@pezkuwi/wasm-crypto 7.5.13 → 7.5.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/Cargo.toml +50 -0
- package/Xargo.toml +2 -0
- package/build/README.md +29 -0
- package/build/bundle-pezkuwi-wasm-crypto.js +2092 -0
- package/build/bundle.d.ts +40 -0
- package/build/bundle.js +505 -0
- package/build/cjs/bundle.d.ts +40 -0
- package/build/cjs/bundle.js +544 -0
- package/{index.d.ts → build/cjs/index.d.ts} +0 -1
- package/build/cjs/index.js +4 -0
- package/build/cjs/init.js +21 -0
- package/build/cjs/initNone.js +20 -0
- package/build/cjs/initOnlyAsm.js +20 -0
- package/build/cjs/initOnlyWasm.js +20 -0
- package/build/cjs/initWasmAsm.js +20 -0
- package/build/cjs/packageInfo.js +4 -0
- package/build/index.d.ts +1 -0
- package/build/index.js +1 -0
- package/build/init.d.ts +16 -0
- package/build/init.js +17 -0
- package/build/initNone.d.ts +10 -0
- package/build/initNone.js +17 -0
- package/build/initOnlyAsm.d.ts +10 -0
- package/build/initOnlyAsm.js +17 -0
- package/build/initOnlyWasm.d.ts +10 -0
- package/build/initOnlyWasm.js +17 -0
- package/build/initWasmAsm.d.ts +10 -0
- package/build/initWasmAsm.js +17 -0
- package/build/package.json +208 -0
- package/build/packageDetect.d.ts +1 -0
- package/build/packageDetect.js +8 -0
- package/build/packageInfo.d.ts +6 -0
- package/build/packageInfo.js +1 -0
- package/build-deno/README.md +25 -0
- package/build-deno/bundle.ts +597 -0
- package/build-deno/index.ts +2 -0
- package/build-deno/init.ts +23 -0
- package/build-deno/initNone.ts +21 -0
- package/build-deno/initOnlyAsm.ts +21 -0
- package/build-deno/initOnlyWasm.ts +21 -0
- package/build-deno/initWasmAsm.ts +21 -0
- package/build-deno/mod.ts +2 -0
- package/build-deno/packageDetect.ts +12 -0
- package/build-deno/packageInfo.ts +3 -0
- package/build-deno/rs/.editorconfig +10 -0
- package/build-tsc/bundle.d.ts +40 -0
- package/{cjs → build-tsc}/index.d.ts +0 -1
- package/build-tsc-cjs/bundle.js +544 -0
- package/{cjs → build-tsc-cjs}/index.js +0 -1
- package/build-tsc-cjs/packageDetect.js +10 -0
- package/{cjs → build-tsc-cjs}/packageInfo.js +1 -1
- package/build-tsc-esm/bundle.js +505 -0
- package/{index.js → build-tsc-esm/index.js} +0 -1
- package/{packageInfo.js → build-tsc-esm/packageInfo.js} +1 -1
- package/package.json +89 -87
- package/src/bundle.ts +613 -0
- package/src/index.ts +5 -0
- package/src/init.ts +25 -0
- package/src/initNone.ts +23 -0
- package/src/initOnlyAsm.ts +23 -0
- package/src/initOnlyWasm.ts +23 -0
- package/src/initWasmAsm.ts +23 -0
- package/src/lib.rs +24 -0
- package/src/mod.ts +4 -0
- package/src/packageDetect.ts +16 -0
- package/src/packageInfo.ts +6 -0
- package/src/rs/.editorconfig +10 -0
- package/src/rs/bip39.rs +139 -0
- package/src/rs/ed25519.rs +142 -0
- package/src/rs/hashing.rs +322 -0
- package/src/rs/secp256k1.rs +150 -0
- package/src/rs/sr25519.rs +331 -0
- package/src/rs/vrf.rs +144 -0
- package/test/all/bip39.js +86 -0
- package/test/all/ed25519.js +84 -0
- package/test/all/hashing.js +138 -0
- package/test/all/index.js +126 -0
- package/test/all/secp256k1.js +105 -0
- package/test/all/sr25519.js +211 -0
- package/test/all/vrf.js +74 -0
- package/test/asm.js +10 -0
- package/test/deno.ts +38 -0
- package/test/jest.spec.ts +25 -0
- package/test/loader-build.js +39 -0
- package/test/wasm.js +8 -0
- package/tsconfig.build.json +19 -0
- package/tsconfig.build.tsbuildinfo +1 -0
- package/tsconfig.spec.json +16 -0
- package/tsconfig.spec.tsbuildinfo +1 -0
- package/bundle-pezkuwi-wasm-crypto.js +0 -825
- package/bundle.d.ts +0 -37
- package/bundle.js +0 -165
- package/cjs/bundle.d.ts +0 -37
- package/cjs/bundle.js +0 -171
- /package/{LICENSE → build/LICENSE} +0 -0
- /package/{init.d.ts → build/cjs/init.d.ts} +0 -0
- /package/{initNone.d.ts → build/cjs/initNone.d.ts} +0 -0
- /package/{initOnlyAsm.d.ts → build/cjs/initOnlyAsm.d.ts} +0 -0
- /package/{initOnlyWasm.d.ts → build/cjs/initOnlyWasm.d.ts} +0 -0
- /package/{initWasmAsm.d.ts → build/cjs/initWasmAsm.d.ts} +0 -0
- /package/{cjs → build/cjs}/package.json +0 -0
- /package/{packageDetect.d.ts → build/cjs/packageDetect.d.ts} +0 -0
- /package/{cjs → build/cjs}/packageDetect.js +0 -0
- /package/{packageInfo.d.ts → build/cjs/packageInfo.d.ts} +0 -0
- /package/{cjs → build-tsc}/init.d.ts +0 -0
- /package/{cjs → build-tsc}/initNone.d.ts +0 -0
- /package/{cjs → build-tsc}/initOnlyAsm.d.ts +0 -0
- /package/{cjs → build-tsc}/initOnlyWasm.d.ts +0 -0
- /package/{cjs → build-tsc}/initWasmAsm.d.ts +0 -0
- /package/{cjs → build-tsc}/packageDetect.d.ts +0 -0
- /package/{cjs → build-tsc}/packageInfo.d.ts +0 -0
- /package/{cjs → build-tsc-cjs}/init.js +0 -0
- /package/{cjs → build-tsc-cjs}/initNone.js +0 -0
- /package/{cjs → build-tsc-cjs}/initOnlyAsm.js +0 -0
- /package/{cjs → build-tsc-cjs}/initOnlyWasm.js +0 -0
- /package/{cjs → build-tsc-cjs}/initWasmAsm.js +0 -0
- /package/{init.js → build-tsc-esm/init.js} +0 -0
- /package/{initNone.js → build-tsc-esm/initNone.js} +0 -0
- /package/{initOnlyAsm.js → build-tsc-esm/initOnlyAsm.js} +0 -0
- /package/{initOnlyWasm.js → build-tsc-esm/initOnlyWasm.js} +0 -0
- /package/{initWasmAsm.js → build-tsc-esm/initWasmAsm.js} +0 -0
- /package/{packageDetect.js → build-tsc-esm/packageDetect.js} +0 -0
package/bundle.d.ts
DELETED
|
@@ -1,37 +0,0 @@
|
|
|
1
|
-
import { bridge } from './init.js';
|
|
2
|
-
export { packageInfo } from './packageInfo.js';
|
|
3
|
-
export { bridge };
|
|
4
|
-
export declare const bip39Generate: (words: 12 | 15 | 18 | 21 | 24) => string;
|
|
5
|
-
export declare const bip39ToEntropy: (phrase: string) => Uint8Array<ArrayBufferLike>;
|
|
6
|
-
export declare const bip39ToMiniSecret: (phrase: string, password: string) => Uint8Array<ArrayBufferLike>;
|
|
7
|
-
export declare const bip39ToSeed: (phrase: string, password: string) => Uint8Array<ArrayBufferLike>;
|
|
8
|
-
export declare const bip39Validate: (phrase: string) => boolean;
|
|
9
|
-
export declare const ed25519KeypairFromSeed: (seed: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
10
|
-
export declare const ed25519Sign: (pubkey: Uint8Array<ArrayBufferLike>, seckey: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
11
|
-
export declare const ed25519Verify: (signature: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>, pubkey: Uint8Array<ArrayBufferLike>) => boolean;
|
|
12
|
-
export declare const secp256k1FromSeed: (seckey: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
13
|
-
export declare const secp256k1Compress: (pubkey: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
14
|
-
export declare const secp256k1Expand: (pubkey: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
15
|
-
export declare const secp256k1Recover: (msgHash: Uint8Array<ArrayBufferLike>, sig: Uint8Array<ArrayBufferLike>, recovery: number) => Uint8Array<ArrayBufferLike>;
|
|
16
|
-
export declare const secp256k1Sign: (msgHash: Uint8Array<ArrayBufferLike>, seckey: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
17
|
-
export declare const sr25519DeriveKeypairHard: (pair: Uint8Array<ArrayBufferLike>, cc: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
18
|
-
export declare const sr25519DeriveKeypairSoft: (pair: Uint8Array<ArrayBufferLike>, cc: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
19
|
-
export declare const sr25519DerivePublicSoft: (pubkey: Uint8Array<ArrayBufferLike>, cc: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
20
|
-
export declare const sr25519KeypairFromSeed: (seed: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
21
|
-
export declare const sr25519Sign: (pubkey: Uint8Array<ArrayBufferLike>, secret: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
22
|
-
export declare const sr25519Verify: (signature: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>, pubkey: Uint8Array<ArrayBufferLike>) => boolean;
|
|
23
|
-
export declare const sr25519Agree: (pubkey: Uint8Array<ArrayBufferLike>, secret: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
24
|
-
export declare const vrfSign: (secret: Uint8Array<ArrayBufferLike>, context: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>, extra: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
25
|
-
export declare const vrfVerify: (pubkey: Uint8Array<ArrayBufferLike>, context: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>, extra: Uint8Array<ArrayBufferLike>, outAndProof: Uint8Array<ArrayBufferLike>) => boolean;
|
|
26
|
-
export declare const blake2b: (data: Uint8Array<ArrayBufferLike>, key: Uint8Array<ArrayBufferLike>, size: number) => Uint8Array<ArrayBufferLike>;
|
|
27
|
-
export declare const hmacSha256: (key: Uint8Array<ArrayBufferLike>, data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
28
|
-
export declare const hmacSha512: (key: Uint8Array<ArrayBufferLike>, data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
29
|
-
export declare const keccak256: (data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
30
|
-
export declare const keccak512: (data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
31
|
-
export declare const pbkdf2: (data: Uint8Array<ArrayBufferLike>, salt: Uint8Array<ArrayBufferLike>, rounds: number) => Uint8Array<ArrayBufferLike>;
|
|
32
|
-
export declare const scrypt: (password: Uint8Array<ArrayBufferLike>, salt: Uint8Array<ArrayBufferLike>, log2n: number, r: number, p: number) => Uint8Array<ArrayBufferLike>;
|
|
33
|
-
export declare const sha256: (data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
34
|
-
export declare const sha512: (data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
35
|
-
export declare const twox: (data: Uint8Array<ArrayBufferLike>, rounds: number) => Uint8Array<ArrayBufferLike>;
|
|
36
|
-
export declare function isReady(): boolean;
|
|
37
|
-
export declare function waitReady(): Promise<boolean>;
|
package/bundle.js
DELETED
|
@@ -1,165 +0,0 @@
|
|
|
1
|
-
import { bridge, initBridge } from './init.js';
|
|
2
|
-
export { packageInfo } from './packageInfo.js';
|
|
3
|
-
export { bridge };
|
|
4
|
-
/**
|
|
5
|
-
* @internal
|
|
6
|
-
* @description
|
|
7
|
-
* This create an extenal interface function from the signature, all the while checking
|
|
8
|
-
* the actual bridge wasm interface to ensure it has been initialized.
|
|
9
|
-
*
|
|
10
|
-
* This means that we can call it
|
|
11
|
-
*
|
|
12
|
-
* withWasm(wasm: WasmCryptoInstance, a: number, b: string) => Uint8Array
|
|
13
|
-
*
|
|
14
|
-
* and in this case it will create an interface function with the signarure
|
|
15
|
-
*
|
|
16
|
-
* (a: number, b: string) => Uint8Array
|
|
17
|
-
*/
|
|
18
|
-
function withWasm(fn) {
|
|
19
|
-
return (...params) => {
|
|
20
|
-
if (!bridge.wasm) {
|
|
21
|
-
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @pezkuwi/wasm-crypto (or cryptoWaitReady() from @pezkuwi/util-crypto) before attempting to use WASM-only interfaces.');
|
|
22
|
-
}
|
|
23
|
-
return fn(bridge.wasm, ...params);
|
|
24
|
-
};
|
|
25
|
-
}
|
|
26
|
-
export const bip39Generate = /*#__PURE__*/ withWasm((wasm, words) => {
|
|
27
|
-
wasm.ext_bip39_generate(8, words);
|
|
28
|
-
return bridge.resultString();
|
|
29
|
-
});
|
|
30
|
-
export const bip39ToEntropy = /*#__PURE__*/ withWasm((wasm, phrase) => {
|
|
31
|
-
wasm.ext_bip39_to_entropy(8, ...bridge.allocString(phrase));
|
|
32
|
-
return bridge.resultU8a();
|
|
33
|
-
});
|
|
34
|
-
export const bip39ToMiniSecret = /*#__PURE__*/ withWasm((wasm, phrase, password) => {
|
|
35
|
-
wasm.ext_bip39_to_mini_secret(8, ...bridge.allocString(phrase), ...bridge.allocString(password));
|
|
36
|
-
return bridge.resultU8a();
|
|
37
|
-
});
|
|
38
|
-
export const bip39ToSeed = /*#__PURE__*/ withWasm((wasm, phrase, password) => {
|
|
39
|
-
wasm.ext_bip39_to_seed(8, ...bridge.allocString(phrase), ...bridge.allocString(password));
|
|
40
|
-
return bridge.resultU8a();
|
|
41
|
-
});
|
|
42
|
-
export const bip39Validate = /*#__PURE__*/ withWasm((wasm, phrase) => {
|
|
43
|
-
const ret = wasm.ext_bip39_validate(...bridge.allocString(phrase));
|
|
44
|
-
return ret !== 0;
|
|
45
|
-
});
|
|
46
|
-
export const ed25519KeypairFromSeed = /*#__PURE__*/ withWasm((wasm, seed) => {
|
|
47
|
-
wasm.ext_ed_from_seed(8, ...bridge.allocU8a(seed));
|
|
48
|
-
return bridge.resultU8a();
|
|
49
|
-
});
|
|
50
|
-
export const ed25519Sign = /*#__PURE__*/ withWasm((wasm, pubkey, seckey, message) => {
|
|
51
|
-
wasm.ext_ed_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(seckey), ...bridge.allocU8a(message));
|
|
52
|
-
return bridge.resultU8a();
|
|
53
|
-
});
|
|
54
|
-
export const ed25519Verify = /*#__PURE__*/ withWasm((wasm, signature, message, pubkey) => {
|
|
55
|
-
const ret = wasm.ext_ed_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey));
|
|
56
|
-
return ret !== 0;
|
|
57
|
-
});
|
|
58
|
-
export const secp256k1FromSeed = /*#__PURE__*/ withWasm((wasm, seckey) => {
|
|
59
|
-
wasm.ext_secp_from_seed(8, ...bridge.allocU8a(seckey));
|
|
60
|
-
return bridge.resultU8a();
|
|
61
|
-
});
|
|
62
|
-
export const secp256k1Compress = /*#__PURE__*/ withWasm((wasm, pubkey) => {
|
|
63
|
-
wasm.ext_secp_pub_compress(8, ...bridge.allocU8a(pubkey));
|
|
64
|
-
return bridge.resultU8a();
|
|
65
|
-
});
|
|
66
|
-
export const secp256k1Expand = /*#__PURE__*/ withWasm((wasm, pubkey) => {
|
|
67
|
-
wasm.ext_secp_pub_expand(8, ...bridge.allocU8a(pubkey));
|
|
68
|
-
return bridge.resultU8a();
|
|
69
|
-
});
|
|
70
|
-
export const secp256k1Recover = /*#__PURE__*/ withWasm((wasm, msgHash, sig, recovery) => {
|
|
71
|
-
wasm.ext_secp_recover(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(sig), recovery);
|
|
72
|
-
return bridge.resultU8a();
|
|
73
|
-
});
|
|
74
|
-
export const secp256k1Sign = /*#__PURE__*/ withWasm((wasm, msgHash, seckey) => {
|
|
75
|
-
wasm.ext_secp_sign(8, ...bridge.allocU8a(msgHash), ...bridge.allocU8a(seckey));
|
|
76
|
-
return bridge.resultU8a();
|
|
77
|
-
});
|
|
78
|
-
export const sr25519DeriveKeypairHard = /*#__PURE__*/ withWasm((wasm, pair, cc) => {
|
|
79
|
-
wasm.ext_sr_derive_keypair_hard(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc));
|
|
80
|
-
return bridge.resultU8a();
|
|
81
|
-
});
|
|
82
|
-
export const sr25519DeriveKeypairSoft = /*#__PURE__*/ withWasm((wasm, pair, cc) => {
|
|
83
|
-
wasm.ext_sr_derive_keypair_soft(8, ...bridge.allocU8a(pair), ...bridge.allocU8a(cc));
|
|
84
|
-
return bridge.resultU8a();
|
|
85
|
-
});
|
|
86
|
-
export const sr25519DerivePublicSoft = /*#__PURE__*/ withWasm((wasm, pubkey, cc) => {
|
|
87
|
-
wasm.ext_sr_derive_public_soft(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(cc));
|
|
88
|
-
return bridge.resultU8a();
|
|
89
|
-
});
|
|
90
|
-
export const sr25519KeypairFromSeed = /*#__PURE__*/ withWasm((wasm, seed) => {
|
|
91
|
-
wasm.ext_sr_from_seed(8, ...bridge.allocU8a(seed));
|
|
92
|
-
return bridge.resultU8a();
|
|
93
|
-
});
|
|
94
|
-
export const sr25519Sign = /*#__PURE__*/ withWasm((wasm, pubkey, secret, message) => {
|
|
95
|
-
wasm.ext_sr_sign(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret), ...bridge.allocU8a(message));
|
|
96
|
-
return bridge.resultU8a();
|
|
97
|
-
});
|
|
98
|
-
export const sr25519Verify = /*#__PURE__*/ withWasm((wasm, signature, message, pubkey) => {
|
|
99
|
-
const ret = wasm.ext_sr_verify(...bridge.allocU8a(signature), ...bridge.allocU8a(message), ...bridge.allocU8a(pubkey));
|
|
100
|
-
return ret !== 0;
|
|
101
|
-
});
|
|
102
|
-
export const sr25519Agree = /*#__PURE__*/ withWasm((wasm, pubkey, secret) => {
|
|
103
|
-
wasm.ext_sr_agree(8, ...bridge.allocU8a(pubkey), ...bridge.allocU8a(secret));
|
|
104
|
-
return bridge.resultU8a();
|
|
105
|
-
});
|
|
106
|
-
export const vrfSign = /*#__PURE__*/ withWasm((wasm, secret, context, message, extra) => {
|
|
107
|
-
wasm.ext_vrf_sign(8, ...bridge.allocU8a(secret), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra));
|
|
108
|
-
return bridge.resultU8a();
|
|
109
|
-
});
|
|
110
|
-
export const vrfVerify = /*#__PURE__*/ withWasm((wasm, pubkey, context, message, extra, outAndProof) => {
|
|
111
|
-
const ret = wasm.ext_vrf_verify(...bridge.allocU8a(pubkey), ...bridge.allocU8a(context), ...bridge.allocU8a(message), ...bridge.allocU8a(extra), ...bridge.allocU8a(outAndProof));
|
|
112
|
-
return ret !== 0;
|
|
113
|
-
});
|
|
114
|
-
export const blake2b = /*#__PURE__*/ withWasm((wasm, data, key, size) => {
|
|
115
|
-
wasm.ext_blake2b(8, ...bridge.allocU8a(data), ...bridge.allocU8a(key), size);
|
|
116
|
-
return bridge.resultU8a();
|
|
117
|
-
});
|
|
118
|
-
export const hmacSha256 = /*#__PURE__*/ withWasm((wasm, key, data) => {
|
|
119
|
-
wasm.ext_hmac_sha256(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data));
|
|
120
|
-
return bridge.resultU8a();
|
|
121
|
-
});
|
|
122
|
-
export const hmacSha512 = /*#__PURE__*/ withWasm((wasm, key, data) => {
|
|
123
|
-
wasm.ext_hmac_sha512(8, ...bridge.allocU8a(key), ...bridge.allocU8a(data));
|
|
124
|
-
return bridge.resultU8a();
|
|
125
|
-
});
|
|
126
|
-
export const keccak256 = /*#__PURE__*/ withWasm((wasm, data) => {
|
|
127
|
-
wasm.ext_keccak256(8, ...bridge.allocU8a(data));
|
|
128
|
-
return bridge.resultU8a();
|
|
129
|
-
});
|
|
130
|
-
export const keccak512 = /*#__PURE__*/ withWasm((wasm, data) => {
|
|
131
|
-
wasm.ext_keccak512(8, ...bridge.allocU8a(data));
|
|
132
|
-
return bridge.resultU8a();
|
|
133
|
-
});
|
|
134
|
-
export const pbkdf2 = /*#__PURE__*/ withWasm((wasm, data, salt, rounds) => {
|
|
135
|
-
wasm.ext_pbkdf2(8, ...bridge.allocU8a(data), ...bridge.allocU8a(salt), rounds);
|
|
136
|
-
return bridge.resultU8a();
|
|
137
|
-
});
|
|
138
|
-
export const scrypt = /*#__PURE__*/ withWasm((wasm, password, salt, log2n, r, p) => {
|
|
139
|
-
wasm.ext_scrypt(8, ...bridge.allocU8a(password), ...bridge.allocU8a(salt), log2n, r, p);
|
|
140
|
-
return bridge.resultU8a();
|
|
141
|
-
});
|
|
142
|
-
export const sha256 = /*#__PURE__*/ withWasm((wasm, data) => {
|
|
143
|
-
wasm.ext_sha256(8, ...bridge.allocU8a(data));
|
|
144
|
-
return bridge.resultU8a();
|
|
145
|
-
});
|
|
146
|
-
export const sha512 = /*#__PURE__*/ withWasm((wasm, data) => {
|
|
147
|
-
wasm.ext_sha512(8, ...bridge.allocU8a(data));
|
|
148
|
-
return bridge.resultU8a();
|
|
149
|
-
});
|
|
150
|
-
export const twox = /*#__PURE__*/ withWasm((wasm, data, rounds) => {
|
|
151
|
-
wasm.ext_twox(8, ...bridge.allocU8a(data), rounds);
|
|
152
|
-
return bridge.resultU8a();
|
|
153
|
-
});
|
|
154
|
-
export function isReady() {
|
|
155
|
-
return !!bridge.wasm;
|
|
156
|
-
}
|
|
157
|
-
export async function waitReady() {
|
|
158
|
-
try {
|
|
159
|
-
const wasm = await initBridge();
|
|
160
|
-
return !!wasm;
|
|
161
|
-
}
|
|
162
|
-
catch {
|
|
163
|
-
return false;
|
|
164
|
-
}
|
|
165
|
-
}
|
package/cjs/bundle.d.ts
DELETED
|
@@ -1,37 +0,0 @@
|
|
|
1
|
-
import { bridge } from './init.js';
|
|
2
|
-
export { packageInfo } from './packageInfo.js';
|
|
3
|
-
export { bridge };
|
|
4
|
-
export declare const bip39Generate: (words: 12 | 15 | 18 | 21 | 24) => string;
|
|
5
|
-
export declare const bip39ToEntropy: (phrase: string) => Uint8Array<ArrayBufferLike>;
|
|
6
|
-
export declare const bip39ToMiniSecret: (phrase: string, password: string) => Uint8Array<ArrayBufferLike>;
|
|
7
|
-
export declare const bip39ToSeed: (phrase: string, password: string) => Uint8Array<ArrayBufferLike>;
|
|
8
|
-
export declare const bip39Validate: (phrase: string) => boolean;
|
|
9
|
-
export declare const ed25519KeypairFromSeed: (seed: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
10
|
-
export declare const ed25519Sign: (pubkey: Uint8Array<ArrayBufferLike>, seckey: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
11
|
-
export declare const ed25519Verify: (signature: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>, pubkey: Uint8Array<ArrayBufferLike>) => boolean;
|
|
12
|
-
export declare const secp256k1FromSeed: (seckey: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
13
|
-
export declare const secp256k1Compress: (pubkey: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
14
|
-
export declare const secp256k1Expand: (pubkey: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
15
|
-
export declare const secp256k1Recover: (msgHash: Uint8Array<ArrayBufferLike>, sig: Uint8Array<ArrayBufferLike>, recovery: number) => Uint8Array<ArrayBufferLike>;
|
|
16
|
-
export declare const secp256k1Sign: (msgHash: Uint8Array<ArrayBufferLike>, seckey: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
17
|
-
export declare const sr25519DeriveKeypairHard: (pair: Uint8Array<ArrayBufferLike>, cc: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
18
|
-
export declare const sr25519DeriveKeypairSoft: (pair: Uint8Array<ArrayBufferLike>, cc: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
19
|
-
export declare const sr25519DerivePublicSoft: (pubkey: Uint8Array<ArrayBufferLike>, cc: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
20
|
-
export declare const sr25519KeypairFromSeed: (seed: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
21
|
-
export declare const sr25519Sign: (pubkey: Uint8Array<ArrayBufferLike>, secret: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
22
|
-
export declare const sr25519Verify: (signature: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>, pubkey: Uint8Array<ArrayBufferLike>) => boolean;
|
|
23
|
-
export declare const sr25519Agree: (pubkey: Uint8Array<ArrayBufferLike>, secret: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
24
|
-
export declare const vrfSign: (secret: Uint8Array<ArrayBufferLike>, context: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>, extra: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
25
|
-
export declare const vrfVerify: (pubkey: Uint8Array<ArrayBufferLike>, context: Uint8Array<ArrayBufferLike>, message: Uint8Array<ArrayBufferLike>, extra: Uint8Array<ArrayBufferLike>, outAndProof: Uint8Array<ArrayBufferLike>) => boolean;
|
|
26
|
-
export declare const blake2b: (data: Uint8Array<ArrayBufferLike>, key: Uint8Array<ArrayBufferLike>, size: number) => Uint8Array<ArrayBufferLike>;
|
|
27
|
-
export declare const hmacSha256: (key: Uint8Array<ArrayBufferLike>, data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
28
|
-
export declare const hmacSha512: (key: Uint8Array<ArrayBufferLike>, data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
29
|
-
export declare const keccak256: (data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
30
|
-
export declare const keccak512: (data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
31
|
-
export declare const pbkdf2: (data: Uint8Array<ArrayBufferLike>, salt: Uint8Array<ArrayBufferLike>, rounds: number) => Uint8Array<ArrayBufferLike>;
|
|
32
|
-
export declare const scrypt: (password: Uint8Array<ArrayBufferLike>, salt: Uint8Array<ArrayBufferLike>, log2n: number, r: number, p: number) => Uint8Array<ArrayBufferLike>;
|
|
33
|
-
export declare const sha256: (data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
34
|
-
export declare const sha512: (data: Uint8Array<ArrayBufferLike>) => Uint8Array<ArrayBufferLike>;
|
|
35
|
-
export declare const twox: (data: Uint8Array<ArrayBufferLike>, rounds: number) => Uint8Array<ArrayBufferLike>;
|
|
36
|
-
export declare function isReady(): boolean;
|
|
37
|
-
export declare function waitReady(): Promise<boolean>;
|
package/cjs/bundle.js
DELETED
|
@@ -1,171 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.twox = exports.sha512 = exports.sha256 = exports.scrypt = exports.pbkdf2 = exports.keccak512 = exports.keccak256 = exports.hmacSha512 = exports.hmacSha256 = exports.blake2b = exports.vrfVerify = exports.vrfSign = exports.sr25519Agree = exports.sr25519Verify = exports.sr25519Sign = exports.sr25519KeypairFromSeed = exports.sr25519DerivePublicSoft = exports.sr25519DeriveKeypairSoft = exports.sr25519DeriveKeypairHard = exports.secp256k1Sign = exports.secp256k1Recover = exports.secp256k1Expand = exports.secp256k1Compress = exports.secp256k1FromSeed = exports.ed25519Verify = exports.ed25519Sign = exports.ed25519KeypairFromSeed = exports.bip39Validate = exports.bip39ToSeed = exports.bip39ToMiniSecret = exports.bip39ToEntropy = exports.bip39Generate = exports.bridge = exports.packageInfo = void 0;
|
|
4
|
-
exports.isReady = isReady;
|
|
5
|
-
exports.waitReady = waitReady;
|
|
6
|
-
const init_js_1 = require("./init.js");
|
|
7
|
-
Object.defineProperty(exports, "bridge", { enumerable: true, get: function () { return init_js_1.bridge; } });
|
|
8
|
-
var packageInfo_js_1 = require("./packageInfo.js");
|
|
9
|
-
Object.defineProperty(exports, "packageInfo", { enumerable: true, get: function () { return packageInfo_js_1.packageInfo; } });
|
|
10
|
-
/**
|
|
11
|
-
* @internal
|
|
12
|
-
* @description
|
|
13
|
-
* This create an extenal interface function from the signature, all the while checking
|
|
14
|
-
* the actual bridge wasm interface to ensure it has been initialized.
|
|
15
|
-
*
|
|
16
|
-
* This means that we can call it
|
|
17
|
-
*
|
|
18
|
-
* withWasm(wasm: WasmCryptoInstance, a: number, b: string) => Uint8Array
|
|
19
|
-
*
|
|
20
|
-
* and in this case it will create an interface function with the signarure
|
|
21
|
-
*
|
|
22
|
-
* (a: number, b: string) => Uint8Array
|
|
23
|
-
*/
|
|
24
|
-
function withWasm(fn) {
|
|
25
|
-
return (...params) => {
|
|
26
|
-
if (!init_js_1.bridge.wasm) {
|
|
27
|
-
throw new Error('The WASM interface has not been initialized. Ensure that you wait for the initialization Promise with waitReady() from @pezkuwi/wasm-crypto (or cryptoWaitReady() from @pezkuwi/util-crypto) before attempting to use WASM-only interfaces.');
|
|
28
|
-
}
|
|
29
|
-
return fn(init_js_1.bridge.wasm, ...params);
|
|
30
|
-
};
|
|
31
|
-
}
|
|
32
|
-
exports.bip39Generate = withWasm((wasm, words) => {
|
|
33
|
-
wasm.ext_bip39_generate(8, words);
|
|
34
|
-
return init_js_1.bridge.resultString();
|
|
35
|
-
});
|
|
36
|
-
exports.bip39ToEntropy = withWasm((wasm, phrase) => {
|
|
37
|
-
wasm.ext_bip39_to_entropy(8, ...init_js_1.bridge.allocString(phrase));
|
|
38
|
-
return init_js_1.bridge.resultU8a();
|
|
39
|
-
});
|
|
40
|
-
exports.bip39ToMiniSecret = withWasm((wasm, phrase, password) => {
|
|
41
|
-
wasm.ext_bip39_to_mini_secret(8, ...init_js_1.bridge.allocString(phrase), ...init_js_1.bridge.allocString(password));
|
|
42
|
-
return init_js_1.bridge.resultU8a();
|
|
43
|
-
});
|
|
44
|
-
exports.bip39ToSeed = withWasm((wasm, phrase, password) => {
|
|
45
|
-
wasm.ext_bip39_to_seed(8, ...init_js_1.bridge.allocString(phrase), ...init_js_1.bridge.allocString(password));
|
|
46
|
-
return init_js_1.bridge.resultU8a();
|
|
47
|
-
});
|
|
48
|
-
exports.bip39Validate = withWasm((wasm, phrase) => {
|
|
49
|
-
const ret = wasm.ext_bip39_validate(...init_js_1.bridge.allocString(phrase));
|
|
50
|
-
return ret !== 0;
|
|
51
|
-
});
|
|
52
|
-
exports.ed25519KeypairFromSeed = withWasm((wasm, seed) => {
|
|
53
|
-
wasm.ext_ed_from_seed(8, ...init_js_1.bridge.allocU8a(seed));
|
|
54
|
-
return init_js_1.bridge.resultU8a();
|
|
55
|
-
});
|
|
56
|
-
exports.ed25519Sign = withWasm((wasm, pubkey, seckey, message) => {
|
|
57
|
-
wasm.ext_ed_sign(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(seckey), ...init_js_1.bridge.allocU8a(message));
|
|
58
|
-
return init_js_1.bridge.resultU8a();
|
|
59
|
-
});
|
|
60
|
-
exports.ed25519Verify = withWasm((wasm, signature, message, pubkey) => {
|
|
61
|
-
const ret = wasm.ext_ed_verify(...init_js_1.bridge.allocU8a(signature), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(pubkey));
|
|
62
|
-
return ret !== 0;
|
|
63
|
-
});
|
|
64
|
-
exports.secp256k1FromSeed = withWasm((wasm, seckey) => {
|
|
65
|
-
wasm.ext_secp_from_seed(8, ...init_js_1.bridge.allocU8a(seckey));
|
|
66
|
-
return init_js_1.bridge.resultU8a();
|
|
67
|
-
});
|
|
68
|
-
exports.secp256k1Compress = withWasm((wasm, pubkey) => {
|
|
69
|
-
wasm.ext_secp_pub_compress(8, ...init_js_1.bridge.allocU8a(pubkey));
|
|
70
|
-
return init_js_1.bridge.resultU8a();
|
|
71
|
-
});
|
|
72
|
-
exports.secp256k1Expand = withWasm((wasm, pubkey) => {
|
|
73
|
-
wasm.ext_secp_pub_expand(8, ...init_js_1.bridge.allocU8a(pubkey));
|
|
74
|
-
return init_js_1.bridge.resultU8a();
|
|
75
|
-
});
|
|
76
|
-
exports.secp256k1Recover = withWasm((wasm, msgHash, sig, recovery) => {
|
|
77
|
-
wasm.ext_secp_recover(8, ...init_js_1.bridge.allocU8a(msgHash), ...init_js_1.bridge.allocU8a(sig), recovery);
|
|
78
|
-
return init_js_1.bridge.resultU8a();
|
|
79
|
-
});
|
|
80
|
-
exports.secp256k1Sign = withWasm((wasm, msgHash, seckey) => {
|
|
81
|
-
wasm.ext_secp_sign(8, ...init_js_1.bridge.allocU8a(msgHash), ...init_js_1.bridge.allocU8a(seckey));
|
|
82
|
-
return init_js_1.bridge.resultU8a();
|
|
83
|
-
});
|
|
84
|
-
exports.sr25519DeriveKeypairHard = withWasm((wasm, pair, cc) => {
|
|
85
|
-
wasm.ext_sr_derive_keypair_hard(8, ...init_js_1.bridge.allocU8a(pair), ...init_js_1.bridge.allocU8a(cc));
|
|
86
|
-
return init_js_1.bridge.resultU8a();
|
|
87
|
-
});
|
|
88
|
-
exports.sr25519DeriveKeypairSoft = withWasm((wasm, pair, cc) => {
|
|
89
|
-
wasm.ext_sr_derive_keypair_soft(8, ...init_js_1.bridge.allocU8a(pair), ...init_js_1.bridge.allocU8a(cc));
|
|
90
|
-
return init_js_1.bridge.resultU8a();
|
|
91
|
-
});
|
|
92
|
-
exports.sr25519DerivePublicSoft = withWasm((wasm, pubkey, cc) => {
|
|
93
|
-
wasm.ext_sr_derive_public_soft(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(cc));
|
|
94
|
-
return init_js_1.bridge.resultU8a();
|
|
95
|
-
});
|
|
96
|
-
exports.sr25519KeypairFromSeed = withWasm((wasm, seed) => {
|
|
97
|
-
wasm.ext_sr_from_seed(8, ...init_js_1.bridge.allocU8a(seed));
|
|
98
|
-
return init_js_1.bridge.resultU8a();
|
|
99
|
-
});
|
|
100
|
-
exports.sr25519Sign = withWasm((wasm, pubkey, secret, message) => {
|
|
101
|
-
wasm.ext_sr_sign(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(secret), ...init_js_1.bridge.allocU8a(message));
|
|
102
|
-
return init_js_1.bridge.resultU8a();
|
|
103
|
-
});
|
|
104
|
-
exports.sr25519Verify = withWasm((wasm, signature, message, pubkey) => {
|
|
105
|
-
const ret = wasm.ext_sr_verify(...init_js_1.bridge.allocU8a(signature), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(pubkey));
|
|
106
|
-
return ret !== 0;
|
|
107
|
-
});
|
|
108
|
-
exports.sr25519Agree = withWasm((wasm, pubkey, secret) => {
|
|
109
|
-
wasm.ext_sr_agree(8, ...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(secret));
|
|
110
|
-
return init_js_1.bridge.resultU8a();
|
|
111
|
-
});
|
|
112
|
-
exports.vrfSign = withWasm((wasm, secret, context, message, extra) => {
|
|
113
|
-
wasm.ext_vrf_sign(8, ...init_js_1.bridge.allocU8a(secret), ...init_js_1.bridge.allocU8a(context), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(extra));
|
|
114
|
-
return init_js_1.bridge.resultU8a();
|
|
115
|
-
});
|
|
116
|
-
exports.vrfVerify = withWasm((wasm, pubkey, context, message, extra, outAndProof) => {
|
|
117
|
-
const ret = wasm.ext_vrf_verify(...init_js_1.bridge.allocU8a(pubkey), ...init_js_1.bridge.allocU8a(context), ...init_js_1.bridge.allocU8a(message), ...init_js_1.bridge.allocU8a(extra), ...init_js_1.bridge.allocU8a(outAndProof));
|
|
118
|
-
return ret !== 0;
|
|
119
|
-
});
|
|
120
|
-
exports.blake2b = withWasm((wasm, data, key, size) => {
|
|
121
|
-
wasm.ext_blake2b(8, ...init_js_1.bridge.allocU8a(data), ...init_js_1.bridge.allocU8a(key), size);
|
|
122
|
-
return init_js_1.bridge.resultU8a();
|
|
123
|
-
});
|
|
124
|
-
exports.hmacSha256 = withWasm((wasm, key, data) => {
|
|
125
|
-
wasm.ext_hmac_sha256(8, ...init_js_1.bridge.allocU8a(key), ...init_js_1.bridge.allocU8a(data));
|
|
126
|
-
return init_js_1.bridge.resultU8a();
|
|
127
|
-
});
|
|
128
|
-
exports.hmacSha512 = withWasm((wasm, key, data) => {
|
|
129
|
-
wasm.ext_hmac_sha512(8, ...init_js_1.bridge.allocU8a(key), ...init_js_1.bridge.allocU8a(data));
|
|
130
|
-
return init_js_1.bridge.resultU8a();
|
|
131
|
-
});
|
|
132
|
-
exports.keccak256 = withWasm((wasm, data) => {
|
|
133
|
-
wasm.ext_keccak256(8, ...init_js_1.bridge.allocU8a(data));
|
|
134
|
-
return init_js_1.bridge.resultU8a();
|
|
135
|
-
});
|
|
136
|
-
exports.keccak512 = withWasm((wasm, data) => {
|
|
137
|
-
wasm.ext_keccak512(8, ...init_js_1.bridge.allocU8a(data));
|
|
138
|
-
return init_js_1.bridge.resultU8a();
|
|
139
|
-
});
|
|
140
|
-
exports.pbkdf2 = withWasm((wasm, data, salt, rounds) => {
|
|
141
|
-
wasm.ext_pbkdf2(8, ...init_js_1.bridge.allocU8a(data), ...init_js_1.bridge.allocU8a(salt), rounds);
|
|
142
|
-
return init_js_1.bridge.resultU8a();
|
|
143
|
-
});
|
|
144
|
-
exports.scrypt = withWasm((wasm, password, salt, log2n, r, p) => {
|
|
145
|
-
wasm.ext_scrypt(8, ...init_js_1.bridge.allocU8a(password), ...init_js_1.bridge.allocU8a(salt), log2n, r, p);
|
|
146
|
-
return init_js_1.bridge.resultU8a();
|
|
147
|
-
});
|
|
148
|
-
exports.sha256 = withWasm((wasm, data) => {
|
|
149
|
-
wasm.ext_sha256(8, ...init_js_1.bridge.allocU8a(data));
|
|
150
|
-
return init_js_1.bridge.resultU8a();
|
|
151
|
-
});
|
|
152
|
-
exports.sha512 = withWasm((wasm, data) => {
|
|
153
|
-
wasm.ext_sha512(8, ...init_js_1.bridge.allocU8a(data));
|
|
154
|
-
return init_js_1.bridge.resultU8a();
|
|
155
|
-
});
|
|
156
|
-
exports.twox = withWasm((wasm, data, rounds) => {
|
|
157
|
-
wasm.ext_twox(8, ...init_js_1.bridge.allocU8a(data), rounds);
|
|
158
|
-
return init_js_1.bridge.resultU8a();
|
|
159
|
-
});
|
|
160
|
-
function isReady() {
|
|
161
|
-
return !!init_js_1.bridge.wasm;
|
|
162
|
-
}
|
|
163
|
-
async function waitReady() {
|
|
164
|
-
try {
|
|
165
|
-
const wasm = await (0, init_js_1.initBridge)();
|
|
166
|
-
return !!wasm;
|
|
167
|
-
}
|
|
168
|
-
catch {
|
|
169
|
-
return false;
|
|
170
|
-
}
|
|
171
|
-
}
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|