@hashgraphonline/standards-sdk 0.1.137 → 0.1.138
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/hcs-21/base-client.d.ts +31 -0
- package/dist/cjs/hcs-21/base-client.d.ts.map +1 -0
- package/dist/cjs/hcs-21/browser.d.ts +20 -0
- package/dist/cjs/hcs-21/browser.d.ts.map +1 -0
- package/dist/cjs/hcs-21/errors.d.ts +6 -0
- package/dist/cjs/hcs-21/errors.d.ts.map +1 -0
- package/dist/cjs/hcs-21/index.d.ts +7 -0
- package/dist/cjs/hcs-21/index.d.ts.map +1 -0
- package/dist/cjs/hcs-21/sdk.d.ts +48 -0
- package/dist/cjs/hcs-21/sdk.d.ts.map +1 -0
- package/dist/cjs/hcs-21/tx.d.ts +20 -0
- package/dist/cjs/hcs-21/tx.d.ts.map +1 -0
- package/dist/cjs/hcs-21/types.d.ts +72 -0
- package/dist/cjs/hcs-21/types.d.ts.map +1 -0
- package/dist/cjs/index.d.ts +1 -0
- package/dist/cjs/index.d.ts.map +1 -1
- package/dist/cjs/services/registry-broker/client.d.ts.map +1 -1
- package/dist/cjs/services/types.d.ts +1 -1
- package/dist/cjs/services/types.d.ts.map +1 -1
- package/dist/cjs/standards-sdk.cjs +2 -2
- package/dist/cjs/standards-sdk.cjs.map +1 -1
- package/dist/es/hcs-21/base-client.d.ts +31 -0
- package/dist/es/hcs-21/base-client.d.ts.map +1 -0
- package/dist/es/hcs-21/browser.d.ts +20 -0
- package/dist/es/hcs-21/browser.d.ts.map +1 -0
- package/dist/es/hcs-21/errors.d.ts +6 -0
- package/dist/es/hcs-21/errors.d.ts.map +1 -0
- package/dist/es/hcs-21/index.d.ts +7 -0
- package/dist/es/hcs-21/index.d.ts.map +1 -0
- package/dist/es/hcs-21/sdk.d.ts +48 -0
- package/dist/es/hcs-21/sdk.d.ts.map +1 -0
- package/dist/es/hcs-21/tx.d.ts +20 -0
- package/dist/es/hcs-21/tx.d.ts.map +1 -0
- package/dist/es/hcs-21/types.d.ts +72 -0
- package/dist/es/hcs-21/types.d.ts.map +1 -0
- package/dist/es/index.d.ts +1 -0
- package/dist/es/index.d.ts.map +1 -1
- package/dist/es/services/registry-broker/client.d.ts.map +1 -1
- package/dist/es/services/types.d.ts +1 -1
- package/dist/es/services/types.d.ts.map +1 -1
- package/dist/es/standards-sdk.es.js +66 -48
- package/dist/es/standards-sdk.es.js.map +1 -1
- package/dist/es/standards-sdk.es10.js +2 -2
- package/dist/es/standards-sdk.es100.js +231 -28
- package/dist/es/standards-sdk.es100.js.map +1 -1
- package/dist/es/standards-sdk.es101.js +109 -18
- package/dist/es/standards-sdk.es101.js.map +1 -1
- package/dist/es/standards-sdk.es102.js +32 -158
- package/dist/es/standards-sdk.es102.js.map +1 -1
- package/dist/es/standards-sdk.es103.js +80 -204
- package/dist/es/standards-sdk.es103.js.map +1 -1
- package/dist/es/standards-sdk.es104.js +21 -780
- package/dist/es/standards-sdk.es104.js.map +1 -1
- package/dist/es/standards-sdk.es105.js +140 -11
- package/dist/es/standards-sdk.es105.js.map +1 -1
- package/dist/es/standards-sdk.es106.js +29 -567
- package/dist/es/standards-sdk.es106.js.map +1 -1
- package/dist/es/standards-sdk.es107.js +17 -597
- package/dist/es/standards-sdk.es107.js.map +1 -1
- package/dist/es/standards-sdk.es108.js +159 -12
- package/dist/es/standards-sdk.es108.js.map +1 -1
- package/dist/es/standards-sdk.es109.js +208 -2
- package/dist/es/standards-sdk.es109.js.map +1 -1
- package/dist/es/standards-sdk.es110.js +774 -67
- package/dist/es/standards-sdk.es110.js.map +1 -1
- package/dist/es/standards-sdk.es111.js +11 -37
- package/dist/es/standards-sdk.es111.js.map +1 -1
- package/dist/es/standards-sdk.es112.js +567 -2
- package/dist/es/standards-sdk.es112.js.map +1 -1
- package/dist/es/standards-sdk.es113.js +576 -197
- package/dist/es/standards-sdk.es113.js.map +1 -1
- package/dist/es/standards-sdk.es114.js +12 -1139
- package/dist/es/standards-sdk.es114.js.map +1 -1
- package/dist/es/standards-sdk.es115.js +2 -306
- package/dist/es/standards-sdk.es115.js.map +1 -1
- package/dist/es/standards-sdk.es116.js +79 -418
- package/dist/es/standards-sdk.es116.js.map +1 -1
- package/dist/es/standards-sdk.es117.js +35 -351
- package/dist/es/standards-sdk.es117.js.map +1 -1
- package/dist/es/standards-sdk.es118.js +2 -761
- package/dist/es/standards-sdk.es118.js.map +1 -1
- package/dist/es/standards-sdk.es119.js +204 -185
- package/dist/es/standards-sdk.es119.js.map +1 -1
- package/dist/es/standards-sdk.es12.js +1 -1
- package/dist/es/standards-sdk.es120.js +1055 -1482
- package/dist/es/standards-sdk.es120.js.map +1 -1
- package/dist/es/standards-sdk.es121.js +265 -2024
- package/dist/es/standards-sdk.es121.js.map +1 -1
- package/dist/es/standards-sdk.es122.js +420 -50
- package/dist/es/standards-sdk.es122.js.map +1 -1
- package/dist/es/standards-sdk.es123.js +350 -82
- package/dist/es/standards-sdk.es123.js.map +1 -1
- package/dist/es/standards-sdk.es124.js +741 -139
- package/dist/es/standards-sdk.es124.js.map +1 -1
- package/dist/es/standards-sdk.es125.js +204 -7
- package/dist/es/standards-sdk.es125.js.map +1 -1
- package/dist/es/standards-sdk.es126.js +1533 -52
- package/dist/es/standards-sdk.es126.js.map +1 -1
- package/dist/es/standards-sdk.es127.js +2077 -59
- package/dist/es/standards-sdk.es127.js.map +1 -1
- package/dist/es/standards-sdk.es128.js +52 -28
- package/dist/es/standards-sdk.es128.js.map +1 -1
- package/dist/es/standards-sdk.es129.js +80 -131
- package/dist/es/standards-sdk.es129.js.map +1 -1
- package/dist/es/standards-sdk.es13.js +1 -1
- package/dist/es/standards-sdk.es130.js +152 -35
- package/dist/es/standards-sdk.es130.js.map +1 -1
- package/dist/es/standards-sdk.es131.js +7 -17
- package/dist/es/standards-sdk.es131.js.map +1 -1
- package/dist/es/standards-sdk.es132.js +53 -12241
- package/dist/es/standards-sdk.es132.js.map +1 -1
- package/dist/es/standards-sdk.es133.js +65 -694
- package/dist/es/standards-sdk.es133.js.map +1 -1
- package/dist/es/standards-sdk.es134.js +28 -172
- package/dist/es/standards-sdk.es134.js.map +1 -1
- package/dist/es/standards-sdk.es135.js +115 -299
- package/dist/es/standards-sdk.es135.js.map +1 -1
- package/dist/es/standards-sdk.es136.js +36 -340
- package/dist/es/standards-sdk.es136.js.map +1 -1
- package/dist/es/standards-sdk.es137.js +55 -452
- package/dist/es/standards-sdk.es137.js.map +1 -1
- package/dist/es/standards-sdk.es138.js +52 -319
- package/dist/es/standards-sdk.es138.js.map +1 -1
- package/dist/es/standards-sdk.es139.js +694 -76
- package/dist/es/standards-sdk.es139.js.map +1 -1
- package/dist/es/standards-sdk.es14.js +1 -1
- package/dist/es/standards-sdk.es140.js +15 -54
- package/dist/es/standards-sdk.es140.js.map +1 -1
- package/dist/es/standards-sdk.es141.js +12254 -44
- package/dist/es/standards-sdk.es141.js.map +1 -1
- package/dist/es/standards-sdk.es142.js +175 -0
- package/dist/es/standards-sdk.es142.js.map +1 -0
- package/dist/es/standards-sdk.es143.js +325 -0
- package/dist/es/standards-sdk.es143.js.map +1 -0
- package/dist/es/standards-sdk.es144.js +349 -0
- package/dist/es/standards-sdk.es144.js.map +1 -0
- package/dist/es/standards-sdk.es145.js +456 -0
- package/dist/es/standards-sdk.es145.js.map +1 -0
- package/dist/es/standards-sdk.es146.js +334 -0
- package/dist/es/standards-sdk.es146.js.map +1 -0
- package/dist/es/standards-sdk.es147.js +79 -0
- package/dist/es/standards-sdk.es147.js.map +1 -0
- package/dist/es/standards-sdk.es15.js +1 -1
- package/dist/es/standards-sdk.es16.js +1 -1
- package/dist/es/standards-sdk.es17.js +5 -5
- package/dist/es/standards-sdk.es19.js +12 -12
- package/dist/es/standards-sdk.es20.js +9 -9
- package/dist/es/standards-sdk.es21.js +1 -1
- package/dist/es/standards-sdk.es22.js +1 -1
- package/dist/es/standards-sdk.es23.js +1 -1
- package/dist/es/standards-sdk.es24.js +1 -1
- package/dist/es/standards-sdk.es25.js +1 -1
- package/dist/es/standards-sdk.es26.js +1 -1
- package/dist/es/standards-sdk.es27.js +1 -1
- package/dist/es/standards-sdk.es28.js +12 -12
- package/dist/es/standards-sdk.es3.js +2 -2
- package/dist/es/standards-sdk.es31.js +2 -2
- package/dist/es/standards-sdk.es32.js +4 -4
- package/dist/es/standards-sdk.es33.js +1 -1
- package/dist/es/standards-sdk.es36.js +6 -6
- package/dist/es/standards-sdk.es37.js +4 -4
- package/dist/es/standards-sdk.es38.js +2 -2
- package/dist/es/standards-sdk.es39.js +2 -2
- package/dist/es/standards-sdk.es40.js +1 -1
- package/dist/es/standards-sdk.es41.js +1 -1
- package/dist/es/standards-sdk.es42.js +2 -2
- package/dist/es/standards-sdk.es47.js +1 -1
- package/dist/es/standards-sdk.es5.js +2 -2
- package/dist/es/standards-sdk.es52.js +1 -1
- package/dist/es/standards-sdk.es54.js +1 -1
- package/dist/es/standards-sdk.es57.js +2 -2
- package/dist/es/standards-sdk.es59.js +1 -1
- package/dist/es/standards-sdk.es6.js +2 -2
- package/dist/es/standards-sdk.es60.js +1 -1
- package/dist/es/standards-sdk.es61.js +7 -7
- package/dist/es/standards-sdk.es63.js +1 -1
- package/dist/es/standards-sdk.es65.js +2 -2
- package/dist/es/standards-sdk.es66.js +3 -3
- package/dist/es/standards-sdk.es69.js +2 -2
- package/dist/es/standards-sdk.es7.js +2 -2
- package/dist/es/standards-sdk.es70.js +3 -3
- package/dist/es/standards-sdk.es71.js +2 -2
- package/dist/es/standards-sdk.es72.js +1 -1
- package/dist/es/standards-sdk.es75.js +2 -2
- package/dist/es/standards-sdk.es77.js +2 -2
- package/dist/es/standards-sdk.es78.js +4 -4
- package/dist/es/standards-sdk.es79.js +1 -1
- package/dist/es/standards-sdk.es8.js +1 -1
- package/dist/es/standards-sdk.es80.js +25 -27
- package/dist/es/standards-sdk.es80.js.map +1 -1
- package/dist/es/standards-sdk.es81.js +6 -78
- package/dist/es/standards-sdk.es81.js.map +1 -1
- package/dist/es/standards-sdk.es82.js +27 -64
- package/dist/es/standards-sdk.es82.js.map +1 -1
- package/dist/es/standards-sdk.es83.js +67 -23
- package/dist/es/standards-sdk.es83.js.map +1 -1
- package/dist/es/standards-sdk.es84.js +165 -23
- package/dist/es/standards-sdk.es84.js.map +1 -1
- package/dist/es/standards-sdk.es85.js +31 -166
- package/dist/es/standards-sdk.es85.js.map +1 -1
- package/dist/es/standards-sdk.es86.js +24 -127
- package/dist/es/standards-sdk.es86.js.map +1 -1
- package/dist/es/standards-sdk.es87.js +65 -142
- package/dist/es/standards-sdk.es87.js.map +1 -1
- package/dist/es/standards-sdk.es88.js +52 -127
- package/dist/es/standards-sdk.es88.js.map +1 -1
- package/dist/es/standards-sdk.es89.js +26 -41
- package/dist/es/standards-sdk.es89.js.map +1 -1
- package/dist/es/standards-sdk.es90.js +23 -261
- package/dist/es/standards-sdk.es90.js.map +1 -1
- package/dist/es/standards-sdk.es91.js +162 -93
- package/dist/es/standards-sdk.es91.js.map +1 -1
- package/dist/es/standards-sdk.es92.js +112 -83
- package/dist/es/standards-sdk.es92.js.map +1 -1
- package/dist/es/standards-sdk.es93.js +156 -28
- package/dist/es/standards-sdk.es93.js.map +1 -1
- package/dist/es/standards-sdk.es94.js +133 -225
- package/dist/es/standards-sdk.es94.js.map +1 -1
- package/dist/es/standards-sdk.es95.js +40 -108
- package/dist/es/standards-sdk.es95.js.map +1 -1
- package/dist/es/standards-sdk.es96.js +253 -24
- package/dist/es/standards-sdk.es96.js.map +1 -1
- package/dist/es/standards-sdk.es97.js +96 -80
- package/dist/es/standards-sdk.es97.js.map +1 -1
- package/dist/es/standards-sdk.es98.js +91 -21
- package/dist/es/standards-sdk.es98.js.map +1 -1
- package/dist/es/standards-sdk.es99.js +28 -141
- package/dist/es/standards-sdk.es99.js.map +1 -1
- package/package.json +2 -1
|
@@ -1,226 +1,605 @@
|
|
|
1
|
-
import {
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
"
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
1
|
+
import { PrivateKey } from "@hashgraph/sdk";
|
|
2
|
+
var KeyType = /* @__PURE__ */ ((KeyType2) => {
|
|
3
|
+
KeyType2["ED25519"] = "ed25519";
|
|
4
|
+
KeyType2["ECDSA"] = "ecdsa";
|
|
5
|
+
KeyType2["UNKNOWN"] = "unknown";
|
|
6
|
+
return KeyType2;
|
|
7
|
+
})(KeyType || {});
|
|
8
|
+
const _KeyTypeDetector = class _KeyTypeDetector {
|
|
9
|
+
/**
|
|
10
|
+
* Detects private key type from various input formats without throwing errors
|
|
11
|
+
*
|
|
12
|
+
* This detector is designed for private keys only. It uses various heuristics to determine
|
|
13
|
+
* the key type for ambiguous 32-byte keys, including byte patterns and statistical analysis.
|
|
14
|
+
*
|
|
15
|
+
* For ambiguous cases (where confidence is 'uncertain'), if you have the associated account ID,
|
|
16
|
+
* you can use the Hedera mirror node to confirm the key type.
|
|
17
|
+
*
|
|
18
|
+
* @param keyInput - The key to detect, can be a string (hex, base64, PEM), Buffer, or Uint8Array
|
|
19
|
+
* @returns KeyInfo object containing the detected key type and metadata
|
|
20
|
+
*
|
|
21
|
+
* @example
|
|
22
|
+
* // Detect from hex string
|
|
23
|
+
* const info1 = KeyTypeDetector.detect('0x7f96cea0c0d9d5bfb3ab8a42cf0cea44d57f62f2e068f8e5a3251914a9252b04');
|
|
24
|
+
*
|
|
25
|
+
* // Detect from DER-encoded string
|
|
26
|
+
* const info2 = KeyTypeDetector.detect(privateKey.toStringDer());
|
|
27
|
+
*
|
|
28
|
+
* // Detect from PEM format
|
|
29
|
+
* const info3 = KeyTypeDetector.detect(`-----BEGIN PRIVATE KEY-----
|
|
30
|
+
* MC4CAQAwBQYDK2VwBCIEIGRchBsQGQduAAGBQ7GAkKCKkmQ3EGCARwHsHiRqTNR9
|
|
31
|
+
* -----END PRIVATE KEY-----`);
|
|
32
|
+
*/
|
|
33
|
+
static detect(keyInput) {
|
|
34
|
+
try {
|
|
35
|
+
let keyBytes;
|
|
36
|
+
let originalFormat = "raw";
|
|
37
|
+
if (typeof keyInput === "string") {
|
|
38
|
+
let trimmed = keyInput.trim();
|
|
39
|
+
if (trimmed.includes("-----BEGIN")) {
|
|
40
|
+
return this.detectFromPem(trimmed);
|
|
41
|
+
}
|
|
42
|
+
if (trimmed.toLowerCase().startsWith("0x")) {
|
|
43
|
+
trimmed = trimmed.substring(2);
|
|
44
|
+
}
|
|
45
|
+
if (this.isValidHex(trimmed)) {
|
|
46
|
+
keyBytes = this.hexToBytes(trimmed);
|
|
47
|
+
originalFormat = "hex";
|
|
48
|
+
} else if (this.isBase64(trimmed)) {
|
|
49
|
+
keyBytes = Buffer.from(trimmed, "base64");
|
|
50
|
+
originalFormat = "der";
|
|
51
|
+
} else {
|
|
52
|
+
return {
|
|
53
|
+
type: "unknown",
|
|
54
|
+
format: "raw",
|
|
55
|
+
isPrivateKey: false,
|
|
56
|
+
confidence: "certain"
|
|
57
|
+
};
|
|
58
|
+
}
|
|
59
|
+
} else if (keyInput instanceof Buffer) {
|
|
60
|
+
keyBytes = new Uint8Array(keyInput);
|
|
61
|
+
} else {
|
|
62
|
+
keyBytes = keyInput;
|
|
63
|
+
}
|
|
64
|
+
return this.detectFromBytes(keyBytes, originalFormat);
|
|
65
|
+
} catch (error) {
|
|
66
|
+
return {
|
|
67
|
+
type: "unknown",
|
|
68
|
+
format: "raw",
|
|
69
|
+
isPrivateKey: false,
|
|
70
|
+
confidence: "certain"
|
|
71
|
+
};
|
|
42
72
|
}
|
|
43
|
-
return Buffer.from(signature);
|
|
44
73
|
}
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
74
|
+
/**
|
|
75
|
+
* Detect key type from raw bytes
|
|
76
|
+
*
|
|
77
|
+
* @param bytes - The raw bytes of the key
|
|
78
|
+
* @param format - The original format of the key
|
|
79
|
+
* @returns KeyInfo object with detection results
|
|
80
|
+
* @private
|
|
81
|
+
*/
|
|
82
|
+
static detectFromBytes(bytes, format) {
|
|
83
|
+
if (this.hasPrefix(bytes, this.ED25519_PUBLIC_KEY_PREFIX)) {
|
|
84
|
+
const keyStart = this.ED25519_PUBLIC_KEY_PREFIX.length;
|
|
85
|
+
return {
|
|
86
|
+
type: "ed25519",
|
|
87
|
+
format: "der",
|
|
88
|
+
isPrivateKey: false,
|
|
89
|
+
rawBytes: bytes.slice(keyStart),
|
|
90
|
+
confidence: "certain"
|
|
91
|
+
};
|
|
92
|
+
}
|
|
93
|
+
if (this.hasPrefix(bytes, this.ED25519_PRIVATE_KEY_PREFIX)) {
|
|
94
|
+
const keyStart = this.ED25519_PRIVATE_KEY_PREFIX.length;
|
|
95
|
+
if (bytes.length >= keyStart + 32) {
|
|
96
|
+
return {
|
|
97
|
+
type: "ed25519",
|
|
98
|
+
format: "der",
|
|
99
|
+
isPrivateKey: true,
|
|
100
|
+
rawBytes: bytes.slice(keyStart, keyStart + 32),
|
|
101
|
+
confidence: "certain"
|
|
102
|
+
};
|
|
103
|
+
}
|
|
104
|
+
}
|
|
105
|
+
if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PUBLIC_KEY_PREFIX)) {
|
|
106
|
+
const keyStart = this.ECDSA_SECP256K1_PUBLIC_KEY_PREFIX.length;
|
|
107
|
+
return {
|
|
108
|
+
type: "ecdsa",
|
|
109
|
+
format: "der",
|
|
110
|
+
isPrivateKey: false,
|
|
111
|
+
rawBytes: bytes.slice(keyStart),
|
|
112
|
+
confidence: "certain"
|
|
113
|
+
};
|
|
114
|
+
}
|
|
115
|
+
if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT)) {
|
|
116
|
+
const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT.length;
|
|
117
|
+
return {
|
|
118
|
+
type: "ecdsa",
|
|
119
|
+
format: "der",
|
|
120
|
+
isPrivateKey: true,
|
|
121
|
+
rawBytes: bytes.slice(keyStart),
|
|
122
|
+
confidence: "certain"
|
|
123
|
+
};
|
|
124
|
+
}
|
|
125
|
+
if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX)) {
|
|
126
|
+
const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX.length;
|
|
127
|
+
return {
|
|
128
|
+
type: "ecdsa",
|
|
129
|
+
format: "der",
|
|
130
|
+
isPrivateKey: true,
|
|
131
|
+
rawBytes: bytes.slice(keyStart, keyStart + 32),
|
|
132
|
+
confidence: "certain"
|
|
133
|
+
};
|
|
134
|
+
}
|
|
135
|
+
if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG)) {
|
|
136
|
+
const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG.length;
|
|
137
|
+
return {
|
|
138
|
+
type: "ecdsa",
|
|
139
|
+
format: "der",
|
|
140
|
+
isPrivateKey: true,
|
|
141
|
+
rawBytes: bytes.slice(keyStart, keyStart + 32),
|
|
142
|
+
confidence: "certain"
|
|
143
|
+
};
|
|
144
|
+
}
|
|
145
|
+
if (bytes.length > 36 && this.containsECDSAPrivateKeyPattern(bytes)) {
|
|
146
|
+
return {
|
|
147
|
+
type: "ecdsa",
|
|
148
|
+
format: "der",
|
|
149
|
+
isPrivateKey: true,
|
|
150
|
+
rawBytes: this.extractECDSAPrivateKey(bytes),
|
|
151
|
+
confidence: "certain"
|
|
152
|
+
};
|
|
153
|
+
}
|
|
154
|
+
switch (bytes.length) {
|
|
155
|
+
case this.ED25519_PUBLIC_KEY_LENGTH:
|
|
156
|
+
if (format === "hex") {
|
|
157
|
+
const hexStr = Array.from(bytes).map((b) => b.toString(16).padStart(2, "0")).join("");
|
|
158
|
+
const privateResult = this.tryCreateKey(hexStr);
|
|
159
|
+
if (privateResult.type !== "unknown") {
|
|
160
|
+
return privateResult;
|
|
161
|
+
}
|
|
162
|
+
}
|
|
163
|
+
return {
|
|
164
|
+
type: "unknown",
|
|
165
|
+
format,
|
|
166
|
+
isPrivateKey: false,
|
|
167
|
+
rawBytes: bytes,
|
|
168
|
+
confidence: "certain"
|
|
169
|
+
};
|
|
170
|
+
case this.ED25519_EXPANDED_PRIVATE_KEY_LENGTH:
|
|
171
|
+
return {
|
|
172
|
+
type: "ed25519",
|
|
173
|
+
format,
|
|
174
|
+
isPrivateKey: true,
|
|
175
|
+
rawBytes: bytes,
|
|
176
|
+
confidence: "certain"
|
|
177
|
+
};
|
|
178
|
+
}
|
|
179
|
+
return {
|
|
180
|
+
type: "unknown",
|
|
181
|
+
format,
|
|
182
|
+
isPrivateKey: false,
|
|
183
|
+
rawBytes: bytes,
|
|
184
|
+
confidence: "certain"
|
|
50
185
|
};
|
|
51
|
-
return algorithmMap[algorithm.toLowerCase()] || "SHA-256";
|
|
52
|
-
}
|
|
53
|
-
}
|
|
54
|
-
class FallbackHmacAdapter {
|
|
55
|
-
constructor(key, algorithm = "sha256") {
|
|
56
|
-
this.key = key;
|
|
57
|
-
this.algorithm = algorithm;
|
|
58
|
-
this.data = [];
|
|
59
186
|
}
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
187
|
+
/**
|
|
188
|
+
* Detect key type from PEM format
|
|
189
|
+
*
|
|
190
|
+
* @param pem - The PEM-encoded key string
|
|
191
|
+
* @returns KeyInfo object with detection results
|
|
192
|
+
* @private
|
|
193
|
+
*/
|
|
194
|
+
static detectFromPem(pem) {
|
|
195
|
+
const trimmedPem = pem.trim();
|
|
196
|
+
const isPrivateKey = trimmedPem.includes("PRIVATE KEY");
|
|
197
|
+
const pemTypes = {
|
|
198
|
+
EC_PRIVATE: /-----BEGIN EC PRIVATE KEY-----/,
|
|
199
|
+
EC_PUBLIC: /-----BEGIN EC PUBLIC KEY-----/,
|
|
200
|
+
PRIVATE: /-----BEGIN PRIVATE KEY-----/,
|
|
201
|
+
PUBLIC: /-----BEGIN PUBLIC KEY-----/
|
|
202
|
+
};
|
|
203
|
+
let isECKey = false;
|
|
204
|
+
for (const [type, regex] of Object.entries(pemTypes)) {
|
|
205
|
+
if (regex.test(trimmedPem) && type.includes("EC")) {
|
|
206
|
+
isECKey = true;
|
|
207
|
+
break;
|
|
208
|
+
}
|
|
69
209
|
}
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
210
|
+
const base64Match = trimmedPem.match(
|
|
211
|
+
/-----BEGIN[\s\S]+?-----[\r\n]+([\s\S]+?)[\r\n]+-----END/
|
|
212
|
+
);
|
|
213
|
+
if (!base64Match) {
|
|
214
|
+
return {
|
|
215
|
+
type: "unknown",
|
|
216
|
+
format: "pem",
|
|
217
|
+
isPrivateKey,
|
|
218
|
+
confidence: "certain"
|
|
219
|
+
};
|
|
77
220
|
}
|
|
78
|
-
|
|
79
|
-
}
|
|
80
|
-
}
|
|
81
|
-
class NodeCryptoAdapter {
|
|
82
|
-
constructor() {
|
|
221
|
+
const base64Content = base64Match[1].replace(/\s/g, "");
|
|
83
222
|
try {
|
|
84
|
-
const
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
223
|
+
const derBytes = Buffer.from(base64Content, "base64");
|
|
224
|
+
const result = this.detectFromBytes(new Uint8Array(derBytes), "der");
|
|
225
|
+
if (result.type === "unknown" && isECKey) {
|
|
226
|
+
return {
|
|
227
|
+
type: "ecdsa",
|
|
228
|
+
format: "pem",
|
|
229
|
+
isPrivateKey,
|
|
230
|
+
rawBytes: derBytes,
|
|
231
|
+
confidence: "certain"
|
|
232
|
+
};
|
|
233
|
+
}
|
|
234
|
+
return {
|
|
235
|
+
...result,
|
|
236
|
+
format: "pem"
|
|
237
|
+
};
|
|
238
|
+
} catch {
|
|
239
|
+
return {
|
|
240
|
+
type: "unknown",
|
|
241
|
+
format: "pem",
|
|
242
|
+
isPrivateKey,
|
|
243
|
+
confidence: "certain"
|
|
244
|
+
};
|
|
88
245
|
}
|
|
89
246
|
}
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
digest,
|
|
104
|
-
(err, derivedKey) => {
|
|
105
|
-
if (err) reject(err);
|
|
106
|
-
else resolve(derivedKey);
|
|
247
|
+
/**
|
|
248
|
+
* Try to create a key using Hedera SDK to validate the type
|
|
249
|
+
*
|
|
250
|
+
* @param keyInput - The key input string or bytes
|
|
251
|
+
* @returns KeyInfo object with detection results
|
|
252
|
+
* @private
|
|
253
|
+
*/
|
|
254
|
+
static tryCreateKey(keyInput) {
|
|
255
|
+
try {
|
|
256
|
+
if (typeof keyInput === "string") {
|
|
257
|
+
let keyStr = keyInput.trim();
|
|
258
|
+
if (keyStr.toLowerCase().startsWith("0x")) {
|
|
259
|
+
keyStr = keyStr.substring(2);
|
|
107
260
|
}
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
261
|
+
if (this.isValidHex(keyStr) && keyStr.length === 64) {
|
|
262
|
+
const keyBytes = this.hexToBytes(keyStr);
|
|
263
|
+
const signatureResult = this.detectBySignature(keyStr);
|
|
264
|
+
if (signatureResult.type !== "unknown") {
|
|
265
|
+
return {
|
|
266
|
+
type: signatureResult.type,
|
|
267
|
+
format: "hex",
|
|
268
|
+
isPrivateKey: true,
|
|
269
|
+
rawBytes: keyBytes,
|
|
270
|
+
confidence: signatureResult.confidence,
|
|
271
|
+
warning: signatureResult.warning
|
|
272
|
+
};
|
|
273
|
+
}
|
|
274
|
+
return {
|
|
275
|
+
type: "unknown",
|
|
276
|
+
format: "hex",
|
|
277
|
+
isPrivateKey: false,
|
|
278
|
+
rawBytes: keyBytes,
|
|
279
|
+
confidence: "certain"
|
|
280
|
+
};
|
|
281
|
+
}
|
|
282
|
+
}
|
|
283
|
+
} catch {
|
|
284
|
+
}
|
|
285
|
+
return {
|
|
286
|
+
type: "unknown",
|
|
287
|
+
format: "hex",
|
|
288
|
+
isPrivateKey: false,
|
|
289
|
+
rawBytes: new Uint8Array(),
|
|
290
|
+
confidence: "certain"
|
|
291
|
+
};
|
|
121
292
|
}
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
keyMaterial,
|
|
139
|
-
keylen * 8
|
|
293
|
+
/**
|
|
294
|
+
* Detect key type by attempting to sign a message with both algorithms
|
|
295
|
+
*
|
|
296
|
+
* For ambiguous cases where both algorithms can use the key, this method
|
|
297
|
+
* uses heuristics to make a best-effort determination. For production use
|
|
298
|
+
* with ambiguous keys, consider using the Hedera mirror node to confirm
|
|
299
|
+
* the key type if you have the associated account ID.
|
|
300
|
+
*
|
|
301
|
+
* @param hexKey - The hex string representation of the key
|
|
302
|
+
* @returns Object containing type, confidence level, and optional warning
|
|
303
|
+
* @private
|
|
304
|
+
*/
|
|
305
|
+
static detectBySignature(hexKey) {
|
|
306
|
+
const keyBigInt = BigInt("0x" + hexKey);
|
|
307
|
+
const secp256k1Order = BigInt(
|
|
308
|
+
"0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141"
|
|
140
309
|
);
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
for (let i = 0; i < a.length; i++) {
|
|
147
|
-
result |= a[i] ^ b[i];
|
|
310
|
+
if (keyBigInt === 0n) {
|
|
311
|
+
return {
|
|
312
|
+
type: "ed25519",
|
|
313
|
+
confidence: "certain"
|
|
314
|
+
};
|
|
148
315
|
}
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
|
|
155
|
-
|
|
316
|
+
if (keyBigInt >= secp256k1Order) {
|
|
317
|
+
return {
|
|
318
|
+
type: "ed25519",
|
|
319
|
+
confidence: "certain"
|
|
320
|
+
};
|
|
321
|
+
}
|
|
322
|
+
let ed25519CanSign = false;
|
|
323
|
+
let ecdsaCanSign = false;
|
|
324
|
+
try {
|
|
325
|
+
const ed25519Key = PrivateKey.fromStringED25519(hexKey);
|
|
326
|
+
const testMessage = new Uint8Array([1, 2, 3, 4, 5]);
|
|
327
|
+
const signature = ed25519Key.sign(testMessage);
|
|
328
|
+
if (ed25519Key.publicKey.verify(testMessage, signature)) {
|
|
329
|
+
ed25519CanSign = true;
|
|
330
|
+
}
|
|
331
|
+
} catch {
|
|
332
|
+
}
|
|
333
|
+
try {
|
|
334
|
+
const ecdsaKey = PrivateKey.fromStringECDSA(hexKey);
|
|
335
|
+
const testMessage = new Uint8Array([1, 2, 3, 4, 5]);
|
|
336
|
+
const signature = ecdsaKey.sign(testMessage);
|
|
337
|
+
if (ecdsaKey.publicKey.verify(testMessage, signature)) {
|
|
338
|
+
ecdsaCanSign = true;
|
|
339
|
+
}
|
|
340
|
+
} catch {
|
|
341
|
+
}
|
|
342
|
+
if (ed25519CanSign && ecdsaCanSign) {
|
|
343
|
+
const keyBytes = this.hexToBytes(hexKey);
|
|
344
|
+
if (keyBytes[0] === 168 && keyBytes[1] === 1) {
|
|
345
|
+
return {
|
|
346
|
+
type: "ed25519",
|
|
347
|
+
confidence: "uncertain",
|
|
348
|
+
warning: "Detection based on byte pattern heuristic. Both ED25519 and ECDSA accept this key."
|
|
349
|
+
};
|
|
350
|
+
}
|
|
351
|
+
let highBytes = 0;
|
|
352
|
+
for (const byte of keyBytes) {
|
|
353
|
+
if (byte >= 128) highBytes++;
|
|
354
|
+
}
|
|
355
|
+
const highByteRatio = highBytes / keyBytes.length;
|
|
356
|
+
if (highByteRatio >= 0.4 && highByteRatio <= 0.6) {
|
|
357
|
+
return {
|
|
358
|
+
type: "ecdsa",
|
|
359
|
+
confidence: "uncertain",
|
|
360
|
+
warning: "Detection based on entropy heuristic. Both ED25519 and ECDSA accept this key."
|
|
361
|
+
};
|
|
362
|
+
}
|
|
363
|
+
return {
|
|
364
|
+
type: "ecdsa",
|
|
365
|
+
confidence: "uncertain",
|
|
366
|
+
warning: "Detection based on entropy heuristic. Both ED25519 and ECDSA accept this key. Defaulting to ECDSA."
|
|
367
|
+
};
|
|
368
|
+
}
|
|
369
|
+
if (ed25519CanSign && !ecdsaCanSign) {
|
|
370
|
+
return {
|
|
371
|
+
type: "ed25519",
|
|
372
|
+
confidence: "certain"
|
|
373
|
+
};
|
|
374
|
+
}
|
|
375
|
+
if (ecdsaCanSign && !ed25519CanSign) {
|
|
376
|
+
return {
|
|
377
|
+
type: "ecdsa",
|
|
378
|
+
confidence: "certain"
|
|
379
|
+
};
|
|
380
|
+
}
|
|
381
|
+
return {
|
|
382
|
+
type: "unknown",
|
|
383
|
+
confidence: "certain"
|
|
156
384
|
};
|
|
157
|
-
return digestMap[digest.toLowerCase()] || "SHA-256";
|
|
158
385
|
}
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
386
|
+
/**
|
|
387
|
+
* Check if a string is valid hexadecimal with even length
|
|
388
|
+
*
|
|
389
|
+
* @param str - The string to check
|
|
390
|
+
* @returns True if the string is valid hex with even length
|
|
391
|
+
* @private
|
|
392
|
+
*/
|
|
393
|
+
static isValidHex(str) {
|
|
394
|
+
return /^[0-9a-fA-F]+$/.test(str) && str.length % 2 === 0;
|
|
395
|
+
}
|
|
396
|
+
/**
|
|
397
|
+
* Check if a string is valid base64
|
|
398
|
+
*
|
|
399
|
+
* @param str - The string to check
|
|
400
|
+
* @returns True if the string is valid base64
|
|
401
|
+
* @private
|
|
402
|
+
*/
|
|
403
|
+
static isBase64(str) {
|
|
404
|
+
try {
|
|
405
|
+
return Buffer.from(str, "base64").toString("base64") === str;
|
|
406
|
+
} catch {
|
|
407
|
+
return false;
|
|
408
|
+
}
|
|
163
409
|
}
|
|
164
|
-
|
|
165
|
-
|
|
410
|
+
/**
|
|
411
|
+
* Convert a hex string to bytes
|
|
412
|
+
*
|
|
413
|
+
* @param hex - The hex string to convert
|
|
414
|
+
* @returns Uint8Array of bytes
|
|
415
|
+
* @private
|
|
416
|
+
*/
|
|
417
|
+
static hexToBytes(hex) {
|
|
418
|
+
const bytes = new Uint8Array(hex.length / 2);
|
|
419
|
+
for (let i = 0; i < hex.length; i += 2) {
|
|
420
|
+
bytes[i / 2] = parseInt(hex.substr(i, 2), 16);
|
|
421
|
+
}
|
|
422
|
+
return bytes;
|
|
166
423
|
}
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
|
|
424
|
+
/**
|
|
425
|
+
* Check if bytes start with a specific prefix
|
|
426
|
+
*
|
|
427
|
+
* @param bytes - The bytes to check
|
|
428
|
+
* @param prefix - The prefix to look for
|
|
429
|
+
* @returns True if bytes start with the prefix
|
|
430
|
+
* @private
|
|
431
|
+
*/
|
|
432
|
+
static hasPrefix(bytes, prefix) {
|
|
433
|
+
if (bytes.length < prefix.length) return false;
|
|
434
|
+
for (let i = 0; i < prefix.length; i++) {
|
|
435
|
+
if (bytes[i] !== prefix[i]) return false;
|
|
436
|
+
}
|
|
437
|
+
return true;
|
|
438
|
+
}
|
|
439
|
+
/**
|
|
440
|
+
* Check if bytes contain an ECDSA private key pattern
|
|
441
|
+
*
|
|
442
|
+
* @param bytes - The bytes to check
|
|
443
|
+
* @returns True if ECDSA private key pattern is found
|
|
444
|
+
* @private
|
|
445
|
+
*/
|
|
446
|
+
static containsECDSAPrivateKeyPattern(bytes) {
|
|
447
|
+
for (let i = 0; i < bytes.length - 7; i++) {
|
|
448
|
+
if (bytes[i] === 48 && bytes[i + 1] === 116 && bytes[i + 2] === 2 && bytes[i + 3] === 1 && bytes[i + 4] === 1 && bytes[i + 5] === 4 && bytes[i + 6] === 32) {
|
|
449
|
+
return true;
|
|
176
450
|
}
|
|
177
|
-
result[i % keylen] ^= hash2 & 255;
|
|
178
451
|
}
|
|
179
|
-
return
|
|
452
|
+
return false;
|
|
180
453
|
}
|
|
181
|
-
|
|
182
|
-
|
|
183
|
-
|
|
184
|
-
|
|
185
|
-
|
|
454
|
+
/**
|
|
455
|
+
* Extract ECDSA private key from DER structure
|
|
456
|
+
*
|
|
457
|
+
* @param bytes - The DER encoded bytes
|
|
458
|
+
* @returns The extracted private key bytes
|
|
459
|
+
* @private
|
|
460
|
+
*/
|
|
461
|
+
static extractECDSAPrivateKey(bytes) {
|
|
462
|
+
for (let i = 0; i < bytes.length - 32; i++) {
|
|
463
|
+
if (bytes[i] === 4 && bytes[i + 1] === 32) {
|
|
464
|
+
return bytes.slice(i + 2, i + 34);
|
|
465
|
+
}
|
|
186
466
|
}
|
|
187
|
-
return
|
|
467
|
+
return bytes;
|
|
188
468
|
}
|
|
189
|
-
}
|
|
190
|
-
|
|
191
|
-
|
|
192
|
-
|
|
193
|
-
|
|
194
|
-
|
|
195
|
-
|
|
196
|
-
|
|
197
|
-
|
|
469
|
+
};
|
|
470
|
+
_KeyTypeDetector.ED25519_PUBLIC_KEY_LENGTH = 32;
|
|
471
|
+
_KeyTypeDetector.ED25519_EXPANDED_PRIVATE_KEY_LENGTH = 64;
|
|
472
|
+
_KeyTypeDetector.ED25519_PUBLIC_KEY_PREFIX = Buffer.from([
|
|
473
|
+
48,
|
|
474
|
+
42,
|
|
475
|
+
48,
|
|
476
|
+
5,
|
|
477
|
+
6,
|
|
478
|
+
3,
|
|
479
|
+
43,
|
|
480
|
+
101,
|
|
481
|
+
112,
|
|
482
|
+
3,
|
|
483
|
+
33,
|
|
484
|
+
0
|
|
485
|
+
]);
|
|
486
|
+
_KeyTypeDetector.ED25519_PRIVATE_KEY_PREFIX = Buffer.from([
|
|
487
|
+
48,
|
|
488
|
+
46,
|
|
489
|
+
2,
|
|
490
|
+
1,
|
|
491
|
+
0,
|
|
492
|
+
48,
|
|
493
|
+
5,
|
|
494
|
+
6,
|
|
495
|
+
3,
|
|
496
|
+
43,
|
|
497
|
+
101,
|
|
498
|
+
112,
|
|
499
|
+
4,
|
|
500
|
+
34,
|
|
501
|
+
4,
|
|
502
|
+
32
|
|
503
|
+
]);
|
|
504
|
+
_KeyTypeDetector.ECDSA_SECP256K1_PUBLIC_KEY_PREFIX = Buffer.from([
|
|
505
|
+
48,
|
|
506
|
+
86,
|
|
507
|
+
48,
|
|
508
|
+
16,
|
|
509
|
+
6,
|
|
510
|
+
7,
|
|
511
|
+
42,
|
|
512
|
+
134,
|
|
513
|
+
72,
|
|
514
|
+
206,
|
|
515
|
+
61,
|
|
516
|
+
2,
|
|
517
|
+
1,
|
|
518
|
+
6,
|
|
519
|
+
5,
|
|
520
|
+
43,
|
|
521
|
+
129,
|
|
522
|
+
4,
|
|
523
|
+
0,
|
|
524
|
+
10,
|
|
525
|
+
3,
|
|
526
|
+
66,
|
|
527
|
+
0
|
|
528
|
+
]);
|
|
529
|
+
_KeyTypeDetector.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX = Buffer.from([
|
|
530
|
+
48,
|
|
531
|
+
116,
|
|
532
|
+
2,
|
|
533
|
+
1,
|
|
534
|
+
1,
|
|
535
|
+
4,
|
|
536
|
+
32
|
|
537
|
+
]);
|
|
538
|
+
_KeyTypeDetector.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT = Buffer.from([
|
|
539
|
+
48,
|
|
540
|
+
48,
|
|
541
|
+
2,
|
|
542
|
+
1,
|
|
543
|
+
0,
|
|
544
|
+
48,
|
|
545
|
+
7,
|
|
546
|
+
6,
|
|
547
|
+
5,
|
|
548
|
+
43,
|
|
549
|
+
129,
|
|
550
|
+
4,
|
|
551
|
+
0,
|
|
552
|
+
10,
|
|
553
|
+
4,
|
|
554
|
+
34,
|
|
555
|
+
4,
|
|
556
|
+
32
|
|
557
|
+
]);
|
|
558
|
+
_KeyTypeDetector.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG = Buffer.from(
|
|
559
|
+
[48, 119, 2, 1, 1, 4, 32]
|
|
560
|
+
);
|
|
561
|
+
let KeyTypeDetector = _KeyTypeDetector;
|
|
562
|
+
function detectKeyTypeFromString(privateKeyString) {
|
|
563
|
+
const keyInfo = KeyTypeDetector.detect(privateKeyString);
|
|
564
|
+
if (keyInfo.type !== "unknown") {
|
|
565
|
+
try {
|
|
566
|
+
const privateKey = keyInfo.type === "ecdsa" ? PrivateKey.fromStringECDSA(privateKeyString) : PrivateKey.fromStringED25519(privateKeyString);
|
|
567
|
+
const result = {
|
|
568
|
+
detectedType: keyInfo.type,
|
|
569
|
+
privateKey
|
|
570
|
+
};
|
|
571
|
+
if (keyInfo.confidence === "uncertain") {
|
|
572
|
+
result.warning = `Key type detection is uncertain. If you have the associated account ID, consider using the Hedera mirror node to confirm the key type.`;
|
|
198
573
|
}
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
default:
|
|
203
|
-
return new FallbackCryptoAdapter();
|
|
574
|
+
return result;
|
|
575
|
+
} catch (error) {
|
|
576
|
+
}
|
|
204
577
|
}
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
|
|
211
|
-
|
|
212
|
-
|
|
578
|
+
try {
|
|
579
|
+
const privateKey = PrivateKey.fromStringECDSA(privateKeyString);
|
|
580
|
+
return {
|
|
581
|
+
detectedType: "ecdsa",
|
|
582
|
+
privateKey,
|
|
583
|
+
warning: `Using ECDSA as default. If you have the associated account ID, consider using the Hedera mirror node to confirm the key type.`
|
|
584
|
+
};
|
|
585
|
+
} catch (ecdsaError) {
|
|
586
|
+
try {
|
|
587
|
+
const privateKey = PrivateKey.fromStringED25519(privateKeyString);
|
|
588
|
+
return {
|
|
589
|
+
detectedType: "ed25519",
|
|
590
|
+
privateKey,
|
|
591
|
+
warning: `Using ED25519 as fallback. If you have the associated account ID, consider using the Hedera mirror node to confirm the key type.`
|
|
592
|
+
};
|
|
593
|
+
} catch (ed25519Error) {
|
|
594
|
+
throw new Error(
|
|
595
|
+
`Failed to parse private key as either ECDSA or ED25519: ${ecdsaError}`
|
|
596
|
+
);
|
|
597
|
+
}
|
|
213
598
|
}
|
|
214
|
-
return result;
|
|
215
599
|
}
|
|
216
600
|
export {
|
|
217
|
-
|
|
218
|
-
|
|
219
|
-
|
|
220
|
-
NodeHmacAdapter,
|
|
221
|
-
WebCryptoAdapter,
|
|
222
|
-
WebHmacAdapter,
|
|
223
|
-
getCryptoAdapter,
|
|
224
|
-
hash
|
|
601
|
+
KeyType,
|
|
602
|
+
KeyTypeDetector,
|
|
603
|
+
detectKeyTypeFromString
|
|
225
604
|
};
|
|
226
605
|
//# sourceMappingURL=standards-sdk.es113.js.map
|