,KAAK,SAAS,EAAA;AAAA,MACtD;AAAA,MACA,CAAC,MAAM;AAAA,IAAA;AAGT,UAAM,YAAY,MAAM,OAAO,OAAO,KAAK,QAAQ,WAAW,QAAQ;AAEtE,QAAI,aAAa,OAAO;AACtB,aAAO,MAAM,KAAK,IAAI,WAAW,SAAS,CAAC,EACxC,IAAI,CAAA,MAAK,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,EACxC,KAAK,EAAE;AAAA,IACZ;AAEA,WAAO,OAAO,KAAK,SAAS;AAAA,EAC9B;AAAA,EAEQ,aAAa,WAA2B;AAC9C,UAAM,eAAuC;AAAA,MAC3C,QAAQ;AAAA,MACR,MAAM;AAAA,MACN,QAAQ;AAAA,IAAA;AAGV,WAAO,aAAa,UAAU,YAAA,CAAa,KAAK;AAAA,EAClD;AACF;AAKO,MAAM,oBAA2C;AAAA,EAGtD,YACU,KACA,YAAoB,UAC5B;AAFQ,SAAA,MAAA;AACA,SAAA,YAAA;AAJV,SAAQ,OAAiB,CAAA;AAAA,EAKtB;AAAA,EAEH,OAAO,MAA2B;AAChC,SAAK,KAAK,KAAK,IAAI;AACnB,WAAO;AAAA,EACT;AAAA,EAEA,OAAO,UAA2B;AAChC,UAAM,WAAW,OAAO,OAAO,KAAK,IAAI;AACxC,UAAMA,QAAO,KAAK,WAAW,UAAU,KAAK,GAAG;AAE/C,QAAI,aAAa,OAAO;AACtB,aAAOA,MAAK,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG;AAAA,IAC1C;AAEA,WAAOA,MAAK,SAAA;AAAA,EACd;AAAA,EAEQ,WAAW,MAAc,KAAqB;AACpD,QAAIA,QAAO;AACX,aAAS,IAAI,GAAG,IAAI,KAAK,QAAQ,KAAK;AACpC,YAAM,UAAU,IAAI,IAAI,IAAI,MAAM;AAClCA,eAASA,SAAQ,KAAKA,QAAO,KAAK,CAAC,IAAI,UAAW;AAAA,IACpD;AACA,WAAO,KAAK,IAAIA,KAAI;AAAA,EACtB;AACF;AAwBO,MAAM,kBAA2C;AAAA,EAGtD,cAAc;AACZ,QAAI;AAEF,YAAM,aAAa;AACnB,WAAK,SAAS,QAAQ,UAAU;AAAA,IAClC,SAAS,OAAO;AACd,YAAM,IAAI,MAAM,qCAAqC;AAAA,IACvD;AAAA,EACF;AAAA,EAEA,WAAW,WAAgC;AACzC,WAAO,IAAI,gBAAgB,KAAK,OAAO,WAAW,SAAS,CAAC;AAAA,EAC9D;AAAA,EAEA,WAAW,WAAmB,KAA0B;AACtD,WAAO,IAAI,gBAAgB,KAAK,OAAO,WAAW,WAAW,GAAG,CAAC;AAAA,EACnE;AAAA,EAEA,MAAM,OACJ,UACA,MACA,YACA,QACA,QACiB;AACjB,WAAO,IAAI,QAAQ,CAAC,SAAS,WAAW;AACtC,WAAK,OAAO;AAAA,QACV;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA,CAAC,KAAU,eAAuB;AAChC,cAAI,YAAY,GAAG;AAAA,uBACN,UAAU;AAAA,QACzB;AAAA,MAAA;AAAA,IAEJ,CAAC;AAAA,EACH;AAAA,EAEA,gBAAgB,GAAW,GAAoB;AAC7C,WAAO,KAAK,OAAO,gBAAgB,GAAG,CAAC;AAAA,EACzC;AACF;AAKO,MAAM,iBAA0C;AAAA,EACrD,WAAW,WAAgC;AACzC,WAAO,IAAI,eAAe,SAAS;AAAA,EACrC;AAAA,EAEA,WAAW,WAAmB,KAA0B;AACtD,WAAO,IAAI,eAAe,KAAK,SAAS;AAAA,EAC1C;AAAA,EAEA,MAAM,OACJ,UACA,MACA,YACA,QACA,QACiB;AACjB,UAAM,UAAU,IAAI,YAAA;AACpB,UAAM,cAAc,MAAM,OAAO,OAAO;AAAA,MACtC;AAAA,MACA,QAAQ,OAAO,QAAQ;AAAA,MACvB,EAAE,MAAM,SAAA;AAAA,MACR;AAAA,MACA,CAAC,YAAY;AAAA,IAAA;AAGf,UAAM,cAAc,MAAM,OAAO,OAAO;AAAA,MACtC;AAAA,QACE,MAAM;AAAA,QACN;AAAA,QACA;AAAA,QACA,MAAM,KAAK,UAAU,MAAM;AAAA,MAAA;AAAA,MAE7B;AAAA,MACA,SAAS;AAAA,IAAA;AAGX,WAAO,OAAO,KAAK,WAAW;AAAA,EAChC;AAAA,EAEA,gBAAgB,GAAW,GAAoB;AAC7C,QAAI,EAAE,WAAW,EAAE,OAAQ,QAAO;AAElC,QAAI,SAAS;AACb,aAAS,IAAI,GAAG,IAAI,EAAE,QAAQ,KAAK;AACjC,gBAAU,EAAE,CAAC,IAAI,EAAE,CAAC;AAAA,IACtB;AACA,WAAO,WAAW;AAAA,EACpB;AAAA,EAEQ,UAAU,QAAwB;AACxC,UAAM,YAAoC;AAAA,MACxC,QAAQ;AAAA,MACR,MAAM;AAAA,MACN,QAAQ;AAAA,IAAA;AAGV,WAAO,UAAU,OAAO,YAAA,CAAa,KAAK;AAAA,EAC5C;AACF;AAKO,MAAM,sBAA+C;AAAA,EAC1D,WAAW,WAAgC;AACzC,WAAO,IAAI,oBAAoB,SAAS;AAAA,EAC1C;AAAA,EAEA,WAAW,WAAmB,KAA0B;AACtD,WAAO,IAAI,oBAAoB,KAAK,SAAS;AAAA,EAC/C;AAAA,EAEA,MAAM,OACJ,UACA,MACA,YACA,QACA,QACiB;AACjB,UAAM,UAAU,IAAI,YAAA;AACpB,UAAM,iBAAiB,OAAO,KAAK,QAAQ,OAAO,QAAQ,CAAC;AAC3D,QAAI,SAAS,OAAO,MAAM,MAAM;AAEhC,aAAS,IAAI,GAAG,IAAI,YAAY,KAAK;AACnC,YAAM,WAAW,OAAO,OAAO,CAAC,gBAAgB,MAAM,OAAO,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;AACvE,UAAIA,QAAO;AACX,eAAS,IAAI,GAAG,IAAI,SAAS,QAAQ,KAAK;AACxCA,iBAASA,SAAQ,KAAKA,QAAO,SAAS,CAAC,IAAK;AAAA,MAC9C;AACA,aAAO,IAAI,MAAM,KAAKA,QAAO;AAAA,IAC/B;AAEA,WAAO;AAAA,EACT;AAAA,EAEA,gBAAgB,GAAW,GAAoB;AAC7C,QAAI,EAAE,WAAW,EAAE,OAAQ,QAAO;AAElC,QAAI,SAAS;AACb,aAAS,IAAI,GAAG,IAAI,EAAE,QAAQ,KAAK;AACjC,gBAAU,EAAE,CAAC,IAAI,EAAE,CAAC;AAAA,IACtB;AACA,WAAO,WAAW;AAAA,EACpB;AACF;AAKO,SAAS,mBAAkC;AAChD,QAAM,MAAM,wBAAA;AAEZ,UAAQ,IAAI,cAAA;AAAA,IACV,KAAK;AACH,UAAI;AACF,eAAO,IAAI,kBAAA;AAAA,MACb,QAAQ;AACN,eAAO,IAAI,sBAAA;AAAA,MACb;AAAA,IACF,KAAK;AACH,aAAO,IAAI,iBAAA;AAAA,IACb,KAAK;AAAA,IACL;AACE,aAAO,IAAI,sBAAA;AAAA,EAAsB;AAEvC;"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@hashgraphonline/standards-sdk",
3
- "version": "0.0.185",
3
+ "version": "0.0.187",
4
4
  "description": "The Hashgraph Online Standards SDK provides a complete implementation of the Hashgraph Consensus Standards (HCS), giving developers all the tools needed to build applications on Hedera.",
5
5
  "type": "module",
6
6
  "files": [