@talismn/crypto 0.0.0-pr2277-20251211071316 → 0.0.0-pr2295-20260110031023

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. package/dist/index.d.mts +124 -0
  2. package/dist/index.d.ts +124 -0
  3. package/dist/index.js +808 -0
  4. package/dist/index.js.map +1 -0
  5. package/dist/index.mjs +726 -0
  6. package/dist/index.mjs.map +1 -0
  7. package/package.json +20 -6
  8. package/dist/declarations/src/address/addressFromPublicKey.d.ts +0 -5
  9. package/dist/declarations/src/address/encodeAnyAddress.d.ts +0 -5
  10. package/dist/declarations/src/address/encoding/addressEncodingFromCurve.d.ts +0 -3
  11. package/dist/declarations/src/address/encoding/bitcoin.d.ts +0 -37
  12. package/dist/declarations/src/address/encoding/detectAddressEncoding.d.ts +0 -2
  13. package/dist/declarations/src/address/encoding/ethereum.d.ts +0 -6
  14. package/dist/declarations/src/address/encoding/index.d.ts +0 -6
  15. package/dist/declarations/src/address/encoding/solana.d.ts +0 -2
  16. package/dist/declarations/src/address/encoding/ss58.d.ts +0 -3
  17. package/dist/declarations/src/address/index.d.ts +0 -6
  18. package/dist/declarations/src/address/isAddressEqual.d.ts +0 -1
  19. package/dist/declarations/src/address/isAddressValid.d.ts +0 -1
  20. package/dist/declarations/src/address/normalizeAddress.d.ts +0 -1
  21. package/dist/declarations/src/derivation/common.d.ts +0 -5
  22. package/dist/declarations/src/derivation/deriveEcdsa.d.ts +0 -3
  23. package/dist/declarations/src/derivation/deriveEd25519.d.ts +0 -3
  24. package/dist/declarations/src/derivation/deriveEthereum.d.ts +0 -3
  25. package/dist/declarations/src/derivation/deriveSolana.d.ts +0 -3
  26. package/dist/declarations/src/derivation/deriveSr25519.d.ts +0 -4
  27. package/dist/declarations/src/derivation/index.d.ts +0 -1
  28. package/dist/declarations/src/derivation/utils.d.ts +0 -7
  29. package/dist/declarations/src/encryption/encryptKemAead.d.ts +0 -1
  30. package/dist/declarations/src/encryption/index.d.ts +0 -1
  31. package/dist/declarations/src/hashing/index.d.ts +0 -9
  32. package/dist/declarations/src/index.d.ts +0 -8
  33. package/dist/declarations/src/mnemonic/index.d.ts +0 -9
  34. package/dist/declarations/src/platform/index.d.ts +0 -4
  35. package/dist/declarations/src/types/index.d.ts +0 -9
  36. package/dist/declarations/src/utils/exports.d.ts +0 -2
  37. package/dist/declarations/src/utils/index.d.ts +0 -2
  38. package/dist/declarations/src/utils/pbkdf2.d.ts +0 -1
  39. package/dist/talismn-crypto.cjs.d.ts +0 -1
  40. package/dist/talismn-crypto.cjs.dev.js +0 -784
  41. package/dist/talismn-crypto.cjs.js +0 -7
  42. package/dist/talismn-crypto.cjs.prod.js +0 -784
  43. package/dist/talismn-crypto.esm.js +0 -716
package/dist/index.js ADDED
@@ -0,0 +1,808 @@
1
+ "use strict";
2
+ var __create = Object.create;
3
+ var __defProp = Object.defineProperty;
4
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
+ var __getOwnPropNames = Object.getOwnPropertyNames;
6
+ var __getProtoOf = Object.getPrototypeOf;
7
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
8
+ var __export = (target, all) => {
9
+ for (var name in all)
10
+ __defProp(target, name, { get: all[name], enumerable: true });
11
+ };
12
+ var __copyProps = (to, from, except, desc) => {
13
+ if (from && typeof from === "object" || typeof from === "function") {
14
+ for (let key of __getOwnPropNames(from))
15
+ if (!__hasOwnProp.call(to, key) && key !== except)
16
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
+ }
18
+ return to;
19
+ };
20
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
+ // If the importer is in node compatibility mode or this is not an ESM
22
+ // file that has been converted to a CommonJS file using a Babel-
23
+ // compatible transform (i.e. "__esModule" has not been set), then set
24
+ // "default" to the CommonJS "module.exports" for node compatibility.
25
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
+ mod
27
+ ));
28
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
29
+
30
+ // src/index.ts
31
+ var index_exports = {};
32
+ __export(index_exports, {
33
+ DEV_MNEMONIC_ETHEREUM: () => DEV_MNEMONIC_ETHEREUM,
34
+ DEV_MNEMONIC_POLKADOT: () => DEV_MNEMONIC_POLKADOT,
35
+ addressEncodingFromCurve: () => addressEncodingFromCurve,
36
+ addressFromMnemonic: () => addressFromMnemonic,
37
+ addressFromPublicKey: () => addressFromPublicKey,
38
+ base58: () => import_base.base58,
39
+ base64: () => import_base.base64,
40
+ blake2b256: () => blake2b256,
41
+ blake2b512: () => blake2b512,
42
+ blake3: () => blake3,
43
+ checksumEthereumAddress: () => checksumEthereumAddress,
44
+ decodeSs58Address: () => decodeSs58Address,
45
+ deriveKeypair: () => deriveKeypair,
46
+ detectAddressEncoding: () => detectAddressEncoding,
47
+ ed25519: () => import_ed25519.ed25519,
48
+ encodeAddressEthereum: () => encodeAddressEthereum,
49
+ encodeAddressSolana: () => encodeAddressSolana,
50
+ encodeAddressSs58: () => encodeAddressSs58,
51
+ encodeAnyAddress: () => encodeAnyAddress,
52
+ encryptKemAead: () => encryptKemAead,
53
+ entropyToMnemonic: () => entropyToMnemonic,
54
+ entropyToSeed: () => entropyToSeed,
55
+ fromBase58Check: () => fromBase58Check,
56
+ fromBech32: () => fromBech32,
57
+ fromBech32m: () => fromBech32m,
58
+ generateMnemonic: () => generateMnemonic,
59
+ getAccountPlatformFromAddress: () => getAccountPlatformFromAddress,
60
+ getAccountPlatformFromCurve: () => getAccountPlatformFromCurve,
61
+ getAccountPlatformFromEncoding: () => getAccountPlatformFromEncoding,
62
+ getDevSeed: () => getDevSeed,
63
+ getPublicKeyFromSecret: () => getPublicKeyFromSecret,
64
+ getPublicKeySolana: () => getPublicKeySolana,
65
+ getSafeHash: () => getSafeHash,
66
+ hex: () => import_base.hex,
67
+ isAddressEqual: () => isAddressEqual,
68
+ isAddressValid: () => isAddressValid,
69
+ isBase58CheckAddress: () => isBase58CheckAddress,
70
+ isBech32Address: () => isBech32Address,
71
+ isBech32mAddress: () => isBech32mAddress,
72
+ isBitcoinAddress: () => isBitcoinAddress,
73
+ isEthereumAddress: () => isEthereumAddress,
74
+ isSolanaAddress: () => isSolanaAddress,
75
+ isSs58Address: () => isSs58Address,
76
+ isValidDerivationPath: () => isValidDerivationPath,
77
+ isValidMnemonic: () => isValidMnemonic,
78
+ mnemonicToEntropy: () => mnemonicToEntropy,
79
+ normalizeAddress: () => normalizeAddress,
80
+ parseSecretKey: () => parseSecretKey,
81
+ pbkdf2: () => pbkdf2,
82
+ removeHexPrefix: () => removeHexPrefix,
83
+ utf8: () => import_base.utf8
84
+ });
85
+ module.exports = __toCommonJS(index_exports);
86
+
87
+ // src/mnemonic/index.ts
88
+ var import_bip39 = require("@scure/bip39");
89
+ var import_english = require("@scure/bip39/wordlists/english");
90
+
91
+ // src/utils/exports.ts
92
+ var import_base = require("@scure/base");
93
+ var import_ed25519 = require("@noble/curves/ed25519");
94
+
95
+ // src/utils/pbkdf2.ts
96
+ var pbkdf2 = async (hash, entropy, salt, iterations, outputLenBytes) => {
97
+ const keyMaterial = await crypto.subtle.importKey("raw", entropy, "PBKDF2", false, ["deriveBits"]);
98
+ const derivedBits = await crypto.subtle.deriveBits(
99
+ { name: "PBKDF2", salt, iterations, hash },
100
+ keyMaterial,
101
+ outputLenBytes * 8
102
+ );
103
+ return new Uint8Array(derivedBits);
104
+ };
105
+
106
+ // src/mnemonic/index.ts
107
+ var mnemonicToEntropy = (mnemonic) => {
108
+ return (0, import_bip39.mnemonicToEntropy)(mnemonic, import_english.wordlist);
109
+ };
110
+ var entropyToMnemonic = (entropy) => {
111
+ return (0, import_bip39.entropyToMnemonic)(entropy, import_english.wordlist);
112
+ };
113
+ var entropyToSeedSubstrate = async (entropy, password) => await pbkdf2(
114
+ "SHA-512",
115
+ entropy,
116
+ mnemonicPasswordToSalt(password ?? ""),
117
+ 2048,
118
+ // 2048 iterations
119
+ 32
120
+ // 32 bytes (32 * 8 == 256 bits)
121
+ );
122
+ var entropyToSeedClassic = async (entropy, password) => await pbkdf2(
123
+ "SHA-512",
124
+ encodeNormalized(entropyToMnemonic(entropy)),
125
+ mnemonicPasswordToSalt(password ?? ""),
126
+ 2048,
127
+ // 2048 iterations
128
+ 64
129
+ // 64 bytes (64 * 8 == 512 bits)
130
+ );
131
+ var mnemonicPasswordToSalt = (password) => encodeNormalized(`mnemonic${password}`);
132
+ var encodeNormalized = (utf82) => new TextEncoder().encode(utf82.normalize("NFKD"));
133
+ var getSeedDerivationType = (curve) => {
134
+ switch (curve) {
135
+ case "sr25519":
136
+ case "ed25519":
137
+ case "ecdsa":
138
+ return "substrate";
139
+ case "ethereum":
140
+ case "solana":
141
+ return "classic";
142
+ case "bitcoin-ecdsa":
143
+ case "bitcoin-ed25519":
144
+ throw new Error("seed derivation is not implemented for Bitcoin");
145
+ }
146
+ };
147
+ var entropyToSeed = async (entropy, curve, password) => {
148
+ const type = getSeedDerivationType(curve);
149
+ switch (type) {
150
+ case "classic":
151
+ return await entropyToSeedClassic(entropy, password);
152
+ case "substrate":
153
+ return await entropyToSeedSubstrate(entropy, password);
154
+ }
155
+ };
156
+ var isValidMnemonic = (mnemonic) => {
157
+ return (0, import_bip39.validateMnemonic)(mnemonic, import_english.wordlist);
158
+ };
159
+ var generateMnemonic = (words) => {
160
+ switch (words) {
161
+ case 12:
162
+ return (0, import_bip39.generateMnemonic)(import_english.wordlist, 128);
163
+ case 24:
164
+ return (0, import_bip39.generateMnemonic)(import_english.wordlist, 256);
165
+ }
166
+ };
167
+ var DEV_MNEMONIC_POLKADOT = "bottom drive obey lake curtain smoke basket hold race lonely fit walk";
168
+ var DEV_MNEMONIC_ETHEREUM = "test test test test test test test test test test test junk";
169
+ var DEV_SEED_CACHE = /* @__PURE__ */ new Map();
170
+ var getDevSeed = async (curve) => {
171
+ const type = getSeedDerivationType(curve);
172
+ if (!DEV_SEED_CACHE.has(type)) {
173
+ switch (type) {
174
+ case "classic": {
175
+ const entropy = mnemonicToEntropy(DEV_MNEMONIC_ETHEREUM);
176
+ const seed = await entropyToSeedClassic(entropy);
177
+ DEV_SEED_CACHE.set(type, seed);
178
+ break;
179
+ }
180
+ case "substrate": {
181
+ const entropy = mnemonicToEntropy(DEV_MNEMONIC_POLKADOT);
182
+ const seed = await entropyToSeedSubstrate(entropy);
183
+ DEV_SEED_CACHE.set(type, seed);
184
+ break;
185
+ }
186
+ default:
187
+ throw new Error("Unsupported derivation type");
188
+ }
189
+ }
190
+ return DEV_SEED_CACHE.get(type);
191
+ };
192
+
193
+ // src/derivation/utils.ts
194
+ var import_base5 = require("@scure/base");
195
+
196
+ // src/derivation/deriveEcdsa.ts
197
+ var import_secp256k1 = require("@noble/curves/secp256k1");
198
+
199
+ // src/address/encoding/addressEncodingFromCurve.ts
200
+ var addressEncodingFromCurve = (curve) => {
201
+ switch (curve) {
202
+ case "sr25519":
203
+ case "ed25519":
204
+ case "ecdsa":
205
+ return "ss58";
206
+ case "bitcoin-ecdsa":
207
+ case "bitcoin-ed25519":
208
+ return "bech32m";
209
+ case "ethereum":
210
+ return "ethereum";
211
+ case "solana":
212
+ return "base58solana";
213
+ }
214
+ };
215
+
216
+ // src/address/encoding/solana.ts
217
+ var import_base2 = require("@scure/base");
218
+ var encodeAddressSolana = (publicKey) => {
219
+ if (publicKey.length !== 32)
220
+ throw new Error("Public key must be 32 bytes long for Solana base58 encoding");
221
+ return import_base2.base58.encode(publicKey);
222
+ };
223
+ function isSolanaAddress(address) {
224
+ try {
225
+ const bytes = import_base2.base58.decode(address);
226
+ return bytes.length === 32;
227
+ } catch (error) {
228
+ return false;
229
+ }
230
+ }
231
+
232
+ // src/address/encoding/bitcoin.ts
233
+ var import_bech32 = require("bech32");
234
+ var import_bs58check = __toESM(require("bs58check"));
235
+ var isBitcoinAddress = (address) => isBech32mAddress(address) || isBech32Address(address) || isBase58CheckAddress(address);
236
+ function isBech32mAddress(address) {
237
+ try {
238
+ fromBech32m(address);
239
+ } catch {
240
+ return false;
241
+ }
242
+ return true;
243
+ }
244
+ function isBech32Address(address) {
245
+ try {
246
+ fromBech32(address);
247
+ } catch {
248
+ return false;
249
+ }
250
+ return true;
251
+ }
252
+ function isBase58CheckAddress(address) {
253
+ try {
254
+ fromBase58Check(address);
255
+ } catch {
256
+ return false;
257
+ }
258
+ return true;
259
+ }
260
+ function fromBech32m(address) {
261
+ const result = import_bech32.bech32m.decode(address);
262
+ const version = result.words[0];
263
+ if (version === 0) throw new TypeError(address + " uses wrong encoding");
264
+ const data = import_bech32.bech32m.fromWords(result.words.slice(1));
265
+ return {
266
+ version,
267
+ prefix: result.prefix,
268
+ data: Uint8Array.from(data)
269
+ };
270
+ }
271
+ function fromBech32(address) {
272
+ const result = import_bech32.bech32.decode(address);
273
+ const version = result.words[0];
274
+ if (version !== 0) throw new TypeError(address + " uses wrong encoding");
275
+ const data = import_bech32.bech32.fromWords(result.words.slice(1));
276
+ return {
277
+ version,
278
+ prefix: result.prefix,
279
+ data: Uint8Array.from(data)
280
+ };
281
+ }
282
+ function fromBase58Check(address) {
283
+ const payload = import_bs58check.default.decode(address);
284
+ if (payload.length < 21) throw new TypeError(address + " is too short");
285
+ if (payload.length > 21) throw new TypeError(address + " is too long");
286
+ function readUInt8(buffer, offset) {
287
+ if (offset + 1 > buffer.length) {
288
+ throw new Error("Offset is outside the bounds of Uint8Array");
289
+ }
290
+ const buf = Buffer.from(buffer);
291
+ return buf.readUInt8(offset);
292
+ }
293
+ const version = readUInt8(payload, 0);
294
+ const hash = payload.slice(1);
295
+ return { version, hash };
296
+ }
297
+
298
+ // src/address/encoding/ethereum.ts
299
+ var import_sha3 = require("@noble/hashes/sha3");
300
+ var import_utils2 = require("@noble/hashes/utils");
301
+ var encodeAddressEthereum = (publicKey) => {
302
+ if (publicKey[0] !== 4) throw new Error("Invalid public key format");
303
+ const publicKeyWithoutPrefix = publicKey.slice(1);
304
+ const hash = (0, import_sha3.keccak_256)(publicKeyWithoutPrefix);
305
+ const address = hash.slice(-20);
306
+ return checksumEthereumAddress(`0x${(0, import_utils2.bytesToHex)(address)}`);
307
+ };
308
+ var checksumEthereumAddress = (address) => {
309
+ const addr = address.toLowerCase().replace(/^0x/, "");
310
+ const hash = (0, import_sha3.keccak_256)(new TextEncoder().encode(addr));
311
+ const hashHex = (0, import_utils2.bytesToHex)(hash);
312
+ const checksum = addr.split("").map((char, i) => parseInt(hashHex[i], 16) >= 8 ? char.toUpperCase() : char).join("");
313
+ return `0x${checksum}`;
314
+ };
315
+ function isEthereumAddress(address) {
316
+ return /^0x[a-fA-F0-9]{40}$/.test(address);
317
+ }
318
+
319
+ // src/address/encoding/ss58.ts
320
+ var import_base4 = require("@scure/base");
321
+
322
+ // src/hashing/index.ts
323
+ var import_blake2b = require("@noble/hashes/blake2b");
324
+ var import_blake3 = require("@noble/hashes/blake3");
325
+ var import_base3 = require("@scure/base");
326
+ var blake3 = import_blake3.blake3;
327
+ var blake2b256 = (msg) => (0, import_blake2b.blake2b)(msg, { dkLen: 32 });
328
+ var blake2b512 = (msg) => (0, import_blake2b.blake2b)(msg, { dkLen: 64 });
329
+ var getSafeHash = (bytes) => {
330
+ return import_base3.base58.encode((0, import_blake3.blake3)(bytes));
331
+ };
332
+
333
+ // src/address/encoding/ss58.ts
334
+ var VALID_PUBLICKEY_LENGTHS = [32, 33];
335
+ var accountId = (publicKey) => {
336
+ if (!VALID_PUBLICKEY_LENGTHS.includes(publicKey.length)) throw new Error("Invalid publicKey");
337
+ return publicKey.length === 33 ? blake2b256(publicKey) : publicKey;
338
+ };
339
+ var SS58PRE = /* @__PURE__ */ new TextEncoder().encode("SS58PRE");
340
+ var CHECKSUM_LENGTH = 2;
341
+ var VALID_PAYLOAD_LENGTHS = [32, 33];
342
+ var ss58Encode = (payload, prefix = 42) => {
343
+ if (!VALID_PAYLOAD_LENGTHS.includes(payload.length)) throw new Error("Invalid payload");
344
+ const prefixBytes = prefix < 64 ? Uint8Array.of(prefix) : Uint8Array.of(
345
+ (prefix & 252) >> 2 | 64,
346
+ prefix >> 8 | (prefix & 3) << 6
347
+ );
348
+ const checksum = blake2b512(Uint8Array.of(...SS58PRE, ...prefixBytes, ...payload)).subarray(
349
+ 0,
350
+ CHECKSUM_LENGTH
351
+ );
352
+ return import_base4.base58.encode(Uint8Array.of(...prefixBytes, ...payload, ...checksum));
353
+ };
354
+ var VALID_ADDRESS_LENGTHS = [35, 36, 37];
355
+ var decodeSs58Address = (addressStr) => {
356
+ const address = import_base4.base58.decode(addressStr);
357
+ if (!VALID_ADDRESS_LENGTHS.includes(address.length)) throw new Error("Invalid address length");
358
+ const addressChecksum = address.subarray(address.length - CHECKSUM_LENGTH);
359
+ const checksum = blake2b512(
360
+ Uint8Array.of(...SS58PRE, ...address.subarray(0, address.length - CHECKSUM_LENGTH))
361
+ ).subarray(0, CHECKSUM_LENGTH);
362
+ if (addressChecksum[0] !== checksum[0] || addressChecksum[1] !== checksum[1])
363
+ throw new Error("Invalid checksum");
364
+ const prefixLength = address[0] & 64 ? 2 : 1;
365
+ const prefix = prefixLength === 1 ? address[0] : (address[0] & 63) << 2 | address[1] >> 6 | (address[1] & 63) << 8;
366
+ const publicKey = address.slice(prefixLength, address.length - CHECKSUM_LENGTH);
367
+ return [publicKey, prefix];
368
+ };
369
+ var encodeAddressSs58 = (publicKey, prefix = 42) => {
370
+ if (typeof publicKey === "string") [publicKey] = decodeSs58Address(publicKey);
371
+ return ss58Encode(accountId(publicKey), prefix);
372
+ };
373
+ function isSs58Address(address) {
374
+ try {
375
+ decodeSs58Address(address);
376
+ return true;
377
+ } catch (error) {
378
+ return false;
379
+ }
380
+ }
381
+
382
+ // src/address/encoding/detectAddressEncoding.ts
383
+ var CACHE = /* @__PURE__ */ new Map();
384
+ var detectAddressEncodingInner = (address) => {
385
+ if (isEthereumAddress(address)) return "ethereum";
386
+ if (isSs58Address(address)) return "ss58";
387
+ if (isSolanaAddress(address)) return "base58solana";
388
+ if (isBech32mAddress(address)) return "bech32m";
389
+ if (isBech32Address(address)) return "bech32";
390
+ if (isBase58CheckAddress(address)) return "base58check";
391
+ throw new Error(`Unknown address encoding`);
392
+ };
393
+ var detectAddressEncoding = (address) => {
394
+ if (!CACHE.has(address)) CACHE.set(address, detectAddressEncodingInner(address));
395
+ return CACHE.get(address);
396
+ };
397
+
398
+ // src/address/addressFromPublicKey.ts
399
+ var addressFromPublicKey = (publicKey, encoding, options) => {
400
+ switch (encoding) {
401
+ case "ss58":
402
+ return encodeAddressSs58(publicKey, options?.ss58Prefix);
403
+ case "ethereum":
404
+ return encodeAddressEthereum(publicKey);
405
+ case "base58solana":
406
+ return encodeAddressSolana(publicKey);
407
+ case "bech32m":
408
+ case "bech32":
409
+ case "base58check":
410
+ throw new Error("addressFromPublicKey is not implemented for Bitcoin");
411
+ }
412
+ };
413
+
414
+ // src/address/normalizeAddress.ts
415
+ var CACHE2 = /* @__PURE__ */ new Map();
416
+ var normalizeAddress = (address) => {
417
+ try {
418
+ if (!CACHE2.has(address)) CACHE2.set(address, normalizeAnyAddress(address));
419
+ return CACHE2.get(address);
420
+ } catch (cause) {
421
+ throw new Error(`Unable to normalize address: ${address}`, { cause });
422
+ }
423
+ };
424
+ var normalizeAnyAddress = (address) => {
425
+ switch (detectAddressEncoding(address)) {
426
+ case "ethereum":
427
+ return checksumEthereumAddress(address);
428
+ case "bech32m":
429
+ case "bech32":
430
+ case "base58check":
431
+ case "base58solana":
432
+ return address;
433
+ case "ss58": {
434
+ const [pk] = decodeSs58Address(address);
435
+ return encodeAddressSs58(pk, 42);
436
+ }
437
+ }
438
+ };
439
+
440
+ // src/address/isAddressEqual.ts
441
+ var isAddressEqual = (address1, address2) => {
442
+ try {
443
+ return normalizeAddress(address1) === normalizeAddress(address2);
444
+ } catch (err) {
445
+ return false;
446
+ }
447
+ };
448
+
449
+ // src/address/encodeAnyAddress.ts
450
+ var encodeAnyAddress = (address, options) => {
451
+ const encoding = detectAddressEncoding(address);
452
+ if (encoding === "ss58" && options?.ss58Format !== void 0) {
453
+ const [publicKey] = decodeSs58Address(address);
454
+ return encodeAddressSs58(publicKey, options?.ss58Format ?? 42);
455
+ }
456
+ return normalizeAddress(address);
457
+ };
458
+
459
+ // src/address/isAddressValid.ts
460
+ var isAddressValid = (address) => {
461
+ try {
462
+ detectAddressEncoding(address);
463
+ return true;
464
+ } catch {
465
+ return false;
466
+ }
467
+ };
468
+
469
+ // src/derivation/common.ts
470
+ var import_scale_ts = require("scale-ts");
471
+ var DERIVATION_RE = /(\/{1,2})(\w+)/g;
472
+ var parseSubstrateDerivations = (derivationsStr) => {
473
+ const derivations = [];
474
+ if (derivations)
475
+ for (const [_, type, code] of derivationsStr.matchAll(DERIVATION_RE)) {
476
+ derivations.push([type === "//" ? "hard" : "soft", code]);
477
+ }
478
+ return derivations;
479
+ };
480
+ var createChainCode = (code) => {
481
+ const chainCode = new Uint8Array(32);
482
+ chainCode.set(Number.isNaN(+code) ? import_scale_ts.str.enc(code) : import_scale_ts.u32.enc(+code));
483
+ return chainCode;
484
+ };
485
+ var derivationCodec = /* @__PURE__ */ (0, import_scale_ts.Tuple)(import_scale_ts.str, (0, import_scale_ts.Bytes)(32), (0, import_scale_ts.Bytes)(32));
486
+ var createSubstrateDeriveFn = (prefix) => (seed, chainCode) => blake2b256(derivationCodec.enc([prefix, seed, chainCode]));
487
+ var deriveSubstrateSecretKey = (seed, derivationPath, prefix) => {
488
+ const derivations = parseSubstrateDerivations(derivationPath);
489
+ const derive = createSubstrateDeriveFn(prefix);
490
+ return derivations.reduce((seed2, [type, chainCode]) => {
491
+ const code = createChainCode(chainCode);
492
+ if (type === "soft") throw new Error("Soft derivations are not supported");
493
+ return derive(seed2, code);
494
+ }, seed);
495
+ };
496
+
497
+ // src/derivation/deriveEcdsa.ts
498
+ var deriveEcdsa = (seed, derivationPath) => {
499
+ const secretKey = deriveSubstrateSecretKey(seed, derivationPath, "Secp256k1HDKD");
500
+ const publicKey = getPublicKeyEcdsa(secretKey);
501
+ return {
502
+ type: "ecdsa",
503
+ secretKey,
504
+ publicKey,
505
+ address: addressFromPublicKey(publicKey, "ss58")
506
+ };
507
+ };
508
+ var getPublicKeyEcdsa = (secretKey) => {
509
+ return import_secp256k1.secp256k1.getPublicKey(secretKey);
510
+ };
511
+
512
+ // src/derivation/deriveEd25519.ts
513
+ var import_ed255192 = require("@noble/curves/ed25519");
514
+ var deriveEd25519 = (seed, derivationPath) => {
515
+ const secretKey = deriveSubstrateSecretKey(seed, derivationPath, "Ed25519HDKD");
516
+ const publicKey = getPublicKeyEd25519(secretKey);
517
+ return {
518
+ type: "ed25519",
519
+ secretKey,
520
+ publicKey,
521
+ address: addressFromPublicKey(publicKey, "ss58")
522
+ };
523
+ };
524
+ var getPublicKeyEd25519 = (secretKey) => {
525
+ if (secretKey.length === 64) {
526
+ const [privateComponent, publicComponent] = [secretKey.slice(0, 32), secretKey.slice(32)];
527
+ const publicKey = import_ed255192.ed25519.getPublicKey(privateComponent);
528
+ if (!isUint8ArrayEq(publicComponent, publicKey)) return import_ed255192.ed25519.getPublicKey(secretKey);
529
+ return publicKey;
530
+ }
531
+ return import_ed255192.ed25519.getPublicKey(secretKey);
532
+ };
533
+ var isUint8ArrayEq = (a, b) => a.length !== b.length || a.some((v, i) => v !== b[i]) ? false : true;
534
+
535
+ // src/derivation/deriveEthereum.ts
536
+ var import_secp256k12 = require("@noble/curves/secp256k1");
537
+ var import_bip32 = require("@scure/bip32");
538
+ var deriveEthereum = (seed, derivationPath) => {
539
+ const hdkey = import_bip32.HDKey.fromMasterSeed(seed);
540
+ const childKey = hdkey.derive(derivationPath);
541
+ if (!childKey.privateKey) throw new Error("Invalid derivation path");
542
+ const secretKey = new Uint8Array(childKey.privateKey);
543
+ const publicKey = getPublicKeyEthereum(secretKey);
544
+ return {
545
+ type: "ethereum",
546
+ secretKey,
547
+ publicKey,
548
+ address: addressFromPublicKey(publicKey, "ethereum")
549
+ };
550
+ };
551
+ var getPublicKeyEthereum = (secretKey) => {
552
+ const scalar = import_secp256k12.secp256k1.utils.normPrivateKeyToScalar(secretKey);
553
+ return import_secp256k12.secp256k1.getPublicKey(scalar, false);
554
+ };
555
+
556
+ // src/derivation/deriveSolana.ts
557
+ var import_ed255193 = require("@noble/curves/ed25519");
558
+ var import_hmac = require("@noble/hashes/hmac");
559
+ var import_sha512 = require("@noble/hashes/sha512");
560
+ var parseDerivationPath = (path) => {
561
+ if (!path.startsWith("m/")) throw new Error("Path must start with 'm/'");
562
+ return path.split("/").slice(1).map((p) => {
563
+ if (!p.endsWith("'")) throw new Error("Only hardened derivation is supported");
564
+ return parseInt(p.slice(0, -1), 10) + 2147483648;
565
+ });
566
+ };
567
+ var deriveSolana = (seed, derivationPath) => {
568
+ let I = (0, import_hmac.hmac)(import_sha512.sha512, new TextEncoder().encode("ed25519 seed"), seed);
569
+ let secretKey = I.slice(0, 32);
570
+ let chainCode = I.slice(32);
571
+ for (const index of parseDerivationPath(derivationPath)) {
572
+ const data = new Uint8Array(1 + secretKey.length + 4);
573
+ data.set([0], 0);
574
+ data.set(secretKey, 1);
575
+ data.set(
576
+ new Uint8Array([
577
+ index >> 24 & 255,
578
+ index >> 16 & 255,
579
+ index >> 8 & 255,
580
+ index & 255
581
+ ]),
582
+ 1 + secretKey.length
583
+ );
584
+ I = (0, import_hmac.hmac)(import_sha512.sha512, chainCode, data);
585
+ secretKey = I.slice(0, 32);
586
+ chainCode = I.slice(32);
587
+ }
588
+ const publicKey = getPublicKeySolana(secretKey);
589
+ return {
590
+ type: "solana",
591
+ secretKey,
592
+ publicKey,
593
+ address: addressFromPublicKey(publicKey, "base58solana")
594
+ };
595
+ };
596
+ var getPublicKeySolana = (secretKey) => {
597
+ return import_ed255193.ed25519.getPublicKey(secretKey);
598
+ };
599
+
600
+ // src/derivation/deriveSr25519.ts
601
+ var import_utils3 = require("@noble/hashes/utils");
602
+ var import_micro_sr25519 = require("micro-sr25519");
603
+ var deriveSr25519 = (seed, derivationPath) => {
604
+ const derivations = parseSubstrateDerivations(derivationPath);
605
+ const secretKey = derivations.reduce((secretKey2, [type, chainCode]) => {
606
+ const deriveFn = type === "hard" ? import_micro_sr25519.HDKD.secretHard : import_micro_sr25519.HDKD.secretSoft;
607
+ const code = createChainCode(chainCode);
608
+ return deriveFn(secretKey2, code, import_utils3.randomBytes);
609
+ }, (0, import_micro_sr25519.secretFromSeed)(seed));
610
+ const publicKey = getPublicKeySr25519(secretKey);
611
+ return {
612
+ type: "sr25519",
613
+ secretKey,
614
+ publicKey,
615
+ address: addressFromPublicKey(publicKey, "ss58")
616
+ };
617
+ };
618
+ var getPublicKeySr25519 = import_micro_sr25519.getPublicKey;
619
+
620
+ // src/derivation/utils.ts
621
+ var deriveKeypair = (seed, derivationPath, curve) => {
622
+ switch (curve) {
623
+ case "sr25519":
624
+ return deriveSr25519(seed, derivationPath);
625
+ case "ed25519":
626
+ return deriveEd25519(seed, derivationPath);
627
+ case "ecdsa":
628
+ return deriveEcdsa(seed, derivationPath);
629
+ case "bitcoin-ecdsa":
630
+ case "bitcoin-ed25519":
631
+ throw new Error("deriveKeypair is not implemented for Bitcoin");
632
+ case "ethereum":
633
+ return deriveEthereum(seed, derivationPath);
634
+ case "solana":
635
+ return deriveSolana(seed, derivationPath);
636
+ }
637
+ };
638
+ var getPublicKeyFromSecret = (secretKey, curve) => {
639
+ switch (curve) {
640
+ case "ecdsa":
641
+ return getPublicKeyEcdsa(secretKey);
642
+ case "ethereum":
643
+ return getPublicKeyEthereum(secretKey);
644
+ case "sr25519":
645
+ return getPublicKeySr25519(secretKey);
646
+ case "ed25519":
647
+ return getPublicKeyEd25519(secretKey);
648
+ case "bitcoin-ecdsa":
649
+ case "bitcoin-ed25519":
650
+ throw new Error("getPublicKeyFromSecret is not implemented for Bitcoin");
651
+ case "solana":
652
+ return getPublicKeySolana(secretKey);
653
+ }
654
+ };
655
+ var addressFromMnemonic = async (mnemonic, derivationPath, curve) => {
656
+ const entropy = mnemonicToEntropy(mnemonic);
657
+ const seed = await entropyToSeed(entropy, curve);
658
+ const { address } = deriveKeypair(seed, derivationPath, curve);
659
+ return address;
660
+ };
661
+ var removeHexPrefix = (secretKey) => {
662
+ if (secretKey.startsWith("0x")) return secretKey.slice(2);
663
+ return secretKey;
664
+ };
665
+ var parseSecretKey = (secretKey, platform) => {
666
+ switch (platform) {
667
+ case "ethereum": {
668
+ const privateKey = removeHexPrefix(secretKey);
669
+ return import_base5.hex.decode(privateKey);
670
+ }
671
+ case "solana": {
672
+ const bytes = secretKey.startsWith("[") ? (
673
+ // JSON bytes array (ex: solflare)
674
+ Uint8Array.from(JSON.parse(secretKey))
675
+ ) : (
676
+ // base58 encoded string (ex: phantom)
677
+ import_base5.base58.decode(secretKey)
678
+ );
679
+ if (bytes.length === 64) {
680
+ const privateKey = bytes.slice(0, 32);
681
+ const publicKey = bytes.slice(32, 64);
682
+ const computedPublicKey = getPublicKeySolana(privateKey);
683
+ if (!publicKey.every((b, i) => b === computedPublicKey[i]))
684
+ throw new Error("Invalid Solana secret key: public key does not match");
685
+ return privateKey;
686
+ } else if (bytes.length === 32) return bytes;
687
+ throw new Error("Invalid Solana secret key length");
688
+ }
689
+ default:
690
+ throw new Error("Not implemented");
691
+ }
692
+ };
693
+ var isValidDerivationPath = async (derivationPath, curve) => {
694
+ try {
695
+ deriveKeypair(await getDevSeed(curve), derivationPath, curve);
696
+ return true;
697
+ } catch (err) {
698
+ return false;
699
+ }
700
+ };
701
+
702
+ // src/platform/index.ts
703
+ var getAccountPlatformFromCurve = (curve) => {
704
+ switch (curve) {
705
+ case "sr25519":
706
+ case "ed25519":
707
+ case "ecdsa":
708
+ return "polkadot";
709
+ case "ethereum":
710
+ return "ethereum";
711
+ case "bitcoin-ecdsa":
712
+ case "bitcoin-ed25519":
713
+ return "bitcoin";
714
+ case "solana":
715
+ return "solana";
716
+ }
717
+ };
718
+ var getAccountPlatformFromEncoding = (encoding) => {
719
+ switch (encoding) {
720
+ case "ss58":
721
+ return "polkadot";
722
+ case "ethereum":
723
+ return "ethereum";
724
+ case "bech32m":
725
+ case "bech32":
726
+ case "base58check":
727
+ return "bitcoin";
728
+ case "base58solana":
729
+ return "solana";
730
+ }
731
+ };
732
+ var getAccountPlatformFromAddress = (address) => {
733
+ const encoding = detectAddressEncoding(address);
734
+ return getAccountPlatformFromEncoding(encoding);
735
+ };
736
+
737
+ // src/encryption/encryptKemAead.ts
738
+ var import_chacha = require("@noble/ciphers/chacha.js");
739
+ var import_utils4 = require("@noble/ciphers/utils.js");
740
+ var import_mlkem = require("mlkem");
741
+ var encryptKemAead = async (publicKey, plaintext) => {
742
+ const kem = new import_mlkem.MlKem768();
743
+ const [kemCt, sharedSecret] = await kem.encap(publicKey);
744
+ if (sharedSecret.length !== 32) {
745
+ throw new Error(`Expected 32-byte shared secret, got ${sharedSecret.length}`);
746
+ }
747
+ const nonce = crypto.getRandomValues(new Uint8Array(24));
748
+ const aead = (0, import_chacha.xchacha20poly1305)(sharedSecret, nonce);
749
+ const aeadCt = aead.encrypt(plaintext);
750
+ const kemLen = new Uint8Array(2);
751
+ new DataView(kemLen.buffer).setUint16(0, kemCt.length, true);
752
+ return (0, import_utils4.concatBytes)(kemLen, kemCt, nonce, aeadCt);
753
+ };
754
+ // Annotate the CommonJS export names for ESM import in node:
755
+ 0 && (module.exports = {
756
+ DEV_MNEMONIC_ETHEREUM,
757
+ DEV_MNEMONIC_POLKADOT,
758
+ addressEncodingFromCurve,
759
+ addressFromMnemonic,
760
+ addressFromPublicKey,
761
+ base58,
762
+ base64,
763
+ blake2b256,
764
+ blake2b512,
765
+ blake3,
766
+ checksumEthereumAddress,
767
+ decodeSs58Address,
768
+ deriveKeypair,
769
+ detectAddressEncoding,
770
+ ed25519,
771
+ encodeAddressEthereum,
772
+ encodeAddressSolana,
773
+ encodeAddressSs58,
774
+ encodeAnyAddress,
775
+ encryptKemAead,
776
+ entropyToMnemonic,
777
+ entropyToSeed,
778
+ fromBase58Check,
779
+ fromBech32,
780
+ fromBech32m,
781
+ generateMnemonic,
782
+ getAccountPlatformFromAddress,
783
+ getAccountPlatformFromCurve,
784
+ getAccountPlatformFromEncoding,
785
+ getDevSeed,
786
+ getPublicKeyFromSecret,
787
+ getPublicKeySolana,
788
+ getSafeHash,
789
+ hex,
790
+ isAddressEqual,
791
+ isAddressValid,
792
+ isBase58CheckAddress,
793
+ isBech32Address,
794
+ isBech32mAddress,
795
+ isBitcoinAddress,
796
+ isEthereumAddress,
797
+ isSolanaAddress,
798
+ isSs58Address,
799
+ isValidDerivationPath,
800
+ isValidMnemonic,
801
+ mnemonicToEntropy,
802
+ normalizeAddress,
803
+ parseSecretKey,
804
+ pbkdf2,
805
+ removeHexPrefix,
806
+ utf8
807
+ });
808
+ //# sourceMappingURL=index.js.map