@provablehq/wasm 0.9.10-testnet-rc → 0.9.10
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/mainnet/aleo_wasm.d.ts +36 -11
- package/dist/mainnet/aleo_wasm.wasm +0 -0
- package/dist/mainnet/index.js +154 -45
- package/dist/mainnet/index.js.map +1 -1
- package/dist/mainnet/worker.js +154 -45
- package/dist/mainnet/worker.js.map +1 -1
- package/dist/testnet/aleo_wasm.d.ts +36 -11
- package/dist/testnet/aleo_wasm.wasm +0 -0
- package/dist/testnet/index.js +154 -45
- package/dist/testnet/index.js.map +1 -1
- package/dist/testnet/worker.js +154 -45
- package/dist/testnet/worker.js.map +1 -1
- package/package.json +1 -1
|
@@ -19,7 +19,7 @@ export function verifyFunctionExecution(execution: Execution, verifying_key: Ver
|
|
|
19
19
|
/**
|
|
20
20
|
* Set test consensus version heights for testing.
|
|
21
21
|
*
|
|
22
|
-
* @
|
|
22
|
+
* @param {string | undefined} heights The block heights at which each consensus version applies. This input should be a simple csv list of block heights and there should be one number for each consensus version. If left undefined, the default test heights will be applied.
|
|
23
23
|
*
|
|
24
24
|
* @example
|
|
25
25
|
* import { getOrInitConsensusVersionHeights } from @provablehq/sdk;
|
|
@@ -156,6 +156,12 @@ export class Authorization {
|
|
|
156
156
|
* @param {Uint8Array} bytes Left-endian bytes representing the Authorization.
|
|
157
157
|
*/
|
|
158
158
|
static fromBytesLe(bytes: Uint8Array): Authorization;
|
|
159
|
+
/**
|
|
160
|
+
* Get the function name.
|
|
161
|
+
*
|
|
162
|
+
* @returns {string} The function name.
|
|
163
|
+
*/
|
|
164
|
+
functionName(): string;
|
|
159
165
|
/**
|
|
160
166
|
* Returns `true` if the Authorization is for `credits.aleo/fee_public`.
|
|
161
167
|
*/
|
|
@@ -2331,26 +2337,31 @@ export class ProgramManager {
|
|
|
2331
2337
|
* @returns {u64} Fee in microcredits
|
|
2332
2338
|
*/
|
|
2333
2339
|
static estimateFinalizeFee(program: string, _function: string): bigint;
|
|
2340
|
+
/**
|
|
2341
|
+
* Execute an authorization.
|
|
2342
|
+
*
|
|
2343
|
+
* @param authorization The authorization to execute.
|
|
2344
|
+
* @param fee_authorization The fee authorization to execute.
|
|
2345
|
+
* @param program The program authorized to be executed.
|
|
2346
|
+
* @param imports The imports of the program being executed.
|
|
2347
|
+
* @param url The url to get the inclusion proving information from.
|
|
2348
|
+
* @param offline_query Optional offline query object if building a Transaction offline.
|
|
2349
|
+
*/
|
|
2350
|
+
static executeAuthorization(authorization: Authorization, fee_authorization: Authorization | null | undefined, program: string, proving_key?: ProvingKey | null, verifying_key?: VerifyingKey | null, fee_proving_key?: ProvingKey | null, fee_verifying_key?: VerifyingKey | null, imports?: object | null, url?: string | null, offline_query?: OfflineQuery | null): Promise<Transaction>;
|
|
2334
2351
|
/**
|
|
2335
2352
|
* Estimate Fee for Aleo function execution. Note if "cache" is set to true, the proving and
|
|
2336
2353
|
* verifying keys will be stored in the ProgramManager's memory and used for subsequent
|
|
2337
2354
|
* program executions.
|
|
2338
2355
|
*
|
|
2339
|
-
*
|
|
2340
|
-
*
|
|
2341
|
-
* @param private_key The private key of the sender
|
|
2342
|
-
* @param program The source code of the program to estimate the execution fee for
|
|
2343
|
-
* @param function The name of the function to execute
|
|
2344
|
-
* @param inputs A javascript array of inputs to the function
|
|
2345
|
-
* @param url The url of the Aleo network node to send the transaction to
|
|
2356
|
+
* @param program The source code of the program to estimate the execution fee for.
|
|
2357
|
+
* @param function The name of the function to estimate the execution fee for.
|
|
2346
2358
|
* @param imports (optional) Provide a list of imports to use for the fee estimation in the
|
|
2347
2359
|
* form of a javascript object where the keys are a string of the program name and the values
|
|
2348
2360
|
* are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
|
|
2349
|
-
* @param
|
|
2350
|
-
* @param verifying_key (optional) Provide a verifying key to use for the fee estimation
|
|
2361
|
+
* @param edition {
|
|
2351
2362
|
* @returns {u64} Fee in microcredits
|
|
2352
2363
|
*/
|
|
2353
|
-
static estimateExecutionFee(
|
|
2364
|
+
static estimateExecutionFee(program: string, _function: string, imports?: object | null, edition?: number | null): Promise<bigint>;
|
|
2354
2365
|
/**
|
|
2355
2366
|
* Execute an arbitrary function locally
|
|
2356
2367
|
*
|
|
@@ -2372,6 +2383,20 @@ export class ProgramManager {
|
|
|
2372
2383
|
* @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution
|
|
2373
2384
|
*/
|
|
2374
2385
|
static executeFunctionOffline(private_key: PrivateKey, program: string, _function: string, inputs: Array<any>, prove_execution: boolean, cache: boolean, imports?: object | null, proving_key?: ProvingKey | null, verifying_key?: VerifyingKey | null, url?: string | null, offline_query?: OfflineQuery | null, edition?: number | null): Promise<ExecutionResponse>;
|
|
2386
|
+
/**
|
|
2387
|
+
* Estimate Fee for an Authorization.
|
|
2388
|
+
*
|
|
2389
|
+
* @param authorization Authorization to estimate the fee for.
|
|
2390
|
+
* @param program The program the Authorization is for.
|
|
2391
|
+
* @param imports Provide a list of imports to use for the fee estimation in the
|
|
2392
|
+
* form of a javascript object where the keys are a string of the program name and the values
|
|
2393
|
+
* are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
|
|
2394
|
+
* @param offline_query The offline query object used to insert the global state root and state paths needed to create
|
|
2395
|
+
* a valid inclusion proof offline.
|
|
2396
|
+
* @param edition: Optional edition to estimate the fee for.
|
|
2397
|
+
* @returns {u64} Fee in microcredits
|
|
2398
|
+
*/
|
|
2399
|
+
static estimateFeeForAuthorization(authorization: Authorization, program: string, imports?: object | null, edition?: number | null): Promise<bigint>;
|
|
2375
2400
|
/**
|
|
2376
2401
|
* Execute Aleo function and create an Aleo execution transaction
|
|
2377
2402
|
*
|
|
Binary file
|
package/dist/mainnet/index.js
CHANGED
|
@@ -267,7 +267,7 @@ function verifyFunctionExecution(execution, verifying_key, program, function_id,
|
|
|
267
267
|
/**
|
|
268
268
|
* Set test consensus version heights for testing.
|
|
269
269
|
*
|
|
270
|
-
* @
|
|
270
|
+
* @param {string | undefined} heights The block heights at which each consensus version applies. This input should be a simple csv list of block heights and there should be one number for each consensus version. If left undefined, the default test heights will be applied.
|
|
271
271
|
*
|
|
272
272
|
* @example
|
|
273
273
|
* import { getOrInitConsensusVersionHeights } from @provablehq/sdk;
|
|
@@ -303,12 +303,16 @@ function getArrayJsValueFromWasm0(ptr, len) {
|
|
|
303
303
|
}
|
|
304
304
|
return result;
|
|
305
305
|
}
|
|
306
|
-
function __wbg_adapter_40(arg0, arg1
|
|
307
|
-
wasm.__wbindgen_export_6(arg0, arg1
|
|
306
|
+
function __wbg_adapter_40(arg0, arg1) {
|
|
307
|
+
wasm.__wbindgen_export_6(arg0, arg1);
|
|
308
308
|
}
|
|
309
309
|
|
|
310
|
-
function
|
|
311
|
-
wasm.__wbindgen_export_7(arg0, arg1, addHeapObject(arg2)
|
|
310
|
+
function __wbg_adapter_43(arg0, arg1, arg2) {
|
|
311
|
+
wasm.__wbindgen_export_7(arg0, arg1, addHeapObject(arg2));
|
|
312
|
+
}
|
|
313
|
+
|
|
314
|
+
function __wbg_adapter_873(arg0, arg1, arg2, arg3) {
|
|
315
|
+
wasm.__wbindgen_export_8(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
|
312
316
|
}
|
|
313
317
|
|
|
314
318
|
const __wbindgen_enum_RequestCredentials = ["omit", "same-origin", "include"];
|
|
@@ -686,6 +690,36 @@ class Authorization {
|
|
|
686
690
|
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
687
691
|
}
|
|
688
692
|
}
|
|
693
|
+
/**
|
|
694
|
+
* Get the function name.
|
|
695
|
+
*
|
|
696
|
+
* @returns {string} The function name.
|
|
697
|
+
* @returns {string}
|
|
698
|
+
*/
|
|
699
|
+
functionName() {
|
|
700
|
+
let deferred2_0;
|
|
701
|
+
let deferred2_1;
|
|
702
|
+
try {
|
|
703
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
704
|
+
wasm.authorization_functionName(retptr, this.__wbg_ptr);
|
|
705
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
706
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
707
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
708
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
709
|
+
var ptr1 = r0;
|
|
710
|
+
var len1 = r1;
|
|
711
|
+
if (r3) {
|
|
712
|
+
ptr1 = 0; len1 = 0;
|
|
713
|
+
throw takeObject(r2);
|
|
714
|
+
}
|
|
715
|
+
deferred2_0 = ptr1;
|
|
716
|
+
deferred2_1 = len1;
|
|
717
|
+
return getStringFromWasm0(ptr1, len1);
|
|
718
|
+
} finally {
|
|
719
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
720
|
+
wasm.__wbindgen_export_2(deferred2_0, deferred2_1, 1);
|
|
721
|
+
}
|
|
722
|
+
}
|
|
689
723
|
/**
|
|
690
724
|
* Returns `true` if the Authorization is for `credits.aleo/fee_public`.
|
|
691
725
|
* @returns {boolean}
|
|
@@ -7859,43 +7893,36 @@ class ProgramManager {
|
|
|
7859
7893
|
}
|
|
7860
7894
|
}
|
|
7861
7895
|
/**
|
|
7862
|
-
*
|
|
7863
|
-
* verifying keys will be stored in the ProgramManager's memory and used for subsequent
|
|
7864
|
-
* program executions.
|
|
7896
|
+
* Execute an authorization.
|
|
7865
7897
|
*
|
|
7866
|
-
*
|
|
7867
|
-
*
|
|
7868
|
-
* @param
|
|
7869
|
-
* @param
|
|
7870
|
-
* @param
|
|
7871
|
-
* @param
|
|
7872
|
-
* @param
|
|
7873
|
-
* @param
|
|
7874
|
-
* form of a javascript object where the keys are a string of the program name and the values
|
|
7875
|
-
* are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
|
|
7876
|
-
* @param proving_key (optional) Provide a verifying key to use for the fee estimation
|
|
7877
|
-
* @param verifying_key (optional) Provide a verifying key to use for the fee estimation
|
|
7878
|
-
* @returns {u64} Fee in microcredits
|
|
7879
|
-
* @param {PrivateKey} private_key
|
|
7898
|
+
* @param authorization The authorization to execute.
|
|
7899
|
+
* @param fee_authorization The fee authorization to execute.
|
|
7900
|
+
* @param program The program authorized to be executed.
|
|
7901
|
+
* @param imports The imports of the program being executed.
|
|
7902
|
+
* @param url The url to get the inclusion proving information from.
|
|
7903
|
+
* @param offline_query Optional offline query object if building a Transaction offline.
|
|
7904
|
+
* @param {Authorization} authorization
|
|
7905
|
+
* @param {Authorization | null | undefined} fee_authorization
|
|
7880
7906
|
* @param {string} program
|
|
7881
|
-
* @param {string} _function
|
|
7882
|
-
* @param {Array<any>} inputs
|
|
7883
|
-
* @param {string | null} [url]
|
|
7884
|
-
* @param {object | null} [imports]
|
|
7885
7907
|
* @param {ProvingKey | null} [proving_key]
|
|
7886
7908
|
* @param {VerifyingKey | null} [verifying_key]
|
|
7909
|
+
* @param {ProvingKey | null} [fee_proving_key]
|
|
7910
|
+
* @param {VerifyingKey | null} [fee_verifying_key]
|
|
7911
|
+
* @param {object | null} [imports]
|
|
7912
|
+
* @param {string | null} [url]
|
|
7887
7913
|
* @param {OfflineQuery | null} [offline_query]
|
|
7888
|
-
* @
|
|
7889
|
-
* @returns {Promise<bigint>}
|
|
7914
|
+
* @returns {Promise<Transaction>}
|
|
7890
7915
|
*/
|
|
7891
|
-
static
|
|
7892
|
-
_assertClass(
|
|
7893
|
-
|
|
7894
|
-
|
|
7895
|
-
|
|
7896
|
-
|
|
7897
|
-
|
|
7898
|
-
|
|
7916
|
+
static executeAuthorization(authorization, fee_authorization, program, proving_key, verifying_key, fee_proving_key, fee_verifying_key, imports, url, offline_query) {
|
|
7917
|
+
_assertClass(authorization, Authorization);
|
|
7918
|
+
var ptr0 = authorization.__destroy_into_raw();
|
|
7919
|
+
let ptr1 = 0;
|
|
7920
|
+
if (!isLikeNone(fee_authorization)) {
|
|
7921
|
+
_assertClass(fee_authorization, Authorization);
|
|
7922
|
+
ptr1 = fee_authorization.__destroy_into_raw();
|
|
7923
|
+
}
|
|
7924
|
+
const ptr2 = passStringToWasm0(program, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
|
|
7925
|
+
const len2 = WASM_VECTOR_LEN;
|
|
7899
7926
|
let ptr3 = 0;
|
|
7900
7927
|
if (!isLikeNone(proving_key)) {
|
|
7901
7928
|
_assertClass(proving_key, ProvingKey);
|
|
@@ -7907,11 +7934,49 @@ class ProgramManager {
|
|
|
7907
7934
|
ptr4 = verifying_key.__destroy_into_raw();
|
|
7908
7935
|
}
|
|
7909
7936
|
let ptr5 = 0;
|
|
7937
|
+
if (!isLikeNone(fee_proving_key)) {
|
|
7938
|
+
_assertClass(fee_proving_key, ProvingKey);
|
|
7939
|
+
ptr5 = fee_proving_key.__destroy_into_raw();
|
|
7940
|
+
}
|
|
7941
|
+
let ptr6 = 0;
|
|
7942
|
+
if (!isLikeNone(fee_verifying_key)) {
|
|
7943
|
+
_assertClass(fee_verifying_key, VerifyingKey);
|
|
7944
|
+
ptr6 = fee_verifying_key.__destroy_into_raw();
|
|
7945
|
+
}
|
|
7946
|
+
var ptr7 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
|
|
7947
|
+
var len7 = WASM_VECTOR_LEN;
|
|
7948
|
+
let ptr8 = 0;
|
|
7910
7949
|
if (!isLikeNone(offline_query)) {
|
|
7911
7950
|
_assertClass(offline_query, OfflineQuery);
|
|
7912
|
-
|
|
7951
|
+
ptr8 = offline_query.__destroy_into_raw();
|
|
7913
7952
|
}
|
|
7914
|
-
const ret = wasm.
|
|
7953
|
+
const ret = wasm.programmanager_executeAuthorization(ptr0, ptr1, ptr2, len2, ptr3, ptr4, ptr5, ptr6, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr7, len7, ptr8);
|
|
7954
|
+
return takeObject(ret);
|
|
7955
|
+
}
|
|
7956
|
+
/**
|
|
7957
|
+
* Estimate Fee for Aleo function execution. Note if "cache" is set to true, the proving and
|
|
7958
|
+
* verifying keys will be stored in the ProgramManager's memory and used for subsequent
|
|
7959
|
+
* program executions.
|
|
7960
|
+
*
|
|
7961
|
+
* @param program The source code of the program to estimate the execution fee for.
|
|
7962
|
+
* @param function The name of the function to estimate the execution fee for.
|
|
7963
|
+
* @param imports (optional) Provide a list of imports to use for the fee estimation in the
|
|
7964
|
+
* form of a javascript object where the keys are a string of the program name and the values
|
|
7965
|
+
* are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
|
|
7966
|
+
* @param edition {
|
|
7967
|
+
* @returns {u64} Fee in microcredits
|
|
7968
|
+
* @param {string} program
|
|
7969
|
+
* @param {string} _function
|
|
7970
|
+
* @param {object | null} [imports]
|
|
7971
|
+
* @param {number | null} [edition]
|
|
7972
|
+
* @returns {Promise<bigint>}
|
|
7973
|
+
*/
|
|
7974
|
+
static estimateExecutionFee(program, _function, imports, edition) {
|
|
7975
|
+
const ptr0 = passStringToWasm0(program, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
|
|
7976
|
+
const len0 = WASM_VECTOR_LEN;
|
|
7977
|
+
const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
|
|
7978
|
+
const len1 = WASM_VECTOR_LEN;
|
|
7979
|
+
const ret = wasm.programmanager_estimateExecutionFee(ptr0, len0, ptr1, len1, isLikeNone(imports) ? 0 : addHeapObject(imports), isLikeNone(edition) ? 0xFFFFFF : edition);
|
|
7915
7980
|
return takeObject(ret);
|
|
7916
7981
|
}
|
|
7917
7982
|
/**
|
|
@@ -7973,6 +8038,31 @@ class ProgramManager {
|
|
|
7973
8038
|
const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5, isLikeNone(edition) ? 0xFFFFFF : edition);
|
|
7974
8039
|
return takeObject(ret);
|
|
7975
8040
|
}
|
|
8041
|
+
/**
|
|
8042
|
+
* Estimate Fee for an Authorization.
|
|
8043
|
+
*
|
|
8044
|
+
* @param authorization Authorization to estimate the fee for.
|
|
8045
|
+
* @param program The program the Authorization is for.
|
|
8046
|
+
* @param imports Provide a list of imports to use for the fee estimation in the
|
|
8047
|
+
* form of a javascript object where the keys are a string of the program name and the values
|
|
8048
|
+
* are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
|
|
8049
|
+
* @param offline_query The offline query object used to insert the global state root and state paths needed to create
|
|
8050
|
+
* a valid inclusion proof offline.
|
|
8051
|
+
* @param edition: Optional edition to estimate the fee for.
|
|
8052
|
+
* @returns {u64} Fee in microcredits
|
|
8053
|
+
* @param {Authorization} authorization
|
|
8054
|
+
* @param {string} program
|
|
8055
|
+
* @param {object | null} [imports]
|
|
8056
|
+
* @param {number | null} [edition]
|
|
8057
|
+
* @returns {Promise<bigint>}
|
|
8058
|
+
*/
|
|
8059
|
+
static estimateFeeForAuthorization(authorization, program, imports, edition) {
|
|
8060
|
+
_assertClass(authorization, Authorization);
|
|
8061
|
+
const ptr0 = passStringToWasm0(program, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
|
|
8062
|
+
const len0 = WASM_VECTOR_LEN;
|
|
8063
|
+
const ret = wasm.programmanager_estimateFeeForAuthorization(authorization.__wbg_ptr, ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports), isLikeNone(edition) ? 0xFFFFFF : edition);
|
|
8064
|
+
return takeObject(ret);
|
|
8065
|
+
}
|
|
7976
8066
|
/**
|
|
7977
8067
|
* Execute Aleo function and create an Aleo execution transaction
|
|
7978
8068
|
*
|
|
@@ -13010,6 +13100,9 @@ async function __wbg_load(module, imports) {
|
|
|
13010
13100
|
function __wbg_get_imports() {
|
|
13011
13101
|
const imports = {};
|
|
13012
13102
|
imports.wbg = {};
|
|
13103
|
+
imports.wbg.__wbg_abort_410ec47a64ac6117 = function(arg0, arg1) {
|
|
13104
|
+
getObject(arg0).abort(getObject(arg1));
|
|
13105
|
+
};
|
|
13013
13106
|
imports.wbg.__wbg_abort_775ef1d17fc65868 = function(arg0) {
|
|
13014
13107
|
getObject(arg0).abort();
|
|
13015
13108
|
};
|
|
@@ -13048,6 +13141,10 @@ function __wbg_get_imports() {
|
|
|
13048
13141
|
const ret = Ciphertext.__wrap(arg0);
|
|
13049
13142
|
return addHeapObject(ret);
|
|
13050
13143
|
};
|
|
13144
|
+
imports.wbg.__wbg_clearTimeout_86721db0036bea98 = function(arg0) {
|
|
13145
|
+
const ret = clearTimeout(takeObject(arg0));
|
|
13146
|
+
return addHeapObject(ret);
|
|
13147
|
+
};
|
|
13051
13148
|
imports.wbg.__wbg_crypto_ed58b8e10a292839 = function(arg0) {
|
|
13052
13149
|
const ret = getObject(arg0).crypto;
|
|
13053
13150
|
return addHeapObject(ret);
|
|
@@ -13079,6 +13176,10 @@ function __wbg_get_imports() {
|
|
|
13079
13176
|
const ret = getObject(arg0).fetch(getObject(arg1));
|
|
13080
13177
|
return addHeapObject(ret);
|
|
13081
13178
|
};
|
|
13179
|
+
imports.wbg.__wbg_fetch_d36a73832f0a45e8 = function(arg0) {
|
|
13180
|
+
const ret = fetch(getObject(arg0));
|
|
13181
|
+
return addHeapObject(ret);
|
|
13182
|
+
};
|
|
13082
13183
|
imports.wbg.__wbg_fetch_f1856afdb49415d1 = function(arg0) {
|
|
13083
13184
|
const ret = fetch(getObject(arg0));
|
|
13084
13185
|
return addHeapObject(ret);
|
|
@@ -13144,7 +13245,7 @@ function __wbg_get_imports() {
|
|
|
13144
13245
|
const ret = getObject(arg0).length;
|
|
13145
13246
|
return ret;
|
|
13146
13247
|
};
|
|
13147
|
-
imports.wbg.
|
|
13248
|
+
imports.wbg.__wbg_log_3d00345a85838c37 = function(arg0, arg1) {
|
|
13148
13249
|
console.log(getStringFromWasm0(arg0, arg1));
|
|
13149
13250
|
};
|
|
13150
13251
|
imports.wbg.__wbg_msCrypto_0a36e2ec3a343d26 = function(arg0) {
|
|
@@ -13162,7 +13263,7 @@ function __wbg_get_imports() {
|
|
|
13162
13263
|
const a = state0.a;
|
|
13163
13264
|
state0.a = 0;
|
|
13164
13265
|
try {
|
|
13165
|
-
return
|
|
13266
|
+
return __wbg_adapter_873(a, state0.b, arg0, arg1);
|
|
13166
13267
|
} finally {
|
|
13167
13268
|
state0.a = a;
|
|
13168
13269
|
}
|
|
@@ -13310,6 +13411,10 @@ function __wbg_get_imports() {
|
|
|
13310
13411
|
imports.wbg.__wbg_send_40a47636ff90f64d = function() { return handleError(function (arg0) {
|
|
13311
13412
|
getObject(arg0).send();
|
|
13312
13413
|
}, arguments) };
|
|
13414
|
+
imports.wbg.__wbg_setTimeout_2e707715f8cc9497 = function(arg0, arg1) {
|
|
13415
|
+
const ret = setTimeout(getObject(arg0), arg1);
|
|
13416
|
+
return addHeapObject(ret);
|
|
13417
|
+
};
|
|
13313
13418
|
imports.wbg.__wbg_set_37837023f3d740e8 = function(arg0, arg1, arg2) {
|
|
13314
13419
|
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
|
13315
13420
|
};
|
|
@@ -13349,7 +13454,7 @@ function __wbg_get_imports() {
|
|
|
13349
13454
|
const ret = Signature.__wrap(arg0);
|
|
13350
13455
|
return addHeapObject(ret);
|
|
13351
13456
|
};
|
|
13352
|
-
imports.wbg.
|
|
13457
|
+
imports.wbg.__wbg_spawnWorker_11a3cff24c5879d7 = function(arg0, arg1, arg2, arg3) {
|
|
13353
13458
|
const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);
|
|
13354
13459
|
return addHeapObject(ret);
|
|
13355
13460
|
};
|
|
@@ -13469,12 +13574,16 @@ function __wbg_get_imports() {
|
|
|
13469
13574
|
const ret = false;
|
|
13470
13575
|
return ret;
|
|
13471
13576
|
};
|
|
13472
|
-
imports.wbg.
|
|
13473
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
13577
|
+
imports.wbg.__wbindgen_closure_wrapper7312 = function(arg0, arg1, arg2) {
|
|
13578
|
+
const ret = makeMutClosure(arg0, arg1, 533, __wbg_adapter_40);
|
|
13579
|
+
return addHeapObject(ret);
|
|
13580
|
+
};
|
|
13581
|
+
imports.wbg.__wbindgen_closure_wrapper7964 = function(arg0, arg1, arg2) {
|
|
13582
|
+
const ret = makeMutClosure(arg0, arg1, 533, __wbg_adapter_43);
|
|
13474
13583
|
return addHeapObject(ret);
|
|
13475
13584
|
};
|
|
13476
|
-
imports.wbg.
|
|
13477
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
13585
|
+
imports.wbg.__wbindgen_closure_wrapper7968 = function(arg0, arg1, arg2) {
|
|
13586
|
+
const ret = makeMutClosure(arg0, arg1, 533, __wbg_adapter_43);
|
|
13478
13587
|
return addHeapObject(ret);
|
|
13479
13588
|
};
|
|
13480
13589
|
imports.wbg.__wbindgen_is_function = function(arg0) {
|